mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-05-06 18:52:58 +00:00
Auto-Update: 2024-09-30T20:00:16.994670+00:00
This commit is contained in:
parent
a1426165ff
commit
f15b28c3a7
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-23574",
|
||||
"sourceIdentifier": "prodsec@nozominetworks.com",
|
||||
"published": "2023-08-09T09:15:13.767",
|
||||
"lastModified": "2024-09-20T12:15:03.747",
|
||||
"vulnStatus": "Modified",
|
||||
"lastModified": "2024-09-30T19:30:36.950",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -66,20 +66,20 @@
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 6.5,
|
||||
"baseSeverity": "MEDIUM"
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 8.8,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 3.6
|
||||
"impactScore": 5.9
|
||||
},
|
||||
{
|
||||
"source": "prodsec@nozominetworks.com",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-2567",
|
||||
"sourceIdentifier": "prodsec@nozominetworks.com",
|
||||
"published": "2023-09-19T11:16:19.333",
|
||||
"lastModified": "2024-09-20T13:15:07.067",
|
||||
"vulnStatus": "Modified",
|
||||
"lastModified": "2024-09-30T19:32:11.580",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -66,20 +66,20 @@
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 6.5,
|
||||
"baseSeverity": "MEDIUM"
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 8.8,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 3.6
|
||||
"impactScore": 5.9
|
||||
},
|
||||
{
|
||||
"source": "prodsec@nozominetworks.com",
|
||||
@ -135,9 +135,8 @@
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:nozominetworks:cmc:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "22.6.0",
|
||||
"versionEndExcluding": "22.6.3",
|
||||
"matchCriteriaId": "6F56421F-B321-4FF0-BFE4-867649B582BB"
|
||||
"matchCriteriaId": "830F12B4-1CFA-4641-A14C-F8537C76267E"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
@ -149,9 +148,8 @@
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:nozominetworks:guardian:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "22.6.0",
|
||||
"versionEndExcluding": "22.6.3",
|
||||
"matchCriteriaId": "4B3C9AEC-3A2D-4702-BC84-41595F30430D"
|
||||
"matchCriteriaId": "C6D52048-C612-4B25-8771-C36C309776F6"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-6222",
|
||||
"sourceIdentifier": "contact@wpscan.com",
|
||||
"published": "2023-12-18T20:15:08.893",
|
||||
"lastModified": "2023-12-21T19:28:10.553",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2024-09-30T19:35:03.307",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -36,6 +36,26 @@
|
||||
},
|
||||
"exploitabilityScore": 1.2,
|
||||
"impactScore": 5.9
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "HIGH",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 7.2,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 1.2,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
|
21
CVE-2024/CVE-2024-288xx/CVE-2024-28809.json
Normal file
21
CVE-2024/CVE-2024-288xx/CVE-2024-28809.json
Normal file
@ -0,0 +1,21 @@
|
||||
{
|
||||
"id": "CVE-2024-28809",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-09-30T18:15:05.633",
|
||||
"lastModified": "2024-09-30T18:15:05.633",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "An issue was discovered in Infinera hiT 7300 5.60.50. Cleartext storage of sensitive password in firmware update packages allows attackers to access various appliance services via hardcoded credentials."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.cvcn.gov.it/cvcn/cve/CVE-2024-28809",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
21
CVE-2024/CVE-2024-288xx/CVE-2024-28810.json
Normal file
21
CVE-2024/CVE-2024-288xx/CVE-2024-28810.json
Normal file
@ -0,0 +1,21 @@
|
||||
{
|
||||
"id": "CVE-2024-28810",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-09-30T19:15:03.987",
|
||||
"lastModified": "2024-09-30T19:15:03.987",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "An issue was discovered in Infinera hiT 7300 5.60.50. Sensitive information inside diagnostic files (exported by the @CT application) allows an attacker to achieve loss of confidentiality by analyzing these files."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.cvcn.gov.it/cvcn/cve/CVE-2024-28810",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
21
CVE-2024/CVE-2024-288xx/CVE-2024-28811.json
Normal file
21
CVE-2024/CVE-2024-288xx/CVE-2024-28811.json
Normal file
@ -0,0 +1,21 @@
|
||||
{
|
||||
"id": "CVE-2024-28811",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-09-30T19:15:04.060",
|
||||
"lastModified": "2024-09-30T19:15:04.060",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "An issue was discovered in Infinera hiT 7300 5.60.50. A web application allows a remote privileged attacker to execute applications contained in a specific OS directory via HTTP invocations."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.cvcn.gov.it/cvcn/cve/CVE-2024-28811",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
56
CVE-2024/CVE-2024-288xx/CVE-2024-28812.json
Normal file
56
CVE-2024/CVE-2024-288xx/CVE-2024-28812.json
Normal file
@ -0,0 +1,56 @@
|
||||
{
|
||||
"id": "CVE-2024-28812",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-09-30T19:15:04.130",
|
||||
"lastModified": "2024-09-30T19:35:03.620",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "An issue was discovered in Infinera hiT 7300 5.60.50. A hidden SSH service (on the local management network interface) with hardcoded credentials allows attackers to access the appliance operating system (with highest privileges) via an SSH connection."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "ADJACENT_NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 8.8,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-798"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.cvcn.gov.it/cvcn/cve/CVE-2024-28812",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
56
CVE-2024/CVE-2024-288xx/CVE-2024-28813.json
Normal file
56
CVE-2024/CVE-2024-288xx/CVE-2024-28813.json
Normal file
@ -0,0 +1,56 @@
|
||||
{
|
||||
"id": "CVE-2024-28813",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-09-30T19:15:04.210",
|
||||
"lastModified": "2024-09-30T19:35:04.427",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "An issue was discovered in Infinera hiT 7300 5.60.50. Undocumented privileged functions in the @CT management application allow an attacker to activate remote SSH access to the appliance via an unexpected network interface."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H",
|
||||
"attackVector": "ADJACENT_NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "HIGH",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 8.4,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 1.7,
|
||||
"impactScore": 6.0
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-269"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.cvcn.gov.it/cvcn/cve/CVE-2024-28813",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
21
CVE-2024/CVE-2024-354xx/CVE-2024-35495.json
Normal file
21
CVE-2024/CVE-2024-354xx/CVE-2024-35495.json
Normal file
@ -0,0 +1,21 @@
|
||||
{
|
||||
"id": "CVE-2024-35495",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-09-30T18:15:05.713",
|
||||
"lastModified": "2024-09-30T18:15:05.713",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "An Information Disclosure vulnerability in the Telemetry component in TP-Link Kasa KP125M V1.0.0 and Tapo P125M 1.0.0 Build 220930 Rel.143947 allows attackers to observe device state via observing network traffic."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/Chapoly1305/tp-link-cve/blob/main/CVE-2024-35495.md",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-39431",
|
||||
"sourceIdentifier": "security@unisoc.com",
|
||||
"published": "2024-09-27T08:15:02.513",
|
||||
"lastModified": "2024-09-30T12:46:20.237",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-09-30T18:09:30.780",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -17,6 +17,26 @@
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
|
||||
"attackVector": "ADJACENT_NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "HIGH",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 4.5,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 0.9,
|
||||
"impactScore": 3.6
|
||||
},
|
||||
{
|
||||
"source": "security@unisoc.com",
|
||||
"type": "Secondary",
|
||||
@ -39,10 +59,124 @@
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-787"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:google:android:12.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "F8FB8EE9-FC56-4D5E-AE55-A5967634740C"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:google:android:13.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "879FFD0C-9B38-4CAA-B057-1086D794D469"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:google:android:14.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "2700BCC5-634D-4EC6-AB67-5B678D5F951D"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:unisoc:s8000:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "FDE05D06-C798-4217-8858-8C5DC2C94751"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:unisoc:sc7731e:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "AC867249-B767-4802-868D-6D0E356C8294"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:unisoc:sc9832e:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "25BBD3C5-E87C-4730-970C-19DF855AC3A2"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:unisoc:sc9863a:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "DE00DFDE-97DD-4D33-B580-73FEF677C71B"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:unisoc:t310:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "F20E00D8-2F00-4FA3-9455-37DC89908D96"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:unisoc:t606:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "905E39DD-7948-40A4-B042-EBB9A9591347"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:unisoc:t610:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "CDC980D6-B797-4AE1-B553-35395AE80D07"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:unisoc:t612:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "98408A48-561A-49D1-967F-834311742B7F"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:unisoc:t616:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "756E5850-CDC7-46C2-BAFC-1E2A359A2709"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:unisoc:t618:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "39002ECE-636A-4FEB-9A0B-8127E8AAC844"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:unisoc:t760:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "3D965CCA-C963-49E4-ACF0-2A9F458AF470"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:unisoc:t770:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "0FFEF06A-E3E0-486F-89CC-D52FF3F26F0B"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:unisoc:t820:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "49601008-D3FF-47CC-B961-6FDDFC7A0596"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.unisoc.com/en_us/secy/announcementDetail/1830802995705610241",
|
||||
"source": "security@unisoc.com"
|
||||
"source": "security@unisoc.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-39432",
|
||||
"sourceIdentifier": "security@unisoc.com",
|
||||
"published": "2024-09-27T08:15:03.530",
|
||||
"lastModified": "2024-09-30T12:46:20.237",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-09-30T18:12:04.437",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -17,6 +17,26 @@
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
|
||||
"attackVector": "ADJACENT_NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "HIGH",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 4.5,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 0.9,
|
||||
"impactScore": 3.6
|
||||
},
|
||||
{
|
||||
"source": "security@unisoc.com",
|
||||
"type": "Secondary",
|
||||
@ -39,10 +59,124 @@
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-787"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:google:android:12.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "F8FB8EE9-FC56-4D5E-AE55-A5967634740C"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:google:android:13.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "879FFD0C-9B38-4CAA-B057-1086D794D469"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:google:android:14.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "2700BCC5-634D-4EC6-AB67-5B678D5F951D"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:unisoc:s8000:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "FDE05D06-C798-4217-8858-8C5DC2C94751"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:unisoc:sc7731e:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "AC867249-B767-4802-868D-6D0E356C8294"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:unisoc:sc9832e:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "25BBD3C5-E87C-4730-970C-19DF855AC3A2"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:unisoc:sc9863a:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "DE00DFDE-97DD-4D33-B580-73FEF677C71B"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:unisoc:t310:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "F20E00D8-2F00-4FA3-9455-37DC89908D96"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:unisoc:t606:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "905E39DD-7948-40A4-B042-EBB9A9591347"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:unisoc:t610:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "CDC980D6-B797-4AE1-B553-35395AE80D07"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:unisoc:t612:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "98408A48-561A-49D1-967F-834311742B7F"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:unisoc:t616:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "756E5850-CDC7-46C2-BAFC-1E2A359A2709"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:unisoc:t618:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "39002ECE-636A-4FEB-9A0B-8127E8AAC844"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:unisoc:t760:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "3D965CCA-C963-49E4-ACF0-2A9F458AF470"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:unisoc:t770:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "0FFEF06A-E3E0-486F-89CC-D52FF3F26F0B"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:unisoc:t820:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "49601008-D3FF-47CC-B961-6FDDFC7A0596"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.unisoc.com/en_us/secy/announcementDetail/1830802995705610241",
|
||||
"source": "security@unisoc.com"
|
||||
"source": "security@unisoc.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-39433",
|
||||
"sourceIdentifier": "security@unisoc.com",
|
||||
"published": "2024-09-27T08:15:03.710",
|
||||
"lastModified": "2024-09-30T12:46:20.237",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-09-30T18:14:45.443",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -17,6 +17,26 @@
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "HIGH",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 4.4,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 0.8,
|
||||
"impactScore": 3.6
|
||||
},
|
||||
{
|
||||
"source": "security@unisoc.com",
|
||||
"type": "Secondary",
|
||||
@ -39,10 +59,99 @@
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-787"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:google:android:13.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "879FFD0C-9B38-4CAA-B057-1086D794D469"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:google:android:14.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "2700BCC5-634D-4EC6-AB67-5B678D5F951D"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:unisoc:s8000:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "FDE05D06-C798-4217-8858-8C5DC2C94751"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:unisoc:t606:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "905E39DD-7948-40A4-B042-EBB9A9591347"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:unisoc:t610:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "CDC980D6-B797-4AE1-B553-35395AE80D07"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:unisoc:t612:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "98408A48-561A-49D1-967F-834311742B7F"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:unisoc:t616:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "756E5850-CDC7-46C2-BAFC-1E2A359A2709"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:unisoc:t618:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "39002ECE-636A-4FEB-9A0B-8127E8AAC844"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:unisoc:t760:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "3D965CCA-C963-49E4-ACF0-2A9F458AF470"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:unisoc:t770:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "0FFEF06A-E3E0-486F-89CC-D52FF3F26F0B"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:unisoc:t820:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "49601008-D3FF-47CC-B961-6FDDFC7A0596"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.unisoc.com/en_us/secy/announcementDetail/1830802995705610241",
|
||||
"source": "security@unisoc.com"
|
||||
"source": "security@unisoc.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-39434",
|
||||
"sourceIdentifier": "security@unisoc.com",
|
||||
"published": "2024-09-27T08:15:03.873",
|
||||
"lastModified": "2024-09-30T12:46:20.237",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-09-30T18:14:03.557",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -17,6 +17,26 @@
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "HIGH",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 4.4,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 0.8,
|
||||
"impactScore": 3.6
|
||||
},
|
||||
{
|
||||
"source": "security@unisoc.com",
|
||||
"type": "Secondary",
|
||||
@ -39,10 +59,99 @@
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-125"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:google:android:13.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "879FFD0C-9B38-4CAA-B057-1086D794D469"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:google:android:14.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "2700BCC5-634D-4EC6-AB67-5B678D5F951D"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:unisoc:s8000:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "FDE05D06-C798-4217-8858-8C5DC2C94751"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:unisoc:t606:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "905E39DD-7948-40A4-B042-EBB9A9591347"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:unisoc:t610:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "CDC980D6-B797-4AE1-B553-35395AE80D07"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:unisoc:t612:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "98408A48-561A-49D1-967F-834311742B7F"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:unisoc:t616:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "756E5850-CDC7-46C2-BAFC-1E2A359A2709"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:unisoc:t618:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "39002ECE-636A-4FEB-9A0B-8127E8AAC844"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:unisoc:t760:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "3D965CCA-C963-49E4-ACF0-2A9F458AF470"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:unisoc:t770:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "0FFEF06A-E3E0-486F-89CC-D52FF3F26F0B"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:unisoc:t820:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "49601008-D3FF-47CC-B961-6FDDFC7A0596"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.unisoc.com/en_us/secy/announcementDetail/1830802995705610241",
|
||||
"source": "security@unisoc.com"
|
||||
"source": "security@unisoc.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-39435",
|
||||
"sourceIdentifier": "security@unisoc.com",
|
||||
"published": "2024-09-27T08:15:04.030",
|
||||
"lastModified": "2024-09-30T12:46:20.237",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-09-30T18:13:33.387",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -17,6 +17,26 @@
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 7.8,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 5.9
|
||||
},
|
||||
{
|
||||
"source": "security@unisoc.com",
|
||||
"type": "Secondary",
|
||||
@ -39,10 +59,124 @@
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "NVD-CWE-noinfo"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:google:android:12.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "F8FB8EE9-FC56-4D5E-AE55-A5967634740C"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:google:android:13.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "879FFD0C-9B38-4CAA-B057-1086D794D469"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:google:android:14.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "2700BCC5-634D-4EC6-AB67-5B678D5F951D"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:unisoc:s8000:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "FDE05D06-C798-4217-8858-8C5DC2C94751"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:unisoc:sc7731e:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "AC867249-B767-4802-868D-6D0E356C8294"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:unisoc:sc9832e:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "25BBD3C5-E87C-4730-970C-19DF855AC3A2"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:unisoc:sc9863a:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "DE00DFDE-97DD-4D33-B580-73FEF677C71B"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:unisoc:t310:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "F20E00D8-2F00-4FA3-9455-37DC89908D96"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:unisoc:t606:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "905E39DD-7948-40A4-B042-EBB9A9591347"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:unisoc:t610:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "CDC980D6-B797-4AE1-B553-35395AE80D07"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:unisoc:t612:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "98408A48-561A-49D1-967F-834311742B7F"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:unisoc:t616:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "756E5850-CDC7-46C2-BAFC-1E2A359A2709"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:unisoc:t618:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "39002ECE-636A-4FEB-9A0B-8127E8AAC844"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:unisoc:t760:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "3D965CCA-C963-49E4-ACF0-2A9F458AF470"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:unisoc:t770:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "0FFEF06A-E3E0-486F-89CC-D52FF3F26F0B"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:unisoc:t820:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "49601008-D3FF-47CC-B961-6FDDFC7A0596"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.unisoc.com/en_us/secy/announcementDetail/1830802995705610241",
|
||||
"source": "security@unisoc.com"
|
||||
"source": "security@unisoc.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-41725",
|
||||
"sourceIdentifier": "ics-cert@hq.dhs.gov",
|
||||
"published": "2024-09-25T01:15:41.833",
|
||||
"lastModified": "2024-09-26T13:32:02.803",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2024-09-30T19:55:49.267",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -61,6 +61,26 @@
|
||||
}
|
||||
],
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 6.1,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 2.7
|
||||
},
|
||||
{
|
||||
"source": "ics-cert@hq.dhs.gov",
|
||||
"type": "Secondary",
|
||||
@ -95,10 +115,72 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:doverfuelingsolutions:progauge_maglink_lx_console_firmware:*:*:*:*:*:*:*:*",
|
||||
"versionEndIncluding": "3.4.2.2.6",
|
||||
"matchCriteriaId": "6B22E9BA-065D-467A-8F47-3237651EB813"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:doverfuelingsolutions:progauge_maglink_lx_console:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "F79E951F-DD35-4BF0-9524-9E10AF1C8C53"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:doverfuelingsolutions:progauge_maglink_lx4_console_firmware:*:*:*:*:*:*:*:*",
|
||||
"versionEndIncluding": "4.17.9e",
|
||||
"matchCriteriaId": "9D5EB61D-2921-437D-A65E-52F8D96A479C"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:doverfuelingsolutions:progauge_maglink_lx4_console:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "12632651-637F-4200-924A-52D17F947416"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.cisa.gov/news-events/ics-advisories/icsa-24-268-04",
|
||||
"source": "ics-cert@hq.dhs.gov"
|
||||
"source": "ics-cert@hq.dhs.gov",
|
||||
"tags": [
|
||||
"Third Party Advisory",
|
||||
"US Government Resource"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
48
CVE-2024/CVE-2024-420xx/CVE-2024-42017.json
Normal file
48
CVE-2024/CVE-2024-420xx/CVE-2024-42017.json
Normal file
@ -0,0 +1,48 @@
|
||||
{
|
||||
"id": "CVE-2024-42017",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-09-30T18:15:05.827",
|
||||
"lastModified": "2024-09-30T18:15:05.827",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "An issue was discovered in Atos Eviden iCare 2.7.1 through 2.7.11. The application exposes a web interface locally. In the worst-case scenario, if the application is remotely accessible, it allows an attacker to execute arbitrary commands with system privilege on the endpoint hosting the application, without any authentication."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "cve@mitre.org",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 10.0,
|
||||
"baseSeverity": "CRITICAL"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 6.0
|
||||
}
|
||||
]
|
||||
},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://eviden.com",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://support.bull.com/ols/product/security/psirt/security-bulletins/multiple-critical-vulnerabilities-in-icare-psirt-625-tlp-clear-version-0-7-cve-2024-42017/view",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-42487",
|
||||
"sourceIdentifier": "security-advisories@github.com",
|
||||
"published": "2024-08-15T21:15:16.997",
|
||||
"lastModified": "2024-08-19T13:00:23.117",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2024-09-30T18:31:04.757",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -17,6 +17,26 @@
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 4.3,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 1.4
|
||||
},
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Secondary",
|
||||
@ -40,6 +60,16 @@
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-436"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Secondary",
|
||||
@ -51,18 +81,53 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:cilium:cilium:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "1.15.0",
|
||||
"versionEndExcluding": "1.15.8",
|
||||
"matchCriteriaId": "A0C8F90D-07B3-4666-8C22-089A2DA27A03"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:cilium:cilium:1.16.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "DD19FEA3-61F3-4F12-8833-045918EEED05"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/cilium/cilium/commit/a3510fe4a92305822aa1a5e08cb6d6c873c8699a",
|
||||
"source": "security-advisories@github.com"
|
||||
"source": "security-advisories@github.com",
|
||||
"tags": [
|
||||
"Patch",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/cilium/cilium/pull/34109",
|
||||
"source": "security-advisories@github.com"
|
||||
"source": "security-advisories@github.com",
|
||||
"tags": [
|
||||
"Patch",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/cilium/cilium/security/advisories/GHSA-qcm3-7879-xcww",
|
||||
"source": "security-advisories@github.com"
|
||||
"source": "security-advisories@github.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-44170",
|
||||
"sourceIdentifier": "product-security@apple.com",
|
||||
"published": "2024-09-17T00:15:51.463",
|
||||
"lastModified": "2024-09-20T12:31:20.110",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-09-30T19:48:51.767",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -15,19 +15,102 @@
|
||||
"value": "Se solucion\u00f3 un problema de privacidad moviendo los datos confidenciales a una ubicaci\u00f3n m\u00e1s segura. Este problema se solucion\u00f3 en iOS 18 y iPadOS 18, watchOS 11 y macOS Sequoia 15. Es posible que una aplicaci\u00f3n pueda acceder a datos confidenciales del usuario."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 5.5,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "NVD-CWE-noinfo"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "18.0",
|
||||
"matchCriteriaId": "ACD3B3B0-329C-413B-BDF7-6B1C6298846E"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "18.0",
|
||||
"matchCriteriaId": "2222A2EE-00FA-4019-8779-13B82A4F9DD0"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "15.0",
|
||||
"matchCriteriaId": "E8017C16-A17E-4AE7-9A0B-1295200A3A45"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:apple:watchos:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "11.0",
|
||||
"matchCriteriaId": "05C212C2-3E65-47DB-A0AE-417A8178ADC6"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/121238",
|
||||
"source": "product-security@apple.com"
|
||||
"source": "product-security@apple.com",
|
||||
"tags": [
|
||||
"Release Notes",
|
||||
"Vendor Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/121240",
|
||||
"source": "product-security@apple.com"
|
||||
"source": "product-security@apple.com",
|
||||
"tags": [
|
||||
"Release Notes",
|
||||
"Vendor Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/121250",
|
||||
"source": "product-security@apple.com"
|
||||
"source": "product-security@apple.com",
|
||||
"tags": [
|
||||
"Release Notes",
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-45200",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-09-30T08:15:03.760",
|
||||
"lastModified": "2024-09-30T12:45:57.823",
|
||||
"lastModified": "2024-09-30T18:35:06.983",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -15,7 +15,42 @@
|
||||
"value": "En Nintendo Mario Kart 8 Deluxe anterior a la versi\u00f3n 3.0.3, la implementaci\u00f3n del modo multijugador local LAN/LDN permite a un atacante remoto explotar un desbordamiento de b\u00fafer basado en pila tras la deserializaci\u00f3n de la informaci\u00f3n de la sesi\u00f3n a trav\u00e9s de un paquete de respuesta de exploraci\u00f3n mal formado, tambi\u00e9n conocido como KartLANPwn. No es necesario que la v\u00edctima se una a una sesi\u00f3n de juego con un atacante. La v\u00edctima debe abrir el men\u00fa \"Juego inal\u00e1mbrico\" (o \"Juego LAN\") desde la pantalla de t\u00edtulo del juego, y un atacante cercano (LDN) o en la misma red LAN que la v\u00edctima puede enviar un paquete de respuesta manipulado a la consola de la v\u00edctima. Esto permite a un atacante remoto obtener una denegaci\u00f3n de servicio completa en el proceso del juego o, potencialmente, la ejecuci\u00f3n remota de c\u00f3digo en la consola de la v\u00edctima. El problema se debe al uso incorrecto de la biblioteca Nintendo Pia,"
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
|
||||
"attackVector": "ADJACENT_NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "LOW",
|
||||
"baseScore": 6.3,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 3.4
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-94"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/latte-soft/kartlanpwn",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-45861",
|
||||
"sourceIdentifier": "ics-cert@hq.dhs.gov",
|
||||
"published": "2024-09-19T16:15:05.103",
|
||||
"lastModified": "2024-09-20T12:30:17.483",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2024-09-30T19:25:01.957",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -59,6 +59,28 @@
|
||||
"baseSeverity": "CRITICAL"
|
||||
}
|
||||
}
|
||||
],
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 7.5,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
@ -73,10 +95,44 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:kastle:access_control_system_firmware:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "2024-05-01",
|
||||
"matchCriteriaId": "C4141AA8-8E0D-43CC-A713-CDEB8923B717"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:kastle:access_control_system:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "FDA9476F-A596-4904-BABE-B7D78D769CE4"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.cisa.gov/news-events/ics-advisories/icsa-24-263-05",
|
||||
"source": "ics-cert@hq.dhs.gov"
|
||||
"source": "ics-cert@hq.dhs.gov",
|
||||
"tags": [
|
||||
"Third Party Advisory",
|
||||
"US Government Resource"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-45862",
|
||||
"sourceIdentifier": "ics-cert@hq.dhs.gov",
|
||||
"published": "2024-09-19T16:15:05.227",
|
||||
"lastModified": "2024-09-20T12:30:17.483",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2024-09-30T19:33:30.750",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -59,6 +59,28 @@
|
||||
"baseSeverity": "HIGH"
|
||||
}
|
||||
}
|
||||
],
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 7.5,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
@ -73,10 +95,44 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:kastle:access_control_system_firmware:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "2024-05-01",
|
||||
"matchCriteriaId": "C4141AA8-8E0D-43CC-A713-CDEB8923B717"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:kastle:access_control_system:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "FDA9476F-A596-4904-BABE-B7D78D769CE4"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.cisa.gov/news-events/ics-advisories/icsa-24-263-05",
|
||||
"source": "ics-cert@hq.dhs.gov"
|
||||
"source": "ics-cert@hq.dhs.gov",
|
||||
"tags": [
|
||||
"Third Party Advisory",
|
||||
"US Government Resource"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-45920",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-09-30T13:15:02.450",
|
||||
"lastModified": "2024-09-30T13:15:02.450",
|
||||
"lastModified": "2024-09-30T18:35:07.773",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -11,7 +11,42 @@
|
||||
"value": "A Stored Cross-Site Scripting (XSS) vulnerability in Solvait 24.4.2 allows remote attackers to inject malicious scripts into the application. This issue arises due to insufficient input validation and sanitization in \"Intrest\" feature."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 5.4,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.3,
|
||||
"impactScore": 2.7
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://gist.github.com/ipxsec/10526db2cbfcb899a70dcb8f0ee53a99",
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-45993",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-09-30T17:15:04.473",
|
||||
"lastModified": "2024-09-30T17:15:04.473",
|
||||
"lastModified": "2024-09-30T19:35:05.410",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -11,7 +11,42 @@
|
||||
"value": "Giflib Project v5.2.2 is vulnerable to a heap buffer overflow via gif2rgb."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "LOW",
|
||||
"baseScore": 6.5,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 2.5
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-122"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "http://giflib.com",
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-46280",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-09-30T15:15:06.053",
|
||||
"lastModified": "2024-09-30T15:15:06.053",
|
||||
"lastModified": "2024-09-30T18:35:08.543",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -11,7 +11,42 @@
|
||||
"value": "PIX-LINK LV-WR22 RE3002-P1-01_V117.0 is vulnerable to Improper Access Control. The TELNET service is enabled with weak credentials for a root-level account, without the possibility of changing them."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "ADJACENT_NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 8.8,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-284"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://0xmupa.github.io/pixlink-weak-telnet",
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-46293",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-09-30T15:15:06.123",
|
||||
"lastModified": "2024-09-30T15:15:06.123",
|
||||
"lastModified": "2024-09-30T19:35:06.227",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -11,7 +11,42 @@
|
||||
"value": "Sourcecodester Online Medicine Ordering System 1.0 is vulnerable to Incorrect Access Control. There is a lack of authorization checks for admin operations. Specifically, an attacker can perform admin-level actions without possessing a valid session token. The application does not verify whether the user is logged in as an admin or even check for a session token at all."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-306"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/bunyamindemir/vulnerability-disclosures/blob/main/omos-authorization-bypass.md",
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-46313",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-09-30T15:15:06.243",
|
||||
"lastModified": "2024-09-30T15:15:06.243",
|
||||
"lastModified": "2024-09-30T19:35:07.020",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -11,7 +11,42 @@
|
||||
"value": "TP-Link WR941ND V6 has a stack overflow vulnerability in the ssid parameter in /userRpm/popupSiteSurveyRpm.htm."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "ADJACENT_NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 8.0,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.1,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-121"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/abcdefg-png/IoT-vulnerable/blob/main/TP-LINK/WR-941ND/popupSiteSurveyRpm.md",
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-46475",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-09-30T16:15:09.077",
|
||||
"lastModified": "2024-09-30T16:15:09.077",
|
||||
"lastModified": "2024-09-30T18:35:09.327",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -11,7 +11,42 @@
|
||||
"value": "A reflected cross-site scripting (XSS) vulnerability on the homepage of Metronic Admin Dashboard Template v2.0 allows attackers to execute arbitrary code in the context of a user's browser via injecting a crafted payload."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "HIGH",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 4.8,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 1.7,
|
||||
"impactScore": 2.7
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://blog.csdn.net/qq_45744104/article/details/141903463",
|
||||
|
56
CVE-2024/CVE-2024-465xx/CVE-2024-46511.json
Normal file
56
CVE-2024/CVE-2024-465xx/CVE-2024-46511.json
Normal file
@ -0,0 +1,56 @@
|
||||
{
|
||||
"id": "CVE-2024-46511",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-09-30T18:15:06.067",
|
||||
"lastModified": "2024-09-30T19:35:07.990",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "LoadZilla LLC LoadLogic v1.4.3 was discovered to contain insecure permissions vulnerability which allows a remote attacker to execute arbitrary code via the LogicLoadEc2DeployLambda and CredsGenFunction function."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "HIGH",
|
||||
"privilegesRequired": "HIGH",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 7.5,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 0.8,
|
||||
"impactScore": 6.0
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-266"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/zolaer9527/serverless-app/security/advisories/GHSA-3ggq-wrf4-c88v",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-46540",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-09-30T17:15:04.550",
|
||||
"lastModified": "2024-09-30T17:15:04.550",
|
||||
"lastModified": "2024-09-30T18:35:10.127",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -11,7 +11,42 @@
|
||||
"value": "A remote code execution (RCE) vulnerability in the component /admin/store.php of Emlog Pro before v2.3.15 allows attackers to use remote file downloads and self-extract fucntions to upload webshells to the target server, thereby obtaining system privileges."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:L",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "HIGH",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "LOW",
|
||||
"baseScore": 6.3,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 0.8,
|
||||
"impactScore": 5.5
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-266"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://gist.github.com/microvorld/1c1ef9c3390a5d88a5ede9f9424a8bd2",
|
||||
|
21
CVE-2024/CVE-2024-466xx/CVE-2024-46635.json
Normal file
21
CVE-2024/CVE-2024-466xx/CVE-2024-46635.json
Normal file
@ -0,0 +1,21 @@
|
||||
{
|
||||
"id": "CVE-2024-46635",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-09-30T18:15:06.140",
|
||||
"lastModified": "2024-09-30T18:15:06.140",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "An issue in the API endpoint /AccountMaster/GetCurrentUserInfo of INROAD before v202402060 allows attackers to access sensitive information via a crafted payload to the UserNameOrPhoneNumber parameter."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://hithub.notion.site/Sensitive-Information-Disclosure-in-GongZhiDao-System-aaad25d2430f4a638d462194cfa87c8b",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-47066",
|
||||
"sourceIdentifier": "security-advisories@github.com",
|
||||
"published": "2024-09-23T16:15:06.670",
|
||||
"lastModified": "2024-09-26T13:32:55.343",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2024-09-30T18:03:58.750",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -17,6 +17,26 @@
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 8.8,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 5.9
|
||||
},
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Secondary",
|
||||
@ -51,22 +71,53 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:lobehub:lobe_chat:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "1.19.3",
|
||||
"matchCriteriaId": "150BA334-9A55-4C96-9DF7-2B3037724092"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/lobehub/lobe-chat/blob/main/src/app/api/proxy/route.ts",
|
||||
"source": "security-advisories@github.com"
|
||||
"source": "security-advisories@github.com",
|
||||
"tags": [
|
||||
"Broken Link"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/lobehub/lobe-chat/commit/e960a23b0c69a5762eb27d776d33dac443058faf",
|
||||
"source": "security-advisories@github.com"
|
||||
"source": "security-advisories@github.com",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/lobehub/lobe-chat/security/advisories/GHSA-3fc8-2r3f-8wrg",
|
||||
"source": "security-advisories@github.com"
|
||||
"source": "security-advisories@github.com",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/lobehub/lobe-chat/security/advisories/GHSA-mxhq-xw3g-rphc",
|
||||
"source": "security-advisories@github.com"
|
||||
"source": "security-advisories@github.com",
|
||||
"tags": [
|
||||
"Not Applicable"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-47315",
|
||||
"sourceIdentifier": "audit@patchstack.com",
|
||||
"published": "2024-09-25T18:15:05.807",
|
||||
"lastModified": "2024-09-26T13:32:02.803",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-09-30T18:06:36.060",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -17,6 +17,26 @@
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 8.8,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 5.9
|
||||
},
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Secondary",
|
||||
@ -40,6 +60,16 @@
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-352"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Secondary",
|
||||
@ -51,10 +81,31 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:givewp:givewp:*:*:*:*:*:wordpress:*:*",
|
||||
"versionEndExcluding": "3.16.0",
|
||||
"matchCriteriaId": "842EB06E-5152-4FAF-B39F-CD7BB2C4DFA1"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://patchstack.com/database/vulnerability/give/wordpress-givewp-donation-plugin-and-fundraising-platform-plugin-3-15-1-cross-site-request-forgery-csrf-vulnerability?_s_id=cve",
|
||||
"source": "audit@patchstack.com"
|
||||
"source": "audit@patchstack.com",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-6544",
|
||||
"sourceIdentifier": "security@wordfence.com",
|
||||
"published": "2024-09-13T15:15:16.300",
|
||||
"lastModified": "2024-09-13T16:37:22.997",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2024-09-30T19:12:09.007",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -41,8 +41,18 @@
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security@wordfence.com",
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-209"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "security@wordfence.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -51,14 +61,38 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:coffee2code:custom_post_limits:*:*:*:*:*:wordpress:*:*",
|
||||
"versionEndIncluding": "4.4.1",
|
||||
"matchCriteriaId": "3C5D8452-D6F8-4E47-9A58-4B6419FCDE4A"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/browser/custom-post-limits/trunk/tests/bootstrap.php",
|
||||
"source": "security@wordfence.com"
|
||||
"source": "security@wordfence.com",
|
||||
"tags": [
|
||||
"Product"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/9cf4a11e-ad28-4a93-9278-1d2d113a4859?source=cve",
|
||||
"source": "security@wordfence.com"
|
||||
"source": "security@wordfence.com",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-6786",
|
||||
"sourceIdentifier": "psirt@moxa.com",
|
||||
"published": "2024-09-21T05:15:12.397",
|
||||
"lastModified": "2024-09-26T13:32:55.343",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2024-09-30T18:31:50.473",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -61,6 +61,26 @@
|
||||
}
|
||||
],
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 6.5,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 3.6
|
||||
},
|
||||
{
|
||||
"source": "psirt@moxa.com",
|
||||
"type": "Secondary",
|
||||
@ -84,6 +104,16 @@
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-22"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "psirt@moxa.com",
|
||||
"type": "Secondary",
|
||||
@ -95,14 +125,40 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:moxa:mxview_one:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "1.4.1",
|
||||
"matchCriteriaId": "24690651-4F3A-431A-845A-B7CCBD1D24D2"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.cisa.gov/news-events/ics-advisories/icsa-24-268-05",
|
||||
"source": "psirt@moxa.com"
|
||||
"source": "psirt@moxa.com",
|
||||
"tags": [
|
||||
"Third Party Advisory",
|
||||
"US Government Resource"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://www.moxa.com/en/support/product-support/security-advisory/mpsa-240735-multiple-vulnerabilities-in-mxview-one-and-mxview-one-central-manager-series",
|
||||
"source": "psirt@moxa.com"
|
||||
"source": "psirt@moxa.com",
|
||||
"tags": [
|
||||
"Patch",
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-6787",
|
||||
"sourceIdentifier": "psirt@moxa.com",
|
||||
"published": "2024-09-21T05:15:12.607",
|
||||
"lastModified": "2024-09-26T13:32:55.343",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2024-09-30T18:02:51.080",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -61,6 +61,26 @@
|
||||
}
|
||||
],
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "HIGH",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 5.9,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.2,
|
||||
"impactScore": 3.6
|
||||
},
|
||||
{
|
||||
"source": "psirt@moxa.com",
|
||||
"type": "Secondary",
|
||||
@ -84,6 +104,16 @@
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-367"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "psirt@moxa.com",
|
||||
"type": "Secondary",
|
||||
@ -95,14 +125,40 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:moxa:mxview_one:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "1.4.1",
|
||||
"matchCriteriaId": "24690651-4F3A-431A-845A-B7CCBD1D24D2"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.cisa.gov/news-events/ics-advisories/icsa-24-268-05",
|
||||
"source": "psirt@moxa.com"
|
||||
"source": "psirt@moxa.com",
|
||||
"tags": [
|
||||
"Third Party Advisory",
|
||||
"US Government Resource"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://www.moxa.com/en/support/product-support/security-advisory/mpsa-240735-multiple-vulnerabilities-in-mxview-one-and-mxview-one-central-manager-series",
|
||||
"source": "psirt@moxa.com"
|
||||
"source": "psirt@moxa.com",
|
||||
"tags": [
|
||||
"Patch",
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-6800",
|
||||
"sourceIdentifier": "product-cna@github.com",
|
||||
"published": "2024-08-20T20:15:09.910",
|
||||
"lastModified": "2024-08-22T15:15:17.127",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2024-09-30T19:14:50.430",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -59,9 +59,41 @@
|
||||
"baseSeverity": "CRITICAL"
|
||||
}
|
||||
}
|
||||
],
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-347"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "product-cna@github.com",
|
||||
"type": "Secondary",
|
||||
@ -73,22 +105,78 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:github:enterprise_server:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "3.10.0",
|
||||
"versionEndExcluding": "3.10.16",
|
||||
"matchCriteriaId": "827A09EB-C889-49E4-982D-01B416DEA6C3"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:github:enterprise_server:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "3.11.0",
|
||||
"versionEndExcluding": "3.11.14",
|
||||
"matchCriteriaId": "6ECADA51-1495-4D35-B7C0-6ADED7EDD26D"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:github:enterprise_server:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "3.12.0",
|
||||
"versionEndExcluding": "3.12.8",
|
||||
"matchCriteriaId": "2C305C7E-C6A2-42F2-A910-203B74C71128"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:github:enterprise_server:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "3.13.0",
|
||||
"versionEndExcluding": "3.13.3",
|
||||
"matchCriteriaId": "3A51D9A9-389E-469F-B17C-F5B7CCEEC498"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://docs.github.com/en/enterprise-server@3.10/admin/release-notes#3.10.16",
|
||||
"source": "product-cna@github.com"
|
||||
"source": "product-cna@github.com",
|
||||
"tags": [
|
||||
"Release Notes",
|
||||
"Vendor Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://docs.github.com/en/enterprise-server@3.11/admin/release-notes#3.11.14",
|
||||
"source": "product-cna@github.com"
|
||||
"source": "product-cna@github.com",
|
||||
"tags": [
|
||||
"Release Notes",
|
||||
"Vendor Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://docs.github.com/en/enterprise-server@3.12/admin/release-notes#3.12.8",
|
||||
"source": "product-cna@github.com"
|
||||
"source": "product-cna@github.com",
|
||||
"tags": [
|
||||
"Release Notes",
|
||||
"Vendor Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://docs.github.com/en/enterprise-server@3.13/admin/release-notes#3.13.3",
|
||||
"source": "product-cna@github.com"
|
||||
"source": "product-cna@github.com",
|
||||
"tags": [
|
||||
"Release Notes",
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,161 +2,15 @@
|
||||
"id": "CVE-2024-7207",
|
||||
"sourceIdentifier": "secalert@redhat.com",
|
||||
"published": "2024-09-19T23:15:12.337",
|
||||
"lastModified": "2024-09-25T17:51:34.800",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2024-09-30T19:15:04.540",
|
||||
"vulnStatus": "Rejected",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A flaw was found in Envoy. It is possible to modify or manipulate headers from external clients when pass-through routes are used for the ingress gateway. This issue could allow a malicious user to forge what is logged by Envoy as a requested path and cause the Envoy proxy to make requests to internal-only services or arbitrary external systems. This is a regression of the fix for CVE-2023-27487."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Se encontr\u00f3 una falla en Envoy. Es posible modificar o manipular encabezados de clientes externos cuando se utilizan rutas de paso para la puerta de enlace de entrada. Este problema podr\u00eda permitir que un usuario malintencionado falsifique lo que Envoy registra como ruta solicitada y hacer que el proxy de Envoy realice solicitudes a servicios internos \u00fanicamente o a sistemas externos arbitrarios. Esta es una regresi\u00f3n de la correcci\u00f3n para CVE-2023-27487."
|
||||
"value": "Rejected reason: Duplicate of CVE-2024-45806."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
},
|
||||
{
|
||||
"source": "secalert@redhat.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 8.2,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 4.2
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "NVD-CWE-noinfo"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "secalert@redhat.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-20"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:envoyproxy:envoy:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "1.28.7",
|
||||
"matchCriteriaId": "C5E423BE-4022-47AB-A5D4-B218627517DD"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:envoyproxy:envoy:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "1.29.0",
|
||||
"versionEndExcluding": "1.29.9",
|
||||
"matchCriteriaId": "E442EF13-A99D-42B9-BC76-AC398C32D132"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:envoyproxy:envoy:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "1.30.0",
|
||||
"versionEndExcluding": "1.30.6",
|
||||
"matchCriteriaId": "D9685C62-CFE4-43C5-B0C2-1C6722FB4F64"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:envoyproxy:envoy:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "1.31.0",
|
||||
"versionEndExcluding": "1.31.2",
|
||||
"matchCriteriaId": "C765FFC0-2FF7-4318-A347-2AFCAD0E7C74"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:redhat:openshift_service_mesh:2.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "A76A2BCE-4AAE-46D7-93D6-2EDE0FC83145"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://access.redhat.com/security/cve/CVE-2024-7207",
|
||||
"source": "secalert@redhat.com",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2300352",
|
||||
"source": "secalert@redhat.com",
|
||||
"tags": [
|
||||
"Issue Tracking",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/envoyproxy/envoy/security/advisories/GHSA-ffhv-fvxq-r6mf",
|
||||
"source": "secalert@redhat.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
"metrics": {},
|
||||
"references": []
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-8941",
|
||||
"sourceIdentifier": "cve-coordination@incibe.es",
|
||||
"published": "2024-09-25T01:15:48.287",
|
||||
"lastModified": "2024-09-26T13:32:02.803",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2024-09-30T19:45:43.223",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -17,6 +17,26 @@
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 5.3,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 1.4
|
||||
},
|
||||
{
|
||||
"source": "cve-coordination@incibe.es",
|
||||
"type": "Secondary",
|
||||
@ -51,10 +71,30 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:scriptcase:scriptcase:9.4.019:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "FE28A6BC-9B6D-4F25-9828-8D806FA48470"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.incibe.es/en/incibe-cert/notices/aviso/multiple-vulnerabilities-scriptcase",
|
||||
"source": "cve-coordination@incibe.es"
|
||||
"source": "cve-coordination@incibe.es",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
73
README.md
73
README.md
@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours.
|
||||
### Last Repository Update
|
||||
|
||||
```plain
|
||||
2024-09-30T18:00:18.174301+00:00
|
||||
2024-09-30T20:00:16.994670+00:00
|
||||
```
|
||||
|
||||
### Most recent CVE Modification Timestamp synchronized with NVD
|
||||
|
||||
```plain
|
||||
2024-09-30T17:51:48.050000+00:00
|
||||
2024-09-30T19:55:49.267000+00:00
|
||||
```
|
||||
|
||||
### Last Data Feed Release
|
||||
@ -33,48 +33,53 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
|
||||
### Total Number of included CVEs
|
||||
|
||||
```plain
|
||||
264156
|
||||
264165
|
||||
```
|
||||
|
||||
### CVEs added in the last Commit
|
||||
|
||||
Recently added CVEs: `14`
|
||||
Recently added CVEs: `9`
|
||||
|
||||
- [CVE-2024-45993](CVE-2024/CVE-2024-459xx/CVE-2024-45993.json) (`2024-09-30T17:15:04.473`)
|
||||
- [CVE-2024-46475](CVE-2024/CVE-2024-464xx/CVE-2024-46475.json) (`2024-09-30T16:15:09.077`)
|
||||
- [CVE-2024-46510](CVE-2024/CVE-2024-465xx/CVE-2024-46510.json) (`2024-09-30T16:15:09.137`)
|
||||
- [CVE-2024-46540](CVE-2024/CVE-2024-465xx/CVE-2024-46540.json) (`2024-09-30T17:15:04.550`)
|
||||
- [CVE-2024-46548](CVE-2024/CVE-2024-465xx/CVE-2024-46548.json) (`2024-09-30T17:15:04.620`)
|
||||
- [CVE-2024-46549](CVE-2024/CVE-2024-465xx/CVE-2024-46549.json) (`2024-09-30T17:15:04.683`)
|
||||
- [CVE-2024-46869](CVE-2024/CVE-2024-468xx/CVE-2024-46869.json) (`2024-09-30T16:15:09.200`)
|
||||
- [CVE-2024-47067](CVE-2024/CVE-2024-470xx/CVE-2024-47067.json) (`2024-09-30T16:15:09.267`)
|
||||
- [CVE-2024-47178](CVE-2024/CVE-2024-471xx/CVE-2024-47178.json) (`2024-09-30T16:15:09.410`)
|
||||
- [CVE-2024-47530](CVE-2024/CVE-2024-475xx/CVE-2024-47530.json) (`2024-09-30T16:15:09.540`)
|
||||
- [CVE-2024-47531](CVE-2024/CVE-2024-475xx/CVE-2024-47531.json) (`2024-09-30T16:15:09.750`)
|
||||
- [CVE-2024-47532](CVE-2024/CVE-2024-475xx/CVE-2024-47532.json) (`2024-09-30T16:15:09.960`)
|
||||
- [CVE-2024-47536](CVE-2024/CVE-2024-475xx/CVE-2024-47536.json) (`2024-09-30T17:15:04.780`)
|
||||
- [CVE-2024-9158](CVE-2024/CVE-2024-91xx/CVE-2024-9158.json) (`2024-09-30T17:15:05.407`)
|
||||
- [CVE-2024-28809](CVE-2024/CVE-2024-288xx/CVE-2024-28809.json) (`2024-09-30T18:15:05.633`)
|
||||
- [CVE-2024-28810](CVE-2024/CVE-2024-288xx/CVE-2024-28810.json) (`2024-09-30T19:15:03.987`)
|
||||
- [CVE-2024-28811](CVE-2024/CVE-2024-288xx/CVE-2024-28811.json) (`2024-09-30T19:15:04.060`)
|
||||
- [CVE-2024-28812](CVE-2024/CVE-2024-288xx/CVE-2024-28812.json) (`2024-09-30T19:15:04.130`)
|
||||
- [CVE-2024-28813](CVE-2024/CVE-2024-288xx/CVE-2024-28813.json) (`2024-09-30T19:15:04.210`)
|
||||
- [CVE-2024-35495](CVE-2024/CVE-2024-354xx/CVE-2024-35495.json) (`2024-09-30T18:15:05.713`)
|
||||
- [CVE-2024-42017](CVE-2024/CVE-2024-420xx/CVE-2024-42017.json) (`2024-09-30T18:15:05.827`)
|
||||
- [CVE-2024-46511](CVE-2024/CVE-2024-465xx/CVE-2024-46511.json) (`2024-09-30T18:15:06.067`)
|
||||
- [CVE-2024-46635](CVE-2024/CVE-2024-466xx/CVE-2024-46635.json) (`2024-09-30T18:15:06.140`)
|
||||
|
||||
|
||||
### CVEs modified in the last Commit
|
||||
|
||||
Recently modified CVEs: `15`
|
||||
Recently modified CVEs: `29`
|
||||
|
||||
- [CVE-2019-3010](CVE-2019/CVE-2019-30xx/CVE-2019-3010.json) (`2024-09-30T17:35:00.687`)
|
||||
- [CVE-2020-2555](CVE-2020/CVE-2020-25xx/CVE-2020-2555.json) (`2024-09-30T17:35:01.543`)
|
||||
- [CVE-2020-27792](CVE-2020/CVE-2020-277xx/CVE-2020-27792.json) (`2024-09-30T16:15:05.607`)
|
||||
- [CVE-2023-3042](CVE-2023/CVE-2023-30xx/CVE-2023-3042.json) (`2024-09-30T16:15:07.793`)
|
||||
- [CVE-2024-3164](CVE-2024/CVE-2024-31xx/CVE-2024-3164.json) (`2024-09-30T16:15:08.653`)
|
||||
- [CVE-2024-3165](CVE-2024/CVE-2024-31xx/CVE-2024-3165.json) (`2024-09-30T16:15:08.847`)
|
||||
- [CVE-2024-41999](CVE-2024/CVE-2024-419xx/CVE-2024-41999.json) (`2024-09-30T17:35:09.340`)
|
||||
- [CVE-2024-42861](CVE-2024/CVE-2024-428xx/CVE-2024-42861.json) (`2024-09-30T17:35:11.653`)
|
||||
- [CVE-2024-43025](CVE-2024/CVE-2024-430xx/CVE-2024-43025.json) (`2024-09-30T17:51:48.050`)
|
||||
- [CVE-2024-46610](CVE-2024/CVE-2024-466xx/CVE-2024-46610.json) (`2024-09-30T16:30:50.833`)
|
||||
- [CVE-2024-47068](CVE-2024/CVE-2024-470xx/CVE-2024-47068.json) (`2024-09-30T17:39:45.350`)
|
||||
- [CVE-2024-7398](CVE-2024/CVE-2024-73xx/CVE-2024-7398.json) (`2024-09-30T16:12:24.337`)
|
||||
- [CVE-2024-7415](CVE-2024/CVE-2024-74xx/CVE-2024-7415.json) (`2024-09-30T17:46:46.473`)
|
||||
- [CVE-2024-8942](CVE-2024/CVE-2024-89xx/CVE-2024-8942.json) (`2024-09-30T17:39:28.417`)
|
||||
- [CVE-2024-9148](CVE-2024/CVE-2024-91xx/CVE-2024-9148.json) (`2024-09-30T17:34:12.760`)
|
||||
- [CVE-2024-39432](CVE-2024/CVE-2024-394xx/CVE-2024-39432.json) (`2024-09-30T18:12:04.437`)
|
||||
- [CVE-2024-39433](CVE-2024/CVE-2024-394xx/CVE-2024-39433.json) (`2024-09-30T18:14:45.443`)
|
||||
- [CVE-2024-39434](CVE-2024/CVE-2024-394xx/CVE-2024-39434.json) (`2024-09-30T18:14:03.557`)
|
||||
- [CVE-2024-39435](CVE-2024/CVE-2024-394xx/CVE-2024-39435.json) (`2024-09-30T18:13:33.387`)
|
||||
- [CVE-2024-41725](CVE-2024/CVE-2024-417xx/CVE-2024-41725.json) (`2024-09-30T19:55:49.267`)
|
||||
- [CVE-2024-42487](CVE-2024/CVE-2024-424xx/CVE-2024-42487.json) (`2024-09-30T18:31:04.757`)
|
||||
- [CVE-2024-44170](CVE-2024/CVE-2024-441xx/CVE-2024-44170.json) (`2024-09-30T19:48:51.767`)
|
||||
- [CVE-2024-45200](CVE-2024/CVE-2024-452xx/CVE-2024-45200.json) (`2024-09-30T18:35:06.983`)
|
||||
- [CVE-2024-45861](CVE-2024/CVE-2024-458xx/CVE-2024-45861.json) (`2024-09-30T19:25:01.957`)
|
||||
- [CVE-2024-45862](CVE-2024/CVE-2024-458xx/CVE-2024-45862.json) (`2024-09-30T19:33:30.750`)
|
||||
- [CVE-2024-45920](CVE-2024/CVE-2024-459xx/CVE-2024-45920.json) (`2024-09-30T18:35:07.773`)
|
||||
- [CVE-2024-45993](CVE-2024/CVE-2024-459xx/CVE-2024-45993.json) (`2024-09-30T19:35:05.410`)
|
||||
- [CVE-2024-46280](CVE-2024/CVE-2024-462xx/CVE-2024-46280.json) (`2024-09-30T18:35:08.543`)
|
||||
- [CVE-2024-46293](CVE-2024/CVE-2024-462xx/CVE-2024-46293.json) (`2024-09-30T19:35:06.227`)
|
||||
- [CVE-2024-46313](CVE-2024/CVE-2024-463xx/CVE-2024-46313.json) (`2024-09-30T19:35:07.020`)
|
||||
- [CVE-2024-46475](CVE-2024/CVE-2024-464xx/CVE-2024-46475.json) (`2024-09-30T18:35:09.327`)
|
||||
- [CVE-2024-46540](CVE-2024/CVE-2024-465xx/CVE-2024-46540.json) (`2024-09-30T18:35:10.127`)
|
||||
- [CVE-2024-47066](CVE-2024/CVE-2024-470xx/CVE-2024-47066.json) (`2024-09-30T18:03:58.750`)
|
||||
- [CVE-2024-47315](CVE-2024/CVE-2024-473xx/CVE-2024-47315.json) (`2024-09-30T18:06:36.060`)
|
||||
- [CVE-2024-6544](CVE-2024/CVE-2024-65xx/CVE-2024-6544.json) (`2024-09-30T19:12:09.007`)
|
||||
- [CVE-2024-6786](CVE-2024/CVE-2024-67xx/CVE-2024-6786.json) (`2024-09-30T18:31:50.473`)
|
||||
- [CVE-2024-6787](CVE-2024/CVE-2024-67xx/CVE-2024-6787.json) (`2024-09-30T18:02:51.080`)
|
||||
- [CVE-2024-6800](CVE-2024/CVE-2024-68xx/CVE-2024-6800.json) (`2024-09-30T19:14:50.430`)
|
||||
- [CVE-2024-7207](CVE-2024/CVE-2024-72xx/CVE-2024-7207.json) (`2024-09-30T19:15:04.540`)
|
||||
- [CVE-2024-8941](CVE-2024/CVE-2024-89xx/CVE-2024-8941.json) (`2024-09-30T19:45:43.223`)
|
||||
|
||||
|
||||
## Download and Usage
|
||||
|
119
_state.csv
119
_state.csv
@ -138850,7 +138850,7 @@ CVE-2019-3004,0,0,2efc7f7d88f5aff516fa57b9566a0d09c25f9cec93e6d5a20fbd6c3e4b7e69
|
||||
CVE-2019-3005,0,0,5fd2eab716b73f493b782c4947c1f9f5075a8998f20980c68330830c02645397,2021-02-22T14:41:07.527000
|
||||
CVE-2019-3008,0,0,4a9acb031316e7185b1ecbabc7f0a6b6ad53b785e5f0e71f4ce9ab56458db4bd,2019-10-21T15:20:06.707000
|
||||
CVE-2019-3009,0,0,4b79fade18b2303017cee0d6f5907b663b8230787a2be51018dd366fb572f2fc,2023-11-07T03:09:46.080000
|
||||
CVE-2019-3010,0,1,f934c748e4cf62dc211320fd69490f9ca04563644a0a597c7989fbeab2d654d6,2024-09-30T17:35:00.687000
|
||||
CVE-2019-3010,0,0,f934c748e4cf62dc211320fd69490f9ca04563644a0a597c7989fbeab2d654d6,2024-09-30T17:35:00.687000
|
||||
CVE-2019-3011,0,0,6c3ce7483f4c5da6d34e8f6b398287be5326f52b1289caa022ba543249611bb3,2023-11-07T03:09:46.160000
|
||||
CVE-2019-3012,0,0,e8dad39d8c9a365595bf46c3c95802f5a2984e0853cb1909aa108af5a330b544,2019-10-21T15:21:29.617000
|
||||
CVE-2019-3014,0,0,f1f960b6d836340bbdc087c522e457af239e88af8692e227a8fe8e387245ab71,2019-10-21T13:16:25.453000
|
||||
@ -154746,7 +154746,7 @@ CVE-2020-25533,0,0,22b0472be3f7a02ec2f0d0ad18465cceb9b38a6dc078a221c80f4709f5177
|
||||
CVE-2020-25537,0,0,079e520785884b60c6c94552474278f37b9d9064b531f7b9bef0271a3c3726d7,2020-12-04T16:01:49.357000
|
||||
CVE-2020-25538,0,0,5332fc9b37432e8c9ab81b8f5bce073530a235c7cacfe55a7b93c4c73aae58d4,2021-07-21T11:39:23.747000
|
||||
CVE-2020-25540,0,0,2ca248b357bd039497f25236f818e4ee81410cbfbcdb2bd5023e29cde2c96a87,2023-12-07T14:22:18.950000
|
||||
CVE-2020-2555,0,1,189632ad8d4030ad0b6e6b8a2a7cb71b298da712c22daa36c87688d0cfce8a93,2024-09-30T17:35:01.543000
|
||||
CVE-2020-2555,0,0,189632ad8d4030ad0b6e6b8a2a7cb71b298da712c22daa36c87688d0cfce8a93,2024-09-30T17:35:01.543000
|
||||
CVE-2020-25557,0,0,ba7e6e69e9eb291583fa26ec421902479a3af8435a3ba56dad4071d2f9cf8c8a,2021-07-21T11:39:23.747000
|
||||
CVE-2020-25559,0,0,4bccb58c8c9c8959436042e779063f9c0f8e5febd5ef5ab5053dd6f27d4d4b14,2020-09-21T15:19:30.877000
|
||||
CVE-2020-2556,0,0,d33e26f0b2b7738761c45d3cab98c1b1ea0d45fbd62d16082aeb66e6210120ea,2022-10-25T17:57:43.913000
|
||||
@ -156377,7 +156377,7 @@ CVE-2020-27789,0,0,b3222c3c02699b580895e7172ebafc73b737a78052c9b1d7d86d99b0e1c0c
|
||||
CVE-2020-2779,0,0,a6b9bdb8767cfb9fd254a404efbad606647d03b561422b0f5d317d036eabba02,2023-11-07T03:21:47.787000
|
||||
CVE-2020-27790,0,0,26b4234f75017ebcd699f819a73d8ea5a82cbced4ae88811298835090df312ac,2022-08-23T14:55:09.127000
|
||||
CVE-2020-27791,0,0,bd58b5a63fb12f23763b7a92ad2bfd8f2392941dd2a626792c7548135e9e365d,2023-11-07T03:21:01.037000
|
||||
CVE-2020-27792,0,1,9ab0bd33e0042e4db3ae2963393c400dc2a1a04d4478eb0b9eb1ab7adee460c7,2024-09-30T16:15:05.607000
|
||||
CVE-2020-27792,0,0,9ab0bd33e0042e4db3ae2963393c400dc2a1a04d4478eb0b9eb1ab7adee460c7,2024-09-30T16:15:05.607000
|
||||
CVE-2020-27793,0,0,3cac93eceffac8cbf0ef9bed4429b09e9b53d2b190f9dfba86f919c4bbc7abe0,2022-08-22T19:45:18.513000
|
||||
CVE-2020-27794,0,0,5c474a946f55e0cb87fb2cceb323591c9e9a6de4a53fc44f88ea48390714df5a,2022-08-22T13:47:12.193000
|
||||
CVE-2020-27795,0,0,3895a30945c1b0fb81bd0eff83b00291cfacaaf6ba5cd6cf8929428857d07488,2022-08-22T17:26:02.317000
|
||||
@ -217482,7 +217482,7 @@ CVE-2023-23570,0,0,34f43d73f90c49f764b81e997892fd78dd337c97fb1148b24d8e32f1e47e6
|
||||
CVE-2023-23571,0,0,4b5d57468b0e0f6068ca1be84d1957d7fa69a135a66e59bb39d39000117da5a4,2023-07-17T14:15:09.677000
|
||||
CVE-2023-23572,0,0,b46b7512903e7f49f58188b1516e5c59dccee6524ae44e74bf2d1686b17145a6,2023-08-24T13:33:32.147000
|
||||
CVE-2023-23573,0,0,d839cffdfa00da742eae7d304e41472753b06c66c5d31c59bec83f449da372d5,2023-11-07T04:07:46.417000
|
||||
CVE-2023-23574,0,0,b67f66b5b65ad0e62ebcfed6bda90888bacb4029f43603b7f3756c633a76866b,2024-09-20T12:15:03.747000
|
||||
CVE-2023-23574,0,1,172f8bf8a087daa7a415ed95235ca91931e64d79ed2f867eb04e242aac262f0c,2024-09-30T19:30:36.950000
|
||||
CVE-2023-23575,0,0,023ca3e7364edc16a58f52ccb2e6b5d9fc2383841c194afcc25ab1d7eefe38cb,2023-04-18T19:36:02.697000
|
||||
CVE-2023-23576,0,0,9b16ed66ee4707fb622123e163d2115347cbc9be42696ade7dc9624d77214e54,2024-01-05T19:32:36.870000
|
||||
CVE-2023-23577,0,0,f94aa6f01f8e228592ebd011e08981a573e21add09f0acea4f77a15299f4b462,2023-11-07T04:07:46.600000
|
||||
@ -219189,7 +219189,7 @@ CVE-2023-25666,0,0,9329c20086df1831926a3d2e836ad1ca87c7bb2663c4ea7cdae2a6734ae13
|
||||
CVE-2023-25667,0,0,7efac3cc2cf288d0d8e0a72f036945bd8b16cbb151e78b88bc2043e1daf07bf8,2023-11-07T04:09:05.913000
|
||||
CVE-2023-25668,0,0,17439808d191e9d44412ac88f372c453c6a7b56282c541fb77ca790d79d2e1ed,2023-03-31T14:20:18.307000
|
||||
CVE-2023-25669,0,0,5799ebe4de7eb86bb31a13c40b7ed1678b85cc77d9d0682764a3dc5f4ed2efc7,2023-11-07T04:09:06.053000
|
||||
CVE-2023-2567,0,0,1ac6dd29861dbb570da7adf048c6c8e790afe63d2025eedd15e58909c01c9f1c,2024-09-20T13:15:07.067000
|
||||
CVE-2023-2567,0,1,4990ecd44a7a10cdf0285c7830f80dbec8922e032cf88c33e7229e857eb80d7b,2024-09-30T19:32:11.580000
|
||||
CVE-2023-25670,0,0,f9dcbb1f04ff7ba5a0a0fa2adf10e56474b48ef8789523af5d66cd9e89898c31,2023-11-07T04:09:06.160000
|
||||
CVE-2023-25671,0,0,bfda7816a898010b5e3dbd370222e6fd7e36489c44c161a898b17a01a4e734a7,2023-11-07T04:09:06.280000
|
||||
CVE-2023-25672,0,0,4c5551dc36d4bc66e02de852d1385936cf6c50fc7a1b7ca7662ba9486274e753,2023-11-07T04:09:06.410000
|
||||
@ -222895,7 +222895,7 @@ CVE-2023-30410,0,0,d6c69bd0c391ba3e4623ebea76c65f4f26228366ebdb22e33fb7fa12a3e32
|
||||
CVE-2023-30414,0,0,b5860ef5c020f75da310efaaa87b88f291679c3f7b9e5d59db95c351386e25aa,2023-05-04T13:58:41.697000
|
||||
CVE-2023-30415,0,0,cd8a6e49d727913f35e4c659d01452984f1c7015d1e622fcffa3fe23d97cda85,2023-09-29T16:57:27.170000
|
||||
CVE-2023-30417,0,0,fda2808784442937f2890f9097a471a03c08659895e5b7bea642818137ca6524,2023-05-04T17:36:34.967000
|
||||
CVE-2023-3042,0,1,dc4b616bc76ae6488c468910eeec2496080394f835efef55f4005b6835f816b4,2024-09-30T16:15:07.793000
|
||||
CVE-2023-3042,0,0,dc4b616bc76ae6488c468910eeec2496080394f835efef55f4005b6835f816b4,2024-09-30T16:15:07.793000
|
||||
CVE-2023-30428,0,0,1efeec4521c1a839ffce9db519aae5f3b59a6d29b3b62d170ba0843e2efdc83d,2023-07-20T16:41:45.247000
|
||||
CVE-2023-30429,0,0,27d09dd85c230885df071c5f8e27796ba6483afc1e418cf2b610af918d289e0d,2023-07-20T16:47:49.747000
|
||||
CVE-2023-3043,0,0,09e537fa053cef06eef2088a7b3b0ae592cdbc3886ebc90ce64b70ac5590af26,2024-01-12T19:18:06.067000
|
||||
@ -240318,7 +240318,7 @@ CVE-2023-6218,0,0,d5e8b7968d4c169faacc09c4cf5fda1491f2a21d83bea9885e95d9daa62289
|
||||
CVE-2023-6219,0,0,2b15674df84308183736b9cfa12df288f70e91ae4df4133494a4fc92e278cad9,2023-12-01T20:57:20.553000
|
||||
CVE-2023-6220,0,0,f37be182c2d2bacd79c2313a6938ac162b56637d9d95009515483b9bc28872f8,2024-01-17T20:06:17.117000
|
||||
CVE-2023-6221,0,0,7ab0eba1d1d51aa86532e9fc8953ca9851950475f94c2d1e1fd104249ff251bd,2024-08-02T09:15:33.853000
|
||||
CVE-2023-6222,0,0,f961cbb0cad98c188857f6d85828996b67456d20c6f2602ae425d54a57e3f8ec,2023-12-21T19:28:10.553000
|
||||
CVE-2023-6222,0,1,10ca719d6241a16d7a4af8b329be1dd72f36fa6eed5abc1684e0c343746dec72,2024-09-30T19:35:03.307000
|
||||
CVE-2023-6223,0,0,4c9b2542ca6b96527ce1674814817a12c2ec6aea5a47819cd008b4689fedf8b6,2024-01-16T23:57:09.203000
|
||||
CVE-2023-6225,0,0,0c86f4bab68c98d520a08014c346b76b2f8114c74cf49363651f75a1c6d9db83,2023-12-04T15:10:44.187000
|
||||
CVE-2023-6226,0,0,1ad7582028a7ede50c5087c41c65f6f45601471c7c6fb9032c7165ecbe8ae9e2,2023-12-04T18:58:04.080000
|
||||
@ -249275,7 +249275,12 @@ CVE-2024-2880,0,0,c617aabe27a476530f11dd1aff9d0e70b8bc9314c3647a1cac79a81958f4d9
|
||||
CVE-2024-28804,0,0,f7e3d6c3e14215e831a96b931ea15f5f72cb16cc7bfabd09d8b34530beca586f,2024-08-01T13:49:18.607000
|
||||
CVE-2024-28805,0,0,57ffe0c5396b469d1d6aea3771a149218b95fafbad9b52c6f522fc5113787118,2024-08-01T13:49:19.450000
|
||||
CVE-2024-28806,0,0,b0870c92c612bc52e55ac5da958c74e320d7e205346206836a7ae598363f9d27,2024-08-05T11:35:01.757000
|
||||
CVE-2024-28809,1,1,ccc34233545b23e357754813e8f630a437ad365b8188c989fc2e40f9630d5b69,2024-09-30T18:15:05.633000
|
||||
CVE-2024-2881,0,0,65fc535be8a815e92053ae1d797e8977602b99048c471a2a98041135b70a0df9,2024-09-04T14:27:24.057000
|
||||
CVE-2024-28810,1,1,9231407518416ef5ae949941b3bc271921ac89f9f9cd51bac3c177d689501e23,2024-09-30T19:15:03.987000
|
||||
CVE-2024-28811,1,1,9bc658dba52b6664d430eb6e2b56d170971838fbccfd368ec19cbd2184be333a,2024-09-30T19:15:04.060000
|
||||
CVE-2024-28812,1,1,ee5aa89b11e12f70e7819416536106fce2cfc893e2987b73362da0544bdc452e,2024-09-30T19:35:03.620000
|
||||
CVE-2024-28813,1,1,db3e15ae2a6ac7f890048b08fe1fb750ad791ad1c28bbdf08ac8d6db90a63165,2024-09-30T19:35:04.427000
|
||||
CVE-2024-28815,0,0,a66a592511ffd5b563fa083295811494fe79ce7c34bc79ae02ae7f38cd9af9c2,2024-08-01T13:49:20.227000
|
||||
CVE-2024-28816,0,0,75a949219f8a896ffef945213a1610d3de2a2cf64da977b1d4287b567e2864da,2024-09-06T17:35:06.960000
|
||||
CVE-2024-28818,0,0,553ea080520e3ef7d7c194b1130a084d77d8e937a2b2bb8942609e2870cc98f5,2024-06-27T16:43:48.633000
|
||||
@ -251371,10 +251376,10 @@ CVE-2024-31630,0,0,2bd16e3fcef7bda0b7ed937f45148dde60c59ea9d09224ef4dc76dc8aeb1e
|
||||
CVE-2024-31631,0,0,189299e833a9bdec5625f34c9b7af7b60646f6c7b2cd4586dea999ec400d5e00,2024-06-05T17:15:13.130000
|
||||
CVE-2024-31634,0,0,cd6336332928e139372eaeb7f2fa7bd12555d147721492304ddeef71595ef37a,2024-04-16T13:24:07.103000
|
||||
CVE-2024-31636,0,0,5030ab945dd9e3d071b87a4da035a97defc5897507c6002a20e31f1008a32478,2024-07-03T01:55:16.580000
|
||||
CVE-2024-3164,0,1,0228131b2e264217aeda632549ca753158869120be34b2b79697e3114ab65fbd,2024-09-30T16:15:08.653000
|
||||
CVE-2024-3164,0,0,0228131b2e264217aeda632549ca753158869120be34b2b79697e3114ab65fbd,2024-09-30T16:15:08.653000
|
||||
CVE-2024-31648,0,0,14919d1b61efab10d4203511450f239ac7204789ae95d83bb57af18f0000d172,2024-08-08T19:35:18.173000
|
||||
CVE-2024-31649,0,0,8b247291638ecff50896f2aca79dadb1b9c9aa19002fdb0afc961b73616ecbcc,2024-08-01T13:51:03.573000
|
||||
CVE-2024-3165,0,1,0646edb30e52b9cd1d5dc09ce07b22c68fadd9067d31e951e14a2e77fb715a7d,2024-09-30T16:15:08.847000
|
||||
CVE-2024-3165,0,0,0646edb30e52b9cd1d5dc09ce07b22c68fadd9067d31e951e14a2e77fb715a7d,2024-09-30T16:15:08.847000
|
||||
CVE-2024-31650,0,0,f91457293ffe9951d31a570db1b9cb5f0c4dfb9ffa5e388dc3d2c34a75979925,2024-07-03T01:55:17.350000
|
||||
CVE-2024-31651,0,0,ff635ec14b868d2b93fa21d54db2cc160b86957cb7aa11437f2a0e792cdace05,2024-08-20T16:35:08.810000
|
||||
CVE-2024-31652,0,0,2f3d2336fbc8f42d1dec7a1682c8c016320ebabd666e8e526baaf0f45acfa966,2024-04-16T13:24:07.103000
|
||||
@ -253982,6 +253987,7 @@ CVE-2024-35475,0,0,5630b4549b65d33d3ee9b0fbe82b2113175125b521e97ea87cdc02319a1cf
|
||||
CVE-2024-3548,0,0,d36c3da57ad232cab63cfe730b939da3d11ca9fb8353135fe3e907f711d131dc,2024-05-15T16:40:19.330000
|
||||
CVE-2024-3549,0,0,0cde880e41c0c3ba557ce463b1ff0900f3f316d2ed3d6009897a715aae6e97e9,2024-06-11T13:54:12.057000
|
||||
CVE-2024-35492,0,0,33aecacefd5370fcd53a7eb152d476421944d3120d3115b260ff90b817999987,2024-08-20T16:35:13.950000
|
||||
CVE-2024-35495,1,1,2ca389066c0f9d7e4a1a82563f1a7df4d574e1da6bc99733088a07f8f5fb3236,2024-09-30T18:15:05.713000
|
||||
CVE-2024-3550,0,0,ac5bbd2b6bc618ed8d0d187264280ccbd8a80d9a5319faa69118b498969cb88c,2024-05-02T18:00:37.360000
|
||||
CVE-2024-35504,0,0,e166404c83da3941ce306fedbcc958803779345d2352a83f02ebf499c8052277,2024-05-30T18:19:11.743000
|
||||
CVE-2024-3551,0,0,66b014d685e7b98f0edafdd7cdd0ca69eb0c14e102cb460567e00480c7707135,2024-05-17T18:36:05.263000
|
||||
@ -256772,11 +256778,11 @@ CVE-2024-39428,0,0,5d03789c96f23918b1ab1ea6fa6e056174329d182d27e72cc9dae9827964f
|
||||
CVE-2024-39429,0,0,e5307c82d36950beba8c9942e931fdf6e3ccb2f9d59fae72d11a48dd470f78ba,2024-08-27T17:44:02.903000
|
||||
CVE-2024-3943,0,0,fecb7894fc8f71bb1eb318ec20be6409020b761b3221fbb9ca597f81fb48f5da,2024-05-30T13:15:41.297000
|
||||
CVE-2024-39430,0,0,1e2b9ea56442b26f7737a9950103fafe605e5c7a90c854837eacf7ef42d0ec7f,2024-08-27T17:44:25.593000
|
||||
CVE-2024-39431,0,0,90a6829637c027c6c1676fb097e9eb7f26788c64ec2a6f6d2976760360f416d1,2024-09-30T12:46:20.237000
|
||||
CVE-2024-39432,0,0,aeac819d505f2cb2e82093d66b2236ae0ab8530e69995f15ad476f76487347b9,2024-09-30T12:46:20.237000
|
||||
CVE-2024-39433,0,0,d4d782fd1bb786b09c1fa8beabe4863a20cdc54d4d78b91f909ee667c43313ba,2024-09-30T12:46:20.237000
|
||||
CVE-2024-39434,0,0,4c0637c717d73c37fad20911bc5e85aa1bb7ff912a103d1b88e4480925f1e80b,2024-09-30T12:46:20.237000
|
||||
CVE-2024-39435,0,0,abd59a8c43da780df7186aa14ddc91ec6f181b4a632bf3979773e0a458fc89f8,2024-09-30T12:46:20.237000
|
||||
CVE-2024-39431,0,1,2306ba6560b51324446746a18a18f3bc2df93434f1c992624845bb1e5fc9bb1a,2024-09-30T18:09:30.780000
|
||||
CVE-2024-39432,0,1,c5344327ea4e29569cde1ea8e7912a1f59909bf9a7631cccf2f5bb521ee73dca,2024-09-30T18:12:04.437000
|
||||
CVE-2024-39433,0,1,b0007cb93af88c45dc6df70760e2e177a4763bcaa8d7c7eac293b0ba1aabdc2d,2024-09-30T18:14:45.443000
|
||||
CVE-2024-39434,0,1,6fa311444443904695893d64c5957ccb50003fad05bc243c95fa5540678b4129,2024-09-30T18:14:03.557000
|
||||
CVE-2024-39435,0,1,c1323c169e57e336d6df9d30a55825a6eb9bb6be1621f01964c9727171d73763,2024-09-30T18:13:33.387000
|
||||
CVE-2024-3944,0,0,5f019f02cc03a38e43d6ce346d35a78d9422843cd57b5ebc3224417ac95f2368,2024-08-29T13:25:27.537000
|
||||
CVE-2024-3945,0,0,f529a76504b589632a786b994a7e59172142cd26cd001d628e7f3ff9658da8b1,2024-05-30T13:15:41.297000
|
||||
CVE-2024-39457,0,0,71348762cda2a65a9fb6ee86fb97ddb6684e341009bf79ffb50846af36c0e45a,2024-08-22T17:33:32.373000
|
||||
@ -258062,7 +258068,7 @@ CVE-2024-41720,0,0,2d7bee1f981165f1c9cbab9643ce597269a916a15ed0d381724ec0dadf39a
|
||||
CVE-2024-41721,0,0,a17f2b030998fd99e19cd291400da7030bbfa9d3d97c94e9d58d3ba36f26dd93,2024-09-25T14:35:06.917000
|
||||
CVE-2024-41722,0,0,f733309575158343ebd0680abc925b6ccf0b2e8a425ec48461fce81378d53712,2024-09-30T12:46:20.237000
|
||||
CVE-2024-41723,0,0,2fd6c172462641b542f047f7ff3bf2247bdc5b8b5f34ce988c43b2bfe1795c68,2024-08-20T19:26:24.033000
|
||||
CVE-2024-41725,0,0,9fa43c2bc17c8b3a4f55f7cab7925b510f29704748d43554c32ada9221146150,2024-09-26T13:32:02.803000
|
||||
CVE-2024-41725,0,1,83f32e7cc1dec315c1c39fc812aeafe9b3d09b8b7d971df4c4ae22ade00766f8,2024-09-30T19:55:49.267000
|
||||
CVE-2024-41726,0,0,e325c72cd77b10fa79a0c73cd0bce9d67f9472d40dd3ab04f6437f9f2b06b815,2024-08-01T13:59:09.707000
|
||||
CVE-2024-41727,0,0,f64de623c1f3cae418235db50af8da33c1315446224a7b8505bd8fc5343d1bad,2024-08-20T19:25:12.490000
|
||||
CVE-2024-41728,0,0,99c94826375f1fb80dce15bbcf8a28085193444f8aab436fe5d670c8781915eb,2024-09-16T14:14:52.840000
|
||||
@ -258237,7 +258243,7 @@ CVE-2024-41990,0,0,a9d3bfe1152ea007eb5df4a4d15c3972fabe2ab7cf6c4dc84957655472913
|
||||
CVE-2024-41991,0,0,c38f7b679bd3e48c46db9fd1c6390ab9383b0c22d8669d807f374055f46ee42b,2024-08-07T20:48:22.403000
|
||||
CVE-2024-41995,0,0,79638f0d10c16b237f07db3242d98d294e87bf4205be8c6d9c3c7b90790704bd,2024-08-06T16:30:24.547000
|
||||
CVE-2024-41996,0,0,29b8c50df43b1c66bff4b5734acbca34adccc097a107dedf36398e589357d13d,2024-08-26T16:35:11.247000
|
||||
CVE-2024-41999,0,1,a370380ae5e595c1d409f5d8d8f92b14e0e23ae9708051ce0a7058f9d91625a3,2024-09-30T17:35:09.340000
|
||||
CVE-2024-41999,0,0,a370380ae5e595c1d409f5d8d8f92b14e0e23ae9708051ce0a7058f9d91625a3,2024-09-30T17:35:09.340000
|
||||
CVE-2024-4200,0,0,4cd240b08c44457e11ab7d0e46f05e7d4edddbc268bf54e61982ff7b6b50f3a4,2024-05-15T18:35:11.453000
|
||||
CVE-2024-42001,0,0,fcbbb9fe256b159250061e78a0e74ebb6632e1ed1a0fdada8381ebf9439eb017,2024-08-20T16:37:05.447000
|
||||
CVE-2024-42005,0,0,31c6234f3daaff960ef384b4b5b21fd451482162fcdfabf6e4368a5912d0c3b9,2024-09-03T18:35:10.293000
|
||||
@ -258247,6 +258253,7 @@ CVE-2024-42008,0,0,239b4738ade78ee5cb428e4f0bc1011e17071df970bcf82670ecd9f70d12e
|
||||
CVE-2024-42009,0,0,8775464dacf05b07f164d9bf135cafdb2ba4b40a363a5d9db69127bd2ae3f95b,2024-09-06T21:50:47.813000
|
||||
CVE-2024-4201,0,0,ee0badf63a3e9c653031fb01c45e3bab9160ffb251dc5a875d128957347bb089,2024-07-18T19:39:50.667000
|
||||
CVE-2024-42010,0,0,f347d4c1e17b119f6d9851ca0a7b1b017e286c890135bf10b6afdc7ab31c6734,2024-08-12T14:15:07.370000
|
||||
CVE-2024-42017,1,1,a768ca4e6eb2a9ee07a537925370a935e6b04778c28e2101328d3734d63b13e8,2024-09-30T18:15:05.827000
|
||||
CVE-2024-42019,0,0,00604c99ddf544da3b62d7a84887b798a81cb0c15ced1dcc5fdbfa92f5dd8022,2024-09-09T17:35:05.247000
|
||||
CVE-2024-4202,0,0,614a40ef1052d861451b397b9533024f5e9aecccff7f20e945fab06926a9f188,2024-05-15T18:35:11.453000
|
||||
CVE-2024-42020,0,0,37c4c1406166ec6fd5ab227fac5e61169cbd195ea42942d8bd175d493c4f9eb1,2024-09-09T13:03:38.303000
|
||||
@ -258634,7 +258641,7 @@ CVE-2024-42483,0,0,ca4650d6e89f90cab3f4cbd174343a58f75eabf663e066f3c3338307399ba
|
||||
CVE-2024-42484,0,0,a1d071a36aea45bef6715a21ed0f1766066470b11470c144bede3c9c755cd118,2024-09-12T18:14:03.913000
|
||||
CVE-2024-42485,0,0,9c52a237d351fcf0752a53847291432cd122014665f3d16b6c4975bcf35af6a7,2024-09-18T18:31:40.427000
|
||||
CVE-2024-42486,0,0,a989fdd89a78984e53108438ae1d4599e890f4b44bbe2719c613b74d6b8f2b23,2024-08-19T13:00:23.117000
|
||||
CVE-2024-42487,0,0,cfa3e5fc5d85dee47035ee9506daaf513205a0ae2a1267b79a4b3106110a6897,2024-08-19T13:00:23.117000
|
||||
CVE-2024-42487,0,1,64075bb30e2f11b2a23a23e40f17741285ef66b94f28267872bedd221af498b5,2024-09-30T18:31:04.757000
|
||||
CVE-2024-42488,0,0,2e1cd2e30af855296712aec04f31ad7dc9d3eafb93055aaa6265177ab90fd230,2024-09-27T18:49:05.410000
|
||||
CVE-2024-42489,0,0,181648e804e837cda5bb13bcded826140342ba5660b47fc9ce10fe5b939de398,2024-09-16T19:46:18.913000
|
||||
CVE-2024-4249,0,0,20dbadf05c38d413ed14f5d424310da5ffa119a0ccbbcb5b690e0c54ceac344f,2024-06-04T19:20:34.093000
|
||||
@ -258841,7 +258848,7 @@ CVE-2024-42850,0,0,a72d6cc9fb65147822ff703ae140dbf9bc418b2813da9b6084ec42fe436f4
|
||||
CVE-2024-42851,0,0,f841f745f513412557e0c00ae557a507c262bbcf9e2f6ddfb2d4220b405d360a,2024-08-30T15:30:44.113000
|
||||
CVE-2024-42852,0,0,2344821754827259ef0e7a5b96c5bf6543f51312170a85eff0c415fda2be9db8,2024-08-23T19:35:15.240000
|
||||
CVE-2024-4286,0,0,4b983e074dfcf6df9bba7e92a07b4865c0022e26c41bba4144154cfeae541d31,2024-05-28T12:39:28.377000
|
||||
CVE-2024-42861,0,1,ea0f837739db3748c937246e6f5cdcd94d8051062b95988ae5af1b8fbf8f807c,2024-09-30T17:35:11.653000
|
||||
CVE-2024-42861,0,0,ea0f837739db3748c937246e6f5cdcd94d8051062b95988ae5af1b8fbf8f807c,2024-09-30T17:35:11.653000
|
||||
CVE-2024-4287,0,0,e4eaa9cc0eedd48e962bf47bbdeb2988e2d50ccd6011525ef3609c758b0c263c,2024-05-20T15:17:54.513000
|
||||
CVE-2024-4288,0,0,98dba4b61502f5abd6b75fde706ee82a9bae31a5b0be7db458ed8cfdf0d8bfc6,2024-05-16T13:03:05.353000
|
||||
CVE-2024-42885,0,0,b6fbfe1a8ae448a95f4eb231b38e7555bf7772a19abe7daa4ac719d8268bede7,2024-09-05T18:35:07.060000
|
||||
@ -258916,7 +258923,7 @@ CVE-2024-43011,0,0,a1a7726f53e21e3beb63c25ff5d202a0a16dad76f49dffd4b60f93fe17591
|
||||
CVE-2024-4302,0,0,3989b291497fea424d341ee8d50afc238ccc795cfb4606a4430491f615d9ea6b,2024-04-29T12:42:03.667000
|
||||
CVE-2024-43022,0,0,650f9fb8ccee75912422917c17fa309113c9ea3a4d5a4e724d337f4fa0323626,2024-08-21T18:35:09.733000
|
||||
CVE-2024-43024,0,0,c5f0cc8bedf820b250245c83e75eef2329c1bda7ae52de51223cb56379c99592,2024-09-29T00:27:47.003000
|
||||
CVE-2024-43025,0,1,7a14f1b850d1ff4d172056732ca4178390eda10654261a2687c8e682aeece981,2024-09-30T17:51:48.050000
|
||||
CVE-2024-43025,0,0,7a14f1b850d1ff4d172056732ca4178390eda10654261a2687c8e682aeece981,2024-09-30T17:51:48.050000
|
||||
CVE-2024-43027,0,0,0604ae83aadfc055c804f63006999d0d70f480945a963fa75a913e2db2c243a3,2024-08-23T18:35:06.387000
|
||||
CVE-2024-4303,0,0,83a712aebf2d4281174fc319c5a3b5ed1f6b2a8b7c1590974611c884faeb0657,2024-04-29T12:42:03.667000
|
||||
CVE-2024-43031,0,0,c3ec426a9c2d322dc356eb4fe356a9e19c60505e16e054c91bc62d391f4483d2,2024-08-23T18:15:07.490000
|
||||
@ -259557,7 +259564,7 @@ CVE-2024-44167,0,0,0c7f2bd46dbe690e9e6ee041bf2863bc0bf24e5ff869009fc286ce7f5e79d
|
||||
CVE-2024-44168,0,0,e2c5adef7f7490850ad8c9b13a830450085fc6a69a5acc58c125404fbc5d926d,2024-09-26T13:56:00.007000
|
||||
CVE-2024-44169,0,0,1984dc39e10d51ae75d1eb4ce71ed44a0e161e0da261bb6e58a46f9336bba7e5,2024-09-20T12:31:20.110000
|
||||
CVE-2024-4417,0,0,9b4dc22c7f1e74f381016fafb921403ecdaeb7b3b80aa5fc2130db180ef5935c,2024-05-14T16:11:39.510000
|
||||
CVE-2024-44170,0,0,ad9c7ebf0677867158c66367ee67fb353ce44ea245452aff8d81c248a025d15c,2024-09-20T12:31:20.110000
|
||||
CVE-2024-44170,0,1,09c524e61ec90fba1a595f63070c116f0423bd8870a9c70b92682dcc392756d2,2024-09-30T19:48:51.767000
|
||||
CVE-2024-44171,0,0,8849ab93a4e3d95b8d0c07b2a5929755d0774e3c1ebcd6d4c47f015cff90ac49,2024-09-24T16:22:38.880000
|
||||
CVE-2024-44176,0,0,5b6fb86a9ad1c810cf7d21dda6f46ac369e13568efffc12218acbb73a0a9f505,2024-09-25T13:27:13.333000
|
||||
CVE-2024-44177,0,0,4b644fb54bfe5bad82f56bfb2ac65172a558203c45040f662484a2178ef047ba,2024-09-24T16:28:09.853000
|
||||
@ -259957,7 +259964,7 @@ CVE-2024-45192,0,0,7ebf90a7dd47be6e13a820a7a55bd25a33fd9e3b9dd577584cb0c6cebe711
|
||||
CVE-2024-45193,0,0,aad683d38855495998b9aca0a814babde19e695a0d6614e90cdeda08f7f96a08,2024-09-10T19:35:10.143000
|
||||
CVE-2024-45195,0,0,6ffd475ceaf8128f565ed8b5cb0ab8e8ef23a6c0d5b146527899f5211dfb9259,2024-09-06T15:35:05.483000
|
||||
CVE-2024-4520,0,0,b2949348c863aeabf77cf8262dadc8a1301ac645ed88723ebde503df8cb28e51,2024-06-11T17:02:16.967000
|
||||
CVE-2024-45200,0,0,341f31059becdff3ffdb369c42ede5b70f73e10280e558f08f2a1342b48e6133,2024-09-30T12:45:57.823000
|
||||
CVE-2024-45200,0,1,c755ac93f1b17cd8efb21d298d911a4f5dcab9011db4f75e5e04cf5d33a0f2e5,2024-09-30T18:35:06.983000
|
||||
CVE-2024-45201,0,0,83db05d7484ca5c2638e18e64e3b5c06d28a9caaae332ad6d01f844ea902b04a,2024-08-23T16:18:28.547000
|
||||
CVE-2024-45203,0,0,0a34ec3cf21e7526a71f11433fb5593e3ea52ee9638fd0c30ca94a57eb961782,2024-09-16T13:27:19.190000
|
||||
CVE-2024-4521,0,0,a1d240438f25322e21494c2ddd2f5ee26b23410f012534bc2c27a0a49b09a860,2024-06-04T19:20:41.223000
|
||||
@ -260244,8 +260251,8 @@ CVE-2024-45856,0,0,0d2d555a4be2f7d0582132e7868cb1ae44e7be28b33194ae92062d7b37f54
|
||||
CVE-2024-45857,0,0,baf58007ae785d8a411fcf58ab797e8aa621cae99978a873f3918c60d00cf497,2024-09-12T18:14:03.913000
|
||||
CVE-2024-45858,0,0,b5441be916d9d638a5a087843bce9f2981a17328a32cafaa10622a0d2ef26e3e,2024-09-20T12:30:17.483000
|
||||
CVE-2024-4586,0,0,308ac0f257920a7bf6e50f46839419870b7e733c7917681ea48f64312191a5cb,2024-06-04T19:20:42.953000
|
||||
CVE-2024-45861,0,0,06da4e301ea3f4e44ad40215bb90dc27994813b6ecf99be9d6a5f2f497d7d785,2024-09-20T12:30:17.483000
|
||||
CVE-2024-45862,0,0,4e9b066250722e9cd280f4a8d9e78c648ab8f1036530303a9a0926348d90730f,2024-09-20T12:30:17.483000
|
||||
CVE-2024-45861,0,1,68a3e8fb3e4597c61c4db5f65fdb33d3d4021e79b4a5583c113ba868c0e19c39,2024-09-30T19:25:01.957000
|
||||
CVE-2024-45862,0,1,a441a246649880078e2d6011e0d9789b5a78013f3cf95e46c30715bdc12df7ad,2024-09-30T19:33:30.750000
|
||||
CVE-2024-45863,0,0,fa53199e81e1f2d3cad3f37b555d35fb431e4ff73450f766bc0b9224d0bde527,2024-09-30T12:45:57.823000
|
||||
CVE-2024-4587,0,0,ccb551f2bab92e34c98709c8a5231b1e8778dd90f0d16bd4ac4c665438d47b6c,2024-06-04T19:20:43.057000
|
||||
CVE-2024-4588,0,0,9198a141cbfd67d79271a90e0ce19e828dccb043a1ec84b18e696744e0f31db8,2024-06-04T19:20:43.163000
|
||||
@ -260253,7 +260260,7 @@ CVE-2024-4589,0,0,4328e8e6c3737b332b5624dfb7ea03e7812e5262794529580dcb4596fe3e40
|
||||
CVE-2024-4590,0,0,8ca402987898b35fa6dccf6a68bedf09dff404f8ccc3b30e4b5d3617c810458c,2024-06-04T19:20:43.350000
|
||||
CVE-2024-4591,0,0,932b05f4c05f6cec282455aa1d3695481031502fa6f9d1dddbe95851cbcfc0be,2024-06-04T19:20:43.450000
|
||||
CVE-2024-4592,0,0,14c53bd50ede1a956ff9d7a3d25f38fbc0411a373abc96f1d6d1bef77fb32c4e,2024-06-04T19:20:43.560000
|
||||
CVE-2024-45920,0,0,aecffc21707d23a7569a67e5884c316b7c27e8b8c18def266a5e39e0b431918c,2024-09-30T13:15:02.450000
|
||||
CVE-2024-45920,0,1,1603368018598f68b5023b023b64068849128d766e08c06a3393721c2c45efb8,2024-09-30T18:35:07.773000
|
||||
CVE-2024-4593,0,0,94ecb7e459fb704ab815ca1814a0a7a4397cf6e067d30b0e365dc0bb2101508b,2024-06-20T20:15:19.237000
|
||||
CVE-2024-4594,0,0,6353480e983dfe68c6b174c583e75b67b6ebde5befefc4e80bf75a35aedb2302,2024-06-04T19:20:43.657000
|
||||
CVE-2024-4595,0,0,a34d956039b7343ba69c0066573aab0165928a92f89b42d7c5d672a51296492e,2024-06-17T19:15:59.063000
|
||||
@ -260270,7 +260277,7 @@ CVE-2024-45986,0,0,a85d3ec3755f724362fff27a6a522f83d6b30d560b1ead4324df3dd3027d0
|
||||
CVE-2024-45987,0,0,78f20ed33f2f525a22db6a5cf4bd6c14205c0abb553bb982099aff60afe849a3,2024-09-30T12:46:20.237000
|
||||
CVE-2024-45989,0,0,ab3f6bd3392b087dcb35df06d536b3edd1a33ced94d9672493bfe0cf20988e7e,2024-09-30T12:46:20.237000
|
||||
CVE-2024-4599,0,0,97a585846a1cde14c82c7df8029410945eada1b1651bcc856b8e29367f63ecca,2024-05-07T13:39:32.710000
|
||||
CVE-2024-45993,1,1,ae119871753448a3d89f426e366768f08e16c8c49b38dd39480dbd860c1a41b3,2024-09-30T17:15:04.473000
|
||||
CVE-2024-45993,0,1,e26b64fa81fc283c963e728220ec6b219796ae3f5c14eda623f46362e541d825,2024-09-30T19:35:05.410000
|
||||
CVE-2024-4600,0,0,078ff1a3ce0c016ebe4abdef878e85c422e5d3e27f924ee561699d3a699695bb,2024-05-07T13:39:32.710000
|
||||
CVE-2024-4601,0,0,f0cf92b01a71b6ce5239836875c0fea83fe5cefcc9c9a95787d845c600418862,2024-05-07T13:39:32.710000
|
||||
CVE-2024-4602,0,0,2d8504f508e1d4f718d8c666850c307b85c9596de2a8b2f0ab0bc138c9da4ca4,2024-08-01T13:59:32.233000
|
||||
@ -260311,12 +260318,12 @@ CVE-2024-46256,0,0,3b1fbc605e16114ce563e72036bda20657faf5824bcb546aa9068019df133
|
||||
CVE-2024-46257,0,0,97c0bb598edca401298a2c44e1e55f9c450b6967f78a45d9cce1b7ff0feafc66,2024-09-30T12:45:57.823000
|
||||
CVE-2024-4626,0,0,2c49c68b79a7a3d7626dfac7c1ab161b6d51a1a10b834d04b620fc9c15d7e475,2024-07-15T17:10:52.563000
|
||||
CVE-2024-4627,0,0,a94951b310ac8fa22dfdfb5dfa1a6f0b0e4706e2176059eb33a39431470f56d3,2024-07-03T15:45:08.187000
|
||||
CVE-2024-46280,0,0,4e3598879cb34b285622348725a58a1e65e7e9f2b98b0e586ca6e5c26ce1d5f3,2024-09-30T15:15:06.053000
|
||||
CVE-2024-46280,0,1,cb8470603bde60f41f29a8f0fdd66fefd604a196bc81d1ef6889b2320b179da1,2024-09-30T18:35:08.543000
|
||||
CVE-2024-4629,0,0,54224b2085ffd2ba36897ff032b68642cbe4c57a326e28370b5db8ffd6f494e8,2024-09-16T15:51:43.937000
|
||||
CVE-2024-46293,0,0,24e9618f1ff4459e0665c6150626e6f186e013555589d5e6cf147578a383e20c,2024-09-30T15:15:06.123000
|
||||
CVE-2024-46293,0,1,e318f800936ab74936ae3857b5e562d7b97d09a7e5d1d4449ae4e773afea5399,2024-09-30T19:35:06.227000
|
||||
CVE-2024-4630,0,0,a8734ce37050a74e4818d023dd3913b4f4405761deda282bae815154e00346af,2024-05-14T16:11:39.510000
|
||||
CVE-2024-4631,0,0,d3c7ebdf5d9c31d124bc2c67e858e716a594cef6aa78ec49eddcc538ef63a67e,2024-05-14T15:44:13.487000
|
||||
CVE-2024-46313,0,0,c981653645d23be16789673bbbe0d599d09452eb5c91e67913a0a79ed11f6e7e,2024-09-30T15:15:06.243000
|
||||
CVE-2024-46313,0,1,3f3dc67250f9c4539e34f729f161d47979d31807b78c8eb0a7343944c9c1b1e9,2024-09-30T19:35:07.020000
|
||||
CVE-2024-4632,0,0,1847fe54466daf978000619c24fbece5b125c2ebcf9d5cf0d1e6a4b41146457c,2024-06-20T12:44:01.637000
|
||||
CVE-2024-46327,0,0,d444c66c2d1131cacb5a6cc939ae8062aae08f60f0b531cdd6bc43039126a6e8,2024-09-30T12:46:20.237000
|
||||
CVE-2024-46328,0,0,150e1d7b5fcc22f852cb919b13410447bdf1e8cb19cb878b6bbbd7be01f4269b,2024-09-30T12:46:20.237000
|
||||
@ -260358,7 +260365,7 @@ CVE-2024-4647,0,0,abfff49b4d0bc1323cd8c136d2663c14e45b73cbc22df4c684f6d02301cae0
|
||||
CVE-2024-46470,0,0,4aeda2c990e579b9008226e62d5cbdc47a22a0fa6603152064e359fb3aa1bf47,2024-09-30T12:45:57.823000
|
||||
CVE-2024-46471,0,0,470c933b4642dc2897ace8d3fcae6cce28009d5c4dc28b3858aee18cd52a08d7,2024-09-30T12:45:57.823000
|
||||
CVE-2024-46472,0,0,905efea5ffd69a3fd22b9ebc43e76cd3335e2f2038a60c220dd9d439817a4610,2024-09-30T12:45:57.823000
|
||||
CVE-2024-46475,1,1,56090d80d32b566c9ffe130afcb40a9f7fecc3ecc44246ca40f71ba01add8623,2024-09-30T16:15:09.077000
|
||||
CVE-2024-46475,0,1,f67981ea4dc5deb130e35e5981398b3bd014da3c6f6093379b2c49fae0dcdd4f,2024-09-30T18:35:09.327000
|
||||
CVE-2024-4648,0,0,911dfdcd448576dec5371ac5fe5f3ab9d434d7a73d2296063b028e9785e0deda,2024-06-04T19:20:44.580000
|
||||
CVE-2024-46485,0,0,904850996ff0ccd2e4983d6545a4277eb41afbf1d891eac2f17d8f906616c485,2024-09-26T13:32:02.803000
|
||||
CVE-2024-46488,0,0,3defdc280bdac468f540802333e8c8fef11bc704f85948e63bbf4df7cfe91eb5,2024-09-26T13:32:02.803000
|
||||
@ -260366,14 +260373,15 @@ CVE-2024-46489,0,0,8b9d2d65fe9d89854929481ea662e27274eb10088356e47bf59cefd0f4ce4
|
||||
CVE-2024-4649,0,0,bfe7ccbfc3404b8c708ca02f740529df891f18569fdd41077ac7c5a370b61531,2024-06-04T19:20:44.677000
|
||||
CVE-2024-4650,0,0,f0fa9488793eee2640aafba918929101f3b3115e92dd694b2dacbccfd4d6c179,2024-06-04T19:20:44.773000
|
||||
CVE-2024-4651,0,0,745218d04b1207995e3df340bed9abda2dd0952b7a1b22fcaaa17a8ad8b7b0b9,2024-06-20T20:15:19.353000
|
||||
CVE-2024-46510,1,1,6abdfe7c126b009c078a8bfcc4d64c7eb099ba425b97bc9a3c640e28f248f1b6,2024-09-30T16:15:09.137000
|
||||
CVE-2024-46510,0,0,6abdfe7c126b009c078a8bfcc4d64c7eb099ba425b97bc9a3c640e28f248f1b6,2024-09-30T16:15:09.137000
|
||||
CVE-2024-46511,1,1,ff6e1b7f18254f60637752a032f6d88d2dc27bbe0b85490bb4b3df4ea1f4b0d6,2024-09-30T19:35:07.990000
|
||||
CVE-2024-4652,0,0,8fd7af949b4c89aa1e5f9f8bc7784e47292323116a1f6a56ecb880f3c410a541,2024-06-04T19:20:44.873000
|
||||
CVE-2024-4653,0,0,7b6d5c0913690c5b51d844fc9718b4208eaa5f352f244fd41eee7be1add5e3bc,2024-06-04T19:20:44.990000
|
||||
CVE-2024-4654,0,0,0088d34096b2578204ff98fe71c1f702e4c8866653411407f72fe940a56448df,2024-06-04T19:20:45.100000
|
||||
CVE-2024-46540,1,1,d3030ac836bcd05d054bb28d7b725b62e32cb022b99fb9367fb1f3bb0be6a337,2024-09-30T17:15:04.550000
|
||||
CVE-2024-46540,0,1,8c5cf694981ee98104cf81c89099ed6c6ff3c8950a58817e30ab7d3398595637,2024-09-30T18:35:10.127000
|
||||
CVE-2024-46544,0,0,7c690592f3c3aad53f638c9c118a2efde53f0542c00b3644e612a6801f3cf547,2024-09-26T13:32:55.343000
|
||||
CVE-2024-46548,1,1,2465c85909963cf2925c0161e89a81075e19a6b6256f32c4e01ee0c0066a3476,2024-09-30T17:15:04.620000
|
||||
CVE-2024-46549,1,1,41af1cd16eccad4beee1535a8a73710140e32818fbdb8e79e3ea7e1fe0d90e4d,2024-09-30T17:15:04.683000
|
||||
CVE-2024-46548,0,0,2465c85909963cf2925c0161e89a81075e19a6b6256f32c4e01ee0c0066a3476,2024-09-30T17:15:04.620000
|
||||
CVE-2024-46549,0,0,41af1cd16eccad4beee1535a8a73710140e32818fbdb8e79e3ea7e1fe0d90e4d,2024-09-30T17:15:04.683000
|
||||
CVE-2024-4655,0,0,95970f39f135367edf16c40c69bbdd98999f38726ef0802da749dedbafaa6dbb,2024-08-01T13:59:32.490000
|
||||
CVE-2024-46550,0,0,fabf02166a8c8c33c1e426eb484bdd92b929c3c43f794ca555b97f11e025fe2e,2024-09-24T16:42:25.057000
|
||||
CVE-2024-46551,0,0,7660e44e84b32e009845871d8384f85d8a68355b89c08ffdaab432d6ee39b978,2024-09-24T16:41:38.327000
|
||||
@ -260418,13 +260426,14 @@ CVE-2024-46600,0,0,cae524fca9cb69012594d951fa8090d3fe8d1cfa0f217e7dac4acb986038e
|
||||
CVE-2024-46607,0,0,19b52a4f221a81e7b0e70e694b13b9c3dc0a4fb6554fee97e54b7afadc8502a3,2024-09-26T13:32:02.803000
|
||||
CVE-2024-46609,0,0,867378c24ca26a245e4713a4ba27c2af9d0d9faadf75c67789542038576759bd,2024-09-27T16:35:03.627000
|
||||
CVE-2024-4661,0,0,f19406aac3e0e4dd229494d2c7f4a9ae6fd94c8256be755b3955222db7d3bf70,2024-06-10T02:52:08.267000
|
||||
CVE-2024-46610,0,1,dfd11b66ad880194d4e8759fea756317b6075d327e3519259cd11f18ae0f4b82,2024-09-30T16:30:50.833000
|
||||
CVE-2024-46610,0,0,dfd11b66ad880194d4e8759fea756317b6075d327e3519259cd11f18ae0f4b82,2024-09-30T16:30:50.833000
|
||||
CVE-2024-46612,0,0,a589f709811c7445ac7df28a3a7782b0e1ab03ae28a72339e484d8d02cc7d048,2024-09-26T13:32:02.803000
|
||||
CVE-2024-4662,0,0,42d3ec88d759fc9bf88fc92972e0c9891830916b90a0cdbb0331ad5486f420dd,2024-05-24T01:15:30.977000
|
||||
CVE-2024-46627,0,0,4cc8890cea4e8322a4c476b42c8fefe2b4b66b62a78446cc66eb2d1a373670f4,2024-09-30T12:46:20.237000
|
||||
CVE-2024-46628,0,0,f50f1f0723583928f80e0fb1e30a1b830ba848791b571a0759dc9426674fa140,2024-09-30T12:46:20.237000
|
||||
CVE-2024-4663,0,0,26abfae0d13c9db7079b41941554710f5ceae1c12961c27d4c50148758e145c4,2024-06-20T12:44:01.637000
|
||||
CVE-2024-46632,0,0,abc659def740354695cf2f3df5ac488f8137388dc197ea59e5551153368ce0a9,2024-09-30T12:46:20.237000
|
||||
CVE-2024-46635,1,1,f6d3e92a87667c9cbc9a047021a4fe2e9670f4e99e6cf851716f2f7d6e874275,2024-09-30T18:15:06.140000
|
||||
CVE-2024-46639,0,0,32a1c80f017ce1b9b0a593e635fc1fe3b0612fc660594feed34360cf471ca787,2024-09-26T13:32:55.343000
|
||||
CVE-2024-4664,0,0,b622a884dca6c94dd91f571bd68ec3e5e60df69c2ec441187a6010b0dbb54f4f,2024-08-01T13:59:32.680000
|
||||
CVE-2024-46640,0,0,8a8901a45f157bc967024a42c670214bc1166786f3fd7086e031ee10a8d6de95,2024-09-26T13:32:55.343000
|
||||
@ -260655,7 +260664,7 @@ CVE-2024-46865,0,0,8856d943e6bac6edc1b8d17f62726a44dfd3a608905c22f05a95decb6da14
|
||||
CVE-2024-46866,0,0,9afa3f840fa224a8243f9e6c9f3cb7c513f5e2bd8db2e5b5ae7d4067e3271b3f,2024-09-30T12:45:57.823000
|
||||
CVE-2024-46867,0,0,8f4325a0424e9ac315599a33ba37a3c1e3df59d8b3fbc4ee7e2c9328a49864d8,2024-09-30T12:45:57.823000
|
||||
CVE-2024-46868,0,0,be6540b29e2e0469ebbcc0580d7ac6de7ea0bd656303fcfd4e016c141e820839,2024-09-30T12:45:57.823000
|
||||
CVE-2024-46869,1,1,03d54fbfb222832637d46c224483567d901deab6b48b3da7bb6d708e19c51eeb,2024-09-30T16:15:09.200000
|
||||
CVE-2024-46869,0,0,03d54fbfb222832637d46c224483567d901deab6b48b3da7bb6d708e19c51eeb,2024-09-30T16:15:09.200000
|
||||
CVE-2024-4687,0,0,5435981fd840e586246d5a6c7c954862d5332569f9e647b4965c896a6669b062,2024-06-04T19:20:46.547000
|
||||
CVE-2024-4688,0,0,52289ed8c0286442cd44c00a18386eec964a66f3ff263d13f6b3a47ad78257b2,2024-06-20T20:15:19.617000
|
||||
CVE-2024-4689,0,0,a13cc88d2e9b12d452cf9b42ce57cc1735d851f3f551a07c40e7bb0f2ee113b8,2024-05-14T16:11:39.510000
|
||||
@ -260714,9 +260723,9 @@ CVE-2024-47061,0,0,fe88cb5968145d279da6e4fd6edb09ab3be3c5c5915bf3eb5f15f2dbcdbe9
|
||||
CVE-2024-47062,0,0,c88a3c374fa0eb0b07de5442f40e8a296375128149eedfb948b94e624d4304ec,2024-09-26T13:32:55.343000
|
||||
CVE-2024-47063,0,0,7ef913b0f52a2c2f87c249824365da21f4a376160b0cd1f651073f68cbfd7c45,2024-09-30T15:15:06.293000
|
||||
CVE-2024-47064,0,0,d1c3eb2fa5975d04e490b431693cbf36aea89455eac14f0c7de0287dd6e627a6,2024-09-30T15:15:06.413000
|
||||
CVE-2024-47066,0,0,c938aa14b4956e02dcf0b434c18945502d356432c94e760748910c81591de152,2024-09-26T13:32:55.343000
|
||||
CVE-2024-47067,1,1,0dcb8143eaf9fe25cf20fec1e5fc4df69090a1c1c753c53eb9903fc3acec268a,2024-09-30T16:15:09.267000
|
||||
CVE-2024-47068,0,1,70050872d840caaa2d3a7b4935edacfa0f683641a39a86ef80c1feff7746bbfc,2024-09-30T17:39:45.350000
|
||||
CVE-2024-47066,0,1,0b43b85d84d6edf2581c4495657e290f15385b4237a6d0903f4ed36005e8e711,2024-09-30T18:03:58.750000
|
||||
CVE-2024-47067,0,0,0dcb8143eaf9fe25cf20fec1e5fc4df69090a1c1c753c53eb9903fc3acec268a,2024-09-30T16:15:09.267000
|
||||
CVE-2024-47068,0,0,70050872d840caaa2d3a7b4935edacfa0f683641a39a86ef80c1feff7746bbfc,2024-09-30T17:39:45.350000
|
||||
CVE-2024-47069,0,0,255d89cbb652b594a7eefdca5524a576b519375e297f09c89870c40566f1ba4a,2024-09-30T13:40:36.460000
|
||||
CVE-2024-4707,0,0,8435cc27f87132831b9d3f5ec9dd9fe3cf2e85b8b55db14f2e03c7e1023e49fc,2024-07-24T17:59:29.230000
|
||||
CVE-2024-47070,0,0,eb4e046cb0db7f50fe7115a81e47e9b3e2a8d6720f2cc6fa65783765e5390106,2024-09-30T12:45:57.823000
|
||||
@ -260763,7 +260772,7 @@ CVE-2024-47174,0,0,45d61976806e6f261b6617173dfdd81cff9ff5aea1e4ed00e3593fe1fbbae
|
||||
CVE-2024-47175,0,0,98b0f302dda13c9ca08be74248115e033049a678f05ea7e4015fd75a9b0cd66d,2024-09-30T12:46:20.237000
|
||||
CVE-2024-47176,0,0,27547436bf8c76fe92f2f835eaacfc443553990b4bb1849aa668400451f9d2cb,2024-09-30T12:46:20.237000
|
||||
CVE-2024-47177,0,0,c3d1fff6e6c651906b3b7b3db7e611572822f47ef60858bd0aa18bbf89a3315d,2024-09-30T12:46:20.237000
|
||||
CVE-2024-47178,1,1,e086418bd8207ac1a043b6e2c4d1942cea388c2446c3e78167e76f3ecaedee55,2024-09-30T16:15:09.410000
|
||||
CVE-2024-47178,0,0,e086418bd8207ac1a043b6e2c4d1942cea388c2446c3e78167e76f3ecaedee55,2024-09-30T16:15:09.410000
|
||||
CVE-2024-47179,0,0,f556f6c034532f0e7809bac52c7041c445d298cb44c326963214d4d05cb55a7e,2024-09-30T12:46:20.237000
|
||||
CVE-2024-4718,0,0,2fda56f630ea417950b3260007ed553b407a44c514b05be289e283a21ee915c1,2024-06-06T20:15:14.717000
|
||||
CVE-2024-47180,0,0,657c5516ab8b6145e58c8aac2b3c60b2287f164333060e376b2fc3a8acbd6fb3,2024-09-30T12:46:20.237000
|
||||
@ -260799,7 +260808,7 @@ CVE-2024-4730,0,0,055c30f8bd03259d264f17e44955582c75615e93d958180e12436700bac392
|
||||
CVE-2024-47303,0,0,4fd81bf971579cf0e00271b5e072c908021bfefdc76c11f84286ad7788e9cb34,2024-09-26T13:32:02.803000
|
||||
CVE-2024-47305,0,0,2c8f799a296592421ee25aa9899e311f2f61ad0eb53c72b4da9231822f1148ec,2024-09-26T13:32:02.803000
|
||||
CVE-2024-4731,0,0,ff0f4697afac2eb26d16b700c40cb0a3947b6039ec9b762c8c08a8e49bc998ce,2024-06-04T19:20:48.130000
|
||||
CVE-2024-47315,0,0,a868b9b83ef3c5c99d6950501dbe148a11d95f58a6c8007673b548222a36578c,2024-09-26T13:32:02.803000
|
||||
CVE-2024-47315,0,1,f8fc8e04ef461f394697878d14c77fa20555585c6db931561c38f9edd4a9ab5c,2024-09-30T18:06:36.060000
|
||||
CVE-2024-4732,0,0,2f9d1622a74bcf5d144d47d69a297d840c0353e903036f272ef15e7560aa5dbf,2024-06-04T19:20:48.237000
|
||||
CVE-2024-4733,0,0,bab73609d3aaa55dacedcdd69b9c9d83fbc709adf98853b3adb423b13daf2498,2024-05-17T18:36:31.297000
|
||||
CVE-2024-47330,0,0,a0e4c848573d9b135f4e2651c83b6b523e8c5bd0ca01b687162a3441017ae278,2024-09-26T13:32:02.803000
|
||||
@ -260821,10 +260830,10 @@ CVE-2024-4750,0,0,e7d885dbb56d4f9fc74f5666b8e26860ce8baddd6593d5428816201f1663fb
|
||||
CVE-2024-4751,0,0,258479d9744cea39d1125b819c638c567793396e05305e64bbc0e320bde2cbf7,2024-08-09T19:35:10.473000
|
||||
CVE-2024-4752,0,0,6bc9a9ea56288a6bdc9797f778ecc1371bb94f8257819cae6e07cdc5634a3ca3,2024-08-01T13:59:33.713000
|
||||
CVE-2024-4753,0,0,9e12d2c068502550c7c14176439a96816e2b604b1703bdae766fcb5d094be144,2024-08-01T13:59:33.903000
|
||||
CVE-2024-47530,1,1,fba522e024b83acf70358c93acf37e114887d5fe3a476a11c9462eadc0b44e72,2024-09-30T16:15:09.540000
|
||||
CVE-2024-47531,1,1,33301edab0f0649702484b01110937da183dc72540869ebdc9cdc877c211a23a,2024-09-30T16:15:09.750000
|
||||
CVE-2024-47532,1,1,260108fc45e8ac31160035cc2b3e7ed0f7f45e8ba1661343699d85f76bbe06fa,2024-09-30T16:15:09.960000
|
||||
CVE-2024-47536,1,1,6e4acb61d2da8d00872363d19c0ef06b941da325b5d169aae3bc2073325756a6,2024-09-30T17:15:04.780000
|
||||
CVE-2024-47530,0,0,fba522e024b83acf70358c93acf37e114887d5fe3a476a11c9462eadc0b44e72,2024-09-30T16:15:09.540000
|
||||
CVE-2024-47531,0,0,33301edab0f0649702484b01110937da183dc72540869ebdc9cdc877c211a23a,2024-09-30T16:15:09.750000
|
||||
CVE-2024-47532,0,0,260108fc45e8ac31160035cc2b3e7ed0f7f45e8ba1661343699d85f76bbe06fa,2024-09-30T16:15:09.960000
|
||||
CVE-2024-47536,0,0,6e4acb61d2da8d00872363d19c0ef06b941da325b5d169aae3bc2073325756a6,2024-09-30T17:15:04.780000
|
||||
CVE-2024-4754,0,0,43efa3a5287d05b500ecfcf4503ad62e1b41a22939150352bf102c1b98a3511a,2024-06-24T12:57:36.513000
|
||||
CVE-2024-4755,0,0,ca5306e45de4985a027d64d4740785092288eb6abbd1ab6d1fda3377d88d4e7e,2024-07-03T02:08:01.477000
|
||||
CVE-2024-4756,0,0,56f5675f964fc18dbd2235a67dc0431c0553314b21f097091d5942b6bc7c2044,2024-08-01T13:59:34.090000
|
||||
@ -262374,7 +262383,7 @@ CVE-2024-6536,0,0,db3a8f54349ce01fbebd842277117fe6b2369b9af6752930ef3e5c8ea43f79
|
||||
CVE-2024-6539,0,0,81a7a773476044a536e1904849aff55df114add8144e8265b917f8120b92d867,2024-07-11T14:56:20.733000
|
||||
CVE-2024-6540,0,0,f13af52637070826766869c9a967d13110a057955f51f107eb0d0f88b4032338,2024-07-16T18:05:37.267000
|
||||
CVE-2024-6542,0,0,bb318408eda9e57d4fba1c49251ffc615a87c88f77b6516a9b3efcf954de0990,2024-08-14T16:32:34.753000
|
||||
CVE-2024-6544,0,0,45f53c801f5be057304526bfa46ae491276bb3854816f041adef1411f73b7edd,2024-09-13T16:37:22.997000
|
||||
CVE-2024-6544,0,1,f2d528dbebd493bcdc2fe876e00362b1a02a24265861d0f9bfcbede100bb600f,2024-09-30T19:12:09.007000
|
||||
CVE-2024-6545,0,0,97ee5e13519e722f4006d1598ff8b5d6e2e4cb7552f463abeca3e656c343e880,2024-07-29T14:12:08.783000
|
||||
CVE-2024-6546,0,0,0eee46a34ab9f84036d2fbded3a46124e4089d04296fa0288f2cdad15177d72e,2024-07-29T14:12:08.783000
|
||||
CVE-2024-6547,0,0,18c84e0486ad4b936dd6fb72fb2fdab2178f5a996a76eecb6a226aad2d913b31,2024-07-29T14:12:08.783000
|
||||
@ -262575,8 +262584,8 @@ CVE-2024-6781,0,0,678fc4d6db3dccbbb40576923dc15e296dd0a3cca23bbb526dd93d0dbc8a0c
|
||||
CVE-2024-6782,0,0,623508ea52e56d6a6e227168366ca2cd7770a1a0850e95e080f5f12fc915b728,2024-08-06T16:30:24.547000
|
||||
CVE-2024-6783,0,0,6f1f4a0fa578d50da4a4853fdfd24c63ba19a8604300ab142edf0f6cb8d9a812,2024-08-30T15:15:18.623000
|
||||
CVE-2024-6785,0,0,ef25cfd9dd9fb398c181c2e2c1a44a7dbc0dc59353d1fa28c2cc7cafe3b60589,2024-09-27T18:59:25.253000
|
||||
CVE-2024-6786,0,0,3493add59ea41909363960472a7490ce43155eacf299d4a14021628fbd24ac57,2024-09-26T13:32:55.343000
|
||||
CVE-2024-6787,0,0,069c45bc91f1142aab5002ae41cf01ce3d1f7f8ba9e8ff23b9c4e02064c4ad40,2024-09-26T13:32:55.343000
|
||||
CVE-2024-6786,0,1,98f21ab09b2a01cca281fda0397f483af3ef0c01a5476e213ec4980c9cfa3d20,2024-09-30T18:31:50.473000
|
||||
CVE-2024-6787,0,1,f69f9a07cfd39832fdc2962e9d288436b728db50eb29cb7ded1838c3808a88b2,2024-09-30T18:02:51.080000
|
||||
CVE-2024-6788,0,0,369ef896034f113597a96208fca075acd0c3bdd5e82bf3987939f5fd20470069,2024-08-13T17:11:53.553000
|
||||
CVE-2024-6789,0,0,e33e978edc987b98e576665a6bdb79eb993fb5854279dc068f6ea120541693df,2024-09-16T07:15:03.877000
|
||||
CVE-2024-6791,0,0,6ce79f46aa2ab35d9212f59a5703ed0b8f9ce029cc93e4591d5b48478ec576f2,2024-09-17T14:44:39.387000
|
||||
@ -262586,7 +262595,7 @@ CVE-2024-6794,0,0,ad94acaa214038da0f1d2d9a411a4c1c4e53e8ac05cf5953ca0eb0b2970fe6
|
||||
CVE-2024-6795,0,0,43a9755eea89cb70653f5bb3a7b4b270588a1e76e27a27f3976e0e66d5198a2a,2024-09-20T14:53:15.217000
|
||||
CVE-2024-6796,0,0,ea450aaa268d6c6930fa47bff0f10e52dfa43850b94210c20818c6bdcee5cec7,2024-09-20T14:53:11.447000
|
||||
CVE-2024-6799,0,0,39536c19a9ca2d6262efda14a231fbf09108e28ad2b189e8ce4347991001df6e,2024-09-10T15:05:48.583000
|
||||
CVE-2024-6800,0,0,a5d8346745f242933d21fbed086500bc35ec95f2fa2f5715ca5593178025d7b8,2024-08-22T15:15:17.127000
|
||||
CVE-2024-6800,0,1,b0ac3d09606c05fe58c46a909539ce33c78722986ee076b3e1895bc57cb44aa0,2024-09-30T19:14:50.430000
|
||||
CVE-2024-6801,0,0,6cf94e1980aea6fcc25b038d583cb2250e04ba4c9461d4d907e1f9ce16b1e09a,2024-07-19T14:55:25.753000
|
||||
CVE-2024-6802,0,0,41c45597ef2d2991d0ff5de1c94d34d596167540846175036f3a8eca13168f84,2024-08-26T05:15:05.980000
|
||||
CVE-2024-6803,0,0,e77960f60e5c3ea5b22b60c53aac93b8bf6ffc93dd5f015dabaabc8b5a77736e,2024-07-19T15:01:50.250000
|
||||
@ -262888,7 +262897,7 @@ CVE-2024-7202,0,0,cd873862dd9c581add7def3fb09e4d862139cb04eed28a9bf2f7047259aa2b
|
||||
CVE-2024-7203,0,0,9623065bb1076b933803b0136efc271bca239649fdbd7e41cb52d273c630ecf2,2024-09-05T14:33:17.567000
|
||||
CVE-2024-7204,0,0,1bfd5eea41034a87a8406d1df422953de68b7d6759dfb1054c8215461bee3314,2024-09-11T14:23:45.127000
|
||||
CVE-2024-7205,0,0,f8b1cbec46ea51b223aac866d1ac39ee6fa7b6e832e6e62020df5a45e4b00643,2024-07-31T15:15:10.993000
|
||||
CVE-2024-7207,0,0,7d162a46bdd86c9ef89d18404bf5c26cb639ca8d9bf2e70cc4f9daf2fa9be1a1,2024-09-25T17:51:34.800000
|
||||
CVE-2024-7207,0,1,685939e6da39eea18941ae363d793c2135cdd34b1de02f3365cc55972f116f83,2024-09-30T19:15:04.540000
|
||||
CVE-2024-7208,0,0,23976b9c97cfc390397ceda1fa9cd6b5d178a3b311c11fb9c9f129febf7d4e73,2024-08-02T15:16:37.420000
|
||||
CVE-2024-7209,0,0,70d88ede2ff174d67b44db29b9d64c217e00f13cf62689936f75e53f7397ee7a,2024-07-31T12:57:02.300000
|
||||
CVE-2024-7211,0,0,92a84d32183c8fcd0c3fcd4c786a37ad4d038da054671ef7ebf12a51168571d0,2024-09-06T13:23:07.237000
|
||||
@ -263040,7 +263049,7 @@ CVE-2024-7394,0,0,311dd8d09f289dca72e294063b3121b4c7fd832b8fb4e9134c8457f94c79d2
|
||||
CVE-2024-7395,0,0,6b93b6db07480e26c0ae715f45aa50cef676fc9c19ea641f155805eb4429ff3f,2024-08-06T16:31:05.780000
|
||||
CVE-2024-7396,0,0,4ebde91c8a3429e260812e0a142900e161f2137833db297002231fa5cfafb30a,2024-08-06T16:31:05.780000
|
||||
CVE-2024-7397,0,0,6d2f711820d3e2f3c7573fc7d4d971b3f755ab6406b8b6440f8e39ce24e2f3e7,2024-08-06T16:31:05.780000
|
||||
CVE-2024-7398,0,1,4bceec8e4e1ae5d86e69945d7f8f61d9ec5b7ac80a4cf5b22e0ebbed49985083,2024-09-30T16:12:24.337000
|
||||
CVE-2024-7398,0,0,4bceec8e4e1ae5d86e69945d7f8f61d9ec5b7ac80a4cf5b22e0ebbed49985083,2024-09-30T16:12:24.337000
|
||||
CVE-2024-7399,0,0,94de8cab81b119f815fa73c008811f38562f3609d3da13634aecbd720ea861e6,2024-08-13T15:30:52.337000
|
||||
CVE-2024-7400,0,0,880bea0e2ff4ceadacbe376968f4ebe20bb468fa58e2ed97aa47316bc459f45c,2024-09-30T12:46:20.237000
|
||||
CVE-2024-7401,0,0,43ffed7b6ca165f2a0da7944b4e4cef6faa3da0b6dbd419986732fe262f21587,2024-09-05T18:34:17.433000
|
||||
@ -263051,7 +263060,7 @@ CVE-2024-7411,0,0,233fe970a370850f5b652951fe7b5f603c4b4a66cd3c44f0b67dc9d466e327
|
||||
CVE-2024-7412,0,0,b7efc7f691385d07c16b9c98953749b4113f5c7d6e2cc5e240ac710642b7a973,2024-08-12T13:41:36.517000
|
||||
CVE-2024-7413,0,0,cc9a3132dbf30c713a640687e195177085da2f3a67f589d16f765a82cdaabb61,2024-08-12T13:41:36.517000
|
||||
CVE-2024-7414,0,0,ec5a655568a866725caccc407e481351f1a5df496455996ee3102ef3dac59f70,2024-08-12T13:41:36.517000
|
||||
CVE-2024-7415,0,1,4f3e91f02c270ceca383c924b673a911f19c76918de0da2e60f23a61a9c60f70,2024-09-30T17:46:46.473000
|
||||
CVE-2024-7415,0,0,4f3e91f02c270ceca383c924b673a911f19c76918de0da2e60f23a61a9c60f70,2024-09-30T17:46:46.473000
|
||||
CVE-2024-7416,0,0,67a9ab6c88d18462429964f1183d705aa9fe2b8f49f4e7e013c20651e7dbf059,2024-08-12T13:41:36.517000
|
||||
CVE-2024-7418,0,0,6785004d3e0c8a7d4acd7be47cb26ee53d058e1a0fbb989539468dc8c9c8a1ec,2024-08-29T13:25:27.537000
|
||||
CVE-2024-7420,0,0,307d2beb05daeaa977b791b65696d33894a9f28a7ba08d0caa6a110cc77dc054,2024-09-13T14:45:43.513000
|
||||
@ -264019,8 +264028,8 @@ CVE-2024-8919,0,0,e01b61fd584c4fffdfd8e5db7a09e1be1033f5c7df5b5418d10948726a2bc5
|
||||
CVE-2024-8922,0,0,20529fa1692fa50986ba215b54fa6394828d24b19e91b98ecf8bcc0f353de572,2024-09-30T12:46:20.237000
|
||||
CVE-2024-8939,0,0,1f70befe339fdb31af424859012581aeb13e8f518e2f8da7bf31e05da17f11bc,2024-09-20T12:30:51.220000
|
||||
CVE-2024-8940,0,0,881a745a1b77233fe3ad09218f06df01a2061a4c2e5cfa2c2a81ed440bf13f5f,2024-09-26T13:32:02.803000
|
||||
CVE-2024-8941,0,0,5a23216cd953abba28d73d2932ca5626321bd4676456d325dae99c04345ab028,2024-09-26T13:32:02.803000
|
||||
CVE-2024-8942,0,1,856856bd14b58b19668f9a36b8a793262f5091e96c724b4e90a8dd630a5aaf77,2024-09-30T17:39:28.417000
|
||||
CVE-2024-8941,0,1,92a203d8a6a94e9c82aca27b5b4eb25cc17b0659508e43ff25edbb70a0d6f393,2024-09-30T19:45:43.223000
|
||||
CVE-2024-8942,0,0,856856bd14b58b19668f9a36b8a793262f5091e96c724b4e90a8dd630a5aaf77,2024-09-30T17:39:28.417000
|
||||
CVE-2024-8944,0,0,163e8bd42c52d6cb1f3f0fdfff8b3db24acfd0dba8d50b29b1780d64b55bd42a,2024-09-23T16:56:34.637000
|
||||
CVE-2024-8945,0,0,89d4e06764ee27ae462e66a2c760956f13440d7833b3b8093e505b1c71a9aac5,2024-09-25T19:24:25.167000
|
||||
CVE-2024-8946,0,0,0afc0efb5414dac2f435cdc08456c904eb9a65ac4dd275170da7c9549741129d,2024-09-24T13:11:17.417000
|
||||
@ -264104,9 +264113,9 @@ CVE-2024-9130,0,0,5bd25b655f8e7a913dbf125185040ed90a768cc24bf73a5555fb1985c6ebc2
|
||||
CVE-2024-9136,0,0,3a2123a7313620918321ccc10071ef5907ddec267af09127e6959a072bce8ae3,2024-09-30T12:45:57.823000
|
||||
CVE-2024-9141,0,0,1186d93c71ba2b76e7029b0455d3828535e51a6f22b721a65c3963a052cae512,2024-09-26T13:32:02.803000
|
||||
CVE-2024-9142,0,0,f41ad411b11065ca581c6c09a7cdbabb7231f7d077f84444580389a46c43e76b,2024-09-26T13:32:02.803000
|
||||
CVE-2024-9148,0,1,54e87e3f2b6f69d5080b11c080fcfce17264899c6147cd6032f168b6e8923e92,2024-09-30T17:34:12.760000
|
||||
CVE-2024-9148,0,0,54e87e3f2b6f69d5080b11c080fcfce17264899c6147cd6032f168b6e8923e92,2024-09-30T17:34:12.760000
|
||||
CVE-2024-9155,0,0,e7852dec1d1a0cf6fb02c65df23cf83432ff26399350f16bb6b49f28f4d3005e,2024-09-30T12:46:20.237000
|
||||
CVE-2024-9158,1,1,409612c4b8cb4a3f347d3e6118bf18cfe60f695c2a9fbb2e38a16b5a656c0709,2024-09-30T17:15:05.407000
|
||||
CVE-2024-9158,0,0,409612c4b8cb4a3f347d3e6118bf18cfe60f695c2a9fbb2e38a16b5a656c0709,2024-09-30T17:15:05.407000
|
||||
CVE-2024-9160,0,0,dcb08097a2707d90887b21cc5ab80eb6cf86ff84abb571a9a69f82310c298b71,2024-09-30T12:45:57.823000
|
||||
CVE-2024-9166,0,0,b24f9ebc4650fb7d123f858805d8b1a753ef6a732064f8b14cd979bccf2c240a,2024-09-30T12:46:20.237000
|
||||
CVE-2024-9169,0,0,3e58e76dfb6d40928d7a81777e9f17fdbdc857f6ee99a9600a6d563079322d8f,2024-09-26T13:32:02.803000
|
||||
|
Can't render this file because it is too large.
|
Loading…
x
Reference in New Issue
Block a user