mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-06-19 17:31:42 +00:00
Auto-Update: 2024-12-20T19:00:21.539113+00:00
This commit is contained in:
parent
45d7a648bb
commit
f70e459510
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2020-9250",
|
||||
"sourceIdentifier": "psirt@huawei.com",
|
||||
"published": "2024-12-20T02:15:05.150",
|
||||
"lastModified": "2024-12-20T02:15:05.150",
|
||||
"lastModified": "2024-12-20T18:15:23.860",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -45,6 +45,16 @@
|
||||
"value": "CWE-287"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-522"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2022-32144",
|
||||
"sourceIdentifier": "psirt@huawei.com",
|
||||
"published": "2024-12-20T02:15:05.320",
|
||||
"lastModified": "2024-12-20T02:15:05.320",
|
||||
"lastModified": "2024-12-20T18:15:25.070",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -45,6 +45,16 @@
|
||||
"value": "CWE-20"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-346"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2023-28826",
|
||||
"sourceIdentifier": "product-security@apple.com",
|
||||
"published": "2024-03-08T02:15:47.160",
|
||||
"lastModified": "2024-12-05T15:30:17.053",
|
||||
"lastModified": "2024-12-20T17:09:10.193",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -60,9 +60,9 @@
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:apple:ipad_os:*:*:*:*:*:*:*:*",
|
||||
"criteria": "cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "16.7.6",
|
||||
"matchCriteriaId": "E4D5AB12-A4B6-4456-A560-DD1FFE8E8CA8"
|
||||
"matchCriteriaId": "9277B3E8-4519-4E07-A89A-A08C604AB78C"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
@ -99,14 +99,16 @@
|
||||
"url": "http://seclists.org/fulldisclosure/2024/Mar/22",
|
||||
"source": "product-security@apple.com",
|
||||
"tags": [
|
||||
"Mailing List"
|
||||
"Mailing List",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://seclists.org/fulldisclosure/2024/Mar/23",
|
||||
"source": "product-security@apple.com",
|
||||
"tags": [
|
||||
"Mailing List"
|
||||
"Mailing List",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
@ -148,14 +150,16 @@
|
||||
"url": "http://seclists.org/fulldisclosure/2024/Mar/22",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Mailing List"
|
||||
"Mailing List",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://seclists.org/fulldisclosure/2024/Mar/23",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Mailing List"
|
||||
"Mailing List",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-32435",
|
||||
"sourceIdentifier": "product-security@apple.com",
|
||||
"published": "2023-06-23T18:15:13.767",
|
||||
"lastModified": "2024-12-16T20:15:06.797",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2024-12-20T17:49:17.260",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -137,7 +137,6 @@
|
||||
"url": "https://support.apple.com/en-us/HT213670",
|
||||
"source": "product-security@apple.com",
|
||||
"tags": [
|
||||
"Release Notes",
|
||||
"Vendor Advisory"
|
||||
]
|
||||
},
|
||||
@ -145,7 +144,6 @@
|
||||
"url": "https://support.apple.com/en-us/HT213671",
|
||||
"source": "product-security@apple.com",
|
||||
"tags": [
|
||||
"Release Notes",
|
||||
"Vendor Advisory"
|
||||
]
|
||||
},
|
||||
@ -153,7 +151,6 @@
|
||||
"url": "https://support.apple.com/en-us/HT213676",
|
||||
"source": "product-security@apple.com",
|
||||
"tags": [
|
||||
"Release Notes",
|
||||
"Vendor Advisory"
|
||||
]
|
||||
},
|
||||
@ -161,7 +158,6 @@
|
||||
"url": "https://support.apple.com/en-us/HT213811",
|
||||
"source": "product-security@apple.com",
|
||||
"tags": [
|
||||
"Release Notes",
|
||||
"Vendor Advisory"
|
||||
]
|
||||
},
|
||||
@ -169,7 +165,6 @@
|
||||
"url": "https://support.apple.com/en-us/HT213670",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Release Notes",
|
||||
"Vendor Advisory"
|
||||
]
|
||||
},
|
||||
@ -177,7 +172,6 @@
|
||||
"url": "https://support.apple.com/en-us/HT213671",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Release Notes",
|
||||
"Vendor Advisory"
|
||||
]
|
||||
},
|
||||
@ -185,7 +179,6 @@
|
||||
"url": "https://support.apple.com/en-us/HT213676",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Release Notes",
|
||||
"Vendor Advisory"
|
||||
]
|
||||
},
|
||||
@ -193,7 +186,6 @@
|
||||
"url": "https://support.apple.com/en-us/HT213811",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Release Notes",
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-34048",
|
||||
"sourceIdentifier": "security@vmware.com",
|
||||
"published": "2023-10-25T18:17:27.897",
|
||||
"lastModified": "2024-11-21T08:06:28.310",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2024-12-20T17:41:40.150",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -294,7 +294,11 @@
|
||||
},
|
||||
{
|
||||
"url": "https://www.vicarius.io/vsociety/posts/understanding-cve-2023-34048-a-zero-day-out-of-bound-write-in-vcenter-server",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://www.vmware.com/security/advisories/VMSA-2023-0023.html",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-34362",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-06-02T14:15:09.487",
|
||||
"lastModified": "2024-11-21T08:07:05.843",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2024-12-20T17:49:01.637",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-35078",
|
||||
"sourceIdentifier": "support@hackerone.com",
|
||||
"published": "2023-07-25T07:15:10.897",
|
||||
"lastModified": "2024-11-21T08:07:56.027",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2024-12-20T17:50:19.417",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -93,8 +93,22 @@
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:ivanti:endpoint_manager_mobile:*:*:*:*:*:*:*:*",
|
||||
"versionEndIncluding": "11.10",
|
||||
"matchCriteriaId": "1AADBE71-2697-49C9-8FC1-B77B700980AE"
|
||||
"versionEndExcluding": "11.8.1.1",
|
||||
"matchCriteriaId": "7C48786C-399D-4B0C-8082-64112C4DA5C4"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:ivanti:endpoint_manager_mobile:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "11.9.0",
|
||||
"versionEndExcluding": "11.9.1.1",
|
||||
"matchCriteriaId": "50C1A12C-5862-48B6-ADA3-4222516DA152"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:ivanti:endpoint_manager_mobile:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "11.10",
|
||||
"versionEndExcluding": "11.10.0.2",
|
||||
"matchCriteriaId": "76DAE9E0-15F0-40AB-8D03-E64423AD0E07"
|
||||
}
|
||||
]
|
||||
}
|
||||
@ -114,7 +128,6 @@
|
||||
"source": "support@hackerone.com",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Patch",
|
||||
"Vendor Advisory"
|
||||
]
|
||||
},
|
||||
@ -145,7 +158,6 @@
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Patch",
|
||||
"Vendor Advisory"
|
||||
]
|
||||
},
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-35674",
|
||||
"sourceIdentifier": "security@android.com",
|
||||
"published": "2023-09-11T21:15:42.193",
|
||||
"lastModified": "2024-11-21T08:08:29.043",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2024-12-20T17:39:49.327",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -102,13 +102,14 @@
|
||||
"url": "https://android.googlesource.com/platform/frameworks/base/+/7428962d3b064ce1122809d87af65099d1129c9e",
|
||||
"source": "security@android.com",
|
||||
"tags": [
|
||||
"Issue Tracking"
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://source.android.com/security/bulletin/2023-09-01",
|
||||
"source": "security@android.com",
|
||||
"tags": [
|
||||
"Patch",
|
||||
"Vendor Advisory"
|
||||
]
|
||||
},
|
||||
@ -116,13 +117,14 @@
|
||||
"url": "https://android.googlesource.com/platform/frameworks/base/+/7428962d3b064ce1122809d87af65099d1129c9e",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Issue Tracking"
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://source.android.com/security/bulletin/2023-09-01",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Patch",
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-38035",
|
||||
"sourceIdentifier": "support@hackerone.com",
|
||||
"published": "2023-08-21T17:15:47.457",
|
||||
"lastModified": "2024-11-21T08:12:43.250",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2024-12-20T17:50:25.653",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-38831",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-08-23T17:15:43.863",
|
||||
"lastModified": "2024-11-21T08:14:15.183",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2024-12-20T17:50:59.707",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -121,8 +121,7 @@
|
||||
"url": "https://news.ycombinator.com/item?id=37236100",
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Issue Tracking",
|
||||
"Third Party Advisory"
|
||||
"Issue Tracking"
|
||||
]
|
||||
},
|
||||
{
|
||||
@ -130,6 +129,7 @@
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Press/Media Coverage",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
@ -138,6 +138,7 @@
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Press/Media Coverage",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
@ -162,8 +163,7 @@
|
||||
"url": "https://news.ycombinator.com/item?id=37236100",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Issue Tracking",
|
||||
"Third Party Advisory"
|
||||
"Issue Tracking"
|
||||
]
|
||||
},
|
||||
{
|
||||
@ -171,6 +171,7 @@
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Press/Media Coverage",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
@ -179,6 +180,7 @@
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Press/Media Coverage",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-43208",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-10-26T17:15:09.033",
|
||||
"lastModified": "2024-11-21T08:23:50.473",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2024-12-20T17:41:47.143",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-43770",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-09-22T06:15:10.090",
|
||||
"lastModified": "2024-11-21T08:24:45.360",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2024-12-20T17:40:26.160",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -144,16 +144,14 @@
|
||||
"url": "https://lists.debian.org/debian-lts-announce/2023/09/msg00024.html",
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Mailing List",
|
||||
"Third Party Advisory"
|
||||
"Mailing List"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://roundcube.net/news/2023/09/15/security-update-1.6.3-released",
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Release Notes",
|
||||
"Vendor Advisory"
|
||||
"Release Notes"
|
||||
]
|
||||
},
|
||||
{
|
||||
@ -167,16 +165,14 @@
|
||||
"url": "https://lists.debian.org/debian-lts-announce/2023/09/msg00024.html",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Mailing List",
|
||||
"Third Party Advisory"
|
||||
"Mailing List"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://roundcube.net/news/2023/09/15/security-update-1.6.3-released",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Release Notes",
|
||||
"Vendor Advisory"
|
||||
"Release Notes"
|
||||
]
|
||||
}
|
||||
]
|
||||
|
File diff suppressed because it is too large
Load Diff
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-45853",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-10-14T02:15:09.323",
|
||||
"lastModified": "2024-11-21T08:27:29.250",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2024-12-20T17:41:31.237",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -91,8 +91,24 @@
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:zlib:zlib:*:*:*:*:*:*:*:*",
|
||||
"versionEndIncluding": "1.3",
|
||||
"matchCriteriaId": "BCAD5846-089D-4749-88B4-20243BC19B29"
|
||||
"versionEndExcluding": "1.3.1",
|
||||
"matchCriteriaId": "D9777259-9187-4F85-AF5A-48C12FD65A2F"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:smihica:pyminizip:*:*:*:*:*:python:*:*",
|
||||
"versionEndIncluding": "0.2.6",
|
||||
"matchCriteriaId": "5C7D42DB-C5AE-41AF-A6DB-A9B12E064DDE"
|
||||
}
|
||||
]
|
||||
}
|
||||
@ -102,11 +118,17 @@
|
||||
"references": [
|
||||
{
|
||||
"url": "http://www.openwall.com/lists/oss-security/2023/10/20/9",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Mailing List"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://www.openwall.com/lists/oss-security/2024/01/24/10",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Mailing List"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://chromium.googlesource.com/chromium/src/+/d709fb23806858847131027da95ef4c548813356",
|
||||
@ -141,19 +163,32 @@
|
||||
},
|
||||
{
|
||||
"url": "https://lists.debian.org/debian-lts-announce/2023/11/msg00026.html",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Mailing List",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://pypi.org/project/pyminizip/#history",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Release Notes"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://security.gentoo.org/glsa/202401-18",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://security.netapp.com/advisory/ntap-20231130-0009/",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://www.winimage.com/zLibDll/minizip.html",
|
||||
@ -164,11 +199,17 @@
|
||||
},
|
||||
{
|
||||
"url": "http://www.openwall.com/lists/oss-security/2023/10/20/9",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Mailing List"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://www.openwall.com/lists/oss-security/2024/01/24/10",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Mailing List"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://chromium.googlesource.com/chromium/src/+/d709fb23806858847131027da95ef4c548813356",
|
||||
@ -203,19 +244,32 @@
|
||||
},
|
||||
{
|
||||
"url": "https://lists.debian.org/debian-lts-announce/2023/11/msg00026.html",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Mailing List",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://pypi.org/project/pyminizip/#history",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Release Notes"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://security.gentoo.org/glsa/202401-18",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://security.netapp.com/advisory/ntap-20231130-0009/",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://www.winimage.com/zLibDll/minizip.html",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-47246",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-11-10T06:15:30.510",
|
||||
"lastModified": "2024-11-21T08:30:02.010",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2024-12-20T17:20:48.827",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-4762",
|
||||
"sourceIdentifier": "chrome-cve-admin@google.com",
|
||||
"published": "2023-09-05T22:15:09.677",
|
||||
"lastModified": "2024-11-21T08:35:55.690",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2024-12-20T18:21:05.033",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -169,7 +169,6 @@
|
||||
"url": "https://chromereleases.googleblog.com/2023/09/stable-channel-update-for-desktop.html",
|
||||
"source": "chrome-cve-admin@google.com",
|
||||
"tags": [
|
||||
"Release Notes",
|
||||
"Vendor Advisory"
|
||||
]
|
||||
},
|
||||
@ -206,7 +205,7 @@
|
||||
"source": "chrome-cve-admin@google.com",
|
||||
"tags": [
|
||||
"Patch",
|
||||
"Vendor Advisory"
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
@ -242,7 +241,6 @@
|
||||
"url": "https://chromereleases.googleblog.com/2023/09/stable-channel-update-for-desktop.html",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Release Notes",
|
||||
"Vendor Advisory"
|
||||
]
|
||||
},
|
||||
@ -279,7 +277,7 @@
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Patch",
|
||||
"Vendor Advisory"
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-49103",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-11-21T22:15:08.277",
|
||||
"lastModified": "2024-11-21T08:32:49.923",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2024-12-20T17:26:50.947",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
|
@ -2,16 +2,43 @@
|
||||
"id": "CVE-2023-7005",
|
||||
"sourceIdentifier": "cret@cert.org",
|
||||
"published": "2024-12-19T18:15:06.313",
|
||||
"lastModified": "2024-12-19T18:15:06.313",
|
||||
"lastModified": "2024-12-20T18:15:25.777",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A specially crafted message can be sent to the TTLock App that downgrades the encryption protocol used for communication, and can be utilized to compromise the lock, such as through revealing the unlockKey field."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Se puede enviar un mensaje especialmente manipulado a la aplicaci\u00f3n TTLock que degrada el protocolo de cifrado utilizado para la comunicaci\u00f3n y puede utilizarse para comprometer la cerradura, por ejemplo, revelando el campo unlockKey."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
|
||||
"baseScore": 7.5,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://alephsecurity.com/2024/03/07/kontrol-lux-lock-2/",
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-10555",
|
||||
"sourceIdentifier": "contact@wpscan.com",
|
||||
"published": "2024-12-20T06:15:22.450",
|
||||
"lastModified": "2024-12-20T06:15:22.450",
|
||||
"lastModified": "2024-12-20T17:15:07.037",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -11,7 +11,42 @@
|
||||
"value": "The WordPress Button Plugin MaxButtons WordPress plugin before 9.8.1 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup)."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N",
|
||||
"baseScore": 4.8,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "HIGH",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 1.7,
|
||||
"impactScore": 2.7
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://wpscan.com/vulnerability/fcc97635-e939-4cb4-9851-6f6ac4f6ad47/",
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-10706",
|
||||
"sourceIdentifier": "contact@wpscan.com",
|
||||
"published": "2024-12-20T06:15:22.710",
|
||||
"lastModified": "2024-12-20T06:15:22.710",
|
||||
"lastModified": "2024-12-20T17:15:07.260",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -11,7 +11,42 @@
|
||||
"value": "The Download Manager WordPress plugin before 3.3.03 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup)."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N",
|
||||
"baseScore": 4.8,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "HIGH",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 1.7,
|
||||
"impactScore": 2.7
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://wpscan.com/vulnerability/01193420-9a4c-4961-93b6-aa2e37e36be1/",
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-11108",
|
||||
"sourceIdentifier": "contact@wpscan.com",
|
||||
"published": "2024-12-20T06:15:22.827",
|
||||
"lastModified": "2024-12-20T06:15:22.827",
|
||||
"lastModified": "2024-12-20T17:15:07.447",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -11,7 +11,42 @@
|
||||
"value": "The Serious Slider WordPress plugin before 1.2.7 does not validate and escape some of its shortcode attributes before outputting them back in a page/post where the shortcode is embed, which could allow users with the contributor role and above to perform Stored Cross-Site Scripting attacks."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
|
||||
"baseScore": 5.4,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 2.3,
|
||||
"impactScore": 2.7
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://wpscan.com/vulnerability/7790af9d-621b-474c-b28c-c774e2a292bb/",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-11576",
|
||||
"sourceIdentifier": "zdi-disclosures@trendmicro.com",
|
||||
"published": "2024-11-22T21:15:16.693",
|
||||
"lastModified": "2024-11-22T21:15:16.693",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-12-20T17:36:12.133",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -16,6 +16,28 @@
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 7.8,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
],
|
||||
"cvssMetricV30": [
|
||||
{
|
||||
"source": "zdi-disclosures@trendmicro.com",
|
||||
@ -49,16 +71,50 @@
|
||||
"value": "CWE-122"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-787"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:luxion:keyshot:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "2024.3",
|
||||
"matchCriteriaId": "43DD8506-9BCC-4827-9347-D728392947F2"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://download.keyshot.com/cert/ksa-655925/ksa-655925.pdf?version=1.0&_gl=1*1vzfrlf*_gcl_au*MTIxNTA2Njg4MS4xNzMxNTMwMjIx",
|
||||
"source": "zdi-disclosures@trendmicro.com"
|
||||
"source": "zdi-disclosures@trendmicro.com",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://www.zerodayinitiative.com/advisories/ZDI-24-1607/",
|
||||
"source": "zdi-disclosures@trendmicro.com"
|
||||
"source": "zdi-disclosures@trendmicro.com",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-11577",
|
||||
"sourceIdentifier": "zdi-disclosures@trendmicro.com",
|
||||
"published": "2024-11-22T21:15:16.810",
|
||||
"lastModified": "2024-11-22T21:15:16.810",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-12-20T17:36:00.887",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -16,6 +16,28 @@
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 7.8,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
],
|
||||
"cvssMetricV30": [
|
||||
{
|
||||
"source": "zdi-disclosures@trendmicro.com",
|
||||
@ -51,14 +73,38 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:luxion:keyshot:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "2024.3",
|
||||
"matchCriteriaId": "43DD8506-9BCC-4827-9347-D728392947F2"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://download.keyshot.com/cert/ksa-655925/ksa-655925.pdf?version=1.0&_gl=1*1vzfrlf*_gcl_au*MTIxNTA2Njg4MS4xNzMxNTMwMjIx",
|
||||
"source": "zdi-disclosures@trendmicro.com"
|
||||
"source": "zdi-disclosures@trendmicro.com",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://www.zerodayinitiative.com/advisories/ZDI-24-1608/",
|
||||
"source": "zdi-disclosures@trendmicro.com"
|
||||
"source": "zdi-disclosures@trendmicro.com",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-11579",
|
||||
"sourceIdentifier": "zdi-disclosures@trendmicro.com",
|
||||
"published": "2024-11-22T21:15:17.027",
|
||||
"lastModified": "2024-11-22T21:15:17.027",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-12-20T17:35:51.253",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -16,6 +16,28 @@
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 7.8,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
],
|
||||
"cvssMetricV30": [
|
||||
{
|
||||
"source": "zdi-disclosures@trendmicro.com",
|
||||
@ -51,14 +73,38 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:luxion:keyshot:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "2024.3",
|
||||
"matchCriteriaId": "43DD8506-9BCC-4827-9347-D728392947F2"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://download.keyshot.com/cert/ksa-655925/ksa-655925.pdf?version=1.0&_gl=1*1vzfrlf*_gcl_au*MTIxNTA2Njg4MS4xNzMxNTMwMjIx",
|
||||
"source": "zdi-disclosures@trendmicro.com"
|
||||
"source": "zdi-disclosures@trendmicro.com",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://www.zerodayinitiative.com/advisories/ZDI-24-1610/",
|
||||
"source": "zdi-disclosures@trendmicro.com"
|
||||
"source": "zdi-disclosures@trendmicro.com",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-11580",
|
||||
"sourceIdentifier": "zdi-disclosures@trendmicro.com",
|
||||
"published": "2024-11-22T21:15:17.133",
|
||||
"lastModified": "2024-11-22T21:15:17.133",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-12-20T17:35:39.513",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -16,6 +16,28 @@
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 7.8,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
],
|
||||
"cvssMetricV30": [
|
||||
{
|
||||
"source": "zdi-disclosures@trendmicro.com",
|
||||
@ -49,16 +71,50 @@
|
||||
"value": "CWE-122"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-787"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:luxion:keyshot:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "2024.3",
|
||||
"matchCriteriaId": "43DD8506-9BCC-4827-9347-D728392947F2"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://download.keyshot.com/cert/ksa-655925/ksa-655925.pdf?version=1.0&_gl=1*1vzfrlf*_gcl_au*MTIxNTA2Njg4MS4xNzMxNTMwMjIx",
|
||||
"source": "zdi-disclosures@trendmicro.com"
|
||||
"source": "zdi-disclosures@trendmicro.com",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://www.zerodayinitiative.com/advisories/ZDI-24-1611/",
|
||||
"source": "zdi-disclosures@trendmicro.com"
|
||||
"source": "zdi-disclosures@trendmicro.com",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-11581",
|
||||
"sourceIdentifier": "zdi-disclosures@trendmicro.com",
|
||||
"published": "2024-11-22T21:15:17.257",
|
||||
"lastModified": "2024-11-22T21:15:17.257",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-12-20T17:32:03.967",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -16,6 +16,28 @@
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 7.8,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
],
|
||||
"cvssMetricV30": [
|
||||
{
|
||||
"source": "zdi-disclosures@trendmicro.com",
|
||||
@ -51,14 +73,38 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:luxion:keyshot:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "2024.3",
|
||||
"matchCriteriaId": "43DD8506-9BCC-4827-9347-D728392947F2"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://download.keyshot.com/cert/ksa-655925/ksa-655925.pdf?version=1.0&_gl=1*1vzfrlf*_gcl_au*MTIxNTA2Njg4MS4xNzMxNTMwMjIx",
|
||||
"source": "zdi-disclosures@trendmicro.com"
|
||||
"source": "zdi-disclosures@trendmicro.com",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://www.zerodayinitiative.com/advisories/ZDI-24-1612/",
|
||||
"source": "zdi-disclosures@trendmicro.com"
|
||||
"source": "zdi-disclosures@trendmicro.com",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,13 +2,17 @@
|
||||
"id": "CVE-2024-11984",
|
||||
"sourceIdentifier": "ART@zuso.ai",
|
||||
"published": "2024-12-19T04:15:05.127",
|
||||
"lastModified": "2024-12-19T04:15:05.127",
|
||||
"lastModified": "2024-12-20T18:15:26.703",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A unrestricted upload of file with dangerous type vulnerability in epaper draft function in Corporate Training Management System before 10.13 allows remote authenticated users to bypass file upload restrictions and perform arbitrary system commands with SYSTEM privilege via a crafted ZIP file."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Una vulnerabilidad de carga sin restricciones de archivos con un tipo peligroso en la funci\u00f3n de borrador de documento electr\u00f3nico en Corporate Training Management System anterior a la versi\u00f3n 10.13 permite a usuarios remotos autenticados eludir las restricciones de carga de archivos y ejecutar comandos arbitrarios del sistema con privilegios de SYSTEM a trav\u00e9s de un archivo ZIP manipulado espec\u00edficamente."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
@ -55,6 +59,28 @@
|
||||
"providerUrgency": "NOT_DEFINED"
|
||||
}
|
||||
}
|
||||
],
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 8.8,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
|
@ -2,13 +2,17 @@
|
||||
"id": "CVE-2024-12569",
|
||||
"sourceIdentifier": "cf45122d-9d50-442a-9b23-e05cde9943d8",
|
||||
"published": "2024-12-19T09:16:13.830",
|
||||
"lastModified": "2024-12-19T09:16:13.830",
|
||||
"lastModified": "2024-12-20T18:15:27.230",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Disclosure of sensitive information in HikVision camera driver's log file in XProtect Device Pack allows an attacker to read camera credentials stored in the Recording Server under specific conditions."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "La divulgaci\u00f3n de informaci\u00f3n confidencial en el archivo de registro del controlador de la c\u00e1mara HikVision en XProtect Device Pack permite a un atacante leer las credenciales de la c\u00e1mara almacenadas en el servidor de grabaci\u00f3n bajo condiciones espec\u00edficas."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
@ -55,6 +59,28 @@
|
||||
"providerUrgency": "NOT_DEFINED"
|
||||
}
|
||||
}
|
||||
],
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
|
||||
"baseScore": 7.5,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
|
@ -2,13 +2,17 @@
|
||||
"id": "CVE-2024-12672",
|
||||
"sourceIdentifier": "PSIRT@rockwellautomation.com",
|
||||
"published": "2024-12-19T21:15:07.627",
|
||||
"lastModified": "2024-12-19T21:15:07.627",
|
||||
"lastModified": "2024-12-20T18:15:27.537",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A third-party vulnerability exists in the Rockwell Automation\u00a0Arena\u00ae\u00a0that could allow a threat actor to write beyond the boundaries of allocated memory in a DOE file. If exploited, a threat actor could leverage this vulnerability to execute arbitrary code. To exploit this vulnerability, a legitimate user must execute the malicious code crafted by the threat actor."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Existe una vulnerabilidad de terceros en Rockwell Automation Arena\u00ae que podr\u00eda permitir que un actor de amenazas escriba m\u00e1s all\u00e1 de los l\u00edmites de la memoria asignada en un archivo DOE. Si se explota, un actor de amenazas podr\u00eda aprovechar esta vulnerabilidad para ejecutar c\u00f3digo arbitrario. Para explotar esta vulnerabilidad, un usuario leg\u00edtimo debe ejecutar el c\u00f3digo malicioso manipulado por el actor de amenazas."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
@ -57,6 +61,18 @@
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-787"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.rockwellautomation.com/en-us/trust-center/security-advisories/advisory.SD1713.html",
|
||||
|
104
CVE-2024/CVE-2024-126xx/CVE-2024-12677.json
Normal file
104
CVE-2024/CVE-2024-126xx/CVE-2024-12677.json
Normal file
@ -0,0 +1,104 @@
|
||||
{
|
||||
"id": "CVE-2024-12677",
|
||||
"sourceIdentifier": "ics-cert@hq.dhs.gov",
|
||||
"published": "2024-12-20T17:15:07.757",
|
||||
"lastModified": "2024-12-20T17:15:07.757",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Delta Electronics DTM Soft deserializes objects, which could allow an attacker to execute arbitrary code."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV40": [
|
||||
{
|
||||
"source": "ics-cert@hq.dhs.gov",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "4.0",
|
||||
"vectorString": "CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
|
||||
"baseScore": 8.5,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"attackRequirements": "NONE",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "PASSIVE",
|
||||
"vulnerableSystemConfidentiality": "HIGH",
|
||||
"vulnerableSystemIntegrity": "HIGH",
|
||||
"vulnerableSystemAvailability": "HIGH",
|
||||
"subsequentSystemConfidentiality": "NONE",
|
||||
"subsequentSystemIntegrity": "NONE",
|
||||
"subsequentSystemAvailability": "NONE",
|
||||
"exploitMaturity": "NOT_DEFINED",
|
||||
"confidentialityRequirements": "NOT_DEFINED",
|
||||
"integrityRequirements": "NOT_DEFINED",
|
||||
"availabilityRequirements": "NOT_DEFINED",
|
||||
"modifiedAttackVector": "NOT_DEFINED",
|
||||
"modifiedAttackComplexity": "NOT_DEFINED",
|
||||
"modifiedAttackRequirements": "NOT_DEFINED",
|
||||
"modifiedPrivilegesRequired": "NOT_DEFINED",
|
||||
"modifiedUserInteraction": "NOT_DEFINED",
|
||||
"modifiedVulnerableSystemConfidentiality": "NOT_DEFINED",
|
||||
"modifiedVulnerableSystemIntegrity": "NOT_DEFINED",
|
||||
"modifiedVulnerableSystemAvailability": "NOT_DEFINED",
|
||||
"modifiedSubsequentSystemConfidentiality": "NOT_DEFINED",
|
||||
"modifiedSubsequentSystemIntegrity": "NOT_DEFINED",
|
||||
"modifiedSubsequentSystemAvailability": "NOT_DEFINED",
|
||||
"safety": "NOT_DEFINED",
|
||||
"automatable": "NOT_DEFINED",
|
||||
"recovery": "NOT_DEFINED",
|
||||
"valueDensity": "NOT_DEFINED",
|
||||
"vulnerabilityResponseEffort": "NOT_DEFINED",
|
||||
"providerUrgency": "NOT_DEFINED"
|
||||
}
|
||||
}
|
||||
],
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "ics-cert@hq.dhs.gov",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 7.8,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "ics-cert@hq.dhs.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-502"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://downloadcenter.deltaww.com/en-US/DownloadCenter?v=1&q=dtm&sort_expr=cdate&sort_dir=DESC",
|
||||
"source": "ics-cert@hq.dhs.gov"
|
||||
},
|
||||
{
|
||||
"url": "https://www.cisa.gov/news-events/ics-advisories/icsa-24-354-03",
|
||||
"source": "ics-cert@hq.dhs.gov"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-21549",
|
||||
"sourceIdentifier": "report@snyk.io",
|
||||
"published": "2024-12-20T05:15:06.780",
|
||||
"lastModified": "2024-12-20T05:15:06.780",
|
||||
"lastModified": "2024-12-20T17:15:07.983",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -89,6 +89,16 @@
|
||||
"value": "CWE-20"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-125"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-21855",
|
||||
"sourceIdentifier": "talos-cna@cisco.com",
|
||||
"published": "2024-11-21T15:15:26.940",
|
||||
"lastModified": "2024-11-21T16:15:22.370",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2024-12-20T17:05:24.753",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -51,14 +51,37 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:mayuresh82:gocast:1.1.3:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "D05D6000-69B5-4BE9-8E11-3BB4EC5A575F"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://talosintelligence.com/vulnerability_reports/TALOS-2024-1962",
|
||||
"source": "talos-cna@cisco.com"
|
||||
"source": "talos-cna@cisco.com",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://www.talosintelligence.com/vulnerability_reports/TALOS-2024-1962",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-23225",
|
||||
"sourceIdentifier": "product-security@apple.com",
|
||||
"published": "2024-03-05T20:16:01.370",
|
||||
"lastModified": "2024-12-20T16:51:15.130",
|
||||
"lastModified": "2024-12-20T17:08:54.523",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -94,16 +94,16 @@
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:apple:ipad_os:*:*:*:*:*:*:*:*",
|
||||
"criteria": "cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "16.7.6",
|
||||
"matchCriteriaId": "E4D5AB12-A4B6-4456-A560-DD1FFE8E8CA8"
|
||||
"matchCriteriaId": "9277B3E8-4519-4E07-A89A-A08C604AB78C"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:apple:ipad_os:*:*:*:*:*:*:*:*",
|
||||
"criteria": "cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "17.0",
|
||||
"versionEndExcluding": "17.4",
|
||||
"matchCriteriaId": "E9F4BB50-D14B-4807-8F38-69ADFCE433BC"
|
||||
"matchCriteriaId": "7CB78D53-5EC0-45E5-871B-0C18F1E6D438"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-23231",
|
||||
"sourceIdentifier": "product-security@apple.com",
|
||||
"published": "2024-03-08T02:15:47.780",
|
||||
"lastModified": "2024-12-05T16:27:10.467",
|
||||
"lastModified": "2024-12-20T17:09:06.867",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -80,16 +80,16 @@
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:apple:ipad_os:*:*:*:*:*:*:*:*",
|
||||
"criteria": "cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "16.7.6",
|
||||
"matchCriteriaId": "E4D5AB12-A4B6-4456-A560-DD1FFE8E8CA8"
|
||||
"matchCriteriaId": "9277B3E8-4519-4E07-A89A-A08C604AB78C"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:apple:ipad_os:*:*:*:*:*:*:*:*",
|
||||
"criteria": "cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "17.0",
|
||||
"versionEndExcluding": "17.4",
|
||||
"matchCriteriaId": "E9F4BB50-D14B-4807-8F38-69ADFCE433BC"
|
||||
"matchCriteriaId": "7CB78D53-5EC0-45E5-871B-0C18F1E6D438"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
@ -134,21 +134,24 @@
|
||||
"url": "http://seclists.org/fulldisclosure/2024/Mar/21",
|
||||
"source": "product-security@apple.com",
|
||||
"tags": [
|
||||
"Mailing List"
|
||||
"Mailing List",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://seclists.org/fulldisclosure/2024/Mar/22",
|
||||
"source": "product-security@apple.com",
|
||||
"tags": [
|
||||
"Mailing List"
|
||||
"Mailing List",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://seclists.org/fulldisclosure/2024/Mar/24",
|
||||
"source": "product-security@apple.com",
|
||||
"tags": [
|
||||
"Mailing List"
|
||||
"Mailing List",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
@ -197,21 +200,24 @@
|
||||
"url": "http://seclists.org/fulldisclosure/2024/Mar/21",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Mailing List"
|
||||
"Mailing List",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://seclists.org/fulldisclosure/2024/Mar/22",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Mailing List"
|
||||
"Mailing List",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://seclists.org/fulldisclosure/2024/Mar/24",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Mailing List"
|
||||
"Mailing List",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-23235",
|
||||
"sourceIdentifier": "product-security@apple.com",
|
||||
"published": "2024-03-08T02:15:47.970",
|
||||
"lastModified": "2024-12-06T02:36:27.937",
|
||||
"lastModified": "2024-12-20T17:08:50.517",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -90,16 +90,16 @@
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:apple:ipad_os:*:*:*:*:*:*:*:*",
|
||||
"criteria": "cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "16.7.6",
|
||||
"matchCriteriaId": "E4D5AB12-A4B6-4456-A560-DD1FFE8E8CA8"
|
||||
"matchCriteriaId": "9277B3E8-4519-4E07-A89A-A08C604AB78C"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:apple:ipad_os:*:*:*:*:*:*:*:*",
|
||||
"criteria": "cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "17.0",
|
||||
"versionEndExcluding": "17.4",
|
||||
"matchCriteriaId": "E9F4BB50-D14B-4807-8F38-69ADFCE433BC"
|
||||
"matchCriteriaId": "7CB78D53-5EC0-45E5-871B-0C18F1E6D438"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
@ -149,28 +149,32 @@
|
||||
"url": "http://seclists.org/fulldisclosure/2024/Mar/21",
|
||||
"source": "product-security@apple.com",
|
||||
"tags": [
|
||||
"Mailing List"
|
||||
"Mailing List",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://seclists.org/fulldisclosure/2024/Mar/24",
|
||||
"source": "product-security@apple.com",
|
||||
"tags": [
|
||||
"Mailing List"
|
||||
"Mailing List",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://seclists.org/fulldisclosure/2024/Mar/25",
|
||||
"source": "product-security@apple.com",
|
||||
"tags": [
|
||||
"Mailing List"
|
||||
"Mailing List",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://seclists.org/fulldisclosure/2024/Mar/26",
|
||||
"source": "product-security@apple.com",
|
||||
"tags": [
|
||||
"Mailing List"
|
||||
"Mailing List",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
@ -219,28 +223,32 @@
|
||||
"url": "http://seclists.org/fulldisclosure/2024/Mar/21",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Mailing List"
|
||||
"Mailing List",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://seclists.org/fulldisclosure/2024/Mar/24",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Mailing List"
|
||||
"Mailing List",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://seclists.org/fulldisclosure/2024/Mar/25",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Mailing List"
|
||||
"Mailing List",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://seclists.org/fulldisclosure/2024/Mar/26",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Mailing List"
|
||||
"Mailing List",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-23246",
|
||||
"sourceIdentifier": "product-security@apple.com",
|
||||
"published": "2024-03-08T02:15:48.337",
|
||||
"lastModified": "2024-12-06T02:02:26.433",
|
||||
"lastModified": "2024-12-20T17:09:02.443",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -90,16 +90,16 @@
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:apple:ipad_os:*:*:*:*:*:*:*:*",
|
||||
"criteria": "cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "16.7.6",
|
||||
"matchCriteriaId": "E4D5AB12-A4B6-4456-A560-DD1FFE8E8CA8"
|
||||
"matchCriteriaId": "9277B3E8-4519-4E07-A89A-A08C604AB78C"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:apple:ipad_os:*:*:*:*:*:*:*:*",
|
||||
"criteria": "cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "17.0",
|
||||
"versionEndExcluding": "17.4",
|
||||
"matchCriteriaId": "E9F4BB50-D14B-4807-8F38-69ADFCE433BC"
|
||||
"matchCriteriaId": "7CB78D53-5EC0-45E5-871B-0C18F1E6D438"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
@ -149,28 +149,32 @@
|
||||
"url": "http://seclists.org/fulldisclosure/2024/Mar/21",
|
||||
"source": "product-security@apple.com",
|
||||
"tags": [
|
||||
"Mailing List"
|
||||
"Mailing List",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://seclists.org/fulldisclosure/2024/Mar/24",
|
||||
"source": "product-security@apple.com",
|
||||
"tags": [
|
||||
"Mailing List"
|
||||
"Mailing List",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://seclists.org/fulldisclosure/2024/Mar/25",
|
||||
"source": "product-security@apple.com",
|
||||
"tags": [
|
||||
"Mailing List"
|
||||
"Mailing List",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://seclists.org/fulldisclosure/2024/Mar/26",
|
||||
"source": "product-security@apple.com",
|
||||
"tags": [
|
||||
"Mailing List"
|
||||
"Mailing List",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
@ -219,28 +223,32 @@
|
||||
"url": "http://seclists.org/fulldisclosure/2024/Mar/21",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Mailing List"
|
||||
"Mailing List",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://seclists.org/fulldisclosure/2024/Mar/24",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Mailing List"
|
||||
"Mailing List",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://seclists.org/fulldisclosure/2024/Mar/25",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Mailing List"
|
||||
"Mailing List",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://seclists.org/fulldisclosure/2024/Mar/26",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Mailing List"
|
||||
"Mailing List",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-23257",
|
||||
"sourceIdentifier": "product-security@apple.com",
|
||||
"published": "2024-03-08T02:15:48.760",
|
||||
"lastModified": "2024-12-06T15:07:41.487",
|
||||
"lastModified": "2024-12-20T17:08:48.080",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -60,9 +60,9 @@
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:apple:ipad_os:*:*:*:*:*:*:*:*",
|
||||
"criteria": "cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "16.7.6",
|
||||
"matchCriteriaId": "E4D5AB12-A4B6-4456-A560-DD1FFE8E8CA8"
|
||||
"matchCriteriaId": "9277B3E8-4519-4E07-A89A-A08C604AB78C"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
@ -107,28 +107,32 @@
|
||||
"url": "http://seclists.org/fulldisclosure/2024/Mar/21",
|
||||
"source": "product-security@apple.com",
|
||||
"tags": [
|
||||
"Mailing List"
|
||||
"Mailing List",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://seclists.org/fulldisclosure/2024/Mar/22",
|
||||
"source": "product-security@apple.com",
|
||||
"tags": [
|
||||
"Mailing List"
|
||||
"Mailing List",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://seclists.org/fulldisclosure/2024/Mar/23",
|
||||
"source": "product-security@apple.com",
|
||||
"tags": [
|
||||
"Mailing List"
|
||||
"Mailing List",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://seclists.org/fulldisclosure/2024/Mar/26",
|
||||
"source": "product-security@apple.com",
|
||||
"tags": [
|
||||
"Mailing List"
|
||||
"Mailing List",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
@ -170,28 +174,32 @@
|
||||
"url": "http://seclists.org/fulldisclosure/2024/Mar/21",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Mailing List"
|
||||
"Mailing List",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://seclists.org/fulldisclosure/2024/Mar/22",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Mailing List"
|
||||
"Mailing List",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://seclists.org/fulldisclosure/2024/Mar/23",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Mailing List"
|
||||
"Mailing List",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://seclists.org/fulldisclosure/2024/Mar/26",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Mailing List"
|
||||
"Mailing List",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-23259",
|
||||
"sourceIdentifier": "product-security@apple.com",
|
||||
"published": "2024-03-08T02:15:48.847",
|
||||
"lastModified": "2024-12-13T16:49:32.297",
|
||||
"lastModified": "2024-12-20T17:08:58.297",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -60,16 +60,16 @@
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:apple:ipad_os:*:*:*:*:*:*:*:*",
|
||||
"criteria": "cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "16.7.6",
|
||||
"matchCriteriaId": "E4D5AB12-A4B6-4456-A560-DD1FFE8E8CA8"
|
||||
"matchCriteriaId": "9277B3E8-4519-4E07-A89A-A08C604AB78C"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:apple:ipad_os:*:*:*:*:*:*:*:*",
|
||||
"criteria": "cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "17.0",
|
||||
"versionEndExcluding": "17.4",
|
||||
"matchCriteriaId": "E9F4BB50-D14B-4807-8F38-69ADFCE433BC"
|
||||
"matchCriteriaId": "7CB78D53-5EC0-45E5-871B-0C18F1E6D438"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
@ -101,7 +101,8 @@
|
||||
"url": "http://seclists.org/fulldisclosure/2024/Mar/21",
|
||||
"source": "product-security@apple.com",
|
||||
"tags": [
|
||||
"Mailing List"
|
||||
"Mailing List",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
@ -129,7 +130,8 @@
|
||||
"url": "http://seclists.org/fulldisclosure/2024/Mar/21",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Mailing List"
|
||||
"Mailing List",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-23278",
|
||||
"sourceIdentifier": "product-security@apple.com",
|
||||
"published": "2024-03-08T02:15:49.647",
|
||||
"lastModified": "2024-12-07T02:21:44.657",
|
||||
"lastModified": "2024-12-20T17:09:14.257",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -90,16 +90,16 @@
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:apple:ipad_os:*:*:*:*:*:*:*:*",
|
||||
"criteria": "cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "16.7.6",
|
||||
"matchCriteriaId": "E4D5AB12-A4B6-4456-A560-DD1FFE8E8CA8"
|
||||
"matchCriteriaId": "9277B3E8-4519-4E07-A89A-A08C604AB78C"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:apple:ipad_os:*:*:*:*:*:*:*:*",
|
||||
"criteria": "cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "17.0",
|
||||
"versionEndExcluding": "17.4",
|
||||
"matchCriteriaId": "E9F4BB50-D14B-4807-8F38-69ADFCE433BC"
|
||||
"matchCriteriaId": "7CB78D53-5EC0-45E5-871B-0C18F1E6D438"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
@ -150,28 +150,32 @@
|
||||
"url": "http://seclists.org/fulldisclosure/2024/Mar/21",
|
||||
"source": "product-security@apple.com",
|
||||
"tags": [
|
||||
"Mailing List"
|
||||
"Mailing List",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://seclists.org/fulldisclosure/2024/Mar/22",
|
||||
"source": "product-security@apple.com",
|
||||
"tags": [
|
||||
"Mailing List"
|
||||
"Mailing List",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://seclists.org/fulldisclosure/2024/Mar/24",
|
||||
"source": "product-security@apple.com",
|
||||
"tags": [
|
||||
"Mailing List"
|
||||
"Mailing List",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://seclists.org/fulldisclosure/2024/Mar/25",
|
||||
"source": "product-security@apple.com",
|
||||
"tags": [
|
||||
"Mailing List"
|
||||
"Mailing List",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
@ -227,28 +231,32 @@
|
||||
"url": "http://seclists.org/fulldisclosure/2024/Mar/21",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Mailing List"
|
||||
"Mailing List",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://seclists.org/fulldisclosure/2024/Mar/22",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Mailing List"
|
||||
"Mailing List",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://seclists.org/fulldisclosure/2024/Mar/24",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Mailing List"
|
||||
"Mailing List",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://seclists.org/fulldisclosure/2024/Mar/25",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Mailing List"
|
||||
"Mailing List",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-23897",
|
||||
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
|
||||
"published": "2024-01-24T18:15:09.370",
|
||||
"lastModified": "2024-11-21T08:58:39.693",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2024-12-20T17:30:33.613",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -190,7 +190,11 @@
|
||||
},
|
||||
{
|
||||
"url": "https://www.vicarius.io/vsociety/posts/the-anatomy-of-a-jenkins-vulnerability-cve-2024-23897-revealed-1",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-28892",
|
||||
"sourceIdentifier": "talos-cna@cisco.com",
|
||||
"published": "2024-11-21T15:15:29.007",
|
||||
"lastModified": "2024-11-21T16:15:23.977",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2024-12-20T17:05:48.707",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -51,14 +51,37 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:mayuresh82:gocast:1.1.3:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "D05D6000-69B5-4BE9-8E11-3BB4EC5A575F"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://talosintelligence.com/vulnerability_reports/TALOS-2024-1960",
|
||||
"source": "talos-cna@cisco.com"
|
||||
"source": "talos-cna@cisco.com",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://www.talosintelligence.com/vulnerability_reports/TALOS-2024-1960",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-38861",
|
||||
"sourceIdentifier": "security@checkmk.com",
|
||||
"published": "2024-09-27T09:15:02.873",
|
||||
"lastModified": "2024-12-11T02:59:59.170",
|
||||
"lastModified": "2024-12-20T18:57:56.383",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -115,9 +115,8 @@
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:tomtretbar:mikrotik:*:*:*:*:*:checkmk:*:*",
|
||||
"versionStartIncluding": "2.0.0",
|
||||
"versionEndIncluding": "2.5.5",
|
||||
"matchCriteriaId": "2D5CB426-4414-4CCD-8E0F-A4ADE860A8D9"
|
||||
"matchCriteriaId": "A47E4014-102B-4584-8F41-372C2D609AA3"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-4331",
|
||||
"sourceIdentifier": "chrome-cve-admin@google.com",
|
||||
"published": "2024-05-01T13:15:52.343",
|
||||
"lastModified": "2024-11-21T09:42:38.520",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-12-20T17:22:46.783",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -17,6 +17,26 @@
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 8.8,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 5.9
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
@ -40,6 +60,16 @@
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-416"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
@ -51,62 +81,149 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "124.0.6367.118",
|
||||
"matchCriteriaId": "6581DD86-223C-40F6-8879-D7E358A355AE"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:fedoraproject:fedora:38:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "CC559B26-5DFC-4B7A-A27C-B77DE755DFF9"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:fedoraproject:fedora:39:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "B8EDB836-4E6A-4B71-B9B2-AA3E03E0F646"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:fedoraproject:fedora:40:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "CA277A6C-83EC-4536-9125-97B84C4FAF59"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://chromereleases.googleblog.com/2024/04/stable-channel-update-for-desktop_30.html",
|
||||
"source": "chrome-cve-admin@google.com"
|
||||
"source": "chrome-cve-admin@google.com",
|
||||
"tags": [
|
||||
"Release Notes"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://issues.chromium.org/issues/335003891",
|
||||
"source": "chrome-cve-admin@google.com"
|
||||
"source": "chrome-cve-admin@google.com",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Issue Tracking"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6G7EYH2JAK5OJPVNC6AXYQ5K7YGYNCDN/",
|
||||
"source": "chrome-cve-admin@google.com"
|
||||
"source": "chrome-cve-admin@google.com",
|
||||
"tags": [
|
||||
"Mailing List"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IPETICRXUOGRIM4U3BCRTIKE3IZWCSBT/",
|
||||
"source": "chrome-cve-admin@google.com"
|
||||
"source": "chrome-cve-admin@google.com",
|
||||
"tags": [
|
||||
"Mailing List"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/L7I4FMQSOVTCIIH4XT2MJGEQRUACLPB6/",
|
||||
"source": "chrome-cve-admin@google.com"
|
||||
"source": "chrome-cve-admin@google.com",
|
||||
"tags": [
|
||||
"Mailing List"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LE3ASLH6QF2E5OVJI5VA3JSEPJFFFMNY/",
|
||||
"source": "chrome-cve-admin@google.com"
|
||||
"source": "chrome-cve-admin@google.com",
|
||||
"tags": [
|
||||
"Mailing List"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UOC3HLIZCGMIJLJ6LME5UWUUIFLXEGRN/",
|
||||
"source": "chrome-cve-admin@google.com"
|
||||
"source": "chrome-cve-admin@google.com",
|
||||
"tags": [
|
||||
"Mailing List"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://chromereleases.googleblog.com/2024/04/stable-channel-update-for-desktop_30.html",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Release Notes"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://issues.chromium.org/issues/335003891",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Issue Tracking"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6G7EYH2JAK5OJPVNC6AXYQ5K7YGYNCDN/",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Mailing List"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IPETICRXUOGRIM4U3BCRTIKE3IZWCSBT/",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Mailing List"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/L7I4FMQSOVTCIIH4XT2MJGEQRUACLPB6/",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Mailing List"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LE3ASLH6QF2E5OVJI5VA3JSEPJFFFMNY/",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Mailing List"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UOC3HLIZCGMIJLJ6LME5UWUUIFLXEGRN/",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Mailing List"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-4368",
|
||||
"sourceIdentifier": "chrome-cve-admin@google.com",
|
||||
"published": "2024-05-01T13:15:52.390",
|
||||
"lastModified": "2024-11-21T09:42:42.673",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-12-20T17:23:03.420",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -17,6 +17,26 @@
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 8.8,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 5.9
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
@ -39,62 +59,161 @@
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-416"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "124.0.6367.118",
|
||||
"matchCriteriaId": "6581DD86-223C-40F6-8879-D7E358A355AE"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:fedoraproject:fedora:38:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "CC559B26-5DFC-4B7A-A27C-B77DE755DFF9"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:fedoraproject:fedora:39:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "B8EDB836-4E6A-4B71-B9B2-AA3E03E0F646"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:fedoraproject:fedora:40:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "CA277A6C-83EC-4536-9125-97B84C4FAF59"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://chromereleases.googleblog.com/2024/04/stable-channel-update-for-desktop_30.html",
|
||||
"source": "chrome-cve-admin@google.com"
|
||||
"source": "chrome-cve-admin@google.com",
|
||||
"tags": [
|
||||
"Release Notes"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://issues.chromium.org/issues/333508731",
|
||||
"source": "chrome-cve-admin@google.com"
|
||||
"source": "chrome-cve-admin@google.com",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Issue Tracking"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6G7EYH2JAK5OJPVNC6AXYQ5K7YGYNCDN/",
|
||||
"source": "chrome-cve-admin@google.com"
|
||||
"source": "chrome-cve-admin@google.com",
|
||||
"tags": [
|
||||
"Mailing List"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IPETICRXUOGRIM4U3BCRTIKE3IZWCSBT/",
|
||||
"source": "chrome-cve-admin@google.com"
|
||||
"source": "chrome-cve-admin@google.com",
|
||||
"tags": [
|
||||
"Mailing List"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/L7I4FMQSOVTCIIH4XT2MJGEQRUACLPB6/",
|
||||
"source": "chrome-cve-admin@google.com"
|
||||
"source": "chrome-cve-admin@google.com",
|
||||
"tags": [
|
||||
"Mailing List"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LE3ASLH6QF2E5OVJI5VA3JSEPJFFFMNY/",
|
||||
"source": "chrome-cve-admin@google.com"
|
||||
"source": "chrome-cve-admin@google.com",
|
||||
"tags": [
|
||||
"Mailing List"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UOC3HLIZCGMIJLJ6LME5UWUUIFLXEGRN/",
|
||||
"source": "chrome-cve-admin@google.com"
|
||||
"source": "chrome-cve-admin@google.com",
|
||||
"tags": [
|
||||
"Mailing List"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://chromereleases.googleblog.com/2024/04/stable-channel-update-for-desktop_30.html",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Release Notes"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://issues.chromium.org/issues/333508731",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Issue Tracking"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6G7EYH2JAK5OJPVNC6AXYQ5K7YGYNCDN/",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Mailing List"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IPETICRXUOGRIM4U3BCRTIKE3IZWCSBT/",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Mailing List"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/L7I4FMQSOVTCIIH4XT2MJGEQRUACLPB6/",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Mailing List"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LE3ASLH6QF2E5OVJI5VA3JSEPJFFFMNY/",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Mailing List"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UOC3HLIZCGMIJLJ6LME5UWUUIFLXEGRN/",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Mailing List"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-44195",
|
||||
"sourceIdentifier": "product-security@apple.com",
|
||||
"published": "2024-12-20T04:15:05.313",
|
||||
"lastModified": "2024-12-20T04:15:05.313",
|
||||
"lastModified": "2024-12-20T17:15:14.860",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -11,7 +11,42 @@
|
||||
"value": "A logic issue was addressed with improved validation. This issue is fixed in macOS Sequoia 15.1. An app may be able to read arbitrary files."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
|
||||
"baseScore": 7.5,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-22"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/121564",
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-44211",
|
||||
"sourceIdentifier": "product-security@apple.com",
|
||||
"published": "2024-12-20T04:15:05.410",
|
||||
"lastModified": "2024-12-20T04:15:05.410",
|
||||
"lastModified": "2024-12-20T17:15:15.053",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -11,7 +11,42 @@
|
||||
"value": "This issue was addressed with improved validation of symlinks. This issue is fixed in macOS Sequoia 15.1. An app may be able to access user-sensitive data."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
|
||||
"baseScore": 7.5,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-281"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/121564",
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-44231",
|
||||
"sourceIdentifier": "product-security@apple.com",
|
||||
"published": "2024-12-20T04:15:05.620",
|
||||
"lastModified": "2024-12-20T04:15:05.620",
|
||||
"lastModified": "2024-12-20T17:15:15.277",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -11,7 +11,30 @@
|
||||
"value": "This issue was addressed through improved state management. This issue is fixed in macOS Sequoia 15.1. A person with physical access to a Mac may be able to bypass Login Window during a software update."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
|
||||
"baseScore": 7.5,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/121564",
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-44292",
|
||||
"sourceIdentifier": "product-security@apple.com",
|
||||
"published": "2024-12-20T04:15:05.713",
|
||||
"lastModified": "2024-12-20T04:15:05.713",
|
||||
"lastModified": "2024-12-20T17:15:15.457",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -11,7 +11,42 @@
|
||||
"value": "A privacy issue was addressed with improved private data redaction for log entries. This issue is fixed in macOS Sequoia 15.1. An app may be able to access sensitive user data."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
|
||||
"baseScore": 5.5,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-922"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/121564",
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-44293",
|
||||
"sourceIdentifier": "product-security@apple.com",
|
||||
"published": "2024-12-20T04:15:05.800",
|
||||
"lastModified": "2024-12-20T04:15:05.800",
|
||||
"lastModified": "2024-12-20T17:15:15.843",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -11,7 +11,42 @@
|
||||
"value": "A privacy issue was addressed with improved private data redaction for log entries. This issue is fixed in macOS Sequoia 15.1. A user may be able to view sensitive user information."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
|
||||
"baseScore": 5.5,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-352"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/121564",
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-44298",
|
||||
"sourceIdentifier": "product-security@apple.com",
|
||||
"published": "2024-12-20T04:15:05.893",
|
||||
"lastModified": "2024-12-20T04:15:05.893",
|
||||
"lastModified": "2024-12-20T17:15:16.340",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -11,7 +11,42 @@
|
||||
"value": "A privacy issue was addressed with improved private data redaction for log entries. This issue is fixed in macOS Sequoia 15.1. An app may be able to access information about a user's contacts."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
|
||||
"baseScore": 5.5,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-922"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/121564",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-4558",
|
||||
"sourceIdentifier": "chrome-cve-admin@google.com",
|
||||
"published": "2024-05-07T19:15:08.577",
|
||||
"lastModified": "2024-11-21T09:43:06.137",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-12-20T17:18:09.597",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -17,6 +17,26 @@
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H",
|
||||
"baseScore": 9.6,
|
||||
"baseSeverity": "CRITICAL",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 6.0
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
@ -40,6 +60,16 @@
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-416"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
@ -51,86 +81,225 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "124.0.6367.155",
|
||||
"matchCriteriaId": "85B5F2FF-0514-421A-8FBF-A7CFEA7F2294"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:fedoraproject:fedora:38:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "CC559B26-5DFC-4B7A-A27C-B77DE755DFF9"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:fedoraproject:fedora:39:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "B8EDB836-4E6A-4B71-B9B2-AA3E03E0F646"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:fedoraproject:fedora:40:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "CA277A6C-83EC-4536-9125-97B84C4FAF59"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:apple:safari:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "17.6",
|
||||
"matchCriteriaId": "A7AF9041-5C4F-42CB-99E5-5276DB6AC07C"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "17.6",
|
||||
"matchCriteriaId": "A8A1B228-89B1-470E-9B6E-8553E561E062"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "17.6",
|
||||
"matchCriteriaId": "1E393815-B3B5-4FF9-9D1D-AA3EA9C5D352"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "14.6",
|
||||
"matchCriteriaId": "687902EF-637F-4537-B419-15A1695370B9"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "http://seclists.org/fulldisclosure/2024/Jul/15",
|
||||
"source": "chrome-cve-admin@google.com"
|
||||
"source": "chrome-cve-admin@google.com",
|
||||
"tags": [
|
||||
"Mailing List"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://seclists.org/fulldisclosure/2024/Jul/16",
|
||||
"source": "chrome-cve-admin@google.com"
|
||||
"source": "chrome-cve-admin@google.com",
|
||||
"tags": [
|
||||
"Mailing List"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://seclists.org/fulldisclosure/2024/Jul/18",
|
||||
"source": "chrome-cve-admin@google.com"
|
||||
"source": "chrome-cve-admin@google.com",
|
||||
"tags": [
|
||||
"Mailing List"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://chromereleases.googleblog.com/2024/05/stable-channel-update-for-desktop_7.html",
|
||||
"source": "chrome-cve-admin@google.com"
|
||||
"source": "chrome-cve-admin@google.com",
|
||||
"tags": [
|
||||
"Release Notes"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://issues.chromium.org/issues/337766133",
|
||||
"source": "chrome-cve-admin@google.com"
|
||||
"source": "chrome-cve-admin@google.com",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Issue Tracking"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6G7EYH2JAK5OJPVNC6AXYQ5K7YGYNCDN/",
|
||||
"source": "chrome-cve-admin@google.com"
|
||||
"source": "chrome-cve-admin@google.com",
|
||||
"tags": [
|
||||
"Mailing List"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BWFSZNNWSQYDRYKNLBDGEXXKMBXDYQ3F/",
|
||||
"source": "chrome-cve-admin@google.com"
|
||||
"source": "chrome-cve-admin@google.com",
|
||||
"tags": [
|
||||
"Mailing List"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FAWEKDQTHPN7NFEMLIWP7YMIZ2DHF36N/",
|
||||
"source": "chrome-cve-admin@google.com"
|
||||
"source": "chrome-cve-admin@google.com",
|
||||
"tags": [
|
||||
"Mailing List"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IPETICRXUOGRIM4U3BCRTIKE3IZWCSBT/",
|
||||
"source": "chrome-cve-admin@google.com"
|
||||
"source": "chrome-cve-admin@google.com",
|
||||
"tags": [
|
||||
"Mailing List"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LE3ASLH6QF2E5OVJI5VA3JSEPJFFFMNY/",
|
||||
"source": "chrome-cve-admin@google.com"
|
||||
"source": "chrome-cve-admin@google.com",
|
||||
"tags": [
|
||||
"Mailing List"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://seclists.org/fulldisclosure/2024/Jul/15",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Mailing List"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://seclists.org/fulldisclosure/2024/Jul/16",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Mailing List"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://seclists.org/fulldisclosure/2024/Jul/18",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Mailing List"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://chromereleases.googleblog.com/2024/05/stable-channel-update-for-desktop_7.html",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Release Notes"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://issues.chromium.org/issues/337766133",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Issue Tracking"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6G7EYH2JAK5OJPVNC6AXYQ5K7YGYNCDN/",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Mailing List"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BWFSZNNWSQYDRYKNLBDGEXXKMBXDYQ3F/",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Mailing List"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FAWEKDQTHPN7NFEMLIWP7YMIZ2DHF36N/",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Mailing List"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IPETICRXUOGRIM4U3BCRTIKE3IZWCSBT/",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Mailing List"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LE3ASLH6QF2E5OVJI5VA3JSEPJFFFMNY/",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Mailing List"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-4577",
|
||||
"sourceIdentifier": "security@php.net",
|
||||
"published": "2024-06-09T20:15:09.550",
|
||||
"lastModified": "2024-11-21T09:43:08.587",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2024-12-20T18:45:19.983",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -95,9 +95,9 @@
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:php:php:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "5.0.0",
|
||||
"versionStartIncluding": "8.1.0",
|
||||
"versionEndExcluding": "8.1.29",
|
||||
"matchCriteriaId": "A8DF5D29-9ADB-4CE9-9DCE-9FFECA97800C"
|
||||
"matchCriteriaId": "7DC2EEF8-834B-42A1-8DA3-0C2CF22A7070"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
@ -144,7 +144,7 @@
|
||||
"source": "security@php.net",
|
||||
"tags": [
|
||||
"Mailing List",
|
||||
"Release Notes"
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
@ -197,7 +197,8 @@
|
||||
"source": "security@php.net",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Issue Tracking"
|
||||
"Issue Tracking",
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
@ -236,16 +237,14 @@
|
||||
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PKGTQUOA2NTZ3RXN22CSAUJPIRUYRB4B/",
|
||||
"source": "security@php.net",
|
||||
"tags": [
|
||||
"Mailing List",
|
||||
"Third Party Advisory"
|
||||
"Mailing List"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/W45DBOH56NQDRTOM2DN2LNA2FZIMC3PK/",
|
||||
"source": "security@php.net",
|
||||
"tags": [
|
||||
"Mailing List",
|
||||
"Third Party Advisory"
|
||||
"Mailing List"
|
||||
]
|
||||
},
|
||||
{
|
||||
@ -288,7 +287,7 @@
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Mailing List",
|
||||
"Release Notes"
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
@ -333,7 +332,8 @@
|
||||
"url": "https://github.com/php/php-src/security/advisories/GHSA-3qgc-jrrr-25jv",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Broken Link"
|
||||
"Exploit",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
@ -341,7 +341,8 @@
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Issue Tracking"
|
||||
"Issue Tracking",
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
@ -380,16 +381,14 @@
|
||||
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PKGTQUOA2NTZ3RXN22CSAUJPIRUYRB4B/",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Mailing List",
|
||||
"Third Party Advisory"
|
||||
"Mailing List"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/W45DBOH56NQDRTOM2DN2LNA2FZIMC3PK/",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Mailing List",
|
||||
"Third Party Advisory"
|
||||
"Mailing List"
|
||||
]
|
||||
},
|
||||
{
|
||||
@ -429,11 +428,19 @@
|
||||
},
|
||||
{
|
||||
"url": "https://www.vicarius.io/vsociety/posts/php-cgi-argument-injection-to-rce-cve-2024-4577",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://www.vicarius.io/vsociety/posts/php-cgi-os-command-injection-vulnerability-cve-2024-4577",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-5160",
|
||||
"sourceIdentifier": "chrome-cve-admin@google.com",
|
||||
"published": "2024-05-22T16:15:11.087",
|
||||
"lastModified": "2024-11-21T09:47:05.947",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-12-20T17:14:27.630",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -17,6 +17,26 @@
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 8.8,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 5.9
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
@ -40,6 +60,16 @@
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-787"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
@ -51,38 +81,114 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "125.0.6422.76",
|
||||
"matchCriteriaId": "3C0A06C7-8D33-4887-B12D-B009D878FF2A"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "A2572D17-1DE6-457B-99CC-64AFD54487EA"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:fedoraproject:fedora:39:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "B8EDB836-4E6A-4B71-B9B2-AA3E03E0F646"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:fedoraproject:fedora:40:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "CA277A6C-83EC-4536-9125-97B84C4FAF59"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://chromereleases.googleblog.com/2024/05/stable-channel-update-for-desktop_21.html",
|
||||
"source": "chrome-cve-admin@google.com"
|
||||
"source": "chrome-cve-admin@google.com",
|
||||
"tags": [
|
||||
"Release Notes"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://issues.chromium.org/issues/338161969",
|
||||
"source": "chrome-cve-admin@google.com"
|
||||
"source": "chrome-cve-admin@google.com",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Issue Tracking"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5KEVD4433KTOCYY6V4I7MMYKQ6URUS4L/",
|
||||
"source": "chrome-cve-admin@google.com"
|
||||
"source": "chrome-cve-admin@google.com",
|
||||
"tags": [
|
||||
"Mailing List"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FX6IYZ6XF7B2WE66NFPNI2NHWJFI6VDF/",
|
||||
"source": "chrome-cve-admin@google.com"
|
||||
"source": "chrome-cve-admin@google.com",
|
||||
"tags": [
|
||||
"Mailing List"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://chromereleases.googleblog.com/2024/05/stable-channel-update-for-desktop_21.html",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Release Notes"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://issues.chromium.org/issues/338161969",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Issue Tracking"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5KEVD4433KTOCYY6V4I7MMYKQ6URUS4L/",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Mailing List"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FX6IYZ6XF7B2WE66NFPNI2NHWJFI6VDF/",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Mailing List"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,13 +2,17 @@
|
||||
"id": "CVE-2024-54150",
|
||||
"sourceIdentifier": "security-advisories@github.com",
|
||||
"published": "2024-12-19T19:15:07.747",
|
||||
"lastModified": "2024-12-19T19:15:07.747",
|
||||
"lastModified": "2024-12-20T18:15:29.847",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "cjwt is a C JSON Web Token (JWT) Implementation. Algorithm confusion occurs when a system improperly verifies the type of signature used, allowing attackers to exploit the lack of distinction between signing methods. If the system doesn't differentiate between an HMAC signed token and an RS/EC/PS signed token during verification, it becomes vulnerable to this kind of attack. For instance, an attacker could craft a token with the alg field set to \"HS256\" while the server expects an asymmetric algorithm like \"RS256\". The server might mistakenly use the wrong verification method, such as using a public key as the HMAC secret, leading to unauthorised access. For RSA, the key can be computed from a few signatures. For Elliptic Curve (EC), two potential keys can be recovered from one signature. This can be used to bypass the signature mechanism if an application relies on asymmetrically signed tokens. This issue has been addressed in version 2.3.0 and all users are advised to upgrade. There are no known workarounds for this vulnerability."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "cjwt es una implementaci\u00f3n de token web JSON (JWT) en C. La confusi\u00f3n de algoritmos ocurre cuando un sistema verifica incorrectamente el tipo de firma utilizada, lo que permite a los atacantes explotar la falta de distinci\u00f3n entre los m\u00e9todos de firma. Si el sistema no diferencia entre un token firmado HMAC y un token firmado RS/EC/PS durante la verificaci\u00f3n, se vuelve vulnerable a este tipo de ataque. Por ejemplo, un atacante podr\u00eda crear un token con el campo alg establecido en \"HS256\" mientras que el servidor espera un algoritmo asim\u00e9trico como \"RS256\". El servidor podr\u00eda usar por error el m\u00e9todo de verificaci\u00f3n incorrecto, como usar una clave p\u00fablica como secreto HMAC, lo que lleva a un acceso no autorizado. Para RSA, la clave se puede calcular a partir de algunas firmas. Para Elliptic Curve (EC), se pueden recuperar dos claves potenciales de una firma. Esto se puede utilizar para eludir el mecanismo de firma si una aplicaci\u00f3n depende de tokens firmados asim\u00e9tricamente. Este problema se ha solucionado en la versi\u00f3n 2.3.0 y se recomienda a todos los usuarios que actualicen. No se conocen workarounds para esta vulnerabilidad."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
@ -55,12 +59,34 @@
|
||||
"providerUrgency": "NOT_DEFINED"
|
||||
}
|
||||
}
|
||||
],
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N",
|
||||
"baseScore": 9.1,
|
||||
"baseSeverity": "CRITICAL",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.2
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Primary",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-54538",
|
||||
"sourceIdentifier": "product-security@apple.com",
|
||||
"published": "2024-12-20T01:15:06.927",
|
||||
"lastModified": "2024-12-20T01:15:06.927",
|
||||
"lastModified": "2024-12-20T18:15:30.117",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -11,7 +11,42 @@
|
||||
"value": "A denial-of-service issue was addressed with improved input validation. This issue is fixed in visionOS 2.1, iOS 18.1 and iPadOS 18.1, iOS 17.7.1 and iPadOS 17.7.1, tvOS 18.1, macOS Sonoma 14.7.1, watchOS 11.1, macOS Ventura 13.7.1. A remote attacker may be able to cause a denial-of-service."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
|
||||
"baseScore": 7.5,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-770"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/121563",
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-55470",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-12-20T16:15:23.977",
|
||||
"lastModified": "2024-12-20T16:15:23.977",
|
||||
"lastModified": "2024-12-20T18:15:30.370",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -11,7 +11,42 @@
|
||||
"value": "Oqtane Framework 6.0.0 is vulnerable to Incorrect Access Control. By manipulating the entityid parameter, attackers can bypass passcode validation and successfully log into the application or access restricted data without proper authorization. The lack of server-side validation exacerbates the issue, as the application relies on client-side information for authentication."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
|
||||
"baseScore": 7.5,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-290"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://gist.github.com/Kaushikjoshi/2d8ad350ba5e72030fcee2536498cfe4",
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-55471",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-12-20T16:15:24.120",
|
||||
"lastModified": "2024-12-20T16:15:24.120",
|
||||
"lastModified": "2024-12-20T18:15:30.730",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -11,7 +11,42 @@
|
||||
"value": "Oqtane Framework is vulnerable to Insecure Direct Object Reference (IDOR) in Oqtane.Controllers.UserController. This allows unauthorized users to access sensitive information of other users by manipulating the id parameter."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
|
||||
"baseScore": 6.5,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-639"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/oqtane/oqtane.framework/pull/4880/files",
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-56327",
|
||||
"sourceIdentifier": "security-advisories@github.com",
|
||||
"published": "2024-12-19T23:15:07.147",
|
||||
"lastModified": "2024-12-19T23:15:07.147",
|
||||
"lastModified": "2024-12-20T18:15:31.083",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -55,12 +55,34 @@
|
||||
"providerUrgency": "NOT_DEFINED"
|
||||
}
|
||||
}
|
||||
],
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Primary",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-7339",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2024-08-01T04:15:05.320",
|
||||
"lastModified": "2024-08-23T16:53:31.643",
|
||||
"lastModified": "2024-12-20T17:37:05.217",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -160,24 +160,49 @@
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:tvt:dvr_firmware:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "BB471339-6C04-439B-BD9C-E24C9AAE8533"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:tvt:td-2104ts-cl:*:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "041D05A2-AAC2-4C8C-BE37-2689A0660A68"
|
||||
"criteria": "cpe:2.3:o:provision-isr:sh-4050a5-5l\\(mm\\)_firmware:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "E0F0BD8D-86EC-4FDD-8233-F976EDE2E059"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:provision-isr:sh-4050a5-5l\\(mm\\)_firmware:1.3.3.20657b180918.d06.u2\\(4a41t\\):*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "8A9FEABE-417A-4C66-9DBE-9134AE578C2A"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:provision-isr:sh-4050a5-5l\\(mm\\)_firmware:1.3.4.22966b181219.d00.u1\\(4a21s\\):*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "837DBE02-ECF9-4339-8B3B-1CD1F1748F87"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:provision-isr:sh-4050a5-5l\\(mm\\)_firmware:1.3.4.22966b181219.d14.u1\\(8a41t\\):*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "A5337128-593E-4CBB-8FA0-FB247C399356"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:provision-isr:sh-4050a5-5l\\(mm\\)_firmware:1.3.4.22966b181219.d44.u1\\(16a82t\\):*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "88125319-423B-4C91-9B1C-E342B6AEA298"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:provision-isr:sh-4050a5-5l\\(mm\\)_firmware:1.3.4.24513b190218.d00.u1\\(8a21s\\):*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "588453E2-7B29-4E8F-B057-8E9583AB2D1A"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:provision-isr:sh-4050a5-5l\\(mm\\)_firmware:1.3.4.24879b190222.d00.u2\\(8a21s\\):*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "06716F9E-6E87-45FB-8B7F-D83600556D33"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:tvt:td-2108ts-hp:*:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "FFDCC816-5F0C-4620-87CA-26FF282160DC"
|
||||
"criteria": "cpe:2.3:h:provision-isr:sh-4050a5-5l\\(mm\\):-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "DE711370-1732-4BAD-B2CE-C0B0516E93F1"
|
||||
}
|
||||
]
|
||||
}
|
||||
@ -192,8 +217,38 @@
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:provision-isr:dvr_firmware:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "9F5C3CC2-6720-43E7-BC54-FB3EDDD80C13"
|
||||
"criteria": "cpe:2.3:o:tvt:avision_av108t_firmware:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "3480B92A-91A1-4513-89D9-DF9C3C223271"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:tvt:avision_av108t_firmware:1.3.3.20657b180918.d06.u2\\(4a41t\\):*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "D5325B77-45BF-4699-B74D-CEBC86879753"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:tvt:avision_av108t_firmware:1.3.4.22966b181219.d00.u1\\(4a21s\\):*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "45AD5F3A-5C00-4D78-AAB1-84B266E66BC3"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:tvt:avision_av108t_firmware:1.3.4.22966b181219.d14.u1\\(8a41t\\):*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "7319DE1D-9D81-4606-9FE6-EAEB8BA58DE3"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:tvt:avision_av108t_firmware:1.3.4.22966b181219.d44.u1\\(16a82t\\):*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "A5F15CBC-553A-4CE4-B093-BFA125D9782E"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:tvt:avision_av108t_firmware:1.3.4.24513b190218.d00.u1\\(8a21s\\):*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "613AEF48-C8A6-4921-8E4F-8130673E5703"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:tvt:avision_av108t_firmware:1.3.4.24879b190222.d00.u2\\(8a21s\\):*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "FDB4193C-20CB-4D46-BBC4-FAA33326BBE7"
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -203,8 +258,8 @@
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:provision-isr:sh-4050a5-5l\\(mm\\):*:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "885D1A58-9A4C-43A1-8174-46E65E4A6F1D"
|
||||
"criteria": "cpe:2.3:h:tvt:avision_av108t:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "342B2170-958A-47C5-A3BA-DE7A22A1CD6A"
|
||||
}
|
||||
]
|
||||
}
|
||||
@ -219,8 +274,38 @@
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:artion-sec:dvr_firmware:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "BBF72C99-0627-4A39-8875-76817D0771A5"
|
||||
"criteria": "cpe:2.3:o:tvt:td-2104ts-cl_firmware:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "07B0F4D4-4D1B-4CCF-843F-3E3EA345C9D0"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:tvt:td-2104ts-cl_firmware:1.3.3.20657b180918.d06.u2\\(4a41t\\):*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "4FFAF8E9-FF11-487E-8808-611ED540241D"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:tvt:td-2104ts-cl_firmware:1.3.4.22966b181219.d00.u1\\(4a21s\\):*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "512B7BDB-4310-4206-A273-C5F20C2DB26A"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:tvt:td-2104ts-cl_firmware:1.3.4.22966b181219.d14.u1\\(8a41t\\):*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "08BB0DA9-AD29-4776-869E-516BD60FA4F6"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:tvt:td-2104ts-cl_firmware:1.3.4.22966b181219.d44.u1\\(16a82t\\):*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "A69090E6-3C36-45F5-82E7-2656E59039D9"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:tvt:td-2104ts-cl_firmware:1.3.4.24513b190218.d00.u1\\(8a21s\\):*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "FC0C5B90-8FE3-4DE7-AD7C-547D203693C4"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:tvt:td-2104ts-cl_firmware:1.3.4.24879b190222.d00.u2\\(8a21s\\):*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "898DDB25-73B8-43A1-A5DA-852B40FE1B4E"
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -230,8 +315,65 @@
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:artion-sec:av108t:*:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "AF52CECB-EFFA-491A-BEE1-2C2649B393DD"
|
||||
"criteria": "cpe:2.3:h:tvt:td-2104ts-cl:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "26307205-124C-4A1D-B2F2-24504760D79C"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:tvt:td-2108ts-hp_firmware:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "DB9EB09A-CAD5-4FCA-AED3-4FF98B01F1B4"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:tvt:td-2108ts-hp_firmware:1.3.3.20657b180918.d06.u2\\(4a41t\\):*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "7C74C7B5-04E3-460A-82A6-1D84CEF66E3E"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:tvt:td-2108ts-hp_firmware:1.3.4.22966b181219.d00.u1\\(4a21s\\):*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "68520B3C-4986-4569-957C-85B0CA39DB98"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:tvt:td-2108ts-hp_firmware:1.3.4.22966b181219.d14.u1\\(8a41t\\):*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "7205D233-C959-491B-846D-6A203F5EA443"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:tvt:td-2108ts-hp_firmware:1.3.4.22966b181219.d44.u1\\(16a82t\\):*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "9BDA93F9-D661-458C-B89A-2C16A42BEE79"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:tvt:td-2108ts-hp_firmware:1.3.4.24513b190218.d00.u1\\(8a21s\\):*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "E525793F-5F6F-4078-85FC-4A56B5078BF9"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:tvt:td-2108ts-hp_firmware:1.3.4.24879b190222.d00.u2\\(8a21s\\):*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "A1FB66ED-009B-425E-876E-07D6002DF46F"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:tvt:td-2108ts-hp:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "D19AC196-4BDC-44E9-BE14-418D4BED8A16"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-8805",
|
||||
"sourceIdentifier": "zdi-disclosures@trendmicro.com",
|
||||
"published": "2024-11-22T21:15:18.660",
|
||||
"lastModified": "2024-11-22T21:15:18.660",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-12-20T18:05:47.173",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -16,6 +16,28 @@
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 8.8,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "ADJACENT_NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
],
|
||||
"cvssMetricV30": [
|
||||
{
|
||||
"source": "zdi-disclosures@trendmicro.com",
|
||||
@ -49,12 +71,42 @@
|
||||
"value": "CWE-284"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "NVD-CWE-noinfo"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:bluez:bluez:5.77:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "55E1D2F1-2073-4451-8D1A-A60DDD0E2ABD"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.zerodayinitiative.com/advisories/ZDI-24-1229/",
|
||||
"source": "zdi-disclosures@trendmicro.com"
|
||||
"source": "zdi-disclosures@trendmicro.com",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-8806",
|
||||
"sourceIdentifier": "zdi-disclosures@trendmicro.com",
|
||||
"published": "2024-11-22T21:15:18.770",
|
||||
"lastModified": "2024-11-22T21:15:18.770",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-12-20T17:56:56.057",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -16,6 +16,28 @@
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
],
|
||||
"cvssMetricV30": [
|
||||
{
|
||||
"source": "zdi-disclosures@trendmicro.com",
|
||||
@ -51,14 +73,45 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:cohesive:vns3:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "6.2.8",
|
||||
"matchCriteriaId": "F0281C89-647C-4620-B1B1-7E2A503A3D0C"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:cohesive:vns3:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "6.6.0",
|
||||
"versionEndExcluding": "6.6.7",
|
||||
"matchCriteriaId": "EF2C8255-9D77-40F2-94FE-7C380C84FA4B"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://cohesive.net/support/security-responses/",
|
||||
"source": "zdi-disclosures@trendmicro.com"
|
||||
"source": "zdi-disclosures@trendmicro.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://www.zerodayinitiative.com/advisories/ZDI-24-1230/",
|
||||
"source": "zdi-disclosures@trendmicro.com"
|
||||
"source": "zdi-disclosures@trendmicro.com",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-8807",
|
||||
"sourceIdentifier": "zdi-disclosures@trendmicro.com",
|
||||
"published": "2024-11-22T21:15:18.880",
|
||||
"lastModified": "2024-11-22T21:15:18.880",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-12-20T17:56:46.357",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -16,6 +16,28 @@
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
],
|
||||
"cvssMetricV30": [
|
||||
{
|
||||
"source": "zdi-disclosures@trendmicro.com",
|
||||
@ -51,14 +73,45 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:cohesive:vns3:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "6.2.8",
|
||||
"matchCriteriaId": "F0281C89-647C-4620-B1B1-7E2A503A3D0C"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:cohesive:vns3:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "6.6.0",
|
||||
"versionEndExcluding": "6.6.7",
|
||||
"matchCriteriaId": "EF2C8255-9D77-40F2-94FE-7C380C84FA4B"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://cohesive.net/support/security-responses/",
|
||||
"source": "zdi-disclosures@trendmicro.com"
|
||||
"source": "zdi-disclosures@trendmicro.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://www.zerodayinitiative.com/advisories/ZDI-24-1231/",
|
||||
"source": "zdi-disclosures@trendmicro.com"
|
||||
"source": "zdi-disclosures@trendmicro.com",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-8808",
|
||||
"sourceIdentifier": "zdi-disclosures@trendmicro.com",
|
||||
"published": "2024-11-22T21:15:18.993",
|
||||
"lastModified": "2024-11-22T21:15:18.993",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-12-20T17:46:19.670",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -16,6 +16,28 @@
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 8.8,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
],
|
||||
"cvssMetricV30": [
|
||||
{
|
||||
"source": "zdi-disclosures@trendmicro.com",
|
||||
@ -51,14 +73,45 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:cohesive:vns3:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "6.2.8",
|
||||
"matchCriteriaId": "F0281C89-647C-4620-B1B1-7E2A503A3D0C"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:cohesive:vns3:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "6.6.0",
|
||||
"versionEndExcluding": "6.6.7",
|
||||
"matchCriteriaId": "EF2C8255-9D77-40F2-94FE-7C380C84FA4B"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://cohesive.net/support/security-responses/",
|
||||
"source": "zdi-disclosures@trendmicro.com"
|
||||
"source": "zdi-disclosures@trendmicro.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://www.zerodayinitiative.com/advisories/ZDI-24-1232/",
|
||||
"source": "zdi-disclosures@trendmicro.com"
|
||||
"source": "zdi-disclosures@trendmicro.com",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-8968",
|
||||
"sourceIdentifier": "contact@wpscan.com",
|
||||
"published": "2024-12-20T06:15:23.110",
|
||||
"lastModified": "2024-12-20T06:15:23.110",
|
||||
"lastModified": "2024-12-20T17:15:21.800",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -11,7 +11,42 @@
|
||||
"value": "The WordPress Button Plugin MaxButtons WordPress plugin before 9.8.1 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup)."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:N/A:N",
|
||||
"baseScore": 4.7,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 1.4
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://wpscan.com/vulnerability/cab4d23e-e857-4b2f-b1ca-fbafd37524e0/",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-9689",
|
||||
"sourceIdentifier": "contact@wpscan.com",
|
||||
"published": "2024-11-05T06:15:06.360",
|
||||
"lastModified": "2024-11-07T20:35:16.807",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2024-12-20T18:59:47.850",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -94,6 +94,7 @@
|
||||
"url": "https://wpscan.com/vulnerability/ea501d37-1ec2-43ec-873a-ec204e965f60/",
|
||||
"source": "contact@wpscan.com",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
|
76
README.md
76
README.md
@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours.
|
||||
### Last Repository Update
|
||||
|
||||
```plain
|
||||
2024-12-20T17:00:21.908448+00:00
|
||||
2024-12-20T19:00:21.539113+00:00
|
||||
```
|
||||
|
||||
### Most recent CVE Modification Timestamp synchronized with NVD
|
||||
|
||||
```plain
|
||||
2024-12-20T16:52:43.217000+00:00
|
||||
2024-12-20T18:59:47.850000+00:00
|
||||
```
|
||||
|
||||
### Last Data Feed Release
|
||||
@ -33,59 +33,45 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
|
||||
### Total Number of included CVEs
|
||||
|
||||
```plain
|
||||
274485
|
||||
274486
|
||||
```
|
||||
|
||||
### CVEs added in the last Commit
|
||||
|
||||
Recently added CVEs: `15`
|
||||
Recently added CVEs: `1`
|
||||
|
||||
- [CVE-2024-10385](CVE-2024/CVE-2024-103xx/CVE-2024-10385.json) (`2024-12-20T16:15:21.523`)
|
||||
- [CVE-2024-12840](CVE-2024/CVE-2024-128xx/CVE-2024-12840.json) (`2024-12-20T16:15:23.417`)
|
||||
- [CVE-2024-55186](CVE-2024/CVE-2024-551xx/CVE-2024-55186.json) (`2024-12-20T16:15:23.853`)
|
||||
- [CVE-2024-55470](CVE-2024/CVE-2024-554xx/CVE-2024-55470.json) (`2024-12-20T16:15:23.977`)
|
||||
- [CVE-2024-55471](CVE-2024/CVE-2024-554xx/CVE-2024-55471.json) (`2024-12-20T16:15:24.120`)
|
||||
- [CVE-2024-56337](CVE-2024/CVE-2024-563xx/CVE-2024-56337.json) (`2024-12-20T16:15:24.260`)
|
||||
- [CVE-2024-56348](CVE-2024/CVE-2024-563xx/CVE-2024-56348.json) (`2024-12-20T15:15:05.507`)
|
||||
- [CVE-2024-56349](CVE-2024/CVE-2024-563xx/CVE-2024-56349.json) (`2024-12-20T15:15:08.300`)
|
||||
- [CVE-2024-56350](CVE-2024/CVE-2024-563xx/CVE-2024-56350.json) (`2024-12-20T15:15:08.513`)
|
||||
- [CVE-2024-56351](CVE-2024/CVE-2024-563xx/CVE-2024-56351.json) (`2024-12-20T15:15:08.720`)
|
||||
- [CVE-2024-56352](CVE-2024/CVE-2024-563xx/CVE-2024-56352.json) (`2024-12-20T15:15:08.970`)
|
||||
- [CVE-2024-56353](CVE-2024/CVE-2024-563xx/CVE-2024-56353.json) (`2024-12-20T15:15:09.183`)
|
||||
- [CVE-2024-56354](CVE-2024/CVE-2024-563xx/CVE-2024-56354.json) (`2024-12-20T15:15:09.400`)
|
||||
- [CVE-2024-56355](CVE-2024/CVE-2024-563xx/CVE-2024-56355.json) (`2024-12-20T15:15:09.630`)
|
||||
- [CVE-2024-56356](CVE-2024/CVE-2024-563xx/CVE-2024-56356.json) (`2024-12-20T15:15:09.847`)
|
||||
- [CVE-2024-12677](CVE-2024/CVE-2024-126xx/CVE-2024-12677.json) (`2024-12-20T17:15:07.757`)
|
||||
|
||||
|
||||
### CVEs modified in the last Commit
|
||||
|
||||
Recently modified CVEs: `30`
|
||||
Recently modified CVEs: `64`
|
||||
|
||||
- [CVE-2024-0012](CVE-2024/CVE-2024-00xx/CVE-2024-0012.json) (`2024-12-20T15:47:59.293`)
|
||||
- [CVE-2024-11297](CVE-2024/CVE-2024-112xx/CVE-2024-11297.json) (`2024-12-20T16:15:22.107`)
|
||||
- [CVE-2024-12014](CVE-2024/CVE-2024-120xx/CVE-2024-12014.json) (`2024-12-20T16:15:23.030`)
|
||||
- [CVE-2024-12356](CVE-2024/CVE-2024-123xx/CVE-2024-12356.json) (`2024-12-20T15:25:37.347`)
|
||||
- [CVE-2024-23225](CVE-2024/CVE-2024-232xx/CVE-2024-23225.json) (`2024-12-20T16:51:15.130`)
|
||||
- [CVE-2024-23296](CVE-2024/CVE-2024-232xx/CVE-2024-23296.json) (`2024-12-20T16:51:47.810`)
|
||||
- [CVE-2024-26792](CVE-2024/CVE-2024-267xx/CVE-2024-26792.json) (`2024-12-20T16:15:54.653`)
|
||||
- [CVE-2024-26793](CVE-2024/CVE-2024-267xx/CVE-2024-26793.json) (`2024-12-20T15:56:00.320`)
|
||||
- [CVE-2024-26800](CVE-2024/CVE-2024-268xx/CVE-2024-26800.json) (`2024-12-20T15:55:10.150`)
|
||||
- [CVE-2024-26801](CVE-2024/CVE-2024-268xx/CVE-2024-26801.json) (`2024-12-20T15:52:36.293`)
|
||||
- [CVE-2024-27122](CVE-2024/CVE-2024-271xx/CVE-2024-27122.json) (`2024-12-20T15:48:58.860`)
|
||||
- [CVE-2024-27126](CVE-2024/CVE-2024-271xx/CVE-2024-27126.json) (`2024-12-20T15:49:05.487`)
|
||||
- [CVE-2024-32113](CVE-2024/CVE-2024-321xx/CVE-2024-32113.json) (`2024-12-20T16:51:57.577`)
|
||||
- [CVE-2024-37085](CVE-2024/CVE-2024-370xx/CVE-2024-37085.json) (`2024-12-20T16:52:43.217`)
|
||||
- [CVE-2024-37383](CVE-2024/CVE-2024-373xx/CVE-2024-37383.json) (`2024-12-20T16:52:05.623`)
|
||||
- [CVE-2024-38856](CVE-2024/CVE-2024-388xx/CVE-2024-38856.json) (`2024-12-20T16:35:41.330`)
|
||||
- [CVE-2024-39891](CVE-2024/CVE-2024-398xx/CVE-2024-39891.json) (`2024-12-20T16:15:33.687`)
|
||||
- [CVE-2024-40711](CVE-2024/CVE-2024-407xx/CVE-2024-40711.json) (`2024-12-20T16:35:59.103`)
|
||||
- [CVE-2024-45519](CVE-2024/CVE-2024-455xx/CVE-2024-45519.json) (`2024-12-20T16:38:02.830`)
|
||||
- [CVE-2024-47732](CVE-2024/CVE-2024-477xx/CVE-2024-47732.json) (`2024-12-20T15:44:01.303`)
|
||||
- [CVE-2024-50623](CVE-2024/CVE-2024-506xx/CVE-2024-50623.json) (`2024-12-20T15:04:26.097`)
|
||||
- [CVE-2024-53677](CVE-2024/CVE-2024-536xx/CVE-2024-53677.json) (`2024-12-20T16:15:23.723`)
|
||||
- [CVE-2024-55956](CVE-2024/CVE-2024-559xx/CVE-2024-55956.json) (`2024-12-20T15:21:39.287`)
|
||||
- [CVE-2024-7726](CVE-2024/CVE-2024-77xx/CVE-2024-7726.json) (`2024-12-20T16:15:24.403`)
|
||||
- [CVE-2024-9474](CVE-2024/CVE-2024-94xx/CVE-2024-9474.json) (`2024-12-20T16:49:55.993`)
|
||||
- [CVE-2024-28892](CVE-2024/CVE-2024-288xx/CVE-2024-28892.json) (`2024-12-20T17:05:48.707`)
|
||||
- [CVE-2024-38861](CVE-2024/CVE-2024-388xx/CVE-2024-38861.json) (`2024-12-20T18:57:56.383`)
|
||||
- [CVE-2024-4331](CVE-2024/CVE-2024-43xx/CVE-2024-4331.json) (`2024-12-20T17:22:46.783`)
|
||||
- [CVE-2024-4368](CVE-2024/CVE-2024-43xx/CVE-2024-4368.json) (`2024-12-20T17:23:03.420`)
|
||||
- [CVE-2024-44195](CVE-2024/CVE-2024-441xx/CVE-2024-44195.json) (`2024-12-20T17:15:14.860`)
|
||||
- [CVE-2024-44211](CVE-2024/CVE-2024-442xx/CVE-2024-44211.json) (`2024-12-20T17:15:15.053`)
|
||||
- [CVE-2024-44231](CVE-2024/CVE-2024-442xx/CVE-2024-44231.json) (`2024-12-20T17:15:15.277`)
|
||||
- [CVE-2024-44292](CVE-2024/CVE-2024-442xx/CVE-2024-44292.json) (`2024-12-20T17:15:15.457`)
|
||||
- [CVE-2024-44293](CVE-2024/CVE-2024-442xx/CVE-2024-44293.json) (`2024-12-20T17:15:15.843`)
|
||||
- [CVE-2024-44298](CVE-2024/CVE-2024-442xx/CVE-2024-44298.json) (`2024-12-20T17:15:16.340`)
|
||||
- [CVE-2024-4558](CVE-2024/CVE-2024-45xx/CVE-2024-4558.json) (`2024-12-20T17:18:09.597`)
|
||||
- [CVE-2024-4577](CVE-2024/CVE-2024-45xx/CVE-2024-4577.json) (`2024-12-20T18:45:19.983`)
|
||||
- [CVE-2024-5160](CVE-2024/CVE-2024-51xx/CVE-2024-5160.json) (`2024-12-20T17:14:27.630`)
|
||||
- [CVE-2024-54150](CVE-2024/CVE-2024-541xx/CVE-2024-54150.json) (`2024-12-20T18:15:29.847`)
|
||||
- [CVE-2024-54538](CVE-2024/CVE-2024-545xx/CVE-2024-54538.json) (`2024-12-20T18:15:30.117`)
|
||||
- [CVE-2024-55470](CVE-2024/CVE-2024-554xx/CVE-2024-55470.json) (`2024-12-20T18:15:30.370`)
|
||||
- [CVE-2024-55471](CVE-2024/CVE-2024-554xx/CVE-2024-55471.json) (`2024-12-20T18:15:30.730`)
|
||||
- [CVE-2024-56327](CVE-2024/CVE-2024-563xx/CVE-2024-56327.json) (`2024-12-20T18:15:31.083`)
|
||||
- [CVE-2024-7339](CVE-2024/CVE-2024-73xx/CVE-2024-7339.json) (`2024-12-20T17:37:05.217`)
|
||||
- [CVE-2024-8805](CVE-2024/CVE-2024-88xx/CVE-2024-8805.json) (`2024-12-20T18:05:47.173`)
|
||||
- [CVE-2024-8806](CVE-2024/CVE-2024-88xx/CVE-2024-8806.json) (`2024-12-20T17:56:56.057`)
|
||||
- [CVE-2024-8807](CVE-2024/CVE-2024-88xx/CVE-2024-8807.json) (`2024-12-20T17:56:46.357`)
|
||||
- [CVE-2024-8808](CVE-2024/CVE-2024-88xx/CVE-2024-8808.json) (`2024-12-20T17:46:19.670`)
|
||||
- [CVE-2024-8968](CVE-2024/CVE-2024-89xx/CVE-2024-8968.json) (`2024-12-20T17:15:21.800`)
|
||||
- [CVE-2024-9689](CVE-2024/CVE-2024-96xx/CVE-2024-9689.json) (`2024-12-20T18:59:47.850`)
|
||||
|
||||
|
||||
## Download and Usage
|
||||
|
213
_state.csv
213
_state.csv
@ -65025,7 +65025,7 @@ CVE-2014-0542,0,0,fbbae5aa5bd2b99837b91bc5a55d0d23bc0909ce012aa658a0a70de3681197
|
||||
CVE-2014-0543,0,0,b274c780f0466077acaf027916a755319f6e77f2db6123359b58b5b34ee1a354,2024-11-21T02:02:21.360000
|
||||
CVE-2014-0544,0,0,0fa0ea93aa9a3f0a22963adfb2e80712f5ab07190ea3e8b339366579d2c88455,2024-11-21T02:02:21.500000
|
||||
CVE-2014-0545,0,0,528d5e5b2f44f2a0536e86fe2e8c2c1c24a8ab5b69df4e81e30d9f0fa2293a72,2024-11-21T02:02:21.623000
|
||||
CVE-2014-0546,0,1,55ac9bdd18a03eadc98dc1e8a4e26bde5e555855a130d1597346cd314df9f2c7,2024-12-20T15:33:24.647000
|
||||
CVE-2014-0546,0,0,55ac9bdd18a03eadc98dc1e8a4e26bde5e555855a130d1597346cd314df9f2c7,2024-12-20T15:33:24.647000
|
||||
CVE-2014-0547,0,0,b30a2293b7d47a6ccba0e0df5c871196625c5e65ff5adfc657babd1c1b1be8ed,2024-11-21T02:02:21.870000
|
||||
CVE-2014-0548,0,0,fb4c5f4dc7a5879154d5c4c94ade40155233e90da3caaeda714406abdcecdd40,2024-11-21T02:02:22.010000
|
||||
CVE-2014-0549,0,0,0d1e6ae4e25c16d5596402e35fb70d20b3121eb60ba76da993d65abdfa62050a,2024-11-21T02:02:22.150000
|
||||
@ -72127,7 +72127,7 @@ CVE-2014-8428,0,0,b6d02e02c49a36849b94bfa2e8298b2fdce7ad8f942d2b8e3972a618f499c8
|
||||
CVE-2014-8429,0,0,ba76cc0b542a1e6ef32a49b2bbf728928dbb9278d43b163f756a0f09365813e3,2024-11-21T02:19:04.347000
|
||||
CVE-2014-8437,0,0,5f0759d205fb824ffc9f2a5d3bf7275a4e92b524fcf7167b84c824643fc00c2e,2024-11-21T02:19:04.490000
|
||||
CVE-2014-8438,0,0,09019b643d315e20bd38630e491eef717606dc406acc6fa450a3b164168e8a6f,2024-11-21T02:19:04.613000
|
||||
CVE-2014-8439,0,1,37264590e8d1c4410cbcf7b0e8d527e2e5c9ebfc2295bbfdf568cfe41847f4b8,2024-12-20T15:33:13.333000
|
||||
CVE-2014-8439,0,0,37264590e8d1c4410cbcf7b0e8d527e2e5c9ebfc2295bbfdf568cfe41847f4b8,2024-12-20T15:33:13.333000
|
||||
CVE-2014-8440,0,0,c59e2dd21f18dc4d9270faf0637afef41495fc809d000125cf23ff2f98dfbc56,2024-11-21T02:19:04.877000
|
||||
CVE-2014-8441,0,0,079dd71d71eaba192d369ef5bef8c303c0b643ab5b684909fe11569d9d3d090e,2024-11-21T02:19:05.007000
|
||||
CVE-2014-8442,0,0,55b5523b35d331d0247e90863527d0601ee5808be966ff34d107437f3eb1b5df,2024-11-21T02:19:05.137000
|
||||
@ -72701,7 +72701,7 @@ CVE-2014-9159,0,0,8291b393617f554987feab103f3ce6daa4585c739a4ec9eb8679dd843ddf3b
|
||||
CVE-2014-9160,0,0,61db40fdcd07dcbe04d1e45ff3bab0b58ca1b636d8f2f7ae0226f15b42558908,2024-11-21T02:20:19.067000
|
||||
CVE-2014-9161,0,0,989ea6a38561f6a93f8227fc8aa74e2981b55d061c3c5d8f8e3a0f48baafa198,2024-11-21T02:20:19.183000
|
||||
CVE-2014-9162,0,0,e6a41539b18d793eafd23a996a4d9a2bee3216f076219c2affe6594067e67432,2024-11-21T02:20:19.300000
|
||||
CVE-2014-9163,0,1,50aa9fb804bf51548e5adf8fb56d6cbd84920001559d8af22d2ab86e888a17b7,2024-12-20T15:32:40.123000
|
||||
CVE-2014-9163,0,0,50aa9fb804bf51548e5adf8fb56d6cbd84920001559d8af22d2ab86e888a17b7,2024-12-20T15:32:40.123000
|
||||
CVE-2014-9164,0,0,2563b05438fd704a7dfc65c7c64543ab1fbfd18cb53644ec20ab2640d7555809,2024-11-21T02:20:19.520000
|
||||
CVE-2014-9165,0,0,15ef39c6f19c2a53b3e86470f783a83cdcc34953a6c7971d6e311d55881c6894,2024-11-21T02:20:19.623000
|
||||
CVE-2014-9166,0,0,2e4a860f13fedd28e8e852d81eb16862c30c1cf2c907d592f29293128a248d04,2024-11-21T02:20:19.743000
|
||||
@ -73764,9 +73764,9 @@ CVE-2015-0307,0,0,a65ed1098ff025c2c4bcadd58072f76beb976964e14f3c1bef8f075c54c113
|
||||
CVE-2015-0308,0,0,66fb6aaa33515371aefd0e332532fd32bfd1b7a59d29d40893b3b7dc52edf7ce,2024-11-21T02:22:47.210000
|
||||
CVE-2015-0309,0,0,b10430c9604d0e67194403ac5cf78bcd1f9cc1f8eedc9c51a65b7d27332ccc02,2024-11-21T02:22:47.360000
|
||||
CVE-2015-0310,0,0,f2b3e7a633061f90c37b323cebda45ea27cf1548d97dd9f5d1c9e9294301b76f,2024-11-21T02:22:47.480000
|
||||
CVE-2015-0311,0,1,c97415c926606830f400f0e31f0f6e8ae4019d0122235f0816a5452560260e02,2024-12-20T15:33:05.107000
|
||||
CVE-2015-0311,0,0,c97415c926606830f400f0e31f0f6e8ae4019d0122235f0816a5452560260e02,2024-12-20T15:33:05.107000
|
||||
CVE-2015-0312,0,0,83f4c3c42e755f4100a5e3b670350c469b5dec2be6cb9601117390221a3ed06f,2024-11-21T02:22:47.727000
|
||||
CVE-2015-0313,0,1,afb51731f024e7489e33793a6f577432acd96d38dce7da9738282c6295980e2c,2024-12-20T15:29:17.507000
|
||||
CVE-2015-0313,0,0,afb51731f024e7489e33793a6f577432acd96d38dce7da9738282c6295980e2c,2024-12-20T15:29:17.507000
|
||||
CVE-2015-0314,0,0,8cfdbc8341fa6444aac0f621f0cd99191bed11d672f66f44aec0b40900e95a7b,2024-11-21T02:22:48
|
||||
CVE-2015-0315,0,0,2a9c122d89e8278f69b82ad7ba11155f5dbeef41b37639827f1ee01a3b57f44e,2024-11-21T02:22:48.120000
|
||||
CVE-2015-0316,0,0,741ccb2def53c6e62937fb3b7557670d368b8447f100b25f10a5a9246821c87a,2024-11-21T02:22:48.243000
|
||||
@ -164134,7 +164134,7 @@ CVE-2020-9246,0,0,8d96638980ac3e298778573b587edfb2eccd73fe5e0cafaa8dcafae20f6e42
|
||||
CVE-2020-9247,0,0,1aa6d00902f7f27e25be09b6735b54522bddd93735908964695deff2c860fc97,2024-11-21T05:40:15.980000
|
||||
CVE-2020-9248,0,0,ee33905a6909922672d133638d4f88fefda98b796c92d89c724a8a31cb509edb,2024-11-21T05:40:16.183000
|
||||
CVE-2020-9249,0,0,609764363abccd920effb2bb4981a1b82100be4147729a6eea32d0b2b514865c,2024-11-21T05:40:16.320000
|
||||
CVE-2020-9250,0,0,7a91b0eca5467e17bb9946adcda83c7637d6fb534af8e16a41b913562a6ad3a0,2024-12-20T02:15:05.150000
|
||||
CVE-2020-9250,0,1,7cd2c77402db68aa8cdd8880bcab0f27e8ae1115c47de8f1412e758074f2e474,2024-12-20T18:15:23.860000
|
||||
CVE-2020-9251,0,0,beb705051b54230fec1f0b04aa58d84ce8712d444c3c311bd3fd0ff8818aa691,2024-11-21T05:40:16.453000
|
||||
CVE-2020-9252,0,0,2e27eed374d3e6d0d74e9cc4bbe3815fab87cc2001c720694ee08405ff819d2a,2024-11-21T05:40:16.590000
|
||||
CVE-2020-9254,0,0,8e32c6d6bacd3be7a3f1960e97a7c4a004fc1a8bd60e5faabce33423b1584654,2024-11-21T05:40:16.763000
|
||||
@ -200172,7 +200172,7 @@ CVE-2022-32140,0,0,7a9c3b5e767b67e01c6a2a9bb3acc04d7cf1de810331770e75aa5c4a5208d
|
||||
CVE-2022-32141,0,0,16a67640dfbaae67e72809580d9e4e423033b75e86aa578c1911d7e92b1f7da1,2024-11-21T07:05:49.833000
|
||||
CVE-2022-32142,0,0,979b129644cf56e0bea6e344238189966dd5be67873e008b080fae6175a4d135,2024-11-21T07:05:50
|
||||
CVE-2022-32143,0,0,c52290a030e5a93484ef3cd8a1b6ccb290011b10331e4624cf902dca35a033dd,2024-11-21T07:05:50.140000
|
||||
CVE-2022-32144,0,0,1ac63804ed0a0ec29097ed1c90e27fd60f2c962ddf27e7a9eeddcbeb79aa9ac8,2024-12-20T02:15:05.320000
|
||||
CVE-2022-32144,0,1,559fb453583b115c15727357a171f240a22be43bda45b367081d3b57b2faea92,2024-12-20T18:15:25.070000
|
||||
CVE-2022-32145,0,0,ad1c76462e7f77bf1e239e6a5bdcff318df7aae4fb302ac91733071f4fed7172,2024-11-21T07:05:50.277000
|
||||
CVE-2022-32147,0,0,a2264fd8bcc7d6a0a5e02480b2de1eb82ec9c14ea909f7a9a18a929ccf930bdc,2024-07-02T17:15:03.273000
|
||||
CVE-2022-32148,0,0,813429af96ec1d6c841eab58ceae185de144d2d98afeb3672c42b661bc4444ec,2024-11-21T07:05:50.420000
|
||||
@ -222403,7 +222403,7 @@ CVE-2023-28820,0,0,e10d4a00308ba1ab34db498a843935a90acbe0ade20fa15055d9a0ff7f590
|
||||
CVE-2023-28821,0,0,3b23d992637d21ecb74fbbedbe80ce17d8ac3cda960cc9ac7ffb7824e8f934ee,2024-11-21T07:56:04.903000
|
||||
CVE-2023-28823,0,0,b38855621f61c058dba0e2d9c38b33206b84c1d843699145c318ad3909e98d3c,2024-11-21T07:56:05.053000
|
||||
CVE-2023-28824,0,0,4717652e7a590f17e3eab8927d56f9e19eb6043995d6fc66b15276d9d0ffb1e3,2024-11-21T07:56:05.187000
|
||||
CVE-2023-28826,0,0,061d57499e91aa7f7d7e9a5cdbe935c63e6d5b1984dfae847aae42bb570c0771,2024-12-05T15:30:17.053000
|
||||
CVE-2023-28826,0,1,a9e9528aa9c3972fd09362058c3be3f967ed732ddc79dfa5a2473b385e1b19c1,2024-12-20T17:09:10.193000
|
||||
CVE-2023-28827,0,0,3ac013fe742eba004aa8f5d9fa84d4e0755b6248eb930477c2f597bc870b283a,2024-09-10T12:09:50.377000
|
||||
CVE-2023-28828,0,0,c8219201f8c82577f62c395dc963be0ff5d9ef990f6cd114e19b9adaad0853b6,2024-11-21T07:56:06.030000
|
||||
CVE-2023-28829,0,0,5f3fb9e83e6bf580b695944554c6fe1959e6a17c65d5fb240077ff50f4fa6f71,2024-11-21T07:56:06.343000
|
||||
@ -225097,7 +225097,7 @@ CVE-2023-3243,0,0,f39d9207aa51a4f50a921684a93aa08e98ddf85594ad1964d7ef7666e323d0
|
||||
CVE-2023-32432,0,0,71739248fbd9019ee6d1ece6530111937bb9544f2912c4f6af9b8290fb231108,2024-12-12T14:26:18.893000
|
||||
CVE-2023-32433,0,0,3162dd87a2e4be71b01dab05d4d5586614c514c9e744874d06bf9242d1982a79,2024-11-21T08:03:20.587000
|
||||
CVE-2023-32434,0,0,e19845805e2c170e35da29433d90257184d040282660e03dff9d0164e8aa4f87,2024-11-21T08:03:20.717000
|
||||
CVE-2023-32435,0,0,6bac78abc427ff33571521c6cab6b4bceb7bbc8cb3c895636a3a87721ccf6e68,2024-12-16T20:15:06.797000
|
||||
CVE-2023-32435,0,1,b24e4897a2c883a2a3bff9c9b95c8b141476683de935eb975ffe17049376ebc2,2024-12-20T17:49:17.260000
|
||||
CVE-2023-32436,0,0,b1838bad592f8061b6d9a4a9063867063ed3bb06a03b6ff3b7dfcbddf25b174f,2024-11-21T08:03:20.970000
|
||||
CVE-2023-32437,0,0,34cb0d82da59eadf72e035d71ce27268fe5640e446349555ae0be1c644a830f4,2024-11-21T08:03:21.103000
|
||||
CVE-2023-32438,0,0,a00014ad87ef16329a1ad28e21cf98311827d59fe3cfcc6d54ef64a64fea0ed4,2024-12-12T14:26:18.893000
|
||||
@ -226433,7 +226433,7 @@ CVE-2023-34044,0,0,3bf28b57945e4607832313832c430b5fb65d46c8cbcb1b8c59e2ef93d00c2
|
||||
CVE-2023-34045,0,0,9afcb32c5fdcdba7cbe76a7ff218499970f2930b8d17957abe1c8d9b083dd9fc,2024-11-21T08:06:27.963000
|
||||
CVE-2023-34046,0,0,de891463245ea21540153bc628af3db12039aef90cd1a7c40b786c28c66e1664,2024-11-21T08:06:28.073000
|
||||
CVE-2023-34047,0,0,dd1f3437471679f84d2ca3801d99b633bfb46f8ada57f190be29b0047bbb4703,2024-11-21T08:06:28.197000
|
||||
CVE-2023-34048,0,0,38caf4ce9793e2ebf180709be85a40f86d6039c2e6274e7a7ae8edbfa7ea02a6,2024-11-21T08:06:28.310000
|
||||
CVE-2023-34048,0,1,a09a38ad92177cb9499aa586b4ef8a5454912e55285ba5f6e04b61a5b71f301c,2024-12-20T17:41:40.150000
|
||||
CVE-2023-34049,0,0,556fbd76481a221eded8913f53484bd89e12180b483d52729343cbc1abb822ef,2024-11-15T13:58:08.913000
|
||||
CVE-2023-3405,0,0,0acd5e423ace6877554e6af02437f7ad9780bc7bad91a698cacc1d70c30ab7ad,2024-11-21T08:17:11.903000
|
||||
CVE-2023-34050,0,0,f746d338a5331d03f2052be91639c9b0334e4efc4d94f21d850928b62ea58299,2024-11-21T08:06:28.600000
|
||||
@ -226746,7 +226746,7 @@ CVE-2023-34358,0,0,92769c460eef9ee3d564450488411233fb3d0da75dee4d12b3afc7c7c5e8a
|
||||
CVE-2023-34359,0,0,7ecc56b0c12976fcb35ee302f0bcf60c8817191ebae574a86b814408229bd754,2024-11-21T08:07:05.620000
|
||||
CVE-2023-3436,0,0,227d61f366fe1850fe1406700366dafd7937f8fe1e6fcfe508e304f713db46c8,2024-11-21T08:17:15.853000
|
||||
CVE-2023-34360,0,0,e404dc026effd5b416e5c9290ae32165a3c0adced025385ca63db5abb01b8767,2024-11-21T08:07:05.733000
|
||||
CVE-2023-34362,0,0,fc0723e4a1c0f2ec8367d98701150cae9c1e4246bd554e06bc72031a07a191ed,2024-11-21T08:07:05.843000
|
||||
CVE-2023-34362,0,1,89b1c2fc079de792e24c4e273f6840a769719bf19e59503a7a61ca7fe478c7d1,2024-12-20T17:49:01.637000
|
||||
CVE-2023-34363,0,0,dbe01f4420c184b613f6132366b66a6f4c936030470aba7a440f08c87e69fe93,2024-11-21T08:07:06.067000
|
||||
CVE-2023-34364,0,0,4267b31fff211a0295f4224cdf6955b09165b33da23b38c3e5e0770eab41e5ca,2024-11-21T08:07:06.197000
|
||||
CVE-2023-34365,0,0,03eacff15cc6c3f35f845ba674e0740023198e8082f506d31bf9c9c88694f107,2024-11-21T08:07:06.330000
|
||||
@ -227155,7 +227155,7 @@ CVE-2023-35073,0,0,91676ef9234413c20056267f1b23f3fc91186085c28bf58d620ac435fb946
|
||||
CVE-2023-35074,0,0,adba0e1b83d37e03fc957804d89482b802c40631fb93a2cdcda238f9d2dff867,2024-11-21T08:07:55.583000
|
||||
CVE-2023-35075,0,0,2953da8da78e493f198bf6289dbc7e5d7641503e5404893e569d48f28539525c,2024-11-21T08:07:55.753000
|
||||
CVE-2023-35077,0,0,eb14aac67890fa8d1fe987a9cb034d5f686d957f0f0145aaa057938b78feea0d,2024-11-21T08:07:55.893000
|
||||
CVE-2023-35078,0,0,ae371e0f12add94ed3c7aaf46ab70d9907e49e2eed0b13eb89591a945541a2ff,2024-11-21T08:07:56.027000
|
||||
CVE-2023-35078,0,1,69d2e841e784de3c352f697667efb6f6e32442f0e8ec9915f09caa28ab2c2b2f,2024-12-20T17:50:19.417000
|
||||
CVE-2023-3508,0,0,395b7f87ebc096b9954e0550c1d2fe07fbb8e45e4a9326e080b172d48d631a2f,2024-11-21T08:17:25.110000
|
||||
CVE-2023-35080,0,0,6a6e892a44ab82355b0a0d2a7b8c1b659f457b02b6dbfe75c067e5b09fb17c02,2024-11-21T08:07:56.180000
|
||||
CVE-2023-35081,0,0,67f6fd2d7e5ef74353cb7a8ab5dd29941445538b161d320bb21d322646ce0ce4,2024-11-21T08:07:56.303000
|
||||
@ -227439,7 +227439,7 @@ CVE-2023-3567,0,0,5a1746b855d22f3bc6770c426b1bc9a187c738d6a1c14eeb7ccfd2f336b03c
|
||||
CVE-2023-35670,0,0,38494d55df7fcb1cd50e396b84188fbbbbb79aeb1bb20c46d39f680826b3fe15,2024-11-21T08:08:28.667000
|
||||
CVE-2023-35671,0,0,2c8339e5588b591eed92ded4f828b3d05b1e6303493784f34dbc335b2b14a7e7,2024-11-21T08:08:28.797000
|
||||
CVE-2023-35673,0,0,8def3629a98a95d2af28794c62a9db710c67f5ee2b495d5869075b9e4f1d720e,2024-11-21T08:08:28.923000
|
||||
CVE-2023-35674,0,0,8f54c1433a58d05ca4875c526c141191836172f1b86e27d115b0c90e00be1d8a,2024-11-21T08:08:29.043000
|
||||
CVE-2023-35674,0,1,a1022b87b8618552c684113a438b1c94efe6e352c747b4eb316fd9df24c62f28,2024-12-20T17:39:49.327000
|
||||
CVE-2023-35675,0,0,4f3461109a5f32ac0262e94d301fd6c4248144a6d513d16b13cdd315ad00446f,2024-11-21T08:08:29.187000
|
||||
CVE-2023-35676,0,0,52eba2204d685162de4e8dd545bda62b1652967ee875489ff2421fc06fe9685c,2024-11-21T08:08:29.303000
|
||||
CVE-2023-35677,0,0,b495dd7d2a9f1baab9298ddda35590e4064f7b554ba2738eb2dd1d976ba83e6d,2024-11-21T08:08:29.460000
|
||||
@ -229301,7 +229301,7 @@ CVE-2023-38031,0,0,43c38460745214330163d80b63c522d22fbd2236198aabb87c696f44f3f43
|
||||
CVE-2023-38032,0,0,aa2f8b2079aab5d644970a30e48ac48eb85abbd522684fe17754100401e0e906,2024-11-21T08:12:42.833000
|
||||
CVE-2023-38033,0,0,4be9698fa9dd0cacdb62bf1057bd9da305a437591f9194cf06d595e16802d334,2024-11-21T08:12:42.970000
|
||||
CVE-2023-38034,0,0,081598c8b55d3aa43e7d310ebcf31b7ec47c08b5aae01d60a9f9e55b7cdb47cc,2024-11-21T08:12:43.107000
|
||||
CVE-2023-38035,0,0,b643980268b5e1bb1992090ece6f414a88944b744ba76c2d39229556df25e6e1,2024-11-21T08:12:43.250000
|
||||
CVE-2023-38035,0,1,92640fff4395ac24e8d5c20e07c44ab0e97351ee018b5491f08a52b994403d7f,2024-12-20T17:50:25.653000
|
||||
CVE-2023-38039,0,0,aa7b561d4c683a5cad232ce980133262e25984154771669a007453da54145604,2024-11-21T08:12:43.457000
|
||||
CVE-2023-3804,0,0,f82e32f2db1263f9331724638e062f3a20087ab485797bbd9380b32670e68adc,2024-11-21T08:18:06.293000
|
||||
CVE-2023-38040,0,0,50ded9b2062da33f47fa19ba0f8f6125ce0832d2b933587cab7df27c962ee968,2024-11-21T08:12:43.633000
|
||||
@ -230025,7 +230025,7 @@ CVE-2023-38827,0,0,15d6e2facfb6109aa5168ffa504a04d99bba843862c4ade896b7f160a2676
|
||||
CVE-2023-38829,0,0,f18a04dc8235c21595d960d1c76e0c18e8aba026cbaca717e8d078afcc182e76,2024-11-21T08:14:14.883000
|
||||
CVE-2023-3883,0,0,634cd7fd7d0f5ced6fd868d96b8d577b8d6108800b9ae362b62f8ad754505ea9,2024-11-21T08:18:17.027000
|
||||
CVE-2023-38830,0,0,3aba0baa36880c42a16b45890d05f8d90c8dca065e6857a99618f2043633059a,2024-11-21T08:14:15.030000
|
||||
CVE-2023-38831,0,0,919e699c5b8269e1d68a319e1562e4ac498792f2dd3d81e876282aeb942e94e9,2024-11-21T08:14:15.183000
|
||||
CVE-2023-38831,0,1,96b48b8190e42a2009e991c600c7fa606e5535a7306c5b4858bcffb9732d651c,2024-12-20T17:50:59.707000
|
||||
CVE-2023-38836,0,0,c8d0b5eac064ddc2c8e21f03dec759378f4cbdab9f9e1b20532fde2c7d907105,2024-11-21T08:14:15.507000
|
||||
CVE-2023-38838,0,0,03c3c86b6e2de6d7d4d05ce29ccc32c5a9c18e145373614ddd257b6ba8aa6b15,2024-11-21T08:14:15.650000
|
||||
CVE-2023-38839,0,0,96961603879de812e272be97e578ad3139d610fe00ac937b20675102efbc4ee5,2024-11-21T08:14:15.807000
|
||||
@ -233373,7 +233373,7 @@ CVE-2023-43203,0,0,c5f43f330a0aa47742da601ce3685bd755f7f7d9ab6ebb64781eb13ff1399
|
||||
CVE-2023-43204,0,0,405e036bb3184a7a179a9c4f21ed6c5f9f1635df31afbf5874dc0d62b27b1663,2024-11-21T08:23:49.803000
|
||||
CVE-2023-43206,0,0,91374bcbd7fa94046c0e01ed4ab2af8ccb38a6185b4d6cce69be85defa8f3e40,2024-11-21T08:23:50.030000
|
||||
CVE-2023-43207,0,0,73bef3fa73b1104259ad40cd7fc06db4d20cce747ffc2532e824570b3f5f0958,2024-11-21T08:23:50.253000
|
||||
CVE-2023-43208,0,0,88f0100284cc957bf8e59fb1f74ed1c71888b62902f489d9f8755fa7e8e1ce66,2024-11-21T08:23:50.473000
|
||||
CVE-2023-43208,0,1,10ff2c3fa5ebbc08b8c1f48bbaddae7b36de320bf7570650b531f3d7a92ff431,2024-12-20T17:41:47.143000
|
||||
CVE-2023-4321,0,0,085e1cbb7abaeb38d420ac3b379575bc4b47d6929c3ff2b92bda924e6306d7c8,2024-11-21T08:34:51.040000
|
||||
CVE-2023-43216,0,0,36f34093c9a1885a067dfd71b90fec85477364023b8581b3e15ae8b97b27ff81,2024-11-21T08:23:50.697000
|
||||
CVE-2023-4322,0,0,1532a8b57387d09ae4c94e72d6fbfa510e33b1660215708f14716f6493a97a7a,2024-11-21T08:34:51.173000
|
||||
@ -233751,7 +233751,7 @@ CVE-2023-43766,0,0,1874f5bb733291888446fa8e6899fc86b101332f133975cc5c47954254b77
|
||||
CVE-2023-43767,0,0,71262d6ff27787aa37a9ccff291ff315f630e05676576edeb71c5c04a91a7cf7,2024-11-21T08:24:44.860000
|
||||
CVE-2023-43768,0,0,f5e6b86fff28d5fbf8ecd9b88f177624082dded6d31ce2200cd91661bd8d2363,2024-11-21T08:24:45.010000
|
||||
CVE-2023-43769,0,0,06fad532324f780795fc45bdf702308c094ad389cb30e104252dc441d2a47598,2024-11-25T22:15:09.587000
|
||||
CVE-2023-43770,0,0,96819117ef67a25547e10bf837ba15ecb1dc78eee8a54bb65bd740bc4210bcf7,2024-11-21T08:24:45.360000
|
||||
CVE-2023-43770,0,1,cdff146a566e12a04d6a3f422def399e9bda5cf5176e2678a567e58ef2db315b,2024-12-20T17:40:26.160000
|
||||
CVE-2023-43771,0,0,6eb1f0ca5129e4601acf0473c7b9e92e5cddadc9a4e24dc03aed5645d8b80a26,2024-11-21T08:24:45.577000
|
||||
CVE-2023-43775,0,0,54c6bf3cb2bdce0279ba011963bbb56a47cfae73d52d4b60331f30063fd846a0,2024-11-21T08:24:45.740000
|
||||
CVE-2023-43776,0,0,a58bc7087928b87d9fbee013f66a621afc7de5495a408df840e5196428d5765b,2024-11-21T08:24:45.880000
|
||||
@ -234339,7 +234339,7 @@ CVE-2023-44483,0,0,5dd1c78b90b34b78bbcb6b7fd4897fa7d75ea11e70843a99524deb9e80e89
|
||||
CVE-2023-44484,0,0,958fe48df29f816ed7bd34de4dd7057161c9bf53e67f5f88c174e360d7feb40e,2024-11-21T08:25:58.463000
|
||||
CVE-2023-44485,0,0,1fded516443ed9d4a6dc21d78fcaff9fa6c633a261c62418d91bd847201a9be3,2024-01-02T16:15:11.810000
|
||||
CVE-2023-44486,0,0,2b43d0a14e9cca4a775d6d63ef007efbe7181ff5204ebf454cdf39ffb38da42b,2024-01-02T16:15:11.897000
|
||||
CVE-2023-44487,0,0,45b563ae0f2cec30756484351a788d522e14763ecf6fa8ba45700503e21c7053,2024-11-21T08:25:58.613000
|
||||
CVE-2023-44487,0,1,3f3c767faf0496ff5190d4944e382f1e1f37cf57070322e8336564f615c4cc14,2024-12-20T17:40:52.067000
|
||||
CVE-2023-44488,0,0,6d016cc36e101208382fa39cc61bf9a8f9d2e9bfb34d377a1cb64850fe49c283,2024-11-21T08:25:59.403000
|
||||
CVE-2023-4449,0,0,e25bc1172bad64592332d0ff2b60d985ca8bf0443f05933c4051807b205fefa8,2024-11-21T08:35:10.950000
|
||||
CVE-2023-4450,0,0,27f28416722497acefc6891c18ba2d3c7e85c5ed65b35fd7cdcbec298d72b3e3,2024-11-21T08:35:11.120000
|
||||
@ -235100,7 +235100,7 @@ CVE-2023-4585,0,0,2817f87c145f4e19f7fb5b2f9ef5a25943420aac1ebc75d64154fa2f4d3483
|
||||
CVE-2023-45850,0,0,54f0aa089c8ebefba26fc84db9cc11c8567f61a11232a6923c6e132d5e43be38,2024-02-14T18:15:46.203000
|
||||
CVE-2023-45851,0,0,80fecaa08aabec651bd5f96bf43e5fb5bd05b25992d4a84aa45b313799793c98,2024-11-21T08:27:28.970000
|
||||
CVE-2023-45852,0,0,e8be8e4d9b05dc3db2a9206b56fbc6a33ca64656c15b611b5c4f687a4307864b,2024-11-21T08:27:29.100000
|
||||
CVE-2023-45853,0,0,97db543d361ee03bc16dbb3f16aaa37ccae38ee02a6116214eb4a9046bb40353,2024-11-21T08:27:29.250000
|
||||
CVE-2023-45853,0,1,7aaa23a31605eca8fd5429fd54fe524527069595801d4d1b7b9603a041cf83c5,2024-12-20T17:41:31.237000
|
||||
CVE-2023-45854,0,0,9e1ae49a3d09e0271586bdb5cd557f4081b569b806359ca87be8e5f489faf4e8,2024-09-20T12:31:20.110000
|
||||
CVE-2023-45855,0,0,0e092d0c08023f857ef2f3fd91a438ae0f6fd2ed5dc944c9aebe403789ff7d34,2024-11-21T08:27:29.720000
|
||||
CVE-2023-45856,0,0,320cc0e1ee595773e36ebdcb0c1183ce0bb27bf06d83c4ba43ad9943e9532936,2024-11-21T08:27:29.880000
|
||||
@ -236158,7 +236158,7 @@ CVE-2023-47242,0,0,16bd3d3d64cacd173b0167cd7f982783fdb69c0a81e914a2606e4716b69f1
|
||||
CVE-2023-47243,0,0,30340c6d26e19c59b5978c6e1842ea9075173064b605307a556387765c45d03a,2024-11-21T08:30:01.567000
|
||||
CVE-2023-47244,0,0,b0ebe338ebe88a1ffec7595b1ee713231f6705784898ca7f5320bbbb8ad00dde,2024-11-21T08:30:01.720000
|
||||
CVE-2023-47245,0,0,2e557a8574ffa27f286ddb7902bb72def87b3076cdcb7c1d4a5fe3c9fb82458d,2024-11-21T08:30:01.863000
|
||||
CVE-2023-47246,0,0,80ecfdaaddaa68e961020611d6165d3685b090fd22bcda9e74a116f74abfd466,2024-11-21T08:30:02.010000
|
||||
CVE-2023-47246,0,1,9ee048611e335d6ef5ca354dafc13239e090cf221f5c631602637916b05657fe,2024-12-20T17:20:48.827000
|
||||
CVE-2023-47247,0,0,6c0bd6cea993b04ace26b90d46ca9971934088213c7deda52a3ee268f6eb9ab3,2024-11-21T08:30:02.280000
|
||||
CVE-2023-47248,0,0,ed273fbca0d5159bad81a6f7cbac186f7fdfb1fc723f57ebc3d6ff8172313a41,2024-11-21T08:30:02.447000
|
||||
CVE-2023-47249,0,0,2c7a90e1d2da420678c292eab4af2a2635e465b566848812fbd6cbfede631d2b,2024-11-21T08:30:02.607000
|
||||
@ -236382,7 +236382,7 @@ CVE-2023-47616,0,0,b5400301c64d171fb648dd698eb7425d28632d9552e51579aec7970e72fd4
|
||||
CVE-2023-47617,0,0,c671c14a0e35b7e4b7fcfe6f14521083ede774c2455bf38cd99f02889187d000,2024-11-21T08:30:32.133000
|
||||
CVE-2023-47618,0,0,995acf587b8f482982ceb508d0e8791ce489e4efaecdd9f89351fb78dc19827e,2024-11-21T08:30:32.277000
|
||||
CVE-2023-47619,0,0,9d2d3dc38a4dbac2e143f5e95629f63355e9767bb2787ad4114261262b6ba5f4,2024-11-21T08:30:32.397000
|
||||
CVE-2023-4762,0,0,2e0b5d08ab7d6185cc19331b768de26dd4d00c028d46cf413fa66b09bff50174,2024-11-21T08:35:55.690000
|
||||
CVE-2023-4762,0,1,7da8162cdaa41009455186cf8b19e27140a727d3d3fe41ffe8a6b959aa6fd124,2024-12-20T18:21:05.033000
|
||||
CVE-2023-47620,0,0,61bd2331ab391dfd7e97480167dc460b036db6150b0cefe01ddae2f6ded2a0f3,2024-11-21T08:30:32.550000
|
||||
CVE-2023-47621,0,0,21cf5296251eccb402f361f641b2582b10c147d58de1ac4c2ade388e61a75375,2024-11-21T08:30:32.687000
|
||||
CVE-2023-47622,0,0,f7c70ead952a5530a68be1db20b722e26c969ff836e3ef37efb5417689bca4f1,2024-11-21T08:30:32.830000
|
||||
@ -237517,7 +237517,7 @@ CVE-2023-4910,0,0,d9462c36fb722b682c764276e6fcf32ffb6c6c77a4823140352ddfdc8e5d36
|
||||
CVE-2023-49100,0,0,14b827de72c6f2476cae991faf762a7c0ebf71e1c78301f5cd1c6800f5f2cb87,2024-11-21T08:32:49.403000
|
||||
CVE-2023-49101,0,0,dd10c9d64d2f38b78c445873ccd7284113d1dae289617a767413e999aeb421d9,2024-11-21T08:32:49.620000
|
||||
CVE-2023-49102,0,0,7720153c7a021899a76b16646f6f7971df2f17668e8e3ccae3b3684f9743b90f,2024-11-21T08:32:49.773000
|
||||
CVE-2023-49103,0,0,fe53937c3112531a53327787a1602e75ee8be13af5a409cd81e22164574b01c6,2024-11-21T08:32:49.923000
|
||||
CVE-2023-49103,0,1,3f33d839b382b0e2219cb7c3a407cb478ab76b5d8ff92fd036b0c64d9a39ce79,2024-12-20T17:26:50.947000
|
||||
CVE-2023-49104,0,0,88e52f0db8231bfb716b52deb4721e9ff67988071fdbfbbe2cc30e8e20268781,2024-11-21T08:32:50.100000
|
||||
CVE-2023-49105,0,0,57ea19ba2757cb0204c2ecac3a330f28472b520b37e1e16a099f8ba9ee500a97,2024-11-21T08:32:50.267000
|
||||
CVE-2023-49106,0,0,af1d530882fae69f2f5601e08d91b3477b2e86275ef0f5d38e8ffbb551764592,2024-11-21T08:32:50.420000
|
||||
@ -241890,7 +241890,7 @@ CVE-2023-6999,0,0,20badeb2c238d441cb421c48ace480ea27b8151e674b990be35a0786113f4d
|
||||
CVE-2023-7002,0,0,84396c0bdf73e170d66b798921a49a9f0a13dde1ac20a4cf4c9ca68c4bd2e87e,2024-11-21T08:45:00.317000
|
||||
CVE-2023-7003,0,0,090dbcb22a27ae8d1249b5396e7cb61a556fd7edf17cf3f654f7795066af7307,2024-11-21T08:45:00.443000
|
||||
CVE-2023-7004,0,0,2b0a1c3f594514067c80c828d3cdf50833ef4cd40d9bad21bf097cc6e6910593,2024-11-21T08:45:00.633000
|
||||
CVE-2023-7005,0,0,06324bd3ddead253be014782a15f4b191f6b96547c2707715a8cd1e2c38b2ab9,2024-12-19T18:15:06.313000
|
||||
CVE-2023-7005,0,1,0d8f11c042b16ba2828314b032db06ee679fd72e36b1ca79c0dd5903b653acfb,2024-12-20T18:15:25.777000
|
||||
CVE-2023-7006,0,0,4ed87f24fa2ac772a2f7b727b0e300912c42583637b6187ad692e5891d6c6604,2024-11-21T08:45:00.817000
|
||||
CVE-2023-7007,0,0,f5e78178645c6c2c5f772707ce2e5c5b75e98e2d2f30a88b209671633b387a46,2024-11-21T08:45:00.997000
|
||||
CVE-2023-7008,0,0,8f61c119937be8edfdf7101f886737120021ea2a8349db9b1b71fa74e2a2c59a,2024-11-22T12:15:17.590000
|
||||
@ -242155,7 +242155,7 @@ CVE-2024-0008,0,0,f3a0e819c9497c2b0a342098a12d293c5c599f8657da82ca7edaa709641c72
|
||||
CVE-2024-0009,0,0,2705c70b35d4cbd0491e81eb024f836acd6b6b1ca2b25c3adbf3699cab842c62,2024-12-09T15:13:34.713000
|
||||
CVE-2024-0010,0,0,31a4fe9c570d054c731419e8dbca609fd313e658d7d97a146536a70ebab80db7,2024-12-09T15:08:43.783000
|
||||
CVE-2024-0011,0,0,0cdc1a416dec7958965d013c501cb250e08e95b67733c03001a98f99c411ee1c,2024-12-09T15:05:57.857000
|
||||
CVE-2024-0012,0,1,93cccc6ea5c711652172ca0de063d48a9408dc8b9bd12e62a1b6d2395fd8db9b,2024-12-20T15:47:59.293000
|
||||
CVE-2024-0012,0,0,93cccc6ea5c711652172ca0de063d48a9408dc8b9bd12e62a1b6d2395fd8db9b,2024-12-20T15:47:59.293000
|
||||
CVE-2024-0014,0,0,265161d9949465d3602447cae25f01c0800ff61c134bf258208b213d42b830ab,2024-12-13T20:04:22.733000
|
||||
CVE-2024-0015,0,0,ac153671c8f32bfd786c082dd9dcbf06514472c0792e3af9411b311c680fd9cc,2024-12-16T14:39:02.223000
|
||||
CVE-2024-0016,0,0,fe6b8d0cdbee34b3261a95c211b84f84a8146c7eb2580e083114d9eb74442b99,2024-12-16T14:33:13.613000
|
||||
@ -243357,7 +243357,7 @@ CVE-2024-1038,0,0,b9222a411b1bc3d07cf4c05f9c610f06b56f337f87abb77c0147739734ce67
|
||||
CVE-2024-10380,0,0,aef46b3de7d53b555c16faf90957b5795e7ff38edc57bb3987b023ae2ffcb5c0,2024-11-01T16:11:00.217000
|
||||
CVE-2024-10381,0,0,487fc7c9d16cacf4d1afd228d87369ba897cce3ee6a5ff470497aebb255413ac,2024-11-14T21:44:53.280000
|
||||
CVE-2024-10382,0,0,1c875f1ae2ed66eebbc6e7f1a875f8ec0ccb16ddce83c24470dd6868acfcbaa3,2024-11-26T11:21:57.823000
|
||||
CVE-2024-10385,1,1,2459d78c3508aa616ad4e90307c1255cc6a75e3bad1918f6f1132f6353703d40,2024-12-20T16:15:21.523000
|
||||
CVE-2024-10385,0,0,2459d78c3508aa616ad4e90307c1255cc6a75e3bad1918f6f1132f6353703d40,2024-12-20T16:15:21.523000
|
||||
CVE-2024-10386,0,0,7aff12031680710648573b87d488e50b0294f20a294313dd69f5a61164db5fd1,2024-11-05T20:07:59.487000
|
||||
CVE-2024-10387,0,0,57470acac2a2dbbd0df691895c55ce7e9f6693f342e79f6c8afed7fe3b526ff6,2024-11-05T20:05:55.323000
|
||||
CVE-2024-10388,0,0,e9ec8dd17e88ba202ee792d712ed48b3ff6fd0d0e6fbe5270057fa94b498de97,2024-11-19T21:57:32.967000
|
||||
@ -243509,7 +243509,7 @@ CVE-2024-10547,0,0,b023c976bb6d488185fa01d9371074d053ec54a35f2b498daa31d6bb09884
|
||||
CVE-2024-10548,0,0,387eea2f214d486d1c28afc0bdd6a3cbda871b2748526e8919d00671b70f55b1,2024-12-19T02:15:22.420000
|
||||
CVE-2024-1055,0,0,399a6bc3324e5a5ab60feee10ef9f668300825e29ef0f6a3f63048abb22d1f67,2024-11-21T08:49:41.683000
|
||||
CVE-2024-10551,0,0,399c3b50116ab12fecb385939dfbc291c08c34ee1143fded03cc056aa8d168fc,2024-12-06T16:15:20.160000
|
||||
CVE-2024-10555,0,0,554f3a35edc31885c63cdb5a9029d786cc47cad0c097b2babddbd6303acf3649,2024-12-20T06:15:22.450000
|
||||
CVE-2024-10555,0,1,597076a34b07f960c51e6abf9f2e54d44ce2f6716a3d1121eef23cff8900bb44,2024-12-20T17:15:07.037000
|
||||
CVE-2024-10556,0,0,718a43e4ad6bf4f3f07d592398a4916e1e5afe3b7fda2ab7a1b90e0c73118264,2024-11-01T20:51:35.617000
|
||||
CVE-2024-10557,0,0,e65f5d89b91c24f295e5cbd0f813e2ad8ed04df13cf96a919800b770566f37fc,2024-11-01T20:48:56.980000
|
||||
CVE-2024-10559,0,0,16e3eab9e781d1e16f0d045b8d1d79bfb09e11f3fa816a22b4936c2b8431f9e3,2024-11-01T20:43:41.070000
|
||||
@ -243635,7 +243635,7 @@ CVE-2024-10700,0,0,47463adc515feae701fdd6df43b426f169c9e406b10e3ad8dd4832a0c6070
|
||||
CVE-2024-10701,0,0,0e6acb5db36bb65b2a9a78f5a1eb22e27b99e8cd35851fc25db7c90c627071bd,2024-11-05T16:52:44.937000
|
||||
CVE-2024-10702,0,0,3259585053a84cb9e4f20d6c03e98232b3f699485fefb085dfa1033c1b54da99,2024-11-05T16:52:11.193000
|
||||
CVE-2024-10704,0,0,ba32dc9400bcf601c7de3ed1f96e389b9876b8709121dc8baeae8e0502050909,2024-11-29T15:15:15.777000
|
||||
CVE-2024-10706,0,0,e61b32cc5553d00e0f7f872b5d719e44eb2608b60448b5c82ea3bc34ed625b29,2024-12-20T06:15:22.710000
|
||||
CVE-2024-10706,0,1,a6197c3513fb437bfb526c424137a60bda332ee0bb647a99bd4a0b818e5fdf22,2024-12-20T17:15:07.260000
|
||||
CVE-2024-10708,0,0,eea3aeda96ee17aa2e34b8299f4fa63911654caae1b5976f2282c61fc39e2c7d,2024-12-10T16:15:22.327000
|
||||
CVE-2024-10709,0,0,41eadf98fd4f942149bd2d66f39b1d32e2fbc20d0415ec457a4d209de40f95b0,2024-11-25T21:15:08.837000
|
||||
CVE-2024-1071,0,0,511789b6fa5ad5f82a1b86953aeffe2ca3b5c7e6b5a99f94e7636c9edfe8a8b3,2024-11-21T08:49:43.920000
|
||||
@ -243960,7 +243960,7 @@ CVE-2024-11103,0,0,525c56d7b3f8fec3123e98bad3867c199a9a90e84f6b6962f9d506a460e46
|
||||
CVE-2024-11104,0,0,b75d8ded53ff668230e72c743fffcbea02289181c30609ae66856a5e9653031c,2024-11-22T06:15:19.093000
|
||||
CVE-2024-11106,0,0,4f7fe956431776c4fe3e507a22b518efb5f390b9e8eff5421b62ca54ec32b13a,2024-12-10T11:15:07.030000
|
||||
CVE-2024-11107,0,0,9acfc58960fd056b26158a4898d3cab204ba2e238bb413c388c6122ce49a79e3,2024-12-10T16:15:22.450000
|
||||
CVE-2024-11108,0,0,c1be6b34c7d61522c6a05f2a8110ded17dd42c6e68c9945ca15a84f9c2fbd097,2024-12-20T06:15:22.827000
|
||||
CVE-2024-11108,0,1,49880135218020cb99f4c9e4e13ba800c5369506de5ecd61e983da5e460d7cc8,2024-12-20T17:15:07.447000
|
||||
CVE-2024-1111,0,0,1e2a4c53f023bbf8c3b556fe6d8a896ca169d10bbf6dcef8f8f730e5e086694a,2024-11-21T08:49:49.257000
|
||||
CVE-2024-11110,0,0,d490bd60a369a1b46dbdb1050197f0676234294cb261b9f35d39066213c16bbc,2024-11-13T17:01:16.850000
|
||||
CVE-2024-11111,0,0,da9ee8d75f19a39df28c4985a5537997054eaf20345ca454e34c488f64fe6a62,2024-11-13T17:01:16.850000
|
||||
@ -244099,7 +244099,7 @@ CVE-2024-11293,0,0,963e5cd86fd8964150efb764dabf7f60f1898cb3eb1113839b414494aefc5
|
||||
CVE-2024-11294,0,0,2eb006c700872e4221a5d65f1f84540c18c42b5a19bdffcef60597b889db391d,2024-12-17T09:15:05.193000
|
||||
CVE-2024-11295,0,0,33f60bf01a9cdc709e5955974a036a6d640572051acba82f69d600e268adeb3e,2024-12-18T07:15:06.737000
|
||||
CVE-2024-11296,0,0,fb7d94da02b5205207d7d82f7728d17cf0d45360472acb20ff8132fc89a748af,2024-11-22T23:15:04.507000
|
||||
CVE-2024-11297,0,1,dcc20cf881101ac7914684418643db28e12f1dadcf16d43050679625656d4eee,2024-12-20T16:15:22.107000
|
||||
CVE-2024-11297,0,0,dcc20cf881101ac7914684418643db28e12f1dadcf16d43050679625656d4eee,2024-12-20T16:15:22.107000
|
||||
CVE-2024-11298,0,0,cd8027ff7c1e39b70cf43f7d5a6cec3a72565a042c79fb93ed3ff58ccba5dece,2024-11-22T23:15:04.983000
|
||||
CVE-2024-1130,0,0,a3e19aef9eb3382013136f74a42e19afeb0e606b8f2206b5fca2ea0a53428b21,2024-11-21T08:49:51.890000
|
||||
CVE-2024-11303,0,0,ad607bb34f4cabffd121b35b6cb4bdf73670583d2b4d1068bee702934c5fa785,2024-11-21T22:15:07.213000
|
||||
@ -244333,13 +244333,13 @@ CVE-2024-11572,0,0,4bfb3b8a6cb8b5e286abee85be29182a0c2097d6ed456387011257c4ff0df
|
||||
CVE-2024-11573,0,0,a217cd6a5d2c1b9c15a058174aaf74db4c998e67a229e5d62add9fed37c842fd,2024-11-25T18:53:19.637000
|
||||
CVE-2024-11574,0,0,c0c507d43857d57ee99aa16b84b597bf67d6a714c3740721e43431423a9700d2,2024-11-25T18:53:09.717000
|
||||
CVE-2024-11575,0,0,5e1acfdb2c1dcb5dcda0fe7dfbf70613b34f2e92ce4befb7a1e3c62571d21e54,2024-11-25T18:52:56.080000
|
||||
CVE-2024-11576,0,0,c7d7d317f472862d5929ac8ee84a294c536b8a9fecb2952e2f6e3e511ca7a1b2,2024-11-22T21:15:16.693000
|
||||
CVE-2024-11577,0,0,e073807575170d04dd02d49ee7f74cd0fea2331beb3198e76582b45a90d93332,2024-11-22T21:15:16.810000
|
||||
CVE-2024-11576,0,1,a8e0825213ef4c9c0f1c6d5ae79fb6ce1feb72964e892a902e8877ef0fbe759e,2024-12-20T17:36:12.133000
|
||||
CVE-2024-11577,0,1,030cc7ceccd9c1f1c0576f6eef9270acaa630d083b3c15257887f33704fc9630,2024-12-20T17:36:00.887000
|
||||
CVE-2024-11578,0,0,c895c3d24af0012b56055e7687991fd92495e03a408f7600e49689de017772f3,2024-11-22T21:15:16.920000
|
||||
CVE-2024-11579,0,0,e48b7dca71ae340305444f03509bcf3d1b662335e3d92760abeb8621e7f008e3,2024-11-22T21:15:17.027000
|
||||
CVE-2024-11579,0,1,a092ff7ef536e96be080e898d8d872006835463f8afc1ac75354cd0671a55eda,2024-12-20T17:35:51.253000
|
||||
CVE-2024-1158,0,0,cc758ded81eb4716575c03ddb54fc317f50917a2b43ee2a36cb438fc8fb74732,2024-11-21T08:49:55.723000
|
||||
CVE-2024-11580,0,0,2ac5adf7790484251619a48c743e1d8dacb8bd828ca61b81b9c9a1ef518a997f,2024-11-22T21:15:17.133000
|
||||
CVE-2024-11581,0,0,538eef954f61c29b7e5164457927ca2e195d3c5ec7bf5543f4f83fe97f3a4e35,2024-11-22T21:15:17.257000
|
||||
CVE-2024-11580,0,1,2902a2896d70a09162eab174719b1f937a00063abe723be1bb8861e8aaeb5891,2024-12-20T17:35:39.513000
|
||||
CVE-2024-11581,0,1,268ccec9c70d91613657530fc8ca66f464b1a739ebb371f3baadda44241001cf,2024-12-20T17:32:03.967000
|
||||
CVE-2024-11585,0,0,d73bc146050e187d4f7b957a4961cb8470ba9ebdf69a5843cdfa9e686c284b8e,2024-12-06T06:15:22.723000
|
||||
CVE-2024-11586,0,0,acbb89c7a73edeb9af616fbe1a7bbf2dff72a4d1c23f19e17196df7c7df36053,2024-11-25T18:15:10.123000
|
||||
CVE-2024-11587,0,0,81baaf77887a06e025fa560b05def938c80026d91eed087e0a42822793b3fe0a,2024-11-22T21:15:27.747000
|
||||
@ -244641,7 +244641,7 @@ CVE-2024-11980,0,0,5c195702c3044363783e02640024befa9b8ad56aa6e8902b10c32e122c344
|
||||
CVE-2024-11981,0,0,4e8c7d73de59078b6dc7a30279d02d329d5e4f81501d91493f618fea96f72189,2024-11-29T07:15:05.760000
|
||||
CVE-2024-11982,0,0,fdbe1466c75dff41c18009236254b70f07e6dcbf8224b3254ed5447f6369f8be,2024-11-29T08:15:04.580000
|
||||
CVE-2024-11983,0,0,b28164039b0dc59ec068d9e4704804a0da409a26a86a99d005cfe1af9f1df7bd,2024-11-29T08:15:04.733000
|
||||
CVE-2024-11984,0,0,e4cb8f12f5f76216954f82cc003c009be1d8ec253ba314ea40b01ce15d04236f,2024-12-19T04:15:05.127000
|
||||
CVE-2024-11984,0,1,ced44f2e85997433b4a6526be94d84d4444dfd73a39ca7719f03472fe24c16f2,2024-12-20T18:15:26.703000
|
||||
CVE-2024-11985,0,0,347bd715be95eb6539997f812c032a6ace7cec9111ea8a772c8788473da7f21d,2024-12-04T02:15:04.237000
|
||||
CVE-2024-11986,0,0,e3ace666257325f8eafbb0b048032c0cfe2d1f4c40638fcb396e4be31115d6ce,2024-12-13T14:15:21.207000
|
||||
CVE-2024-1199,0,0,60ffbfb4cdc00bf543d03a59b91efea487f9cf6b0b352d45a15655d219ef20c9,2024-11-21T08:50:01.340000
|
||||
@ -244662,7 +244662,7 @@ CVE-2024-12003,0,0,14ef5c0679ec50bb5e5014c8e7b631b4905f5419df127668fd74fc6d22bcf
|
||||
CVE-2024-12004,0,0,3dce40ab1e8f9f1b73bc9bad8477202dd665f9594517ea95d989e909aeed6010,2024-12-11T09:15:05.500000
|
||||
CVE-2024-12007,0,0,8e607a1eddf324cb0db7978994624ff72f4892cd536259d2d33593eb53a4d98b,2024-12-11T03:16:24.473000
|
||||
CVE-2024-1201,0,0,98150b7d086d80b767e6802e39750bc86f0479b7a9cd93495263225678c4d4a5,2024-11-21T08:50:01.647000
|
||||
CVE-2024-12014,0,1,0fbaf047a11b22ead04fafadea66904b0c2d7feefee4cd71ef9629ea9f715d06,2024-12-20T16:15:23.030000
|
||||
CVE-2024-12014,0,0,0fbaf047a11b22ead04fafadea66904b0c2d7feefee4cd71ef9629ea9f715d06,2024-12-20T16:15:23.030000
|
||||
CVE-2024-12015,0,0,d5a693fd232b1e3fbc53d72a834e39c83a435aa6e5ae231752c351acc22ca6db,2024-12-02T14:15:05.383000
|
||||
CVE-2024-12018,0,0,593c05ac2f3dac4339301164983c309f8de674e944577becd0f305b7e0d23ef0,2024-12-12T06:15:22.737000
|
||||
CVE-2024-1202,0,0,a098cbd545693e5d361995e28174ffa246c4ae019a07a45a38ebe2abdfe163e3,2024-11-21T08:50:01.790000
|
||||
@ -244829,7 +244829,7 @@ CVE-2024-12352,0,0,32f72a704f1e2542fc20de0d035c196da17ca0c575db05fe3835b61fbee7c
|
||||
CVE-2024-12353,0,0,036565fabbbc178396eb3e3c0305ad86dac517256d160df7657b090d3f9dd19d,2024-12-10T23:37:06.613000
|
||||
CVE-2024-12354,0,0,b8e15a077e4c1a839cf8211dcd4deb8e8c4036fa20d487417d7ee12337ae44d8,2024-12-10T23:36:25.740000
|
||||
CVE-2024-12355,0,0,27ba3231c85cb7bb230de2bfcb71ae509e2205da9b6afc6c150214b3cf17ceaf,2024-12-10T23:36:03.883000
|
||||
CVE-2024-12356,0,1,105dac76f068e0a7df26029c27e4dd4c6eb4193ba09a6f3d1c3ed5326b9fe200,2024-12-20T15:25:37.347000
|
||||
CVE-2024-12356,0,0,105dac76f068e0a7df26029c27e4dd4c6eb4193ba09a6f3d1c3ed5326b9fe200,2024-12-20T15:25:37.347000
|
||||
CVE-2024-12357,0,0,48fcc186a0b90c08dc56b15842484729758da0392dc94d034d9fe9fdfb82ecb1,2024-12-10T23:35:15.660000
|
||||
CVE-2024-12358,0,0,c693e0849f917c8e8b82ecbabaa009531cb87832861cfd247370c207501db351,2024-12-10T23:34:20.467000
|
||||
CVE-2024-12359,0,0,c89d1a1aa75e792ebb41728457dc48f1f26a200ebabc2671ae04aee3d706d446,2024-12-10T23:34:02.110000
|
||||
@ -244919,7 +244919,7 @@ CVE-2024-12555,0,0,0d42d0c8cac624be8352d225c1fedeed93d78abfe4d84ed9171ab1d4e5a10
|
||||
CVE-2024-1256,0,0,ea8829298a5ced036094d7fead955f33827bc36bbc0a7f87a81ee1f95b95b282,2024-11-21T08:50:10.293000
|
||||
CVE-2024-12560,0,0,59d00c885b51c3e9ef9e4160d8c87472751bc46b43573f63258bdfe4a0067aed,2024-12-19T07:15:13.507000
|
||||
CVE-2024-12564,0,0,0abcb221861e5fc99f1edf43c59fea9ce50a3b4bd68b4b9a5961d76741772172,2024-12-12T15:15:12.097000
|
||||
CVE-2024-12569,0,0,85ba460436494f476697b315ff16d44cb76ffc76b518eda7d927b0e3a48ad1e9,2024-12-19T09:16:13.830000
|
||||
CVE-2024-12569,0,1,f066721e86ab0b585b58df0c291535366f5e06bd60d39db2c198664dfbee8e4a,2024-12-20T18:15:27.230000
|
||||
CVE-2024-1257,0,0,7cc030c8f0ebfb33a80da788a5513945114551aaaa2999db4fa614a5f6b08a9b,2024-11-21T08:50:10.443000
|
||||
CVE-2024-12570,0,0,be94920192af405ec932f38181a462713be2ef7292a21e90f93bf4238cc63d84,2024-12-12T12:15:22.660000
|
||||
CVE-2024-12571,0,0,64d88bdf40a9886ffb28abd6d1e741e65a8db2fb01deaadc842b0be03349fe2e,2024-12-20T07:15:12.380000
|
||||
@ -244969,7 +244969,8 @@ CVE-2024-12669,0,0,cff9f2a304270add667ff179e86a9f065113db2e7e50955c8f0fd086a0592
|
||||
CVE-2024-1267,0,0,0747778ead3832a4ca40a6166ab0347567f6883def83eef1d70067a8b72b33c4,2024-11-21T08:50:11.937000
|
||||
CVE-2024-12670,0,0,e7b8f3ddb5169d290af2bda66232fe815bee4c71a4a1f7548206ceb5efabd15b,2024-12-17T16:15:25.140000
|
||||
CVE-2024-12671,0,0,33a51da7a5cafc871ec2982a392093d750bc50c7ea020ed8c4ecce107234fbc4,2024-12-17T16:15:25.260000
|
||||
CVE-2024-12672,0,0,5cd1d3b4cfb441dfdf1d1b86c433e5f5cf40997f4b5be8408d5185dc7fd334c9,2024-12-19T21:15:07.627000
|
||||
CVE-2024-12672,0,1,43f993d04491aa37c8f06809db5261032f93c45461f913438159eb31bb33f5a8,2024-12-20T18:15:27.537000
|
||||
CVE-2024-12677,1,1,3507790af505e09c09618fcf8a633379c9f714a2be36a2eca961aed220c8f0a4,2024-12-20T17:15:07.757000
|
||||
CVE-2024-12678,0,0,a99cebbf2382fb3bdb3a5462f20e28cb436198a7494c25805c55135c7b052910,2024-12-20T02:15:05.500000
|
||||
CVE-2024-1268,0,0,8e96a69266d469b252e6c6ee082354a5ae4d9bc7d7daa2e17d8f5480121bca0a,2024-11-21T08:50:12.083000
|
||||
CVE-2024-12686,0,0,7c2cc2e0f5f82b44071cc4c1a2dd0de5cead79d1be06d7509bdb9e40b2202caf,2024-12-18T21:15:08.020000
|
||||
@ -245016,7 +245017,7 @@ CVE-2024-12830,0,0,d198fb1fd8ccf96839a414659389d58b36662edb43142fcb13bdf22550e95
|
||||
CVE-2024-12831,0,0,6a7b0e5cf4fa71c8e07ed8162e3704e196eca9cba00188a493458902a4427e43,2024-12-20T01:15:06.670000
|
||||
CVE-2024-12832,0,0,9a101f7d70f0a623c3454123e2a257a4b7f5154c8200a2b8250142a3bbfb4bc4,2024-12-20T01:15:06.793000
|
||||
CVE-2024-1284,0,0,2e71db4897104f6683ee75152cd91e2f417b7912ff1c292da5c27be659017dd1,2024-11-21T08:50:13.780000
|
||||
CVE-2024-12840,1,1,6728e4dd233ba33a905cb7475a2ab43481825f682ab1ab63bb8088d737f16a71,2024-12-20T16:15:23.417000
|
||||
CVE-2024-12840,0,0,6728e4dd233ba33a905cb7475a2ab43481825f682ab1ab63bb8088d737f16a71,2024-12-20T16:15:23.417000
|
||||
CVE-2024-1285,0,0,d0ab2f865f2e59a6fecad2e70eefd338b3054451b5a20bdd27d60569b43e4f0d,2024-11-21T08:50:13.903000
|
||||
CVE-2024-1286,0,0,3a37afba636befcbf537a255eb60a76fe80040636283609c3669d2692aee914a,2024-11-21T08:50:14.037000
|
||||
CVE-2024-1287,0,0,86cfcf8ed68830eef8991c1cc47e2012e7e4c97ca8a27598ab8fa2741ba6d8b0,2024-11-21T08:50:14.227000
|
||||
@ -247085,7 +247086,7 @@ CVE-2024-21545,0,0,12417d057214273e4a76243ffeaf97d513746844d668a1420616fa022f5af
|
||||
CVE-2024-21546,0,0,374b959b014e67074043123d4e408037a721391ba09f30f003dba89985567839,2024-12-18T06:15:22.850000
|
||||
CVE-2024-21547,0,0,9490da4e046bfe0261ead89061dc5ab090fcc33b7491f225d76294d9a91f7dfa,2024-12-18T06:15:23.187000
|
||||
CVE-2024-21548,0,0,1234240944f7ab37f9588d239ecac84e4a1f43ed5a4b8fa4e08658630e5fe2ba,2024-12-18T15:15:09.947000
|
||||
CVE-2024-21549,0,0,dc243ef0e42daf7dcd8db82f6f1c86a16547df01e3cb286c549c98c29096c4c9,2024-12-20T05:15:06.780000
|
||||
CVE-2024-21549,0,1,facd8052f0d57246964ee421f8413f9af2b81009f9f5cb4e77b99ca3c5240e74,2024-12-20T17:15:07.983000
|
||||
CVE-2024-2155,0,0,1def2d989b10107bcc4deca9404884628c1ba17bdc1993a4df13bb309b4ac8eb,2024-11-21T09:09:09.070000
|
||||
CVE-2024-21550,0,0,6b574e14ae55a92be9fd93a1bb9ebb56cb79876aa6e47f41fbbb48bbd5163e82,2024-08-13T17:33:13.537000
|
||||
CVE-2024-21552,0,0,3511199af539fa92e1c2d7637f006a31f2e0de3850c5a9391f1377c23517a9d0,2024-11-21T08:54:39.323000
|
||||
@ -247330,7 +247331,7 @@ CVE-2024-21850,0,0,3f4996285ba8f36af13beac4e19f7f6eaac6b7c930044e4f18b3bcd24f607
|
||||
CVE-2024-21851,0,0,357d45614df90945550287893cfbeb32cbb4c927c6c52e5c9529544fa122fec4,2024-11-21T08:55:07.400000
|
||||
CVE-2024-21852,0,0,74a89e8ad5e242dcaa69632c98166ec72cd5d0a1eabe8107cc899068b6ea0ada,2024-11-21T08:55:07.547000
|
||||
CVE-2024-21853,0,0,03873964bacd463823aea35d75df2179a268a9ee8ab035ecc0200603d0f2ddea,2024-11-15T14:00:09.720000
|
||||
CVE-2024-21855,0,0,abc4e6b5fa8456e02ce60ff7eff16c5d7844cea27d489d0ca11365f1824782fe,2024-11-21T16:15:22.370000
|
||||
CVE-2024-21855,0,1,cd01486a1dbc0a9a886ff2827620764e44df4ea15f59879419eb00eb59af385d,2024-12-20T17:05:24.753000
|
||||
CVE-2024-21857,0,0,c575350fcef843725e7ef275d0f3a96677c72165608cfb91eba4d11094a1a3f8,2024-08-14T17:49:14.177000
|
||||
CVE-2024-2186,0,0,4cd75d54d43aef363137514f65f60c9ac389db0d3c09cf411cd6f8433450c76a,2024-11-21T09:09:12.967000
|
||||
CVE-2024-21860,0,0,c33a33edbd83b6963f5e370eb0c3bd18861faf04570d72f488d2420923622b3b,2024-11-21T08:55:07.907000
|
||||
@ -248224,17 +248225,17 @@ CVE-2024-23220,0,0,56ec6c9a0c3f534e407a25990b76d9f9791ed14187a0ea0d7f9d644c10ee2
|
||||
CVE-2024-23222,0,0,234fbc8851ab910f53af22b06eaa70a751c876141fb023e6fa28056f96c7e426,2024-11-29T15:05:53.577000
|
||||
CVE-2024-23223,0,0,97ac05c5bd628f6060d7675906f33d1fe0db77305c0052816974d888e538e42e,2024-11-21T08:57:13.563000
|
||||
CVE-2024-23224,0,0,3122876ced1cc8436d3e7eab9ff8a2d8aa1d77b5acc6cd7e0eb039ac24059a35,2024-11-21T08:57:13.717000
|
||||
CVE-2024-23225,0,1,d9417ddf22a7e380727b54cb6838be4f9e33517682bdefff5dd3056836e5a3dc,2024-12-20T16:51:15.130000
|
||||
CVE-2024-23225,0,1,eb0782fbd39efc0814ff4369aa9a949dffdf3d310db982851067fe25e2177b43,2024-12-20T17:08:54.523000
|
||||
CVE-2024-23226,0,0,d35555d4d9166169b2d9ebc0c0d3ddd8a6739dcc9d000507c64ae35e59ee757e,2024-12-05T16:33:06.327000
|
||||
CVE-2024-23227,0,0,eeded3365b3f5ae72b53b6766c3f1571c46876b65611fd208cdef323d44e0e7e,2024-12-05T16:31:39.383000
|
||||
CVE-2024-23228,0,0,4777eb1057e01b89423a9fc98cb690d47cbff49eeda10b8695a9f357523c2a6d,2024-12-12T14:33:00.640000
|
||||
CVE-2024-23229,0,0,b503f4043ad887688ebabe0f99f6dc2e750bec5ee240a1c13bf5cff65542fd4a,2024-12-09T17:37:58.303000
|
||||
CVE-2024-23230,0,0,156b934172dbb493756c9b28b3091ed6cf989cf09f6556b0519517d3a710f9a9,2024-12-05T16:29:16.003000
|
||||
CVE-2024-23231,0,0,ba1d2593aea3c4c4a174d2e33b5049749196fa54034828f6beef5b71f462e4b8,2024-12-05T16:27:10.467000
|
||||
CVE-2024-23231,0,1,b345ca2141a2953e4d0d79a4aa59df13df9ec9881922a1f9223058754c5c8dae,2024-12-20T17:09:06.867000
|
||||
CVE-2024-23232,0,0,2d4ff156fd4bb5acfd4c77537307a7232bbe750b532071870b7076c67ef970f3,2024-12-05T19:50:23.700000
|
||||
CVE-2024-23233,0,0,ba76592c9abd6021c9cd40cd3baae71397fb7de180a79a7079e5b607a05d8d7c,2024-12-05T19:49:55.040000
|
||||
CVE-2024-23234,0,0,2e6ac2948d5f78449bdbb22421c29ee97772b7e769451de805febffae9b54f22,2024-12-06T02:48:33.647000
|
||||
CVE-2024-23235,0,0,d147655623feed7f676315427c134a6bbfb5863ecb6102302089b527b673a106,2024-12-06T02:36:27.937000
|
||||
CVE-2024-23235,0,1,9a34f8e4ff0503040ce75a38cf6851db6360ff7441289023e99bd8eeda83344b,2024-12-20T17:08:50.517000
|
||||
CVE-2024-23236,0,0,a0ff633f4e0feb8938fa63f59f317e6731d8f14631d93c3d47b0d40500deb8f2,2024-12-09T19:30:08.453000
|
||||
CVE-2024-23237,0,0,5ebc5173e614f45947ce7d8b6d251bfd9a7226ed6c5a53d978f1e15bf6e5faec,2024-09-23T19:53:51.170000
|
||||
CVE-2024-23238,0,0,e055da92b65437a98bc321c417e70a8f6a5157addb3c81c8dcfe9f4937312e89,2024-12-05T20:03:43.247000
|
||||
@ -248246,7 +248247,7 @@ CVE-2024-23242,0,0,741106f9dc3463bc451723e7b8cc21ef1db5886490f98395e55dc47f2247b
|
||||
CVE-2024-23243,0,0,16c5de8e4ab967061eb8ee2cd6d3dd7d9074d29e6b9475fb955e98d6f2c0db20,2024-12-05T17:10:47.297000
|
||||
CVE-2024-23244,0,0,5aad1663b4ed4cd78deeaed9a4afb07e9e6e364d3035e066110317350a5f9cb2,2024-12-06T02:13:06.950000
|
||||
CVE-2024-23245,0,0,4a86d676d3be6cda9e360ecc9a003c7062cb405f97d6449fe5589357ff2225f8,2024-12-06T02:08:18.640000
|
||||
CVE-2024-23246,0,0,ff2f47b01d9db6b76018b7e6f09021055c9d6e6c8c480cbe244aa09f8dc0edb3,2024-12-06T02:02:26.433000
|
||||
CVE-2024-23246,0,1,dba86fcd1448c512e3001d37ec498b089b198c155206beb9371cc0d8180b4b20,2024-12-20T17:09:02.443000
|
||||
CVE-2024-23247,0,0,c204ca7ef7979ea0603fec0bd8eddb1c65df637a5bcdac9a9a2ba060eb81fcf4,2024-12-06T01:58:51.233000
|
||||
CVE-2024-23248,0,0,c48fd9ad2631eef3f53ac5adca0b91801108c15be181b815768304a228795f1c,2024-12-06T01:52:41.503000
|
||||
CVE-2024-23249,0,0,5da154d890c56feee3aeb01a7ee9508a41a9ca6982e5c902a0c40bac654d6a2e,2024-12-06T01:51:51.123000
|
||||
@ -248258,9 +248259,9 @@ CVE-2024-23253,0,0,6fee2e03ec17eb24d88c1bed52c44c23ae4ef97327ff874a2890eaaa17222
|
||||
CVE-2024-23254,0,0,3ad832d7c7a0a8a8df5739c11dd6d63a4415039b0e1baa027b884d9d2dd50195,2024-12-06T02:54:01.530000
|
||||
CVE-2024-23255,0,0,7bd882417f214059f6dfc15001b2afab0607fe28723d0b0944187e5c1a7be405,2024-12-06T02:51:33.217000
|
||||
CVE-2024-23256,0,0,4ea578b20137f41639da60d4790de798cbf85fd6e17c481c4d3ab161fae0f632,2024-12-05T17:05:54.973000
|
||||
CVE-2024-23257,0,0,1467811b3c7f8cf950ef1db91c554bcbf97ae8444c35241cda16dc8b09cb98b0,2024-12-06T15:07:41.487000
|
||||
CVE-2024-23257,0,1,7f06391a83a3a5d30a7d83dfdd066795af480eb581dd23a51eff9c35cfe45e80,2024-12-20T17:08:48.080000
|
||||
CVE-2024-23258,0,0,eba9c68188ca56a6ed74a451e7dab749f607b390492bf516b3fa96413ebc51e7,2024-12-06T15:15:59.713000
|
||||
CVE-2024-23259,0,0,9a77ed20922da727c3072a1cf32453c8882821d91d08eeb5a6c078386db2182d,2024-12-13T16:49:32.297000
|
||||
CVE-2024-23259,0,1,4afb2ece42ac8b13385095744010dc54f98bbd06c0222dbb45caf5a65dfc644f,2024-12-20T17:08:58.297000
|
||||
CVE-2024-2326,0,0,d09d4fc0a3fe2b3bbc5a1e657d32fe82b3fbf461a6d335455eaa162e70e203ea,2024-11-21T09:09:30.590000
|
||||
CVE-2024-23260,0,0,86bee0d3b6e536addbecc74ccb792fb0e6df91f3c5ef6f2caee278d7f60aa344,2024-12-06T15:21:05.480000
|
||||
CVE-2024-23261,0,0,e3d079aeae084ce00b784250816edd4a5b3e0b3c058d3918e25850cd4defbfe1,2024-11-21T08:57:20.073000
|
||||
@ -248281,7 +248282,7 @@ CVE-2024-23274,0,0,318b4df782d3c6e71148c6552d1841eeb2ed2926c2f9c1ed83914e8722226
|
||||
CVE-2024-23275,0,0,f810e9a533fb793b7879304750d276d7339a9fc19b1d48344018f119825ec467,2024-11-21T08:57:22.553000
|
||||
CVE-2024-23276,0,0,8870bf788099d7859136d2c15439c5ebc20315db12c7b2aa01f521c38051d30d,2024-11-21T08:57:22.707000
|
||||
CVE-2024-23277,0,0,dd271aa56b91b093c3a10777496e2004db655da1636d53a91afc4735da2992f4,2024-11-21T08:57:22.923000
|
||||
CVE-2024-23278,0,0,05f06307755bc372c5900f30956d4183ee606440e23a62135c1df4bd1bc99ee6,2024-12-07T02:21:44.657000
|
||||
CVE-2024-23278,0,1,bbdca142c86918ece4747389e32d9f5bc6660749a5e17048c8b710b2f35f9d9e,2024-12-20T17:09:14.257000
|
||||
CVE-2024-23279,0,0,8c1ffefd196d1bd3ee9a940fb1989de48fb0d13cbe9a0d7ea19c2de439d1dfcf,2024-12-07T03:03:35.967000
|
||||
CVE-2024-2328,0,0,bb3499035182a93f707cdcba0335c8ccddb9563295bc2859816e2ba7e35f79d4,2024-11-21T09:09:30.833000
|
||||
CVE-2024-23280,0,0,09fe788e24d4a3f86544fff0058ed254d6dcc58242d779773f092933de0dc574,2024-12-07T03:11:21.283000
|
||||
@ -248301,7 +248302,7 @@ CVE-2024-23292,0,0,bc50b53ba7fc65e1b34d769e31ab336ca0f8e999265f13d76265950343381
|
||||
CVE-2024-23293,0,0,d58b5f27056e68bd03b53bf47f5a1d1e1ad4098d585ea2403d8a798a0b2f0289,2024-12-09T16:19:06.307000
|
||||
CVE-2024-23294,0,0,cada88db211fe9d398c8417c264ee5745765f39de0ee8dbdd7036758c5310c0f,2024-12-09T16:16:05.597000
|
||||
CVE-2024-23295,0,0,b9bc21e6e4256230eb4f3c16a88e9c46286188aef9199fc0975ac3a816885626,2024-12-09T16:09:27.130000
|
||||
CVE-2024-23296,0,1,d47e2db1cb3bc410f41d6dae280a8977c797ac9bcbcf817b122d792aeb8730dd,2024-12-20T16:51:47.810000
|
||||
CVE-2024-23296,0,0,d47e2db1cb3bc410f41d6dae280a8977c797ac9bcbcf817b122d792aeb8730dd,2024-12-20T16:51:47.810000
|
||||
CVE-2024-23297,0,0,30f7ae35603cb3fdf468d260c3681252597c2f5392d5a475631d593e531bfaac,2024-12-09T15:06:14.650000
|
||||
CVE-2024-23298,0,0,801dc4397d9cb442b2a863f1bc826d70b8fd4009aa54eb2ce4e4f0bf9137623d,2024-12-09T14:44:22.810000
|
||||
CVE-2024-23299,0,0,a4c59975d9e4debf492651a9710e74c1d53dab4df40f27acc3fdd4d1a0a06c1a,2024-11-21T08:57:27.153000
|
||||
@ -248817,7 +248818,7 @@ CVE-2024-23893,0,0,6620e8a3035678860ebb2a9b79d8366d8891e31364bf16eb5ad0a2ea3f971
|
||||
CVE-2024-23894,0,0,0f613219b83c49887e0e24e38a0aac0b74ec26128f9cdeb6fc771c14075cc7e8,2024-11-21T08:58:39.270000
|
||||
CVE-2024-23895,0,0,d4d544360ff9ac84901a798dd93d692846b51f3d4a3bfcbaf0a75a825a101383,2024-11-21T08:58:39.417000
|
||||
CVE-2024-23896,0,0,635bb83ecb6705faee17db42ca50da7c067c8d9ac628ea959f5651246f7e310a,2024-11-21T08:58:39.560000
|
||||
CVE-2024-23897,0,0,e1655bc71678f0b46896b5ce1732a6437c51808472bcaa8be9eed65cb55b9257,2024-11-21T08:58:39.693000
|
||||
CVE-2024-23897,0,1,0228b7769e643d6ef05fe2a1c93c1e37d5e76065c0415e858a22d7bfa4a4ef5a,2024-12-20T17:30:33.613000
|
||||
CVE-2024-23898,0,0,82cb86eeead29a41a26f8d43a27d3730988e662134d81188c8cd9708a0afbd78,2024-11-21T08:58:39.923000
|
||||
CVE-2024-23899,0,0,4e4895235c426268ca84c39a87c44ba513bc2717de20eefcac614411ffacbafe,2024-11-21T08:58:40.040000
|
||||
CVE-2024-2390,0,0,3e848f25c0e6aca1cdb589d9d47a5535f56144364579a0cdbb3a8951c3252040,2024-11-21T09:09:39.010000
|
||||
@ -250815,8 +250816,8 @@ CVE-2024-26789,0,0,f7649e1b7c5a364fa580133d1685007324d1099fc792f6438373857993899
|
||||
CVE-2024-2679,0,0,feedb7257c60d2502ade5cb9e097bb8b59af8da697b75c19a9c077cee1ddd6f4,2024-11-21T09:10:16.573000
|
||||
CVE-2024-26790,0,0,2b9b84ef81d8de6aa3dc57d8ff4dfc7945973722731a99c9b7f67727cfc494ad,2024-11-21T09:03:04.763000
|
||||
CVE-2024-26791,0,0,c8ef10c6f04ed9c66fd762d6a0b3a45e0c79cbce1caed02d55dfa6a1faf6f0f6,2024-12-20T14:35:01.250000
|
||||
CVE-2024-26792,0,1,785771b4bfd2e03416e2a07ada6b7ec1391a403eee900f868d4d1d8145ef2354,2024-12-20T16:15:54.653000
|
||||
CVE-2024-26793,0,1,aa90abb3d1121ccaaf349ab01239e4c0a4a16759efda564be699ec746faed484,2024-12-20T15:56:00.320000
|
||||
CVE-2024-26792,0,0,785771b4bfd2e03416e2a07ada6b7ec1391a403eee900f868d4d1d8145ef2354,2024-12-20T16:15:54.653000
|
||||
CVE-2024-26793,0,0,aa90abb3d1121ccaaf349ab01239e4c0a4a16759efda564be699ec746faed484,2024-12-20T15:56:00.320000
|
||||
CVE-2024-26794,0,0,23d739d3565f17af447122df5e00eeef05a8ec54d56457d32b6380cc23d7ee66,2024-11-21T09:03:05.240000
|
||||
CVE-2024-26795,0,0,5d4eabef0c456f46f9992c03723452a3a8d635aa76f96f4b5da9c93ac3ba4967,2024-11-21T09:03:05.433000
|
||||
CVE-2024-26796,0,0,aca8e32fdc5cd17befaa7f3f672c165db4946a599ea680ba270a021c886d5cbc,2024-11-21T09:03:05.557000
|
||||
@ -250824,8 +250825,8 @@ CVE-2024-26797,0,0,d555849e5fdf34e0c546a7c8e0d877b819832c74438f586ca3128c8a5874d
|
||||
CVE-2024-26798,0,0,0a31e852f2f7b601301225ce2a65456a90e397455c97cc5be42b040cfac0e775,2024-11-21T09:03:05.853000
|
||||
CVE-2024-26799,0,0,94e40360a58865d9d67dfe9e60236d4a43830fc422ed0bb78cda58451cb646a0,2024-11-21T09:03:05.970000
|
||||
CVE-2024-2680,0,0,f440ad10db5cf562a76ee6e3ce6f89409737492b5e2c89786a4d0fe716aad3cf,2024-11-21T09:10:16.717000
|
||||
CVE-2024-26800,0,1,21821a08cda79c884ec2e1ae4fc1b66372e32a178fc1e8080d5eb083e9184139,2024-12-20T15:55:10.150000
|
||||
CVE-2024-26801,0,1,d616c47816b367b14619cbeef905892d5b398628baa089c4b9bb3e31bba83957,2024-12-20T15:52:36.293000
|
||||
CVE-2024-26800,0,0,21821a08cda79c884ec2e1ae4fc1b66372e32a178fc1e8080d5eb083e9184139,2024-12-20T15:55:10.150000
|
||||
CVE-2024-26801,0,0,d616c47816b367b14619cbeef905892d5b398628baa089c4b9bb3e31bba83957,2024-12-20T15:52:36.293000
|
||||
CVE-2024-26802,0,0,c3eb25f159f3d9e97001cc75436ed032ab724692e7cfb5cb782ce74be6d22c98,2024-11-21T09:03:06.387000
|
||||
CVE-2024-26803,0,0,da1a5e4a8e1ccdf52da3c008697a74e25b55e57ecff04da71adde2377c898cae,2024-11-21T09:03:06.517000
|
||||
CVE-2024-26804,0,0,59bfb883bba3b84feb6cabc2a731628af8063660636b34871b628531b08d0367,2024-11-21T09:03:06.640000
|
||||
@ -251171,10 +251172,10 @@ CVE-2024-27115,0,0,23a704a991128549e4058297cc183510e2f019911bda8330d9d373e7628e6
|
||||
CVE-2024-2712,0,0,4b4fb0ad063b2d4f190eb365c70c98a488f4f0017bb4835e23c70bcc528b4ca7,2024-11-21T09:10:21.153000
|
||||
CVE-2024-27120,0,0,978b2d808accd7bc8081bc8a0bd6550ccb316467ae17faddcc157095d9d04beb,2024-08-20T19:08:54.490000
|
||||
CVE-2024-27121,0,0,be0329e24db65a8da36a413498190604f5646307297a4d866c7be2e68be90acf,2024-11-21T09:03:53.850000
|
||||
CVE-2024-27122,0,1,185f0648513e97bbf03bb758600504cd9e9f116f22af26eb5d561914b444f922,2024-12-20T15:48:58.860000
|
||||
CVE-2024-27122,0,0,185f0648513e97bbf03bb758600504cd9e9f116f22af26eb5d561914b444f922,2024-12-20T15:48:58.860000
|
||||
CVE-2024-27124,0,0,c86f0b5badee79ea9e80b752eefc6c1bae17c637d8b10b0c9ae6ebb140d07d47,2024-11-21T09:03:54.147000
|
||||
CVE-2024-27125,0,0,62447c94edd533b7ea117fa63d76000c06cae5d78dc21800bb3ac647a710fa6f,2024-09-13T21:06:37.417000
|
||||
CVE-2024-27126,0,1,3793bc1732fc2d346704b0b1504a0754792f903d694561b105633abfaff80bb1,2024-12-20T15:49:05.487000
|
||||
CVE-2024-27126,0,0,3793bc1732fc2d346704b0b1504a0754792f903d694561b105633abfaff80bb1,2024-12-20T15:49:05.487000
|
||||
CVE-2024-27127,0,0,56f7770e9c17ad7419c2c7a4c9b3a0f42f7e5ab48afbee6ee86b77eec58bfbe7,2024-11-21T09:03:54.430000
|
||||
CVE-2024-27128,0,0,25abf69fc83895a13784e9349a98139b1d75374ed7ab65f669ba6c5628c6f842,2024-11-21T09:03:54.590000
|
||||
CVE-2024-27129,0,0,675d38ad59f656bb9de2a8532dded9ee79e6e9ec1860c1ad35fe28a7fec1161e,2024-11-21T09:03:54.740000
|
||||
@ -252434,7 +252435,7 @@ CVE-2024-28889,0,0,56e4da21fbc62908e65bc9d6315a2b989ea164aaccf23dde236dcd94fbd50
|
||||
CVE-2024-2889,0,0,1885c0f2ecfe4bdb417129f70852e4157a6de85584ef6ee4549701263ae39757,2024-11-21T09:10:45.900000
|
||||
CVE-2024-28890,0,0,3bbdab4f532fab507ef698fd11be91e1ccfe6d2327e03eb3fd78e1be839e0795,2024-11-21T09:07:07.400000
|
||||
CVE-2024-28891,0,0,89149026c6e5f7e226ede146241710be24ae96a683eeb359126523d37dd3135e,2024-11-21T09:07:07.617000
|
||||
CVE-2024-28892,0,0,942f9c42ca113b1904656bf01dc6f72f8c312c0e67d90dfbe99963ef9c0d4a83,2024-11-21T16:15:23.977000
|
||||
CVE-2024-28892,0,1,0675780aff3c9ab12c12dfa28834b58fee94e67a571b3eca76e1a2ca00b4044d,2024-12-20T17:05:48.707000
|
||||
CVE-2024-28893,0,0,db742559f8c06478e8575a7b0b3efd5fffbc67fba44a19cb78f8e38f79742eca,2024-11-21T09:07:07.740000
|
||||
CVE-2024-28894,0,0,b9faf34ec909306221ab162d492936e7fd18d2418e4f829a4af1d6fc9a632145,2024-11-21T09:07:07.920000
|
||||
CVE-2024-28895,0,0,d2dda34349233b4529d0456a907510ce0ea82c958aeef35d6f0b65b75c4f7cc9,2024-11-21T09:07:08.117000
|
||||
@ -254867,7 +254868,7 @@ CVE-2024-32109,0,0,c9a7cac737476956b9fbf72c1e5d6a8a50bb5a1742710bddb0f71999ccd9d
|
||||
CVE-2024-3211,0,0,98aac495f2a7a17ab7cb4a24950a45aa52e6a13f3e3a0c46ae3956f9c49aadf2,2024-11-21T09:29:09.530000
|
||||
CVE-2024-32111,0,0,121bcf9e03eb2023e507e49bca0f378abedab19bac9b9cac33fc8d7c3f599a80,2024-11-21T09:14:29.573000
|
||||
CVE-2024-32112,0,0,3cc0cdd2e390858089e1a98f8ecf0a04851da7cfb00b76da57093ec0ffbb5739,2024-11-21T09:14:29.720000
|
||||
CVE-2024-32113,0,1,758bc627df310f7de0704ae877061bf72b342caa11ef83c397db20df8b50d04e,2024-12-20T16:51:57.577000
|
||||
CVE-2024-32113,0,0,758bc627df310f7de0704ae877061bf72b342caa11ef83c397db20df8b50d04e,2024-12-20T16:51:57.577000
|
||||
CVE-2024-32114,0,0,ec761db7a5ad46df257b60e3bffba3183bd48091e424b77fbddb80d44570b8c2,2024-11-21T09:14:30.127000
|
||||
CVE-2024-32116,0,0,f10f3c24dc00a2826d06434dd27b29c41c2c38d776ae02f6706b238c0f312734,2024-11-13T17:01:16.850000
|
||||
CVE-2024-32117,0,0,6ced7b5df85b7cf270709040a6c78ad7915ac1694cdc1063e73cbc492ca11ee8,2024-11-13T17:01:16.850000
|
||||
@ -258595,7 +258596,7 @@ CVE-2024-37080,0,0,c235125cb88a4c9eb5712f08a6a48067f0e62027eebca5877060642029c78
|
||||
CVE-2024-37081,0,0,5f3b3ea879aeb2af37255c2c906f01b45b1cdb7f35a5125d3d7fa22d1134f005,2024-11-21T09:23:09.430000
|
||||
CVE-2024-37082,0,0,6bf6931c6e4458306423d88f4c271b58742a49de22a708b3fa70ace5c58eee64,2024-11-21T09:23:09.607000
|
||||
CVE-2024-37084,0,0,17b4d0ebb2893714179426a840ba58f383f2be234d957361f160ee486693c99f,2024-11-21T09:23:09.750000
|
||||
CVE-2024-37085,0,1,a9ac54e9575fe85a29aaa945441fdb0d2c9bc9f2949737b6f857d56202f45ca8,2024-12-20T16:52:43.217000
|
||||
CVE-2024-37085,0,0,a9ac54e9575fe85a29aaa945441fdb0d2c9bc9f2949737b6f857d56202f45ca8,2024-12-20T16:52:43.217000
|
||||
CVE-2024-37086,0,0,a717eb3545be15590ba6655f1537e213e7110c01723f60e35623cea4a358284b,2024-11-21T09:23:10.060000
|
||||
CVE-2024-37087,0,0,32aef3b54e03c06293ea895653eb63d65e548a458126992ae45a78a65cd58343,2024-11-21T09:23:10.200000
|
||||
CVE-2024-37089,0,0,8d387479d3a2a6e03e30baefa0716f09d2a1a735bef61b94a2cbba881bf018ea,2024-11-21T09:23:10.330000
|
||||
@ -258869,7 +258870,7 @@ CVE-2024-3738,0,0,6b7c5ee43d749786d04736c3425539aee3d10b90489eb5acbf775617e1e2b2
|
||||
CVE-2024-37380,0,0,77cf3dfb25923a81bead84472c82f0af78f2d433b4d7604e764b919f8522c470,2024-11-21T09:23:44.180000
|
||||
CVE-2024-37381,0,0,9f8a1e24016e672c46f9ac1942c6c3e469697399412e29900bea76bbfcf0caef,2024-11-21T09:23:44.310000
|
||||
CVE-2024-37382,0,0,351acbbb35c6e810a4a4b14170847f37e61db11e04c62933e1148863747f62d1,2024-08-29T14:29:32.920000
|
||||
CVE-2024-37383,0,1,b1ff3cb6598ed1ba41af52ada946067c26e1f9b448619cfbacc86943333f66e9,2024-12-20T16:52:05.623000
|
||||
CVE-2024-37383,0,0,b1ff3cb6598ed1ba41af52ada946067c26e1f9b448619cfbacc86943333f66e9,2024-12-20T16:52:05.623000
|
||||
CVE-2024-37384,0,0,fc4471efd9bb23449fa9db31dee7f8a0d5954ec59042d211a974e2576d8626f9,2024-11-21T09:23:44.963000
|
||||
CVE-2024-37385,0,0,42dba148074eb68f96dc3032ef510bc428ca2ec23394b14e18ac5efc7f3674b6,2024-11-21T09:23:45.193000
|
||||
CVE-2024-37386,0,0,b3b80f364518cfd17d5ee452f25d6cb7775d8ae7b1e0df3e35aae4575b507127,2024-11-21T09:23:45.460000
|
||||
@ -260082,13 +260083,13 @@ CVE-2024-38832,0,0,0493cf9f013d37851e0f742d469726bd8aa192c3712403ff0f7b7890bf101
|
||||
CVE-2024-38833,0,0,4362568a75fe4ff6f0b022eb6319bcf28879b08f368dc59d539bcf2b96b0e3c0,2024-12-06T20:15:26.097000
|
||||
CVE-2024-38834,0,0,d1e4df2457be3688e7ecbb94c62f14ef708bf2a35a15ef98a11a7f707840deba,2024-12-06T20:15:26.207000
|
||||
CVE-2024-3885,0,0,d8203bf975259cc7c9b8096eb8aae188572edbc7f75dcaea8b5f71a9e139f772,2024-11-21T09:30:37.807000
|
||||
CVE-2024-38856,0,1,1179c7b2db8de0f6b621a0e591d1f9edf5c96f25bb4617d01659a6586ed94c66,2024-12-20T16:35:41.330000
|
||||
CVE-2024-38856,0,0,1179c7b2db8de0f6b621a0e591d1f9edf5c96f25bb4617d01659a6586ed94c66,2024-12-20T16:35:41.330000
|
||||
CVE-2024-38857,0,0,392b260a009bcf153896a24b0ca2ef35f6f5d57e012aa080627851164a4da679,2024-12-04T15:37:16.290000
|
||||
CVE-2024-38858,0,0,0905a6edb93734f4ba33225c6937d7fb9b4d2ff2a1ff03b7aa90c2c6088f27ac,2024-09-04T14:39:10.203000
|
||||
CVE-2024-38859,0,0,d5cd9910194e7ede45677f9f5ea018635b199c144fa350166115cef667345577,2024-12-03T17:47:02.467000
|
||||
CVE-2024-3886,0,0,3a026cacc2b1da5f32776c4ad857a17f67d1a004181736ab52c33a72e8789c33,2024-09-03T18:48:14.927000
|
||||
CVE-2024-38860,0,0,2fe29335e4516ea3256064dfc26190ce7cc189e9ac31e94fea538574e1933f86,2024-12-11T03:01:28.130000
|
||||
CVE-2024-38861,0,0,d90c23362d2b5bb6263f8e48f50317e3d53e04f0a4469c9dd3ff57b01dc1140b,2024-12-11T02:59:59.170000
|
||||
CVE-2024-38861,0,1,8da578c77bfff9b3cb89303f8d565b44ff8e7d7f6b8164aa2636ec20b509176f,2024-12-20T18:57:56.383000
|
||||
CVE-2024-38862,0,0,9b3effa57af127d210fa99d38decd49715030f753336a9c99109dcc9d2bae0d1,2024-12-03T16:56:19.887000
|
||||
CVE-2024-38863,0,0,19f40d0a8efdafcf1661471e0d88ded3ea1f1a6ed7ed00a5524865119c45bf20,2024-12-03T16:47:15.693000
|
||||
CVE-2024-38864,0,0,7cf8731e9c51bad4951a528c23c1b0408734f55fcddd88e6429508c444ccc918,2024-12-19T16:15:08.197000
|
||||
@ -260812,7 +260813,7 @@ CVE-2024-39887,0,0,8ee03603ace192c884ceda52f2aacab6ea4c099a303b374fdd80802d5de2e
|
||||
CVE-2024-39888,0,0,81c1a1a3b559fb766c964d813b74871c335741225eeead7406d8629b71ea8739,2024-11-21T09:28:30.540000
|
||||
CVE-2024-3989,0,0,282bf7f86f8761318f492d12462b4a7880646f788a5c46f5a9950ff45ab93cd5,2024-11-21T09:30:50.250000
|
||||
CVE-2024-39890,0,0,c8343a9ea929857fa8808b228cecd63b1ba5d3a8800dd45f74ea582669324b81,2024-12-03T16:15:22.483000
|
||||
CVE-2024-39891,0,1,d58f87038cb3ffd0fb4168b343d5f8ee4baff33beca8f6f9422d319e2027df29,2024-12-20T16:15:33.687000
|
||||
CVE-2024-39891,0,0,d58f87038cb3ffd0fb4168b343d5f8ee4baff33beca8f6f9422d319e2027df29,2024-12-20T16:15:33.687000
|
||||
CVE-2024-39894,0,0,4d15c700ed33a6fff9b64954d229a1be2b3454cc61179df7b4861cbf0d66eb8c,2024-11-21T09:28:30.867000
|
||||
CVE-2024-39895,0,0,48e965215ad9f93f32302de4cc2925636a5990f6518710e75a7792ea0f466f5a,2024-11-21T09:28:31.113000
|
||||
CVE-2024-39896,0,0,633e65a00d4c10f39b58379fe78094ad8927ec99c74b82d38cd2d53912355928,2024-11-21T09:28:31.230000
|
||||
@ -261137,7 +261138,7 @@ CVE-2024-40705,0,0,498d1b36f9941cc45abf0a56c450cafece4560bbcc29015fb60565ec3b88f
|
||||
CVE-2024-40709,0,0,fc599183e9661cbcade523183f2c327fbd248e82b89d065b196cf8d66176a6c5,2024-09-09T15:35:08.283000
|
||||
CVE-2024-4071,0,0,6b7a15c8812d01f9851365bf0640804d8a54a0d07fe306e122faf1e050f7c253,2024-11-21T09:42:08.097000
|
||||
CVE-2024-40710,0,0,770af878a2a59ef82e06d03d07cf0408429abb3e03291325079d2d5ef2519547,2024-09-09T17:35:04.207000
|
||||
CVE-2024-40711,0,1,7b916b0711bc44aabe5c56eee896ffffaf138f2a0c03f97b9d1731ef29c51dd9,2024-12-20T16:35:59.103000
|
||||
CVE-2024-40711,0,0,7b916b0711bc44aabe5c56eee896ffffaf138f2a0c03f97b9d1731ef29c51dd9,2024-12-20T16:35:59.103000
|
||||
CVE-2024-40712,0,0,9b2697b2eba4c69fff39e4fe2868a8adaaae993e23627840ecc81e505d9046d1,2024-09-09T16:35:06.673000
|
||||
CVE-2024-40713,0,0,a9216adf51dc1ca930e362df269647bc0ed1c0502b95ef822b4a8bff7019db6c,2024-09-09T15:35:08.970000
|
||||
CVE-2024-40714,0,0,026f680bbc0efd7928869ee7a08cabe88c5295f087ce979f6303318acfabe463,2024-09-09T14:35:02.980000
|
||||
@ -263049,7 +263050,7 @@ CVE-2024-43306,0,0,c5ce1c97ee2c551a6fa8788a19dd2d6978c52a875878f2df83b699738b025
|
||||
CVE-2024-43307,0,0,8fbf744048c958ae300202c5f818de882814571bc06ebfdd9e652305b61701ed,2024-08-19T12:59:59.177000
|
||||
CVE-2024-43308,0,0,aa22fcffc7041917127d93081d908e34cd627d4d10793307f6ba8195eaa761c6,2024-09-12T16:30:02.100000
|
||||
CVE-2024-43309,0,0,1eaec8ce276c06048348327945103c6d2ea21efb7203b88971dc793e38e026ea,2024-09-12T16:39:09.187000
|
||||
CVE-2024-4331,0,0,3cedc0db0348f65ce723ea0811e25c358730e1a9a5555a1c1173136c3c5e20c6,2024-11-21T09:42:38.520000
|
||||
CVE-2024-4331,0,1,f5ca1d6fdd6953854d0576448fbefa9c08c3e2e9e03b6d1583ca81462518a288,2024-12-20T17:22:46.783000
|
||||
CVE-2024-43310,0,0,b1d5a62175828009d1f8c4d3ede330d4f35a1cc114a8594b5b483fcdc438086d,2024-11-13T01:15:24.813000
|
||||
CVE-2024-43311,0,0,4220c8475b216fd0e41f386621500391cf8e0c6c4ca697b2e57893c49cc8fafd,2024-08-20T15:44:20.567000
|
||||
CVE-2024-43312,0,0,0805c2de8f1c51a2a656b3648824ea7e8e23571ad9dc623405e8aea5c7c3f94e,2024-11-13T01:13:26.633000
|
||||
@ -263386,7 +263387,7 @@ CVE-2024-43647,0,0,8afbf70ad2cef6fb4b1caf7e1a2477d89764414a1ebb1b6c70d7bf7b3d244
|
||||
CVE-2024-4365,0,0,8395a37d6a53a1070a3da8569444b421529dea178299a0f784e109ce6848c89d,2024-11-21T09:42:42.317000
|
||||
CVE-2024-4366,0,0,3c382e606a72e58f20f6afa38987a3fb436df349cdb6108f029876febf16f59e,2024-11-21T09:42:42.433000
|
||||
CVE-2024-4367,0,0,3318beab631cb74f2943c39bf29b1939a0ea63fcc5350b19cb44402c5adc35db,2024-11-21T09:42:42.537000
|
||||
CVE-2024-4368,0,0,664dc928d0c9e01e299c88a57ce3fffb65186eb11c8fe2d70992c5794d71a2c0,2024-11-21T09:42:42.673000
|
||||
CVE-2024-4368,0,1,3d10c8e78c29700111196d36c50b5f085edebb06975b60275c2b591108b23a7b,2024-12-20T17:23:03.420000
|
||||
CVE-2024-43683,0,0,df9b098d0d10bbc57333de3cddd48795135c3c7c667cdc231a2f356001c571ba,2024-11-01T16:15:08.930000
|
||||
CVE-2024-43684,0,0,4a243a48ba516eb20e6ab29bdd16712edb7b93acf46d8d67ea6d12ff5a4303fa,2024-11-01T17:15:17.127000
|
||||
CVE-2024-43685,0,0,f6b41b4fe43ce77455d2f85a9164c265be40037da33cc3a92bd45f51667e1ef9,2024-10-17T15:17:20.217000
|
||||
@ -263880,7 +263881,7 @@ CVE-2024-44190,0,0,ec036b1f60dea569eef287561200a33a41aeefcf64eef3b61618ae6ebfbc5
|
||||
CVE-2024-44191,0,0,d240f1b8433a5ce6dbe87e65698049b28e8c35859d01c776684fda07dd899ed0,2024-12-02T15:00:03.333000
|
||||
CVE-2024-44193,0,0,e8cd317fa1c1f489397fd49c4be8f85204f966e9fa00998149de32c25c4e3ea8,2024-12-11T02:53:58.413000
|
||||
CVE-2024-44194,0,0,789113f0658a6ddde1f6417d93be90ede379c24f3199a65cf3b83f7069f1c9c3,2024-12-06T15:15:08.690000
|
||||
CVE-2024-44195,0,0,7bd8e2e2361587a210a6ab99d7aaa0b678351afc50600d74deca91365acb4039,2024-12-20T04:15:05.313000
|
||||
CVE-2024-44195,0,1,5fd3b107528189bd2e705cef466fbbff2b7f08fe3e4e94dc8e4a02df1db2d1b2,2024-12-20T17:15:14.860000
|
||||
CVE-2024-44196,0,0,efba4227fd693646a405367aa8a07c9ade4c0b362274669a348a2035392544af,2024-11-14T02:15:57.873000
|
||||
CVE-2024-44197,0,0,4d5ea1ffd5ac300a8aef7ddcdb7d03d5b4f53fc506b231f15824ab1d8acba09c,2024-11-14T02:16:23.927000
|
||||
CVE-2024-44198,0,0,ac9983938813bdb2273db436dba2e85817aa94ffd182ac96898511d49f70472b,2024-09-24T15:45:32.787000
|
||||
@ -263894,7 +263895,7 @@ CVE-2024-44205,0,0,479ce40b4658e11ccfe7113f730a76d2315c870d209a012f733f4449cc380
|
||||
CVE-2024-44206,0,0,d8e5aac347cb04d8524629aaf70121480231b4f8b4280238ac4fc071f1a60444,2024-11-21T21:15:21.477000
|
||||
CVE-2024-44207,0,0,df8e300cf7f6b361cf79cc82a13f930868069c30b911e0bc1e5fb07b5725fa64,2024-10-04T17:31:41.970000
|
||||
CVE-2024-44208,0,0,0f110c58ea3b1936a6fa272413b21f60fe5e44f11a840cf53eeb8d5bd692f5ed,2024-10-30T19:35:18.340000
|
||||
CVE-2024-44211,0,0,ad2d9d2b5d41c1bf436d1576f95234417ca2a015dbbdd186b29eba7cad8a6bee,2024-12-20T04:15:05.410000
|
||||
CVE-2024-44211,0,1,759f37a7e4b839af60feef985653c9f39bbd51a751db1d2f2824acacc4e586dc,2024-12-20T17:15:15.053000
|
||||
CVE-2024-44212,0,0,e65cf132c6860c96df39727fc583565899ae979073c6e43c4e56dcedfb1d08ea,2024-12-13T18:51:05.983000
|
||||
CVE-2024-44213,0,0,d54c85400318007c85dac3cf8abc38cb1350827f6126f81634ef8d1828179ea9,2024-10-30T19:35:19.187000
|
||||
CVE-2024-44215,0,0,e32762ff0bf2f6f2e22b7422e9deddd79856979cb2bda3d837557df7bdb5d6cf,2024-10-30T21:35:06.770000
|
||||
@ -263910,7 +263911,7 @@ CVE-2024-44225,0,0,09c2c91a46b4b824bbe1350f723a18758e0297c6f1159cd080a69de8af433
|
||||
CVE-2024-44228,0,0,233a9fa817aba532dc55e3bf55f1e7e1e04a30b62b44a655772ef05440625188,2024-10-30T20:35:27.570000
|
||||
CVE-2024-44229,0,0,79811515ccef73d41159136745a09e4e9b2ae027bbfa748a8533cf5125c53ff1,2024-10-29T23:15:03.437000
|
||||
CVE-2024-4423,0,0,904bfc58b1909282d82661cafb70a1a74dc795b741ee1a78c704e0498aedee0e,2024-11-21T09:42:47.973000
|
||||
CVE-2024-44231,0,0,6ed9f85e02d34972a50180e92b21c9b7e76d1ba95bdf8ef72b6b04f0a1ef40b8,2024-12-20T04:15:05.620000
|
||||
CVE-2024-44231,0,1,9aa4e4a66e55b91e9905bf8d1bb79d682ff9da10e92f9d9c8de25cdd7384553f,2024-12-20T17:15:15.277000
|
||||
CVE-2024-44232,0,0,c9e60a0c1965d8b25770744bfea513326538d2727d3411f3ea53393806685d07,2024-11-04T21:35:07.233000
|
||||
CVE-2024-44233,0,0,faa9cc95169f99a6ba5b7b809b52a3296f8f8d5cfb2ab7775af98f1caeb58709,2024-11-04T22:35:07.613000
|
||||
CVE-2024-44234,0,0,1b996be4e23122b67d229b562bc4172f47ad474e322c6880a3e7f0b7746d3c2c,2024-11-04T21:35:08.147000
|
||||
@ -263967,13 +263968,13 @@ CVE-2024-44289,0,0,cebc5a6dd69bb4dfb6fc1913fbecdc8def2c3ab557066dcaad90744b17bd9
|
||||
CVE-2024-4429,0,0,a4a8f97ae1846585dda39a340897585bd413fb1368db5055aa3e7c7ef6d4f3eb,2024-11-21T09:42:48.820000
|
||||
CVE-2024-44290,0,0,3f10326ddda1c7d048782a293610e4b0eadcb04b9c4d906fd270793108dd8832,2024-12-16T22:15:06.690000
|
||||
CVE-2024-44291,0,0,9fbd08e4a2248003e1aa444c3a50c6b5ccdfdd8d43ab2891c86e69ab7e61bce8,2024-12-16T19:15:08.180000
|
||||
CVE-2024-44292,0,0,deba1c1a617ab52c53d33ba7a55102d682cd706ce79c79024575d45391273dbe,2024-12-20T04:15:05.713000
|
||||
CVE-2024-44293,0,0,39fa9dfc6d70a4a01360ad7ba07c9c0f683bf6a41315a92bf7b02238f934a0cd,2024-12-20T04:15:05.800000
|
||||
CVE-2024-44292,0,1,aff4c88fbda4b4b6e685651306bae87e194e89f532a38adbd7445e4d38cf296d,2024-12-20T17:15:15.457000
|
||||
CVE-2024-44293,0,1,0506803fcbf6afb69ef6a4b195e2554f7ec57c0c79393dcdc16a52ccce4c88cd,2024-12-20T17:15:15.843000
|
||||
CVE-2024-44294,0,0,39c4b8619d1953e77ef2c82b0222202a45c3a25d1ed0c03e471ab470880aa0e2,2024-10-29T21:35:21.347000
|
||||
CVE-2024-44295,0,0,fb3bb1168f264d5ea57ac326382812654e52d772ee8cf2d79e0cd717b2d51c9c,2024-12-12T18:21:21.147000
|
||||
CVE-2024-44296,0,0,5fa9d13f224f3a0a67aaaa3541de4a3651fe9910d7529312fb8483d35af02925,2024-11-14T14:58:09.900000
|
||||
CVE-2024-44297,0,0,15b11a1a880cbcc6b8dc8f6c7e90f9afa6080bf98d20fe4b15a67c3ef7cd8eaa,2024-10-30T15:35:17.777000
|
||||
CVE-2024-44298,0,0,cd6213cd42f8806ee5cc384f66e51d4f155c3a8da9c31b8460127de9a21a4795,2024-12-20T04:15:05.893000
|
||||
CVE-2024-44298,0,1,c3ca9b080a765eb7800ab2d41b4733d38b2ee4df6997cf8987c4b165307c381f,2024-12-20T17:15:16.340000
|
||||
CVE-2024-44299,0,0,3fad1e1fc6e494d5112c8007d008afd8a0cdb0129eb46588d4ade8d86481d2e9,2024-12-13T18:47:10.657000
|
||||
CVE-2024-4430,0,0,d5d36fbeccc483ac36a1692cd3da44d019b58c951236b193b64bdfb1c1fbb731,2024-11-21T09:42:48.940000
|
||||
CVE-2024-44300,0,0,8389b09c1b09329ca93ee14d306e2b10682c4c3041dafd4737f0d3e5a21e6eac,2024-12-13T18:45:11.343000
|
||||
@ -264688,7 +264689,7 @@ CVE-2024-45513,0,0,25383385e2481e17b58af0b6e8f56bf94670b2d8f40ad98216966f161261e
|
||||
CVE-2024-45514,0,0,7c4b7c6d70b14b13f42d6ce3c0114c4be691ac359315234fcdf5201ecc180838,2024-11-21T18:15:08.980000
|
||||
CVE-2024-45517,0,0,9ae29652a251f6463a9327eae29d2e48904246c6a1726faacae2bdc1383f4e16,2024-11-21T18:15:09.360000
|
||||
CVE-2024-45518,0,0,097e334ff5ea6e41f366599c72134c8651cb553e492c30874b146dfc7c023e19,2024-10-30T21:23:59.893000
|
||||
CVE-2024-45519,0,1,a4e00f7b7b350923f5ea9829bd557075a8c7be45eaef48586624621fdc66f332,2024-12-20T16:38:02.830000
|
||||
CVE-2024-45519,0,0,a4e00f7b7b350923f5ea9829bd557075a8c7be45eaef48586624621fdc66f332,2024-12-20T16:38:02.830000
|
||||
CVE-2024-4552,0,0,0ac013621f010657983b95b3c9656c63a7805aea50fe3c0c1148c97b70e80ccb,2024-11-21T09:43:05.410000
|
||||
CVE-2024-45520,0,0,5466845711de025b484d71bfbeb994612050916cd5bfb23e3333148ac74978ae,2024-12-02T16:15:11.293000
|
||||
CVE-2024-45522,0,0,09ceef78cc5f057be786bb183a479b765b1739f0b7ce2fbf1b1d3c524b7ab69d,2024-09-05T14:29:32.737000
|
||||
@ -264702,7 +264703,7 @@ CVE-2024-4554,0,0,29103eb4d0b8fc6eb1c1a81b44a6bbfd0c979fea9590f8c8dd85408f984834
|
||||
CVE-2024-4555,0,0,42addb69d2a25e76680bd75ca9680f4458507a72790c92c0c02ea27cb2860a95,2024-09-12T15:13:25.520000
|
||||
CVE-2024-4556,0,0,d3c0d9c7da9d7922d293ea55522a02a915493dd034ff9fc52c8d9c8976cd2d90,2024-09-12T15:09:55.107000
|
||||
CVE-2024-4557,0,0,f03788c64b01fc0f9d9c6cb18548e7bc0f50cbdbc649d65a3f2f5d0fd687df83,2024-11-21T09:43:06.003000
|
||||
CVE-2024-4558,0,0,6319ac274b3ab76bffc38c725a48d555c771268c9442fa37616694385120fee1,2024-11-21T09:43:06.137000
|
||||
CVE-2024-4558,0,1,3406f02edd918cc96dd602fdb16b4d4e12ad3abf909753504b463aebc8840fcf,2024-12-20T17:18:09.597000
|
||||
CVE-2024-45586,0,0,c5742d0b574ab22b2df0aff8f44af2d16b298829271ece1a5c24a5de23ca2b0a,2024-09-04T12:15:05.320000
|
||||
CVE-2024-45587,0,0,676b2002aac47e9967f7d32f0f4cca8f2986385214e3c17fc6693869db40c1a7,2024-09-04T12:15:05.530000
|
||||
CVE-2024-45588,0,0,e602a5b67a431535ce7343d20bd27a01a8e11f9a6a3313f6b0f98fb929ec70a0,2024-09-04T12:15:05.673000
|
||||
@ -264816,7 +264817,7 @@ CVE-2024-45765,0,0,d08df3289bc68e719740469698ac413966bdff60f13781ac62b99dc021094
|
||||
CVE-2024-45766,0,0,3c96c4b692f72cef2f3b9553cac8d6f167af7d571a147249c8f73e3c5c52eb55,2024-12-02T14:37:32.017000
|
||||
CVE-2024-45767,0,0,7c5b48c8e706e6c8ae501761d8be0d401e1b87d8e52b758c1a580381e866ae36,2024-12-02T14:32:37.183000
|
||||
CVE-2024-45769,0,0,b04be771ec22a94fd636520cce7793ef84bf69518cc6b17c7f3bae1b59effde1,2024-11-12T18:15:35.427000
|
||||
CVE-2024-4577,0,0,3625836163a5f3e5e389ab3d9e0be9ab45faf95f0245dc9e05c551541a077c34,2024-11-21T09:43:08.587000
|
||||
CVE-2024-4577,0,1,474670197f5b401b0f7966aa2604f0e876d2981d00c3e623c8f6cb422c084d74,2024-12-20T18:45:19.983000
|
||||
CVE-2024-45770,0,0,267f93e21ecc31e4fc632c3f76596fa0f17b118159b4949d285e04a4fd4cf0a5,2024-11-12T18:15:35.643000
|
||||
CVE-2024-45771,0,0,84e68bbbb4be0001ff7299935d532d5147425a2dd756db5ffa7c61cd227dec6b,2024-09-09T15:35:11.567000
|
||||
CVE-2024-45772,0,0,749d9c0457e8d2cebf6e758f71d81f70d7548cb8ba90f16f72c767b31006b29b,2024-12-12T17:15:10.457000
|
||||
@ -266119,7 +266120,7 @@ CVE-2024-47729,0,0,fb9a3faae532a190b209638889d4832a1d191c04842bce7afb041141eec36
|
||||
CVE-2024-4773,0,0,f07928dcaaae5547ae54333e5752e7ed4bba50f109f8629be58c47cb4fadd4f8,2024-11-21T09:43:34.870000
|
||||
CVE-2024-47730,0,0,c6a9de9e049a16d83f626647f6f2c8b4ce794fd7c5922ed53347a89cb17a969d,2024-12-14T21:15:26
|
||||
CVE-2024-47731,0,0,2756673f447be2086c764fb0084779dae2a0a2504478f334b1544eccc1563c5d,2024-10-23T17:06:14.323000
|
||||
CVE-2024-47732,0,1,05bbc804c4a0c0d9d685cce21a450e0245c74d19ed4566d6c1d9947b0a7b8a56,2024-12-20T15:44:01.303000
|
||||
CVE-2024-47732,0,0,05bbc804c4a0c0d9d685cce21a450e0245c74d19ed4566d6c1d9947b0a7b8a56,2024-12-20T15:44:01.303000
|
||||
CVE-2024-47733,0,0,11a8a1225a2051b1e4caaabdc12052064513ae3d9225538c36ed409eb08ff462,2024-10-23T17:11:29.537000
|
||||
CVE-2024-47734,0,0,5e5700382d355b46474a0bfa92c47869d8da9e178f09ce7eb5625a5032dba08c,2024-10-23T17:16:13.457000
|
||||
CVE-2024-47735,0,0,a0c8f15cafb24e18391bda11b17021459a43e5529c34748cf489eefd8dea5af4,2024-10-23T21:00:03.940000
|
||||
@ -268134,7 +268135,7 @@ CVE-2024-50614,0,0,29f22ac93163ff1303a42a1fec38fde0552d285d63129bbab00c726fede4a
|
||||
CVE-2024-50615,0,0,4d2a2e353be570a02fcdfff0b42fb37b106e2c1e8ab4e77f1c580e4daa183aa0,2024-10-30T20:35:37.310000
|
||||
CVE-2024-50616,0,0,f16f40ce12577bc20e6d17ff8fa15bd5a1f69a543581dc34546ce7e8ac77217c,2024-10-30T20:35:38.380000
|
||||
CVE-2024-5062,0,0,cdc86dcd84c87200c0328afbc0b136b026f9aaa280f8620d87cfe6bc9e21b227,2024-11-21T09:46:53.077000
|
||||
CVE-2024-50623,0,1,fbc7180051d21f3b882ce8b014ba2136036caba5e6fb74887641a3e6975ea4c8,2024-12-20T15:04:26.097000
|
||||
CVE-2024-50623,0,0,fbc7180051d21f3b882ce8b014ba2136036caba5e6fb74887641a3e6975ea4c8,2024-12-20T15:04:26.097000
|
||||
CVE-2024-50624,0,0,425b4912ca74d0f19519cece63451f565c900b6a769644536a74ca4edcfab020,2024-10-30T21:35:12.223000
|
||||
CVE-2024-50625,0,0,600a63b94c23d23207c426e1e43b071296b787357ca99d17c5661761f04e2a95,2024-12-12T02:06:32.647000
|
||||
CVE-2024-50626,0,0,ee346cb1a02e9d6ceaf318c396c6bbfc04e63993edcd6528fb39c33b5fb34c43,2024-12-12T02:06:32.817000
|
||||
@ -268569,7 +268570,7 @@ CVE-2024-51596,0,0,5f7957abcc65695fbbbad369f30f56995f2266af1552e60fdcef5cab61a0c
|
||||
CVE-2024-51597,0,0,62ae94ab5483c8d914f03c3a46d4ad60c3488941e5f47bbc41dd3d393a27d642,2024-11-14T20:27:46.943000
|
||||
CVE-2024-51598,0,0,b4e6d650a73e1979019c94432440fb4ee1a330b76ce10aeee6076e05c49770c4,2024-11-18T16:37:58.447000
|
||||
CVE-2024-51599,0,0,41501685029147c7f1c1c0dd3faf8f8f30cd0ee0cdea7acc19942d2a1a69cdd9,2024-11-15T16:55:34.480000
|
||||
CVE-2024-5160,0,0,3988dd66d5b268540866cfffcf2e32587e4a470f8718cc9928d30184f9c32f97,2024-11-21T09:47:05.947000
|
||||
CVE-2024-5160,0,1,462a8d8a97ff197783bab283d57d42e89329228755b3d0d006ae98342028e950,2024-12-20T17:14:27.630000
|
||||
CVE-2024-51601,0,0,6ea142c530f0aae8d6a6871925766314779a5853c3a3fd2488392521b8763ae7,2024-11-12T13:56:24.513000
|
||||
CVE-2024-51602,0,0,630897b856830c417cfbfc6f31a1ad6d5f36ec4cb1e807fd8c47eecb679f5e29,2024-11-12T13:56:24.513000
|
||||
CVE-2024-51603,0,0,a00fc055583804474eecc8fe08a40d10c605dbcb3203377f2692135c26defd6c,2024-11-15T16:24:18.843000
|
||||
@ -269762,7 +269763,7 @@ CVE-2024-53673,0,0,998c285a4fe0e35cbecbdb698279013b408c1bb4163a1e69369fac314d145
|
||||
CVE-2024-53674,0,0,f555b7f03d33cd061d1493d8fc99309d52915e66d5ae0672802dcf1d36a50f32,2024-12-12T19:49:49.800000
|
||||
CVE-2024-53675,0,0,1183b1bd94841ad73311a268c8a0b2c37f3657514fc74825a9481690ca681ab0,2024-12-12T19:48:48.443000
|
||||
CVE-2024-53676,0,0,9e5335d7636e62fb7cc2e79040736f3f5e3856b52ef7bfb0006141b3e5724acd,2024-12-11T16:49:45.783000
|
||||
CVE-2024-53677,0,1,2c82f6dfafd4ab59665cd854e88961198dbdaaddbf165399a6a329129ec73fad,2024-12-20T16:15:23.723000
|
||||
CVE-2024-53677,0,0,2c82f6dfafd4ab59665cd854e88961198dbdaaddbf165399a6a329129ec73fad,2024-12-20T16:15:23.723000
|
||||
CVE-2024-5368,0,0,0267b73ce86fd5c42a4c0cf503f4bdead8427924f402a3554f435c1bc916f416,2024-11-21T09:47:30.877000
|
||||
CVE-2024-53688,0,0,39c0c1265bef5471cee144abe50646778e59e18b4acc0bb850c0ac5745fa9205,2024-12-18T07:15:08.233000
|
||||
CVE-2024-5369,0,0,14abdfed4d5003ff16a96b2708e00658833baa1f8166ee56f5ba2dba896b20f5,2024-11-21T09:47:31.020000
|
||||
@ -270084,7 +270085,7 @@ CVE-2024-54143,0,0,39896e76381b970ed0c53caca39df9efa5206ded9e17479626eb381c775f3
|
||||
CVE-2024-54147,0,0,31061631720e65f385fd359d47a289e6f20b86f9fad882040f751c79c06fbc19,2024-12-09T19:15:14.513000
|
||||
CVE-2024-54149,0,0,9e6d58019e13dfe4168259b606ef42fa170a7f5d925476003c46ba8914519715,2024-12-09T21:15:08.600000
|
||||
CVE-2024-5415,0,0,74eb25978de9e4a46066392a5c5808fd8612c02bf2d68d6ca3b049d5a2727bf3,2024-11-21T09:47:36.587000
|
||||
CVE-2024-54150,0,0,8b87272eabeaaecd01e7e74c6972cd286cf6e22ccb1ca9a224533e8bfcff8a60,2024-12-19T19:15:07.747000
|
||||
CVE-2024-54150,0,1,2df54d94caae27dd20c93dacb8da181f1ca94c7f90068ee4b0f13c650c491939,2024-12-20T18:15:29.847000
|
||||
CVE-2024-54151,0,0,783d6d59d625f0bdd386ea3afbe7da13ff4dd113b20f53b68a2b065516a078c2,2024-12-10T18:15:42.663000
|
||||
CVE-2024-54152,0,0,64d47547e5307ed80a7f425b825ed1812b96ec6e10500fe8d7bfb0506a4a9529,2024-12-10T16:15:23.947000
|
||||
CVE-2024-54153,0,0,c29012def2c5ac24434214b7603f1646c45a2cdd2239c37ce825446301614236,2024-12-04T12:15:19.853000
|
||||
@ -270402,7 +270403,7 @@ CVE-2024-54529,0,0,be90cc5d5d809d1a3746b39c45f75d946f866e9a1f3852b3648566e8b40f1
|
||||
CVE-2024-5453,0,0,a2ec805a779750f157f5864949edd755631f777b8533cba1597f48b2163330b0,2024-11-21T09:47:42.923000
|
||||
CVE-2024-54531,0,0,4ac4afc6f09e7ffcf7b8ffd70d60f30d481febc6558e33c0b30a021721851ee6,2024-12-16T21:15:08.113000
|
||||
CVE-2024-54534,0,0,0a85dec86735f55fea4f61a67c35ec7283b453bf2b186b2f2a85ccae12df64e3,2024-12-13T19:15:09.890000
|
||||
CVE-2024-54538,0,0,a341d84e7331b4f88e4a4de0734a6dbc63f4461b5355f04ec78215b07d52330e,2024-12-20T01:15:06.927000
|
||||
CVE-2024-54538,0,1,852dbad43cdeedfebb43616219b77e4f71051ccf9eb6e4f37330d9a15dcb3456,2024-12-20T18:15:30.117000
|
||||
CVE-2024-5455,0,0,bb7f0660a3d41dc609cc2469cc15470bc23e52876e20e5d8aaba4695f97fb58a,2024-11-21T09:47:43.050000
|
||||
CVE-2024-5456,0,0,3a1546469deeff993eb12e81bd13a91014bb8b4c59bc306c05d9d1bfeb03ccf5,2024-11-21T09:47:43.173000
|
||||
CVE-2024-5457,0,0,5c67880d08a73805d7cd1c17b384d326fd43c5a8887de09123f9750f9092dc92,2024-11-21T09:47:43.290000
|
||||
@ -270519,7 +270520,7 @@ CVE-2024-5515,0,0,71f85130fea0d24f5b9be7e16c835c5ed3481816e9a79890f353f21aacfd58
|
||||
CVE-2024-5516,0,0,c08d269a372fc11280e8cde7e2bd4dd476d490152ebd7e95c97d81e21a24e07b,2024-11-21T09:47:50.973000
|
||||
CVE-2024-5517,0,0,9c6c0ed78bbf755155b1de3e7badf246bb353c07efc38fd531426187fbced73e,2024-11-21T09:47:51.110000
|
||||
CVE-2024-5518,0,0,67f3312fdd1ae90617f9bd3a59508e7bb4618cb669e21c1a0f613af9578fc941,2024-11-21T09:47:51.250000
|
||||
CVE-2024-55186,1,1,1f80915f47017fe86c95b39d3d0d7dcf5d470e148856f0979d72772ad48b8e03,2024-12-20T16:15:23.853000
|
||||
CVE-2024-55186,0,0,1f80915f47017fe86c95b39d3d0d7dcf5d470e148856f0979d72772ad48b8e03,2024-12-20T16:15:23.853000
|
||||
CVE-2024-5519,0,0,8f24512a902c7b13458f945742cb7fe1d59be3b3655c7a61619611df90263eb7,2024-11-21T09:47:51.393000
|
||||
CVE-2024-55196,0,0,9d11e523a63faa541fa5f25136e4bd3a5a9a55216c26bfb1ac46188bd003d9d8,2024-12-19T19:15:07.947000
|
||||
CVE-2024-5520,0,0,2719a0027800a6c03c5991cd5e32370933ecb1de4c1c57d912093caa874b1ac4,2024-11-21T09:47:51.540000
|
||||
@ -270553,8 +270554,8 @@ CVE-2024-55452,0,0,3c98dae32438005b53119779d39072e95df5163307db0234424be9e14cf40
|
||||
CVE-2024-5546,0,0,71926433cfbcfec44b5e59c226d53a3ac8f9e554d9dd85d86edfe3dad7bedc17,2024-09-19T14:39:09.437000
|
||||
CVE-2024-55461,0,0,9aba9528846a5e20a9950a25279e0e578fc2f2326e2132736dcd635d432a883c,2024-12-18T23:15:17.350000
|
||||
CVE-2024-5547,0,0,c70f2b15fdfae1a20148a4f5dddd13a94d9e6eb1c9039906b5e94118b8ba53d4,2024-11-21T09:47:54.260000
|
||||
CVE-2024-55470,1,1,e1f3abfd521ac0af47361a762a69061690ca9aef330cb7d7a15e941d9fd00ebc,2024-12-20T16:15:23.977000
|
||||
CVE-2024-55471,1,1,b52a4062fc8e7185ce5e7d77a0f964031e849f7988863d57c0330bb2e29dbcf6,2024-12-20T16:15:24.120000
|
||||
CVE-2024-55470,0,1,f10f88d381c38a6bb90a0cdcf59cafaf3bca46a0e69a80516bbcddff56813b8e,2024-12-20T18:15:30.370000
|
||||
CVE-2024-55471,0,1,8197056e8f9960cec09b7a262aff3c8a7edfb21525e204bb4dac240446354cbd,2024-12-20T18:15:30.730000
|
||||
CVE-2024-5548,0,0,960acca9fdb4c73166f01cb6cab77802df52faee348d661f3dcdec3a5e889741,2024-11-21T09:47:54.380000
|
||||
CVE-2024-5549,0,0,523dae47b6780776874c36c71ab66f8ac6e8e99599490648ee341f214b628e63,2024-11-21T09:47:54.507000
|
||||
CVE-2024-55492,0,0,7169bd1cba99c8fcd824f287f20a194fa262842d9049846185e890a8a7fad7c0,2024-12-18T19:15:11.777000
|
||||
@ -270661,7 +270662,7 @@ CVE-2024-5595,0,0,5c3da38e1b5f1812e17cdadfa64cfac3c13c5342e8821d9036b7da1dd32b50
|
||||
CVE-2024-55951,0,0,0f2ba68ba5d937d3f08ffc28ee064a50ef5129020d2db58a508d614718a5fb19,2024-12-16T20:15:13.823000
|
||||
CVE-2024-55952,0,0,b12980f18101c5484cb3f148aff3182385a343546fffaeb697cc810a408ff07f,2024-12-18T19:15:11.933000
|
||||
CVE-2024-55953,0,0,2fb8456a2c636a9e07d81fd7dc8a938cab1a83bda21c4d2b67051aa5d8d86cd7,2024-12-18T19:15:12.067000
|
||||
CVE-2024-55956,0,1,8a3a8fd441b4aa1d48f534ccf7c90847b13a0644de401a73337d5c665ef64cb7,2024-12-20T15:21:39.287000
|
||||
CVE-2024-55956,0,0,8a3a8fd441b4aa1d48f534ccf7c90847b13a0644de401a73337d5c665ef64cb7,2024-12-20T15:21:39.287000
|
||||
CVE-2024-5596,0,0,eb53dbc41b5b12ac359e7b7f77cdb6558119327982ea8ec36e1ee0087b4d4e06,2024-11-21T09:47:59.330000
|
||||
CVE-2024-55969,0,0,9c57b4a45308acc7d73a4bbfc26f9862d4b6f355188666b7df28aa8e0565bef6,2024-12-16T17:15:12.337000
|
||||
CVE-2024-5597,0,0,c028f291e4b563828a2ebebe088654ce56adccaea078f8905bc0de855460aa3c,2024-11-21T09:47:59.443000
|
||||
@ -270776,20 +270777,20 @@ CVE-2024-56317,0,0,1b60ef16141d73cd0f0747efc64f0d9e7a2dad003ed04e53f5c44f0c08826
|
||||
CVE-2024-56318,0,0,7e9ceef4c12fe86faea49612fe05c60a10ea7fd55b4be44462fee213f6c94dbd,2024-12-19T00:15:06.897000
|
||||
CVE-2024-56319,0,0,8f1658ca3dd3d7bbac7edabd430e51e38c4537a2a924c742ed71899044ba913f,2024-12-18T23:15:18.373000
|
||||
CVE-2024-5632,0,0,79535ded485ce0fc041702b30ef936da2f13ebaec98ccb0306c2826a8b572585,2024-11-21T09:48:03.353000
|
||||
CVE-2024-56327,0,0,ca1393112b26d20553e2748693dd0e68f578c32c973ba4c41abc461ad3896c85,2024-12-19T23:15:07.147000
|
||||
CVE-2024-56327,0,1,7f279bf8e8dad1abfccdde7f80cf3a1198eceeaed727f435a201d9524ff4caea,2024-12-20T18:15:31.083000
|
||||
CVE-2024-5633,0,0,6153dcce403090a22c66747e4beff2cb4e82934f4fa355dae1f3e5bcdf5cc4ba,2024-11-21T09:48:03.483000
|
||||
CVE-2024-56337,1,1,c8708366b7c549dd6a9395b50e3154a03183da77e2dfc48f714159d070e9615b,2024-12-20T16:15:24.260000
|
||||
CVE-2024-56337,0,0,c8708366b7c549dd6a9395b50e3154a03183da77e2dfc48f714159d070e9615b,2024-12-20T16:15:24.260000
|
||||
CVE-2024-5634,0,0,fe363b0a66fb6b5b9d2d7dec7e16e67a66de21f18ca94ef9da54634c5755ab66,2024-11-21T09:48:03.610000
|
||||
CVE-2024-56348,1,1,cb28f0ed181f8223b2a47a2fb92147cc1a57b8274cdd4b7dbeaa070416c64567,2024-12-20T15:15:05.507000
|
||||
CVE-2024-56349,1,1,ab14f92d286039eccb0c2484d14d266ee0cd7866bd8293eb806c755563ca97b6,2024-12-20T15:15:08.300000
|
||||
CVE-2024-56348,0,0,cb28f0ed181f8223b2a47a2fb92147cc1a57b8274cdd4b7dbeaa070416c64567,2024-12-20T15:15:05.507000
|
||||
CVE-2024-56349,0,0,ab14f92d286039eccb0c2484d14d266ee0cd7866bd8293eb806c755563ca97b6,2024-12-20T15:15:08.300000
|
||||
CVE-2024-5635,0,0,0a6341b938bdc4dcacbc69dffaf28fad5ae004ccda44b69838f8259b734db74e,2024-11-21T09:48:03.733000
|
||||
CVE-2024-56350,1,1,7b1812d59665b11db258f739125b115bbd155cd393574b71b353cb44b75e793d,2024-12-20T15:15:08.513000
|
||||
CVE-2024-56351,1,1,155dac26658e047b267d56461d036ea027f9b3814fe902c765b71e10add7ea74,2024-12-20T15:15:08.720000
|
||||
CVE-2024-56352,1,1,ca4f1b58a65d31e84d3749d8cf8b089736d75cab42a699b3d1eb93935d436c05,2024-12-20T15:15:08.970000
|
||||
CVE-2024-56353,1,1,ae4bf97a5e1ee216e5415c2193a6048425b28543177ec16a6fe8cfcd94c082af,2024-12-20T15:15:09.183000
|
||||
CVE-2024-56354,1,1,61538a6f4130866818f35928ce5defeadc2b6e7d958e8e8cab12bd8ba0484ab0,2024-12-20T15:15:09.400000
|
||||
CVE-2024-56355,1,1,21efaad8f1c58d999a4416cf6d326431dedd314af26993c0e70693f39d0a6552,2024-12-20T15:15:09.630000
|
||||
CVE-2024-56356,1,1,0311ad340d8557b44a140f6e660b54052200e785ccacf5ea6656b7d035c17abc,2024-12-20T15:15:09.847000
|
||||
CVE-2024-56350,0,0,7b1812d59665b11db258f739125b115bbd155cd393574b71b353cb44b75e793d,2024-12-20T15:15:08.513000
|
||||
CVE-2024-56351,0,0,155dac26658e047b267d56461d036ea027f9b3814fe902c765b71e10add7ea74,2024-12-20T15:15:08.720000
|
||||
CVE-2024-56352,0,0,ca4f1b58a65d31e84d3749d8cf8b089736d75cab42a699b3d1eb93935d436c05,2024-12-20T15:15:08.970000
|
||||
CVE-2024-56353,0,0,ae4bf97a5e1ee216e5415c2193a6048425b28543177ec16a6fe8cfcd94c082af,2024-12-20T15:15:09.183000
|
||||
CVE-2024-56354,0,0,61538a6f4130866818f35928ce5defeadc2b6e7d958e8e8cab12bd8ba0484ab0,2024-12-20T15:15:09.400000
|
||||
CVE-2024-56355,0,0,21efaad8f1c58d999a4416cf6d326431dedd314af26993c0e70693f39d0a6552,2024-12-20T15:15:09.630000
|
||||
CVE-2024-56356,0,0,0311ad340d8557b44a140f6e660b54052200e785ccacf5ea6656b7d035c17abc,2024-12-20T15:15:09.847000
|
||||
CVE-2024-5636,0,0,be674ee7db367fbb27ae45f825fa3b6cac855c767643bde3f8b1378da8ddb51a,2024-11-21T09:48:03.883000
|
||||
CVE-2024-5637,0,0,a5e32b0dfdcc3b00fa1c534a6efa8caef39b80f083f1c956c246ad8a83c6df00,2024-11-21T09:48:04.030000
|
||||
CVE-2024-5638,0,0,4a64496852c4ee147220588b5d1940917ce749a1b3dd56d16a77a8cf3ed54b84,2024-11-21T09:48:04.153000
|
||||
@ -272302,7 +272303,7 @@ CVE-2024-7335,0,0,6efef3e91e3c352c21a4a20104c1849917c99aa0cb8c29a317c82bf80219ce
|
||||
CVE-2024-7336,0,0,72fe049a9c4a42327f24842fd4a4696aeed616b51612841f704f8cb6d51709cc,2024-08-09T14:38:01.050000
|
||||
CVE-2024-7337,0,0,2cd8270b417854f033216917f41d138f4d99c785eb4b08e1968382f45f87c011,2024-08-09T14:15:19.283000
|
||||
CVE-2024-7338,0,0,8a7fe0b32a7363bf332020943a56b4fd58e7fadb61846e600b7d3232ab649d6e,2024-08-09T14:51:45.677000
|
||||
CVE-2024-7339,0,0,8854018e2511471ed50cf61fcd659bbf523f553173576f19bd620025a67a8900,2024-08-23T16:53:31.643000
|
||||
CVE-2024-7339,0,1,237e183fe2ab6169b5254e999c16693fd3f1e5326834530750ba0a0993957986,2024-12-20T17:37:05.217000
|
||||
CVE-2024-7340,0,0,afceb6b3fac1138f8cb83e0f415cec5ebdcab90ac887ac6cc7416d04596c3384,2024-11-25T13:15:08.107000
|
||||
CVE-2024-7341,0,0,9879605967e8521e630e3508fca649ab0616466777cf91cc4c4478c8d606e537,2024-10-04T12:48:43.523000
|
||||
CVE-2024-7342,0,0,bbab372366d62b7492fd885c0fd46da4598051b512f5991327f8cfce46915879,2024-08-15T18:40:22.537000
|
||||
@ -272646,7 +272647,7 @@ CVE-2024-7722,0,0,1be42e9fa865f14842632e753ce2fd5525bfe496ac913b8198c3458ae138ff
|
||||
CVE-2024-7723,0,0,53ce768e0253fabfcdcbee8bbee79e38aca674fab610c16e178e185de0bd0f10,2024-10-18T15:45:47.643000
|
||||
CVE-2024-7724,0,0,ab2131ce24737b6ffb1c65566389459a8a15a8bc524a621ec3a84a692ed10d3f,2024-10-18T15:45:35.440000
|
||||
CVE-2024-7725,0,0,146b8c15ef088fe775e30ab61f308dfc209693724a7604dc64296c7f791074f5,2024-10-18T15:45:29.083000
|
||||
CVE-2024-7726,0,1,74ee1598c997bc48280475811f61395f508d9d73ccce708888a3fe6630a6e839,2024-12-20T16:15:24.403000
|
||||
CVE-2024-7726,0,0,74ee1598c997bc48280475811f61395f508d9d73ccce708888a3fe6630a6e839,2024-12-20T16:15:24.403000
|
||||
CVE-2024-7727,0,0,552f222c31326559d81397831be64909c21cf9eddea22427bcac75d9d64f596e,2024-09-18T18:07:55.450000
|
||||
CVE-2024-7728,0,0,db37ae32cb8fbaca95eaf3a5d1c8bd7414f6cbc0b1d146de5c8b8ffc1f589031,2024-08-14T13:00:37.107000
|
||||
CVE-2024-7729,0,0,3216985110d2bf3d58df21572b65b285ec97282c2bbccb9ffa801e1ebdc5c925,2024-08-14T13:00:37.107000
|
||||
@ -273529,10 +273530,10 @@ CVE-2024-8801,0,0,1e0aae29be9c0cb744c09fcf6b871e68e47c8e0119f25e788bcd23b055cde1
|
||||
CVE-2024-8802,0,0,519ccb5eaf9bc8f3d38918f4150aeae97a2c25ee8bbd45cda3cfef957efbe87a,2024-10-08T21:49:10.173000
|
||||
CVE-2024-8803,0,0,545e61fa61f0ce131642be6837336dfca74425fdd247a1c1bbc9c5682d94d2b1,2024-10-02T17:15:12.677000
|
||||
CVE-2024-8804,0,0,522f84c5f3d62fdb46aab7f45c91feee68128f2626214a0b2e00b68dfdfedbeb,2024-10-10T20:56:49.403000
|
||||
CVE-2024-8805,0,0,1b664a3c9c360dd3541ca17d0fcce8885e89d2f9c8577a041bbe012514c911f4,2024-11-22T21:15:18.660000
|
||||
CVE-2024-8806,0,0,bb65f0da9d3937ae21d515d57a2bf2dad6def2829efe52b6ce8ac49e13431770,2024-11-22T21:15:18.770000
|
||||
CVE-2024-8807,0,0,b964b80d57fb5b155e00f943c40878048b4b4f70fd7e34f634fbc7d8697a2335,2024-11-22T21:15:18.880000
|
||||
CVE-2024-8808,0,0,a3340507b2641d51a561cf119c1180b58d18782c90de62ffea3cc877e5afd060,2024-11-22T21:15:18.993000
|
||||
CVE-2024-8805,0,1,dcb9955ad68abfddebfd4e5bbca8162f29f9659b32eab2eee4abd640abddb92c,2024-12-20T18:05:47.173000
|
||||
CVE-2024-8806,0,1,4b9ed01ad6f672a2c6917fa3d7270b3791ade8f8d7c799fd1977d8d49125e25d,2024-12-20T17:56:56.057000
|
||||
CVE-2024-8807,0,1,a3194d6f7254173351134c6667ba0ab69ff4954825d1b3258d592d08d98a976b,2024-12-20T17:56:46.357000
|
||||
CVE-2024-8808,0,1,97dc891df3d9a3e3e84cc6d2301fb4dbe91fc0ade39658278ca48e61412ce9b9,2024-12-20T17:46:19.670000
|
||||
CVE-2024-8809,0,0,df2af4ed972c3756a9ce5829b125387cf06c9bd85112caf7f226db4fce399e8f,2024-11-22T21:15:19.110000
|
||||
CVE-2024-8810,0,0,4054bd11d0a58049adbca132e9cb8f89aa5e0709e583c7f8d6f2e3c10841c942,2024-11-08T19:01:03.880000
|
||||
CVE-2024-8811,0,0,418d39ac888dbd68c2a13d5c78c52a880b2f463323c747a1361b39471602e241,2024-11-22T21:15:19.220000
|
||||
@ -273671,7 +273672,7 @@ CVE-2024-8963,0,0,581521bb2c8b1b5f22bc02521a37b1605cb082ee4bc9fbe4e287e83cb93654
|
||||
CVE-2024-8964,0,0,c3c0787fe6644e5ecb28ab585ed80f03eded601812c8114e1e7b6807baaa0335,2024-10-10T12:56:30.817000
|
||||
CVE-2024-8965,0,0,f8e90b5b67b70a8381e6e9eacdc79df30f60298bdd1400482e72c97cbc06eff9,2024-10-04T19:04:03.157000
|
||||
CVE-2024-8967,0,0,7898714718fda7e623053515c819c9ef828b8e1f849f0008b801f032918cd46a,2024-10-08T18:47:12.110000
|
||||
CVE-2024-8968,0,0,c7a16d386151e00dcac012f34369d8416279fb51787e8aeab959c965eeccc8e5,2024-12-20T06:15:23.110000
|
||||
CVE-2024-8968,0,1,0a7f9362d7e255d4c1311c1efcc8d15f2865f5f917558bd1ff65379f6a9f7791,2024-12-20T17:15:21.800000
|
||||
CVE-2024-8969,0,0,e0103db8ff55ccbf745d9bad3dc6e3e89e30b3ef3eab823189cb0a38ab304109,2024-09-20T12:30:51.220000
|
||||
CVE-2024-8970,0,0,32d2ab1ad1bb8df91d143f8ca284d1a616bc1563b70e0f2f9520d488fbae118b,2024-12-13T01:20:14.813000
|
||||
CVE-2024-8972,0,0,8803923f1a932fca7afceec67344751a4aa4dcbfcccd96d5452861e7faadd73d,2024-12-17T14:15:20.110000
|
||||
@ -274056,7 +274057,7 @@ CVE-2024-9470,0,0,de8cca0bb7ecf5d73abf3ec8e7b79c63cfe78584b08d2a23419e01da944fb1
|
||||
CVE-2024-9471,0,0,ee64edae62595652f9e031febeb106a9fef6ec8a4689e59ac10dd4c0ff3f66e2,2024-10-15T16:55:45.090000
|
||||
CVE-2024-9472,0,0,c51f71a634d16101c114efc02d664c96ad53e9b116baeb90934dcb6dd53dd3d1,2024-11-15T13:58:08.913000
|
||||
CVE-2024-9473,0,0,f6c9a898171a9d9c49db03ffaa7b31e8eb0b14f099d64d8ee3734d2400d39156,2024-11-21T09:54:26.150000
|
||||
CVE-2024-9474,0,1,1d31eb3d081616c7758209c9a8d15ae6b9664d71a1b6a74a48b1d5ad5547d62e,2024-12-20T16:49:55.993000
|
||||
CVE-2024-9474,0,0,1d31eb3d081616c7758209c9a8d15ae6b9664d71a1b6a74a48b1d5ad5547d62e,2024-12-20T16:49:55.993000
|
||||
CVE-2024-9475,0,0,549f03349a4c2962b2a1e78fa0de4a2bf552d6361ecca4c48badd4c65e80d21d,2024-10-28T13:58:09.230000
|
||||
CVE-2024-9476,0,0,9a4bfa275479230ca0990279f5d3aa6d6ef96696231e23741760bea23fb13726,2024-11-21T17:15:28
|
||||
CVE-2024-9477,0,0,cedb77cc76ea529b92650dd6e41d358747c6c58bf375896899351c8fde982982,2024-11-15T22:54:21.233000
|
||||
@ -274216,7 +274217,7 @@ CVE-2024-9683,0,0,e0cd26df0500a0cc9db7c9689d39531f945e069407d58ce00900c54b93d56e
|
||||
CVE-2024-9685,0,0,cc3d7e9b75de00d1df5b699f1225e3406f130ded3472b38175cabcbf3eacf7fe,2024-10-15T14:30:00.483000
|
||||
CVE-2024-9686,0,0,1eb5e9681f976db1ddb26c27583f7f31c774b0e8d030243eb6a1a3ae9e4e826e,2024-11-06T16:19:04.333000
|
||||
CVE-2024-9687,0,0,70a9bb470b4d3f8dcd4b2d1d45e9a9c3021b1c31156ba9f4250d50e915b4527e,2024-10-17T21:11:14.197000
|
||||
CVE-2024-9689,0,0,eb87b30eceb7d26aeaa908ddada87c691821397ec06ff7ba148ffaab7271bc31,2024-11-07T20:35:16.807000
|
||||
CVE-2024-9689,0,1,c2f301aff56dc675215855fe0f01b6009756e74ad68004e6c120b70b465093eb,2024-12-20T18:59:47.850000
|
||||
CVE-2024-9692,0,0,c09412d3ade796bbe36fcbdc283e7a2ecfb61423341d9a573b10de9b4af8a991,2024-10-25T12:56:07.750000
|
||||
CVE-2024-9693,0,0,96c2aa2e3e432eefa572dcd34b83d0c8393d8a6c0331136462b7a8bf8e88cb01,2024-11-26T01:57:19.427000
|
||||
CVE-2024-9694,0,0,300f71d40bb815a23c3a0bc83a96e03beb3f23d9fc0b94128148bd02f8e753bb,2024-12-03T03:15:05.123000
|
||||
|
Can't render this file because it is too large.
|
Loading…
x
Reference in New Issue
Block a user