mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-06-19 17:31:42 +00:00
Auto-Update: 2024-08-08T18:00:17.302181+00:00
This commit is contained in:
parent
7a14064f97
commit
ea48197151
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2022-48662",
|
||||
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"published": "2024-04-28T13:15:07.937",
|
||||
"lastModified": "2024-04-30T15:03:30.553",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2024-08-08T16:35:01.007",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -36,6 +36,26 @@
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 5.9
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 7.8,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -49,6 +69,16 @@
|
||||
"value": "NVD-CWE-noinfo"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-119"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2023-50008",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-04-19T17:15:52.013",
|
||||
"lastModified": "2024-06-10T18:15:23.660",
|
||||
"lastModified": "2024-08-08T16:35:02.053",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -15,7 +15,42 @@
|
||||
"value": "Vulnerabilidad de desbordamiento de b\u00fafer en Ffmpeg v.n6.1-3-g466799d4f5 permite a un atacante local ejecutar c\u00f3digo arbitrario a trav\u00e9s de la funci\u00f3n av_malloc en el componente libavutil/mem.c:105:9."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 7.8,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-120"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/FFmpeg/FFmpeg/commit/5f87a68cf70dafeab2fb89b42e41a4c29053b89b",
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2023-50702",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-03-26T23:15:46.587",
|
||||
"lastModified": "2024-03-27T12:29:30.307",
|
||||
"lastModified": "2024-08-08T16:35:03.110",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -15,7 +15,42 @@
|
||||
"value": "Sikka SSCWindowsService 5 2023-09-14 ejecuta un programa como LocalSystem pero permite el control total por parte de usuarios con pocos privilegios (y los usuarios con pocos privilegios tienen acceso de escritura a %PROGRAMDATA%\\SSCService). En consecuencia, los usuarios con pocos privilegios pueden ejecutar c\u00f3digo arbitrario como LocalSystem."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 8.8,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-284"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.youtube.com/watch?v=3dCoV33y1WY",
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2023-5397",
|
||||
"sourceIdentifier": "psirt@honeywell.com",
|
||||
"published": "2024-04-17T17:15:13.240",
|
||||
"lastModified": "2024-04-17T20:08:21.887",
|
||||
"lastModified": "2024-08-08T16:35:04.180",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -36,6 +36,26 @@
|
||||
},
|
||||
"exploitabilityScore": 2.2,
|
||||
"impactScore": 5.9
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "HIGH",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 8.1,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.2,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -49,6 +69,16 @@
|
||||
"value": "CWE-20"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-20"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
|
56
CVE-2024/CVE-2024-01xx/CVE-2024-0101.json
Normal file
56
CVE-2024/CVE-2024-01xx/CVE-2024-0101.json
Normal file
@ -0,0 +1,56 @@
|
||||
{
|
||||
"id": "CVE-2024-0101",
|
||||
"sourceIdentifier": "psirt@nvidia.com",
|
||||
"published": "2024-08-08T17:15:17.560",
|
||||
"lastModified": "2024-08-08T17:15:17.560",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "NVIDIA Mellanox OS, ONYX, Skyway, MetroX-2 and MetroX-3 XC contain a vulnerability in ipfilter, where improper ipfilter definitions could enable an attacker to cause a failure by attacking the switch. A successful exploit of this vulnerability might lead to denial of service."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "psirt@nvidia.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 7.5,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "psirt@nvidia.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-693"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://nvidia.custhelp.com/app/answers/detail/a_id/5559",
|
||||
"source": "psirt@nvidia.com"
|
||||
}
|
||||
]
|
||||
}
|
56
CVE-2024/CVE-2024-01xx/CVE-2024-0102.json
Normal file
56
CVE-2024/CVE-2024-01xx/CVE-2024-0102.json
Normal file
@ -0,0 +1,56 @@
|
||||
{
|
||||
"id": "CVE-2024-0102",
|
||||
"sourceIdentifier": "psirt@nvidia.com",
|
||||
"published": "2024-08-08T17:15:18.013",
|
||||
"lastModified": "2024-08-08T17:15:18.013",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "NVIDIA CUDA Toolkit for all platforms contains a vulnerability in nvdisasm, where an attacker can cause an out-of-bounds read issue by deceiving a user into reading a malformed ELF file. A successful exploit of this vulnerability might lead to denial of service."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "psirt@nvidia.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "LOW",
|
||||
"baseScore": 3.3,
|
||||
"baseSeverity": "LOW"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 1.4
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "psirt@nvidia.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-125"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://nvidia.custhelp.com/app/answers/detail/a_id/5548",
|
||||
"source": "psirt@nvidia.com"
|
||||
}
|
||||
]
|
||||
}
|
56
CVE-2024/CVE-2024-01xx/CVE-2024-0107.json
Normal file
56
CVE-2024/CVE-2024-01xx/CVE-2024-0107.json
Normal file
@ -0,0 +1,56 @@
|
||||
{
|
||||
"id": "CVE-2024-0107",
|
||||
"sourceIdentifier": "psirt@nvidia.com",
|
||||
"published": "2024-08-08T17:15:18.240",
|
||||
"lastModified": "2024-08-08T17:15:18.240",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "NVIDIA GPU Display Driver for Windows contains a vulnerability in the user mode layer, where an unprivileged regular user can cause an out-of-bounds read. A successful exploit of this vulnerability might lead to code execution, denial of service, escalation of privileges, information disclosure, and data tampering."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "psirt@nvidia.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 7.8,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "psirt@nvidia.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-125"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://nvidia.custhelp.com/app/answers/detail/a_id/5557",
|
||||
"source": "psirt@nvidia.com"
|
||||
}
|
||||
]
|
||||
}
|
56
CVE-2024/CVE-2024-01xx/CVE-2024-0108.json
Normal file
56
CVE-2024/CVE-2024-01xx/CVE-2024-0108.json
Normal file
@ -0,0 +1,56 @@
|
||||
{
|
||||
"id": "CVE-2024-0108",
|
||||
"sourceIdentifier": "psirt@nvidia.com",
|
||||
"published": "2024-08-08T17:15:18.473",
|
||||
"lastModified": "2024-08-08T17:15:18.473",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "NVIDIA Jetson Linux contains a vulnerability in NvGPU where error handling paths in GPU MMU mapping code fail to clean up a failed mapping attempt. A successful exploit of this vulnerability may lead to denial of service, code execution, and escalation of privileges."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "psirt@nvidia.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:L",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "LOW",
|
||||
"baseScore": 8.7,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.0,
|
||||
"impactScore": 6.0
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "psirt@nvidia.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-755"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://nvidia.custhelp.com/app/answers/detail/a_id/5555",
|
||||
"source": "psirt@nvidia.com"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-22633",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-04-26T04:15:08.910",
|
||||
"lastModified": "2024-04-26T12:58:17.720",
|
||||
"lastModified": "2024-08-08T16:35:05.543",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -15,7 +15,42 @@
|
||||
"value": "Se descubri\u00f3 que el Setor Informatica Sistema Inteligente para Laboratorios (SIL) 388 conten\u00eda una vulnerabilidad de ejecuci\u00f3n remota de c\u00f3digo (RCE) a trav\u00e9s del par\u00e1metro hprinter. Esta vulnerabilidad se activa mediante una solicitud POST manipulada."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-94"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://tomiodarim.io/posts/cve-2024-22632-3/",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-26929",
|
||||
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"published": "2024-05-01T06:15:07.380",
|
||||
"lastModified": "2024-05-23T19:07:27.803",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2024-08-08T16:35:06.543",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -36,6 +36,26 @@
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 5.9
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 7.7,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.5,
|
||||
"impactScore": 5.2
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -49,6 +69,16 @@
|
||||
"value": "CWE-415"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-415"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-27765",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-03-05T23:15:08.050",
|
||||
"lastModified": "2024-03-06T15:18:08.093",
|
||||
"lastModified": "2024-08-08T16:35:07.573",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -15,7 +15,42 @@
|
||||
"value": "Vulnerabilidad de Directory Traversal en Jeewms v.3.7 y anteriores permite a un atacante remoto obtener informaci\u00f3n confidencial a trav\u00e9s del componente cgformTemplateController."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 5.3,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 1.4
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-22"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://gitee.com/erzhongxmu/JEEWMS/issues/I8YN90",
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-30923",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-04-18T21:15:07.630",
|
||||
"lastModified": "2024-04-19T13:10:25.637",
|
||||
"lastModified": "2024-08-08T16:35:08.933",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -15,7 +15,42 @@
|
||||
"value": "Vulnerabilidad de inyecci\u00f3n SQL en DerbyNet v9.0 y anteriores permite a un atacante remoto ejecutar c\u00f3digo arbitrario a trav\u00e9s de la cl\u00e1usula donde en Racer Document Rendering"
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-94"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://chocapikk.com/posts/2024/derbynet-vulnerabilities/",
|
||||
|
@ -2,13 +2,13 @@
|
||||
"id": "CVE-2024-3180",
|
||||
"sourceIdentifier": "ff5b8ace-8b95-4078-9743-eac1ca5451de",
|
||||
"published": "2024-04-03T19:15:44.560",
|
||||
"lastModified": "2024-04-04T12:48:41.700",
|
||||
"lastModified": "2024-08-08T17:15:19.223",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Concrete CMS version 9 below 9.2.8 and previous versions below 8.5.16 is vulnerable to Stored XSS in blocks of type file.\u00a0Prior to fix, stored XSS could be caused by a rogue administrator adding malicious code to the link-text field when creating a block of type file.\u00a0The Concrete CMS security team gave this vulnerability a CVSS v3.1 score of 3.1 with a vector of AV:N/AC:H/PR:H/UI:R/S:U/C:N/I:L/A:L https://nvd.nist.gov/vuln-metrics/cvss/v3-calculator .\u00a0Thanks Alexey Solovyev for reporting.\n\n"
|
||||
"value": "Concrete CMS version 9 below 9.2.8 and previous versions below 8.5.16 is vulnerable to Stored XSS in blocks of type file.\u00a0Stored XSS could be caused by a rogue administrator adding malicious code to the link-text field when creating a block of type file.\u00a0The Concrete CMS security team gave this vulnerability a CVSS v3.1 score of 3.1 with a vector of AV:N/AC:H/PR:H/UI:R/S:U/C:N/I:L/A:L https://nvd.nist.gov/vuln-metrics/cvss/v3-calculator .\u00a0Thanks Alexey Solovyev for reporting."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-34230",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-05-14T15:38:37.087",
|
||||
"lastModified": "2024-05-14T16:12:23.490",
|
||||
"lastModified": "2024-08-08T16:35:11.040",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -15,7 +15,42 @@
|
||||
"value": "Una vulnerabilidad de Cross Site Scripting (XSS) en Sourcecodester Laboratory Management System v1.0 permite a los atacantes ejecutar script web o HTML de su elecci\u00f3n a trav\u00e9s de un payload manipulado inyectado en el par\u00e1metro Informaci\u00f3n del sistema."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 6.1,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 2.7
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/Amrita2000/CVES/blob/main/CVE-2024-34230.md",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-37315",
|
||||
"sourceIdentifier": "security-advisories@github.com",
|
||||
"published": "2024-06-14T16:15:11.473",
|
||||
"lastModified": "2024-06-17T12:42:04.623",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2024-08-08T16:35:23.750",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -17,6 +17,26 @@
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 4.3,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 1.4
|
||||
},
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Secondary",
|
||||
@ -40,6 +60,16 @@
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "NVD-CWE-noinfo"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Secondary",
|
||||
@ -51,18 +81,102 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:nextcloud:nextcloud_server:*:*:*:*:enterprise:*:*:*",
|
||||
"versionStartIncluding": "23.0.0",
|
||||
"versionEndIncluding": "23.0.12",
|
||||
"matchCriteriaId": "4D3FCD5B-9518-43D0-AFA6-E78D1645B2E5"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:nextcloud:nextcloud_server:*:*:*:*:enterprise:*:*:*",
|
||||
"versionStartIncluding": "24.0.0",
|
||||
"versionEndIncluding": "24.0.12",
|
||||
"matchCriteriaId": "682262D1-7313-4F62-ACA2-35215AD9B747"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:nextcloud:nextcloud_server:*:*:*:*:enterprise:*:*:*",
|
||||
"versionStartIncluding": "25.0.0",
|
||||
"versionEndExcluding": "25.0.13",
|
||||
"matchCriteriaId": "022E939C-D0FF-4B15-B196-2E31648A6D7F"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:nextcloud:nextcloud_server:*:*:*:*:-:*:*:*",
|
||||
"versionStartIncluding": "26.0.0",
|
||||
"versionEndExcluding": "26.0.12",
|
||||
"matchCriteriaId": "4C261403-8DD8-4A99-956A-BF6F368092EF"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:nextcloud:nextcloud_server:*:*:*:*:enterprise:*:*:*",
|
||||
"versionStartIncluding": "26.0.0",
|
||||
"versionEndExcluding": "26.0.12",
|
||||
"matchCriteriaId": "B6EB74E4-9D73-4516-9509-A776B76E203F"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:nextcloud:nextcloud_server:*:*:*:*:-:*:*:*",
|
||||
"versionStartIncluding": "27.0.0",
|
||||
"versionEndExcluding": "27.1.7",
|
||||
"matchCriteriaId": "37BAF93B-3E31-4C89-BDCE-DCF8E58E71D0"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:nextcloud:nextcloud_server:*:*:*:*:enterprise:*:*:*",
|
||||
"versionStartIncluding": "27.0.0",
|
||||
"versionEndExcluding": "27.1.7",
|
||||
"matchCriteriaId": "2171184A-C969-4912-89BF-BD7B442282E7"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:nextcloud:nextcloud_server:*:*:*:*:-:*:*:*",
|
||||
"versionStartIncluding": "28.0.0",
|
||||
"versionEndExcluding": "28.0.3",
|
||||
"matchCriteriaId": "C0D65C0C-98E1-493B-8EA0-5661AF8AAD1D"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:nextcloud:nextcloud_server:*:*:*:*:enterprise:*:*:*",
|
||||
"versionStartIncluding": "28.0.0",
|
||||
"versionEndExcluding": "28.0.3",
|
||||
"matchCriteriaId": "CE67692D-481F-43BE-981D-108402DDF8CA"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-5mq8-738w-5942",
|
||||
"source": "security-advisories@github.com"
|
||||
"source": "security-advisories@github.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/nextcloud/server/pull/43727",
|
||||
"source": "security-advisories@github.com"
|
||||
"source": "security-advisories@github.com",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://hackerone.com/reports/1356508",
|
||||
"source": "security-advisories@github.com"
|
||||
"source": "security-advisories@github.com",
|
||||
"tags": [
|
||||
"Issue Tracking"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-37884",
|
||||
"sourceIdentifier": "security-advisories@github.com",
|
||||
"published": "2024-06-14T16:15:13.340",
|
||||
"lastModified": "2024-06-17T12:42:04.623",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2024-08-08T16:39:59.217",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -17,6 +17,26 @@
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "LOW",
|
||||
"baseScore": 5.4,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 2.5
|
||||
},
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Secondary",
|
||||
@ -40,6 +60,16 @@
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "NVD-CWE-noinfo"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Secondary",
|
||||
@ -51,18 +81,88 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:nextcloud:nextcloud_server:*:*:*:*:enterprise:*:*:*",
|
||||
"versionStartIncluding": "25.0.0",
|
||||
"versionEndExcluding": "25.0.13.7",
|
||||
"matchCriteriaId": "5B0FD8DA-3820-4AF9-B7F5-FEEABCAE6023"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:nextcloud:nextcloud_server:*:*:*:*:-:*:*:*",
|
||||
"versionStartIncluding": "26.0.0",
|
||||
"versionEndExcluding": "26.0.13",
|
||||
"matchCriteriaId": "8F643317-2586-435E-8D89-721BC6161691"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:nextcloud:nextcloud_server:*:*:*:*:enterprise:*:*:*",
|
||||
"versionStartIncluding": "26.0.0",
|
||||
"versionEndExcluding": "26.0.13",
|
||||
"matchCriteriaId": "6909C63C-3755-4B68-B90E-4C5E14C78787"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:nextcloud:nextcloud_server:*:*:*:*:-:*:*:*",
|
||||
"versionStartIncluding": "27.0.0",
|
||||
"versionEndExcluding": "27.1.8",
|
||||
"matchCriteriaId": "8696DA00-5B0C-45F5-BD50-9FF1F5E4646F"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:nextcloud:nextcloud_server:*:*:*:*:enterprise:*:*:*",
|
||||
"versionStartIncluding": "27.0.0",
|
||||
"versionEndExcluding": "27.1.8",
|
||||
"matchCriteriaId": "B6C25B03-B587-4F48-BE81-052AF67E2045"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:nextcloud:nextcloud_server:*:*:*:*:-:*:*:*",
|
||||
"versionStartIncluding": "28.0.0",
|
||||
"versionEndExcluding": "28.0.4",
|
||||
"matchCriteriaId": "C3A816F7-5D5E-43CB-9C53-E4C5B1344C84"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:nextcloud:nextcloud_server:*:*:*:*:enterprise:*:*:*",
|
||||
"versionStartIncluding": "28.0.0",
|
||||
"versionEndExcluding": "28.0.4",
|
||||
"matchCriteriaId": "E04001FE-890B-4D94-B679-B0854E840F39"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-xwgx-f37p-xh8c",
|
||||
"source": "security-advisories@github.com"
|
||||
"source": "security-advisories@github.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/nextcloud/server/pull/43727",
|
||||
"source": "security-advisories@github.com"
|
||||
"source": "security-advisories@github.com",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://hackerone.com/reports/2290680",
|
||||
"source": "security-advisories@github.com"
|
||||
"source": "security-advisories@github.com",
|
||||
"tags": [
|
||||
"Issue Tracking"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-37887",
|
||||
"sourceIdentifier": "security-advisories@github.com",
|
||||
"published": "2024-06-14T16:15:14.237",
|
||||
"lastModified": "2024-06-17T12:42:04.623",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2024-08-08T16:33:31.063",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -17,6 +17,26 @@
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:N/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 3.5,
|
||||
"baseSeverity": "LOW"
|
||||
},
|
||||
"exploitabilityScore": 2.1,
|
||||
"impactScore": 1.4
|
||||
},
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Secondary",
|
||||
@ -40,6 +60,16 @@
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "NVD-CWE-noinfo"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Secondary",
|
||||
@ -51,18 +81,77 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:nextcloud:nextcloud_server:*:*:*:*:-:*:*:*",
|
||||
"versionStartIncluding": "27.0.0",
|
||||
"versionEndExcluding": "27.1.10",
|
||||
"matchCriteriaId": "F38721C1-838D-4E12-80EA-4A275C457A97"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:nextcloud:nextcloud_server:*:*:*:*:enterprise:*:*:*",
|
||||
"versionStartIncluding": "27.0.0",
|
||||
"versionEndExcluding": "27.1.10",
|
||||
"matchCriteriaId": "54300595-D23D-4F77-8F68-C6B60D6CB0D2"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:nextcloud:nextcloud_server:*:*:*:*:-:*:*:*",
|
||||
"versionStartIncluding": "28.0.0",
|
||||
"versionEndIncluding": "28.0.6",
|
||||
"matchCriteriaId": "BE4CD3B0-788F-41F8-98A9-388853A84D0C"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:nextcloud:nextcloud_server:*:*:*:*:enterprise:*:*:*",
|
||||
"versionStartIncluding": "28.0.0",
|
||||
"versionEndExcluding": "28.0.6",
|
||||
"matchCriteriaId": "84E246F1-39F9-4AAB-9049-4002E5EF539A"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:nextcloud:nextcloud_server:29.0.0:*:*:*:-:*:*:*",
|
||||
"matchCriteriaId": "45508E90-8438-4A52-900E-A2154096E31C"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:nextcloud:nextcloud_server:29.0.0:*:*:*:enterprise:*:*:*",
|
||||
"matchCriteriaId": "8573835A-33F1-4598-83F4-EBCE44EDE95D"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-h4xv-cjpm-j595",
|
||||
"source": "security-advisories@github.com"
|
||||
"source": "security-advisories@github.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/nextcloud/server/pull/45309",
|
||||
"source": "security-advisories@github.com"
|
||||
"source": "security-advisories@github.com",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://hackerone.com/reports/2479325",
|
||||
"source": "security-advisories@github.com"
|
||||
"source": "security-advisories@github.com",
|
||||
"tags": [
|
||||
"Issue Tracking"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-38301",
|
||||
"sourceIdentifier": "security_alert@emc.com",
|
||||
"published": "2024-07-10T03:15:02.447",
|
||||
"lastModified": "2024-07-11T13:05:54.930",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2024-08-08T17:01:45.347",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -17,6 +17,26 @@
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 7.8,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 5.9
|
||||
},
|
||||
{
|
||||
"source": "security_alert@emc.com",
|
||||
"type": "Secondary",
|
||||
@ -41,8 +61,18 @@
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security_alert@emc.com",
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "NVD-CWE-noinfo"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "security_alert@emc.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -51,10 +81,32 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:dell:alienware_command_center:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "5.0",
|
||||
"versionEndIncluding": "5.7.3.0",
|
||||
"matchCriteriaId": "FD086EC6-4924-450E-A804-E77FE50B4341"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.dell.com/support/kbdoc/en-us/000225774/dsa-2024-258",
|
||||
"source": "security_alert@emc.com"
|
||||
"source": "security_alert@emc.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-40898",
|
||||
"sourceIdentifier": "security@apache.org",
|
||||
"published": "2024-07-18T10:15:03.217",
|
||||
"lastModified": "2024-08-01T13:58:17.817",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2024-08-08T16:02:40.887",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -17,6 +17,26 @@
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 7.5,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 3.6
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
@ -51,10 +71,43 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:apache:http_server:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "2.4.62",
|
||||
"matchCriteriaId": "305E43F5-3253-4B7B-A8B0-E6F937986C55"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "A2572D17-1DE6-457B-99CC-64AFD54487EA"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://httpd.apache.org/security/vulnerabilities_24.html",
|
||||
"source": "security@apache.org"
|
||||
"source": "security@apache.org",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-41037",
|
||||
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"published": "2024-07-29T15:15:12.240",
|
||||
"lastModified": "2024-07-29T16:21:52.517",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-08-08T17:53:57.487",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -15,19 +15,89 @@
|
||||
"value": " En el kernel de Linux, se resolvi\u00f3 la siguiente vulnerabilidad: ASoC: SOF: Intel: hda: corrige el deref nulo en la entrada de suspensi\u00f3n del sistema Cuando el sistema entra en suspensi\u00f3n con una secuencia activa, el n\u00facleo de SOF llama a hw_params_upon_resume(). En las plataformas Intel con HDA DMA utilizado para administrar el enlace DMA, esto conduce a la cadena de llamadas de hda_dsp_set_hw_params_upon_resume() -> hda_dsp_dais_suspend() -> hda_dai_suspend() -> hda_ipc4_post_trigger() Se detecta un error en hda_dai_suspend() como hda_link_dma_cleanup() ejecutar primero, lo que borra hext_stream->link_substream, y luego se llama a hda_ipc4_post_trigger() con un puntero NULL snd_pcm_substream."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 5.5,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-476"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "6.4",
|
||||
"versionEndExcluding": "6.6.41",
|
||||
"matchCriteriaId": "27E794A4-18EA-4EBB-9EC1-DCA36044ECB4"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "6.7",
|
||||
"versionEndExcluding": "6.9.10",
|
||||
"matchCriteriaId": "AB2E8DEC-CFD5-4C2B-981D-E7E45A36C352"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/8246bbf818ed7b8d5afc92b951e6d562b45c2450",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/9065693dcc13f287b9e4991f43aee70cf5538fdd",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/993af0f2d9f24e3c18a445ae22b34190d1fcad61",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-41038",
|
||||
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"published": "2024-07-29T15:15:12.320",
|
||||
"lastModified": "2024-07-29T16:21:52.517",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-08-08T17:54:28.177",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -15,23 +15,103 @@
|
||||
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: firmware: cs_dsp: evita la saturaci\u00f3n de b\u00fafer al procesar encabezados de alg V2. Verifique que todos los campos de un encabezado de algoritmo V2 encajen en el b\u00fafer de datos del firmware disponible. El formato wmfw V2 introdujo cadenas de longitud variable en el encabezado del bloque del algoritmo. Esto significa que la longitud total del encabezado es variable y la posici\u00f3n de la mayor\u00eda de los campos var\u00eda seg\u00fan la longitud de los campos de cadena. Se debe verificar cada campo para garantizar que no desborde el b\u00fafer de datos del firmware. Como se trata de un parche de correcci\u00f3n de errores, las correcciones evitan realizar cambios significativos en el c\u00f3digo existente. Esto hace que sea m\u00e1s f\u00e1cil de revisar y menos probable que se introduzcan nuevos errores."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 5.5,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-120"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "5.16",
|
||||
"versionEndExcluding": "6.1.100",
|
||||
"matchCriteriaId": "100CDF74-4DB5-4FC6-A54B-BDBDB0C27137"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "6.2",
|
||||
"versionEndExcluding": "6.6.41",
|
||||
"matchCriteriaId": "96AC42B8-D66D-4AC5-B466-E9BA7910FA29"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "6.7",
|
||||
"versionEndExcluding": "6.9.10",
|
||||
"matchCriteriaId": "AB2E8DEC-CFD5-4C2B-981D-E7E45A36C352"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/014239b9971d79421a0ba652579e1ca1b7b57b6d",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/2163aff6bebbb752edf73f79700f5e2095f3559e",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/6619aa48a011364e9f29083cc76368e6acfe5b11",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/76ea8e13aaefdfda6e5601323d6ea5340359dcfa",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-41087",
|
||||
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"published": "2024-07-29T16:15:04.120",
|
||||
"lastModified": "2024-07-29T16:21:52.517",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-08-08T18:00:03.977",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -15,39 +15,159 @@
|
||||
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: ata: libata-core: corrige double free en caso de error Si, por ejemplo, la llamada ata_port_alloc() en ata_host_alloc() falla, saltaremos a la etiqueta err_out, que llamar\u00e1 a devres_release_group() . devres_release_group() activar\u00e1 una llamada a ata_host_release(). ata_host_release() llama a kfree(host), por lo que ejecutar kfree(host) en ata_host_alloc() provocar\u00e1 un doble error de kernel free: en mm/slub.c:553. Ups: c\u00f3digo de operaci\u00f3n no v\u00e1lido: 0000 [#1] PREEMPT SMP NOPTI CPU: 11 PID: 599 Comm: (udev-worker) No contaminado 6.10.0-rc5 #47 Nombre de hardware: PC est\u00e1ndar QEMU (i440FX + PIIX, 1996), BIOS 1.16.3-2.fc40 01/04/2014 RIP: 0010:kfree+0x2cf/0x2f0 C\u00f3digo: 5d 41 5e 41 5f 5d e9 80 d6 ff ff 4d 89 f1 41 b8 01 00 00 00 48 89 d9 48 89 da RSP : 0018:ffffc90000f377f0 EFLAGS: 00010246 RAX: ffff888112b1f2c0 RBX: ffff888112b1f2c0 RCX: ffff888112b1f320 RDX: 000000000000400b RSI: ffffffffc02c 9de5 RDI: ffff888112b1f2c0 RBP: ffffc90000f37830 R08: 0000000000000000 R09: 0000000000000000 R10: ffffc90000f37610 R11: 617461203a736b6e : ffffea00044ac780 R13: ffff888100046400 R14: ffffffffc02c9de5 R15 : 0000000000000006 FS: 00007f2f1cabe980(0000) GS:ffff88813b380000(0000) knlGS:00000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050 033 CR2: 00007f2f1c3acf75 CR3: 0000000111724000 CR4: 0000000000750ef0 PKRU: 55555554 Seguimiento de llamadas: ? __die_body.cold+0x19/0x27 ? die+0x2e/0x50 ? do_trap+0xca/0x110 ? do_error_trap+0x6a/0x90? kfree+0x2cf/0x2f0 ? exc_invalid_op+0x50/0x70? kfree+0x2cf/0x2f0 ? asm_exc_invalid_op+0x1a/0x20? ata_host_alloc+0xf5/0x120 [libata]? ata_host_alloc+0xf5/0x120 [libata]? kfree+0x2cf/0x2f0 ata_host_alloc+0xf5/0x120 [libata] ata_host_alloc_pinfo+0x14/0xa0 [libata] ahci_init_one+0x6c9/0xd20 [ahci] Aseg\u00farese de que no llamaremos a kfree(host) dos veces, realizando kfree() solo si La llamada a devres_open_group() fall\u00f3."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 7.8,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-415"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "4.17",
|
||||
"versionEndExcluding": "4.19.317",
|
||||
"matchCriteriaId": "356EA924-A840-4360-ADBF-A5405D9C9BBA"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "4.20",
|
||||
"versionEndExcluding": "5.4.279",
|
||||
"matchCriteriaId": "F4E38E58-1B9F-4DF2-AD3D-A8BEAA2959D8"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "5.5",
|
||||
"versionEndExcluding": "5.10.221",
|
||||
"matchCriteriaId": "659E1520-6345-41AF-B893-A7C0647585A0"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "5.11",
|
||||
"versionEndExcluding": "5.15.162",
|
||||
"matchCriteriaId": "10A39ACC-3005-40E8-875C-98A372D1FFD5"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "5.16",
|
||||
"versionEndExcluding": "6.1.97",
|
||||
"matchCriteriaId": "748B6C4B-1F61-47F9-96CC-8899B8412D84"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "6.2",
|
||||
"versionEndExcluding": "6.6.37",
|
||||
"matchCriteriaId": "D72E033B-5323-4C4D-8818-36E1EBC3535F"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "6.7",
|
||||
"versionEndExcluding": "6.9.8",
|
||||
"matchCriteriaId": "E95105F2-32E3-4C5F-9D18-7AEFD0E6275C"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/010de9acbea58fbcbda08e3793d6262086a493fe",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/062e256516d7db5e7dcdef117f52025cd5c456e3",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/290073b2b557e4dc21ee74a1e403d9ae79e393a2",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/56f1c7e290cd6c69c948fcd2e2a49e6a637ec38f",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/5dde5f8b790274723640d29a07c5a97d57d62047",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/702c1edbafb2e6f9d20f6d391273b5be09d366a5",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/8106da4d88bbaed809e023cc8014b766223d6e76",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/ab9e0c529eb7cafebdd31fe1644524e80a48b05d",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-41089",
|
||||
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"published": "2024-07-29T16:15:04.300",
|
||||
"lastModified": "2024-07-29T16:21:52.517",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-08-08T17:50:48.727",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -15,39 +15,158 @@
|
||||
"value": " En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: drm/nouveau/dispnv04: corrige la desreferencia del puntero nulo en nv17_tv_get_hd_modes En nv17_tv_get_hd_modes(), el valor de retorno de drm_mode_duplicate() se asigna al modo, lo que conducir\u00e1 a una posible desreferencia del puntero NULL en caso de falla de drm_mode_duplicate(). Lo mismo se aplica a drm_cvt_mode(). Agregue una marca para evitar la desreferencia del puntero nulo."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 5.5,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-476"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "4.19.317",
|
||||
"matchCriteriaId": "AD25C2E5-C116-4160-BA6D-CE9B0D10AE3E"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "4.20",
|
||||
"versionEndExcluding": "5.4.279",
|
||||
"matchCriteriaId": "F4E38E58-1B9F-4DF2-AD3D-A8BEAA2959D8"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "5.5",
|
||||
"versionEndExcluding": "5.10.221",
|
||||
"matchCriteriaId": "659E1520-6345-41AF-B893-A7C0647585A0"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "5.11",
|
||||
"versionEndExcluding": "5.15.162",
|
||||
"matchCriteriaId": "10A39ACC-3005-40E8-875C-98A372D1FFD5"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "5.16",
|
||||
"versionEndExcluding": "6.1.97",
|
||||
"matchCriteriaId": "748B6C4B-1F61-47F9-96CC-8899B8412D84"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "6.2",
|
||||
"versionEndExcluding": "6.6.37",
|
||||
"matchCriteriaId": "D72E033B-5323-4C4D-8818-36E1EBC3535F"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "6.7",
|
||||
"versionEndExcluding": "6.9.8",
|
||||
"matchCriteriaId": "E95105F2-32E3-4C5F-9D18-7AEFD0E6275C"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/1c9f2e60150b4f13789064370e37f39e6e060f50",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/30cbf6ffafbbdd8a6e4e5f0a2e9a9827ee83f3ad",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/56fc4d3b0bdef691831cd95715a7ca3ebea98b2d",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/5eecb49a6c268dc229005bf6e8167d4001dc09a0",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/6d411c8ccc0137a612e0044489030a194ff5c843",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/6e49a157d541e7e97b815a56f4bdfcbc89844a59",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/7ece609b0ce7a7ea8acdf512a77d1fee26621637",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/ffabad4aa91e33ced3c6ae793fb37771b3e9cb51",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-41092",
|
||||
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"published": "2024-07-29T16:15:04.383",
|
||||
"lastModified": "2024-07-29T16:21:52.517",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-08-08T17:51:11.700",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -15,31 +15,131 @@
|
||||
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: drm/i915/gt: corrige un posible UAF mediante la revocaci\u00f3n de los registros de valla. CI ha estado informando espor\u00e1dicamente el siguiente problema provocado por igt@i915_selftest@live@hangcheck en ADL-P y m\u00e1quinas similares. : <6> [414.049203] I915: ejecutando Intel_hangcheck_live_SelfTests/IGT_RESET_EVICT_FENCE ... <6> [414.068804] I915 0000: 00: 02.0: [DRM] GT0: GUC: CUBLICIDAD : [drm] GT0: GUC: SLPC habilitado <3> [414.070354] No se puede fijar la cerca con mosaicos en Y; err:-4 <3> [414.071282] i915_vma_revoke_fence:301 GEM_BUG_ON(!i915_active_is_idle(&fence->active)) ... <4>[ 609.603992] ------------[ cortar aqu\u00ed ]- ----------- <2>[ 609.603995] \u00a1ERROR del kernel en drivers/gpu/drm/i915/gt/intel_ggtt_fencing.c:301! <4>[ 609.604003] c\u00f3digo de operaci\u00f3n no v\u00e1lido: 0000 [#1] PREEMPT SMP NOPTI <4>[ 609.604006] CPU: 0 PID: 268 Comm: kworker/u64:3 Contaminado: GUW 6.9.0-CI_DRM_14785-g1ba62f8cea9c+ #1 <4 >[ 609.604008] Nombre del hardware: Intel Corporation Alder Lake Client Platform/AlderLake-P DDR4 RVP, BIOS RPLPFWI1.R00.4035.A00.2301200723 20/01/2023 <4>[ 609.604010] Cola de trabajo: i915 __i915_gem_free_work [i915] <4 >[ 609.604149] RIP: 0010:i915_vma_revoke_fence+0x187/0x1f0 [i915] ... <4>[ 609.604271] Seguimiento de llamadas: <4>[ 609.604273] ... <4>[ 609.604716] ct+0x2e9/ 0x550 [i915] <4>[ 609.604852] __i915_vma_unbind+0x7c/0x160 [i915] <4>[ 609.604977] force_unbind+0x24/0xa0 [i915] <4>[ 609.605098] x2f/0xa0 [i915] <4>[ 609.605210] __i915_gem_object_pages_fini+0x51/0x2f0 [i915] <4>[ 609.605330] __i915_gem_free_objects.isra.0+0x6a/0xc0 [i915] <4>[ 609.605440 process_scheduled_works+0x351/0x690... En el pasado, hubo fallas similares informado por CI de otras pruebas de IGT, observado en otras plataformas. Antes de confirmar 63baf4f3d587 (\"drm/i915/gt: solo espere la actividad de la GPU antes de desvincular una valla GGTT\"), i915_vma_revoke_fence() estaba esperando la inactividad de vma->active a trav\u00e9s de fence_update(). Ese compromiso introdujo vma->fence->active para que fence_update() pudiera esperar selectivamente en ese en lugar de vma->active, ya que solo se necesitaba la inactividad de los registros de cerca. Pero luego, otra confirmaci\u00f3n 0d86ee35097a (\"drm/i915/gt: Hacer que la revocaci\u00f3n de la valla sea inequ\u00edvoca\") reemplaz\u00f3 la llamada a fence_update() en i915_vma_revoke_fence() con solo fence_write(), y tambi\u00e9n agreg\u00f3 que GEM_BUG_ON(!i915_active_is_idle(&fence->active )) Al frente. No se proporcion\u00f3 ninguna justificaci\u00f3n sobre por qu\u00e9 podr\u00edamos esperar que vma->fence->active est\u00e9 inactivo sin esperarlo primero. El problema puede deberse potencialmente a una carrera entre la revocaci\u00f3n de registros de valla por un lado y la ejecuci\u00f3n secuencial de devoluciones de llamadas de se\u00f1ales invocadas al completar una solicitud que las estaba usando por el otro, a\u00fan procesadas en paralelo a la revocaci\u00f3n de esos registros de valla. Solucionelo esperando a que vma->fence->active est\u00e9 inactivo en i915_vma_revoke_fence(). (cereza escogida del compromiso 24bb052d3dd499c5956abad5f7d8e4fd07da7fb1)"
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 7.8,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-416"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "5.8",
|
||||
"versionEndExcluding": "5.10.221",
|
||||
"matchCriteriaId": "9C4870DD-D890-4898-91A0-A77991EB51FB"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "5.11",
|
||||
"versionEndExcluding": "5.15.162",
|
||||
"matchCriteriaId": "10A39ACC-3005-40E8-875C-98A372D1FFD5"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "5.16",
|
||||
"versionEndExcluding": "6.1.97",
|
||||
"matchCriteriaId": "748B6C4B-1F61-47F9-96CC-8899B8412D84"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "6.2",
|
||||
"versionEndExcluding": "6.6.37",
|
||||
"matchCriteriaId": "D72E033B-5323-4C4D-8818-36E1EBC3535F"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "6.7",
|
||||
"versionEndExcluding": "6.9.8",
|
||||
"matchCriteriaId": "E95105F2-32E3-4C5F-9D18-7AEFD0E6275C"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/06dec31a0a5112a91f49085e8a8fa1a82296d5c7",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/29c0fdf49078ab161570d3d1c6e13d66f182717d",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/414f4a31f7a811008fd9a33b06216b060bad18fc",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/996c3412a06578e9d779a16b9e79ace18125ab50",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/ca0fabd365a27a94a36e68a7a02df8ff3c13dac6",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/f771b91f21c46ad1217328d05e72a2c7e3add535",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-41093",
|
||||
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"published": "2024-07-29T16:15:04.463",
|
||||
"lastModified": "2024-07-29T16:21:52.517",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-08-08T17:40:31.917",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -15,27 +15,116 @@
|
||||
"value": " En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: drm/amdgpu: evite usar el objeto nulo del framebuffer. En lugar de usar state->fb->obj[0] directamente, obtenga el objeto del framebuffer llamando a drm_gem_fb_get_obj() y devuelva el c\u00f3digo de error. cuando el objeto es nulo para evitar el uso de un objeto nulo de framebuffer."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 5.5,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-476"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "5.15.162",
|
||||
"matchCriteriaId": "DD1E49C8-DE20-4CCB-8715-3FB3FA95ABC7"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "5.16",
|
||||
"versionEndExcluding": "6.1.97",
|
||||
"matchCriteriaId": "748B6C4B-1F61-47F9-96CC-8899B8412D84"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "6.2",
|
||||
"versionEndExcluding": "6.6.37",
|
||||
"matchCriteriaId": "D72E033B-5323-4C4D-8818-36E1EBC3535F"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "6.7",
|
||||
"versionEndExcluding": "6.9.8",
|
||||
"matchCriteriaId": "E95105F2-32E3-4C5F-9D18-7AEFD0E6275C"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/330c8c1453848c04d335bad81371a66710210800",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/6ce0544cabaa608018d5922ab404dc656a9d8447",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/7f35e01cb0ea4d295f5c067bb5c67dfcddaf05bc",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/bcfa48ff785bd121316592b131ff6531e3e696bb",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/dd9ec0ea4cdde0fc48116e63969fc83e81d7ef46",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-41095",
|
||||
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"published": "2024-07-29T16:15:04.613",
|
||||
"lastModified": "2024-07-29T16:21:52.517",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-08-08T17:40:57.760",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -15,39 +15,158 @@
|
||||
"value": " En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: drm/nouveau/dispnv04: corrige la desreferencia del puntero null en nv17_tv_get_ld_modes En nv17_tv_get_ld_modes(), el valor de retorno de drm_mode_duplicate() se asigna al modo, lo que conducir\u00e1 a una posible desreferencia del puntero NULL en caso de falla de drm_mode_duplicate(). Agregue una marca para evitar npd."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 5.5,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-476"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "4.19.317",
|
||||
"matchCriteriaId": "AD25C2E5-C116-4160-BA6D-CE9B0D10AE3E"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "4.20",
|
||||
"versionEndExcluding": "5.4.279",
|
||||
"matchCriteriaId": "F4E38E58-1B9F-4DF2-AD3D-A8BEAA2959D8"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "5.5",
|
||||
"versionEndExcluding": "5.10.221",
|
||||
"matchCriteriaId": "659E1520-6345-41AF-B893-A7C0647585A0"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "5.11",
|
||||
"versionEndExcluding": "5.15.162",
|
||||
"matchCriteriaId": "10A39ACC-3005-40E8-875C-98A372D1FFD5"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "5.16",
|
||||
"versionEndExcluding": "6.1.97",
|
||||
"matchCriteriaId": "748B6C4B-1F61-47F9-96CC-8899B8412D84"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "6.2",
|
||||
"versionEndExcluding": "6.6.37",
|
||||
"matchCriteriaId": "D72E033B-5323-4C4D-8818-36E1EBC3535F"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "6.7",
|
||||
"versionEndExcluding": "6.9.8",
|
||||
"matchCriteriaId": "E95105F2-32E3-4C5F-9D18-7AEFD0E6275C"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/0d17604f2e44b3df21e218fe8fb3b836d41bac49",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/259549b2ccf795b7f91f7b5aba47286addcfa389",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/66edf3fb331b6c55439b10f9862987b0916b3726",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/9289cd3450d1da3e271ef4b054d4d2932c41243e",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/bdda5072494f2a7215d94fc4124ad1949a218714",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/cb751e48bbcffd292090f7882b23b215111b3d72",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/dbd75f32252508ed6c46c3288a282c301a57ceeb",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/f95ed0f54b3d3faecae1140ddab854f904a6e7c8",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-41096",
|
||||
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"published": "2024-07-29T16:15:04.683",
|
||||
"lastModified": "2024-07-29T16:21:52.517",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-08-08T17:26:54.243",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -15,19 +15,89 @@
|
||||
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: PCI/MSI: corrige UAF en msi_capability_init KFENCE informa el siguiente UAF: ERROR: KFENCE: lectura de uso despu\u00e9s de liberaci\u00f3n en __pci_enable_msi_range+0x2c0/0x488 Lectura de uso despu\u00e9s de liberaci\u00f3n en 0x0000000024629571 (en kfence-#12): __pci_enable_msi_range+0x2c0/0x488 pci_alloc_irq_vectors_affinity+0xec/0x14c pci_alloc_irq_vectors+0x18/0x28 kfence-#12: 0x0000000008614900-0x00000000e06c22 8d, tama\u00f1o=104, cach\u00e9=kmalloc-128 asignado por la tarea 81 en la CPU 7 en 10.808142 s: __kmem_cache_alloc_node+0x1f0/0x2bc kmalloc_trace+0x44/0x138 msi_alloc_desc+0x3c/0x9c msi_domain_insert_msi_desc+0x30/0x78 msi_setup_msi_desc+0x13c/0x184 __pci_enable_msi_range+0 x258/0x488 pci_alloc_irq_vectors_affinity+0xec/0x14c pci_alloc_irq_vectors+0x18/0x28 liberado por la tarea 81 en la CPU 7 en 10.811436s: msi_domain_free_descs+0xd4/0x10c msi_domain_free_locked.part.0+0xc0/0x1d8 msi_domain_alloc_irqs_all_locked+0xb4/0xbc pci_msi_setup_msi_irqs+0x30/0x4c __pci_enable_msi_range+ 0x2a8/0x488 pci_alloc_irq_vectors_affinity+0xec/0x14c pci_alloc_irq_vectors+0x18/0x28 Asignaci\u00f3n de descriptores realizada en: __pci_enable_msi_range msi_capability_init msi_setup_msi_desc msi_insert_msi_desc msi_domain_insert_msi_desc msi_alloc_desc ... Liberado en caso de fallo en __msi_domain_alloc_locked() __pci_enable_msi_range msi_capability_init pci_msi_setup_msi_irqs msi_domain_alloc_irqs_all_locked msi_domain_alloc_locked __msi_ domain_alloc_locked => falla msi_domain_free_locked... Ese error se propaga nuevamente a pci_msi_setup_msi_irqs() en msi_capability_init() que accede al descriptor para desenmascarar en la salida de error camino. Sor\u00e9guelo copiando el descriptor y usando la copia para la operaci\u00f3n de desenmascarar la ruta de salida del error. [tglx: registro de cambios masajeado]"
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 7.8,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-416"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "5.17",
|
||||
"versionEndExcluding": "6.6.37",
|
||||
"matchCriteriaId": "4A068371-F559-419E-A5D4-13A6DB320A21"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "6.7",
|
||||
"versionEndExcluding": "6.9.8",
|
||||
"matchCriteriaId": "E95105F2-32E3-4C5F-9D18-7AEFD0E6275C"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/45fc8d20e0768ab0a0ad054081d0f68aa3c83976",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/9eee5330656bf92f51cb1f09b2dc9f8cf975b3d1",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/ff1121d2214b794dc1772081f27bdd90721a84bc",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-41098",
|
||||
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"published": "2024-07-29T16:15:04.837",
|
||||
"lastModified": "2024-07-29T16:21:52.517",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-08-08T17:27:55.600",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -15,19 +15,89 @@
|
||||
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: ata: libata-core: corrige la desreferencia del puntero nulo en caso de error Si la llamada ata_port_alloc() en ata_host_alloc() falla, se llamar\u00e1 ata_host_release(). Sin embargo, el c\u00f3digo en ata_host_release() intenta liberar incondicionalmente a los miembros de la estructura ata_port, lo que puede provocar lo siguiente: ERROR: no se puede manejar el error de p\u00e1gina para la direcci\u00f3n: 0000000000003990 PGD 0 P4D 0 Ups: Ups: 0000 [#1] PREEMPT SMP NOPTI CPU: 10 PID: 594 Comunicaciones: (udev-worker) No contaminado 6.10.0-rc5 #44 Nombre del hardware: PC est\u00e1ndar QEMU (i440FX + PIIX, 1996), BIOS 1.16.3-2.fc40 01/04/2014 RIP : 0010:ata_host_release.cold+0x2f/0x6e [libata] C\u00f3digo: e4 4d 63 f4 44 89 e2 48 c7 c6 90 ad 32 c0 48 c7 c7 d0 70 33 c0 49 83 c6 0e 41 RSP: 0018:ffffc90000ebb968 00010246 RAX : 0000000000000041 RBX: ffff88810fb52e78 RCX: 0000000000000000 RDX: 0000000000000000 RSI: ffff88813b3218c0 RDI: ffff88813b3218c0 RBP: ffff888 10fb52e40 R08: 0000000000000000 R09: 6c65725f74736f68 R10: ffffc90000ebb738 R11: 73692033203a746e R12: 000000000000004 R13: 00000000 R14: 0000000000000011 R15: 0000000000000006 FS: 00007f6cc55b9980(0000) GS:ffff88813b300000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 0000000000003990 CR3: 00000001122a200 0 CR4: 0000000000750ef0 PKRU: 55555554 Seguimiento de llamadas: ? __die_body.cold+0x19/0x27 ? page_fault_oops+0x15a/0x2f0? exc_page_fault+0x7e/0x180? asm_exc_page_fault+0x26/0x30? ata_host_release.cold+0x2f/0x6e [libata]? ata_host_release.cold+0x2f/0x6e [libata] release_nodes+0x35/0xb0 devres_release_group+0x113/0x140 ata_host_alloc+0xed/0x120 [libata] ata_host_alloc_pinfo+0x14/0xa0 [libata] ahci_init_one+0x6c9/0xd20 ] No acceder a los miembros de la estructura ata_port incondicionalmente."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 5.5,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-476"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "2.6.24",
|
||||
"versionEndExcluding": "6.6.37",
|
||||
"matchCriteriaId": "B38E97BD-3569-40F2-98AE-209C0145BB0C"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "6.7",
|
||||
"versionEndExcluding": "6.9.8",
|
||||
"matchCriteriaId": "E95105F2-32E3-4C5F-9D18-7AEFD0E6275C"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/119c97ace2a9ffcf4dc09a23bb057d6c281aff28",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/5d92c7c566dc76d96e0e19e481d926bbe6631c1e",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/8a8ff7e3b736a70d7b7c8764cbcd2724d4079ec8",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
60
CVE-2024/CVE-2024-412xx/CVE-2024-41238.json
Normal file
60
CVE-2024/CVE-2024-412xx/CVE-2024-41238.json
Normal file
@ -0,0 +1,60 @@
|
||||
{
|
||||
"id": "CVE-2024-41238",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-08-08T16:15:09.123",
|
||||
"lastModified": "2024-08-08T17:35:05.697",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A SQL injection vulnerability in /smsa/student_login.php in Kashipara Responsive School Management System v1.0 allows an attacker to execute arbitrary SQL commands via the \"username\" parameter."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 4.3,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 1.4
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-89"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/takekaramey/CVE_Writeup/blob/main/Kashipara/Responsive%20School%20Management%20System%20v3.2.0/SQL%20Injection%20-%20Student.pdf",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://www.kashipara.com/project/php/12362/responsive-school-management-system-php-project-source-code",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,13 +2,13 @@
|
||||
"id": "CVE-2024-41239",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-08-07T19:15:48.093",
|
||||
"lastModified": "2024-08-08T13:04:18.753",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-08-08T16:15:09.190",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A Stored Cross Site Scripting (XSS) vulnerability was found in \"/smsa/add_class_submit.php\" in Kashipara Responsive School Management System v1.0, which allows remote attackers to execute arbitrary code via \"class_name\" parameter field."
|
||||
"value": "A Stored Cross Site Scripting (XSS) vulnerability was found in \"/smsa/add_class_submit.php\" in Responsive School Management System v3.2.0, which allows remote attackers to execute arbitrary code via \"class_name\" parameter field."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
|
88
CVE-2024/CVE-2024-423xx/CVE-2024-42365.json
Normal file
88
CVE-2024/CVE-2024-423xx/CVE-2024-42365.json
Normal file
@ -0,0 +1,88 @@
|
||||
{
|
||||
"id": "CVE-2024-42365",
|
||||
"sourceIdentifier": "security-advisories@github.com",
|
||||
"published": "2024-08-08T17:15:19.340",
|
||||
"lastModified": "2024-08-08T17:15:19.340",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Asterisk is an open source private branch exchange (PBX) and telephony toolkit. Prior to asterisk versions 18.24.2, 20.9.2, and 21.4.2 and certified-asterisk versions 18.9-cert11 and 20.7-cert2, an AMI user with `write=originate` may change all configuration files in the `/etc/asterisk/` directory. This occurs because they are able to curl remote files and write them to disk, but are also able to append to existing files using the `FILE` function inside the `SET` application. This issue may result in privilege escalation, remote code execution and/or blind server-side request forgery with arbitrary protocol. Asterisk versions 18.24.2, 20.9.2, and 21.4.2 and certified-asterisk versions 18.9-cert11 and 20.7-cert2 contain a fix for this issue."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:L",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "LOW",
|
||||
"baseScore": 7.4,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.1,
|
||||
"impactScore": 3.7
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-1220"
|
||||
},
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-267"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/asterisk/asterisk/blob/14367caaf7241df1eceea7c45c5b261989c2c6db/main/manager.c#L6426",
|
||||
"source": "security-advisories@github.com"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/asterisk/asterisk/blob/7d28165cb1b2d02d66e8693bd3fe23ee72fc55d8/main/manager.c#L6426",
|
||||
"source": "security-advisories@github.com"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/asterisk/asterisk/commit/42a2f4ccfa2c7062a15063e765916b3332e34cc4",
|
||||
"source": "security-advisories@github.com"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/asterisk/asterisk/commit/7a0090325bfa9d778a39ae5f7d0a98109e4651c8",
|
||||
"source": "security-advisories@github.com"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/asterisk/asterisk/commit/b4063bf756272254b160b6d1bd6e9a3f8e16cc71",
|
||||
"source": "security-advisories@github.com"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/asterisk/asterisk/commit/bbe68db10ab8a80c29db383e4dfe14f6eafaf993",
|
||||
"source": "security-advisories@github.com"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/asterisk/asterisk/commit/faddd99f2b9408b524e5eb8a01589fe1fa282df2",
|
||||
"source": "security-advisories@github.com"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/asterisk/asterisk/security/advisories/GHSA-c4cg-9275-6w44",
|
||||
"source": "security-advisories@github.com"
|
||||
}
|
||||
]
|
||||
}
|
64
CVE-2024/CVE-2024-423xx/CVE-2024-42366.json
Normal file
64
CVE-2024/CVE-2024-423xx/CVE-2024-42366.json
Normal file
@ -0,0 +1,64 @@
|
||||
{
|
||||
"id": "CVE-2024-42366",
|
||||
"sourceIdentifier": "security-advisories@github.com",
|
||||
"published": "2024-08-08T17:15:19.590",
|
||||
"lastModified": "2024-08-08T17:15:19.590",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "VRCX is an assistant/companion application for VRChat. In versions prior to 2024.03.23, a CefSharp browser with over-permission and cross-site scripting via overlay notification can be combined to result in remote command execution. These vulnerabilities are patched in VRCX 2023.12.24. In addition to the patch, VRCX maintainers worked with the VRC team and blocked the older version of VRCX on the VRC's API side. Users who use the older version of VRCX must update their installation to continue using VRCX."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 9.0,
|
||||
"baseSeverity": "CRITICAL"
|
||||
},
|
||||
"exploitabilityScore": 2.3,
|
||||
"impactScore": 6.0
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-269"
|
||||
},
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/vrcx-team/VRCX/commit/cd2387aa3289f936ce60049121c24b0765bd4180",
|
||||
"source": "security-advisories@github.com"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/vrcx-team/VRCX/security/advisories/GHSA-j98g-mgjm-wqph",
|
||||
"source": "security-advisories@github.com"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-6065",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2024-06-17T21:15:52.007",
|
||||
"lastModified": "2024-06-20T12:44:01.637",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2024-08-08T16:10:07.147",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -61,6 +61,26 @@
|
||||
}
|
||||
],
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
},
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
@ -120,22 +140,52 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:janobe:bakery_online_ordering_system:1.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "BF7A73B7-CA75-4CF3-AE1D-54B35F99D710"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/ppp-src/CVE/issues/4",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Exploit"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.268793",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Permissions Required",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.268793",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?submit.358386",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-6066",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2024-06-17T21:15:52.283",
|
||||
"lastModified": "2024-06-20T12:44:01.637",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2024-08-08T16:05:04.247",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -61,6 +61,26 @@
|
||||
}
|
||||
],
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
},
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
@ -120,22 +140,53 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:mayurik:best_house_rental_management_system:1.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "A7D6CEC7-5EE1-4052-B0E2-093C40418760"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/jadu101/CVE/blob/main/SourceCodester_House_Rental_Management_System_Sqli.md",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Exploit"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.268794",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Permissions Required",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.268794",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Permissions Required",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?submit.358439",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-6067",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2024-06-17T22:15:10.657",
|
||||
"lastModified": "2024-06-20T12:44:01.637",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2024-08-08T16:24:21.720",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -61,6 +61,26 @@
|
||||
}
|
||||
],
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
},
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
@ -120,22 +140,53 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:oretnom23:music_class_enrollment_system:1.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "E22143E2-3FBE-4804-A32C-B77D0BAC53B0"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/jadu101/CVE/blob/main/SourceCodester-Musical-Class-Enrollment-System-SQLi.md",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Exploit"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.268795",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Permissions Required",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.268795",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Permissions Required",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?submit.358566",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-6084",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2024-06-18T01:15:20.333",
|
||||
"lastModified": "2024-06-20T12:44:01.637",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2024-08-08T16:20:42.537",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -61,6 +61,26 @@
|
||||
}
|
||||
],
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
},
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
@ -120,22 +140,52 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:janobe:pool_of_bethesda_online_reservation_system:1.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "9DE894B7-EE1B-4ABB-8881-CF3BA3911206"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/Laster-dev/CVE/issues/2",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Exploit"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.268825",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Permissions Required",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.268825",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?submit.358628",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-6110",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2024-06-18T12:15:13.290",
|
||||
"lastModified": "2024-06-20T12:44:01.637",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2024-08-08T16:12:55.633",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -61,6 +61,26 @@
|
||||
}
|
||||
],
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
},
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
@ -120,22 +140,52 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:janobe:magbanua_beach_resort_online_reservation_system:1.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "6CB7216D-7848-48BA-9A2D-BFC765A0ED26"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/Laster-dev/CVE/issues/1",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Exploit"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.268856",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Permissions Required",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.268856",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?submit.358592",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-6652",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2024-07-10T23:15:15.250",
|
||||
"lastModified": "2024-07-11T13:05:54.930",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2024-08-08T16:43:37.053",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -61,6 +61,26 @@
|
||||
}
|
||||
],
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 8.8,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 5.9
|
||||
},
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
@ -120,22 +140,53 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:gym_management_system_project:gym_management_system:1.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "53D108B3-1095-42CE-89BC-32C4805EC803"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/littletree7/cve/issues/1",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Exploit"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.271059",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Permissions Required",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.271059",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Permissions Required",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?submit.372193",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
16
CVE-2024/CVE-2024-71xx/CVE-2024-7121.json
Normal file
16
CVE-2024/CVE-2024-71xx/CVE-2024-7121.json
Normal file
@ -0,0 +1,16 @@
|
||||
{
|
||||
"id": "CVE-2024-7121",
|
||||
"sourceIdentifier": "security@wordfence.com",
|
||||
"published": "2024-08-08T17:15:19.820",
|
||||
"lastModified": "2024-08-08T17:15:19.820",
|
||||
"vulnStatus": "Rejected",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Rejected reason: ** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. Reason: This candidate was issued in error. Notes: All references and descriptions in this candidate have been removed to prevent accidental usage."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": []
|
||||
}
|
16
CVE-2024/CVE-2024-71xx/CVE-2024-7123.json
Normal file
16
CVE-2024/CVE-2024-71xx/CVE-2024-7123.json
Normal file
@ -0,0 +1,16 @@
|
||||
{
|
||||
"id": "CVE-2024-7123",
|
||||
"sourceIdentifier": "security@wordfence.com",
|
||||
"published": "2024-08-08T17:15:19.970",
|
||||
"lastModified": "2024-08-08T17:15:19.970",
|
||||
"vulnStatus": "Rejected",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Rejected reason: ** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. Reason: This candidate was issued in error. Notes: All references and descriptions in this candidate have been removed to prevent accidental usage."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": []
|
||||
}
|
90
CVE-2024/CVE-2024-73xx/CVE-2024-7394.json
Normal file
90
CVE-2024/CVE-2024-73xx/CVE-2024-7394.json
Normal file
@ -0,0 +1,90 @@
|
||||
{
|
||||
"id": "CVE-2024-7394",
|
||||
"sourceIdentifier": "ff5b8ace-8b95-4078-9743-eac1ca5451de",
|
||||
"published": "2024-08-08T17:15:20.023",
|
||||
"lastModified": "2024-08-08T17:15:20.023",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Concrete CMS versions 9 through 9.3.2 and below 8.5.18 are vulnerable to Stored XSS in getAttributeSetName(). \u00a0A rogue administrator could inject malicious code. The Concrete CMS team gave this a CVSS v3.1 rank of 2 with vector AV:N/AC:H/PR:H/UI:R/S:U/C:L/I:N/A:N https://nvd.nist.gov/vuln-metrics/cvss/v3-calculator \u00a0and a CVSS v4.0 rank of 1.8 with vector CVSS:4.0/AV:N/AC:H/AT:N/PR:H/UI:A/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N https://www.first.org/cvss/calculator/4.0#CVSS:4.0/AV:N/AC:H/AT:N/PR:H/UI:A/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N . Thanks, m3dium for reporting."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV40": [
|
||||
{
|
||||
"source": "ff5b8ace-8b95-4078-9743-eac1ca5451de",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "4.0",
|
||||
"vectorString": "CVSS:4.0/AV:N/AC:H/AT:N/PR:H/UI:A/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "HIGH",
|
||||
"attackRequirements": "NONE",
|
||||
"privilegesRequired": "HIGH",
|
||||
"userInteraction": "ACTIVE",
|
||||
"vulnerableSystemConfidentiality": "LOW",
|
||||
"vulnerableSystemIntegrity": "NONE",
|
||||
"vulnerableSystemAvailability": "NONE",
|
||||
"subsequentSystemConfidentiality": "NONE",
|
||||
"subsequentSystemIntegrity": "NONE",
|
||||
"subsequentSystemAvailability": "NONE",
|
||||
"exploitMaturity": "NOT_DEFINED",
|
||||
"confidentialityRequirements": "NOT_DEFINED",
|
||||
"integrityRequirements": "NOT_DEFINED",
|
||||
"availabilityRequirements": "NOT_DEFINED",
|
||||
"modifiedAttackVector": "NOT_DEFINED",
|
||||
"modifiedAttackComplexity": "NOT_DEFINED",
|
||||
"modifiedAttackRequirements": "NOT_DEFINED",
|
||||
"modifiedPrivilegesRequired": "NOT_DEFINED",
|
||||
"modifiedUserInteraction": "NOT_DEFINED",
|
||||
"modifiedVulnerableSystemConfidentiality": "NOT_DEFINED",
|
||||
"modifiedVulnerableSystemIntegrity": "NOT_DEFINED",
|
||||
"modifiedVulnerableSystemAvailability": "NOT_DEFINED",
|
||||
"modifiedSubsequentSystemConfidentiality": "NOT_DEFINED",
|
||||
"modifiedSubsequentSystemIntegrity": "NOT_DEFINED",
|
||||
"modifiedSubsequentSystemAvailability": "NOT_DEFINED",
|
||||
"safety": "NOT_DEFINED",
|
||||
"automatable": "NOT_DEFINED",
|
||||
"recovery": "NOT_DEFINED",
|
||||
"valueDensity": "NOT_DEFINED",
|
||||
"vulnerabilityResponseEffort": "NOT_DEFINED",
|
||||
"providerUrgency": "NOT_DEFINED",
|
||||
"baseScore": 1.8,
|
||||
"baseSeverity": "LOW"
|
||||
}
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "ff5b8ace-8b95-4078-9743-eac1ca5451de",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-20"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://documentation.concretecms.org/9-x/developers/introduction/version-history/933-release-notes?pk_vid=e367a434ef4830491723055753d52041",
|
||||
"source": "ff5b8ace-8b95-4078-9743-eac1ca5451de"
|
||||
},
|
||||
{
|
||||
"url": "https://documentation.concretecms.org/developers/introduction/version-history/8518-release-notes?pk_vid=e367a434ef4830491723055758d52041",
|
||||
"source": "ff5b8ace-8b95-4078-9743-eac1ca5451de"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/concretecms/concretecms/commit/c08d9671cec4e7afdabb547339c4bc0bed8eab06",
|
||||
"source": "ff5b8ace-8b95-4078-9743-eac1ca5451de"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/concretecms/concretecms/pull/12166",
|
||||
"source": "ff5b8ace-8b95-4078-9743-eac1ca5451de"
|
||||
}
|
||||
]
|
||||
}
|
56
CVE-2024/CVE-2024-74xx/CVE-2024-7477.json
Normal file
56
CVE-2024/CVE-2024-74xx/CVE-2024-7477.json
Normal file
@ -0,0 +1,56 @@
|
||||
{
|
||||
"id": "CVE-2024-7477",
|
||||
"sourceIdentifier": "securityalerts@avaya.com",
|
||||
"published": "2024-08-08T16:15:09.363",
|
||||
"lastModified": "2024-08-08T16:15:09.363",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A SQL injection vulnerability was found which could allow a command line interface (CLI) user with administrative privileges to execute arbitrary queries against the\u00a0Avaya Aura System Manager\u00a0database.\u00a0\n\nAffected versions include 10.1.x.x and 10.2.x.x. Versions prior to 10.1 are end of manufacturer support."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "securityalerts@avaya.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "HIGH",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 6.5,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 0.6,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "securityalerts@avaya.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-89"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://download.avaya.com/css/public/documents/101091159",
|
||||
"source": "securityalerts@avaya.com"
|
||||
}
|
||||
]
|
||||
}
|
56
CVE-2024/CVE-2024-74xx/CVE-2024-7480.json
Normal file
56
CVE-2024/CVE-2024-74xx/CVE-2024-7480.json
Normal file
@ -0,0 +1,56 @@
|
||||
{
|
||||
"id": "CVE-2024-7480",
|
||||
"sourceIdentifier": "securityalerts@avaya.com",
|
||||
"published": "2024-08-08T16:15:09.567",
|
||||
"lastModified": "2024-08-08T16:15:09.567",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "An\u00a0Improper access control vulnerability was found in Avaya Aura System Manager which could allow a command-line interface (CLI) user with administrative privileges to read arbitrary files on the system.\u00a0Affected versions include 10.1.x.x and 10.2.x.x. Versions prior to 10.1 are end of manufacturer support."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "securityalerts@avaya.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:H/I:N/A:N",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "HIGH",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 4.2,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 0.6,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "securityalerts@avaya.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-269"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://download.avaya.com/css/public/documents/101091159",
|
||||
"source": "securityalerts@avaya.com"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-7490",
|
||||
"sourceIdentifier": "dc3f6da9-85b5-4a73-84a2-2ec90b40fca5",
|
||||
"published": "2024-08-08T15:15:19.057",
|
||||
"lastModified": "2024-08-08T15:15:19.057",
|
||||
"lastModified": "2024-08-08T17:15:20.163",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [
|
||||
{
|
||||
@ -15,7 +15,7 @@
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Improper Input Validation vulnerability in Microchip Techology Advanced Software Framework example DHCP server can cause remote code execution through a buffer overflow.\n This vulnerability is associated with program files tinydhcpserver.C and program routines lwip_dhcp_find_option.\n\nThis issue affects Advanced Software Framework: through 3.52.0.2574."
|
||||
"value": "Improper Input Validation vulnerability in Microchip Techology Advanced Software Framework example DHCP server can cause remote code execution through a buffer overflow.\n This vulnerability is associated with program files tinydhcpserver.C and program routines lwip_dhcp_find_option.\n\nThis issue affects Advanced Software Framework: through 3.52.0.2574.\n\n\nASF is no longer being supported. Apply provided workaround or migrate to an actively maintained framework."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
|
@ -2,16 +2,55 @@
|
||||
"id": "CVE-2024-7522",
|
||||
"sourceIdentifier": "security@mozilla.org",
|
||||
"published": "2024-08-06T13:15:57.237",
|
||||
"lastModified": "2024-08-06T23:15:59.960",
|
||||
"lastModified": "2024-08-08T16:35:14.220",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Editor code failed to check an attribute value. This could have led to an out-of-bounds read. This vulnerability affects Firefox < 129, Firefox ESR < 115.14, Firefox ESR < 128.1, Thunderbird < 128.1, and Thunderbird < 115.14."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "El c\u00f3digo del editor no pudo verificar el valor de un atributo. Esto podr\u00eda haber dado lugar a una lectura fuera de los l\u00edmites. Esta vulnerabilidad afecta a Firefox < 129, Firefox ESR < 115.14, Firefox ESR < 128.1, Thunderbird < 128.1 y Thunderbird < 115.14."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 9.1,
|
||||
"baseSeverity": "CRITICAL"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.2
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-125"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1906727",
|
||||
|
78
README.md
78
README.md
@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours.
|
||||
### Last Repository Update
|
||||
|
||||
```plain
|
||||
2024-08-08T16:00:18.459792+00:00
|
||||
2024-08-08T18:00:17.302181+00:00
|
||||
```
|
||||
|
||||
### Most recent CVE Modification Timestamp synchronized with NVD
|
||||
|
||||
```plain
|
||||
2024-08-08T15:55:51.160000+00:00
|
||||
2024-08-08T18:00:03.977000+00:00
|
||||
```
|
||||
|
||||
### Last Data Feed Release
|
||||
@ -33,50 +33,56 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
|
||||
### Total Number of included CVEs
|
||||
|
||||
```plain
|
||||
259359
|
||||
259371
|
||||
```
|
||||
|
||||
### CVEs added in the last Commit
|
||||
|
||||
Recently added CVEs: `6`
|
||||
Recently added CVEs: `12`
|
||||
|
||||
- [CVE-2024-41942](CVE-2024/CVE-2024-419xx/CVE-2024-41942.json) (`2024-08-08T15:15:17.527`)
|
||||
- [CVE-2024-42354](CVE-2024/CVE-2024-423xx/CVE-2024-42354.json) (`2024-08-08T15:15:17.793`)
|
||||
- [CVE-2024-42355](CVE-2024/CVE-2024-423xx/CVE-2024-42355.json) (`2024-08-08T15:15:18.013`)
|
||||
- [CVE-2024-42356](CVE-2024/CVE-2024-423xx/CVE-2024-42356.json) (`2024-08-08T15:15:18.247`)
|
||||
- [CVE-2024-42357](CVE-2024/CVE-2024-423xx/CVE-2024-42357.json) (`2024-08-08T15:15:18.460`)
|
||||
- [CVE-2024-7490](CVE-2024/CVE-2024-74xx/CVE-2024-7490.json) (`2024-08-08T15:15:19.057`)
|
||||
- [CVE-2024-0101](CVE-2024/CVE-2024-01xx/CVE-2024-0101.json) (`2024-08-08T17:15:17.560`)
|
||||
- [CVE-2024-0102](CVE-2024/CVE-2024-01xx/CVE-2024-0102.json) (`2024-08-08T17:15:18.013`)
|
||||
- [CVE-2024-0107](CVE-2024/CVE-2024-01xx/CVE-2024-0107.json) (`2024-08-08T17:15:18.240`)
|
||||
- [CVE-2024-0108](CVE-2024/CVE-2024-01xx/CVE-2024-0108.json) (`2024-08-08T17:15:18.473`)
|
||||
- [CVE-2024-41238](CVE-2024/CVE-2024-412xx/CVE-2024-41238.json) (`2024-08-08T16:15:09.123`)
|
||||
- [CVE-2024-42365](CVE-2024/CVE-2024-423xx/CVE-2024-42365.json) (`2024-08-08T17:15:19.340`)
|
||||
- [CVE-2024-42366](CVE-2024/CVE-2024-423xx/CVE-2024-42366.json) (`2024-08-08T17:15:19.590`)
|
||||
- [CVE-2024-7121](CVE-2024/CVE-2024-71xx/CVE-2024-7121.json) (`2024-08-08T17:15:19.820`)
|
||||
- [CVE-2024-7123](CVE-2024/CVE-2024-71xx/CVE-2024-7123.json) (`2024-08-08T17:15:19.970`)
|
||||
- [CVE-2024-7394](CVE-2024/CVE-2024-73xx/CVE-2024-7394.json) (`2024-08-08T17:15:20.023`)
|
||||
- [CVE-2024-7477](CVE-2024/CVE-2024-74xx/CVE-2024-7477.json) (`2024-08-08T16:15:09.363`)
|
||||
- [CVE-2024-7480](CVE-2024/CVE-2024-74xx/CVE-2024-7480.json) (`2024-08-08T16:15:09.567`)
|
||||
|
||||
|
||||
### CVEs modified in the last Commit
|
||||
|
||||
Recently modified CVEs: `99`
|
||||
Recently modified CVEs: `33`
|
||||
|
||||
- [CVE-2024-42233](CVE-2024/CVE-2024-422xx/CVE-2024-42233.json) (`2024-08-08T14:56:18.620`)
|
||||
- [CVE-2024-42234](CVE-2024/CVE-2024-422xx/CVE-2024-42234.json) (`2024-08-08T14:55:29.913`)
|
||||
- [CVE-2024-42235](CVE-2024/CVE-2024-422xx/CVE-2024-42235.json) (`2024-08-08T14:55:16.533`)
|
||||
- [CVE-2024-42236](CVE-2024/CVE-2024-422xx/CVE-2024-42236.json) (`2024-08-08T14:54:34.470`)
|
||||
- [CVE-2024-42237](CVE-2024/CVE-2024-422xx/CVE-2024-42237.json) (`2024-08-08T14:54:24.207`)
|
||||
- [CVE-2024-42238](CVE-2024/CVE-2024-422xx/CVE-2024-42238.json) (`2024-08-08T14:54:45.470`)
|
||||
- [CVE-2024-42239](CVE-2024/CVE-2024-422xx/CVE-2024-42239.json) (`2024-08-08T14:54:08.330`)
|
||||
- [CVE-2024-42240](CVE-2024/CVE-2024-422xx/CVE-2024-42240.json) (`2024-08-08T14:53:59.897`)
|
||||
- [CVE-2024-42241](CVE-2024/CVE-2024-422xx/CVE-2024-42241.json) (`2024-08-08T14:53:50.763`)
|
||||
- [CVE-2024-42242](CVE-2024/CVE-2024-422xx/CVE-2024-42242.json) (`2024-08-08T14:53:42.797`)
|
||||
- [CVE-2024-42243](CVE-2024/CVE-2024-422xx/CVE-2024-42243.json) (`2024-08-08T14:53:35.073`)
|
||||
- [CVE-2024-42244](CVE-2024/CVE-2024-422xx/CVE-2024-42244.json) (`2024-08-08T14:53:27.147`)
|
||||
- [CVE-2024-42245](CVE-2024/CVE-2024-422xx/CVE-2024-42245.json) (`2024-08-08T14:53:19.530`)
|
||||
- [CVE-2024-42246](CVE-2024/CVE-2024-422xx/CVE-2024-42246.json) (`2024-08-08T14:52:35.353`)
|
||||
- [CVE-2024-42247](CVE-2024/CVE-2024-422xx/CVE-2024-42247.json) (`2024-08-08T14:52:25.213`)
|
||||
- [CVE-2024-42395](CVE-2024/CVE-2024-423xx/CVE-2024-42395.json) (`2024-08-08T15:35:20.467`)
|
||||
- [CVE-2024-4965](CVE-2024/CVE-2024-49xx/CVE-2024-4965.json) (`2024-08-08T15:15:18.730`)
|
||||
- [CVE-2024-6206](CVE-2024/CVE-2024-62xx/CVE-2024-6206.json) (`2024-08-08T14:35:13.290`)
|
||||
- [CVE-2024-6481](CVE-2024/CVE-2024-64xx/CVE-2024-6481.json) (`2024-08-08T14:35:14.190`)
|
||||
- [CVE-2024-6706](CVE-2024/CVE-2024-67xx/CVE-2024-6706.json) (`2024-08-08T14:35:14.497`)
|
||||
- [CVE-2024-6707](CVE-2024/CVE-2024-67xx/CVE-2024-6707.json) (`2024-08-08T14:35:14.743`)
|
||||
- [CVE-2024-6890](CVE-2024/CVE-2024-68xx/CVE-2024-6890.json) (`2024-08-08T14:35:15.090`)
|
||||
- [CVE-2024-6891](CVE-2024/CVE-2024-68xx/CVE-2024-6891.json) (`2024-08-08T14:35:15.340`)
|
||||
- [CVE-2024-6893](CVE-2024/CVE-2024-68xx/CVE-2024-6893.json) (`2024-08-08T14:35:15.587`)
|
||||
- [CVE-2024-7265](CVE-2024/CVE-2024-72xx/CVE-2024-7265.json) (`2024-08-08T15:15:18.970`)
|
||||
- [CVE-2024-3180](CVE-2024/CVE-2024-31xx/CVE-2024-3180.json) (`2024-08-08T17:15:19.223`)
|
||||
- [CVE-2024-34230](CVE-2024/CVE-2024-342xx/CVE-2024-34230.json) (`2024-08-08T16:35:11.040`)
|
||||
- [CVE-2024-37315](CVE-2024/CVE-2024-373xx/CVE-2024-37315.json) (`2024-08-08T16:35:23.750`)
|
||||
- [CVE-2024-37884](CVE-2024/CVE-2024-378xx/CVE-2024-37884.json) (`2024-08-08T16:39:59.217`)
|
||||
- [CVE-2024-37887](CVE-2024/CVE-2024-378xx/CVE-2024-37887.json) (`2024-08-08T16:33:31.063`)
|
||||
- [CVE-2024-38301](CVE-2024/CVE-2024-383xx/CVE-2024-38301.json) (`2024-08-08T17:01:45.347`)
|
||||
- [CVE-2024-40898](CVE-2024/CVE-2024-408xx/CVE-2024-40898.json) (`2024-08-08T16:02:40.887`)
|
||||
- [CVE-2024-41037](CVE-2024/CVE-2024-410xx/CVE-2024-41037.json) (`2024-08-08T17:53:57.487`)
|
||||
- [CVE-2024-41038](CVE-2024/CVE-2024-410xx/CVE-2024-41038.json) (`2024-08-08T17:54:28.177`)
|
||||
- [CVE-2024-41087](CVE-2024/CVE-2024-410xx/CVE-2024-41087.json) (`2024-08-08T18:00:03.977`)
|
||||
- [CVE-2024-41089](CVE-2024/CVE-2024-410xx/CVE-2024-41089.json) (`2024-08-08T17:50:48.727`)
|
||||
- [CVE-2024-41092](CVE-2024/CVE-2024-410xx/CVE-2024-41092.json) (`2024-08-08T17:51:11.700`)
|
||||
- [CVE-2024-41093](CVE-2024/CVE-2024-410xx/CVE-2024-41093.json) (`2024-08-08T17:40:31.917`)
|
||||
- [CVE-2024-41095](CVE-2024/CVE-2024-410xx/CVE-2024-41095.json) (`2024-08-08T17:40:57.760`)
|
||||
- [CVE-2024-41096](CVE-2024/CVE-2024-410xx/CVE-2024-41096.json) (`2024-08-08T17:26:54.243`)
|
||||
- [CVE-2024-41098](CVE-2024/CVE-2024-410xx/CVE-2024-41098.json) (`2024-08-08T17:27:55.600`)
|
||||
- [CVE-2024-41239](CVE-2024/CVE-2024-412xx/CVE-2024-41239.json) (`2024-08-08T16:15:09.190`)
|
||||
- [CVE-2024-6065](CVE-2024/CVE-2024-60xx/CVE-2024-6065.json) (`2024-08-08T16:10:07.147`)
|
||||
- [CVE-2024-6066](CVE-2024/CVE-2024-60xx/CVE-2024-6066.json) (`2024-08-08T16:05:04.247`)
|
||||
- [CVE-2024-6067](CVE-2024/CVE-2024-60xx/CVE-2024-6067.json) (`2024-08-08T16:24:21.720`)
|
||||
- [CVE-2024-6084](CVE-2024/CVE-2024-60xx/CVE-2024-6084.json) (`2024-08-08T16:20:42.537`)
|
||||
- [CVE-2024-6110](CVE-2024/CVE-2024-61xx/CVE-2024-6110.json) (`2024-08-08T16:12:55.633`)
|
||||
- [CVE-2024-6652](CVE-2024/CVE-2024-66xx/CVE-2024-6652.json) (`2024-08-08T16:43:37.053`)
|
||||
- [CVE-2024-7490](CVE-2024/CVE-2024-74xx/CVE-2024-7490.json) (`2024-08-08T17:15:20.163`)
|
||||
- [CVE-2024-7522](CVE-2024/CVE-2024-75xx/CVE-2024-7522.json) (`2024-08-08T16:35:14.220`)
|
||||
|
||||
|
||||
## Download and Usage
|
||||
|
286
_state.csv
286
_state.csv
@ -6345,7 +6345,7 @@ CVE-2002-2020,0,0,c43e8c9455f36070484f9b3430060219675622985597fe4ead375bc67ab75f
|
||||
CVE-2002-2021,0,0,22e43e2af48e1ab1b08e5ec4baf46250f55a3e046f9a0cee21e45b856ec2d84a,2008-09-05T20:32:07.387000
|
||||
CVE-2002-2022,0,0,fde5859713c3639523370bcb059cf3100ff87332c3b0fa0672526f305d5e89bc,2008-09-05T20:32:07.540000
|
||||
CVE-2002-2023,0,0,d08df7fa4f052c6c2635521c9a67c776b7421b631cf5eafd7dbacd951801cdbe,2008-09-05T20:32:07.697000
|
||||
CVE-2002-2024,0,1,aadd687fac19baf43b88b34733b0ab9e3d9b027926f9db3f9c1929de905b156f,2024-08-08T14:35:00.557000
|
||||
CVE-2002-2024,0,0,aadd687fac19baf43b88b34733b0ab9e3d9b027926f9db3f9c1929de905b156f,2024-08-08T14:35:00.557000
|
||||
CVE-2002-2025,0,0,c8d790aa7748c2fc38fdcd5f87e40b9df90bb51cc9eb166ea1d9e7201afc771e,2023-11-07T01:56:07.430000
|
||||
CVE-2002-2026,0,0,df761725f9aefd2d39b32606d747b504d29e9d259a10e5b7fa3a0c093ddb6c42,2008-09-05T20:32:08.183000
|
||||
CVE-2002-2027,0,0,4b056c090548d22f54865b7e3f1a59d9d39c59996ae9c842018ab198f5d9dcb1,2008-09-05T20:32:08.323000
|
||||
@ -110521,7 +110521,7 @@ CVE-2018-0820,0,0,37d589a7f7767da548742f43b26a7c38d523c69858e08b8d59487fdbeb3dfa
|
||||
CVE-2018-0821,0,0,37dec9a7b0ae2ffd8a131f1a880202d0667df20584fc6dd4d2087710ee9368d0,2019-10-03T00:03:26.223000
|
||||
CVE-2018-0822,0,0,c66251d7b34352211af4f5a1245ff2487d2b8b80cc2206f069acf1fd0551276c,2019-10-03T00:03:26.223000
|
||||
CVE-2018-0823,0,0,ac2d84c2f389fa31c4d934d83621a09019f5c8716fb56f16749dd620acccf433,2019-10-03T00:03:26.223000
|
||||
CVE-2018-0824,0,1,d820697974a95a92220b3c50ba68426731cecbd20100a1a9c5c73ea42658cc59,2024-08-08T14:50:32.110000
|
||||
CVE-2018-0824,0,0,d820697974a95a92220b3c50ba68426731cecbd20100a1a9c5c73ea42658cc59,2024-08-08T14:50:32.110000
|
||||
CVE-2018-0825,0,0,19d1e409c71f6bdd74f7307c0ca3ae6349435b385c177c0f107f15ffa26c9de1,2022-05-23T17:29:15.350000
|
||||
CVE-2018-0826,0,0,0262a58d145e4ac0fc914edffbaef5cbfb5a2eb6406789cd178f229c4198538c,2019-10-03T00:03:26.223000
|
||||
CVE-2018-0827,0,0,ea8505a0898212d1f009c625f74ba880dc432a66250be2699ee30b8136b4f69f,2019-10-03T00:03:26.223000
|
||||
@ -187289,7 +187289,7 @@ CVE-2021-47445,0,0,21fc896860fffefafa9aa835465276d609313e1013c80059416f676b461ea
|
||||
CVE-2021-47446,0,0,3c208b33728fa949084ac2577096bc3db3ea155516d8511259e29c10cf44eec1,2024-05-22T12:46:53.887000
|
||||
CVE-2021-47447,0,0,7d3e3404bbe938d7cf8428882bca2545505fcf5836de23d533ad6b776039a099,2024-05-22T12:46:53.887000
|
||||
CVE-2021-47448,0,0,84543ebd7e0959e3d92727cfcb58cc634497b7d0c46172885626db67641195bc,2024-05-22T12:46:53.887000
|
||||
CVE-2021-47449,0,1,9b6e22d1737352b54ef63c271e27f44f899978519026cb2f331d0431c52ca925,2024-08-08T15:35:01.740000
|
||||
CVE-2021-47449,0,0,9b6e22d1737352b54ef63c271e27f44f899978519026cb2f331d0431c52ca925,2024-08-08T15:35:01.740000
|
||||
CVE-2021-47450,0,0,e7487069497e55beeb1cdab85e0945911f094cb4e8e05214f68bab9fa64ec639,2024-05-22T12:46:53.887000
|
||||
CVE-2021-47451,0,0,abd0feafb8f299e1b7b139009f40730b8058f13775455cb4ca5c07a53e5fca93,2024-05-22T12:46:53.887000
|
||||
CVE-2021-47452,0,0,e2121f6d240f1ef11cb0d844440a6e3e4146b77dac993a2eccd06e90cf498e50,2024-05-22T12:46:53.887000
|
||||
@ -212126,7 +212126,7 @@ CVE-2022-48659,0,0,739b868a474a4ffd0d46243cb98b66c6dfd7ee413018b4f326afd972c1be9
|
||||
CVE-2022-4866,0,0,199e44d50116095b956b964a4c6fd43b01b5552a04fb1a09a2a7d98fc1c49607,2023-01-06T21:24:01.587000
|
||||
CVE-2022-48660,0,0,8d46c959e786b8b58955f0ff93ba1d3c08d6316eb1842ed4f09b2150e1c368bf,2024-04-30T15:06:08.540000
|
||||
CVE-2022-48661,0,0,3c1a91a4878fc0dffd0274a57d5ef2e983527ee481ceb34709f9a63b3494b859,2024-04-30T15:05:37.530000
|
||||
CVE-2022-48662,0,0,107826e06defd05649e280a189037cc55d251feb868d97da90eaf9a0414354af,2024-04-30T15:03:30.553000
|
||||
CVE-2022-48662,0,1,4ca2f1a058f4d2db61a4549f15a664d250019454531a3330e1e773232ecca95f,2024-08-08T16:35:01.007000
|
||||
CVE-2022-48663,0,0,faa35d27b468e0fe98ba3119f078a76fddc46319da6c037dd74eacad5fe5db95,2024-04-29T12:42:03.667000
|
||||
CVE-2022-48664,0,0,98f5b9aae9394a787d88883dde988c23ff88ed82e2585a6fbf2ab1feed010f18,2024-04-29T12:42:03.667000
|
||||
CVE-2022-48665,0,0,61f8dd0c53e94318dbff1c099a7764d159a4ff134c1b49d99d2540fba60ac74e,2024-04-29T12:42:03.667000
|
||||
@ -220547,7 +220547,7 @@ CVE-2023-27632,0,0,7d63548d0abe85e0b0632ab7aaf41f7ead23df0f48603c9db3839cf29d10f
|
||||
CVE-2023-27633,0,0,667915267380321c38091d3911cbba4db7ed7d4486126c4c2e607eb21aee4206,2023-11-30T19:19:27.577000
|
||||
CVE-2023-27634,0,0,eaa23db8570d1347105bceb81f013c40b227ebf03b3ad9c57e98eb59567f5f06,2023-06-22T16:20:13.857000
|
||||
CVE-2023-27635,0,0,a170767a3a9745c536f76deaac4974d5bd153d1fb1267ed8ca68c7bf522f58ac,2023-03-13T16:40:51.640000
|
||||
CVE-2023-27636,0,1,5b38555da95857791af63fff1a48ebddcd333d7257b9ca08d9069318086716c1,2024-08-08T14:08:34.707000
|
||||
CVE-2023-27636,0,0,5b38555da95857791af63fff1a48ebddcd333d7257b9ca08d9069318086716c1,2024-08-08T14:08:34.707000
|
||||
CVE-2023-27637,0,0,09c54c05a6fc0cdafe1a0a5f17e0b09492affbb7af175f018052ffb34b848c42,2023-06-21T15:58:54.023000
|
||||
CVE-2023-27638,0,0,4a9411179b2442608547cd54016c6025bc41a8d74d58cedfa7327acf1b2b9c0e,2023-06-21T15:58:51.637000
|
||||
CVE-2023-27639,0,0,3c1eda8a47206555c299dfbebd4c1eb14d2a6a52bbb717933a2ca5930a4f1dc7,2023-06-09T15:48:23.720000
|
||||
@ -237067,7 +237067,7 @@ CVE-2023-50000,0,0,9f688a9792ad2ce6d0658cbf9071b12e1b4df659935180a67724a25c5cd88
|
||||
CVE-2023-50001,0,0,b4771677786ecba9bde15a0f76b34acceb49e626365dbda21f278b0628caa15d,2023-12-09T04:45:12.637000
|
||||
CVE-2023-50002,0,0,4ec906b692f1a9dd432c48a906e1571a789a584d37b771b6956e1b52d20411aa,2023-12-09T04:45:15.093000
|
||||
CVE-2023-50007,0,0,c2a98c3d87da72b92c324ba3cb08ad35629bf406e9b3c35addda6f10f3816108,2024-07-03T01:42:48.353000
|
||||
CVE-2023-50008,0,0,f6f91531be169cece903630a442bc5772f38d2e61707ca8ffbb5e96b52d35adc,2024-06-10T18:15:23.660000
|
||||
CVE-2023-50008,0,1,7f115fb7cf065952761d4f3da06cb7d1d06fdd92c76ae962b98d8b7ee2cdcb0d,2024-08-08T16:35:02.053000
|
||||
CVE-2023-50009,0,0,170dd9930657e166b905729f0ac42a66a8992249c05ebf1d569c0f4eb6cd99b1,2024-07-03T01:42:49.137000
|
||||
CVE-2023-5001,0,0,d9ac16974d049c360e3bd40fa3597b22777e9e496c7757647056f596e2b1a7bd,2023-11-07T04:23:17.670000
|
||||
CVE-2023-50010,0,0,2cb91c5b0cd0b34eab6d9a9d9e423db72c16e763bec8471e43a8ef97d96dc827,2024-07-03T01:42:49.940000
|
||||
@ -237413,7 +237413,7 @@ CVE-2023-50693,0,0,dd08939e4ce32c03f59f04532580821ca5b697adc34a251e1c45db564373a
|
||||
CVE-2023-50694,0,0,78b1aa0914931a0876815df8adb1c998b4fa38e7b62d7363c774f0a97cabce80,2024-03-21T02:49:58.640000
|
||||
CVE-2023-5070,0,0,9fb6a723c8279931601cd42b57dae05abcb788776665c70d867d5b3fe8e04ffe,2023-11-07T04:23:25.600000
|
||||
CVE-2023-50700,0,0,a170e7fca21b0a66cf96d92c9a79d76d10f0f906521b1974e4809465f286d528,2024-08-01T13:45:26.497000
|
||||
CVE-2023-50702,0,0,aabbc77a2d305beae7af1d1ea3729a356ffb437e099440502361eda2d189553a,2024-03-27T12:29:30.307000
|
||||
CVE-2023-50702,0,1,5a9a6e1f931a55dff8e60df6ebb6d3783b09408223c86b861d914b06ab161284,2024-08-08T16:35:03.110000
|
||||
CVE-2023-50703,0,0,5412fe627eb96f0f79abae297ed08738bff2931ef5956788ab3e3239f68219e5,2023-12-29T16:32:32.477000
|
||||
CVE-2023-50704,0,0,d49cda3dff4ba1c0ede49172a75175738fe4d5075a250a9b7bfefb732a3e26ef,2023-12-29T16:31:20.133000
|
||||
CVE-2023-50705,0,0,ad0a3e4412ad9c92740ec4e4e393908819d60949342bffcc602e49dd7390ae76,2023-12-29T16:28:38.393000
|
||||
@ -239038,7 +239038,7 @@ CVE-2023-52813,0,0,5a497de90c526172c26b5dac57669c5d83bcc91b8398c5bb528989dc5ae64
|
||||
CVE-2023-52814,0,0,7beb37b73115ec81ce0ec04ef14d3c556e989e0aeced84f5749a8521c2300544,2024-07-03T01:44:01.383000
|
||||
CVE-2023-52815,0,0,00e28cef1b8ae125ec0e755924b2b62d1b00a745a0d5e9b45c6a2d985c46ff6f,2024-05-24T01:14:29.643000
|
||||
CVE-2023-52816,0,0,2d9134e11a2e8e924c15c258352c1c9a81d5ec49c658e3031c83980ea09240f2,2024-05-21T16:53:56.550000
|
||||
CVE-2023-52817,0,1,c91d2047da8bbfe976f327dcdb351220f8bcbbab0add37701f32515ee0413d05,2024-08-08T15:35:04.263000
|
||||
CVE-2023-52817,0,0,c91d2047da8bbfe976f327dcdb351220f8bcbbab0add37701f32515ee0413d05,2024-08-08T15:35:04.263000
|
||||
CVE-2023-52818,0,0,7f2852fb5747a8c60c395929c96799e7bca84aa85fa64d70c2a6f8db55b17943,2024-05-21T16:53:56.550000
|
||||
CVE-2023-52819,0,0,e59c42c5eaf7a76edce756156fead26d956efd3a1ed27e24e182693a4bf1971a,2024-05-21T16:53:56.550000
|
||||
CVE-2023-5282,0,0,85ba66d123a16998bc65330f022fdaf483cda482ea06414e7b1194275a4fbce6,2024-05-17T02:32:58.013000
|
||||
@ -239224,7 +239224,7 @@ CVE-2023-5393,0,0,ce078de54b177ac4406f630c3c1fed3ce153dfa6eaf31f252a0377c134b8cd
|
||||
CVE-2023-5394,0,0,a96d7207f4eb5f9d49798c5e726b517481bba2916f942eb56932f569e6dc4d9e,2024-04-12T12:43:57.400000
|
||||
CVE-2023-5395,0,0,42220d960331ea232791f8929a2890ca4fa05b271badde81e14439f1a1e3f0dd,2024-04-17T20:08:21.887000
|
||||
CVE-2023-5396,0,0,007a12e631c053a3e331d0a53b8f249595ed84b8b7b57b06d9e2c90e9e577e11,2024-04-17T20:08:21.887000
|
||||
CVE-2023-5397,0,0,61d0435957a2fc5389b6bb152f683a8e54d0fd2d11e4dcec1ed16edcd445740b,2024-04-17T20:08:21.887000
|
||||
CVE-2023-5397,0,1,09540507e05c48e772c47aa2a9d172c4b1ebc1df188d43479285639da81701fa,2024-08-08T16:35:04.180000
|
||||
CVE-2023-5398,0,0,03dafa4dab8d65556fef227ab72b602748ace9cd1ad664cc261be580c6de3ef7,2024-04-17T20:08:21.887000
|
||||
CVE-2023-5399,0,0,2077fc3839d7041d58d4243bb44c146fe2a56129890351df55240d8647ef2ac3,2023-10-29T02:33:20.933000
|
||||
CVE-2023-5400,0,0,248a9a65e9b9caa77a1b34eeb3f0b78767eeb5cf9522e2439f2b3bce2064987c,2024-04-17T20:08:21.887000
|
||||
@ -240965,7 +240965,11 @@ CVE-2024-0097,0,0,828e0d6edaac74d80e85e7cd248c4487f7d9ed2e02d8d361934a62f860a855
|
||||
CVE-2024-0098,0,0,069a5c23019341513ba5e45eb7cd80085fa3c5305327bc38e3233b2410f520d3,2024-05-14T16:13:02.773000
|
||||
CVE-2024-0099,0,0,a353a072382bc9c8f100deeb43f065f1ec38735a442f0652f39ff4a5b9a341a3,2024-06-17T12:43:31.090000
|
||||
CVE-2024-0100,0,0,f536814b5676db735894c02187696008c7cf1b3d39286954ee01bd7aaee5fdca,2024-05-14T16:13:02.773000
|
||||
CVE-2024-0101,1,1,1e85eaa0e6f02d7c957fcc14c2e942ff4ea3831be8864e4f7fe5413e400b8f89,2024-08-08T17:15:17.560000
|
||||
CVE-2024-0102,1,1,79147c4b917305337ce222e03fcf97f5dcd85cd50dd383102a8f7a874fa89713,2024-08-08T17:15:18.013000
|
||||
CVE-2024-0103,0,0,eebac6a0b28b06a0ab4b619fce7f6cf8faf596bcdcd276c9218b76333b76bf05,2024-06-17T12:43:31.090000
|
||||
CVE-2024-0107,1,1,b7328357e000247162d1b1ff91c0ee7902dd7ca392f89b8b3405fd20663b27cd,2024-08-08T17:15:18.240000
|
||||
CVE-2024-0108,1,1,0f9c01a35f626b0080419755561c41419878a521a591f52ce6ac90990b96b475,2024-08-08T17:15:18.473000
|
||||
CVE-2024-0151,0,0,76f8e609c18c3e1a4007c23b03249fd06e27f5de1d5adec60540b40f497459b7,2024-04-25T08:15:07.420000
|
||||
CVE-2024-0153,0,0,27805279095cb051183cab09aac75c2d46b1759d5204833928b95d85cf667e87,2024-07-03T01:44:37.677000
|
||||
CVE-2024-0154,0,0,e0c538dbc1a8e60b09b037cacd452435c496c209b1106146ca859e110f3efaa6,2024-03-13T18:15:58.530000
|
||||
@ -243918,7 +243922,7 @@ CVE-2024-21816,0,0,3556729912be1fc6b4992629f2fcc218916937e232361f846f9c6dbeb23ef
|
||||
CVE-2024-21818,0,0,c637d2f2e962f29751d87c76f242879f1ed5232e4fb28fc3b3902f1a9fec3083,2024-05-17T18:36:05.263000
|
||||
CVE-2024-2182,0,0,e5d057aaf5079db80e1e474120adef9e78f0f137b5dec62cd588e101fd1aaeae,2024-06-20T23:15:51.710000
|
||||
CVE-2024-21821,0,0,7321c5e03ded4c9a82a76a55d87da948884b86260a5a676716e6227a5659e3c2,2024-07-03T23:15:02.157000
|
||||
CVE-2024-21823,0,1,ef966f9b1400806029177a0b8af9f0c4d64ad7fa783b89a1b12229e1edcf4217,2024-08-08T15:35:06.513000
|
||||
CVE-2024-21823,0,0,ef966f9b1400806029177a0b8af9f0c4d64ad7fa783b89a1b12229e1edcf4217,2024-08-08T15:35:06.513000
|
||||
CVE-2024-21824,0,0,7aa5726f0c5574af74e9f5a3cf3ffd6696b10e95ff2f5e13938ce9966974ff7c,2024-03-18T12:38:25.490000
|
||||
CVE-2024-21825,0,0,d4fc704324754f387b029d9f0684cd28f1fe50758fd7d66af26180f7c807a125,2024-02-26T18:15:07.390000
|
||||
CVE-2024-21826,0,0,e4665c6424ea4b61934e3bcd1ab7ddf62869802487f99534f2a3f3dd7a0149b4,2024-03-04T13:58:23.447000
|
||||
@ -244478,7 +244482,7 @@ CVE-2024-22627,0,0,7de1240a28417cbc53b0ae0bc15d5725aafb2c30be8715fae81f72db699db
|
||||
CVE-2024-22628,0,0,c48e2ec55f18b02d5d682e8e3830e76341123221faa60f4082cbda6cff78fe53,2024-01-19T14:33:00.143000
|
||||
CVE-2024-2263,0,0,99c9bacabc6e08e73f0d8c338bf9824b2423a516921892dd6360ed31ad0e3588,2024-04-01T12:49:00.877000
|
||||
CVE-2024-22632,0,0,a97332f0b173cc610cbf62f4df4cd14dbcbefc795dfe6e338a0059d8c9ab3926,2024-04-26T12:58:17.720000
|
||||
CVE-2024-22633,0,0,f1b2654014e720ddeab7fea4aa5632c092020c5bde26eb69c784da88500f7007,2024-04-26T12:58:17.720000
|
||||
CVE-2024-22633,0,1,62bbea01bbc9e791cb93aa09eb03c6d5e054ab6b131ba05c74d3ac37dac5c57e,2024-08-08T16:35:05.543000
|
||||
CVE-2024-22635,0,0,b93c7bc1d12536d652dcc85ddd79edfb5c7213a29d94f8bd78c761d3d7145598,2024-01-29T15:57:23.770000
|
||||
CVE-2024-22636,0,0,89d4b44d2ef5b65ebff1ecc48c0ac08f7378ed51f775b08505485e1b9be39e7e,2024-01-29T15:57:32.540000
|
||||
CVE-2024-22637,0,0,a291343c074c38d5ffa0ead2af145c1d6fcfb9e6210b62bf7edb9b14c027e94a,2024-02-15T15:19:44.187000
|
||||
@ -245974,7 +245978,7 @@ CVE-2024-25065,0,0,16a7a7b6f026624f93e53a8f22e4552bfc2be0aea00d361d0fcaf4a0f3d59
|
||||
CVE-2024-2507,0,0,059cda731f595d08cc9a92bc2f36829afe22653a29c81bf0cc15e53c1729da6d,2024-04-10T13:23:38.787000
|
||||
CVE-2024-25075,0,0,bfed480b2306172449fd442aea4561660fa83ab81e8f534c8111cd2e1f0d7f14,2024-04-03T12:38:04.840000
|
||||
CVE-2024-25076,0,0,26f9af1ba1d1d6abf593ce5cb002ec7a5de923ee3f100a60b5eb1daeac203495,2024-07-11T15:05:28.443000
|
||||
CVE-2024-25077,0,1,9936dfb9fa263db917d226ab0cd6f8d094e5b95fa936d5098b62c9aa7f5236ab,2024-08-08T14:35:02.810000
|
||||
CVE-2024-25077,0,0,9936dfb9fa263db917d226ab0cd6f8d094e5b95fa936d5098b62c9aa7f5236ab,2024-08-08T14:35:02.810000
|
||||
CVE-2024-25078,0,0,14ea593bbd760f1a861775a7e6100acb3fd7a8f88d884ae3f61694ec3c2b2927,2024-07-03T01:48:39.997000
|
||||
CVE-2024-25079,0,0,df3a5b95b7f6f4370caee005112754774cb6bfa4fa30f82a6ed48ecf2a7fc17d,2024-07-03T01:48:40.830000
|
||||
CVE-2024-2508,0,0,5f5b90c70383af5e74076ecfe442ac5d6b537a3785081aa188cda0ddf04bd81f,2024-07-31T12:57:02.300000
|
||||
@ -246199,7 +246203,7 @@ CVE-2024-25434,0,0,26bac245bd5b6380c1089f8063086eb0c8545596793c0265b0d4261729bfc
|
||||
CVE-2024-25435,0,0,b518f964ef14d92ab1a5ca1db15bba6ee80949a3cea6fd366efd019d37dc656f,2024-02-29T13:49:47.277000
|
||||
CVE-2024-25436,0,0,16fb2e1f886d8db1c20751b88d1af87dc346511e3a7b7468111bb026aa3d1366,2024-03-04T13:58:23.447000
|
||||
CVE-2024-25438,0,0,7afb128454169133a93c3b51a6bebbe2c69c11640c7e435fab86df0a19809367,2024-03-04T13:58:23.447000
|
||||
CVE-2024-2544,0,1,ed2d05b42178fff9a17d6f22998085016a1e0e93b19acb35a0624153a8b064cb,2024-08-08T15:27:52.437000
|
||||
CVE-2024-2544,0,0,ed2d05b42178fff9a17d6f22998085016a1e0e93b19acb35a0624153a8b064cb,2024-08-08T15:27:52.437000
|
||||
CVE-2024-25442,0,0,eb84b12a8b6870c7b4be7ea073493dd91ec0cf779e81ffeb769d60880071c8d7,2024-02-20T02:15:51.217000
|
||||
CVE-2024-25443,0,0,f9f46e03349c3c7bab20646f2d76799e4fab073653be96db01bac732191b3058,2024-02-20T02:15:51.313000
|
||||
CVE-2024-25445,0,0,9513b3e5a2e30e7d6439b2cce4865346623e49c934516a91bc102f1687ad8e58,2024-02-20T02:15:51.397000
|
||||
@ -247348,7 +247352,7 @@ CVE-2024-26925,0,0,2724913f362a9890cc8fb3dd8cbeebdee08487b2bf7ffa79a3e9b6cbc6100
|
||||
CVE-2024-26926,0,0,afaf5b7b6b1e2e8422b7d9a5d5e09d6dca5c5bcaea40d04fd581fd0c9bb650ce,2024-06-25T23:15:27.893000
|
||||
CVE-2024-26927,0,0,4116dbe7df52a1c2d9850cca2fd6397392bdbeda2c2b84e268cf9d86129f791b,2024-07-03T01:50:01.863000
|
||||
CVE-2024-26928,0,0,8849c5ddf3f8359b34f84019effa9d5d4066ffd02515d38a7a9e159b15bfe7a3,2024-04-29T12:42:03.667000
|
||||
CVE-2024-26929,0,0,e9a82e089aa3e4881a5478421ee66ca6239f4ec3adb415a1a5c4fe96dd536cc7,2024-05-23T19:07:27.803000
|
||||
CVE-2024-26929,0,1,0345601d3687dcfc0db8f00b9b8b65897332ed99291c5fbcbfec34873b944ced,2024-08-08T16:35:06.543000
|
||||
CVE-2024-2693,0,0,5b20da29193cdbd021de554496a550f19c059f255dc84cf7e6153dfe6b8cf895,2024-04-10T13:23:38.787000
|
||||
CVE-2024-26930,0,0,eebfc5b7d2d8fe5cbe99cdd9da00ebebd63fd431cc6c01a6fd1333054068c5b1,2024-05-23T19:10:49.540000
|
||||
CVE-2024-26931,0,0,fd1d56ef07a54cc94e651da59890263257da3a79c612811464e959c80e42800d,2024-06-27T13:15:57.053000
|
||||
@ -247985,7 +247989,7 @@ CVE-2024-27757,0,0,cd3b5b6b7fe57179d531119e33f0f74486d4fc8f97f5ac96ca27aa14ec09c
|
||||
CVE-2024-27758,0,0,ba2c7d76bfd93e40eb7f7d926c194a5a790033558362c55118c9cf0ef65f7b50,2024-08-01T13:48:45.070000
|
||||
CVE-2024-2776,0,0,62c920cc6123160df22ca75c69a8df7e03cd4eccbdac81567ba3cd3f226ecbcc,2024-05-17T02:38:29.783000
|
||||
CVE-2024-27764,0,0,dcb5f4d1c0bf36ea54d48a35b1fb25d36699fcee8f1dae6b9d2e2eb62b497b1c,2024-03-06T15:18:08.093000
|
||||
CVE-2024-27765,0,0,c1021bc743132e7d195dccaa0bc629b0f9f060b7a3eda2d9633ef14c430a5d52,2024-03-06T15:18:08.093000
|
||||
CVE-2024-27765,0,1,946f1ae3b42eeddef53163b64360f4980758030270d5c196b145f2c4061e3615,2024-08-08T16:35:07.573000
|
||||
CVE-2024-27767,0,0,588021191ffc186f7dafcc065bb8b722083fff47f2715dec13cceb116744ce43,2024-03-18T19:40:00.173000
|
||||
CVE-2024-27768,0,0,2a172611cfb3cb531839add9d871259e9ae7004ba84244aa574347493f81c01e,2024-03-18T19:40:00.173000
|
||||
CVE-2024-27769,0,0,40c08942e7bc0a364e2e9393c4316622b03ce4f4c87f0140fc357e25906e47fa,2024-03-18T19:40:00.173000
|
||||
@ -248998,7 +249002,7 @@ CVE-2024-29205,0,0,4e674b8f8da8d044735de177a49e7b209584ddf484ab1ea225bf31caee569
|
||||
CVE-2024-29206,0,0,e86d328fcc9a6f514df760d2a874996b94023486fc1fbca1ce78fd9823e4431a,2024-07-03T01:52:17.397000
|
||||
CVE-2024-29207,0,0,cb61fd349829f4c3ea10e2458bf16eaba90c4ab4b0709ae414d9c6319d6d4f1f,2024-07-03T01:52:18.087000
|
||||
CVE-2024-29208,0,0,98198b6466ca46a32ecf68f0f1b86f98f3da89bb7599062f6389607314074d9d,2024-07-03T01:52:18.780000
|
||||
CVE-2024-29209,0,1,524c07895762e5b44d3e9ef1c206b4e7d4d5b3430c7ff6d4160e0e7acbfcd9a3,2024-08-08T15:35:08.173000
|
||||
CVE-2024-29209,0,0,524c07895762e5b44d3e9ef1c206b4e7d4d5b3430c7ff6d4160e0e7acbfcd9a3,2024-08-08T15:35:08.173000
|
||||
CVE-2024-2921,0,0,f4e342ffc58e19f9931b03228666e88722fb82add7b9c9b268ee78781cd5e71e,2024-04-09T19:15:38.423000
|
||||
CVE-2024-29210,0,0,35f2fb1127989a840ec44eff998dd4dd34dd991643ed4983f752d1672da1ba01,2024-07-03T01:52:19.497000
|
||||
CVE-2024-29212,0,0,1247faf67a6d05877ef4c24ac6b7bb7d5fbf779bfef43566ef9132ba263c1abf,2024-07-03T01:52:20.207000
|
||||
@ -250167,7 +250171,7 @@ CVE-2024-3092,0,0,58e4c2f42c32b89d77c71a34b852d576a28801e4a89752dc17e73517fbf960
|
||||
CVE-2024-30920,0,0,755e5fd72bb1859fa0ef82051ceaafd42ee2d81708d249e6f1a815457a0034d0,2024-07-03T01:54:16.273000
|
||||
CVE-2024-30921,0,0,8e85a33db60f73a94dcc7d8613386cc444fa7f9176c5206bdd02bb45585e34b2,2024-07-03T01:54:17.057000
|
||||
CVE-2024-30922,0,0,cf163111ed5d85555cabc446f2f9d97fac6c7f0ed747ee1f78406fef4e9bf3e0,2024-07-03T01:54:17.827000
|
||||
CVE-2024-30923,0,0,2d2c05cd172127b4074b12e775f766f0140bdee7a598ca3f87a3d39bddaedc61,2024-04-19T13:10:25.637000
|
||||
CVE-2024-30923,0,1,7a2527b99b92b80199b99b73f6b95e071f710c19fc4c06ba189dbf6ed66c0865,2024-08-08T16:35:08.933000
|
||||
CVE-2024-30924,0,0,22bd972b2c3f6dbbb8e41f56a66263757ec7eb8e597484f0e2796a2cac4237a4,2024-07-03T01:54:18.593000
|
||||
CVE-2024-30925,0,0,23f6cfde37cb305753d473ae13036a29f5bb7fcda37b8c8f7b5e05d6955a525c,2024-07-03T01:54:19.410000
|
||||
CVE-2024-30926,0,0,2e48339c860de6d8b8371963c63d2e47743152d622b217fd2eb9f09dedcce9c7,2024-07-03T01:54:20.187000
|
||||
@ -250709,7 +250713,7 @@ CVE-2024-3178,0,0,724b5b9b62dd4e92f1f229f9f28fcb0bddf71f92c79c0b94c18fdb2af7074b
|
||||
CVE-2024-31783,0,0,dea8534fc1b6933b26cda6217a1982520e5d50556b9ff7b4e3fbbb8c80f4a35b,2024-04-16T13:24:07.103000
|
||||
CVE-2024-31784,0,0,872beb17d1c68d7ed92a4188cf9514602c2aada50c10052ecdc3a0e44dff88ee,2024-08-01T13:51:07.627000
|
||||
CVE-2024-3179,0,0,464d285bc972fdb5e95f8aa4a77b96bdfaeed1940a229e7762cb456353d6a4b4,2024-04-04T12:48:41.700000
|
||||
CVE-2024-3180,0,0,a00f1e9c0c961bfe4f5d9bc0c89218e810bdec4720fe175e0a11a11dd8540d68,2024-04-04T12:48:41.700000
|
||||
CVE-2024-3180,0,1,5bb7af5f4cf3797fd0e13fd61c5a120e857e3a7924c7f2a1b54e6cd1ca4c495c,2024-08-08T17:15:19.223000
|
||||
CVE-2024-31801,0,0,167787a1907cdf000af60fbe9b5f7402195ddc6d583a2566e586e08b836488bc,2024-07-03T01:55:21.550000
|
||||
CVE-2024-31802,0,0,dd0b491f4b4a8abc2eb95691f4e0d78bda6718f8c1d907d0d856648428006edd,2024-06-28T10:27:00.920000
|
||||
CVE-2024-31803,0,0,c10736ae7840b016061b5af4491c529b00b1b223c27ecb8bbf60562274c0f243,2024-08-01T13:51:08.687000
|
||||
@ -251177,7 +251181,7 @@ CVE-2024-32492,0,0,b8f37fd95afd9f3c0db9b82f19324f4f73a560600fb9ed3392952c1c91bb3
|
||||
CVE-2024-32493,0,0,ffb6c116d41e9a5c89f19db9ee55928315a8849f99630d88960b7d23ca7c5aa5,2024-07-03T01:56:39.257000
|
||||
CVE-2024-32498,0,0,906a6af4f331d76dafce3172b342bad5a72acec04065280273f5a351dbe47aff,2024-07-08T16:43:34.677000
|
||||
CVE-2024-3250,0,0,c5f4cddd48066fbb0c4e0be3eeb988cdfc41e3f2cb53a12d5a0c784e567df5aa,2024-04-04T22:15:09.350000
|
||||
CVE-2024-32502,0,1,6c01a3b4b5868656f3d57f70bafd56da976a1e8c28c0eec374ff444b607fb7d0,2024-08-08T15:35:08.940000
|
||||
CVE-2024-32502,0,0,6c01a3b4b5868656f3d57f70bafd56da976a1e8c28c0eec374ff444b607fb7d0,2024-08-08T15:35:08.940000
|
||||
CVE-2024-32503,0,0,73104beb74be99de375467071c1d6a9a0fcbf9e020ddd8f16d4fe11689fe95cf,2024-06-07T19:24:09.243000
|
||||
CVE-2024-32504,0,0,3994b5718a6a88903126308cc0ea3df60ba5aeb7ee0f236d9b16b618e0fabb55,2024-07-16T14:59:17.967000
|
||||
CVE-2024-32505,0,0,a50cedf26eb8bc3e2fc8813f61518049bc267a075d7ee53541957942fde52858,2024-04-17T12:48:07.510000
|
||||
@ -251557,7 +251561,7 @@ CVE-2024-32895,0,0,3b5e93f479d0a309808bc7ab37e73f0b736af7b90a097c9affa7582da06b5
|
||||
CVE-2024-32896,0,0,488630bc5a56abb942dcf67bee02da446a8ee3fdd397356e05994c519aa70266,2024-07-03T01:57:14.863000
|
||||
CVE-2024-32897,0,0,90e26042088ada707b934da98a5303718a15c9664281ad13fb45655a7f047677,2024-07-11T14:28:06.287000
|
||||
CVE-2024-32898,0,0,a1164d1f13a42749bf96f7e0b3ba86ae7d47aa4b6dca1eac9925e7f63479422a,2024-07-11T14:28:44.707000
|
||||
CVE-2024-32899,0,1,74d49a0c054c70b6782d3d17817d354b539c7fc1885677c696b3943279ac6319,2024-08-08T14:35:04.040000
|
||||
CVE-2024-32899,0,0,74d49a0c054c70b6782d3d17817d354b539c7fc1885677c696b3943279ac6319,2024-08-08T14:35:04.040000
|
||||
CVE-2024-3290,0,0,e37941463fbcfeca19f06c6ff95de33721080f43186b5a4e3649d38706662f8a,2024-05-17T18:35:35.070000
|
||||
CVE-2024-32900,0,0,f3fcf6c6b161054d4b70c688a26df4960499cb9e7985675c1f9e0f52edc8445d,2024-07-11T14:22:34.243000
|
||||
CVE-2024-32901,0,0,a3552a7ee6d0836f928936581a297ba1f653d939cb18fc905df3f090c2fd1257,2024-07-11T14:23:01.377000
|
||||
@ -251565,7 +251569,7 @@ CVE-2024-32902,0,0,1fbd0dd08d9bd5e977338d384aea2714e29c13de9c12a031106e742a6a47a
|
||||
CVE-2024-32903,0,0,aaeb38f7d3b59ab9144fa4e43bf721b3198a6bd2ece544fac74a73168645b438,2024-07-11T15:15:02.090000
|
||||
CVE-2024-32904,0,0,3961c2a580b4e2b2979bdb22f632f77b910e660ceef5325c42d6a6fa26d552d7,2024-07-11T15:14:41.203000
|
||||
CVE-2024-32905,0,0,4460b80af340c6f668b7232b3aebc59e6f35de40c0e49ba7c976380d5f0f46f5,2024-08-01T13:51:38.530000
|
||||
CVE-2024-32906,0,1,ca7a041d3e36c163545ea72e6fe5c5fb310b0b59e35ef87f024c52e5493be59e,2024-08-08T14:35:04.950000
|
||||
CVE-2024-32906,0,0,ca7a041d3e36c163545ea72e6fe5c5fb310b0b59e35ef87f024c52e5493be59e,2024-08-08T14:35:04.950000
|
||||
CVE-2024-32907,0,0,14dfd1aaa25a46fea5214540e8b9086c0e794eff9e7591e8b296e1769fd633c5,2024-07-11T15:10:44.407000
|
||||
CVE-2024-32908,0,0,f22243bdf03341c4f49fe8c95d52c9746f5d3123ec78466cf58d8b7d93534350,2024-08-01T13:51:39.347000
|
||||
CVE-2024-32909,0,0,1747a0b48751800c2e7098eeab32f86aca7912a949dd3414617c820a86f62b03,2024-07-11T15:05:52.807000
|
||||
@ -252190,19 +252194,19 @@ CVE-2024-33957,0,0,09bedb02c8e3dd520e4eb895fb68ee9645dd7844e1b831a24ad6b897c0a3b
|
||||
CVE-2024-33958,0,0,7a7168ec64302facb7ecafd694509fffebdd99590b2e576ad77919591906e0e2,2024-08-06T16:30:24.547000
|
||||
CVE-2024-33959,0,0,be6fd7f670b1328bdfc37564b1ac34c10351de104e6269aff09617e3efa74d30,2024-08-06T16:30:24.547000
|
||||
CVE-2024-33960,0,0,d17745e604717d53f9bd9a9910346900a87259f527ec070325bfb24c71beb81b,2024-08-06T16:30:24.547000
|
||||
CVE-2024-33961,0,1,187629ed99c5897491a2a921c1ade8963799907fad5e490c0d4f43b69dbfd91e,2024-08-08T15:28:36.957000
|
||||
CVE-2024-33962,0,1,e897407fdd17a9b2d16f278c5507ecaf565ac0a0fccce4b5a02e7684c73d8ccb,2024-08-08T15:29:37.537000
|
||||
CVE-2024-33963,0,1,7b2ea757d18c83ff1944815cc2e202a03e9537a07a76c5aeb78e0eabda293f3b,2024-08-08T15:29:09.743000
|
||||
CVE-2024-33964,0,1,aff21f5744b29292c3707aee86cfd710533d3b56a46a9a36f37cc48f743d5159,2024-08-08T15:29:15.933000
|
||||
CVE-2024-33965,0,1,ed4fa15cdf01bcb0fd89c5e1854d266245eefe080933b85ee013428b57c127e8,2024-08-08T15:28:25.530000
|
||||
CVE-2024-33966,0,1,997cc6c63d87be9f515a0dcf9d62401fc2dd34c2f41a0abacfbb628c3d719cd6,2024-08-08T15:28:08.357000
|
||||
CVE-2024-33967,0,1,d52e78f1049cf149f0cfaf3916dd091a82be5a43af2f535f9c6c47436fc6ab9f,2024-08-08T15:27:50.917000
|
||||
CVE-2024-33968,0,1,915776392a400d4a5400237f91d8138ecb548a9ee2c3e80cc12564c4b5c60c56,2024-08-08T15:27:34.080000
|
||||
CVE-2024-33969,0,1,e3e71cf8a0f7a44667eb284306dcd69fe80d8c0fb2202c6d4f70e6f7b7013f4b,2024-08-08T15:27:09.497000
|
||||
CVE-2024-33970,0,1,862acdadc96a67e3c244b8d3248f39839dd79ae113c84953fd701fed8bc7b855,2024-08-08T15:26:48.940000
|
||||
CVE-2024-33971,0,1,a7859046d8372a909dcb2b37a15cf3347b7e31d10dadb7980f4c9fb8d7cb93d8,2024-08-08T15:26:31.097000
|
||||
CVE-2024-33972,0,1,42dee7a80c44684711acc9909b4734c5fb83b699be5ad7e45fa494c43db80c3d,2024-08-08T15:25:18.450000
|
||||
CVE-2024-33973,0,1,0a583261d2674aa7d4e2f3bbf7680a44773ad150514a793eca996581b9e8bd33,2024-08-08T15:24:35.547000
|
||||
CVE-2024-33961,0,0,187629ed99c5897491a2a921c1ade8963799907fad5e490c0d4f43b69dbfd91e,2024-08-08T15:28:36.957000
|
||||
CVE-2024-33962,0,0,e897407fdd17a9b2d16f278c5507ecaf565ac0a0fccce4b5a02e7684c73d8ccb,2024-08-08T15:29:37.537000
|
||||
CVE-2024-33963,0,0,7b2ea757d18c83ff1944815cc2e202a03e9537a07a76c5aeb78e0eabda293f3b,2024-08-08T15:29:09.743000
|
||||
CVE-2024-33964,0,0,aff21f5744b29292c3707aee86cfd710533d3b56a46a9a36f37cc48f743d5159,2024-08-08T15:29:15.933000
|
||||
CVE-2024-33965,0,0,ed4fa15cdf01bcb0fd89c5e1854d266245eefe080933b85ee013428b57c127e8,2024-08-08T15:28:25.530000
|
||||
CVE-2024-33966,0,0,997cc6c63d87be9f515a0dcf9d62401fc2dd34c2f41a0abacfbb628c3d719cd6,2024-08-08T15:28:08.357000
|
||||
CVE-2024-33967,0,0,d52e78f1049cf149f0cfaf3916dd091a82be5a43af2f535f9c6c47436fc6ab9f,2024-08-08T15:27:50.917000
|
||||
CVE-2024-33968,0,0,915776392a400d4a5400237f91d8138ecb548a9ee2c3e80cc12564c4b5c60c56,2024-08-08T15:27:34.080000
|
||||
CVE-2024-33969,0,0,e3e71cf8a0f7a44667eb284306dcd69fe80d8c0fb2202c6d4f70e6f7b7013f4b,2024-08-08T15:27:09.497000
|
||||
CVE-2024-33970,0,0,862acdadc96a67e3c244b8d3248f39839dd79ae113c84953fd701fed8bc7b855,2024-08-08T15:26:48.940000
|
||||
CVE-2024-33971,0,0,a7859046d8372a909dcb2b37a15cf3347b7e31d10dadb7980f4c9fb8d7cb93d8,2024-08-08T15:26:31.097000
|
||||
CVE-2024-33972,0,0,42dee7a80c44684711acc9909b4734c5fb83b699be5ad7e45fa494c43db80c3d,2024-08-08T15:25:18.450000
|
||||
CVE-2024-33973,0,0,0a583261d2674aa7d4e2f3bbf7680a44773ad150514a793eca996581b9e8bd33,2024-08-08T15:24:35.547000
|
||||
CVE-2024-33974,0,0,d280489cb050a80c8bcc0878f3de7456d028053d751ad633a2e500fbf3c9b3f8,2024-08-07T17:44:17.477000
|
||||
CVE-2024-33975,0,0,b4a2bd340912bc931a374c57fe59d9cb93cb7a454e32e5eaff66f0334316ab39,2024-08-06T16:30:24.547000
|
||||
CVE-2024-33976,0,0,d8344d47b36c41472e2a93847ff870ae8e0d131ecf2149662397af204779e48f,2024-08-06T16:30:24.547000
|
||||
@ -252387,7 +252391,7 @@ CVE-2024-34224,0,0,f4b792085c33fe751ba37a69e3ef609b6c4267fa901657944ebf702e373cd
|
||||
CVE-2024-34225,0,0,e08a9ad45b2661eed67570a87cb42ad712c6fe6e9c128f00e0736869ea473a7c,2024-07-03T01:59:42.910000
|
||||
CVE-2024-34226,0,0,ee0bf03dfbb7276f0e585da87dd55a8f54aaadf529a97ab40343d543468cb68c,2024-05-14T16:12:23.490000
|
||||
CVE-2024-3423,0,0,5df33203eaf14342db1ae141cfe06e52884cff2f7dfa5b3fcca2ff4c13d5eebb,2024-05-17T02:39:54.990000
|
||||
CVE-2024-34230,0,0,fd5204c1861dff4dda042be017a0c119fb7cd76dbdfed3865e1a91afa4cda6b2,2024-05-14T16:12:23.490000
|
||||
CVE-2024-34230,0,1,a05a38a79741a72c9d6f5456446d713ef2ea9e7cfac29bb555039d0657084814,2024-08-08T16:35:11.040000
|
||||
CVE-2024-34231,0,0,bc89f3c9bb61baf29d2d35dc13499882fd5aa1b8a06439e514ae7d635339b6f7,2024-08-01T13:52:18.070000
|
||||
CVE-2024-3424,0,0,c4f58681c753d20af997e7344afbac06ec6a3371ca686fb7c9b49ad5c93b94a2,2024-05-17T02:39:55.073000
|
||||
CVE-2024-34240,0,0,0bd91146d8fc729ed5df9e4184632c68ef13b96fc0c02f7c671568de44e3b0a0,2024-05-22T12:46:53.887000
|
||||
@ -252414,7 +252418,7 @@ CVE-2024-3430,0,0,a941a2bdaed6734132b4bed8d998008948b76c9a3932a595684037246d0032
|
||||
CVE-2024-34308,0,0,5c6830d7ba39b77cbaffad44e790f498af6b587a6f9837b67570228055e4e3d7,2024-07-03T01:59:51.267000
|
||||
CVE-2024-3431,0,0,5fc2c93ae5310a51e046f84945a2a838f604d6025e1cecd0f4843d0687905336,2024-05-17T02:39:55.597000
|
||||
CVE-2024-34310,0,0,eec98a80baf7dabcd95632f08b3aaea83d6020ef7be3a232837a6c521a96dc62,2024-05-14T16:12:23.490000
|
||||
CVE-2024-34312,0,1,0d47c59fdc924186f20f65c25079bdc3a52800889945bbbdd92d5f35b0cde75d,2024-08-08T14:19:10.503000
|
||||
CVE-2024-34312,0,0,0d47c59fdc924186f20f65c25079bdc3a52800889945bbbdd92d5f35b0cde75d,2024-08-08T14:19:10.503000
|
||||
CVE-2024-34313,0,0,5e7685d85b9be01539c2df2509259cab02217b4b071e1347f30175d5b9d70a40,2024-07-03T01:59:52.040000
|
||||
CVE-2024-34314,0,0,229621e4389765698bde4ee87838cb1f181d4467573c64759d3cb34848f22f9d,2024-05-07T20:07:58.737000
|
||||
CVE-2024-34315,0,0,2da9a3f01679d1f45f0bab05fdfd699ff25c9ffa82f02a145c0a3654a4071435,2024-07-03T01:59:52.883000
|
||||
@ -252560,9 +252564,9 @@ CVE-2024-34475,0,0,3c160241762503df55acb87d7d14b9c9456523cbc048b20e9117848219522
|
||||
CVE-2024-34476,0,0,0e840da90ac72a5275cc1cab81863ba6c9d8f821141193be8bf66abb3acfdeaf,2024-08-01T13:52:23.687000
|
||||
CVE-2024-34477,0,0,5d1de91fef7cafecd3b029f0bcee8de7cabdae801a9f3bc40e1b3eaf6a48cb39,2024-06-07T14:15:10.293000
|
||||
CVE-2024-34478,0,0,d1c568df328ac159f8fd1b75d61a9d6d3cc927200b0e76f99fa386488fe6be45,2024-08-07T16:35:07.180000
|
||||
CVE-2024-34479,0,1,6ed94fc6f4fb4fe38a40f5abea31649df9eb3ec92c6e81e3f39692d9740128a1,2024-08-08T15:10:12.900000
|
||||
CVE-2024-34479,0,0,6ed94fc6f4fb4fe38a40f5abea31649df9eb3ec92c6e81e3f39692d9740128a1,2024-08-08T15:10:12.900000
|
||||
CVE-2024-3448,0,0,c82b147a40506a777755d14476bf2e6fcdd10273ee4086f8cdaaaac6db9939f8,2024-04-10T19:49:51.183000
|
||||
CVE-2024-34480,0,1,49b250a98ce255257090c20d521285dac95287e688640b081174f9d009be3614,2024-08-08T15:35:10.330000
|
||||
CVE-2024-34480,0,0,49b250a98ce255257090c20d521285dac95287e688640b081174f9d009be3614,2024-08-08T15:35:10.330000
|
||||
CVE-2024-34481,0,0,e2a3e65c4103fe32da9193eb433184ea87fbd297993203e84b18d9ad821efc72,2024-07-09T16:22:36.033000
|
||||
CVE-2024-34483,0,0,6f3bfc57c4ac08b52bc633ea80c521be2c99b03f22d863fb736d441dc611c592,2024-07-03T02:00:16.293000
|
||||
CVE-2024-34484,0,0,1f03b9dcfd21c2d1e1e4109b895d9faab7d5dde86fb48f1db146804d6f2ea32a,2024-05-06T12:44:56.377000
|
||||
@ -252856,7 +252860,7 @@ CVE-2024-34945,0,0,bd887865baa11222c5471f83f64ee50937d3f1c1cfa2d234bd4834ddeb94d
|
||||
CVE-2024-34946,0,0,bc37c91351bb9de539bebc2edf6ca00a5506257a85c0193f030841ee78b07113,2024-07-03T02:01:00.960000
|
||||
CVE-2024-34947,0,0,1639e64ad64e3efff06c97dd9d715badbd33e6d8d7c52e5aa73aac445f5ce021,2024-05-20T19:34:58.277000
|
||||
CVE-2024-34948,0,0,1be0e178d75a75458d35d0a783016b73f5729bb8efeb1fbecd8e8099d4e24c7a,2024-05-20T19:34:58.277000
|
||||
CVE-2024-34949,0,1,153f526975e57cbda3da567b214cb11ac9a77a410da95e9aba96a02a87ca6108,2024-08-08T15:35:11.187000
|
||||
CVE-2024-34949,0,0,153f526975e57cbda3da567b214cb11ac9a77a410da95e9aba96a02a87ca6108,2024-08-08T15:35:11.187000
|
||||
CVE-2024-3495,0,0,2d01763d9fd00934d213846ccfe97dfaae5495029603a64e4efbf7d1d6ec8266,2024-05-22T12:46:53.887000
|
||||
CVE-2024-34950,0,0,4b8267007ff70ad214b66a8a544774886740823c745cf811c7b1935620d9a19e,2024-07-03T02:01:01.753000
|
||||
CVE-2024-34952,0,0,0b3ec7ed40085393e2071bc6d9d415733ee6d2bb94374bd8520452bf0007770e,2024-05-20T15:17:54.513000
|
||||
@ -252883,7 +252887,7 @@ CVE-2024-34994,0,0,2a57fa5a48b91cfc9175994b09415b4e2c46f84fdbe6aceded93bada909a8
|
||||
CVE-2024-34995,0,0,c5ae887edb3d68f5b17625c821aa1f4eef9c82bfd086996cef9a6f896adaeedd,2024-07-03T02:01:11.353000
|
||||
CVE-2024-34997,0,0,f1e18585236e7f0a59fe769dd2659091355a2fe62bd1315f5027e11c678faa34,2024-08-02T03:15:48.413000
|
||||
CVE-2024-3500,0,0,65f7cd29cdae6ff6308db5dac7c1e408d4ae13919a645c3f45d14d5a6eb829b1,2024-05-02T18:00:37.360000
|
||||
CVE-2024-35009,0,1,3fe7a6685d547c8f13c78e6aa6b52334336d0dbec9afe2301a9c305ba9814939,2024-08-08T15:35:12.080000
|
||||
CVE-2024-35009,0,0,3fe7a6685d547c8f13c78e6aa6b52334336d0dbec9afe2301a9c305ba9814939,2024-08-08T15:35:12.080000
|
||||
CVE-2024-35010,0,0,d24eb37231999ffbf1e461e69272836338e2106e037fb208bca0adcf07905054,2024-05-14T19:17:55.627000
|
||||
CVE-2024-35011,0,0,a8947b533dc1a6aaf33e10215f23dae95a96d0da8092d086fdf57d48f5a0e318,2024-05-14T19:17:55.627000
|
||||
CVE-2024-35012,0,0,c8bd09796e971cbd360d6bb5909687d1917c7ee2369b2a3730c7a0355d3c5511,2024-07-03T02:01:12.127000
|
||||
@ -253161,7 +253165,7 @@ CVE-2024-35570,0,0,117a724a498932850802f3f22448be111c00fb8192d78e6cc7cb1dda47848
|
||||
CVE-2024-35571,0,0,737c2a7f64c2812d810288ac20005c00d1a957dbded3b4f543f336361b86f200,2024-07-03T02:01:53.540000
|
||||
CVE-2024-35576,0,0,4cf028a111dcdddf7b60054ad17a0fe8aad691fef93220823224c4163d503b71,2024-07-03T02:01:54.333000
|
||||
CVE-2024-35578,0,0,fd79be27425584c76cc2d4b545495b232268e5d494b2fd2516c8d9eaac2f6939,2024-08-01T13:52:42.763000
|
||||
CVE-2024-35579,0,1,37bfb499a88acccf42bbe9e75a181bacd08a79a39311b6039233619c973ca1d4,2024-08-08T15:35:12.957000
|
||||
CVE-2024-35579,0,0,37bfb499a88acccf42bbe9e75a181bacd08a79a39311b6039233619c973ca1d4,2024-08-08T15:35:12.957000
|
||||
CVE-2024-3558,0,0,f9fa909e69165819ae496c8acd1ccdd67c7ef5aa9a5c6af8d01fcec23b3946f3,2024-07-11T02:52:17.780000
|
||||
CVE-2024-35580,0,0,0387db6917a36212f88347cae7a6aab7914a4db72f7693d46d262f85e8b4bfe1,2024-05-20T19:34:58.277000
|
||||
CVE-2024-35581,0,0,f44263214f42e721dd7c3dc00efbb15dd18e867b1fcd80955bdfd7a6cc44bd29,2024-07-03T02:01:55.113000
|
||||
@ -253623,7 +253627,7 @@ CVE-2024-3604,0,0,2f82d9621c7da51111c7599a59e672098e964c892eb2588f225c0e98c5e45c
|
||||
CVE-2024-36041,0,0,d88899430b8465bd9e7ec84eb791ba971452eec022e6c65dc6ad08436f1e4123,2024-07-09T16:22:37.687000
|
||||
CVE-2024-36042,0,0,5e54aecb20c44082aa92fd61c0f8a58aa5121675b55d97309cf9a5aaaf11ac5e,2024-07-03T02:02:42.150000
|
||||
CVE-2024-36043,0,0,3bd225f8561cef578aaa027f6bceef70b4450bc22a2e5dc039a9b76782f71691,2024-05-20T13:00:04.957000
|
||||
CVE-2024-36048,0,1,5a5a6da2bab77110717de4a83cf2fd38c948b3573f3cee73605d8d6a5534fd54,2024-08-08T15:35:13.937000
|
||||
CVE-2024-36048,0,0,5a5a6da2bab77110717de4a83cf2fd38c948b3573f3cee73605d8d6a5534fd54,2024-08-08T15:35:13.937000
|
||||
CVE-2024-36049,0,0,51d271179b773ae975431c0c021fa3b0015024baa0aaf9431319b88ebb604829,2024-05-24T18:09:20.027000
|
||||
CVE-2024-3605,0,0,905473bba2f4b1f833e3696e0eb3a1556acdfbc79f67c22a9c6f82f499950cc7,2024-07-15T17:12:36.967000
|
||||
CVE-2024-36050,0,0,c50ac6e5d9529aacb1e334d114a2f6f4418d441c20a736ae9e48551abc3029b2,2024-05-22T16:15:10.777000
|
||||
@ -253865,7 +253869,7 @@ CVE-2024-36393,0,0,66cc85a4816620185dd811312e53841307ae83d95e0a80e5417b0f2e7ce59
|
||||
CVE-2024-36394,0,0,ce487e69c50908b259342c996fd749aeec003c1cc9ebc8d7c04cb76587e4b2a6,2024-06-11T17:46:38.227000
|
||||
CVE-2024-36395,0,0,f89c2edf8412c7a856779bf7bdcd2dc639ea5537dbb90aaf5a59ca64c625227c,2024-07-19T18:34:58.837000
|
||||
CVE-2024-36396,0,0,6296e5e5abad58fd92610447f6d594c40593fdd339b1a18f1de671640ea0ec15,2024-08-07T17:40:12.830000
|
||||
CVE-2024-36397,0,1,397d32bfdb09c2d3f9db35c1f7589cf3773b581a432802ae94747ca8dbab95df,2024-08-08T14:52:17.297000
|
||||
CVE-2024-36397,0,0,397d32bfdb09c2d3f9db35c1f7589cf3773b581a432802ae94747ca8dbab95df,2024-08-08T14:52:17.297000
|
||||
CVE-2024-36399,0,0,343a0b337c47a08f8ef5da762844b89fa9f0783d7ae2cdee4dacb27b86b494cf,2024-06-07T14:56:05.647000
|
||||
CVE-2024-3640,0,0,634a3a61b60e4b6447ed9849adb2e8bddc05031ce5f2169a17d54b538992fc1b,2024-05-17T18:36:31.297000
|
||||
CVE-2024-36400,0,0,47a38d468bfeafda14a4695dfbafb860220a66750f81a96f50551b5447b95aa6,2024-06-10T19:39:21.660000
|
||||
@ -253971,7 +253975,7 @@ CVE-2024-36550,0,0,91adae745b223f9735fdb21a15339bb26034752e595063e3f9b20141d647e
|
||||
CVE-2024-36568,0,0,c947aedd82bb9149f6d5ed733e385977abac9a86db57bbcbe31097874b0b1009,2024-07-03T02:03:17.227000
|
||||
CVE-2024-36569,0,0,360f77d552cdb048cab439a5bee7725cd5b340a5088e797dd6c6cd06c49b10f6,2024-07-03T02:03:18.013000
|
||||
CVE-2024-3657,0,0,ee35636c80343c35c9d7ec01515342fe2ebdf7b3a803cae60aab4ad80a6b3995,2024-07-18T16:15:07.693000
|
||||
CVE-2024-36572,0,1,51fcc433e117044936f625e7e1dc65ef66d9076878d51d4460ad4070df0069c4,2024-08-08T14:28:25.750000
|
||||
CVE-2024-36572,0,0,51fcc433e117044936f625e7e1dc65ef66d9076878d51d4460ad4070df0069c4,2024-08-08T14:28:25.750000
|
||||
CVE-2024-36573,0,0,9ceb16a2acc670182f357db64f06ef9a672381f951b2f58ee1e425755272a679,2024-08-01T13:53:08.237000
|
||||
CVE-2024-36574,0,0,5919b4ca2d0f287d5f7cfcf83fdb2db228de9c4db571b73cd23f7f08bae7fb33,2024-07-03T02:03:18.790000
|
||||
CVE-2024-36575,0,0,b117fb4e52d0f8b4cc58a403a03ce56bde8486e8cc8deaf2edb246c707092c4a,2024-07-03T02:03:19.590000
|
||||
@ -253986,8 +253990,8 @@ CVE-2024-36586,0,0,4099f0afde3003a22e36cee4a4d1bf00ae6ce9b2ce9c60b9b6a1b88a3ec1a
|
||||
CVE-2024-36587,0,0,bf71d7e5e004f256f035927236d4ac896369318476be83b9c18caf685fe047c0,2024-08-01T13:53:10.050000
|
||||
CVE-2024-36588,0,0,c219e8a7875d89e66958dab0789f7691c4be3c0c05f3a68bfc6f3a9b60c1ba97,2024-06-17T12:43:31.090000
|
||||
CVE-2024-36589,0,0,7d8241af3cf4fd123efae48d04ebf204edc6e9689a6c5e93ab29d83bac6ea2c1,2024-06-17T12:43:31.090000
|
||||
CVE-2024-3659,0,1,45d8955e8ffd3d16f89a4279f52887a232a2257d1cf08559d9df0afb2157d916,2024-08-08T15:35:18.413000
|
||||
CVE-2024-36597,0,1,6aec838c376f6e37a5f2bf5469ea0204e7e013359b5405a70579bc69e9d4d528,2024-08-08T15:49:26.397000
|
||||
CVE-2024-3659,0,0,45d8955e8ffd3d16f89a4279f52887a232a2257d1cf08559d9df0afb2157d916,2024-08-08T15:35:18.413000
|
||||
CVE-2024-36597,0,0,6aec838c376f6e37a5f2bf5469ea0204e7e013359b5405a70579bc69e9d4d528,2024-08-08T15:49:26.397000
|
||||
CVE-2024-36598,0,0,00d0a8090fa16fe89aa3866d79b98c53443431993afed273e14298b9e0b2a6a8,2024-07-03T02:03:23.817000
|
||||
CVE-2024-36599,0,0,2b2bc07f90b37a08fed3176237d4d673945409fdbbe06bfa5eecf36828a7ec56,2024-08-01T20:31:01.340000
|
||||
CVE-2024-3660,0,0,c3c1c3312c8a9566bf9feedf7d8876d18d19f4aa50138300852d5ac195117ed2,2024-08-01T13:56:38.227000
|
||||
@ -254182,7 +254186,7 @@ CVE-2024-36968,0,0,a995bed3e48bd8c81f02b7e9d11197af7d121a937f63236c67c72482dd84f
|
||||
CVE-2024-36969,0,0,e622ab8131a3dbc40ec2fb2b416de8073d7058b237c224b8ddf44dea78c18b59,2024-07-17T16:50:29.427000
|
||||
CVE-2024-3697,0,0,6e56c636d90d09536d9c0a6418223e2755a5c4ad9d107f96b9c5e19a7cee17c5,2024-06-04T19:20:23.323000
|
||||
CVE-2024-36970,0,0,71019bd2eae5fd365be1f562acf6569962a155e7ea79c468fc47a7884a32f8dd,2024-06-10T02:52:08.267000
|
||||
CVE-2024-36971,0,1,19a783e743bca7b704f26b9e2c301763abbc69d1adcc4e7bcc3cfec2328bc2ff,2024-08-08T14:49:52.603000
|
||||
CVE-2024-36971,0,0,19a783e743bca7b704f26b9e2c301763abbc69d1adcc4e7bcc3cfec2328bc2ff,2024-08-08T14:49:52.603000
|
||||
CVE-2024-36972,0,0,a2ab0e02a9dc38f992f1abc892dfaba943164f0fa5c0a17bc8e30ba95822955c,2024-07-03T02:03:56.627000
|
||||
CVE-2024-36973,0,0,ad2c4092d909690c4766323dda96dac09439cf4ae37914f4902c28191444a81a,2024-06-21T14:15:12.250000
|
||||
CVE-2024-36974,0,0,aa342464f56df4c331d398bcc0f3e68d9c36f35501b54bcc80e29a36fedbdd6a,2024-07-05T08:15:02.943000
|
||||
@ -254266,7 +254270,7 @@ CVE-2024-37080,0,0,f0a9bd7effb46ac30e1d20f1d1aa7a7b386c0ee7e62089b4e1cc310e9f341
|
||||
CVE-2024-37081,0,0,1657c2c6215fa861c8bf708a3b65df9501dd8a14588c6f7d5718007f5ce77c8d,2024-07-03T02:04:05.970000
|
||||
CVE-2024-37082,0,0,cdf7ab7ec235a04ab3547ac9302ea8fb37a25e6b12903e2e739c3b31068e7382,2024-07-12T17:15:10.220000
|
||||
CVE-2024-37084,0,0,80550735d6bb4a6e286021e9f22257f5e538827d4cf62f5ba780a83b5b57849d,2024-08-01T13:53:22.230000
|
||||
CVE-2024-37085,0,1,be808461657e3f85c79619a0be351a3b72207b354595ab61cabce57cc7cf3b37,2024-08-08T14:48:49.303000
|
||||
CVE-2024-37085,0,0,be808461657e3f85c79619a0be351a3b72207b354595ab61cabce57cc7cf3b37,2024-08-08T14:48:49.303000
|
||||
CVE-2024-37086,0,0,9068529bdb3d555265b7f816c31a19ade60e24d8cc46d6bccf0934fca43600dd,2024-06-25T18:50:42.040000
|
||||
CVE-2024-37087,0,0,cd5f38dea6878f55617a1348143830ab9f44bbdb4a44091efb0c0832c07fcba2,2024-06-25T18:50:42.040000
|
||||
CVE-2024-37089,0,0,9e292fe1dd11fba75d82973b2e1db6879968f554c93ecd19be42fbc3a656ef4b,2024-06-24T12:57:36.513000
|
||||
@ -254439,7 +254443,7 @@ CVE-2024-37310,0,0,ebbb16db84c251df0a21daf43e05809e2b107f80c6aa44f98ee9248f97601
|
||||
CVE-2024-37312,0,0,c9951de02441eaa79d1cb1dd04f0cb479ff9f95a9feb89bd2a12c3935f476481,2024-06-17T12:42:04.623000
|
||||
CVE-2024-37313,0,0,56e03be6114dcbcc420d52ba189ce21fd838f398741344c11caac865e40212b6,2024-06-17T12:42:04.623000
|
||||
CVE-2024-37314,0,0,2a8bc61fa93764cb0fb07c24d5bac1ea60f00f829a9b504f8438b7c40cefcf59,2024-06-17T12:42:04.623000
|
||||
CVE-2024-37315,0,0,31f47ce02db58cee61420543ed6af1becb289e2e35f5273500587c2c2526b083,2024-06-17T12:42:04.623000
|
||||
CVE-2024-37315,0,1,78d1052b31ae41f56b435a7566552773a5c40ebb59f83a745739357048c084e1,2024-08-08T16:35:23.750000
|
||||
CVE-2024-37316,0,0,23efa33580c16c198846d8cbc540c3b959c8c6cc5d8e7e643aacce595c39ab53,2024-06-17T12:42:04.623000
|
||||
CVE-2024-37317,0,0,39b0b4317a6651cb59a140f8d7c551e6209dd76ddab831aefab29483d97c356d,2024-06-17T12:42:04.623000
|
||||
CVE-2024-37318,0,0,f24ae26ca0facd31c951e48825bfa20026c0187e1527557d74d4daef2adbc562,2024-07-09T18:18:38.713000
|
||||
@ -254743,12 +254747,12 @@ CVE-2024-37880,0,0,e6a073a13f4d5d80acb782a97b27605fba3820cc74e70d67b997f08c66f11
|
||||
CVE-2024-37881,0,0,e093bcdbd16679bd51273f21b0d2d0887a3da8aeb5e0bdca0911ec7d57d9cff9,2024-08-01T13:54:28.750000
|
||||
CVE-2024-37882,0,0,1684452fe9676caabbe7e5f6ee8e47e99d5ba41bf75f3c683dc771f8ab16d9ee,2024-07-19T14:57:28.583000
|
||||
CVE-2024-37883,0,0,7626a3367857543c450838d843023961ad58fb44ff2499e7c7931fd5ab11dafa,2024-06-17T12:42:04.623000
|
||||
CVE-2024-37884,0,0,e664115ebc3d9e62a2f4cd0cf06116aef2a7d566cbf93f008874f1175c726ead,2024-06-17T12:42:04.623000
|
||||
CVE-2024-37884,0,1,4e6fff0a6361455ad7e37911dc54427d765d3f4a4c4bb46beeffcddf37eecd25,2024-08-08T16:39:59.217000
|
||||
CVE-2024-37885,0,0,17f5559a85e6e9db6ebd185b566af3c7ce60a0f396cf403a1166b89dd6d49182,2024-06-17T12:42:04.623000
|
||||
CVE-2024-37886,0,0,37a2c4f4d6005992267e24a61cfd186fd6016e8e0dba151502269eb8999be1da,2024-06-17T12:42:04.623000
|
||||
CVE-2024-37887,0,0,b37e79a679fd9102b91941b53bdc183f281fbd5b4dc7d1de4c3b5e688532b583,2024-06-17T12:42:04.623000
|
||||
CVE-2024-37887,0,1,dd1db8e47a04efe406ac991a9022a48114c0903c568235a94787de1fe87758b4,2024-08-08T16:33:31.063000
|
||||
CVE-2024-37888,0,0,089dd35cce5dcae3cb152eacc7c740a003a3d7c1b73414660b2199c1fb6b7c31,2024-06-17T12:42:04.623000
|
||||
CVE-2024-37889,0,1,ee014bfb18a496c8142601928a13908bee5aa40300b8bda82e59b1c0a2e0b1e3,2024-08-08T15:31:53.683000
|
||||
CVE-2024-37889,0,0,ee014bfb18a496c8142601928a13908bee5aa40300b8bda82e59b1c0a2e0b1e3,2024-08-08T15:31:53.683000
|
||||
CVE-2024-3789,0,0,2bd1998a949e0866cad7ea41db064c445677b92506394ffb5a3d7ae99f99848d,2024-05-14T16:11:39.510000
|
||||
CVE-2024-37890,0,0,d8e638c3d74286b0169c02eca757908ace16d60e933c94acfab66b9500a67b5c,2024-06-20T12:44:22.977000
|
||||
CVE-2024-37891,0,0,ddade946d98463a2c8f8cfbb3e55e1c2664330986b4bd67bacc4915522a6cc76,2024-06-20T12:44:22.977000
|
||||
@ -254943,7 +254947,7 @@ CVE-2024-38272,0,0,0d362d9df49b138200ab4f12d59df7df286d43127ca17e43b2d79b45065d1
|
||||
CVE-2024-38273,0,0,98139fcc5d27706ddcb6f85d322a9c3ffe167225916ac0c861ab393656c9d382,2024-06-27T03:15:50.130000
|
||||
CVE-2024-38274,0,0,3f34dcdbcb04b3bd1c27e63f0c6c999c7639ff04bd1f29bc2ba555ae3687211a,2024-06-27T03:15:50.233000
|
||||
CVE-2024-38275,0,0,17a29176c9cd94911e6aad5a6dd293a641887c69fe54b6763e0075600fbe8757,2024-07-03T02:04:53.613000
|
||||
CVE-2024-38276,0,1,420b302a83b8efbfcc0741f978bb4fb38300f6e3967d44226949bf558a6f3b37,2024-08-08T15:55:51.160000
|
||||
CVE-2024-38276,0,0,420b302a83b8efbfcc0741f978bb4fb38300f6e3967d44226949bf558a6f3b37,2024-08-08T15:55:51.160000
|
||||
CVE-2024-38277,0,0,16053847926d7223ffdceef240174876427d3d8df27818d0420d2b969f2f78a5,2024-06-27T03:15:50.370000
|
||||
CVE-2024-38278,0,0,60d3c0d868d616e6d5a7669c0c9db2a6b6980c62032698d59edd5028fd6418f8,2024-07-09T18:19:14.047000
|
||||
CVE-2024-38279,0,0,cab780052140a006f97b0d891784c002d8aa91120b62e579420a5e2e60e5c1a0,2024-06-13T18:35:19.777000
|
||||
@ -254961,7 +254965,7 @@ CVE-2024-3829,0,0,bf09bfac220b5e30500c1e820d1b81945c22904d8e9c5dfde5faaff94c9815
|
||||
CVE-2024-38293,0,0,2af5660de21ea537f089380c69d608dd10ea2321053bca42c4352602d7ee9678,2024-08-01T13:54:46.393000
|
||||
CVE-2024-38294,0,0,f88948441f6418893f991fd0ef34dfd45f0e02ebcb8e39fd787f2f64385d53d8,2024-08-02T18:11:19.757000
|
||||
CVE-2024-38295,0,0,c8378492e2d02be00aeda8d1da5a5ec5803f1a3bcf3481a4ca52e9e0e7261335,2024-08-02T18:10:46.607000
|
||||
CVE-2024-38301,0,0,334450ca56bd1074e744d5e2e9a9bf04f668e867ead0d50886a3b74cbc9c3832,2024-07-11T13:05:54.930000
|
||||
CVE-2024-38301,0,1,0aaba53899fa63c6f65cba4d5faa4104f18194e9cd1a78452f451bbbdb780cd8,2024-08-08T17:01:45.347000
|
||||
CVE-2024-38302,0,0,e77ca3bd1f42a6aa7992c70d7c2a8c98c0238a3f11a590553b92597fb717d1f6,2024-07-19T13:01:44.567000
|
||||
CVE-2024-38306,0,0,302c251894cd8175c95dcaa248535d0e8a6962400e46ca01099390440f888d26,2024-06-25T18:50:42.040000
|
||||
CVE-2024-3831,0,0,50e818929dc56e84afc0dd8fe8fae7a8b323529f272034386ddae5543191124f,2024-05-14T16:11:39.510000
|
||||
@ -255018,7 +255022,7 @@ CVE-2024-38396,0,0,5f72717de89283d9d02d4a6b5fda996e5c7ff361cf439906862ebb83e84bf
|
||||
CVE-2024-3840,0,0,ec33e8e5666d06426f4f27241e2048dc8546d2022bc8f60f84c59f2555cee127,2024-07-03T02:06:39.663000
|
||||
CVE-2024-3841,0,0,8802855d3bfa5a1c81bb3b1500254989e91bb5a660a45184fb94e49c6e6b50a2,2024-07-03T02:06:40.900000
|
||||
CVE-2024-38427,0,0,8994acf8b0d2e9fdb11baea3df5edeec421ed8fa1c8aac7108ecf0d2784c04de,2024-07-03T02:05:00.507000
|
||||
CVE-2024-38428,0,1,e2b97f9d317b8a26d270b75eac229588c12ed4682b78a7b49e325a0c7069f57c,2024-08-08T15:05:30.617000
|
||||
CVE-2024-38428,0,0,e2b97f9d317b8a26d270b75eac229588c12ed4682b78a7b49e325a0c7069f57c,2024-08-08T15:05:30.617000
|
||||
CVE-2024-38429,0,0,5e526ecd9f3601e5c2a795b29824bf852a40a8bd76e3dceab8977ec097461eef,2024-07-30T13:32:45.943000
|
||||
CVE-2024-3843,0,0,f8304581ad62be18ba48d40e0abaf62c4d0e638c53e769e55d87254b71de405d,2024-07-03T02:06:41.770000
|
||||
CVE-2024-38430,0,0,d1c73169d37efc71e6beb9c22a4d2028659521613b3d071afac8c89cb0341c77,2024-07-30T13:32:45.943000
|
||||
@ -255347,8 +255351,8 @@ CVE-2024-38884,0,0,2995d6655030b3efa99eeb13ff3962c49b64356404f8cdbbcd7d79ef0fe80
|
||||
CVE-2024-38885,0,0,8a2e7c92ff9d59eeb253764b9b37a9e191e8aa4093e5ab42e0fe7961aff8a0f1,2024-08-05T12:41:45.957000
|
||||
CVE-2024-38886,0,0,7f7480a9fc0b3a4a59d99433c843b2ef60b52e8307cd555f1962e8229585a9ec,2024-08-07T16:15:45.170000
|
||||
CVE-2024-38887,0,0,4ef670c69378591ff707bbb33d589d9f51782faaa69470b8debfe2f088a4a51d,2024-08-07T16:15:45.253000
|
||||
CVE-2024-38888,0,1,d634d5c4fda84e84d6d530d61c52e88e8a68a7b5ebce006b5ca5c9a24e94ca29,2024-08-08T15:35:14.817000
|
||||
CVE-2024-38889,0,1,ff5449d6729d1bfcccdf0b8a6b7ef1db4efc5b9569e828f6e023fb30564cd1e3,2024-08-08T15:35:15.143000
|
||||
CVE-2024-38888,0,0,d634d5c4fda84e84d6d530d61c52e88e8a68a7b5ebce006b5ca5c9a24e94ca29,2024-08-08T15:35:14.817000
|
||||
CVE-2024-38889,0,0,ff5449d6729d1bfcccdf0b8a6b7ef1db4efc5b9569e828f6e023fb30564cd1e3,2024-08-08T15:35:15.143000
|
||||
CVE-2024-3889,0,0,2ba5a45c24d719fe59128cbd33fa4af06a688faaf656f20a90f93b6e4da4d713,2024-04-23T12:52:09.397000
|
||||
CVE-2024-38890,0,0,4a300469b7efb073b95f9a9bf7e491c182b2ee0ba64a27c027d75d0858cc932c,2024-08-07T16:15:45.443000
|
||||
CVE-2024-38891,0,0,7d793eac7055749c212813812ed3b0024238fafee96aa609578fa7b4deb68b69,2024-08-07T16:15:45.503000
|
||||
@ -255380,8 +255384,8 @@ CVE-2024-38970,0,0,eb04e06c9fbc74e88c4fcf5d6eeffbd442cec39d7eaf1361f68ecba935eab
|
||||
CVE-2024-38971,0,0,46979c6cce7787051e40b62dba0207d3f5f20f29a3ce299a21265249d3eebf4c,2024-07-12T14:50:45.817000
|
||||
CVE-2024-38972,0,0,266b969944e47c34c5065969d4aa9af417e70cd96f058167cecf53341667f408,2024-07-11T15:06:04.187000
|
||||
CVE-2024-38983,0,0,b4007717ba4ecdcb9f705c2dcea6a2ebbf6e393e28ab95db12566748e89540ae,2024-08-08T13:58:47.040000
|
||||
CVE-2024-38984,0,1,7c3f7dcbb9d8db747f3ca9e598aad133b9cb813297db2b8c281b7b8ebe0e4cd5,2024-08-08T14:20:15.617000
|
||||
CVE-2024-38986,0,1,f88f428c38525ddbc968d1794b1779fbac2144427d1465f154ce6924362299d1,2024-08-08T14:18:47.127000
|
||||
CVE-2024-38984,0,0,7c3f7dcbb9d8db747f3ca9e598aad133b9cb813297db2b8c281b7b8ebe0e4cd5,2024-08-08T14:20:15.617000
|
||||
CVE-2024-38986,0,0,f88f428c38525ddbc968d1794b1779fbac2144427d1465f154ce6924362299d1,2024-08-08T14:18:47.127000
|
||||
CVE-2024-38987,0,0,0c71f898711274c7ac1489fe714f2d31dbe2fc7f130139d062fe917d9ea47c74,2024-07-11T15:06:05.027000
|
||||
CVE-2024-38990,0,0,501931c40b72ca4a3b10df5757210e9290217859750e859ab66984c960fc5bf4,2024-07-03T02:05:27.837000
|
||||
CVE-2024-38991,0,0,94e3c94b29575f02c48116cf5f4eea434bedd332518d74450337fdc7b51e049b,2024-07-03T02:05:28.670000
|
||||
@ -255398,9 +255402,9 @@ CVE-2024-39001,0,0,4a910b75869faff6116d62c4b16aa9d6512985c5f7163a2ecfe1d35727f84
|
||||
CVE-2024-39002,0,0,5ae3119071c777fe1c3c088ebb594ee3244ed1b22187ea0a59fbd4bdb0225ef6,2024-08-01T13:55:15.163000
|
||||
CVE-2024-39003,0,0,d490537b0b54e3dfe39c3bcd39a1799aa62df41a8d32db0a7f000717be4b18c5,2024-07-03T02:05:35.153000
|
||||
CVE-2024-39008,0,0,d8f19e5215777652d65d1787e2b99d3c75e4a232be174ccdef7b4b42d5758271,2024-07-09T16:22:47.440000
|
||||
CVE-2024-39010,0,1,ea27e1a674e0e51152c366aff9b8434577dd6bdd1d1fbf49281cb1173cbd8dea,2024-08-08T14:17:52.963000
|
||||
CVE-2024-39011,0,1,0ff72e1262c145c0e7ad0e12159fa8940005cef45637179ea7630e9fc6914efb,2024-08-08T14:16:25.860000
|
||||
CVE-2024-39012,0,1,9df6324c2bfe44c83576ce38800d6b3518f1e8bebb5d26f5ef119b7475ae9607,2024-08-08T14:03:03.583000
|
||||
CVE-2024-39010,0,0,ea27e1a674e0e51152c366aff9b8434577dd6bdd1d1fbf49281cb1173cbd8dea,2024-08-08T14:17:52.963000
|
||||
CVE-2024-39011,0,0,0ff72e1262c145c0e7ad0e12159fa8940005cef45637179ea7630e9fc6914efb,2024-08-08T14:16:25.860000
|
||||
CVE-2024-39012,0,0,9df6324c2bfe44c83576ce38800d6b3518f1e8bebb5d26f5ef119b7475ae9607,2024-08-08T14:03:03.583000
|
||||
CVE-2024-39013,0,0,a4c20ecb3bde21856044d9eb2da0ec8e02acc3f9684d1a5bf6185d1fb2e7bba0,2024-07-01T16:37:39.040000
|
||||
CVE-2024-39014,0,0,9a0097bf0bd9a3cc47cff0cc484a6f4c909bfad413f77f22d65f886eb0aa8457,2024-07-01T16:37:39.040000
|
||||
CVE-2024-39015,0,0,b9306c4366608a9bdba82a3b5fe9ddf19f9ad98b5ed41b597c0d6fd48fb1b83f,2024-07-03T02:05:35.967000
|
||||
@ -255462,7 +255466,7 @@ CVE-2024-39174,0,0,e23d16c301dd77bcbf0c998cdb1fd9e2250ff32896205d07ec7d2fbcb29c4
|
||||
CVE-2024-39178,0,0,941809397cc55551932a6950a6f2b95c443b08d8ccb5b2192a192df3dfe41968,2024-07-09T16:22:51.013000
|
||||
CVE-2024-3918,0,0,476a46be6ec9c148a29f5d8b4706a927d6b38a7387c9465eb6003c281a1d7618,2024-05-24T01:15:30.977000
|
||||
CVE-2024-39181,0,0,6d0605e6817c6f93a8fbfbf6a2ec1902596f3fb21fee78811ca51bbb181e7fbb,2024-07-11T13:05:54.930000
|
||||
CVE-2024-39182,0,1,51b32df09d912e550efbb72e5951696c8519aefd089e452500578b0d065b1383,2024-08-08T14:35:05.753000
|
||||
CVE-2024-39182,0,0,51b32df09d912e550efbb72e5951696c8519aefd089e452500578b0d065b1383,2024-08-08T14:35:05.753000
|
||||
CVE-2024-3919,0,0,33e13c5d81820af884522cd57579a7a0b812a530b82c07df6884548b544ce3e6,2024-08-01T13:56:45.767000
|
||||
CVE-2024-3920,0,0,0491b769da3fcc1d713428de93228065f2895f5f96d5fbedd163ec53b9c646c0,2024-05-24T01:15:30.977000
|
||||
CVE-2024-39202,0,0,348a7ae5d8dd5240a11e31748e08097038b5b43463791ad3f8bbf301dcb39ab4,2024-08-01T13:55:45.870000
|
||||
@ -255477,10 +255481,10 @@ CVE-2024-39211,0,0,2097c1c66ba59a15383c9353c96916ab9a5680eac99b1f2a60f6c4879ed46
|
||||
CVE-2024-3922,0,0,d93b594e75035330ffbe6c52b35218aa3c4c95531df86f73f7a2c93c08b19be8,2024-07-18T19:33:55.580000
|
||||
CVE-2024-39220,0,0,cffdc7781bb5a48c8af1f6973408b621ad60d81fad4d0ce74cb4feeeca56b86d,2024-07-09T16:22:52.750000
|
||||
CVE-2024-39223,0,0,883c34699a9736998d96a24eca81d41004d2627c06ccc61484d0f3062b934079,2024-07-09T16:22:53.590000
|
||||
CVE-2024-39225,0,1,93ec07be332c0fbc08f4cc605af38a214d7821d7542b5861ecdd39a33713e3a2,2024-08-08T15:35:16.513000
|
||||
CVE-2024-39225,0,0,93ec07be332c0fbc08f4cc605af38a214d7821d7542b5861ecdd39a33713e3a2,2024-08-08T15:35:16.513000
|
||||
CVE-2024-39226,0,0,65538f67cb196596a8cfb9513b9dfa6fe8eec2180b85ecc10f4d7ce6bc6a8c80,2024-08-07T20:55:49.350000
|
||||
CVE-2024-39227,0,0,2211ddbd5220f8b56e47d2f7c46758947c3e06d1cbf2ccb482742b173f16326b,2024-08-07T15:35:04.963000
|
||||
CVE-2024-39228,0,1,8b1f3c0005e0842107b7f0c645c21a9762591a4fc4cf4f38347830d4f20d016f,2024-08-08T15:35:17.417000
|
||||
CVE-2024-39228,0,0,8b1f3c0005e0842107b7f0c645c21a9762591a4fc4cf4f38347830d4f20d016f,2024-08-08T15:35:17.417000
|
||||
CVE-2024-39229,0,0,584cfbf56ddefb54ea5352429d5e93d41ff81ee610b212dc50534d94bcebb0b6,2024-08-07T15:17:46.717000
|
||||
CVE-2024-3923,0,0,c2a620888229e913021be3366cfd9f75cdf87c5d652acf18a88f48f7b1cc1363,2024-05-14T16:11:39.510000
|
||||
CVE-2024-39236,0,0,0c0b177de9b0c166027d70b91204b432604c3a2330076ae498cc541e78a8a520,2024-08-02T05:15:33.677000
|
||||
@ -256178,7 +256182,7 @@ CVE-2024-4088,0,0,61cc31924b86843bbd20c326ef7465dc1aa394b548458b2e1a9fc62c09ede6
|
||||
CVE-2024-40883,0,0,dacd9a67232f6d97da8b548085eb71f69250fd3fec34bd945dc78c157c912274,2024-08-01T12:42:36.933000
|
||||
CVE-2024-40895,0,0,8c1e79c4f9b4c4aa0a454566e9355d762509535d530511413d5b712e02da1fc1,2024-08-01T13:58:15.617000
|
||||
CVE-2024-40897,0,0,961e760bbf75aa3c22f4f2524dda55f63ec78f0f1d7997b53bd7e0a1a9dddcac,2024-08-01T13:58:16.503000
|
||||
CVE-2024-40898,0,0,d1dec81302f4e54a600dae87bee8bfb9655cc572e1020953c947841130b121a3,2024-08-01T13:58:17.817000
|
||||
CVE-2024-40898,0,1,c6ad18799f7505669566d9c81fb73660e4e14c652ad1fc12f5c5f928e7c51636,2024-08-08T16:02:40.887000
|
||||
CVE-2024-40899,0,0,e950acc969e56b6fc4b2198a92989ebcef19e4b4c9a9c8ad08fee90da2bba031,2024-07-12T16:34:58.687000
|
||||
CVE-2024-4090,0,0,bd5db9aa43fdf043c385c9f06c114ad9fbfb60a7cd8406c1329f0be062b40775,2024-08-01T14:35:12.593000
|
||||
CVE-2024-40900,0,0,d5b683c8350615b20febf47a29bbffae93edd0a350147e3cd873aa7a5a37926c,2024-07-12T16:34:58.687000
|
||||
@ -256328,8 +256332,8 @@ CVE-2024-41033,0,0,7183dfda87a717a7043cb53f856518b54b6ea87a88747e15104fc76ba2e9f
|
||||
CVE-2024-41034,0,0,8ef7155ce0eaa8275171b9ac0813864d0797967a61f622f33157a8a24fce3047,2024-07-29T16:21:52.517000
|
||||
CVE-2024-41035,0,0,cf48df2d338e0ed99938b6805f348531b3d0c639b71dd85f792b634a7cad4d55,2024-07-29T16:21:52.517000
|
||||
CVE-2024-41036,0,0,3eb36f0b966eb35cff9222acfdc54aaaf4f85427f44e523908ded2d0342001b2,2024-07-29T16:21:52.517000
|
||||
CVE-2024-41037,0,0,03ad41aa47b3521ca726588a13b9b67807df47d603e0c2ae5f4a7855107c284a,2024-07-29T16:21:52.517000
|
||||
CVE-2024-41038,0,0,846baeab557d3551a3a4fa3b4d204920637ef62e2619819c67d5cc5dc43f5b9e,2024-07-29T16:21:52.517000
|
||||
CVE-2024-41037,0,1,ee0b06bc77973c4027d48245d79fc7d87f47e59f3c8717e8720a6850fc7cec0b,2024-08-08T17:53:57.487000
|
||||
CVE-2024-41038,0,1,2aabacb99b432cb8d9836c68ea21fc07218bc88764ab1e896c1d79793004d876,2024-08-08T17:54:28.177000
|
||||
CVE-2024-41039,0,0,3cf037a7b77611f693ccd2b6ab5e6ffc513017022cda8dfe8747fcd8d565d21f,2024-07-29T16:21:52.517000
|
||||
CVE-2024-4104,0,0,069e7afb1610585640d00d566d3fc4756dff3571ed269cd2ef1d63c8e8ce45e5,2024-05-14T16:11:39.510000
|
||||
CVE-2024-41040,0,0,7c4f1d43a75af85b97ad82a0f079e37e8691141bbc74b9a4b3f13879c7076fe9,2024-07-29T16:21:52.517000
|
||||
@ -256382,18 +256386,18 @@ CVE-2024-41083,0,0,dff5dc6a7165d8b682758090410b05b21412e86ab2996b0805e7e8a0c1a5e
|
||||
CVE-2024-41084,0,0,f925e6b8af988fbff4009df696776564d1566b9bec0a2d08e615514886466a2d,2024-07-29T16:21:52.517000
|
||||
CVE-2024-41085,0,0,2a01a626749195e58b8c5d7793aaaf03330b26d8f731e06b491ff19b65d15e11,2024-07-29T16:21:52.517000
|
||||
CVE-2024-41086,0,0,def1e72f4af73afb05473009bf28654fb55be728733d04a1cb558efe55809b1e,2024-07-29T16:21:52.517000
|
||||
CVE-2024-41087,0,0,bd15033a3cf973bd638aace7e26263a17fe38e501501b32e5f4542ad2048b802,2024-07-29T16:21:52.517000
|
||||
CVE-2024-41087,0,1,58c38c74c158e439afdb46cfb9959ea78813107a1e241ba0d714928a41f4075e,2024-08-08T18:00:03.977000
|
||||
CVE-2024-41088,0,0,77b266b2f37d59fc76108613da24291390035f20c7c9f472230f677ce48b8790,2024-07-29T16:21:52.517000
|
||||
CVE-2024-41089,0,0,42d363fb28c0c402e3b3a26eeb72bb1828849bc65cfe7de4fdb1a253856c4efa,2024-07-29T16:21:52.517000
|
||||
CVE-2024-41089,0,1,38c98937ddcf0489f642c6e9ec7fba9f1ecb4dca47f05ab2326eea2df7749aea,2024-08-08T17:50:48.727000
|
||||
CVE-2024-41090,0,0,6fcac80b2a14c2c34689e44731def02717dedfe18dda82ddf5737822dbb56b40,2024-07-29T14:12:08.783000
|
||||
CVE-2024-41091,0,0,3fc4e261f19779ac0e56a4e977593baaf33599d021e440beef3dc9dadc5be94c,2024-07-29T14:12:08.783000
|
||||
CVE-2024-41092,0,0,6ba4cc9e9d43c375b4a27827e9ec237140f86ae979bb409fce41de855fede6f0,2024-07-29T16:21:52.517000
|
||||
CVE-2024-41093,0,0,0d64e8910c13b044168b969bba921ca7dfdd81d34edec58275188d07470da2a5,2024-07-29T16:21:52.517000
|
||||
CVE-2024-41092,0,1,3c39b044ea5e355675d6fc317f55f869cf719acff5bdab05fd9abf02bf44d9f2,2024-08-08T17:51:11.700000
|
||||
CVE-2024-41093,0,1,4ea05a79a95d172d19f70ea731b5f27982d494680f43de6cd04d5939fa17a543,2024-08-08T17:40:31.917000
|
||||
CVE-2024-41094,0,0,278c76ef5ca1238c19b2adc813e6cb3415611fd6af79d964f6f40f1f04f60911,2024-07-29T16:21:52.517000
|
||||
CVE-2024-41095,0,0,f244fd6ca8576a21cb7f6e12692a808905044dd2fc8132b84f6eedf5a6d0c3a3,2024-07-29T16:21:52.517000
|
||||
CVE-2024-41096,0,0,f753c653f62c476d7f1d028269b80b34585f6eb891d94690df0f36d2c3d3deef,2024-07-29T16:21:52.517000
|
||||
CVE-2024-41095,0,1,98a605be3304014b7bcfedec75080b0924875a65426f1c380d6fa3a9f53a567d,2024-08-08T17:40:57.760000
|
||||
CVE-2024-41096,0,1,e27d9a9f6ddb33e4e88e9e812b9df7d691fa3ced83e8d0561956e8d8df8a0395,2024-08-08T17:26:54.243000
|
||||
CVE-2024-41097,0,0,c920409ed43bd61ce66fbb67a2bc2f7c465a9ae9767076af29e351ce5c3e00a0,2024-07-29T16:21:52.517000
|
||||
CVE-2024-41098,0,0,545801a52863d7fb74ca8bb3c684f54e35c8de9c9dee55a88b00c0dc2fd6a1ec,2024-07-29T16:21:52.517000
|
||||
CVE-2024-41098,0,1,4658b1a664747249856491a8decc3561c2036eed8e14f4d01a4226586d09138c,2024-08-08T17:27:55.600000
|
||||
CVE-2024-41107,0,0,915f86d966f5052f8f4738594970b5192d92a928e05127ecefed6fd25d76d731,2024-08-01T13:58:18.103000
|
||||
CVE-2024-41108,0,0,daaf049d75854e89d8d3d930835471f8a7387b1098b5ea5bfe30ca4174f38e4e,2024-08-01T12:42:36.933000
|
||||
CVE-2024-41109,0,0,6e64213670db8f08136c5da3a157b68e75923efed5e9eb7ffeadc18fa0a3ced8,2024-07-31T12:57:02.300000
|
||||
@ -256442,25 +256446,26 @@ CVE-2024-4120,0,0,820754c86895fc4e7f3a6d10baae3c2abd537610acf37474f492c12f46cc8b
|
||||
CVE-2024-41200,0,0,773adf6d8e9dc4d2b0557aa5b14dffd1b26ae280076ffdf0856bca3a52b0026c,2024-08-06T16:30:24.547000
|
||||
CVE-2024-4121,0,0,62ca255cdda2e26a7a0224389681466727634cf0831afab2f14e58a1cb5bd920,2024-06-04T19:20:30.460000
|
||||
CVE-2024-4122,0,0,3d81c7d42348f56045cc538515e4a2e136e243adec928773370fb697e11bd281,2024-06-04T19:20:30.560000
|
||||
CVE-2024-41226,0,1,f5381931de23c5c05f7ee8bfe76927ab8a3b6cc5523ba53e93ac6154cb968434,2024-08-08T14:35:06.727000
|
||||
CVE-2024-41226,0,0,f5381931de23c5c05f7ee8bfe76927ab8a3b6cc5523ba53e93ac6154cb968434,2024-08-08T14:35:06.727000
|
||||
CVE-2024-4123,0,0,b9879b7d0937c162f61c7aeebe9319c3ee0d2290b23cb569d74c82da57c569d5,2024-06-04T19:20:30.660000
|
||||
CVE-2024-41237,0,1,6c3bbfd67a2c38c6147b8483ba279472257fc740c0d1572c5fa4e63c27c892fc,2024-08-08T14:35:07.647000
|
||||
CVE-2024-41239,0,0,adf670735c7ceebbef13764d2688de43ef7a5c56a813a8d8300861cc79bf2917,2024-08-08T13:04:18.753000
|
||||
CVE-2024-41237,0,0,6c3bbfd67a2c38c6147b8483ba279472257fc740c0d1572c5fa4e63c27c892fc,2024-08-08T14:35:07.647000
|
||||
CVE-2024-41238,1,1,cf96282fa1415cd67f054f797fb68068695ecd470c073cb302f195cae77e40bc,2024-08-08T17:35:05.697000
|
||||
CVE-2024-41239,0,1,4739a4322a16e9b592b27bce368fa148c39d464b16681353d1da057fafdab0e5,2024-08-08T16:15:09.190000
|
||||
CVE-2024-4124,0,0,a8707e0967c681f9085483c77f4dbcbac39e7eb8e57f061d5b5c7f920dc545dd,2024-06-04T19:20:30.760000
|
||||
CVE-2024-41240,0,1,6bb42561fb73e1c8ed9afe6aa25e35f66b18836251b374c99ab90ce1ad770126,2024-08-08T15:11:06.067000
|
||||
CVE-2024-41241,0,1,d3115bbab1f881af8427f99f6eb7c6163ef887cc6ec86ad36953f85328b14c55,2024-08-08T15:21:29.210000
|
||||
CVE-2024-41242,0,1,136c7b7d22b080b31a334ec64795d2be9a741e5bc601d37387485bacabb32da5,2024-08-08T15:21:56.590000
|
||||
CVE-2024-41243,0,1,952dd949cd58ac35f0a1a9ee0037ce6943213f0d14c4ea16f43a084423f1a4c5,2024-08-08T15:19:38.640000
|
||||
CVE-2024-41244,0,1,892fb6545cc28ccf50cd66c9f6ebdecb8c20baeba0848d57269be31999372da5,2024-08-08T15:20:24.533000
|
||||
CVE-2024-41245,0,1,587669924cb86d0aced2b2326d4b0b028a2dc0fb71bb86f1df18fc2bef95dffd,2024-08-08T15:20:58.417000
|
||||
CVE-2024-41246,0,1,a352b0d929b79816f00a5f05f3133a7c2713cc0cccf57d59b49d04652ec3a004,2024-08-08T15:08:51.867000
|
||||
CVE-2024-41247,0,1,b1879234dbb5e4e51537003eb14b996f7ad3d024ec805dab5d73eb6a361d1f7a,2024-08-08T15:08:20.403000
|
||||
CVE-2024-41248,0,1,2e3eb92d4ddb9fb73a0d6cd2e0e99894b028d705fe4f5641721da8bf80a9bf4d,2024-08-08T15:07:27.853000
|
||||
CVE-2024-41249,0,1,b36adc3976bd0fd4b1a986a438ce356cce08547870c88e153dfb2ebcd8a73b86,2024-08-08T15:06:48.843000
|
||||
CVE-2024-41240,0,0,6bb42561fb73e1c8ed9afe6aa25e35f66b18836251b374c99ab90ce1ad770126,2024-08-08T15:11:06.067000
|
||||
CVE-2024-41241,0,0,d3115bbab1f881af8427f99f6eb7c6163ef887cc6ec86ad36953f85328b14c55,2024-08-08T15:21:29.210000
|
||||
CVE-2024-41242,0,0,136c7b7d22b080b31a334ec64795d2be9a741e5bc601d37387485bacabb32da5,2024-08-08T15:21:56.590000
|
||||
CVE-2024-41243,0,0,952dd949cd58ac35f0a1a9ee0037ce6943213f0d14c4ea16f43a084423f1a4c5,2024-08-08T15:19:38.640000
|
||||
CVE-2024-41244,0,0,892fb6545cc28ccf50cd66c9f6ebdecb8c20baeba0848d57269be31999372da5,2024-08-08T15:20:24.533000
|
||||
CVE-2024-41245,0,0,587669924cb86d0aced2b2326d4b0b028a2dc0fb71bb86f1df18fc2bef95dffd,2024-08-08T15:20:58.417000
|
||||
CVE-2024-41246,0,0,a352b0d929b79816f00a5f05f3133a7c2713cc0cccf57d59b49d04652ec3a004,2024-08-08T15:08:51.867000
|
||||
CVE-2024-41247,0,0,b1879234dbb5e4e51537003eb14b996f7ad3d024ec805dab5d73eb6a361d1f7a,2024-08-08T15:08:20.403000
|
||||
CVE-2024-41248,0,0,2e3eb92d4ddb9fb73a0d6cd2e0e99894b028d705fe4f5641721da8bf80a9bf4d,2024-08-08T15:07:27.853000
|
||||
CVE-2024-41249,0,0,b36adc3976bd0fd4b1a986a438ce356cce08547870c88e153dfb2ebcd8a73b86,2024-08-08T15:06:48.843000
|
||||
CVE-2024-4125,0,0,16553edd1211e1aa2542535f3455b94ede37886029935c5af09bcd7638ededbf,2024-05-17T02:40:16.937000
|
||||
CVE-2024-41250,0,1,bc95c78a7efc0365fead4119be635c241b3ddedc1c42b75d136374203f86efd4,2024-08-08T15:21:18.130000
|
||||
CVE-2024-41251,0,1,5ba1e81e82ce502a72a5f7e5c5f8e1fac5b8153b5b88fdafbb8f664b9b159757,2024-08-08T15:05:36.537000
|
||||
CVE-2024-41252,0,1,6f7260587fe3d806095bb900d28d021360c8fa8615ba7755fc4b11adcc410d82,2024-08-08T15:04:56.287000
|
||||
CVE-2024-41250,0,0,bc95c78a7efc0365fead4119be635c241b3ddedc1c42b75d136374203f86efd4,2024-08-08T15:21:18.130000
|
||||
CVE-2024-41251,0,0,5ba1e81e82ce502a72a5f7e5c5f8e1fac5b8153b5b88fdafbb8f664b9b159757,2024-08-08T15:05:36.537000
|
||||
CVE-2024-41252,0,0,6f7260587fe3d806095bb900d28d021360c8fa8615ba7755fc4b11adcc410d82,2024-08-08T15:04:56.287000
|
||||
CVE-2024-41253,0,0,1d15e693bee8ec7e0d17946828828bb61ca6ab7c564466339f09f66ca369a555,2024-08-01T13:58:25.153000
|
||||
CVE-2024-41254,0,0,27d7c2f374106e64ca875d8bdf9e26785b8da013fe899595d0b402d9e5d8a252,2024-08-01T12:42:36.933000
|
||||
CVE-2024-41255,0,0,7cc2545787669f116d3dff916e600823ce1d7be3e6c14b4dba9c7bef750d7295,2024-08-01T15:35:18.570000
|
||||
@ -256478,9 +256483,9 @@ CVE-2024-4128,0,0,68bc0506eec8fccf6c4228f6f90915fa5b089633c8bc20338b2c6bd4b4236a
|
||||
CVE-2024-41281,0,0,acd5274a5314a460f4482234d2c8af8da53f6324e375946a6feb8a82983d1186,2024-08-01T13:58:25.943000
|
||||
CVE-2024-4129,0,0,f2fba94e29dd925b8a56a23f2711717731ea628ca4457222b442fc21c3f8c80a,2024-05-14T16:11:39.510000
|
||||
CVE-2024-41304,0,0,50eb5d3ccf87bf5dc8e8d40b784bffa46248caaebc645a20bf8eaeddf45f3d43,2024-07-31T12:57:02.300000
|
||||
CVE-2024-41305,0,1,44375e3d9aedae768570d453a5746b314221c07760efe679991b65a52a72cbb1,2024-08-08T14:36:06.423000
|
||||
CVE-2024-41308,0,1,0cfb1f5a539d1b3ab56fa248bc4e6b56744120f3ffd7eb646c940bb1f8d27a55,2024-08-08T15:04:28.510000
|
||||
CVE-2024-41309,0,1,b9bc578a75924505757e6c223f9b414f575de364b8af8a3b843d1bd2707bdb26,2024-08-08T15:35:19.553000
|
||||
CVE-2024-41305,0,0,44375e3d9aedae768570d453a5746b314221c07760efe679991b65a52a72cbb1,2024-08-08T14:36:06.423000
|
||||
CVE-2024-41308,0,0,0cfb1f5a539d1b3ab56fa248bc4e6b56744120f3ffd7eb646c940bb1f8d27a55,2024-08-08T15:04:28.510000
|
||||
CVE-2024-41309,0,0,b9bc578a75924505757e6c223f9b414f575de364b8af8a3b843d1bd2707bdb26,2024-08-08T15:35:19.553000
|
||||
CVE-2024-41310,0,0,411e679a4d87025cfbd714a6e1af5ab48738e4397cbbc5202ae220b932f1975c,2024-08-05T12:41:45.957000
|
||||
CVE-2024-41314,0,0,db53d1cfc39af554879f83e26dbe36479a0a26172379fc4a043735d6cb186ac0,2024-08-01T13:58:28.057000
|
||||
CVE-2024-41315,0,0,2d4182edc23b3ca5f23da4066941e10349788ef80e0dc9d84cb1c30a4edf0d37,2024-08-01T13:58:28.840000
|
||||
@ -256509,7 +256514,7 @@ CVE-2024-4140,0,0,1a159a4a143aac5301b6b2c31977a1ba9c685fc606596154a85964b944248c
|
||||
CVE-2024-4141,0,0,6345d107b3806446cb477db17841c2bd741df862ff110a2cbbd3d3a9945eb29d,2024-04-24T19:58:40.710000
|
||||
CVE-2024-4142,0,0,15f953d52654601c03ad89c9ea21867b549a2aa12635e109fbf9627466e8a212,2024-05-02T13:27:25.103000
|
||||
CVE-2024-4143,0,0,3e703fdfd0a07e589cb7985eb968c1c228e0bf41a25245c7c0c730d1481e87d2,2024-08-01T13:59:25.697000
|
||||
CVE-2024-41432,0,1,8f4c9c137a73ce4492827c5d064849c429a9c8bcf4d56d4aa0a1d934e4b0578d,2024-08-08T15:02:52.647000
|
||||
CVE-2024-41432,0,0,8f4c9c137a73ce4492827c5d064849c429a9c8bcf4d56d4aa0a1d934e4b0578d,2024-08-08T15:02:52.647000
|
||||
CVE-2024-41437,0,0,e389b50aa4d5a29958eacacc1cf1faf0204fd6cb11cd0999a5af2bb030d46651,2024-07-31T12:57:02.300000
|
||||
CVE-2024-41438,0,0,996a6cc02fa9447bba099c45bfb4b15a572a20ecb18cd6121c0e71f3f9fd5f1a,2024-08-01T13:58:40.670000
|
||||
CVE-2024-41439,0,0,43b59c8356f4d1c8bf3b4e415610ae4cbbf5c49a8a4d0218f2cf89083ef134a7,2024-07-31T12:57:02.300000
|
||||
@ -256671,7 +256676,7 @@ CVE-2024-41924,0,0,06cc2d8c551d8fd39f4e2ff31447bb4070ddde2d992cf8f0c8cb1b0035280
|
||||
CVE-2024-41926,0,0,13c43cd281b4a9b74f2496b8daab80f10df1e7e6bc024b50c3c661b49018ccc2,2024-08-01T16:45:25.400000
|
||||
CVE-2024-4193,0,0,4d4f4fcde78b01b33e30a077c434c1714d01a9ac9cd58d916bc86b963b6ddbd7,2024-05-14T16:11:39.510000
|
||||
CVE-2024-4194,0,0,cb2c64b568e3bd7c78c9d4f736651c66722818abe246f3bc5aedd70e3521cb96,2024-06-06T14:17:35.017000
|
||||
CVE-2024-41942,1,1,d3803f07ce0e65ed29e1e70dc90caac5025f888fb0a18433d54e269ebd38e920,2024-08-08T15:15:17.527000
|
||||
CVE-2024-41942,0,0,d3803f07ce0e65ed29e1e70dc90caac5025f888fb0a18433d54e269ebd38e920,2024-08-08T15:15:17.527000
|
||||
CVE-2024-41943,0,0,e9522f5ef1fc490dfac21cbf940a07ce3841f4fb783f1339fe71b8d4141a64db,2024-07-31T12:57:02.300000
|
||||
CVE-2024-41944,0,0,135d3dced80bc39762656a548dac91a6dee89920c44affdb521ffafdd868d70c,2024-07-31T12:57:02.300000
|
||||
CVE-2024-41945,0,0,58045736441484d7b962c82a633dc9fabe3d1461c0f6ea954d229d59ebf06f9d,2024-07-31T12:57:02.300000
|
||||
@ -256831,8 +256836,8 @@ CVE-2024-42150,0,0,b0367ccbbd7e8c81c36eb7016e076190b057ac84efe63dcc25d8aac079dad
|
||||
CVE-2024-42151,0,0,fdb3fba7028cbe28580e674b99b9030e1b9e9a62c2e7f59da9e900cf53455fd9,2024-07-30T13:32:45.943000
|
||||
CVE-2024-42152,0,0,cf7897733bea0728a109fc5e6bd10f12dc7e878ac6bdef95ec146d648e8c50e6,2024-07-30T13:32:45.943000
|
||||
CVE-2024-42153,0,0,fcc644e98f47bf80a615aace1a6ace900e6f19b9ce88641e6a917689ff1d51b4,2024-08-08T12:51:49.873000
|
||||
CVE-2024-42154,0,1,5a5c96e428c438e1f3dced31d05704a5d2c2ea208c7b4d00317e93a93e699f79,2024-08-08T15:02:01.050000
|
||||
CVE-2024-42155,0,1,95a42d84399f0f115a34ecfd921658f3d7af5446b3cada02cd7d7dba29b77291,2024-08-08T15:01:33.093000
|
||||
CVE-2024-42154,0,0,5a5c96e428c438e1f3dced31d05704a5d2c2ea208c7b4d00317e93a93e699f79,2024-08-08T15:02:01.050000
|
||||
CVE-2024-42155,0,0,95a42d84399f0f115a34ecfd921658f3d7af5446b3cada02cd7d7dba29b77291,2024-08-08T15:01:33.093000
|
||||
CVE-2024-42156,0,0,3e3b593a088f7c0fa294387fa1377c62b099a10750cb61c9f552055051d6684b,2024-08-02T14:31:53.660000
|
||||
CVE-2024-42157,0,0,5125f5bae216026101436b8ffee5dc883ebe43267cdd74d06d29261ee37e908f,2024-08-02T14:31:28.107000
|
||||
CVE-2024-42158,0,0,f708fe0c9b8afdea7e816433ff8d7e695756b23c2951cd3e7d51dd4aa0ae2367,2024-08-02T14:31:04.187000
|
||||
@ -256845,7 +256850,7 @@ CVE-2024-4217,0,0,b697d32a81a44314e31fbbbd491d72bf1d83730c215f0b4ac0b5c272bbd606
|
||||
CVE-2024-4218,0,0,dff7b6ef5b1eda10e25547a7c58ff59e7141627798ff1eb390bbb04c101af4a9,2024-05-30T13:15:41.297000
|
||||
CVE-2024-4219,0,0,e67747b1814e30f9a57aa2d5fada7a64c70b8e2f4229bf1bd72194f6b14072cc,2024-06-11T17:06:50.963000
|
||||
CVE-2024-4220,0,0,046e30c2acea51afb217826bab01d9bc8062f3ae27d0f03889e044f9dcbfad10,2024-06-11T17:05:35.203000
|
||||
CVE-2024-42218,0,1,0f1deaa2b36000515fee391bcd2c28c5d6e64cfa71591116e02669ca7ef63ea0,2024-08-08T14:35:11.900000
|
||||
CVE-2024-42218,0,0,0f1deaa2b36000515fee391bcd2c28c5d6e64cfa71591116e02669ca7ef63ea0,2024-08-08T14:35:11.900000
|
||||
CVE-2024-42219,0,0,00fd975f66f6a2839a189f6a2df8a7d9de08250abaf16b5b10685ac80a797621,2024-08-07T20:35:23.967000
|
||||
CVE-2024-4222,0,0,4d6355f51e627298e66c1522bbe3d0815b2694594ed1a3761ea4bb349286c8e6,2024-05-16T13:03:05.353000
|
||||
CVE-2024-42222,0,0,38cd91b9b737930e3a3bbd66eab3ff63c06a7a58cfd61a8acfc3675557f6b5ab,2024-08-07T15:17:46.717000
|
||||
@ -256859,23 +256864,23 @@ CVE-2024-42229,0,0,36cc6538a49438424165de83459803117419e403bec726ebc7859e65ec89d
|
||||
CVE-2024-4223,0,0,a9cdfeab1a1d35d41a694125f4f4f3203fe0cd94da938f50193ff10f6450cc4d,2024-05-16T13:03:05.353000
|
||||
CVE-2024-42230,0,0,489de0c942b162ae04db8d65286f120a7fa8b9f22ca14fe8139d983112a4bb74,2024-07-30T19:32:51.137000
|
||||
CVE-2024-42231,0,0,10724278b1403d9010315b9b102a7133e512f19dc0258e17964781455ceff0fb,2024-07-30T19:30:52.427000
|
||||
CVE-2024-42232,0,1,97d1ff8df3e66dbe79f646e97c3af8fe34aa07d5ff0f154f387b73a5b743c2f7,2024-08-08T15:02:09.750000
|
||||
CVE-2024-42233,0,1,b858c2184be0fe9bc0cfbcdc8da672b46795edb7eff9525a65fd92743ad6599c,2024-08-08T14:56:18.620000
|
||||
CVE-2024-42234,0,1,cf936c476d401b01b17f21c4e4ca650e769fd6fed6837fd263712aa8a356e3b8,2024-08-08T14:55:29.913000
|
||||
CVE-2024-42235,0,1,9f11b42e1871685982fdbf6f53089e9f3f33bab0488d21a69e9f64a0b3866973,2024-08-08T14:55:16.533000
|
||||
CVE-2024-42236,0,1,6b4e98fd82e82c6c7dac85df976320ff8022b8678ac478676c90c4ed4c101893,2024-08-08T14:54:34.470000
|
||||
CVE-2024-42237,0,1,2582452331a5d9178bb53c817c854b132fde8a0d3c55495d0e8679006a2bbd38,2024-08-08T14:54:24.207000
|
||||
CVE-2024-42238,0,1,0d2e2825ed61c4e9cd100f8e3636e4a2f6260a95f57324d0ff39d5aa486178c4,2024-08-08T14:54:45.470000
|
||||
CVE-2024-42239,0,1,bce0cbc185e9dba8bf14bbf789d8b1c57e6b9d76cbdc58ec3be7ed7be3fe4ef8,2024-08-08T14:54:08.330000
|
||||
CVE-2024-42232,0,0,97d1ff8df3e66dbe79f646e97c3af8fe34aa07d5ff0f154f387b73a5b743c2f7,2024-08-08T15:02:09.750000
|
||||
CVE-2024-42233,0,0,b858c2184be0fe9bc0cfbcdc8da672b46795edb7eff9525a65fd92743ad6599c,2024-08-08T14:56:18.620000
|
||||
CVE-2024-42234,0,0,cf936c476d401b01b17f21c4e4ca650e769fd6fed6837fd263712aa8a356e3b8,2024-08-08T14:55:29.913000
|
||||
CVE-2024-42235,0,0,9f11b42e1871685982fdbf6f53089e9f3f33bab0488d21a69e9f64a0b3866973,2024-08-08T14:55:16.533000
|
||||
CVE-2024-42236,0,0,6b4e98fd82e82c6c7dac85df976320ff8022b8678ac478676c90c4ed4c101893,2024-08-08T14:54:34.470000
|
||||
CVE-2024-42237,0,0,2582452331a5d9178bb53c817c854b132fde8a0d3c55495d0e8679006a2bbd38,2024-08-08T14:54:24.207000
|
||||
CVE-2024-42238,0,0,0d2e2825ed61c4e9cd100f8e3636e4a2f6260a95f57324d0ff39d5aa486178c4,2024-08-08T14:54:45.470000
|
||||
CVE-2024-42239,0,0,bce0cbc185e9dba8bf14bbf789d8b1c57e6b9d76cbdc58ec3be7ed7be3fe4ef8,2024-08-08T14:54:08.330000
|
||||
CVE-2024-4224,0,0,e1cf2ae7cdc88422eca01167991edf26a4949e3c9b9aa4ed5e8cc28f6acda13c,2024-08-01T13:59:28.640000
|
||||
CVE-2024-42240,0,1,220bf32b63332418629725f3f6b777328a87abe3a935b8d71148fd45efcfbe19,2024-08-08T14:53:59.897000
|
||||
CVE-2024-42241,0,1,ab98a3cf3764211ffb1c1c41264e4310931269ffa3c49a3d4924da8457a30617,2024-08-08T14:53:50.763000
|
||||
CVE-2024-42242,0,1,76feb11ff1b64882ae98cb05d8fee01154bb93b05ad0f7b74505099ce9d0fc7c,2024-08-08T14:53:42.797000
|
||||
CVE-2024-42243,0,1,a100e682d084e1c9afe0b29d6e1ddb97769c71cbec41adefbc9f2f46e71c060a,2024-08-08T14:53:35.073000
|
||||
CVE-2024-42244,0,1,64f9bf8b856af87969559561804111262192afa37aa42ad347e05b54753c2e75,2024-08-08T14:53:27.147000
|
||||
CVE-2024-42245,0,1,fcb264c29551cd3e5d6115618e13535ac0249a42a696c4e8493e8f7d1f5c12ef,2024-08-08T14:53:19.530000
|
||||
CVE-2024-42246,0,1,da0158313668d0853864dbfeb7b41dd897a00dbf2d1500f2de975e9a95c1bed0,2024-08-08T14:52:35.353000
|
||||
CVE-2024-42247,0,1,3e8b3f558d251c3978924ee255c30e74df6492b1da5085ab4e636b80775e9831,2024-08-08T14:52:25.213000
|
||||
CVE-2024-42240,0,0,220bf32b63332418629725f3f6b777328a87abe3a935b8d71148fd45efcfbe19,2024-08-08T14:53:59.897000
|
||||
CVE-2024-42241,0,0,ab98a3cf3764211ffb1c1c41264e4310931269ffa3c49a3d4924da8457a30617,2024-08-08T14:53:50.763000
|
||||
CVE-2024-42242,0,0,76feb11ff1b64882ae98cb05d8fee01154bb93b05ad0f7b74505099ce9d0fc7c,2024-08-08T14:53:42.797000
|
||||
CVE-2024-42243,0,0,a100e682d084e1c9afe0b29d6e1ddb97769c71cbec41adefbc9f2f46e71c060a,2024-08-08T14:53:35.073000
|
||||
CVE-2024-42244,0,0,64f9bf8b856af87969559561804111262192afa37aa42ad347e05b54753c2e75,2024-08-08T14:53:27.147000
|
||||
CVE-2024-42245,0,0,fcb264c29551cd3e5d6115618e13535ac0249a42a696c4e8493e8f7d1f5c12ef,2024-08-08T14:53:19.530000
|
||||
CVE-2024-42246,0,0,da0158313668d0853864dbfeb7b41dd897a00dbf2d1500f2de975e9a95c1bed0,2024-08-08T14:52:35.353000
|
||||
CVE-2024-42247,0,0,3e8b3f558d251c3978924ee255c30e74df6492b1da5085ab4e636b80775e9831,2024-08-08T14:52:25.213000
|
||||
CVE-2024-42248,0,0,9daba88013a62f39f5836d2ca2738ebe99311dc207e5be6d1a23f2affcf30263,2024-08-07T19:09:46.290000
|
||||
CVE-2024-42249,0,0,bf365edc2c96a4876083f80ea351bf6e74bd1f39215b48e95af26a5324f39b9e,2024-08-07T19:09:46.290000
|
||||
CVE-2024-4225,0,0,91f68c0336340065fb4af26f099ffa4f82ba2dd159bb3bc13f7cb1abcd1de276,2024-04-30T13:11:16.690000
|
||||
@ -256899,19 +256904,21 @@ CVE-2024-42349,0,0,d97bc517c9e69f035ec995db0492468328dd387e0dc6614b4ad8bd471c06d
|
||||
CVE-2024-4235,0,0,f578447debade3af3e230e69e9dbc9d9ff3e97fecc115950bd6af5b863fac2d3,2024-06-04T19:20:32.857000
|
||||
CVE-2024-42350,0,0,41e03c0efb90d720b1c8cb3232ef6c7cb3628d75ba24650e7a94fc79624a1e0c,2024-08-06T16:30:24.547000
|
||||
CVE-2024-42352,0,0,c0479ec0c76b813a7203da737c4719c60d3f36382909bc4066a937b282774165,2024-08-06T16:30:24.547000
|
||||
CVE-2024-42354,1,1,3d7595135ce94793d71e84673f836d90ebff18be5f4f6e094ccb4747459b4723,2024-08-08T15:15:17.793000
|
||||
CVE-2024-42355,1,1,18cdeda7877af65f170277b41a145f3c35a4438f3a3190478b69fcca0b47db9f,2024-08-08T15:15:18.013000
|
||||
CVE-2024-42356,1,1,98e8fd4c7edac05c8c94e1e93ad8136456c4b4a84fc6ae709b38a989943e3a4f,2024-08-08T15:15:18.247000
|
||||
CVE-2024-42357,1,1,17a3203dc9637fb73af25dd0413d02cecc35254bb9f6894cc80f19b3085c5a0b,2024-08-08T15:15:18.460000
|
||||
CVE-2024-42354,0,0,3d7595135ce94793d71e84673f836d90ebff18be5f4f6e094ccb4747459b4723,2024-08-08T15:15:17.793000
|
||||
CVE-2024-42355,0,0,18cdeda7877af65f170277b41a145f3c35a4438f3a3190478b69fcca0b47db9f,2024-08-08T15:15:18.013000
|
||||
CVE-2024-42356,0,0,98e8fd4c7edac05c8c94e1e93ad8136456c4b4a84fc6ae709b38a989943e3a4f,2024-08-08T15:15:18.247000
|
||||
CVE-2024-42357,0,0,17a3203dc9637fb73af25dd0413d02cecc35254bb9f6894cc80f19b3085c5a0b,2024-08-08T15:15:18.460000
|
||||
CVE-2024-42358,0,0,bfdfea3765abe743074eccf4e4988e900f51d95c87e996dc4c204d5e5db7c300,2024-08-07T15:17:46.717000
|
||||
CVE-2024-4236,0,0,e2cdfe0d631cec0094aabd9e613a58fc530f718522481021cb8970e2da56a2c3,2024-06-04T19:20:32.960000
|
||||
CVE-2024-42365,1,1,d3a57ff46171e16a07c5d4a9ce8d6a97fac3c2d8c14d2533d5e2b227cc435cea,2024-08-08T17:15:19.340000
|
||||
CVE-2024-42366,1,1,c6ae642720c4b2dbd302d4317caf1ed1792180069099f5fdd4ecd87302025526,2024-08-08T17:15:19.590000
|
||||
CVE-2024-4237,0,0,c38818d0c288b1eec57a9be9e655b05254cb3f3487787a1ecd91e69d9c20b38c,2024-05-17T02:40:19.580000
|
||||
CVE-2024-4238,0,0,188cceccdce16b8df034bef32fee010a6dd0f801c6690e1589421c7cadfb521c,2024-06-04T19:20:33.063000
|
||||
CVE-2024-42381,0,0,a5fa1277b5fe346d1dd5469d0c93ac780c7d0547ab1d06a7617c27606bb89aa8,2024-08-01T13:59:22.207000
|
||||
CVE-2024-4239,0,0,cecc2be82896f12bf6cdae75a3b125d58c075d387f3da865cfaf565a2c454897,2024-06-04T19:20:33.163000
|
||||
CVE-2024-42393,0,0,5dd44c9308d36b411fed5411a98459070241dd2bf710d7dad45f46ec0d5bad2d,2024-08-07T15:17:46.717000
|
||||
CVE-2024-42394,0,0,8620f2200c19aa777678f20e32bb1e445009605fa585ff86df761a7b63f61fb2,2024-08-07T15:35:07.267000
|
||||
CVE-2024-42395,0,1,e1c76c107b3f7053fd30c6ccc9feaab55edee78b1124907a4f272d01f9bc9027,2024-08-08T15:35:20.467000
|
||||
CVE-2024-42395,0,0,e1c76c107b3f7053fd30c6ccc9feaab55edee78b1124907a4f272d01f9bc9027,2024-08-08T15:35:20.467000
|
||||
CVE-2024-42396,0,0,903b5dfacb7e423dfce4ec2f21d9e5672155e7489cd90f70dcb7b200326e589d,2024-08-07T15:17:46.717000
|
||||
CVE-2024-42397,0,0,f7434600ffa56a576ecdf14011898fe7e4d8ca06e11d6701b45a9c7152ebd870,2024-08-07T15:17:46.717000
|
||||
CVE-2024-42398,0,0,1bd47f35d1750f7fdf43bf764c0abf3e2c80a4806a8e0014d8bb69479613f3de,2024-08-07T15:17:46.717000
|
||||
@ -257569,7 +257576,7 @@ CVE-2024-4961,0,0,fcb73b246c680abaae254870453939d7dbf5d8c46c3dbb2f7ab747d994c3a1
|
||||
CVE-2024-4962,0,0,b9e851b58a3c7e382510249caa4fcb1d6185432495cf3586b8784f0d9e4becfd,2024-08-01T21:15:54
|
||||
CVE-2024-4963,0,0,ef1fba35c0790604656a5e5622c9c7f4af0f1d1414e5784cd7a21207910d8397,2024-08-01T21:15:54.113000
|
||||
CVE-2024-4964,0,0,786ceb95d48675f478c0edd25187f0304d39eb81096edb79d2e9ae0401f68be3,2024-08-01T21:15:54.223000
|
||||
CVE-2024-4965,0,1,5bd9bf33c1ad1b27237ab2761363d4d9817c8f50155c84d844f98b12772718a0,2024-08-08T15:15:18.730000
|
||||
CVE-2024-4965,0,0,5bd9bf33c1ad1b27237ab2761363d4d9817c8f50155c84d844f98b12772718a0,2024-08-08T15:15:18.730000
|
||||
CVE-2024-4966,0,0,ca96dc16e6a41cb4de3af3c10d7787996b0688fd8eb0522e09efb3ad5052b418,2024-05-17T02:40:44.507000
|
||||
CVE-2024-4967,0,0,8025a234fc289bdab04f9acbdc2478b7155048b60320bc8b6b7a0758b314e3b9,2024-06-04T19:20:55.777000
|
||||
CVE-2024-4968,0,0,e5876599ebc72fb366518fd24786abd136bd58674cfc6b7ffb1fde29b7dfc2f8,2024-06-04T19:20:55.910000
|
||||
@ -258444,9 +258451,9 @@ CVE-2024-6061,0,0,9fbdc13d40c52cd3201ba4dbc85806265bcae7fe430997057864a0abc50a97
|
||||
CVE-2024-6062,0,0,93dbd09d82a9c090799896e27a01f38efff42cdeec70d50228105cef0f88fcb4,2024-06-20T12:44:22.977000
|
||||
CVE-2024-6063,0,0,bc31baa414c7130817af75aefc4c93d5c50e0d49a263847622e8e121134c5d33,2024-06-20T12:44:22.977000
|
||||
CVE-2024-6064,0,0,3370149dffce37c68b93ba4d92c68f6dbfa595c6fecab2312ed9b990710fd435,2024-06-20T12:44:22.977000
|
||||
CVE-2024-6065,0,0,514bd9f9f4a3613b94bc7bfb084d907ec74ed34501cfb3e4a683a0b50d6afe06,2024-06-20T12:44:01.637000
|
||||
CVE-2024-6066,0,0,a06c9fc8db7eb13dd621ace2d752d99df40755c9b5b91f1efc8bbc9b6de30b09,2024-06-20T12:44:01.637000
|
||||
CVE-2024-6067,0,0,1e6b129394b13ed508cc25c73753e4a7c09d825658c089c51e19bb31b1ffc20c,2024-06-20T12:44:01.637000
|
||||
CVE-2024-6065,0,1,fb62e316a0ad9ece1e768d08a64b14f3810d575505955be6b70f210883e1f8c6,2024-08-08T16:10:07.147000
|
||||
CVE-2024-6066,0,1,5bf5957210d37b62ac802e0ce97b7afa3dcb298f48bcd651cbf6bebf0741a628,2024-08-08T16:05:04.247000
|
||||
CVE-2024-6067,0,1,a73dc457c770b2e45a6dd293341485e3a7db7c0fb5a46fb8e73299fe897d8932,2024-08-08T16:24:21.720000
|
||||
CVE-2024-6069,0,0,262b48eb8c330c3b1dd3ca5015bcbc32f226a318c6d31e421e5580f86d9ea37b,2024-07-09T18:19:14.047000
|
||||
CVE-2024-6070,0,0,1949da6de042279176b79576f8e73bfd6878b90ce3cb716b8378384d024fe5eb,2024-08-01T14:00:09.647000
|
||||
CVE-2024-6071,0,0,bca2018b96efb2814691d14babc0569e66d271cf9656a7d77f33746825377522,2024-06-28T10:27:00.920000
|
||||
@ -258458,7 +258465,7 @@ CVE-2024-6076,0,0,f75c5e0cd2d3ad9cf3dc79d2ee6835febd9e3e1415fea3908528543dbed7f7
|
||||
CVE-2024-6080,0,0,2ad08bb329dff2f5ca525640c8314d702413aec2eadc0af776454094a000e617,2024-08-06T07:15:46.460000
|
||||
CVE-2024-6082,0,0,276cd87669a06de72f4fd7da1f295faff84e8d70a51e1d99184ac4c2e8bf8b0f,2024-06-20T19:15:50.437000
|
||||
CVE-2024-6083,0,0,a8e42b758c673e09d4e24ea193e5640feaaf3b5eee44f78d141a0b2276184907,2024-06-20T12:44:01.637000
|
||||
CVE-2024-6084,0,0,06b281398f86ed81b091427e75b7100073dd1dfd003da38e7de1b912df60ef63,2024-06-20T12:44:01.637000
|
||||
CVE-2024-6084,0,1,6faa90c930997c0aec12adfd29df5cf00c8158d82ed8686290b073db2ac7ae60,2024-08-08T16:20:42.537000
|
||||
CVE-2024-6085,0,0,e5356847d2f9e7fb365a9afe07e5899cc989c4ce949a989ba1a4d6bdfc914a39,2024-06-27T19:25:12.067000
|
||||
CVE-2024-6086,0,0,47215fd632ba621ffeef67af3acb9b5d4df100629d5a1e80c438d45f990f6540,2024-06-27T19:25:12.067000
|
||||
CVE-2024-6088,0,0,ed650bb4582239ce54305f8b10efe45d50e8cb6f1aa2aa30a6eb4b92f9ce96ee,2024-07-02T18:08:38.550000
|
||||
@ -258475,7 +258482,7 @@ CVE-2024-6103,0,0,5e29bc37d9d7a304c867024ebdb6c9635d505e152b36dfc1b31a9280adb1e2
|
||||
CVE-2024-6104,0,0,108534f982ecedc8e18a75e604642b0e40fef80fdd2c5d6c473bb0683c303507,2024-06-26T17:19:40.850000
|
||||
CVE-2024-6108,0,0,8dcf8c978ffd08a68470779b67afcba2ef4b72c9a7a6acbd6d0451b159e2f4f9,2024-06-25T18:15:11.730000
|
||||
CVE-2024-6109,0,0,bb0e3455a169d6bebc9d8b88e9df5fdfc40e2e3982d9fbc581f71bdf8363e7cb,2024-06-20T12:44:01.637000
|
||||
CVE-2024-6110,0,0,50ef215f8e6157854634fcfeb971b8c496415614205b190cacac31c6923eeaf4,2024-06-20T12:44:01.637000
|
||||
CVE-2024-6110,0,1,b63b3d86bda62f504e857148e856fae2084982d1fba5e9f950f2c7804e723853,2024-08-08T16:12:55.633000
|
||||
CVE-2024-6111,0,0,98763a9958bd86a666bf14e0feaaf6fc585400a69f10e2d292b840aca2e315e8,2024-06-20T12:44:01.637000
|
||||
CVE-2024-6112,0,0,b1e6c0864e0ebee4a0a8c4638d7eeba1ec17f68eaa1c8ef1caada2a1fabb05a0,2024-06-20T12:44:01.637000
|
||||
CVE-2024-6113,0,0,5b70a902f6bae2f98582af8aea358fa74ce77c6f620f786f6fe02fb8c741aebc,2024-06-20T12:43:25.663000
|
||||
@ -258552,7 +258559,7 @@ CVE-2024-6201,0,0,d38367168d5aef370997b6f5887839730436f73d95cab416b78e0d1a684123
|
||||
CVE-2024-6202,0,0,872874bb823d5057711a230ba61fa2dff5a30353a0a7e4d78a374d9e572ebcf9,2024-08-06T16:30:24.547000
|
||||
CVE-2024-6203,0,0,cc0fa811d8a866e1744c3dbcff814070dea6464d7cea80a2e3dc6064e330aefd,2024-08-06T16:30:24.547000
|
||||
CVE-2024-6205,0,0,f32ee6375b433f4c8b075d7f2127800e855cae97c6ef2c703b09eff01b808353,2024-08-01T14:00:15.120000
|
||||
CVE-2024-6206,0,1,6f603126f815a80c6debdb2c8fc884bf16912b4470febb5eed843e2704856d15,2024-08-08T14:35:13.290000
|
||||
CVE-2024-6206,0,0,6f603126f815a80c6debdb2c8fc884bf16912b4470febb5eed843e2704856d15,2024-08-08T14:35:13.290000
|
||||
CVE-2024-6208,0,0,b702d385d6dc69624ae253d69a727703b76fa8f218fc0fa3e0a52d494810eb10,2024-08-01T12:42:36.933000
|
||||
CVE-2024-6209,0,0,dde817e69ddab612402867a39af366fc36713e43c4758f0a34432256fd885f93,2024-07-08T15:35:25.837000
|
||||
CVE-2024-6210,0,0,d08d160d43811c5bb8dcf64fef0c280a0a7b1e98d094babc485e09ce9fa86125,2024-07-11T13:05:54.930000
|
||||
@ -258745,7 +258752,7 @@ CVE-2024-6470,0,0,c9a33c23ec7370c50b4df58ad71ec5e181cf8d29947a984c43804e0a58dc77
|
||||
CVE-2024-6471,0,0,f732e100289c893532526b33b46541a39ba52ce518f7e90d2f97ec4bb67cf877,2024-07-05T12:55:51.367000
|
||||
CVE-2024-6472,0,0,06cfc3c26e9764572c1adb3e446cad13cb9599b02c4c47946f6698a134e25867,2024-08-06T16:31:05.780000
|
||||
CVE-2024-6477,0,0,af465e59718721c7b727c1ec6a265ade947c829c05464c1090814aa1a74a6b13,2024-08-05T12:41:45.957000
|
||||
CVE-2024-6481,0,1,8a6ed16cb15e9b1be7b8ecc3c869a269748ddec5ecbc3504e8d7f068ea116af3,2024-08-08T14:35:14.190000
|
||||
CVE-2024-6481,0,0,8a6ed16cb15e9b1be7b8ecc3c869a269748ddec5ecbc3504e8d7f068ea116af3,2024-08-08T14:35:14.190000
|
||||
CVE-2024-6484,0,0,bc633abd6bfb9da06585afdfb273066dfbc508847026385eb612d46f7c70ed29,2024-07-11T18:09:58.777000
|
||||
CVE-2024-6485,0,0,b143d2f5de1cad2c57f83d18fe64abfe0ba2da69210341aec4863f07cdd850cb,2024-07-11T18:09:58.777000
|
||||
CVE-2024-6487,0,0,ade8feb977b02299075dd869ca65fb48f198290ee8a478009ada36ae91b54213,2024-08-01T14:00:24
|
||||
@ -258855,7 +258862,7 @@ CVE-2024-6647,0,0,09a83ea8e48b51cdfaabb2b40d44883a6e2661cca1813e6ce1c2298d3fc73e
|
||||
CVE-2024-6649,0,0,5cdb5b2e28b9bfeb7fd4f19389db074d98b3a7e19ad14500f164241f41fa57a0,2024-07-11T13:05:54.930000
|
||||
CVE-2024-6650,0,0,389479cac037eb791bf22f3727c10e60384d8e28492bfb0d0b7873c538245d43,2024-07-11T13:05:54.930000
|
||||
CVE-2024-6651,0,0,ea873d27b7e6cf0926f77a6ff240509b7d4aeaa1088e1cf3aab190452e4555ee,2024-08-06T16:30:24.547000
|
||||
CVE-2024-6652,0,0,0923244b6b76f442c47a88150f368b6b9dcb9b0e76b0d2676e50d3c093d67a8a,2024-07-11T13:05:54.930000
|
||||
CVE-2024-6652,0,1,8978a0baa082505b94e778186034022d155714d2d8ee4e86dbb9cc40d29251d6,2024-08-08T16:43:37.053000
|
||||
CVE-2024-6653,0,0,d93d31cbf15b722e8213bd0a1f350049b73a325a73fea026c81bdae5013a3c4f,2024-07-11T13:15:10.147000
|
||||
CVE-2024-6655,0,0,485f585861c9543e180875e8c8a03aa176dd69bb5a21887c98c071d6ec8a6317,2024-07-16T18:00:02.110000
|
||||
CVE-2024-6660,0,0,caad23d7b98522c6f22294c27dcab3f8925f974b7a7faae66643c3e06a0d6672,2024-07-19T15:48:14.040000
|
||||
@ -258879,8 +258886,8 @@ CVE-2024-6699,0,0,9d9db768b9c88d760728ad43f917f22b5e5ff8a9965264fbc4d242d1015fef
|
||||
CVE-2024-6703,0,0,58688b231f5fc6deacad90c54b9ce0876a71daf3ee0061b5562a2bcbb8052bf3,2024-07-29T14:12:08.783000
|
||||
CVE-2024-6704,0,0,32c1d6f59091f2a85229ee95d1e57c685e7e8aed9f15efe17b9f77a5487e60e3,2024-08-02T12:59:43.990000
|
||||
CVE-2024-6705,0,0,1e166467558902cf3ff2211f8b1aa347feb308f999c65053186e5a13806e8368,2024-07-18T12:28:43.707000
|
||||
CVE-2024-6706,0,1,d1d145b947ad97f8eaf2f091ef3b977ed89dbed4347b44402611d132f13059bb,2024-08-08T14:35:14.497000
|
||||
CVE-2024-6707,0,1,c792dc80f91b7e4b45ea7a1b1487bfed6fdc5bec0250d28885774ca401b7c4d5,2024-08-08T14:35:14.743000
|
||||
CVE-2024-6706,0,0,d1d145b947ad97f8eaf2f091ef3b977ed89dbed4347b44402611d132f13059bb,2024-08-08T14:35:14.497000
|
||||
CVE-2024-6707,0,0,c792dc80f91b7e4b45ea7a1b1487bfed6fdc5bec0250d28885774ca401b7c4d5,2024-08-08T14:35:14.743000
|
||||
CVE-2024-6709,0,0,6fe2e770615cb1cdf14ac6a1be894b0afc1b11da8138a88bedb96b5baf70b602,2024-08-05T12:41:45.957000
|
||||
CVE-2024-6710,0,0,4e918da09846cceb474e5a8b11ef31c34f74c44e6fb5c62544fbedf363b9f5e1,2024-08-07T21:35:11.673000
|
||||
CVE-2024-6714,0,0,11b717ebe6f787348133e2783f9d140b140bb610f91df0dde9f6c41f4dbdce83,2024-07-24T12:55:13.223000
|
||||
@ -258961,10 +258968,10 @@ CVE-2024-6881,0,0,c7a593beeaed093fd14dcd15598a09b93989985caddc31a572979478e4fff1
|
||||
CVE-2024-6884,0,0,1ab82a5f63c30a2091b7b058cafc8d62a5f67aa78df5b8c418a856100b70a5fa,2024-08-08T13:04:18.753000
|
||||
CVE-2024-6885,0,0,820342a8aad3354940c223afe57157bbf13eee743fbe19265a63d35dde973086,2024-07-24T12:55:13.223000
|
||||
CVE-2024-6886,0,0,fbca102ce434786c03a8469f687e67e8b7739ad3b6f0519e88d819189fb30d7c,2024-08-06T16:30:24.547000
|
||||
CVE-2024-6890,0,1,b493f7bd70bdeb873cbdf2524979e878cc1ca0743f8358dd3fc37c7addf41719,2024-08-08T14:35:15.090000
|
||||
CVE-2024-6891,0,1,4430753a26635e6503a6d16441a998be7c3931a4c0419d868885b0693fc5d654,2024-08-08T14:35:15.340000
|
||||
CVE-2024-6890,0,0,b493f7bd70bdeb873cbdf2524979e878cc1ca0743f8358dd3fc37c7addf41719,2024-08-08T14:35:15.090000
|
||||
CVE-2024-6891,0,0,4430753a26635e6503a6d16441a998be7c3931a4c0419d868885b0693fc5d654,2024-08-08T14:35:15.340000
|
||||
CVE-2024-6892,0,0,bc0d9068ca32a5801c1d63fe6f4795dc5c08dc9fc9ea0bef7783b53d20a45087,2024-08-08T13:04:18.753000
|
||||
CVE-2024-6893,0,1,285cb73a7cc1c1a41688e25537ed90b263914746d47ad30eeac40ecdfa9e70f5,2024-08-08T14:35:15.587000
|
||||
CVE-2024-6893,0,0,285cb73a7cc1c1a41688e25537ed90b263914746d47ad30eeac40ecdfa9e70f5,2024-08-08T14:35:15.587000
|
||||
CVE-2024-6895,0,0,ba732cd0d0196677d9fba02b4344054d4844d09e5d174114e4dcf4446ecf9262,2024-07-22T13:00:53.287000
|
||||
CVE-2024-6896,0,0,801c74edfd9bf4c5786030707fac190d86b113e6627f16ad4c2e5810705558a7,2024-07-24T12:55:13.223000
|
||||
CVE-2024-6897,0,0,0bc0c3c85d38c464186c16b9bc40451a421eb7b428d66cf1c3a2509fdf188e66,2024-07-29T14:12:08.783000
|
||||
@ -259086,6 +259093,8 @@ CVE-2024-7117,0,0,1e4afcc6cca6c4e7beb85fac1a7fed4a23e63b6654ed7d583e0579875d0c65
|
||||
CVE-2024-7118,0,0,6ddf36fc8a10a330c27e6abbf544962e1f8806ebf38d58bb308a1fa31785fd26,2024-07-26T12:38:41.683000
|
||||
CVE-2024-7119,0,0,0d4c04861267ba0260c186040cffb33b88f1cb2cf783b33962c97c266a3b660d,2024-07-26T12:38:41.683000
|
||||
CVE-2024-7120,0,0,61740476c5bf721de3ec3243fb937e4e04eb802316b459df4612d60639785741,2024-07-26T12:38:41.683000
|
||||
CVE-2024-7121,1,1,fdae6687b65374b6aec5500198958517002acfa86b757e82c1fe85c4c568e879,2024-08-08T17:15:19.820000
|
||||
CVE-2024-7123,1,1,9cd56c5d21be01850838f11a2df252558cd6c9b176bc2485ad2b1b549f072ade,2024-08-08T17:15:19.970000
|
||||
CVE-2024-7127,0,0,2d5095b19bb58c78333178ffe1af1d8a0764d078ec0f076ba87011d70eec91c9,2024-07-30T13:32:45.943000
|
||||
CVE-2024-7128,0,0,22b40e3236f05da8de2b73f629340b5796a3b45429dedc50864bf862ccb583f9,2024-07-29T14:12:08.783000
|
||||
CVE-2024-7135,0,0,31437d1db396166831d3abd18bbeb77eef50ad11110b9df0f25d86e90a9b1fe1,2024-07-31T12:57:02.300000
|
||||
@ -259173,7 +259182,7 @@ CVE-2024-7255,0,0,fd2a8f993022fe32cb5a87546341ab7eeda32776ebc3f07d5c930f36c0483b
|
||||
CVE-2024-7256,0,0,28c6c5405ca0661376f4706f7e75647b14826bc648847c0c2ef29d4ee5bafea0,2024-08-03T18:35:04.003000
|
||||
CVE-2024-7257,0,0,e6ef266df52e25692b132cfb6522d79defb5eb3e548daae54be1d69b0c3ab16e,2024-08-05T12:41:45.957000
|
||||
CVE-2024-7264,0,0,4c56e36858354627d468029972bf040b2893210da9a48750dcecdce8ded0e49b,2024-07-31T12:57:02.300000
|
||||
CVE-2024-7265,0,1,4852b8603d632d3bcc462f4769d3804068de49a6ee8bed893f3f302a5915432f,2024-08-08T15:15:18.970000
|
||||
CVE-2024-7265,0,0,4852b8603d632d3bcc462f4769d3804068de49a6ee8bed893f3f302a5915432f,2024-08-08T15:15:18.970000
|
||||
CVE-2024-7266,0,0,13217b610e89f9ee7a69aac89fa6f3b4c4d01ffc1f01ed5bb07f55671f0fe0b4,2024-08-07T15:17:46.717000
|
||||
CVE-2024-7267,0,0,6e1f5892f7c4e286f75fc26af918a704fab9776a05a707e81dd3145cf4750869,2024-08-07T15:17:46.717000
|
||||
CVE-2024-7273,0,0,08b55eeeed04c0bbb7f14e00803b2981c3933c2f80c54832a95f5208a289acec,2024-07-31T12:57:02.300000
|
||||
@ -259260,6 +259269,7 @@ CVE-2024-7377,0,0,893275c8bb4a238cbfa8084a52310ea354a964d2355f34b461a91167cae84e
|
||||
CVE-2024-7378,0,0,e031589c928455427b120173a422978fb12eba7655a2c6ad16165b36bee1f758,2024-08-02T12:59:43.990000
|
||||
CVE-2024-7383,0,0,e9e41ebbc97601346bb675225ba79de921d0c65e55a076ffc6c52d62374e6a9a,2024-08-06T16:31:05.780000
|
||||
CVE-2024-7389,0,0,a5776290ae762be985431158def3f2d002b265ca6a95ce830d8f46206854f21a,2024-08-02T12:59:43.990000
|
||||
CVE-2024-7394,1,1,aa547388be77617afc1aa944157a4aef3ae297017c9a6a716edae6da822967e6,2024-08-08T17:15:20.023000
|
||||
CVE-2024-7395,0,0,6b93b6db07480e26c0ae715f45aa50cef676fc9c19ea641f155805eb4429ff3f,2024-08-06T16:31:05.780000
|
||||
CVE-2024-7396,0,0,4ebde91c8a3429e260812e0a142900e161f2137833db297002231fa5cfafb30a,2024-08-06T16:31:05.780000
|
||||
CVE-2024-7397,0,0,6d2f711820d3e2f3c7573fc7d4d971b3f755ab6406b8b6440f8e39ce24e2f3e7,2024-08-06T16:31:05.780000
|
||||
@ -259295,10 +259305,12 @@ CVE-2024-7467,0,0,1635aa1540733ea32e6f2c1b73b541d5af5dfcd94c3797172bd89de0083b56
|
||||
CVE-2024-7468,0,0,beaf0f0ce0713b119a6aad075faba99ddbbf9b51410059760701d7a29a28a4df,2024-08-06T17:35:40.080000
|
||||
CVE-2024-7469,0,0,9480167bec5dcea6298d57f7311e33d09ca16fde559c0d2101bf57fd073ab050,2024-08-06T17:36:19.150000
|
||||
CVE-2024-7470,0,0,c378df60a1369914caa48d0c9b95c12c12b8030c63ff1d7f88f18ec0798c6329,2024-08-06T17:37:07.923000
|
||||
CVE-2024-7477,1,1,9658812f50f693193f3789c680003d82b8e649f1acdf9e61a5fec82a5b61d372,2024-08-08T16:15:09.363000
|
||||
CVE-2024-7480,1,1,c0703a6875a48d6b92b73b5bc819e0fe258554602ee77b1d655c728deab1735b,2024-08-08T16:15:09.567000
|
||||
CVE-2024-7484,0,0,922e65f90a754867bdae2807b60c4750519990bf6adcc62fb148334df21e54c7,2024-08-06T16:30:24.547000
|
||||
CVE-2024-7485,0,0,0b34fc91c3d825ea4087a792a0e5c6d839cf66a581a05d0c60df64b0af48f97e,2024-08-06T16:30:24.547000
|
||||
CVE-2024-7486,0,0,e2579b82a31704160b51da6f8b3285ef5bff1d765f5e0369c7378c4f856658fb,2024-08-08T13:04:18.753000
|
||||
CVE-2024-7490,1,1,1b6f0cb56995b872a494e0feae1eccecf86d62b08ad77087a0b36dade00843ff,2024-08-08T15:15:19.057000
|
||||
CVE-2024-7490,0,1,5e9c56a2b83cf7efea01311fcfb0bebbdeb54c4fc1c14fe0c7fe52afb8561c53,2024-08-08T17:15:20.163000
|
||||
CVE-2024-7492,0,0,6476a74ce2975ad097c7a45c1f2f905cc77480bec2260de48447ae3a8b41df62,2024-08-08T13:04:18.753000
|
||||
CVE-2024-7494,0,0,03118698edd12e94cf1110a03a023e325330cda1b40488ab50e531b2e6ace73f,2024-08-06T16:30:24.547000
|
||||
CVE-2024-7495,0,0,1d4e0bc3bd3cd1f2a04f242134024d84adf5fd40eab5c711a130f9e16780f0f1,2024-08-06T16:30:24.547000
|
||||
@ -259314,7 +259326,7 @@ CVE-2024-7518,0,0,c1e659d59fab5a21f46030485c8364ef9c7b859fae166f3d9aaf16371f61ae
|
||||
CVE-2024-7519,0,0,24768d8764f4f28adc1fbfcbb529254838657a3f1d1db417909b6d021fab1d2f,2024-08-07T21:35:12.903000
|
||||
CVE-2024-7520,0,0,9d3ddc13e8867f7cb7b24f4793529c9a0d25e1f46dbf94c7eeb8a1b835d8a2d8,2024-08-06T23:15:59.803000
|
||||
CVE-2024-7521,0,0,aa36585855cd5bcdfb01758853aa628523870b5b6ffb7787fa3857543ac3a56f,2024-08-06T23:15:59.877000
|
||||
CVE-2024-7522,0,0,200c4a9f71deddb043126c358d302b0c8073deb45dd7d157681cf39a0d3beff5,2024-08-06T23:15:59.960000
|
||||
CVE-2024-7522,0,1,84fe71da8cf075dcd103677abb54562bdd9f546fb1c9071f317f44135906c9bd,2024-08-08T16:35:14.220000
|
||||
CVE-2024-7523,0,0,3f3f003d656a1184662cec79c06d3948dd3038503ae3513bf0fe3c1956b37613,2024-08-06T16:30:24.547000
|
||||
CVE-2024-7524,0,0,07a71bf262380d8c7908b6af8aedab2300b78cb30b40198df3e8d289589265d2,2024-08-06T16:30:24.547000
|
||||
CVE-2024-7525,0,0,5fd9dfbbd9f6275593c22928d26dda0f3c930c37af4b3bb59cc2fdc6afd8c61a,2024-08-06T23:16:00.030000
|
||||
|
Can't render this file because it is too large.
|
Loading…
x
Reference in New Issue
Block a user