mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-07-09 16:05:11 +00:00
Auto-Update: 2024-09-28T23:55:17.196918+00:00
This commit is contained in:
parent
fb30d2c5d5
commit
e808d0e7b8
@ -2,13 +2,13 @@
|
||||
"id": "CVE-2023-31403",
|
||||
"sourceIdentifier": "cna@sap.com",
|
||||
"published": "2023-11-14T01:15:07.413",
|
||||
"lastModified": "2023-11-20T19:51:15.823",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2024-09-28T22:15:02.433",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "SAP Business One installation - version 10.0, does not perform proper authentication and authorization checks for SMB shared folder. As a result, any malicious user can read and write to the SMB shared folder. Additionally, the files in the folder can be executed or be used by the installation process leading to considerable impact on confidentiality, integrity and availability.\n\n"
|
||||
"value": "SAP Business One installation - version 10.0, does not perform proper authentication and authorization checks for SMB shared folder. As a result, any malicious user can read and write to the SMB shared folder. Additionally, the files in the folder can be executed or be used by the installation process leading to considerable impact on confidentiality, integrity and availability."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
@ -61,7 +61,7 @@
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"source": "cna@sap.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
@ -71,12 +71,12 @@
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "cna@sap.com",
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-284"
|
||||
"value": "CWE-863"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -2,13 +2,13 @@
|
||||
"id": "CVE-2023-32114",
|
||||
"sourceIdentifier": "cna@sap.com",
|
||||
"published": "2023-06-13T03:15:09.393",
|
||||
"lastModified": "2023-06-16T18:40:36.677",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2024-09-28T22:15:02.783",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "SAP NetWeaver (Change and Transport System) - versions 702, 731, 740, 750, 751, 752, 753, 754, 755, 756, 757, allows an authenticated user with admin privileges to maliciously run a benchmark program repeatedly in intent to slowdown or make the server unavailable which may lead to a limited impact on Availability with No impact on Confidentiality and Integrity of the application.\n\n"
|
||||
"value": "SAP NetWeaver (Change and Transport System) - versions 702, 731, 740, 750, 751, 752, 753, 754, 755, 756, 757, allows an authenticated user with admin privileges to maliciously run a benchmark program repeatedly in intent to slowdown or make the server unavailable which may lead to a limited impact on Availability with No impact on Confidentiality and Integrity of the application."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
@ -58,11 +58,11 @@
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "cna@sap.com",
|
||||
"type": "Primary",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-400"
|
||||
"value": "CWE-732"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -2,13 +2,13 @@
|
||||
"id": "CVE-2023-33990",
|
||||
"sourceIdentifier": "cna@sap.com",
|
||||
"published": "2023-07-11T03:15:09.657",
|
||||
"lastModified": "2023-07-19T12:57:09.040",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2024-09-28T22:15:02.930",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "SAP SQL Anywhere\u00a0- version 17.0, allows an attacker to prevent legitimate users from accessing the service by crashing the service. An attacker with low privileged account and access to the local system can write into the shared memory objects. This can be leveraged by an attacker to perform a Denial of Service. Further, an attacker might be able to modify sensitive data in shared memory objects.This issue only affects SAP SQL Anywhere on Windows. Other platforms are not impacted.\n\n"
|
||||
"value": "SAP SQL Anywhere\u00a0- version 17.0, allows an attacker to prevent legitimate users from accessing the service by crashing the service. An attacker with low privileged account and access to the local system can write into the shared memory objects. This can be leveraged by an attacker to perform a Denial of Service. Further, an attacker might be able to modify sensitive data in shared memory objects.This issue only affects SAP SQL Anywhere on Windows. Other platforms are not impacted."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
@ -60,6 +60,10 @@
|
||||
"source": "cna@sap.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-277"
|
||||
},
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-732"
|
||||
|
@ -2,13 +2,13 @@
|
||||
"id": "CVE-2023-35870",
|
||||
"sourceIdentifier": "cna@sap.com",
|
||||
"published": "2023-07-11T03:15:09.800",
|
||||
"lastModified": "2023-07-19T13:35:31.873",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2024-09-28T22:15:03.063",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "When creating a journal entry template in SAP S/4HANA (Manage Journal Entry Template) - versions S4CORE 104, 105, 106, 107, an attacker could intercept the save request and change the template, leading to an impact on confidentiality and integrity of the resource. Furthermore, a standard template could be deleted, hence making the resource temporarily unavailable.\n\n"
|
||||
"value": "When creating a journal entry template in SAP S/4HANA (Manage Journal Entry Template) - versions S4CORE 104, 105, 106, 107, an attacker could intercept the save request and change the template, leading to an impact on confidentiality and integrity of the resource. Furthermore, a standard template could be deleted, hence making the resource temporarily unavailable."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
@ -57,22 +57,22 @@
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"source": "cna@sap.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "NVD-CWE-Other"
|
||||
"value": "CWE-732"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "cna@sap.com",
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-284"
|
||||
"value": "NVD-CWE-Other"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -2,13 +2,13 @@
|
||||
"id": "CVE-2023-35874",
|
||||
"sourceIdentifier": "cna@sap.com",
|
||||
"published": "2023-07-11T03:15:10.050",
|
||||
"lastModified": "2023-07-19T17:13:20.070",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2024-09-28T22:15:03.187",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "SAP NetWeaver Application Server ABAP and ABAP Platform - version KRNL64NUC, 7.22, KRNL64NUC 7.22EXT, KRNL64UC 7.22, KRNL64UC 7.22EXT, KRNL64UC 7.53, KERNEL 7.22, KERNEL, 7.53, KERNEL 7.77, KERNEL 7.81, KERNEL 7.85, KERNEL 7.89, KERNEL 7.54, KERNEL 7.92, KERNEL 7.93, under some conditions, performs improper authentication checks for functionalities that require user identity. An attacker can perform malicious actions over the network, extending the scope of impact, causing a limited impact on confidentiality, integrity and availability.\n\n"
|
||||
"value": "SAP NetWeaver Application Server ABAP and ABAP Platform - version KRNL64NUC, 7.22, KRNL64NUC 7.22EXT, KRNL64UC 7.22, KRNL64UC 7.22EXT, KRNL64UC 7.53, KERNEL 7.22, KERNEL, 7.53, KERNEL 7.77, KERNEL 7.81, KERNEL 7.85, KERNEL 7.89, KERNEL 7.54, KERNEL 7.92, KERNEL 7.93, under some conditions, performs improper authentication checks for functionalities that require user identity. An attacker can perform malicious actions over the network, extending the scope of impact, causing a limited impact on confidentiality, integrity and availability."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
@ -62,7 +62,7 @@
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-287"
|
||||
"value": "CWE-306"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -2,13 +2,13 @@
|
||||
"id": "CVE-2023-36919",
|
||||
"sourceIdentifier": "cna@sap.com",
|
||||
"published": "2023-07-11T03:15:10.237",
|
||||
"lastModified": "2023-07-18T18:17:10.787",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2024-09-28T22:15:03.313",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "In SAP Enable Now - versions WPB_MANAGER 1.0, WPB_MANAGER_CE 10, WPB_MANAGER_HANA 10, ENABLE_NOW_CONSUMP_DEL 1704, the Referrer-Policy response header is not implemented, allowing an unauthenticated attacker to obtain referrer details, resulting in information disclosure.\n\n"
|
||||
"value": "In SAP Enable Now - versions WPB_MANAGER 1.0, WPB_MANAGER_CE 10, WPB_MANAGER_HANA 10, ENABLE_NOW_CONSUMP_DEL 1704, the Referrer-Policy response header is not implemented, allowing an unauthenticated attacker to obtain referrer details, resulting in information disclosure."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
@ -57,22 +57,22 @@
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"source": "cna@sap.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-116"
|
||||
"value": "CWE-213"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "cna@sap.com",
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-644"
|
||||
"value": "CWE-116"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -2,13 +2,13 @@
|
||||
"id": "CVE-2023-37483",
|
||||
"sourceIdentifier": "cna@sap.com",
|
||||
"published": "2023-08-08T01:15:17.313",
|
||||
"lastModified": "2023-08-09T18:21:52.827",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2024-09-28T22:15:03.433",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "SAP PowerDesigner - version 16.7, has improper access control which might allow an unauthenticated attacker to run arbitrary queries against the back-end database via Proxy.\n\n"
|
||||
"value": "SAP PowerDesigner - version 16.7, has improper access control which might allow an unauthenticated attacker to run arbitrary queries against the back-end database via Proxy."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
@ -62,7 +62,7 @@
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-284"
|
||||
"value": "CWE-306"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -2,13 +2,13 @@
|
||||
"id": "CVE-2023-37486",
|
||||
"sourceIdentifier": "cna@sap.com",
|
||||
"published": "2023-08-08T01:15:17.907",
|
||||
"lastModified": "2023-08-15T15:15:07.713",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2024-09-28T22:15:03.550",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Under certain conditions\u00a0SAP Commerce\u00a0(OCC API) - versions HY_COM 2105, HY_COM 2205, COM_CLOUD 2211, endpoints allow an attacker to access information which would otherwise be restricted. On successful exploitation there could be a high impact on confidentiality with no impact on integrity and availability of the application.\n\n"
|
||||
"value": "Under certain conditions\u00a0SAP Commerce\u00a0(OCC API) - versions HY_COM 2105, HY_COM 2205, COM_CLOUD 2211, endpoints allow an attacker to access information which would otherwise be restricted. On successful exploitation there could be a high impact on confidentiality with no impact on integrity and availability of the application."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
@ -57,22 +57,22 @@
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"source": "cna@sap.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "NVD-CWE-noinfo"
|
||||
"value": "CWE-524"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "cna@sap.com",
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-200"
|
||||
"value": "NVD-CWE-noinfo"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -2,13 +2,13 @@
|
||||
"id": "CVE-2023-37487",
|
||||
"sourceIdentifier": "cna@sap.com",
|
||||
"published": "2023-08-08T01:15:18.247",
|
||||
"lastModified": "2023-08-09T18:21:30.300",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2024-09-28T22:15:03.670",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "SAP Business One (Service Layer) - version 10.0, allows an authenticated attacker with deep knowledge perform certain operation to access unintended data over the network which could lead to high impact on confidentiality with no impact on integrity and availability of the application\n\n"
|
||||
"value": "SAP Business One (Service Layer) - version 10.0, allows an authenticated attacker with deep knowledge perform certain operation to access unintended data over the network which could lead to high impact on confidentiality with no impact on integrity and availability of the application"
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
@ -62,7 +62,7 @@
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-200"
|
||||
"value": "CWE-497"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -2,13 +2,13 @@
|
||||
"id": "CVE-2023-37491",
|
||||
"sourceIdentifier": "cna@sap.com",
|
||||
"published": "2023-08-08T01:15:18.840",
|
||||
"lastModified": "2023-08-09T18:20:38.800",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2024-09-28T22:15:03.780",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "The ACL (Access\u00a0Control\u00a0List) of SAP Message Server - versions KERNEL 7.22, KERNEL 7.53, KERNEL 7.54, KERNEL 7.77, RNL64UC 7.22, RNL64UC 7.22EXT, RNL64UC 7.53, KRNL64NUC 7.22, KRNL64NUC 7.22EXT, can be bypassed in certain conditions, which may enable an authenticated malicious user to enter the network of the SAP systems served by the attacked SAP Message server. This may lead to unauthorized read and write of data as well as rendering the system unavailable.\n\n"
|
||||
"value": "The ACL (Access\u00a0Control\u00a0List) of SAP Message Server - versions KERNEL 7.22, KERNEL 7.53, KERNEL 7.54, KERNEL 7.77, RNL64UC 7.22, RNL64UC 7.22EXT, RNL64UC 7.53, KRNL64NUC 7.22, KRNL64NUC 7.22EXT, can be bypassed in certain conditions, which may enable an authenticated malicious user to enter the network of the SAP systems served by the attacked SAP Message server. This may lead to unauthorized read and write of data as well as rendering the system unavailable."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
@ -62,7 +62,7 @@
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-285"
|
||||
"value": "CWE-863"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -2,13 +2,13 @@
|
||||
"id": "CVE-2023-37492",
|
||||
"sourceIdentifier": "cna@sap.com",
|
||||
"published": "2023-08-08T01:15:18.993",
|
||||
"lastModified": "2023-08-09T18:20:16.060",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2024-09-28T22:15:03.890",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "SAP NetWeaver Application Server ABAP and ABAP Platform - versions SAP_BASIS 700, SAP_BASIS 701, SAP_BASIS 702, SAP_BASIS 731, SAP_BASIS 740, SAP_BASIS 750, SAP_BASIS 752, SAP_BASIS 753, SAP_BASIS 754, SAP_BASIS 755, SAP_BASIS 756, SAP_BASIS 757, SAP_BASIS 758, SAP_BASIS 793, SAP_BASIS 804, does not perform necessary authorization checks for an authenticated user, resulting in escalation of privileges. This could allow an attacker to read sensitive information which can be used in a subsequent serious attack.\n\n"
|
||||
"value": "SAP NetWeaver Application Server ABAP and ABAP Platform - versions SAP_BASIS 700, SAP_BASIS 701, SAP_BASIS 702, SAP_BASIS 731, SAP_BASIS 740, SAP_BASIS 750, SAP_BASIS 752, SAP_BASIS 753, SAP_BASIS 754, SAP_BASIS 755, SAP_BASIS 756, SAP_BASIS 757, SAP_BASIS 758, SAP_BASIS 793, SAP_BASIS 804, does not perform necessary authorization checks for an authenticated user, resulting in escalation of privileges. This could allow an attacker to read sensitive information which can be used in a subsequent serious attack."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
@ -72,7 +72,7 @@
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-862"
|
||||
"value": "CWE-863"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -2,13 +2,13 @@
|
||||
"id": "CVE-2023-39436",
|
||||
"sourceIdentifier": "cna@sap.com",
|
||||
"published": "2023-08-08T01:15:19.150",
|
||||
"lastModified": "2023-08-09T18:19:29.723",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2024-09-28T22:15:04.010",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "SAP Supplier Relationship Management -versions 600, 602, 603, 604, 605, 606, 616, 617, allows an unauthorized attacker to discover information relating to\u00a0SRM within Vendor Master Data for Business Partners replication functionality.This information could be used to allow the attacker to specialize their attacks against\u00a0SRM.\n\n"
|
||||
"value": "SAP Supplier Relationship Management -versions 600, 602, 603, 604, 605, 606, 616, 617, allows an unauthorized attacker to discover information relating to\u00a0SRM within Vendor Master Data for Business Partners replication functionality.This information could be used to allow the attacker to specialize their attacks against\u00a0SRM."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
@ -62,7 +62,7 @@
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-200"
|
||||
"value": "CWE-306"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -2,13 +2,13 @@
|
||||
"id": "CVE-2023-39438",
|
||||
"sourceIdentifier": "cna@sap.com",
|
||||
"published": "2023-08-15T17:15:12.627",
|
||||
"lastModified": "2023-08-22T17:32:59.287",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2024-09-28T22:15:04.123",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A missing authorization check allows an arbitrary authenticated user to perform certain operations through the API of CLA-assistant by executing specific additional steps. This allows an arbitrary authenticated user to read CLA information including information of the persons who signed them as well as custom fields the CLA requester had configured. In addition, an arbitrary authenticated user can update or delete the CLA-configuration for repositories or organizations using CLA-assistant. The stored access tokens for GitHub are not affected, as these are redacted from the API-responses.\n"
|
||||
"value": "A missing authorization check allows an arbitrary authenticated user to perform certain operations through the API of CLA-assistant by executing specific additional steps. This allows an arbitrary authenticated user to read CLA information including information of the persons who signed them as well as custom fields the CLA requester had configured. In addition, an arbitrary authenticated user can update or delete the CLA-configuration for repositories or organizations using CLA-assistant. The stored access tokens for GitHub are not affected, as these are redacted from the API-responses."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
@ -61,7 +61,7 @@
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"source": "cna@sap.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
@ -71,20 +71,12 @@
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "cna@sap.com",
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-424"
|
||||
},
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-862"
|
||||
},
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-863"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -2,13 +2,13 @@
|
||||
"id": "CVE-2023-39439",
|
||||
"sourceIdentifier": "cna@sap.com",
|
||||
"published": "2023-08-08T01:15:19.793",
|
||||
"lastModified": "2023-08-15T15:28:19.137",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2024-09-28T22:15:04.243",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "SAP Commerce Cloud may accept an empty passphrase for user ID and passphrase authentication, allowing users to log into the system without a passphrase.\n\n"
|
||||
"value": "SAP Commerce Cloud may accept an empty passphrase for user ID and passphrase authentication, allowing users to log into the system without a passphrase."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
@ -62,7 +62,7 @@
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-1390"
|
||||
"value": "CWE-258"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -2,13 +2,13 @@
|
||||
"id": "CVE-2023-39440",
|
||||
"sourceIdentifier": "cna@sap.com",
|
||||
"published": "2023-08-08T01:15:20.100",
|
||||
"lastModified": "2023-08-09T18:22:07.123",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2024-09-28T22:15:04.350",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "In SAP BusinessObjects Business Intelligence - version 420, If a user logs in to a particular program, under certain specific conditions memory might not be cleared up properly, due to which attacker might be able to get access to user credentials. For a successful attack, the attacker needs to have local access to the system. There is no impact on availability and integrity.\n\n"
|
||||
"value": "In SAP BusinessObjects Business Intelligence - version 420, If a user logs in to a particular program, under certain specific conditions memory might not be cleared up properly, due to which attacker might be able to get access to user credentials. For a successful attack, the attacker needs to have local access to the system. There is no impact on availability and integrity."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
@ -62,7 +62,7 @@
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-200"
|
||||
"value": "CWE-312"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -2,13 +2,13 @@
|
||||
"id": "CVE-2023-40309",
|
||||
"sourceIdentifier": "cna@sap.com",
|
||||
"published": "2023-09-12T03:15:12.073",
|
||||
"lastModified": "2023-09-15T17:05:27.130",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2024-09-28T22:15:04.460",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "SAP CommonCryptoLib does not perform necessary authentication checks, which may result in missing or wrong authorization checks for an authenticated user, resulting in escalation of privileges. Depending on the application and the level of privileges acquired,\u00a0an attacker could abuse functionality restricted to a particular user group as well as read, modify or delete restricted data.\n\n"
|
||||
"value": "SAP CommonCryptoLib does not perform necessary authentication checks, which may result in missing or wrong authorization checks for an authenticated user, resulting in escalation of privileges. Depending on the application and the level of privileges acquired,\u00a0an attacker could abuse functionality restricted to a particular user group as well as read, modify or delete restricted data."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
@ -66,7 +66,7 @@
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-862"
|
||||
"value": "CWE-863"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -2,13 +2,13 @@
|
||||
"id": "CVE-2023-40622",
|
||||
"sourceIdentifier": "cna@sap.com",
|
||||
"published": "2023-09-12T03:15:12.813",
|
||||
"lastModified": "2023-09-13T14:45:47.617",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2024-09-28T22:15:04.610",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "SAP BusinessObjects Business Intelligence Platform (Promotion Management) - versions 420, 430, under certain condition allows an authenticated attacker to view sensitive information which is otherwise restricted. On successful exploitation, the attacker can completely compromise the application causing high impact on confidentiality, integrity, and availability.\n\n"
|
||||
"value": "SAP BusinessObjects Business Intelligence Platform (Promotion Management) - versions 420, 430, under certain condition allows an authenticated attacker to view sensitive information which is otherwise restricted. On successful exploitation, the attacker can completely compromise the application causing high impact on confidentiality, integrity, and availability."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
@ -66,7 +66,7 @@
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-200"
|
||||
"value": "CWE-732"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -2,13 +2,13 @@
|
||||
"id": "CVE-2023-42475",
|
||||
"sourceIdentifier": "cna@sap.com",
|
||||
"published": "2023-10-10T02:15:11.020",
|
||||
"lastModified": "2023-10-11T19:14:53.293",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2024-09-28T23:15:11.563",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "The Statutory Reporting application has a vulnerable file storage location, potentially enabling low privileged attacker to read server files with minimal impact on confidentiality.\n\n"
|
||||
"value": "The Statutory Reporting application has a vulnerable file storage location, potentially enabling low privileged attacker to read server files with minimal impact on confidentiality."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
@ -66,7 +66,7 @@
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-200"
|
||||
"value": "CWE-209"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -2,13 +2,13 @@
|
||||
"id": "CVE-2023-42481",
|
||||
"sourceIdentifier": "cna@sap.com",
|
||||
"published": "2023-12-12T01:15:11.023",
|
||||
"lastModified": "2023-12-13T23:54:39.960",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2024-09-28T23:15:11.717",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "In SAP Commerce Cloud - versions HY_COM 1905, HY_COM 2005, HY_COM2105, HY_COM 2011, HY_COM 2205, COM_CLOUD 2211, a locked B2B user can misuse the forgotten password functionality to un-block his user account again and re-gain access if SAP Commerce Cloud - Composable Storefront is used as storefront, due to weak access controls in place. This leads to a considerable impact on confidentiality and integrity.\n\n"
|
||||
"value": "In SAP Commerce Cloud - versions HY_COM 1905, HY_COM 2005, HY_COM2105, HY_COM 2011, HY_COM 2205, COM_CLOUD 2211, a locked B2B user can misuse the forgotten password functionality to un-block his user account again and re-gain access if SAP Commerce Cloud - Composable Storefront is used as storefront, due to weak access controls in place. This leads to a considerable impact on confidentiality and integrity."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
@ -66,7 +66,7 @@
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-284"
|
||||
"value": "CWE-640"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-45038",
|
||||
"sourceIdentifier": "security@qnapsecurity.com.tw",
|
||||
"published": "2024-09-06T17:15:12.300",
|
||||
"lastModified": "2024-09-09T13:03:38.303",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-09-28T23:51:34.580",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -17,6 +17,26 @@
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 8.8,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 5.9
|
||||
},
|
||||
{
|
||||
"source": "security@qnapsecurity.com.tw",
|
||||
"type": "Secondary",
|
||||
@ -41,7 +61,7 @@
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security@qnapsecurity.com.tw",
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
@ -49,12 +69,44 @@
|
||||
"value": "CWE-287"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "security@qnapsecurity.com.tw",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-287"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:qnap:music_station:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "5.0.0",
|
||||
"versionEndExcluding": "5.4.0",
|
||||
"matchCriteriaId": "327BDB3C-02C9-4D9F-AF8B-0F1EAAD062BF"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.qnap.com/en/security-advisory/qsa-24-25",
|
||||
"source": "security@qnapsecurity.com.tw"
|
||||
"source": "security@qnapsecurity.com.tw",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-47563",
|
||||
"sourceIdentifier": "security@qnapsecurity.com.tw",
|
||||
"published": "2024-09-06T17:15:12.513",
|
||||
"lastModified": "2024-09-09T13:03:38.303",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-09-28T23:47:40.683",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -17,6 +17,26 @@
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 8.8,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 5.9
|
||||
},
|
||||
{
|
||||
"source": "security@qnapsecurity.com.tw",
|
||||
"type": "Secondary",
|
||||
@ -55,10 +75,32 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:qnap:video_station:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "5.0.0",
|
||||
"versionEndExcluding": "5.8.2",
|
||||
"matchCriteriaId": "2552122C-93E4-471B-A5BE-D3B931836217"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.qnap.com/en/security-advisory/qsa-24-24",
|
||||
"source": "security@qnapsecurity.com.tw"
|
||||
"source": "security@qnapsecurity.com.tw",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,13 +2,13 @@
|
||||
"id": "CVE-2023-49578",
|
||||
"sourceIdentifier": "cna@sap.com",
|
||||
"published": "2023-12-12T02:15:07.283",
|
||||
"lastModified": "2023-12-15T14:32:38.473",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2024-09-28T23:15:11.840",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "SAP Cloud Connector - version 2.0, allows an authenticated user with low privilege to perform Denial of service attack from adjacent UI by sending a malicious request which leads to low impact on the availability and no impact on confidentiality or Integrity\u00a0 of the application.\n\n"
|
||||
"value": "SAP Cloud Connector - version 2.0, allows an authenticated user with low privilege to perform Denial of service attack from adjacent UI by sending a malicious request which leads to low impact on the availability and no impact on confidentiality or Integrity\u00a0 of the application."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
@ -61,22 +61,22 @@
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"source": "cna@sap.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "NVD-CWE-noinfo"
|
||||
"value": "CWE-732"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "cna@sap.com",
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-400"
|
||||
"value": "NVD-CWE-noinfo"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -2,13 +2,13 @@
|
||||
"id": "CVE-2023-49580",
|
||||
"sourceIdentifier": "cna@sap.com",
|
||||
"published": "2023-12-12T02:15:07.493",
|
||||
"lastModified": "2023-12-19T14:50:39.843",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2024-09-28T23:15:11.977",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "SAP GUI for Windows\u00a0and\u00a0SAP GUI for Java - versions SAP_BASIS 755, SAP_BASIS 756, SAP_BASIS 757, SAP_BASIS 758, allow an unauthenticated attacker to access information which would otherwise be restricted and confidential. In addition, this vulnerability allows the unauthenticated attacker to create Layout configurations of the ABAP List Viewer and with this causing a mild impact on integrity and availability, e.g. also increasing the response times of the AS ABAP.\n\n"
|
||||
"value": "SAP GUI for Windows\u00a0and\u00a0SAP GUI for Java - versions SAP_BASIS 755, SAP_BASIS 756, SAP_BASIS 757, SAP_BASIS 758, allow an unauthenticated attacker to access information which would otherwise be restricted and confidential. In addition, this vulnerability allows the unauthenticated attacker to create Layout configurations of the ABAP List Viewer and with this causing a mild impact on integrity and availability, e.g. also increasing the response times of the AS ABAP."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
@ -76,7 +76,7 @@
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-200"
|
||||
"value": "CWE-732"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -2,13 +2,13 @@
|
||||
"id": "CVE-2023-49583",
|
||||
"sourceIdentifier": "cna@sap.com",
|
||||
"published": "2023-12-12T02:15:07.920",
|
||||
"lastModified": "2024-01-09T02:15:45.140",
|
||||
"lastModified": "2024-09-28T23:15:12.090",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "SAP\u00a0BTP\u00a0Security Services Integration Library ([Node.js] @sap/xssec - versions < 3.6.0, allow under certain conditions an escalation of privileges. On successful exploitation, an unauthenticated attacker can obtain arbitrary permissions within the application.\n\n"
|
||||
"value": "SAP\u00a0BTP\u00a0Security Services Integration Library ([Node.js] @sap/xssec - versions < 3.6.0, allow under certain conditions an escalation of privileges. On successful exploitation, an unauthenticated attacker can obtain arbitrary permissions within the application."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
@ -66,7 +66,7 @@
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-269"
|
||||
"value": "CWE-749"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-50360",
|
||||
"sourceIdentifier": "security@qnapsecurity.com.tw",
|
||||
"published": "2024-09-06T17:15:12.710",
|
||||
"lastModified": "2024-09-09T13:03:38.303",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-09-28T23:44:50.720",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -17,6 +17,26 @@
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 8.8,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 5.9
|
||||
},
|
||||
{
|
||||
"source": "security@qnapsecurity.com.tw",
|
||||
"type": "Secondary",
|
||||
@ -51,10 +71,32 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:qnap:video_station:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "5.0.0",
|
||||
"versionEndExcluding": "5.8.2",
|
||||
"matchCriteriaId": "2552122C-93E4-471B-A5BE-D3B931836217"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.qnap.com/en/security-advisory/qsa-24-24",
|
||||
"source": "security@qnapsecurity.com.tw"
|
||||
"source": "security@qnapsecurity.com.tw",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,13 +2,13 @@
|
||||
"id": "CVE-2023-50422",
|
||||
"sourceIdentifier": "cna@sap.com",
|
||||
"published": "2023-12-12T02:15:08.587",
|
||||
"lastModified": "2024-01-09T02:15:45.420",
|
||||
"lastModified": "2024-09-28T23:15:12.223",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "SAP\u00a0BTP\u00a0Security Services Integration Library ([Java] cloud-security-services-integration-library) -\u00a0versions below 2.17.0 and versions from 3.0.0 to before 3.3.0, allow under certain conditions an escalation of privileges. On successful exploitation, an unauthenticated attacker can obtain arbitrary permissions within the application.\n\n"
|
||||
"value": "SAP\u00a0BTP\u00a0Security Services Integration Library ([Java] cloud-security-services-integration-library) -\u00a0versions below 2.17.0 and versions from 3.0.0 to before 3.3.0, allow under certain conditions an escalation of privileges. On successful exploitation, an unauthenticated attacker can obtain arbitrary permissions within the application."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
@ -66,7 +66,7 @@
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-269"
|
||||
"value": "CWE-749"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -2,13 +2,13 @@
|
||||
"id": "CVE-2023-50423",
|
||||
"sourceIdentifier": "cna@sap.com",
|
||||
"published": "2023-12-12T02:15:08.797",
|
||||
"lastModified": "2023-12-15T16:53:22.867",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2024-09-28T23:15:12.360",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "SAP\u00a0BTP\u00a0Security Services Integration Library ([Python]\u00a0sap-xssec) - versions < 4.1.0, allow under certain conditions an escalation of privileges. On successful exploitation, an unauthenticated attacker can obtain arbitrary permissions within the application.\n\n"
|
||||
"value": "SAP\u00a0BTP\u00a0Security Services Integration Library ([Python]\u00a0sap-xssec) - versions < 4.1.0, allow under certain conditions an escalation of privileges. On successful exploitation, an unauthenticated attacker can obtain arbitrary permissions within the application."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
@ -66,7 +66,7 @@
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-269"
|
||||
"value": "CWE-749"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -2,13 +2,13 @@
|
||||
"id": "CVE-2023-50424",
|
||||
"sourceIdentifier": "cna@sap.com",
|
||||
"published": "2023-12-12T03:15:07.100",
|
||||
"lastModified": "2023-12-15T16:53:04.417",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2024-09-28T23:15:12.477",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "SAP\u00a0BTP\u00a0Security Services Integration Library ([Golang] github.com/sap/cloud-security-client-go) - versions < 0.17.0, allow under certain conditions an escalation of privileges. On successful exploitation, an unauthenticated attacker can obtain arbitrary permissions within the application.\n\n"
|
||||
"value": "SAP\u00a0BTP\u00a0Security Services Integration Library ([Golang] github.com/sap/cloud-security-client-go) - versions < 0.17.0, allow under certain conditions an escalation of privileges. On successful exploitation, an unauthenticated attacker can obtain arbitrary permissions within the application."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
@ -66,7 +66,7 @@
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-269"
|
||||
"value": "CWE-749"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -2,13 +2,13 @@
|
||||
"id": "CVE-2024-21736",
|
||||
"sourceIdentifier": "cna@sap.com",
|
||||
"published": "2024-01-09T02:15:45.593",
|
||||
"lastModified": "2024-01-19T17:30:01.407",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2024-09-28T23:15:12.587",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "SAP S/4HANA Finance for (Advanced Payment Management) - versions SAPSCORE 128, S4CORE 107, does not perform necessary authorization checks. A function import could be triggered allowing the attacker to create in-house bank accounts leading to low impact on the confidentiality of the application.\n\n"
|
||||
"value": "SAP S/4HANA Finance for (Advanced Payment Management) - versions SAPSCORE 128, S4CORE 107, does not perform necessary authorization checks. A function import could be triggered allowing the attacker to create in-house bank accounts leading to low impact on the confidentiality of the application."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
@ -66,7 +66,7 @@
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-285"
|
||||
"value": "CWE-863"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -2,13 +2,13 @@
|
||||
"id": "CVE-2024-24740",
|
||||
"sourceIdentifier": "cna@sap.com",
|
||||
"published": "2024-02-13T03:15:08.987",
|
||||
"lastModified": "2024-02-13T14:01:40.577",
|
||||
"lastModified": "2024-09-28T23:15:12.777",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "SAP NetWeaver Application Server (ABAP) - versions KERNEL 7.53, KERNEL 7.54, KERNEL 7.77, KERNEL 7.85, KERNEL 7.89, KERNEL 7.93, KERNEL 7.94, KRNL64UC 7.53, under certain conditions,\u00a0allows an attacker to access information which could otherwise be restricted with low impact on confidentiality of the application.\n\n"
|
||||
"value": "SAP NetWeaver Application Server (ABAP) - versions KERNEL 7.53, KERNEL 7.54, KERNEL 7.77, KERNEL 7.85, KERNEL 7.89, KERNEL 7.93, KERNEL 7.94, KRNL64UC 7.53, under certain conditions,\u00a0allows an attacker to access information which could otherwise be restricted with low impact on confidentiality of the application."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
@ -46,7 +46,7 @@
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-200"
|
||||
"value": "CWE-732"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -2,13 +2,13 @@
|
||||
"id": "CVE-2024-25644",
|
||||
"sourceIdentifier": "cna@sap.com",
|
||||
"published": "2024-03-12T01:15:49.567",
|
||||
"lastModified": "2024-03-12T12:40:13.500",
|
||||
"lastModified": "2024-09-28T23:15:12.907",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Under certain conditions SAP NetWeaver\u00a0WSRM\u00a0- version 7.50, allows an attacker to access information which would otherwise be restricted, causing low impact on Confidentiality with no impact on Integrity and Availability of the application.\n\n"
|
||||
"value": "Under certain conditions SAP NetWeaver\u00a0WSRM\u00a0- version 7.50, allows an attacker to access information which would otherwise be restricted, causing low impact on Confidentiality with no impact on Integrity and Availability of the application."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
@ -46,7 +46,7 @@
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-200"
|
||||
"value": "CWE-732"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -2,13 +2,13 @@
|
||||
"id": "CVE-2024-25645",
|
||||
"sourceIdentifier": "cna@sap.com",
|
||||
"published": "2024-03-12T01:15:49.780",
|
||||
"lastModified": "2024-03-12T12:40:13.500",
|
||||
"lastModified": "2024-09-28T23:15:13.020",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Under certain condition\u00a0SAP\u00a0NetWeaver (Enterprise Portal) - version 7.50\u00a0allows an attacker to access information which would otherwise be restricted causing low impact on confidentiality of the application and with no impact on Integrity and Availability of the application.\n\n"
|
||||
"value": "Under certain condition\u00a0SAP\u00a0NetWeaver (Enterprise Portal) - version 7.50\u00a0allows an attacker to access information which would otherwise be restricted causing low impact on confidentiality of the application and with no impact on Integrity and Availability of the application."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
@ -46,7 +46,7 @@
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-200"
|
||||
"value": "CWE-732"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -2,13 +2,13 @@
|
||||
"id": "CVE-2024-25646",
|
||||
"sourceIdentifier": "cna@sap.com",
|
||||
"published": "2024-04-09T01:15:48.343",
|
||||
"lastModified": "2024-04-09T12:48:04.090",
|
||||
"lastModified": "2024-09-28T23:15:13.110",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Due to improper validation,\u00a0SAP BusinessObject Business Intelligence Launch Pad allows an authenticated attacker to access operating system information using crafted document. On successful exploitation there could be a considerable impact on confidentiality of the application.\n\n"
|
||||
"value": "Due to improper validation,\u00a0SAP BusinessObject Business Intelligence Launch Pad allows an authenticated attacker to access operating system information using crafted document. On successful exploitation there could be a considerable impact on confidentiality of the application."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
@ -46,7 +46,7 @@
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-200"
|
||||
"value": "CWE-732"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -2,13 +2,13 @@
|
||||
"id": "CVE-2024-28163",
|
||||
"sourceIdentifier": "cna@sap.com",
|
||||
"published": "2024-03-12T01:15:50.390",
|
||||
"lastModified": "2024-03-12T12:40:13.500",
|
||||
"lastModified": "2024-09-28T23:15:13.217",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Under certain conditions, Support Web Pages of SAP NetWeaver Process Integration\u00a0(PI) - versions 7.50, allows an attacker to access information which would otherwise be restricted, causing low impact on Confidentiality with no impact on Integrity and Availability of the application.\n\n"
|
||||
"value": "Under certain conditions, Support Web Pages of SAP NetWeaver Process Integration\u00a0(PI) - versions 7.50, allows an attacker to access information which would otherwise be restricted, causing low impact on Confidentiality with no impact on Integrity and Availability of the application."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
@ -42,11 +42,11 @@
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "cna@sap.com",
|
||||
"type": "Primary",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-200"
|
||||
"value": "CWE-732"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -2,13 +2,13 @@
|
||||
"id": "CVE-2024-30218",
|
||||
"sourceIdentifier": "cna@sap.com",
|
||||
"published": "2024-04-09T01:15:50.570",
|
||||
"lastModified": "2024-04-09T12:48:04.090",
|
||||
"lastModified": "2024-09-28T23:15:13.313",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "The ABAP Application Server of SAP NetWeaver as well as ABAP Platform\u00a0allows an attacker to prevent legitimate users from accessing a service, either by crashing or flooding the service. This leads to a considerable impact on availability.\n\n"
|
||||
"value": "The ABAP Application Server of SAP NetWeaver as well as ABAP Platform\u00a0allows an attacker to prevent legitimate users from accessing a service, either by crashing or flooding the service. This leads to a considerable impact on availability."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
@ -46,7 +46,7 @@
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-400"
|
||||
"value": "CWE-605"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-33004",
|
||||
"sourceIdentifier": "cna@sap.com",
|
||||
"published": "2024-05-14T16:17:13.957",
|
||||
"lastModified": "2024-07-03T01:57:23.963",
|
||||
"lastModified": "2024-09-28T23:15:13.420",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -40,9 +40,19 @@
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "cna@sap.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-524"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
141
CVE-2024/CVE-2024-93xx/CVE-2024-9318.json
Normal file
141
CVE-2024/CVE-2024-93xx/CVE-2024-9318.json
Normal file
@ -0,0 +1,141 @@
|
||||
{
|
||||
"id": "CVE-2024-9318",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2024-09-28T23:15:13.530",
|
||||
"lastModified": "2024-09-28T23:15:13.530",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A vulnerability, which was classified as critical, has been found in SourceCodester Advocate Office Management System 1.0. Affected by this issue is some unknown functionality of the file /control/activate.php. The manipulation of the argument id leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV40": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "4.0",
|
||||
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"attackRequirements": "NONE",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"vulnerableSystemConfidentiality": "LOW",
|
||||
"vulnerableSystemIntegrity": "LOW",
|
||||
"vulnerableSystemAvailability": "LOW",
|
||||
"subsequentSystemConfidentiality": "NONE",
|
||||
"subsequentSystemIntegrity": "NONE",
|
||||
"subsequentSystemAvailability": "NONE",
|
||||
"exploitMaturity": "NOT_DEFINED",
|
||||
"confidentialityRequirements": "NOT_DEFINED",
|
||||
"integrityRequirements": "NOT_DEFINED",
|
||||
"availabilityRequirements": "NOT_DEFINED",
|
||||
"modifiedAttackVector": "NOT_DEFINED",
|
||||
"modifiedAttackComplexity": "NOT_DEFINED",
|
||||
"modifiedAttackRequirements": "NOT_DEFINED",
|
||||
"modifiedPrivilegesRequired": "NOT_DEFINED",
|
||||
"modifiedUserInteraction": "NOT_DEFINED",
|
||||
"modifiedVulnerableSystemConfidentiality": "NOT_DEFINED",
|
||||
"modifiedVulnerableSystemIntegrity": "NOT_DEFINED",
|
||||
"modifiedVulnerableSystemAvailability": "NOT_DEFINED",
|
||||
"modifiedSubsequentSystemConfidentiality": "NOT_DEFINED",
|
||||
"modifiedSubsequentSystemIntegrity": "NOT_DEFINED",
|
||||
"modifiedSubsequentSystemAvailability": "NOT_DEFINED",
|
||||
"safety": "NOT_DEFINED",
|
||||
"automatable": "NOT_DEFINED",
|
||||
"recovery": "NOT_DEFINED",
|
||||
"valueDensity": "NOT_DEFINED",
|
||||
"vulnerabilityResponseEffort": "NOT_DEFINED",
|
||||
"providerUrgency": "NOT_DEFINED",
|
||||
"baseScore": 5.3,
|
||||
"baseSeverity": "MEDIUM"
|
||||
}
|
||||
}
|
||||
],
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "LOW",
|
||||
"baseScore": 6.3,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 3.4
|
||||
}
|
||||
],
|
||||
"cvssMetricV2": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "2.0",
|
||||
"vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P",
|
||||
"accessVector": "NETWORK",
|
||||
"accessComplexity": "LOW",
|
||||
"authentication": "SINGLE",
|
||||
"confidentialityImpact": "PARTIAL",
|
||||
"integrityImpact": "PARTIAL",
|
||||
"availabilityImpact": "PARTIAL",
|
||||
"baseScore": 6.5
|
||||
},
|
||||
"baseSeverity": "MEDIUM",
|
||||
"exploitabilityScore": 8.0,
|
||||
"impactScore": 6.4,
|
||||
"acInsufInfo": false,
|
||||
"obtainAllPrivilege": false,
|
||||
"obtainUserPrivilege": false,
|
||||
"obtainOtherPrivilege": false,
|
||||
"userInteractionRequired": false
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-89"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/para-paradise/webray.com.cn/blob/main/Advocate%20office%20management%20system/Advocate%20office%20management%20system%20activate.php%20error-based%20SQL%20Injection%20Vulnerability.md",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.278822",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.278822",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?submit.412749",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.sourcecodester.com/",
|
||||
"source": "cna@vuldb.com"
|
||||
}
|
||||
]
|
||||
}
|
38
README.md
38
README.md
@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours.
|
||||
### Last Repository Update
|
||||
|
||||
```plain
|
||||
2024-09-28T22:00:17.441432+00:00
|
||||
2024-09-28T23:55:17.196918+00:00
|
||||
```
|
||||
|
||||
### Most recent CVE Modification Timestamp synchronized with NVD
|
||||
|
||||
```plain
|
||||
2024-09-28T21:15:10.783000+00:00
|
||||
2024-09-28T23:51:34.580000+00:00
|
||||
```
|
||||
|
||||
### Last Data Feed Release
|
||||
@ -33,21 +33,45 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
|
||||
### Total Number of included CVEs
|
||||
|
||||
```plain
|
||||
264098
|
||||
264099
|
||||
```
|
||||
|
||||
### CVEs added in the last Commit
|
||||
|
||||
Recently added CVEs: `2`
|
||||
Recently added CVEs: `1`
|
||||
|
||||
- [CVE-2024-9316](CVE-2024/CVE-2024-93xx/CVE-2024-9316.json) (`2024-09-28T20:15:02.280`)
|
||||
- [CVE-2024-9317](CVE-2024/CVE-2024-93xx/CVE-2024-9317.json) (`2024-09-28T21:15:10.783`)
|
||||
- [CVE-2024-9318](CVE-2024/CVE-2024-93xx/CVE-2024-9318.json) (`2024-09-28T23:15:13.530`)
|
||||
|
||||
|
||||
### CVEs modified in the last Commit
|
||||
|
||||
Recently modified CVEs: `0`
|
||||
Recently modified CVEs: `36`
|
||||
|
||||
- [CVE-2023-39436](CVE-2023/CVE-2023-394xx/CVE-2023-39436.json) (`2024-09-28T22:15:04.010`)
|
||||
- [CVE-2023-39438](CVE-2023/CVE-2023-394xx/CVE-2023-39438.json) (`2024-09-28T22:15:04.123`)
|
||||
- [CVE-2023-39439](CVE-2023/CVE-2023-394xx/CVE-2023-39439.json) (`2024-09-28T22:15:04.243`)
|
||||
- [CVE-2023-39440](CVE-2023/CVE-2023-394xx/CVE-2023-39440.json) (`2024-09-28T22:15:04.350`)
|
||||
- [CVE-2023-40309](CVE-2023/CVE-2023-403xx/CVE-2023-40309.json) (`2024-09-28T22:15:04.460`)
|
||||
- [CVE-2023-40622](CVE-2023/CVE-2023-406xx/CVE-2023-40622.json) (`2024-09-28T22:15:04.610`)
|
||||
- [CVE-2023-42475](CVE-2023/CVE-2023-424xx/CVE-2023-42475.json) (`2024-09-28T23:15:11.563`)
|
||||
- [CVE-2023-42481](CVE-2023/CVE-2023-424xx/CVE-2023-42481.json) (`2024-09-28T23:15:11.717`)
|
||||
- [CVE-2023-45038](CVE-2023/CVE-2023-450xx/CVE-2023-45038.json) (`2024-09-28T23:51:34.580`)
|
||||
- [CVE-2023-47563](CVE-2023/CVE-2023-475xx/CVE-2023-47563.json) (`2024-09-28T23:47:40.683`)
|
||||
- [CVE-2023-49578](CVE-2023/CVE-2023-495xx/CVE-2023-49578.json) (`2024-09-28T23:15:11.840`)
|
||||
- [CVE-2023-49580](CVE-2023/CVE-2023-495xx/CVE-2023-49580.json) (`2024-09-28T23:15:11.977`)
|
||||
- [CVE-2023-49583](CVE-2023/CVE-2023-495xx/CVE-2023-49583.json) (`2024-09-28T23:15:12.090`)
|
||||
- [CVE-2023-50360](CVE-2023/CVE-2023-503xx/CVE-2023-50360.json) (`2024-09-28T23:44:50.720`)
|
||||
- [CVE-2023-50422](CVE-2023/CVE-2023-504xx/CVE-2023-50422.json) (`2024-09-28T23:15:12.223`)
|
||||
- [CVE-2023-50423](CVE-2023/CVE-2023-504xx/CVE-2023-50423.json) (`2024-09-28T23:15:12.360`)
|
||||
- [CVE-2023-50424](CVE-2023/CVE-2023-504xx/CVE-2023-50424.json) (`2024-09-28T23:15:12.477`)
|
||||
- [CVE-2024-21736](CVE-2024/CVE-2024-217xx/CVE-2024-21736.json) (`2024-09-28T23:15:12.587`)
|
||||
- [CVE-2024-24740](CVE-2024/CVE-2024-247xx/CVE-2024-24740.json) (`2024-09-28T23:15:12.777`)
|
||||
- [CVE-2024-25644](CVE-2024/CVE-2024-256xx/CVE-2024-25644.json) (`2024-09-28T23:15:12.907`)
|
||||
- [CVE-2024-25645](CVE-2024/CVE-2024-256xx/CVE-2024-25645.json) (`2024-09-28T23:15:13.020`)
|
||||
- [CVE-2024-25646](CVE-2024/CVE-2024-256xx/CVE-2024-25646.json) (`2024-09-28T23:15:13.110`)
|
||||
- [CVE-2024-28163](CVE-2024/CVE-2024-281xx/CVE-2024-28163.json) (`2024-09-28T23:15:13.217`)
|
||||
- [CVE-2024-30218](CVE-2024/CVE-2024-302xx/CVE-2024-30218.json) (`2024-09-28T23:15:13.313`)
|
||||
- [CVE-2024-33004](CVE-2024/CVE-2024-330xx/CVE-2024-33004.json) (`2024-09-28T23:15:13.420`)
|
||||
|
||||
|
||||
## Download and Usage
|
||||
|
77
_state.csv
77
_state.csv
@ -223701,7 +223701,7 @@ CVE-2023-31366,0,0,44bbd1f8a094e73a70261f57615c2508c43003e09aed16040afe9f888e90f
|
||||
CVE-2023-3138,0,0,8f5ffff3673e8f74abc6225a3f21e8fa48e79b4bc3826a6eddcc46862b33415a,2023-12-08T19:15:07.580000
|
||||
CVE-2023-3139,0,0,63da4e4c506673ff4b4b94c15b4d0285dc0dfef1076f2791ebbb5626e7d3bb6f,2023-11-07T04:17:58.783000
|
||||
CVE-2023-3140,0,0,83445c1e28eed50d0564a2961426f98d0d9629256d1766c5b66f60dd49997477,2023-06-16T18:06:57.083000
|
||||
CVE-2023-31403,0,0,d79da3cdab0bc95b4261a818ecab1aa68802fe2ed7e8c31fd9175361f432cd44,2023-11-20T19:51:15.823000
|
||||
CVE-2023-31403,0,1,5fdd8bee99db50a48168c6cf910fe676e9bca4f466ec47070ce8e0157b59b65a,2024-09-28T22:15:02.433000
|
||||
CVE-2023-31404,0,0,4a57aeaae211f48ce93cca38338dda9b5c9de161ecf2fe3caf1604ea95d230f7,2023-05-15T17:32:45.030000
|
||||
CVE-2023-31405,0,0,969cd152ec35e0bebe41113c42f762a1777df1496f01a3cb659d6f147453713f,2023-07-18T18:10:38.967000
|
||||
CVE-2023-31406,0,0,e6ef06b8d0d2e12fab5898067ddc6638d3129aa25756a52b02fc1cb7d45fb214,2023-05-15T17:32:21.943000
|
||||
@ -224166,7 +224166,7 @@ CVE-2023-32110,0,0,403939799f39a8ac61e8ea50435741a1b2f2651a1763f256a2753cbe37e9f
|
||||
CVE-2023-32111,0,0,f01715a3b0bc44a49da48dae37cd3b11e8b9bbed4cc01c89601fc7ba0af4538f,2023-05-15T17:28:48.667000
|
||||
CVE-2023-32112,0,0,500b473b63c35570e3a0b2dddf442bb4d1a3b8848e942367827f5ea7c50177f7,2023-05-15T17:23:48.290000
|
||||
CVE-2023-32113,0,0,52ed52d4859a67df002f37ed2aaa4d39ce83f116cf5e2d1969e6d90a53829143,2024-03-19T19:48:16.700000
|
||||
CVE-2023-32114,0,0,347b9f098c826e77e0ce34a5223cf89c4c2a99f74a9dfe723c619778f1b0bda0,2023-06-16T18:40:36.677000
|
||||
CVE-2023-32114,0,1,0a15609fb2b5b2d1029997b518de3da87d0e3877573815c744943e8e6b63156e,2024-09-28T22:15:02.783000
|
||||
CVE-2023-32115,0,0,c3c14f9a6502f271a5b9eb6d48d16bfe36993e42edd597f057b0ecc72ddd5ac5,2023-06-26T13:55:12.110000
|
||||
CVE-2023-32116,0,0,73b448578f57f99fb38509be1d12572fd9f535b4b34b69d6021322aeae71459e,2023-10-30T16:27:32.430000
|
||||
CVE-2023-32118,0,0,3a328632555ce7f7c1a25df14024a651316fcd182b26f56fd5747ddd62122166,2023-06-16T03:56:42.987000
|
||||
@ -225738,7 +225738,7 @@ CVE-2023-33987,0,0,730078fa5315ef4dca20cb30b6fea8294c9b2bb4cc35700a073ffc2a0bfb0
|
||||
CVE-2023-33988,0,0,5a9c91cc07fd432683ee76f164187371e9c7aa3ffdcf54a0baec998fbca758a9,2023-07-18T18:28:55.847000
|
||||
CVE-2023-33989,0,0,78a4bfda446152fc81c2aa547105a75bfab9012ec91d4d20afe82139fa563c61,2023-07-19T12:53:57.597000
|
||||
CVE-2023-3399,0,0,0f6f58d3cae0530810a7d8d7418ee7eb45cc2a247394b7c4ad89aefa7f49c8d5,2023-11-14T18:01:40.643000
|
||||
CVE-2023-33990,0,0,925b0628e0eeaceb8b87231c989b96f5c904a2815856c1ac4cf31755f81f9f28,2023-07-19T12:57:09.040000
|
||||
CVE-2023-33990,0,1,429bb9aafe8096479694a62b3f04dad25a8f4d047c435d55613482a4888c9b4c,2024-09-28T22:15:02.930000
|
||||
CVE-2023-33991,0,0,2c38f74b06b22d20412aca2a54d271209ee9b7d6cb3b275f1c6d85b506b373a3,2023-06-20T16:48:54.673000
|
||||
CVE-2023-33992,0,0,e0e448a5babd6ef7f5670d3b16701e514ec5e975dff13cd9e1ce223ebcd25efd,2023-07-19T13:24:24.817000
|
||||
CVE-2023-33993,0,0,3a1592208fe1bf22f9ee2f9110ed0966e9b504175fab9be2c10572f072b5c0b1,2023-08-15T15:09:12.373000
|
||||
@ -226960,11 +226960,11 @@ CVE-2023-35863,0,0,cbb3608b436941ca40fc8a80428d35db8eb42f5a5a45f413b4802ea90385c
|
||||
CVE-2023-35866,0,0,6d8702e252316d86b52dcc46d4f25a5da1013c148d3f195460a689452152e596,2024-08-02T17:15:48.717000
|
||||
CVE-2023-35867,0,0,5db923c7d14791cdd1ab7e9dc94705e30f35cb5d599aa351441dea1555738b42,2023-12-22T20:13:40.507000
|
||||
CVE-2023-3587,0,0,858fbdf3b83a95a9d9fa2568a9b573917ded232ef7c8c9c0bf0b541a05fd78c3,2023-07-27T19:40:35.700000
|
||||
CVE-2023-35870,0,0,2127cfe6f687ec9c9413ff129fa6ec0edc6fb0c654c6b0f9c0c780e2fd7d2ecc,2023-07-19T13:35:31.873000
|
||||
CVE-2023-35870,0,1,921e90eae30dd3932800aee7eba5ddcdccc6ee0964eb09f08d3c88f882a4bf08,2024-09-28T22:15:03.063000
|
||||
CVE-2023-35871,0,0,d43b3a693b7dc87781f1504dfdc1a0512dc65f88011ecf68fc3feb58581429a6,2023-08-14T14:15:10.587000
|
||||
CVE-2023-35872,0,0,46efe0a1a61cc48f94c5ffc8323d3526b2f917771157bbd207c0cd13135b8af4,2023-07-19T13:36:59.200000
|
||||
CVE-2023-35873,0,0,9be398fb5a578d66a8e050b22d237fc4e7262e6c90661c5198282761d7edf667,2023-07-19T15:27:53.343000
|
||||
CVE-2023-35874,0,0,f65431a0123b9df030788721d69d8bd466646c2fa9b613690a495994b497c061,2023-07-19T17:13:20.070000
|
||||
CVE-2023-35874,0,1,07d063e56172d4b330873c6a8a0017004b0e9740e74348b8a3a1bf876d0e0de9,2024-09-28T22:15:03.187000
|
||||
CVE-2023-35876,0,0,d18e0ce61960cccc57bf475a075bb7f424cb1062b297d3699e467aff78c0d9c5,2023-12-28T20:17:35.997000
|
||||
CVE-2023-35877,0,0,0ed125dbba11615c742d210b81261f0b496018687670d00a2fbc4ade0656a38a,2023-11-16T18:14:43.550000
|
||||
CVE-2023-35878,0,0,31806b46808d48e1b06bdfff9d6a9d20e621aec43eefb38af128b522c0380e3f,2023-06-27T15:16:31.900000
|
||||
@ -227818,7 +227818,7 @@ CVE-2023-36915,0,0,5d656d6742cd64232d331d79f144c5195083cbe66f00399e182bec51b9ac8
|
||||
CVE-2023-36916,0,0,67ac9d41aeea12b3c5abede45e587aaa746d1890bd1ab96299049df166b76c59,2024-04-09T21:15:11.227000
|
||||
CVE-2023-36917,0,0,63f41b496cca09ca13149b06a529715ca5422dd2b4ca4c74715fb23e43003f71,2023-07-18T17:01:51.703000
|
||||
CVE-2023-36918,0,0,ce15c2b3b21fc1790596c0ac8f2a6a976b4bc5b08101d2f149737c42c78576b2,2023-07-18T18:18:05.993000
|
||||
CVE-2023-36919,0,0,e7c8e3207a0198ed48239ab72cc3149687de3ea6b69edfd45837858bf4c8e836,2023-07-18T18:17:10.787000
|
||||
CVE-2023-36919,0,1,1076e2832e8aa0b910bf4b7db5a2747930ccd90a83d98859980dca73d8d75e3d,2024-09-28T22:15:03.313000
|
||||
CVE-2023-3692,0,0,d64ea2c78b76086a94b1a5c632af5e2d6ded6ee02b85b4c9f53744c42a27def5,2023-07-27T19:56:48.617000
|
||||
CVE-2023-36920,0,0,c6aa92f8fc7d3cbbad5f554b81599e99635f832f01ebef5100e7043fe53fad1d,2023-11-08T00:16:23.700000
|
||||
CVE-2023-36921,0,0,d14eb8e094eb26ebc2c221be24a1c18cdad698ab0655f977ead62c9cc244468d,2023-07-18T16:58:01.603000
|
||||
@ -228212,16 +228212,16 @@ CVE-2023-37479,0,0,65e698aeeec2de06015ebeeea50f3d8c2a3426ce2bf10b2923c6560b563e0
|
||||
CVE-2023-3748,0,0,fbda536dd4dc031ecda3b4a3649fdc6e53178f4339fdaffc9ef3ebd42ff82bf3,2023-11-07T04:19:28.013000
|
||||
CVE-2023-37480,0,0,652a3a23bafd305f9c2b7d3d1b87d3da5a01c6872bd5490c2366de4adbf638c6,2023-07-27T19:47:29.237000
|
||||
CVE-2023-37481,0,0,db4abe35e141784e06fa4f3deb2743fed370d0e6ce2c608fe66c51d91bc9a2ec,2023-07-27T19:48:07.587000
|
||||
CVE-2023-37483,0,0,6ddffa99077bae0c842b3cd031f05a68a5c733d4f8db7a21318ba0bf3c2abb41,2023-08-09T18:21:52.827000
|
||||
CVE-2023-37483,0,1,a06c307876460fd1997034979cd734b50178b62883eec0ec2aad9e9fe3eb8226,2024-09-28T22:15:03.433000
|
||||
CVE-2023-37484,0,0,760f55faa8c391cf557574d8b28bc1659926eabce351e2c7fb22d1954e7103de,2024-09-26T19:15:06.213000
|
||||
CVE-2023-37486,0,0,f6f5a77c2d0e52e0428914b15fd4265bdf16387c1cd190276d0f97f4c62a3254,2023-08-15T15:15:07.713000
|
||||
CVE-2023-37487,0,0,f76a2fd9614b732196506a47e0abbc2c3db3bd3d9201a0a6ea97da1fbd42691b,2023-08-09T18:21:30.300000
|
||||
CVE-2023-37486,0,1,687c614f5ca4a79aa3d21e7b0746a1427771024c9b5a884c3831416a73c97e9a,2024-09-28T22:15:03.550000
|
||||
CVE-2023-37487,0,1,dd465ff25b94ede3032e958cf77df90cbd7c58a152279b54e8b633ded141b6e2,2024-09-28T22:15:03.670000
|
||||
CVE-2023-37488,0,0,a032fbb6b6fb8d9ec7eaea4394794969b13cf8fc31e6b77ab71c16c0ca58d597,2023-08-15T14:54:40.297000
|
||||
CVE-2023-37489,0,0,1d24e14d654cea189a394fecb9c8bb7c050b6c0ec5ed17426a45133d2723e5bc,2023-09-14T02:07:38.067000
|
||||
CVE-2023-3749,0,0,79575f437c00db11c5bc0408c98a9b194331bfe98dd13f13102bfbfdb447b240,2023-08-09T15:39:05.463000
|
||||
CVE-2023-37490,0,0,d0afa82f8e1f60484edfa4ee4b02e342b7b84361f9859d350cae937d83586605,2023-08-09T18:21:14.410000
|
||||
CVE-2023-37491,0,0,cfc8810b41ae428e73649bc07462f6781a20054f51ecafe52270a98e7724ecd1,2023-08-09T18:20:38.800000
|
||||
CVE-2023-37492,0,0,bf4b459e0762189030ee469dc517203428f0488fe80b15c9ae25433ac18156b2,2023-08-09T18:20:16.060000
|
||||
CVE-2023-37491,0,1,f4f9aec1cccee79a8f65d739ee1fae55691219898360f98989170d7ce3b63272,2024-09-28T22:15:03.780000
|
||||
CVE-2023-37492,0,1,3201cae8021ed446e9e72842e5aed642bb38567a5b6d5d69dfeabfe2209387af,2024-09-28T22:15:03.890000
|
||||
CVE-2023-37495,0,0,88b1b51fbc2aad530bec1f2499429397c80ed14af053e3ad0aaa2da2a3d61382,2024-02-29T13:49:47.277000
|
||||
CVE-2023-37496,0,0,b3f6cf2213edd1b1c9a2df0a7e4e60f95ea00f20eade28d20d75195eb4a8af8d,2023-08-04T16:25:04.313000
|
||||
CVE-2023-37497,0,0,a16a802dd163d689a9d35dd104f0934c7f0cb9de2213c75db89f75dc9c196288,2023-08-08T14:49:09.140000
|
||||
@ -229827,12 +229827,12 @@ CVE-2023-39432,0,0,c2c5e4411d42152860b85e65fde776a03bb884049f8dd2a1bf7f1c7dfe4b0
|
||||
CVE-2023-39433,0,0,f891132ba414524367ca6e5b3376c4fd3194df781c7ccd69c825a121a915823e,2024-05-17T18:36:05.263000
|
||||
CVE-2023-39434,0,0,bc693e7754388058b19485a72219b0597d4d79b71ecc558e086fe03a669881fc,2024-01-31T15:15:09.663000
|
||||
CVE-2023-39435,0,0,2cde1591acdec05b9dded1c5b5ca1d20ab1200f3c8779b480c0f389d969c7be2,2024-08-02T18:16:11.260000
|
||||
CVE-2023-39436,0,0,107d83a698fc68171a413751026b5ba7898f39b2306fe2e180d902538a5279d0,2023-08-09T18:19:29.723000
|
||||
CVE-2023-39436,0,1,91dbd45fc6d7cbbfca5793894245e11bf171465babb030aa24b814b96ad3465e,2024-09-28T22:15:04.010000
|
||||
CVE-2023-39437,0,0,b841f4255101e124b17ae23b02cf5d1b090638a4fc3910c94f13b97ddb25767c,2023-08-09T18:19:10.230000
|
||||
CVE-2023-39438,0,0,65ceb1aac39048f0a3b0a9ed829593cfcea3d6c50c1e229c7605d6ec094188a4,2023-08-22T17:32:59.287000
|
||||
CVE-2023-39439,0,0,bf27882533b579af51afa70e227ee0cc4b300d19ed14becb29c2020767ae37ec,2023-08-15T15:28:19.137000
|
||||
CVE-2023-39438,0,1,8b59466a23cd4d7d7241f64763cc91bae48570db99077a0b129f81adc6171fcc,2024-09-28T22:15:04.123000
|
||||
CVE-2023-39439,0,1,34ef72977e4842aee96fb324aa892becfcd70f8ea4692a0db324f554980ef8a4,2024-09-28T22:15:04.243000
|
||||
CVE-2023-3944,0,0,df00d3557db6753bd6b2ad3c7f11ec86b8aa42d5dfb831d8b5f3e11df12ce829,2024-05-17T02:27:57.947000
|
||||
CVE-2023-39440,0,0,a1c9bf185968998e16532bd3fd85b1812cb101c4339be6a4ed481795b760b43c,2023-08-09T18:22:07.123000
|
||||
CVE-2023-39440,0,1,6a2f84855caa69d956f5aa7ff3d81683e8055e06632176c19aacf42c40cf5311,2024-09-28T22:15:04.350000
|
||||
CVE-2023-39441,0,0,1524af4c21eae8180b90656f56e4a47c0f827b489d48bce7311f67eaeb7fc6cb,2023-08-29T15:48:57.633000
|
||||
CVE-2023-39443,0,0,1a26c9a28c096baa05119ad2798651f43ab2b06c68ce772bef1bd6a634d5fb42,2024-04-09T21:15:15.770000
|
||||
CVE-2023-39444,0,0,8b67b0a3f75b53fd0b4a8e0d327154f6629b9f5e5973540fb30aa61cc1ab9e84,2024-04-09T21:15:15.873000
|
||||
@ -230478,7 +230478,7 @@ CVE-2023-40305,0,0,a709c79a40741227f412ea5137931cdb24c45c1293363bcf092e9d35a151d
|
||||
CVE-2023-40306,0,0,bd6bf8b0706e3eb9376e2fdb97bbf36506c5582490b9ed214eb2d3c01e19bf67,2023-09-13T00:38:01.823000
|
||||
CVE-2023-40307,0,0,ddcb42995f545b3dbd573d42be7cd65a62e5d161097fa3407e331e12871a2c1c,2023-10-02T17:49:25.247000
|
||||
CVE-2023-40308,0,0,98c43c86dcb343e085b8745a6568623d24b202c96e4353c1ce375574045aa4e5,2024-09-26T19:15:06.487000
|
||||
CVE-2023-40309,0,0,3158cd3d1c7afa39b9a5ea30dd125b54cd6bb09a46144632cf1f66ef4d734c63,2023-09-15T17:05:27.130000
|
||||
CVE-2023-40309,0,1,1b0bc6771b82c947113ef68944a1650f468aef63818b03d82f35201b0306ca2c,2024-09-28T22:15:04.460000
|
||||
CVE-2023-40310,0,0,aafae91f872ed8196d989ce6f92724af64aa9c420d18d46f56352ee69e0632df,2023-10-11T19:10:10.253000
|
||||
CVE-2023-40311,0,0,97ab1d90ac0eabc8fe9eefc1eb35bce10058e81ca86a8abc18ac988d8880435a,2023-08-23T17:04:28.627000
|
||||
CVE-2023-40312,0,0,acc8e0b15b4384682b1bc786a01efe9878d67c6d102843423d8c8719fa2528cf,2023-08-23T16:58:38.697000
|
||||
@ -230770,7 +230770,7 @@ CVE-2023-40617,0,0,3a460a0fe7b821688e96669bfca02ae7badd6e98fed7bf3e4d4aef8e02c15
|
||||
CVE-2023-40618,0,0,b22f1e470705cb01d295026df0efcfb6a0941d66f006698c10d413e612027e8a,2023-09-26T14:09:16.680000
|
||||
CVE-2023-40619,0,0,f1489f101809c6a30e839362b8151d60789a86328685856374a0c0ad5eacef3e,2023-11-03T11:15:08.183000
|
||||
CVE-2023-40621,0,0,03427c02c9886665707f46cfbc8e9c6c323eed2cb28445fd2559ec4dbb9a0abd,2023-09-13T14:46:22.113000
|
||||
CVE-2023-40622,0,0,b2e9290062f0b2384da64e95a8103714a30d28c2fae4e5bd7f8dd33b7bd72e91,2023-09-13T14:45:47.617000
|
||||
CVE-2023-40622,0,1,f4743d29cb785e0e3a8d8e81eda60ec8ac35200da2c21645734f661d2a256cd2,2024-09-28T22:15:04.610000
|
||||
CVE-2023-40623,0,0,5ee5e0592116f6d4636a97205259d6bf210e0a97114ba463eaa2c70bbcfc42a1,2023-09-13T14:45:19.633000
|
||||
CVE-2023-40624,0,0,747cb3d54257bb2c6b03c46b6a0b19e07ee27d544e5eeb8ae834154eb4c91df8,2023-09-15T16:24:06.913000
|
||||
CVE-2023-40625,0,0,f9655b86ad188075706103365b8f2083509d75f1e65a1d7efba6dfc1f629e08d,2023-09-13T14:59:43.357000
|
||||
@ -232086,14 +232086,14 @@ CVE-2023-42471,0,0,3d47fcf90090571e29593e83e592637a2983aee4c755b0502ea61f6a8ff0f
|
||||
CVE-2023-42472,0,0,d4b6e31aad9009b5c9e01ff4d5ef8ee885211dca89fab65e12e85f27feca21c4,2023-09-13T15:01:22.793000
|
||||
CVE-2023-42473,0,0,3dc315884c13bf461401454525346c0be60bd374f097b946976815a94631c8ed,2023-10-11T19:10:40.223000
|
||||
CVE-2023-42474,0,0,481ae6b0e8f41d4d61d692a5cd2060771c556db8f6828058322fe13af59a07a2,2023-10-11T19:14:12.600000
|
||||
CVE-2023-42475,0,0,c663c83ade1f09b59456913c44e927bada30d46f7e905ad0bea997b37405208e,2023-10-11T19:14:53.293000
|
||||
CVE-2023-42475,0,1,c1b0ee1eba3e5fb512186b0dc30efe85ed7379b2a5ac26055cf44270cbad052b,2024-09-28T23:15:11.563000
|
||||
CVE-2023-42476,0,0,3b3dd9807a0f4ed6ce2468f7a4ed8fe4e9ea19bf3c6d0591c051ac24ff0ad738,2023-12-14T00:07:10.443000
|
||||
CVE-2023-42477,0,0,fec4e6b685afd7509507459ccf95b2de9653675dc5d035947dec6f17dda7c351,2023-10-16T18:14:29.393000
|
||||
CVE-2023-42478,0,0,c4c7f09ad08c692378f0a61d49fca19f206097275d23bd3ca18b775839aec945,2023-12-13T23:23:46.593000
|
||||
CVE-2023-42479,0,0,f0b1e6ab673626b705998f4f2380ee9d6acf6b1d897467ec67c33bbfa23aabf0,2023-12-15T14:49:29.267000
|
||||
CVE-2023-4248,0,0,938b672c9f5bfea09c245c341d3b357ab47d1817c22604b02cdc3f59b07bf2f0,2024-01-17T00:00:16.260000
|
||||
CVE-2023-42480,0,0,b4c996dc097786af55fa5d04a9ac4df88342c244f821e059bb278dc9d11beef4,2023-11-20T19:59:14.070000
|
||||
CVE-2023-42481,0,0,b58b94638fccc46f1140f776c6206097494ba9d23b4e21c2a2062076d51216d3,2023-12-13T23:54:39.960000
|
||||
CVE-2023-42481,0,1,24868d5de151eec6717fda4925ac65c6552a60bcbde5db803be9c2861b2ed7f3,2024-09-28T23:15:11.717000
|
||||
CVE-2023-42482,0,0,9c5cada0b75438fb7635b87fbd7757cce171c67bbc4934b1768b3b34aa22b31c,2023-09-23T03:33:36.887000
|
||||
CVE-2023-42483,0,0,884b55162d96c6c79bd2f0068448c5d90c631bb990c572d1d302d6389b80e217,2023-12-15T19:13:42.503000
|
||||
CVE-2023-42486,0,0,033e47c7d5f41ab68591c7c5f1ab98fccccaf7fc715f16f8625db94f13953ee8,2023-09-28T17:50:46.877000
|
||||
@ -233743,7 +233743,7 @@ CVE-2023-4503,0,0,9a35d49a48b71f7276fb8172166d6d1aecccabc3aade6184e25e8c96138a6a
|
||||
CVE-2023-45035,0,0,48123901d1326f450c18d3b0ccad106d9e148b3033fe2b672e89055fc85cad07,2024-02-08T03:48:56.403000
|
||||
CVE-2023-45036,0,0,5b3e2bf8b11caa6b50968173d283a1eec4ca6a58ec51bfb3f0740601e12c6547,2024-02-06T20:18:45.043000
|
||||
CVE-2023-45037,0,0,d9bef7c23ea9eb8863eec401793407eae857058b6098d8a56b377750f03a7bed,2024-02-06T20:18:34.557000
|
||||
CVE-2023-45038,0,0,20fef31377818e2b437a887eb4f5a6cebd8f7a1ac1e8a406b25c4aaf5eb1496a,2024-09-09T13:03:38.303000
|
||||
CVE-2023-45038,0,1,067d3daf830335f4445bbcc95af30c7b0b231a5ec96e22c57e090e46928a561f,2024-09-28T23:51:34.580000
|
||||
CVE-2023-45039,0,0,e8930afda8d133bbe65ee717cfe9224bd9cb5c74f33c400953a957a39946a6d1,2024-01-10T16:59:35.883000
|
||||
CVE-2023-4504,0,0,48b788a38cbf3794838d5825f4a3d5b50fb58219a94aae40cd43de2ab240310f,2023-11-09T20:58:00.163000
|
||||
CVE-2023-45040,0,0,4264dd7f7c1bfe78bdbabea796f0de0efca1ab106d71d9c726cef2ae7b66f8b6,2024-01-10T16:57:27.477000
|
||||
@ -235586,7 +235586,7 @@ CVE-2023-4756,0,0,60c65032e5b93776fef6f38ba2fedf37023289c4f2a24ceb78bc3b2f406a9e
|
||||
CVE-2023-47560,0,0,5ac28e7e9a66106b736371a34b3097e66ad1cda34200867e184b83d8e20d363c,2024-01-11T14:07:09.593000
|
||||
CVE-2023-47561,0,0,8c6823c8294618b7f2c78f304596bd27d313bc780b9a248a6002fe2f9ebd6d0f,2024-02-07T17:51:35.570000
|
||||
CVE-2023-47562,0,0,eed5fa12d7eedb3933e2c8a9aa4171d8041e9fcfcc221d3d86745eee17563b9c,2024-02-07T17:50:38.510000
|
||||
CVE-2023-47563,0,0,39305aeade9593fe001a9b2fa8779e8df536095891c00baf05da0a2a366851ac,2024-09-09T13:03:38.303000
|
||||
CVE-2023-47563,0,1,a18ec77086e0b85a091c4b2d33d65478f0d4b9cad261c6a0c8d5816eb317a727,2024-09-28T23:47:40.683000
|
||||
CVE-2023-47564,0,0,34d735757dd301c9641e82718c2dd925495c3b8fb8af8ff042788502c1634ad5,2024-02-09T19:33:26.900000
|
||||
CVE-2023-47565,0,0,282333723d94196bbefe55ff568702e2610a6820a9456aa9fe6ac73919207aea,2023-12-22T02:00:01.337000
|
||||
CVE-2023-47566,0,0,26a4a10ebe40b2b5bf6badce33dd8f30d8b09a56a91b1061398ee28499d68a36,2024-02-06T20:18:26.263000
|
||||
@ -237054,12 +237054,12 @@ CVE-2023-49573,0,0,668d26e17886603090861420f97df7110444aa6097038cffa9edd3fe881cb
|
||||
CVE-2023-49574,0,0,cf12ec560e66df2f8e6fe14be56965158911ec99b9b79f08d7d31fadd9d28d5f,2024-05-24T18:09:20.027000
|
||||
CVE-2023-49575,0,0,ac9ff4377f1f3563c349897d2a2875f9aff8e7a6d6bd9465a4e338b042bba3c4,2024-05-24T18:09:20.027000
|
||||
CVE-2023-49577,0,0,337a8413375455feea032808d84500f8744a9a8b52d72a926a4fb84eb6b7aad8,2023-12-19T14:50:18.817000
|
||||
CVE-2023-49578,0,0,554376a4a5e89af7792fb2e3caaee83c155712344a4b55572197b12bfc2f727a,2023-12-15T14:32:38.473000
|
||||
CVE-2023-49578,0,1,1167f5734b8f433be63e1ed4f7be6d7f7a0ce424c44e3fe6e46dc74ec52fce97,2024-09-28T23:15:11.840000
|
||||
CVE-2023-4958,0,0,b9fc19622ba6df397f2314bb1498399d57a97d8d3d77e1be35cc528df3591ff4,2024-05-03T16:15:11.227000
|
||||
CVE-2023-49580,0,0,815954f9407b74402abcfb36fe3f08f951a3ae3d064781c18823d1ab5df6702f,2023-12-19T14:50:39.843000
|
||||
CVE-2023-49580,0,1,1fe00926918ee94ed5d0f65be26556c618ba07b3209d13ab98392975d7829a67,2024-09-28T23:15:11.977000
|
||||
CVE-2023-49581,0,0,c752d9c8b49d3a50b30e010fb1e627be8921c15cd9f5ebf74ca53588cf11cd1e,2024-01-16T14:15:48.123000
|
||||
CVE-2023-49582,0,0,254586a5bd35da117db3a87fcbf0665709da9c852d76af64aed9d2b7bc82d1ec,2024-08-27T16:04:58.657000
|
||||
CVE-2023-49583,0,0,2bbc4069f5dd786f8918873219f212a951808fc3c08912cfca16a05ba9ea4494,2024-01-09T02:15:45.140000
|
||||
CVE-2023-49583,0,1,17a566852cc5bd1ad30f2730f7b7805c66d84960c5d6f97f747b6a073ca3776f,2024-09-28T23:15:12.090000
|
||||
CVE-2023-49584,0,0,12b0484dfd67af5cdba226de40078067413392935bfd8575322e5980ac90dd4f,2023-12-15T14:26:47.663000
|
||||
CVE-2023-49587,0,0,b72e8cc0e0b1f24503bc21b9e5a03faa03723a19fc8b810902b73346efe7215f,2023-12-14T15:41:25.777000
|
||||
CVE-2023-49588,0,0,da1e9f5316d05f0feeebf32eba644409b9293543014b6e46be9637d63d764393,2024-02-14T18:15:46.310000
|
||||
@ -237592,7 +237592,7 @@ CVE-2023-50357,0,0,c49fba6a6b8ae43153115bdc180d0a50fda6badb9bd287f826717a708c649
|
||||
CVE-2023-50358,0,0,affeae249fec946895d3bef4063e720c758024b3343a9b8cb10accf20047afe3,2024-02-15T06:15:45.960000
|
||||
CVE-2023-50359,0,0,017df15c1e36b7a4da9c2a548d3a19bcce6cc2270ecdf18aa860e29b8b47570d,2024-02-06T20:18:14.547000
|
||||
CVE-2023-5036,0,0,142ff7c8f9f78ca5371b9c6802e1971802347d9f04e927ee76b2acbd83ef8ec5,2023-09-19T13:18:54.193000
|
||||
CVE-2023-50360,0,0,19cb0c6712f1a903163d12dd49d9d935fcb1d184a64fe55d7987afb650b9501c,2024-09-09T13:03:38.303000
|
||||
CVE-2023-50360,0,1,27634f79a715ec48d12d4c3552f14cf2df45a967ec21f459defca999b97ed253,2024-09-28T23:44:50.720000
|
||||
CVE-2023-50361,0,0,188b58f48ae349f3b9eaaccb10078a3e7a1f81ce543b15434a0caf573d93d149,2024-09-11T13:25:10.873000
|
||||
CVE-2023-50362,0,0,31a964a4db386c4376a063900f0da816b2224f83fc7dcc60de4592c35a7b4c69,2024-09-11T13:26:57.707000
|
||||
CVE-2023-50363,0,0,a3e5f8527cf755f8b94f6ecd1f1ebe83c8a25ee2cb0536cd8287e4c1acfd8207,2024-09-11T13:30:17.090000
|
||||
@ -237619,9 +237619,9 @@ CVE-2023-50387,0,0,570d9f4f035f72cf75b6fb2ec7a865d346eadbb37e839bf469ab56bd506c2
|
||||
CVE-2023-50395,0,0,0e94ac3a53ddd522dfa1daba7864a823ebeef0121cec6b5f6750eb619a73d637,2024-02-13T20:35:06.703000
|
||||
CVE-2023-5041,0,0,edfc474d6f8955b06b6b129c14854ffb36763d854b8ade07d6bf9f3581fc855e,2024-01-24T19:20:29.410000
|
||||
CVE-2023-5042,0,0,17be57ec49e4200dc6b7de1783f7771b7237e91348201a865d65f3f8ff47b98d,2023-09-25T13:25:16.230000
|
||||
CVE-2023-50422,0,0,624c27edd4b3bfc029c7f12e197c32b34c1906754e2ad8d27cfb2937fe4099a8,2024-01-09T02:15:45.420000
|
||||
CVE-2023-50423,0,0,ed806015b67283c87858c17058bafbfd7ccbd554290762a1244fb3d2e8610e1e,2023-12-15T16:53:22.867000
|
||||
CVE-2023-50424,0,0,0f517a9e1d3d830ab081f35615260440ec2df7800af1240f860d01ea4fe4fc7c,2023-12-15T16:53:04.417000
|
||||
CVE-2023-50422,0,1,2e74a3fef27ae16d3512ba178b2cd1f8610f89b13a942b920a7dd95c102fa33c,2024-09-28T23:15:12.223000
|
||||
CVE-2023-50423,0,1,2150b034245e11b7172ea5c3d421807e644ba644bc75de8c2a84617f8a025ff4,2024-09-28T23:15:12.360000
|
||||
CVE-2023-50424,0,1,8c5083bac1ff92e08b481a632dbb35f753fe85f3cc8cb2fe6559ea5bb3362c14,2024-09-28T23:15:12.477000
|
||||
CVE-2023-50428,0,0,24e245a5620aa9efed1739f31f330f49d3b1e7340a02a534f07d622180c9ee2a,2024-08-02T23:15:27.933000
|
||||
CVE-2023-50429,0,0,cf7c3990876d34813be7786260b9d58e3f0ef74bfa3057d97d875c61dd198c94,2023-12-14T14:33:52.857000
|
||||
CVE-2023-5043,0,0,24549f6a594c400161517cb178315694a2db415c3b53eae682adf0618aa705bf,2024-03-07T17:15:11.983000
|
||||
@ -244299,7 +244299,7 @@ CVE-2024-21732,0,0,5b8477386d174238a16ab6890c874c5b9a2e295383724c8992520c310a411
|
||||
CVE-2024-21733,0,0,5c1944b5f993b5404fdb05bb0e77d12a8bf708110b872f1231cf5e420e715391,2024-02-16T13:15:10.190000
|
||||
CVE-2024-21734,0,0,885365a84c85d383ea10609ce715ea65d1a8ab1acecb51a21fedb1fc4873fc73,2024-01-12T16:34:40.870000
|
||||
CVE-2024-21735,0,0,64afeafd3ca5ebe95ef19b8cb0b1a221cb3831f7e736f22e7bca2463c0261a93,2024-01-30T22:15:53.150000
|
||||
CVE-2024-21736,0,0,794296433b0b6c553cd106f1bd31a638f539e91ea6f82e61204a43660acdc041,2024-01-19T17:30:01.407000
|
||||
CVE-2024-21736,0,1,54442fb9b042c5f4e212c801d8862949178fa83601b4c5ba313c1abbb63c3c64,2024-09-28T23:15:12.587000
|
||||
CVE-2024-21737,0,0,59ff5ff1f6beafb8f0d3418ea62fa9e84b0ab8ac80ddfb91af2e3d93d716a188,2024-01-16T17:45:47.083000
|
||||
CVE-2024-21738,0,0,ee493f18830fa61778a839e41065e0a164cfc7a69da412e6c6babcc4b17cc105,2024-01-11T22:54:02.190000
|
||||
CVE-2024-21739,0,0,74c51cc55d726fea23dbc7423ad28b618c0ad3e8f250404a9e572e22bf0444c5,2024-06-26T12:44:29.693000
|
||||
@ -246242,7 +246242,7 @@ CVE-2024-2473,0,0,b1c39f683d6b313337fd343b6b650f75d80b2d74ff0a3d50cf1f445968eec6
|
||||
CVE-2024-24736,0,0,314fd4df2659ae516d75e93823704bd217b531c9ea252f3ea384402e73f605e1,2024-02-02T02:08:23.417000
|
||||
CVE-2024-24739,0,0,e6ef264a93a50eff13b25a0b1f96966e49da366ebdc1c075ecbe225ac111b0c5,2024-02-13T14:01:40.577000
|
||||
CVE-2024-2474,0,0,e295561a11995d9c40e939a773b47208b6445581a981c9a04645753adc140ddf,2024-03-20T13:00:16.367000
|
||||
CVE-2024-24740,0,0,055e621299fb8cfa25051c1c9b5b6e90ccf0de6c197861466b8c657e95fd4986,2024-02-13T14:01:40.577000
|
||||
CVE-2024-24740,0,1,5a0025656e10ede9df3e0999b52fcdfd5a23388b4b1c6503aed4b2448caac40f,2024-09-28T23:15:12.777000
|
||||
CVE-2024-24741,0,0,055f4a536b488558e042e77fcf1dc4ede8dc674d4e491c7a235734621d72b4a1,2024-02-13T14:01:40.577000
|
||||
CVE-2024-24742,0,0,87b67dd3de4a42ff5193bf6db8fa126263e616b4bc4dcdea2d08157e23dce2d0,2024-02-13T14:01:40.577000
|
||||
CVE-2024-24743,0,0,951e24161363ed6730298781326eb91e2e05dd09153b345d01a5eecb04bc8312,2024-02-13T14:01:40.577000
|
||||
@ -246894,9 +246894,9 @@ CVE-2024-25640,0,0,3bceb9b54384127c8987d6d0f984f439fa5009d13bcb784ca7a9cb2c455ef
|
||||
CVE-2024-25641,0,0,676a26b1b2c12534fcd8ac5d05e0285f4f22783fa69470781479894a7e859c5d,2024-06-10T17:16:21.837000
|
||||
CVE-2024-25642,0,0,62b98db44a08196f7b7012c39faaf86e5ea68b1167c724b1b57391d731cd46b5,2024-06-10T17:16:21.947000
|
||||
CVE-2024-25643,0,0,531b402e512e75c4384caa610ae811e75e61e13fefc89fff8eb67c6e4dee7cdd,2024-02-13T14:01:07.747000
|
||||
CVE-2024-25644,0,0,3219e2e709e527015a48516ae6dfaf602d72b63a8b92f510428759964fa2ea48,2024-03-12T12:40:13.500000
|
||||
CVE-2024-25645,0,0,5e73536a8c6d34e4b421ffd125622fb4637ca2ae5f29dc9f1d9e4ca68f957637,2024-03-12T12:40:13.500000
|
||||
CVE-2024-25646,0,0,f96a3838d7373a7e4c4d8dbfc1fa5fddee970ebb06619f04a6a27f836ef12886,2024-04-09T12:48:04.090000
|
||||
CVE-2024-25644,0,1,b702cfb10f1d9840e7089aa6d4444498e1a0b1a9f6491295ca80b70c56a42bd0,2024-09-28T23:15:12.907000
|
||||
CVE-2024-25645,0,1,6bd46b6b76bf2191c2da23dbf63dbdf0c2ad3d8c1e837e15d8adaddae98d01c1,2024-09-28T23:15:13.020000
|
||||
CVE-2024-25646,0,1,a101219cbb661ecbc967b4403965684b4e383408a09ced0696a5c771abd09b61,2024-09-28T23:15:13.110000
|
||||
CVE-2024-25648,0,0,43a3c9df6a9798012b99a2670068513af50de7590b4bfb346569d85e9cedfb11,2024-04-30T17:52:35.057000
|
||||
CVE-2024-25649,0,0,699eb0c1b6c1eb28f54aa653e10ca84f6b536f18d39e73450a463cbb2c01c545,2024-08-27T19:35:14.950000
|
||||
CVE-2024-2565,0,0,343041114de587054fc8697fd61433e361f1d5090f96a5bc5840cfbd0d3fa764,2024-05-17T02:38:19.613000
|
||||
@ -248952,7 +248952,7 @@ CVE-2024-2816,0,0,1ff2465397674739fa53ccc9486babdbd16fc63821544c8b1e2bf9f4ddfd16
|
||||
CVE-2024-28160,0,0,241bfdb3674a34e6849fc0ad74b8b7e2c84a649745fec71e6a1d767d5a523265,2024-05-01T18:15:17.143000
|
||||
CVE-2024-28161,0,0,732a0ccf3a0c78179498ba4c5715c7787b053aa5997b6e9c437de4d97e88e833,2024-05-01T18:15:17.180000
|
||||
CVE-2024-28162,0,0,1ec7e71177e25cd293cbbf1e2069c505933e30b0255293c8f25c76750a7bdefc,2024-05-01T18:15:17.223000
|
||||
CVE-2024-28163,0,0,2ab950e2f7c3eb99ef2d44d7cd9af8946dbe397a4a6d73bb020329a22bfd44bc,2024-03-12T12:40:13.500000
|
||||
CVE-2024-28163,0,1,b559a456c891fdcf20fbbbab8887f6be9d0dfdc7fd048fd9d3a99e789aac31bd,2024-09-28T23:15:13.217000
|
||||
CVE-2024-28164,0,0,ad548c66e5661c4e8af5a7b236b78552ef27421cd91cd0f63f8c805acf9b4cbb,2024-08-06T16:40:49.433000
|
||||
CVE-2024-28165,0,0,46715a30feb276737abc87d7ed511464bf9b4ab74c972d46bf629bd896d4f942,2024-05-14T19:18:31.490000
|
||||
CVE-2024-28166,0,0,d799c0db8419cc219426077b2570c40e187024e21f6e37f4e3723cf31620790d,2024-09-16T16:17:15.540000
|
||||
@ -250282,7 +250282,7 @@ CVE-2024-30214,0,0,cf5accb9e4a3278486a75d6623c8c03abb4ef1fc50fe46650d28f97df932b
|
||||
CVE-2024-30215,0,0,3576a060ab4a3509fa025a4a09e391456b98e8a3ff1f9ef6a6adfedd520e279a,2024-04-09T12:48:04.090000
|
||||
CVE-2024-30216,0,0,317fbed0703b9e56e6e6659964629ef86247b3618fd61971d8544005edb73b9f,2024-04-09T12:48:04.090000
|
||||
CVE-2024-30217,0,0,dc7c143bac3a66c1917b4b2e1e571544199576af15f1c229990a317af3df58ab,2024-04-09T12:48:04.090000
|
||||
CVE-2024-30218,0,0,8a69e19ff6d45dba2fc3fe9cbec76c5157ffdbe210f0a0375f9b6ca12b157aa5,2024-04-09T12:48:04.090000
|
||||
CVE-2024-30218,0,1,5f669f8b672f21460455ea72a76ee594e61362d8a5948a66529555605773b70d,2024-09-28T23:15:13.313000
|
||||
CVE-2024-30219,0,0,58a0ce96139e860887241ec214de08a83f6a295a69c273470160597230c476b7,2024-08-02T02:15:21.560000
|
||||
CVE-2024-3022,0,0,5e468669a1bf6780e691c70abcdca6d29e576f4158c740ba44cf88cd33320476,2024-04-04T12:48:41.700000
|
||||
CVE-2024-30220,0,0,cdf9eb92198fd5f7ed28a64003f236fba45aaa8db3640801c81262851b43cc57,2024-08-02T02:15:21.620000
|
||||
@ -252392,7 +252392,7 @@ CVE-2024-33000,0,0,4fa8fb2595c0457675d86cac50d60385335480588f2754c16c92238c89528
|
||||
CVE-2024-33001,0,0,e89dbc37b1bbada386268abb25bbfd26ba11d29f63337f64d12b9c9ded295629,2024-08-09T19:36:18.637000
|
||||
CVE-2024-33002,0,0,bbd8f2f002227dcd69fa7ae031c0a1ecfe37f7776553c4961a527a6eaa21d480,2024-05-14T19:17:55.627000
|
||||
CVE-2024-33003,0,0,f92d99f5ef6ac0dd2fa77c8e3e4a82297fdecac133b0dd0df2ea5b03733ef6c0,2024-09-16T16:22:07.617000
|
||||
CVE-2024-33004,0,0,fd3947efc9f6a79b80c112947403a2b0a9c6fdaf32bf5c0bd7b38f5115845055,2024-07-03T01:57:23.963000
|
||||
CVE-2024-33004,0,1,b4d4e30a06e9114efbe213bcb0a187e38c5d8d0f9c07694c65f258c76ba852d6,2024-09-28T23:15:13.420000
|
||||
CVE-2024-33005,0,0,b6e8581506b98b3d048c876ef09153cc5329e2b3c294dcc9c0512597d7564067,2024-09-12T14:39:03.480000
|
||||
CVE-2024-33006,0,0,36d8448e64529b3242e1d14d3223c50e6fc2fd869abf9e54a01bde3e4dc1ca08,2024-05-14T19:17:55.627000
|
||||
CVE-2024-33007,0,0,8e38d5b6d2b9eb1b80b7c4b68a0aa966535c1221f485493f9e187b5af17c2ba9,2024-07-03T01:57:24.730000
|
||||
@ -264095,5 +264095,6 @@ CVE-2024-9299,0,0,799e3f49439baf2432b26834e94671a2c07ca8bcc110298b74e6fbc73a1e52
|
||||
CVE-2024-9300,0,0,4aee81e48dbe8631e425ca1253bf1fefcd0e37e8736692eb326116d6964fe2c0,2024-09-28T15:15:14.263000
|
||||
CVE-2024-9301,0,0,f7d62ae99cd0d6877c5db63fcb4f2c0f8f043fbb8339f25415912b7f29acecf1,2024-09-27T18:15:06.163000
|
||||
CVE-2024-9315,0,0,1aaf0b25bc5db159a5983cc16616c1ec4eda1359782a55e5468dbd7b3fd618c0,2024-09-28T19:15:12.353000
|
||||
CVE-2024-9316,1,1,885b5aadb6325a477167b023e058998d0e537cb489dccafe50b89208946e54a4,2024-09-28T20:15:02.280000
|
||||
CVE-2024-9317,1,1,690e444ec011bf1361fdd2bbc9cdec3497358092c2cc8cdf0f08f746b48adc8b,2024-09-28T21:15:10.783000
|
||||
CVE-2024-9316,0,0,885b5aadb6325a477167b023e058998d0e537cb489dccafe50b89208946e54a4,2024-09-28T20:15:02.280000
|
||||
CVE-2024-9317,0,0,690e444ec011bf1361fdd2bbc9cdec3497358092c2cc8cdf0f08f746b48adc8b,2024-09-28T21:15:10.783000
|
||||
CVE-2024-9318,1,1,359284304f599d5b46dabbdd36eaf80d2e0ebae0fa4900079642b914d1c2b0ed,2024-09-28T23:15:13.530000
|
||||
|
Can't render this file because it is too large.
|
Loading…
x
Reference in New Issue
Block a user