mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-06-19 17:31:42 +00:00
Auto-Update: 2024-09-10T16:00:22.052198+00:00
This commit is contained in:
parent
6bb91c22de
commit
df88f2a485
56
CVE-2022/CVE-2022-458xx/CVE-2022-45856.json
Normal file
56
CVE-2022/CVE-2022-458xx/CVE-2022-45856.json
Normal file
@ -0,0 +1,56 @@
|
||||
{
|
||||
"id": "CVE-2022-45856",
|
||||
"sourceIdentifier": "psirt@fortinet.com",
|
||||
"published": "2024-09-10T15:15:13.823",
|
||||
"lastModified": "2024-09-10T15:50:47.237",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "An improper certificate validation vulnerability [CWE-295] in FortiClientWindows 6.4 all versions, 7.0.0 through 7.0.7, FortiClientMac 6.4 all versions, 7.0 all versions, 7.2.0 through 7.2.4, FortiClientLinux 6.4 all versions, 7.0 all versions, 7.2.0 through 7.2.4, FortiClientAndroid 6.4 all versions, 7.0 all versions, 7.2.0 and FortiClientiOS 5.6 all versions, 6.0.0 through 6.0.1, 7.0.0 through 7.0.6 SAML SSO feature may allow an unauthenticated attacker to\u00a0man-in-the-middle the communication between the FortiClient and\u00a0 both the service provider and the identity provider."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "psirt@fortinet.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "HIGH",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 4.8,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.2,
|
||||
"impactScore": 2.5
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "psirt@fortinet.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-295"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://fortiguard.fortinet.com/psirt/FG-IR-22-230",
|
||||
"source": "psirt@fortinet.com"
|
||||
}
|
||||
]
|
||||
}
|
29
CVE-2023/CVE-2023-372xx/CVE-2023-37226.json
Normal file
29
CVE-2023/CVE-2023-372xx/CVE-2023-37226.json
Normal file
@ -0,0 +1,29 @@
|
||||
{
|
||||
"id": "CVE-2023-37226",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-09-10T14:15:11.927",
|
||||
"lastModified": "2024-09-10T15:50:57.713",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Loftware Spectrum before 4.6 HF14 has Missing Authentication for a Critical Function."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://code-white.com",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://code-white.com/public-vulnerability-list/",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://docs.loftware.com/spectrum-releasenotes/Content/Hotfix/4.6_HF14.htm",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
29
CVE-2023/CVE-2023-372xx/CVE-2023-37227.json
Normal file
29
CVE-2023/CVE-2023-372xx/CVE-2023-37227.json
Normal file
@ -0,0 +1,29 @@
|
||||
{
|
||||
"id": "CVE-2023-37227",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-09-10T14:15:12.063",
|
||||
"lastModified": "2024-09-10T15:50:57.713",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Loftware Spectrum before 4.6 HF13 Deserializes Untrusted Data."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://code-white.com",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://code-white.com/public-vulnerability-list/",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://docs.loftware.com/spectrum-releasenotes/Content/Hotfix/4.6_HF13.htm",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
25
CVE-2023/CVE-2023-372xx/CVE-2023-37229.json
Normal file
25
CVE-2023/CVE-2023-372xx/CVE-2023-37229.json
Normal file
@ -0,0 +1,25 @@
|
||||
{
|
||||
"id": "CVE-2023-37229",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-09-10T14:15:12.140",
|
||||
"lastModified": "2024-09-10T15:50:57.713",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Loftware Spectrum before 5.1 allows SSRF."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://code-white.com",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://code-white.com/public-vulnerability-list/",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
25
CVE-2023/CVE-2023-372xx/CVE-2023-37230.json
Normal file
25
CVE-2023/CVE-2023-372xx/CVE-2023-37230.json
Normal file
@ -0,0 +1,25 @@
|
||||
{
|
||||
"id": "CVE-2023-37230",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-09-10T14:15:12.210",
|
||||
"lastModified": "2024-09-10T15:50:57.713",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Loftware Spectrum (testDeviceConnection) before 5.1 allows SSRF."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://code-white.com",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://code-white.com/public-vulnerability-list/",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
29
CVE-2023/CVE-2023-372xx/CVE-2023-37231.json
Normal file
29
CVE-2023/CVE-2023-372xx/CVE-2023-37231.json
Normal file
@ -0,0 +1,29 @@
|
||||
{
|
||||
"id": "CVE-2023-37231",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-09-10T14:15:12.283",
|
||||
"lastModified": "2024-09-10T15:50:57.713",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Loftware Spectrum before 4.6 HF14 uses a Hard-coded Password."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://code-white.com",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://code-white.com/public-vulnerability-list/",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://docs.loftware.com/spectrum-releasenotes/Content/Hotfix/4.6_HF14.htm",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-41988",
|
||||
"sourceIdentifier": "product-security@apple.com",
|
||||
"published": "2023-10-25T19:15:10.160",
|
||||
"lastModified": "2023-11-02T18:00:25.943",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2024-09-10T15:35:02.160",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -49,6 +49,16 @@
|
||||
"value": "NVD-CWE-noinfo"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-200"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
|
56
CVE-2023/CVE-2023-442xx/CVE-2023-44254.json
Normal file
56
CVE-2023/CVE-2023-442xx/CVE-2023-44254.json
Normal file
@ -0,0 +1,56 @@
|
||||
{
|
||||
"id": "CVE-2023-44254",
|
||||
"sourceIdentifier": "psirt@fortinet.com",
|
||||
"published": "2024-09-10T15:15:14.173",
|
||||
"lastModified": "2024-09-10T15:50:47.237",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "An authorization bypass through user-controlled key\u00a0[CWE-639] vulnerability in FortiAnalyzer version 7.4.1 and before 7.2.5 and FortiManager version 7.4.1 and before 7.2.5 may allow a remote attacker with low privileges to read sensitive data via a crafted HTTP request."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "psirt@fortinet.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 5.0,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 3.1,
|
||||
"impactScore": 1.4
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "psirt@fortinet.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-639"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://fortiguard.com/psirt/FG-IR-23-204",
|
||||
"source": "psirt@fortinet.com"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2023-50883",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-09-09T20:15:03.640",
|
||||
"lastModified": "2024-09-10T12:09:50.377",
|
||||
"lastModified": "2024-09-10T15:35:05.733",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -15,7 +15,42 @@
|
||||
"value": "Los documentos de ONLYOFFICE anteriores a la versi\u00f3n 8.0.1 permiten XSS porque una macro es una expresi\u00f3n de funci\u00f3n invocada inmediatamente (IIFE) y, por lo tanto, es posible un escape de la zona protegida llamando directamente al constructor del objeto Funci\u00f3n. NOTA: este problema existe debido a una correcci\u00f3n incorrecta de CVE-2021-43446."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 6.1,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 2.7
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.onlyoffice.com/",
|
||||
|
56
CVE-2024/CVE-2024-217xx/CVE-2024-21753.json
Normal file
56
CVE-2024/CVE-2024-217xx/CVE-2024-21753.json
Normal file
@ -0,0 +1,56 @@
|
||||
{
|
||||
"id": "CVE-2024-21753",
|
||||
"sourceIdentifier": "psirt@fortinet.com",
|
||||
"published": "2024-09-10T15:15:14.543",
|
||||
"lastModified": "2024-09-10T15:50:47.237",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A improper limitation of a pathname to a restricted directory ('path traversal') in Fortinet FortiClientEMS versions 7.2.0 through 7.2.4, 7.0.0 through 7.0.13, 6.4.0 through 6.4.9, 6.2.0 through 6.2.9, 6.0.0 through 6.0.8, 1.2.1 through 1.2.5 allows attacker to perform a denial of service, read or write a limited number of files via specially crafted HTTP requests"
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "psirt@fortinet.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "HIGH",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 5.5,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 1.2,
|
||||
"impactScore": 4.2
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "psirt@fortinet.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-22"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://fortiguard.fortinet.com/psirt/FG-IR-23-362",
|
||||
"source": "psirt@fortinet.com"
|
||||
}
|
||||
]
|
||||
}
|
56
CVE-2024/CVE-2024-231xx/CVE-2024-23184.json
Normal file
56
CVE-2024/CVE-2024-231xx/CVE-2024-23184.json
Normal file
@ -0,0 +1,56 @@
|
||||
{
|
||||
"id": "CVE-2024-23184",
|
||||
"sourceIdentifier": "security@open-xchange.com",
|
||||
"published": "2024-09-10T15:15:14.763",
|
||||
"lastModified": "2024-09-10T15:50:47.237",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Having a large number of address headers (From, To, Cc, Bcc, etc.) becomes excessively CPU intensive. With 100k header lines CPU usage is already 12 seconds, and in a production environment we observed 500k header lines taking 18 minutes to parse. Since this can be triggered by external actors sending emails to a victim, this is a security issue. An external attacker can send specially crafted messages that consume target system resources and cause outage. One can implement restrictions on address headers on MTA component preceding Dovecot. No publicly available exploits are known."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security@open-xchange.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 5.0,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 3.1,
|
||||
"impactScore": 1.4
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security@open-xchange.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-770"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://documentation.open-xchange.com/dovecot/security/advisories/csaf/2024/oxdc-adv-2024-0002.json",
|
||||
"source": "security@open-xchange.com"
|
||||
}
|
||||
]
|
||||
}
|
56
CVE-2024/CVE-2024-231xx/CVE-2024-23185.json
Normal file
56
CVE-2024/CVE-2024-231xx/CVE-2024-23185.json
Normal file
@ -0,0 +1,56 @@
|
||||
{
|
||||
"id": "CVE-2024-23185",
|
||||
"sourceIdentifier": "security@open-xchange.com",
|
||||
"published": "2024-09-10T15:15:14.967",
|
||||
"lastModified": "2024-09-10T15:50:47.237",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Very large headers can cause resource exhaustion when parsing message. The message-parser normally reads reasonably sized chunks of the message. However, when it feeds them to message-header-parser, it starts building up \"full_value\" buffer out of the smaller chunks. The full_value buffer has no size limit, so large headers can cause large memory usage. It doesn't matter whether it's a single long header line, or a single header split into multiple lines. This bug exists in all Dovecot versions. Incoming mails typically have some size limits set by MTA, so even largest possible header size may still fit into Dovecot's vsz_limit. So attackers probably can't DoS a victim user this way. A user could APPEND larger mails though, allowing them to DoS themselves (although maybe cause some memory issues for the backend in general). One can implement restrictions on headers on MTA component preceding Dovecot. No publicly available exploits are known."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security@open-xchange.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 7.5,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security@open-xchange.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-770"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://documentation.open-xchange.com/dovecot/security/advisories/csaf/2024/oxdc-adv-2024-0003.json",
|
||||
"source": "security@open-xchange.com"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-23321",
|
||||
"sourceIdentifier": "security@apache.org",
|
||||
"published": "2024-07-22T10:15:02.540",
|
||||
"lastModified": "2024-08-01T13:47:17.543",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2024-09-10T15:15:43.803",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -17,6 +17,26 @@
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 8.8,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 5.9
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
@ -41,8 +61,18 @@
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security@apache.org",
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "NVD-CWE-noinfo"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "security@apache.org",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -51,14 +81,40 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:apache:rocketmq:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "4.5.2",
|
||||
"versionEndExcluding": "5.3.0",
|
||||
"matchCriteriaId": "DA5E569D-038D-4D61-B341-82F2C017CC34"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "http://www.openwall.com/lists/oss-security/2024/07/22/1",
|
||||
"source": "security@apache.org"
|
||||
"source": "security@apache.org",
|
||||
"tags": [
|
||||
"Mailing List"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://lists.apache.org/thread/lr8npobww786nrnddd1pcy974r17c830",
|
||||
"source": "security@apache.org"
|
||||
"source": "security@apache.org",
|
||||
"tags": [
|
||||
"Mailing List",
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
48
CVE-2024/CVE-2024-250xx/CVE-2024-25073.json
Normal file
48
CVE-2024/CVE-2024-250xx/CVE-2024-25073.json
Normal file
@ -0,0 +1,48 @@
|
||||
{
|
||||
"id": "CVE-2024-25073",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-09-10T15:15:15.170",
|
||||
"lastModified": "2024-09-10T15:50:47.237",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "An issue was discovered in Samsung Semiconductor Mobile Processor, Automotive Processor, and Modem Exynos 9820, Exynos 9825, Exynos 980, Exynos 990, Exynos 850, Exynos 1080, Exynos 2100, Exynos 2200, Exynos 1280, Exynos 1380, Exynos 1330, Exynos 9110, Exynos W920, Exynos W930, Exynos Modem 5123, Exynos Modem 5300. The baseband software does not properly check a pointer specified by the CC (Call Control module), which can lead to Denial of Service (Untrusted Pointer Dereference)."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "cve@mitre.org",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "HIGH",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 5.9,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.2,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://semiconductor.samsung.com/support/quality-support/product-security-updates/",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://semiconductor.samsung.com/support/quality-support/product-security-updates/cve-2024-25073/",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
48
CVE-2024/CVE-2024-250xx/CVE-2024-25074.json
Normal file
48
CVE-2024/CVE-2024-250xx/CVE-2024-25074.json
Normal file
@ -0,0 +1,48 @@
|
||||
{
|
||||
"id": "CVE-2024-25074",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-09-10T15:15:15.370",
|
||||
"lastModified": "2024-09-10T15:50:47.237",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "An issue was discovered in Samsung Semiconductor Mobile Processor, Automotive Processor, and Modem Exynos 9820, Exynos 9825, Exynos 980, Exynos 990, Exynos 850, Exynos 1080, Exynos 2100, Exynos 2200, Exynos 1280, Exynos 1380, Exynos 1330, Exynos 9110, Exynos W920, Exynos W930, Exynos Modem 5123, Exynos Modem 5300. The baseband software does not properly check a pointer specified by the SM (Session Management module), which can lead to Denial of Service (Untrusted Pointer Dereference)."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "cve@mitre.org",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "HIGH",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 5.9,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.2,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://semiconductor.samsung.com/support/quality-support/product-security-updates/",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://semiconductor.samsung.com/support/quality-support/product-security-updates/cve-2024-25074/",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
60
CVE-2024/CVE-2024-272xx/CVE-2024-27257.json
Normal file
60
CVE-2024/CVE-2024-272xx/CVE-2024-27257.json
Normal file
@ -0,0 +1,60 @@
|
||||
{
|
||||
"id": "CVE-2024-27257",
|
||||
"sourceIdentifier": "psirt@us.ibm.com",
|
||||
"published": "2024-09-10T15:15:15.570",
|
||||
"lastModified": "2024-09-10T15:50:47.237",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "IBM OpenPages 8.3 and 9.0 potentially exposes information about client-side source code through use of JavaScript source maps to unauthorized users."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "psirt@us.ibm.com",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 4.3,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 1.4
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "psirt@us.ibm.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-540"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/283966",
|
||||
"source": "psirt@us.ibm.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.ibm.com/support/pages/node/7167702",
|
||||
"source": "psirt@us.ibm.com"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-29014",
|
||||
"sourceIdentifier": "PSIRT@sonicwall.com",
|
||||
"published": "2024-07-18T08:15:02.173",
|
||||
"lastModified": "2024-08-01T13:49:23.520",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2024-09-10T14:12:21.223",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -17,6 +17,26 @@
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 8.8,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 5.9
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
@ -51,10 +71,31 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:sonicwall:netextender:*:*:*:*:*:windows:*:*",
|
||||
"versionEndExcluding": "10.2.341",
|
||||
"matchCriteriaId": "E46B90F9-C6DD-44B8-AE8A-ABE37FF22D3E"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2024-0011",
|
||||
"source": "PSIRT@sonicwall.com"
|
||||
"source": "PSIRT@sonicwall.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-2937",
|
||||
"sourceIdentifier": "arm-security@arm.com",
|
||||
"published": "2024-08-05T12:15:34.593",
|
||||
"lastModified": "2024-08-05T16:35:09.543",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2024-09-10T15:03:49.607",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -17,6 +17,26 @@
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 7.8,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 5.9
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
@ -40,6 +60,16 @@
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-416"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "arm-security@arm.com",
|
||||
"type": "Secondary",
|
||||
@ -51,10 +81,46 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:arm:5th_gen_gpu_architecture_kernel_driver:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "r41p0",
|
||||
"versionEndExcluding": "r50p0",
|
||||
"matchCriteriaId": "98F67DF9-8978-475C-99AF-A09BB9B66012"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:arm:bifrost_gpu_kernel_driver:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "r41p0",
|
||||
"versionEndExcluding": "r50p0",
|
||||
"matchCriteriaId": "052571C0-5278-44DC-B84D-A461A76A0FD3"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:arm:valhall_gpu_kernel_driver:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "r41p0",
|
||||
"versionEndExcluding": "r50p0",
|
||||
"matchCriteriaId": "A40D4A14-E504-4E8A-8431-8677CA91B30A"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://developer.arm.com/Arm%20Security%20Center/Mali%20GPU%20Driver%20Vulnerabilities",
|
||||
"source": "arm-security@arm.com"
|
||||
"source": "arm-security@arm.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
56
CVE-2024/CVE-2024-314xx/CVE-2024-31489.json
Normal file
56
CVE-2024/CVE-2024-314xx/CVE-2024-31489.json
Normal file
@ -0,0 +1,56 @@
|
||||
{
|
||||
"id": "CVE-2024-31489",
|
||||
"sourceIdentifier": "psirt@fortinet.com",
|
||||
"published": "2024-09-10T15:15:15.787",
|
||||
"lastModified": "2024-09-10T15:50:47.237",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "AAn improper certificate validation vulnerability [CWE-295] in FortiClientWindows 7.2.0 through 7.2.2, 7.0.0 through 7.0.11, FortiClientLinux 7.2.0, 7.0.0 through 7.0.11 and FortiClientMac 7.0.0 through 7.0.11, 7.2.0 through 7.2.4 may allow a remote and unauthenticated attacker to perform a Man-in-the-Middle attack on the communication channel between the FortiGate and the FortiClient during the ZTNA tunnel creation"
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "psirt@fortinet.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N",
|
||||
"attackVector": "ADJACENT_NETWORK",
|
||||
"attackComplexity": "HIGH",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 6.8,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 1.6,
|
||||
"impactScore": 5.2
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "psirt@fortinet.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-295"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://fortiguard.fortinet.com/psirt/FG-IR-22-282",
|
||||
"source": "psirt@fortinet.com"
|
||||
}
|
||||
]
|
||||
}
|
56
CVE-2024/CVE-2024-314xx/CVE-2024-31490.json
Normal file
56
CVE-2024/CVE-2024-314xx/CVE-2024-31490.json
Normal file
@ -0,0 +1,56 @@
|
||||
{
|
||||
"id": "CVE-2024-31490",
|
||||
"sourceIdentifier": "psirt@fortinet.com",
|
||||
"published": "2024-09-10T15:15:15.983",
|
||||
"lastModified": "2024-09-10T15:50:47.237",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "An exposure of sensitive information to an unauthorized actor in Fortinet FortiSandbox version 4.4.0 through 4.4.4 and 4.2.0 through 4.2.6 and 4.0.0 through 4.0.5 and 3.2.2 through 3.2.4 and 3.1.5 allows attacker to information disclosure via HTTP get requests."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "psirt@fortinet.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 4.3,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 1.4
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "psirt@fortinet.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-200"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://fortiguard.com/psirt/FG-IR-24-051",
|
||||
"source": "psirt@fortinet.com"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-3297",
|
||||
"sourceIdentifier": "cve-requests@bitdefender.com",
|
||||
"published": "2024-07-24T08:15:02.880",
|
||||
"lastModified": "2024-07-24T12:55:13.223",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2024-09-10T15:41:15.547",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -17,6 +17,26 @@
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
|
||||
"attackVector": "ADJACENT_NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 6.5,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 3.6
|
||||
},
|
||||
{
|
||||
"source": "cve-requests@bitdefender.com",
|
||||
"type": "Secondary",
|
||||
@ -40,6 +60,16 @@
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "NVD-CWE-noinfo"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "cve-requests@bitdefender.com",
|
||||
"type": "Secondary",
|
||||
@ -51,10 +81,30 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:csa-iot:matter:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "06D3E01D-2B76-4997-93CE-962515E04CEC"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.bitdefender.com/support/security-advisories/session-establishment-lock-up-during-replay-of-case-sigma1-messages/",
|
||||
"source": "cve-requests@bitdefender.com"
|
||||
"source": "cve-requests@bitdefender.com",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
56
CVE-2024/CVE-2024-335xx/CVE-2024-33508.json
Normal file
56
CVE-2024/CVE-2024-335xx/CVE-2024-33508.json
Normal file
@ -0,0 +1,56 @@
|
||||
{
|
||||
"id": "CVE-2024-33508",
|
||||
"sourceIdentifier": "psirt@fortinet.com",
|
||||
"published": "2024-09-10T15:15:16.187",
|
||||
"lastModified": "2024-09-10T15:50:47.237",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "An improper neutralization of special elements used in a command\u00a0('Command Injection') vulnerability [CWE-77] in Fortinet FortiClientEMS 7.2.0 through 7.2.4, 7.0.0 through 7.0.12 may allow an unauthenticated attacker to execute limited and temporary operations on the underlying database via crafted requests."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "psirt@fortinet.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "LOW",
|
||||
"baseScore": 7.3,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 3.4
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "psirt@fortinet.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-77"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://fortiguard.fortinet.com/psirt/FG-IR-24-123",
|
||||
"source": "psirt@fortinet.com"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-34457",
|
||||
"sourceIdentifier": "security@apache.org",
|
||||
"published": "2024-07-22T10:15:03.607",
|
||||
"lastModified": "2024-07-22T14:15:04.883",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2024-09-10T15:09:36.840",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -15,11 +15,44 @@
|
||||
"value": "En versiones anteriores a la 2.1.4, despu\u00e9s de que un usuario normal inicia sesi\u00f3n con \u00e9xito, puede realizar una solicitud manualmente utilizando el token de autorizaci\u00f3n para ver la informaci\u00f3n de flink de todos los usuarios, incluidos runSQL y config. Mitigaci\u00f3n: todos los usuarios deben actualizar a 2.1.4"
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 6.5,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security@apache.org",
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-639"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "security@apache.org",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -28,14 +61,39 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:apache:streampark:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "2.1.4",
|
||||
"matchCriteriaId": "43F40411-3380-4B0F-BA0D-18C85BD8C615"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "http://www.openwall.com/lists/oss-security/2024/07/22/2",
|
||||
"source": "security@apache.org"
|
||||
"source": "security@apache.org",
|
||||
"tags": [
|
||||
"Mailing List"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://lists.apache.org/thread/brlfrmvw9dcv38zoofmhxg7qookmwn7j",
|
||||
"source": "security@apache.org"
|
||||
"source": "security@apache.org",
|
||||
"tags": [
|
||||
"Mailing List",
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-3454",
|
||||
"sourceIdentifier": "cve-requests@bitdefender.com",
|
||||
"published": "2024-07-24T08:15:03.123",
|
||||
"lastModified": "2024-07-24T12:55:13.223",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2024-09-10T15:40:28.457",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -17,6 +17,26 @@
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
|
||||
"attackVector": "ADJACENT_NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 3.5,
|
||||
"baseSeverity": "LOW"
|
||||
},
|
||||
"exploitabilityScore": 2.1,
|
||||
"impactScore": 1.4
|
||||
},
|
||||
{
|
||||
"source": "cve-requests@bitdefender.com",
|
||||
"type": "Secondary",
|
||||
@ -41,8 +61,18 @@
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "cve-requests@bitdefender.com",
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "NVD-CWE-noinfo"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "cve-requests@bitdefender.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -51,10 +81,30 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:csa-iot:matter:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "06D3E01D-2B76-4997-93CE-962515E04CEC"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.bitdefender.com/support/security-advisories/in-fabric-matter-cluster-attribute-disclosure/",
|
||||
"source": "cve-requests@bitdefender.com"
|
||||
"source": "cve-requests@bitdefender.com",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
56
CVE-2024/CVE-2024-352xx/CVE-2024-35282.json
Normal file
56
CVE-2024/CVE-2024-352xx/CVE-2024-35282.json
Normal file
@ -0,0 +1,56 @@
|
||||
{
|
||||
"id": "CVE-2024-35282",
|
||||
"sourceIdentifier": "psirt@fortinet.com",
|
||||
"published": "2024-09-10T15:15:16.397",
|
||||
"lastModified": "2024-09-10T15:50:47.237",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A cleartext storage of sensitive information in memory vulnerability [CWE-316] affecting FortiClient VPN iOS 7.2 all versions, 7.0 all versions, 6.4 all versions, 6.2 all versions, 6.0 all versions may allow an unauthenticated attacker that has physical access to a jailbroken device to obtain cleartext passwords via keychain dump."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "psirt@fortinet.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N",
|
||||
"attackVector": "PHYSICAL",
|
||||
"attackComplexity": "HIGH",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 4.2,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 0.5,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "psirt@fortinet.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-316"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://fortiguard.fortinet.com/psirt/FG-IR-24-139",
|
||||
"source": "psirt@fortinet.com"
|
||||
}
|
||||
]
|
||||
}
|
56
CVE-2024/CVE-2024-365xx/CVE-2024-36511.json
Normal file
56
CVE-2024/CVE-2024-365xx/CVE-2024-36511.json
Normal file
@ -0,0 +1,56 @@
|
||||
{
|
||||
"id": "CVE-2024-36511",
|
||||
"sourceIdentifier": "psirt@fortinet.com",
|
||||
"published": "2024-09-10T15:15:16.610",
|
||||
"lastModified": "2024-09-10T15:50:47.237",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "An improperly implemented security check for standard vulnerability [CWE-358] in FortiADC Web Application Firewall (WAF) 7.4.0 through 7.4.4, 7.2 all versions, 7.1 all versions, 7.0 all versions, 6.2 all versions, 6.1 all versions, 6.0 all versions when cookie security policy is enabled may allow an attacker, under specific conditions, to retrieve the initial encrypted and signed cookie protected by the feature"
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "psirt@fortinet.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "HIGH",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 3.7,
|
||||
"baseSeverity": "LOW"
|
||||
},
|
||||
"exploitabilityScore": 2.2,
|
||||
"impactScore": 1.4
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "psirt@fortinet.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-358"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://fortiguard.fortinet.com/psirt/FG-IR-22-256",
|
||||
"source": "psirt@fortinet.com"
|
||||
}
|
||||
]
|
||||
}
|
33
CVE-2024/CVE-2024-377xx/CVE-2024-37728.json
Normal file
33
CVE-2024/CVE-2024-377xx/CVE-2024-37728.json
Normal file
@ -0,0 +1,33 @@
|
||||
{
|
||||
"id": "CVE-2024-37728",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-09-10T14:15:12.463",
|
||||
"lastModified": "2024-09-10T15:50:57.713",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Arbitrary File Read vulnerability in Xi'an Daxi Information Technology Co., Ltd OfficeWeb365 v.7.18.23.0 and v8.6.1.0 allows a remote attacker to obtain sensitive information via the \"Pic/Indexes\" interface"
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/wy876/POC/blob/main/OfficeWeb365/OfficeWeb365_%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E8%AF%BB%E5%8F%96%E6%BC%8F%E6%B4%9E.md",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/xuetang1125/OfficeWeb365/blob/main/OfficeWeb365_%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E8%AF%BB%E5%8F%96%E6%BC%8F%E6%B4%9E%20.md",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://ti.qianxin.com/vulnerability/notice-list?value=officeweb365",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://www.cnnvd.org.cn/home/warn",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-38503",
|
||||
"sourceIdentifier": "security@apache.org",
|
||||
"published": "2024-07-22T10:15:08.723",
|
||||
"lastModified": "2024-07-22T14:15:05.780",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2024-09-10T15:07:19.587",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -15,11 +15,44 @@
|
||||
"value": " Al editar un usuario, grupo o cualquier objeto en Syncope Console, se podr\u00edan agregar etiquetas HTML a cualquier campo de texto y podr\u00edan dar lugar a posibles exploits. La misma vulnerabilidad se encontr\u00f3 en Syncope Enduser, al editar \u201cPersonal Information\u201d o \u201cUser Requests\u201d. Se recomienda a los usuarios actualizar a la versi\u00f3n 3.0.8, que soluciona este problema."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 5.4,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.3,
|
||||
"impactScore": 2.7
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security@apache.org",
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "security@apache.org",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -28,14 +61,46 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:apache:syncope:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "2.1.0",
|
||||
"versionEndIncluding": "2.1.14",
|
||||
"matchCriteriaId": "D773E581-822F-4431-BEFB-48BE61A743EC"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:apache:syncope:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "3.0.0",
|
||||
"versionEndExcluding": "3.0.8",
|
||||
"matchCriteriaId": "79835E04-29F1-42AD-BCA2-B1452B9FE448"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "http://www.openwall.com/lists/oss-security/2024/07/22/3",
|
||||
"source": "security@apache.org"
|
||||
"source": "security@apache.org",
|
||||
"tags": [
|
||||
"Mailing List"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://syncope.apache.org/security#cve-2024-38503-html-tags-can-be-injected-into-console-or-enduser",
|
||||
"source": "security@apache.org"
|
||||
"source": "security@apache.org",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-40754",
|
||||
"sourceIdentifier": "PSIRT@samsung.com",
|
||||
"published": "2024-09-10T11:15:10.503",
|
||||
"lastModified": "2024-09-10T12:09:50.377",
|
||||
"lastModified": "2024-09-10T14:35:04.833",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -59,6 +59,28 @@
|
||||
"baseSeverity": "MEDIUM"
|
||||
}
|
||||
}
|
||||
],
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-40764",
|
||||
"sourceIdentifier": "PSIRT@sonicwall.com",
|
||||
"published": "2024-07-18T08:15:02.340",
|
||||
"lastModified": "2024-08-01T13:58:00.227",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2024-09-10T14:03:09.167",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -17,6 +17,26 @@
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 7.5,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 3.6
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
@ -41,8 +61,18 @@
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "PSIRT@sonicwall.com",
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-787"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "PSIRT@sonicwall.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -51,10 +81,224 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:sonicwall:sonicos:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "6.5.4.v-21s-rc2457",
|
||||
"matchCriteriaId": "8842B1FC-9CC4-4DB8-8119-B435CD33A5D1"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:sonicwall:nsv10:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "8F5B29EE-9D04-44CC-BB1F-C3C6130D2708"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:sonicwall:nsv100:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "DB6153BB-7B2C-4307-ABE0-0E7E1745DEC7"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:sonicwall:nsv1600:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "93914C8C-69ED-480C-80F2-4334C00788D8"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:sonicwall:nsv200:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "FE26ECE3-9E17-456F-A416-E23A758C9E4C"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:sonicwall:nsv25:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "67EEA85D-8F9E-4E41-B8B3-119738375A84"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:sonicwall:nsv300:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "F0D33997-0D65-464E-8AA5-043499C667D1"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:sonicwall:nsv400:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "D13CD6CF-B048-4214-AAA8-AB58BE6C6C5E"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:sonicwall:nsv50:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "BA838CC7-083A-4BF1-9C95-BED6F5A2992C"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:sonicwall:nsv800:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "D0171D69-14A6-4AB0-8377-C233F5E192D8"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:sonicwall:sonicos:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "7.0.1-5161",
|
||||
"matchCriteriaId": "BE881F9C-CE9E-4D1B-92BA-D28B2B16178A"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:sonicwall:sonicos:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "7.1.1-7040",
|
||||
"versionEndExcluding": "7.1.1-7058",
|
||||
"matchCriteriaId": "797C9FA3-70EF-492A-ACA3-CE21422D5AAA"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:sonicwall:nsa_2700:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "8D8B0C7A-FD65-47CA-A625-150A90EFA7A1"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:sonicwall:nsa_3700:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "A69E000B-5806-46FD-A233-4E2CC9DD38D2"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:sonicwall:nsa_4700:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "8DF4A322-7CC7-4AB9-B10E-FFF34DF2182D"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:sonicwall:nsa_5700:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "4C15FED5-C48C-47CF-9645-0563D77883C1"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:sonicwall:nsa_6700:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "A884B1BB-F201-4C77-9F6E-B8A884DCD4C2"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:sonicwall:nssp_10700:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "7C3BA5A3-1160-4793-A8D6-40B9D264BCC4"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:sonicwall:nssp_11700:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "6739DEA3-06FF-4FEB-9931-0DB27F63B70E"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:sonicwall:nssp_13700:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "0250EDF9-0AEF-4711-8EF6-D447CF48BCAF"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:sonicwall:nssp_15700:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "7D6CF3CF-256C-4C04-8BDF-B16398CD0459"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:sonicwall:nsv_270:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "F2ABC8D8-2943-4073-9568-E87961A18998"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:sonicwall:nsv_470:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "9F57D527-AA3F-45E9-9BCE-6F76691066B5"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:sonicwall:nsv_870:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "F5ECCCF0-A5D8-42A8-8EC1-D12B49B1124A"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:sonicwall:tz270:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "70340DD4-687B-402C-85AF-C2B80D0F1600"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:sonicwall:tz270w:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "52847BA2-470B-4078-A79B-52095DB9214B"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:sonicwall:tz370:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "9853AE3A-B0EA-4249-AA7D-1F2051C9BF91"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:sonicwall:tz370w:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "4DBDD10C-F89D-4051-BC70-67B41167FF9B"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:sonicwall:tz470:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "6C23940E-2F9D-447B-A740-42035ED5D400"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:sonicwall:tz470w:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "90C790AD-C40E-4527-8F83-D278282A9600"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:sonicwall:tz570:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "C7DF76E0-8E3D-4E0D-A3BB-F5AE05A4C7C9"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:sonicwall:tz570p:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "352DFCF9-E333-41C0-8033-91265768FD8E"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:sonicwall:tz570w:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "4C882C38-9DA5-4C03-BB23-AB2B448E3307"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:sonicwall:tz670:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "AEEA6065-48D3-4EC7-BD94-CBAE3D1010FF"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2024-0012",
|
||||
"source": "PSIRT@sonicwall.com"
|
||||
"source": "PSIRT@sonicwall.com",
|
||||
"tags": [
|
||||
"Mitigation",
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-41107",
|
||||
"sourceIdentifier": "security@apache.org",
|
||||
"published": "2024-07-19T11:15:03.323",
|
||||
"lastModified": "2024-08-01T13:58:18.103",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2024-09-10T14:30:55.217",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -17,6 +17,26 @@
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "HIGH",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 8.1,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.2,
|
||||
"impactScore": 5.9
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
@ -51,30 +71,78 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:apache:cloudstack:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "4.5.0",
|
||||
"versionEndExcluding": "4.18.2.2",
|
||||
"matchCriteriaId": "36C67E7A-D4BB-4387-B6E3-BBD3664BAC4F"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:apache:cloudstack:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "4.19.0.0",
|
||||
"versionEndExcluding": "4.19.1.0",
|
||||
"matchCriteriaId": "3754C895-06B3-4750-B59E-AB9902E0BD73"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "http://www.openwall.com/lists/oss-security/2024/07/19/1",
|
||||
"source": "security@apache.org"
|
||||
"source": "security@apache.org",
|
||||
"tags": [
|
||||
"Mailing List",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://www.openwall.com/lists/oss-security/2024/07/19/2",
|
||||
"source": "security@apache.org"
|
||||
"source": "security@apache.org",
|
||||
"tags": [
|
||||
"Mailing List",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://cloudstack.apache.org/blog/security-release-advisory-cve-2024-41107",
|
||||
"source": "security@apache.org"
|
||||
"source": "security@apache.org",
|
||||
"tags": [
|
||||
"Mitigation",
|
||||
"Vendor Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/apache/cloudstack/issues/4519",
|
||||
"source": "security@apache.org"
|
||||
"source": "security@apache.org",
|
||||
"tags": [
|
||||
"Issue Tracking"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://lists.apache.org/thread/5q06g8zvmhcw6w3tjr6r5prqdw6zckg3",
|
||||
"source": "security@apache.org"
|
||||
"source": "security@apache.org",
|
||||
"tags": [
|
||||
"Mailing List",
|
||||
"Vendor Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://www.shapeblue.com/shapeblue-security-advisory-apache-cloudstack-cve-2024-41107",
|
||||
"source": "security@apache.org"
|
||||
"source": "security@apache.org",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
56
CVE-2024/CVE-2024-424xx/CVE-2024-42423.json
Normal file
56
CVE-2024/CVE-2024-424xx/CVE-2024-42423.json
Normal file
@ -0,0 +1,56 @@
|
||||
{
|
||||
"id": "CVE-2024-42423",
|
||||
"sourceIdentifier": "security_alert@emc.com",
|
||||
"published": "2024-09-10T15:15:17.013",
|
||||
"lastModified": "2024-09-10T15:50:47.237",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Citrix Workspace App version 23.9.0.24.4 on Dell ThinOS 2311 contains an Incorrect Authorization vulnerability when Citrix CEB is enabled for WebLogin. A local unauthenticated user with low privileges may potentially exploit this vulnerability to bypass existing controls and perform unauthorized actions leading to information disclosure and tampering."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security_alert@emc.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:N",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 6.1,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 4.2
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security_alert@emc.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-863"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.dell.com/support/kbdoc/en-us/000225289/dsa-2024-229-security-update-for-dell-thinos-vulnerabilities",
|
||||
"source": "security_alert@emc.com"
|
||||
}
|
||||
]
|
||||
}
|
60
CVE-2024/CVE-2024-437xx/CVE-2024-43796.json
Normal file
60
CVE-2024/CVE-2024-437xx/CVE-2024-43796.json
Normal file
@ -0,0 +1,60 @@
|
||||
{
|
||||
"id": "CVE-2024-43796",
|
||||
"sourceIdentifier": "security-advisories@github.com",
|
||||
"published": "2024-09-10T15:15:17.510",
|
||||
"lastModified": "2024-09-10T15:50:47.237",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Express.js minimalist web framework for node. In express < 4.20.0, passing untrusted user input - even after sanitizing it - to response.redirect() may execute untrusted code. This issue is patched in express 4.20.0."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "HIGH",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "LOW",
|
||||
"baseScore": 5.0,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 1.6,
|
||||
"impactScore": 3.4
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/expressjs/express/commit/54271f69b511fea198471e6ff3400ab805d6b553",
|
||||
"source": "security-advisories@github.com"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/expressjs/express/security/advisories/GHSA-qw6h-vgh9-j6wx",
|
||||
"source": "security-advisories@github.com"
|
||||
}
|
||||
]
|
||||
}
|
60
CVE-2024/CVE-2024-437xx/CVE-2024-43799.json
Normal file
60
CVE-2024/CVE-2024-437xx/CVE-2024-43799.json
Normal file
@ -0,0 +1,60 @@
|
||||
{
|
||||
"id": "CVE-2024-43799",
|
||||
"sourceIdentifier": "security-advisories@github.com",
|
||||
"published": "2024-09-10T15:15:17.727",
|
||||
"lastModified": "2024-09-10T15:50:47.237",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Send is a library for streaming files from the file system as a http response. Send passes untrusted user input to SendStream.redirect() which executes untrusted code. This issue is patched in send 0.19.0."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "HIGH",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "LOW",
|
||||
"baseScore": 5.0,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 1.6,
|
||||
"impactScore": 3.4
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/pillarjs/send/commit/ae4f2989491b392ae2ef3b0015a019770ae65d35",
|
||||
"source": "security-advisories@github.com"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/pillarjs/send/security/advisories/GHSA-m6fv-jmcg-4jfg",
|
||||
"source": "security-advisories@github.com"
|
||||
}
|
||||
]
|
||||
}
|
64
CVE-2024/CVE-2024-438xx/CVE-2024-43800.json
Normal file
64
CVE-2024/CVE-2024-438xx/CVE-2024-43800.json
Normal file
@ -0,0 +1,64 @@
|
||||
{
|
||||
"id": "CVE-2024-43800",
|
||||
"sourceIdentifier": "security-advisories@github.com",
|
||||
"published": "2024-09-10T15:15:17.937",
|
||||
"lastModified": "2024-09-10T15:50:47.237",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "serve-static serves static files. serve-static passes untrusted user input - even after sanitizing it - to redirect() may execute untrusted code. This issue is patched in serve-static 1.16.0."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "HIGH",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "LOW",
|
||||
"baseScore": 5.0,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 1.6,
|
||||
"impactScore": 3.4
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/expressjs/serve-static/commit/0c11fad159898cdc69fd9ab63269b72468ecaf6b",
|
||||
"source": "security-advisories@github.com"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/expressjs/serve-static/commit/ce730896fddce1588111d9ef6fdf20896de5c6fa",
|
||||
"source": "security-advisories@github.com"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/expressjs/serve-static/security/advisories/GHSA-cm22-4g7w-348p",
|
||||
"source": "security-advisories@github.com"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-44085",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-09-09T20:15:04.980",
|
||||
"lastModified": "2024-09-10T12:09:50.377",
|
||||
"lastModified": "2024-09-10T15:35:08.883",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -15,7 +15,42 @@
|
||||
"value": "Los documentos de ONLYOFFICE anteriores a la versi\u00f3n 8.1.0 permiten ataques XSS a trav\u00e9s de un objeto GeneratorFunction contra una macro. Esto est\u00e1 relacionado con el uso de una expresi\u00f3n de funci\u00f3n invocada inmediatamente (IIFE) para una macro. NOTA: este problema existe debido a una correcci\u00f3n incorrecta de CVE-2021-43446 y CVE-2023-50883."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 6.1,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 2.7
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.onlyoffice.com/",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-44410",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-09-09T21:15:11.503",
|
||||
"lastModified": "2024-09-10T12:09:50.377",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-09-10T15:35:10.157",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -15,7 +15,42 @@
|
||||
"value": "D-Link DI-8300 v16.07.26A1 es vulnerable a la inyecci\u00f3n de comandos a trav\u00e9s de la funci\u00f3n upgrade_filter_asp."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-94"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/LYaoBoL/IOTsec/blob/main/D-Link/DI-8300A1/CVE-2024-44410",
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-44411",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-09-09T21:15:11.567",
|
||||
"lastModified": "2024-09-10T12:09:50.377",
|
||||
"lastModified": "2024-09-10T14:35:06.690",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -15,7 +15,42 @@
|
||||
"value": "D-Link DI-8300 v16.07.26A1 es vulnerable a la inyecci\u00f3n de comandos a trav\u00e9s de la funci\u00f3n msp_info_htm."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-94"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/LYaoBoL/IOTsec/blob/main/D-Link/DI-8300A1/CVE-2024-44411",
|
||||
|
60
CVE-2024/CVE-2024-448xx/CVE-2024-44867.json
Normal file
60
CVE-2024/CVE-2024-448xx/CVE-2024-44867.json
Normal file
@ -0,0 +1,60 @@
|
||||
{
|
||||
"id": "CVE-2024-44867",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-09-10T14:15:13.103",
|
||||
"lastModified": "2024-09-10T15:50:57.713",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "phpok v3.0 was discovered to contain an arbitrary file read vulnerability via the component /autoload/file.php."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 7.5,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-22"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/ChengZyin/CVE-2024-44867/blob/main/CVE-2024-44867.md",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/ChengZyin/Exploit/blob/ChengZyin-patch-1/README.md",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
64
CVE-2024/CVE-2024-450xx/CVE-2024-45044.json
Normal file
64
CVE-2024/CVE-2024-450xx/CVE-2024-45044.json
Normal file
@ -0,0 +1,64 @@
|
||||
{
|
||||
"id": "CVE-2024-45044",
|
||||
"sourceIdentifier": "security-advisories@github.com",
|
||||
"published": "2024-09-10T15:15:18.217",
|
||||
"lastModified": "2024-09-10T15:50:47.237",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Bareos is open source software for backup, archiving, and recovery of data for operating systems. When a command ACL is in place and a user executes a command in bconsole using an abbreviation (i.e. \"w\" for \"whoami\") the ACL check did not apply to the full form (i.e. \"whoami\") but to the abbreviated form (i.e. \"w\"). If the command ACL is configured with negative ACL that should forbid using the \"whoami\" command, you could still use \"w\" or \"who\" as a command successfully. Fixes for the problem are shipped in Bareos versions 23.0.4, 22.1.6 and 21.1.11. If only positive command ACLs are used without any negation, the problem does not occur."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 8.8,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-285"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/bareos/bareos/commit/2a026698b87d13bd1c6275726b5e826702f81dd5",
|
||||
"source": "security-advisories@github.com"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/bareos/bareos/pull/1875",
|
||||
"source": "security-advisories@github.com"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/bareos/bareos/security/advisories/GHSA-jfww-q346-r2r8",
|
||||
"source": "security-advisories@github.com"
|
||||
}
|
||||
]
|
||||
}
|
56
CVE-2024/CVE-2024-453xx/CVE-2024-45323.json
Normal file
56
CVE-2024/CVE-2024-453xx/CVE-2024-45323.json
Normal file
@ -0,0 +1,56 @@
|
||||
{
|
||||
"id": "CVE-2024-45323",
|
||||
"sourceIdentifier": "psirt@fortinet.com",
|
||||
"published": "2024-09-10T15:15:18.420",
|
||||
"lastModified": "2024-09-10T15:50:47.237",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "An improper access control vulnerability\u00a0[CWE-284] in FortiEDR Manager API 6.2.0 through 6.2.2, 6.0 all versions may allow in a shared environment context an authenticated admin with REST API permissions in his profile and restricted to a specific organization to access backend logs that include information related to other organizations."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "psirt@fortinet.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 4.3,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 1.4
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "psirt@fortinet.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-284"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://fortiguard.fortinet.com/psirt/FG-IR-24-371",
|
||||
"source": "psirt@fortinet.com"
|
||||
}
|
||||
]
|
||||
}
|
60
CVE-2024/CVE-2024-453xx/CVE-2024-45393.json
Normal file
60
CVE-2024/CVE-2024-453xx/CVE-2024-45393.json
Normal file
@ -0,0 +1,60 @@
|
||||
{
|
||||
"id": "CVE-2024-45393",
|
||||
"sourceIdentifier": "security-advisories@github.com",
|
||||
"published": "2024-09-10T15:15:18.657",
|
||||
"lastModified": "2024-09-10T15:50:47.237",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Computer Vision Annotation Tool (CVAT) is an interactive video and image annotation tool for computer vision. An attacker with a CVAT account can access webhook delivery information for any webhook registered on the CVAT instance, including that of other users. For each delivery, this contains information about the event that caused the delivery, typically including full details about the object on which an action was performed (such as the task for an \"update:task\" event), and the user who performed the action. In addition, the attacker can redeliver any past delivery of any webhook, and trigger a ping event for any webhook. Upgrade to CVAT 2.18.0 or any later version."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 6.4,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 3.1,
|
||||
"impactScore": 2.7
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-862"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/cvat-ai/cvat/commit/0fafb797fdf022fb83ce81c6405ba19b583a236f",
|
||||
"source": "security-advisories@github.com"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/cvat-ai/cvat/security/advisories/GHSA-p3c9-m7jr-jxxj",
|
||||
"source": "security-advisories@github.com"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-45845",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-09-10T11:15:10.660",
|
||||
"lastModified": "2024-09-10T12:09:50.377",
|
||||
"lastModified": "2024-09-10T14:35:08.550",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -15,7 +15,42 @@
|
||||
"value": "nix 2.24 a 2.24.5 permite el directory traversal a trav\u00e9s de un enlace simb\u00f3lico en un archivo nar, debido al manejo incorrecto de un directorio que contiene un enlace simb\u00f3lico y un directorio con el mismo nombre, tambi\u00e9n conocido como GHSA-h4vv-h3jq-v493."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 7.5,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-22"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/NixOS/nix/tags",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-4607",
|
||||
"sourceIdentifier": "arm-security@arm.com",
|
||||
"published": "2024-08-05T12:15:34.707",
|
||||
"lastModified": "2024-08-05T16:35:14.117",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2024-09-10T15:03:24.710",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -17,6 +17,26 @@
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 7.8,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 5.9
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
@ -40,6 +60,16 @@
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-416"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "arm-security@arm.com",
|
||||
"type": "Secondary",
|
||||
@ -51,10 +81,46 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:arm:5th_gen_gpu_architecture_kernel_driver:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "r41p0",
|
||||
"versionEndExcluding": "r50p0",
|
||||
"matchCriteriaId": "98F67DF9-8978-475C-99AF-A09BB9B66012"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:arm:bifrost_gpu_kernel_driver:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "r41p0",
|
||||
"versionEndExcluding": "r50p0",
|
||||
"matchCriteriaId": "052571C0-5278-44DC-B84D-A461A76A0FD3"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:arm:valhall_gpu_kernel_driver:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "r41p0",
|
||||
"versionEndExcluding": "r50p0",
|
||||
"matchCriteriaId": "A40D4A14-E504-4E8A-8431-8677CA91B30A"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://developer.arm.com/Arm%20Security%20Center/Mali%20GPU%20Driver%20Vulnerabilities",
|
||||
"source": "arm-security@arm.com"
|
||||
"source": "arm-security@arm.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-5561",
|
||||
"sourceIdentifier": "contact@wpscan.com",
|
||||
"published": "2024-09-09T06:15:01.850",
|
||||
"lastModified": "2024-09-09T13:03:38.303",
|
||||
"lastModified": "2024-09-10T15:35:12.400",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -15,7 +15,30 @@
|
||||
"value": "El complemento Popup Maker WordPress anterior a la versi\u00f3n 1.19.1 no desinfecta ni escapa a algunas de sus configuraciones, lo que podr\u00eda permitir que usuarios con privilegios elevados, como el administrador, realicen ataques de Cross-Site Scripting Almacenado incluso cuando la capacidad unfiltered_html no est\u00e1 permitida (por ejemplo, en una configuraci\u00f3n multisitio)."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "HIGH",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 4.8,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 1.7,
|
||||
"impactScore": 2.7
|
||||
}
|
||||
]
|
||||
},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://wpscan.com/vulnerability/6a87cc25-bd7d-40e3-96f9-26646cd6f736/",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-6089",
|
||||
"sourceIdentifier": "PSIRT@rockwellautomation.com",
|
||||
"published": "2024-07-16T17:15:11.817",
|
||||
"lastModified": "2024-07-16T18:00:02.110",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2024-09-10T14:05:16.183",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -59,9 +59,41 @@
|
||||
"baseSeverity": "HIGH"
|
||||
}
|
||||
}
|
||||
],
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 7.5,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "NVD-CWE-noinfo"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "PSIRT@rockwellautomation.com",
|
||||
"type": "Secondary",
|
||||
@ -73,10 +105,42 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:rockwellautomation:5015-aenftxt_firmware:2.011:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "436F7BB7-A8CA-4E00-9F42-6DDB0D995E09"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:rockwellautomation:5015-aenftxt:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "C699B471-D2E4-4B2F-B0A4-6045B8170354"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.rockwellautomation.com/en-us/trust-center/security-advisories/advisory.SD1680.html",
|
||||
"source": "PSIRT@rockwellautomation.com"
|
||||
"source": "PSIRT@rockwellautomation.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-6282",
|
||||
"sourceIdentifier": "security@wordfence.com",
|
||||
"published": "2024-09-10T12:15:02.137",
|
||||
"lastModified": "2024-09-10T12:15:02.137",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-09-10T15:50:57.713",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-6799",
|
||||
"sourceIdentifier": "security@wordfence.com",
|
||||
"published": "2024-07-19T08:15:03.153",
|
||||
"lastModified": "2024-07-19T13:01:44.567",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2024-09-10T15:05:48.583",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -40,6 +40,16 @@
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-862"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "security@wordfence.com",
|
||||
"type": "Secondary",
|
||||
@ -51,26 +61,59 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:yithemes:yith_essential_kit_for_woocommerce:*:*:*:*:*:wordpress:*:*",
|
||||
"versionEndExcluding": "2.35.0",
|
||||
"matchCriteriaId": "0476FA4B-EDBE-419C-BD13-A28A8423B795"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/browser/yith-essential-kit-for-woocommerce-1/trunk/class-yith-jetpack.php#L425",
|
||||
"source": "security@wordfence.com"
|
||||
"source": "security@wordfence.com",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/browser/yith-essential-kit-for-woocommerce-1/trunk/class-yith-jetpack.php#L457",
|
||||
"source": "security@wordfence.com"
|
||||
"source": "security@wordfence.com",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/browser/yith-essential-kit-for-woocommerce-1/trunk/class-yith-jetpack.php#L487",
|
||||
"source": "security@wordfence.com"
|
||||
"source": "security@wordfence.com",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/changeset/3120283/",
|
||||
"source": "security@wordfence.com"
|
||||
"source": "security@wordfence.com",
|
||||
"tags": [
|
||||
"Product"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/ca497ffa-6306-46dc-895f-94f1d5236e28?source=cve",
|
||||
"source": "security@wordfence.com"
|
||||
"source": "security@wordfence.com",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-6874",
|
||||
"sourceIdentifier": "2499f714-1537-4658-8207-48ae4bb9eae9",
|
||||
"published": "2024-07-24T08:15:03.413",
|
||||
"lastModified": "2024-08-01T14:00:45.683",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2024-09-10T15:27:04.190",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -17,6 +17,26 @@
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 4.3,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 1.4
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
@ -39,22 +59,66 @@
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-125"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:haxx:libcurl:8.8.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "759E33B7-1F1E-4050-A400-A2176BF35469"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "http://www.openwall.com/lists/oss-security/2024/07/24/2",
|
||||
"source": "2499f714-1537-4658-8207-48ae4bb9eae9"
|
||||
"source": "2499f714-1537-4658-8207-48ae4bb9eae9",
|
||||
"tags": [
|
||||
"Mailing List",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://curl.se/docs/CVE-2024-6874.html",
|
||||
"source": "2499f714-1537-4658-8207-48ae4bb9eae9"
|
||||
"source": "2499f714-1537-4658-8207-48ae4bb9eae9",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://curl.se/docs/CVE-2024-6874.json",
|
||||
"source": "2499f714-1537-4658-8207-48ae4bb9eae9"
|
||||
"source": "2499f714-1537-4658-8207-48ae4bb9eae9",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://hackerone.com/reports/2604391",
|
||||
"source": "2499f714-1537-4658-8207-48ae4bb9eae9"
|
||||
"source": "2499f714-1537-4658-8207-48ae4bb9eae9",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Issue Tracking",
|
||||
"Technical Description"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-6928",
|
||||
"sourceIdentifier": "contact@wpscan.com",
|
||||
"published": "2024-09-08T06:15:02.747",
|
||||
"lastModified": "2024-09-09T13:03:38.303",
|
||||
"lastModified": "2024-09-10T14:35:09.507",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -15,7 +15,30 @@
|
||||
"value": "El complemento Opti Marketing para WordPress hasta la versi\u00f3n 2.0.9 no desinfecta ni escapa adecuadamente un par\u00e1metro antes de usarlo en una declaraci\u00f3n SQL a trav\u00e9s de una acci\u00f3n AJAX disponible para usuarios no autenticados, lo que genera una inyecci\u00f3n SQL."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://wpscan.com/vulnerability/7bb9474f-2b9d-4856-b36d-a43da3db0245/",
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-7955",
|
||||
"sourceIdentifier": "contact@wpscan.com",
|
||||
"published": "2024-09-10T06:15:02.730",
|
||||
"lastModified": "2024-09-10T12:09:50.377",
|
||||
"lastModified": "2024-09-10T15:35:13.013",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -15,7 +15,30 @@
|
||||
"value": "El complemento Starbox para WordPress anterior a la versi\u00f3n 3.5.2 no desinfecta ni escapa de algunas de sus configuraciones, lo que podr\u00eda permitir que usuarios con privilegios elevados, como el administrador, realicen ataques de cross site scripting almacenado incluso cuando la capacidad unfiltered_html no est\u00e1 permitida (por ejemplo, en una configuraci\u00f3n multisitio)."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "HIGH",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 4.8,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 1.7,
|
||||
"impactScore": 2.7
|
||||
}
|
||||
]
|
||||
},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://wpscan.com/vulnerability/cbfcbe57-553d-490a-b7f3-48aa0022f63d/",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-8369",
|
||||
"sourceIdentifier": "security@wordfence.com",
|
||||
"published": "2024-09-10T12:15:02.463",
|
||||
"lastModified": "2024-09-10T12:15:02.463",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-09-10T15:50:57.713",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
|
60
CVE-2024/CVE-2024-84xx/CVE-2024-8443.json
Normal file
60
CVE-2024/CVE-2024-84xx/CVE-2024-8443.json
Normal file
@ -0,0 +1,60 @@
|
||||
{
|
||||
"id": "CVE-2024-8443",
|
||||
"sourceIdentifier": "secalert@redhat.com",
|
||||
"published": "2024-09-10T14:15:13.440",
|
||||
"lastModified": "2024-09-10T15:50:57.713",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A heap-based buffer overflow vulnerability was found in the libopensc OpenPGP driver. A crafted USB device or smart card with malicious responses to the APDUs during the card enrollment process using the `pkcs15-init` tool may lead to out-of-bound rights, possibly resulting in arbitrary code execution."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "secalert@redhat.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:P/AC:H/PR:N/UI:R/S:C/C:L/I:L/A:N",
|
||||
"attackVector": "PHYSICAL",
|
||||
"attackComplexity": "HIGH",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 3.4,
|
||||
"baseSeverity": "LOW"
|
||||
},
|
||||
"exploitabilityScore": 0.4,
|
||||
"impactScore": 2.7
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "secalert@redhat.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-122"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://access.redhat.com/security/cve/CVE-2024-8443",
|
||||
"source": "secalert@redhat.com"
|
||||
},
|
||||
{
|
||||
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2310494",
|
||||
"source": "secalert@redhat.com"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-8557",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2024-09-07T15:15:10.670",
|
||||
"lastModified": "2024-09-09T13:03:38.303",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-09-10T14:19:36.280",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -61,6 +61,26 @@
|
||||
}
|
||||
],
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 7.5,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 3.6
|
||||
},
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
@ -120,26 +140,63 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:oretnom23:food_ordering_management_system:1.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "0C23C3FE-AF1E-4806-8E1D-010C47C3F72C"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/tldjgggg/cve/blob/main/sql2.md",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.276777",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Permissions Required",
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.276777",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?submit.403082",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://www.sourcecodester.com/",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Product"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-8558",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2024-09-07T16:15:02.780",
|
||||
"lastModified": "2024-09-09T13:03:38.303",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-09-10T15:50:24.143",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -61,6 +61,26 @@
|
||||
}
|
||||
],
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 4.3,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 1.4
|
||||
},
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
@ -120,26 +140,64 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:oretnom23:food_ordering_management_system:1.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "0C23C3FE-AF1E-4806-8E1D-010C47C3F72C"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/Niu-zida/cve/blob/main/Payment%20loopholes.md",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.276778",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Permissions Required",
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.276778",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Permissions Required",
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?submit.403345",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://www.sourcecodester.com/",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Product"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-8559",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2024-09-07T18:15:02.000",
|
||||
"lastModified": "2024-09-09T13:03:38.303",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-09-10T15:31:32.443",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -61,6 +61,26 @@
|
||||
}
|
||||
],
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "HIGH",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 7.2,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 1.2,
|
||||
"impactScore": 5.9
|
||||
},
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
@ -120,22 +140,53 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:remyandrade:online_food_menu:1.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "64211CD5-1C6A-4F07-86E3-8C9DE949BB47"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.276779",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Permissions Required"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.276779",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?submit.403497",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://www.sourcecodester.com/",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Product"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-8560",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2024-09-07T18:15:02.263",
|
||||
"lastModified": "2024-09-09T13:03:38.303",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-09-10T15:32:39.927",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -61,6 +61,26 @@
|
||||
}
|
||||
],
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 8.8,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 5.9
|
||||
},
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
@ -120,22 +140,53 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:oretnom23:simple_invoice_generator_system:1.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "25AA5E92-7F05-45F7-8DA4-93B25AE54C33"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.276780",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Permissions Required"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.276780",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Permissions Required",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?submit.403629",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://www.sourcecodester.com/",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Product"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-8561",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2024-09-07T19:15:11.627",
|
||||
"lastModified": "2024-09-09T13:03:38.303",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-09-10T15:35:01.837",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -61,6 +61,26 @@
|
||||
}
|
||||
],
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
},
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
@ -120,22 +140,53 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:rems:php_crud:1.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "2A932782-C497-4B69-8D58-D58A11495C49"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.276781",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Permissions Required"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.276781",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Permissions Required",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?submit.403651",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://www.sourcecodester.com/",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Product"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-8562",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2024-09-07T19:15:11.890",
|
||||
"lastModified": "2024-09-09T13:03:38.303",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-09-10T15:36:34.703",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -61,6 +61,26 @@
|
||||
}
|
||||
],
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 6.1,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 2.7
|
||||
},
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
@ -120,18 +140,45 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:rems:php_crud:1.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "2A932782-C497-4B69-8D58-D58A11495C49"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.276782",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Permissions Required"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.276782",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Permissions Required",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://www.sourcecodester.com/",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Product"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-8563",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2024-09-07T20:15:01.977",
|
||||
"lastModified": "2024-09-09T13:03:38.303",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-09-10T15:37:48.183",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -61,6 +61,26 @@
|
||||
}
|
||||
],
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 6.1,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 2.7
|
||||
},
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
@ -120,22 +140,55 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:rems:php_crud:1.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "2A932782-C497-4B69-8D58-D58A11495C49"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.276783",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Permissions Required"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.276783",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Patch",
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?submit.403661",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://www.sourcecodester.com/",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Product"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-8564",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2024-09-07T21:15:10.160",
|
||||
"lastModified": "2024-09-09T13:03:38.303",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-09-10T15:38:42.570",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -61,6 +61,26 @@
|
||||
}
|
||||
],
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 8.8,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 5.9
|
||||
},
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
@ -120,22 +140,53 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:rems:php_crud:1.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "2A932782-C497-4B69-8D58-D58A11495C49"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.276784",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Permissions Required"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.276784",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?submit.403662",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://www.sourcecodester.com/",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Product"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-8565",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2024-09-07T23:15:10.233",
|
||||
"lastModified": "2024-09-09T13:03:38.303",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-09-10T15:40:31.103",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -61,6 +61,26 @@
|
||||
}
|
||||
],
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
},
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
@ -109,6 +129,16 @@
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-89"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
@ -120,22 +150,54 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:oretnom23:clinic\\'s_patient_management_system:2.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "7C42E685-5417-462F-8547-C6D1E64BFE26"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/gurudattch/CVEs/blob/main/Sourcecodester-Clinic's-Patient-Management-System-SQLi.md",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.276785",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Permissions Required"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.276785",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Permissions Required"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?submit.402425",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-8566",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2024-09-08T00:15:02.037",
|
||||
"lastModified": "2024-09-09T13:03:38.303",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-09-10T15:42:03.630",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -61,6 +61,26 @@
|
||||
}
|
||||
],
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 6.1,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 2.7
|
||||
},
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
@ -120,26 +140,60 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:online_shop_store_project:online_shop_store:1.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "FFCBDB09-5BC6-4FCE-9A20-064B722595AD"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://code-projects.org/",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Product"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://drive.google.com/file/d/1MmShihcKuzB9Sw54asriKkRKvdUD8-Ag/view?usp=sharing",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Permissions Required"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.276796",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Permissions Required"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.276796",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?submit.403671",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-8567",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2024-09-08T02:15:10.643",
|
||||
"lastModified": "2024-09-09T13:03:38.303",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-09-10T15:44:31.283",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -61,6 +61,26 @@
|
||||
}
|
||||
],
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
},
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
@ -120,26 +140,62 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:payroll_management_system_project:payroll_management_system:1.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "BFB980ED-C02B-49D9-845F-8953C6709DB1"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/ppp-src/ha/issues/8",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Issue Tracking",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://itsourcecode.com/",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Product"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.276797",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Permissions Required"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.276797",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?submit.403998",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-8569",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2024-09-08T05:15:10.763",
|
||||
"lastModified": "2024-09-09T13:03:38.303",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-09-10T15:45:24.237",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -61,6 +61,26 @@
|
||||
}
|
||||
],
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
},
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
@ -120,26 +140,62 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:fabianros:hospital_management_system:1.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "7FD44159-7FA3-4BA5-AD83-C1D439EEF374"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://code-projects.org/",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Product"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/teachersongsec/cve/issues/1",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Issue Tracking",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.276799",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Permissions Required"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.276799",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?submit.403125",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-8579",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2024-09-08T20:15:01.757",
|
||||
"lastModified": "2024-09-09T13:03:38.303",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-09-10T15:47:10.393",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -61,6 +61,26 @@
|
||||
}
|
||||
],
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
},
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
@ -120,26 +140,73 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:totolink:t8_firmware:4.1.5cu.861_b20230220:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "E235EB56-5A37-485F-8C11-A05FC19E595F"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:totolink:t8:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "16621725-1296-4792-BDF4-43E0ABF3B744"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/abcdefg-png/IoT-vulnerable/blob/main/TOTOLINK/AC1200T8/setWiFiRepeaterCfg.md",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.276813",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Permissions Required"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.276813",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Permissions Required",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?submit.401292",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://www.totolink.net/",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Product"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-8580",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2024-09-08T21:15:11.107",
|
||||
"lastModified": "2024-09-09T13:03:38.303",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-09-10T15:47:47.397",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -61,6 +61,26 @@
|
||||
}
|
||||
],
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "HIGH",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 8.1,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.2,
|
||||
"impactScore": 5.9
|
||||
},
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
@ -120,26 +140,73 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:totolink:t8_firmware:4.1.5cu.861_b20230220:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "E235EB56-5A37-485F-8C11-A05FC19E595F"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:totolink:t8:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "16621725-1296-4792-BDF4-43E0ABF3B744"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/abcdefg-png/IoT-vulnerable/blob/main/TOTOLINK/AC1200T8/shadow.md",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.276814",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Permissions Required"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.276814",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Permissions Required",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?submit.401293",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://www.totolink.net/",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Product"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-8582",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2024-09-08T22:15:01.880",
|
||||
"lastModified": "2024-09-09T13:03:38.303",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-09-10T15:48:30.537",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -61,6 +61,26 @@
|
||||
}
|
||||
],
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 6.1,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 2.7
|
||||
},
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
@ -120,26 +140,61 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:oretnom23:food_ordering_management_system:1.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "0C23C3FE-AF1E-4806-8E1D-010C47C3F72C"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/Niu-zida/cve/blob/main/Cross-Site%20Scripting.md",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.276818",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Permissions Required"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.276818",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Permissions Required",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?submit.404604",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://www.sourcecodester.com/",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Product"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-8583",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2024-09-08T22:15:02.170",
|
||||
"lastModified": "2024-09-09T13:03:38.303",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-09-10T15:49:29.103",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -61,6 +61,26 @@
|
||||
}
|
||||
],
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 5.4,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.3,
|
||||
"impactScore": 2.7
|
||||
},
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
@ -120,26 +140,61 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:oretnom23:online_bank_management_system:1.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "ABBA1FA6-5C99-4BE2-B748-53ED203CD5DD"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/Niu-zida/cve/blob/main/Storage-optimized%20Cross-site%20scripting%20vulnerability.md",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.276819",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Permissions Required"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.276819",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Permissions Required",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?submit.404611",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://www.sourcecodester.com/",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Product"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
56
CVE-2024/CVE-2024-86xx/CVE-2024-8654.json
Normal file
56
CVE-2024/CVE-2024-86xx/CVE-2024-8654.json
Normal file
@ -0,0 +1,56 @@
|
||||
{
|
||||
"id": "CVE-2024-8654",
|
||||
"sourceIdentifier": "cna@mongodb.com",
|
||||
"published": "2024-09-10T14:15:13.710",
|
||||
"lastModified": "2024-09-10T15:50:57.713",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "MongoDB Server may access non-initialized region of memory leading to unexpected behaviour when zero arguments are called in internal aggregation stage. This issue affected MongoDB Server v6.0 version 6.0.3."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "cna@mongodb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "HIGH",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "LOW",
|
||||
"baseScore": 5.0,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 1.6,
|
||||
"impactScore": 3.4
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "cna@mongodb.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-908"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://jira.mongodb.org/browse/SERVER-71477",
|
||||
"source": "cna@mongodb.com"
|
||||
}
|
||||
]
|
||||
}
|
87
README.md
87
README.md
@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours.
|
||||
### Last Repository Update
|
||||
|
||||
```plain
|
||||
2024-09-10T14:00:33.301427+00:00
|
||||
2024-09-10T16:00:22.052198+00:00
|
||||
```
|
||||
|
||||
### Most recent CVE Modification Timestamp synchronized with NVD
|
||||
|
||||
```plain
|
||||
2024-09-10T13:59:42.720000+00:00
|
||||
2024-09-10T15:50:57.713000+00:00
|
||||
```
|
||||
|
||||
### Last Data Feed Release
|
||||
@ -33,46 +33,69 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
|
||||
### Total Number of included CVEs
|
||||
|
||||
```plain
|
||||
262334
|
||||
262363
|
||||
```
|
||||
|
||||
### CVEs added in the last Commit
|
||||
|
||||
Recently added CVEs: `2`
|
||||
Recently added CVEs: `29`
|
||||
|
||||
- [CVE-2024-6282](CVE-2024/CVE-2024-62xx/CVE-2024-6282.json) (`2024-09-10T12:15:02.137`)
|
||||
- [CVE-2024-8369](CVE-2024/CVE-2024-83xx/CVE-2024-8369.json) (`2024-09-10T12:15:02.463`)
|
||||
- [CVE-2023-37230](CVE-2023/CVE-2023-372xx/CVE-2023-37230.json) (`2024-09-10T14:15:12.210`)
|
||||
- [CVE-2023-37231](CVE-2023/CVE-2023-372xx/CVE-2023-37231.json) (`2024-09-10T14:15:12.283`)
|
||||
- [CVE-2023-44254](CVE-2023/CVE-2023-442xx/CVE-2023-44254.json) (`2024-09-10T15:15:14.173`)
|
||||
- [CVE-2024-21753](CVE-2024/CVE-2024-217xx/CVE-2024-21753.json) (`2024-09-10T15:15:14.543`)
|
||||
- [CVE-2024-23184](CVE-2024/CVE-2024-231xx/CVE-2024-23184.json) (`2024-09-10T15:15:14.763`)
|
||||
- [CVE-2024-23185](CVE-2024/CVE-2024-231xx/CVE-2024-23185.json) (`2024-09-10T15:15:14.967`)
|
||||
- [CVE-2024-25073](CVE-2024/CVE-2024-250xx/CVE-2024-25073.json) (`2024-09-10T15:15:15.170`)
|
||||
- [CVE-2024-25074](CVE-2024/CVE-2024-250xx/CVE-2024-25074.json) (`2024-09-10T15:15:15.370`)
|
||||
- [CVE-2024-27257](CVE-2024/CVE-2024-272xx/CVE-2024-27257.json) (`2024-09-10T15:15:15.570`)
|
||||
- [CVE-2024-31489](CVE-2024/CVE-2024-314xx/CVE-2024-31489.json) (`2024-09-10T15:15:15.787`)
|
||||
- [CVE-2024-31490](CVE-2024/CVE-2024-314xx/CVE-2024-31490.json) (`2024-09-10T15:15:15.983`)
|
||||
- [CVE-2024-33508](CVE-2024/CVE-2024-335xx/CVE-2024-33508.json) (`2024-09-10T15:15:16.187`)
|
||||
- [CVE-2024-35282](CVE-2024/CVE-2024-352xx/CVE-2024-35282.json) (`2024-09-10T15:15:16.397`)
|
||||
- [CVE-2024-36511](CVE-2024/CVE-2024-365xx/CVE-2024-36511.json) (`2024-09-10T15:15:16.610`)
|
||||
- [CVE-2024-37728](CVE-2024/CVE-2024-377xx/CVE-2024-37728.json) (`2024-09-10T14:15:12.463`)
|
||||
- [CVE-2024-42423](CVE-2024/CVE-2024-424xx/CVE-2024-42423.json) (`2024-09-10T15:15:17.013`)
|
||||
- [CVE-2024-43796](CVE-2024/CVE-2024-437xx/CVE-2024-43796.json) (`2024-09-10T15:15:17.510`)
|
||||
- [CVE-2024-43799](CVE-2024/CVE-2024-437xx/CVE-2024-43799.json) (`2024-09-10T15:15:17.727`)
|
||||
- [CVE-2024-43800](CVE-2024/CVE-2024-438xx/CVE-2024-43800.json) (`2024-09-10T15:15:17.937`)
|
||||
- [CVE-2024-44867](CVE-2024/CVE-2024-448xx/CVE-2024-44867.json) (`2024-09-10T14:15:13.103`)
|
||||
- [CVE-2024-45044](CVE-2024/CVE-2024-450xx/CVE-2024-45044.json) (`2024-09-10T15:15:18.217`)
|
||||
- [CVE-2024-45323](CVE-2024/CVE-2024-453xx/CVE-2024-45323.json) (`2024-09-10T15:15:18.420`)
|
||||
- [CVE-2024-45393](CVE-2024/CVE-2024-453xx/CVE-2024-45393.json) (`2024-09-10T15:15:18.657`)
|
||||
- [CVE-2024-8443](CVE-2024/CVE-2024-84xx/CVE-2024-8443.json) (`2024-09-10T14:15:13.440`)
|
||||
- [CVE-2024-8654](CVE-2024/CVE-2024-86xx/CVE-2024-8654.json) (`2024-09-10T14:15:13.710`)
|
||||
|
||||
|
||||
### CVEs modified in the last Commit
|
||||
|
||||
Recently modified CVEs: `120`
|
||||
Recently modified CVEs: `41`
|
||||
|
||||
- [CVE-2024-6796](CVE-2024/CVE-2024-67xx/CVE-2024-6796.json) (`2024-09-10T12:09:50.377`)
|
||||
- [CVE-2024-6979](CVE-2024/CVE-2024-69xx/CVE-2024-6979.json) (`2024-09-10T12:09:50.377`)
|
||||
- [CVE-2024-7260](CVE-2024/CVE-2024-72xx/CVE-2024-7260.json) (`2024-09-10T12:09:50.377`)
|
||||
- [CVE-2024-7318](CVE-2024/CVE-2024-73xx/CVE-2024-7318.json) (`2024-09-10T12:09:50.377`)
|
||||
- [CVE-2024-7341](CVE-2024/CVE-2024-73xx/CVE-2024-7341.json) (`2024-09-10T12:09:50.377`)
|
||||
- [CVE-2024-7618](CVE-2024/CVE-2024-76xx/CVE-2024-7618.json) (`2024-09-10T12:09:50.377`)
|
||||
- [CVE-2024-7655](CVE-2024/CVE-2024-76xx/CVE-2024-7655.json) (`2024-09-10T12:09:50.377`)
|
||||
- [CVE-2024-7698](CVE-2024/CVE-2024-76xx/CVE-2024-7698.json) (`2024-09-10T12:09:50.377`)
|
||||
- [CVE-2024-7699](CVE-2024/CVE-2024-76xx/CVE-2024-7699.json) (`2024-09-10T12:09:50.377`)
|
||||
- [CVE-2024-7734](CVE-2024/CVE-2024-77xx/CVE-2024-7734.json) (`2024-09-10T12:09:50.377`)
|
||||
- [CVE-2024-7770](CVE-2024/CVE-2024-77xx/CVE-2024-7770.json) (`2024-09-10T12:09:50.377`)
|
||||
- [CVE-2024-7784](CVE-2024/CVE-2024-77xx/CVE-2024-7784.json) (`2024-09-10T12:09:50.377`)
|
||||
- [CVE-2024-7891](CVE-2024/CVE-2024-78xx/CVE-2024-7891.json) (`2024-09-10T12:09:50.377`)
|
||||
- [CVE-2024-7955](CVE-2024/CVE-2024-79xx/CVE-2024-7955.json) (`2024-09-10T12:09:50.377`)
|
||||
- [CVE-2024-8241](CVE-2024/CVE-2024-82xx/CVE-2024-8241.json) (`2024-09-10T12:09:50.377`)
|
||||
- [CVE-2024-8258](CVE-2024/CVE-2024-82xx/CVE-2024-8258.json) (`2024-09-10T12:09:50.377`)
|
||||
- [CVE-2024-8268](CVE-2024/CVE-2024-82xx/CVE-2024-8268.json) (`2024-09-10T12:09:50.377`)
|
||||
- [CVE-2024-8478](CVE-2024/CVE-2024-84xx/CVE-2024-8478.json) (`2024-09-10T12:09:50.377`)
|
||||
- [CVE-2024-8543](CVE-2024/CVE-2024-85xx/CVE-2024-8543.json) (`2024-09-10T12:09:50.377`)
|
||||
- [CVE-2024-8554](CVE-2024/CVE-2024-85xx/CVE-2024-8554.json) (`2024-09-10T13:52:23.250`)
|
||||
- [CVE-2024-8555](CVE-2024/CVE-2024-85xx/CVE-2024-8555.json) (`2024-09-10T13:53:11.847`)
|
||||
- [CVE-2024-8573](CVE-2024/CVE-2024-85xx/CVE-2024-8573.json) (`2024-09-10T12:08:12.567`)
|
||||
- [CVE-2024-8610](CVE-2024/CVE-2024-86xx/CVE-2024-8610.json) (`2024-09-10T12:09:50.377`)
|
||||
- [CVE-2024-8611](CVE-2024/CVE-2024-86xx/CVE-2024-8611.json) (`2024-09-10T12:09:50.377`)
|
||||
- [CVE-2024-8645](CVE-2024/CVE-2024-86xx/CVE-2024-8645.json) (`2024-09-10T12:09:50.377`)
|
||||
- [CVE-2024-4607](CVE-2024/CVE-2024-46xx/CVE-2024-4607.json) (`2024-09-10T15:03:24.710`)
|
||||
- [CVE-2024-5561](CVE-2024/CVE-2024-55xx/CVE-2024-5561.json) (`2024-09-10T15:35:12.400`)
|
||||
- [CVE-2024-6089](CVE-2024/CVE-2024-60xx/CVE-2024-6089.json) (`2024-09-10T14:05:16.183`)
|
||||
- [CVE-2024-6282](CVE-2024/CVE-2024-62xx/CVE-2024-6282.json) (`2024-09-10T15:50:57.713`)
|
||||
- [CVE-2024-6799](CVE-2024/CVE-2024-67xx/CVE-2024-6799.json) (`2024-09-10T15:05:48.583`)
|
||||
- [CVE-2024-6874](CVE-2024/CVE-2024-68xx/CVE-2024-6874.json) (`2024-09-10T15:27:04.190`)
|
||||
- [CVE-2024-6928](CVE-2024/CVE-2024-69xx/CVE-2024-6928.json) (`2024-09-10T14:35:09.507`)
|
||||
- [CVE-2024-7955](CVE-2024/CVE-2024-79xx/CVE-2024-7955.json) (`2024-09-10T15:35:13.013`)
|
||||
- [CVE-2024-8369](CVE-2024/CVE-2024-83xx/CVE-2024-8369.json) (`2024-09-10T15:50:57.713`)
|
||||
- [CVE-2024-8557](CVE-2024/CVE-2024-85xx/CVE-2024-8557.json) (`2024-09-10T14:19:36.280`)
|
||||
- [CVE-2024-8558](CVE-2024/CVE-2024-85xx/CVE-2024-8558.json) (`2024-09-10T15:50:24.143`)
|
||||
- [CVE-2024-8559](CVE-2024/CVE-2024-85xx/CVE-2024-8559.json) (`2024-09-10T15:31:32.443`)
|
||||
- [CVE-2024-8560](CVE-2024/CVE-2024-85xx/CVE-2024-8560.json) (`2024-09-10T15:32:39.927`)
|
||||
- [CVE-2024-8561](CVE-2024/CVE-2024-85xx/CVE-2024-8561.json) (`2024-09-10T15:35:01.837`)
|
||||
- [CVE-2024-8562](CVE-2024/CVE-2024-85xx/CVE-2024-8562.json) (`2024-09-10T15:36:34.703`)
|
||||
- [CVE-2024-8563](CVE-2024/CVE-2024-85xx/CVE-2024-8563.json) (`2024-09-10T15:37:48.183`)
|
||||
- [CVE-2024-8564](CVE-2024/CVE-2024-85xx/CVE-2024-8564.json) (`2024-09-10T15:38:42.570`)
|
||||
- [CVE-2024-8565](CVE-2024/CVE-2024-85xx/CVE-2024-8565.json) (`2024-09-10T15:40:31.103`)
|
||||
- [CVE-2024-8566](CVE-2024/CVE-2024-85xx/CVE-2024-8566.json) (`2024-09-10T15:42:03.630`)
|
||||
- [CVE-2024-8567](CVE-2024/CVE-2024-85xx/CVE-2024-8567.json) (`2024-09-10T15:44:31.283`)
|
||||
- [CVE-2024-8569](CVE-2024/CVE-2024-85xx/CVE-2024-8569.json) (`2024-09-10T15:45:24.237`)
|
||||
- [CVE-2024-8579](CVE-2024/CVE-2024-85xx/CVE-2024-8579.json) (`2024-09-10T15:47:10.393`)
|
||||
- [CVE-2024-8580](CVE-2024/CVE-2024-85xx/CVE-2024-8580.json) (`2024-09-10T15:47:47.397`)
|
||||
- [CVE-2024-8582](CVE-2024/CVE-2024-85xx/CVE-2024-8582.json) (`2024-09-10T15:48:30.537`)
|
||||
- [CVE-2024-8583](CVE-2024/CVE-2024-85xx/CVE-2024-8583.json) (`2024-09-10T15:49:29.103`)
|
||||
|
||||
|
||||
## Download and Usage
|
||||
|
337
_state.csv
337
_state.csv
@ -210286,6 +210286,7 @@ CVE-2022-45852,0,0,8367ad8d8ca781f5d520dfaec9d624ac88b1854631f6d8ea84357ba8b8d67
|
||||
CVE-2022-45853,0,0,e0d152599feddeb4c9617357802b839b7f07e05bf0a8819c2d55b60b2d7ef5e8,2023-06-06T21:08:54.183000
|
||||
CVE-2022-45854,0,0,abd06e8f4d7163d554d5329f88d3abeb3656cb88532c9e9c4e47699963f890f7,2023-12-29T07:15:10.010000
|
||||
CVE-2022-45855,0,0,125ed2525d649d907c8ff766cd08f2c706357098513c6d47a8810e647f05084c,2023-07-20T01:19:07.767000
|
||||
CVE-2022-45856,1,1,548c04bb9e2f985f5113c8820c970d7c0461e65ae396d22e605e89581e1aa22e,2024-09-10T15:50:47.237000
|
||||
CVE-2022-45857,0,0,36ff837a492e56eff00cc1bfef94b73984a02c592457088e1abd6d8a68030a34,2023-11-07T03:54:53.863000
|
||||
CVE-2022-45858,0,0,6e893e21fde78883afd394e001c06b0460bf616bcf167c3e476ac1ca580aa903,2023-11-07T03:54:54.040000
|
||||
CVE-2022-45859,0,0,e348c03f2d659f2f5386e4f909b6e1cb2796eaee095e3e655cb0987893244af9,2023-11-07T03:54:54.287000
|
||||
@ -221780,7 +221781,7 @@ CVE-2023-28821,0,0,4b09838e4d4a8a2917bcf5cdf5f612433b074dcb7548d0d3a766e80a60b71
|
||||
CVE-2023-28823,0,0,87894b474b71bc3e46b9c394031dd0006588b5abb19d7f1ecdad5a5928c0beff,2023-11-07T04:10:54.510000
|
||||
CVE-2023-28824,0,0,6217e10c10df3a710e40602c4b5f6e2e19457c4fb3b380905849d51ad7a71391,2023-06-08T13:47:32.470000
|
||||
CVE-2023-28826,0,0,72ba642b7be16a1b258eb748f3c254740948996853f940079d44c2390c589230,2024-03-13T23:15:45.693000
|
||||
CVE-2023-28827,0,1,f44108e508cde369d66ca1dbd483ecbe772822ac164d5e3df873ccb3ff8f8959,2024-09-10T12:09:50.377000
|
||||
CVE-2023-28827,0,0,f44108e508cde369d66ca1dbd483ecbe772822ac164d5e3df873ccb3ff8f8959,2024-09-10T12:09:50.377000
|
||||
CVE-2023-28828,0,0,7c01788f5690e47da77e68839cb118243068e2077bb180cffc0de77a5125e0bc,2023-05-09T13:15:17.273000
|
||||
CVE-2023-28829,0,0,4b5cff9cda965725817b3e2e0f35976766e508ef08936a9897600a6795af5299,2023-07-05T17:36:45.750000
|
||||
CVE-2023-2883,0,0,ab9ed73cbe69a88b6f18d08ae8534916fdeccc2f5c106eb1ff09b4e5989738f8,2023-05-31T22:45:30.307000
|
||||
@ -222083,7 +222084,7 @@ CVE-2023-29186,0,0,ca337c32ecd54aaa6a20ec16dcbb51606fb6bbc389b9588c61c48b5ef3e48
|
||||
CVE-2023-29187,0,0,37cbc4fc5b69bdaf8977690c2054b7318ae9c92be87dc71d8fffa14a4c6fa4d2,2023-04-26T18:44:56.017000
|
||||
CVE-2023-29188,0,0,c8d6b342b1f470e012069a59253d87a9442371c20c6a02a2d8c5e75f8e5eb9c6,2023-05-12T20:38:28.087000
|
||||
CVE-2023-29189,0,0,5c4829e9fc65a8a0b7677e115bc730c39c808943db2b53817e35dac9785369ee,2023-04-18T19:12:51.917000
|
||||
CVE-2023-2919,0,1,d44b5e8e0d57981bedf8bdd149de52ae8e941740c55578ad90589d1fd6cd328b,2024-09-10T12:09:50.377000
|
||||
CVE-2023-2919,0,0,d44b5e8e0d57981bedf8bdd149de52ae8e941740c55578ad90589d1fd6cd328b,2024-09-10T12:09:50.377000
|
||||
CVE-2023-29192,0,0,73670fa84f26434b779f2c20e3669fdb19858c7fa2bf5bf6a721c3b4f9d813e7,2023-04-14T18:44:16.613000
|
||||
CVE-2023-29193,0,0,6543396042e55a615e10b4819b5e1667d84c8522046ba09dfe814b3173c02517,2023-04-24T16:22:01.430000
|
||||
CVE-2023-29194,0,0,1310b1d37e385d5ecd34739249a58dc353236e51fef4f2f920700bb6fccfa3ce,2023-04-25T14:33:00.543000
|
||||
@ -223165,8 +223166,8 @@ CVE-2023-30751,0,0,ae585a47db8a0602ef91743e13477f6236e5e01cada54890879cfcffb4e05
|
||||
CVE-2023-30752,0,0,935f7908189bd82539e41a2d86f8ebb2a263a876dda7e975f2a2fdba167b8ce6,2023-08-18T18:32:55.423000
|
||||
CVE-2023-30753,0,0,0d0c2545d7d29d64dd2e70bb8b3d2a933e4c99689927dfa0f64a67ee4a45ee8d,2023-06-16T03:54:31.040000
|
||||
CVE-2023-30754,0,0,579004194887953c85b1a9666a3045cdf4105f26b24ce5699a1033d5b90f0ded,2023-12-29T18:02:41.543000
|
||||
CVE-2023-30755,0,1,aca86603717293817b2b267f967bbb30dcf130f9482aabf464f65707c494afb0,2024-09-10T12:09:50.377000
|
||||
CVE-2023-30756,0,1,e2fc66e0643cf74203acacd4f0cc6a7e4626de1c0eb9d2ba457111132d0ba4df,2024-09-10T12:09:50.377000
|
||||
CVE-2023-30755,0,0,aca86603717293817b2b267f967bbb30dcf130f9482aabf464f65707c494afb0,2024-09-10T12:09:50.377000
|
||||
CVE-2023-30756,0,0,e2fc66e0643cf74203acacd4f0cc6a7e4626de1c0eb9d2ba457111132d0ba4df,2024-09-10T12:09:50.377000
|
||||
CVE-2023-30757,0,0,cff556189dd9382efd68fbcfab505f5642dfa6d74057f5975422bc45636e64b1,2023-12-12T10:15:09.900000
|
||||
CVE-2023-30758,0,0,eac657fe1eec4de76cf32cf68bed951e739823521119936a2e7bd3651d4c2b3d,2023-06-07T12:57:12.083000
|
||||
CVE-2023-30759,0,0,c79c26a74dc1361d051573d8f2f37b5ac0b7264a94b4d0636fc9dfbc866e044d,2023-06-27T18:36:55.627000
|
||||
@ -227908,7 +227909,12 @@ CVE-2023-37222,0,0,1fbdeb8eb7a4e2d78e6a1b8c62ff798f54346848df8aa204eb582fb9c8fea
|
||||
CVE-2023-37223,0,0,d0235be5a4062402ff483e36fc907b2056e60453658d9454bd48cfdcbc910813,2023-07-26T17:31:44.957000
|
||||
CVE-2023-37224,0,0,56757c3d318e5ccdefbc3606fc1b70199839f3440746a029a61956009615528e,2023-07-26T17:19:57.800000
|
||||
CVE-2023-37225,0,0,6c6fc5523358fc5c31dfe4302415c9111d78bb8c86af38b6363cadfecba42f1f,2023-12-29T18:38:05.730000
|
||||
CVE-2023-37226,1,1,184f1e973b887b4e7335ba979cbcb7ad1a0e3ac524b0191c7d6306673002d566,2024-09-10T15:50:57.713000
|
||||
CVE-2023-37227,1,1,9cab3cb52477018e2e9c17d4979b15879f07916c80ffa436a10736830151667d,2024-09-10T15:50:57.713000
|
||||
CVE-2023-37228,0,0,643ba6d022c49330496a6c23ea43a1b4794516f1d1a88ce155ebc80364021378,2024-08-15T16:15:16.890000
|
||||
CVE-2023-37229,1,1,f15091edec8f678b7363e7bb6e905a9021d6650f9e05e08819b504fb8c57afe3,2024-09-10T15:50:57.713000
|
||||
CVE-2023-37230,1,1,6fa865781f1c9143f4c45e27891664a22ee7c7510666260023d5a8573afaf706,2024-09-10T15:50:57.713000
|
||||
CVE-2023-37231,1,1,186b922796acee3f309110b9fad224037b83941e0fc557bec3a3a15b003f06a5,2024-09-10T15:50:57.713000
|
||||
CVE-2023-37237,0,0,29a5f3af5199aad5af4f0fdd6511141f4d2b435f709fd260dd5041911ad086ec,2023-07-07T16:00:14.390000
|
||||
CVE-2023-37238,0,0,8c5d217b62a8efe0c30f15bea3a5d6293d9c6e0abe28ac04e3704ef99c34ccb0,2023-07-12T22:51:22.043000
|
||||
CVE-2023-37239,0,0,2a2a4e372334e66e5f41ce012a4e3ce6edee956c498345781b72b50751b6e2f3,2023-07-12T18:57:30.653000
|
||||
@ -231734,7 +231740,7 @@ CVE-2023-41983,0,0,7c619f460714936c647722021cb39b4962f5fe5f4f1b4d5ffc62d654d13f0
|
||||
CVE-2023-41984,0,0,9ddf80974283475101cedd2720565974698edcfbe64158b8161d487b57688b27,2023-11-07T04:21:11.400000
|
||||
CVE-2023-41986,0,0,16c44ae34b137074aa5d69b0c49ff4092316ccf9c4dc7d30ac6d7b0db923b796,2023-10-05T13:41:34
|
||||
CVE-2023-41987,0,0,be75c78d1854c13942da9ec99a874e5d9d92126e8d2b45f4b961f9abf8aed0e2,2024-01-12T14:42:06.437000
|
||||
CVE-2023-41988,0,0,a085363db97fa30b6845118ff529e2f050f0340ed8a4683f87505c4a1abc2717,2023-11-02T18:00:25.943000
|
||||
CVE-2023-41988,0,1,d5c0cfdead9e8e0e375f7814161638c832d9fc92829326cc119f2f0772ddc264,2024-09-10T15:35:02.160000
|
||||
CVE-2023-41989,0,0,15f79255385af8fb2c8a30eb63e3493891c5848369d603df8b11d0b204f7007c,2024-07-17T02:15:09.923000
|
||||
CVE-2023-4199,0,0,a8ea3fa4d5e12ff9268e1923814442991e8e8fd68b876f0d3acd52313915f0a2,2024-05-17T02:31:25.960000
|
||||
CVE-2023-41990,0,0,5ba8b6def663374646378872ff93a9391a3657c78fae38ef93933ff666d86ee5,2024-02-16T18:45:01.993000
|
||||
@ -233293,6 +233299,7 @@ CVE-2023-44250,0,0,eb38c0154b6983d19aaeabb629983f3bdf0e67e76d34f1ccc1b32fd16f858
|
||||
CVE-2023-44251,0,0,60ad3e8bd99914522574db812b53a318cb7fe0b1057fd5d59a8fb8c991bcceb2,2023-12-18T17:34:13.253000
|
||||
CVE-2023-44252,0,0,c18e31969fe55318dc34cdcae06d8b35b920d99915cca01a86c8e6e9e5d91093,2023-12-18T17:34:39.763000
|
||||
CVE-2023-44253,0,0,b94586d93ff7b12102ad0c3e79155b5172e9e5dab827ce60a53904c92536ddba,2024-03-11T22:15:54.337000
|
||||
CVE-2023-44254,1,1,dbeb61d5aedfa3bb5e059f3cfc936dda48486b6fcb1736ef68337a6588377515,2024-09-10T15:50:47.237000
|
||||
CVE-2023-44256,0,0,3a47f8714449fba575f4306ec8fb3c9c1958c7bc0c5e1b109cba6f7638ba3dde,2023-11-07T04:21:34.997000
|
||||
CVE-2023-44257,0,0,6d9b01019b2cfe81d2e4c80b77f48870a867993b0ccc3f7e8616b833975a5d04,2023-10-12T01:48:28.493000
|
||||
CVE-2023-44259,0,0,e536f0c314a79ffaadd8d22b948548f70b43b3a40f213b998434d3188c2c6c0b,2023-10-12T00:41:15.513000
|
||||
@ -236606,7 +236613,7 @@ CVE-2023-49060,0,0,0f125d0d07dbe270a6f07b57aa641d1848f31c22fb855ca4bf11b4d5b4ef2
|
||||
CVE-2023-49061,0,0,dc7136ec78ed5cf0b1889d9e499076dc7861b57a74e858b10a634425002df41f,2023-11-28T19:45:33.650000
|
||||
CVE-2023-49062,0,0,1d72476c88fb45368b58247aec1688b0093de275b1093249720b62193de89ed0,2023-12-04T19:46:20.953000
|
||||
CVE-2023-49068,0,0,182c6949abe2a827480e4301e5ed188cb126ad03424cd6905a2140b6a730140b,2023-12-01T13:53:23.050000
|
||||
CVE-2023-49069,0,1,72cd9601407d01de420331536695fd645b9d4f647b999936934dbe640c617168,2024-09-10T12:09:50.377000
|
||||
CVE-2023-49069,0,0,72cd9601407d01de420331536695fd645b9d4f647b999936934dbe640c617168,2024-09-10T12:09:50.377000
|
||||
CVE-2023-4907,0,0,ee7fec7a11df58ff005b9b63ad49a50bb70f5f4e575258375cd0f49a03cc2ad7,2024-01-31T17:15:17.750000
|
||||
CVE-2023-49070,0,0,631766166232ba486ccd48cb00f4afe564eec8aa0b473067715b1f04d1a8cd4e,2023-12-29T18:15:39.103000
|
||||
CVE-2023-49073,0,0,2a69c4407ae45adf60baf11d8aa993141dc3f78b1f8dc71c70987fff6214c4d6,2024-07-11T16:00:30.427000
|
||||
@ -237781,7 +237788,7 @@ CVE-2023-50879,0,0,96bc2fd32893df60dc9a12b33c7f08370036fdb61954bbfa932079a273859
|
||||
CVE-2023-5088,0,0,c94ffb02c96a8cec4af6a59312fdcdd2c710029206668225298aa8079f360387,2024-05-22T17:16:06.710000
|
||||
CVE-2023-50880,0,0,6790987cb5f9234fbf6fa4800d32d2b366b9894f66925894955eb736ceafee95,2024-01-05T17:36:02.743000
|
||||
CVE-2023-50881,0,0,b97c9521d0ccc06c46d7026a15154e62734f7c976beadea9cbc341c0527cbcfa,2024-01-05T17:37:29.017000
|
||||
CVE-2023-50883,0,1,db5b9587de7f1d1e78d12d32c370332b5d82066b612702548e2442b13e62fe55,2024-09-10T12:09:50.377000
|
||||
CVE-2023-50883,0,1,bc21e9735c6cf5463a988737111b21ae061b1cad85afd8a63c99e2e6a80e685b,2024-09-10T15:35:05.733000
|
||||
CVE-2023-50885,0,0,81dfb4b037f813572746bcfda051f21a4cb6e042f33a7cad7f68642740792968,2024-04-18T13:04:28.900000
|
||||
CVE-2023-50886,0,0,6fe5ac5b8352865db3415bb4996e1dbfb205e15fe11bb4f9cdc4705846004af1,2024-03-15T16:26:49.320000
|
||||
CVE-2023-50889,0,0,924cfe0a1b2cb6a0413f11e4aed6ec165eaea3add0fa68ffe02d6fb074452a47,2024-01-05T17:39:22.253000
|
||||
@ -241195,7 +241202,7 @@ CVE-2024-0055,0,0,6423f35fac503e2236303ae5d235d6e391a2b6d4054c8cfb0ff929b519b2bf
|
||||
CVE-2024-0056,0,0,250eb566c316b11de6e07df616e14b6841dc4cdae760cc615b211d8501ed88cc,2024-05-29T00:15:10.920000
|
||||
CVE-2024-0057,0,0,5ab5673f2af739399b07e147370322a5ca65cb1474378035b1d3b1b450eb99db,2024-05-29T00:15:11.080000
|
||||
CVE-2024-0066,0,0,edf104f3d6f2429ec397ec7f6a0c69119750ee227dae9f3b2af25d9d29a03213,2024-06-20T12:44:01.637000
|
||||
CVE-2024-0067,0,1,2510f3abf6d60bd3be95f588e4263e97377d419d6cb8663648142812a03c6ccf,2024-09-10T12:09:50.377000
|
||||
CVE-2024-0067,0,0,2510f3abf6d60bd3be95f588e4263e97377d419d6cb8663648142812a03c6ccf,2024-09-10T12:09:50.377000
|
||||
CVE-2024-0068,0,0,6b8371ca9b4345af5aaf5fdf9359976122506646a267dd907e8079f7bfa63e11,2024-03-01T14:04:26.010000
|
||||
CVE-2024-0069,0,0,f3ce66513994f3ff028688e20278f0458e6258ba59cf74f690ee7dcc06e666da,2023-11-28T00:15:07.140000
|
||||
CVE-2024-0070,0,0,cd3a46a295206562a4be32633daf482f59e1d323193385e7677ae8b6c52e190f,2023-11-28T00:15:07.183000
|
||||
@ -244045,7 +244052,7 @@ CVE-2024-21524,0,0,94f71300cc1d59487169e73d8c8122613dc6982f44c5510e0a3db2e12961d
|
||||
CVE-2024-21525,0,0,b0b4bb7ac52f850d274c4462f4e1c3c5bb13c947283cf1a8b69a39e30d235a9e,2024-07-11T13:05:54.930000
|
||||
CVE-2024-21526,0,0,effd07762d29cbaa402155d2c949789e21ab2c387b4e4af3dcba88775e370e17,2024-07-11T15:05:20.940000
|
||||
CVE-2024-21527,0,0,5f68d3fcedc529f8c61b21687ff27d1dfc424d6b1048d7df4e422495549fd852,2024-07-19T13:01:44.567000
|
||||
CVE-2024-21528,0,1,20243e12426582c16920a0ab3a8036a5493484e122893e1731a0b03945a2d62b,2024-09-10T12:09:50.377000
|
||||
CVE-2024-21528,0,0,20243e12426582c16920a0ab3a8036a5493484e122893e1731a0b03945a2d62b,2024-09-10T12:09:50.377000
|
||||
CVE-2024-2153,0,0,d3abacc4f79f5ae0d18412563134adcd72e3650da9619fcc6b902801eca849d9,2024-05-17T02:38:04.867000
|
||||
CVE-2024-2154,0,0,ab5f0b39bb38e5c25606bad964d563e0edda059ff34db22b99ca2b3670b021ff,2024-05-17T02:38:04.970000
|
||||
CVE-2024-2155,0,0,499612150b3a1be829ef430bb3388eb54a55d7bb52271f37f2a76ceb8af6c56f,2024-05-17T02:38:05.063000
|
||||
@ -244191,6 +244198,7 @@ CVE-2024-2175,0,0,e25106a44fdb025eeacb5d45a3528175fd9b5c4474d6e05002e4ccb474d65b
|
||||
CVE-2024-21750,0,0,77ee2ee926eafbd02beff6a52a22a1b4fb591f80299b5d5a917971a11bfe423d,2024-02-03T00:41:15.460000
|
||||
CVE-2024-21751,0,0,55d06ade7b40f70a88f44c4672adccf43ead813dee575220c2752c77b1d36f34,2024-06-10T12:40:41.360000
|
||||
CVE-2024-21752,0,0,1c3f8b9711eb134dc24ac607b805147df44f1f88998d9833be077b129a214185,2024-02-29T13:49:29.390000
|
||||
CVE-2024-21753,1,1,443c3fea7cc955ab97d13fb300e2ade956ae833045f9ab73283f3629ed87b639,2024-09-10T15:50:47.237000
|
||||
CVE-2024-21754,0,0,b97eddd3100f107222ee5e32da6dcd88fb7b0ee9149673b247db14c9970fccbe,2024-06-13T18:36:45.417000
|
||||
CVE-2024-21755,0,0,9a466316a66e45e4d0307d7e1708925f9ce7b32c6c8fd1a33c7d4ec0ae073e31,2024-04-10T13:24:22.187000
|
||||
CVE-2024-21756,0,0,bfc7206c5a35bb9a2182cf343b6e246cc54f15a3cfdddaffd353644c2951bedd,2024-04-10T13:24:22.187000
|
||||
@ -245091,6 +245099,8 @@ CVE-2024-23180,0,0,3547d7545728d0f45bd4fd56a1db615172f3e4fc040563d8c505e772c571c
|
||||
CVE-2024-23181,0,0,dde157bb4f52ee4b22f024a3ba7ea060d2d998a8e3ccecc1ceac77ce9f175e4b,2024-01-29T22:55:15.377000
|
||||
CVE-2024-23182,0,0,532a9e7c3fe41ce5da92fdf7acf18d8d51e72cc2a28e69e9e77af8657af74758,2024-01-29T22:55:36.183000
|
||||
CVE-2024-23183,0,0,23beaf649604b2942bc2e4c48f7ef05509300370f801b7e64bf8c9cf92c3a776,2024-01-29T22:55:48.787000
|
||||
CVE-2024-23184,1,1,c670aba6f1915987e59b8c7e1688c9816fde8f7fef3f2176f4a94585faf9acf9,2024-09-10T15:50:47.237000
|
||||
CVE-2024-23185,1,1,f41fe669b1c9fb7d4283ed628db4ed4c4584d677783652dc6e94186c1e409322,2024-09-10T15:50:47.237000
|
||||
CVE-2024-23186,0,0,50054448acbac6c991b97841b79b6be5ba071ab51bb20603e8d84994d302b81a,2024-05-07T01:15:06.237000
|
||||
CVE-2024-23187,0,0,9d6dc16c878516b4cb24114919d4c96343f31016c71d39468be4eadb147bc77b,2024-05-07T01:15:06.333000
|
||||
CVE-2024-23188,0,0,ce1c34d2ff7cdb555552e77ea8d56a52e7e8358bfb4cacf42906fa2a1a9d9495,2024-07-03T01:47:37.067000
|
||||
@ -245224,7 +245234,7 @@ CVE-2024-23317,0,0,b3d4db9a6c4ba1ce642dcb721062f8e13232707c61d4a2c28ce4845f9c04f
|
||||
CVE-2024-23319,0,0,4a7fda9e8071d1fa76d196825210fd8cd3d29e8648472f0b500740dc1467f4fc,2024-02-15T18:44:04.737000
|
||||
CVE-2024-2332,0,0,cc5467ba19ca1d2bf5a2ec6b13b0c5d8a5ce3b3eab4f44d8463709803f4da34a,2024-05-17T02:38:10.740000
|
||||
CVE-2024-23320,0,0,6fd5aa31e372843847f4e959f0e968559315a9dd978b50b33c878f1d03cfcac6,2024-08-01T13:47:17.360000
|
||||
CVE-2024-23321,0,0,d8392c23948026fc9815ec91d0430a7e82baad2a231bfe58a33ae6a2942c78d3,2024-08-01T13:47:17.543000
|
||||
CVE-2024-23321,0,1,0df55a4fdbde98717690458efdcc5c3b3ac47d7a732b62704f74b849a9d8b0d8,2024-09-10T15:15:43.803000
|
||||
CVE-2024-23322,0,0,6c6980b136285edc46373134483ed816f3fd3ee6fbb7f3e1febbb6f33bcbf690,2024-02-15T04:48:20.247000
|
||||
CVE-2024-23323,0,0,f603fe6a083c2cd5c48c5d3a316c9a1d4ec2c37ff8f0e7d0d927e564c077bd85,2024-02-15T04:48:09.937000
|
||||
CVE-2024-23324,0,0,bf60e6965b5ce278543e16b9ab637ce05df1815af3d2d0d4acd276370e6add4e,2024-02-15T04:46:33.747000
|
||||
@ -245962,7 +245972,7 @@ CVE-2024-2450,0,0,755e866a7b0db6589d3e0a883887ca70c54bd78a033c510c6d171025dcde46
|
||||
CVE-2024-24506,0,0,300162b102880c909fef7627ff3cbf7be694917201d061517c5fddd5106c6c17,2024-08-15T20:35:02.267000
|
||||
CVE-2024-24507,0,0,df900bfc618cee6fc96303e9e74a6c7f402219022adee42ced57945155073210,2024-09-05T16:59:07.437000
|
||||
CVE-2024-2451,0,0,ed8963260b73d0c2914199c7ccad86d4c10e40338037d43fae0b6a4b737eaa20,2024-05-28T17:11:55.903000
|
||||
CVE-2024-24510,0,1,3f514afc3000466823a186cd4ba12bbd9555f00846700cf910d766ccccb0a2d1,2024-09-10T12:09:50.377000
|
||||
CVE-2024-24510,0,0,3f514afc3000466823a186cd4ba12bbd9555f00846700cf910d766ccccb0a2d1,2024-09-10T12:09:50.377000
|
||||
CVE-2024-24511,0,0,19e56e69a02039183df0e76b3f6b366a0c7fe610ce5511009ebec6b3e2899678,2024-08-06T16:35:04.493000
|
||||
CVE-2024-24512,0,0,46fb434c74a35036e4b3e461f16bf1067dceccece23e9aa7bd866d4f9010f0c7,2024-08-15T21:35:05.897000
|
||||
CVE-2024-2452,0,0,cca6a173274889cd69a2095d63054482ce0ac9763c76eccaa731ce2a40b02048,2024-06-10T19:15:53.417000
|
||||
@ -246360,6 +246370,8 @@ CVE-2024-25063,0,0,974af0bcd393eeee85e8240282eb20080b5485f8c7ead439e836ce3c3fbcd
|
||||
CVE-2024-25064,0,0,0770f9d742da8a4ef1654f2a903e2066b829d91dbbc42fb7f1f0759a089ebb88,2024-03-04T22:43:15.337000
|
||||
CVE-2024-25065,0,0,ee86c2c4ae99b640b23ec2509e27ca1e8877189c550c4b4e7d30422934d42841,2024-08-29T20:36:15.613000
|
||||
CVE-2024-2507,0,0,059cda731f595d08cc9a92bc2f36829afe22653a29c81bf0cc15e53c1729da6d,2024-04-10T13:23:38.787000
|
||||
CVE-2024-25073,1,1,e66c63e181d5e4caf7444fe28d52b515fc52363e04ea33752bedbd4713c843bb,2024-09-10T15:50:47.237000
|
||||
CVE-2024-25074,1,1,afe322ab5db2d940d19e93ccbf8c4165307ce5ededdfe276ce9309597e9d29a3,2024-09-10T15:50:47.237000
|
||||
CVE-2024-25075,0,0,bfed480b2306172449fd442aea4561660fa83ab81e8f534c8111cd2e1f0d7f14,2024-04-03T12:38:04.840000
|
||||
CVE-2024-25076,0,0,26f9af1ba1d1d6abf593ce5cb002ec7a5de923ee3f100a60b5eb1daeac203495,2024-07-11T15:05:28.443000
|
||||
CVE-2024-25077,0,0,9936dfb9fa263db917d226ab0cd6f8d094e5b95fa936d5098b62c9aa7f5236ab,2024-08-08T14:35:02.810000
|
||||
@ -248081,6 +248093,7 @@ CVE-2024-27247,0,0,c68b98a47507a62cf1fddd5d92d1e3599a3dae9836f9e1673dea5313964a3
|
||||
CVE-2024-2725,0,0,4b109228f09a586dab91b667f3a16d225e84b90e57a03d6425e2c43a43711564,2024-03-22T15:34:43.663000
|
||||
CVE-2024-27254,0,0,eaa78de626e7bc9892d9bd1a4aa44647e13738f964703ed91ff89367d49eda4f,2024-06-10T17:16:22.873000
|
||||
CVE-2024-27255,0,0,1c110eb7d9ab046aa4890f29967f590ea7f23942ac21f596c2e113d0e316c046,2024-03-04T13:58:23.447000
|
||||
CVE-2024-27257,1,1,ff864a5bf7af5f189845b8a4060f64d7987b2285db2d5fd4c8cd7936eb9e01c7,2024-09-10T15:50:47.237000
|
||||
CVE-2024-2726,0,0,72988f9ad68bbbf63dda740202678870f683cc61908e4f60fba7dfbe58dffd21,2024-03-22T15:34:43.663000
|
||||
CVE-2024-27260,0,0,f122b75dc7c284609059d79b31ed18883cf9cf95a5516e6a4f3964931201ea16,2024-05-17T18:36:31.297000
|
||||
CVE-2024-27261,0,0,87b5e9d2f195775295533a95bd370dfad0b5646f877a2530f26fd9575376c86d,2024-04-15T13:15:51.577000
|
||||
@ -248186,11 +248199,11 @@ CVE-2024-27360,0,0,33246297884723d4ff8bb58853158d18ca6235582cb6c304b20ea59c67448
|
||||
CVE-2024-27361,0,0,e36b02dee6138d8db49ead5ecd9bf32ca156e68e27cc50daa8adffe6cb1ea663,2024-07-11T13:06:13.187000
|
||||
CVE-2024-27362,0,0,9d431a1116edfb20ae4c799537e5e9f5d11ebb0847e9e8bdd27f35d143873f1d,2024-07-12T14:58:02.413000
|
||||
CVE-2024-27363,0,0,f6352d5e26499e6478b31ffa535bfa444a95ad102dd84d5e4c2e7b2372cfbda9,2024-07-11T13:06:13.187000
|
||||
CVE-2024-27364,0,1,4a222ff17386a6cd55108ddc2d5cc55e9acf58e57ee7c04f6958d2f553c249ec,2024-09-10T12:09:50.377000
|
||||
CVE-2024-27365,0,1,9058f84b5d198b35970a80108ecfe455ca7140ed2b490cd16c3e02517cc2fe18,2024-09-10T12:09:50.377000
|
||||
CVE-2024-27366,0,1,20dc881e7bf571dd0c8dbc3ff49783310b35c9dcc4221185f67fd27cbe3e625a,2024-09-10T12:09:50.377000
|
||||
CVE-2024-27367,0,1,ed06e5f40633daa7017df3992768b03a4eac6bfac27e84caa263debc60731b71,2024-09-10T12:09:50.377000
|
||||
CVE-2024-27368,0,1,63e2a7f6937ffbae9620ec0fef226696ba4ec5e0c8503261f6b3ffb1fa5e47c9,2024-09-10T12:09:50.377000
|
||||
CVE-2024-27364,0,0,4a222ff17386a6cd55108ddc2d5cc55e9acf58e57ee7c04f6958d2f553c249ec,2024-09-10T12:09:50.377000
|
||||
CVE-2024-27365,0,0,9058f84b5d198b35970a80108ecfe455ca7140ed2b490cd16c3e02517cc2fe18,2024-09-10T12:09:50.377000
|
||||
CVE-2024-27366,0,0,20dc881e7bf571dd0c8dbc3ff49783310b35c9dcc4221185f67fd27cbe3e625a,2024-09-10T12:09:50.377000
|
||||
CVE-2024-27367,0,0,ed06e5f40633daa7017df3992768b03a4eac6bfac27e84caa263debc60731b71,2024-09-10T12:09:50.377000
|
||||
CVE-2024-27368,0,0,63e2a7f6937ffbae9620ec0fef226696ba4ec5e0c8503261f6b3ffb1fa5e47c9,2024-09-10T12:09:50.377000
|
||||
CVE-2024-27370,0,0,d787ca1729f6374f316c8229cfb768db5a8087155da314897f8dbb9bbd830bc1,2024-08-20T16:35:05.843000
|
||||
CVE-2024-27371,0,0,9f9543c2ab901d26d97e0899583296b8d79cc83789296e1252e008496317a15f,2024-08-21T16:35:04.317000
|
||||
CVE-2024-27372,0,0,8907778c9fe6bbf87ab271d97dfb25ffd83018598cb715d55ddafede9aab4b45,2024-08-15T16:35:04.970000
|
||||
@ -248205,10 +248218,10 @@ CVE-2024-2738,0,0,a7fee4844aa4ff2acb90aab32559c9a1bc272ae0ec6a90bd82a5f6f4cc4b67
|
||||
CVE-2024-27380,0,0,faebc4a3baa432ef5ecb31e1bffac55af4502d0bd3a145e79e126fdf104360dd,2024-06-27T15:52:55.140000
|
||||
CVE-2024-27381,0,0,ca56a1eacfe1d85ad323f094ca6ce6a781e7b45770dc3b39a1a4a3ad0c28ba97,2024-06-27T15:54:29.327000
|
||||
CVE-2024-27382,0,0,5cdede5ba0c355d88eed84640c66ff7fece892ae23f7a48063c692f8bc7ac8c7,2024-06-27T15:54:47.727000
|
||||
CVE-2024-27383,0,1,2720587ba1d09fc49923ce7fcaec594f8dccb0b624b514e67645dbf25865f724,2024-09-10T12:09:50.377000
|
||||
CVE-2024-27383,0,0,2720587ba1d09fc49923ce7fcaec594f8dccb0b624b514e67645dbf25865f724,2024-09-10T12:09:50.377000
|
||||
CVE-2024-27385,0,0,003e283023f566a2385aab18dff3e37100c8b762c1c6dc798e412558e0acbc12,2024-08-01T13:48:25.863000
|
||||
CVE-2024-27386,0,0,392763fc5ad1ba2fe130e662b117c81c5508cfa52b8d41cd60a9bfd68ddf8e96,2024-08-01T13:48:26.553000
|
||||
CVE-2024-27387,0,1,d5713554e4922e570a2d233ee94788548287393c2d740fde62d03e88269a0f60,2024-09-10T12:09:50.377000
|
||||
CVE-2024-27387,0,0,d5713554e4922e570a2d233ee94788548287393c2d740fde62d03e88269a0f60,2024-09-10T12:09:50.377000
|
||||
CVE-2024-27388,0,0,8ca5a384d8f8d9a2091e5293e5ac316155597802cc78feac2a6594da98404e69,2024-06-27T13:15:57.940000
|
||||
CVE-2024-27389,0,0,cc01c74893b07f0b811b8decf7e0d285abe38929fae54a3365d798c7016df82f,2024-05-01T19:50:25.633000
|
||||
CVE-2024-2739,0,0,f67ee20b2bc2ca284467eaab4487259eaa12927229efc313e4a8f27526c7f5dd,2024-04-15T13:15:31.997000
|
||||
@ -249255,7 +249268,7 @@ CVE-2024-29010,0,0,a9ff9c65174c33f2e792fcb56ee4004994b28661d6208ebb1e88e717582f6
|
||||
CVE-2024-29011,0,0,eb92887d9a2ecd248daea80b2641ebf2c57344e5f41ce9050910fcddaf740a0c,2024-05-01T19:50:25.633000
|
||||
CVE-2024-29012,0,0,7c7c32533c82aaf22406acd8a658ea95d36fb7375f5076084cc597754864b6a9,2024-08-19T19:34:59.167000
|
||||
CVE-2024-29013,0,0,67b4d9c80d914ad0bed565ffb846138fde0fb1daab078996874ed199eeb14f9e,2024-08-19T19:21:08.777000
|
||||
CVE-2024-29014,0,0,727bca255016a056117f183cd0537f37a7ac804396b0c606f5bbb22eb38674ae,2024-08-01T13:49:23.520000
|
||||
CVE-2024-29014,0,1,ac8715a4a47e6a3b023ec51c55bec9d1eaaba0c154e192bb9db1535747591f1c,2024-09-10T14:12:21.223000
|
||||
CVE-2024-29015,0,0,026a67da0abe325ccd1937a90042fd1199a49a631917fe4d1ce76b94dacdc497,2024-08-14T17:49:14.177000
|
||||
CVE-2024-29018,0,0,0688752b1434844c55e6cd721e2221622ec0094595898dc16074b9d8a9b658da,2024-03-21T12:58:51.093000
|
||||
CVE-2024-29019,0,0,ad22499f8dda93d004eb62f1b9a36df352f03e492a86d6142b84d27273c03d4d,2024-04-11T12:47:44.137000
|
||||
@ -249409,7 +249422,7 @@ CVE-2024-29174,0,0,8810eaafac9310c2bc7fa35be0ee59667dfed889d6f0406ec9e8e9a2e84e1
|
||||
CVE-2024-29175,0,0,9e1c30d68374a67297243430511b61dcb57896195e7592bda865652864e933fb,2024-06-26T12:44:29.693000
|
||||
CVE-2024-29176,0,0,4481bed72498e83281c3c71f1079bcbb25fd95752a4713e0302f19027e575dfe,2024-06-26T12:44:29.693000
|
||||
CVE-2024-29177,0,0,c250b8bebc6f69d83485fb761553b3777ab8e096ccd436d863289f72ba5f24cc,2024-06-26T12:44:29.693000
|
||||
CVE-2024-29178,0,1,22d635a1cbe75908c0019b5950f190aa3a6a7a13b04dc63306f00cc64a0a2d72,2024-09-10T13:59:42.720000
|
||||
CVE-2024-29178,0,0,22d635a1cbe75908c0019b5950f190aa3a6a7a13b04dc63306f00cc64a0a2d72,2024-09-10T13:59:42.720000
|
||||
CVE-2024-29179,0,0,fe840eaf09e7a8e7dd10821c2db25070488ae9547e1cdb2c88feef71c243f949,2024-03-26T12:55:05.010000
|
||||
CVE-2024-2918,0,0,970042595bd5643e2d862aca742e1125b1b743ac1b05c46b57da300ff31e85eb,2024-04-10T13:23:38.787000
|
||||
CVE-2024-29180,0,0,868fb8f0af2dabbfadb8670233d0ccacca72ce41e4c728fc488a08eccd08c9c9,2024-03-21T19:47:03.943000
|
||||
@ -249506,7 +249519,7 @@ CVE-2024-2935,0,0,34d6864aa9c90788d7b06b2eba324f36e7b4a9a81ef161d4acdecd1aa98731
|
||||
CVE-2024-2936,0,0,ded3e6858b21938cc6332525608363ca633684eee87859a8f9504838347f2c1a,2024-03-29T12:45:02.937000
|
||||
CVE-2024-29366,0,0,c6def951532345f5745b43a5275ceff56f9c33aee73b404cffac4524e7e2c006,2024-08-01T13:49:29.947000
|
||||
CVE-2024-29368,0,0,0901e7b80a5ee0e48b0a83048196418207989c0e792e75fa11268199f70a424c,2024-04-23T14:15:08.440000
|
||||
CVE-2024-2937,0,0,79954cfe98c2940c0942106d942fe05f3c11cf3e503a3ae1500fa6b5fca01f84,2024-08-05T16:35:09.543000
|
||||
CVE-2024-2937,0,1,20e4368eb9bf892738732958af36e28720f1d15eb06551fe7b0431e053a164e7,2024-09-10T15:03:49.607000
|
||||
CVE-2024-29374,0,0,be8e602eebbb83c03bdd549b3faaa1f0dfc77d0ca5e7f9526b71be3aea9cae09,2024-08-15T20:35:09.683000
|
||||
CVE-2024-29375,0,0,716fc3c8e0ccb042475d24e7fe2ab7abf1b6955d8021a6ba9e6aecf5e8253511,2024-04-04T12:48:41.700000
|
||||
CVE-2024-29376,0,0,ef2434b33b4ebabd1988c2573e7e291cc10d7cd1308168626cdd5db2860751e3,2024-07-03T01:52:24.250000
|
||||
@ -251059,7 +251072,9 @@ CVE-2024-31485,0,0,95e7eeaa8d3876cb40bd1169861bc0a7332c54b51b97ae90600f4cdafa502
|
||||
CVE-2024-31486,0,0,8bbeb872b9695d04b4cd3936fc99563ad2e7fa2388523728e9f4697b70eb399e,2024-07-04T07:15:10.823000
|
||||
CVE-2024-31487,0,0,368cd96ee83829999b330b1c4a6d940da3ad3f90b7509cd8e5ad307aa0e2655f,2024-04-10T13:24:22.187000
|
||||
CVE-2024-31488,0,0,79579231c3d990bd5ef2153181bf0543059b6f4db5405c31f48fd4d89be58434,2024-05-14T19:17:55.627000
|
||||
CVE-2024-31489,1,1,8faed6493c7acb5fb0783a541745d775ce2ca95dd5f10fd3c4a96539fe024f26,2024-09-10T15:50:47.237000
|
||||
CVE-2024-3149,0,0,2a5a29258a667d67886d42edddd31c7bc22884b912d7a2ac6637398264c93b4d,2024-06-07T14:56:05.647000
|
||||
CVE-2024-31490,1,1,49bf2dc553931e85b486cc789e2682b4b7951acbaf0fcadd980cb7b6a8837c26,2024-09-10T15:50:47.237000
|
||||
CVE-2024-31491,0,0,a256f5e0e4e8048b4dc739c834231f6c11313abc3e9f6f4080e9c9cbce9e2f02,2024-05-14T19:17:55.627000
|
||||
CVE-2024-31492,0,0,b06ceb7c9f7436cf71baa2d42bf8bc10377af2691ce98c83805eb2ca0bae07bf,2024-04-10T19:49:51.183000
|
||||
CVE-2024-31493,0,0,23786918c0e6bb606f80dfbf3cc1cf7aa62322ef3147c75ab2836cfafd79af54,2024-06-03T14:46:24.250000
|
||||
@ -251342,7 +251357,7 @@ CVE-2024-32002,0,0,8b152fa71cb7888d307cedcb6036ff42410fe299ac886c8397e8f14b70468
|
||||
CVE-2024-32003,0,0,31311e12a1795761553a56c6af2bf7b204ba79f18fac5a0250a8b13fef254e1b,2024-04-15T13:15:31.997000
|
||||
CVE-2024-32004,0,0,46c6e95c184179de4512a1da85cf6fbcce6fe2ac4189ff7da433e0234267bb88,2024-06-26T10:15:12.050000
|
||||
CVE-2024-32005,0,0,d156f3f94a9502713f64771d89d9d58b72987fd70cae51625e32aa2c9e6ee96e,2024-04-15T13:15:31.997000
|
||||
CVE-2024-32006,0,1,5c7c5410e5ebae0aed6768d38595cf423ecabed031907824543afcdd9e531195,2024-09-10T12:09:50.377000
|
||||
CVE-2024-32006,0,0,5c7c5410e5ebae0aed6768d38595cf423ecabed031907824543afcdd9e531195,2024-09-10T12:09:50.377000
|
||||
CVE-2024-32007,0,0,dac6e800b17b27260fecd9bce96903f007f5eec2446ab0ae841fc54dc30923d0,2024-08-01T13:51:19.560000
|
||||
CVE-2024-3201,0,0,9d746fb1c422de83f85c51388b2057631f70f2332b71bf082d5fbeff58a4ab1e,2024-05-24T01:15:30.977000
|
||||
CVE-2024-32017,0,0,4171151be280ba186c662a4712cd0108f86c659cb0491f443a14bc31a4f95a77,2024-06-10T18:15:31.880000
|
||||
@ -252098,7 +252113,7 @@ CVE-2024-32964,0,0,b623874e6a0274971696b1b7da0d2f443f746dffed315cb1a514ae93f0a27
|
||||
CVE-2024-32966,0,0,c438f55196809bbbc973f729157ff8c0c6df1250009855187f1fc3a5f9a87d17,2024-05-01T13:01:51.263000
|
||||
CVE-2024-32967,0,0,edb16c37f9c2fc6d1e9a47803a7b1119309dad5cfcac07761a5d0ee65a1bacec,2024-05-01T13:01:51.263000
|
||||
CVE-2024-32969,0,0,6ef0f8d88265e6683965945b29c1106dae41ceee98d494ed8c3a06c6d351066c,2024-05-24T01:15:30.977000
|
||||
CVE-2024-3297,0,0,1d78b9b9ec8cf08b428212aae468d0b6a6340efa6b238bd5187fbcecf64d21ad,2024-07-24T12:55:13.223000
|
||||
CVE-2024-3297,0,1,8038489b40412866bb516ddcd1ba51b58fe82d756afc36be2c391969796f5667,2024-09-10T15:41:15.547000
|
||||
CVE-2024-32970,0,0,5a01359cfb986ee6b849bc2a7e60567b8f37d4b5ce19db35dccc9f7464a14062,2024-05-01T13:02:20.750000
|
||||
CVE-2024-32971,0,0,ab8a148088c73648f89e5b394dd5a94a547e8c2e4b0230a8c2d6e56a7f3b753a,2024-05-02T13:27:25.103000
|
||||
CVE-2024-32972,0,0,dc515bb8aec39a31fdf47e578fc51873affc085f71d155b12852513b737283e1,2024-05-06T16:00:59.253000
|
||||
@ -252358,6 +252373,7 @@ CVE-2024-33498,0,0,4ba880f4da642b35a01b59acc526b8efa609f227ba180bef70cff2474457f
|
||||
CVE-2024-33499,0,0,e1c6b22865cd9e8e386bae301b66bd9b73b37abc782106e33f7da12179559c10,2024-06-11T12:15:15.850000
|
||||
CVE-2024-3350,0,0,73390a7fa244b3222b6af399a560b7e7938ab475c75bc9de2220d3279630acc8,2024-05-17T02:39:51.583000
|
||||
CVE-2024-33500,0,0,951d86a0511934af03ca85b48f9110bb08038dc052f2625d3ab09642d8ba80a9,2024-06-11T13:54:12.057000
|
||||
CVE-2024-33508,1,1,b5720d4773a94bd180e4067354df564e5dbeed41c3434e7014c2a9693d0110f3,2024-09-10T15:50:47.237000
|
||||
CVE-2024-33509,0,0,6b9621bd236ae3fb7e5746778fba5a74fec5e03470e8fd83d110500351f31c12,2024-09-09T17:06:37.737000
|
||||
CVE-2024-3351,0,0,2d444d04a071c972bf019c9f444260881949f9b31576f665a6e90d6ec68f63c1,2024-05-17T02:39:51.683000
|
||||
CVE-2024-33511,0,0,fc70fe6b0a596d6a09769f1b8403860f36c39e5f9d265f34a0625ad60ef9eda2,2024-07-03T01:58:19.517000
|
||||
@ -252532,7 +252548,7 @@ CVE-2024-33694,0,0,26d440cb75dcd86544ffadb69d95d3097f1e6a23ac05fe9a05fb2494be46d
|
||||
CVE-2024-33695,0,0,496bc8a3b6cc06e0f2cb2ff5ef3180780eefdd07d63e68d063cf97ba79dd8598,2024-04-26T15:32:22.523000
|
||||
CVE-2024-33696,0,0,8adc0db7b8cce33b994e835fa3f282e25f1f4ef5644a2aed7cd50d800fe731e7,2024-04-26T15:32:22.523000
|
||||
CVE-2024-33697,0,0,4a571113caa6ccf495d29be30608c42f9dddf9084d1562bed260e698c04aae88,2024-04-26T15:32:22.523000
|
||||
CVE-2024-33698,0,1,a8c5e7c040b3c6d1c0f9bc21543a8682893b5aa4922da330e8b0355256cea828,2024-09-10T12:09:50.377000
|
||||
CVE-2024-33698,0,0,a8c5e7c040b3c6d1c0f9bc21543a8682893b5aa4922da330e8b0355256cea828,2024-09-10T12:09:50.377000
|
||||
CVE-2024-3371,0,0,d2e6ea20ce5eb692a4e48c27aedae40a56c8f7db204eed4d633cbd78a04f68c4,2024-04-26T15:15:49.357000
|
||||
CVE-2024-3372,0,0,a196d1e45ccce196e4deb1ea2387c2fe4f6bf89b27a8a7cd4be5ebcd31c9a0db,2024-05-14T19:17:55.627000
|
||||
CVE-2024-3374,0,0,3ebd1bd07a69ff470e060c4c065f62c59313c2dfc13f260402ece495f026b11b,2024-05-14T19:17:55.627000
|
||||
@ -253067,7 +253083,7 @@ CVE-2024-34452,0,0,0601c8beed111acadaba988be3618d3e8a2a7b19905fce659ac719cace1be
|
||||
CVE-2024-34453,0,0,47a7edffe635099f1bf55d077c40113fc9f5ba8dcdeec8da8790d14933d9ceb1,2024-07-03T02:00:06.540000
|
||||
CVE-2024-34454,0,0,9c41ced14bcda502a6d91e8242ee544d71d5283ff3511493207ec7805cdb48e7,2024-07-03T02:00:07.617000
|
||||
CVE-2024-34455,0,0,c191f5457e9d706ca3323355b6cb28301bf69c793f902f33757952929305bbe5,2024-07-03T02:00:08.547000
|
||||
CVE-2024-34457,0,0,b14d1b09a16733cbe8e237801f72eb2ee4d363ca08aadfa585a48dbe12e38c8f,2024-07-22T14:15:04.883000
|
||||
CVE-2024-34457,0,1,d2b7076c5126ec3b1fbfaa19049f43761d8e3c29c7c94ffa7c70c4c46e72c84a,2024-09-10T15:09:36.840000
|
||||
CVE-2024-34458,0,0,ad9c57980a1196e03a7ff89c7cbce14805d2491f6af55e1053911cc733df4207,2024-08-21T13:31:38.380000
|
||||
CVE-2024-34459,0,0,fa787ae7a4c8630112bbb06f81f3133274e5fdd9f7332b290019503934d44271,2024-08-22T18:35:08.623000
|
||||
CVE-2024-3446,0,0,cb97091f9e4759b1c0912bd51a56b30e45443e03748f74b42eff2bfcc530cf53,2024-04-18T08:15:38.340000
|
||||
@ -253121,7 +253137,7 @@ CVE-2024-34533,0,0,8566d0e8dbd9cd4017bd3a534ac0fd9822a90bf76d2b3f6401a871fd79682
|
||||
CVE-2024-34534,0,0,bc0f446d96fd1bff04cb40a3d47d7cedb5384511135e58f39b13d3fecfe87cc4,2024-07-03T02:00:34.370000
|
||||
CVE-2024-34538,0,0,feba2430cb16511882082bb58c8b82ea01c0b09af4d84fa976b42058411470a6,2024-07-03T02:00:35.197000
|
||||
CVE-2024-34539,0,0,9ef63927e8927d2fb2816c186d7e6407d6365bb9385ba11a715c86bc1697a83f,2024-07-03T02:00:36.057000
|
||||
CVE-2024-3454,0,0,7dc4bcdd2a945b795b21148e6388bc0be4868de234be8b0b4ce54b7e0cd35a3a,2024-07-24T12:55:13.223000
|
||||
CVE-2024-3454,0,1,f566b799730d97b5188e88dce61422723578c42a47e0d20db27696cb277428f1,2024-09-10T15:40:28.457000
|
||||
CVE-2024-34546,0,0,8800da10c69fec688483057d2cb770a66eb40079057655e7555d9e5ef263c46b,2024-05-08T13:15:00.690000
|
||||
CVE-2024-34547,0,0,823aa1b861a91366dddc57a5e7dd1048515142481ea3eeb344f690ed0a7ca84c,2024-05-08T13:15:00.690000
|
||||
CVE-2024-34548,0,0,8caa33bdc3c5be33f667017355107b8d8cdf99ab7255d3c04528b6e278893606,2024-05-08T13:15:00.690000
|
||||
@ -253603,6 +253619,7 @@ CVE-2024-35270,0,0,d1dc880d5375baa19c5c22ae22578f8e8a49aa76e4f7bae55a316a718926e
|
||||
CVE-2024-35271,0,0,3f199c76ff3f5650b64bac70365416389832a7a31f0f804814fbf23ea034da6e,2024-08-20T15:47:07.247000
|
||||
CVE-2024-35272,0,0,4c1a47b56d7417b088998b4603214b936945d403bf6190e9e2c7cd926cf7a2a4,2024-08-20T15:47:09.880000
|
||||
CVE-2024-3528,0,0,c96e1e132295c243d4fa4a90d8abf77e41d771305ddbcf81d644bca2cdde7da0,2024-05-17T02:39:59.157000
|
||||
CVE-2024-35282,1,1,f32b7831347c16186af21de4d457e50606ddfc68fcd04e016bb74c29ca535ad6,2024-09-10T15:50:47.237000
|
||||
CVE-2024-35283,0,0,517940d61eca1185fcc5d68a59f62111cbe8fdc81301b4e7c0610afefcc22645,2024-05-29T19:50:25.303000
|
||||
CVE-2024-35284,0,0,3a94c448d00dd5059f3fd361118e6cd65d80e9412861f2d6774f390c6aa71d9d,2024-05-29T19:50:25.303000
|
||||
CVE-2024-3529,0,0,b7433b023ce9172d03becfe0cc0d18595c43e3d8737e87c779d288c2827cf3e8,2024-05-17T02:39:59.247000
|
||||
@ -253919,7 +253936,7 @@ CVE-2024-35779,0,0,706445338be7aae5f251c8b956a0c3bf0868336274fe9963a1a9e43c59067
|
||||
CVE-2024-35780,0,0,685b106b3d65ae1869c2c1c35a0354f69b2eb70c614d38b4e2c684c295e7d786,2024-06-20T12:44:01.637000
|
||||
CVE-2024-35781,0,0,aa3ec547f8f8f306fe8ea0fb55240637cbf26b27603624da2638b54b69436759,2024-06-24T19:15:58.517000
|
||||
CVE-2024-35782,0,0,dbc038df298fe5384dd87379cd2931409975f0d218f64474d4c9dcc1abcf8e97,2024-06-05T19:50:20.463000
|
||||
CVE-2024-35783,0,1,8acb9b63137f8c44b720317f1c62716f73ba2d38715c4524cc52873fd8917bf6,2024-09-10T12:09:50.377000
|
||||
CVE-2024-35783,0,0,8acb9b63137f8c44b720317f1c62716f73ba2d38715c4524cc52873fd8917bf6,2024-09-10T12:09:50.377000
|
||||
CVE-2024-35784,0,0,5d7a60327e3aea236c6954addcecd342bc4303bf9f4ddbf6fdcb56f7d7e890e7,2024-05-17T18:35:35.070000
|
||||
CVE-2024-35785,0,0,99251cf0758a83ae7f60c2f912cfb4919a76584c6054f38cf9392b41ad4b090a,2024-06-25T23:15:30.160000
|
||||
CVE-2024-35786,0,0,e8af1ef6ccd4fa218271a6a20ff9f509feb225a9368ed4f0a4c142495813a3de,2024-05-17T18:35:35.070000
|
||||
@ -254540,6 +254557,7 @@ CVE-2024-36502,0,0,ce6106b712ac934aa3d46433d1d90bd69a47142ad6fe94c097ce1ae7a55cb
|
||||
CVE-2024-36503,0,0,cf0c7df8eb5d0563a3adb9382b90b37caa70a1002731797c28a41bd8794b11f6,2024-07-16T15:19:45.557000
|
||||
CVE-2024-36505,0,0,5f3f0cdeca57fafe761af488854e771d0523077cbcea5a41dd4a6b4cc9d56e84,2024-08-22T14:36:31.643000
|
||||
CVE-2024-3651,0,0,3337eb59719c2f9e59e57f7ed588f3375e47160773d149a8aeb60c1398d8674e,2024-07-11T14:58:01.803000
|
||||
CVE-2024-36511,1,1,bd247cc30297a9605da4cbbd65bbbe080e34ee77c21cb1a16ebf8701cb4237ea,2024-09-10T15:50:47.237000
|
||||
CVE-2024-36514,0,0,ae3ea1b58c1af4d84bf3b1df047767075b97747b2aba92d2b8d841814d31aaad,2024-08-27T13:28:33.090000
|
||||
CVE-2024-36515,0,0,6ffc0af4d6ea6411f00106c20aa28bb8637cbfea07924d2fe59b402d34c14e64,2024-08-27T13:28:09.360000
|
||||
CVE-2024-36516,0,0,e91b35cc04e821b0b30ba2e7773979c84dc2aa68f475c208014155f8bd934996,2024-08-27T13:28:52.227000
|
||||
@ -255300,6 +255318,7 @@ CVE-2024-3770,0,0,fa4beea78617deed554c70cf304b7e2f927660a5dd6add7de1e76f7fc1d644
|
||||
CVE-2024-3771,0,0,1646ed765465efbfe9b2c4ddd2884445b41a894fc37412177344b47d5bf8f677,2024-05-17T02:40:07.477000
|
||||
CVE-2024-3772,0,0,e9317cbebb79e9be22e844c8c1723d1676d09eadc1e2aeffc34a2fcfe946260f,2024-04-26T02:15:06.983000
|
||||
CVE-2024-37726,0,0,a5107b068d66c3570343545c901feb79b0c7fc6600c054d9141acb4f14ca7b1a,2024-08-01T13:54:14.057000
|
||||
CVE-2024-37728,1,1,6714547b3462983e259e183857dedf6181255588d2aa53d0a61693d1555a7a1d,2024-09-10T15:50:57.713000
|
||||
CVE-2024-37732,0,0,8bcaa977ac18e5833de4fd0520da90883ea1f9cf5405317587bb381c54de852f,2024-07-03T02:04:38.513000
|
||||
CVE-2024-37734,0,0,0e5d8052c40ece19eb47666a762eea5411abf63f936921b36baec3d43e53baa8,2024-07-03T02:04:39.343000
|
||||
CVE-2024-3774,0,0,593479bdd908b3498d235d74677575dd1f3896886cab276c51a981ed2e66af92,2024-04-15T13:15:31.997000
|
||||
@ -255452,12 +255471,12 @@ CVE-2024-37987,0,0,f4bc331a9b09a336ebf69cac5128f3ddb41a4064b564c097fc6645464fecd
|
||||
CVE-2024-37988,0,0,c86291a0f061c05259fe7a7336e8616b7d2b496dae2d1e3292124af3161a49e9,2024-07-12T19:01:50.753000
|
||||
CVE-2024-37989,0,0,3b94113ccd1695e55c704a3f38d763d5ec54c44f354e4b1fe1efc7884dacd2de,2024-07-12T18:52:38.387000
|
||||
CVE-2024-3799,0,0,099fb34e0ee28d9311fbf29cfaad6b5950bd5e198b1ff9c15d8b2a88d4538973,2024-07-12T10:15:02.353000
|
||||
CVE-2024-37990,0,1,4c2e549dfe3c32bd6733e321a7a5bf1a47d36824476d06d26c1eb9e0aa52cb94,2024-09-10T12:09:50.377000
|
||||
CVE-2024-37991,0,1,395f13648abe82e124688d2b3bdd56a31bb8d55b98b55e3c04595080c247ab9c,2024-09-10T12:09:50.377000
|
||||
CVE-2024-37992,0,1,f3f4cd9dc8e32fd04676bff956d157aec4bd22a3d407a83b9e6039f334b21c9c,2024-09-10T12:09:50.377000
|
||||
CVE-2024-37993,0,1,1bbd5d8658672e1ae5e7055ef4dd0898911b0530bc22a64689bedaa7a5440ee3,2024-09-10T12:09:50.377000
|
||||
CVE-2024-37994,0,1,3d2fd095bc10290e9d4551f9166a6d756f8d9dabc6f27fbc57810d342e13dd2b,2024-09-10T12:09:50.377000
|
||||
CVE-2024-37995,0,1,cb759ea01bea375688534bc6a96f42a0caa82edc7f473e683e2d4c546ecbf1e3,2024-09-10T12:09:50.377000
|
||||
CVE-2024-37990,0,0,4c2e549dfe3c32bd6733e321a7a5bf1a47d36824476d06d26c1eb9e0aa52cb94,2024-09-10T12:09:50.377000
|
||||
CVE-2024-37991,0,0,395f13648abe82e124688d2b3bdd56a31bb8d55b98b55e3c04595080c247ab9c,2024-09-10T12:09:50.377000
|
||||
CVE-2024-37992,0,0,f3f4cd9dc8e32fd04676bff956d157aec4bd22a3d407a83b9e6039f334b21c9c,2024-09-10T12:09:50.377000
|
||||
CVE-2024-37993,0,0,1bbd5d8658672e1ae5e7055ef4dd0898911b0530bc22a64689bedaa7a5440ee3,2024-09-10T12:09:50.377000
|
||||
CVE-2024-37994,0,0,3d2fd095bc10290e9d4551f9166a6d756f8d9dabc6f27fbc57810d342e13dd2b,2024-09-10T12:09:50.377000
|
||||
CVE-2024-37995,0,0,cb759ea01bea375688534bc6a96f42a0caa82edc7f473e683e2d4c546ecbf1e3,2024-09-10T12:09:50.377000
|
||||
CVE-2024-37996,0,0,e39e1581961cad8f5d5dd910100078a11657ad2090cbed7264c9a8bad1310bf5,2024-07-09T18:19:14.047000
|
||||
CVE-2024-37997,0,0,880ea769e8919f97f57b9878ce449ed40b5cbca31c8883be4629ac4f6a893243,2024-07-09T18:19:14.047000
|
||||
CVE-2024-37998,0,0,f74f0aee21c1d0ed189b1b53893b54b9b769e53300f2261ee57ad9c992f023c0,2024-07-24T12:55:13.223000
|
||||
@ -255659,7 +255678,7 @@ CVE-2024-3824,0,0,e8430e8e74668eaaf1515aab02bbd50450b435f6ff0c9f12ee70566d9f9578
|
||||
CVE-2024-3825,0,0,0797baa725c3e17399d5d91a8de7a7a1a558d256247589a07a334c4f415b4b15,2024-04-17T15:31:50.160000
|
||||
CVE-2024-3826,0,0,121760e16d238bf81106004c4251c8d93e688e0e085277d4609f0e751627011d,2024-07-02T17:44:45.700000
|
||||
CVE-2024-3827,0,0,fe9452c74994fbdb1f4a1edea576f588d513e300bcd491a382890605454b836b,2024-08-02T12:59:43.990000
|
||||
CVE-2024-38270,0,1,a7e3c9f02d0f7e453ff34e04c4a859b0797321d763a9d9fdcbf2be7383df41e4,2024-09-10T12:09:50.377000
|
||||
CVE-2024-38270,0,0,a7e3c9f02d0f7e453ff34e04c4a859b0797321d763a9d9fdcbf2be7383df41e4,2024-09-10T12:09:50.377000
|
||||
CVE-2024-38271,0,0,a55d517f1e451a20db301f87d88d99f6d0173df1fa03dd913b12a59d024f897d,2024-07-29T22:15:04.757000
|
||||
CVE-2024-38272,0,0,0d362d9df49b138200ab4f12d59df7df286d43127ca17e43b2d79b45065d1568,2024-07-29T22:15:04.883000
|
||||
CVE-2024-38273,0,0,98139fcc5d27706ddcb6f85d322a9c3ffe167225916ac0c861ab393656c9d382,2024-06-27T03:15:50.130000
|
||||
@ -255811,7 +255830,7 @@ CVE-2024-38496,0,0,6e423c176a887ed5895ae7351498e6b63c7505283576ed5f43b90da3d939a
|
||||
CVE-2024-3850,0,0,2382357c8e4d6adda4f3540070cc5ea125c45aed93070563af82a0d626955695,2024-06-12T18:12:56.413000
|
||||
CVE-2024-38501,0,0,107ba9da0def272edbee92f63403371ae902a6026765264509f3ddd58bca6605,2024-08-22T13:34:42.653000
|
||||
CVE-2024-38502,0,0,b5bdc3f7b1bc56d47ac5d1146c261af04f17a5df43c92f8f1ba3633b24999ec3,2024-08-22T13:35:47.970000
|
||||
CVE-2024-38503,0,0,57a42403e1de4dcbf683abc4eaadb7a1ac23c4ac22608d1c4298e8a1a0c607e4,2024-07-22T14:15:05.780000
|
||||
CVE-2024-38503,0,1,062ca2bc661b34b058f0fa65fe5cd42ea3b52898b059829f1d483a0d7ef7e275,2024-09-10T15:07:19.587000
|
||||
CVE-2024-38504,0,0,bdcaf5074354faf0cdfff183ef409e2ea10b03e0260d7e3d48701d88660181c6,2024-08-23T02:49:51.450000
|
||||
CVE-2024-38505,0,0,32ccdd92e433f3db8ed7bb675bb92e4152d96b3c6994f28b5055afef76402fb9,2024-08-23T02:51:03.663000
|
||||
CVE-2024-38506,0,0,12b82ad8cd179e1fb82826519690b684292f639073a92190db19fb8cdd1d4cc4,2024-08-23T02:52:39.013000
|
||||
@ -256500,15 +256519,15 @@ CVE-2024-3957,0,0,6be73190d0db646071e408d26fd6054938440e63fb695d16249857bd780649
|
||||
CVE-2024-39570,0,0,795cf07324f2cb8c6a570190fa22ff6767cfc3ce2b0050380d11d95a41e2ca40,2024-09-06T21:20:26.347000
|
||||
CVE-2024-39571,0,0,b35a4f00350faa538c88f4f6d224a7df8752eca1297d346f418e4963a4c09a43,2024-09-06T21:20:00.153000
|
||||
CVE-2024-39573,0,0,66fc7feceb0e35a8b2e536fb0fe145ff47c70fa679791c05a2dafe67c9ad9e6e,2024-07-12T14:15:16.400000
|
||||
CVE-2024-39574,0,1,f3617c3480c5c817f80d209e43a6e357a3c75aa85f25d9ab947f73a4beb0db2c,2024-09-10T12:09:50.377000
|
||||
CVE-2024-39574,0,0,f3617c3480c5c817f80d209e43a6e357a3c75aa85f25d9ab947f73a4beb0db2c,2024-09-10T12:09:50.377000
|
||||
CVE-2024-39576,0,0,b954c37b27403600557da0d261dd953de929a61b04f025c8697cd0d77090d715,2024-08-22T12:48:02.790000
|
||||
CVE-2024-39578,0,0,c57c67d60ebbfbb439cb464fedeceb835967a7da09b4f182842457f0862047f9,2024-09-03T20:56:11.277000
|
||||
CVE-2024-39579,0,0,3b10efac241247907da1969516918327fdf07736fefefce9e8f33c60526e18a1,2024-09-03T20:57:32.607000
|
||||
CVE-2024-3958,0,0,d5a5e3b155f3063c251dfec6027d4759e62e1ec9e2382396e782467b23eef014,2024-08-29T15:50:33.257000
|
||||
CVE-2024-39580,0,1,7b8d8c1d6a50e1a41f04f40ce051ab7e1ce6498b4fc0291ba6041057f8315e70,2024-09-10T12:09:50.377000
|
||||
CVE-2024-39581,0,1,a76083afb037c0260be5ab45e82cedaa3e154405ad9ce330c14a297745767da4,2024-09-10T12:09:50.377000
|
||||
CVE-2024-39582,0,1,c0f1f765184c3de9ca8225b5d213c9b642e4764a4885d324cd00d423b614e2f7,2024-09-10T12:09:50.377000
|
||||
CVE-2024-39583,0,1,2595854d2609ec80581d5c8e20bd16c50016792474e66d9b02fb6dca96d2549d,2024-09-10T12:09:50.377000
|
||||
CVE-2024-39580,0,0,7b8d8c1d6a50e1a41f04f40ce051ab7e1ce6498b4fc0291ba6041057f8315e70,2024-09-10T12:09:50.377000
|
||||
CVE-2024-39581,0,0,a76083afb037c0260be5ab45e82cedaa3e154405ad9ce330c14a297745767da4,2024-09-10T12:09:50.377000
|
||||
CVE-2024-39582,0,0,c0f1f765184c3de9ca8225b5d213c9b642e4764a4885d324cd00d423b614e2f7,2024-09-10T12:09:50.377000
|
||||
CVE-2024-39583,0,0,2595854d2609ec80581d5c8e20bd16c50016792474e66d9b02fb6dca96d2549d,2024-09-10T12:09:50.377000
|
||||
CVE-2024-39584,0,0,1d0a6aff0073f4836d9654764326ceeb368acd09f92344e463ab3214871c70e5,2024-08-28T12:57:27.610000
|
||||
CVE-2024-39585,0,0,d477ac70d70122b93a30d70fba939fc56092d9a6275e57b99e3a0b2a412cd216,2024-09-06T12:08:04.550000
|
||||
CVE-2024-3959,0,0,1ce1302f5c536ae0ba1596a30e53c3274b88d91eb780326b1103788329e8cf86,2024-06-28T13:21:52.223000
|
||||
@ -256935,7 +256954,7 @@ CVE-2024-40604,0,0,96707551e8fc94b334085d5bf2926e369955211afc96673efa337699ead3d
|
||||
CVE-2024-40605,0,0,3b7d08be38342ed975d3a802af7734eccce4b6fa70dd407ef7f8c6cca68429e4,2024-07-09T16:09:30.277000
|
||||
CVE-2024-4061,0,0,3d64526f6b4051e690acf87533a742bc5fa8b9683de463655fd6184fe7fa5bfb,2024-05-21T12:37:59.687000
|
||||
CVE-2024-40614,0,0,5a8c90c94f1b0dc56355424420ebae65c618d536c580acb4e248f7802de2136c,2024-07-10T13:15:10.833000
|
||||
CVE-2024-40617,0,1,2efaf69feebd32907e47dcfdd1d9a6531eebf60e579d5726cae13557574657a9,2024-09-10T13:45:37.100000
|
||||
CVE-2024-40617,0,0,2efaf69feebd32907e47dcfdd1d9a6531eebf60e579d5726cae13557574657a9,2024-09-10T13:45:37.100000
|
||||
CVE-2024-40618,0,0,339cc634a42e8a7db54f4bb39e56482affa65b57dfd2765250a61f2e694456da,2024-07-12T16:12:00.597000
|
||||
CVE-2024-40619,0,0,71752a5fbb09ad3b98ad49ccde5e7b24e7278b9eb9f9bc361b3decfc42effc78,2024-08-15T13:01:10.150000
|
||||
CVE-2024-4062,0,0,695b7b6d53140e91ee1c447f6f5acafad0b73fbbd2558cb89ae9d4c0c7616ec0,2024-06-04T19:20:29.007000
|
||||
@ -257014,9 +257033,9 @@ CVE-2024-40742,0,0,a7b4d8a63cd84bbed8ae36225a2d630607182f2ae3b73228fc1ab3090889f
|
||||
CVE-2024-40743,0,0,4e2bb12b39654c0a7fc101446a81422e3ca7ab692f01d12e73f708088891a69c,2024-08-21T12:30:33.697000
|
||||
CVE-2024-4075,0,0,29d19ea935c989efa2e770180ba61eb06fe49f0b181d6d812a7498d3145b983a,2024-05-17T02:40:15.170000
|
||||
CVE-2024-40750,0,0,123c568c4a271c6bb023f9091df0f00fec1f937f3d0585148d7948581d7b9455,2024-07-11T13:06:13.187000
|
||||
CVE-2024-40754,0,1,62e463593f6e5d1d602a06f8ddff8731970c836281d49b94cd64fa4930736cf2,2024-09-10T12:09:50.377000
|
||||
CVE-2024-40754,0,1,1ec64db92f9c8a84c8628e1cdeeb1b227a772e83fb8bf52c0f582741174a2abb,2024-09-10T14:35:04.833000
|
||||
CVE-2024-4076,0,0,3600a7160ba6cb63d73da78d982aeb737757fd1783e0b44697873d9ae49c2d36,2024-08-01T13:59:24.073000
|
||||
CVE-2024-40764,0,0,ab85577e2cb5d9a786ef6b191ba8264da7952ad06ab8f1b0e070c99f55710d56,2024-08-01T13:58:00.227000
|
||||
CVE-2024-40764,0,1,1e75ed57cfb3afa3fa923571a9717a22e138728f5cce910126d5f1cc9418f1c7,2024-09-10T14:03:09.167000
|
||||
CVE-2024-40766,0,0,eff4b00cf0f55270aa38e0ff790e6ee6498c48000cd3eb1d26bf51c060a6a61b,2024-09-10T01:00:01.537000
|
||||
CVE-2024-40767,0,0,0f0f227d49db4f76a18af060eeadd57ea0ca5da0ccc7bd26ef12905f9453740a,2024-07-30T19:19:40.767000
|
||||
CVE-2024-4077,0,0,d4f08c4fa42913c8d00f3fecbe96233f1448e9383bf97ebcbeca4cc0f2c8ae2b,2024-04-25T13:18:02.660000
|
||||
@ -257307,7 +257326,7 @@ CVE-2024-41095,0,0,98a605be3304014b7bcfedec75080b0924875a65426f1c380d6fa3a9f53a5
|
||||
CVE-2024-41096,0,0,380b567efa67b77a71ed1fc29233b828e2a8544af931856ed913e8fdba3486fe,2024-09-08T08:15:12.540000
|
||||
CVE-2024-41097,0,0,8ffa9b9e856e2e1225333d7bfce6fb672cf2f57b102ea514cd3f552a0421fd70,2024-08-22T13:14:48.640000
|
||||
CVE-2024-41098,0,0,237dbea03703cdca512eadfee5b46e503b7d4deeacfff8f1388ee9743f950b5e,2024-09-04T12:15:04.447000
|
||||
CVE-2024-41107,0,0,915f86d966f5052f8f4738594970b5192d92a928e05127ecefed6fd25d76d731,2024-08-01T13:58:18.103000
|
||||
CVE-2024-41107,0,1,3cc2cd61d61c256eeeef8c80137c1bc0a5769f3fc77f5dc3448b5a46e98fa47f,2024-09-10T14:30:55.217000
|
||||
CVE-2024-41108,0,0,a789f7b30bfa16589037e73208bf53d149517f9d21b7a48a75aded9d6e98d22f,2024-09-05T16:27:50.103000
|
||||
CVE-2024-41109,0,0,6e64213670db8f08136c5da3a157b68e75923efed5e9eb7ffeadc18fa0a3ced8,2024-07-31T12:57:02.300000
|
||||
CVE-2024-4111,0,0,a3e4bcb39778569b3be84e8d38a6497dbc2fc6b5a3693d9cc21532b8df994ada,2024-06-04T19:20:29.827000
|
||||
@ -257351,8 +257370,8 @@ CVE-2024-41161,0,0,9b33361091df6923832caa53c78a9e46bbbedfd096d5512869c0f1eed0413
|
||||
CVE-2024-41162,0,0,e54fc1a9823f936d00354799974ba06adb4cc451d56f48d5711fb6c0d45b612e,2024-09-04T17:03:53.010000
|
||||
CVE-2024-41164,0,0,c5521af658e92e64cee6bd40535b27065e46248fed1bc5e43067dc57eef0c4d6,2024-08-19T18:39:06.157000
|
||||
CVE-2024-4117,0,0,439d2da59fd01a25f254df6698027149837f261eb1a16ba5752d7e62667d1bfc,2024-06-04T19:20:30.043000
|
||||
CVE-2024-41170,0,1,817fea013dbb80aba74cedd999d41f457edab776da0940277c0a8d6917a3fea3,2024-09-10T12:09:50.377000
|
||||
CVE-2024-41171,0,1,21e8211c0e8b04d22b03b4933a02a2ed4c14686c5cf3c857123c3bdfefc5823a,2024-09-10T12:09:50.377000
|
||||
CVE-2024-41170,0,0,817fea013dbb80aba74cedd999d41f457edab776da0940277c0a8d6917a3fea3,2024-09-10T12:09:50.377000
|
||||
CVE-2024-41171,0,0,21e8211c0e8b04d22b03b4933a02a2ed4c14686c5cf3c857123c3bdfefc5823a,2024-09-10T12:09:50.377000
|
||||
CVE-2024-41172,0,0,7f370211b6a2ed7e58844e8bf12bc0dae731f676537ceaaec3667e5da63dc1de,2024-08-07T20:16:45.237000
|
||||
CVE-2024-41173,0,0,a32d0d9cca7b111b26d35b49c29c3c8130c1f7828fce2b3badc03095e7e93d7f,2024-08-27T13:01:37.913000
|
||||
CVE-2024-41174,0,0,a822cde4328796519e509a3e4c690c9e9350782e4bad75b387a246a5f3be44f1,2024-08-27T13:01:37.913000
|
||||
@ -257596,8 +257615,8 @@ CVE-2024-41720,0,0,2d7bee1f981165f1c9cbab9643ce597269a916a15ed0d381724ec0dadf39a
|
||||
CVE-2024-41723,0,0,2fd6c172462641b542f047f7ff3bf2247bdc5b8b5f34ce988c43b2bfe1795c68,2024-08-20T19:26:24.033000
|
||||
CVE-2024-41726,0,0,e325c72cd77b10fa79a0c73cd0bce9d67f9472d40dd3ab04f6437f9f2b06b815,2024-08-01T13:59:09.707000
|
||||
CVE-2024-41727,0,0,f64de623c1f3cae418235db50af8da33c1315446224a7b8505bd8fc5343d1bad,2024-08-20T19:25:12.490000
|
||||
CVE-2024-41728,0,1,a44236b8b8381750bb6b36d92fffe5b7b52d9e26a485ce4cee57ecc37824df44,2024-09-10T12:09:50.377000
|
||||
CVE-2024-41729,0,1,d9349e4b0c516aa096dba9dc989576fef69f0da894dceaf82929700fdd5be9c4,2024-09-10T12:09:50.377000
|
||||
CVE-2024-41728,0,0,a44236b8b8381750bb6b36d92fffe5b7b52d9e26a485ce4cee57ecc37824df44,2024-09-10T12:09:50.377000
|
||||
CVE-2024-41729,0,0,d9349e4b0c516aa096dba9dc989576fef69f0da894dceaf82929700fdd5be9c4,2024-09-10T12:09:50.377000
|
||||
CVE-2024-4173,0,0,47f39f3e8e603eac743ed4815cd724decf015716a2f0d9c17daf4d8fa3affc2d,2024-04-25T23:15:47.240000
|
||||
CVE-2024-41730,0,0,c3a91737f2e086c1acf47dd27a2418a435b72c75c0ef95092d81c10a62890c2b,2024-08-13T12:58:25.437000
|
||||
CVE-2024-41731,0,0,d5e6b6d25037e68a1f79c484f53ff7d64e1c1ae1a43b0c3615ae42e47ee6cc50,2024-08-13T12:58:25.437000
|
||||
@ -258042,8 +258061,8 @@ CVE-2024-42340,0,0,708aac03ef44aeea471e9a045b752e905888f9d429c0c9806a766c67411a6
|
||||
CVE-2024-42341,0,0,234d9ee0d2444d0f626546c3e75285abadcc74d0ab9516ab0f8349b21637c96a,2024-09-09T13:03:38.303000
|
||||
CVE-2024-42342,0,0,54f316c3acda489d4f5402e147c2f368362071c79662dc92c6705a36381091a9,2024-09-09T13:03:38.303000
|
||||
CVE-2024-42343,0,0,7ede109c28f5f3cebcd81363a812aca5202eed2bcb3b73c15fbe079b521efbdc,2024-09-09T13:03:38.303000
|
||||
CVE-2024-42344,0,1,a5ef6ee85375265ef6c37db842d194def2525a424f7581fd20c1b467ec204227,2024-09-10T12:09:50.377000
|
||||
CVE-2024-42345,0,1,9a28cd44aa06490aed35f23da931ef5d48021ca50f93ec8060a066d281aba8d9,2024-09-10T12:09:50.377000
|
||||
CVE-2024-42344,0,0,a5ef6ee85375265ef6c37db842d194def2525a424f7581fd20c1b467ec204227,2024-09-10T12:09:50.377000
|
||||
CVE-2024-42345,0,0,9a28cd44aa06490aed35f23da931ef5d48021ca50f93ec8060a066d281aba8d9,2024-09-10T12:09:50.377000
|
||||
CVE-2024-42347,0,0,9d56c3d6f460e2251d08d50a3e874b7efeb364cadb050367418d1be0b31e15cb,2024-08-12T18:52:08.163000
|
||||
CVE-2024-42348,0,0,9049ba06c12fadbe924de4e1d7650091813be7f3a3306b9434f7ebd8620eed32,2024-08-05T12:41:45.957000
|
||||
CVE-2024-42349,0,0,7c83a1a3a31095b7c061367c56e1e2185d3951ede9de2f7c2b93de97074131bc,2024-08-05T12:41:45.957000
|
||||
@ -258069,16 +258088,16 @@ CVE-2024-42368,0,0,de4f48ab04f32dd7f3db383df19cc416867f89e8ecae60c2fdd0bef001ee0
|
||||
CVE-2024-42369,0,0,2db0203d9e1c9ed86d7e5fe91c7527c5d07f66504aa58aae16d195697c2bea11,2024-08-21T16:01:03.147000
|
||||
CVE-2024-4237,0,0,c38818d0c288b1eec57a9be9e655b05254cb3f3487787a1ecd91e69d9c20b38c,2024-05-17T02:40:19.580000
|
||||
CVE-2024-42370,0,0,62e839a91edcd64bb21dabf32c60522dd52dc9540883662a6d8c03c0ecbecadd,2024-08-12T13:41:36.517000
|
||||
CVE-2024-42371,0,1,f8671ba77e17492262f6b6323bd0f75755bc55999a70f1247a3b42a51bbd5e7a,2024-09-10T12:09:50.377000
|
||||
CVE-2024-42371,0,0,f8671ba77e17492262f6b6323bd0f75755bc55999a70f1247a3b42a51bbd5e7a,2024-09-10T12:09:50.377000
|
||||
CVE-2024-42373,0,0,295f57d389a740d58ca7f1197ba4847ae8998d712f5bf5435ce1e4024bfbdcde,2024-08-13T12:58:25.437000
|
||||
CVE-2024-42374,0,0,fbac271476e1e2a5530eb62b051d58c9133aff05c9b2fa9d3a5620c40d2acb9c,2024-08-13T12:58:25.437000
|
||||
CVE-2024-42375,0,0,e9725b5004889e50f9a6ac1c59e56febb5ad276cb9a721fc0c08aaaf3ebec84e,2024-08-13T12:58:25.437000
|
||||
CVE-2024-42376,0,0,c4f07b2c8269cb92583efc852c36ba8aba70348295a5eb2d011adc15b060ded0,2024-08-13T12:58:25.437000
|
||||
CVE-2024-42377,0,0,4524d9cd87be67a4dc2034064ca6271f613fad79df3daac39c5631e6926975fc,2024-08-13T12:58:25.437000
|
||||
CVE-2024-42378,0,1,ed3c29cd04dad91d13a86cdbb0dce43700fdc4ea711c91735e1103cb6c6b554c,2024-09-10T12:09:50.377000
|
||||
CVE-2024-42378,0,0,ed3c29cd04dad91d13a86cdbb0dce43700fdc4ea711c91735e1103cb6c6b554c,2024-09-10T12:09:50.377000
|
||||
CVE-2024-42379,0,0,3df4e462d3527273fa2a98871af6d02d089a425040231b6521435b06449dcc55,2024-08-30T20:15:07.623000
|
||||
CVE-2024-4238,0,0,188cceccdce16b8df034bef32fee010a6dd0f801c6690e1589421c7cadfb521c,2024-06-04T19:20:33.063000
|
||||
CVE-2024-42380,0,1,5abd276ef303a0a04718583183567bd8e789e2a4185f71fabf777d854e3f8a5a,2024-09-10T12:09:50.377000
|
||||
CVE-2024-42380,0,0,5abd276ef303a0a04718583183567bd8e789e2a4185f71fabf777d854e3f8a5a,2024-09-10T12:09:50.377000
|
||||
CVE-2024-42381,0,0,a5fa1277b5fe346d1dd5469d0c93ac780c7d0547ab1d06a7617c27606bb89aa8,2024-08-01T13:59:22.207000
|
||||
CVE-2024-4239,0,0,cecc2be82896f12bf6cdae75a3b125d58c075d387f3da865cfaf565a2c454897,2024-06-04T19:20:33.163000
|
||||
CVE-2024-42393,0,0,dccd6d06051b1376b790b00ce1bb00ad00ff605de076bb7cd98815c096883960,2024-08-12T18:22:45.023000
|
||||
@ -258097,9 +258116,10 @@ CVE-2024-42412,0,0,7ea410a30890f641de68bc8b7a39cf35396bac17868b4fd498b764e1359ef
|
||||
CVE-2024-42416,0,0,0c0ba6b9334c7e838b8d455f49871ca47f5d5630f34ccb39214f945ba545086b,2024-09-05T21:25:09.273000
|
||||
CVE-2024-42418,0,0,1170a194d58fc93f3e0e1a535dff12de506530448528f0fff3eaea817d001f8b,2024-09-04T18:22:22.583000
|
||||
CVE-2024-4242,0,0,9c58e9b9e77452c845f3c5179c3be4415982efd0430d3da14ab0345d444eccfb,2024-06-04T19:20:33.363000
|
||||
CVE-2024-42424,0,1,a3a79ec5b3f9e4721afc9742622d2616be4d7445c5c0aff9b4256e4bf8fbae09,2024-09-10T12:09:50.377000
|
||||
CVE-2024-42425,0,1,382cc8e565d2a98d2548f08ae30eee3ae7aae5384bf46c3c9ad178238f9ed1c4,2024-09-10T12:09:50.377000
|
||||
CVE-2024-42427,0,1,797fec3f43dde9bef9764402c828d38ab5282805ee2c08e5a3c6c940ac6a4735,2024-09-10T12:09:50.377000
|
||||
CVE-2024-42423,1,1,30b3bf35bc3223d3e12ec4c9ee1f4a008e6825b53850efef1faaa99b0b89cdb5,2024-09-10T15:50:47.237000
|
||||
CVE-2024-42424,0,0,a3a79ec5b3f9e4721afc9742622d2616be4d7445c5c0aff9b4256e4bf8fbae09,2024-09-10T12:09:50.377000
|
||||
CVE-2024-42425,0,0,382cc8e565d2a98d2548f08ae30eee3ae7aae5384bf46c3c9ad178238f9ed1c4,2024-09-10T12:09:50.377000
|
||||
CVE-2024-42427,0,0,797fec3f43dde9bef9764402c828d38ab5282805ee2c08e5a3c6c940ac6a4735,2024-09-10T12:09:50.377000
|
||||
CVE-2024-4243,0,0,d19512e4db8434daba47c490442c83df13ecbcadaf4fb9c501fe6a2c921256d5,2024-06-04T19:20:33.497000
|
||||
CVE-2024-42434,0,0,e55ec0343b5bf13510bf079266ea96be4a27a72a2b479971039dc705ceccc43c,2024-09-04T21:35:50.963000
|
||||
CVE-2024-42435,0,0,cb81ae05b6c53e011856448307845a07a836fbccf1f7098de171ed65bbb54190,2024-09-04T21:36:53.027000
|
||||
@ -258152,7 +258172,7 @@ CVE-2024-42493,0,0,62acde285327354a8bf885be4a4449e2ac155d363ca62a755a0d6560a4377
|
||||
CVE-2024-42495,0,0,ec6874fdfc9b12ec8ef1020de6e62e8d7226ab1ffee9b169624f6e5854e0042e,2024-09-06T12:08:04.550000
|
||||
CVE-2024-42497,0,0,262b8d15cef13f44f6c11c9732e86216b599547f262ceb2ec772c87233738fc0,2024-08-23T16:18:28.547000
|
||||
CVE-2024-4250,0,0,29d8096febeb47af7a705b5c5f44b0e0121b5483d3074c39ff1bff1155e9a3a5,2024-06-04T19:20:34.200000
|
||||
CVE-2024-42500,0,1,f0bcaea9090b49f77db24a21554ec397886059105966434018e3d2adca5c9151,2024-09-10T12:09:50.377000
|
||||
CVE-2024-42500,0,0,f0bcaea9090b49f77db24a21554ec397886059105966434018e3d2adca5c9151,2024-09-10T12:09:50.377000
|
||||
CVE-2024-4251,0,0,4911c8bef2a1e60ace7e3694403733ed66cd48ed80870211c4240e0e24584389,2024-06-04T19:20:34.297000
|
||||
CVE-2024-4252,0,0,9237a844d9d9b4c175441eb52c39ce07fc14167f47531df4616e5c1079e2e93b,2024-05-17T02:40:21.053000
|
||||
CVE-2024-42520,0,0,64dffe6569e4f4099d9df2249ffa95a5cd3b2fdfe3c5c543c43632b62f26d14c,2024-08-13T15:35:16.110000
|
||||
@ -258244,7 +258264,7 @@ CVE-2024-42637,0,0,91efd00f3a0c93af0bfc6d360416502bb044589161185dddb1564bcf24f65
|
||||
CVE-2024-42638,0,0,ed21fbfbf0a099487e1d23be5afcb3890c0ca65bc6a1c9bd504262d4c994aa51,2024-08-19T13:00:23.117000
|
||||
CVE-2024-42639,0,0,1a5c2259211b7b8d7a3c9ad7a85700d339edaffc744195b682680689ea5c39c4,2024-08-19T18:35:13.310000
|
||||
CVE-2024-4264,0,0,aceade487dcdf82d5a23a178a070b3c07d4cce69337175854977fa24341a320c,2024-05-20T13:00:34.807000
|
||||
CVE-2024-42642,0,1,368dc5dc34a16a5f055bfb8f43121adeaf05034c9b1b73657cc5e8228e1781ec,2024-09-10T13:46:25.733000
|
||||
CVE-2024-42642,0,0,368dc5dc34a16a5f055bfb8f43121adeaf05034c9b1b73657cc5e8228e1781ec,2024-09-10T13:46:25.733000
|
||||
CVE-2024-4265,0,0,674cb78ce8c95e07c05495b52772b5d4a079c608362a6e67c2dfb567e6b8517a,2024-05-02T18:00:37.360000
|
||||
CVE-2024-42657,0,0,7a9e5456dd66d94be3a75e811d67a1de5788317e788930f1ba2e8b5887d23144,2024-08-20T16:13:12.413000
|
||||
CVE-2024-42658,0,0,54060235edd9bcf5ce68f6b48efde0940a62552fb8b9f2dcc8d06d163b4ded88,2024-08-20T16:12:50.290000
|
||||
@ -258282,7 +258302,7 @@ CVE-2024-4275,0,0,c229bc373f94c5248df137d0b0d9ca9d61bf79f845040a419335cc081cba5e
|
||||
CVE-2024-42756,0,0,ce5af71546f0263f395c227c3cfac6fe59ce60f8865d3d0ed46c37703f4af301,2024-08-27T15:35:17.887000
|
||||
CVE-2024-42757,0,0,7f6ba25a82908bfc7acb20e761fdbba6f23f597232f39843fc1cc43949e3074d,2024-08-20T15:35:25.190000
|
||||
CVE-2024-42758,0,0,78591070e9343c09b0ea814d5b331b967691862f9b02d6e8c624fb011530a86d,2024-08-19T18:35:14.237000
|
||||
CVE-2024-42759,0,1,8baf2780645f0b758463151059109a06646f1d6bfa31875159f99096b723a859,2024-09-10T12:09:50.377000
|
||||
CVE-2024-42759,0,0,8baf2780645f0b758463151059109a06646f1d6bfa31875159f99096b723a859,2024-09-10T12:09:50.377000
|
||||
CVE-2024-42761,0,0,33c8e57e29c80d5ab961692c95c32ec38cca8789d3650f2c188fd350c643ff13,2024-08-23T16:18:28.547000
|
||||
CVE-2024-42762,0,0,72ec602fc53ee57aef43714af8d33108807c25cff9ab4122dccfb6373af1e78c,2024-08-23T16:18:28.547000
|
||||
CVE-2024-42763,0,0,a111402090b60e50fe4bee869a5fbabeff40957f7ec249ab20f07b5214e58d6c,2024-08-23T17:35:06.477000
|
||||
@ -258622,16 +258642,16 @@ CVE-2024-43378,0,0,b201eb55fcf5e1b333e5fc1b76defa675188abfea665e05ed68f738cfa202
|
||||
CVE-2024-43379,0,0,d3e4b3238a29f3c9bcdc737c17326972a39574f3fe6ee0181683ddcdcc0798d3,2024-08-21T12:37:22.800000
|
||||
CVE-2024-43380,0,0,3bb4c505eaa2eb4e3ea37c153951df14b4a7ccb63e07a242ed00a1ab77df3585,2024-08-21T12:38:00.247000
|
||||
CVE-2024-43381,0,0,cc3e0e73c6c6a5ab5687bfa997bff6ae33e38e4614aa8ff20ebd73e189ada3b7,2024-08-19T13:00:23.117000
|
||||
CVE-2024-43385,0,1,f44d651a29aed8a2344806b9cc38f842d74cc8c9f1e466f0715c1be293cc4ac4,2024-09-10T12:09:50.377000
|
||||
CVE-2024-43386,0,1,91576e0237baa758243bbb240f99fbb47043ee2aeca088ec84fa1c90c5bc94b5,2024-09-10T12:09:50.377000
|
||||
CVE-2024-43387,0,1,a4da21130575cf31000ee0520fabd5e6581c9b0f1ed097b7050ada0508069518,2024-09-10T12:09:50.377000
|
||||
CVE-2024-43388,0,1,cd8579a0d23003ba7916b304be433d28b78ffd04f4ba2c3fdf5ae23ccf0ab82b,2024-09-10T12:09:50.377000
|
||||
CVE-2024-43389,0,1,e5b9041b8b43357fd7d5962c0f0f5e0df9172086ccc704b87c0e14af763db5f7,2024-09-10T12:09:50.377000
|
||||
CVE-2024-43385,0,0,f44d651a29aed8a2344806b9cc38f842d74cc8c9f1e466f0715c1be293cc4ac4,2024-09-10T12:09:50.377000
|
||||
CVE-2024-43386,0,0,91576e0237baa758243bbb240f99fbb47043ee2aeca088ec84fa1c90c5bc94b5,2024-09-10T12:09:50.377000
|
||||
CVE-2024-43387,0,0,a4da21130575cf31000ee0520fabd5e6581c9b0f1ed097b7050ada0508069518,2024-09-10T12:09:50.377000
|
||||
CVE-2024-43388,0,0,cd8579a0d23003ba7916b304be433d28b78ffd04f4ba2c3fdf5ae23ccf0ab82b,2024-09-10T12:09:50.377000
|
||||
CVE-2024-43389,0,0,e5b9041b8b43357fd7d5962c0f0f5e0df9172086ccc704b87c0e14af763db5f7,2024-09-10T12:09:50.377000
|
||||
CVE-2024-4339,0,0,240ed7230e0a6e458ae0cd6534f1dc024d6c16f3537e0357643e823e6aa09596,2024-05-14T16:11:39.510000
|
||||
CVE-2024-43390,0,1,2918e060d0b1f4999190dc6da30d3c9ecea2dd943dc26f54c3a910cfd1f6bd5c,2024-09-10T12:09:50.377000
|
||||
CVE-2024-43391,0,1,c8b82cc732101adab9a24cfc0ac4fb152b73d46d1795ca6deb817a5ae5109788,2024-09-10T12:09:50.377000
|
||||
CVE-2024-43392,0,1,328ac81d778f6fc05fb77953922af4c887b8862a212ea694bd8bc0bb666fa060,2024-09-10T12:09:50.377000
|
||||
CVE-2024-43393,0,1,21884049d6623ec6e8e353bb47da9fa07d81807b7aff078c759819bdf232e9c9,2024-09-10T12:09:50.377000
|
||||
CVE-2024-43390,0,0,2918e060d0b1f4999190dc6da30d3c9ecea2dd943dc26f54c3a910cfd1f6bd5c,2024-09-10T12:09:50.377000
|
||||
CVE-2024-43391,0,0,c8b82cc732101adab9a24cfc0ac4fb152b73d46d1795ca6deb817a5ae5109788,2024-09-10T12:09:50.377000
|
||||
CVE-2024-43392,0,0,328ac81d778f6fc05fb77953922af4c887b8862a212ea694bd8bc0bb666fa060,2024-09-10T12:09:50.377000
|
||||
CVE-2024-43393,0,0,21884049d6623ec6e8e353bb47da9fa07d81807b7aff078c759819bdf232e9c9,2024-09-10T12:09:50.377000
|
||||
CVE-2024-43395,0,0,e2392bf6475b12db51f31adf2ecd9f40f62cf7ccf326ac732a93b8b209786a49,2024-08-19T13:00:23.117000
|
||||
CVE-2024-43396,0,0,d3e4db1d56053a512790a84d8c3ae6e21035877ac8c09fe39077f7231484b09e,2024-09-03T18:19:33.167000
|
||||
CVE-2024-43397,0,0,5caa94926889523c153ff1aaf47669fe6c71771da877710063b3b97c2bc5d0dc,2024-08-26T18:28:42.230000
|
||||
@ -258681,7 +258701,7 @@ CVE-2024-4361,0,0,59805155c6666ce54d8263fcaceec5e0fc128f8100df5fb2e590f4610d5a88
|
||||
CVE-2024-4362,0,0,16bcb3e7fd20cddcf2afd5e423805494786dbf969e82eb67d1ba08cf8ffd4c26,2024-05-22T12:46:53.887000
|
||||
CVE-2024-4363,0,0,2c7c654c7422e9473b7010560ae2a1c2e3350cf44cdf9b6cc5ffb58dc4446aff,2024-05-15T16:40:19.330000
|
||||
CVE-2024-4364,0,0,9332cb50f761fbdff3ec7a6ec045f13accb15b963b30845c4aa93399b834b7a1,2024-07-24T20:23:31.487000
|
||||
CVE-2024-43647,0,1,ee5840489343f77483691f4446146948d3f18b1595eba8d71ff6f621d4acd601,2024-09-10T12:09:50.377000
|
||||
CVE-2024-43647,0,0,ee5840489343f77483691f4446146948d3f18b1595eba8d71ff6f621d4acd601,2024-09-10T12:09:50.377000
|
||||
CVE-2024-4365,0,0,63c2db9b70aba81bf4acd057c8457c31612ae1811b001c9773701935bfb8f554,2024-05-24T01:15:30.977000
|
||||
CVE-2024-4366,0,0,bbfa79c99a69a6ab3a1454de708e5610ad18f6066e78d9171ac36b6f6e6eece9,2024-05-24T13:03:05.093000
|
||||
CVE-2024-4367,0,0,53b2562feb1cef4dfbc75c878e502bbc54b7cf80f87613aa8d663f88e3c74ce6,2024-06-10T17:16:33.380000
|
||||
@ -258704,7 +258724,7 @@ CVE-2024-43775,0,0,386009b272e00dd7e320eaa82eec20a93bfce64d4bcdb8a26930d34c6fe0d
|
||||
CVE-2024-43776,0,0,27e4419e8ce01901c27e76cb21d9618c21e34d6a14d012499c61adf6cf980a12,2024-09-04T12:27:40.113000
|
||||
CVE-2024-4378,0,0,09f9e04bae659373b82712486e7efa4baa3211e21ee904b68f572ef978953753,2024-05-24T01:15:30.977000
|
||||
CVE-2024-43780,0,0,5217ce0351fcb75bd7982f01c3d436316e02e5a2bb3d0e7b3ad2fd10f4519787,2024-08-23T16:18:28.547000
|
||||
CVE-2024-43781,0,1,fe4ff27a41c5a2d11128d539a346b2aa7ff5522b07e03c5290a837b9cf154eca,2024-09-10T12:09:50.377000
|
||||
CVE-2024-43781,0,0,fe4ff27a41c5a2d11128d539a346b2aa7ff5522b07e03c5290a837b9cf154eca,2024-09-10T12:09:50.377000
|
||||
CVE-2024-43782,0,0,ad31aa68786bd9fde8b1f273353ec992f123695e96de48dec8565f96d4b67b40,2024-08-23T16:18:28.547000
|
||||
CVE-2024-43783,0,0,8724094a2b26e7a1ebe936c2fff47341ed92df1d54128430c04a1c17c54e5dea,2024-08-27T18:33:14.247000
|
||||
CVE-2024-43785,0,0,865f9ddb4537abd892462a2be2c5b215baf0c6c5f01c60dc5f4805d59a23b528,2024-08-23T16:18:28.547000
|
||||
@ -258715,8 +258735,11 @@ CVE-2024-43790,0,0,c3cb5748c434505823d489a50a95032a1f25244b73b9e74701de9974c3846
|
||||
CVE-2024-43791,0,0,18a538447f1bfb3e89861cf1face98eaa416fbdf0215aa1ae07d7c4291ab5da0,2024-08-23T16:18:28.547000
|
||||
CVE-2024-43792,0,0,b68e8edf32a9774ca7956d98971b6e48a84222a074d5236fa04ca99723a43141,2024-09-03T12:59:02.453000
|
||||
CVE-2024-43794,0,0,012282e0e09ace65c9817dd3efc52ee0130360e07c8e8e9b08cf3adc91c29f00,2024-08-23T18:46:31.730000
|
||||
CVE-2024-43796,1,1,54b96855e5d63cdb349a0290c412f56c2ecc23a826df801184d24d561b0cca75,2024-09-10T15:50:47.237000
|
||||
CVE-2024-43797,0,0,49c9a973cc996682928c758b2e25b53418f3cc9cde12f87e23b31ad352f6dc89,2024-09-03T12:59:02.453000
|
||||
CVE-2024-43798,0,0,0f4c51b4b2459096a21f79a4c43df1119a11b4e9a3f2bc6fda3ce5410f7de574,2024-08-27T13:01:37.913000
|
||||
CVE-2024-43799,1,1,af76c7aa3b94b0b14d5d9e466cc1933152d17327d294917e27272fa9ad0f0a21,2024-09-10T15:50:47.237000
|
||||
CVE-2024-43800,1,1,a55f71a3c069e8f0a1159894cb1f54e39f7c3c435d5619036954e0ceff852803,2024-09-10T15:50:47.237000
|
||||
CVE-2024-43801,0,0,3057bc3523c59b7a2ce3a49766bca817655c19ea20647a6ae5a515942f4aa7c4,2024-09-03T12:59:02.453000
|
||||
CVE-2024-43802,0,0,e6e6b0823c543afdd24537863512362b0ca92682a64b51ee319640612d5e52b9,2024-08-27T13:02:05.683000
|
||||
CVE-2024-43803,0,0,0902a32771a2eb3f314cb6530d6efc037bbc19b3186a10ca173150ea252c919c,2024-09-03T19:40:46.783000
|
||||
@ -258892,24 +258915,24 @@ CVE-2024-4406,0,0,4d2edf89174eefb11c1e35948c69459d7b4d6dd1a09c10eb7a0704c1561ef9
|
||||
CVE-2024-44067,0,0,f6acc392be4d580c3750239c741db14e9e0b23cb38f1820ef772266e93e1673a,2024-08-20T20:35:34.497000
|
||||
CVE-2024-44069,0,0,2eb956dd06d71bb925b0fe816cbe078cd7c5c9a8647e07e8d081256cc543fa9f,2024-08-19T12:59:59.177000
|
||||
CVE-2024-44070,0,0,897c04ba9a67e5ea511bddee651919522720d2ac02cb9c6411d8cfecd25984e1,2024-08-30T16:19:49.587000
|
||||
CVE-2024-44072,0,1,d0bb4365ece5a085a3c8ca1cdec4791fa83a64d3795e8cea725a16d9b95589da,2024-09-10T12:09:50.377000
|
||||
CVE-2024-44072,0,0,d0bb4365ece5a085a3c8ca1cdec4791fa83a64d3795e8cea725a16d9b95589da,2024-09-10T12:09:50.377000
|
||||
CVE-2024-44073,0,0,de55f1c002ffa890fb79df1a9da58802af7cfd53cb9325cc406c6e277fabf47c,2024-09-06T17:35:17.523000
|
||||
CVE-2024-44076,0,0,d8ab474e3e0cd492e411ba495a07543359555360960989541af9d6ad1fd6855e,2024-08-21T12:33:42.487000
|
||||
CVE-2024-44082,0,0,eca3489830dade6ed42141e32f34d30f3f0c158d92e0366e9686c819b89d9a20,2024-09-06T15:15:13.180000
|
||||
CVE-2024-44083,0,0,0fbb97686726ee4d6be299ae185c5a7e6d7807c436d290993d1b41ed0119344c,2024-08-28T15:15:17.050000
|
||||
CVE-2024-44085,0,1,d77e1d739ea3d9631b6c624ef452cae05e4a2bcfc53683b35edb96ae4e5d9fa6,2024-09-10T12:09:50.377000
|
||||
CVE-2024-44087,0,1,9347ed429cee1548d21348e65950e40f41756fec3dfb3e096ea0331b40b59ec8,2024-09-10T12:09:50.377000
|
||||
CVE-2024-44085,0,1,388300037fdfaaf78c002cc7963ec532b366316a773d7512847e1899154e3e1a,2024-09-10T15:35:08.883000
|
||||
CVE-2024-44087,0,0,9347ed429cee1548d21348e65950e40f41756fec3dfb3e096ea0331b40b59ec8,2024-09-10T12:09:50.377000
|
||||
CVE-2024-4409,0,0,ef601ae22761768812ec6eb133885b7a6b08c5417903a944100f49b603e1172f,2024-05-24T13:03:11.993000
|
||||
CVE-2024-4410,0,0,ca43b98286a78ab63b5139b50b93fc074ee9aec4c16e78097aa3514c43622322,2024-07-29T14:12:08.783000
|
||||
CVE-2024-4411,0,0,9d1b27ccac7555d95c6be5f4488ca4d9772a0570efc26fe6a3f3d131fd0aea06,2024-05-14T16:11:39.510000
|
||||
CVE-2024-44112,0,1,46e9052e9d2fbba9fe30caa56d92dbe146fc7379f395caf8a525d2f27da5bf55,2024-09-10T12:09:50.377000
|
||||
CVE-2024-44113,0,1,74d2cd3604829033f201ba9d0769b1dcbd2b028e1d8a51bacee7bb51b45ebac7,2024-09-10T12:09:50.377000
|
||||
CVE-2024-44114,0,1,2d147ef193009259efeb48ac87edb8bc62f4b744c0eb7ab2cbb4effe8bd094be,2024-09-10T12:09:50.377000
|
||||
CVE-2024-44115,0,1,2a30ea5add688d45659eca100982c864d46c6ddd00dc5e9bc49831df26f18590,2024-09-10T12:09:50.377000
|
||||
CVE-2024-44116,0,1,e864e012d0e5d96cbfc054f4369e58e067ed8cb636bcf383d653a5b759dea479,2024-09-10T12:09:50.377000
|
||||
CVE-2024-44117,0,1,f5e51fd4c1c072e4ebc183a03cfbd5abdf4c1e3554f96913f31f5eae6bad0fb1,2024-09-10T12:09:50.377000
|
||||
CVE-2024-44120,0,1,e512bb8c5b42763893890ed03b7785da148b231d68bd53abc475cbbb6b528a5f,2024-09-10T12:09:50.377000
|
||||
CVE-2024-44121,0,1,bad946f7ab72ac1b9d199f1a920dd1390631dbfc9489b17da06c05da204a16aa,2024-09-10T12:09:50.377000
|
||||
CVE-2024-44112,0,0,46e9052e9d2fbba9fe30caa56d92dbe146fc7379f395caf8a525d2f27da5bf55,2024-09-10T12:09:50.377000
|
||||
CVE-2024-44113,0,0,74d2cd3604829033f201ba9d0769b1dcbd2b028e1d8a51bacee7bb51b45ebac7,2024-09-10T12:09:50.377000
|
||||
CVE-2024-44114,0,0,2d147ef193009259efeb48ac87edb8bc62f4b744c0eb7ab2cbb4effe8bd094be,2024-09-10T12:09:50.377000
|
||||
CVE-2024-44115,0,0,2a30ea5add688d45659eca100982c864d46c6ddd00dc5e9bc49831df26f18590,2024-09-10T12:09:50.377000
|
||||
CVE-2024-44116,0,0,e864e012d0e5d96cbfc054f4369e58e067ed8cb636bcf383d653a5b759dea479,2024-09-10T12:09:50.377000
|
||||
CVE-2024-44117,0,0,f5e51fd4c1c072e4ebc183a03cfbd5abdf4c1e3554f96913f31f5eae6bad0fb1,2024-09-10T12:09:50.377000
|
||||
CVE-2024-44120,0,0,e512bb8c5b42763893890ed03b7785da148b231d68bd53abc475cbbb6b528a5f,2024-09-10T12:09:50.377000
|
||||
CVE-2024-44121,0,0,bad946f7ab72ac1b9d199f1a920dd1390631dbfc9489b17da06c05da204a16aa,2024-09-10T12:09:50.377000
|
||||
CVE-2024-4413,0,0,63e6df043fde5eb9cf937a1f1c34414009dec10f116b4c7a5421dbd8a403038d,2024-05-14T16:11:39.510000
|
||||
CVE-2024-4417,0,0,9b4dc22c7f1e74f381016fafb921403ecdaeb7b3b80aa5fc2130db180ef5935c,2024-05-14T16:11:39.510000
|
||||
CVE-2024-4418,0,0,da6c1eb4513de715971e2c985312b5242ea57c97376ea448b71f18893daf3366,2024-07-23T22:15:09.183000
|
||||
@ -258952,8 +258975,8 @@ CVE-2024-44401,0,0,ee2c4a2267c2b730b2023e7d052b9b36658db4f1e83370dcd2c9795a645f4
|
||||
CVE-2024-44402,0,0,b38946a6f0e5c6bfd13c5f46b6835ff57cc45dc65dbcc124685a3fc4210d5d2e,2024-09-06T21:35:15.770000
|
||||
CVE-2024-44408,0,0,79e6da73dfd60da300e8d621dc4645956a3af34e4d3870aab752a63a7e02ecfa,2024-09-06T21:35:17.720000
|
||||
CVE-2024-4441,0,0,ac0779300bad801b6c25a6a11418596c16f707acafd8505b85edf037d6de9dc4,2024-05-14T16:11:39.510000
|
||||
CVE-2024-44410,0,1,201e88b026e378d6fc8b1fccdb78fb3f81e6248f12dce27cfb4004fa242ea532,2024-09-10T12:09:50.377000
|
||||
CVE-2024-44411,0,1,95b64110e9e1d6b0a907a7fb23d3550629c5144750234617716051c6b057d9b4,2024-09-10T12:09:50.377000
|
||||
CVE-2024-44410,0,1,b43c60f7b585f1c4941676b71868fc93c33619415ada9dd18008c87df35d105a,2024-09-10T15:35:10.157000
|
||||
CVE-2024-44411,0,1,598fa2c90c1fcb2e76dc9bbaf4d1053ce6ab00db76daa7f3174af16794b4965c,2024-09-10T14:35:06.690000
|
||||
CVE-2024-4442,0,0,9c1eda6fa3435f8c4d08218c5481ff931fe1467531bf106c3f2c1021638ef5a8,2024-05-21T12:37:59.687000
|
||||
CVE-2024-4443,0,0,844cc6ae76fc91b0a9b2c7cc836e7c7382ecc4895f252d76709d68a22aac17cb,2024-05-22T12:46:53.887000
|
||||
CVE-2024-4444,0,0,b8ab3a280e1fea7a38298a9a71737680ed9a07734ba58de04ed034a8b48f0be8,2024-05-14T16:11:39.510000
|
||||
@ -259000,8 +259023,8 @@ CVE-2024-44716,0,0,063e41b42ec84a26fe3901d267f8097e94d2443a9dc25f00cc37c917e4db5
|
||||
CVE-2024-44717,0,0,4633d8ec58d1349f11ca257535d78e1a19dae6e8b84c1661ccc3922a9791eefb,2024-09-03T18:32:54.357000
|
||||
CVE-2024-44720,0,0,053a90257f8d5ecb229ff9b7c992f5d05fdabdf5c3f4e28e0c0e65b8ca217662,2024-09-09T18:30:12.050000
|
||||
CVE-2024-44721,0,0,8cdb8797de36b06745d362c014a0e65a6e0bd3802d52013f788bbe7711e2d3cf,2024-09-09T18:35:10.070000
|
||||
CVE-2024-44724,0,1,8275388c9a55c7b39cc91e96ee195961c5f04dd9487a0f8921294249f06340df,2024-09-10T12:09:50.377000
|
||||
CVE-2024-44725,0,1,a55d2d013099f06bab136286a0540186f6f582fe646bcd5f9a3d4c9c9074736c,2024-09-10T12:09:50.377000
|
||||
CVE-2024-44724,0,0,8275388c9a55c7b39cc91e96ee195961c5f04dd9487a0f8921294249f06340df,2024-09-10T12:09:50.377000
|
||||
CVE-2024-44725,0,0,a55d2d013099f06bab136286a0540186f6f582fe646bcd5f9a3d4c9c9074736c,2024-09-10T12:09:50.377000
|
||||
CVE-2024-44727,0,0,519c6edd63986291fddd28777499b5bf49fa3688edaaf8c8b5736fac2c095d2c,2024-09-06T13:15:09.567000
|
||||
CVE-2024-44728,0,0,cb7a7604dfcd48f9cda73a0c69d9a24576616f565cbb7b44a1dd956c1a2540eb,2024-09-06T13:23:23.743000
|
||||
CVE-2024-4473,0,0,8a0cf4a98efdbfb5770862e11c920028f2e3a9a43c44eb843685fb5ef0c3f72b,2024-05-14T19:17:55.627000
|
||||
@ -259043,11 +259066,12 @@ CVE-2024-44849,0,0,ce27bdf59af5d49dc0ddbfb4869cd4791b14d41bd57d8cf3964a27ab97b3f
|
||||
CVE-2024-4485,0,0,a27e77eb6786137f1ff33a4e5e44b17657a4b120ca60b51b6c6a25a52d6e7411,2024-05-24T13:03:05.093000
|
||||
CVE-2024-44859,0,0,361e21bdfe4afccedd32d666cb901903834fe5ed28d7a4a2b19923a7bb2e90ef,2024-09-05T12:53:21.110000
|
||||
CVE-2024-4486,0,0,ae6967e9ce7769ae98c2cf87c0bc0fbb14e19b3005ed8a961bec51e7089d074a,2024-05-24T01:15:30.977000
|
||||
CVE-2024-44867,1,1,a20505dfc27885f821f38717cd4d2214ced8aa552140d6974101cfd40c609232,2024-09-10T15:50:57.713000
|
||||
CVE-2024-4487,0,0,4ec04e3a5fad37f02884076b1172c7e1dd67ad4c891fc4fe04112b3c8765dc55,2024-05-14T16:11:39.510000
|
||||
CVE-2024-4488,0,0,1067ee59b8b50187d3b6e6dcedd09634fc158d8d3cf8abb63a1cced20ae50aeb,2024-06-11T18:09:34.110000
|
||||
CVE-2024-4489,0,0,982cbf89b6458fc8989b334c07bea5cd0f34b9af1a316c2d08ef53a4dd4e8b8f,2024-06-11T18:07:03.573000
|
||||
CVE-2024-4490,0,0,46d58037d58f18ff9df6b6b94f91d6beb02adec3983ce96102d15aba21f19fde,2024-05-14T16:11:39.510000
|
||||
CVE-2024-44902,0,1,82a75dcf039a91bdbacfdb8bdf0f5af729906cf83631d47765bed50a850b52bb,2024-09-10T12:09:50.377000
|
||||
CVE-2024-44902,0,0,82a75dcf039a91bdbacfdb8bdf0f5af729906cf83631d47765bed50a850b52bb,2024-09-10T12:09:50.377000
|
||||
CVE-2024-4491,0,0,fec0fa99feb905362d1059ae18d849f25d02b15efc10c179ce136112d1e08871,2024-06-04T19:20:38.950000
|
||||
CVE-2024-44913,0,0,332529f8a2f25e9795d6a65fec291670cc1d8fe0aef2e9fae357f99f95186d81,2024-08-30T16:01:54.347000
|
||||
CVE-2024-44914,0,0,874292f6168813ddf8fc9647fc65bfb40df31b19e1ea4a9fdcd89de1a66d420b,2024-08-30T16:01:45.013000
|
||||
@ -259148,7 +259172,7 @@ CVE-2024-45008,0,0,37dc0718d2dd8ba9fb7eca159ff733be9b954368896d4dc7e665604ee4c36
|
||||
CVE-2024-4501,0,0,3baebe0a469dd4bf55eae5f370777b6e334d89a3883f98b03d03b2205353433a,2024-06-04T19:20:39.640000
|
||||
CVE-2024-4502,0,0,f1f89a01c722d6ef2e85e855b85895e43fc279ff3a13e0257efd22aaa2b4c544,2024-06-04T19:20:39.747000
|
||||
CVE-2024-4503,0,0,580a13ae85da881d7284f0e9b163135d237ab58a854d76134955e6cc28d662e6,2024-06-04T19:20:39.843000
|
||||
CVE-2024-45032,0,1,9e9832070815f198bd13b47e9ba247da81e362143ea041571debdd67a5f9cbe7,2024-09-10T12:09:50.377000
|
||||
CVE-2024-45032,0,0,9e9832070815f198bd13b47e9ba247da81e362143ea041571debdd67a5f9cbe7,2024-09-10T12:09:50.377000
|
||||
CVE-2024-45034,0,0,6acf56312613a82c5715559f5b4f69be801ce2e626afadd3cfb4d0f3016179e1,2024-09-09T14:35:07.577000
|
||||
CVE-2024-45036,0,0,b93ba1b942c2a90c7150ffd72c683d09bcb868f6dc285088962d5acc53d2e2e4,2024-08-27T13:01:37.913000
|
||||
CVE-2024-45037,0,0,0a75dee24a9a0746d4b594073f73eebe38a0d6b0ee92331f507c53bf54c314fe,2024-08-28T12:57:39.090000
|
||||
@ -259158,6 +259182,7 @@ CVE-2024-4504,0,0,db7504bed7bbf326ed6569d421c20101dbf56fa9ab20eccbe7468f7c026f34
|
||||
CVE-2024-45040,0,0,66fa952a980adfe3c28c0b6707b447d68c76ae01c0168cd5a5130d4c4798d20c,2024-09-06T16:46:26.830000
|
||||
CVE-2024-45041,0,0,4b2522a1114d682e3b617a29f59e1ed0cf6b7c351080d3ffad0297be3ffda9a5,2024-09-09T18:30:12.050000
|
||||
CVE-2024-45043,0,0,813b7117a1d59d56cbce89ce53b65dfc1ca707523a63233a1be8257ae8cc6c73,2024-08-29T13:25:27.537000
|
||||
CVE-2024-45044,1,1,7e0a9df09ffdee678f160ca8ed11e406695ee34aef3ec228081761e188e89963,2024-09-10T15:50:47.237000
|
||||
CVE-2024-45045,0,0,c746f1c0e6db0596dc093f08d310bbebe72a6c977f5bda8337efa37c3e8dcc04,2024-09-03T15:13:16.580000
|
||||
CVE-2024-45046,0,0,de3e74d0bfabac0255c06ca581d92948e03ddaa7217a0f0cf71d9507430ac3e4,2024-09-04T17:32:51.960000
|
||||
CVE-2024-45047,0,0,a1da82ac1f65d14a1be76da83b1926cccb90ae619540a480a3bd67f0a0919428,2024-09-03T12:59:02.453000
|
||||
@ -259248,20 +259273,20 @@ CVE-2024-45265,0,0,0bfdc3ea11a3a8b692c725170390e0ed5e5bfa861ba7586668c7c78868fd4
|
||||
CVE-2024-45269,0,0,930c2dda66909b7393cc3daf8d8e0bcb8066c589d45124dd784354d0c2c32ffd,2024-09-04T11:49:36.950000
|
||||
CVE-2024-4527,0,0,c7ad79186f39af6c4287cf90f197f2ec298291b738fc5af7e4ddede8b4e9adfb,2024-06-04T19:20:41.810000
|
||||
CVE-2024-45270,0,0,c7af37af49333c30529c68858eecc171381f5cb95414149d25997e187a81c107,2024-09-04T11:51:30.887000
|
||||
CVE-2024-45279,0,1,d1e01ad73c7c0fcb7dd9f385faab2f84a1522d644234e290f3ff403f5eb9a4d9,2024-09-10T12:09:50.377000
|
||||
CVE-2024-45279,0,0,d1e01ad73c7c0fcb7dd9f385faab2f84a1522d644234e290f3ff403f5eb9a4d9,2024-09-10T12:09:50.377000
|
||||
CVE-2024-4528,0,0,7b720d00d965c73e07e6aefd4c36ac932b079840a05c5efc530ca8c4800fb595,2024-06-04T19:20:41.917000
|
||||
CVE-2024-45280,0,1,95185fad87ef89782ef20303875d1e67479f6c5b9be0dfe150b0d387302d1c9d,2024-09-10T12:09:50.377000
|
||||
CVE-2024-45281,0,1,4f2ade81d2de9a248b89bed024c68ca3f1f270cca613f61913da466a03b91409,2024-09-10T12:09:50.377000
|
||||
CVE-2024-45283,0,1,ce8f369ffea2eeffc8857e4ab9cb42ea251415aa793afc61b47185622611c31e,2024-09-10T12:09:50.377000
|
||||
CVE-2024-45284,0,1,ca1d56addf4d46503c4bb1131dd4827ad4650a2366176451f90717aebb949b1c,2024-09-10T12:09:50.377000
|
||||
CVE-2024-45285,0,1,432443f16f3bc2cd7fd6662743de8a85c2d23de3c5e8c63d8a475d82e46b6f7b,2024-09-10T12:09:50.377000
|
||||
CVE-2024-45286,0,1,8f2e1da507766dacf9e0cae8531253d3a4901ee6705aefce0b8c842c2e03783f,2024-09-10T12:09:50.377000
|
||||
CVE-2024-45280,0,0,95185fad87ef89782ef20303875d1e67479f6c5b9be0dfe150b0d387302d1c9d,2024-09-10T12:09:50.377000
|
||||
CVE-2024-45281,0,0,4f2ade81d2de9a248b89bed024c68ca3f1f270cca613f61913da466a03b91409,2024-09-10T12:09:50.377000
|
||||
CVE-2024-45283,0,0,ce8f369ffea2eeffc8857e4ab9cb42ea251415aa793afc61b47185622611c31e,2024-09-10T12:09:50.377000
|
||||
CVE-2024-45284,0,0,ca1d56addf4d46503c4bb1131dd4827ad4650a2366176451f90717aebb949b1c,2024-09-10T12:09:50.377000
|
||||
CVE-2024-45285,0,0,432443f16f3bc2cd7fd6662743de8a85c2d23de3c5e8c63d8a475d82e46b6f7b,2024-09-10T12:09:50.377000
|
||||
CVE-2024-45286,0,0,8f2e1da507766dacf9e0cae8531253d3a4901ee6705aefce0b8c842c2e03783f,2024-09-10T12:09:50.377000
|
||||
CVE-2024-45287,0,0,045bfb0d53167c55abd32c57163028c51920368f50e2cf76774839485016e81f,2024-09-06T16:26:26.303000
|
||||
CVE-2024-45288,0,0,955296d26f6688a711bb67949962e8bc8a5c80938f39e5cdb2e043fe3c66ded8,2024-09-05T14:35:25.337000
|
||||
CVE-2024-4529,0,0,5fbb4c14219ef7d51954458b7780a68dbee769876e9489db6e9ba34bd68834fa,2024-07-03T02:07:42.220000
|
||||
CVE-2024-45294,0,0,aea60512b4d24376f133c23c43cdb7817f0d718abc51286f2a286f4cb6d84051,2024-09-06T17:15:16.977000
|
||||
CVE-2024-45295,0,0,9cbcd7c9c4357757a60245b46b7ad7987cdeaebea00bcdcc3890fa90524c0282,2024-09-06T17:15:17.053000
|
||||
CVE-2024-45296,0,1,49181c4036a3982c1d4d8e879ccd14076733bcb79f94fe42ac7b08410afb4b40,2024-09-10T12:09:50.377000
|
||||
CVE-2024-45296,0,0,49181c4036a3982c1d4d8e879ccd14076733bcb79f94fe42ac7b08410afb4b40,2024-09-10T12:09:50.377000
|
||||
CVE-2024-45299,0,0,954c7c10e3e27d01c74d7dbf2e119ecf2e67338229cd2f4df8e5453ce4a4b5ce,2024-09-06T16:46:26.830000
|
||||
CVE-2024-4530,0,0,6b78f15ba2a60e96a20ff176cd49d228ee37f0e30a4b3e696092a717f8a23e27,2024-05-28T12:39:28.377000
|
||||
CVE-2024-45300,0,0,16b87f5c0983c10d96a860a768ea4f018c449876fdebfed42bf2eda57fdf4026,2024-09-06T16:46:26.830000
|
||||
@ -259279,6 +259304,7 @@ CVE-2024-45313,0,0,82e38f6d2921c3b3e9a238db6883354f1d86d2d1f780a332f8c54bf5a5667
|
||||
CVE-2024-45314,0,0,47c1d25a326359dbe89a889c7d5cd18acfac2ad247faa78128dabc37aa838fbc,2024-09-05T12:53:21.110000
|
||||
CVE-2024-4532,0,0,4fd2f02f0358f1c611846b77f1b0e80bcb1985e07f23fa6a21a71cc25593500a,2024-05-28T12:39:28.377000
|
||||
CVE-2024-45321,0,0,385b3d1e3bf54e8ae2af5d5796ef0b1ffaf17d58c18e0fbe7542c0dcea09b2e4,2024-09-06T22:30:19.337000
|
||||
CVE-2024-45323,1,1,bf6d6a90ce60904b71685f4c528b1a89b3acc23eb6b2486df987dee7a750f76a,2024-09-10T15:50:47.237000
|
||||
CVE-2024-4533,0,0,aca3a412ead1ce1343d6f498450801be5e059db6302d74881039b5fe75fb6c09,2024-05-28T12:39:28.377000
|
||||
CVE-2024-4534,0,0,527a3127a7586bdf18d80cd2b5b17fe74ac5ed6a2aa4ee562148173cc1d9d3e9,2024-08-09T19:35:09.923000
|
||||
CVE-2024-45346,0,0,2f7f906fa8e830e09f5dc1994b30102df77aeab36a86b7c31755a212ce377dbe,2024-08-29T03:15:05.247000
|
||||
@ -259292,6 +259318,7 @@ CVE-2024-4539,0,0,55abcbe26e411ca656e6a32a2a4f1ff2caad1b7d092df554c28514564a9256
|
||||
CVE-2024-45390,0,0,552de217ce6830ba871c9c4444e9d17668f4fb86d0fd26d9bec14a5af46ff6cd,2024-09-04T13:05:36.067000
|
||||
CVE-2024-45391,0,0,bcd1ff48c049f8020b0367bd01e9571666cfd39f40d6713a29e7f0bf84683f9f,2024-09-04T13:05:36.067000
|
||||
CVE-2024-45392,0,0,9fbc5e30fa3bc562debe7349b4449c2781517f74b4c1565d7b7acedf814cb2c0,2024-09-06T13:24:34.353000
|
||||
CVE-2024-45393,1,1,05aaf8d11e914c1e03cfa77d58a9c744953edac87b12c3a50872d950ab5096af,2024-09-10T15:50:47.237000
|
||||
CVE-2024-45394,0,0,08ec9b4da8385313bfb832f78d8af7837cae624eb03ec46e7ef7986e78008482,2024-09-04T13:05:36.067000
|
||||
CVE-2024-45395,0,0,e86751a06dbfe92039318153ae3e40334cccb8072cf74037173dfdb8955c4b2b,2024-09-05T12:53:21.110000
|
||||
CVE-2024-45399,0,0,a1cf7f5ebf189fb42f167aadd6e82f696503abfd38953cb1d8591d5d8cf1b025,2024-09-05T12:53:21.110000
|
||||
@ -259301,7 +259328,7 @@ CVE-2024-45401,0,0,00e33d6822b6a5e4f9d2ac4decdcbdc167c9f612991be6b054969245bd488
|
||||
CVE-2024-45405,0,0,e0983766e4b3d0668ba058c09b44bc2ee123196af9d88b08813ded0853cf5b2e,2024-09-06T16:46:26.830000
|
||||
CVE-2024-45406,0,0,1459ad14d7127012093360f5f159c85f3ceb60f90c63e19182240dfb68b6c8c4,2024-09-09T18:30:12.050000
|
||||
CVE-2024-4541,0,0,3195b1a81526d9da93cf28b1e1f763238ece2897561011f493b9a3c77f12398c,2024-06-20T12:44:01.637000
|
||||
CVE-2024-45411,0,1,73f9cc9a45fb9019dfacefd1c32caeadc6f839e3ee71584e1458f0e26c536208,2024-09-10T12:09:50.377000
|
||||
CVE-2024-45411,0,0,73f9cc9a45fb9019dfacefd1c32caeadc6f839e3ee71584e1458f0e26c536208,2024-09-10T12:09:50.377000
|
||||
CVE-2024-4542,0,0,188546ca483f93e7131261a5bd57b93b03491de5e62247759ac8c05b93c8f51b,2024-05-16T14:15:08.980000
|
||||
CVE-2024-45429,0,0,b6682f6c5fc95a0ea1e918cc9175ec1c4ba8aa26e7eab550751e1679316bee68,2024-09-05T12:53:21.110000
|
||||
CVE-2024-4543,0,0,cda17786b919b03cc3eee3c735d905916723b9b88a929a8c3a419843d78bdd6c,2024-07-03T18:23:54.237000
|
||||
@ -259329,7 +259356,7 @@ CVE-2024-45490,0,0,4a9544858f8ad52701885faaacc054b024c5e1d139687b3f21fcc2ee9f6ad
|
||||
CVE-2024-45491,0,0,e460156ea6419a80b45a0f265018e72555b70e117c8be4ee37cb347a447d976e,2024-09-04T14:28:33.953000
|
||||
CVE-2024-45492,0,0,073ca72c9147ce0bd071ae42dd069b817368a461c31ddb6a6a85b43c752a5921,2024-09-04T14:28:41.760000
|
||||
CVE-2024-45498,0,0,c0b73fd56e19fc295690d422c61db0b0a34ba9767e31b80f7a635220e3379808,2024-09-09T13:03:38.303000
|
||||
CVE-2024-45504,0,1,d1fb07a3228efd18f7c0af3faab016c97edb9e2da8e02dba547168a8c292ae66,2024-09-10T12:09:50.377000
|
||||
CVE-2024-45504,0,0,d1fb07a3228efd18f7c0af3faab016c97edb9e2da8e02dba547168a8c292ae66,2024-09-10T12:09:50.377000
|
||||
CVE-2024-45506,0,0,f825d7097befd0ec70ad07a8a6b4c2f13762a67e5f358f9d2ab15de2e8f395af,2024-09-05T14:39:49.807000
|
||||
CVE-2024-45507,0,0,b2cf0920dcb75db868de7b4afd51449cea360da72164b9b7e7a575176b0c17c4,2024-09-05T17:53:39.760000
|
||||
CVE-2024-45508,0,0,a7bf13ff5f2bf318e53d0cc8b12c1b5ac7eae45f1991e7b683a2e3673a166bb9,2024-09-04T16:44:08.247000
|
||||
@ -259377,7 +259404,7 @@ CVE-2024-4571,0,0,76823bb120333d1d68e24e57a18868a62bd826931cb118db3f1630877d1250
|
||||
CVE-2024-4572,0,0,6754f54e88e479a744a4367c8d1d2577fd697a90d0783dabcb9fc508df61090e,2024-05-14T15:44:06.153000
|
||||
CVE-2024-4574,0,0,5bc00996fe57104150ae610f292ff224de65f0948423aca3282fe7d917884520,2024-05-14T16:11:39.510000
|
||||
CVE-2024-4575,0,0,9d22d248e877183fb374174504fab6bfc500414f16c234b88b687abe10cd48be,2024-05-24T01:15:30.977000
|
||||
CVE-2024-45751,0,1,cc5d68fd09f5f304456a6be90ad821b34bc4a7f1a983b99ed7260cdb2141f184,2024-09-10T12:15:01.857000
|
||||
CVE-2024-45751,0,0,cc5d68fd09f5f304456a6be90ad821b34bc4a7f1a983b99ed7260cdb2141f184,2024-09-10T12:15:01.857000
|
||||
CVE-2024-45758,0,0,2ae57583ed5e6b6b71b00c8e123d728a65162c35712be784f078e8924fe4539a,2024-09-06T18:35:13.043000
|
||||
CVE-2024-4576,0,0,bef0c1eb81bb0f4c3eef72c993d9a673f04f17bc2d954741979507814d4ccd99,2024-07-02T14:41:30.777000
|
||||
CVE-2024-4577,0,0,b55cac970df35b2daf21f1bc20cfa9dd0965f08c49eae1007fc9a139f9980913,2024-08-14T19:23:47.253000
|
||||
@ -259389,7 +259416,7 @@ CVE-2024-4581,0,0,87f8fe03f507957c50ab3e12c65c26f01a42761aed681f779ccb3bf731c25c
|
||||
CVE-2024-4582,0,0,44a298c10fdfe0ab8acf9c943d89720dd7bed9fa14549ad9833d5c0a75c14780,2024-06-04T19:20:42.750000
|
||||
CVE-2024-4583,0,0,80422ff6020fca1720c5a88e28ab76aaa9a918b3afa6700e13782e64857c6739,2024-06-04T19:20:42.857000
|
||||
CVE-2024-4584,0,0,4d639afeee5354fec0a7cf3023bb849f2437d78f7cd875e4a49ac03b46b9ec82,2024-06-17T19:15:58.903000
|
||||
CVE-2024-45845,0,1,0521979d11ce58e29b1aab7dd0ec07f7d4afe66c22d65a1154395e6d94c9cae9,2024-09-10T12:09:50.377000
|
||||
CVE-2024-45845,0,1,4d1151a3b662098d77e53a9c7dae2a157920328f9101b07db6113969fbede812,2024-09-10T14:35:08.550000
|
||||
CVE-2024-4585,0,0,de8aae2cc9125c3a9e288fcbd9e609876eec68062d1a138bbd8e80f3513a89cb,2024-06-20T20:15:19.110000
|
||||
CVE-2024-4586,0,0,308ac0f257920a7bf6e50f46839419870b7e733c7917681ea48f64312191a5cb,2024-06-04T19:20:42.953000
|
||||
CVE-2024-4587,0,0,ccb551f2bab92e34c98709c8a5231b1e8778dd90f0d16bd4ac4c665438d47b6c,2024-06-04T19:20:43.057000
|
||||
@ -259411,7 +259438,7 @@ CVE-2024-4603,0,0,9adeb744a04b6e7c726b04f4a24faa6c0957c052c2ef086f262a131e3ba07c
|
||||
CVE-2024-4604,0,0,a39c956f080c616b17936b03ed62fbdee5080806b0deef5fc7741779c0bf0ec7,2024-06-27T12:47:19.847000
|
||||
CVE-2024-4605,0,0,cc5939dfa5bb0891c69db66e562cc6696594a6a88efe746332f5ec8ead5152ae,2024-05-14T16:11:39.510000
|
||||
CVE-2024-4606,0,0,f985d30934b7c1f8930bf2267fb972a68a7301f3b4fab17a99fda7060e053c79,2024-08-28T08:15:07.093000
|
||||
CVE-2024-4607,0,0,004e8eac2b665252b6f4f4efb9e0368d47cb2a0d5c21b51a504d30a58de38b18,2024-08-05T16:35:14.117000
|
||||
CVE-2024-4607,0,1,26d7fb8a60d9724fbac67d9d15e472fd268b8645ac384c2f62b0c7323928361f,2024-09-10T15:03:24.710000
|
||||
CVE-2024-4608,0,0,6b948b515db267f779f431dbe386ca01ccd7f50a9fc569455bb84149dca96357,2024-07-24T17:59:54.607000
|
||||
CVE-2024-4609,0,0,b6f3fd3db9085553e8d026a562774e21d6dc7bb2eb7a9a6cfeb43138546783c0,2024-05-17T18:36:31.297000
|
||||
CVE-2024-4610,0,0,43047990281e26a04055de4ace6574603f0b08f61a7727d9acdec64f6d8d9784,2024-08-14T17:06:24.800000
|
||||
@ -260259,7 +260286,7 @@ CVE-2024-5557,0,0,71e19027344115370537e5e9f2ac729a9013865b6ffe7632f9b652113dae47
|
||||
CVE-2024-5558,0,0,d7061155c6f430b38a1e769635e4eca1c24478e5beedfff7ff120ab1f85e7481,2024-07-25T20:00:25.773000
|
||||
CVE-2024-5559,0,0,ff51559fb7e7362b104a8f1f28895eef2d8f7eb659f926ae6c1cbfda694d488d,2024-08-23T16:35:30.827000
|
||||
CVE-2024-5560,0,0,002123ffc16696131d663e9c06724d8fb4501ef3ca4bc4191b4229c106e3346c,2024-07-25T19:59:58.017000
|
||||
CVE-2024-5561,0,0,2a408a8b1b7383cf34ad317b3bb3772c464e9faf10606b40e748b173c586e0ca,2024-09-09T13:03:38.303000
|
||||
CVE-2024-5561,0,1,82dc9c7a28558b655d3278268f7fefe112c6724d8ad6919886d73aaa7545bf00,2024-09-10T15:35:12.400000
|
||||
CVE-2024-5564,0,0,582ae8d6e013444879054c957a9f974e1fbdab4bea18417275b8c53698226d12,2024-07-19T16:15:03.193000
|
||||
CVE-2024-5565,0,0,e1d36fa68b4a73d6b78bd8eb39c3f27f14d8d32dc884b4fdfa0f8545d690e8d1,2024-07-03T02:09:05.567000
|
||||
CVE-2024-5566,0,0,5233947f09c3c6c0de3bbc1356e893f745531db8e2929187d54352e5877fee4e,2024-07-17T13:34:20.520000
|
||||
@ -260682,7 +260709,7 @@ CVE-2024-6084,0,0,6faa90c930997c0aec12adfd29df5cf00c8158d82ed8686290b073db2ac7ae
|
||||
CVE-2024-6085,0,0,e5356847d2f9e7fb365a9afe07e5899cc989c4ce949a989ba1a4d6bdfc914a39,2024-06-27T19:25:12.067000
|
||||
CVE-2024-6086,0,0,47215fd632ba621ffeef67af3acb9b5d4df100629d5a1e80c438d45f990f6540,2024-06-27T19:25:12.067000
|
||||
CVE-2024-6088,0,0,ed650bb4582239ce54305f8b10efe45d50e8cb6f1aa2aa30a6eb4b92f9ce96ee,2024-07-02T18:08:38.550000
|
||||
CVE-2024-6089,0,0,2e36ec68c046c195b7c2f86ee35013ba223063fb476a7c2f6d245a7b85cc69f4,2024-07-16T18:00:02.110000
|
||||
CVE-2024-6089,0,1,fa11ebbd3c2f4a5c1117ab55af0cf255d158d35dec5a0296617f7f6f3c04b619,2024-09-10T14:05:16.183000
|
||||
CVE-2024-6090,0,0,97ec0efad50117bd537daa7e8cf0d79ae16e3a9835d40dc90b67ac25a55b7eab,2024-06-27T19:25:12.067000
|
||||
CVE-2024-6094,0,0,c88417a3a0b84de6c71136c141990a312384401ffa03a26b016fd58bc4fbac2f,2024-08-01T14:00:11.220000
|
||||
CVE-2024-6095,0,0,1bbfd7c9b87c44d08a43ff0a5e8179e2c5df6e66e4cde292cf2d451628bbb0a8,2024-07-09T17:41:10.523000
|
||||
@ -260751,7 +260778,7 @@ CVE-2024-6169,0,0,5e3e4a526f2a4d49baf3eef5dd269238928a43ddd3f433b5eb67cd54677888
|
||||
CVE-2024-6170,0,0,ac5157d2a01994f30113ebfad64201af3c260777b3c9d326a82653d700efeb69,2024-07-12T14:20:01.013000
|
||||
CVE-2024-6171,0,0,cc3c7e2efac98c0e3bae2d0863061f06de152fc95e444a2b0790f9bcdb93cdc1,2024-07-12T14:40:02.843000
|
||||
CVE-2024-6172,0,0,772bb913ed7f683b9ada9dc0ecd54a374149383f55e758d624c0fb5be0b0bf4c,2024-07-03T18:00:01.770000
|
||||
CVE-2024-6173,0,1,e994d2565d1caebfbe48ca69861e0db03951e6613035bc78b94f870b7fa82cdf,2024-09-10T12:09:50.377000
|
||||
CVE-2024-6173,0,0,e994d2565d1caebfbe48ca69861e0db03951e6613035bc78b94f870b7fa82cdf,2024-09-10T12:09:50.377000
|
||||
CVE-2024-6175,0,0,eb9360cbb2782c1dffbbe4cdc22c0383ba7fa24583969fa1007fff7e487bb251,2024-07-18T12:28:43.707000
|
||||
CVE-2024-6176,0,0,1a872b8ffa43aa03ad69b3aab7b5781342b0397e6bd6a578bab967fc8754b3a9,2024-06-20T12:43:25.663000
|
||||
CVE-2024-6177,0,0,e51904c80961d41608903dd9ecba1a38d9527008f51a121ebd3747e18a611aea,2024-06-20T15:17:06.493000
|
||||
@ -260842,7 +260869,7 @@ CVE-2024-6278,0,0,44e714c26cb355fc7151b5bc59b1bd0ad888f3163c616812254e232f41e362
|
||||
CVE-2024-6279,0,0,13e2bebdf8f75f5bcea80028fb949946ceaffa8ad5d5cab73b12b8ae8b57c011,2024-09-09T17:20:45.137000
|
||||
CVE-2024-6280,0,0,53e9097fb099dd3ec6185a9b8b59575874e3b050c48e208cc0f20896ca10b944,2024-09-06T16:52:22.133000
|
||||
CVE-2024-6281,0,0,709a859f49498e3e71bff09d88107556f15663d7c1ae6811fce3a162e288bb4f,2024-07-22T13:00:53.287000
|
||||
CVE-2024-6282,1,1,e63d579703999c77ebc032cc57684d3fcd89800626957e2a1def1b249c923535,2024-09-10T12:15:02.137000
|
||||
CVE-2024-6282,0,1,5d0734f86b334725aba4e30a40c35d71595563528b9a1d4e0924687701e81732,2024-09-10T15:50:57.713000
|
||||
CVE-2024-6283,0,0,84796e0660e5beb3ad885e74e117108f941d8d6090497e3b6867080b852b92df,2024-06-28T13:37:44.763000
|
||||
CVE-2024-6284,0,0,73ccbe59cd13df171bbc79ab6b910254c728a7cb44133bad73b07b9d4dc26d5e,2024-07-05T12:55:51.367000
|
||||
CVE-2024-6285,0,0,4aa94975a6bb5a18c805d5376b856037574bf8fee823086f9b7bc28590de93c1,2024-06-26T14:24:38.113000
|
||||
@ -260898,7 +260925,7 @@ CVE-2024-6338,0,0,8956384d5cc966970e625ecbde4127bb4f84d940fa059b7aaed0155a833fd9
|
||||
CVE-2024-6339,0,0,900c18b99c3b938f801abc6ad5fe5a877c8e068ea7f11186df65574c46246a21,2024-08-21T12:30:33.697000
|
||||
CVE-2024-6340,0,0,fd12f25a45d92fefbb8c0ec47428250f4f56bb9c686a12a52e54d86e24fec10a,2024-07-03T18:27:40.903000
|
||||
CVE-2024-6341,0,0,528f4fdde1526d72477e90a767b2f2316b168f65b64effeddb9446d8a5cdcaf5,2024-07-02T18:15:03.900000
|
||||
CVE-2024-6342,0,1,fc4f36196431f464caa5a00be2d63e1b0b442bd3ad06196175f1330a8fdfe779,2024-09-10T12:09:50.377000
|
||||
CVE-2024-6342,0,0,fc4f36196431f464caa5a00be2d63e1b0b442bd3ad06196175f1330a8fdfe779,2024-09-10T12:09:50.377000
|
||||
CVE-2024-6343,0,0,38ac9303003845967860125853ac4494a8fe1ecd1fc8d7c1fa719ce9a13c5dc8,2024-09-05T14:35:34.780000
|
||||
CVE-2024-6344,0,0,ddc89c494afe0b7b80a518e0bed96070c096d29b8a0f403bdd242f60ce193de2,2024-06-27T00:15:13.360000
|
||||
CVE-2024-6345,0,0,fc166d5e44485020c9b016f580b4f1c78befbdae01a9e6ec8b7e6b8d01a2e1ea,2024-07-15T13:00:34.853000
|
||||
@ -261020,12 +261047,12 @@ CVE-2024-6499,0,0,692791d166e405b753065debb373657f70139bba5a26e85530dc737d8a19a2
|
||||
CVE-2024-6500,0,0,d6e17cf29259cccc059c07e88e123ff08e9fd8308cfe5e11844bc5a9a1491c18,2024-08-19T13:00:23.117000
|
||||
CVE-2024-6501,0,0,45d58d6fcd90c3b83531e796541078a549af17f7a81eb1fbfe7d6944aa2bc8ac,2024-07-11T13:06:13.187000
|
||||
CVE-2024-6502,0,0,4fc5956c8379dc1c951c1db7eac0edb9110d7a11b3cf96933cf800d394cd47c7,2024-08-23T16:18:28.547000
|
||||
CVE-2024-6504,0,1,6666bb3ba2314d1147da34b1413146555668de024ce515e1e34c91b1fe32472b,2024-09-10T13:53:28.387000
|
||||
CVE-2024-6504,0,0,6666bb3ba2314d1147da34b1413146555668de024ce515e1e34c91b1fe32472b,2024-09-10T13:53:28.387000
|
||||
CVE-2024-6505,0,0,b8708084cd092b6ca88acb18ad5e80f748f8e2829ec040b8958bfe3c1fee2cd6,2024-07-08T15:41:17.883000
|
||||
CVE-2024-6506,0,0,58310ca3e68e3dacb16dafd9b32db187bdf111a88d3da008267c8c84bbec48d6,2024-07-05T12:55:51.367000
|
||||
CVE-2024-6507,0,0,4e3b24fd61e25de66a6840473e4d19109a713188592b0f05efa1cbb9de33936e,2024-07-08T14:19:21.610000
|
||||
CVE-2024-6508,0,0,5773cbe3ab2c4eb69c1efc3c03d7ae03bdf5d1ca7c49c5fd875f2b2bd8e08dcb,2024-08-21T12:30:33.697000
|
||||
CVE-2024-6509,0,1,7eb4fc03788f01fd646b7975c190061926ae41b355a82f9aed0c1fc50ccfb715,2024-09-10T12:09:50.377000
|
||||
CVE-2024-6509,0,0,7eb4fc03788f01fd646b7975c190061926ae41b355a82f9aed0c1fc50ccfb715,2024-09-10T12:09:50.377000
|
||||
CVE-2024-6511,0,0,053f3089b06a0cd915df79eb3301836b5db5c9fe4d3ed571ee6923d36f4d1832,2024-07-05T12:55:51.367000
|
||||
CVE-2024-6513,0,0,bb977a38eaef5aa918756b3907c97d9805111d3bc118dcf2b0096d1bbd202aea,2024-07-04T16:15:03.103000
|
||||
CVE-2024-6518,0,0,7382529f36b9b37e0acec24889e25676a677588945f854438be53c4cb8bd58b0,2024-08-27T13:15:20.033000
|
||||
@ -261088,7 +261115,7 @@ CVE-2024-6588,0,0,67672e854c20766f2e15151fa1e111ec8310b7083a57f535c99159d2ce6e5a
|
||||
CVE-2024-6589,0,0,786a762dda95a3db4c9cdc907a3a2b97d61313e4f2473ece396d13a201bdbeba,2024-08-26T16:21:36.530000
|
||||
CVE-2024-6591,0,0,ba434f770e77a561bd09877a3c29228f51c9818a995d0175b55ef4d80494af35,2024-07-29T14:12:08.783000
|
||||
CVE-2024-6595,0,0,1592dd03cd1b2c459ee5de6a924fab7f4c8bad5124f72f8b639c71537346952d,2024-08-30T14:15:17.063000
|
||||
CVE-2024-6596,0,1,fbc52d4ad7cc3809cd1ad61f11ddbbe24543620b93977b9bbe0dc2fc14b26149,2024-09-10T12:09:50.377000
|
||||
CVE-2024-6596,0,0,fbc52d4ad7cc3809cd1ad61f11ddbbe24543620b93977b9bbe0dc2fc14b26149,2024-09-10T12:09:50.377000
|
||||
CVE-2024-6598,0,0,fb802128b1cfc176540749693b684b4374936099ab1c7948c1ec819266291908,2024-07-09T18:19:14.047000
|
||||
CVE-2024-6599,0,0,6a69a16a0a8781527f95db9310983c42c357e28a72f780fd79d80c9654364b86,2024-07-18T12:28:43.707000
|
||||
CVE-2024-6600,0,0,8a7bdd7b6969fa6cd69a1854f6f2130a9698184b9485e28b1c9cbb32470416d8,2024-07-16T18:15:08.737000
|
||||
@ -261235,9 +261262,9 @@ CVE-2024-6791,0,0,faa35dfb0f99d60a9ec7e01f64fb4fbd258b21c722ac3f7c1361230fa3f28b
|
||||
CVE-2024-6792,0,0,e783451886045e1eac6661fbc4d3996b753ddb1f8514839a73a972f104f2ef73,2024-09-06T13:35:02.020000
|
||||
CVE-2024-6793,0,0,c8a4a674c56a10e5c81707581c99cad157e4f6fe1de25e07f6d12654839c8bd5,2024-07-24T12:55:13.223000
|
||||
CVE-2024-6794,0,0,8d77d86d33801c3c5b2b30a4dcdc140fae6ce1a1801e3f754981cc410b96001c,2024-07-24T12:55:13.223000
|
||||
CVE-2024-6795,0,1,f47b6a5a33bcbbbefc22c1495b7a18cf0d4e93e05801eb8c6785077f1394a3a6,2024-09-10T12:09:50.377000
|
||||
CVE-2024-6796,0,1,6d5ec96f1c80635bc76860b3b93074afa788c7b69ce902c24d7ed7c2c91e9fc9,2024-09-10T12:09:50.377000
|
||||
CVE-2024-6799,0,0,4139a727efc5bbba878823dd77da7ecbccc0d31113ed4001d69cc00c0e6e86e7,2024-07-19T13:01:44.567000
|
||||
CVE-2024-6795,0,0,f47b6a5a33bcbbbefc22c1495b7a18cf0d4e93e05801eb8c6785077f1394a3a6,2024-09-10T12:09:50.377000
|
||||
CVE-2024-6796,0,0,6d5ec96f1c80635bc76860b3b93074afa788c7b69ce902c24d7ed7c2c91e9fc9,2024-09-10T12:09:50.377000
|
||||
CVE-2024-6799,0,1,39536c19a9ca2d6262efda14a231fbf09108e28ad2b189e8ce4347991001df6e,2024-09-10T15:05:48.583000
|
||||
CVE-2024-6800,0,0,a15298e35d6052e73a8ba7e320d06f1ae120c932f1a3656ad087f1be4be328b2,2024-08-22T15:15:17.127000
|
||||
CVE-2024-6801,0,0,6cf94e1980aea6fcc25b038d583cb2250e04ba4c9461d4d907e1f9ce16b1e09a,2024-07-19T14:55:25.753000
|
||||
CVE-2024-6802,0,0,41c45597ef2d2991d0ff5de1c94d34d596167540846175036f3a8eca13168f84,2024-08-26T05:15:05.980000
|
||||
@ -261275,7 +261302,7 @@ CVE-2024-6869,0,0,cc765e0741eb808a23e90ee3171ba570febcbdba6db7038c79938ac8aebc9b
|
||||
CVE-2024-6870,0,0,fdc9781daaba3083ba91ed61390ac3ea5e3a3c1deb45aa4706aee786b8d5379e,2024-08-22T12:48:02.790000
|
||||
CVE-2024-6872,0,0,9eb628e3a6d1ea0380e94dd099512f5a2f74ddb0ba75bf9a102e83ab13e260f5,2024-08-05T12:41:45.957000
|
||||
CVE-2024-6873,0,0,8e5db8bfa0491746f29814d1d8249a1850325cbcdbd09b52dbf90709e95d212c,2024-08-01T16:45:25.400000
|
||||
CVE-2024-6874,0,0,dbf80741a5dbaf69dfea3d6102d0d56a1052d5bac2fe6cc0bc24819c43cddd92,2024-08-01T14:00:45.683000
|
||||
CVE-2024-6874,0,1,805a0b27cbdf811d96209b292e2d5909e967f9d3161226db1f6fe45d6b995555,2024-09-10T15:27:04.190000
|
||||
CVE-2024-6879,0,0,6dd99f7574923c6a0220f28a1253b4ac8ff29b09a2650b86b7b021e79b9e4f08,2024-08-28T15:35:24.120000
|
||||
CVE-2024-6881,0,0,9eb1bb1325feedc0a442bcf6c20b4ef8c1194f18829a36ce47ae950cf638d18d,2024-08-27T11:15:04.740000
|
||||
CVE-2024-6883,0,0,17af31f8537d0ebfdcc29735e63f85da6d525c783f08d8df80e6d71ccea2f1ba,2024-08-21T12:30:33.697000
|
||||
@ -261320,7 +261347,7 @@ CVE-2024-6924,0,0,bbcacf88af2b0ae00d8670943e9b5c33e17b616aec8da8351ae30fc54a8541
|
||||
CVE-2024-6925,0,0,c5dcb5a15a3e00b708a97d3592e5640214567c9793f94ecb10d48bf9bb5011a2,2024-09-09T21:35:16.723000
|
||||
CVE-2024-6926,0,0,8f7a980eaebe48aff3a265873ac088d8aab7ac9e61e313ad47eb901f8ccee0e3,2024-09-04T15:35:26.253000
|
||||
CVE-2024-6927,0,0,e148b46f63346622a06f6186d016b89227da86b491e3aa4a6ce8be2d756e1768,2024-08-29T20:37:07.310000
|
||||
CVE-2024-6928,0,0,a5255803d07f7d516ba4dc802630104a14644cf49be36035f898fd3df018ae82,2024-09-09T13:03:38.303000
|
||||
CVE-2024-6928,0,1,04e0edb45267f653103b1b4b8ed00c7e0e3fce07f9c3ed23eb9bfbde1bd8f41d,2024-09-10T14:35:09.507000
|
||||
CVE-2024-6929,0,0,be8ff54e71c3dae7aaaebdfc2eb64ab807c47924b1857c6816d9c69c8ca6063c,2024-09-05T12:53:21.110000
|
||||
CVE-2024-6930,0,0,1339dcde2064efad12400b33b71bb10f58bb3894621d0a104ecb7e997db508bc,2024-08-08T20:06:49.207000
|
||||
CVE-2024-6932,0,0,67a8aa74150c82de9338c7f5e13237de6a0b3fc058478249ab687a9bbea18d6e,2024-07-22T13:00:31.330000
|
||||
@ -261367,7 +261394,7 @@ CVE-2024-6974,0,0,87e35dfa7758fb3e456f51ae7c2c1005342757b141d54c95c0eb015bf95a4e
|
||||
CVE-2024-6975,0,0,d63385a625ec15f0611b849f606ef80820f5aa79d2e921c6e99e1d59f30cf02e,2024-08-27T15:40:05.223000
|
||||
CVE-2024-6977,0,0,dced37193034395cbd70a15c25ae6f2fd108fd86d3d88b19be8a8af0292bdfe7,2024-08-27T15:41:15.443000
|
||||
CVE-2024-6978,0,0,37cb13cf871d0be71d7cccfe060430953b559d3b1fa288f5a4e9f8855fa3ca36,2024-08-27T16:17:54.077000
|
||||
CVE-2024-6979,0,1,c462ab441dc6fef278b8d322b06d9bbe90e009e07f8beeb96cea48ccdc45139d,2024-09-10T12:09:50.377000
|
||||
CVE-2024-6979,0,0,c462ab441dc6fef278b8d322b06d9bbe90e009e07f8beeb96cea48ccdc45139d,2024-09-10T12:09:50.377000
|
||||
CVE-2024-6980,0,0,f6625eb84b24e1b38c56cc3bb53a8be195d62bb4e9db2a7b8e6feb6123dc7610,2024-07-31T12:57:02.300000
|
||||
CVE-2024-6984,0,0,b8a735678309db6c41dda49955522d6536b87529616b3c230cb8ef59ce9a0d3f,2024-07-29T16:21:52.517000
|
||||
CVE-2024-6987,0,0,330d8660e6c8d71a307c7f147e933f5e3b64b2ed81a202f0c00b33c60663824c,2024-08-08T13:04:18.753000
|
||||
@ -261543,7 +261570,7 @@ CVE-2024-7255,0,0,a4eb887a2aa91b61ced64af6faa636cef124d2fd1032af5abcd1e986918698
|
||||
CVE-2024-7256,0,0,28c6c5405ca0661376f4706f7e75647b14826bc648847c0c2ef29d4ee5bafea0,2024-08-03T18:35:04.003000
|
||||
CVE-2024-7257,0,0,e6ef266df52e25692b132cfb6522d79defb5eb3e548daae54be1d69b0c3ab16e,2024-08-05T12:41:45.957000
|
||||
CVE-2024-7258,0,0,7daa83813c091cf4943890cfcc79fb77dbec053060dc3ee1861fb34d4faa0557,2024-08-23T16:18:28.547000
|
||||
CVE-2024-7260,0,1,1e1f80636ac6402e8411c199d72bd976b167602aa1c6106249bcb3a6ff6e15f7,2024-09-10T12:09:50.377000
|
||||
CVE-2024-7260,0,0,1e1f80636ac6402e8411c199d72bd976b167602aa1c6106249bcb3a6ff6e15f7,2024-09-10T12:09:50.377000
|
||||
CVE-2024-7261,0,0,88fefc15b9eab7b2e919bd0caea05a9adad8b1510053f0adb03b22cb218cc2eb,2024-09-03T12:59:02.453000
|
||||
CVE-2024-7262,0,0,95b3d95a32b25a2634e7e0faa3f1f6b57a404f18277315b6dddbf2c940c189df,2024-09-05T13:30:33.680000
|
||||
CVE-2024-7263,0,0,9d6df8d57145d860b9f285c4defefe5eae42f914cf87b79ed3fa24860767bd90,2024-08-22T06:15:04.510000
|
||||
@ -261589,7 +261616,7 @@ CVE-2024-7311,0,0,b37b59792dd58cee524c8ffe58ffad74a44a459beeecd4500b7db56eb7cdda
|
||||
CVE-2024-7313,0,0,d7b0f37e48710e5f5a7b78ed26ce477c46ecddb143fdd8dc8ca6d6152120ce70,2024-08-26T18:35:13.207000
|
||||
CVE-2024-7314,0,0,c82905b3df334ceeb097c6861ab91c83e5d51eabc55ac571993838582b95803d,2024-08-05T12:41:45.957000
|
||||
CVE-2024-7317,0,0,d290990c88ffba5acfc4fa1e36f444dec67bc90a1513331480ff821c55d2a98f,2024-08-06T16:30:24.547000
|
||||
CVE-2024-7318,0,1,f09874cd7aabccf109b6b616f964ca583d92ddef6e5184a27f7c244dd00dffcb,2024-09-10T12:09:50.377000
|
||||
CVE-2024-7318,0,0,f09874cd7aabccf109b6b616f964ca583d92ddef6e5184a27f7c244dd00dffcb,2024-09-10T12:09:50.377000
|
||||
CVE-2024-7319,0,0,0bffe027bd25e9cd17fbce9beb09f62a0038f1a01ac652e5cacc1f14534c5492,2024-08-05T12:41:45.957000
|
||||
CVE-2024-7320,0,0,a6345ced50bd1b25dc54bd951c2133e1d51c039a215f4119dbfe976f4ac4ed65,2024-08-12T16:47:36.887000
|
||||
CVE-2024-7321,0,0,42cb7d687a3ea14a5f795d2e8dc1d36894e3cc4a44b6104596b7ddb427645e4e,2024-08-12T16:49:01.887000
|
||||
@ -261611,7 +261638,7 @@ CVE-2024-7337,0,0,bb4e29754f24508ee03646d09f02a9e9792b2bdc0b40ad3f742f7daf359e30
|
||||
CVE-2024-7338,0,0,40f9236687cb1fba08bae47e5bce5fdf8596baa7faf10b9e6c7a335576e73829,2024-08-09T14:51:45.677000
|
||||
CVE-2024-7339,0,0,57ec1e872e2326d7636a6cda3d278abfe9440d76240320c6c9e4335e8a941603,2024-08-23T16:53:31.643000
|
||||
CVE-2024-7340,0,0,a3f98c82759b3c1463da2160a8c456e9c18de4cdd89227049824622069589bfd,2024-08-01T14:01:07.677000
|
||||
CVE-2024-7341,0,1,05cbaf0bea6662cb6b38e82de68edc6d0cc65bbb67b89252d235d55beeeb630d,2024-09-10T12:09:50.377000
|
||||
CVE-2024-7341,0,0,05cbaf0bea6662cb6b38e82de68edc6d0cc65bbb67b89252d235d55beeeb630d,2024-09-10T12:09:50.377000
|
||||
CVE-2024-7342,0,0,92ad1e6857e9b0cace198602fda8e3b1ec6edbf7f40f7b078718810def4495b5,2024-08-15T18:40:22.537000
|
||||
CVE-2024-7343,0,0,b6b73fa45089899a04dcf5d8ab6e4cd843be4b35e1b528d7d577722e09cd2c25,2024-08-15T18:40:52.707000
|
||||
CVE-2024-7345,0,0,c89352b78a1b7efddda76024ace56eb1677600f94378ef8d33d34c3c91ac1800,2024-09-05T14:11:00.493000
|
||||
@ -261810,7 +261837,7 @@ CVE-2024-7613,0,0,595ae1d3f56b81eeb34ef1e184ddf7962f3a8fbfc042ff77a8fcf0bd3f10f2
|
||||
CVE-2024-7614,0,0,70ea68e630891f9909a0a8afd3fe5566dad840edc8df033b5c308064cf074a69,2024-08-21T18:48:47.273000
|
||||
CVE-2024-7615,0,0,bdb4e2a47bb0b635ad5424e7dee382fdbc667ab1983b9e7b4b79b80817773efa,2024-08-21T18:48:19.590000
|
||||
CVE-2024-7616,0,0,240142a7cf93711d379b14c2a6284d004fd0a2d1c674fc02d32efdd57aa3e2bd,2024-08-13T16:59:39.517000
|
||||
CVE-2024-7618,0,1,a6149ec34b2a8c7be413bc36f1943fe9aebcb6fe380868fee0becf4e0c41b606,2024-09-10T12:09:50.377000
|
||||
CVE-2024-7618,0,0,a6149ec34b2a8c7be413bc36f1943fe9aebcb6fe380868fee0becf4e0c41b606,2024-09-10T12:09:50.377000
|
||||
CVE-2024-7619,0,0,52e157835f9b49014d03653876a6177ba54feacc6eb580f7a52506ce1aa54bb3,2024-09-03T18:15:09.223000
|
||||
CVE-2024-7620,0,0,2469206363fd07a16a5de81f046bd6f1d56a8441f8330f436267f4dce05a3b0c,2024-09-09T13:03:38.303000
|
||||
CVE-2024-7621,0,0,07161284faa2eb0637370b6ff462e631787a37850cefb6ac5fa6750545dd7050,2024-08-12T13:41:36.517000
|
||||
@ -261841,7 +261868,7 @@ CVE-2024-7649,0,0,3d0b3905ac20943345a47479273aed49759614ef3fae3b2688335294d499ed
|
||||
CVE-2024-7651,0,0,386a7bb7aa0b4a32ced6fe813025ac2a231789f032ca2ee2a42adaaefdd20a30,2024-08-31T03:28:02.947000
|
||||
CVE-2024-7652,0,0,c7f694e385002b920efe17a183ba7538023c7cf88dd53a372f2912343dfa2405,2024-09-09T13:03:38.303000
|
||||
CVE-2024-7654,0,0,49383a5796e66ab6802124ac3212336a9fa34e97b446554c0840904b1dbfce6f,2024-09-05T13:53:16.540000
|
||||
CVE-2024-7655,0,1,f298cc9a9afea680a6796cf910ff4a570db8418f9a3558eeaf2eff77bb4e3b44,2024-09-10T12:09:50.377000
|
||||
CVE-2024-7655,0,0,f298cc9a9afea680a6796cf910ff4a570db8418f9a3558eeaf2eff77bb4e3b44,2024-09-10T12:09:50.377000
|
||||
CVE-2024-7656,0,0,54bddf4f1c99f206f2f263928ecdc7b2851230b8a0f25d44b79aae993350ca70,2024-08-26T12:47:20.187000
|
||||
CVE-2024-7657,0,0,b71ee6cae903ac873f30f4d097ac987c873f0095983bc9620eda1ffab659d5b8,2024-08-15T17:48:20.920000
|
||||
CVE-2024-7658,0,0,832a65f53a452b2fa1561cdaae82b94e5ac7d59bc491a09b3cdc773f704d8588,2024-08-13T17:00:19.800000
|
||||
@ -261875,8 +261902,8 @@ CVE-2024-7692,0,0,53a3a528e0e26eebc3a24b8375fbb7b9fd52b7aeb81816897422b7295867b4
|
||||
CVE-2024-7693,0,0,8f49e917567dbf3d83b8fab0c0f87defce06a4391222113e25ab3be3d08b6e06,2024-09-06T16:51:35.647000
|
||||
CVE-2024-7694,0,0,915a620e49de11e538187b87ae1859b4dd8b81a9c117898d10d07c783b69fb2e,2024-09-06T17:24:42.573000
|
||||
CVE-2024-7697,0,0,56fc87c2b950fc0d4b7d08c76bcec1377c688ea98c921a8e581bb6c082412bb3,2024-09-06T18:04:28.030000
|
||||
CVE-2024-7698,0,1,f3712135d1df79d7e27fa4c4c6104096ee019b8d2b0cd61845488f2835ff9eeb,2024-09-10T12:09:50.377000
|
||||
CVE-2024-7699,0,1,72b06587f38ad074e1e172a76007dca55e0aae951fcc370c220f50ce7ab480fe,2024-09-10T12:09:50.377000
|
||||
CVE-2024-7698,0,0,f3712135d1df79d7e27fa4c4c6104096ee019b8d2b0cd61845488f2835ff9eeb,2024-09-10T12:09:50.377000
|
||||
CVE-2024-7699,0,0,72b06587f38ad074e1e172a76007dca55e0aae951fcc370c220f50ce7ab480fe,2024-09-10T12:09:50.377000
|
||||
CVE-2024-7700,0,0,3e081f65a743f7c2243d16cda14609415c7128fbdf01790b4350a9589b48c796,2024-08-12T18:57:17.383000
|
||||
CVE-2024-7702,0,0,35104b2d835bcff771d3508b754ac4f00b960fb6fd0cdfa84ab47a794def21ca,2024-08-26T18:15:46.870000
|
||||
CVE-2024-7703,0,0,4fed134c1a88e3f28368f1aeb0423ea22cd742b65dcb7d77a318829e8e6bb6ba,2024-08-19T12:59:59.177000
|
||||
@ -261899,7 +261926,7 @@ CVE-2024-7729,0,0,2bbcc23121d3cbbbfd7b7747e3325c391cd14964f404891acd614a24c4694f
|
||||
CVE-2024-7731,0,0,e84a2998e171304858ad1fb8b038e10b362c1589200ef021af448b39d41434b9,2024-08-22T14:40:00.913000
|
||||
CVE-2024-7732,0,0,d07658c10ed57e2a3eecd9b14e76e8eed0b7a7133550030a1f5039eb59d98d22,2024-08-14T13:00:37.107000
|
||||
CVE-2024-7733,0,0,d6f0b33872e43d23ba993c9827febac1a615268a96a44f431f426f7460340dba,2024-08-14T02:07:05.410000
|
||||
CVE-2024-7734,0,1,ecf2761e7c92c768ea860282a3ce0e06a2c71cea4892b743b02acfaa994cd50a,2024-09-10T12:09:50.377000
|
||||
CVE-2024-7734,0,0,ecf2761e7c92c768ea860282a3ce0e06a2c71cea4892b743b02acfaa994cd50a,2024-09-10T12:09:50.377000
|
||||
CVE-2024-7738,0,0,9abbf70090d4bac2436939ae1d7e5b66071c9e95d911875233a210759cede2ef,2024-08-14T02:07:05.410000
|
||||
CVE-2024-7739,0,0,48d24e6c734bdd0aabede58961a2ddba8bd9566478ef049fa21ee7be6d7677d2,2024-08-14T02:07:05.410000
|
||||
CVE-2024-7740,0,0,b6b97e22b2a1c91ed733b5ea0db90c7ca386835aea8a2536d78b137aa899a052,2024-08-21T19:06:30.707000
|
||||
@ -261917,13 +261944,13 @@ CVE-2024-7752,0,0,a2329e23410b1feec53d6ea38469016e280edd824b17c574fc21bf18179470
|
||||
CVE-2024-7753,0,0,8d87f0b2095698ec5201c016f27ad170e6b85d6a83cdb1acca64ef97e59384ac,2024-08-19T17:47:49.083000
|
||||
CVE-2024-7754,0,0,aa642088260d14c06ef027c5ebe72633a842f86ac8e6448a2c0c42d526be8fa5,2024-08-19T17:48:15.203000
|
||||
CVE-2024-7757,0,0,ca7d079474a8e4f4b2f55e1721105da3a15a9e1d63f2bd4356eaaa03e8d55f39,2024-08-21T09:15:04.973000
|
||||
CVE-2024-7770,0,1,050ca25dc9f9b4d1ecb0313871198cecedaeb8fddc305a81bf31aa56f8757cc5,2024-09-10T12:09:50.377000
|
||||
CVE-2024-7770,0,0,050ca25dc9f9b4d1ecb0313871198cecedaeb8fddc305a81bf31aa56f8757cc5,2024-09-10T12:09:50.377000
|
||||
CVE-2024-7775,0,0,e75f99322bf942cd40c2d94981e16e48a8ebca7abec8ba8da6e02adea2112f97,2024-08-26T18:18:22.887000
|
||||
CVE-2024-7777,0,0,4a2d78b8605a3d4db2907c7fe28bc447e2c0379246d7b81936de12aa55ddf523,2024-08-26T18:19:19.507000
|
||||
CVE-2024-7778,0,0,3bccf24c2d6c26e9b97b53b6049aaebd5856252add9958ab8944d96a94251b86,2024-08-22T12:48:02.790000
|
||||
CVE-2024-7780,0,0,45e331e41470c18e0d898be4bc1931dca39faf6b7f4d412a460044104575abbc,2024-08-26T18:19:59.907000
|
||||
CVE-2024-7782,0,0,9772cfc0cffb104f900f553126e5bb2a4b326e29588ceccc59352666287dfd99,2024-08-26T18:21:12.203000
|
||||
CVE-2024-7784,0,1,a1673633f8befe483b8c481cae0c04073b4df8acf7cf90d7ad7fd806da35778c,2024-09-10T12:09:50.377000
|
||||
CVE-2024-7784,0,0,a1673633f8befe483b8c481cae0c04073b4df8acf7cf90d7ad7fd806da35778c,2024-09-10T12:09:50.377000
|
||||
CVE-2024-7786,0,0,bc9bd7c5c069bb8c59f5ac773821571e1c9df29939aac0b9b15b34e792ea7a51,2024-09-04T15:35:26.560000
|
||||
CVE-2024-7790,0,0,456afed422d8355372643bd567f11679217bfde5ad866de9b559c62284a4c756,2024-08-20T19:27:28.757000
|
||||
CVE-2024-7791,0,0,7416656b44e86a668ddf90bfa89c01f36bde25a07c507963ab58656b2d115a3d,2024-08-27T13:01:37.913000
|
||||
@ -261979,7 +262006,7 @@ CVE-2024-7884,0,0,d8621415c0cf625afb3ac55046a75308d0baca8fd0aad75f2a11bb7d29e7d0
|
||||
CVE-2024-7885,0,0,8ccead187965a5f1c2abb39b48c133d9f576a21859dc9731309caf892f9de5e4,2024-09-09T23:15:10.350000
|
||||
CVE-2024-7886,0,0,b8c1f856b8479c6982faa8a2fc4a6d8b2480e045b8b096d9bd3b8640a06eb6f3,2024-08-19T13:00:23.117000
|
||||
CVE-2024-7887,0,0,ba2ac28c88e5c856e9fa78c00b11f37e0df98a3508bf609dc9edbaa04a8fdb8e,2024-08-19T12:59:59.177000
|
||||
CVE-2024-7891,0,1,b35e39542ebc28a16519078ca6c1d7a0075a682efbdea597aee8b4a4f1fa51d3,2024-09-10T12:09:50.377000
|
||||
CVE-2024-7891,0,0,b35e39542ebc28a16519078ca6c1d7a0075a682efbdea597aee8b4a4f1fa51d3,2024-09-10T12:09:50.377000
|
||||
CVE-2024-7895,0,0,dcdb1275a611703d85517bf5428cb1020917dec1da8e46a89dfea7f9bd6d1daa,2024-08-29T13:25:27.537000
|
||||
CVE-2024-7896,0,0,d80047a3d1d6cdcff2bc1adb680d3fdbda8db4b01c807c4a42d25c13d72803dc,2024-08-19T17:15:11.543000
|
||||
CVE-2024-7897,0,0,e1e6bea210133c6b9b950b4aecbbc6a33480bc30160d48b4fd9fe9919d3739ab,2024-08-19T17:15:11.650000
|
||||
@ -262036,7 +262063,7 @@ CVE-2024-7948,0,0,10e56bd82889acf527e731295a76df26abf6e1bd128042058528282707ce87
|
||||
CVE-2024-7949,0,0,64b957370c21ddcba0bc925ad861d01e09364475441bf650c2c5e65485084163,2024-08-21T19:15:13.600000
|
||||
CVE-2024-7950,0,0,b51a61cdc7833f69fe0a174cb3081029b1669ec8306ef6c1fd438a91efe05d06,2024-09-04T13:05:36.067000
|
||||
CVE-2024-7954,0,0,3e94915bcd6201b8731c3a5ae345a341f2edda6301e38b26d28e234b0fc15d65,2024-08-23T18:46:31.730000
|
||||
CVE-2024-7955,0,1,067d7635f43b59aa4959e5e7d7972a2d69be698ea50d1d8f52601c6f98ab5325,2024-09-10T12:09:50.377000
|
||||
CVE-2024-7955,0,1,b6d58093d52dbc1693883781c79b3abb54211ad50ad9e0127c4cb8b72bd51a3e,2024-09-10T15:35:13.013000
|
||||
CVE-2024-7958,0,0,483ea949f242fd0880547068782264d397026329e525a14dcbacca7c22e7bcec,2024-08-19T20:15:08.907000
|
||||
CVE-2024-7964,0,0,c58a832be87177a31dd0ab059ea0a6d25f3e2935f7b0bca0ed2607ff4388d425,2024-08-27T13:35:00.823000
|
||||
CVE-2024-7965,0,0,52e904505bf2918dc7213f0c0cee1465ad2565b3645c991ed95474f3cc956ec6,2024-08-29T01:00:00.997000
|
||||
@ -262184,14 +262211,14 @@ CVE-2024-8230,0,0,51972d3a01eef60d4ec2fcebcc43d9f517d40a0a396b61ca7c24bdef0d5fcb
|
||||
CVE-2024-8231,0,0,19b769716e3fff898a72bf0ee7d68779b61ab99af63bed31a0498759613ebd4e,2024-08-28T12:57:27.610000
|
||||
CVE-2024-8234,0,0,870a131a53db84d6497bde7de38de6b7411ad7686be0738cd78fff93fab14909,2024-08-30T13:00:05.390000
|
||||
CVE-2024-8235,0,0,7072b68d002bcf4f9595f61b4137bd3d5b31c93ce76df9863ff0a1c3da8ed948,2024-09-03T12:59:02.453000
|
||||
CVE-2024-8241,0,1,35ebd2ab4c68ddc81effc80c2cf2eb8cf12caf111e7ab884d603a2c6bde8e766,2024-09-10T12:09:50.377000
|
||||
CVE-2024-8241,0,0,35ebd2ab4c68ddc81effc80c2cf2eb8cf12caf111e7ab884d603a2c6bde8e766,2024-09-10T12:09:50.377000
|
||||
CVE-2024-8247,0,0,5202f9f70242e6e766f5bf4ee04774da230414090293c913b32ce2eadeefe661,2024-09-06T12:08:04.550000
|
||||
CVE-2024-8250,0,0,9b93a65d8c7dcee06e07a2e2b390d716b51503d05b493ec48aa5a8756ae94b8c,2024-08-30T16:32:16.917000
|
||||
CVE-2024-8252,0,0,36e1aa114a02ff2bf925a636a4ed4135ae0e6011078bf9fd8b3aff586823c205,2024-09-03T14:31:27.243000
|
||||
CVE-2024-8255,0,0,c6874ac38c80acc73ad7edcdfa1b6810f24be9f578842829800024511d128d5a,2024-09-06T22:53:34.187000
|
||||
CVE-2024-8258,0,1,f89f58eb5f0b3759dea8f0dae08eaa2a66704ca0d9d3594730a9f2f38b881d1e,2024-09-10T12:09:50.377000
|
||||
CVE-2024-8258,0,0,f89f58eb5f0b3759dea8f0dae08eaa2a66704ca0d9d3594730a9f2f38b881d1e,2024-09-10T12:09:50.377000
|
||||
CVE-2024-8260,0,0,812d2a62f9a14f293d2814006504d857c705848c99804aae9066abfa5d1408ba,2024-09-03T12:59:02.453000
|
||||
CVE-2024-8268,0,1,ceeeab380c4c185371d3b97780ec883236427fb28d279219c56301bfbb794609,2024-09-10T12:09:50.377000
|
||||
CVE-2024-8268,0,0,ceeeab380c4c185371d3b97780ec883236427fb28d279219c56301bfbb794609,2024-09-10T12:09:50.377000
|
||||
CVE-2024-8274,0,0,81f15088246893eaf3249a3304ee5d5199071263c8883a7f9f22c293a16a376a,2024-09-03T14:28:06.853000
|
||||
CVE-2024-8276,0,0,33cf21b53b41316bc2e568f752afa4e96bbe73b4ee966f9832ffdb8137ffcc10,2024-09-03T12:59:02.453000
|
||||
CVE-2024-8285,0,0,44d06284adb5d71c65e8f3277866d5d546f57dcd495152060c7216923cd6bd07,2024-09-03T12:59:02.453000
|
||||
@ -262238,7 +262265,7 @@ CVE-2024-8365,0,0,81c889787151e95f50edc31d86d0d8800a4aaa4de596dc2a7252c4cbdeb954
|
||||
CVE-2024-8366,0,0,be663b51eff047ef5324516e3dc05e341a7647978df6a6f91fe297f3f5c5eb50,2024-09-04T11:26:49.020000
|
||||
CVE-2024-8367,0,0,5172ded1dd5d5dccb77f0059a7c6495922e642ce8e52859a1f0a60d7fb927bb9,2024-09-03T12:59:02.453000
|
||||
CVE-2024-8368,0,0,e041f44a528823075791907fb829fe4e23ee08e4bad517d1712c799858033925,2024-09-03T12:59:02.453000
|
||||
CVE-2024-8369,1,1,fd11748b0eee004dded2be2f88f9213c205339f11ab8f3ede86318ba467c0a0b,2024-09-10T12:15:02.463000
|
||||
CVE-2024-8369,0,1,c05b727b928dc2b947f92e6722013eb3f5815c13f08e62aa4470bee7eb812e25,2024-09-10T15:50:57.713000
|
||||
CVE-2024-8370,0,0,64120d391bac6f64ab186b0c09a7545128a19dc5df44f367c6d51bbce7b58a09,2024-09-03T14:15:17.787000
|
||||
CVE-2024-8371,0,0,7b748619aff48ca851aaa4522abab6772c72472a7e35dd23e50368b3e3907681,2024-09-03T13:15:05.500000
|
||||
CVE-2024-8372,0,0,824598be017ed03f49e00dc10d01119221625b308bd2ce07fc53c22aed41c811,2024-09-09T18:30:12.050000
|
||||
@ -262273,6 +262300,7 @@ CVE-2024-8418,0,0,f7342b1aaf36f471815aa50c659bed6ce97deba1a8dc8297ac025dec31c9e4
|
||||
CVE-2024-8427,0,0,1d0d7daf1e8474e50325418d52e79c4545246c244dd6a29747e6934be9944c58,2024-09-06T12:08:04.550000
|
||||
CVE-2024-8428,0,0,32f99662d2ff0a82eac2c387b5879cdce3b74766786e4d561b16e1b245df448a,2024-09-06T16:46:26.830000
|
||||
CVE-2024-8439,0,0,b4eacb6a11dc14d7212cfdbe9629a765b4f24ad00bc9c4fc2289184c4fdae508,2024-09-06T22:15:02.320000
|
||||
CVE-2024-8443,1,1,617cd4f466ab33fd47ad3a169ac6e58b744cbb396f21cd616989d6daccbaefe1,2024-09-10T15:50:57.713000
|
||||
CVE-2024-8445,0,0,27d6183cbf221ef18e3639e3533cc8ca212a51b0f7239a93c253eea652cb910f,2024-09-05T17:44:56.007000
|
||||
CVE-2024-8460,0,0,21c8cc38664ba19f902747cfc2492ea27c718e3ca35401645ae4d1c6ff7413b5,2024-09-06T16:30:54.027000
|
||||
CVE-2024-8461,0,0,3a6140152ccac3c7afb990181dca0d64f3ce128b6b2641b9dac80f5a038f3edb,2024-09-05T17:45:07.877000
|
||||
@ -262288,48 +262316,49 @@ CVE-2024-8470,0,0,bea6b0b968688b42b5644ab4cec20c893536d252388507a633ee5ebbe07507
|
||||
CVE-2024-8471,0,0,d4cac4daadf018326a13905f788e8fc27e503497a3cff6ab0ea980773a6f76cb,2024-09-06T11:44:22.510000
|
||||
CVE-2024-8472,0,0,a896e0fd54ff62d16feed47be0f08dd27e23a8a4def269ca8073766b75918cef,2024-09-06T11:44:34.543000
|
||||
CVE-2024-8473,0,0,0d318dfea88475fed5cabdbe761e188358c3ae35cd6d226ef3fe46f2f9041c00,2024-09-06T11:44:45.017000
|
||||
CVE-2024-8478,0,1,e333806b3f124cdccad931974c458d04f248d7fe56143afacc5e05746f5f352e,2024-09-10T12:09:50.377000
|
||||
CVE-2024-8478,0,0,e333806b3f124cdccad931974c458d04f248d7fe56143afacc5e05746f5f352e,2024-09-10T12:09:50.377000
|
||||
CVE-2024-8480,0,0,6f63c0c2b913be669f1e72f74bb0555ea9046fdf00f5eabae51a6bc6bb95358b,2024-09-06T12:08:04.550000
|
||||
CVE-2024-8509,0,0,72b678ade46a23d1db65e1dfb65526568e7875d83752ef0a47b4a7edfeaf5ddf,2024-09-09T19:15:14.837000
|
||||
CVE-2024-8517,0,0,3800f6b128aab40f688c971c9a9e47c0b6a42cbdd5c8d94b7cf3eaf620f48fad,2024-09-09T16:15:03.053000
|
||||
CVE-2024-8521,0,0,65485edaf907369f60ded6330bfa86fc3cb4b0554a8f781a990c000b1998cccb,2024-09-09T13:03:38.303000
|
||||
CVE-2024-8523,0,0,97cab60ebb5ec07bfc3fbe69bde3146d8e6846c5d869fc10534b5a2c3c29806e,2024-09-09T13:03:38.303000
|
||||
CVE-2024-8538,0,0,cdc95bc68a4038527ba5cf51b0a8358b05e3a1650fc8124f586021fbca5ad9b3,2024-09-09T13:03:38.303000
|
||||
CVE-2024-8543,0,1,e190cfdf6def9f928d16ce7c20119d5fac7745c9206ec7d9500145321b367e4b,2024-09-10T12:09:50.377000
|
||||
CVE-2024-8554,0,1,46c32adbe15332664cfc930fe8c32bff96db8190902ab789492b593fa03348f1,2024-09-10T13:52:23.250000
|
||||
CVE-2024-8555,0,1,0c0685cb1cca90ba97dbbe7724af46b71d0ab057cb41b6cc62e81df56a2985b7,2024-09-10T13:53:11.847000
|
||||
CVE-2024-8557,0,0,d956d0b1de890824833231cfe4294c7751ca4754efdbac52614ee252b9d18dba,2024-09-09T13:03:38.303000
|
||||
CVE-2024-8558,0,0,4aac7527eeee42b5c5d8109666e56a4ed70772a8dcf12a0ff2f911a207d46df2,2024-09-09T13:03:38.303000
|
||||
CVE-2024-8559,0,0,3e9e0b104fc272c9644d68797f459b21c97a601223d1ffa5bd43c8da7cff83ff,2024-09-09T13:03:38.303000
|
||||
CVE-2024-8560,0,0,af722b5f84acc1bc41034eee850b6876462283a40ee43492eb83ce54a6962ded,2024-09-09T13:03:38.303000
|
||||
CVE-2024-8561,0,0,dc0fd4abf312f4f9cb64addd3f0d934be26835bf369f0d67ce68cf77fb19e719,2024-09-09T13:03:38.303000
|
||||
CVE-2024-8562,0,0,c4b8a0551a23e8172e9c73be2fa79f014a3db9d35691867f99c285ac799ddcf6,2024-09-09T13:03:38.303000
|
||||
CVE-2024-8563,0,0,f84ba3aea109085e7c774fb3cc47d7f74c0436fb36077f5024069d632bac0414,2024-09-09T13:03:38.303000
|
||||
CVE-2024-8564,0,0,7ed38f8c2382c767dadd62fc96c63167ce6c0648a66a6803aecc8343fb96a53e,2024-09-09T13:03:38.303000
|
||||
CVE-2024-8565,0,0,77a9cfeae04e7a95530eb68846baa2e068240bb8d58178c7065615768603505f,2024-09-09T13:03:38.303000
|
||||
CVE-2024-8566,0,0,1b6f79a49a600ea051d35bc3795bca3b2323a53fadb6399aa2adc97f8077cfe9,2024-09-09T13:03:38.303000
|
||||
CVE-2024-8567,0,0,6dd655de57216fece56db58ede9697b1a42006a95d5f8c6fa5d99c8bbf16ace4,2024-09-09T13:03:38.303000
|
||||
CVE-2024-8543,0,0,e190cfdf6def9f928d16ce7c20119d5fac7745c9206ec7d9500145321b367e4b,2024-09-10T12:09:50.377000
|
||||
CVE-2024-8554,0,0,46c32adbe15332664cfc930fe8c32bff96db8190902ab789492b593fa03348f1,2024-09-10T13:52:23.250000
|
||||
CVE-2024-8555,0,0,0c0685cb1cca90ba97dbbe7724af46b71d0ab057cb41b6cc62e81df56a2985b7,2024-09-10T13:53:11.847000
|
||||
CVE-2024-8557,0,1,86ab04a42076aa0fe9f792cba1f27d54b98becfc358809b664a63ce528fde776,2024-09-10T14:19:36.280000
|
||||
CVE-2024-8558,0,1,cd5317422ee57a143fa549693a5ddb5c3640390382b2d955ce9be00f839794f7,2024-09-10T15:50:24.143000
|
||||
CVE-2024-8559,0,1,570817955f95cc0d2249977f6f5e834ee4444c1bdc403ac954ebc9064d75bfbb,2024-09-10T15:31:32.443000
|
||||
CVE-2024-8560,0,1,c57fff8c9843a2ee08ebb0b3f21e0b893a75fc78bbbeb30ab9ca5fb292349bae,2024-09-10T15:32:39.927000
|
||||
CVE-2024-8561,0,1,50e7c90fb0f67cf76a1d7d8b120d47e3caf47b73fa527bafc64fa4101919d772,2024-09-10T15:35:01.837000
|
||||
CVE-2024-8562,0,1,4dad038bafef5062b95bd42a0668ee2ae213ac8b43c3f5dd213a25e0a1c67edd,2024-09-10T15:36:34.703000
|
||||
CVE-2024-8563,0,1,031de96982528dfcf24e623c2f7c7383d0e770c6ac7d9b827f3eeb61b721c6d4,2024-09-10T15:37:48.183000
|
||||
CVE-2024-8564,0,1,2112c36914e39f842fdc3749656e81cb1e01d81d9daf6872738042abc963e73e,2024-09-10T15:38:42.570000
|
||||
CVE-2024-8565,0,1,923e87f30584d77b1eb045cc17fb206bfc48a80ad2f8f1ccf84c8acb9bd2c037,2024-09-10T15:40:31.103000
|
||||
CVE-2024-8566,0,1,b697d2f2d8dab369399702d62c565693e4b82d2b91e05adb154f01cb1c8382ab,2024-09-10T15:42:03.630000
|
||||
CVE-2024-8567,0,1,49659b49a666f0018bb5744af39b0142ede6c7f436b35449bf81fb3596426b7c,2024-09-10T15:44:31.283000
|
||||
CVE-2024-8568,0,0,4021a3f0e72a6d171048f0a7b13a93327102ce9af57868999c56debd16b33d55,2024-09-09T13:03:38.303000
|
||||
CVE-2024-8569,0,0,825765fab86e7246b7c8f1866c045e3d8eb383d3482602655f505175cad6dae8,2024-09-09T13:03:38.303000
|
||||
CVE-2024-8569,0,1,aaed184af7e4134cfe1a8ea6b899c2f66a4c7610f73679d8a682587becf0ed8f,2024-09-10T15:45:24.237000
|
||||
CVE-2024-8570,0,0,a35ad2ed8f4e40daba99661193190c020bbec00950eacb9abfa9a2b177a3196f,2024-09-09T13:03:38.303000
|
||||
CVE-2024-8571,0,0,bc72f3f150d06377644ebf4c0afa9d59046664e5cf502a539ace8bb639b609c4,2024-09-09T13:03:38.303000
|
||||
CVE-2024-8572,0,0,65c0182e0b6b9126e2a9480fb9dc08e73b2cfe03993460c6fe0066e5e3a46c29,2024-09-09T13:03:38.303000
|
||||
CVE-2024-8573,0,1,e2248f2e9fabf9390d946aa934f8785dd212725150f7676501e18fb9191a46dd,2024-09-10T12:08:12.567000
|
||||
CVE-2024-8573,0,0,e2248f2e9fabf9390d946aa934f8785dd212725150f7676501e18fb9191a46dd,2024-09-10T12:08:12.567000
|
||||
CVE-2024-8574,0,0,19894d99d3070776fb1a44f17a54df633ea25e6bfa91923d40be07d8e4a21b2e,2024-09-09T18:47:10.577000
|
||||
CVE-2024-8575,0,0,1a894f380aae23a0c95d0f445bdf8ed48f5f6c32fa54c136a25ec7a57fd27b16,2024-09-09T18:47:45.917000
|
||||
CVE-2024-8576,0,0,1783676f924976381fafc0f96422ed382f270401d25c92fb033e06383df4a7f7,2024-09-09T18:59:57.423000
|
||||
CVE-2024-8577,0,0,96f1be189725676d2f3233dc01a21ddbf35a2a75bf7f74c80a804039b234d5e2,2024-09-09T18:51:32.377000
|
||||
CVE-2024-8578,0,0,72b1c5b8b0cbaa0c9c8584a9a193238855c2f41d4aec8b5a15264448a8ca7c65,2024-09-09T18:46:00.300000
|
||||
CVE-2024-8579,0,0,5e850f0b011b9943620ead0d3063b902196cd66b4d55fb09d083b2d2656f9dc7,2024-09-09T13:03:38.303000
|
||||
CVE-2024-8580,0,0,71fb7b71ee4e11efeceacb1480052da188f0c5c4d3e8d999f7cbbc85ef79e3d2,2024-09-09T13:03:38.303000
|
||||
CVE-2024-8582,0,0,bf290c531eb532cb798b8923302db1861844d084d859b0eda7658f732f801dd8,2024-09-09T13:03:38.303000
|
||||
CVE-2024-8583,0,0,db5ff814fab4f35b327671aeddc5fb77478e1503097a9d5855c11bc2b8fab58b,2024-09-09T13:03:38.303000
|
||||
CVE-2024-8579,0,1,5ca39278224613960d2995fc71f5451de91cb55696583bb2c29af9edc66fba31,2024-09-10T15:47:10.393000
|
||||
CVE-2024-8580,0,1,f51aa5c8e3665529b80cf204d693b0b0f66df0f643575c721707f6f32dd401a5,2024-09-10T15:47:47.397000
|
||||
CVE-2024-8582,0,1,929f6a4eccde08c2101d65daf5f8492ec1f09acd5b572ce0e385ece7e31d5365,2024-09-10T15:48:30.537000
|
||||
CVE-2024-8583,0,1,1afec7fcc1c6ffb2f3d78350dc0e6e06f846d7be3a9c3c1e504a570641936171,2024-09-10T15:49:29.103000
|
||||
CVE-2024-8584,0,0,7c7ad2063aa233a836e9a59682cb05dfcb95a707aa850cd9ec5b817e03f5e162,2024-09-09T13:03:38.303000
|
||||
CVE-2024-8585,0,0,9988d1ca177f24ec925e5066ed58d9d8a162814f82b8247fbc323ff8f14711cf,2024-09-09T13:03:38.303000
|
||||
CVE-2024-8586,0,0,d2fff35b7bace3dc5314f28642480fa5fad7af57500e2b190be70f1f2b91fb56,2024-09-09T13:03:38.303000
|
||||
CVE-2024-8601,0,0,7acc310f49af8e0e61a818aa0442f44a6d68bdb260bd22310620d7d1eda33555,2024-09-09T13:03:38.303000
|
||||
CVE-2024-8604,0,0,03dd9ea4b720aacc0e1e1cce008473e1a786aeb7eaa9fc848b1a9d53cc790e1f,2024-09-09T18:30:12.050000
|
||||
CVE-2024-8605,0,0,05de9fb886966e208a1d4ea135c5ccec7205233c650e87f0027c612a99575815,2024-09-09T18:30:12.050000
|
||||
CVE-2024-8610,0,1,473e0782947d4bb5808f93b8ea2243b42a4e82997b690a69a9a95368e1eef9c1,2024-09-10T12:09:50.377000
|
||||
CVE-2024-8611,0,1,a2b44027b2072954b313d2459899e49857f8f44440a8eb23f45a13a7d9867cef,2024-09-10T12:09:50.377000
|
||||
CVE-2024-8645,0,1,a9ec59eb761dcf7b03b051641e3314ff9102e8e55de30e4e3a512e1bddcece61,2024-09-10T12:09:50.377000
|
||||
CVE-2024-8610,0,0,473e0782947d4bb5808f93b8ea2243b42a4e82997b690a69a9a95368e1eef9c1,2024-09-10T12:09:50.377000
|
||||
CVE-2024-8611,0,0,a2b44027b2072954b313d2459899e49857f8f44440a8eb23f45a13a7d9867cef,2024-09-10T12:09:50.377000
|
||||
CVE-2024-8645,0,0,a9ec59eb761dcf7b03b051641e3314ff9102e8e55de30e4e3a512e1bddcece61,2024-09-10T12:09:50.377000
|
||||
CVE-2024-8654,1,1,57cef793a15e4fff1f6a81b90040ccd0e88e34303bf4e34610423e89cb1b0d25,2024-09-10T15:50:57.713000
|
||||
|
Can't render this file because it is too large.
|
Loading…
x
Reference in New Issue
Block a user