mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-06-19 17:31:42 +00:00
Auto-Update: 2024-07-25T14:00:17.952126+00:00
This commit is contained in:
parent
a2dcdc34a4
commit
edc134863b
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2012-3152",
|
||||
"sourceIdentifier": "secalert_us@oracle.com",
|
||||
"published": "2012-10-16T23:55:03.823",
|
||||
"lastModified": "2017-08-29T01:31:49.993",
|
||||
"vulnStatus": "Modified",
|
||||
"lastModified": "2024-07-25T13:48:04.847",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"cisaExploitAdd": "2021-11-03",
|
||||
"cisaActionDue": "2022-05-03",
|
||||
@ -20,6 +20,28 @@
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 9.1,
|
||||
"baseSeverity": "CRITICAL"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.2
|
||||
}
|
||||
],
|
||||
"cvssMetricV2": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
@ -88,23 +110,41 @@
|
||||
"references": [
|
||||
{
|
||||
"url": "http://blog.netinfiltration.com/2013/11/03/oracle-reports-cve-2012-3152-and-cve-2012-3153/",
|
||||
"source": "secalert_us@oracle.com"
|
||||
"source": "secalert_us@oracle.com",
|
||||
"tags": [
|
||||
"Broken Link"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://blog.netinfiltration.com/2014/01/19/upcoming-exploit-release-oracle-forms-and-reports-11g/",
|
||||
"source": "secalert_us@oracle.com"
|
||||
"source": "secalert_us@oracle.com",
|
||||
"tags": [
|
||||
"Broken Link"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://seclists.org/fulldisclosure/2014/Jan/186",
|
||||
"source": "secalert_us@oracle.com"
|
||||
"source": "secalert_us@oracle.com",
|
||||
"tags": [
|
||||
"Mailing List",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://www.exploit-db.com/exploits/31253",
|
||||
"source": "secalert_us@oracle.com"
|
||||
"source": "secalert_us@oracle.com",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2013:150",
|
||||
"source": "secalert_us@oracle.com"
|
||||
"source": "secalert_us@oracle.com",
|
||||
"tags": [
|
||||
"Broken Link"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://www.oracle.com/technetwork/topics/security/cpuoct2012-1515893.html",
|
||||
@ -116,23 +156,41 @@
|
||||
},
|
||||
{
|
||||
"url": "http://www.osvdb.org/86394",
|
||||
"source": "secalert_us@oracle.com"
|
||||
"source": "secalert_us@oracle.com",
|
||||
"tags": [
|
||||
"Broken Link"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://www.osvdb.org/86395",
|
||||
"source": "secalert_us@oracle.com"
|
||||
"source": "secalert_us@oracle.com",
|
||||
"tags": [
|
||||
"Broken Link"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://www.securityfocus.com/bid/55955",
|
||||
"source": "secalert_us@oracle.com"
|
||||
"source": "secalert_us@oracle.com",
|
||||
"tags": [
|
||||
"Broken Link",
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://www.youtube.com/watch?v=NinvMDOj7sM",
|
||||
"source": "secalert_us@oracle.com"
|
||||
"source": "secalert_us@oracle.com",
|
||||
"tags": [
|
||||
"Exploit"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/79295",
|
||||
"source": "secalert_us@oracle.com"
|
||||
"source": "secalert_us@oracle.com",
|
||||
"tags": [
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2016-7255",
|
||||
"sourceIdentifier": "secure@microsoft.com",
|
||||
"published": "2016-11-10T07:00:09.460",
|
||||
"lastModified": "2018-10-12T22:14:26.237",
|
||||
"vulnStatus": "Modified",
|
||||
"lastModified": "2024-07-25T13:56:42.057",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"cisaExploitAdd": "2021-11-03",
|
||||
"cisaActionDue": "2022-05-03",
|
||||
@ -20,17 +20,17 @@
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV30": [
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.0",
|
||||
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
@ -75,7 +75,7 @@
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-264"
|
||||
"value": "NVD-CWE-noinfo"
|
||||
}
|
||||
]
|
||||
}
|
||||
@ -89,38 +89,38 @@
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "21540673-614A-4D40-8BD7-3F07723803B0"
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_10_1507:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "542DAEEC-73CC-46C6-A630-BF474A3446AC"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_10:1511:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "232581CC-130A-4C62-A7E9-2EC9A9364D53"
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_10_1511:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "7A8E9D99-BD78-4340-88F2-5AFF27AC37C9"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_10:1607:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "E01A4CCA-4C43-46E0-90E6-3E4DBFBACD64"
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_10_1607:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "61019899-D7AF-46E4-A72C-D189180F66AB"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_7:*:sp1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "7519928D-0FF2-4584-8058-4C7764CD5671"
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_7:-:sp1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "C2B1C231-DE19-4B8F-A4AA-5B3A65276E46"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_8.1:*:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "A7F51B5F-AA19-4D31-89FA-6DFAC4BA8F0F"
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_8.1:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "E93068DB-549B-45AB-8E5C-00EB5D8B5CF8"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_rt_8.1:*:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "197E82CB-81AF-40F1-A55C-7B596891A783"
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_rt_8.1:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "C6CE5198-C498-4672-AF4C-77AB4BE06C5C"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_server_2008:*:sp2:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "0C28897B-044A-447B-AD76-6397F8190177"
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "5F422A8C-2C4E-42C8-B420-E0728037E15C"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
@ -139,13 +139,13 @@
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "AF6437F9-6631-49D3-A6C2-62329E278E31"
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "041FF8BA-0B12-4A1F-B4BF-9C4F33B7C1E7"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_vista:*:sp2:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "0A0D2704-C058-420B-B368-372D1129E914"
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_vista:-:sp2:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "BF1AD1A1-EE20-4BCE-9EE6-84B27139811C"
|
||||
}
|
||||
]
|
||||
}
|
||||
@ -155,35 +155,59 @@
|
||||
"references": [
|
||||
{
|
||||
"url": "http://blog.trendmicro.com/trendlabs-security-intelligence/one-bit-rule-system-analyzing-cve-2016-7255-exploit-wild/",
|
||||
"source": "secure@microsoft.com"
|
||||
"source": "secure@microsoft.com",
|
||||
"tags": [
|
||||
"Broken Link"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://packetstormsecurity.com/files/140468/Microsoft-Windows-Kernel-win32k.sys-NtSetWindowLongPtr-Privilege-Escalation.html",
|
||||
"source": "secure@microsoft.com"
|
||||
"source": "secure@microsoft.com",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://www.securityfocus.com/bid/94064",
|
||||
"source": "secure@microsoft.com",
|
||||
"tags": [
|
||||
"Broken Link",
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://www.securitytracker.com/id/1037251",
|
||||
"source": "secure@microsoft.com"
|
||||
"source": "secure@microsoft.com",
|
||||
"tags": [
|
||||
"Broken Link",
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2016/ms16-135",
|
||||
"source": "secure@microsoft.com"
|
||||
"source": "secure@microsoft.com",
|
||||
"tags": [
|
||||
"Patch",
|
||||
"Vendor Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/mwrlabs/CVE-2016-7255",
|
||||
"source": "secure@microsoft.com"
|
||||
"source": "secure@microsoft.com",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://securingtomorrow.mcafee.com/mcafee-labs/digging-windows-kernel-privilege-escalation-vulnerability-cve-2016-7255/",
|
||||
"source": "secure@microsoft.com"
|
||||
"source": "secure@microsoft.com",
|
||||
"tags": [
|
||||
"Broken Link"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://security.googleblog.com/2016/10/disclosing-vulnerabilities-to-protect.html",
|
||||
@ -194,7 +218,12 @@
|
||||
},
|
||||
{
|
||||
"url": "https://www.exploit-db.com/exploits/40745/",
|
||||
"source": "secure@microsoft.com"
|
||||
"source": "secure@microsoft.com",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://www.exploit-db.com/exploits/40823/",
|
||||
@ -207,7 +236,12 @@
|
||||
},
|
||||
{
|
||||
"url": "https://www.exploit-db.com/exploits/41015/",
|
||||
"source": "secure@microsoft.com"
|
||||
"source": "secure@microsoft.com",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2017-11774",
|
||||
"sourceIdentifier": "secure@microsoft.com",
|
||||
"published": "2017-10-13T13:29:00.427",
|
||||
"lastModified": "2021-08-30T14:28:30.737",
|
||||
"vulnStatus": "Modified",
|
||||
"lastModified": "2024-07-25T13:42:48.707",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"cisaExploitAdd": "2021-11-03",
|
||||
"cisaActionDue": "2022-05-03",
|
||||
@ -20,13 +20,13 @@
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV30": [
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.0",
|
||||
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
@ -87,11 +87,6 @@
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:microsoft:outlook:*:sp1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "B9DC0862-CAD4-45B8-9C29-C1E060B4FFBB"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:microsoft:outlook:2010:sp2:*:*:*:*:*:*",
|
||||
@ -99,8 +94,13 @@
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:microsoft:outlook:2013:sp1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "D7B6DF1E-0DDA-4809-B216-7CEFE0A53E2B"
|
||||
"criteria": "cpe:2.3:a:microsoft:outlook:2013:sp1:*:*:-:*:*:*",
|
||||
"matchCriteriaId": "8D513A61-6427-4F85-AADF-99D6F223AF2B"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:microsoft:outlook:2013:sp1:*:*:rt:*:*:*",
|
||||
"matchCriteriaId": "DDA98A76-D0D1-4BFA-BEAC-1C2313F7B859"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
@ -117,6 +117,7 @@
|
||||
"url": "http://www.securityfocus.com/bid/101098",
|
||||
"source": "secure@microsoft.com",
|
||||
"tags": [
|
||||
"Broken Link",
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
@ -125,6 +126,7 @@
|
||||
"url": "http://www.securitytracker.com/id/1039542",
|
||||
"source": "secure@microsoft.com",
|
||||
"tags": [
|
||||
"Broken Link",
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
@ -139,7 +141,10 @@
|
||||
},
|
||||
{
|
||||
"url": "https://sensepost.com/blog/2017/outlook-home-page-another-ruler-vector/",
|
||||
"source": "secure@microsoft.com"
|
||||
"source": "secure@microsoft.com",
|
||||
"tags": [
|
||||
"Exploit"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2017-5638",
|
||||
"sourceIdentifier": "security@apache.org",
|
||||
"published": "2017-03-11T02:59:00.150",
|
||||
"lastModified": "2023-11-07T02:49:27.957",
|
||||
"vulnStatus": "Modified",
|
||||
"lastModified": "2024-07-25T13:58:42.913",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"cisaExploitAdd": "2021-11-03",
|
||||
"cisaActionDue": "2022-05-03",
|
||||
@ -20,26 +20,26 @@
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV30": [
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.0",
|
||||
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H",
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "CHANGED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 10.0,
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 6.0
|
||||
"impactScore": 5.9
|
||||
}
|
||||
],
|
||||
"cvssMetricV2": [
|
||||
@ -75,7 +75,7 @@
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-20"
|
||||
"value": "CWE-755"
|
||||
}
|
||||
]
|
||||
}
|
||||
@ -89,213 +89,145 @@
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:apache:struts:2.3.5:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "84408BC6-E785-4874-9409-AC02AF0A7897"
|
||||
"criteria": "cpe:2.3:a:apache:struts:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "2.2.3",
|
||||
"versionEndExcluding": "2.3.32",
|
||||
"matchCriteriaId": "40D3EE72-E37F-4F4C-996D-50E144CF43DD"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:apache:struts:2.3.6:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "79E08D3E-9F86-4E9D-B1BF-EBEA8AB3BEE3"
|
||||
"criteria": "cpe:2.3:a:apache:struts:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "2.5.0",
|
||||
"versionEndExcluding": "2.5.10.1",
|
||||
"matchCriteriaId": "E2F63D06-B26A-4DB6-8B07-B847554ABCA8"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:ibm:storwize_v3500_firmware:7.7.1.6:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "5AB119E1-7736-4C99-AD9C-9E8820769D4F"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:apache:struts:2.3.7:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "443B4E64-2A36-49C6-B09D-77B3BDF69709"
|
||||
"criteria": "cpe:2.3:o:ibm:storwize_v3500_firmware:7.8.1.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "A8A0C06E-B833-4A52-B1F0-FEC9BEF372A4"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:ibm:storwize_v3500:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "7352FACE-C8D0-49A7-A2D7-B755599F0FB3"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:ibm:storwize_v5000_firmware:7.7.1.6:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "F445D22E-8976-4ADC-81FD-49B351B2802A"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:apache:struts:2.3.8:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "2481505C-4FD1-4195-9E10-9DD741498FB2"
|
||||
"criteria": "cpe:2.3:o:ibm:storwize_v5000_firmware:7.8.1.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "1B9E6724-8796-4DD5-9CE2-8E602DA893F9"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:ibm:storwize_v5000:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "F0B69C8D-32A4-449F-9BFC-F1587C7FA8BD"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:ibm:storwize_v7000_firmware:7.7.1.6:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "D1D7A801-1861-4479-9367-60F792BF8016"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:apache:struts:2.3.9:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "910DCB81-63A8-4BBB-8897-A98A0F2AEEB4"
|
||||
"criteria": "cpe:2.3:o:ibm:storwize_v7000_firmware:7.8.1.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "EDF96E49-9530-4718-B5A9-7366D10CC890"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:ibm:storwize_v7000:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "AA2ED020-4C7B-4303-ABE6-74D46D127556"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:lenovo:storage_v5030_firmware:7.7.1.6:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "371CD28E-6187-4EB1-8B73-645F7A6BFFD6"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:apache:struts:2.3.10:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "F75F4616-4B4B-4CAB-968B-502179152D2B"
|
||||
},
|
||||
"criteria": "cpe:2.3:o:lenovo:storage_v5030_firmware:7.8.1.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "DA0AFFAA-F7AE-416C-A40D-24F972EE18BD"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:apache:struts:2.3.11:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "D3D12A0A-1DC5-47C7-9FF6-E8103C75FE76"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:apache:struts:2.3.12:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "28ED63DB-2AAF-4BC9-A844-074EDF63C89A"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:apache:struts:2.3.13:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "C86232DA-90C7-43F8-99CC-C1BFB4BA3F9A"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:apache:struts:2.3.14:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "38A6CEED-6C43-4325-B36C-9F254CCDFDC0"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:apache:struts:2.3.14.1:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "41F43088-26AA-4890-A9D6-1B9B48D5F02A"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:apache:struts:2.3.14.2:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "BE6820E3-8FDF-4BDF-8B62-E604A91F1280"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:apache:struts:2.3.14.3:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "D25ED06A-F12C-443E-9B3F-FDDF52FE9D93"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:apache:struts:2.3.15:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "44527919-8403-42A8-9CE1-3B4F58630F34"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:apache:struts:2.3.15.1:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "EBB91D8A-14B8-4263-B90D-F776535F9B8F"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:apache:struts:2.3.15.2:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "FB525941-7175-43C1-9F17-814F5F7C72CA"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:apache:struts:2.3.15.3:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "F10D559E-04A0-4002-947C-D3902138795B"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:apache:struts:2.3.16:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "89203DD8-2C95-4546-9504-83654FFA5DBC"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:apache:struts:2.3.16.1:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "EB3D5644-CFAC-4FB5-A1FB-387F97876098"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:apache:struts:2.3.16.2:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "1225A0B0-C3F2-4579-BFE9-F8DB2CF596F6"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:apache:struts:2.3.16.3:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "8DC883A7-0766-4857-ABC8-9DB4BA713650"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:apache:struts:2.3.17:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "D3553904-BF3C-4636-947A-8AA16D4F38A5"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:apache:struts:2.3.19:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "E93CE807-D7C2-4865-ACF8-E366A6478B46"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:apache:struts:2.3.20:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "22FF6282-0BCA-46EB-9648-6EE3EDA189F2"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:apache:struts:2.3.20.1:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "6D1467BC-9BC8-402D-A420-615CF9698648"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:apache:struts:2.3.20.2:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "12CE716B-867F-49CA-BDAF-194714D990C1"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:apache:struts:2.3.20.3:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "880AEA69-3705-447D-80FF-60753248158F"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:apache:struts:2.3.21:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "CB6057D5-0787-4026-A202-ACD07C862F8D"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:apache:struts:2.3.22:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "1B3AE8EA-4D25-4151-A210-ECDE802F8A2F"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:apache:struts:2.3.23:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "79C615AE-4709-47EB-85F8-BD944096428E"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:apache:struts:2.3.24:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "524C5119-416D-413B-BF1D-29291E23FDB2"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:apache:struts:2.3.24.1:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "45446B16-F531-4C6D-B889-A8A6622C70A2"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:apache:struts:2.3.24.2:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "39047809-4E6D-4670-B9BA-D8FD910E38EB"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:apache:struts:2.3.24.3:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "71823E13-1896-4EE4-A49C-CFFB717FFD80"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:apache:struts:2.3.25:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "291F3624-8AB5-46F2-9BB5-F592DF1C9F88"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:apache:struts:2.3.26:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "DD053675-DE5E-40A8-B404-4F36AAC82502"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:apache:struts:2.3.27:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "B0392E61-6D77-43C3-8009-96BC0F90B8D1"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:apache:struts:2.3.28:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "C778ADED-75B5-4AD3-8CDC-EFDFFAD5A742"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:apache:struts:2.3.28.1:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "067F6249-CC5A-4402-843C-06D5F9F77267"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:apache:struts:2.3.29:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "0AFA78DD-B60C-46AD-BCCB-4E15BB16BEDC"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:apache:struts:2.3.30:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "1DA1EABE-5292-44C2-8327-54201A42F204"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:apache:struts:2.3.31:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "F327A6EA-69AF-4EB2-8F17-8011678FAB6D"
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:lenovo:storage_v5030:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "A2A4179B-51C5-486B-8CFF-D49436D60910"
|
||||
}
|
||||
]
|
||||
}
|
||||
@ -309,58 +241,89 @@
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:apache:struts:2.5:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "63CE1226-E0E6-4DC6-AC89-3FFDE6BD7B77"
|
||||
"criteria": "cpe:2.3:a:hp:server_automation:9.1.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "112DFE68-A609-4B76-8227-4DE9CAC25F54"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:apache:struts:2.5.1:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "A4F914BA-CF16-4B03-A6A2-8C9816EC1248"
|
||||
"criteria": "cpe:2.3:a:hp:server_automation:10.0.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "951C042F-9C83-4DBB-8070-A926A1B46591"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:apache:struts:2.5.2:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "D2C82970-62C9-4513-A66D-6BDA4048C27F"
|
||||
"criteria": "cpe:2.3:a:hp:server_automation:10.1.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "AC9404A4-6B73-436E-A8FB-914530D6000A"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:apache:struts:2.5.3:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "E1A43CA5-46DE-4513-A309-BE3A60CD5489"
|
||||
"criteria": "cpe:2.3:a:hp:server_automation:10.2.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "32AFBE84-5394-49A1-844A-ED964A46ACF7"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:apache:struts:2.5.4:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "1D83D2FA-8931-45F8-82D6-DE270A2BA55C"
|
||||
"criteria": "cpe:2.3:a:hp:server_automation:10.5.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "38ABFD4F-8E97-4418-A921-BF9F4D95A4A4"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:oracle:weblogic_server:10.3.6.0.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "B40B13B7-68B3-4510-968C-6A730EB46462"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:apache:struts:2.5.5:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "0D284BF2-101C-490C-85CB-69D156D1FF77"
|
||||
"criteria": "cpe:2.3:a:oracle:weblogic_server:12.1.3.0.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "C93CC705-1F8C-4870-99E6-14BF264C3811"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:apache:struts:2.5.6:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "5BAD7A75-378F-4A0F-A10F-E4F7AF60F285"
|
||||
"criteria": "cpe:2.3:a:oracle:weblogic_server:12.2.1.1.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "29F4C533-DE42-463B-9D80-5D4C85BF1A5B"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:apache:struts:2.5.7:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "56E43496-097F-4560-BFB1-BDDA4659F197"
|
||||
},
|
||||
"criteria": "cpe:2.3:a:oracle:weblogic_server:12.2.1.2.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "3A1728D5-E03B-49A0-849C-B722197AF054"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:apache:struts:2.5.8:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "96C720D6-312B-477C-A993-BEE39A7ADB4E"
|
||||
},
|
||||
"criteria": "cpe:2.3:a:arubanetworks:clearpass_policy_manager:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "6.6.5",
|
||||
"matchCriteriaId": "8D1193B0-59C9-4AC0-BBA0-CED6FCC91883"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:apache:struts:2.5.9:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "03367A87-9011-45F4-B534-DEA26F8D4567"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:apache:struts:2.5.10:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "CF635DCE-D495-4166-9E25-1E48DDDF9AAC"
|
||||
"criteria": "cpe:2.3:a:netapp:oncommand_balance:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "7DCBCC5D-C396-47A8-ADF4-D3A2C4377FB1"
|
||||
}
|
||||
]
|
||||
}
|
||||
@ -372,7 +335,7 @@
|
||||
"url": "http://blog.talosintelligence.com/2017/03/apache-0-day-exploited.html",
|
||||
"source": "security@apache.org",
|
||||
"tags": [
|
||||
"Technical Description",
|
||||
"Exploit",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
@ -380,41 +343,56 @@
|
||||
"url": "http://blog.trendmicro.com/trendlabs-security-intelligence/cve-2017-5638-apache-struts-vulnerability-remote-code-execution/",
|
||||
"source": "security@apache.org",
|
||||
"tags": [
|
||||
"Technical Description",
|
||||
"Exploit",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2017-002.txt",
|
||||
"source": "security@apache.org"
|
||||
"source": "security@apache.org",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://www.eweek.com/security/apache-struts-vulnerability-under-attack.html",
|
||||
"source": "security@apache.org",
|
||||
"tags": [
|
||||
"Press/Media Coverage"
|
||||
"Press/Media Coverage",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html",
|
||||
"source": "security@apache.org"
|
||||
"source": "security@apache.org",
|
||||
"tags": [
|
||||
"Patch",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://www.securityfocus.com/bid/96729",
|
||||
"source": "security@apache.org",
|
||||
"tags": [
|
||||
"Broken Link",
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://www.securitytracker.com/id/1037973",
|
||||
"source": "security@apache.org"
|
||||
"source": "security@apache.org",
|
||||
"tags": [
|
||||
"Broken Link",
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://arstechnica.com/security/2017/03/critical-vulnerability-under-massive-attack-imperils-high-impact-sites/",
|
||||
"source": "security@apache.org",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Press/Media Coverage"
|
||||
]
|
||||
},
|
||||
@ -428,23 +406,34 @@
|
||||
},
|
||||
{
|
||||
"url": "https://cwiki.apache.org/confluence/display/WW/S2-046",
|
||||
"source": "security@apache.org"
|
||||
"source": "security@apache.org",
|
||||
"tags": [
|
||||
"Mitigation",
|
||||
"Vendor Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://exploit-db.com/exploits/41570",
|
||||
"source": "security@apache.org",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git1-us-west.apache.org/repos/asf?p=struts.git%3Ba=commit%3Bh=352306493971e7d5a756d61780d57a76eb1f519a",
|
||||
"source": "security@apache.org"
|
||||
"source": "security@apache.org",
|
||||
"tags": [
|
||||
"Broken Link"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git1-us-west.apache.org/repos/asf?p=struts.git%3Ba=commit%3Bh=6b8272ce47160036ed120a48345d9aa884477228",
|
||||
"source": "security@apache.org"
|
||||
"source": "security@apache.org",
|
||||
"tags": [
|
||||
"Broken Link"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/mazen160/struts-pwn",
|
||||
@ -457,45 +446,65 @@
|
||||
"url": "https://github.com/rapid7/metasploit-framework/issues/8064",
|
||||
"source": "security@apache.org",
|
||||
"tags": [
|
||||
"Exploit"
|
||||
"Exploit",
|
||||
"Issue Tracking"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbgn03733en_us",
|
||||
"source": "security@apache.org"
|
||||
"source": "security@apache.org",
|
||||
"tags": [
|
||||
"Broken Link"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbgn03749en_us",
|
||||
"source": "security@apache.org"
|
||||
"source": "security@apache.org",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03723en_us",
|
||||
"source": "security@apache.org"
|
||||
"source": "security@apache.org",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://isc.sans.edu/diary/22169",
|
||||
"source": "security@apache.org",
|
||||
"tags": [
|
||||
"Technical Description",
|
||||
"Exploit",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://lists.apache.org/thread.html/r1125f3044a0946d1e7e6f125a6170b58d413ebd4a95157e4608041c7%40%3Cannounce.apache.org%3E",
|
||||
"source": "security@apache.org"
|
||||
"source": "security@apache.org",
|
||||
"tags": [
|
||||
"Mailing List"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://lists.apache.org/thread.html/r6d03e45b81eab03580cf7f8bb51cb3e9a1b10a2cc0c6a2d3cc92ed0c%40%3Cannounce.apache.org%3E",
|
||||
"source": "security@apache.org"
|
||||
"source": "security@apache.org",
|
||||
"tags": [
|
||||
"Mailing List"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://lists.apache.org/thread.html/r90890afea72a9571d666820b2fe5942a0a5f86be406fa31da3dd0922%40%3Cannounce.apache.org%3E",
|
||||
"source": "security@apache.org"
|
||||
"source": "security@apache.org",
|
||||
"tags": [
|
||||
"Mailing List"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://nmap.org/nsedoc/scripts/http-vuln-cve2017-5638.html",
|
||||
"source": "security@apache.org",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
@ -504,47 +513,78 @@
|
||||
"source": "security@apache.org",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://security.netapp.com/advisory/ntap-20170310-0001/",
|
||||
"source": "security@apache.org"
|
||||
},
|
||||
{
|
||||
"url": "https://struts.apache.org/docs/s2-045.html",
|
||||
"source": "security@apache.org"
|
||||
},
|
||||
{
|
||||
"url": "https://struts.apache.org/docs/s2-046.html",
|
||||
"source": "security@apache.org"
|
||||
},
|
||||
{
|
||||
"url": "https://support.lenovo.com/us/en/product_security/len-14200",
|
||||
"source": "security@apache.org"
|
||||
},
|
||||
{
|
||||
"url": "https://twitter.com/theog150/status/841146956135124993",
|
||||
"source": "security@apache.org",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://struts.apache.org/docs/s2-045.html",
|
||||
"source": "security@apache.org",
|
||||
"tags": [
|
||||
"Mitigation",
|
||||
"Vendor Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://struts.apache.org/docs/s2-046.html",
|
||||
"source": "security@apache.org",
|
||||
"tags": [
|
||||
"Mitigation",
|
||||
"Vendor Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://support.lenovo.com/us/en/product_security/len-14200",
|
||||
"source": "security@apache.org",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://twitter.com/theog150/status/841146956135124993",
|
||||
"source": "security@apache.org",
|
||||
"tags": [
|
||||
"Broken Link",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://www.exploit-db.com/exploits/41614/",
|
||||
"source": "security@apache.org"
|
||||
"source": "security@apache.org",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://www.imperva.com/blog/2017/03/cve-2017-5638-new-remote-code-execution-rce-vulnerability-in-apache-struts-2/",
|
||||
"source": "security@apache.org"
|
||||
"source": "security@apache.org",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://www.kb.cert.org/vuls/id/834067",
|
||||
"source": "security@apache.org"
|
||||
"source": "security@apache.org",
|
||||
"tags": [
|
||||
"Third Party Advisory",
|
||||
"US Government Resource"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://www.symantec.com/security-center/network-protection-security-advisories/SA145",
|
||||
"source": "security@apache.org"
|
||||
"source": "security@apache.org",
|
||||
"tags": [
|
||||
"Broken Link"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2017-9805",
|
||||
"sourceIdentifier": "security@apache.org",
|
||||
"published": "2017-09-15T19:29:00.237",
|
||||
"lastModified": "2019-08-12T21:15:15.000",
|
||||
"vulnStatus": "Modified",
|
||||
"lastModified": "2024-07-25T13:40:54.857",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"cisaExploitAdd": "2021-11-03",
|
||||
"cisaActionDue": "2022-05-03",
|
||||
@ -20,13 +20,13 @@
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV30": [
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.0",
|
||||
"vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "HIGH",
|
||||
"privilegesRequired": "NONE",
|
||||
@ -89,293 +89,87 @@
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:apache:struts:2.1.2:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "4E720B3A-4CFB-47FE-B80C-67C59D4C7FD4"
|
||||
"criteria": "cpe:2.3:a:apache:struts:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "2.1.2",
|
||||
"versionEndExcluding": "2.3.34",
|
||||
"matchCriteriaId": "13744BE3-2443-4640-BDB4-722C4D393B65"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:apache:struts:2.1.3:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "CA687B56-A09B-4741-84F1-2BD9569A3F76"
|
||||
"criteria": "cpe:2.3:a:apache:struts:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "2.5.0",
|
||||
"versionEndExcluding": "2.5.13",
|
||||
"matchCriteriaId": "6B45E858-E783-4D6E-AFD3-97E9963EB05B"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:cisco:digital_media_manager:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "E0B1E953-33EF-498D-AB75-4A0A7733BC54"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:apache:struts:2.1.4:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "0BC0E358-8B4D-480B-BFAE-966CB697310A"
|
||||
"criteria": "cpe:2.3:a:cisco:hosted_collaboration_solution:10.5\\(1\\):*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "CF4C9089-0F27-4C66-8E12-2BCAC148B7C9"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:apache:struts:2.1.5:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "2B7E8E1C-C667-4AED-86A5-2BD0C62AAD76"
|
||||
"criteria": "cpe:2.3:a:cisco:hosted_collaboration_solution:11.0\\(1\\):*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "7FCC3E9D-4D39-4530-A5FC-7E9A4E395D60"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:apache:struts:2.1.6:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "88B3348C-1086-4A16-97E3-52DB65FF860A"
|
||||
"criteria": "cpe:2.3:a:cisco:hosted_collaboration_solution:11.5\\(1\\):*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "F972A2A1-3002-4086-8FA2-F231D4ED0B00"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:apache:struts:2.1.8:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "3C65711D-9C5B-4644-A12D-82243CB6FB1E"
|
||||
"criteria": "cpe:2.3:a:cisco:hosted_collaboration_solution:11.6\\(1\\):*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "D52C5D91-33D1-4C90-BEC9-90D955AA5883"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:apache:struts:2.1.8.1:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "FC1FA9A7-2C8E-4651-9400-190198528642"
|
||||
"criteria": "cpe:2.3:a:cisco:media_experience_engine:3.5:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "93C3A3B2-B346-47F4-B987-0098AB95F939"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:apache:struts:2.2.1:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "FA9093C0-AE6A-4285-B159-8FDBF37E33D7"
|
||||
"criteria": "cpe:2.3:a:cisco:media_experience_engine:3.5.2:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "87CCEC7F-058D-4202-88B3-F06372DFFA99"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:apache:struts:2.2.1.1:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "267A1C33-1C95-41DA-8A01-6F20C7BE1772"
|
||||
"criteria": "cpe:2.3:a:cisco:network_performance_analysis:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "76D400A4-9918-494E-89B7-EAA57B2830D2"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:apache:struts:2.2.3:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "7E4590B9-6A44-4DC6-B7DF-5E6CAAA9D25A"
|
||||
},
|
||||
"criteria": "cpe:2.3:a:cisco:video_distribution_suite_for_internet_streaming:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "912F9C5E-AA5F-4746-AC49-D33C2495C73B"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:apache:struts:2.2.3.1:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "30860683-D403-4D24-B356-FD306AEFCA46"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:apache:struts:2.3.1:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "4E3316DA-9E34-4955-91CA-E35B141A7007"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:apache:struts:2.3.1.1:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "0D152B29-FAD5-4DEA-B187-278EBD37FEB4"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:apache:struts:2.3.1.2:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "2AC68463-F500-471C-8600-8F8FD9743B12"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:apache:struts:2.3.3:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "A92AAE08-4811-465A-8178-25F5F349B8BA"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:apache:struts:2.3.4:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "B487975D-6394-4136-B45C-C1F209465B24"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:apache:struts:2.3.4.1:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "BDC41957-8CCA-46A6-BD31-4039EEF3C457"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:apache:struts:2.3.7:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "443B4E64-2A36-49C6-B09D-77B3BDF69709"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:apache:struts:2.3.8:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "2481505C-4FD1-4195-9E10-9DD741498FB2"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:apache:struts:2.3.12:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "28ED63DB-2AAF-4BC9-A844-074EDF63C89A"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:apache:struts:2.3.14:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "38A6CEED-6C43-4325-B36C-9F254CCDFDC0"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:apache:struts:2.3.14.1:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "41F43088-26AA-4890-A9D6-1B9B48D5F02A"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:apache:struts:2.3.14.2:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "BE6820E3-8FDF-4BDF-8B62-E604A91F1280"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:apache:struts:2.3.14.3:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "D25ED06A-F12C-443E-9B3F-FDDF52FE9D93"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:apache:struts:2.3.15:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "44527919-8403-42A8-9CE1-3B4F58630F34"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:apache:struts:2.3.15.1:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "EBB91D8A-14B8-4263-B90D-F776535F9B8F"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:apache:struts:2.3.15.2:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "FB525941-7175-43C1-9F17-814F5F7C72CA"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:apache:struts:2.3.15.3:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "F10D559E-04A0-4002-947C-D3902138795B"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:apache:struts:2.3.16:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "89203DD8-2C95-4546-9504-83654FFA5DBC"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:apache:struts:2.3.16.1:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "EB3D5644-CFAC-4FB5-A1FB-387F97876098"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:apache:struts:2.3.16.2:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "1225A0B0-C3F2-4579-BFE9-F8DB2CF596F6"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:apache:struts:2.3.16.3:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "8DC883A7-0766-4857-ABC8-9DB4BA713650"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:apache:struts:2.3.20:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "22FF6282-0BCA-46EB-9648-6EE3EDA189F2"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:apache:struts:2.3.20.1:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "6D1467BC-9BC8-402D-A420-615CF9698648"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:apache:struts:2.3.20.3:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "880AEA69-3705-447D-80FF-60753248158F"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:apache:struts:2.3.24:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "524C5119-416D-413B-BF1D-29291E23FDB2"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:apache:struts:2.3.24.1:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "45446B16-F531-4C6D-B889-A8A6622C70A2"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:apache:struts:2.3.24.3:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "71823E13-1896-4EE4-A49C-CFFB717FFD80"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:apache:struts:2.3.28:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "C778ADED-75B5-4AD3-8CDC-EFDFFAD5A742"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:apache:struts:2.3.28.1:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "067F6249-CC5A-4402-843C-06D5F9F77267"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:apache:struts:2.3.29:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "0AFA78DD-B60C-46AD-BCCB-4E15BB16BEDC"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:apache:struts:2.3.30:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "1DA1EABE-5292-44C2-8327-54201A42F204"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:apache:struts:2.3.31:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "F327A6EA-69AF-4EB2-8F17-8011678FAB6D"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:apache:struts:2.3.32:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "603FAA0C-0908-4105-BE3A-016B4A298264"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:apache:struts:2.3.33:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "8E5068CA-A472-47D2-A89F-A43EA8617874"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:apache:struts:2.5.1:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "A4F914BA-CF16-4B03-A6A2-8C9816EC1248"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:apache:struts:2.5.2:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "D2C82970-62C9-4513-A66D-6BDA4048C27F"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:apache:struts:2.5.3:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "E1A43CA5-46DE-4513-A309-BE3A60CD5489"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:apache:struts:2.5.4:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "1D83D2FA-8931-45F8-82D6-DE270A2BA55C"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:apache:struts:2.5.5:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "0D284BF2-101C-490C-85CB-69D156D1FF77"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:apache:struts:2.5.6:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "5BAD7A75-378F-4A0F-A10F-E4F7AF60F285"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:apache:struts:2.5.7:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "56E43496-097F-4560-BFB1-BDDA4659F197"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:apache:struts:2.5.8:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "96C720D6-312B-477C-A993-BEE39A7ADB4E"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:apache:struts:2.5.9:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "03367A87-9011-45F4-B534-DEA26F8D4567"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:apache:struts:2.5.10:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "CF635DCE-D495-4166-9E25-1E48DDDF9AAC"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:apache:struts:2.5.10.1:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "725DBE04-720B-421E-B76A-4EE92FEE171C"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:apache:struts:2.5.11:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "B3BC73DA-F68C-4CB9-B843-061B747353B6"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:apache:struts:2.5.12:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "0F36F794-B949-40DB-986A-EDB0E6619100"
|
||||
"criteria": "cpe:2.3:a:netapp:oncommand_balance:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "7DCBCC5D-C396-47A8-ADF4-D3A2C4377FB1"
|
||||
}
|
||||
]
|
||||
}
|
||||
@ -387,6 +181,7 @@
|
||||
"url": "http://www.oracle.com/technetwork/security-advisory/alert-cve-2017-9805-3889403.html",
|
||||
"source": "security@apache.org",
|
||||
"tags": [
|
||||
"Patch",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
@ -394,6 +189,7 @@
|
||||
"url": "http://www.securityfocus.com/bid/100609",
|
||||
"source": "security@apache.org",
|
||||
"tags": [
|
||||
"Broken Link",
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
@ -402,6 +198,7 @@
|
||||
"url": "http://www.securitytracker.com/id/1039263",
|
||||
"source": "security@apache.org",
|
||||
"tags": [
|
||||
"Broken Link",
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
@ -432,16 +229,23 @@
|
||||
},
|
||||
{
|
||||
"url": "https://lgtm.com/blog/apache_struts_CVE-2017-9805",
|
||||
"source": "security@apache.org"
|
||||
"source": "security@apache.org",
|
||||
"tags": [
|
||||
"Broken Link"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://security.netapp.com/advisory/ntap-20170907-0001/",
|
||||
"source": "security@apache.org"
|
||||
"source": "security@apache.org",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://struts.apache.org/docs/s2-052.html",
|
||||
"source": "security@apache.org",
|
||||
"tags": [
|
||||
"Mitigation",
|
||||
"Vendor Advisory"
|
||||
]
|
||||
},
|
||||
@ -456,13 +260,18 @@
|
||||
"url": "https://www.exploit-db.com/exploits/42627/",
|
||||
"source": "security@apache.org",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://www.kb.cert.org/vuls/id/112992",
|
||||
"source": "security@apache.org"
|
||||
"source": "security@apache.org",
|
||||
"tags": [
|
||||
"Third Party Advisory",
|
||||
"US Government Resource"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2018-0802",
|
||||
"sourceIdentifier": "secure@microsoft.com",
|
||||
"published": "2018-01-10T01:29:00.820",
|
||||
"lastModified": "2020-08-24T17:37:01.140",
|
||||
"vulnStatus": "Modified",
|
||||
"lastModified": "2024-07-25T13:45:59.623",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"cisaExploitAdd": "2021-11-03",
|
||||
"cisaActionDue": "2022-05-03",
|
||||
@ -20,13 +20,13 @@
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV30": [
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.0",
|
||||
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
@ -99,8 +99,8 @@
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:microsoft:office:2013:sp1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "120690A6-E0A1-4E36-A35A-C87109ECC064"
|
||||
"criteria": "cpe:2.3:a:microsoft:office:2013:sp1:*:*:-:*:*:*",
|
||||
"matchCriteriaId": "552E1557-D6FA-45DD-9B52-E13ACDBB8A62"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
@ -129,8 +129,8 @@
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:microsoft:word:2013:sp1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "32E1400A-836A-4E48-B2CD-2B0A9A8241BA"
|
||||
"criteria": "cpe:2.3:a:microsoft:word:2013:sp1:*:*:-:*:*:*",
|
||||
"matchCriteriaId": "D7A48E44-F01A-40AD-B8AF-8FE368248003"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
@ -152,6 +152,7 @@
|
||||
"url": "http://www.securityfocus.com/bid/102347",
|
||||
"source": "secure@microsoft.com",
|
||||
"tags": [
|
||||
"Broken Link",
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
@ -160,6 +161,7 @@
|
||||
"url": "http://www.securitytracker.com/id/1040153",
|
||||
"source": "secure@microsoft.com",
|
||||
"tags": [
|
||||
"Broken Link",
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
@ -168,6 +170,7 @@
|
||||
"url": "https://0patch.blogspot.com/2018/01/the-bug-that-killed-equation-editor-how.html",
|
||||
"source": "secure@microsoft.com",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
@ -183,7 +186,6 @@
|
||||
"url": "https://github.com/zldww2011/CVE-2018-0802_POC",
|
||||
"source": "secure@microsoft.com",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
@ -197,7 +199,10 @@
|
||||
},
|
||||
{
|
||||
"url": "https://research.checkpoint.com/another-office-equation-rce-vulnerability/",
|
||||
"source": "secure@microsoft.com"
|
||||
"source": "secure@microsoft.com",
|
||||
"tags": [
|
||||
"Exploit"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2018-6789",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2018-02-08T23:29:01.170",
|
||||
"lastModified": "2021-06-03T18:15:07.720",
|
||||
"vulnStatus": "Modified",
|
||||
"lastModified": "2024-07-25T13:47:22.850",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"cisaExploitAdd": "2021-11-03",
|
||||
"cisaActionDue": "2022-05-03",
|
||||
@ -20,13 +20,13 @@
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV30": [
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.0",
|
||||
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
@ -75,7 +75,7 @@
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-119"
|
||||
"value": "CWE-120"
|
||||
}
|
||||
]
|
||||
}
|
||||
@ -130,13 +130,13 @@
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*",
|
||||
"matchCriteriaId": "B5A6F2F3-4894-4392-8296-3B8DD2679084"
|
||||
"criteria": "cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*",
|
||||
"matchCriteriaId": "815D70A8-47D3-459C-A32C-9FEACA0659D1"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*",
|
||||
"matchCriteriaId": "F7016A2A-8365-4F1A-89A2-7A19F2BCAE5B"
|
||||
"criteria": "cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*",
|
||||
"matchCriteriaId": "7A5301BF-1402-4BE0-A0F8-69FBE79BC6D6"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
@ -159,7 +159,12 @@
|
||||
},
|
||||
{
|
||||
"url": "http://packetstormsecurity.com/files/162959/Exim-base64d-Buffer-Overflow.html",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://www.openwall.com/lists/oss-security/2018/02/07/2",
|
||||
@ -173,6 +178,7 @@
|
||||
"url": "http://www.securityfocus.com/bid/103049",
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Broken Link",
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
@ -181,6 +187,7 @@
|
||||
"url": "http://www.securitytracker.com/id/1040461",
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Broken Link",
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
@ -189,7 +196,7 @@
|
||||
"url": "https://devco.re/blog/2018/03/06/exim-off-by-one-RCE-exploiting-CVE-2018-6789-en/",
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Technical Description",
|
||||
"Exploit",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
@ -204,8 +211,7 @@
|
||||
"url": "https://git.exim.org/exim.git/commit/cf3cd306062a08969c41a1cdd32c6855f1abecf1",
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Patch",
|
||||
"Vendor Advisory"
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
@ -227,6 +233,7 @@
|
||||
"url": "https://www.debian.org/security/2018/dsa-4110",
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Mailing List",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-6968",
|
||||
"sourceIdentifier": "security@wordfence.com",
|
||||
"published": "2024-06-06T02:15:52.810",
|
||||
"lastModified": "2024-06-06T14:17:35.017",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-07-25T12:48:56.047",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -18,8 +18,28 @@
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security@wordfence.com",
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 5.4,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 2.5
|
||||
},
|
||||
{
|
||||
"source": "security@wordfence.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N",
|
||||
@ -39,14 +59,50 @@
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-352"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:themoneytizer:the_moneytizer:*:*:*:*:*:wordpress:*:*",
|
||||
"versionEndExcluding": "10.0.1",
|
||||
"matchCriteriaId": "80061CEE-BA8D-4D0D-9105-80A52D957F76"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://wordpress.org/plugins/the-moneytizer/",
|
||||
"source": "security@wordfence.com"
|
||||
"source": "security@wordfence.com",
|
||||
"tags": [
|
||||
"Product"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/14351561-bd31-4aaa-931a-e72917458013?source=cve",
|
||||
"source": "security@wordfence.com"
|
||||
"source": "security@wordfence.com",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
56
CVE-2023/CVE-2023-72xx/CVE-2023-7271.json
Normal file
56
CVE-2023/CVE-2023-72xx/CVE-2023-7271.json
Normal file
@ -0,0 +1,56 @@
|
||||
{
|
||||
"id": "CVE-2023-7271",
|
||||
"sourceIdentifier": "psirt@huawei.com",
|
||||
"published": "2024-07-25T12:15:02.207",
|
||||
"lastModified": "2024-07-25T12:36:39.947",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Privilege escalation vulnerability in the NMS module\nImpact: Successful exploitation of this vulnerability will affect availability."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "psirt@huawei.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 5.5,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "psirt@huawei.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-840"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://consumer.huawei.com/en/support/bulletin/2024/7/",
|
||||
"source": "psirt@huawei.com"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-0231",
|
||||
"sourceIdentifier": "cve@gitlab.com",
|
||||
"published": "2024-07-24T23:15:09.340",
|
||||
"lastModified": "2024-07-24T23:15:09.340",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-07-25T12:36:39.947",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-0910",
|
||||
"sourceIdentifier": "security@wordfence.com",
|
||||
"published": "2024-06-06T02:15:53.010",
|
||||
"lastModified": "2024-06-06T14:17:35.017",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-07-25T12:52:10.070",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -39,14 +39,50 @@
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "NVD-CWE-Other"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:restrict:restrict_for_elementor:*:*:*:*:*:wordpress:*:*",
|
||||
"versionEndExcluding": "1.0.8",
|
||||
"matchCriteriaId": "6406EED1-9297-4D70-9CB6-FDE6DF1605D7"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://wordpress.org/plugins/restrict-for-elementor/",
|
||||
"source": "security@wordfence.com"
|
||||
"source": "security@wordfence.com",
|
||||
"tags": [
|
||||
"Product"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/14993c04-7fe3-4c42-a605-2e431df14d79?source=cve",
|
||||
"source": "security@wordfence.com"
|
||||
"source": "security@wordfence.com",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-0972",
|
||||
"sourceIdentifier": "security@wordfence.com",
|
||||
"published": "2024-06-06T04:15:10.923",
|
||||
"lastModified": "2024-06-06T14:17:35.017",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-07-25T13:04:13.057",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -39,14 +39,50 @@
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-862"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:membersonly:buddypress_members_only:*:*:*:*:*:wordpress:*:*",
|
||||
"versionEndIncluding": "3.3.5",
|
||||
"matchCriteriaId": "78EE05A1-2A66-45DA-A85D-8964E9D02E0B"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/browser/buddypress-members-only/trunk/buddypress-members-only.php#L682",
|
||||
"source": "security@wordfence.com"
|
||||
"source": "security@wordfence.com",
|
||||
"tags": [
|
||||
"Product"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/dcfead67-d75d-46ae-ac68-a34643ac2f52?source=cve",
|
||||
"source": "security@wordfence.com"
|
||||
"source": "security@wordfence.com",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-2017",
|
||||
"sourceIdentifier": "security@wordfence.com",
|
||||
"published": "2024-06-06T03:15:08.847",
|
||||
"lastModified": "2024-06-06T14:17:35.017",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-07-25T13:02:47.370",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -39,26 +39,71 @@
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-862"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:edmonsoft:countdown_builder:*:*:*:*:*:wordpress:*:*",
|
||||
"versionEndExcluding": "2.7.8.1",
|
||||
"matchCriteriaId": "EF0A4F03-3B81-4182-906D-1EECC944C73A"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/browser/countdown-builder/trunk/classes/Ajax.php#L51",
|
||||
"source": "security@wordfence.com"
|
||||
"source": "security@wordfence.com",
|
||||
"tags": [
|
||||
"Product"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/browser/countdown-builder/trunk/classes/Ajax.php#L92",
|
||||
"source": "security@wordfence.com"
|
||||
"source": "security@wordfence.com",
|
||||
"tags": [
|
||||
"Product"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/changeset/3096150/",
|
||||
"source": "security@wordfence.com"
|
||||
"source": "security@wordfence.com",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/changeset/3097588/",
|
||||
"source": "security@wordfence.com"
|
||||
"source": "security@wordfence.com",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/d8fab229-cd6b-45a3-9e80-a03a1704ad3e?source=cve",
|
||||
"source": "security@wordfence.com"
|
||||
"source": "security@wordfence.com",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-21684",
|
||||
"sourceIdentifier": "security@atlassian.com",
|
||||
"published": "2024-07-24T18:15:03.793",
|
||||
"lastModified": "2024-07-24T18:15:03.793",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-07-25T12:36:39.947",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-2350",
|
||||
"sourceIdentifier": "security@wordfence.com",
|
||||
"published": "2024-06-06T02:15:53.237",
|
||||
"lastModified": "2024-06-06T14:17:35.017",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-07-25T12:57:24.040",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -18,8 +18,28 @@
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security@wordfence.com",
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 5.4,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.3,
|
||||
"impactScore": 2.7
|
||||
},
|
||||
{
|
||||
"source": "security@wordfence.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N",
|
||||
@ -39,22 +59,64 @@
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:cleversoft:clever_addons_for_elementor:*:*:*:*:*:wordpress:*:*",
|
||||
"versionEndIncluding": "2.1.9",
|
||||
"matchCriteriaId": "D3DDC4F1-2CE0-45AA-A8BE-92F9DA5AFF6F"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/browser/cafe-lite/trunk/src/widgets/class-clever-icon.php#L396",
|
||||
"source": "security@wordfence.com"
|
||||
"source": "security@wordfence.com",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/browser/cafe-lite/trunk/src/widgets/class-clever-slider.php#L1394",
|
||||
"source": "security@wordfence.com"
|
||||
"source": "security@wordfence.com",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/browser/cafe-lite/trunk/src/widgets/class-clever-team-member.php#L948",
|
||||
"source": "security@wordfence.com"
|
||||
"source": "security@wordfence.com",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/ca5befe9-7769-4367-84cf-05aabeced67a?source=cve",
|
||||
"source": "security@wordfence.com"
|
||||
"source": "security@wordfence.com",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-2473",
|
||||
"sourceIdentifier": "security@wordfence.com",
|
||||
"published": "2024-06-11T03:15:10.183",
|
||||
"lastModified": "2024-06-11T13:54:12.057",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-07-25T13:25:04.520",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -39,14 +39,50 @@
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "NVD-CWE-noinfo"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:wpserveur:wps_hide_login:*:*:*:*:*:wordpress:*:*",
|
||||
"versionEndExcluding": "1.9.16",
|
||||
"matchCriteriaId": "2191D991-CFCD-44CC-B4D0-CB2D07AA80BA"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/changeset/3099109/wps-hide-login",
|
||||
"source": "security@wordfence.com"
|
||||
"source": "security@wordfence.com",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/fd21c7d3-a5f1-4c3a-b6ab-0a979f070a62?source=cve",
|
||||
"source": "security@wordfence.com"
|
||||
"source": "security@wordfence.com",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-30471",
|
||||
"sourceIdentifier": "security@apache.org",
|
||||
"published": "2024-07-17T09:15:02.640",
|
||||
"lastModified": "2024-07-17T13:34:20.520",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2024-07-25T13:39:17.913",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -15,7 +15,30 @@
|
||||
"value": "Vulnerabilidad de condici\u00f3n de ejecuci\u00f3n de tiempo de verificaci\u00f3n de tiempo de uso (TOCTOU) en Apache StreamPipes en el registro autom\u00e1tico del usuario. Esto permite que un atacante solicite potencialmente la creaci\u00f3n de varias cuentas con la misma direcci\u00f3n de correo electr\u00f3nico hasta que se registre la direcci\u00f3n de correo electr\u00f3nico, lo que crea muchos usuarios id\u00e9nticos y corrompe la administraci\u00f3n de usuarios de StreamPipe. Este problema afecta a Apache StreamPipes: hasta 0.93.0. Se recomienda a los usuarios actualizar a la versi\u00f3n 0.95.0, que soluciona el problema."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "HIGH",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 3.7,
|
||||
"baseSeverity": "LOW"
|
||||
},
|
||||
"exploitabilityScore": 2.2,
|
||||
"impactScore": 1.4
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security@apache.org",
|
||||
@ -28,10 +51,32 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:apache:streampipes:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "0.95.0",
|
||||
"matchCriteriaId": "B5EC9EC8-4988-4DAC-A92F-CCDED7F9CB52"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://lists.apache.org/thread/8yodrmohgcybq900or3d4hc1msl230fr",
|
||||
"source": "security@apache.org"
|
||||
"source": "security@apache.org",
|
||||
"tags": [
|
||||
"Mailing List",
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-31979",
|
||||
"sourceIdentifier": "security@apache.org",
|
||||
"published": "2024-07-17T09:15:02.907",
|
||||
"lastModified": "2024-07-17T13:34:20.520",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2024-07-25T13:38:56.897",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -15,7 +15,30 @@
|
||||
"value": "Vulnerabilidad de Server-Side Request Forgery (SSRF) en Apache StreamPipes durante el proceso de instalaci\u00f3n de elementos de canalizaci\u00f3n. Anteriormente, StreamPipes permit\u00eda a los usuarios configurar endpoints personalizados desde los cuales instalar elementos de canalizaci\u00f3n adicionales. Estos endpoints no se validaron adecuadamente, lo que permiti\u00f3 que un atacante lograra que StreamPipes enviara una solicitud HTTP GET a una direcci\u00f3n arbitraria. Este problema afecta a Apache StreamPipes: hasta 0.93.0. Se recomienda a los usuarios actualizar a la versi\u00f3n 0.95.0, que soluciona el problema."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 4.3,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 1.4
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security@apache.org",
|
||||
@ -28,10 +51,32 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:apache:streampipes:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "0.95.0",
|
||||
"matchCriteriaId": "B5EC9EC8-4988-4DAC-A92F-CCDED7F9CB52"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://lists.apache.org/thread/8lryp3bxnby9kmk13odkz2jbfdjfvf0y",
|
||||
"source": "security@apache.org"
|
||||
"source": "security@apache.org",
|
||||
"tags": [
|
||||
"Mailing List",
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-33519",
|
||||
"sourceIdentifier": "security-alert@hpe.com",
|
||||
"published": "2024-07-24T20:15:03.640",
|
||||
"lastModified": "2024-07-24T20:15:03.640",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-07-25T12:36:39.947",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-35737",
|
||||
"sourceIdentifier": "audit@patchstack.com",
|
||||
"published": "2024-06-08T13:15:56.140",
|
||||
"lastModified": "2024-06-10T02:52:08.267",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-07-25T13:07:47.233",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -17,6 +17,26 @@
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 6.1,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 2.7
|
||||
},
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Secondary",
|
||||
@ -51,10 +71,31 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:loopus:wp_visitors_tracker:*:*:*:*:*:wordpress:*:*",
|
||||
"versionEndExcluding": "2.4",
|
||||
"matchCriteriaId": "84E5F4ED-4ADB-4C79-A7D9-7D5B70845A59"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://patchstack.com/database/vulnerability/wp_visitorstracker/wordpress-wp-visitors-tracker-plugin-2-3-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve",
|
||||
"source": "audit@patchstack.com"
|
||||
"source": "audit@patchstack.com",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-35738",
|
||||
"sourceIdentifier": "audit@patchstack.com",
|
||||
"published": "2024-06-08T13:15:56.430",
|
||||
"lastModified": "2024-06-10T02:52:08.267",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-07-25T13:08:32.617",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -17,6 +17,26 @@
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 5.4,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.3,
|
||||
"impactScore": 2.7
|
||||
},
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Secondary",
|
||||
@ -51,10 +71,31 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:kognetics:kognetiks_chatbot:*:*:*:*:*:wordpress:*:*",
|
||||
"versionEndExcluding": "1.9.9",
|
||||
"matchCriteriaId": "1CC3A804-5A69-4C7D-992B-6120E2CED37E"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://patchstack.com/database/vulnerability/chatbot-chatgpt/wordpress-kognetiks-chatbot-for-wordpress-plugin-1-9-8-cross-site-scripting-xss-vulnerability?_s_id=cve",
|
||||
"source": "audit@patchstack.com"
|
||||
"source": "audit@patchstack.com",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-35739",
|
||||
"sourceIdentifier": "audit@patchstack.com",
|
||||
"published": "2024-06-08T13:15:56.660",
|
||||
"lastModified": "2024-06-10T02:52:08.267",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-07-25T13:09:33.943",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -17,6 +17,26 @@
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 5.4,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.3,
|
||||
"impactScore": 2.7
|
||||
},
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Secondary",
|
||||
@ -51,10 +71,31 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:radiustheme:post_grid:*:*:*:*:*:wordpress:*:*",
|
||||
"versionEndExcluding": "7.7.2",
|
||||
"matchCriteriaId": "705EA9B4-5219-47A8-ABD8-8791B3D6D3B4"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://patchstack.com/database/vulnerability/the-post-grid/wordpress-the-post-grid-plugin-7-7-1-cross-site-scripting-xss-vulnerability?_s_id=cve",
|
||||
"source": "audit@patchstack.com"
|
||||
"source": "audit@patchstack.com",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-35740",
|
||||
"sourceIdentifier": "audit@patchstack.com",
|
||||
"published": "2024-06-08T13:15:56.910",
|
||||
"lastModified": "2024-06-10T02:52:08.267",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-07-25T13:10:22.557",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -17,6 +17,26 @@
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 5.4,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.3,
|
||||
"impactScore": 2.7
|
||||
},
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Secondary",
|
||||
@ -51,10 +71,31 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:themefreesia:pixgraphy:*:*:*:*:*:wordpress:*:*",
|
||||
"versionEndExcluding": "1.3.9",
|
||||
"matchCriteriaId": "1F13062A-CED2-46EB-A8AD-D42C1FE3912D"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://patchstack.com/database/vulnerability/pixgraphy/wordpress-pixgraphy-theme-1-3-8-cross-site-scripting-xss-vulnerability?_s_id=cve",
|
||||
"source": "audit@patchstack.com"
|
||||
"source": "audit@patchstack.com",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-35751",
|
||||
"sourceIdentifier": "audit@patchstack.com",
|
||||
"published": "2024-06-08T13:15:57.370",
|
||||
"lastModified": "2024-06-10T02:52:08.267",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-07-25T13:17:42.720",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -17,6 +17,26 @@
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "HIGH",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 4.8,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 1.7,
|
||||
"impactScore": 2.7
|
||||
},
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Secondary",
|
||||
@ -51,10 +71,31 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:cm-wp:woody_ad_snippets:*:*:*:*:*:wordpress:*:*",
|
||||
"versionEndExcluding": "2.5.1",
|
||||
"matchCriteriaId": "4E70D871-71CE-4853-8CFD-158C72BAFC8A"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://patchstack.com/database/vulnerability/insert-php/wordpress-woody-code-snippets-plugin-2-4-10-cross-site-scripting-xss-vulnerability?_s_id=cve",
|
||||
"source": "audit@patchstack.com"
|
||||
"source": "audit@patchstack.com",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-35752",
|
||||
"sourceIdentifier": "audit@patchstack.com",
|
||||
"published": "2024-06-08T13:15:57.607",
|
||||
"lastModified": "2024-06-10T02:52:08.267",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-07-25T13:23:13.527",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -17,6 +17,26 @@
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "HIGH",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 4.8,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 1.7,
|
||||
"impactScore": 2.7
|
||||
},
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Secondary",
|
||||
@ -51,10 +71,31 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:overclokk:stellissimo_text_box:*:*:*:*:*:wordpress:*:*",
|
||||
"versionEndIncluding": "1.1.4",
|
||||
"matchCriteriaId": "DCB6E237-765E-424A-9F9D-64230B2BB604"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://patchstack.com/database/vulnerability/stellissimo-text-box/wordpress-stellissimo-text-box-plugin-1-1-4-cross-site-scripting-xss-vulnerability?_s_id=cve",
|
||||
"source": "audit@patchstack.com"
|
||||
"source": "audit@patchstack.com",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-36533",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-07-24T20:15:03.903",
|
||||
"lastModified": "2024-07-24T20:15:03.903",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-07-25T12:36:39.947",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-36534",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-07-24T20:15:03.967",
|
||||
"lastModified": "2024-07-24T20:15:03.967",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-07-25T12:36:39.947",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-36535",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-07-24T20:15:04.030",
|
||||
"lastModified": "2024-07-24T20:15:04.030",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-07-25T12:36:39.947",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-36536",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-07-24T19:15:04.293",
|
||||
"lastModified": "2024-07-24T19:15:04.293",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-07-25T12:36:39.947",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-36537",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-07-24T19:15:04.373",
|
||||
"lastModified": "2024-07-24T19:15:04.373",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-07-25T12:36:39.947",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-36538",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-07-24T19:15:04.487",
|
||||
"lastModified": "2024-07-24T19:15:04.487",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-07-25T12:36:39.947",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-36539",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-07-24T17:15:10.767",
|
||||
"lastModified": "2024-07-24T17:15:10.767",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-07-25T12:36:39.947",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-36540",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-07-24T17:15:10.827",
|
||||
"lastModified": "2024-07-24T17:15:10.827",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-07-25T12:36:39.947",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-37084",
|
||||
"sourceIdentifier": "security@vmware.com",
|
||||
"published": "2024-07-25T10:15:07.260",
|
||||
"lastModified": "2024-07-25T10:15:07.260",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-07-25T12:36:39.947",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-37245",
|
||||
"sourceIdentifier": "audit@patchstack.com",
|
||||
"published": "2024-07-22T09:15:05.123",
|
||||
"lastModified": "2024-07-22T13:00:31.330",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-07-25T13:57:37.537",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -17,6 +17,26 @@
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 6.1,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 2.7
|
||||
},
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Secondary",
|
||||
@ -51,10 +71,31 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:vsourz:all_in_one_redirection:*:*:*:*:*:wordpress:*:*",
|
||||
"versionEndIncluding": "2.2.0",
|
||||
"matchCriteriaId": "EF71FAB4-FA16-461F-B57B-86DAEAA8E41A"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://patchstack.com/database/vulnerability/all-in-one-redirection/wordpress-all-in-one-redirection-plugin-2-2-0-cross-site-scripting-xss-vulnerability-2?_s_id=cve",
|
||||
"source": "audit@patchstack.com"
|
||||
"source": "audit@patchstack.com",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-37246",
|
||||
"sourceIdentifier": "audit@patchstack.com",
|
||||
"published": "2024-07-22T09:15:05.390",
|
||||
"lastModified": "2024-07-22T13:00:31.330",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-07-25T13:57:08.393",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -17,6 +17,26 @@
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 5.4,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.3,
|
||||
"impactScore": 2.7
|
||||
},
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Secondary",
|
||||
@ -51,10 +71,31 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:gallery_slideshow_project:gallery_slideshow:*:*:*:*:*:wordpress:*:*",
|
||||
"versionEndIncluding": "1.4.1",
|
||||
"matchCriteriaId": "FB592903-65B0-4221-8B9A-3F084A176021"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://patchstack.com/database/vulnerability/gallery-slideshow/wordpress-gallery-slideshow-plugin-1-4-1-cross-site-scripting-xss-vulnerability?_s_id=cve",
|
||||
"source": "audit@patchstack.com"
|
||||
"source": "audit@patchstack.com",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-37257",
|
||||
"sourceIdentifier": "audit@patchstack.com",
|
||||
"published": "2024-07-22T09:15:05.627",
|
||||
"lastModified": "2024-07-22T13:00:31.330",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-07-25T13:55:53.217",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -17,6 +17,26 @@
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 6.1,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 2.7
|
||||
},
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Secondary",
|
||||
@ -51,10 +71,31 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:permalink_manager_lite_project:permalink_manager_lite:*:*:*:*:*:wordpress:*:*",
|
||||
"versionEndExcluding": "2.4.3.4",
|
||||
"matchCriteriaId": "343AD6DF-1B44-4EAA-ABA0-F982E4BE0CD5"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://patchstack.com/database/vulnerability/permalink-manager/wordpress-permalink-manager-lite-plugin-2-4-3-3-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve",
|
||||
"source": "audit@patchstack.com"
|
||||
"source": "audit@patchstack.com",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-37258",
|
||||
"sourceIdentifier": "audit@patchstack.com",
|
||||
"published": "2024-07-22T09:15:05.870",
|
||||
"lastModified": "2024-07-22T13:00:31.330",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-07-25T13:54:49.790",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -17,6 +17,26 @@
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 6.1,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 2.7
|
||||
},
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Secondary",
|
||||
@ -51,10 +71,31 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:wpsocialrocket:social_rocket:*:*:*:*:*:wordpress:*:*",
|
||||
"versionEndExcluding": "1.3.4",
|
||||
"matchCriteriaId": "994ED751-31A4-4373-9E43-2B8A6F7955F0"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://patchstack.com/database/vulnerability/social-rocket/wordpress-social-rocket-plugin-1-3-3-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve",
|
||||
"source": "audit@patchstack.com"
|
||||
"source": "audit@patchstack.com",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-37259",
|
||||
"sourceIdentifier": "audit@patchstack.com",
|
||||
"published": "2024-07-22T09:15:06.123",
|
||||
"lastModified": "2024-07-22T13:00:31.330",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-07-25T13:54:19.540",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -17,6 +17,26 @@
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 6.1,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 2.7
|
||||
},
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Secondary",
|
||||
@ -51,10 +71,31 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:wpextended:wp_extended:*:*:*:*:*:wordpress:*:*",
|
||||
"versionEndExcluding": "3.0.0",
|
||||
"matchCriteriaId": "1492775E-0762-43FF-A81F-AF0D3FFACA06"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://patchstack.com/database/vulnerability/wpextended/wordpress-wp-extended-plugin-2-4-7-cross-site-scripting-xss-vulnerability?_s_id=cve",
|
||||
"source": "audit@patchstack.com"
|
||||
"source": "audit@patchstack.com",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-37261",
|
||||
"sourceIdentifier": "audit@patchstack.com",
|
||||
"published": "2024-07-22T09:15:06.380",
|
||||
"lastModified": "2024-07-22T13:00:31.330",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-07-25T13:53:30.123",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -17,6 +17,26 @@
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 6.1,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 2.7
|
||||
},
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Secondary",
|
||||
@ -51,10 +71,31 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:wplab:wp-lister_lite_for_amazon:*:*:*:*:*:wordpress:*:*",
|
||||
"versionEndExcluding": "2.6.17",
|
||||
"matchCriteriaId": "079C64E0-6F1E-47A6-B7E5-439B4C397A41"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://patchstack.com/database/vulnerability/wp-lister-for-amazon/wordpress-wp-lister-lite-for-amazon-plugin-2-6-16-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve",
|
||||
"source": "audit@patchstack.com"
|
||||
"source": "audit@patchstack.com",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-37262",
|
||||
"sourceIdentifier": "audit@patchstack.com",
|
||||
"published": "2024-07-22T09:15:06.623",
|
||||
"lastModified": "2024-07-22T13:00:31.330",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-07-25T13:52:40.207",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -17,6 +17,26 @@
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 6.1,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 2.7
|
||||
},
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Secondary",
|
||||
@ -51,10 +71,31 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:vcita:online_booking_\\&_scheduling_calendar_for_wordpress_by_vcita:*:*:*:*:*:wordpress:*:*",
|
||||
"versionEndExcluding": "4.4.3",
|
||||
"matchCriteriaId": "6D841E0E-5D9D-4B92-971B-553D8BA51178"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://patchstack.com/database/vulnerability/meeting-scheduler-by-vcita/wordpress-online-booking-scheduling-calendar-plugin-4-4-2-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve",
|
||||
"source": "audit@patchstack.com"
|
||||
"source": "audit@patchstack.com",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-37263",
|
||||
"sourceIdentifier": "audit@patchstack.com",
|
||||
"published": "2024-07-22T09:15:06.890",
|
||||
"lastModified": "2024-07-22T13:00:31.330",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-07-25T13:52:13.823",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -17,6 +17,26 @@
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 5.4,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.3,
|
||||
"impactScore": 2.7
|
||||
},
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Secondary",
|
||||
@ -40,6 +60,16 @@
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Secondary",
|
||||
@ -51,10 +81,31 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:themelooks:enter_addons:*:*:*:*:*:wordpress:*:*",
|
||||
"versionEndExcluding": "2.1.7",
|
||||
"matchCriteriaId": "64963988-4780-49C7-A096-71A4A853CF6F"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://patchstack.com/database/vulnerability/enteraddons/wordpress-enter-addons-ultimate-template-builder-for-elementor-plugin-2-1-6-cross-site-scripting-xss-vulnerability?_s_id=cve",
|
||||
"source": "audit@patchstack.com"
|
||||
"source": "audit@patchstack.com",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-37264",
|
||||
"sourceIdentifier": "audit@patchstack.com",
|
||||
"published": "2024-07-22T09:15:07.127",
|
||||
"lastModified": "2024-07-22T13:00:31.330",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-07-25T13:51:29.393",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -17,6 +17,26 @@
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 6.1,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 2.7
|
||||
},
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Secondary",
|
||||
@ -51,10 +71,31 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:groundhogg:groundhogg:*:*:*:*:*:wordpress:*:*",
|
||||
"versionEndExcluding": "3.4.3",
|
||||
"matchCriteriaId": "CF4C5C4D-466B-47D8-AB64-693F911EAB46"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://patchstack.com/database/vulnerability/groundhogg/wordpress-groundhogg-plugin-3-4-2-3-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve",
|
||||
"source": "audit@patchstack.com"
|
||||
"source": "audit@patchstack.com",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-37265",
|
||||
"sourceIdentifier": "audit@patchstack.com",
|
||||
"published": "2024-07-22T09:15:07.350",
|
||||
"lastModified": "2024-07-22T13:00:31.330",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-07-25T13:51:00.093",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -17,6 +17,26 @@
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 5.4,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.3,
|
||||
"impactScore": 2.7
|
||||
},
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Secondary",
|
||||
@ -51,10 +71,31 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:northernbeacheswebsites:ideapush:*:*:*:*:*:wordpress:*:*",
|
||||
"versionEndExcluding": "8.61",
|
||||
"matchCriteriaId": "B86D7275-0287-40D5-B50B-0A1DFC97D75B"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://patchstack.com/database/vulnerability/ideapush/wordpress-ideapush-plugin-8-60-cross-site-scripting-xss-vulnerability?_s_id=cve",
|
||||
"source": "audit@patchstack.com"
|
||||
"source": "audit@patchstack.com",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-37267",
|
||||
"sourceIdentifier": "audit@patchstack.com",
|
||||
"published": "2024-07-22T09:15:07.593",
|
||||
"lastModified": "2024-07-22T13:00:31.330",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-07-25T13:47:43.833",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -17,6 +17,26 @@
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 6.1,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 2.7
|
||||
},
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Secondary",
|
||||
@ -51,10 +71,31 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:kaptinlin:striking:*:*:*:*:*:wordpress:*:*",
|
||||
"versionEndExcluding": "2.3.5",
|
||||
"matchCriteriaId": "F07B1927-C1B4-4391-BE98-AE8E6EE237E0"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://patchstack.com/database/vulnerability/striking-r/wordpress-striking-theme-2-3-4-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve",
|
||||
"source": "audit@patchstack.com"
|
||||
"source": "audit@patchstack.com",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-37271",
|
||||
"sourceIdentifier": "audit@patchstack.com",
|
||||
"published": "2024-07-22T09:15:07.967",
|
||||
"lastModified": "2024-07-22T13:00:31.330",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-07-25T13:46:39.273",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -17,6 +17,26 @@
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "HIGH",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 4.8,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 1.7,
|
||||
"impactScore": 2.7
|
||||
},
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Secondary",
|
||||
@ -51,10 +71,31 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:print_my_blog_project:print_my_blog:*:*:*:*:*:wordpress:*:*",
|
||||
"versionEndExcluding": "3.27.1",
|
||||
"matchCriteriaId": "E16B3E6D-C06E-46DA-8076-06A69A1F7EA7"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://patchstack.com/database/vulnerability/print-my-blog/wordpress-print-my-blog-plugin-3-27-0-cross-site-scripting-xss-vulnerability?_s_id=cve",
|
||||
"source": "audit@patchstack.com"
|
||||
"source": "audit@patchstack.com",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-37533",
|
||||
"sourceIdentifier": "psirt@us.ibm.com",
|
||||
"published": "2024-07-24T18:15:04.690",
|
||||
"lastModified": "2024-07-24T18:15:04.690",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-07-25T12:36:39.947",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
|
56
CVE-2024/CVE-2024-396xx/CVE-2024-39670.json
Normal file
56
CVE-2024/CVE-2024-396xx/CVE-2024-39670.json
Normal file
@ -0,0 +1,56 @@
|
||||
{
|
||||
"id": "CVE-2024-39670",
|
||||
"sourceIdentifier": "psirt@huawei.com",
|
||||
"published": "2024-07-25T12:15:02.483",
|
||||
"lastModified": "2024-07-25T12:36:39.947",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Privilege escalation vulnerability in the account synchronisation module.\nImpact: Successful exploitation of this vulnerability will affect availability."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "psirt@huawei.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 6.2,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.5,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "psirt@huawei.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-264"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://consumer.huawei.com/en/support/bulletin/2024/7/",
|
||||
"source": "psirt@huawei.com"
|
||||
}
|
||||
]
|
||||
}
|
56
CVE-2024/CVE-2024-396xx/CVE-2024-39671.json
Normal file
56
CVE-2024/CVE-2024-396xx/CVE-2024-39671.json
Normal file
@ -0,0 +1,56 @@
|
||||
{
|
||||
"id": "CVE-2024-39671",
|
||||
"sourceIdentifier": "psirt@huawei.com",
|
||||
"published": "2024-07-25T12:15:02.800",
|
||||
"lastModified": "2024-07-25T12:36:39.947",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Access control vulnerability in the security verification module.\nImpact: Successful exploitation of this vulnerability may affect service confidentiality."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "psirt@huawei.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 9.3,
|
||||
"baseSeverity": "CRITICAL"
|
||||
},
|
||||
"exploitabilityScore": 2.5,
|
||||
"impactScore": 6.0
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "psirt@huawei.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-840"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://consumer.huawei.com/en/support/bulletin/2024/7/",
|
||||
"source": "psirt@huawei.com"
|
||||
}
|
||||
]
|
||||
}
|
56
CVE-2024/CVE-2024-396xx/CVE-2024-39672.json
Normal file
56
CVE-2024/CVE-2024-396xx/CVE-2024-39672.json
Normal file
@ -0,0 +1,56 @@
|
||||
{
|
||||
"id": "CVE-2024-39672",
|
||||
"sourceIdentifier": "psirt@huawei.com",
|
||||
"published": "2024-07-25T12:15:03.087",
|
||||
"lastModified": "2024-07-25T12:36:39.947",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Memory request logic vulnerability in the memory module.\nImpact: Successful exploitation of this vulnerability will affect integrity and availability."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "psirt@huawei.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 8.4,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.5,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "psirt@huawei.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-416"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://consumer.huawei.com/en/support/bulletin/2024/7/",
|
||||
"source": "psirt@huawei.com"
|
||||
}
|
||||
]
|
||||
}
|
56
CVE-2024/CVE-2024-396xx/CVE-2024-39673.json
Normal file
56
CVE-2024/CVE-2024-396xx/CVE-2024-39673.json
Normal file
@ -0,0 +1,56 @@
|
||||
{
|
||||
"id": "CVE-2024-39673",
|
||||
"sourceIdentifier": "psirt@huawei.com",
|
||||
"published": "2024-07-25T12:15:03.350",
|
||||
"lastModified": "2024-07-25T12:36:39.947",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Vulnerability of serialisation/deserialisation mismatch in the iAware module. Impact: Successful exploitation of this vulnerability may affect service confidentiality."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "psirt@huawei.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 6.8,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.5,
|
||||
"impactScore": 4.2
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "psirt@huawei.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-26"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://consumer.huawei.com/en/support/bulletin/2024/7/",
|
||||
"source": "psirt@huawei.com"
|
||||
}
|
||||
]
|
||||
}
|
56
CVE-2024/CVE-2024-396xx/CVE-2024-39674.json
Normal file
56
CVE-2024/CVE-2024-396xx/CVE-2024-39674.json
Normal file
@ -0,0 +1,56 @@
|
||||
{
|
||||
"id": "CVE-2024-39674",
|
||||
"sourceIdentifier": "psirt@huawei.com",
|
||||
"published": "2024-07-25T12:15:03.563",
|
||||
"lastModified": "2024-07-25T12:36:39.947",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Plaintext vulnerability in the Gallery search module.\nImpact: Successful exploitation of this vulnerability will affect availability."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "psirt@huawei.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 6.2,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.5,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "psirt@huawei.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-312"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://consumer.huawei.com/en/support/bulletin/2024/7/",
|
||||
"source": "psirt@huawei.com"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-40137",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-07-24T19:15:04.637",
|
||||
"lastModified": "2024-07-24T19:15:04.637",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-07-25T12:36:39.947",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-40495",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-07-24T19:15:04.693",
|
||||
"lastModified": "2024-07-24T19:15:04.693",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-07-25T12:36:39.947",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-41110",
|
||||
"sourceIdentifier": "security-advisories@github.com",
|
||||
"published": "2024-07-24T17:15:11.053",
|
||||
"lastModified": "2024-07-24T17:15:11.053",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-07-25T12:36:39.947",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-41133",
|
||||
"sourceIdentifier": "security-alert@hpe.com",
|
||||
"published": "2024-07-24T20:15:04.237",
|
||||
"lastModified": "2024-07-24T20:15:04.237",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-07-25T12:36:39.947",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-41134",
|
||||
"sourceIdentifier": "security-alert@hpe.com",
|
||||
"published": "2024-07-24T20:15:04.427",
|
||||
"lastModified": "2024-07-24T20:15:04.427",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-07-25T12:36:39.947",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-41135",
|
||||
"sourceIdentifier": "security-alert@hpe.com",
|
||||
"published": "2024-07-24T20:15:04.600",
|
||||
"lastModified": "2024-07-24T20:15:04.600",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-07-25T12:36:39.947",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-41136",
|
||||
"sourceIdentifier": "security-alert@hpe.com",
|
||||
"published": "2024-07-24T21:15:11.857",
|
||||
"lastModified": "2024-07-24T21:15:11.857",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-07-25T12:36:39.947",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-41459",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-07-24T21:15:12.037",
|
||||
"lastModified": "2024-07-24T21:15:12.037",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-07-25T12:36:39.947",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-41460",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-07-24T21:15:12.097",
|
||||
"lastModified": "2024-07-24T21:15:12.097",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-07-25T12:36:39.947",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-41461",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-07-24T21:15:12.150",
|
||||
"lastModified": "2024-07-24T21:15:12.150",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-07-25T12:36:39.947",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-41462",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-07-24T21:15:12.207",
|
||||
"lastModified": "2024-07-24T21:15:12.207",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-07-25T12:36:39.947",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-41463",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-07-24T21:15:12.260",
|
||||
"lastModified": "2024-07-24T21:15:12.260",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-07-25T12:36:39.947",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-41464",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-07-24T21:15:12.313",
|
||||
"lastModified": "2024-07-24T21:15:12.313",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-07-25T12:36:39.947",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-41465",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-07-24T21:15:12.370",
|
||||
"lastModified": "2024-07-24T21:15:12.370",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-07-25T12:36:39.947",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-41466",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-07-24T21:15:12.423",
|
||||
"lastModified": "2024-07-24T21:15:12.423",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-07-25T12:36:39.947",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-41550",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-07-24T20:15:04.777",
|
||||
"lastModified": "2024-07-24T20:15:04.777",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-07-25T12:36:39.947",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-41551",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-07-24T20:15:04.837",
|
||||
"lastModified": "2024-07-24T20:15:04.837",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-07-25T12:36:39.947",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-41662",
|
||||
"sourceIdentifier": "security-advisories@github.com",
|
||||
"published": "2024-07-24T17:15:11.310",
|
||||
"lastModified": "2024-07-24T17:15:11.310",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-07-25T12:36:39.947",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-41666",
|
||||
"sourceIdentifier": "security-advisories@github.com",
|
||||
"published": "2024-07-24T18:15:05.090",
|
||||
"lastModified": "2024-07-24T18:15:05.090",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-07-25T12:36:39.947",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-41667",
|
||||
"sourceIdentifier": "security-advisories@github.com",
|
||||
"published": "2024-07-24T18:15:05.310",
|
||||
"lastModified": "2024-07-24T18:15:05.310",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-07-25T12:36:39.947",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-41672",
|
||||
"sourceIdentifier": "security-advisories@github.com",
|
||||
"published": "2024-07-24T18:15:05.527",
|
||||
"lastModified": "2024-07-24T18:15:05.527",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-07-25T12:36:39.947",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-41705",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-07-25T08:15:02.467",
|
||||
"lastModified": "2024-07-25T08:15:02.467",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-07-25T12:36:39.947",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-41706",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-07-25T08:15:02.783",
|
||||
"lastModified": "2024-07-25T08:15:02.783",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-07-25T12:36:39.947",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-41707",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-07-25T08:15:02.980",
|
||||
"lastModified": "2024-07-25T08:15:02.980",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-07-25T12:36:39.947",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-4811",
|
||||
"sourceIdentifier": "security@octopus.com",
|
||||
"published": "2024-07-25T05:15:26.513",
|
||||
"lastModified": "2024-07-25T05:15:26.513",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-07-25T12:36:39.947",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-5067",
|
||||
"sourceIdentifier": "cve@gitlab.com",
|
||||
"published": "2024-07-24T23:15:09.610",
|
||||
"lastModified": "2024-07-24T23:15:09.610",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-07-25T12:36:39.947",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-5653",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2024-06-05T21:15:15.247",
|
||||
"lastModified": "2024-06-06T14:17:35.017",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2024-07-25T12:45:19.830",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -61,6 +61,26 @@
|
||||
}
|
||||
],
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
},
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
@ -120,22 +140,52 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:changjietong:t\\+:3.5:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "0C1FA189-72A1-40B7-BF82-5F24EBF97183"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/vulreport3r/cve-reports/blob/main/There_is_a_SQL_injection_vulnerability_in_the_Changjietong_T%2Bsystem/report.md",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.267185",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Permissions Required",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.267185",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?submit.345311",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"VDB Entry"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-6589",
|
||||
"sourceIdentifier": "security@wordfence.com",
|
||||
"published": "2024-07-25T11:15:10.333",
|
||||
"lastModified": "2024-07-25T11:15:10.333",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-07-25T12:36:39.947",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-6972",
|
||||
"sourceIdentifier": "security@octopus.com",
|
||||
"published": "2024-07-25T06:15:01.967",
|
||||
"lastModified": "2024-07-25T06:15:01.967",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-07-25T12:36:39.947",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-7047",
|
||||
"sourceIdentifier": "cve@gitlab.com",
|
||||
"published": "2024-07-25T01:15:09.830",
|
||||
"lastModified": "2024-07-25T01:15:09.830",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-07-25T12:36:39.947",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-7057",
|
||||
"sourceIdentifier": "cve@gitlab.com",
|
||||
"published": "2024-07-25T01:15:10.040",
|
||||
"lastModified": "2024-07-25T01:15:10.040",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-07-25T12:36:39.947",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-7060",
|
||||
"sourceIdentifier": "cve@gitlab.com",
|
||||
"published": "2024-07-24T23:15:09.817",
|
||||
"lastModified": "2024-07-24T23:15:09.817",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-07-25T12:36:39.947",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-7080",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2024-07-24T20:15:05.117",
|
||||
"lastModified": "2024-07-24T20:15:05.117",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-07-25T12:36:39.947",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-7081",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2024-07-24T21:15:12.913",
|
||||
"lastModified": "2024-07-24T21:15:12.913",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-07-25T12:36:39.947",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-7091",
|
||||
"sourceIdentifier": "cve@gitlab.com",
|
||||
"published": "2024-07-24T23:15:10.013",
|
||||
"lastModified": "2024-07-24T23:15:10.013",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-07-25T12:36:39.947",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
|
43
README.md
43
README.md
@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours.
|
||||
### Last Repository Update
|
||||
|
||||
```plain
|
||||
2024-07-25T12:00:17.018055+00:00
|
||||
2024-07-25T14:00:17.952126+00:00
|
||||
```
|
||||
|
||||
### Most recent CVE Modification Timestamp synchronized with NVD
|
||||
|
||||
```plain
|
||||
2024-07-25T11:15:10.333000+00:00
|
||||
2024-07-25T13:58:42.913000+00:00
|
||||
```
|
||||
|
||||
### Last Data Feed Release
|
||||
@ -33,21 +33,50 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
|
||||
### Total Number of included CVEs
|
||||
|
||||
```plain
|
||||
257949
|
||||
257955
|
||||
```
|
||||
|
||||
### CVEs added in the last Commit
|
||||
|
||||
Recently added CVEs: `2`
|
||||
Recently added CVEs: `6`
|
||||
|
||||
- [CVE-2024-37084](CVE-2024/CVE-2024-370xx/CVE-2024-37084.json) (`2024-07-25T10:15:07.260`)
|
||||
- [CVE-2024-6589](CVE-2024/CVE-2024-65xx/CVE-2024-6589.json) (`2024-07-25T11:15:10.333`)
|
||||
- [CVE-2023-7271](CVE-2023/CVE-2023-72xx/CVE-2023-7271.json) (`2024-07-25T12:15:02.207`)
|
||||
- [CVE-2024-39670](CVE-2024/CVE-2024-396xx/CVE-2024-39670.json) (`2024-07-25T12:15:02.483`)
|
||||
- [CVE-2024-39671](CVE-2024/CVE-2024-396xx/CVE-2024-39671.json) (`2024-07-25T12:15:02.800`)
|
||||
- [CVE-2024-39672](CVE-2024/CVE-2024-396xx/CVE-2024-39672.json) (`2024-07-25T12:15:03.087`)
|
||||
- [CVE-2024-39673](CVE-2024/CVE-2024-396xx/CVE-2024-39673.json) (`2024-07-25T12:15:03.350`)
|
||||
- [CVE-2024-39674](CVE-2024/CVE-2024-396xx/CVE-2024-39674.json) (`2024-07-25T12:15:03.563`)
|
||||
|
||||
|
||||
### CVEs modified in the last Commit
|
||||
|
||||
Recently modified CVEs: `0`
|
||||
Recently modified CVEs: `81`
|
||||
|
||||
- [CVE-2024-41462](CVE-2024/CVE-2024-414xx/CVE-2024-41462.json) (`2024-07-25T12:36:39.947`)
|
||||
- [CVE-2024-41463](CVE-2024/CVE-2024-414xx/CVE-2024-41463.json) (`2024-07-25T12:36:39.947`)
|
||||
- [CVE-2024-41464](CVE-2024/CVE-2024-414xx/CVE-2024-41464.json) (`2024-07-25T12:36:39.947`)
|
||||
- [CVE-2024-41465](CVE-2024/CVE-2024-414xx/CVE-2024-41465.json) (`2024-07-25T12:36:39.947`)
|
||||
- [CVE-2024-41466](CVE-2024/CVE-2024-414xx/CVE-2024-41466.json) (`2024-07-25T12:36:39.947`)
|
||||
- [CVE-2024-41550](CVE-2024/CVE-2024-415xx/CVE-2024-41550.json) (`2024-07-25T12:36:39.947`)
|
||||
- [CVE-2024-41551](CVE-2024/CVE-2024-415xx/CVE-2024-41551.json) (`2024-07-25T12:36:39.947`)
|
||||
- [CVE-2024-41662](CVE-2024/CVE-2024-416xx/CVE-2024-41662.json) (`2024-07-25T12:36:39.947`)
|
||||
- [CVE-2024-41666](CVE-2024/CVE-2024-416xx/CVE-2024-41666.json) (`2024-07-25T12:36:39.947`)
|
||||
- [CVE-2024-41667](CVE-2024/CVE-2024-416xx/CVE-2024-41667.json) (`2024-07-25T12:36:39.947`)
|
||||
- [CVE-2024-41672](CVE-2024/CVE-2024-416xx/CVE-2024-41672.json) (`2024-07-25T12:36:39.947`)
|
||||
- [CVE-2024-41705](CVE-2024/CVE-2024-417xx/CVE-2024-41705.json) (`2024-07-25T12:36:39.947`)
|
||||
- [CVE-2024-41706](CVE-2024/CVE-2024-417xx/CVE-2024-41706.json) (`2024-07-25T12:36:39.947`)
|
||||
- [CVE-2024-41707](CVE-2024/CVE-2024-417xx/CVE-2024-41707.json) (`2024-07-25T12:36:39.947`)
|
||||
- [CVE-2024-4811](CVE-2024/CVE-2024-48xx/CVE-2024-4811.json) (`2024-07-25T12:36:39.947`)
|
||||
- [CVE-2024-5067](CVE-2024/CVE-2024-50xx/CVE-2024-5067.json) (`2024-07-25T12:36:39.947`)
|
||||
- [CVE-2024-5653](CVE-2024/CVE-2024-56xx/CVE-2024-5653.json) (`2024-07-25T12:45:19.830`)
|
||||
- [CVE-2024-6589](CVE-2024/CVE-2024-65xx/CVE-2024-6589.json) (`2024-07-25T12:36:39.947`)
|
||||
- [CVE-2024-6972](CVE-2024/CVE-2024-69xx/CVE-2024-6972.json) (`2024-07-25T12:36:39.947`)
|
||||
- [CVE-2024-7047](CVE-2024/CVE-2024-70xx/CVE-2024-7047.json) (`2024-07-25T12:36:39.947`)
|
||||
- [CVE-2024-7057](CVE-2024/CVE-2024-70xx/CVE-2024-7057.json) (`2024-07-25T12:36:39.947`)
|
||||
- [CVE-2024-7060](CVE-2024/CVE-2024-70xx/CVE-2024-7060.json) (`2024-07-25T12:36:39.947`)
|
||||
- [CVE-2024-7080](CVE-2024/CVE-2024-70xx/CVE-2024-7080.json) (`2024-07-25T12:36:39.947`)
|
||||
- [CVE-2024-7081](CVE-2024/CVE-2024-70xx/CVE-2024-7081.json) (`2024-07-25T12:36:39.947`)
|
||||
- [CVE-2024-7091](CVE-2024/CVE-2024-70xx/CVE-2024-7091.json) (`2024-07-25T12:36:39.947`)
|
||||
|
||||
|
||||
## Download and Usage
|
||||
|
168
_state.csv
168
_state.csv
@ -54630,7 +54630,7 @@ CVE-2012-3148,0,0,732839a00cfd9bdda703408b26e8ed6eafb432e01415fd2f3ed23a04016cd4
|
||||
CVE-2012-3149,0,0,6970b0df1a9ca1d3084e56a4b488a39f914051e29e0f00c13ce301698819c523,2019-12-17T15:25:27.643000
|
||||
CVE-2012-3150,0,0,b17f58d55ec260e217d4333ee3133f8d76e7bdbdac13b483cfb443d5a714db65,2022-08-29T20:56:10.397000
|
||||
CVE-2012-3151,0,0,55a058993d122bda5cfb8f2c4957e268a8091c6553efa4be9cd157ab956239e4,2013-10-11T03:44:26.287000
|
||||
CVE-2012-3152,0,0,d477890f67d08313a851d8a4a81f2a3639bee5b814e91822470e70ded0c99da9,2017-08-29T01:31:49.993000
|
||||
CVE-2012-3152,0,1,0c3328208a3aca25ec708e000f21db8b26c3be4787794edcb5ac89c1895b8e0d,2024-07-25T13:48:04.847000
|
||||
CVE-2012-3153,0,0,c92d9c9a5343fda3bfb8fde50e9c143d86c160885e6cbf0e7ce9c5c5fcd4b7cb,2017-08-29T01:31:50.057000
|
||||
CVE-2012-3154,0,0,118ec05c13da0f0b40b5fea7905a3119a3101eae6dd7d65be7fcc3dad0402ce3,2013-10-11T03:44:26.507000
|
||||
CVE-2012-3155,0,0,45d60f73ebe35d94b58549a3502525ab7fb65d1660288c3d06cc1cc54cf58264,2013-10-11T03:44:26.633000
|
||||
@ -90202,7 +90202,7 @@ CVE-2016-7251,0,0,07de8dc4f852ba1e9e87207e1275b09dac7989aa24d20af1cf4d2fd835ac6e
|
||||
CVE-2016-7252,0,0,8f02ba49da7a4ec39a1e008a10fd32328d9cd9121ddbad53fb1b67deab0d3b88,2018-10-12T22:14:25.437000
|
||||
CVE-2016-7253,0,0,3690c09ebeda287d940b3c5e0a9cf0153589d08ce6d0bb477dce9e419de2cafc,2018-10-12T22:14:25.703000
|
||||
CVE-2016-7254,0,0,f550693366ee4923a06591a8e6de88b3eb563a4eb476632fb507c43beb1ff170,2018-10-12T22:14:25.953000
|
||||
CVE-2016-7255,0,0,091b1786571c88ffdf2ae56da52238f0414d80c440045147c583e2f7dba90607,2018-10-12T22:14:26.237000
|
||||
CVE-2016-7255,0,1,df86a7f298d265d02d90da8deb8c839a1e993dc49a362c53fc8a78d12a0cb7de,2024-07-25T13:56:42.057000
|
||||
CVE-2016-7256,0,0,15d3b7de56fa5777f16cf83798319a5f5e235a25876f626e37ad14782dd22c92,2024-07-02T12:58:59.060000
|
||||
CVE-2016-7257,0,0,24d9aad80e16bc3a4c2e63f2fed4f52d316a0d45ab5fb46717793fa9af3ad76c,2018-10-12T22:14:27.517000
|
||||
CVE-2016-7258,0,0,1ffae5fd1d009d9ce4f5c36f94407d1aa57df7fc508bb0b87647a0daf679dc67,2018-10-12T22:14:28
|
||||
@ -95688,7 +95688,7 @@ CVE-2017-1177,0,0,b5efd601f1a05116335552f23cadf9475d7bdc24e52e8a9866dd055fbcb80e
|
||||
CVE-2017-11770,0,0,dc4428c324d156a985f1ff905ae038d2178aae3c4b30d9e0a24bd73606a01156,2019-04-16T20:01:07.733000
|
||||
CVE-2017-11771,0,0,735c97d9bb3e38f022b05e80e9b72f93e0a1d22a3a78f3cb2a9fda5e5fa7078c,2019-10-03T00:03:26.223000
|
||||
CVE-2017-11772,0,0,2f9ce76708448d5fc60608c5ec2347bc761076823702379e20c76ef3c11eb8c1,2017-10-20T13:37:34.603000
|
||||
CVE-2017-11774,0,0,8b2b4f980deb3eb4472b9e00bdaae42113bac4226a1686785706db9910717ace,2021-08-30T14:28:30.737000
|
||||
CVE-2017-11774,0,1,ba18ec1616a914f8d01c8309b89d47b8f053365afb678d1de06443305f39c336,2024-07-25T13:42:48.707000
|
||||
CVE-2017-11775,0,0,ab5841eabaf6ece5cb1ac7099b8f7f7964aabd7b81ce623e0acf0eef71e7190c,2017-10-20T13:27:13.730000
|
||||
CVE-2017-11776,0,0,74dcf2a044291d00c2cef8ca61f9eb729a4a5ffadd30ef4d6d11706a8a95d7d3,2017-11-03T16:18:43.790000
|
||||
CVE-2017-11777,0,0,5a1ac8e8bde0f8ef00c904fb38c4cda6ad7db65004a4cff7b18890a803a34ff2,2017-10-20T13:27:00.853000
|
||||
@ -105868,7 +105868,7 @@ CVE-2017-5634,0,0,8681204f66f1e5daa436479e65c62a254601945aaace0acd5aa225f47b1c6d
|
||||
CVE-2017-5635,0,0,ce85fdd2d8fb6256be1adb60e15f7ae9fcf5bb08abe059283ebb90b416a18ca7,2019-10-03T00:03:26.223000
|
||||
CVE-2017-5636,0,0,da15186947abc3dd02d00bc523083c143a22fa87f2cf2caa633fd940434513e1,2017-11-07T13:52:00.423000
|
||||
CVE-2017-5637,0,0,178fbc5f84b0ced7fdb4b2703233a1cfcd6889f484425edc497676c188b4f09d,2023-11-07T02:49:27.780000
|
||||
CVE-2017-5638,0,0,b6caec6648b827a7b70feddfcc4588ba3ee470ce7f25f54b6c0be45fe5bc5763,2023-11-07T02:49:27.957000
|
||||
CVE-2017-5638,0,1,2d481c0f084e830b63d0f605125a6c560492a6ea5f6908ce74e868b1ae9ceb73,2024-07-25T13:58:42.913000
|
||||
CVE-2017-5639,0,0,462a0f7c78ab8086edebd9f13969ca06172b26aeaf48715bd8ef53f97b1e42ea,2023-11-07T02:49:28.107000
|
||||
CVE-2017-5640,0,0,3a2b2af3dda8acc621d49785ce2f904b9ef980a1cf484620cd3202f2315b00be,2023-11-07T02:49:28.357000
|
||||
CVE-2017-5641,0,0,ddddaf9c8edcd1f950abc4d2bfd7bfb9fecd65bd2633d3f4e705568d57385d3a,2023-11-07T02:49:28.413000
|
||||
@ -109565,7 +109565,7 @@ CVE-2017-9801,0,0,3a54093ea736d5a0e30829805636ef1cb3d79e3a6d31f3beb661854399464e
|
||||
CVE-2017-9802,0,0,3cdd28d95b70cf9d9da69844949a45c92764d9a83772befd6ce766c1d9a1b62a,2023-11-07T02:50:53.480000
|
||||
CVE-2017-9803,0,0,70bfc4d0b80906b7e541ae79c4b23114b0b8e7dcbb7102a3ed45e85e05505704,2023-11-07T02:50:53.537000
|
||||
CVE-2017-9804,0,0,582acc236bde4d1385b350146750e311f729169d297cb4025c648a4d587ea7b7,2019-10-03T00:03:26.223000
|
||||
CVE-2017-9805,0,0,d39a54b4a3ed157cafc4929e086329940dec9ef45b00814a35ecf400d65c8cd6,2019-08-12T21:15:15
|
||||
CVE-2017-9805,0,1,cf35d631a0a5982ea5bf0e626f505d885be500095f9b3f3e9ef9a0d1b85b6644,2024-07-25T13:40:54.857000
|
||||
CVE-2017-9806,0,0,e3e196b8ef878ba193a4a32cde4f2c64a33f3b73052c7abdaa6bd842a58664cc,2022-02-07T16:28:26.933000
|
||||
CVE-2017-9807,0,0,92539cdd42a2cbe0edca4392cda264ee66158db99c31ee02bd14f2f368b86419,2017-10-13T01:29:00.927000
|
||||
CVE-2017-9808,0,0,11ee9a9e4386545a63ca4ddca0d4d7542f29659bdd5807a37a54e1cf3b40214d,2019-05-23T13:11:02.273000
|
||||
@ -110495,7 +110495,7 @@ CVE-2018-0798,0,0,fd8ff0498648651caee61a37b7ce21ce567fc19f8c7b32789e12fe2e4c78ed
|
||||
CVE-2018-0799,0,0,93a19ef649c5f859d878f4d15c302f54b49cbc0c417ae15fed5c1ac9da83d6bd,2018-01-29T15:58:50.593000
|
||||
CVE-2018-0800,0,0,af6bdbeba375169c2516bd5860cdd8dc799333cce29a5dd00ca73507df404ebb,2018-01-17T16:06:34.300000
|
||||
CVE-2018-0801,0,0,dcf255124e7e333ddb006c356dcd029e89ebac47171c8b628d62aafe9a650b0a,2020-08-24T17:37:01.140000
|
||||
CVE-2018-0802,0,0,8968aab2506b830abc5ccf77249245be1417c2cf63611d5c5059663a13423d65,2020-08-24T17:37:01.140000
|
||||
CVE-2018-0802,0,1,4a9a6439dc0e21d11fa0045ca2086a8930a1b4398b0352bb62d5c2189b9c0d16,2024-07-25T13:45:59.623000
|
||||
CVE-2018-0803,0,0,1539c2f5ea35f98ada31aed5f5b1d97b8ead8204e810b7aa4db5489d88582653,2020-08-24T17:37:01.140000
|
||||
CVE-2018-0804,0,0,6e64f0e7ff40d9d5eb7fbeba80f429a52736290f14f4a4792303da7b52effe45,2020-08-24T17:37:01.140000
|
||||
CVE-2018-0805,0,0,70dd103e8156a5dd421a788834e6a0f125e2333be2dd6ed40d99c6d89183efdf,2020-08-24T17:37:01.140000
|
||||
@ -124913,7 +124913,7 @@ CVE-2018-6785,0,0,f73df0c8f751db98b890c7fb9908bd0b404676d0a04f72285b4014b5f1705a
|
||||
CVE-2018-6786,0,0,fc4e48510f5cf392d96cf3d3372856f250e92326633c58a45b1261817813916c,2018-02-22T14:27:34.793000
|
||||
CVE-2018-6787,0,0,bb25f0935a7ce3002f44f9be32c33fab9bf2a57c69896399186053a7646ce898,2018-02-22T14:27:38.497000
|
||||
CVE-2018-6788,0,0,a784d0a3b892574ff190613030e026cc5943158e94e0a0f4d8fb3154d7e22cf0,2018-02-22T14:26:35.557000
|
||||
CVE-2018-6789,0,0,747bd1c1dc6e71567d1c08628ed446a6748660aa37bddaca2281b5211c2244f1,2021-06-03T18:15:07.720000
|
||||
CVE-2018-6789,0,1,155cea5470c45cd2d4406c493055d06fd701b853db2a229ed5b2ca441ab0eb3d,2024-07-25T13:47:22.850000
|
||||
CVE-2018-6790,0,0,85bc94e88d04b645811d24428d2c1d667b725b916dffc66788d57298294b2f0e,2019-08-06T17:15:39.307000
|
||||
CVE-2018-6791,0,0,77cfc85c653a13a3806cd39422f7ebd2db9f21bcec2b644978b66cba890798c1,2019-10-03T00:03:26.223000
|
||||
CVE-2018-6792,0,0,93a4eaa9e747de2ede1571ffa954cc77674ae8f6d9c119f09985e036cd2964ed,2018-03-01T15:25:57.807000
|
||||
@ -240573,7 +240573,7 @@ CVE-2023-6964,0,0,6b353abfee4e0f60ba07ed53b519d8cdcc5c6e3e583c876cd6af699df966c5
|
||||
CVE-2023-6965,0,0,f49ac78940fe244c72647e51516e80a6e573f5fa400fc7065d825c4c692cabcd,2024-04-10T13:24:00.070000
|
||||
CVE-2023-6966,0,0,9a012b06da86b8f395f403fc3c8f5013317bd371eadeddb21759c85700f73992,2024-07-15T18:55:57.513000
|
||||
CVE-2023-6967,0,0,7fa49a7c16574cbfe3664c75658ac16ae96710a4d17734528b42e15e81f0ce19,2024-04-10T13:24:00.070000
|
||||
CVE-2023-6968,0,0,a4751c3d52b515d1d942809757ebd5c330a2b3fb28572a1d55882f3452313b5b,2024-06-06T14:17:35.017000
|
||||
CVE-2023-6968,0,1,660880bf3585104149b43896964e50abfbe0de221bb4b1048e46c5941eca859d,2024-07-25T12:48:56.047000
|
||||
CVE-2023-6969,0,0,28305747d8b707ea006f2410a4d39a2af33e21a9599b2601ee1414912a46183e,2024-03-13T18:16:18.563000
|
||||
CVE-2023-6970,0,0,f04ab87a1b089d8446df3edb8ad738caf9514f7c93e8d28cbff976bc6db6184a,2024-01-24T20:48:25.003000
|
||||
CVE-2023-6971,0,0,dbf2002d25fe2863f3f7217440bd5fd57ee5f38811b51e99bf0e4a7034176303,2023-12-29T06:21:25.760000
|
||||
@ -240831,6 +240831,7 @@ CVE-2023-7264,0,0,51dd8b83703649c91504628a1d95022ef41c77d28d8363a527e775cafaba15
|
||||
CVE-2023-7268,0,0,c61b2680229d9fa33f1c954c8726fa832de0e98c894a6bedd271579a687f7cbb,2024-07-19T13:01:44.567000
|
||||
CVE-2023-7269,0,0,3f1411775e418b1331660b2e2f08e21ffd79ce221427bae98ae26bf35cbe5cb7,2024-07-19T13:01:44.567000
|
||||
CVE-2023-7270,0,0,3d7ad3a206c04c3798343468b0d534eca04f86eefe46ec321113ac7e2ecdcd6a,2024-07-04T07:15:10.497000
|
||||
CVE-2023-7271,1,1,3e307303c92928740949f0130fc49de091c30f6742adc012d6c4aaa808a584a9,2024-07-25T12:36:39.947000
|
||||
CVE-2023-7272,0,0,cc43888de86ffd529fd218a38f2e0a497e79588d2ca6b5dec5063052cab77d6c,2024-07-18T12:28:43.707000
|
||||
CVE-2024-0006,0,0,ad936d6110273ab63552e81bb6d0ac8ad8706e8706811fa2ef455d43c6091213,2024-07-22T13:00:53.287000
|
||||
CVE-2024-0007,0,0,7ce6d28a77975ceb6f0211a30f9905d648e1a7e8a675821fe7be046691ac9f83,2024-02-15T06:23:39.303000
|
||||
@ -240984,7 +240985,7 @@ CVE-2024-0227,0,0,a4e84e1b9f9ff8bb72dc26c9ff00c9b99f09150a51fa56e523e138aad08ff0
|
||||
CVE-2024-0228,0,0,fd96fc161d3d60477c711a5fbf3929339bbdfc61029c2327b7af9a111ceab709,2024-01-09T17:15:12.223000
|
||||
CVE-2024-0229,0,0,6602b8ec5feb6956074bc84551508bf34334ccf644b16f57e9c8158e1fe1529f,2024-05-22T17:16:11.003000
|
||||
CVE-2024-0230,0,0,24d638afd0420bef6a46df36ab91db6a8f8e82d99d85e08e0b6837b09034d463,2024-01-19T18:35:52.493000
|
||||
CVE-2024-0231,0,0,3592f179b116fea396ee0af63f0bfa7a66b9e111d9f4f63aa01e97f75c2333be,2024-07-24T23:15:09.340000
|
||||
CVE-2024-0231,0,1,0b1f359d05b991116fd20e65902981fd9d93a2d134a95a3df9e53716cd7e8a2b,2024-07-25T12:36:39.947000
|
||||
CVE-2024-0232,0,0,50f8b538617e3018d181a108bdc49b9892bbe872fc5ca5e706ebe486bdd760be,2024-03-15T11:15:08.560000
|
||||
CVE-2024-0233,0,0,d56b903220eef660a47b790a5d6791a2bbbbf0dd9be28166c548968d23c1254a,2024-01-19T14:28:14.077000
|
||||
CVE-2024-0235,0,0,615010b7812a96135df60a4a20a410f40f762c1296d8ced3aa653a835b32a371,2024-01-19T14:28:22.047000
|
||||
@ -241617,7 +241618,7 @@ CVE-2024-0906,0,0,ecd2a3754eed82a083b40796214258d51b38bf0df2a24b6927463849671545
|
||||
CVE-2024-0907,0,0,1364bca6d0570882150b59a3486f38c7119a748222b12a5aad50b11063b7c472,2024-02-29T13:49:29.390000
|
||||
CVE-2024-0908,0,0,c4bed403e2f7a7c69654d60d6e8a1177e48925d40e212c09088c91c7af3e68ba,2024-05-02T18:00:37.360000
|
||||
CVE-2024-0909,0,0,c5f806ecbe49cf4ad26e2d68fa67515c4aae5c3e1fdea5f15704815c4a050c84,2024-02-08T20:07:51.410000
|
||||
CVE-2024-0910,0,0,cb885e5e2eb37952f8b4fe4df551067b546fc16826c2b014e57145c3c3b9f149,2024-06-06T14:17:35.017000
|
||||
CVE-2024-0910,0,1,b96b516432c77dd0f5a3feaac7c2dbb57d041f36982c0161d27cdc867ac5d197,2024-07-25T12:52:10.070000
|
||||
CVE-2024-0911,0,0,eaa26f2f67e50e20256c589fab58ca11a8ca23f334767d77744b980dbb115d3a,2024-02-14T18:15:48.077000
|
||||
CVE-2024-0912,0,0,3908c827becd344604b3097cf0917df58a20276cc839d1aa1cc7b2ff97eb3746,2024-07-18T18:56:17.547000
|
||||
CVE-2024-0913,0,0,a4286c53265bdc9941d1a0e8a2b4cded325439db1965c3ecb938d791912ee424,2024-03-29T12:45:02.937000
|
||||
@ -241674,7 +241675,7 @@ CVE-2024-0967,0,0,253affdacf77d7113a7d67308592643957bef7f401183b36849120592d1636
|
||||
CVE-2024-0968,0,0,2adf6f675fe8367153779cf53407f6187c199dacca5503cf3367ddd720d368df,2024-04-08T11:15:49.610000
|
||||
CVE-2024-0969,0,0,4b15fb9fcc9f1de6dda40e4542fcbbf87d86fef0cff6f1d3f8f2a6ca2f7c00b4,2024-02-13T19:44:42.503000
|
||||
CVE-2024-0971,0,0,88718d312c26bf915d98212b01d4b46ae3d1c0d4d3f75eab0b87fa75b2f6d995,2024-03-04T22:58:00.967000
|
||||
CVE-2024-0972,0,0,6d081f05093e58d9dc10bca8d35d9b39f6ea53215294616b1f838864ca5f6685,2024-06-06T14:17:35.017000
|
||||
CVE-2024-0972,0,1,2da1862f52cff62e6b3fe86a9a1b8df8664a0564b3dd76e9d8c8b90f9f4f4621,2024-07-25T13:04:13.057000
|
||||
CVE-2024-0973,0,0,e5fb6b4d7ce253b144fdf362ec0f968de6ca466dcd6c3adca143df6bc6e05926,2024-03-18T19:40:00.173000
|
||||
CVE-2024-0974,0,0,27c177dc86dc0d7a1d035f410f40a9cb078df941228e5de284f0e0036f520990,2024-07-12T16:11:22.950000
|
||||
CVE-2024-0975,0,0,a15795e0a44b97545f6c3eb65673627e835a4d9230308268959e3a930cb2bd74,2024-02-28T14:06:45.783000
|
||||
@ -242714,7 +242715,7 @@ CVE-2024-2013,0,0,aefc6eb68e306e4a20fc38a6af2d431b70230e994324d4a86b2abf95d7edda
|
||||
CVE-2024-2014,0,0,97c4d99afb7da491efaae3ff0fb6836102849098937eeb69745707d3dbc15b2d,2024-05-17T02:37:59.427000
|
||||
CVE-2024-2015,0,0,bb3d603120b99e575edb7baace469be8f767dc6e32ed33cf2700f4d2936e46ac,2024-05-17T02:37:59.517000
|
||||
CVE-2024-2016,0,0,8c172ad566a2e375a3ac2c22bb48a79ffa778559105a1fd5ded9fbaceb4cfb2c,2024-06-04T19:19:12.807000
|
||||
CVE-2024-2017,0,0,733075bc65b00c2e15c6055bbf078e3cafa03a1ef7a0517a28c77d1d4aceb5fa,2024-06-06T14:17:35.017000
|
||||
CVE-2024-2017,0,1,933e8ff636fe2ab7cb46d071d13f27b7e4e9cc524571c8399c505c71019f64e8,2024-07-25T13:02:47.370000
|
||||
CVE-2024-2018,0,0,b0f9ae0369953ccbca640cf5f49daa4b77f77d07b56365b607aeded37791144d,2024-04-10T13:23:38.787000
|
||||
CVE-2024-2019,0,0,53248e55dd95cbc64e231f2f90de793159d4e7b2f316ab08d3d75b38eceab44b,2024-06-04T16:57:41.053000
|
||||
CVE-2024-2020,0,0,327bb7f0a8d2adb19b6b9d8647efba4c5092a1dc3ce0e1ddfbe9d6570932d024,2024-03-13T18:15:58.530000
|
||||
@ -243763,7 +243764,7 @@ CVE-2024-21678,0,0,cb3827f1e523b06b300224171594f9fd4e5c2622fa5d40070141728fc7783
|
||||
CVE-2024-2168,0,0,74490de60c08e043593352cd4979e484251e5c8cdc32185131e72bfecce0dd0c,2024-05-17T02:38:05.397000
|
||||
CVE-2024-21682,0,0,ea94962fb19bc771b1e7e5a4a1b57027a5c5c8b332b79d32007472ab6d5177d5,2024-02-20T19:50:53.960000
|
||||
CVE-2024-21683,0,0,9e98100df1746075be9f809cd7f00fd6b0e3e97382e91b70d2a85ac430e36b94,2024-07-03T01:46:45.440000
|
||||
CVE-2024-21684,0,0,033d0c2fabc1d276dc5b62b7abcda94db7f8ee0250b414706e22682d08c59c20,2024-07-24T18:15:03.793000
|
||||
CVE-2024-21684,0,1,38895b1f4cf0d220e88e468f430cc16bd239496d7cb5e201c757adb6991a236b,2024-07-25T12:36:39.947000
|
||||
CVE-2024-21685,0,0,5660fcc85eb1dde5c65259d6d6205ae74624ad923dcf6470bb4f3577f99d7f00,2024-06-20T12:44:01.637000
|
||||
CVE-2024-21686,0,0,4a77c3c56e7b5b00a78de09ce573bf8e0630b6f60379d0ccdce9209c8559bd43,2024-07-17T13:34:20.520000
|
||||
CVE-2024-21687,0,0,7f853701aecb2ebf7acbec91687c790cb83db5ee246802aacc74de3322b22abf,2024-07-17T13:34:20.520000
|
||||
@ -244886,7 +244887,7 @@ CVE-2024-23492,0,0,46751fe2061ad3facdf2aff38df0184415be7875a8a3492c12dafb804ab2f
|
||||
CVE-2024-23493,0,0,41faef1e9094c06fb658ed025cd0528960b3cda2fdce17eb6a2104883c4041b9,2024-02-29T13:49:29.390000
|
||||
CVE-2024-23494,0,0,1761cecf4d1aa42fc2142275287576a82851a4af1416d215b879da20539b4bb7,2024-03-22T12:45:36.130000
|
||||
CVE-2024-23496,0,0,c3856130b65624b5767002912c0501b965e2549e4b94367c7a809441839aa00b,2024-02-26T18:15:07.580000
|
||||
CVE-2024-2350,0,0,ef4f7558db79fa735188adfbcb60e3e2eeda68135435149c8c977ee2f420458f,2024-06-06T14:17:35.017000
|
||||
CVE-2024-2350,0,1,b224bf65ace6a631c4679b3350fe7c7082c8e455c9408f918ff58e10f6a6fd6a,2024-07-25T12:57:24.040000
|
||||
CVE-2024-23500,0,0,9f0ca72522aa1768710bac3d52af84b3704000817095134026ac1a86c6c1c178,2024-03-28T12:42:56.150000
|
||||
CVE-2024-23501,0,0,e5aebbfbd9d9417005e3d705da6a35d8860fa8db7dc1ef11a82d27e4462980c8,2024-02-29T13:49:29.390000
|
||||
CVE-2024-23502,0,0,83d1eff93264c02df77da434637a6f1d78b39d6668a422c92b943a584897b606,2024-02-09T14:46:17.743000
|
||||
@ -245600,7 +245601,7 @@ CVE-2024-24721,0,0,f12e91432517af5c3cc6447aad0467c1bd7f0eb543342bb75a7b5b64e02e4
|
||||
CVE-2024-24722,0,0,5c00076d5903b9adf702f9584a80b15289fd6952952bdabe5514eebef63f696b,2024-02-20T19:50:53.960000
|
||||
CVE-2024-24724,0,0,49e36beb0292b27c4af21607f62c8098e243af86c10e87204060b3a2a9eb0caa,2024-04-03T12:38:04.840000
|
||||
CVE-2024-24725,0,0,fa4c4ce65e4991dcf18e22afc18c407373bea4c35493c8cf2afcfe5d0757cc18,2024-03-25T01:51:01.223000
|
||||
CVE-2024-2473,0,0,f62e0e8505793d4599425cd8ceed5dbed4de5d864d9ecc6cd7e97fa88e353812,2024-06-11T13:54:12.057000
|
||||
CVE-2024-2473,0,1,b1c39f683d6b313337fd343b6b650f75d80b2d74ff0a3d50cf1f445968eec6c2,2024-07-25T13:25:04.520000
|
||||
CVE-2024-24736,0,0,314fd4df2659ae516d75e93823704bd217b531c9ea252f3ea384402e73f605e1,2024-02-02T02:08:23.417000
|
||||
CVE-2024-24739,0,0,e6ef264a93a50eff13b25a0b1f96966e49da366ebdc1c075ecbe225ac111b0c5,2024-02-13T14:01:40.577000
|
||||
CVE-2024-2474,0,0,e295561a11995d9c40e939a773b47208b6445581a981c9a04645753adc140ddf,2024-03-20T13:00:16.367000
|
||||
@ -249734,7 +249735,7 @@ CVE-2024-30468,0,0,657b19720c7a7f72ce29247c42940126c9b095c85b3af6afa14cec4927288
|
||||
CVE-2024-30469,0,0,5f60e05589c3ee2464f9657ee501b05ffdf6e5d6a13b3d79ce37326fbe7f6667,2024-04-01T01:12:59.077000
|
||||
CVE-2024-3047,0,0,b22e2b3bd3f2ea2e1a9b8967138f5d24af468217212d0308948532706a31b398,2024-05-02T18:00:37.360000
|
||||
CVE-2024-30470,0,0,48e5d66dc273af24da4e4b7519926c3e97f1d38856b041954b60e69533ae4645,2024-06-10T02:52:08.267000
|
||||
CVE-2024-30471,0,0,238195cb7683eb4a42e80d113f36bafcf9aee3d28b09318cbb422d4ffda21b8a,2024-07-17T13:34:20.520000
|
||||
CVE-2024-30471,0,1,79659bf7d789b82a7e19ed443423e3fa13ec0376dddc72d808cfe63edcab7726,2024-07-25T13:39:17.913000
|
||||
CVE-2024-30472,0,0,00bb1b58fdab892a36ea40136ac2fa59e308dd9cc355f92e428b81257afaa77e,2024-06-13T18:35:19.777000
|
||||
CVE-2024-30473,0,0,cc643ea6610c054923dcda820bdbaeee3470f2fed9befe993862cdd8d56027e3,2024-07-19T13:01:44.567000
|
||||
CVE-2024-30477,0,0,2a9c94bd63166efd66be5d42497334130f49f4b0acff68b2e8385a53a877c218,2024-04-01T01:12:59.077000
|
||||
@ -250693,7 +250694,7 @@ CVE-2024-31971,0,0,c01103c7a27f61a563b001c647885d07de844f2c03f92bb191e43610aaea5
|
||||
CVE-2024-31974,0,0,eb64c7f63099840683d53752791541217d3c4d0792dfc9b0d9b46ea3d72b30e4,2024-07-03T01:55:41.323000
|
||||
CVE-2024-31977,0,0,2e845dd8e2dbf0b94e2238c6740554d5934910b7cebbf8cf7289ad0332368bf6,2024-07-24T17:12:32.367000
|
||||
CVE-2024-31978,0,0,e4cc4367e420e8dcd4ef937e3967f9710a2baec19b8785bc53e2d6ca59645c6f,2024-04-09T12:48:04.090000
|
||||
CVE-2024-31979,0,0,f9deec5ae1bbbfb21f2bdc6463cb5006e2e3b0c363609d81cd2769fd53ba3bc0,2024-07-17T13:34:20.520000
|
||||
CVE-2024-31979,0,1,e93fa35c4ec6bcda67006b59383a9c622c442c60b97962ab4ca126b51f4ba81e,2024-07-25T13:38:56.897000
|
||||
CVE-2024-3198,0,0,1f0d31c07f6270b253d2bb83c7332c7bc9f718736230fc6377e93749d92894d3,2024-05-22T12:46:53.887000
|
||||
CVE-2024-31980,0,0,8ab930dfc3ea6340441974ba1513ac76de68c0a2890d2d81a8d5be8805e25064,2024-05-14T19:18:31.490000
|
||||
CVE-2024-31981,0,0,f2d3a632894e526ffc79a652f25d3a7da1db8610794379510e264c8e37958abd,2024-04-11T12:47:44.137000
|
||||
@ -251690,7 +251691,7 @@ CVE-2024-33515,0,0,0a29698b566d1ce96badc6c9dd3f9a2648c522eb6b37724b52074d909a3a4
|
||||
CVE-2024-33516,0,0,2a125f75033a85309256af5b7bcbd9cab289bd0eb807ee2035c6ab7d5101ea26,2024-07-03T01:58:22.457000
|
||||
CVE-2024-33517,0,0,825ccd60c40de640bc82816af8a7f66687631cc679103ccdd5ad49c6ebb772ea,2024-05-01T19:50:25.633000
|
||||
CVE-2024-33518,0,0,84ccf326440e53cdc178e6fa27177ba3577a132315b02d47fe46572cfd6ace26,2024-07-03T01:58:23.150000
|
||||
CVE-2024-33519,0,0,d60c79dbd3d2c033476c6aa697685627904c4f0e1ebdb3fc9445124d7147c90e,2024-07-24T20:15:03.640000
|
||||
CVE-2024-33519,0,1,59fd839d628cf730bca214c2d6504e3272b22a5cf272dd2492829adc807f0510,2024-07-25T12:36:39.947000
|
||||
CVE-2024-3352,0,0,be8f28061e5ae4d9d9b2e6a11ede257adb292cc79dc8c4235b725fe02c0776ab,2024-05-17T02:39:51.777000
|
||||
CVE-2024-33522,0,0,99fcc369cb1d7d030860e4a6a89738f8fddd8cc3ac74b8b631e1a59fe3215895,2024-04-30T13:11:16.690000
|
||||
CVE-2024-33525,0,0,2e71eaad279c374a12f668d097a9cb7bb1826ead20d625216f803275f1d12777,2024-07-03T01:58:23.960000
|
||||
@ -253024,11 +253025,11 @@ CVE-2024-35733,0,0,f768e378b78ddbd5bf5896dbc23e3e8053bbb605f8234ac257e9950048828
|
||||
CVE-2024-35734,0,0,8bb03f84519a1d3d44c02c94cda8b87a1d42d1f14ac46e034c223fcc323146e1,2024-07-18T16:28:21.817000
|
||||
CVE-2024-35735,0,0,62b930331700efebd8687438f856d220eed4a951459790e435c2059f637d7605,2024-06-12T16:26:08.450000
|
||||
CVE-2024-35736,0,0,711aab1a9c48068e8f7b91881a4d282ca9326016a3e7dd35e9aa4632ac5ca1f3,2024-07-18T16:29:28.607000
|
||||
CVE-2024-35737,0,0,ea1d4bc45fbc96c9dad103849bbd7143efcf5484e2478a5bbe94ba2f5f8dac3c,2024-06-10T02:52:08.267000
|
||||
CVE-2024-35738,0,0,2eab6288af9a85fa788a9ab73a939f337697cb39eb88d19480b2c5d875b6a5f0,2024-06-10T02:52:08.267000
|
||||
CVE-2024-35739,0,0,43f4044eca114a3413cc521d72bc767dc68665c3dce3c35fb421e32e5cfb0486,2024-06-10T02:52:08.267000
|
||||
CVE-2024-35737,0,1,88cfdb0a41471ef51113ede55c3ff2c7542d18bceb4ee23c63c98a65e1e0e25e,2024-07-25T13:07:47.233000
|
||||
CVE-2024-35738,0,1,dd52917df205822aa2c0e1e5a75b617767a0ba59797c70b3a4a4ac80cebef7b3,2024-07-25T13:08:32.617000
|
||||
CVE-2024-35739,0,1,2db52c49e8f503106364f541851e1ef7c57f86d968e247fe70b26ff65e6a3187,2024-07-25T13:09:33.943000
|
||||
CVE-2024-3574,0,0,fdf6368eb343b1cfef30906f52798b661fa8a26cd0269be1d79674f9e7728b69,2024-04-16T13:24:07.103000
|
||||
CVE-2024-35740,0,0,46cedfc81434e65c916ed20f3d4fdf9ac75c39b513ce2084a7fb7746bd26cef2,2024-06-10T02:52:08.267000
|
||||
CVE-2024-35740,0,1,401554f561e7efafd58ec36e8a5992457a4c0105d9f97aed3cfe1b7ecb1c9553,2024-07-25T13:10:22.557000
|
||||
CVE-2024-35741,0,0,20acab16de95803defdbc5fba79c812c48d55ec4a7c8007fc65bb01c7ff0c2dc,2024-06-12T17:54:46.150000
|
||||
CVE-2024-35742,0,0,70d70e160eb76f9d84b3c6a2a2bfa0e4e377d0cd0e859c5bfed2c807dd69a4b1,2024-06-12T19:32:19.827000
|
||||
CVE-2024-35743,0,0,367d5c8c43acd2a35f618e9e43308a8fecadb7e17d24accc6800bd96761cf1cc,2024-06-12T17:42:56.900000
|
||||
@ -253040,8 +253041,8 @@ CVE-2024-35748,0,0,0d0ae6570b9b5dd7d8320e68cedce9cf69c0c9ccda564604cf2b92bad42c2
|
||||
CVE-2024-35749,0,0,3be9161c0f99f99e480b0f4d9d6c3b5b6bdb08738620c21eb9fc65f646cc2eeb,2024-06-12T18:19:55.050000
|
||||
CVE-2024-3575,0,0,7b73b64d176ee42e3f815efb129e0a4e8daabc141e22843995ce14322618115c,2024-04-16T13:24:07.103000
|
||||
CVE-2024-35750,0,0,337904e02d48eff7e7f71ff4e0b4d15f230905a46ebf33e9ed3f06ed45b6365c,2024-06-10T02:52:08.267000
|
||||
CVE-2024-35751,0,0,2f4b51636ece37d50579e65fb58d2700611ff65fd14c4b21be633ae796fa0057,2024-06-10T02:52:08.267000
|
||||
CVE-2024-35752,0,0,062777696b3e277bdd4663be2181ce3994f39fef6908c28ebd787d505d32576b,2024-06-10T02:52:08.267000
|
||||
CVE-2024-35751,0,1,101697b5bf451e180a159cfc87bcd152cec0359b270dfd38749557af16169787,2024-07-25T13:17:42.720000
|
||||
CVE-2024-35752,0,1,2959743628a1736f3c2cc142d9df4f39137eeb6a8e6aeb3884b9986bb7f210b1,2024-07-25T13:23:13.527000
|
||||
CVE-2024-35753,0,0,4ad7364fde338b1172d3912b082d48ff9c7e6bb90d9788eb462ee65f933adbdc,2024-07-19T18:31:44.157000
|
||||
CVE-2024-35754,0,0,6542d4ccfbee23f434dbe55310367fe2a58769f4413cd83c76145804203a6991,2024-06-12T18:19:06.043000
|
||||
CVE-2024-35755,0,0,2571e4c1c85d187483b8d6945db6f40920f15adf47a26bbdda7476c12f520093,2024-07-23T20:15:16.157000
|
||||
@ -253673,15 +253674,15 @@ CVE-2024-36528,0,0,2720657851e73513f2a766ff74bcbf76f8ccd5ffff5f964570f2d3734bd16
|
||||
CVE-2024-3653,0,0,2ce001c8a2558fa4f76ef87c21e8ceeb7eaae4cf2cb26c9cd78a019c19336759,2024-07-09T18:19:14.047000
|
||||
CVE-2024-36531,0,0,309244ba7df6e757b847511595184db51193505c4bbceece7db96d568b889d7a,2024-06-10T18:06:22.600000
|
||||
CVE-2024-36532,0,0,b051ad55854f4bc888db3a53610f7bcd9ed49e35c5868005d5e65395b423f5e4,2024-07-03T02:03:15.647000
|
||||
CVE-2024-36533,0,0,7caf29ed6123de0d689f704a3b91401a2d09000b2b4aae618d54c53a03a7b516,2024-07-24T20:15:03.903000
|
||||
CVE-2024-36534,0,0,47b2e78d72f7bd02a803a2d5686d98735bc06d44ad43437ccc9d04efec526a9e,2024-07-24T20:15:03.967000
|
||||
CVE-2024-36535,0,0,ba934554b33d635eabed1670346e75564abbba425228e7b83356f7c815ef0501,2024-07-24T20:15:04.030000
|
||||
CVE-2024-36536,0,0,81055ba9345781f5ac2845b9e16cd1860116e534627f5e505b90c732d23d0422,2024-07-24T19:15:04.293000
|
||||
CVE-2024-36537,0,0,ca15d636672c067611f82db6e8fed44b605c0751c3b3623ed5e71b0748bc3dbe,2024-07-24T19:15:04.373000
|
||||
CVE-2024-36538,0,0,68a27c850ff04774e300a8695ee6ca1ffa9c9c746aa07894c18d7b077245e44d,2024-07-24T19:15:04.487000
|
||||
CVE-2024-36539,0,0,1c06ea00d48a9cd0f3aabb67d1610f7b7cb65726a791ef13a8c51d92f718b2c5,2024-07-24T17:15:10.767000
|
||||
CVE-2024-36533,0,1,1205040237632adb8a3c93a382d514a5d5d6316cc610c8578c3968478d6b24ab,2024-07-25T12:36:39.947000
|
||||
CVE-2024-36534,0,1,ab12522f627b3cba39f87dce1551ce4d112cf52e6c10ca853202cfbcb092e1fb,2024-07-25T12:36:39.947000
|
||||
CVE-2024-36535,0,1,11f672d791f105a811d7af6721c8e114e00e9333dfbd773142111f9fd8133a1e,2024-07-25T12:36:39.947000
|
||||
CVE-2024-36536,0,1,7fe2c1a5a12e2fda22adfc2d8dbfc91319bc8e7cd5ac16b7bf38458ca4086ddd,2024-07-25T12:36:39.947000
|
||||
CVE-2024-36537,0,1,b6bc7f01b826e7e80a93d01e3d9ae1800e30d7599a8011d950c38a049eebe0f6,2024-07-25T12:36:39.947000
|
||||
CVE-2024-36538,0,1,aac4f9929cddecc0784b98831a4a3c3b2e94512ba7cc3c149bdb1ef3488e9f91,2024-07-25T12:36:39.947000
|
||||
CVE-2024-36539,0,1,fd8e06c5a4aafc35fe5ea218ed9e25a0b2fb207d6af8477fc6df401a6d78debf,2024-07-25T12:36:39.947000
|
||||
CVE-2024-3654,0,0,a7708e7e436d988a91abde36ee9f26c2df705dde9b78c457b8712b905cf4dc6a,2024-04-19T16:19:49.043000
|
||||
CVE-2024-36540,0,0,4d633887b87eb1c8060a8e6786bca44ee4e71578563e85032fbd12a9e5e29066,2024-07-24T17:15:10.827000
|
||||
CVE-2024-36540,0,1,6eeb37da95be9363691e64f704f0832366ea0b62d194e2d6102f1975a215f8e9,2024-07-25T12:36:39.947000
|
||||
CVE-2024-36541,0,0,6a8a7f7727809c1260cd3b5c8c832484186631ab30a12c54c0721ce5292077c7,2024-07-24T17:12:32.367000
|
||||
CVE-2024-36543,0,0,dbb1c819537d5d2e6ccb57b6fa0d1307530721c713dab080cb8c7f78417a5f63,2024-07-03T02:03:16.430000
|
||||
CVE-2024-36547,0,0,63fa93ba07106c565a1033909cd3b8147be168386a42b3286a8bfe46cc4ab092,2024-06-06T15:16:11.897000
|
||||
@ -253981,7 +253982,7 @@ CVE-2024-3708,0,0,d5d3127cf1ebbe4d1277dc91ebc9f2ee01faea98cb7a29c27942fe94c97d6c
|
||||
CVE-2024-37080,0,0,f0a9bd7effb46ac30e1d20f1d1aa7a7b386c0ee7e62089b4e1cc310e9f341fd9,2024-06-20T12:44:01.637000
|
||||
CVE-2024-37081,0,0,1657c2c6215fa861c8bf708a3b65df9501dd8a14588c6f7d5718007f5ce77c8d,2024-07-03T02:04:05.970000
|
||||
CVE-2024-37082,0,0,cdf7ab7ec235a04ab3547ac9302ea8fb37a25e6b12903e2e739c3b31068e7382,2024-07-12T17:15:10.220000
|
||||
CVE-2024-37084,1,1,a9a415180d55f187a8422650468ec1e2da51490c6a9314421d241ae87e9f5117,2024-07-25T10:15:07.260000
|
||||
CVE-2024-37084,0,1,bb008f8c46408a7710cf451e2b0ae4252c58def74fe03a21a33d942184d931ba,2024-07-25T12:36:39.947000
|
||||
CVE-2024-37085,0,0,4b965e98ee84a1f21a1cc50472486b78f46c71d7d7f35fdfea4d6b86e3425175,2024-06-25T18:50:42.040000
|
||||
CVE-2024-37086,0,0,9068529bdb3d555265b7f816c31a19ade60e24d8cc46d6bccf0934fca43600dd,2024-06-25T18:50:42.040000
|
||||
CVE-2024-37087,0,0,cd5f38dea6878f55617a1348143830ab9f44bbdb4a44091efb0c0832c07fcba2,2024-06-25T18:50:42.040000
|
||||
@ -254094,30 +254095,30 @@ CVE-2024-37234,0,0,fea6d0a90424156a06bdb00d769e0d960a6f376259af6537661bd5a3b2a1e
|
||||
CVE-2024-37239,0,0,5b836970d9434edbdc8941839ba4be6185c3985b9f091c19c42c88993436d46d,2024-07-22T13:00:31.330000
|
||||
CVE-2024-3724,0,0,a45515256d1a21ae3fa37b44c62076cfa44f7692bce577ec434a496f38d89c35,2024-05-02T18:00:37.360000
|
||||
CVE-2024-37244,0,0,efa1ad686bdf9a11d96ee3945abc885f625d88132bd1e8e7c6ef92b04a9aaa22,2024-07-22T13:00:31.330000
|
||||
CVE-2024-37245,0,0,1b71bcd59f3ee99656fdc28662a51ee8a1a0e8c46d3d91d929fed484b775c78e,2024-07-22T13:00:31.330000
|
||||
CVE-2024-37246,0,0,35d6e9bcc0ad48ccb982f0bdc86e31489a40248124076526fe8fa8f47c13ccfb,2024-07-22T13:00:31.330000
|
||||
CVE-2024-37245,0,1,8626e25882ebd198de3d6126617dae182d8919ea6f8ef7871e0dcb2fe24a154c,2024-07-25T13:57:37.537000
|
||||
CVE-2024-37246,0,1,f9f8bdafd1958cb5c1daa37efa79cd775cf389b1f9af5ac8e8eb74aad2cdac69,2024-07-25T13:57:08.393000
|
||||
CVE-2024-37247,0,0,8228dfcf5cae02c0a86d645ad30e042bbfe31c09ad0d308292ed19a0aff45168,2024-06-27T12:47:19.847000
|
||||
CVE-2024-37248,0,0,02a07ebeaf12f56a9f57d183dc0eb9a1b36d4373e8e10165c77133b909c93eaa,2024-06-27T12:47:19.847000
|
||||
CVE-2024-3725,0,0,b3b29463d0daa3afb9af3d4851601af4b7e3fe7bc65e993937cf3285f5f421a7,2024-05-02T18:00:37.360000
|
||||
CVE-2024-37252,0,0,666ab75f24718a9ee651c100748889c59e85a940dd5a4bd4a0cf762d4dd4918c,2024-06-26T12:44:29.693000
|
||||
CVE-2024-37253,0,0,e8b3ddb7f0f7d9b21f3fd58f2a666ff68cda618f6bf43670f9bccbbcd9bf1b79,2024-07-09T18:19:14.047000
|
||||
CVE-2024-37256,0,0,7da95e9b22e085f1394d81e729de5474f21048af1b93b9ae1956737a9ee5690f,2024-07-09T18:19:14.047000
|
||||
CVE-2024-37257,0,0,479b21ea44b18a076a1ed587eaa32cbb2ff4098a40ce61041201d5259912ee2e,2024-07-22T13:00:31.330000
|
||||
CVE-2024-37258,0,0,8e15a35fa81970039b0250e7055f0c9c45b1a685fa69e9dc5a0ab3ef13c685fd,2024-07-22T13:00:31.330000
|
||||
CVE-2024-37259,0,0,f1e66179758602d0455316590f9badd11247a3cc39f1cedc0ac59902e233ddca,2024-07-22T13:00:31.330000
|
||||
CVE-2024-37257,0,1,ba955a777c88a8e4bf980877123b29fac72ab541a5d5656beccb5196c1267e18,2024-07-25T13:55:53.217000
|
||||
CVE-2024-37258,0,1,a3e04350d6cb7fadaa45f136e4648b756f0e9bc09851b1fa2971daab74eb824a,2024-07-25T13:54:49.790000
|
||||
CVE-2024-37259,0,1,3fa60055319b8df5491abc7c5102926a5a6cad44c7f9e639b27d543bd5bdbe34,2024-07-25T13:54:19.540000
|
||||
CVE-2024-3726,0,0,6ed1c63f9a76463fbd5e561dc6a9aee2dc85246e9cd4867ff0e748854eb71719,2024-05-30T13:15:41.297000
|
||||
CVE-2024-37260,0,0,71ae32d07f60a869d4092274a4024739c347edcdf7f6c400a5ce16269ff56260,2024-07-09T18:56:18.260000
|
||||
CVE-2024-37261,0,0,1a0dcacb78bea24dedb840d1a4c40a9b853ade81c54d957ed7ebbb29ae37f1b6,2024-07-22T13:00:31.330000
|
||||
CVE-2024-37262,0,0,b2e88fe58f616e64d630044e5624f57bfd33349fc8c761fcdaeb1ee87595cf98,2024-07-22T13:00:31.330000
|
||||
CVE-2024-37263,0,0,1aa503e8bed9c2ec1bbc735b3023842c97556dc202bc7f98a5635e39517f1374,2024-07-22T13:00:31.330000
|
||||
CVE-2024-37264,0,0,40f28484231968f6b7eeb78918195bda91a3bc07b06904b453a6b9237b265f69,2024-07-22T13:00:31.330000
|
||||
CVE-2024-37265,0,0,56108af5d79c27bda9a0808d34264885ff716b8823e8f0c8c0410c1baf00a526,2024-07-22T13:00:31.330000
|
||||
CVE-2024-37261,0,1,536f621b303d72a8e560706e326255b1b3f9876b04c30bdb5f30937479f45206,2024-07-25T13:53:30.123000
|
||||
CVE-2024-37262,0,1,bfd35f6ffa4a502a2174f2475f90d1a20af4256a72bb5700eb1b012a7e0d9339,2024-07-25T13:52:40.207000
|
||||
CVE-2024-37263,0,1,c26d26fa0b61ee0557a46b3c00f9d1f085b4a554319cc1567de65ae63f4ead42,2024-07-25T13:52:13.823000
|
||||
CVE-2024-37264,0,1,8c4f576afeee9717cff5bada01e9d60e0d4eb0514b5eb42d3f304e6c2501ad87,2024-07-25T13:51:29.393000
|
||||
CVE-2024-37265,0,1,15f68b41e4db6ae6ccda7f80b0a70abe19004015dbcf0d1246d37335388c5497,2024-07-25T13:51:00.093000
|
||||
CVE-2024-37266,0,0,f306a5e2ad401442cb409c7d61e85e756a658f2ffb85a90cbbbbc5543a190165,2024-07-09T18:19:14.047000
|
||||
CVE-2024-37267,0,0,1977bda7cd9a7b659f07f231147128d900172e605902d7437ab044e6479db3c7,2024-07-22T13:00:31.330000
|
||||
CVE-2024-37267,0,1,0d692f1d5fdd2443078b17f2b54167a732ba33e5479382e14b7e2bd4b6ec49a8,2024-07-25T13:47:43.833000
|
||||
CVE-2024-37268,0,0,3ed75f71eb245fffa2f72817fa04519725ace840b74091a925a997ed8515bf4c,2024-07-09T18:19:14.047000
|
||||
CVE-2024-3727,0,0,6ea1859ff32067d0bf242910db22b4416978471db9586adf5bc39f25cdfa21a6,2024-07-24T21:15:11.570000
|
||||
CVE-2024-37270,0,0,09adf8729d6feae3191994dc6f2b286449a8e4d910f8c343a3a9496ea050a29f,2024-07-11T13:05:54.930000
|
||||
CVE-2024-37271,0,0,f651b63b133b4d5ccf45d34bbf9b95a58b5e6755451ba309185b115ed1924729,2024-07-22T13:00:31.330000
|
||||
CVE-2024-37271,0,1,82adde283ff9dacc0f77be200c055ea2f2c58a80387c070880c7d1f2c1068d32,2024-07-25T13:46:39.273000
|
||||
CVE-2024-37273,0,0,701ddd83e97e8ea6c808ca5d8f57033bb1466851ddfe669965d2b1947df1df2f,2024-06-11T14:12:23.210000
|
||||
CVE-2024-37275,0,0,ed16fc8bc6c608f35a8b7d5acc4e01aceb7115e810ed76f0ef20187fdb243170,2024-07-24T02:52:01.253000
|
||||
CVE-2024-37278,0,0,f099ad6e686108b7aa0982a8f779de2fbae21e6d456841af0260dad64229b388,2024-07-24T02:51:37.857000
|
||||
@ -254289,7 +254290,7 @@ CVE-2024-37523,0,0,13bb725e58e999cc176a750d097aad585b673654b57d0f90da08bbd809966
|
||||
CVE-2024-37528,0,0,9c6980ff0d1442c5b7fd4f5e3f8ba4ae579879f3db1ec83280b9bd21a4726381,2024-07-11T14:49:28.177000
|
||||
CVE-2024-3753,0,0,7ec7e7ddead92833cf7c33f0b6871feebee71d63726e8d778e9efc350bba07de,2024-07-15T13:00:34.853000
|
||||
CVE-2024-37532,0,0,aa877fbc00f03a99fc2b9d43fb935fba6551700aac862f95f49a54cca4d5d3d2,2024-06-20T16:07:50.417000
|
||||
CVE-2024-37533,0,0,15e39a76c61052aaace04c07adce9e7f91231eabe293d2964440b2a84473d749,2024-07-24T18:15:04.690000
|
||||
CVE-2024-37533,0,1,da5287e5ab0d04799a5af2aa0e5f741fa0aa195630a31cdc71edd340fca7f147,2024-07-25T12:36:39.947000
|
||||
CVE-2024-37535,0,0,062f7ebb43bb6d2a8ccb3332e5242404947b076c7894d1777e030e1c8e622113,2024-07-03T02:04:19.710000
|
||||
CVE-2024-37536,0,0,df209a8df9bdd9e6c141521f70aae153351cd936d4fcc329ecd5520bb21d30d3,2024-07-22T13:00:31.330000
|
||||
CVE-2024-37537,0,0,d6f2faf95678b7215b67e0396b1da334479107789418e26bf8fa81b809970ca6,2024-07-22T13:00:31.330000
|
||||
@ -255331,6 +255332,11 @@ CVE-2024-3965,0,0,ca98c8c8f38859cd31112b30cbcab1577d0379601171e9b943854dcc0ce8c1
|
||||
CVE-2024-3966,0,0,73fb2ae6dbee87e9388d8eb74bc7dee75170ed92fa9ef996fc6e09e4c624edd8,2024-06-17T12:42:04.623000
|
||||
CVE-2024-39669,0,0,56d6b274e749be30b1ff4d12ff6c858882279f47b773d710e8ac61d1e37bcfa3,2024-07-03T02:05:50.580000
|
||||
CVE-2024-3967,0,0,5862f1bd72fcf48f7d564d5c642edefacf28c5dccb3d99f9648feaeaf3e033bf,2024-05-15T18:35:11.453000
|
||||
CVE-2024-39670,1,1,0d203953f143bb2b144a41db4bb88a8a655f481337d9b160294ae1b9c812f298,2024-07-25T12:36:39.947000
|
||||
CVE-2024-39671,1,1,9a7afcbf27d1e713433356dddae37faefc777fd6148f92dcb8fb10f18997b9b1,2024-07-25T12:36:39.947000
|
||||
CVE-2024-39672,1,1,ed5c0411f38631b5b1977b3b377edb417fef8ad73d9440e1336a055469287d12,2024-07-25T12:36:39.947000
|
||||
CVE-2024-39673,1,1,65597e775ea8c9f8f57ec5429b6a4a83ab9ed57cd2ce0e0885a33d1e069a91a2,2024-07-25T12:36:39.947000
|
||||
CVE-2024-39674,1,1,2d9ffc9bb192b7c713aee86e0d332b1af8e657a2ca6979b3ef7cb4749360338c,2024-07-25T12:36:39.947000
|
||||
CVE-2024-39675,0,0,324904789d577f8da38a1b1d1fcdf082a86fba9fd2cc1697c3fb80289cc5120e,2024-07-09T18:19:14.047000
|
||||
CVE-2024-39676,0,0,e843e26a051fd9d7a6fa411a5b9172b50db33ad2a0459f672d5ecbe647af8405,2024-07-24T12:55:13.223000
|
||||
CVE-2024-39677,0,0,c1a0d9a5a9ccbb7df09329c8ee16f641c4f9bc5f42ed88da1c64c5051e623648,2024-07-08T15:49:22.437000
|
||||
@ -255497,7 +255503,7 @@ CVE-2024-40119,0,0,aa3f22f2b45cca59856fa60c50a815719d2780bf42b0db28717c574ce736b
|
||||
CVE-2024-40129,0,0,ff07d2c16c2d7f391b26147b4d490409bfa9117fc71e9ac1a4c2f99b87b4353c,2024-07-17T13:34:20.520000
|
||||
CVE-2024-4013,0,0,3586550d51b92b0f462ebc695cf4afe7e9f245d08490f98716812b60f3625af2,2024-06-07T14:56:05.647000
|
||||
CVE-2024-40130,0,0,e8c5d76bc1438487e9c98dcf68a804e04354d33532c30674477455ae2e09b468,2024-07-17T13:34:20.520000
|
||||
CVE-2024-40137,0,0,87af7c12a16acb2a389840419e63627e065241b5c99d013f2eb3094ba75365de,2024-07-24T19:15:04.637000
|
||||
CVE-2024-40137,0,1,f1a99a721b2861d10c789836b6a791ef603795040e4de00f669c55e545146693,2024-07-25T12:36:39.947000
|
||||
CVE-2024-4014,0,0,b3b1290aefb4c494a91b06e73308720019bcbbd573300060d0dbb0155cbc5507,2024-04-22T13:28:43.747000
|
||||
CVE-2024-4017,0,0,80bc2cfe2c053bce72096cd358a992628c3c16de9493da95b29bf0e4f3e1b16f,2024-04-22T13:28:50.310000
|
||||
CVE-2024-4018,0,0,74eaff707843a7b5f103084c6ce08054e0cc1b873b7afe3ef59eb208a28e4429,2024-04-22T13:28:50.310000
|
||||
@ -255552,7 +255558,7 @@ CVE-2024-40455,0,0,31e25278556a7a569f6d48ca8afce7491b76507f09027ad01ea2eacbbf9dd
|
||||
CVE-2024-40456,0,0,b69676c819bae5d36b3537137bd74debeb1a273fb95e8271fb39d39294f7a466,2024-07-17T13:34:20.520000
|
||||
CVE-2024-4046,0,0,b162bb54ae31ac06a54238ce430265f513a39f78ee0aa36d5d6ff941168dcdb1,2024-05-14T16:11:39.510000
|
||||
CVE-2024-40492,0,0,18603dc677df2f037c3e12bbfcb2354793a3ae9660f3df13b65361dfae39cba9,2024-07-18T12:28:43.707000
|
||||
CVE-2024-40495,0,0,b0de96acd68b371348356a923cdea10e232737434cfb2ab77a5540fd2def635e,2024-07-24T19:15:04.693000
|
||||
CVE-2024-40495,0,1,88aeee223c049132d220ddb2b44f716ff0efad59827fab92a9147868c5828f67,2024-07-25T12:36:39.947000
|
||||
CVE-2024-40502,0,0,80ad739d30245682b2de314d0692efbae6d0a48cd212ab5565e45a2b6c762b58,2024-07-24T12:55:13.223000
|
||||
CVE-2024-40503,0,0,b7b74c3ecc2e3dadce6e3ea76ca2bffcfa4a5e02454bb102e0ec56df0b252cc5,2024-07-17T13:34:20.520000
|
||||
CVE-2024-40505,0,0,a786b0d0057f0bbe60b81b592bc5adaae8e017b897b7a005a6c8b1ead930e40f,2024-07-17T13:34:20.520000
|
||||
@ -255804,7 +255810,7 @@ CVE-2024-4106,0,0,3fc11eee434aa540a2e37440bd2e3ba6e18faae117022d3f68496d405f62ba
|
||||
CVE-2024-4107,0,0,ce88498baf95f06d1267d29854f2a9888ac0ddfe7fc00ea3036ccad453e487fa,2024-05-14T16:11:39.510000
|
||||
CVE-2024-41107,0,0,652a52b6606e110f3534fe4630dd6711a03cc8b36414513968170cc7d60165da,2024-07-19T14:15:06.080000
|
||||
CVE-2024-4111,0,0,a3e4bcb39778569b3be84e8d38a6497dbc2fc6b5a3693d9cc21532b8df994ada,2024-06-04T19:20:29.827000
|
||||
CVE-2024-41110,0,0,57c4a02d46f68819ab468fcb7c496560361bf6cb0c8ad019c35ea49425fa6b56,2024-07-24T17:15:11.053000
|
||||
CVE-2024-41110,0,1,728d345a8d6ef55c8935dff0d03755da57ad89f57b0c9a280e58436630161517,2024-07-25T12:36:39.947000
|
||||
CVE-2024-41111,0,0,52a25c3214b943235db4ca14cf3f4d1ccd955b2141e1d6abf224fc5c4732905d,2024-07-19T13:01:44.567000
|
||||
CVE-2024-4112,0,0,66f333e775e64b1480506fa97b6a827bfd5dac62e9e10520346f3a867cac6cdd,2024-05-17T02:40:15.740000
|
||||
CVE-2024-41121,0,0,91cb53bc29963f11fdf64645513c1c2c3bf3f9456a5f423e3cb1f394f830e271,2024-07-22T13:00:53.287000
|
||||
@ -255815,10 +255821,10 @@ CVE-2024-4113,0,0,e0d06b1b449a5e3093ad238184a1fc3bb7c021d3199342ed4f77b544765313
|
||||
CVE-2024-41130,0,0,3261a584e7edf3f3595234f8eb2bc4cb2240cd20df8deb4c9a02d301bb600580,2024-07-24T12:55:13.223000
|
||||
CVE-2024-41131,0,0,a469b327dab2c70b64323f08923a0a3cc6492c0286887e2f02007c413d21dc21,2024-07-24T12:55:13.223000
|
||||
CVE-2024-41132,0,0,059caff7cce7231a7c76b300becd4e4b27d779e1effce439666ebf7a5ba8a7a0,2024-07-24T12:55:13.223000
|
||||
CVE-2024-41133,0,0,a8fc51e91104481181c150237b1cafc8d41cf1ec2c145f70ae44c7db457dda40,2024-07-24T20:15:04.237000
|
||||
CVE-2024-41134,0,0,e03dca28fdb7b52cbf7019488e44915e43532e727ffcad33d2cc394f47bae0f9,2024-07-24T20:15:04.427000
|
||||
CVE-2024-41135,0,0,0ced017b96a8b5cbfaf8c16811753dbbd5f6d2580099cd1e35c139935259f2c7,2024-07-24T20:15:04.600000
|
||||
CVE-2024-41136,0,0,e48cc56c9a9b12c12e2f2f06984429c12de97fcb43cc741fea6cda30f529e448,2024-07-24T21:15:11.857000
|
||||
CVE-2024-41133,0,1,e5ad4a1eaf4c034d810408578353faa9771695c8ef9b4f89e54a23d6b7f939b5,2024-07-25T12:36:39.947000
|
||||
CVE-2024-41134,0,1,1f67c7ac372f8fd80f15e721cdafa3ce00463ae71c43026b338111ab1ec18ba2,2024-07-25T12:36:39.947000
|
||||
CVE-2024-41135,0,1,489118406e14a87ebeb4e1cf740e4d8eeb474f31616618459af95bc72e2df2b8,2024-07-25T12:36:39.947000
|
||||
CVE-2024-41136,0,1,da10dde379d176b1800a24228cbc78a48656ad00c312f61e14b9a084ea1e1388,2024-07-25T12:36:39.947000
|
||||
CVE-2024-4114,0,0,387f9ca6df27ba000d0f44d990ccd6bb074258bb946c87938379db9652dc0a14,2024-05-17T02:40:15.917000
|
||||
CVE-2024-4115,0,0,89bc89df66a101d446d6568b359dec67345256fa579984420e2e2fe7ea4994ac,2024-06-04T19:20:29.937000
|
||||
CVE-2024-4116,0,0,6ee64e85b69f8f11f599040da371bf02d3a94742e1ecd0f467d9a48f26243458,2024-05-17T02:40:16.110000
|
||||
@ -255856,15 +255862,15 @@ CVE-2024-4142,0,0,15f953d52654601c03ad89c9ea21867b549a2aa12635e109fbf9627466e8a2
|
||||
CVE-2024-4143,0,0,e6d56e099b9443f818cba12ec6584b2ae78b4e2e6fa1554ff08fbd2e8dc736a0,2024-07-16T13:43:58.773000
|
||||
CVE-2024-4144,0,0,f950a1b03316faa802a71776ce4e62cc15162cc9cec7d4c30c76255605b1c1fc,2024-05-14T19:17:55.627000
|
||||
CVE-2024-4145,0,0,704254773246494130c81e0600984df247a970411736d475449e315ca595ee9b,2024-07-03T02:07:08.133000
|
||||
CVE-2024-41459,0,0,bd69cb55f288e967a8912b09554cd20829adb710389d645d48d9ce4a10751441,2024-07-24T21:15:12.037000
|
||||
CVE-2024-41459,0,1,c59c81b34e4e1a07ad25a6c069197c93b77187a97be49f75e9c0adb2b9877288,2024-07-25T12:36:39.947000
|
||||
CVE-2024-4146,0,0,5bcf92f96755106fd9c198be9e70039e9dbd3f86c15b09e938b03dc5a47e5822,2024-07-19T19:03:00.867000
|
||||
CVE-2024-41460,0,0,81c8b8a7faa85141d62d767ef66f4ba29ca0e89e3f4d516f58efdbf1a385e7e4,2024-07-24T21:15:12.097000
|
||||
CVE-2024-41461,0,0,1b5f14d3bc04750fe5e880684aa12ded52528aa3e6fd673a1b6ac900559ee256,2024-07-24T21:15:12.150000
|
||||
CVE-2024-41462,0,0,60343e428391914d12f6e57d7214675cd37475a86a32ed8cecdbe3d932cec870,2024-07-24T21:15:12.207000
|
||||
CVE-2024-41463,0,0,f43d78ec38b8d657694c338e20c63dcfbcc47d5d020b1e2d6720a8c425cd8243,2024-07-24T21:15:12.260000
|
||||
CVE-2024-41464,0,0,7849c83b08f5e819ea51bb84894d10f31c554ba9a32f08a8c9f5e780d92aa34e,2024-07-24T21:15:12.313000
|
||||
CVE-2024-41465,0,0,67839b6036b5aaaa3749636ed778bb962a561c3e0f2cb63b8e08721c06f00217,2024-07-24T21:15:12.370000
|
||||
CVE-2024-41466,0,0,5ef9cc31c6ce382df25d5c0553646d7bf268fa6341cb5db4bf959a844925a405,2024-07-24T21:15:12.423000
|
||||
CVE-2024-41460,0,1,f19387196140dfddcd4317999dc774f842391c96495aa8e27e4e3e2e875e0ed9,2024-07-25T12:36:39.947000
|
||||
CVE-2024-41461,0,1,a91a3372bd8744860a184e5a2e1724460efb5fc112bd66a8f05d1359f505c00c,2024-07-25T12:36:39.947000
|
||||
CVE-2024-41462,0,1,fbfa04f30aa7e112541f9cd64b0821d63dfada5837ed2a42eeb26c83e123adbd,2024-07-25T12:36:39.947000
|
||||
CVE-2024-41463,0,1,bd01c30877b33f610aa36a40e0ea829fcf3c906cb5c49b0b716e6bdd4345e86a,2024-07-25T12:36:39.947000
|
||||
CVE-2024-41464,0,1,912b66e2d05b713f45914d4cd1fa3604e8464867c0f39c45c7d1525cacb1b691,2024-07-25T12:36:39.947000
|
||||
CVE-2024-41465,0,1,e029cd8634fe3086d10430ea064b95ae8512deac6d3845daffbb574768625c7b,2024-07-25T12:36:39.947000
|
||||
CVE-2024-41466,0,1,97aa02d971ce915f9cf78bd3459f554b45935900ee34841cc9fdabfe7a6874b8,2024-07-25T12:36:39.947000
|
||||
CVE-2024-4148,0,0,71d4cc4cd9749254e9c2938609496cfae5673c1a094b971881b54b705d48028f,2024-06-03T14:46:24.250000
|
||||
CVE-2024-4149,0,0,28fd6853c4bd2a7bfb26cdd043f9abfc9e17f0ae1c9764bac61fec52fa0d04ad,2024-07-02T14:44:29.993000
|
||||
CVE-2024-41492,0,0,99c2077a213e0f65a294335ccdb0c65c6a250420405be03860c1fbd393c7f4a6,2024-07-22T13:00:53.287000
|
||||
@ -255874,8 +255880,8 @@ CVE-2024-4152,0,0,36a0d7cfd7ae4093c14018eeecb901f1be03f5ffbcf2f6180fccbe34da83a1
|
||||
CVE-2024-4153,0,0,3fae78b221751422ac040502ea12520d7ce5149857852489782ffbd186ca2e2d,2024-06-07T17:15:51.640000
|
||||
CVE-2024-4154,0,0,84badb779862aa9714be3b2e958a85563e0b4bd20cc10469a3787dcbbdfc4755,2024-05-22T12:46:53.887000
|
||||
CVE-2024-4155,0,0,9d1d3f06be4be4f0b611f0b92aa6b48510c05900efdf1b1c24851d7c9581a867,2024-06-11T10:15:13.260000
|
||||
CVE-2024-41550,0,0,f4ff256c835b70fb2be11d6362312cd85afe842b2338e68f4047828b84d9180c,2024-07-24T20:15:04.777000
|
||||
CVE-2024-41551,0,0,3eabe416112e89ee94d0023a6cb20d21a06800b0e56191004f7a9be7727d1380,2024-07-24T20:15:04.837000
|
||||
CVE-2024-41550,0,1,7d7076e0b2e639a4f03a00e5a03b3d92cddc6a833bc93fe47b36d2a4e446215f,2024-07-25T12:36:39.947000
|
||||
CVE-2024-41551,0,1,a0a69e4afc5574aaa9c1839f60d7de59a6551dcf46ace05280e2656726515e08,2024-07-25T12:36:39.947000
|
||||
CVE-2024-4156,0,0,31cc9500838d0dc99d5959700d84ebbac93048893a2eb67f37ed77d13093550c,2024-05-02T18:00:37.360000
|
||||
CVE-2024-4157,0,0,ac5ec2e690c76b81403cfa49bc63d1a8caa2fb9d97d28a1055398849720db727,2024-05-22T12:46:53.887000
|
||||
CVE-2024-4158,0,0,9bd0a38e47c5b6d26f1e587737a0ffeb7c251278f38061995fc29ba309646aa6,2024-05-14T16:11:39.510000
|
||||
@ -255896,23 +255902,23 @@ CVE-2024-41655,0,0,ef3400d9e58c2cde6c539334829c8042d5ee995783a74a46bd16638786b0b
|
||||
CVE-2024-41656,0,0,d1b3325a39b6b3bcc8a959c5c8544c45c6c0440a0b7279ac0753d809322ad5fb,2024-07-24T12:55:13.223000
|
||||
CVE-2024-4166,0,0,f698286bcd13839c3e713fc944a2d68390d9d1f07ea9696da7a343bdead6335d,2024-05-17T02:40:17.900000
|
||||
CVE-2024-41661,0,0,9bb4ba38de23abec768fb88c25fd9926dc19ebbf46e995b3d88e74cabbdda1a3,2024-07-24T12:55:13.223000
|
||||
CVE-2024-41662,0,0,027a23d20ac7f041b008226b693a861075372c52682261d575778ca6ca9fab2c,2024-07-24T17:15:11.310000
|
||||
CVE-2024-41662,0,1,919a35dcf0c28f191ac4c6cfd568d8d42c7650d464e027cb7edacb995b2d7d91,2024-07-25T12:36:39.947000
|
||||
CVE-2024-41663,0,0,2b5ce53141b2de9b74a60e92e3f30deaac3830f3d557479059cba8f6054aac58,2024-07-24T12:55:13.223000
|
||||
CVE-2024-41664,0,0,968689d7fd6f27159fff0941cd7d62708c912d0aa7f698a223c6de5e87e7791e,2024-07-24T12:55:13.223000
|
||||
CVE-2024-41665,0,0,abaea4fdc3c53915a3209a944b40b8fe3a83fdbd0827e5893c651a4d0f6386e2,2024-07-24T12:55:13.223000
|
||||
CVE-2024-41666,0,0,cc3fd73062efb2936120c102f2985762b4a922ac1e8ab8c2cab7a268f65cba88,2024-07-24T18:15:05.090000
|
||||
CVE-2024-41667,0,0,1f9db84f3f6fead0dc9db71fdbfa16e28b3702084aeef443585f27944b2afe0e,2024-07-24T18:15:05.310000
|
||||
CVE-2024-41666,0,1,0375155254884f774ba6c1bf65be8527b5535973799e11a8779eb527e144ed30,2024-07-25T12:36:39.947000
|
||||
CVE-2024-41667,0,1,7a0d38f51bb876529e5a20368a13b36a328307ee0a9c9ad609e8a6d11c45fa5c,2024-07-25T12:36:39.947000
|
||||
CVE-2024-41668,0,0,d649a2a5c90e957bfc9f2698aae879b13d0f5f730255ef5d13e3e5f57ca747be,2024-07-24T12:55:13.223000
|
||||
CVE-2024-4167,0,0,a726fa69800dd2a00fe506dc5d29a370681725e72bfe1ac34a8206d50708861e,2024-06-04T19:20:31.593000
|
||||
CVE-2024-41672,0,0,85102b17f81785d70b6bc95473e15cb41b94b472a01f04c8239327e5cecce8cb,2024-07-24T18:15:05.527000
|
||||
CVE-2024-41672,0,1,c445ad7d826ddcac22902530a2e686289f099e89069390baf727ebdc437f2aef,2024-07-25T12:36:39.947000
|
||||
CVE-2024-4168,0,0,7f4f833c88738c683a47d814a058bf8a730868170937a9aca799097bc79bf22f,2024-06-04T19:20:31.690000
|
||||
CVE-2024-4169,0,0,c62ff626929882f5d2c6f5c5b02ad92c379b5b400e34f72b774f8d063efba0f1,2024-06-04T19:20:31.780000
|
||||
CVE-2024-4170,0,0,62435f89f96f29247c44c5e589e7b97688efd61a202de53db89b1fe5fd4975dc,2024-06-04T19:20:31.883000
|
||||
CVE-2024-41703,0,0,1c3b299376ef5ce17a21e7b5646c9d050d5b45bd92d1e35dddd90617bf6ddc38,2024-07-22T13:00:31.330000
|
||||
CVE-2024-41704,0,0,0be617904c777d7b9dc53e786f05db778e1c4b756b7b2091d648829174b58747,2024-07-22T13:00:31.330000
|
||||
CVE-2024-41705,0,0,5ffeb4f3b1ed5768c105eab2d087d4a880ca48ab071f0bf50fc47b993fad7e85,2024-07-25T08:15:02.467000
|
||||
CVE-2024-41706,0,0,65753859841076a2c598d5e988db4c971c37a1bf17a162950021d17e8e874c15,2024-07-25T08:15:02.783000
|
||||
CVE-2024-41707,0,0,8afa17852c89022131cbf2f2cb75902b0724eef0c75229a5ce3250312652b8be,2024-07-25T08:15:02.980000
|
||||
CVE-2024-41705,0,1,7ad36214246d3505f47341eca353a6e89a57c7421606f46a575e2c200ebd5197,2024-07-25T12:36:39.947000
|
||||
CVE-2024-41706,0,1,c54f7449081e3b2cf2e3ab43d5a7b590b18453d449b7c4962e22d19102850392,2024-07-25T12:36:39.947000
|
||||
CVE-2024-41707,0,1,24329663dd76ae1f72f3cfdd54c53a72b691e0b10ff003de1c551fa68a8194c1,2024-07-25T12:36:39.947000
|
||||
CVE-2024-41709,0,0,2bdff8d893d96056721920d5bf998022e35373c018be8a15f2bfa536aa265890,2024-07-22T13:00:31.330000
|
||||
CVE-2024-4171,0,0,87597e8caa4479ab69c883527c35fc22af72d614757313d16953f50dcfa107c2,2024-06-04T19:20:31.980000
|
||||
CVE-2024-4172,0,0,ae5cefdd41ee745a5f3463347f20f3f77110439c81ed1ad285dedf4b40da1c57,2024-06-04T19:20:32.077000
|
||||
@ -256482,7 +256488,7 @@ CVE-2024-4807,0,0,e5ccc41d46958232939be978f4766518ab72a806619364a653b00c23b63fbc
|
||||
CVE-2024-4808,0,0,9e98599f6886b9041c106d3216212c5c382436edfce35f9a1807d5234e020eab,2024-05-17T02:40:38.870000
|
||||
CVE-2024-4809,0,0,27fb5be7556d421437500c3c993a8fe2f6b8b07eb589d66da5852c85ddbdadf0,2024-06-04T19:20:50.867000
|
||||
CVE-2024-4810,0,0,67f5293ce6e2b07ebd74483d90aa4bd648288e3b70a7100b0946bf9b81e90029,2024-05-29T08:15:33.960000
|
||||
CVE-2024-4811,0,0,24ec5a23352dd74e9a5ec369affa049ebaa890dca6e211903458224e4879e96d,2024-07-25T05:15:26.513000
|
||||
CVE-2024-4811,0,1,65842f57a162939976e6234a710fd74ca84e9588d5abc78ec5588ee84aed93b5,2024-07-25T12:36:39.947000
|
||||
CVE-2024-4812,0,0,96f0244e64d02e8b825789000f88a75dd5b3d67c4d6e5fa4b2230b6ad5599e15,2024-06-18T18:49:19.783000
|
||||
CVE-2024-4813,0,0,ffced1bec51c6384e79d75317b856f32e05abf0a3cdd3adf718b586086ffad4a,2024-06-04T19:20:50.970000
|
||||
CVE-2024-4814,0,0,6ed65b628d782e4c0035f27d12907232951228fb5dd63de02df922628089b508,2024-06-04T19:20:51.077000
|
||||
@ -256690,7 +256696,7 @@ CVE-2024-5063,0,0,3ea00cb3f53084b2393e5a818811e5957f116b348338ce87a59f64292b187a
|
||||
CVE-2024-5064,0,0,d857d2e0ee5316e135c4045ce3a7ab1579933a9b029d66480995681ffcc21c71,2024-06-04T19:20:57.870000
|
||||
CVE-2024-5065,0,0,0430cc7c42876b1507fe619bbbc6ece1ba2c878f57a5564022a1efa295cd852d,2024-06-04T19:20:57.977000
|
||||
CVE-2024-5066,0,0,afaa043e18b083dd4b11b301517b086f80728c1a74393b687f88875df4970445,2024-05-20T13:00:34.807000
|
||||
CVE-2024-5067,0,0,ecc15f3b13d6be79ed7718445a8a9763cb2d1d5ba9eef10c9ce72c52f9809916,2024-07-24T23:15:09.610000
|
||||
CVE-2024-5067,0,1,ec8060b17ca06fa7076a296ca5136d65be0c78085423bd2edd770ef034ed8933,2024-07-25T12:36:39.947000
|
||||
CVE-2024-5069,0,0,9472ccb93cc67e368452ccbd7690fcdac2e9c6bf3a0a4c1febdda7b23dc05b96,2024-06-04T19:20:58.080000
|
||||
CVE-2024-5071,0,0,785631f9585d5c4be650f1d6b68cd50ecc66584beb25a8693cb2019c0e550973,2024-06-26T12:44:29.693000
|
||||
CVE-2024-5072,0,0,b208332fdeb0349d564f3ae12700e597664b77bbcd409305187f03a8e1be9ee8,2024-05-17T18:35:35.070000
|
||||
@ -257171,7 +257177,7 @@ CVE-2024-5648,0,0,015c05f38e8cff192a455edd246e167c4bc53044f1d944054e7ecfcb7dfdfc
|
||||
CVE-2024-5649,0,0,852ca7872009baccfafdaae89cb4c14a0a1251efee63fc8b4145a812e05b230f,2024-06-20T12:44:01.637000
|
||||
CVE-2024-5650,0,0,c39b4a582c551c0a2a7178518ad417e8ac9a87e5b86c36cc6d93d2e99ad988c5,2024-06-17T12:42:04.623000
|
||||
CVE-2024-5652,0,0,7e423119960d286a82f2194dff7590cb101783621bba898f5af7050faa75102a,2024-07-12T17:14:32.033000
|
||||
CVE-2024-5653,0,0,665629d3b594f42f38af36bc864775fec67f180a3f9626c58cc0a3c2c1511176,2024-06-06T14:17:35.017000
|
||||
CVE-2024-5653,0,1,b1d5d7ca6c03c0860bfa9c89a981cb1e40654b9c0dd686ee52416437c8a7183f,2024-07-25T12:45:19.830000
|
||||
CVE-2024-5654,0,0,be6d98376b5bde79348830f6677e04bc437e5abfb9a06a2bd0a591f9c8d1c938,2024-06-10T02:52:08.267000
|
||||
CVE-2024-5655,0,0,16e9b1f63d749b21100036f5c9070a5ffe6aef567bd66a512cb553f6f989c7f6,2024-06-28T13:16:40.613000
|
||||
CVE-2024-5656,0,0,ba99339cfecc1c5fdb0f6d1bb26f06bfe70b58ff628ceb5bd66c459a2628a6f1,2024-06-13T14:15:13.397000
|
||||
@ -257763,7 +257769,7 @@ CVE-2024-6574,0,0,63009fc3946aa6aa37035c823fc25710c373929512d42b52b922f4cc721537
|
||||
CVE-2024-6579,0,0,70ddc19f754f7cb2643cde5cc84c5570c5648bfc6d8e404da6cc6aa9bb2155c8,2024-07-16T13:43:58.773000
|
||||
CVE-2024-6580,0,0,d43dfa58651574c4447e8f323f3cb1f6a00d6bdef0613d5834aefccecf968c5d,2024-07-09T18:19:14.047000
|
||||
CVE-2024-6588,0,0,67672e854c20766f2e15151fa1e111ec8310b7083a57f535c99159d2ce6e5af7,2024-07-12T12:49:07.030000
|
||||
CVE-2024-6589,1,1,e45ff7e87c25dfc54dcd2dc238380aa5459a05b7a0544b26208a08a6e162636f,2024-07-25T11:15:10.333000
|
||||
CVE-2024-6589,0,1,287c83b8ab794bcff92c2dc6cb5016c9b23681e87f0536775cc3bb7c8901c364,2024-07-25T12:36:39.947000
|
||||
CVE-2024-6595,0,0,97cf6a37af39b7f5832976478077fe225f57d63ffd9a5f39caf9eca8e3545339,2024-07-19T14:52:54.943000
|
||||
CVE-2024-6598,0,0,fb802128b1cfc176540749693b684b4374936099ab1c7948c1ec819266291908,2024-07-09T18:19:14.047000
|
||||
CVE-2024-6599,0,0,6a69a16a0a8781527f95db9310983c42c357e28a72f780fd79d80c9654364b86,2024-07-18T12:28:43.707000
|
||||
@ -257933,18 +257939,18 @@ CVE-2024-6967,0,0,5f19e165dee42428e0d969fa8fc5f74084843adc50630c62175a00d155773d
|
||||
CVE-2024-6968,0,0,8e5752619c85b26bba4ce547fa3d54bdd5591cb73642b239c05438d96051005a,2024-07-22T13:00:31.330000
|
||||
CVE-2024-6969,0,0,b23347441c89b903c83a899acb9bf7f48b605b0728961bbb1ac995d86a8850d6,2024-07-22T13:00:31.330000
|
||||
CVE-2024-6970,0,0,521037b9963b74c39659cf9df97626ee5f8ca87b48a1750eb71f414432d46515,2024-07-22T13:00:31.330000
|
||||
CVE-2024-6972,0,0,0166795684092dc8a7acd1c9b41656ff0f1c534b59789d4c54d365f1592c49e2,2024-07-25T06:15:01.967000
|
||||
CVE-2024-6972,0,1,45bfc09a78a937a10b77612392aef83348a218e9546ffde91f758c134440c143,2024-07-25T12:36:39.947000
|
||||
CVE-2024-7014,0,0,bf4bcb57365a86d29a45ebd019245eec542daaec8aac5d2bd790565f954bcfee,2024-07-24T12:55:13.223000
|
||||
CVE-2024-7027,0,0,5a505a0256616ae7086bad971714674072a78d2b5b489c23bd05df293d4823ce,2024-07-24T12:55:13.223000
|
||||
CVE-2024-7047,0,0,2b1573f3cc18c2aa026dba40654687716fbeec1cc6b14e4dee9e3be223e6f721,2024-07-25T01:15:09.830000
|
||||
CVE-2024-7057,0,0,52aa98d027c65d76fdbb47c952844bf1cfa52c91e82e71a016c5d3cea037f087,2024-07-25T01:15:10.040000
|
||||
CVE-2024-7060,0,0,0cb6356c2703a31f44da01a49f1d4d7205d995c5d01453cce761197116c6edec,2024-07-24T23:15:09.817000
|
||||
CVE-2024-7047,0,1,a8a34e25dd02e2f4bae12fb422d77becb4b340aa4ac90e0b4f1ca7d693febb09,2024-07-25T12:36:39.947000
|
||||
CVE-2024-7057,0,1,134fb7ecedd83008f512f96c952415d9fe42c8f642d80f45f533232c0a6892c0,2024-07-25T12:36:39.947000
|
||||
CVE-2024-7060,0,1,290f41e25897864e5bc7f39b896930a92e0ee9d30e699cee7ddb424244610f49,2024-07-25T12:36:39.947000
|
||||
CVE-2024-7065,0,0,861ad9f4a94f327ec6cfd0f89d5da23664e863601bc1e4fe87c301d15a9d3692,2024-07-24T12:55:13.223000
|
||||
CVE-2024-7066,0,0,f0b9597030c216e17a91b9bbd330c3ccd1220fd3a9abefaf98fb6df981dc96f4,2024-07-24T12:55:13.223000
|
||||
CVE-2024-7067,0,0,cd81f5e59f5ccc969e002fbd0535f928704dbb9e13b2c7b953cab40d6b4980c7,2024-07-24T17:12:32.367000
|
||||
CVE-2024-7068,0,0,eb9a728b0e4f24863b90d18d69d6956459c7f7f272d8ea5eb0f258d70cb7d654,2024-07-24T17:12:32.367000
|
||||
CVE-2024-7069,0,0,c4ab9f752bac2645a76cae34601a6412cc6a70cc3262d39aa941af9fa7d8f5b8,2024-07-24T17:12:32.367000
|
||||
CVE-2024-7079,0,0,af9d3a4629d0dee8d9c1382cf5b8b38f2af1c4359748e6b63c5acce1d7ffd90b,2024-07-24T17:12:32.367000
|
||||
CVE-2024-7080,0,0,899d93e27154d355f1cab6e8a2230fd79e288953e78c42df2881018f9ff766b0,2024-07-24T20:15:05.117000
|
||||
CVE-2024-7081,0,0,82842dc9f70c75bdf648c9e7c6fe771c6810906c75d09d47d47dc898ac294dfc,2024-07-24T21:15:12.913000
|
||||
CVE-2024-7091,0,0,41704f8673a7fd5ff354f8cdeffd7b456eab7c22a30ede9ca7486f26d6f17cd3,2024-07-24T23:15:10.013000
|
||||
CVE-2024-7080,0,1,0e8be1f5ff49b98f2e12f041d9740e0c98dcb4e55d2c6eaebafa31aadf939e95,2024-07-25T12:36:39.947000
|
||||
CVE-2024-7081,0,1,4fe1e74e2e72cdc5207c5caa9565efa26fd09299ada94965c4896e36b361ec5f,2024-07-25T12:36:39.947000
|
||||
CVE-2024-7091,0,1,e8d0dd8bb435701b961e03b8d58836a663b21eec4a32e53ec9bb349c72e7294b,2024-07-25T12:36:39.947000
|
||||
|
Can't render this file because it is too large.
|
Loading…
x
Reference in New Issue
Block a user