mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-07-09 16:05:11 +00:00
Auto-Update: 2024-10-22T20:00:34.470852+00:00
This commit is contained in:
parent
047cf7199e
commit
e04b35296d
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2022-23861",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-10-22T16:15:04.897",
|
||||
"lastModified": "2024-10-22T16:15:04.897",
|
||||
"lastModified": "2024-10-22T19:35:01.570",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -11,7 +11,42 @@
|
||||
"value": "Multiple Stored Cross-Site Scripting vulnerabilities were discovered in Y Soft SAFEQ 6 Build 53. Multiple fields in the YSoft SafeQ web application can be used to inject malicious inputs that, due to a lack of output sanitization, result in the execution of arbitrary JS code. These fields can be leveraged to perform XSS attacks on legitimate users accessing the SafeQ web interface."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 6.1,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 2.7
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/mbadanoiu/CVE-2022-23861",
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2022-23862",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-10-22T16:15:05.443",
|
||||
"lastModified": "2024-10-22T16:15:05.443",
|
||||
"lastModified": "2024-10-22T19:35:03.463",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -11,7 +11,42 @@
|
||||
"value": "A Local Privilege Escalation issue was discovered in Y Soft SAFEQ 6 Build 53. The SafeQ JMX service running on port 9696 is vulnerable to JMX MLet attacks. Because the service did not enforce authentication and was running under the \"NT Authority\\System\" user, an attacker is able to use the vulnerability to execute arbitrary code and elevate to the system user."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 8.4,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.5,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-306"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/mbadanoiu/CVE-2022-23862",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-20797",
|
||||
"sourceIdentifier": "security@mediatek.com",
|
||||
"published": "2023-08-07T04:15:13.537",
|
||||
"lastModified": "2023-08-09T13:39:25.510",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2024-10-22T18:35:00.667",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -32,6 +32,26 @@
|
||||
},
|
||||
"exploitabilityScore": 0.8,
|
||||
"impactScore": 5.9
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "HIGH",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 6.7,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 0.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -45,6 +65,16 @@
|
||||
"value": "CWE-787"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-787"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-6516",
|
||||
"sourceIdentifier": "security-officer@isc.org",
|
||||
"published": "2024-02-13T14:15:46.030",
|
||||
"lastModified": "2024-07-03T01:44:22.620",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2024-10-22T18:14:36.613",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -40,6 +40,16 @@
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-770"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
@ -51,26 +61,128 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:isc:bind:*:*:*:*:-:*:*:*",
|
||||
"versionStartIncluding": "9.16.0",
|
||||
"versionEndIncluding": "9.16.45",
|
||||
"matchCriteriaId": "1A19BB7A-F711-40C3-B395-03589018FE52"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:isc:bind:9.16.8:s1:*:*:supported_preview:*:*:*",
|
||||
"matchCriteriaId": "288EAD80-574B-4839-9C2C-81D6D088A733"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:isc:bind:9.16.11:s1:*:*:supported_preview:*:*:*",
|
||||
"matchCriteriaId": "3595F024-F910-4356-8B5B-D478960FF574"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:isc:bind:9.16.12:s1:*:*:supported_preview:*:*:*",
|
||||
"matchCriteriaId": "1B20F152-D0C3-4F07-83B3-5EA6B116F005"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:isc:bind:9.16.13:s1:*:*:supported_preview:*:*:*",
|
||||
"matchCriteriaId": "94661BA2-27F8-4FFE-B844-9404F735579D"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:isc:bind:9.16.14:s1:*:*:supported_preview:*:*:*",
|
||||
"matchCriteriaId": "53593603-E2AF-4925-A6E6-109F097A0FF2"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:isc:bind:9.16.21:s1:*:*:supported_preview:*:*:*",
|
||||
"matchCriteriaId": "751E37C2-8BFD-4306-95C1-8C01CE495FA4"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:isc:bind:9.16.32:s1:*:*:supported_preview:*:*:*",
|
||||
"matchCriteriaId": "CC432820-F1A2-4132-A673-2620119553C5"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:isc:bind:9.16.36:s1:*:*:supported_preview:*:*:*",
|
||||
"matchCriteriaId": "F70347F2-6750-4497-B8F4-2036F4F4443A"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:isc:bind:9.16.43:s1:*:*:supported_preview:*:*:*",
|
||||
"matchCriteriaId": "A4B53B73-DB81-4AC1-A4E6-89BB305D6514"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:isc:bind:9.16.45:s1:*:*:supported_preview:*:*:*",
|
||||
"matchCriteriaId": "EC7357C9-AD62-4B7E-B013-780108BA562E"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:netapp:active_iq_unified_manager:-:*:*:*:*:vmware_vsphere:*:*",
|
||||
"matchCriteriaId": "3A756737-1CC4-42C2-A4DF-E1C893B4E2D5"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "http://www.openwall.com/lists/oss-security/2024/02/13/1",
|
||||
"source": "security-officer@isc.org"
|
||||
"source": "security-officer@isc.org",
|
||||
"tags": [
|
||||
"Mailing List",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://kb.isc.org/docs/cve-2023-6516",
|
||||
"source": "security-officer@isc.org"
|
||||
"source": "security-officer@isc.org",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PNNHZSZPG2E7NBMBNYPGHCFI4V4XRWNQ/",
|
||||
"source": "security-officer@isc.org"
|
||||
"source": "security-officer@isc.org",
|
||||
"tags": [
|
||||
"Mailing List",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZDZFMEKQTZ4L7RY46FCENWFB5MDT263R/",
|
||||
"source": "security-officer@isc.org"
|
||||
"source": "security-officer@isc.org",
|
||||
"tags": [
|
||||
"Mailing List",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://security.netapp.com/advisory/ntap-20240503-0008/",
|
||||
"source": "security-officer@isc.org"
|
||||
"source": "security-officer@isc.org",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-10133",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2024-10-19T09:15:11.090",
|
||||
"lastModified": "2024-10-21T17:10:22.857",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-10-22T18:10:58.963",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -61,6 +61,26 @@
|
||||
}
|
||||
],
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 8.8,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 5.9
|
||||
},
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
@ -120,22 +140,52 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:esafenet:cdg:5:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "94F213FF-17EB-4B99-9621-80792AD14A74"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://flowus.cn/share/a320073e-a545-419e-bfb5-d6e2b8526433?code=G8A6P3",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.280921",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Permissions Required"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.280921",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?submit.422231",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-10134",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2024-10-19T10:15:02.663",
|
||||
"lastModified": "2024-10-21T17:10:22.857",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-10-22T18:10:46.467",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -61,6 +61,26 @@
|
||||
}
|
||||
],
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 8.8,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 5.9
|
||||
},
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
@ -120,22 +140,55 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:esafenet:cdg:5:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "94F213FF-17EB-4B99-9621-80792AD14A74"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://flowus.cn/share/cf5e5c45-d097-48d4-b33b-54acfa846fe5?code=G8A6P3",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.280922",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Permissions Required",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.280922",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?submit.422232",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-10135",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2024-10-19T12:15:13.247",
|
||||
"lastModified": "2024-10-21T17:09:45.417",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-10-22T18:09:50.823",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -61,6 +61,26 @@
|
||||
}
|
||||
],
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 8.8,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 5.9
|
||||
},
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
@ -120,22 +140,55 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:esafenet:cdg:5:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "94F213FF-17EB-4B99-9621-80792AD14A74"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://flowus.cn/share/90077815-dc85-42a1-9144-af0002cd0011?code=G8A6P3",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.280923",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Permissions Required",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.280923",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?submit.422233",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-10142",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2024-10-19T17:15:10.657",
|
||||
"lastModified": "2024-10-21T17:09:45.417",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-10-22T18:11:20.450",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -61,6 +61,26 @@
|
||||
}
|
||||
],
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 5.4,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.3,
|
||||
"impactScore": 2.7
|
||||
},
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
@ -120,26 +140,63 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:code-projects:blood_bank_system:1.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "CB3CB4C2-E5C6-4136-B3A8-418484B48FD2"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://code-projects.org/",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Product"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/WrongDish/CVE/blob/main/xss6.md",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.280930",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Permissions Required",
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.280930",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?submit.425362",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
78
CVE-2024/CVE-2024-101xx/CVE-2024-10183.json
Normal file
78
CVE-2024/CVE-2024-101xx/CVE-2024-10183.json
Normal file
@ -0,0 +1,78 @@
|
||||
{
|
||||
"id": "CVE-2024-10183",
|
||||
"sourceIdentifier": "67325c3f-c596-46c5-a235-e1a1e73abe4e",
|
||||
"published": "2024-10-22T18:15:03.827",
|
||||
"lastModified": "2024-10-22T18:15:03.827",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A vulnerability in Jamf Pro's Jamf Remote Assist tool allows a local, non-privileged user to escalate their privileges to root on MacOS systems."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV40": [
|
||||
{
|
||||
"source": "67325c3f-c596-46c5-a235-e1a1e73abe4e",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "4.0",
|
||||
"vectorString": "CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:L/VI:L/VA:L/SC:H/SI:H/SA:H/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"attackRequirements": "PRESENT",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"vulnerableSystemConfidentiality": "LOW",
|
||||
"vulnerableSystemIntegrity": "LOW",
|
||||
"vulnerableSystemAvailability": "LOW",
|
||||
"subsequentSystemConfidentiality": "HIGH",
|
||||
"subsequentSystemIntegrity": "HIGH",
|
||||
"subsequentSystemAvailability": "HIGH",
|
||||
"exploitMaturity": "NOT_DEFINED",
|
||||
"confidentialityRequirements": "NOT_DEFINED",
|
||||
"integrityRequirements": "NOT_DEFINED",
|
||||
"availabilityRequirements": "NOT_DEFINED",
|
||||
"modifiedAttackVector": "NOT_DEFINED",
|
||||
"modifiedAttackComplexity": "NOT_DEFINED",
|
||||
"modifiedAttackRequirements": "NOT_DEFINED",
|
||||
"modifiedPrivilegesRequired": "NOT_DEFINED",
|
||||
"modifiedUserInteraction": "NOT_DEFINED",
|
||||
"modifiedVulnerableSystemConfidentiality": "NOT_DEFINED",
|
||||
"modifiedVulnerableSystemIntegrity": "NOT_DEFINED",
|
||||
"modifiedVulnerableSystemAvailability": "NOT_DEFINED",
|
||||
"modifiedSubsequentSystemConfidentiality": "NOT_DEFINED",
|
||||
"modifiedSubsequentSystemIntegrity": "NOT_DEFINED",
|
||||
"modifiedSubsequentSystemAvailability": "NOT_DEFINED",
|
||||
"safety": "NOT_DEFINED",
|
||||
"automatable": "NOT_DEFINED",
|
||||
"recovery": "NOT_DEFINED",
|
||||
"valueDensity": "NOT_DEFINED",
|
||||
"vulnerabilityResponseEffort": "NOT_DEFINED",
|
||||
"providerUrgency": "NOT_DEFINED",
|
||||
"baseScore": 5.2,
|
||||
"baseSeverity": "MEDIUM"
|
||||
}
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "67325c3f-c596-46c5-a235-e1a1e73abe4e",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-276"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://learn.jamf.com/en-US/bundle/jamf-remote-assist-release-notes/page/Jamf_Remote_Assist_Release_History.html#ariaid-title4",
|
||||
"source": "67325c3f-c596-46c5-a235-e1a1e73abe4e"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-20458",
|
||||
"sourceIdentifier": "ykramarz@cisco.com",
|
||||
"published": "2024-10-16T17:15:14.423",
|
||||
"lastModified": "2024-10-18T12:53:04.627",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2024-10-22T18:03:09.777",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -17,6 +17,26 @@
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:L",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "LOW",
|
||||
"baseScore": 8.2,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 4.2
|
||||
},
|
||||
{
|
||||
"source": "ykramarz@cisco.com",
|
||||
"type": "Secondary",
|
||||
@ -40,6 +60,16 @@
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-78"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "ykramarz@cisco.com",
|
||||
"type": "Secondary",
|
||||
@ -51,10 +81,99 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:cisco:ata_191_firmware:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "12.0.2",
|
||||
"matchCriteriaId": "E464918E-6409-4ACC-B27A-ECD7A5A5ABF8"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:cisco:ata_191:-:*:*:*:on-premises:*:*:*",
|
||||
"matchCriteriaId": "2BBB1A29-ABF8-4F79-A436-A416FAF4E7A9"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:cisco:ata_191_firmware:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "11.2.5",
|
||||
"matchCriteriaId": "8FA479CC-10DC-4B3A-A869-7E0CCD02C959"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:cisco:ata_191:-:*:*:*:multiplatform:*:*:*",
|
||||
"matchCriteriaId": "B0C232BB-005C-4E04-9B99-2B01AC8E8BA1"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:cisco:ata_192_firmware:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "11.2.5",
|
||||
"matchCriteriaId": "7B66D888-565A-4EB1-B19B-594B302AAA72"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:cisco:ata_192:-:*:*:*:multiplatform:*:*:*",
|
||||
"matchCriteriaId": "00A3390F-594D-4DB2-96EC-04D0D73C9421"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ata19x-multi-RDTEqRsy",
|
||||
"source": "ykramarz@cisco.com"
|
||||
"source": "ykramarz@cisco.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-20459",
|
||||
"sourceIdentifier": "ykramarz@cisco.com",
|
||||
"published": "2024-10-16T17:15:14.657",
|
||||
"lastModified": "2024-10-18T12:53:04.627",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2024-10-22T18:06:48.333",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -17,6 +17,26 @@
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "HIGH",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 7.2,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 1.2,
|
||||
"impactScore": 5.9
|
||||
},
|
||||
{
|
||||
"source": "ykramarz@cisco.com",
|
||||
"type": "Secondary",
|
||||
@ -40,6 +60,16 @@
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-78"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "ykramarz@cisco.com",
|
||||
"type": "Secondary",
|
||||
@ -51,10 +81,99 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:cisco:ata_191_firmware:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "12.0.2",
|
||||
"matchCriteriaId": "E464918E-6409-4ACC-B27A-ECD7A5A5ABF8"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:cisco:ata_191:-:*:*:*:on-premises:*:*:*",
|
||||
"matchCriteriaId": "2BBB1A29-ABF8-4F79-A436-A416FAF4E7A9"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:cisco:ata_191_firmware:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "11.2.5",
|
||||
"matchCriteriaId": "8FA479CC-10DC-4B3A-A869-7E0CCD02C959"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:cisco:ata_191:-:*:*:*:multiplatform:*:*:*",
|
||||
"matchCriteriaId": "B0C232BB-005C-4E04-9B99-2B01AC8E8BA1"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:cisco:ata_192_firmware:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "11.2.5",
|
||||
"matchCriteriaId": "7B66D888-565A-4EB1-B19B-594B302AAA72"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:cisco:ata_192:-:*:*:*:multiplatform:*:*:*",
|
||||
"matchCriteriaId": "00A3390F-594D-4DB2-96EC-04D0D73C9421"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ata19x-multi-RDTEqRsy",
|
||||
"source": "ykramarz@cisco.com"
|
||||
"source": "ykramarz@cisco.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-20460",
|
||||
"sourceIdentifier": "ykramarz@cisco.com",
|
||||
"published": "2024-10-16T17:15:14.880",
|
||||
"lastModified": "2024-10-18T12:53:04.627",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2024-10-22T18:24:59.710",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -17,6 +17,26 @@
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 6.1,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 2.7
|
||||
},
|
||||
{
|
||||
"source": "ykramarz@cisco.com",
|
||||
"type": "Secondary",
|
||||
@ -40,6 +60,16 @@
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "NVD-CWE-Other"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "ykramarz@cisco.com",
|
||||
"type": "Secondary",
|
||||
@ -51,10 +81,99 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:cisco:ata_191_firmware:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "12.0.2",
|
||||
"matchCriteriaId": "E464918E-6409-4ACC-B27A-ECD7A5A5ABF8"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:cisco:ata_191:-:*:*:*:on-premises:*:*:*",
|
||||
"matchCriteriaId": "2BBB1A29-ABF8-4F79-A436-A416FAF4E7A9"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:cisco:ata_191_firmware:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "11.2.5",
|
||||
"matchCriteriaId": "8FA479CC-10DC-4B3A-A869-7E0CCD02C959"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:cisco:ata_191:-:*:*:*:multiplatform:*:*:*",
|
||||
"matchCriteriaId": "B0C232BB-005C-4E04-9B99-2B01AC8E8BA1"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:cisco:ata_192_firmware:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "11.2.5",
|
||||
"matchCriteriaId": "7B66D888-565A-4EB1-B19B-594B302AAA72"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:cisco:ata_192:-:*:*:*:multiplatform:*:*:*",
|
||||
"matchCriteriaId": "00A3390F-594D-4DB2-96EC-04D0D73C9421"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ata19x-multi-RDTEqRsy",
|
||||
"source": "ykramarz@cisco.com"
|
||||
"source": "ykramarz@cisco.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-20461",
|
||||
"sourceIdentifier": "ykramarz@cisco.com",
|
||||
"published": "2024-10-16T17:15:15.127",
|
||||
"lastModified": "2024-10-18T12:53:04.627",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2024-10-22T18:26:01.890",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -17,6 +17,26 @@
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "HIGH",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 6.0,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 0.8,
|
||||
"impactScore": 5.2
|
||||
},
|
||||
{
|
||||
"source": "ykramarz@cisco.com",
|
||||
"type": "Secondary",
|
||||
@ -40,6 +60,16 @@
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-78"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "ykramarz@cisco.com",
|
||||
"type": "Secondary",
|
||||
@ -51,10 +81,99 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:cisco:ata_191_firmware:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "12.0.2",
|
||||
"matchCriteriaId": "E464918E-6409-4ACC-B27A-ECD7A5A5ABF8"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:cisco:ata_191:-:*:*:*:on-premises:*:*:*",
|
||||
"matchCriteriaId": "2BBB1A29-ABF8-4F79-A436-A416FAF4E7A9"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:cisco:ata_191_firmware:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "11.2.5",
|
||||
"matchCriteriaId": "8FA479CC-10DC-4B3A-A869-7E0CCD02C959"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:cisco:ata_191:-:*:*:*:multiplatform:*:*:*",
|
||||
"matchCriteriaId": "B0C232BB-005C-4E04-9B99-2B01AC8E8BA1"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:cisco:ata_192_firmware:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "11.2.5",
|
||||
"matchCriteriaId": "7B66D888-565A-4EB1-B19B-594B302AAA72"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:cisco:ata_192:-:*:*:*:multiplatform:*:*:*",
|
||||
"matchCriteriaId": "00A3390F-594D-4DB2-96EC-04D0D73C9421"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ata19x-multi-RDTEqRsy",
|
||||
"source": "ykramarz@cisco.com"
|
||||
"source": "ykramarz@cisco.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-20462",
|
||||
"sourceIdentifier": "ykramarz@cisco.com",
|
||||
"published": "2024-10-16T17:15:15.357",
|
||||
"lastModified": "2024-10-18T12:53:04.627",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2024-10-22T18:33:31.410",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -17,6 +17,26 @@
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 5.5,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 3.6
|
||||
},
|
||||
{
|
||||
"source": "ykramarz@cisco.com",
|
||||
"type": "Secondary",
|
||||
@ -40,6 +60,16 @@
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-522"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "ykramarz@cisco.com",
|
||||
"type": "Secondary",
|
||||
@ -51,10 +81,99 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:cisco:ata_191_firmware:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "12.0.2",
|
||||
"matchCriteriaId": "E464918E-6409-4ACC-B27A-ECD7A5A5ABF8"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:cisco:ata_191:-:*:*:*:on-premises:*:*:*",
|
||||
"matchCriteriaId": "2BBB1A29-ABF8-4F79-A436-A416FAF4E7A9"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:cisco:ata_191_firmware:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "11.2.5",
|
||||
"matchCriteriaId": "8FA479CC-10DC-4B3A-A869-7E0CCD02C959"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:cisco:ata_191:-:*:*:*:multiplatform:*:*:*",
|
||||
"matchCriteriaId": "B0C232BB-005C-4E04-9B99-2B01AC8E8BA1"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:cisco:ata_192_firmware:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "11.2.5",
|
||||
"matchCriteriaId": "7B66D888-565A-4EB1-B19B-594B302AAA72"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:cisco:ata_192:-:*:*:*:multiplatform:*:*:*",
|
||||
"matchCriteriaId": "00A3390F-594D-4DB2-96EC-04D0D73C9421"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ata19x-multi-RDTEqRsy",
|
||||
"source": "ykramarz@cisco.com"
|
||||
"source": "ykramarz@cisco.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-20463",
|
||||
"sourceIdentifier": "ykramarz@cisco.com",
|
||||
"published": "2024-10-16T17:15:15.670",
|
||||
"lastModified": "2024-10-18T12:53:04.627",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2024-10-22T18:36:35.487",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -17,6 +17,26 @@
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 7.1,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 4.2
|
||||
},
|
||||
{
|
||||
"source": "ykramarz@cisco.com",
|
||||
"type": "Secondary",
|
||||
@ -40,6 +60,16 @@
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "NVD-CWE-Other"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "ykramarz@cisco.com",
|
||||
"type": "Secondary",
|
||||
@ -51,10 +81,99 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:cisco:ata_191_firmware:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "12.0.2",
|
||||
"matchCriteriaId": "E464918E-6409-4ACC-B27A-ECD7A5A5ABF8"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:cisco:ata_191:-:*:*:*:on-premises:*:*:*",
|
||||
"matchCriteriaId": "2BBB1A29-ABF8-4F79-A436-A416FAF4E7A9"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:cisco:ata_191_firmware:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "11.2.5",
|
||||
"matchCriteriaId": "8FA479CC-10DC-4B3A-A869-7E0CCD02C959"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:cisco:ata_191:-:*:*:*:multiplatform:*:*:*",
|
||||
"matchCriteriaId": "B0C232BB-005C-4E04-9B99-2B01AC8E8BA1"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:cisco:ata_192_firmware:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "11.2.5",
|
||||
"matchCriteriaId": "7B66D888-565A-4EB1-B19B-594B302AAA72"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:cisco:ata_192:-:*:*:*:multiplatform:*:*:*",
|
||||
"matchCriteriaId": "00A3390F-594D-4DB2-96EC-04D0D73C9421"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ata19x-multi-RDTEqRsy",
|
||||
"source": "ykramarz@cisco.com"
|
||||
"source": "ykramarz@cisco.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-38197",
|
||||
"sourceIdentifier": "secure@microsoft.com",
|
||||
"published": "2024-08-13T18:15:28.957",
|
||||
"lastModified": "2024-08-15T20:40:58.547",
|
||||
"lastModified": "2024-10-22T19:50:21.707",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -71,8 +71,8 @@
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:microsoft:teams:*:*:*:*:*:iphone_os:*:*",
|
||||
"versionEndExcluding": "7.13.0",
|
||||
"matchCriteriaId": "C4E5BAE0-E39F-4B70-8C1C-E57F64B84B03"
|
||||
"versionEndIncluding": "6.19.2",
|
||||
"matchCriteriaId": "1011793E-F407-454B-8C7E-D3D50F716907"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-38212",
|
||||
"sourceIdentifier": "secure@microsoft.com",
|
||||
"published": "2024-10-08T18:15:07.940",
|
||||
"lastModified": "2024-10-10T12:56:30.817",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2024-10-22T19:31:41.350",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -41,8 +41,18 @@
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "secure@microsoft.com",
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "NVD-CWE-noinfo"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "secure@microsoft.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -51,10 +61,75 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:x64:*",
|
||||
"matchCriteriaId": "2127D10C-B6F3-4C1D-B9AA-5D78513CC996"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:x86:*",
|
||||
"matchCriteriaId": "AB425562-C0A0-452E-AABE-F70522F15E1A"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*",
|
||||
"matchCriteriaId": "AF07A81D-12E5-4B1D-BFF9-C8D08C32FF4F"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "A7DF96F8-BA6A-4780-9CA3-F719B3F81074"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "DB18C4CE-5917-401E-ACF7-2747084FD36E"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "10.0.14393.7428",
|
||||
"matchCriteriaId": "AF65E43A-AD45-43C6-A371-7C29C5CA0BA7"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "10.0.17763.6414",
|
||||
"matchCriteriaId": "F003109E-32C0-4044-89D6-2747366E051D"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_server_2022:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "10.0.20348.2762",
|
||||
"matchCriteriaId": "F438CECD-698A-4BDF-8B02-B4FE9E5B86E9"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_server_2022_23h2:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "10.0.25398.1189",
|
||||
"matchCriteriaId": "B3B68BF1-40C7-45E9-BD3C-8CEE104054E9"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38212",
|
||||
"source": "secure@microsoft.com"
|
||||
"source": "secure@microsoft.com",
|
||||
"tags": [
|
||||
"Patch",
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-38261",
|
||||
"sourceIdentifier": "secure@microsoft.com",
|
||||
"published": "2024-10-08T18:15:08.367",
|
||||
"lastModified": "2024-10-10T12:56:30.817",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2024-10-22T19:33:29.160",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -41,8 +41,18 @@
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "secure@microsoft.com",
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "NVD-CWE-noinfo"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "secure@microsoft.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -59,10 +69,75 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:x64:*",
|
||||
"matchCriteriaId": "2127D10C-B6F3-4C1D-B9AA-5D78513CC996"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:x86:*",
|
||||
"matchCriteriaId": "AB425562-C0A0-452E-AABE-F70522F15E1A"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*",
|
||||
"matchCriteriaId": "AF07A81D-12E5-4B1D-BFF9-C8D08C32FF4F"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "A7DF96F8-BA6A-4780-9CA3-F719B3F81074"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "DB18C4CE-5917-401E-ACF7-2747084FD36E"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "10.0.14393.7428",
|
||||
"matchCriteriaId": "AF65E43A-AD45-43C6-A371-7C29C5CA0BA7"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "10.0.17763.6414",
|
||||
"matchCriteriaId": "F003109E-32C0-4044-89D6-2747366E051D"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_server_2022:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "10.0.20348.2762",
|
||||
"matchCriteriaId": "F438CECD-698A-4BDF-8B02-B4FE9E5B86E9"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_server_2022_23h2:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "10.0.25398.1189",
|
||||
"matchCriteriaId": "B3B68BF1-40C7-45E9-BD3C-8CEE104054E9"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38261",
|
||||
"source": "secure@microsoft.com"
|
||||
"source": "secure@microsoft.com",
|
||||
"tags": [
|
||||
"Patch",
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-38265",
|
||||
"sourceIdentifier": "secure@microsoft.com",
|
||||
"published": "2024-10-08T18:15:08.797",
|
||||
"lastModified": "2024-10-10T12:56:30.817",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2024-10-22T19:33:43.260",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -41,8 +41,18 @@
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "secure@microsoft.com",
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "NVD-CWE-noinfo"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "secure@microsoft.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -59,10 +69,75 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:x64:*",
|
||||
"matchCriteriaId": "2127D10C-B6F3-4C1D-B9AA-5D78513CC996"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:x86:*",
|
||||
"matchCriteriaId": "AB425562-C0A0-452E-AABE-F70522F15E1A"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*",
|
||||
"matchCriteriaId": "AF07A81D-12E5-4B1D-BFF9-C8D08C32FF4F"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "A7DF96F8-BA6A-4780-9CA3-F719B3F81074"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "DB18C4CE-5917-401E-ACF7-2747084FD36E"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "10.0.14393.7428",
|
||||
"matchCriteriaId": "AF65E43A-AD45-43C6-A371-7C29C5CA0BA7"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "10.0.17763.6414",
|
||||
"matchCriteriaId": "F003109E-32C0-4044-89D6-2747366E051D"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_server_2022:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "10.0.20348.2762",
|
||||
"matchCriteriaId": "F438CECD-698A-4BDF-8B02-B4FE9E5B86E9"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_server_2022_23h2:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "10.0.25398.1189",
|
||||
"matchCriteriaId": "B3B68BF1-40C7-45E9-BD3C-8CEE104054E9"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38265",
|
||||
"source": "secure@microsoft.com"
|
||||
"source": "secure@microsoft.com",
|
||||
"tags": [
|
||||
"Patch",
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
48
CVE-2024/CVE-2024-397xx/CVE-2024-39753.json
Normal file
48
CVE-2024/CVE-2024-397xx/CVE-2024-39753.json
Normal file
@ -0,0 +1,48 @@
|
||||
{
|
||||
"id": "CVE-2024-39753",
|
||||
"sourceIdentifier": "security@trendmicro.com",
|
||||
"published": "2024-10-22T19:15:04.790",
|
||||
"lastModified": "2024-10-22T19:15:04.790",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "An modOSCE SQL Injection vulnerability in Trend Micro Apex One could allow a remote attacker to execute arbitrary code on affected installations.\r\n\r\nPlease note: an attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security@trendmicro.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "HIGH",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 7.5,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 1.6,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://success.trendmicro.com/en-US/solution/ka-0016669",
|
||||
"source": "security@trendmicro.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.zerodayinitiative.com/advisories/ZDI-24-897/",
|
||||
"source": "security@trendmicro.com"
|
||||
}
|
||||
]
|
||||
}
|
52
CVE-2024/CVE-2024-411xx/CVE-2024-41183.json
Normal file
52
CVE-2024/CVE-2024-411xx/CVE-2024-41183.json
Normal file
@ -0,0 +1,52 @@
|
||||
{
|
||||
"id": "CVE-2024-41183",
|
||||
"sourceIdentifier": "security@trendmicro.com",
|
||||
"published": "2024-10-22T19:15:05.413",
|
||||
"lastModified": "2024-10-22T19:15:05.413",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Trend Micro VPN, version 5.8.1012 and below is vulnerable to an arbitrary file overwrite under specific conditions that can lead to elevation of privileges."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security@trendmicro.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 7.8,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://helpcenter.trendmicro.com/en-us/article/tmka-14460",
|
||||
"source": "security@trendmicro.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.zerodayinitiative.com/advisories/ZDI-24-1022/",
|
||||
"source": "security@trendmicro.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.zerodayinitiative.com/advisories/ZDI-24-1023/",
|
||||
"source": "security@trendmicro.com"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-43453",
|
||||
"sourceIdentifier": "secure@microsoft.com",
|
||||
"published": "2024-10-08T18:15:09.070",
|
||||
"lastModified": "2024-10-10T12:56:30.817",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2024-10-22T19:29:44.997",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -41,8 +41,18 @@
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "secure@microsoft.com",
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "NVD-CWE-noinfo"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "secure@microsoft.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -51,10 +61,75 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:x64:*",
|
||||
"matchCriteriaId": "2127D10C-B6F3-4C1D-B9AA-5D78513CC996"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:x86:*",
|
||||
"matchCriteriaId": "AB425562-C0A0-452E-AABE-F70522F15E1A"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*",
|
||||
"matchCriteriaId": "AF07A81D-12E5-4B1D-BFF9-C8D08C32FF4F"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "A7DF96F8-BA6A-4780-9CA3-F719B3F81074"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "DB18C4CE-5917-401E-ACF7-2747084FD36E"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "10.0.14393.7428",
|
||||
"matchCriteriaId": "AF65E43A-AD45-43C6-A371-7C29C5CA0BA7"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "10.0.17763.6414",
|
||||
"matchCriteriaId": "F003109E-32C0-4044-89D6-2747366E051D"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_server_2022:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "10.0.20348.2762",
|
||||
"matchCriteriaId": "F438CECD-698A-4BDF-8B02-B4FE9E5B86E9"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_server_2022_23h2:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "10.0.25398.1189",
|
||||
"matchCriteriaId": "B3B68BF1-40C7-45E9-BD3C-8CEE104054E9"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-43453",
|
||||
"source": "secure@microsoft.com"
|
||||
"source": "secure@microsoft.com",
|
||||
"tags": [
|
||||
"Patch",
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-43589",
|
||||
"sourceIdentifier": "secure@microsoft.com",
|
||||
"published": "2024-10-08T18:15:26.700",
|
||||
"lastModified": "2024-10-10T12:56:30.817",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2024-10-22T19:29:53.660",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -41,8 +41,18 @@
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "secure@microsoft.com",
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "NVD-CWE-noinfo"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "secure@microsoft.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -51,10 +61,75 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:x64:*",
|
||||
"matchCriteriaId": "2127D10C-B6F3-4C1D-B9AA-5D78513CC996"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:x86:*",
|
||||
"matchCriteriaId": "AB425562-C0A0-452E-AABE-F70522F15E1A"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*",
|
||||
"matchCriteriaId": "AF07A81D-12E5-4B1D-BFF9-C8D08C32FF4F"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "A7DF96F8-BA6A-4780-9CA3-F719B3F81074"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "DB18C4CE-5917-401E-ACF7-2747084FD36E"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "10.0.14393.7428",
|
||||
"matchCriteriaId": "AF65E43A-AD45-43C6-A371-7C29C5CA0BA7"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "10.0.17763.6414",
|
||||
"matchCriteriaId": "F003109E-32C0-4044-89D6-2747366E051D"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_server_2022:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "10.0.20348.2762",
|
||||
"matchCriteriaId": "F438CECD-698A-4BDF-8B02-B4FE9E5B86E9"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_server_2022_23h2:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "10.0.25398.1189",
|
||||
"matchCriteriaId": "B3B68BF1-40C7-45E9-BD3C-8CEE104054E9"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-43589",
|
||||
"source": "secure@microsoft.com"
|
||||
"source": "secure@microsoft.com",
|
||||
"tags": [
|
||||
"Patch",
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-43592",
|
||||
"sourceIdentifier": "secure@microsoft.com",
|
||||
"published": "2024-10-08T18:15:27.327",
|
||||
"lastModified": "2024-10-10T12:56:30.817",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2024-10-22T19:30:02.777",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -41,8 +41,18 @@
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "secure@microsoft.com",
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "NVD-CWE-noinfo"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "secure@microsoft.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -55,10 +65,75 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:x64:*",
|
||||
"matchCriteriaId": "2127D10C-B6F3-4C1D-B9AA-5D78513CC996"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:x86:*",
|
||||
"matchCriteriaId": "AB425562-C0A0-452E-AABE-F70522F15E1A"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*",
|
||||
"matchCriteriaId": "AF07A81D-12E5-4B1D-BFF9-C8D08C32FF4F"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "A7DF96F8-BA6A-4780-9CA3-F719B3F81074"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "DB18C4CE-5917-401E-ACF7-2747084FD36E"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "10.0.14393.7428",
|
||||
"matchCriteriaId": "AF65E43A-AD45-43C6-A371-7C29C5CA0BA7"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "10.0.17763.6414",
|
||||
"matchCriteriaId": "F003109E-32C0-4044-89D6-2747366E051D"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_server_2022:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "10.0.20348.2762",
|
||||
"matchCriteriaId": "F438CECD-698A-4BDF-8B02-B4FE9E5B86E9"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_server_2022_23h2:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "10.0.25398.1189",
|
||||
"matchCriteriaId": "B3B68BF1-40C7-45E9-BD3C-8CEE104054E9"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-43592",
|
||||
"source": "secure@microsoft.com"
|
||||
"source": "secure@microsoft.com",
|
||||
"tags": [
|
||||
"Patch",
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-43593",
|
||||
"sourceIdentifier": "secure@microsoft.com",
|
||||
"published": "2024-10-08T18:15:27.553",
|
||||
"lastModified": "2024-10-10T12:56:30.817",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2024-10-22T19:30:19.870",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -41,8 +41,18 @@
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "secure@microsoft.com",
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "NVD-CWE-noinfo"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "secure@microsoft.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -55,10 +65,75 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:x64:*",
|
||||
"matchCriteriaId": "2127D10C-B6F3-4C1D-B9AA-5D78513CC996"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:x86:*",
|
||||
"matchCriteriaId": "AB425562-C0A0-452E-AABE-F70522F15E1A"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*",
|
||||
"matchCriteriaId": "AF07A81D-12E5-4B1D-BFF9-C8D08C32FF4F"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "A7DF96F8-BA6A-4780-9CA3-F719B3F81074"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "DB18C4CE-5917-401E-ACF7-2747084FD36E"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "10.0.14393.7428",
|
||||
"matchCriteriaId": "AF65E43A-AD45-43C6-A371-7C29C5CA0BA7"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "10.0.17763.6414",
|
||||
"matchCriteriaId": "F003109E-32C0-4044-89D6-2747366E051D"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_server_2022:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "10.0.20348.2762",
|
||||
"matchCriteriaId": "F438CECD-698A-4BDF-8B02-B4FE9E5B86E9"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_server_2022_23h2:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "10.0.25398.1189",
|
||||
"matchCriteriaId": "B3B68BF1-40C7-45E9-BD3C-8CEE104054E9"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-43593",
|
||||
"source": "secure@microsoft.com"
|
||||
"source": "secure@microsoft.com",
|
||||
"tags": [
|
||||
"Patch",
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-43607",
|
||||
"sourceIdentifier": "secure@microsoft.com",
|
||||
"published": "2024-10-08T18:15:28.597",
|
||||
"lastModified": "2024-10-10T12:56:30.817",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2024-10-22T19:03:17.993",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -41,8 +41,18 @@
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "secure@microsoft.com",
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "NVD-CWE-noinfo"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "secure@microsoft.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -51,10 +61,75 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:x64:*",
|
||||
"matchCriteriaId": "2127D10C-B6F3-4C1D-B9AA-5D78513CC996"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:x86:*",
|
||||
"matchCriteriaId": "AB425562-C0A0-452E-AABE-F70522F15E1A"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*",
|
||||
"matchCriteriaId": "AF07A81D-12E5-4B1D-BFF9-C8D08C32FF4F"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "A7DF96F8-BA6A-4780-9CA3-F719B3F81074"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "DB18C4CE-5917-401E-ACF7-2747084FD36E"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "10.0.14393.7428",
|
||||
"matchCriteriaId": "AF65E43A-AD45-43C6-A371-7C29C5CA0BA7"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "10.0.17763.6414",
|
||||
"matchCriteriaId": "F003109E-32C0-4044-89D6-2747366E051D"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_server_2022:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "10.0.20348.2762",
|
||||
"matchCriteriaId": "F438CECD-698A-4BDF-8B02-B4FE9E5B86E9"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_server_2022_23h2:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "10.0.25398.1189",
|
||||
"matchCriteriaId": "B3B68BF1-40C7-45E9-BD3C-8CEE104054E9"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-43607",
|
||||
"source": "secure@microsoft.com"
|
||||
"source": "secure@microsoft.com",
|
||||
"tags": [
|
||||
"Patch",
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-43608",
|
||||
"sourceIdentifier": "secure@microsoft.com",
|
||||
"published": "2024-10-08T18:15:28.813",
|
||||
"lastModified": "2024-10-10T12:56:30.817",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2024-10-22T18:58:04.887",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -40,6 +40,16 @@
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "NVD-CWE-noinfo"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "secure@microsoft.com",
|
||||
"type": "Secondary",
|
||||
@ -51,10 +61,75 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:x64:*",
|
||||
"matchCriteriaId": "2127D10C-B6F3-4C1D-B9AA-5D78513CC996"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:x86:*",
|
||||
"matchCriteriaId": "AB425562-C0A0-452E-AABE-F70522F15E1A"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*",
|
||||
"matchCriteriaId": "AF07A81D-12E5-4B1D-BFF9-C8D08C32FF4F"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "A7DF96F8-BA6A-4780-9CA3-F719B3F81074"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "DB18C4CE-5917-401E-ACF7-2747084FD36E"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "10.0.14393.7428",
|
||||
"matchCriteriaId": "AF65E43A-AD45-43C6-A371-7C29C5CA0BA7"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "10.0.17763.6414",
|
||||
"matchCriteriaId": "F003109E-32C0-4044-89D6-2747366E051D"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_server_2022:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "10.0.20348.2762",
|
||||
"matchCriteriaId": "F438CECD-698A-4BDF-8B02-B4FE9E5B86E9"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_server_2022_23h2:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "10.0.25398.1189",
|
||||
"matchCriteriaId": "B3B68BF1-40C7-45E9-BD3C-8CEE104054E9"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-43608",
|
||||
"source": "secure@microsoft.com"
|
||||
"source": "secure@microsoft.com",
|
||||
"tags": [
|
||||
"Patch",
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
44
CVE-2024/CVE-2024-453xx/CVE-2024-45334.json
Normal file
44
CVE-2024/CVE-2024-453xx/CVE-2024-45334.json
Normal file
@ -0,0 +1,44 @@
|
||||
{
|
||||
"id": "CVE-2024-45334",
|
||||
"sourceIdentifier": "security@trendmicro.com",
|
||||
"published": "2024-10-22T19:15:05.670",
|
||||
"lastModified": "2024-10-22T19:15:05.670",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Trend Micro Antivirus One versions 3.10.4 and below (Consumer) is vulnerable to an Arbitrary Configuration Update that could allow unauthorized access to product configurations and functions."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security@trendmicro.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "HIGH",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 7.8,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 1.1,
|
||||
"impactScore": 6.0
|
||||
}
|
||||
]
|
||||
},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://helpcenter.trendmicro.com/en-us/article/TMKA-14461",
|
||||
"source": "security@trendmicro.com"
|
||||
}
|
||||
]
|
||||
}
|
44
CVE-2024/CVE-2024-453xx/CVE-2024-45335.json
Normal file
44
CVE-2024/CVE-2024-453xx/CVE-2024-45335.json
Normal file
@ -0,0 +1,44 @@
|
||||
{
|
||||
"id": "CVE-2024-45335",
|
||||
"sourceIdentifier": "security@trendmicro.com",
|
||||
"published": "2024-10-22T19:15:05.840",
|
||||
"lastModified": "2024-10-22T19:15:05.840",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Trend Micro Antivirus One, version 3.10.4 and below contains a vulnerability that could allow an attacker to use a specifically crafted virus to allow itself to bypass and evade a virus scan detection."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security@trendmicro.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H",
|
||||
"attackVector": "ADJACENT_NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "HIGH",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 8.4,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 1.7,
|
||||
"impactScore": 6.0
|
||||
}
|
||||
]
|
||||
},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://helpcenter.trendmicro.com/en-us/article/tmka-07255",
|
||||
"source": "security@trendmicro.com"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-45518",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-10-22T17:15:03.837",
|
||||
"lastModified": "2024-10-22T17:15:03.837",
|
||||
"lastModified": "2024-10-22T18:35:04.347",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -11,7 +11,42 @@
|
||||
"value": "An issue was discovered in Zimbra Collaboration (ZCS) 10.1.x before 10.1.1, 10.0.x before 10.0.9, 9.0.0 before Patch 41, and 8.8.15 before Patch 46. It allows authenticated users to exploit Server-Side Request Forgery (SSRF) due to improper input sanitization and misconfigured domain whitelisting. This issue permits unauthorized HTTP requests to be sent to internal services, which can lead to Remote Code Execution (RCE) by chaining Command Injection within the internal service. When combined with existing XSS vulnerabilities, this SSRF issue can further facilitate Remote Code Execution (RCE)."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "HIGH",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 7.5,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 1.6,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-918"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://wiki.zimbra.com/wiki/Security_Center",
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-46237",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-10-09T14:15:07.393",
|
||||
"lastModified": "2024-10-21T19:15:03.277",
|
||||
"lastModified": "2024-10-22T18:35:05.180",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -36,6 +36,26 @@
|
||||
},
|
||||
"exploitabilityScore": 2.3,
|
||||
"impactScore": 2.7
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "HIGH",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 4.8,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 1.7,
|
||||
"impactScore": 2.7
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -49,6 +69,16 @@
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-46240",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-10-22T16:15:07.407",
|
||||
"lastModified": "2024-10-22T16:15:07.407",
|
||||
"lastModified": "2024-10-22T18:35:05.950",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -11,7 +11,42 @@
|
||||
"value": "Collabtive 3.1 is vulnerable to Cross-site scripting (XSS) via the name parameter under action=system and the company/contact parameters under action=addcust within admin.php file."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "HIGH",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 4.8,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 1.7,
|
||||
"impactScore": 2.7
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/anoncoder01/Collabtive_StoredXSS/blob/master/vulnerabilities/XSS1.md",
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-46326",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-10-21T20:15:14.637",
|
||||
"lastModified": "2024-10-21T20:15:14.637",
|
||||
"lastModified": "2024-10-22T18:35:06.717",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -11,7 +11,42 @@
|
||||
"value": "Public Knowledge Project pkp-lib 3.4.0-7 and earlier is vulnerable to Open redirect due to a lack of input sanitization in the logout function."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 6.1,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 2.7
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-601"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://drive.google.com/file/d/1AVVw1aibDPBHakU8eTpCA6hna5Ecg2UJ/view",
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-46528",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-10-14T18:15:03.847",
|
||||
"lastModified": "2024-10-22T13:35:02.157",
|
||||
"lastModified": "2024-10-22T19:35:08.350",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -22,20 +22,20 @@
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 6.5,
|
||||
"baseScore": 4.3,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 3.6
|
||||
"impactScore": 1.4
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-46538",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-10-22T17:15:03.950",
|
||||
"lastModified": "2024-10-22T17:15:03.950",
|
||||
"lastModified": "2024-10-22T19:35:08.563",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -11,7 +11,42 @@
|
||||
"value": "A cross-site scripting (XSS) vulnerability in pfsense v2.5.2 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the $pconfig variable at interfaces_groups_edit.php."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 9.3,
|
||||
"baseSeverity": "CRITICAL"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 5.8
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/physicszq/web_issue/blob/main/pfsense/interfaces_groups_edit_file.md_xss.md",
|
||||
|
60
CVE-2024/CVE-2024-469xx/CVE-2024-46902.json
Normal file
60
CVE-2024/CVE-2024-469xx/CVE-2024-46902.json
Normal file
@ -0,0 +1,60 @@
|
||||
{
|
||||
"id": "CVE-2024-46902",
|
||||
"sourceIdentifier": "security@trendmicro.com",
|
||||
"published": "2024-10-22T19:15:06.130",
|
||||
"lastModified": "2024-10-22T19:35:09.313",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A vulnerability in Trend Micro Deep Discovery Inspector (DDI) versions 5.8 and above could allow an attacker to disclose sensitive information affected installations.\r\n\r\nPlease note: an attacker must first obtain the ability to execute high-privileged code (admin user rights) on the target system in order to exploit this vulnerability."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security@trendmicro.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H",
|
||||
"attackVector": "ADJACENT_NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "HIGH",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 8.4,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 1.7,
|
||||
"impactScore": 6.0
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-89"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://success.trendmicro.com/en-US/solution/KA-0017793",
|
||||
"source": "security@trendmicro.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.zerodayinitiative.com/advisories/ZDI-24-1227/",
|
||||
"source": "security@trendmicro.com"
|
||||
}
|
||||
]
|
||||
}
|
48
CVE-2024/CVE-2024-469xx/CVE-2024-46903.json
Normal file
48
CVE-2024/CVE-2024-469xx/CVE-2024-46903.json
Normal file
@ -0,0 +1,48 @@
|
||||
{
|
||||
"id": "CVE-2024-46903",
|
||||
"sourceIdentifier": "security@trendmicro.com",
|
||||
"published": "2024-10-22T19:15:06.283",
|
||||
"lastModified": "2024-10-22T19:15:06.283",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A vulnerability in Trend Micro Deep Discovery Inspector (DDI) versions 5.8 and above could allow an attacker to disclose sensitive information affected installations.\r\n\r\nPlease note: an attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security@trendmicro.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 6.5,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://success.trendmicro.com/en-US/solution/KA-0017793",
|
||||
"source": "security@trendmicro.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.zerodayinitiative.com/advisories/ZDI-24-1228/",
|
||||
"source": "security@trendmicro.com"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-47223",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-10-21T20:15:14.770",
|
||||
"lastModified": "2024-10-21T20:15:14.770",
|
||||
"lastModified": "2024-10-22T18:35:07.540",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -11,7 +11,42 @@
|
||||
"value": "A vulnerability in the AWV (Audio, Web and Video Conferencing) component of Mitel MiCollab through 9.8 SP1 FP2 (9.8.1.201) could allow an unauthenticated attacker to conduct a SQL injection attack due to insufficient sanitization of user input. A successful exploit could allow an attacker to access non-sensitive user provisioning information and execute arbitrary SQL database commands."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 9.4,
|
||||
"baseSeverity": "CRITICAL"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.5
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-89"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.mitel.com/support/security-advisories/mitel-product-security-advisory-misa-2024-0028",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-47634",
|
||||
"sourceIdentifier": "audit@patchstack.com",
|
||||
"published": "2024-10-20T11:15:02.217",
|
||||
"lastModified": "2024-10-21T17:09:45.417",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-10-22T18:46:02.253",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -17,6 +17,26 @@
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
},
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Secondary",
|
||||
@ -51,10 +71,31 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:majas-lapu-izstrade:cartbounty:*:*:*:*:*:wordpress:*:*",
|
||||
"versionEndExcluding": "8.2.1",
|
||||
"matchCriteriaId": "53D63AC8-FD00-4523-9FAD-533AB0854E02"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://patchstack.com/database/vulnerability/woo-save-abandoned-carts/wordpress-cartbounty-plugin-8-2-cross-site-request-forgery-csrf-vulnerability?_s_id=cve",
|
||||
"source": "audit@patchstack.com"
|
||||
"source": "audit@patchstack.com",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-47912",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-10-21T20:15:14.877",
|
||||
"lastModified": "2024-10-21T20:15:14.877",
|
||||
"lastModified": "2024-10-22T18:35:08.360",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -11,7 +11,42 @@
|
||||
"value": "A vulnerability in the AWV (Audio, Web, and Video) Conferencing component of Mitel MiCollab through 9.8 SP1 FP2 (9.8.1.201) could allow an unauthenticated attacker to perform unauthorized data-access attacks due to missing authentication mechanisms. A successful exploit could allow an attacker to access and delete sensitive information."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 8.2,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 4.2
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-306"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.mitel.com/support/security-advisories/mitel-product-security-advisory-misa-2024-0027",
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-48570",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-10-22T17:15:04.087",
|
||||
"lastModified": "2024-10-22T17:15:04.087",
|
||||
"lastModified": "2024-10-22T19:35:10.083",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -11,7 +11,42 @@
|
||||
"value": "Client Management System 1.0 was discovered to contain a SQL injection vulnerability via the Between Dates Reports parameter at /admin/bwdates-reports-ds.php."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 7.5,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-89"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/Luc1f3r066/Client-Management-System-v1.0-",
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-48605",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-10-22T16:15:07.757",
|
||||
"lastModified": "2024-10-22T16:15:07.757",
|
||||
"lastModified": "2024-10-22T18:35:09.113",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -11,7 +11,42 @@
|
||||
"value": "An issue in Helakuru Desktop Application v1.1 allows a local attacker to execute arbitrary code via the lack of proper validation of the wow64log.dll file."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 7.8,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-427"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://clement.notin.org/blog/2020/09/12/CVE-2020-7315-McAfee-Agent-DLL-injection/",
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-48659",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-10-21T20:15:15.260",
|
||||
"lastModified": "2024-10-21T20:15:15.260",
|
||||
"lastModified": "2024-10-22T18:35:09.947",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -11,7 +11,42 @@
|
||||
"value": "An issue in DCME-320-L <=9.3.2.114 allows a remote attacker to execute arbitrary code via the log_u_umount.php component."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-77"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://gist.github.com/CLan-nad/a879f7696a58656b384c46bf4ba74e80",
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-48706",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-10-22T17:15:04.180",
|
||||
"lastModified": "2024-10-22T17:15:04.180",
|
||||
"lastModified": "2024-10-22T19:35:10.843",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -11,7 +11,30 @@
|
||||
"value": "Collabtive 3.1 is vulnerable to Cross-site scripting (XSS) via the title parameter with action=add or action=editform within the (a) managemessage.php file and (b) managetask.php file respectively."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 5.4,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.3,
|
||||
"impactScore": 2.7
|
||||
}
|
||||
]
|
||||
},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/anoncoder01/Collabtive_StoredXSS/blob/master/vulnerabilities/XSS2.md",
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-48707",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-10-22T17:15:04.273",
|
||||
"lastModified": "2024-10-22T17:15:04.273",
|
||||
"lastModified": "2024-10-22T19:35:11.020",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -11,7 +11,42 @@
|
||||
"value": "Collabtive 3.1 is vulnerable to Cross-site scripting (XSS) via the name parameter under (a) action=add or action=edit within managemilestone.php file and (b) action=addpro within admin.php file."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 5.4,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.3,
|
||||
"impactScore": 2.7
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/anoncoder01/Collabtive_StoredXSS/blob/master/vulnerabilities/XSS3.md",
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-48708",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-10-22T17:15:04.370",
|
||||
"lastModified": "2024-10-22T17:15:04.370",
|
||||
"lastModified": "2024-10-22T19:35:11.790",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -11,7 +11,42 @@
|
||||
"value": "Collabtive 3.1 is vulnerable to Cross-Site Scripting (XSS) via the name parameter in (a) file tasklist.php under action = add/edit and in (b) file admin.php under action = adduser/edituser."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 5.4,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.3,
|
||||
"impactScore": 2.7
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/anoncoder01/Collabtive_StoredXSS/blob/master/vulnerabilities/XSS4.md",
|
||||
|
48
CVE-2024/CVE-2024-489xx/CVE-2024-48903.json
Normal file
48
CVE-2024/CVE-2024-489xx/CVE-2024-48903.json
Normal file
@ -0,0 +1,48 @@
|
||||
{
|
||||
"id": "CVE-2024-48903",
|
||||
"sourceIdentifier": "security@trendmicro.com",
|
||||
"published": "2024-10-22T19:15:06.590",
|
||||
"lastModified": "2024-10-22T19:15:06.590",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "An improper access control vulnerability in Trend Micro Deep Security Agent 20 could allow a local attacker to escalate privileges on affected installations.\r\n\r\nPlease note: an attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security@trendmicro.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 7.8,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://success.trendmicro.com/en-US/solution/KA-0017997",
|
||||
"source": "security@trendmicro.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.zerodayinitiative.com/advisories/ZDI-24-1419/",
|
||||
"source": "security@trendmicro.com"
|
||||
}
|
||||
]
|
||||
}
|
60
CVE-2024/CVE-2024-489xx/CVE-2024-48904.json
Normal file
60
CVE-2024/CVE-2024-489xx/CVE-2024-48904.json
Normal file
@ -0,0 +1,60 @@
|
||||
{
|
||||
"id": "CVE-2024-48904",
|
||||
"sourceIdentifier": "security@trendmicro.com",
|
||||
"published": "2024-10-22T19:15:06.763",
|
||||
"lastModified": "2024-10-22T19:35:12.560",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "An command injection vulnerability in Trend Micro Cloud Edge could allow a remote attacker to execute arbitrary code on affected appliances.\r\n\r\nPlease note: authentication is not required in order to exploit this vulnerability."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security@trendmicro.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-77"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://success.trendmicro.com/en-US/solution/KA-0017998",
|
||||
"source": "security@trendmicro.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.zerodayinitiative.com/advisories/ZDI-24-1418/",
|
||||
"source": "security@trendmicro.com"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-49250",
|
||||
"sourceIdentifier": "audit@patchstack.com",
|
||||
"published": "2024-10-20T11:15:02.437",
|
||||
"lastModified": "2024-10-21T17:09:45.417",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-10-22T18:44:20.297",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -17,6 +17,26 @@
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 8.8,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 5.9
|
||||
},
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Secondary",
|
||||
@ -51,10 +71,31 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:dublue:table_of_contents_plus:*:*:*:*:*:wordpress:*:*",
|
||||
"versionEndIncluding": "2408",
|
||||
"matchCriteriaId": "84C27B98-4BAC-4BEF-A012-173DE7466A86"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://patchstack.com/database/vulnerability/table-of-contents-plus/wordpress-table-of-contents-plus-plugin-2408-cross-site-request-forgery-csrf-vulnerability?_s_id=cve",
|
||||
"source": "audit@patchstack.com"
|
||||
"source": "audit@patchstack.com",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-49272",
|
||||
"sourceIdentifier": "audit@patchstack.com",
|
||||
"published": "2024-10-20T11:15:02.650",
|
||||
"lastModified": "2024-10-21T17:09:45.417",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-10-22T18:40:40.787",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -17,6 +17,26 @@
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 8.8,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 5.9
|
||||
},
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Secondary",
|
||||
@ -51,10 +71,31 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:wpwebinfotech:social_auto_poster:*:*:*:*:*:wordpress:*:*",
|
||||
"versionEndExcluding": "5.3.16",
|
||||
"matchCriteriaId": "73977B48-39F9-4362-846E-BC190124222F"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://patchstack.com/database/vulnerability/social-auto-poster/wordpress-social-auto-poster-plugin-5-3-15-cross-site-request-forgery-csrf-vulnerability?_s_id=cve",
|
||||
"source": "audit@patchstack.com"
|
||||
"source": "audit@patchstack.com",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-49274",
|
||||
"sourceIdentifier": "audit@patchstack.com",
|
||||
"published": "2024-10-20T11:15:02.863",
|
||||
"lastModified": "2024-10-21T17:09:45.417",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-10-22T18:39:19.980",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -17,6 +17,26 @@
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 8.8,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 5.9
|
||||
},
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Secondary",
|
||||
@ -51,10 +71,31 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:infomaniak:vod_infomaniak:*:*:*:*:*:wordpress:*:*",
|
||||
"versionEndExcluding": "1.5.8",
|
||||
"matchCriteriaId": "38C63CC0-4D2C-4879-9EB1-A917F74A1530"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://patchstack.com/database/vulnerability/vod-infomaniak/wordpress-vod-infomaniak-plugin-1-5-7-cross-site-request-forgery-csrf-vulnerability?_s_id=cve",
|
||||
"source": "audit@patchstack.com"
|
||||
"source": "audit@patchstack.com",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-49275",
|
||||
"sourceIdentifier": "audit@patchstack.com",
|
||||
"published": "2024-10-20T11:15:03.063",
|
||||
"lastModified": "2024-10-21T17:09:45.417",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-10-22T18:36:53.817",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -17,6 +17,26 @@
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 8.8,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 5.9
|
||||
},
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Secondary",
|
||||
@ -40,6 +60,16 @@
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-352"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Secondary",
|
||||
@ -51,10 +81,31 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:northernbeacheswebsites:ideapush:*:*:*:*:*:wordpress:*:*",
|
||||
"versionEndExcluding": "8.71",
|
||||
"matchCriteriaId": "62E514BB-CFD1-4B7B-A9FF-DF0E14115978"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://patchstack.com/database/vulnerability/ideapush/wordpress-ideapush-plugin-8-69-cross-site-request-forgery-csrf-vulnerability?_s_id=cve",
|
||||
"source": "audit@patchstack.com"
|
||||
"source": "audit@patchstack.com",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-49290",
|
||||
"sourceIdentifier": "audit@patchstack.com",
|
||||
"published": "2024-10-20T11:15:03.260",
|
||||
"lastModified": "2024-10-21T17:09:45.417",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-10-22T18:35:55.413",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -17,6 +17,26 @@
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 8.8,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 5.9
|
||||
},
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Secondary",
|
||||
@ -51,10 +71,31 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:boxystudio:cooked:*:*:*:*:pro:wordpress:*:*",
|
||||
"versionEndExcluding": "1.8.0",
|
||||
"matchCriteriaId": "E159E2EA-7AE0-461F-ACD7-7DA68EF90D1B"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://patchstack.com/database/vulnerability/cooked-pro/wordpress-cooked-pro-plugin-1-8-0-cross-site-request-forgery-csrf-vulnerability?_s_id=cve",
|
||||
"source": "audit@patchstack.com"
|
||||
"source": "audit@patchstack.com",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-49306",
|
||||
"sourceIdentifier": "audit@patchstack.com",
|
||||
"published": "2024-10-20T11:15:03.460",
|
||||
"lastModified": "2024-10-21T17:09:45.417",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-10-22T18:35:46.107",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -17,6 +17,26 @@
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 8.8,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 5.9
|
||||
},
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Secondary",
|
||||
@ -51,10 +71,31 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:wp-buy:wp_content_copy_protection_\\&_no_right_click:*:*:*:*:*:wordpress:*:*",
|
||||
"versionEndExcluding": "3.6.1",
|
||||
"matchCriteriaId": "4CEFF6E1-637B-42DB-879E-4A5563E9BA69"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://patchstack.com/database/vulnerability/wp-content-copy-protector/wordpress-wp-content-copy-protection-no-right-click-plugin-3-5-9-cross-site-request-forgery-csrf-vulnerability?_s_id=cve",
|
||||
"source": "audit@patchstack.com"
|
||||
"source": "audit@patchstack.com",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-49325",
|
||||
"sourceIdentifier": "audit@patchstack.com",
|
||||
"published": "2024-10-20T11:15:03.657",
|
||||
"lastModified": "2024-10-21T17:09:45.417",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-10-22T18:33:59.793",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -17,6 +17,26 @@
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 8.8,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 5.9
|
||||
},
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Secondary",
|
||||
@ -51,10 +71,31 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:wpdiscover:photo_gallery_builder:*:*:*:*:*:wordpress:*:*",
|
||||
"versionEndIncluding": "3.0",
|
||||
"matchCriteriaId": "FFFF6178-3F61-4322-B9CD-CD49500FCFEE"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://patchstack.com/database/vulnerability/photo-gallery-builder/wordpress-photo-gallery-builder-plugin-3-0-broken-access-control-to-notice-dismissal-vulnerability?_s_id=cve",
|
||||
"source": "audit@patchstack.com"
|
||||
"source": "audit@patchstack.com",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-49619",
|
||||
"sourceIdentifier": "audit@patchstack.com",
|
||||
"published": "2024-10-20T10:15:05.560",
|
||||
"lastModified": "2024-10-21T17:09:45.417",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-10-22T18:48:11.110",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -17,6 +17,26 @@
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 8.8,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 5.9
|
||||
},
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Secondary",
|
||||
@ -40,6 +60,16 @@
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-89"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Secondary",
|
||||
@ -51,10 +81,31 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:acespritech:social_link_groups:*:*:*:*:*:wordpress:*:*",
|
||||
"versionEndIncluding": "1.1.0",
|
||||
"matchCriteriaId": "5B7C03BF-F3E7-4E50-A08B-BF1D151B4582"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://patchstack.com/database/vulnerability/social-link-groups/wordpress-social-link-groups-plugin-1-1-0-sql-injection-vulnerability?_s_id=cve",
|
||||
"source": "audit@patchstack.com"
|
||||
"source": "audit@patchstack.com",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-49620",
|
||||
"sourceIdentifier": "audit@patchstack.com",
|
||||
"published": "2024-10-20T10:15:05.770",
|
||||
"lastModified": "2024-10-21T17:09:45.417",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-10-22T18:50:07.957",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -17,6 +17,26 @@
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 8.8,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 5.9
|
||||
},
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Secondary",
|
||||
@ -51,10 +71,31 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:naudinvladimir:ferma.ru.net:*:*:*:*:*:wordpress:*:*",
|
||||
"versionEndIncluding": "1.3.3",
|
||||
"matchCriteriaId": "D3280ADF-C076-40C9-88C6-23A90EF37EA7"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://patchstack.com/database/vulnerability/ferma-ru-net-checkout/wordpress-ferma-ru-net-plugin-1-3-3-sql-injection-vulnerability?_s_id=cve",
|
||||
"source": "audit@patchstack.com"
|
||||
"source": "audit@patchstack.com",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-49627",
|
||||
"sourceIdentifier": "audit@patchstack.com",
|
||||
"published": "2024-10-20T11:15:03.873",
|
||||
"lastModified": "2024-10-21T17:09:45.417",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-10-22T18:33:16.137",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -17,6 +17,26 @@
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 8.8,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 5.9
|
||||
},
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Secondary",
|
||||
@ -51,10 +71,31 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:noorsplugin:wordpress_image_seo:*:*:*:*:*:wordpress:*:*",
|
||||
"versionEndIncluding": "1.1.4",
|
||||
"matchCriteriaId": "4708F0CC-BD1A-4EAC-B180-0E39787CE4F7"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://patchstack.com/database/vulnerability/wp-image-seo/wordpress-wordpress-image-seo-plugin-1-1-4-cross-site-request-forgery-csrf-vulnerability?_s_id=cve",
|
||||
"source": "audit@patchstack.com"
|
||||
"source": "audit@patchstack.com",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-49628",
|
||||
"sourceIdentifier": "audit@patchstack.com",
|
||||
"published": "2024-10-20T11:15:04.077",
|
||||
"lastModified": "2024-10-21T17:09:45.417",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-10-22T18:31:22.643",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -17,6 +17,26 @@
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 8.8,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 5.9
|
||||
},
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Secondary",
|
||||
@ -51,10 +71,31 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:whiletrue:most_and_least_read_posts_widget:*:*:*:*:*:wordpress:*:*",
|
||||
"versionEndExcluding": "2.5.19",
|
||||
"matchCriteriaId": "91DB628B-2C61-4EFB-AA0C-0BBA609FEA69"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://patchstack.com/database/vulnerability/most-and-least-read-posts-widget/wordpress-most-and-least-read-posts-widget-plugin-2-5-18-cross-site-request-forgery-csrf-vulnerability?_s_id=cve",
|
||||
"source": "audit@patchstack.com"
|
||||
"source": "audit@patchstack.com",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-49629",
|
||||
"sourceIdentifier": "audit@patchstack.com",
|
||||
"published": "2024-10-20T10:15:05.990",
|
||||
"lastModified": "2024-10-21T17:09:45.417",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-10-22T18:57:42.743",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -17,6 +17,26 @@
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 6.1,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 2.7
|
||||
},
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Secondary",
|
||||
@ -51,10 +71,31 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:androidbubbles:endless_posts_navigation:*:*:*:*:*:wordpress:*:*",
|
||||
"versionEndExcluding": "2.2.8",
|
||||
"matchCriteriaId": "39451C5A-B6BD-4C12-92AB-0271B814BD5E"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://patchstack.com/database/vulnerability/endless-posts-navigation/wordpress-endless-posts-navigation-plugin-2-2-7-csrf-to-stored-xss-vulnerability?_s_id=cve",
|
||||
"source": "audit@patchstack.com"
|
||||
"source": "audit@patchstack.com",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-50312",
|
||||
"sourceIdentifier": "secalert@redhat.com",
|
||||
"published": "2024-10-22T14:15:19.973",
|
||||
"lastModified": "2024-10-22T14:15:19.973",
|
||||
"lastModified": "2024-10-22T18:35:11.263",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -12,6 +12,28 @@
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 5.3,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 1.4
|
||||
}
|
||||
],
|
||||
"cvssMetricV30": [
|
||||
{
|
||||
"source": "secalert@redhat.com",
|
||||
|
91
README.md
91
README.md
@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours.
|
||||
### Last Repository Update
|
||||
|
||||
```plain
|
||||
2024-10-22T18:00:41.619481+00:00
|
||||
2024-10-22T20:00:34.470852+00:00
|
||||
```
|
||||
|
||||
### Most recent CVE Modification Timestamp synchronized with NVD
|
||||
|
||||
```plain
|
||||
2024-10-22T17:51:08.113000+00:00
|
||||
2024-10-22T19:50:21.707000+00:00
|
||||
```
|
||||
|
||||
### Last Data Feed Release
|
||||
@ -33,66 +33,53 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
|
||||
### Total Number of included CVEs
|
||||
|
||||
```plain
|
||||
266733
|
||||
266742
|
||||
```
|
||||
|
||||
### CVEs added in the last Commit
|
||||
|
||||
Recently added CVEs: `22`
|
||||
Recently added CVEs: `9`
|
||||
|
||||
- [CVE-2022-23861](CVE-2022/CVE-2022-238xx/CVE-2022-23861.json) (`2024-10-22T16:15:04.897`)
|
||||
- [CVE-2022-23862](CVE-2022/CVE-2022-238xx/CVE-2022-23862.json) (`2024-10-22T16:15:05.443`)
|
||||
- [CVE-2024-45518](CVE-2024/CVE-2024-455xx/CVE-2024-45518.json) (`2024-10-22T17:15:03.837`)
|
||||
- [CVE-2024-46240](CVE-2024/CVE-2024-462xx/CVE-2024-46240.json) (`2024-10-22T16:15:07.407`)
|
||||
- [CVE-2024-46538](CVE-2024/CVE-2024-465xx/CVE-2024-46538.json) (`2024-10-22T17:15:03.950`)
|
||||
- [CVE-2024-47819](CVE-2024/CVE-2024-478xx/CVE-2024-47819.json) (`2024-10-22T16:15:07.500`)
|
||||
- [CVE-2024-48570](CVE-2024/CVE-2024-485xx/CVE-2024-48570.json) (`2024-10-22T17:15:04.087`)
|
||||
- [CVE-2024-48605](CVE-2024/CVE-2024-486xx/CVE-2024-48605.json) (`2024-10-22T16:15:07.757`)
|
||||
- [CVE-2024-48706](CVE-2024/CVE-2024-487xx/CVE-2024-48706.json) (`2024-10-22T17:15:04.180`)
|
||||
- [CVE-2024-48707](CVE-2024/CVE-2024-487xx/CVE-2024-48707.json) (`2024-10-22T17:15:04.273`)
|
||||
- [CVE-2024-48708](CVE-2024/CVE-2024-487xx/CVE-2024-48708.json) (`2024-10-22T17:15:04.370`)
|
||||
- [CVE-2024-48925](CVE-2024/CVE-2024-489xx/CVE-2024-48925.json) (`2024-10-22T16:15:07.853`)
|
||||
- [CVE-2024-48926](CVE-2024/CVE-2024-489xx/CVE-2024-48926.json) (`2024-10-22T16:15:08.090`)
|
||||
- [CVE-2024-48927](CVE-2024/CVE-2024-489xx/CVE-2024-48927.json) (`2024-10-22T16:15:08.360`)
|
||||
- [CVE-2024-48929](CVE-2024/CVE-2024-489xx/CVE-2024-48929.json) (`2024-10-22T16:15:08.617`)
|
||||
- [CVE-2024-49208](CVE-2024/CVE-2024-492xx/CVE-2024-49208.json) (`2024-10-22T17:15:04.503`)
|
||||
- [CVE-2024-49209](CVE-2024/CVE-2024-492xx/CVE-2024-49209.json) (`2024-10-22T17:15:05.763`)
|
||||
- [CVE-2024-49210](CVE-2024/CVE-2024-492xx/CVE-2024-49210.json) (`2024-10-22T17:15:05.970`)
|
||||
- [CVE-2024-49211](CVE-2024/CVE-2024-492xx/CVE-2024-49211.json) (`2024-10-22T17:15:06.193`)
|
||||
- [CVE-2024-49373](CVE-2024/CVE-2024-493xx/CVE-2024-49373.json) (`2024-10-22T16:15:08.860`)
|
||||
- [CVE-2024-9129](CVE-2024/CVE-2024-91xx/CVE-2024-9129.json) (`2024-10-22T17:15:06.557`)
|
||||
- [CVE-2024-9287](CVE-2024/CVE-2024-92xx/CVE-2024-9287.json) (`2024-10-22T17:15:06.697`)
|
||||
- [CVE-2024-10183](CVE-2024/CVE-2024-101xx/CVE-2024-10183.json) (`2024-10-22T18:15:03.827`)
|
||||
- [CVE-2024-39753](CVE-2024/CVE-2024-397xx/CVE-2024-39753.json) (`2024-10-22T19:15:04.790`)
|
||||
- [CVE-2024-41183](CVE-2024/CVE-2024-411xx/CVE-2024-41183.json) (`2024-10-22T19:15:05.413`)
|
||||
- [CVE-2024-45334](CVE-2024/CVE-2024-453xx/CVE-2024-45334.json) (`2024-10-22T19:15:05.670`)
|
||||
- [CVE-2024-45335](CVE-2024/CVE-2024-453xx/CVE-2024-45335.json) (`2024-10-22T19:15:05.840`)
|
||||
- [CVE-2024-46902](CVE-2024/CVE-2024-469xx/CVE-2024-46902.json) (`2024-10-22T19:15:06.130`)
|
||||
- [CVE-2024-46903](CVE-2024/CVE-2024-469xx/CVE-2024-46903.json) (`2024-10-22T19:15:06.283`)
|
||||
- [CVE-2024-48903](CVE-2024/CVE-2024-489xx/CVE-2024-48903.json) (`2024-10-22T19:15:06.590`)
|
||||
- [CVE-2024-48904](CVE-2024/CVE-2024-489xx/CVE-2024-48904.json) (`2024-10-22T19:15:06.763`)
|
||||
|
||||
|
||||
### CVEs modified in the last Commit
|
||||
|
||||
Recently modified CVEs: `67`
|
||||
Recently modified CVEs: `52`
|
||||
|
||||
- [CVE-2024-40091](CVE-2024/CVE-2024-400xx/CVE-2024-40091.json) (`2024-10-22T17:35:08.760`)
|
||||
- [CVE-2024-43611](CVE-2024/CVE-2024-436xx/CVE-2024-43611.json) (`2024-10-22T16:01:19.373`)
|
||||
- [CVE-2024-47485](CVE-2024/CVE-2024-474xx/CVE-2024-47485.json) (`2024-10-22T16:23:22.890`)
|
||||
- [CVE-2024-47486](CVE-2024/CVE-2024-474xx/CVE-2024-47486.json) (`2024-10-22T16:11:07.547`)
|
||||
- [CVE-2024-47487](CVE-2024/CVE-2024-474xx/CVE-2024-47487.json) (`2024-10-22T16:10:08.027`)
|
||||
- [CVE-2024-47676](CVE-2024/CVE-2024-476xx/CVE-2024-47676.json) (`2024-10-22T16:12:39.830`)
|
||||
- [CVE-2024-47746](CVE-2024/CVE-2024-477xx/CVE-2024-47746.json) (`2024-10-22T16:00:35.703`)
|
||||
- [CVE-2024-47747](CVE-2024/CVE-2024-477xx/CVE-2024-47747.json) (`2024-10-22T16:11:40.627`)
|
||||
- [CVE-2024-47749](CVE-2024/CVE-2024-477xx/CVE-2024-47749.json) (`2024-10-22T16:08:31.637`)
|
||||
- [CVE-2024-47752](CVE-2024/CVE-2024-477xx/CVE-2024-47752.json) (`2024-10-22T16:11:09.037`)
|
||||
- [CVE-2024-47753](CVE-2024/CVE-2024-477xx/CVE-2024-47753.json) (`2024-10-22T16:10:40.380`)
|
||||
- [CVE-2024-47754](CVE-2024/CVE-2024-477xx/CVE-2024-47754.json) (`2024-10-22T16:10:21.907`)
|
||||
- [CVE-2024-47756](CVE-2024/CVE-2024-477xx/CVE-2024-47756.json) (`2024-10-22T16:09:56.570`)
|
||||
- [CVE-2024-49615](CVE-2024/CVE-2024-496xx/CVE-2024-49615.json) (`2024-10-22T16:43:14.190`)
|
||||
- [CVE-2024-49616](CVE-2024/CVE-2024-496xx/CVE-2024-49616.json) (`2024-10-22T16:41:58.513`)
|
||||
- [CVE-2024-49617](CVE-2024/CVE-2024-496xx/CVE-2024-49617.json) (`2024-10-22T16:51:35.353`)
|
||||
- [CVE-2024-49618](CVE-2024/CVE-2024-496xx/CVE-2024-49618.json) (`2024-10-22T16:50:18.527`)
|
||||
- [CVE-2024-49850](CVE-2024/CVE-2024-498xx/CVE-2024-49850.json) (`2024-10-22T16:12:14.193`)
|
||||
- [CVE-2024-49855](CVE-2024/CVE-2024-498xx/CVE-2024-49855.json) (`2024-10-22T16:12:27.030`)
|
||||
- [CVE-2024-49859](CVE-2024/CVE-2024-498xx/CVE-2024-49859.json) (`2024-10-22T16:13:03.267`)
|
||||
- [CVE-2024-9050](CVE-2024/CVE-2024-90xx/CVE-2024-9050.json) (`2024-10-22T17:15:06.420`)
|
||||
- [CVE-2024-9355](CVE-2024/CVE-2024-93xx/CVE-2024-9355.json) (`2024-10-22T17:15:06.853`)
|
||||
- [CVE-2024-9452](CVE-2024/CVE-2024-94xx/CVE-2024-9452.json) (`2024-10-22T16:23:59.420`)
|
||||
- [CVE-2024-9537](CVE-2024/CVE-2024-95xx/CVE-2024-9537.json) (`2024-10-22T17:33:23.837`)
|
||||
- [CVE-2024-9848](CVE-2024/CVE-2024-98xx/CVE-2024-9848.json) (`2024-10-22T16:42:25.867`)
|
||||
- [CVE-2024-46326](CVE-2024/CVE-2024-463xx/CVE-2024-46326.json) (`2024-10-22T18:35:06.717`)
|
||||
- [CVE-2024-46528](CVE-2024/CVE-2024-465xx/CVE-2024-46528.json) (`2024-10-22T19:35:08.350`)
|
||||
- [CVE-2024-46538](CVE-2024/CVE-2024-465xx/CVE-2024-46538.json) (`2024-10-22T19:35:08.563`)
|
||||
- [CVE-2024-47223](CVE-2024/CVE-2024-472xx/CVE-2024-47223.json) (`2024-10-22T18:35:07.540`)
|
||||
- [CVE-2024-47634](CVE-2024/CVE-2024-476xx/CVE-2024-47634.json) (`2024-10-22T18:46:02.253`)
|
||||
- [CVE-2024-47912](CVE-2024/CVE-2024-479xx/CVE-2024-47912.json) (`2024-10-22T18:35:08.360`)
|
||||
- [CVE-2024-48570](CVE-2024/CVE-2024-485xx/CVE-2024-48570.json) (`2024-10-22T19:35:10.083`)
|
||||
- [CVE-2024-48605](CVE-2024/CVE-2024-486xx/CVE-2024-48605.json) (`2024-10-22T18:35:09.113`)
|
||||
- [CVE-2024-48659](CVE-2024/CVE-2024-486xx/CVE-2024-48659.json) (`2024-10-22T18:35:09.947`)
|
||||
- [CVE-2024-48706](CVE-2024/CVE-2024-487xx/CVE-2024-48706.json) (`2024-10-22T19:35:10.843`)
|
||||
- [CVE-2024-48707](CVE-2024/CVE-2024-487xx/CVE-2024-48707.json) (`2024-10-22T19:35:11.020`)
|
||||
- [CVE-2024-48708](CVE-2024/CVE-2024-487xx/CVE-2024-48708.json) (`2024-10-22T19:35:11.790`)
|
||||
- [CVE-2024-49250](CVE-2024/CVE-2024-492xx/CVE-2024-49250.json) (`2024-10-22T18:44:20.297`)
|
||||
- [CVE-2024-49272](CVE-2024/CVE-2024-492xx/CVE-2024-49272.json) (`2024-10-22T18:40:40.787`)
|
||||
- [CVE-2024-49274](CVE-2024/CVE-2024-492xx/CVE-2024-49274.json) (`2024-10-22T18:39:19.980`)
|
||||
- [CVE-2024-49275](CVE-2024/CVE-2024-492xx/CVE-2024-49275.json) (`2024-10-22T18:36:53.817`)
|
||||
- [CVE-2024-49290](CVE-2024/CVE-2024-492xx/CVE-2024-49290.json) (`2024-10-22T18:35:55.413`)
|
||||
- [CVE-2024-49306](CVE-2024/CVE-2024-493xx/CVE-2024-49306.json) (`2024-10-22T18:35:46.107`)
|
||||
- [CVE-2024-49325](CVE-2024/CVE-2024-493xx/CVE-2024-49325.json) (`2024-10-22T18:33:59.793`)
|
||||
- [CVE-2024-49619](CVE-2024/CVE-2024-496xx/CVE-2024-49619.json) (`2024-10-22T18:48:11.110`)
|
||||
- [CVE-2024-49620](CVE-2024/CVE-2024-496xx/CVE-2024-49620.json) (`2024-10-22T18:50:07.957`)
|
||||
- [CVE-2024-49627](CVE-2024/CVE-2024-496xx/CVE-2024-49627.json) (`2024-10-22T18:33:16.137`)
|
||||
- [CVE-2024-49628](CVE-2024/CVE-2024-496xx/CVE-2024-49628.json) (`2024-10-22T18:31:22.643`)
|
||||
- [CVE-2024-49629](CVE-2024/CVE-2024-496xx/CVE-2024-49629.json) (`2024-10-22T18:57:42.743`)
|
||||
- [CVE-2024-50312](CVE-2024/CVE-2024-503xx/CVE-2024-50312.json) (`2024-10-22T18:35:11.263`)
|
||||
|
||||
|
||||
## Download and Usage
|
||||
|
271
_state.csv
271
_state.csv
@ -63138,7 +63138,7 @@ CVE-2013-5915,0,0,368d20521458dfd67f96a5930cda6772edd7252de200104ef31ef51939f90d
|
||||
CVE-2013-5916,0,0,b0d284bafa3ac6246187547ee2d43684ad1236bff154114e61e3a3cf31f28810,2014-05-09T17:42:40.380000
|
||||
CVE-2013-5917,0,0,638bc89fbb16450da932db01256312e62affb65f570814a57e05659a3af11b92,2013-09-23T19:23:45.877000
|
||||
CVE-2013-5918,0,0,6126663f639f7e21c569c9ea85ac23b75cd9e059660132fae7fd8284aef28e2b,2013-09-23T22:29:07.197000
|
||||
CVE-2013-5919,0,1,0adc17bb11f2ed9913c73cca5c613c7fea4d3c599f1f6f5eb6d738930fd51ded,2024-10-22T17:11:30.463000
|
||||
CVE-2013-5919,0,0,0adc17bb11f2ed9913c73cca5c613c7fea4d3c599f1f6f5eb6d738930fd51ded,2024-10-22T17:11:30.463000
|
||||
CVE-2013-5930,0,0,58f14391c3ad819c611b2142260d6a3525ec3ab4e3dcd27e90aedb68e5c54d13,2017-08-29T01:33:53.340000
|
||||
CVE-2013-5931,0,0,7e3f79c8d8dbe38950577fa1ce89a252dd9f139e65131fb691e22345ef4f0c31,2013-10-15T18:03:40.417000
|
||||
CVE-2013-5932,0,0,c7fa0da30fdd1df0a4bb0e5d331120001e0abaab1eb852698805535985dd763f,2013-10-03T18:35:43.510000
|
||||
@ -111407,9 +111407,9 @@ CVE-2018-10238,0,0,5ce73cfdf6c911ff33f92d929345a4f196b913aa547a8ce47a1937c167cf2
|
||||
CVE-2018-10239,0,0,b413a71aadf645ae4e886f0aa705ec52a2de7806a1f09a861d8dce143f02edad,2019-06-20T17:17:33.690000
|
||||
CVE-2018-10240,0,0,502d71f1fe0738d6cd63f255ca904d3701317895a3d0d52edad3a0c6d08616be,2018-06-25T17:04:30.363000
|
||||
CVE-2018-10241,0,0,e96a43e60e432a1531f502eabdd83306afa8aa26926945ca2aaa1a6a36637314,2018-06-20T14:17:18.543000
|
||||
CVE-2018-10242,0,1,6239bb33c05dfa81a63f17b2e9a1fdc8e16d715b4d7e738f2a88de6db03f5eff,2024-10-22T17:11:30.463000
|
||||
CVE-2018-10242,0,0,6239bb33c05dfa81a63f17b2e9a1fdc8e16d715b4d7e738f2a88de6db03f5eff,2024-10-22T17:11:30.463000
|
||||
CVE-2018-10243,0,0,b53749bcaaacf564e23f6a7a8d50a34723505f0b1455fd458f02a46a1fc4083c,2019-04-08T23:29:00.323000
|
||||
CVE-2018-10244,0,1,4bb60ec008f032343bd62792cf96edfdce93226bbd029d819e1e37d8d0b2850f,2024-10-22T17:11:30.463000
|
||||
CVE-2018-10244,0,0,4bb60ec008f032343bd62792cf96edfdce93226bbd029d819e1e37d8d0b2850f,2024-10-22T17:11:30.463000
|
||||
CVE-2018-10245,0,0,8bae6774155e92f5cb720f0e2f763f381e2a1565088ccfec93c7ee7b948fd8e6,2018-05-18T17:06:54.793000
|
||||
CVE-2018-10248,0,0,d20f22e2cafcc987233870942fc0f94f1531ddf23af0119f749ea3fa2683e488,2018-05-21T16:40:00.863000
|
||||
CVE-2018-10249,0,0,b29ed9b3250171b089061b1f6a968f53655a0949f17ffaf296a30927c193d744,2018-05-22T15:00:55.567000
|
||||
@ -135737,7 +135737,7 @@ CVE-2019-1862,0,0,73be23ed6169d16a07019413510f2ff1d6d9d5b23423727dad7c525ab7de7b
|
||||
CVE-2019-18622,0,0,1df28778183d6abbb1e44ad7d65ccd139dbfd35d9b86ceb6618f6fa7cbf94666,2023-11-07T03:06:52.997000
|
||||
CVE-2019-18623,0,0,2d88c594bd920a45844903bf885464713b1665aba2a35a43a772a8a355951563,2019-11-12T18:34:11.033000
|
||||
CVE-2019-18624,0,0,96b8c4a6d8d884d1986dee07622e67462b6f07d15de4bee67bd69ed2ef6303d4,2023-11-07T03:06:53.063000
|
||||
CVE-2019-18625,0,1,2602f7b35c60fc7154aef534c6cf964c071202fef48802bb5fcae6f9f3c77eb1,2024-10-22T17:11:30.463000
|
||||
CVE-2019-18625,0,0,2602f7b35c60fc7154aef534c6cf964c071202fef48802bb5fcae6f9f3c77eb1,2024-10-22T17:11:30.463000
|
||||
CVE-2019-18626,0,0,2bcdd33e07732415d4f8d9d13f77081c7fae106c686a2a9db5ec78003bd95c89,2021-07-21T11:39:23.747000
|
||||
CVE-2019-18628,0,0,0a6571bdb0039cb6bb9b503480f5259e0aae045b719f98155f82586e98649463,2021-03-05T19:25:03.187000
|
||||
CVE-2019-18629,0,0,979ee48d22f2a4d7bf8f765069349736f6d5e8195e1cb3f2fca8dd5f2767917e,2021-03-11T16:21:42.453000
|
||||
@ -135904,7 +135904,7 @@ CVE-2019-18786,0,0,f7b30acdbe06e41ba214eef680ff681b69fd3c81ecd62d74c7d2e45107f6b
|
||||
CVE-2019-1879,0,0,b69bf614f656b8f53aaf6933887d8ce9a93223b5fcdc56f559ea8db64c4607f8,2019-10-09T23:48:25.037000
|
||||
CVE-2019-18790,0,0,f3ae15afe951af3264c1f39856a167edc0b0d5f4bfd44be838869db02c5b4617,2022-05-13T20:56:27.693000
|
||||
CVE-2019-18791,0,0,55a8db09b5493780b14bfe0dfd0cd0d7df9ca2af1963058224ac92556a1e1ee6,2020-02-20T21:24:25.883000
|
||||
CVE-2019-18792,0,1,b197a0f768336ae7cef9f470042e0204d0d7eb61a7e5ae1a80b5cefbb7b0ff06,2024-10-22T17:11:30.463000
|
||||
CVE-2019-18792,0,0,b197a0f768336ae7cef9f470042e0204d0d7eb61a7e5ae1a80b5cefbb7b0ff06,2024-10-22T17:11:30.463000
|
||||
CVE-2019-18793,0,0,388e575fd403449ea4ad2c57a93e31debdd0488e80101e71fbd65a8206a1cdae,2019-11-14T21:14:09.950000
|
||||
CVE-2019-18794,0,0,ec2d73b58d3f046e284f4910595f05dff351ee3caddd343e457f2053f0491b1d,2020-10-27T15:28:24.953000
|
||||
CVE-2019-18795,0,0,27f7ec1fb5dab54447ec2b6b844407921f47e51c0d432d565a938f6792e32e2b,2020-10-27T15:28:09.483000
|
||||
@ -193038,8 +193038,8 @@ CVE-2022-23856,0,0,ee2cbc2426322388ff1afe7a44f2d91a7a9d83fba9914f637e37fe8ae0521
|
||||
CVE-2022-23857,0,0,132a872c07af8d8c70261b35abca8d6a153a1859a711a2ed034df1a2f2ae9139,2022-01-27T16:14:04.917000
|
||||
CVE-2022-23858,0,0,62f1f606d4b9efbf1631daba2d503d290be6f481e4bba2a8ebf7e52bf48393a1,2022-12-09T16:23:45.117000
|
||||
CVE-2022-2386,0,0,09f49d4259c6ee996cc850650c207ec22add260b3b84ba16b896c572ed7d3292,2022-08-12T14:17:49.413000
|
||||
CVE-2022-23861,1,1,749026e9e7284e0036f11dafc4b8939d74e8bac8ff9ef70ec728150a0c070436,2024-10-22T16:15:04.897000
|
||||
CVE-2022-23862,1,1,474bfd48b6baee74958d3f1c9028db1fb9db25971396e5181791000be4d0e6c6,2024-10-22T16:15:05.443000
|
||||
CVE-2022-23861,0,1,b7f6912621c34d9cb3366d0dd5b5259d62f1fd1e683f2e2fc5b95a122aaed23f,2024-10-22T19:35:01.570000
|
||||
CVE-2022-23862,0,1,d205b444d31d5084d2110b9e46847ffd77a0b531064aecc34b848aa211f7b732,2024-10-22T19:35:03.463000
|
||||
CVE-2022-23863,0,0,718dca3b438e5f32d08c79cae192ff7673ae1521722bf5bc5fb8ef6492a0b31b,2023-08-08T14:22:24.967000
|
||||
CVE-2022-23865,0,0,34050304e0195f46e2f5ca23d58f867b7e2ee63ec6639e974e762ba109c518b8,2022-04-22T14:12:24.920000
|
||||
CVE-2022-23868,0,0,c4621856d933568f66278364ad9aeb56e74477fa3255560a959f3a6c8b310a91,2022-04-04T19:47:02.100000
|
||||
@ -196006,7 +196006,7 @@ CVE-2022-27413,0,0,1bf73e093b8cb62f8a3eea7413c4a9e4840f866988d4a524423fac3db666a
|
||||
CVE-2022-27416,0,0,a4cd74f6cc29d3b41356401ea2184243259ce93cf3d00d4f6aa912918b191dca,2022-10-28T20:41:07.257000
|
||||
CVE-2022-27418,0,0,0a070b71ad967ccfd186c4717efb3bff18a60fdc9c3ecc5dfda25532c46f2106,2022-10-28T20:41:04.007000
|
||||
CVE-2022-27419,0,0,994eb171df1c6d10a249b0df989544ffdff3f15dd8299ac39a5cf0580d7a49a5,2022-04-20T16:56:24.287000
|
||||
CVE-2022-2742,0,1,a932d6570b56bf449a11204706597e2b66019b2ee9d75e8e490fdabf3af66f97,2024-10-22T17:35:00.793000
|
||||
CVE-2022-2742,0,0,a932d6570b56bf449a11204706597e2b66019b2ee9d75e8e490fdabf3af66f97,2024-10-22T17:35:00.793000
|
||||
CVE-2022-27420,0,0,a1aa723fc92f893c24e887fab41dfbb10b8f11940622b8f050ec7bc1279b9153,2022-05-11T17:21:57.457000
|
||||
CVE-2022-27421,0,0,5b85d8359fc7d6211c1b9d8e72de55fe6685172d0646d9efa4d2e51f1d2107f5,2023-08-08T14:21:49.707000
|
||||
CVE-2022-27422,0,0,fa18bf8ab1e0503ba3808aee3c3c27897296bc3ab8ac65353ffe66abaf3b7c2a,2022-04-25T13:47:36.867000
|
||||
@ -196016,7 +196016,7 @@ CVE-2022-27426,0,0,0548985f0e764d200b000bacf7f46d2ba299dcbe47c9accfe9547c1a94db5
|
||||
CVE-2022-27427,0,0,1414131cea9dc91f1d4275356915d7d04ce3229fc70cc9f37ee59bf12dd491f0,2023-11-07T03:45:19.823000
|
||||
CVE-2022-27428,0,0,58081a02131b8ff72388ea2009b53ad9b1621e4927caed88d3d8c075db01789e,2022-05-05T15:57:55.750000
|
||||
CVE-2022-27429,0,0,8526d66670571e284e4a1ab73cb4843dc69fcc0a9e7bcf356fa0c52ba68e1100,2022-05-05T16:27:20.627000
|
||||
CVE-2022-2743,0,1,f5d5bbfe8868cb1452d5eb9dfc018b36b4b74554517421c5f361102aaa4892c1,2024-10-22T16:35:01.157000
|
||||
CVE-2022-2743,0,0,f5d5bbfe8868cb1452d5eb9dfc018b36b4b74554517421c5f361102aaa4892c1,2024-10-22T16:35:01.157000
|
||||
CVE-2022-27431,0,0,154579f7591d92b17349e90e315fc1122ad1d1b36589287fbb93e13fad5c6a63,2022-05-11T17:22:52.137000
|
||||
CVE-2022-27432,0,0,de8f1f5eca7a6676948cac20e35002ea53b59e39eda02c7765812169c7289366,2022-04-05T18:43:08.160000
|
||||
CVE-2022-27434,0,0,f1d1791ccc358d257a78bfdc203bf6b4bfe96782793f84a355baa0d8ef9023f9,2022-07-25T17:03:12.943000
|
||||
@ -204863,7 +204863,7 @@ CVE-2022-38416,0,0,4c73e953a11225a24c20f9776a984ed42b961ec60234b6e4a0cb1561e867d
|
||||
CVE-2022-38417,0,0,840176ac21c9c444344f0342ce4bc4e880d17c981d0888310d9f150288c84d6b,2022-09-20T15:19:48.157000
|
||||
CVE-2022-38418,0,0,00a17c017bdd87d314e60d0fc7e4c3f09124f453fe2417884ba9ba87f933ac97,2022-10-20T05:43:31.677000
|
||||
CVE-2022-38419,0,0,5d77f6aa3cf64d420eb5281a0bc12c700e77e20f5118a72ec200f5f1b12fe8d0,2022-10-28T21:14:10.887000
|
||||
CVE-2022-3842,0,1,7cbdb47dde7d69e968b83b2503f5bf65e4910ebe701998b5c810f3de325814c8,2024-10-22T16:35:03.307000
|
||||
CVE-2022-3842,0,0,7cbdb47dde7d69e968b83b2503f5bf65e4910ebe701998b5c810f3de325814c8,2024-10-22T16:35:03.307000
|
||||
CVE-2022-38420,0,0,e5b829242cd03b9e2375aa26fea21efef5cec261d214c56c088be68999ef45ee,2022-10-20T05:43:52.483000
|
||||
CVE-2022-38421,0,0,60078496dba3efc7b43c73646ee5f2777a706c1b4add7f448c40a16f0de2ea4a,2022-10-20T05:45:56.967000
|
||||
CVE-2022-38422,0,0,89736a3c0b28118a69c809c62461820ed3ead456f40b0d4ad535e58644bdbe7c,2022-10-18T19:33:02.870000
|
||||
@ -213178,7 +213178,7 @@ CVE-2023-0467,0,0,5293db8836d5f1db0e1f5096a27bcb1433113df02b237566a0e27a20f867bb
|
||||
CVE-2023-0468,0,0,fc23fe7b9211a11b623bdbb98704e621a86f8b2f0533ceb11cc727e0c4cd8436,2023-02-01T15:59:27.927000
|
||||
CVE-2023-0469,0,0,6431f6fc7e2739ba25419615ad75c75cd9e98861472093ca20181b196405f1eb,2023-02-01T15:58:49.477000
|
||||
CVE-2023-0470,0,0,4372e365da241629623031d052bfbee0d3928a26394a28ee205196dbe80cd25b,2023-02-02T15:06:12.383000
|
||||
CVE-2023-0471,0,1,fe31042cd7a9895782885b55eee589dbac971a3346d8dd56bff42e357601f821,2024-10-22T16:35:06.327000
|
||||
CVE-2023-0471,0,0,fe31042cd7a9895782885b55eee589dbac971a3346d8dd56bff42e357601f821,2024-10-22T16:35:06.327000
|
||||
CVE-2023-0472,0,0,64dd50a5ea2446fcb9d9189b51a3c00d794a4e789c557bb0b545792ee3e7c83c,2024-10-17T18:35:03.323000
|
||||
CVE-2023-0473,0,0,5d1af04a31dd707260ecab2c9353768ceb21646123f7b3879cf47f75e1e91417,2024-10-17T18:35:04.293000
|
||||
CVE-2023-0474,0,0,ece696f628e220dfc0baf179fd456c53afb38a72b986a7e64878b873cda652ab,2024-10-17T19:35:08.023000
|
||||
@ -215184,15 +215184,15 @@ CVE-2023-20790,0,0,71cc81b0a4fcec9863f7abe58261f320e50c88043af56bfaaf62e9e0ac42d
|
||||
CVE-2023-20793,0,0,221d7da136cacd6c031d43e97172851b22fcb8dd09aa227c3dd531b8b6660732,2023-08-09T15:16:44.627000
|
||||
CVE-2023-20795,0,0,9501a3e0d46d75b6ebace9a8375e995ec6421db38cd2b1231cddc9413f69c337,2023-08-09T15:17:31.673000
|
||||
CVE-2023-20796,0,0,2701789a8326a3208285bd3b0f001130605722f5204d3caa43baa832e056f499,2023-08-09T16:29:52.957000
|
||||
CVE-2023-20797,0,0,2ee8169b1fc0014b7aff81c77da61a4403df1ec960585e62531e53c9e9fd0a9b,2023-08-09T13:39:25.510000
|
||||
CVE-2023-20797,0,1,27f06866663eb9b44a4131babadde1bb70df24fa479c51e93c78285f703bcaae,2024-10-22T18:35:00.667000
|
||||
CVE-2023-20798,0,0,3a53171791afa77a5baabd3d1463e3f8a2d720e815473fe4174889b195ae31e9,2023-08-09T13:49:52.743000
|
||||
CVE-2023-2080,0,0,e157d4e828722bb0499442360051b052d8336e3a66b9f3d98184689a9dd2e74e,2023-06-30T16:39:02.840000
|
||||
CVE-2023-20800,0,0,84eb76953561aeedc870a53eb3e5c810f161a8e2002a06a8689cb690bddbdd65,2023-08-09T13:25:26.837000
|
||||
CVE-2023-20801,0,0,3f54217e44d01e396e4e56936d1401bc5570f2f6ab2c31efd20c7ef5f222325f,2023-08-09T15:07:45.820000
|
||||
CVE-2023-20802,0,0,b9dc75b05e578e1b1fdb4b7c06bf0ae88c71275a533562261263d991ebf95f25,2023-08-09T18:07:36.453000
|
||||
CVE-2023-20803,0,1,812495a0c33694b1008949aaef6370c3b57e0d58b87accd7edcbbc20ee96ee97,2024-10-22T16:35:07.320000
|
||||
CVE-2023-20804,0,1,8bba2d0119db4a30a7fc0cb32c01afb7e3897eb94df51aab93d98f3fc4e9468e,2024-10-22T16:35:08.190000
|
||||
CVE-2023-20805,0,1,35002f2ad8a808fe8601a014ab5af840658aebf9423d776d785e03736f3a6eec,2024-10-22T16:35:08.963000
|
||||
CVE-2023-20803,0,0,812495a0c33694b1008949aaef6370c3b57e0d58b87accd7edcbbc20ee96ee97,2024-10-22T16:35:07.320000
|
||||
CVE-2023-20804,0,0,8bba2d0119db4a30a7fc0cb32c01afb7e3897eb94df51aab93d98f3fc4e9468e,2024-10-22T16:35:08.190000
|
||||
CVE-2023-20805,0,0,35002f2ad8a808fe8601a014ab5af840658aebf9423d776d785e03736f3a6eec,2024-10-22T16:35:08.963000
|
||||
CVE-2023-20806,0,0,e1212d18c0511e7e8cfd4291bfa0ef21149391f80e70fb9ff2e09af2eb5b38b9,2023-08-09T17:37:27.713000
|
||||
CVE-2023-20807,0,0,8fa020bbbe74f0a7562bc7d504b6ca273b75d7a6cfd0136f67da777af0db86d9,2023-08-09T17:27:57.637000
|
||||
CVE-2023-20808,0,0,d3374bef82c5ae7d3411ac49d0b7398ed2ad5002fed4b42ae83978aa59a91864,2023-08-09T17:28:11.923000
|
||||
@ -220852,8 +220852,8 @@ CVE-2023-27599,0,0,a6d493ce8131b697a60ae09913019e12914de5421c806a4015a87c94c254e
|
||||
CVE-2023-2760,0,0,6c074bf21b2267cd8b569941c67b08360124783f809d3989660a823d47cbf8cc,2023-08-09T11:15:10.280000
|
||||
CVE-2023-27600,0,0,87e67c606dcb11cbbd6ceba8eb248743b1a9a333ff1372c202bb946110f83bab,2023-11-07T04:10:01.763000
|
||||
CVE-2023-27601,0,0,3159e0a53214d6adf345915c747947d8090757989992077eaa4e4c5257b56321,2023-11-07T04:10:01.887000
|
||||
CVE-2023-27602,0,1,7f58c60ee3e1d01b2a0a080305043c4d403e5bc65d7e63a6526fb0172f83382f,2024-10-22T16:35:09.767000
|
||||
CVE-2023-27603,0,1,4f0435dc38032ab417293eac3e5fff2c23f0739a53b3285705d573a4f3084368,2024-10-22T16:35:10
|
||||
CVE-2023-27602,0,0,7f58c60ee3e1d01b2a0a080305043c4d403e5bc65d7e63a6526fb0172f83382f,2024-10-22T16:35:09.767000
|
||||
CVE-2023-27603,0,0,4f0435dc38032ab417293eac3e5fff2c23f0739a53b3285705d573a4f3084368,2024-10-22T16:35:10
|
||||
CVE-2023-27604,0,0,264a6a3b17b8dc069b4c6cd1ae570dc6192c2177f9276257c4cc8f282359d2ac,2024-09-27T19:35:34.593000
|
||||
CVE-2023-27605,0,0,3c9bd67e7bbc5a970176fa36f2ef3e0bf73a6762632ef035cc42d3a510e378f7,2023-11-10T04:20:00.893000
|
||||
CVE-2023-27606,0,0,df5a64e8dccf8b9593928c54f55b0be768a1ad798eb4d0e828b503915ddf62a6,2023-07-26T01:18:52.087000
|
||||
@ -221854,12 +221854,12 @@ CVE-2023-28702,0,0,322458dc5ce1af990637dfdbb194b4657a53e64709918a6959ad0e26b5d90
|
||||
CVE-2023-28703,0,0,0f0cebf3a82254d0f256f8ee7ad05786e89f280679305fc77b9a10a202724da0,2024-10-14T04:15:03.210000
|
||||
CVE-2023-28704,0,0,0ea96abeac4099eb6f8aeff445b717c3ff853eb5b66e71b0c3097300ad8383c5,2024-10-14T04:15:04.400000
|
||||
CVE-2023-28705,0,0,875ee5eeedcbaf87184e53272462439379c1e8baf901ebbbb714e99fd79f0ba9,2023-06-09T18:14:13.487000
|
||||
CVE-2023-28706,0,1,50e6020734b1331e0a1f6818c44fa8ed0422882143ec83bad7c87bb811eda5e9,2024-10-22T16:35:10.210000
|
||||
CVE-2023-28706,0,0,50e6020734b1331e0a1f6818c44fa8ed0422882143ec83bad7c87bb811eda5e9,2024-10-22T16:35:10.210000
|
||||
CVE-2023-28707,0,0,32d4d4aa6f7aca5e473a1393c06496a21c3a1ef5446c39d4c4403f8b4eeb5898,2023-05-22T14:25:13.693000
|
||||
CVE-2023-28708,0,0,3676b37bd572d293623b1d4d6062d80511a32f4ec94735432036b13d40cac96c,2023-11-07T04:10:49.370000
|
||||
CVE-2023-28709,0,0,4a374603268a75183fc4d8867975e646438b75b17cc4c5fec221f049409c16f9,2024-02-16T18:20:07.610000
|
||||
CVE-2023-2871,0,0,c547a7e85685136989871db883e9d8714fc66f889d110c2bfa95d6061d7e85d5,2024-05-17T02:23:19.727000
|
||||
CVE-2023-28710,0,1,dcae631d3021e39c45fade16b16079aaa2ed37dd596cab7edaa89a5e7ae291a1,2024-10-22T16:35:10.403000
|
||||
CVE-2023-28710,0,0,dcae631d3021e39c45fade16b16079aaa2ed37dd596cab7edaa89a5e7ae291a1,2024-10-22T16:35:10.403000
|
||||
CVE-2023-28711,0,0,9a7e4692df4128407920abfd535c6e1e6ea2e2404eb6b544486446f8035d5a81,2023-11-07T04:10:49.447000
|
||||
CVE-2023-28712,0,0,48cede95267e940bcf25c0c4d4718d225f1a658760a29a9cf30284758c8924a6,2023-11-07T04:10:49.617000
|
||||
CVE-2023-28713,0,0,2fb09d63fae7527d1926c34ea4251376e037b7841aef4deb35a0f81acbe0ed9f,2023-06-08T13:48:05.117000
|
||||
@ -222301,8 +222301,8 @@ CVE-2023-29211,0,0,2f68aae87949c796385b01b5a1828d70058a84385271f8341622722895713
|
||||
CVE-2023-29212,0,0,d1d948d2138c9038dd86dcfdab359a9afdc8b5b5d4ffdcdddb4e37c09c70c30a,2023-04-26T17:12:14.490000
|
||||
CVE-2023-29213,0,0,a25e4927a17f1e3b6df251fc7f8769e82929bf598e6fcab652dcd30076d4cdee,2023-05-01T14:02:43.807000
|
||||
CVE-2023-29214,0,0,aa2db31df8e86921819cb9df437c39aa49cc88918aafea9d75db6fa572adfc11,2023-04-26T17:15:26.733000
|
||||
CVE-2023-29215,0,1,5590d54e81ae1c83de926af549ae4ac3ee0f39fa9770392675cd5db1fda940c1,2024-10-22T16:35:10.597000
|
||||
CVE-2023-29216,0,1,ad17386fe196604182cfbf47617270a55c1cd069baf7ebbbdd2007698983ae9f,2024-10-22T16:35:10.780000
|
||||
CVE-2023-29215,0,0,5590d54e81ae1c83de926af549ae4ac3ee0f39fa9770392675cd5db1fda940c1,2024-10-22T16:35:10.597000
|
||||
CVE-2023-29216,0,0,ad17386fe196604182cfbf47617270a55c1cd069baf7ebbbdd2007698983ae9f,2024-10-22T16:35:10.780000
|
||||
CVE-2023-29218,0,0,f0282ad8b79cf1bdf860a3575a9a1f598b5604e413bb0608665168800ec76fcc,2024-08-02T14:15:36.417000
|
||||
CVE-2023-2922,0,0,dc553e71f409f86d2a4e6ca968907fb5462b18e5250b3d03aaf8c3ecb44348a3,2024-05-17T02:23:21.983000
|
||||
CVE-2023-2923,0,0,55b078298b1195eec01fa938b8be7af85cb16ffb5c08d0c140893148b20a51e4,2024-05-17T02:23:22.090000
|
||||
@ -223070,7 +223070,7 @@ CVE-2023-30459,0,0,5203c98e26586eb418e577e0ae073865f5b068c7334ca2353e2b79f21ee05
|
||||
CVE-2023-3046,0,0,ecac07b94baf4825a77ca2376c60e7599fadef86a6e35f7199431d4839633975,2023-07-31T18:10:15.423000
|
||||
CVE-2023-30463,0,0,578403456f513186915a79f10d80ead6b521f986e8efcb462d3b4f5fdfe361bc,2023-04-28T18:49:31
|
||||
CVE-2023-30464,0,0,2219fe2a351a90ed5b4baf0c5b582d478e2ecc8c75596249eb60867c38157102,2024-09-20T12:30:17.483000
|
||||
CVE-2023-30465,0,1,bbb66a417528962547f13dd5a5d32638f3c72abdeaabce4152de7f7162625c60,2024-10-22T16:35:10.960000
|
||||
CVE-2023-30465,0,0,bbb66a417528962547f13dd5a5d32638f3c72abdeaabce4152de7f7162625c60,2024-10-22T16:35:10.960000
|
||||
CVE-2023-30466,0,0,a09f27d23c57f262101e1beba7bf30085bba339c92bf87babd3fd4546142e636,2023-05-05T17:27:07.267000
|
||||
CVE-2023-30467,0,0,1f60c7af1fdcdbc8eac29b20ae332e43dda1d16453ce8a587bb1e16e4fb9ef03,2023-05-05T17:57:32.067000
|
||||
CVE-2023-30469,0,0,fa32fed5bcf318ec6dc93737679b329fee275c0b22116985f699a53971c9b865,2023-05-30T16:56:04.817000
|
||||
@ -230769,7 +230769,7 @@ CVE-2023-40455,0,0,058abdb8c2eae30e165ec5b264dbf295ba8e09c6c3830c69886965016a5de
|
||||
CVE-2023-40456,0,0,7169803686183a5f1d426b39f88228ec6dce3691ab53bc177c949c7a8fd9efca,2023-11-07T04:20:15.193000
|
||||
CVE-2023-40458,0,0,79a445a17e1f85e1f6c9345cf6a43d9301aed3a647416fbf1fc2770253362cdc,2023-12-05T01:55:09.410000
|
||||
CVE-2023-40459,0,0,72958d07cda00b0c6d4ae1b61eff24e072a6de9dcd7e9245179ab8da7c7dd63d,2023-12-08T15:47:51.637000
|
||||
CVE-2023-4046,0,1,74357e4a22d4d6aa6afa8fb2beea6097492a98a519070e944818d05926f858bb,2024-10-22T16:35:14.267000
|
||||
CVE-2023-4046,0,0,74357e4a22d4d6aa6afa8fb2beea6097492a98a519070e944818d05926f858bb,2024-10-22T16:35:14.267000
|
||||
CVE-2023-40460,0,0,cb8d4a4b518509c4362ccb8f0afbc3d4ba81059d0c319d00ce1a78f314f5df45,2023-12-08T15:47:41.403000
|
||||
CVE-2023-40461,0,0,2ca71e2d74941f7db08d3ae15972c35f65a7a1c0b913d4173afa994ddac5a43a,2023-12-08T15:47:23.163000
|
||||
CVE-2023-40462,0,0,ffd7cbc54880373ae62e24016d5dd35693f5e2718a1f76f9f7406aa53c66dcee,2024-02-02T03:12:25.617000
|
||||
@ -230778,7 +230778,7 @@ CVE-2023-40464,0,0,8231b0c451d5b4c35d027e1b67bba80c7df83e1e1ad17ab04a2494355e768
|
||||
CVE-2023-40465,0,0,c70021b90b2721ff443a40c1111bf31fef348ab6ba2a7cf6bbcd8bc7822299fa,2023-12-08T15:44:51.933000
|
||||
CVE-2023-40468,0,0,7d84164a8bc2564940a981b796397726ff721c6aa0efdcb2152db15cd7184661,2024-05-03T12:50:12.213000
|
||||
CVE-2023-40469,0,0,0ed69cdce8225d95cfae6682abc1ebaf65719f0b970e047791ac57fa9c47f189,2024-05-03T12:50:12.213000
|
||||
CVE-2023-4047,0,1,f5052efbca7ab9c1a8858a3fd8dd92e74171735df43efce1d062d82505d9c615,2024-10-22T16:35:15.043000
|
||||
CVE-2023-4047,0,0,f5052efbca7ab9c1a8858a3fd8dd92e74171735df43efce1d062d82505d9c615,2024-10-22T16:35:15.043000
|
||||
CVE-2023-40470,0,0,afada78b6007b2ba33bbf78e11be4d28f3cd22e160c8e61f962a7cebd7f52155,2024-05-03T12:50:12.213000
|
||||
CVE-2023-40471,0,0,becbb43c9e1a564fe69963a88bb1087ad0f2669a388b9f3e94466c56f3f010c0,2024-05-03T12:50:12.213000
|
||||
CVE-2023-40472,0,0,63bad795c4e37646c5a06e5ac3ca24cbaa679ad10a3550f3f51a2397791e5a38,2024-05-03T12:50:12.213000
|
||||
@ -234069,7 +234069,7 @@ CVE-2023-45227,0,0,7c7fed76f5d6f3f983df94e726ce31f0b6abeb62d3e6e5afe70912aaeb076
|
||||
CVE-2023-45228,0,0,f02fdcfce96931a7d3db28875f2dc518b6b7078552506dc86bdb01d18b405427,2023-11-07T19:55:08.333000
|
||||
CVE-2023-45229,0,0,cfaecc5ce62d696bb446e9b9bba91809f04e1c9f10c9dafb0c3a45094e4067fc,2024-03-07T17:15:10
|
||||
CVE-2023-4523,0,0,fee4617c65a2bd08463915b79320fa3a3d5417de90db274caa3a49dbf29f46ee,2023-09-29T15:39:05.767000
|
||||
CVE-2023-45230,0,1,bbc1e53c454be3b8c6530fef54817baece3c9aa241f0307f93c1b246c2ce29d7,2024-10-22T16:35:13.497000
|
||||
CVE-2023-45230,0,0,bbc1e53c454be3b8c6530fef54817baece3c9aa241f0307f93c1b246c2ce29d7,2024-10-22T16:35:13.497000
|
||||
CVE-2023-45231,0,0,c61d6f99e6b778ffd053ed865b56d4aa4b5f162b3b6cc8b456aa5c715886fd2f,2024-03-13T02:15:50.267000
|
||||
CVE-2023-45232,0,0,ba5e4efd7c8898ba0a2188a57de8bee02b9050addc3e17693fe94e84c3cdd92c,2024-03-13T02:15:50.347000
|
||||
CVE-2023-45233,0,0,5568807a60c17e2c0ea160a468109a8a204b479c5ab85e97fd6742059d0f249a,2024-03-13T02:15:50.430000
|
||||
@ -237208,11 +237208,11 @@ CVE-2023-49559,0,0,dcd39cb8510f02bef2dc47c7edbffbdde40d7a526a78797dba29c8b12dd3d
|
||||
CVE-2023-4956,0,0,48c602c337af88c084951e3a2c1195ec950bd27715d3d7ebaae450cd36e9d61e,2023-12-13T08:15:51.330000
|
||||
CVE-2023-49563,0,0,ff22013e5f4db324eaab0d188c730f9fdc3fd3f56c58b042f2dd5573911172a8,2023-12-14T18:30:37.733000
|
||||
CVE-2023-49566,0,0,5d41a2822babeb9ec619211692e91f45235cebac1ffc90794234a82a955c5d4a,2024-07-16T18:06:05.347000
|
||||
CVE-2023-49567,0,1,193003fcd251d5cde9b049285c29ecf9c4d7248fd85a0cdba0232bb4efc2a37b,2024-10-22T16:39:16.370000
|
||||
CVE-2023-49567,0,0,193003fcd251d5cde9b049285c29ecf9c4d7248fd85a0cdba0232bb4efc2a37b,2024-10-22T16:39:16.370000
|
||||
CVE-2023-49568,0,0,e295bf606e29529c11cbbb43abed02bc4423081c2a4c69be87e7b9161aed1898,2024-01-22T17:57:41.193000
|
||||
CVE-2023-49569,0,0,d61d891c4a84c41eb74d9a85c11d68d30d185ae64e4fcddc4c6e7a3912a15d45,2024-01-22T18:57:03.500000
|
||||
CVE-2023-4957,0,0,78bb0460b3b0f290da79e035e030dce6be4d514bdd0094dcadf90329259b779e,2023-10-16T14:08:22.900000
|
||||
CVE-2023-49570,0,1,f9c7afa434c2b7ac368bce0c36b013ee7d74936062ec20ef84b72c339b1cff41,2024-10-22T16:26:47.317000
|
||||
CVE-2023-49570,0,0,f9c7afa434c2b7ac368bce0c36b013ee7d74936062ec20ef84b72c339b1cff41,2024-10-22T16:26:47.317000
|
||||
CVE-2023-49572,0,0,887de86a687a05ec36d54a2019258a2d8d5e1fc1dbf8ea3bc3a57b5c0467ed12,2024-05-24T18:09:20.027000
|
||||
CVE-2023-49573,0,0,668d26e17886603090861420f97df7110444aa6097038cffa9edd3fe881cb7a7,2024-05-24T18:09:20.027000
|
||||
CVE-2023-49574,0,0,cf12ec560e66df2f8e6fe14be56965158911ec99b9b79f08d7d31fadd9d28d5f,2024-05-24T18:09:20.027000
|
||||
@ -240343,9 +240343,9 @@ CVE-2023-6051,0,0,65166b01dd71515312d91f9d8071d445b248393f92fbfdc73dd7007d9755f5
|
||||
CVE-2023-6052,0,0,aade2b22db5b4363b4735382f3bc2b9b7b67324ff9b0a0e43ebe15be0d76ef4d,2024-05-17T02:33:29.807000
|
||||
CVE-2023-6053,0,0,884dd7c884b65418d1acc2ea8b654cbf552035c51290cebacf8d437558597e99,2024-05-17T02:33:29.920000
|
||||
CVE-2023-6054,0,0,7c33b8bac31ea414624bbc9ce8995053ec355ffc65ef3213af66e1a1cc5d7096,2024-05-17T02:33:30.020000
|
||||
CVE-2023-6055,0,1,6970d6e1cef11b5752b3c4584db2d30f4d434e7f6ccb260e2dbefee021b56d87,2024-10-22T16:39:00.817000
|
||||
CVE-2023-6056,0,1,5d12957ae6e26dc96870feff725dddb10442b06c2d23031fc39cc9503665774e,2024-10-22T16:38:43.993000
|
||||
CVE-2023-6057,0,1,bbbddfe2749236535590b210661fb2a64529bd853ca807d86fb37af1e80984cf,2024-10-22T16:38:29.767000
|
||||
CVE-2023-6055,0,0,6970d6e1cef11b5752b3c4584db2d30f4d434e7f6ccb260e2dbefee021b56d87,2024-10-22T16:39:00.817000
|
||||
CVE-2023-6056,0,0,5d12957ae6e26dc96870feff725dddb10442b06c2d23031fc39cc9503665774e,2024-10-22T16:38:43.993000
|
||||
CVE-2023-6057,0,0,bbbddfe2749236535590b210661fb2a64529bd853ca807d86fb37af1e80984cf,2024-10-22T16:38:29.767000
|
||||
CVE-2023-6058,0,0,80b121b51cef55262f44ff47427075372eaef5bede566f19f4a29d78d39ee80e,2024-10-22T16:00:05.110000
|
||||
CVE-2023-6061,0,0,3668adbae0969cfab0fed96f2f0cd588b0f30acaede83213c351da7fed813869,2023-12-12T22:24:14.313000
|
||||
CVE-2023-6062,0,0,9acfdc2e379d5c765b916ddaf4e9e4b9e3e002ce20adb1082d4167d6fe0776c5,2023-11-29T18:01:56.163000
|
||||
@ -240749,7 +240749,7 @@ CVE-2023-6511,0,0,183c64dba37acae8d59b989d41d4a32cb9c0c3fb858a3b1a8b42833fb523a8
|
||||
CVE-2023-6512,0,0,6654f84f78820ce8a149637ce351fbcfe46f7c6f2143da54a8f3ab029273d6c7,2024-02-15T20:51:30.973000
|
||||
CVE-2023-6514,0,0,eab0046dd0f115514570e8378dacbbd3e5a1ae238ec74f2e6eabf7f82ca51414,2023-12-12T21:20:07.693000
|
||||
CVE-2023-6515,0,0,b1cac8cc9fea3fd0b40a6a2117ed3c8e0cef2dc5a15dff7c764d5ffc4d5c1dd5,2024-03-21T02:50:38.423000
|
||||
CVE-2023-6516,0,0,985253c885c61f60bc6fd457a9a9929b099960cd34ee513f4fe06318c86d10ae,2024-07-03T01:44:22.620000
|
||||
CVE-2023-6516,0,1,7472e484e94a7a3f87fbad35741b44f2ae8bb951c7b6ee16b9e4b79f20829803,2024-10-22T18:14:36.613000
|
||||
CVE-2023-6517,0,0,10761768e9e673f04ab5124418749b1098394ee0385db9da11f06cac3ddb6dd2,2024-03-21T02:50:38.540000
|
||||
CVE-2023-6518,0,0,33a876e02fc1e726795df0795586b3b4b951954439384c3fb9f45b3a1a7e2b12,2024-03-21T02:50:38.627000
|
||||
CVE-2023-6519,0,0,af1ed468f597fad0020cd7b616b532dc6dbacd5ac58c68e2f307c345defd34b3,2024-03-21T02:50:38.713000
|
||||
@ -241003,7 +241003,7 @@ CVE-2023-6815,0,0,fc9ec2453f06f961274a47b9ea9b7407d5368b76455379c9e0fea030732b21
|
||||
CVE-2023-6816,0,0,c3a19bc55b4b85fddd22fe1085c1d2a08de0931d91570a7c34012695db8c4bb7,2024-09-16T16:15:11.937000
|
||||
CVE-2023-6817,0,0,cc201b8683c94f706ae74ea5adc28642e020b44ac49d90e4b25ea49578f8bc79,2024-02-08T16:15:47.270000
|
||||
CVE-2023-6821,0,0,1ecc3c576162236f32f9f64a56f7295ad830704c5fedf9bc87d6ba759b1f7e3e,2024-08-30T08:15:04.520000
|
||||
CVE-2023-6824,0,1,76df22784ddc4346f4c678b2af0f6a7ab56f1620c7e41a3d47c4be80e64c0eb6,2024-10-22T16:35:16.083000
|
||||
CVE-2023-6824,0,0,76df22784ddc4346f4c678b2af0f6a7ab56f1620c7e41a3d47c4be80e64c0eb6,2024-10-22T16:35:16.083000
|
||||
CVE-2023-6825,0,0,5f2a6b8900d2ecb14567d0b430ce60a11b72adf0d920af3176450139cc927b08,2024-03-13T18:16:18.563000
|
||||
CVE-2023-6826,0,0,0b04535adf04b35ffa25089a607bb4494dc5795922b9225750066cd0ade8775d,2023-12-21T04:49:03.117000
|
||||
CVE-2023-6827,0,0,4fbb204335c244872e27df049bcd8cac30f890d15a7027d76fef2150fca5baaf,2023-12-21T04:48:37.823000
|
||||
@ -242335,7 +242335,7 @@ CVE-2024-1004,0,0,be9a3a60f238fd673f4d3f1f166af1f9400f4582d193359c16f232ef2b1c02
|
||||
CVE-2024-10040,0,0,e60010f49ca3103740274faae9ff6204ef5e8179ea2561631dfe21b2ee350ec3,2024-10-18T12:52:33.507000
|
||||
CVE-2024-10049,0,0,53720c9da49b26dcdd62ca517621f91bdc81303aa9036eed1b0a1b7834addde0,2024-10-18T12:52:33.507000
|
||||
CVE-2024-1005,0,0,1191b4a20d5b719ff3ba58b8e13bb4278d19f2133e7221e782230a58acb2d18f,2024-05-17T02:35:09.367000
|
||||
CVE-2024-10055,0,1,f23c4e0430e3651b3e5a88876f1cbabbd51c53a5add393f17e3c2bc07307aa14,2024-10-22T16:28:59.297000
|
||||
CVE-2024-10055,0,0,f23c4e0430e3651b3e5a88876f1cbabbd51c53a5add393f17e3c2bc07307aa14,2024-10-22T16:28:59.297000
|
||||
CVE-2024-10057,0,0,d8a525e53057703eafafe41b97e25f6595177cb8b862a21217c338a0239a3d3c,2024-10-21T20:53:22.813000
|
||||
CVE-2024-1006,0,0,fe82f3d0065ffa9f2a59eb5b63e144d9442dc24b73dc23626043d548cf903e88,2024-05-17T02:35:09.467000
|
||||
CVE-2024-10068,0,0,d30a41a047eea99fec87733a3e9cf71e01923d623f7bff84eb08ba80a39dc81d,2024-10-18T12:52:33.507000
|
||||
@ -242345,10 +242345,10 @@ CVE-2024-10070,0,0,097b5fa8b05282436b73014713798d6fa690cb8f60b9a6a570218b5126552
|
||||
CVE-2024-10071,0,0,bb09f0d1e52fd077bfb7e20220a6e7299b02ea37e71361b2da945aab892ebc57,2024-10-22T14:20:07.393000
|
||||
CVE-2024-10072,0,0,bc7125b99f3b32fe14c3d31b5db253134e4813c76ba571fea45856a5a9500c69,2024-10-22T14:20:16.997000
|
||||
CVE-2024-10073,0,0,36e7a75e8440250867ac4ab2920540c9c319ac3650023a2029f396b9acec7ea2,2024-10-18T12:52:33.507000
|
||||
CVE-2024-10078,0,1,2a32e11049e01066fde7387ca375ea057ecc9dffb9aee4dba521fe1d1cadf633,2024-10-22T16:28:26.113000
|
||||
CVE-2024-10079,0,1,373e7888db951070e423ef6d1503b855c013868b3575c214d882cd52c4cf0816,2024-10-22T16:27:54.577000
|
||||
CVE-2024-10078,0,0,2a32e11049e01066fde7387ca375ea057ecc9dffb9aee4dba521fe1d1cadf633,2024-10-22T16:28:26.113000
|
||||
CVE-2024-10079,0,0,373e7888db951070e423ef6d1503b855c013868b3575c214d882cd52c4cf0816,2024-10-22T16:27:54.577000
|
||||
CVE-2024-1008,0,0,a9b7d9e2e828ed74dc3f97aef993fcfdb7b13561fd219152455ff7524c8067cd,2024-05-17T02:35:09.680000
|
||||
CVE-2024-10080,0,1,e70a3cc8d8ca25d9e3db818c04f9b2eeee833bf342884de7579048a734fce30e,2024-10-22T16:27:38.840000
|
||||
CVE-2024-10080,0,0,e70a3cc8d8ca25d9e3db818c04f9b2eeee833bf342884de7579048a734fce30e,2024-10-22T16:27:38.840000
|
||||
CVE-2024-1009,0,0,97af4237278897e4de60a52c929ac5642d8b709167b278dc1af6a70d4d177e3b,2024-05-17T02:35:09.780000
|
||||
CVE-2024-10093,0,0,655dbc008c9c21b76c775eaa92108777c983716e956bf10f0085a4f9c49fc737,2024-10-18T12:52:33.507000
|
||||
CVE-2024-10099,0,0,f14bdb99d2ca7956ea9400330266332303014dc510bc6e629dc22733e615abb6,2024-10-21T21:03:53.647000
|
||||
@ -242369,10 +242369,10 @@ CVE-2024-10128,0,0,88b9e310a7215917b3c3eb4a7cebbad5131b0eb240c8e3b152a59db372aef
|
||||
CVE-2024-10129,0,0,ec801a1f21eba257d935123cd915f870568d53f742fe5aad47c455a4df207feb,2024-10-21T17:10:22.857000
|
||||
CVE-2024-1013,0,0,0ecf415fc1e3c9674ce36da20d6e67872f02747822a72b780ad0899083ff5765,2024-03-18T12:38:25.490000
|
||||
CVE-2024-10130,0,0,f6abde51c0a658ac0c1fc5543e76399ba5cf9030b2bf4a0d9258eaf9b51a8cfc,2024-10-21T17:10:22.857000
|
||||
CVE-2024-10131,0,1,f20c36c39f167240341b3ceff4ad8596e0ac95c8a6ba4794f233acebd21cebe5,2024-10-22T17:15:03.203000
|
||||
CVE-2024-10133,0,0,6ac712da64da44a34e6fd349fcf3c834370a70c72d69b9a548fcaa7d1fe57ffa,2024-10-21T17:10:22.857000
|
||||
CVE-2024-10134,0,0,6267065d9c293b3c2366b6219e1002e933ab90f824c948f3e215158bad3a34cd,2024-10-21T17:10:22.857000
|
||||
CVE-2024-10135,0,0,51210d7ceeda6ad57adce141fb0fe5d97f34f2c51cfc509b6b738e19f13616dc,2024-10-21T17:09:45.417000
|
||||
CVE-2024-10131,0,0,f20c36c39f167240341b3ceff4ad8596e0ac95c8a6ba4794f233acebd21cebe5,2024-10-22T17:15:03.203000
|
||||
CVE-2024-10133,0,1,fc460f5ce3816d01eb4d7de21043bb8a4934648447f619183ab421a50f6b3ccc,2024-10-22T18:10:58.963000
|
||||
CVE-2024-10134,0,1,16d134aa3c976ea726c0fdd3783e31c92fd1f3c8316076f471fa86666f9c5a12,2024-10-22T18:10:46.467000
|
||||
CVE-2024-10135,0,1,ec3ba0565196afb3b2e20cb539bc95e75e997dee416eef307cd08ede7b152664,2024-10-22T18:09:50.823000
|
||||
CVE-2024-10136,0,0,17790ffc426ba3f464e327ab05c0c6d36879047b0c8e0a5cf0c1c4a40c857210,2024-10-22T14:15:48.770000
|
||||
CVE-2024-10137,0,0,bf8dc737c8c1bd8d279f07a2951d8a27fe63f941562664fe26ac2d8ba987f2ed,2024-10-22T14:17:31.527000
|
||||
CVE-2024-10138,0,0,96b8afb0bc9d868623cd6816cbcb5468c3586235a65dd6af646eb37bb10ccc7b,2024-10-22T14:16:51.547000
|
||||
@ -242380,7 +242380,7 @@ CVE-2024-10139,0,0,11c32ddb1edfb399f29c4753543b82ea66d92ffc686e3d29b4d68af5ac18b
|
||||
CVE-2024-1014,0,0,8e546db835ee0e62e0f6ed5b95e90d5586231fc78746cbbfef7db3d61b3c5f3d,2024-02-02T02:05:39.277000
|
||||
CVE-2024-10140,0,0,ec9d51c2fc14eea2e4cdb7aa8f8bd180db2ec005ceca8608d4d081404a2e210c,2024-10-22T14:19:08.420000
|
||||
CVE-2024-10141,0,0,17ce1823f9e1032ce4106436ffa20ca67724ebc3ab8b7874ba66330fada06176,2024-10-21T17:09:45.417000
|
||||
CVE-2024-10142,0,0,20f3ea99900130160c805394b66019c49272761905b5ea7376caa328a388d2ce,2024-10-21T17:09:45.417000
|
||||
CVE-2024-10142,0,1,f8d897c68f0699e753bf4964aa75eec3baa1d06414695c8d5256c262c45a3b84,2024-10-22T18:11:20.450000
|
||||
CVE-2024-1015,0,0,5516b1d1af5a9d3814b8a6e102d3692fcdb9c463b2e2645787afdcb157946f20,2024-02-02T02:04:13.267000
|
||||
CVE-2024-10153,0,0,d622b7ea723b18e6ddfc603f2d4acbb1cff3ff02ebe01257835c2e3461165bac,2024-10-22T14:45:04.670000
|
||||
CVE-2024-10154,0,0,616a267b44cd60e0ee1735747cba3df9611277c523e780e0ba795002232a909b,2024-10-22T14:44:47.807000
|
||||
@ -242401,8 +242401,9 @@ CVE-2024-10169,0,0,e8e6c9fb9383945c3d410fc4f008280f899970c875613eff84d409b4d2eaf
|
||||
CVE-2024-1017,0,0,50b68641acb97d381e6a65107328f0dab0fccf027bea27ef0f379cc058119760,2024-05-17T02:35:10.627000
|
||||
CVE-2024-10170,0,0,43858dc94e553ea996e2f62171c2a07580bf4384f9d10283ecd355d244289e84,2024-10-21T21:33:49.663000
|
||||
CVE-2024-10171,0,0,6def7c486839e6a93365a9531b31890798e7138f9c8ee651ff23d937de5aea60,2024-10-21T21:33:26.937000
|
||||
CVE-2024-10173,0,1,a9b223ad26342bae0ecb573e6f6a805ec316d304fdef819b8c7ff56b9edef74b,2024-10-22T17:05:13.483000
|
||||
CVE-2024-10173,0,0,a9b223ad26342bae0ecb573e6f6a805ec316d304fdef819b8c7ff56b9edef74b,2024-10-22T17:05:13.483000
|
||||
CVE-2024-1018,0,0,6a41753bbb9bddfdeb27e8da1aa301f604399583ccfe73ec2b7c0e024f66f45f,2024-05-17T02:35:10.733000
|
||||
CVE-2024-10183,1,1,7ebf45c51fa69f38c2e38f42cc74a900aa06eb6cd128011216da23f9521a65c2,2024-10-22T18:15:03.827000
|
||||
CVE-2024-10189,0,0,ffc755e96982501f804ab166cd12d0605832a17249527107c82c3cd65a58ebf1,2024-10-22T10:15:03.610000
|
||||
CVE-2024-1019,0,0,9d34fb91efb6a448073ac765944da7eab7ec7fd07c6fef378639c859599f6841,2024-02-20T02:15:49.973000
|
||||
CVE-2024-10191,0,0,4ecd88c27c34e37b94ed56c347924bf6837bbfb39d55fba1c828925d6337ab29,2024-10-22T14:33:12.313000
|
||||
@ -243601,7 +243602,7 @@ CVE-2024-20417,0,0,2b2621922f4e9896d58ad85f7dd970402245ce4da0539fb0012d7404735b7
|
||||
CVE-2024-20419,0,0,0795f6e87845f9b46dc3400495c49fb48a047d8ed4e9d1842a04ff7724f0ad68,2024-08-13T17:15:22.787000
|
||||
CVE-2024-2042,0,0,148bfce3b5f48e2144e9167826ed5f6f120e539bf15296a435b2ce580e8b1f74,2024-03-17T22:38:29.433000
|
||||
CVE-2024-20420,0,0,1b6307b08ac5336375cc3664c71d09f27461a9a614efe41992a97e5a892448ec,2024-10-22T15:12:47.983000
|
||||
CVE-2024-20421,0,1,b8d90bf4638dbe0c37023b3ff1bd11c5ac7ded44281786691979af6c9dbb0983,2024-10-22T17:51:08.113000
|
||||
CVE-2024-20421,0,0,b8d90bf4638dbe0c37023b3ff1bd11c5ac7ded44281786691979af6c9dbb0983,2024-10-22T17:51:08.113000
|
||||
CVE-2024-20429,0,0,f467ae3dedce5a1f38518317999bbc8fc79bc2960eb95679505ee1fcb992ae20,2024-07-18T12:28:43.707000
|
||||
CVE-2024-2043,0,0,7a3896d230f6f1ae602a08f92e2eaaa644b5893021849dee8a675eb9b7c81e88,2024-05-02T18:00:37.360000
|
||||
CVE-2024-20430,0,0,10fa05ef1e262e03d3ec6f9856a4fd60e476d60000f282e33b3976f1a0227974,2024-09-18T18:56:05.510000
|
||||
@ -243628,12 +243629,12 @@ CVE-2024-20451,0,0,616ab4cb2b50cee49c462941d4d3e48792a6a3c09b725bd97a134b2f4a53b
|
||||
CVE-2024-20454,0,0,b7df5fe3c7f3ad82ec42e5ba189942703f651e8bba204ff78589b452573f75e5,2024-08-23T18:13:47.510000
|
||||
CVE-2024-20455,0,0,582e47a347a8706fc3b45fb517686d3b16168e4f0adf4813dc071f3e17470c8f,2024-09-26T13:32:02.803000
|
||||
CVE-2024-20456,0,0,bf56f0f0f8d3ed0f6616c43fc8ca6a47b6257ec17aaac25185ba7a05790b5cc9,2024-07-11T13:05:54.930000
|
||||
CVE-2024-20458,0,0,f4e424a91674f93250f5044f4f95f1a9b2abde7e2f7085db5e80531f79545701,2024-10-18T12:53:04.627000
|
||||
CVE-2024-20459,0,0,b3dbe0e2131980acd99e42dd7d3db2fec6db299d66f8e403fa33d50ddbdf5726,2024-10-18T12:53:04.627000
|
||||
CVE-2024-20460,0,0,1eaee4faefa3994076e2ba58bc83a5e7d236f2a094e1b7b7be00cb29805d4bd2,2024-10-18T12:53:04.627000
|
||||
CVE-2024-20461,0,0,25c5b419ca9fa9bba41bbde9dd3359450055a6d544c2de47a6316d4dfbb8f8fa,2024-10-18T12:53:04.627000
|
||||
CVE-2024-20462,0,0,352f9115eee6280b7763d0aba471834528310f478f87fdd374870b12c81c387a,2024-10-18T12:53:04.627000
|
||||
CVE-2024-20463,0,0,9f88660386fb168278f2988370d355737a91b9c700dd7d37593f1188a7b0f978,2024-10-18T12:53:04.627000
|
||||
CVE-2024-20458,0,1,7fb1e55e612ee6c8cc09ba5c55e99526661fa33e17c363c55add3406c5a053f4,2024-10-22T18:03:09.777000
|
||||
CVE-2024-20459,0,1,5cd54a48218e6b57b046cb69743cb297e897ffabcfc93cde2b5b5db91e60d9df,2024-10-22T18:06:48.333000
|
||||
CVE-2024-20460,0,1,358defc63ad86f792960aac125709e2fb3ed671fce4437f964487072e33fe867,2024-10-22T18:24:59.710000
|
||||
CVE-2024-20461,0,1,c15342729fb0990fca2c54c1ab369938cf9683949c2cefcc250f30164551b25e,2024-10-22T18:26:01.890000
|
||||
CVE-2024-20462,0,1,b4e4c93a961318330887a3ec7cd87acb06e21170fac85cb813ac45cad8cb70ab,2024-10-22T18:33:31.410000
|
||||
CVE-2024-20463,0,1,2fbbbaedfda9bb304c7dda8b513af588802004e5e8905e7372610fd9adcd741c,2024-10-22T18:36:35.487000
|
||||
CVE-2024-20464,0,0,885e4b5fbbba0f9d8b2f4ff463c0a3d55ff5aae6f976428aa05f22d0fa4e2121,2024-09-26T13:32:02.803000
|
||||
CVE-2024-20465,0,0,e6053a052da134a2b60854b5aefb33da7ab8ec9453353220c196e9e5fe323c38,2024-09-26T13:32:02.803000
|
||||
CVE-2024-20466,0,0,1f67211864766033ae7df34d7b817672b03d47284d690437051f747cfe419304,2024-09-11T16:15:05.683000
|
||||
@ -256531,7 +256532,7 @@ CVE-2024-38193,0,0,f683727b02704ad7b117b644e084a2e01a414a802e0c9c89e2d81dddf3e07
|
||||
CVE-2024-38194,0,0,24e67804e665b5e6ea54cd0ae83ecdc2b37957cb607c73aa4be48b792efb79b7,2024-09-17T17:02:40.553000
|
||||
CVE-2024-38195,0,0,d7663b0e9aa556c8ce10c21ef451a7d773e7f876b8747c98159d99dc83716a8b,2024-08-15T20:56:25.100000
|
||||
CVE-2024-38196,0,0,036126fa4e67f7c18a11733658d35aa169249f60e5767c04da0dc3a714533203,2024-08-15T20:54:50.510000
|
||||
CVE-2024-38197,0,0,9a40abe98c5d54835551587ddc4b75a591055dcd8f35ba539478fb7646793bd3,2024-08-15T20:40:58.547000
|
||||
CVE-2024-38197,0,1,e246b99240c1b06620a52e3aaa6761e8425de2dcf1c7f69f5debc43dd81216f5,2024-10-22T19:50:21.707000
|
||||
CVE-2024-38198,0,0,628cd807f7bcba6952b2c2062766a5214149c29bd5be742232c43abd2bc51e12,2024-08-15T20:39:20.260000
|
||||
CVE-2024-38199,0,0,642a12aa02f5e7b673baecdb6185f8efbceb0f3cbe1ac18a60e869ce79b2e0f4,2024-08-15T20:32:42.193000
|
||||
CVE-2024-3820,0,0,8985e7d1e7aecc5fe081b43705d723ec0ca067093ca4a65f30dd280cab84082f,2024-06-03T14:46:24.250000
|
||||
@ -256546,7 +256547,7 @@ CVE-2024-38209,0,0,a397cb1d020ff208f8c4852271e654420782ef1455eeb91732ec6921d5eae
|
||||
CVE-2024-3821,0,0,3ffbadbdaf34f564e9c498f1baa8fe758531e73989a1bbb861692bcbfdfc262c,2024-06-03T14:46:24.250000
|
||||
CVE-2024-38210,0,0,8332ac0d8608fbcc4685b3dfa3d24d6c14729747793e3309dc0faa1b43d99b5d,2024-09-19T22:15:06.083000
|
||||
CVE-2024-38211,0,0,51e2e73d6d93c77460ccfd3a0684ba8ffade47d470b416e9dbd607fd57a6c040,2024-08-15T20:29:19.557000
|
||||
CVE-2024-38212,0,0,e2743d90ecb1de3e9edc5582e3843f1e5c3859dd20f5d976ddeb533adc51baef,2024-10-10T12:56:30.817000
|
||||
CVE-2024-38212,0,1,c37a512ce718fdba4c6b06bf4cd0faf393d1e35bc9109431be6b1b569ef88ea7,2024-10-22T19:31:41.350000
|
||||
CVE-2024-38213,0,0,a57ec7b97080baf05c7c67e1e8b814c6ef63e8cb4eb809fa5c6a9e16af89b3b3,2024-08-14T14:55:49.887000
|
||||
CVE-2024-38214,0,0,36d440db09d4a2cbf6127fa4a6571f8fdbf7003c0a2820ce7057958b7fe01f75,2024-08-15T20:28:25.893000
|
||||
CVE-2024-38215,0,0,0ced8c69c344bb918392454f0cf78558fdfc7db995aead6aebc3687298b1b7c6,2024-08-16T19:02:41.517000
|
||||
@ -256597,10 +256598,10 @@ CVE-2024-38258,0,0,6c786148de3caa551f00d4f5be537f09b4e147b1bb4e421666b8f6ad51232
|
||||
CVE-2024-38259,0,0,d7a118fae4649d7f9bd788f71eb172724667e7ef52a1e02ea9ee9eac2db2ad0a,2024-10-10T14:02:28.917000
|
||||
CVE-2024-3826,0,0,121760e16d238bf81106004c4251c8d93e688e0e085277d4609f0e751627011d,2024-07-02T17:44:45.700000
|
||||
CVE-2024-38260,0,0,73cef9e77ce89bf4b93fa7a1c854f856e4e4e75ffa70f23f415d57a3b75d2431,2024-09-13T14:53:26.410000
|
||||
CVE-2024-38261,0,0,9583da2bb40d90f8b2743959174a0c8a2ccf7bdda84091e0c2e368781f65f05d,2024-10-10T12:56:30.817000
|
||||
CVE-2024-38261,0,1,a036027ac3cc4115cfd09259c55f148edfe89fd6345b9787b8699b3ba958bdb8,2024-10-22T19:33:29.160000
|
||||
CVE-2024-38262,0,0,058977b60bd52839342064fbab52f3e208a09db53eaf57c3ad301c83ca1834f0,2024-10-22T12:54:48.080000
|
||||
CVE-2024-38263,0,0,f46aea6861be934017dd7285d8a02938dbd0902e0b8a60fe9326066622646e6c,2024-09-13T14:55:01.400000
|
||||
CVE-2024-38265,0,0,5a6ac7682f195b57ffcf43454caf05a40e63455a4865ead8b64a30139a103b5a,2024-10-10T12:56:30.817000
|
||||
CVE-2024-38265,0,1,b987041af82bf224d305440dfe3a1e78cb0c2c2842cb9ac29ad480c0d374426a,2024-10-22T19:33:43.260000
|
||||
CVE-2024-38266,0,0,24812493931b23eb9f9c734be2317a33135a030c22860333943c8effa1ea4408,2024-09-26T13:32:55.343000
|
||||
CVE-2024-38267,0,0,e71850959c90aba1f66e5470156760ebdd22f551c837bdf538f552a253eba944,2024-09-30T15:52:52.787000
|
||||
CVE-2024-38268,0,0,fc3e50bd4dbfc035f365112fb8a19ccb3d01fa7d152f5c8ee7b8579015795ce9,2024-09-30T15:52:29.977000
|
||||
@ -257651,6 +257652,7 @@ CVE-2024-39745,0,0,76dcbb05d353e026eccc967feaecdea5409270418987883e30491009b8479
|
||||
CVE-2024-39746,0,0,6375fbb4b5bb9c905c41c7f4d0b9ebb7e249deb4532114f1d7954e0a6335ab2c,2024-08-23T15:25:02.123000
|
||||
CVE-2024-39747,0,0,a2161f167ae95389c72b0c031bdb90fe73f7e348a5f87dbcba6e48e76545660a,2024-09-16T17:13:47.497000
|
||||
CVE-2024-39751,0,0,a868bf4be3dd2b51f3b58089c18a834cccac125c90e59de11837fcfc432cb518,2024-08-29T16:56:32.053000
|
||||
CVE-2024-39753,1,1,2b2d541019cc58f401cde1fc41f90e1194f294e85337361eb3c061e0d53bfee9,2024-10-22T19:15:04.790000
|
||||
CVE-2024-39755,0,0,dfcf10f6b8600deddb49177d38227bb50ccc0bc92a697b205718d374dfc6c532,2024-10-04T13:50:43.727000
|
||||
CVE-2024-39767,0,0,3e2d929a0dec960247b2d08752313be7fe5d03de12cbd71addbfff64b71f8489,2024-07-16T18:04:02.993000
|
||||
CVE-2024-3977,0,0,e9ddc667440c6dcbe059212d85a4e046d10d5ad7b4b151b497bb4963c631de68,2024-08-01T13:56:47.833000
|
||||
@ -257809,16 +257811,16 @@ CVE-2024-40060,0,0,8684e047d9ba2e6cc4bcc7c4afd5cb58b4b20c732a4bb0dd43020155d17e1
|
||||
CVE-2024-4007,0,0,857ffd215040050c5517e94efdf82e72cc62aae4cfd62acb973d56bcff6e13cd,2024-07-01T16:37:39.040000
|
||||
CVE-2024-40075,0,0,ea8801174ab63f09ecb78691088214272746fb9a3a5615024827c9ef25c43b0c,2024-07-24T12:55:13.223000
|
||||
CVE-2024-4008,0,0,41ba43cb718e067f099fac417cd6110082f457ea9bc7353b1528141e52f4a2d0,2024-06-18T17:00:01.570000
|
||||
CVE-2024-40083,0,1,6214757a38a28413207a0d4d3bf59a87ad21f64a445a6477f90c9814d96e64d5,2024-10-22T17:35:03.297000
|
||||
CVE-2024-40084,0,1,e5a48869dc57daf978e93f4d404b40d8cd7575a004e2e23910e1636b2fbf4ba2,2024-10-22T17:35:04.057000
|
||||
CVE-2024-40085,0,1,7cc1b970ba005bdf1c26ff25b3a180cbc5e09f7dbecaeac58ab4095d9a54f531,2024-10-22T17:35:04.843000
|
||||
CVE-2024-40086,0,1,d477aa9a9d381f98d54e41fcc40bef402826f6575f7a4d21e22aed5f418bbdb5,2024-10-22T17:35:05.600000
|
||||
CVE-2024-40087,0,1,be7927f3488a0d370038975baafb448110d1c8fb340e9ed7e5d0faed3d81a193,2024-10-22T17:35:06.420000
|
||||
CVE-2024-40083,0,0,6214757a38a28413207a0d4d3bf59a87ad21f64a445a6477f90c9814d96e64d5,2024-10-22T17:35:03.297000
|
||||
CVE-2024-40084,0,0,e5a48869dc57daf978e93f4d404b40d8cd7575a004e2e23910e1636b2fbf4ba2,2024-10-22T17:35:04.057000
|
||||
CVE-2024-40085,0,0,7cc1b970ba005bdf1c26ff25b3a180cbc5e09f7dbecaeac58ab4095d9a54f531,2024-10-22T17:35:04.843000
|
||||
CVE-2024-40086,0,0,d477aa9a9d381f98d54e41fcc40bef402826f6575f7a4d21e22aed5f418bbdb5,2024-10-22T17:35:05.600000
|
||||
CVE-2024-40087,0,0,be7927f3488a0d370038975baafb448110d1c8fb340e9ed7e5d0faed3d81a193,2024-10-22T17:35:06.420000
|
||||
CVE-2024-40088,0,0,f7759b011e80db767fd1dbd212bf4323a92520bb9be3957ba923eab16655ce61,2024-10-22T14:35:16.010000
|
||||
CVE-2024-40089,0,1,ed4eb5a53b2cd859e53f91fb6a09f58a08f10b728994f90f9ffa170b92bfb777,2024-10-22T17:35:07.167000
|
||||
CVE-2024-40089,0,0,ed4eb5a53b2cd859e53f91fb6a09f58a08f10b728994f90f9ffa170b92bfb777,2024-10-22T17:35:07.167000
|
||||
CVE-2024-4009,0,0,26a6ec4a10b164e2f280e8681d4c21dd6301b3a45dfa2578f28e720f7416c2f5,2024-06-18T17:01:19.897000
|
||||
CVE-2024-40090,0,1,1d8565eba1bbb89f12f02c55fd6cc2d4a5a146a6b0b6272e27409baab823c846,2024-10-22T17:35:07.957000
|
||||
CVE-2024-40091,0,1,d7ceb5c1a6a6f5dd1f114159610592371d05efa53ae448a2bdee1e5d98966d98,2024-10-22T17:35:08.760000
|
||||
CVE-2024-40090,0,0,1d8565eba1bbb89f12f02c55fd6cc2d4a5a146a6b0b6272e27409baab823c846,2024-10-22T17:35:07.957000
|
||||
CVE-2024-40091,0,0,d7ceb5c1a6a6f5dd1f114159610592371d05efa53ae448a2bdee1e5d98966d98,2024-10-22T17:35:08.760000
|
||||
CVE-2024-40094,0,0,5d1ab4fa5a1484beb0714ef3fcebe3147b446e4d722942df6d84c0a1bd2dd7f2,2024-07-30T13:32:45.943000
|
||||
CVE-2024-40096,0,0,7067973a4296a7a70beea7b209cd71d2a86d44a9bdfd60035b86d8848d99631b,2024-08-30T16:14:41.957000
|
||||
CVE-2024-4010,0,0,6f96a951ba4d658f2d216c10726beef3ec3f9c518875bc1c492ed89999ff3fc2,2024-05-15T16:40:19.330000
|
||||
@ -258449,6 +258451,7 @@ CVE-2024-41175,0,0,35e860a2d31eb21e3779e1686be69664a02d6ab1bab83d6168914f472f9b9
|
||||
CVE-2024-41176,0,0,54a27b7d242a59ee004d70d03c3c2f94f53556ca2727d85ff4c509bc25fb8e36,2024-10-01T07:15:03.147000
|
||||
CVE-2024-41178,0,0,5da27e6bd4cfecb3274c0413ac77a628456bf2e70cb97b3347c2830cb191bae8,2024-08-01T13:58:24.173000
|
||||
CVE-2024-4118,0,0,261b7c2db2db4c5bd0863007ba022afd6141eeb3c40d43094e801a457a5edb93,2024-06-04T19:20:30.147000
|
||||
CVE-2024-41183,1,1,d47920b6ca9cd00e5102a54f551ac84fb41d61257f3aa2c1532e0d6058a340b3,2024-10-22T19:15:05.413000
|
||||
CVE-2024-41184,0,0,460d3d6d07916ac0f7c6ce162599c802c196ea0f25bca5ddf54b8e8b249634fe,2024-08-02T05:15:47.217000
|
||||
CVE-2024-4119,0,0,1787463dab796293e9249fc34f7a40843b12d1d129a7d5ccdb513e5ec2672067,2024-06-04T19:20:30.247000
|
||||
CVE-2024-4120,0,0,820754c86895fc4e7f3a6d10baae3c2abd537610acf37474f492c12f46cc8b59,2024-06-04T19:20:30.353000
|
||||
@ -259871,7 +259874,7 @@ CVE-2024-43442,0,0,5431c5e587ae45a37d19d37e97d6aeb67638f78f0db0677df8b847e3725ec
|
||||
CVE-2024-43443,0,0,41bfb91b7f7c9bee48be0f5c8ffcdaa9039df695b92734c0f1b611ea064f9e04,2024-08-26T12:47:20.187000
|
||||
CVE-2024-43444,0,0,869e12b3e86ded10c38d8795cc34fa22bd804c0b1d5e73f28a97d45f8e95ed59,2024-08-26T12:47:20.187000
|
||||
CVE-2024-4345,0,0,991a52fb88968c952c460a76f59f283c0ad80fedc25d9533338fbc3b0d515f60,2024-05-07T13:39:32.710000
|
||||
CVE-2024-43453,0,0,c941563eee0035394ae37700c8a3b91a1f220c8f4da80c0f896f8a39e45a51a8,2024-10-10T12:56:30.817000
|
||||
CVE-2024-43453,0,1,987e6c8ce7e8f2e1d3f9232b14d73438f55ce61f84bbe67fdf49d3284ca0d7f9,2024-10-22T19:29:44.997000
|
||||
CVE-2024-43454,0,0,f0995c64c71167afbbf899e7ce1038e4a80441f5a273809866a5c3103af339c0,2024-09-13T14:52:28.570000
|
||||
CVE-2024-43455,0,0,7effa4d2d49733857a939b9c56001fb62c3a8618d5be7fb4155055d0a4466b05,2024-09-13T14:50:02.390000
|
||||
CVE-2024-43456,0,0,7e33172df2a3bcdeebebada3a1490c286c11a1e92c4e5a2d00db0b809ed4d2cc,2024-10-21T21:28:15.323000
|
||||
@ -259999,12 +260002,12 @@ CVE-2024-43583,0,0,644d57ca5c0876327fd1914bed083468117306cb0e7b162159599db8c7b27
|
||||
CVE-2024-43584,0,0,362ea5a413c7ba1c32a6fee99bf2388c9e5eb62bbecc3bdbb75267eaeaf9dea9,2024-10-16T21:38:33.867000
|
||||
CVE-2024-43585,0,0,6e4f086b3b625aa729537cada88bf0b054983b8ff5768ed654837466a18e4381,2024-10-16T21:38:57.467000
|
||||
CVE-2024-43587,0,0,0ba55dc8bba29a226390cf1df11aa1a48b87238df192b6c505cf2d579dfa9a20,2024-10-18T16:54:36.267000
|
||||
CVE-2024-43589,0,0,78d47cc785569b349dce95fb2e6d8a34e6eeefcc81296c73c51c2f00b5575977,2024-10-10T12:56:30.817000
|
||||
CVE-2024-43589,0,1,a22527ce3cbd74a3b78112c354a29e2c2eb35fd8af838f6bb3f8e8573ce240e6,2024-10-22T19:29:53.660000
|
||||
CVE-2024-4359,0,0,14ae9b130c152b886b9b21ff0fc5d35432a1812b898a1bc13704faab705127c7,2024-08-12T13:41:36.517000
|
||||
CVE-2024-43590,0,0,152277bbadbbed56789e7a47dd749f0ba30af86c181629a529a65bb7827133a9,2024-10-16T21:44:50.927000
|
||||
CVE-2024-43591,0,0,21af6b0df980a2fc5a207f146dfd7c6553b24177efdeb611a01147c3bfe2bcf4,2024-10-16T21:46:38.153000
|
||||
CVE-2024-43592,0,0,7ecc81cf1723714fa4e3de1f15eac00751a7a7544d8b8c45c193cc8c2f235717,2024-10-10T12:56:30.817000
|
||||
CVE-2024-43593,0,0,bdb519a73d468c07de00793af221602ccf6b3af63b116f963a7af3f2dba9f29b,2024-10-10T12:56:30.817000
|
||||
CVE-2024-43592,0,1,66ef8868710faf1076b1b13051f2c75eebafbfe5976017df5a4f00073c2c60d7,2024-10-22T19:30:02.777000
|
||||
CVE-2024-43593,0,1,7e17c95f595bed9729f21273d821a92cb32423e919d0faf83c37ed5dcd8b802f,2024-10-22T19:30:19.870000
|
||||
CVE-2024-43595,0,0,49c8ef8ffb75a5ec70699cc795d1609c79911425d9af876685f5afb587ecdf8d,2024-10-18T16:55:06.487000
|
||||
CVE-2024-43596,0,0,4d0eab859578b1da1191993d8733ffb2c2af60ce5eb8286215da588a379a8b9d,2024-10-18T16:59:08.667000
|
||||
CVE-2024-43599,0,0,46d81ec2898b49efc1d06eab918dd819a14dff6d746dfc96a1846004d908dfe9,2024-10-17T20:03:28.687000
|
||||
@ -260012,12 +260015,12 @@ CVE-2024-4360,0,0,ecc9c2c2d55d835e0dd1d5a0ca496992d866a587cb1717ba0b6dc8cd29acfd
|
||||
CVE-2024-43601,0,0,3e0cb684b9b72ab9715d70d4c4bb91816d9cedd3127d38e1748b786a08e8a124,2024-10-17T18:23:01.007000
|
||||
CVE-2024-43603,0,0,d2fca24eb56e369fa155c253fb46551545c3a138800b20bacb862233e9cfec55,2024-10-17T19:55:34.360000
|
||||
CVE-2024-43604,0,0,f6faaab53dedc3cc5ca882966371cef6b85571d62bbd9d0efe6e399cbea7c221,2024-10-17T19:54:24.387000
|
||||
CVE-2024-43607,0,0,bffc16c2b831151c6e6c2522ec8335ce79fa8805ad054a604abcb44a67081505,2024-10-10T12:56:30.817000
|
||||
CVE-2024-43608,0,0,d778a741c452756f08141283b44511b35f848f925ff9e901d81fdc04d7ed6c5c,2024-10-10T12:56:30.817000
|
||||
CVE-2024-43607,0,1,f77e9baeaed71ae01585aac88f6e4a22dbbcabcaaded574a516f1ff34eb6e860,2024-10-22T19:03:17.993000
|
||||
CVE-2024-43608,0,1,9ef063727e3c5e90fc7689be113b75b10e65fb83e0aa96c17082d9ea68bad9d3,2024-10-22T18:58:04.887000
|
||||
CVE-2024-43609,0,0,b51bc951febae72cfbab824fd5dae1956187d25f6e42e962d7d237590a3266d0,2024-10-17T21:18:58.113000
|
||||
CVE-2024-4361,0,0,59805155c6666ce54d8263fcaceec5e0fc128f8100df5fb2e590f4610d5a88ea,2024-05-21T12:37:59.687000
|
||||
CVE-2024-43610,0,0,e05bc7d7fba9921ddb28639aa2d807e02a712368195686314d74c31cc0c1b1bd,2024-10-10T12:51:56.987000
|
||||
CVE-2024-43611,0,1,4cc7faddbc4a0042c9b0d18e623cdb2e65033905714d4e2435ea5507fb9866e2,2024-10-22T16:01:19.373000
|
||||
CVE-2024-43611,0,0,4cc7faddbc4a0042c9b0d18e623cdb2e65033905714d4e2435ea5507fb9866e2,2024-10-22T16:01:19.373000
|
||||
CVE-2024-43612,0,0,2d63857a7410863939630233bd3c57b8a869ef6d82a1dc4e625bbf528ee43c0a,2024-10-21T20:48:02.050000
|
||||
CVE-2024-43614,0,0,37f86979c4c4ec96d0dd61c1d9daa59ec511d8fd5452834efe232d695cc74469,2024-10-21T20:50:38.370000
|
||||
CVE-2024-43615,0,0,841e5833e1934c639d3a9a11a43505704ba14c449fb8c86b43a2c5341378c86b,2024-10-21T21:00:34.967000
|
||||
@ -260969,6 +260972,8 @@ CVE-2024-45323,0,0,c7408403154d2d18fc914b88a9df254c03b0863b353ec16a1e5cdd4039b8f
|
||||
CVE-2024-45327,0,0,34cd0fc64fb19ec545d442f8caf6da026f7560c6302dd0f3b1f687d00148ed60,2024-09-11T16:26:11.920000
|
||||
CVE-2024-4533,0,0,aca3a412ead1ce1343d6f498450801be5e059db6302d74881039b5fe75fb6c09,2024-05-28T12:39:28.377000
|
||||
CVE-2024-45330,0,0,44d2ce461eeddbf3a7a44fe92b128e09d8c56d9b0bb9a6c4f9c38a59d262f5be,2024-10-19T00:41:09.717000
|
||||
CVE-2024-45334,1,1,eacd68328ca4f44b8ed08b353c4abb200cf5fff2f977b297b36e84209a3f4e16,2024-10-22T19:15:05.670000
|
||||
CVE-2024-45335,1,1,f0cdb2059b0012b9af6f227aefe4f1580459ec588ab341a4a3b300f37dd651cd,2024-10-22T19:15:05.840000
|
||||
CVE-2024-4534,0,0,527a3127a7586bdf18d80cd2b5b17fe74ac5ed6a2aa4ee562148173cc1d9d3e9,2024-08-09T19:35:09.923000
|
||||
CVE-2024-45346,0,0,2f7f906fa8e830e09f5dc1994b30102df77aeab36a86b7c31755a212ce377dbe,2024-08-29T03:15:05.247000
|
||||
CVE-2024-45348,0,0,f8397568e636cad274a96a56fcdbc01af3feb6775d5986faa9442985588b0658,2024-09-26T13:32:55.343000
|
||||
@ -261078,7 +261083,7 @@ CVE-2024-45507,0,0,b2cf0920dcb75db868de7b4afd51449cea360da72164b9b7e7a575176b0c1
|
||||
CVE-2024-45508,0,0,a7bf13ff5f2bf318e53d0cc8b12c1b5ac7eae45f1991e7b683a2e3673a166bb9,2024-09-04T16:44:08.247000
|
||||
CVE-2024-45509,0,0,2da4a07b41eb99a3059398ff74aeb7ba3be7995744fd94f415c5c3e9d41f0b5f,2024-09-04T16:45:08.597000
|
||||
CVE-2024-4551,0,0,f0a0f74f6dfab215971682e84a8c3d35d9da568954bf14d9189d7462b5493bd2,2024-09-20T00:24:08.597000
|
||||
CVE-2024-45518,1,1,85e0e8d0490ef458e34c3cb4cab880d0e6443a5b3376eb82b1a1170ed808b4e1,2024-10-22T17:15:03.837000
|
||||
CVE-2024-45518,0,1,3f71040dbae7c84bba1fb6028e9819786c7fcad026d08f57513fa9a7c3bb40d1,2024-10-22T18:35:04.347000
|
||||
CVE-2024-45519,0,0,1314fc46f1c0fd544c41bcc772f8e9adc71c225c5b1014a689dc2f992c782655,2024-10-15T14:32:13.520000
|
||||
CVE-2024-4552,0,0,a910e848f992d4848b5a9057809234cfe8833a167abb01396097dc34db4ca3d3,2024-06-04T16:57:41.053000
|
||||
CVE-2024-45522,0,0,cfbe5f5b4866198ecf4773ddc4ec07a576ac517554c3c987f558bc88648f0e9a,2024-09-05T14:29:32.737000
|
||||
@ -261339,11 +261344,11 @@ CVE-2024-46215,0,0,d9c9b41b37ebb8d2c46b9303b2f662f08cd28b45185e47d3a9c15d51a3370
|
||||
CVE-2024-4622,0,0,7ee7f5b0dbbae0efd9526a317b5150a2af537411986feb7d056b697fe5fc8d53,2024-05-15T18:35:11.453000
|
||||
CVE-2024-4623,0,0,c53a127683caa8cc49c11a88cc217ef787af901116f1ba89c4741730eb1cc926,2024-06-20T12:44:01.637000
|
||||
CVE-2024-46236,0,0,209f5305021314c3b6255b9d0e8e8a0308a4fd597e09d99072173108ec464c84,2024-10-21T19:35:03.590000
|
||||
CVE-2024-46237,0,0,e9a03598fb64b05ba8882f6b5b526c713a555a3e7fdae15963deddf3bd8ceb51,2024-10-21T19:15:03.277000
|
||||
CVE-2024-46237,0,1,89c70f938f955e8f8794daf2309e374bb81a18bcff912f949189945353ae1bfc,2024-10-22T18:35:05.180000
|
||||
CVE-2024-46238,0,0,e04df7a8502d302f172444f965d1fa00612ca87792c631612b16a6e649750ad1,2024-10-21T21:35:03.580000
|
||||
CVE-2024-46239,0,0,926566aaeaac1cf6bfa054ea714a4093c287c3bf6826d025bfc5db3fb3092da4,2024-10-21T21:35:04.510000
|
||||
CVE-2024-4624,0,0,8d5df292e17ba086eddadcbafacc529f2ebc3c5e49d7b6ea9488db217d327898,2024-05-14T19:17:55.627000
|
||||
CVE-2024-46240,1,1,7095785d06ffd789b291cf674b04480cc2015e975f36b62912f4d71adb122b9a,2024-10-22T16:15:07.407000
|
||||
CVE-2024-46240,0,1,7fc06dbd07643c50f35214e73d631140ea5c0fd9a5a338bf2252defe35cc8370,2024-10-22T18:35:05.950000
|
||||
CVE-2024-46241,0,0,e8f867d722224165a0936937fdbb3a70034985bd08f25a28d6b30ab6a32199ce,2024-09-26T13:32:55.343000
|
||||
CVE-2024-46256,0,0,3eabf4e0bd1ddec40016e8895217bf93aabad097691dbd82d3a7db1e6662a8b3,2024-10-03T18:35:08.983000
|
||||
CVE-2024-46257,0,0,9ea0ad0f2e6865da2b0362a090cb21ce2a440cd52edf95f9a53e87e2d7fb967d,2024-10-03T16:35:05.240000
|
||||
@ -261371,7 +261376,7 @@ CVE-2024-46313,0,0,0b29c605876b046853c74672dadf1c8118f0e83614058ed8950277f93a0b2
|
||||
CVE-2024-46316,0,0,54b9c1fe9acfe98423855e0709c0cdd187e74f76088027a762e1c19f14357911,2024-10-10T12:51:56.987000
|
||||
CVE-2024-4632,0,0,1847fe54466daf978000619c24fbece5b125c2ebcf9d5cf0d1e6a4b41146457c,2024-06-20T12:44:01.637000
|
||||
CVE-2024-46325,0,0,2552c217f6f2bafd1ae497da9a6104efc7773541d10c748bee2c01ded062ab22,2024-10-08T19:35:19.850000
|
||||
CVE-2024-46326,0,0,7875fb14992074ba281d1d956aa63318aab5cb652a91e574fe8b467bc536c6d1,2024-10-21T20:15:14.637000
|
||||
CVE-2024-46326,0,1,70349983a6f2562224ac741e0655e5701b6e6590f61ca41c2783f0e01b277172,2024-10-22T18:35:06.717000
|
||||
CVE-2024-46327,0,0,d444c66c2d1131cacb5a6cc939ae8062aae08f60f0b531cdd6bc43039126a6e8,2024-09-30T12:46:20.237000
|
||||
CVE-2024-46328,0,0,150e1d7b5fcc22f852cb919b13410447bdf1e8cb19cb878b6bbbd7be01f4269b,2024-09-30T12:46:20.237000
|
||||
CVE-2024-46329,0,0,8c93b211ce727ef89bff0e17a07fc114c301812ff446c3d9b747d9a6ed124748,2024-09-30T12:46:20.237000
|
||||
@ -261429,11 +261434,11 @@ CVE-2024-4651,0,0,745218d04b1207995e3df340bed9abda2dd0952b7a1b22fcaaa17a8ad8b7b0
|
||||
CVE-2024-46510,0,0,bb46a7737029f26392a246097a18ec9ca317101031432da9b686fbbec181f9e7,2024-10-04T13:51:25.567000
|
||||
CVE-2024-46511,0,0,78cf785de24718da0c0ea71257e191470c834e4be61ca79ad4d72c264c3c4729,2024-10-04T13:51:25.567000
|
||||
CVE-2024-4652,0,0,8fd7af949b4c89aa1e5f9f8bc7784e47292323116a1f6a56ecb880f3c410a541,2024-06-04T19:20:44.873000
|
||||
CVE-2024-46528,0,0,a31b8dad674e1792ba2e3480eb54bd9167b5430c2cf6a9cfdcaa08814b4f53db,2024-10-22T13:35:02.157000
|
||||
CVE-2024-46528,0,1,81f8583f4022a65d1ad9471b4717d45f3c83d5a174d4df1514139f8d90b90c3a,2024-10-22T19:35:08.350000
|
||||
CVE-2024-4653,0,0,7b6d5c0913690c5b51d844fc9718b4208eaa5f352f244fd41eee7be1add5e3bc,2024-06-04T19:20:44.990000
|
||||
CVE-2024-46532,0,0,28e90e41b88b199c93bd44748203fc4edc0b214d52c53df9729e48aaafb51060,2024-10-16T18:35:05.480000
|
||||
CVE-2024-46535,0,0,303f432dafe76053288b97daeba04961b685b8c5980dad6e5d762d1f5502c318,2024-10-15T16:35:08.740000
|
||||
CVE-2024-46538,1,1,cefa2e21b5bd2ee89cbf40d952628918d4a31d55c6fbe92a038df0e0a23ebcbc,2024-10-22T17:15:03.950000
|
||||
CVE-2024-46538,0,1,49444b472ba8cdcaedaf8db0cf57116ab5798660a07219d0cf58ae35fd282d3b,2024-10-22T19:35:08.563000
|
||||
CVE-2024-46539,0,0,2d2c57643421ecf3202df41ca86f61b87e91435ec045a273724c1fd7bed0cf14,2024-10-10T12:56:30.817000
|
||||
CVE-2024-4654,0,0,0088d34096b2578204ff98fe71c1f702e4c8866653411407f72fe940a56448df,2024-06-04T19:20:45.100000
|
||||
CVE-2024-46540,0,0,82bd73e280c5a23d3b35406dd5a042ddc542cc53d99831f15d05d7d862ed5067,2024-10-04T13:51:25.567000
|
||||
@ -261738,6 +261743,8 @@ CVE-2024-4689,0,0,a13cc88d2e9b12d452cf9b42ce57cc1735d851f3f551a07c40e7bb0f2ee113
|
||||
CVE-2024-46897,0,0,2e86e25932c3365c9fccf8620fea0f0e322915cee2108f33175688332c9426e1,2024-10-22T14:09:46.913000
|
||||
CVE-2024-46898,0,0,1121a0227e884e663de945d1f5ee0881d2211aaf4fceffe823ea2d2dc74e4f9c,2024-10-17T17:52:00.700000
|
||||
CVE-2024-4690,0,0,8a659fbde289577b9d47a4e0b198b3a10d973db6b9b3690d157fcfdd9eceabd6,2024-10-21T15:51:10.467000
|
||||
CVE-2024-46902,1,1,84a92f67e4cb3c89751bf07675bd1aed31b5257a3cc92542d0e4de163f9c9a35,2024-10-22T19:35:09.313000
|
||||
CVE-2024-46903,1,1,3193f232af51497688648157e8d7e65d0fd98a4b8a3968b1550229148f9fd1b3,2024-10-22T19:15:06.283000
|
||||
CVE-2024-46911,0,0,611952a6b1126b54cf024e9a99d67e12cb7d1e8ec93fd9b8c3fb7fb963b348cf,2024-10-15T12:57:46.880000
|
||||
CVE-2024-46918,0,0,bb2eeb1c2eb1e1757cf1750044772f91012857866544e10c0b718da276cf0057,2024-09-20T18:14:23.897000
|
||||
CVE-2024-4692,0,0,420cdb756a1aaa14cb1e307335b6de7bd1d234a3afb21494fcdfd9686d988217,2024-10-21T16:10:14.873000
|
||||
@ -261896,7 +261903,7 @@ CVE-2024-4722,0,0,d0eb70616d7559be2944527d8cacda4cb03faa787985cf2ceace067dd7c5ef
|
||||
CVE-2024-47220,0,0,ec1088c10a16b1d5d48c36f52f549a9f66295221614c4c2acd2563482d5ed68e,2024-09-26T13:32:55.343000
|
||||
CVE-2024-47221,0,0,cc80d5b45c9b68b206ee1a2dbfe9f9a68f652cad6fbd63e536e536e628b771d4,2024-09-29T00:45:21.857000
|
||||
CVE-2024-47222,0,0,c74f6ce55a0f72a72d3d22a82ae52356e74326f3e21780a319e444b828ec8b8d,2024-09-30T14:02:23.007000
|
||||
CVE-2024-47223,0,0,7b7c5dfada9c3a18b4d792ccd64411ff021bcebcc068165595949b9109fffe5b,2024-10-21T20:15:14.770000
|
||||
CVE-2024-47223,0,1,fb09416be3a21eceb8e5bccd108d47d718595b69c0752141eb5a33e742ce9071,2024-10-22T18:35:07.540000
|
||||
CVE-2024-47224,0,0,0cb275a6c41266c4316d80da854515c99c83745da7bd8c045804d500798ee0a9,2024-10-21T21:15:06.650000
|
||||
CVE-2024-47226,0,0,67acd1dda98161941683c1ecdf3fb2829a8afb2cdb12d796e19b0a64631c82e3,2024-09-26T13:32:55.343000
|
||||
CVE-2024-47227,0,0,411c02c14211cd5d3ec12de94c1c6b5b491382d24a6716c2e035097b7090e042,2024-09-27T16:37:44.143000
|
||||
@ -262039,9 +262046,9 @@ CVE-2024-47459,0,0,0b1d286cc18504287dd532d658d2383a7255013ccc216b35a3e0d03bccac4
|
||||
CVE-2024-4746,0,0,764da2d2faf52d5d8b005efc01764a8e4bfb42f0a65f0b328618a43b312322fb,2024-06-12T16:17:42.223000
|
||||
CVE-2024-4747,0,0,071c88b133efa29a5bceaf4f1781edaa635d35ede69008d4aad9361c37e95f56,2024-05-14T16:11:39.510000
|
||||
CVE-2024-4748,0,0,5ce71114653bf2c9cc6586a0117b72827b192c4aa4e8e27ac2b81ed4a0b190af,2024-10-10T16:15:08.630000
|
||||
CVE-2024-47485,0,1,70c31bc26651c666f1f81bb314c02989bd53a835a51d6fdce38b5fab47a41c05,2024-10-22T16:23:22.890000
|
||||
CVE-2024-47486,0,1,d0e2cdb063c29469a8d3896035823ed37b083b056a6c7ff12d1a7f59bad20ea5,2024-10-22T16:11:07.547000
|
||||
CVE-2024-47487,0,1,89e5f946b42ae69712fe53b468ea8b777288a7068d88dd6a3031473d76e487d6,2024-10-22T16:10:08.027000
|
||||
CVE-2024-47485,0,0,70c31bc26651c666f1f81bb314c02989bd53a835a51d6fdce38b5fab47a41c05,2024-10-22T16:23:22.890000
|
||||
CVE-2024-47486,0,0,d0e2cdb063c29469a8d3896035823ed37b083b056a6c7ff12d1a7f59bad20ea5,2024-10-22T16:11:07.547000
|
||||
CVE-2024-47487,0,0,89e5f946b42ae69712fe53b468ea8b777288a7068d88dd6a3031473d76e487d6,2024-10-22T16:10:08.027000
|
||||
CVE-2024-47489,0,0,b60e5447ef49080d8bcb541a004c5061338369ecebcb53ef8b0c02387b615511,2024-10-15T12:58:51.050000
|
||||
CVE-2024-4749,0,0,21df5bc0093c94425462a6e59e75544f486b5326a781fcb494e0f25aa2f7ef93,2024-08-01T13:59:33.520000
|
||||
CVE-2024-47490,0,0,e3601f25126ea5528355c875251d16d0b06252aacf2c95cdc691bd121e53f290,2024-10-15T12:58:51.050000
|
||||
@ -262124,7 +262131,7 @@ CVE-2024-47630,0,0,adfa126a6bff751cacedf82d84a5f3e91767172ee22cb0ebf2bbe0582808e
|
||||
CVE-2024-47631,0,0,2f5538e06e1703745ac31e3e4aff85429449cb6536170f3449d5c719692260bc,2024-10-07T17:47:48.410000
|
||||
CVE-2024-47632,0,0,86e12c89344fd18c9940736a7e6a5db1287861f4d951d9a231cba9485bf7a1d1,2024-10-07T17:47:48.410000
|
||||
CVE-2024-47633,0,0,7b59299b7ab0b71990c59d871565371c288abbd036b35f6cb6499efd86c70120,2024-10-07T17:47:48.410000
|
||||
CVE-2024-47634,0,0,4c2fd4c714ec4dc3dac5d1a6bb16310a6d1e30fe1f9a84c4436875832e074333,2024-10-21T17:09:45.417000
|
||||
CVE-2024-47634,0,1,0db14a24577ad4cd4c39f4bd8ffd8db1b7fe5abb8b811c8dc32585acbe7b55c5,2024-10-22T18:46:02.253000
|
||||
CVE-2024-47635,0,0,f0938227f4d08edb6147f27db4a3110fa41d32874c7b3f4eb3d409a9071f6c87,2024-10-07T17:47:48.410000
|
||||
CVE-2024-47636,0,0,300b53ad3b56bdfe242daa94b07eff6e5ccd9aa8581554b844321a4f299321e6,2024-10-15T12:58:51.050000
|
||||
CVE-2024-47637,0,0,e4b543420eae93f2afe4e99f554aa703bb23d396109484c61c62fa5d0986af60,2024-10-16T16:38:14.557000
|
||||
@ -262169,7 +262176,7 @@ CVE-2024-47672,0,0,208c9363d63200a0f87e54b2ecaa4588cdcb8ebe0fa60448ea15f5f621cd4
|
||||
CVE-2024-47673,0,0,2317135deeb5a2ba1be6a2e702cd3dee3239bc7e08807d40785f15a0d93329d9,2024-10-17T14:15:13.853000
|
||||
CVE-2024-47674,0,0,9273dcf5991b9b8c8433130a4938740f9721051fe1fcb6d45b5c4bc4625153d6,2024-10-21T18:15:05.993000
|
||||
CVE-2024-47675,0,0,fff2226e2e91403974930f662f226a29696936c529972a0662f08267575cdd8e,2024-10-21T17:09:45.417000
|
||||
CVE-2024-47676,0,1,d31d6f56ccab7b160561fa0b3c682aa5c75e9dbbe155592bcb66f3a4628abbed,2024-10-22T16:12:39.830000
|
||||
CVE-2024-47676,0,0,d31d6f56ccab7b160561fa0b3c682aa5c75e9dbbe155592bcb66f3a4628abbed,2024-10-22T16:12:39.830000
|
||||
CVE-2024-47677,0,0,e6b5dc6058dd7bfb77cd62ce948de0b274ef953046c0e021bc136fd28c5143ad,2024-10-22T14:55:45.950000
|
||||
CVE-2024-47678,0,0,0599171199c0933ac90dc22e0c718002df8dc875ff64d0f6cfd466c664eca6eb,2024-10-21T17:09:45.417000
|
||||
CVE-2024-47679,0,0,307939d2ecd8d5c95d936c71f851827dbf3076f2cbcbbaee79f0d0403d820535,2024-10-21T17:09:45.417000
|
||||
@ -262246,18 +262253,18 @@ CVE-2024-47742,0,0,d4bdf050ad676b843a45f07aa46808bebd66cb4930bdf4a3846418b0470ff
|
||||
CVE-2024-47743,0,0,6b4acbe7a7043ae54c1f28957f686ffc42acda1a8ed60d34df4a0d291938201c,2024-10-22T15:45:15.463000
|
||||
CVE-2024-47744,0,0,99166239884b034553d12d8945cc60c036dfa495284cc2c4bfa4dd05b603e080,2024-10-22T15:44:40.393000
|
||||
CVE-2024-47745,0,0,bf9d70a37cd5327dcc2d07c3fdd8b5c36de5c72622dd6659e050773378799961,2024-10-21T17:09:45.417000
|
||||
CVE-2024-47746,0,1,bd1d3998772b7b97367eddbd4c0f1f3e8c206783f1078083a98d6f055ddbde21,2024-10-22T16:00:35.703000
|
||||
CVE-2024-47747,0,1,bf426d12e6fede872474432e7d03578fd050f7aed12c854ab7dc6720315913fd,2024-10-22T16:11:40.627000
|
||||
CVE-2024-47746,0,0,bd1d3998772b7b97367eddbd4c0f1f3e8c206783f1078083a98d6f055ddbde21,2024-10-22T16:00:35.703000
|
||||
CVE-2024-47747,0,0,bf426d12e6fede872474432e7d03578fd050f7aed12c854ab7dc6720315913fd,2024-10-22T16:11:40.627000
|
||||
CVE-2024-47748,0,0,647817335e913f39ba0f188b7f0dda0acdc5eefa8874404f39f4072aced2a2c5,2024-10-21T17:09:45.417000
|
||||
CVE-2024-47749,0,1,6fb6c09686d727b440ebbd021d0a7a92d2bb1c2a12c6f5547a255465abc8b3b4,2024-10-22T16:08:31.637000
|
||||
CVE-2024-47749,0,0,6fb6c09686d727b440ebbd021d0a7a92d2bb1c2a12c6f5547a255465abc8b3b4,2024-10-22T16:08:31.637000
|
||||
CVE-2024-4775,0,0,e28694f3b8983e1ffd74471dfd44709d0dccce69f1a573f2d66ebeb202246c51,2024-07-03T02:08:07.390000
|
||||
CVE-2024-47750,0,0,fcb30e866c3d64f885fc63b0fbe18064c59e15239984a0057b4922de3e3cda47,2024-10-21T17:09:45.417000
|
||||
CVE-2024-47751,0,0,dbbb46f679c8ef6d582034b10e0fc5133e1862d2b7e7523462d867f3e651a7ba,2024-10-21T17:09:45.417000
|
||||
CVE-2024-47752,0,1,65039c78bb19b3ece8928a956e9db0ee7719b3f114bcfd57c0c3ced74f237a1e,2024-10-22T16:11:09.037000
|
||||
CVE-2024-47753,0,1,b4bdc9a1d337353d37d865ac5f0c508d5e95f57a71156b3e1f6703729b56c2ad,2024-10-22T16:10:40.380000
|
||||
CVE-2024-47754,0,1,c998ddb7bc3dbcc169b2eae7169517ec00cc08562e1a7f8fb53bdf6d08fdcd47,2024-10-22T16:10:21.907000
|
||||
CVE-2024-47752,0,0,65039c78bb19b3ece8928a956e9db0ee7719b3f114bcfd57c0c3ced74f237a1e,2024-10-22T16:11:09.037000
|
||||
CVE-2024-47753,0,0,b4bdc9a1d337353d37d865ac5f0c508d5e95f57a71156b3e1f6703729b56c2ad,2024-10-22T16:10:40.380000
|
||||
CVE-2024-47754,0,0,c998ddb7bc3dbcc169b2eae7169517ec00cc08562e1a7f8fb53bdf6d08fdcd47,2024-10-22T16:10:21.907000
|
||||
CVE-2024-47755,0,0,6cb13a363c1927340d57e298ac76078d7c78d1527e04987bda7bb702169c10cb,2024-10-22T15:46:38.027000
|
||||
CVE-2024-47756,0,1,eb155bc0ec662a964b2c66ddbb8cf663bac19d4776af4da61c75acb4f1c74b8d,2024-10-22T16:09:56.570000
|
||||
CVE-2024-47756,0,0,eb155bc0ec662a964b2c66ddbb8cf663bac19d4776af4da61c75acb4f1c74b8d,2024-10-22T16:09:56.570000
|
||||
CVE-2024-47757,0,0,500f4ed7f4cebe77f095eabe903396578ed13baff1d5a05afdbb14496b4b2006,2024-10-22T15:54:48.830000
|
||||
CVE-2024-4776,0,0,8d62a3fb449cd595ed01f29a43c4395459263028a3240838c3f471dfed40e010,2024-07-03T02:08:08.187000
|
||||
CVE-2024-47762,0,0,faf4eb81ce6d805e421dff7a7d50a27f6affd6a56e4bb98171a2180279fc1ecf,2024-10-04T13:50:43.727000
|
||||
@ -262295,7 +262302,7 @@ CVE-2024-47815,0,0,843559a4031eaee974816014150940c4f18b7f6d93739de5a1866ac2ce670
|
||||
CVE-2024-47816,0,0,c0bf0d33ec35192d4154926a2f4d5d81b042bde4dbbd41d5e4618f5e20416892,2024-10-10T12:51:56.987000
|
||||
CVE-2024-47817,0,0,e954b96b63862e883b53cd879b63811973adbf39f1f221652228e04e702c2294,2024-10-10T12:57:21.987000
|
||||
CVE-2024-47818,0,0,4d7e5ae8d80cd68e1a4826a976dd1a317a0485050783b2b6d50912171135a504,2024-10-10T12:57:21.987000
|
||||
CVE-2024-47819,1,1,c727e536f3a624a59e67b95481c62382de08269a5f55f9d425d3effd214f1eb2,2024-10-22T16:15:07.500000
|
||||
CVE-2024-47819,0,0,c727e536f3a624a59e67b95481c62382de08269a5f55f9d425d3effd214f1eb2,2024-10-22T16:15:07.500000
|
||||
CVE-2024-4782,0,0,37dcdb14f7d23ae467b62646ac8eb504448e2a7781e3c175892c72dc54d3aebf,2024-08-19T13:00:23.117000
|
||||
CVE-2024-47822,0,0,659225121d6760adf8eca1f83c834e75b86ebec31d9e1e0ebc639ac3cc87e33f,2024-10-10T12:56:30.817000
|
||||
CVE-2024-47823,0,0,aba6c10bf903d75799cabb92b24bf5cc826ec4b52223e2aab9a9f7d8d8298a07,2024-10-10T12:56:30.817000
|
||||
@ -262344,7 +262351,7 @@ CVE-2024-4790,0,0,96aecd7cd4f769c190cdd6309a2627db4d493e5cf9efda536a135cb9a7f4eb
|
||||
CVE-2024-4791,0,0,45f7f0badd9eeca0c08f0ffcf78bd3c1e9a171e1e79fba42777d793a804985ff,2024-05-17T02:40:37.090000
|
||||
CVE-2024-47910,0,0,da0097185007355b026dacc76d86a72088b7bf1d898f5a147fff92f16ae106b9,2024-10-07T19:37:43.677000
|
||||
CVE-2024-47911,0,0,1780d2f9891b374cce407dc3e6f68171fc1b0dbbc46286fbacc7f087c63dae2c,2024-10-07T19:37:44.613000
|
||||
CVE-2024-47912,0,0,e6e33705267099b3a97e65fd629544665038ab8b124faa67f6cd3abcf994c6f3,2024-10-21T20:15:14.877000
|
||||
CVE-2024-47912,0,1,9ef4037532aa5c90e72bb73275b6d7ee1fa1589599c954cd7f031f4933f0d2e1,2024-10-22T18:35:08.360000
|
||||
CVE-2024-47913,0,0,dc38cdbfa262901d16ea1ec6ec0c83500e8aa0e3d84f1c11ffa637c829ee03f8,2024-10-07T17:48:28.117000
|
||||
CVE-2024-4792,0,0,d367db616eff60413675ec0cb96dcf5072899c5126e3ab7b85dd0b323d2aa0a3,2024-06-12T20:15:13.643000
|
||||
CVE-2024-4793,0,0,d7ea24a63b045e67640f8521c21cc9fd0113236775183a92ddafb3253726675a,2024-06-04T19:20:49.390000
|
||||
@ -262473,12 +262480,12 @@ CVE-2024-4854,0,0,9d5d733c00183e47994464da1b76a252c7e4b8268459cd8a1634b1fda6297d
|
||||
CVE-2024-4855,0,0,c93719b20367086f39a585784c8fe87b51678f3d6fabb283bc26fc5dedf0f872,2024-08-29T15:15:31.893000
|
||||
CVE-2024-4856,0,0,01234b09ea1a4585c989c1dc87d23ed182241e8a50536214983ade66b15e19f8,2024-06-04T16:57:41.053000
|
||||
CVE-2024-4857,0,0,1a28f92c79b598b55521235359a1d50b478306861b37a5a0ef0abc4d3160ef4c,2024-06-04T16:57:41.053000
|
||||
CVE-2024-48570,1,1,e565422dfa55e4b25b9efb30e59633745c3fab275e41215e02468494293003fa,2024-10-22T17:15:04.087000
|
||||
CVE-2024-48570,0,1,56771479e9991268856a1d955d0601f531a6533023e1e3d356d8dae043b5b7bf,2024-10-22T19:35:10.083000
|
||||
CVE-2024-4858,0,0,3cb9bd8b6c75f95328665e9ee04ad5356aa75f69b8a71bb4682aa7bcb86b9454,2024-05-28T12:39:42.673000
|
||||
CVE-2024-4859,0,0,8383b8e86eb4a4e5b90aae7f1f2380c0c5e94dbe99d2c93d082bf89d93f61e82,2024-05-14T19:17:55.627000
|
||||
CVE-2024-48597,0,0,d418873f3e9303c59419cda288a50538e497ca866e7b1cfaef7313951a15ddbe,2024-10-21T20:35:13.860000
|
||||
CVE-2024-4860,0,0,51415b9207d508daf9b92cfd5981ba904e23fd57e3ad30c10a4a3319cff2429d,2024-05-14T19:17:55.627000
|
||||
CVE-2024-48605,1,1,f360f36ad27e8b971ca3313a232e92dc65547d1905cd6f8b04ad824f27bf2cf1,2024-10-22T16:15:07.757000
|
||||
CVE-2024-48605,0,1,0f18a8d2cdb3a35cb0367e48bca7be58813da58c2e79e94c95cec99d5276ce2a,2024-10-22T18:35:09.113000
|
||||
CVE-2024-4862,0,0,1615bd8ef961831b9e24202d7c6665df3c0d355a3a7edbddf82c728a6e33bae9,2024-07-09T18:19:14.047000
|
||||
CVE-2024-48622,0,0,4cd7a4b67551e1c7266b414b834e1956aa3a51a75d895e45be98bc89b06ddf81,2024-10-16T16:38:43.170000
|
||||
CVE-2024-48623,0,0,d049076f927dcf309023eb7c4a1c5680d5c48a2a4bd2097c596ebfe8af0f8628,2024-10-16T16:38:43.170000
|
||||
@ -262496,14 +262503,14 @@ CVE-2024-48637,0,0,d42c2fa4f588b75285bfd9e74cf828ce6be24d319097efc6470bbe43fee07
|
||||
CVE-2024-48638,0,0,93a9606c88551eca2a43d58a9a18871f8de782bd448d66dc6474dd57c860ad86,2024-10-18T12:52:33.507000
|
||||
CVE-2024-48645,0,0,4d15b7126f0cd9aed73fd4742963f6dd9be03e82c6b83bb18d5e9d425a39f324,2024-10-21T21:35:05.333000
|
||||
CVE-2024-4865,0,0,df8706c5d26e485ec9b623150b314bb58c6338346ba72ce79d78a6dbca58bc77,2024-05-20T13:00:34.807000
|
||||
CVE-2024-48659,0,0,129c37fc89efc6f1a9c450a91bdbaf4b7ea24426486873fc912206941a59efef,2024-10-21T20:15:15.260000
|
||||
CVE-2024-48659,0,1,376bb71c0efd1325046bdfdf37523540e1204fee1eb33883e4747a9ec6036b98,2024-10-22T18:35:09.947000
|
||||
CVE-2024-4866,0,0,1fd2c3b939730f1522c70c99454a98badb9f05648f1c0fa9438c4abc3e506e92,2024-07-11T13:05:54.930000
|
||||
CVE-2024-4868,0,0,115d92ddb75cc1364cb7dc1ed780a32e113f5bc6f17706ce21f4cd60cd219a13,2024-07-09T18:19:14.047000
|
||||
CVE-2024-4869,0,0,c966893d60f3d2b834063ff6490a8006deca39b71769e89345f5be1133a2f10c,2024-06-26T12:44:29.693000
|
||||
CVE-2024-4870,0,0,34dc62fe0d9ee09fd087b0b9ccdcdae4c15125668207018dedb4b3cfd451baf0,2024-06-04T16:57:41.053000
|
||||
CVE-2024-48706,1,1,f6ed33b88a2a4cf79c6d1eae635780005dc95575e969d386a62204c211cae31c,2024-10-22T17:15:04.180000
|
||||
CVE-2024-48707,1,1,597fa9e5ec0742c8ccc62ed6d8aa1a1f509191f27a5d9d00c7621c443fe434b2,2024-10-22T17:15:04.273000
|
||||
CVE-2024-48708,1,1,82b37b547a43c5d13832cda6a763b6b0d073da2c9cedfa21cb674f5a350bfaa3,2024-10-22T17:15:04.370000
|
||||
CVE-2024-48706,0,1,926ab8463510247fc481bb381aa230962c9fea3185a890f8b8054f1478cb993b,2024-10-22T19:35:10.843000
|
||||
CVE-2024-48707,0,1,1b788795add12412c5ac4fb5c44f5fb35c2ea252b6749d2053970e4208c7e0bf,2024-10-22T19:35:11.020000
|
||||
CVE-2024-48708,0,1,3e8196ef69fe40ead548bd48c99619e6fe8dd4254b5c836ca0edde81daa04a92,2024-10-22T19:35:11.790000
|
||||
CVE-2024-48709,0,0,a2f1048f43a5ff6c83482412ed457499b4f82b0c444a20075955708fd04c880e,2024-10-21T19:35:07.443000
|
||||
CVE-2024-4871,0,0,27d58887099f376e93909bb4c2214524b0789bbba79f05cabea36e120d5295ee,2024-08-12T16:15:17.313000
|
||||
CVE-2024-48710,0,0,2fbd0f8c58cb24ce52b0e5c8d654e92a74d3cd7c1aadc3c4c977083a33ba41b8,2024-10-16T17:35:03.423000
|
||||
@ -262564,6 +262571,8 @@ CVE-2024-4888,0,0,3f4c58ee217cc87037d385e3cb53da7d318e33e3629509fa30ad3e92203777
|
||||
CVE-2024-4889,0,0,98c988bc305180dfde4233cdb25b83940a2a23ecd5fc7825e58f1cc0fbfe5628,2024-10-15T19:00:09.633000
|
||||
CVE-2024-4890,0,0,ee7720239380ab5c638f0803999a779457a74687c16e858d2acf0798605f57a2,2024-10-10T20:11:44.610000
|
||||
CVE-2024-48902,0,0,fed2bf5b719b321f64381a649376d7e0618bda5baab6f732c38dcd1211106c26,2024-10-16T16:57:23.463000
|
||||
CVE-2024-48903,1,1,4fc0f066af4da6c148bcc807dba9dfdc06b982998a481364a1cecde7617eb694,2024-10-22T19:15:06.590000
|
||||
CVE-2024-48904,1,1,3d8da6651fd11d14678b4aae2ea816adaecfe80c3802c993155a413aa87f75fe,2024-10-22T19:35:12.560000
|
||||
CVE-2024-48909,0,0,67804b300a72fc34a54a9327f0b3a7a8082afb16b0051c28b942604285939f48,2024-10-17T17:56:11.130000
|
||||
CVE-2024-4891,0,0,f3940d673165429e16eea192398cf8ad711af9d91140d48fc15ea6e438b5c077,2024-05-20T13:00:34.807000
|
||||
CVE-2024-48911,0,0,f147f0790cf653449e8f662255582c7c922d3f40a3d15e4b98d08b1e5fd9c969,2024-10-17T21:13:37.147000
|
||||
@ -262574,10 +262583,10 @@ CVE-2024-48918,0,0,37d8ea84d8110f3a600a1d2f557058b666848b057b36b01b41785c57ee923
|
||||
CVE-2024-4892,0,0,86d55410ceaf3ecac0b7906bf27b918d65f0ae499a5475505564f001e752dae0,2024-06-13T18:36:09.013000
|
||||
CVE-2024-48920,0,0,a03bdbd7875951f84a0ddd56d8e819e54834e1b20b1220c7604c44f7db3ea361,2024-10-18T12:52:33.507000
|
||||
CVE-2024-48924,0,0,e474b369eaf4331d2ff3a579fbee4e63e8ec29b93749a9c533ecb0a1775a3de6,2024-10-18T12:52:33.507000
|
||||
CVE-2024-48925,1,1,17ad6fa4547f2ce7b16f4da89e9b101cb04c2294b06cc702cb3983c1e1a94ab1,2024-10-22T16:15:07.853000
|
||||
CVE-2024-48926,1,1,85b04bcd589f9426bacb388b76883147a3307f836fd8fd417156eccdaeb86ba1,2024-10-22T16:15:08.090000
|
||||
CVE-2024-48927,1,1,703fccd925f1f3af0bb4d7bdb71de5226e00f5f5ac4de4592eb47b115aedc481,2024-10-22T16:15:08.360000
|
||||
CVE-2024-48929,1,1,66787fd57ce09c453329b762aeb961f8826f0e3b696b20681b1d74930ccbbfca,2024-10-22T16:15:08.617000
|
||||
CVE-2024-48925,0,0,17ad6fa4547f2ce7b16f4da89e9b101cb04c2294b06cc702cb3983c1e1a94ab1,2024-10-22T16:15:07.853000
|
||||
CVE-2024-48926,0,0,85b04bcd589f9426bacb388b76883147a3307f836fd8fd417156eccdaeb86ba1,2024-10-22T16:15:08.090000
|
||||
CVE-2024-48927,0,0,703fccd925f1f3af0bb4d7bdb71de5226e00f5f5ac4de4592eb47b115aedc481,2024-10-22T16:15:08.360000
|
||||
CVE-2024-48929,0,0,66787fd57ce09c453329b762aeb961f8826f0e3b696b20681b1d74930ccbbfca,2024-10-22T16:15:08.617000
|
||||
CVE-2024-4893,0,0,c4900f559bdc4a1c952ec15ffc0a407a7d0fc758594c29af597940962bf437f6,2024-05-15T16:40:19.330000
|
||||
CVE-2024-48930,0,0,c7b6cd0340da2631ccf07a7015b8cf581a1e5f29f6a6b1ff9f3168b16f8d9c48,2024-10-21T17:09:45.417000
|
||||
CVE-2024-48933,0,0,eab55cc4133fd12eb852707496206c0c064cf1bfef188e95346821cf2dadf897,2024-10-15T18:56:52.363000
|
||||
@ -262620,11 +262629,11 @@ CVE-2024-4919,0,0,c726f606173904c8377395d864d6d1f0bfcdbe8df42cdb4cc2d61ca12557d8
|
||||
CVE-2024-49193,0,0,4817bc5a524f8686c9c390cc6499f217005a03a967baaa28cc06a1d405a85c45,2024-10-16T20:35:16.380000
|
||||
CVE-2024-49195,0,0,ebe503b8e48bc1eb234bda5829019875beb46e6f81279b5b20d7be3e70714d45,2024-10-17T18:35:13.253000
|
||||
CVE-2024-4920,0,0,fb11a98a98fcee227749c982e12efa14a4a4b18da858cef87f2552ce91a0c62d,2024-05-17T02:40:42.227000
|
||||
CVE-2024-49208,1,1,8f2e6c1e86f64af5e9881e3f7358f063e855448026ab47a0489d80c8a2fe32b3,2024-10-22T17:15:04.503000
|
||||
CVE-2024-49209,1,1,63bc036493de6c1ed83f722bcd4747b3b03d632c72fe17005e827b6f6284d1e9,2024-10-22T17:15:05.763000
|
||||
CVE-2024-49208,0,0,8f2e6c1e86f64af5e9881e3f7358f063e855448026ab47a0489d80c8a2fe32b3,2024-10-22T17:15:04.503000
|
||||
CVE-2024-49209,0,0,63bc036493de6c1ed83f722bcd4747b3b03d632c72fe17005e827b6f6284d1e9,2024-10-22T17:15:05.763000
|
||||
CVE-2024-4921,0,0,1060b5013f8dc8547f0f33cabd337061fb69f6fcf324e5387138007cbeb6a9c1,2024-06-04T19:20:53.730000
|
||||
CVE-2024-49210,1,1,6e53b8aa574f1a38b7aa78fd56066f3a919773a1d515d8c8b36c1cf9f646d98b,2024-10-22T17:15:05.970000
|
||||
CVE-2024-49211,1,1,639835fa2342b8dba7122e14997d5aa1fec6ab36565dab9c04b435fe88b7768d,2024-10-22T17:15:06.193000
|
||||
CVE-2024-49210,0,0,6e53b8aa574f1a38b7aa78fd56066f3a919773a1d515d8c8b36c1cf9f646d98b,2024-10-22T17:15:05.970000
|
||||
CVE-2024-49211,0,0,639835fa2342b8dba7122e14997d5aa1fec6ab36565dab9c04b435fe88b7768d,2024-10-22T17:15:06.193000
|
||||
CVE-2024-49214,0,0,4421e2282d31894802376d02d8bd5564e11b8590218433c4394ddc3df2a81c0d,2024-10-15T12:57:46.880000
|
||||
CVE-2024-49215,0,0,9d23e97fd9538d4ddaefdbee98c9f991902afb90430384e62ea6427018c87235,2024-10-21T17:09:45.417000
|
||||
CVE-2024-49216,0,0,6acffa32d15c0271869a6ba3150ee4d41d9276ea01fbd76b60626657e8a8c6f0,2024-10-16T16:38:14.557000
|
||||
@ -262663,7 +262672,7 @@ CVE-2024-49246,0,0,29d95ab5e5ada47ed1ce4c5316c1ed56016d0bd62d5eaa8336ee05aabfec2
|
||||
CVE-2024-49247,0,0,53d4a3018db37a197b470c54ef2b547817388692345ae27d113283d6ff358a44,2024-10-16T16:38:14.557000
|
||||
CVE-2024-49248,0,0,5faff4bb312391427ded9d8a70538602237b0eda16601aaf8b69a0fc4e882c09,2024-10-18T12:52:33.507000
|
||||
CVE-2024-4925,0,0,e685289dc2254f889ad5a234b3fb30d6e7f6b2466e13190ceb3e2217a8a2793e,2024-06-04T19:20:53.933000
|
||||
CVE-2024-49250,0,0,a8a1c3b10a4d4be61ebf5454e1c113a7a7af1e6f8066b5652aa02d5981789f54,2024-10-21T17:09:45.417000
|
||||
CVE-2024-49250,0,1,3a176775684b389e138830023d3007de55be4afa8abea469cc438c060f56db67,2024-10-22T18:44:20.297000
|
||||
CVE-2024-49251,0,0,1715499fccdde32ea2c893d31b436444d1bc0be13aed0a2d0465f762db10dd8b,2024-10-16T16:38:14.557000
|
||||
CVE-2024-49252,0,0,182fb601bd0f0026d40746462390dd120c29fe4ba3aa7cbbc89f2ffc2d833923,2024-10-16T16:38:14.557000
|
||||
CVE-2024-49253,0,0,c1f3ed991f55da6518dd76ba83c95379c82378b9259ca4d054ec768bb2d242ed,2024-10-16T16:38:14.557000
|
||||
@ -262685,10 +262694,10 @@ CVE-2024-49268,0,0,8e55027882e89f0cab080b75d56d3c5721f6f46b9ae50eb1c51727bddbf92
|
||||
CVE-2024-4927,0,0,4ddbe2418b736eceb0ee18662dc9ab0b7588d5e8a0dde06117bae0c9075b3606,2024-06-12T12:15:09.767000
|
||||
CVE-2024-49270,0,0,616a2e437b03b1730ae710990d1f9b5d13bcf5a41263b98d33736d5e3831391d,2024-10-16T16:38:14.557000
|
||||
CVE-2024-49271,0,0,6fd9d076a620483355861bd31b6d3fba7a6e8c77968d9b9b52f107ebea5c9f8b,2024-10-16T16:38:14.557000
|
||||
CVE-2024-49272,0,0,35dbb34939df8db9cd821a661440d3d5df12d4b23c425f61c3f57ebefafe232a,2024-10-21T17:09:45.417000
|
||||
CVE-2024-49272,0,1,ce388816844d0bf419ecca70bd1847b8484ab313dd293704a8265f36084e981a,2024-10-22T18:40:40.787000
|
||||
CVE-2024-49273,0,0,a5a897527b0067d7fc9bedecaf463cda4dbaa650e993c2c454d9055227c03f02,2024-10-21T17:09:45.417000
|
||||
CVE-2024-49274,0,0,d24454ff18a4cea9bde361471644fdc86494a6ca0c31a5a742d9a88659f00bea,2024-10-21T17:09:45.417000
|
||||
CVE-2024-49275,0,0,dbf5599267d29ef4245799b6b4fc76ba2aad36babf03a5479c9573e2585efb9c,2024-10-21T17:09:45.417000
|
||||
CVE-2024-49274,0,1,096f2f284546af0d97e6ddfaac32f5bc2a7003315ce6be804bf83fbc016caf5b,2024-10-22T18:39:19.980000
|
||||
CVE-2024-49275,0,1,55aff7f12be858e4d39e3782edf366ff64e3f42849d1ad1a14e88de49c5d3432,2024-10-22T18:36:53.817000
|
||||
CVE-2024-49276,0,0,6a6b58791e9512e826c457e3bee8f08f7b1de60db24c986554adb1b116c01f0f,2024-10-18T12:52:33.507000
|
||||
CVE-2024-49277,0,0,413e0fb3e700b4ddf1e7bf9c0606cf9c4881f3636c1ad9b858708a2ee8b7a3f5,2024-10-18T12:52:33.507000
|
||||
CVE-2024-49278,0,0,f5bee9930ffbbfdde604c657853a18e3b9208ed8b4b0cf0c41230a88e43b006c,2024-10-18T12:52:33.507000
|
||||
@ -262705,7 +262714,7 @@ CVE-2024-49287,0,0,0066d2fce1ed85532c90a9906dc911278ca46d873038b8dcfb2d0c4b3b95c
|
||||
CVE-2024-49288,0,0,9794858fdab905561c3b5d43269f1d3f1bacba7fba1bb0436d9d456534b0053f,2024-10-18T12:52:33.507000
|
||||
CVE-2024-49289,0,0,1007ec713acd15fdb5c2262f73a22207aad725968297cd9b79b0f4fcd3d741cb,2024-10-18T12:52:33.507000
|
||||
CVE-2024-4929,0,0,6b801c4c5a7fb7e65ec83572f903c6a563e938f183cb222d57e6a2e237461199,2024-06-04T19:20:54.337000
|
||||
CVE-2024-49290,0,0,ca285eb96563921fd866403c796035b720c64bd5a41fb3038947fe37a7ba59f4,2024-10-21T17:09:45.417000
|
||||
CVE-2024-49290,0,1,ccbfae725612d034db518fc020b12b0de83319514a2d0a5b3be41c3ff9bf8173,2024-10-22T18:35:55.413000
|
||||
CVE-2024-49291,0,0,44e011055ffcc94f31147e91008bfca453f458c355b4c10d5e081a4748d73d9a,2024-10-18T12:52:33.507000
|
||||
CVE-2024-49292,0,0,5f09a14990b6c411313ed3c0517e00101a5bacb90324a262f26a26dc9ec6f772,2024-10-18T12:52:33.507000
|
||||
CVE-2024-49293,0,0,85b3188f5ad662f7c78c35d48b4fe82df910c07f89c757b60e18d9db28978d29,2024-10-21T17:09:45.417000
|
||||
@ -262719,7 +262728,7 @@ CVE-2024-49301,0,0,7d2494e642de20b5bc929cc6d54a8fb5dcf5cfdb65768055f9017f846af36
|
||||
CVE-2024-49302,0,0,710ce60d767e5f3fed4efed760bfd34a8e958088ece1205aa9bb54b219723f7a,2024-10-18T12:52:33.507000
|
||||
CVE-2024-49304,0,0,58dd4c2ddea953ce346c3f95611ced2fd41151c190485df9958a7a12599bf8c0,2024-10-18T12:52:33.507000
|
||||
CVE-2024-49305,0,0,40dab16b7a70081634fde6765f3a20a4620c68c7c77381519add7b12c075078b,2024-10-18T12:52:33.507000
|
||||
CVE-2024-49306,0,0,6e663358c35449c1098c968e832336ab7c41f624aed97fd4aebf2e88d20f4e39,2024-10-21T17:09:45.417000
|
||||
CVE-2024-49306,0,1,13fd02a1216d4cbe6bd87f2529eb6049c74e6411872ff6e717f7a015a32bd21b,2024-10-22T18:35:46.107000
|
||||
CVE-2024-49307,0,0,666a5148f43aeccd18eb31fe6200f031359163a4193a62896c07267bd5dddec8,2024-10-18T12:52:33.507000
|
||||
CVE-2024-49308,0,0,80b5bf0dcffe8ff357d2779a75304405ea747e2bcb1322a132f94886c9a31297,2024-10-18T12:52:33.507000
|
||||
CVE-2024-49309,0,0,6a184f4fa1aea4b522b78b6818e7a615b1f64b5d3ee9ecb78863e4ec5e510708,2024-10-18T12:52:33.507000
|
||||
@ -262740,7 +262749,7 @@ CVE-2024-49321,0,0,6ce68241db10c7838e4a51d2227fb9952bea2f4d972829a40692939256bd9
|
||||
CVE-2024-49322,0,0,541e4efebd0d76588052862000e37b2e98e8b9ac15619c2b0422f26ed3288fd3,2024-10-18T12:52:33.507000
|
||||
CVE-2024-49323,0,0,31588edf5efb1fb6420266f9d6a5ac9fb72acad257ee1a3b124e17a5d1cdca71,2024-10-21T17:09:45.417000
|
||||
CVE-2024-49324,0,0,6a0da56f8b241aa139bafdc8a7cea36b225bb8abdef936740223bb227ab67ca9,2024-10-21T17:09:45.417000
|
||||
CVE-2024-49325,0,0,4ac4b57df900fcec8decb92f9f1e1587fcd2104621bfc02130f55e709f4af9ab,2024-10-21T17:09:45.417000
|
||||
CVE-2024-49325,0,1,6361ff0a5fd3247f3dfc42142e1769d0dcf00cbc296a4736c789a8d3defd83f8,2024-10-22T18:33:59.793000
|
||||
CVE-2024-49326,0,0,fda910b2c7a76bbf2c72386ba089c287f84555f7530f28eb58f294531de1ce7e,2024-10-21T17:09:45.417000
|
||||
CVE-2024-49327,0,0,8b6c9aef8923e1de12a4d100640ad37448b7c34f1bbdc4fa10821a94ae1473e5,2024-10-21T17:09:45.417000
|
||||
CVE-2024-49328,0,0,e4f0eb619105a2fb9096e959f1de7a194eb985b50f07943c58f8f1beea5b5c79,2024-10-21T17:09:45.417000
|
||||
@ -262758,7 +262767,7 @@ CVE-2024-49361,0,0,f551e9abf09d421b2a081416ae11d1d19a91d21656c86d2519f1c7f0e2810
|
||||
CVE-2024-49366,0,0,dba23a6a5d899dfc1dd93480431c60e66516ce3fea9b6f89406c417953de1770,2024-10-21T17:15:03.567000
|
||||
CVE-2024-49367,0,0,9cdea4233abdf31e5711ba3faae763fba0a540ae42a436f6b5d5034f60f32d59,2024-10-21T17:15:03.783000
|
||||
CVE-2024-49368,0,0,4323388038598adba9c2e6f2533f5d2b25d45af0a630786c844ee55a0bab465d,2024-10-21T17:15:03.960000
|
||||
CVE-2024-49373,1,1,0572794ffa0a562b1feec1afbfc4282a4c956dbda0b30d27fc085e44ad9f38f6,2024-10-22T16:15:08.860000
|
||||
CVE-2024-49373,0,0,0572794ffa0a562b1feec1afbfc4282a4c956dbda0b30d27fc085e44ad9f38f6,2024-10-22T16:15:08.860000
|
||||
CVE-2024-49382,0,0,cd14c2989a948ff9829f4d119b31d603af2c2c459b5f5d9afd11a73e5c1e5fec,2024-10-16T13:53:45.860000
|
||||
CVE-2024-49383,0,0,8836e7d175d405b86f6d0105b03c4862827296be5b39fe5cde78189dfe892bb0,2024-10-16T13:53:04.380000
|
||||
CVE-2024-49384,0,0,3ee9c94c4e7d62f73d98e9003a41428dea707c45ee737dda67404986a9c936b6,2024-10-16T13:52:19.317000
|
||||
@ -262806,22 +262815,22 @@ CVE-2024-49611,0,0,c7f7e09d8f83b62743396c3bd4904fddaab94d00a5cf5a5c7129906b3bdbd
|
||||
CVE-2024-49612,0,0,acd6c0707ff81a9cd91d7e43f1e50373957b69b17c638b1ca230b26e66d303b8,2024-10-21T17:09:45.417000
|
||||
CVE-2024-49613,0,0,20f17e03932ce1d22e25d4f6728446a601ccc4501b4f23acdcb8336cbf93e2ba,2024-10-22T15:29:55.203000
|
||||
CVE-2024-49614,0,0,7dd3537b0ff1f3de2fff68f2c1a6b2ab47880b5af077ec967e05dcc4fdcd0d9d,2024-10-22T15:34:09.190000
|
||||
CVE-2024-49615,0,1,130d0356784581205e5e46cf3362c72fc7aa63cdf23c2209a80a7b2698730ac0,2024-10-22T16:43:14.190000
|
||||
CVE-2024-49616,0,1,5b88766e762e6343817ed4b072fa559035aa10e15052258529a01845d89d6e9d,2024-10-22T16:41:58.513000
|
||||
CVE-2024-49617,0,1,273326047d3e6de5c637f9bb2298d7d33d462172d179296cb89214e45a7a6ea1,2024-10-22T16:51:35.353000
|
||||
CVE-2024-49618,0,1,4bf989c333be7a79b8e837d5c1bc3d3690e7ab118b29552d86d9a2559ce5377c,2024-10-22T16:50:18.527000
|
||||
CVE-2024-49619,0,0,e8500ad2f662c42eb5cefcb54e6583c1e771076814e70ad1ad1341515be5295a,2024-10-21T17:09:45.417000
|
||||
CVE-2024-49615,0,0,130d0356784581205e5e46cf3362c72fc7aa63cdf23c2209a80a7b2698730ac0,2024-10-22T16:43:14.190000
|
||||
CVE-2024-49616,0,0,5b88766e762e6343817ed4b072fa559035aa10e15052258529a01845d89d6e9d,2024-10-22T16:41:58.513000
|
||||
CVE-2024-49617,0,0,273326047d3e6de5c637f9bb2298d7d33d462172d179296cb89214e45a7a6ea1,2024-10-22T16:51:35.353000
|
||||
CVE-2024-49618,0,0,4bf989c333be7a79b8e837d5c1bc3d3690e7ab118b29552d86d9a2559ce5377c,2024-10-22T16:50:18.527000
|
||||
CVE-2024-49619,0,1,90d75624dc123bbb581eee963bcb0039fa8e4e0bbeeeb85a3c584d098f48d4b5,2024-10-22T18:48:11.110000
|
||||
CVE-2024-4962,0,0,b9e851b58a3c7e382510249caa4fcb1d6185432495cf3586b8784f0d9e4becfd,2024-08-01T21:15:54
|
||||
CVE-2024-49620,0,0,03cc08ebcdb9c3da220e8f96b59d9d80dae0359c2d758e8d050a48cf9a60b6aa,2024-10-21T17:09:45.417000
|
||||
CVE-2024-49620,0,1,e4724cc5f89e1a4e44630a92bbe06c123145876533185701acef6e893d5cce35,2024-10-22T18:50:07.957000
|
||||
CVE-2024-49621,0,0,40c855e29a106464758c24a1bdb5df74f7e1f130c174b2cc39a416ce5bb07c0c,2024-10-21T17:09:45.417000
|
||||
CVE-2024-49622,0,0,f0d5dfa8c1ebf53d61bf597989f9b1e80a9b4ef9f6fb536f6dfaf31578dfe1b7,2024-10-21T17:09:45.417000
|
||||
CVE-2024-49623,0,0,92ff26855c35b1121f5df0b6550942b0b302d581178f4d79b65884f9961098bf,2024-10-21T17:09:45.417000
|
||||
CVE-2024-49624,0,0,94bbce3e9ae8d90bc2dd4db17a45b73dbd3b3950e84c88aa4d648b5929508d4d,2024-10-21T17:09:45.417000
|
||||
CVE-2024-49625,0,0,5b73196ab0d05a93dafb194b451d298f78f2ee157d4632f83bd5b31758525297,2024-10-21T17:09:45.417000
|
||||
CVE-2024-49626,0,0,30b476bad37b23d5536d26c14f0dafff57d002dc743ec7c754db73e32a2b6557,2024-10-21T17:09:45.417000
|
||||
CVE-2024-49627,0,0,5d11bcc891c8d8cf00052461e3d725934fb31197b275163731f95b7cf3dbe29d,2024-10-21T17:09:45.417000
|
||||
CVE-2024-49628,0,0,224bc72afc8883a1b63da91d6f011242a5ba5e37e5116785518926bf06a455af,2024-10-21T17:09:45.417000
|
||||
CVE-2024-49629,0,0,42f6961ef4307d0c57b7c28fafc507c1b62da86a999f15d54367bb0cc46d1073,2024-10-21T17:09:45.417000
|
||||
CVE-2024-49627,0,1,bcaa0babc7595e20da0ee6aff989d75da8873fe4c4069d8f25a5d1f39da5ea2c,2024-10-22T18:33:16.137000
|
||||
CVE-2024-49628,0,1,f5e060d92886ef93409b047c07ce6c478a5c53c1f95e20f768b3d9e752147d52,2024-10-22T18:31:22.643000
|
||||
CVE-2024-49629,0,1,60f0852b23beb1819b5458d406150de82aa310255dbbddedffa202b89c290697,2024-10-22T18:57:42.743000
|
||||
CVE-2024-4963,0,0,ef1fba35c0790604656a5e5622c9c7f4af0f1d1414e5784cd7a21207910d8397,2024-08-01T21:15:54.113000
|
||||
CVE-2024-49630,0,0,fc02361dbe836b234c4f2baea1ce95c4f8783a553a50fe9d797af011750ca971,2024-10-21T17:09:45.417000
|
||||
CVE-2024-49631,0,0,90e84d249ffc88bac8ba7984e2725c172d8e09dd6e795888b9ed719f758a8be8,2024-10-21T17:09:45.417000
|
||||
@ -262844,16 +262853,16 @@ CVE-2024-4980,0,0,1d2b61808b4cae121d6a29c34adc83b7ce102dcc100d7578fef807794b8506
|
||||
CVE-2024-4983,0,0,47e5eccd768078063df4e275a1ffdcd617ddbc2b7b8451c89e2e261cf23ec523,2024-06-27T12:47:19.847000
|
||||
CVE-2024-4984,0,0,9f2b9cbe42298dc633fd7a95b66e0d4fdcec1b53d37f19261bcfa2f1a75e3637,2024-05-16T13:03:05.353000
|
||||
CVE-2024-4985,0,0,df226dda87642aeec36f0fe802a8cb1e52b5f8e667dcfe00ff42a5cc0d642f7f,2024-05-21T12:37:59.687000
|
||||
CVE-2024-49850,0,1,2b33649e908446d8844acedbede0997555f012b73f46f17eddbc04e11a5ff156,2024-10-22T16:12:14.193000
|
||||
CVE-2024-49850,0,0,2b33649e908446d8844acedbede0997555f012b73f46f17eddbc04e11a5ff156,2024-10-22T16:12:14.193000
|
||||
CVE-2024-49851,0,0,3d484e6abda4a4ce29d99f10316c857626eb63bf2eefc7621c465c7b13c23949,2024-10-21T17:09:45.417000
|
||||
CVE-2024-49852,0,0,262ffe2d9e462bcad9f414c5114ff048fe0027922ed23ed53a0208a484284b67,2024-10-21T17:09:45.417000
|
||||
CVE-2024-49853,0,0,c217dd9272b2cd4fab6ae4f4c0fffed7f5095340c59c640aa7cae9145dfe0c13,2024-10-21T17:09:45.417000
|
||||
CVE-2024-49854,0,0,94138472b5f74b096a6e54fd3e7d9e10ac0cdb3bdf0c5b3ece24fbd6184cc9bd,2024-10-21T17:09:45.417000
|
||||
CVE-2024-49855,0,1,1c10554d37ca1638fe05ddaa09d6ac939fe9e21d5da77a220a4fa3ba8205886d,2024-10-22T16:12:27.030000
|
||||
CVE-2024-49855,0,0,1c10554d37ca1638fe05ddaa09d6ac939fe9e21d5da77a220a4fa3ba8205886d,2024-10-22T16:12:27.030000
|
||||
CVE-2024-49856,0,0,69c6d5b77115b2740f272ad46ab48ff11264f8cb25014c56c24110ee5f0eca13,2024-10-21T17:09:45.417000
|
||||
CVE-2024-49857,0,0,08301cc7463b3b282481d026cad759adf55112806c61a30b7af36430f6a5bfab,2024-10-22T15:48:42.347000
|
||||
CVE-2024-49858,0,0,189a38e2e1729e4f650f5ed2d9949d8780bddccdc0a5c8eca5c522d45db87500,2024-10-21T17:09:45.417000
|
||||
CVE-2024-49859,0,1,d128ad3420c66b03d628db278329ad6a0d637911116441391f7baa845a99aaa1,2024-10-22T16:13:03.267000
|
||||
CVE-2024-49859,0,0,d128ad3420c66b03d628db278329ad6a0d637911116441391f7baa845a99aaa1,2024-10-22T16:13:03.267000
|
||||
CVE-2024-49860,0,0,f5150f7cf3bb2d2d0ca50e9d424c876fd9c84254fcf7bd6f2627024294f5ef2f,2024-10-21T17:09:45.417000
|
||||
CVE-2024-49861,0,0,f8d823d453896bd63aeb95297d35b7ca2209aad13429ece51e5e583706dfbad3,2024-10-21T17:09:45.417000
|
||||
CVE-2024-49862,0,0,0c94aa307fd6d2aeab9692641051191e71a94c4443ed0051d87097b98891acf2,2024-10-21T17:09:45.417000
|
||||
@ -263089,7 +263098,7 @@ CVE-2024-5025,0,0,5975a4de967bb092ff1a32c8663c734972c139617eb709a92a7c0cc78b2843
|
||||
CVE-2024-5028,0,0,6e4747168a055d3478d0389157f1378a0e5efd7245fc9814fa65e0cf7f805db7,2024-08-01T13:59:38.360000
|
||||
CVE-2024-5031,0,0,5b0fce1eabb88a37a871d927606cb4ca5166c3808ddca60f777848c692bab12e,2024-05-22T12:46:53.887000
|
||||
CVE-2024-50311,0,0,673baaa29832ec29e40ef2e3d47df34dc1d10d7389d03beb5f8c46a2e87a0ff0,2024-10-22T14:15:19.450000
|
||||
CVE-2024-50312,0,0,c64596e697a11e7fbe1b0878c7d8da7e4a1b9ec94a567221a61a57e09b010e21,2024-10-22T14:15:19.973000
|
||||
CVE-2024-50312,0,1,3572eb7dd454215d0d1b5e6c17ada3f23ecefb37603e3a364a3dc2c4253bc71e,2024-10-22T18:35:11.263000
|
||||
CVE-2024-5032,0,0,e2dd01f18d9397a3c892e6f9436384b2c9baea7d6f6081290ca836f05f0fc527,2024-08-01T13:59:38.540000
|
||||
CVE-2024-5033,0,0,34cd1f889798bbfeb338d8d711a920994993596df17d9daf9b428477bffed7c1,2024-08-01T13:59:38.730000
|
||||
CVE-2024-5034,0,0,ecc1ebd0e8a7a2aea01c9ce5ac07669525947175e7e55790f4a8e8a0b317bae8,2024-08-01T13:59:38.920000
|
||||
@ -266262,7 +266271,7 @@ CVE-2024-9046,0,0,8656f1201ca0039377fd822b96252cedb47d7d532a98f822fda06fa6ad4421
|
||||
CVE-2024-9047,0,0,4ea7d0b1b11f6de8ec31e11947f5e76892006c92ffae382a37fca981e56bba3b,2024-10-15T12:57:46.880000
|
||||
CVE-2024-9048,0,0,f4eeb8fc17937a04134cb85e4ff1d8e798c7887dad672c6adf3a86ffdd0c5d34,2024-09-30T13:00:48.613000
|
||||
CVE-2024-9049,0,0,43c64cc2e53580aadfacb0d92c10ebf9c72fa78495b0a90bf4d0f0f029260a77,2024-10-04T18:53:10.910000
|
||||
CVE-2024-9050,0,1,60723fac2bf439bb1adcc7283747d4d8d7e0afa3e6de58e8a91bfd3f499e46a9,2024-10-22T17:15:06.420000
|
||||
CVE-2024-9050,0,0,60723fac2bf439bb1adcc7283747d4d8d7e0afa3e6de58e8a91bfd3f499e46a9,2024-10-22T17:15:06.420000
|
||||
CVE-2024-9051,0,0,e0f892f6090989bc65bfe2c27d48e7e51216899c12a8aa5d44d38bf2b4829ddc,2024-10-15T12:58:51.050000
|
||||
CVE-2024-9054,0,0,8ac0760d3aa06e14d98991152c0b4a90664b0b925ad15b2f9f9f67c478cb9754,2024-10-17T15:19:32.803000
|
||||
CVE-2024-9057,0,0,1e7730ffd6c424e386d911bdf2bfee9e4291e522521f210193a354376f62eabc,2024-10-15T13:58:19.960000
|
||||
@ -266315,7 +266324,7 @@ CVE-2024-9123,0,0,cd45c56b30b54bc08d10b45e423a2871895647b4b30e564898eb326d52a5c6
|
||||
CVE-2024-9124,0,0,ed784b79f60c57333454c5582ccee1e6855416a99a054b161105f40c65181fb5,2024-10-10T12:56:30.817000
|
||||
CVE-2024-9125,0,0,178fee32dc964661b9c65fa72adfd723833bc712092eacf5141ac942799ac520,2024-10-01T14:00:52.460000
|
||||
CVE-2024-9127,0,0,2a57398f5cef1966c50482248e5fdb86e0eae0bed7d0a3c554fbb9c182ab0a8a,2024-10-01T14:09:26.017000
|
||||
CVE-2024-9129,1,1,134f7ece5b3cefa919b3f6de8c2759de84aa703b1114c3e9b5f02710bae06ae5,2024-10-22T17:15:06.557000
|
||||
CVE-2024-9129,0,0,134f7ece5b3cefa919b3f6de8c2759de84aa703b1114c3e9b5f02710bae06ae5,2024-10-22T17:15:06.557000
|
||||
CVE-2024-9130,0,0,c55ec493e0918bdc6346df7de1c7b50119b1912e830881716d5b60020f91e1cd,2024-10-04T17:18:59.130000
|
||||
CVE-2024-9136,0,0,9b9746749b73403d8dc2b7a33b5935315a467feb0aa3698e70e44d08c2289a1f,2024-10-01T14:28:31.027000
|
||||
CVE-2024-9137,0,0,264d67370ab0f50b8c3f1048814084fcd11d0d542a946dd3f8623532739c7355,2024-10-15T12:57:46.880000
|
||||
@ -266396,7 +266405,7 @@ CVE-2024-9282,0,0,55016f43807b8bd2c7051116cb1e6375d4d2b410c86e99396c4800f5d9843f
|
||||
CVE-2024-9283,0,0,a5233c3b589826e3e09dfcafb866e56b060b301af37e2de0e699930a9008fdfe,2024-09-30T12:45:57.823000
|
||||
CVE-2024-9284,0,0,e077aa9b3331db7cd8049b8d7f3273d870b80909d1916943a385cf9659e49d1c,2024-09-30T12:45:57.823000
|
||||
CVE-2024-9286,0,0,c80c050c0c81c8eb62f751fd5198d6e48229164de5cbb6d6309b72371d27a18e,2024-10-10T12:51:56.987000
|
||||
CVE-2024-9287,1,1,3de2c43f5b9341b2c2d4d558e92dd45b9e29b5a5149d5bb65c4e8390fe8f56dd,2024-10-22T17:15:06.697000
|
||||
CVE-2024-9287,0,0,3de2c43f5b9341b2c2d4d558e92dd45b9e29b5a5149d5bb65c4e8390fe8f56dd,2024-10-22T17:15:06.697000
|
||||
CVE-2024-9289,0,0,06a6a34a1543252ca19c46e940aea37797a21c2bfa8e6ac1935900ffb41badd0,2024-10-07T18:25:21.380000
|
||||
CVE-2024-9291,0,0,e3e60de040a8e25c6f8c9bce959d91ab605417a7bb6a76f30e8af4524d979a49,2024-10-07T16:13:44.433000
|
||||
CVE-2024-9292,0,0,a7bdba47009ed945081e4090ae3ff19a132a10f1ea840ac7ca884beb20641078,2024-10-10T12:57:21.987000
|
||||
@ -266442,7 +266451,7 @@ CVE-2024-9350,0,0,290e64557c531b1051792213fe1cd034817a07f758e3a220c124933ec4bc84
|
||||
CVE-2024-9351,0,0,33d034faa3e6b0aeb71bafa0ae8b2ea418555ae0b07eef9d890e7c43507fa47b,2024-10-18T12:53:04.627000
|
||||
CVE-2024-9352,0,0,788f5bf16f633f8f02e340b198528b062bcda6aeec70a897601eaf656cd6ab6a,2024-10-18T12:52:33.507000
|
||||
CVE-2024-9353,0,0,64ddffc3239a0d67e3b79e48af9889b2f8d89027aa9c53de3cc5595dbd6f2fd7,2024-10-08T18:50:51.357000
|
||||
CVE-2024-9355,0,1,9fd824909ba068088861a875cafcc5135d14a5e660ace6b963f9d0d130917184,2024-10-22T17:15:06.853000
|
||||
CVE-2024-9355,0,0,9fd824909ba068088861a875cafcc5135d14a5e660ace6b963f9d0d130917184,2024-10-22T17:15:06.853000
|
||||
CVE-2024-9358,0,0,ad1311c8435fb7ce092ff9c8b7c1abe83209465bc92e72b7b733a8ea9fa4bf3c,2024-10-04T13:51:25.567000
|
||||
CVE-2024-9359,0,0,c3e20cb7feaf9e2d5c48c39f4d484e16226f28d5df197104e70b6a5f0b84dc00,2024-10-04T18:54:12.417000
|
||||
CVE-2024-9360,0,0,9328fb4e6135929e3835e5c835fd869b8491fb46bae32eb4c5f02c6fc86a7446,2024-10-04T18:53:58.020000
|
||||
@ -266494,7 +266503,7 @@ CVE-2024-9444,0,0,5871ece6e08e2e034d7a3616fcef31689e8667809591fe9662a10d21d3c836
|
||||
CVE-2024-9445,0,0,8f3ba5381bff25a0e78ae3572f156125ecb8ba69b50a9e6b24cc0100c7b0aa9b,2024-10-10T20:58:04.907000
|
||||
CVE-2024-9449,0,0,cfb15c20f0e2d2639784936ce05b9d4995f794dc20e1235b71d532f9a502b8fe,2024-10-10T12:51:56.987000
|
||||
CVE-2024-9451,0,0,bfba756188c29e076bb119887d9bdf6d3874c705a9d59100000802c164b86caa,2024-10-10T12:51:56.987000
|
||||
CVE-2024-9452,0,1,7eb2217e5eb4f5560cd9b75a09c78b5c11eea85f09a819264a7f744adf0ba17a,2024-10-22T16:23:59.420000
|
||||
CVE-2024-9452,0,0,7eb2217e5eb4f5560cd9b75a09c78b5c11eea85f09a819264a7f744adf0ba17a,2024-10-22T16:23:59.420000
|
||||
CVE-2024-9455,0,0,70bc73495623b6fab8931499505a6be70a8937392cffccc260a57663b280a262,2024-10-07T17:48:28.117000
|
||||
CVE-2024-9457,0,0,9e423d4cda70891a0b74c4852459db88bd5163f875d32e19ac8dac4b758e8eeb,2024-10-15T14:23:57.307000
|
||||
CVE-2024-9460,0,0,d6ff22c922d7573d861145a9f9c7a3aa2a44b6806bef76282f2615732b02479a,2024-10-08T14:33:42.703000
|
||||
@ -266530,7 +266539,7 @@ CVE-2024-9533,0,0,483ea201fb3f13623de51b6a803ec3c9d4b4a9f8d222ab5b1546c8a9a88ca7
|
||||
CVE-2024-9534,0,0,c826e79c155e2dcea2a83d95fd56ee360f3177c126ff744e515a5e5c9099e0fc,2024-10-09T11:18:23.607000
|
||||
CVE-2024-9535,0,0,4a71ba0a2572a89f39d0b54033731c76d4c93435778a2b1285d18249bf7f619d,2024-10-09T11:16:35.487000
|
||||
CVE-2024-9536,0,0,56b0d71a5e1f747b35f1ac4fcfd42bf040a735cf796864344938e26d90f6930b,2024-10-07T17:47:48.410000
|
||||
CVE-2024-9537,0,1,aa6888a9cfaabe7c166bed0948898b65f4ee4b8fc4b3ec78f2bc1cb749794abf,2024-10-22T17:33:23.837000
|
||||
CVE-2024-9537,0,0,aa6888a9cfaabe7c166bed0948898b65f4ee4b8fc4b3ec78f2bc1cb749794abf,2024-10-22T17:33:23.837000
|
||||
CVE-2024-9538,0,0,11f6571425b77352661bef56e196d840faf334a919cdd5771fb07fb3f313a4e6,2024-10-15T12:58:51.050000
|
||||
CVE-2024-9539,0,0,a0cbd26a327675fb40fcaea93c0a3ea911dbc683021df526355995459666c7a0,2024-10-15T12:57:46.880000
|
||||
CVE-2024-9540,0,0,155792833f2c3d33a8c6cc679a0bdb6a5ac3f76d67aede19f5592875c2f877b6,2024-10-16T16:38:14.557000
|
||||
@ -266652,7 +266661,7 @@ CVE-2024-9822,0,0,3245ced109c1c371c55834b9b14d881a9e8b7fd7c32c19b6e9a742506d7d4c
|
||||
CVE-2024-9823,0,0,918595934cb9b43f50abc93ebc9bbb9148088fae18c39570ebc344ac634d3e40,2024-10-15T12:57:46.880000
|
||||
CVE-2024-9824,0,0,0b6b46e52b34b071e6f48e5304d76a541526a4368e490338503476fca424894a,2024-10-15T12:57:46.880000
|
||||
CVE-2024-9837,0,0,bb6af129df538114e71c369a037f26903d10504dcd81ada4fc7f4b05786c12dd,2024-10-15T12:57:46.880000
|
||||
CVE-2024-9848,0,1,b402d34d635014e43cf3d9b875728458bb9e45308a715285ac01e2036b42d252,2024-10-22T16:42:25.867000
|
||||
CVE-2024-9848,0,0,b402d34d635014e43cf3d9b875728458bb9e45308a715285ac01e2036b42d252,2024-10-22T16:42:25.867000
|
||||
CVE-2024-9855,0,0,f4067d5f9739a4a46f27ed071acd023bca1d9a27db9968d98f329af2e8d70e8b,2024-10-15T12:58:51.050000
|
||||
CVE-2024-9856,0,0,531963d8959dcaa0b68edaa5a63ce972541a941d9ad2303b1c288946d989ee89,2024-10-15T12:58:51.050000
|
||||
CVE-2024-9858,0,0,bef02c0d9ed07a4afa527340189d49e60d5c238f08809a01d4eade734c583a54,2024-10-16T17:35:08.130000
|
||||
|
Can't render this file because it is too large.
|
Loading…
x
Reference in New Issue
Block a user