mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-06-21 17:41:05 +00:00
Auto-Update: 2024-08-06T14:00:17.304709+00:00
This commit is contained in:
parent
42b2a43efb
commit
ee5263fa28
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2014-4608",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2014-07-03T04:22:15.310",
|
||||
"lastModified": "2024-05-17T00:59:57.730",
|
||||
"lastModified": "2024-08-06T12:15:20.573",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [
|
||||
{
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2014-5160",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2014-08-01T11:13:09.790",
|
||||
"lastModified": "2024-05-17T01:00:13.937",
|
||||
"lastModified": "2024-08-06T12:15:31.283",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [
|
||||
{
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2014-6392",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2014-09-15T14:55:12.587",
|
||||
"lastModified": "2024-05-17T01:00:48.230",
|
||||
"lastModified": "2024-08-06T13:15:27.023",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [
|
||||
{
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2014-7042",
|
||||
"sourceIdentifier": "cret@cert.org",
|
||||
"published": "2014-10-16T19:55:12.817",
|
||||
"lastModified": "2024-05-17T01:01:06.023",
|
||||
"lastModified": "2024-08-06T13:15:35.490",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [
|
||||
{
|
||||
|
56
CVE-2024/CVE-2024-339xx/CVE-2024-33960.json
Normal file
56
CVE-2024/CVE-2024-339xx/CVE-2024-33960.json
Normal file
@ -0,0 +1,56 @@
|
||||
{
|
||||
"id": "CVE-2024-33960",
|
||||
"sourceIdentifier": "cve-coordination@incibe.es",
|
||||
"published": "2024-08-06T12:15:49.130",
|
||||
"lastModified": "2024-08-06T12:15:49.130",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "SQL injection vulnerability in PayPal, Credit Card and Debit Card Payment affecting version 1.0. An attacker could exploit this vulnerability by sending a specially crafted query to the server and retrieve all the information stored in it through the following\u00a0'end' in '/admin/mod_reports/printreport.php' parameter."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "cve-coordination@incibe.es",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "cve-coordination@incibe.es",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-89"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.incibe.es/en/incibe-cert/notices/aviso/multiple-vulnerabilities-janobe-products",
|
||||
"source": "cve-coordination@incibe.es"
|
||||
}
|
||||
]
|
||||
}
|
56
CVE-2024/CVE-2024-339xx/CVE-2024-33961.json
Normal file
56
CVE-2024/CVE-2024-339xx/CVE-2024-33961.json
Normal file
@ -0,0 +1,56 @@
|
||||
{
|
||||
"id": "CVE-2024-33961",
|
||||
"sourceIdentifier": "cve-coordination@incibe.es",
|
||||
"published": "2024-08-06T12:15:49.360",
|
||||
"lastModified": "2024-08-06T12:15:49.360",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "SQL injection vulnerability in PayPal, Credit Card and Debit Card Payment affecting version 1.0. An attacker could exploit this vulnerability by sending a specially crafted query to the server and retrieve all the information stored in it through the following\u00a0'code' in '/admin/mod_reservation/controller.php' parameter."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "cve-coordination@incibe.es",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "cve-coordination@incibe.es",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-89"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.incibe.es/en/incibe-cert/notices/aviso/multiple-vulnerabilities-janobe-products",
|
||||
"source": "cve-coordination@incibe.es"
|
||||
}
|
||||
]
|
||||
}
|
56
CVE-2024/CVE-2024-339xx/CVE-2024-33962.json
Normal file
56
CVE-2024/CVE-2024-339xx/CVE-2024-33962.json
Normal file
@ -0,0 +1,56 @@
|
||||
{
|
||||
"id": "CVE-2024-33962",
|
||||
"sourceIdentifier": "cve-coordination@incibe.es",
|
||||
"published": "2024-08-06T12:15:49.570",
|
||||
"lastModified": "2024-08-06T12:15:49.570",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "SQL injection vulnerability in PayPal, Credit Card and Debit Card Payment affecting version 1.0. An attacker could exploit this vulnerability by sending a specially crafted query to the server and retrieve all the information stored in it through the following\u00a0'code' in '/admin/mod_reservation/index.php' parameter."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "cve-coordination@incibe.es",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "cve-coordination@incibe.es",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-89"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.incibe.es/en/incibe-cert/notices/aviso/multiple-vulnerabilities-janobe-products",
|
||||
"source": "cve-coordination@incibe.es"
|
||||
}
|
||||
]
|
||||
}
|
56
CVE-2024/CVE-2024-339xx/CVE-2024-33963.json
Normal file
56
CVE-2024/CVE-2024-339xx/CVE-2024-33963.json
Normal file
@ -0,0 +1,56 @@
|
||||
{
|
||||
"id": "CVE-2024-33963",
|
||||
"sourceIdentifier": "cve-coordination@incibe.es",
|
||||
"published": "2024-08-06T12:15:49.790",
|
||||
"lastModified": "2024-08-06T12:15:49.790",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "SQL injection vulnerability in PayPal, Credit Card and Debit Card Payment affecting version 1.0. An attacker could exploit this vulnerability by sending a specially crafted query to the server and retrieve all the information stored in it through the following 'id' in '/admin/mod_room/index.php' parameter."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "cve-coordination@incibe.es",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "cve-coordination@incibe.es",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-89"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.incibe.es/en/incibe-cert/notices/aviso/multiple-vulnerabilities-janobe-products",
|
||||
"source": "cve-coordination@incibe.es"
|
||||
}
|
||||
]
|
||||
}
|
56
CVE-2024/CVE-2024-339xx/CVE-2024-33964.json
Normal file
56
CVE-2024/CVE-2024-339xx/CVE-2024-33964.json
Normal file
@ -0,0 +1,56 @@
|
||||
{
|
||||
"id": "CVE-2024-33964",
|
||||
"sourceIdentifier": "cve-coordination@incibe.es",
|
||||
"published": "2024-08-06T12:15:50.000",
|
||||
"lastModified": "2024-08-06T12:15:50.000",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "SQL injection vulnerability in PayPal, Credit Card and Debit Card Payment affecting version 1.0. An attacker could exploit this vulnerability by sending a specially crafted query to the server and retrieve all the information stored in it through the following 'id' in '/admin/mod_users/index.php' parameter."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "cve-coordination@incibe.es",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "cve-coordination@incibe.es",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-89"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.incibe.es/en/incibe-cert/notices/aviso/multiple-vulnerabilities-janobe-products",
|
||||
"source": "cve-coordination@incibe.es"
|
||||
}
|
||||
]
|
||||
}
|
56
CVE-2024/CVE-2024-339xx/CVE-2024-33965.json
Normal file
56
CVE-2024/CVE-2024-339xx/CVE-2024-33965.json
Normal file
@ -0,0 +1,56 @@
|
||||
{
|
||||
"id": "CVE-2024-33965",
|
||||
"sourceIdentifier": "cve-coordination@incibe.es",
|
||||
"published": "2024-08-06T12:15:50.223",
|
||||
"lastModified": "2024-08-06T12:15:50.223",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "SQL injection vulnerability in PayPal, Credit Card and Debit Card Payment affecting version 1.0. An attacker could exploit this vulnerability by sending a specially crafted query to the server and retrieve all the information stored in it through the following 'view' in '/tubigangarden/admin/mod_accomodation/index.php' parameter."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "cve-coordination@incibe.es",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "cve-coordination@incibe.es",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-89"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.incibe.es/en/incibe-cert/notices/aviso/multiple-vulnerabilities-janobe-products",
|
||||
"source": "cve-coordination@incibe.es"
|
||||
}
|
||||
]
|
||||
}
|
56
CVE-2024/CVE-2024-339xx/CVE-2024-33966.json
Normal file
56
CVE-2024/CVE-2024-339xx/CVE-2024-33966.json
Normal file
@ -0,0 +1,56 @@
|
||||
{
|
||||
"id": "CVE-2024-33966",
|
||||
"sourceIdentifier": "cve-coordination@incibe.es",
|
||||
"published": "2024-08-06T12:15:50.440",
|
||||
"lastModified": "2024-08-06T12:15:50.440",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "SQL injection vulnerability in PayPal, Credit Card and Debit Card Payment affecting version 1.0. An attacker could exploit this vulnerability by sending a specially crafted query to the server and retrieve all the information stored in it through the following 'xtsearch' in '/admin/mod_reports/index.php' parameter."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "cve-coordination@incibe.es",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "cve-coordination@incibe.es",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-89"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.incibe.es/en/incibe-cert/notices/aviso/multiple-vulnerabilities-janobe-products",
|
||||
"source": "cve-coordination@incibe.es"
|
||||
}
|
||||
]
|
||||
}
|
56
CVE-2024/CVE-2024-339xx/CVE-2024-33967.json
Normal file
56
CVE-2024/CVE-2024-339xx/CVE-2024-33967.json
Normal file
@ -0,0 +1,56 @@
|
||||
{
|
||||
"id": "CVE-2024-33967",
|
||||
"sourceIdentifier": "cve-coordination@incibe.es",
|
||||
"published": "2024-08-06T12:15:50.667",
|
||||
"lastModified": "2024-08-06T12:15:50.667",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "SQL injection vulnerability in PayPal, Credit Card and Debit Card Payment affecting version 1.0. An attacker could exploit this vulnerability by sending a specially crafted query to the server and retrieve all the information stored in it through the following 'view' in 'Attendance' and 'YearLevel' in '/AttendanceMonitoring/report/attendance_print.php' parameter."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "cve-coordination@incibe.es",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "cve-coordination@incibe.es",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-89"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.incibe.es/en/incibe-cert/notices/aviso/multiple-vulnerabilities-janobe-products",
|
||||
"source": "cve-coordination@incibe.es"
|
||||
}
|
||||
]
|
||||
}
|
56
CVE-2024/CVE-2024-339xx/CVE-2024-33968.json
Normal file
56
CVE-2024/CVE-2024-339xx/CVE-2024-33968.json
Normal file
@ -0,0 +1,56 @@
|
||||
{
|
||||
"id": "CVE-2024-33968",
|
||||
"sourceIdentifier": "cve-coordination@incibe.es",
|
||||
"published": "2024-08-06T12:15:50.887",
|
||||
"lastModified": "2024-08-06T12:15:50.887",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "SQL injection vulnerability in PayPal, Credit Card and Debit Card Payment affecting version 1.0. An attacker could exploit this vulnerability by sending a specially crafted query to the server and retrieve all the information stored in it through the following 'Attendance' and 'YearLevel' in '/AttendanceMonitoring/report/index.php' parameter."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "cve-coordination@incibe.es",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "cve-coordination@incibe.es",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-89"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.incibe.es/en/incibe-cert/notices/aviso/multiple-vulnerabilities-janobe-products",
|
||||
"source": "cve-coordination@incibe.es"
|
||||
}
|
||||
]
|
||||
}
|
56
CVE-2024/CVE-2024-339xx/CVE-2024-33969.json
Normal file
56
CVE-2024/CVE-2024-339xx/CVE-2024-33969.json
Normal file
@ -0,0 +1,56 @@
|
||||
{
|
||||
"id": "CVE-2024-33969",
|
||||
"sourceIdentifier": "cve-coordination@incibe.es",
|
||||
"published": "2024-08-06T12:15:51.100",
|
||||
"lastModified": "2024-08-06T12:15:51.100",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "SQL injection vulnerability in PayPal, Credit Card and Debit Card Payment affecting version 1.0. An attacker could exploit this vulnerability by sending a specially crafted query to the server and retrieve all the information stored in it through the following 'id' in '/AttendanceMonitoring/department/index.php' parameter."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "cve-coordination@incibe.es",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "cve-coordination@incibe.es",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-89"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.incibe.es/en/incibe-cert/notices/aviso/multiple-vulnerabilities-janobe-products",
|
||||
"source": "cve-coordination@incibe.es"
|
||||
}
|
||||
]
|
||||
}
|
56
CVE-2024/CVE-2024-339xx/CVE-2024-33970.json
Normal file
56
CVE-2024/CVE-2024-339xx/CVE-2024-33970.json
Normal file
@ -0,0 +1,56 @@
|
||||
{
|
||||
"id": "CVE-2024-33970",
|
||||
"sourceIdentifier": "cve-coordination@incibe.es",
|
||||
"published": "2024-08-06T12:15:51.330",
|
||||
"lastModified": "2024-08-06T12:15:51.330",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "SQL injection vulnerability in PayPal, Credit Card and Debit Card Payment affecting version 1.0. An attacker could exploit this vulnerability by sending a specially crafted query to the server and retrieve all the information stored in it through the following 'studid' in '/candidate/controller.php' parameter."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "cve-coordination@incibe.es",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "cve-coordination@incibe.es",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-89"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.incibe.es/en/incibe-cert/notices/aviso/multiple-vulnerabilities-janobe-products",
|
||||
"source": "cve-coordination@incibe.es"
|
||||
}
|
||||
]
|
||||
}
|
56
CVE-2024/CVE-2024-339xx/CVE-2024-33971.json
Normal file
56
CVE-2024/CVE-2024-339xx/CVE-2024-33971.json
Normal file
@ -0,0 +1,56 @@
|
||||
{
|
||||
"id": "CVE-2024-33971",
|
||||
"sourceIdentifier": "cve-coordination@incibe.es",
|
||||
"published": "2024-08-06T12:15:51.550",
|
||||
"lastModified": "2024-08-06T12:15:51.550",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "SQL injection vulnerability in PayPal, Credit Card and Debit Card Payment affecting version 1.0. An attacker could exploit this vulnerability by sending a specially crafted query to the server and retrieve all the information stored in it through the following 'username' in '/login.php' parameter."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "cve-coordination@incibe.es",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "cve-coordination@incibe.es",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-89"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.incibe.es/en/incibe-cert/notices/aviso/multiple-vulnerabilities-janobe-products",
|
||||
"source": "cve-coordination@incibe.es"
|
||||
}
|
||||
]
|
||||
}
|
56
CVE-2024/CVE-2024-339xx/CVE-2024-33972.json
Normal file
56
CVE-2024/CVE-2024-339xx/CVE-2024-33972.json
Normal file
@ -0,0 +1,56 @@
|
||||
{
|
||||
"id": "CVE-2024-33972",
|
||||
"sourceIdentifier": "cve-coordination@incibe.es",
|
||||
"published": "2024-08-06T12:15:51.773",
|
||||
"lastModified": "2024-08-06T12:15:51.773",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "SQL injection vulnerability in PayPal, Credit Card and Debit Card Payment affecting version 1.0. An attacker could exploit this vulnerability by sending a specially crafted query to the server and retrieve all the information stored in it through the following 'events' in '/report/event_print.php' parameter."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "cve-coordination@incibe.es",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "cve-coordination@incibe.es",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-89"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.incibe.es/en/incibe-cert/notices/aviso/multiple-vulnerabilities-janobe-products",
|
||||
"source": "cve-coordination@incibe.es"
|
||||
}
|
||||
]
|
||||
}
|
56
CVE-2024/CVE-2024-339xx/CVE-2024-33973.json
Normal file
56
CVE-2024/CVE-2024-339xx/CVE-2024-33973.json
Normal file
@ -0,0 +1,56 @@
|
||||
{
|
||||
"id": "CVE-2024-33973",
|
||||
"sourceIdentifier": "cve-coordination@incibe.es",
|
||||
"published": "2024-08-06T12:15:51.993",
|
||||
"lastModified": "2024-08-06T12:15:51.993",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "SQL injection vulnerability in PayPal, Credit Card and Debit Card Payment affecting version 1.0. An attacker could exploit this vulnerability by sending a specially crafted query to the server and retrieve all the information stored in it through the following 'Attendance' and 'YearLevel' in '/report/attendance_print.php' parameter."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "cve-coordination@incibe.es",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "cve-coordination@incibe.es",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-89"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.incibe.es/en/incibe-cert/notices/aviso/multiple-vulnerabilities-janobe-products",
|
||||
"source": "cve-coordination@incibe.es"
|
||||
}
|
||||
]
|
||||
}
|
56
CVE-2024/CVE-2024-339xx/CVE-2024-33974.json
Normal file
56
CVE-2024/CVE-2024-339xx/CVE-2024-33974.json
Normal file
@ -0,0 +1,56 @@
|
||||
{
|
||||
"id": "CVE-2024-33974",
|
||||
"sourceIdentifier": "cve-coordination@incibe.es",
|
||||
"published": "2024-08-06T12:15:52.213",
|
||||
"lastModified": "2024-08-06T12:15:52.213",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "SQL injection vulnerability in PayPal, Credit Card and Debit Card Payment affecting version 1.0. An attacker could exploit this vulnerability by sending a specially crafted query to the server and retrieve all the information stored in it through the following 'Users in '/report/printlogs.php' parameter."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "cve-coordination@incibe.es",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "cve-coordination@incibe.es",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-89"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.incibe.es/en/incibe-cert/notices/aviso/multiple-vulnerabilities-janobe-products",
|
||||
"source": "cve-coordination@incibe.es"
|
||||
}
|
||||
]
|
||||
}
|
56
CVE-2024/CVE-2024-339xx/CVE-2024-33982.json
Normal file
56
CVE-2024/CVE-2024-339xx/CVE-2024-33982.json
Normal file
@ -0,0 +1,56 @@
|
||||
{
|
||||
"id": "CVE-2024-33982",
|
||||
"sourceIdentifier": "cve-coordination@incibe.es",
|
||||
"published": "2024-08-06T13:15:53.257",
|
||||
"lastModified": "2024-08-06T13:15:53.257",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Cross-Site Scripting (XSS) vulnerability in School Attendance Monitoring System and School Event Management System affecting version 1.0. An attacker could create a specially crafted URL and send it to a victim to obtain details of their session cookie via the 'StudentID' parameter in '/AttendanceMonitoring/student/controller.php'."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "cve-coordination@incibe.es",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "LOW",
|
||||
"baseScore": 7.1,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 3.7
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "cve-coordination@incibe.es",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.incibe.es/en/incibe-cert/notices/aviso/multiple-vulnerabilities-janobe-products",
|
||||
"source": "cve-coordination@incibe.es"
|
||||
}
|
||||
]
|
||||
}
|
56
CVE-2024/CVE-2024-339xx/CVE-2024-33983.json
Normal file
56
CVE-2024/CVE-2024-339xx/CVE-2024-33983.json
Normal file
@ -0,0 +1,56 @@
|
||||
{
|
||||
"id": "CVE-2024-33983",
|
||||
"sourceIdentifier": "cve-coordination@incibe.es",
|
||||
"published": "2024-08-06T13:15:53.480",
|
||||
"lastModified": "2024-08-06T13:15:53.480",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Cross-Site Scripting (XSS) vulnerability in School Attendance Monitoring System and School Event Management System affecting version 1.0. An attacker could create a specially crafted URL and send it to a victim to obtain details of their session cookie via the 'Attendance', 'attenddate' and 'YearLevel' parameters in '/AttendanceMonitoring/report/attendance_print.php'."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "cve-coordination@incibe.es",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "LOW",
|
||||
"baseScore": 7.1,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 3.7
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "cve-coordination@incibe.es",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.incibe.es/en/incibe-cert/notices/aviso/multiple-vulnerabilities-janobe-products",
|
||||
"source": "cve-coordination@incibe.es"
|
||||
}
|
||||
]
|
||||
}
|
56
CVE-2024/CVE-2024-339xx/CVE-2024-33984.json
Normal file
56
CVE-2024/CVE-2024-339xx/CVE-2024-33984.json
Normal file
@ -0,0 +1,56 @@
|
||||
{
|
||||
"id": "CVE-2024-33984",
|
||||
"sourceIdentifier": "cve-coordination@incibe.es",
|
||||
"published": "2024-08-06T13:15:53.693",
|
||||
"lastModified": "2024-08-06T13:15:53.693",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Cross-Site Scripting (XSS) vulnerability in School Attendance Monitoring System and School Event Management System affecting version 1.0. An attacker could create a specially crafted URL and send it to a victim to obtain details of their session cookie via the 'Attendance', 'attenddate' and 'YearLevel' parameters in '/AttendanceMonitoring/report/index.php'."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "cve-coordination@incibe.es",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "LOW",
|
||||
"baseScore": 7.1,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 3.7
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "cve-coordination@incibe.es",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.incibe.es/en/incibe-cert/notices/aviso/multiple-vulnerabilities-janobe-products",
|
||||
"source": "cve-coordination@incibe.es"
|
||||
}
|
||||
]
|
||||
}
|
56
CVE-2024/CVE-2024-339xx/CVE-2024-33985.json
Normal file
56
CVE-2024/CVE-2024-339xx/CVE-2024-33985.json
Normal file
@ -0,0 +1,56 @@
|
||||
{
|
||||
"id": "CVE-2024-33985",
|
||||
"sourceIdentifier": "cve-coordination@incibe.es",
|
||||
"published": "2024-08-06T13:15:53.907",
|
||||
"lastModified": "2024-08-06T13:15:53.907",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Cross-Site Scripting (XSS) vulnerability in School Attendance Monitoring System and School Event Management System affecting version 1.0. An attacker could create a specially crafted URL and send it to a victim to obtain details of their session cookie via the 'View' parameter in '/course/index.php'."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "cve-coordination@incibe.es",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "LOW",
|
||||
"baseScore": 7.1,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 3.7
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "cve-coordination@incibe.es",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.incibe.es/en/incibe-cert/notices/aviso/multiple-vulnerabilities-janobe-products",
|
||||
"source": "cve-coordination@incibe.es"
|
||||
}
|
||||
]
|
||||
}
|
56
CVE-2024/CVE-2024-339xx/CVE-2024-33986.json
Normal file
56
CVE-2024/CVE-2024-339xx/CVE-2024-33986.json
Normal file
@ -0,0 +1,56 @@
|
||||
{
|
||||
"id": "CVE-2024-33986",
|
||||
"sourceIdentifier": "cve-coordination@incibe.es",
|
||||
"published": "2024-08-06T13:15:54.123",
|
||||
"lastModified": "2024-08-06T13:15:54.123",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Cross-Site Scripting (XSS) vulnerability in School Attendance Monitoring System and School Event Management System affecting version 1.0. An attacker could create a specially crafted URL and send it to a victim to obtain details of their session cookie via the 'View' parameter in '/department/index.php'."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "cve-coordination@incibe.es",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "LOW",
|
||||
"baseScore": 7.1,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 3.7
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "cve-coordination@incibe.es",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.incibe.es/en/incibe-cert/notices/aviso/multiple-vulnerabilities-janobe-products",
|
||||
"source": "cve-coordination@incibe.es"
|
||||
}
|
||||
]
|
||||
}
|
56
CVE-2024/CVE-2024-339xx/CVE-2024-33987.json
Normal file
56
CVE-2024/CVE-2024-339xx/CVE-2024-33987.json
Normal file
@ -0,0 +1,56 @@
|
||||
{
|
||||
"id": "CVE-2024-33987",
|
||||
"sourceIdentifier": "cve-coordination@incibe.es",
|
||||
"published": "2024-08-06T13:15:54.327",
|
||||
"lastModified": "2024-08-06T13:15:54.327",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Cross-Site Scripting (XSS) vulnerability in School Attendance Monitoring System and School Event Management System affecting version 1.0. An attacker could create a specially crafted URL and send it to a victim to obtain details of their session cookie via the 'Attendance', 'attenddate', 'YearLevel', 'eventdate', 'events', 'Users' and 'YearLevel' parameters in '/report/index.php'."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "cve-coordination@incibe.es",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "LOW",
|
||||
"baseScore": 7.1,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 3.7
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "cve-coordination@incibe.es",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.incibe.es/en/incibe-cert/notices/aviso/multiple-vulnerabilities-janobe-products",
|
||||
"source": "cve-coordination@incibe.es"
|
||||
}
|
||||
]
|
||||
}
|
56
CVE-2024/CVE-2024-339xx/CVE-2024-33988.json
Normal file
56
CVE-2024/CVE-2024-339xx/CVE-2024-33988.json
Normal file
@ -0,0 +1,56 @@
|
||||
{
|
||||
"id": "CVE-2024-33988",
|
||||
"sourceIdentifier": "cve-coordination@incibe.es",
|
||||
"published": "2024-08-06T13:15:54.547",
|
||||
"lastModified": "2024-08-06T13:15:54.547",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Cross-Site Scripting (XSS) vulnerability in School Attendance Monitoring System and School Event Management System affecting version 1.0. An attacker could create a specially crafted URL and send it to a victim to obtain details of their session cookie via the 'Attendance', 'attenddate' and 'YearLevel' parameters in '/report/attendance_print.php'."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "cve-coordination@incibe.es",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "LOW",
|
||||
"baseScore": 7.1,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 3.7
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "cve-coordination@incibe.es",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.incibe.es/en/incibe-cert/notices/aviso/multiple-vulnerabilities-janobe-products",
|
||||
"source": "cve-coordination@incibe.es"
|
||||
}
|
||||
]
|
||||
}
|
56
CVE-2024/CVE-2024-339xx/CVE-2024-33989.json
Normal file
56
CVE-2024/CVE-2024-339xx/CVE-2024-33989.json
Normal file
@ -0,0 +1,56 @@
|
||||
{
|
||||
"id": "CVE-2024-33989",
|
||||
"sourceIdentifier": "cve-coordination@incibe.es",
|
||||
"published": "2024-08-06T13:15:54.757",
|
||||
"lastModified": "2024-08-06T13:15:54.757",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Cross-Site Scripting (XSS) vulnerability in School Event Management System affecting version 1.0. An attacker could exploit this vulnerability by sending a specially crafted javascript payload to an authenticated user and partially take over their browser session via the\u00a0'eventdate' and 'events' parameters in 'port/event_print.php'."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "cve-coordination@incibe.es",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "LOW",
|
||||
"baseScore": 7.1,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 3.7
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "cve-coordination@incibe.es",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.incibe.es/en/incibe-cert/notices/aviso/multiple-vulnerabilities-janobe-products",
|
||||
"source": "cve-coordination@incibe.es"
|
||||
}
|
||||
]
|
||||
}
|
56
CVE-2024/CVE-2024-339xx/CVE-2024-33990.json
Normal file
56
CVE-2024/CVE-2024-339xx/CVE-2024-33990.json
Normal file
@ -0,0 +1,56 @@
|
||||
{
|
||||
"id": "CVE-2024-33990",
|
||||
"sourceIdentifier": "cve-coordination@incibe.es",
|
||||
"published": "2024-08-06T13:15:54.973",
|
||||
"lastModified": "2024-08-06T13:15:54.973",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Cross-Site Scripting (XSS) vulnerability in School Event Management System affecting version 1.0. An attacker could exploit this vulnerability by sending a specially crafted javascript payload to an authenticated user and partially take over their browser session via the\u00a0'id' and 'view' parameters in '/user/index.php'."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "cve-coordination@incibe.es",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "LOW",
|
||||
"baseScore": 7.1,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 3.7
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "cve-coordination@incibe.es",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.incibe.es/en/incibe-cert/notices/aviso/multiple-vulnerabilities-janobe-products",
|
||||
"source": "cve-coordination@incibe.es"
|
||||
}
|
||||
]
|
||||
}
|
56
CVE-2024/CVE-2024-339xx/CVE-2024-33991.json
Normal file
56
CVE-2024/CVE-2024-339xx/CVE-2024-33991.json
Normal file
@ -0,0 +1,56 @@
|
||||
{
|
||||
"id": "CVE-2024-33991",
|
||||
"sourceIdentifier": "cve-coordination@incibe.es",
|
||||
"published": "2024-08-06T13:15:55.250",
|
||||
"lastModified": "2024-08-06T13:15:55.250",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Cross-Site Scripting (XSS) vulnerability in School Event Management System affecting version 1.0. An attacker could exploit this vulnerability by sending a specially crafted query to the server and retrieve all the information stored in it through the\u00a0'view' parameter in '/eventwinner/index.php'."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "cve-coordination@incibe.es",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "LOW",
|
||||
"baseScore": 7.1,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 3.7
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "cve-coordination@incibe.es",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.incibe.es/en/incibe-cert/notices/aviso/multiple-vulnerabilities-janobe-products",
|
||||
"source": "cve-coordination@incibe.es"
|
||||
}
|
||||
]
|
||||
}
|
56
CVE-2024/CVE-2024-339xx/CVE-2024-33992.json
Normal file
56
CVE-2024/CVE-2024-339xx/CVE-2024-33992.json
Normal file
@ -0,0 +1,56 @@
|
||||
{
|
||||
"id": "CVE-2024-33992",
|
||||
"sourceIdentifier": "cve-coordination@incibe.es",
|
||||
"published": "2024-08-06T13:15:55.487",
|
||||
"lastModified": "2024-08-06T13:15:55.487",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Cross-Site Scripting (XSS) vulnerability in School Event Management System affecting version 1.0. An attacker could exploit this vulnerability by sending a specially crafted query to the server and retrieve all the information stored in it through the\u00a0'view' parameter in '/student/index.php'."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "cve-coordination@incibe.es",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "LOW",
|
||||
"baseScore": 7.1,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 3.7
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "cve-coordination@incibe.es",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.incibe.es/en/incibe-cert/notices/aviso/multiple-vulnerabilities-janobe-products",
|
||||
"source": "cve-coordination@incibe.es"
|
||||
}
|
||||
]
|
||||
}
|
56
CVE-2024/CVE-2024-339xx/CVE-2024-33993.json
Normal file
56
CVE-2024/CVE-2024-339xx/CVE-2024-33993.json
Normal file
@ -0,0 +1,56 @@
|
||||
{
|
||||
"id": "CVE-2024-33993",
|
||||
"sourceIdentifier": "cve-coordination@incibe.es",
|
||||
"published": "2024-08-06T13:15:55.693",
|
||||
"lastModified": "2024-08-06T13:15:55.693",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Cross-Site Scripting (XSS) vulnerability in School Event Management System affecting version 1.0. An attacker could create a specially crafted URL and send it to a victim to obtain their session details via the\u00a0'view' parameter in /candidate/index.php'."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "cve-coordination@incibe.es",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "LOW",
|
||||
"baseScore": 7.1,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 3.7
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "cve-coordination@incibe.es",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.incibe.es/en/incibe-cert/notices/aviso/multiple-vulnerabilities-janobe-products",
|
||||
"source": "cve-coordination@incibe.es"
|
||||
}
|
||||
]
|
||||
}
|
56
CVE-2024/CVE-2024-339xx/CVE-2024-33994.json
Normal file
56
CVE-2024/CVE-2024-339xx/CVE-2024-33994.json
Normal file
@ -0,0 +1,56 @@
|
||||
{
|
||||
"id": "CVE-2024-33994",
|
||||
"sourceIdentifier": "cve-coordination@incibe.es",
|
||||
"published": "2024-08-06T13:15:55.897",
|
||||
"lastModified": "2024-08-06T13:15:55.897",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Cross-Site Scripting (XSS) vulnerability in School Event Management System affecting version 1.0. An attacker could create a specially crafted URL and send it to a victim to obtain their session details via the\u00a0'view' parameter in '/event/index.php'."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "cve-coordination@incibe.es",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "LOW",
|
||||
"baseScore": 7.1,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 3.7
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "cve-coordination@incibe.es",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.incibe.es/en/incibe-cert/notices/aviso/multiple-vulnerabilities-janobe-products",
|
||||
"source": "cve-coordination@incibe.es"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-37343",
|
||||
"sourceIdentifier": "SecurityResponse@netmotionsoftware.com",
|
||||
"published": "2024-06-20T17:15:50.910",
|
||||
"lastModified": "2024-06-21T11:22:01.687",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2024-08-06T13:48:32.297",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -17,6 +17,26 @@
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 5.4,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.3,
|
||||
"impactScore": 2.7
|
||||
},
|
||||
{
|
||||
"source": "SecurityResponse@netmotionsoftware.com",
|
||||
"type": "Secondary",
|
||||
@ -40,6 +60,16 @@
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "SecurityResponse@netmotionsoftware.com",
|
||||
"type": "Secondary",
|
||||
@ -51,10 +81,31 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:absolute:secure_access:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "13.06",
|
||||
"matchCriteriaId": "1113DB3C-BD71-42ED-A4AF-0098AA744FD8"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.absolute.com/platform/security-information/vulnerability-archive/secure-access-1306/cve-2024-37343/",
|
||||
"source": "SecurityResponse@netmotionsoftware.com"
|
||||
"source": "SecurityResponse@netmotionsoftware.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-37344",
|
||||
"sourceIdentifier": "SecurityResponse@netmotionsoftware.com",
|
||||
"published": "2024-06-20T17:15:51.153",
|
||||
"lastModified": "2024-06-21T11:22:01.687",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2024-08-06T13:49:14.817",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -17,6 +17,26 @@
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:N/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "HIGH",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 3.4,
|
||||
"baseSeverity": "LOW"
|
||||
},
|
||||
"exploitabilityScore": 1.7,
|
||||
"impactScore": 1.4
|
||||
},
|
||||
{
|
||||
"source": "SecurityResponse@netmotionsoftware.com",
|
||||
"type": "Secondary",
|
||||
@ -40,6 +60,16 @@
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "SecurityResponse@netmotionsoftware.com",
|
||||
"type": "Secondary",
|
||||
@ -51,10 +81,31 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:absolute:secure_access:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "13.06",
|
||||
"matchCriteriaId": "1113DB3C-BD71-42ED-A4AF-0098AA744FD8"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.absolute.com/platform/security-information/vulnerability-archive/secure-access-1306/cve-2024-37344/",
|
||||
"source": "SecurityResponse@netmotionsoftware.com"
|
||||
"source": "SecurityResponse@netmotionsoftware.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-37345",
|
||||
"sourceIdentifier": "SecurityResponse@netmotionsoftware.com",
|
||||
"published": "2024-06-20T17:15:51.397",
|
||||
"lastModified": "2024-06-21T11:22:01.687",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2024-08-06T13:49:26.063",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -17,6 +17,26 @@
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 5.4,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 2.5
|
||||
},
|
||||
{
|
||||
"source": "SecurityResponse@netmotionsoftware.com",
|
||||
"type": "Secondary",
|
||||
@ -40,6 +60,16 @@
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "SecurityResponse@netmotionsoftware.com",
|
||||
"type": "Secondary",
|
||||
@ -51,10 +81,31 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:absolute:secure_access:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "13.06",
|
||||
"matchCriteriaId": "1113DB3C-BD71-42ED-A4AF-0098AA744FD8"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.absolute.com/platform/security-information/vulnerability-archive/secure-access-1306/cve-2024-37345/",
|
||||
"source": "SecurityResponse@netmotionsoftware.com"
|
||||
"source": "SecurityResponse@netmotionsoftware.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-37347",
|
||||
"sourceIdentifier": "SecurityResponse@netmotionsoftware.com",
|
||||
"published": "2024-06-20T17:15:51.853",
|
||||
"lastModified": "2024-06-21T11:22:01.687",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2024-08-06T13:50:02.077",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -17,6 +17,26 @@
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:N/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "HIGH",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 3.4,
|
||||
"baseSeverity": "LOW"
|
||||
},
|
||||
"exploitabilityScore": 1.7,
|
||||
"impactScore": 1.4
|
||||
},
|
||||
{
|
||||
"source": "SecurityResponse@netmotionsoftware.com",
|
||||
"type": "Secondary",
|
||||
@ -40,6 +60,16 @@
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "SecurityResponse@netmotionsoftware.com",
|
||||
"type": "Secondary",
|
||||
@ -51,10 +81,31 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:absolute:secure_access:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "13.06",
|
||||
"matchCriteriaId": "1113DB3C-BD71-42ED-A4AF-0098AA744FD8"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.absolute.com/platform/security-information/vulnerability-archive/secure-access-1306/cve-2024-37347/",
|
||||
"source": "SecurityResponse@netmotionsoftware.com"
|
||||
"source": "SecurityResponse@netmotionsoftware.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-38856",
|
||||
"sourceIdentifier": "security@apache.org",
|
||||
"published": "2024-08-05T09:15:56.780",
|
||||
"lastModified": "2024-08-05T12:41:45.957",
|
||||
"lastModified": "2024-08-06T13:35:01.497",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -15,7 +15,30 @@
|
||||
"value": "Vulnerabilidad de autorizaci\u00f3n incorrecta en Apache OFBiz. Este problema afecta a Apache OFBiz: hasta la versi\u00f3n 18.12.14. Se recomienda a los usuarios que actualicen a la versi\u00f3n 18.12.15, que soluciona el problema. Los puntos finales no autenticados podr\u00edan permitir la ejecuci\u00f3n del c\u00f3digo de representaci\u00f3n de pantallas si se cumplen algunas condiciones previas (por ejemplo, cuando las definiciones de pantalla no comprueban expl\u00edcitamente los permisos del usuario porque dependen de la configuraci\u00f3n de sus endpoints)."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 8.1,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 5.2
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security@apache.org",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-40951",
|
||||
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"published": "2024-07-12T13:15:17.420",
|
||||
"lastModified": "2024-07-12T16:34:58.687",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2024-08-06T13:29:07.827",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -15,19 +15,109 @@
|
||||
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: ocfs2: corrige la desreferencia del puntero NULL en ocfs2_abort_trigger() bdev->bd_super se ha eliminado y el commit 8887b94d9322 cambia el uso de bdev->bd_super a b_assoc_map->host->i_sb. Dado que ocfs2 no ha configurado bh->b_assoc_map, activar\u00e1 la desreferencia del puntero NULL al llamar a ocfs2_abort_trigger(). En realidad, esto se se\u00f1al\u00f3 en la historia, consulte el commit 74e364ad1b13. Pero comet\u00ed un error al revisar el commit 8887b94d9322 y luego reintroducir esta regresi\u00f3n. Dado que no podemos reactivar bdev en el encabezado del b\u00fafer, solucione este problema inicializando todos los tipos de activadores de ocfs2 cuando complete el super, y luego obtenga el activador de ocfs2 espec\u00edfico de ocfs2_caching_info cuando acceda al diario. [joseph.qi@linux.alibaba.com:v2] Enlace: https://lkml.kernel.org/r/20240602112045.1112708-1-joseph.qi@linux.alibaba.com"
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 5.5,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-476"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "6.6",
|
||||
"versionEndExcluding": "6.6.36",
|
||||
"matchCriteriaId": "7811AF31-E4C8-4CC1-8D27-717621D639B8"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "6.7",
|
||||
"versionEndExcluding": "6.9.7",
|
||||
"matchCriteriaId": "0A047AF2-94AC-4A3A-B32D-6AB930D8EF1C"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:6.10:rc1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "2EBB4392-5FA6-4DA9-9772-8F9C750109FA"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:6.10:rc2:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "331C2F14-12C7-45D5-893D-8C52EE38EA10"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:6.10:rc3:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "3173713D-909A-4DD3-9DD4-1E171EB057EE"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:6.10:rc4:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "79F18AFA-40F7-43F0-BA30-7BDB65F918B9"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/67bcecd780609f471260a8c83fb0ae15f27734ce",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/685d03c3795378fca6a1b3d43581f7f1a3fc095f",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/eb63357ef229fae061ce7ce2839d558681c42f1a",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-41684",
|
||||
"sourceIdentifier": "vdisclose@cert-in.org.in",
|
||||
"published": "2024-07-26T12:15:02.763",
|
||||
"lastModified": "2024-08-01T08:15:03.390",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2024-08-06T13:25:49.640",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -59,9 +59,41 @@
|
||||
"baseSeverity": "MEDIUM"
|
||||
}
|
||||
}
|
||||
],
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 5.3,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 1.4
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "NVD-CWE-Other"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "vdisclose@cert-in.org.in",
|
||||
"type": "Secondary",
|
||||
@ -73,10 +105,42 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:syrotech:sy-gpon-1110-wdont_firmware:3.1.02-231102:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "86741534-D753-4728-BA0B-AF4E5F911DF5"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:syrotech:sy-gpon-1110-wdont:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "85FA5240-DBBB-42C6-807F-59024B25269A"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.cert-in.org.in/s2cMainServlet?pageid=PUBVLNOTES01&VLCODE=CIVN-2024-0225",
|
||||
"source": "vdisclose@cert-in.org.in"
|
||||
"source": "vdisclose@cert-in.org.in",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-41685",
|
||||
"sourceIdentifier": "vdisclose@cert-in.org.in",
|
||||
"published": "2024-07-26T12:15:02.977",
|
||||
"lastModified": "2024-08-01T08:15:03.547",
|
||||
"lastModified": "2024-08-06T12:51:23.760",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -59,9 +59,41 @@
|
||||
"baseSeverity": "MEDIUM"
|
||||
}
|
||||
}
|
||||
],
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 7.5,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-732"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "vdisclose@cert-in.org.in",
|
||||
"type": "Secondary",
|
||||
@ -73,10 +105,42 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:syrotech:sy-gpon-1110-wdont_firmware:3.1.02-231102:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "86741534-D753-4728-BA0B-AF4E5F911DF5"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:syrotech:sy-gpon-1110-wdont:*:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "C3AC77A6-E942-41FD-998A-12E96BA002CF"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.cert-in.org.in/s2cMainServlet?pageid=PUBVLNOTES01&VLCODE=CIVN-2024-0225",
|
||||
"source": "vdisclose@cert-in.org.in"
|
||||
"source": "vdisclose@cert-in.org.in",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-41686",
|
||||
"sourceIdentifier": "vdisclose@cert-in.org.in",
|
||||
"published": "2024-07-26T12:15:03.113",
|
||||
"lastModified": "2024-08-01T08:15:03.640",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2024-08-06T13:20:05.540",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -59,9 +59,41 @@
|
||||
"baseSeverity": "HIGH"
|
||||
}
|
||||
}
|
||||
],
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 3.3,
|
||||
"baseSeverity": "LOW"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 1.4
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "NVD-CWE-noinfo"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "vdisclose@cert-in.org.in",
|
||||
"type": "Secondary",
|
||||
@ -73,10 +105,42 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:syrotech:sy-gpon-1110-wdont_firmware:3.1.02-231102:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "86741534-D753-4728-BA0B-AF4E5F911DF5"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:syrotech:sy-gpon-1110-wdont:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "85FA5240-DBBB-42C6-807F-59024B25269A"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.cert-in.org.in/s2cMainServlet?pageid=PUBVLNOTES01&VLCODE=CIVN-2024-0225",
|
||||
"source": "vdisclose@cert-in.org.in"
|
||||
"source": "vdisclose@cert-in.org.in",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
56
CVE-2024/CVE-2024-431xx/CVE-2024-43114.json
Normal file
56
CVE-2024/CVE-2024-431xx/CVE-2024-43114.json
Normal file
@ -0,0 +1,56 @@
|
||||
{
|
||||
"id": "CVE-2024-43114",
|
||||
"sourceIdentifier": "cve@jetbrains.com",
|
||||
"published": "2024-08-06T13:15:56.130",
|
||||
"lastModified": "2024-08-06T13:15:56.130",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "In JetBrains TeamCity before 2024.07.1 possible privilege escalation due to incorrect directory permissions"
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "cve@jetbrains.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:N",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "HIGH",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 7.5,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 1.1,
|
||||
"impactScore": 5.8
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "cve@jetbrains.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-276"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.jetbrains.com/privacy-security/issues-fixed/",
|
||||
"source": "cve@jetbrains.com"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-5179",
|
||||
"sourceIdentifier": "security@wordfence.com",
|
||||
"published": "2024-06-06T02:15:54.487",
|
||||
"lastModified": "2024-06-06T14:17:35.017",
|
||||
"lastModified": "2024-08-06T12:10:17.047",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -39,34 +39,92 @@
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-22"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:codeless:cowidgets_elementor_addons:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "1.2.0",
|
||||
"matchCriteriaId": "4BCA1C3B-FAB1-44E2-B090-BF82C4364981"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/browser/cowidgets-elementor-addons/trunk/inc/widgets-manager/widgets/content/class-ce-portfolio-grid.php#L707",
|
||||
"source": "security@wordfence.com"
|
||||
"source": "security@wordfence.com",
|
||||
"tags": [
|
||||
"Patch",
|
||||
"Product"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/browser/cowidgets-elementor-addons/trunk/inc/widgets-manager/widgets/content/class-ce-post-navigation.php#L257",
|
||||
"source": "security@wordfence.com"
|
||||
"source": "security@wordfence.com",
|
||||
"tags": [
|
||||
"Patch",
|
||||
"Product"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/browser/cowidgets-elementor-addons/trunk/inc/widgets-manager/widgets/content/class-ce-posts-carousel.php#L727",
|
||||
"source": "security@wordfence.com"
|
||||
"source": "security@wordfence.com",
|
||||
"tags": [
|
||||
"Patch",
|
||||
"Product"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/browser/cowidgets-elementor-addons/trunk/inc/widgets-manager/widgets/content/class-ce-posts-grid.php#L582",
|
||||
"source": "security@wordfence.com"
|
||||
"source": "security@wordfence.com",
|
||||
"tags": [
|
||||
"Patch",
|
||||
"Product"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/browser/cowidgets-elementor-addons/trunk/inc/widgets-manager/widgets/content/class-ce-staff-carousel.php#L603",
|
||||
"source": "security@wordfence.com"
|
||||
"source": "security@wordfence.com",
|
||||
"tags": [
|
||||
"Patch",
|
||||
"Product"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/browser/cowidgets-elementor-addons/trunk/inc/widgets-manager/widgets/content/class-ce-testimonial-carousel.php#L600",
|
||||
"source": "security@wordfence.com"
|
||||
"source": "security@wordfence.com",
|
||||
"tags": [
|
||||
"Patch",
|
||||
"Product"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/ebd6acc9-b7df-4cf8-a211-1e39f3abcf79?source=cve",
|
||||
"source": "security@wordfence.com"
|
||||
"source": "security@wordfence.com",
|
||||
"tags": [
|
||||
"Patch",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
56
CVE-2024/CVE-2024-63xx/CVE-2024-6357.json
Normal file
56
CVE-2024/CVE-2024-63xx/CVE-2024-6357.json
Normal file
@ -0,0 +1,56 @@
|
||||
{
|
||||
"id": "CVE-2024-6357",
|
||||
"sourceIdentifier": "security@opentext.com",
|
||||
"published": "2024-08-06T13:15:56.333",
|
||||
"lastModified": "2024-08-06T13:15:56.333",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Insecure Direct Object Reference vulnerability identified in OpenText ArcSight Intelligence."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security@opentext.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "LOW",
|
||||
"baseScore": 6.3,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 3.4
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security@opentext.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-639"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://portal.microfocus.com/s/article/KM000032593",
|
||||
"source": "security@opentext.com"
|
||||
}
|
||||
]
|
||||
}
|
56
CVE-2024/CVE-2024-63xx/CVE-2024-6358.json
Normal file
56
CVE-2024/CVE-2024-63xx/CVE-2024-6358.json
Normal file
@ -0,0 +1,56 @@
|
||||
{
|
||||
"id": "CVE-2024-6358",
|
||||
"sourceIdentifier": "security@opentext.com",
|
||||
"published": "2024-08-06T13:15:56.547",
|
||||
"lastModified": "2024-08-06T13:15:56.547",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Incorrect Authorization vulnerability identified in OpenText ArcSight Intelligence."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security@opentext.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:H/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 6.3,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.1,
|
||||
"impactScore": 4.2
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security@opentext.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-863"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://portal.microfocus.com/s/article/KM000032595",
|
||||
"source": "security@opentext.com"
|
||||
}
|
||||
]
|
||||
}
|
56
CVE-2024/CVE-2024-63xx/CVE-2024-6359.json
Normal file
56
CVE-2024/CVE-2024-63xx/CVE-2024-6359.json
Normal file
@ -0,0 +1,56 @@
|
||||
{
|
||||
"id": "CVE-2024-6359",
|
||||
"sourceIdentifier": "security@opentext.com",
|
||||
"published": "2024-08-06T13:15:56.757",
|
||||
"lastModified": "2024-08-06T13:15:56.757",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Privilege escalation vulnerability identified in OpenText ArcSight Intelligence."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security@opentext.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:L/A:L",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "HIGH",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "LOW",
|
||||
"baseScore": 6.4,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 1.6,
|
||||
"impactScore": 4.7
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security@opentext.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-269"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://portal.microfocus.com/s/article/KM000032594",
|
||||
"source": "security@opentext.com"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-6729",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2024-07-14T02:15:02.117",
|
||||
"lastModified": "2024-07-21T06:15:02.240",
|
||||
"lastModified": "2024-08-06T12:15:52.700",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -122,7 +122,7 @@
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://reports-kunull.vercel.app/CVE%20research/2024/cve-2024-6729",
|
||||
"url": "https://reports-kunull.vercel.app/CVEs/2024/CVE-2024-6729",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-7172",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2024-07-28T23:15:10.117",
|
||||
"lastModified": "2024-07-29T14:12:08.783",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-08-06T12:51:40.243",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -61,6 +61,26 @@
|
||||
}
|
||||
],
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 8.8,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 5.9
|
||||
},
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
@ -120,22 +140,65 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:totolink:a3600r_firmware:4.1.2cu.5182_b20201102:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "03658809-4127-4409-AD55-0700186EAFBD"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:totolink:a3600r:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "F10B282D-E388-4A52-B7F8-D08C83CF0D62"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/abcdefg-png/IoT-vulnerable/blob/main/TOTOLINK/A3600R/getSaveConfig.md",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.272593",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Permissions Required",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.272593",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?submit.378039",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-7173",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2024-07-29T00:15:02.030",
|
||||
"lastModified": "2024-07-29T14:12:08.783",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-08-06T12:52:46.230",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -61,6 +61,26 @@
|
||||
}
|
||||
],
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 8.8,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 5.9
|
||||
},
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
@ -120,22 +140,65 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:totolink:a3600r_firmware:4.1.2cu.5182_b20201102:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "03658809-4127-4409-AD55-0700186EAFBD"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:totolink:a3600r:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "F10B282D-E388-4A52-B7F8-D08C83CF0D62"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/abcdefg-png/IoT-vulnerable/blob/main/TOTOLINK/A3600R/loginauth.md",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.272594",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Permissions Required",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.272594",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?submit.378040",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-7174",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2024-07-29T00:15:02.320",
|
||||
"lastModified": "2024-07-29T14:12:08.783",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-08-06T13:14:59.030",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -61,6 +61,26 @@
|
||||
}
|
||||
],
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 8.8,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 5.9
|
||||
},
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
@ -110,8 +130,18 @@
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-77"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -120,22 +150,65 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:totolink:a3600r_firmware:4.1.2cu.5182_b20201102:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "03658809-4127-4409-AD55-0700186EAFBD"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:totolink:a3600r:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "F10B282D-E388-4A52-B7F8-D08C83CF0D62"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/abcdefg-png/IoT-vulnerable/blob/main/TOTOLINK/A3600R/setDeviceName.md",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.272595",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Permissions Required",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.272595",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?submit.378041",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-7175",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2024-07-29T01:15:09.830",
|
||||
"lastModified": "2024-07-29T14:12:08.783",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-08-06T12:57:14.623",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -61,6 +61,26 @@
|
||||
}
|
||||
],
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 8.8,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 5.9
|
||||
},
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
@ -120,22 +140,65 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:totolink:a3600r_firmware:4.1.2cu.5182_b20201102:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "03658809-4127-4409-AD55-0700186EAFBD"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:totolink:a3600r:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "F10B282D-E388-4A52-B7F8-D08C83CF0D62"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/abcdefg-png/IoT-vulnerable/blob/main/TOTOLINK/A3600R/setDiagnosisCfg.md",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.272596",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Permissions Required",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.272596",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?submit.378042",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-7176",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2024-07-29T02:15:12.810",
|
||||
"lastModified": "2024-07-29T14:12:08.783",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-08-06T12:58:00.850",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -61,6 +61,26 @@
|
||||
}
|
||||
],
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 8.8,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 5.9
|
||||
},
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
@ -120,22 +140,65 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:totolink:a3600r_firmware:4.1.2cu.5182_b20201102:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "03658809-4127-4409-AD55-0700186EAFBD"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:totolink:a3600r:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "F10B282D-E388-4A52-B7F8-D08C83CF0D62"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/abcdefg-png/IoT-vulnerable/blob/main/TOTOLINK/A3600R/setIpQosRules.md",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.272597",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Permissions Required",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.272597",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?submit.378043",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-7177",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2024-07-29T02:15:13.077",
|
||||
"lastModified": "2024-07-29T14:12:08.783",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-08-06T13:15:14.603",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -61,6 +61,26 @@
|
||||
}
|
||||
],
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 8.8,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 5.9
|
||||
},
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
@ -110,8 +130,18 @@
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-77"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -120,22 +150,65 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:totolink:a3600r_firmware:4.1.2cu.5182_b20201102:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "03658809-4127-4409-AD55-0700186EAFBD"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:totolink:a3600r:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "F10B282D-E388-4A52-B7F8-D08C83CF0D62"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/abcdefg-png/IoT-vulnerable/blob/main/TOTOLINK/A3600R/setLanguageCfg.md",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.272598",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Permissions Required",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.272598",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?submit.378044",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-7217",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2024-07-30T05:15:09.957",
|
||||
"lastModified": "2024-07-30T13:32:45.943",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2024-08-06T13:54:06.807",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -61,6 +61,26 @@
|
||||
}
|
||||
],
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 8.8,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 5.9
|
||||
},
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
@ -120,22 +140,63 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:totolink:ca300-poe_firmware:6.2c.884:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "F8729CF2-38C8-483B-9BDB-7C4ACA2C8D97"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:totolink:ca300-poe:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "006251DF-FF38-4FC5-8BE2-96374D8F6B7B"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/abcdefg-png/IoT-vulnerable/blob/main/TOTOLINK/CA300-PoE/loginauth_password.md",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Exploit"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.272788",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Permissions Required"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.272788",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Permissions Required"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?submit.378333",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
29
CVE-2024/CVE-2024-75xx/CVE-2024-7518.json
Normal file
29
CVE-2024/CVE-2024-75xx/CVE-2024-7518.json
Normal file
@ -0,0 +1,29 @@
|
||||
{
|
||||
"id": "CVE-2024-7518",
|
||||
"sourceIdentifier": "security@mozilla.org",
|
||||
"published": "2024-08-06T13:15:56.970",
|
||||
"lastModified": "2024-08-06T13:15:56.970",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Select options could obscure the fullscreen notification dialog. This could be used by a malicious site to perform a spoofing attack. This vulnerability affects Firefox < 129 and Firefox ESR < 128.1."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1875354",
|
||||
"source": "security@mozilla.org"
|
||||
},
|
||||
{
|
||||
"url": "https://www.mozilla.org/security/advisories/mfsa2024-33/",
|
||||
"source": "security@mozilla.org"
|
||||
},
|
||||
{
|
||||
"url": "https://www.mozilla.org/security/advisories/mfsa2024-35/",
|
||||
"source": "security@mozilla.org"
|
||||
}
|
||||
]
|
||||
}
|
33
CVE-2024/CVE-2024-75xx/CVE-2024-7519.json
Normal file
33
CVE-2024/CVE-2024-75xx/CVE-2024-7519.json
Normal file
@ -0,0 +1,33 @@
|
||||
{
|
||||
"id": "CVE-2024-7519",
|
||||
"sourceIdentifier": "security@mozilla.org",
|
||||
"published": "2024-08-06T13:15:57.040",
|
||||
"lastModified": "2024-08-06T13:15:57.040",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Insufficient checks when processing graphics shared memory could have led to memory corruption. This could be leveraged by an attacker to perform a sandbox escape. This vulnerability affects Firefox < 129, Firefox ESR < 115.14, and Firefox ESR < 128.1."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1902307",
|
||||
"source": "security@mozilla.org"
|
||||
},
|
||||
{
|
||||
"url": "https://www.mozilla.org/security/advisories/mfsa2024-33/",
|
||||
"source": "security@mozilla.org"
|
||||
},
|
||||
{
|
||||
"url": "https://www.mozilla.org/security/advisories/mfsa2024-34/",
|
||||
"source": "security@mozilla.org"
|
||||
},
|
||||
{
|
||||
"url": "https://www.mozilla.org/security/advisories/mfsa2024-35/",
|
||||
"source": "security@mozilla.org"
|
||||
}
|
||||
]
|
||||
}
|
29
CVE-2024/CVE-2024-75xx/CVE-2024-7520.json
Normal file
29
CVE-2024/CVE-2024-75xx/CVE-2024-7520.json
Normal file
@ -0,0 +1,29 @@
|
||||
{
|
||||
"id": "CVE-2024-7520",
|
||||
"sourceIdentifier": "security@mozilla.org",
|
||||
"published": "2024-08-06T13:15:57.107",
|
||||
"lastModified": "2024-08-06T13:15:57.107",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A type confusion bug in WebAssembly could be leveraged by an attacker to potentially achieve code execution. This vulnerability affects Firefox < 129 and Firefox ESR < 128.1."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1903041",
|
||||
"source": "security@mozilla.org"
|
||||
},
|
||||
{
|
||||
"url": "https://www.mozilla.org/security/advisories/mfsa2024-33/",
|
||||
"source": "security@mozilla.org"
|
||||
},
|
||||
{
|
||||
"url": "https://www.mozilla.org/security/advisories/mfsa2024-35/",
|
||||
"source": "security@mozilla.org"
|
||||
}
|
||||
]
|
||||
}
|
33
CVE-2024/CVE-2024-75xx/CVE-2024-7521.json
Normal file
33
CVE-2024/CVE-2024-75xx/CVE-2024-7521.json
Normal file
@ -0,0 +1,33 @@
|
||||
{
|
||||
"id": "CVE-2024-7521",
|
||||
"sourceIdentifier": "security@mozilla.org",
|
||||
"published": "2024-08-06T13:15:57.167",
|
||||
"lastModified": "2024-08-06T13:15:57.167",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Incomplete WebAssembly exception handing could have led to a use-after-free. This vulnerability affects Firefox < 129, Firefox ESR < 115.14, and Firefox ESR < 128.1."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1904644",
|
||||
"source": "security@mozilla.org"
|
||||
},
|
||||
{
|
||||
"url": "https://www.mozilla.org/security/advisories/mfsa2024-33/",
|
||||
"source": "security@mozilla.org"
|
||||
},
|
||||
{
|
||||
"url": "https://www.mozilla.org/security/advisories/mfsa2024-34/",
|
||||
"source": "security@mozilla.org"
|
||||
},
|
||||
{
|
||||
"url": "https://www.mozilla.org/security/advisories/mfsa2024-35/",
|
||||
"source": "security@mozilla.org"
|
||||
}
|
||||
]
|
||||
}
|
33
CVE-2024/CVE-2024-75xx/CVE-2024-7522.json
Normal file
33
CVE-2024/CVE-2024-75xx/CVE-2024-7522.json
Normal file
@ -0,0 +1,33 @@
|
||||
{
|
||||
"id": "CVE-2024-7522",
|
||||
"sourceIdentifier": "security@mozilla.org",
|
||||
"published": "2024-08-06T13:15:57.237",
|
||||
"lastModified": "2024-08-06T13:15:57.237",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Editor code failed to check an attribute value. This could have led to an out-of-bounds read. This vulnerability affects Firefox < 129, Firefox ESR < 115.14, and Firefox ESR < 128.1."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1906727",
|
||||
"source": "security@mozilla.org"
|
||||
},
|
||||
{
|
||||
"url": "https://www.mozilla.org/security/advisories/mfsa2024-33/",
|
||||
"source": "security@mozilla.org"
|
||||
},
|
||||
{
|
||||
"url": "https://www.mozilla.org/security/advisories/mfsa2024-34/",
|
||||
"source": "security@mozilla.org"
|
||||
},
|
||||
{
|
||||
"url": "https://www.mozilla.org/security/advisories/mfsa2024-35/",
|
||||
"source": "security@mozilla.org"
|
||||
}
|
||||
]
|
||||
}
|
25
CVE-2024/CVE-2024-75xx/CVE-2024-7523.json
Normal file
25
CVE-2024/CVE-2024-75xx/CVE-2024-7523.json
Normal file
@ -0,0 +1,25 @@
|
||||
{
|
||||
"id": "CVE-2024-7523",
|
||||
"sourceIdentifier": "security@mozilla.org",
|
||||
"published": "2024-08-06T13:15:57.297",
|
||||
"lastModified": "2024-08-06T13:15:57.297",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A select option could partially obscure security prompts. This could be used by a malicious site to trick a user into granting permissions. \n*This issue only affects Android versions of Firefox.* This vulnerability affects Firefox < 129."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1908344",
|
||||
"source": "security@mozilla.org"
|
||||
},
|
||||
{
|
||||
"url": "https://www.mozilla.org/security/advisories/mfsa2024-33/",
|
||||
"source": "security@mozilla.org"
|
||||
}
|
||||
]
|
||||
}
|
33
CVE-2024/CVE-2024-75xx/CVE-2024-7524.json
Normal file
33
CVE-2024/CVE-2024-75xx/CVE-2024-7524.json
Normal file
@ -0,0 +1,33 @@
|
||||
{
|
||||
"id": "CVE-2024-7524",
|
||||
"sourceIdentifier": "security@mozilla.org",
|
||||
"published": "2024-08-06T13:15:57.357",
|
||||
"lastModified": "2024-08-06T13:15:57.357",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Firefox adds web-compatibility shims in place of some tracking scripts blocked by Enhanced Tracking Protection. On a site protected by Content Security Policy in \"strict-dynamic\" mode, an attacker able to inject an HTML element could have used a DOM Clobbering attack on some of the shims and achieved XSS, bypassing the CSP strict-dynamic protection. This vulnerability affects Firefox < 129, Firefox ESR < 115.14, and Firefox ESR < 128.1."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1909241",
|
||||
"source": "security@mozilla.org"
|
||||
},
|
||||
{
|
||||
"url": "https://www.mozilla.org/security/advisories/mfsa2024-33/",
|
||||
"source": "security@mozilla.org"
|
||||
},
|
||||
{
|
||||
"url": "https://www.mozilla.org/security/advisories/mfsa2024-34/",
|
||||
"source": "security@mozilla.org"
|
||||
},
|
||||
{
|
||||
"url": "https://www.mozilla.org/security/advisories/mfsa2024-35/",
|
||||
"source": "security@mozilla.org"
|
||||
}
|
||||
]
|
||||
}
|
33
CVE-2024/CVE-2024-75xx/CVE-2024-7525.json
Normal file
33
CVE-2024/CVE-2024-75xx/CVE-2024-7525.json
Normal file
@ -0,0 +1,33 @@
|
||||
{
|
||||
"id": "CVE-2024-7525",
|
||||
"sourceIdentifier": "security@mozilla.org",
|
||||
"published": "2024-08-06T13:15:57.420",
|
||||
"lastModified": "2024-08-06T13:15:57.420",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "It was possible for a web extension with minimal permissions to create a `StreamFilter` which could be used to read and modify the response body of requests on any site. This vulnerability affects Firefox < 129, Firefox ESR < 115.14, and Firefox ESR < 128.1."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1909298",
|
||||
"source": "security@mozilla.org"
|
||||
},
|
||||
{
|
||||
"url": "https://www.mozilla.org/security/advisories/mfsa2024-33/",
|
||||
"source": "security@mozilla.org"
|
||||
},
|
||||
{
|
||||
"url": "https://www.mozilla.org/security/advisories/mfsa2024-34/",
|
||||
"source": "security@mozilla.org"
|
||||
},
|
||||
{
|
||||
"url": "https://www.mozilla.org/security/advisories/mfsa2024-35/",
|
||||
"source": "security@mozilla.org"
|
||||
}
|
||||
]
|
||||
}
|
33
CVE-2024/CVE-2024-75xx/CVE-2024-7526.json
Normal file
33
CVE-2024/CVE-2024-75xx/CVE-2024-7526.json
Normal file
@ -0,0 +1,33 @@
|
||||
{
|
||||
"id": "CVE-2024-7526",
|
||||
"sourceIdentifier": "security@mozilla.org",
|
||||
"published": "2024-08-06T13:15:57.483",
|
||||
"lastModified": "2024-08-06T13:15:57.483",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "ANGLE failed to initialize parameters which lead to reading from uninitialized memory. This could be leveraged to leak sensitive data from memory. This vulnerability affects Firefox < 129, Firefox ESR < 115.14, and Firefox ESR < 128.1."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1910306",
|
||||
"source": "security@mozilla.org"
|
||||
},
|
||||
{
|
||||
"url": "https://www.mozilla.org/security/advisories/mfsa2024-33/",
|
||||
"source": "security@mozilla.org"
|
||||
},
|
||||
{
|
||||
"url": "https://www.mozilla.org/security/advisories/mfsa2024-34/",
|
||||
"source": "security@mozilla.org"
|
||||
},
|
||||
{
|
||||
"url": "https://www.mozilla.org/security/advisories/mfsa2024-35/",
|
||||
"source": "security@mozilla.org"
|
||||
}
|
||||
]
|
||||
}
|
33
CVE-2024/CVE-2024-75xx/CVE-2024-7527.json
Normal file
33
CVE-2024/CVE-2024-75xx/CVE-2024-7527.json
Normal file
@ -0,0 +1,33 @@
|
||||
{
|
||||
"id": "CVE-2024-7527",
|
||||
"sourceIdentifier": "security@mozilla.org",
|
||||
"published": "2024-08-06T13:15:57.543",
|
||||
"lastModified": "2024-08-06T13:15:57.543",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Unexpected marking work at the start of sweeping could have led to a use-after-free. This vulnerability affects Firefox < 129, Firefox ESR < 115.14, and Firefox ESR < 128.1."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1871303",
|
||||
"source": "security@mozilla.org"
|
||||
},
|
||||
{
|
||||
"url": "https://www.mozilla.org/security/advisories/mfsa2024-33/",
|
||||
"source": "security@mozilla.org"
|
||||
},
|
||||
{
|
||||
"url": "https://www.mozilla.org/security/advisories/mfsa2024-34/",
|
||||
"source": "security@mozilla.org"
|
||||
},
|
||||
{
|
||||
"url": "https://www.mozilla.org/security/advisories/mfsa2024-35/",
|
||||
"source": "security@mozilla.org"
|
||||
}
|
||||
]
|
||||
}
|
29
CVE-2024/CVE-2024-75xx/CVE-2024-7528.json
Normal file
29
CVE-2024/CVE-2024-75xx/CVE-2024-7528.json
Normal file
@ -0,0 +1,29 @@
|
||||
{
|
||||
"id": "CVE-2024-7528",
|
||||
"sourceIdentifier": "security@mozilla.org",
|
||||
"published": "2024-08-06T13:15:57.600",
|
||||
"lastModified": "2024-08-06T13:15:57.600",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Incorrect garbage collection interaction in IndexedDB could have led to a use-after-free. This vulnerability affects Firefox < 129 and Firefox ESR < 128.1."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1895951",
|
||||
"source": "security@mozilla.org"
|
||||
},
|
||||
{
|
||||
"url": "https://www.mozilla.org/security/advisories/mfsa2024-33/",
|
||||
"source": "security@mozilla.org"
|
||||
},
|
||||
{
|
||||
"url": "https://www.mozilla.org/security/advisories/mfsa2024-35/",
|
||||
"source": "security@mozilla.org"
|
||||
}
|
||||
]
|
||||
}
|
33
CVE-2024/CVE-2024-75xx/CVE-2024-7529.json
Normal file
33
CVE-2024/CVE-2024-75xx/CVE-2024-7529.json
Normal file
@ -0,0 +1,33 @@
|
||||
{
|
||||
"id": "CVE-2024-7529",
|
||||
"sourceIdentifier": "security@mozilla.org",
|
||||
"published": "2024-08-06T13:15:57.657",
|
||||
"lastModified": "2024-08-06T13:15:57.657",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "The date picker could partially obscure security prompts. This could be used by a malicious site to trick a user into granting permissions. This vulnerability affects Firefox < 129, Firefox ESR < 115.14, and Firefox ESR < 128.1."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1903187",
|
||||
"source": "security@mozilla.org"
|
||||
},
|
||||
{
|
||||
"url": "https://www.mozilla.org/security/advisories/mfsa2024-33/",
|
||||
"source": "security@mozilla.org"
|
||||
},
|
||||
{
|
||||
"url": "https://www.mozilla.org/security/advisories/mfsa2024-34/",
|
||||
"source": "security@mozilla.org"
|
||||
},
|
||||
{
|
||||
"url": "https://www.mozilla.org/security/advisories/mfsa2024-35/",
|
||||
"source": "security@mozilla.org"
|
||||
}
|
||||
]
|
||||
}
|
25
CVE-2024/CVE-2024-75xx/CVE-2024-7530.json
Normal file
25
CVE-2024/CVE-2024-75xx/CVE-2024-7530.json
Normal file
@ -0,0 +1,25 @@
|
||||
{
|
||||
"id": "CVE-2024-7530",
|
||||
"sourceIdentifier": "security@mozilla.org",
|
||||
"published": "2024-08-06T13:15:57.723",
|
||||
"lastModified": "2024-08-06T13:15:57.723",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Incorrect garbage collection interaction could have led to a use-after-free. This vulnerability affects Firefox < 129."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1904011",
|
||||
"source": "security@mozilla.org"
|
||||
},
|
||||
{
|
||||
"url": "https://www.mozilla.org/security/advisories/mfsa2024-33/",
|
||||
"source": "security@mozilla.org"
|
||||
}
|
||||
]
|
||||
}
|
33
CVE-2024/CVE-2024-75xx/CVE-2024-7531.json
Normal file
33
CVE-2024/CVE-2024-75xx/CVE-2024-7531.json
Normal file
@ -0,0 +1,33 @@
|
||||
{
|
||||
"id": "CVE-2024-7531",
|
||||
"sourceIdentifier": "security@mozilla.org",
|
||||
"published": "2024-08-06T13:15:57.787",
|
||||
"lastModified": "2024-08-06T13:15:57.787",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Calling `PK11_Encrypt()` in NSS using CKM_CHACHA20 and the same buffer for input and output can result in plaintext on an Intel Sandy Bridge processor. In Firefox this only affects the QUIC header protection feature when the connection is using the ChaCha20-Poly1305 cipher suite. The most likely outcome is connection failure, but if the connection persists despite the high packet loss it could be possible for a network observer to identify packets as coming from the same source despite a network path change. This vulnerability affects Firefox < 129, Firefox ESR < 115.14, and Firefox ESR < 128.1."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1905691",
|
||||
"source": "security@mozilla.org"
|
||||
},
|
||||
{
|
||||
"url": "https://www.mozilla.org/security/advisories/mfsa2024-33/",
|
||||
"source": "security@mozilla.org"
|
||||
},
|
||||
{
|
||||
"url": "https://www.mozilla.org/security/advisories/mfsa2024-34/",
|
||||
"source": "security@mozilla.org"
|
||||
},
|
||||
{
|
||||
"url": "https://www.mozilla.org/security/advisories/mfsa2024-35/",
|
||||
"source": "security@mozilla.org"
|
||||
}
|
||||
]
|
||||
}
|
137
CVE-2024/CVE-2024-75xx/CVE-2024-7551.json
Normal file
137
CVE-2024/CVE-2024-75xx/CVE-2024-7551.json
Normal file
@ -0,0 +1,137 @@
|
||||
{
|
||||
"id": "CVE-2024-7551",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2024-08-06T13:15:57.850",
|
||||
"lastModified": "2024-08-06T13:15:57.850",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A vulnerability was found in juzaweb CMS up to 3.4.2. It has been classified as problematic. Affected is an unknown function of the file /admin-cp/theme/editor/default of the component Theme Editor. The manipulation leads to path traversal. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-273696. NOTE: The vendor was contacted early about this disclosure but did not respond in any way."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV40": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "4.0",
|
||||
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"attackRequirements": "NONE",
|
||||
"privilegesRequired": "HIGH",
|
||||
"userInteraction": "NONE",
|
||||
"vulnerableSystemConfidentiality": "LOW",
|
||||
"vulnerableSystemIntegrity": "NONE",
|
||||
"vulnerableSystemAvailability": "NONE",
|
||||
"subsequentSystemConfidentiality": "NONE",
|
||||
"subsequentSystemIntegrity": "NONE",
|
||||
"subsequentSystemAvailability": "NONE",
|
||||
"exploitMaturity": "NOT_DEFINED",
|
||||
"confidentialityRequirements": "NOT_DEFINED",
|
||||
"integrityRequirements": "NOT_DEFINED",
|
||||
"availabilityRequirements": "NOT_DEFINED",
|
||||
"modifiedAttackVector": "NOT_DEFINED",
|
||||
"modifiedAttackComplexity": "NOT_DEFINED",
|
||||
"modifiedAttackRequirements": "NOT_DEFINED",
|
||||
"modifiedPrivilegesRequired": "NOT_DEFINED",
|
||||
"modifiedUserInteraction": "NOT_DEFINED",
|
||||
"modifiedVulnerableSystemConfidentiality": "NOT_DEFINED",
|
||||
"modifiedVulnerableSystemIntegrity": "NOT_DEFINED",
|
||||
"modifiedVulnerableSystemAvailability": "NOT_DEFINED",
|
||||
"modifiedSubsequentSystemConfidentiality": "NOT_DEFINED",
|
||||
"modifiedSubsequentSystemIntegrity": "NOT_DEFINED",
|
||||
"modifiedSubsequentSystemAvailability": "NOT_DEFINED",
|
||||
"safety": "NOT_DEFINED",
|
||||
"automatable": "NOT_DEFINED",
|
||||
"recovery": "NOT_DEFINED",
|
||||
"valueDensity": "NOT_DEFINED",
|
||||
"vulnerabilityResponseEffort": "NOT_DEFINED",
|
||||
"providerUrgency": "NOT_DEFINED",
|
||||
"baseScore": 5.1,
|
||||
"baseSeverity": "MEDIUM"
|
||||
}
|
||||
}
|
||||
],
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "HIGH",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 2.7,
|
||||
"baseSeverity": "LOW"
|
||||
},
|
||||
"exploitabilityScore": 1.2,
|
||||
"impactScore": 1.4
|
||||
}
|
||||
],
|
||||
"cvssMetricV2": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "2.0",
|
||||
"vectorString": "AV:N/AC:L/Au:M/C:P/I:N/A:N",
|
||||
"accessVector": "NETWORK",
|
||||
"accessComplexity": "LOW",
|
||||
"authentication": "MULTIPLE",
|
||||
"confidentialityImpact": "PARTIAL",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 3.3
|
||||
},
|
||||
"baseSeverity": "LOW",
|
||||
"exploitabilityScore": 6.4,
|
||||
"impactScore": 2.9,
|
||||
"acInsufInfo": false,
|
||||
"obtainAllPrivilege": false,
|
||||
"obtainUserPrivilege": false,
|
||||
"obtainOtherPrivilege": false,
|
||||
"userInteractionRequired": false
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-22"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/DeepMountains/Mirage/blob/main/CVE9-1.md",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.273696",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.273696",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?submit.381444",
|
||||
"source": "cna@vuldb.com"
|
||||
}
|
||||
]
|
||||
}
|
78
README.md
78
README.md
@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours.
|
||||
### Last Repository Update
|
||||
|
||||
```plain
|
||||
2024-08-06T12:00:17.445195+00:00
|
||||
2024-08-06T14:00:17.304709+00:00
|
||||
```
|
||||
|
||||
### Most recent CVE Modification Timestamp synchronized with NVD
|
||||
|
||||
```plain
|
||||
2024-08-06T11:16:07.800000+00:00
|
||||
2024-08-06T13:54:06.807000+00:00
|
||||
```
|
||||
|
||||
### Last Data Feed Release
|
||||
@ -33,40 +33,66 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
|
||||
### Total Number of included CVEs
|
||||
|
||||
```plain
|
||||
259071
|
||||
259118
|
||||
```
|
||||
|
||||
### CVEs added in the last Commit
|
||||
|
||||
Recently added CVEs: `12`
|
||||
Recently added CVEs: `47`
|
||||
|
||||
- [CVE-2024-33957](CVE-2024/CVE-2024-339xx/CVE-2024-33957.json) (`2024-08-06T11:16:04.443`)
|
||||
- [CVE-2024-33958](CVE-2024/CVE-2024-339xx/CVE-2024-33958.json) (`2024-08-06T11:16:04.920`)
|
||||
- [CVE-2024-33959](CVE-2024/CVE-2024-339xx/CVE-2024-33959.json) (`2024-08-06T11:16:05.133`)
|
||||
- [CVE-2024-33975](CVE-2024/CVE-2024-339xx/CVE-2024-33975.json) (`2024-08-06T11:16:05.343`)
|
||||
- [CVE-2024-33976](CVE-2024/CVE-2024-339xx/CVE-2024-33976.json) (`2024-08-06T11:16:05.580`)
|
||||
- [CVE-2024-33977](CVE-2024/CVE-2024-339xx/CVE-2024-33977.json) (`2024-08-06T11:16:05.793`)
|
||||
- [CVE-2024-33978](CVE-2024/CVE-2024-339xx/CVE-2024-33978.json) (`2024-08-06T11:16:06.017`)
|
||||
- [CVE-2024-33979](CVE-2024/CVE-2024-339xx/CVE-2024-33979.json) (`2024-08-06T11:16:06.223`)
|
||||
- [CVE-2024-33980](CVE-2024/CVE-2024-339xx/CVE-2024-33980.json) (`2024-08-06T11:16:06.477`)
|
||||
- [CVE-2024-33981](CVE-2024/CVE-2024-339xx/CVE-2024-33981.json) (`2024-08-06T11:16:06.733`)
|
||||
- [CVE-2024-7246](CVE-2024/CVE-2024-72xx/CVE-2024-7246.json) (`2024-08-06T11:16:07.587`)
|
||||
- [CVE-2024-7317](CVE-2024/CVE-2024-73xx/CVE-2024-7317.json) (`2024-08-06T11:16:07.800`)
|
||||
- [CVE-2024-33989](CVE-2024/CVE-2024-339xx/CVE-2024-33989.json) (`2024-08-06T13:15:54.757`)
|
||||
- [CVE-2024-33990](CVE-2024/CVE-2024-339xx/CVE-2024-33990.json) (`2024-08-06T13:15:54.973`)
|
||||
- [CVE-2024-33991](CVE-2024/CVE-2024-339xx/CVE-2024-33991.json) (`2024-08-06T13:15:55.250`)
|
||||
- [CVE-2024-33992](CVE-2024/CVE-2024-339xx/CVE-2024-33992.json) (`2024-08-06T13:15:55.487`)
|
||||
- [CVE-2024-33993](CVE-2024/CVE-2024-339xx/CVE-2024-33993.json) (`2024-08-06T13:15:55.693`)
|
||||
- [CVE-2024-33994](CVE-2024/CVE-2024-339xx/CVE-2024-33994.json) (`2024-08-06T13:15:55.897`)
|
||||
- [CVE-2024-43114](CVE-2024/CVE-2024-431xx/CVE-2024-43114.json) (`2024-08-06T13:15:56.130`)
|
||||
- [CVE-2024-6357](CVE-2024/CVE-2024-63xx/CVE-2024-6357.json) (`2024-08-06T13:15:56.333`)
|
||||
- [CVE-2024-6358](CVE-2024/CVE-2024-63xx/CVE-2024-6358.json) (`2024-08-06T13:15:56.547`)
|
||||
- [CVE-2024-6359](CVE-2024/CVE-2024-63xx/CVE-2024-6359.json) (`2024-08-06T13:15:56.757`)
|
||||
- [CVE-2024-7518](CVE-2024/CVE-2024-75xx/CVE-2024-7518.json) (`2024-08-06T13:15:56.970`)
|
||||
- [CVE-2024-7519](CVE-2024/CVE-2024-75xx/CVE-2024-7519.json) (`2024-08-06T13:15:57.040`)
|
||||
- [CVE-2024-7520](CVE-2024/CVE-2024-75xx/CVE-2024-7520.json) (`2024-08-06T13:15:57.107`)
|
||||
- [CVE-2024-7521](CVE-2024/CVE-2024-75xx/CVE-2024-7521.json) (`2024-08-06T13:15:57.167`)
|
||||
- [CVE-2024-7522](CVE-2024/CVE-2024-75xx/CVE-2024-7522.json) (`2024-08-06T13:15:57.237`)
|
||||
- [CVE-2024-7523](CVE-2024/CVE-2024-75xx/CVE-2024-7523.json) (`2024-08-06T13:15:57.297`)
|
||||
- [CVE-2024-7524](CVE-2024/CVE-2024-75xx/CVE-2024-7524.json) (`2024-08-06T13:15:57.357`)
|
||||
- [CVE-2024-7525](CVE-2024/CVE-2024-75xx/CVE-2024-7525.json) (`2024-08-06T13:15:57.420`)
|
||||
- [CVE-2024-7526](CVE-2024/CVE-2024-75xx/CVE-2024-7526.json) (`2024-08-06T13:15:57.483`)
|
||||
- [CVE-2024-7527](CVE-2024/CVE-2024-75xx/CVE-2024-7527.json) (`2024-08-06T13:15:57.543`)
|
||||
- [CVE-2024-7528](CVE-2024/CVE-2024-75xx/CVE-2024-7528.json) (`2024-08-06T13:15:57.600`)
|
||||
- [CVE-2024-7529](CVE-2024/CVE-2024-75xx/CVE-2024-7529.json) (`2024-08-06T13:15:57.657`)
|
||||
- [CVE-2024-7530](CVE-2024/CVE-2024-75xx/CVE-2024-7530.json) (`2024-08-06T13:15:57.723`)
|
||||
- [CVE-2024-7531](CVE-2024/CVE-2024-75xx/CVE-2024-7531.json) (`2024-08-06T13:15:57.787`)
|
||||
- [CVE-2024-7551](CVE-2024/CVE-2024-75xx/CVE-2024-7551.json) (`2024-08-06T13:15:57.850`)
|
||||
|
||||
|
||||
### CVEs modified in the last Commit
|
||||
|
||||
Recently modified CVEs: `9`
|
||||
Recently modified CVEs: `22`
|
||||
|
||||
- [CVE-2014-1607](CVE-2014/CVE-2014-16xx/CVE-2014-1607.json) (`2024-08-06T10:15:27.997`)
|
||||
- [CVE-2014-2734](CVE-2014/CVE-2014-27xx/CVE-2014-2734.json) (`2024-08-06T11:15:33.523`)
|
||||
- [CVE-2014-2913](CVE-2014/CVE-2014-29xx/CVE-2014-2913.json) (`2024-08-06T11:15:36.897`)
|
||||
- [CVE-2014-2941](CVE-2014/CVE-2014-29xx/CVE-2014-2941.json) (`2024-08-06T11:15:37.307`)
|
||||
- [CVE-2014-3180](CVE-2014/CVE-2014-31xx/CVE-2014-3180.json) (`2024-08-06T11:15:40.610`)
|
||||
- [CVE-2024-6731](CVE-2024/CVE-2024-67xx/CVE-2024-6731.json) (`2024-08-06T11:16:07.010`)
|
||||
- [CVE-2024-6732](CVE-2024/CVE-2024-67xx/CVE-2024-6732.json) (`2024-08-06T11:16:07.173`)
|
||||
- [CVE-2024-6802](CVE-2024/CVE-2024-68xx/CVE-2024-6802.json) (`2024-08-06T11:16:07.290`)
|
||||
- [CVE-2024-6807](CVE-2024/CVE-2024-68xx/CVE-2024-6807.json) (`2024-08-06T11:16:07.450`)
|
||||
- [CVE-2014-4608](CVE-2014/CVE-2014-46xx/CVE-2014-4608.json) (`2024-08-06T12:15:20.573`)
|
||||
- [CVE-2014-5160](CVE-2014/CVE-2014-51xx/CVE-2014-5160.json) (`2024-08-06T12:15:31.283`)
|
||||
- [CVE-2014-6392](CVE-2014/CVE-2014-63xx/CVE-2014-6392.json) (`2024-08-06T13:15:27.023`)
|
||||
- [CVE-2014-7042](CVE-2014/CVE-2014-70xx/CVE-2014-7042.json) (`2024-08-06T13:15:35.490`)
|
||||
- [CVE-2024-37343](CVE-2024/CVE-2024-373xx/CVE-2024-37343.json) (`2024-08-06T13:48:32.297`)
|
||||
- [CVE-2024-37344](CVE-2024/CVE-2024-373xx/CVE-2024-37344.json) (`2024-08-06T13:49:14.817`)
|
||||
- [CVE-2024-37345](CVE-2024/CVE-2024-373xx/CVE-2024-37345.json) (`2024-08-06T13:49:26.063`)
|
||||
- [CVE-2024-37347](CVE-2024/CVE-2024-373xx/CVE-2024-37347.json) (`2024-08-06T13:50:02.077`)
|
||||
- [CVE-2024-38856](CVE-2024/CVE-2024-388xx/CVE-2024-38856.json) (`2024-08-06T13:35:01.497`)
|
||||
- [CVE-2024-40951](CVE-2024/CVE-2024-409xx/CVE-2024-40951.json) (`2024-08-06T13:29:07.827`)
|
||||
- [CVE-2024-41684](CVE-2024/CVE-2024-416xx/CVE-2024-41684.json) (`2024-08-06T13:25:49.640`)
|
||||
- [CVE-2024-41685](CVE-2024/CVE-2024-416xx/CVE-2024-41685.json) (`2024-08-06T12:51:23.760`)
|
||||
- [CVE-2024-41686](CVE-2024/CVE-2024-416xx/CVE-2024-41686.json) (`2024-08-06T13:20:05.540`)
|
||||
- [CVE-2024-5179](CVE-2024/CVE-2024-51xx/CVE-2024-5179.json) (`2024-08-06T12:10:17.047`)
|
||||
- [CVE-2024-6729](CVE-2024/CVE-2024-67xx/CVE-2024-6729.json) (`2024-08-06T12:15:52.700`)
|
||||
- [CVE-2024-7172](CVE-2024/CVE-2024-71xx/CVE-2024-7172.json) (`2024-08-06T12:51:40.243`)
|
||||
- [CVE-2024-7173](CVE-2024/CVE-2024-71xx/CVE-2024-7173.json) (`2024-08-06T12:52:46.230`)
|
||||
- [CVE-2024-7174](CVE-2024/CVE-2024-71xx/CVE-2024-7174.json) (`2024-08-06T13:14:59.030`)
|
||||
- [CVE-2024-7175](CVE-2024/CVE-2024-71xx/CVE-2024-7175.json) (`2024-08-06T12:57:14.623`)
|
||||
- [CVE-2024-7176](CVE-2024/CVE-2024-71xx/CVE-2024-7176.json) (`2024-08-06T12:58:00.850`)
|
||||
- [CVE-2024-7177](CVE-2024/CVE-2024-71xx/CVE-2024-7177.json) (`2024-08-06T13:15:14.603`)
|
||||
- [CVE-2024-7217](CVE-2024/CVE-2024-72xx/CVE-2024-7217.json) (`2024-08-06T13:54:06.807`)
|
||||
|
||||
|
||||
## Download and Usage
|
||||
|
133
_state.csv
133
_state.csv
@ -66045,7 +66045,7 @@ CVE-2014-1598,0,0,86f5d71d3081884e796c0c2dc8619fec5ce0633bafb3999e36e8c561b67b57
|
||||
CVE-2014-1599,0,0,ee250602a48f8c199fed6bf215ed30e597e04627625e4eade94817ce50e5c79e,2018-10-09T19:42:56.547000
|
||||
CVE-2014-1603,0,0,bad6b09a0bf70de2953bafc9e1dfa585099bd47762fffacb2135420098555eed,2018-10-30T16:27:48.670000
|
||||
CVE-2014-1604,0,0,413679a54590bf619dc7a302a8f0639390f694b6e0cc0925d9e816c0c95d1e40,2017-08-29T01:34:25.983000
|
||||
CVE-2014-1607,0,1,1943ccea924d49044ec7d630a68950e406543167b20b4817e278e4f9ab4a692a,2024-08-06T10:15:27.997000
|
||||
CVE-2014-1607,0,0,1943ccea924d49044ec7d630a68950e406543167b20b4817e278e4f9ab4a692a,2024-08-06T10:15:27.997000
|
||||
CVE-2014-1608,0,0,a39bd494e2538c8e337589c19f539caef9bb3453c107fc68cd4b2dac31932c1f,2021-01-12T18:05:59.507000
|
||||
CVE-2014-1609,0,0,46bc7381404eec4ae636c9e37ea54f0029835a8a0158e9be29b550ddcd2a1be1,2021-01-12T18:05:59.507000
|
||||
CVE-2014-1610,0,0,2f062c19e654df0a5059b9bce8c585d26687afce6a33737f5538b64ab383dca7,2016-05-25T15:01:37.037000
|
||||
@ -67011,7 +67011,7 @@ CVE-2014-2730,0,0,f7b5f4b6d8661bcbf165dedc4f88368e7c21c5fab7d319a500eb618ba67731
|
||||
CVE-2014-2731,0,0,664411607193785639b3672cde44f1e2c89ecb5c0a62c959dc080e2d3b4f4add,2014-04-21T19:28:08.697000
|
||||
CVE-2014-2732,0,0,1cdde2cb8b5b4c49ef680dcd5c3355d970d42f7ddccd23a1e120ab0fb7493ebe,2015-10-08T14:51:06.893000
|
||||
CVE-2014-2733,0,0,f865336356e93b437922f18f813bdf5b4b3fbae550fbcdc950c4836f12361194,2014-04-21T19:31:57.517000
|
||||
CVE-2014-2734,0,1,cc72503d7a0531856e66034b962dc2cf40f4e310ec598e8565cc84586caeef7f,2024-08-06T11:15:33.523000
|
||||
CVE-2014-2734,0,0,cc72503d7a0531856e66034b962dc2cf40f4e310ec598e8565cc84586caeef7f,2024-08-06T11:15:33.523000
|
||||
CVE-2014-2735,0,0,5a80c924a17cffbc2c0445834faee419abdcf092163bfffdae9e4f7abf082788,2018-10-09T19:43:35.940000
|
||||
CVE-2014-2736,0,0,87762f16104b4fb450479d1bfac1b57c87109220a9a80e9a95c7dc2a856e9863,2019-10-22T17:23:37.007000
|
||||
CVE-2014-2737,0,0,6dbc290b1ede7e3f777bc4eeb9e6087ff158771a9152b18b795a94de14a61518,2018-10-09T19:43:36.190000
|
||||
@ -67171,7 +67171,7 @@ CVE-2014-2906,0,0,28c352b17f90f6da40502b8393258d209f5a592514e6807683e1a78bdacbd5
|
||||
CVE-2014-2907,0,0,141364a54a0713ecda79e4fbdb28eab9fd6a841b1743e79f04a8d015ab6ed21a,2023-11-07T02:19:39.597000
|
||||
CVE-2014-2908,0,0,87ea7facec4faa6e6426ec73d62e0cfb615d737069a38d0d3c14f65ec92e900c,2018-05-25T01:29:00.303000
|
||||
CVE-2014-2909,0,0,ef79baf456d509b55c66e129796daf3f8745b169fda41a9757cd13f4c2dc1246,2020-02-10T15:15:17.637000
|
||||
CVE-2014-2913,0,1,5388343bba58e340534bd0c3618fe1a264656ef721cd174170ddc4987252f2cc,2024-08-06T11:15:36.897000
|
||||
CVE-2014-2913,0,0,5388343bba58e340534bd0c3618fe1a264656ef721cd174170ddc4987252f2cc,2024-08-06T11:15:36.897000
|
||||
CVE-2014-2914,0,0,c0220900fdeda573b374eb0cf80ed7d59cc3dfd5cb565b12abb994203f116f38,2020-02-04T17:09:46.907000
|
||||
CVE-2014-2915,0,0,0fcde6d319d58cc8235a134cb1401bd7a437bbba78376d366d8bff803aad096c,2018-10-30T16:26:53.700000
|
||||
CVE-2014-2916,0,0,158378f5bc1d2ebbb62d33b2659baa4e2570f5f4107675a4a8fd8f9519d0643e,2015-08-01T01:35:47.170000
|
||||
@ -67189,7 +67189,7 @@ CVE-2014-2937,0,0,abeba8d66cd33626a90f869ef5a79d32093243b18b25be5b63e16f7fad77d8
|
||||
CVE-2014-2938,0,0,f8a193333a1f0ece9a3a7a00db71204c165c888e56c1417483b81c425117f5f9,2014-07-16T18:54:15.227000
|
||||
CVE-2014-2939,0,0,47cdd1cee965c12f1bc6bc089d843135db5be432a19cbdf5e9825907e512140d,2014-06-03T15:30:22.707000
|
||||
CVE-2014-2940,0,0,a7b6ec3ece66dc7aa6ee59e0b4ccabd5bdf5a5abdc92ffb8c8881a9711385867,2014-08-15T17:21:16.587000
|
||||
CVE-2014-2941,0,1,f41f6230d893b174f37a09737949d528fa91619df63db7ea66fd991445c59856,2024-08-06T11:15:37.307000
|
||||
CVE-2014-2941,0,0,f41f6230d893b174f37a09737949d528fa91619df63db7ea66fd991445c59856,2024-08-06T11:15:37.307000
|
||||
CVE-2014-2942,0,0,5422822f6ac30daa02f5050cfc43c32aebe5de2684366351fa2c23cfa67e8320,2014-09-22T14:43:08.123000
|
||||
CVE-2014-2943,0,0,598c14c2e2ea02d6f429cc399a67ad1f7d85c0e54a2060d679ba3b26a6918944,2023-11-07T02:19:40.113000
|
||||
CVE-2014-2944,0,0,2eb007f4b4b5e60502264aea8e13ef42bfead1009fc1b6926d91f3ea08e6ff46,2023-11-07T02:19:40.363000
|
||||
@ -67383,7 +67383,7 @@ CVE-2014-3176,0,0,d7ed514a4ea6f3a3783d104d7f8e6d582442ba233fe11770accb433fadd1d2
|
||||
CVE-2014-3177,0,0,6769268fc66684fe9a3caafc0c9f7bbe5daf1525906019802a54397d5202ffe6,2023-11-07T02:19:54.083000
|
||||
CVE-2014-3178,0,0,777dc65d3dd17ba12ee6989b8b8fa3a8f7f3d191d1c4f4f46b955181bab4bbac,2023-11-07T02:19:54.553000
|
||||
CVE-2014-3179,0,0,6d24265cc52e07e5d258d59b94aedcab5b793d8ddf876f9b059ea1b97bce0829,2023-11-07T02:19:55.030000
|
||||
CVE-2014-3180,0,1,0e88ae50a422f247ceaf1dfa212e259bdb39757c73857435346a0cfe14043ad6,2024-08-06T11:15:40.610000
|
||||
CVE-2014-3180,0,0,0e88ae50a422f247ceaf1dfa212e259bdb39757c73857435346a0cfe14043ad6,2024-08-06T11:15:40.610000
|
||||
CVE-2014-3181,0,0,f118ecb28d47e16a54d8b75dc850e113cbf7eaa6f17cb5c3025597e856fccf77,2024-02-09T19:25:26.897000
|
||||
CVE-2014-3182,0,0,76d03818778187bd4e1f8268b0fcf42819952a9d88876a3f4708f81a152f0479,2023-12-29T15:41:33.040000
|
||||
CVE-2014-3183,0,0,8cf5246fe987b83149dc4acc3804822498060a74cde252b5226b0772f3b7831b,2023-12-29T15:42:53.263000
|
||||
@ -68695,7 +68695,7 @@ CVE-2014-4604,0,0,9518cff87a2419d611e6369af0b5c4a14f017a8d094ba5b2e600de3e5231e4
|
||||
CVE-2014-4605,0,0,3f8874c6518c37d68f8b25cb763dcf2b4510b487a19d99c3c6af4f1a0c21db16,2014-07-09T18:48:18.740000
|
||||
CVE-2014-4606,0,0,d63114f062b715dc6ca859784e1b1a7c721b7d45d271547d389d7b867f9acb5d,2014-07-09T18:45:46.887000
|
||||
CVE-2014-4607,0,0,76c308a41abef0a008fc88a19bef429b478190e1a2cb12963321920266d2788b,2020-02-14T15:26:45.467000
|
||||
CVE-2014-4608,0,0,5b03cf0e42a1c98e6afb2f1e41839d3ef0f4d84a6f574ea7a63b438b621d24af,2024-05-17T00:59:57.730000
|
||||
CVE-2014-4608,0,1,d7818b75eb63e09ed586b436a27cb492605255a958deea147ea583e62d058ab2,2024-08-06T12:15:20.573000
|
||||
CVE-2014-4609,0,0,02f363f1f4d393ebc3c8ae96b30f28d565a2167efe6f6ed5eba18e083e921498,2020-01-21T16:49:14.900000
|
||||
CVE-2014-4610,0,0,69e982ba357cffccbdeb69b942e2cf7fc23318c8f6e1a1c9ce98382bdefeb111,2020-01-21T16:15:47.263000
|
||||
CVE-2014-4611,0,0,5b0a0b2d930406e341b0eadab49a8c3103b3e070a88dd1cdbb44744d7348b67a,2023-11-07T02:20:35.810000
|
||||
@ -69125,7 +69125,7 @@ CVE-2014-5149,0,0,bf89fff2b7d7fb1898245bb39172b1690d6a6dcf714f55e192c833521f8f3f
|
||||
CVE-2014-5157,0,0,20b30f94262d35528c8c4054941678b4012e0d73ca1bb989ac5bc05faea16745,2023-11-07T02:20:43.213000
|
||||
CVE-2014-5158,0,0,69b174d059b5613fbc8787663238e346de163fb5a34219ad608f575a9d07052b,2014-08-21T16:49:13.957000
|
||||
CVE-2014-5159,0,0,cbb914a4ffff4faac8f656bc14172cec1f496e6b93a106c0c0a79bbaac7e0927,2014-08-21T16:52:27.390000
|
||||
CVE-2014-5160,0,0,387256cb5e1255e819e2ab1f42d9416457c360c1600513c15503fb51d4b09f04,2024-05-17T01:00:13.937000
|
||||
CVE-2014-5160,0,1,4b2352f6464a75082758270dbf5c3391ffefca2a37eee1b8ed504162c9b1e1f0,2024-08-06T12:15:31.283000
|
||||
CVE-2014-5161,0,0,a5733c5886a7fd117f35743a4d62fb2ad6f5bf3a7398054dce26553f65b41efc,2023-11-07T02:20:43.307000
|
||||
CVE-2014-5162,0,0,55a074f06578f9c03bbfb061862adc51ce82414234c86ddb99e28cc655d69793,2023-11-07T02:20:43.360000
|
||||
CVE-2014-5163,0,0,0d197e409f0d56efe3be7ebc23f3a7a6c6ce2765c03651d4015b2d3f057df755,2023-11-07T02:20:43.433000
|
||||
@ -70207,7 +70207,7 @@ CVE-2014-6386,0,0,ef82c1e20abd6fddce3e54b667e7069b568034a8a8ee66cf3efaa7bdfccd29
|
||||
CVE-2014-6387,0,0,972e3cbc4b72a77f92f3f7627c7f26ba687ffa97ddb3c5305d3a355fcf6350d9,2021-01-12T18:05:59.507000
|
||||
CVE-2014-6388,0,0,12f3ce7c137bfe0765d68119caeb7cfc8dada96a9a6b2446d364aa74c4dd90ac,2023-11-07T02:21:00.773000
|
||||
CVE-2014-6389,0,0,cad73347ec1c88f3955ef944343f00ae78ebbc3947c86a62e6caddd8575ff04c,2017-09-08T01:29:14.323000
|
||||
CVE-2014-6392,0,0,8141c550c78a154df08e477382ea1a99a2a1a19f4c18d487e6c657b6c2da1f17,2024-05-17T01:00:48.230000
|
||||
CVE-2014-6392,0,1,3db4ef1e4fe085e0638122cb471c43a37cb37498a278324f315c328222f3f3f4,2024-08-06T13:15:27.023000
|
||||
CVE-2014-6393,0,0,43d76059da78ad5015fd5bfe8333a1086660d3510e767febac7e3c8cd7f4e226,2021-07-30T16:36:04.447000
|
||||
CVE-2014-6394,0,0,f9d29995346dd1a27f941fddd5be7eae240f45195f583c62fd35d1e336f0f9bb,2017-09-08T01:29:14.403000
|
||||
CVE-2014-6395,0,0,92184a2aefd3b7037f480e16eee81c1021d8086a8a1934d26adf4b6e3c966cad,2020-02-26T13:35:52.343000
|
||||
@ -70831,7 +70831,7 @@ CVE-2014-7038,0,0,43f538f66efc5a0c9ad9f347bb92dc3cbfb62bf8ff2fecbcbb9adb1fe0e25b
|
||||
CVE-2014-7039,0,0,703bbb7bc8333bb3b0e81946f5cdb59e2ae7d57563c96580667bb6016b90dc2e,2014-11-14T14:06:58.313000
|
||||
CVE-2014-7040,0,0,df752d3efa2c8bb27ed54b80f43838fcc810331450911bf5b97c5b0e975f11f3,2014-11-14T14:06:59.797000
|
||||
CVE-2014-7041,0,0,679e23897b29337d95abcfa90d66f31ec7b4ab58714df1e3ec10ab4c456c8295,2014-11-14T14:07:01.280000
|
||||
CVE-2014-7042,0,0,04cc6926850b8bab3a35aced64fa1e1e0a22845572c3cb00965a2900cff28ccb,2024-05-17T01:01:06.023000
|
||||
CVE-2014-7042,0,1,db198955c833abbabf9aa9f650c060841319cd06a7da8bb948630e373b355c43,2024-08-06T13:15:35.490000
|
||||
CVE-2014-7043,0,0,03b4d65083446f9c65cc7361c07ac8e1850c3c51a82b557ccf21e09a43ad55f7,2014-11-14T14:07:04.283000
|
||||
CVE-2014-7044,0,0,1d41bf09ddf845283a05e370faa8421a4366b01485587d02fbb366d598d4646a,2014-11-14T17:10:15.843000
|
||||
CVE-2014-7045,0,0,20a5cd0a4191deb5ad84964202c6c6b980f988bed5b64a3a08d5d4e3831719a0,2014-11-14T14:07:07.250000
|
||||
@ -252164,16 +252164,44 @@ CVE-2024-33953,0,0,63e46ea726d37d8745ea34fab8c10792202a96224f50f42661862439d0baa
|
||||
CVE-2024-33954,0,0,56971cf7819e69848d3a992a0087660ba05ca96712d3a36deca39fdf2a1bac6b,2024-05-14T16:12:23.490000
|
||||
CVE-2024-33955,0,0,74cb745cdb62a336c3f876a0fd00b4b23bbd1044d9dae83da460a24660cf3426,2024-05-14T16:12:23.490000
|
||||
CVE-2024-33956,0,0,92ede81a948fcf5a2df4670aeb0def8a77bc1add850b4acbb2c9c5d6e0cc712f,2024-05-14T16:12:23.490000
|
||||
CVE-2024-33957,1,1,88de846bc8d97892cfd8f5e3fb77365a046bd14d735fe9ff0fdf5bdcf43f6627,2024-08-06T11:16:04.443000
|
||||
CVE-2024-33958,1,1,53178196a6e998522e42efb1164438403365268d7b5d0361801382f2258b9980,2024-08-06T11:16:04.920000
|
||||
CVE-2024-33959,1,1,d458bbf5f43f23837870d410a9e46f289d63332eee24acb672fc9cd8a2d0c483,2024-08-06T11:16:05.133000
|
||||
CVE-2024-33975,1,1,a46b370542e31d699ba01a1fac4d9ed4c848d3b0a25985f5a0ce53b5bcb63a6a,2024-08-06T11:16:05.343000
|
||||
CVE-2024-33976,1,1,02e20b804a284cea017672c564c762d3fb7d7c9c8cfcb4a61b9fa58410196b8b,2024-08-06T11:16:05.580000
|
||||
CVE-2024-33977,1,1,2eb5edafc06dded0ff925fe2cae461b6fb7bd8b6a70ba49c1b48907f8554dce2,2024-08-06T11:16:05.793000
|
||||
CVE-2024-33978,1,1,d464745d4bd7f31f1fc51af542d385e5cae6b8ccd3d85ce164396a41cfda2e8d,2024-08-06T11:16:06.017000
|
||||
CVE-2024-33979,1,1,b983164577546938ffe33145f2e0f3b698c4bc7ada5e2728f77b5638aeef3640,2024-08-06T11:16:06.223000
|
||||
CVE-2024-33980,1,1,dee037246a927f3ca3153211de0c62347441b8e779709e076f12ac9e0599f054,2024-08-06T11:16:06.477000
|
||||
CVE-2024-33981,1,1,e0e57ce80d6753fe0d3c97c236c4bbf725d864b47682f7bd24299ca9dc3d8626,2024-08-06T11:16:06.733000
|
||||
CVE-2024-33957,0,0,88de846bc8d97892cfd8f5e3fb77365a046bd14d735fe9ff0fdf5bdcf43f6627,2024-08-06T11:16:04.443000
|
||||
CVE-2024-33958,0,0,53178196a6e998522e42efb1164438403365268d7b5d0361801382f2258b9980,2024-08-06T11:16:04.920000
|
||||
CVE-2024-33959,0,0,d458bbf5f43f23837870d410a9e46f289d63332eee24acb672fc9cd8a2d0c483,2024-08-06T11:16:05.133000
|
||||
CVE-2024-33960,1,1,c53c593ec668667e287363e16e108fa27ae08f29f861b438346e205e55b6bf01,2024-08-06T12:15:49.130000
|
||||
CVE-2024-33961,1,1,03a2cfe3185829675da53ac4ddc9ee5f23ae56d659f31c4d457aaacfe6d3563e,2024-08-06T12:15:49.360000
|
||||
CVE-2024-33962,1,1,0f5af782ce7b0b6f1af8a57e7f1705aedaabb08b378b29d3510d617216679428,2024-08-06T12:15:49.570000
|
||||
CVE-2024-33963,1,1,850e588f9be54795f0489ea09b2fa9cbb18170832d11bb6b87faea54977e7809,2024-08-06T12:15:49.790000
|
||||
CVE-2024-33964,1,1,25b775cb98d6d75d3b8868c9df78a96e26f554bc0894605cc9030849d51599db,2024-08-06T12:15:50
|
||||
CVE-2024-33965,1,1,3ddb893fff6f2a0965a82defedff9401de724e71057282952143e3c624d8f57b,2024-08-06T12:15:50.223000
|
||||
CVE-2024-33966,1,1,f4f7eaf3e81606089ac7d13ccade1fb14397a0c2fe11216859413b3f098f44fa,2024-08-06T12:15:50.440000
|
||||
CVE-2024-33967,1,1,8ba1a67d6bcb7b88479bbe80f86e3644d2b9d7cb7e0b7d56bd484a3cfab55065,2024-08-06T12:15:50.667000
|
||||
CVE-2024-33968,1,1,2660cf9965440079050fb15a921d961214a26f55702d2cdc0e8dbeab05f6fa75,2024-08-06T12:15:50.887000
|
||||
CVE-2024-33969,1,1,70a359893f34beed5cc40710f94e1f36c74431d5f301ccb3324eea061304cd03,2024-08-06T12:15:51.100000
|
||||
CVE-2024-33970,1,1,08fc32382cf60fe53811f9961b90beb8742a746cd203e002d1fde4f7ed9f5c44,2024-08-06T12:15:51.330000
|
||||
CVE-2024-33971,1,1,45a43d4e935fb8f26ea153d3830bfbb482c3a2462495da277e1cdd1b01815ce8,2024-08-06T12:15:51.550000
|
||||
CVE-2024-33972,1,1,3750dc3a6f98d5c2d5be5e290b107afe21a4b146ac56b50fcb02d01ad53bf840,2024-08-06T12:15:51.773000
|
||||
CVE-2024-33973,1,1,31f4407e21b5d5d826f609599778c0a36b741f9666904a530b26958cc8a9aebd,2024-08-06T12:15:51.993000
|
||||
CVE-2024-33974,1,1,d25ce0a05e0a6752a4262f16ca72168b217bf65c87bd2e0f11fe6a2f6846f71e,2024-08-06T12:15:52.213000
|
||||
CVE-2024-33975,0,0,a46b370542e31d699ba01a1fac4d9ed4c848d3b0a25985f5a0ce53b5bcb63a6a,2024-08-06T11:16:05.343000
|
||||
CVE-2024-33976,0,0,02e20b804a284cea017672c564c762d3fb7d7c9c8cfcb4a61b9fa58410196b8b,2024-08-06T11:16:05.580000
|
||||
CVE-2024-33977,0,0,2eb5edafc06dded0ff925fe2cae461b6fb7bd8b6a70ba49c1b48907f8554dce2,2024-08-06T11:16:05.793000
|
||||
CVE-2024-33978,0,0,d464745d4bd7f31f1fc51af542d385e5cae6b8ccd3d85ce164396a41cfda2e8d,2024-08-06T11:16:06.017000
|
||||
CVE-2024-33979,0,0,b983164577546938ffe33145f2e0f3b698c4bc7ada5e2728f77b5638aeef3640,2024-08-06T11:16:06.223000
|
||||
CVE-2024-33980,0,0,dee037246a927f3ca3153211de0c62347441b8e779709e076f12ac9e0599f054,2024-08-06T11:16:06.477000
|
||||
CVE-2024-33981,0,0,e0e57ce80d6753fe0d3c97c236c4bbf725d864b47682f7bd24299ca9dc3d8626,2024-08-06T11:16:06.733000
|
||||
CVE-2024-33982,1,1,45b26bbc74b7d72080ae88d41fb6f7f413f4d8536ac87fdf45e0b60f93629fb9,2024-08-06T13:15:53.257000
|
||||
CVE-2024-33983,1,1,cab4d447ce471d1290e90dd5a1e82cc9d5252b784d55444265c55d7965dd63cd,2024-08-06T13:15:53.480000
|
||||
CVE-2024-33984,1,1,87dd0943d36eb3c143032637ffc496824366110651ae8cab4376bb323bf8ed31,2024-08-06T13:15:53.693000
|
||||
CVE-2024-33985,1,1,ef0f29bb6885e74d2e17051eff53879974402a057315b148ebe6c6235cb589c9,2024-08-06T13:15:53.907000
|
||||
CVE-2024-33986,1,1,53b9aa07d3b5aa856bbae868678e0f79fb4d50a9480eb558800c78c90fd7c811,2024-08-06T13:15:54.123000
|
||||
CVE-2024-33987,1,1,920aa0d963feab45672016a8cc41edf6f3afe79e7d7167dead3d21fdb4e4d9c7,2024-08-06T13:15:54.327000
|
||||
CVE-2024-33988,1,1,bdd7b77fbeff0ffc0758ae8b6e499a8a80438127c5c8079afedbe193b0695b10,2024-08-06T13:15:54.547000
|
||||
CVE-2024-33989,1,1,5b7284697d5328f709a9fd4fb7a2c01b2babcfd13cf9fad3ba146866e13c5d51,2024-08-06T13:15:54.757000
|
||||
CVE-2024-33990,1,1,f29dd9f16a04affb1b065ba215c8c07f5b4fcef4a165541f34cd29f79dbeffea,2024-08-06T13:15:54.973000
|
||||
CVE-2024-33991,1,1,e7848b1fbd07dc956434fc6854119e6993adba369708a89e5c7970374000cd12,2024-08-06T13:15:55.250000
|
||||
CVE-2024-33992,1,1,9b158ff86a5fea9c0143a3a28a09a3d005a2bc3a66e820f27ff31f312fed7ae4,2024-08-06T13:15:55.487000
|
||||
CVE-2024-33993,1,1,87d3be91dbfa8958a7521feb77979831ff28d2f8a3f9fb1ddb40d835def70e58,2024-08-06T13:15:55.693000
|
||||
CVE-2024-33994,1,1,2e73c4da04fec625761166167f68c922b34ac4635cfbd0439df4319cf1dc7526,2024-08-06T13:15:55.897000
|
||||
CVE-2024-33996,0,0,3a1ccff7b15ef74d30247c0f7f73ffcc0dc644d71df2ad9a3b66250554292391,2024-07-03T01:59:14.897000
|
||||
CVE-2024-33997,0,0,a1b67f9141e983abbb533434dc38928810b4315794a01f73fb3845b5ec77f911,2024-06-03T14:46:24.250000
|
||||
CVE-2024-33998,0,0,9e3de27d8bf76d6956fcf84fb478824118f2a7a5526fa450d9858736f7cac784,2024-06-03T14:46:24.250000
|
||||
@ -254372,11 +254400,11 @@ CVE-2024-37333,0,0,ca6a17cc22b1d717772d796bf0aa2546b83275671146f095987901bb082c3
|
||||
CVE-2024-37334,0,0,3931d383be66577632f115e0c9d908ee2bcb3dc588be0b175f4163124a70c529,2024-07-09T18:18:38.713000
|
||||
CVE-2024-37336,0,0,90e602973017f76462997dc997dd1aa43f526ec48ab9dba1852b6ff97aa50fb9,2024-07-09T18:18:38.713000
|
||||
CVE-2024-3734,0,0,1fa8bbb57ad3bce01ae853c22daddc26dfe02917c61007dac4955ee2123008cc,2024-05-02T18:00:37.360000
|
||||
CVE-2024-37343,0,0,d5d5e2a1392f5d57021e524a562ea50a5a47222525d94aabe2d57813ad1cbe7a,2024-06-21T11:22:01.687000
|
||||
CVE-2024-37344,0,0,ea2bc9fc8fb7df1e245c6aae13803dab2723fd58e7dce1039730ea28c975b1a0,2024-06-21T11:22:01.687000
|
||||
CVE-2024-37345,0,0,fe95cad1fe407877b8df4d99c703d2baebe348e9e687e293000ef03d5bed212d,2024-06-21T11:22:01.687000
|
||||
CVE-2024-37343,0,1,9822edef5552dcf3d43fa2bee27bf9a4a8f63ea4d7138b0de867a8810cd5a703,2024-08-06T13:48:32.297000
|
||||
CVE-2024-37344,0,1,aabf0e402dbd52c1aa2993f072213b9b1a8b4d49253f8eb436c6f5af2aa88369,2024-08-06T13:49:14.817000
|
||||
CVE-2024-37345,0,1,095e9fcf2729a229a6d30770c6328e028d13c3564257fe3ca6a02856acea31d8,2024-08-06T13:49:26.063000
|
||||
CVE-2024-37346,0,0,2db4948f8270427d7ba2d74594c1333081073368dc8627246d0b026677177be1,2024-06-21T11:22:01.687000
|
||||
CVE-2024-37347,0,0,54b001786471676843893d801bfb43f9bd3fba3053d7f310b4329fbd325dc220,2024-06-21T11:22:01.687000
|
||||
CVE-2024-37347,0,1,4655db1f78f90a4e012a32cf405d62b010ea59a2a5d18c6dccc795a7aa708830,2024-08-06T13:50:02.077000
|
||||
CVE-2024-37348,0,0,dc48fa9974ed21f9f4246b3dd80406f069a0cd0f6f5793a9ce9659a6a27d7dd1,2024-06-21T11:22:01.687000
|
||||
CVE-2024-37349,0,0,d5bdd857cd8357de07400ace5da8b29cdb394b047c72e22b130727701a2be1cc,2024-06-21T11:22:01.687000
|
||||
CVE-2024-3735,0,0,3bc0e7ae2360c04d22daf0f12463798d07ea71d58fa91621d2a939f364ece413,2024-07-19T13:15:02.083000
|
||||
@ -255230,7 +255258,7 @@ CVE-2024-3881,0,0,3699310594a82ce285b52bf9c21755fa8173160a66408c76064512e538b3fc
|
||||
CVE-2024-3882,0,0,8cf286ca42c3a62eccb821d9ac0678dabad594eee248c127390ddaf169987d46,2024-05-17T02:40:10.457000
|
||||
CVE-2024-3883,0,0,e6bda202b9fd54c10f25f29dd8ae0cebb83b1538aee636944c2fd66bf4045fff,2024-05-02T13:27:25.103000
|
||||
CVE-2024-3885,0,0,9b28a2ee85edfe77753e71858fb1438bd68a9b6ee299843f3a5752cca4753d01,2024-05-02T18:00:37.360000
|
||||
CVE-2024-38856,0,0,96f3eab0325d4dafca2c5fb76f31da6a75109ecdc24758ba3e68ea536696c99c,2024-08-05T12:41:45.957000
|
||||
CVE-2024-38856,0,1,5bdac33e3c1769f797760792fc523b4e832fcce7196ab622177b90376f5d9d69,2024-08-06T13:35:01.497000
|
||||
CVE-2024-38857,0,0,857bbf4d5ee889c68ec1450930f0cf323232ab2d5a162824c8153ee668a7e638,2024-07-02T12:09:16.907000
|
||||
CVE-2024-38867,0,0,4bc8a346a92423127914d7bd932870dc2a7efecb39fecaf6981a89bcdb11978c,2024-07-09T18:19:14.047000
|
||||
CVE-2024-3887,0,0,7992ee60f5f26d3f15d818db21e67277dbf02ae9d208c24a54e5c01935424c21,2024-05-16T13:03:05.353000
|
||||
@ -256132,7 +256160,7 @@ CVE-2024-40948,0,0,dc9a62e9b912dabd72d9488c7b256cd8ebcc0e72fd137118119d1730a13f8
|
||||
CVE-2024-40949,0,0,791b23d5aa5b8f2913b54416c907a4bc6a3427cfe143f82f7d7f99adf28299c3,2024-07-12T16:34:58.687000
|
||||
CVE-2024-4095,0,0,e2a40f44bdf8e372a41806afdce4161562b7b4bb2bcba8f3987036690d2e8184,2024-06-17T12:42:04.623000
|
||||
CVE-2024-40950,0,0,b6979d5e6c063eb00970b540ceafda0becb430ff51009e9e1c48a7255ff5f822,2024-07-12T16:34:58.687000
|
||||
CVE-2024-40951,0,0,e3c8093d4ec9e1a8983f44c0df966a958d151fd1f3bebdd3c080d25fb2fb6ff5,2024-07-12T16:34:58.687000
|
||||
CVE-2024-40951,0,1,15aa8df4b78f7514f02ec97aa813adcc5685b7b49e8bf3041732ce8e88b84a54,2024-08-06T13:29:07.827000
|
||||
CVE-2024-40952,0,0,284e20d0c02a4a07f0a633613bf6da63afc1e1864146bd195b56e5c256be8437,2024-07-12T16:34:58.687000
|
||||
CVE-2024-40953,0,0,b95ef29b38cb2bdc14b7d3310e089ce1c53f0ae5a8fac0aff1ea43db998d2aa8,2024-07-12T16:34:58.687000
|
||||
CVE-2024-40954,0,0,6435d77632d64383b2dd408edc2b98ec70827908a39e4fc7f1aeac09bff6b72f,2024-07-12T16:34:58.687000
|
||||
@ -256459,9 +256487,9 @@ CVE-2024-41671,0,0,246285a77daa13e5014904fc895b261c0c0cff4d8c9ca9cc03eeeb85acc4b
|
||||
CVE-2024-41672,0,0,22d9ca4e03b108f26bbb384eff42397f3ecb90b1b86b629c7d5509df37cbcfd2,2024-07-25T12:36:39.947000
|
||||
CVE-2024-41676,0,0,61be418f160a9962fa96c6561684c479cc1e76f508200bb9c78cde88da1bdcd4,2024-07-29T16:21:52.517000
|
||||
CVE-2024-4168,0,0,7f4f833c88738c683a47d814a058bf8a730868170937a9aca799097bc79bf22f,2024-06-04T19:20:31.690000
|
||||
CVE-2024-41684,0,0,c04c7a72cb63ae7eeb8584b102c76882304d9bf5cb81d153e75d8ddb331bc6dc,2024-08-01T08:15:03.390000
|
||||
CVE-2024-41685,0,0,93eaff307f4f8791a8e8ff304ad0c9cc6b3c2580cc14efd1e8266bfdcba69042,2024-08-01T08:15:03.547000
|
||||
CVE-2024-41686,0,0,0d750b3e1e6c898024728468d3ecdbea6b50cb803a8aba6286daab29ba27ba2d,2024-08-01T08:15:03.640000
|
||||
CVE-2024-41684,0,1,1b960d89046bc8e3eaa12e0c6287bde4affa573a56f4d64d5604ebe07482aab6,2024-08-06T13:25:49.640000
|
||||
CVE-2024-41685,0,1,a068970e4306540ce1cc9df2cfd1edb284bc63da7de6424b24a52ab81b1f3ec4,2024-08-06T12:51:23.760000
|
||||
CVE-2024-41686,0,1,0724427e4fba2566827e14754d55d09ae4da5068fe75928087f7f167ed7545e4,2024-08-06T13:20:05.540000
|
||||
CVE-2024-41687,0,0,199fb127145ac44260897a6bcf0117750aa11faaae311cd3b70466837d9741d9,2024-08-05T21:05:30.230000
|
||||
CVE-2024-41688,0,0,e43bf0a8b23358e8a5a87799b640ea50b62cd618df1c5997479a0ac424fb65f0,2024-08-05T21:05:46.433000
|
||||
CVE-2024-41689,0,0,b6e829b3ccc25fd5870e6f72327a9c949de2035a3da497da461ad4ee01aed9c6,2024-08-05T21:05:55.990000
|
||||
@ -256796,6 +256824,7 @@ CVE-2024-4307,0,0,9af1fe76e1dfb80a8368bbb3fc69b1f2cbb4fca53c0870243e2c9aa4c3d839
|
||||
CVE-2024-4308,0,0,63b73a2fc8e8d5be636a84f19daeea12c1e2d5b3b652e500f77934bf4e894f3b,2024-07-03T02:07:22.320000
|
||||
CVE-2024-4309,0,0,5b40a8fbb2137dd0d77fe6c4c1c586190f4489f813d005ab45d5553c299b0b73,2024-04-30T13:11:16.690000
|
||||
CVE-2024-4310,0,0,08f5e8e76073c3640785934b5dbc198d89dde47497c02b1ac3fc670d20c22fd2,2024-04-30T13:11:16.690000
|
||||
CVE-2024-43114,1,1,0a5da770a0fd17923a50b31df2b87b93a494d344d1174c6f2510e7a063c78459,2024-08-06T13:15:56.130000
|
||||
CVE-2024-4312,0,0,82451935a132459ec3a52babe511fed0dc0447cacf13fc78eab91e8a5c0d303b,2024-05-14T16:11:39.510000
|
||||
CVE-2024-4313,0,0,04786fcee0b11c58facf347077c0fb8e17faddbc064f2c4dc547a3be70193e4e,2024-06-24T20:01:09.330000
|
||||
CVE-2024-4314,0,0,5b91c731cc96c112e4837604681a355586cd629f1c71449572dfc7eb6fafd4a6,2024-05-14T16:11:39.510000
|
||||
@ -257548,7 +257577,7 @@ CVE-2024-5173,0,0,e808cbd0ff507575dfa32503bcc3a2123c9461298f1a4a4ef8cd294367da64
|
||||
CVE-2024-5176,0,0,095b03ddd1cdcd739bbe8693b41d7d6e416f60f9815e0be55e0b3850508434d9,2024-06-05T15:15:12.620000
|
||||
CVE-2024-5177,0,0,4596ccdb96b84f0f6003dc91187b58acc558e0743564be9aa6ad28db4e46749c,2024-05-24T01:15:30.977000
|
||||
CVE-2024-5178,0,0,bd0c2f144426314e1167d96790d03a45b87cc8b4eeec82d66437d8c03cef924c,2024-07-11T22:15:02.467000
|
||||
CVE-2024-5179,0,0,4b8a5f7d1197f9c7140ee23a6f965e791ff3ed670dac09bff5868dc7e3aaa999,2024-06-06T14:17:35.017000
|
||||
CVE-2024-5179,0,1,6961559157b2692b340c3a167eca15cc044aebdebaf78fc359c62b997a6f0a1a,2024-08-06T12:10:17.047000
|
||||
CVE-2024-5181,0,0,bbf6825e1d5f360a1a58b67dff2bf4d85afbf0a93fef4d4bb8dfd7975bcf0e60,2024-06-26T12:44:29.693000
|
||||
CVE-2024-5182,0,0,11a8026128789bf16c353b6d9ea399398a270fcab4b8a2257261feecaeaad7ff,2024-06-20T12:43:25.663000
|
||||
CVE-2024-5184,0,0,913e376e9213bf80a4ef6a0008bd230beba5d0e3fbd42416956e3dc16ba16e7b,2024-06-18T17:06:20.257000
|
||||
@ -258461,6 +258490,9 @@ CVE-2024-6349,0,0,427eeb1c49748085f9d6a97a6add4281bc215342d4df9759ae2f609f0d24cf
|
||||
CVE-2024-6353,0,0,3e7ee1ed054bc0661b7c1f2f3de9fe2ed8be61a7a777eee50734c66af6748302,2024-07-12T12:49:07.030000
|
||||
CVE-2024-6354,0,0,c9410e2fdcd521ee7fa5aea0abe57bbff6ce1153eea9fc9c27ad647524c61c5c,2024-07-03T02:09:53.917000
|
||||
CVE-2024-6355,0,0,7f4c7fb5a41a7b4cf241f6b370777bf2a8cf0ede73cf75d47093e841c71a69f9,2024-06-27T14:15:16.753000
|
||||
CVE-2024-6357,1,1,7f0a44c49954c810a6542a3e9df960774f17b65963c507c1c78b7fdf4d31fac0,2024-08-06T13:15:56.333000
|
||||
CVE-2024-6358,1,1,03220ab1396339fe8dcd8d6790f519f6f3b95c0d6eb1899b445620248f6862fe,2024-08-06T13:15:56.547000
|
||||
CVE-2024-6359,1,1,e777f6a5c45409a56001ec9fd2341a39f1706acccf77083aafe7f4bee9d73ced,2024-08-06T13:15:56.757000
|
||||
CVE-2024-6361,0,0,36217d2b7a7c7daf2929ff08b5f573bdc0840f10e6c13048ffc771df1bf8fbc1,2024-08-05T19:15:38.333000
|
||||
CVE-2024-6362,0,0,aeb770c7b39ef36db7bd4a49056b449aeba256942be50c6b83f329d15f15257d,2024-08-01T14:00:20.147000
|
||||
CVE-2024-6363,0,0,455979652b8642d7eb5b747949e6f02be3f028b83d7cfc357521a34bb9d7438e,2024-08-01T17:00:53.130000
|
||||
@ -258677,10 +258709,10 @@ CVE-2024-6725,0,0,02f518ea588b9f58d1f41a7ee9055d6a87d38c1076b40cf72b33d47960c5f0
|
||||
CVE-2024-6726,0,0,67da9a54e5a829e4300bb2883a5b7a4407d07a460c0b67dc5027c2e9a4f78316,2024-07-30T13:33:30.653000
|
||||
CVE-2024-6727,0,0,9d08fdd347dc87a0df3a4e157904c3068a4121c1538981e1be169dd75a3fc029,2024-07-30T13:33:30.653000
|
||||
CVE-2024-6728,0,0,9abe0a9570ded71226f4ac9c9c5189516c258bbe0afa1c3fa1605041ef7aae25,2024-07-15T13:00:34.853000
|
||||
CVE-2024-6729,0,0,b413856446136980bf68a32632989cec2f558712dbc6c4470999a635b3ec5394,2024-07-21T06:15:02.240000
|
||||
CVE-2024-6729,0,1,bcb767224deb16bf2afeb05fe1225bef68f4362bc8d1b39fa14ddbd884997e94,2024-08-06T12:15:52.700000
|
||||
CVE-2024-6730,0,0,ef30d2eb7f24b640da190afcbc16e385d73ab8dd33302ee9e560c4fd64a066a0,2024-07-15T13:00:34.853000
|
||||
CVE-2024-6731,0,1,3927dffd3359d95ae39e41949bb1bae29552ebee68f43b9bd3d899c53faf9d10,2024-08-06T11:16:07.010000
|
||||
CVE-2024-6732,0,1,debc28863268db45526dba3eb35b771205aaa0b4cc3cc7364610e353457afa91,2024-08-06T11:16:07.173000
|
||||
CVE-2024-6731,0,0,3927dffd3359d95ae39e41949bb1bae29552ebee68f43b9bd3d899c53faf9d10,2024-08-06T11:16:07.010000
|
||||
CVE-2024-6732,0,0,debc28863268db45526dba3eb35b771205aaa0b4cc3cc7364610e353457afa91,2024-08-06T11:16:07.173000
|
||||
CVE-2024-6733,0,0,1b04f2a709cdab12e496472fe8c4597be3b3870fbebfd571deb5174547921171,2024-07-15T13:00:34.853000
|
||||
CVE-2024-6734,0,0,0a4d5157f965a1beb7690dae2ab7ddd7e581de25c672768a22ec0cb6f90751f1,2024-07-15T13:00:34.853000
|
||||
CVE-2024-6735,0,0,059e185c563aef15f572ef487105ca72ddd015a4f1b263acddae12242bbda14e,2024-07-15T13:00:34.853000
|
||||
@ -258724,11 +258756,11 @@ CVE-2024-6793,0,0,d3b7076c1491770aa57006b0fda0ca29233a316fd768110e179dab36334b14
|
||||
CVE-2024-6794,0,0,deb0448edb68525192d212a4a5bb7cd3beda8036c6e71adf051ab04617417890,2024-07-24T12:55:13.223000
|
||||
CVE-2024-6799,0,0,4139a727efc5bbba878823dd77da7ecbccc0d31113ed4001d69cc00c0e6e86e7,2024-07-19T13:01:44.567000
|
||||
CVE-2024-6801,0,0,6cf94e1980aea6fcc25b038d583cb2250e04ba4c9461d4d907e1f9ce16b1e09a,2024-07-19T14:55:25.753000
|
||||
CVE-2024-6802,0,1,142132499d580419e4ae1b418027d1b34172d0e6fecb143b4079760b02794bc8,2024-08-06T11:16:07.290000
|
||||
CVE-2024-6802,0,0,142132499d580419e4ae1b418027d1b34172d0e6fecb143b4079760b02794bc8,2024-08-06T11:16:07.290000
|
||||
CVE-2024-6803,0,0,e77960f60e5c3ea5b22b60c53aac93b8bf6ffc93dd5f015dabaabc8b5a77736e,2024-07-19T15:01:50.250000
|
||||
CVE-2024-6805,0,0,df9c24152184824aaec79a13a2bf3e8af4b412b0a659321142aa5850936d9704,2024-07-24T12:55:13.223000
|
||||
CVE-2024-6806,0,0,ee5c95118c41ce11e7d4b52c5bbead77dffa73ecabb9abea55db46ee557c211f,2024-07-24T12:55:13.223000
|
||||
CVE-2024-6807,0,1,e4d3dc581aa656108086542a60085fb674561ed6b78bc58e0e899b44edae1d40,2024-08-06T11:16:07.450000
|
||||
CVE-2024-6807,0,0,e4d3dc581aa656108086542a60085fb674561ed6b78bc58e0e899b44edae1d40,2024-08-06T11:16:07.450000
|
||||
CVE-2024-6808,0,0,2df5a702fa4af6687f0c8dc8e100812ff9b6b346801edb239f41e0ca638c0076,2024-07-19T15:04:43.837000
|
||||
CVE-2024-6828,0,0,5e3bce0050be5ef41f841daf735b80af46e729368278d26d6a7ddc5bbbdee66f,2024-07-24T12:55:13.223000
|
||||
CVE-2024-6830,0,0,66325e33317c6fde8b929b285667c5104c4ae04492532b5067560968ff36e7fb,2024-07-18T12:28:43.707000
|
||||
@ -258872,12 +258904,12 @@ CVE-2024-7168,0,0,910224f79b3b67b053997cba38db0b80d710f3c8549be559cd68336fed4d28
|
||||
CVE-2024-7169,0,0,f5980a4e5d2ccbce4c06d69d429b6969821394672e47084769e90ea39f080d62,2024-07-29T14:12:08.783000
|
||||
CVE-2024-7170,0,0,c911de3ed6eb8f888dabc0e3c5c43c4020953d0677c78f27e334ac1aaf9f28b3,2024-07-29T14:12:08.783000
|
||||
CVE-2024-7171,0,0,f9af9fb0c23fb7b822f7b4be7ea437b892bcf51d425201c5590fc38d73eb9531,2024-07-29T14:12:08.783000
|
||||
CVE-2024-7172,0,0,48098f2f8b9e9c93b1a36d2a3706aa815a76b5f3bfc9549c1d0a9bf89fd6f736,2024-07-29T14:12:08.783000
|
||||
CVE-2024-7173,0,0,9c8ef6624b932caeb4662918a0a810616d2ba8f9906f81dcebfdec59369b0574,2024-07-29T14:12:08.783000
|
||||
CVE-2024-7174,0,0,f1781e199cf66c66c4adc46ab76c589281b54a81300f6b034e26a8b728475a75,2024-07-29T14:12:08.783000
|
||||
CVE-2024-7175,0,0,5d4eeb7489132ec6e77d74f58648a42d6a5be9593c8b5cc1f115573e2980a84a,2024-07-29T14:12:08.783000
|
||||
CVE-2024-7176,0,0,87bd822da2f12dde6101b55907e007b11fb359e449d64ec7b52cb66f9d43adf6,2024-07-29T14:12:08.783000
|
||||
CVE-2024-7177,0,0,9b8744673605b28dba8faef7865b0aaa6e010d681eb7e62063dcb56018b8bdec,2024-07-29T14:12:08.783000
|
||||
CVE-2024-7172,0,1,bf11000a25aa390d844559afe580f0fa7d2d19a89cd008853f409aa8d14dd751,2024-08-06T12:51:40.243000
|
||||
CVE-2024-7173,0,1,6bb8cb47776fd61e45ff0c4670a366d389e4ca60f59d7257e1318c9d7c651362,2024-08-06T12:52:46.230000
|
||||
CVE-2024-7174,0,1,d36abd9cd6510076e70dd71c93b10f1e4d1fed543c9c27e06453ada743b13a00,2024-08-06T13:14:59.030000
|
||||
CVE-2024-7175,0,1,17f9f11ad73b0149cbe68b3610e56dfc726e43ad613a2d806a5692ca7828052c,2024-08-06T12:57:14.623000
|
||||
CVE-2024-7176,0,1,f0ec24b818ba0ff9dd236590bd5667a208b3bab5b5698785324754427c7e3ea5,2024-08-06T12:58:00.850000
|
||||
CVE-2024-7177,0,1,32745634451f9d23649acc91ceb28c69502a441cced914546f92ea612c820689,2024-08-06T13:15:14.603000
|
||||
CVE-2024-7178,0,0,52ae2b809c77291d60a9036321df7d8e5ce81e3908bf9bb5c27800ec4dcd8e64,2024-07-29T14:12:08.783000
|
||||
CVE-2024-7179,0,0,65e0f2454d780ae3c2ff2d614aa12167e348369191f0ac2bf926afbe4156da4a,2024-07-29T14:12:08.783000
|
||||
CVE-2024-7180,0,0,04e3dd812b22b1656218c3dd237532ed09069916c415498e7f349131a50802ae,2024-07-29T14:12:08.783000
|
||||
@ -258913,7 +258945,7 @@ CVE-2024-7213,0,0,f43e3a4d574beb5f0357466024a5b7d0acc9d943f364ba7f1706d9b4e0614f
|
||||
CVE-2024-7214,0,0,cf0ff9b3c048cd8fe1cbe27d866836b45cf6f395e7f604068bddd4880fe6e623,2024-07-30T13:32:45.943000
|
||||
CVE-2024-7215,0,0,19cb74dd169a2c0adddcb9f3b1359dd5ec8b4cb73285f81c84c895b0918569f3,2024-07-30T13:32:45.943000
|
||||
CVE-2024-7216,0,0,06cb7fdb9eba9a4918c738c6ef004796ad0e05a3d2a825c6eaa07e4a67d42660,2024-07-30T13:32:45.943000
|
||||
CVE-2024-7217,0,0,0ed3879ead1919503d898348b2756de9d3825fdc7f91b91789dd95f7bd091466,2024-07-30T13:32:45.943000
|
||||
CVE-2024-7217,0,1,7e7819767ae3464765ef049cf303542c287ee1345ab7dba2b9a6e7c05c9c0062,2024-08-06T13:54:06.807000
|
||||
CVE-2024-7218,0,0,5d0054c3fdbf03d2b2f068cbdbe6251db2dbd2a118324c2439603e07b3cc1979,2024-07-30T13:32:45.943000
|
||||
CVE-2024-7219,0,0,7e68d9931944536c53759c49211464ac06490e908e53e029d7404aa622e5549d,2024-07-30T13:32:45.943000
|
||||
CVE-2024-7220,0,0,5720c21291c5d0d772a794164cf0868f04ecdd497da40613327c3e7f8460872e,2024-07-30T13:32:45.943000
|
||||
@ -258923,7 +258955,7 @@ CVE-2024-7223,0,0,fb4ad2671317976e5224b8b90488cd911f8b35bdfcac7bcf593fd9864e14b3
|
||||
CVE-2024-7224,0,0,af2db88c20757182d6fe4e4cfa97afc8f203736333d30a696d87d762a1939e85,2024-07-30T13:32:45.943000
|
||||
CVE-2024-7225,0,0,e974c1f8e77945a548823cf60aed30edab7ed3ad9e75b60e5161d6e31cd3da09,2024-07-30T13:32:45.943000
|
||||
CVE-2024-7226,0,0,8ccb52401469e015e0678efa0fcd5200575cc7f7749dae8fc4bc7e839e645ade,2024-07-30T13:32:45.943000
|
||||
CVE-2024-7246,1,1,91ba6db7737318d04508a866c4f4e7d5eba565c81ad3d61374c0e871821dff35,2024-08-06T11:16:07.587000
|
||||
CVE-2024-7246,0,0,91ba6db7737318d04508a866c4f4e7d5eba565c81ad3d61374c0e871821dff35,2024-08-06T11:16:07.587000
|
||||
CVE-2024-7248,0,0,ebc2727ef1ac7b5ee7b71368a85d91d1db59260dc970f86f7476ace25fb5fea3,2024-07-30T13:32:45.943000
|
||||
CVE-2024-7249,0,0,b1c62b4f237d55dfb39f8f205e178006f9409a78ccfd426e79f2f98ca375d833,2024-07-30T13:32:45.943000
|
||||
CVE-2024-7250,0,0,2ad6dc357ed437eabcd60fe2775245fd2e54c1167d56f0a56470e33155a5fc4c,2024-07-30T13:32:45.943000
|
||||
@ -258964,7 +258996,7 @@ CVE-2024-7309,0,0,50c4489d6857d7bbf17b62e0c8837ee7d19caf578c8d1125be603576151212
|
||||
CVE-2024-7310,0,0,f41dfd90546a9735111808103c67b19c822dfd89b37a542d36f1a7128ca8fa3b,2024-07-31T12:57:02.300000
|
||||
CVE-2024-7311,0,0,992c6b7ceb1c9a4d719c68d0c71706858cdee857ab750e2dc0c4b13c55655029,2024-07-31T12:57:02.300000
|
||||
CVE-2024-7314,0,0,c9ee4785c806eb18fb598dea248a158e00bf7a5180769429ec31516f460a25c7,2024-08-05T12:41:45.957000
|
||||
CVE-2024-7317,1,1,46e574e44cab99720890fa4ace2297e1c3497f5fae8e52b7567df1e1a00d3acf,2024-08-06T11:16:07.800000
|
||||
CVE-2024-7317,0,0,46e574e44cab99720890fa4ace2297e1c3497f5fae8e52b7567df1e1a00d3acf,2024-08-06T11:16:07.800000
|
||||
CVE-2024-7319,0,0,7ca9259384bd06123de1b88320526aa0c7c8a8fa4a2474109218c804a0ab7d99,2024-08-05T12:41:45.957000
|
||||
CVE-2024-7320,0,0,33e9dcaae6c93434ade67bd8a073d2b7f1fbc81482e595b40c21856a0fa46ae6,2024-07-31T12:57:02.300000
|
||||
CVE-2024-7321,0,0,7c3abae321c1c206df72b5645aa4b7f08ab908ecabfe1d2acbc6472a1b295bbf,2024-07-31T12:57:02.300000
|
||||
@ -259059,6 +259091,20 @@ CVE-2024-7499,0,0,fa466cc6c096c43b53afcea4eeed2aa00cfe03fa9d1fcaf27af1880791fed5
|
||||
CVE-2024-7500,0,0,5356987616ec53de8501f122a56ff58b8880556a3bec91f135a4cc8721caf5ce,2024-08-06T04:16:47.290000
|
||||
CVE-2024-7505,0,0,0fed448836399741239c60dad8ffe115725cd14b95fa297f3cc9afa862fb3171,2024-08-06T04:16:47.857000
|
||||
CVE-2024-7506,0,0,a716f33086cbe8664caa26445b5328b898f9ff087701d0ce048bc50b0e6ffeb8,2024-08-06T05:15:41.413000
|
||||
CVE-2024-7518,1,1,94be60491c9746dbdb16571786c4349fc86267ca1462229f1300916f0483107a,2024-08-06T13:15:56.970000
|
||||
CVE-2024-7519,1,1,e88f3f8a85d9ae2553126e26bb669bef93c95a3eedec840af737c3d1134edac1,2024-08-06T13:15:57.040000
|
||||
CVE-2024-7520,1,1,6680739995f7d2a3f78deabfb204791061ee70cbfe60d502f5317460e630fde2,2024-08-06T13:15:57.107000
|
||||
CVE-2024-7521,1,1,b84dee931c60a9429ca02e821575a4be568b84ccc15abd6f3440cdcded827a8c,2024-08-06T13:15:57.167000
|
||||
CVE-2024-7522,1,1,7320e110232d4204cf160c1a74f2837aaf54c219edc44766282941c0fabadd0f,2024-08-06T13:15:57.237000
|
||||
CVE-2024-7523,1,1,7a415d7b8bcc7ced5780da1a0c42d5a7d33035b6df26177c67f8ff68390c7520,2024-08-06T13:15:57.297000
|
||||
CVE-2024-7524,1,1,bc6ee61d57e85a8865199dd95a6dcba05f760025fc7f1efa03f773069af10cf2,2024-08-06T13:15:57.357000
|
||||
CVE-2024-7525,1,1,58ceb789cf8f9603674d6deb5b00a1918f90bfe7801a82b16ccf5221dde19622,2024-08-06T13:15:57.420000
|
||||
CVE-2024-7526,1,1,2945e010b9d3fc561759077d77bf0778898bb54ef7c04098460b61baf34cbc57,2024-08-06T13:15:57.483000
|
||||
CVE-2024-7527,1,1,635d9a4e465d05d55df4c38de27a7811daf4626d41281cb4b9bbb450ff39853d,2024-08-06T13:15:57.543000
|
||||
CVE-2024-7528,1,1,39373d362f5e4f545251a1de7a3b3494efbb84d183a6e2fa4edeaa4da34cbc78,2024-08-06T13:15:57.600000
|
||||
CVE-2024-7529,1,1,eac83591a5cf68566fdc662230f0eef4ad40e402a7fee7bd8b8c7955eee32ab1,2024-08-06T13:15:57.657000
|
||||
CVE-2024-7530,1,1,23ed4db63a2a8ef5b15c39a1b54b35b4be482b2a9c778fefa1675c316a52cd60,2024-08-06T13:15:57.723000
|
||||
CVE-2024-7531,1,1,023a8288dcdad02eeaa1918d46f22f961613e847da9fd0fc169deb0fa3e444fc,2024-08-06T13:15:57.787000
|
||||
CVE-2024-7537,0,0,2754597430b3398e50bf24aaa7d39e994c224c64952debab317f017a960bcb01,2024-08-06T00:15:34.653000
|
||||
CVE-2024-7538,0,0,de29220cb377045c0459deaf6b69adeedda6f13b07a14f613cf81f8acd6354c8,2024-08-06T00:15:34.860000
|
||||
CVE-2024-7539,0,0,eb9af53992225ab47d134bb6cf4c86798ffb792c4ea15fadf5eeb8e0c362f9fd,2024-08-06T00:15:35.053000
|
||||
@ -259070,3 +259116,4 @@ CVE-2024-7544,0,0,080b0de39e8c8f2e6af2eaa3b14006dc3040de641ae6c032803cbfcd66ecd2
|
||||
CVE-2024-7545,0,0,573a5b23c77789a8b3edf118a7d564b619d6c9f61267341b46eaf87deada162c,2024-08-06T00:15:36.247000
|
||||
CVE-2024-7546,0,0,07ae86c51ff9b6287b4773e81c46673e6fef7a1f35d7346bf06ddaef956f485d,2024-08-06T00:15:36.450000
|
||||
CVE-2024-7547,0,0,b727ccd37ef13a960fd8492a150c0deba10508cd85a9c0f2241c9f7ddc1a02e9,2024-08-06T00:15:36.637000
|
||||
CVE-2024-7551,1,1,91e8e42faad68d533415ce39135290191a39b000131091c58c5bab8d2477b228,2024-08-06T13:15:57.850000
|
||||
|
Can't render this file because it is too large.
|
Loading…
x
Reference in New Issue
Block a user