mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-05-06 18:52:58 +00:00
Auto-Update: 2024-09-16T14:00:25.327862+00:00
This commit is contained in:
parent
c83cd6fcbc
commit
e5c06e9737
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2022-2127",
|
||||
"sourceIdentifier": "secalert@redhat.com",
|
||||
"published": "2023-07-20T15:15:11.183",
|
||||
"lastModified": "2024-04-22T16:15:12.070",
|
||||
"lastModified": "2024-09-16T13:15:04.270",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -213,39 +213,6 @@
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://lists.debian.org/debian-lts-announce/2024/04/msg00015.html",
|
||||
"source": "secalert@redhat.com"
|
||||
},
|
||||
{
|
||||
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BPCSGND7LO467AJGR5DYBGZLTCGTOBCC/",
|
||||
"source": "secalert@redhat.com",
|
||||
"tags": [
|
||||
"Mailing List",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OT74M42E6C36W7PQVY3OS4ZM7DVYB64Z/",
|
||||
"source": "secalert@redhat.com",
|
||||
"tags": [
|
||||
"Mailing List"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://security.netapp.com/advisory/ntap-20230731-0010/",
|
||||
"source": "secalert@redhat.com",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://www.debian.org/security/2023/dsa-5477",
|
||||
"source": "secalert@redhat.com",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://www.samba.org/samba/security/CVE-2022-2127.html",
|
||||
"source": "secalert@redhat.com",
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2023-3347",
|
||||
"sourceIdentifier": "secalert@redhat.com",
|
||||
"published": "2023-07-20T15:15:11.940",
|
||||
"lastModified": "2024-07-03T01:41:00.823",
|
||||
"lastModified": "2024-09-16T13:15:05.877",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -173,25 +173,6 @@
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BPCSGND7LO467AJGR5DYBGZLTCGTOBCC/",
|
||||
"source": "secalert@redhat.com",
|
||||
"tags": [
|
||||
"Mailing List"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OT74M42E6C36W7PQVY3OS4ZM7DVYB64Z/",
|
||||
"source": "secalert@redhat.com"
|
||||
},
|
||||
{
|
||||
"url": "https://security.netapp.com/advisory/ntap-20230731-0010/",
|
||||
"source": "secalert@redhat.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.debian.org/security/2023/dsa-5477",
|
||||
"source": "secalert@redhat.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.samba.org/samba/security/CVE-2023-3347.html",
|
||||
"source": "secalert@redhat.com",
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2023-34966",
|
||||
"sourceIdentifier": "secalert@redhat.com",
|
||||
"published": "2023-07-20T15:15:11.333",
|
||||
"lastModified": "2024-06-25T17:15:10.097",
|
||||
"lastModified": "2024-09-16T13:15:04.757",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -211,34 +211,6 @@
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BPCSGND7LO467AJGR5DYBGZLTCGTOBCC/",
|
||||
"source": "secalert@redhat.com",
|
||||
"tags": [
|
||||
"Mailing List"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OT74M42E6C36W7PQVY3OS4ZM7DVYB64Z/",
|
||||
"source": "secalert@redhat.com",
|
||||
"tags": [
|
||||
"Mailing List"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://security.netapp.com/advisory/ntap-20230731-0010/",
|
||||
"source": "secalert@redhat.com",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://www.debian.org/security/2023/dsa-5477",
|
||||
"source": "secalert@redhat.com",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://www.samba.org/samba/security/CVE-2023-34966",
|
||||
"source": "secalert@redhat.com",
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2023-34967",
|
||||
"sourceIdentifier": "secalert@redhat.com",
|
||||
"published": "2023-07-20T15:15:11.410",
|
||||
"lastModified": "2024-01-30T16:15:46.067",
|
||||
"lastModified": "2024-09-16T13:15:04.940",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -206,34 +206,6 @@
|
||||
"Issue Tracking"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BPCSGND7LO467AJGR5DYBGZLTCGTOBCC/",
|
||||
"source": "secalert@redhat.com",
|
||||
"tags": [
|
||||
"Mailing List"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OT74M42E6C36W7PQVY3OS4ZM7DVYB64Z/",
|
||||
"source": "secalert@redhat.com",
|
||||
"tags": [
|
||||
"Mailing List"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://security.netapp.com/advisory/ntap-20230731-0010/",
|
||||
"source": "secalert@redhat.com",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://www.debian.org/security/2023/dsa-5477",
|
||||
"source": "secalert@redhat.com",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://www.samba.org/samba/security/CVE-2023-34967.html",
|
||||
"source": "secalert@redhat.com",
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2023-34968",
|
||||
"sourceIdentifier": "secalert@redhat.com",
|
||||
"published": "2023-07-20T15:15:11.540",
|
||||
"lastModified": "2024-01-30T16:15:46.210",
|
||||
"lastModified": "2024-09-16T13:15:05.127",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -202,34 +202,6 @@
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BPCSGND7LO467AJGR5DYBGZLTCGTOBCC/",
|
||||
"source": "secalert@redhat.com",
|
||||
"tags": [
|
||||
"Mailing List"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OT74M42E6C36W7PQVY3OS4ZM7DVYB64Z/",
|
||||
"source": "secalert@redhat.com",
|
||||
"tags": [
|
||||
"Mailing List"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://security.netapp.com/advisory/ntap-20230731-0010/",
|
||||
"source": "secalert@redhat.com",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://www.debian.org/security/2023/dsa-5477",
|
||||
"source": "secalert@redhat.com",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://www.samba.org/samba/security/CVE-2023-34968.html",
|
||||
"source": "secalert@redhat.com",
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2023-3576",
|
||||
"sourceIdentifier": "secalert@redhat.com",
|
||||
"published": "2023-10-04T19:15:10.340",
|
||||
"lastModified": "2024-03-11T13:15:52.550",
|
||||
"lastModified": "2024-09-16T13:15:06.033",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -143,10 +143,6 @@
|
||||
"Issue Tracking",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://lists.debian.org/debian-lts-announce/2024/03/msg00011.html",
|
||||
"source": "secalert@redhat.com"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-38200",
|
||||
"sourceIdentifier": "secalert@redhat.com",
|
||||
"published": "2023-07-24T16:15:12.067",
|
||||
"lastModified": "2023-12-28T15:40:32.947",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2024-09-16T13:15:05.323",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -187,13 +187,6 @@
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZIZZB5NHNCS5D2AEH3ZAO6OQC72IK7WS/",
|
||||
"source": "secalert@redhat.com",
|
||||
"tags": [
|
||||
"Mailing List"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-38201",
|
||||
"sourceIdentifier": "secalert@redhat.com",
|
||||
"published": "2023-08-25T17:15:08.530",
|
||||
"lastModified": "2024-01-12T22:01:19.793",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2024-09-16T13:15:05.490",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -196,14 +196,6 @@
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZIZZB5NHNCS5D2AEH3ZAO6OQC72IK7WS/",
|
||||
"source": "secalert@redhat.com",
|
||||
"tags": [
|
||||
"Mailing List",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-38559",
|
||||
"sourceIdentifier": "secalert@redhat.com",
|
||||
"published": "2023-08-01T17:15:09.890",
|
||||
"lastModified": "2024-03-08T18:19:03.450",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2024-09-16T13:15:05.667",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -198,27 +198,6 @@
|
||||
"Mailing List",
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://lists.debian.org/debian-lts-announce/2023/08/msg00006.html",
|
||||
"source": "secalert@redhat.com",
|
||||
"tags": [
|
||||
"Mailing List"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GBV6BTUREXM6DB3OGHGLMWGAZ3I45TXE/",
|
||||
"source": "secalert@redhat.com",
|
||||
"tags": [
|
||||
"Mailing List"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QH7ERAYSSXEYDWWY7LOV7CA5MIDZN3Z6/",
|
||||
"source": "secalert@redhat.com",
|
||||
"tags": [
|
||||
"Mailing List"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2023-3899",
|
||||
"sourceIdentifier": "secalert@redhat.com",
|
||||
"published": "2023-08-23T11:15:07.573",
|
||||
"lastModified": "2023-11-09T20:11:15.350",
|
||||
"lastModified": "2024-09-16T13:15:06.240",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -473,14 +473,6 @@
|
||||
"Issue Tracking",
|
||||
"Vendor Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FJHKSBBZRDFOBNDU35FUKMYQIQYT6UJQ/",
|
||||
"source": "secalert@redhat.com"
|
||||
},
|
||||
{
|
||||
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZDIHGNLS3TZVX7X2F735OKI4KXPY4AH6/",
|
||||
"source": "secalert@redhat.com"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-4147",
|
||||
"sourceIdentifier": "secalert@redhat.com",
|
||||
"published": "2023-08-07T14:15:11.633",
|
||||
"lastModified": "2024-08-26T16:08:14.227",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2024-09-16T13:15:07.240",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -279,35 +279,6 @@
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://lists.debian.org/debian-lts-announce/2023/10/msg00027.html",
|
||||
"source": "secalert@redhat.com",
|
||||
"tags": [
|
||||
"Mailing List",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://security.netapp.com/advisory/ntap-20231020-0006/",
|
||||
"source": "secalert@redhat.com",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://www.debian.org/security/2023/dsa-5480",
|
||||
"source": "secalert@redhat.com",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://www.debian.org/security/2023/dsa-5492",
|
||||
"source": "secalert@redhat.com",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://www.spinics.net/lists/stable/msg671573.html",
|
||||
"source": "secalert@redhat.com",
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2023-42756",
|
||||
"sourceIdentifier": "secalert@redhat.com",
|
||||
"published": "2023-09-28T14:15:21.037",
|
||||
"lastModified": "2024-04-30T14:15:09.243",
|
||||
"lastModified": "2024-09-16T13:15:06.640",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -177,35 +177,6 @@
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://lists.debian.org/debian-lts-announce/2023/10/msg00027.html",
|
||||
"source": "secalert@redhat.com",
|
||||
"tags": [
|
||||
"Mailing List",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GISYSL3F6WIEVGHJGLC2MFNTUXHPTKQH/",
|
||||
"source": "secalert@redhat.com",
|
||||
"tags": [
|
||||
"Mailing List"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GPMICQ2HVZO5UAM5KPXHAZKA2U3ZDOO6/",
|
||||
"source": "secalert@redhat.com",
|
||||
"tags": [
|
||||
"Mailing List"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/V5PDNWPKAP3WL5RQZ4RIDS6MG32OHH5R/",
|
||||
"source": "secalert@redhat.com",
|
||||
"tags": [
|
||||
"Mailing List"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://seclists.org/oss-sec/2023/q3/242",
|
||||
"source": "secalert@redhat.com",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-46146",
|
||||
"sourceIdentifier": "audit@patchstack.com",
|
||||
"published": "2024-06-19T12:15:10.930",
|
||||
"lastModified": "2024-06-20T12:44:01.637",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2024-09-16T13:40:24.777",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -17,6 +17,26 @@
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 8.8,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 5.9
|
||||
},
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Secondary",
|
||||
@ -40,6 +60,16 @@
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-862"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Secondary",
|
||||
@ -51,10 +81,31 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:themify:ultra:*:*:*:*:*:wordpress:*:*",
|
||||
"versionEndExcluding": "7.3.6",
|
||||
"matchCriteriaId": "141F4483-FACB-445C-885E-91D406DBA04E"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://patchstack.com/database/vulnerability/themify-ultra/wordpress-themify-ultra-theme-7-3-3-multiple-broken-access-control-vulnerability?_s_id=cve",
|
||||
"source": "audit@patchstack.com"
|
||||
"source": "audit@patchstack.com",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-46148",
|
||||
"sourceIdentifier": "audit@patchstack.com",
|
||||
"published": "2024-06-19T12:15:11.160",
|
||||
"lastModified": "2024-06-20T12:44:01.637",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2024-09-16T13:39:49.807",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -17,6 +17,26 @@
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 8.8,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 5.9
|
||||
},
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Secondary",
|
||||
@ -51,10 +71,31 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:themify:ultra:*:*:*:*:*:wordpress:*:*",
|
||||
"versionEndExcluding": "7.3.5",
|
||||
"matchCriteriaId": "9C37E24E-6178-4E43-A004-A5952BBDB9C6"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://patchstack.com/database/vulnerability/themify-ultra/wordpress-themify-ultra-theme-7-3-3-authenticated-arbitrary-settings-change-vulnerability?_s_id=cve",
|
||||
"source": "audit@patchstack.com"
|
||||
"source": "audit@patchstack.com",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-48759",
|
||||
"sourceIdentifier": "audit@patchstack.com",
|
||||
"published": "2024-06-19T11:15:50.407",
|
||||
"lastModified": "2024-06-20T12:44:01.637",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2024-09-16T13:25:15.550",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -17,6 +17,26 @@
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 7.5,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 3.6
|
||||
},
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Secondary",
|
||||
@ -51,10 +71,31 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:crocoblock:jetelements:*:*:*:*:*:wordpress:*:*",
|
||||
"versionEndExcluding": "2.6.13.1",
|
||||
"matchCriteriaId": "F812AA67-076B-4911-A045-75ED88BAB1DE"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://patchstack.com/database/vulnerability/jet-elements/wordpress-jetelements-for-elementor-plugin-2-6-13-unauthenticated-arbitrary-attachment-download-vulnerability?_s_id=cve",
|
||||
"source": "audit@patchstack.com"
|
||||
"source": "audit@patchstack.com",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-48760",
|
||||
"sourceIdentifier": "audit@patchstack.com",
|
||||
"published": "2024-06-19T11:15:50.647",
|
||||
"lastModified": "2024-06-20T12:44:01.637",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2024-09-16T13:26:13.570",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -17,6 +17,26 @@
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
},
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Secondary",
|
||||
@ -51,10 +71,31 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:crocoblock:jetelements:*:*:*:*:*:wordpress:*:*",
|
||||
"versionEndExcluding": "2.6.13.1",
|
||||
"matchCriteriaId": "F812AA67-076B-4911-A045-75ED88BAB1DE"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://patchstack.com/database/vulnerability/jet-elements/wordpress-jetelements-for-elementor-plugin-2-6-13-unauthenticated-broken-access-control-vulnerability?_s_id=cve",
|
||||
"source": "audit@patchstack.com"
|
||||
"source": "audit@patchstack.com",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-48761",
|
||||
"sourceIdentifier": "audit@patchstack.com",
|
||||
"published": "2024-06-19T11:15:50.877",
|
||||
"lastModified": "2024-06-20T12:44:01.637",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2024-09-16T13:27:20.777",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -17,6 +17,26 @@
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "LOW",
|
||||
"baseScore": 6.3,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 3.4
|
||||
},
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Secondary",
|
||||
@ -51,10 +71,31 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:crocoblock:jetelements:*:*:*:*:*:wordpress:*:*",
|
||||
"versionEndExcluding": "2.6.13.1",
|
||||
"matchCriteriaId": "F812AA67-076B-4911-A045-75ED88BAB1DE"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://patchstack.com/database/vulnerability/jet-elements/wordpress-jetelements-for-elementor-plugin-2-6-13-broken-access-control-vulnerability?_s_id=cve",
|
||||
"source": "audit@patchstack.com"
|
||||
"source": "audit@patchstack.com",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2023-5981",
|
||||
"sourceIdentifier": "secalert@redhat.com",
|
||||
"published": "2023-11-28T12:15:07.040",
|
||||
"lastModified": "2024-07-08T18:15:04.087",
|
||||
"lastModified": "2024-09-16T13:15:07.813",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -139,10 +139,6 @@
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "http://www.openwall.com/lists/oss-security/2024/01/19/3",
|
||||
"source": "secalert@redhat.com"
|
||||
},
|
||||
{
|
||||
"url": "https://access.redhat.com/errata/RHSA-2024:0155",
|
||||
"source": "secalert@redhat.com"
|
||||
@ -193,14 +189,6 @@
|
||||
"Issue Tracking",
|
||||
"Vendor Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7ZEIOLORQ7N6WRPFXZSYDL2MC4LP7VFV/",
|
||||
"source": "secalert@redhat.com"
|
||||
},
|
||||
{
|
||||
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GNXKVR5YNUEBNHAHM5GSYKBZX4W2HMN2/",
|
||||
"source": "secalert@redhat.com"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-0553",
|
||||
"sourceIdentifier": "secalert@redhat.com",
|
||||
"published": "2024-01-16T12:15:45.557",
|
||||
"lastModified": "2024-07-08T18:15:06.153",
|
||||
"lastModified": "2024-09-16T13:15:08.327",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -135,14 +135,6 @@
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "http://www.openwall.com/lists/oss-security/2024/01/19/3",
|
||||
"source": "secalert@redhat.com",
|
||||
"tags": [
|
||||
"Mailing List",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://access.redhat.com/errata/RHSA-2024:0533",
|
||||
"source": "secalert@redhat.com"
|
||||
@ -195,28 +187,12 @@
|
||||
"Vendor Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://lists.debian.org/debian-lts-announce/2024/02/msg00010.html",
|
||||
"source": "secalert@redhat.com"
|
||||
},
|
||||
{
|
||||
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7ZEIOLORQ7N6WRPFXZSYDL2MC4LP7VFV/",
|
||||
"source": "secalert@redhat.com"
|
||||
},
|
||||
{
|
||||
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GNXKVR5YNUEBNHAHM5GSYKBZX4W2HMN2/",
|
||||
"source": "secalert@redhat.com"
|
||||
},
|
||||
{
|
||||
"url": "https://lists.gnupg.org/pipermail/gnutls-help/2024-January/004841.html",
|
||||
"source": "secalert@redhat.com",
|
||||
"tags": [
|
||||
"Mailing List"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://security.netapp.com/advisory/ntap-20240202-0011/",
|
||||
"source": "secalert@redhat.com"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-0567",
|
||||
"sourceIdentifier": "secalert@redhat.com",
|
||||
"published": "2024-01-16T14:15:48.527",
|
||||
"lastModified": "2024-07-08T18:15:06.703",
|
||||
"lastModified": "2024-09-16T13:15:08.680",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -151,14 +151,6 @@
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "http://www.openwall.com/lists/oss-security/2024/01/19/3",
|
||||
"source": "secalert@redhat.com",
|
||||
"tags": [
|
||||
"Mailing List",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://access.redhat.com/errata/RHSA-2024:0533",
|
||||
"source": "secalert@redhat.com",
|
||||
@ -207,35 +199,12 @@
|
||||
"Vendor Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7ZEIOLORQ7N6WRPFXZSYDL2MC4LP7VFV/",
|
||||
"source": "secalert@redhat.com",
|
||||
"tags": [
|
||||
"Mailing List",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GNXKVR5YNUEBNHAHM5GSYKBZX4W2HMN2/",
|
||||
"source": "secalert@redhat.com",
|
||||
"tags": [
|
||||
"Mailing List",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://lists.gnupg.org/pipermail/gnutls-help/2024-January/004841.html",
|
||||
"source": "secalert@redhat.com",
|
||||
"tags": [
|
||||
"Mailing List"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://security.netapp.com/advisory/ntap-20240202-0011/",
|
||||
"source": "secalert@redhat.com",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
33
CVE-2024/CVE-2024-223xx/CVE-2024-22399.json
Normal file
33
CVE-2024/CVE-2024-223xx/CVE-2024-22399.json
Normal file
@ -0,0 +1,33 @@
|
||||
{
|
||||
"id": "CVE-2024-22399",
|
||||
"sourceIdentifier": "security@apache.org",
|
||||
"published": "2024-09-16T12:15:02.530",
|
||||
"lastModified": "2024-09-16T12:15:02.530",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Deserialization of Untrusted Data vulnerability in Apache Seata.\u00a0\n\nWhen developers disable authentication on the Seata-Server and do not use the Seata client SDK dependencies, they may construct uncontrolled serialized malicious requests by directly sending bytecode based on the Seata private protocol.\n\nThis issue affects Apache Seata: 2.0.0, from 1.0.0 through 1.8.0.\n\nUsers are recommended to upgrade to version 2.1.0/1.8.1, which fixes the issue."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security@apache.org",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-502"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://lists.apache.org/thread/91nzzlxyj4nmks85gbzwkkjtbmnmlkc4",
|
||||
"source": "security@apache.org"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-34134",
|
||||
"sourceIdentifier": "psirt@adobe.com",
|
||||
"published": "2024-08-14T15:15:20.107",
|
||||
"lastModified": "2024-08-15T16:47:51.770",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2024-09-16T12:15:02.657",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -18,7 +18,7 @@
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"source": "psirt@adobe.com",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
@ -38,11 +38,11 @@
|
||||
"impactScore": 3.6
|
||||
},
|
||||
{
|
||||
"source": "psirt@adobe.com",
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:L",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
@ -50,12 +50,12 @@
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "LOW",
|
||||
"baseScore": 6.1,
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 5.5,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 4.2
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-37288",
|
||||
"sourceIdentifier": "bressers@elastic.co",
|
||||
"published": "2024-09-09T09:15:02.183",
|
||||
"lastModified": "2024-09-09T13:03:38.303",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2024-09-16T13:29:06.023",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -17,6 +17,26 @@
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 8.8,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 5.9
|
||||
},
|
||||
{
|
||||
"source": "bressers@elastic.co",
|
||||
"type": "Secondary",
|
||||
@ -40,6 +60,16 @@
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-502"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "bressers@elastic.co",
|
||||
"type": "Secondary",
|
||||
@ -51,10 +81,31 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:elastic:kibana:8.15.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "BD3AFCD5-A56A-4B69-9A50-B952E48C8747"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://discuss.elastic.co/t/kibana-8-15-1-security-update-esa-2024-27-esa-2024-28/366119",
|
||||
"source": "bressers@elastic.co"
|
||||
"source": "bressers@elastic.co",
|
||||
"tags": [
|
||||
"Mitigation",
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-38640",
|
||||
"sourceIdentifier": "security@qnapsecurity.com.tw",
|
||||
"published": "2024-09-06T17:15:16.443",
|
||||
"lastModified": "2024-09-09T13:03:38.303",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2024-09-16T12:27:22.747",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -59,6 +59,28 @@
|
||||
"baseSeverity": "HIGH"
|
||||
}
|
||||
}
|
||||
],
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 5.4,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.3,
|
||||
"impactScore": 2.7
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
@ -73,10 +95,32 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:qnap:download_station:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "5.8.0",
|
||||
"versionEndExcluding": "5.8.6.283",
|
||||
"matchCriteriaId": "ED78DBEB-F1D8-45F9-95E7-11F293EAFE17"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.qnap.com/en/security-advisory/qsa-24-35",
|
||||
"source": "security@qnapsecurity.com.tw"
|
||||
"source": "security@qnapsecurity.com.tw",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-38641",
|
||||
"sourceIdentifier": "security@qnapsecurity.com.tw",
|
||||
"published": "2024-09-06T17:15:16.550",
|
||||
"lastModified": "2024-09-09T13:03:38.303",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2024-09-16T12:35:23.713",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -59,6 +59,28 @@
|
||||
"baseSeverity": "HIGH"
|
||||
}
|
||||
}
|
||||
],
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 7.8,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
@ -77,10 +99,170 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:qnap:qts:5.1.0.2348:build_20230325:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "39382CBA-EA68-426A-AC07-A9A26E722CAB"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:qnap:qts:5.1.0.2399:build_20230515:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "BCB37C08-1DF7-4AF4-9BB1-C562E5643B5A"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:qnap:qts:5.1.0.2418:build_20230603:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "8368130C-F26D-41FE-8D78-B103A23B5327"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:qnap:qts:5.1.0.2444:build_20230629:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "3E0EE181-78AF-4C3C-90A4-C69A2DE6E176"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:qnap:qts:5.1.0.2466:build_20230721:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "56E3AE06-78DA-4844-ADC1-09A35F1C5B54"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:qnap:qts:5.1.1.2491:build_20230815:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "D2AA7A32-0DA8-4417-A23E-C4F563BC7819"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:qnap:qts:5.1.2.2533:build_20230926:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "80E7C17C-ED6D-439D-A1F3-1870A3ADA926"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:qnap:qts:5.1.3.2578:build_20231110:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "636C2D9C-C837-4FAC-B79D-1CA7A7C1FF3E"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:qnap:qts:5.1.4.2596:build_20231128:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "866B455B-0266-4990-920B-A06756ED5A61"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:qnap:qts:5.1.5.2645:build_20240116:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "B3B5C4C5-5EE2-4E6F-927E-1D52A04895BB"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:qnap:qts:5.1.5.2679:build_20240219:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "543E17BB-B552-4B65-B028-BE9A47E6F34B"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:qnap:qts:5.1.6.2722:build_20240402:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "EEDC247A-96D9-4140-AA72-52E4EEDC2121"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:qnap:qts:5.1.7.2770:build_20240520:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "DDEF21B3-275E-446B-A6C4-FD30A567B600"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:qnap:quts_hero:h5.1.0.2409:build_20230525:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "6CA398A8-EBDF-4D41-B15E-7B763F885021"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:qnap:quts_hero:h5.1.0.2424:build_20230609:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "F63A5ED2-ECC2-49A0-BFA9-548E35ACD6C7"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:qnap:quts_hero:h5.1.0.2453:build_20230708:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "53387FAC-7BE0-47D7-99BF-2B1F03C17CC3"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:qnap:quts_hero:h5.1.0.2466:build_20230721:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "D4226394-0023-4CD2-BB89-77251BF92FF3"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:qnap:quts_hero:h5.1.1.2488:build_20230812:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "646257F7-D4A4-43B0-91F2-7850338B3CA1"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:qnap:quts_hero:h5.1.2.2534:build_20230927:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "88825AE1-B006-4F7F-BD90-D4B1CF1251A3"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:qnap:quts_hero:h5.1.3.2578:build_20231110:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "3F471666-4919-4770-956E-ACE4C55D29DB"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:qnap:quts_hero:h5.1.4.2596:build_20231128:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "9573F671-D49E-438A-B72C-DFC390A79093"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:qnap:quts_hero:h5.1.5.2647:build_20240118:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "75E7938F-943F-428D-974D-42E790829F88"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:qnap:quts_hero:h5.1.5.2680:build_20240220:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "12F5732D-C95F-45D1-968C-C2269DFDF6D4"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:qnap:quts_hero:h5.1.6.2734:build_20240414:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "94734596-A56A-4128-A39A-7E22FBD17835"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:qnap:quts_hero:h5.1.7.2770:build_20240520:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "ACF87C5E-9508-4BA9-9218-3CBD8A8439A4"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:qnap:quts_hero:h5.1.7.2788:build_20240607:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "67E8977A-2363-4855-B284-6EBF8FB485A2"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:qnap:quts_hero:h5.1.7.2794:build_20240613:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "3A268686-341F-4E13-8CE6-493DE7E9CF70"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.qnap.com/en/security-advisory/qsa-24-33",
|
||||
"source": "security@qnapsecurity.com.tw"
|
||||
"source": "security@qnapsecurity.com.tw",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-38642",
|
||||
"sourceIdentifier": "security@qnapsecurity.com.tw",
|
||||
"published": "2024-09-06T17:15:16.677",
|
||||
"lastModified": "2024-09-09T13:03:38.303",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2024-09-16T12:33:13.277",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -59,6 +59,28 @@
|
||||
"baseSeverity": "LOW"
|
||||
}
|
||||
}
|
||||
],
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 7.8,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
@ -73,10 +95,30 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:qnap:qumagie:2.3.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "5F8F394D-D921-423A-8BD0-05CCA47E6065"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.qnap.com/en/security-advisory/qsa-24-34",
|
||||
"source": "security@qnapsecurity.com.tw"
|
||||
"source": "security@qnapsecurity.com.tw",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,13 +2,13 @@
|
||||
"id": "CVE-2024-39379",
|
||||
"sourceIdentifier": "psirt@adobe.com",
|
||||
"published": "2024-07-31T13:15:10.253",
|
||||
"lastModified": "2024-09-11T15:52:47.053",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2024-09-16T12:15:02.870",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Acrobat for Edge versions 126.0.2592.81 and earlier are affected by an out-of-bounds read vulnerability that could lead to arbitrary file system read access. An attacker could exploit this vulnerability to read contents from a location in memory past the buffer boundary, potentially leading to sensitive information disclosure. Exploitation of this issue requires user interaction in that a victim must open a malicious file."
|
||||
"value": "Acrobat for Edge versions 126.0.2592.81 and earlier are affected by an out-of-bounds read vulnerability that could lead to disclosure of sensitive memory. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious file."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
@ -18,8 +18,28 @@
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"source": "psirt@adobe.com",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 5.5,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 3.6
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||||
@ -36,26 +56,6 @@
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 5.9
|
||||
},
|
||||
{
|
||||
"source": "psirt@adobe.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 5.5,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-39384",
|
||||
"sourceIdentifier": "psirt@adobe.com",
|
||||
"published": "2024-09-13T09:15:06.620",
|
||||
"lastModified": "2024-09-13T14:06:04.777",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2024-09-16T13:01:07.037",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -51,10 +51,55 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:adobe:premiere_pro:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "23.6.9",
|
||||
"matchCriteriaId": "431578AF-FF5D-4E2D-8458-C67FF84ABE3C"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:adobe:premiere_pro:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "24.0",
|
||||
"versionEndExcluding": "24.6",
|
||||
"matchCriteriaId": "62DB0CFE-BCDF-4B1D-B77A-361297F15408"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "387021A0-AF36-463C-A605-32EA7DAC172E"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "A2572D17-1DE6-457B-99CC-64AFD54487EA"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://helpx.adobe.com/security/products/premiere_pro/apsb24-58.html",
|
||||
"source": "psirt@adobe.com"
|
||||
"source": "psirt@adobe.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-39385",
|
||||
"sourceIdentifier": "psirt@adobe.com",
|
||||
"published": "2024-09-13T09:15:07.470",
|
||||
"lastModified": "2024-09-13T14:06:04.777",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2024-09-16T13:12:45.600",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -51,10 +51,55 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:adobe:premiere_pro:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "23.6.9",
|
||||
"matchCriteriaId": "431578AF-FF5D-4E2D-8458-C67FF84ABE3C"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:adobe:premiere_pro:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "24.0",
|
||||
"versionEndExcluding": "24.6",
|
||||
"matchCriteriaId": "62DB0CFE-BCDF-4B1D-B77A-361297F15408"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "387021A0-AF36-463C-A605-32EA7DAC172E"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "A2572D17-1DE6-457B-99CC-64AFD54487EA"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://helpx.adobe.com/security/products/premiere_pro/apsb24-58.html",
|
||||
"source": "psirt@adobe.com"
|
||||
"source": "psirt@adobe.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,13 +2,13 @@
|
||||
"id": "CVE-2024-39406",
|
||||
"sourceIdentifier": "psirt@adobe.com",
|
||||
"published": "2024-08-14T12:15:26.243",
|
||||
"lastModified": "2024-08-14T14:43:58.617",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2024-09-16T12:15:03.080",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Adobe Commerce versions 2.4.7-p1, 2.4.6-p6, 2.4.5-p8, 2.4.4-p9 and earlier are affected by an Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability that could lead to arbitrary file system read. An attacker could exploit this vulnerability to gain access to files and directories that are outside the restricted directory. Exploitation of this issue does not require user interaction and scope is changed."
|
||||
"value": "Adobe Commerce versions 2.4.7-p1, 2.4.6-p6, 2.4.5-p8, 2.4.4-p9 and earlier are affected by an Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability that could lead to arbitrary file system read. An admin attacker could exploit this vulnerability to gain access to files and directories that are outside the restricted directory. Exploitation of this issue does not require user interaction and scope is changed."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
|
@ -2,13 +2,13 @@
|
||||
"id": "CVE-2024-39408",
|
||||
"sourceIdentifier": "psirt@adobe.com",
|
||||
"published": "2024-08-14T12:15:26.703",
|
||||
"lastModified": "2024-08-14T14:42:31.313",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2024-09-16T13:15:09.133",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Adobe Commerce versions 2.4.7-p1, 2.4.6-p6, 2.4.5-p8, 2.4.4-p9 and earlier are affected by a Cross-Site Request Forgery (CSRF) vulnerability that could allow an attacker to bypass security features and perform minor unauthorised actions on behalf of a user. The vulnerability could be exploited by tricking a victim into clicking a link or loading a page that submits a malicious request. Exploitation of this issue requires user interaction."
|
||||
"value": "Adobe Commerce versions 2.4.7-p1, 2.4.6-p6, 2.4.5-p8, 2.4.4-p9 and earlier are affected by a Cross-Site Request Forgery (CSRF) vulnerability that could allow an attacker to bypass security features and perform minor integrity changeson behalf of a user. The vulnerability could be exploited by tricking a victim into clicking a link or loading a page that submits a malicious request. Exploitation of this issue requires user interaction."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
|
@ -2,13 +2,13 @@
|
||||
"id": "CVE-2024-39409",
|
||||
"sourceIdentifier": "psirt@adobe.com",
|
||||
"published": "2024-08-14T12:15:26.937",
|
||||
"lastModified": "2024-08-14T14:42:10.687",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2024-09-16T13:15:09.387",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Adobe Commerce versions 2.4.7-p1, 2.4.6-p6, 2.4.5-p8, 2.4.4-p9 and earlier are affected by a Cross-Site Request Forgery (CSRF) vulnerability that could allow an attacker to bypass security features and perform minor unauthorised actions on behalf of a user. The vulnerability could be exploited by tricking a victim into clicking a link or loading a page that submits a malicious request. Exploitation of this issue requires user interaction."
|
||||
"value": "Adobe Commerce versions 2.4.7-p1, 2.4.6-p6, 2.4.5-p8, 2.4.4-p9 and earlier are affected by a Cross-Site Request Forgery (CSRF) vulnerability that could allow an attacker to bypass security features and perform minor integrity changes on behalf of a user. The vulnerability could be exploited by tricking a victim into clicking a link or loading a page that submits a malicious request. Exploitation of this issue requires user interaction."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
|
@ -2,13 +2,13 @@
|
||||
"id": "CVE-2024-39410",
|
||||
"sourceIdentifier": "psirt@adobe.com",
|
||||
"published": "2024-08-14T12:15:27.177",
|
||||
"lastModified": "2024-08-14T14:41:36.527",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2024-09-16T13:15:09.557",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Adobe Commerce versions 2.4.7-p1, 2.4.6-p6, 2.4.5-p8, 2.4.4-p9 and earlier are affected by a Cross-Site Request Forgery (CSRF) vulnerability that could allow an attacker to bypass security features and perform minor unauthorised actions on behalf of a user. The vulnerability could be exploited by tricking a victim into clicking a link or loading a page that submits a malicious request. Exploitation of this issue requires user interaction."
|
||||
"value": "Adobe Commerce versions 2.4.7-p1, 2.4.6-p6, 2.4.5-p8, 2.4.4-p9 and earlier are affected by a Cross-Site Request Forgery (CSRF) vulnerability that could allow an attacker to bypass security features and perform minor integrity changes on behalf of a user. The vulnerability could be exploited by tricking a victim into clicking a link or loading a page that submits a malicious request. Exploitation of this issue does not require user interaction."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
@ -18,8 +18,28 @@
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"source": "psirt@adobe.com",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 4.3,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 1.4
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:L",
|
||||
@ -36,26 +56,6 @@
|
||||
},
|
||||
"exploitabilityScore": 2.1,
|
||||
"impactScore": 3.4
|
||||
},
|
||||
{
|
||||
"source": "psirt@adobe.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 4.3,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 1.4
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -2,13 +2,13 @@
|
||||
"id": "CVE-2024-39412",
|
||||
"sourceIdentifier": "psirt@adobe.com",
|
||||
"published": "2024-08-14T12:15:27.650",
|
||||
"lastModified": "2024-08-14T14:45:35.393",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2024-09-16T13:15:09.840",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Adobe Commerce versions 2.4.7-p1, 2.4.6-p6, 2.4.5-p8, 2.4.4-p9 and earlier are affected by an Improper Authorization vulnerability that could result in a Security feature bypass. A low-privileged attacker could leverage this vulnerability to bypass security measures and disclose minor information. Exploitation of this issue does not require user interaction."
|
||||
"value": "Adobe Commerce versions 2.4.7-p1, 2.4.6-p6, 2.4.5-p8, 2.4.4-p9 and earlier are affected by an Improper Authorization vulnerability that could result in a Security feature bypass. A low-privileged attacker could leverage this vulnerability to bypass security measures and perform a minor integrity change. Exploitation of this issue does not require user interaction."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-39420",
|
||||
"sourceIdentifier": "psirt@adobe.com",
|
||||
"published": "2024-08-14T15:15:24.960",
|
||||
"lastModified": "2024-09-13T09:15:08.297",
|
||||
"lastModified": "2024-09-16T13:15:09.977",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -18,7 +18,7 @@
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"source": "psirt@adobe.com",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
@ -38,23 +38,23 @@
|
||||
"impactScore": 5.9
|
||||
},
|
||||
{
|
||||
"source": "psirt@adobe.com",
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"attackComplexity": "HIGH",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 7.8,
|
||||
"baseScore": 7.0,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"exploitabilityScore": 1.0,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-40478",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-08-12T13:38:28.820",
|
||||
"lastModified": "2024-08-12T13:41:36.517",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2024-09-16T13:46:40.287",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -15,15 +15,74 @@
|
||||
"value": "Se encontr\u00f3 una vulnerabilidad de Cross Site Scripting (XSS) Almacenado en \"/admin/afeedback.php\" en Kashipara Online Exam System v1.0, que permite a atacantes remotos ejecutar c\u00f3digo arbitrario a trav\u00e9s de los campos de par\u00e1metros \"rname\" y \"email\"."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 5.4,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.3,
|
||||
"impactScore": 2.7
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:jayesh:online_exam_system:1.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "2CABE8E7-7159-40FF-9FF7-6608FB08D0D5"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/takekaramey/CVE_Writeup/blob/main/Kashipara/Online%20Exam%20System%20v1.0/Stored%20XSS.pdf",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://www.kashipara.com/project/php/3/online-exam-php-project-source-code-download",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Product"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-41839",
|
||||
"sourceIdentifier": "psirt@adobe.com",
|
||||
"published": "2024-07-23T12:15:10.520",
|
||||
"lastModified": "2024-09-12T15:58:11.690",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2024-09-16T13:15:10.250",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -42,19 +42,19 @@
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:N/I:L/A:N",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 4.1,
|
||||
"baseSeverity": "MEDIUM"
|
||||
"baseScore": 3.5,
|
||||
"baseSeverity": "LOW"
|
||||
},
|
||||
"exploitabilityScore": 2.3,
|
||||
"exploitabilityScore": 2.1,
|
||||
"impactScore": 1.4
|
||||
}
|
||||
]
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-41857",
|
||||
"sourceIdentifier": "psirt@adobe.com",
|
||||
"published": "2024-09-13T09:15:09.350",
|
||||
"lastModified": "2024-09-13T14:06:04.777",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2024-09-16T13:18:35.007",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -17,6 +17,26 @@
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 7.8,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 5.9
|
||||
},
|
||||
{
|
||||
"source": "psirt@adobe.com",
|
||||
"type": "Secondary",
|
||||
@ -51,10 +71,55 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:adobe:illustrator:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "27.9.6",
|
||||
"matchCriteriaId": "AC06E482-90FA-4037-B2A4-1CF07B59003C"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:adobe:illustrator:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "28.0",
|
||||
"versionEndExcluding": "28.7.1",
|
||||
"matchCriteriaId": "6A51C972-D913-48BA-ADC2-95A051DFB5DB"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "387021A0-AF36-463C-A605-32EA7DAC172E"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "A2572D17-1DE6-457B-99CC-64AFD54487EA"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://helpx.adobe.com/security/products/illustrator/apsb24-66.html",
|
||||
"source": "psirt@adobe.com"
|
||||
"source": "psirt@adobe.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,13 +2,13 @@
|
||||
"id": "CVE-2024-41867",
|
||||
"sourceIdentifier": "psirt@adobe.com",
|
||||
"published": "2024-09-13T09:15:10.620",
|
||||
"lastModified": "2024-09-13T17:27:00.437",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2024-09-16T13:15:10.550",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "After Effects versions 23.6.6, 24.5 and earlier are affected by a Stack-based Buffer Overflow vulnerability that could lead to arbitrary file system write operations. An attacker could leverage this vulnerability to modify or corrupt files, potentially leading to a compromise of system integrity. Exploitation of this issue requires user interaction in that a victim must open a malicious file."
|
||||
"value": "After Effects versions 23.6.6, 24.5 and earlier are affected by an out-of-bounds read vulnerability that could lead to disclosure of sensitive memory. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious file."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
@ -61,22 +61,22 @@
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"source": "psirt@adobe.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-787"
|
||||
"value": "CWE-125"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "psirt@adobe.com",
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-121"
|
||||
"value": "CWE-787"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-42122",
|
||||
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"published": "2024-07-30T08:15:04.430",
|
||||
"lastModified": "2024-07-30T13:32:45.943",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2024-09-16T13:49:27.837",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -15,15 +15,74 @@
|
||||
"value": " En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: drm/amd/display: Agregar verificaci\u00f3n de puntero NULL para kzalloc [Por qu\u00e9 y c\u00f3mo] Verifique el puntero de retorno de kzalloc antes de usarlo."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 5.5,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-476"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "6.9.9",
|
||||
"matchCriteriaId": "EDD11F94-D8F3-477D-931C-7806D6E5D6D3"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/062edd612fcd300f0f79a36fca5b8b6a5e2fce70",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/8e65a1b7118acf6af96449e1e66b7adbc9396912",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-42131",
|
||||
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"published": "2024-07-30T08:15:05.130",
|
||||
"lastModified": "2024-08-19T05:15:06.990",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2024-09-16T13:52:37.707",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -15,39 +15,188 @@
|
||||
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: mm: evitar desbordamientos en la l\u00f3gica de limitaci\u00f3n sucia La l\u00f3gica de limitaci\u00f3n sucia se entremezcla con suposiciones de que los l\u00edmites sucios en unidades PAGE_SIZE caben en 32 bits (de modo que varias multiplicaciones caben en 64 bits) . Si los l\u00edmites terminan siendo mayores, tendremos desbordamientos, posibles divisiones entre 0, etc. Solucione estos problemas nunca permitiendo l\u00edmites sucios tan grandes, ya que de todos modos tienen un valor pr\u00e1ctico dudoso. Para las interfaces dirty_bytes/dirty_background_bytes podemos simplemente negarnos a establecer l\u00edmites tan grandes. Para dirty_ratio / dirty_background_ratio no es tan simple ya que el l\u00edmite sucio se calcula a partir de la cantidad de memoria disponible que puede cambiar debido a la conexi\u00f3n en caliente de la memoria, etc. Entonces, al convertir l\u00edmites sucios de proporciones a n\u00fameros de p\u00e1ginas, simplemente no permitimos el el resultado excede UINT_MAX. Este es un problema que se puede activar solo desde la ra\u00edz y que ocurre cuando el operador establece l\u00edmites sucios en >16 TB."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 5.5,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-190"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "4.19.320",
|
||||
"matchCriteriaId": "0B4EF915-550B-45E5-B2CA-648FEACD60FC"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "4.20",
|
||||
"versionEndExcluding": "5.4.282",
|
||||
"matchCriteriaId": "A8961D98-9ACF-4188-BA88-44038B14BC28"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "5.5",
|
||||
"versionEndExcluding": "5.10.222",
|
||||
"matchCriteriaId": "00696AC5-EE29-437F-97F9-C4D66608B327"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "5.11",
|
||||
"versionEndExcluding": "5.15.163",
|
||||
"matchCriteriaId": "A97DEB09-4927-40F8-B5C6-F5BD5EAE0CFD"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "5.16",
|
||||
"versionEndExcluding": "6.1.98",
|
||||
"matchCriteriaId": "E09E92A5-27EF-40E4-926A-B1CDC8270551"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "6.2",
|
||||
"versionEndExcluding": "6.6.39",
|
||||
"matchCriteriaId": "29E894E4-668F-4DB0-81F7-4FB5F698E970"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "6.7",
|
||||
"versionEndExcluding": "6.9.9",
|
||||
"matchCriteriaId": "ADCC1407-0CB3-4C8F-B4C5-07F682CD7085"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:6.10:rc1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "2EBB4392-5FA6-4DA9-9772-8F9C750109FA"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:6.10:rc2:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "331C2F14-12C7-45D5-893D-8C52EE38EA10"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:6.10:rc3:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "3173713D-909A-4DD3-9DD4-1E171EB057EE"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:6.10:rc4:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "79F18AFA-40F7-43F0-BA30-7BDB65F918B9"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:6.10:rc5:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "BD973AA4-A789-49BD-8D57-B2846935D3C7"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:6.10:rc6:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "8F3E9E0C-AC3E-4967-AF80-6483E8AB0078"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/2b2d2b8766db028bd827af34075f221ae9e9efff",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/385d838df280eba6c8680f9777bfa0d0bfe7e8b2",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/4d3817b64eda07491bdd86a234629fe0764fb42a",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/7a49389771ae7666f4dc3426e2a4594bf23ae290",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/8e0b5e7f2895eccef5c2a0018b589266f90c4805",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/a25e8536184516b55ef89ab91dd2eea429de28d2",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/bd16a7ee339aef3ee4c90cb23902afb6af379ea0",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/c83ed422c24f0d4b264f89291d4fabe285f80dbc",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-42136",
|
||||
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"published": "2024-07-30T08:15:05.507",
|
||||
"lastModified": "2024-07-30T13:32:45.943",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2024-09-16T13:54:41.923",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -15,23 +15,102 @@
|
||||
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: cdrom: reorganice la verificaci\u00f3n de last_media_change para evitar un desbordamiento involuntario. Al ejecutar syzkaller con el sanitizador de ajuste de enteros firmado recientemente reintroducido, nos encontramos con este s\u00edmbolo: [366.015950] UBSAN: desbordamiento de enteros firmados en .. /drivers/cdrom/cdrom.c:2361:33 [ 366.021089] -9223372036854775808 - 346321 no se puede representar en el tipo '__s64' (tambi\u00e9n conocido como 'long long') [ 366.025894] El programa syz-executor.4 est\u00e1 utilizando un ioctl SCSI obsoleto, convi\u00e9rtalo a SG_IO [366.027502] CPU: 5 PID: 28472 Comm: syz-executor.7 Not tainted 6.8.0-rc2-00035-gb3ef86b5a957 #1 [366.027512] Nombre de hardware: PC est\u00e1ndar QEMU (i440FX + PIIX, 1996) , BIOS 1.16.3-debian-1.16.3-2 01/04/2014 [ 366.027518] Seguimiento de llamadas: [ 366.027523] [ 366.027533] dump_stack_lvl+0x93/0xd0 [ 366.027899] 1b0 [366.038787] ata1 .00: \u00bfmulti_count 32 no v\u00e1lido se ignora [366.043924] cdrom_ioctl+0x2c3f/0x2d10 [366.063932]? __pm_runtime_resume+0xe6/0x130 [ 366.071923] sr_block_ioctl+0x15d/0x1d0 [ 366.074624] ? __pfx_sr_block_ioctl+0x10/0x10 [ 366.077642] blkdev_ioctl+0x419/0x500 [ 366.080231] ? __pfx_blkdev_ioctl+0x10/0x10 ... Hist\u00f3ricamente, el sanitizador de desbordamiento de enteros con signo no funcionaba en el kernel debido a su interacci\u00f3n con `-fwrapv` pero desde entonces esto se ha cambiado [1] en la versi\u00f3n m\u00e1s reciente de Clang. Se volvi\u00f3 a habilitar en el kernel con el compromiso 557f8c582a9ba8ab (\"ubsan: reintroducir el sanitizadorde desbordamiento firmado\"). Reorganicemos la verificaci\u00f3n para no realizar ninguna aritm\u00e9tica y as\u00ed no activar el sanitizador."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 7.8,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-190"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "6.1.98",
|
||||
"matchCriteriaId": "59AC0B46-8C0D-4C0B-9705-C8CFF0DCAD00"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "6.2",
|
||||
"versionEndExcluding": "6.6.39",
|
||||
"matchCriteriaId": "29E894E4-668F-4DB0-81F7-4FB5F698E970"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "6.7",
|
||||
"versionEndExcluding": "6.9.9",
|
||||
"matchCriteriaId": "ADCC1407-0CB3-4C8F-B4C5-07F682CD7085"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/0c97527e916054acc4a46ffb02842988acb2e92b",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/3ee21e14c8c329168a0b66bab00ecd18f5d0dee3",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/e809bc112712da8f7e15822674c6562da6cdf24c",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/efb905aeb44b0e99c0e6b07865b1885ae0471ebf",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,17 +2,41 @@
|
||||
"id": "CVE-2024-44798",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-09-13T16:15:04.387",
|
||||
"lastModified": "2024-09-13T18:35:16.920",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2024-09-16T13:19:38.393",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "phpgurukul Bus Pass Management System 1.0 is vulnerable to Cross-site scripting (XSS) in /admin/pass-bwdates-reports-details.php via fromdate and todate parameters."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "phpgurukul Bus Pass Management System 1.0 es vulnerable a Cross-site Scripting (XSS) en /admin/pass-bwdates-reports-details.php a trav\u00e9s de los par\u00e1metros fromdate y todate."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "HIGH",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 4.8,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 1.7,
|
||||
"impactScore": 2.7
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
@ -36,6 +60,16 @@
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
@ -47,10 +81,31 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:anujk305:bus_pass_management_system:1.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "80EBAFC9-E1B6-49F0-8B4B-B1FC5BD25245"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/shouvikdutta1998/Bus_management",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-44996",
|
||||
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"published": "2024-09-04T20:15:08.413",
|
||||
"lastModified": "2024-09-05T12:53:21.110",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2024-09-16T12:21:47.370",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -15,19 +15,104 @@
|
||||
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: vsock: corregir llamadas recursivas ->recvmsg Despu\u00e9s de que se ha a\u00f1adido un socket vsock a un sockmap BPF, su prot->recvmsg se ha reemplazado por vsock_bpf_recvmsg(). Por lo tanto, podr\u00eda ocurrir la siguiente recursi\u00f3n: vsock_bpf_recvmsg() -> __vsock_recvmsg() -> vsock_connectible_recvmsg() -> prot->recvmsg() -> vsock_bpf_recvmsg() de nuevo Necesitamos solucionarlo llamando al ->recvmsg() original sin ninguna l\u00f3gica sockmap BPF en __vsock_recvmsg()."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 5.5,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-674"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "6.4",
|
||||
"versionEndExcluding": "6.6.48",
|
||||
"matchCriteriaId": "EFA932A8-AACF-430D-AFBC-9A93F0749D68"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "6.7",
|
||||
"versionEndExcluding": "6.10.7",
|
||||
"matchCriteriaId": "D2AFDFD1-D95A-4EB7-843B-5E7659518B67"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:6.11:rc1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "8B3CE743-2126-47A3-8B7C-822B502CF119"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:6.11:rc2:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "4DEB27E7-30AA-45CC-8934-B89263EF3551"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:6.11:rc3:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "E0005AEF-856E-47EB-BFE4-90C46899394D"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/69139d2919dd4aa9a553c8245e7c63e82613e3fc",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/921f1acf0c3cf6b1260ab57a8a6e8b3d5f3023d5",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/b4ee8cf1acc5018ed1369150d7bb3e0d0f79e135",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-45203",
|
||||
"sourceIdentifier": "vultures@jpcert.or.jp",
|
||||
"published": "2024-09-09T07:15:17.030",
|
||||
"lastModified": "2024-09-09T13:03:38.303",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2024-09-16T13:27:19.190",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -15,11 +15,73 @@
|
||||
"value": "La autorizaci\u00f3n incorrecta en el controlador para el problema del esquema de URL personalizado en la aplicaci\u00f3n \"@cosme\" para versiones de Android anteriores a la 5.69.0 y la aplicaci\u00f3n \"@cosme\" para versiones de iOS anteriores a la 6.74.0 permite que un atacante haga que un usuario acceda a un sitio web arbitrario a trav\u00e9s de la aplicaci\u00f3n vulnerable. Como resultado, el usuario puede convertirse en v\u00edctima de un ataque de phishing."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 4.3,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 1.4
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "NVD-CWE-noinfo"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:istyle:\\@cosme:*:*:*:*:*:android:*:*",
|
||||
"versionEndExcluding": "5.69.0",
|
||||
"matchCriteriaId": "64988621-16CC-45BE-BF48-D049D9A823A7"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:istyle:\\@cosme:*:*:*:*:*:iphone_os:*:*",
|
||||
"versionEndIncluding": "6.74.0",
|
||||
"matchCriteriaId": "41C989A5-87CA-46AF-89A8-A41AA1926CF9"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://jvn.jp/en/jp/JVN81570776/",
|
||||
"source": "vultures@jpcert.or.jp"
|
||||
"source": "vultures@jpcert.or.jp",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
21
CVE-2024/CVE-2024-464xx/CVE-2024-46424.json
Normal file
21
CVE-2024/CVE-2024-464xx/CVE-2024-46424.json
Normal file
@ -0,0 +1,21 @@
|
||||
{
|
||||
"id": "CVE-2024-46424",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-09-16T13:15:10.760",
|
||||
"lastModified": "2024-09-16T13:15:10.760",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "TOTOLINK AC1200 T8 v4.1.5cu.861_B20230220 has a buffer overflow vulnerability in the UploadCustomModule function, which allows attackers to cause a Denial of Service (DoS) via the File parameter."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/TTTJJJWWW/AHU-IoT-vulnerable/blob/main/TOTOLINK/AC1200T8/UploadCustomModule.md",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
21
CVE-2024/CVE-2024-464xx/CVE-2024-46451.json
Normal file
21
CVE-2024/CVE-2024-464xx/CVE-2024-46451.json
Normal file
@ -0,0 +1,21 @@
|
||||
{
|
||||
"id": "CVE-2024-46451",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-09-16T13:15:10.847",
|
||||
"lastModified": "2024-09-16T13:15:10.847",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "TOTOLINK AC1200 T8 v4.1.5cu.861_B20230220 has a buffer overflow vulnerability in the setWiFiAclRules function via the desc parameter."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/offshore0315/loT-vulnerable/blob/main/TOTOLINK/AC1200%20T8/setWiFiAclRules.md",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
25
CVE-2024/CVE-2024-469xx/CVE-2024-46937.json
Normal file
25
CVE-2024/CVE-2024-469xx/CVE-2024-46937.json
Normal file
@ -0,0 +1,25 @@
|
||||
{
|
||||
"id": "CVE-2024-46937",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-09-16T13:15:10.917",
|
||||
"lastModified": "2024-09-16T13:15:10.917",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "An improper access control (IDOR) vulnerability in the /api-selfportal/get-info-token-properties endpoint in MFASOFT Secure Authentication Server (SAS) 1.8.x through 1.9.x before 1.9.040924 allows remote attackers gain access to user tokens without authentication. The is a brute-force attack on the serial parameter by number identifier: GA00001, GA00002, GA00003, etc."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/WI1D-41/IDOR-in-MFASOFT-Secure-Authentication-Server",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://mfasoft.ru",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-5988",
|
||||
"sourceIdentifier": "PSIRT@rockwellautomation.com",
|
||||
"published": "2024-06-25T16:15:24.937",
|
||||
"lastModified": "2024-06-25T18:50:42.040",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2024-09-16T12:07:20.767",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -59,9 +59,41 @@
|
||||
"baseSeverity": "CRITICAL"
|
||||
}
|
||||
}
|
||||
],
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "NVD-CWE-noinfo"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "PSIRT@rockwellautomation.com",
|
||||
"type": "Secondary",
|
||||
@ -73,10 +105,123 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:rockwellautomation:thinmanager:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "11.1.0",
|
||||
"versionEndExcluding": "11.1.8",
|
||||
"matchCriteriaId": "2BC59B57-F8F5-4979-826B-EAA0A8456B2A"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:rockwellautomation:thinmanager:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "11.2.0",
|
||||
"versionEndExcluding": "11.2.9",
|
||||
"matchCriteriaId": "79481998-C98B-4486-A2DC-C4DE324DCA10"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:rockwellautomation:thinmanager:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "12.0.0",
|
||||
"versionEndExcluding": "12.0.7",
|
||||
"matchCriteriaId": "BFD553E2-EB04-4D97-AD70-2175933E3DCD"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:rockwellautomation:thinmanager:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "12.1.0",
|
||||
"versionEndExcluding": "12.1.8",
|
||||
"matchCriteriaId": "FC5BBCD2-0C47-4B48-81DD-D56D5677BFA0"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:rockwellautomation:thinmanager:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "13.0.0",
|
||||
"versionEndExcluding": "13.0.5",
|
||||
"matchCriteriaId": "7EEDB253-45FB-4722-994A-E0EF00C7F405"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:rockwellautomation:thinmanager:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "13.1.0",
|
||||
"versionEndExcluding": "13.1.3",
|
||||
"matchCriteriaId": "F2FB9C58-1AAF-46CB-BBB5-909223EE5572"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:rockwellautomation:thinmanager:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "13.2.0",
|
||||
"versionEndExcluding": "13.2.2",
|
||||
"matchCriteriaId": "BB3AA59A-9CA4-4CD0-981C-B974A94BAC30"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:rockwellautomation:thinserver:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "11.1.0",
|
||||
"versionEndExcluding": "11.1.8",
|
||||
"matchCriteriaId": "33A7D7B2-945B-48AD-AD65-C1DDD52811DC"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:rockwellautomation:thinserver:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "11.2.0",
|
||||
"versionEndExcluding": "11.2.9",
|
||||
"matchCriteriaId": "808EDF9D-E721-4513-8AC9-A7B86163F0AE"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:rockwellautomation:thinserver:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "12.0.0",
|
||||
"versionEndExcluding": "12.0.7",
|
||||
"matchCriteriaId": "9D00E4B0-2B55-460B-B394-BE0E379144FA"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:rockwellautomation:thinserver:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "12.1.0",
|
||||
"versionEndExcluding": "12.1.8",
|
||||
"matchCriteriaId": "9D2E6604-AED5-4099-B2EB-E33F15095C6A"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:rockwellautomation:thinserver:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "13.0.0",
|
||||
"versionEndExcluding": "13.0.5",
|
||||
"matchCriteriaId": "7229242B-0780-4E55-9088-7FCA82C24FE0"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:rockwellautomation:thinserver:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "13.1.0",
|
||||
"versionEndExcluding": "13.1.3",
|
||||
"matchCriteriaId": "BA376CA1-C47D-45C2-B906-8CCCDF5B83D5"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:rockwellautomation:thinserver:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "13.2.0",
|
||||
"versionEndExcluding": "13.2.2",
|
||||
"matchCriteriaId": "12658E67-3F63-451F-95AC-3191F2043014"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.rockwellautomation.com/en-us/trust-center/security-advisories/advisory.SD1677.html",
|
||||
"source": "PSIRT@rockwellautomation.com"
|
||||
"source": "PSIRT@rockwellautomation.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-5989",
|
||||
"sourceIdentifier": "PSIRT@rockwellautomation.com",
|
||||
"published": "2024-06-25T16:15:25.363",
|
||||
"lastModified": "2024-06-25T18:50:42.040",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2024-09-16T12:08:03.447",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -59,9 +59,41 @@
|
||||
"baseSeverity": "CRITICAL"
|
||||
}
|
||||
}
|
||||
],
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "NVD-CWE-noinfo"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "PSIRT@rockwellautomation.com",
|
||||
"type": "Secondary",
|
||||
@ -73,10 +105,123 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:rockwellautomation:thinmanager:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "11.1.0",
|
||||
"versionEndExcluding": "11.1.8",
|
||||
"matchCriteriaId": "2BC59B57-F8F5-4979-826B-EAA0A8456B2A"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:rockwellautomation:thinmanager:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "11.2.0",
|
||||
"versionEndExcluding": "11.2.9",
|
||||
"matchCriteriaId": "79481998-C98B-4486-A2DC-C4DE324DCA10"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:rockwellautomation:thinmanager:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "12.0.0",
|
||||
"versionEndExcluding": "12.0.7",
|
||||
"matchCriteriaId": "BFD553E2-EB04-4D97-AD70-2175933E3DCD"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:rockwellautomation:thinmanager:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "12.1.0",
|
||||
"versionEndExcluding": "12.1.8",
|
||||
"matchCriteriaId": "FC5BBCD2-0C47-4B48-81DD-D56D5677BFA0"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:rockwellautomation:thinmanager:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "13.0.0",
|
||||
"versionEndExcluding": "13.0.5",
|
||||
"matchCriteriaId": "7EEDB253-45FB-4722-994A-E0EF00C7F405"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:rockwellautomation:thinmanager:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "13.1.0",
|
||||
"versionEndExcluding": "13.1.3",
|
||||
"matchCriteriaId": "F2FB9C58-1AAF-46CB-BBB5-909223EE5572"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:rockwellautomation:thinmanager:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "13.2.0",
|
||||
"versionEndExcluding": "13.2.2",
|
||||
"matchCriteriaId": "BB3AA59A-9CA4-4CD0-981C-B974A94BAC30"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:rockwellautomation:thinserver:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "11.1.0",
|
||||
"versionEndExcluding": "11.1.8",
|
||||
"matchCriteriaId": "33A7D7B2-945B-48AD-AD65-C1DDD52811DC"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:rockwellautomation:thinserver:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "11.2.0",
|
||||
"versionEndExcluding": "11.2.9",
|
||||
"matchCriteriaId": "808EDF9D-E721-4513-8AC9-A7B86163F0AE"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:rockwellautomation:thinserver:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "12.0.0",
|
||||
"versionEndExcluding": "12.0.7",
|
||||
"matchCriteriaId": "9D00E4B0-2B55-460B-B394-BE0E379144FA"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:rockwellautomation:thinserver:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "12.1.0",
|
||||
"versionEndExcluding": "12.1.8",
|
||||
"matchCriteriaId": "9D2E6604-AED5-4099-B2EB-E33F15095C6A"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:rockwellautomation:thinserver:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "13.0.0",
|
||||
"versionEndExcluding": "13.0.5",
|
||||
"matchCriteriaId": "7229242B-0780-4E55-9088-7FCA82C24FE0"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:rockwellautomation:thinserver:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "13.1.0",
|
||||
"versionEndExcluding": "13.1.3",
|
||||
"matchCriteriaId": "BA376CA1-C47D-45C2-B906-8CCCDF5B83D5"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:rockwellautomation:thinserver:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "13.2.0",
|
||||
"versionEndExcluding": "13.2.2",
|
||||
"matchCriteriaId": "12658E67-3F63-451F-95AC-3191F2043014"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.rockwellautomation.com/en-us/trust-center/security-advisories/advisory.SD1677.html",
|
||||
"source": "PSIRT@rockwellautomation.com"
|
||||
"source": "PSIRT@rockwellautomation.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-6083",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2024-06-18T00:15:09.853",
|
||||
"lastModified": "2024-06-20T12:44:01.637",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2024-09-16T13:21:53.467",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -61,6 +61,26 @@
|
||||
}
|
||||
],
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
},
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
@ -110,7 +130,7 @@
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
@ -118,24 +138,63 @@
|
||||
"value": "CWE-434"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-434"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:phpvibe:phpvibe:11.0.46:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "332B3456-DFCB-4BA1-AD73-28A248B65DE3"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/WeikFu/PHPVibe-vulnerability-description/issues/2",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Broken Link"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.268824",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Permissions Required"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.268824",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?submit.353552",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-8190",
|
||||
"sourceIdentifier": "3c1d8aa1-5a33-4ea4-8992-aadd6440af75",
|
||||
"published": "2024-09-10T21:15:14.697",
|
||||
"lastModified": "2024-09-14T01:00:01.107",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2024-09-16T13:44:18.173",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"cisaExploitAdd": "2024-09-13",
|
||||
"cisaActionDue": "2024-10-04",
|
||||
@ -21,6 +21,26 @@
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "HIGH",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 7.2,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 1.2,
|
||||
"impactScore": 5.9
|
||||
},
|
||||
{
|
||||
"source": "3c1d8aa1-5a33-4ea4-8992-aadd6440af75",
|
||||
"type": "Secondary",
|
||||
@ -44,6 +64,16 @@
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-78"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "3c1d8aa1-5a33-4ea4-8992-aadd6440af75",
|
||||
"type": "Secondary",
|
||||
@ -55,10 +85,35 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:ivanti:cloud_services_appliance:4.6:-:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "3B63CA83-3DB3-4670-878E-17A54586B25E"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:ivanti:cloud_services_appliance:4.6:patch_518:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "61C0BF44-691D-4811-BE9E-FB9B6CC856B9"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://forums.ivanti.com/s/article/Security-Advisory-Ivanti-Cloud-Service-Appliance-CSA-CVE-2024-8190",
|
||||
"source": "3c1d8aa1-5a33-4ea4-8992-aadd6440af75"
|
||||
"source": "3c1d8aa1-5a33-4ea4-8992-aadd6440af75",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-8568",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2024-09-08T03:15:01.833",
|
||||
"lastModified": "2024-09-09T13:03:38.303",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2024-09-16T13:22:31.087",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -61,6 +61,26 @@
|
||||
}
|
||||
],
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
},
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
@ -120,22 +140,52 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:project_team:tmall_demo:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "2024-09-01",
|
||||
"matchCriteriaId": "87BC4AE1-C113-4DE4-A229-5F56DE2F39E0"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://gitee.com/A0kooo/cve_article/blob/master/Mini-Tmall/Tmall_demo%20OrderController.java%20SQL%20Injection.md",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Broken Link"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.276798",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Permissions Required"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.276798",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?submit.401010",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-8586",
|
||||
"sourceIdentifier": "twcert@cert.org.tw",
|
||||
"published": "2024-09-09T03:15:10.270",
|
||||
"lastModified": "2024-09-09T13:03:38.303",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2024-09-16T13:28:03.400",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -51,14 +51,38 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:uniong:webitr:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "2_1_0_28",
|
||||
"matchCriteriaId": "D8F452E2-AACA-47E5-8E50-6B53535C9E6F"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.twcert.org.tw/en/cp-139-8044-65b84-2.html",
|
||||
"source": "twcert@cert.org.tw"
|
||||
"source": "twcert@cert.org.tw",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://www.twcert.org.tw/tw/cp-132-8043-cc323-1.html",
|
||||
"source": "twcert@cert.org.tw"
|
||||
"source": "twcert@cert.org.tw",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
49
README.md
49
README.md
@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours.
|
||||
### Last Repository Update
|
||||
|
||||
```plain
|
||||
2024-09-16T12:00:17.413980+00:00
|
||||
2024-09-16T14:00:25.327862+00:00
|
||||
```
|
||||
|
||||
### Most recent CVE Modification Timestamp synchronized with NVD
|
||||
|
||||
```plain
|
||||
2024-09-16T11:58:38.363000+00:00
|
||||
2024-09-16T13:54:41.923000+00:00
|
||||
```
|
||||
|
||||
### Last Data Feed Release
|
||||
@ -33,29 +33,48 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
|
||||
### Total Number of included CVEs
|
||||
|
||||
```plain
|
||||
262924
|
||||
262928
|
||||
```
|
||||
|
||||
### CVEs added in the last Commit
|
||||
|
||||
Recently added CVEs: `1`
|
||||
Recently added CVEs: `4`
|
||||
|
||||
- [CVE-2024-46970](CVE-2024/CVE-2024-469xx/CVE-2024-46970.json) (`2024-09-16T11:15:13.540`)
|
||||
- [CVE-2024-22399](CVE-2024/CVE-2024-223xx/CVE-2024-22399.json) (`2024-09-16T12:15:02.530`)
|
||||
- [CVE-2024-46424](CVE-2024/CVE-2024-464xx/CVE-2024-46424.json) (`2024-09-16T13:15:10.760`)
|
||||
- [CVE-2024-46451](CVE-2024/CVE-2024-464xx/CVE-2024-46451.json) (`2024-09-16T13:15:10.847`)
|
||||
- [CVE-2024-46937](CVE-2024/CVE-2024-469xx/CVE-2024-46937.json) (`2024-09-16T13:15:10.917`)
|
||||
|
||||
|
||||
### CVEs modified in the last Commit
|
||||
|
||||
Recently modified CVEs: `9`
|
||||
Recently modified CVEs: `50`
|
||||
|
||||
- [CVE-2023-3773](CVE-2023/CVE-2023-37xx/CVE-2023-3773.json) (`2024-09-16T11:15:12.553`)
|
||||
- [CVE-2023-4273](CVE-2023/CVE-2023-42xx/CVE-2023-4273.json) (`2024-09-16T11:15:13.117`)
|
||||
- [CVE-2024-34121](CVE-2024/CVE-2024-341xx/CVE-2024-34121.json) (`2024-09-16T11:55:00.837`)
|
||||
- [CVE-2024-39377](CVE-2024/CVE-2024-393xx/CVE-2024-39377.json) (`2024-09-16T10:30:03.333`)
|
||||
- [CVE-2024-41870](CVE-2024/CVE-2024-418xx/CVE-2024-41870.json) (`2024-09-16T10:32:09.480`)
|
||||
- [CVE-2024-41871](CVE-2024/CVE-2024-418xx/CVE-2024-41871.json) (`2024-09-16T10:36:14.100`)
|
||||
- [CVE-2024-41872](CVE-2024/CVE-2024-418xx/CVE-2024-41872.json) (`2024-09-16T11:16:26.797`)
|
||||
- [CVE-2024-41873](CVE-2024/CVE-2024-418xx/CVE-2024-41873.json) (`2024-09-16T11:39:40.703`)
|
||||
- [CVE-2024-5990](CVE-2024/CVE-2024-59xx/CVE-2024-5990.json) (`2024-09-16T11:58:38.363`)
|
||||
- [CVE-2024-39379](CVE-2024/CVE-2024-393xx/CVE-2024-39379.json) (`2024-09-16T12:15:02.870`)
|
||||
- [CVE-2024-39384](CVE-2024/CVE-2024-393xx/CVE-2024-39384.json) (`2024-09-16T13:01:07.037`)
|
||||
- [CVE-2024-39385](CVE-2024/CVE-2024-393xx/CVE-2024-39385.json) (`2024-09-16T13:12:45.600`)
|
||||
- [CVE-2024-39406](CVE-2024/CVE-2024-394xx/CVE-2024-39406.json) (`2024-09-16T12:15:03.080`)
|
||||
- [CVE-2024-39408](CVE-2024/CVE-2024-394xx/CVE-2024-39408.json) (`2024-09-16T13:15:09.133`)
|
||||
- [CVE-2024-39409](CVE-2024/CVE-2024-394xx/CVE-2024-39409.json) (`2024-09-16T13:15:09.387`)
|
||||
- [CVE-2024-39410](CVE-2024/CVE-2024-394xx/CVE-2024-39410.json) (`2024-09-16T13:15:09.557`)
|
||||
- [CVE-2024-39412](CVE-2024/CVE-2024-394xx/CVE-2024-39412.json) (`2024-09-16T13:15:09.840`)
|
||||
- [CVE-2024-39420](CVE-2024/CVE-2024-394xx/CVE-2024-39420.json) (`2024-09-16T13:15:09.977`)
|
||||
- [CVE-2024-40478](CVE-2024/CVE-2024-404xx/CVE-2024-40478.json) (`2024-09-16T13:46:40.287`)
|
||||
- [CVE-2024-41839](CVE-2024/CVE-2024-418xx/CVE-2024-41839.json) (`2024-09-16T13:15:10.250`)
|
||||
- [CVE-2024-41857](CVE-2024/CVE-2024-418xx/CVE-2024-41857.json) (`2024-09-16T13:18:35.007`)
|
||||
- [CVE-2024-41867](CVE-2024/CVE-2024-418xx/CVE-2024-41867.json) (`2024-09-16T13:15:10.550`)
|
||||
- [CVE-2024-42122](CVE-2024/CVE-2024-421xx/CVE-2024-42122.json) (`2024-09-16T13:49:27.837`)
|
||||
- [CVE-2024-42131](CVE-2024/CVE-2024-421xx/CVE-2024-42131.json) (`2024-09-16T13:52:37.707`)
|
||||
- [CVE-2024-42136](CVE-2024/CVE-2024-421xx/CVE-2024-42136.json) (`2024-09-16T13:54:41.923`)
|
||||
- [CVE-2024-44798](CVE-2024/CVE-2024-447xx/CVE-2024-44798.json) (`2024-09-16T13:19:38.393`)
|
||||
- [CVE-2024-44996](CVE-2024/CVE-2024-449xx/CVE-2024-44996.json) (`2024-09-16T12:21:47.370`)
|
||||
- [CVE-2024-45203](CVE-2024/CVE-2024-452xx/CVE-2024-45203.json) (`2024-09-16T13:27:19.190`)
|
||||
- [CVE-2024-5988](CVE-2024/CVE-2024-59xx/CVE-2024-5988.json) (`2024-09-16T12:07:20.767`)
|
||||
- [CVE-2024-5989](CVE-2024/CVE-2024-59xx/CVE-2024-5989.json) (`2024-09-16T12:08:03.447`)
|
||||
- [CVE-2024-6083](CVE-2024/CVE-2024-60xx/CVE-2024-6083.json) (`2024-09-16T13:21:53.467`)
|
||||
- [CVE-2024-8190](CVE-2024/CVE-2024-81xx/CVE-2024-8190.json) (`2024-09-16T13:44:18.173`)
|
||||
- [CVE-2024-8568](CVE-2024/CVE-2024-85xx/CVE-2024-8568.json) (`2024-09-16T13:22:31.087`)
|
||||
- [CVE-2024-8586](CVE-2024/CVE-2024-85xx/CVE-2024-8586.json) (`2024-09-16T13:28:03.400`)
|
||||
|
||||
|
||||
## Download and Usage
|
||||
|
124
_state.csv
124
_state.csv
@ -190541,7 +190541,7 @@ CVE-2022-21266,0,0,753151acd4774ecb48373a9775e6cd3188dfba7b4be399de2484e866292e0
|
||||
CVE-2022-21267,0,0,9a4554da67b7e98459acb9300c3817d2633f958f2bf511036540b29d1a4838b9,2022-01-22T02:04:10.347000
|
||||
CVE-2022-21268,0,0,521b01ddc811aeb81da6614510a0bd929b3f9a1ca85ee8f6a6c978ddefc27158,2022-01-22T02:05:25.687000
|
||||
CVE-2022-21269,0,0,44b218cc300f1a70b300145a21bb8694436cb02c37fb20df76d42e367241127e,2022-01-22T02:14:42.817000
|
||||
CVE-2022-2127,0,0,05422719ec6c54901ce416331b80463d9b67204e7510ddd7f1a1e47911019d52,2024-04-22T16:15:12.070000
|
||||
CVE-2022-2127,0,1,d6f122f203ea87f4aef2e6871124f51b79136b087c850c25eb7338176be6479f,2024-09-16T13:15:04.270000
|
||||
CVE-2022-21270,0,0,59f7cb516f5a4f8922a533972a7a7c04b3ac3f4267fc5cc109b6b2479b70dda2,2023-11-07T03:43:29.010000
|
||||
CVE-2022-21271,0,0,e749498bc779955d1d3d2b42cce5a5b1c48d79b78fac6c729259bdd454cd52fe,2022-10-27T22:56:16.353000
|
||||
CVE-2022-21272,0,0,3432b060d982111113a0081e1a2569f2030400de3c6b1998a80cdb5708295961,2022-01-22T02:23:38.097000
|
||||
@ -225329,7 +225329,7 @@ CVE-2023-33461,0,0,0de3f4305f427b4ff32b903080fb5c836a3af93f2489c41c6aae59dfd6589
|
||||
CVE-2023-33466,0,0,25da7ec5f821757081edf53c63649e6eda046cc60994bb8cbca9396d6ade9066,2023-09-12T11:15:07.650000
|
||||
CVE-2023-33468,0,0,44c774863a2d55e63b1845bf55de3fe4506ca7c2a56eeb4bf92cb746976655cf,2023-08-16T18:03:44.977000
|
||||
CVE-2023-33469,0,0,9dfbe3344d4b40c67ae0a1b0ae4fa865b29407207caaece6d4bed88b6c198b8f,2023-08-17T01:40:13.813000
|
||||
CVE-2023-3347,0,0,a723926bed15f7839c499a6cc8847a6e0b8aed6868ff9adee3647f2061979db2,2024-07-03T01:41:00.823000
|
||||
CVE-2023-3347,0,1,3fd9151d476078e653a42d2b9a1d6a14241e18d5cb22f2096b264fc568cc0686,2024-09-16T13:15:05.877000
|
||||
CVE-2023-33472,0,0,a88e714c00c91b119d1197c1ae4473f07845779cdc1bb465822d892cbf9eac1b,2024-01-22T19:21:10.370000
|
||||
CVE-2023-33476,0,0,4a297145be72f944481cc47e9f376d2cf456cf13a342260740e97ecbfcefc9c3,2023-11-25T11:15:16.937000
|
||||
CVE-2023-33477,0,0,6db6ebce2662ad326ee213faec74c36ba5dbdc9868890686df97f67004511859,2023-06-13T19:14:00.687000
|
||||
@ -226360,9 +226360,9 @@ CVE-2023-34960,0,0,50e7d34151989bc2fed6942340c0c6a8ed7b748fca80f7c8954924d89a9b8
|
||||
CVE-2023-34961,0,0,cf78e1d661f4da7ec294f5ad1e878e2af45e46103cdbcabf68badfe02c1502a8,2023-06-15T18:57:30.313000
|
||||
CVE-2023-34962,0,0,af634868fa0054f2b7c45c13462d01abdaf327d9c48e86310a5f366a8816cef4,2023-06-15T18:59:24.027000
|
||||
CVE-2023-34965,0,0,d85b9c37e2f9457d4eb477b5a252039dfcd7c6ab7df67904bd6c23d6018002fa,2023-06-23T18:14:58.423000
|
||||
CVE-2023-34966,0,0,e340fae4f3c6b2f7d541eece46066fadd3c86c08c5a6e32d59a07b8ae9ee070e,2024-06-25T17:15:10.097000
|
||||
CVE-2023-34967,0,0,495ff8fa0530efa9fdea5444748aa8ee7fda46b1865dffd32204dc3df8b524ce,2024-01-30T16:15:46.067000
|
||||
CVE-2023-34968,0,0,39d941b2def00bd208001be422f07929c150aaa23fe627dd4f991afc7ea93092,2024-01-30T16:15:46.210000
|
||||
CVE-2023-34966,0,1,e75a448d8c9fbf6c3347ce32800fe0287eb15d0c2764bf0acdf69025b4f72033,2024-09-16T13:15:04.757000
|
||||
CVE-2023-34967,0,1,20789ddbd16a5c66b434fe47b18c7a83f5f97a7fa1510768acd3053a2dc98058,2024-09-16T13:15:04.940000
|
||||
CVE-2023-34968,0,1,8abd1ee45940772a2d510b51e6176f151b97123623b47480c095875ee099852f,2024-09-16T13:15:05.127000
|
||||
CVE-2023-34969,0,0,20f3b57435e16371f80459f3c182a2bb410744533b482b94d4ff3198fb3f72ab,2023-12-27T16:36:58.353000
|
||||
CVE-2023-3497,0,0,4d047266b8d04b5eb358e7cea115fd0dab7c7524efcd458770d1e7272757dc4b,2023-07-29T01:15:09.270000
|
||||
CVE-2023-34970,0,0,0cf20f552104745cd280f12f0fd3bfe8bacaaf04a1a90475f6f521b43ad00ab6,2023-10-05T16:59:07.947000
|
||||
@ -226827,7 +226827,7 @@ CVE-2023-35755,0,0,e1f17c748909f4d01d764fd7885f04db141c0fcf4a2980f003d3efccef1d8
|
||||
CVE-2023-35756,0,0,4f68e862c118fc2cbc87ac3f51430f658fe10075e742a61844b05bd60a924e3e,2024-05-03T12:50:12.213000
|
||||
CVE-2023-35757,0,0,0e8463fc2c81bc4580cb4e502ef99de97d681981a85a135f7fe4d04c1930a4c6,2024-05-08T13:15:00.690000
|
||||
CVE-2023-35759,0,0,fa203c42b6b48021e6e150911dd3b26101ac7cf6f6ca08d43fe51256742e16fe,2024-02-05T17:15:08.490000
|
||||
CVE-2023-3576,0,0,e713ea197368bfaaee0f3686fd7e87b968c5521acb4c8ed564a31d1215fbbc27,2024-03-11T13:15:52.550000
|
||||
CVE-2023-3576,0,1,267e9ee7d065cd5eddbc2f91d5bcdedfb06936864c6b93500e7620103f7bf36f,2024-09-16T13:15:06.033000
|
||||
CVE-2023-35762,0,0,381848968217a298c613610e76a7efe58c3e68544c5fddd3446e0f5c4456f0d3,2023-11-29T20:52:44.790000
|
||||
CVE-2023-35763,0,0,a1dde759b107bbb45fb117f852bced52176d7c1f1847cf500e4e2553b06e017b,2023-11-07T04:15:57.230000
|
||||
CVE-2023-35764,0,0,4273457863900c89f2f64f75a391c06d862e4dd907c30b5ae17770d0f4c54015,2024-08-12T21:35:01.167000
|
||||
@ -228343,7 +228343,7 @@ CVE-2023-37721,0,0,ac62f8c1cf5f20a6e8a673c7402a2e07bb57b70ab96a77594240d6df32602
|
||||
CVE-2023-37722,0,0,a247f480ec0383595814379d507cbdc8a13cd9015af391982683a3fc742c702c,2023-07-21T14:26:45.147000
|
||||
CVE-2023-37723,0,0,1c7d85c6eb52078fdf15795a8f85dfb579af0bae35630ec20861bfc0ed75d37f,2023-07-21T14:26:54.460000
|
||||
CVE-2023-37728,0,0,df19612c60ecc75fbf5c3e64ccbff867f8bc36dc8b0c599f914eba09fae7dbb6,2023-11-07T04:17:01.543000
|
||||
CVE-2023-3773,0,1,11d3b2cecab5857e3d45e6f673315a4de4698ee1391ca64a5385b4462e0f6dbf,2024-09-16T11:15:12.553000
|
||||
CVE-2023-3773,0,0,11d3b2cecab5857e3d45e6f673315a4de4698ee1391ca64a5385b4462e0f6dbf,2024-09-16T11:15:12.553000
|
||||
CVE-2023-37732,0,0,18690bbd0f89c1e947931dd2910257c9bba69f42c70050ab3fda22f63381ce39,2023-08-02T00:39:04.113000
|
||||
CVE-2023-37733,0,0,e8ceedae410227aca6e76228ee82909725cbd4cbaaa63c0bfa541bec989ff65d,2023-07-26T21:05:38.297000
|
||||
CVE-2023-37734,0,0,21e0e5059ce8e7972e9057bc21c041f1cc4302c31104916324de291e6fea166b,2023-11-07T04:17:02.450000
|
||||
@ -228745,8 +228745,8 @@ CVE-2023-38197,0,0,93e9b21d96cef7b071fa0630850b9280527ecfc7665ffdaf5c1a114441ea2
|
||||
CVE-2023-38198,0,0,ef85054fa8438ac052ba4f57fa357877b346d9da7c1f0a600daa0dbd6e8d65a0,2023-07-25T14:30:35.337000
|
||||
CVE-2023-38199,0,0,de8ccef5dc614aba2379b7e9c3a48813e945a782bdba9395d21885285c35e7bf,2023-09-05T04:15:09.017000
|
||||
CVE-2023-3820,0,0,50a7cdeb81a8ee17bfc09e7fd0923a7a55a57c37361f22e37bdf60ce60965064,2023-07-26T21:27:15.650000
|
||||
CVE-2023-38200,0,0,29e0a324c31f8f4b612066f7c72991167ecc9c5d3d5755e89c1c27ad28c97394,2023-12-28T15:40:32.947000
|
||||
CVE-2023-38201,0,0,dc2da4ffb541886d0e5faf9fb4f8785479cce69868a9d2fb93d9a082cea0c0a8,2024-01-12T22:01:19.793000
|
||||
CVE-2023-38200,0,1,a1a48a8357049f6c308d1c79204c5214153214eeaf6dc6efdd29c2fcf9e2c08e,2024-09-16T13:15:05.323000
|
||||
CVE-2023-38201,0,1,c929e20502e10588d518086e5c155a2b49164e6cc15c831bec1c45db06883015,2024-09-16T13:15:05.490000
|
||||
CVE-2023-38203,0,0,b74b23ca3de9b9e3c7fbaec82dca0baf7c3b28a210109e3f8f7f3f68094d621c,2024-01-09T02:00:01.953000
|
||||
CVE-2023-38204,0,0,1b9057188dc96038578312ac4a2f54877c38eefabf94e2f1a26a83795739f145,2023-09-19T02:02:14.353000
|
||||
CVE-2023-38205,0,0,186ff5ebb8104f34170642ad74e77a081bb898ced8c47a0e3d92d16ef71e456d,2023-09-19T17:27:19.593000
|
||||
@ -229091,7 +229091,7 @@ CVE-2023-38555,0,0,5b74747fe3727ccf961aab652679ef490622540e87fb7b472b076670dbe2d
|
||||
CVE-2023-38556,0,0,85fa50566d5acf7641189355376a40d5864d78c82226360b990675aa12d2ad6a,2023-08-07T19:24:44.253000
|
||||
CVE-2023-38557,0,0,410e81bb58e4789d07210170f7473db90e4a56e817e8d747b0cc6f31df1024dc,2023-09-21T16:12:01.620000
|
||||
CVE-2023-38558,0,0,41531cacb1de233098d32b79fd9efecebdba07a9595f0a633638e81ec8b2ca7b,2023-09-20T14:03:07.620000
|
||||
CVE-2023-38559,0,0,21c61acd83dcaf120fe100f40e7726cb28d8db7ceb16904aa01483f39cca9770,2024-03-08T18:19:03.450000
|
||||
CVE-2023-38559,0,1,f4de074d6255bba1adaf1a2af72abedea97811f23e11ff71de6632665bc659e7,2024-09-16T13:15:05.667000
|
||||
CVE-2023-3856,0,0,31b604aceaf14703f21a8b47a664ff4f650adc31c83b4a1251209c844c970874,2024-05-17T02:27:54.067000
|
||||
CVE-2023-38560,0,0,247e24b5ab5349d123f13aa4bc5ee89bef8684469506b9c7e635be9f6283daaa,2023-11-07T04:17:21.293000
|
||||
CVE-2023-38561,0,0,c8e08cb46ebd1aa35ebd189dc0663df0fa88b7acddaf3601d5cae603037f46b4,2024-02-14T15:01:46.050000
|
||||
@ -229422,7 +229422,7 @@ CVE-2023-38976,0,0,7b4f7f60ffa8b42cadee7781bac6b79d99dd0e5e9b8ce8797caf39e7d40fa
|
||||
CVE-2023-3898,0,0,6cb64d638c498ae1066713b7c771ca086f38841a510c9b464ec96021b75707d3,2023-08-10T17:50:03.287000
|
||||
CVE-2023-38988,0,0,6860d49e6f63057c1ac1d67ba4ffb1ee7d300f99992cd187515bad60fa9550da,2023-08-03T18:54:14.513000
|
||||
CVE-2023-38989,0,0,ec9c3da43c933c24858a3ac341778f223e6ab4c72987571b94d0138cb0deea19,2023-08-04T03:51:49.137000
|
||||
CVE-2023-3899,0,0,d167c3d9ec337708e0c04082836091f945ad51905338b57a6cf3c907f18aa194,2023-11-09T20:11:15.350000
|
||||
CVE-2023-3899,0,1,a976c1d3d7813d7f4be239e73f5f3c10c08f195015181e1b2884f72649e85770,2024-09-16T13:15:06.240000
|
||||
CVE-2023-38990,0,0,e9c43d19db4bb487825afac8d3fe0a213c0a61444534f94592b6955bfb54a034,2023-08-05T03:54:40.437000
|
||||
CVE-2023-38991,0,0,863a43b6a5a25d59c8375b383640cc261e064acc28ce236760da1e5107fb6f53,2023-08-08T18:58:00.460000
|
||||
CVE-2023-38992,0,0,6a3338539e7bb7c15c7dc0e243b9b9ad7e9e9c5472b9d9b59e02ea092d4f9f17,2023-08-03T18:10:52.757000
|
||||
@ -231369,7 +231369,7 @@ CVE-2023-41450,0,0,34d50a65b46e799820f380c8a0e0b7ea91ac8eb9b3ec1fb417d85b9b739c2
|
||||
CVE-2023-41451,0,0,90a7738d9d319653b5eb91b78821fef606e037dccb36b1d85cb749b0a4edcd94,2023-09-28T21:43:38.937000
|
||||
CVE-2023-41452,0,0,57ee026df418130fe209cd4c34958e75209c07072ad93096c43ecd3dbd91bd1e,2023-09-28T21:47:51.073000
|
||||
CVE-2023-41453,0,0,08c0354bc9a3fdb9b55b526114c6d2b65111c4bfb1e4e57c061e580b2e7f8bcf,2023-09-28T19:15:34.223000
|
||||
CVE-2023-4147,0,0,baad1dd57a6b003a09a2e0a4ff1e6d223d5e0936ceada312b0089a53c1067e63,2024-08-26T16:08:14.227000
|
||||
CVE-2023-4147,0,1,ab9be32ec451567f1a9025dabc55268497f1ae4f2457d9204a4ae67975128be2,2024-09-16T13:15:07.240000
|
||||
CVE-2023-41474,0,0,146129e61eba6ce72d529040280fdedb09627804965a1d99c28fc1496cb617a1,2024-01-31T18:54:51.777000
|
||||
CVE-2023-4148,0,0,a2d62bbfdd9e06123bf616c73cae78de0ae54604969c45bdb7cf00245b0d44c8,2023-11-07T04:22:11.273000
|
||||
CVE-2023-41484,0,0,0bd96297a07db1f2ef23283f5bfcf20ef37bfa8a237e63f6e51d087958784217,2023-09-22T02:09:42.600000
|
||||
@ -232257,7 +232257,7 @@ CVE-2023-42726,0,0,5400106d68f743ce25ee26579289489720c943c324a75b46befa193a73520
|
||||
CVE-2023-42727,0,0,ab8e8227006c1b368e3ca30f850c4fa4412825e0319a433878e4399002a8b38b,2023-12-07T15:39:34.083000
|
||||
CVE-2023-42728,0,0,b86d7cd0058e50b546cf99f1b145c4c8b8365993780c9ee4876291843b1ce492,2023-12-07T15:16:18.897000
|
||||
CVE-2023-42729,0,0,8b5f8f9fe677ca4d365445da6fde305c44cd89fac63cbc9dc1f3037ac128fde9,2023-12-07T15:15:45.540000
|
||||
CVE-2023-4273,0,1,e57bb452f1da98da9600ec695461196db1798f3d7522b1a5ebb476faea4a775c,2024-09-16T11:15:13.117000
|
||||
CVE-2023-4273,0,0,e57bb452f1da98da9600ec695461196db1798f3d7522b1a5ebb476faea4a775c,2024-09-16T11:15:13.117000
|
||||
CVE-2023-42730,0,0,53b59c4010ca0c2aec56539899333c944bf38fca0403e820c52ab00f8571fe98,2023-12-07T16:23:34.477000
|
||||
CVE-2023-42731,0,0,7577bde2338cd0d7495feacd0027ee841f212a53c0f510e121b396ccf8c48045,2023-12-07T16:24:55.660000
|
||||
CVE-2023-42732,0,0,2916855eea2c4ae27fa34c910e5eff7c2eb9df4160c411e12a2ed9b83067c971,2023-12-07T16:30:26.580000
|
||||
@ -232286,7 +232286,7 @@ CVE-2023-42752,0,0,22977535c377988fcec2e0db6fce559af749489e4cbaf81f8d598df1eb50f
|
||||
CVE-2023-42753,0,0,fdef6b4e6e00e576a776ced60bff1da73f2c1de9e8ff8543d560d2d931c65aa4,2024-09-13T19:15:15.143000
|
||||
CVE-2023-42754,0,0,51c5dfa0ab73784fd921f92fed3626ee318007c3c8ffe63efcedede944c4226d,2024-09-13T19:15:15.473000
|
||||
CVE-2023-42755,0,0,4e1d57d99583b1633ac52105d5aa05edba3a9b9a435f3b1f32232d72ee520c1f,2024-09-13T19:15:15.620000
|
||||
CVE-2023-42756,0,0,dd1ce197ba594592a598e5c7806e6f4d6bbb5965288c463442a957df39cf6849,2024-04-30T14:15:09.243000
|
||||
CVE-2023-42756,0,1,8bca0547c5c71329ae74fc216494c3b935babffb1d80b31f0201b320d98bb2d8,2024-09-16T13:15:06.640000
|
||||
CVE-2023-42757,0,0,53f895ca4b2413554de30c5001e6737fc08818e69f276382dbe276da25387997,2024-07-03T01:41:30.683000
|
||||
CVE-2023-4276,0,0,c946dcf653c02d28c8b48cb5d585a9c55257de192fa39f2f1cadf751f6862f19,2023-11-07T04:22:23.843000
|
||||
CVE-2023-42765,0,0,d3d64a39ab45304ea904af85d89b92f9adbba47d39160e37d7185ccf8cd78275,2024-02-12T16:44:16.617000
|
||||
@ -234504,9 +234504,9 @@ CVE-2023-46142,0,0,3fb6a0861e35fc09ecd0298ad20e5d7a8d5b6455fb61a2037ae1846cac22d
|
||||
CVE-2023-46143,0,0,e3bc6bf1bb4c8c0f9d3ac70e1c134375256c14ec8394d0b3c4d1d049a67021ad,2023-12-21T17:15:46.577000
|
||||
CVE-2023-46144,0,0,3282ce1c9478d9758af9f76cb4e41d53fa70db52bbadc33760bdc9a464fbec5b,2023-12-21T17:16:11.880000
|
||||
CVE-2023-46145,0,0,349c8808057410d251a89302413901d028ae7fdfdc2fab73cab5d33fd808c463,2024-05-17T18:36:05.263000
|
||||
CVE-2023-46146,0,0,a754f238dd6b19f00d8bff844daa2de4287573180a3a236876681817a308b5e5,2024-06-20T12:44:01.637000
|
||||
CVE-2023-46146,0,1,674968e0b09709c1de659f46455142d49d86eaca8817754c044e40c734f63cb6,2024-09-16T13:40:24.777000
|
||||
CVE-2023-46147,0,0,adf1b90240c365239e0d74bb3859de2075d45bd2082f60acc86fc39dec609816,2023-12-28T20:04:49.337000
|
||||
CVE-2023-46148,0,0,b30f6d39d5c382bf17d17b260236449902803f164251e84cb6fe2371a7917d5e,2024-06-20T12:44:01.637000
|
||||
CVE-2023-46148,0,1,9bf3fcd47bcc8018a9c1f7948a87dfd5462370201ec373c9040cedb944d2662a,2024-09-16T13:39:49.807000
|
||||
CVE-2023-46149,0,0,3ea8aa587373a4370ffe6a17a9695029b950cdc772eec5fb15d692937fc545e0,2023-12-28T13:44:32.593000
|
||||
CVE-2023-4615,0,0,cce88ca43c3bf2e90c110ee0ceced76eb1449f266f6f989c5a673e12188ed957,2023-09-08T14:14:45.633000
|
||||
CVE-2023-46150,0,0,24b6cfa0fa017814cee898808d57e55bfb0b56cc0b4b2034380458dbb8bb6a4f,2023-11-01T17:34:25.380000
|
||||
@ -236461,10 +236461,10 @@ CVE-2023-48754,0,0,614d4cdc37c0b2375a29c7af81051a6cf9c3b28389871956e1843d10badfd
|
||||
CVE-2023-48755,0,0,3d71fe9f3b24d529c3f220cad4414c1068434aa0e77e34817a1fe25e9c541812,2023-12-20T21:09:32.063000
|
||||
CVE-2023-48756,0,0,7f27ff81a11a1aaf081b2a2c709c5cbdcc34a02567bbee61c06ca3c945b74c19,2023-12-18T19:06:14.257000
|
||||
CVE-2023-48757,0,0,56fdb394c3235b720057647cf37ac09e9261e0b0ae801569247138671fc1be1a,2024-05-17T18:36:05.263000
|
||||
CVE-2023-48759,0,0,052489aa53eb822e2d216817c16596efd0d701ef5cd6cee13e9db743c3fe68b6,2024-06-20T12:44:01.637000
|
||||
CVE-2023-48759,0,1,3f80e547d08e681a92bc3f658b9714a5b770ba9224e1a519cf7c51401af5e48b,2024-09-16T13:25:15.550000
|
||||
CVE-2023-4876,0,0,3b97a842654f5bd1e35e919b3186c1e81e22f9937052ea4ff82c3765d820ed69,2023-09-13T13:36:42.887000
|
||||
CVE-2023-48760,0,0,f9f29363e7eb88748fe8df3e2bc33e19accf1fa8b98e8172c26c3eb6a5ce3fa6,2024-06-20T12:44:01.637000
|
||||
CVE-2023-48761,0,0,f70e2396b61bac65c4b5f961f2c0fd678c6cfdd032657298cf2873141813513f,2024-06-20T12:44:01.637000
|
||||
CVE-2023-48760,0,1,1d8579ae05e2232ddb597b5a6e7a051b4b4cafee4b030a2a5eb4605dcf0c2c51,2024-09-16T13:26:13.570000
|
||||
CVE-2023-48761,0,1,91316ae0fb08b49a0b2551ee5295fe5c18df501e28e951bb5347525b8eecba40,2024-09-16T13:27:20.777000
|
||||
CVE-2023-48762,0,0,c556b68fe8ab2310589e48858d1e8c8ec3e860850db88920bebbae9829320811,2023-12-20T04:17:13.577000
|
||||
CVE-2023-48763,0,0,2eaa6ccefeda47c42af21fd2245b4a8ea60aedac1d3dbd4a3e87235ba6050cd3,2024-04-24T17:16:50.397000
|
||||
CVE-2023-48764,0,0,32c7260fd7d6515dfdec515e45e192898c95929a26d209476885b4530c8ee324,2023-12-28T17:25:33.493000
|
||||
@ -240046,7 +240046,7 @@ CVE-2023-5977,0,0,4f2206e2eaf1f5fb6eec8067344b53abbfad8cfe8403df3537e0415740cec3
|
||||
CVE-2023-5978,0,0,f408ac44ee354621216f90f423d38c2c659d3ea5a53c9d5f9e74f1e2e716c95e,2023-12-14T10:15:08.727000
|
||||
CVE-2023-5979,0,0,276fad04b5259c4f4586562a88d13821aa63af57a15977d1125f945b1ccbf798,2023-12-08T14:20:45.807000
|
||||
CVE-2023-5980,0,0,f09a305b17ba2313c538eefe0561ffa620cbee16eb9b5c9d3913b696e4720b5c,2024-01-02T20:45:48.277000
|
||||
CVE-2023-5981,0,0,9754c3be0f9b841f0eae2c6ef7420f1191720adafd7aa07d69d0340c4afe31e0,2024-07-08T18:15:04.087000
|
||||
CVE-2023-5981,0,1,78e33f4b8c0edd8ae7e7187ce3119e6fbd1037fb3854ef36ea36b61355633853,2024-09-16T13:15:07.813000
|
||||
CVE-2023-5982,0,0,cb35b7bddfe50fe1b299befc567ac19093e5db6dc3f3cc21a409dbf8cd0e5a17,2023-11-15T15:37:28.153000
|
||||
CVE-2023-5983,0,0,3924fb95341be31a1540cdf30f4f9eae80393248ee37ded1be30e0ec60782b22,2024-08-26T14:15:07.593000
|
||||
CVE-2023-5984,0,0,60e45e796d62f3504f0a18b0567334ea0b7891c7f3d75b9a2af98a59c227b140,2023-12-14T05:15:14
|
||||
@ -241635,7 +241635,7 @@ CVE-2024-0549,0,0,1393f5b8cdc9e327fa6862e01e6396727ca7a0ac5b934bf16bb8c3e769c529
|
||||
CVE-2024-0550,0,0,abc3547a7838ac73f19a1ebe9a4aa732476b85bf08336b5b46a7a52c09f46cf3,2024-02-28T14:06:45.783000
|
||||
CVE-2024-0551,0,0,3bcd8ed6668581b560d620774527cfe0f50a7507d208b9889bb8c1c79dda71a1,2024-02-27T14:19:41.650000
|
||||
CVE-2024-0552,0,0,71e8fa37268dd5cfa7c962f598a1d1195c1e35bb353493449feb13346a0b6d6e,2024-01-23T19:34:05.483000
|
||||
CVE-2024-0553,0,0,77cc1919bac3ab72d4b09a5ba845b3b7c758ed93d081004d36da5498e3a4b9e8,2024-07-08T18:15:06.153000
|
||||
CVE-2024-0553,0,1,f5aaab005c6250bd9169db9bffc1b34f92e8a0059e5e79538fe2daa4eac29ff7,2024-09-16T13:15:08.327000
|
||||
CVE-2024-0554,0,0,be16417315b7a311600e94ec0549779d6adfd1584a8e8952a259fb4e0980804f,2024-01-23T19:37:17.313000
|
||||
CVE-2024-0555,0,0,c8aacb2fdd19da501c6c82ff909d2c5a12900f2d0093adb7af16737ce17fb806,2024-01-23T19:57:48.237000
|
||||
CVE-2024-0556,0,0,3fa34f60dae8364b706de7dc9e47c9ebf00f13a031fee30b193fa3a78664a286,2024-01-23T19:44:47.387000
|
||||
@ -241649,7 +241649,7 @@ CVE-2024-0563,0,0,9ec355fcf8c2bfde63e8cd3b32f6b09899d66d999623867d4585cdbccddf2e
|
||||
CVE-2024-0564,0,0,9f4cf532f2df225cad861ce2ec08ab9ceb4e29633d51c64f31796eb4bcd7e01c,2024-02-08T16:36:48.837000
|
||||
CVE-2024-0565,0,0,ca58e43bc8d960bbfb34d32be78694d44cad238c92c5ee98dbd6b9bf2c483600,2024-09-14T00:15:15.387000
|
||||
CVE-2024-0566,0,0,170da13f521bcbc97fa1d9a0d35b966ca3768bc35f96776689c0b15c2a399254,2024-02-12T17:31:21.670000
|
||||
CVE-2024-0567,0,0,8e48d7a4986aecfa9745b4a32dc9d6e05a5c520ef84f668ab71d6ffe5ab7ff5c,2024-07-08T18:15:06.703000
|
||||
CVE-2024-0567,0,1,2f4df701f3416c48266db1bb8a27d322f4c7f91f5c54f623275f8e06a0796629,2024-09-16T13:15:08.680000
|
||||
CVE-2024-0568,0,0,33eac886ba5b69f80ae385e0dcdb88a2caf2e7add15dda3f9f1cb918faf651d0,2024-02-14T18:04:50.373000
|
||||
CVE-2024-0569,0,0,a95accd00cf0ee074f6751dcd8e432a7e91c717e436d391ea5221ea3ce82042e,2024-06-18T13:21:16.393000
|
||||
CVE-2024-0570,0,0,5b3b3864dfe61724c9374954c01de1e56a444e4219e92c2a04dbcce5169d914d,2024-06-18T13:21:42.383000
|
||||
@ -244748,6 +244748,7 @@ CVE-2024-22395,0,0,0d29784f93066fed6298e77c63a9a7ba15d287ad4907fe05e0ebf699a961f
|
||||
CVE-2024-22396,0,0,a5f00b94b83832b467db4300982cd3b6b686890c80cea01a13cc610352a5b12f,2024-07-03T01:47:17.270000
|
||||
CVE-2024-22397,0,0,a22476279a0935a827e77ac005c3f79785c215cd6755d834d6f6f936f670c7bd,2024-03-14T12:52:09.877000
|
||||
CVE-2024-22398,0,0,ba44b0d25e7b758fa53c63cdc26c43f1429982b9cc2c5eed3635a95b6d6d99db,2024-08-08T22:35:01.020000
|
||||
CVE-2024-22399,1,1,93fce0d6a8e6effca30c0f1f2a075f2ea2cf4196e07062785200a5a05c825ea7,2024-09-16T12:15:02.530000
|
||||
CVE-2024-22400,0,0,a82e5833eed07db4e1d5b948553237fd45742883181539baca74084d8a75ef26,2024-01-26T20:55:37.543000
|
||||
CVE-2024-22401,0,0,d5240a6aa4666ee81a03ffa69aad185ad0ebf9697996427b5aa87a5ad00f95f1,2024-01-26T14:42:35.147000
|
||||
CVE-2024-22402,0,0,86847dbd3139546d75935634479a7b84727e69a7a4ecf53533475274b18a3d48,2024-01-26T14:11:30.677000
|
||||
@ -252923,7 +252924,7 @@ CVE-2024-34118,0,0,def1ef4f0d237934e763e168f4db1b4c3563826c7ed8bb71e24ecd9d8e332
|
||||
CVE-2024-34119,0,0,b18bee7f46141710c36322baeea2f2f79cc2cfb9042e189f93a16a755c8d108c,2024-06-14T20:03:08.293000
|
||||
CVE-2024-3412,0,0,e50c7e3ae6f10b261f3da66fd6437a79038925b3952464be81ac0e7b8712c198,2024-05-29T13:02:09.280000
|
||||
CVE-2024-34120,0,0,59b2d9c769f5e7837181f42b948f1f4d6a71599cbcd1b502e5c0f6b22b12ebe5,2024-06-14T20:02:45.567000
|
||||
CVE-2024-34121,0,1,220da874534eda8c169c4a74cb0f772415521c8587102b4cac8aee70173073d0,2024-09-16T11:55:00.837000
|
||||
CVE-2024-34121,0,0,220da874534eda8c169c4a74cb0f772415521c8587102b4cac8aee70173073d0,2024-09-16T11:55:00.837000
|
||||
CVE-2024-34122,0,0,1f1afdb8bcd7920872d40bc049791e258094ad813a8f738f73973f16e8f185df,2024-07-02T17:44:45.700000
|
||||
CVE-2024-34123,0,0,60f48b7c1a1214b049b9220d35589296122b7174f3f0274e4f9438886e7fb319,2024-07-11T13:06:13.187000
|
||||
CVE-2024-34124,0,0,1560ff2926f27a69ce258f83d62b0151a5e1ff052db9746c4e37b847f7058841,2024-08-19T18:56:27.377000
|
||||
@ -252935,7 +252936,7 @@ CVE-2024-34129,0,0,c47df7ddf934177974799de9912c4e8ae1e6353624749fd9b063535c8cf73
|
||||
CVE-2024-3413,0,0,393490437f33ce616f0a6848540c1c0d3eed8ed2038327f28efd50e305f3828b,2024-05-17T02:39:54.073000
|
||||
CVE-2024-34130,0,0,29b15cda4f7383fc7738011069e5f5981ecee8f8ebe6f1acd48c5ae17439fbe8,2024-08-07T15:15:55.287000
|
||||
CVE-2024-34133,0,0,1d0cb4674576130d312c8e4227b24a269014ebdd373db1a448b4c534b54b4ab3,2024-08-15T16:48:11.847000
|
||||
CVE-2024-34134,0,0,cc85043e22ac4e783334c2aa3c3ef9455dd6c53f65584692f5ad92d2a6a73af2,2024-08-15T16:47:51.770000
|
||||
CVE-2024-34134,0,1,c00e14ff09a1a532234a22030df39434e186d5f6f93a662354b78a0c0f900c7a,2024-09-16T12:15:02.657000
|
||||
CVE-2024-34135,0,0,d677722ae5b9b5415d9ec8d0b13b26302b2ca55ae3189dba56599a49d49f7bbe,2024-08-15T16:47:32.560000
|
||||
CVE-2024-34136,0,0,6e1f4b7666847fc28ff3a6dfc546463d7583d6608cabb72e416825ad66567975,2024-08-15T16:42:26.677000
|
||||
CVE-2024-34137,0,0,df06b600a47c44c9e7b304361dc32b85bdc1c4709323c9b327f9ff904d3d89b9,2024-08-15T16:42:15.847000
|
||||
@ -255125,7 +255126,7 @@ CVE-2024-37282,0,0,9e75dd72782fd47fb8dcc1bf3ef22e08f7f64df6cb16c7858ce8e53d3eddf
|
||||
CVE-2024-37283,0,0,07a52ca714a9a80e3a78bead6f35fc6d30e576ab4ba6daa4bcb81e93f175a210,2024-08-12T13:41:36.517000
|
||||
CVE-2024-37286,0,0,6382030145a65eaac3e6c890da740dca7c4a6af69dff82fb27db89389bebb54f,2024-09-11T20:20:34.503000
|
||||
CVE-2024-37287,0,0,a9d3453fb1c9fe3cd5af0cb7ff0109d98a345ff76f4539de093f05db9c477ffa,2024-08-22T13:33:12.477000
|
||||
CVE-2024-37288,0,0,701438bf3e876863ab8d14a84c5212af597e532c0122bc200a49c82a712de609,2024-09-09T13:03:38.303000
|
||||
CVE-2024-37288,0,1,665135dee06da174ac43bb1366ac01932e76fc67d054a27a8125a1a355fb458d,2024-09-16T13:29:06.023000
|
||||
CVE-2024-37289,0,0,2976747a57097020fbcd1f162347209565208622cbfbb8b77b0b7237b06e86b8,2024-07-03T02:04:12.080000
|
||||
CVE-2024-3729,0,0,3415ccd7b93278c163a46fc8f742b8dd4fa5f770790b8aa49be2a2c1ba3b0c85,2024-05-02T18:00:37.360000
|
||||
CVE-2024-37293,0,0,b38c9bef2ce8854b8f0a9c288c7acec55e60fa5af9100539279c24f2cbecf35c,2024-08-16T16:11:53.287000
|
||||
@ -256110,9 +256111,9 @@ CVE-2024-38635,0,0,82c05d5461024536a7eca544742658a15aca67670d5473d3ab28fcdf85287
|
||||
CVE-2024-38636,0,0,39fe2743512ad3bce5f80041cae8719a346f16bdf419751542e29e8318105523,2024-06-21T11:22:01.687000
|
||||
CVE-2024-38637,0,0,73dfe838ab3a4a3bdef26c72205f7e2908e62b38c42443b0d3887f952bc61af5,2024-07-15T07:15:14.093000
|
||||
CVE-2024-3864,0,0,c7c600ab2d47995fde4727e677425dc294b0dc7019ce4f56ba3ea3d46f02c40c,2024-08-12T17:35:09.733000
|
||||
CVE-2024-38640,0,0,c4ef7addb9f3c39e8de07ef7e2e0a1b66a7f8447f6d5cadc60e1e78ce48d2aec,2024-09-09T13:03:38.303000
|
||||
CVE-2024-38641,0,0,616d87a02823e379f25d6175068bccbf4fb841543b5f77c5f07ba2d73ccbf5f3,2024-09-09T13:03:38.303000
|
||||
CVE-2024-38642,0,0,365231ea306e59897242fcd3e6bee34bf7b356a7c2e9441e835721d6b579b6b0,2024-09-09T13:03:38.303000
|
||||
CVE-2024-38640,0,1,f894436174ccc1cc2e08bbc67fcba0414dc6b13ebdf107dda01c02078b396724,2024-09-16T12:27:22.747000
|
||||
CVE-2024-38641,0,1,8a7b88c9ff752db6c85379c2610078ab5ea82aa0cd968ba97ac893cb265a7390,2024-09-16T12:35:23.713000
|
||||
CVE-2024-38642,0,1,f8d0ecee472de6a33388f4e82db0802ffe48c291af3b4f5b7db26d6f668db8b3,2024-09-16T12:33:13.277000
|
||||
CVE-2024-3865,0,0,08b246bd9fb312136589a057fec6244b70e79a37ab7aa9f79462f36bc0eb0f7e,2024-09-06T22:35:02.500000
|
||||
CVE-2024-38650,0,0,e891d7d85d4336a7a5f2f3e8d37d84cd0e110d202a93897593f57a29fc51a95c,2024-09-09T14:35:02.103000
|
||||
CVE-2024-38651,0,0,47715d6cb9c5ed15acd60ba1960b4a6147a111543bd71aaba5ad096adf7a37d8,2024-09-09T17:35:02.663000
|
||||
@ -256485,16 +256486,16 @@ CVE-2024-39373,0,0,4d8c0982e7cdb1147cca590a3a2ae7c9ffdce8617464f62ef5a2a6f5e5074
|
||||
CVE-2024-39374,0,0,ad17efc6aa67e7b26f65d3189d2658b2488a44464309406f364c5bd8e73d4193,2024-06-27T17:11:52.390000
|
||||
CVE-2024-39375,0,0,63cd2388720af3df4268f688ad707fe003b641c7c19fcda0eb4bc47c67645098,2024-06-27T17:11:52.390000
|
||||
CVE-2024-39376,0,0,c5700ded29923bb8323d7f97de6c0ff12124e48d1fd05b5e64b815253ca12a53,2024-06-27T17:11:52.390000
|
||||
CVE-2024-39377,0,1,d4093cc8449ac626af4e28129374a68e222c3073f7317d50d080ec3d09ca6cf2,2024-09-16T10:30:03.333000
|
||||
CVE-2024-39377,0,0,d4093cc8449ac626af4e28129374a68e222c3073f7317d50d080ec3d09ca6cf2,2024-09-16T10:30:03.333000
|
||||
CVE-2024-39378,0,0,3b61d992513510d880f3841406cf286a1cca8ad174b6153ccc78fa173926cd3a,2024-09-11T16:26:11.920000
|
||||
CVE-2024-39379,0,0,254a12bd73909f0be093719c5b38b4eaf337f7e58beca38b827a09c853e5a892,2024-09-11T15:52:47.053000
|
||||
CVE-2024-39379,0,1,65a229a7fb72dfe0e8ba40eff3f97a8fa1b1131d67038b157cf08f97d8d0be43,2024-09-16T12:15:02.870000
|
||||
CVE-2024-3938,0,0,9f6aecdfa53fe6eb1c4aca56683969fdb193b03c1b9229add1400e00af205f88,2024-08-13T14:09:14.087000
|
||||
CVE-2024-39380,0,0,1910572fe42c7147873be8861011fe1658b3f4e08e9e17ecea7358ec80d109ff,2024-09-13T16:55:04.930000
|
||||
CVE-2024-39381,0,0,c446a0a3cf348c0d4a05fe80309ddc5c180ba4a1c6f9ab0dd7c079d8ea253d78,2024-09-13T16:54:39.217000
|
||||
CVE-2024-39382,0,0,57bb6f41c6b41dc159da36294ebbfbc63b1c8a8affc6c123c8c58660d2dd02ed,2024-09-13T16:54:20.397000
|
||||
CVE-2024-39383,0,0,b6e4f5fe53d1ceea626b9028f302c2f5678be6f17f3d7aec3036ac534781eb21,2024-08-20T19:26:34.947000
|
||||
CVE-2024-39384,0,0,79de383033ea4c00d643aa3fd03acc3149bd29b984e4061b88dfc796f6f105e4,2024-09-13T14:06:04.777000
|
||||
CVE-2024-39385,0,0,425cb7786da387dae561bfbfcf8aa40c4adc5322e012f383fcc7df4b001561c2,2024-09-13T14:06:04.777000
|
||||
CVE-2024-39384,0,1,126aaf90b35785ffe9d5053a21f7e6ace1cdd40b8114bcfd84638ff5759b9423,2024-09-16T13:01:07.037000
|
||||
CVE-2024-39385,0,1,39ef5ae4eac69cb9c2fc0d6a7fa2ae80b0d018bd3aaa2cde0bee65aa023a5db9,2024-09-16T13:12:45.600000
|
||||
CVE-2024-39386,0,0,b798786f71e8e8f0735f5ce39eeb2c50d842aae88e8a43200f637f6dd2b6b086,2024-08-19T18:53:49.387000
|
||||
CVE-2024-39387,0,0,89b66bc618bdec29880956f86ab320532050f7e569b27da862dd99b48956ab03,2024-08-19T18:53:28.930000
|
||||
CVE-2024-39388,0,0,8d23a39b2d5c7f24e6d2ce074d1291f49a0b80796f8d0f1605cbbd1187360b13,2024-08-19T16:23:28.353000
|
||||
@ -256517,14 +256518,14 @@ CVE-2024-39402,0,0,8f9792ca39ac0f5735d2d339471513a0d0066ed8186936bed3b6cb6fc80ab
|
||||
CVE-2024-39403,0,0,07e4d8e2e8e77f045e47a14368527780bd5cf232eacf57cf163f25b08d6cbab6,2024-08-14T14:45:31.187000
|
||||
CVE-2024-39404,0,0,0a57924699a1991f76f1f50910f14cbebc966dfeaddc9ac00c410fa553a973bd,2024-08-14T14:44:35.470000
|
||||
CVE-2024-39405,0,0,eca7af29b059ce089e741bc6a4c7a853c086cfad9296c28a6d43dd725f7e44bb,2024-08-14T14:44:17.217000
|
||||
CVE-2024-39406,0,0,c2da45b618d21bc0614955b3705d2a2e70c973412cc2ce181ce9b808a721e810,2024-08-14T14:43:58.617000
|
||||
CVE-2024-39406,0,1,25d04b0f853cf383417a927f1df57bb53469f9bc9deb7d3dea31cd7c4b9bef49,2024-09-16T12:15:03.080000
|
||||
CVE-2024-39407,0,0,a04cbb78d44437ccd0b191c3d3b80ebe08944fb4ba6ecee4b56aa111da23fcee,2024-08-14T14:42:50.467000
|
||||
CVE-2024-39408,0,0,5c655a53d14bbe9c2face14c81071a8ce2990c5928fcbcbe0ce28af902aef32d,2024-08-14T14:42:31.313000
|
||||
CVE-2024-39409,0,0,a57451b3b50464a3ac4f18f380f7aaa18e3d7bb9de921c95b59349cc8ac45f76,2024-08-14T14:42:10.687000
|
||||
CVE-2024-39408,0,1,78ac02ebc7a31d73c30bb0b0fdb3565c4c03fb335f3337c1996a68797a39d9bb,2024-09-16T13:15:09.133000
|
||||
CVE-2024-39409,0,1,c94c20a181dda97d1ec8c605dd5d9d484beb306fe41b366d7c33da38095ea491,2024-09-16T13:15:09.387000
|
||||
CVE-2024-3941,0,0,35d6089b62c06226c8a1fbb42f6b4f7549cfd9ebea65fdddb79305777fa7b160,2024-05-14T16:11:39.510000
|
||||
CVE-2024-39410,0,0,6777f15fb5fccbb406ad43c313bafcaa9e88f44e59ed0882a921fbc567856dbe,2024-08-14T14:41:36.527000
|
||||
CVE-2024-39410,0,1,80d8ff5a50f6536ea45b9c6d8909a33772be394437655373822bc6801ca5774a,2024-09-16T13:15:09.557000
|
||||
CVE-2024-39411,0,0,1272b538409151f4f62bcba24a09806ce4b7e124f6e1ad5512b378725548cd2c,2024-08-14T14:40:55.510000
|
||||
CVE-2024-39412,0,0,d06dfbaac9279386c5900dfd5be1d77e38a9088677fe9ca9a805d062593a2a4f,2024-08-14T14:45:35.393000
|
||||
CVE-2024-39412,0,1,2d8f844692ee592a9c89a505d8cfc64b3d2eefd95e162394536ffc1d73e487cd,2024-09-16T13:15:09.840000
|
||||
CVE-2024-39413,0,0,4a894151c2ac93955d773bf053f53d0a6272124b1d199025eed7c821185013ca,2024-08-14T14:39:39.737000
|
||||
CVE-2024-39414,0,0,a4bb8c6b936f8f3de2a8e0d95754370d5eb00e62f1de95bf54a93c835f112913,2024-08-14T14:39:26.427000
|
||||
CVE-2024-39415,0,0,894bb113716af642843f4f18ce95fb8548231a5b76d859c1eef366fbd2f5e3ce,2024-08-14T14:34:26.620000
|
||||
@ -256533,7 +256534,7 @@ CVE-2024-39417,0,0,0219fe7231643f85bd1a095fa4e5b3701dd95a7c34961f2e44e04d860e06e
|
||||
CVE-2024-39418,0,0,820594d43ba6e648c74185b3a3f3884cde9c1939f1e21dddbdc9b976f0550b97,2024-08-14T14:32:59.893000
|
||||
CVE-2024-39419,0,0,91ffb997b311a697ccfc1be20f20cf74e921e2bccb596cd4c51ef6ce14f52e39,2024-08-14T14:25:31.337000
|
||||
CVE-2024-3942,0,0,b71832d6733f7f5db02eb3f159a58495ac978b495e9bfda57b6845f95312f30a,2024-05-02T18:00:37.360000
|
||||
CVE-2024-39420,0,0,5ce70dc4f0ef4fa603a073bf6b5cc4fa9ad5bd15c02b670fc31294b1f926bad8,2024-09-13T09:15:08.297000
|
||||
CVE-2024-39420,0,1,8a25c10f0043ed9ed91c80d0ca709c9afad136cf979fa98089f62d0910fe0ed1,2024-09-16T13:15:09.977000
|
||||
CVE-2024-39422,0,0,5735bb4ff902bfe6b8a2987e99f52b473438750762eed69fca82d27ac307a139,2024-08-15T17:25:54.750000
|
||||
CVE-2024-39423,0,0,8c72be80e3c85b684216aef96277fce75a9c2e2c566be73887f1212d11fae6b3,2024-08-15T17:25:41.800000
|
||||
CVE-2024-39424,0,0,243efb9cc10bea0f29adc08971658a5e72c18bfec9a9b14b5a01df0b19c33e3f,2024-08-15T17:25:25.787000
|
||||
@ -257035,7 +257036,7 @@ CVE-2024-40474,0,0,608fb1da7112466987ad716b155df271639c9ca00e9a1670f54e4e537b829
|
||||
CVE-2024-40475,0,0,6162a5c8d3daa8216ee02133ff4675036e80bfee4a81755e45213e41dccbebda,2024-08-15T13:40:54.810000
|
||||
CVE-2024-40476,0,0,f9287e4de79741df61fb3063574b5ffbc3a40e7aba2a9ae7b1c9a4ed2d244203,2024-08-15T13:43:32.047000
|
||||
CVE-2024-40477,0,0,6cb0cc10c37b24482c4bb193827b5d7d3a2113c4464b073473336af2956aa387,2024-08-13T01:13:46.877000
|
||||
CVE-2024-40478,0,0,2684adf1a5a4dba5423bd04a16b03753b6bc02f74f72b365898fbf6dfc69e6a3,2024-08-12T13:41:36.517000
|
||||
CVE-2024-40478,0,1,54a453f97c6355966feebeaf1afb013583b5f0faef22df3e230ba2cd8c227fd7,2024-09-16T13:46:40.287000
|
||||
CVE-2024-40479,0,0,c5bec1df57db16e609d1623e6517bb40c5b937de6b2390aae79ad47c0b80430a,2024-08-13T01:13:47.860000
|
||||
CVE-2024-40480,0,0,e7a951452f0ffeb9495f3973bc193ff807eb0f9c1dd8fd2ead8c62923fcd7549,2024-08-21T21:35:08.270000
|
||||
CVE-2024-40481,0,0,4827ebaf038f9227afaa10ae59d01fa6610f2bcdbbe677b5840a09b2a19855a4,2024-08-15T13:58:16.033000
|
||||
@ -257827,7 +257828,7 @@ CVE-2024-41833,0,0,85fc1d4f81094922dce51fd479c7b435396bc7c4f95057b5b31db4afd23d3
|
||||
CVE-2024-41834,0,0,13eed51b4e049020c7f638e068eae53ccda0a6881cd4fb5749936291f43eb8d6,2024-08-15T17:13:25.090000
|
||||
CVE-2024-41835,0,0,79c86df6665f091ccf38637e3904931e0a79e20c4f60784272f388a048f561fd,2024-08-15T17:13:11.837000
|
||||
CVE-2024-41836,0,0,447eeb0d32c0b3fbb708b5b9d75636c09225896b7443055b6e14477ceb9e8a2d,2024-07-24T12:55:13.223000
|
||||
CVE-2024-41839,0,0,5ef460cfd4cab1da61d6ea06c2a0157d7dd82f5004a20224cb3c7be32bb81d0c,2024-09-12T15:58:11.690000
|
||||
CVE-2024-41839,0,1,9a0f787d6e23b303277da94f6b7fca243c6839137dcfdc0b22d503addf44ffe6,2024-09-16T13:15:10.250000
|
||||
CVE-2024-41840,0,0,3f28aebde978cc1f8839cc676dd62bb75d63b90fe1295e0e4ccf51b0e1e39f51,2024-08-19T18:54:02.200000
|
||||
CVE-2024-41841,0,0,b3d7229e1df9655b819c6cdfc619b24790032230acf9c060fa1958fc581d2315,2024-08-26T14:08:05.547000
|
||||
CVE-2024-41842,0,0,081439e1e1c0c36fa35dfc90cd7c1dab0afb799471eb093958cbeb73afdd7760,2024-08-26T14:08:17.263000
|
||||
@ -257845,7 +257846,7 @@ CVE-2024-41852,0,0,b9853968fe67e2c5233e8ca2738b3048de51d482a522c2258b22dc0aff703
|
||||
CVE-2024-41853,0,0,d0e1d87efca688bf44c8dd7769e57548e5c5327e51e643a477df14e3576a000e,2024-08-19T18:42:21.327000
|
||||
CVE-2024-41854,0,0,08cc90ea0adadfa96a276aa03d11f4fc06ec99cae9172cd871fbd7355b111a09,2024-08-19T18:43:34.970000
|
||||
CVE-2024-41856,0,0,3ada3c844b80f59e9ae3d36b6d9ea2fc582aae7cd70642ad9bb38d1ef0f68cd7,2024-09-13T09:15:08.907000
|
||||
CVE-2024-41857,0,0,50f055e4d322cca7cfcdc03163d34be18b0ce9dbd4f99daaba587938d81ba13c,2024-09-13T14:06:04.777000
|
||||
CVE-2024-41857,0,1,18eb26e544512ac7a85d3a84aabcc5c6bdc719da2402fd3705a1c91e30e01499,2024-09-16T13:18:35.007000
|
||||
CVE-2024-41858,0,0,fc4155e173605a091bf114883179b8d0604e870052e7a0c7c1f11f2b340c3a75,2024-08-14T13:00:37.107000
|
||||
CVE-2024-41859,0,0,53bf4aeb143d9af2209be69a1a50fd4315b77e19bdf2dd5873464dd453800711,2024-09-13T16:53:51.707000
|
||||
CVE-2024-4186,0,0,c07cd0df6ca0a9d2dc3c3ba29e1f05004c0a2ac49601b699a13f07e112f9c5ca,2024-05-07T13:39:32.710000
|
||||
@ -257856,14 +257857,14 @@ CVE-2024-41863,0,0,5218352b95081c6795db623527af60036ab1b1d152dab66fc1f92aa7277f6
|
||||
CVE-2024-41864,0,0,59e830b96a597bc93dcda9cbef385e1fdf95773045c5f29bc0bb9381e7cb3adf,2024-08-14T18:20:36.710000
|
||||
CVE-2024-41865,0,0,f8ad10055028d3dfea657c3bbd8eb5b04fbd0fb8a1dcfeb71cfad07c3751149a,2024-08-19T18:44:04.163000
|
||||
CVE-2024-41866,0,0,b06a8427315afa6008377ed5627aeeeb7bf41e3428063742d7f1fa0c27e9a784,2024-08-19T18:44:22.577000
|
||||
CVE-2024-41867,0,0,f66ef4670fa55fe5c88354a43f0c4bac51e4738062289411b59c2f57cb9b1528,2024-09-13T17:27:00.437000
|
||||
CVE-2024-41867,0,1,0b44a5cfeee3dcc50283505e9313394317205be34bd484508e6768cab06aa764,2024-09-16T13:15:10.550000
|
||||
CVE-2024-41868,0,0,9ed35570b699495dabec3e139e5a3960675f66b313ebafc76293b6d08d7965ae,2024-09-11T16:26:11.920000
|
||||
CVE-2024-41869,0,0,2f407549a1d394a9da8aa6ea98d54c4d268ef6c6e721f436fdcf391b141a4e5a,2024-09-13T14:06:04.777000
|
||||
CVE-2024-4187,0,0,59e73639acf686e0c0fe315911f8a7728baeee66452eb3299dce70437688c22e,2024-08-15T14:45:27.797000
|
||||
CVE-2024-41870,0,1,9b01b7c9f042396dbf79af8b93d8f9ed4d9baaa67ad3cdd01d33224e4d103bd0,2024-09-16T10:32:09.480000
|
||||
CVE-2024-41871,0,1,7361edfbeb22d7d7bfa64e2688ed95b91ddb91f2fd10757bd1ecd4129da42acc,2024-09-16T10:36:14.100000
|
||||
CVE-2024-41872,0,1,77099e47a59b44ad290d9682c16a32daf086e620d05bcdd0df2711e12d10f852,2024-09-16T11:16:26.797000
|
||||
CVE-2024-41873,0,1,797c0bdca82ee40430bea16521a62514c45c70fc9a1070a7b9e0bce9bba32d6f,2024-09-16T11:39:40.703000
|
||||
CVE-2024-41870,0,0,9b01b7c9f042396dbf79af8b93d8f9ed4d9baaa67ad3cdd01d33224e4d103bd0,2024-09-16T10:32:09.480000
|
||||
CVE-2024-41871,0,0,7361edfbeb22d7d7bfa64e2688ed95b91ddb91f2fd10757bd1ecd4129da42acc,2024-09-16T10:36:14.100000
|
||||
CVE-2024-41872,0,0,77099e47a59b44ad290d9682c16a32daf086e620d05bcdd0df2711e12d10f852,2024-09-16T11:16:26.797000
|
||||
CVE-2024-41873,0,0,797c0bdca82ee40430bea16521a62514c45c70fc9a1070a7b9e0bce9bba32d6f,2024-09-16T11:39:40.703000
|
||||
CVE-2024-41874,0,0,7360dfce3507425046ff4011455f7487f7517d5dd77ae435f5a0fd61261fb9e1,2024-09-13T16:57:52.437000
|
||||
CVE-2024-41875,0,0,57025102705afb3f64ed9ca037e457d95a3751eb418da98d63205817feaa131c,2024-08-27T14:45:28.927000
|
||||
CVE-2024-41876,0,0,2e90360efc316da37d37f6761f555864c070f8e4b10b19f1a9af1a905273c5a3,2024-08-27T14:45:40.377000
|
||||
@ -258052,7 +258053,7 @@ CVE-2024-42119,0,0,3b09a70cb81c3688ecf4ef2c0b41ada572909d540512a1efd4ff9fade8603
|
||||
CVE-2024-4212,0,0,5766e7a6d4fbc74d070c835b010281385271ca336cbd1f30b8212e7da6caf8b5,2024-07-24T20:24:31.537000
|
||||
CVE-2024-42120,0,0,692318adb3e3bc8ee3327c58f85ce2f0a478d2c89b683bc854fcb9227f9c337f,2024-07-30T13:32:45.943000
|
||||
CVE-2024-42121,0,0,c5e25bbf3c91bf25bcaa878ff72039e7afac3b1d4b647d19649fd2a0460d64a7,2024-07-30T13:32:45.943000
|
||||
CVE-2024-42122,0,0,07636c6d018c43330638e040c69e6c928d01b67ef1109981b11b4f603ab119b9,2024-07-30T13:32:45.943000
|
||||
CVE-2024-42122,0,1,f1aff74be0c8f2add47447c4fc3e19fab36b7330d7c3102774809c41ed96d349,2024-09-16T13:49:27.837000
|
||||
CVE-2024-42123,0,0,b9b512a4ac6ec22c9bc1d525d88b6db6a1f01966b278ee4c7ad03b69a5e85a9c,2024-08-23T14:13:05.580000
|
||||
CVE-2024-42124,0,0,fac73a1c1853cbd61b92ef3a19f9f7f6792c7fb13275a38cdccfee119802151b,2024-07-30T13:32:45.943000
|
||||
CVE-2024-42125,0,0,623dede6e7a867ee2a4793db37771abbdecba1b4f67d59179866a3aa7e89529c,2024-07-30T13:32:45.943000
|
||||
@ -258062,12 +258063,12 @@ CVE-2024-42128,0,0,b8155b78412ff52ea13f2f9c045e69435a1427918f79cc2d9ffa4f93326cb
|
||||
CVE-2024-42129,0,0,46d5c1746954fb4a02665ba978862f55732f5e2a31e0452c7452c5970d864bc8,2024-07-30T13:32:45.943000
|
||||
CVE-2024-4213,0,0,4af0c7bd943d1e93f39eb470b6c791f96149e0a985dfe97529e29ee085d7cdf1,2024-05-14T16:11:39.510000
|
||||
CVE-2024-42130,0,0,c0bf8d6705687d288b22cfe1365e7dce03a7394108689b183e481d0372b856b1,2024-07-30T13:32:45.943000
|
||||
CVE-2024-42131,0,0,01e3726ef1b21b8b7d22eb92e75ca9e3ebe0d946e89880751112b47c2546aec8,2024-08-19T05:15:06.990000
|
||||
CVE-2024-42131,0,1,1fc726640575e0811e1b3c041d4cb29883ebb3d10c99e884209ec11d92467b7b,2024-09-16T13:52:37.707000
|
||||
CVE-2024-42132,0,0,2f4d4ac80a7ca69cb3eacfe6d114a16e8e41ad14f4a3bea559c41eac32d31205,2024-07-30T13:32:45.943000
|
||||
CVE-2024-42133,0,0,774a28cde62878f7ee006cd2f913f8ca89836e6fe0716586b68a30db7f392c96,2024-07-30T13:32:45.943000
|
||||
CVE-2024-42134,0,0,b964a563fe31ebeed4bd473713e48eeb088a769f2eb83d9ee50ca797235dadc8,2024-07-30T13:32:45.943000
|
||||
CVE-2024-42135,0,0,95535ff1104be73e170d22a3b1160f93b97e02e7d284b345a7500b690d2a22b4,2024-07-30T13:32:45.943000
|
||||
CVE-2024-42136,0,0,490319a19d52e68dfbc14d6cd4c94243577e7db594ab1c07d087e7f01f243dfe,2024-07-30T13:32:45.943000
|
||||
CVE-2024-42136,0,1,f68874d27ec595bdafb89782162fb7e74f20ba1d0a36e1946b5c43cc39f8ab55,2024-09-16T13:54:41.923000
|
||||
CVE-2024-42137,0,0,3c90bc025787395b043ed09b34a54ce76c5d6cccd91ce31c0b66777180d70155,2024-07-30T13:32:45.943000
|
||||
CVE-2024-42138,0,0,66bd3f3c0b6409d31b381c30c4907ff7a898b21b08eef89ddd720c05b185a24c,2024-07-30T13:32:45.943000
|
||||
CVE-2024-42139,0,0,3bd10747b9eb55753638e6583d2c7f6f99447a69b235be4a494e06bae42b0e90,2024-07-30T13:32:45.943000
|
||||
@ -259283,7 +259284,7 @@ CVE-2024-44794,0,0,b452ddd5effb0ee34a112c584a56cc4850657b4ae996abe5b559863a6d239
|
||||
CVE-2024-44795,0,0,2459dd83721718e1502976fd61ac15b289981ba6005e92e7c41d33d2e6b740f8,2024-09-05T18:26:41.490000
|
||||
CVE-2024-44796,0,0,2932c57e25f9e35c74ce36b128d46acb3231e7bd610d9d98769e690ee695d3eb,2024-09-06T23:35:04.340000
|
||||
CVE-2024-44797,0,0,045624a726ff5e1b8db30d7af17e11b2221f6b7d4bdca61ca2fe7511b3f6e808,2024-09-06T22:27:16.177000
|
||||
CVE-2024-44798,0,0,daeca766d0d39cbca86ef2c14287a406cb8774d27ebcaf0d8177010b915f67dd,2024-09-13T18:35:16.920000
|
||||
CVE-2024-44798,0,1,52c8ec12ad71f918e4568fe73d09fd21beb43d7a2334844f4fb68f12913c2757,2024-09-16T13:19:38.393000
|
||||
CVE-2024-4480,0,0,046ee1f51773a8c0ac4a6c81ddd78c147b0ada165d730df7b9b8d85146172347,2024-06-17T12:42:04.623000
|
||||
CVE-2024-44808,0,0,53ee5f88da9d15aa3ffd696fc5703153aab92dbb219aaccde4dc48186abdbb68,2024-09-05T12:53:21.110000
|
||||
CVE-2024-44809,0,0,424c650381a963ac60378eaa5a7cd36fd86829e33f994f3d0227dc416ec44e82,2024-09-04T14:35:12.707000
|
||||
@ -259399,7 +259400,7 @@ CVE-2024-44992,0,0,97ef2dd55e50d283d25cb375a53b1b9e4ced48005c60f251c68cb5bcbe063
|
||||
CVE-2024-44993,0,0,83c20e8055b5f920fb8768cd48edd51dee49d28189ff000654e3b9aceca5b744,2024-09-06T16:28:49.180000
|
||||
CVE-2024-44994,0,0,077657e93a1c5153a567e0a622109d3f9d5a912137e3785d416b4a628cffcce8,2024-09-05T12:53:21.110000
|
||||
CVE-2024-44995,0,0,197459857248206995b34d4054170be94eac94a6c36641a79619b26d39e0858c,2024-09-15T18:15:34.540000
|
||||
CVE-2024-44996,0,0,07d1c2049feb8c8cdddcc77bbee2292d52cbb73558d4653632cabd30f6011a65,2024-09-05T12:53:21.110000
|
||||
CVE-2024-44996,0,1,e18967c4ab698ef45683375a8ae0d2c16fa28828098e111c232677530888b1a3,2024-09-16T12:21:47.370000
|
||||
CVE-2024-44997,0,0,e3f86ed864785c36fda99f43974c4da9bece309546ba3123a45070f74f032602,2024-09-06T16:28:25.183000
|
||||
CVE-2024-44998,0,0,40b25cb37bb885401e69911af67b231d0343f60d965743732a0c70cf3b146611,2024-09-06T16:28:16
|
||||
CVE-2024-44999,0,0,e380bf728dfa26ece10d7874c8b05bc3764e80af89ddf0e41877fbdc49e455a1,2024-09-06T16:27:51.890000
|
||||
@ -259525,7 +259526,7 @@ CVE-2024-45193,0,0,aad683d38855495998b9aca0a814babde19e695a0d6614e90cdeda08f7f96
|
||||
CVE-2024-45195,0,0,6ffd475ceaf8128f565ed8b5cb0ab8e8ef23a6c0d5b146527899f5211dfb9259,2024-09-06T15:35:05.483000
|
||||
CVE-2024-4520,0,0,b2949348c863aeabf77cf8262dadc8a1301ac645ed88723ebde503df8cb28e51,2024-06-11T17:02:16.967000
|
||||
CVE-2024-45201,0,0,83db05d7484ca5c2638e18e64e3b5c06d28a9caaae332ad6d01f844ea902b04a,2024-08-23T16:18:28.547000
|
||||
CVE-2024-45203,0,0,109f51a011fa1642da43dbaccac6517b52cbe9844a1fb856b301f3307c30db96,2024-09-09T13:03:38.303000
|
||||
CVE-2024-45203,0,1,0a34ec3cf21e7526a71f11433fb5593e3ea52ee9638fd0c30ca94a57eb961782,2024-09-16T13:27:19.190000
|
||||
CVE-2024-4521,0,0,a1d240438f25322e21494c2ddd2f5ee26b23410f012534bc2c27a0a49b09a860,2024-06-04T19:20:41.223000
|
||||
CVE-2024-4522,0,0,acd0b6b231758473c48ed22daa75c2f0d87280406667aa3ced0f39aaa73cb777,2024-06-04T19:20:41.320000
|
||||
CVE-2024-4523,0,0,e149ff229bd41b5a453469b36d558b5c1f467161b85c2884a74fe2177217c73a,2024-06-04T19:20:41.420000
|
||||
@ -259803,9 +259804,11 @@ CVE-2024-4639,0,0,94440a0f589feefd6793182562f7b7ad1826370c3af8edc8bb387cc054e890
|
||||
CVE-2024-4640,0,0,ede9dd193cee950797dd9845264350c5c8b26092d45c659f033f0e3467a4741b,2024-06-25T12:24:17.873000
|
||||
CVE-2024-4641,0,0,26f5ee90dac1a00dab85ac22bc0a097907866fe1e7f2d9d37bb83633d14c8f26,2024-06-25T12:24:17.873000
|
||||
CVE-2024-4642,0,0,feffee00bc573269c6a6673aa02a71420853934841cc7ed393cab7b6bdc385e1,2024-05-20T17:15:09.667000
|
||||
CVE-2024-46424,1,1,907ef71c5244e7673fae5edc0d546987dcfb708da5efe075f853d18a45970811,2024-09-16T13:15:10.760000
|
||||
CVE-2024-4643,0,0,e0d3f81442e9e4f0746a278d66a7c607383f7f5939cd80bfd5eea7a68cf6b0a2,2024-08-02T12:59:43.990000
|
||||
CVE-2024-4644,0,0,d1e68c64f589f5437d8d9c3d73ea2c78a66dff558140ffcb6e63a6c5713f6378,2024-06-04T19:20:44.287000
|
||||
CVE-2024-4645,0,0,168f1477081561f078c10d8fc1cf3cc1223bff538993570e41562bd0f1dfcc62,2024-05-29T20:15:13.240000
|
||||
CVE-2024-46451,1,1,69fcf155081fec84c2cb791f98ea5b6a7a26f93aa2823ae554f1daf912c3b8d1,2024-09-16T13:15:10.847000
|
||||
CVE-2024-4646,0,0,368f6c8b75aa07d035e1b1b12d3ee4faeb304323401bbcc5aa2596217dc42f5b,2024-06-04T19:20:44.390000
|
||||
CVE-2024-4647,0,0,abfff49b4d0bc1323cd8c136d2663c14e45b73cbc22df4c684f6d02301cae0cc,2024-06-04T19:20:44.487000
|
||||
CVE-2024-4648,0,0,911dfdcd448576dec5371ac5fe5f3ab9d434d7a73d2296063b028e9785e0deda,2024-06-04T19:20:44.580000
|
||||
@ -259890,6 +259893,7 @@ CVE-2024-4688,0,0,52289ed8c0286442cd44c00a18386eec964a66f3ff263d13f6b3a47ad78257
|
||||
CVE-2024-4689,0,0,a13cc88d2e9b12d452cf9b42ce57cc1735d851f3f551a07c40e7bb0f2ee113b8,2024-05-14T16:11:39.510000
|
||||
CVE-2024-46918,0,0,c81638d5ca63c19490f644512349dd49baf06add9619db431c68631e601d23e2,2024-09-15T20:15:02.390000
|
||||
CVE-2024-4693,0,0,e3d9266511ed640ea0a2750bbbe8d9b8b25eda5f77b693324e75ee95f4a7a307,2024-05-14T16:11:39.510000
|
||||
CVE-2024-46937,1,1,f786d5e6cfd5a802574fdc6689e931ed489fd73bd9627aef4e1a74ed889f1ecb,2024-09-16T13:15:10.917000
|
||||
CVE-2024-46938,0,0,a5c9e90ab7d92d7718c097193345a29e65c16e9e9d7ee02386aee1371e9ab85a,2024-09-15T22:15:09.830000
|
||||
CVE-2024-46942,0,0,6b93d00b6dfeb694fcbe84011b71090f470c3492de64daa71f84a4174e08c3a6,2024-09-15T23:15:11.033000
|
||||
CVE-2024-46943,0,0,6c5e76688d51eaeb0396635653b39855a3726df8877ff6ebb136df51868058d7,2024-09-15T23:15:11.100000
|
||||
@ -259897,7 +259901,7 @@ CVE-2024-4695,0,0,aa253f1bdce79ef626aa7622c4e367006f6b60359a6a2b0af989b23a6e81f9
|
||||
CVE-2024-46958,0,0,5bb8b70f9a3b2dac1a28577291e993242e94ab2fc386c8a78850212ad85cb736,2024-09-16T02:15:01.803000
|
||||
CVE-2024-4696,0,0,b8ce6d89da084f88972905e9878372f109e48889eae7d9f95b30ecbbc63816ed,2024-06-17T12:43:31.090000
|
||||
CVE-2024-4697,0,0,3bc62a9bb9952d026af8ecd13a98f81fa60290945109a2f6023ef384956822fe,2024-06-04T16:57:41.053000
|
||||
CVE-2024-46970,1,1,2a93e963cca84374e55ab3a313f44cb6c17fec19660891300ea157f8ba006f3c,2024-09-16T11:15:13.540000
|
||||
CVE-2024-46970,0,0,2a93e963cca84374e55ab3a313f44cb6c17fec19660891300ea157f8ba006f3c,2024-09-16T11:15:13.540000
|
||||
CVE-2024-4698,0,0,9dba1ffb097faf0537551ac7612916f547965c7b253baf1637388ba1ee83ae86,2024-05-20T13:00:34.807000
|
||||
CVE-2024-4699,0,0,094a3293d1ad6c00b8f42deb1643b829befd633ab0dcef49a183da331debaad7,2024-08-06T19:15:57.580000
|
||||
CVE-2024-4700,0,0,fa1a582bbd6e4a675ead2d89728236d2ca7c92c15fe998cffa14cb24a4febb9d,2024-05-21T12:37:59.687000
|
||||
@ -261022,9 +261026,9 @@ CVE-2024-5983,0,0,e453627058811c95a94483155fc84de41a398cc957b204d5491729f060f018
|
||||
CVE-2024-5984,0,0,89f42ffe1afdcb4773f46da639d99adec4fd2f40289999f555344358fcd06ab2,2024-07-24T02:37:30.717000
|
||||
CVE-2024-5985,0,0,4b7f0c13c1d049ea5b2816f8e8132ec8aee9a2fb74d5d00bf96c05e553a08b22,2024-07-24T02:34:43.900000
|
||||
CVE-2024-5987,0,0,80b95041335e9c6c0cba79b97b2237a77b412b6b9e4ce7d678d97adc1c3af521,2024-08-29T13:25:27.537000
|
||||
CVE-2024-5988,0,0,61330fc134e62899e1bd151b38c42dacd0ac5fd49bf276cd259a0ec9156efc6d,2024-06-25T18:50:42.040000
|
||||
CVE-2024-5989,0,0,4f6916da6dadcee98f1ed324cce1026f703428fc4be42544dff05ec628ea7ab9,2024-06-25T18:50:42.040000
|
||||
CVE-2024-5990,0,1,74b820888dc43d4b3514a3bc2da36badf33f6d5fcb5914b2d81537c9a36b892f,2024-09-16T11:58:38.363000
|
||||
CVE-2024-5988,0,1,7d5e21f2246cb887caea04ab5932ae9084dbb2197bf94e4f89acc00a5f33cee9,2024-09-16T12:07:20.767000
|
||||
CVE-2024-5989,0,1,dfd3cc5d0cecb773f338d5d550b90f0da986feaa9901700c9172dabb85cfbdc0,2024-09-16T12:08:03.447000
|
||||
CVE-2024-5990,0,0,74b820888dc43d4b3514a3bc2da36badf33f6d5fcb5914b2d81537c9a36b892f,2024-09-16T11:58:38.363000
|
||||
CVE-2024-5991,0,0,fe91480125318e1887501309371643eaea8c60c621bd042cca787c9779dab434,2024-09-06T22:51:41.470000
|
||||
CVE-2024-5992,0,0,71d2329832d35306ba58326f8edc972973ae3f2f48367fcc1028f4ed5d9fb912,2024-07-09T18:19:14.047000
|
||||
CVE-2024-5993,0,0,b45a0ae570b278a2a66647d60174ec8036c753d27cba9d6e9660698bbc3fa2d6,2024-07-09T18:19:14.047000
|
||||
@ -261104,7 +261108,7 @@ CVE-2024-6078,0,0,a48aa92a89b3d2f828f8a341ad2ce6a914a21f3587846f530cf16dc8ed30ed
|
||||
CVE-2024-6079,0,0,a625435aeb66a78a45b154461c249f77137a161767aad8b8e49464f09120384a,2024-08-14T02:07:05.410000
|
||||
CVE-2024-6080,0,0,2ad08bb329dff2f5ca525640c8314d702413aec2eadc0af776454094a000e617,2024-08-06T07:15:46.460000
|
||||
CVE-2024-6082,0,0,013046d87182f03b6cbc3b5958c2d5ce3b9ca55b4984041383e50b43bd3564b5,2024-09-13T18:29:30.637000
|
||||
CVE-2024-6083,0,0,f2e58ae7634ac284d92da64e0d5cf2fef17119bd56b0d8f986a960d57e2ccd76,2024-06-20T12:44:01.637000
|
||||
CVE-2024-6083,0,1,6d9bb4abe3add5a9314088c73da6990ced956f79d42ec66733f8e068d49bd5c9,2024-09-16T13:21:53.467000
|
||||
CVE-2024-6084,0,0,6faa90c930997c0aec12adfd29df5cf00c8158d82ed8686290b073db2ac7ae60,2024-08-08T16:20:42.537000
|
||||
CVE-2024-6085,0,0,e5356847d2f9e7fb365a9afe07e5899cc989c4ce949a989ba1a4d6bdfc914a39,2024-06-27T19:25:12.067000
|
||||
CVE-2024-6086,0,0,47215fd632ba621ffeef67af3acb9b5d4df100629d5a1e80c438d45f990f6540,2024-06-27T19:25:12.067000
|
||||
@ -262643,7 +262647,7 @@ CVE-2024-8178,0,0,ba572c1f8157c41d405fb002c7b6f163f2d56dcc78fed52d2bcc31657caf56
|
||||
CVE-2024-8181,0,0,493690832b830d715024bac2c57cbeb9d316626844b43ee44a3d0839b5d01d36,2024-09-06T15:35:07.267000
|
||||
CVE-2024-8182,0,0,9ca161eed16086dd999c3dcdddb12be07c44a0882f46a0d2167122ca829615b9,2024-08-30T13:53:52.197000
|
||||
CVE-2024-8188,0,0,bf948f939efb55d2700c81c8fb5cefa3fc31038462bfeb7ac3e161719faca6b2,2024-08-26T20:15:08.760000
|
||||
CVE-2024-8190,0,0,1b4f3d19d28f8ddd235c291a51cbbe5f007508b829e341c23a7d4e7337c2875c,2024-09-14T01:00:01.107000
|
||||
CVE-2024-8190,0,1,b93c21c7e68b63ff1a05425b35ca8850e4059906d4d0de60465090c0528ebe7c,2024-09-16T13:44:18.173000
|
||||
CVE-2024-8191,0,0,af2edabb2340196237a0a5f2ba571c0c8b12c14869cbef7778e55b204fc2e4fe,2024-09-12T21:50:39.507000
|
||||
CVE-2024-8193,0,0,2f2a75e240e354e8f0e14f5f9d5e6a02eb535e669399224b9d10e7e4f72f0d51,2024-08-30T15:52:33.747000
|
||||
CVE-2024-8194,0,0,0e377807b4cb936d43f2e66a722c2d573026df321eb087fd34789423400e78c7,2024-08-30T16:34:53.210000
|
||||
@ -262828,7 +262832,7 @@ CVE-2024-8564,0,0,2112c36914e39f842fdc3749656e81cb1e01d81d9daf6872738042abc963e7
|
||||
CVE-2024-8565,0,0,923e87f30584d77b1eb045cc17fb206bfc48a80ad2f8f1ccf84c8acb9bd2c037,2024-09-10T15:40:31.103000
|
||||
CVE-2024-8566,0,0,b697d2f2d8dab369399702d62c565693e4b82d2b91e05adb154f01cb1c8382ab,2024-09-10T15:42:03.630000
|
||||
CVE-2024-8567,0,0,49659b49a666f0018bb5744af39b0142ede6c7f436b35449bf81fb3596426b7c,2024-09-10T15:44:31.283000
|
||||
CVE-2024-8568,0,0,7f519e237841b4a30a8e4620ee604c17282a68089d0fba94c8e6be9a97cc3ef8,2024-09-09T13:03:38.303000
|
||||
CVE-2024-8568,0,1,b74d62474c16c5c803159e182361ae52db782b717cfac5a6615da66c435f9a25,2024-09-16T13:22:31.087000
|
||||
CVE-2024-8569,0,0,aaed184af7e4134cfe1a8ea6b899c2f66a4c7610f73679d8a682587becf0ed8f,2024-09-10T15:45:24.237000
|
||||
CVE-2024-8570,0,0,bc68640c6c75a567a3dc53e9637ef970c70443205716d3966201c32a94304c8e,2024-09-11T16:07:35.400000
|
||||
CVE-2024-8571,0,0,5cce23306b6ec0516f16b428475d85317f6d2cd8394be676570b33092f0a1f8e,2024-09-11T16:05:34.220000
|
||||
@ -262845,7 +262849,7 @@ CVE-2024-8582,0,0,929f6a4eccde08c2101d65daf5f8492ec1f09acd5b572ce0e385ece7e31d53
|
||||
CVE-2024-8583,0,0,1afec7fcc1c6ffb2f3d78350dc0e6e06f846d7be3a9c3c1e504a570641936171,2024-09-10T15:49:29.103000
|
||||
CVE-2024-8584,0,0,f2bfb960200b98001a53756524046d766d8acbe67d6e46dee6e73d41f4473ab7,2024-09-13T10:15:17.263000
|
||||
CVE-2024-8585,0,0,e17d232ed4a4084d03c537d4bccfc260c2e2f4d1c4cbcfdf334e4783c2ee46f9,2024-09-11T15:53:35.693000
|
||||
CVE-2024-8586,0,0,ea96f63ac75acb4f2bd0b58c4c06a252405d0d0a14b2f462dd867d5036d1da95,2024-09-09T13:03:38.303000
|
||||
CVE-2024-8586,0,1,23468ff8a51a574afa4ccf040ef08b97cdacf6166e19d71118517f5f68bba004,2024-09-16T13:28:03.400000
|
||||
CVE-2024-8601,0,0,7acc310f49af8e0e61a818aa0442f44a6d68bdb260bd22310620d7d1eda33555,2024-09-09T13:03:38.303000
|
||||
CVE-2024-8604,0,0,011a82fa33d28627d93910a4b1b240e8b61f649834230335b18a4a93ce8a99bf,2024-09-10T19:14:57.017000
|
||||
CVE-2024-8605,0,0,2abdfde3fad91633012e2fbc4796f8bda82aa939ecbbf9c2890b650d01ffd42b,2024-09-13T15:31:52.140000
|
||||
|
Can't render this file because it is too large.
|
Loading…
x
Reference in New Issue
Block a user