mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-06-19 17:31:42 +00:00
Auto-Update: 2024-12-12T15:00:22.918388+00:00
This commit is contained in:
parent
496ee3e953
commit
dbef058698
@ -2,8 +2,8 @@
|
|||||||
"id": "CVE-2021-47071",
|
"id": "CVE-2021-47071",
|
||||||
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||||
"published": "2024-03-01T22:15:46.967",
|
"published": "2024-03-01T22:15:46.967",
|
||||||
"lastModified": "2024-11-21T06:35:20.363",
|
"lastModified": "2024-12-12T14:43:19.253",
|
||||||
"vulnStatus": "Awaiting Analysis",
|
"vulnStatus": "Analyzed",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
@ -15,39 +15,141 @@
|
|||||||
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: uio_hv_generic: corrige una p\u00e9rdida de memoria en las rutas de manejo de errores. Si falla 'vmbus_establecer_gpadl()', (recv|send)_gpadl no se actualizar\u00e1 y aparecer\u00e1 'hv_uio_cleanup()' en el error La ruta de manejo no podr\u00e1 liberar el b\u00fafer correspondiente. En tal caso, necesitamos liberar el b\u00fafer expl\u00edcitamente."
|
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: uio_hv_generic: corrige una p\u00e9rdida de memoria en las rutas de manejo de errores. Si falla 'vmbus_establecer_gpadl()', (recv|send)_gpadl no se actualizar\u00e1 y aparecer\u00e1 'hv_uio_cleanup()' en el error La ruta de manejo no podr\u00e1 liberar el b\u00fafer correspondiente. En tal caso, necesitamos liberar el b\u00fafer expl\u00edcitamente."
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"metrics": {},
|
"metrics": {
|
||||||
|
"cvssMetricV31": [
|
||||||
|
{
|
||||||
|
"source": "nvd@nist.gov",
|
||||||
|
"type": "Primary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||||||
|
"baseScore": 5.5,
|
||||||
|
"baseSeverity": "MEDIUM",
|
||||||
|
"attackVector": "LOCAL",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "LOW",
|
||||||
|
"userInteraction": "NONE",
|
||||||
|
"scope": "UNCHANGED",
|
||||||
|
"confidentialityImpact": "NONE",
|
||||||
|
"integrityImpact": "NONE",
|
||||||
|
"availabilityImpact": "HIGH"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 1.8,
|
||||||
|
"impactScore": 3.6
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"weaknesses": [
|
||||||
|
{
|
||||||
|
"source": "nvd@nist.gov",
|
||||||
|
"type": "Primary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-401"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"configurations": [
|
||||||
|
{
|
||||||
|
"nodes": [
|
||||||
|
{
|
||||||
|
"operator": "OR",
|
||||||
|
"negate": false,
|
||||||
|
"cpeMatch": [
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||||
|
"versionStartIncluding": "4.20",
|
||||||
|
"versionEndExcluding": "5.4.122",
|
||||||
|
"matchCriteriaId": "6530C9FA-EEF8-4821-9186-47F7A1FA3C1A"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||||
|
"versionStartIncluding": "5.5",
|
||||||
|
"versionEndExcluding": "5.10.40",
|
||||||
|
"matchCriteriaId": "69DD053C-277F-4A8C-9606-11A24F806D05"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||||
|
"versionStartIncluding": "5.11",
|
||||||
|
"versionEndExcluding": "5.12.7",
|
||||||
|
"matchCriteriaId": "E8F2CE30-38B0-4716-B12B-A139B0F9C5C9"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:o:linux:linux_kernel:5.13:rc1:*:*:*:*:*:*",
|
||||||
|
"matchCriteriaId": "0CBAD0FC-C281-4666-AB2F-F8E6E1165DF7"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:o:linux:linux_kernel:5.13:rc2:*:*:*:*:*:*",
|
||||||
|
"matchCriteriaId": "96AC23B2-D46A-49D9-8203-8E1BEDCA8532"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
"references": [
|
"references": [
|
||||||
{
|
{
|
||||||
"url": "https://git.kernel.org/stable/c/3ee098f96b8b6c1a98f7f97915f8873164e6af9d",
|
"url": "https://git.kernel.org/stable/c/3ee098f96b8b6c1a98f7f97915f8873164e6af9d",
|
||||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||||
|
"tags": [
|
||||||
|
"Patch"
|
||||||
|
]
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"url": "https://git.kernel.org/stable/c/53486c467e356e06aa37047c984fccd64d78c827",
|
"url": "https://git.kernel.org/stable/c/53486c467e356e06aa37047c984fccd64d78c827",
|
||||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||||
|
"tags": [
|
||||||
|
"Patch"
|
||||||
|
]
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"url": "https://git.kernel.org/stable/c/cdd91637d4ef33e2be19a8e16e72e7d00c996d76",
|
"url": "https://git.kernel.org/stable/c/cdd91637d4ef33e2be19a8e16e72e7d00c996d76",
|
||||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||||
|
"tags": [
|
||||||
|
"Patch"
|
||||||
|
]
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"url": "https://git.kernel.org/stable/c/d84b5e912212b05f6b5bde9f682046accfbe0354",
|
"url": "https://git.kernel.org/stable/c/d84b5e912212b05f6b5bde9f682046accfbe0354",
|
||||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||||
|
"tags": [
|
||||||
|
"Patch"
|
||||||
|
]
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"url": "https://git.kernel.org/stable/c/3ee098f96b8b6c1a98f7f97915f8873164e6af9d",
|
"url": "https://git.kernel.org/stable/c/3ee098f96b8b6c1a98f7f97915f8873164e6af9d",
|
||||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||||
|
"tags": [
|
||||||
|
"Patch"
|
||||||
|
]
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"url": "https://git.kernel.org/stable/c/53486c467e356e06aa37047c984fccd64d78c827",
|
"url": "https://git.kernel.org/stable/c/53486c467e356e06aa37047c984fccd64d78c827",
|
||||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||||
|
"tags": [
|
||||||
|
"Patch"
|
||||||
|
]
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"url": "https://git.kernel.org/stable/c/cdd91637d4ef33e2be19a8e16e72e7d00c996d76",
|
"url": "https://git.kernel.org/stable/c/cdd91637d4ef33e2be19a8e16e72e7d00c996d76",
|
||||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||||
|
"tags": [
|
||||||
|
"Patch"
|
||||||
|
]
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"url": "https://git.kernel.org/stable/c/d84b5e912212b05f6b5bde9f682046accfbe0354",
|
"url": "https://git.kernel.org/stable/c/d84b5e912212b05f6b5bde9f682046accfbe0354",
|
||||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||||
|
"tags": [
|
||||||
|
"Patch"
|
||||||
|
]
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
@ -2,8 +2,8 @@
|
|||||||
"id": "CVE-2021-47074",
|
"id": "CVE-2021-47074",
|
||||||
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||||
"published": "2024-03-01T22:15:47.113",
|
"published": "2024-03-01T22:15:47.113",
|
||||||
"lastModified": "2024-11-21T06:35:20.813",
|
"lastModified": "2024-12-12T14:43:36.903",
|
||||||
"vulnStatus": "Awaiting Analysis",
|
"vulnStatus": "Analyzed",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
@ -15,31 +15,120 @@
|
|||||||
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: nvme-loop: corrige la p\u00e9rdida de memoria en nvme_loop_create_ctrl() Al crear el control del bucle en nvme_loop_create_ctrl(), si nvme_init_ctrl() falla, el control del bucle debe liberarse antes de saltar al \"out\" \" etiqueta."
|
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: nvme-loop: corrige la p\u00e9rdida de memoria en nvme_loop_create_ctrl() Al crear el control del bucle en nvme_loop_create_ctrl(), si nvme_init_ctrl() falla, el control del bucle debe liberarse antes de saltar al \"out\" \" etiqueta."
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"metrics": {},
|
"metrics": {
|
||||||
|
"cvssMetricV31": [
|
||||||
|
{
|
||||||
|
"source": "nvd@nist.gov",
|
||||||
|
"type": "Primary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||||||
|
"baseScore": 5.5,
|
||||||
|
"baseSeverity": "MEDIUM",
|
||||||
|
"attackVector": "LOCAL",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "LOW",
|
||||||
|
"userInteraction": "NONE",
|
||||||
|
"scope": "UNCHANGED",
|
||||||
|
"confidentialityImpact": "NONE",
|
||||||
|
"integrityImpact": "NONE",
|
||||||
|
"availabilityImpact": "HIGH"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 1.8,
|
||||||
|
"impactScore": 3.6
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"weaknesses": [
|
||||||
|
{
|
||||||
|
"source": "nvd@nist.gov",
|
||||||
|
"type": "Primary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-401"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"configurations": [
|
||||||
|
{
|
||||||
|
"nodes": [
|
||||||
|
{
|
||||||
|
"operator": "OR",
|
||||||
|
"negate": false,
|
||||||
|
"cpeMatch": [
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||||
|
"versionStartIncluding": "4.8",
|
||||||
|
"versionEndExcluding": "5.10.40",
|
||||||
|
"matchCriteriaId": "F63B848B-094A-4190-B459-A059A6701D88"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||||
|
"versionStartIncluding": "5.11",
|
||||||
|
"versionEndExcluding": "5.12.7",
|
||||||
|
"matchCriteriaId": "E8F2CE30-38B0-4716-B12B-A139B0F9C5C9"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:o:linux:linux_kernel:5.13:rc1:*:*:*:*:*:*",
|
||||||
|
"matchCriteriaId": "0CBAD0FC-C281-4666-AB2F-F8E6E1165DF7"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:o:linux:linux_kernel:5.13:rc2:*:*:*:*:*:*",
|
||||||
|
"matchCriteriaId": "96AC23B2-D46A-49D9-8203-8E1BEDCA8532"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
"references": [
|
"references": [
|
||||||
{
|
{
|
||||||
"url": "https://git.kernel.org/stable/c/03504e3b54cc8118cc26c064e60a0b00c2308708",
|
"url": "https://git.kernel.org/stable/c/03504e3b54cc8118cc26c064e60a0b00c2308708",
|
||||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||||
|
"tags": [
|
||||||
|
"Patch"
|
||||||
|
]
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"url": "https://git.kernel.org/stable/c/551ba08d4b7eb26f75758cdb9f15105b276517ad",
|
"url": "https://git.kernel.org/stable/c/551ba08d4b7eb26f75758cdb9f15105b276517ad",
|
||||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||||
|
"tags": [
|
||||||
|
"Patch"
|
||||||
|
]
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"url": "https://git.kernel.org/stable/c/9c980795ccd77e8abec33dd6fe28dfe1c4083e65",
|
"url": "https://git.kernel.org/stable/c/9c980795ccd77e8abec33dd6fe28dfe1c4083e65",
|
||||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||||
|
"tags": [
|
||||||
|
"Patch"
|
||||||
|
]
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"url": "https://git.kernel.org/stable/c/03504e3b54cc8118cc26c064e60a0b00c2308708",
|
"url": "https://git.kernel.org/stable/c/03504e3b54cc8118cc26c064e60a0b00c2308708",
|
||||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||||
|
"tags": [
|
||||||
|
"Patch"
|
||||||
|
]
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"url": "https://git.kernel.org/stable/c/551ba08d4b7eb26f75758cdb9f15105b276517ad",
|
"url": "https://git.kernel.org/stable/c/551ba08d4b7eb26f75758cdb9f15105b276517ad",
|
||||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||||
|
"tags": [
|
||||||
|
"Patch"
|
||||||
|
]
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"url": "https://git.kernel.org/stable/c/9c980795ccd77e8abec33dd6fe28dfe1c4083e65",
|
"url": "https://git.kernel.org/stable/c/9c980795ccd77e8abec33dd6fe28dfe1c4083e65",
|
||||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||||
|
"tags": [
|
||||||
|
"Patch"
|
||||||
|
]
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
@ -2,8 +2,8 @@
|
|||||||
"id": "CVE-2021-47076",
|
"id": "CVE-2021-47076",
|
||||||
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||||
"published": "2024-03-01T22:15:47.223",
|
"published": "2024-03-01T22:15:47.223",
|
||||||
"lastModified": "2024-11-21T06:35:21.103",
|
"lastModified": "2024-12-12T14:48:50.960",
|
||||||
"vulnStatus": "Awaiting Analysis",
|
"vulnStatus": "Analyzed",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
@ -15,23 +15,99 @@
|
|||||||
"value": "En el kernel de Linux, se resolvi\u00f3 la siguiente vulnerabilidad: RDMA/rxe: devuelve un error de CQE si se proporcion\u00f3 una clave lv\u00e1lida. A RXE le falta la actualizaci\u00f3n del estado de WQE en fallas LOCAL_WRITE. Esto provoc\u00f3 el siguiente p\u00e1nico en el kernel si alguien enviaba una operaci\u00f3n at\u00f3mica con una clave l expl\u00edcitamente incorrecta. [leonro@vm ~]$ mkt test test_atomic_invalid_lkey (tests.test_atomic.AtomicTest) ... ADVERTENCIA: CPU: 5 PID: 263 en drivers/infiniband/sw/rxe/rxe_comp.c:740 rxe_completer+0x1a6d/0x2e30 [rdma_rxe] M\u00f3dulos vinculados en: crc32_generic rdma_rxe ip6_udp_tunnel udp_tunnel rdma_ucm rdma_cm ib_umad ib_ipoib iw_cm ib_cm mlx5_ib ib_uverbs ib_core mlx5_core ptp pps_core CPU: 5 PID: 263 Comm: python3 No contaminado 5.13.0-rc 1+ #2936 Nombre del hardware: PC est\u00e1ndar QEMU (Q35 + ICH9, 2009 ), BIOS rel-1.13.0-0-gf21b5a4aeb02-prebuilt.qemu.org 01/04/2014 RIP: 0010:rxe_completer+0x1a6d/0x2e30 [rdma_rxe] C\u00f3digo: 03 0f 8e 65 0e 00 00 3b 93 10 06 00 0 0 0f 84 82 0a 00 00 4c 89 ff 4c 89 44 24 38 e8 2d 74 a9 e1 4c 8b 44 24 38 e9 1c f5 ff ff <0f> 0b e9 0c e8 ff ff b8 05 00 00 00 41 bf 05 00 0 0 00 e9 ab e7 ff RSP: 0018:ffff8880158af090 EFLAGS: 00010246 RAX: 0000000000000000 RBX: ffff888016a78000 RCX: ffffffffa0cf1652 RDX: 1ffff9200004b442 RSI: 0000000 000000004 RDI: ffffc9000025a210 RBP: dffffc0000000000 R08: 00000000ffffffea R09: ffff88801617740b R10: ffffed1002c2ee81 R11: 0000000000000007 R12: ffff 88800f3b63e8 R13: ffff888016a78008 R14: ffffc9000025a180 R15: 000000000000000c FS: 00007f88b622a740(0000) GS:ffff88806d540000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES : 0000 CR0: 0000000080050033 CR2: 00007f88b5a1fa10 CR3: 000000000d848004 CR4: 0000000000370ea0 DR0: 00000000000000000 DR1: 00000000000000000 DR 2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 Seguimiento de llamadas: rxe_do_task+0x130/0x230 [rdma_rxe] rxe_rcv+0xb11/0x1d f0 [rdma_rxe] rxe_loopback+0x157/0x1e0 [rdma_rxe] rxe_responder+0x5532/0x7620 [rdma_rxe] rxe_do_task+0x130/0x230 [rdma_rxe] rxe_rcv+0x9c8/0x1df0 [rdma_rxe] rxe_loopback+0x157/0x1e0 [rdma_rxe] rxe_requester+0x1efd/0x58c0 [rdma_rxe] rxe_do_task+0x130/0x230 [rdma_rxe] r xe_post_send+0x998/0x1860 [rdma_rxe] ib_uverbs_post_send+0xd5f/0x1220 [ib_uverbs ] ib_uverbs_write+0x847/0xc80 [ib_uverbs] vfs_write+0x1c5/0x840 ksys_write+0x176/0x1d0 do_syscall_64+0x3f/0x80 Entry_SYSCALL_64_after_hwframe+0x44/0xae"
|
"value": "En el kernel de Linux, se resolvi\u00f3 la siguiente vulnerabilidad: RDMA/rxe: devuelve un error de CQE si se proporcion\u00f3 una clave lv\u00e1lida. A RXE le falta la actualizaci\u00f3n del estado de WQE en fallas LOCAL_WRITE. Esto provoc\u00f3 el siguiente p\u00e1nico en el kernel si alguien enviaba una operaci\u00f3n at\u00f3mica con una clave l expl\u00edcitamente incorrecta. [leonro@vm ~]$ mkt test test_atomic_invalid_lkey (tests.test_atomic.AtomicTest) ... ADVERTENCIA: CPU: 5 PID: 263 en drivers/infiniband/sw/rxe/rxe_comp.c:740 rxe_completer+0x1a6d/0x2e30 [rdma_rxe] M\u00f3dulos vinculados en: crc32_generic rdma_rxe ip6_udp_tunnel udp_tunnel rdma_ucm rdma_cm ib_umad ib_ipoib iw_cm ib_cm mlx5_ib ib_uverbs ib_core mlx5_core ptp pps_core CPU: 5 PID: 263 Comm: python3 No contaminado 5.13.0-rc 1+ #2936 Nombre del hardware: PC est\u00e1ndar QEMU (Q35 + ICH9, 2009 ), BIOS rel-1.13.0-0-gf21b5a4aeb02-prebuilt.qemu.org 01/04/2014 RIP: 0010:rxe_completer+0x1a6d/0x2e30 [rdma_rxe] C\u00f3digo: 03 0f 8e 65 0e 00 00 3b 93 10 06 00 0 0 0f 84 82 0a 00 00 4c 89 ff 4c 89 44 24 38 e8 2d 74 a9 e1 4c 8b 44 24 38 e9 1c f5 ff ff <0f> 0b e9 0c e8 ff ff b8 05 00 00 00 41 bf 05 00 0 0 00 e9 ab e7 ff RSP: 0018:ffff8880158af090 EFLAGS: 00010246 RAX: 0000000000000000 RBX: ffff888016a78000 RCX: ffffffffa0cf1652 RDX: 1ffff9200004b442 RSI: 0000000 000000004 RDI: ffffc9000025a210 RBP: dffffc0000000000 R08: 00000000ffffffea R09: ffff88801617740b R10: ffffed1002c2ee81 R11: 0000000000000007 R12: ffff 88800f3b63e8 R13: ffff888016a78008 R14: ffffc9000025a180 R15: 000000000000000c FS: 00007f88b622a740(0000) GS:ffff88806d540000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES : 0000 CR0: 0000000080050033 CR2: 00007f88b5a1fa10 CR3: 000000000d848004 CR4: 0000000000370ea0 DR0: 00000000000000000 DR1: 00000000000000000 DR 2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 Seguimiento de llamadas: rxe_do_task+0x130/0x230 [rdma_rxe] rxe_rcv+0xb11/0x1d f0 [rdma_rxe] rxe_loopback+0x157/0x1e0 [rdma_rxe] rxe_responder+0x5532/0x7620 [rdma_rxe] rxe_do_task+0x130/0x230 [rdma_rxe] rxe_rcv+0x9c8/0x1df0 [rdma_rxe] rxe_loopback+0x157/0x1e0 [rdma_rxe] rxe_requester+0x1efd/0x58c0 [rdma_rxe] rxe_do_task+0x130/0x230 [rdma_rxe] r xe_post_send+0x998/0x1860 [rdma_rxe] ib_uverbs_post_send+0xd5f/0x1220 [ib_uverbs ] ib_uverbs_write+0x847/0xc80 [ib_uverbs] vfs_write+0x1c5/0x840 ksys_write+0x176/0x1d0 do_syscall_64+0x3f/0x80 Entry_SYSCALL_64_after_hwframe+0x44/0xae"
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"metrics": {},
|
"metrics": {
|
||||||
|
"cvssMetricV31": [
|
||||||
|
{
|
||||||
|
"source": "nvd@nist.gov",
|
||||||
|
"type": "Primary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||||||
|
"baseScore": 5.5,
|
||||||
|
"baseSeverity": "MEDIUM",
|
||||||
|
"attackVector": "LOCAL",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "LOW",
|
||||||
|
"userInteraction": "NONE",
|
||||||
|
"scope": "UNCHANGED",
|
||||||
|
"confidentialityImpact": "NONE",
|
||||||
|
"integrityImpact": "NONE",
|
||||||
|
"availabilityImpact": "HIGH"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 1.8,
|
||||||
|
"impactScore": 3.6
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"weaknesses": [
|
||||||
|
{
|
||||||
|
"source": "nvd@nist.gov",
|
||||||
|
"type": "Primary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "NVD-CWE-noinfo"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"configurations": [
|
||||||
|
{
|
||||||
|
"nodes": [
|
||||||
|
{
|
||||||
|
"operator": "OR",
|
||||||
|
"negate": false,
|
||||||
|
"cpeMatch": [
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||||
|
"versionStartIncluding": "4.8",
|
||||||
|
"versionEndExcluding": "5.12.7",
|
||||||
|
"matchCriteriaId": "86AEDEBB-6C6C-4840-B58E-520581A71F2F"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:o:linux:linux_kernel:5.13:rc1:*:*:*:*:*:*",
|
||||||
|
"matchCriteriaId": "0CBAD0FC-C281-4666-AB2F-F8E6E1165DF7"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:o:linux:linux_kernel:5.13:rc2:*:*:*:*:*:*",
|
||||||
|
"matchCriteriaId": "96AC23B2-D46A-49D9-8203-8E1BEDCA8532"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
"references": [
|
"references": [
|
||||||
{
|
{
|
||||||
"url": "https://git.kernel.org/stable/c/abe31d25facdb9109fe2cf69890748295291570c",
|
"url": "https://git.kernel.org/stable/c/abe31d25facdb9109fe2cf69890748295291570c",
|
||||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||||
|
"tags": [
|
||||||
|
"Patch"
|
||||||
|
]
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"url": "https://git.kernel.org/stable/c/dc07628bd2bbc1da768e265192c28ebd301f509d",
|
"url": "https://git.kernel.org/stable/c/dc07628bd2bbc1da768e265192c28ebd301f509d",
|
||||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||||
|
"tags": [
|
||||||
|
"Patch"
|
||||||
|
]
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"url": "https://git.kernel.org/stable/c/abe31d25facdb9109fe2cf69890748295291570c",
|
"url": "https://git.kernel.org/stable/c/abe31d25facdb9109fe2cf69890748295291570c",
|
||||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||||
|
"tags": [
|
||||||
|
"Patch"
|
||||||
|
]
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"url": "https://git.kernel.org/stable/c/dc07628bd2bbc1da768e265192c28ebd301f509d",
|
"url": "https://git.kernel.org/stable/c/dc07628bd2bbc1da768e265192c28ebd301f509d",
|
||||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||||
|
"tags": [
|
||||||
|
"Patch"
|
||||||
|
]
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
@ -2,8 +2,8 @@
|
|||||||
"id": "CVE-2021-47148",
|
"id": "CVE-2021-47148",
|
||||||
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||||
"published": "2024-03-25T09:15:09.150",
|
"published": "2024-03-25T09:15:09.150",
|
||||||
"lastModified": "2024-11-21T06:35:29.710",
|
"lastModified": "2024-12-12T14:35:05.817",
|
||||||
"vulnStatus": "Awaiting Analysis",
|
"vulnStatus": "Analyzed",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
@ -15,23 +15,104 @@
|
|||||||
"value": "En el kernel de Linux se ha resuelto la siguiente vulnerabilidad: octeontx2-pf: corrige un desbordamiento del b\u00fafer en otx2_set_rxfh_context() Esta funci\u00f3n se llama desde ethtool_set_rxfh() y \"*rss_context\" proviene del usuario. Agregue algunas comprobaciones de los l\u00edmites para evitar da\u00f1os en la memoria."
|
"value": "En el kernel de Linux se ha resuelto la siguiente vulnerabilidad: octeontx2-pf: corrige un desbordamiento del b\u00fafer en otx2_set_rxfh_context() Esta funci\u00f3n se llama desde ethtool_set_rxfh() y \"*rss_context\" proviene del usuario. Agregue algunas comprobaciones de los l\u00edmites para evitar da\u00f1os en la memoria."
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"metrics": {},
|
"metrics": {
|
||||||
|
"cvssMetricV31": [
|
||||||
|
{
|
||||||
|
"source": "nvd@nist.gov",
|
||||||
|
"type": "Primary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||||
|
"baseScore": 7.8,
|
||||||
|
"baseSeverity": "HIGH",
|
||||||
|
"attackVector": "LOCAL",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "LOW",
|
||||||
|
"userInteraction": "NONE",
|
||||||
|
"scope": "UNCHANGED",
|
||||||
|
"confidentialityImpact": "HIGH",
|
||||||
|
"integrityImpact": "HIGH",
|
||||||
|
"availabilityImpact": "HIGH"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 1.8,
|
||||||
|
"impactScore": 5.9
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"weaknesses": [
|
||||||
|
{
|
||||||
|
"source": "nvd@nist.gov",
|
||||||
|
"type": "Primary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-787"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"configurations": [
|
||||||
|
{
|
||||||
|
"nodes": [
|
||||||
|
{
|
||||||
|
"operator": "OR",
|
||||||
|
"negate": false,
|
||||||
|
"cpeMatch": [
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||||
|
"versionStartIncluding": "5.12",
|
||||||
|
"versionEndExcluding": "5.12.9",
|
||||||
|
"matchCriteriaId": "3B1CFA77-6B5E-430C-AC49-3B3508F2D903"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:o:linux:linux_kernel:5.13:rc1:*:*:*:*:*:*",
|
||||||
|
"matchCriteriaId": "0CBAD0FC-C281-4666-AB2F-F8E6E1165DF7"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:o:linux:linux_kernel:5.13:rc2:*:*:*:*:*:*",
|
||||||
|
"matchCriteriaId": "96AC23B2-D46A-49D9-8203-8E1BEDCA8532"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:o:linux:linux_kernel:5.13:rc3:*:*:*:*:*:*",
|
||||||
|
"matchCriteriaId": "DA610E30-717C-4700-9F77-A3C9244F3BFD"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
"references": [
|
"references": [
|
||||||
{
|
{
|
||||||
"url": "https://git.kernel.org/stable/c/389146bc6d2bbb20714d06624b74856320ce40f7",
|
"url": "https://git.kernel.org/stable/c/389146bc6d2bbb20714d06624b74856320ce40f7",
|
||||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||||
|
"tags": [
|
||||||
|
"Patch"
|
||||||
|
]
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"url": "https://git.kernel.org/stable/c/e5cc361e21648b75f935f9571d4003aaee480214",
|
"url": "https://git.kernel.org/stable/c/e5cc361e21648b75f935f9571d4003aaee480214",
|
||||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||||
|
"tags": [
|
||||||
|
"Patch"
|
||||||
|
]
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"url": "https://git.kernel.org/stable/c/389146bc6d2bbb20714d06624b74856320ce40f7",
|
"url": "https://git.kernel.org/stable/c/389146bc6d2bbb20714d06624b74856320ce40f7",
|
||||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||||
|
"tags": [
|
||||||
|
"Patch"
|
||||||
|
]
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"url": "https://git.kernel.org/stable/c/e5cc361e21648b75f935f9571d4003aaee480214",
|
"url": "https://git.kernel.org/stable/c/e5cc361e21648b75f935f9571d4003aaee480214",
|
||||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||||
|
"tags": [
|
||||||
|
"Patch"
|
||||||
|
]
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
@ -2,7 +2,7 @@
|
|||||||
"id": "CVE-2023-27946",
|
"id": "CVE-2023-27946",
|
||||||
"sourceIdentifier": "product-security@apple.com",
|
"sourceIdentifier": "product-security@apple.com",
|
||||||
"published": "2023-05-08T20:15:17.990",
|
"published": "2023-05-08T20:15:17.990",
|
||||||
"lastModified": "2024-11-21T07:53:45.527",
|
"lastModified": "2024-12-12T14:26:18.893",
|
||||||
"vulnStatus": "Modified",
|
"vulnStatus": "Modified",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
@ -56,9 +56,9 @@
|
|||||||
"cpeMatch": [
|
"cpeMatch": [
|
||||||
{
|
{
|
||||||
"vulnerable": true,
|
"vulnerable": true,
|
||||||
"criteria": "cpe:2.3:o:apple:ipad_os:*:*:*:*:*:*:*:*",
|
"criteria": "cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*",
|
||||||
"versionEndExcluding": "15.7.4",
|
"versionEndExcluding": "15.7.4",
|
||||||
"matchCriteriaId": "909D85BE-B03C-469D-B7A0-B15B6366EDAC"
|
"matchCriteriaId": "6342B4CB-4D7D-4FBD-8A5E-E3DABDC7770E"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"vulnerable": true,
|
"vulnerable": true,
|
||||||
|
@ -2,7 +2,7 @@
|
|||||||
"id": "CVE-2023-27949",
|
"id": "CVE-2023-27949",
|
||||||
"sourceIdentifier": "product-security@apple.com",
|
"sourceIdentifier": "product-security@apple.com",
|
||||||
"published": "2023-05-08T20:15:18.043",
|
"published": "2023-05-08T20:15:18.043",
|
||||||
"lastModified": "2024-11-21T07:53:45.913",
|
"lastModified": "2024-12-12T14:26:18.893",
|
||||||
"vulnStatus": "Modified",
|
"vulnStatus": "Modified",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
@ -56,9 +56,9 @@
|
|||||||
"cpeMatch": [
|
"cpeMatch": [
|
||||||
{
|
{
|
||||||
"vulnerable": true,
|
"vulnerable": true,
|
||||||
"criteria": "cpe:2.3:o:apple:ipad_os:*:*:*:*:*:*:*:*",
|
"criteria": "cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*",
|
||||||
"versionEndExcluding": "15.7.4",
|
"versionEndExcluding": "15.7.4",
|
||||||
"matchCriteriaId": "909D85BE-B03C-469D-B7A0-B15B6366EDAC"
|
"matchCriteriaId": "6342B4CB-4D7D-4FBD-8A5E-E3DABDC7770E"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"vulnerable": true,
|
"vulnerable": true,
|
||||||
|
@ -2,7 +2,7 @@
|
|||||||
"id": "CVE-2023-27954",
|
"id": "CVE-2023-27954",
|
||||||
"sourceIdentifier": "product-security@apple.com",
|
"sourceIdentifier": "product-security@apple.com",
|
||||||
"published": "2023-05-08T20:15:18.267",
|
"published": "2023-05-08T20:15:18.267",
|
||||||
"lastModified": "2024-11-21T07:53:46.970",
|
"lastModified": "2024-12-12T14:26:18.893",
|
||||||
"vulnStatus": "Modified",
|
"vulnStatus": "Modified",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
@ -62,16 +62,16 @@
|
|||||||
},
|
},
|
||||||
{
|
{
|
||||||
"vulnerable": true,
|
"vulnerable": true,
|
||||||
"criteria": "cpe:2.3:o:apple:ipad_os:*:*:*:*:*:*:*:*",
|
"criteria": "cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*",
|
||||||
"versionEndExcluding": "15.7.4",
|
"versionEndExcluding": "15.7.4",
|
||||||
"matchCriteriaId": "909D85BE-B03C-469D-B7A0-B15B6366EDAC"
|
"matchCriteriaId": "6342B4CB-4D7D-4FBD-8A5E-E3DABDC7770E"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"vulnerable": true,
|
"vulnerable": true,
|
||||||
"criteria": "cpe:2.3:o:apple:ipad_os:*:*:*:*:*:*:*:*",
|
"criteria": "cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*",
|
||||||
"versionStartIncluding": "16.0",
|
"versionStartIncluding": "16.0",
|
||||||
"versionEndExcluding": "16.4",
|
"versionEndExcluding": "16.4",
|
||||||
"matchCriteriaId": "D54C540A-5D01-4710-BBF9-EDD8BBAEE16E"
|
"matchCriteriaId": "79A85DA3-B374-444F-B9A2-7E4F334C26DA"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"vulnerable": true,
|
"vulnerable": true,
|
||||||
|
@ -2,7 +2,7 @@
|
|||||||
"id": "CVE-2023-27955",
|
"id": "CVE-2023-27955",
|
||||||
"sourceIdentifier": "product-security@apple.com",
|
"sourceIdentifier": "product-security@apple.com",
|
||||||
"published": "2023-05-08T20:15:18.317",
|
"published": "2023-05-08T20:15:18.317",
|
||||||
"lastModified": "2024-11-21T07:53:47.247",
|
"lastModified": "2024-12-12T14:26:18.893",
|
||||||
"vulnStatus": "Modified",
|
"vulnStatus": "Modified",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
@ -56,9 +56,9 @@
|
|||||||
"cpeMatch": [
|
"cpeMatch": [
|
||||||
{
|
{
|
||||||
"vulnerable": true,
|
"vulnerable": true,
|
||||||
"criteria": "cpe:2.3:o:apple:ipad_os:*:*:*:*:*:*:*:*",
|
"criteria": "cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*",
|
||||||
"versionEndExcluding": "16.4",
|
"versionEndExcluding": "16.4",
|
||||||
"matchCriteriaId": "1223E832-EAEB-4549-83B5-C77FB7055AD2"
|
"matchCriteriaId": "EE68C5EC-5829-481D-BFF7-0A501018A3CE"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"vulnerable": true,
|
"vulnerable": true,
|
||||||
|
@ -2,7 +2,7 @@
|
|||||||
"id": "CVE-2023-27956",
|
"id": "CVE-2023-27956",
|
||||||
"sourceIdentifier": "product-security@apple.com",
|
"sourceIdentifier": "product-security@apple.com",
|
||||||
"published": "2023-05-08T20:15:18.383",
|
"published": "2023-05-08T20:15:18.383",
|
||||||
"lastModified": "2024-11-21T07:53:47.430",
|
"lastModified": "2024-12-12T14:26:18.893",
|
||||||
"vulnStatus": "Modified",
|
"vulnStatus": "Modified",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
@ -56,16 +56,16 @@
|
|||||||
"cpeMatch": [
|
"cpeMatch": [
|
||||||
{
|
{
|
||||||
"vulnerable": true,
|
"vulnerable": true,
|
||||||
"criteria": "cpe:2.3:o:apple:ipad_os:*:*:*:*:*:*:*:*",
|
"criteria": "cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*",
|
||||||
"versionEndExcluding": "15.7.4",
|
"versionEndExcluding": "15.7.4",
|
||||||
"matchCriteriaId": "909D85BE-B03C-469D-B7A0-B15B6366EDAC"
|
"matchCriteriaId": "6342B4CB-4D7D-4FBD-8A5E-E3DABDC7770E"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"vulnerable": true,
|
"vulnerable": true,
|
||||||
"criteria": "cpe:2.3:o:apple:ipad_os:*:*:*:*:*:*:*:*",
|
"criteria": "cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*",
|
||||||
"versionStartIncluding": "16.0",
|
"versionStartIncluding": "16.0",
|
||||||
"versionEndExcluding": "16.4",
|
"versionEndExcluding": "16.4",
|
||||||
"matchCriteriaId": "D54C540A-5D01-4710-BBF9-EDD8BBAEE16E"
|
"matchCriteriaId": "79A85DA3-B374-444F-B9A2-7E4F334C26DA"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"vulnerable": true,
|
"vulnerable": true,
|
||||||
|
@ -2,7 +2,7 @@
|
|||||||
"id": "CVE-2023-27959",
|
"id": "CVE-2023-27959",
|
||||||
"sourceIdentifier": "product-security@apple.com",
|
"sourceIdentifier": "product-security@apple.com",
|
||||||
"published": "2023-05-08T20:15:18.547",
|
"published": "2023-05-08T20:15:18.547",
|
||||||
"lastModified": "2024-11-21T07:53:47.957",
|
"lastModified": "2024-12-12T14:26:18.893",
|
||||||
"vulnStatus": "Modified",
|
"vulnStatus": "Modified",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
@ -56,9 +56,9 @@
|
|||||||
"cpeMatch": [
|
"cpeMatch": [
|
||||||
{
|
{
|
||||||
"vulnerable": true,
|
"vulnerable": true,
|
||||||
"criteria": "cpe:2.3:o:apple:ipad_os:*:*:*:*:*:*:*:*",
|
"criteria": "cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*",
|
||||||
"versionEndExcluding": "16.4",
|
"versionEndExcluding": "16.4",
|
||||||
"matchCriteriaId": "1223E832-EAEB-4549-83B5-C77FB7055AD2"
|
"matchCriteriaId": "EE68C5EC-5829-481D-BFF7-0A501018A3CE"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"vulnerable": true,
|
"vulnerable": true,
|
||||||
|
@ -2,7 +2,7 @@
|
|||||||
"id": "CVE-2023-27961",
|
"id": "CVE-2023-27961",
|
||||||
"sourceIdentifier": "product-security@apple.com",
|
"sourceIdentifier": "product-security@apple.com",
|
||||||
"published": "2023-05-08T20:15:18.663",
|
"published": "2023-05-08T20:15:18.663",
|
||||||
"lastModified": "2024-11-21T07:53:48.263",
|
"lastModified": "2024-12-12T14:26:18.893",
|
||||||
"vulnStatus": "Modified",
|
"vulnStatus": "Modified",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
@ -56,16 +56,16 @@
|
|||||||
"cpeMatch": [
|
"cpeMatch": [
|
||||||
{
|
{
|
||||||
"vulnerable": true,
|
"vulnerable": true,
|
||||||
"criteria": "cpe:2.3:o:apple:ipad_os:*:*:*:*:*:*:*:*",
|
"criteria": "cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*",
|
||||||
"versionEndExcluding": "15.7.4",
|
"versionEndExcluding": "15.7.4",
|
||||||
"matchCriteriaId": "909D85BE-B03C-469D-B7A0-B15B6366EDAC"
|
"matchCriteriaId": "6342B4CB-4D7D-4FBD-8A5E-E3DABDC7770E"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"vulnerable": true,
|
"vulnerable": true,
|
||||||
"criteria": "cpe:2.3:o:apple:ipad_os:*:*:*:*:*:*:*:*",
|
"criteria": "cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*",
|
||||||
"versionStartIncluding": "16.0",
|
"versionStartIncluding": "16.0",
|
||||||
"versionEndExcluding": "16.4",
|
"versionEndExcluding": "16.4",
|
||||||
"matchCriteriaId": "D54C540A-5D01-4710-BBF9-EDD8BBAEE16E"
|
"matchCriteriaId": "79A85DA3-B374-444F-B9A2-7E4F334C26DA"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"vulnerable": true,
|
"vulnerable": true,
|
||||||
|
@ -2,7 +2,7 @@
|
|||||||
"id": "CVE-2023-27963",
|
"id": "CVE-2023-27963",
|
||||||
"sourceIdentifier": "product-security@apple.com",
|
"sourceIdentifier": "product-security@apple.com",
|
||||||
"published": "2023-05-08T20:15:18.773",
|
"published": "2023-05-08T20:15:18.773",
|
||||||
"lastModified": "2024-11-21T07:53:48.647",
|
"lastModified": "2024-12-12T14:26:18.893",
|
||||||
"vulnStatus": "Modified",
|
"vulnStatus": "Modified",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
@ -56,16 +56,16 @@
|
|||||||
"cpeMatch": [
|
"cpeMatch": [
|
||||||
{
|
{
|
||||||
"vulnerable": true,
|
"vulnerable": true,
|
||||||
"criteria": "cpe:2.3:o:apple:ipad_os:*:*:*:*:*:*:*:*",
|
"criteria": "cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*",
|
||||||
"versionEndExcluding": "15.7.4",
|
"versionEndExcluding": "15.7.4",
|
||||||
"matchCriteriaId": "909D85BE-B03C-469D-B7A0-B15B6366EDAC"
|
"matchCriteriaId": "6342B4CB-4D7D-4FBD-8A5E-E3DABDC7770E"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"vulnerable": true,
|
"vulnerable": true,
|
||||||
"criteria": "cpe:2.3:o:apple:ipad_os:*:*:*:*:*:*:*:*",
|
"criteria": "cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*",
|
||||||
"versionStartIncluding": "16.0",
|
"versionStartIncluding": "16.0",
|
||||||
"versionEndExcluding": "16.4",
|
"versionEndExcluding": "16.4",
|
||||||
"matchCriteriaId": "D54C540A-5D01-4710-BBF9-EDD8BBAEE16E"
|
"matchCriteriaId": "79A85DA3-B374-444F-B9A2-7E4F334C26DA"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"vulnerable": true,
|
"vulnerable": true,
|
||||||
|
@ -2,7 +2,7 @@
|
|||||||
"id": "CVE-2023-27969",
|
"id": "CVE-2023-27969",
|
||||||
"sourceIdentifier": "product-security@apple.com",
|
"sourceIdentifier": "product-security@apple.com",
|
||||||
"published": "2023-05-08T20:15:19.053",
|
"published": "2023-05-08T20:15:19.053",
|
||||||
"lastModified": "2024-11-21T07:53:49.623",
|
"lastModified": "2024-12-12T14:26:18.893",
|
||||||
"vulnStatus": "Modified",
|
"vulnStatus": "Modified",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
@ -56,16 +56,16 @@
|
|||||||
"cpeMatch": [
|
"cpeMatch": [
|
||||||
{
|
{
|
||||||
"vulnerable": true,
|
"vulnerable": true,
|
||||||
"criteria": "cpe:2.3:o:apple:ipad_os:*:*:*:*:*:*:*:*",
|
"criteria": "cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*",
|
||||||
"versionEndExcluding": "15.7.4",
|
"versionEndExcluding": "15.7.4",
|
||||||
"matchCriteriaId": "909D85BE-B03C-469D-B7A0-B15B6366EDAC"
|
"matchCriteriaId": "6342B4CB-4D7D-4FBD-8A5E-E3DABDC7770E"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"vulnerable": true,
|
"vulnerable": true,
|
||||||
"criteria": "cpe:2.3:o:apple:ipad_os:*:*:*:*:*:*:*:*",
|
"criteria": "cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*",
|
||||||
"versionStartIncluding": "16.0",
|
"versionStartIncluding": "16.0",
|
||||||
"versionEndExcluding": "16.4",
|
"versionEndExcluding": "16.4",
|
||||||
"matchCriteriaId": "D54C540A-5D01-4710-BBF9-EDD8BBAEE16E"
|
"matchCriteriaId": "79A85DA3-B374-444F-B9A2-7E4F334C26DA"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"vulnerable": true,
|
"vulnerable": true,
|
||||||
|
@ -2,7 +2,7 @@
|
|||||||
"id": "CVE-2023-27970",
|
"id": "CVE-2023-27970",
|
||||||
"sourceIdentifier": "product-security@apple.com",
|
"sourceIdentifier": "product-security@apple.com",
|
||||||
"published": "2023-05-08T20:15:19.110",
|
"published": "2023-05-08T20:15:19.110",
|
||||||
"lastModified": "2024-11-21T07:53:50.370",
|
"lastModified": "2024-12-12T14:26:18.893",
|
||||||
"vulnStatus": "Modified",
|
"vulnStatus": "Modified",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
@ -56,9 +56,9 @@
|
|||||||
"cpeMatch": [
|
"cpeMatch": [
|
||||||
{
|
{
|
||||||
"vulnerable": true,
|
"vulnerable": true,
|
||||||
"criteria": "cpe:2.3:o:apple:ipad_os:*:*:*:*:*:*:*:*",
|
"criteria": "cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*",
|
||||||
"versionEndExcluding": "16.4",
|
"versionEndExcluding": "16.4",
|
||||||
"matchCriteriaId": "1223E832-EAEB-4549-83B5-C77FB7055AD2"
|
"matchCriteriaId": "EE68C5EC-5829-481D-BFF7-0A501018A3CE"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"vulnerable": true,
|
"vulnerable": true,
|
||||||
|
@ -2,7 +2,7 @@
|
|||||||
"id": "CVE-2023-28178",
|
"id": "CVE-2023-28178",
|
||||||
"sourceIdentifier": "product-security@apple.com",
|
"sourceIdentifier": "product-security@apple.com",
|
||||||
"published": "2023-05-08T20:15:19.163",
|
"published": "2023-05-08T20:15:19.163",
|
||||||
"lastModified": "2024-11-21T07:54:32.720",
|
"lastModified": "2024-12-12T14:26:18.893",
|
||||||
"vulnStatus": "Modified",
|
"vulnStatus": "Modified",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
@ -56,9 +56,9 @@
|
|||||||
"cpeMatch": [
|
"cpeMatch": [
|
||||||
{
|
{
|
||||||
"vulnerable": true,
|
"vulnerable": true,
|
||||||
"criteria": "cpe:2.3:o:apple:ipad_os:*:*:*:*:*:*:*:*",
|
"criteria": "cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*",
|
||||||
"versionEndExcluding": "16.4",
|
"versionEndExcluding": "16.4",
|
||||||
"matchCriteriaId": "1223E832-EAEB-4549-83B5-C77FB7055AD2"
|
"matchCriteriaId": "EE68C5EC-5829-481D-BFF7-0A501018A3CE"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"vulnerable": true,
|
"vulnerable": true,
|
||||||
|
@ -2,7 +2,7 @@
|
|||||||
"id": "CVE-2023-28181",
|
"id": "CVE-2023-28181",
|
||||||
"sourceIdentifier": "product-security@apple.com",
|
"sourceIdentifier": "product-security@apple.com",
|
||||||
"published": "2023-05-08T20:15:19.273",
|
"published": "2023-05-08T20:15:19.273",
|
||||||
"lastModified": "2024-11-21T07:54:33.123",
|
"lastModified": "2024-12-12T14:26:18.893",
|
||||||
"vulnStatus": "Modified",
|
"vulnStatus": "Modified",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
@ -56,9 +56,9 @@
|
|||||||
"cpeMatch": [
|
"cpeMatch": [
|
||||||
{
|
{
|
||||||
"vulnerable": true,
|
"vulnerable": true,
|
||||||
"criteria": "cpe:2.3:o:apple:ipad_os:*:*:*:*:*:*:*:*",
|
"criteria": "cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*",
|
||||||
"versionEndExcluding": "16.4",
|
"versionEndExcluding": "16.4",
|
||||||
"matchCriteriaId": "1223E832-EAEB-4549-83B5-C77FB7055AD2"
|
"matchCriteriaId": "EE68C5EC-5829-481D-BFF7-0A501018A3CE"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"vulnerable": true,
|
"vulnerable": true,
|
||||||
|
@ -2,7 +2,7 @@
|
|||||||
"id": "CVE-2023-28182",
|
"id": "CVE-2023-28182",
|
||||||
"sourceIdentifier": "product-security@apple.com",
|
"sourceIdentifier": "product-security@apple.com",
|
||||||
"published": "2023-05-08T20:15:19.330",
|
"published": "2023-05-08T20:15:19.330",
|
||||||
"lastModified": "2024-11-21T07:54:33.267",
|
"lastModified": "2024-12-12T14:26:18.893",
|
||||||
"vulnStatus": "Modified",
|
"vulnStatus": "Modified",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
@ -56,16 +56,16 @@
|
|||||||
"cpeMatch": [
|
"cpeMatch": [
|
||||||
{
|
{
|
||||||
"vulnerable": true,
|
"vulnerable": true,
|
||||||
"criteria": "cpe:2.3:o:apple:ipad_os:*:*:*:*:*:*:*:*",
|
"criteria": "cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*",
|
||||||
"versionEndExcluding": "15.7.4",
|
"versionEndExcluding": "15.7.4",
|
||||||
"matchCriteriaId": "909D85BE-B03C-469D-B7A0-B15B6366EDAC"
|
"matchCriteriaId": "6342B4CB-4D7D-4FBD-8A5E-E3DABDC7770E"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"vulnerable": true,
|
"vulnerable": true,
|
||||||
"criteria": "cpe:2.3:o:apple:ipad_os:*:*:*:*:*:*:*:*",
|
"criteria": "cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*",
|
||||||
"versionStartIncluding": "16.0",
|
"versionStartIncluding": "16.0",
|
||||||
"versionEndExcluding": "16.4",
|
"versionEndExcluding": "16.4",
|
||||||
"matchCriteriaId": "D54C540A-5D01-4710-BBF9-EDD8BBAEE16E"
|
"matchCriteriaId": "79A85DA3-B374-444F-B9A2-7E4F334C26DA"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"vulnerable": true,
|
"vulnerable": true,
|
||||||
|
@ -2,7 +2,7 @@
|
|||||||
"id": "CVE-2023-28194",
|
"id": "CVE-2023-28194",
|
||||||
"sourceIdentifier": "product-security@apple.com",
|
"sourceIdentifier": "product-security@apple.com",
|
||||||
"published": "2023-05-08T20:15:19.633",
|
"published": "2023-05-08T20:15:19.633",
|
||||||
"lastModified": "2024-11-21T07:54:34.360",
|
"lastModified": "2024-12-12T14:26:18.893",
|
||||||
"vulnStatus": "Modified",
|
"vulnStatus": "Modified",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
@ -56,9 +56,9 @@
|
|||||||
"cpeMatch": [
|
"cpeMatch": [
|
||||||
{
|
{
|
||||||
"vulnerable": true,
|
"vulnerable": true,
|
||||||
"criteria": "cpe:2.3:o:apple:ipad_os:*:*:*:*:*:*:*:*",
|
"criteria": "cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*",
|
||||||
"versionEndExcluding": "16.4",
|
"versionEndExcluding": "16.4",
|
||||||
"matchCriteriaId": "1223E832-EAEB-4549-83B5-C77FB7055AD2"
|
"matchCriteriaId": "EE68C5EC-5829-481D-BFF7-0A501018A3CE"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"vulnerable": true,
|
"vulnerable": true,
|
||||||
|
@ -2,7 +2,7 @@
|
|||||||
"id": "CVE-2023-28201",
|
"id": "CVE-2023-28201",
|
||||||
"sourceIdentifier": "product-security@apple.com",
|
"sourceIdentifier": "product-security@apple.com",
|
||||||
"published": "2023-05-08T20:15:19.747",
|
"published": "2023-05-08T20:15:19.747",
|
||||||
"lastModified": "2024-11-21T07:54:35.273",
|
"lastModified": "2024-12-12T14:26:18.893",
|
||||||
"vulnStatus": "Modified",
|
"vulnStatus": "Modified",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
@ -62,16 +62,16 @@
|
|||||||
},
|
},
|
||||||
{
|
{
|
||||||
"vulnerable": true,
|
"vulnerable": true,
|
||||||
"criteria": "cpe:2.3:o:apple:ipad_os:*:*:*:*:*:*:*:*",
|
"criteria": "cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*",
|
||||||
"versionEndExcluding": "15.7.4",
|
"versionEndExcluding": "15.7.4",
|
||||||
"matchCriteriaId": "909D85BE-B03C-469D-B7A0-B15B6366EDAC"
|
"matchCriteriaId": "6342B4CB-4D7D-4FBD-8A5E-E3DABDC7770E"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"vulnerable": true,
|
"vulnerable": true,
|
||||||
"criteria": "cpe:2.3:o:apple:ipad_os:*:*:*:*:*:*:*:*",
|
"criteria": "cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*",
|
||||||
"versionStartIncluding": "16.0",
|
"versionStartIncluding": "16.0",
|
||||||
"versionEndExcluding": "16.4",
|
"versionEndExcluding": "16.4",
|
||||||
"matchCriteriaId": "D54C540A-5D01-4710-BBF9-EDD8BBAEE16E"
|
"matchCriteriaId": "79A85DA3-B374-444F-B9A2-7E4F334C26DA"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"vulnerable": true,
|
"vulnerable": true,
|
||||||
|
@ -2,7 +2,7 @@
|
|||||||
"id": "CVE-2023-28208",
|
"id": "CVE-2023-28208",
|
||||||
"sourceIdentifier": "product-security@apple.com",
|
"sourceIdentifier": "product-security@apple.com",
|
||||||
"published": "2023-09-06T02:15:08.497",
|
"published": "2023-09-06T02:15:08.497",
|
||||||
"lastModified": "2024-11-21T07:54:36.180",
|
"lastModified": "2024-12-12T14:26:18.893",
|
||||||
"vulnStatus": "Modified",
|
"vulnStatus": "Modified",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
@ -60,9 +60,9 @@
|
|||||||
"cpeMatch": [
|
"cpeMatch": [
|
||||||
{
|
{
|
||||||
"vulnerable": true,
|
"vulnerable": true,
|
||||||
"criteria": "cpe:2.3:o:apple:ipad_os:*:*:*:*:*:*:*:*",
|
"criteria": "cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*",
|
||||||
"versionEndExcluding": "16.3",
|
"versionEndExcluding": "16.3",
|
||||||
"matchCriteriaId": "638F1298-360D-47B5-B3CC-A83E92F967C9"
|
"matchCriteriaId": "4FAC57E1-C456-4770-815E-DDD7A3621DEB"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"vulnerable": true,
|
"vulnerable": true,
|
||||||
|
@ -2,7 +2,7 @@
|
|||||||
"id": "CVE-2023-32425",
|
"id": "CVE-2023-32425",
|
||||||
"sourceIdentifier": "product-security@apple.com",
|
"sourceIdentifier": "product-security@apple.com",
|
||||||
"published": "2023-09-06T02:15:09.177",
|
"published": "2023-09-06T02:15:09.177",
|
||||||
"lastModified": "2024-11-21T08:03:19.813",
|
"lastModified": "2024-12-12T14:26:18.893",
|
||||||
"vulnStatus": "Modified",
|
"vulnStatus": "Modified",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
@ -60,9 +60,9 @@
|
|||||||
"cpeMatch": [
|
"cpeMatch": [
|
||||||
{
|
{
|
||||||
"vulnerable": true,
|
"vulnerable": true,
|
||||||
"criteria": "cpe:2.3:o:apple:ipad_os:*:*:*:*:*:*:*:*",
|
"criteria": "cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*",
|
||||||
"versionEndExcluding": "16.5",
|
"versionEndExcluding": "16.5",
|
||||||
"matchCriteriaId": "6592C7B1-91F3-43B4-9F09-E52898897A00"
|
"matchCriteriaId": "A4021D9E-B688-4FBC-B43A-D3C28FD38E67"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"vulnerable": true,
|
"vulnerable": true,
|
||||||
|
@ -2,7 +2,7 @@
|
|||||||
"id": "CVE-2023-32428",
|
"id": "CVE-2023-32428",
|
||||||
"sourceIdentifier": "product-security@apple.com",
|
"sourceIdentifier": "product-security@apple.com",
|
||||||
"published": "2023-09-06T02:15:09.270",
|
"published": "2023-09-06T02:15:09.270",
|
||||||
"lastModified": "2024-11-21T08:03:20.187",
|
"lastModified": "2024-12-12T14:26:18.893",
|
||||||
"vulnStatus": "Modified",
|
"vulnStatus": "Modified",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
@ -60,9 +60,9 @@
|
|||||||
"cpeMatch": [
|
"cpeMatch": [
|
||||||
{
|
{
|
||||||
"vulnerable": true,
|
"vulnerable": true,
|
||||||
"criteria": "cpe:2.3:o:apple:ipad_os:*:*:*:*:*:*:*:*",
|
"criteria": "cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*",
|
||||||
"versionEndExcluding": "16.5",
|
"versionEndExcluding": "16.5",
|
||||||
"matchCriteriaId": "6592C7B1-91F3-43B4-9F09-E52898897A00"
|
"matchCriteriaId": "A4021D9E-B688-4FBC-B43A-D3C28FD38E67"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"vulnerable": true,
|
"vulnerable": true,
|
||||||
|
@ -2,7 +2,7 @@
|
|||||||
"id": "CVE-2023-32432",
|
"id": "CVE-2023-32432",
|
||||||
"sourceIdentifier": "product-security@apple.com",
|
"sourceIdentifier": "product-security@apple.com",
|
||||||
"published": "2023-09-06T02:15:09.327",
|
"published": "2023-09-06T02:15:09.327",
|
||||||
"lastModified": "2024-11-21T08:03:20.447",
|
"lastModified": "2024-12-12T14:26:18.893",
|
||||||
"vulnStatus": "Modified",
|
"vulnStatus": "Modified",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
@ -60,9 +60,9 @@
|
|||||||
"cpeMatch": [
|
"cpeMatch": [
|
||||||
{
|
{
|
||||||
"vulnerable": true,
|
"vulnerable": true,
|
||||||
"criteria": "cpe:2.3:o:apple:ipad_os:*:*:*:*:*:*:*:*",
|
"criteria": "cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*",
|
||||||
"versionEndExcluding": "16.5",
|
"versionEndExcluding": "16.5",
|
||||||
"matchCriteriaId": "6592C7B1-91F3-43B4-9F09-E52898897A00"
|
"matchCriteriaId": "A4021D9E-B688-4FBC-B43A-D3C28FD38E67"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"vulnerable": true,
|
"vulnerable": true,
|
||||||
|
@ -2,7 +2,7 @@
|
|||||||
"id": "CVE-2023-32438",
|
"id": "CVE-2023-32438",
|
||||||
"sourceIdentifier": "product-security@apple.com",
|
"sourceIdentifier": "product-security@apple.com",
|
||||||
"published": "2023-09-06T02:15:09.383",
|
"published": "2023-09-06T02:15:09.383",
|
||||||
"lastModified": "2024-11-21T08:03:21.223",
|
"lastModified": "2024-12-12T14:26:18.893",
|
||||||
"vulnStatus": "Modified",
|
"vulnStatus": "Modified",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
@ -60,9 +60,9 @@
|
|||||||
"cpeMatch": [
|
"cpeMatch": [
|
||||||
{
|
{
|
||||||
"vulnerable": true,
|
"vulnerable": true,
|
||||||
"criteria": "cpe:2.3:o:apple:ipad_os:*:*:*:*:*:*:*:*",
|
"criteria": "cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*",
|
||||||
"versionEndExcluding": "16.3",
|
"versionEndExcluding": "16.3",
|
||||||
"matchCriteriaId": "638F1298-360D-47B5-B3CC-A83E92F967C9"
|
"matchCriteriaId": "4FAC57E1-C456-4770-815E-DDD7A3621DEB"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"vulnerable": true,
|
"vulnerable": true,
|
||||||
|
@ -2,7 +2,7 @@
|
|||||||
"id": "CVE-2023-34352",
|
"id": "CVE-2023-34352",
|
||||||
"sourceIdentifier": "product-security@apple.com",
|
"sourceIdentifier": "product-security@apple.com",
|
||||||
"published": "2023-09-06T02:15:09.440",
|
"published": "2023-09-06T02:15:09.440",
|
||||||
"lastModified": "2024-11-21T08:07:04.700",
|
"lastModified": "2024-12-12T14:26:18.893",
|
||||||
"vulnStatus": "Modified",
|
"vulnStatus": "Modified",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
@ -60,9 +60,9 @@
|
|||||||
"cpeMatch": [
|
"cpeMatch": [
|
||||||
{
|
{
|
||||||
"vulnerable": true,
|
"vulnerable": true,
|
||||||
"criteria": "cpe:2.3:o:apple:ipad_os:*:*:*:*:*:*:*:*",
|
"criteria": "cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*",
|
||||||
"versionEndExcluding": "16.5",
|
"versionEndExcluding": "16.5",
|
||||||
"matchCriteriaId": "6592C7B1-91F3-43B4-9F09-E52898897A00"
|
"matchCriteriaId": "A4021D9E-B688-4FBC-B43A-D3C28FD38E67"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"vulnerable": true,
|
"vulnerable": true,
|
||||||
|
@ -2,7 +2,7 @@
|
|||||||
"id": "CVE-2023-38136",
|
"id": "CVE-2023-38136",
|
||||||
"sourceIdentifier": "product-security@apple.com",
|
"sourceIdentifier": "product-security@apple.com",
|
||||||
"published": "2023-07-27T01:15:34.487",
|
"published": "2023-07-27T01:15:34.487",
|
||||||
"lastModified": "2024-11-21T08:12:55.960",
|
"lastModified": "2024-12-12T14:26:18.893",
|
||||||
"vulnStatus": "Modified",
|
"vulnStatus": "Modified",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
@ -56,9 +56,9 @@
|
|||||||
"cpeMatch": [
|
"cpeMatch": [
|
||||||
{
|
{
|
||||||
"vulnerable": true,
|
"vulnerable": true,
|
||||||
"criteria": "cpe:2.3:o:apple:ipad_os:*:*:*:*:*:*:*:*",
|
"criteria": "cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*",
|
||||||
"versionEndExcluding": "16.6",
|
"versionEndExcluding": "16.6",
|
||||||
"matchCriteriaId": "E97E4E09-CD8D-427A-82DA-EEFE5010F8F4"
|
"matchCriteriaId": "F362BEC4-90C7-4305-BFF9-645FE6C52DFE"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"vulnerable": true,
|
"vulnerable": true,
|
||||||
|
@ -2,7 +2,7 @@
|
|||||||
"id": "CVE-2023-38261",
|
"id": "CVE-2023-38261",
|
||||||
"sourceIdentifier": "product-security@apple.com",
|
"sourceIdentifier": "product-security@apple.com",
|
||||||
"published": "2023-07-27T01:15:35.170",
|
"published": "2023-07-27T01:15:35.170",
|
||||||
"lastModified": "2024-11-21T08:13:12.347",
|
"lastModified": "2024-12-12T14:26:18.893",
|
||||||
"vulnStatus": "Modified",
|
"vulnStatus": "Modified",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
@ -56,9 +56,9 @@
|
|||||||
"cpeMatch": [
|
"cpeMatch": [
|
||||||
{
|
{
|
||||||
"vulnerable": true,
|
"vulnerable": true,
|
||||||
"criteria": "cpe:2.3:o:apple:ipad_os:*:*:*:*:*:*:*:*",
|
"criteria": "cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*",
|
||||||
"versionEndExcluding": "16.6",
|
"versionEndExcluding": "16.6",
|
||||||
"matchCriteriaId": "E97E4E09-CD8D-427A-82DA-EEFE5010F8F4"
|
"matchCriteriaId": "F362BEC4-90C7-4305-BFF9-645FE6C52DFE"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"vulnerable": true,
|
"vulnerable": true,
|
||||||
|
@ -2,7 +2,7 @@
|
|||||||
"id": "CVE-2023-42942",
|
"id": "CVE-2023-42942",
|
||||||
"sourceIdentifier": "product-security@apple.com",
|
"sourceIdentifier": "product-security@apple.com",
|
||||||
"published": "2024-02-21T07:15:50.963",
|
"published": "2024-02-21T07:15:50.963",
|
||||||
"lastModified": "2024-12-03T20:40:10.397",
|
"lastModified": "2024-12-12T14:26:18.893",
|
||||||
"vulnStatus": "Analyzed",
|
"vulnStatus": "Analyzed",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
@ -86,8 +86,8 @@
|
|||||||
},
|
},
|
||||||
{
|
{
|
||||||
"vulnerable": true,
|
"vulnerable": true,
|
||||||
"criteria": "cpe:2.3:o:apple:ipad_os:17.0:*:*:*:*:*:*:*",
|
"criteria": "cpe:2.3:o:apple:ipados:17.0:*:*:*:*:*:*:*",
|
||||||
"matchCriteriaId": "D7F45FD5-BD2C-41B5-ADCA-D7F99A0FD4A3"
|
"matchCriteriaId": "FD0EE39C-DEC4-475C-8661-5BD76457A39E"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"vulnerable": true,
|
"vulnerable": true,
|
||||||
|
@ -2,7 +2,7 @@
|
|||||||
"id": "CVE-2023-42974",
|
"id": "CVE-2023-42974",
|
||||||
"sourceIdentifier": "product-security@apple.com",
|
"sourceIdentifier": "product-security@apple.com",
|
||||||
"published": "2024-03-28T16:15:08.480",
|
"published": "2024-03-28T16:15:08.480",
|
||||||
"lastModified": "2024-12-09T16:46:58.417",
|
"lastModified": "2024-12-12T14:26:18.893",
|
||||||
"vulnStatus": "Analyzed",
|
"vulnStatus": "Analyzed",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
@ -96,10 +96,10 @@
|
|||||||
},
|
},
|
||||||
{
|
{
|
||||||
"vulnerable": true,
|
"vulnerable": true,
|
||||||
"criteria": "cpe:2.3:o:apple:ipad_os:*:*:*:*:*:*:*:*",
|
"criteria": "cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*",
|
||||||
"versionStartIncluding": "17.0",
|
"versionStartIncluding": "17.0",
|
||||||
"versionEndExcluding": "17.2",
|
"versionEndExcluding": "17.2",
|
||||||
"matchCriteriaId": "33BFD9C2-BD79-47ED-9DCC-71549F874D14"
|
"matchCriteriaId": "D0997B97-8D18-41AC-85DD-3605A5DBCA35"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"vulnerable": true,
|
"vulnerable": true,
|
||||||
|
@ -2,7 +2,7 @@
|
|||||||
"id": "CVE-2023-44254",
|
"id": "CVE-2023-44254",
|
||||||
"sourceIdentifier": "psirt@fortinet.com",
|
"sourceIdentifier": "psirt@fortinet.com",
|
||||||
"published": "2024-09-10T15:15:14.173",
|
"published": "2024-09-10T15:15:14.173",
|
||||||
"lastModified": "2024-09-25T20:17:40.970",
|
"lastModified": "2024-12-12T13:56:07.013",
|
||||||
"vulnStatus": "Analyzed",
|
"vulnStatus": "Analyzed",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
@ -134,10 +134,10 @@
|
|||||||
"cpeMatch": [
|
"cpeMatch": [
|
||||||
{
|
{
|
||||||
"vulnerable": true,
|
"vulnerable": true,
|
||||||
"criteria": "cpe:2.3:a:fortinet:fortianalyzer-bigdata:*:*:*:*:*:*:*:*",
|
"criteria": "cpe:2.3:a:fortinet:fortianalyzer_big_data:*:*:*:*:*:*:*:*",
|
||||||
"versionStartIncluding": "7.2.0",
|
"versionStartIncluding": "7.2.0",
|
||||||
"versionEndIncluding": "7.2.5",
|
"versionEndIncluding": "7.2.5",
|
||||||
"matchCriteriaId": "FE0C2EF7-B4C2-4B1F-8CE1-AD50C319A172"
|
"matchCriteriaId": "BD831BAE-D7FB-411E-A28B-BB77ED814AEA"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -2,7 +2,7 @@
|
|||||||
"id": "CVE-2023-45866",
|
"id": "CVE-2023-45866",
|
||||||
"sourceIdentifier": "cve@mitre.org",
|
"sourceIdentifier": "cve@mitre.org",
|
||||||
"published": "2023-12-08T06:15:45.690",
|
"published": "2023-12-08T06:15:45.690",
|
||||||
"lastModified": "2024-11-21T08:27:31.013",
|
"lastModified": "2024-12-12T14:33:00.640",
|
||||||
"vulnStatus": "Modified",
|
"vulnStatus": "Modified",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
@ -336,9 +336,9 @@
|
|||||||
"cpeMatch": [
|
"cpeMatch": [
|
||||||
{
|
{
|
||||||
"vulnerable": true,
|
"vulnerable": true,
|
||||||
"criteria": "cpe:2.3:o:apple:ipad_os:*:*:*:*:*:*:*:*",
|
"criteria": "cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*",
|
||||||
"versionEndExcluding": "17.2",
|
"versionEndExcluding": "17.2",
|
||||||
"matchCriteriaId": "ED754E44-EDCF-4B0F-B662-E4C2687B4920"
|
"matchCriteriaId": "C4117208-4072-4F4C-AC42-97683B6F8FF5"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"vulnerable": true,
|
"vulnerable": true,
|
||||||
|
@ -2,13 +2,13 @@
|
|||||||
"id": "CVE-2023-49069",
|
"id": "CVE-2023-49069",
|
||||||
"sourceIdentifier": "productcert@siemens.com",
|
"sourceIdentifier": "productcert@siemens.com",
|
||||||
"published": "2024-09-10T10:15:08.947",
|
"published": "2024-09-10T10:15:08.947",
|
||||||
"lastModified": "2024-12-10T14:30:36.767",
|
"lastModified": "2024-12-12T14:15:20.450",
|
||||||
"vulnStatus": "Awaiting Analysis",
|
"vulnStatus": "Awaiting Analysis",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
"lang": "en",
|
"lang": "en",
|
||||||
"value": "A vulnerability has been identified in Mendix Runtime V10 (All versions < V10.17.0 only if the basic authentication mechanism is used by the application), Mendix Runtime V10.12 (All versions < V10.12.7 only if the basic authentication mechanism is used by the application), Mendix Runtime V10.6 (All versions < V10.6.16 only if the basic authentication mechanism is used by the application), Mendix Runtime V8 (All versions < V8.18.32 only if the basic authentication mechanism is used by the application), Mendix Runtime V9 (All versions < V9.24.29 only if the basic authentication mechanism is used by the application). The authentication mechanism of affected applications contains an observable response discrepancy vulnerability when validating usernames. This could allow unauthenticated remote attackers to distinguish between valid and invalid usernames."
|
"value": "A vulnerability has been identified in Mendix Runtime V10 (All versions < V10.17.0 only if the basic authentication mechanism is used by the application), Mendix Runtime V10.12 (All versions < V10.12.7 only if the basic authentication mechanism is used by the application), Mendix Runtime V10.6 (All versions < V10.6.16 only if the basic authentication mechanism is used by the application), Mendix Runtime V8 (All versions < V8.18.33 only if the basic authentication mechanism is used by the application), Mendix Runtime V9 (All versions < V9.24.31 only if the basic authentication mechanism is used by the application). The authentication mechanism of affected applications contains an observable response discrepancy vulnerability when validating usernames. This could allow unauthenticated remote attackers to distinguish between valid and invalid usernames."
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"lang": "es",
|
"lang": "es",
|
||||||
|
68
CVE-2024/CVE-2024-122xx/CVE-2024-12271.json
Normal file
68
CVE-2024/CVE-2024-122xx/CVE-2024-12271.json
Normal file
@ -0,0 +1,68 @@
|
|||||||
|
{
|
||||||
|
"id": "CVE-2024-12271",
|
||||||
|
"sourceIdentifier": "security@wordfence.com",
|
||||||
|
"published": "2024-12-12T13:15:07.570",
|
||||||
|
"lastModified": "2024-12-12T13:15:07.570",
|
||||||
|
"vulnStatus": "Received",
|
||||||
|
"cveTags": [],
|
||||||
|
"descriptions": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "The 360 Javascript Viewer plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the \u2018ref\u2019 parameter in all versions up to, and including, 1.7.29 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with administrator-level access, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. This only affects multi-site installations and installations where unfiltered_html has been disabled."
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"metrics": {
|
||||||
|
"cvssMetricV31": [
|
||||||
|
{
|
||||||
|
"source": "security@wordfence.com",
|
||||||
|
"type": "Primary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:C/C:L/I:L/A:N",
|
||||||
|
"baseScore": 4.4,
|
||||||
|
"baseSeverity": "MEDIUM",
|
||||||
|
"attackVector": "NETWORK",
|
||||||
|
"attackComplexity": "HIGH",
|
||||||
|
"privilegesRequired": "HIGH",
|
||||||
|
"userInteraction": "NONE",
|
||||||
|
"scope": "CHANGED",
|
||||||
|
"confidentialityImpact": "LOW",
|
||||||
|
"integrityImpact": "LOW",
|
||||||
|
"availabilityImpact": "NONE"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 1.3,
|
||||||
|
"impactScore": 2.7
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"weaknesses": [
|
||||||
|
{
|
||||||
|
"source": "security@wordfence.com",
|
||||||
|
"type": "Primary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-79"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://plugins.trac.wordpress.org/browser/360deg-javascript-viewer/trunk/includes/class-jsv-360-parser.php#L129",
|
||||||
|
"source": "security@wordfence.com"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://plugins.trac.wordpress.org/browser/360deg-javascript-viewer/trunk/includes/class-jsv-360-parser.php#L162",
|
||||||
|
"source": "security@wordfence.com"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://plugins.trac.wordpress.org/changeset/3206400/",
|
||||||
|
"source": "security@wordfence.com"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/12b4e363-248f-469a-a958-0b1ec5c6e37f?source=cve",
|
||||||
|
"source": "security@wordfence.com"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
@ -2,8 +2,8 @@
|
|||||||
"id": "CVE-2024-2060",
|
"id": "CVE-2024-2060",
|
||||||
"sourceIdentifier": "cna@vuldb.com",
|
"sourceIdentifier": "cna@vuldb.com",
|
||||||
"published": "2024-03-01T13:15:08.460",
|
"published": "2024-03-01T13:15:08.460",
|
||||||
"lastModified": "2024-11-21T09:08:57.347",
|
"lastModified": "2024-12-12T14:59:34.407",
|
||||||
"vulnStatus": "Awaiting Analysis",
|
"vulnStatus": "Analyzed",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
@ -36,6 +36,26 @@
|
|||||||
},
|
},
|
||||||
"exploitabilityScore": 1.2,
|
"exploitabilityScore": 1.2,
|
||||||
"impactScore": 3.4
|
"impactScore": 3.4
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"source": "nvd@nist.gov",
|
||||||
|
"type": "Primary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
|
||||||
|
"baseScore": 7.2,
|
||||||
|
"baseSeverity": "HIGH",
|
||||||
|
"attackVector": "NETWORK",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "HIGH",
|
||||||
|
"userInteraction": "NONE",
|
||||||
|
"scope": "UNCHANGED",
|
||||||
|
"confidentialityImpact": "HIGH",
|
||||||
|
"integrityImpact": "HIGH",
|
||||||
|
"availabilityImpact": "HIGH"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 1.2,
|
||||||
|
"impactScore": 5.9
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"cvssMetricV2": [
|
"cvssMetricV2": [
|
||||||
@ -76,30 +96,65 @@
|
|||||||
]
|
]
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
|
"configurations": [
|
||||||
|
{
|
||||||
|
"nodes": [
|
||||||
|
{
|
||||||
|
"operator": "OR",
|
||||||
|
"negate": false,
|
||||||
|
"cpeMatch": [
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:a:mayurik:petrol_pump_management:1.0:*:*:*:*:*:*:*",
|
||||||
|
"matchCriteriaId": "A334E610-B489-4A7C-B31A-1132B26FFF0B"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
"references": [
|
"references": [
|
||||||
{
|
{
|
||||||
"url": "https://github.com/skid-nochizplz/skid-nochizplz/blob/main/TrashBin/CVE/SOURCECODESTER%20Petrol%20pump%20management%20software/login_crud.php%20SQL%20Injection.md",
|
"url": "https://github.com/skid-nochizplz/skid-nochizplz/blob/main/TrashBin/CVE/SOURCECODESTER%20Petrol%20pump%20management%20software/login_crud.php%20SQL%20Injection.md",
|
||||||
"source": "cna@vuldb.com"
|
"source": "cna@vuldb.com",
|
||||||
|
"tags": [
|
||||||
|
"Broken Link"
|
||||||
|
]
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"url": "https://vuldb.com/?ctiid.255375",
|
"url": "https://vuldb.com/?ctiid.255375",
|
||||||
"source": "cna@vuldb.com"
|
"source": "cna@vuldb.com",
|
||||||
|
"tags": [
|
||||||
|
"Permissions Required"
|
||||||
|
]
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"url": "https://vuldb.com/?id.255375",
|
"url": "https://vuldb.com/?id.255375",
|
||||||
"source": "cna@vuldb.com"
|
"source": "cna@vuldb.com",
|
||||||
|
"tags": [
|
||||||
|
"Permissions Required"
|
||||||
|
]
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"url": "https://github.com/skid-nochizplz/skid-nochizplz/blob/main/TrashBin/CVE/SOURCECODESTER%20Petrol%20pump%20management%20software/login_crud.php%20SQL%20Injection.md",
|
"url": "https://github.com/skid-nochizplz/skid-nochizplz/blob/main/TrashBin/CVE/SOURCECODESTER%20Petrol%20pump%20management%20software/login_crud.php%20SQL%20Injection.md",
|
||||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||||
|
"tags": [
|
||||||
|
"Broken Link"
|
||||||
|
]
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"url": "https://vuldb.com/?ctiid.255375",
|
"url": "https://vuldb.com/?ctiid.255375",
|
||||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||||
|
"tags": [
|
||||||
|
"Permissions Required"
|
||||||
|
]
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"url": "https://vuldb.com/?id.255375",
|
"url": "https://vuldb.com/?id.255375",
|
||||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||||
|
"tags": [
|
||||||
|
"Permissions Required"
|
||||||
|
]
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
@ -2,8 +2,8 @@
|
|||||||
"id": "CVE-2024-2061",
|
"id": "CVE-2024-2061",
|
||||||
"sourceIdentifier": "cna@vuldb.com",
|
"sourceIdentifier": "cna@vuldb.com",
|
||||||
"published": "2024-03-01T13:15:08.670",
|
"published": "2024-03-01T13:15:08.670",
|
||||||
"lastModified": "2024-11-21T09:08:57.477",
|
"lastModified": "2024-12-12T14:59:46.863",
|
||||||
"vulnStatus": "Awaiting Analysis",
|
"vulnStatus": "Analyzed",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
@ -36,6 +36,26 @@
|
|||||||
},
|
},
|
||||||
"exploitabilityScore": 1.2,
|
"exploitabilityScore": 1.2,
|
||||||
"impactScore": 3.4
|
"impactScore": 3.4
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"source": "nvd@nist.gov",
|
||||||
|
"type": "Primary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
|
||||||
|
"baseScore": 7.2,
|
||||||
|
"baseSeverity": "HIGH",
|
||||||
|
"attackVector": "NETWORK",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "HIGH",
|
||||||
|
"userInteraction": "NONE",
|
||||||
|
"scope": "UNCHANGED",
|
||||||
|
"confidentialityImpact": "HIGH",
|
||||||
|
"integrityImpact": "HIGH",
|
||||||
|
"availabilityImpact": "HIGH"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 1.2,
|
||||||
|
"impactScore": 5.9
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"cvssMetricV2": [
|
"cvssMetricV2": [
|
||||||
@ -76,30 +96,65 @@
|
|||||||
]
|
]
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
|
"configurations": [
|
||||||
|
{
|
||||||
|
"nodes": [
|
||||||
|
{
|
||||||
|
"operator": "OR",
|
||||||
|
"negate": false,
|
||||||
|
"cpeMatch": [
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:a:mayurik:petrol_pump_management:1.0:*:*:*:*:*:*:*",
|
||||||
|
"matchCriteriaId": "A334E610-B489-4A7C-B31A-1132B26FFF0B"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
"references": [
|
"references": [
|
||||||
{
|
{
|
||||||
"url": "https://github.com/skid-nochizplz/skid-nochizplz/blob/main/TrashBin/CVE/SOURCECODESTER%20Petrol%20pump%20management%20software/edit_supplier.php%20SQL%20Injection.md",
|
"url": "https://github.com/skid-nochizplz/skid-nochizplz/blob/main/TrashBin/CVE/SOURCECODESTER%20Petrol%20pump%20management%20software/edit_supplier.php%20SQL%20Injection.md",
|
||||||
"source": "cna@vuldb.com"
|
"source": "cna@vuldb.com",
|
||||||
|
"tags": [
|
||||||
|
"Broken Link"
|
||||||
|
]
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"url": "https://vuldb.com/?ctiid.255376",
|
"url": "https://vuldb.com/?ctiid.255376",
|
||||||
"source": "cna@vuldb.com"
|
"source": "cna@vuldb.com",
|
||||||
|
"tags": [
|
||||||
|
"Third Party Advisory"
|
||||||
|
]
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"url": "https://vuldb.com/?id.255376",
|
"url": "https://vuldb.com/?id.255376",
|
||||||
"source": "cna@vuldb.com"
|
"source": "cna@vuldb.com",
|
||||||
|
"tags": [
|
||||||
|
"Third Party Advisory"
|
||||||
|
]
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"url": "https://github.com/skid-nochizplz/skid-nochizplz/blob/main/TrashBin/CVE/SOURCECODESTER%20Petrol%20pump%20management%20software/edit_supplier.php%20SQL%20Injection.md",
|
"url": "https://github.com/skid-nochizplz/skid-nochizplz/blob/main/TrashBin/CVE/SOURCECODESTER%20Petrol%20pump%20management%20software/edit_supplier.php%20SQL%20Injection.md",
|
||||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||||
|
"tags": [
|
||||||
|
"Broken Link"
|
||||||
|
]
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"url": "https://vuldb.com/?ctiid.255376",
|
"url": "https://vuldb.com/?ctiid.255376",
|
||||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||||
|
"tags": [
|
||||||
|
"Third Party Advisory"
|
||||||
|
]
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"url": "https://vuldb.com/?id.255376",
|
"url": "https://vuldb.com/?id.255376",
|
||||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||||
|
"tags": [
|
||||||
|
"Third Party Advisory"
|
||||||
|
]
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
@ -2,8 +2,8 @@
|
|||||||
"id": "CVE-2024-2062",
|
"id": "CVE-2024-2062",
|
||||||
"sourceIdentifier": "cna@vuldb.com",
|
"sourceIdentifier": "cna@vuldb.com",
|
||||||
"published": "2024-03-01T13:15:08.913",
|
"published": "2024-03-01T13:15:08.913",
|
||||||
"lastModified": "2024-11-21T09:08:57.603",
|
"lastModified": "2024-12-12T14:51:50.387",
|
||||||
"vulnStatus": "Awaiting Analysis",
|
"vulnStatus": "Analyzed",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
@ -36,6 +36,26 @@
|
|||||||
},
|
},
|
||||||
"exploitabilityScore": 1.2,
|
"exploitabilityScore": 1.2,
|
||||||
"impactScore": 3.4
|
"impactScore": 3.4
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"source": "nvd@nist.gov",
|
||||||
|
"type": "Primary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
|
||||||
|
"baseScore": 7.2,
|
||||||
|
"baseSeverity": "HIGH",
|
||||||
|
"attackVector": "NETWORK",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "HIGH",
|
||||||
|
"userInteraction": "NONE",
|
||||||
|
"scope": "UNCHANGED",
|
||||||
|
"confidentialityImpact": "HIGH",
|
||||||
|
"integrityImpact": "HIGH",
|
||||||
|
"availabilityImpact": "HIGH"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 1.2,
|
||||||
|
"impactScore": 5.9
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"cvssMetricV2": [
|
"cvssMetricV2": [
|
||||||
@ -76,30 +96,65 @@
|
|||||||
]
|
]
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
|
"configurations": [
|
||||||
|
{
|
||||||
|
"nodes": [
|
||||||
|
{
|
||||||
|
"operator": "OR",
|
||||||
|
"negate": false,
|
||||||
|
"cpeMatch": [
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:a:mayurik:petrol_pump_management:1.0:*:*:*:*:*:*:*",
|
||||||
|
"matchCriteriaId": "A334E610-B489-4A7C-B31A-1132B26FFF0B"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
"references": [
|
"references": [
|
||||||
{
|
{
|
||||||
"url": "https://github.com/skid-nochizplz/skid-nochizplz/blob/main/TrashBin/CVE/SOURCECODESTER%20Petrol%20pump%20management%20software/edit_categories.php%20SQL%20Injection.md",
|
"url": "https://github.com/skid-nochizplz/skid-nochizplz/blob/main/TrashBin/CVE/SOURCECODESTER%20Petrol%20pump%20management%20software/edit_categories.php%20SQL%20Injection.md",
|
||||||
"source": "cna@vuldb.com"
|
"source": "cna@vuldb.com",
|
||||||
|
"tags": [
|
||||||
|
"Broken Link"
|
||||||
|
]
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"url": "https://vuldb.com/?ctiid.255377",
|
"url": "https://vuldb.com/?ctiid.255377",
|
||||||
"source": "cna@vuldb.com"
|
"source": "cna@vuldb.com",
|
||||||
|
"tags": [
|
||||||
|
"Third Party Advisory"
|
||||||
|
]
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"url": "https://vuldb.com/?id.255377",
|
"url": "https://vuldb.com/?id.255377",
|
||||||
"source": "cna@vuldb.com"
|
"source": "cna@vuldb.com",
|
||||||
|
"tags": [
|
||||||
|
"Third Party Advisory"
|
||||||
|
]
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"url": "https://github.com/skid-nochizplz/skid-nochizplz/blob/main/TrashBin/CVE/SOURCECODESTER%20Petrol%20pump%20management%20software/edit_categories.php%20SQL%20Injection.md",
|
"url": "https://github.com/skid-nochizplz/skid-nochizplz/blob/main/TrashBin/CVE/SOURCECODESTER%20Petrol%20pump%20management%20software/edit_categories.php%20SQL%20Injection.md",
|
||||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||||
|
"tags": [
|
||||||
|
"Broken Link"
|
||||||
|
]
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"url": "https://vuldb.com/?ctiid.255377",
|
"url": "https://vuldb.com/?ctiid.255377",
|
||||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||||
|
"tags": [
|
||||||
|
"Third Party Advisory"
|
||||||
|
]
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"url": "https://vuldb.com/?id.255377",
|
"url": "https://vuldb.com/?id.255377",
|
||||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||||
|
"tags": [
|
||||||
|
"Third Party Advisory"
|
||||||
|
]
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
@ -2,8 +2,8 @@
|
|||||||
"id": "CVE-2024-2063",
|
"id": "CVE-2024-2063",
|
||||||
"sourceIdentifier": "cna@vuldb.com",
|
"sourceIdentifier": "cna@vuldb.com",
|
||||||
"published": "2024-03-01T13:15:09.130",
|
"published": "2024-03-01T13:15:09.130",
|
||||||
"lastModified": "2024-11-21T09:08:57.740",
|
"lastModified": "2024-12-12T14:52:44.657",
|
||||||
"vulnStatus": "Awaiting Analysis",
|
"vulnStatus": "Analyzed",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
@ -36,6 +36,26 @@
|
|||||||
},
|
},
|
||||||
"exploitabilityScore": 0.9,
|
"exploitabilityScore": 0.9,
|
||||||
"impactScore": 1.4
|
"impactScore": 1.4
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"source": "nvd@nist.gov",
|
||||||
|
"type": "Primary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N",
|
||||||
|
"baseScore": 4.8,
|
||||||
|
"baseSeverity": "MEDIUM",
|
||||||
|
"attackVector": "NETWORK",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "HIGH",
|
||||||
|
"userInteraction": "REQUIRED",
|
||||||
|
"scope": "CHANGED",
|
||||||
|
"confidentialityImpact": "LOW",
|
||||||
|
"integrityImpact": "LOW",
|
||||||
|
"availabilityImpact": "NONE"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 1.7,
|
||||||
|
"impactScore": 2.7
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"cvssMetricV2": [
|
"cvssMetricV2": [
|
||||||
@ -76,30 +96,65 @@
|
|||||||
]
|
]
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
|
"configurations": [
|
||||||
|
{
|
||||||
|
"nodes": [
|
||||||
|
{
|
||||||
|
"operator": "OR",
|
||||||
|
"negate": false,
|
||||||
|
"cpeMatch": [
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:a:mayurik:petrol_pump_management:1.0:*:*:*:*:*:*:*",
|
||||||
|
"matchCriteriaId": "A334E610-B489-4A7C-B31A-1132B26FFF0B"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
"references": [
|
"references": [
|
||||||
{
|
{
|
||||||
"url": "https://github.com/skid-nochizplz/skid-nochizplz/blob/main/TrashBin/CVE/SOURCECODESTER%20Petrol%20pump%20management%20software/profile_crud.php%20Unauthenticated%20STORED%20XSS.md",
|
"url": "https://github.com/skid-nochizplz/skid-nochizplz/blob/main/TrashBin/CVE/SOURCECODESTER%20Petrol%20pump%20management%20software/profile_crud.php%20Unauthenticated%20STORED%20XSS.md",
|
||||||
"source": "cna@vuldb.com"
|
"source": "cna@vuldb.com",
|
||||||
|
"tags": [
|
||||||
|
"Broken Link"
|
||||||
|
]
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"url": "https://vuldb.com/?ctiid.255378",
|
"url": "https://vuldb.com/?ctiid.255378",
|
||||||
"source": "cna@vuldb.com"
|
"source": "cna@vuldb.com",
|
||||||
|
"tags": [
|
||||||
|
"Third Party Advisory"
|
||||||
|
]
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"url": "https://vuldb.com/?id.255378",
|
"url": "https://vuldb.com/?id.255378",
|
||||||
"source": "cna@vuldb.com"
|
"source": "cna@vuldb.com",
|
||||||
|
"tags": [
|
||||||
|
"Third Party Advisory"
|
||||||
|
]
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"url": "https://github.com/skid-nochizplz/skid-nochizplz/blob/main/TrashBin/CVE/SOURCECODESTER%20Petrol%20pump%20management%20software/profile_crud.php%20Unauthenticated%20STORED%20XSS.md",
|
"url": "https://github.com/skid-nochizplz/skid-nochizplz/blob/main/TrashBin/CVE/SOURCECODESTER%20Petrol%20pump%20management%20software/profile_crud.php%20Unauthenticated%20STORED%20XSS.md",
|
||||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||||
|
"tags": [
|
||||||
|
"Broken Link"
|
||||||
|
]
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"url": "https://vuldb.com/?ctiid.255378",
|
"url": "https://vuldb.com/?ctiid.255378",
|
||||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||||
|
"tags": [
|
||||||
|
"Third Party Advisory"
|
||||||
|
]
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"url": "https://vuldb.com/?id.255378",
|
"url": "https://vuldb.com/?id.255378",
|
||||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||||
|
"tags": [
|
||||||
|
"Third Party Advisory"
|
||||||
|
]
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
@ -2,8 +2,8 @@
|
|||||||
"id": "CVE-2024-2064",
|
"id": "CVE-2024-2064",
|
||||||
"sourceIdentifier": "cna@vuldb.com",
|
"sourceIdentifier": "cna@vuldb.com",
|
||||||
"published": "2024-03-01T14:15:54.350",
|
"published": "2024-03-01T14:15:54.350",
|
||||||
"lastModified": "2024-11-21T09:08:57.877",
|
"lastModified": "2024-12-12T14:55:04.297",
|
||||||
"vulnStatus": "Awaiting Analysis",
|
"vulnStatus": "Analyzed",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
@ -36,6 +36,26 @@
|
|||||||
},
|
},
|
||||||
"exploitabilityScore": 2.8,
|
"exploitabilityScore": 2.8,
|
||||||
"impactScore": 1.4
|
"impactScore": 1.4
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"source": "nvd@nist.gov",
|
||||||
|
"type": "Primary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N",
|
||||||
|
"baseScore": 4.3,
|
||||||
|
"baseSeverity": "MEDIUM",
|
||||||
|
"attackVector": "NETWORK",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "LOW",
|
||||||
|
"userInteraction": "NONE",
|
||||||
|
"scope": "UNCHANGED",
|
||||||
|
"confidentialityImpact": "NONE",
|
||||||
|
"integrityImpact": "LOW",
|
||||||
|
"availabilityImpact": "NONE"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 2.8,
|
||||||
|
"impactScore": 1.4
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"cvssMetricV2": [
|
"cvssMetricV2": [
|
||||||
@ -76,30 +96,67 @@
|
|||||||
]
|
]
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
|
"configurations": [
|
||||||
|
{
|
||||||
|
"nodes": [
|
||||||
|
{
|
||||||
|
"operator": "OR",
|
||||||
|
"negate": false,
|
||||||
|
"cpeMatch": [
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:a:rahman:selectcours:1.0:*:*:*:*:*:*:*",
|
||||||
|
"matchCriteriaId": "C7A3706D-EE30-4FC6-AFD3-499561D5650F"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
"references": [
|
"references": [
|
||||||
{
|
{
|
||||||
"url": "https://github.com/Andriesces/SelectCours-_Sever-side-Template-injection/blob/main/README.md",
|
"url": "https://github.com/Andriesces/SelectCours-_Sever-side-Template-injection/blob/main/README.md",
|
||||||
"source": "cna@vuldb.com"
|
"source": "cna@vuldb.com",
|
||||||
|
"tags": [
|
||||||
|
"Exploit",
|
||||||
|
"Third Party Advisory"
|
||||||
|
]
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"url": "https://vuldb.com/?ctiid.255379",
|
"url": "https://vuldb.com/?ctiid.255379",
|
||||||
"source": "cna@vuldb.com"
|
"source": "cna@vuldb.com",
|
||||||
|
"tags": [
|
||||||
|
"Permissions Required"
|
||||||
|
]
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"url": "https://vuldb.com/?id.255379",
|
"url": "https://vuldb.com/?id.255379",
|
||||||
"source": "cna@vuldb.com"
|
"source": "cna@vuldb.com",
|
||||||
|
"tags": [
|
||||||
|
"Permissions Required"
|
||||||
|
]
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"url": "https://github.com/Andriesces/SelectCours-_Sever-side-Template-injection/blob/main/README.md",
|
"url": "https://github.com/Andriesces/SelectCours-_Sever-side-Template-injection/blob/main/README.md",
|
||||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||||
|
"tags": [
|
||||||
|
"Exploit",
|
||||||
|
"Third Party Advisory"
|
||||||
|
]
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"url": "https://vuldb.com/?ctiid.255379",
|
"url": "https://vuldb.com/?ctiid.255379",
|
||||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||||
|
"tags": [
|
||||||
|
"Permissions Required"
|
||||||
|
]
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"url": "https://vuldb.com/?id.255379",
|
"url": "https://vuldb.com/?id.255379",
|
||||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||||
|
"tags": [
|
||||||
|
"Permissions Required"
|
||||||
|
]
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
@ -2,7 +2,7 @@
|
|||||||
"id": "CVE-2024-23201",
|
"id": "CVE-2024-23201",
|
||||||
"sourceIdentifier": "product-security@apple.com",
|
"sourceIdentifier": "product-security@apple.com",
|
||||||
"published": "2024-03-08T02:15:47.343",
|
"published": "2024-03-08T02:15:47.343",
|
||||||
"lastModified": "2024-12-05T16:55:37.627",
|
"lastModified": "2024-12-12T14:33:00.640",
|
||||||
"vulnStatus": "Analyzed",
|
"vulnStatus": "Analyzed",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
@ -90,9 +90,9 @@
|
|||||||
"cpeMatch": [
|
"cpeMatch": [
|
||||||
{
|
{
|
||||||
"vulnerable": true,
|
"vulnerable": true,
|
||||||
"criteria": "cpe:2.3:o:apple:ipad_os:*:*:*:*:*:*:*:*",
|
"criteria": "cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*",
|
||||||
"versionEndExcluding": "17.3",
|
"versionEndExcluding": "17.3",
|
||||||
"matchCriteriaId": "67189624-9996-4612-878A-B661BF9BC116"
|
"matchCriteriaId": "93A0FBA9-3FF2-483E-8669-E2C196B3A444"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"vulnerable": true,
|
"vulnerable": true,
|
||||||
|
@ -2,7 +2,7 @@
|
|||||||
"id": "CVE-2024-23228",
|
"id": "CVE-2024-23228",
|
||||||
"sourceIdentifier": "product-security@apple.com",
|
"sourceIdentifier": "product-security@apple.com",
|
||||||
"published": "2024-04-24T17:15:47.073",
|
"published": "2024-04-24T17:15:47.073",
|
||||||
"lastModified": "2024-12-10T18:03:26.043",
|
"lastModified": "2024-12-12T14:33:00.640",
|
||||||
"vulnStatus": "Analyzed",
|
"vulnStatus": "Analyzed",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
@ -90,9 +90,9 @@
|
|||||||
"cpeMatch": [
|
"cpeMatch": [
|
||||||
{
|
{
|
||||||
"vulnerable": true,
|
"vulnerable": true,
|
||||||
"criteria": "cpe:2.3:o:apple:ipad_os:*:*:*:*:*:*:*:*",
|
"criteria": "cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*",
|
||||||
"versionEndExcluding": "17.3",
|
"versionEndExcluding": "17.3",
|
||||||
"matchCriteriaId": "67189624-9996-4612-878A-B661BF9BC116"
|
"matchCriteriaId": "93A0FBA9-3FF2-483E-8669-E2C196B3A444"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"vulnerable": true,
|
"vulnerable": true,
|
||||||
|
@ -2,7 +2,7 @@
|
|||||||
"id": "CVE-2024-23271",
|
"id": "CVE-2024-23271",
|
||||||
"sourceIdentifier": "product-security@apple.com",
|
"sourceIdentifier": "product-security@apple.com",
|
||||||
"published": "2024-04-24T17:15:47.127",
|
"published": "2024-04-24T17:15:47.127",
|
||||||
"lastModified": "2024-12-10T17:59:41.370",
|
"lastModified": "2024-12-12T14:33:00.640",
|
||||||
"vulnStatus": "Analyzed",
|
"vulnStatus": "Analyzed",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
@ -96,9 +96,9 @@
|
|||||||
},
|
},
|
||||||
{
|
{
|
||||||
"vulnerable": true,
|
"vulnerable": true,
|
||||||
"criteria": "cpe:2.3:o:apple:ipad_os:*:*:*:*:*:*:*:*",
|
"criteria": "cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*",
|
||||||
"versionEndExcluding": "17.3",
|
"versionEndExcluding": "17.3",
|
||||||
"matchCriteriaId": "67189624-9996-4612-878A-B661BF9BC116"
|
"matchCriteriaId": "93A0FBA9-3FF2-483E-8669-E2C196B3A444"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"vulnerable": true,
|
"vulnerable": true,
|
||||||
|
@ -2,7 +2,7 @@
|
|||||||
"id": "CVE-2024-27791",
|
"id": "CVE-2024-27791",
|
||||||
"sourceIdentifier": "product-security@apple.com",
|
"sourceIdentifier": "product-security@apple.com",
|
||||||
"published": "2024-04-24T17:15:47.177",
|
"published": "2024-04-24T17:15:47.177",
|
||||||
"lastModified": "2024-12-10T17:58:55.290",
|
"lastModified": "2024-12-12T14:33:00.640",
|
||||||
"vulnStatus": "Analyzed",
|
"vulnStatus": "Analyzed",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
@ -90,16 +90,16 @@
|
|||||||
"cpeMatch": [
|
"cpeMatch": [
|
||||||
{
|
{
|
||||||
"vulnerable": true,
|
"vulnerable": true,
|
||||||
"criteria": "cpe:2.3:o:apple:ipad_os:*:*:*:*:*:*:*:*",
|
"criteria": "cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*",
|
||||||
"versionEndExcluding": "16.7.5",
|
"versionEndExcluding": "16.7.5",
|
||||||
"matchCriteriaId": "5D58F941-47EA-42F3-B7F8-4612A29B9311"
|
"matchCriteriaId": "52830EA8-817D-47D3-9A0E-2456C2D59301"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"vulnerable": true,
|
"vulnerable": true,
|
||||||
"criteria": "cpe:2.3:o:apple:ipad_os:*:*:*:*:*:*:*:*",
|
"criteria": "cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*",
|
||||||
"versionStartIncluding": "17.0",
|
"versionStartIncluding": "17.0",
|
||||||
"versionEndExcluding": "17.3",
|
"versionEndExcluding": "17.3",
|
||||||
"matchCriteriaId": "296B559E-E3E5-46F5-9FD7-3B371E7C0B3B"
|
"matchCriteriaId": "7DFDDBEC-015C-4AC6-A2B8-387839CEDCCE"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"vulnerable": true,
|
"vulnerable": true,
|
||||||
|
@ -2,7 +2,7 @@
|
|||||||
"id": "CVE-2024-27804",
|
"id": "CVE-2024-27804",
|
||||||
"sourceIdentifier": "product-security@apple.com",
|
"sourceIdentifier": "product-security@apple.com",
|
||||||
"published": "2024-05-14T15:13:04.033",
|
"published": "2024-05-14T15:13:04.033",
|
||||||
"lastModified": "2024-12-09T19:25:03.827",
|
"lastModified": "2024-12-12T14:33:00.640",
|
||||||
"vulnStatus": "Analyzed",
|
"vulnStatus": "Analyzed",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
@ -90,9 +90,9 @@
|
|||||||
"cpeMatch": [
|
"cpeMatch": [
|
||||||
{
|
{
|
||||||
"vulnerable": true,
|
"vulnerable": true,
|
||||||
"criteria": "cpe:2.3:o:apple:ipad_os:*:*:*:*:*:*:*:*",
|
"criteria": "cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*",
|
||||||
"versionEndExcluding": "17.5",
|
"versionEndExcluding": "17.5",
|
||||||
"matchCriteriaId": "68CC48DA-8DB7-4042-8E07-0FE2B822DA1E"
|
"matchCriteriaId": "E7F2E11C-4A7D-4E71-BFAA-396B0549F649"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"vulnerable": true,
|
"vulnerable": true,
|
||||||
|
@ -2,7 +2,7 @@
|
|||||||
"id": "CVE-2024-27810",
|
"id": "CVE-2024-27810",
|
||||||
"sourceIdentifier": "product-security@apple.com",
|
"sourceIdentifier": "product-security@apple.com",
|
||||||
"published": "2024-05-14T15:13:04.267",
|
"published": "2024-05-14T15:13:04.267",
|
||||||
"lastModified": "2024-12-09T19:14:08.850",
|
"lastModified": "2024-12-12T14:33:00.640",
|
||||||
"vulnStatus": "Analyzed",
|
"vulnStatus": "Analyzed",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
@ -90,9 +90,9 @@
|
|||||||
"cpeMatch": [
|
"cpeMatch": [
|
||||||
{
|
{
|
||||||
"vulnerable": true,
|
"vulnerable": true,
|
||||||
"criteria": "cpe:2.3:o:apple:ipad_os:*:*:*:*:*:*:*:*",
|
"criteria": "cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*",
|
||||||
"versionEndExcluding": "17.5",
|
"versionEndExcluding": "17.5",
|
||||||
"matchCriteriaId": "68CC48DA-8DB7-4042-8E07-0FE2B822DA1E"
|
"matchCriteriaId": "E7F2E11C-4A7D-4E71-BFAA-396B0549F649"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"vulnerable": true,
|
"vulnerable": true,
|
||||||
|
@ -2,7 +2,7 @@
|
|||||||
"id": "CVE-2024-27816",
|
"id": "CVE-2024-27816",
|
||||||
"sourceIdentifier": "product-security@apple.com",
|
"sourceIdentifier": "product-security@apple.com",
|
||||||
"published": "2024-05-14T15:13:04.823",
|
"published": "2024-05-14T15:13:04.823",
|
||||||
"lastModified": "2024-12-09T18:59:05.477",
|
"lastModified": "2024-12-12T14:33:00.640",
|
||||||
"vulnStatus": "Analyzed",
|
"vulnStatus": "Analyzed",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
@ -80,9 +80,9 @@
|
|||||||
"cpeMatch": [
|
"cpeMatch": [
|
||||||
{
|
{
|
||||||
"vulnerable": true,
|
"vulnerable": true,
|
||||||
"criteria": "cpe:2.3:o:apple:ipad_os:*:*:*:*:*:*:*:*",
|
"criteria": "cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*",
|
||||||
"versionEndExcluding": "17.5",
|
"versionEndExcluding": "17.5",
|
||||||
"matchCriteriaId": "68CC48DA-8DB7-4042-8E07-0FE2B822DA1E"
|
"matchCriteriaId": "E7F2E11C-4A7D-4E71-BFAA-396B0549F649"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"vulnerable": true,
|
"vulnerable": true,
|
||||||
|
@ -2,7 +2,7 @@
|
|||||||
"id": "CVE-2024-27818",
|
"id": "CVE-2024-27818",
|
||||||
"sourceIdentifier": "product-security@apple.com",
|
"sourceIdentifier": "product-security@apple.com",
|
||||||
"published": "2024-05-14T15:13:05.047",
|
"published": "2024-05-14T15:13:05.047",
|
||||||
"lastModified": "2024-12-09T20:21:02.197",
|
"lastModified": "2024-12-12T14:33:00.640",
|
||||||
"vulnStatus": "Analyzed",
|
"vulnStatus": "Analyzed",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
@ -60,16 +60,16 @@
|
|||||||
"cpeMatch": [
|
"cpeMatch": [
|
||||||
{
|
{
|
||||||
"vulnerable": true,
|
"vulnerable": true,
|
||||||
"criteria": "cpe:2.3:o:apple:ipad_os:*:*:*:*:*:*:*:*",
|
"criteria": "cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*",
|
||||||
"versionEndExcluding": "16.7.8",
|
"versionEndExcluding": "16.7.8",
|
||||||
"matchCriteriaId": "B64F27E9-49AB-4A68-A617-9D88A28AD5F6"
|
"matchCriteriaId": "732206AE-D798-41FB-8D91-F796820F912D"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"vulnerable": true,
|
"vulnerable": true,
|
||||||
"criteria": "cpe:2.3:o:apple:ipad_os:*:*:*:*:*:*:*:*",
|
"criteria": "cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*",
|
||||||
"versionStartIncluding": "17.0",
|
"versionStartIncluding": "17.0",
|
||||||
"versionEndExcluding": "17.5",
|
"versionEndExcluding": "17.5",
|
||||||
"matchCriteriaId": "057195A5-F25E-4D39-8EE5-61E55687B19F"
|
"matchCriteriaId": "0C520138-1984-4369-8615-09FF57F0BB70"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"vulnerable": true,
|
"vulnerable": true,
|
||||||
|
@ -2,7 +2,7 @@
|
|||||||
"id": "CVE-2024-27821",
|
"id": "CVE-2024-27821",
|
||||||
"sourceIdentifier": "product-security@apple.com",
|
"sourceIdentifier": "product-security@apple.com",
|
||||||
"published": "2024-05-14T15:13:05.287",
|
"published": "2024-05-14T15:13:05.287",
|
||||||
"lastModified": "2024-12-09T20:45:41.037",
|
"lastModified": "2024-12-12T14:33:00.640",
|
||||||
"vulnStatus": "Analyzed",
|
"vulnStatus": "Analyzed",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
@ -90,9 +90,9 @@
|
|||||||
"cpeMatch": [
|
"cpeMatch": [
|
||||||
{
|
{
|
||||||
"vulnerable": true,
|
"vulnerable": true,
|
||||||
"criteria": "cpe:2.3:o:apple:ipad_os:*:*:*:*:*:*:*:*",
|
"criteria": "cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*",
|
||||||
"versionEndExcluding": "17.5",
|
"versionEndExcluding": "17.5",
|
||||||
"matchCriteriaId": "68CC48DA-8DB7-4042-8E07-0FE2B822DA1E"
|
"matchCriteriaId": "E7F2E11C-4A7D-4E71-BFAA-396B0549F649"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"vulnerable": true,
|
"vulnerable": true,
|
||||||
|
@ -2,7 +2,7 @@
|
|||||||
"id": "CVE-2024-27834",
|
"id": "CVE-2024-27834",
|
||||||
"sourceIdentifier": "product-security@apple.com",
|
"sourceIdentifier": "product-security@apple.com",
|
||||||
"published": "2024-05-14T15:13:06.953",
|
"published": "2024-05-14T15:13:06.953",
|
||||||
"lastModified": "2024-12-09T19:27:43.577",
|
"lastModified": "2024-12-12T14:33:00.640",
|
||||||
"vulnStatus": "Analyzed",
|
"vulnStatus": "Analyzed",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
@ -96,9 +96,9 @@
|
|||||||
},
|
},
|
||||||
{
|
{
|
||||||
"vulnerable": true,
|
"vulnerable": true,
|
||||||
"criteria": "cpe:2.3:o:apple:ipad_os:*:*:*:*:*:*:*:*",
|
"criteria": "cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*",
|
||||||
"versionEndExcluding": "17.5",
|
"versionEndExcluding": "17.5",
|
||||||
"matchCriteriaId": "68CC48DA-8DB7-4042-8E07-0FE2B822DA1E"
|
"matchCriteriaId": "E7F2E11C-4A7D-4E71-BFAA-396B0549F649"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"vulnerable": true,
|
"vulnerable": true,
|
||||||
|
@ -2,7 +2,7 @@
|
|||||||
"id": "CVE-2024-27835",
|
"id": "CVE-2024-27835",
|
||||||
"sourceIdentifier": "product-security@apple.com",
|
"sourceIdentifier": "product-security@apple.com",
|
||||||
"published": "2024-05-14T15:13:07.197",
|
"published": "2024-05-14T15:13:07.197",
|
||||||
"lastModified": "2024-12-09T19:35:44.313",
|
"lastModified": "2024-12-12T14:33:00.640",
|
||||||
"vulnStatus": "Analyzed",
|
"vulnStatus": "Analyzed",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
@ -90,9 +90,9 @@
|
|||||||
"cpeMatch": [
|
"cpeMatch": [
|
||||||
{
|
{
|
||||||
"vulnerable": true,
|
"vulnerable": true,
|
||||||
"criteria": "cpe:2.3:o:apple:ipad_os:*:*:*:*:*:*:*:*",
|
"criteria": "cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*",
|
||||||
"versionEndExcluding": "17.5",
|
"versionEndExcluding": "17.5",
|
||||||
"matchCriteriaId": "68CC48DA-8DB7-4042-8E07-0FE2B822DA1E"
|
"matchCriteriaId": "E7F2E11C-4A7D-4E71-BFAA-396B0549F649"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"vulnerable": true,
|
"vulnerable": true,
|
||||||
|
37
CVE-2024/CVE-2024-281xx/CVE-2024-28142.json
Normal file
37
CVE-2024/CVE-2024-281xx/CVE-2024-28142.json
Normal file
@ -0,0 +1,37 @@
|
|||||||
|
{
|
||||||
|
"id": "CVE-2024-28142",
|
||||||
|
"sourceIdentifier": "551230f0-3615-47bd-b7cc-93e92e730bbf",
|
||||||
|
"published": "2024-12-12T13:15:09.763",
|
||||||
|
"lastModified": "2024-12-12T13:15:09.763",
|
||||||
|
"vulnStatus": "Received",
|
||||||
|
"cveTags": [],
|
||||||
|
"descriptions": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "Due to missing input sanitization, an attacker can perform cross-site-scripting attacks and run arbitrary Javascript in the browser of other users. The \"File Name\" page (/cgi/uset.cgi?-cfilename) in the User Settings menu improperly filters the \"file name\" and wildcard character input field. By exploiting the wildcard character feature, attackers are able to store arbitrary Javascript code which is being triggered if the page is viewed afterwards, e.g. by higher privileged users such as admins.\n\n\n\n\n\n\n\n\n\nThis attack can even be performed without being logged in because the affected functions are not fully protected. Without logging in, only the file name parameter of the \"Default\" User can be changed."
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"metrics": {},
|
||||||
|
"weaknesses": [
|
||||||
|
{
|
||||||
|
"source": "551230f0-3615-47bd-b7cc-93e92e730bbf",
|
||||||
|
"type": "Secondary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-79"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://r.sec-consult.com/imageaccess",
|
||||||
|
"source": "551230f0-3615-47bd-b7cc-93e92e730bbf"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://www.imageaccess.de/?page=SupportPortal&lang=en",
|
||||||
|
"source": "551230f0-3615-47bd-b7cc-93e92e730bbf"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
37
CVE-2024/CVE-2024-281xx/CVE-2024-28143.json
Normal file
37
CVE-2024/CVE-2024-281xx/CVE-2024-28143.json
Normal file
@ -0,0 +1,37 @@
|
|||||||
|
{
|
||||||
|
"id": "CVE-2024-28143",
|
||||||
|
"sourceIdentifier": "551230f0-3615-47bd-b7cc-93e92e730bbf",
|
||||||
|
"published": "2024-12-12T14:15:22.173",
|
||||||
|
"lastModified": "2024-12-12T14:15:22.173",
|
||||||
|
"vulnStatus": "Received",
|
||||||
|
"cveTags": [],
|
||||||
|
"descriptions": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "The password change function at /cgi/admin.cgi does not require the current/old password, which makes the application vulnerable to account takeover. An attacker can use this to forcefully set a new password within the -rsetpass+-aaction+- parameter\u00a0for a user without knowing the old password, e.g. by exploiting a CSRF issue."
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"metrics": {},
|
||||||
|
"weaknesses": [
|
||||||
|
{
|
||||||
|
"source": "551230f0-3615-47bd-b7cc-93e92e730bbf",
|
||||||
|
"type": "Secondary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-620"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://r.sec-consult.com/imageaccess",
|
||||||
|
"source": "551230f0-3615-47bd-b7cc-93e92e730bbf"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://www.imageaccess.de/?page=SupportPortal&lang=en",
|
||||||
|
"source": "551230f0-3615-47bd-b7cc-93e92e730bbf"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
37
CVE-2024/CVE-2024-281xx/CVE-2024-28144.json
Normal file
37
CVE-2024/CVE-2024-281xx/CVE-2024-28144.json
Normal file
@ -0,0 +1,37 @@
|
|||||||
|
{
|
||||||
|
"id": "CVE-2024-28144",
|
||||||
|
"sourceIdentifier": "551230f0-3615-47bd-b7cc-93e92e730bbf",
|
||||||
|
"published": "2024-12-12T14:15:22.330",
|
||||||
|
"lastModified": "2024-12-12T14:15:22.330",
|
||||||
|
"vulnStatus": "Received",
|
||||||
|
"cveTags": [],
|
||||||
|
"descriptions": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "An attacker who can spoof the IP address and the User-Agent of a logged-in user can takeover the session because of flaws in the self-developed session management. If two users access the web interface from the same IP they are logged in as the other user."
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"metrics": {},
|
||||||
|
"weaknesses": [
|
||||||
|
{
|
||||||
|
"source": "551230f0-3615-47bd-b7cc-93e92e730bbf",
|
||||||
|
"type": "Secondary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-384"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://r.sec-consult.com/imageaccess",
|
||||||
|
"source": "551230f0-3615-47bd-b7cc-93e92e730bbf"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://www.imageaccess.de/?page=SupportPortal&lang=en",
|
||||||
|
"source": "551230f0-3615-47bd-b7cc-93e92e730bbf"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
37
CVE-2024/CVE-2024-281xx/CVE-2024-28145.json
Normal file
37
CVE-2024/CVE-2024-281xx/CVE-2024-28145.json
Normal file
@ -0,0 +1,37 @@
|
|||||||
|
{
|
||||||
|
"id": "CVE-2024-28145",
|
||||||
|
"sourceIdentifier": "551230f0-3615-47bd-b7cc-93e92e730bbf",
|
||||||
|
"published": "2024-12-12T14:15:22.467",
|
||||||
|
"lastModified": "2024-12-12T14:15:22.467",
|
||||||
|
"vulnStatus": "Received",
|
||||||
|
"cveTags": [],
|
||||||
|
"descriptions": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "An unauthenticated attacker can perform an SQL injection by accessing the /class/dbconnect.php\u00a0file and supplying malicious GET parameters. The HTTP GET parameters search, table, field, and value are vulnerable. For example, one SQL injection can be performed on the parameter \"field\" with the UNION keyword."
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"metrics": {},
|
||||||
|
"weaknesses": [
|
||||||
|
{
|
||||||
|
"source": "551230f0-3615-47bd-b7cc-93e92e730bbf",
|
||||||
|
"type": "Secondary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-89"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://r.sec-consult.com/imageaccess",
|
||||||
|
"source": "551230f0-3615-47bd-b7cc-93e92e730bbf"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://www.imageaccess.de/?page=SupportPortal&lang=en",
|
||||||
|
"source": "551230f0-3615-47bd-b7cc-93e92e730bbf"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
37
CVE-2024/CVE-2024-281xx/CVE-2024-28146.json
Normal file
37
CVE-2024/CVE-2024-281xx/CVE-2024-28146.json
Normal file
@ -0,0 +1,37 @@
|
|||||||
|
{
|
||||||
|
"id": "CVE-2024-28146",
|
||||||
|
"sourceIdentifier": "551230f0-3615-47bd-b7cc-93e92e730bbf",
|
||||||
|
"published": "2024-12-12T14:15:22.613",
|
||||||
|
"lastModified": "2024-12-12T14:15:22.613",
|
||||||
|
"vulnStatus": "Received",
|
||||||
|
"cveTags": [],
|
||||||
|
"descriptions": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "The application uses several hard-coded credentials\u00a0to encrypt config files during backup, to decrypt the new firmware during an update and some passwords allow a direct connection to the database server of the affected device."
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"metrics": {},
|
||||||
|
"weaknesses": [
|
||||||
|
{
|
||||||
|
"source": "551230f0-3615-47bd-b7cc-93e92e730bbf",
|
||||||
|
"type": "Secondary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-798"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://r.sec-consult.com/imageaccess",
|
||||||
|
"source": "551230f0-3615-47bd-b7cc-93e92e730bbf"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://www.imageaccess.de/?page=SupportPortal&lang=en",
|
||||||
|
"source": "551230f0-3615-47bd-b7cc-93e92e730bbf"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
37
CVE-2024/CVE-2024-364xx/CVE-2024-36494.json
Normal file
37
CVE-2024/CVE-2024-364xx/CVE-2024-36494.json
Normal file
@ -0,0 +1,37 @@
|
|||||||
|
{
|
||||||
|
"id": "CVE-2024-36494",
|
||||||
|
"sourceIdentifier": "551230f0-3615-47bd-b7cc-93e92e730bbf",
|
||||||
|
"published": "2024-12-12T13:15:10.160",
|
||||||
|
"lastModified": "2024-12-12T14:15:22.740",
|
||||||
|
"vulnStatus": "Received",
|
||||||
|
"cveTags": [],
|
||||||
|
"descriptions": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "Due to missing input sanitization, an attacker can perform cross-site-scripting attacks and run arbitrary Javascript in the browser of other users. The login page at /cgi/slogin.cgi suffers from XSS due to improper input filtering of the -tsetup+-uuser parameter, which can only be exploited if the target user is not already logged in. This makes it ideal for login form phishing attempts."
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"metrics": {},
|
||||||
|
"weaknesses": [
|
||||||
|
{
|
||||||
|
"source": "551230f0-3615-47bd-b7cc-93e92e730bbf",
|
||||||
|
"type": "Secondary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-79"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://r.sec-consult.com/imageaccess",
|
||||||
|
"source": "551230f0-3615-47bd-b7cc-93e92e730bbf"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://www.imageaccess.de/?page=SupportPortal&lang=en",
|
||||||
|
"source": "551230f0-3615-47bd-b7cc-93e92e730bbf"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
37
CVE-2024/CVE-2024-364xx/CVE-2024-36498.json
Normal file
37
CVE-2024/CVE-2024-364xx/CVE-2024-36498.json
Normal file
@ -0,0 +1,37 @@
|
|||||||
|
{
|
||||||
|
"id": "CVE-2024-36498",
|
||||||
|
"sourceIdentifier": "551230f0-3615-47bd-b7cc-93e92e730bbf",
|
||||||
|
"published": "2024-12-12T13:15:10.540",
|
||||||
|
"lastModified": "2024-12-12T13:15:10.540",
|
||||||
|
"vulnStatus": "Received",
|
||||||
|
"cveTags": [],
|
||||||
|
"descriptions": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "Due to missing input sanitization, an attacker can perform cross-site-scripting attacks and run arbitrary Javascript in the browser of other users.\u00a0The \"Edit Disclaimer Text\" function of the configuration menu is vulnerable to stored XSS. Only the users Poweruser and Admin can use this function which is available at the URL\n\n\n\n\n\n\n\n\n\nhttps://$SCANNER/cgi/admin.cgi?-rdisclaimer+-apre\n\nThe stored Javascript payload will be executed every time the ScanWizard is loaded, even in the Kiosk-mode browser. Version 7.40 implemented a fix, but it could be bypassed via URL-encoding the Javascript payload again."
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"metrics": {},
|
||||||
|
"weaknesses": [
|
||||||
|
{
|
||||||
|
"source": "551230f0-3615-47bd-b7cc-93e92e730bbf",
|
||||||
|
"type": "Secondary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-79"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://r.sec-consult.com/imageaccess",
|
||||||
|
"source": "551230f0-3615-47bd-b7cc-93e92e730bbf"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://www.imageaccess.de/?page=SupportPortal&lang=en",
|
||||||
|
"source": "551230f0-3615-47bd-b7cc-93e92e730bbf"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
37
CVE-2024/CVE-2024-479xx/CVE-2024-47947.json
Normal file
37
CVE-2024/CVE-2024-479xx/CVE-2024-47947.json
Normal file
@ -0,0 +1,37 @@
|
|||||||
|
{
|
||||||
|
"id": "CVE-2024-47947",
|
||||||
|
"sourceIdentifier": "551230f0-3615-47bd-b7cc-93e92e730bbf",
|
||||||
|
"published": "2024-12-12T13:15:10.920",
|
||||||
|
"lastModified": "2024-12-12T13:15:10.920",
|
||||||
|
"vulnStatus": "Received",
|
||||||
|
"cveTags": [],
|
||||||
|
"descriptions": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "Due to missing input sanitization, an attacker can perform cross-site-scripting attacks and run arbitrary Javascript in the browser of other users.\u00a0The \"Edit Disclaimer Text\" function of the configuration menu is vulnerable to stored XSS. Only the users Poweruser and Admin can use this function which is available at the URL\n\n\n\n\n\n\n\n\n\nhttps://$SCANNER/cgi/admin.cgi?-rdisclaimer+-apre\n\nThe stored Javascript payload will be executed every time the ScanWizard is loaded, even in the Kiosk-mode browser."
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"metrics": {},
|
||||||
|
"weaknesses": [
|
||||||
|
{
|
||||||
|
"source": "551230f0-3615-47bd-b7cc-93e92e730bbf",
|
||||||
|
"type": "Secondary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-79"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://r.sec-consult.com/imageaccess",
|
||||||
|
"source": "551230f0-3615-47bd-b7cc-93e92e730bbf"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://www.imageaccess.de/?page=SupportPortal&lang=en",
|
||||||
|
"source": "551230f0-3615-47bd-b7cc-93e92e730bbf"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
37
CVE-2024/CVE-2024-505xx/CVE-2024-50584.json
Normal file
37
CVE-2024/CVE-2024-505xx/CVE-2024-50584.json
Normal file
@ -0,0 +1,37 @@
|
|||||||
|
{
|
||||||
|
"id": "CVE-2024-50584",
|
||||||
|
"sourceIdentifier": "551230f0-3615-47bd-b7cc-93e92e730bbf",
|
||||||
|
"published": "2024-12-12T14:15:22.833",
|
||||||
|
"lastModified": "2024-12-12T14:15:22.833",
|
||||||
|
"vulnStatus": "Received",
|
||||||
|
"cveTags": [],
|
||||||
|
"descriptions": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "An authenticated attacker with the user/role \"Poweruser\" can perform an SQL injection by accessing the /class/template_io.php\u00a0file and supplying malicious GET parameters.\u00a0The \"templates\" parameter is vulnerable against blind boolean-based SQL injection attacks. SQL syntax must be injected into the JSON syntax of the templates parameter."
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"metrics": {},
|
||||||
|
"weaknesses": [
|
||||||
|
{
|
||||||
|
"source": "551230f0-3615-47bd-b7cc-93e92e730bbf",
|
||||||
|
"type": "Secondary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-89"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://r.sec-consult.com/imageaccess",
|
||||||
|
"source": "551230f0-3615-47bd-b7cc-93e92e730bbf"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://www.imageaccess.de/?page=SupportPortal&lang=en",
|
||||||
|
"source": "551230f0-3615-47bd-b7cc-93e92e730bbf"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
@ -2,13 +2,17 @@
|
|||||||
"id": "CVE-2024-54091",
|
"id": "CVE-2024-54091",
|
||||||
"sourceIdentifier": "productcert@siemens.com",
|
"sourceIdentifier": "productcert@siemens.com",
|
||||||
"published": "2024-12-10T14:30:47.193",
|
"published": "2024-12-10T14:30:47.193",
|
||||||
"lastModified": "2024-12-10T14:30:47.193",
|
"lastModified": "2024-12-12T14:15:22.953",
|
||||||
"vulnStatus": "Received",
|
"vulnStatus": "Received",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
"lang": "en",
|
"lang": "en",
|
||||||
"value": "A vulnerability has been identified in Parasolid V36.1 (All versions < V36.1.225), Parasolid V37.0 (All versions < V37.0.173), Parasolid V37.1 (All versions < V37.1.109). The affected applications contain an out of bounds write vulnerability when parsing specially crafted PAR files.\r\nThis could allow an attacker to execute code in the context of the current process."
|
"value": "A vulnerability has been identified in Parasolid V36.1 (All versions < V36.1.225), Parasolid V37.0 (All versions < V37.0.173). The affected application contains an out of bounds write past the end of an allocated buffer while parsing X_T data or a specially crafted file in X_T format.\r\nThis could allow an attacker to execute code in the context of the current process."
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"lang": "es",
|
||||||
|
"value": "Se ha identificado una vulnerabilidad en Parasolid V36.1 (todas las versiones anteriores a V36.1.225), Parasolid V37.0 (todas las versiones anteriores a V37.0.173) y Parasolid V37.1 (todas las versiones anteriores a V37.1.109). Las aplicaciones afectadas contienen una vulnerabilidad de escritura fuera de los l\u00edmites al analizar archivos PAR especialmente manipulados. Esto podr\u00eda permitir que un atacante ejecute c\u00f3digo en el contexto del proceso actual."
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"metrics": {
|
"metrics": {
|
||||||
@ -59,7 +63,7 @@
|
|||||||
"cvssMetricV31": [
|
"cvssMetricV31": [
|
||||||
{
|
{
|
||||||
"source": "productcert@siemens.com",
|
"source": "productcert@siemens.com",
|
||||||
"type": "Primary",
|
"type": "Secondary",
|
||||||
"cvssData": {
|
"cvssData": {
|
||||||
"version": "3.1",
|
"version": "3.1",
|
||||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||||||
@ -82,7 +86,7 @@
|
|||||||
"weaknesses": [
|
"weaknesses": [
|
||||||
{
|
{
|
||||||
"source": "productcert@siemens.com",
|
"source": "productcert@siemens.com",
|
||||||
"type": "Primary",
|
"type": "Secondary",
|
||||||
"description": [
|
"description": [
|
||||||
{
|
{
|
||||||
"lang": "en",
|
"lang": "en",
|
||||||
|
56
CVE-2024/CVE-2024-541xx/CVE-2024-54118.json
Normal file
56
CVE-2024/CVE-2024-541xx/CVE-2024-54118.json
Normal file
@ -0,0 +1,56 @@
|
|||||||
|
{
|
||||||
|
"id": "CVE-2024-54118",
|
||||||
|
"sourceIdentifier": "psirt@huawei.com",
|
||||||
|
"published": "2024-12-12T13:15:11.180",
|
||||||
|
"lastModified": "2024-12-12T13:15:11.180",
|
||||||
|
"vulnStatus": "Received",
|
||||||
|
"cveTags": [],
|
||||||
|
"descriptions": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "Cross-process screen stack vulnerability in the UIExtension module\nImpact: Successful exploitation of this vulnerability may affect service confidentiality."
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"metrics": {
|
||||||
|
"cvssMetricV31": [
|
||||||
|
{
|
||||||
|
"source": "psirt@huawei.com",
|
||||||
|
"type": "Secondary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
|
||||||
|
"baseScore": 6.2,
|
||||||
|
"baseSeverity": "MEDIUM",
|
||||||
|
"attackVector": "LOCAL",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "NONE",
|
||||||
|
"userInteraction": "NONE",
|
||||||
|
"scope": "UNCHANGED",
|
||||||
|
"confidentialityImpact": "HIGH",
|
||||||
|
"integrityImpact": "NONE",
|
||||||
|
"availabilityImpact": "NONE"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 2.5,
|
||||||
|
"impactScore": 3.6
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"weaknesses": [
|
||||||
|
{
|
||||||
|
"source": "psirt@huawei.com",
|
||||||
|
"type": "Secondary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-200"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://consumer.huawei.com/en/support/bulletin/2024/12/",
|
||||||
|
"source": "psirt@huawei.com"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
56
CVE-2024/CVE-2024-541xx/CVE-2024-54119.json
Normal file
56
CVE-2024/CVE-2024-541xx/CVE-2024-54119.json
Normal file
@ -0,0 +1,56 @@
|
|||||||
|
{
|
||||||
|
"id": "CVE-2024-54119",
|
||||||
|
"sourceIdentifier": "psirt@huawei.com",
|
||||||
|
"published": "2024-12-12T13:15:11.350",
|
||||||
|
"lastModified": "2024-12-12T13:15:11.350",
|
||||||
|
"vulnStatus": "Received",
|
||||||
|
"cveTags": [],
|
||||||
|
"descriptions": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "Cross-process screen stack vulnerability in the UIExtension module\nImpact: Successful exploitation of this vulnerability may affect service confidentiality."
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"metrics": {
|
||||||
|
"cvssMetricV31": [
|
||||||
|
{
|
||||||
|
"source": "psirt@huawei.com",
|
||||||
|
"type": "Secondary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
|
||||||
|
"baseScore": 6.2,
|
||||||
|
"baseSeverity": "MEDIUM",
|
||||||
|
"attackVector": "LOCAL",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "NONE",
|
||||||
|
"userInteraction": "NONE",
|
||||||
|
"scope": "UNCHANGED",
|
||||||
|
"confidentialityImpact": "HIGH",
|
||||||
|
"integrityImpact": "NONE",
|
||||||
|
"availabilityImpact": "NONE"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 2.5,
|
||||||
|
"impactScore": 3.6
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"weaknesses": [
|
||||||
|
{
|
||||||
|
"source": "psirt@huawei.com",
|
||||||
|
"type": "Secondary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-200"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://consumer.huawei.com/en/support/bulletin/2024/12/",
|
||||||
|
"source": "psirt@huawei.com"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
56
CVE-2024/CVE-2024-541xx/CVE-2024-54122.json
Normal file
56
CVE-2024/CVE-2024-541xx/CVE-2024-54122.json
Normal file
@ -0,0 +1,56 @@
|
|||||||
|
{
|
||||||
|
"id": "CVE-2024-54122",
|
||||||
|
"sourceIdentifier": "psirt@huawei.com",
|
||||||
|
"published": "2024-12-12T13:15:11.527",
|
||||||
|
"lastModified": "2024-12-12T13:15:11.527",
|
||||||
|
"vulnStatus": "Received",
|
||||||
|
"cveTags": [],
|
||||||
|
"descriptions": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "Concurrent variable access vulnerability in the ability module\nImpact: Successful exploitation of this vulnerability may affect availability."
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"metrics": {
|
||||||
|
"cvssMetricV31": [
|
||||||
|
{
|
||||||
|
"source": "psirt@huawei.com",
|
||||||
|
"type": "Secondary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
|
||||||
|
"baseScore": 6.2,
|
||||||
|
"baseSeverity": "MEDIUM",
|
||||||
|
"attackVector": "LOCAL",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "NONE",
|
||||||
|
"userInteraction": "NONE",
|
||||||
|
"scope": "UNCHANGED",
|
||||||
|
"confidentialityImpact": "HIGH",
|
||||||
|
"integrityImpact": "NONE",
|
||||||
|
"availabilityImpact": "NONE"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 2.5,
|
||||||
|
"impactScore": 3.6
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"weaknesses": [
|
||||||
|
{
|
||||||
|
"source": "psirt@huawei.com",
|
||||||
|
"type": "Secondary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-362"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://consumer.huawei.com/en/support/bulletin/2024/12/",
|
||||||
|
"source": "psirt@huawei.com"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
73
README.md
73
README.md
@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours.
|
|||||||
### Last Repository Update
|
### Last Repository Update
|
||||||
|
|
||||||
```plain
|
```plain
|
||||||
2024-12-12T13:00:51.118892+00:00
|
2024-12-12T15:00:22.918388+00:00
|
||||||
```
|
```
|
||||||
|
|
||||||
### Most recent CVE Modification Timestamp synchronized with NVD
|
### Most recent CVE Modification Timestamp synchronized with NVD
|
||||||
|
|
||||||
```plain
|
```plain
|
||||||
2024-12-12T12:15:28.727000+00:00
|
2024-12-12T14:59:46.863000+00:00
|
||||||
```
|
```
|
||||||
|
|
||||||
### Last Data Feed Release
|
### Last Data Feed Release
|
||||||
@ -33,44 +33,57 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
|
|||||||
### Total Number of included CVEs
|
### Total Number of included CVEs
|
||||||
|
|
||||||
```plain
|
```plain
|
||||||
273496
|
273509
|
||||||
```
|
```
|
||||||
|
|
||||||
### CVEs added in the last Commit
|
### CVEs added in the last Commit
|
||||||
|
|
||||||
Recently added CVEs: `31`
|
Recently added CVEs: `13`
|
||||||
|
|
||||||
- [CVE-2024-54098](CVE-2024/CVE-2024-540xx/CVE-2024-54098.json) (`2024-12-12T12:15:23.243`)
|
- [CVE-2024-12271](CVE-2024/CVE-2024-122xx/CVE-2024-12271.json) (`2024-12-12T13:15:07.570`)
|
||||||
- [CVE-2024-54099](CVE-2024/CVE-2024-540xx/CVE-2024-54099.json) (`2024-12-12T12:15:23.420`)
|
- [CVE-2024-28142](CVE-2024/CVE-2024-281xx/CVE-2024-28142.json) (`2024-12-12T13:15:09.763`)
|
||||||
- [CVE-2024-54100](CVE-2024/CVE-2024-541xx/CVE-2024-54100.json) (`2024-12-12T12:15:23.593`)
|
- [CVE-2024-28143](CVE-2024/CVE-2024-281xx/CVE-2024-28143.json) (`2024-12-12T14:15:22.173`)
|
||||||
- [CVE-2024-54101](CVE-2024/CVE-2024-541xx/CVE-2024-54101.json) (`2024-12-12T12:15:23.763`)
|
- [CVE-2024-28144](CVE-2024/CVE-2024-281xx/CVE-2024-28144.json) (`2024-12-12T14:15:22.330`)
|
||||||
- [CVE-2024-54102](CVE-2024/CVE-2024-541xx/CVE-2024-54102.json) (`2024-12-12T12:15:23.930`)
|
- [CVE-2024-28145](CVE-2024/CVE-2024-281xx/CVE-2024-28145.json) (`2024-12-12T14:15:22.467`)
|
||||||
- [CVE-2024-54103](CVE-2024/CVE-2024-541xx/CVE-2024-54103.json) (`2024-12-12T12:15:24.123`)
|
- [CVE-2024-28146](CVE-2024/CVE-2024-281xx/CVE-2024-28146.json) (`2024-12-12T14:15:22.613`)
|
||||||
- [CVE-2024-54104](CVE-2024/CVE-2024-541xx/CVE-2024-54104.json) (`2024-12-12T12:15:24.550`)
|
- [CVE-2024-36494](CVE-2024/CVE-2024-364xx/CVE-2024-36494.json) (`2024-12-12T13:15:10.160`)
|
||||||
- [CVE-2024-54105](CVE-2024/CVE-2024-541xx/CVE-2024-54105.json) (`2024-12-12T12:15:24.983`)
|
- [CVE-2024-36498](CVE-2024/CVE-2024-364xx/CVE-2024-36498.json) (`2024-12-12T13:15:10.540`)
|
||||||
- [CVE-2024-54106](CVE-2024/CVE-2024-541xx/CVE-2024-54106.json) (`2024-12-12T12:15:25.237`)
|
- [CVE-2024-47947](CVE-2024/CVE-2024-479xx/CVE-2024-47947.json) (`2024-12-12T13:15:10.920`)
|
||||||
- [CVE-2024-54107](CVE-2024/CVE-2024-541xx/CVE-2024-54107.json) (`2024-12-12T12:15:25.653`)
|
- [CVE-2024-50584](CVE-2024/CVE-2024-505xx/CVE-2024-50584.json) (`2024-12-12T14:15:22.833`)
|
||||||
- [CVE-2024-54108](CVE-2024/CVE-2024-541xx/CVE-2024-54108.json) (`2024-12-12T12:15:26.023`)
|
- [CVE-2024-54118](CVE-2024/CVE-2024-541xx/CVE-2024-54118.json) (`2024-12-12T13:15:11.180`)
|
||||||
- [CVE-2024-54109](CVE-2024/CVE-2024-541xx/CVE-2024-54109.json) (`2024-12-12T12:15:26.270`)
|
- [CVE-2024-54119](CVE-2024/CVE-2024-541xx/CVE-2024-54119.json) (`2024-12-12T13:15:11.350`)
|
||||||
- [CVE-2024-54110](CVE-2024/CVE-2024-541xx/CVE-2024-54110.json) (`2024-12-12T12:15:26.453`)
|
- [CVE-2024-54122](CVE-2024/CVE-2024-541xx/CVE-2024-54122.json) (`2024-12-12T13:15:11.527`)
|
||||||
- [CVE-2024-54111](CVE-2024/CVE-2024-541xx/CVE-2024-54111.json) (`2024-12-12T12:15:26.647`)
|
|
||||||
- [CVE-2024-54112](CVE-2024/CVE-2024-541xx/CVE-2024-54112.json) (`2024-12-12T12:15:26.823`)
|
|
||||||
- [CVE-2024-54113](CVE-2024/CVE-2024-541xx/CVE-2024-54113.json) (`2024-12-12T12:15:27.003`)
|
|
||||||
- [CVE-2024-54114](CVE-2024/CVE-2024-541xx/CVE-2024-54114.json) (`2024-12-12T12:15:27.187`)
|
|
||||||
- [CVE-2024-54115](CVE-2024/CVE-2024-541xx/CVE-2024-54115.json) (`2024-12-12T12:15:27.363`)
|
|
||||||
- [CVE-2024-54116](CVE-2024/CVE-2024-541xx/CVE-2024-54116.json) (`2024-12-12T12:15:27.570`)
|
|
||||||
- [CVE-2024-54117](CVE-2024/CVE-2024-541xx/CVE-2024-54117.json) (`2024-12-12T12:15:27.747`)
|
|
||||||
- [CVE-2024-8179](CVE-2024/CVE-2024-81xx/CVE-2024-8179.json) (`2024-12-12T12:15:27.937`)
|
|
||||||
- [CVE-2024-8233](CVE-2024/CVE-2024-82xx/CVE-2024-8233.json) (`2024-12-12T12:15:28.120`)
|
|
||||||
- [CVE-2024-8647](CVE-2024/CVE-2024-86xx/CVE-2024-8647.json) (`2024-12-12T12:15:28.297`)
|
|
||||||
- [CVE-2024-9367](CVE-2024/CVE-2024-93xx/CVE-2024-9367.json) (`2024-12-12T12:15:28.497`)
|
|
||||||
- [CVE-2024-9387](CVE-2024/CVE-2024-93xx/CVE-2024-9387.json) (`2024-12-12T12:15:28.727`)
|
|
||||||
|
|
||||||
|
|
||||||
### CVEs modified in the last Commit
|
### CVEs modified in the last Commit
|
||||||
|
|
||||||
Recently modified CVEs: `0`
|
Recently modified CVEs: `49`
|
||||||
|
|
||||||
|
- [CVE-2023-34352](CVE-2023/CVE-2023-343xx/CVE-2023-34352.json) (`2024-12-12T14:26:18.893`)
|
||||||
|
- [CVE-2023-38136](CVE-2023/CVE-2023-381xx/CVE-2023-38136.json) (`2024-12-12T14:26:18.893`)
|
||||||
|
- [CVE-2023-38261](CVE-2023/CVE-2023-382xx/CVE-2023-38261.json) (`2024-12-12T14:26:18.893`)
|
||||||
|
- [CVE-2023-42942](CVE-2023/CVE-2023-429xx/CVE-2023-42942.json) (`2024-12-12T14:26:18.893`)
|
||||||
|
- [CVE-2023-42974](CVE-2023/CVE-2023-429xx/CVE-2023-42974.json) (`2024-12-12T14:26:18.893`)
|
||||||
|
- [CVE-2023-44254](CVE-2023/CVE-2023-442xx/CVE-2023-44254.json) (`2024-12-12T13:56:07.013`)
|
||||||
|
- [CVE-2023-45866](CVE-2023/CVE-2023-458xx/CVE-2023-45866.json) (`2024-12-12T14:33:00.640`)
|
||||||
|
- [CVE-2023-49069](CVE-2023/CVE-2023-490xx/CVE-2023-49069.json) (`2024-12-12T14:15:20.450`)
|
||||||
|
- [CVE-2024-2060](CVE-2024/CVE-2024-20xx/CVE-2024-2060.json) (`2024-12-12T14:59:34.407`)
|
||||||
|
- [CVE-2024-2061](CVE-2024/CVE-2024-20xx/CVE-2024-2061.json) (`2024-12-12T14:59:46.863`)
|
||||||
|
- [CVE-2024-2062](CVE-2024/CVE-2024-20xx/CVE-2024-2062.json) (`2024-12-12T14:51:50.387`)
|
||||||
|
- [CVE-2024-2063](CVE-2024/CVE-2024-20xx/CVE-2024-2063.json) (`2024-12-12T14:52:44.657`)
|
||||||
|
- [CVE-2024-2064](CVE-2024/CVE-2024-20xx/CVE-2024-2064.json) (`2024-12-12T14:55:04.297`)
|
||||||
|
- [CVE-2024-23201](CVE-2024/CVE-2024-232xx/CVE-2024-23201.json) (`2024-12-12T14:33:00.640`)
|
||||||
|
- [CVE-2024-23228](CVE-2024/CVE-2024-232xx/CVE-2024-23228.json) (`2024-12-12T14:33:00.640`)
|
||||||
|
- [CVE-2024-23271](CVE-2024/CVE-2024-232xx/CVE-2024-23271.json) (`2024-12-12T14:33:00.640`)
|
||||||
|
- [CVE-2024-27791](CVE-2024/CVE-2024-277xx/CVE-2024-27791.json) (`2024-12-12T14:33:00.640`)
|
||||||
|
- [CVE-2024-27804](CVE-2024/CVE-2024-278xx/CVE-2024-27804.json) (`2024-12-12T14:33:00.640`)
|
||||||
|
- [CVE-2024-27810](CVE-2024/CVE-2024-278xx/CVE-2024-27810.json) (`2024-12-12T14:33:00.640`)
|
||||||
|
- [CVE-2024-27816](CVE-2024/CVE-2024-278xx/CVE-2024-27816.json) (`2024-12-12T14:33:00.640`)
|
||||||
|
- [CVE-2024-27818](CVE-2024/CVE-2024-278xx/CVE-2024-27818.json) (`2024-12-12T14:33:00.640`)
|
||||||
|
- [CVE-2024-27821](CVE-2024/CVE-2024-278xx/CVE-2024-27821.json) (`2024-12-12T14:33:00.640`)
|
||||||
|
- [CVE-2024-27834](CVE-2024/CVE-2024-278xx/CVE-2024-27834.json) (`2024-12-12T14:33:00.640`)
|
||||||
|
- [CVE-2024-27835](CVE-2024/CVE-2024-278xx/CVE-2024-27835.json) (`2024-12-12T14:33:00.640`)
|
||||||
|
- [CVE-2024-54091](CVE-2024/CVE-2024-540xx/CVE-2024-54091.json) (`2024-12-12T14:15:22.953`)
|
||||||
|
|
||||||
|
|
||||||
## Download and Usage
|
## Download and Usage
|
||||||
|
173
_state.csv
173
_state.csv
@ -187212,12 +187212,12 @@ CVE-2021-47067,0,0,9df5b0005af4045c4050adb25d4d0a3c7ed0af17ec105b20f7776b61c08f0
|
|||||||
CVE-2021-47068,0,0,e902a18ffbe6654398a0348af04e476fbaf331e8e30fa78b6bfe4762a12c956f,2024-12-10T19:50:49.147000
|
CVE-2021-47068,0,0,e902a18ffbe6654398a0348af04e476fbaf331e8e30fa78b6bfe4762a12c956f,2024-12-10T19:50:49.147000
|
||||||
CVE-2021-47069,0,0,c1eca05ee668952c1f7b1291c7ec7a82c3eb142d2cda65e66b7909adc2d987bc,2024-11-21T06:35:18.510000
|
CVE-2021-47069,0,0,c1eca05ee668952c1f7b1291c7ec7a82c3eb142d2cda65e66b7909adc2d987bc,2024-11-21T06:35:18.510000
|
||||||
CVE-2021-47070,0,0,affc793dd141d8f358bff7bbf0e6544f3d5ab387f0d1d9fdbb175a861def15c6,2024-11-21T06:35:18.633000
|
CVE-2021-47070,0,0,affc793dd141d8f358bff7bbf0e6544f3d5ab387f0d1d9fdbb175a861def15c6,2024-11-21T06:35:18.633000
|
||||||
CVE-2021-47071,0,0,70d2443c4522733bfa6621cf92ec2f8083a480402e420a029b09490aeade57ef,2024-11-21T06:35:20.363000
|
CVE-2021-47071,0,1,d800b8ddcd96789ad1c1f5273161686a71669bb9dbf533fd7eca685a04a147dd,2024-12-12T14:43:19.253000
|
||||||
CVE-2021-47072,0,0,954df5847b9e8b8847398a4fb353515add1c8b9bc355ca2ca788b956a977c290,2024-11-21T06:35:20.567000
|
CVE-2021-47072,0,0,954df5847b9e8b8847398a4fb353515add1c8b9bc355ca2ca788b956a977c290,2024-11-21T06:35:20.567000
|
||||||
CVE-2021-47073,0,0,1da6789de0e18c722faf0748d86b29266ec446ef02b371ec3294102d5dc16cb8,2024-11-21T06:35:20.683000
|
CVE-2021-47073,0,0,1da6789de0e18c722faf0748d86b29266ec446ef02b371ec3294102d5dc16cb8,2024-11-21T06:35:20.683000
|
||||||
CVE-2021-47074,0,0,62606d2032895447276146a4bd74173d7188ecf09841f325ee145350e8690bb6,2024-11-21T06:35:20.813000
|
CVE-2021-47074,0,1,49866fe835e78e03621976826fedc250f3287bb5acca2d0153d10814806d0b1b,2024-12-12T14:43:36.903000
|
||||||
CVE-2021-47075,0,0,36eeb7f2e930817c1b1fe865ad9fae545910e7fd96de6d94f28c455e8e24109c,2024-11-21T06:35:20.930000
|
CVE-2021-47075,0,0,36eeb7f2e930817c1b1fe865ad9fae545910e7fd96de6d94f28c455e8e24109c,2024-11-21T06:35:20.930000
|
||||||
CVE-2021-47076,0,0,eb44f78121b9b3561a16c318aaec96c6c6576ae1ed25b0b86867d5e51cb5effd,2024-11-21T06:35:21.103000
|
CVE-2021-47076,0,1,d73ef7581eddf57c90dedb9553a930cea360fd3157b9a516f25e7504c936d196,2024-12-12T14:48:50.960000
|
||||||
CVE-2021-47077,0,0,89ceade981ed48989989cfdea08722c6551df82a7dcf7e9e57d17f7163739998,2024-12-10T21:01:51.030000
|
CVE-2021-47077,0,0,89ceade981ed48989989cfdea08722c6551df82a7dcf7e9e57d17f7163739998,2024-12-10T21:01:51.030000
|
||||||
CVE-2021-47078,0,0,10d2cc255b79f1ae1b2de2b41ed383d0a6ccb70ddfa9cdcb0b129f97f8f6ab93,2024-11-21T06:35:21.327000
|
CVE-2021-47078,0,0,10d2cc255b79f1ae1b2de2b41ed383d0a6ccb70ddfa9cdcb0b129f97f8f6ab93,2024-11-21T06:35:21.327000
|
||||||
CVE-2021-47079,0,0,c036a75d1b217059f3eeacf84ba954225baad506d2ec7a3aba1818ec631ba415,2024-12-09T18:41:59.903000
|
CVE-2021-47079,0,0,c036a75d1b217059f3eeacf84ba954225baad506d2ec7a3aba1818ec631ba415,2024-12-09T18:41:59.903000
|
||||||
@ -187289,7 +187289,7 @@ CVE-2021-47144,0,0,c2e0d5f06ee1d87b70c640c6d1cfae5fabab5c3538ce13718b21796bfa989
|
|||||||
CVE-2021-47145,0,0,00fe141e2115246367ddd029d151ab446804946a179f5a5ef7bd44ff636b1ad0,2024-11-21T06:35:29.310000
|
CVE-2021-47145,0,0,00fe141e2115246367ddd029d151ab446804946a179f5a5ef7bd44ff636b1ad0,2024-11-21T06:35:29.310000
|
||||||
CVE-2021-47146,0,0,bb8ef503187c896095044fd8ab66fc3492a4b167cf262883e87dcd339c1bf77d,2024-11-21T06:35:29.427000
|
CVE-2021-47146,0,0,bb8ef503187c896095044fd8ab66fc3492a4b167cf262883e87dcd339c1bf77d,2024-11-21T06:35:29.427000
|
||||||
CVE-2021-47147,0,0,8cffde98530a8168df40904390cfc1ac183830cade4d4bfa5b463711d25686fb,2024-11-21T06:35:29.547000
|
CVE-2021-47147,0,0,8cffde98530a8168df40904390cfc1ac183830cade4d4bfa5b463711d25686fb,2024-11-21T06:35:29.547000
|
||||||
CVE-2021-47148,0,0,d58d3aa38ff2a58e5c3f44becaeb992b1b4061cece3e3080a7e4f4c4e4d6b59f,2024-11-21T06:35:29.710000
|
CVE-2021-47148,0,1,a79aea59b658b885a0baa703d45c7d81c359e77c26745d7330c5c2f35be78df6,2024-12-12T14:35:05.817000
|
||||||
CVE-2021-47149,0,0,d58f4fbb593bd6f34152e342d4fe5dcc66a8a727beb81de12439ae37b3fafa9a,2024-11-21T06:35:29.813000
|
CVE-2021-47149,0,0,d58f4fbb593bd6f34152e342d4fe5dcc66a8a727beb81de12439ae37b3fafa9a,2024-11-21T06:35:29.813000
|
||||||
CVE-2021-47150,0,0,ba00f511cbd076485c22314a7ced443a6ac385f27ad1c5c8ea8eccc33146def6,2024-11-21T06:35:29.937000
|
CVE-2021-47150,0,0,ba00f511cbd076485c22314a7ced443a6ac385f27ad1c5c8ea8eccc33146def6,2024-11-21T06:35:29.937000
|
||||||
CVE-2021-47151,0,0,342b7162752caa84d3e7b35c452b9e1669f1f036fff3448b5525075ff2119a77,2024-11-21T06:35:30.050000
|
CVE-2021-47151,0,0,342b7162752caa84d3e7b35c452b9e1669f1f036fff3448b5525075ff2119a77,2024-11-21T06:35:30.050000
|
||||||
@ -221466,34 +221466,34 @@ CVE-2023-27942,0,0,3ecc08594caf9a6757a777d75ec071ee2a208b9788efdbc9a957e6df06e8c
|
|||||||
CVE-2023-27943,0,0,93898ded30863b05ee38e9474954d1cbc946f8739e5d8580b19c6fadef995cdd,2024-11-21T07:53:45.090000
|
CVE-2023-27943,0,0,93898ded30863b05ee38e9474954d1cbc946f8739e5d8580b19c6fadef995cdd,2024-11-21T07:53:45.090000
|
||||||
CVE-2023-27944,0,0,f2b8aa1a39cc66b45a2350e92881c5b190f580eb31f8fde93e99402295076d99,2024-11-21T07:53:45.237000
|
CVE-2023-27944,0,0,f2b8aa1a39cc66b45a2350e92881c5b190f580eb31f8fde93e99402295076d99,2024-11-21T07:53:45.237000
|
||||||
CVE-2023-27945,0,0,1d36d9a31ae0099c5afd0b68dccb72e1ea6d9cd5681ed25196b42ec2add3e3d2,2024-11-21T07:53:45.397000
|
CVE-2023-27945,0,0,1d36d9a31ae0099c5afd0b68dccb72e1ea6d9cd5681ed25196b42ec2add3e3d2,2024-11-21T07:53:45.397000
|
||||||
CVE-2023-27946,0,0,fbc36b1e3706eb534706745e76add7e93efd5fef4b8af27c967fa244394ac539,2024-11-21T07:53:45.527000
|
CVE-2023-27946,0,1,4658716f882d77ace1fafe2bcdcb33d875de1ab354be3fcccc413a3af9c5d578,2024-12-12T14:26:18.893000
|
||||||
CVE-2023-27947,0,0,9bf9d3fbde55e086450c5ce93b783034cd711e1641158d1e5bbb1708d0565525,2024-11-21T07:53:45.673000
|
CVE-2023-27947,0,0,9bf9d3fbde55e086450c5ce93b783034cd711e1641158d1e5bbb1708d0565525,2024-11-21T07:53:45.673000
|
||||||
CVE-2023-27948,0,0,760363adf8d7d0ca02870884a0a0e9fa6b245440dd3df2e635a2aa44ecab95cc,2024-11-21T07:53:45.790000
|
CVE-2023-27948,0,0,760363adf8d7d0ca02870884a0a0e9fa6b245440dd3df2e635a2aa44ecab95cc,2024-11-21T07:53:45.790000
|
||||||
CVE-2023-27949,0,0,c11719a9f9a205ad453f3f5e2c5bff4c583c84231bbcbe169deb3d8afeb1aaf4,2024-11-21T07:53:45.913000
|
CVE-2023-27949,0,1,94bf87b48c9a3a5c84aec88c9a24effc756e5c999de8db419a0d112eb0d8b59b,2024-12-12T14:26:18.893000
|
||||||
CVE-2023-2795,0,0,1134a4f4c2856595d0eca4004b0d37ee1461cd84cc05ae468aa9f7ee1279458e,2024-11-21T07:59:18.350000
|
CVE-2023-2795,0,0,1134a4f4c2856595d0eca4004b0d37ee1461cd84cc05ae468aa9f7ee1279458e,2024-11-21T07:59:18.350000
|
||||||
CVE-2023-27950,0,0,382f8ebc081a8dba327fc928069a71cba666cd4fe1a6c22366c971263e51f9a0,2024-11-21T07:53:46.073000
|
CVE-2023-27950,0,0,382f8ebc081a8dba327fc928069a71cba666cd4fe1a6c22366c971263e51f9a0,2024-11-21T07:53:46.073000
|
||||||
CVE-2023-27951,0,0,273a0bb5b11e80a4f64c3b772233292e3a49197dfe48e0bc69231017a9e3117c,2024-11-21T07:53:46.283000
|
CVE-2023-27951,0,0,273a0bb5b11e80a4f64c3b772233292e3a49197dfe48e0bc69231017a9e3117c,2024-11-21T07:53:46.283000
|
||||||
CVE-2023-27952,0,0,71c584277ce7e7878c8ff4fa1d46c992f11399da6db6f5472d8356133b6674e9,2024-11-21T07:53:46.517000
|
CVE-2023-27952,0,0,71c584277ce7e7878c8ff4fa1d46c992f11399da6db6f5472d8356133b6674e9,2024-11-21T07:53:46.517000
|
||||||
CVE-2023-27953,0,0,882334bb505d92aedf3ef28df592344c3d189b00052a4aa25a5774d3da0d6c85,2024-11-21T07:53:46.723000
|
CVE-2023-27953,0,0,882334bb505d92aedf3ef28df592344c3d189b00052a4aa25a5774d3da0d6c85,2024-11-21T07:53:46.723000
|
||||||
CVE-2023-27954,0,0,def6e89bf8c2ae705edbdd0fd230b3574c7b55b20dba5f8f3ff9cf79c85d2aa8,2024-11-21T07:53:46.970000
|
CVE-2023-27954,0,1,d5e69b4018517c57c05d166c75572cfed92bb8df7dfe32eecc6fbea6fd25d15f,2024-12-12T14:26:18.893000
|
||||||
CVE-2023-27955,0,0,574088d4597d5ada5a582255b5d6747ace50d7a37b246112afd509e9b05d7dc6,2024-11-21T07:53:47.247000
|
CVE-2023-27955,0,1,7acf8a7793e4b719acdaf66694a3822c1348de2230a60099f121cefdbfef126e,2024-12-12T14:26:18.893000
|
||||||
CVE-2023-27956,0,0,eab6e1954671eba9b10d40fff38c341975fcbed82e2bfcc5ef35133991b7eee5,2024-11-21T07:53:47.430000
|
CVE-2023-27956,0,1,a208b16ed3bab62b90db436d4fa73c9552c541d7479c9b855380d7eeeb2ec94f,2024-12-12T14:26:18.893000
|
||||||
CVE-2023-27957,0,0,d1e7b3b508465a6866530fc7113267739c37584824db57ecc458485e18cefd8b,2024-11-21T07:53:47.610000
|
CVE-2023-27957,0,0,d1e7b3b508465a6866530fc7113267739c37584824db57ecc458485e18cefd8b,2024-11-21T07:53:47.610000
|
||||||
CVE-2023-27958,0,0,46eb7deb505f5e3897b9b5522e801fbefb236a052e189591d28ec2b72f2e9ee4,2024-11-21T07:53:47.773000
|
CVE-2023-27958,0,0,46eb7deb505f5e3897b9b5522e801fbefb236a052e189591d28ec2b72f2e9ee4,2024-11-21T07:53:47.773000
|
||||||
CVE-2023-27959,0,0,5a19b117c69cca5c27ffede42bc67a0b8c02a846984d23887716c1df47f55d8b,2024-11-21T07:53:47.957000
|
CVE-2023-27959,0,1,93f088a3d2cd12f6488f2a83e930e5b4640c45e601cd51de8c6e1d5789140d21,2024-12-12T14:26:18.893000
|
||||||
CVE-2023-2796,0,0,efcf9f17319a3efd07e6eb558157012737214df0290a562d2adb729552c32388,2024-11-21T07:59:18.450000
|
CVE-2023-2796,0,0,efcf9f17319a3efd07e6eb558157012737214df0290a562d2adb729552c32388,2024-11-21T07:59:18.450000
|
||||||
CVE-2023-27960,0,0,a775190b8842b0c3b8a81f624c230a57c4f33980270a40a1b212244445925782,2024-11-21T07:53:48.107000
|
CVE-2023-27960,0,0,a775190b8842b0c3b8a81f624c230a57c4f33980270a40a1b212244445925782,2024-11-21T07:53:48.107000
|
||||||
CVE-2023-27961,0,0,be816b764a083ff572b1a681fbefb9cca484e8d101b08ea3e48462468e9db88d,2024-11-21T07:53:48.263000
|
CVE-2023-27961,0,1,184216b2faccb1468fad7c6686a8ffc8d233ef0643d3de27eea3c613c3abe845,2024-12-12T14:26:18.893000
|
||||||
CVE-2023-27962,0,0,39774aa61a14583e66301eb335bdb09877c9692002f6084dc5ebedde5c9bc5ae,2024-11-21T07:53:48.427000
|
CVE-2023-27962,0,0,39774aa61a14583e66301eb335bdb09877c9692002f6084dc5ebedde5c9bc5ae,2024-11-21T07:53:48.427000
|
||||||
CVE-2023-27963,0,0,0108ac2b47b46aa8c8946d3f257fe82e669139947b8f7bd419976bd5816947cd,2024-11-21T07:53:48.647000
|
CVE-2023-27963,0,1,871eaaf1ed6152750e4a3b0c5b9459687c54af50cc37274d8bd96c673b253664,2024-12-12T14:26:18.893000
|
||||||
CVE-2023-27964,0,0,66c685f1ae1959baf0bc535c35accef15fb3af44c505366884bd10b44ff2d874,2024-11-21T07:53:48.813000
|
CVE-2023-27964,0,0,66c685f1ae1959baf0bc535c35accef15fb3af44c505366884bd10b44ff2d874,2024-11-21T07:53:48.813000
|
||||||
CVE-2023-27965,0,0,d36260e906ea921ae2b3b9889a511ed9b1581da9ad128bba673ca418057616ce,2024-11-21T07:53:48.973000
|
CVE-2023-27965,0,0,d36260e906ea921ae2b3b9889a511ed9b1581da9ad128bba673ca418057616ce,2024-11-21T07:53:48.973000
|
||||||
CVE-2023-27966,0,0,926402e8f275ea22b5d8bf82349144414fc85ac8fc75118d770d8a642c646911,2024-11-21T07:53:49.143000
|
CVE-2023-27966,0,0,926402e8f275ea22b5d8bf82349144414fc85ac8fc75118d770d8a642c646911,2024-11-21T07:53:49.143000
|
||||||
CVE-2023-27967,0,0,97e449f089e56958277363060aba143c547f4a3a525212eb9abf0ca467f18d6c,2024-11-21T07:53:49.307000
|
CVE-2023-27967,0,0,97e449f089e56958277363060aba143c547f4a3a525212eb9abf0ca467f18d6c,2024-11-21T07:53:49.307000
|
||||||
CVE-2023-27968,0,0,ea25c17c07b88b6ee4e5fc8bccf5dfa389009c4d4961141985a5e418ffcfa535,2024-11-21T07:53:49.467000
|
CVE-2023-27968,0,0,ea25c17c07b88b6ee4e5fc8bccf5dfa389009c4d4961141985a5e418ffcfa535,2024-11-21T07:53:49.467000
|
||||||
CVE-2023-27969,0,0,aec985448b073ea3a12106b568bc9c3bda401ddac1bb7a15ef47d6766b6912c1,2024-11-21T07:53:49.623000
|
CVE-2023-27969,0,1,f1f20ce6904cc30931a6abbcfb3f675aed7b844d1bf572e2b498faf5dc0064d5,2024-12-12T14:26:18.893000
|
||||||
CVE-2023-2797,0,0,fb89d0dd696fa3fd3bf50998e2011f08d07f94aacecb091584283fafb9123a12,2024-11-21T07:59:18.557000
|
CVE-2023-2797,0,0,fb89d0dd696fa3fd3bf50998e2011f08d07f94aacecb091584283fafb9123a12,2024-11-21T07:59:18.557000
|
||||||
CVE-2023-27970,0,0,cc1a16777cc160ceca0d8afbf6014f2059efe85d8b717e0800fa446e6f62d6eb,2024-11-21T07:53:50.370000
|
CVE-2023-27970,0,1,b35fd2e501512d070ab8abb0064d9cb019af1ee0a86e5172680f09686df7094e,2024-12-12T14:26:18.893000
|
||||||
CVE-2023-27971,0,0,697871038e9f195dda48b8c3a640aa8bbf063c21a5ff59442a2ac68d2ea6c782,2024-11-21T07:53:50.490000
|
CVE-2023-27971,0,0,697871038e9f195dda48b8c3a640aa8bbf063c21a5ff59442a2ac68d2ea6c782,2024-11-21T07:53:50.490000
|
||||||
CVE-2023-27972,0,0,420429654e9bf1c36921c5fb5ba9fd2a3cef17c110a30df72aaea78d27cfc78c,2024-11-21T07:53:50.660000
|
CVE-2023-27972,0,0,420429654e9bf1c36921c5fb5ba9fd2a3cef17c110a30df72aaea78d27cfc78c,2024-11-21T07:53:50.660000
|
||||||
CVE-2023-27973,0,0,d08fe914a7a90b67c8fff32446e07617af2ab2e8c1d32e40b6c83140c1b3a4f8,2024-11-21T07:53:50.817000
|
CVE-2023-27973,0,0,d08fe914a7a90b67c8fff32446e07617af2ab2e8c1d32e40b6c83140c1b3a4f8,2024-11-21T07:53:50.817000
|
||||||
@ -221697,12 +221697,12 @@ CVE-2023-28174,0,0,bb6ef0d47e13701e185c1c10861c5818ee389d356cb605662b90bf06d12e6
|
|||||||
CVE-2023-28175,0,0,5522213ae06f55fcc5fb60c67fd4792ba0f4a7a1d16d7415fe6640350e531681,2024-11-21T07:54:32.270000
|
CVE-2023-28175,0,0,5522213ae06f55fcc5fb60c67fd4792ba0f4a7a1d16d7415fe6640350e531681,2024-11-21T07:54:32.270000
|
||||||
CVE-2023-28176,0,0,64aa2f78c2b021e48b0729a70932536afb67c7a5b590937c7bc2e491af2c742a,2024-11-21T07:54:32.463000
|
CVE-2023-28176,0,0,64aa2f78c2b021e48b0729a70932536afb67c7a5b590937c7bc2e491af2c742a,2024-11-21T07:54:32.463000
|
||||||
CVE-2023-28177,0,0,9eb43263c394b13747a003475f6d282a664de82a606e534bf935ab9c4aca3786,2024-11-21T07:54:32.600000
|
CVE-2023-28177,0,0,9eb43263c394b13747a003475f6d282a664de82a606e534bf935ab9c4aca3786,2024-11-21T07:54:32.600000
|
||||||
CVE-2023-28178,0,0,7637c9f743cbc59f55984cd66adc98a1a05f47d88a540a8adce2653b387e33df,2024-11-21T07:54:32.720000
|
CVE-2023-28178,0,1,bea5f49c485e4cbec3e11cd8d816ba700342509178a6f14df66ec06a05ec4418,2024-12-12T14:26:18.893000
|
||||||
CVE-2023-28179,0,0,870008b95a647a1114870423bafa8a6a05fdcb978c8b81dd449c39ea8b394b6f,2024-11-21T07:54:32.867000
|
CVE-2023-28179,0,0,870008b95a647a1114870423bafa8a6a05fdcb978c8b81dd449c39ea8b394b6f,2024-11-21T07:54:32.867000
|
||||||
CVE-2023-2818,0,0,735a9c6bb7b4e983aea153a48d7553aa85a0db10d10608cbd385e641830a2924,2024-11-21T07:59:20.993000
|
CVE-2023-2818,0,0,735a9c6bb7b4e983aea153a48d7553aa85a0db10d10608cbd385e641830a2924,2024-11-21T07:59:20.993000
|
||||||
CVE-2023-28180,0,0,0ce33ac5d5a2979c95d935bfd32b1833849725ddf91941f17d2054c2cf71e983,2024-11-21T07:54:32.993000
|
CVE-2023-28180,0,0,0ce33ac5d5a2979c95d935bfd32b1833849725ddf91941f17d2054c2cf71e983,2024-11-21T07:54:32.993000
|
||||||
CVE-2023-28181,0,0,8c3b49a14e81e3548ed1190a771a9989b01602aef264bdfd83bc8cfba49cf1e8,2024-11-21T07:54:33.123000
|
CVE-2023-28181,0,1,999111fcedce705b76e3e07cc47b0246fcb4defa65f9b7837c9509cbfa4cca3d,2024-12-12T14:26:18.893000
|
||||||
CVE-2023-28182,0,0,52274ab3f7c6e0181a35c728f9b6861a008e705abe1a49138afe47022b4ef72d,2024-11-21T07:54:33.267000
|
CVE-2023-28182,0,1,8a71ead8d7c1a5607dfede369db99ac87448a4e203e347ef760c72939cd497f4,2024-12-12T14:26:18.893000
|
||||||
CVE-2023-28185,0,0,daea7675bd9566307ac8ce74e72790c4119b91a66b24f2f9152cc8c5ddb3b31c,2024-11-21T07:54:33.430000
|
CVE-2023-28185,0,0,daea7675bd9566307ac8ce74e72790c4119b91a66b24f2f9152cc8c5ddb3b31c,2024-11-21T07:54:33.430000
|
||||||
CVE-2023-28187,0,0,40a29a1b4bc9415b4849d4f34e04745eda7dc3fb7e002919cc6706a7403562d0,2024-11-21T07:54:33.587000
|
CVE-2023-28187,0,0,40a29a1b4bc9415b4849d4f34e04745eda7dc3fb7e002919cc6706a7403562d0,2024-11-21T07:54:33.587000
|
||||||
CVE-2023-28188,0,0,25a78be88c94d9bf595f284b54e423d2516fc344a5483e69e2bfc4dddd4809a5,2024-11-21T07:54:33.713000
|
CVE-2023-28188,0,0,25a78be88c94d9bf595f284b54e423d2516fc344a5483e69e2bfc4dddd4809a5,2024-11-21T07:54:33.713000
|
||||||
@ -221711,20 +221711,20 @@ CVE-2023-2819,0,0,3b247f5e1d6c37a7d71b49d023a88849ee6321753c3431bf9020211da96c53
|
|||||||
CVE-2023-28190,0,0,1f82ddef5936295dcf73abb8973b0ae3383f3e5f03fdeb02923fe9c8639f3f86,2024-11-21T07:54:33.977000
|
CVE-2023-28190,0,0,1f82ddef5936295dcf73abb8973b0ae3383f3e5f03fdeb02923fe9c8639f3f86,2024-11-21T07:54:33.977000
|
||||||
CVE-2023-28191,0,0,6664ec9e1968effd5625736bb352c1ff2957736653242e5c49084c5c4ffb4a69,2024-12-05T17:15:07.650000
|
CVE-2023-28191,0,0,6664ec9e1968effd5625736bb352c1ff2957736653242e5c49084c5c4ffb4a69,2024-12-05T17:15:07.650000
|
||||||
CVE-2023-28192,0,0,bec9476248d838879f049cdff7c7fc6b9811ab932643e2b25e917dae2446625d,2024-11-21T07:54:34.230000
|
CVE-2023-28192,0,0,bec9476248d838879f049cdff7c7fc6b9811ab932643e2b25e917dae2446625d,2024-11-21T07:54:34.230000
|
||||||
CVE-2023-28194,0,0,7c1d9184bb1bbb126559590d90c2a6db03c6e5c3683b0976cc866e5be35f39a5,2024-11-21T07:54:34.360000
|
CVE-2023-28194,0,1,ef88e882c90ab27eed46eeb54efd34e0f525019b73601447931aa3df0fde4727,2024-12-12T14:26:18.893000
|
||||||
CVE-2023-28195,0,0,8cbb6e52e93eaa1b59d3b6c05cd65ee9bba3ab7a0f8a3e99e51be3ea64c9a34c,2024-11-21T07:54:34.510000
|
CVE-2023-28195,0,0,8cbb6e52e93eaa1b59d3b6c05cd65ee9bba3ab7a0f8a3e99e51be3ea64c9a34c,2024-11-21T07:54:34.510000
|
||||||
CVE-2023-28197,0,0,b0028e40b4402ddcd64e533b5a9757c40af44232ee19051239601e0493f7972c,2024-11-21T07:54:34.650000
|
CVE-2023-28197,0,0,b0028e40b4402ddcd64e533b5a9757c40af44232ee19051239601e0493f7972c,2024-11-21T07:54:34.650000
|
||||||
CVE-2023-28198,0,0,ae34c1a56fa2108ed8ad4fc0a54302c4b1d1b763dabdc5146efb236d14a3dd22,2024-11-21T07:54:34.807000
|
CVE-2023-28198,0,0,ae34c1a56fa2108ed8ad4fc0a54302c4b1d1b763dabdc5146efb236d14a3dd22,2024-11-21T07:54:34.807000
|
||||||
CVE-2023-28199,0,0,05af04328d433371a3ddd30f536d3a6762568cdfa59840d0a9294deef10b4e5a,2024-11-21T07:54:34.960000
|
CVE-2023-28199,0,0,05af04328d433371a3ddd30f536d3a6762568cdfa59840d0a9294deef10b4e5a,2024-11-21T07:54:34.960000
|
||||||
CVE-2023-2820,0,0,08d715925f7f5014699cb2db19e7ec85cff308a1685def5e596523dd96401861,2024-11-21T07:59:21.230000
|
CVE-2023-2820,0,0,08d715925f7f5014699cb2db19e7ec85cff308a1685def5e596523dd96401861,2024-11-21T07:59:21.230000
|
||||||
CVE-2023-28200,0,0,22779f2fd2da8a96c7f3f5c92aa1445c68699ef8eec81c0220095c315e6bab45,2024-11-21T07:54:35.097000
|
CVE-2023-28200,0,0,22779f2fd2da8a96c7f3f5c92aa1445c68699ef8eec81c0220095c315e6bab45,2024-11-21T07:54:35.097000
|
||||||
CVE-2023-28201,0,0,3b72ed119c38ad447e20db50b0e204b6f9722af31a874e645fb433c1d71f7dcd,2024-11-21T07:54:35.273000
|
CVE-2023-28201,0,1,d32f98dffd71069baa9e03e46c720b8409c7128c98bb12bcc06703a79fa5daf0,2024-12-12T14:26:18.893000
|
||||||
CVE-2023-28202,0,0,191014a0200c592d291fa5fba60b126bce7fe013f7105ee7dd188bda0cdcf7fe,2024-12-05T17:15:07.837000
|
CVE-2023-28202,0,0,191014a0200c592d291fa5fba60b126bce7fe013f7105ee7dd188bda0cdcf7fe,2024-12-05T17:15:07.837000
|
||||||
CVE-2023-28203,0,0,4cb19dbc67823a1f2ef0f3a0d6b749db68c9403e1ae6273e5d0d612a7d2831a7,2024-11-21T07:54:35.627000
|
CVE-2023-28203,0,0,4cb19dbc67823a1f2ef0f3a0d6b749db68c9403e1ae6273e5d0d612a7d2831a7,2024-11-21T07:54:35.627000
|
||||||
CVE-2023-28204,0,0,d29b1bc8f2cad26e0d01ee6d8c1150ddfc2761a38a4996cd387e5b09f29ccca7,2024-11-21T07:54:35.760000
|
CVE-2023-28204,0,0,d29b1bc8f2cad26e0d01ee6d8c1150ddfc2761a38a4996cd387e5b09f29ccca7,2024-11-21T07:54:35.760000
|
||||||
CVE-2023-28205,0,0,5c84232494f2fcfdae49b4240e0969a21c90ed06bcedd6171dec390938943816,2024-11-21T07:54:35.903000
|
CVE-2023-28205,0,0,5c84232494f2fcfdae49b4240e0969a21c90ed06bcedd6171dec390938943816,2024-11-21T07:54:35.903000
|
||||||
CVE-2023-28206,0,0,133d94b27a1b3c7e7df5cecbef9facfa4e231a0ac0e323a888a6687ed2719316,2024-11-21T07:54:36.043000
|
CVE-2023-28206,0,0,133d94b27a1b3c7e7df5cecbef9facfa4e231a0ac0e323a888a6687ed2719316,2024-11-21T07:54:36.043000
|
||||||
CVE-2023-28208,0,0,97dff423f8f1e3be9864012295c3835e29519579b102a6cf74bb95e7ae7457ca,2024-11-21T07:54:36.180000
|
CVE-2023-28208,0,1,8fc033bc09b7b40815121b04865c55bdd349e84c32a87bcecfbf9bec0bf2a61e,2024-12-12T14:26:18.893000
|
||||||
CVE-2023-28209,0,0,ae4ef08c6845cc374897f4c97156cf6614c7c1aa7babc4b8a598ea53ad27998a,2024-11-21T07:54:36.330000
|
CVE-2023-28209,0,0,ae4ef08c6845cc374897f4c97156cf6614c7c1aa7babc4b8a598ea53ad27998a,2024-11-21T07:54:36.330000
|
||||||
CVE-2023-28210,0,0,0a0bf3ceb4448c02d2ec01f4d787a866c183ef21b5c4e0a2261156a4b2c55497,2024-11-21T07:54:36.460000
|
CVE-2023-28210,0,0,0a0bf3ceb4448c02d2ec01f4d787a866c183ef21b5c4e0a2261156a4b2c55497,2024-11-21T07:54:36.460000
|
||||||
CVE-2023-28211,0,0,2c47262728ad176602183272ee6e13d09c3d058aa1bc5e5323714b37fe246b7d,2024-11-21T07:54:36.583000
|
CVE-2023-28211,0,0,2c47262728ad176602183272ee6e13d09c3d058aa1bc5e5323714b37fe246b7d,2024-11-21T07:54:36.583000
|
||||||
@ -225019,19 +225019,19 @@ CVE-2023-32421,0,0,d77d924a3f2984827f1e9563a2e4b6b5331da9100b5eceb620082e3d44ec5
|
|||||||
CVE-2023-32422,0,0,73d03fdf9e33246a7bce76c8257d96b2959f868905ce0c084bd026fd40188c02,2024-11-21T08:03:19.437000
|
CVE-2023-32422,0,0,73d03fdf9e33246a7bce76c8257d96b2959f868905ce0c084bd026fd40188c02,2024-11-21T08:03:19.437000
|
||||||
CVE-2023-32423,0,0,649c1fea8bb358cdb986652674a08f896a4ce22aa152f5b6c01d3129a8e957eb,2024-11-21T08:03:19.570000
|
CVE-2023-32423,0,0,649c1fea8bb358cdb986652674a08f896a4ce22aa152f5b6c01d3129a8e957eb,2024-11-21T08:03:19.570000
|
||||||
CVE-2023-32424,0,0,683ff3dc266ba5113bf26052502eced1eeaa3aa9593de767afbcbc26a6c1779e,2024-11-21T08:03:19.700000
|
CVE-2023-32424,0,0,683ff3dc266ba5113bf26052502eced1eeaa3aa9593de767afbcbc26a6c1779e,2024-11-21T08:03:19.700000
|
||||||
CVE-2023-32425,0,0,39836bfbe0295959a92d652492761b12c48e6823b1a995ccaa96dc3a48ccfcdd,2024-11-21T08:03:19.813000
|
CVE-2023-32425,0,1,5d12e602e911c4507fec6203eb76478f80fb57b35ff46e09bf5daa53d5a2bd48,2024-12-12T14:26:18.893000
|
||||||
CVE-2023-32426,0,0,fd77e42b4f67240428062c33ae76dc6a71f3f5905a3245c0ec491d905903d45f,2024-11-21T08:03:19.950000
|
CVE-2023-32426,0,0,fd77e42b4f67240428062c33ae76dc6a71f3f5905a3245c0ec491d905903d45f,2024-11-21T08:03:19.950000
|
||||||
CVE-2023-32427,0,0,cc5468223a597b0de35ba767fe8127d59a8f1edf477272ab39a011b2f2e623cf,2024-11-21T08:03:20.073000
|
CVE-2023-32427,0,0,cc5468223a597b0de35ba767fe8127d59a8f1edf477272ab39a011b2f2e623cf,2024-11-21T08:03:20.073000
|
||||||
CVE-2023-32428,0,0,0bddf2fc6550a659e04b093c9b541c0a819887627184b4b3f6cdfff36372e41f,2024-11-21T08:03:20.187000
|
CVE-2023-32428,0,1,99205db1a770f47b11ac7d95d5ca84c04e16d667c5b63388f13a2ae357684f4a,2024-12-12T14:26:18.893000
|
||||||
CVE-2023-32429,0,0,e46e02f258d51635ab5ef8bab6d35855f35e56d76662f17aff3e32f728cfd595,2024-11-21T08:03:20.323000
|
CVE-2023-32429,0,0,e46e02f258d51635ab5ef8bab6d35855f35e56d76662f17aff3e32f728cfd595,2024-11-21T08:03:20.323000
|
||||||
CVE-2023-3243,0,0,f39d9207aa51a4f50a921684a93aa08e98ddf85594ad1964d7ef7666e323d0b4,2024-11-21T08:16:47.080000
|
CVE-2023-3243,0,0,f39d9207aa51a4f50a921684a93aa08e98ddf85594ad1964d7ef7666e323d0b4,2024-11-21T08:16:47.080000
|
||||||
CVE-2023-32432,0,0,3457420e2926628d4a5f489bc2d76177c685a7bb7de12f00747929ed6add3b53,2024-11-21T08:03:20.447000
|
CVE-2023-32432,0,1,71739248fbd9019ee6d1ece6530111937bb9544f2912c4f6af9b8290fb231108,2024-12-12T14:26:18.893000
|
||||||
CVE-2023-32433,0,0,3162dd87a2e4be71b01dab05d4d5586614c514c9e744874d06bf9242d1982a79,2024-11-21T08:03:20.587000
|
CVE-2023-32433,0,0,3162dd87a2e4be71b01dab05d4d5586614c514c9e744874d06bf9242d1982a79,2024-11-21T08:03:20.587000
|
||||||
CVE-2023-32434,0,0,e19845805e2c170e35da29433d90257184d040282660e03dff9d0164e8aa4f87,2024-11-21T08:03:20.717000
|
CVE-2023-32434,0,0,e19845805e2c170e35da29433d90257184d040282660e03dff9d0164e8aa4f87,2024-11-21T08:03:20.717000
|
||||||
CVE-2023-32435,0,0,8ba5c35ba3d4096c020898ee1b826ad36545f20cab90f7a54bedc2fe478ba0be,2024-11-21T08:03:20.847000
|
CVE-2023-32435,0,0,8ba5c35ba3d4096c020898ee1b826ad36545f20cab90f7a54bedc2fe478ba0be,2024-11-21T08:03:20.847000
|
||||||
CVE-2023-32436,0,0,b1838bad592f8061b6d9a4a9063867063ed3bb06a03b6ff3b7dfcbddf25b174f,2024-11-21T08:03:20.970000
|
CVE-2023-32436,0,0,b1838bad592f8061b6d9a4a9063867063ed3bb06a03b6ff3b7dfcbddf25b174f,2024-11-21T08:03:20.970000
|
||||||
CVE-2023-32437,0,0,34cb0d82da59eadf72e035d71ce27268fe5640e446349555ae0be1c644a830f4,2024-11-21T08:03:21.103000
|
CVE-2023-32437,0,0,34cb0d82da59eadf72e035d71ce27268fe5640e446349555ae0be1c644a830f4,2024-11-21T08:03:21.103000
|
||||||
CVE-2023-32438,0,0,d49d74a9791b71f07c54fe8fb9cdbfa9168c1fa0f56fb0fabd1ac40a4e25eec4,2024-11-21T08:03:21.223000
|
CVE-2023-32438,0,1,a00014ad87ef16329a1ad28e21cf98311827d59fe3cfcc6d54ef64a64fea0ed4,2024-12-12T14:26:18.893000
|
||||||
CVE-2023-32439,0,0,2ce1da5abff5d1853b37c29dc7ead4fe975de63113cb782df730a53c27083887,2024-11-21T08:03:21.347000
|
CVE-2023-32439,0,0,2ce1da5abff5d1853b37c29dc7ead4fe975de63113cb782df730a53c27083887,2024-11-21T08:03:21.347000
|
||||||
CVE-2023-3244,0,0,01470d499b32ea5cba53fbc6c2839f629c628a66441361005d09811a2b604954,2024-11-21T08:16:47.233000
|
CVE-2023-3244,0,0,01470d499b32ea5cba53fbc6c2839f629c628a66441361005d09811a2b604954,2024-11-21T08:16:47.233000
|
||||||
CVE-2023-32441,0,0,aaaa4d579ed908d0b9e7528ac9c558ea7a2bc165ae2989c8a5559d52e290963e,2024-11-21T08:03:21.477000
|
CVE-2023-32441,0,0,aaaa4d579ed908d0b9e7528ac9c558ea7a2bc165ae2989c8a5559d52e290963e,2024-11-21T08:03:21.477000
|
||||||
@ -226644,7 +226644,7 @@ CVE-2023-34349,0,0,06a40335d163da4fe7518e3f18c085a7bad1b6af503d4a45984fd2a1475ec
|
|||||||
CVE-2023-3435,0,0,e98f90f1d1fb2158c9d2c3adfd2e45e18bb6bf237e3d0fdce7cb8b06122d1303,2024-11-21T08:17:15.720000
|
CVE-2023-3435,0,0,e98f90f1d1fb2158c9d2c3adfd2e45e18bb6bf237e3d0fdce7cb8b06122d1303,2024-11-21T08:17:15.720000
|
||||||
CVE-2023-34350,0,0,682f1db060a4b8706d3ec2edf54dde23ce60e433eb3e296270782b2877db6c4e,2024-11-21T08:07:04.420000
|
CVE-2023-34350,0,0,682f1db060a4b8706d3ec2edf54dde23ce60e433eb3e296270782b2877db6c4e,2024-11-21T08:07:04.420000
|
||||||
CVE-2023-34351,0,0,fa851bda5a3d465a6e27ad470e5caf4c9af9d0323fd45a49d2d5ae5f9274c999,2024-11-21T08:07:04.560000
|
CVE-2023-34351,0,0,fa851bda5a3d465a6e27ad470e5caf4c9af9d0323fd45a49d2d5ae5f9274c999,2024-11-21T08:07:04.560000
|
||||||
CVE-2023-34352,0,0,b92adc2c91891f8c8bd1a2086316d683b3081e8e5b3272d5cb1844152fd723a4,2024-11-21T08:07:04.700000
|
CVE-2023-34352,0,1,f72b1e6219a280c1523515e862a1044a3418ce987e6197cc5fa4a86813d27361,2024-12-12T14:26:18.893000
|
||||||
CVE-2023-34353,0,0,b831cf02b0c0b5c8a4a06f1a983e4a3856cb9f0d37d5c8519af0e0014ef4c403,2024-11-21T08:07:04.850000
|
CVE-2023-34353,0,0,b831cf02b0c0b5c8a4a06f1a983e4a3856cb9f0d37d5c8519af0e0014ef4c403,2024-11-21T08:07:04.850000
|
||||||
CVE-2023-34354,0,0,a7af9aca49302ffb07c43a9f3f2ad659aa1bf706c207249117dee1313093aa83,2024-11-21T08:07:04.973000
|
CVE-2023-34354,0,0,a7af9aca49302ffb07c43a9f3f2ad659aa1bf706c207249117dee1313093aa83,2024-11-21T08:07:04.973000
|
||||||
CVE-2023-34355,0,0,ab6ae2eec5861033eae892aa10db430640863fe78fae4652af121597a8d70a8c,2024-11-21T08:07:05.123000
|
CVE-2023-34355,0,0,ab6ae2eec5861033eae892aa10db430640863fe78fae4652af121597a8d70a8c,2024-11-21T08:07:05.123000
|
||||||
@ -229287,7 +229287,7 @@ CVE-2023-38131,0,0,611709636100c69cf6d6cb78f5118ad5d0f848c4469c2e54b68cb7b55c4e9
|
|||||||
CVE-2023-38132,0,0,bef6620e894452da9f54317308d5e61f7e24da5d400717d71860cadee3e4de3f,2024-11-21T08:12:55.523000
|
CVE-2023-38132,0,0,bef6620e894452da9f54317308d5e61f7e24da5d400717d71860cadee3e4de3f,2024-11-21T08:12:55.523000
|
||||||
CVE-2023-38133,0,0,bb1189864474e7e88f0d93b35a80586c835dccabaae15f84263f8600a9354fae,2024-11-21T08:12:55.660000
|
CVE-2023-38133,0,0,bb1189864474e7e88f0d93b35a80586c835dccabaae15f84263f8600a9354fae,2024-11-21T08:12:55.660000
|
||||||
CVE-2023-38135,0,0,a9eca0d1487abab7057a92f32328b56c514faa78c668f86dc1cd7bba91171771,2024-11-21T08:12:55.817000
|
CVE-2023-38135,0,0,a9eca0d1487abab7057a92f32328b56c514faa78c668f86dc1cd7bba91171771,2024-11-21T08:12:55.817000
|
||||||
CVE-2023-38136,0,0,3c6a0b74ba4978fedab7de07869f2d1a9bf8eca18ba7d357cb5ae683187d28a9,2024-11-21T08:12:55.960000
|
CVE-2023-38136,0,1,cc4955f78f48feea52a8ff9bece7ccf895118e79124cbc89767e10212b3e4ba9,2024-12-12T14:26:18.893000
|
||||||
CVE-2023-38137,0,0,1cec05d7be20edcda40f67c7c6ac8d770b26a8316863ab68482af52d2669688c,2024-02-14T18:15:45.880000
|
CVE-2023-38137,0,0,1cec05d7be20edcda40f67c7c6ac8d770b26a8316863ab68482af52d2669688c,2024-02-14T18:15:45.880000
|
||||||
CVE-2023-38138,0,0,1f64720a33a48dc733e35902253cb6213fd10f67a3ac3695889a96fc8d42fddb,2024-11-21T08:12:56.123000
|
CVE-2023-38138,0,0,1f64720a33a48dc733e35902253cb6213fd10f67a3ac3695889a96fc8d42fddb,2024-11-21T08:12:56.123000
|
||||||
CVE-2023-38139,0,0,bd4ed8d4efc52bf413d252e03d4fba6e7225df8c564b1d7faa7098fc0d8be3b0,2024-11-21T08:12:56.303000
|
CVE-2023-38139,0,0,bd4ed8d4efc52bf413d252e03d4fba6e7225df8c564b1d7faa7098fc0d8be3b0,2024-11-21T08:12:56.303000
|
||||||
@ -229413,7 +229413,7 @@ CVE-2023-38257,0,0,09d27492b5a9015c6faf62de453ab30551289fe6c5a01aabfd73be462e45e
|
|||||||
CVE-2023-38258,0,0,060aaace07f640fb2981b514ebc5317ede89a9f03b251196b17e0e6062544e74,2024-11-21T08:13:12.087000
|
CVE-2023-38258,0,0,060aaace07f640fb2981b514ebc5317ede89a9f03b251196b17e0e6062544e74,2024-11-21T08:13:12.087000
|
||||||
CVE-2023-38259,0,0,f6d385bc4e8d3b221a1165b408f81be680399ebe73ab3fa34e6177f5071258ba,2024-11-21T08:13:12.203000
|
CVE-2023-38259,0,0,f6d385bc4e8d3b221a1165b408f81be680399ebe73ab3fa34e6177f5071258ba,2024-11-21T08:13:12.203000
|
||||||
CVE-2023-3826,0,0,10a54531e4b61f73304f4069e0bd02e690466ff0531610c4169da8b0f580ffbb,2024-11-21T08:18:09.383000
|
CVE-2023-3826,0,0,10a54531e4b61f73304f4069e0bd02e690466ff0531610c4169da8b0f580ffbb,2024-11-21T08:18:09.383000
|
||||||
CVE-2023-38261,0,0,9c8a5ce57bd2d115944d5dfc607545d48cfcbb0fc96c1f8625fd34d52e4a8d2b,2024-11-21T08:13:12.347000
|
CVE-2023-38261,0,1,2765150f90d3f70e2a92d7223b49d2806afecaad25ea073a91c33f5490b79d20,2024-12-12T14:26:18.893000
|
||||||
CVE-2023-38262,0,0,dabd543aed0a40cc49d4f82115ae229069d2208d7b1db90cb5f4f183a1ca41d4,2024-02-14T18:15:45.920000
|
CVE-2023-38262,0,0,dabd543aed0a40cc49d4f82115ae229069d2208d7b1db90cb5f4f183a1ca41d4,2024-02-14T18:15:45.920000
|
||||||
CVE-2023-38263,0,0,eb0a88faca61f4b3b5594cac520716cbabbc0da206c5a5e1b79bc8ab8623a136,2024-11-21T08:13:12.477000
|
CVE-2023-38263,0,0,eb0a88faca61f4b3b5594cac520716cbabbc0da206c5a5e1b79bc8ab8623a136,2024-11-21T08:13:12.477000
|
||||||
CVE-2023-38264,0,0,69fec526bc04dafd94aa9d55c534d1f2dc5220ab7efc0e2e5709e1498fe131a0,2024-11-21T08:13:12.620000
|
CVE-2023-38264,0,0,69fec526bc04dafd94aa9d55c534d1f2dc5220ab7efc0e2e5709e1498fe131a0,2024-11-21T08:13:12.620000
|
||||||
@ -233076,7 +233076,7 @@ CVE-2023-42939,0,0,e616f5469a9d7bb93c6568524cd0da091acc5847091d9c388ddeadcb2cb5d
|
|||||||
CVE-2023-4294,0,0,fcd5217d18d35731ba36e8ff238f5a1bf98d496e576a6fdb93d816929d596780,2024-11-21T08:34:48.073000
|
CVE-2023-4294,0,0,fcd5217d18d35731ba36e8ff238f5a1bf98d496e576a6fdb93d816929d596780,2024-11-21T08:34:48.073000
|
||||||
CVE-2023-42940,0,0,081f1f083b0a5e08a4cc019094cc8130686f6068cec8c929ea7accb4db1ee05f,2024-11-21T08:23:33.703000
|
CVE-2023-42940,0,0,081f1f083b0a5e08a4cc019094cc8130686f6068cec8c929ea7accb4db1ee05f,2024-11-21T08:23:33.703000
|
||||||
CVE-2023-42941,0,0,19defc185372677244aebe3d5063652959898759c97be2163da9238e29c2177e,2024-11-21T08:23:33.820000
|
CVE-2023-42941,0,0,19defc185372677244aebe3d5063652959898759c97be2163da9238e29c2177e,2024-11-21T08:23:33.820000
|
||||||
CVE-2023-42942,0,0,3274b98a531cd08d74304340509fb78bde32a21b5cbacb575666b356fbaa6330,2024-12-03T20:40:10.397000
|
CVE-2023-42942,0,1,27e4c2c81073d4cfa2606c4ee2d9e468f15cec1dc91f380091e211ce6ab43fba,2024-12-12T14:26:18.893000
|
||||||
CVE-2023-42943,0,0,4348601e49a149ecf0cc722f6061370f0f19d3786dfa65f61a2443ae099f7801,2024-11-21T08:23:34.143000
|
CVE-2023-42943,0,0,4348601e49a149ecf0cc722f6061370f0f19d3786dfa65f61a2443ae099f7801,2024-11-21T08:23:34.143000
|
||||||
CVE-2023-42945,0,0,200d2323886607812ee6e5544cc7dd3d7a9d9cd1bbcf9fd4feec9eae73a4bb8a,2024-12-03T20:37:44.587000
|
CVE-2023-42945,0,0,200d2323886607812ee6e5544cc7dd3d7a9d9cd1bbcf9fd4feec9eae73a4bb8a,2024-12-03T20:37:44.587000
|
||||||
CVE-2023-42946,0,0,2f891640e91a360138828eb608ca23096bc37ddebdc3147d949a745dda2c8d29,2024-12-03T20:29:31.657000
|
CVE-2023-42946,0,0,2f891640e91a360138828eb608ca23096bc37ddebdc3147d949a745dda2c8d29,2024-12-03T20:29:31.657000
|
||||||
@ -233097,7 +233097,7 @@ CVE-2023-42959,0,0,e0711eaa631fd202edf70b35af742cf22eb3e7c7935db69f51becbb0419ea
|
|||||||
CVE-2023-4296,0,0,33ed9dd29ae54896f2c71a35c0cf4e6717a204ccdf2c2895c6a00d7ae9486fbd,2024-11-21T08:34:48.323000
|
CVE-2023-4296,0,0,33ed9dd29ae54896f2c71a35c0cf4e6717a204ccdf2c2895c6a00d7ae9486fbd,2024-11-21T08:34:48.323000
|
||||||
CVE-2023-42962,0,0,eae5b5f8f8786c59ec83e045e5108238e720128cfd3c327cba0cde631527ec1f,2024-11-21T08:23:37.137000
|
CVE-2023-42962,0,0,eae5b5f8f8786c59ec83e045e5108238e720128cfd3c327cba0cde631527ec1f,2024-11-21T08:23:37.137000
|
||||||
CVE-2023-4297,0,0,aab89ab1490fbae98144b9e8b7a1072e7027356d76454a4a729b99641cbaa65d,2024-11-21T08:34:48.470000
|
CVE-2023-4297,0,0,aab89ab1490fbae98144b9e8b7a1072e7027356d76454a4a729b99641cbaa65d,2024-11-21T08:34:48.470000
|
||||||
CVE-2023-42974,0,0,252a25f038a640dd8e95a4a1a78e56debc62bdfa87a9891793f33c790cd37bac,2024-12-09T16:46:58.417000
|
CVE-2023-42974,0,1,d29cf4c12f6bfc30add86b56c7cddf36ff797f915e589c9ccb7d83e046515203,2024-12-12T14:26:18.893000
|
||||||
CVE-2023-4298,0,0,4ed5d094ffd5dea0fd4531466e39c4acc00f223f7c93151de436797f2abc86a2,2024-11-21T08:34:48.657000
|
CVE-2023-4298,0,0,4ed5d094ffd5dea0fd4531466e39c4acc00f223f7c93151de436797f2abc86a2,2024-11-21T08:34:48.657000
|
||||||
CVE-2023-4299,0,0,2bb2546e4c2688f5cb6f960f37cc2f67d4a5cfbe4b334ba15f2c1261d771d0fa,2024-11-21T08:34:48.760000
|
CVE-2023-4299,0,0,2bb2546e4c2688f5cb6f960f37cc2f67d4a5cfbe4b334ba15f2c1261d771d0fa,2024-11-21T08:34:48.760000
|
||||||
CVE-2023-4300,0,0,723cb43892ca9bbdbe65bce2483f7097fa889e436033f6391408d357e0bbb2e1,2024-11-21T08:34:48.940000
|
CVE-2023-4300,0,0,723cb43892ca9bbdbe65bce2483f7097fa889e436033f6391408d357e0bbb2e1,2024-11-21T08:34:48.940000
|
||||||
@ -233939,7 +233939,7 @@ CVE-2023-44250,0,0,0d3ab2a5f1dbeb27bcf4620dc515d818236fb1035ed356fbc0f5888149a72
|
|||||||
CVE-2023-44251,0,0,210f76ac785503ef85f9f29e5171e770b552fc2f3cfa12b6a4e38e6574e41651,2024-11-21T08:25:31.357000
|
CVE-2023-44251,0,0,210f76ac785503ef85f9f29e5171e770b552fc2f3cfa12b6a4e38e6574e41651,2024-11-21T08:25:31.357000
|
||||||
CVE-2023-44252,0,0,63c2d146a5ae0206e5d18228794b49ab364e208a0889d0266333bc65ee223842,2024-11-21T08:25:31.487000
|
CVE-2023-44252,0,0,63c2d146a5ae0206e5d18228794b49ab364e208a0889d0266333bc65ee223842,2024-11-21T08:25:31.487000
|
||||||
CVE-2023-44253,0,0,05adddf01c28ccdadf157eaf7e699ca16a7f022edc42efc339913e2d8e614464,2024-11-21T08:25:31.610000
|
CVE-2023-44253,0,0,05adddf01c28ccdadf157eaf7e699ca16a7f022edc42efc339913e2d8e614464,2024-11-21T08:25:31.610000
|
||||||
CVE-2023-44254,0,0,75fe554063567aba06da5ccef57a53c326b8e18e0586e981e90c553f586b7eef,2024-09-25T20:17:40.970000
|
CVE-2023-44254,0,1,475ef6ce457d30d091835ffaf71dd3aad018d0e54862a597c59869af0501a514,2024-12-12T13:56:07.013000
|
||||||
CVE-2023-44255,0,0,7fdcb3d3de35862cfec3d92f0ef2423e8b11fe79c792f372bb9fd7b3037b5267,2024-11-13T17:01:16.850000
|
CVE-2023-44255,0,0,7fdcb3d3de35862cfec3d92f0ef2423e8b11fe79c792f372bb9fd7b3037b5267,2024-11-13T17:01:16.850000
|
||||||
CVE-2023-44256,0,0,e10f4305e62a4a76d73f69a54ab165b287870937a6bf5c86952e332366741db4,2024-11-21T08:25:31.910000
|
CVE-2023-44256,0,0,e10f4305e62a4a76d73f69a54ab165b287870937a6bf5c86952e332366741db4,2024-11-21T08:25:31.910000
|
||||||
CVE-2023-44257,0,0,f040c2562709814f3b28ce0b714c95a5032145d9cb2f2f01e6d99c6378dfa7ca,2024-11-21T08:25:32.047000
|
CVE-2023-44257,0,0,f040c2562709814f3b28ce0b714c95a5032145d9cb2f2f01e6d99c6378dfa7ca,2024-11-21T08:25:32.047000
|
||||||
@ -234938,7 +234938,7 @@ CVE-2023-45860,0,0,b0a232784c907c1d319e7c8804731be31abf0a0c725f224e6a540a389e724
|
|||||||
CVE-2023-45862,0,0,4892afe3223d3545625e1ee7b2caa991c4e28519ffdd4afa80b56977e6e0030f,2024-11-21T08:27:30.540000
|
CVE-2023-45862,0,0,4892afe3223d3545625e1ee7b2caa991c4e28519ffdd4afa80b56977e6e0030f,2024-11-21T08:27:30.540000
|
||||||
CVE-2023-45863,0,0,7e6255563636556e753e7796ac4af3aefa345ee4e82a777323f5f5fcecc58f6e,2024-11-21T08:27:30.690000
|
CVE-2023-45863,0,0,7e6255563636556e753e7796ac4af3aefa345ee4e82a777323f5f5fcecc58f6e,2024-11-21T08:27:30.690000
|
||||||
CVE-2023-45864,0,0,6a3294dace0ff40a3a50cced6d2b6adb0b901408877204e37fea3d62ba5ec23a,2024-11-21T08:27:30.837000
|
CVE-2023-45864,0,0,6a3294dace0ff40a3a50cced6d2b6adb0b901408877204e37fea3d62ba5ec23a,2024-11-21T08:27:30.837000
|
||||||
CVE-2023-45866,0,0,fb9ecaf46227551e005d097f3b17bdbb4fa1c3c2b6ae8ffbdb288c6caccc4b05,2024-11-21T08:27:31.013000
|
CVE-2023-45866,0,1,cbf7cac96fb95d80c4c713c037b13d635525c2b9e57b23d9fc1adcd43bf029b6,2024-12-12T14:33:00.640000
|
||||||
CVE-2023-45867,0,0,c5950548ba5293881c74b3a11f24edec7618fa48a1057b0edd5094fcf622e914,2024-11-21T08:27:31.230000
|
CVE-2023-45867,0,0,c5950548ba5293881c74b3a11f24edec7618fa48a1057b0edd5094fcf622e914,2024-11-21T08:27:31.230000
|
||||||
CVE-2023-45868,0,0,40b498079fd380f3efc8be05a7ecf8de93dab24618d65616aa0cb8c27082264e,2024-11-21T08:27:31.390000
|
CVE-2023-45868,0,0,40b498079fd380f3efc8be05a7ecf8de93dab24618d65616aa0cb8c27082264e,2024-11-21T08:27:31.390000
|
||||||
CVE-2023-45869,0,0,23f1d911a5119687fbd5eb685444cfff4088a5040669161b4e3b33c43519c795,2024-11-21T08:27:31.547000
|
CVE-2023-45869,0,0,23f1d911a5119687fbd5eb685444cfff4088a5040669161b4e3b33c43519c795,2024-11-21T08:27:31.547000
|
||||||
@ -237307,7 +237307,7 @@ CVE-2023-49060,0,0,4c0d752f52234ac5b2c5afa73fa3bd5f4d490c81b175ad6b9dd8f7509e06e
|
|||||||
CVE-2023-49061,0,0,7af406d30b2caa1b6fd7c257680f774d6fb0a30f02df3c6d99ace0a0c64683ce,2024-11-21T08:32:45.193000
|
CVE-2023-49061,0,0,7af406d30b2caa1b6fd7c257680f774d6fb0a30f02df3c6d99ace0a0c64683ce,2024-11-21T08:32:45.193000
|
||||||
CVE-2023-49062,0,0,3f72bcc43e8d39618a32732cc6fdb32aa26187117eb8dbf2cde612d2322c6a42,2024-11-21T08:32:45.310000
|
CVE-2023-49062,0,0,3f72bcc43e8d39618a32732cc6fdb32aa26187117eb8dbf2cde612d2322c6a42,2024-11-21T08:32:45.310000
|
||||||
CVE-2023-49068,0,0,f934d451589c0486639c7452250c50f87bff70e169120c3b6e2d48b968d911f7,2024-11-21T08:32:45.430000
|
CVE-2023-49068,0,0,f934d451589c0486639c7452250c50f87bff70e169120c3b6e2d48b968d911f7,2024-11-21T08:32:45.430000
|
||||||
CVE-2023-49069,0,0,e77673261bbd774d10e127672f71f84c304f9e77431045eed106775d130e9272,2024-12-10T14:30:36.767000
|
CVE-2023-49069,0,1,4dd675a4bcdd715ef5af8de81fad90e175fe51ef7fad884ab7b4c5fc97c6ff60,2024-12-12T14:15:20.450000
|
||||||
CVE-2023-4907,0,0,90be30672dd3ea93872990567976373933c812f92a368cb35abe26c70cc23ea6,2024-11-21T08:36:14.203000
|
CVE-2023-4907,0,0,90be30672dd3ea93872990567976373933c812f92a368cb35abe26c70cc23ea6,2024-11-21T08:36:14.203000
|
||||||
CVE-2023-49070,0,0,9c3d4a270f963f36dd20306a853b062b27d681d986a9a2c3bace9e52f7eaf712,2024-11-21T08:32:45.697000
|
CVE-2023-49070,0,0,9c3d4a270f963f36dd20306a853b062b27d681d986a9a2c3bace9e52f7eaf712,2024-11-21T08:32:45.697000
|
||||||
CVE-2023-49073,0,0,a59c7f971c52a4d5004cf2ba397f8b1bff7a40aa00abdd575b19a18ae50de0c5,2024-11-21T08:32:45.843000
|
CVE-2023-49073,0,0,a59c7f971c52a4d5004cf2ba397f8b1bff7a40aa00abdd575b19a18ae50de0c5,2024-11-21T08:32:45.843000
|
||||||
@ -242915,7 +242915,7 @@ CVE-2024-10038,0,0,ebd3b63d92012ddaf16057a534e828f3dfcac6a3eb398c1c9f9e757273980
|
|||||||
CVE-2024-1004,0,0,c4dbb102401f2137e0b8cd1bff949d2b544d9c71a1e20b6681f553badf7e1df2,2024-11-21T08:49:34.290000
|
CVE-2024-1004,0,0,c4dbb102401f2137e0b8cd1bff949d2b544d9c71a1e20b6681f553badf7e1df2,2024-11-21T08:49:34.290000
|
||||||
CVE-2024-10040,0,0,f83eb1bf0d191e6ff28c64987d9d925532ba47fbade95b4f2582be8beaa243b5,2024-11-01T18:26:23.450000
|
CVE-2024-10040,0,0,f83eb1bf0d191e6ff28c64987d9d925532ba47fbade95b4f2582be8beaa243b5,2024-11-01T18:26:23.450000
|
||||||
CVE-2024-10041,0,0,4b41dd5debbc084bf5e0606c70490ab13b95ffcedabf63fcff7e5a18674f516d,2024-11-26T16:15:09.230000
|
CVE-2024-10041,0,0,4b41dd5debbc084bf5e0606c70490ab13b95ffcedabf63fcff7e5a18674f516d,2024-11-26T16:15:09.230000
|
||||||
CVE-2024-10043,1,1,13688c90cdf23efa99c353df702bf2684b23a45eac1ab5206f484e4389a2d62e,2024-12-12T12:15:21.330000
|
CVE-2024-10043,0,0,13688c90cdf23efa99c353df702bf2684b23a45eac1ab5206f484e4389a2d62e,2024-12-12T12:15:21.330000
|
||||||
CVE-2024-10045,0,0,856fc9a539db9327702f3141fe8cd970de60cdb7e18125e39405eb0d41f31999,2024-10-25T18:52:30.337000
|
CVE-2024-10045,0,0,856fc9a539db9327702f3141fe8cd970de60cdb7e18125e39405eb0d41f31999,2024-10-25T18:52:30.337000
|
||||||
CVE-2024-10046,0,0,b787fcdd5d7d124fce0b1d064cdbebb0879583867f2aea1259fc81f5d70c4638,2024-12-07T02:15:17.543000
|
CVE-2024-10046,0,0,b787fcdd5d7d124fce0b1d064cdbebb0879583867f2aea1259fc81f5d70c4638,2024-12-07T02:15:17.543000
|
||||||
CVE-2024-10048,0,0,ecbd52d9f528e72b1a462b39f0bdabc3e6386a862771af6a7927a393730bf0a7,2024-10-29T14:34:04.427000
|
CVE-2024-10048,0,0,ecbd52d9f528e72b1a462b39f0bdabc3e6386a862771af6a7927a393730bf0a7,2024-10-29T14:34:04.427000
|
||||||
@ -243884,7 +243884,7 @@ CVE-2024-11263,0,0,cc23e994a38bc31df951aa6a58125fc0f0777c81e47c57f81b464948cdbf2
|
|||||||
CVE-2024-11265,0,0,cd84e375ba34be8f1d8c0a95984eed473f1b4c14b99dc4b41ab53021d7d29454,2024-11-23T06:15:18.310000
|
CVE-2024-11265,0,0,cd84e375ba34be8f1d8c0a95984eed473f1b4c14b99dc4b41ab53021d7d29454,2024-11-23T06:15:18.310000
|
||||||
CVE-2024-11268,0,0,40373fcd315fe487c851607fe3ac45b00147e2cbb2f06b71a2f20cd5b3490696,2024-12-09T18:15:22.120000
|
CVE-2024-11268,0,0,40373fcd315fe487c851607fe3ac45b00147e2cbb2f06b71a2f20cd5b3490696,2024-12-09T18:15:22.120000
|
||||||
CVE-2024-1127,0,0,156ab4f781dcbea8349dccaf03d8331b37e207b23f13868177d2fc6d72956211,2024-11-21T08:49:51.547000
|
CVE-2024-1127,0,0,156ab4f781dcbea8349dccaf03d8331b37e207b23f13868177d2fc6d72956211,2024-11-21T08:49:51.547000
|
||||||
CVE-2024-11274,1,1,68416047580eaaa72dd4e9ca219e395346d31290ba0ce8919ace0c1ae20f7ea4,2024-12-12T12:15:22.267000
|
CVE-2024-11274,0,0,68416047580eaaa72dd4e9ca219e395346d31290ba0ce8919ace0c1ae20f7ea4,2024-12-12T12:15:22.267000
|
||||||
CVE-2024-11276,0,0,bec6f6d7f70ddc5f33f40077c2ca48024f960e5925873d26e2cd076944abd586,2024-12-06T09:15:05.827000
|
CVE-2024-11276,0,0,bec6f6d7f70ddc5f33f40077c2ca48024f960e5925873d26e2cd076944abd586,2024-12-06T09:15:05.827000
|
||||||
CVE-2024-11277,0,0,70fa881c494ed4e8a3131fb313821feca0fce09e01d4dad197524b7869b481b5,2024-11-26T20:59:50.643000
|
CVE-2024-11277,0,0,70fa881c494ed4e8a3131fb313821feca0fce09e01d4dad197524b7869b481b5,2024-11-26T20:59:50.643000
|
||||||
CVE-2024-11278,0,0,3f323ea4c088ae11099db65ea7e4647c3e5f880422ea2bf5351a2656e281a2c7,2024-11-21T13:57:24.187000
|
CVE-2024-11278,0,0,3f323ea4c088ae11099db65ea7e4647c3e5f880422ea2bf5351a2656e281a2c7,2024-11-21T13:57:24.187000
|
||||||
@ -244476,11 +244476,12 @@ CVE-2024-12263,0,0,26e6f6662d9a18b231b0aa6c025b39b781c192581d3251c6a28c1443632d6
|
|||||||
CVE-2024-12265,0,0,08a405cbd3278593ec8a61d1242715139e8d63dafea3d02ca0fbe833f73b571d,2024-12-12T06:15:24.143000
|
CVE-2024-12265,0,0,08a405cbd3278593ec8a61d1242715139e8d63dafea3d02ca0fbe833f73b571d,2024-12-12T06:15:24.143000
|
||||||
CVE-2024-1227,0,0,2b74966c63acb4b53db9100814c0ea98b900c2b18de594c13a326b21bfb265c8,2024-11-21T08:50:06.103000
|
CVE-2024-1227,0,0,2b74966c63acb4b53db9100814c0ea98b900c2b18de594c13a326b21bfb265c8,2024-11-21T08:50:06.103000
|
||||||
CVE-2024-12270,0,0,39bcf28b0c7f0c2cc7925c4c71867c3d58c667f7e488518c8c9808ae3acf42cd,2024-12-07T10:15:06.200000
|
CVE-2024-12270,0,0,39bcf28b0c7f0c2cc7925c4c71867c3d58c667f7e488518c8c9808ae3acf42cd,2024-12-07T10:15:06.200000
|
||||||
|
CVE-2024-12271,1,1,c0650f03cca9644a90682266e664ccabbc04f0f372266c55d1404f09537e354b,2024-12-12T13:15:07.570000
|
||||||
CVE-2024-1228,0,0,02a2d35b9c29d8600ba5afee210d0e6465f5ee41eb5d9edcafc9d5f9e15f44ef,2024-11-21T08:50:06.280000
|
CVE-2024-1228,0,0,02a2d35b9c29d8600ba5afee210d0e6465f5ee41eb5d9edcafc9d5f9e15f44ef,2024-11-21T08:50:06.280000
|
||||||
CVE-2024-12283,0,0,dca4df71f894f590cb0f5d26cfe1803e25114c809f761c64773c44a35cabeb38,2024-12-11T09:15:05.697000
|
CVE-2024-12283,0,0,dca4df71f894f590cb0f5d26cfe1803e25114c809f761c64773c44a35cabeb38,2024-12-11T09:15:05.697000
|
||||||
CVE-2024-12286,0,0,fd7295e26214e392d9cfe3b72df0f6a777b0e479184a2a0c173af7d7cc4270a2,2024-12-10T18:15:27.150000
|
CVE-2024-12286,0,0,fd7295e26214e392d9cfe3b72df0f6a777b0e479184a2a0c173af7d7cc4270a2,2024-12-10T18:15:27.150000
|
||||||
CVE-2024-1229,0,0,8ad8bfe76844e757ec6d08a1bad2f097b99b608e965943a6e4928e217dfee4df,2024-11-21T08:50:06.520000
|
CVE-2024-1229,0,0,8ad8bfe76844e757ec6d08a1bad2f097b99b608e965943a6e4928e217dfee4df,2024-11-21T08:50:06.520000
|
||||||
CVE-2024-12292,1,1,e027faa06b5953369db62292a4b64efc1354409048616ace4830c061b024cddd,2024-12-12T12:15:22.470000
|
CVE-2024-12292,0,0,e027faa06b5953369db62292a4b64efc1354409048616ace4830c061b024cddd,2024-12-12T12:15:22.470000
|
||||||
CVE-2024-12294,0,0,c80c38451ddc3a567e7758d3362278a970e04ba14ecece8e507b66c499c77553,2024-12-11T11:15:06.623000
|
CVE-2024-12294,0,0,c80c38451ddc3a567e7758d3362278a970e04ba14ecece8e507b66c499c77553,2024-12-11T11:15:06.623000
|
||||||
CVE-2024-1230,0,0,4e58704ea3cd6d96f1b95bf7630f56ca27fd7e9cf7f7c464007165035f04082e,2024-11-21T08:50:06.710000
|
CVE-2024-1230,0,0,4e58704ea3cd6d96f1b95bf7630f56ca27fd7e9cf7f7c464007165035f04082e,2024-11-21T08:50:06.710000
|
||||||
CVE-2024-12305,0,0,591beb549e2fd130a4eb51689f906f54cfd4f9ef094b292b5ebd58de367d8b56,2024-12-09T09:15:04.970000
|
CVE-2024-12305,0,0,591beb549e2fd130a4eb51689f906f54cfd4f9ef094b292b5ebd58de367d8b56,2024-12-09T09:15:04.970000
|
||||||
@ -244564,7 +244565,7 @@ CVE-2024-1255,0,0,d4be5ae93b9e5092a7e5ab21334a6f9f4c81c0431c6141ca4ea56d5a345519
|
|||||||
CVE-2024-1256,0,0,ea8829298a5ced036094d7fead955f33827bc36bbc0a7f87a81ee1f95b95b282,2024-11-21T08:50:10.293000
|
CVE-2024-1256,0,0,ea8829298a5ced036094d7fead955f33827bc36bbc0a7f87a81ee1f95b95b282,2024-11-21T08:50:10.293000
|
||||||
CVE-2024-12564,0,0,c230cd43d38fe8c83310efd182b4d76e37d3a9bde033f283d87a798eb552782a,2024-12-12T08:15:16.517000
|
CVE-2024-12564,0,0,c230cd43d38fe8c83310efd182b4d76e37d3a9bde033f283d87a798eb552782a,2024-12-12T08:15:16.517000
|
||||||
CVE-2024-1257,0,0,7cc030c8f0ebfb33a80da788a5513945114551aaaa2999db4fa614a5f6b08a9b,2024-11-21T08:50:10.443000
|
CVE-2024-1257,0,0,7cc030c8f0ebfb33a80da788a5513945114551aaaa2999db4fa614a5f6b08a9b,2024-11-21T08:50:10.443000
|
||||||
CVE-2024-12570,1,1,55c8778ae52085a06019b95421840b0ea1343cca5de17e3c27e61710e2f13cc0,2024-12-12T12:15:22.660000
|
CVE-2024-12570,0,0,55c8778ae52085a06019b95421840b0ea1343cca5de17e3c27e61710e2f13cc0,2024-12-12T12:15:22.660000
|
||||||
CVE-2024-1258,0,0,debedad37d9addee2213fe56690e6af35567d54f911af42012dde5a258793ebd,2024-11-21T08:50:10.573000
|
CVE-2024-1258,0,0,debedad37d9addee2213fe56690e6af35567d54f911af42012dde5a258793ebd,2024-11-21T08:50:10.573000
|
||||||
CVE-2024-1259,0,0,20758d1bd1b7d5c9a9cfa7609b802ac82aa264b25c107b9463c99ee9056f246a,2024-11-21T08:50:10.730000
|
CVE-2024-1259,0,0,20758d1bd1b7d5c9a9cfa7609b802ac82aa264b25c107b9463c99ee9056f246a,2024-11-21T08:50:10.730000
|
||||||
CVE-2024-1260,0,0,237fdcd6650ec6f817190c6cbe0c450181ce5f478e263f9f314859cdec5f8244,2024-11-21T08:50:10.880000
|
CVE-2024-1260,0,0,237fdcd6650ec6f817190c6cbe0c450181ce5f478e263f9f314859cdec5f8244,2024-11-21T08:50:10.880000
|
||||||
@ -245729,11 +245730,11 @@ CVE-2024-2056,0,0,68371bbfe3e7de0ab75bbaafdb9ba13342e9ac1572c260d9b23595be0a55c6
|
|||||||
CVE-2024-2057,0,0,e5c93f7381e9c562590637af109bc48ab64f0cda8b9656e06708802a9eaa17f2,2024-11-21T09:08:56.920000
|
CVE-2024-2057,0,0,e5c93f7381e9c562590637af109bc48ab64f0cda8b9656e06708802a9eaa17f2,2024-11-21T09:08:56.920000
|
||||||
CVE-2024-2058,0,0,33a3e353af74f2d695cce3be2493a5677751c7365de6b1d8c6772bcf6a979a5a,2024-12-10T23:23:40.153000
|
CVE-2024-2058,0,0,33a3e353af74f2d695cce3be2493a5677751c7365de6b1d8c6772bcf6a979a5a,2024-12-10T23:23:40.153000
|
||||||
CVE-2024-2059,0,0,5f97477692139521401f190887f1f2478fd814e5ddd0152ac688240955c16848,2024-12-10T23:24:34.477000
|
CVE-2024-2059,0,0,5f97477692139521401f190887f1f2478fd814e5ddd0152ac688240955c16848,2024-12-10T23:24:34.477000
|
||||||
CVE-2024-2060,0,0,e30aa9c1a298c19807282a1755921a86bb2e5b5f93b64559a78c7077fba12793,2024-11-21T09:08:57.347000
|
CVE-2024-2060,0,1,753d0b50bd9fe186a347f752fb632f1046e6ed9fc391161852ffbbfeda3b1450,2024-12-12T14:59:34.407000
|
||||||
CVE-2024-2061,0,0,79dc1bd1746c35498269eb72fd4501df46f607a32105dcc0bd7da4fa73505d75,2024-11-21T09:08:57.477000
|
CVE-2024-2061,0,1,69d09f2649de7c5f2bc6337421821be600beea7cb539776419eb64deb0e3397a,2024-12-12T14:59:46.863000
|
||||||
CVE-2024-2062,0,0,4aff557e6e96d7678134b316b3c4ed63f2c8d5ed487405f524f805b6164b27d3,2024-11-21T09:08:57.603000
|
CVE-2024-2062,0,1,d47243d1ea2357e9fbeb5950fae1c877f503df0e90bd3e4b48e2f1f6395a7e19,2024-12-12T14:51:50.387000
|
||||||
CVE-2024-2063,0,0,0056e68c2a6d4d39e29d86045baa8823246c8c5c6f26326049b79181e450b2b7,2024-11-21T09:08:57.740000
|
CVE-2024-2063,0,1,105f8bba07f6e5d58d542106ecd8b4b67b8fe0ee30b7d06894bc8f61187f81c8,2024-12-12T14:52:44.657000
|
||||||
CVE-2024-2064,0,0,2385eb67d6be623ad8112182ae984d3fa2e8ae69076b3b790807ac9a6b5deb1f,2024-11-21T09:08:57.877000
|
CVE-2024-2064,0,1,0fd223e9d69be50cb5e3f32325fa5a0fcf1872f9c64691113c80f1f1b0e20fed,2024-12-12T14:55:04.297000
|
||||||
CVE-2024-2065,0,0,85538f13ab9c0d974ee84ce6ef9ff20f8f4fb1a30faf640caa1bccd504d0aa69,2024-11-21T09:08:58.017000
|
CVE-2024-2065,0,0,85538f13ab9c0d974ee84ce6ef9ff20f8f4fb1a30faf640caa1bccd504d0aa69,2024-11-21T09:08:58.017000
|
||||||
CVE-2024-20652,0,0,0c8f02a3e1821b5da5ebcb9143d8efb2bf923d87af3d4955d19f16d3a1cd64be,2024-11-21T08:52:50.477000
|
CVE-2024-20652,0,0,0c8f02a3e1821b5da5ebcb9143d8efb2bf923d87af3d4955d19f16d3a1cd64be,2024-11-21T08:52:50.477000
|
||||||
CVE-2024-20653,0,0,1490a2533670cff7c4699493600e894af921fc46cc87168ccab2b53e4ddcf6ce,2024-11-21T08:52:50.663000
|
CVE-2024-20653,0,0,1490a2533670cff7c4699493600e894af921fc46cc87168ccab2b53e4ddcf6ce,2024-11-21T08:52:50.663000
|
||||||
@ -247761,7 +247762,7 @@ CVE-2024-23193,0,0,5c86364f2e9a596bd450fe9fda7b94c5e059889fda5e9241f244c9d0b6271
|
|||||||
CVE-2024-23194,0,0,4f40f5167bdcf1a866193efba982a2c3887ef8a11b46c3ce806ea82446be0618,2024-11-21T08:57:10.087000
|
CVE-2024-23194,0,0,4f40f5167bdcf1a866193efba982a2c3887ef8a11b46c3ce806ea82446be0618,2024-11-21T08:57:10.087000
|
||||||
CVE-2024-23196,0,0,0d32c51ce72350dd7c64548130f68fa93ab80dcc404414e8b48b908eeb62f212,2024-11-21T08:57:10.203000
|
CVE-2024-23196,0,0,0d32c51ce72350dd7c64548130f68fa93ab80dcc404414e8b48b908eeb62f212,2024-11-21T08:57:10.203000
|
||||||
CVE-2024-23198,0,0,2ed7d3b0098de9236c6804af620722b58125b2d81b99a0ac437923755e294f60,2024-11-15T14:00:09.720000
|
CVE-2024-23198,0,0,2ed7d3b0098de9236c6804af620722b58125b2d81b99a0ac437923755e294f60,2024-11-15T14:00:09.720000
|
||||||
CVE-2024-23201,0,0,6ed91e352afbe440084318a506bc61cae0112de96fcbe1ed002ee6097d98108d,2024-12-05T16:55:37.627000
|
CVE-2024-23201,0,1,33e7e632afe1a49f2c14e60ce462e7acaef1367469488bf13783b4201dbe914d,2024-12-12T14:33:00.640000
|
||||||
CVE-2024-23203,0,0,95b0cc98c6cf15bf88b9b805ab28c64e75e08db553bb09a3fada68b81cfc6d9c,2024-11-21T08:57:10.620000
|
CVE-2024-23203,0,0,95b0cc98c6cf15bf88b9b805ab28c64e75e08db553bb09a3fada68b81cfc6d9c,2024-11-21T08:57:10.620000
|
||||||
CVE-2024-23204,0,0,e3db754c1857c0a2e5208847645179d7ff6f5e9b5ceabe6657345c274158c1bb,2024-11-21T08:57:10.750000
|
CVE-2024-23204,0,0,e3db754c1857c0a2e5208847645179d7ff6f5e9b5ceabe6657345c274158c1bb,2024-11-21T08:57:10.750000
|
||||||
CVE-2024-23205,0,0,e18ee594460a44f1f65af5f62c86fe10e8903646c6e9896a40c7de1ae7cf9620,2024-12-05T16:45:45.183000
|
CVE-2024-23205,0,0,e18ee594460a44f1f65af5f62c86fe10e8903646c6e9896a40c7de1ae7cf9620,2024-12-05T16:45:45.183000
|
||||||
@ -247787,7 +247788,7 @@ CVE-2024-23224,0,0,3122876ced1cc8436d3e7eab9ff8a2d8aa1d77b5acc6cd7e0eb039ac24059
|
|||||||
CVE-2024-23225,0,0,9dfb819681987b4a5a9414d770000d224347f0f554d029e87276f60932096d78,2024-11-21T08:57:13.833000
|
CVE-2024-23225,0,0,9dfb819681987b4a5a9414d770000d224347f0f554d029e87276f60932096d78,2024-11-21T08:57:13.833000
|
||||||
CVE-2024-23226,0,0,d35555d4d9166169b2d9ebc0c0d3ddd8a6739dcc9d000507c64ae35e59ee757e,2024-12-05T16:33:06.327000
|
CVE-2024-23226,0,0,d35555d4d9166169b2d9ebc0c0d3ddd8a6739dcc9d000507c64ae35e59ee757e,2024-12-05T16:33:06.327000
|
||||||
CVE-2024-23227,0,0,eeded3365b3f5ae72b53b6766c3f1571c46876b65611fd208cdef323d44e0e7e,2024-12-05T16:31:39.383000
|
CVE-2024-23227,0,0,eeded3365b3f5ae72b53b6766c3f1571c46876b65611fd208cdef323d44e0e7e,2024-12-05T16:31:39.383000
|
||||||
CVE-2024-23228,0,0,fabb67c070c23a358c12e5aa72c58f105d051682dfa4bb029cd67e201bdd2a60,2024-12-10T18:03:26.043000
|
CVE-2024-23228,0,1,4777eb1057e01b89423a9fc98cb690d47cbff49eeda10b8695a9f357523c2a6d,2024-12-12T14:33:00.640000
|
||||||
CVE-2024-23229,0,0,b503f4043ad887688ebabe0f99f6dc2e750bec5ee240a1c13bf5cff65542fd4a,2024-12-09T17:37:58.303000
|
CVE-2024-23229,0,0,b503f4043ad887688ebabe0f99f6dc2e750bec5ee240a1c13bf5cff65542fd4a,2024-12-09T17:37:58.303000
|
||||||
CVE-2024-23230,0,0,156b934172dbb493756c9b28b3091ed6cf989cf09f6556b0519517d3a710f9a9,2024-12-05T16:29:16.003000
|
CVE-2024-23230,0,0,156b934172dbb493756c9b28b3091ed6cf989cf09f6556b0519517d3a710f9a9,2024-12-05T16:29:16.003000
|
||||||
CVE-2024-23231,0,0,ba1d2593aea3c4c4a174d2e33b5049749196fa54034828f6beef5b71f462e4b8,2024-12-05T16:27:10.467000
|
CVE-2024-23231,0,0,ba1d2593aea3c4c4a174d2e33b5049749196fa54034828f6beef5b71f462e4b8,2024-12-05T16:27:10.467000
|
||||||
@ -247834,7 +247835,7 @@ CVE-2024-23268,0,0,a4c71a604889babee2e216d86343f0529f00ea91abd63d6059a91119c010c
|
|||||||
CVE-2024-23269,0,0,ff17c0eb56233e8c1810d5c7d345cd079818a9bae566e9d38123eb71446315f5,2024-12-07T02:24:18
|
CVE-2024-23269,0,0,ff17c0eb56233e8c1810d5c7d345cd079818a9bae566e9d38123eb71446315f5,2024-12-07T02:24:18
|
||||||
CVE-2024-2327,0,0,d808ee50b7311490896cd8bdb8756e9f194caa00018a5e3650ac719c80993330,2024-11-21T09:09:30.713000
|
CVE-2024-2327,0,0,d808ee50b7311490896cd8bdb8756e9f194caa00018a5e3650ac719c80993330,2024-11-21T09:09:30.713000
|
||||||
CVE-2024-23270,0,0,efc25267f76e51fabdd2fb3c6181d1a0b3289093213986fcbb3a9c324f22bac6,2024-11-21T08:57:21.540000
|
CVE-2024-23270,0,0,efc25267f76e51fabdd2fb3c6181d1a0b3289093213986fcbb3a9c324f22bac6,2024-11-21T08:57:21.540000
|
||||||
CVE-2024-23271,0,0,d84e39fab89ccbf882a4c4cd50017e8fcfd39eac0fb58f6d2914463b06c5ae14,2024-12-10T17:59:41.370000
|
CVE-2024-23271,0,1,5d71e6f3b33842773f30db60947f5883e7fac8e4209545a57c6e0cff9cef7f50,2024-12-12T14:33:00.640000
|
||||||
CVE-2024-23272,0,0,08c7845c329ebb70a04bd317b5b476df2f47be5440c894d265d78e8332ad9e18,2024-11-21T08:57:21.970000
|
CVE-2024-23272,0,0,08c7845c329ebb70a04bd317b5b476df2f47be5440c894d265d78e8332ad9e18,2024-11-21T08:57:21.970000
|
||||||
CVE-2024-23273,0,0,6682ed6ac45cfbaaac0fe8ef6ae5c842d9a8d5e71f5e7eee23e553a23545b047,2024-11-21T08:57:22.103000
|
CVE-2024-23273,0,0,6682ed6ac45cfbaaac0fe8ef6ae5c842d9a8d5e71f5e7eee23e553a23545b047,2024-11-21T08:57:22.103000
|
||||||
CVE-2024-23274,0,0,318b4df782d3c6e71148c6552d1841eeb2ed2926c2f9c1ed83914e87222269ee,2024-11-21T08:57:22.330000
|
CVE-2024-23274,0,0,318b4df782d3c6e71148c6552d1841eeb2ed2926c2f9c1ed83914e87222269ee,2024-11-21T08:57:22.330000
|
||||||
@ -251223,7 +251224,7 @@ CVE-2024-27785,0,0,33fb495428cc1ae3149f69e28bb269378e2b02f54308ee72c86f0fdee748a
|
|||||||
CVE-2024-27789,0,0,629b0eb4c889aa6984222a2f069788b087760d7a2b278ce5cd8b69fb5a39ad91,2024-12-09T19:28:42.173000
|
CVE-2024-27789,0,0,629b0eb4c889aa6984222a2f069788b087760d7a2b278ce5cd8b69fb5a39ad91,2024-12-09T19:28:42.173000
|
||||||
CVE-2024-2779,0,0,48faa7e8e11bfa3d30687d130ca268634cf645c8049636c0e48558d9c97e39e2,2024-11-21T09:10:30.013000
|
CVE-2024-2779,0,0,48faa7e8e11bfa3d30687d130ca268634cf645c8049636c0e48558d9c97e39e2,2024-11-21T09:10:30.013000
|
||||||
CVE-2024-27790,0,0,19fcb60ab52fe9c379609c39b59142d5014d893a59bae627bebebc5a2412f431,2024-12-09T19:31:56.207000
|
CVE-2024-27790,0,0,19fcb60ab52fe9c379609c39b59142d5014d893a59bae627bebebc5a2412f431,2024-12-09T19:31:56.207000
|
||||||
CVE-2024-27791,0,0,439aca2fd1f55eeaf8fa200c5d29a0be14fb7faf194f143c1548179e82383c22,2024-12-10T17:58:55.290000
|
CVE-2024-27791,0,1,cced26eba1922f922a989a68f8969cd506e95668cebd2d4731d8f0f634e4325a,2024-12-12T14:33:00.640000
|
||||||
CVE-2024-27792,0,0,f31b62b6f6fa42ac443db705e1bcf2907bbf913e30a3984de7b426f885533f5d,2024-11-21T09:05:03.877000
|
CVE-2024-27792,0,0,f31b62b6f6fa42ac443db705e1bcf2907bbf913e30a3984de7b426f885533f5d,2024-11-21T09:05:03.877000
|
||||||
CVE-2024-27793,0,0,4b0df2c2b74473c2b8ba466a704f8df7dacd244d361ee42c49a6311ab2e4a128,2024-12-09T19:28:03.753000
|
CVE-2024-27793,0,0,4b0df2c2b74473c2b8ba466a704f8df7dacd244d361ee42c49a6311ab2e4a128,2024-12-09T19:28:03.753000
|
||||||
CVE-2024-27794,0,0,4504b4b825a11a7d65b5081c774372a74748805bca6e18e3905fa44645f60653,2024-12-11T19:56:37.067000
|
CVE-2024-27794,0,0,4504b4b825a11a7d65b5081c774372a74748805bca6e18e3905fa44645f60653,2024-12-11T19:56:37.067000
|
||||||
@ -251236,26 +251237,26 @@ CVE-2024-27800,0,0,78fc466a5a3bc2fd93a87f9252c88beddb725a45d7abbe6a920f8fae9f2e7
|
|||||||
CVE-2024-27801,0,0,720cea692e34651a5265f635aa3400fa0ae834d7fa3223fa64ee366beda959f9,2024-11-21T09:05:05.390000
|
CVE-2024-27801,0,0,720cea692e34651a5265f635aa3400fa0ae834d7fa3223fa64ee366beda959f9,2024-11-21T09:05:05.390000
|
||||||
CVE-2024-27802,0,0,d93ef75dc5eeaeb883b4133f9552e0ead554b44d6061155d92fdfc3f1ac7f547,2024-11-21T09:05:05.640000
|
CVE-2024-27802,0,0,d93ef75dc5eeaeb883b4133f9552e0ead554b44d6061155d92fdfc3f1ac7f547,2024-11-21T09:05:05.640000
|
||||||
CVE-2024-27803,0,0,57628ee2a3feb80e1c2eaa68ad6c74f016c8d3c240bd24844f69c1bc20ce3abd,2024-12-09T19:19:52.583000
|
CVE-2024-27803,0,0,57628ee2a3feb80e1c2eaa68ad6c74f016c8d3c240bd24844f69c1bc20ce3abd,2024-12-09T19:19:52.583000
|
||||||
CVE-2024-27804,0,0,7af3cdd40a8567eed16b709e51a205f9d47e981fb7782f5899966d23e2723fe8,2024-12-09T19:25:03.827000
|
CVE-2024-27804,0,1,a29744c60490bc8d871154f016c981e176782317111f5eae9bd7bffb3fe827a4,2024-12-12T14:33:00.640000
|
||||||
CVE-2024-27805,0,0,305e3c300912952c560e48c8adc35b883194d1194f1733bc789072ff631f3e97,2024-11-21T09:05:06.223000
|
CVE-2024-27805,0,0,305e3c300912952c560e48c8adc35b883194d1194f1733bc789072ff631f3e97,2024-11-21T09:05:06.223000
|
||||||
CVE-2024-27806,0,0,04ae2f924f27899fabc437b68048a977a78d58a5dfac718be7ed36670048d4dd,2024-11-21T09:05:06.393000
|
CVE-2024-27806,0,0,04ae2f924f27899fabc437b68048a977a78d58a5dfac718be7ed36670048d4dd,2024-11-21T09:05:06.393000
|
||||||
CVE-2024-27807,0,0,b016f86f84ff3be5552fb4afdb86e3ff10dc5c6f121c45f7bd657b8d06f30e77,2024-11-21T09:05:06.567000
|
CVE-2024-27807,0,0,b016f86f84ff3be5552fb4afdb86e3ff10dc5c6f121c45f7bd657b8d06f30e77,2024-11-21T09:05:06.567000
|
||||||
CVE-2024-27808,0,0,dfd2c1144d0a5d419427b718c6ce49475ee3dbc0e0385d1e51f26b909b153ec5,2024-11-21T09:05:06.720000
|
CVE-2024-27808,0,0,dfd2c1144d0a5d419427b718c6ce49475ee3dbc0e0385d1e51f26b909b153ec5,2024-11-21T09:05:06.720000
|
||||||
CVE-2024-27809,0,0,37e58d803d63de85ca90a78876427abd2ec5daef1ccaf9e8d7067d55f7a69003,2024-11-21T09:05:06.963000
|
CVE-2024-27809,0,0,37e58d803d63de85ca90a78876427abd2ec5daef1ccaf9e8d7067d55f7a69003,2024-11-21T09:05:06.963000
|
||||||
CVE-2024-2781,0,0,5db24c11b7ff425ba8bd3bc724b16605f1e9f4ee6d83ed18dad9d4756913a2f4,2024-11-21T09:10:30.277000
|
CVE-2024-2781,0,0,5db24c11b7ff425ba8bd3bc724b16605f1e9f4ee6d83ed18dad9d4756913a2f4,2024-11-21T09:10:30.277000
|
||||||
CVE-2024-27810,0,0,c45e8a8a23369357bb9a21b53398fc280320a10b7919d575370fc32bfe3b869d,2024-12-09T19:14:08.850000
|
CVE-2024-27810,0,1,0628d7b2890240a6eb441f13cd3ca854f8e8cff37b4689a851937f7340f4db89,2024-12-12T14:33:00.640000
|
||||||
CVE-2024-27811,0,0,c04d71d0d3f7fe84fc297afd712b4cec9b87b90e7c1dcdf468cbc3048db22a41,2024-11-21T09:05:07.357000
|
CVE-2024-27811,0,0,c04d71d0d3f7fe84fc297afd712b4cec9b87b90e7c1dcdf468cbc3048db22a41,2024-11-21T09:05:07.357000
|
||||||
CVE-2024-27812,0,0,990107596f1e534025072a9bc1ed03a11b1fa3c1694782e485345ceb7b5df925,2024-11-21T09:05:07.637000
|
CVE-2024-27812,0,0,990107596f1e534025072a9bc1ed03a11b1fa3c1694782e485345ceb7b5df925,2024-11-21T09:05:07.637000
|
||||||
CVE-2024-27813,0,0,5d6a815fd129c8774bcecab0dde1809a9b9e4fa7eecfd6b9b8c142caa5672720,2024-12-09T19:10:27.723000
|
CVE-2024-27813,0,0,5d6a815fd129c8774bcecab0dde1809a9b9e4fa7eecfd6b9b8c142caa5672720,2024-12-09T19:10:27.723000
|
||||||
CVE-2024-27814,0,0,a8f1c9abd07f6955526f110808053a26f5e88f4fce2a4eb46b087a3616519c3c,2024-11-21T09:05:08.047000
|
CVE-2024-27814,0,0,a8f1c9abd07f6955526f110808053a26f5e88f4fce2a4eb46b087a3616519c3c,2024-11-21T09:05:08.047000
|
||||||
CVE-2024-27815,0,0,193b5220cd8f10dd9ee9ca9a7a47183212b5114c55a334e29aa9c7e47768ef54,2024-11-21T09:05:08.303000
|
CVE-2024-27815,0,0,193b5220cd8f10dd9ee9ca9a7a47183212b5114c55a334e29aa9c7e47768ef54,2024-11-21T09:05:08.303000
|
||||||
CVE-2024-27816,0,0,334654513b3404ade23d9a46bafe4c56a1306444c7c3ccc6c50e0d2d5deb8afa,2024-12-09T18:59:05.477000
|
CVE-2024-27816,0,1,d126026a0e8c09579a5f31347cc45bf3577225eb227c98451e45b114e71fba42,2024-12-12T14:33:00.640000
|
||||||
CVE-2024-27817,0,0,6dd9dd975d0fcfe58238d9ba3ba9e1921b514abadfa496cb71844ef21c201d0f,2024-11-21T09:05:08.793000
|
CVE-2024-27817,0,0,6dd9dd975d0fcfe58238d9ba3ba9e1921b514abadfa496cb71844ef21c201d0f,2024-11-21T09:05:08.793000
|
||||||
CVE-2024-27818,0,0,7a8cd425a14ee433567d01539eb40da8fde96abececcaf8dd03320db0eecdaca,2024-12-09T20:21:02.197000
|
CVE-2024-27818,0,1,bf2ff5e56a5dcc0026326b877c5d2f40490029874fbc80b54df6651b77bfe1fe,2024-12-12T14:33:00.640000
|
||||||
CVE-2024-27819,0,0,af5349cb7fb8018051d3446391b7c541613e37fd1a57a702dbccd3af5f1ae345,2024-11-21T09:05:09.137000
|
CVE-2024-27819,0,0,af5349cb7fb8018051d3446391b7c541613e37fd1a57a702dbccd3af5f1ae345,2024-11-21T09:05:09.137000
|
||||||
CVE-2024-2782,0,0,0fbffd09bb8d00a40b2857d7fa7951d51bd7afe07485ce80aa521012139d7b52,2024-11-21T09:10:30.413000
|
CVE-2024-2782,0,0,0fbffd09bb8d00a40b2857d7fa7951d51bd7afe07485ce80aa521012139d7b52,2024-11-21T09:10:30.413000
|
||||||
CVE-2024-27820,0,0,b615b9c5d68a674c239e6993b78212fe0266a4c1058c37eeaa57e7bae0332265,2024-11-21T09:05:09.333000
|
CVE-2024-27820,0,0,b615b9c5d68a674c239e6993b78212fe0266a4c1058c37eeaa57e7bae0332265,2024-11-21T09:05:09.333000
|
||||||
CVE-2024-27821,0,0,04c0a314898330696abcc412c5d53cf7faa36fd50076d840a4eec6c1d9189b98,2024-12-09T20:45:41.037000
|
CVE-2024-27821,0,1,662c0fdb4a6b9881c4e3b0e9bdefd91c75dc8c6155b30ede36ff0f65a0b09925,2024-12-12T14:33:00.640000
|
||||||
CVE-2024-27822,0,0,f8be55eb8bf86503cf81512385aa89b340f124c8a3f8c20fd852538813632324,2024-12-09T20:45:57.453000
|
CVE-2024-27822,0,0,f8be55eb8bf86503cf81512385aa89b340f124c8a3f8c20fd852538813632324,2024-12-09T20:45:57.453000
|
||||||
CVE-2024-27823,0,0,78c75b2c22fe34bed862cefb90eaed8a187e580151d9a70d547054d573dd3f8b,2024-11-21T09:05:10.170000
|
CVE-2024-27823,0,0,78c75b2c22fe34bed862cefb90eaed8a187e580151d9a70d547054d573dd3f8b,2024-11-21T09:05:10.170000
|
||||||
CVE-2024-27824,0,0,2cc12ddd99599dd006872c0cf7b8d5ab63b8531da94587db60786c0ccab83ed8,2024-12-09T19:47:18.810000
|
CVE-2024-27824,0,0,2cc12ddd99599dd006872c0cf7b8d5ab63b8531da94587db60786c0ccab83ed8,2024-12-09T19:47:18.810000
|
||||||
@ -251269,8 +251270,8 @@ CVE-2024-27830,0,0,b0521ebc14fa7593afac28a97f2ffc5b645a238bddc7c634576c0a0eb1c02
|
|||||||
CVE-2024-27831,0,0,021ff19030824e294055f32a82c8285e7d73be4c916d4ff29def1abb6f3c09a5,2024-11-21T09:05:12.317000
|
CVE-2024-27831,0,0,021ff19030824e294055f32a82c8285e7d73be4c916d4ff29def1abb6f3c09a5,2024-11-21T09:05:12.317000
|
||||||
CVE-2024-27832,0,0,04dcb345a14a0cb6ad8ba4a692e5d933148730aef6f5fc463e2f2d88998d59ff,2024-11-21T09:05:12.617000
|
CVE-2024-27832,0,0,04dcb345a14a0cb6ad8ba4a692e5d933148730aef6f5fc463e2f2d88998d59ff,2024-11-21T09:05:12.617000
|
||||||
CVE-2024-27833,0,0,aca57f4f6788befa5ae19c7880aaae0334b13dc3e08cacaa08f3bb1676962cb1,2024-11-21T09:05:12.963000
|
CVE-2024-27833,0,0,aca57f4f6788befa5ae19c7880aaae0334b13dc3e08cacaa08f3bb1676962cb1,2024-11-21T09:05:12.963000
|
||||||
CVE-2024-27834,0,0,7ea76e4baf4ba7b67b0fdc12af786d548e567eac33d807077e93cb8c6039649a,2024-12-09T19:27:43.577000
|
CVE-2024-27834,0,1,6c6d54d22633be541c48da8706377c23c9ad13fa603579cca3775efd6a72c3d4,2024-12-12T14:33:00.640000
|
||||||
CVE-2024-27835,0,0,a377a6efb0a3a23c68a73fecff6189f518f9a61f64872e1ca8a3d7eba8227309,2024-12-09T19:35:44.313000
|
CVE-2024-27835,0,1,f881b6857db9fc81b1871120d8438516334e3c0ba89dfda682c1ff2f016b760d,2024-12-12T14:33:00.640000
|
||||||
CVE-2024-27836,0,0,cbc2d84b81c4d8680b3e2ce71e679c4626236304b018eec892d9a66d50b30816,2024-11-21T09:05:13.850000
|
CVE-2024-27836,0,0,cbc2d84b81c4d8680b3e2ce71e679c4626236304b018eec892d9a66d50b30816,2024-11-21T09:05:13.850000
|
||||||
CVE-2024-27837,0,0,dbe00fc9ad9cfd5169a026b6dd14e56e505a786293836f85ce62ef635b022b41,2024-12-09T19:50:49.497000
|
CVE-2024-27837,0,0,dbe00fc9ad9cfd5169a026b6dd14e56e505a786293836f85ce62ef635b022b41,2024-12-09T19:50:49.497000
|
||||||
CVE-2024-27838,0,0,f48a4ff4fde890aeedd51ce8d5c4a8dd37d520a0fe71173be2957a5d08c5e442,2024-11-21T09:05:14.337000
|
CVE-2024-27838,0,0,f48a4ff4fde890aeedd51ce8d5c4a8dd37d520a0fe71173be2957a5d08c5e442,2024-11-21T09:05:14.337000
|
||||||
@ -251562,6 +251563,11 @@ CVE-2024-28139,0,0,871d40bc8a7366798572b17910afce0da36a7dc3bc42652a155d0d45e3265
|
|||||||
CVE-2024-2814,0,0,266291004cb50fc9fa499704214f3d6d747ab61c03d4ecf60b55016bd9e70c6a,2024-11-21T09:10:35.307000
|
CVE-2024-2814,0,0,266291004cb50fc9fa499704214f3d6d747ab61c03d4ecf60b55016bd9e70c6a,2024-11-21T09:10:35.307000
|
||||||
CVE-2024-28140,0,0,4c0d53437c48eb1f32a5b64caceb78ae4d2e11497873371834b83dd5680d3140,2024-12-12T01:47:46.317000
|
CVE-2024-28140,0,0,4c0d53437c48eb1f32a5b64caceb78ae4d2e11497873371834b83dd5680d3140,2024-12-12T01:47:46.317000
|
||||||
CVE-2024-28141,0,0,d301dc86e6b9da2d535b33aa3d93591f7cfa6960db015fd11adcc9dde289a182,2024-12-11T17:15:15.007000
|
CVE-2024-28141,0,0,d301dc86e6b9da2d535b33aa3d93591f7cfa6960db015fd11adcc9dde289a182,2024-12-11T17:15:15.007000
|
||||||
|
CVE-2024-28142,1,1,6cb61a9f0f8449b1b568192393be8881ded9059ad87a84d1806cd5aa61af294a,2024-12-12T13:15:09.763000
|
||||||
|
CVE-2024-28143,1,1,03751e070551dd60cbde288b3b2942c58190e62afc2cef23201e91771a583cc2,2024-12-12T14:15:22.173000
|
||||||
|
CVE-2024-28144,1,1,81be89bbbb4abedd6fa2db2b638f26a18dc9c9fec5168864f1e906af6d78a8eb,2024-12-12T14:15:22.330000
|
||||||
|
CVE-2024-28145,1,1,1e813b570d6af097f04e3a2f93b40ef98c71cad14280a9f8266a6f3abf985861,2024-12-12T14:15:22.467000
|
||||||
|
CVE-2024-28146,1,1,a454235f37e4f5cd71a6085407c2105a9d91786049302c11105b501b7ed5ccc6,2024-12-12T14:15:22.613000
|
||||||
CVE-2024-28147,0,0,385f022ef3b9e74c16d2ca430dbfe84754b0905ec234f9f62a2995438a07dfd7,2024-11-21T09:05:53.770000
|
CVE-2024-28147,0,0,385f022ef3b9e74c16d2ca430dbfe84754b0905ec234f9f62a2995438a07dfd7,2024-11-21T09:05:53.770000
|
||||||
CVE-2024-28148,0,0,3ac8f61b51b12f3a297806b3219d55d9a6d8e022b2f823c428c505a4ab5ae12c,2024-11-21T09:05:53.983000
|
CVE-2024-28148,0,0,3ac8f61b51b12f3a297806b3219d55d9a6d8e022b2f823c428c505a4ab5ae12c,2024-11-21T09:05:53.983000
|
||||||
CVE-2024-28149,0,0,57ed6574f074778f026c6cc859bdab33a0e7bd4d9407db0a106e88c4247206d2,2024-12-06T19:15:11.663000
|
CVE-2024-28149,0,0,57ed6574f074778f026c6cc859bdab33a0e7bd4d9407db0a106e88c4247206d2,2024-12-06T19:15:11.663000
|
||||||
@ -257745,9 +257751,11 @@ CVE-2024-36489,0,0,483f02515bfc91c5ae3d16c61773df6c14d7d1b71a9ade79929d031b233a7
|
|||||||
CVE-2024-3649,0,0,9d4b3c873377dc252861a0a03bd9c832139a807a0ffd6ec04c3597a6690414bd,2024-11-21T09:30:04.903000
|
CVE-2024-3649,0,0,9d4b3c873377dc252861a0a03bd9c832139a807a0ffd6ec04c3597a6690414bd,2024-11-21T09:30:04.903000
|
||||||
CVE-2024-36491,0,0,c755cb5a1143bbce4a7cda0b31b5fee61d8d298088a69a8871a699ccb2c2e2b9,2024-11-21T09:22:16.813000
|
CVE-2024-36491,0,0,c755cb5a1143bbce4a7cda0b31b5fee61d8d298088a69a8871a699ccb2c2e2b9,2024-11-21T09:22:16.813000
|
||||||
CVE-2024-36492,0,0,e317bdf7a68aa0ba85302ebd2a113aec9f051f925a8df929903da8016701a4ff,2024-08-23T14:51:08.580000
|
CVE-2024-36492,0,0,e317bdf7a68aa0ba85302ebd2a113aec9f051f925a8df929903da8016701a4ff,2024-08-23T14:51:08.580000
|
||||||
|
CVE-2024-36494,1,1,3540278f02115410a54db8dbbec83a8b2dada3f5b7a5289eba714855c82641a1,2024-12-12T14:15:22.740000
|
||||||
CVE-2024-36495,0,0,7a48233cad150c8548a3307f191550e3a4681c1f61964468c57271a9b155ed9e,2024-11-21T09:22:17.123000
|
CVE-2024-36495,0,0,7a48233cad150c8548a3307f191550e3a4681c1f61964468c57271a9b155ed9e,2024-11-21T09:22:17.123000
|
||||||
CVE-2024-36496,0,0,714184028efd3fe8c9f7d2ed728a4da4803d7a712f47e3b49b2335391ba3f339,2024-11-21T09:22:17.317000
|
CVE-2024-36496,0,0,714184028efd3fe8c9f7d2ed728a4da4803d7a712f47e3b49b2335391ba3f339,2024-11-21T09:22:17.317000
|
||||||
CVE-2024-36497,0,0,8eced1bcdef5e314cf0f9e441a92136c389e617dfa3768edcabff5beddde4a7c,2024-11-21T09:22:17.510000
|
CVE-2024-36497,0,0,8eced1bcdef5e314cf0f9e441a92136c389e617dfa3768edcabff5beddde4a7c,2024-11-21T09:22:17.510000
|
||||||
|
CVE-2024-36498,1,1,413e14e6ad08d9c61634262f616ee78abf93816f1f45688c171ea6771616c33b,2024-12-12T13:15:10.540000
|
||||||
CVE-2024-36499,0,0,ed858a4b472fd445a2ad0302c3cb1fbf31dff02fd641ba3d16a4232251d27f43,2024-11-21T09:22:17.690000
|
CVE-2024-36499,0,0,ed858a4b472fd445a2ad0302c3cb1fbf31dff02fd641ba3d16a4232251d27f43,2024-11-21T09:22:17.690000
|
||||||
CVE-2024-3650,0,0,39c66b574e110ed65a957c31c0ff9b18a289672070e2636411b75e7ed3e28849,2024-11-21T09:30:05.030000
|
CVE-2024-3650,0,0,39c66b574e110ed65a957c31c0ff9b18a289672070e2636411b75e7ed3e28849,2024-11-21T09:30:05.030000
|
||||||
CVE-2024-36500,0,0,3749986292cf3f04be3ecd79c3eae7049cd48de8e666dbec442c9f3a4ab4ee71,2024-11-21T09:22:17.843000
|
CVE-2024-36500,0,0,3749986292cf3f04be3ecd79c3eae7049cd48de8e666dbec442c9f3a4ab4ee71,2024-11-21T09:22:17.843000
|
||||||
@ -265770,6 +265778,7 @@ CVE-2024-47943,0,0,d4d5358ab48548c04867b54233602bd267d194af91388df45333461289a48
|
|||||||
CVE-2024-47944,0,0,2b62f766b4e887a556703c4ed0cb75befb46953f16e7999cc97a39c4906c4816,2024-10-15T16:35:09.410000
|
CVE-2024-47944,0,0,2b62f766b4e887a556703c4ed0cb75befb46953f16e7999cc97a39c4906c4816,2024-10-15T16:35:09.410000
|
||||||
CVE-2024-47945,0,0,4eaa4330fd6e6ea36aef0bbee2681edcaf5e4575b714ff483b0a9415275f4700,2024-10-21T19:41:10.407000
|
CVE-2024-47945,0,0,4eaa4330fd6e6ea36aef0bbee2681edcaf5e4575b714ff483b0a9415275f4700,2024-10-21T19:41:10.407000
|
||||||
CVE-2024-47946,0,0,ee189e084ef2ce307b61e5f5ca3165fcf3b82770c351969d8c2d68fa96cf146f,2024-12-10T08:15:19.210000
|
CVE-2024-47946,0,0,ee189e084ef2ce307b61e5f5ca3165fcf3b82770c351969d8c2d68fa96cf146f,2024-12-10T08:15:19.210000
|
||||||
|
CVE-2024-47947,1,1,d1b994a48e6b4f8ec3583fba5fcc683670af31653a32905f4aaef7b6a4979777,2024-12-12T13:15:10.920000
|
||||||
CVE-2024-47948,0,0,517ff2cf40b380f17f0ca0cb700d9beda797d40f6236e57145e952b4be3c000e,2024-10-11T19:56:44.863000
|
CVE-2024-47948,0,0,517ff2cf40b380f17f0ca0cb700d9beda797d40f6236e57145e952b4be3c000e,2024-10-11T19:56:44.863000
|
||||||
CVE-2024-47949,0,0,c7868bf3f997ce1e01baff6d85be7f51aca23f28e73102f98ffda228afc78456,2024-10-11T19:57:06.207000
|
CVE-2024-47949,0,0,c7868bf3f997ce1e01baff6d85be7f51aca23f28e73102f98ffda228afc78456,2024-10-11T19:57:06.207000
|
||||||
CVE-2024-4795,0,0,874142283439f7d65325bd0714cbf0599f4b631a02f97bcc512f2aca94da1495,2024-11-21T09:43:37.747000
|
CVE-2024-4795,0,0,874142283439f7d65325bd0714cbf0599f4b631a02f97bcc512f2aca94da1495,2024-11-21T09:43:37.747000
|
||||||
@ -267569,6 +267578,7 @@ CVE-2024-50580,0,0,3398f584a5664889c1e4deaaab3b304a2b81a8e4a61ec448e96876890935c
|
|||||||
CVE-2024-50581,0,0,46efa2852e259a5f8d275b5dae3ea2a01d70670e7b9ab092dcb227fcb28b2ae1,2024-10-29T17:17:20.747000
|
CVE-2024-50581,0,0,46efa2852e259a5f8d275b5dae3ea2a01d70670e7b9ab092dcb227fcb28b2ae1,2024-10-29T17:17:20.747000
|
||||||
CVE-2024-50582,0,0,bc56234b3ab653a760273693a6e0012ab15651a705a524c4f1f1233ab3806295,2024-10-29T17:16:46.007000
|
CVE-2024-50582,0,0,bc56234b3ab653a760273693a6e0012ab15651a705a524c4f1f1233ab3806295,2024-10-29T17:16:46.007000
|
||||||
CVE-2024-50583,0,0,7274c5e22b718796ad1b4962554320fbc5e753e3e5b53c77142694b9ec8dd2dd,2024-10-25T21:35:08.253000
|
CVE-2024-50583,0,0,7274c5e22b718796ad1b4962554320fbc5e753e3e5b53c77142694b9ec8dd2dd,2024-10-25T21:35:08.253000
|
||||||
|
CVE-2024-50584,1,1,4135d655b74e68f2958d8835e4d1b9a7ed598273fddd4654b44762351a0b4d3c,2024-12-12T14:15:22.833000
|
||||||
CVE-2024-50585,0,0,3ab67247e8f30f4fbfca962702858819d9540939e9d4e81cc6f18dea9bcdce2b,2024-12-12T02:06:30.727000
|
CVE-2024-50585,0,0,3ab67247e8f30f4fbfca962702858819d9540939e9d4e81cc6f18dea9bcdce2b,2024-12-12T02:06:30.727000
|
||||||
CVE-2024-50588,0,0,bfaa579943a78c86d813d9dedefba8b226ac11f00c84d1c00da87c599a1cb193,2024-11-08T19:01:03.880000
|
CVE-2024-50588,0,0,bfaa579943a78c86d813d9dedefba8b226ac11f00c84d1c00da87c599a1cb193,2024-11-08T19:01:03.880000
|
||||||
CVE-2024-50589,0,0,64643b83ced7e561121c5a71099032b9b033224c4f3853ee59622fb2bbd5e998,2024-11-08T19:01:03.880000
|
CVE-2024-50589,0,0,64643b83ced7e561121c5a71099032b9b033224c4f3853ee59622fb2bbd5e998,2024-11-08T19:01:03.880000
|
||||||
@ -269440,35 +269450,38 @@ CVE-2024-5406,0,0,5db0f501f7c712d4bcce798425460b3472165eeef82fd225689429d234120e
|
|||||||
CVE-2024-5407,0,0,e082637321598f3dc8c3c9e1760b81a1e1197c4d13cd58fed3245c37f0bb71c9,2024-11-21T09:47:35.567000
|
CVE-2024-5407,0,0,e082637321598f3dc8c3c9e1760b81a1e1197c4d13cd58fed3245c37f0bb71c9,2024-11-21T09:47:35.567000
|
||||||
CVE-2024-5408,0,0,0b23a712a85d13fef48f02294d854672174790bd624dfee1416450ccef66434a,2024-11-21T09:47:35.690000
|
CVE-2024-5408,0,0,0b23a712a85d13fef48f02294d854672174790bd624dfee1416450ccef66434a,2024-11-21T09:47:35.690000
|
||||||
CVE-2024-5409,0,0,f7df79bf8c405f523130badde3800a80499e2a2f05cefac143617aad785ef5de,2024-11-21T09:47:35.810000
|
CVE-2024-5409,0,0,f7df79bf8c405f523130badde3800a80499e2a2f05cefac143617aad785ef5de,2024-11-21T09:47:35.810000
|
||||||
CVE-2024-54091,0,0,d3d3ef567bc07203eacd243364831a07a307a7b442281f775f6be9f7c62bf73c,2024-12-10T14:30:47.193000
|
CVE-2024-54091,0,1,dc351406c488f002e073939d29344cb9478bbe226b29253f9010eef494af4991,2024-12-12T14:15:22.953000
|
||||||
CVE-2024-54093,0,0,c9952f718b9dee5ade98198ba738919650786fa00e81e0f00fb78cc1b9473a29,2024-12-10T14:30:47.350000
|
CVE-2024-54093,0,0,c9952f718b9dee5ade98198ba738919650786fa00e81e0f00fb78cc1b9473a29,2024-12-10T14:30:47.350000
|
||||||
CVE-2024-54094,0,0,694ba54d9708cc1a645dcf1348a2fcb0fdf3ec8538eee26d6c1d91de386dfffb,2024-12-10T14:30:47.507000
|
CVE-2024-54094,0,0,694ba54d9708cc1a645dcf1348a2fcb0fdf3ec8538eee26d6c1d91de386dfffb,2024-12-10T14:30:47.507000
|
||||||
CVE-2024-54095,0,0,0fd9f2382bb077e34770785fba7450b0fb33d7127731375f559f57743667fedd,2024-12-10T14:30:47.660000
|
CVE-2024-54095,0,0,0fd9f2382bb077e34770785fba7450b0fb33d7127731375f559f57743667fedd,2024-12-10T14:30:47.660000
|
||||||
CVE-2024-54096,1,1,9261c64f31476c9e801125d110238de2f41ab464009f69a1e17e737c35dad121,2024-12-12T12:15:22.863000
|
CVE-2024-54096,0,0,9261c64f31476c9e801125d110238de2f41ab464009f69a1e17e737c35dad121,2024-12-12T12:15:22.863000
|
||||||
CVE-2024-54097,1,1,85148239adb3a8f48cee178befbfa05884dcc9f615091e00d2f8a5734140b33a,2024-12-12T12:15:23.060000
|
CVE-2024-54097,0,0,85148239adb3a8f48cee178befbfa05884dcc9f615091e00d2f8a5734140b33a,2024-12-12T12:15:23.060000
|
||||||
CVE-2024-54098,1,1,d0efe25d3c347a8bbfa56b3383d186c21cfb5473126e43a6b8b504ddde7fc595,2024-12-12T12:15:23.243000
|
CVE-2024-54098,0,0,d0efe25d3c347a8bbfa56b3383d186c21cfb5473126e43a6b8b504ddde7fc595,2024-12-12T12:15:23.243000
|
||||||
CVE-2024-54099,1,1,bbcbaf28c2160611d51c0f728f59ab462e3b911669ddc33aa08124e6675a8b6e,2024-12-12T12:15:23.420000
|
CVE-2024-54099,0,0,bbcbaf28c2160611d51c0f728f59ab462e3b911669ddc33aa08124e6675a8b6e,2024-12-12T12:15:23.420000
|
||||||
CVE-2024-5410,0,0,cce7b181ee3076dc24a31460b418b1921efa7dac4bb8604c266edd1c195e07b4,2024-11-21T09:47:35.930000
|
CVE-2024-5410,0,0,cce7b181ee3076dc24a31460b418b1921efa7dac4bb8604c266edd1c195e07b4,2024-11-21T09:47:35.930000
|
||||||
CVE-2024-54100,1,1,7f515e65bdb6ab5181f0118723843d8f5c6afa40f279ffecf4b8c9d1571ac01b,2024-12-12T12:15:23.593000
|
CVE-2024-54100,0,0,7f515e65bdb6ab5181f0118723843d8f5c6afa40f279ffecf4b8c9d1571ac01b,2024-12-12T12:15:23.593000
|
||||||
CVE-2024-54101,1,1,d7186920e2b075ebba0208e83d07ec821c5673384b0d7e299bc1802bcd81467f,2024-12-12T12:15:23.763000
|
CVE-2024-54101,0,0,d7186920e2b075ebba0208e83d07ec821c5673384b0d7e299bc1802bcd81467f,2024-12-12T12:15:23.763000
|
||||||
CVE-2024-54102,1,1,ce00efa4b532daaff43ff118ab0c4ac9dc4234c0ae50d2c0f1338a4144c85289,2024-12-12T12:15:23.930000
|
CVE-2024-54102,0,0,ce00efa4b532daaff43ff118ab0c4ac9dc4234c0ae50d2c0f1338a4144c85289,2024-12-12T12:15:23.930000
|
||||||
CVE-2024-54103,1,1,80d5e2584365269ddcc08fb7032346b2f0951d36adf55f0c491fcd2cd60ef3fe,2024-12-12T12:15:24.123000
|
CVE-2024-54103,0,0,80d5e2584365269ddcc08fb7032346b2f0951d36adf55f0c491fcd2cd60ef3fe,2024-12-12T12:15:24.123000
|
||||||
CVE-2024-54104,1,1,1f0e4c6be4ffcc67d6b0f08808f86688a53278ae0874bb7cd16befc862ff64b6,2024-12-12T12:15:24.550000
|
CVE-2024-54104,0,0,1f0e4c6be4ffcc67d6b0f08808f86688a53278ae0874bb7cd16befc862ff64b6,2024-12-12T12:15:24.550000
|
||||||
CVE-2024-54105,1,1,df02f666da31fce1001d1a95e5512a5107155dfc1f3165f5d0e9ab8e63e4dd2b,2024-12-12T12:15:24.983000
|
CVE-2024-54105,0,0,df02f666da31fce1001d1a95e5512a5107155dfc1f3165f5d0e9ab8e63e4dd2b,2024-12-12T12:15:24.983000
|
||||||
CVE-2024-54106,1,1,de39841c40a5530520f350610324ac4c1eb2bab21154d33849699860befaa174,2024-12-12T12:15:25.237000
|
CVE-2024-54106,0,0,de39841c40a5530520f350610324ac4c1eb2bab21154d33849699860befaa174,2024-12-12T12:15:25.237000
|
||||||
CVE-2024-54107,1,1,0ff2eb6f92e00e3c5ef9427ebcb12c7721187f8bf7305d2839cfcf2410987f14,2024-12-12T12:15:25.653000
|
CVE-2024-54107,0,0,0ff2eb6f92e00e3c5ef9427ebcb12c7721187f8bf7305d2839cfcf2410987f14,2024-12-12T12:15:25.653000
|
||||||
CVE-2024-54108,1,1,4143f69ac737b42f763083f896fb4f01320638f88eafcf7c834857b6e4cdc577,2024-12-12T12:15:26.023000
|
CVE-2024-54108,0,0,4143f69ac737b42f763083f896fb4f01320638f88eafcf7c834857b6e4cdc577,2024-12-12T12:15:26.023000
|
||||||
CVE-2024-54109,1,1,56344fe1ed621c9f75d875f4c8441bc88e4f5f6f4c6cc53a246c6690c62ea040,2024-12-12T12:15:26.270000
|
CVE-2024-54109,0,0,56344fe1ed621c9f75d875f4c8441bc88e4f5f6f4c6cc53a246c6690c62ea040,2024-12-12T12:15:26.270000
|
||||||
CVE-2024-5411,0,0,e795bc7b322ce716766b807c3b3b3802815a82a4cbe62ad72330624f242dbba1,2024-11-21T09:47:36.060000
|
CVE-2024-5411,0,0,e795bc7b322ce716766b807c3b3b3802815a82a4cbe62ad72330624f242dbba1,2024-11-21T09:47:36.060000
|
||||||
CVE-2024-54110,1,1,3f42e20a25cbd91964a89e9fdfbea09ea139eba6f3574895d470cd5289c69a21,2024-12-12T12:15:26.453000
|
CVE-2024-54110,0,0,3f42e20a25cbd91964a89e9fdfbea09ea139eba6f3574895d470cd5289c69a21,2024-12-12T12:15:26.453000
|
||||||
CVE-2024-54111,1,1,77d1193dcf328f6cc416a16012a2642072a9732c7ba8f363914436c79d1f4c70,2024-12-12T12:15:26.647000
|
CVE-2024-54111,0,0,77d1193dcf328f6cc416a16012a2642072a9732c7ba8f363914436c79d1f4c70,2024-12-12T12:15:26.647000
|
||||||
CVE-2024-54112,1,1,327478728a691456163c2d383338a11b1642cfdb2d101001c14c7cf30a96b490,2024-12-12T12:15:26.823000
|
CVE-2024-54112,0,0,327478728a691456163c2d383338a11b1642cfdb2d101001c14c7cf30a96b490,2024-12-12T12:15:26.823000
|
||||||
CVE-2024-54113,1,1,c17639bbac31d6e767f94e59a9d5739dfb09652acfe6fca0f6bdfa4200798999,2024-12-12T12:15:27.003000
|
CVE-2024-54113,0,0,c17639bbac31d6e767f94e59a9d5739dfb09652acfe6fca0f6bdfa4200798999,2024-12-12T12:15:27.003000
|
||||||
CVE-2024-54114,1,1,a111534753b98540ca337acd88aa702ae8e630c62254e7687d6734548077dc0f,2024-12-12T12:15:27.187000
|
CVE-2024-54114,0,0,a111534753b98540ca337acd88aa702ae8e630c62254e7687d6734548077dc0f,2024-12-12T12:15:27.187000
|
||||||
CVE-2024-54115,1,1,741355349f9435cd42c66f3377cffe1583cafeb2023d8a0204d2ccf228f9cecb,2024-12-12T12:15:27.363000
|
CVE-2024-54115,0,0,741355349f9435cd42c66f3377cffe1583cafeb2023d8a0204d2ccf228f9cecb,2024-12-12T12:15:27.363000
|
||||||
CVE-2024-54116,1,1,197dbc22138009348c82a9c1242c98a9b08fd86b4623d5cdeb06e97e7982fbff,2024-12-12T12:15:27.570000
|
CVE-2024-54116,0,0,197dbc22138009348c82a9c1242c98a9b08fd86b4623d5cdeb06e97e7982fbff,2024-12-12T12:15:27.570000
|
||||||
CVE-2024-54117,1,1,837b889858c5f1ca4d6b9874369983f269bb57694a2e404b05d165d17f63d118,2024-12-12T12:15:27.747000
|
CVE-2024-54117,0,0,837b889858c5f1ca4d6b9874369983f269bb57694a2e404b05d165d17f63d118,2024-12-12T12:15:27.747000
|
||||||
|
CVE-2024-54118,1,1,06dbbaa56dbb0521d92a05cf41eb27809fd6ac01cf0fe92db998592469d94917,2024-12-12T13:15:11.180000
|
||||||
|
CVE-2024-54119,1,1,8d1b082013414edb4cf2a70c615ee571882f6082c2475b11b8446d45709196a0,2024-12-12T13:15:11.350000
|
||||||
CVE-2024-5412,0,0,30cdd8d4ddc0c145e9e904e4cec9f4dfba9de81bde8e7e7c7fe70aa069b0dcac,2024-09-06T18:07:43.940000
|
CVE-2024-5412,0,0,30cdd8d4ddc0c145e9e904e4cec9f4dfba9de81bde8e7e7c7fe70aa069b0dcac,2024-09-06T18:07:43.940000
|
||||||
|
CVE-2024-54122,1,1,dd9e24175ea566453e4c3ad71fd1ead238a480148cc91ac618503312b8837b99,2024-12-12T13:15:11.527000
|
||||||
CVE-2024-54123,0,0,adb9d810678343393bca99901a3c1b47719ef78df3ca8f4e2f7e11c7b4e0333a,2024-11-29T19:15:10.287000
|
CVE-2024-54123,0,0,adb9d810678343393bca99901a3c1b47719ef78df3ca8f4e2f7e11c7b4e0333a,2024-11-29T19:15:10.287000
|
||||||
CVE-2024-54124,0,0,d93261f0be0c719ea94f116c38fdd88edcab344178e1fea1cd1f60fbeb46997e,2024-11-29T19:15:10.443000
|
CVE-2024-54124,0,0,d93261f0be0c719ea94f116c38fdd88edcab344178e1fea1cd1f60fbeb46997e,2024-11-29T19:15:10.443000
|
||||||
CVE-2024-54126,0,0,3941fb8e728e330fd976c4332894869311a751e23bfc8b1148739b238362642b,2024-12-05T13:15:09.290000
|
CVE-2024-54126,0,0,3941fb8e728e330fd976c4332894869311a751e23bfc8b1148739b238362642b,2024-12-05T13:15:09.290000
|
||||||
@ -272053,7 +272066,7 @@ CVE-2024-8174,0,0,1dc878ba3beb9968167e459c17f743abf529f1002a73d2a9a97eee6f148db5
|
|||||||
CVE-2024-8175,0,0,315b5d8c30fa3f596d2b19f9165abc0783338a7797fc6b810b3d2ebf5065b9c7,2024-09-26T13:32:02.803000
|
CVE-2024-8175,0,0,315b5d8c30fa3f596d2b19f9165abc0783338a7797fc6b810b3d2ebf5065b9c7,2024-09-26T13:32:02.803000
|
||||||
CVE-2024-8177,0,0,68f0684d583a9f9a4ce375a0141ea9098b00e19628bd3c6b03452fa109f6e864,2024-11-26T19:15:31.860000
|
CVE-2024-8177,0,0,68f0684d583a9f9a4ce375a0141ea9098b00e19628bd3c6b03452fa109f6e864,2024-11-26T19:15:31.860000
|
||||||
CVE-2024-8178,0,0,f63bf0f152c4f86c96b3594773688985cacb234931d40b4f2f4b7730cd2e6082,2024-09-06T17:35:20.203000
|
CVE-2024-8178,0,0,f63bf0f152c4f86c96b3594773688985cacb234931d40b4f2f4b7730cd2e6082,2024-09-06T17:35:20.203000
|
||||||
CVE-2024-8179,1,1,dc903cc4005a44195e415ea8e3115125e204701e617987249daed976903cce6a,2024-12-12T12:15:27.937000
|
CVE-2024-8179,0,0,dc903cc4005a44195e415ea8e3115125e204701e617987249daed976903cce6a,2024-12-12T12:15:27.937000
|
||||||
CVE-2024-8180,0,0,117d846afafa242adbc4406c5ff142ffe8b88b5bbef46dbdcd45c56ba413becd,2024-11-15T13:58:08.913000
|
CVE-2024-8180,0,0,117d846afafa242adbc4406c5ff142ffe8b88b5bbef46dbdcd45c56ba413becd,2024-11-15T13:58:08.913000
|
||||||
CVE-2024-8181,0,0,df421880038257102966196c13cd04d05c22cea7a93153a2801c2b264a3f913a,2024-09-06T15:35:07.267000
|
CVE-2024-8181,0,0,df421880038257102966196c13cd04d05c22cea7a93153a2801c2b264a3f913a,2024-09-06T15:35:07.267000
|
||||||
CVE-2024-8182,0,0,ea6aec216face156fcef6f098448074a9c150d5b197d49bfe7028bcbeb9c8aa3,2024-08-30T13:53:52.197000
|
CVE-2024-8182,0,0,ea6aec216face156fcef6f098448074a9c150d5b197d49bfe7028bcbeb9c8aa3,2024-08-30T13:53:52.197000
|
||||||
@ -272096,7 +272109,7 @@ CVE-2024-8229,0,0,0f0c3bade6073339f6fc40762170674788262ef054336179c520aead1aa17a
|
|||||||
CVE-2024-8230,0,0,30b3e89c4400fc9a0469e6c715c05bc0b5a379c6df176bbc381a46fd5bfda112,2024-08-29T00:08:24.643000
|
CVE-2024-8230,0,0,30b3e89c4400fc9a0469e6c715c05bc0b5a379c6df176bbc381a46fd5bfda112,2024-08-29T00:08:24.643000
|
||||||
CVE-2024-8231,0,0,7b1368650149e5f428621f08aabb2898c481bc6c90025aa2d156bedb40168791,2024-10-16T20:01:30.877000
|
CVE-2024-8231,0,0,7b1368650149e5f428621f08aabb2898c481bc6c90025aa2d156bedb40168791,2024-10-16T20:01:30.877000
|
||||||
CVE-2024-8232,0,0,a69636827e9fee8b582093e92530655a6c59ea13191cf499db607e808cf33182,2024-09-11T16:26:11.920000
|
CVE-2024-8232,0,0,a69636827e9fee8b582093e92530655a6c59ea13191cf499db607e808cf33182,2024-09-11T16:26:11.920000
|
||||||
CVE-2024-8233,1,1,2565a2f145c1b82e4e17dc18a57e7d07f1fc6970c1bb6ea1b67496837e1af9c1,2024-12-12T12:15:28.120000
|
CVE-2024-8233,0,0,2565a2f145c1b82e4e17dc18a57e7d07f1fc6970c1bb6ea1b67496837e1af9c1,2024-12-12T12:15:28.120000
|
||||||
CVE-2024-8234,0,0,95ebed0db99ea339d09aa632fba8014d36ee19972c4de55ce87523d4a48f000d,2024-08-30T13:00:05.390000
|
CVE-2024-8234,0,0,95ebed0db99ea339d09aa632fba8014d36ee19972c4de55ce87523d4a48f000d,2024-08-30T13:00:05.390000
|
||||||
CVE-2024-8235,0,0,92d140a8cdbaca4d63092d44133892839b758a6b944ab2f33fbe74524523db69,2024-11-21T09:52:55.440000
|
CVE-2024-8235,0,0,92d140a8cdbaca4d63092d44133892839b758a6b944ab2f33fbe74524523db69,2024-11-21T09:52:55.440000
|
||||||
CVE-2024-8236,0,0,a9354591770ec6819f85c9a3fbf166dfa5e7589e439c687e4e3141e2652cb2af,2024-11-26T14:15:22.217000
|
CVE-2024-8236,0,0,a9354591770ec6819f85c9a3fbf166dfa5e7589e439c687e4e3141e2652cb2af,2024-11-26T14:15:22.217000
|
||||||
@ -272432,7 +272445,7 @@ CVE-2024-8643,0,0,cbea7b9a6f59c586a627b90f33481078a840b0ca42db0dfdb8ba2116e3145b
|
|||||||
CVE-2024-8644,0,0,2dfdb42d1a9b750aaa29594591bf9a515d2eee126b389920bb78dd9d0a1f2e71,2024-10-04T17:14:20.587000
|
CVE-2024-8644,0,0,2dfdb42d1a9b750aaa29594591bf9a515d2eee126b389920bb78dd9d0a1f2e71,2024-10-04T17:14:20.587000
|
||||||
CVE-2024-8645,0,0,6c6883b70c241242d9a1f65a2463032602ee72b4685cb982075bbd16ddb3850e,2024-09-10T12:09:50.377000
|
CVE-2024-8645,0,0,6c6883b70c241242d9a1f65a2463032602ee72b4685cb982075bbd16ddb3850e,2024-09-10T12:09:50.377000
|
||||||
CVE-2024-8646,0,0,5d4c3a28ebd32aa1f4378c55d3483650a644a252e8339908c6d85c6b0a714f65,2024-09-18T20:20:51.643000
|
CVE-2024-8646,0,0,5d4c3a28ebd32aa1f4378c55d3483650a644a252e8339908c6d85c6b0a714f65,2024-09-18T20:20:51.643000
|
||||||
CVE-2024-8647,1,1,6801f15749db20b91800273bd2daa788ac40474b525c86f76604562aa5bd48b6,2024-12-12T12:15:28.297000
|
CVE-2024-8647,0,0,6801f15749db20b91800273bd2daa788ac40474b525c86f76604562aa5bd48b6,2024-12-12T12:15:28.297000
|
||||||
CVE-2024-8648,0,0,7583459ecb84585b0b32bbfa86cdb4d5a6c70ebcb60ba453627ebf383edd5a01,2024-11-15T13:58:08.913000
|
CVE-2024-8648,0,0,7583459ecb84585b0b32bbfa86cdb4d5a6c70ebcb60ba453627ebf383edd5a01,2024-11-15T13:58:08.913000
|
||||||
CVE-2024-8651,0,0,448e710c58dc2b6cb7e6c0752275d7c46f3230f5cc540adcb81ec64c7f3e3413,2024-09-23T17:51:13.050000
|
CVE-2024-8651,0,0,448e710c58dc2b6cb7e6c0752275d7c46f3230f5cc540adcb81ec64c7f3e3413,2024-09-23T17:51:13.050000
|
||||||
CVE-2024-8652,0,0,b93328507c3e2c61251105f102cea9b9503ccc6f996f8a6d11d528a513238383,2024-09-23T17:53:49.197000
|
CVE-2024-8652,0,0,b93328507c3e2c61251105f102cea9b9503ccc6f996f8a6d11d528a513238383,2024-09-23T17:53:49.197000
|
||||||
@ -272992,7 +273005,7 @@ CVE-2024-9360,0,0,9e7f98e3d809b8c96b9d73cc0b5d35292511289aedca7f27c34f93544c8c9f
|
|||||||
CVE-2024-9361,0,0,5bc3da93845b38589382163c5da3beae4068773a42f5aefb96e280c13a317d80,2024-11-01T18:46:32.783000
|
CVE-2024-9361,0,0,5bc3da93845b38589382163c5da3beae4068773a42f5aefb96e280c13a317d80,2024-11-01T18:46:32.783000
|
||||||
CVE-2024-9364,0,0,9ebd82b4859f157f79a8dcd16aa66e84da6e7858640c431e532bfbe4c36998a2,2024-10-22T15:26:10.673000
|
CVE-2024-9364,0,0,9ebd82b4859f157f79a8dcd16aa66e84da6e7858640c431e532bfbe4c36998a2,2024-10-22T15:26:10.673000
|
||||||
CVE-2024-9366,0,0,db84f6e2ff16ebff2d502f21f85e90095a4a755ba5e4941bffb7a9e2e4c31307,2024-10-22T15:09:48.177000
|
CVE-2024-9366,0,0,db84f6e2ff16ebff2d502f21f85e90095a4a755ba5e4941bffb7a9e2e4c31307,2024-10-22T15:09:48.177000
|
||||||
CVE-2024-9367,1,1,0490c5630af99317b70a177927e7e490d30802f34cc3cc0c2c86826e7a151905,2024-12-12T12:15:28.497000
|
CVE-2024-9367,0,0,0490c5630af99317b70a177927e7e490d30802f34cc3cc0c2c86826e7a151905,2024-12-12T12:15:28.497000
|
||||||
CVE-2024-9368,0,0,6b310411ff00de8abfede8a1c8f49292bfd465b294d4fa7ea5baca1d5f7f7405,2024-10-10T20:30:51.240000
|
CVE-2024-9368,0,0,6b310411ff00de8abfede8a1c8f49292bfd465b294d4fa7ea5baca1d5f7f7405,2024-10-10T20:30:51.240000
|
||||||
CVE-2024-9369,0,0,44fa2193f75586b1458beb818a5e1c2c9f22056f87d27b78d9d601599ada3720,2024-11-27T19:15:33.883000
|
CVE-2024-9369,0,0,44fa2193f75586b1458beb818a5e1c2c9f22056f87d27b78d9d601599ada3720,2024-11-27T19:15:33.883000
|
||||||
CVE-2024-9371,0,0,6b69a68b0411ce9f1a3873a71c65ed5e38b4a3301ee458433c180567bd1ea8c9,2024-11-21T13:57:24.187000
|
CVE-2024-9371,0,0,6b69a68b0411ce9f1a3873a71c65ed5e38b4a3301ee458433c180567bd1ea8c9,2024-11-21T13:57:24.187000
|
||||||
@ -273011,7 +273024,7 @@ CVE-2024-9383,0,0,b7617b74ef4da113d7cf5afa0950d70949b5b59027c6cf75c70744cb91a0ee
|
|||||||
CVE-2024-9384,0,0,ae8a39c564e82dbd6457db653f3a9bfb0f9f90a890c89dcc0a652cdab4a7191b,2024-10-10T20:52:33.333000
|
CVE-2024-9384,0,0,ae8a39c564e82dbd6457db653f3a9bfb0f9f90a890c89dcc0a652cdab4a7191b,2024-10-10T20:52:33.333000
|
||||||
CVE-2024-9385,0,0,11d26d69edf7cd05785d7947d27cc3b8e693949d9e16b32a439334da8eabbb91,2024-10-07T17:48:28.117000
|
CVE-2024-9385,0,0,11d26d69edf7cd05785d7947d27cc3b8e693949d9e16b32a439334da8eabbb91,2024-10-07T17:48:28.117000
|
||||||
CVE-2024-9386,0,0,40b1e099aced766613386d42a163e901ce3fa54d1f7c244b23685d231017f4e0,2024-11-18T17:11:17.393000
|
CVE-2024-9386,0,0,40b1e099aced766613386d42a163e901ce3fa54d1f7c244b23685d231017f4e0,2024-11-18T17:11:17.393000
|
||||||
CVE-2024-9387,1,1,c91dd8a03a42787566fa8593c6a34bb5905a66c37de31af7b93f0105c42d461e,2024-12-12T12:15:28.727000
|
CVE-2024-9387,0,0,c91dd8a03a42787566fa8593c6a34bb5905a66c37de31af7b93f0105c42d461e,2024-12-12T12:15:28.727000
|
||||||
CVE-2024-9388,0,0,faa9b09575a77d9ded1960e9b0fc31a1265b5ea5ecaad878a5f831a26c433777,2024-11-01T12:57:03.417000
|
CVE-2024-9388,0,0,faa9b09575a77d9ded1960e9b0fc31a1265b5ea5ecaad878a5f831a26c433777,2024-11-01T12:57:03.417000
|
||||||
CVE-2024-9391,0,0,0b5514fcac669714e6f01a53b731f460c97b1b96d9cd17909f2327df86dfa0a7,2024-11-22T19:15:07.653000
|
CVE-2024-9391,0,0,0b5514fcac669714e6f01a53b731f460c97b1b96d9cd17909f2327df86dfa0a7,2024-11-22T19:15:07.653000
|
||||||
CVE-2024-9392,0,0,3897eba657ef73df994749d3992567f48ac4f6aa96a842beef14b63d03694543,2024-10-04T13:51:25.567000
|
CVE-2024-9392,0,0,3897eba657ef73df994749d3992567f48ac4f6aa96a842beef14b63d03694543,2024-10-04T13:51:25.567000
|
||||||
|
Can't render this file because it is too large.
|
Loading…
x
Reference in New Issue
Block a user