mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-06-19 17:31:42 +00:00
Auto-Update: 2024-09-19T22:00:17.364624+00:00
This commit is contained in:
parent
1aa41e63c7
commit
f404356210
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2022-46869",
|
||||
"sourceIdentifier": "security@acronis.com",
|
||||
"published": "2023-08-31T20:15:08.027",
|
||||
"lastModified": "2023-09-07T14:25:24.507",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2024-09-19T21:15:12.977",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -63,22 +63,22 @@
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"source": "security@acronis.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-59"
|
||||
"value": "CWE-610"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "security@acronis.com",
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-269"
|
||||
"value": "CWE-59"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-21839",
|
||||
"sourceIdentifier": "secalert_us@oracle.com",
|
||||
"published": "2023-01-18T00:15:13.450",
|
||||
"lastModified": "2024-09-17T14:35:05.467",
|
||||
"vulnStatus": "Modified",
|
||||
"lastModified": "2024-09-19T20:10:55.523",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"cisaExploitAdd": "2023-05-01",
|
||||
"cisaActionDue": "2023-05-22",
|
||||
@ -50,7 +50,7 @@
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "NVD-CWE-noinfo"
|
||||
"value": "CWE-502"
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-26237",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-10-05T01:15:10.187",
|
||||
"lastModified": "2023-10-11T14:00:07.037",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2024-09-19T21:35:02.027",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -36,6 +36,26 @@
|
||||
},
|
||||
"exploitabilityScore": 0.8,
|
||||
"impactScore": 5.9
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "HIGH",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 6.7,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 0.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -49,6 +69,16 @@
|
||||
"value": "CWE-639"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-639"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
|
@ -2,13 +2,13 @@
|
||||
"id": "CVE-2023-28600",
|
||||
"sourceIdentifier": "security@zoom.us",
|
||||
"published": "2023-06-13T18:15:21.533",
|
||||
"lastModified": "2023-06-21T20:52:50.547",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2024-09-19T20:15:04.277",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Zoom for MacOSclients prior to 5.14.0 contain an improper access control vulnerability. A malicious user may be able to delete/replace Zoom Client files potentially causing a loss of integrity and availability to the Zoom Client.\n\n"
|
||||
"value": "Zoom for MacOSclients prior to 5.14.0 contain an improper access control vulnerability. A malicious user may be able to delete/replace Zoom Client files potentially causing a loss of integrity and availability to the Zoom Client."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
@ -72,7 +72,7 @@
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-284"
|
||||
"value": "CWE-378"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-28601",
|
||||
"sourceIdentifier": "security@zoom.us",
|
||||
"published": "2023-06-13T18:15:21.613",
|
||||
"lastModified": "2023-06-21T20:53:18.250",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2024-09-19T20:15:04.560",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -72,7 +72,7 @@
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-119"
|
||||
"value": "CWE-358"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-28603",
|
||||
"sourceIdentifier": "security@zoom.us",
|
||||
"published": "2023-06-13T18:15:21.760",
|
||||
"lastModified": "2023-06-21T20:53:55.603",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2024-09-19T20:15:04.730",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -72,7 +72,7 @@
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-284"
|
||||
"value": "CWE-73"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -2,13 +2,13 @@
|
||||
"id": "CVE-2023-34116",
|
||||
"sourceIdentifier": "security@zoom.us",
|
||||
"published": "2023-07-11T17:15:13.097",
|
||||
"lastModified": "2023-07-18T21:08:43.267",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2024-09-19T20:15:05.063",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Improper input validation in the Zoom Desktop Client for Windows before version 5.15.0 may allow an unauthorized user to enable an escalation of privilege via network access.\n"
|
||||
"value": "Improper input validation in the Zoom Desktop Client for Windows before version 5.15.0 may allow an unauthorized user to enable an escalation of privilege via network access."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
@ -72,7 +72,7 @@
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-20"
|
||||
"value": "CWE-78"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -2,13 +2,13 @@
|
||||
"id": "CVE-2023-34118",
|
||||
"sourceIdentifier": "security@zoom.us",
|
||||
"published": "2023-07-11T18:15:16.300",
|
||||
"lastModified": "2023-07-19T00:47:57.243",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2024-09-19T20:15:05.193",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Improper privilege management in Zoom Rooms for Windows before version 5.14.5 may allow an authenticated user to enable an escalation of privilege via local access.\n"
|
||||
"value": "Improper privilege management in Zoom Rooms for Windows before version 5.14.5 may allow an authenticated user to enable an escalation of privilege via local access."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
@ -72,7 +72,7 @@
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-269"
|
||||
"value": "CWE-250"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -2,13 +2,13 @@
|
||||
"id": "CVE-2023-34119",
|
||||
"sourceIdentifier": "security@zoom.us",
|
||||
"published": "2023-07-11T18:15:16.363",
|
||||
"lastModified": "2023-07-19T00:47:47.307",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2024-09-19T20:15:05.337",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": " Insecure temporary file in the installer for Zoom Rooms for Windows\u00a0before version 5.15.0 may allow an authenticated user to enable an escalation of privilege via local access.\n"
|
||||
"value": "Insecure temporary file in the installer for Zoom Rooms for Windows\u00a0before version 5.15.0 may allow an authenticated user to enable an escalation of privilege via local access."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
@ -72,7 +72,7 @@
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-377"
|
||||
"value": "CWE-426"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -2,13 +2,13 @@
|
||||
"id": "CVE-2023-34120",
|
||||
"sourceIdentifier": "security@zoom.us",
|
||||
"published": "2023-06-13T18:15:21.913",
|
||||
"lastModified": "2023-06-21T20:54:35.730",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2024-09-19T20:15:05.440",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": " Improper privilege management in Zoom for Windows, Zoom Rooms for Windows, and Zoom VDI for Windows clients before 5.14.0 may allow an authenticated user to potentially enable an escalation of privilege via local access. Users may potentially utilize higher level system privileges maintained by the Zoom client to spawn processes with escalated privileges."
|
||||
"value": "Improper privilege management in Zoom for Windows, Zoom Rooms for Windows, and Zoom VDI for Windows clients before 5.14.0 may allow an authenticated user to potentially enable an escalation of privilege via local access. Users may potentially utilize higher level system privileges maintained by the Zoom client to spawn processes with escalated privileges."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
@ -72,7 +72,7 @@
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-269"
|
||||
"value": "CWE-347"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -2,13 +2,13 @@
|
||||
"id": "CVE-2023-34121",
|
||||
"sourceIdentifier": "security@zoom.us",
|
||||
"published": "2023-06-13T18:15:21.987",
|
||||
"lastModified": "2023-06-21T20:54:52.100",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2024-09-19T20:15:05.570",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": " Improper input validation in the Zoom for Windows, Zoom Rooms, Zoom VDI Windows Meeting clients before 5.14.0 may allow an authenticated user to potentially enable an escalation of privilege via network access."
|
||||
"value": "Improper input validation in the Zoom for Windows, Zoom Rooms, Zoom VDI Windows Meeting clients before 5.14.0 may allow an authenticated user to potentially enable an escalation of privilege via network access."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
@ -72,7 +72,7 @@
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-20"
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-36533",
|
||||
"sourceIdentifier": "security@zoom.us",
|
||||
"published": "2023-08-08T18:15:14.037",
|
||||
"lastModified": "2023-08-11T13:42:42.633",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2024-09-19T20:15:05.733",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -76,7 +76,7 @@
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-400"
|
||||
"value": "CWE-772"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -2,13 +2,13 @@
|
||||
"id": "CVE-2023-36537",
|
||||
"sourceIdentifier": "security@zoom.us",
|
||||
"published": "2023-07-11T18:15:20.307",
|
||||
"lastModified": "2023-07-19T00:25:25.517",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2024-09-19T20:15:05.913",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": " Improper privilege management in Zoom Rooms for Windows before version 5.14.5 may allow an authenticated user to enable an escalation of privilege via local access.\n"
|
||||
"value": "Improper privilege management in Zoom Rooms for Windows before version 5.14.5 may allow an authenticated user to enable an escalation of privilege via local access."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
@ -72,7 +72,7 @@
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-269"
|
||||
"value": "CWE-354"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-40920",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-10-05T20:15:13.013",
|
||||
"lastModified": "2023-10-11T17:26:13.903",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2024-09-19T21:35:03.493",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -36,6 +36,26 @@
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -49,6 +69,16 @@
|
||||
"value": "CWE-89"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-89"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-43269",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-10-05T22:15:12.180",
|
||||
"lastModified": "2023-10-13T15:03:11.810",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2024-09-19T20:35:11.050",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -36,6 +36,26 @@
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -49,6 +69,16 @@
|
||||
"value": "CWE-434"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-434"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2023-43284",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-10-05T20:15:13.117",
|
||||
"lastModified": "2023-11-22T15:15:09.303",
|
||||
"lastModified": "2024-09-19T20:35:11.857",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -36,6 +36,26 @@
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 5.9
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 8.8,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-43981",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-10-05T20:15:13.200",
|
||||
"lastModified": "2023-10-07T02:52:59.353",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2024-09-19T20:35:12.393",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -36,6 +36,26 @@
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -49,6 +69,16 @@
|
||||
"value": "CWE-502"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-502"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-44828",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-10-05T16:15:11.550",
|
||||
"lastModified": "2023-10-07T03:15:05.237",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2024-09-19T20:35:14.000",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -36,6 +36,26 @@
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 3.6
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 7.5,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -49,6 +69,16 @@
|
||||
"value": "CWE-120"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-120"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-44829",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-10-05T16:15:11.610",
|
||||
"lastModified": "2023-10-07T03:15:25.163",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2024-09-19T20:35:14.773",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -36,6 +36,26 @@
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 3.6
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 7.5,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -49,6 +69,16 @@
|
||||
"value": "CWE-120"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-120"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-44830",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-10-05T16:15:11.657",
|
||||
"lastModified": "2023-10-07T03:18:38.277",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2024-09-19T20:35:15.623",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -36,6 +36,26 @@
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 3.6
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 7.5,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -49,6 +69,16 @@
|
||||
"value": "CWE-120"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-120"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-44831",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-10-05T16:15:11.700",
|
||||
"lastModified": "2023-10-07T03:16:56.033",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2024-09-19T20:35:16.490",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -36,6 +36,26 @@
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 3.6
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 7.5,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -49,6 +69,16 @@
|
||||
"value": "CWE-120"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-120"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-44832",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-10-05T16:15:11.753",
|
||||
"lastModified": "2023-10-07T03:15:46.517",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2024-09-19T20:35:17.307",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -36,6 +36,26 @@
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 3.6
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 7.5,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -49,6 +69,16 @@
|
||||
"value": "CWE-120"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-120"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-4582",
|
||||
"sourceIdentifier": "security@mozilla.org",
|
||||
"published": "2023-09-11T09:15:09.617",
|
||||
"lastModified": "2023-09-14T03:52:38.367",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2024-09-19T20:35:19.947",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -36,6 +36,26 @@
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 5.9
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 8.8,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -49,6 +69,16 @@
|
||||
"value": "CWE-120"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-120"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-4583",
|
||||
"sourceIdentifier": "security@mozilla.org",
|
||||
"published": "2023-09-11T09:15:09.680",
|
||||
"lastModified": "2023-09-14T03:52:30.463",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2024-09-19T20:35:20.763",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -36,6 +36,26 @@
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 3.6
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 7.5,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -49,6 +69,16 @@
|
||||
"value": "NVD-CWE-noinfo"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-754"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
|
@ -2,13 +2,13 @@
|
||||
"id": "CVE-2023-46380",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-11-04T23:15:07.910",
|
||||
"lastModified": "2023-12-14T08:15:41.037",
|
||||
"lastModified": "2024-09-19T20:15:06.353",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "LOYTEC LINX-212 firmware 6.2.4 and LVIS-3ME12-A1 firmware 6.2.2 and LIOB-586 firmware 6.2.3 devices send password-change requests via cleartext HTTP."
|
||||
"value": "LOYTEC LINX-151, LINX-212, LVIS-3ME12-A1, LIOB-586, LIOB-580 V2, LIOB-588, L-INX Configurator devices (all versions) send password-change requests via cleartext HTTP."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
@ -150,6 +150,10 @@
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://www.cisa.gov/news-events/ics-advisories/icsa-24-247-01",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://www.txone.com/blog/ten-unpatched-vulnerabilities-in-building-automation-products-identified-by-txone-networks/",
|
||||
"source": "cve@mitre.org"
|
||||
|
@ -2,13 +2,13 @@
|
||||
"id": "CVE-2023-46381",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-11-04T23:15:07.957",
|
||||
"lastModified": "2023-12-14T08:15:41.450",
|
||||
"lastModified": "2024-09-19T20:15:06.463",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "LOYTEC LINX-212 firmware 6.2.4 and LVIS-3ME12-A1 firmware 6.2.2 and LIOB-586 firmware 6.2.3 devices lack authentication for the preinstalled version of LWEB-802 via an lweb802_pre/ URI. An unauthenticated attacker can edit any project (or create a new project) and control its GUI."
|
||||
"value": "LOYTEC LINX-151, LINX-212, LVIS-3ME12-A1, LIOB-586, LIOB-580 V2, LIOB-588, L-INX Configurator devices (all versions) lack authentication for the preinstalled version of LWEB-802 via an lweb802_pre/ URI. An unauthenticated attacker can edit any project (or create a new project) and control its GUI."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
@ -150,6 +150,10 @@
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://www.cisa.gov/news-events/ics-advisories/icsa-24-247-01",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://www.txone.com/blog/ten-unpatched-vulnerabilities-in-building-automation-products-identified-by-txone-networks/",
|
||||
"source": "cve@mitre.org"
|
||||
|
@ -2,13 +2,13 @@
|
||||
"id": "CVE-2023-46382",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-11-04T23:15:08.003",
|
||||
"lastModified": "2023-12-14T08:15:41.690",
|
||||
"lastModified": "2024-09-19T20:15:06.523",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "LOYTEC LINX-212 firmware 6.2.4 and LVIS-3ME12-A1 firmware 6.2.2 and LIOB-586 firmware 6.2.3 devices use cleartext HTTP for login."
|
||||
"value": "LOYTEC LINX-151, LINX-212, LVIS-3ME12-A1, LIOB-586, LIOB-580 V2, LIOB-588, L-INX Configurator devices (all versions) use cleartext HTTP for login."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
@ -150,6 +150,10 @@
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://www.cisa.gov/news-events/ics-advisories/icsa-24-247-01",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://www.txone.com/blog/ten-unpatched-vulnerabilities-in-building-automation-products-identified-by-txone-networks/",
|
||||
"source": "cve@mitre.org"
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-20399",
|
||||
"sourceIdentifier": "ykramarz@cisco.com",
|
||||
"published": "2024-07-01T17:15:04.383",
|
||||
"lastModified": "2024-09-17T19:15:24.747",
|
||||
"vulnStatus": "Modified",
|
||||
"lastModified": "2024-09-19T20:05:25.107",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"cisaExploitAdd": "2024-07-02",
|
||||
"cisaActionDue": "2024-07-23",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-25023",
|
||||
"sourceIdentifier": "psirt@us.ibm.com",
|
||||
"published": "2024-07-10T01:15:09.633",
|
||||
"lastModified": "2024-07-11T13:05:54.930",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-09-19T21:14:27.027",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -17,6 +17,26 @@
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 5.5,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 3.6
|
||||
},
|
||||
{
|
||||
"source": "psirt@us.ibm.com",
|
||||
"type": "Secondary",
|
||||
@ -51,14 +71,47 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:ibm:cloud_pak_for_security:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "1.10.0.0",
|
||||
"versionEndIncluding": "1.10.11.0",
|
||||
"matchCriteriaId": "8FA89838-3E05-4778-9323-DE51CC10FD18"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:ibm:qradar_suite:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "1.10.12.0",
|
||||
"versionEndExcluding": "1.10.23.0",
|
||||
"matchCriteriaId": "4E1101FE-F579-4869-BFFD-6383D0F9C6A6"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/281429",
|
||||
"source": "psirt@us.ibm.com"
|
||||
"source": "psirt@us.ibm.com",
|
||||
"tags": [
|
||||
"VDB Entry",
|
||||
"Vendor Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://www.ibm.com/support/pages/node/7159768",
|
||||
"source": "psirt@us.ibm.com"
|
||||
"source": "psirt@us.ibm.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-34344",
|
||||
"sourceIdentifier": "security-advisories@github.com",
|
||||
"published": "2024-08-05T21:15:38.457",
|
||||
"lastModified": "2024-08-06T16:30:24.547",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-09-19T20:58:01.827",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -17,6 +17,26 @@
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 8.8,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 5.9
|
||||
},
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Secondary",
|
||||
@ -40,6 +60,16 @@
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-94"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Secondary",
|
||||
@ -51,10 +81,32 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:nuxt:nuxt:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "3.4.0",
|
||||
"versionEndExcluding": "3.12.4",
|
||||
"matchCriteriaId": "2260958F-B727-4B00-8835-29448E791AF6"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/nuxt/nuxt/security/advisories/GHSA-v784-fjjh-f8r4",
|
||||
"source": "security-advisories@github.com"
|
||||
"source": "security-advisories@github.com",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
56
CVE-2024/CVE-2024-382xx/CVE-2024-38221.json
Normal file
56
CVE-2024/CVE-2024-382xx/CVE-2024-38221.json
Normal file
@ -0,0 +1,56 @@
|
||||
{
|
||||
"id": "CVE-2024-38221",
|
||||
"sourceIdentifier": "secure@microsoft.com",
|
||||
"published": "2024-09-19T21:15:13.933",
|
||||
"lastModified": "2024-09-19T21:15:13.933",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Microsoft Edge (Chromium-based) Spoofing Vulnerability"
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "secure@microsoft.com",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 4.3,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 1.4
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "secure@microsoft.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38221",
|
||||
"source": "secure@microsoft.com"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-39304",
|
||||
"sourceIdentifier": "security-advisories@github.com",
|
||||
"published": "2024-07-26T18:15:03.557",
|
||||
"lastModified": "2024-07-29T14:12:08.783",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-09-19T20:59:15.717",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -17,6 +17,26 @@
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 8.8,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 5.9
|
||||
},
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Secondary",
|
||||
@ -40,6 +60,16 @@
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-89"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Secondary",
|
||||
@ -51,14 +81,39 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:churchcrm:churchcrm:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "5.9.2",
|
||||
"matchCriteriaId": "BF260165-FC6C-43A6-A034-EBAF26131A40"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/ChurchCRM/CRM/commit/e3bd7bfbf33f01148df0ef1acdb0cf2c2b878b08",
|
||||
"source": "security-advisories@github.com"
|
||||
"source": "security-advisories@github.com",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/ChurchCRM/CRM/security/advisories/GHSA-2rh6-gr3h-83j9",
|
||||
"source": "security-advisories@github.com"
|
||||
"source": "security-advisories@github.com",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-40125",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-09-19T19:15:24.350",
|
||||
"lastModified": "2024-09-19T19:15:24.350",
|
||||
"lastModified": "2024-09-19T20:35:24.513",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -11,7 +11,42 @@
|
||||
"value": "An arbitrary file upload vulnerability in the Media Manager function of Closed-Loop Technology CLESS Server v4.5.2 allows attackers to execute arbitrary code via uploading a crafted PHP file to the upload endpoint."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "LOW",
|
||||
"baseScore": 7.3,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 3.4
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-94"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/brendontkl/My-CVEs/tree/main/CVE-2024-40125",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-41959",
|
||||
"sourceIdentifier": "security-advisories@github.com",
|
||||
"published": "2024-08-05T20:15:36.270",
|
||||
"lastModified": "2024-08-06T16:30:24.547",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-09-19T20:14:02.963",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -17,6 +17,26 @@
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 6.1,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 2.7
|
||||
},
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Secondary",
|
||||
@ -40,6 +60,16 @@
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Secondary",
|
||||
@ -51,14 +81,38 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:mailcow:mailcow\\:_dockerized:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "2024-07",
|
||||
"matchCriteriaId": "995C99DD-01FE-4772-808E-1A927518ED1D"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/mailcow/mailcow-dockerized/commit/66aa28b5de282fc037e0d2f02fbdc84539b614a1",
|
||||
"source": "security-advisories@github.com"
|
||||
"source": "security-advisories@github.com",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/mailcow/mailcow-dockerized/security/advisories/GHSA-v3r3-8f69-ph29",
|
||||
"source": "security-advisories@github.com"
|
||||
"source": "security-advisories@github.com",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-41960",
|
||||
"sourceIdentifier": "security-advisories@github.com",
|
||||
"published": "2024-08-05T20:15:36.477",
|
||||
"lastModified": "2024-08-06T16:30:24.547",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-09-19T20:01:58.633",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -17,6 +17,26 @@
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "HIGH",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 4.8,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 1.7,
|
||||
"impactScore": 2.7
|
||||
},
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Secondary",
|
||||
@ -40,6 +60,16 @@
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Secondary",
|
||||
@ -51,14 +81,38 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:mailcow:mailcow\\:_dockerized:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "2024-07",
|
||||
"matchCriteriaId": "995C99DD-01FE-4772-808E-1A927518ED1D"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/mailcow/mailcow-dockerized/commit/efb2572f0fa57628ad98a76a4ae884a10cac0a1a",
|
||||
"source": "security-advisories@github.com"
|
||||
"source": "security-advisories@github.com",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/mailcow/mailcow-dockerized/security/advisories/GHSA-jpp8-rhg6-4vvv",
|
||||
"source": "security-advisories@github.com"
|
||||
"source": "security-advisories@github.com",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-42102",
|
||||
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"published": "2024-07-30T08:15:02.733",
|
||||
"lastModified": "2024-08-21T20:48:01.940",
|
||||
"lastModified": "2024-09-19T20:38:05.737",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -22,19 +22,19 @@
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"attackComplexity": "HIGH",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 5.5,
|
||||
"baseScore": 4.7,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"exploitabilityScore": 1.0,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-42352",
|
||||
"sourceIdentifier": "security-advisories@github.com",
|
||||
"published": "2024-08-05T21:15:38.913",
|
||||
"lastModified": "2024-08-06T16:30:24.547",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-09-19T20:55:46.543",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -17,6 +17,26 @@
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 7.5,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 3.6
|
||||
},
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Secondary",
|
||||
@ -40,6 +60,16 @@
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-918"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Secondary",
|
||||
@ -51,10 +81,31 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:nuxt:nuxt:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "1.4.5",
|
||||
"matchCriteriaId": "450FA494-54D1-4853-BA87-BAC6F4D749FE"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/nuxt/icon/security/advisories/GHSA-cxgv-px37-4mp2",
|
||||
"source": "security-advisories@github.com"
|
||||
"source": "security-advisories@github.com",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-43042",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-08-16T20:15:13.573",
|
||||
"lastModified": "2024-08-19T13:00:23.117",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-09-19T21:01:24.137",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -15,15 +15,74 @@
|
||||
"value": "Pluck CMS 4.7.18 no restringe los intentos fallidos de inicio de sesi\u00f3n, lo que permite a los atacantes ejecutar un ataque de fuerza bruta."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-307"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:pluck-cms:pluck:4.7.18:-:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "D1FA72CC-1126-4DC4-8431-997BC8160715"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://drive.google.com/file/d/1FnLCFP8xDrE1e_4Ft_TZ7VhC-JBkpsL0/view?usp=sharing",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/pluck-cms/pluck",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Product"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-43144",
|
||||
"sourceIdentifier": "audit@patchstack.com",
|
||||
"published": "2024-08-29T15:15:28.530",
|
||||
"lastModified": "2024-08-30T13:00:05.390",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2024-09-19T21:47:24.613",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -17,6 +17,26 @@
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
},
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Secondary",
|
||||
@ -41,7 +61,7 @@
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
@ -49,12 +69,43 @@
|
||||
"value": "CWE-89"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-89"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:stylemixthemes:cost_calculator_builder:*:*:*:*:*:wordpress:*:*",
|
||||
"versionEndExcluding": "3.2.16",
|
||||
"matchCriteriaId": "9B83880C-A635-4AAC-8F63-91B2D1E4F1E9"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://patchstack.com/database/vulnerability/cost-calculator-builder/wordpress-cost-calculator-builder-plugin-3-2-15-sql-injection-vulnerability?_s_id=cve",
|
||||
"source": "audit@patchstack.com"
|
||||
"source": "audit@patchstack.com",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
56
CVE-2024/CVE-2024-434xx/CVE-2024-43489.json
Normal file
56
CVE-2024/CVE-2024-434xx/CVE-2024-43489.json
Normal file
@ -0,0 +1,56 @@
|
||||
{
|
||||
"id": "CVE-2024-43489",
|
||||
"sourceIdentifier": "secure@microsoft.com",
|
||||
"published": "2024-09-19T21:15:15.677",
|
||||
"lastModified": "2024-09-19T21:15:15.677",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Microsoft Edge (Chromium-based) Remote Code Execution Vulnerability"
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "secure@microsoft.com",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 6.5,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "secure@microsoft.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-843"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-43489",
|
||||
"source": "secure@microsoft.com"
|
||||
}
|
||||
]
|
||||
}
|
56
CVE-2024/CVE-2024-434xx/CVE-2024-43496.json
Normal file
56
CVE-2024/CVE-2024-434xx/CVE-2024-43496.json
Normal file
@ -0,0 +1,56 @@
|
||||
{
|
||||
"id": "CVE-2024-43496",
|
||||
"sourceIdentifier": "secure@microsoft.com",
|
||||
"published": "2024-09-19T21:15:15.917",
|
||||
"lastModified": "2024-09-19T21:15:15.917",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Microsoft Edge (Chromium-based) Remote Code Execution Vulnerability"
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "secure@microsoft.com",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 6.5,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "secure@microsoft.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-787"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-43496",
|
||||
"source": "secure@microsoft.com"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-43917",
|
||||
"sourceIdentifier": "audit@patchstack.com",
|
||||
"published": "2024-08-29T15:15:28.753",
|
||||
"lastModified": "2024-08-30T13:00:05.390",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2024-09-19T21:46:19.713",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -17,6 +17,26 @@
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
},
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Secondary",
|
||||
@ -51,10 +71,31 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:templateinvaders:ti_woocommerce_wishlist:*:*:*:*:free:wordpress:*:*",
|
||||
"versionEndIncluding": "2.8.2",
|
||||
"matchCriteriaId": "3175DE1F-23E6-4CB9-B2AD-DCDF89246856"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://patchstack.com/database/vulnerability/ti-woocommerce-wishlist/wordpress-ti-woocommerce-wishlist-plugin-2-8-2-sql-injection-vulnerability?_s_id=cve",
|
||||
"source": "audit@patchstack.com"
|
||||
"source": "audit@patchstack.com",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-43922",
|
||||
"sourceIdentifier": "audit@patchstack.com",
|
||||
"published": "2024-08-29T15:15:29.227",
|
||||
"lastModified": "2024-08-30T13:00:05.390",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2024-09-19T21:44:49.453",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -17,6 +17,26 @@
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
},
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Secondary",
|
||||
@ -40,6 +60,16 @@
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-94"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Secondary",
|
||||
@ -51,10 +81,31 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:nitropack:nitropack:*:*:*:*:*:wordpress:*:*",
|
||||
"versionEndExcluding": "1.16.8",
|
||||
"matchCriteriaId": "8D757B56-5E1B-473C-90A5-3777DBB1240C"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://patchstack.com/database/vulnerability/nitropack/wordpress-nitropack-plugin-1-16-7-unauthenticated-arbitrary-shortcode-execution-vulnerability?_s_id=cve",
|
||||
"source": "audit@patchstack.com"
|
||||
"source": "audit@patchstack.com",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-45457",
|
||||
"sourceIdentifier": "audit@patchstack.com",
|
||||
"published": "2024-09-15T08:15:13.547",
|
||||
"lastModified": "2024-09-16T15:30:28.733",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-09-19T20:53:46.313",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -17,6 +17,26 @@
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 5.4,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.3,
|
||||
"impactScore": 2.7
|
||||
},
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Secondary",
|
||||
@ -40,6 +60,16 @@
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Secondary",
|
||||
@ -51,10 +81,31 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:spiffyplugins:spiffy_calendar:*:*:*:*:*:wordpress:*:*",
|
||||
"versionEndExcluding": "4.9.14",
|
||||
"matchCriteriaId": "2CD91243-6FF0-44AA-AE85-B1C4B6604A9F"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://patchstack.com/database/vulnerability/spiffy-calendar/wordpress-spiffy-calendar-plugin-4-9-13-cross-site-scripting-xss-vulnerability?_s_id=cve",
|
||||
"source": "audit@patchstack.com"
|
||||
"source": "audit@patchstack.com",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-45496",
|
||||
"sourceIdentifier": "secalert@redhat.com",
|
||||
"published": "2024-09-17T00:15:52.433",
|
||||
"lastModified": "2024-09-19T14:15:16.980",
|
||||
"lastModified": "2024-09-19T20:15:06.813",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -68,6 +68,10 @@
|
||||
"url": "https://access.redhat.com/errata/RHSA-2024:6691",
|
||||
"source": "secalert@redhat.com"
|
||||
},
|
||||
{
|
||||
"url": "https://access.redhat.com/errata/RHSA-2024:6705",
|
||||
"source": "secalert@redhat.com"
|
||||
},
|
||||
{
|
||||
"url": "https://access.redhat.com/security/cve/CVE-2024-45496",
|
||||
"source": "secalert@redhat.com"
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-45696",
|
||||
"sourceIdentifier": "twcert@cert.org.tw",
|
||||
"published": "2024-09-16T07:15:03.037",
|
||||
"lastModified": "2024-09-16T15:30:28.733",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-09-19T21:42:36.557",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -51,14 +51,82 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:dlink:covr-x1870_firmware:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "1.03b01",
|
||||
"matchCriteriaId": "B6608842-4B33-49CA-BB9A-7484370CB8DC"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:dlink:covr-x1870:*:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "C8F856BE-5848-486A-87F4-A2FFC42BABF1"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:dlink:dir-x4860_firmware:1.00:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "6E8E188F-287F-4F63-BA73-7B7D666607BB"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:dlink:dir-x4860_firmware:1.04:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "9969A74F-33DE-4CC2-8F9E-962FD8EEE3BA"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:dlink:dir-x4860:a1:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "8497D176-6D8B-41BC-B377-0963EF6C24B2"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.twcert.org.tw/en/cp-139-8087-c3e70-2.html",
|
||||
"source": "twcert@cert.org.tw"
|
||||
"source": "twcert@cert.org.tw",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://www.twcert.org.tw/tw/cp-132-8086-93ed5-1.html",
|
||||
"source": "twcert@cert.org.tw"
|
||||
"source": "twcert@cert.org.tw",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-45697",
|
||||
"sourceIdentifier": "twcert@cert.org.tw",
|
||||
"published": "2024-09-16T07:15:03.233",
|
||||
"lastModified": "2024-09-16T15:30:28.733",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-09-19T21:40:37.357",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -51,14 +51,54 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:dlink:dir-x4860_firmware:1.00:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "6E8E188F-287F-4F63-BA73-7B7D666607BB"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:dlink:dir-x4860_firmware:1.04:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "9969A74F-33DE-4CC2-8F9E-962FD8EEE3BA"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:dlink:dir-x4860:a1:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "8497D176-6D8B-41BC-B377-0963EF6C24B2"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.twcert.org.tw/en/cp-139-8089-32df6-2.html",
|
||||
"source": "twcert@cert.org.tw"
|
||||
"source": "twcert@cert.org.tw",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://www.twcert.org.tw/tw/cp-132-8088-590ed-1.html",
|
||||
"source": "twcert@cert.org.tw"
|
||||
"source": "twcert@cert.org.tw",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-45698",
|
||||
"sourceIdentifier": "twcert@cert.org.tw",
|
||||
"published": "2024-09-16T07:15:03.450",
|
||||
"lastModified": "2024-09-16T15:30:28.733",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-09-19T21:40:02.560",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -18,8 +18,28 @@
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "twcert@cert.org.tw",
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
},
|
||||
{
|
||||
"source": "twcert@cert.org.tw",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||
@ -41,8 +61,18 @@
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "twcert@cert.org.tw",
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-798"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "twcert@cert.org.tw",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -51,14 +81,54 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:dlink:dir-x4860_firmware:1.00:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "6E8E188F-287F-4F63-BA73-7B7D666607BB"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:dlink:dir-x4860_firmware:1.04:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "9969A74F-33DE-4CC2-8F9E-962FD8EEE3BA"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:dlink:dir-x4860:a1:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "8497D176-6D8B-41BC-B377-0963EF6C24B2"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.twcert.org.tw/en/cp-139-8091-bcd52-2.html",
|
||||
"source": "twcert@cert.org.tw"
|
||||
"source": "twcert@cert.org.tw",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://www.twcert.org.tw/tw/cp-132-8090-bf06b-1.html",
|
||||
"source": "twcert@cert.org.tw"
|
||||
"source": "twcert@cert.org.tw",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,13 +2,17 @@
|
||||
"id": "CVE-2024-47059",
|
||||
"sourceIdentifier": "security@mautic.org",
|
||||
"published": "2024-09-18T22:15:04.650",
|
||||
"lastModified": "2024-09-18T22:15:04.650",
|
||||
"lastModified": "2024-09-19T20:15:06.953",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "When logging in with the correct username and incorrect weak password, the user receives the notification, that their password is too weak.\n\nHowever when an incorrect username is provided alongside with a weak password, the application responds with \u2019Invalid credentials\u2019 notification.\n\nThis difference could be used to perform username enumeration."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Al iniciar sesi\u00f3n con el nombre de usuario correcto y una contrase\u00f1a d\u00e9bil incorrecta, el usuario recibe una notificaci\u00f3n que indica que su contrase\u00f1a es demasiado d\u00e9bil. Sin embargo, cuando se proporciona un nombre de usuario incorrecto junto con una contrase\u00f1a d\u00e9bil, la aplicaci\u00f3n responde con una notificaci\u00f3n de \"Credenciales no v\u00e1lidas\". Esta diferencia se puede utilizar para realizar la enumeraci\u00f3n de nombres de usuario."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
@ -18,20 +22,20 @@
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:N",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "HIGH",
|
||||
"privilegesRequired": "NONE",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 0.0,
|
||||
"baseSeverity": "NONE"
|
||||
"baseScore": 4.3,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.2,
|
||||
"impactScore": 0.0
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 1.4
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-5971",
|
||||
"sourceIdentifier": "secalert@redhat.com",
|
||||
"published": "2024-07-08T21:15:12.480",
|
||||
"lastModified": "2024-09-09T23:15:10.200",
|
||||
"lastModified": "2024-09-19T20:15:07.113",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -80,6 +80,10 @@
|
||||
"url": "https://access.redhat.com/errata/RHSA-2024:6508",
|
||||
"source": "secalert@redhat.com"
|
||||
},
|
||||
{
|
||||
"url": "https://access.redhat.com/errata/RHSA-2024:6883",
|
||||
"source": "secalert@redhat.com"
|
||||
},
|
||||
{
|
||||
"url": "https://access.redhat.com/security/cve/CVE-2024-5971",
|
||||
"source": "secalert@redhat.com"
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-7387",
|
||||
"sourceIdentifier": "secalert@redhat.com",
|
||||
"published": "2024-09-17T00:15:52.757",
|
||||
"lastModified": "2024-09-19T14:15:17.470",
|
||||
"lastModified": "2024-09-19T20:15:07.277",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -68,6 +68,10 @@
|
||||
"url": "https://access.redhat.com/errata/RHSA-2024:6691",
|
||||
"source": "secalert@redhat.com"
|
||||
},
|
||||
{
|
||||
"url": "https://access.redhat.com/errata/RHSA-2024:6705",
|
||||
"source": "secalert@redhat.com"
|
||||
},
|
||||
{
|
||||
"url": "https://access.redhat.com/security/cve/CVE-2024-7387",
|
||||
"source": "secalert@redhat.com"
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-7553",
|
||||
"sourceIdentifier": "cna@mongodb.com",
|
||||
"published": "2024-08-07T10:15:39.493",
|
||||
"lastModified": "2024-08-07T15:17:46.717",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2024-09-19T20:46:04.103",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -17,6 +17,26 @@
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 7.8,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 5.9
|
||||
},
|
||||
{
|
||||
"source": "cna@mongodb.com",
|
||||
"type": "Secondary",
|
||||
@ -40,6 +60,16 @@
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "NVD-CWE-noinfo"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "cna@mongodb.com",
|
||||
"type": "Secondary",
|
||||
@ -51,18 +81,554 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:mongodb:mongodb:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "5.0.0",
|
||||
"versionEndExcluding": "5.0.27",
|
||||
"matchCriteriaId": "D10BC49C-B4A2-41FF-98D3-6BF65E7B4284"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_10_1507:-:*:*:*:*:*:x64:*",
|
||||
"matchCriteriaId": "A045AC0A-471E-444C-B3B0-4CABC23E8CFB"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_10_1511:-:*:*:*:*:*:x64:*",
|
||||
"matchCriteriaId": "0408DF07-8A1B-47F1-99B2-F2AA77691528"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_10_1607:-:*:*:*:*:*:x64:*",
|
||||
"matchCriteriaId": "5E491E46-1917-41FE-8F9A-BB0BDDEB42C3"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_10_1703:-:*:*:*:*:*:x64:*",
|
||||
"matchCriteriaId": "B98DB3FF-CC3B-4E9F-A9CC-EC4C89AF3B31"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_10_1709:-:*:*:*:*:*:x64:*",
|
||||
"matchCriteriaId": "469F95D3-ABBB-4F1A-A000-BE0F6BD60FF6"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_10_1803:-:*:*:*:*:*:x64:*",
|
||||
"matchCriteriaId": "D82F8AF7-ED01-4649-849E-F248F0E02384"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_10_1809:-:*:*:*:*:*:x64:*",
|
||||
"matchCriteriaId": "306B7CE6-8239-4AED-9ED4-4C9F5B349F58"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_10_1903:-:*:*:*:*:*:x64:*",
|
||||
"matchCriteriaId": "5C5B5180-1E12-45C2-8275-B9E528955307"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_10_1909:-:*:*:*:*:*:x64:*",
|
||||
"matchCriteriaId": "0D77EA14-F61D-4B9E-A385-70B88C482116"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_10_2004:-:*:*:*:*:*:x64:*",
|
||||
"matchCriteriaId": "F79979F1-4080-460D-8835-6D1066611ABA"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_10_20h2:-:*:*:*:*:*:x64:*",
|
||||
"matchCriteriaId": "83C0919F-C4C8-45AE-BDA8-4D88BF0450D5"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_10_21h1:-:*:*:*:*:*:x64:*",
|
||||
"matchCriteriaId": "ED4D2412-9769-48E3-8A7F-394112FC5B79"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_10_21h2:-:*:*:*:*:*:x64:*",
|
||||
"matchCriteriaId": "83A79DD6-E74E-419F-93F1-323B68502633"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_10_22h2:-:*:*:*:*:*:x64:*",
|
||||
"matchCriteriaId": "C230D3BF-7FCE-405C-B62E-B9190C995C3C"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "041FF8BA-0B12-4A1F-B4BF-9C4F33B7C1E7"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "DB79EE26-FC32-417D-A49C-A1A63165A968"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:mongodb:mongodb:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "6.0.0",
|
||||
"versionEndExcluding": "6.0.16",
|
||||
"matchCriteriaId": "A4962B5E-0143-497C-9EBB-B5B675D8E461"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_10_1507:-:*:*:*:*:*:x64:*",
|
||||
"matchCriteriaId": "A045AC0A-471E-444C-B3B0-4CABC23E8CFB"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_10_1511:-:*:*:*:*:*:x64:*",
|
||||
"matchCriteriaId": "0408DF07-8A1B-47F1-99B2-F2AA77691528"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_10_1607:-:*:*:*:*:*:x64:*",
|
||||
"matchCriteriaId": "5E491E46-1917-41FE-8F9A-BB0BDDEB42C3"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_10_1703:-:*:*:*:*:*:x64:*",
|
||||
"matchCriteriaId": "B98DB3FF-CC3B-4E9F-A9CC-EC4C89AF3B31"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_10_1709:-:*:*:*:*:*:x64:*",
|
||||
"matchCriteriaId": "469F95D3-ABBB-4F1A-A000-BE0F6BD60FF6"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_10_1803:-:*:*:*:*:*:x64:*",
|
||||
"matchCriteriaId": "D82F8AF7-ED01-4649-849E-F248F0E02384"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_10_1809:-:*:*:*:*:*:x64:*",
|
||||
"matchCriteriaId": "306B7CE6-8239-4AED-9ED4-4C9F5B349F58"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_10_1903:-:*:*:*:*:*:x64:*",
|
||||
"matchCriteriaId": "5C5B5180-1E12-45C2-8275-B9E528955307"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_10_1909:-:*:*:*:*:*:x64:*",
|
||||
"matchCriteriaId": "0D77EA14-F61D-4B9E-A385-70B88C482116"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_10_2004:-:*:*:*:*:*:x64:*",
|
||||
"matchCriteriaId": "F79979F1-4080-460D-8835-6D1066611ABA"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_10_20h2:-:*:*:*:*:*:x64:*",
|
||||
"matchCriteriaId": "83C0919F-C4C8-45AE-BDA8-4D88BF0450D5"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_10_21h1:-:*:*:*:*:*:x64:*",
|
||||
"matchCriteriaId": "ED4D2412-9769-48E3-8A7F-394112FC5B79"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_10_21h2:-:*:*:*:*:*:x64:*",
|
||||
"matchCriteriaId": "83A79DD6-E74E-419F-93F1-323B68502633"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_10_22h2:-:*:*:*:*:*:x64:*",
|
||||
"matchCriteriaId": "C230D3BF-7FCE-405C-B62E-B9190C995C3C"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "041FF8BA-0B12-4A1F-B4BF-9C4F33B7C1E7"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "DB79EE26-FC32-417D-A49C-A1A63165A968"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:mongodb:mongodb:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "7.0.0",
|
||||
"versionEndExcluding": "7.0.12",
|
||||
"matchCriteriaId": "C3F476DE-A977-4F42-8637-833187D807BD"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:mongodb:mongodb:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "7.3.0",
|
||||
"versionEndExcluding": "7.3.3",
|
||||
"matchCriteriaId": "006DFE2F-6693-4BFE-AA9C-B535CF2BEC6D"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_11:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "5200AF17-0458-4315-A9D6-06C8DF67C05B"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_11_21h2:-:*:*:*:*:*:x64:*",
|
||||
"matchCriteriaId": "0C3552E0-F793-4CDD-965D-457495475805"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_11_22h2:-:*:*:*:*:*:x64:*",
|
||||
"matchCriteriaId": "D5EC3F68-8F41-4F6B-B2E5-920322A4A321"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_11_23h2:-:*:*:*:*:*:x64:*",
|
||||
"matchCriteriaId": "8E3C1327-F331-4448-A253-00EAC7428317"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "DB79EE26-FC32-417D-A49C-A1A63165A968"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_server_2022:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "821614DD-37DD-44E2-A8A4-FE8D23A33C3C"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:mongodb:c_driver:*:*:*:*:*:mongodb:*:*",
|
||||
"versionEndExcluding": "1.26.2",
|
||||
"matchCriteriaId": "806BC7F3-24A8-4A50-BA80-04A443407073"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_10_1507:-:*:*:*:*:*:x64:*",
|
||||
"matchCriteriaId": "A045AC0A-471E-444C-B3B0-4CABC23E8CFB"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_10_1511:-:*:*:*:*:*:x64:*",
|
||||
"matchCriteriaId": "0408DF07-8A1B-47F1-99B2-F2AA77691528"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_10_1607:-:*:*:*:*:*:x64:*",
|
||||
"matchCriteriaId": "5E491E46-1917-41FE-8F9A-BB0BDDEB42C3"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_10_1703:-:*:*:*:*:*:x64:*",
|
||||
"matchCriteriaId": "B98DB3FF-CC3B-4E9F-A9CC-EC4C89AF3B31"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_10_1709:-:*:*:*:*:*:x64:*",
|
||||
"matchCriteriaId": "469F95D3-ABBB-4F1A-A000-BE0F6BD60FF6"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_10_1803:-:*:*:*:*:*:x64:*",
|
||||
"matchCriteriaId": "D82F8AF7-ED01-4649-849E-F248F0E02384"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_10_1809:-:*:*:*:*:*:x64:*",
|
||||
"matchCriteriaId": "306B7CE6-8239-4AED-9ED4-4C9F5B349F58"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_10_1903:-:*:*:*:*:*:x64:*",
|
||||
"matchCriteriaId": "5C5B5180-1E12-45C2-8275-B9E528955307"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_10_1909:-:*:*:*:*:*:x64:*",
|
||||
"matchCriteriaId": "0D77EA14-F61D-4B9E-A385-70B88C482116"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_10_2004:-:*:*:*:*:*:x64:*",
|
||||
"matchCriteriaId": "F79979F1-4080-460D-8835-6D1066611ABA"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_10_20h2:-:*:*:*:*:*:x64:*",
|
||||
"matchCriteriaId": "83C0919F-C4C8-45AE-BDA8-4D88BF0450D5"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_10_21h1:-:*:*:*:*:*:x64:*",
|
||||
"matchCriteriaId": "ED4D2412-9769-48E3-8A7F-394112FC5B79"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_10_21h2:-:*:*:*:*:*:x64:*",
|
||||
"matchCriteriaId": "83A79DD6-E74E-419F-93F1-323B68502633"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_10_22h2:-:*:*:*:*:*:x64:*",
|
||||
"matchCriteriaId": "C230D3BF-7FCE-405C-B62E-B9190C995C3C"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_11:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "5200AF17-0458-4315-A9D6-06C8DF67C05B"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_11_21h2:-:*:*:*:*:*:x64:*",
|
||||
"matchCriteriaId": "0C3552E0-F793-4CDD-965D-457495475805"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_11_22h2:-:*:*:*:*:*:x64:*",
|
||||
"matchCriteriaId": "D5EC3F68-8F41-4F6B-B2E5-920322A4A321"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_11_23h2:-:*:*:*:*:*:x64:*",
|
||||
"matchCriteriaId": "8E3C1327-F331-4448-A253-00EAC7428317"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "041FF8BA-0B12-4A1F-B4BF-9C4F33B7C1E7"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "DB79EE26-FC32-417D-A49C-A1A63165A968"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_server_2022:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "821614DD-37DD-44E2-A8A4-FE8D23A33C3C"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:mongodb:php_driver:*:*:*:*:*:mongodb:*:*",
|
||||
"versionEndExcluding": "1.18.1",
|
||||
"matchCriteriaId": "604ED63D-4BC1-42DA-97C5-D09239230986"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_10_1507:-:*:*:*:*:*:x64:*",
|
||||
"matchCriteriaId": "A045AC0A-471E-444C-B3B0-4CABC23E8CFB"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_10_1511:-:*:*:*:*:*:x64:*",
|
||||
"matchCriteriaId": "0408DF07-8A1B-47F1-99B2-F2AA77691528"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_10_1607:-:*:*:*:*:*:x64:*",
|
||||
"matchCriteriaId": "5E491E46-1917-41FE-8F9A-BB0BDDEB42C3"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_10_1703:-:*:*:*:*:*:x64:*",
|
||||
"matchCriteriaId": "B98DB3FF-CC3B-4E9F-A9CC-EC4C89AF3B31"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_10_1709:-:*:*:*:*:*:x64:*",
|
||||
"matchCriteriaId": "469F95D3-ABBB-4F1A-A000-BE0F6BD60FF6"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_10_1803:-:*:*:*:*:*:x64:*",
|
||||
"matchCriteriaId": "D82F8AF7-ED01-4649-849E-F248F0E02384"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_10_1809:-:*:*:*:*:*:x64:*",
|
||||
"matchCriteriaId": "306B7CE6-8239-4AED-9ED4-4C9F5B349F58"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_10_1903:-:*:*:*:*:*:x64:*",
|
||||
"matchCriteriaId": "5C5B5180-1E12-45C2-8275-B9E528955307"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_10_1909:-:*:*:*:*:*:x64:*",
|
||||
"matchCriteriaId": "0D77EA14-F61D-4B9E-A385-70B88C482116"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_10_2004:-:*:*:*:*:*:x64:*",
|
||||
"matchCriteriaId": "F79979F1-4080-460D-8835-6D1066611ABA"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_10_20h2:-:*:*:*:*:*:x64:*",
|
||||
"matchCriteriaId": "83C0919F-C4C8-45AE-BDA8-4D88BF0450D5"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_10_21h1:-:*:*:*:*:*:x64:*",
|
||||
"matchCriteriaId": "ED4D2412-9769-48E3-8A7F-394112FC5B79"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_10_21h2:-:*:*:*:*:*:x64:*",
|
||||
"matchCriteriaId": "83A79DD6-E74E-419F-93F1-323B68502633"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_10_22h2:-:*:*:*:*:*:x64:*",
|
||||
"matchCriteriaId": "C230D3BF-7FCE-405C-B62E-B9190C995C3C"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_11:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "5200AF17-0458-4315-A9D6-06C8DF67C05B"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_11_21h2:-:*:*:*:*:*:x64:*",
|
||||
"matchCriteriaId": "0C3552E0-F793-4CDD-965D-457495475805"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_11_22h2:-:*:*:*:*:*:x64:*",
|
||||
"matchCriteriaId": "D5EC3F68-8F41-4F6B-B2E5-920322A4A321"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_11_23h2:-:*:*:*:*:*:x64:*",
|
||||
"matchCriteriaId": "8E3C1327-F331-4448-A253-00EAC7428317"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "041FF8BA-0B12-4A1F-B4BF-9C4F33B7C1E7"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "DB79EE26-FC32-417D-A49C-A1A63165A968"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_server_2022:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "821614DD-37DD-44E2-A8A4-FE8D23A33C3C"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://jira.mongodb.org/browse/CDRIVER-5650",
|
||||
"source": "cna@mongodb.com"
|
||||
"source": "cna@mongodb.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://jira.mongodb.org/browse/PHPC-2369",
|
||||
"source": "cna@mongodb.com"
|
||||
"source": "cna@mongodb.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://jira.mongodb.org/browse/SERVER-93211",
|
||||
"source": "cna@mongodb.com"
|
||||
"source": "cna@mongodb.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-7885",
|
||||
"sourceIdentifier": "secalert@redhat.com",
|
||||
"published": "2024-08-21T14:15:09.500",
|
||||
"lastModified": "2024-09-09T23:15:10.350",
|
||||
"lastModified": "2024-09-19T20:15:07.410",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -148,6 +148,10 @@
|
||||
"url": "https://access.redhat.com/errata/RHSA-2024:6508",
|
||||
"source": "secalert@redhat.com"
|
||||
},
|
||||
{
|
||||
"url": "https://access.redhat.com/errata/RHSA-2024:6883",
|
||||
"source": "secalert@redhat.com"
|
||||
},
|
||||
{
|
||||
"url": "https://access.redhat.com/security/cve/CVE-2024-7885",
|
||||
"source": "secalert@redhat.com",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-8302",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2024-08-29T14:15:09.530",
|
||||
"lastModified": "2024-08-30T13:00:05.390",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2024-09-19T21:55:54.683",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -61,6 +61,26 @@
|
||||
}
|
||||
],
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
},
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
@ -120,22 +140,53 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:geeeeeeeek:dingfanzu:*:*:*:*:*:*:*:*",
|
||||
"versionEndIncluding": "2024-01-31",
|
||||
"matchCriteriaId": "B0A5C032-706C-4646-8855-2CF5670AC54D"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/Xor-Gerke/webray.com.cn/blob/main/cve/dingfanzu-CMS/dingfanzu-CMS%20chpwd.php%20username%20SQL-inject.md",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.276074",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Permissions Required"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.276074",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?submit.396297",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-8698",
|
||||
"sourceIdentifier": "secalert@redhat.com",
|
||||
"published": "2024-09-19T16:15:06.177",
|
||||
"lastModified": "2024-09-19T16:15:06.177",
|
||||
"lastModified": "2024-09-19T20:15:07.560",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -48,6 +48,42 @@
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://access.redhat.com/errata/RHSA-2024:6878",
|
||||
"source": "secalert@redhat.com"
|
||||
},
|
||||
{
|
||||
"url": "https://access.redhat.com/errata/RHSA-2024:6879",
|
||||
"source": "secalert@redhat.com"
|
||||
},
|
||||
{
|
||||
"url": "https://access.redhat.com/errata/RHSA-2024:6880",
|
||||
"source": "secalert@redhat.com"
|
||||
},
|
||||
{
|
||||
"url": "https://access.redhat.com/errata/RHSA-2024:6882",
|
||||
"source": "secalert@redhat.com"
|
||||
},
|
||||
{
|
||||
"url": "https://access.redhat.com/errata/RHSA-2024:6886",
|
||||
"source": "secalert@redhat.com"
|
||||
},
|
||||
{
|
||||
"url": "https://access.redhat.com/errata/RHSA-2024:6887",
|
||||
"source": "secalert@redhat.com"
|
||||
},
|
||||
{
|
||||
"url": "https://access.redhat.com/errata/RHSA-2024:6888",
|
||||
"source": "secalert@redhat.com"
|
||||
},
|
||||
{
|
||||
"url": "https://access.redhat.com/errata/RHSA-2024:6889",
|
||||
"source": "secalert@redhat.com"
|
||||
},
|
||||
{
|
||||
"url": "https://access.redhat.com/errata/RHSA-2024:6890",
|
||||
"source": "secalert@redhat.com"
|
||||
},
|
||||
{
|
||||
"url": "https://access.redhat.com/security/cve/CVE-2024-8698",
|
||||
"source": "secalert@redhat.com"
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-8883",
|
||||
"sourceIdentifier": "secalert@redhat.com",
|
||||
"published": "2024-09-19T16:15:06.403",
|
||||
"lastModified": "2024-09-19T16:15:06.403",
|
||||
"lastModified": "2024-09-19T20:15:07.687",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -48,6 +48,42 @@
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://access.redhat.com/errata/RHSA-2024:6878",
|
||||
"source": "secalert@redhat.com"
|
||||
},
|
||||
{
|
||||
"url": "https://access.redhat.com/errata/RHSA-2024:6879",
|
||||
"source": "secalert@redhat.com"
|
||||
},
|
||||
{
|
||||
"url": "https://access.redhat.com/errata/RHSA-2024:6880",
|
||||
"source": "secalert@redhat.com"
|
||||
},
|
||||
{
|
||||
"url": "https://access.redhat.com/errata/RHSA-2024:6882",
|
||||
"source": "secalert@redhat.com"
|
||||
},
|
||||
{
|
||||
"url": "https://access.redhat.com/errata/RHSA-2024:6886",
|
||||
"source": "secalert@redhat.com"
|
||||
},
|
||||
{
|
||||
"url": "https://access.redhat.com/errata/RHSA-2024:6887",
|
||||
"source": "secalert@redhat.com"
|
||||
},
|
||||
{
|
||||
"url": "https://access.redhat.com/errata/RHSA-2024:6888",
|
||||
"source": "secalert@redhat.com"
|
||||
},
|
||||
{
|
||||
"url": "https://access.redhat.com/errata/RHSA-2024:6889",
|
||||
"source": "secalert@redhat.com"
|
||||
},
|
||||
{
|
||||
"url": "https://access.redhat.com/errata/RHSA-2024:6890",
|
||||
"source": "secalert@redhat.com"
|
||||
},
|
||||
{
|
||||
"url": "https://access.redhat.com/security/cve/CVE-2024-8883",
|
||||
"source": "secalert@redhat.com"
|
||||
|
141
CVE-2024/CVE-2024-90xx/CVE-2024-9001.json
Normal file
141
CVE-2024/CVE-2024-90xx/CVE-2024-9001.json
Normal file
@ -0,0 +1,141 @@
|
||||
{
|
||||
"id": "CVE-2024-9001",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2024-09-19T20:15:07.810",
|
||||
"lastModified": "2024-09-19T20:15:07.810",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A vulnerability was found in TOTOLINK T10 4.1.8cu.5207. It has been declared as critical. This vulnerability affects the function setTracerouteCfg of the file /cgi-bin/cstecgi.cgi. The manipulation of the argument command leads to os command injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV40": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "4.0",
|
||||
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"attackRequirements": "NONE",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"vulnerableSystemConfidentiality": "LOW",
|
||||
"vulnerableSystemIntegrity": "LOW",
|
||||
"vulnerableSystemAvailability": "LOW",
|
||||
"subsequentSystemConfidentiality": "NONE",
|
||||
"subsequentSystemIntegrity": "NONE",
|
||||
"subsequentSystemAvailability": "NONE",
|
||||
"exploitMaturity": "NOT_DEFINED",
|
||||
"confidentialityRequirements": "NOT_DEFINED",
|
||||
"integrityRequirements": "NOT_DEFINED",
|
||||
"availabilityRequirements": "NOT_DEFINED",
|
||||
"modifiedAttackVector": "NOT_DEFINED",
|
||||
"modifiedAttackComplexity": "NOT_DEFINED",
|
||||
"modifiedAttackRequirements": "NOT_DEFINED",
|
||||
"modifiedPrivilegesRequired": "NOT_DEFINED",
|
||||
"modifiedUserInteraction": "NOT_DEFINED",
|
||||
"modifiedVulnerableSystemConfidentiality": "NOT_DEFINED",
|
||||
"modifiedVulnerableSystemIntegrity": "NOT_DEFINED",
|
||||
"modifiedVulnerableSystemAvailability": "NOT_DEFINED",
|
||||
"modifiedSubsequentSystemConfidentiality": "NOT_DEFINED",
|
||||
"modifiedSubsequentSystemIntegrity": "NOT_DEFINED",
|
||||
"modifiedSubsequentSystemAvailability": "NOT_DEFINED",
|
||||
"safety": "NOT_DEFINED",
|
||||
"automatable": "NOT_DEFINED",
|
||||
"recovery": "NOT_DEFINED",
|
||||
"valueDensity": "NOT_DEFINED",
|
||||
"vulnerabilityResponseEffort": "NOT_DEFINED",
|
||||
"providerUrgency": "NOT_DEFINED",
|
||||
"baseScore": 5.3,
|
||||
"baseSeverity": "MEDIUM"
|
||||
}
|
||||
}
|
||||
],
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "LOW",
|
||||
"baseScore": 6.3,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 3.4
|
||||
}
|
||||
],
|
||||
"cvssMetricV2": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "2.0",
|
||||
"vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P",
|
||||
"accessVector": "NETWORK",
|
||||
"accessComplexity": "LOW",
|
||||
"authentication": "SINGLE",
|
||||
"confidentialityImpact": "PARTIAL",
|
||||
"integrityImpact": "PARTIAL",
|
||||
"availabilityImpact": "PARTIAL",
|
||||
"baseScore": 6.5
|
||||
},
|
||||
"baseSeverity": "MEDIUM",
|
||||
"exploitabilityScore": 8.0,
|
||||
"impactScore": 6.4,
|
||||
"acInsufInfo": false,
|
||||
"obtainAllPrivilege": false,
|
||||
"obtainUserPrivilege": false,
|
||||
"obtainOtherPrivilege": false,
|
||||
"userInteractionRequired": false
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-78"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/C9Y57/TOTOLINK_setTracerouteCfg/blob/main/setTracerouteCfg.md",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.278152",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.278152",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?submit.406140",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.totolink.net/",
|
||||
"source": "cna@vuldb.com"
|
||||
}
|
||||
]
|
||||
}
|
137
CVE-2024/CVE-2024-90xx/CVE-2024-9003.json
Normal file
137
CVE-2024/CVE-2024-90xx/CVE-2024-9003.json
Normal file
@ -0,0 +1,137 @@
|
||||
{
|
||||
"id": "CVE-2024-9003",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2024-09-19T21:15:16.143",
|
||||
"lastModified": "2024-09-19T21:15:16.143",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A vulnerability was found in Jinan Chicheng Company JFlow 2.0.0. It has been rated as problematic. This issue affects the function AttachmentUploadController of the file /WF/Ath/EntityMutliFile_Load.do of the component Attachment Handler. The manipulation of the argument oid leads to improper access controls. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV40": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "4.0",
|
||||
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"attackRequirements": "NONE",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"vulnerableSystemConfidentiality": "LOW",
|
||||
"vulnerableSystemIntegrity": "NONE",
|
||||
"vulnerableSystemAvailability": "NONE",
|
||||
"subsequentSystemConfidentiality": "NONE",
|
||||
"subsequentSystemIntegrity": "NONE",
|
||||
"subsequentSystemAvailability": "NONE",
|
||||
"exploitMaturity": "NOT_DEFINED",
|
||||
"confidentialityRequirements": "NOT_DEFINED",
|
||||
"integrityRequirements": "NOT_DEFINED",
|
||||
"availabilityRequirements": "NOT_DEFINED",
|
||||
"modifiedAttackVector": "NOT_DEFINED",
|
||||
"modifiedAttackComplexity": "NOT_DEFINED",
|
||||
"modifiedAttackRequirements": "NOT_DEFINED",
|
||||
"modifiedPrivilegesRequired": "NOT_DEFINED",
|
||||
"modifiedUserInteraction": "NOT_DEFINED",
|
||||
"modifiedVulnerableSystemConfidentiality": "NOT_DEFINED",
|
||||
"modifiedVulnerableSystemIntegrity": "NOT_DEFINED",
|
||||
"modifiedVulnerableSystemAvailability": "NOT_DEFINED",
|
||||
"modifiedSubsequentSystemConfidentiality": "NOT_DEFINED",
|
||||
"modifiedSubsequentSystemIntegrity": "NOT_DEFINED",
|
||||
"modifiedSubsequentSystemAvailability": "NOT_DEFINED",
|
||||
"safety": "NOT_DEFINED",
|
||||
"automatable": "NOT_DEFINED",
|
||||
"recovery": "NOT_DEFINED",
|
||||
"valueDensity": "NOT_DEFINED",
|
||||
"vulnerabilityResponseEffort": "NOT_DEFINED",
|
||||
"providerUrgency": "NOT_DEFINED",
|
||||
"baseScore": 5.3,
|
||||
"baseSeverity": "MEDIUM"
|
||||
}
|
||||
}
|
||||
],
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 4.3,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 1.4
|
||||
}
|
||||
],
|
||||
"cvssMetricV2": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "2.0",
|
||||
"vectorString": "AV:N/AC:L/Au:S/C:P/I:N/A:N",
|
||||
"accessVector": "NETWORK",
|
||||
"accessComplexity": "LOW",
|
||||
"authentication": "SINGLE",
|
||||
"confidentialityImpact": "PARTIAL",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 4.0
|
||||
},
|
||||
"baseSeverity": "MEDIUM",
|
||||
"exploitabilityScore": 8.0,
|
||||
"impactScore": 2.9,
|
||||
"acInsufInfo": false,
|
||||
"obtainAllPrivilege": false,
|
||||
"obtainUserPrivilege": false,
|
||||
"obtainOtherPrivilege": false,
|
||||
"userInteractionRequired": false
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-284"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/sweatxi/BugHub/blob/main/Jinan%20Gallop%20JFlow%20CMS%20port%20is%20not%20authorized%20to%20cause%20the%20leakage%20of%20database%20attachment%20information.pdf",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.278153",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.278153",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?submit.406225",
|
||||
"source": "cna@vuldb.com"
|
||||
}
|
||||
]
|
||||
}
|
152
CVE-2024/CVE-2024-90xx/CVE-2024-9004.json
Normal file
152
CVE-2024/CVE-2024-90xx/CVE-2024-9004.json
Normal file
@ -0,0 +1,152 @@
|
||||
{
|
||||
"id": "CVE-2024-9004",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2024-09-19T21:15:16.383",
|
||||
"lastModified": "2024-09-19T21:15:16.383",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [
|
||||
{
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"unsupported-when-assigned"
|
||||
]
|
||||
}
|
||||
],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A vulnerability classified as critical has been found in D-Link DAR-7000 up to 20240912. Affected is an unknown function of the file /view/DBManage/Backup_Server_commit.php. The manipulation of the argument host leads to os command injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. NOTE: This vulnerability only affects products that are no longer supported by the maintainer."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV40": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "4.0",
|
||||
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"attackRequirements": "NONE",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"vulnerableSystemConfidentiality": "LOW",
|
||||
"vulnerableSystemIntegrity": "LOW",
|
||||
"vulnerableSystemAvailability": "LOW",
|
||||
"subsequentSystemConfidentiality": "NONE",
|
||||
"subsequentSystemIntegrity": "NONE",
|
||||
"subsequentSystemAvailability": "NONE",
|
||||
"exploitMaturity": "NOT_DEFINED",
|
||||
"confidentialityRequirements": "NOT_DEFINED",
|
||||
"integrityRequirements": "NOT_DEFINED",
|
||||
"availabilityRequirements": "NOT_DEFINED",
|
||||
"modifiedAttackVector": "NOT_DEFINED",
|
||||
"modifiedAttackComplexity": "NOT_DEFINED",
|
||||
"modifiedAttackRequirements": "NOT_DEFINED",
|
||||
"modifiedPrivilegesRequired": "NOT_DEFINED",
|
||||
"modifiedUserInteraction": "NOT_DEFINED",
|
||||
"modifiedVulnerableSystemConfidentiality": "NOT_DEFINED",
|
||||
"modifiedVulnerableSystemIntegrity": "NOT_DEFINED",
|
||||
"modifiedVulnerableSystemAvailability": "NOT_DEFINED",
|
||||
"modifiedSubsequentSystemConfidentiality": "NOT_DEFINED",
|
||||
"modifiedSubsequentSystemIntegrity": "NOT_DEFINED",
|
||||
"modifiedSubsequentSystemAvailability": "NOT_DEFINED",
|
||||
"safety": "NOT_DEFINED",
|
||||
"automatable": "NOT_DEFINED",
|
||||
"recovery": "NOT_DEFINED",
|
||||
"valueDensity": "NOT_DEFINED",
|
||||
"vulnerabilityResponseEffort": "NOT_DEFINED",
|
||||
"providerUrgency": "NOT_DEFINED",
|
||||
"baseScore": 5.3,
|
||||
"baseSeverity": "MEDIUM"
|
||||
}
|
||||
}
|
||||
],
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "LOW",
|
||||
"baseScore": 6.3,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 3.4
|
||||
}
|
||||
],
|
||||
"cvssMetricV2": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "2.0",
|
||||
"vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P",
|
||||
"accessVector": "NETWORK",
|
||||
"accessComplexity": "LOW",
|
||||
"authentication": "SINGLE",
|
||||
"confidentialityImpact": "PARTIAL",
|
||||
"integrityImpact": "PARTIAL",
|
||||
"availabilityImpact": "PARTIAL",
|
||||
"baseScore": 6.5
|
||||
},
|
||||
"baseSeverity": "MEDIUM",
|
||||
"exploitabilityScore": 8.0,
|
||||
"impactScore": 6.4,
|
||||
"acInsufInfo": false,
|
||||
"obtainAllPrivilege": false,
|
||||
"obtainUserPrivilege": false,
|
||||
"obtainOtherPrivilege": false,
|
||||
"userInteractionRequired": false
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-78"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/mhtcshe/cve/blob/main/cve.md",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://supportannouncement.us.dlink.com/security/publication.aspx?name=SAP10354",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.278154",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.278154",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?submit.407023",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.dlink.com/",
|
||||
"source": "cna@vuldb.com"
|
||||
}
|
||||
]
|
||||
}
|
73
README.md
73
README.md
@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours.
|
||||
### Last Repository Update
|
||||
|
||||
```plain
|
||||
2024-09-19T20:00:17.597789+00:00
|
||||
2024-09-19T22:00:17.364624+00:00
|
||||
```
|
||||
|
||||
### Most recent CVE Modification Timestamp synchronized with NVD
|
||||
|
||||
```plain
|
||||
2024-09-19T19:58:23.870000+00:00
|
||||
2024-09-19T21:55:54.683000+00:00
|
||||
```
|
||||
|
||||
### Last Data Feed Release
|
||||
@ -33,51 +33,50 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
|
||||
### Total Number of included CVEs
|
||||
|
||||
```plain
|
||||
263457
|
||||
263463
|
||||
```
|
||||
|
||||
### CVEs added in the last Commit
|
||||
|
||||
Recently added CVEs: `7`
|
||||
Recently added CVEs: `6`
|
||||
|
||||
- [CVE-2024-25673](CVE-2024/CVE-2024-256xx/CVE-2024-25673.json) (`2024-09-19T19:15:24.093`)
|
||||
- [CVE-2024-33109](CVE-2024/CVE-2024-331xx/CVE-2024-33109.json) (`2024-09-19T19:15:24.170`)
|
||||
- [CVE-2024-40125](CVE-2024/CVE-2024-401xx/CVE-2024-40125.json) (`2024-09-19T19:15:24.350`)
|
||||
- [CVE-2024-47159](CVE-2024/CVE-2024-471xx/CVE-2024-47159.json) (`2024-09-19T18:15:09.803`)
|
||||
- [CVE-2024-47160](CVE-2024/CVE-2024-471xx/CVE-2024-47160.json) (`2024-09-19T18:15:10.013`)
|
||||
- [CVE-2024-47162](CVE-2024/CVE-2024-471xx/CVE-2024-47162.json) (`2024-09-19T18:15:10.227`)
|
||||
- [CVE-2024-8963](CVE-2024/CVE-2024-89xx/CVE-2024-8963.json) (`2024-09-19T18:15:10.600`)
|
||||
- [CVE-2024-38221](CVE-2024/CVE-2024-382xx/CVE-2024-38221.json) (`2024-09-19T21:15:13.933`)
|
||||
- [CVE-2024-43489](CVE-2024/CVE-2024-434xx/CVE-2024-43489.json) (`2024-09-19T21:15:15.677`)
|
||||
- [CVE-2024-43496](CVE-2024/CVE-2024-434xx/CVE-2024-43496.json) (`2024-09-19T21:15:15.917`)
|
||||
- [CVE-2024-9001](CVE-2024/CVE-2024-90xx/CVE-2024-9001.json) (`2024-09-19T20:15:07.810`)
|
||||
- [CVE-2024-9003](CVE-2024/CVE-2024-90xx/CVE-2024-9003.json) (`2024-09-19T21:15:16.143`)
|
||||
- [CVE-2024-9004](CVE-2024/CVE-2024-90xx/CVE-2024-9004.json) (`2024-09-19T21:15:16.383`)
|
||||
|
||||
|
||||
### CVEs modified in the last Commit
|
||||
|
||||
Recently modified CVEs: `50`
|
||||
Recently modified CVEs: `53`
|
||||
|
||||
- [CVE-2024-31416](CVE-2024/CVE-2024-314xx/CVE-2024-31416.json) (`2024-09-19T19:06:59.787`)
|
||||
- [CVE-2024-34343](CVE-2024/CVE-2024-343xx/CVE-2024-34343.json) (`2024-09-19T19:57:52.007`)
|
||||
- [CVE-2024-40568](CVE-2024/CVE-2024-405xx/CVE-2024-40568.json) (`2024-09-19T19:35:13.880`)
|
||||
- [CVE-2024-45159](CVE-2024/CVE-2024-451xx/CVE-2024-45159.json) (`2024-09-19T18:26:24.687`)
|
||||
- [CVE-2024-45400](CVE-2024/CVE-2024-454xx/CVE-2024-45400.json) (`2024-09-19T18:04:36.627`)
|
||||
- [CVE-2024-45401](CVE-2024/CVE-2024-454xx/CVE-2024-45401.json) (`2024-09-19T18:12:52.220`)
|
||||
- [CVE-2024-45455](CVE-2024/CVE-2024-454xx/CVE-2024-45455.json) (`2024-09-19T18:51:15.433`)
|
||||
- [CVE-2024-45456](CVE-2024/CVE-2024-454xx/CVE-2024-45456.json) (`2024-09-19T18:38:57.500`)
|
||||
- [CVE-2024-45458](CVE-2024/CVE-2024-454xx/CVE-2024-45458.json) (`2024-09-19T18:55:46.513`)
|
||||
- [CVE-2024-4554](CVE-2024/CVE-2024-45xx/CVE-2024-4554.json) (`2024-09-19T18:15:10.433`)
|
||||
- [CVE-2024-45620](CVE-2024/CVE-2024-456xx/CVE-2024-45620.json) (`2024-09-19T19:21:38.653`)
|
||||
- [CVE-2024-46373](CVE-2024/CVE-2024-463xx/CVE-2024-46373.json) (`2024-09-19T19:35:14.767`)
|
||||
- [CVE-2024-46374](CVE-2024/CVE-2024-463xx/CVE-2024-46374.json) (`2024-09-19T19:35:15.573`)
|
||||
- [CVE-2024-46681](CVE-2024/CVE-2024-466xx/CVE-2024-46681.json) (`2024-09-19T18:10:49.623`)
|
||||
- [CVE-2024-46684](CVE-2024/CVE-2024-466xx/CVE-2024-46684.json) (`2024-09-19T18:04:22.623`)
|
||||
- [CVE-2024-46688](CVE-2024/CVE-2024-466xx/CVE-2024-46688.json) (`2024-09-19T18:01:43.037`)
|
||||
- [CVE-2024-46694](CVE-2024/CVE-2024-466xx/CVE-2024-46694.json) (`2024-09-19T18:16:22.247`)
|
||||
- [CVE-2024-6087](CVE-2024/CVE-2024-60xx/CVE-2024-6087.json) (`2024-09-19T19:32:14.710`)
|
||||
- [CVE-2024-6582](CVE-2024/CVE-2024-65xx/CVE-2024-6582.json) (`2024-09-19T19:45:30.283`)
|
||||
- [CVE-2024-6862](CVE-2024/CVE-2024-68xx/CVE-2024-6862.json) (`2024-09-19T18:37:20.910`)
|
||||
- [CVE-2024-6867](CVE-2024/CVE-2024-68xx/CVE-2024-6867.json) (`2024-09-19T18:28:05.477`)
|
||||
- [CVE-2024-7591](CVE-2024/CVE-2024-75xx/CVE-2024-7591.json) (`2024-09-19T18:19:12.210`)
|
||||
- [CVE-2024-7618](CVE-2024/CVE-2024-76xx/CVE-2024-7618.json) (`2024-09-19T18:20:00.000`)
|
||||
- [CVE-2024-7655](CVE-2024/CVE-2024-76xx/CVE-2024-7655.json) (`2024-09-19T18:20:53.617`)
|
||||
- [CVE-2024-8417](CVE-2024/CVE-2024-84xx/CVE-2024-8417.json) (`2024-09-19T19:53:12.383`)
|
||||
- [CVE-2024-25023](CVE-2024/CVE-2024-250xx/CVE-2024-25023.json) (`2024-09-19T21:14:27.027`)
|
||||
- [CVE-2024-34344](CVE-2024/CVE-2024-343xx/CVE-2024-34344.json) (`2024-09-19T20:58:01.827`)
|
||||
- [CVE-2024-39304](CVE-2024/CVE-2024-393xx/CVE-2024-39304.json) (`2024-09-19T20:59:15.717`)
|
||||
- [CVE-2024-40125](CVE-2024/CVE-2024-401xx/CVE-2024-40125.json) (`2024-09-19T20:35:24.513`)
|
||||
- [CVE-2024-41959](CVE-2024/CVE-2024-419xx/CVE-2024-41959.json) (`2024-09-19T20:14:02.963`)
|
||||
- [CVE-2024-41960](CVE-2024/CVE-2024-419xx/CVE-2024-41960.json) (`2024-09-19T20:01:58.633`)
|
||||
- [CVE-2024-42102](CVE-2024/CVE-2024-421xx/CVE-2024-42102.json) (`2024-09-19T20:38:05.737`)
|
||||
- [CVE-2024-42352](CVE-2024/CVE-2024-423xx/CVE-2024-42352.json) (`2024-09-19T20:55:46.543`)
|
||||
- [CVE-2024-43042](CVE-2024/CVE-2024-430xx/CVE-2024-43042.json) (`2024-09-19T21:01:24.137`)
|
||||
- [CVE-2024-43144](CVE-2024/CVE-2024-431xx/CVE-2024-43144.json) (`2024-09-19T21:47:24.613`)
|
||||
- [CVE-2024-43917](CVE-2024/CVE-2024-439xx/CVE-2024-43917.json) (`2024-09-19T21:46:19.713`)
|
||||
- [CVE-2024-43922](CVE-2024/CVE-2024-439xx/CVE-2024-43922.json) (`2024-09-19T21:44:49.453`)
|
||||
- [CVE-2024-45457](CVE-2024/CVE-2024-454xx/CVE-2024-45457.json) (`2024-09-19T20:53:46.313`)
|
||||
- [CVE-2024-45496](CVE-2024/CVE-2024-454xx/CVE-2024-45496.json) (`2024-09-19T20:15:06.813`)
|
||||
- [CVE-2024-45696](CVE-2024/CVE-2024-456xx/CVE-2024-45696.json) (`2024-09-19T21:42:36.557`)
|
||||
- [CVE-2024-45697](CVE-2024/CVE-2024-456xx/CVE-2024-45697.json) (`2024-09-19T21:40:37.357`)
|
||||
- [CVE-2024-45698](CVE-2024/CVE-2024-456xx/CVE-2024-45698.json) (`2024-09-19T21:40:02.560`)
|
||||
- [CVE-2024-47059](CVE-2024/CVE-2024-470xx/CVE-2024-47059.json) (`2024-09-19T20:15:06.953`)
|
||||
- [CVE-2024-5971](CVE-2024/CVE-2024-59xx/CVE-2024-5971.json) (`2024-09-19T20:15:07.113`)
|
||||
- [CVE-2024-7387](CVE-2024/CVE-2024-73xx/CVE-2024-7387.json) (`2024-09-19T20:15:07.277`)
|
||||
- [CVE-2024-7553](CVE-2024/CVE-2024-75xx/CVE-2024-7553.json) (`2024-09-19T20:46:04.103`)
|
||||
- [CVE-2024-7885](CVE-2024/CVE-2024-78xx/CVE-2024-7885.json) (`2024-09-19T20:15:07.410`)
|
||||
- [CVE-2024-8302](CVE-2024/CVE-2024-83xx/CVE-2024-8302.json) (`2024-09-19T21:55:54.683`)
|
||||
- [CVE-2024-8698](CVE-2024/CVE-2024-86xx/CVE-2024-8698.json) (`2024-09-19T20:15:07.560`)
|
||||
- [CVE-2024-8883](CVE-2024/CVE-2024-88xx/CVE-2024-8883.json) (`2024-09-19T20:15:07.687`)
|
||||
|
||||
|
||||
## Download and Usage
|
||||
|
224
_state.csv
224
_state.csv
@ -58299,12 +58299,12 @@ CVE-2013-0639,0,0,b31be035ceb64b0d082ddfacc740a4210652cc5e7e0dde51ddff1158c160dc
|
||||
CVE-2013-0640,0,0,124b8bb226f7e9d6096b31adba4a0e431bfd4cafe81871fe0024db93f6d5836d,2024-07-16T17:36:16.623000
|
||||
CVE-2013-0641,0,0,8b435cbf77af4b23b70d0392c35e373c862cd1b7676f3d77a9653fe18e07ad76,2024-07-16T17:36:05.960000
|
||||
CVE-2013-0642,0,0,bfadc58d9042f0563f6f464599e9d26f03ce9f43f5f43c002304603f48da66a2,2018-12-06T19:47:16.903000
|
||||
CVE-2013-0643,0,1,ac028e28f0c58cfd927fcc5eee044da647ef72101b764105bdbe0ec010bc29b2,2024-09-19T19:48:10.033000
|
||||
CVE-2013-0643,0,0,ac028e28f0c58cfd927fcc5eee044da647ef72101b764105bdbe0ec010bc29b2,2024-09-19T19:48:10.033000
|
||||
CVE-2013-0644,0,0,79820981c348e4e64b9198c5d6054f480e970cc8d8c247ee3d548bff6c82ac85,2018-12-06T19:48:02.123000
|
||||
CVE-2013-0645,0,0,6125d0f7d22b366190241b77a7b5922adc7339604421994dce13d534098c6aea,2018-12-06T19:48:36.513000
|
||||
CVE-2013-0646,0,0,c06c944b7c73de3e62d948a2b222d45721d45f6414f5e68a92e11e952ff01974,2014-03-26T04:44:11.977000
|
||||
CVE-2013-0647,0,0,eef38ab0e06ece5be29234416a43368cf2dc4818ff0481da512aa8e96cfa7923,2018-12-06T19:50:48.563000
|
||||
CVE-2013-0648,0,1,1bbefef5fe7b99ef5472e70aee3444d59a0b886e0a86d2abe59f31dd3051169e,2024-09-19T19:51:57.317000
|
||||
CVE-2013-0648,0,0,1bbefef5fe7b99ef5472e70aee3444d59a0b886e0a86d2abe59f31dd3051169e,2024-09-19T19:51:57.317000
|
||||
CVE-2013-0649,0,0,08f618eda7f64799433610eda3b01050cfd3e669aa064372e20a16c5d61237e1,2018-12-06T19:50:14.467000
|
||||
CVE-2013-0650,0,0,05a6fa43599436cf52455a9e658850893592583b2a41594c4c9c1629f1ff4728,2014-03-26T04:44:15.773000
|
||||
CVE-2013-0651,0,0,f49ccbeee68ba586b35032f2fc9fbd62aa3c838e205fd987ab565ea2bea44c76,2013-01-30T05:00:00
|
||||
@ -64974,12 +64974,12 @@ CVE-2014-0493,0,0,5980f8ce7bccecebd2e70dd6b857cb4b656971c59fbacbb63249cc45b51f75
|
||||
CVE-2014-0494,0,0,8b294b47a486336cd6b4db3f06f91abe3b0268360260099a12dc8b5ebb59c596,2017-08-29T01:34:11.030000
|
||||
CVE-2014-0495,0,0,671e97412a74358a5c6e50a3bb0dbb2b494498ae12e83fc145a13daedb649abf,2018-12-13T15:50:35.977000
|
||||
CVE-2014-0496,0,0,943eee2f6677ecbddd894736d06d754908e933d15ae4ea4f9cfea3e0ddbbf17b,2018-12-13T15:50:55.103000
|
||||
CVE-2014-0497,0,1,52c8371071aa4fd7738da924f81c155923a24cc665bb1c815f7c347dec1de3d5,2024-09-19T19:56:17.247000
|
||||
CVE-2014-0497,0,0,52c8371071aa4fd7738da924f81c155923a24cc665bb1c815f7c347dec1de3d5,2024-09-19T19:56:17.247000
|
||||
CVE-2014-0498,0,0,1618f11598fb67e87357bcde2d1122794a71c785ac05d06e2d56fd17028571fc,2018-12-13T15:54:15.917000
|
||||
CVE-2014-0499,0,0,0361066feb81eae85003bd40e34d63a55b78a3c7f0bdfd41851c555d91004b71,2018-12-13T15:54:47.153000
|
||||
CVE-2014-0500,0,0,97edfd619058dc26ad56cf33391d9dc91362a50dec1d0dbc02abb7edf993b617,2018-01-03T02:29:03.130000
|
||||
CVE-2014-0501,0,0,4025edf733331396525b490cf3d77ea02dc26b06228603a4b61385c7de6588f2,2018-01-03T02:29:03.210000
|
||||
CVE-2014-0502,0,1,411a92a14510541e15575d6525d0a6e735d616f03fe8f2886da4486c39f075fb,2024-09-19T19:53:44.480000
|
||||
CVE-2014-0502,0,0,411a92a14510541e15575d6525d0a6e735d616f03fe8f2886da4486c39f075fb,2024-09-19T19:53:44.480000
|
||||
CVE-2014-0503,0,0,c67bf98b7682ef5050d13c43497f2af42e7aa350e509586400ddb6191e666325,2018-12-13T16:00:37.443000
|
||||
CVE-2014-0504,0,0,e6a68e9a83d1aff357dde03fe34200e26c34033a1843fb3b1a467a539bb2000a,2018-12-13T16:00:23.630000
|
||||
CVE-2014-0505,0,0,9cf82e807986acb6181ee7efa5d77d0a8127ac7e93c1c91848a81dbe58937cd2,2014-03-14T17:07:42.850000
|
||||
@ -128928,7 +128928,7 @@ CVE-2019-10686,0,0,071dffbfdea10181bb98b77b81173ea1ee44c0bf3f27125b70455662edc40
|
||||
CVE-2019-10687,0,0,4d2aa4f6c0463103aef2503f43b6f1e6753450b125b2eb1b959d173389b0f8e1,2019-08-27T15:51:11.620000
|
||||
CVE-2019-10688,0,0,139389dbc249e8cae439573037005e32285d24298cd9752f9767fbd85f7cada6,2019-06-17T16:15:11.653000
|
||||
CVE-2019-10689,0,0,3a6ff66e02d9a27391650c9b85af3797719e726b15e08ea64568eab01a8deea0,2019-06-27T17:26:21.897000
|
||||
CVE-2019-1069,0,1,0515bb971e4f7a4465e7951022bb244d8e5b1246162c1944d1f49a5443592e90,2024-09-19T19:58:01.950000
|
||||
CVE-2019-1069,0,0,0515bb971e4f7a4465e7951022bb244d8e5b1246162c1944d1f49a5443592e90,2024-09-19T19:58:01.950000
|
||||
CVE-2019-10691,0,0,e8e0d767bb2f3b5e08db6f24e350ea086b46abac68877bbd2cba7819c236f317,2023-11-07T03:02:32.480000
|
||||
CVE-2019-10692,0,0,8adff711cac0bb2de2edadfdf1000b35b700fb5b209d412cad8743610b43de23,2023-05-23T20:30:59.777000
|
||||
CVE-2019-10694,0,0,9582148ff7994145825de46f0455936b126d6116ce2adec095540a2cc82c30a9,2022-01-24T16:46:01.133000
|
||||
@ -175555,7 +175555,7 @@ CVE-2021-31555,0,0,7de5df80bc06456a2bd06cb1ed2fa6bf25b8a0e66ee1e2ceff5a7504cc2b9
|
||||
CVE-2021-31556,0,0,93b949700d04612fa67f7aa21454bcfa0dedb54b45feb534dfde6a346bbdbf4e,2023-11-07T03:34:58.647000
|
||||
CVE-2021-31558,0,0,ceed4d2a05c41f9fdd58ce2921315e67a6e46f1c89b4c2da0bce257ffbc7f901,2021-12-28T14:54:32.527000
|
||||
CVE-2021-31559,0,0,c056101e3a724e5296c3096cffa3217710e8d3f22622b1fbc675682800b56fdf,2022-10-25T16:42:38.307000
|
||||
CVE-2021-3156,0,1,c9f0ccb5f8e0b0bd0d85e1cc30dd2ecceb494b21ff9563b3056182a6d1fce82a,2024-09-19T19:58:23.870000
|
||||
CVE-2021-3156,0,0,c9f0ccb5f8e0b0bd0d85e1cc30dd2ecceb494b21ff9563b3056182a6d1fce82a,2024-09-19T19:58:23.870000
|
||||
CVE-2021-31562,0,0,ac50e4387893ec363455949ced3c17ca407e9a27f3f2c3f523390c3482b094df,2022-01-28T15:55:53.923000
|
||||
CVE-2021-31566,0,0,801f1236a607222712dc7741b61bbdda3061d826b7fd22f878d0c5c45a130a15,2024-03-27T16:04:30.260000
|
||||
CVE-2021-31567,0,0,0da3da305c7b1718259a905dc09c36fc318ae57a531df276f807be7858b88fad,2022-02-03T17:09:44.553000
|
||||
@ -211051,7 +211051,7 @@ CVE-2022-46865,0,0,1ce18b0d4c80950bd776595bb8b5c96b07d40159bc37282a7094f828555df
|
||||
CVE-2022-46866,0,0,f541a42b59f1833d0e4a42bcfa225722f7f2195940d1268d7cff8a650525ac4f,2023-05-31T19:34:00.893000
|
||||
CVE-2022-46867,0,0,c94ab0fe6b7f48e99c0e7926513bd7d10a5a02a031e08d1f6eaf2b364184a4ab,2023-11-07T03:56:04.647000
|
||||
CVE-2022-46868,0,0,5c29fd78a5506d9241a6126df3ffaddbb5d45b7353fb3e8e8a1a57bee2d9c2cc,2023-09-07T14:24:50.557000
|
||||
CVE-2022-46869,0,0,ec10b579cf5fcfe8681bba5149ce0134a4d833e1bf5db8b4d37818dbf0c908fe,2023-09-07T14:25:24.507000
|
||||
CVE-2022-46869,0,1,61318dfdfab72f6a43979c677601cc44719e4817d1fa78858c741523fb3f615f,2024-09-19T21:15:12.977000
|
||||
CVE-2022-4687,0,0,8d166524842e8a43766adde1aff47327db05b9e4c5a11c757eff297e34d89a9d,2022-12-30T22:18:50.207000
|
||||
CVE-2022-46870,0,0,1d0f9b47941d484269917c10e9d54ef1795d6eb62bc7304cfc2ae041eb9847e9,2023-11-07T03:56:04.920000
|
||||
CVE-2022-46871,0,0,a439d42ef801fead2bb2d64251e9eea4857c9d447a44d6b92161fd8da35cb19a,2023-05-03T12:16:31.377000
|
||||
@ -216110,7 +216110,7 @@ CVE-2023-21835,0,0,e438453c05d0ac37a8dbebcb8cd50ddd6e38670993d51927e38ec2ac6343f
|
||||
CVE-2023-21836,0,0,c3cecb219c742fa03a835e3e671e7b8a3e8841c61a101c801b316bd594712266,2023-01-24T19:28:01.793000
|
||||
CVE-2023-21837,0,0,af97fe408e2fef10a5feb6c477148d6e404b668cecc25bb4aad94debb6e9b9d9,2024-09-17T14:35:04.093000
|
||||
CVE-2023-21838,0,0,74186bb7b4ad20682c2b856cdb6f709c19c6384e30d61d84aa3625016ed352ae,2024-09-17T14:35:04.787000
|
||||
CVE-2023-21839,0,0,03ee937492f0fca9bed25fbc8ba875898967dadafcfcb7506fc4d7dfc751997f,2024-09-17T14:35:05.467000
|
||||
CVE-2023-21839,0,1,01b0aae5066058f0d794bcc8f85bb5cccb58bff0793fead00922b3e7c62afbe3,2024-09-19T20:10:55.523000
|
||||
CVE-2023-2184,0,0,1073eb25861fcee57eb9fac43c386305d0fea38d5bbd20991cb618999c7578bc,2023-11-07T04:12:07.433000
|
||||
CVE-2023-21840,0,0,6fd2b5ade9915fd79466730f7996b782a086bd5ce24bdf4d9c33766ab641879a,2023-01-24T19:25:26.767000
|
||||
CVE-2023-21841,0,0,7142f36cd1a6306362b6cd44b241d27ad0cea42f02641af88fe8a7f5d28ea684,2024-09-17T14:35:06.140000
|
||||
@ -219670,7 +219670,7 @@ CVE-2023-2623,0,0,18a4250853ceff90a7f8d8d6a702b5d52453fd1a466fb96a953c3f695b407a
|
||||
CVE-2023-26234,0,0,5322e5c72b55e16db85db47bf05bb45548729834eb0a71eff2d6401df60429b3,2023-03-02T17:12:19.767000
|
||||
CVE-2023-26235,0,0,c3b08ca2f11cd4a827e4f2bd1c96091f3c3c9fdde46998edeae287ff06f89c73,2023-02-28T02:24:53.613000
|
||||
CVE-2023-26236,0,0,00d8e2c3f385074de508212322737baa1cd5d73ff3fcfa075fd69b3c0b8dcfdc,2023-10-11T14:00:04.993000
|
||||
CVE-2023-26237,0,0,0fd98a5491e59458a1b8e36a11cab31ab8256a741691c9d4b83cb23b1ab76ff6,2023-10-11T14:00:07.037000
|
||||
CVE-2023-26237,0,1,5fa978ae4119c4b37166d813072a05e078e1c6cd6d296ff24be9b711a64cd7bc,2024-09-19T21:35:02.027000
|
||||
CVE-2023-26238,0,0,2040636560b69dac71d3a1f70fb82188c46e6ef72503448320867aa630e77126,2023-10-11T14:00:08.897000
|
||||
CVE-2023-26239,0,0,6f2f66df62807517a83faeebf30cdc21120adf02a7e1fe4f4a242979868a8dc4,2023-10-11T13:59:48.340000
|
||||
CVE-2023-2624,0,0,c6bbd03f17fadba71e8fc7abaa9bc0262d59891af837080a5b95ae4388082b91,2023-11-07T04:12:59.040000
|
||||
@ -221589,10 +221589,10 @@ CVE-2023-28597,0,0,1ebc618bc09256d6b6bfd5d891fd60c0e1e3dabd7930c0045a005e0f9a127
|
||||
CVE-2023-28598,0,0,2699c3dae97d97d930dd19d4ed91da9ca98a2c60bbc506549c591ce715010b21,2024-09-19T14:15:15.503000
|
||||
CVE-2023-28599,0,0,3fb087fde9542d18c1c71d72cf2fa711c1369f35782fccdf0e7b314f3923ac75,2024-09-19T14:15:15.780000
|
||||
CVE-2023-2860,0,0,012ee37a4c30c3774640e761fadec49362b4150a6f818d01258bacadc95a0cef,2023-11-07T04:13:25.817000
|
||||
CVE-2023-28600,0,0,de43edd04c05a2b2ee9dde4c2a1744b9fbca25677e07f0236d6c2680420ee6f8,2023-06-21T20:52:50.547000
|
||||
CVE-2023-28601,0,0,9f47422bba18065556d42e0b2c55285123cf959b1153305639eea413b1e3b58a,2023-06-21T20:53:18.250000
|
||||
CVE-2023-28600,0,1,dbc90dc15d6b00d9bb9f736af524ac5ba05316968a96c9f2131eee725fb802d6,2024-09-19T20:15:04.277000
|
||||
CVE-2023-28601,0,1,3a9f275b0419fc10bd717586c6c79ca21efbc0a5a3f9e0491b45637168e1b2a6,2024-09-19T20:15:04.560000
|
||||
CVE-2023-28602,0,0,d7c91871413ce039eb495efe6c08a5612bf9f7c0ad04e17723e3c05596b264d7,2023-06-21T20:53:37.857000
|
||||
CVE-2023-28603,0,0,9c9fb9da12e970933f8cbae83118875ff2c0814be18a792e65c2b2518835866e,2023-06-21T20:53:55.603000
|
||||
CVE-2023-28603,0,1,651ef75adafe02c8275907c79496561225c03cf15cc1bf2ed409c6abe7d3d9d1,2024-09-19T20:15:04.730000
|
||||
CVE-2023-28604,0,0,0a20c3db986bc11da1bdf7495a6c9df5ec56ecd69c914dc0966d4404db3dd9cd,2023-12-18T14:28:09.443000
|
||||
CVE-2023-28606,0,0,a7d1de97fa7e126955209f1f9bc60182dcca6db627bf91c842b9d5ad51fe7578,2023-03-24T18:28:30.927000
|
||||
CVE-2023-28607,0,0,77a9e66e244c63a6c39f4e869c705a00f50805fc37af08ee7d1a1003338f6e50,2023-03-24T18:28:05.027000
|
||||
@ -222909,7 +222909,7 @@ CVE-2023-30458,0,0,48c15acc8080e55dcad253897d98be087ef3a613a48400bab015ca689a5a0
|
||||
CVE-2023-30459,0,0,5203c98e26586eb418e577e0ae073865f5b068c7334ca2353e2b79f21ee05326,2023-04-25T15:56:57.943000
|
||||
CVE-2023-3046,0,0,ecac07b94baf4825a77ca2376c60e7599fadef86a6e35f7199431d4839633975,2023-07-31T18:10:15.423000
|
||||
CVE-2023-30463,0,0,578403456f513186915a79f10d80ead6b521f986e8efcb462d3b4f5fdfe361bc,2023-04-28T18:49:31
|
||||
CVE-2023-30464,0,1,3aae22a2e0f43047e68f03e1c3bca7b8e0d56717d49f06b096746b3b526617e7,2024-09-19T19:35:01.113000
|
||||
CVE-2023-30464,0,0,3aae22a2e0f43047e68f03e1c3bca7b8e0d56717d49f06b096746b3b526617e7,2024-09-19T19:35:01.113000
|
||||
CVE-2023-30465,0,0,03cb642b9d155b8fc540b2b5aab3b36429c8caf9db77ee091c34798766c54d43,2023-04-18T19:30:08.003000
|
||||
CVE-2023-30466,0,0,a09f27d23c57f262101e1beba7bf30085bba339c92bf87babd3fd4546142e636,2023-05-05T17:27:07.267000
|
||||
CVE-2023-30467,0,0,1f60c7af1fdcdbc8eac29b20ae332e43dda1d16453ce8a587bb1e16e4fb9ef03,2023-05-05T17:57:32.067000
|
||||
@ -225824,13 +225824,13 @@ CVE-2023-34112,0,0,7a0bafe259b6233aaf9ac037cdd12a903fc9782291c3de1471fa85682c929
|
||||
CVE-2023-34113,0,0,a149dfb170ab0b72518b62567efc3e5a4661f0b460929a98e523c685b047c90e,2024-09-04T19:15:28.867000
|
||||
CVE-2023-34114,0,0,7e3082cefbc8d762f21653a584a4bbdf2d0e97ae6f2e8648d9836343ac518514,2023-06-21T21:02:32.257000
|
||||
CVE-2023-34115,0,0,b6c7e94b77a06cf9ccb62eccc58f2e11c3f5fd238a5ffb9df839efd523663c79,2023-06-23T18:18:54.580000
|
||||
CVE-2023-34116,0,0,6dcde5ce994da344bf10667f5d3e299722f5cafecd41282f269721f821797f39,2023-07-18T21:08:43.267000
|
||||
CVE-2023-34116,0,1,7cad140348717ef3d2d002c4f967a30c6b140940820dc0a17beaebfa57bcde33,2024-09-19T20:15:05.063000
|
||||
CVE-2023-34117,0,0,5e9265a9a2df07aa6496224086c1106142271e0aa29b90902f19d04223d998d7,2024-09-19T14:15:15.933000
|
||||
CVE-2023-34118,0,0,e63e34f9588769c9a0efbbc4778c5a7d3deae72fea132e7db002598799fe551b,2023-07-19T00:47:57.243000
|
||||
CVE-2023-34119,0,0,e5c676a93d420f2d7675e3f0303f26d163fdaed5a82929ccc611f3ca5e9dfd05,2023-07-19T00:47:47.307000
|
||||
CVE-2023-34118,0,1,0248ef0e08c2b5c452e3d431b449159b58a85918e99e79ec3b3dd6f4c17420d0,2024-09-19T20:15:05.193000
|
||||
CVE-2023-34119,0,1,07a197dcf3100a535b6a6a5905fdc6f88dd4140df856c0869b8416f8a0e075d9,2024-09-19T20:15:05.337000
|
||||
CVE-2023-3412,0,0,fa386ee3a9fe7a905b9d51484a81e06965a7be356e97e88e4f6d71b171b4b283,2023-11-07T04:18:42.630000
|
||||
CVE-2023-34120,0,0,a73e91cc800769e2ee3ec2988b07b21ec120ae1c0d7f6809ac40a9d3f8a26934,2023-06-21T20:54:35.730000
|
||||
CVE-2023-34121,0,0,a849568df411bd762ddc83e712fd460e11b36cea6a16fa340bd8baebc5d5722a,2023-06-21T20:54:52.100000
|
||||
CVE-2023-34120,0,1,c2100d4c2c977bf5180308db89741ab34803dbd12c7456d82fe8ff8d7a19a8f5,2024-09-19T20:15:05.440000
|
||||
CVE-2023-34121,0,1,ef6203013589f1167fe8041cce84462d6934a10fea58a295577c731f07d65a6a,2024-09-19T20:15:05.570000
|
||||
CVE-2023-34122,0,0,f585e4332bb8bfbbab2b3607d749ecaf3551ff5d2da712c1ba0736863bada1bc,2024-09-04T19:15:29.087000
|
||||
CVE-2023-34123,0,0,4541664c9b388f72117e8b0e05f57bc0f2743f369452e049240a11d4dda9bba7,2023-07-25T14:12:34.320000
|
||||
CVE-2023-34124,0,0,53a8f325c1bcb94435dcaa68ff87243c15c106fb9b2b6c80d22a3e57e9985e31,2023-09-08T23:15:09.267000
|
||||
@ -227430,11 +227430,11 @@ CVE-2023-36529,0,0,080dd5a8e706e08f83d1e90238e5ba82341c6b9b991bc19eef824f2953a2b
|
||||
CVE-2023-3653,0,0,b94e4887e91cb18ebed2fcc692025aefff8f87f215422fe0d48d0999efdf8f2d,2023-08-16T08:15:41.653000
|
||||
CVE-2023-36530,0,0,39b6e7f1f65c17d756a12a67ff7ab49bb930555b16f3c7f0c3a9a9b08631f2f6,2023-08-16T13:59:24.893000
|
||||
CVE-2023-36532,0,0,346de183093708445d572201d1b91beba125a9edfa821a742e9c84556edc5810,2023-08-11T13:51:15.367000
|
||||
CVE-2023-36533,0,0,439806d55db50a839bc93deabf5a8f7d0a53b3998762eaedec4fd597ea07eb39,2023-08-11T13:42:42.633000
|
||||
CVE-2023-36533,0,1,7a3aa9a0281f92da6ec858b130bc8c49aff9e43e106a9e5252f45615815adb18,2024-09-19T20:15:05.733000
|
||||
CVE-2023-36534,0,0,6cbc71eb840a2042045eac9a1bed117b4c7c1b6f49d16fba7e1aef9691ba09df,2023-08-11T13:55:20.393000
|
||||
CVE-2023-36535,0,0,67b7dcf82c19974a887af94e14d304d1126dc66b1a6c22bfc06e1f0fb59ab96f,2023-08-11T14:01:17.010000
|
||||
CVE-2023-36536,0,0,0ee1547dcb523dc14ed9ebc847b60fd04a4995159e536e4c1d07969953d80c80,2023-07-19T00:27:45.237000
|
||||
CVE-2023-36537,0,0,697af02b7a8f933baeba04b6f60621383a0be4407a59219400377119d4594f23,2023-07-19T00:25:25.517000
|
||||
CVE-2023-36537,0,1,394843175e0ad188622ad56ec5745a099e29bc47411e8a302f9292eb043883c1,2024-09-19T20:15:05.913000
|
||||
CVE-2023-36538,0,0,00226399b1df7e922c2f186aa8a23b1e50f742272d35a8875a7def5b7adcf087,2023-07-19T00:24:36.927000
|
||||
CVE-2023-36539,0,0,4e965c290bb96df6ee863b2be075f02bab55edcaa147fa532567387b1a47d23b,2024-09-18T19:15:29.133000
|
||||
CVE-2023-3654,0,0,6c06260a9bd1d9a2cdc503513447bb73861a43e7934488e4e3446dc4edd9202f,2023-12-28T15:20:38.820000
|
||||
@ -230784,7 +230784,7 @@ CVE-2023-40650,0,0,352b9f0a42924a10ae1ec80f36517882f8a68e0276912361872f5d0ea9707
|
||||
CVE-2023-40651,0,0,4b7377a587c45b53860a7f5cef45bd5433fa18a2bfcf837a51529a6560be5347,2023-10-11T17:35:31.657000
|
||||
CVE-2023-40652,0,0,a18e3fe3990e80f554e1b4f55aa445ad66414551a973c9af4895cf611c407613,2023-10-11T17:35:49.427000
|
||||
CVE-2023-40653,0,0,88eeb937a3e4c749b0b049debb5babce5dcc6cdc9ad79aae89cfb1d78ecb1fb7,2024-02-15T20:53:14.203000
|
||||
CVE-2023-40654,0,1,75ef0ecb7c1b4344a60dff2f1c173adf0d9c0494c9c6a83bf973de2bf626831c,2024-09-19T18:35:02.187000
|
||||
CVE-2023-40654,0,0,75ef0ecb7c1b4344a60dff2f1c173adf0d9c0494c9c6a83bf973de2bf626831c,2024-09-19T18:35:02.187000
|
||||
CVE-2023-40655,0,0,4328cdbb4187e8b0234c53d0517ebc655578d5acdd9d3f7f4547eb76c952f50d,2023-12-19T17:09:11.113000
|
||||
CVE-2023-40656,0,0,19b49d5f2f04f7adc1e8ec42eabd1ec41b91195134dc054a4b5906547d33a983,2023-12-19T16:53:42.183000
|
||||
CVE-2023-40657,0,0,de372f5606a6a9c0eb353d9acefa85fa576d984d78e2f34c3e3bafeafb5ce44c,2023-12-19T16:10:07.447000
|
||||
@ -230961,7 +230961,7 @@ CVE-2023-4091,0,0,275b33b4fddb46deb9151eb35901fb683d99f1f7f7cd497ae93d7bd100a2d7
|
||||
CVE-2023-40915,0,0,924135b83c37dfb32e8e4a8213481ae4ff212f967d627d3fbc626bff3fc542fd,2023-08-29T16:11:13.697000
|
||||
CVE-2023-40918,0,0,fc090dba4a7f04d782d401de76c13cc5fa72b866aa75e7bf2cda17b838246fd5,2023-09-08T14:26:06.590000
|
||||
CVE-2023-4092,0,0,5f31fed2eab5b0f348baf91fdb36ca5a5c02cd3313e242f154778e0217ad366a,2023-09-21T13:13:44.877000
|
||||
CVE-2023-40920,0,0,1ce37d961f35bb79f89dfdc12d2048d3170ecec27e0651936a5b67911892d395,2023-10-11T17:26:13.903000
|
||||
CVE-2023-40920,0,1,ed4cd416951d4081f8432a4ebfdf927305fcbacbdf0df8dc7ce85070cee84b58,2024-09-19T21:35:03.493000
|
||||
CVE-2023-40921,0,0,2b146a84f7ce0a5839ef49947387f7f6957f6be4863120e88ced540c04ee7150,2023-12-18T19:31:35.590000
|
||||
CVE-2023-40922,0,0,dd40a0a468b1bd7ff4b99edc96361008b5a99f036dabadf2e5b4d99cea0eb8d8,2023-11-13T19:34:31.343000
|
||||
CVE-2023-40923,0,0,60ed4f36513d088660a805b25e6ab52170a4dea6e1ff217b52fd7d05d000a9e3,2023-11-21T02:28:24.897000
|
||||
@ -232640,7 +232640,7 @@ CVE-2023-43261,0,0,8d05d6b1c1376b6f8b4c289bacedb91e5ab5db50b13292f5bbe73649d4d61
|
||||
CVE-2023-43263,0,0,903e1fac0c430cf2431319bf1c799a5f984b41cc3cd553bdd078bb6a68ccd3c9,2023-09-29T18:07:37.833000
|
||||
CVE-2023-43267,0,0,89ea299c224833167956d392ad2a8dffd61ce6a44dcff4838abe297d3b0621d8,2023-10-04T17:06:47.097000
|
||||
CVE-2023-43268,0,0,d805055f2448f65267d86a689dbfd9354ad2e4cebe8a1c9dee7b136709bd1049,2023-10-04T17:06:28.700000
|
||||
CVE-2023-43269,0,0,755808082a3d6619a6301c5f20cb3ce8c1f2c676d10cde728a0eb3981cab8e74,2023-10-13T15:03:11.810000
|
||||
CVE-2023-43269,0,1,785d4bf3e625fedf44f06fb981c9b90ed09fe11b927656db083e21d31e5b6b2a,2024-09-19T20:35:11.050000
|
||||
CVE-2023-4327,0,0,51586f0502f63608ffb3478e75ea9411efdae92ae92e459f2a1048bb10ef733a,2024-09-05T22:15:03.240000
|
||||
CVE-2023-43270,0,0,8a74cd07994cf08e20770939cd30ce47227b654ab99229bc9b09ea6f5c7e656f,2023-09-25T13:43:34.870000
|
||||
CVE-2023-43271,0,0,b638f0a53dac82b777acfdc20c2f8998778c958c894beb64990d47b1c809484c,2023-10-16T18:09:54.913000
|
||||
@ -232650,7 +232650,7 @@ CVE-2023-43278,0,0,bbf061d83d67120f51666ab71df16ebf01407dd058278fae4fe9b8df8566b
|
||||
CVE-2023-43279,0,0,91729a4f1564f58782a825dba4e4db114d46bf6363a4bcaca381131120631ab0,2024-03-24T03:15:07.743000
|
||||
CVE-2023-4328,0,0,6ee5166ac0675910219ed499af04f7d567df014e88b855812a05c6a3ae4898fc,2024-09-05T22:15:03.413000
|
||||
CVE-2023-43281,0,0,a8043741c9358a4c4a6eb393caa7cb080a33c75aaafb8cfaf3705b4ad1ef0d37,2023-11-07T04:21:19.967000
|
||||
CVE-2023-43284,0,0,d19af47cad8f003ee912aefb8b077df83455ebeb41fc85cb4eac052cd716193d,2023-11-22T15:15:09.303000
|
||||
CVE-2023-43284,0,1,eb069cb8ee8a4baf7f83215c049a2651e0474ffdc63962764af570e0ae6fe118,2024-09-19T20:35:11.857000
|
||||
CVE-2023-4329,0,0,8b75efb685335d1476e96d7eec54e652c5d16a0d171dc01ce34df40a6d7b080d,2023-08-21T18:40:42.853000
|
||||
CVE-2023-43291,0,0,d5ba19d030168db77bf7db7e6beafa094201b9e344ad7626faccfa0f9a3f170d,2023-09-29T17:25:25.957000
|
||||
CVE-2023-43292,0,0,24ca0ca0034ab3716a04050b8953f7ca74741d3547dbf42a22c571c80aa2ce0b,2024-08-16T17:35:02.787000
|
||||
@ -233119,9 +233119,9 @@ CVE-2023-43976,0,0,02187eddeb3770a7f1febec00624360ee5250e93dc31f3e8b51b3ba1d9bb4
|
||||
CVE-2023-43979,0,0,b42ecb5c3472ee75481a81f4bcc721f9df20b88fcd306940b556920c1fd7490b,2023-11-21T14:07:31.363000
|
||||
CVE-2023-4398,0,0,941805a464290ceda704bc08a9de74a80348460471c7271929b1e2e9a230208e,2023-12-04T18:04:39.363000
|
||||
CVE-2023-43980,0,0,bbbdf96fe43913bc9148a2be4e4cf79c095e8946d088cfcca396bde192a42883,2023-10-06T16:26:51.337000
|
||||
CVE-2023-43981,0,0,7bc0b04a874fb37912d5a49421c2f5f408de1077870392e33bb57c9ca9c75f89,2023-10-07T02:52:59.353000
|
||||
CVE-2023-43981,0,1,9e5818fc3a0cfa1aa716091d7d558767c014c1deeaba42fa5935d89053edae98,2024-09-19T20:35:12.393000
|
||||
CVE-2023-43982,0,0,36c050839890ac22e9c1d01ac6e12f62ba92c226ca1aa60fc6850304f993fad5,2023-11-09T22:07:27.420000
|
||||
CVE-2023-43983,0,1,9159a914c282ab44b718a500a523f5b25649be59fcdc42674f05ea6f2949ffee,2024-09-19T19:35:04.850000
|
||||
CVE-2023-43983,0,0,9159a914c282ab44b718a500a523f5b25649be59fcdc42674f05ea6f2949ffee,2024-09-19T19:35:04.850000
|
||||
CVE-2023-43984,0,0,734f41a89a1d8239b9e46c66d768f28b73875d461f17b4c52b2f21e0399d5916,2024-09-05T13:35:00.617000
|
||||
CVE-2023-43985,0,0,d6426e07dde5bc7e003721bf3af2143d307be62b95406f9014be4ad2380774e6,2024-01-25T20:07:56.693000
|
||||
CVE-2023-43986,0,0,f6e814df340a370055926dfb76c8e5c7ca2c32dbd5d8ca11c76fab82aae5e055,2023-10-25T19:57:40.860000
|
||||
@ -233632,16 +233632,16 @@ CVE-2023-44821,0,0,caf500e59c1c1f0ae19f4b938cc2f915cdc2795e1d689b767664cd685e996
|
||||
CVE-2023-44824,0,0,4c5402825d85eb712bc15b48d1e40cd1b43f468147816eba46a8463681cc81dc,2024-04-17T16:21:04.383000
|
||||
CVE-2023-44826,0,0,d910375824f905ca21c7c410256be31e425b27de28c7729a6680ad36f36554d8,2023-10-11T19:16:19.453000
|
||||
CVE-2023-44827,0,0,02e6e2201de61ceeb990db92440acc01432b1a7fa7a263597da8a5526fba6287,2023-10-11T19:16:58.217000
|
||||
CVE-2023-44828,0,0,671c20cf735d75bee24f2d501da4a864aa5e004ea7f4133eb75a03eac2af6ee0,2023-10-07T03:15:05.237000
|
||||
CVE-2023-44829,0,0,5db7752f8ecb00403264ccf21f2659fe0ddfcfbbceb6f5c8ddddc55c7780bf5e,2023-10-07T03:15:25.163000
|
||||
CVE-2023-44830,0,0,f49977dfe516745c571ff61090d55c8fc4270a5fd142bbbdb6ce53b5908f7adf,2023-10-07T03:18:38.277000
|
||||
CVE-2023-44831,0,0,b97e9b1170ac4de59d7ff19e0fb6f009616c576284357e866bbfe60abc61bb12,2023-10-07T03:16:56.033000
|
||||
CVE-2023-44832,0,0,9c1b721dcfa1a8d8e89ace89b9c1b3507031d5009c9747a3da72e27d19da2342,2023-10-07T03:15:46.517000
|
||||
CVE-2023-44833,0,1,0c804cc3c43204c5befa90250fbfba4df8a5bf5007c06fd8daefda112103f533,2024-09-19T19:35:05.797000
|
||||
CVE-2023-44834,0,1,08996b4cba22df2276f30026a7a29031ecdcee6cb18029b0142bf849bd6c516d,2024-09-19T19:35:06.803000
|
||||
CVE-2023-44835,0,1,e17d982550d6512cf6fe9c365f1e06a437afe69d67fde550145cafbe5bb73011,2024-09-19T19:35:07.573000
|
||||
CVE-2023-44836,0,1,62a6ff921417f32c3e565b38aade4a341ea0660c3ac13f7991d1da446ddfc7c8,2024-09-19T19:35:08.333000
|
||||
CVE-2023-44837,0,1,6edc4c0f7cb805a39f28f03e490a78fd2c9751dfa21d9ab0c3067871839fa870,2024-09-19T19:35:09.180000
|
||||
CVE-2023-44828,0,1,17cdec040e8560e717609265e11acc3fd45d6ae2630bd6277f22b7e15e617f73,2024-09-19T20:35:14
|
||||
CVE-2023-44829,0,1,883c195fcfebcab4a26816f9f7861ac18792e960694405d832ba44591298c2f2,2024-09-19T20:35:14.773000
|
||||
CVE-2023-44830,0,1,0bb12a70f152add378f1a856a47f22a2f3dc4e11f22307c841c518112d6f0f26,2024-09-19T20:35:15.623000
|
||||
CVE-2023-44831,0,1,f74e1daf69c6fd0ba02859ed32f582eb77c88abb081f03f72bdd4e42410f9fec,2024-09-19T20:35:16.490000
|
||||
CVE-2023-44832,0,1,c3b1ac4f1a1485463d95ed8985830ce6f2f55210fbf5ca415899d31dc4a30a73,2024-09-19T20:35:17.307000
|
||||
CVE-2023-44833,0,0,0c804cc3c43204c5befa90250fbfba4df8a5bf5007c06fd8daefda112103f533,2024-09-19T19:35:05.797000
|
||||
CVE-2023-44834,0,0,08996b4cba22df2276f30026a7a29031ecdcee6cb18029b0142bf849bd6c516d,2024-09-19T19:35:06.803000
|
||||
CVE-2023-44835,0,0,e17d982550d6512cf6fe9c365f1e06a437afe69d67fde550145cafbe5bb73011,2024-09-19T19:35:07.573000
|
||||
CVE-2023-44836,0,0,62a6ff921417f32c3e565b38aade4a341ea0660c3ac13f7991d1da446ddfc7c8,2024-09-19T19:35:08.333000
|
||||
CVE-2023-44837,0,0,6edc4c0f7cb805a39f28f03e490a78fd2c9751dfa21d9ab0c3067871839fa870,2024-09-19T19:35:09.180000
|
||||
CVE-2023-44838,0,0,826bd96275d8c94caef15f783d57a0f555324313131d73e5992ad76971191292,2023-10-06T15:18:30.847000
|
||||
CVE-2023-44839,0,0,a0e587d190a99eed8b1b0978216fd7d1258814f55b89567589a009468b22137d,2023-10-06T14:59:00.183000
|
||||
CVE-2023-44846,0,0,f34b0705d17778a0a98e8c488cd79f0636bd3cd4cc85846f0269be4cceaf4a53,2024-09-19T15:35:06.370000
|
||||
@ -233932,7 +233932,7 @@ CVE-2023-45279,0,0,898ce636410e7ee87b3770444fcac6d3f827786fce9dcb4b413820160cb82
|
||||
CVE-2023-4528,0,0,fb6f9d976b6ad831fd6e3df0b8811afbfab41e66da4fc9cbcc5aac0b556464af,2023-09-13T01:02:46.907000
|
||||
CVE-2023-45280,0,0,587e5e1ce24b098e3665aa207a0ea7ded3e3371b3bf4c75269401122fcd388cb,2023-10-25T19:05:48.603000
|
||||
CVE-2023-45281,0,0,cd0978c74ba2a3ae2f0cd409990a0511bfb93e86139e2ad7fb10f6ba5d1be143,2023-10-25T14:47:01.093000
|
||||
CVE-2023-45282,0,1,368524b1a0238251df4f98fe6fa760382cdd08500bee7e40ce4ccc29c50e3928,2024-09-19T19:35:10.307000
|
||||
CVE-2023-45282,0,0,368524b1a0238251df4f98fe6fa760382cdd08500bee7e40ce4ccc29c50e3928,2024-09-19T19:35:10.307000
|
||||
CVE-2023-45283,0,0,cd5d279d60eb7cff2b94547ec8e6d00135f36cff01f6563cfb3f789184507d96,2023-12-14T10:15:07.947000
|
||||
CVE-2023-45284,0,0,73d119dc77c426359595c7c8f0829890e7bf623858b010da63a96abc58828085,2024-09-03T19:35:05.593000
|
||||
CVE-2023-45285,0,0,77883aa881bda99f1d19ba35b11a9a1e8caee32118b6c24da9d7ea21930a300d,2024-01-20T04:15:08.013000
|
||||
@ -233943,7 +233943,7 @@ CVE-2023-45289,0,0,55227dc74f3b7eff2b0242a09fa3e698d7b0d3f59cb4bf8a9cc5e9e130d6e
|
||||
CVE-2023-45290,0,0,f22fc13bdae5e6edab97f7e0fddab9822bb3ae91388d56c6e1d234cdc0e49b4d,2024-05-01T17:15:26.040000
|
||||
CVE-2023-45292,0,0,9325e9e3b78b777445115a8da3de2cb25249d0f8ef4a9d3921e74e58a0d0d777,2023-12-14T16:26:54.007000
|
||||
CVE-2023-4530,0,0,eeb9daf8b96668373bbb47227634f4b43c799c25d28cf12757e3af97741f4f52,2023-10-11T17:19:19.627000
|
||||
CVE-2023-45303,0,1,688e5be499770cb09d83a318de82d649f890929552dc6a722b4fae6f03dffe83,2024-09-19T19:35:11.117000
|
||||
CVE-2023-45303,0,0,688e5be499770cb09d83a318de82d649f890929552dc6a722b4fae6f03dffe83,2024-09-19T19:35:11.117000
|
||||
CVE-2023-4531,0,0,06add8a6070b98064716f1fe58388261ce4316eee88c526ba1a6617b07e80b19,2023-09-08T16:51:00.220000
|
||||
CVE-2023-45311,0,0,71d49c76ae9cfe1ccb4815d505b4234841f0d63a53ece89b238db654f857d950,2023-11-28T07:15:43.260000
|
||||
CVE-2023-45312,0,0,461d9c4a1f47fcd79a0ef49d81d7b730848406a39d4ed8738d381c26b5b04ed4,2024-09-18T20:35:04.773000
|
||||
@ -234002,11 +234002,11 @@ CVE-2023-45364,0,0,f79b09441be35e30c9a56051fad391b8b7b6b0ac345cea10067065f1c5feb
|
||||
CVE-2023-45367,0,0,ac61fe513de8db0ac0e72342e10d19f9e37057aaece3f3b1a2e37f81f09ae966,2023-10-12T16:04:00.317000
|
||||
CVE-2023-45369,0,0,5f3d7f66c5694839640651e4f0443a7fcea9aecd3143e1a52583a93a833c4cc3,2023-10-12T16:04:12.437000
|
||||
CVE-2023-4537,0,0,d55e9c2ec2d6a309b7146da78217b22dabb54a472777f14cd37d2689a428a754,2024-02-15T14:28:31.380000
|
||||
CVE-2023-45370,0,1,6d39915c7b4e81e2d0c3aec33806f0dcc7fcd46c4396757c12a20cd6a778727b,2024-09-19T18:35:05.060000
|
||||
CVE-2023-45370,0,0,6d39915c7b4e81e2d0c3aec33806f0dcc7fcd46c4396757c12a20cd6a778727b,2024-09-19T18:35:05.060000
|
||||
CVE-2023-45371,0,0,e59624745c98d5ae12576761e9fa77931a5e4e576fbe272ff680a617966dae6b,2023-10-12T16:04:48.003000
|
||||
CVE-2023-45372,0,1,45894adadb2f768beda76581b30f7cd51ed489358007696ef68936d55cea88aa,2024-09-19T18:35:05.910000
|
||||
CVE-2023-45372,0,0,45894adadb2f768beda76581b30f7cd51ed489358007696ef68936d55cea88aa,2024-09-19T18:35:05.910000
|
||||
CVE-2023-45373,0,0,eae3bb62b6bed4d1a32b5243afb1d8915435578a2d4194a9f7539a9a665df972,2023-10-12T16:05:49.617000
|
||||
CVE-2023-45374,0,1,e7f1257195844480b5ab4252c7ad2dfc96c3635b0d1bdb6f06b94f101e8f72a1,2024-09-19T18:35:06.723000
|
||||
CVE-2023-45374,0,0,e7f1257195844480b5ab4252c7ad2dfc96c3635b0d1bdb6f06b94f101e8f72a1,2024-09-19T18:35:06.723000
|
||||
CVE-2023-45375,0,0,76059dcd6e9ba7e45e2b8af4dc253230088aab2bc0c3d542b3bea56d2109e241,2023-10-23T13:53:31.007000
|
||||
CVE-2023-45376,0,0,1752dcacc13952823593868aaeb32cb69bcd8a15123706c8973983a514b83041,2023-10-31T18:06:10.480000
|
||||
CVE-2023-45377,0,0,8a38d8223faf098b86051796f3101a98163b9ac34429e2c21be3610b867c9a30,2023-11-30T05:42:43.520000
|
||||
@ -234292,7 +234292,7 @@ CVE-2023-45815,0,0,381db8ec2d60cf9d70138a9d8575df9d816b1ef03a4ceb545fa7fdc065d01
|
||||
CVE-2023-45816,0,0,fc7c9d52628d81aa06d2095118a7e61badcb7b879ac6aa1f5817abfdccbe4815,2023-11-16T19:38:00.193000
|
||||
CVE-2023-45818,0,0,5599bbff76f9abbfbc1d07cce206fcc712b2111034120fc45e2caf24476be2d8,2023-10-26T16:32:24.767000
|
||||
CVE-2023-45819,0,0,ea1566a0fb1a952b25413ab14d6f21b6c3f9ffe167f5ea428676eeb376e29ff5,2023-10-26T16:30:27.223000
|
||||
CVE-2023-4582,0,0,da44116cf4468da4353cbb90d496757fba444591065d9a75266723a31146a9a3,2023-09-14T03:52:38.367000
|
||||
CVE-2023-4582,0,1,7b3abe25df0e96f6cccb8e076f11761c931c1642548ef52dd59cdff69dd28186,2024-09-19T20:35:19.947000
|
||||
CVE-2023-45820,0,0,945ee351c44d15089b06c280530b821b21f9767ef1c42eda5c8722229c74bd2f,2023-10-25T20:27:12.457000
|
||||
CVE-2023-45821,0,0,4dfdda840410ba25f81588ce8fc22d30fb032aca0e9addf708abfeb968f70135,2023-10-31T15:48:49.977000
|
||||
CVE-2023-45822,0,0,619843aee15f0de9161f8f8a43acd13a7075a48995a21996499f664c636789f9,2023-10-30T15:37:49.727000
|
||||
@ -234302,7 +234302,7 @@ CVE-2023-45825,0,0,a83d2154d6a0f74053f2e47beaaa650521367a3038c60a23369118d9f8936
|
||||
CVE-2023-45826,0,0,fc8c45e9e8ea12059fa59c37540d8e7f98f23a471cd0c14fbe60279d24c395c1,2023-10-27T15:27:30.243000
|
||||
CVE-2023-45827,0,0,c03e30d7dc6ab22ebe929e9d8f16388f96322e8ebc186388af2d068f242825c3,2023-11-14T17:10:21.330000
|
||||
CVE-2023-45829,0,0,3754488bfa38597dc5301b475641727fa16039ce4e84073305f3ed077b8fcc16,2023-10-28T03:27:33.903000
|
||||
CVE-2023-4583,0,0,769d3212363e043c452df0558efd814621eb2c71a3bb8f27919d14d8dbf48def,2023-09-14T03:52:30.463000
|
||||
CVE-2023-4583,0,1,f34e68503e6f27865fdb5f892a287379e4682286bbfdaa6bb0c652f17d84a5f4,2024-09-19T20:35:20.763000
|
||||
CVE-2023-45830,0,0,e93c56ded03c8deb613479cc3ad121b8f246009db67f735a112274b94d28e1d1,2024-07-08T10:15:02.867000
|
||||
CVE-2023-45831,0,0,b702b04d14f4777b4083415b5fb28e46207cb55c2cfc24bd6526af4eb5d0d926,2023-10-19T18:35:15.887000
|
||||
CVE-2023-45832,0,0,301bd23c2f17529b218c96923e12d8aaa81c12872ea9c911a933da05e6b647ad,2023-11-01T16:02:09.867000
|
||||
@ -234322,7 +234322,7 @@ CVE-2023-45845,0,0,9522a3662f29e92e7ad7c10b0718fcfbd446326415f192be0026a1d413e6a
|
||||
CVE-2023-45846,0,0,7e97bec05528c5d3c814716d330ec4cbbf0b8dfe300e92e8f8b68aeca1cee284,2024-07-03T01:41:56.303000
|
||||
CVE-2023-45847,0,0,f7a26b5da655e9a29f01aa31d2e32a7796ef0da3d21aadd9906e8c1df71a55c7,2023-12-14T18:20:40.697000
|
||||
CVE-2023-45849,0,0,4630a94faf635ed71b5e98033836bda86572afa3061550d59c00be4ed0b6e7b0,2023-12-08T00:15:07.350000
|
||||
CVE-2023-4585,0,1,e01dbed274463ee65ebfe5933af4ba4d70e0f55b294738ea323aa184822c558a,2024-09-19T19:35:12.583000
|
||||
CVE-2023-4585,0,0,e01dbed274463ee65ebfe5933af4ba4d70e0f55b294738ea323aa184822c558a,2024-09-19T19:35:12.583000
|
||||
CVE-2023-45850,0,0,54f0aa089c8ebefba26fc84db9cc11c8567f61a11232a6923c6e132d5e43be38,2024-02-14T18:15:46.203000
|
||||
CVE-2023-45851,0,0,a3947611dcf22f6805d628e99aaae522253196bfe6bc115a5e6e07eee5573efb,2023-11-06T14:33:29.510000
|
||||
CVE-2023-45852,0,0,9f9928a73d27493bd16960e42e3753b817edb53bf0a279e8c73f0394583e4b85,2023-10-18T21:02:05.847000
|
||||
@ -234724,9 +234724,9 @@ CVE-2023-46375,0,0,84d5f59477bdb6e7348bcfcf2c36a58896f127e0ba6da6c408dfc1fd96ed6
|
||||
CVE-2023-46376,0,0,a18e9d021664f17accb6b1583792a9a8d7514d3d3dd1baf1ca18e1fcd59ba2c0,2023-11-03T20:11:37.757000
|
||||
CVE-2023-46377,0,0,3bb3f7894a7f9d7aaa69f0e876764e40500c22caad9e4790582ca41a59d18f7d,2023-11-21T16:15:42.713000
|
||||
CVE-2023-46378,0,0,a12146fa3d7597e322af8e40f0f69ae518730ec831fca511dcbbdf4ce1a550fe,2023-11-08T23:17:43.707000
|
||||
CVE-2023-46380,0,0,51de3bb958305d8f2d54f7c54ec7af10a375378098a5335c58fa49de0e106e3f,2023-12-14T08:15:41.037000
|
||||
CVE-2023-46381,0,0,42856c2abe0d4a9c0db75de54357b5b9f8c96b633237d722627e56fc5d990be1,2023-12-14T08:15:41.450000
|
||||
CVE-2023-46382,0,0,4cfbe699864e403f77d06d5e7e5ac59073599e03c122ec8154a7523bd25bd29f,2023-12-14T08:15:41.690000
|
||||
CVE-2023-46380,0,1,cfb27fba40474525504fd1fc1e2fe2f9f0ae2fba0a8ab88f11c387453b3bb20a,2024-09-19T20:15:06.353000
|
||||
CVE-2023-46381,0,1,a447809038597a633db4a285838b0b9800cb1325cbcb36f551545bc235769afa,2024-09-19T20:15:06.463000
|
||||
CVE-2023-46382,0,1,1fdf18165e958522f0af25e32e7179889fd310f10639fbfb6c52cb54cdd6b130,2024-09-19T20:15:06.523000
|
||||
CVE-2023-46383,0,0,31af6bfe5ed0169159615899fc7543ddcb6fa2a8f9567ebd148ad8f756e81645,2023-12-14T08:15:41.873000
|
||||
CVE-2023-46384,0,0,4b111952585f944013874793da533c9398e3c11ea09d6cd66aee745fbced957f,2023-12-14T08:15:42.140000
|
||||
CVE-2023-46385,0,0,35f1fe0e094fb802af8df5755c3f7c24ab5442ff02f09a43578ed3130b3b6bec,2023-12-14T08:15:42.350000
|
||||
@ -241353,7 +241353,7 @@ CVE-2024-0216,0,0,5db0150a6defe94c534ea06b438d3680a2481b7203149642bcafa6eeb47bdd
|
||||
CVE-2024-0217,0,0,dff0ee3a755b5789dbb3bda1883ae669fffbc3624903a03817fe2262041b1ae5,2024-02-02T15:20:25.843000
|
||||
CVE-2024-0218,0,0,e0f7082bfe7bdb2b72e28d6537974d07e10b08637004dd51d50eee8295bc543b,2024-05-28T13:15:10.927000
|
||||
CVE-2024-0219,0,0,b7044527e6312a645cfd11fb721216b84cfeb88504d813d0c3eb89e1835d8e0b,2024-02-09T17:15:31.870000
|
||||
CVE-2024-0220,0,1,4478b53c04077624854d5b69c9fe95d675429fc1d7fab33a90dc864a1050bb80,2024-09-19T18:15:05
|
||||
CVE-2024-0220,0,0,4478b53c04077624854d5b69c9fe95d675429fc1d7fab33a90dc864a1050bb80,2024-09-19T18:15:05
|
||||
CVE-2024-0221,0,0,50e4123bdd9330b9856aaead23e8d95b6f2e4b19cc54edeb2503c031d7426fb8,2024-02-13T18:48:37.837000
|
||||
CVE-2024-0222,0,0,b3f6fc9b6decb29bb4c0f2b45d4d98de1d7ddc35add0e737e26b11cd8923ec19,2024-01-31T17:15:29.990000
|
||||
CVE-2024-0223,0,0,38a64de470819b095ee0b7b4b77ec34c2ec8923a888de65b096c5951a52e2499,2024-01-31T17:15:30.487000
|
||||
@ -241458,7 +241458,7 @@ CVE-2024-0325,0,0,b11f466ff4ff08fafe0e1564b77e877f7ef01996631763e0cca61be78af48c
|
||||
CVE-2024-0326,0,0,46531da0f2066fdd9f046a34fce12789358ed55a6f22b205eff42d5de697942f,2024-03-13T18:16:18.563000
|
||||
CVE-2024-0333,0,0,9eaf58c044c101ac9ee4da325dc0cbe7baa26316edb9c32b68718e9200d8ba0e,2024-01-18T19:39:16.620000
|
||||
CVE-2024-0334,0,0,f64e24da86d08ef5624336a0a2ef7f631f77b98c0c17027395f19c584275ec3f,2024-05-01T19:50:25.633000
|
||||
CVE-2024-0335,0,1,e7e090fd097a40a14fdf48dd790743e7f5ab16f43bcf6eb22bfc1b29fd2377db,2024-09-19T18:15:05.150000
|
||||
CVE-2024-0335,0,0,e7e090fd097a40a14fdf48dd790743e7f5ab16f43bcf6eb22bfc1b29fd2377db,2024-09-19T18:15:05.150000
|
||||
CVE-2024-0336,0,0,9aee920f4a5a0c04ff35e8f707096c50efb4022bceb3480b4da076fedf257149,2024-06-03T14:46:24.250000
|
||||
CVE-2024-0337,0,0,eee1079f39054de873ab2c1c61df1366e60a284dc7a482cc04bc23b2010b4529,2024-08-01T19:35:09.993000
|
||||
CVE-2024-0338,0,0,70505a995548ae9a90a762e5c254ec8226f91c5690ecf3e95b0138eb38a5ec9e,2024-02-09T19:28:45.703000
|
||||
@ -243249,7 +243249,7 @@ CVE-2024-20394,0,0,ef9256f36e7609b8b050262ee885b4f4c47119c80c5a1a8288a0a5eef0d4f
|
||||
CVE-2024-20395,0,0,28ce7d382757f62de6c6fa8be8ab2c7d5b7fe481f67f112d437fdc5648f5ed0d,2024-07-18T12:28:43.707000
|
||||
CVE-2024-20396,0,0,ab24e73adad18da7437bdd92525b27eaf5bf0f1df88229897bcf01b790a24b3d,2024-07-18T12:28:43.707000
|
||||
CVE-2024-20398,0,0,e5f8f1014ec093b19c3aee1e58f0d383406da3978da2e5e7f51f4a4a4493a0ae,2024-09-12T12:35:54.013000
|
||||
CVE-2024-20399,0,0,aaa28123a1d0398c6962f2e8bd8e12b0b06fafe6901cc3060d103023db6feb09,2024-09-17T19:15:24.747000
|
||||
CVE-2024-20399,0,1,164174c543ab6ae29aa0171daa283df0ddb65a3fecfd5ef8bf748eebe57b6b05,2024-09-19T20:05:25.107000
|
||||
CVE-2024-2040,0,0,84818b4f00c676396e69702449b7daec96ba4021835b05a5adb074a919ab8480,2024-07-08T14:18:10.367000
|
||||
CVE-2024-20400,0,0,e22f5359b4eae3d1123c96473d077f1ed8cfcffe9256c923e22249fabd71dd12,2024-07-18T12:28:43.707000
|
||||
CVE-2024-20401,0,0,4e570494182ec3fb0c9186b46f7948499e59b61e9f8ec1f0ca5200f010002753,2024-07-18T12:28:43.707000
|
||||
@ -246427,7 +246427,7 @@ CVE-2024-25015,0,0,4c1212c8f769823bd4e7049fb129f848dc20c143fc1cc72b02abca5f7451e
|
||||
CVE-2024-25016,0,0,0e9311458b59df4142779e7a8b1d9bd170deea1a4bb4a555b03bbf822c263b92,2024-03-04T13:58:23.447000
|
||||
CVE-2024-2502,0,0,5db5ed3649b395e84b1ef1ea57e3373879dc28bf7136036f8d40e08ab963dda1,2024-08-30T13:00:05.390000
|
||||
CVE-2024-25021,0,0,8332f86306f4ceab760e5f5e3a003f3f5c62fd1b6b574c6e3af70a41de71cd64,2024-02-22T19:07:27.197000
|
||||
CVE-2024-25023,0,0,3b6e01d80c9261e3c9d5f00ef664e0cb38b680e426f57b9aa0b21aa4414e149e,2024-07-11T13:05:54.930000
|
||||
CVE-2024-25023,0,1,bfa23d4bb52946f389f1743b48c3dffc3c3bbcf6f5e8a57fb029d24dc49627fc,2024-09-19T21:14:27.027000
|
||||
CVE-2024-25024,0,0,c5213c97e29706cc8502e6ba764e983599ae5293cf5cf0bdf7f7d6886ba77ef4,2024-08-28T21:53:10.720000
|
||||
CVE-2024-25026,0,0,51187726c38059d92f52ec9be2e9837ba43ea1016581cd7fb52f8ca8d70895d6,2024-04-25T13:18:02.660000
|
||||
CVE-2024-25027,0,0,119aec53d2012d07639e5485533be77b5b9837d2988927dbbb62ff5ba0a76624,2024-04-02T17:57:34.440000
|
||||
@ -246835,7 +246835,7 @@ CVE-2024-25657,0,0,4b43facfdcb326ebfd5828d4d462b595cdd46fa54d1b75d686b3ce7b78fb3
|
||||
CVE-2024-2566,0,0,087689b93c35b2d23260489bf51254e9dbbd90f4e3c3903cdc8f028cf28ab7f4,2024-05-17T02:38:19.710000
|
||||
CVE-2024-25662,0,0,731e4a5b21d04f93342e67f003659a0e732cf91f4619ab2aeea54741b462d915,2024-05-14T16:13:02.773000
|
||||
CVE-2024-2567,0,0,894c1cbf5b078d66a72f8e7a485b38287a781715f51ccca3dd4b9958cfc1e069,2024-08-01T20:15:15.443000
|
||||
CVE-2024-25673,1,1,81e639b1f7fbf8754b4e267411fcc130c67ff83ee62eb8538403064c33f649ae,2024-09-19T19:15:24.093000
|
||||
CVE-2024-25673,0,0,81e639b1f7fbf8754b4e267411fcc130c67ff83ee62eb8538403064c33f649ae,2024-09-19T19:15:24.093000
|
||||
CVE-2024-25674,0,0,a93e87559f3310a2a7f0b0950089f8e58e9cb97b1d3ba4777163ca1197a89f40,2024-08-26T19:35:20.977000
|
||||
CVE-2024-25675,0,0,557139e6badf2f7cbea8b1e635432a1b7bfe50ad3cd4ea09e589187f2a0848c5,2024-02-12T14:30:28.640000
|
||||
CVE-2024-25676,0,0,a08186e93b8e72e7d0fccd86e2d99f3ceb03caa74e9fe0fb3ce31f97ab303d23,2024-05-02T13:27:25.103000
|
||||
@ -248272,7 +248272,7 @@ CVE-2024-27344,0,0,f44089be578e3c3f48649a645c31f1e56b7af812f6729ae649c4c888c51a0
|
||||
CVE-2024-27345,0,0,639d5d88d955f31b68d7ac65a92996a1944759655dec4dc8cdc403f6280e1a1d,2024-04-03T17:24:18.150000
|
||||
CVE-2024-27346,0,0,8179d23e6ef0789d37a1db2f177021069373bc1f8d521305cdf369e9fa46745f,2024-04-03T17:24:18.150000
|
||||
CVE-2024-27347,0,0,aa6bb96be7bc41dc2b8b854a600f1bcc7744ab20513fb28f41f361c130b3e452,2024-07-03T01:50:32.683000
|
||||
CVE-2024-27348,0,1,e96554afb28cbad659be9176aa4ca79d5b61a879b075bffbc242daa401baea3d,2024-09-19T19:55:24.297000
|
||||
CVE-2024-27348,0,0,e96554afb28cbad659be9176aa4ca79d5b61a879b075bffbc242daa401baea3d,2024-09-19T19:55:24.297000
|
||||
CVE-2024-27349,0,0,88b94935f18791608992594036627e2f38bf8f66250b8863a7cf3ad8bea894c1,2024-07-03T01:50:32.910000
|
||||
CVE-2024-2735,0,0,f01bcec823b48d788d322e20cf82a4a7470344ba299463eb0cff5623d9be778d,2024-04-10T13:23:38.787000
|
||||
CVE-2024-27350,0,0,0fb1d64ef379194a46b064cdf7260ff9ff0ea87fdbd1fcde9fffd1770088e5e3,2024-02-26T16:32:25.577000
|
||||
@ -251148,9 +251148,9 @@ CVE-2024-31410,0,0,23155e757f76d6df45e3314d3045af8745f87c8b7ddeb1d4a8dad059bea07
|
||||
CVE-2024-31411,0,0,4ae8e92f24ab80cd4eeff80dde44b86a5e45219785c2eb09757e8f4f11b858d3,2024-08-22T16:07:06.267000
|
||||
CVE-2024-31412,0,0,91783357bf64a7c6a8a8fc4dd61d86515f3c43b87fd5026db89b258496a563c2,2024-08-01T13:50:54.890000
|
||||
CVE-2024-31413,0,0,bb1445e4de4fe6231d24b5144c9534a3d5daec05348443646de7635aa924272f,2024-07-03T01:54:50.813000
|
||||
CVE-2024-31414,0,1,e387f0c66bf477a9777c6073fbe8e1bf77c81fd3f2da5d969d5f9db7d198c8b7,2024-09-19T18:48:25.893000
|
||||
CVE-2024-31415,0,1,4af626a01b2b209263b9f18365da822790629e58a8f2859d318f652182ce6cf7,2024-09-19T18:50:27.827000
|
||||
CVE-2024-31416,0,1,0d8c2b6f5939f620709e7ed49bc9a2b299d23aa8d9465d6808a0e5cb060665e0,2024-09-19T19:06:59.787000
|
||||
CVE-2024-31414,0,0,e387f0c66bf477a9777c6073fbe8e1bf77c81fd3f2da5d969d5f9db7d198c8b7,2024-09-19T18:48:25.893000
|
||||
CVE-2024-31415,0,0,4af626a01b2b209263b9f18365da822790629e58a8f2859d318f652182ce6cf7,2024-09-19T18:50:27.827000
|
||||
CVE-2024-31416,0,0,0d8c2b6f5939f620709e7ed49bc9a2b299d23aa8d9465d6808a0e5cb060665e0,2024-09-19T19:06:59.787000
|
||||
CVE-2024-31419,0,0,d12cf9d3a6a9056d09543372e3ec9556904c7fd0922004ef5361ecc4fb1ba007,2024-04-03T17:24:18.150000
|
||||
CVE-2024-3142,0,0,983e14121dea75c617117997ac50797df98bf192fa8cfa7597e476b17cc231ee,2024-05-17T02:39:44.690000
|
||||
CVE-2024-31420,0,0,93cd6c74288acbee362fcfe80ff941e3294a823738c730373f8d597f177cf09c,2024-04-03T17:24:18.150000
|
||||
@ -252359,7 +252359,7 @@ CVE-2024-3309,0,0,86d23734c08e91abb9c54fe3adc839130d817cf111a237c0656262c25ce176
|
||||
CVE-2024-33101,0,0,02c41b74667ba4c6c855c7f8be761695b1033ca3ebd54d33f4c74ffe5c076663,2024-07-03T01:57:25.600000
|
||||
CVE-2024-33102,0,0,5913737ef9c2cdea9d03e524178ff2c4a07bc37811d823721759d56c1627f7bb,2024-07-03T01:57:26.367000
|
||||
CVE-2024-33103,0,0,a36bb540d060154b2c500281aeebe1e440c6921a98c2ffcc128ad329bcfc7117,2024-08-22T19:35:25.357000
|
||||
CVE-2024-33109,1,1,623840b47a3d2080ddfa6fe372db92281baacbad134dc7e3c1b1fb9648b17803,2024-09-19T19:15:24.170000
|
||||
CVE-2024-33109,0,0,623840b47a3d2080ddfa6fe372db92281baacbad134dc7e3c1b1fb9648b17803,2024-09-19T19:15:24.170000
|
||||
CVE-2024-3311,0,0,6e298bee2f64a50081e2cbf2a03ac8b7d3c6b0b9fd9ec2176921cbd680375d90,2024-06-04T19:20:19.213000
|
||||
CVE-2024-33110,0,0,cadaede73d3a0da5440547f9c49768ef66978382531070a9c510181ac9abc5a8,2024-07-03T01:57:27.130000
|
||||
CVE-2024-33111,0,0,b6aa79d7fa96972383b596dcb7f242edbb816eac6eafb7be06fed5f14d30b343,2024-05-06T16:00:59.253000
|
||||
@ -253141,8 +253141,8 @@ CVE-2024-3434,0,0,665daf763cf280ad6e13fab45ba57a35fec69ba9e6cd1628917c4e7d75dedc
|
||||
CVE-2024-34340,0,0,ce6bbf8ca46ec29426c800768c938c7ed5fd800a09085acbf821400587996e11,2024-06-10T17:16:28.827000
|
||||
CVE-2024-34341,0,0,874d0ac87ba692c788b408f2928cb7b384b1146ea2fb2be7ea431c974b164434,2024-05-07T20:07:58.737000
|
||||
CVE-2024-34342,0,0,3e142b43b7b4afad7d384023ad82da3d4505656b73350774ba0911c6409bd959,2024-05-07T20:07:58.737000
|
||||
CVE-2024-34343,0,1,a3b005bc8eba213738fde9a67dd414ba97bac0d8e4da53b457c6cda9ca8b4f39,2024-09-19T19:57:52.007000
|
||||
CVE-2024-34344,0,0,f5a9ba01025bca91b189ed9bcd3017020d0db224ae447d4b59293ea787794849,2024-08-06T16:30:24.547000
|
||||
CVE-2024-34343,0,0,a3b005bc8eba213738fde9a67dd414ba97bac0d8e4da53b457c6cda9ca8b4f39,2024-09-19T19:57:52.007000
|
||||
CVE-2024-34344,0,1,e2c80a8b534f583df6f7a38bb120df88d9d1e69be86c956b7fa12d47a03a3266,2024-09-19T20:58:01.827000
|
||||
CVE-2024-34345,0,0,af3be7ad8b1b1d44ae22efd1e5357ec15980df2dfb15c98b9c630c2989cf22cf,2024-05-14T16:12:23.490000
|
||||
CVE-2024-34346,0,0,461f54cd153daac8a3bd1e483b3a64b76b9087848b91f7f6ce6604a27c331020,2024-05-08T13:15:00.690000
|
||||
CVE-2024-34347,0,0,b67d4d427f02230685c362ed430c27081ec70e2b17a8dd8ee8f951ca6b6606f3,2024-05-08T17:05:24.083000
|
||||
@ -255882,6 +255882,7 @@ CVE-2024-38218,0,0,d8154113c709876f61605539852c344572b202f6d86619699565b8c3f572b
|
||||
CVE-2024-38219,0,0,34502e067fd7412232e3cff9d01123fa667f329fff13204df696956cac257c32,2024-08-29T14:45:17.383000
|
||||
CVE-2024-3822,0,0,51b0f82a9028abb2f3a6ab312236a4c8392000a211092257ada320c541b18cc9,2024-05-15T16:40:19.330000
|
||||
CVE-2024-38220,0,0,a9016c861c2695b31a1ce105f60c8a7497ab86c35f7fba294238a213f50a54ec,2024-09-17T16:59:37.167000
|
||||
CVE-2024-38221,1,1,c11d02241d3df8f0ad7af5e6e5110f6528d057248017e3ad1628ab6e372ebeb2,2024-09-19T21:15:13.933000
|
||||
CVE-2024-38222,0,0,a5db0f4814eda956702b6863c4d614a7079e45a1c9850c93f259b800f2bd30ac,2024-09-18T19:01:22.527000
|
||||
CVE-2024-38223,0,0,bc14ce3f021016f5d7fdf26984192d7afd912fddeb21523c067e8db2fe7a06a5,2024-08-15T20:18:28.240000
|
||||
CVE-2024-38225,0,0,a8f1d15f2be1c40a6f29c5f7c1fea9920ae59300774a3c9a21af35434dbe2539,2024-09-17T16:58:39.197000
|
||||
@ -256554,7 +256555,7 @@ CVE-2024-39300,0,0,06c907e887f3a9a49c8c034a570476f82ab0d4832c162f4aa9ed409176b9d
|
||||
CVE-2024-39301,0,0,05ede2147c0414ce0c80c5aedca5b458241dd00889546d94391bc82da8555dc6,2024-09-03T18:06:28.743000
|
||||
CVE-2024-39302,0,0,946c3f23cfe199dda1010c0ea47b1d5e32454ef20b5307dfd8e2dc92485c1baa,2024-07-01T12:37:24.220000
|
||||
CVE-2024-39303,0,0,e1d113aa825245b6d1e52862ebbf0ca8379af72327c1818fa556c736e7b07e25,2024-08-21T15:54:35.650000
|
||||
CVE-2024-39304,0,0,b5f772f01b3427664c53f2fa0501efa536f799b20c5d68d0936fe6db6ed2d717,2024-07-29T14:12:08.783000
|
||||
CVE-2024-39304,0,1,517e49cf16eeb78d1ffc791005045214ddaf39a7e2bee09d28d29c638c19dae8,2024-09-19T20:59:15.717000
|
||||
CVE-2024-39305,0,0,63f56317b3a65afc1e2039e772edc429176693e571707c38de2e052250926788,2024-07-02T12:09:16.907000
|
||||
CVE-2024-39306,0,0,8e446f8cd38382555b776a84edd1102287cdb22d9e95652344c53f12d26a921f,2024-08-19T14:15:22.423000
|
||||
CVE-2024-39307,0,0,c6ba32c8ba3cfcd15570f781df2bcad3fc5cb61b722485741dcbdce4f9e733a2,2024-07-01T12:37:24.220000
|
||||
@ -257088,7 +257089,7 @@ CVE-2024-40111,0,0,1a3d3f73f416ea4e786f4d30c6c4afa24719f06341ce4e72c0f952d62f0ca
|
||||
CVE-2024-40116,0,0,eb70c9a9b1b545c9ad476d8d1542c9445241ad3bd4f0dd5767e3b25e7e8e8497,2024-08-01T13:56:51.153000
|
||||
CVE-2024-40117,0,0,c995513fc31f8c8ab9b7343003983d62c093f801640bdaede808c210dab8c1f8,2024-08-01T13:56:51.860000
|
||||
CVE-2024-40119,0,0,684af900644d0baaaf3eeabc10aa1cf28b30369a49ccf90f61c5cecb4e42879b,2024-08-01T13:56:52.650000
|
||||
CVE-2024-40125,1,1,cc8392b182c6e8c7ee622740e83412c4a0ff89e87d8cc4c186b22da6539e9ed9,2024-09-19T19:15:24.350000
|
||||
CVE-2024-40125,0,1,89da09b2b86f7e45dc420e5b270e874f7af016931cd8f2c8372f6127cc1d7390,2024-09-19T20:35:24.513000
|
||||
CVE-2024-40129,0,0,094db6b1cc5f6ee95fab428762b39a3d67f29eab1863c6c2fa082d03f389b949,2024-08-21T18:59:09.703000
|
||||
CVE-2024-4013,0,0,3586550d51b92b0f462ebc695cf4afe7e9f245d08490f98716812b60f3625af2,2024-06-07T14:56:05.647000
|
||||
CVE-2024-40130,0,0,093b1fad643c93b0a06c31b2bb9b67d52d3d511f6e3c5e9dbb0e8432db230090,2024-08-21T19:00:56.183000
|
||||
@ -257207,7 +257208,7 @@ CVE-2024-40554,0,0,975eaaed007d6b505cb8ba22ce57b12be37e7b3d2ebcc8a575de58b8f5a20
|
||||
CVE-2024-40555,0,0,44ce04ab9d418b7756770fd44203b58128b20e8dfc6428e77d2706cc77d9f460,2024-07-16T13:43:58.773000
|
||||
CVE-2024-4056,0,0,7c25f0a1764fd01965b39ebc13bb94a8ae53607d9ce0dfc30a27083c9e919722,2024-08-27T11:15:04.430000
|
||||
CVE-2024-40560,0,0,08dc0b5066047c5e119a09d69ea20c085f8549859adcaecbbf38995d7d2e2e54,2024-08-01T13:57:50.440000
|
||||
CVE-2024-40568,0,1,293cc67ac7cb929d50728436658796c25ce534bf9199331065d8c719678bb7f3,2024-09-19T19:35:13.880000
|
||||
CVE-2024-40568,0,0,293cc67ac7cb929d50728436658796c25ce534bf9199331065d8c719678bb7f3,2024-09-19T19:35:13.880000
|
||||
CVE-2024-4057,0,0,26b46aa52b04f4ef8890033772544e5e99ad730f84e9e0e97b479cd36cf89ace,2024-07-03T02:07:02.197000
|
||||
CVE-2024-40575,0,0,267280fd6d1dce9620611aeb1f0d6276db3825fa55e9f5e7fc538f4804a7f026,2024-07-25T17:35:28.913000
|
||||
CVE-2024-40576,0,0,8423823b913f3d1284aae2224b689bfefe0b7a1b018e49f904fd4948fdba6a99,2024-08-01T13:57:51.520000
|
||||
@ -258080,9 +258081,9 @@ CVE-2024-41955,0,0,5ad0263667cf66f8813b7d99a3968b8a2424832b6c51b00aba139fada06ab
|
||||
CVE-2024-41956,0,0,b72cd1a22a28d2303229b868afdc5fd2adbef42d25416f48e13276835bed80e5,2024-08-02T12:59:43.990000
|
||||
CVE-2024-41957,0,0,f207a653c0f0f9d782c3e5585f7eb5df8054bd1cd710ccb1397440f0e840612a,2024-08-09T14:14:01.190000
|
||||
CVE-2024-41958,0,0,ac2d465ee5b5b310612655a7cc0163ff8c5d740ff2b286b950528d6c8e63af4d,2024-08-06T16:30:24.547000
|
||||
CVE-2024-41959,0,0,135bc4bf1338241a775bbfd3e5799793f19819d1fb2e41bc46b5a8bdc385fe51,2024-08-06T16:30:24.547000
|
||||
CVE-2024-41959,0,1,a5b77d1b2d0820e47ed535354d7a0a4c8217a01fe56712ebcb48a9d560e6791a,2024-09-19T20:14:02.963000
|
||||
CVE-2024-4196,0,0,2bee927395e72028cfccdf65300c6a2b8979e20b943a96185278ab936245f10e,2024-06-25T12:24:17.873000
|
||||
CVE-2024-41960,0,0,c90236af24fb252306d67097fab9fe370c116a0fe898aae960bb109a3075d5cd,2024-08-06T16:30:24.547000
|
||||
CVE-2024-41960,0,1,67871a0d9bc1f8c7c6fdefc078d06d3de9e3801e3a530c569352ce3e295b7c6a,2024-09-19T20:01:58.633000
|
||||
CVE-2024-41961,0,0,3c3cbde88cd825de8bae83de9e23bceebed48c0b620332721ebe0297499b9cbf,2024-08-01T16:45:25.400000
|
||||
CVE-2024-41962,0,0,db50354a8566471f488ea803a7a6894035b73491a2359165637f817d330c25eb,2024-08-16T16:34:48.873000
|
||||
CVE-2024-41964,0,0,54621a6adee825c0636e7afd8773c219e1650b44db222dda2ec93364b11574bb,2024-09-06T22:56:18.010000
|
||||
@ -258188,7 +258189,7 @@ CVE-2024-42099,0,0,3238974df1fe016605810e840ae3252de7cbfd02bda034d599f06c9b461b0
|
||||
CVE-2024-4210,0,0,1de7eb5485317b66c30ef10a923cca5446084d9b34c55d329adb40ead2a3c10b,2024-08-23T16:56:07.537000
|
||||
CVE-2024-42100,0,0,9f2359920901de15a72f82c74dd31f7cfd476c8a0553c2aa7b3605f8c3eb567f,2024-07-30T13:32:45.943000
|
||||
CVE-2024-42101,0,0,ee2417d1fe5ad184a427f58671dedfca7c7497bddaa125be1e3080536f8c3d24,2024-08-22T12:58:21.527000
|
||||
CVE-2024-42102,0,0,6316e9599f21ebdb21ae9fa78c744fcee5e0d5e7ec56a75728d7b5f4ac6d9f1a,2024-08-21T20:48:01.940000
|
||||
CVE-2024-42102,0,1,64b949f58cf07c99c9bf856973343a6a086af72e3a854e43d84300cd3937aa59,2024-09-19T20:38:05.737000
|
||||
CVE-2024-42103,0,0,571d1f20007ce6492a18993a5251eb19a6d81ac85736922f03454b3e3d7e7288,2024-07-30T13:32:45.943000
|
||||
CVE-2024-42104,0,0,def9c837115c029fcf5d81c61cabe7e6ca6fd4848fe11d6f1a09290cf875300d,2024-08-27T14:28:28.023000
|
||||
CVE-2024-42105,0,0,602b7eceacc9e23748db5c2c201abe70f13508a1dc06a4238bfa6a02e44d1d34,2024-07-30T13:32:45.943000
|
||||
@ -258393,7 +258394,7 @@ CVE-2024-42348,0,0,3517a7d5c55d1f9705cc409c5db31e9d4d925676ffe15a67d0d55067bb2f7
|
||||
CVE-2024-42349,0,0,ce81a2d0ab666d0f17a2c01af4324fee21f3848bcc5cf3cb8c1c76e1d270a689,2024-09-10T16:44:12.900000
|
||||
CVE-2024-4235,0,0,f578447debade3af3e230e69e9dbc9d9ff3e97fecc115950bd6af5b863fac2d3,2024-06-04T19:20:32.857000
|
||||
CVE-2024-42350,0,0,41e03c0efb90d720b1c8cb3232ef6c7cb3628d75ba24650e7a94fc79624a1e0c,2024-08-06T16:30:24.547000
|
||||
CVE-2024-42352,0,0,c0479ec0c76b813a7203da737c4719c60d3f36382909bc4066a937b282774165,2024-08-06T16:30:24.547000
|
||||
CVE-2024-42352,0,1,68dece2f261bc1cb364b695b18476c34cf26a3ab9c27c6e6ade9f2ee5db441fb,2024-09-19T20:55:46.543000
|
||||
CVE-2024-42353,0,0,ff6a20bb34a678482c7e929d5bf56188c5e8b6470cc5da2a5c329ecb11992f4a,2024-08-19T18:44:59.903000
|
||||
CVE-2024-42354,0,0,530679279c657883c4b35ba657ab96e7283f524459574665a6f69e940f2dd9b1,2024-08-12T15:49:58.230000
|
||||
CVE-2024-42355,0,0,4d53406f017c64f607be0598b7dd1b3fb3451e70edad6092c759f1ac9d9afdaf,2024-08-12T15:40:32.777000
|
||||
@ -258772,7 +258773,7 @@ CVE-2024-43032,0,0,8850a9c656ae281e32b28ba33f2ad3aef6596a2affc3579c53c1b92b428ef
|
||||
CVE-2024-43033,0,0,fd57d359a27fcaf19587aca04a23681152ba867b02d3eb512220398c8467fb35,2024-08-22T16:35:08.663000
|
||||
CVE-2024-4304,0,0,cc036c021f3a6e70e19e6533fc0c5b7e8e9615d68f40d67450c876ce97ebcd8f,2024-04-29T12:42:03.667000
|
||||
CVE-2024-43040,0,0,1da4fee0ec9b26a667b61884070b050a8f4bcf13a2b21e01185cd5279abd34cd,2024-09-12T14:35:15.010000
|
||||
CVE-2024-43042,0,0,b853bda14fa02964a16c19d1896f72364ccfb9e1c7f5c0faac2a5ae6d185d191,2024-08-19T13:00:23.117000
|
||||
CVE-2024-43042,0,1,d94e46af540f49a4f3c40e5f52dafd9243317a2003df44ac76bccf484c7eed66,2024-09-19T21:01:24.137000
|
||||
CVE-2024-43044,0,0,0f847f7b25552f59db6fe108bc5868ae7095ef3bf92eb01d14caa8a1c32e542a,2024-08-16T17:19:30.643000
|
||||
CVE-2024-43045,0,0,0dfb92f72f0dbde6ae96c501ce5cc9672bcd5c0db43f23e4e6beeb976b582ca3,2024-08-16T17:21:26.803000
|
||||
CVE-2024-4305,0,0,3d3b1d1c5c813e5fa60e1eff1163926298ea6a7612f6966e2cad8be591d14008,2024-08-01T13:59:30.377000
|
||||
@ -258812,7 +258813,7 @@ CVE-2024-43139,0,0,c74c0f3dde7756ee6f145dfa944df2bddeeb719e29cd3b22fb911239d7691
|
||||
CVE-2024-4314,0,0,5b91c731cc96c112e4837604681a355586cd629f1c71449572dfc7eb6fafd4a6,2024-05-14T16:11:39.510000
|
||||
CVE-2024-43140,0,0,ddd9555407bf13c17882395b6a58ab3090224c7fbcadd5faeeb830d264aad29c,2024-08-29T16:04:30.370000
|
||||
CVE-2024-43141,0,0,f29f7de7eae578d120c59b0305acaad325acb97a127ccd6d6289a33a71c747b6,2024-08-13T12:58:25.437000
|
||||
CVE-2024-43144,0,0,4965643ade074f3c07bfe744b2f02557b48b71e95e2c5b95a86c789fa9e741d8,2024-08-30T13:00:05.390000
|
||||
CVE-2024-43144,0,1,c20057596840dd1a8f603137843000e2e0f183226721451fd208a34176a83c3f,2024-09-19T21:47:24.613000
|
||||
CVE-2024-43145,0,0,7ccb83b884d8dc58ceb4932d45768a752924d5c2938e5a3f671a778aaba995f8,2024-08-19T12:59:59.177000
|
||||
CVE-2024-43147,0,0,667e4e165f9113b4fe4ef729d1c96bbd751ca2d031ec283022e85cfd98eae7e3,2024-08-13T12:58:25.437000
|
||||
CVE-2024-43148,0,0,cff5965efef0a90e2b87f245b5b8084669061ce4646f39e1c94e0f70b2166d42,2024-08-13T12:58:25.437000
|
||||
@ -259047,10 +259048,12 @@ CVE-2024-43479,0,0,313bbcabdd9b44fdcc219a1bba9045a367d02f58a01b8953aabace95c227c
|
||||
CVE-2024-4348,0,0,6e86bc5560fea8dde0d2ebca4133582cb5d1167a5aec18ad6c6b9b23741c69df,2024-06-04T19:20:36.223000
|
||||
CVE-2024-43482,0,0,d8f402bc0f3ce251083854e9d472514518876444465b9e6fddf99899cdf432df,2024-09-18T14:11:50.303000
|
||||
CVE-2024-43487,0,0,b1bbbe6f3eeb8f594d4cca9a1e5f97347bd8ae24b6674c21dd2e36175fe4aaad,2024-09-18T14:10:20.320000
|
||||
CVE-2024-43489,1,1,ee2cf49c9fa4e936e04e2f7bfcd600b32597e40e3de91a382a9221f1a4d38319,2024-09-19T21:15:15.677000
|
||||
CVE-2024-4349,0,0,a8b03025f36b8713c52951e7ebcf312d165d904bb8cd188665520ff04ec5e58b,2024-06-04T19:20:36.340000
|
||||
CVE-2024-43491,0,0,66848b924ef1e3bbbd3e0b208cbe28d68dfcc77f6e79bf211914ea2a59716ae8,2024-09-12T01:00:01.133000
|
||||
CVE-2024-43492,0,0,af0e73844988f19d42832ecb20006b5ce23817c5aa51bd592ac57ea711827c4a,2024-09-18T13:57:22.880000
|
||||
CVE-2024-43495,0,0,d2a8d4c3f203ea859641059613f0257436e0f701c3b0d8de8a57b0ddb10ca75e,2024-09-18T13:55:07.100000
|
||||
CVE-2024-43496,1,1,6c8a4591d0b7199a042f60aa1c605bcf500cf2ea49ccf6fb4e85f680cab14ad9,2024-09-19T21:15:15.917000
|
||||
CVE-2024-4350,0,0,064be752b5def38b2ae127a671a2419b00cbe1db7bc8e8e49beca0c95658f61b,2024-08-30T18:18:37.130000
|
||||
CVE-2024-4351,0,0,1afa7cdd2b07ed7f6c7d4fd33431ae4e847e5055e80de2c2ff284dbdde180a83,2024-05-16T13:03:05.353000
|
||||
CVE-2024-4352,0,0,83fde2dc0fb70bd9398ce4f7dc00180654ce0fb46c0f63d8091186b07c4c5ecb,2024-05-16T13:03:05.353000
|
||||
@ -259236,12 +259239,12 @@ CVE-2024-43913,0,0,1c9fd1b4295df0d3d5ed94da6708f3aa88fdfeb6b586d9b4c06ecb1ea3824
|
||||
CVE-2024-43914,0,0,cecc040296533d16ec68f112b8d7429d7c31abfac86050a6f05da890be7d265c,2024-09-05T18:03:49.997000
|
||||
CVE-2024-43915,0,0,d179827f4a2239697e62ac501a97b8b3109220e3bde2278c20f3a196442ad24d,2024-08-28T17:44:45.193000
|
||||
CVE-2024-43916,0,0,31042afa408fe94b440478a73ae72a8d0da3ebc3aa7dccb541b916eb98fd8b0e,2024-09-12T16:21:19.030000
|
||||
CVE-2024-43917,0,0,24cdbe475912047a546c5d424d36145b60978d1605bec7e3b2ca4ce00758ae54,2024-08-30T13:00:05.390000
|
||||
CVE-2024-43917,0,1,acabaf456c8dfd741a78efbcd42603884b1ece437ab7a578f9853b1f227cbc3a,2024-09-19T21:46:19.713000
|
||||
CVE-2024-43918,0,0,ddd56bcf8df0ced2fd43f465099ef1734f47f7e198c9ebd8d1474897ffb0a07e,2024-09-06T15:51:25.957000
|
||||
CVE-2024-4392,0,0,5c82c123a66d3444e81adbb958bd6b8cf11e432e36668571a78dbfc8c82c1c37,2024-05-14T19:17:55.627000
|
||||
CVE-2024-43920,0,0,4fe0b9b4bdc3c773cef62ba0a55678a848520d2f26b7c394fdfed7064f320ada,2024-09-04T14:06:43.780000
|
||||
CVE-2024-43921,0,0,8cb3a8317d91fe8c86f2a088d9aae7d066ad8cdfd297a2cc1e6c90830f46e738,2024-09-04T14:12:12.957000
|
||||
CVE-2024-43922,0,0,d06cb19de3b21418df79a48a56a0a99911a1120cf3697935d43888e3061ff400,2024-08-30T13:00:05.390000
|
||||
CVE-2024-43922,0,1,1bda9e09eeb9cf761058baff2572a8d05071b30f4dbb7675f13cebb74973fb9f,2024-09-19T21:44:49.453000
|
||||
CVE-2024-43926,0,0,afe6ba4a11196449e0acf87526616d8bc217e24dbfcd1f8bfd3b6ef863d1044f,2024-09-03T15:15:45.160000
|
||||
CVE-2024-4393,0,0,4e00802830a11f2dfec38985ebf8ec82363098448bfe6d2b274aa9f7d7f56b33,2024-05-08T13:15:00.690000
|
||||
CVE-2024-43931,0,0,e4b487ce16111f7507cab3f7997c98054a40435c39d10d2eeeecf16baa2d636f,2024-09-13T21:22:51.923000
|
||||
@ -259748,7 +259751,7 @@ CVE-2024-4514,0,0,385303b4c456222ef36bff0fbd012efb4cf0e7eb509cfab25e182e333e168c
|
||||
CVE-2024-4515,0,0,745b5001aba1f09f57fb481d2a3d2000635a4a96793fd9115da6678f1f7fddb3,2024-06-04T19:20:40.830000
|
||||
CVE-2024-45157,0,0,63dadaa4025af01917ecdee4f3056de9070f640b6e5412ee381e40dd74f61d1e,2024-09-12T16:29:42.717000
|
||||
CVE-2024-45158,0,0,f4aff4de2d03b3142e6ab8f036af352cca5d7617879cb7e89e1ecc71620fc908,2024-09-06T19:35:26.390000
|
||||
CVE-2024-45159,0,1,315bbe3853593d217ddbcd9fba2e9d9003cbd4c00b52b441be6179268e6c4816,2024-09-19T18:26:24.687000
|
||||
CVE-2024-45159,0,0,315bbe3853593d217ddbcd9fba2e9d9003cbd4c00b52b441be6179268e6c4816,2024-09-19T18:26:24.687000
|
||||
CVE-2024-4516,0,0,7413b58d03a0a8938a8f9c3b85a26b19cfb41e2c50a00216b0df80496b4b87e3,2024-06-04T19:20:40.930000
|
||||
CVE-2024-45163,0,0,d1b8d71b55c9c05a6535a6d473b973daf564bdfb091297232be0a5c5759d6390,2024-08-22T15:35:12.750000
|
||||
CVE-2024-45165,0,0,b001eacfea75d370a82a50b82205930e70aa975a85c81e49480bf2cbd2fdd05a,2024-08-22T12:48:02.790000
|
||||
@ -259864,8 +259867,8 @@ CVE-2024-45395,0,0,40bba716ba89648b0a5b0a469128bfb2472f289be140a10878a9431641f22
|
||||
CVE-2024-45398,0,0,7758f6d65fcbad19eab77bcca68b8445fb5c0f0afca8b3214cdef86ff36248a6,2024-09-17T20:15:04.670000
|
||||
CVE-2024-45399,0,0,037a7bffbd0f8d9091903d0d9148831df46e7343b0a57250b24ff56b22720edf,2024-09-05T12:53:21.110000
|
||||
CVE-2024-4540,0,0,56ac6cff101cc91d96d8daf4bfda0c052b655471dc0698e77d798366d59b9124,2024-06-03T23:15:08.930000
|
||||
CVE-2024-45400,0,1,23d149ef7bada976fce9d2c89ea0cb38e5ff315577519b49e805da7db09942df,2024-09-19T18:04:36.627000
|
||||
CVE-2024-45401,0,1,954ab622986edfe93d770dee5aae8a96aecaff4645097c85021d65007f0d9f05,2024-09-19T18:12:52.220000
|
||||
CVE-2024-45400,0,0,23d149ef7bada976fce9d2c89ea0cb38e5ff315577519b49e805da7db09942df,2024-09-19T18:04:36.627000
|
||||
CVE-2024-45401,0,0,954ab622986edfe93d770dee5aae8a96aecaff4645097c85021d65007f0d9f05,2024-09-19T18:12:52.220000
|
||||
CVE-2024-45405,0,0,fcb9dae5692e8d4d27671ebdd5ac9faa600b717293c20df4e46e96d26ca1730f,2024-09-06T16:46:26.830000
|
||||
CVE-2024-45406,0,0,fccecd6532f18f7e1ea06f6cc62abb2faeaefa7fcd57ba441a0597b2a31370da,2024-09-13T15:30:45.380000
|
||||
CVE-2024-45407,0,0,363c12723797ac0c72d1d271ead356acc799cc8a41f14636bd37d7f20defb6ac,2024-09-10T17:43:14.410000
|
||||
@ -259897,10 +259900,10 @@ CVE-2024-4545,0,0,864a22773c6eaa7a20fdb4cf4c4b7a2709a2c8e64cfe98132d05364d67e97a
|
||||
CVE-2024-45450,0,0,aa5d1afac94647878136a29faab537df333625d6375aa0ea38189e29e05bb108,2024-09-12T19:30:22.863000
|
||||
CVE-2024-45451,0,0,5229461646061f5229c33d4bf801b0a9f7047a3683ddb2578fb28570321f2734,2024-09-17T23:15:20.970000
|
||||
CVE-2024-45452,0,0,fdfee902792e194b32d188f2f974cff27f1fb2a2547b725b9bb68c5c8e0a2fab,2024-09-17T23:15:21.183000
|
||||
CVE-2024-45455,0,1,4d27dc502cdc314ca65322205c1992846fdc5d39734d6d904b9bfe916c2c58d0,2024-09-19T18:51:15.433000
|
||||
CVE-2024-45456,0,1,47f416b4ad02b4137088267164d544ec869b0c8806ca776b6a7c643c5eb500b1,2024-09-19T18:38:57.500000
|
||||
CVE-2024-45457,0,0,56f051ff4ecd4b6bed95d9151f6e0b39eb3d323739c8a3289fa8218221d2fc6c,2024-09-16T15:30:28.733000
|
||||
CVE-2024-45458,0,1,a61716ce0d3fef0ec6cc594d56bae2d0a9a90d5b7d46e3aad6884d33d8f55d2d,2024-09-19T18:55:46.513000
|
||||
CVE-2024-45455,0,0,4d27dc502cdc314ca65322205c1992846fdc5d39734d6d904b9bfe916c2c58d0,2024-09-19T18:51:15.433000
|
||||
CVE-2024-45456,0,0,47f416b4ad02b4137088267164d544ec869b0c8806ca776b6a7c643c5eb500b1,2024-09-19T18:38:57.500000
|
||||
CVE-2024-45457,0,1,5900191db09039069fbddda66128c2809bcb929085a84aed28a0c8f708ed46f3,2024-09-19T20:53:46.313000
|
||||
CVE-2024-45458,0,0,a61716ce0d3fef0ec6cc594d56bae2d0a9a90d5b7d46e3aad6884d33d8f55d2d,2024-09-19T18:55:46.513000
|
||||
CVE-2024-45459,0,0,4154d879d23930c356c924ee9751025192ea472198f82d912c4042ce38a9f5ab,2024-09-16T15:30:28.733000
|
||||
CVE-2024-4546,0,0,da973c82a9042d639d29e7a0c2ffb48d440dea200e6df21027887041c43a68db,2024-05-16T13:03:05.353000
|
||||
CVE-2024-45460,0,0,7056065a678a74d2d3d00e0fb051b2bcdebb702f17f31078c0bb6fea26b93765,2024-09-16T15:30:28.733000
|
||||
@ -259911,7 +259914,7 @@ CVE-2024-4549,0,0,e09f9cdaebb6118867e13a9d3ab643eb98c9f9e356cd137ad04d5c4afde157
|
||||
CVE-2024-45490,0,0,4a9544858f8ad52701885faaacc054b024c5e1d139687b3f21fcc2ee9f6ad4a9,2024-09-04T14:28:19.313000
|
||||
CVE-2024-45491,0,0,e460156ea6419a80b45a0f265018e72555b70e117c8be4ee37cb347a447d976e,2024-09-04T14:28:33.953000
|
||||
CVE-2024-45492,0,0,073ca72c9147ce0bd071ae42dd069b817368a461c31ddb6a6a85b43c752a5921,2024-09-04T14:28:41.760000
|
||||
CVE-2024-45496,0,0,93743dbbf163bb09514a60eaad059819dae246f577c0fc9cd1d2a5f4d71b5559,2024-09-19T14:15:16.980000
|
||||
CVE-2024-45496,0,1,bf715a05c794fd20083634b49f1eb068776d0e150060120d941d4d1e0abe15a4,2024-09-19T20:15:06.813000
|
||||
CVE-2024-45498,0,0,c0b73fd56e19fc295690d422c61db0b0a34ba9767e31b80f7a635220e3379808,2024-09-09T13:03:38.303000
|
||||
CVE-2024-4550,0,0,15fbc24f09319144879d8500386f895513bfa5772ea62a92e0fabd950300c406,2024-09-14T11:47:14.677000
|
||||
CVE-2024-45504,0,0,d1fb07a3228efd18f7c0af3faab016c97edb9e2da8e02dba547168a8c292ae66,2024-09-10T12:09:50.377000
|
||||
@ -259927,7 +259930,7 @@ CVE-2024-45527,0,0,0ed4b7876171a991bf7220f1ee96f2007c9fed522b397370892e632e0f15c
|
||||
CVE-2024-45528,0,0,b726a60695697377572ea54be1902b1c537e8da89a7623e441b7aa9130d0fc17,2024-09-03T15:35:14.480000
|
||||
CVE-2024-4553,0,0,a1e8f5bd1acd4a97b93bbbe85c146f94099965137fad1ebd49acd106c4b8e00a,2024-05-21T12:37:59.687000
|
||||
CVE-2024-45537,0,0,522e8ad70c4a2b88082c6938714c807f5fbe9d880fbc938f7c7e90871d6ceaae,2024-09-17T19:15:28.157000
|
||||
CVE-2024-4554,0,1,937a5d36b2a75a32b850145e7584d302fcbf1e70f1d70fb88494beed5a5d0988,2024-09-19T18:15:10.433000
|
||||
CVE-2024-4554,0,0,937a5d36b2a75a32b850145e7584d302fcbf1e70f1d70fb88494beed5a5d0988,2024-09-19T18:15:10.433000
|
||||
CVE-2024-4555,0,0,c6e5ee837600c596327a91768410832a19be004b920151e53620c97a72516b9c,2024-09-12T15:13:25.520000
|
||||
CVE-2024-4556,0,0,32422e1a58fd58f5056dd13adba171d2a9e41531acfe1ea2f85efa6ba6a345d7,2024-09-12T15:09:55.107000
|
||||
CVE-2024-4557,0,0,66c84ceab02c8adff7c7e309e3c388a17800860cf81ce53b59e1c60dda9ffb15,2024-06-28T13:19:24.767000
|
||||
@ -259958,7 +259961,7 @@ CVE-2024-45617,0,0,6cb16d6fbb6421ff7c08177427efbe84e4a03cb3cf72e212ba5673d3ad33a
|
||||
CVE-2024-45618,0,0,dc2dc7fd3bf0d86469d9d1e7cf8afe886c6a0db83c5b7c56e1d5c7bc488c4153,2024-09-13T16:30:27.693000
|
||||
CVE-2024-45619,0,0,19913ec071f09571eb2fafb85b3bcf05650473cef15788106e54de572df55757,2024-09-18T09:15:05.227000
|
||||
CVE-2024-4562,0,0,e0a783b0d1c16da234e0fe3d351cbae7a089d075739ba22ec0641c397b879b0f,2024-05-15T16:40:19.330000
|
||||
CVE-2024-45620,0,1,62d7efd1f4f3b2c671c5ae6f75d170d2e8f1f728e1204e1922e6a8c5eec065f3,2024-09-19T19:21:38.653000
|
||||
CVE-2024-45620,0,0,62d7efd1f4f3b2c671c5ae6f75d170d2e8f1f728e1204e1922e6a8c5eec065f3,2024-09-19T19:21:38.653000
|
||||
CVE-2024-45621,0,0,0e87271e3b523f5d125d92dc504ca3a7772b99de219d6f52d1ecafc891e937da,2024-09-16T17:28:53.437000
|
||||
CVE-2024-45622,0,0,a33339926b8b20e966e52f22a13007f367a7fdd9b0655040e29ed073b9b76629,2024-09-03T16:35:09.647000
|
||||
CVE-2024-45623,0,0,6e76d49f362c221a481237923ca3f07ce122524ae0700d93b755e69d33328599,2024-09-03T15:35:15.360000
|
||||
@ -259977,9 +259980,9 @@ CVE-2024-4569,0,0,2e4b27b05be8561bd3f260b3ccf0eed0d11ea74483878f5df5227737faa1c0
|
||||
CVE-2024-45692,0,0,281ed60ed9431c734132a4f1fca034600bdda2bdb5b83bc44745bc26a826447d,2024-09-05T21:35:14.337000
|
||||
CVE-2024-45694,0,0,6df0853247a969905230185a9047d7f0b5d3157f1a7bc76614dde5322218c3ae,2024-09-17T18:40:07.243000
|
||||
CVE-2024-45695,0,0,da601d84ea417c0c9279d85654ade81af5192308ba1ba5409f7a2b21c121a433,2024-09-17T18:40:38.573000
|
||||
CVE-2024-45696,0,0,b551b9e5a33d60ee884b352cc58e0de6e4358b9a2aa8ac71cf9d81795dbc0d1d,2024-09-16T15:30:28.733000
|
||||
CVE-2024-45697,0,0,b061a52d423d0f158415b239b7e20000a7f8fedec2e7f4abb8775b53aaeae721,2024-09-16T15:30:28.733000
|
||||
CVE-2024-45698,0,0,a981e18179a6b778934544cccfd9a0e75be9eb8d89acdc683c6a6d70ffb7ea78,2024-09-16T15:30:28.733000
|
||||
CVE-2024-45696,0,1,15dc5b5bd95cf2badd72adb77d96e01d4ef86e61af344574364ee75cad060ea9,2024-09-19T21:42:36.557000
|
||||
CVE-2024-45697,0,1,f5a37290219fae59e8d61a5bcf73769a3b20c61fab40a7e37a2a1d321507c010,2024-09-19T21:40:37.357000
|
||||
CVE-2024-45698,0,1,ae3e99b30522a0cc22ac110f0e079a19451e6ffc669d2c6984799a2bd6bce8f9,2024-09-19T21:40:02.560000
|
||||
CVE-2024-4570,0,0,c1cc5ae154200d1c8cbc554d2bd91b7f0d0e2fb1c25faf550303ad23eb2c106c,2024-06-28T13:38:13.630000
|
||||
CVE-2024-4571,0,0,76823bb120333d1d68e24e57a18868a62bd826931cb118db3f1630877d1250ae,2024-05-14T15:44:05.750000
|
||||
CVE-2024-4572,0,0,6754f54e88e479a744a4367c8d1d2577fd697a90d0783dabcb9fc508df61090e,2024-05-14T15:44:06.153000
|
||||
@ -260096,8 +260099,8 @@ CVE-2024-4636,0,0,5f6d994195b0d258cedd76eef14490d422ed4d9e1ed2778ad911a6f2ded3ef
|
||||
CVE-2024-46362,0,0,19797b772fedfa56b8ab1944bfa10d47aee5c75ee333d19ae89a45da58afb3c6,2024-09-17T18:35:02.140000
|
||||
CVE-2024-4637,0,0,feac91fbe82af9a41f47d1c690f7cb9ac382f5ae365379b4bab97a7b08b57d3e,2024-06-04T16:57:41.053000
|
||||
CVE-2024-46372,0,0,fd6f56a0663f220726a1bac55ab58f9ad10bc05a60b983463690dc99ae056ea6,2024-09-18T21:15:13.443000
|
||||
CVE-2024-46373,0,1,26308fac89234bd0c4e6545029c0375bca524ac42183e23bc115426b28dd097d,2024-09-19T19:35:14.767000
|
||||
CVE-2024-46374,0,1,d8f5ae0d53687ee2132192046d5833100ce6e39c88021fb4246bbf0f13d8b372,2024-09-19T19:35:15.573000
|
||||
CVE-2024-46373,0,0,26308fac89234bd0c4e6545029c0375bca524ac42183e23bc115426b28dd097d,2024-09-19T19:35:14.767000
|
||||
CVE-2024-46374,0,0,d8f5ae0d53687ee2132192046d5833100ce6e39c88021fb4246bbf0f13d8b372,2024-09-19T19:35:15.573000
|
||||
CVE-2024-46375,0,0,a3753b0b860f3107bde948855a197ee1efaa17527c91f22e315c5003ce34e48c,2024-09-19T14:35:06.727000
|
||||
CVE-2024-46376,0,0,a3c7dd3b4bc749abac101cd27fd7d78b57ef129d32ef5359aae71578abaf0c50,2024-09-19T14:35:07.493000
|
||||
CVE-2024-46377,0,0,95e91e17e2ab812f3da9298bb3d6639e1f6afea01389da755fb47626e16ccaef,2024-09-19T15:35:09.843000
|
||||
@ -260178,21 +260181,21 @@ CVE-2024-46678,0,0,0e842f6f0546edbddbc3c711ac91deff93c4a1dd44f16ff31c31239d48d66
|
||||
CVE-2024-46679,0,0,5bde69d05e3c296a2601ee086688ce4b06bc49b8b5611729b2be82e470bb0f3d,2024-09-13T14:06:04.777000
|
||||
CVE-2024-4668,0,0,ecbe5c3985983203e802de76c9f88e6fca1078853835be834d70b53a54cc9e61,2024-05-30T13:15:41.297000
|
||||
CVE-2024-46680,0,0,53c6bf89a5bc3949c31b94cf312216e18ee2de106f93d5214fdad7ca6fdc356e,2024-09-13T14:06:04.777000
|
||||
CVE-2024-46681,0,1,66e176f13756dcc0d8ab331fd0f39d2f2c349ffd10d9d4cbb6d64818840f1c2b,2024-09-19T18:10:49.623000
|
||||
CVE-2024-46681,0,0,66e176f13756dcc0d8ab331fd0f39d2f2c349ffd10d9d4cbb6d64818840f1c2b,2024-09-19T18:10:49.623000
|
||||
CVE-2024-46682,0,0,ac171974a7e950a314e59d0243b9e9f062b63a309ff607f2a164bec5594c8099,2024-09-13T16:52:02.067000
|
||||
CVE-2024-46683,0,0,5299c97d1fc80f78dbfc5ccddf1bf7e66a8882d99e8d0b9ff70c92161eec2568,2024-09-13T16:52:14.373000
|
||||
CVE-2024-46684,0,1,3dd8d6161a75a02a3be01356f95b0f512dd073e666142fad3ca14e59b093e391,2024-09-19T18:04:22.623000
|
||||
CVE-2024-46684,0,0,3dd8d6161a75a02a3be01356f95b0f512dd073e666142fad3ca14e59b093e391,2024-09-19T18:04:22.623000
|
||||
CVE-2024-46685,0,0,1b48d894cf37f05d909d964324e0bdd0c004048501a99e5c3c6ac200b20fa0d2,2024-09-14T16:00:55.547000
|
||||
CVE-2024-46686,0,0,4afc0303c037a90aa176527c5c1d12aa028b7efb97890dbc9b5bee7f3de95eed,2024-09-14T16:16:33.087000
|
||||
CVE-2024-46687,0,0,6df93b329e4c9b4912f75ba797c3862dd3825d176bc4b8d52421481a95ca02a9,2024-09-14T16:17:33.073000
|
||||
CVE-2024-46688,0,1,742ceea25117b25b2bd80750a6e9911adc074107f75e2746760ff11b497a9894,2024-09-19T18:01:43.037000
|
||||
CVE-2024-46688,0,0,742ceea25117b25b2bd80750a6e9911adc074107f75e2746760ff11b497a9894,2024-09-19T18:01:43.037000
|
||||
CVE-2024-46689,0,0,d4a917f4af8389cbed7fe97091a2204305beeb74bbc4442a420d1eb90798629a,2024-09-13T14:06:04.777000
|
||||
CVE-2024-4669,0,0,a0976f7ea3148ea450eb6167436e6be2dce8d6ef83862711f573c56cae3ce5e3,2024-06-13T18:36:09.013000
|
||||
CVE-2024-46690,0,0,5af0b3656d8665491f28716ea7603bb0aea5a272e8c1bf40ddd30a1255705d3f,2024-09-13T14:06:04.777000
|
||||
CVE-2024-46691,0,0,8d55b848b81c7cb2c778de047700fe79e5a572a7f93e6b725cb6041c3a622df9,2024-09-13T16:52:21.057000
|
||||
CVE-2024-46692,0,0,9bca0a6bdb61a96f9bc64b59f8db4ea9997f8804d892b4802b2be44c689f8375,2024-09-13T16:52:31.627000
|
||||
CVE-2024-46693,0,0,f40beda26d58dd63f40fce79476da79807c21e41b509da1c16e262d523bfeffd,2024-09-13T16:52:41.270000
|
||||
CVE-2024-46694,0,1,06269357f08eee761908cfd9b04c5fe20fc860e28bbdb44b42b210145df9925d,2024-09-19T18:16:22.247000
|
||||
CVE-2024-46694,0,0,06269357f08eee761908cfd9b04c5fe20fc860e28bbdb44b42b210145df9925d,2024-09-19T18:16:22.247000
|
||||
CVE-2024-46695,0,0,2c8af9d60124692d9b6ffbee8d85890498f0625ad48f0bbdd570b3ffb4d38d01,2024-09-19T17:59:23.113000
|
||||
CVE-2024-46696,0,0,4daffe95396a7dfd0d7acd939b4305def2a9b7710efef4f9245a07291857d3de,2024-09-13T16:52:54.363000
|
||||
CVE-2024-46697,0,0,43464ee626e8d8f74d444b3501adf5b870c21b9df376053a20055ac938fa0f19,2024-09-19T17:53:43.173000
|
||||
@ -260354,7 +260357,7 @@ CVE-2024-47049,0,0,0632fb9d999b7a0f0772c4bcd61e6520e2d1b47f1300e76d8780773c41e65
|
||||
CVE-2024-4705,0,0,26b272539ad739bf4cdb858b2e8b5e748c64203d796935ad814b34867a2408a1,2024-07-23T21:15:15.147000
|
||||
CVE-2024-47050,0,0,9fb75eec65018e4d647a95f2333bff20c9711ca8d7d9db03b47fb8b221e40194,2024-09-18T21:15:13.743000
|
||||
CVE-2024-47058,0,0,531cdfc92f76cf21d508b7b6b64addb62803353166eabe55a6bed18bc21358e2,2024-09-18T21:15:13.923000
|
||||
CVE-2024-47059,0,0,963e19b9c43cf5c2fc64d99e9fc14f93e8e1c53bf419efc5d22841199e5248e4,2024-09-18T22:15:04.650000
|
||||
CVE-2024-47059,0,1,9466c943a41a2a8bfe710cc2c837a4487b91955bb723557f79ac146e1930f89d,2024-09-19T20:15:06.953000
|
||||
CVE-2024-4706,0,0,9fb317504579dba9e9851d8ef4d6ad37a71c1b39f231cbe007ab86fbaba76dfc,2024-05-24T01:15:30.977000
|
||||
CVE-2024-4707,0,0,8435cc27f87132831b9d3f5ec9dd9fe3cf2e85b8b55db14f2e03c7e1023e49fc,2024-07-24T17:59:29.230000
|
||||
CVE-2024-4708,0,0,c271dbf72bf72946f8191932c0e7ad58bd2ebed6dfb7e2f3f6882e8c7f0da7d3,2024-08-29T19:31:56.517000
|
||||
@ -260370,10 +260373,10 @@ CVE-2024-4712,0,0,8c9912a72fdb973e445c03f0c431e473f67586d80716ea23b3c04f9af648d8
|
||||
CVE-2024-4713,0,0,a3c96b0a67396332ccb3b3b7da032ec990741228737b0623d292fd0ff6dd150b,2024-06-04T19:20:46.913000
|
||||
CVE-2024-4714,0,0,d7e9d9d95d84a12a856ae94c0b47f221a8b241db6b1f0d94ea74b84fa1b36764,2024-06-04T19:20:47.027000
|
||||
CVE-2024-4715,0,0,8280b54df57d141f79c5c5ba7edbd4b8610f06a30ecbd5ba39cd6c268b4b3f05,2024-06-04T19:20:47.130000
|
||||
CVE-2024-47159,1,1,37cd59fd117f5cf50861cd88b8abebb1e1884db1ba94dfcf9ceb69cfa69bb528,2024-09-19T18:15:09.803000
|
||||
CVE-2024-47159,0,0,37cd59fd117f5cf50861cd88b8abebb1e1884db1ba94dfcf9ceb69cfa69bb528,2024-09-19T18:15:09.803000
|
||||
CVE-2024-4716,0,0,17dd73abada87214ed7c4da9787dcdd43aa5089416e4d3395c3029d4b8a776fa,2024-06-04T19:20:47.230000
|
||||
CVE-2024-47160,1,1,3f6af29a5418c0ea31328b241c0a67d429ed0f2ea9a2a4795d9856d4f3850696,2024-09-19T18:15:10.013000
|
||||
CVE-2024-47162,1,1,7a918a68f616964c3a64fa06f015fde786d9abd7d452c1eb72d0cb1650c8a0a1,2024-09-19T18:15:10.227000
|
||||
CVE-2024-47160,0,0,3f6af29a5418c0ea31328b241c0a67d429ed0f2ea9a2a4795d9856d4f3850696,2024-09-19T18:15:10.013000
|
||||
CVE-2024-47162,0,0,7a918a68f616964c3a64fa06f015fde786d9abd7d452c1eb72d0cb1650c8a0a1,2024-09-19T18:15:10.227000
|
||||
CVE-2024-4717,0,0,7921e256cd1b57dcd690590999b44ca8d29db58a18405deda5f12fdfca691aaa,2024-05-17T02:40:34.317000
|
||||
CVE-2024-4718,0,0,2fda56f630ea417950b3260007ed553b407a44c514b05be289e283a21ee915c1,2024-06-06T20:15:14.717000
|
||||
CVE-2024-4719,0,0,5f15010ce3da97593d62bd8e5cbd7e4df0db8fec077945fcbb72e898184ff8a0,2024-06-20T20:15:19.763000
|
||||
@ -261470,7 +261473,7 @@ CVE-2024-5966,0,0,554ab96b833511e084a1ba15972a76a5727ada41d1caccbee2c2fb11ec3339
|
||||
CVE-2024-5967,0,0,2abd808298732cc4b1964c14eae7561fd71fe2ea4a15e03466adc54a1382b0dd,2024-09-09T19:15:13.920000
|
||||
CVE-2024-5969,0,0,54d46cadd04c8b436788a5c40941c4acf03c3675c749089b56e7845a318ca37a,2024-07-29T14:12:08.783000
|
||||
CVE-2024-5970,0,0,e17a8b7d022fd70a35f0b32d2191e09c5597e5e1c83547c2cb361b6d17360bc1,2024-06-20T12:44:01.637000
|
||||
CVE-2024-5971,0,0,90369bbae7ec6d0a431cb805e5b4d95e2a2bbc43686a90d71299e68e9272ae8b,2024-09-09T23:15:10.200000
|
||||
CVE-2024-5971,0,1,b240fc2a76fc52f8e8a86abd78dd833d601e288ed9a23c68d806cff359ade316,2024-09-19T20:15:07.113000
|
||||
CVE-2024-5972,0,0,3700c5b3eb4bcd1d3bafe18b568e7aab0a0471128c3ce92a2f73ba8aa9a9cb4f,2024-06-28T19:15:07.500000
|
||||
CVE-2024-5973,0,0,149a91603c9d83724ac65f413ff97fc2f66dbcbaf98a063fb82f82fbdd67043a,2024-08-01T14:00:06.420000
|
||||
CVE-2024-5974,0,0,6465747ebb7259fe338ca54f64293ac9e5e639bde8c31a40e65e3d25cce88c2a,2024-08-22T14:26:55.657000
|
||||
@ -261571,7 +261574,7 @@ CVE-2024-6083,0,0,6d9bb4abe3add5a9314088c73da6990ced956f79d42ec66733f8e068d49bd5
|
||||
CVE-2024-6084,0,0,6faa90c930997c0aec12adfd29df5cf00c8158d82ed8686290b073db2ac7ae60,2024-08-08T16:20:42.537000
|
||||
CVE-2024-6085,0,0,e5356847d2f9e7fb365a9afe07e5899cc989c4ce949a989ba1a4d6bdfc914a39,2024-06-27T19:25:12.067000
|
||||
CVE-2024-6086,0,0,28c3e2540b87e65e53355efd52e7428f1a054dcf2c80ab6446e2a8ede4d737ac,2024-09-19T15:57:50.267000
|
||||
CVE-2024-6087,0,1,2f3eb6d59e26864799858a36adcfa783331a6d1634807496019392d9a2953a02,2024-09-19T19:32:14.710000
|
||||
CVE-2024-6087,0,0,2f3eb6d59e26864799858a36adcfa783331a6d1634807496019392d9a2953a02,2024-09-19T19:32:14.710000
|
||||
CVE-2024-6088,0,0,ed650bb4582239ce54305f8b10efe45d50e8cb6f1aa2aa30a6eb4b92f9ce96ee,2024-07-02T18:08:38.550000
|
||||
CVE-2024-6089,0,0,fa11ebbd3c2f4a5c1117ab55af0cf255d158d35dec5a0296617f7f6f3c04b619,2024-09-10T14:05:16.183000
|
||||
CVE-2024-6090,0,0,97ec0efad50117bd537daa7e8cf0d79ae16e3a9835d40dc90b67ac25a55b7eab,2024-06-27T19:25:12.067000
|
||||
@ -261986,7 +261989,7 @@ CVE-2024-6576,0,0,173ec86e8bf671719ebb8c23252d7cacd934d3a530ec0d1cd90d8e5a216070
|
||||
CVE-2024-6578,0,0,8257f7484236e424ea5fc80479c626bf5a4575b6af53231a1ef13b8f880d14c5,2024-08-20T14:51:08.483000
|
||||
CVE-2024-6579,0,0,70ddc19f754f7cb2643cde5cc84c5570c5648bfc6d8e404da6cc6aa9bb2155c8,2024-07-16T13:43:58.773000
|
||||
CVE-2024-6580,0,0,d43dfa58651574c4447e8f323f3cb1f6a00d6bdef0613d5834aefccecf968c5d,2024-07-09T18:19:14.047000
|
||||
CVE-2024-6582,0,1,f1b25d4279cac74ab3d7a85e57ca8c7ee792f976a2129063fda41c9a32a1f1a1,2024-09-19T19:45:30.283000
|
||||
CVE-2024-6582,0,0,f1b25d4279cac74ab3d7a85e57ca8c7ee792f976a2129063fda41c9a32a1f1a1,2024-09-19T19:45:30.283000
|
||||
CVE-2024-6585,0,0,21557c5e847867bddd52df3ea3c8bef1c24ed1d84f80217fb776a5f25fb72332,2024-09-03T15:35:16.350000
|
||||
CVE-2024-6586,0,0,fae1812021b838f78d9872593f00167428e312ab2f13f81f35231f528789de0a,2024-09-03T15:35:16.577000
|
||||
CVE-2024-6587,0,0,a3f7b0fbe3d852ff05f7aac13ae8f9e1a110910501abae4c571a6fba27015678,2024-09-13T16:37:22.997000
|
||||
@ -262187,10 +262190,10 @@ CVE-2024-6853,0,0,bfc770724a0cf755cd219c2fcd6258a625eb83bca7472f15162225f6a8c2c1
|
||||
CVE-2024-6855,0,0,747d35631c84525ad9c2f1282cefb607972b06ed8ec8bcfcc6cf90db5747a736,2024-09-11T16:21:38.833000
|
||||
CVE-2024-6856,0,0,19b5d479e1e69973e8f497d2ae00f38aea8ffd7644169a9718f707450440aae4,2024-09-11T16:20:45.503000
|
||||
CVE-2024-6859,0,0,5a84bd798224932fef849d8b4793f644b651b362a6172317aad467bf1bad3991,2024-09-11T16:19:18.517000
|
||||
CVE-2024-6862,0,1,073f5a8c1f8e2bec8087db878aed60d70af4b3c11209547716a8f3a82485e7e6,2024-09-19T18:37:20.910000
|
||||
CVE-2024-6862,0,0,073f5a8c1f8e2bec8087db878aed60d70af4b3c11209547716a8f3a82485e7e6,2024-09-19T18:37:20.910000
|
||||
CVE-2024-6864,0,0,469a0ad039e39ca71e90d0d65b529134e06346783388106a10d2fa7d0b356379,2024-09-03T20:22:16.433000
|
||||
CVE-2024-6865,0,0,cb8e3c3258edaecfb2408f04adfa69a3419179f287cf4fd0248689bfb8e952c7,2024-08-05T14:15:34.847000
|
||||
CVE-2024-6867,0,1,97784f08d4711dc358ee536a5af5e617f34cad9ff3713963d54758397f7f7f62,2024-09-19T18:28:05.477000
|
||||
CVE-2024-6867,0,0,97784f08d4711dc358ee536a5af5e617f34cad9ff3713963d54758397f7f7f62,2024-09-19T18:28:05.477000
|
||||
CVE-2024-6869,0,0,cc765e0741eb808a23e90ee3171ba570febcbdba6db7038c79938ac8aebc9baa,2024-08-08T13:04:18.753000
|
||||
CVE-2024-6870,0,0,fdc9781daaba3083ba91ed61390ac3ea5e3a3c1deb45aa4706aee786b8d5379e,2024-08-22T12:48:02.790000
|
||||
CVE-2024-6872,0,0,9eb628e3a6d1ea0380e94dd099512f5a2f74ddb0ba75bf9a102e83ab13e260f5,2024-08-05T12:41:45.957000
|
||||
@ -262582,7 +262585,7 @@ CVE-2024-7381,0,0,ca7cc8a67702d68f3387a7110e4857f594b40c8a2313eee62c5e5767902903
|
||||
CVE-2024-7382,0,0,38dbfd05201dede10e421fed3e3b0d675c062e51a3aa3f6428b06fad8a88c553,2024-08-12T13:41:36.517000
|
||||
CVE-2024-7383,0,0,d2737cd69fd6977c5ff3be04ae298e1bf45647197e69a7bb44ed13fcf569259a,2024-09-18T20:15:03.760000
|
||||
CVE-2024-7384,0,0,959c51f9d9089f82b75c53d05c8efe51e41a9d17d895f5f42948ac7d882f9351,2024-08-22T12:48:02.790000
|
||||
CVE-2024-7387,0,0,7214f5d5054d4691e77d0832bdeaf771fbee38c6d6e438c4147da17cf7c3db4d,2024-09-19T14:15:17.470000
|
||||
CVE-2024-7387,0,1,02e3ddf0d1b53309fa616b29b5397e6bbcf37df8e8f5e06d91f5505bbe8c5d56,2024-09-19T20:15:07.277000
|
||||
CVE-2024-7388,0,0,f17b6292d40b8d2d9d22865fdbf912ed4604c49db111ea9e78f67fdbb858de85,2024-08-13T12:58:25.437000
|
||||
CVE-2024-7389,0,0,a5776290ae762be985431158def3f2d002b265ca6a95ce830d8f46206854f21a,2024-08-02T12:59:43.990000
|
||||
CVE-2024-7390,0,0,7895dab66ddc704219ddf6d579bba9623189661f47faa0372744a2c8c5dc8ef9,2024-08-21T12:30:33.697000
|
||||
@ -262699,7 +262702,7 @@ CVE-2024-7548,0,0,a83134ab837c1f044f7727880755ec030be1b2bfb863a86ddf4e4c1bc02ee7
|
||||
CVE-2024-7550,0,0,0ccf7d721eccaf753ef6c8a48b561ee0f9b8839c90b74eac00f4a21c8fe96817,2024-08-12T18:32:08.900000
|
||||
CVE-2024-7551,0,0,b186fc017c389d319de7d861b1d913a84a5458cd5dbd51c140f542d4aff6a7a9,2024-08-12T16:12:12.377000
|
||||
CVE-2024-7552,0,0,811aa90d2d18bb406f73befc3765a8f78539782307b57a4dcd481925c3ed1f73,2024-08-07T21:29:57.417000
|
||||
CVE-2024-7553,0,0,423c29f04f0f081a0c5d9465a918cf0ed131ece97e02d2f5996269c83101214a,2024-08-07T15:17:46.717000
|
||||
CVE-2024-7553,0,1,a003128917872942bd112101b4a09fecd49ec3896a9f8c6e71229fee4c654d46,2024-09-19T20:46:04.103000
|
||||
CVE-2024-7554,0,0,dfc64307827dd001a7e870992bca03e6a424d33d4584f122a641b15fec5c52ce,2024-08-29T15:42:13.387000
|
||||
CVE-2024-7557,0,0,ae8c41f4adb3726b27116f90c8ab746ad0ea79736dd5450dde42c0320a002e78,2024-09-18T07:15:04.293000
|
||||
CVE-2024-7559,0,0,4dc25ec2b0f2eec8919ecc81f209446d933d662f72b02d2630c82c602d53e698,2024-08-23T16:18:28.547000
|
||||
@ -262723,7 +262726,7 @@ CVE-2024-7585,0,0,c8cbc83b6349dead88df56624342a371a1668d621fa6cda31e8fc0e9835fc3
|
||||
CVE-2024-7588,0,0,5a601951792deb0c1a10bd51703f1f9beff37d3a9397ce091c3662d925878616,2024-08-14T13:00:37.107000
|
||||
CVE-2024-7589,0,0,aa1647eb6c306ec7b876b5795f9775a883f5cc7b06ae7ba418ac0c8e49665270,2024-08-13T16:58:08.793000
|
||||
CVE-2024-7590,0,0,7c97d5aae327ca695e1cd419af58bc8aaacb7517411055405e5e64d98b0261a2,2024-08-13T12:58:25.437000
|
||||
CVE-2024-7591,0,1,9bcedc7acbbd809dd6a6f1ce5b15338605c84badc4e03df5409c4faa7e372fa9,2024-09-19T18:19:12.210000
|
||||
CVE-2024-7591,0,0,9bcedc7acbbd809dd6a6f1ce5b15338605c84badc4e03df5409c4faa7e372fa9,2024-09-19T18:19:12.210000
|
||||
CVE-2024-7592,0,0,af44aafcb14e521ee1ae85082a6a487c5d017e994f40b59b2c958cad447a75f0,2024-09-04T21:15:14.643000
|
||||
CVE-2024-7593,0,0,4da85e7ccbdae09b92bad5968b875ba9d0537591e39a68c4cb01282a2ce99145,2024-09-06T22:13:21.197000
|
||||
CVE-2024-7599,0,0,425c886d21e000ef875307fcd7ee082e5b24e31594a14a2fc6a0c956123982af,2024-09-06T16:46:26.830000
|
||||
@ -262743,7 +262746,7 @@ CVE-2024-7613,0,0,595ae1d3f56b81eeb34ef1e184ddf7962f3a8fbfc042ff77a8fcf0bd3f10f2
|
||||
CVE-2024-7614,0,0,70ea68e630891f9909a0a8afd3fe5566dad840edc8df033b5c308064cf074a69,2024-08-21T18:48:47.273000
|
||||
CVE-2024-7615,0,0,bdb4e2a47bb0b635ad5424e7dee382fdbc667ab1983b9e7b4b79b80817773efa,2024-08-21T18:48:19.590000
|
||||
CVE-2024-7616,0,0,240142a7cf93711d379b14c2a6284d004fd0a2d1c674fc02d32efdd57aa3e2bd,2024-08-13T16:59:39.517000
|
||||
CVE-2024-7618,0,1,e379ad82065f512d4128a18f1f44cca9c9ed5e25a8aa7122c36d82acf515d6a2,2024-09-19T18:20:00
|
||||
CVE-2024-7618,0,0,e379ad82065f512d4128a18f1f44cca9c9ed5e25a8aa7122c36d82acf515d6a2,2024-09-19T18:20:00
|
||||
CVE-2024-7619,0,0,52e157835f9b49014d03653876a6177ba54feacc6eb580f7a52506ce1aa54bb3,2024-09-03T18:15:09.223000
|
||||
CVE-2024-7620,0,0,2469206363fd07a16a5de81f046bd6f1d56a8441f8330f436267f4dce05a3b0c,2024-09-09T13:03:38.303000
|
||||
CVE-2024-7621,0,0,07161284faa2eb0637370b6ff462e631787a37850cefb6ac5fa6750545dd7050,2024-08-12T13:41:36.517000
|
||||
@ -262775,7 +262778,7 @@ CVE-2024-7649,0,0,3d0b3905ac20943345a47479273aed49759614ef3fae3b2688335294d499ed
|
||||
CVE-2024-7651,0,0,386a7bb7aa0b4a32ced6fe813025ac2a231789f032ca2ee2a42adaaefdd20a30,2024-08-31T03:28:02.947000
|
||||
CVE-2024-7652,0,0,c7f694e385002b920efe17a183ba7538023c7cf88dd53a372f2912343dfa2405,2024-09-09T13:03:38.303000
|
||||
CVE-2024-7654,0,0,49383a5796e66ab6802124ac3212336a9fa34e97b446554c0840904b1dbfce6f,2024-09-05T13:53:16.540000
|
||||
CVE-2024-7655,0,1,0e49c78835c3c35a884c75ee847ab7ab55175fc03260920848d00a05b510db96,2024-09-19T18:20:53.617000
|
||||
CVE-2024-7655,0,0,0e49c78835c3c35a884c75ee847ab7ab55175fc03260920848d00a05b510db96,2024-09-19T18:20:53.617000
|
||||
CVE-2024-7656,0,0,54bddf4f1c99f206f2f263928ecdc7b2851230b8a0f25d44b79aae993350ca70,2024-08-26T12:47:20.187000
|
||||
CVE-2024-7657,0,0,b71ee6cae903ac873f30f4d097ac987c873f0095983bc9620eda1ffab659d5b8,2024-08-15T17:48:20.920000
|
||||
CVE-2024-7658,0,0,832a65f53a452b2fa1561cdaae82b94e5ac7d59bc491a09b3cdc773f704d8588,2024-08-13T17:00:19.800000
|
||||
@ -262932,7 +262935,7 @@ CVE-2024-7870,0,0,4141f264a23149fdea486ca620816f1c3f41138cabf6c23297e955fee3254f
|
||||
CVE-2024-7871,0,0,d47ede6ca23d1578a9b705a8257da890832c1e69392e6414a190c6fb054ce14f,2024-09-04T17:34:14.630000
|
||||
CVE-2024-7873,0,0,f5b47e1fae6843a68da1453efc0beadae64e0f4319f9390c480de261438a8dd5,2024-09-17T13:15:04.003000
|
||||
CVE-2024-7884,0,0,785c516d1dabe55fa31f7695706ba6a05f994a8f8d63c46081a0777ad4e173ab,2024-09-12T20:47:13.387000
|
||||
CVE-2024-7885,0,0,8ccead187965a5f1c2abb39b48c133d9f576a21859dc9731309caf892f9de5e4,2024-09-09T23:15:10.350000
|
||||
CVE-2024-7885,0,1,b180edc3f841635966345269d0abc3580da7735701efbdcde3f656f6bc9ddf46,2024-09-19T20:15:07.410000
|
||||
CVE-2024-7886,0,0,b8c1f856b8479c6982faa8a2fc4a6d8b2480e045b8b096d9bd3b8640a06eb6f3,2024-08-19T13:00:23.117000
|
||||
CVE-2024-7887,0,0,ba2ac28c88e5c856e9fa78c00b11f37e0df98a3508bf609dc9edbaa04a8fdb8e,2024-08-19T12:59:59.177000
|
||||
CVE-2024-7888,0,0,2881b53b5410d8b7f634ff84d81ce7bcb024ba75858c366b9280d55d99841e21,2024-09-13T14:06:04.777000
|
||||
@ -263196,7 +263199,7 @@ CVE-2024-8296,0,0,e31c225486c181d770097ee2f86386b9a5d776a033c8c4a5860d3ba550c9de
|
||||
CVE-2024-8297,0,0,cc2df51be4ac5261775d9a448c17018496059825966f6585d5dfd052f6e898fe,2024-08-30T15:28:50.863000
|
||||
CVE-2024-8298,0,0,b6e0265f7e06064f96a4b1454f4843c935b76c78438dc3aea3b160aebd5f455b,2024-09-06T14:53:06.890000
|
||||
CVE-2024-8301,0,0,517ca402c22af2219c7d5e72c26f25471bc06be609f1fc004544a29726452fb8,2024-08-30T15:24:09.830000
|
||||
CVE-2024-8302,0,0,73573fb95f4db9829ae46e4068d229d908324e137e6241c89a1030ab338e0051,2024-08-30T13:00:05.390000
|
||||
CVE-2024-8302,0,1,e8302268b823029df660336594addee00302ff9a5d73561baeea3f2fb742c200,2024-09-19T21:55:54.683000
|
||||
CVE-2024-8303,0,0,7d291660edacb98ef58ef33c4f7785c68c1ad74e546b2f9d99bc765dad9ef6ed,2024-08-30T13:00:05.390000
|
||||
CVE-2024-8304,0,0,85b305b2398367dad597d38ceb56cadd779bad44eaa5caa6e4c63c6b9d707691,2024-09-19T17:39:46.687000
|
||||
CVE-2024-8306,0,0,8e0a05cb4cc1d2892722cafe041f9325413c92ba2fea525dcf4a3adbe1e3e801,2024-09-18T19:51:14.850000
|
||||
@ -263269,7 +263272,7 @@ CVE-2024-8413,0,0,c7339b673131014f9dfb6c78c5b0192adccb852147a0c7cbd0ff5fa07a7854
|
||||
CVE-2024-8414,0,0,40169a23a4033486754844c64fbfe06d703efd0c5e76953cc0d7fdb87952af16,2024-09-06T16:44:04.583000
|
||||
CVE-2024-8415,0,0,ab2184731c9f97a955dc07eba7cdff71ad9ccc33249e750d3db8dd063bdd30fc,2024-09-06T16:40:06.120000
|
||||
CVE-2024-8416,0,0,135a04ecfe4373dd7e99d043d76128d31e33f9197f002be9000b3ee4a6fb8417,2024-09-06T16:38:44.053000
|
||||
CVE-2024-8417,0,1,8580cbd844a53cf335c90d7b0b427ee4c081c6060c525d72a654406a58e7a040,2024-09-19T19:53:12.383000
|
||||
CVE-2024-8417,0,0,8580cbd844a53cf335c90d7b0b427ee4c081c6060c525d72a654406a58e7a040,2024-09-19T19:53:12.383000
|
||||
CVE-2024-8418,0,0,45db7c5e32209561e336e52f972f2bde6e59f6364560666284054dcf874b8fe1,2024-09-17T20:15:06.710000
|
||||
CVE-2024-8427,0,0,57dcbf97b68dfdac544ef9faf52bed3587edeaacde16f067da96879677802837,2024-09-11T17:41:18.733000
|
||||
CVE-2024-8428,0,0,d38eeb7d0c97ad7b1cddb799376a1380930df039d2cf833bc9165ae4323bcbef,2024-09-06T16:46:26.830000
|
||||
@ -263378,7 +263381,7 @@ CVE-2024-8693,0,0,0bf9bf9fae22897a2e08c32b35e067d4cd5332929319ef0efd3cac78490dae
|
||||
CVE-2024-8694,0,0,2e1993ee271c7157fceb04bc71a63e2f464fbf1cced51f76c6346163fc12348e,2024-09-12T12:35:54.013000
|
||||
CVE-2024-8695,0,0,52bc6b8b60aae6c315837e4eb131cf540e2b445dfd9cef8ca664c148d103d584,2024-09-13T16:01:31.340000
|
||||
CVE-2024-8696,0,0,3ba62a921109450e540b318e77e86831bda9c658513319d0aed77dfa516028ff,2024-09-13T16:01:22.410000
|
||||
CVE-2024-8698,0,0,c0d35a3336e4f52767b135ff04ba45500c7dcae9cd5d2fa662eee7f90410608f,2024-09-19T16:15:06.177000
|
||||
CVE-2024-8698,0,1,57a50d1b448574a1d6821c44ecd8389a2da97b4c787b5f2a0c2f40af59c885a7,2024-09-19T20:15:07.560000
|
||||
CVE-2024-8705,0,0,cb97dc5a896b102e020f4c6f7ce9db0475b1546a38609fc8cb74768e11db5694,2024-09-12T12:35:54.013000
|
||||
CVE-2024-8706,0,0,6f71e5876a7dec7ae56fc457ee5142cb7cf0075ec2e95d2e16cb7162a3c7da96,2024-09-12T12:35:54.013000
|
||||
CVE-2024-8707,0,0,53b8f536d953dccbee27f563b6dc5109a4e216dbbeb04b8d1e78c2b9c947dcb4,2024-09-12T15:18:27.333000
|
||||
@ -263428,7 +263431,7 @@ CVE-2024-8869,0,0,b189f35b5a28c07852ca6d00280a8a46d906bab51b4d56357a90dd535f0651
|
||||
CVE-2024-8875,0,0,0e9f0f93ae52ceba12c10384b7bbc3067de71e5c05493a69fd2a253e00e4d595,2024-09-16T15:30:28.733000
|
||||
CVE-2024-8876,0,0,addb0b44112b1a235842444519e6fae7cff8dfa26076fe63459831c9d856ee31,2024-09-16T15:30:28.733000
|
||||
CVE-2024-8880,0,0,c70f0c1183e8c3d27f59a30fcb8fb19e438cfaca91533ac680f84142f408d715,2024-09-16T15:30:28.733000
|
||||
CVE-2024-8883,0,0,0f1b63aa77f8575956d79a906cb024f514d666d4a8c9ffedf8d766e5d9bb5bf7,2024-09-19T16:15:06.403000
|
||||
CVE-2024-8883,0,1,a0be9b5da5d215b8fc392d3c8a617ce7263ca56781c3f2afcdacabf77294a182,2024-09-19T20:15:07.687000
|
||||
CVE-2024-8887,0,0,3a4ee8c7c72402467690a1d5baf4ee46122c1a9bd1979c36a47f557846bba5ff,2024-09-18T11:15:10.530000
|
||||
CVE-2024-8888,0,0,1e74f6eae96ea2bc3e4d1e807f25808d32b7d4278014e4cabc70fec925ff3214,2024-09-18T12:15:03.520000
|
||||
CVE-2024-8889,0,0,d14885671be48487e73dc26a56497c68dd08124696a268e049900425bd24a291,2024-09-18T12:15:03.710000
|
||||
@ -263453,6 +263456,9 @@ CVE-2024-8949,0,0,558b0f2a15aa10d0215f6e776b245d8a42240ea8527c9ffd4d56905704832d
|
||||
CVE-2024-8951,0,0,fdcc8f1ef8d6875cdf064fe8ca72ee0e4237f3f89d53a358120e1931bee39aef,2024-09-17T20:15:07.020000
|
||||
CVE-2024-8956,0,0,8fb796f1e52be7bf3f012ac38934615fcbd07a654b11f2c40ea225bc31651e57,2024-09-17T20:15:07.287000
|
||||
CVE-2024-8957,0,0,745e7f02f1c26d5de4df67e0c2795340d562588c5301af2d060cb965e1ba5dae,2024-09-17T21:15:13.423000
|
||||
CVE-2024-8963,1,1,bad5e8de51e4d1a286774f7d07084658a354cb4de050dbe04254efc089204dfb,2024-09-19T18:15:10.600000
|
||||
CVE-2024-8963,0,0,bad5e8de51e4d1a286774f7d07084658a354cb4de050dbe04254efc089204dfb,2024-09-19T18:15:10.600000
|
||||
CVE-2024-8969,0,0,b91ca645bf2071dccf15db49fd3efa26a97008959fe8a964028e51af15b02de3,2024-09-18T07:15:04.657000
|
||||
CVE-2024-8986,0,0,26509263613f6b019d61b82311e5933cc6dfa31601ff6ae6235d1951248ed56c,2024-09-19T11:15:10.913000
|
||||
CVE-2024-9001,1,1,0d8d90841bb39ddd316a3b0f07a2238c63d1c3d63bb40bbe9e637e97326eb595,2024-09-19T20:15:07.810000
|
||||
CVE-2024-9003,1,1,a7edb4b1e5aaa5d75db10253bc650df7937e844fac757479d623a505ae81903c,2024-09-19T21:15:16.143000
|
||||
CVE-2024-9004,1,1,fa45f62c4f8208914b8b10a2adf7a01880d466c20d27c0e44bd9dc0f676ce217,2024-09-19T21:15:16.383000
|
||||
|
Can't render this file because it is too large.
|
Loading…
x
Reference in New Issue
Block a user