mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-05-08 19:47:09 +00:00
Auto-Update: 2024-11-19T17:00:28.336990+00:00
This commit is contained in:
parent
65ea59b623
commit
f92f7f9d20
@ -2,8 +2,8 @@
|
|||||||
"id": "CVE-2016-7514",
|
"id": "CVE-2016-7514",
|
||||||
"sourceIdentifier": "security@debian.org",
|
"sourceIdentifier": "security@debian.org",
|
||||||
"published": "2017-04-20T18:59:00.873",
|
"published": "2017-04-20T18:59:00.873",
|
||||||
"lastModified": "2017-05-09T12:40:05.697",
|
"lastModified": "2024-11-19T15:51:22.097",
|
||||||
"vulnStatus": "Undergoing Analysis",
|
"vulnStatus": "Analyzed",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
@ -16,13 +16,13 @@
|
|||||||
}
|
}
|
||||||
],
|
],
|
||||||
"metrics": {
|
"metrics": {
|
||||||
"cvssMetricV30": [
|
"cvssMetricV31": [
|
||||||
{
|
{
|
||||||
"source": "nvd@nist.gov",
|
"source": "nvd@nist.gov",
|
||||||
"type": "Primary",
|
"type": "Primary",
|
||||||
"cvssData": {
|
"cvssData": {
|
||||||
"version": "3.0",
|
"version": "3.1",
|
||||||
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
|
||||||
"attackVector": "NETWORK",
|
"attackVector": "NETWORK",
|
||||||
"attackComplexity": "LOW",
|
"attackComplexity": "LOW",
|
||||||
"privilegesRequired": "NONE",
|
"privilegesRequired": "NONE",
|
||||||
@ -85,8 +85,9 @@
|
|||||||
"cpeMatch": [
|
"cpeMatch": [
|
||||||
{
|
{
|
||||||
"vulnerable": true,
|
"vulnerable": true,
|
||||||
"criteria": "cpe:2.3:a:imagemagick:imagemagick:-:*:*:*:*:*:*:*",
|
"criteria": "cpe:2.3:a:imagemagick:imagemagick:*:*:*:*:*:*:*:*",
|
||||||
"matchCriteriaId": "6E6BE7A5-6FF7-4916-B671-9EE11CA54F65"
|
"versionEndExcluding": "7.0.1-0",
|
||||||
|
"matchCriteriaId": "3CF7D553-5B42-467A-A21D-B3AE0E97DDE8"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -2,7 +2,7 @@
|
|||||||
"id": "CVE-2017-13312",
|
"id": "CVE-2017-13312",
|
||||||
"sourceIdentifier": "security@android.com",
|
"sourceIdentifier": "security@android.com",
|
||||||
"published": "2024-11-15T22:15:14.300",
|
"published": "2024-11-15T22:15:14.300",
|
||||||
"lastModified": "2024-11-18T17:11:56.587",
|
"lastModified": "2024-11-19T16:35:02.293",
|
||||||
"vulnStatus": "Awaiting Analysis",
|
"vulnStatus": "Awaiting Analysis",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
@ -15,7 +15,42 @@
|
|||||||
"value": "En createFromParcel de MediaCas.java, existe una posible discrepancia entre la lectura y la escritura de paquetes debido a una validaci\u00f3n de entrada incorrecta. Esto podr\u00eda provocar una escalada local de privilegios, donde una aplicaci\u00f3n puede iniciar una actividad con privilegios del sistema sin necesidad de privilegios de ejecuci\u00f3n adicionales. No se necesita la interacci\u00f3n del usuario para la explotaci\u00f3n."
|
"value": "En createFromParcel de MediaCas.java, existe una posible discrepancia entre la lectura y la escritura de paquetes debido a una validaci\u00f3n de entrada incorrecta. Esto podr\u00eda provocar una escalada local de privilegios, donde una aplicaci\u00f3n puede iniciar una actividad con privilegios del sistema sin necesidad de privilegios de ejecuci\u00f3n adicionales. No se necesita la interacci\u00f3n del usuario para la explotaci\u00f3n."
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"metrics": {},
|
"metrics": {
|
||||||
|
"cvssMetricV31": [
|
||||||
|
{
|
||||||
|
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||||
|
"type": "Secondary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||||
|
"attackVector": "LOCAL",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "LOW",
|
||||||
|
"userInteraction": "NONE",
|
||||||
|
"scope": "UNCHANGED",
|
||||||
|
"confidentialityImpact": "HIGH",
|
||||||
|
"integrityImpact": "HIGH",
|
||||||
|
"availabilityImpact": "HIGH",
|
||||||
|
"baseScore": 7.8,
|
||||||
|
"baseSeverity": "HIGH"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 1.8,
|
||||||
|
"impactScore": 5.9
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"weaknesses": [
|
||||||
|
{
|
||||||
|
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||||
|
"type": "Secondary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-276"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
"references": [
|
"references": [
|
||||||
{
|
{
|
||||||
"url": "https://source.android.com/security/bulletin/2018-05-01",
|
"url": "https://source.android.com/security/bulletin/2018-05-01",
|
||||||
|
@ -2,7 +2,7 @@
|
|||||||
"id": "CVE-2017-13313",
|
"id": "CVE-2017-13313",
|
||||||
"sourceIdentifier": "security@android.com",
|
"sourceIdentifier": "security@android.com",
|
||||||
"published": "2024-11-15T22:15:14.373",
|
"published": "2024-11-15T22:15:14.373",
|
||||||
"lastModified": "2024-11-18T17:11:56.587",
|
"lastModified": "2024-11-19T16:35:03.173",
|
||||||
"vulnStatus": "Awaiting Analysis",
|
"vulnStatus": "Awaiting Analysis",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
@ -15,7 +15,42 @@
|
|||||||
"value": "En ElementaryStreamQueue::dequeueAccessUnitMPEG4Video de ESQueue.cpp, existe un posible bucle infinito que conduce al agotamiento de los recursos debido a una comprobaci\u00f3n incorrecta de los l\u00edmites. Esto podr\u00eda provocar una denegaci\u00f3n de servicio remota sin necesidad de privilegios de ejecuci\u00f3n adicionales. Se necesita la interacci\u00f3n del usuario para la explotaci\u00f3n."
|
"value": "En ElementaryStreamQueue::dequeueAccessUnitMPEG4Video de ESQueue.cpp, existe un posible bucle infinito que conduce al agotamiento de los recursos debido a una comprobaci\u00f3n incorrecta de los l\u00edmites. Esto podr\u00eda provocar una denegaci\u00f3n de servicio remota sin necesidad de privilegios de ejecuci\u00f3n adicionales. Se necesita la interacci\u00f3n del usuario para la explotaci\u00f3n."
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"metrics": {},
|
"metrics": {
|
||||||
|
"cvssMetricV31": [
|
||||||
|
{
|
||||||
|
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||||
|
"type": "Secondary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
|
||||||
|
"attackVector": "NETWORK",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "NONE",
|
||||||
|
"userInteraction": "NONE",
|
||||||
|
"scope": "UNCHANGED",
|
||||||
|
"confidentialityImpact": "NONE",
|
||||||
|
"integrityImpact": "NONE",
|
||||||
|
"availabilityImpact": "HIGH",
|
||||||
|
"baseScore": 7.5,
|
||||||
|
"baseSeverity": "HIGH"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 3.9,
|
||||||
|
"impactScore": 3.6
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"weaknesses": [
|
||||||
|
{
|
||||||
|
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||||
|
"type": "Secondary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-787"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
"references": [
|
"references": [
|
||||||
{
|
{
|
||||||
"url": "https://source.android.com/security/bulletin/2018-05-01",
|
"url": "https://source.android.com/security/bulletin/2018-05-01",
|
||||||
|
@ -2,7 +2,7 @@
|
|||||||
"id": "CVE-2017-13314",
|
"id": "CVE-2017-13314",
|
||||||
"sourceIdentifier": "security@android.com",
|
"sourceIdentifier": "security@android.com",
|
||||||
"published": "2024-11-15T22:15:14.440",
|
"published": "2024-11-15T22:15:14.440",
|
||||||
"lastModified": "2024-11-18T17:11:56.587",
|
"lastModified": "2024-11-19T16:35:03.990",
|
||||||
"vulnStatus": "Awaiting Analysis",
|
"vulnStatus": "Awaiting Analysis",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
@ -15,7 +15,42 @@
|
|||||||
"value": "En setAllowOnlyVpnForUids de NetworkManagementService.java, existe una posible omisi\u00f3n de la configuraci\u00f3n de seguridad debido a la falta de una verificaci\u00f3n de permisos. Esto podr\u00eda provocar una escalada local de privilegios que permita a los usuarios acceder a redes que no sean VPN, cuando se supone que deben estar restringidos a las redes VPN, sin necesidad de privilegios de ejecuci\u00f3n adicionales. No se necesita la interacci\u00f3n del usuario para la explotaci\u00f3n."
|
"value": "En setAllowOnlyVpnForUids de NetworkManagementService.java, existe una posible omisi\u00f3n de la configuraci\u00f3n de seguridad debido a la falta de una verificaci\u00f3n de permisos. Esto podr\u00eda provocar una escalada local de privilegios que permita a los usuarios acceder a redes que no sean VPN, cuando se supone que deben estar restringidos a las redes VPN, sin necesidad de privilegios de ejecuci\u00f3n adicionales. No se necesita la interacci\u00f3n del usuario para la explotaci\u00f3n."
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"metrics": {},
|
"metrics": {
|
||||||
|
"cvssMetricV31": [
|
||||||
|
{
|
||||||
|
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||||
|
"type": "Secondary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||||
|
"attackVector": "LOCAL",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "LOW",
|
||||||
|
"userInteraction": "NONE",
|
||||||
|
"scope": "UNCHANGED",
|
||||||
|
"confidentialityImpact": "HIGH",
|
||||||
|
"integrityImpact": "HIGH",
|
||||||
|
"availabilityImpact": "HIGH",
|
||||||
|
"baseScore": 7.8,
|
||||||
|
"baseSeverity": "HIGH"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 1.8,
|
||||||
|
"impactScore": 5.9
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"weaknesses": [
|
||||||
|
{
|
||||||
|
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||||
|
"type": "Secondary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-276"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
"references": [
|
"references": [
|
||||||
{
|
{
|
||||||
"url": "https://source.android.com/security/bulletin/2018-05-01",
|
"url": "https://source.android.com/security/bulletin/2018-05-01",
|
||||||
|
@ -2,13 +2,13 @@
|
|||||||
"id": "CVE-2020-11001",
|
"id": "CVE-2020-11001",
|
||||||
"sourceIdentifier": "security-advisories@github.com",
|
"sourceIdentifier": "security-advisories@github.com",
|
||||||
"published": "2020-04-14T23:15:11.917",
|
"published": "2020-04-14T23:15:11.917",
|
||||||
"lastModified": "2020-04-15T19:15:41.207",
|
"lastModified": "2024-11-19T16:15:18.007",
|
||||||
"vulnStatus": "Analyzed",
|
"vulnStatus": "Modified",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
"lang": "en",
|
"lang": "en",
|
||||||
"value": "In Wagtail before versions 2.8.1 and 2.7.2, a cross-site scripting (XSS) vulnerability exists on the page revision comparison view within the Wagtail admin interface. A user with a limited-permission editor account for the Wagtail admin could potentially craft a page revision history that, when viewed by a user with higher privileges, could perform actions with that user's credentials. The vulnerability is not exploitable by an ordinary site visitor without access to the Wagtail admin. Patched versions have been released as Wagtail 2.7.2 (for the LTS 2.7 branch) and Wagtail 2.8.1 (for the current 2.8 branch)."
|
"value": "In Wagtail before versions 2.8.1 and 2.7.2, a cross-site scripting (XSS) vulnerability exists on the page revision\ncomparison view within the Wagtail admin interface. A user with a limited-permission editor account for the Wagtail\nadmin could potentially craft a page revision history that, when viewed by a user with higher privileges, could perform\nactions with that user's credentials. The vulnerability is not exploitable by an ordinary site visitor without access to\nthe Wagtail admin.\n\nPatched versions have been released as Wagtail 2.7.2 (for the LTS 2.7 branch) and Wagtail 2.8.1 (for the current 2.8 branch)."
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"lang": "es",
|
"lang": "es",
|
||||||
@ -86,22 +86,26 @@
|
|||||||
},
|
},
|
||||||
"weaknesses": [
|
"weaknesses": [
|
||||||
{
|
{
|
||||||
"source": "nvd@nist.gov",
|
"source": "security-advisories@github.com",
|
||||||
"type": "Primary",
|
"type": "Primary",
|
||||||
"description": [
|
"description": [
|
||||||
{
|
{
|
||||||
"lang": "en",
|
"lang": "en",
|
||||||
"value": "CWE-79"
|
"value": "CWE-79"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-80"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"source": "security-advisories@github.com",
|
"source": "nvd@nist.gov",
|
||||||
"type": "Secondary",
|
"type": "Secondary",
|
||||||
"description": [
|
"description": [
|
||||||
{
|
{
|
||||||
"lang": "en",
|
"lang": "en",
|
||||||
"value": "CWE-80"
|
"value": "CWE-79"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
@ -131,22 +135,6 @@
|
|||||||
}
|
}
|
||||||
],
|
],
|
||||||
"references": [
|
"references": [
|
||||||
{
|
|
||||||
"url": "https://github.com/wagtail/wagtail/commit/61045ceefea114c40ac4b680af58990dbe732389",
|
|
||||||
"source": "security-advisories@github.com",
|
|
||||||
"tags": [
|
|
||||||
"Patch",
|
|
||||||
"Third Party Advisory"
|
|
||||||
]
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"url": "https://github.com/wagtail/wagtail/releases/tag/v2.8.1",
|
|
||||||
"source": "security-advisories@github.com",
|
|
||||||
"tags": [
|
|
||||||
"Release Notes",
|
|
||||||
"Third Party Advisory"
|
|
||||||
]
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"url": "https://github.com/wagtail/wagtail/security/advisories/GHSA-v2wc-pfq2-5cm6",
|
"url": "https://github.com/wagtail/wagtail/security/advisories/GHSA-v2wc-pfq2-5cm6",
|
||||||
"source": "security-advisories@github.com",
|
"source": "security-advisories@github.com",
|
||||||
|
@ -2,13 +2,13 @@
|
|||||||
"id": "CVE-2020-11037",
|
"id": "CVE-2020-11037",
|
||||||
"sourceIdentifier": "security-advisories@github.com",
|
"sourceIdentifier": "security-advisories@github.com",
|
||||||
"published": "2020-04-30T23:15:11.887",
|
"published": "2020-04-30T23:15:11.887",
|
||||||
"lastModified": "2020-05-08T15:57:02.020",
|
"lastModified": "2024-11-19T16:15:18.243",
|
||||||
"vulnStatus": "Analyzed",
|
"vulnStatus": "Modified",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
"lang": "en",
|
"lang": "en",
|
||||||
"value": "In Wagtail before versions 2.7.2 and 2.8.2, a potential timing attack exists on pages or documents that have been protected with a shared password through Wagtail's \"Privacy\" controls. This password check is performed through a character-by-character string comparison, and so an attacker who is able to measure the time taken by this check to a high degree of accuracy could potentially use timing differences to gain knowledge of the password. This is understood to be feasible on a local network, but not on the public internet. Privacy settings that restrict access to pages/documents on a per-user or per-group basis (as opposed to a shared password) are unaffected by this vulnerability. This has been patched in 2.7.3, 2.8.2, 2.9."
|
"value": "In Wagtail before versions 2.7.3 and 2.8.2, a potential timing attack exists on pages or documents that have been protected with a shared password through Wagtail's \"Privacy\" controls. This password check is performed through a character-by-character string comparison, and so an attacker who is able to measure the time taken by this check to a high degree of accuracy could potentially use timing differences to gain knowledge of the password. This is [understood to be feasible on a local network, but not on the public internet](https://groups.google.com/d/msg/django-developers/iAaq0pvHXuA/fpUuwjK3i2wJ).\n\nPrivacy settings that restrict access to pages/documents on a per-user or per-group basis (as opposed to a shared password) are unaffected by this vulnerability.\n\nThis has been patched in 2.7.3, 2.8.2, 2.9."
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"lang": "es",
|
"lang": "es",
|
||||||
@ -133,6 +133,22 @@
|
|||||||
}
|
}
|
||||||
],
|
],
|
||||||
"references": [
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://github.com/wagtail/wagtail/commit/3c030490ed575bb9cd01dfb3a890477dcaeb2edf",
|
||||||
|
"source": "security-advisories@github.com"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://github.com/wagtail/wagtail/commit/b76ab57ee859732b9cf9287d380493ab24061090",
|
||||||
|
"source": "security-advisories@github.com"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://github.com/wagtail/wagtail/commit/ba9d424bd1ca5ce1910d3de74f5cc07214fbfb11",
|
||||||
|
"source": "security-advisories@github.com"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://github.com/wagtail/wagtail/commit/bac3cd0a26b023e595cf2959aae7da15bb5e4340",
|
||||||
|
"source": "security-advisories@github.com"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"url": "https://github.com/wagtail/wagtail/security/advisories/GHSA-jjjr-3jcw-f8v6",
|
"url": "https://github.com/wagtail/wagtail/security/advisories/GHSA-jjjr-3jcw-f8v6",
|
||||||
"source": "security-advisories@github.com",
|
"source": "security-advisories@github.com",
|
||||||
|
@ -2,8 +2,8 @@
|
|||||||
"id": "CVE-2021-3987",
|
"id": "CVE-2021-3987",
|
||||||
"sourceIdentifier": "security@huntr.dev",
|
"sourceIdentifier": "security@huntr.dev",
|
||||||
"published": "2024-11-15T11:15:06.610",
|
"published": "2024-11-15T11:15:06.610",
|
||||||
"lastModified": "2024-11-15T13:58:08.913",
|
"lastModified": "2024-11-19T15:44:38.113",
|
||||||
"vulnStatus": "Undergoing Analysis",
|
"vulnStatus": "Analyzed",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
@ -16,6 +16,28 @@
|
|||||||
}
|
}
|
||||||
],
|
],
|
||||||
"metrics": {
|
"metrics": {
|
||||||
|
"cvssMetricV31": [
|
||||||
|
{
|
||||||
|
"source": "nvd@nist.gov",
|
||||||
|
"type": "Primary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N",
|
||||||
|
"attackVector": "NETWORK",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "LOW",
|
||||||
|
"userInteraction": "NONE",
|
||||||
|
"scope": "UNCHANGED",
|
||||||
|
"confidentialityImpact": "NONE",
|
||||||
|
"integrityImpact": "LOW",
|
||||||
|
"availabilityImpact": "NONE",
|
||||||
|
"baseScore": 4.3,
|
||||||
|
"baseSeverity": "MEDIUM"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 2.8,
|
||||||
|
"impactScore": 1.4
|
||||||
|
}
|
||||||
|
],
|
||||||
"cvssMetricV30": [
|
"cvssMetricV30": [
|
||||||
{
|
{
|
||||||
"source": "security@huntr.dev",
|
"source": "security@huntr.dev",
|
||||||
@ -41,8 +63,18 @@
|
|||||||
},
|
},
|
||||||
"weaknesses": [
|
"weaknesses": [
|
||||||
{
|
{
|
||||||
"source": "security@huntr.dev",
|
"source": "nvd@nist.gov",
|
||||||
"type": "Primary",
|
"type": "Primary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-862"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"source": "security@huntr.dev",
|
||||||
|
"type": "Secondary",
|
||||||
"description": [
|
"description": [
|
||||||
{
|
{
|
||||||
"lang": "en",
|
"lang": "en",
|
||||||
@ -51,14 +83,38 @@
|
|||||||
]
|
]
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"references": [
|
"configurations": [
|
||||||
{
|
{
|
||||||
"url": "https://github.com/janeczku/calibre-web/commit/bcdc97641447965af486964537f3821f47b28874",
|
"nodes": [
|
||||||
"source": "security@huntr.dev"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"url": "https://huntr.com/bounties/29fcc091-87b6-43bc-ab4b-3c0bec3f71df",
|
"operator": "OR",
|
||||||
"source": "security@huntr.dev"
|
"negate": false,
|
||||||
|
"cpeMatch": [
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:a:janeczku:calibre-web:*:*:*:*:*:*:*:*",
|
||||||
|
"versionEndExcluding": "0.6.15",
|
||||||
|
"matchCriteriaId": "CB86DF8E-5F67-41CA-B657-D8E0A61CD22A"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://github.com/janeczku/calibre-web/commit/bcdc97641447965af486964537f3821f47b28874",
|
||||||
|
"source": "security@huntr.dev",
|
||||||
|
"tags": [
|
||||||
|
"Patch"
|
||||||
|
]
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://huntr.com/bounties/29fcc091-87b6-43bc-ab4b-3c0bec3f71df",
|
||||||
|
"source": "security@huntr.dev",
|
||||||
|
"tags": [
|
||||||
|
"Exploit"
|
||||||
|
]
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
@ -2,8 +2,8 @@
|
|||||||
"id": "CVE-2021-3988",
|
"id": "CVE-2021-3988",
|
||||||
"sourceIdentifier": "security@huntr.dev",
|
"sourceIdentifier": "security@huntr.dev",
|
||||||
"published": "2024-11-15T11:15:06.877",
|
"published": "2024-11-15T11:15:06.877",
|
||||||
"lastModified": "2024-11-15T13:58:08.913",
|
"lastModified": "2024-11-19T15:43:01.723",
|
||||||
"vulnStatus": "Undergoing Analysis",
|
"vulnStatus": "Analyzed",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
@ -16,6 +16,28 @@
|
|||||||
}
|
}
|
||||||
],
|
],
|
||||||
"metrics": {
|
"metrics": {
|
||||||
|
"cvssMetricV31": [
|
||||||
|
{
|
||||||
|
"source": "nvd@nist.gov",
|
||||||
|
"type": "Primary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
|
||||||
|
"attackVector": "NETWORK",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "NONE",
|
||||||
|
"userInteraction": "REQUIRED",
|
||||||
|
"scope": "CHANGED",
|
||||||
|
"confidentialityImpact": "LOW",
|
||||||
|
"integrityImpact": "LOW",
|
||||||
|
"availabilityImpact": "NONE",
|
||||||
|
"baseScore": 6.1,
|
||||||
|
"baseSeverity": "MEDIUM"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 2.8,
|
||||||
|
"impactScore": 2.7
|
||||||
|
}
|
||||||
|
],
|
||||||
"cvssMetricV30": [
|
"cvssMetricV30": [
|
||||||
{
|
{
|
||||||
"source": "security@huntr.dev",
|
"source": "security@huntr.dev",
|
||||||
@ -51,14 +73,38 @@
|
|||||||
]
|
]
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"references": [
|
"configurations": [
|
||||||
{
|
{
|
||||||
"url": "https://github.com/janeczku/calibre-web/commit/7ad419dc8c12180e842a82118f4866ac3d074bc5",
|
"nodes": [
|
||||||
"source": "security@huntr.dev"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"url": "https://huntr.com/bounties/fa4c8fd1-7846-4dad-9112-2c07461f0609",
|
"operator": "OR",
|
||||||
"source": "security@huntr.dev"
|
"negate": false,
|
||||||
|
"cpeMatch": [
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:a:janeczku:calibre-web:*:*:*:*:*:*:*:*",
|
||||||
|
"versionEndExcluding": "0.6.15",
|
||||||
|
"matchCriteriaId": "CB86DF8E-5F67-41CA-B657-D8E0A61CD22A"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://github.com/janeczku/calibre-web/commit/7ad419dc8c12180e842a82118f4866ac3d074bc5",
|
||||||
|
"source": "security@huntr.dev",
|
||||||
|
"tags": [
|
||||||
|
"Patch"
|
||||||
|
]
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://huntr.com/bounties/fa4c8fd1-7846-4dad-9112-2c07461f0609",
|
||||||
|
"source": "security@huntr.dev",
|
||||||
|
"tags": [
|
||||||
|
"Exploit"
|
||||||
|
]
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
@ -2,8 +2,8 @@
|
|||||||
"id": "CVE-2021-3991",
|
"id": "CVE-2021-3991",
|
||||||
"sourceIdentifier": "security@huntr.dev",
|
"sourceIdentifier": "security@huntr.dev",
|
||||||
"published": "2024-11-15T11:15:07.173",
|
"published": "2024-11-15T11:15:07.173",
|
||||||
"lastModified": "2024-11-15T13:58:08.913",
|
"lastModified": "2024-11-19T15:31:47.833",
|
||||||
"vulnStatus": "Undergoing Analysis",
|
"vulnStatus": "Analyzed",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
@ -16,6 +16,28 @@
|
|||||||
}
|
}
|
||||||
],
|
],
|
||||||
"metrics": {
|
"metrics": {
|
||||||
|
"cvssMetricV31": [
|
||||||
|
{
|
||||||
|
"source": "nvd@nist.gov",
|
||||||
|
"type": "Primary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N",
|
||||||
|
"attackVector": "NETWORK",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "NONE",
|
||||||
|
"userInteraction": "REQUIRED",
|
||||||
|
"scope": "UNCHANGED",
|
||||||
|
"confidentialityImpact": "LOW",
|
||||||
|
"integrityImpact": "NONE",
|
||||||
|
"availabilityImpact": "NONE",
|
||||||
|
"baseScore": 4.3,
|
||||||
|
"baseSeverity": "MEDIUM"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 2.8,
|
||||||
|
"impactScore": 1.4
|
||||||
|
}
|
||||||
|
],
|
||||||
"cvssMetricV30": [
|
"cvssMetricV30": [
|
||||||
{
|
{
|
||||||
"source": "security@huntr.dev",
|
"source": "security@huntr.dev",
|
||||||
@ -41,8 +63,18 @@
|
|||||||
},
|
},
|
||||||
"weaknesses": [
|
"weaknesses": [
|
||||||
{
|
{
|
||||||
"source": "security@huntr.dev",
|
"source": "nvd@nist.gov",
|
||||||
"type": "Primary",
|
"type": "Primary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-639"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"source": "security@huntr.dev",
|
||||||
|
"type": "Secondary",
|
||||||
"description": [
|
"description": [
|
||||||
{
|
{
|
||||||
"lang": "en",
|
"lang": "en",
|
||||||
@ -51,14 +83,38 @@
|
|||||||
]
|
]
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"references": [
|
"configurations": [
|
||||||
{
|
{
|
||||||
"url": "https://github.com/dolibarr/dolibarr/commit/63cd06394f39d60784d6e6a0ccf4867a71a6568f",
|
"nodes": [
|
||||||
"source": "security@huntr.dev"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"url": "https://huntr.com/bounties/58ddbd8a-0faf-4b3f-aec9-5850bb19ab67",
|
"operator": "OR",
|
||||||
"source": "security@huntr.dev"
|
"negate": false,
|
||||||
|
"cpeMatch": [
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:a:dolibarr:dolibarr_erp\\/crm:*:*:*:*:*:*:*:*",
|
||||||
|
"versionEndExcluding": "20.0.2",
|
||||||
|
"matchCriteriaId": "4AD52BB9-72D2-4369-9301-456090AC4CAA"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://github.com/dolibarr/dolibarr/commit/63cd06394f39d60784d6e6a0ccf4867a71a6568f",
|
||||||
|
"source": "security@huntr.dev",
|
||||||
|
"tags": [
|
||||||
|
"Patch"
|
||||||
|
]
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://huntr.com/bounties/58ddbd8a-0faf-4b3f-aec9-5850bb19ab67",
|
||||||
|
"source": "security@huntr.dev",
|
||||||
|
"tags": [
|
||||||
|
"Third Party Advisory"
|
||||||
|
]
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
@ -2,8 +2,8 @@
|
|||||||
"id": "CVE-2022-1226",
|
"id": "CVE-2022-1226",
|
||||||
"sourceIdentifier": "security@huntr.dev",
|
"sourceIdentifier": "security@huntr.dev",
|
||||||
"published": "2024-11-15T11:15:07.527",
|
"published": "2024-11-15T11:15:07.527",
|
||||||
"lastModified": "2024-11-15T13:58:08.913",
|
"lastModified": "2024-11-19T15:30:53.477",
|
||||||
"vulnStatus": "Undergoing Analysis",
|
"vulnStatus": "Analyzed",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
@ -16,6 +16,28 @@
|
|||||||
}
|
}
|
||||||
],
|
],
|
||||||
"metrics": {
|
"metrics": {
|
||||||
|
"cvssMetricV31": [
|
||||||
|
{
|
||||||
|
"source": "nvd@nist.gov",
|
||||||
|
"type": "Primary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N",
|
||||||
|
"attackVector": "NETWORK",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "HIGH",
|
||||||
|
"userInteraction": "REQUIRED",
|
||||||
|
"scope": "CHANGED",
|
||||||
|
"confidentialityImpact": "LOW",
|
||||||
|
"integrityImpact": "LOW",
|
||||||
|
"availabilityImpact": "NONE",
|
||||||
|
"baseScore": 4.8,
|
||||||
|
"baseSeverity": "MEDIUM"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 1.7,
|
||||||
|
"impactScore": 2.7
|
||||||
|
}
|
||||||
|
],
|
||||||
"cvssMetricV30": [
|
"cvssMetricV30": [
|
||||||
{
|
{
|
||||||
"source": "security@huntr.dev",
|
"source": "security@huntr.dev",
|
||||||
@ -51,14 +73,39 @@
|
|||||||
]
|
]
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"references": [
|
"configurations": [
|
||||||
{
|
{
|
||||||
"url": "https://github.com/phpipam/phpipam/commit/50e36b9e4fff5eaa51dc6e42bc684748da378002",
|
"nodes": [
|
||||||
"source": "security@huntr.dev"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"url": "https://huntr.com/bounties/3fdcf653-fe26-4592-94a1-98ce664618ec",
|
"operator": "OR",
|
||||||
"source": "security@huntr.dev"
|
"negate": false,
|
||||||
|
"cpeMatch": [
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:a:phpipam:phpipam:*:*:*:*:*:*:*:*",
|
||||||
|
"versionEndExcluding": "1.4.7",
|
||||||
|
"matchCriteriaId": "423B42AB-F118-4DFE-89ED-2480875972AE"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://github.com/phpipam/phpipam/commit/50e36b9e4fff5eaa51dc6e42bc684748da378002",
|
||||||
|
"source": "security@huntr.dev",
|
||||||
|
"tags": [
|
||||||
|
"Patch"
|
||||||
|
]
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://huntr.com/bounties/3fdcf653-fe26-4592-94a1-98ce664618ec",
|
||||||
|
"source": "security@huntr.dev",
|
||||||
|
"tags": [
|
||||||
|
"Exploit",
|
||||||
|
"Third Party Advisory"
|
||||||
|
]
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
@ -2,8 +2,8 @@
|
|||||||
"id": "CVE-2022-31667",
|
"id": "CVE-2022-31667",
|
||||||
"sourceIdentifier": "security@vmware.com",
|
"sourceIdentifier": "security@vmware.com",
|
||||||
"published": "2024-11-14T12:15:16.390",
|
"published": "2024-11-14T12:15:16.390",
|
||||||
"lastModified": "2024-11-15T13:58:08.913",
|
"lastModified": "2024-11-19T15:25:29.643",
|
||||||
"vulnStatus": "Undergoing Analysis",
|
"vulnStatus": "Analyzed",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
@ -17,6 +17,26 @@
|
|||||||
],
|
],
|
||||||
"metrics": {
|
"metrics": {
|
||||||
"cvssMetricV31": [
|
"cvssMetricV31": [
|
||||||
|
{
|
||||||
|
"source": "nvd@nist.gov",
|
||||||
|
"type": "Primary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:L/A:L",
|
||||||
|
"attackVector": "NETWORK",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "LOW",
|
||||||
|
"userInteraction": "NONE",
|
||||||
|
"scope": "CHANGED",
|
||||||
|
"confidentialityImpact": "NONE",
|
||||||
|
"integrityImpact": "LOW",
|
||||||
|
"availabilityImpact": "LOW",
|
||||||
|
"baseScore": 6.4,
|
||||||
|
"baseSeverity": "MEDIUM"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 3.1,
|
||||||
|
"impactScore": 2.7
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"source": "security@vmware.com",
|
"source": "security@vmware.com",
|
||||||
"type": "Secondary",
|
"type": "Secondary",
|
||||||
@ -40,6 +60,16 @@
|
|||||||
]
|
]
|
||||||
},
|
},
|
||||||
"weaknesses": [
|
"weaknesses": [
|
||||||
|
{
|
||||||
|
"source": "nvd@nist.gov",
|
||||||
|
"type": "Primary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-863"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"source": "security@vmware.com",
|
"source": "security@vmware.com",
|
||||||
"type": "Secondary",
|
"type": "Secondary",
|
||||||
@ -51,10 +81,39 @@
|
|||||||
]
|
]
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"references": [
|
"configurations": [
|
||||||
{
|
{
|
||||||
"url": "https://github.com/goharbor/harbor/security/advisories/GHSA-xx9w-464f-7h6f",
|
"nodes": [
|
||||||
"source": "security@vmware.com"
|
{
|
||||||
|
"operator": "OR",
|
||||||
|
"negate": false,
|
||||||
|
"cpeMatch": [
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:a:linuxfoundation:harbor:*:*:*:*:*:*:*:*",
|
||||||
|
"versionStartIncluding": "2.0.0",
|
||||||
|
"versionEndExcluding": "2.4.3",
|
||||||
|
"matchCriteriaId": "14BEA987-A012-4745-A79A-7BCF5E9CD567"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:a:linuxfoundation:harbor:*:*:*:*:*:*:*:*",
|
||||||
|
"versionStartIncluding": "2.5.0",
|
||||||
|
"versionEndExcluding": "2.5.2",
|
||||||
|
"matchCriteriaId": "1B643770-6018-4D81-B386-91011E437F0D"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://github.com/goharbor/harbor/security/advisories/GHSA-xx9w-464f-7h6f",
|
||||||
|
"source": "security@vmware.com",
|
||||||
|
"tags": [
|
||||||
|
"Vendor Advisory"
|
||||||
|
]
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
@ -2,8 +2,8 @@
|
|||||||
"id": "CVE-2022-31668",
|
"id": "CVE-2022-31668",
|
||||||
"sourceIdentifier": "security@vmware.com",
|
"sourceIdentifier": "security@vmware.com",
|
||||||
"published": "2024-11-14T12:15:16.607",
|
"published": "2024-11-14T12:15:16.607",
|
||||||
"lastModified": "2024-11-15T13:58:08.913",
|
"lastModified": "2024-11-19T15:25:25.797",
|
||||||
"vulnStatus": "Undergoing Analysis",
|
"vulnStatus": "Analyzed",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
@ -17,6 +17,26 @@
|
|||||||
],
|
],
|
||||||
"metrics": {
|
"metrics": {
|
||||||
"cvssMetricV31": [
|
"cvssMetricV31": [
|
||||||
|
{
|
||||||
|
"source": "nvd@nist.gov",
|
||||||
|
"type": "Primary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:H/A:N",
|
||||||
|
"attackVector": "NETWORK",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "LOW",
|
||||||
|
"userInteraction": "NONE",
|
||||||
|
"scope": "CHANGED",
|
||||||
|
"confidentialityImpact": "NONE",
|
||||||
|
"integrityImpact": "HIGH",
|
||||||
|
"availabilityImpact": "NONE",
|
||||||
|
"baseScore": 7.7,
|
||||||
|
"baseSeverity": "HIGH"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 3.1,
|
||||||
|
"impactScore": 4.0
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"source": "security@vmware.com",
|
"source": "security@vmware.com",
|
||||||
"type": "Secondary",
|
"type": "Secondary",
|
||||||
@ -40,6 +60,16 @@
|
|||||||
]
|
]
|
||||||
},
|
},
|
||||||
"weaknesses": [
|
"weaknesses": [
|
||||||
|
{
|
||||||
|
"source": "nvd@nist.gov",
|
||||||
|
"type": "Primary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-863"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"source": "security@vmware.com",
|
"source": "security@vmware.com",
|
||||||
"type": "Secondary",
|
"type": "Secondary",
|
||||||
@ -51,10 +81,39 @@
|
|||||||
]
|
]
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"references": [
|
"configurations": [
|
||||||
{
|
{
|
||||||
"url": "https://github.com/goharbor/harbor/security/advisories/GHSA-3wpx-625q-22j7",
|
"nodes": [
|
||||||
"source": "security@vmware.com"
|
{
|
||||||
|
"operator": "OR",
|
||||||
|
"negate": false,
|
||||||
|
"cpeMatch": [
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:a:linuxfoundation:harbor:*:*:*:*:*:*:*:*",
|
||||||
|
"versionStartIncluding": "2.0.0",
|
||||||
|
"versionEndExcluding": "2.4.3",
|
||||||
|
"matchCriteriaId": "14BEA987-A012-4745-A79A-7BCF5E9CD567"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:a:linuxfoundation:harbor:*:*:*:*:*:*:*:*",
|
||||||
|
"versionStartIncluding": "2.5.0",
|
||||||
|
"versionEndExcluding": "2.5.2",
|
||||||
|
"matchCriteriaId": "1B643770-6018-4D81-B386-91011E437F0D"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://github.com/goharbor/harbor/security/advisories/GHSA-3wpx-625q-22j7",
|
||||||
|
"source": "security@vmware.com",
|
||||||
|
"tags": [
|
||||||
|
"Vendor Advisory"
|
||||||
|
]
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
@ -2,8 +2,8 @@
|
|||||||
"id": "CVE-2022-31669",
|
"id": "CVE-2022-31669",
|
||||||
"sourceIdentifier": "security@vmware.com",
|
"sourceIdentifier": "security@vmware.com",
|
||||||
"published": "2024-11-14T12:15:16.817",
|
"published": "2024-11-14T12:15:16.817",
|
||||||
"lastModified": "2024-11-15T13:58:08.913",
|
"lastModified": "2024-11-19T15:20:01.913",
|
||||||
"vulnStatus": "Undergoing Analysis",
|
"vulnStatus": "Analyzed",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
@ -17,6 +17,26 @@
|
|||||||
],
|
],
|
||||||
"metrics": {
|
"metrics": {
|
||||||
"cvssMetricV31": [
|
"cvssMetricV31": [
|
||||||
|
{
|
||||||
|
"source": "nvd@nist.gov",
|
||||||
|
"type": "Primary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:H/A:N",
|
||||||
|
"attackVector": "NETWORK",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "LOW",
|
||||||
|
"userInteraction": "NONE",
|
||||||
|
"scope": "CHANGED",
|
||||||
|
"confidentialityImpact": "NONE",
|
||||||
|
"integrityImpact": "HIGH",
|
||||||
|
"availabilityImpact": "NONE",
|
||||||
|
"baseScore": 7.7,
|
||||||
|
"baseSeverity": "HIGH"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 3.1,
|
||||||
|
"impactScore": 4.0
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"source": "security@vmware.com",
|
"source": "security@vmware.com",
|
||||||
"type": "Secondary",
|
"type": "Secondary",
|
||||||
@ -40,6 +60,16 @@
|
|||||||
]
|
]
|
||||||
},
|
},
|
||||||
"weaknesses": [
|
"weaknesses": [
|
||||||
|
{
|
||||||
|
"source": "nvd@nist.gov",
|
||||||
|
"type": "Primary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-863"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"source": "security@vmware.com",
|
"source": "security@vmware.com",
|
||||||
"type": "Secondary",
|
"type": "Secondary",
|
||||||
@ -51,10 +81,39 @@
|
|||||||
]
|
]
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"references": [
|
"configurations": [
|
||||||
{
|
{
|
||||||
"url": "https://github.com/goharbor/harbor/security/advisories/GHSA-8c6p-v837-77f6",
|
"nodes": [
|
||||||
"source": "security@vmware.com"
|
{
|
||||||
|
"operator": "OR",
|
||||||
|
"negate": false,
|
||||||
|
"cpeMatch": [
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:a:linuxfoundation:harbor:*:*:*:*:*:*:*:*",
|
||||||
|
"versionStartIncluding": "2.0.0",
|
||||||
|
"versionEndExcluding": "2.4.3",
|
||||||
|
"matchCriteriaId": "14BEA987-A012-4745-A79A-7BCF5E9CD567"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:a:linuxfoundation:harbor:*:*:*:*:*:*:*:*",
|
||||||
|
"versionStartIncluding": "2.5.0",
|
||||||
|
"versionEndExcluding": "2.5.2",
|
||||||
|
"matchCriteriaId": "1B643770-6018-4D81-B386-91011E437F0D"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://github.com/goharbor/harbor/security/advisories/GHSA-8c6p-v837-77f6",
|
||||||
|
"source": "security@vmware.com",
|
||||||
|
"tags": [
|
||||||
|
"Vendor Advisory"
|
||||||
|
]
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
@ -2,8 +2,8 @@
|
|||||||
"id": "CVE-2022-31670",
|
"id": "CVE-2022-31670",
|
||||||
"sourceIdentifier": "security@vmware.com",
|
"sourceIdentifier": "security@vmware.com",
|
||||||
"published": "2024-11-14T12:15:17.040",
|
"published": "2024-11-14T12:15:17.040",
|
||||||
"lastModified": "2024-11-15T13:58:08.913",
|
"lastModified": "2024-11-19T15:20:54.243",
|
||||||
"vulnStatus": "Undergoing Analysis",
|
"vulnStatus": "Analyzed",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
@ -17,6 +17,26 @@
|
|||||||
],
|
],
|
||||||
"metrics": {
|
"metrics": {
|
||||||
"cvssMetricV31": [
|
"cvssMetricV31": [
|
||||||
|
{
|
||||||
|
"source": "nvd@nist.gov",
|
||||||
|
"type": "Primary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:H/A:N",
|
||||||
|
"attackVector": "NETWORK",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "LOW",
|
||||||
|
"userInteraction": "NONE",
|
||||||
|
"scope": "CHANGED",
|
||||||
|
"confidentialityImpact": "NONE",
|
||||||
|
"integrityImpact": "HIGH",
|
||||||
|
"availabilityImpact": "NONE",
|
||||||
|
"baseScore": 7.7,
|
||||||
|
"baseSeverity": "HIGH"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 3.1,
|
||||||
|
"impactScore": 4.0
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"source": "security@vmware.com",
|
"source": "security@vmware.com",
|
||||||
"type": "Secondary",
|
"type": "Secondary",
|
||||||
@ -40,6 +60,16 @@
|
|||||||
]
|
]
|
||||||
},
|
},
|
||||||
"weaknesses": [
|
"weaknesses": [
|
||||||
|
{
|
||||||
|
"source": "nvd@nist.gov",
|
||||||
|
"type": "Primary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-863"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"source": "security@vmware.com",
|
"source": "security@vmware.com",
|
||||||
"type": "Secondary",
|
"type": "Secondary",
|
||||||
@ -51,10 +81,46 @@
|
|||||||
]
|
]
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"references": [
|
"configurations": [
|
||||||
{
|
{
|
||||||
"url": "https://github.com/goharbor/harbor/security/advisories/GHSA-3637-v6vq-xqqw",
|
"nodes": [
|
||||||
"source": "security@vmware.com"
|
{
|
||||||
|
"operator": "OR",
|
||||||
|
"negate": false,
|
||||||
|
"cpeMatch": [
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:a:linuxfoundation:harbor:*:*:*:*:*:*:*:*",
|
||||||
|
"versionStartIncluding": "1.0.0",
|
||||||
|
"versionEndExcluding": "1.10.13",
|
||||||
|
"matchCriteriaId": "2A003057-D07D-42FC-823E-750DE181D14D"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:a:linuxfoundation:harbor:*:*:*:*:*:*:*:*",
|
||||||
|
"versionStartIncluding": "2.0.0",
|
||||||
|
"versionEndExcluding": "2.4.3",
|
||||||
|
"matchCriteriaId": "14BEA987-A012-4745-A79A-7BCF5E9CD567"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:a:linuxfoundation:harbor:*:*:*:*:*:*:*:*",
|
||||||
|
"versionStartIncluding": "2.5.0",
|
||||||
|
"versionEndExcluding": "2.5.2",
|
||||||
|
"matchCriteriaId": "1B643770-6018-4D81-B386-91011E437F0D"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://github.com/goharbor/harbor/security/advisories/GHSA-3637-v6vq-xqqw",
|
||||||
|
"source": "security@vmware.com",
|
||||||
|
"tags": [
|
||||||
|
"Vendor Advisory"
|
||||||
|
]
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
@ -2,8 +2,8 @@
|
|||||||
"id": "CVE-2022-31671",
|
"id": "CVE-2022-31671",
|
||||||
"sourceIdentifier": "security@vmware.com",
|
"sourceIdentifier": "security@vmware.com",
|
||||||
"published": "2024-11-14T12:15:17.250",
|
"published": "2024-11-14T12:15:17.250",
|
||||||
"lastModified": "2024-11-15T13:58:08.913",
|
"lastModified": "2024-11-19T15:40:44.150",
|
||||||
"vulnStatus": "Undergoing Analysis",
|
"vulnStatus": "Analyzed",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
@ -17,6 +17,26 @@
|
|||||||
],
|
],
|
||||||
"metrics": {
|
"metrics": {
|
||||||
"cvssMetricV31": [
|
"cvssMetricV31": [
|
||||||
|
{
|
||||||
|
"source": "nvd@nist.gov",
|
||||||
|
"type": "Primary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:L",
|
||||||
|
"attackVector": "NETWORK",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "LOW",
|
||||||
|
"userInteraction": "NONE",
|
||||||
|
"scope": "CHANGED",
|
||||||
|
"confidentialityImpact": "LOW",
|
||||||
|
"integrityImpact": "LOW",
|
||||||
|
"availabilityImpact": "LOW",
|
||||||
|
"baseScore": 7.4,
|
||||||
|
"baseSeverity": "HIGH"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 3.1,
|
||||||
|
"impactScore": 3.7
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"source": "security@vmware.com",
|
"source": "security@vmware.com",
|
||||||
"type": "Secondary",
|
"type": "Secondary",
|
||||||
@ -40,6 +60,16 @@
|
|||||||
]
|
]
|
||||||
},
|
},
|
||||||
"weaknesses": [
|
"weaknesses": [
|
||||||
|
{
|
||||||
|
"source": "nvd@nist.gov",
|
||||||
|
"type": "Primary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-863"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"source": "security@vmware.com",
|
"source": "security@vmware.com",
|
||||||
"type": "Secondary",
|
"type": "Secondary",
|
||||||
@ -51,14 +81,46 @@
|
|||||||
]
|
]
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"references": [
|
"configurations": [
|
||||||
{
|
{
|
||||||
"url": "https://github.com/goharbor/harbor/security/advisories/GHSA-3wpx-625q-22j7",
|
"nodes": [
|
||||||
"source": "security@vmware.com"
|
{
|
||||||
|
"operator": "OR",
|
||||||
|
"negate": false,
|
||||||
|
"cpeMatch": [
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:a:linuxfoundation:harbor:*:*:*:*:*:*:*:*",
|
||||||
|
"versionStartIncluding": "2.0.0",
|
||||||
|
"versionEndExcluding": "2.4.3",
|
||||||
|
"matchCriteriaId": "14BEA987-A012-4745-A79A-7BCF5E9CD567"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"url": "https://github.com/goharbor/harbor/security/advisories/GHSA-q76q-q8hw-hmpw",
|
"vulnerable": true,
|
||||||
"source": "security@vmware.com"
|
"criteria": "cpe:2.3:a:linuxfoundation:harbor:*:*:*:*:*:*:*:*",
|
||||||
|
"versionStartIncluding": "2.5.0",
|
||||||
|
"versionEndExcluding": "2.5.2",
|
||||||
|
"matchCriteriaId": "1B643770-6018-4D81-B386-91011E437F0D"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://github.com/goharbor/harbor/security/advisories/GHSA-3wpx-625q-22j7",
|
||||||
|
"source": "security@vmware.com",
|
||||||
|
"tags": [
|
||||||
|
"Vendor Advisory"
|
||||||
|
]
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://github.com/goharbor/harbor/security/advisories/GHSA-q76q-q8hw-hmpw",
|
||||||
|
"source": "security@vmware.com",
|
||||||
|
"tags": [
|
||||||
|
"Vendor Advisory"
|
||||||
|
]
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
@ -2,7 +2,7 @@
|
|||||||
"id": "CVE-2023-20593",
|
"id": "CVE-2023-20593",
|
||||||
"sourceIdentifier": "psirt@amd.com",
|
"sourceIdentifier": "psirt@amd.com",
|
||||||
"published": "2023-07-24T20:15:10.237",
|
"published": "2023-07-24T20:15:10.237",
|
||||||
"lastModified": "2024-06-10T18:15:20.270",
|
"lastModified": "2024-11-19T16:35:07.333",
|
||||||
"vulnStatus": "Modified",
|
"vulnStatus": "Modified",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
@ -45,6 +45,16 @@
|
|||||||
"value": "NVD-CWE-Other"
|
"value": "NVD-CWE-Other"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||||
|
"type": "Secondary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-209"
|
||||||
|
}
|
||||||
|
]
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"configurations": [
|
"configurations": [
|
||||||
|
@ -2,8 +2,8 @@
|
|||||||
"id": "CVE-2023-2332",
|
"id": "CVE-2023-2332",
|
||||||
"sourceIdentifier": "security@huntr.dev",
|
"sourceIdentifier": "security@huntr.dev",
|
||||||
"published": "2024-11-15T11:15:08.643",
|
"published": "2024-11-15T11:15:08.643",
|
||||||
"lastModified": "2024-11-15T13:58:08.913",
|
"lastModified": "2024-11-19T15:55:24.137",
|
||||||
"vulnStatus": "Undergoing Analysis",
|
"vulnStatus": "Analyzed",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
@ -16,6 +16,28 @@
|
|||||||
}
|
}
|
||||||
],
|
],
|
||||||
"metrics": {
|
"metrics": {
|
||||||
|
"cvssMetricV31": [
|
||||||
|
{
|
||||||
|
"source": "nvd@nist.gov",
|
||||||
|
"type": "Primary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N",
|
||||||
|
"attackVector": "NETWORK",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "HIGH",
|
||||||
|
"userInteraction": "REQUIRED",
|
||||||
|
"scope": "CHANGED",
|
||||||
|
"confidentialityImpact": "LOW",
|
||||||
|
"integrityImpact": "LOW",
|
||||||
|
"availabilityImpact": "NONE",
|
||||||
|
"baseScore": 4.8,
|
||||||
|
"baseSeverity": "MEDIUM"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 1.7,
|
||||||
|
"impactScore": 2.7
|
||||||
|
}
|
||||||
|
],
|
||||||
"cvssMetricV30": [
|
"cvssMetricV30": [
|
||||||
{
|
{
|
||||||
"source": "security@huntr.dev",
|
"source": "security@huntr.dev",
|
||||||
@ -51,14 +73,38 @@
|
|||||||
]
|
]
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"references": [
|
"configurations": [
|
||||||
{
|
{
|
||||||
"url": "https://github.com/pimcore/pimcore/commit/a4491551967d879141a3fdf0986a9dd3d891abfe",
|
"nodes": [
|
||||||
"source": "security@huntr.dev"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"url": "https://huntr.com/bounties/e436ed71-6741-4b30-89db-f7f3de4aca2c",
|
"operator": "OR",
|
||||||
"source": "security@huntr.dev"
|
"negate": false,
|
||||||
|
"cpeMatch": [
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:a:pimcore:pimcore:10.5.19:*:*:*:*:*:*:*",
|
||||||
|
"matchCriteriaId": "ABE99AD3-E02D-4FAE-AF25-AD88E502338B"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://github.com/pimcore/pimcore/commit/a4491551967d879141a3fdf0986a9dd3d891abfe",
|
||||||
|
"source": "security@huntr.dev",
|
||||||
|
"tags": [
|
||||||
|
"Patch"
|
||||||
|
]
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://huntr.com/bounties/e436ed71-6741-4b30-89db-f7f3de4aca2c",
|
||||||
|
"source": "security@huntr.dev",
|
||||||
|
"tags": [
|
||||||
|
"Exploit",
|
||||||
|
"Third Party Advisory"
|
||||||
|
]
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
@ -2,8 +2,8 @@
|
|||||||
"id": "CVE-2023-4679",
|
"id": "CVE-2023-4679",
|
||||||
"sourceIdentifier": "security@huntr.dev",
|
"sourceIdentifier": "security@huntr.dev",
|
||||||
"published": "2024-11-15T11:15:08.917",
|
"published": "2024-11-15T11:15:08.917",
|
||||||
"lastModified": "2024-11-15T20:35:03.507",
|
"lastModified": "2024-11-19T15:54:32.670",
|
||||||
"vulnStatus": "Undergoing Analysis",
|
"vulnStatus": "Analyzed",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
@ -17,6 +17,26 @@
|
|||||||
],
|
],
|
||||||
"metrics": {
|
"metrics": {
|
||||||
"cvssMetricV31": [
|
"cvssMetricV31": [
|
||||||
|
{
|
||||||
|
"source": "nvd@nist.gov",
|
||||||
|
"type": "Primary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||||||
|
"attackVector": "LOCAL",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "LOW",
|
||||||
|
"userInteraction": "NONE",
|
||||||
|
"scope": "UNCHANGED",
|
||||||
|
"confidentialityImpact": "NONE",
|
||||||
|
"integrityImpact": "NONE",
|
||||||
|
"availabilityImpact": "HIGH",
|
||||||
|
"baseScore": 5.5,
|
||||||
|
"baseSeverity": "MEDIUM"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 1.8,
|
||||||
|
"impactScore": 3.6
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||||
"type": "Secondary",
|
"type": "Secondary",
|
||||||
@ -73,14 +93,38 @@
|
|||||||
]
|
]
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"references": [
|
"configurations": [
|
||||||
{
|
{
|
||||||
"url": "https://github.com/gpac/gpac/commit/b68b3f0bf5c366e003221d78fd663a1d5514a876",
|
"nodes": [
|
||||||
"source": "security@huntr.dev"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"url": "https://huntr.com/bounties/6f721ee7-8785-4c26-801e-f40fed3faaac",
|
"operator": "OR",
|
||||||
"source": "security@huntr.dev"
|
"negate": false,
|
||||||
|
"cpeMatch": [
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:a:gpac:gpac:2.3.0-dev:*:*:*:*:*:*:*",
|
||||||
|
"matchCriteriaId": "AF29EFBA-0C6D-4504-8EA9-E03D3814A261"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://github.com/gpac/gpac/commit/b68b3f0bf5c366e003221d78fd663a1d5514a876",
|
||||||
|
"source": "security@huntr.dev",
|
||||||
|
"tags": [
|
||||||
|
"Patch"
|
||||||
|
]
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://huntr.com/bounties/6f721ee7-8785-4c26-801e-f40fed3faaac",
|
||||||
|
"source": "security@huntr.dev",
|
||||||
|
"tags": [
|
||||||
|
"Exploit",
|
||||||
|
"Third Party Advisory"
|
||||||
|
]
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
@ -2,16 +2,55 @@
|
|||||||
"id": "CVE-2023-49952",
|
"id": "CVE-2023-49952",
|
||||||
"sourceIdentifier": "cve@mitre.org",
|
"sourceIdentifier": "cve@mitre.org",
|
||||||
"published": "2024-11-18T18:15:05.927",
|
"published": "2024-11-18T18:15:05.927",
|
||||||
"lastModified": "2024-11-18T18:15:05.927",
|
"lastModified": "2024-11-19T16:35:08.620",
|
||||||
"vulnStatus": "Received",
|
"vulnStatus": "Received",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
"lang": "en",
|
"lang": "en",
|
||||||
"value": "Mastodon 4.1.x before 4.1.17 and 4.2.x before 4.2.9 allows a bypass of rate limiting via a crafted HTTP request header."
|
"value": "Mastodon 4.1.x before 4.1.17 and 4.2.x before 4.2.9 allows a bypass of rate limiting via a crafted HTTP request header."
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"lang": "es",
|
||||||
|
"value": "Mastodon 4.1.x anterior a 4.1.17 y 4.2.x anterior a 4.2.9 permiten eludir la limitaci\u00f3n de velocidad a trav\u00e9s de un encabezado de solicitud HTTP manipulado espec\u00edficamente."
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"metrics": {
|
||||||
|
"cvssMetricV31": [
|
||||||
|
{
|
||||||
|
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||||
|
"type": "Secondary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
|
||||||
|
"attackVector": "NETWORK",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "NONE",
|
||||||
|
"userInteraction": "NONE",
|
||||||
|
"scope": "UNCHANGED",
|
||||||
|
"confidentialityImpact": "NONE",
|
||||||
|
"integrityImpact": "HIGH",
|
||||||
|
"availabilityImpact": "NONE",
|
||||||
|
"baseScore": 7.5,
|
||||||
|
"baseSeverity": "HIGH"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 3.9,
|
||||||
|
"impactScore": 3.6
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"weaknesses": [
|
||||||
|
{
|
||||||
|
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||||
|
"type": "Secondary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-79"
|
||||||
|
}
|
||||||
|
]
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"metrics": {},
|
|
||||||
"references": [
|
"references": [
|
||||||
{
|
{
|
||||||
"url": "https://github.com/mastodon/mastodon/security",
|
"url": "https://github.com/mastodon/mastodon/security",
|
||||||
|
@ -2,8 +2,8 @@
|
|||||||
"id": "CVE-2024-0787",
|
"id": "CVE-2024-0787",
|
||||||
"sourceIdentifier": "security@huntr.dev",
|
"sourceIdentifier": "security@huntr.dev",
|
||||||
"published": "2024-11-15T11:15:09.213",
|
"published": "2024-11-15T11:15:09.213",
|
||||||
"lastModified": "2024-11-15T19:35:04.380",
|
"lastModified": "2024-11-19T15:53:59.093",
|
||||||
"vulnStatus": "Undergoing Analysis",
|
"vulnStatus": "Analyzed",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
@ -17,6 +17,26 @@
|
|||||||
],
|
],
|
||||||
"metrics": {
|
"metrics": {
|
||||||
"cvssMetricV31": [
|
"cvssMetricV31": [
|
||||||
|
{
|
||||||
|
"source": "nvd@nist.gov",
|
||||||
|
"type": "Primary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N",
|
||||||
|
"attackVector": "NETWORK",
|
||||||
|
"attackComplexity": "HIGH",
|
||||||
|
"privilegesRequired": "NONE",
|
||||||
|
"userInteraction": "NONE",
|
||||||
|
"scope": "UNCHANGED",
|
||||||
|
"confidentialityImpact": "HIGH",
|
||||||
|
"integrityImpact": "NONE",
|
||||||
|
"availabilityImpact": "NONE",
|
||||||
|
"baseScore": 5.9,
|
||||||
|
"baseSeverity": "MEDIUM"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 2.2,
|
||||||
|
"impactScore": 3.6
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||||
"type": "Secondary",
|
"type": "Secondary",
|
||||||
@ -73,14 +93,39 @@
|
|||||||
]
|
]
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"references": [
|
"configurations": [
|
||||||
{
|
{
|
||||||
"url": "https://github.com/phpipam/phpipam/commit/55c2056068be9f1359e967fcff64db6b7f4d00b5",
|
"nodes": [
|
||||||
"source": "security@huntr.dev"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"url": "https://huntr.com/bounties/840cb582-1feb-43ab-9cc4-e4b5a63c5bab",
|
"operator": "OR",
|
||||||
"source": "security@huntr.dev"
|
"negate": false,
|
||||||
|
"cpeMatch": [
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:a:phpipam:phpipam:*:*:*:*:*:*:*:*",
|
||||||
|
"versionEndExcluding": "1.7.0",
|
||||||
|
"matchCriteriaId": "896B6AA4-8068-41F4-ACD4-92893E5BB0AD"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://github.com/phpipam/phpipam/commit/55c2056068be9f1359e967fcff64db6b7f4d00b5",
|
||||||
|
"source": "security@huntr.dev",
|
||||||
|
"tags": [
|
||||||
|
"Patch"
|
||||||
|
]
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://huntr.com/bounties/840cb582-1feb-43ab-9cc4-e4b5a63c5bab",
|
||||||
|
"source": "security@huntr.dev",
|
||||||
|
"tags": [
|
||||||
|
"Exploit",
|
||||||
|
"Third Party Advisory"
|
||||||
|
]
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
@ -2,8 +2,8 @@
|
|||||||
"id": "CVE-2024-0875",
|
"id": "CVE-2024-0875",
|
||||||
"sourceIdentifier": "security@huntr.dev",
|
"sourceIdentifier": "security@huntr.dev",
|
||||||
"published": "2024-11-15T11:15:09.490",
|
"published": "2024-11-15T11:15:09.490",
|
||||||
"lastModified": "2024-11-15T13:58:08.913",
|
"lastModified": "2024-11-19T16:03:56.163",
|
||||||
"vulnStatus": "Undergoing Analysis",
|
"vulnStatus": "Analyzed",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
@ -16,6 +16,28 @@
|
|||||||
}
|
}
|
||||||
],
|
],
|
||||||
"metrics": {
|
"metrics": {
|
||||||
|
"cvssMetricV31": [
|
||||||
|
{
|
||||||
|
"source": "nvd@nist.gov",
|
||||||
|
"type": "Primary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N",
|
||||||
|
"attackVector": "NETWORK",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "HIGH",
|
||||||
|
"userInteraction": "REQUIRED",
|
||||||
|
"scope": "CHANGED",
|
||||||
|
"confidentialityImpact": "LOW",
|
||||||
|
"integrityImpact": "LOW",
|
||||||
|
"availabilityImpact": "NONE",
|
||||||
|
"baseScore": 4.8,
|
||||||
|
"baseSeverity": "MEDIUM"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 1.7,
|
||||||
|
"impactScore": 2.7
|
||||||
|
}
|
||||||
|
],
|
||||||
"cvssMetricV30": [
|
"cvssMetricV30": [
|
||||||
{
|
{
|
||||||
"source": "security@huntr.dev",
|
"source": "security@huntr.dev",
|
||||||
@ -51,14 +73,38 @@
|
|||||||
]
|
]
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"references": [
|
"configurations": [
|
||||||
{
|
{
|
||||||
"url": "https://github.com/openemr/openemr/commit/d141d2ca06fb2171a202c7302dd5d5af8539f255",
|
"nodes": [
|
||||||
"source": "security@huntr.dev"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"url": "https://huntr.com/bounties/16cba0fc-748d-4ea8-9573-1f6fbe9a27c9",
|
"operator": "OR",
|
||||||
"source": "security@huntr.dev"
|
"negate": false,
|
||||||
|
"cpeMatch": [
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:a:open-emr:openemr:7.0.1:*:*:*:*:*:*:*",
|
||||||
|
"matchCriteriaId": "49234EA5-1593-40E1-93AF-A71F05056639"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://github.com/openemr/openemr/commit/d141d2ca06fb2171a202c7302dd5d5af8539f255",
|
||||||
|
"source": "security@huntr.dev",
|
||||||
|
"tags": [
|
||||||
|
"Patch"
|
||||||
|
]
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://huntr.com/bounties/16cba0fc-748d-4ea8-9573-1f6fbe9a27c9",
|
||||||
|
"source": "security@huntr.dev",
|
||||||
|
"tags": [
|
||||||
|
"Exploit",
|
||||||
|
"Third Party Advisory"
|
||||||
|
]
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
@ -2,16 +2,55 @@
|
|||||||
"id": "CVE-2024-10103",
|
"id": "CVE-2024-10103",
|
||||||
"sourceIdentifier": "contact@wpscan.com",
|
"sourceIdentifier": "contact@wpscan.com",
|
||||||
"published": "2024-11-19T06:15:17.740",
|
"published": "2024-11-19T06:15:17.740",
|
||||||
"lastModified": "2024-11-19T06:15:17.740",
|
"lastModified": "2024-11-19T15:35:04.260",
|
||||||
"vulnStatus": "Received",
|
"vulnStatus": "Received",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
"lang": "en",
|
"lang": "en",
|
||||||
"value": "In the process of testing the MailPoet WordPress plugin before 5.3.2, a vulnerability was found that allows you to implement Stored XSS on behalf of the editor by embedding malicious script, which entails account takeover backdoor"
|
"value": "In the process of testing the MailPoet WordPress plugin before 5.3.2, a vulnerability was found that allows you to implement Stored XSS on behalf of the editor by embedding malicious script, which entails account takeover backdoor"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"lang": "es",
|
||||||
|
"value": "En el proceso de prueba del complemento MailPoet para WordPress anterior a la versi\u00f3n 5.3.2, se encontr\u00f3 una vulnerabilidad que permite implementar XSS almacenado en nombre del editor mediante la incorporaci\u00f3n de un script malicioso, lo que implica una puerta trasera de apropiaci\u00f3n de cuentas."
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"metrics": {
|
||||||
|
"cvssMetricV31": [
|
||||||
|
{
|
||||||
|
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||||
|
"type": "Secondary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
|
||||||
|
"attackVector": "NETWORK",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "NONE",
|
||||||
|
"userInteraction": "REQUIRED",
|
||||||
|
"scope": "CHANGED",
|
||||||
|
"confidentialityImpact": "LOW",
|
||||||
|
"integrityImpact": "LOW",
|
||||||
|
"availabilityImpact": "NONE",
|
||||||
|
"baseScore": 6.1,
|
||||||
|
"baseSeverity": "MEDIUM"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 2.8,
|
||||||
|
"impactScore": 2.7
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"weaknesses": [
|
||||||
|
{
|
||||||
|
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||||
|
"type": "Secondary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-79"
|
||||||
|
}
|
||||||
|
]
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"metrics": {},
|
|
||||||
"references": [
|
"references": [
|
||||||
{
|
{
|
||||||
"url": "https://wpscan.com/vulnerability/89660883-5f34-426a-ad06-741c0c213ecc/",
|
"url": "https://wpscan.com/vulnerability/89660883-5f34-426a-ad06-741c0c213ecc/",
|
||||||
|
@ -2,7 +2,7 @@
|
|||||||
"id": "CVE-2024-10394",
|
"id": "CVE-2024-10394",
|
||||||
"sourceIdentifier": "patrick@puiterwijk.org",
|
"sourceIdentifier": "patrick@puiterwijk.org",
|
||||||
"published": "2024-11-14T20:15:20.777",
|
"published": "2024-11-14T20:15:20.777",
|
||||||
"lastModified": "2024-11-15T13:58:08.913",
|
"lastModified": "2024-11-19T16:35:09.703",
|
||||||
"vulnStatus": "Awaiting Analysis",
|
"vulnStatus": "Awaiting Analysis",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
@ -59,6 +59,28 @@
|
|||||||
"baseSeverity": "HIGH"
|
"baseSeverity": "HIGH"
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
],
|
||||||
|
"cvssMetricV31": [
|
||||||
|
{
|
||||||
|
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||||
|
"type": "Secondary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:N",
|
||||||
|
"attackVector": "LOCAL",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "NONE",
|
||||||
|
"userInteraction": "REQUIRED",
|
||||||
|
"scope": "UNCHANGED",
|
||||||
|
"confidentialityImpact": "NONE",
|
||||||
|
"integrityImpact": "NONE",
|
||||||
|
"availabilityImpact": "NONE",
|
||||||
|
"baseScore": 0.0,
|
||||||
|
"baseSeverity": "NONE"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 1.8,
|
||||||
|
"impactScore": 0.0
|
||||||
|
}
|
||||||
]
|
]
|
||||||
},
|
},
|
||||||
"weaknesses": [
|
"weaknesses": [
|
||||||
|
@ -2,7 +2,7 @@
|
|||||||
"id": "CVE-2024-10396",
|
"id": "CVE-2024-10396",
|
||||||
"sourceIdentifier": "patrick@puiterwijk.org",
|
"sourceIdentifier": "patrick@puiterwijk.org",
|
||||||
"published": "2024-11-14T20:15:20.917",
|
"published": "2024-11-14T20:15:20.917",
|
||||||
"lastModified": "2024-11-15T13:58:08.913",
|
"lastModified": "2024-11-19T16:35:09.930",
|
||||||
"vulnStatus": "Awaiting Analysis",
|
"vulnStatus": "Awaiting Analysis",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
@ -59,6 +59,28 @@
|
|||||||
"baseSeverity": "HIGH"
|
"baseSeverity": "HIGH"
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
],
|
||||||
|
"cvssMetricV31": [
|
||||||
|
{
|
||||||
|
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||||
|
"type": "Secondary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N",
|
||||||
|
"attackVector": "NETWORK",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "LOW",
|
||||||
|
"userInteraction": "NONE",
|
||||||
|
"scope": "UNCHANGED",
|
||||||
|
"confidentialityImpact": "NONE",
|
||||||
|
"integrityImpact": "NONE",
|
||||||
|
"availabilityImpact": "NONE",
|
||||||
|
"baseScore": 0.0,
|
||||||
|
"baseSeverity": "NONE"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 2.8,
|
||||||
|
"impactScore": 0.0
|
||||||
|
}
|
||||||
]
|
]
|
||||||
},
|
},
|
||||||
"weaknesses": [
|
"weaknesses": [
|
||||||
|
@ -2,7 +2,7 @@
|
|||||||
"id": "CVE-2024-10397",
|
"id": "CVE-2024-10397",
|
||||||
"sourceIdentifier": "patrick@puiterwijk.org",
|
"sourceIdentifier": "patrick@puiterwijk.org",
|
||||||
"published": "2024-11-14T20:15:21.057",
|
"published": "2024-11-14T20:15:21.057",
|
||||||
"lastModified": "2024-11-15T13:58:08.913",
|
"lastModified": "2024-11-19T16:35:10.143",
|
||||||
"vulnStatus": "Awaiting Analysis",
|
"vulnStatus": "Awaiting Analysis",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
@ -59,6 +59,28 @@
|
|||||||
"baseSeverity": "HIGH"
|
"baseSeverity": "HIGH"
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
],
|
||||||
|
"cvssMetricV31": [
|
||||||
|
{
|
||||||
|
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||||
|
"type": "Secondary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:N",
|
||||||
|
"attackVector": "NETWORK",
|
||||||
|
"attackComplexity": "HIGH",
|
||||||
|
"privilegesRequired": "NONE",
|
||||||
|
"userInteraction": "REQUIRED",
|
||||||
|
"scope": "UNCHANGED",
|
||||||
|
"confidentialityImpact": "NONE",
|
||||||
|
"integrityImpact": "NONE",
|
||||||
|
"availabilityImpact": "NONE",
|
||||||
|
"baseScore": 0.0,
|
||||||
|
"baseSeverity": "NONE"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 1.6,
|
||||||
|
"impactScore": 0.0
|
||||||
|
}
|
||||||
]
|
]
|
||||||
},
|
},
|
||||||
"weaknesses": [
|
"weaknesses": [
|
||||||
|
64
CVE-2024/CVE-2024-105xx/CVE-2024-10524.json
Normal file
64
CVE-2024/CVE-2024-105xx/CVE-2024-10524.json
Normal file
@ -0,0 +1,64 @@
|
|||||||
|
{
|
||||||
|
"id": "CVE-2024-10524",
|
||||||
|
"sourceIdentifier": "reefs@jfrog.com",
|
||||||
|
"published": "2024-11-19T15:15:06.740",
|
||||||
|
"lastModified": "2024-11-19T15:15:06.740",
|
||||||
|
"vulnStatus": "Received",
|
||||||
|
"cveTags": [],
|
||||||
|
"descriptions": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "Applications that use Wget to access a remote resource using shorthand URLs and pass arbitrary user credentials in the URL are vulnerable. In these cases attackers can enter crafted credentials which will cause Wget to access an arbitrary host."
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"metrics": {
|
||||||
|
"cvssMetricV31": [
|
||||||
|
{
|
||||||
|
"source": "reefs@jfrog.com",
|
||||||
|
"type": "Secondary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:L",
|
||||||
|
"attackVector": "NETWORK",
|
||||||
|
"attackComplexity": "HIGH",
|
||||||
|
"privilegesRequired": "NONE",
|
||||||
|
"userInteraction": "NONE",
|
||||||
|
"scope": "CHANGED",
|
||||||
|
"confidentialityImpact": "LOW",
|
||||||
|
"integrityImpact": "LOW",
|
||||||
|
"availabilityImpact": "LOW",
|
||||||
|
"baseScore": 6.5,
|
||||||
|
"baseSeverity": "MEDIUM"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 2.2,
|
||||||
|
"impactScore": 3.7
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"weaknesses": [
|
||||||
|
{
|
||||||
|
"source": "reefs@jfrog.com",
|
||||||
|
"type": "Primary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-918"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://git.savannah.gnu.org/cgit/wget.git/commit/?id=c419542d956a2607bbce5df64b9d378a8588d778",
|
||||||
|
"source": "reefs@jfrog.com"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://jfrog.com/blog/cve-2024-10524-wget-zero-day-vulnerability/",
|
||||||
|
"source": "reefs@jfrog.com"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://seclists.org/oss-sec/2024/q4/107",
|
||||||
|
"source": "reefs@jfrog.com"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
@ -2,8 +2,8 @@
|
|||||||
"id": "CVE-2024-10571",
|
"id": "CVE-2024-10571",
|
||||||
"sourceIdentifier": "security@wordfence.com",
|
"sourceIdentifier": "security@wordfence.com",
|
||||||
"published": "2024-11-14T11:15:04.630",
|
"published": "2024-11-14T11:15:04.630",
|
||||||
"lastModified": "2024-11-15T13:58:08.913",
|
"lastModified": "2024-11-19T15:46:52.187",
|
||||||
"vulnStatus": "Undergoing Analysis",
|
"vulnStatus": "Analyzed",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
@ -41,8 +41,18 @@
|
|||||||
},
|
},
|
||||||
"weaknesses": [
|
"weaknesses": [
|
||||||
{
|
{
|
||||||
"source": "security@wordfence.com",
|
"source": "nvd@nist.gov",
|
||||||
"type": "Primary",
|
"type": "Primary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "NVD-CWE-Other"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"source": "security@wordfence.com",
|
||||||
|
"type": "Secondary",
|
||||||
"description": [
|
"description": [
|
||||||
{
|
{
|
||||||
"lang": "en",
|
"lang": "en",
|
||||||
@ -51,14 +61,38 @@
|
|||||||
]
|
]
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"references": [
|
"configurations": [
|
||||||
{
|
{
|
||||||
"url": "https://plugins.trac.wordpress.org/browser/chart-builder/tags/2.9.6/admin/partials/charts/actions/chart-builder-charts-actions-options.php?rev=3184238",
|
"nodes": [
|
||||||
"source": "security@wordfence.com"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/d4837258-c749-4194-926c-22b67e20c1fc?source=cve",
|
"operator": "OR",
|
||||||
"source": "security@wordfence.com"
|
"negate": false,
|
||||||
|
"cpeMatch": [
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:a:ays-pro:chartify:*:*:*:*:free:wordpress:*:*",
|
||||||
|
"versionEndExcluding": "2.9.6",
|
||||||
|
"matchCriteriaId": "92AB71F0-6DDD-4FCA-81E4-C31699DB8116"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://plugins.trac.wordpress.org/browser/chart-builder/tags/2.9.6/admin/partials/charts/actions/chart-builder-charts-actions-options.php?rev=3184238",
|
||||||
|
"source": "security@wordfence.com",
|
||||||
|
"tags": [
|
||||||
|
"Product"
|
||||||
|
]
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/d4837258-c749-4194-926c-22b67e20c1fc?source=cve",
|
||||||
|
"source": "security@wordfence.com",
|
||||||
|
"tags": [
|
||||||
|
"Third Party Advisory"
|
||||||
|
]
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
@ -2,8 +2,8 @@
|
|||||||
"id": "CVE-2024-10877",
|
"id": "CVE-2024-10877",
|
||||||
"sourceIdentifier": "security@wordfence.com",
|
"sourceIdentifier": "security@wordfence.com",
|
||||||
"published": "2024-11-13T07:15:06.197",
|
"published": "2024-11-13T07:15:06.197",
|
||||||
"lastModified": "2024-11-13T17:01:16.850",
|
"lastModified": "2024-11-19T15:52:44.487",
|
||||||
"vulnStatus": "Awaiting Analysis",
|
"vulnStatus": "Analyzed",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
@ -51,18 +51,45 @@
|
|||||||
]
|
]
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"references": [
|
"configurations": [
|
||||||
{
|
{
|
||||||
"url": "https://plugins.trac.wordpress.org/browser/advanced-form-integration/tags/1.91.4/includes/class-adfoin-log-table.php#L245",
|
"nodes": [
|
||||||
"source": "security@wordfence.com"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"url": "https://plugins.trac.wordpress.org/changeset/3185778/advanced-form-integration/trunk/includes/class-adfoin-log-table.php",
|
"operator": "OR",
|
||||||
"source": "security@wordfence.com"
|
"negate": false,
|
||||||
},
|
"cpeMatch": [
|
||||||
{
|
{
|
||||||
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/936de04d-9b80-430b-a8b7-9755b68e2a02?source=cve",
|
"vulnerable": true,
|
||||||
"source": "security@wordfence.com"
|
"criteria": "cpe:2.3:a:advancedformintegration:advanced_form_integration:*:*:*:*:*:wordpress:*:*",
|
||||||
|
"versionEndExcluding": "1.92.1",
|
||||||
|
"matchCriteriaId": "E42DC547-EF2B-4942-B7C9-A11A14EDADC5"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://plugins.trac.wordpress.org/browser/advanced-form-integration/tags/1.91.4/includes/class-adfoin-log-table.php#L245",
|
||||||
|
"source": "security@wordfence.com",
|
||||||
|
"tags": [
|
||||||
|
"Product"
|
||||||
|
]
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://plugins.trac.wordpress.org/changeset/3185778/advanced-form-integration/trunk/includes/class-adfoin-log-table.php",
|
||||||
|
"source": "security@wordfence.com",
|
||||||
|
"tags": [
|
||||||
|
"Patch"
|
||||||
|
]
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/936de04d-9b80-430b-a8b7-9755b68e2a02?source=cve",
|
||||||
|
"source": "security@wordfence.com",
|
||||||
|
"tags": [
|
||||||
|
"Third Party Advisory"
|
||||||
|
]
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
@ -2,8 +2,8 @@
|
|||||||
"id": "CVE-2024-11028",
|
"id": "CVE-2024-11028",
|
||||||
"sourceIdentifier": "security@wordfence.com",
|
"sourceIdentifier": "security@wordfence.com",
|
||||||
"published": "2024-11-13T10:15:04.237",
|
"published": "2024-11-13T10:15:04.237",
|
||||||
"lastModified": "2024-11-13T17:01:16.850",
|
"lastModified": "2024-11-19T15:38:19.023",
|
||||||
"vulnStatus": "Awaiting Analysis",
|
"vulnStatus": "Analyzed",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
@ -51,22 +51,52 @@
|
|||||||
]
|
]
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"references": [
|
"configurations": [
|
||||||
{
|
{
|
||||||
"url": "https://plugins.trac.wordpress.org/changeset/3184657/multimanager-wp",
|
"nodes": [
|
||||||
"source": "security@wordfence.com"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"url": "https://plugins.trac.wordpress.org/changeset/3184678/multimanager-wp",
|
"operator": "OR",
|
||||||
"source": "security@wordfence.com"
|
"negate": false,
|
||||||
},
|
"cpeMatch": [
|
||||||
{
|
{
|
||||||
"url": "https://plugins.trac.wordpress.org/changeset/3184826/multimanager-wp",
|
"vulnerable": true,
|
||||||
"source": "security@wordfence.com"
|
"criteria": "cpe:2.3:a:icdsoft:multimanager_wp:*:*:*:*:*:wordpress:*:*",
|
||||||
},
|
"versionEndExcluding": "1.1.0",
|
||||||
{
|
"matchCriteriaId": "BC69E7B4-166A-4804-874E-DC59E5FBA8B7"
|
||||||
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/de8e7adc-3777-4fb1-a708-68da950e3d4f?source=cve",
|
}
|
||||||
"source": "security@wordfence.com"
|
]
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://plugins.trac.wordpress.org/changeset/3184657/multimanager-wp",
|
||||||
|
"source": "security@wordfence.com",
|
||||||
|
"tags": [
|
||||||
|
"Product"
|
||||||
|
]
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://plugins.trac.wordpress.org/changeset/3184678/multimanager-wp",
|
||||||
|
"source": "security@wordfence.com",
|
||||||
|
"tags": [
|
||||||
|
"Product"
|
||||||
|
]
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://plugins.trac.wordpress.org/changeset/3184826/multimanager-wp",
|
||||||
|
"source": "security@wordfence.com",
|
||||||
|
"tags": [
|
||||||
|
"Product"
|
||||||
|
]
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/de8e7adc-3777-4fb1-a708-68da950e3d4f?source=cve",
|
||||||
|
"source": "security@wordfence.com",
|
||||||
|
"tags": [
|
||||||
|
"Third Party Advisory"
|
||||||
|
]
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
@ -2,8 +2,8 @@
|
|||||||
"id": "CVE-2024-11150",
|
"id": "CVE-2024-11150",
|
||||||
"sourceIdentifier": "security@wordfence.com",
|
"sourceIdentifier": "security@wordfence.com",
|
||||||
"published": "2024-11-13T05:15:12.337",
|
"published": "2024-11-13T05:15:12.337",
|
||||||
"lastModified": "2024-11-13T17:01:16.850",
|
"lastModified": "2024-11-19T16:57:05.407",
|
||||||
"vulnStatus": "Awaiting Analysis",
|
"vulnStatus": "Analyzed",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
@ -51,14 +51,38 @@
|
|||||||
]
|
]
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"references": [
|
"configurations": [
|
||||||
{
|
{
|
||||||
"url": "https://codecanyon.net/item/user-extra-fields/12949844",
|
"nodes": [
|
||||||
"source": "security@wordfence.com"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/ad39d797-9230-41d9-a335-864845b56aa0?source=cve",
|
"operator": "OR",
|
||||||
"source": "security@wordfence.com"
|
"negate": false,
|
||||||
|
"cpeMatch": [
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:a:vanquish:user_extra_fields:*:*:*:*:*:wordpress:*:*",
|
||||||
|
"versionEndExcluding": "16.7",
|
||||||
|
"matchCriteriaId": "51950C34-787B-4170-BD3D-E8D82995ACDB"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://codecanyon.net/item/user-extra-fields/12949844",
|
||||||
|
"source": "security@wordfence.com",
|
||||||
|
"tags": [
|
||||||
|
"Product"
|
||||||
|
]
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/ad39d797-9230-41d9-a335-864845b56aa0?source=cve",
|
||||||
|
"source": "security@wordfence.com",
|
||||||
|
"tags": [
|
||||||
|
"Third Party Advisory"
|
||||||
|
]
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
@ -2,8 +2,8 @@
|
|||||||
"id": "CVE-2024-11212",
|
"id": "CVE-2024-11212",
|
||||||
"sourceIdentifier": "cna@vuldb.com",
|
"sourceIdentifier": "cna@vuldb.com",
|
||||||
"published": "2024-11-14T15:15:08.360",
|
"published": "2024-11-14T15:15:08.360",
|
||||||
"lastModified": "2024-11-15T13:58:08.913",
|
"lastModified": "2024-11-19T15:48:22.163",
|
||||||
"vulnStatus": "Undergoing Analysis",
|
"vulnStatus": "Analyzed",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
@ -61,6 +61,26 @@
|
|||||||
}
|
}
|
||||||
],
|
],
|
||||||
"cvssMetricV31": [
|
"cvssMetricV31": [
|
||||||
|
{
|
||||||
|
"source": "nvd@nist.gov",
|
||||||
|
"type": "Primary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||||
|
"attackVector": "NETWORK",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "LOW",
|
||||||
|
"userInteraction": "NONE",
|
||||||
|
"scope": "UNCHANGED",
|
||||||
|
"confidentialityImpact": "HIGH",
|
||||||
|
"integrityImpact": "HIGH",
|
||||||
|
"availabilityImpact": "HIGH",
|
||||||
|
"baseScore": 8.8,
|
||||||
|
"baseSeverity": "HIGH"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 2.8,
|
||||||
|
"impactScore": 5.9
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"source": "cna@vuldb.com",
|
"source": "cna@vuldb.com",
|
||||||
"type": "Secondary",
|
"type": "Secondary",
|
||||||
@ -110,8 +130,18 @@
|
|||||||
},
|
},
|
||||||
"weaknesses": [
|
"weaknesses": [
|
||||||
{
|
{
|
||||||
"source": "cna@vuldb.com",
|
"source": "nvd@nist.gov",
|
||||||
"type": "Primary",
|
"type": "Primary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-89"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"source": "cna@vuldb.com",
|
||||||
|
"type": "Secondary",
|
||||||
"description": [
|
"description": [
|
||||||
{
|
{
|
||||||
"lang": "en",
|
"lang": "en",
|
||||||
@ -124,26 +154,62 @@
|
|||||||
]
|
]
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"references": [
|
"configurations": [
|
||||||
{
|
{
|
||||||
"url": "https://github.com/physicszq/web_issue/blob/main/Management/sql_injection01.md",
|
"nodes": [
|
||||||
"source": "cna@vuldb.com"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"url": "https://vuldb.com/?ctiid.284528",
|
"operator": "OR",
|
||||||
"source": "cna@vuldb.com"
|
"negate": false,
|
||||||
},
|
"cpeMatch": [
|
||||||
{
|
{
|
||||||
"url": "https://vuldb.com/?id.284528",
|
"vulnerable": true,
|
||||||
"source": "cna@vuldb.com"
|
"criteria": "cpe:2.3:a:mayurik:best_employee_management_system:1.0:*:*:*:*:*:*:*",
|
||||||
},
|
"matchCriteriaId": "085DDBB3-1FD4-4947-916D-1AEF70F258C3"
|
||||||
{
|
}
|
||||||
"url": "https://vuldb.com/?submit.442035",
|
]
|
||||||
"source": "cna@vuldb.com"
|
}
|
||||||
},
|
]
|
||||||
{
|
}
|
||||||
"url": "https://www.sourcecodester.com/",
|
],
|
||||||
"source": "cna@vuldb.com"
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://github.com/physicszq/web_issue/blob/main/Management/sql_injection01.md",
|
||||||
|
"source": "cna@vuldb.com",
|
||||||
|
"tags": [
|
||||||
|
"Exploit",
|
||||||
|
"Third Party Advisory"
|
||||||
|
]
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://vuldb.com/?ctiid.284528",
|
||||||
|
"source": "cna@vuldb.com",
|
||||||
|
"tags": [
|
||||||
|
"Permissions Required",
|
||||||
|
"VDB Entry"
|
||||||
|
]
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://vuldb.com/?id.284528",
|
||||||
|
"source": "cna@vuldb.com",
|
||||||
|
"tags": [
|
||||||
|
"Third Party Advisory",
|
||||||
|
"VDB Entry"
|
||||||
|
]
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://vuldb.com/?submit.442035",
|
||||||
|
"source": "cna@vuldb.com",
|
||||||
|
"tags": [
|
||||||
|
"Third Party Advisory",
|
||||||
|
"VDB Entry"
|
||||||
|
]
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://www.sourcecodester.com/",
|
||||||
|
"source": "cna@vuldb.com",
|
||||||
|
"tags": [
|
||||||
|
"Product"
|
||||||
|
]
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
@ -2,8 +2,8 @@
|
|||||||
"id": "CVE-2024-11213",
|
"id": "CVE-2024-11213",
|
||||||
"sourceIdentifier": "cna@vuldb.com",
|
"sourceIdentifier": "cna@vuldb.com",
|
||||||
"published": "2024-11-14T16:15:18.450",
|
"published": "2024-11-14T16:15:18.450",
|
||||||
"lastModified": "2024-11-15T13:58:08.913",
|
"lastModified": "2024-11-19T15:48:58.680",
|
||||||
"vulnStatus": "Undergoing Analysis",
|
"vulnStatus": "Analyzed",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
@ -61,6 +61,26 @@
|
|||||||
}
|
}
|
||||||
],
|
],
|
||||||
"cvssMetricV31": [
|
"cvssMetricV31": [
|
||||||
|
{
|
||||||
|
"source": "nvd@nist.gov",
|
||||||
|
"type": "Primary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
|
||||||
|
"attackVector": "NETWORK",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "HIGH",
|
||||||
|
"userInteraction": "NONE",
|
||||||
|
"scope": "UNCHANGED",
|
||||||
|
"confidentialityImpact": "HIGH",
|
||||||
|
"integrityImpact": "HIGH",
|
||||||
|
"availabilityImpact": "HIGH",
|
||||||
|
"baseScore": 7.2,
|
||||||
|
"baseSeverity": "HIGH"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 1.2,
|
||||||
|
"impactScore": 5.9
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"source": "cna@vuldb.com",
|
"source": "cna@vuldb.com",
|
||||||
"type": "Secondary",
|
"type": "Secondary",
|
||||||
@ -110,8 +130,18 @@
|
|||||||
},
|
},
|
||||||
"weaknesses": [
|
"weaknesses": [
|
||||||
{
|
{
|
||||||
"source": "cna@vuldb.com",
|
"source": "nvd@nist.gov",
|
||||||
"type": "Primary",
|
"type": "Primary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-89"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"source": "cna@vuldb.com",
|
||||||
|
"type": "Secondary",
|
||||||
"description": [
|
"description": [
|
||||||
{
|
{
|
||||||
"lang": "en",
|
"lang": "en",
|
||||||
@ -124,26 +154,62 @@
|
|||||||
]
|
]
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"references": [
|
"configurations": [
|
||||||
{
|
{
|
||||||
"url": "https://github.com/sh3rl0ckpggp/0day/blob/main/authenticated_sqli_Employee_management_system.md",
|
"nodes": [
|
||||||
"source": "cna@vuldb.com"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"url": "https://vuldb.com/?ctiid.284529",
|
"operator": "OR",
|
||||||
"source": "cna@vuldb.com"
|
"negate": false,
|
||||||
},
|
"cpeMatch": [
|
||||||
{
|
{
|
||||||
"url": "https://vuldb.com/?id.284529",
|
"vulnerable": true,
|
||||||
"source": "cna@vuldb.com"
|
"criteria": "cpe:2.3:a:mayurik:best_employee_management_system:1.0:*:*:*:*:*:*:*",
|
||||||
},
|
"matchCriteriaId": "085DDBB3-1FD4-4947-916D-1AEF70F258C3"
|
||||||
{
|
}
|
||||||
"url": "https://vuldb.com/?submit.443298",
|
]
|
||||||
"source": "cna@vuldb.com"
|
}
|
||||||
},
|
]
|
||||||
{
|
}
|
||||||
"url": "https://www.sourcecodester.com/",
|
],
|
||||||
"source": "cna@vuldb.com"
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://github.com/sh3rl0ckpggp/0day/blob/main/authenticated_sqli_Employee_management_system.md",
|
||||||
|
"source": "cna@vuldb.com",
|
||||||
|
"tags": [
|
||||||
|
"Exploit",
|
||||||
|
"Third Party Advisory"
|
||||||
|
]
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://vuldb.com/?ctiid.284529",
|
||||||
|
"source": "cna@vuldb.com",
|
||||||
|
"tags": [
|
||||||
|
"Permissions Required",
|
||||||
|
"VDB Entry"
|
||||||
|
]
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://vuldb.com/?id.284529",
|
||||||
|
"source": "cna@vuldb.com",
|
||||||
|
"tags": [
|
||||||
|
"Third Party Advisory",
|
||||||
|
"VDB Entry"
|
||||||
|
]
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://vuldb.com/?submit.443298",
|
||||||
|
"source": "cna@vuldb.com",
|
||||||
|
"tags": [
|
||||||
|
"Third Party Advisory",
|
||||||
|
"VDB Entry"
|
||||||
|
]
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://www.sourcecodester.com/",
|
||||||
|
"source": "cna@vuldb.com",
|
||||||
|
"tags": [
|
||||||
|
"Product"
|
||||||
|
]
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
@ -2,8 +2,8 @@
|
|||||||
"id": "CVE-2024-11214",
|
"id": "CVE-2024-11214",
|
||||||
"sourceIdentifier": "cna@vuldb.com",
|
"sourceIdentifier": "cna@vuldb.com",
|
||||||
"published": "2024-11-14T16:15:18.707",
|
"published": "2024-11-14T16:15:18.707",
|
||||||
"lastModified": "2024-11-15T13:58:08.913",
|
"lastModified": "2024-11-19T15:38:59.060",
|
||||||
"vulnStatus": "Undergoing Analysis",
|
"vulnStatus": "Analyzed",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
@ -61,6 +61,26 @@
|
|||||||
}
|
}
|
||||||
],
|
],
|
||||||
"cvssMetricV31": [
|
"cvssMetricV31": [
|
||||||
|
{
|
||||||
|
"source": "nvd@nist.gov",
|
||||||
|
"type": "Primary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
|
||||||
|
"attackVector": "NETWORK",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "HIGH",
|
||||||
|
"userInteraction": "NONE",
|
||||||
|
"scope": "UNCHANGED",
|
||||||
|
"confidentialityImpact": "HIGH",
|
||||||
|
"integrityImpact": "HIGH",
|
||||||
|
"availabilityImpact": "HIGH",
|
||||||
|
"baseScore": 7.2,
|
||||||
|
"baseSeverity": "HIGH"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 1.2,
|
||||||
|
"impactScore": 5.9
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"source": "cna@vuldb.com",
|
"source": "cna@vuldb.com",
|
||||||
"type": "Secondary",
|
"type": "Secondary",
|
||||||
@ -109,6 +129,16 @@
|
|||||||
]
|
]
|
||||||
},
|
},
|
||||||
"weaknesses": [
|
"weaknesses": [
|
||||||
|
{
|
||||||
|
"source": "nvd@nist.gov",
|
||||||
|
"type": "Primary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-434"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"source": "cna@vuldb.com",
|
"source": "cna@vuldb.com",
|
||||||
"type": "Secondary",
|
"type": "Secondary",
|
||||||
@ -124,26 +154,62 @@
|
|||||||
]
|
]
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"references": [
|
"configurations": [
|
||||||
{
|
{
|
||||||
"url": "https://github.com/sh3rl0ckpggp/0day/blob/main/Employee_management%20_system_RCE.md",
|
"nodes": [
|
||||||
"source": "cna@vuldb.com"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"url": "https://vuldb.com/?ctiid.284530",
|
"operator": "OR",
|
||||||
"source": "cna@vuldb.com"
|
"negate": false,
|
||||||
},
|
"cpeMatch": [
|
||||||
{
|
{
|
||||||
"url": "https://vuldb.com/?id.284530",
|
"vulnerable": true,
|
||||||
"source": "cna@vuldb.com"
|
"criteria": "cpe:2.3:a:mayurik:best_employee_management_system:1.0:*:*:*:*:*:*:*",
|
||||||
},
|
"matchCriteriaId": "085DDBB3-1FD4-4947-916D-1AEF70F258C3"
|
||||||
{
|
}
|
||||||
"url": "https://vuldb.com/?submit.443304",
|
]
|
||||||
"source": "cna@vuldb.com"
|
}
|
||||||
},
|
]
|
||||||
{
|
}
|
||||||
"url": "https://www.sourcecodester.com/",
|
],
|
||||||
"source": "cna@vuldb.com"
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://github.com/sh3rl0ckpggp/0day/blob/main/Employee_management%20_system_RCE.md",
|
||||||
|
"source": "cna@vuldb.com",
|
||||||
|
"tags": [
|
||||||
|
"Exploit",
|
||||||
|
"Third Party Advisory"
|
||||||
|
]
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://vuldb.com/?ctiid.284530",
|
||||||
|
"source": "cna@vuldb.com",
|
||||||
|
"tags": [
|
||||||
|
"Permissions Required",
|
||||||
|
"VDB Entry"
|
||||||
|
]
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://vuldb.com/?id.284530",
|
||||||
|
"source": "cna@vuldb.com",
|
||||||
|
"tags": [
|
||||||
|
"Third Party Advisory",
|
||||||
|
"VDB Entry"
|
||||||
|
]
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://vuldb.com/?submit.443304",
|
||||||
|
"source": "cna@vuldb.com",
|
||||||
|
"tags": [
|
||||||
|
"Third Party Advisory",
|
||||||
|
"VDB Entry"
|
||||||
|
]
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://www.sourcecodester.com/",
|
||||||
|
"source": "cna@vuldb.com",
|
||||||
|
"tags": [
|
||||||
|
"Product"
|
||||||
|
]
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
@ -2,8 +2,8 @@
|
|||||||
"id": "CVE-2024-1367",
|
"id": "CVE-2024-1367",
|
||||||
"sourceIdentifier": "vulnreport@tenable.com",
|
"sourceIdentifier": "vulnreport@tenable.com",
|
||||||
"published": "2024-02-14T22:15:47.753",
|
"published": "2024-02-14T22:15:47.753",
|
||||||
"lastModified": "2024-02-15T06:23:39.303",
|
"lastModified": "2024-11-19T16:06:33.410",
|
||||||
"vulnStatus": "Undergoing Analysis",
|
"vulnStatus": "Analyzed",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
@ -17,6 +17,26 @@
|
|||||||
],
|
],
|
||||||
"metrics": {
|
"metrics": {
|
||||||
"cvssMetricV31": [
|
"cvssMetricV31": [
|
||||||
|
{
|
||||||
|
"source": "nvd@nist.gov",
|
||||||
|
"type": "Primary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
|
||||||
|
"attackVector": "NETWORK",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "HIGH",
|
||||||
|
"userInteraction": "NONE",
|
||||||
|
"scope": "UNCHANGED",
|
||||||
|
"confidentialityImpact": "HIGH",
|
||||||
|
"integrityImpact": "HIGH",
|
||||||
|
"availabilityImpact": "HIGH",
|
||||||
|
"baseScore": 7.2,
|
||||||
|
"baseSeverity": "HIGH"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 1.2,
|
||||||
|
"impactScore": 5.9
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"source": "vulnreport@tenable.com",
|
"source": "vulnreport@tenable.com",
|
||||||
"type": "Secondary",
|
"type": "Secondary",
|
||||||
@ -40,6 +60,16 @@
|
|||||||
]
|
]
|
||||||
},
|
},
|
||||||
"weaknesses": [
|
"weaknesses": [
|
||||||
|
{
|
||||||
|
"source": "nvd@nist.gov",
|
||||||
|
"type": "Primary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-78"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"source": "vulnreport@tenable.com",
|
"source": "vulnreport@tenable.com",
|
||||||
"type": "Secondary",
|
"type": "Secondary",
|
||||||
@ -51,10 +81,31 @@
|
|||||||
]
|
]
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"references": [
|
"configurations": [
|
||||||
{
|
{
|
||||||
"url": "https://www.tenable.com/security/tns-2024-02",
|
"nodes": [
|
||||||
"source": "vulnreport@tenable.com"
|
{
|
||||||
|
"operator": "OR",
|
||||||
|
"negate": false,
|
||||||
|
"cpeMatch": [
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:a:tenable:security_center:*:*:*:*:*:*:*:*",
|
||||||
|
"versionEndExcluding": "6.3.0",
|
||||||
|
"matchCriteriaId": "E4F24FE6-9C35-4B06-99E7-B38E07712148"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://www.tenable.com/security/tns-2024-02",
|
||||||
|
"source": "vulnreport@tenable.com",
|
||||||
|
"tags": [
|
||||||
|
"Vendor Advisory"
|
||||||
|
]
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
@ -2,8 +2,8 @@
|
|||||||
"id": "CVE-2024-1471",
|
"id": "CVE-2024-1471",
|
||||||
"sourceIdentifier": "vulnreport@tenable.com",
|
"sourceIdentifier": "vulnreport@tenable.com",
|
||||||
"published": "2024-02-14T22:15:47.953",
|
"published": "2024-02-14T22:15:47.953",
|
||||||
"lastModified": "2024-02-15T06:23:39.303",
|
"lastModified": "2024-11-19T16:05:53.247",
|
||||||
"vulnStatus": "Undergoing Analysis",
|
"vulnStatus": "Analyzed",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
@ -17,6 +17,26 @@
|
|||||||
],
|
],
|
||||||
"metrics": {
|
"metrics": {
|
||||||
"cvssMetricV31": [
|
"cvssMetricV31": [
|
||||||
|
{
|
||||||
|
"source": "nvd@nist.gov",
|
||||||
|
"type": "Primary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N",
|
||||||
|
"attackVector": "NETWORK",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "HIGH",
|
||||||
|
"userInteraction": "REQUIRED",
|
||||||
|
"scope": "CHANGED",
|
||||||
|
"confidentialityImpact": "LOW",
|
||||||
|
"integrityImpact": "LOW",
|
||||||
|
"availabilityImpact": "NONE",
|
||||||
|
"baseScore": 4.8,
|
||||||
|
"baseSeverity": "MEDIUM"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 1.7,
|
||||||
|
"impactScore": 2.7
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"source": "vulnreport@tenable.com",
|
"source": "vulnreport@tenable.com",
|
||||||
"type": "Secondary",
|
"type": "Secondary",
|
||||||
@ -40,6 +60,16 @@
|
|||||||
]
|
]
|
||||||
},
|
},
|
||||||
"weaknesses": [
|
"weaknesses": [
|
||||||
|
{
|
||||||
|
"source": "nvd@nist.gov",
|
||||||
|
"type": "Primary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-79"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"source": "vulnreport@tenable.com",
|
"source": "vulnreport@tenable.com",
|
||||||
"type": "Secondary",
|
"type": "Secondary",
|
||||||
@ -51,10 +81,31 @@
|
|||||||
]
|
]
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"references": [
|
"configurations": [
|
||||||
{
|
{
|
||||||
"url": "https://www.tenable.com/security/tns-2024-02",
|
"nodes": [
|
||||||
"source": "vulnreport@tenable.com"
|
{
|
||||||
|
"operator": "OR",
|
||||||
|
"negate": false,
|
||||||
|
"cpeMatch": [
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:a:tenable:security_center:*:*:*:*:*:*:*:*",
|
||||||
|
"versionEndExcluding": "6.3.0",
|
||||||
|
"matchCriteriaId": "E4F24FE6-9C35-4B06-99E7-B38E07712148"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://www.tenable.com/security/tns-2024-02",
|
||||||
|
"source": "vulnreport@tenable.com",
|
||||||
|
"tags": [
|
||||||
|
"Vendor Advisory"
|
||||||
|
]
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
@ -2,13 +2,17 @@
|
|||||||
"id": "CVE-2024-21287",
|
"id": "CVE-2024-21287",
|
||||||
"sourceIdentifier": "secalert_us@oracle.com",
|
"sourceIdentifier": "secalert_us@oracle.com",
|
||||||
"published": "2024-11-18T22:15:05.897",
|
"published": "2024-11-18T22:15:05.897",
|
||||||
"lastModified": "2024-11-18T22:15:05.897",
|
"lastModified": "2024-11-19T16:35:10.963",
|
||||||
"vulnStatus": "Received",
|
"vulnStatus": "Received",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
"lang": "en",
|
"lang": "en",
|
||||||
"value": "Vulnerability in the Oracle Agile PLM Framework product of Oracle Supply Chain (component: Software Development Kit, Process Extension). The supported version that is affected is 9.3.6. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Agile PLM Framework. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle Agile PLM Framework accessible data. CVSS 3.1 Base Score 7.5 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N)."
|
"value": "Vulnerability in the Oracle Agile PLM Framework product of Oracle Supply Chain (component: Software Development Kit, Process Extension). The supported version that is affected is 9.3.6. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Agile PLM Framework. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle Agile PLM Framework accessible data. CVSS 3.1 Base Score 7.5 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N)."
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"lang": "es",
|
||||||
|
"value": "Vulnerabilidad en el producto Oracle Agile PLM Framework de Oracle Supply Chain (componente: Kit de desarrollo de software, extensi\u00f3n de proceso). La versi\u00f3n compatible afectada es la 9.3.6. Esta vulnerabilidad, que se puede explotar f\u00e1cilmente, permite que un atacante no autenticado con acceso a la red a trav\u00e9s de HTTP ponga en peligro Oracle Agile PLM Framework. Los ataques exitosos de esta vulnerabilidad pueden dar como resultado un acceso no autorizado a datos cr\u00edticos o un acceso completo a todos los datos accesibles de Oracle Agile PLM Framework. Puntuaci\u00f3n base de CVSS 3.1: 7,5 (impactos de confidencialidad). Vector CVSS: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N)."
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"metrics": {
|
"metrics": {
|
||||||
@ -35,6 +39,18 @@
|
|||||||
}
|
}
|
||||||
]
|
]
|
||||||
},
|
},
|
||||||
|
"weaknesses": [
|
||||||
|
{
|
||||||
|
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||||
|
"type": "Secondary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-863"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
"references": [
|
"references": [
|
||||||
{
|
{
|
||||||
"url": "https://www.oracle.com/security-alerts/alert-cve-2024-21287.html",
|
"url": "https://www.oracle.com/security-alerts/alert-cve-2024-21287.html",
|
||||||
|
@ -2,13 +2,17 @@
|
|||||||
"id": "CVE-2024-21539",
|
"id": "CVE-2024-21539",
|
||||||
"sourceIdentifier": "report@snyk.io",
|
"sourceIdentifier": "report@snyk.io",
|
||||||
"published": "2024-11-19T05:15:16.453",
|
"published": "2024-11-19T05:15:16.453",
|
||||||
"lastModified": "2024-11-19T05:15:16.453",
|
"lastModified": "2024-11-19T16:35:11.720",
|
||||||
"vulnStatus": "Received",
|
"vulnStatus": "Received",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
"lang": "en",
|
"lang": "en",
|
||||||
"value": "Versions of the package @eslint/plugin-kit before 0.2.3 are vulnerable to Regular Expression Denial of Service (ReDoS) due to improper input sanitization. An attacker can increase the CPU usage and crash the program by exploiting this vulnerability."
|
"value": "Versions of the package @eslint/plugin-kit before 0.2.3 are vulnerable to Regular Expression Denial of Service (ReDoS) due to improper input sanitization. An attacker can increase the CPU usage and crash the program by exploiting this vulnerability."
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"lang": "es",
|
||||||
|
"value": "Las versiones del paquete @eslint/plugin-kit anteriores a la 0.2.3 son vulnerables a la denegaci\u00f3n de servicio por expresi\u00f3n regular (ReDoS) debido a una desinfecci\u00f3n de entrada incorrecta. Un atacante puede aumentar el uso de la CPU y bloquear el programa al explotar esta vulnerabilidad."
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"metrics": {
|
"metrics": {
|
||||||
@ -45,6 +49,16 @@
|
|||||||
"value": "CWE-1333"
|
"value": "CWE-1333"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||||
|
"type": "Secondary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-770"
|
||||||
|
}
|
||||||
|
]
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"references": [
|
"references": [
|
||||||
|
@ -2,8 +2,8 @@
|
|||||||
"id": "CVE-2024-21541",
|
"id": "CVE-2024-21541",
|
||||||
"sourceIdentifier": "report@snyk.io",
|
"sourceIdentifier": "report@snyk.io",
|
||||||
"published": "2024-11-13T05:15:14.680",
|
"published": "2024-11-13T05:15:14.680",
|
||||||
"lastModified": "2024-11-13T17:01:16.850",
|
"lastModified": "2024-11-19T16:20:37.887",
|
||||||
"vulnStatus": "Awaiting Analysis",
|
"vulnStatus": "Analyzed",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
@ -17,6 +17,26 @@
|
|||||||
],
|
],
|
||||||
"metrics": {
|
"metrics": {
|
||||||
"cvssMetricV31": [
|
"cvssMetricV31": [
|
||||||
|
{
|
||||||
|
"source": "nvd@nist.gov",
|
||||||
|
"type": "Primary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||||
|
"attackVector": "NETWORK",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "NONE",
|
||||||
|
"userInteraction": "NONE",
|
||||||
|
"scope": "UNCHANGED",
|
||||||
|
"confidentialityImpact": "HIGH",
|
||||||
|
"integrityImpact": "HIGH",
|
||||||
|
"availabilityImpact": "HIGH",
|
||||||
|
"baseScore": 9.8,
|
||||||
|
"baseSeverity": "CRITICAL"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 3.9,
|
||||||
|
"impactScore": 5.9
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"source": "report@snyk.io",
|
"source": "report@snyk.io",
|
||||||
"type": "Secondary",
|
"type": "Secondary",
|
||||||
@ -40,6 +60,16 @@
|
|||||||
]
|
]
|
||||||
},
|
},
|
||||||
"weaknesses": [
|
"weaknesses": [
|
||||||
|
{
|
||||||
|
"source": "nvd@nist.gov",
|
||||||
|
"type": "Primary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-94"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"source": "report@snyk.io",
|
"source": "report@snyk.io",
|
||||||
"type": "Secondary",
|
"type": "Secondary",
|
||||||
@ -51,10 +81,32 @@
|
|||||||
]
|
]
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"references": [
|
"configurations": [
|
||||||
{
|
{
|
||||||
"url": "https://security.snyk.io/vuln/SNYK-JS-DOMITERATOR-6157199",
|
"nodes": [
|
||||||
"source": "report@snyk.io"
|
{
|
||||||
|
"operator": "OR",
|
||||||
|
"negate": false,
|
||||||
|
"cpeMatch": [
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:a:matthewmueller:dom-iterator:*:*:*:*:*:node.js:*:*",
|
||||||
|
"versionEndIncluding": "1.0.0",
|
||||||
|
"matchCriteriaId": "23F03C7B-1A8B-4FB7-9A5D-FE3C08D3ED56"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://security.snyk.io/vuln/SNYK-JS-DOMITERATOR-6157199",
|
||||||
|
"source": "report@snyk.io",
|
||||||
|
"tags": [
|
||||||
|
"Exploit",
|
||||||
|
"Third Party Advisory"
|
||||||
|
]
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
@ -2,7 +2,7 @@
|
|||||||
"id": "CVE-2024-31141",
|
"id": "CVE-2024-31141",
|
||||||
"sourceIdentifier": "security@apache.org",
|
"sourceIdentifier": "security@apache.org",
|
||||||
"published": "2024-11-19T09:15:03.860",
|
"published": "2024-11-19T09:15:03.860",
|
||||||
"lastModified": "2024-11-19T09:15:03.860",
|
"lastModified": "2024-11-19T15:35:06.263",
|
||||||
"vulnStatus": "Received",
|
"vulnStatus": "Received",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
@ -15,7 +15,30 @@
|
|||||||
"value": "Archivos o directorios accesibles para terceros, vulnerabilidad de administraci\u00f3n incorrecta de privilegios en clientes Apache Kafka. Los clientes Apache Kafka aceptan datos de configuraci\u00f3n para personalizar el comportamiento e incluyen complementos ConfigProvider para manipular estas configuraciones. Apache Kafka tambi\u00e9n proporciona implementaciones FileConfigProvider, DirectoryConfigProvider y EnvVarConfigProvider que incluyen la capacidad de leer desde el disco o variables de entorno. En aplicaciones donde las configuraciones de los clientes Apache Kafka pueden ser especificadas por un tercero que no es de confianza, los atacantes pueden usar estos ConfigProviders para leer contenido arbitrario del disco y las variables de entorno. En particular, esta falla puede usarse en Apache Kafka Connect para escalar desde el acceso a la API REST al acceso al sistema de archivos/entorno, lo que puede ser indeseable en ciertos entornos, incluidos los productos SaaS. Este problema afecta a los clientes Apache Kafka: desde 2.3.0 hasta 3.5.2, 3.6.2, 3.7.0. Se recomienda a los usuarios con aplicaciones afectadas que actualicen los clientes de Kafka a la versi\u00f3n >=3.8.0 y configuren la propiedad del sistema JVM \"org.apache.kafka.automatic.config.providers=none\". Tambi\u00e9n se recomienda a los usuarios de Kafka Connect con una de las implementaciones de ConfigProvider enumeradas en la configuraci\u00f3n de su trabajador que agreguen \"allowlist.pattern\" y \"allowed.paths\" adecuados para restringir su funcionamiento a los l\u00edmites adecuados. Para los usuarios de Kafka Clients o Kafka Connect en entornos que conf\u00edan a los usuarios el acceso a discos y variables de entorno, no se recomienda configurar la propiedad del sistema. Para los usuarios de Kafka Broker, Kafka MirrorMaker 2.0, Kafka Streams y las herramientas de l\u00ednea de comandos de Kafka, no se recomienda configurar la propiedad del sistema."
|
"value": "Archivos o directorios accesibles para terceros, vulnerabilidad de administraci\u00f3n incorrecta de privilegios en clientes Apache Kafka. Los clientes Apache Kafka aceptan datos de configuraci\u00f3n para personalizar el comportamiento e incluyen complementos ConfigProvider para manipular estas configuraciones. Apache Kafka tambi\u00e9n proporciona implementaciones FileConfigProvider, DirectoryConfigProvider y EnvVarConfigProvider que incluyen la capacidad de leer desde el disco o variables de entorno. En aplicaciones donde las configuraciones de los clientes Apache Kafka pueden ser especificadas por un tercero que no es de confianza, los atacantes pueden usar estos ConfigProviders para leer contenido arbitrario del disco y las variables de entorno. En particular, esta falla puede usarse en Apache Kafka Connect para escalar desde el acceso a la API REST al acceso al sistema de archivos/entorno, lo que puede ser indeseable en ciertos entornos, incluidos los productos SaaS. Este problema afecta a los clientes Apache Kafka: desde 2.3.0 hasta 3.5.2, 3.6.2, 3.7.0. Se recomienda a los usuarios con aplicaciones afectadas que actualicen los clientes de Kafka a la versi\u00f3n >=3.8.0 y configuren la propiedad del sistema JVM \"org.apache.kafka.automatic.config.providers=none\". Tambi\u00e9n se recomienda a los usuarios de Kafka Connect con una de las implementaciones de ConfigProvider enumeradas en la configuraci\u00f3n de su trabajador que agreguen \"allowlist.pattern\" y \"allowed.paths\" adecuados para restringir su funcionamiento a los l\u00edmites adecuados. Para los usuarios de Kafka Clients o Kafka Connect en entornos que conf\u00edan a los usuarios el acceso a discos y variables de entorno, no se recomienda configurar la propiedad del sistema. Para los usuarios de Kafka Broker, Kafka MirrorMaker 2.0, Kafka Streams y las herramientas de l\u00ednea de comandos de Kafka, no se recomienda configurar la propiedad del sistema."
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"metrics": {},
|
"metrics": {
|
||||||
|
"cvssMetricV31": [
|
||||||
|
{
|
||||||
|
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||||
|
"type": "Secondary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
|
||||||
|
"attackVector": "NETWORK",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "LOW",
|
||||||
|
"userInteraction": "NONE",
|
||||||
|
"scope": "UNCHANGED",
|
||||||
|
"confidentialityImpact": "HIGH",
|
||||||
|
"integrityImpact": "NONE",
|
||||||
|
"availabilityImpact": "NONE",
|
||||||
|
"baseScore": 6.5,
|
||||||
|
"baseSeverity": "MEDIUM"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 2.8,
|
||||||
|
"impactScore": 3.6
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
"weaknesses": [
|
"weaknesses": [
|
||||||
{
|
{
|
||||||
"source": "security@apache.org",
|
"source": "security@apache.org",
|
||||||
|
@ -2,16 +2,55 @@
|
|||||||
"id": "CVE-2024-33231",
|
"id": "CVE-2024-33231",
|
||||||
"sourceIdentifier": "cve@mitre.org",
|
"sourceIdentifier": "cve@mitre.org",
|
||||||
"published": "2024-11-18T23:15:04.783",
|
"published": "2024-11-18T23:15:04.783",
|
||||||
"lastModified": "2024-11-18T23:15:04.783",
|
"lastModified": "2024-11-19T15:35:06.980",
|
||||||
"vulnStatus": "Received",
|
"vulnStatus": "Received",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
"lang": "en",
|
"lang": "en",
|
||||||
"value": "Cross Site Scripting vulnerability in Ferozo Email version 1.1 allows a local attacker to execute arbitrary code via a crafted payload to the PDF preview component."
|
"value": "Cross Site Scripting vulnerability in Ferozo Email version 1.1 allows a local attacker to execute arbitrary code via a crafted payload to the PDF preview component."
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"lang": "es",
|
||||||
|
"value": "La vulnerabilidad de cross-site scripting en Ferozo Email versi\u00f3n 1.1 permite a un atacante local ejecutar c\u00f3digo arbitrario a trav\u00e9s de un payload manipulado para el componente de vista previa de PDF."
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"metrics": {
|
||||||
|
"cvssMetricV31": [
|
||||||
|
{
|
||||||
|
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||||
|
"type": "Secondary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
|
||||||
|
"attackVector": "NETWORK",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "LOW",
|
||||||
|
"userInteraction": "REQUIRED",
|
||||||
|
"scope": "CHANGED",
|
||||||
|
"confidentialityImpact": "LOW",
|
||||||
|
"integrityImpact": "LOW",
|
||||||
|
"availabilityImpact": "NONE",
|
||||||
|
"baseScore": 5.4,
|
||||||
|
"baseSeverity": "MEDIUM"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 2.3,
|
||||||
|
"impactScore": 2.7
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"weaknesses": [
|
||||||
|
{
|
||||||
|
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||||
|
"type": "Secondary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-79"
|
||||||
|
}
|
||||||
|
]
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"metrics": {},
|
|
||||||
"references": [
|
"references": [
|
||||||
{
|
{
|
||||||
"url": "https://github.com/fdzdev/CVE-2024-33231",
|
"url": "https://github.com/fdzdev/CVE-2024-33231",
|
||||||
|
@ -2,7 +2,7 @@
|
|||||||
"id": "CVE-2024-47208",
|
"id": "CVE-2024-47208",
|
||||||
"sourceIdentifier": "security@apache.org",
|
"sourceIdentifier": "security@apache.org",
|
||||||
"published": "2024-11-18T09:15:06.100",
|
"published": "2024-11-18T09:15:06.100",
|
||||||
"lastModified": "2024-11-18T17:11:17.393",
|
"lastModified": "2024-11-19T15:35:09.570",
|
||||||
"vulnStatus": "Awaiting Analysis",
|
"vulnStatus": "Awaiting Analysis",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
@ -15,7 +15,30 @@
|
|||||||
"value": "Vulnerabilidad de falsificaci\u00f3n de solicitud del lado del servidor (SSRF) y control inadecuado de la generaci\u00f3n de c\u00f3digo ('inyecci\u00f3n de c\u00f3digo') en Apache OFBiz. Este problema afecta a Apache OFBiz: anterior a la versi\u00f3n 18.12.17. Se recomienda a los usuarios que actualicen a la versi\u00f3n 18.12.17, que soluciona el problema."
|
"value": "Vulnerabilidad de falsificaci\u00f3n de solicitud del lado del servidor (SSRF) y control inadecuado de la generaci\u00f3n de c\u00f3digo ('inyecci\u00f3n de c\u00f3digo') en Apache OFBiz. Este problema afecta a Apache OFBiz: anterior a la versi\u00f3n 18.12.17. Se recomienda a los usuarios que actualicen a la versi\u00f3n 18.12.17, que soluciona el problema."
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"metrics": {},
|
"metrics": {
|
||||||
|
"cvssMetricV31": [
|
||||||
|
{
|
||||||
|
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||||
|
"type": "Secondary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||||
|
"attackVector": "NETWORK",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "NONE",
|
||||||
|
"userInteraction": "NONE",
|
||||||
|
"scope": "UNCHANGED",
|
||||||
|
"confidentialityImpact": "HIGH",
|
||||||
|
"integrityImpact": "HIGH",
|
||||||
|
"availabilityImpact": "HIGH",
|
||||||
|
"baseScore": 9.8,
|
||||||
|
"baseSeverity": "CRITICAL"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 3.9,
|
||||||
|
"impactScore": 5.9
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
"weaknesses": [
|
"weaknesses": [
|
||||||
{
|
{
|
||||||
"source": "security@apache.org",
|
"source": "security@apache.org",
|
||||||
|
@ -2,8 +2,8 @@
|
|||||||
"id": "CVE-2024-48284",
|
"id": "CVE-2024-48284",
|
||||||
"sourceIdentifier": "cve@mitre.org",
|
"sourceIdentifier": "cve@mitre.org",
|
||||||
"published": "2024-11-14T18:15:19.150",
|
"published": "2024-11-14T18:15:19.150",
|
||||||
"lastModified": "2024-11-18T18:35:04.410",
|
"lastModified": "2024-11-19T15:45:55.450",
|
||||||
"vulnStatus": "Undergoing Analysis",
|
"vulnStatus": "Analyzed",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
@ -17,6 +17,26 @@
|
|||||||
],
|
],
|
||||||
"metrics": {
|
"metrics": {
|
||||||
"cvssMetricV31": [
|
"cvssMetricV31": [
|
||||||
|
{
|
||||||
|
"source": "nvd@nist.gov",
|
||||||
|
"type": "Primary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N",
|
||||||
|
"attackVector": "NETWORK",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "HIGH",
|
||||||
|
"userInteraction": "REQUIRED",
|
||||||
|
"scope": "CHANGED",
|
||||||
|
"confidentialityImpact": "LOW",
|
||||||
|
"integrityImpact": "LOW",
|
||||||
|
"availabilityImpact": "NONE",
|
||||||
|
"baseScore": 4.8,
|
||||||
|
"baseSeverity": "MEDIUM"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 1.7,
|
||||||
|
"impactScore": 2.7
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||||
"type": "Secondary",
|
"type": "Secondary",
|
||||||
@ -40,6 +60,16 @@
|
|||||||
]
|
]
|
||||||
},
|
},
|
||||||
"weaknesses": [
|
"weaknesses": [
|
||||||
|
{
|
||||||
|
"source": "nvd@nist.gov",
|
||||||
|
"type": "Primary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-79"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||||
"type": "Secondary",
|
"type": "Secondary",
|
||||||
@ -51,10 +81,31 @@
|
|||||||
]
|
]
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"references": [
|
"configurations": [
|
||||||
{
|
{
|
||||||
"url": "https://github.com/m14r41/Writeups/blob/main/CVE/phpGurukul/User%20Registration%20%26%20Login%20and%20User%20Management%20System%20With%20admin%20panel/Reflected%20XSS%20-%20Search.md",
|
"nodes": [
|
||||||
"source": "cve@mitre.org"
|
{
|
||||||
|
"operator": "OR",
|
||||||
|
"negate": false,
|
||||||
|
"cpeMatch": [
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:a:phpgurukul:user_registration_\\&_login_and_user_management_system:3.2:*:*:*:*:*:*:*",
|
||||||
|
"matchCriteriaId": "48B4855A-8E96-4F34-8235-27971366F46E"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://github.com/m14r41/Writeups/blob/main/CVE/phpGurukul/User%20Registration%20%26%20Login%20and%20User%20Management%20System%20With%20admin%20panel/Reflected%20XSS%20-%20Search.md",
|
||||||
|
"source": "cve@mitre.org",
|
||||||
|
"tags": [
|
||||||
|
"Exploit",
|
||||||
|
"Third Party Advisory"
|
||||||
|
]
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
@ -2,16 +2,55 @@
|
|||||||
"id": "CVE-2024-48292",
|
"id": "CVE-2024-48292",
|
||||||
"sourceIdentifier": "cve@mitre.org",
|
"sourceIdentifier": "cve@mitre.org",
|
||||||
"published": "2024-11-18T18:15:06.260",
|
"published": "2024-11-18T18:15:06.260",
|
||||||
"lastModified": "2024-11-18T18:15:06.260",
|
"lastModified": "2024-11-19T16:35:12.460",
|
||||||
"vulnStatus": "Received",
|
"vulnStatus": "Received",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
"lang": "en",
|
"lang": "en",
|
||||||
"value": "An issue in the wssrvc.exe service of QuickHeal Antivirus Pro Version v24.0 and Quick Heal Total Security v24.0 allows authenticated attackers to escalate privileges."
|
"value": "An issue in the wssrvc.exe service of QuickHeal Antivirus Pro Version v24.0 and Quick Heal Total Security v24.0 allows authenticated attackers to escalate privileges."
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"lang": "es",
|
||||||
|
"value": "Un problema en el servicio wssrvc.exe de QuickHeal Antivirus Pro versi\u00f3n v24.0 y Quick Heal Total Security v24.0 permite a atacantes autenticados escalar privilegios."
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"metrics": {
|
||||||
|
"cvssMetricV31": [
|
||||||
|
{
|
||||||
|
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||||
|
"type": "Secondary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||||
|
"attackVector": "NETWORK",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "LOW",
|
||||||
|
"userInteraction": "NONE",
|
||||||
|
"scope": "UNCHANGED",
|
||||||
|
"confidentialityImpact": "HIGH",
|
||||||
|
"integrityImpact": "HIGH",
|
||||||
|
"availabilityImpact": "HIGH",
|
||||||
|
"baseScore": 8.8,
|
||||||
|
"baseSeverity": "HIGH"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 2.8,
|
||||||
|
"impactScore": 5.9
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"weaknesses": [
|
||||||
|
{
|
||||||
|
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||||
|
"type": "Secondary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-276"
|
||||||
|
}
|
||||||
|
]
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"metrics": {},
|
|
||||||
"references": [
|
"references": [
|
||||||
{
|
{
|
||||||
"url": "https://github.com/Nero22k/Disclosures/blob/main/QuickHealAV/CVE-2024-48292.md",
|
"url": "https://github.com/Nero22k/Disclosures/blob/main/QuickHealAV/CVE-2024-48292.md",
|
||||||
|
@ -2,16 +2,55 @@
|
|||||||
"id": "CVE-2024-48293",
|
"id": "CVE-2024-48293",
|
||||||
"sourceIdentifier": "cve@mitre.org",
|
"sourceIdentifier": "cve@mitre.org",
|
||||||
"published": "2024-11-18T19:15:05.527",
|
"published": "2024-11-18T19:15:05.527",
|
||||||
"lastModified": "2024-11-18T19:15:05.527",
|
"lastModified": "2024-11-19T16:35:13.320",
|
||||||
"vulnStatus": "Received",
|
"vulnStatus": "Received",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
"lang": "en",
|
"lang": "en",
|
||||||
"value": "Incorrect access control in QuickHeal Antivirus Pro 24.1.0.182 and earlier allows authenticated attackers with low-level privileges to arbitrarily modify antivirus settings."
|
"value": "Incorrect access control in QuickHeal Antivirus Pro 24.1.0.182 and earlier allows authenticated attackers with low-level privileges to arbitrarily modify antivirus settings."
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"lang": "es",
|
||||||
|
"value": "El control de acceso incorrecto en QuickHeal Antivirus Pro 24.1.0.182 y versiones anteriores permite a atacantes autenticados con privilegios de bajo nivel modificar arbitrariamente la configuraci\u00f3n del antivirus."
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"metrics": {
|
||||||
|
"cvssMetricV31": [
|
||||||
|
{
|
||||||
|
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||||
|
"type": "Secondary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N",
|
||||||
|
"attackVector": "NETWORK",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "LOW",
|
||||||
|
"userInteraction": "NONE",
|
||||||
|
"scope": "UNCHANGED",
|
||||||
|
"confidentialityImpact": "NONE",
|
||||||
|
"integrityImpact": "HIGH",
|
||||||
|
"availabilityImpact": "NONE",
|
||||||
|
"baseScore": 6.5,
|
||||||
|
"baseSeverity": "MEDIUM"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 2.8,
|
||||||
|
"impactScore": 3.6
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"weaknesses": [
|
||||||
|
{
|
||||||
|
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||||
|
"type": "Secondary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-276"
|
||||||
|
}
|
||||||
|
]
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"metrics": {},
|
|
||||||
"references": [
|
"references": [
|
||||||
{
|
{
|
||||||
"url": "https://github.com/Nero22k/Disclosures/blob/main/QuickHealAV/CVE-2024-48293.md",
|
"url": "https://github.com/Nero22k/Disclosures/blob/main/QuickHealAV/CVE-2024-48293.md",
|
||||||
|
@ -2,16 +2,55 @@
|
|||||||
"id": "CVE-2024-48294",
|
"id": "CVE-2024-48294",
|
||||||
"sourceIdentifier": "cve@mitre.org",
|
"sourceIdentifier": "cve@mitre.org",
|
||||||
"published": "2024-11-18T19:15:05.590",
|
"published": "2024-11-18T19:15:05.590",
|
||||||
"lastModified": "2024-11-18T19:15:05.590",
|
"lastModified": "2024-11-19T16:35:14.130",
|
||||||
"vulnStatus": "Received",
|
"vulnStatus": "Received",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
"lang": "en",
|
"lang": "en",
|
||||||
"value": "A NULL pointer dereference in the component libPdfCore.dll of Wondershare PDF Reader v1.0.9.2544 allows attackers to cause a Denial of Service (DoS) via a crafted PDF file."
|
"value": "A NULL pointer dereference in the component libPdfCore.dll of Wondershare PDF Reader v1.0.9.2544 allows attackers to cause a Denial of Service (DoS) via a crafted PDF file."
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"lang": "es",
|
||||||
|
"value": "Una desreferencia de puntero NULL en el componente libPdfCore.dll de Wondershare PDF Reader v1.0.9.2544 permite a los atacantes provocar una denegaci\u00f3n de servicio (DoS) a trav\u00e9s de un archivo PDF manipulado."
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"metrics": {
|
||||||
|
"cvssMetricV31": [
|
||||||
|
{
|
||||||
|
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||||
|
"type": "Secondary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||||||
|
"attackVector": "LOCAL",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "LOW",
|
||||||
|
"userInteraction": "NONE",
|
||||||
|
"scope": "UNCHANGED",
|
||||||
|
"confidentialityImpact": "NONE",
|
||||||
|
"integrityImpact": "NONE",
|
||||||
|
"availabilityImpact": "HIGH",
|
||||||
|
"baseScore": 5.5,
|
||||||
|
"baseSeverity": "MEDIUM"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 1.8,
|
||||||
|
"impactScore": 3.6
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"weaknesses": [
|
||||||
|
{
|
||||||
|
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||||
|
"type": "Secondary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-476"
|
||||||
|
}
|
||||||
|
]
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"metrics": {},
|
|
||||||
"references": [
|
"references": [
|
||||||
{
|
{
|
||||||
"url": "https://github.com/Nero22k/Disclosures/tree/main/Wondershare%20PDF%20Reader",
|
"url": "https://github.com/Nero22k/Disclosures/tree/main/Wondershare%20PDF%20Reader",
|
||||||
|
@ -2,8 +2,8 @@
|
|||||||
"id": "CVE-2024-48897",
|
"id": "CVE-2024-48897",
|
||||||
"sourceIdentifier": "secalert@redhat.com",
|
"sourceIdentifier": "secalert@redhat.com",
|
||||||
"published": "2024-11-18T12:15:18.243",
|
"published": "2024-11-18T12:15:18.243",
|
||||||
"lastModified": "2024-11-18T17:11:17.393",
|
"lastModified": "2024-11-19T15:35:09.867",
|
||||||
"vulnStatus": "Awaiting Analysis",
|
"vulnStatus": "Undergoing Analysis",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
@ -15,7 +15,30 @@
|
|||||||
"value": "Se encontr\u00f3 una vulnerabilidad en Moodle. Se requieren verificaciones adicionales para garantizar que los usuarios solo puedan editar o eliminar los feeds RSS que tengan permiso para modificar."
|
"value": "Se encontr\u00f3 una vulnerabilidad en Moodle. Se requieren verificaciones adicionales para garantizar que los usuarios solo puedan editar o eliminar los feeds RSS que tengan permiso para modificar."
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"metrics": {},
|
"metrics": {
|
||||||
|
"cvssMetricV31": [
|
||||||
|
{
|
||||||
|
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||||
|
"type": "Secondary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N",
|
||||||
|
"attackVector": "NETWORK",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "LOW",
|
||||||
|
"userInteraction": "NONE",
|
||||||
|
"scope": "UNCHANGED",
|
||||||
|
"confidentialityImpact": "NONE",
|
||||||
|
"integrityImpact": "HIGH",
|
||||||
|
"availabilityImpact": "NONE",
|
||||||
|
"baseScore": 6.5,
|
||||||
|
"baseSeverity": "MEDIUM"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 2.8,
|
||||||
|
"impactScore": 3.6
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
"weaknesses": [
|
"weaknesses": [
|
||||||
{
|
{
|
||||||
"source": "secalert@redhat.com",
|
"source": "secalert@redhat.com",
|
||||||
|
@ -2,7 +2,7 @@
|
|||||||
"id": "CVE-2024-48962",
|
"id": "CVE-2024-48962",
|
||||||
"sourceIdentifier": "security@apache.org",
|
"sourceIdentifier": "security@apache.org",
|
||||||
"published": "2024-11-18T09:15:06.237",
|
"published": "2024-11-18T09:15:06.237",
|
||||||
"lastModified": "2024-11-18T17:11:17.393",
|
"lastModified": "2024-11-19T16:35:14.930",
|
||||||
"vulnStatus": "Awaiting Analysis",
|
"vulnStatus": "Awaiting Analysis",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
@ -59,6 +59,28 @@
|
|||||||
"baseSeverity": "HIGH"
|
"baseSeverity": "HIGH"
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
],
|
||||||
|
"cvssMetricV31": [
|
||||||
|
{
|
||||||
|
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||||
|
"type": "Secondary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||||||
|
"attackVector": "NETWORK",
|
||||||
|
"attackComplexity": "HIGH",
|
||||||
|
"privilegesRequired": "NONE",
|
||||||
|
"userInteraction": "REQUIRED",
|
||||||
|
"scope": "UNCHANGED",
|
||||||
|
"confidentialityImpact": "HIGH",
|
||||||
|
"integrityImpact": "HIGH",
|
||||||
|
"availabilityImpact": "HIGH",
|
||||||
|
"baseScore": 7.5,
|
||||||
|
"baseSeverity": "HIGH"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 1.6,
|
||||||
|
"impactScore": 5.9
|
||||||
|
}
|
||||||
]
|
]
|
||||||
},
|
},
|
||||||
"weaknesses": [
|
"weaknesses": [
|
||||||
|
@ -2,8 +2,8 @@
|
|||||||
"id": "CVE-2024-50201",
|
"id": "CVE-2024-50201",
|
||||||
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||||
"published": "2024-11-08T06:15:16.663",
|
"published": "2024-11-08T06:15:16.663",
|
||||||
"lastModified": "2024-11-08T19:01:03.880",
|
"lastModified": "2024-11-19T16:08:36.890",
|
||||||
"vulnStatus": "Undergoing Analysis",
|
"vulnStatus": "Analyzed",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
@ -15,31 +15,146 @@
|
|||||||
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: drm/radeon: Fix encoder->possible_clones Incluir el codificador en s\u00ed mismo en su m\u00e1scara de bits possible_clones. En el pasado, nada validaba que los controladores estuvieran completando possible_clones correctamente, pero eso cambi\u00f3 en el commit 74d2aacbe840 (\"drm: Validate encoder->possible_clones\"). Parece que Radeon nunca recibi\u00f3 la nota y todav\u00eda no sigue las reglas correctamente al 100%. Esto genera algunas advertencias durante la inicializaci\u00f3n del controlador: Possible_clones falsos: [ENCODER:46:TV-46] possible_clones=0x4 (full encoder mask=0x7) ADVERTENCIA: CPU: 0 PID: 170 en drivers/gpu/drm/drm_mode_config.c:615 drm_mode_config_validate+0x113/0x39c ... (seleccionado de el commit 3b6e7d40649c0d75572039aff9d0911864c689db)"
|
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: drm/radeon: Fix encoder->possible_clones Incluir el codificador en s\u00ed mismo en su m\u00e1scara de bits possible_clones. En el pasado, nada validaba que los controladores estuvieran completando possible_clones correctamente, pero eso cambi\u00f3 en el commit 74d2aacbe840 (\"drm: Validate encoder->possible_clones\"). Parece que Radeon nunca recibi\u00f3 la nota y todav\u00eda no sigue las reglas correctamente al 100%. Esto genera algunas advertencias durante la inicializaci\u00f3n del controlador: Possible_clones falsos: [ENCODER:46:TV-46] possible_clones=0x4 (full encoder mask=0x7) ADVERTENCIA: CPU: 0 PID: 170 en drivers/gpu/drm/drm_mode_config.c:615 drm_mode_config_validate+0x113/0x39c ... (seleccionado de el commit 3b6e7d40649c0d75572039aff9d0911864c689db)"
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"metrics": {},
|
"metrics": {
|
||||||
"references": [
|
"cvssMetricV31": [
|
||||||
{
|
{
|
||||||
"url": "https://git.kernel.org/stable/c/1a235af0216411a32ab4db54f7bd19020b46c86d",
|
"source": "nvd@nist.gov",
|
||||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
"type": "Primary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||||||
|
"attackVector": "LOCAL",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "LOW",
|
||||||
|
"userInteraction": "NONE",
|
||||||
|
"scope": "UNCHANGED",
|
||||||
|
"confidentialityImpact": "NONE",
|
||||||
|
"integrityImpact": "NONE",
|
||||||
|
"availabilityImpact": "HIGH",
|
||||||
|
"baseScore": 5.5,
|
||||||
|
"baseSeverity": "MEDIUM"
|
||||||
},
|
},
|
||||||
{
|
"exploitabilityScore": 1.8,
|
||||||
"url": "https://git.kernel.org/stable/c/28127dba64d8ae1a0b737b973d6d029908599611",
|
"impactScore": 3.6
|
||||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
}
|
||||||
|
]
|
||||||
},
|
},
|
||||||
|
"weaknesses": [
|
||||||
{
|
{
|
||||||
"url": "https://git.kernel.org/stable/c/68801730ebb9393460b30cd3885e407f15da27a9",
|
"source": "nvd@nist.gov",
|
||||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
"type": "Primary",
|
||||||
},
|
"description": [
|
||||||
{
|
{
|
||||||
"url": "https://git.kernel.org/stable/c/c3cd27d85f0778f4ec07384d7516b33153759b8e",
|
"lang": "en",
|
||||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
"value": "NVD-CWE-noinfo"
|
||||||
},
|
}
|
||||||
{
|
]
|
||||||
"url": "https://git.kernel.org/stable/c/df75c78bfeff99f9b4815c3e79e2b1b1e34fe264",
|
}
|
||||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
],
|
||||||
},
|
"configurations": [
|
||||||
{
|
{
|
||||||
"url": "https://git.kernel.org/stable/c/fda5dc80121b12871dc343ab37e0c3f0d138825d",
|
"nodes": [
|
||||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
{
|
||||||
|
"operator": "OR",
|
||||||
|
"negate": false,
|
||||||
|
"cpeMatch": [
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||||
|
"versionStartIncluding": "5.8",
|
||||||
|
"versionEndExcluding": "5.10.228",
|
||||||
|
"matchCriteriaId": "375994E0-BEE6-4DEC-928A-BE3C9E3A211D"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||||
|
"versionStartIncluding": "5.11",
|
||||||
|
"versionEndExcluding": "5.15.169",
|
||||||
|
"matchCriteriaId": "18BEDAD6-86F8-457C-952F-C35698B3D07F"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||||
|
"versionStartIncluding": "5.16",
|
||||||
|
"versionEndExcluding": "6.1.114",
|
||||||
|
"matchCriteriaId": "10FD2B3E-C7D9-4A9C-BD64-41877EDF88EB"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||||
|
"versionStartIncluding": "6.2",
|
||||||
|
"versionEndExcluding": "6.6.58",
|
||||||
|
"matchCriteriaId": "6B9489BC-825E-4EEE-8D93-F93C801988C8"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||||
|
"versionStartIncluding": "6.7",
|
||||||
|
"versionEndExcluding": "6.11.5",
|
||||||
|
"matchCriteriaId": "6E62D61A-F704-44DB-A311-17B7534DA7BC"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:o:linux:linux_kernel:6.12:rc1:*:*:*:*:*:*",
|
||||||
|
"matchCriteriaId": "7F361E1D-580F-4A2D-A509-7615F73167A1"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:o:linux:linux_kernel:6.12:rc2:*:*:*:*:*:*",
|
||||||
|
"matchCriteriaId": "925478D0-3E3D-4E6F-ACD5-09F28D5DF82C"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:o:linux:linux_kernel:6.12:rc3:*:*:*:*:*:*",
|
||||||
|
"matchCriteriaId": "3C95E234-D335-4B6C-96BF-E2CEBD8654ED"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://git.kernel.org/stable/c/1a235af0216411a32ab4db54f7bd19020b46c86d",
|
||||||
|
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||||
|
"tags": [
|
||||||
|
"Patch"
|
||||||
|
]
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://git.kernel.org/stable/c/28127dba64d8ae1a0b737b973d6d029908599611",
|
||||||
|
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||||
|
"tags": [
|
||||||
|
"Patch"
|
||||||
|
]
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://git.kernel.org/stable/c/68801730ebb9393460b30cd3885e407f15da27a9",
|
||||||
|
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||||
|
"tags": [
|
||||||
|
"Patch"
|
||||||
|
]
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://git.kernel.org/stable/c/c3cd27d85f0778f4ec07384d7516b33153759b8e",
|
||||||
|
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||||
|
"tags": [
|
||||||
|
"Patch"
|
||||||
|
]
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://git.kernel.org/stable/c/df75c78bfeff99f9b4815c3e79e2b1b1e34fe264",
|
||||||
|
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||||
|
"tags": [
|
||||||
|
"Patch"
|
||||||
|
]
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://git.kernel.org/stable/c/fda5dc80121b12871dc343ab37e0c3f0d138825d",
|
||||||
|
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||||
|
"tags": [
|
||||||
|
"Patch"
|
||||||
|
]
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
@ -2,8 +2,8 @@
|
|||||||
"id": "CVE-2024-50202",
|
"id": "CVE-2024-50202",
|
||||||
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||||
"published": "2024-11-08T06:15:16.723",
|
"published": "2024-11-08T06:15:16.723",
|
||||||
"lastModified": "2024-11-08T19:01:03.880",
|
"lastModified": "2024-11-19T16:12:17.660",
|
||||||
"vulnStatus": "Undergoing Analysis",
|
"vulnStatus": "Analyzed",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
@ -15,39 +15,174 @@
|
|||||||
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: nilfs2: propagar errores de lectura de directorio desde nilfs_find_entry() Syzbot inform\u00f3 que se produce un bloqueo de tarea en vcs_open() durante una prueba de fuzzing para nilfs2. La causa ra\u00edz de este problema es que en nilfs_find_entry(), que busca entradas de directorio, ignora los errores cuando falla la carga de una p\u00e1gina/folio de directorio a trav\u00e9s de nilfs_get_folio(). Si las im\u00e1genes del sistema de archivos est\u00e1n da\u00f1adas, y el i_size del inodo del directorio es grande, y la p\u00e1gina/folio del directorio se lee correctamente pero falla la comprobaci\u00f3n de cordura, por ejemplo, cuando est\u00e1 llena de ceros, nilfs_check_folio() puede seguir arrojando mensajes de error en r\u00e1fagas. Solucione este problema propagando el error a los llamadores cuando falla la carga de una p\u00e1gina/folio en nilfs_find_entry(). La interfaz actual de nilfs_find_entry() y sus llamadores est\u00e1 desactualizada y no puede propagar c\u00f3digos de error como -EIO y -ENOMEM devueltos a trav\u00e9s de nilfs_find_entry(), as\u00ed que arr\u00e9glenlo juntos."
|
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: nilfs2: propagar errores de lectura de directorio desde nilfs_find_entry() Syzbot inform\u00f3 que se produce un bloqueo de tarea en vcs_open() durante una prueba de fuzzing para nilfs2. La causa ra\u00edz de este problema es que en nilfs_find_entry(), que busca entradas de directorio, ignora los errores cuando falla la carga de una p\u00e1gina/folio de directorio a trav\u00e9s de nilfs_get_folio(). Si las im\u00e1genes del sistema de archivos est\u00e1n da\u00f1adas, y el i_size del inodo del directorio es grande, y la p\u00e1gina/folio del directorio se lee correctamente pero falla la comprobaci\u00f3n de cordura, por ejemplo, cuando est\u00e1 llena de ceros, nilfs_check_folio() puede seguir arrojando mensajes de error en r\u00e1fagas. Solucione este problema propagando el error a los llamadores cuando falla la carga de una p\u00e1gina/folio en nilfs_find_entry(). La interfaz actual de nilfs_find_entry() y sus llamadores est\u00e1 desactualizada y no puede propagar c\u00f3digos de error como -EIO y -ENOMEM devueltos a trav\u00e9s de nilfs_find_entry(), as\u00ed que arr\u00e9glenlo juntos."
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"metrics": {},
|
"metrics": {
|
||||||
"references": [
|
"cvssMetricV31": [
|
||||||
{
|
{
|
||||||
"url": "https://git.kernel.org/stable/c/08cfa12adf888db98879dbd735bc741360a34168",
|
"source": "nvd@nist.gov",
|
||||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
"type": "Primary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||||||
|
"attackVector": "LOCAL",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "LOW",
|
||||||
|
"userInteraction": "NONE",
|
||||||
|
"scope": "UNCHANGED",
|
||||||
|
"confidentialityImpact": "NONE",
|
||||||
|
"integrityImpact": "NONE",
|
||||||
|
"availabilityImpact": "HIGH",
|
||||||
|
"baseScore": 5.5,
|
||||||
|
"baseSeverity": "MEDIUM"
|
||||||
},
|
},
|
||||||
{
|
"exploitabilityScore": 1.8,
|
||||||
"url": "https://git.kernel.org/stable/c/270a6f9df35fa2aea01ec23770dc9b3fc9a12989",
|
"impactScore": 3.6
|
||||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
}
|
||||||
|
]
|
||||||
},
|
},
|
||||||
|
"weaknesses": [
|
||||||
{
|
{
|
||||||
"url": "https://git.kernel.org/stable/c/9698088ac7704e260f492d9c254e29ed7dd8729a",
|
"source": "nvd@nist.gov",
|
||||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
"type": "Primary",
|
||||||
},
|
"description": [
|
||||||
{
|
{
|
||||||
"url": "https://git.kernel.org/stable/c/b4b3dc9e7e604be98a222e9f941f5e93798ca475",
|
"lang": "en",
|
||||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
"value": "CWE-755"
|
||||||
},
|
}
|
||||||
{
|
]
|
||||||
"url": "https://git.kernel.org/stable/c/bb857ae1efd3138c653239ed1e7aef14e1242c81",
|
}
|
||||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
],
|
||||||
},
|
"configurations": [
|
||||||
{
|
{
|
||||||
"url": "https://git.kernel.org/stable/c/c1d0476885d708a932980b0f28cd90d9bd71db39",
|
"nodes": [
|
||||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
{
|
||||||
},
|
"operator": "OR",
|
||||||
{
|
"negate": false,
|
||||||
"url": "https://git.kernel.org/stable/c/edf8146057264191d5bfe5b91773f13d936dadd3",
|
"cpeMatch": [
|
||||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
{
|
||||||
},
|
"vulnerable": true,
|
||||||
{
|
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||||
"url": "https://git.kernel.org/stable/c/efa810b15a25531cbc2f527330947b9fe16916e7",
|
"versionStartIncluding": "2.6.30",
|
||||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
"versionEndExcluding": "4.19.323",
|
||||||
|
"matchCriteriaId": "68A7ECD8-BE83-4540-8A15-A841E57A82E8"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||||
|
"versionStartIncluding": "4.20",
|
||||||
|
"versionEndExcluding": "5.4.285",
|
||||||
|
"matchCriteriaId": "B5A89369-320F-47FC-8695-56F61F87E4C0"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||||
|
"versionStartIncluding": "5.5",
|
||||||
|
"versionEndExcluding": "5.10.228",
|
||||||
|
"matchCriteriaId": "9062315F-AB89-4ABE-8C13-B75927689F66"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||||
|
"versionStartIncluding": "5.11",
|
||||||
|
"versionEndExcluding": "5.15.169",
|
||||||
|
"matchCriteriaId": "18BEDAD6-86F8-457C-952F-C35698B3D07F"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||||
|
"versionStartIncluding": "5.16",
|
||||||
|
"versionEndExcluding": "6.1.114",
|
||||||
|
"matchCriteriaId": "10FD2B3E-C7D9-4A9C-BD64-41877EDF88EB"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||||
|
"versionStartIncluding": "6.2",
|
||||||
|
"versionEndExcluding": "6.6.58",
|
||||||
|
"matchCriteriaId": "6B9489BC-825E-4EEE-8D93-F93C801988C8"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||||
|
"versionStartIncluding": "6.7",
|
||||||
|
"versionEndExcluding": "6.11.5",
|
||||||
|
"matchCriteriaId": "6E62D61A-F704-44DB-A311-17B7534DA7BC"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:o:linux:linux_kernel:6.12:rc1:*:*:*:*:*:*",
|
||||||
|
"matchCriteriaId": "7F361E1D-580F-4A2D-A509-7615F73167A1"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:o:linux:linux_kernel:6.12:rc2:*:*:*:*:*:*",
|
||||||
|
"matchCriteriaId": "925478D0-3E3D-4E6F-ACD5-09F28D5DF82C"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:o:linux:linux_kernel:6.12:rc3:*:*:*:*:*:*",
|
||||||
|
"matchCriteriaId": "3C95E234-D335-4B6C-96BF-E2CEBD8654ED"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://git.kernel.org/stable/c/08cfa12adf888db98879dbd735bc741360a34168",
|
||||||
|
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||||
|
"tags": [
|
||||||
|
"Patch"
|
||||||
|
]
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://git.kernel.org/stable/c/270a6f9df35fa2aea01ec23770dc9b3fc9a12989",
|
||||||
|
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||||
|
"tags": [
|
||||||
|
"Patch"
|
||||||
|
]
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://git.kernel.org/stable/c/9698088ac7704e260f492d9c254e29ed7dd8729a",
|
||||||
|
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||||
|
"tags": [
|
||||||
|
"Patch"
|
||||||
|
]
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://git.kernel.org/stable/c/b4b3dc9e7e604be98a222e9f941f5e93798ca475",
|
||||||
|
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||||
|
"tags": [
|
||||||
|
"Patch"
|
||||||
|
]
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://git.kernel.org/stable/c/bb857ae1efd3138c653239ed1e7aef14e1242c81",
|
||||||
|
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||||
|
"tags": [
|
||||||
|
"Patch"
|
||||||
|
]
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://git.kernel.org/stable/c/c1d0476885d708a932980b0f28cd90d9bd71db39",
|
||||||
|
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||||
|
"tags": [
|
||||||
|
"Patch"
|
||||||
|
]
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://git.kernel.org/stable/c/edf8146057264191d5bfe5b91773f13d936dadd3",
|
||||||
|
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||||
|
"tags": [
|
||||||
|
"Patch"
|
||||||
|
]
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://git.kernel.org/stable/c/efa810b15a25531cbc2f527330947b9fe16916e7",
|
||||||
|
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||||
|
"tags": [
|
||||||
|
"Patch"
|
||||||
|
]
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
@ -2,8 +2,8 @@
|
|||||||
"id": "CVE-2024-50203",
|
"id": "CVE-2024-50203",
|
||||||
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||||
"published": "2024-11-08T06:15:16.787",
|
"published": "2024-11-08T06:15:16.787",
|
||||||
"lastModified": "2024-11-08T19:01:03.880",
|
"lastModified": "2024-11-19T16:16:09.207",
|
||||||
"vulnStatus": "Undergoing Analysis",
|
"vulnStatus": "Analyzed",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
@ -15,15 +15,102 @@
|
|||||||
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: bpf, arm64: Se corrige la emisi\u00f3n de direcciones con KASAN basado en etiquetas habilitado Cuando BPF_TRAMP_F_CALL_ORIG est\u00e1 habilitado, la direcci\u00f3n de una estructura bpf_tramp_image en la pila se pasa durante el paso de c\u00e1lculo de tama\u00f1o y se pasa una direcci\u00f3n en el mont\u00f3n durante la generaci\u00f3n de c\u00f3digo. Esto puede causar un desbordamiento del b\u00fafer del mont\u00f3n si la direcci\u00f3n del mont\u00f3n est\u00e1 etiquetada porque emit_a64_mov_i64() emitir\u00e1 un c\u00f3digo m\u00e1s largo que el que emiti\u00f3 durante el paso de c\u00e1lculo de tama\u00f1o. El mismo problema podr\u00eda ocurrir sin KASAN basado en etiquetas si una de las palabras de 16 bits de la direcci\u00f3n de la pila fuera todo unos durante el paso de c\u00e1lculo de tama\u00f1o. Solucione el problema asumiendo el peor caso (4 instrucciones) al calcular el tama\u00f1o de la emisi\u00f3n de la direcci\u00f3n bpf_tramp_image."
|
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: bpf, arm64: Se corrige la emisi\u00f3n de direcciones con KASAN basado en etiquetas habilitado Cuando BPF_TRAMP_F_CALL_ORIG est\u00e1 habilitado, la direcci\u00f3n de una estructura bpf_tramp_image en la pila se pasa durante el paso de c\u00e1lculo de tama\u00f1o y se pasa una direcci\u00f3n en el mont\u00f3n durante la generaci\u00f3n de c\u00f3digo. Esto puede causar un desbordamiento del b\u00fafer del mont\u00f3n si la direcci\u00f3n del mont\u00f3n est\u00e1 etiquetada porque emit_a64_mov_i64() emitir\u00e1 un c\u00f3digo m\u00e1s largo que el que emiti\u00f3 durante el paso de c\u00e1lculo de tama\u00f1o. El mismo problema podr\u00eda ocurrir sin KASAN basado en etiquetas si una de las palabras de 16 bits de la direcci\u00f3n de la pila fuera todo unos durante el paso de c\u00e1lculo de tama\u00f1o. Solucione el problema asumiendo el peor caso (4 instrucciones) al calcular el tama\u00f1o de la emisi\u00f3n de la direcci\u00f3n bpf_tramp_image."
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"metrics": {},
|
"metrics": {
|
||||||
"references": [
|
"cvssMetricV31": [
|
||||||
{
|
{
|
||||||
"url": "https://git.kernel.org/stable/c/7db1a2121f3c7903b8e397392beec563c3d00950",
|
"source": "nvd@nist.gov",
|
||||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
"type": "Primary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||||
|
"attackVector": "LOCAL",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "LOW",
|
||||||
|
"userInteraction": "NONE",
|
||||||
|
"scope": "UNCHANGED",
|
||||||
|
"confidentialityImpact": "HIGH",
|
||||||
|
"integrityImpact": "HIGH",
|
||||||
|
"availabilityImpact": "HIGH",
|
||||||
|
"baseScore": 7.8,
|
||||||
|
"baseSeverity": "HIGH"
|
||||||
},
|
},
|
||||||
|
"exploitabilityScore": 1.8,
|
||||||
|
"impactScore": 5.9
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"weaknesses": [
|
||||||
{
|
{
|
||||||
"url": "https://git.kernel.org/stable/c/a552e2ef5fd1a6c78267cd4ec5a9b49aa11bbb1c",
|
"source": "nvd@nist.gov",
|
||||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
"type": "Primary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-787"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"configurations": [
|
||||||
|
{
|
||||||
|
"nodes": [
|
||||||
|
{
|
||||||
|
"operator": "OR",
|
||||||
|
"negate": false,
|
||||||
|
"cpeMatch": [
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||||
|
"versionStartIncluding": "6.10.3",
|
||||||
|
"versionEndExcluding": "6.11",
|
||||||
|
"matchCriteriaId": "F2A79BF8-4D40-4CD5-9AF5-B6A3B67539DC"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||||
|
"versionStartIncluding": "6.11",
|
||||||
|
"versionEndExcluding": "6.11.6",
|
||||||
|
"matchCriteriaId": "35973F0F-C32F-4D88-B0FE-C75F65A0002B"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:o:linux:linux_kernel:6.12:rc1:*:*:*:*:*:*",
|
||||||
|
"matchCriteriaId": "7F361E1D-580F-4A2D-A509-7615F73167A1"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:o:linux:linux_kernel:6.12:rc2:*:*:*:*:*:*",
|
||||||
|
"matchCriteriaId": "925478D0-3E3D-4E6F-ACD5-09F28D5DF82C"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:o:linux:linux_kernel:6.12:rc3:*:*:*:*:*:*",
|
||||||
|
"matchCriteriaId": "3C95E234-D335-4B6C-96BF-E2CEBD8654ED"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:o:linux:linux_kernel:6.12:rc4:*:*:*:*:*:*",
|
||||||
|
"matchCriteriaId": "E0F717D8-3014-4F84-8086-0124B2111379"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://git.kernel.org/stable/c/7db1a2121f3c7903b8e397392beec563c3d00950",
|
||||||
|
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||||
|
"tags": [
|
||||||
|
"Patch"
|
||||||
|
]
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://git.kernel.org/stable/c/a552e2ef5fd1a6c78267cd4ec5a9b49aa11bbb1c",
|
||||||
|
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||||
|
"tags": [
|
||||||
|
"Patch"
|
||||||
|
]
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
@ -2,8 +2,8 @@
|
|||||||
"id": "CVE-2024-50204",
|
"id": "CVE-2024-50204",
|
||||||
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||||
"published": "2024-11-08T06:15:16.853",
|
"published": "2024-11-08T06:15:16.853",
|
||||||
"lastModified": "2024-11-08T19:01:03.880",
|
"lastModified": "2024-11-19T16:17:04.663",
|
||||||
"vulnStatus": "Undergoing Analysis",
|
"vulnStatus": "Analyzed",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
@ -15,15 +15,95 @@
|
|||||||
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: fs: no intente eliminar un nodo rbtree vac\u00edo Al copiar un espacio de nombres, no habremos agregado la nueva copia al rbtree del espacio de nombres hasta que la copia haya tenido \u00e9xito. Al llamar a free_mnt_ns() se intentar\u00e1 eliminar la copia del rbtree que no es v\u00e1lida. Simplemente libere el esqueleto del espacio de nombres directamente."
|
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: fs: no intente eliminar un nodo rbtree vac\u00edo Al copiar un espacio de nombres, no habremos agregado la nueva copia al rbtree del espacio de nombres hasta que la copia haya tenido \u00e9xito. Al llamar a free_mnt_ns() se intentar\u00e1 eliminar la copia del rbtree que no es v\u00e1lida. Simplemente libere el esqueleto del espacio de nombres directamente."
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"metrics": {},
|
"metrics": {
|
||||||
"references": [
|
"cvssMetricV31": [
|
||||||
{
|
{
|
||||||
"url": "https://git.kernel.org/stable/c/229fd15908fe1f99b1de4cde3326e62d1e892611",
|
"source": "nvd@nist.gov",
|
||||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
"type": "Primary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||||||
|
"attackVector": "LOCAL",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "LOW",
|
||||||
|
"userInteraction": "NONE",
|
||||||
|
"scope": "UNCHANGED",
|
||||||
|
"confidentialityImpact": "NONE",
|
||||||
|
"integrityImpact": "NONE",
|
||||||
|
"availabilityImpact": "HIGH",
|
||||||
|
"baseScore": 5.5,
|
||||||
|
"baseSeverity": "MEDIUM"
|
||||||
},
|
},
|
||||||
|
"exploitabilityScore": 1.8,
|
||||||
|
"impactScore": 3.6
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"weaknesses": [
|
||||||
{
|
{
|
||||||
"url": "https://git.kernel.org/stable/c/a8b155a2c30dc9a5ba837aa5fcba9a47cc031a9b",
|
"source": "nvd@nist.gov",
|
||||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
"type": "Primary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "NVD-CWE-noinfo"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"configurations": [
|
||||||
|
{
|
||||||
|
"nodes": [
|
||||||
|
{
|
||||||
|
"operator": "OR",
|
||||||
|
"negate": false,
|
||||||
|
"cpeMatch": [
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||||
|
"versionStartIncluding": "6.11",
|
||||||
|
"versionEndExcluding": "6.11.6",
|
||||||
|
"matchCriteriaId": "35973F0F-C32F-4D88-B0FE-C75F65A0002B"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:o:linux:linux_kernel:6.12:rc1:*:*:*:*:*:*",
|
||||||
|
"matchCriteriaId": "7F361E1D-580F-4A2D-A509-7615F73167A1"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:o:linux:linux_kernel:6.12:rc2:*:*:*:*:*:*",
|
||||||
|
"matchCriteriaId": "925478D0-3E3D-4E6F-ACD5-09F28D5DF82C"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:o:linux:linux_kernel:6.12:rc3:*:*:*:*:*:*",
|
||||||
|
"matchCriteriaId": "3C95E234-D335-4B6C-96BF-E2CEBD8654ED"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:o:linux:linux_kernel:6.12:rc4:*:*:*:*:*:*",
|
||||||
|
"matchCriteriaId": "E0F717D8-3014-4F84-8086-0124B2111379"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://git.kernel.org/stable/c/229fd15908fe1f99b1de4cde3326e62d1e892611",
|
||||||
|
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||||
|
"tags": [
|
||||||
|
"Patch"
|
||||||
|
]
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://git.kernel.org/stable/c/a8b155a2c30dc9a5ba837aa5fcba9a47cc031a9b",
|
||||||
|
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||||
|
"tags": [
|
||||||
|
"Patch"
|
||||||
|
]
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
@ -2,8 +2,8 @@
|
|||||||
"id": "CVE-2024-50207",
|
"id": "CVE-2024-50207",
|
||||||
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||||
"published": "2024-11-08T06:15:17.053",
|
"published": "2024-11-08T06:15:17.053",
|
||||||
"lastModified": "2024-11-08T19:01:03.880",
|
"lastModified": "2024-11-19T16:18:57.473",
|
||||||
"vulnStatus": "Undergoing Analysis",
|
"vulnStatus": "Analyzed",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
@ -15,15 +15,90 @@
|
|||||||
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: ring-buffer: corrige el bloqueo del lector al cambiar el orden de los subbuffer La funci\u00f3n ring_buffer_subbuf_order_set() actualiza cada ring_buffer_per_cpu e instala nuevos subbuffers que coinciden con el orden de p\u00e1ginas solicitado. Esta operaci\u00f3n se puede invocar simult\u00e1neamente con lectores que dependen de algunos de los datos modificados, como el bit de cabecera (RB_PAGE_HEAD) o los punteros ring_buffer_per_cpu.pages y reader_page. Sin embargo, ring_buffer_subbuf_order_set() no adquiere acceso exclusivo. Modificar los datos mencionados mientras un lector tambi\u00e9n opera sobre ellos puede provocar un acceso incorrecto a la memoria y varios fallos. Solucione el problema tomando el reader_lock al actualizar un ring_buffer_per_cpu espec\u00edfico en ring_buffer_subbuf_order_set()."
|
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: ring-buffer: corrige el bloqueo del lector al cambiar el orden de los subbuffer La funci\u00f3n ring_buffer_subbuf_order_set() actualiza cada ring_buffer_per_cpu e instala nuevos subbuffers que coinciden con el orden de p\u00e1ginas solicitado. Esta operaci\u00f3n se puede invocar simult\u00e1neamente con lectores que dependen de algunos de los datos modificados, como el bit de cabecera (RB_PAGE_HEAD) o los punteros ring_buffer_per_cpu.pages y reader_page. Sin embargo, ring_buffer_subbuf_order_set() no adquiere acceso exclusivo. Modificar los datos mencionados mientras un lector tambi\u00e9n opera sobre ellos puede provocar un acceso incorrecto a la memoria y varios fallos. Solucione el problema tomando el reader_lock al actualizar un ring_buffer_per_cpu espec\u00edfico en ring_buffer_subbuf_order_set()."
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"metrics": {},
|
"metrics": {
|
||||||
"references": [
|
"cvssMetricV31": [
|
||||||
{
|
{
|
||||||
"url": "https://git.kernel.org/stable/c/09661f75e75cb6c1d2d8326a70c311d46729235f",
|
"source": "nvd@nist.gov",
|
||||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
"type": "Primary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||||||
|
"attackVector": "LOCAL",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "LOW",
|
||||||
|
"userInteraction": "NONE",
|
||||||
|
"scope": "UNCHANGED",
|
||||||
|
"confidentialityImpact": "NONE",
|
||||||
|
"integrityImpact": "NONE",
|
||||||
|
"availabilityImpact": "HIGH",
|
||||||
|
"baseScore": 5.5,
|
||||||
|
"baseSeverity": "MEDIUM"
|
||||||
},
|
},
|
||||||
|
"exploitabilityScore": 1.8,
|
||||||
|
"impactScore": 3.6
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"weaknesses": [
|
||||||
{
|
{
|
||||||
"url": "https://git.kernel.org/stable/c/a569290525a05162d5dd26d9845591eaf46e5802",
|
"source": "nvd@nist.gov",
|
||||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
"type": "Primary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-667"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"configurations": [
|
||||||
|
{
|
||||||
|
"nodes": [
|
||||||
|
{
|
||||||
|
"operator": "OR",
|
||||||
|
"negate": false,
|
||||||
|
"cpeMatch": [
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||||
|
"versionStartIncluding": "6.8",
|
||||||
|
"versionEndExcluding": "6.11.6",
|
||||||
|
"matchCriteriaId": "2CAA29A6-36B4-4C90-A862-A816F65153DB"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:o:linux:linux_kernel:6.12:rc1:*:*:*:*:*:*",
|
||||||
|
"matchCriteriaId": "7F361E1D-580F-4A2D-A509-7615F73167A1"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:o:linux:linux_kernel:6.12:rc2:*:*:*:*:*:*",
|
||||||
|
"matchCriteriaId": "925478D0-3E3D-4E6F-ACD5-09F28D5DF82C"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:o:linux:linux_kernel:6.12:rc3:*:*:*:*:*:*",
|
||||||
|
"matchCriteriaId": "3C95E234-D335-4B6C-96BF-E2CEBD8654ED"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://git.kernel.org/stable/c/09661f75e75cb6c1d2d8326a70c311d46729235f",
|
||||||
|
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||||
|
"tags": [
|
||||||
|
"Patch"
|
||||||
|
]
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://git.kernel.org/stable/c/a569290525a05162d5dd26d9845591eaf46e5802",
|
||||||
|
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||||
|
"tags": [
|
||||||
|
"Patch"
|
||||||
|
]
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
@ -2,8 +2,8 @@
|
|||||||
"id": "CVE-2024-50208",
|
"id": "CVE-2024-50208",
|
||||||
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||||
"published": "2024-11-08T06:15:17.203",
|
"published": "2024-11-08T06:15:17.203",
|
||||||
"lastModified": "2024-11-08T19:01:03.880",
|
"lastModified": "2024-11-19T16:23:48.507",
|
||||||
"vulnStatus": "Undergoing Analysis",
|
"vulnStatus": "Analyzed",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
@ -15,31 +15,146 @@
|
|||||||
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: RDMA/bnxt_re: Se corrige un error al configurar p\u00e1ginas PBL de nivel 2 Evita la corrupci\u00f3n de memoria al configurar p\u00e1ginas PBL de nivel 2 para los recursos que no son MR cuando num_pages > 256K. Habr\u00e1 una \u00fanica direcci\u00f3n de p\u00e1gina PDE (p\u00e1ginas contiguas en el caso de > PAGE_SIZE), pero la l\u00f3gica actual supone varias p\u00e1ginas, lo que genera un acceso a memoria no v\u00e1lido despu\u00e9s de 256K entradas PBL en el PDE."
|
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: RDMA/bnxt_re: Se corrige un error al configurar p\u00e1ginas PBL de nivel 2 Evita la corrupci\u00f3n de memoria al configurar p\u00e1ginas PBL de nivel 2 para los recursos que no son MR cuando num_pages > 256K. Habr\u00e1 una \u00fanica direcci\u00f3n de p\u00e1gina PDE (p\u00e1ginas contiguas en el caso de > PAGE_SIZE), pero la l\u00f3gica actual supone varias p\u00e1ginas, lo que genera un acceso a memoria no v\u00e1lido despu\u00e9s de 256K entradas PBL en el PDE."
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"metrics": {},
|
"metrics": {
|
||||||
"references": [
|
"cvssMetricV31": [
|
||||||
{
|
{
|
||||||
"url": "https://git.kernel.org/stable/c/7988bdbbb85ac85a847baf09879edcd0f70521dc",
|
"source": "nvd@nist.gov",
|
||||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
"type": "Primary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||||||
|
"attackVector": "LOCAL",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "LOW",
|
||||||
|
"userInteraction": "NONE",
|
||||||
|
"scope": "UNCHANGED",
|
||||||
|
"confidentialityImpact": "NONE",
|
||||||
|
"integrityImpact": "NONE",
|
||||||
|
"availabilityImpact": "HIGH",
|
||||||
|
"baseScore": 5.5,
|
||||||
|
"baseSeverity": "MEDIUM"
|
||||||
},
|
},
|
||||||
{
|
"exploitabilityScore": 1.8,
|
||||||
"url": "https://git.kernel.org/stable/c/87cb3b0054e53e0155b630bdf8fb714ded62565f",
|
"impactScore": 3.6
|
||||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
}
|
||||||
|
]
|
||||||
},
|
},
|
||||||
|
"weaknesses": [
|
||||||
{
|
{
|
||||||
"url": "https://git.kernel.org/stable/c/daac56dd98e1ba814c878ac0acd482a37f2ab94b",
|
"source": "nvd@nist.gov",
|
||||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
"type": "Primary",
|
||||||
},
|
"description": [
|
||||||
{
|
{
|
||||||
"url": "https://git.kernel.org/stable/c/de5857fa7bcc9a496a914c7e21390be873109f26",
|
"lang": "en",
|
||||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
"value": "CWE-125"
|
||||||
},
|
}
|
||||||
{
|
]
|
||||||
"url": "https://git.kernel.org/stable/c/df6fed0a2a1a5e57f033bca40dc316b18e0d0ce6",
|
}
|
||||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
],
|
||||||
},
|
"configurations": [
|
||||||
{
|
{
|
||||||
"url": "https://git.kernel.org/stable/c/ea701c1849e7250ea41a4f7493e0a5f136c1d47e",
|
"nodes": [
|
||||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
{
|
||||||
|
"operator": "OR",
|
||||||
|
"negate": false,
|
||||||
|
"cpeMatch": [
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||||
|
"versionStartIncluding": "5.7",
|
||||||
|
"versionEndExcluding": "5.10.229",
|
||||||
|
"matchCriteriaId": "2EADCAD4-13A5-494E-8458-135A798BE1A6"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||||
|
"versionStartIncluding": "5.11",
|
||||||
|
"versionEndExcluding": "5.15.170",
|
||||||
|
"matchCriteriaId": "A9BA1C73-2D2E-45E3-937B-276A28AEB5FC"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||||
|
"versionStartIncluding": "5.16",
|
||||||
|
"versionEndExcluding": "6.1.115",
|
||||||
|
"matchCriteriaId": "C08A77A6-E42E-4EFD-B5A1-2BF6CBBB42AE"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||||
|
"versionStartIncluding": "6.2",
|
||||||
|
"versionEndExcluding": "6.6.59",
|
||||||
|
"matchCriteriaId": "5D15CA59-D15C-4ACD-8B03-A072DEAD2081"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||||
|
"versionStartIncluding": "6.7",
|
||||||
|
"versionEndExcluding": "6.11.6",
|
||||||
|
"matchCriteriaId": "E4486B12-007B-4794-9857-F07145637AA1"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:o:linux:linux_kernel:6.12:rc1:*:*:*:*:*:*",
|
||||||
|
"matchCriteriaId": "7F361E1D-580F-4A2D-A509-7615F73167A1"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:o:linux:linux_kernel:6.12:rc2:*:*:*:*:*:*",
|
||||||
|
"matchCriteriaId": "925478D0-3E3D-4E6F-ACD5-09F28D5DF82C"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:o:linux:linux_kernel:6.12:rc3:*:*:*:*:*:*",
|
||||||
|
"matchCriteriaId": "3C95E234-D335-4B6C-96BF-E2CEBD8654ED"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://git.kernel.org/stable/c/7988bdbbb85ac85a847baf09879edcd0f70521dc",
|
||||||
|
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||||
|
"tags": [
|
||||||
|
"Patch"
|
||||||
|
]
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://git.kernel.org/stable/c/87cb3b0054e53e0155b630bdf8fb714ded62565f",
|
||||||
|
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||||
|
"tags": [
|
||||||
|
"Patch"
|
||||||
|
]
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://git.kernel.org/stable/c/daac56dd98e1ba814c878ac0acd482a37f2ab94b",
|
||||||
|
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||||
|
"tags": [
|
||||||
|
"Patch"
|
||||||
|
]
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://git.kernel.org/stable/c/de5857fa7bcc9a496a914c7e21390be873109f26",
|
||||||
|
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||||
|
"tags": [
|
||||||
|
"Patch"
|
||||||
|
]
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://git.kernel.org/stable/c/df6fed0a2a1a5e57f033bca40dc316b18e0d0ce6",
|
||||||
|
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||||
|
"tags": [
|
||||||
|
"Patch"
|
||||||
|
]
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://git.kernel.org/stable/c/ea701c1849e7250ea41a4f7493e0a5f136c1d47e",
|
||||||
|
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||||
|
"tags": [
|
||||||
|
"Patch"
|
||||||
|
]
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
@ -2,8 +2,8 @@
|
|||||||
"id": "CVE-2024-50210",
|
"id": "CVE-2024-50210",
|
||||||
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||||
"published": "2024-11-08T06:15:17.350",
|
"published": "2024-11-08T06:15:17.350",
|
||||||
"lastModified": "2024-11-08T19:01:03.880",
|
"lastModified": "2024-11-19T16:26:34.767",
|
||||||
"vulnStatus": "Undergoing Analysis",
|
"vulnStatus": "Analyzed",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
@ -15,39 +15,142 @@
|
|||||||
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: posix-clock: posix-clock: Corregir bloqueo desequilibrado en pc_clock_settime() Si get_clock_desc() tiene \u00e9xito, llama a fget() para el fd del clockid y obtiene el bloqueo de lectura clk->rwsem, por lo que la ruta de error deber\u00eda liberar el bloqueo para equilibrar el bloqueo y fput el fd del clockid para equilibrar el refcount y liberar el recurso relacionado con el fd. Sin embargo, la siguiente confirmaci\u00f3n dej\u00f3 la ruta de error bloqueada, lo que result\u00f3 en un bloqueo desequilibrado. Verifique timespec64_valid_strict() antes de get_clock_desc() para corregirlo, porque el \"ts\" no se cambia despu\u00e9s de eso. [pabeni@redhat.com: se corrigi\u00f3 un error tipogr\u00e1fico en el mensaje de confirmaci\u00f3n]"
|
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: posix-clock: posix-clock: Corregir bloqueo desequilibrado en pc_clock_settime() Si get_clock_desc() tiene \u00e9xito, llama a fget() para el fd del clockid y obtiene el bloqueo de lectura clk->rwsem, por lo que la ruta de error deber\u00eda liberar el bloqueo para equilibrar el bloqueo y fput el fd del clockid para equilibrar el refcount y liberar el recurso relacionado con el fd. Sin embargo, la siguiente confirmaci\u00f3n dej\u00f3 la ruta de error bloqueada, lo que result\u00f3 en un bloqueo desequilibrado. Verifique timespec64_valid_strict() antes de get_clock_desc() para corregirlo, porque el \"ts\" no se cambia despu\u00e9s de eso. [pabeni@redhat.com: se corrigi\u00f3 un error tipogr\u00e1fico en el mensaje de confirmaci\u00f3n]"
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"metrics": {},
|
"metrics": {
|
||||||
"references": [
|
"cvssMetricV31": [
|
||||||
{
|
{
|
||||||
"url": "https://git.kernel.org/stable/c/1ba33b327c3f88a7baee598979d73ab5b44d41cc",
|
"source": "nvd@nist.gov",
|
||||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
"type": "Primary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||||||
|
"attackVector": "LOCAL",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "LOW",
|
||||||
|
"userInteraction": "NONE",
|
||||||
|
"scope": "UNCHANGED",
|
||||||
|
"confidentialityImpact": "NONE",
|
||||||
|
"integrityImpact": "NONE",
|
||||||
|
"availabilityImpact": "HIGH",
|
||||||
|
"baseScore": 5.5,
|
||||||
|
"baseSeverity": "MEDIUM"
|
||||||
},
|
},
|
||||||
{
|
"exploitabilityScore": 1.8,
|
||||||
"url": "https://git.kernel.org/stable/c/5f063bbf1ee6b01611c016b54e050a41506eb794",
|
"impactScore": 3.6
|
||||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
}
|
||||||
|
]
|
||||||
},
|
},
|
||||||
|
"weaknesses": [
|
||||||
{
|
{
|
||||||
"url": "https://git.kernel.org/stable/c/6e62807c7fbb3c758d233018caf94dfea9c65dbd",
|
"source": "nvd@nist.gov",
|
||||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
"type": "Primary",
|
||||||
},
|
"description": [
|
||||||
{
|
{
|
||||||
"url": "https://git.kernel.org/stable/c/a8219446b95a859488feaade674d13f9efacfa32",
|
"lang": "en",
|
||||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
"value": "CWE-667"
|
||||||
},
|
}
|
||||||
{
|
]
|
||||||
"url": "https://git.kernel.org/stable/c/b27330128eca25179637c1816d5a72d6cc408c66",
|
}
|
||||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
],
|
||||||
},
|
"configurations": [
|
||||||
{
|
{
|
||||||
"url": "https://git.kernel.org/stable/c/c7fcfdba35abc9f39b83080c2bce398dad13a943",
|
"nodes": [
|
||||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
{
|
||||||
},
|
"operator": "OR",
|
||||||
{
|
"negate": false,
|
||||||
"url": "https://git.kernel.org/stable/c/d005400262ddaf1ca1666bbcd1acf42fe81d57ce",
|
"cpeMatch": [
|
||||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
{
|
||||||
},
|
"vulnerable": true,
|
||||||
{
|
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||||
"url": "https://git.kernel.org/stable/c/e56e0ec1b79f5a6272c6e78b36e9d593aa0449af",
|
"versionStartIncluding": "5.10.228",
|
||||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
"versionEndExcluding": "5.11",
|
||||||
|
"matchCriteriaId": "7CEF9F93-A67A-45C9-9C51-0024664ACC19"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:o:linux:linux_kernel:5.15.169:*:*:*:*:*:*:*",
|
||||||
|
"matchCriteriaId": "65E5B4C5-20C7-42FD-B670-6B09641CC073"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:o:linux:linux_kernel:6.1.114:*:*:*:*:*:*:*",
|
||||||
|
"matchCriteriaId": "CFC6719E-D39A-44B0-90DD-F606EE505404"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:o:linux:linux_kernel:6.6.58:*:*:*:*:*:*:*",
|
||||||
|
"matchCriteriaId": "38BA5D36-31FC-4EF3-9E92-9B67AB6F2D42"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:o:linux:linux_kernel:6.11.5:*:*:*:*:*:*:*",
|
||||||
|
"matchCriteriaId": "101C7DA2-28FF-4CC0-A476-2C8D49CD2AC5"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:o:linux:linux_kernel:6.12:rc4:*:*:*:*:*:*",
|
||||||
|
"matchCriteriaId": "E0F717D8-3014-4F84-8086-0124B2111379"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://git.kernel.org/stable/c/1ba33b327c3f88a7baee598979d73ab5b44d41cc",
|
||||||
|
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||||
|
"tags": [
|
||||||
|
"Patch"
|
||||||
|
]
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://git.kernel.org/stable/c/5f063bbf1ee6b01611c016b54e050a41506eb794",
|
||||||
|
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||||
|
"tags": [
|
||||||
|
"Patch"
|
||||||
|
]
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://git.kernel.org/stable/c/6e62807c7fbb3c758d233018caf94dfea9c65dbd",
|
||||||
|
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||||
|
"tags": [
|
||||||
|
"Patch"
|
||||||
|
]
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://git.kernel.org/stable/c/a8219446b95a859488feaade674d13f9efacfa32",
|
||||||
|
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||||
|
"tags": [
|
||||||
|
"Patch"
|
||||||
|
]
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://git.kernel.org/stable/c/b27330128eca25179637c1816d5a72d6cc408c66",
|
||||||
|
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||||
|
"tags": [
|
||||||
|
"Patch"
|
||||||
|
]
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://git.kernel.org/stable/c/c7fcfdba35abc9f39b83080c2bce398dad13a943",
|
||||||
|
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||||
|
"tags": [
|
||||||
|
"Patch"
|
||||||
|
]
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://git.kernel.org/stable/c/d005400262ddaf1ca1666bbcd1acf42fe81d57ce",
|
||||||
|
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||||
|
"tags": [
|
||||||
|
"Patch"
|
||||||
|
]
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://git.kernel.org/stable/c/e56e0ec1b79f5a6272c6e78b36e9d593aa0449af",
|
||||||
|
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||||
|
"tags": [
|
||||||
|
"Patch"
|
||||||
|
]
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
29
CVE-2024/CVE-2024-508xx/CVE-2024-50803.json
Normal file
29
CVE-2024/CVE-2024-508xx/CVE-2024-50803.json
Normal file
@ -0,0 +1,29 @@
|
|||||||
|
{
|
||||||
|
"id": "CVE-2024-50803",
|
||||||
|
"sourceIdentifier": "cve@mitre.org",
|
||||||
|
"published": "2024-11-19T16:15:19.840",
|
||||||
|
"lastModified": "2024-11-19T16:15:19.840",
|
||||||
|
"vulnStatus": "Received",
|
||||||
|
"cveTags": [],
|
||||||
|
"descriptions": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "The mediapool feature of the Redaxo Core CMS application v 5.17.1 is vulnerable to Cross Site Scripting(XSS) which allows a remote attacker to escalate privileges"
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"metrics": {},
|
||||||
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "http://redaxo-core.com",
|
||||||
|
"source": "cve@mitre.org"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "http://redaxo.com",
|
||||||
|
"source": "cve@mitre.org"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://github.com/Praison001/CVE-2024-50803-Redaxo",
|
||||||
|
"source": "cve@mitre.org"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
@ -2,16 +2,55 @@
|
|||||||
"id": "CVE-2024-50804",
|
"id": "CVE-2024-50804",
|
||||||
"sourceIdentifier": "cve@mitre.org",
|
"sourceIdentifier": "cve@mitre.org",
|
||||||
"published": "2024-11-18T21:15:06.220",
|
"published": "2024-11-18T21:15:06.220",
|
||||||
"lastModified": "2024-11-18T21:15:06.220",
|
"lastModified": "2024-11-19T16:35:15.173",
|
||||||
"vulnStatus": "Received",
|
"vulnStatus": "Received",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
"lang": "en",
|
"lang": "en",
|
||||||
"value": "Insecure Permissions vulnerability in Micro-star International MSI Center Pro 2.1.37.0 allows a local attacker to execute arbitrary code via the Device_DeviceID.dat.bak file within the C:\\ProgramData\\MSI\\One Dragon Center\\Data folder"
|
"value": "Insecure Permissions vulnerability in Micro-star International MSI Center Pro 2.1.37.0 allows a local attacker to execute arbitrary code via the Device_DeviceID.dat.bak file within the C:\\ProgramData\\MSI\\One Dragon Center\\Data folder"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"lang": "es",
|
||||||
|
"value": "La vulnerabilidad de permisos inseguros en Micro-star International MSI Center Pro 2.1.37.0 permite a un atacante local ejecutar c\u00f3digo arbitrario a trav\u00e9s del archivo Device_DeviceID.dat.bak dentro de la carpeta C:\\ProgramData\\MSI\\One Dragon Center\\Data"
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"metrics": {
|
||||||
|
"cvssMetricV31": [
|
||||||
|
{
|
||||||
|
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||||
|
"type": "Secondary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||||
|
"attackVector": "LOCAL",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "LOW",
|
||||||
|
"userInteraction": "NONE",
|
||||||
|
"scope": "UNCHANGED",
|
||||||
|
"confidentialityImpact": "HIGH",
|
||||||
|
"integrityImpact": "HIGH",
|
||||||
|
"availabilityImpact": "HIGH",
|
||||||
|
"baseScore": 7.8,
|
||||||
|
"baseSeverity": "HIGH"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 1.8,
|
||||||
|
"impactScore": 5.9
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"weaknesses": [
|
||||||
|
{
|
||||||
|
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||||
|
"type": "Secondary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-94"
|
||||||
|
}
|
||||||
|
]
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"metrics": {},
|
|
||||||
"references": [
|
"references": [
|
||||||
{
|
{
|
||||||
"url": "https://g3tsyst3m.github.io/cve/msi/Arbitrary-Write-Privilege-Escalation-CVE-2024-50804/",
|
"url": "https://g3tsyst3m.github.io/cve/msi/Arbitrary-Write-Privilege-Escalation-CVE-2024-50804/",
|
||||||
|
@ -2,16 +2,55 @@
|
|||||||
"id": "CVE-2024-50848",
|
"id": "CVE-2024-50848",
|
||||||
"sourceIdentifier": "cve@mitre.org",
|
"sourceIdentifier": "cve@mitre.org",
|
||||||
"published": "2024-11-18T21:15:06.293",
|
"published": "2024-11-18T21:15:06.293",
|
||||||
"lastModified": "2024-11-18T21:15:06.293",
|
"lastModified": "2024-11-19T15:35:10.213",
|
||||||
"vulnStatus": "Received",
|
"vulnStatus": "Received",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
"lang": "en",
|
"lang": "en",
|
||||||
"value": "An XML External Entity (XXE) vulnerability in the Import object and Translation Memory import functionalities of WorldServer v11.8.2 to access sensitive information and execute arbitrary commands via supplying a crafted .tmx file."
|
"value": "An XML External Entity (XXE) vulnerability in the Import object and Translation Memory import functionalities of WorldServer v11.8.2 to access sensitive information and execute arbitrary commands via supplying a crafted .tmx file."
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"lang": "es",
|
||||||
|
"value": "Una vulnerabilidad de entidad externa XML (XXE) en las funcionalidades de importaci\u00f3n de objetos y memoria de traducci\u00f3n de WorldServer v11.8.2 para acceder a informaci\u00f3n confidencial y ejecutar comandos arbitrarios mediante el suministro de un archivo .tmx manipulado espec\u00edficamente."
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"metrics": {
|
||||||
|
"cvssMetricV31": [
|
||||||
|
{
|
||||||
|
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||||
|
"type": "Secondary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
|
||||||
|
"attackVector": "NETWORK",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "NONE",
|
||||||
|
"userInteraction": "REQUIRED",
|
||||||
|
"scope": "UNCHANGED",
|
||||||
|
"confidentialityImpact": "HIGH",
|
||||||
|
"integrityImpact": "NONE",
|
||||||
|
"availabilityImpact": "NONE",
|
||||||
|
"baseScore": 6.5,
|
||||||
|
"baseSeverity": "MEDIUM"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 2.8,
|
||||||
|
"impactScore": 3.6
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"weaknesses": [
|
||||||
|
{
|
||||||
|
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||||
|
"type": "Secondary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-611"
|
||||||
|
}
|
||||||
|
]
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"metrics": {},
|
|
||||||
"references": [
|
"references": [
|
||||||
{
|
{
|
||||||
"url": "https://github.com/Wh1teSnak3/CVE-2024-50848",
|
"url": "https://github.com/Wh1teSnak3/CVE-2024-50848",
|
||||||
|
@ -2,16 +2,55 @@
|
|||||||
"id": "CVE-2024-50849",
|
"id": "CVE-2024-50849",
|
||||||
"sourceIdentifier": "cve@mitre.org",
|
"sourceIdentifier": "cve@mitre.org",
|
||||||
"published": "2024-11-18T21:15:06.360",
|
"published": "2024-11-18T21:15:06.360",
|
||||||
"lastModified": "2024-11-18T21:15:06.360",
|
"lastModified": "2024-11-19T15:35:11.063",
|
||||||
"vulnStatus": "Received",
|
"vulnStatus": "Received",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
"lang": "en",
|
"lang": "en",
|
||||||
"value": "Cross-Site Scripting (XSS) in the \"Rules\" functionality in WordServer 11.8.2 allows a remote authenticated attacker to execute arbitrary code."
|
"value": "Cross-Site Scripting (XSS) in the \"Rules\" functionality in WordServer 11.8.2 allows a remote authenticated attacker to execute arbitrary code."
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"lang": "es",
|
||||||
|
"value": "Cross-Site Scripting (XSS) en la funcionalidad \"Reglas\" de WordServer 11.8.2 permite que un atacante remoto autenticado ejecute c\u00f3digo arbitrario."
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"metrics": {
|
||||||
|
"cvssMetricV31": [
|
||||||
|
{
|
||||||
|
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||||
|
"type": "Secondary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N",
|
||||||
|
"attackVector": "NETWORK",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "HIGH",
|
||||||
|
"userInteraction": "REQUIRED",
|
||||||
|
"scope": "CHANGED",
|
||||||
|
"confidentialityImpact": "LOW",
|
||||||
|
"integrityImpact": "LOW",
|
||||||
|
"availabilityImpact": "NONE",
|
||||||
|
"baseScore": 4.8,
|
||||||
|
"baseSeverity": "MEDIUM"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 1.7,
|
||||||
|
"impactScore": 2.7
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"weaknesses": [
|
||||||
|
{
|
||||||
|
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||||
|
"type": "Secondary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-79"
|
||||||
|
}
|
||||||
|
]
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"metrics": {},
|
|
||||||
"references": [
|
"references": [
|
||||||
{
|
{
|
||||||
"url": "https://github.com/Wh1teSnak3/CVE-2024-50849",
|
"url": "https://github.com/Wh1teSnak3/CVE-2024-50849",
|
||||||
|
@ -2,16 +2,55 @@
|
|||||||
"id": "CVE-2024-50919",
|
"id": "CVE-2024-50919",
|
||||||
"sourceIdentifier": "cve@mitre.org",
|
"sourceIdentifier": "cve@mitre.org",
|
||||||
"published": "2024-11-18T20:15:05.650",
|
"published": "2024-11-18T20:15:05.650",
|
||||||
"lastModified": "2024-11-18T20:15:05.650",
|
"lastModified": "2024-11-19T16:35:15.973",
|
||||||
"vulnStatus": "Received",
|
"vulnStatus": "Received",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
"lang": "en",
|
"lang": "en",
|
||||||
"value": "Jpress until v5.1.1 has arbitrary file uploads on the windows platform, and the construction of non-standard file formats such as .jsp. can lead to arbitrary command execution"
|
"value": "Jpress until v5.1.1 has arbitrary file uploads on the windows platform, and the construction of non-standard file formats such as .jsp. can lead to arbitrary command execution"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"lang": "es",
|
||||||
|
"value": "Hasta la versi\u00f3n v5.1.1, Jpress permite cargar archivos arbitrarios en la plataforma Windows, y la construcci\u00f3n de formatos de archivos no est\u00e1ndar como .jsp puede provocar la ejecuci\u00f3n arbitraria de comandos."
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"metrics": {
|
||||||
|
"cvssMetricV31": [
|
||||||
|
{
|
||||||
|
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||||
|
"type": "Secondary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||||
|
"attackVector": "NETWORK",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "NONE",
|
||||||
|
"userInteraction": "NONE",
|
||||||
|
"scope": "UNCHANGED",
|
||||||
|
"confidentialityImpact": "HIGH",
|
||||||
|
"integrityImpact": "HIGH",
|
||||||
|
"availabilityImpact": "HIGH",
|
||||||
|
"baseScore": 9.8,
|
||||||
|
"baseSeverity": "CRITICAL"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 3.9,
|
||||||
|
"impactScore": 5.9
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"weaknesses": [
|
||||||
|
{
|
||||||
|
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||||
|
"type": "Secondary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-94"
|
||||||
|
}
|
||||||
|
]
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"metrics": {},
|
|
||||||
"references": [
|
"references": [
|
||||||
{
|
{
|
||||||
"url": "https://gist.github.com/microvorld/516552dcef65acc2d1ab0fb969cd34a3",
|
"url": "https://gist.github.com/microvorld/516552dcef65acc2d1ab0fb969cd34a3",
|
||||||
|
@ -2,16 +2,55 @@
|
|||||||
"id": "CVE-2024-51051",
|
"id": "CVE-2024-51051",
|
||||||
"sourceIdentifier": "cve@mitre.org",
|
"sourceIdentifier": "cve@mitre.org",
|
||||||
"published": "2024-11-18T22:15:06.190",
|
"published": "2024-11-18T22:15:06.190",
|
||||||
"lastModified": "2024-11-18T22:15:06.190",
|
"lastModified": "2024-11-19T15:35:11.920",
|
||||||
"vulnStatus": "Received",
|
"vulnStatus": "Received",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
"lang": "en",
|
"lang": "en",
|
||||||
"value": "AVSCMS v8.2.0 was discovered to contain weak default credentials for the Administrator account."
|
"value": "AVSCMS v8.2.0 was discovered to contain weak default credentials for the Administrator account."
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"lang": "es",
|
||||||
|
"value": "Se descubri\u00f3 que AVSCMS v8.2.0 conten\u00eda credenciales predeterminadas d\u00e9biles para la cuenta de administrador."
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"metrics": {
|
||||||
|
"cvssMetricV31": [
|
||||||
|
{
|
||||||
|
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||||
|
"type": "Secondary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||||
|
"attackVector": "NETWORK",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "NONE",
|
||||||
|
"userInteraction": "NONE",
|
||||||
|
"scope": "UNCHANGED",
|
||||||
|
"confidentialityImpact": "HIGH",
|
||||||
|
"integrityImpact": "HIGH",
|
||||||
|
"availabilityImpact": "HIGH",
|
||||||
|
"baseScore": 9.8,
|
||||||
|
"baseSeverity": "CRITICAL"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 3.9,
|
||||||
|
"impactScore": 5.9
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"weaknesses": [
|
||||||
|
{
|
||||||
|
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||||
|
"type": "Secondary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-276"
|
||||||
|
}
|
||||||
|
]
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"metrics": {},
|
|
||||||
"references": [
|
"references": [
|
||||||
{
|
{
|
||||||
"url": "https://binqqer.com/posts/CVE-2024-51051/",
|
"url": "https://binqqer.com/posts/CVE-2024-51051/",
|
||||||
|
@ -2,16 +2,55 @@
|
|||||||
"id": "CVE-2024-51053",
|
"id": "CVE-2024-51053",
|
||||||
"sourceIdentifier": "cve@mitre.org",
|
"sourceIdentifier": "cve@mitre.org",
|
||||||
"published": "2024-11-18T21:15:06.423",
|
"published": "2024-11-18T21:15:06.423",
|
||||||
"lastModified": "2024-11-18T21:15:06.423",
|
"lastModified": "2024-11-19T15:35:12.750",
|
||||||
"vulnStatus": "Received",
|
"vulnStatus": "Received",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
"lang": "en",
|
"lang": "en",
|
||||||
"value": "An arbitrary file upload vulnerability in the component /main/fileupload.php of AVSCMS v8.2.0 allows attackers to execute arbitrary code via uploading a crafted file."
|
"value": "An arbitrary file upload vulnerability in the component /main/fileupload.php of AVSCMS v8.2.0 allows attackers to execute arbitrary code via uploading a crafted file."
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"lang": "es",
|
||||||
|
"value": "Una vulnerabilidad de carga de archivos arbitrarios en el componente /main/fileupload.php de AVSCMS v8.2.0 permite a los atacantes ejecutar c\u00f3digo arbitrario mediante la carga de un archivo manipulado espec\u00edficamente."
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"metrics": {
|
||||||
|
"cvssMetricV31": [
|
||||||
|
{
|
||||||
|
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||||
|
"type": "Secondary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||||
|
"attackVector": "NETWORK",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "NONE",
|
||||||
|
"userInteraction": "NONE",
|
||||||
|
"scope": "UNCHANGED",
|
||||||
|
"confidentialityImpact": "HIGH",
|
||||||
|
"integrityImpact": "HIGH",
|
||||||
|
"availabilityImpact": "HIGH",
|
||||||
|
"baseScore": 9.8,
|
||||||
|
"baseSeverity": "CRITICAL"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 3.9,
|
||||||
|
"impactScore": 5.9
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"weaknesses": [
|
||||||
|
{
|
||||||
|
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||||
|
"type": "Secondary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-79"
|
||||||
|
}
|
||||||
|
]
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"metrics": {},
|
|
||||||
"references": [
|
"references": [
|
||||||
{
|
{
|
||||||
"url": "https://binqqer.com/posts/CVE-2024-51053/",
|
"url": "https://binqqer.com/posts/CVE-2024-51053/",
|
||||||
|
@ -2,13 +2,17 @@
|
|||||||
"id": "CVE-2024-51743",
|
"id": "CVE-2024-51743",
|
||||||
"sourceIdentifier": "security-advisories@github.com",
|
"sourceIdentifier": "security-advisories@github.com",
|
||||||
"published": "2024-11-18T20:15:05.900",
|
"published": "2024-11-18T20:15:05.900",
|
||||||
"lastModified": "2024-11-18T20:15:05.900",
|
"lastModified": "2024-11-19T15:35:13.590",
|
||||||
"vulnStatus": "Received",
|
"vulnStatus": "Received",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
"lang": "en",
|
"lang": "en",
|
||||||
"value": "MarkUs is a web application for the submission and grading of student assignments. In versions prior to 2.4.8, an arbitrary file write vulnerability in the update/upload/create file methods in Controllers allows authenticated instructors to write arbitrary files to any location on the web server MarkUs is running on (depending on the permissions of the underlying filesystem). e.g. This can lead to a delayed remote code execution in case an attacker is able to write a Ruby file into the config/initializers/ subfolder of the Ruby on Rails application. MarkUs v2.4.8 has addressed this issue. No known workarounds are available at the application level aside from upgrading."
|
"value": "MarkUs is a web application for the submission and grading of student assignments. In versions prior to 2.4.8, an arbitrary file write vulnerability in the update/upload/create file methods in Controllers allows authenticated instructors to write arbitrary files to any location on the web server MarkUs is running on (depending on the permissions of the underlying filesystem). e.g. This can lead to a delayed remote code execution in case an attacker is able to write a Ruby file into the config/initializers/ subfolder of the Ruby on Rails application. MarkUs v2.4.8 has addressed this issue. No known workarounds are available at the application level aside from upgrading."
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"lang": "es",
|
||||||
|
"value": "MarkUs es una aplicaci\u00f3n web para el env\u00edo y calificaci\u00f3n de tareas de los estudiantes. En versiones anteriores a la 2.4.8, una vulnerabilidad de escritura de archivos arbitrarios en los m\u00e9todos de actualizaci\u00f3n/carga/creaci\u00f3n de archivos en los controladores permite a los instructores autenticados escribir archivos arbitrarios en cualquier ubicaci\u00f3n del servidor web en el que se ejecuta MarkUs (seg\u00fan los permisos del sistema de archivos subyacente). Esto puede provocar una ejecuci\u00f3n de c\u00f3digo remoto retrasada en caso de que un atacante pueda escribir un archivo Ruby en la subcarpeta config/initializers/ de la aplicaci\u00f3n Ruby on Rails. MarkUs v2.4.8 ha solucionado este problema. No hay workarounds disponibles a nivel de aplicaci\u00f3n aparte de la actualizaci\u00f3n."
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"metrics": {
|
"metrics": {
|
||||||
@ -55,6 +59,28 @@
|
|||||||
"baseSeverity": "HIGH"
|
"baseSeverity": "HIGH"
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
],
|
||||||
|
"cvssMetricV31": [
|
||||||
|
{
|
||||||
|
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||||
|
"type": "Secondary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||||
|
"attackVector": "NETWORK",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "LOW",
|
||||||
|
"userInteraction": "NONE",
|
||||||
|
"scope": "UNCHANGED",
|
||||||
|
"confidentialityImpact": "HIGH",
|
||||||
|
"integrityImpact": "HIGH",
|
||||||
|
"availabilityImpact": "HIGH",
|
||||||
|
"baseScore": 8.8,
|
||||||
|
"baseSeverity": "HIGH"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 2.8,
|
||||||
|
"impactScore": 5.9
|
||||||
|
}
|
||||||
]
|
]
|
||||||
},
|
},
|
||||||
"weaknesses": [
|
"weaknesses": [
|
||||||
|
@ -2,8 +2,8 @@
|
|||||||
"id": "CVE-2024-52268",
|
"id": "CVE-2024-52268",
|
||||||
"sourceIdentifier": "vultures@jpcert.or.jp",
|
"sourceIdentifier": "vultures@jpcert.or.jp",
|
||||||
"published": "2024-11-13T06:15:14.903",
|
"published": "2024-11-13T06:15:14.903",
|
||||||
"lastModified": "2024-11-13T17:01:16.850",
|
"lastModified": "2024-11-19T15:57:03.780",
|
||||||
"vulnStatus": "Awaiting Analysis",
|
"vulnStatus": "Analyzed",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
@ -16,6 +16,28 @@
|
|||||||
}
|
}
|
||||||
],
|
],
|
||||||
"metrics": {
|
"metrics": {
|
||||||
|
"cvssMetricV31": [
|
||||||
|
{
|
||||||
|
"source": "nvd@nist.gov",
|
||||||
|
"type": "Primary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N",
|
||||||
|
"attackVector": "NETWORK",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "HIGH",
|
||||||
|
"userInteraction": "REQUIRED",
|
||||||
|
"scope": "CHANGED",
|
||||||
|
"confidentialityImpact": "LOW",
|
||||||
|
"integrityImpact": "LOW",
|
||||||
|
"availabilityImpact": "NONE",
|
||||||
|
"baseScore": 4.8,
|
||||||
|
"baseSeverity": "MEDIUM"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 1.7,
|
||||||
|
"impactScore": 2.7
|
||||||
|
}
|
||||||
|
],
|
||||||
"cvssMetricV30": [
|
"cvssMetricV30": [
|
||||||
{
|
{
|
||||||
"source": "vultures@jpcert.or.jp",
|
"source": "vultures@jpcert.or.jp",
|
||||||
@ -51,14 +73,38 @@
|
|||||||
]
|
]
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"references": [
|
"configurations": [
|
||||||
{
|
{
|
||||||
"url": "https://jvn.jp/en/jp/JVN05136799/",
|
"nodes": [
|
||||||
"source": "vultures@jpcert.or.jp"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"url": "https://vektor-inc.co.jp/en/update/regarding-vulnerabilities-in-vk-all-in-one-expansion-unit-version-9-100-0-and-earlier/",
|
"operator": "OR",
|
||||||
"source": "vultures@jpcert.or.jp"
|
"negate": false,
|
||||||
|
"cpeMatch": [
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:a:vektor-inc:vk_all_in_one_expansion_unit:*:*:*:*:*:wordpress:*:*",
|
||||||
|
"versionEndExcluding": "9.100.1.0",
|
||||||
|
"matchCriteriaId": "5C50E627-160C-4091-A630-E38CBC029967"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://jvn.jp/en/jp/JVN05136799/",
|
||||||
|
"source": "vultures@jpcert.or.jp",
|
||||||
|
"tags": [
|
||||||
|
"Third Party Advisory"
|
||||||
|
]
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://vektor-inc.co.jp/en/update/regarding-vulnerabilities-in-vk-all-in-one-expansion-unit-version-9-100-0-and-earlier/",
|
||||||
|
"source": "vultures@jpcert.or.jp",
|
||||||
|
"tags": [
|
||||||
|
"Vendor Advisory"
|
||||||
|
]
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
@ -2,13 +2,17 @@
|
|||||||
"id": "CVE-2024-52303",
|
"id": "CVE-2024-52303",
|
||||||
"sourceIdentifier": "security-advisories@github.com",
|
"sourceIdentifier": "security-advisories@github.com",
|
||||||
"published": "2024-11-18T20:15:06.047",
|
"published": "2024-11-18T20:15:06.047",
|
||||||
"lastModified": "2024-11-18T20:15:06.047",
|
"lastModified": "2024-11-19T15:35:13.847",
|
||||||
"vulnStatus": "Received",
|
"vulnStatus": "Received",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
"lang": "en",
|
"lang": "en",
|
||||||
"value": "aiohttp is an asynchronous HTTP client/server framework for asyncio and Python. In versions starting with 3.10.6 and prior to 3.10.11, a memory leak can occur when a request produces a MatchInfoError. This was caused by adding an entry to a cache on each request, due to the building of each MatchInfoError producing a unique cache entry. An attacker may be able to exhaust the memory resources of a server by sending a substantial number (100,000s to millions) of such requests. Those who use any middlewares with aiohttp.web should upgrade to version 3.10.11 to receive a patch."
|
"value": "aiohttp is an asynchronous HTTP client/server framework for asyncio and Python. In versions starting with 3.10.6 and prior to 3.10.11, a memory leak can occur when a request produces a MatchInfoError. This was caused by adding an entry to a cache on each request, due to the building of each MatchInfoError producing a unique cache entry. An attacker may be able to exhaust the memory resources of a server by sending a substantial number (100,000s to millions) of such requests. Those who use any middlewares with aiohttp.web should upgrade to version 3.10.11 to receive a patch."
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"lang": "es",
|
||||||
|
"value": "aiohttp es un framework de trabajo de cliente/servidor HTTP asincr\u00f3nico para asyncio y Python. En las versiones a partir de la 3.10.6 y anteriores a la 3.10.11, puede producirse una p\u00e9rdida de memoria cuando una solicitud produce un MatchInfoError. Esto se deb\u00eda a que se a\u00f1ad\u00eda una entrada a una memoria cach\u00e9 en cada solicitud, debido a que la creaci\u00f3n de cada MatchInfoError produc\u00eda una entrada de memoria cach\u00e9 \u00fanica. Un atacante podr\u00eda agotar los recursos de memoria de un servidor enviando una cantidad sustancial (entre cientos y millones) de dichas solicitudes. Quienes utilicen cualquier middleware con aiohttp.web deber\u00edan actualizar a la versi\u00f3n 3.10.11 para recibir un parche."
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"metrics": {
|
"metrics": {
|
||||||
@ -55,6 +59,28 @@
|
|||||||
"baseSeverity": "HIGH"
|
"baseSeverity": "HIGH"
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
],
|
||||||
|
"cvssMetricV31": [
|
||||||
|
{
|
||||||
|
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||||
|
"type": "Secondary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
|
||||||
|
"attackVector": "NETWORK",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "NONE",
|
||||||
|
"userInteraction": "NONE",
|
||||||
|
"scope": "UNCHANGED",
|
||||||
|
"confidentialityImpact": "NONE",
|
||||||
|
"integrityImpact": "NONE",
|
||||||
|
"availabilityImpact": "HIGH",
|
||||||
|
"baseScore": 7.5,
|
||||||
|
"baseSeverity": "HIGH"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 3.9,
|
||||||
|
"impactScore": 3.6
|
||||||
|
}
|
||||||
]
|
]
|
||||||
},
|
},
|
||||||
"weaknesses": [
|
"weaknesses": [
|
||||||
|
@ -2,13 +2,17 @@
|
|||||||
"id": "CVE-2024-52304",
|
"id": "CVE-2024-52304",
|
||||||
"sourceIdentifier": "security-advisories@github.com",
|
"sourceIdentifier": "security-advisories@github.com",
|
||||||
"published": "2024-11-18T21:15:06.500",
|
"published": "2024-11-18T21:15:06.500",
|
||||||
"lastModified": "2024-11-18T21:15:06.500",
|
"lastModified": "2024-11-19T16:35:16.793",
|
||||||
"vulnStatus": "Received",
|
"vulnStatus": "Received",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
"lang": "en",
|
"lang": "en",
|
||||||
"value": "aiohttp is an asynchronous HTTP client/server framework for asyncio and Python. Prior to version 3.10.11, the Python parser parses newlines in chunk extensions incorrectly which can lead to request smuggling vulnerabilities under certain conditions. If a pure Python version of aiohttp is installed (i.e. without the usual C extensions) or `AIOHTTP_NO_EXTENSIONS` is enabled, then an attacker may be able to execute a request smuggling attack to bypass certain firewalls or proxy protections. Version 3.10.11 fixes the issue."
|
"value": "aiohttp is an asynchronous HTTP client/server framework for asyncio and Python. Prior to version 3.10.11, the Python parser parses newlines in chunk extensions incorrectly which can lead to request smuggling vulnerabilities under certain conditions. If a pure Python version of aiohttp is installed (i.e. without the usual C extensions) or `AIOHTTP_NO_EXTENSIONS` is enabled, then an attacker may be able to execute a request smuggling attack to bypass certain firewalls or proxy protections. Version 3.10.11 fixes the issue."
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"lang": "es",
|
||||||
|
"value": "aiohttp es un framework de trabajo de cliente/servidor HTTP asincr\u00f3nico para asyncio y Python. Antes de la versi\u00f3n 3.10.11, el analizador de Python analiza incorrectamente las nuevas l\u00edneas en las extensiones de fragmentos, lo que puede provocar vulnerabilidades de contrabando de solicitudes en determinadas condiciones. Si se instala una versi\u00f3n Python pura de aiohttp (es decir, sin las extensiones C habituales) o se habilita `AIOHTTP_NO_EXTENSIONS`, un atacante puede ejecutar un ataque de contrabando de solicitudes para eludir determinados cortafuegos o protecciones de proxy. La versi\u00f3n 3.10.11 soluciona el problema."
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"metrics": {
|
"metrics": {
|
||||||
@ -55,6 +59,28 @@
|
|||||||
"baseSeverity": "MEDIUM"
|
"baseSeverity": "MEDIUM"
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
],
|
||||||
|
"cvssMetricV31": [
|
||||||
|
{
|
||||||
|
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||||
|
"type": "Secondary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:N",
|
||||||
|
"attackVector": "NETWORK",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "NONE",
|
||||||
|
"userInteraction": "NONE",
|
||||||
|
"scope": "UNCHANGED",
|
||||||
|
"confidentialityImpact": "NONE",
|
||||||
|
"integrityImpact": "NONE",
|
||||||
|
"availabilityImpact": "NONE",
|
||||||
|
"baseScore": 0.0,
|
||||||
|
"baseSeverity": "NONE"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 3.9,
|
||||||
|
"impactScore": 0.0
|
||||||
|
}
|
||||||
]
|
]
|
||||||
},
|
},
|
||||||
"weaknesses": [
|
"weaknesses": [
|
||||||
|
@ -2,8 +2,8 @@
|
|||||||
"id": "CVE-2024-52306",
|
"id": "CVE-2024-52306",
|
||||||
"sourceIdentifier": "security-advisories@github.com",
|
"sourceIdentifier": "security-advisories@github.com",
|
||||||
"published": "2024-11-13T16:15:20.723",
|
"published": "2024-11-13T16:15:20.723",
|
||||||
"lastModified": "2024-11-13T17:01:16.850",
|
"lastModified": "2024-11-19T15:02:45.053",
|
||||||
"vulnStatus": "Awaiting Analysis",
|
"vulnStatus": "Analyzed",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
@ -17,6 +17,26 @@
|
|||||||
],
|
],
|
||||||
"metrics": {
|
"metrics": {
|
||||||
"cvssMetricV31": [
|
"cvssMetricV31": [
|
||||||
|
{
|
||||||
|
"source": "nvd@nist.gov",
|
||||||
|
"type": "Primary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||||
|
"attackVector": "NETWORK",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "NONE",
|
||||||
|
"userInteraction": "NONE",
|
||||||
|
"scope": "UNCHANGED",
|
||||||
|
"confidentialityImpact": "HIGH",
|
||||||
|
"integrityImpact": "HIGH",
|
||||||
|
"availabilityImpact": "HIGH",
|
||||||
|
"baseScore": 9.8,
|
||||||
|
"baseSeverity": "CRITICAL"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 3.9,
|
||||||
|
"impactScore": 5.9
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"source": "security-advisories@github.com",
|
"source": "security-advisories@github.com",
|
||||||
"type": "Secondary",
|
"type": "Secondary",
|
||||||
@ -51,14 +71,45 @@
|
|||||||
]
|
]
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"references": [
|
"configurations": [
|
||||||
{
|
{
|
||||||
"url": "https://github.com/Laravel-Backpack/FileManager/commit/2830498b85e05fb3c92179053b4d7c4a0fdb880b",
|
"nodes": [
|
||||||
"source": "security-advisories@github.com"
|
{
|
||||||
|
"operator": "OR",
|
||||||
|
"negate": false,
|
||||||
|
"cpeMatch": [
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:a:backpackforlaravel:filemanager:*:*:*:*:*:*:*:*",
|
||||||
|
"versionEndExcluding": "2.0.2",
|
||||||
|
"matchCriteriaId": "3916EFA1-114A-4622-9384-A01A4D874D87"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"url": "https://github.com/Laravel-Backpack/FileManager/security/advisories/GHSA-8237-957h-h2c2",
|
"vulnerable": true,
|
||||||
"source": "security-advisories@github.com"
|
"criteria": "cpe:2.3:a:backpackforlaravel:filemanager:*:*:*:*:*:*:*:*",
|
||||||
|
"versionStartIncluding": "3.0.0",
|
||||||
|
"versionEndExcluding": "3.0.9",
|
||||||
|
"matchCriteriaId": "20B83E97-268F-47A7-A199-24F2AC570DD0"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://github.com/Laravel-Backpack/FileManager/commit/2830498b85e05fb3c92179053b4d7c4a0fdb880b",
|
||||||
|
"source": "security-advisories@github.com",
|
||||||
|
"tags": [
|
||||||
|
"Patch"
|
||||||
|
]
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://github.com/Laravel-Backpack/FileManager/security/advisories/GHSA-8237-957h-h2c2",
|
||||||
|
"source": "security-advisories@github.com",
|
||||||
|
"tags": [
|
||||||
|
"Vendor Advisory"
|
||||||
|
]
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
@ -2,13 +2,17 @@
|
|||||||
"id": "CVE-2024-52506",
|
"id": "CVE-2024-52506",
|
||||||
"sourceIdentifier": "security-advisories@github.com",
|
"sourceIdentifier": "security-advisories@github.com",
|
||||||
"published": "2024-11-18T21:15:06.633",
|
"published": "2024-11-18T21:15:06.633",
|
||||||
"lastModified": "2024-11-18T21:15:06.633",
|
"lastModified": "2024-11-19T16:35:17.897",
|
||||||
"vulnStatus": "Received",
|
"vulnStatus": "Received",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
"lang": "en",
|
"lang": "en",
|
||||||
"value": "Graylog is a free and open log management platform. The reporting functionality in Graylog allows the creation and scheduling of reports which contain dashboard widgets displaying individual log messages or metrics aggregated from fields of multiple log messages. This functionality, as included in Graylog 6.1.0 & 6.1.1, is vulnerable to information leakage triggered by multiple concurrent report rendering requests from authorized users. When multiple report renderings are requested at the same start time, the headless browser instance used to render the PDF will be reused. Depending on the timing, either a check for the browser instance \"freshness\" hits, resulting in an error instead of the report being returned, or one of the concurrent report rendering requests \"wins\" and this report is returned for all report rendering requests that do not return an error. This might lead to one user getting the report of a different user, potentially leaking indexed log messages or aggregated data that this user normally has no access to. This problem is fixed in Graylog 6.1.2. There is no known workaround besides disabling the reporting functionality."
|
"value": "Graylog is a free and open log management platform. The reporting functionality in Graylog allows the creation and scheduling of reports which contain dashboard widgets displaying individual log messages or metrics aggregated from fields of multiple log messages. This functionality, as included in Graylog 6.1.0 & 6.1.1, is vulnerable to information leakage triggered by multiple concurrent report rendering requests from authorized users. When multiple report renderings are requested at the same start time, the headless browser instance used to render the PDF will be reused. Depending on the timing, either a check for the browser instance \"freshness\" hits, resulting in an error instead of the report being returned, or one of the concurrent report rendering requests \"wins\" and this report is returned for all report rendering requests that do not return an error. This might lead to one user getting the report of a different user, potentially leaking indexed log messages or aggregated data that this user normally has no access to. This problem is fixed in Graylog 6.1.2. There is no known workaround besides disabling the reporting functionality."
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"lang": "es",
|
||||||
|
"value": "Graylog es una plataforma de gesti\u00f3n de registros abierta y gratuita. La funci\u00f3n de generaci\u00f3n de informes de Graylog permite la creaci\u00f3n y programaci\u00f3n de informes que contienen widgets de panel que muestran mensajes de registro individuales o m\u00e9tricas agregadas de campos de m\u00faltiples mensajes de registro. Esta funci\u00f3n, incluida en Graylog 6.1.0 y 6.1.1, es vulnerable a la fuga de informaci\u00f3n provocada por m\u00faltiples solicitudes de generaci\u00f3n de informes simult\u00e1neas de usuarios autorizados. Cuando se solicitan m\u00faltiples representaciones de informes al mismo tiempo de inicio, se reutilizar\u00e1 la instancia del navegador sin interfaz gr\u00e1fica utilizada para generar el PDF. Seg\u00fan el momento, se realiza una comprobaci\u00f3n de la \"actualidad\" de la instancia del navegador, lo que genera un error en lugar de devolver el informe, o bien una de las solicitudes de generaci\u00f3n de informes simult\u00e1neas \"gana\" y este informe se devuelve para todas las solicitudes de generaci\u00f3n de informes que no devuelven un error. Esto puede provocar que un usuario obtenga el informe de un usuario diferente, lo que podr\u00eda filtrar mensajes de registro indexados o datos agregados a los que este usuario normalmente no tiene acceso. Este problema se solucion\u00f3 en Graylog 6.1.2. No existe ning\u00fan workaround conocido, adem\u00e1s de deshabilitar la funci\u00f3n de generaci\u00f3n de informes."
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"metrics": {
|
"metrics": {
|
||||||
@ -55,6 +59,28 @@
|
|||||||
"baseSeverity": "HIGH"
|
"baseSeverity": "HIGH"
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
],
|
||||||
|
"cvssMetricV31": [
|
||||||
|
{
|
||||||
|
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||||
|
"type": "Secondary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N",
|
||||||
|
"attackVector": "NETWORK",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "LOW",
|
||||||
|
"userInteraction": "NONE",
|
||||||
|
"scope": "UNCHANGED",
|
||||||
|
"confidentialityImpact": "NONE",
|
||||||
|
"integrityImpact": "NONE",
|
||||||
|
"availabilityImpact": "NONE",
|
||||||
|
"baseScore": 0.0,
|
||||||
|
"baseSeverity": "NONE"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 2.8,
|
||||||
|
"impactScore": 0.0
|
||||||
|
}
|
||||||
]
|
]
|
||||||
},
|
},
|
||||||
"weaknesses": [
|
"weaknesses": [
|
||||||
|
64
CVE-2024/CVE-2024-525xx/CVE-2024-52582.json
Normal file
64
CVE-2024/CVE-2024-525xx/CVE-2024-52582.json
Normal file
@ -0,0 +1,64 @@
|
|||||||
|
{
|
||||||
|
"id": "CVE-2024-52582",
|
||||||
|
"sourceIdentifier": "security-advisories@github.com",
|
||||||
|
"published": "2024-11-19T16:15:20.207",
|
||||||
|
"lastModified": "2024-11-19T16:15:20.207",
|
||||||
|
"vulnStatus": "Received",
|
||||||
|
"cveTags": [],
|
||||||
|
"descriptions": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "Cachi2 is a command-line interface tool that pre-fetches a project's dependencies to aid in making the project's build process network-isolated. Prior to version 0.14.0, secrets may be shown in logs when an unhandled exception is triggered because the tool is logging locals of each function. This may uncover secrets if tool used in CI/build pipelines as it's the main use case. Version 0.14.0 contains a patch for the issue. No known workarounds are available."
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"metrics": {
|
||||||
|
"cvssMetricV31": [
|
||||||
|
{
|
||||||
|
"source": "security-advisories@github.com",
|
||||||
|
"type": "Secondary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N",
|
||||||
|
"attackVector": "LOCAL",
|
||||||
|
"attackComplexity": "HIGH",
|
||||||
|
"privilegesRequired": "NONE",
|
||||||
|
"userInteraction": "REQUIRED",
|
||||||
|
"scope": "UNCHANGED",
|
||||||
|
"confidentialityImpact": "HIGH",
|
||||||
|
"integrityImpact": "NONE",
|
||||||
|
"availabilityImpact": "NONE",
|
||||||
|
"baseScore": 4.7,
|
||||||
|
"baseSeverity": "MEDIUM"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 1.0,
|
||||||
|
"impactScore": 3.6
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"weaknesses": [
|
||||||
|
{
|
||||||
|
"source": "security-advisories@github.com",
|
||||||
|
"type": "Primary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-497"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://github.com/containerbuildsystem/cachi2/commit/d6638e5e14474061a1ab1ba5d0ee72f58b9a11a9",
|
||||||
|
"source": "security-advisories@github.com"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://github.com/containerbuildsystem/cachi2/security/advisories/GHSA-w9qc-9m5h-qqmh",
|
||||||
|
"source": "security-advisories@github.com"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://typer.tiangolo.com/tutorial/exceptions/?h=#disable-local-variables-for-security",
|
||||||
|
"source": "security-advisories@github.com"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
@ -2,13 +2,17 @@
|
|||||||
"id": "CVE-2024-52584",
|
"id": "CVE-2024-52584",
|
||||||
"sourceIdentifier": "security-advisories@github.com",
|
"sourceIdentifier": "security-advisories@github.com",
|
||||||
"published": "2024-11-18T21:15:07.047",
|
"published": "2024-11-18T21:15:07.047",
|
||||||
"lastModified": "2024-11-18T21:15:07.047",
|
"lastModified": "2024-11-19T16:35:18.180",
|
||||||
"vulnStatus": "Received",
|
"vulnStatus": "Received",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
"lang": "en",
|
"lang": "en",
|
||||||
"value": "Autolab is a course management service that enables auto-graded programming assignments. There is a vulnerability in version 3.0.1 where CAs can view or edit the grade for any submission ID, even if they are not a CA for the class that has the submission. The endpoints only check that the CAs have the authorization level of a CA in the class in the endpoint, which is not necessarily the class the submission is attached to. Version 3.0.2 contains a patch. No known workarounds are available."
|
"value": "Autolab is a course management service that enables auto-graded programming assignments. There is a vulnerability in version 3.0.1 where CAs can view or edit the grade for any submission ID, even if they are not a CA for the class that has the submission. The endpoints only check that the CAs have the authorization level of a CA in the class in the endpoint, which is not necessarily the class the submission is attached to. Version 3.0.2 contains a patch. No known workarounds are available."
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"lang": "es",
|
||||||
|
"value": "Autolab es un servicio de gesti\u00f3n de cursos que permite la calificaci\u00f3n autom\u00e1tica de tareas de programaci\u00f3n. Existe una vulnerabilidad en la versi\u00f3n 3.0.1 en la que los CA pueden ver o editar la calificaci\u00f3n de cualquier ID de env\u00edo, incluso si no son CA de la clase que tiene el env\u00edo. Los endpoints solo verifican que los CA tengan el nivel de autorizaci\u00f3n de un CA de la clase en el endpoint, que no es necesariamente la clase a la que est\u00e1 asociado el env\u00edo. La versi\u00f3n 3.0.2 contiene un parche. No hay workarounds disponibles."
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"metrics": {
|
"metrics": {
|
||||||
@ -55,6 +59,28 @@
|
|||||||
"baseSeverity": "MEDIUM"
|
"baseSeverity": "MEDIUM"
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
],
|
||||||
|
"cvssMetricV31": [
|
||||||
|
{
|
||||||
|
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||||
|
"type": "Secondary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N",
|
||||||
|
"attackVector": "NETWORK",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "LOW",
|
||||||
|
"userInteraction": "NONE",
|
||||||
|
"scope": "UNCHANGED",
|
||||||
|
"confidentialityImpact": "NONE",
|
||||||
|
"integrityImpact": "NONE",
|
||||||
|
"availabilityImpact": "NONE",
|
||||||
|
"baseScore": 0.0,
|
||||||
|
"baseSeverity": "NONE"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 2.8,
|
||||||
|
"impactScore": 0.0
|
||||||
|
}
|
||||||
]
|
]
|
||||||
},
|
},
|
||||||
"weaknesses": [
|
"weaknesses": [
|
||||||
|
@ -2,13 +2,17 @@
|
|||||||
"id": "CVE-2024-52585",
|
"id": "CVE-2024-52585",
|
||||||
"sourceIdentifier": "security-advisories@github.com",
|
"sourceIdentifier": "security-advisories@github.com",
|
||||||
"published": "2024-11-18T21:15:07.183",
|
"published": "2024-11-18T21:15:07.183",
|
||||||
"lastModified": "2024-11-18T21:15:07.183",
|
"lastModified": "2024-11-19T16:35:18.380",
|
||||||
"vulnStatus": "Received",
|
"vulnStatus": "Received",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
"lang": "en",
|
"lang": "en",
|
||||||
"value": "Autolab is a course management service that enables auto-graded programming assignments. There is an HTML injection vulnerability in version 3.0.1 that can affect instructors and CAs on the grade submissions page. The issue is patched in version 3.0.2. One may apply the patch manually by editing line 589 on `gradesheet.js.erb` to take in feedback as text rather than html."
|
"value": "Autolab is a course management service that enables auto-graded programming assignments. There is an HTML injection vulnerability in version 3.0.1 that can affect instructors and CAs on the grade submissions page. The issue is patched in version 3.0.2. One may apply the patch manually by editing line 589 on `gradesheet.js.erb` to take in feedback as text rather than html."
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"lang": "es",
|
||||||
|
"value": "Autolab es un servicio de gesti\u00f3n de cursos que permite la calificaci\u00f3n autom\u00e1tica de tareas de programaci\u00f3n. Existe una vulnerabilidad de inyecci\u00f3n de HTML en la versi\u00f3n 3.0.1 que puede afectar a los instructores y a los CA en la p\u00e1gina de env\u00edo de calificaciones. El problema se solucion\u00f3 en la versi\u00f3n 3.0.2. Se puede aplicar el parche manualmente editando la l\u00ednea 589 en `gradesheet.js.erb` para que los comentarios se tomen como texto en lugar de HTML."
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"metrics": {
|
"metrics": {
|
||||||
@ -55,6 +59,28 @@
|
|||||||
"baseSeverity": "LOW"
|
"baseSeverity": "LOW"
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
],
|
||||||
|
"cvssMetricV31": [
|
||||||
|
{
|
||||||
|
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||||
|
"type": "Secondary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:N",
|
||||||
|
"attackVector": "NETWORK",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "LOW",
|
||||||
|
"userInteraction": "REQUIRED",
|
||||||
|
"scope": "UNCHANGED",
|
||||||
|
"confidentialityImpact": "LOW",
|
||||||
|
"integrityImpact": "LOW",
|
||||||
|
"availabilityImpact": "NONE",
|
||||||
|
"baseScore": 4.6,
|
||||||
|
"baseSeverity": "MEDIUM"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 2.1,
|
||||||
|
"impactScore": 2.5
|
||||||
|
}
|
||||||
]
|
]
|
||||||
},
|
},
|
||||||
"weaknesses": [
|
"weaknesses": [
|
||||||
|
@ -2,13 +2,17 @@
|
|||||||
"id": "CVE-2024-52587",
|
"id": "CVE-2024-52587",
|
||||||
"sourceIdentifier": "security-advisories@github.com",
|
"sourceIdentifier": "security-advisories@github.com",
|
||||||
"published": "2024-11-18T22:15:09.557",
|
"published": "2024-11-18T22:15:09.557",
|
||||||
"lastModified": "2024-11-18T22:15:09.557",
|
"lastModified": "2024-11-19T15:35:15.427",
|
||||||
"vulnStatus": "Received",
|
"vulnStatus": "Received",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
"lang": "en",
|
"lang": "en",
|
||||||
"value": "StepSecurity's Harden-Runner provides network egress filtering and runtime security for GitHub-hosted and self-hosted runners. Versions of step-security/harden-runner prior to v2.10.2 contain multiple command injection weaknesses via environment variables that could potentially be exploited under specific conditions. However, due to the current execution order of pre-steps in GitHub Actions and the placement of harden-runner as the first step in a job, the likelihood of exploitation is low as the Harden-Runner action reads the environment variable during the pre-step stage. There are no known exploits at this time. Version 2.10.2 contains a patch."
|
"value": "StepSecurity's Harden-Runner provides network egress filtering and runtime security for GitHub-hosted and self-hosted runners. Versions of step-security/harden-runner prior to v2.10.2 contain multiple command injection weaknesses via environment variables that could potentially be exploited under specific conditions. However, due to the current execution order of pre-steps in GitHub Actions and the placement of harden-runner as the first step in a job, the likelihood of exploitation is low as the Harden-Runner action reads the environment variable during the pre-step stage. There are no known exploits at this time. Version 2.10.2 contains a patch."
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"lang": "es",
|
||||||
|
"value": "Harden-Runner de StepSecurity proporciona filtrado de salida de red y seguridad en tiempo de ejecuci\u00f3n para ejecutores alojados en GitHub y alojados por cuenta propia. Las versiones de step-security/harden-runner anteriores a la v2.10.2 contienen m\u00faltiples debilidades de inyecci\u00f3n de comandos a trav\u00e9s de variables de entorno que podr\u00edan explotarse potencialmente en condiciones espec\u00edficas. Sin embargo, debido al orden de ejecuci\u00f3n actual de los pasos previos en las acciones de GitHub y la ubicaci\u00f3n de harden-runner como el primer paso en un trabajo, la probabilidad de explotaci\u00f3n es baja ya que la acci\u00f3n Harden-Runner lee la variable de entorno durante la etapa previa al paso. No se conocen explotaciones en este momento. La versi\u00f3n 2.10.2 contiene un parche."
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"metrics": {
|
"metrics": {
|
||||||
@ -55,6 +59,28 @@
|
|||||||
"baseSeverity": "LOW"
|
"baseSeverity": "LOW"
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
],
|
||||||
|
"cvssMetricV31": [
|
||||||
|
{
|
||||||
|
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||||
|
"type": "Secondary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||||
|
"attackVector": "NETWORK",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "LOW",
|
||||||
|
"userInteraction": "NONE",
|
||||||
|
"scope": "UNCHANGED",
|
||||||
|
"confidentialityImpact": "HIGH",
|
||||||
|
"integrityImpact": "HIGH",
|
||||||
|
"availabilityImpact": "HIGH",
|
||||||
|
"baseScore": 8.8,
|
||||||
|
"baseSeverity": "HIGH"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 2.8,
|
||||||
|
"impactScore": 5.9
|
||||||
|
}
|
||||||
]
|
]
|
||||||
},
|
},
|
||||||
"weaknesses": [
|
"weaknesses": [
|
||||||
|
@ -2,7 +2,7 @@
|
|||||||
"id": "CVE-2024-52867",
|
"id": "CVE-2024-52867",
|
||||||
"sourceIdentifier": "cve@mitre.org",
|
"sourceIdentifier": "cve@mitre.org",
|
||||||
"published": "2024-11-17T03:15:04.003",
|
"published": "2024-11-17T03:15:04.003",
|
||||||
"lastModified": "2024-11-18T17:11:17.393",
|
"lastModified": "2024-11-19T16:35:18.583",
|
||||||
"vulnStatus": "Awaiting Analysis",
|
"vulnStatus": "Awaiting Analysis",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
@ -39,6 +39,18 @@
|
|||||||
}
|
}
|
||||||
]
|
]
|
||||||
},
|
},
|
||||||
|
"weaknesses": [
|
||||||
|
{
|
||||||
|
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||||
|
"type": "Secondary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-276"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
"references": [
|
"references": [
|
||||||
{
|
{
|
||||||
"url": "https://git.savannah.gnu.org/cgit/guix.git/commit/?id=558224140dab669cabdaebabff18504a066c48d4",
|
"url": "https://git.savannah.gnu.org/cgit/guix.git/commit/?id=558224140dab669cabdaebabff18504a066c48d4",
|
||||||
|
@ -2,7 +2,7 @@
|
|||||||
"id": "CVE-2024-52944",
|
"id": "CVE-2024-52944",
|
||||||
"sourceIdentifier": "cve@mitre.org",
|
"sourceIdentifier": "cve@mitre.org",
|
||||||
"published": "2024-11-18T06:15:06.017",
|
"published": "2024-11-18T06:15:06.017",
|
||||||
"lastModified": "2024-11-18T17:11:17.393",
|
"lastModified": "2024-11-19T16:35:19.310",
|
||||||
"vulnStatus": "Awaiting Analysis",
|
"vulnStatus": "Awaiting Analysis",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
@ -39,6 +39,18 @@
|
|||||||
}
|
}
|
||||||
]
|
]
|
||||||
},
|
},
|
||||||
|
"weaknesses": [
|
||||||
|
{
|
||||||
|
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||||
|
"type": "Secondary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-79"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
"references": [
|
"references": [
|
||||||
{
|
{
|
||||||
"url": "https://www.veritas.com/support/en_US/security/VTS24-013",
|
"url": "https://www.veritas.com/support/en_US/security/VTS24-013",
|
||||||
|
@ -2,7 +2,7 @@
|
|||||||
"id": "CVE-2024-52945",
|
"id": "CVE-2024-52945",
|
||||||
"sourceIdentifier": "cve@mitre.org",
|
"sourceIdentifier": "cve@mitre.org",
|
||||||
"published": "2024-11-18T06:15:06.250",
|
"published": "2024-11-18T06:15:06.250",
|
||||||
"lastModified": "2024-11-18T17:11:17.393",
|
"lastModified": "2024-11-19T16:35:20.020",
|
||||||
"vulnStatus": "Awaiting Analysis",
|
"vulnStatus": "Awaiting Analysis",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
@ -39,6 +39,18 @@
|
|||||||
}
|
}
|
||||||
]
|
]
|
||||||
},
|
},
|
||||||
|
"weaknesses": [
|
||||||
|
{
|
||||||
|
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||||
|
"type": "Secondary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-94"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
"references": [
|
"references": [
|
||||||
{
|
{
|
||||||
"url": "https://www.veritas.com/content/support/en_US/security/VTS24-012",
|
"url": "https://www.veritas.com/content/support/en_US/security/VTS24-012",
|
||||||
|
@ -2,8 +2,8 @@
|
|||||||
"id": "CVE-2024-8001",
|
"id": "CVE-2024-8001",
|
||||||
"sourceIdentifier": "cna@vuldb.com",
|
"sourceIdentifier": "cna@vuldb.com",
|
||||||
"published": "2024-11-13T10:15:04.593",
|
"published": "2024-11-13T10:15:04.593",
|
||||||
"lastModified": "2024-11-13T17:01:16.850",
|
"lastModified": "2024-11-19T15:41:25.973",
|
||||||
"vulnStatus": "Awaiting Analysis",
|
"vulnStatus": "Analyzed",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
@ -61,6 +61,26 @@
|
|||||||
}
|
}
|
||||||
],
|
],
|
||||||
"cvssMetricV31": [
|
"cvssMetricV31": [
|
||||||
|
{
|
||||||
|
"source": "nvd@nist.gov",
|
||||||
|
"type": "Primary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
|
||||||
|
"attackVector": "NETWORK",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "LOW",
|
||||||
|
"userInteraction": "NONE",
|
||||||
|
"scope": "UNCHANGED",
|
||||||
|
"confidentialityImpact": "LOW",
|
||||||
|
"integrityImpact": "NONE",
|
||||||
|
"availabilityImpact": "NONE",
|
||||||
|
"baseScore": 4.3,
|
||||||
|
"baseSeverity": "MEDIUM"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 2.8,
|
||||||
|
"impactScore": 1.4
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"source": "cna@vuldb.com",
|
"source": "cna@vuldb.com",
|
||||||
"type": "Secondary",
|
"type": "Secondary",
|
||||||
@ -124,14 +144,37 @@
|
|||||||
]
|
]
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"references": [
|
"configurations": [
|
||||||
{
|
{
|
||||||
"url": "https://vuldb.com/?ctiid.284352",
|
"nodes": [
|
||||||
"source": "cna@vuldb.com"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"url": "https://vuldb.com/?id.284352",
|
"operator": "OR",
|
||||||
"source": "cna@vuldb.com"
|
"negate": false,
|
||||||
|
"cpeMatch": [
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:a:viwis:learning_management_system:9.11:*:*:*:*:*:*:*",
|
||||||
|
"matchCriteriaId": "EFCC7D38-AC54-4E99-95B0-78AC3049258C"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://vuldb.com/?ctiid.284352",
|
||||||
|
"source": "cna@vuldb.com",
|
||||||
|
"tags": [
|
||||||
|
"Permissions Required"
|
||||||
|
]
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://vuldb.com/?id.284352",
|
||||||
|
"source": "cna@vuldb.com",
|
||||||
|
"tags": [
|
||||||
|
"Third Party Advisory"
|
||||||
|
]
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
@ -2,8 +2,8 @@
|
|||||||
"id": "CVE-2024-9059",
|
"id": "CVE-2024-9059",
|
||||||
"sourceIdentifier": "security@wordfence.com",
|
"sourceIdentifier": "security@wordfence.com",
|
||||||
"published": "2024-11-13T09:15:03.897",
|
"published": "2024-11-13T09:15:03.897",
|
||||||
"lastModified": "2024-11-13T17:01:16.850",
|
"lastModified": "2024-11-19T15:53:56.680",
|
||||||
"vulnStatus": "Awaiting Analysis",
|
"vulnStatus": "Analyzed",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
@ -18,8 +18,28 @@
|
|||||||
"metrics": {
|
"metrics": {
|
||||||
"cvssMetricV31": [
|
"cvssMetricV31": [
|
||||||
{
|
{
|
||||||
"source": "security@wordfence.com",
|
"source": "nvd@nist.gov",
|
||||||
"type": "Primary",
|
"type": "Primary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
|
||||||
|
"attackVector": "NETWORK",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "LOW",
|
||||||
|
"userInteraction": "REQUIRED",
|
||||||
|
"scope": "CHANGED",
|
||||||
|
"confidentialityImpact": "LOW",
|
||||||
|
"integrityImpact": "LOW",
|
||||||
|
"availabilityImpact": "NONE",
|
||||||
|
"baseScore": 5.4,
|
||||||
|
"baseSeverity": "MEDIUM"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 2.3,
|
||||||
|
"impactScore": 2.7
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"source": "security@wordfence.com",
|
||||||
|
"type": "Secondary",
|
||||||
"cvssData": {
|
"cvssData": {
|
||||||
"version": "3.1",
|
"version": "3.1",
|
||||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N",
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N",
|
||||||
@ -51,14 +71,38 @@
|
|||||||
]
|
]
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"references": [
|
"configurations": [
|
||||||
{
|
{
|
||||||
"url": "https://plugins.trac.wordpress.org/browser/royal-elementor-addons/tags/1.7.1002/modules/google-maps/widgets/wpr-google-maps.php?rev=3184222",
|
"nodes": [
|
||||||
"source": "security@wordfence.com"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/37223d1f-82c8-414f-bf39-63e728541aa3?source=cve",
|
"operator": "OR",
|
||||||
"source": "security@wordfence.com"
|
"negate": false,
|
||||||
|
"cpeMatch": [
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:a:royal-elementor-addons:royal_elementor_addons:*:*:*:*:*:wordpress:*:*",
|
||||||
|
"versionEndExcluding": "1.7.1002",
|
||||||
|
"matchCriteriaId": "F28BF487-ECD8-48A2-9ACF-4AABEE6A4F01"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://plugins.trac.wordpress.org/browser/royal-elementor-addons/tags/1.7.1002/modules/google-maps/widgets/wpr-google-maps.php?rev=3184222",
|
||||||
|
"source": "security@wordfence.com",
|
||||||
|
"tags": [
|
||||||
|
"Product"
|
||||||
|
]
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/37223d1f-82c8-414f-bf39-63e728541aa3?source=cve",
|
||||||
|
"source": "security@wordfence.com",
|
||||||
|
"tags": [
|
||||||
|
"Third Party Advisory"
|
||||||
|
]
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
@ -2,8 +2,8 @@
|
|||||||
"id": "CVE-2024-9409",
|
"id": "CVE-2024-9409",
|
||||||
"sourceIdentifier": "cybersecurity@se.com",
|
"sourceIdentifier": "cybersecurity@se.com",
|
||||||
"published": "2024-11-13T05:15:27.610",
|
"published": "2024-11-13T05:15:27.610",
|
||||||
"lastModified": "2024-11-13T17:01:16.850",
|
"lastModified": "2024-11-19T15:59:21.690",
|
||||||
"vulnStatus": "Awaiting Analysis",
|
"vulnStatus": "Analyzed",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
@ -61,6 +61,26 @@
|
|||||||
}
|
}
|
||||||
],
|
],
|
||||||
"cvssMetricV31": [
|
"cvssMetricV31": [
|
||||||
|
{
|
||||||
|
"source": "nvd@nist.gov",
|
||||||
|
"type": "Primary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
|
||||||
|
"attackVector": "NETWORK",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "NONE",
|
||||||
|
"userInteraction": "NONE",
|
||||||
|
"scope": "UNCHANGED",
|
||||||
|
"confidentialityImpact": "NONE",
|
||||||
|
"integrityImpact": "NONE",
|
||||||
|
"availabilityImpact": "HIGH",
|
||||||
|
"baseScore": 7.5,
|
||||||
|
"baseSeverity": "HIGH"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 3.9,
|
||||||
|
"impactScore": 3.6
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"source": "cybersecurity@se.com",
|
"source": "cybersecurity@se.com",
|
||||||
"type": "Secondary",
|
"type": "Secondary",
|
||||||
@ -95,10 +115,101 @@
|
|||||||
]
|
]
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"references": [
|
"configurations": [
|
||||||
{
|
{
|
||||||
"url": "https://download.schneider-electric.com/doc/SEVD-2024-317-01/SEVD-2024-317-01.pdf",
|
"operator": "AND",
|
||||||
"source": "cybersecurity@se.com"
|
"nodes": [
|
||||||
|
{
|
||||||
|
"operator": "OR",
|
||||||
|
"negate": false,
|
||||||
|
"cpeMatch": [
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:o:schneider-electric:powerlogic_pm5341_firmware:*:*:*:*:*:*:*:*",
|
||||||
|
"versionEndExcluding": "2.7.0",
|
||||||
|
"matchCriteriaId": "2C518E91-E251-4278-83D6-144B1CC6331F"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"operator": "OR",
|
||||||
|
"negate": false,
|
||||||
|
"cpeMatch": [
|
||||||
|
{
|
||||||
|
"vulnerable": false,
|
||||||
|
"criteria": "cpe:2.3:h:schneider-electric:powerlogic_pm5341:-:*:*:*:*:*:*:*",
|
||||||
|
"matchCriteriaId": "9C575247-0AE3-408C-8154-71A256FD0292"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"operator": "AND",
|
||||||
|
"nodes": [
|
||||||
|
{
|
||||||
|
"operator": "OR",
|
||||||
|
"negate": false,
|
||||||
|
"cpeMatch": [
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:o:schneider-electric:powerlogic_pm5340_firmware:*:*:*:*:*:*:*:*",
|
||||||
|
"versionEndExcluding": "2.4.0",
|
||||||
|
"matchCriteriaId": "65E456CF-4247-4FB9-858D-6920EF946CF2"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"operator": "OR",
|
||||||
|
"negate": false,
|
||||||
|
"cpeMatch": [
|
||||||
|
{
|
||||||
|
"vulnerable": false,
|
||||||
|
"criteria": "cpe:2.3:h:schneider-electric:powerlogic_pm5340:-:*:*:*:*:*:*:*",
|
||||||
|
"matchCriteriaId": "F5C8EA2A-37CF-435F-A1ED-789255404CD6"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"operator": "AND",
|
||||||
|
"nodes": [
|
||||||
|
{
|
||||||
|
"operator": "OR",
|
||||||
|
"negate": false,
|
||||||
|
"cpeMatch": [
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:o:schneider-electric:powerlogic_pm5320_firmware:*:*:*:*:*:*:*:*",
|
||||||
|
"versionEndExcluding": "2.4.0",
|
||||||
|
"matchCriteriaId": "EB64AE9B-637D-48A5-AE98-6F120C7E355A"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"operator": "OR",
|
||||||
|
"negate": false,
|
||||||
|
"cpeMatch": [
|
||||||
|
{
|
||||||
|
"vulnerable": false,
|
||||||
|
"criteria": "cpe:2.3:h:schneider-electric:powerlogic_pm5320:-:*:*:*:*:*:*:*",
|
||||||
|
"matchCriteriaId": "47592B0C-9E15-4D4C-B284-F2390678E1AC"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://download.schneider-electric.com/doc/SEVD-2024-317-01/SEVD-2024-317-01.pdf",
|
||||||
|
"source": "cybersecurity@se.com",
|
||||||
|
"tags": [
|
||||||
|
"Mitigation",
|
||||||
|
"Patch",
|
||||||
|
"Vendor Advisory"
|
||||||
|
]
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
@ -2,8 +2,8 @@
|
|||||||
"id": "CVE-2024-9668",
|
"id": "CVE-2024-9668",
|
||||||
"sourceIdentifier": "security@wordfence.com",
|
"sourceIdentifier": "security@wordfence.com",
|
||||||
"published": "2024-11-13T09:15:04.163",
|
"published": "2024-11-13T09:15:04.163",
|
||||||
"lastModified": "2024-11-13T17:01:16.850",
|
"lastModified": "2024-11-19T15:55:00.840",
|
||||||
"vulnStatus": "Awaiting Analysis",
|
"vulnStatus": "Analyzed",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
@ -18,8 +18,28 @@
|
|||||||
"metrics": {
|
"metrics": {
|
||||||
"cvssMetricV31": [
|
"cvssMetricV31": [
|
||||||
{
|
{
|
||||||
"source": "security@wordfence.com",
|
"source": "nvd@nist.gov",
|
||||||
"type": "Primary",
|
"type": "Primary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
|
||||||
|
"attackVector": "NETWORK",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "LOW",
|
||||||
|
"userInteraction": "REQUIRED",
|
||||||
|
"scope": "CHANGED",
|
||||||
|
"confidentialityImpact": "LOW",
|
||||||
|
"integrityImpact": "LOW",
|
||||||
|
"availabilityImpact": "NONE",
|
||||||
|
"baseScore": 5.4,
|
||||||
|
"baseSeverity": "MEDIUM"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 2.3,
|
||||||
|
"impactScore": 2.7
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"source": "security@wordfence.com",
|
||||||
|
"type": "Secondary",
|
||||||
"cvssData": {
|
"cvssData": {
|
||||||
"version": "3.1",
|
"version": "3.1",
|
||||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N",
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N",
|
||||||
@ -51,14 +71,38 @@
|
|||||||
]
|
]
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"references": [
|
"configurations": [
|
||||||
{
|
{
|
||||||
"url": "https://plugins.trac.wordpress.org/browser/royal-elementor-addons/tags/1.7.1002/modules/countdown/widgets/wpr-countdown.php?rev=3184222",
|
"nodes": [
|
||||||
"source": "security@wordfence.com"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/a8e39f0b-eb4c-4568-9f5a-60a0dc3eb6ba?source=cve",
|
"operator": "OR",
|
||||||
"source": "security@wordfence.com"
|
"negate": false,
|
||||||
|
"cpeMatch": [
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:a:royal-elementor-addons:royal_elementor_addons:*:*:*:*:*:wordpress:*:*",
|
||||||
|
"versionEndExcluding": "1.7.1002",
|
||||||
|
"matchCriteriaId": "F28BF487-ECD8-48A2-9ACF-4AABEE6A4F01"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://plugins.trac.wordpress.org/browser/royal-elementor-addons/tags/1.7.1002/modules/countdown/widgets/wpr-countdown.php?rev=3184222",
|
||||||
|
"source": "security@wordfence.com",
|
||||||
|
"tags": [
|
||||||
|
"Product"
|
||||||
|
]
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/a8e39f0b-eb4c-4568-9f5a-60a0dc3eb6ba?source=cve",
|
||||||
|
"source": "security@wordfence.com",
|
||||||
|
"tags": [
|
||||||
|
"Third Party Advisory"
|
||||||
|
]
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
@ -2,8 +2,8 @@
|
|||||||
"id": "CVE-2024-9682",
|
"id": "CVE-2024-9682",
|
||||||
"sourceIdentifier": "security@wordfence.com",
|
"sourceIdentifier": "security@wordfence.com",
|
||||||
"published": "2024-11-13T09:15:04.390",
|
"published": "2024-11-13T09:15:04.390",
|
||||||
"lastModified": "2024-11-13T17:01:16.850",
|
"lastModified": "2024-11-19T15:47:07.517",
|
||||||
"vulnStatus": "Awaiting Analysis",
|
"vulnStatus": "Analyzed",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
@ -18,8 +18,28 @@
|
|||||||
"metrics": {
|
"metrics": {
|
||||||
"cvssMetricV31": [
|
"cvssMetricV31": [
|
||||||
{
|
{
|
||||||
"source": "security@wordfence.com",
|
"source": "nvd@nist.gov",
|
||||||
"type": "Primary",
|
"type": "Primary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
|
||||||
|
"attackVector": "NETWORK",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "LOW",
|
||||||
|
"userInteraction": "REQUIRED",
|
||||||
|
"scope": "CHANGED",
|
||||||
|
"confidentialityImpact": "LOW",
|
||||||
|
"integrityImpact": "LOW",
|
||||||
|
"availabilityImpact": "NONE",
|
||||||
|
"baseScore": 5.4,
|
||||||
|
"baseSeverity": "MEDIUM"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 2.3,
|
||||||
|
"impactScore": 2.7
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"source": "security@wordfence.com",
|
||||||
|
"type": "Secondary",
|
||||||
"cvssData": {
|
"cvssData": {
|
||||||
"version": "3.1",
|
"version": "3.1",
|
||||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N",
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N",
|
||||||
@ -40,6 +60,16 @@
|
|||||||
]
|
]
|
||||||
},
|
},
|
||||||
"weaknesses": [
|
"weaknesses": [
|
||||||
|
{
|
||||||
|
"source": "nvd@nist.gov",
|
||||||
|
"type": "Primary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-79"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"source": "security@wordfence.com",
|
"source": "security@wordfence.com",
|
||||||
"type": "Secondary",
|
"type": "Secondary",
|
||||||
@ -51,14 +81,38 @@
|
|||||||
]
|
]
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"references": [
|
"configurations": [
|
||||||
{
|
{
|
||||||
"url": "https://plugins.trac.wordpress.org/browser/royal-elementor-addons/tags/1.7.1002/assets/js/frontend.js?rev=3184222#L8771",
|
"nodes": [
|
||||||
"source": "security@wordfence.com"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/bd90b85e-22a9-4c08-b2cf-4f75406e7ca3?source=cve",
|
"operator": "OR",
|
||||||
"source": "security@wordfence.com"
|
"negate": false,
|
||||||
|
"cpeMatch": [
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:a:royal-elementor-addons:royal_elementor_addons:*:*:*:*:*:wordpress:*:*",
|
||||||
|
"versionEndExcluding": "1.7.1002",
|
||||||
|
"matchCriteriaId": "F28BF487-ECD8-48A2-9ACF-4AABEE6A4F01"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://plugins.trac.wordpress.org/browser/royal-elementor-addons/tags/1.7.1002/assets/js/frontend.js?rev=3184222#L8771",
|
||||||
|
"source": "security@wordfence.com",
|
||||||
|
"tags": [
|
||||||
|
"Product"
|
||||||
|
]
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/bd90b85e-22a9-4c08-b2cf-4f75406e7ca3?source=cve",
|
||||||
|
"source": "security@wordfence.com",
|
||||||
|
"tags": [
|
||||||
|
"Third Party Advisory"
|
||||||
|
]
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
71
README.md
71
README.md
@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours.
|
|||||||
### Last Repository Update
|
### Last Repository Update
|
||||||
|
|
||||||
```plain
|
```plain
|
||||||
2024-11-19T15:00:21.040708+00:00
|
2024-11-19T17:00:28.336990+00:00
|
||||||
```
|
```
|
||||||
|
|
||||||
### Most recent CVE Modification Timestamp synchronized with NVD
|
### Most recent CVE Modification Timestamp synchronized with NVD
|
||||||
|
|
||||||
```plain
|
```plain
|
||||||
2024-11-19T14:56:37.800000+00:00
|
2024-11-19T16:57:05.407000+00:00
|
||||||
```
|
```
|
||||||
|
|
||||||
### Last Data Feed Release
|
### Last Data Feed Release
|
||||||
@ -33,52 +33,47 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
|
|||||||
### Total Number of included CVEs
|
### Total Number of included CVEs
|
||||||
|
|
||||||
```plain
|
```plain
|
||||||
270319
|
270322
|
||||||
```
|
```
|
||||||
|
|
||||||
### CVEs added in the last Commit
|
### CVEs added in the last Commit
|
||||||
|
|
||||||
Recently added CVEs: `8`
|
Recently added CVEs: `3`
|
||||||
|
|
||||||
- [CVE-2024-10204](CVE-2024/CVE-2024-102xx/CVE-2024-10204.json) (`2024-11-19T14:15:16.940`)
|
- [CVE-2024-10524](CVE-2024/CVE-2024-105xx/CVE-2024-10524.json) (`2024-11-19T15:15:06.740`)
|
||||||
- [CVE-2024-11075](CVE-2024/CVE-2024-110xx/CVE-2024-11075.json) (`2024-11-19T14:15:17.340`)
|
- [CVE-2024-50803](CVE-2024/CVE-2024-508xx/CVE-2024-50803.json) (`2024-11-19T16:15:19.840`)
|
||||||
- [CVE-2024-11198](CVE-2024/CVE-2024-111xx/CVE-2024-11198.json) (`2024-11-19T13:15:04.157`)
|
- [CVE-2024-52582](CVE-2024/CVE-2024-525xx/CVE-2024-52582.json) (`2024-11-19T16:15:20.207`)
|
||||||
- [CVE-2024-11224](CVE-2024/CVE-2024-112xx/CVE-2024-11224.json) (`2024-11-19T13:15:04.423`)
|
|
||||||
- [CVE-2024-52675](CVE-2024/CVE-2024-526xx/CVE-2024-52675.json) (`2024-11-19T13:15:04.700`)
|
|
||||||
- [CVE-2024-52711](CVE-2024/CVE-2024-527xx/CVE-2024-52711.json) (`2024-11-19T14:15:18.207`)
|
|
||||||
- [CVE-2024-9777](CVE-2024/CVE-2024-97xx/CVE-2024-9777.json) (`2024-11-19T13:15:04.850`)
|
|
||||||
- [CVE-2024-9830](CVE-2024/CVE-2024-98xx/CVE-2024-9830.json) (`2024-11-19T13:15:05.107`)
|
|
||||||
|
|
||||||
|
|
||||||
### CVEs modified in the last Commit
|
### CVEs modified in the last Commit
|
||||||
|
|
||||||
Recently modified CVEs: `28`
|
Recently modified CVEs: `76`
|
||||||
|
|
||||||
- [CVE-2021-4164](CVE-2021/CVE-2021-41xx/CVE-2021-4164.json) (`2024-11-19T13:55:30.697`)
|
- [CVE-2024-50208](CVE-2024/CVE-2024-502xx/CVE-2024-50208.json) (`2024-11-19T16:23:48.507`)
|
||||||
- [CVE-2021-4170](CVE-2021/CVE-2021-41xx/CVE-2021-4170.json) (`2024-11-19T13:55:30.697`)
|
- [CVE-2024-50210](CVE-2024/CVE-2024-502xx/CVE-2024-50210.json) (`2024-11-19T16:26:34.767`)
|
||||||
- [CVE-2021-4171](CVE-2021/CVE-2021-41xx/CVE-2021-4171.json) (`2024-11-19T13:55:30.697`)
|
- [CVE-2024-50804](CVE-2024/CVE-2024-508xx/CVE-2024-50804.json) (`2024-11-19T16:35:15.173`)
|
||||||
- [CVE-2022-0273](CVE-2022/CVE-2022-02xx/CVE-2022-0273.json) (`2024-11-19T13:55:30.697`)
|
- [CVE-2024-50848](CVE-2024/CVE-2024-508xx/CVE-2024-50848.json) (`2024-11-19T15:35:10.213`)
|
||||||
- [CVE-2022-0339](CVE-2022/CVE-2022-03xx/CVE-2022-0339.json) (`2024-11-19T13:55:30.697`)
|
- [CVE-2024-50849](CVE-2024/CVE-2024-508xx/CVE-2024-50849.json) (`2024-11-19T15:35:11.063`)
|
||||||
- [CVE-2022-0352](CVE-2022/CVE-2022-03xx/CVE-2022-0352.json) (`2024-11-19T13:55:30.697`)
|
- [CVE-2024-50919](CVE-2024/CVE-2024-509xx/CVE-2024-50919.json) (`2024-11-19T16:35:15.973`)
|
||||||
- [CVE-2022-0405](CVE-2022/CVE-2022-04xx/CVE-2022-0405.json) (`2024-11-19T13:55:30.697`)
|
- [CVE-2024-51051](CVE-2024/CVE-2024-510xx/CVE-2024-51051.json) (`2024-11-19T15:35:11.920`)
|
||||||
- [CVE-2022-0406](CVE-2022/CVE-2022-04xx/CVE-2022-0406.json) (`2024-11-19T13:55:30.697`)
|
- [CVE-2024-51053](CVE-2024/CVE-2024-510xx/CVE-2024-51053.json) (`2024-11-19T15:35:12.750`)
|
||||||
- [CVE-2022-0766](CVE-2022/CVE-2022-07xx/CVE-2022-0766.json) (`2024-11-19T13:55:30.697`)
|
- [CVE-2024-51743](CVE-2024/CVE-2024-517xx/CVE-2024-51743.json) (`2024-11-19T15:35:13.590`)
|
||||||
- [CVE-2022-0767](CVE-2022/CVE-2022-07xx/CVE-2022-0767.json) (`2024-11-19T13:55:30.697`)
|
- [CVE-2024-52268](CVE-2024/CVE-2024-522xx/CVE-2024-52268.json) (`2024-11-19T15:57:03.780`)
|
||||||
- [CVE-2022-0939](CVE-2022/CVE-2022-09xx/CVE-2022-0939.json) (`2024-11-19T13:55:30.697`)
|
- [CVE-2024-52303](CVE-2024/CVE-2024-523xx/CVE-2024-52303.json) (`2024-11-19T15:35:13.847`)
|
||||||
- [CVE-2022-0990](CVE-2022/CVE-2022-09xx/CVE-2022-0990.json) (`2024-11-19T13:55:30.697`)
|
- [CVE-2024-52304](CVE-2024/CVE-2024-523xx/CVE-2024-52304.json) (`2024-11-19T16:35:16.793`)
|
||||||
- [CVE-2022-1884](CVE-2022/CVE-2022-18xx/CVE-2022-1884.json) (`2024-11-19T14:47:48.443`)
|
- [CVE-2024-52306](CVE-2024/CVE-2024-523xx/CVE-2024-52306.json) (`2024-11-19T15:02:45.053`)
|
||||||
- [CVE-2022-2525](CVE-2022/CVE-2022-25xx/CVE-2022-2525.json) (`2024-11-19T13:55:30.697`)
|
- [CVE-2024-52506](CVE-2024/CVE-2024-525xx/CVE-2024-52506.json) (`2024-11-19T16:35:17.897`)
|
||||||
- [CVE-2022-30765](CVE-2022/CVE-2022-307xx/CVE-2022-30765.json) (`2024-11-19T13:55:30.697`)
|
- [CVE-2024-52584](CVE-2024/CVE-2024-525xx/CVE-2024-52584.json) (`2024-11-19T16:35:18.180`)
|
||||||
- [CVE-2023-0109](CVE-2023/CVE-2023-01xx/CVE-2023-0109.json) (`2024-11-19T14:44:24.977`)
|
- [CVE-2024-52585](CVE-2024/CVE-2024-525xx/CVE-2024-52585.json) (`2024-11-19T16:35:18.380`)
|
||||||
- [CVE-2023-0737](CVE-2023/CVE-2023-07xx/CVE-2023-0737.json) (`2024-11-19T14:43:04.257`)
|
- [CVE-2024-52587](CVE-2024/CVE-2024-525xx/CVE-2024-52587.json) (`2024-11-19T15:35:15.427`)
|
||||||
- [CVE-2023-2106](CVE-2023/CVE-2023-21xx/CVE-2023-2106.json) (`2024-11-19T13:55:30.697`)
|
- [CVE-2024-52867](CVE-2024/CVE-2024-528xx/CVE-2024-52867.json) (`2024-11-19T16:35:18.583`)
|
||||||
- [CVE-2023-47124](CVE-2023/CVE-2023-471xx/CVE-2023-47124.json) (`2024-11-19T14:15:16.660`)
|
- [CVE-2024-52944](CVE-2024/CVE-2024-529xx/CVE-2024-52944.json) (`2024-11-19T16:35:19.310`)
|
||||||
- [CVE-2024-10924](CVE-2024/CVE-2024-109xx/CVE-2024-10924.json) (`2024-11-19T14:15:17.187`)
|
- [CVE-2024-52945](CVE-2024/CVE-2024-529xx/CVE-2024-52945.json) (`2024-11-19T16:35:20.020`)
|
||||||
- [CVE-2024-11159](CVE-2024/CVE-2024-111xx/CVE-2024-11159.json) (`2024-11-19T14:56:37.800`)
|
- [CVE-2024-8001](CVE-2024/CVE-2024-80xx/CVE-2024-8001.json) (`2024-11-19T15:41:25.973`)
|
||||||
- [CVE-2024-21538](CVE-2024/CVE-2024-215xx/CVE-2024-21538.json) (`2024-11-19T14:15:17.627`)
|
- [CVE-2024-9059](CVE-2024/CVE-2024-90xx/CVE-2024-9059.json) (`2024-11-19T15:53:56.680`)
|
||||||
- [CVE-2024-23715](CVE-2024/CVE-2024-237xx/CVE-2024-23715.json) (`2024-11-19T14:03:09.400`)
|
- [CVE-2024-9409](CVE-2024/CVE-2024-94xx/CVE-2024-9409.json) (`2024-11-19T15:59:21.690`)
|
||||||
- [CVE-2024-44206](CVE-2024/CVE-2024-442xx/CVE-2024-44206.json) (`2024-11-19T13:47:18.787`)
|
- [CVE-2024-9668](CVE-2024/CVE-2024-96xx/CVE-2024-9668.json) (`2024-11-19T15:55:00.840`)
|
||||||
- [CVE-2024-51758](CVE-2024/CVE-2024-517xx/CVE-2024-51758.json) (`2024-11-19T14:15:17.763`)
|
- [CVE-2024-9682](CVE-2024/CVE-2024-96xx/CVE-2024-9682.json) (`2024-11-19T15:47:07.517`)
|
||||||
|
|
||||||
|
|
||||||
## Download and Usage
|
## Download and Usage
|
||||||
|
227
_state.csv
227
_state.csv
@ -90442,7 +90442,7 @@ CVE-2016-7509,0,0,0b1c21cb9424a49e93f5c37cad1af90a10222077bea180053907da8c42c4e9
|
|||||||
CVE-2016-7510,0,0,0b5b8d18c8957782ad8fb925a838d95cf4fa7b34c3e40f119a9ad58cd4df5fba,2022-03-01T19:08:12.087000
|
CVE-2016-7510,0,0,0b5b8d18c8957782ad8fb925a838d95cf4fa7b34c3e40f119a9ad58cd4df5fba,2022-03-01T19:08:12.087000
|
||||||
CVE-2016-7511,0,0,b62155948673159bb5869244d626fcf37545c3e7fd4c8eb55ad8f62881f067b9,2022-03-01T14:30:27.027000
|
CVE-2016-7511,0,0,b62155948673159bb5869244d626fcf37545c3e7fd4c8eb55ad8f62881f067b9,2022-03-01T14:30:27.027000
|
||||||
CVE-2016-7513,0,0,9c0045a3237c81afdf3e07faf9927bc74ef0987391ab69733e7a634626609421,2017-05-09T12:40:08.853000
|
CVE-2016-7513,0,0,9c0045a3237c81afdf3e07faf9927bc74ef0987391ab69733e7a634626609421,2017-05-09T12:40:08.853000
|
||||||
CVE-2016-7514,0,0,6e2321753ae7bcce1e4a7c3cbe07a2b2d30258b29b4c7a8394d4f362223b7340,2017-05-09T12:40:05.697000
|
CVE-2016-7514,0,1,39aaf0298170faeea1b713c0f167b61036c8df094a4365fee0005fc9db119453,2024-11-19T15:51:22.097000
|
||||||
CVE-2016-7515,0,0,fb21f83cddf722a0fa141decdcb6439bb9471e713258d2e816160282eb06f528,2024-07-03T15:16:39.567000
|
CVE-2016-7515,0,0,fb21f83cddf722a0fa141decdcb6439bb9471e713258d2e816160282eb06f528,2024-07-03T15:16:39.567000
|
||||||
CVE-2016-7516,0,0,16f3cb2e75aa3271d960b831f33e06b2ac04b1f800e594681cff4861326c988c,2024-07-03T15:23:36.440000
|
CVE-2016-7516,0,0,16f3cb2e75aa3271d960b831f33e06b2ac04b1f800e594681cff4861326c988c,2024-07-03T15:23:36.440000
|
||||||
CVE-2016-7517,0,0,ba6d8f42f3bed4f3167468c0c8b26ac137e75f436e56310716e1ba6e03647184,2024-07-03T15:17:05.433000
|
CVE-2016-7517,0,0,ba6d8f42f3bed4f3167468c0c8b26ac137e75f436e56310716e1ba6e03647184,2024-07-03T15:17:05.433000
|
||||||
@ -97060,9 +97060,9 @@ CVE-2017-13309,0,0,491cd9f7b41a6bb9dabc0009989d6e787b291b96b83a3c335f7bb247a54fd
|
|||||||
CVE-2017-1331,0,0,fbfa6b4058c65afc0dadcb6abf2b300b566ab5bd4820053710fa36c8414eaba4,2017-08-09T12:43:53.857000
|
CVE-2017-1331,0,0,fbfa6b4058c65afc0dadcb6abf2b300b566ab5bd4820053710fa36c8414eaba4,2017-08-09T12:43:53.857000
|
||||||
CVE-2017-13310,0,0,ce5d5d0144d27d0c152dcf2d0a14c2de82217b009894ba3718d993208d2695f5,2024-11-18T17:11:56.587000
|
CVE-2017-13310,0,0,ce5d5d0144d27d0c152dcf2d0a14c2de82217b009894ba3718d993208d2695f5,2024-11-18T17:11:56.587000
|
||||||
CVE-2017-13311,0,0,ef29872b5c74a8fdce3835bfeeee51a10190cccc30135b0dd02f413b37d7bfb4,2024-11-18T17:11:56.587000
|
CVE-2017-13311,0,0,ef29872b5c74a8fdce3835bfeeee51a10190cccc30135b0dd02f413b37d7bfb4,2024-11-18T17:11:56.587000
|
||||||
CVE-2017-13312,0,0,341acd1f29824d27667da2d51a5097bca3ea48c03574c9031db93205af5bc5ea,2024-11-18T17:11:56.587000
|
CVE-2017-13312,0,1,b6008dd37efed3ed1dd1887cecd96d4e7119296f7daae93046904c3ca18f8781,2024-11-19T16:35:02.293000
|
||||||
CVE-2017-13313,0,0,ab7dd02cb9e6c4caccb7bc4e1543e83c4ab14f4d075f0865d34b82227ae6479a,2024-11-18T17:11:56.587000
|
CVE-2017-13313,0,1,9c6a43618c00c0daf8e78c975c9182c8d073005f306ff0e197206a7550c09d34,2024-11-19T16:35:03.173000
|
||||||
CVE-2017-13314,0,0,172c46525901902599df22b71e6e0ed50cad6803b92c51596c1ca7804d1172ab,2024-11-18T17:11:56.587000
|
CVE-2017-13314,0,1,f15cc076ea1dd87f4d0185b4f5bda3970135144fc10252817f13153eff27c1ae,2024-11-19T16:35:03.990000
|
||||||
CVE-2017-1332,0,0,784a9ee8c3796f2a11ff24e95ae95a08508911f60f6ead21d91e6503f5824554,2017-08-03T15:46:39.147000
|
CVE-2017-1332,0,0,784a9ee8c3796f2a11ff24e95ae95a08508911f60f6ead21d91e6503f5824554,2017-08-03T15:46:39.147000
|
||||||
CVE-2017-1333,0,0,3ec8913dbfad3ccab38e891f6e15f9a0101bb53e4d210c158476cd692803a999,2017-11-16T17:13:42.270000
|
CVE-2017-1333,0,0,3ec8913dbfad3ccab38e891f6e15f9a0101bb53e4d210c158476cd692803a999,2017-11-16T17:13:42.270000
|
||||||
CVE-2017-1334,0,0,406b3dd86a0e9fb2c9a541dafaa2903ce89044fcfe05700f9700b783b2647a7d,2017-10-10T15:07:22.713000
|
CVE-2017-1334,0,0,406b3dd86a0e9fb2c9a541dafaa2903ce89044fcfe05700f9700b783b2647a7d,2017-10-10T15:07:22.713000
|
||||||
@ -146031,7 +146031,7 @@ CVE-2020-10996,0,0,47a8e826d6532a30023b9d707d6802138016d41b64ac1672fccc5913e0db6
|
|||||||
CVE-2020-10997,0,0,9b1c61e782dda557a71cb53eb6d61e9ad3b5a823d5b9e07767c4f1b62ef3a094,2021-07-21T11:39:23.747000
|
CVE-2020-10997,0,0,9b1c61e782dda557a71cb53eb6d61e9ad3b5a823d5b9e07767c4f1b62ef3a094,2021-07-21T11:39:23.747000
|
||||||
CVE-2020-1100,0,0,3f91df61b6db7ab02ed7698670dfd0c570cf3f1746acfa0224d746a05bcf456b,2020-05-22T15:42:31.430000
|
CVE-2020-1100,0,0,3f91df61b6db7ab02ed7698670dfd0c570cf3f1746acfa0224d746a05bcf456b,2020-05-22T15:42:31.430000
|
||||||
CVE-2020-11000,0,0,67c70949c7f7214f8cec2b275e3087ce4f245c2fe317c4037148b7b3f0c9548a,2021-10-26T20:02:51.943000
|
CVE-2020-11000,0,0,67c70949c7f7214f8cec2b275e3087ce4f245c2fe317c4037148b7b3f0c9548a,2021-10-26T20:02:51.943000
|
||||||
CVE-2020-11001,0,0,d7f996cade0b0c6851d809befdb5b1aa07dd45e10bdf9d4a8ba10210b6372d25,2020-04-15T19:15:41.207000
|
CVE-2020-11001,0,1,ca19ed57e7ae62a9b9df074ddd1a6d02ac7f5061de45a8b2ac0e8712c945dc77,2024-11-19T16:15:18.007000
|
||||||
CVE-2020-11002,0,0,6bae180aab26f78c357099f9f2e4f0a047c68dd3935404e92e9ba611178c4b89,2020-04-13T15:17:07.317000
|
CVE-2020-11002,0,0,6bae180aab26f78c357099f9f2e4f0a047c68dd3935404e92e9ba611178c4b89,2020-04-13T15:17:07.317000
|
||||||
CVE-2020-11003,0,0,b1f6a40c60dc91e7eed1191ba37ea1cdaeef213e36611b08e75d9aa93e4a7262,2020-04-15T19:44:11.063000
|
CVE-2020-11003,0,0,b1f6a40c60dc91e7eed1191ba37ea1cdaeef213e36611b08e75d9aa93e4a7262,2020-04-15T19:44:11.063000
|
||||||
CVE-2020-11004,0,0,9216201bdcf2378700ab69f29cfdc45ce754216ba12703454002bd0cddf8ba43,2020-05-01T19:25:26.237000
|
CVE-2020-11004,0,0,9216201bdcf2378700ab69f29cfdc45ce754216ba12703454002bd0cddf8ba43,2020-05-01T19:25:26.237000
|
||||||
@ -146070,7 +146070,7 @@ CVE-2020-11033,0,0,99181f785abd07090e339c37e6002332032014dbddbae6e05836d3d1b8053
|
|||||||
CVE-2020-11034,0,0,59de03bb22421324ecf1fa1ac5b9417e3475dd3ba074cd4ef5bb311f3e9e7b19,2023-11-07T03:14:28.117000
|
CVE-2020-11034,0,0,59de03bb22421324ecf1fa1ac5b9417e3475dd3ba074cd4ef5bb311f3e9e7b19,2023-11-07T03:14:28.117000
|
||||||
CVE-2020-11035,0,0,4fc551e4510d4ff82ac98d5e01fc62c5089a7dc8e4900bc5f8317e67bc789b61,2023-11-07T03:14:28.207000
|
CVE-2020-11035,0,0,4fc551e4510d4ff82ac98d5e01fc62c5089a7dc8e4900bc5f8317e67bc789b61,2023-11-07T03:14:28.207000
|
||||||
CVE-2020-11036,0,0,ae1c78eb553ae8f5d8b51ae33d4dbf29a62d3e9f39af61e95c140cf2c15fc553,2023-11-07T03:14:28.313000
|
CVE-2020-11036,0,0,ae1c78eb553ae8f5d8b51ae33d4dbf29a62d3e9f39af61e95c140cf2c15fc553,2023-11-07T03:14:28.313000
|
||||||
CVE-2020-11037,0,0,f7fd8d210270a1d4d217a49c86c41bda4439530088d6d256c4f088b5221f0443,2020-05-08T15:57:02.020000
|
CVE-2020-11037,0,1,d380802cb260a43ce177783dfea8ae14b1eaa14b50eaa93ba15f8e561ff752f6,2024-11-19T16:15:18.243000
|
||||||
CVE-2020-11038,0,0,61ad726e49210d73d4096496022b21657a00e81b4d84c8954159c823bc201940,2023-10-24T15:31:29.087000
|
CVE-2020-11038,0,0,61ad726e49210d73d4096496022b21657a00e81b4d84c8954159c823bc201940,2023-10-24T15:31:29.087000
|
||||||
CVE-2020-11039,0,0,18dd073af597d3947f5fecd4bb83a01d615b505b0fc72420463d7915b352826c,2023-10-24T15:30:22.390000
|
CVE-2020-11039,0,0,18dd073af597d3947f5fecd4bb83a01d615b505b0fc72420463d7915b352826c,2023-10-24T15:30:22.390000
|
||||||
CVE-2020-1104,0,0,2464ad9a53937bdbb9394dfb79c6f222fcc57ab22f36f962745beac437588868,2020-05-26T18:44:10.763000
|
CVE-2020-1104,0,0,2464ad9a53937bdbb9394dfb79c6f222fcc57ab22f36f962745beac437588868,2020-05-26T18:44:10.763000
|
||||||
@ -147540,7 +147540,7 @@ CVE-2020-12621,0,0,8ce7e90cf5d38925e940068a7ae81f0e149cc8eb6774d0a2c1c7e217670dc
|
|||||||
CVE-2020-12624,0,0,8a0fc770343fdc04bd996cf45f0ff8eee77a483d3005ca548b79b2bbdd4878fd,2021-07-21T11:39:23.747000
|
CVE-2020-12624,0,0,8a0fc770343fdc04bd996cf45f0ff8eee77a483d3005ca548b79b2bbdd4878fd,2021-07-21T11:39:23.747000
|
||||||
CVE-2020-12625,0,0,ba670072932e2f84ce8a6ee211183dd0aafd451a1d585c003e4b8f0ee8b0710c,2022-09-02T15:42:45.577000
|
CVE-2020-12625,0,0,ba670072932e2f84ce8a6ee211183dd0aafd451a1d585c003e4b8f0ee8b0710c,2022-09-02T15:42:45.577000
|
||||||
CVE-2020-12626,0,0,ef4ab069cdfdd918b1dfdbdff6dc1e10a89ec07b516956413a5df9b27f4d80a5,2022-09-02T15:42:13.713000
|
CVE-2020-12626,0,0,ef4ab069cdfdd918b1dfdbdff6dc1e10a89ec07b516956413a5df9b27f4d80a5,2022-09-02T15:42:13.713000
|
||||||
CVE-2020-12627,0,1,7e8740e74bef375c203c420eadadfc5b0f0a3be281f621e0bb304f065c1e51e4,2024-11-19T13:55:30.697000
|
CVE-2020-12627,0,0,7e8740e74bef375c203c420eadadfc5b0f0a3be281f621e0bb304f065c1e51e4,2024-11-19T13:55:30.697000
|
||||||
CVE-2020-12629,0,0,6302c256329ddcf42ee813098eb846d57616b48336546370f0e8d1971103bb7c,2020-05-06T20:44:34.660000
|
CVE-2020-12629,0,0,6302c256329ddcf42ee813098eb846d57616b48336546370f0e8d1971103bb7c,2020-05-06T20:44:34.660000
|
||||||
CVE-2020-1263,0,0,9a370617ef73138b079100cfabf08396db758880aa61ac1612d7dd94a8f958b0,2021-07-21T11:39:23.747000
|
CVE-2020-1263,0,0,9a370617ef73138b079100cfabf08396db758880aa61ac1612d7dd94a8f958b0,2021-07-21T11:39:23.747000
|
||||||
CVE-2020-12635,0,0,20c8e4b2f600aed040904c974ad6e679133a1f04f71dd085db50281f95159af7,2024-02-14T01:17:43.863000
|
CVE-2020-12635,0,0,20c8e4b2f600aed040904c974ad6e679133a1f04f71dd085db50281f95159af7,2024-02-14T01:17:43.863000
|
||||||
@ -171654,8 +171654,8 @@ CVE-2021-25960,0,0,8966318153632386e613d3da07433d0898ebe541ac0542fbd833b88414c9a
|
|||||||
CVE-2021-25961,0,0,22b470ce8b666ea20e5d0cab6ff8f13de084ad6910d45348aef26ed926ddac00,2021-10-07T17:05:48.717000
|
CVE-2021-25961,0,0,22b470ce8b666ea20e5d0cab6ff8f13de084ad6910d45348aef26ed926ddac00,2021-10-07T17:05:48.717000
|
||||||
CVE-2021-25962,0,0,935f7ba91aea9f19056fdc881199025fe86ee6e75a7a00550a994ee72bbc4ce8,2021-10-06T20:30:01.977000
|
CVE-2021-25962,0,0,935f7ba91aea9f19056fdc881199025fe86ee6e75a7a00550a994ee72bbc4ce8,2021-10-06T20:30:01.977000
|
||||||
CVE-2021-25963,0,0,eef6fbaad1cf210ebcdcb4dde111b82ed2ae28fe021f79460bcb208f56e7438b,2021-10-07T03:02:46.987000
|
CVE-2021-25963,0,0,eef6fbaad1cf210ebcdcb4dde111b82ed2ae28fe021f79460bcb208f56e7438b,2021-10-07T03:02:46.987000
|
||||||
CVE-2021-25964,0,1,bd17926c15c6aafe59c4d31c62272369f814e16dd285b716ff509b30016eb446,2024-11-19T13:55:30.697000
|
CVE-2021-25964,0,0,bd17926c15c6aafe59c4d31c62272369f814e16dd285b716ff509b30016eb446,2024-11-19T13:55:30.697000
|
||||||
CVE-2021-25965,0,1,e8c380577323e71372b14eb1db6dea116d02a5d1c09bca2a20f9fba85d976a73,2024-11-19T13:55:30.697000
|
CVE-2021-25965,0,0,e8c380577323e71372b14eb1db6dea116d02a5d1c09bca2a20f9fba85d976a73,2024-11-19T13:55:30.697000
|
||||||
CVE-2021-25966,0,0,6631aa3daac52e584c6ac4608617627ea90e46497039ab1b233e796a5197021e,2022-02-25T16:10:26.793000
|
CVE-2021-25966,0,0,6631aa3daac52e584c6ac4608617627ea90e46497039ab1b233e796a5197021e,2022-02-25T16:10:26.793000
|
||||||
CVE-2021-25967,0,0,4ab84532fd7ed4fc14ba083adea1ce2392a7e866ae5f01e12da82d39bc860ffa,2021-12-02T18:59:55.443000
|
CVE-2021-25967,0,0,4ab84532fd7ed4fc14ba083adea1ce2392a7e866ae5f01e12da82d39bc860ffa,2021-12-02T18:59:55.443000
|
||||||
CVE-2021-25968,0,0,182c7f567a0aaa94a30caeae3513295d58f799b9efd65c2c904f1dab7bc4d009,2021-10-21T23:39:03.337000
|
CVE-2021-25968,0,0,182c7f567a0aaa94a30caeae3513295d58f799b9efd65c2c904f1dab7bc4d009,2021-10-21T23:39:03.337000
|
||||||
@ -181910,7 +181910,7 @@ CVE-2021-39866,0,0,6fabb561196e392a171b14d09332d010f59de8a7ed9880963cc586df8f988
|
|||||||
CVE-2021-39867,0,0,cf1dad99c282faabc5cb3cf833ed6f5b91097d777779477ac24fd680f378127d,2021-10-12T19:08:05.167000
|
CVE-2021-39867,0,0,cf1dad99c282faabc5cb3cf833ed6f5b91097d777779477ac24fd680f378127d,2021-10-12T19:08:05.167000
|
||||||
CVE-2021-39868,0,0,01bf76261c9d86e2825302310d8b1d110b2d4f6a0f91c6aea468c32be845a7f5,2021-10-12T19:47:47.650000
|
CVE-2021-39868,0,0,01bf76261c9d86e2825302310d8b1d110b2d4f6a0f91c6aea468c32be845a7f5,2021-10-12T19:47:47.650000
|
||||||
CVE-2021-39869,0,0,50c4bfd31656adba59cb9dc37b7b350e99a58491e593864693fd3f1525a21185,2022-06-28T14:11:45.273000
|
CVE-2021-39869,0,0,50c4bfd31656adba59cb9dc37b7b350e99a58491e593864693fd3f1525a21185,2022-06-28T14:11:45.273000
|
||||||
CVE-2021-3987,0,0,5e744b8c7b75d6d0697e6a76da79f117735cee1d599e3d1ad3c0c12d1921ab65,2024-11-15T13:58:08.913000
|
CVE-2021-3987,0,1,9bed2e72e8d78f1a6acc2c0eee9b4082c17ffc30cf9954091036d7b20f6c3aac,2024-11-19T15:44:38.113000
|
||||||
CVE-2021-39870,0,0,f4d27e6e382702365ecb6b123ea92ce819b6bff3f3b19cf8c54ff152bc410640,2021-10-09T03:31:41.567000
|
CVE-2021-39870,0,0,f4d27e6e382702365ecb6b123ea92ce819b6bff3f3b19cf8c54ff152bc410640,2021-10-09T03:31:41.567000
|
||||||
CVE-2021-39871,0,0,9da9bbcde2429b6f2a3b8c36de5587428d893fba2ba1c35d4bc22836c49d3722,2021-10-12T19:52:42.127000
|
CVE-2021-39871,0,0,9da9bbcde2429b6f2a3b8c36de5587428d893fba2ba1c35d4bc22836c49d3722,2021-10-12T19:52:42.127000
|
||||||
CVE-2021-39872,0,0,389f57b77d45e9d1425003b8b643833784e02c6171170491cb4db28b7e8fd74c,2021-10-12T18:24:40.737000
|
CVE-2021-39872,0,0,389f57b77d45e9d1425003b8b643833784e02c6171170491cb4db28b7e8fd74c,2021-10-12T18:24:40.737000
|
||||||
@ -181921,7 +181921,7 @@ CVE-2021-39876,0,0,163386dcc440f8e6b66258fe9f8087aeebbd81b74bcfe526af8eddfb343a7
|
|||||||
CVE-2021-39877,0,0,f9748be5890f45dbfe5a909268c2e810aed0fd7cef3df47f2f844678254c3d6c,2021-10-12T15:55:42.793000
|
CVE-2021-39877,0,0,f9748be5890f45dbfe5a909268c2e810aed0fd7cef3df47f2f844678254c3d6c,2021-10-12T15:55:42.793000
|
||||||
CVE-2021-39878,0,0,9d9437315fc043e2589cca1b010554d7ecb9e451d3d2157288a1e88191aca38b,2021-10-12T17:15:02.807000
|
CVE-2021-39878,0,0,9d9437315fc043e2589cca1b010554d7ecb9e451d3d2157288a1e88191aca38b,2021-10-12T17:15:02.807000
|
||||||
CVE-2021-39879,0,0,429da5caba14265b91489ac72fa37fdea760044ee3fb62e1cd11f34e878ac20f,2021-10-12T15:57:48.810000
|
CVE-2021-39879,0,0,429da5caba14265b91489ac72fa37fdea760044ee3fb62e1cd11f34e878ac20f,2021-10-12T15:57:48.810000
|
||||||
CVE-2021-3988,0,0,8ed5b3d56ac136bbdab27f7c44f0e596bd34296008375dd25bc70af4f992be57,2024-11-15T13:58:08.913000
|
CVE-2021-3988,0,1,e1e0bf60403d6fae3412ba077b574726c30cc26a4ae5a546f7206097a49b73d3,2024-11-19T15:43:01.723000
|
||||||
CVE-2021-39880,0,0,f43fbf46512fe0da98b08e588e5c97c52ff7199b5c05f615aa05257e460043bf,2022-10-19T18:25:02.617000
|
CVE-2021-39880,0,0,f43fbf46512fe0da98b08e588e5c97c52ff7199b5c05f615aa05257e460043bf,2022-10-19T18:25:02.617000
|
||||||
CVE-2021-39881,0,0,5445efe9c4c4cf5d576eca639b40a53c718d8c7b4fa50521ccc2d6c6aff6a28d,2021-10-09T03:31:08.827000
|
CVE-2021-39881,0,0,5445efe9c4c4cf5d576eca639b40a53c718d8c7b4fa50521ccc2d6c6aff6a28d,2021-10-09T03:31:08.827000
|
||||||
CVE-2021-39882,0,0,989fca2f5d44fb7d0c221b794ff55417ebd0a1be5be524bdad69ce4323e8c8b4,2021-10-12T18:39:13.573000
|
CVE-2021-39882,0,0,989fca2f5d44fb7d0c221b794ff55417ebd0a1be5be524bdad69ce4323e8c8b4,2021-10-12T18:39:13.573000
|
||||||
@ -181954,7 +181954,7 @@ CVE-2021-39906,0,0,e04ad55a1100d2964d2fe24a0d9044d99aa4ff75b0959894c4e77599d608f
|
|||||||
CVE-2021-39907,0,0,fb47addbd6bbabad003567f698b756cafc4248e663cf3186ea0c076027d378af,2021-11-08T18:11:09.323000
|
CVE-2021-39907,0,0,fb47addbd6bbabad003567f698b756cafc4248e663cf3186ea0c076027d378af,2021-11-08T18:11:09.323000
|
||||||
CVE-2021-39908,0,0,f72dfff8f0de9ab8ced78ab85d925d77e9a0ab0762baa52bbd5bcb5844b20d7a,2022-09-30T12:58:54.010000
|
CVE-2021-39908,0,0,f72dfff8f0de9ab8ced78ab85d925d77e9a0ab0762baa52bbd5bcb5844b20d7a,2022-09-30T12:58:54.010000
|
||||||
CVE-2021-39909,0,0,0eb46c843aee997f319542a3de59e07a425b198542987db6d18b92f2cd302bc6,2022-10-06T19:55:19.013000
|
CVE-2021-39909,0,0,0eb46c843aee997f319542a3de59e07a425b198542987db6d18b92f2cd302bc6,2022-10-06T19:55:19.013000
|
||||||
CVE-2021-3991,0,0,574390f555a94c6c50681f89cb7783da922771c152c564d76dbcc9c11c7eae82,2024-11-15T13:58:08.913000
|
CVE-2021-3991,0,1,dec2ad2abf0d33a9f41c3ab761273d52387a01f6ed0fb84dce9c69ea9742332e,2024-11-19T15:31:47.833000
|
||||||
CVE-2021-39910,0,0,282b0ca251be46e18bfa01121795127e6cadb5a2fbd4e673f7596e1fdc2179ea,2022-07-12T17:42:04.277000
|
CVE-2021-39910,0,0,282b0ca251be46e18bfa01121795127e6cadb5a2fbd4e673f7596e1fdc2179ea,2022-07-12T17:42:04.277000
|
||||||
CVE-2021-39911,0,0,b91f499ed64b9404e4620abe987fe34a286f26afde4bd21996a2f7b358c0c585,2022-10-06T20:14:22.410000
|
CVE-2021-39911,0,0,b91f499ed64b9404e4620abe987fe34a286f26afde4bd21996a2f7b358c0c585,2022-10-06T20:14:22.410000
|
||||||
CVE-2021-39912,0,0,6b1571a12bafe3ca8eacf93314ab0c9c2bfaa878e8fb257fb7f993e04329f737,2021-11-08T18:38:05.060000
|
CVE-2021-39912,0,0,6b1571a12bafe3ca8eacf93314ab0c9c2bfaa878e8fb257fb7f993e04329f737,2021-11-08T18:38:05.060000
|
||||||
@ -183333,7 +183333,7 @@ CVE-2021-41636,0,0,63eecb7b37c7497bc2d0e66fda0c87c3bb39b2ae9ef4daaf774dfdae2e15c
|
|||||||
CVE-2021-41637,0,0,3e7106415adaddf34c5f560098cc1181920e94facbddb201ad017dee908edb96,2022-07-01T16:48:40.010000
|
CVE-2021-41637,0,0,3e7106415adaddf34c5f560098cc1181920e94facbddb201ad017dee908edb96,2022-07-01T16:48:40.010000
|
||||||
CVE-2021-41638,0,0,613e6d48da7577b6a41011f792da0d6bf850458d5b4d0fcad9ddc862b5e440cb,2022-07-01T16:54:44.490000
|
CVE-2021-41638,0,0,613e6d48da7577b6a41011f792da0d6bf850458d5b4d0fcad9ddc862b5e440cb,2022-07-01T16:54:44.490000
|
||||||
CVE-2021-41639,0,0,e4459c0cc2a18f37534ab8228cfd8beba9d057a0a4566969f9e85d8579ad29e7,2022-07-01T16:54:56.413000
|
CVE-2021-41639,0,0,e4459c0cc2a18f37534ab8228cfd8beba9d057a0a4566969f9e85d8579ad29e7,2022-07-01T16:54:56.413000
|
||||||
CVE-2021-4164,0,1,20f9d58376f073b688db27821f1a5a1437caea09888301760c03328ec9b9d6e0,2024-11-19T13:55:30.697000
|
CVE-2021-4164,0,0,20f9d58376f073b688db27821f1a5a1437caea09888301760c03328ec9b9d6e0,2024-11-19T13:55:30.697000
|
||||||
CVE-2021-41641,0,0,471e4e684c15a020d266300f4f064d2429fafbadc4766e60775831b2cf58f0b5,2022-06-21T14:47:44.067000
|
CVE-2021-41641,0,0,471e4e684c15a020d266300f4f064d2429fafbadc4766e60775831b2cf58f0b5,2022-06-21T14:47:44.067000
|
||||||
CVE-2021-41643,0,0,e459bb9b3ae61ce1c0c6d285d271ea229748355da335583ec31fcdddf509d6f3,2021-11-02T19:39:02.490000
|
CVE-2021-41643,0,0,e459bb9b3ae61ce1c0c6d285d271ea229748355da335583ec31fcdddf509d6f3,2021-11-02T19:39:02.490000
|
||||||
CVE-2021-41644,0,0,9865dd6292c1189e24150efd40a621f72aa038c9804a6547447118cc86d16ed2,2021-11-02T18:49:45.500000
|
CVE-2021-41644,0,0,9865dd6292c1189e24150efd40a621f72aa038c9804a6547447118cc86d16ed2,2021-11-02T18:49:45.500000
|
||||||
@ -183373,8 +183373,8 @@ CVE-2021-41694,0,0,f50452abd758a90efb8659fe89ef0455f4d267a5131c762b8f8e62ab5bbf1
|
|||||||
CVE-2021-41695,0,0,dd9e067ec3b53cda9f935034e15232d6d5e79f62a053b26d0f77f6909e4ac1ef,2021-12-14T15:36:10.400000
|
CVE-2021-41695,0,0,dd9e067ec3b53cda9f935034e15232d6d5e79f62a053b26d0f77f6909e4ac1ef,2021-12-14T15:36:10.400000
|
||||||
CVE-2021-41696,0,0,8e34760fd4621f0aa12fba1e5efd349f7fa4de5d0772846e528bcb8650f3de63,2021-12-14T15:30:11.617000
|
CVE-2021-41696,0,0,8e34760fd4621f0aa12fba1e5efd349f7fa4de5d0772846e528bcb8650f3de63,2021-12-14T15:30:11.617000
|
||||||
CVE-2021-41697,0,0,33b358b7127382c3f55513ad663c443b6239f7d67ea40b4e900a1c92ef4cc59d,2021-12-14T15:14:33.733000
|
CVE-2021-41697,0,0,33b358b7127382c3f55513ad663c443b6239f7d67ea40b4e900a1c92ef4cc59d,2021-12-14T15:14:33.733000
|
||||||
CVE-2021-4170,0,1,b8beab78ed9dc354a058ea96afab8166fc3706648030e4f45ecdff702a9bd3fb,2024-11-19T13:55:30.697000
|
CVE-2021-4170,0,0,b8beab78ed9dc354a058ea96afab8166fc3706648030e4f45ecdff702a9bd3fb,2024-11-19T13:55:30.697000
|
||||||
CVE-2021-4171,0,1,4f42b83a708d15892b3fcad03307106e62689103423e13da2e9868050bf6a831,2024-11-19T13:55:30.697000
|
CVE-2021-4171,0,0,4f42b83a708d15892b3fcad03307106e62689103423e13da2e9868050bf6a831,2024-11-19T13:55:30.697000
|
||||||
CVE-2021-41714,0,0,fc9e637af1a0036f13895530a7345d717282538ded5aaa19ffc08da024090e87,2022-06-03T14:15:01.887000
|
CVE-2021-41714,0,0,fc9e637af1a0036f13895530a7345d717282538ded5aaa19ffc08da024090e87,2022-06-03T14:15:01.887000
|
||||||
CVE-2021-41715,0,0,e54eedea66b5b1eee4cce4189c84d7d77fe6adbb9ea079fcd98fdaf28b2809e3,2022-04-14T20:28:35.890000
|
CVE-2021-41715,0,0,e54eedea66b5b1eee4cce4189c84d7d77fe6adbb9ea079fcd98fdaf28b2809e3,2022-04-14T20:28:35.890000
|
||||||
CVE-2021-41716,0,0,cadf2b7de621cc4d3a3a955adc24a880843a6c905295b60f449a49d359880f71,2021-12-08T14:48:53.020000
|
CVE-2021-41716,0,0,cadf2b7de621cc4d3a3a955adc24a880843a6c905295b60f449a49d359880f71,2021-12-08T14:48:53.020000
|
||||||
@ -187846,7 +187846,7 @@ CVE-2022-0269,0,0,0b042406ed722bed4f08f80b4f00c84357c8cea0b40b051befc2509217a3a6
|
|||||||
CVE-2022-0270,0,0,547484ec0a42fe3acfc13bd179336b2c7cf9e5bfa133be62f505695ac6b594fe,2023-07-21T16:53:18.197000
|
CVE-2022-0270,0,0,547484ec0a42fe3acfc13bd179336b2c7cf9e5bfa133be62f505695ac6b594fe,2023-07-21T16:53:18.197000
|
||||||
CVE-2022-0271,0,0,b9998bff8556a3e9dd78071b57144ad5eb927440f09838acadc201638d9c53a4,2022-04-15T17:54:39.720000
|
CVE-2022-0271,0,0,b9998bff8556a3e9dd78071b57144ad5eb927440f09838acadc201638d9c53a4,2022-04-15T17:54:39.720000
|
||||||
CVE-2022-0272,0,0,ba39c601e8f8ad770ec51471a81d25ffe2f0563ea1a0215aed7e5549b2ba80bc,2022-04-28T18:40:19.163000
|
CVE-2022-0272,0,0,ba39c601e8f8ad770ec51471a81d25ffe2f0563ea1a0215aed7e5549b2ba80bc,2022-04-28T18:40:19.163000
|
||||||
CVE-2022-0273,0,1,e1fb46576506bdae178f09dce4f55598d868a4d0fde059b8dd2653558e6b68bf,2024-11-19T13:55:30.697000
|
CVE-2022-0273,0,0,e1fb46576506bdae178f09dce4f55598d868a4d0fde059b8dd2653558e6b68bf,2024-11-19T13:55:30.697000
|
||||||
CVE-2022-0274,0,0,5b464b8245e5321eeea5cde4c0986f9d63275f8e971c1a66b7e4500348e1edc6,2022-01-25T14:48:16.997000
|
CVE-2022-0274,0,0,5b464b8245e5321eeea5cde4c0986f9d63275f8e971c1a66b7e4500348e1edc6,2022-01-25T14:48:16.997000
|
||||||
CVE-2022-0277,0,0,54014335e700fab8a415cb3d21845a08a975de96657a8cbd1df94a58e34845ed,2023-06-29T08:15:09.807000
|
CVE-2022-0277,0,0,54014335e700fab8a415cb3d21845a08a975de96657a8cbd1df94a58e34845ed,2023-06-29T08:15:09.807000
|
||||||
CVE-2022-0278,0,0,bbe12ed35bb88da2486e8c13a6baaafb99e94fb880ba9c3fdbf3c9d24bfb016a,2022-01-26T03:22:09.423000
|
CVE-2022-0278,0,0,bbe12ed35bb88da2486e8c13a6baaafb99e94fb880ba9c3fdbf3c9d24bfb016a,2022-01-26T03:22:09.423000
|
||||||
@ -187906,7 +187906,7 @@ CVE-2022-0335,0,0,c87f7140ccb139e3761172aa2f563e4109797f37ee8bf08d3125bcc7f75ad6
|
|||||||
CVE-2022-0336,0,0,307b1c206992ca977db64c933e94fd941cf38b8332fd987ef4968a8aafac3993,2023-09-17T09:15:10.277000
|
CVE-2022-0336,0,0,307b1c206992ca977db64c933e94fd941cf38b8332fd987ef4968a8aafac3993,2023-09-17T09:15:10.277000
|
||||||
CVE-2022-0337,0,0,75762347a627388711d1f024fb68d21bc655a56ca3208dec8afc0cf007c526e8,2023-01-09T19:17:54.197000
|
CVE-2022-0337,0,0,75762347a627388711d1f024fb68d21bc655a56ca3208dec8afc0cf007c526e8,2023-01-09T19:17:54.197000
|
||||||
CVE-2022-0338,0,0,2606c9f2afde98ccb459d99f4a20258712105b5775cab8d092cb1216a49083f9,2023-08-02T09:15:11.420000
|
CVE-2022-0338,0,0,2606c9f2afde98ccb459d99f4a20258712105b5775cab8d092cb1216a49083f9,2023-08-02T09:15:11.420000
|
||||||
CVE-2022-0339,0,1,5d793d5e53c6da4433011b5271c0b87f58dd5cf7dcbd4198915acb20e4dc641e,2024-11-19T13:55:30.697000
|
CVE-2022-0339,0,0,5d793d5e53c6da4433011b5271c0b87f58dd5cf7dcbd4198915acb20e4dc641e,2024-11-19T13:55:30.697000
|
||||||
CVE-2022-0341,0,0,6bc29c60602591923783e75b9647c6eedf344c6d18b4537b8c917185e44cb4b4,2022-03-18T18:00:28.817000
|
CVE-2022-0341,0,0,6bc29c60602591923783e75b9647c6eedf344c6d18b4537b8c917185e44cb4b4,2022-03-18T18:00:28.817000
|
||||||
CVE-2022-0342,0,0,192c7e727dc228b67703fcbfa825f1994bc25fe903e9046ec3ccd660229b0664,2022-04-04T17:27:58.343000
|
CVE-2022-0342,0,0,192c7e727dc228b67703fcbfa825f1994bc25fe903e9046ec3ccd660229b0664,2022-04-04T17:27:58.343000
|
||||||
CVE-2022-0343,0,0,9b4662c7106d8ca9b502a9d147c3d0debb4425324b85f0dcc86bf35395bea467,2022-04-07T16:31:33.783000
|
CVE-2022-0343,0,0,9b4662c7106d8ca9b502a9d147c3d0debb4425324b85f0dcc86bf35395bea467,2022-04-07T16:31:33.783000
|
||||||
@ -187918,7 +187918,7 @@ CVE-2022-0348,0,0,41d5c28d0d1ab089ac68d1912e05f4337627e5cea9fba44ca38c395f8d8254
|
|||||||
CVE-2022-0349,0,0,068d099492481419d374d2003ba2aab3b7d6988afb1cc3a820cd310c5c5be982,2022-03-11T20:44:24.327000
|
CVE-2022-0349,0,0,068d099492481419d374d2003ba2aab3b7d6988afb1cc3a820cd310c5c5be982,2022-03-11T20:44:24.327000
|
||||||
CVE-2022-0350,0,0,4d2f2dd515eed464ce450a16a96b9a4c6b0b857965f9f86d554d1100c638b80f,2023-03-07T22:40:44.473000
|
CVE-2022-0350,0,0,4d2f2dd515eed464ce450a16a96b9a4c6b0b857965f9f86d554d1100c638b80f,2023-03-07T22:40:44.473000
|
||||||
CVE-2022-0351,0,0,d8c1cca7ff8811855948a48757571f7f9926e2f30bbcb8ecf722b183b33e26f4,2022-11-09T19:20:23.007000
|
CVE-2022-0351,0,0,d8c1cca7ff8811855948a48757571f7f9926e2f30bbcb8ecf722b183b33e26f4,2022-11-09T19:20:23.007000
|
||||||
CVE-2022-0352,0,1,0db67f24e45f8cba6dbb901f2e90ca2aaf82b10e7d4d2ffa04beed0cc939d610,2024-11-19T13:55:30.697000
|
CVE-2022-0352,0,0,0db67f24e45f8cba6dbb901f2e90ca2aaf82b10e7d4d2ffa04beed0cc939d610,2024-11-19T13:55:30.697000
|
||||||
CVE-2022-0353,0,0,1bde6ae86e109805348b0fe8a1ea22f783b296f97417591fd534964877f7a921,2023-10-30T18:18:25.037000
|
CVE-2022-0353,0,0,1bde6ae86e109805348b0fe8a1ea22f783b296f97417591fd534964877f7a921,2023-10-30T18:18:25.037000
|
||||||
CVE-2022-0354,0,0,08d2a7b0ab08e8bc6919039c3edf04df57c0887581b95ac3307601a9b6d27779,2023-08-08T14:22:24.967000
|
CVE-2022-0354,0,0,08d2a7b0ab08e8bc6919039c3edf04df57c0887581b95ac3307601a9b6d27779,2023-08-08T14:22:24.967000
|
||||||
CVE-2022-0355,0,0,6f40eae045470357a76ef57564a0e59b6ca2e456718480f7cb2332766b81d912,2023-08-02T09:15:11.547000
|
CVE-2022-0355,0,0,6f40eae045470357a76ef57564a0e59b6ca2e456718480f7cb2332766b81d912,2023-08-02T09:15:11.547000
|
||||||
@ -187970,8 +187970,8 @@ CVE-2022-0401,0,0,fd0c1ff73b88c5d9692a05caa80d58d887c8a37e7f114a6685c34c493b8913
|
|||||||
CVE-2022-0402,0,0,92f9b155923211e2ceee2d42d296863f6f1f38af6d18510a65170addd06c966c,2024-01-22T21:01:52.430000
|
CVE-2022-0402,0,0,92f9b155923211e2ceee2d42d296863f6f1f38af6d18510a65170addd06c966c,2024-01-22T21:01:52.430000
|
||||||
CVE-2022-0403,0,0,54d3a8e21af141a32e192ed41de5542c8ee2cafce593d7553180addfbe7d22f5,2022-04-11T16:16:43.773000
|
CVE-2022-0403,0,0,54d3a8e21af141a32e192ed41de5542c8ee2cafce593d7553180addfbe7d22f5,2022-04-11T16:16:43.773000
|
||||||
CVE-2022-0404,0,0,298dccd25c1952207280414f8bd7e0b22fde3e98e64d2fb17b1031e8a652b119,2023-11-07T03:41:14.680000
|
CVE-2022-0404,0,0,298dccd25c1952207280414f8bd7e0b22fde3e98e64d2fb17b1031e8a652b119,2023-11-07T03:41:14.680000
|
||||||
CVE-2022-0405,0,1,3fe2c2fa664b847b5ebb82208e2adeb820c86039416485597b89d2c3c29fb9e8,2024-11-19T13:55:30.697000
|
CVE-2022-0405,0,0,3fe2c2fa664b847b5ebb82208e2adeb820c86039416485597b89d2c3c29fb9e8,2024-11-19T13:55:30.697000
|
||||||
CVE-2022-0406,0,1,ac6dc798d52e1d9df0954afaddd06fcd05ab5e74ee3bd2e718cf9ddf02b5d3c0,2024-11-19T13:55:30.697000
|
CVE-2022-0406,0,0,ac6dc798d52e1d9df0954afaddd06fcd05ab5e74ee3bd2e718cf9ddf02b5d3c0,2024-11-19T13:55:30.697000
|
||||||
CVE-2022-0407,0,0,0155b2a87f71b0b7fb0916580421bf8b007742dea3e03201cc1d9b516db1f9a1,2022-08-26T17:35:22.767000
|
CVE-2022-0407,0,0,0155b2a87f71b0b7fb0916580421bf8b007742dea3e03201cc1d9b516db1f9a1,2022-08-26T17:35:22.767000
|
||||||
CVE-2022-0408,0,0,c5724b74e67f805cb7cef848135fd972bd1216e01e032e5ee72fd927b68010c6,2023-11-07T03:41:15.057000
|
CVE-2022-0408,0,0,c5724b74e67f805cb7cef848135fd972bd1216e01e032e5ee72fd927b68010c6,2023-11-07T03:41:15.057000
|
||||||
CVE-2022-0409,0,0,bdddcb1bc9179f07dc0a4ae2adcd12204cfc01caa1f9bd597938d2e20a4a0885,2022-03-01T01:57:03.397000
|
CVE-2022-0409,0,0,bdddcb1bc9179f07dc0a4ae2adcd12204cfc01caa1f9bd597938d2e20a4a0885,2022-03-01T01:57:03.397000
|
||||||
@ -188319,8 +188319,8 @@ CVE-2022-0762,0,0,92ae39eefd66ea7cbc32a8686599ec741c84b55a252f147df8d414c0e43894
|
|||||||
CVE-2022-0763,0,0,d8fa3da7528e8203bd3a9ef37cccbd85be752760dc10937953f39359a9f93d3b,2022-03-08T17:25:17.980000
|
CVE-2022-0763,0,0,d8fa3da7528e8203bd3a9ef37cccbd85be752760dc10937953f39359a9f93d3b,2022-03-08T17:25:17.980000
|
||||||
CVE-2022-0764,0,0,343066202ab53f2821e9e5df90301b5dd58745b58610e9036f49df289f6d59d2,2023-07-21T17:13:18.700000
|
CVE-2022-0764,0,0,343066202ab53f2821e9e5df90301b5dd58745b58610e9036f49df289f6d59d2,2023-07-21T17:13:18.700000
|
||||||
CVE-2022-0765,0,0,f45389e2abd373ef50c4b2eaf76af5c989711ff021560b421d272973fd1993b0,2022-04-27T00:07:20.813000
|
CVE-2022-0765,0,0,f45389e2abd373ef50c4b2eaf76af5c989711ff021560b421d272973fd1993b0,2022-04-27T00:07:20.813000
|
||||||
CVE-2022-0766,0,1,d537f4274da704d1dd3273ac0b381b2b0424512e0ef2fa096f40080f0bc4abf5,2024-11-19T13:55:30.697000
|
CVE-2022-0766,0,0,d537f4274da704d1dd3273ac0b381b2b0424512e0ef2fa096f40080f0bc4abf5,2024-11-19T13:55:30.697000
|
||||||
CVE-2022-0767,0,1,4a8b1abf7bc65f3da8bb9d672e959713f33737890d786c063681fdda56def6c0,2024-11-19T13:55:30.697000
|
CVE-2022-0767,0,0,4a8b1abf7bc65f3da8bb9d672e959713f33737890d786c063681fdda56def6c0,2024-11-19T13:55:30.697000
|
||||||
CVE-2022-0768,0,0,7413d50a96f5047476d4044fe93ebaaab8948f5b8b6e5644533ed04e60d94495,2022-03-08T17:34:05.377000
|
CVE-2022-0768,0,0,7413d50a96f5047476d4044fe93ebaaab8948f5b8b6e5644533ed04e60d94495,2022-03-08T17:34:05.377000
|
||||||
CVE-2022-0769,0,0,186d87009c3299115358ed003347610f261ff2fff63be099b887bf8e21eab2ea,2022-05-04T13:59:27.377000
|
CVE-2022-0769,0,0,186d87009c3299115358ed003347610f261ff2fff63be099b887bf8e21eab2ea,2022-05-04T13:59:27.377000
|
||||||
CVE-2022-0770,0,0,2b2c8df5ef6f7c812d46374c4465bb9d474ff8112a462c85978629ead78fc435,2022-04-04T18:55:52.103000
|
CVE-2022-0770,0,0,2b2c8df5ef6f7c812d46374c4465bb9d474ff8112a462c85978629ead78fc435,2022-04-04T18:55:52.103000
|
||||||
@ -188485,7 +188485,7 @@ CVE-2022-0935,0,0,4937ede48adff99b8a82685ce1c47ab995cfa52213926d00546e0ed28661fc
|
|||||||
CVE-2022-0936,0,0,5e1301a868c51f32d9b1d38c3bd9d5c4e7b252e5c9034d5c170399428a55d018,2022-04-14T20:39:32.157000
|
CVE-2022-0936,0,0,5e1301a868c51f32d9b1d38c3bd9d5c4e7b252e5c9034d5c170399428a55d018,2022-04-14T20:39:32.157000
|
||||||
CVE-2022-0937,0,0,6ebd398e67ed3e0577049a7473f2e9b69a1755b2dd70b6e7cd0177ef47d0ed36,2022-03-18T18:14:39.940000
|
CVE-2022-0937,0,0,6ebd398e67ed3e0577049a7473f2e9b69a1755b2dd70b6e7cd0177ef47d0ed36,2022-03-18T18:14:39.940000
|
||||||
CVE-2022-0938,0,0,53311bc36c380c526ea038cf13a8d2ff3d90835a99184a433f43babd3148fad1,2022-03-18T18:09:18.637000
|
CVE-2022-0938,0,0,53311bc36c380c526ea038cf13a8d2ff3d90835a99184a433f43babd3148fad1,2022-03-18T18:09:18.637000
|
||||||
CVE-2022-0939,0,1,3282bbb661657d8be93f4071e72224ecc54e53305f8949acb7b8846808175f6e,2024-11-19T13:55:30.697000
|
CVE-2022-0939,0,0,3282bbb661657d8be93f4071e72224ecc54e53305f8949acb7b8846808175f6e,2024-11-19T13:55:30.697000
|
||||||
CVE-2022-0940,0,0,70c545df86ee91c07e5f16b8db56ecfe025f705cbd301d61814768bd18a46665,2022-03-18T17:58:19.337000
|
CVE-2022-0940,0,0,70c545df86ee91c07e5f16b8db56ecfe025f705cbd301d61814768bd18a46665,2022-03-18T17:58:19.337000
|
||||||
CVE-2022-0941,0,0,ac156d3ea26d89f38610a523301b2336456b75734150d52009650c143803332b,2022-03-18T17:37:51.753000
|
CVE-2022-0941,0,0,ac156d3ea26d89f38610a523301b2336456b75734150d52009650c143803332b,2022-03-18T17:37:51.753000
|
||||||
CVE-2022-0942,0,0,dec36e5bdc2646c8ba8c9b40004d57a13bf18d262c0580e836243465cf2f3bee,2022-03-22T18:06:16.860000
|
CVE-2022-0942,0,0,dec36e5bdc2646c8ba8c9b40004d57a13bf18d262c0580e836243465cf2f3bee,2022-03-22T18:06:16.860000
|
||||||
@ -188536,7 +188536,7 @@ CVE-2022-0986,0,0,1f3d8cfe5b4034f8cb2379ef060f1b0fce7bd502c6c6229913f30a0e5af318
|
|||||||
CVE-2022-0987,0,0,f2c42d4d9f95e9749a4c445c80a51b63228a99080839ef62a18bb9765a5a0f2b,2022-07-09T02:16:41.140000
|
CVE-2022-0987,0,0,f2c42d4d9f95e9749a4c445c80a51b63228a99080839ef62a18bb9765a5a0f2b,2022-07-09T02:16:41.140000
|
||||||
CVE-2022-0988,0,0,f1199d2b132d579bf0e13054467a88fb08e72497869a87789662b30278c0d972,2022-04-01T12:24:18.417000
|
CVE-2022-0988,0,0,f1199d2b132d579bf0e13054467a88fb08e72497869a87789662b30278c0d972,2022-04-01T12:24:18.417000
|
||||||
CVE-2022-0989,0,0,7454afdecfc72b7e4a57bd0f5cbdf02a26a78ca6613e027ac6b4e5823196793c,2022-04-15T20:22:57.330000
|
CVE-2022-0989,0,0,7454afdecfc72b7e4a57bd0f5cbdf02a26a78ca6613e027ac6b4e5823196793c,2022-04-15T20:22:57.330000
|
||||||
CVE-2022-0990,0,1,6457303ddf0d06207cdd8d7192c493deae26fbe206e51758fb7bc61df6f18665,2024-11-19T13:55:30.697000
|
CVE-2022-0990,0,0,6457303ddf0d06207cdd8d7192c493deae26fbe206e51758fb7bc61df6f18665,2024-11-19T13:55:30.697000
|
||||||
CVE-2022-0991,0,0,8ca24c514df2eadfc1666ca1ace95d3168a9e969f9b3fcbe0a2a99e49de31694,2022-03-28T18:54:03.633000
|
CVE-2022-0991,0,0,8ca24c514df2eadfc1666ca1ace95d3168a9e969f9b3fcbe0a2a99e49de31694,2022-03-28T18:54:03.633000
|
||||||
CVE-2022-0992,0,0,6fd70fc3b7474ab91729ad584c70484a0877149adc006c6f9bd7347bb2357681,2023-11-07T03:41:41.573000
|
CVE-2022-0992,0,0,6fd70fc3b7474ab91729ad584c70484a0877149adc006c6f9bd7347bb2357681,2023-11-07T03:41:41.573000
|
||||||
CVE-2022-0993,0,0,78c1b936011bd648dc08da3df4bfe29b3fe82fd44846684d5bf8f67b8b826931,2024-01-11T09:15:43.237000
|
CVE-2022-0993,0,0,78c1b936011bd648dc08da3df4bfe29b3fe82fd44846684d5bf8f67b8b826931,2024-01-11T09:15:43.237000
|
||||||
@ -188763,7 +188763,7 @@ CVE-2022-1222,0,0,b3920337094656db702d78f1c526ab2ae12658b8e98c28c5c4ab7be3ad3344
|
|||||||
CVE-2022-1223,0,0,637b2827dcaf7417e78dbd542a64935d1a8b67bacce03b5481a1f13bfe63287f,2023-08-02T09:15:12.567000
|
CVE-2022-1223,0,0,637b2827dcaf7417e78dbd542a64935d1a8b67bacce03b5481a1f13bfe63287f,2023-08-02T09:15:12.567000
|
||||||
CVE-2022-1224,0,0,1f7e411e11108d7458b51eab22eb66a24149a5879c00141ef2f28fe0fafb05dc,2022-04-11T16:42:06.027000
|
CVE-2022-1224,0,0,1f7e411e11108d7458b51eab22eb66a24149a5879c00141ef2f28fe0fafb05dc,2022-04-11T16:42:06.027000
|
||||||
CVE-2022-1225,0,0,5748f4f5345a9f6c3175311aa2738ab2bf9651a24ed3aa3e4677372333de4ca4,2022-04-11T16:44:30.957000
|
CVE-2022-1225,0,0,5748f4f5345a9f6c3175311aa2738ab2bf9651a24ed3aa3e4677372333de4ca4,2022-04-11T16:44:30.957000
|
||||||
CVE-2022-1226,0,0,bf5f888bf31be4b098386ee9d479d6c8983b1f336de6d7d59c67ef66072982c7,2024-11-15T13:58:08.913000
|
CVE-2022-1226,0,1,8bf5870804954667b90d0745c8de8a5961788bc74620aa97f31ef3a31714c7fe,2024-11-19T15:30:53.477000
|
||||||
CVE-2022-1227,0,0,83b90259bbaaaa877c52c1a6a345ecac76277c5a49b8d7b2e55d5609ee2638a9,2024-06-28T16:15:03.017000
|
CVE-2022-1227,0,0,83b90259bbaaaa877c52c1a6a345ecac76277c5a49b8d7b2e55d5609ee2638a9,2024-06-28T16:15:03.017000
|
||||||
CVE-2022-1228,0,0,7d23d45a83435d1e3bd4ca47a231881fd502cebe5b74cef074758e121829a08b,2022-05-03T17:07:53.397000
|
CVE-2022-1228,0,0,7d23d45a83435d1e3bd4ca47a231881fd502cebe5b74cef074758e121829a08b,2022-05-03T17:07:53.397000
|
||||||
CVE-2022-1229,0,0,224e2e97e97497a42291fdfe93e44428659fa5e137ea549dec7de44ffe085b98,2023-04-04T16:24:30.943000
|
CVE-2022-1229,0,0,224e2e97e97497a42291fdfe93e44428659fa5e137ea549dec7de44ffe085b98,2023-04-04T16:24:30.943000
|
||||||
@ -189401,7 +189401,7 @@ CVE-2022-1876,0,0,983e56cac9f7021f952f9f938d45e035dc9acbf02c1272a86efe4cc4b468e0
|
|||||||
CVE-2022-1881,0,0,7439c809094624c8b5fdbf022a11f3d774e6fefc61f4a028f8263bd6fe529332,2022-07-27T18:21:16.887000
|
CVE-2022-1881,0,0,7439c809094624c8b5fdbf022a11f3d774e6fefc61f4a028f8263bd6fe529332,2022-07-27T18:21:16.887000
|
||||||
CVE-2022-1882,0,0,3baaf779da64335ffad3abdda3c3850b06114d069bb0bf1a437e02c2ffe782b9,2023-11-07T03:42:15.460000
|
CVE-2022-1882,0,0,3baaf779da64335ffad3abdda3c3850b06114d069bb0bf1a437e02c2ffe782b9,2023-11-07T03:42:15.460000
|
||||||
CVE-2022-1883,0,0,10b029e5ce85ce2290987adcb3c5745aea973d33d0d3803bfa3a6beb774a6afd,2022-06-03T14:05:34.297000
|
CVE-2022-1883,0,0,10b029e5ce85ce2290987adcb3c5745aea973d33d0d3803bfa3a6beb774a6afd,2022-06-03T14:05:34.297000
|
||||||
CVE-2022-1884,0,1,b5e47b6fa991326fd5d1cb1d70695a1190edb3eb7f45e2a68cb3debb9e1a9c6d,2024-11-19T14:47:48.443000
|
CVE-2022-1884,0,0,b5e47b6fa991326fd5d1cb1d70695a1190edb3eb7f45e2a68cb3debb9e1a9c6d,2024-11-19T14:47:48.443000
|
||||||
CVE-2022-1885,0,0,990571f5f58372d06c86739f0d8507a9bf4c77382683b628e53a4fb6b11f2c45,2022-07-06T18:07:38.497000
|
CVE-2022-1885,0,0,990571f5f58372d06c86739f0d8507a9bf4c77382683b628e53a4fb6b11f2c45,2022-07-06T18:07:38.497000
|
||||||
CVE-2022-1886,0,0,7934fa97f2a8af4a046d7bb9f14babcddc4a4e2348bcdab16ebde94dde55d5a5,2023-11-07T03:42:15.700000
|
CVE-2022-1886,0,0,7934fa97f2a8af4a046d7bb9f14babcddc4a4e2348bcdab16ebde94dde55d5a5,2023-11-07T03:42:15.700000
|
||||||
CVE-2022-1887,0,0,c9859a4b8fe51696b2ace2c5b6406cbbf00272360b5c9ea988467e7b99e94416,2022-12-24T04:23:54.613000
|
CVE-2022-1887,0,0,c9859a4b8fe51696b2ace2c5b6406cbbf00272360b5c9ea988467e7b99e94416,2022-12-24T04:23:54.613000
|
||||||
@ -194407,7 +194407,7 @@ CVE-2022-25246,0,0,470d73336081fafe2504c5ae930c1bc5c3b04d6c1d5bca8e82a1ca62a276c
|
|||||||
CVE-2022-25247,0,0,f1828753959f3a8ddb7cef9c2b17b9ebe6e005ad9804df2524e5e91b5305ed43,2022-03-28T13:25:59.947000
|
CVE-2022-25247,0,0,f1828753959f3a8ddb7cef9c2b17b9ebe6e005ad9804df2524e5e91b5305ed43,2022-03-28T13:25:59.947000
|
||||||
CVE-2022-25248,0,0,1e003ed9c345c86a0ae7342705f6b5b76c7a524c725fb9f26e480a2de2ce199c,2022-03-28T13:27:40.890000
|
CVE-2022-25248,0,0,1e003ed9c345c86a0ae7342705f6b5b76c7a524c725fb9f26e480a2de2ce199c,2022-03-28T13:27:40.890000
|
||||||
CVE-2022-25249,0,0,5096787f68913f3af8deec7d28059622eee59c935f342d23008ba2d1adcdb681,2022-03-28T13:29:31.777000
|
CVE-2022-25249,0,0,5096787f68913f3af8deec7d28059622eee59c935f342d23008ba2d1adcdb681,2022-03-28T13:29:31.777000
|
||||||
CVE-2022-2525,0,1,082d8f171c6cc07e4b131d4117af1cdfc7074009c41676c35c6dc892fa94881d,2024-11-19T13:55:30.697000
|
CVE-2022-2525,0,0,082d8f171c6cc07e4b131d4117af1cdfc7074009c41676c35c6dc892fa94881d,2024-11-19T13:55:30.697000
|
||||||
CVE-2022-25250,0,0,70256af592b9c49051cb696e3e98b6b318b6b9bd7c026c62389ebc173f763a81,2022-03-28T13:29:56.907000
|
CVE-2022-25250,0,0,70256af592b9c49051cb696e3e98b6b318b6b9bd7c026c62389ebc173f763a81,2022-03-28T13:29:56.907000
|
||||||
CVE-2022-25251,0,0,30aa9f042433ef7f24b6a381a3a50cfd25bc3a4fa4c2ee4d2a94c9598ed3cb9e,2022-03-28T13:30:39.300000
|
CVE-2022-25251,0,0,30aa9f042433ef7f24b6a381a3a50cfd25bc3a4fa4c2ee4d2a94c9598ed3cb9e,2022-03-28T13:30:39.300000
|
||||||
CVE-2022-25252,0,0,40a835ffc450f4499e9c229b3d3a44e165cbb918e6082351e6d9edd95f09ca0d,2022-03-28T13:32:35.907000
|
CVE-2022-25252,0,0,40a835ffc450f4499e9c229b3d3a44e165cbb918e6082351e6d9edd95f09ca0d,2022-03-28T13:32:35.907000
|
||||||
@ -198901,7 +198901,7 @@ CVE-2022-30759,0,0,bd8543e5a8b11fb4636241908ba990e450528de2ca3ce6a2cc2c2e92c529e
|
|||||||
CVE-2022-3076,0,0,04a5db7a7c3a6c41fc8643ca8ef27e8b694c85120ab617b9e4549a6d82fe6ea6,2022-09-27T04:37:44.793000
|
CVE-2022-3076,0,0,04a5db7a7c3a6c41fc8643ca8ef27e8b694c85120ab617b9e4549a6d82fe6ea6,2022-09-27T04:37:44.793000
|
||||||
CVE-2022-30760,0,0,33981d8f48d80e2e251879e187507ead15290cf13fe04528ee7cc8601a8463a9,2022-06-17T19:57:09.527000
|
CVE-2022-30760,0,0,33981d8f48d80e2e251879e187507ead15290cf13fe04528ee7cc8601a8463a9,2022-06-17T19:57:09.527000
|
||||||
CVE-2022-30763,0,0,99c247d1a877e52090357101b5b4001a96c949c6e441faf9185997c22c969e91,2022-10-12T15:32:50.077000
|
CVE-2022-30763,0,0,99c247d1a877e52090357101b5b4001a96c949c6e441faf9185997c22c969e91,2022-10-12T15:32:50.077000
|
||||||
CVE-2022-30765,0,1,21088860b0170d3618cfd9335e6710743a7cf725d376c1f938c4afaf2c7d00aa,2024-11-19T13:55:30.697000
|
CVE-2022-30765,0,0,21088860b0170d3618cfd9335e6710743a7cf725d376c1f938c4afaf2c7d00aa,2024-11-19T13:55:30.697000
|
||||||
CVE-2022-30767,0,0,4775e6dfb882ca3a196625f46d2186ce01f414513db4c144b862289f8c58d6a5,2023-11-07T03:47:24.783000
|
CVE-2022-30767,0,0,4775e6dfb882ca3a196625f46d2186ce01f414513db4c144b862289f8c58d6a5,2023-11-07T03:47:24.783000
|
||||||
CVE-2022-30768,0,0,19753dea6aeae531834932bdbe525a85c3a36862042bf97e7f1ddd6d4e4b3d91,2023-11-07T03:47:24.853000
|
CVE-2022-30768,0,0,19753dea6aeae531834932bdbe525a85c3a36862042bf97e7f1ddd6d4e4b3d91,2023-11-07T03:47:24.853000
|
||||||
CVE-2022-30769,0,0,15fa8cc9f9e5fd9012a9ab8a52b506ef029d295e9d752a237cf87b7e4f8050e9,2023-11-07T03:47:24.913000
|
CVE-2022-30769,0,0,15fa8cc9f9e5fd9012a9ab8a52b506ef029d295e9d752a237cf87b7e4f8050e9,2023-11-07T03:47:24.913000
|
||||||
@ -199681,12 +199681,12 @@ CVE-2022-31663,0,0,c250a0e102f60432d255e827fdd6db289d62d1a4e1292229b591504e22573
|
|||||||
CVE-2022-31664,0,0,8ae94e3e4b372e5f45259d81541342947ae361ebba4e6da89206986ea919de52,2023-08-08T14:22:24.967000
|
CVE-2022-31664,0,0,8ae94e3e4b372e5f45259d81541342947ae361ebba4e6da89206986ea919de52,2023-08-08T14:22:24.967000
|
||||||
CVE-2022-31665,0,0,7a06345a1942d5d52d9b06c0ee41416d4ed2364fdc0d69c8a0c3f480ee888cbb,2022-08-11T16:14:08.620000
|
CVE-2022-31665,0,0,7a06345a1942d5d52d9b06c0ee41416d4ed2364fdc0d69c8a0c3f480ee888cbb,2022-08-11T16:14:08.620000
|
||||||
CVE-2022-31666,0,0,fddd08a0275cd2757989dfe397f2a0364bee8be87b326ee85f29b843beb3c153,2024-11-15T13:58:08.913000
|
CVE-2022-31666,0,0,fddd08a0275cd2757989dfe397f2a0364bee8be87b326ee85f29b843beb3c153,2024-11-15T13:58:08.913000
|
||||||
CVE-2022-31667,0,0,b4a2682ab6a2c61a30b5ca48c8773b6de7eb3905450bd89ef570ad1acdf43de2,2024-11-15T13:58:08.913000
|
CVE-2022-31667,0,1,a86622694c580be2148aebd4cf7f233d4cdf3ef9af10848165fe7bd7e2ff5779,2024-11-19T15:25:29.643000
|
||||||
CVE-2022-31668,0,0,649520a20bcea91bc592e945ea0bf7164dd3b5b8c3ed608c13d7d8dc1202f9a7,2024-11-15T13:58:08.913000
|
CVE-2022-31668,0,1,389a2176cdcdbac326dc9a97b32bac0dee4c4446a86e9ff41851f4fa9bb05259,2024-11-19T15:25:25.797000
|
||||||
CVE-2022-31669,0,0,7b7f0d45e10bdc4d686c91fec1cc514e5851e6c4574d4f86fe9975fe1ca3ecc9,2024-11-15T13:58:08.913000
|
CVE-2022-31669,0,1,1ffdf862df8b02cea52ed799f65002be0a0a3e9db5602fbbdf399b87d7bf8911,2024-11-19T15:20:01.913000
|
||||||
CVE-2022-3167,0,0,47921e8a9cb97995d6f2ce8276ccf118a65fe4731d6ac6de65dd0ec114eec596,2022-09-14T15:32:08.950000
|
CVE-2022-3167,0,0,47921e8a9cb97995d6f2ce8276ccf118a65fe4731d6ac6de65dd0ec114eec596,2022-09-14T15:32:08.950000
|
||||||
CVE-2022-31670,0,0,727719948637a94160cef27d7d8bf8aa400ade68f40e45eb16ee91476d183a3f,2024-11-15T13:58:08.913000
|
CVE-2022-31670,0,1,e7d2b70f3a49fa7e681074911a3f5d96940d2022fc580c58bb8ceb9bb2fca5ea,2024-11-19T15:20:54.243000
|
||||||
CVE-2022-31671,0,0,2c2cbee5d14eaf0dc34fd68103cb6c2805514c4e88ddbd449a05e40e50807870,2024-11-15T13:58:08.913000
|
CVE-2022-31671,0,1,e1d29a729eb1da37697d524bff97f426d3e52f3398b52abf59cd32ad79c7a6dc,2024-11-19T15:40:44.150000
|
||||||
CVE-2022-31672,0,0,f935cb14a924ae93702f89793daf0806536a0ce42ff8289dde093642be80a068,2023-08-08T14:22:24.967000
|
CVE-2022-31672,0,0,f935cb14a924ae93702f89793daf0806536a0ce42ff8289dde093642be80a068,2023-08-08T14:22:24.967000
|
||||||
CVE-2022-31673,0,0,da7dcaa4140053d84527543292fb585bb296fa966885cdf6f4d876302e1f87da,2023-08-08T14:21:49.707000
|
CVE-2022-31673,0,0,da7dcaa4140053d84527543292fb585bb296fa966885cdf6f4d876302e1f87da,2023-08-08T14:21:49.707000
|
||||||
CVE-2022-31674,0,0,332df8a6563c46e3b27acddce953af7226cedea008975ba4b629bdb187c43e75,2022-08-15T18:56:24.003000
|
CVE-2022-31674,0,0,332df8a6563c46e3b27acddce953af7226cedea008975ba4b629bdb187c43e75,2022-08-15T18:56:24.003000
|
||||||
@ -212973,7 +212973,7 @@ CVE-2023-0105,0,0,2b12a003cd73110318e79298dd730b028944de31b3b2fd49ae09c6e6c34faf
|
|||||||
CVE-2023-0106,0,0,05e0d567b91f98b80dba4d8ef37e3d6d93df29ade7db9eb7d74b845f158d4370,2023-01-12T15:04:29.543000
|
CVE-2023-0106,0,0,05e0d567b91f98b80dba4d8ef37e3d6d93df29ade7db9eb7d74b845f158d4370,2023-01-12T15:04:29.543000
|
||||||
CVE-2023-0107,0,0,cd205e669e16f38bc95e2290070f356c4fee19f825da4c33fef61ad635b5f6dd,2023-01-12T15:04:41.817000
|
CVE-2023-0107,0,0,cd205e669e16f38bc95e2290070f356c4fee19f825da4c33fef61ad635b5f6dd,2023-01-12T15:04:41.817000
|
||||||
CVE-2023-0108,0,0,70c8cf4e996128d54da9f7301a41fc8c246a66fdfe898b159018bdcb506d722d,2023-01-12T15:05:03.130000
|
CVE-2023-0108,0,0,70c8cf4e996128d54da9f7301a41fc8c246a66fdfe898b159018bdcb506d722d,2023-01-12T15:05:03.130000
|
||||||
CVE-2023-0109,0,1,f50d684cb180753275a60be1ec93d7781dcc8b49ad130338582e06440ef189bf,2024-11-19T14:44:24.977000
|
CVE-2023-0109,0,0,f50d684cb180753275a60be1ec93d7781dcc8b49ad130338582e06440ef189bf,2024-11-19T14:44:24.977000
|
||||||
CVE-2023-0110,0,0,b9a61a54a079a5cddcae7f57892e97a4bbf51450edf598dd8a9a1b1c401ebd1f,2023-01-12T15:05:16.323000
|
CVE-2023-0110,0,0,b9a61a54a079a5cddcae7f57892e97a4bbf51450edf598dd8a9a1b1c401ebd1f,2023-01-12T15:05:16.323000
|
||||||
CVE-2023-0111,0,0,f766f05747dd6dfbc35868e0369bbe0def763377d79a8a4ea4e4bea44d32809b,2023-01-12T15:05:27.080000
|
CVE-2023-0111,0,0,f766f05747dd6dfbc35868e0369bbe0def763377d79a8a4ea4e4bea44d32809b,2023-01-12T15:05:27.080000
|
||||||
CVE-2023-0112,0,0,66c21565a3c1e4d16d1c053665b40b7925a9b3641bc7aeaa413fbdfe779c924d,2023-01-12T15:05:37.157000
|
CVE-2023-0112,0,0,66c21565a3c1e4d16d1c053665b40b7925a9b3641bc7aeaa413fbdfe779c924d,2023-01-12T15:05:37.157000
|
||||||
@ -213577,7 +213577,7 @@ CVE-2023-0733,0,0,e09491ec0935323a2fec770c3ecd0ead271e6d263c55ec182afeeb068268d5
|
|||||||
CVE-2023-0734,0,0,8d2fcc12463e0b1abec4a2a51b7df5516739ca6f45b2b04f9bbd78cb0aff604f,2023-03-09T20:55:01.123000
|
CVE-2023-0734,0,0,8d2fcc12463e0b1abec4a2a51b7df5516739ca6f45b2b04f9bbd78cb0aff604f,2023-03-09T20:55:01.123000
|
||||||
CVE-2023-0735,0,0,9fdced2b47db01a6a01919f52b5ed809a8d21724989b5bfa7955c49171c3b6f7,2023-02-15T19:24:41.473000
|
CVE-2023-0735,0,0,9fdced2b47db01a6a01919f52b5ed809a8d21724989b5bfa7955c49171c3b6f7,2023-02-15T19:24:41.473000
|
||||||
CVE-2023-0736,0,0,b3396876d05ebd2f1f90f4354a1dda6ed12cd8c3d0ffb089c43fbadd8845f1a2,2023-02-15T19:25:29.570000
|
CVE-2023-0736,0,0,b3396876d05ebd2f1f90f4354a1dda6ed12cd8c3d0ffb089c43fbadd8845f1a2,2023-02-15T19:25:29.570000
|
||||||
CVE-2023-0737,0,1,51425d6267ef46092b2ea719385b1a24795974b2751701ad1000a997f859dafc,2024-11-19T14:43:04.257000
|
CVE-2023-0737,0,0,51425d6267ef46092b2ea719385b1a24795974b2751701ad1000a997f859dafc,2024-11-19T14:43:04.257000
|
||||||
CVE-2023-0738,0,0,8b8dc61e92f27262b3aa279351d6ab8033f6bacb206b350b6e8e6ebc9af5389e,2023-04-17T16:57:07.133000
|
CVE-2023-0738,0,0,8b8dc61e92f27262b3aa279351d6ab8033f6bacb206b350b6e8e6ebc9af5389e,2023-04-17T16:57:07.133000
|
||||||
CVE-2023-0739,0,0,b1b26d0ce5c494e5d7ada0f8a588c86492d1c9f0144b5f459b8cc611b553c2cd,2023-03-02T02:15:41.857000
|
CVE-2023-0739,0,0,b1b26d0ce5c494e5d7ada0f8a588c86492d1c9f0144b5f459b8cc611b553c2cd,2023-03-02T02:15:41.857000
|
||||||
CVE-2023-0740,0,0,a07e1065e4de29dd41d3a7cadad7fafff7c778c739891464a73f725e2a440f3d,2023-02-15T20:20:37.850000
|
CVE-2023-0740,0,0,a07e1065e4de29dd41d3a7cadad7fafff7c778c739891464a73f725e2a440f3d,2023-02-15T20:20:37.850000
|
||||||
@ -215151,7 +215151,7 @@ CVE-2023-20589,0,0,8f5169c7803605972ea983b305f7f4a772b29887c902f9b718a3f97d8c8a1
|
|||||||
CVE-2023-2059,0,0,0677a9a340cebf1ede4fa5405d77be76b826f28940ff2b5e0fd7dfe518b5d2d4,2024-05-17T02:22:37.890000
|
CVE-2023-2059,0,0,0677a9a340cebf1ede4fa5405d77be76b826f28940ff2b5e0fd7dfe518b5d2d4,2024-05-17T02:22:37.890000
|
||||||
CVE-2023-20591,0,0,1e7df92e3260281a7f93a15b060fa9a08e3ae1935869b5acd83a46486c7b2bef,2024-08-14T02:07:05.410000
|
CVE-2023-20591,0,0,1e7df92e3260281a7f93a15b060fa9a08e3ae1935869b5acd83a46486c7b2bef,2024-08-14T02:07:05.410000
|
||||||
CVE-2023-20592,0,0,b0a06d1e3946cee9f0f28e7ed70215f197005399701a88546b468891da1b0cea,2023-11-28T18:04:11.733000
|
CVE-2023-20592,0,0,b0a06d1e3946cee9f0f28e7ed70215f197005399701a88546b468891da1b0cea,2023-11-28T18:04:11.733000
|
||||||
CVE-2023-20593,0,0,530d6596a07cbc314aa9738f5f27a912fa1e4a0638fe8dd3fac9dbd8b5f37664,2024-06-10T18:15:20.270000
|
CVE-2023-20593,0,1,7abc99ea43cac16867e8379103894870c8c627e5561a73e7e35a8dc522f378b6,2024-11-19T16:35:07.333000
|
||||||
CVE-2023-20594,0,0,1216232d26ab1c6c51b8b6cc614329be0442409fee752464c8c4238b36f64f7a,2023-09-22T19:16:57.037000
|
CVE-2023-20594,0,0,1216232d26ab1c6c51b8b6cc614329be0442409fee752464c8c4238b36f64f7a,2023-09-22T19:16:57.037000
|
||||||
CVE-2023-20596,0,0,6a82acc121f37ef310d42099b7aae05b4dd32a0c7d12ee42d78925db1cf9d2d9,2023-11-21T20:28:27.040000
|
CVE-2023-20596,0,0,6a82acc121f37ef310d42099b7aae05b4dd32a0c7d12ee42d78925db1cf9d2d9,2023-11-21T20:28:27.040000
|
||||||
CVE-2023-20597,0,0,15f8fd1c7036f945b94c70b747ee09d37b148ebd22da23b8a6409d9bb0d84e4f,2023-09-22T22:35:09.617000
|
CVE-2023-20597,0,0,15f8fd1c7036f945b94c70b747ee09d37b148ebd22da23b8a6409d9bb0d84e4f,2023-09-22T22:35:09.617000
|
||||||
@ -215621,7 +215621,7 @@ CVE-2023-21056,0,0,995fad705f650ff3eaf185ebe882d06b6e4d09c0956a6bcd2bfea6b654417
|
|||||||
CVE-2023-21057,0,0,3d44097c3c200f0b17f1879819349cdc18de4e2156ff8226812a4d0777ba6c61,2023-03-30T16:50:36.527000
|
CVE-2023-21057,0,0,3d44097c3c200f0b17f1879819349cdc18de4e2156ff8226812a4d0777ba6c61,2023-03-30T16:50:36.527000
|
||||||
CVE-2023-21058,0,0,48052587152b716354e8911d9a2a29e6d938c8f474058afbe6f8a5041cd7974a,2023-03-29T15:05:03.910000
|
CVE-2023-21058,0,0,48052587152b716354e8911d9a2a29e6d938c8f474058afbe6f8a5041cd7974a,2023-03-29T15:05:03.910000
|
||||||
CVE-2023-21059,0,0,8db890a27c915f00d6fed020c9f8a480e62ed6ce4dac0ac01a34a7dce78a02ec,2023-03-29T18:44:14.857000
|
CVE-2023-21059,0,0,8db890a27c915f00d6fed020c9f8a480e62ed6ce4dac0ac01a34a7dce78a02ec,2023-03-29T18:44:14.857000
|
||||||
CVE-2023-2106,0,1,c92407a6d17b0e3d5e08d0917e8500d57e0daaab221d4d9671a90019b78f71f2,2024-11-19T13:55:30.697000
|
CVE-2023-2106,0,0,c92407a6d17b0e3d5e08d0917e8500d57e0daaab221d4d9671a90019b78f71f2,2024-11-19T13:55:30.697000
|
||||||
CVE-2023-21060,0,0,031442d7f4ea5b6ae0e29837a4bbaed861fbcc303822a358b5dc59a5149bb3dd,2023-03-29T18:43:53.737000
|
CVE-2023-21060,0,0,031442d7f4ea5b6ae0e29837a4bbaed861fbcc303822a358b5dc59a5149bb3dd,2023-03-29T18:43:53.737000
|
||||||
CVE-2023-21061,0,0,6490da526ed7065eccbcc696f9f962795cc2b014c6d53d64a6adbd94120f5d18,2023-03-29T15:04:11.227000
|
CVE-2023-21061,0,0,6490da526ed7065eccbcc696f9f962795cc2b014c6d53d64a6adbd94120f5d18,2023-03-29T15:04:11.227000
|
||||||
CVE-2023-21062,0,0,40c76e318792cc0f78ca458ad4e9dad427e83b5b91f7684d0d6fa2943a6292e0,2023-03-31T12:58:57.567000
|
CVE-2023-21062,0,0,40c76e318792cc0f78ca458ad4e9dad427e83b5b91f7684d0d6fa2943a6292e0,2023-03-31T12:58:57.567000
|
||||||
@ -217542,7 +217542,7 @@ CVE-2023-2331,0,0,e433c8f28124f99de996fe1b6c3691e25c108649c8ab730059c257d74b0a50
|
|||||||
CVE-2023-23313,0,0,5ab564b75d72781324830922b5feefff3026f2101be70bbaad014ca9b998958c,2023-11-07T04:07:40.137000
|
CVE-2023-23313,0,0,5ab564b75d72781324830922b5feefff3026f2101be70bbaad014ca9b998958c,2023-11-07T04:07:40.137000
|
||||||
CVE-2023-23314,0,0,b80392fd9584b433a38a78e2530c4db30446fa40b35f645f6acfbdcc1e22626e,2023-01-30T19:31:41.750000
|
CVE-2023-23314,0,0,b80392fd9584b433a38a78e2530c4db30446fa40b35f645f6acfbdcc1e22626e,2023-01-30T19:31:41.750000
|
||||||
CVE-2023-23315,0,0,32244c72a2b7eabff29fdd785e8853617587d6b657a16b1b687badeb31ddeb6a,2023-03-10T02:31:23.757000
|
CVE-2023-23315,0,0,32244c72a2b7eabff29fdd785e8853617587d6b657a16b1b687badeb31ddeb6a,2023-03-10T02:31:23.757000
|
||||||
CVE-2023-2332,0,0,ead77168c46a2d62d5740ffee8e05cb4272633cde2d7436b3259f38775199f58,2024-11-15T13:58:08.913000
|
CVE-2023-2332,0,1,3be3d5bdb3aa84ff76247ddc8e5ebfeb1869fc617ae96a6127557011a5701f3e,2024-11-19T15:55:24.137000
|
||||||
CVE-2023-23324,0,0,95dd911b066baa0858b7b409d73bcd14ff22686691096373e30e8c5721aa2257,2023-12-05T12:39:44.770000
|
CVE-2023-23324,0,0,95dd911b066baa0858b7b409d73bcd14ff22686691096373e30e8c5721aa2257,2023-12-05T12:39:44.770000
|
||||||
CVE-2023-23325,0,0,94e1a8e3ac75f1a3bc2a74e7374f6d9f0e838c3c3932b61fa7dac52d90f8e0d8,2023-12-05T12:48:15.773000
|
CVE-2023-23325,0,0,94e1a8e3ac75f1a3bc2a74e7374f6d9f0e838c3c3932b61fa7dac52d90f8e0d8,2023-12-05T12:48:15.773000
|
||||||
CVE-2023-23326,0,0,af8ef32c5b2a0d921fed756052ef1d0183c04f71130cb143f8686b6d4c026c5b,2023-03-16T15:56:41.620000
|
CVE-2023-23326,0,0,af8ef32c5b2a0d921fed756052ef1d0183c04f71130cb143f8686b6d4c026c5b,2023-03-16T15:56:41.620000
|
||||||
@ -235417,7 +235417,7 @@ CVE-2023-46786,0,0,bf4916e892e13d9bd5f18249e97f7ed4aeb5247f2854f8c308efd96466799
|
|||||||
CVE-2023-46787,0,0,eee6ea113b686659f2a66a8e2e38db99b180a9cdd992ed45b258359c2fbbafb0,2023-11-13T18:00:08.857000
|
CVE-2023-46787,0,0,eee6ea113b686659f2a66a8e2e38db99b180a9cdd992ed45b258359c2fbbafb0,2023-11-13T18:00:08.857000
|
||||||
CVE-2023-46788,0,0,fa89ddc1e582ea32e59694cd588090422058d73f3e55d49cdf4218b1d27bcb24,2023-11-13T18:00:01.510000
|
CVE-2023-46788,0,0,fa89ddc1e582ea32e59694cd588090422058d73f3e55d49cdf4218b1d27bcb24,2023-11-13T18:00:01.510000
|
||||||
CVE-2023-46789,0,0,9fbdb411cccdb011e81628500fbc3b74a0a6d06d2a8237255e6accafa55442cd,2023-11-13T17:59:42.877000
|
CVE-2023-46789,0,0,9fbdb411cccdb011e81628500fbc3b74a0a6d06d2a8237255e6accafa55442cd,2023-11-13T17:59:42.877000
|
||||||
CVE-2023-4679,0,0,9696f8639661f4ff600ec910a28b0621ec509409b2c3dcff5c480894998943b2,2024-11-15T20:35:03.507000
|
CVE-2023-4679,0,1,2dbae0eabb83ce2e9f092fd25bd577d8e7623c11a5f4ff5c35c222f033544779,2024-11-19T15:54:32.670000
|
||||||
CVE-2023-46790,0,0,7414a678623b3a8d31eda7749ee35a2bdf61169d6ade6fd91b06a5a0e4bffda9,2024-01-02T22:15:08.290000
|
CVE-2023-46790,0,0,7414a678623b3a8d31eda7749ee35a2bdf61169d6ade6fd91b06a5a0e4bffda9,2024-01-02T22:15:08.290000
|
||||||
CVE-2023-46791,0,0,4f7a7ce04b20ee1c59664fc3196bc82b7bf68c16659759baf914252cd593ed28,2024-01-02T22:15:08.367000
|
CVE-2023-46791,0,0,4f7a7ce04b20ee1c59664fc3196bc82b7bf68c16659759baf914252cd593ed28,2024-01-02T22:15:08.367000
|
||||||
CVE-2023-46792,0,0,7e34df21be011e0e859102a1381c46b673dbda14e06d4aaaab00023b1fb66f87,2024-01-02T22:15:08.440000
|
CVE-2023-46792,0,0,7e34df21be011e0e859102a1381c46b673dbda14e06d4aaaab00023b1fb66f87,2024-01-02T22:15:08.440000
|
||||||
@ -235651,7 +235651,7 @@ CVE-2023-47120,0,0,6e5cf7aa1dce9f494a0c860253344a3950368bcf8ff7b583963ba86c8e76d
|
|||||||
CVE-2023-47121,0,0,8ef00758c3dec2ac6ff6b649dadab0f948ffb4a5bbb58a181a1e6c7b3ef58d87,2023-11-17T20:20:26.137000
|
CVE-2023-47121,0,0,8ef00758c3dec2ac6ff6b649dadab0f948ffb4a5bbb58a181a1e6c7b3ef58d87,2023-11-17T20:20:26.137000
|
||||||
CVE-2023-47122,0,0,a9df5fa9c0e8414d44cffae9c5acb48e2a1801978cf6443f04f6610b9193b585,2023-11-16T17:50:16.327000
|
CVE-2023-47122,0,0,a9df5fa9c0e8414d44cffae9c5acb48e2a1801978cf6443f04f6610b9193b585,2023-11-16T17:50:16.327000
|
||||||
CVE-2023-47123,0,0,8d361c371341412b84dc54774df576d9fe69de84d066d55765bb32cbb6494159,2024-04-15T19:12:25.887000
|
CVE-2023-47123,0,0,8d361c371341412b84dc54774df576d9fe69de84d066d55765bb32cbb6494159,2024-04-15T19:12:25.887000
|
||||||
CVE-2023-47124,0,1,bfbe18ebea14402829f796430da020434ba5becbf2d6a1123f98fe9408be1de7,2024-11-19T14:15:16.660000
|
CVE-2023-47124,0,0,bfbe18ebea14402829f796430da020434ba5becbf2d6a1123f98fe9408be1de7,2024-11-19T14:15:16.660000
|
||||||
CVE-2023-47125,0,0,9a2f9293b1bb6384f4c490717940892ab731bd46d8233a43c41e51a52ebe67c3,2023-11-21T02:58:51.787000
|
CVE-2023-47125,0,0,9a2f9293b1bb6384f4c490717940892ab731bd46d8233a43c41e51a52ebe67c3,2023-11-21T02:58:51.787000
|
||||||
CVE-2023-47126,0,0,d7db4dfe43677893f510f67d44655eb1bfaaec58afed097e3332356dc994ae85,2023-11-21T03:01:46.133000
|
CVE-2023-47126,0,0,d7db4dfe43677893f510f67d44655eb1bfaaec58afed097e3332356dc994ae85,2023-11-21T03:01:46.133000
|
||||||
CVE-2023-47127,0,0,3b142b710453a1850b566c196150901604dda76b0ed8a77543fe3542a15724c1,2023-11-21T03:05:46.807000
|
CVE-2023-47127,0,0,3b142b710453a1850b566c196150901604dda76b0ed8a77543fe3542a15724c1,2023-11-21T03:05:46.807000
|
||||||
@ -237673,7 +237673,7 @@ CVE-2023-49948,0,0,622d9877751c0fa8476e6eb6ccc5c249d44e758cb56060b3304a0ce82f6c3
|
|||||||
CVE-2023-49949,0,0,1dc65feedc7312a850dd1c1186247ca09a75a8ee1c325a4190092bc71db83437,2024-01-04T17:32:10.933000
|
CVE-2023-49949,0,0,1dc65feedc7312a850dd1c1186247ca09a75a8ee1c325a4190092bc71db83437,2024-01-04T17:32:10.933000
|
||||||
CVE-2023-4995,0,0,840d09cb8136711cfe5ecb29c665b6962cd70cccd1b93ffc2baa91d722a31a59,2023-11-07T04:23:17.390000
|
CVE-2023-4995,0,0,840d09cb8136711cfe5ecb29c665b6962cd70cccd1b93ffc2baa91d722a31a59,2023-11-07T04:23:17.390000
|
||||||
CVE-2023-49950,0,0,66cd1b1f7e3e23c0144a8871a6842f9873670fe0ad92e9d833ed9c626bc2d8ee,2024-02-13T00:42:06.777000
|
CVE-2023-49950,0,0,66cd1b1f7e3e23c0144a8871a6842f9873670fe0ad92e9d833ed9c626bc2d8ee,2024-02-13T00:42:06.777000
|
||||||
CVE-2023-49952,0,0,92ae5f5a26ca344cd43f699ec7810925c5d2d6842777a716f253e9f544c4d788,2024-11-18T18:15:05.927000
|
CVE-2023-49952,0,1,806b4e36516a83852bafa9fc914a8a9ab7798a485a040a68320a9f650f96a56a,2024-11-19T16:35:08.620000
|
||||||
CVE-2023-49954,0,0,5f2dd99d2d2c5535eeb8bba62a2016b84ef33eebb943b9df4f5ddb0db1b1410d,2024-01-03T22:32:37.550000
|
CVE-2023-49954,0,0,5f2dd99d2d2c5535eeb8bba62a2016b84ef33eebb943b9df4f5ddb0db1b1410d,2024-01-03T22:32:37.550000
|
||||||
CVE-2023-49955,0,0,cbf9c53c0bb64b06b75bdbba368b6a283ee8d6496dcad41687ecb7908881f040,2023-12-13T15:20:11.417000
|
CVE-2023-49955,0,0,cbf9c53c0bb64b06b75bdbba368b6a283ee8d6496dcad41687ecb7908881f040,2023-12-13T15:20:11.417000
|
||||||
CVE-2023-49956,0,0,3a870fcbca81b4abff15e228414f86cd1d698ffd0c027bfafed8702887aef856,2023-12-13T15:14:46.320000
|
CVE-2023-49956,0,0,3a870fcbca81b4abff15e228414f86cd1d698ffd0c027bfafed8702887aef856,2023-12-13T15:14:46.320000
|
||||||
@ -242338,7 +242338,7 @@ CVE-2024-0782,0,0,dd227a8b469ce6630eb22142a87d0da772ecdb0285534b1bcdde3ca20e489d
|
|||||||
CVE-2024-0783,0,0,889b3aec94f8730e9264c4087d63efb1328316b4df2b41f572aa9ab243eedd51,2024-05-17T02:34:58.020000
|
CVE-2024-0783,0,0,889b3aec94f8730e9264c4087d63efb1328316b4df2b41f572aa9ab243eedd51,2024-05-17T02:34:58.020000
|
||||||
CVE-2024-0784,0,0,05fccc58af077ffcd0eb7b186f39f412c8126936ae9b879608bee8086b2c9a33,2024-05-17T02:34:58.123000
|
CVE-2024-0784,0,0,05fccc58af077ffcd0eb7b186f39f412c8126936ae9b879608bee8086b2c9a33,2024-05-17T02:34:58.123000
|
||||||
CVE-2024-0786,0,0,09a89f715683ba83fe81b0a3f3fbdcf9cf5cb4fbf3001ded7457bfdf3b510a57,2024-02-28T14:06:45.783000
|
CVE-2024-0786,0,0,09a89f715683ba83fe81b0a3f3fbdcf9cf5cb4fbf3001ded7457bfdf3b510a57,2024-02-28T14:06:45.783000
|
||||||
CVE-2024-0787,0,0,da307c985a5d2f7277ca10e0fa3477284443893dbdb87e2624f6bc584ee82d36,2024-11-15T19:35:04.380000
|
CVE-2024-0787,0,1,5c62152a41f236ad30ca32437df7edb5ed362f38d739b75ff3f17e0cda84776c,2024-11-19T15:53:59.093000
|
||||||
CVE-2024-0788,0,0,77f61568ad57c437194aa13eed7b7f4a244f0c473b6deae4d7ecf1e9a4375c8f,2024-09-05T23:15:11.527000
|
CVE-2024-0788,0,0,77f61568ad57c437194aa13eed7b7f4a244f0c473b6deae4d7ecf1e9a4375c8f,2024-09-05T23:15:11.527000
|
||||||
CVE-2024-0789,0,0,dd4dfae2cf9c1e14c885c435e4946684b1e28fce4e56958a0b475f730b1ce5ce,2024-06-20T12:44:01.637000
|
CVE-2024-0789,0,0,dd4dfae2cf9c1e14c885c435e4946684b1e28fce4e56958a0b475f730b1ce5ce,2024-06-20T12:44:01.637000
|
||||||
CVE-2024-0790,0,0,faf5037c158d063c7d3783eeaaf8baa8e520d90b8a2f56f0b34167c00c86529b,2024-02-13T19:42:38.757000
|
CVE-2024-0790,0,0,faf5037c158d063c7d3783eeaaf8baa8e520d90b8a2f56f0b34167c00c86529b,2024-02-13T19:42:38.757000
|
||||||
@ -242421,7 +242421,7 @@ CVE-2024-0871,0,0,2a81c9221f676df23b70ee25b96f92b79bd7fe2d47d83d3cf9575aeab8537e
|
|||||||
CVE-2024-0872,0,0,59570f703919134c83976c0a589bd002a09343b74061ad8cfeb778f494366fb8,2024-04-10T13:24:00.070000
|
CVE-2024-0872,0,0,59570f703919134c83976c0a589bd002a09343b74061ad8cfeb778f494366fb8,2024-04-10T13:24:00.070000
|
||||||
CVE-2024-0873,0,0,0d017532f0822fb01a43bd5a5b6fb8ed2d6c3075b76ac0b6436fcb6d890c9423,2024-04-10T13:24:00.070000
|
CVE-2024-0873,0,0,0d017532f0822fb01a43bd5a5b6fb8ed2d6c3075b76ac0b6436fcb6d890c9423,2024-04-10T13:24:00.070000
|
||||||
CVE-2024-0874,0,0,e6fb28781735bc896300880a10982c06b4a0d863ac3f7c9c0e53997a057bc6f4,2024-09-11T22:15:01.933000
|
CVE-2024-0874,0,0,e6fb28781735bc896300880a10982c06b4a0d863ac3f7c9c0e53997a057bc6f4,2024-09-11T22:15:01.933000
|
||||||
CVE-2024-0875,0,0,f31e002a29f537e711f752e183aa6bbd3c25ff8a3c9b2ab0e1449dedd6211068,2024-11-15T13:58:08.913000
|
CVE-2024-0875,0,1,acff56f9908f520ef0b16f4218d127878a4eb6d2a097c3731d535db49d9d57ab,2024-11-19T16:03:56.163000
|
||||||
CVE-2024-0879,0,0,40ca4d922e04a74721c93cda9d6ef307a09b39f845db5f9dd6db6b694e034cf2,2024-01-31T19:16:07.630000
|
CVE-2024-0879,0,0,40ca4d922e04a74721c93cda9d6ef307a09b39f845db5f9dd6db6b694e034cf2,2024-01-31T19:16:07.630000
|
||||||
CVE-2024-0880,0,0,44431bf4f01e73978bc2a282db63f61857269e71b91d3e3d902140e76c6dd1ce,2024-05-17T02:35:00.317000
|
CVE-2024-0880,0,0,44431bf4f01e73978bc2a282db63f61857269e71b91d3e3d902140e76c6dd1ce,2024-05-17T02:35:00.317000
|
||||||
CVE-2024-0881,0,0,1252bf71170a54b7a474d354bacf2afe464c57991281e1919b7ffd68baf1e1ed,2024-10-31T15:35:20.223000
|
CVE-2024-0881,0,0,1252bf71170a54b7a474d354bacf2afe464c57991281e1919b7ffd68baf1e1ed,2024-10-31T15:35:20.223000
|
||||||
@ -242602,7 +242602,7 @@ CVE-2024-10099,0,0,f14bdb99d2ca7956ea9400330266332303014dc510bc6e629dc22733e615a
|
|||||||
CVE-2024-1010,0,0,b9c2292e551f86bb732084025c958f6307d4b05614efbc31206ace678efe61b8,2024-05-17T02:35:09.883000
|
CVE-2024-1010,0,0,b9c2292e551f86bb732084025c958f6307d4b05614efbc31206ace678efe61b8,2024-05-17T02:35:09.883000
|
||||||
CVE-2024-10100,0,0,f9d8653b0b809755807a27c91859fa59733e823c9baf33fbd9ba6460baccb9d4,2024-11-04T19:15:05.297000
|
CVE-2024-10100,0,0,f9d8653b0b809755807a27c91859fa59733e823c9baf33fbd9ba6460baccb9d4,2024-11-04T19:15:05.297000
|
||||||
CVE-2024-10101,0,0,e3896c5d7db68c5b786b00b58edff142c65dff97c0f85c49d64d1701e59c4a4a,2024-11-04T19:15:05.527000
|
CVE-2024-10101,0,0,e3896c5d7db68c5b786b00b58edff142c65dff97c0f85c49d64d1701e59c4a4a,2024-11-04T19:15:05.527000
|
||||||
CVE-2024-10103,0,0,4259a45e1665318ed535f7305838a4cb3abef1b7dc3496a387dfd27ceff4334f,2024-11-19T06:15:17.740000
|
CVE-2024-10103,0,1,0779f9ce417e1d0612538deec42aafb8bf2624fcb68250e57738659111623c27,2024-11-19T15:35:04.260000
|
||||||
CVE-2024-10104,0,0,72cf69759458c44313ae635dcdff8a669fdc4ab81a7522ae21a712b6681cb93c,2024-11-15T19:35:04.683000
|
CVE-2024-10104,0,0,72cf69759458c44313ae635dcdff8a669fdc4ab81a7522ae21a712b6681cb93c,2024-11-15T19:35:04.683000
|
||||||
CVE-2024-10108,0,0,f3f4ad009417795f18debc95373d890db3250e635fff4006fa4ef1bc9580626c,2024-11-01T12:57:03.417000
|
CVE-2024-10108,0,0,f3f4ad009417795f18debc95373d890db3250e635fff4006fa4ef1bc9580626c,2024-11-01T12:57:03.417000
|
||||||
CVE-2024-1011,0,0,a83b664837c33e7f0f4cec42868f7bdd93765cacc9e6b97b43804e8b07af65f2,2024-05-17T02:35:09.987000
|
CVE-2024-1011,0,0,a83b664837c33e7f0f4cec42868f7bdd93765cacc9e6b97b43804e8b07af65f2,2024-05-17T02:35:09.987000
|
||||||
@ -242688,7 +242688,7 @@ CVE-2024-10200,0,0,79b6885d13f32a07bf1c1b28ed40296846ec3a4a32b1a087d30356c7c4430
|
|||||||
CVE-2024-10201,0,0,fc2d027d5ae19fe93b2c62f794fd44c91138a3ac85ba03fab3fa5acc683a119b,2024-10-24T13:56:56.503000
|
CVE-2024-10201,0,0,fc2d027d5ae19fe93b2c62f794fd44c91138a3ac85ba03fab3fa5acc683a119b,2024-10-24T13:56:56.503000
|
||||||
CVE-2024-10202,0,0,bbf4778e12a2d6f664529db53cb3cf049c2b3a3bf45111e5ee15b039098bfbd2,2024-10-24T13:55:46.110000
|
CVE-2024-10202,0,0,bbf4778e12a2d6f664529db53cb3cf049c2b3a3bf45111e5ee15b039098bfbd2,2024-10-24T13:55:46.110000
|
||||||
CVE-2024-10203,0,0,2281dae8a6da10bb152783d708df85babb66d3a8b4310b54237aa5d49f660e26,2024-11-08T19:01:03.880000
|
CVE-2024-10203,0,0,2281dae8a6da10bb152783d708df85babb66d3a8b4310b54237aa5d49f660e26,2024-11-08T19:01:03.880000
|
||||||
CVE-2024-10204,1,1,2bd02e2bac83ab0ac328aa1fc70614cb2060e2635606781eb4764e16fcb43f84,2024-11-19T14:15:16.940000
|
CVE-2024-10204,0,0,2bd02e2bac83ab0ac328aa1fc70614cb2060e2635606781eb4764e16fcb43f84,2024-11-19T14:15:16.940000
|
||||||
CVE-2024-1021,0,0,89180a6ed9705fc79d8d8a15633a1cfe9e27adac2a4a623501249d49427826d0,2024-05-17T02:35:10.970000
|
CVE-2024-1021,0,0,89180a6ed9705fc79d8d8a15633a1cfe9e27adac2a4a623501249d49427826d0,2024-05-17T02:35:10.970000
|
||||||
CVE-2024-10214,0,0,f1ffbc47d38f848fe742b18a6312c0e8ed0dcf6ee0fac4acd3827be3368439e7,2024-11-05T17:03:22.953000
|
CVE-2024-10214,0,0,f1ffbc47d38f848fe742b18a6312c0e8ed0dcf6ee0fac4acd3827be3368439e7,2024-11-05T17:03:22.953000
|
||||||
CVE-2024-10217,0,0,eb6516ec82f77e9f107386542d4ffb8464a3e61001620c55c2f842dbfbb03b5d,2024-11-13T17:01:16.850000
|
CVE-2024-10217,0,0,eb6516ec82f77e9f107386542d4ffb8464a3e61001620c55c2f842dbfbb03b5d,2024-11-13T17:01:16.850000
|
||||||
@ -242810,9 +242810,9 @@ CVE-2024-10389,0,0,5c3e383a622dd2c962c1328ad97e7119997516337f3c204f5e02dea9bf077
|
|||||||
CVE-2024-1039,0,0,823ba846a6d7c1759f085b54cf23829cdbadd28135927175e007d2b5df85a6ad,2024-02-07T14:09:47.017000
|
CVE-2024-1039,0,0,823ba846a6d7c1759f085b54cf23829cdbadd28135927175e007d2b5df85a6ad,2024-02-07T14:09:47.017000
|
||||||
CVE-2024-10390,0,0,0f765d0806cdf9196d329bdcf23025ca64b02fa3979afe4c4c743c1ebcd10d41,2024-11-18T17:15:10.897000
|
CVE-2024-10390,0,0,0f765d0806cdf9196d329bdcf23025ca64b02fa3979afe4c4c743c1ebcd10d41,2024-11-18T17:15:10.897000
|
||||||
CVE-2024-10392,0,0,6e1e37299a52c0d29351f7b918b5ce63e7a851a7204714ad635a0d36b7f4f628,2024-11-01T12:57:03.417000
|
CVE-2024-10392,0,0,6e1e37299a52c0d29351f7b918b5ce63e7a851a7204714ad635a0d36b7f4f628,2024-11-01T12:57:03.417000
|
||||||
CVE-2024-10394,0,0,4035dfc5a5bcf296734e398f64f1bd6d0cad9615950c5c863b2c2a3b361b6828,2024-11-15T13:58:08.913000
|
CVE-2024-10394,0,1,02596ae06c5bb141cc27325cb3ea0b733d518188270c6208b5959c6689e0822c,2024-11-19T16:35:09.703000
|
||||||
CVE-2024-10396,0,0,eea82678934a4b6027473b74cdd3b7d449ff1d094dd2f74343b30dcc0b4b3531,2024-11-15T13:58:08.913000
|
CVE-2024-10396,0,1,23b0066c6f7cdcb293601458f22628165cc0e812b2fb044f3cb3017e9dba4c6b,2024-11-19T16:35:09.930000
|
||||||
CVE-2024-10397,0,0,641d68ac85205cf509805150d7c0a339ca6da65bef2e6ec008aeac4464cea320,2024-11-15T13:58:08.913000
|
CVE-2024-10397,0,1,374b7be741df9473f38e7b5516b7fbf0facc2b9b90e4a4d784e3697245414519,2024-11-19T16:35:10.143000
|
||||||
CVE-2024-10399,0,0,3874273dcd61d00780364abd4b80bff26291db4f2fcc766c950b26117fafe39a,2024-11-01T12:57:03.417000
|
CVE-2024-10399,0,0,3874273dcd61d00780364abd4b80bff26291db4f2fcc766c950b26117fafe39a,2024-11-01T12:57:03.417000
|
||||||
CVE-2024-1040,0,0,b32f85342f197693d2db41df3bf264f5b00d802b0a5fb12822762c63c498621d,2024-02-07T17:11:40.623000
|
CVE-2024-1040,0,0,b32f85342f197693d2db41df3bf264f5b00d802b0a5fb12822762c63c498621d,2024-02-07T17:11:40.623000
|
||||||
CVE-2024-10402,0,0,2443718b847d5ad0a7e8e6883b9aca46725ab83d65a53ced89e927dfa1ec15f4,2024-10-28T13:58:09.230000
|
CVE-2024-10402,0,0,2443718b847d5ad0a7e8e6883b9aca46725ab83d65a53ced89e927dfa1ec15f4,2024-10-28T13:58:09.230000
|
||||||
@ -242903,6 +242903,7 @@ CVE-2024-10509,0,0,a9d05e50f1563ceed5339878fa8c2329eea9e28284f4c0c86984d14b77803
|
|||||||
CVE-2024-1051,0,0,301df872c002365b13eaea34d02a8084366516306d472e0b862c9b6067f5d33d,2024-04-01T01:12:59.077000
|
CVE-2024-1051,0,0,301df872c002365b13eaea34d02a8084366516306d472e0b862c9b6067f5d33d,2024-04-01T01:12:59.077000
|
||||||
CVE-2024-1052,0,0,2826dc83bebd9032f48348a63ffd25025c2a6126abd483892ed79004a77aef0f,2024-02-15T18:49:40.180000
|
CVE-2024-1052,0,0,2826dc83bebd9032f48348a63ffd25025c2a6126abd483892ed79004a77aef0f,2024-02-15T18:49:40.180000
|
||||||
CVE-2024-10523,0,0,a761a52195ca091ecc100fefe31fd4eadda4d831fe94860e2a159923b6d0d68d,2024-11-08T15:14:30.070000
|
CVE-2024-10523,0,0,a761a52195ca091ecc100fefe31fd4eadda4d831fe94860e2a159923b6d0d68d,2024-11-08T15:14:30.070000
|
||||||
|
CVE-2024-10524,1,1,2ae4e46e57695b617ac52d594e902ce57dfaaf48b1ad264a69c7c238334e30fd,2024-11-19T15:15:06.740000
|
||||||
CVE-2024-10525,0,0,cfad79154f466fe96736eabfa65cac8f6409e21deb7f07d79c02c68ee3f19eb2,2024-11-01T12:57:03.417000
|
CVE-2024-10525,0,0,cfad79154f466fe96736eabfa65cac8f6409e21deb7f07d79c02c68ee3f19eb2,2024-11-01T12:57:03.417000
|
||||||
CVE-2024-10526,0,0,0fa46d8ccf5c219359a0535980da66887fa2b5cd7efbd75d68b15fd2b882e15b,2024-11-08T19:01:03.880000
|
CVE-2024-10526,0,0,0fa46d8ccf5c219359a0535980da66887fa2b5cd7efbd75d68b15fd2b882e15b,2024-11-08T19:01:03.880000
|
||||||
CVE-2024-10529,0,0,9539d9165463c4ef6062f503e118501e5313e51d190262ed2198af5f2a5dc85d,2024-11-18T14:59:15.043000
|
CVE-2024-10529,0,0,9539d9165463c4ef6062f503e118501e5313e51d190262ed2198af5f2a5dc85d,2024-11-18T14:59:15.043000
|
||||||
@ -242926,7 +242927,7 @@ CVE-2024-10559,0,0,f02de87419b06f79046e87a4e20909e93937f86137fa0aad3ef812234236a
|
|||||||
CVE-2024-1056,0,0,7aa227b1313326ef7e8b583bc7a3f0e84afbbd1f0f46388543b54cca53251293,2024-09-19T22:06:32.340000
|
CVE-2024-1056,0,0,7aa227b1313326ef7e8b583bc7a3f0e84afbbd1f0f46388543b54cca53251293,2024-09-19T22:06:32.340000
|
||||||
CVE-2024-10561,0,0,29b70870967a739c229fbeecbb009b70108489636df3647702a2fd1c0595a0bb,2024-11-01T20:42:12.303000
|
CVE-2024-10561,0,0,29b70870967a739c229fbeecbb009b70108489636df3647702a2fd1c0595a0bb,2024-11-01T20:42:12.303000
|
||||||
CVE-2024-1057,0,0,afa16fae44234143422d3d8f32f1ab0c34f389c2f0ebb0a7139bb0ca7e4b1769,2024-04-22T13:28:43.747000
|
CVE-2024-1057,0,0,afa16fae44234143422d3d8f32f1ab0c34f389c2f0ebb0a7139bb0ca7e4b1769,2024-04-22T13:28:43.747000
|
||||||
CVE-2024-10571,0,0,9b43d5204e096ac23dcaf641ac7bbe8cdfae64a689418deaf6fe49df30a6f4fb,2024-11-15T13:58:08.913000
|
CVE-2024-10571,0,1,764d0722def38a147b3ba290b54cc9e9aebe855b12c99828d9c801c2e02fe1a0,2024-11-19T15:46:52.187000
|
||||||
CVE-2024-10573,0,0,9063cc223ea5dcb15427b5dfc605e5a082c0cb2c41a32875a4278d827b140fe0,2024-11-01T12:57:03.417000
|
CVE-2024-10573,0,0,9063cc223ea5dcb15427b5dfc605e5a082c0cb2c41a32875a4278d827b140fe0,2024-11-01T12:57:03.417000
|
||||||
CVE-2024-10575,0,0,d60bf0a0bfff7c064a609e35a84fef721491108a3e1293beb652d4120d21f4e8,2024-11-13T17:01:16.850000
|
CVE-2024-10575,0,0,d60bf0a0bfff7c064a609e35a84fef721491108a3e1293beb652d4120d21f4e8,2024-11-13T17:01:16.850000
|
||||||
CVE-2024-10577,0,0,a22bb88e9d80100e8493f63e77c4cd5ab2a37147944c69ab526442c593c29d99,2024-11-13T17:01:16.850000
|
CVE-2024-10577,0,0,a22bb88e9d80100e8493f63e77c4cd5ab2a37147944c69ab526442c593c29d99,2024-11-13T17:01:16.850000
|
||||||
@ -243115,7 +243116,7 @@ CVE-2024-1087,0,0,9751a2fe52b8f14e0fc1c9d86ee656c42465ba61ef03201895b6c1868f5679
|
|||||||
CVE-2024-10871,0,0,68bab79b21893b436f4ab4e6d9a6ec3633c42e31b376d40213e506317551e1bb,2024-11-12T13:56:24.513000
|
CVE-2024-10871,0,0,68bab79b21893b436f4ab4e6d9a6ec3633c42e31b376d40213e506317551e1bb,2024-11-12T13:56:24.513000
|
||||||
CVE-2024-10875,0,0,f25d99b636c46f59305dd89e678091362bb421c122afe8c605690d8f28fedaa5,2024-11-18T17:11:17.393000
|
CVE-2024-10875,0,0,f25d99b636c46f59305dd89e678091362bb421c122afe8c605690d8f28fedaa5,2024-11-18T17:11:17.393000
|
||||||
CVE-2024-10876,0,0,bbf9ae62b029e2f20c90d639924bd19ca16772574bbaf6f19776b0310de3890f,2024-11-12T13:56:24.513000
|
CVE-2024-10876,0,0,bbf9ae62b029e2f20c90d639924bd19ca16772574bbaf6f19776b0310de3890f,2024-11-12T13:56:24.513000
|
||||||
CVE-2024-10877,0,0,6810956c657226900e229ce822592489c5a84819a35920ec22d1da0843174d84,2024-11-13T17:01:16.850000
|
CVE-2024-10877,0,1,301531ad65e2e5f16ea91c20f67a17c0b37faac5d5c530e39dd36f416491799c,2024-11-19T15:52:44.487000
|
||||||
CVE-2024-1088,0,0,7487e11aa2518f6cc93d89dd95a39f5c8d6e4a1b2567cf073eed09f7df78257a,2024-03-05T13:41:01.900000
|
CVE-2024-1088,0,0,7487e11aa2518f6cc93d89dd95a39f5c8d6e4a1b2567cf073eed09f7df78257a,2024-03-05T13:41:01.900000
|
||||||
CVE-2024-10882,0,0,d50cca8abf620c67a958717eb4d933afb7abd51207b4b48e13771e9f1de70410,2024-11-13T17:01:16.850000
|
CVE-2024-10882,0,0,d50cca8abf620c67a958717eb4d933afb7abd51207b4b48e13771e9f1de70410,2024-11-13T17:01:16.850000
|
||||||
CVE-2024-10883,0,0,591fb34dd03e0d1e5f0e5dcf7a5df450cfd7ed4e0c6fa74361f3a75f2590a9a6,2024-11-18T17:11:17.393000
|
CVE-2024-10883,0,0,591fb34dd03e0d1e5f0e5dcf7a5df450cfd7ed4e0c6fa74361f3a75f2590a9a6,2024-11-18T17:11:17.393000
|
||||||
@ -243135,7 +243136,7 @@ CVE-2024-10920,0,0,2cf9a2b6fa319444c301d4d5e50d2260546d202b9ce9ceed0622f32574438
|
|||||||
CVE-2024-10921,0,0,e4551a7fb6e9a47101373d83ae7e9c0677be8ee1bd96c33a43c9b04fcf7dfcf8,2024-11-15T13:58:08.913000
|
CVE-2024-10921,0,0,e4551a7fb6e9a47101373d83ae7e9c0677be8ee1bd96c33a43c9b04fcf7dfcf8,2024-11-15T13:58:08.913000
|
||||||
CVE-2024-10922,0,0,2e8ad1bbe2c22b2f860e82caba9eca723e865a4e9bffae87682e3cfa53e59e0d,2024-11-08T19:01:25.633000
|
CVE-2024-10922,0,0,2e8ad1bbe2c22b2f860e82caba9eca723e865a4e9bffae87682e3cfa53e59e0d,2024-11-08T19:01:25.633000
|
||||||
CVE-2024-10923,0,0,a52ee7279b45f6cbb4af1bcb280dc131fb026565d6c8cec2e60c88cc2adb08c1,2024-11-13T21:35:04.867000
|
CVE-2024-10923,0,0,a52ee7279b45f6cbb4af1bcb280dc131fb026565d6c8cec2e60c88cc2adb08c1,2024-11-13T21:35:04.867000
|
||||||
CVE-2024-10924,0,1,f04c8f210dbd43873edd1c965424c63b0a41e700e87767db1cdda51a1251ec4f,2024-11-19T14:15:17.187000
|
CVE-2024-10924,0,0,f04c8f210dbd43873edd1c965424c63b0a41e700e87767db1cdda51a1251ec4f,2024-11-19T14:15:17.187000
|
||||||
CVE-2024-10926,0,0,d4b8448490b176d20ac7d5dd5d9abfb0445d0f8f33211ac22e460a561e976123,2024-11-08T19:01:25.633000
|
CVE-2024-10926,0,0,d4b8448490b176d20ac7d5dd5d9abfb0445d0f8f33211ac22e460a561e976123,2024-11-08T19:01:25.633000
|
||||||
CVE-2024-10927,0,0,89d2896b297590d0b070dc2d6fc3af12d21eeade74b7d5af5a8c30243a174669,2024-11-08T19:01:25.633000
|
CVE-2024-10927,0,0,89d2896b297590d0b070dc2d6fc3af12d21eeade74b7d5af5a8c30243a174669,2024-11-08T19:01:25.633000
|
||||||
CVE-2024-10928,0,0,d7b9ae13d8f86fa638d0e1d42acef5c90ca0f7e31aac0a4c1ed2473457ce5298,2024-11-08T19:01:25.633000
|
CVE-2024-10928,0,0,d7b9ae13d8f86fa638d0e1d42acef5c90ca0f7e31aac0a4c1ed2473457ce5298,2024-11-08T19:01:25.633000
|
||||||
@ -243196,7 +243197,7 @@ CVE-2024-11020,0,0,d8da56d08b04c1b6283579c38861d54ff29b7503469ff5458753549fabf50
|
|||||||
CVE-2024-11021,0,0,5330750d11b3fde718ec5c3eb7f0a1e1a342a8ecd281acc88c611cccbde0d765,2024-11-18T19:00:03.487000
|
CVE-2024-11021,0,0,5330750d11b3fde718ec5c3eb7f0a1e1a342a8ecd281acc88c611cccbde0d765,2024-11-18T19:00:03.487000
|
||||||
CVE-2024-11023,0,0,2473f75aeae9518b2cbff4e6006b6c4d1b296463725df83234e5d555adc056df,2024-11-18T17:11:17.393000
|
CVE-2024-11023,0,0,2473f75aeae9518b2cbff4e6006b6c4d1b296463725df83234e5d555adc056df,2024-11-18T17:11:17.393000
|
||||||
CVE-2024-11026,0,0,5bad097199e56ffd1f4b7755738c2445dc243d6c7a33468e0f417dfbc0b75e4b,2024-11-12T13:56:54.483000
|
CVE-2024-11026,0,0,5bad097199e56ffd1f4b7755738c2445dc243d6c7a33468e0f417dfbc0b75e4b,2024-11-12T13:56:54.483000
|
||||||
CVE-2024-11028,0,0,a5fce876a39d3e00d472044131a8d336932258a82ff3a02e40bb7ab1cc37c8ff,2024-11-13T17:01:16.850000
|
CVE-2024-11028,0,1,048d97dceb7a67eae16e2a68b764bd9aa80522dc4afab479a09ba11fca5d2735,2024-11-19T15:38:19.023000
|
||||||
CVE-2024-1103,0,0,7224a9abc8ad2624b19754063e5e3f1dd278d487bc1541d6b3a3ae6b5907a9fc,2024-05-17T02:35:14.273000
|
CVE-2024-1103,0,0,7224a9abc8ad2624b19754063e5e3f1dd278d487bc1541d6b3a3ae6b5907a9fc,2024-05-17T02:35:14.273000
|
||||||
CVE-2024-11036,0,0,d675e5fcd86264558c8ff23727fbb64f2e24788c940b91ddfbcfc524916e3912,2024-11-19T11:15:04.343000
|
CVE-2024-11036,0,0,d675e5fcd86264558c8ff23727fbb64f2e24788c940b91ddfbcfc524916e3912,2024-11-19T11:15:04.343000
|
||||||
CVE-2024-11038,0,0,ddf495b5dae3abd8d7231b4ebe716524abcd697d9b3ee119e36ae1198ff05c5e,2024-11-19T11:15:05.683000
|
CVE-2024-11038,0,0,ddf495b5dae3abd8d7231b4ebe716524abcd697d9b3ee119e36ae1198ff05c5e,2024-11-19T11:15:05.683000
|
||||||
@ -243228,7 +243229,7 @@ CVE-2024-1107,0,0,7fae6df9cdce298be180c2cb6d3dacceb0e976e847fc87cce19a7d73f37dfe
|
|||||||
CVE-2024-11070,0,0,3b497257d1d87e8089d11256275eff956cb64bd2c8e5b58c0672dafc5015efdc,2024-11-12T13:55:21.227000
|
CVE-2024-11070,0,0,3b497257d1d87e8089d11256275eff956cb64bd2c8e5b58c0672dafc5015efdc,2024-11-12T13:55:21.227000
|
||||||
CVE-2024-11073,0,0,ef922d07a39eeb6c1fcac9a877724098fbbee23a8a49829a797889d4fd66dae6,2024-11-18T17:21:19.557000
|
CVE-2024-11073,0,0,ef922d07a39eeb6c1fcac9a877724098fbbee23a8a49829a797889d4fd66dae6,2024-11-18T17:21:19.557000
|
||||||
CVE-2024-11074,0,0,c7750b58e84d96425502da7e4796f4a1eb10b1d5fe8862bb87f009301db1cc6f,2024-11-14T19:06:54.750000
|
CVE-2024-11074,0,0,c7750b58e84d96425502da7e4796f4a1eb10b1d5fe8862bb87f009301db1cc6f,2024-11-14T19:06:54.750000
|
||||||
CVE-2024-11075,1,1,761e28be6547bbc411fda08607dcebea89c364c1988e928612231af9ea8d1c8c,2024-11-19T14:15:17.340000
|
CVE-2024-11075,0,0,761e28be6547bbc411fda08607dcebea89c364c1988e928612231af9ea8d1c8c,2024-11-19T14:15:17.340000
|
||||||
CVE-2024-11076,0,0,69ee715ef78401e705669ce150a70ba620de69a2c6f89189a55ec0bcea2e068a,2024-11-14T19:14:26.717000
|
CVE-2024-11076,0,0,69ee715ef78401e705669ce150a70ba620de69a2c6f89189a55ec0bcea2e068a,2024-11-14T19:14:26.717000
|
||||||
CVE-2024-11077,0,0,017b8d255e80754134e620d058a9d65876d81581be37ad0ebd6cdd417d3b7ba9,2024-11-14T18:57:17.743000
|
CVE-2024-11077,0,0,017b8d255e80754134e620d058a9d65876d81581be37ad0ebd6cdd417d3b7ba9,2024-11-14T18:57:17.743000
|
||||||
CVE-2024-11078,0,0,d133c6201a7de964272170f882ab0586a90d59fac96ab8e0ce223d3687fb9309,2024-11-12T13:55:21.227000
|
CVE-2024-11078,0,0,d133c6201a7de964272170f882ab0586a90d59fac96ab8e0ce223d3687fb9309,2024-11-12T13:55:21.227000
|
||||||
@ -243272,8 +243273,8 @@ CVE-2024-11138,0,0,7b0edb369e2d9df427aea00759a3991acb4ee32080a1e83cba9502f5a7a36
|
|||||||
CVE-2024-1114,0,0,4ba1cd03fbc35862ac6b2ce79da50122dd303ea22f4f4a45a352ffb5be12a8ee,2024-05-17T02:35:14.777000
|
CVE-2024-1114,0,0,4ba1cd03fbc35862ac6b2ce79da50122dd303ea22f4f4a45a352ffb5be12a8ee,2024-05-17T02:35:14.777000
|
||||||
CVE-2024-11143,0,0,96ffaa2455664e18d60b42605835ada70f7b0d6d8faec6d0bfd534d22c653ec3,2024-11-18T15:03:56.927000
|
CVE-2024-11143,0,0,96ffaa2455664e18d60b42605835ada70f7b0d6d8faec6d0bfd534d22c653ec3,2024-11-18T15:03:56.927000
|
||||||
CVE-2024-1115,0,0,4dae9d3d8bef65fab3d547368288cc3126446be18b7fc740123f9a96bd6241e2,2024-05-17T02:35:14.880000
|
CVE-2024-1115,0,0,4dae9d3d8bef65fab3d547368288cc3126446be18b7fc740123f9a96bd6241e2,2024-05-17T02:35:14.880000
|
||||||
CVE-2024-11150,0,0,3e3c713e3eaad09aa014087e1c0cf6ec0a3f52a733d6f796982bf46a36311d42,2024-11-13T17:01:16.850000
|
CVE-2024-11150,0,1,a42c681646aa4974b2ce83b0b93c5af4c26316891f1e3dd7bf6a226e6b2cf362,2024-11-19T16:57:05.407000
|
||||||
CVE-2024-11159,0,1,e73f6fc4616381942ffbf159704beae47fa0fb666e23bdbb04e5afc5533ba424,2024-11-19T14:56:37.800000
|
CVE-2024-11159,0,0,e73f6fc4616381942ffbf159704beae47fa0fb666e23bdbb04e5afc5533ba424,2024-11-19T14:56:37.800000
|
||||||
CVE-2024-1116,0,0,4196b5c71a0d802f4c1e9b3a43ac71c958f929e96b26e1ebb01241c6bd176fa3,2024-05-17T02:35:14.983000
|
CVE-2024-1116,0,0,4196b5c71a0d802f4c1e9b3a43ac71c958f929e96b26e1ebb01241c6bd176fa3,2024-05-17T02:35:14.983000
|
||||||
CVE-2024-11165,0,0,95fe2b7c203ba5cc9c6e4fb2522e665475ea40e75b68e18a56b9dddf3a00ff2f,2024-11-14T16:35:05.493000
|
CVE-2024-11165,0,0,95fe2b7c203ba5cc9c6e4fb2522e665475ea40e75b68e18a56b9dddf3a00ff2f,2024-11-14T16:35:05.493000
|
||||||
CVE-2024-11168,0,0,5e610ba56b770f0c45b8e5f1da8a18409af80ecc6fd32d397017d56ba5ace8ac,2024-11-13T17:01:16.850000
|
CVE-2024-11168,0,0,5e610ba56b770f0c45b8e5f1da8a18409af80ecc6fd32d397017d56ba5ace8ac,2024-11-13T17:01:16.850000
|
||||||
@ -243285,7 +243286,7 @@ CVE-2024-1119,0,0,5426bc48e63724893c52e881a8535fb7954cf4e6383fc287bdb9896410f7d3
|
|||||||
CVE-2024-11193,0,0,a70708fa48dd67ba3a86a48525d6b9656d6da3b4be924e80c673ce5d9c638eff,2024-11-15T14:00:09.720000
|
CVE-2024-11193,0,0,a70708fa48dd67ba3a86a48525d6b9656d6da3b4be924e80c673ce5d9c638eff,2024-11-15T14:00:09.720000
|
||||||
CVE-2024-11194,0,0,3f09cfaaf1bae0b33ce415127da993242fd0896d0d6a1bbe0499b944455ec704,2024-11-19T12:15:16.497000
|
CVE-2024-11194,0,0,3f09cfaaf1bae0b33ce415127da993242fd0896d0d6a1bbe0499b944455ec704,2024-11-19T12:15:16.497000
|
||||||
CVE-2024-11195,0,0,b0b39e8b726cf367e580b97a1acf20ddaa15e4ca546ea5a331ba03634dd94c95,2024-11-19T11:15:05.930000
|
CVE-2024-11195,0,0,b0b39e8b726cf367e580b97a1acf20ddaa15e4ca546ea5a331ba03634dd94c95,2024-11-19T11:15:05.930000
|
||||||
CVE-2024-11198,1,1,b9e7cd4a54abc30d31dfc1fb824895a4c6c40ac2f9a16df5a8050d3c2c382b13,2024-11-19T13:15:04.157000
|
CVE-2024-11198,0,0,b9e7cd4a54abc30d31dfc1fb824895a4c6c40ac2f9a16df5a8050d3c2c382b13,2024-11-19T13:15:04.157000
|
||||||
CVE-2024-1120,0,0,4ae965ad3da5f8a3235e6e58dd82dd504b21e474d229ae465351f9f2ed6318d2,2024-03-01T14:04:04.827000
|
CVE-2024-1120,0,0,4ae965ad3da5f8a3235e6e58dd82dd504b21e474d229ae465351f9f2ed6318d2,2024-03-01T14:04:04.827000
|
||||||
CVE-2024-11206,0,0,4dabdbee4189d67c14faab7077a38bbebaaf9a0412b9485b8ea9f96e93b55b84,2024-11-15T13:58:08.913000
|
CVE-2024-11206,0,0,4dabdbee4189d67c14faab7077a38bbebaaf9a0412b9485b8ea9f96e93b55b84,2024-11-15T13:58:08.913000
|
||||||
CVE-2024-11207,0,0,98c51622a761e0f4191d7b9bd2fdd9da6fc0915a6a97cca51529b9e5f809abed,2024-11-15T13:58:08.913000
|
CVE-2024-11207,0,0,98c51622a761e0f4191d7b9bd2fdd9da6fc0915a6a97cca51529b9e5f809abed,2024-11-15T13:58:08.913000
|
||||||
@ -243294,13 +243295,13 @@ CVE-2024-11209,0,0,6796931fa86300b3e2b9543bd1b280cd5b640012f3ea8899a042d616c6df0
|
|||||||
CVE-2024-1121,0,0,19a454e1b0b19f003a8998da71d81afc60a591ff2c6ec5f42743662bb8a72434,2024-02-13T19:42:57.107000
|
CVE-2024-1121,0,0,19a454e1b0b19f003a8998da71d81afc60a591ff2c6ec5f42743662bb8a72434,2024-02-13T19:42:57.107000
|
||||||
CVE-2024-11210,0,0,0cca9b9ced96b815f23a2adf405f6ef8ca2d51de736dbd61610d0077a6858d38,2024-11-15T13:58:08.913000
|
CVE-2024-11210,0,0,0cca9b9ced96b815f23a2adf405f6ef8ca2d51de736dbd61610d0077a6858d38,2024-11-15T13:58:08.913000
|
||||||
CVE-2024-11211,0,0,5a3ff1958288000dff9efbfd9636a1e83dea10099aa8993b255e34f281aec47b,2024-11-15T13:58:08.913000
|
CVE-2024-11211,0,0,5a3ff1958288000dff9efbfd9636a1e83dea10099aa8993b255e34f281aec47b,2024-11-15T13:58:08.913000
|
||||||
CVE-2024-11212,0,0,43e01b89fe14437dd38553215518a345f9b4f3c5a332d84f096e358f79ffdd19,2024-11-15T13:58:08.913000
|
CVE-2024-11212,0,1,6ce4b0d9c397a1dd5322881479267c29f70cf20d6eb3902b0d9bdaaa6e88979d,2024-11-19T15:48:22.163000
|
||||||
CVE-2024-11213,0,0,ee77e6ceb60ab1d90b798383d9261a2a203dfc92f44de28084954782c85c360a,2024-11-15T13:58:08.913000
|
CVE-2024-11213,0,1,7557f50533e93e1d9807ee94d982f4c81ae50d0d6cd07fa8bc5cfe3b5343c650,2024-11-19T15:48:58.680000
|
||||||
CVE-2024-11214,0,0,0aa99902e65dc6c03e1ca05b11000c9116be8bf762f91cf55a9d960757e4b1b5,2024-11-15T13:58:08.913000
|
CVE-2024-11214,0,1,b2fe1002cda17d5a6c6ef54ef9bdc32c337ee68abdd41ef46560fc24a9eb5fb4,2024-11-19T15:38:59.060000
|
||||||
CVE-2024-11215,0,0,fb8a71cad5204690d7fc24b1c1787d6360fda1c469df5e0270b5ef3894a4902a,2024-11-15T13:58:08.913000
|
CVE-2024-11215,0,0,fb8a71cad5204690d7fc24b1c1787d6360fda1c469df5e0270b5ef3894a4902a,2024-11-15T13:58:08.913000
|
||||||
CVE-2024-11217,0,0,5d4ed802680b391d1dbfc3e3b561791ea824d61f478d755424e831d8c9d2195c,2024-11-18T17:11:56.587000
|
CVE-2024-11217,0,0,5d4ed802680b391d1dbfc3e3b561791ea824d61f478d755424e831d8c9d2195c,2024-11-18T17:11:56.587000
|
||||||
CVE-2024-1122,0,0,0daea6a9b881beb2ea9e563443c7905c114cf68ea1093ef9f6fd6cdf2c48aad7,2024-02-15T19:17:26.630000
|
CVE-2024-1122,0,0,0daea6a9b881beb2ea9e563443c7905c114cf68ea1093ef9f6fd6cdf2c48aad7,2024-02-15T19:17:26.630000
|
||||||
CVE-2024-11224,1,1,c84c6a83be66d403219cac660dbc9e43d81813e8fb46336977cd7169ad26f887,2024-11-19T13:15:04.423000
|
CVE-2024-11224,0,0,c84c6a83be66d403219cac660dbc9e43d81813e8fb46336977cd7169ad26f887,2024-11-19T13:15:04.423000
|
||||||
CVE-2024-1123,0,0,b973e4c54de6f241a32cf221a70e04068421d86df4d000867b2228a54e55ef35,2024-03-11T01:32:39.697000
|
CVE-2024-1123,0,0,b973e4c54de6f241a32cf221a70e04068421d86df4d000867b2228a54e55ef35,2024-03-11T01:32:39.697000
|
||||||
CVE-2024-11237,0,0,14e448a6a8c58bda6358b06dade390c2a1921b884cc94a3ba12fc6ad79696644,2024-11-15T13:58:08.913000
|
CVE-2024-11237,0,0,14e448a6a8c58bda6358b06dade390c2a1921b884cc94a3ba12fc6ad79696644,2024-11-15T13:58:08.913000
|
||||||
CVE-2024-11238,0,0,5db87c5bb65e54461cba31fd593252a458b17b662806ea71f4893354fc62157d,2024-11-15T13:58:08.913000
|
CVE-2024-11238,0,0,5db87c5bb65e54461cba31fd593252a458b17b662806ea71f4893354fc62157d,2024-11-15T13:58:08.913000
|
||||||
@ -243568,7 +243569,7 @@ CVE-2024-1363,0,0,9db209eb4df171c49382deb38316e39b3051f713f9efe4f059c3f041989c42
|
|||||||
CVE-2024-1364,0,0,26eff95b5ea507fb650ff43b925604fe4570257b15b61d96a5e4f3e174924f17,2024-03-27T12:29:30.307000
|
CVE-2024-1364,0,0,26eff95b5ea507fb650ff43b925604fe4570257b15b61d96a5e4f3e174924f17,2024-03-27T12:29:30.307000
|
||||||
CVE-2024-1365,0,0,50bc65449d28e3d0be1a7988a8f321027f7e99fc40f3b41e934eae2792442067,2024-03-13T18:16:18.563000
|
CVE-2024-1365,0,0,50bc65449d28e3d0be1a7988a8f321027f7e99fc40f3b41e934eae2792442067,2024-03-13T18:16:18.563000
|
||||||
CVE-2024-1366,0,0,d6e1b0b8f1fb7fecd3c16a6e1310267bf73a3fb307e94e1c4e92cf5bf3d8ea35,2024-03-07T13:52:27.110000
|
CVE-2024-1366,0,0,d6e1b0b8f1fb7fecd3c16a6e1310267bf73a3fb307e94e1c4e92cf5bf3d8ea35,2024-03-07T13:52:27.110000
|
||||||
CVE-2024-1367,0,0,c843688aa7628264f8fd1ac837b929dd0b5161d8e34b4c9239e0860f7f7c8a91,2024-02-15T06:23:39.303000
|
CVE-2024-1367,0,1,59415fbd85ea89a386574704553c3e6b047082de8e043119c200d45389db3dc0,2024-11-19T16:06:33.410000
|
||||||
CVE-2024-1368,0,0,e542ce390f0e16cb90fcb6e519becd5b4c3df0f65910c369a949d876ea19230e,2024-02-28T14:06:45.783000
|
CVE-2024-1368,0,0,e542ce390f0e16cb90fcb6e519becd5b4c3df0f65910c369a949d876ea19230e,2024-02-28T14:06:45.783000
|
||||||
CVE-2024-1369,0,0,e597b83a7e128fca63a4bc63e17c5a8e03e91d11ad1142a6c7a845781954c329,2024-03-05T17:42:45.630000
|
CVE-2024-1369,0,0,e597b83a7e128fca63a4bc63e17c5a8e03e91d11ad1142a6c7a845781954c329,2024-03-05T17:42:45.630000
|
||||||
CVE-2024-1370,0,0,dc8f3c7ad8fc581551ff3b6afee20c00a9c2d359908d145e82ffa4dd53a816c6,2024-03-13T18:16:18.563000
|
CVE-2024-1370,0,0,dc8f3c7ad8fc581551ff3b6afee20c00a9c2d359908d145e82ffa4dd53a816c6,2024-03-13T18:16:18.563000
|
||||||
@ -243670,7 +243671,7 @@ CVE-2024-1467,0,0,658a1988a70c4c2c249e73aff8e81bcb98febc108bfc84a04dfcc277633a65
|
|||||||
CVE-2024-1468,0,0,6736dbd3e8f986f2a61b32c16ee1fe7d77d5f3969065edc19564694f74a8dd1c,2024-02-29T13:49:29.390000
|
CVE-2024-1468,0,0,6736dbd3e8f986f2a61b32c16ee1fe7d77d5f3969065edc19564694f74a8dd1c,2024-02-29T13:49:29.390000
|
||||||
CVE-2024-1469,0,0,590671307a558ec03a593a57d055ca4159f61cbf1591b1c2a815f487ae5ee472,2024-06-17T15:15:50.463000
|
CVE-2024-1469,0,0,590671307a558ec03a593a57d055ca4159f61cbf1591b1c2a815f487ae5ee472,2024-06-17T15:15:50.463000
|
||||||
CVE-2024-1470,0,0,954feb69ba8d0981ae24b05afe2cd99dd03e28a9adc0df6bbf32dcb18e2cae18,2024-02-29T13:49:29.390000
|
CVE-2024-1470,0,0,954feb69ba8d0981ae24b05afe2cd99dd03e28a9adc0df6bbf32dcb18e2cae18,2024-02-29T13:49:29.390000
|
||||||
CVE-2024-1471,0,0,1e2e5a926ecc5bcb54d6ca4c3f80c573f83e6b4f782fd9e139b3dba630d49b5e,2024-02-15T06:23:39.303000
|
CVE-2024-1471,0,1,b3e3fd9ad8f5cfb98b02c9d6bced741169ca97c23c127fb5f8acbbaa8cdb3830,2024-11-19T16:05:53.247000
|
||||||
CVE-2024-1472,0,0,43e3213a7fac5988f5375dba8e6f873d7b2f32f63bebde8773195c4d00c61a87,2024-02-29T13:49:29.390000
|
CVE-2024-1472,0,0,43e3213a7fac5988f5375dba8e6f873d7b2f32f63bebde8773195c4d00c61a87,2024-02-29T13:49:29.390000
|
||||||
CVE-2024-1473,0,0,b115ab76e1a21554af0fe82f30b4d6e4829d0a4cae1d3a6bf6221ec5e7521abe,2024-03-20T13:00:16.367000
|
CVE-2024-1473,0,0,b115ab76e1a21554af0fe82f30b4d6e4829d0a4cae1d3a6bf6221ec5e7521abe,2024-03-20T13:00:16.367000
|
||||||
CVE-2024-1474,0,0,04a26a5a9be86f78a72e8b434bae250f7f09eec589916415d8e90a0a06af86fd,2024-02-22T19:07:27.197000
|
CVE-2024-1474,0,0,04a26a5a9be86f78a72e8b434bae250f7f09eec589916415d8e90a0a06af86fd,2024-02-22T19:07:27.197000
|
||||||
@ -245267,7 +245268,7 @@ CVE-2024-21283,0,0,0ddbb462ca0821dacd37d3533c526ba14fd88aa793b081385070a77512efd
|
|||||||
CVE-2024-21284,0,0,b26beb8928847ddda7596ad1b5456aaf9e461763a25565fb76df745f1499af72,2024-10-18T16:45:58.217000
|
CVE-2024-21284,0,0,b26beb8928847ddda7596ad1b5456aaf9e461763a25565fb76df745f1499af72,2024-10-18T16:45:58.217000
|
||||||
CVE-2024-21285,0,0,94befa20d99f1e44a7a6e1443028684d2864251495f642087aa70fa909cebf20,2024-10-18T16:46:27.283000
|
CVE-2024-21285,0,0,94befa20d99f1e44a7a6e1443028684d2864251495f642087aa70fa909cebf20,2024-10-18T16:46:27.283000
|
||||||
CVE-2024-21286,0,0,165be3dcf0a6405bd236710f2cf171c0d7219a16c20a273c1cdda02d4e5f4acd,2024-10-21T16:16:31.867000
|
CVE-2024-21286,0,0,165be3dcf0a6405bd236710f2cf171c0d7219a16c20a273c1cdda02d4e5f4acd,2024-10-21T16:16:31.867000
|
||||||
CVE-2024-21287,0,0,c0c228f1b41d08b35e1096b06e55b7c2e1cf9802800b27b583054d70577a0ad7,2024-11-18T22:15:05.897000
|
CVE-2024-21287,0,1,495a874900a5a5c31155b9956eaadb0baf8bbd7a2bf3ddae25a960bfa10fd0ae,2024-11-19T16:35:10.963000
|
||||||
CVE-2024-2129,0,0,5f52407743c1f969b3fa77917deda7339874ee16ffe5a9c10d3a77b843fb1d95,2024-03-20T13:00:16.367000
|
CVE-2024-2129,0,0,5f52407743c1f969b3fa77917deda7339874ee16ffe5a9c10d3a77b843fb1d95,2024-03-20T13:00:16.367000
|
||||||
CVE-2024-2130,0,0,949f4490e30f20ac86b94271cd74ebfff8857dc5306a19f843591857ffe5e5d6,2024-03-13T12:33:51.697000
|
CVE-2024-2130,0,0,949f4490e30f20ac86b94271cd74ebfff8857dc5306a19f843591857ffe5e5d6,2024-03-13T12:33:51.697000
|
||||||
CVE-2024-21302,0,0,7f391d893a5dfcd3f80503750e1f19b379a4e74727dc288c2f0c00e1775f3cc9,2024-09-18T00:15:03.243000
|
CVE-2024-21302,0,0,7f391d893a5dfcd3f80503750e1f19b379a4e74727dc288c2f0c00e1775f3cc9,2024-09-18T00:15:03.243000
|
||||||
@ -245524,11 +245525,11 @@ CVE-2024-21534,0,0,9ac533dcca689f9e7455af7cbf2332420a35c484bd84c22299ec85a68ccdc
|
|||||||
CVE-2024-21535,0,0,2e7744380a1db7060122e5ae23002590579ae07efcc1f1beb06e6a3a8350e174,2024-10-17T20:36:29.213000
|
CVE-2024-21535,0,0,2e7744380a1db7060122e5ae23002590579ae07efcc1f1beb06e6a3a8350e174,2024-10-17T20:36:29.213000
|
||||||
CVE-2024-21536,0,0,4f914cfe6666bcd465a58ac4926a267d85d3e48bad9af0623e3ff24aeb06f5b5,2024-11-01T18:03:15.897000
|
CVE-2024-21536,0,0,4f914cfe6666bcd465a58ac4926a267d85d3e48bad9af0623e3ff24aeb06f5b5,2024-11-01T18:03:15.897000
|
||||||
CVE-2024-21537,0,0,b5c780dab93a9075b9d24d6af4e9f73fa194b201a9c6953f660e67892e16f17b,2024-11-01T12:57:03.417000
|
CVE-2024-21537,0,0,b5c780dab93a9075b9d24d6af4e9f73fa194b201a9c6953f660e67892e16f17b,2024-11-01T12:57:03.417000
|
||||||
CVE-2024-21538,0,1,5afe4e6e1afdfc45cdb7e871efdb22a4d29e294c97100d961be6f2afaeab3910,2024-11-19T14:15:17.627000
|
CVE-2024-21538,0,0,5afe4e6e1afdfc45cdb7e871efdb22a4d29e294c97100d961be6f2afaeab3910,2024-11-19T14:15:17.627000
|
||||||
CVE-2024-21539,0,0,dfd9359e0c564c537268368db999f7713955785d7a4a9df91fee71b6b45e0530,2024-11-19T05:15:16.453000
|
CVE-2024-21539,0,1,6e973ff02bdbb328246a5c9d86e2da2310b9429f874babc62cf389af92218fe1,2024-11-19T16:35:11.720000
|
||||||
CVE-2024-2154,0,0,ab5f0b39bb38e5c25606bad964d563e0edda059ff34db22b99ca2b3670b021ff,2024-05-17T02:38:04.970000
|
CVE-2024-2154,0,0,ab5f0b39bb38e5c25606bad964d563e0edda059ff34db22b99ca2b3670b021ff,2024-05-17T02:38:04.970000
|
||||||
CVE-2024-21540,0,0,ca361900c1eaa9a3b1242a94b8aed82eaba7c8170c10a4efa35cbfaad6b1984c,2024-11-17T09:15:11.853000
|
CVE-2024-21540,0,0,ca361900c1eaa9a3b1242a94b8aed82eaba7c8170c10a4efa35cbfaad6b1984c,2024-11-17T09:15:11.853000
|
||||||
CVE-2024-21541,0,0,373acd5e14ddf4ee5ebb476557660e01f865be6144d1960555899268f402376b,2024-11-13T17:01:16.850000
|
CVE-2024-21541,0,1,d3f24a0e2c0487bfb682166662f1d43caa2aa65e691edaab80c8e424809bc2c0,2024-11-19T16:20:37.887000
|
||||||
CVE-2024-21545,0,0,614ed901d7a98204a096c9331020afa9e58729de6a0c722ccca7898674ea9a4d,2024-09-26T13:32:02.803000
|
CVE-2024-21545,0,0,614ed901d7a98204a096c9331020afa9e58729de6a0c722ccca7898674ea9a4d,2024-09-26T13:32:02.803000
|
||||||
CVE-2024-2155,0,0,499612150b3a1be829ef430bb3388eb54a55d7bb52271f37f2a76ceb8af6c56f,2024-05-17T02:38:05.063000
|
CVE-2024-2155,0,0,499612150b3a1be829ef430bb3388eb54a55d7bb52271f37f2a76ceb8af6c56f,2024-05-17T02:38:05.063000
|
||||||
CVE-2024-21550,0,0,0a53a3a179cb6ecaf9ed04811bdf34ec295d6a8521b7681bf2ba3945e955d773,2024-08-13T17:33:13.537000
|
CVE-2024-21550,0,0,0a53a3a179cb6ecaf9ed04811bdf34ec295d6a8521b7681bf2ba3945e955d773,2024-08-13T17:33:13.537000
|
||||||
@ -247074,7 +247075,7 @@ CVE-2024-23710,0,0,bd7284af235de5db2fd51076f2026e0e8319c2a15e9eab609541ac6fe582c
|
|||||||
CVE-2024-23711,0,0,3b2f25c3bfdf9a198d84e7ce79a3c5bc71465fc8bd3a9e12aa99c3c94a4d9db4,2024-07-11T15:05:25.990000
|
CVE-2024-23711,0,0,3b2f25c3bfdf9a198d84e7ce79a3c5bc71465fc8bd3a9e12aa99c3c94a4d9db4,2024-07-11T15:05:25.990000
|
||||||
CVE-2024-23712,0,0,99a9a0e98f6ec74442cc23ab4a592b5612be30e655f849926f8cbd43d464cc6c,2024-07-03T01:48:04.970000
|
CVE-2024-23712,0,0,99a9a0e98f6ec74442cc23ab4a592b5612be30e655f849926f8cbd43d464cc6c,2024-07-03T01:48:04.970000
|
||||||
CVE-2024-23713,0,0,84ac23a9c686e595929bab4dad7b08bca80d94f5a0dad54d418e0bd955964876,2024-07-03T01:48:05.220000
|
CVE-2024-23713,0,0,84ac23a9c686e595929bab4dad7b08bca80d94f5a0dad54d418e0bd955964876,2024-07-03T01:48:05.220000
|
||||||
CVE-2024-23715,0,1,f67a9429a60abeb20fbda725bf24d3fceb209a0fb34d3921cfadf385f0000ac6,2024-11-19T14:03:09.400000
|
CVE-2024-23715,0,0,f67a9429a60abeb20fbda725bf24d3fceb209a0fb34d3921cfadf385f0000ac6,2024-11-19T14:03:09.400000
|
||||||
CVE-2024-23716,0,0,72aa4692fe36e515631363961ebc214b187f38d11478c60001fc03eecbbbe02e,2024-09-12T14:35:11.523000
|
CVE-2024-23716,0,0,72aa4692fe36e515631363961ebc214b187f38d11478c60001fc03eecbbbe02e,2024-09-12T14:35:11.523000
|
||||||
CVE-2024-23717,0,0,6ae2f39818716426e507c7fefae1ead3e28d18b5fd2ac50fedfcf5c736aa3969,2024-08-16T19:35:03.877000
|
CVE-2024-23717,0,0,6ae2f39818716426e507c7fefae1ead3e28d18b5fd2ac50fedfcf5c736aa3969,2024-08-16T19:35:03.877000
|
||||||
CVE-2024-23721,0,0,738ea0fe142701915583cf528173779941e7a1ec154f74c48132f1439081fb4a,2024-08-28T15:35:15.520000
|
CVE-2024-23721,0,0,738ea0fe142701915583cf528173779941e7a1ec154f74c48132f1439081fb4a,2024-08-28T15:35:15.520000
|
||||||
@ -252499,7 +252500,7 @@ CVE-2024-31138,0,0,e862c1086da58a416fbb8daccc103d417726a0d0d62aa3907b1f09b19f01b
|
|||||||
CVE-2024-31139,0,0,1f981793bc0ffd1f30ec0eaae2f049959f8e2058241da40737858920eb14a44c,2024-03-28T16:07:30.893000
|
CVE-2024-31139,0,0,1f981793bc0ffd1f30ec0eaae2f049959f8e2058241da40737858920eb14a44c,2024-03-28T16:07:30.893000
|
||||||
CVE-2024-3114,0,0,438316d71fe40cf2421f9ff6deaed7eac6b8aea65c739d1fa5d800504a4d2afd,2024-08-30T14:15:15.937000
|
CVE-2024-3114,0,0,438316d71fe40cf2421f9ff6deaed7eac6b8aea65c739d1fa5d800504a4d2afd,2024-08-30T14:15:15.937000
|
||||||
CVE-2024-31140,0,0,1880c35ac5ba5af45eb21413401eeeaab09be8abf223654f6041d65ff3324893,2024-03-28T16:07:30.893000
|
CVE-2024-31140,0,0,1880c35ac5ba5af45eb21413401eeeaab09be8abf223654f6041d65ff3324893,2024-03-28T16:07:30.893000
|
||||||
CVE-2024-31141,0,0,3f5ae6ea2a40e1292ebb16ade810fc49e7d2222b4096163adbac20123bd74902,2024-11-19T09:15:03.860000
|
CVE-2024-31141,0,1,f4d8cb347af72e170cf1c8a4ea5301ad80d39e377be2406a234c38a203f3a7e1,2024-11-19T15:35:06.263000
|
||||||
CVE-2024-31142,0,0,79f9844398996d5cb9999387049c1b1a171c758196287f587729d5ce656d252f,2024-05-16T15:44:44.683000
|
CVE-2024-31142,0,0,79f9844398996d5cb9999387049c1b1a171c758196287f587729d5ce656d252f,2024-05-16T15:44:44.683000
|
||||||
CVE-2024-31143,0,0,1f98a77fde40be218a5d12e6b00af8f536e83110a5110bb36201081d2e6f449f,2024-08-21T14:35:09.100000
|
CVE-2024-31143,0,0,1f98a77fde40be218a5d12e6b00af8f536e83110a5110bb36201081d2e6f449f,2024-08-21T14:35:09.100000
|
||||||
CVE-2024-31145,0,0,e7458273a6fceef9fb559ad713e774e4312c2d3910ffc413a934edb45195e865,2024-09-26T13:32:02.803000
|
CVE-2024-31145,0,0,e7458273a6fceef9fb559ad713e774e4312c2d3910ffc413a934edb45195e865,2024-09-26T13:32:02.803000
|
||||||
@ -254093,7 +254094,7 @@ CVE-2024-33226,0,0,118644c9a4526f22ebac7f7b4738b46fc0e07956b270365957b518f88d5f0
|
|||||||
CVE-2024-33227,0,0,7642d7b0dea4438aa6cf20447aa6ccfb5a37e8289abc2e50d39a48026159e609,2024-08-21T21:35:06.933000
|
CVE-2024-33227,0,0,7642d7b0dea4438aa6cf20447aa6ccfb5a37e8289abc2e50d39a48026159e609,2024-08-21T21:35:06.933000
|
||||||
CVE-2024-33228,0,0,85cdbd71550aee88b5f9d8549e2c2f09f274676ddc09487eba7cc0a4fad357e8,2024-08-15T15:35:10.277000
|
CVE-2024-33228,0,0,85cdbd71550aee88b5f9d8549e2c2f09f274676ddc09487eba7cc0a4fad357e8,2024-08-15T15:35:10.277000
|
||||||
CVE-2024-3323,0,0,35a6027c28bfec2d03f21e8dc2fb44053ba20d6734735309aeaba44e533a0061,2024-07-03T02:06:09.693000
|
CVE-2024-3323,0,0,35a6027c28bfec2d03f21e8dc2fb44053ba20d6734735309aeaba44e533a0061,2024-07-03T02:06:09.693000
|
||||||
CVE-2024-33231,0,0,74936ae5cbba0f7bb9fdc05b3207e557a61870571e9bb2181297c5960d574f1b,2024-11-18T23:15:04.783000
|
CVE-2024-33231,0,1,3e19f3c1f5ccfc7d8e08ced5ac486f06149ce606b1fd2134075163429cca987e,2024-11-19T15:35:06.980000
|
||||||
CVE-2024-33247,0,0,40a5fef5b7dc3488c3170d87b3d0b3fdeccf50a4efd249dd8f1c8814c02594a3,2024-04-25T13:18:02.660000
|
CVE-2024-33247,0,0,40a5fef5b7dc3488c3170d87b3d0b3fdeccf50a4efd249dd8f1c8814c02594a3,2024-04-25T13:18:02.660000
|
||||||
CVE-2024-3325,0,0,eba92195eac782e585c88625ca97b48ddac98c797259bb726a1fc19af0b8d9a8,2024-07-12T16:11:57.460000
|
CVE-2024-3325,0,0,eba92195eac782e585c88625ca97b48ddac98c797259bb726a1fc19af0b8d9a8,2024-07-12T16:11:57.460000
|
||||||
CVE-2024-33250,0,0,b9c4a2bf1fe2b649998281997c3158803cce2200d868ae2afbc03c684a35b009,2024-11-07T00:35:02.163000
|
CVE-2024-33250,0,0,b9c4a2bf1fe2b649998281997c3158803cce2200d868ae2afbc03c684a35b009,2024-11-07T00:35:02.163000
|
||||||
@ -262014,7 +262015,7 @@ CVE-2024-44202,0,0,e17cdcd52ced4944b3cb8ebf1e0107ecaca0e3b137318260a8309f5868dfd
|
|||||||
CVE-2024-44203,0,0,d685507fc8926f060ae77c21f2129dbfe240728483f567355a65325496f5f164,2024-10-31T14:08:10.090000
|
CVE-2024-44203,0,0,d685507fc8926f060ae77c21f2129dbfe240728483f567355a65325496f5f164,2024-10-31T14:08:10.090000
|
||||||
CVE-2024-44204,0,0,cce14eca29e64799e75cbb56577d73ec78ca9f1623008c609fe84631f2fc2cc3,2024-10-04T17:29:54.933000
|
CVE-2024-44204,0,0,cce14eca29e64799e75cbb56577d73ec78ca9f1623008c609fe84631f2fc2cc3,2024-10-04T17:29:54.933000
|
||||||
CVE-2024-44205,0,0,89e79a6b18bf86e5c6fe07ffb754b6a30f0a4b722301be4dfe77863fc3ec3818,2024-11-05T22:35:09.383000
|
CVE-2024-44205,0,0,89e79a6b18bf86e5c6fe07ffb754b6a30f0a4b722301be4dfe77863fc3ec3818,2024-11-05T22:35:09.383000
|
||||||
CVE-2024-44206,0,1,decc7a643b8a2098ec3c807c883f42411d858ab45b0846bdf8377857f89c0036,2024-11-19T13:47:18.787000
|
CVE-2024-44206,0,0,decc7a643b8a2098ec3c807c883f42411d858ab45b0846bdf8377857f89c0036,2024-11-19T13:47:18.787000
|
||||||
CVE-2024-44207,0,0,5abea1005e83abb1bfbb6f81a0f39beb744ed23d2413d7dffd0c9fbaec188a46,2024-10-04T17:31:41.970000
|
CVE-2024-44207,0,0,5abea1005e83abb1bfbb6f81a0f39beb744ed23d2413d7dffd0c9fbaec188a46,2024-10-04T17:31:41.970000
|
||||||
CVE-2024-44208,0,0,4d7aa9405d343d17597bfad70ff83a926fbd31054b5ebc02d6d462dcb9f00027,2024-10-30T19:35:18.340000
|
CVE-2024-44208,0,0,4d7aa9405d343d17597bfad70ff83a926fbd31054b5ebc02d6d462dcb9f00027,2024-10-30T19:35:18.340000
|
||||||
CVE-2024-44213,0,0,c6cff758bc03ecbfd99946547b6f803038e23fd3515589348ba94d44f5467231,2024-10-30T19:35:19.187000
|
CVE-2024-44213,0,0,c6cff758bc03ecbfd99946547b6f803038e23fd3515589348ba94d44f5467231,2024-10-30T19:35:19.187000
|
||||||
@ -263670,7 +263671,7 @@ CVE-2024-47195,0,0,13778db546c78cfe27d2d127a511510e1d599b625eb31f21fc4e65992e212
|
|||||||
CVE-2024-47196,0,0,854c9d23e22c82e5339f8a331c929fb519fa43506b02445ee87a1d94228daed1,2024-10-16T18:07:38.850000
|
CVE-2024-47196,0,0,854c9d23e22c82e5339f8a331c929fb519fa43506b02445ee87a1d94228daed1,2024-10-16T18:07:38.850000
|
||||||
CVE-2024-47197,0,0,e4a1d8789bd0c967523f7418fe544ba10b0b511b96a39b8a241e5a1afb5230b4,2024-10-02T17:25:36.990000
|
CVE-2024-47197,0,0,e4a1d8789bd0c967523f7418fe544ba10b0b511b96a39b8a241e5a1afb5230b4,2024-10-02T17:25:36.990000
|
||||||
CVE-2024-4720,0,0,eb5b6c06efbc2e8e5b700d46905e09781ba603e4dc4e18ff8664640e85fa6762,2024-06-04T19:20:47.440000
|
CVE-2024-4720,0,0,eb5b6c06efbc2e8e5b700d46905e09781ba603e4dc4e18ff8664640e85fa6762,2024-06-04T19:20:47.440000
|
||||||
CVE-2024-47208,0,0,6115ccff310bcba51176654c87cc93aecc95cc99df2dad8188699f844a319269,2024-11-18T17:11:17.393000
|
CVE-2024-47208,0,1,238739b0baf2019e9540adcd5c9e66ecdc3f88b8bf18ae31375334ae76ed08a1,2024-11-19T15:35:09.570000
|
||||||
CVE-2024-4721,0,0,58190a4c7e114543454f0451ab9386f5b2fe1b56ab67d3c8b011dbecb251f4fd,2024-05-17T02:40:34.750000
|
CVE-2024-4721,0,0,58190a4c7e114543454f0451ab9386f5b2fe1b56ab67d3c8b011dbecb251f4fd,2024-05-17T02:40:34.750000
|
||||||
CVE-2024-47210,0,0,ca2b900fbd9eb194b293e1ce40d6ad1fe1c427789838eaeabb19878edb5f2c77,2024-09-26T13:32:55.343000
|
CVE-2024-47210,0,0,ca2b900fbd9eb194b293e1ce40d6ad1fe1c427789838eaeabb19878edb5f2c77,2024-09-26T13:32:55.343000
|
||||||
CVE-2024-47211,0,0,8d8dc13d8cf35ee447487a09511da084431dcb4b69bd4c3291b15cb655fdb03c,2024-11-05T15:35:15.623000
|
CVE-2024-47211,0,0,8d8dc13d8cf35ee447487a09511da084431dcb4b69bd4c3291b15cb655fdb03c,2024-11-05T15:35:15.623000
|
||||||
@ -264397,13 +264398,13 @@ CVE-2024-48279,0,0,734681838e14fea506d33d2e5cffcb45e5208b2ff1232248e90dbda0d4737
|
|||||||
CVE-2024-48280,0,0,3fccbb43adc0eac89fff4a77fa6463e9ab8591cb5e7aecf8a80efbe6484b92f9,2024-10-16T16:38:43.170000
|
CVE-2024-48280,0,0,3fccbb43adc0eac89fff4a77fa6463e9ab8591cb5e7aecf8a80efbe6484b92f9,2024-10-16T16:38:43.170000
|
||||||
CVE-2024-48282,0,0,053fa49ae9967fbc35cea64fb50742395541b443f63ba6361e4836107ed1b694,2024-10-16T16:38:43.170000
|
CVE-2024-48282,0,0,053fa49ae9967fbc35cea64fb50742395541b443f63ba6361e4836107ed1b694,2024-10-16T16:38:43.170000
|
||||||
CVE-2024-48283,0,0,c5c95d36f4cc9b3b4716d94f26715484ab471510ba26541a1f3c47bce371907e,2024-10-16T16:38:43.170000
|
CVE-2024-48283,0,0,c5c95d36f4cc9b3b4716d94f26715484ab471510ba26541a1f3c47bce371907e,2024-10-16T16:38:43.170000
|
||||||
CVE-2024-48284,0,0,29099906f5c76c6be09cef9255b3f47720bedd738e3cd24d7ed7b7e95c71290e,2024-11-18T18:35:04.410000
|
CVE-2024-48284,0,1,eb90b699830934fa3cc834b15ddaff775406850c427104902573172c28bf14d3,2024-11-19T15:45:55.450000
|
||||||
CVE-2024-48289,0,0,3c17d5bd38424fa0af920fbe41958bfb5ff6ab46e45b8d73a90e0bb1a9946e7a,2024-11-04T20:35:09.307000
|
CVE-2024-48289,0,0,3c17d5bd38424fa0af920fbe41958bfb5ff6ab46e45b8d73a90e0bb1a9946e7a,2024-11-04T20:35:09.307000
|
||||||
CVE-2024-48290,0,0,470dc7a365392aceea819604e300f16b964336068e4f6e607d709f5104e50d51,2024-11-08T19:01:03.880000
|
CVE-2024-48290,0,0,470dc7a365392aceea819604e300f16b964336068e4f6e607d709f5104e50d51,2024-11-08T19:01:03.880000
|
||||||
CVE-2024-48291,0,0,3c4533b920a9f2edb3f01b1757898b30516db1528ffb114ee1df5dcc338084ea,2024-10-29T14:34:50.257000
|
CVE-2024-48291,0,0,3c4533b920a9f2edb3f01b1757898b30516db1528ffb114ee1df5dcc338084ea,2024-10-29T14:34:50.257000
|
||||||
CVE-2024-48292,0,0,b0f0239355fa7645e28a857f954af51b7bf5af0d20814dc645fc7b82b5bda8b3,2024-11-18T18:15:06.260000
|
CVE-2024-48292,0,1,b81f051a972c777da6c01c45fe7e4e372d7f47ed85b06eedb92e94a07c9bf55f,2024-11-19T16:35:12.460000
|
||||||
CVE-2024-48293,0,0,74e42b008410124f0453f495b5d537d12a54a6ef1d7274cafa40741115b46903,2024-11-18T19:15:05.527000
|
CVE-2024-48293,0,1,346c636f987845d9516b3d14e1a953ad2277f0a1722cc8f5062479fd89b916b0,2024-11-19T16:35:13.320000
|
||||||
CVE-2024-48294,0,0,7a854c0c79778776536a1b38066dfb92c85f53c2135daf9b309d24aeeb7cf905,2024-11-18T19:15:05.590000
|
CVE-2024-48294,0,1,5d5e8f6cd5e80a4a61594965b71f34da203e325db6ddafd7a22b353bb9740057,2024-11-19T16:35:14.130000
|
||||||
CVE-2024-48307,0,0,935ee3e0328307bbb03111416c4595c4eff3ac408a08578a24f622dddb9d0c64,2024-11-01T12:57:03.417000
|
CVE-2024-48307,0,0,935ee3e0328307bbb03111416c4595c4eff3ac408a08578a24f622dddb9d0c64,2024-11-01T12:57:03.417000
|
||||||
CVE-2024-48311,0,0,354d288e073d9064d21602cf2204c79fdbedf6cf54999e8a50b7d788e057c63f,2024-11-01T12:57:03.417000
|
CVE-2024-48311,0,0,354d288e073d9064d21602cf2204c79fdbedf6cf54999e8a50b7d788e057c63f,2024-11-01T12:57:03.417000
|
||||||
CVE-2024-48312,0,0,ed565171c6e4291e871155bd5278a308c07670573cfb5e604423e67b93f19726,2024-11-06T18:17:17.287000
|
CVE-2024-48312,0,0,ed565171c6e4291e871155bd5278a308c07670573cfb5e604423e67b93f19726,2024-11-06T18:17:17.287000
|
||||||
@ -264593,7 +264594,7 @@ CVE-2024-48878,0,0,2b15f82c5be65c88d261c3882a75397babc580305d6a252ad1dbf2de5b500
|
|||||||
CVE-2024-4888,0,0,ad5e456877e6c4225b3f983ebfcea1f0af64a03667e43f1cd6a0842bed4216c0,2024-11-03T17:15:14.137000
|
CVE-2024-4888,0,0,ad5e456877e6c4225b3f983ebfcea1f0af64a03667e43f1cd6a0842bed4216c0,2024-11-03T17:15:14.137000
|
||||||
CVE-2024-4889,0,0,98c988bc305180dfde4233cdb25b83940a2a23ecd5fc7825e58f1cc0fbfe5628,2024-10-15T19:00:09.633000
|
CVE-2024-4889,0,0,98c988bc305180dfde4233cdb25b83940a2a23ecd5fc7825e58f1cc0fbfe5628,2024-10-15T19:00:09.633000
|
||||||
CVE-2024-48896,0,0,b992316378dc674c4f86c74292b7b1938dedf579a456c4b81377a2d803cc86e3,2024-11-18T17:11:17.393000
|
CVE-2024-48896,0,0,b992316378dc674c4f86c74292b7b1938dedf579a456c4b81377a2d803cc86e3,2024-11-18T17:11:17.393000
|
||||||
CVE-2024-48897,0,0,cccb8709bd8247a505b1b9368cdd4af0954cf5613e56c1df64987273881b9b0a,2024-11-18T17:11:17.393000
|
CVE-2024-48897,0,1,fb7520e1e59589ecdc201007a2560e0bbe0080044e959003906b061ba053cf71,2024-11-19T15:35:09.867000
|
||||||
CVE-2024-48898,0,0,8529d519dd40a302fbe6ba08ef52420551e621ec79dd55c48ad2c7b84db09711,2024-11-18T17:11:17.393000
|
CVE-2024-48898,0,0,8529d519dd40a302fbe6ba08ef52420551e621ec79dd55c48ad2c7b84db09711,2024-11-18T17:11:17.393000
|
||||||
CVE-2024-4890,0,0,ee7720239380ab5c638f0803999a779457a74687c16e858d2acf0798605f57a2,2024-10-10T20:11:44.610000
|
CVE-2024-4890,0,0,ee7720239380ab5c638f0803999a779457a74687c16e858d2acf0798605f57a2,2024-10-10T20:11:44.610000
|
||||||
CVE-2024-48900,0,0,2b3a5e56342c363922328f10e6f3d06b5c266c3768636276b8919e3a3cee88b7,2024-11-13T17:01:16.850000
|
CVE-2024-48900,0,0,2b3a5e56342c363922328f10e6f3d06b5c266c3768636276b8919e3a3cee88b7,2024-11-13T17:01:16.850000
|
||||||
@ -264643,7 +264644,7 @@ CVE-2024-48955,0,0,84de7be29efb285e46fc24626f552063b1e23de7f9dbbe9943b534f430e23
|
|||||||
CVE-2024-48957,0,0,73c8e1634cf56d3192b3375f11aa72eac69f0bcf8a4cb1f3b137dcc189616d8f,2024-10-11T21:36:47.930000
|
CVE-2024-48957,0,0,73c8e1634cf56d3192b3375f11aa72eac69f0bcf8a4cb1f3b137dcc189616d8f,2024-10-11T21:36:47.930000
|
||||||
CVE-2024-48958,0,0,92a426e369946b14ff79b98b6fb42dd0c692d3b7d45d68198a4072bdaadf4922,2024-10-11T21:36:48.687000
|
CVE-2024-48958,0,0,92a426e369946b14ff79b98b6fb42dd0c692d3b7d45d68198a4072bdaadf4922,2024-10-11T21:36:48.687000
|
||||||
CVE-2024-4896,0,0,20cc2dc19f323150528d4fb3a23b846b2e602fa65e075afe5dc2b86cb95d9c94,2024-05-22T12:46:53.887000
|
CVE-2024-4896,0,0,20cc2dc19f323150528d4fb3a23b846b2e602fa65e075afe5dc2b86cb95d9c94,2024-05-22T12:46:53.887000
|
||||||
CVE-2024-48962,0,0,712463568a779c1852b0a7b8be627039bb608e56bf81f6056000f8ffe081852d,2024-11-18T17:11:17.393000
|
CVE-2024-48962,0,1,14108fb7b73c0b556a184000052b7efc5bcd8ed17ac4fdb955d4d3bd57456592,2024-11-19T16:35:14.930000
|
||||||
CVE-2024-48963,0,0,6d60ed9d1e7a308212fb6ea5de6f1d94d8559909dd9cb5f4650d856671de0962,2024-10-30T14:54:53.937000
|
CVE-2024-48963,0,0,6d60ed9d1e7a308212fb6ea5de6f1d94d8559909dd9cb5f4650d856671de0962,2024-10-30T14:54:53.937000
|
||||||
CVE-2024-48964,0,0,7d209543eb23e2e6809a7e4f01bdb09a7ba8fb1b32d439bae945ab7d5b6dd3de,2024-10-30T13:46:31.657000
|
CVE-2024-48964,0,0,7d209543eb23e2e6809a7e4f01bdb09a7ba8fb1b32d439bae945ab7d5b6dd3de,2024-10-30T13:46:31.657000
|
||||||
CVE-2024-48966,0,0,6ce21af485b8f7bde854dc6fa73e4754262c2c902a98462d651b3be5a8dc03bb,2024-11-15T13:58:08.913000
|
CVE-2024-48966,0,0,6ce21af485b8f7bde854dc6fa73e4754262c2c902a98462d651b3be5a8dc03bb,2024-11-15T13:58:08.913000
|
||||||
@ -265465,17 +265466,17 @@ CVE-2024-50197,0,0,59a6be3df417d3a3c55a1bbb45af16915fd95dff36c9159ced00351e34496
|
|||||||
CVE-2024-50198,0,0,3ea33cdf4ab9bb3fd3852a87897dffcacdce0ff880fdd50c45b48b25cf5b6305,2024-11-08T19:01:03.880000
|
CVE-2024-50198,0,0,3ea33cdf4ab9bb3fd3852a87897dffcacdce0ff880fdd50c45b48b25cf5b6305,2024-11-08T19:01:03.880000
|
||||||
CVE-2024-50199,0,0,790411aeb1eb3c29f71ef981d65498f2cd8c66850ab6f2c0880f47cb2a5c0da3,2024-11-08T19:01:03.880000
|
CVE-2024-50199,0,0,790411aeb1eb3c29f71ef981d65498f2cd8c66850ab6f2c0880f47cb2a5c0da3,2024-11-08T19:01:03.880000
|
||||||
CVE-2024-50200,0,0,39818810e6a92ba66da874110ced722f11de013303f8d602e577eeb9e4e93e06,2024-11-08T19:01:03.880000
|
CVE-2024-50200,0,0,39818810e6a92ba66da874110ced722f11de013303f8d602e577eeb9e4e93e06,2024-11-08T19:01:03.880000
|
||||||
CVE-2024-50201,0,0,a9f1641fd144b1eba4040a801650258c325a92766a46c37f6972674a475d8514,2024-11-08T19:01:03.880000
|
CVE-2024-50201,0,1,09a1d2ed13abd2226e3074bd37eb9876228c60757af6992d6779c0487fabffe2,2024-11-19T16:08:36.890000
|
||||||
CVE-2024-50202,0,0,7ee70c313547ab57bdd1503c7bdb05d1942bd0b441ebd441e63c63ab1d367f12,2024-11-08T19:01:03.880000
|
CVE-2024-50202,0,1,e310c41388d08879a2605fc86ca05cc293de9a409d6751330b377d2eccd78f94,2024-11-19T16:12:17.660000
|
||||||
CVE-2024-50203,0,0,735c368a5bdd4ec913da0ec904c57517561ff23f14dfe5d0723f80de73e64d00,2024-11-08T19:01:03.880000
|
CVE-2024-50203,0,1,2f91b4b2894ee3a89f4c5832ea8c3d90b950bfef9019d1f438ff9efd649bfc10,2024-11-19T16:16:09.207000
|
||||||
CVE-2024-50204,0,0,8ef878f204e8455b525410988e0b4871dee273e6be8c26873a73200c3320a435,2024-11-08T19:01:03.880000
|
CVE-2024-50204,0,1,b2cb43281767397b3de0b3d55362f25f2a11c5d3b5f521d4589b19526f194043,2024-11-19T16:17:04.663000
|
||||||
CVE-2024-50205,0,0,a84e65dd24aa4797775474afc89933e7c6eb36aa2d99c42218f91074baf7cf00,2024-11-13T17:00:32.007000
|
CVE-2024-50205,0,0,a84e65dd24aa4797775474afc89933e7c6eb36aa2d99c42218f91074baf7cf00,2024-11-13T17:00:32.007000
|
||||||
CVE-2024-50206,0,0,fcc19a4fffbe5034be4ad713517887336a2e1957714f25908ee29435848d166c,2024-11-13T16:56:25.937000
|
CVE-2024-50206,0,0,fcc19a4fffbe5034be4ad713517887336a2e1957714f25908ee29435848d166c,2024-11-13T16:56:25.937000
|
||||||
CVE-2024-50207,0,0,893753a178b77364e97b5eecfb63ffa7b2e959169d9b0e14404fe7a60d85d8bf,2024-11-08T19:01:03.880000
|
CVE-2024-50207,0,1,ea65c3ac01cc2a6ae488dc95325391f4feba715303d472ed76a5eb1e984a9c26,2024-11-19T16:18:57.473000
|
||||||
CVE-2024-50208,0,0,f1e50c72fc138e7d85b5992c0354f8f2105f49615411e882090d07c45089dd20,2024-11-08T19:01:03.880000
|
CVE-2024-50208,0,1,aa2c754b216c301a16dd1b02b41ab3f96c7167f562327e4d2aa799b6afbd68ca,2024-11-19T16:23:48.507000
|
||||||
CVE-2024-50209,0,0,6f9fdecd174340ce3aff1a66396f0a6c7eafb8a225926b46627731165dbf5bf8,2024-11-18T19:44:46.863000
|
CVE-2024-50209,0,0,6f9fdecd174340ce3aff1a66396f0a6c7eafb8a225926b46627731165dbf5bf8,2024-11-18T19:44:46.863000
|
||||||
CVE-2024-5021,0,0,38505cbaa011793e28d7950a2ea2daf96aac6ed3db846bcaf517334c4dc7fa50,2024-06-20T12:44:01.637000
|
CVE-2024-5021,0,0,38505cbaa011793e28d7950a2ea2daf96aac6ed3db846bcaf517334c4dc7fa50,2024-06-20T12:44:01.637000
|
||||||
CVE-2024-50210,0,0,4bee68a419d5fe89f5fc6d87111cb6b0e7000f7ba8b30899a8483d5dbab39927,2024-11-08T19:01:03.880000
|
CVE-2024-50210,0,1,e89b8f73a45b5aecd785289d9a57b6a04641efc14db721c7908c0d3c0e99da00,2024-11-19T16:26:34.767000
|
||||||
CVE-2024-50211,0,0,43cec65618b913fe30d755b5206c50e632a5959377286e96ecfc817df8ba51bf,2024-11-18T19:04:51.793000
|
CVE-2024-50211,0,0,43cec65618b913fe30d755b5206c50e632a5959377286e96ecfc817df8ba51bf,2024-11-18T19:04:51.793000
|
||||||
CVE-2024-50212,0,0,befc3c4f2399c98b74eaa8ec2965db6d6768d3d3be42bd748e5e2378cdaa8f99,2024-11-12T13:56:24.513000
|
CVE-2024-50212,0,0,befc3c4f2399c98b74eaa8ec2965db6d6768d3d3be42bd748e5e2378cdaa8f99,2024-11-12T13:56:24.513000
|
||||||
CVE-2024-50213,0,0,d7da9f888c34c1dd4195bd9776c301a02d7788da5c1b9af054d3c0af657523bd,2024-11-13T17:01:12.827000
|
CVE-2024-50213,0,0,d7da9f888c34c1dd4195bd9776c301a02d7788da5c1b9af054d3c0af657523bd,2024-11-13T17:01:12.827000
|
||||||
@ -265830,7 +265831,8 @@ CVE-2024-5080,0,0,88ae00b43e12b64ab9ecc2d4c4ea1fe4d89b86d4c131aa05e4a989c5a4e3b2
|
|||||||
CVE-2024-50800,0,0,41d08e703d2d0d1bc76e1244af52877536c0238af8df7745121db1f62bee0ba9,2024-11-18T17:11:56.587000
|
CVE-2024-50800,0,0,41d08e703d2d0d1bc76e1244af52877536c0238af8df7745121db1f62bee0ba9,2024-11-18T17:11:56.587000
|
||||||
CVE-2024-50801,0,0,b02fd2a4d914f47ebf18861bef14a429b26208dd8058232ee786f89bcea879c0,2024-11-04T19:35:13.810000
|
CVE-2024-50801,0,0,b02fd2a4d914f47ebf18861bef14a429b26208dd8058232ee786f89bcea879c0,2024-11-04T19:35:13.810000
|
||||||
CVE-2024-50802,0,0,8492f5be24f5ad2918f47970062e4bc2c1c3f432ad972af1d330cb18adac5b2e,2024-11-04T19:35:14.907000
|
CVE-2024-50802,0,0,8492f5be24f5ad2918f47970062e4bc2c1c3f432ad972af1d330cb18adac5b2e,2024-11-04T19:35:14.907000
|
||||||
CVE-2024-50804,0,0,5cb9a04c08194ca4737e9d5b63684459f53a546896bac23b3da676ada88515d5,2024-11-18T21:15:06.220000
|
CVE-2024-50803,1,1,982479384cb990091ac96847a620da8db7bc088fe4c8588b46eea36a404d9a77,2024-11-19T16:15:19.840000
|
||||||
|
CVE-2024-50804,0,1,0d95f876af31515d3a13ada7121872d2819952d101c0913f9f7aeed82f96ed9c,2024-11-19T16:35:15.173000
|
||||||
CVE-2024-50808,0,0,1a667410201903fdc8230c48df98057d6516bd370b3a4500e5037005f86c9f20,2024-11-12T13:56:54.483000
|
CVE-2024-50808,0,0,1a667410201903fdc8230c48df98057d6516bd370b3a4500e5037005f86c9f20,2024-11-12T13:56:54.483000
|
||||||
CVE-2024-50809,0,0,c875db6c22acfe1e061d0cebbfeb9f3b7b26f693a5f07b91a9c5ce4621ac2b6f,2024-11-18T14:35:04.110000
|
CVE-2024-50809,0,0,c875db6c22acfe1e061d0cebbfeb9f3b7b26f693a5f07b91a9c5ce4621ac2b6f,2024-11-18T14:35:04.110000
|
||||||
CVE-2024-5081,0,0,0bebffdc717b25462ccb5a198cb29076c0fa0475011c795b0df7ab25d1acf197,2024-08-05T15:35:16.180000
|
CVE-2024-5081,0,0,0bebffdc717b25462ccb5a198cb29076c0fa0475011c795b0df7ab25d1acf197,2024-08-05T15:35:16.180000
|
||||||
@ -265860,8 +265862,8 @@ CVE-2024-50840,0,0,601608d1ca95a74cd56c0dd2a1a4b49ba28181e146695e4569128379dc5e5
|
|||||||
CVE-2024-50841,0,0,024c85eb651d2b498ef517f63a06a689ce4d3e3c9e9daff3a7c4a6f00269c068,2024-11-15T13:58:08.913000
|
CVE-2024-50841,0,0,024c85eb651d2b498ef517f63a06a689ce4d3e3c9e9daff3a7c4a6f00269c068,2024-11-15T13:58:08.913000
|
||||||
CVE-2024-50842,0,0,cd0c52715782c1f793f61b49abf65f7f712f1badfd90077c866b2e48024a0004,2024-11-15T13:58:08.913000
|
CVE-2024-50842,0,0,cd0c52715782c1f793f61b49abf65f7f712f1badfd90077c866b2e48024a0004,2024-11-15T13:58:08.913000
|
||||||
CVE-2024-50843,0,0,4477435381e6083c9119592b1603e3c4197eb68378d57b4a3fc0ce6a1344e25c,2024-11-15T13:58:08.913000
|
CVE-2024-50843,0,0,4477435381e6083c9119592b1603e3c4197eb68378d57b4a3fc0ce6a1344e25c,2024-11-15T13:58:08.913000
|
||||||
CVE-2024-50848,0,0,cdca62d1bdb7d252106654ce55fe15fc98b6360649128ac4e8c6c214d7794470,2024-11-18T21:15:06.293000
|
CVE-2024-50848,0,1,19ec8f5e8c7dbe3e796e9d3d2c4dc4800acbe8e0c94a0cab7e7897c4417ffb41,2024-11-19T15:35:10.213000
|
||||||
CVE-2024-50849,0,0,46adb909fec368fe6518477a5be24c435c71753b8ee0d41ea114b8eb3ba63618,2024-11-18T21:15:06.360000
|
CVE-2024-50849,0,1,9b3cfaab3d69cfc6e55e1bec049d0d4a544e4304cffe78b92b28cf4556499b58,2024-11-19T15:35:11.063000
|
||||||
CVE-2024-5085,0,0,6942e3068671e85a9578eddbb7240c8706dd53cd6ec5670c5d4ddd91c950a30a,2024-05-24T01:15:30.977000
|
CVE-2024-5085,0,0,6942e3068671e85a9578eddbb7240c8706dd53cd6ec5670c5d4ddd91c950a30a,2024-05-24T01:15:30.977000
|
||||||
CVE-2024-50852,0,0,64b96a730bbab5fdeb50ea2ef9d8c753a3ee332a2ced5e6155c4d6262476cb74,2024-11-14T14:38:04.837000
|
CVE-2024-50852,0,0,64b96a730bbab5fdeb50ea2ef9d8c753a3ee332a2ced5e6155c4d6262476cb74,2024-11-14T14:38:04.837000
|
||||||
CVE-2024-50853,0,0,1baed05583acd81f33e173c1b1cff8a1aa290b815790fbe2c0ede1914c1b3840,2024-11-14T14:49:16.290000
|
CVE-2024-50853,0,0,1baed05583acd81f33e173c1b1cff8a1aa290b815790fbe2c0ede1914c1b3840,2024-11-14T14:49:16.290000
|
||||||
@ -265872,7 +265874,7 @@ CVE-2024-5088,0,0,cba5e9039c2295e22c8cb155a75af3aef347c6e9813c2bf0c73f71f25ef001
|
|||||||
CVE-2024-5089,0,0,305706c4595c847ac9cbba52082727d9aefdb687316aa25305e2ea82257716b3,2024-06-06T09:15:14.897000
|
CVE-2024-5089,0,0,305706c4595c847ac9cbba52082727d9aefdb687316aa25305e2ea82257716b3,2024-06-06T09:15:14.897000
|
||||||
CVE-2024-5090,0,0,be816c3666262b2758beb88ae86bd9e45d3334ddca99a5e32c28feea44799dd8,2024-06-11T13:54:12.057000
|
CVE-2024-5090,0,0,be816c3666262b2758beb88ae86bd9e45d3334ddca99a5e32c28feea44799dd8,2024-06-11T13:54:12.057000
|
||||||
CVE-2024-5091,0,0,ebfc63df063962b42c546da9b063b838d4cc3405e8f86d8f0f4a8a37b0ebeb5c,2024-07-03T02:08:29.633000
|
CVE-2024-5091,0,0,ebfc63df063962b42c546da9b063b838d4cc3405e8f86d8f0f4a8a37b0ebeb5c,2024-07-03T02:08:29.633000
|
||||||
CVE-2024-50919,0,0,fb72b94bf12dfa0a5e9ec266485d1c6c4092454d259a46d11777d137791b9425,2024-11-18T20:15:05.650000
|
CVE-2024-50919,0,1,50637c783efd924faf08bea180b2e2fd1ec2ca8009854c12e60923948fef2704,2024-11-19T16:35:15.973000
|
||||||
CVE-2024-5092,0,0,00bc3fe74171cc3f61d986dd5d1b43711757ac5d30e24bab5f84b663495133d2,2024-05-22T12:46:53.887000
|
CVE-2024-5092,0,0,00bc3fe74171cc3f61d986dd5d1b43711757ac5d30e24bab5f84b663495133d2,2024-05-22T12:46:53.887000
|
||||||
CVE-2024-5093,0,0,13d2e709dd3e7be8048d02a6012bbed004823bd119b45510128e77bb922bb163,2024-06-04T19:20:58.343000
|
CVE-2024-5093,0,0,13d2e709dd3e7be8048d02a6012bbed004823bd119b45510128e77bb922bb163,2024-06-04T19:20:58.343000
|
||||||
CVE-2024-5094,0,0,a6da916325cb7c5c0cbf108ef5f048d7004d52e417cf8850e363484a9b36d59d,2024-06-04T19:20:58.470000
|
CVE-2024-5094,0,0,a6da916325cb7c5c0cbf108ef5f048d7004d52e417cf8850e363484a9b36d59d,2024-06-04T19:20:58.470000
|
||||||
@ -265938,8 +265940,8 @@ CVE-2024-51032,0,0,8ef48ff90dee211a4695fed712dc76f07ccf41b216d3f511e2ee570e4fc12
|
|||||||
CVE-2024-51037,0,0,2070f9754baeb5ebfb5ce762d110636e28a0455b141fa07f8e034775af971022,2024-11-18T19:35:06.770000
|
CVE-2024-51037,0,0,2070f9754baeb5ebfb5ce762d110636e28a0455b141fa07f8e034775af971022,2024-11-18T19:35:06.770000
|
||||||
CVE-2024-5104,0,0,8d4ff1d965ca43b16b77c8055dc82631e6e8123b480d913038100bbc16c5fc14,2024-06-04T19:20:59.397000
|
CVE-2024-5104,0,0,8d4ff1d965ca43b16b77c8055dc82631e6e8123b480d913038100bbc16c5fc14,2024-06-04T19:20:59.397000
|
||||||
CVE-2024-5105,0,0,c1afcbdfab9cbf8b7401c36e665ea5449fdb0423f5baf719d1747abc02484d12,2024-06-04T19:20:59.500000
|
CVE-2024-5105,0,0,c1afcbdfab9cbf8b7401c36e665ea5449fdb0423f5baf719d1747abc02484d12,2024-06-04T19:20:59.500000
|
||||||
CVE-2024-51051,0,0,2acbd7048e8deeab8f5456c0aa84878fe5d8f54a6f2b4cf23776968ace363cfc,2024-11-18T22:15:06.190000
|
CVE-2024-51051,0,1,3b5ddbf513ad177e6a1e31eba4793dd830b729815bcafe0918a06bbdf61ad6a0,2024-11-19T15:35:11.920000
|
||||||
CVE-2024-51053,0,0,4998296858b2c73e738f922860d5401512988c3d54346fc1701c74d303692944,2024-11-18T21:15:06.423000
|
CVE-2024-51053,0,1,3da7e1ecf8978ae0d940fd81cf8283d794f909ff9c96e632fd7847abfccb530f,2024-11-19T15:35:12.750000
|
||||||
CVE-2024-51054,0,0,5f7e39a7aaba6174905b6372920760418cc96f41e26463faa8167a7c26d82367,2024-11-12T20:35:17.823000
|
CVE-2024-51054,0,0,5f7e39a7aaba6174905b6372920760418cc96f41e26463faa8167a7c26d82367,2024-11-12T20:35:17.823000
|
||||||
CVE-2024-51055,0,0,01ccd52478b3519c5dabbf4568ac988a576ee058f14d536ab175a95478255e40,2024-11-13T16:35:25.810000
|
CVE-2024-51055,0,0,01ccd52478b3519c5dabbf4568ac988a576ee058f14d536ab175a95478255e40,2024-11-13T16:35:25.810000
|
||||||
CVE-2024-5106,0,0,0c609f41f655027086ae34a799c5dba7518161802bc29d490607b24bb6cca58b,2024-05-20T13:00:04.957000
|
CVE-2024-5106,0,0,0c609f41f655027086ae34a799c5dba7518161802bc29d490607b24bb6cca58b,2024-05-20T13:00:04.957000
|
||||||
@ -266271,7 +266273,7 @@ CVE-2024-51735,0,0,4d68a755141918a79130284871e942292c9f37924aba0b94103b08a16b1df
|
|||||||
CVE-2024-51736,0,0,51a90df0a63a59dfcfd7064d61bc8f9e655fb6163871684916ac6a876bcb19b0,2024-11-08T19:01:25.633000
|
CVE-2024-51736,0,0,51a90df0a63a59dfcfd7064d61bc8f9e655fb6163871684916ac6a876bcb19b0,2024-11-08T19:01:25.633000
|
||||||
CVE-2024-51739,0,0,4d0d8cd202212f5e2caa967ce03eee4a69352aa3ef71ff626fc2224d73faea32,2024-11-08T15:56:18.753000
|
CVE-2024-51739,0,0,4d0d8cd202212f5e2caa967ce03eee4a69352aa3ef71ff626fc2224d73faea32,2024-11-08T15:56:18.753000
|
||||||
CVE-2024-51740,0,0,74dcd62c794431349724c21a2a10e6fc9dfce3314bc46b9aad9df5d89f4c0431,2024-11-08T21:09:45.387000
|
CVE-2024-51740,0,0,74dcd62c794431349724c21a2a10e6fc9dfce3314bc46b9aad9df5d89f4c0431,2024-11-08T21:09:45.387000
|
||||||
CVE-2024-51743,0,0,cbe9702440bd519d8dc940900dd308598da2792d920432c1716af89e24097f08,2024-11-18T20:15:05.900000
|
CVE-2024-51743,0,1,5d5698db10bc042f3c0a1fd5c86a738299a2e529ddee5d5fef26c01859fbec0e,2024-11-19T15:35:13.590000
|
||||||
CVE-2024-51744,0,0,df641a1b86566e97bb7074f2d337c50f51346569211bd554409b057e4c4da639,2024-11-05T16:04:26.053000
|
CVE-2024-51744,0,0,df641a1b86566e97bb7074f2d337c50f51346569211bd554409b057e4c4da639,2024-11-05T16:04:26.053000
|
||||||
CVE-2024-51745,0,0,37db28606ad10f651e6f62f94e51def5fb50b1cfae8314bc96328b8b65ad324b,2024-11-06T18:17:17.287000
|
CVE-2024-51745,0,0,37db28606ad10f651e6f62f94e51def5fb50b1cfae8314bc96328b8b65ad324b,2024-11-06T18:17:17.287000
|
||||||
CVE-2024-51746,0,0,3cd98a267aedbbeeb4ad193a68e5bacd0a1a46a62f6ccca5880e9520a47fbe14,2024-11-06T18:17:17.287000
|
CVE-2024-51746,0,0,3cd98a267aedbbeeb4ad193a68e5bacd0a1a46a62f6ccca5880e9520a47fbe14,2024-11-06T18:17:17.287000
|
||||||
@ -266286,7 +266288,7 @@ CVE-2024-51754,0,0,7bb02b0dadfa6351503359aa64d9360522f7dd1d2e17f399adc659a202b69
|
|||||||
CVE-2024-51755,0,0,8da46be2050120e871a46966a709a4a6c341c8b76decbe7d2852b8155e882a03,2024-11-08T19:01:25.633000
|
CVE-2024-51755,0,0,8da46be2050120e871a46966a709a4a6c341c8b76decbe7d2852b8155e882a03,2024-11-08T19:01:25.633000
|
||||||
CVE-2024-51756,0,0,7e7db3439c4e45c36bf53dc70dbe779b982ce3f3056b8757e470dab737dd37ba,2024-11-06T18:17:17.287000
|
CVE-2024-51756,0,0,7e7db3439c4e45c36bf53dc70dbe779b982ce3f3056b8757e470dab737dd37ba,2024-11-06T18:17:17.287000
|
||||||
CVE-2024-51757,0,0,4a6a6f5d284f7e398e40f49b0f871e08dca74b70a20c565e444a807f2ff3adcf,2024-11-08T19:01:25.633000
|
CVE-2024-51757,0,0,4a6a6f5d284f7e398e40f49b0f871e08dca74b70a20c565e444a807f2ff3adcf,2024-11-08T19:01:25.633000
|
||||||
CVE-2024-51758,0,1,cea74a57b3a5b78703ebb8f80aace1e82108cebb51552a8b14adb1167ed76c66,2024-11-19T14:15:17.763000
|
CVE-2024-51758,0,0,cea74a57b3a5b78703ebb8f80aace1e82108cebb51552a8b14adb1167ed76c66,2024-11-19T14:15:17.763000
|
||||||
CVE-2024-51759,0,0,d7e3fffb9bbe00d7828c69c49042db425ba3a8f69d85eea947e9f519295183f0,2024-11-12T13:56:24.513000
|
CVE-2024-51759,0,0,d7e3fffb9bbe00d7828c69c49042db425ba3a8f69d85eea947e9f519295183f0,2024-11-12T13:56:24.513000
|
||||||
CVE-2024-5176,0,0,095b03ddd1cdcd739bbe8693b41d7d6e416f60f9815e0be55e0b3850508434d9,2024-06-05T15:15:12.620000
|
CVE-2024-5176,0,0,095b03ddd1cdcd739bbe8693b41d7d6e416f60f9815e0be55e0b3850508434d9,2024-06-05T15:15:12.620000
|
||||||
CVE-2024-51760,0,0,ed9651aa9154a248687433de274acd9501a7b311268ff1812cf9f76a64d59a2e,2024-11-12T13:56:24.513000
|
CVE-2024-51760,0,0,ed9651aa9154a248687433de274acd9501a7b311268ff1812cf9f76a64d59a2e,2024-11-12T13:56:24.513000
|
||||||
@ -266403,7 +266405,7 @@ CVE-2024-5223,0,0,e1518fa1e9fb0970a33863c1b1a7313f3247c5958916de9a4b07f2b8f6f2eb
|
|||||||
CVE-2024-5224,0,0,db9f297ce85558665780a2b5ea4fe3a1e31ac4d111566a8ba052aeb7472c35ff,2024-07-23T21:04:43.353000
|
CVE-2024-5224,0,0,db9f297ce85558665780a2b5ea4fe3a1e31ac4d111566a8ba052aeb7472c35ff,2024-07-23T21:04:43.353000
|
||||||
CVE-2024-5225,0,0,908db7200208aad82f301f521b9dc90a90551560079e967278f95345fdc58383,2024-09-23T19:46:53.890000
|
CVE-2024-5225,0,0,908db7200208aad82f301f521b9dc90a90551560079e967278f95345fdc58383,2024-09-23T19:46:53.890000
|
||||||
CVE-2024-5226,0,0,343bea1ef6104d1a60d532c3087e707033a7d2cea2eb006f3e8cf7d609df1199,2024-08-08T13:04:18.753000
|
CVE-2024-5226,0,0,343bea1ef6104d1a60d532c3087e707033a7d2cea2eb006f3e8cf7d609df1199,2024-08-08T13:04:18.753000
|
||||||
CVE-2024-52268,0,0,bc43f19fc7b3b42ba395f6b1a7bb785132d4ad8472f3a9942e43bec4123149a9,2024-11-13T17:01:16.850000
|
CVE-2024-52268,0,1,ea9ce8fc39b5cc2a56555dd9c667efdad9c8d1fb9ef5135ccde9e9b88f547032,2024-11-19T15:57:03.780000
|
||||||
CVE-2024-5227,0,0,782d407fd59442ae1cd49577c63d7b8236dddc237a48b5fa6a3df2e3ceec540d,2024-05-24T01:15:30.977000
|
CVE-2024-5227,0,0,782d407fd59442ae1cd49577c63d7b8236dddc237a48b5fa6a3df2e3ceec540d,2024-05-24T01:15:30.977000
|
||||||
CVE-2024-5228,0,0,d7fb18ef663e7fbb963ee04e575f2bc258b900955c0912600676521519fad837,2024-05-24T01:15:30.977000
|
CVE-2024-5228,0,0,d7fb18ef663e7fbb963ee04e575f2bc258b900955c0912600676521519fad837,2024-05-24T01:15:30.977000
|
||||||
CVE-2024-52286,0,0,a006a0be971b0e96964504e5809b0d7c6410ed1592b8c4976d82ae2953104dc3,2024-11-12T13:55:21.227000
|
CVE-2024-52286,0,0,a006a0be971b0e96964504e5809b0d7c6410ed1592b8c4976d82ae2953104dc3,2024-11-12T13:55:21.227000
|
||||||
@ -266421,10 +266423,10 @@ CVE-2024-5230,0,0,f45c8274ba28e0dc58bed98870ed092580a9c18662584e7c3debbd7f7cd359
|
|||||||
CVE-2024-52300,0,0,79b0d837d6ed018cc1d7f4872a1b8952ec440441022015378fe0f1720fe4ce32,2024-11-18T17:29:46.807000
|
CVE-2024-52300,0,0,79b0d837d6ed018cc1d7f4872a1b8952ec440441022015378fe0f1720fe4ce32,2024-11-18T17:29:46.807000
|
||||||
CVE-2024-52301,0,0,091c40845cee35a6db54cae490564bdae10317d21b9b1b70a65b6fc3311911d8,2024-11-13T17:01:16.850000
|
CVE-2024-52301,0,0,091c40845cee35a6db54cae490564bdae10317d21b9b1b70a65b6fc3311911d8,2024-11-13T17:01:16.850000
|
||||||
CVE-2024-52302,0,0,07877ae667924fcd5dc6349e2bbc5755286c2a37cd731fe353996ab7a3354ec7,2024-11-15T13:58:08.913000
|
CVE-2024-52302,0,0,07877ae667924fcd5dc6349e2bbc5755286c2a37cd731fe353996ab7a3354ec7,2024-11-15T13:58:08.913000
|
||||||
CVE-2024-52303,0,0,a3b0bb85d61ed52facf7d9ec6d0faa9daea276746378ac606ca25c8d8d86c27e,2024-11-18T20:15:06.047000
|
CVE-2024-52303,0,1,2626067843e172810fba2e6863a84bbf77398797810b56cbdeeae8c75ec48467,2024-11-19T15:35:13.847000
|
||||||
CVE-2024-52304,0,0,d25bca6cb267afee52d89be999b15b8d6e7c5b072457bbba9097b2e08266db1c,2024-11-18T21:15:06.500000
|
CVE-2024-52304,0,1,ebf98891a9386cb1c3454a1a391e278d89de340cdd87aa50fe084ed8e755b876,2024-11-19T16:35:16.793000
|
||||||
CVE-2024-52305,0,0,88b149b5f0a3a8070aa2ae381ffe02a88504a00370b84c79cfb2b490d2da2492,2024-11-13T19:15:08.853000
|
CVE-2024-52305,0,0,88b149b5f0a3a8070aa2ae381ffe02a88504a00370b84c79cfb2b490d2da2492,2024-11-13T19:15:08.853000
|
||||||
CVE-2024-52306,0,0,1b9ce4c56d7ceae407f1508bb897699dd90021aca31b5ca63511c2afa50e85a1,2024-11-13T17:01:16.850000
|
CVE-2024-52306,0,1,dfac1396e024093252f9cdf330e5f0eab10833af9a739a326458e40b25c9c7da,2024-11-19T15:02:45.053000
|
||||||
CVE-2024-52308,0,0,68dbd5663bc1fce9463187e86de0183ed1b47f7db3824a2242b39ee69302613a,2024-11-15T13:58:08.913000
|
CVE-2024-52308,0,0,68dbd5663bc1fce9463187e86de0183ed1b47f7db3824a2242b39ee69302613a,2024-11-15T13:58:08.913000
|
||||||
CVE-2024-5231,0,0,255bed42ab2a064a39e6f8c88880296d2f7a7d154f3db6dc7f4df2fa244d299f,2024-06-04T19:21:02.640000
|
CVE-2024-5231,0,0,255bed42ab2a064a39e6f8c88880296d2f7a7d154f3db6dc7f4df2fa244d299f,2024-06-04T19:21:02.640000
|
||||||
CVE-2024-52311,0,0,440cc6f6193f2a4b57d7c7c4a4f4b3f01242ca6df6bc89770050e09d3b499acf,2024-11-12T13:56:54.483000
|
CVE-2024-52311,0,0,440cc6f6193f2a4b57d7c7c4a4f4b3f01242ca6df6bc89770050e09d3b499acf,2024-11-12T13:56:54.483000
|
||||||
@ -266532,7 +266534,7 @@ CVE-2024-5248,0,0,6cfa5cec6de457c13d7096887dc7c2d8bd99f0e898238886822e69d1ee6603
|
|||||||
CVE-2024-5249,0,0,7881e207dd06fe76500d559735f87b1084a494789351514ee988debe74e79673,2024-10-01T14:26:17.410000
|
CVE-2024-5249,0,0,7881e207dd06fe76500d559735f87b1084a494789351514ee988debe74e79673,2024-10-01T14:26:17.410000
|
||||||
CVE-2024-5250,0,0,b4b370273f1fe30d94b715ad219dda570a7dcb84192abd50c3cb746299bdbb93,2024-10-01T14:33:47.727000
|
CVE-2024-5250,0,0,b4b370273f1fe30d94b715ad219dda570a7dcb84192abd50c3cb746299bdbb93,2024-10-01T14:33:47.727000
|
||||||
CVE-2024-52505,0,0,7c58f328eee3b40bfcef13b278250e7509b58c18af26b7fe642ca2ce116c61a9,2024-11-15T13:58:08.913000
|
CVE-2024-52505,0,0,7c58f328eee3b40bfcef13b278250e7509b58c18af26b7fe642ca2ce116c61a9,2024-11-15T13:58:08.913000
|
||||||
CVE-2024-52506,0,0,84cdde2b84e04ac6ad03785684c00e2ad7ff6808941bbb26dfc03f89e5ad625e,2024-11-18T21:15:06.633000
|
CVE-2024-52506,0,1,1f1798b23ff6d9188de62387a8dacf2eb2588af451024836f7f12c174165bc70,2024-11-19T16:35:17.897000
|
||||||
CVE-2024-52507,0,0,18377407544f5a86346c3ba14b439e11d26f6fdcec177783785d2e2abbc40b48,2024-11-18T17:11:56.587000
|
CVE-2024-52507,0,0,18377407544f5a86346c3ba14b439e11d26f6fdcec177783785d2e2abbc40b48,2024-11-18T17:11:56.587000
|
||||||
CVE-2024-52508,0,0,fa3075ebe1eb0237a457fbaec2942230ebf45f577a1b7c74400d5371749c8a2d,2024-11-18T17:11:56.587000
|
CVE-2024-52508,0,0,fa3075ebe1eb0237a457fbaec2942230ebf45f577a1b7c74400d5371749c8a2d,2024-11-18T17:11:56.587000
|
||||||
CVE-2024-52509,0,0,70a256c5b98dc4a98287533c2f4556bc0a54b2011fdde26406b866d5725d4987,2024-11-18T17:11:56.587000
|
CVE-2024-52509,0,0,70a256c5b98dc4a98287533c2f4556bc0a54b2011fdde26406b866d5725d4987,2024-11-18T17:11:56.587000
|
||||||
@ -266583,10 +266585,11 @@ CVE-2024-52572,0,0,ebb7d32af991ea946ce7b08397e09643d24f4d57c60b8d5741c60f1a71b90
|
|||||||
CVE-2024-52573,0,0,cce17e8c7eac72f4f0bd4de019ed716652f5c5bc2155e2ccd9cbdc8c71188bd0,2024-11-18T17:11:17.393000
|
CVE-2024-52573,0,0,cce17e8c7eac72f4f0bd4de019ed716652f5c5bc2155e2ccd9cbdc8c71188bd0,2024-11-18T17:11:17.393000
|
||||||
CVE-2024-52574,0,0,f9f905d7d81dd0480b5a16770f5f6f4db17a72ca814858644fca40063e1c8a42,2024-11-18T17:11:17.393000
|
CVE-2024-52574,0,0,f9f905d7d81dd0480b5a16770f5f6f4db17a72ca814858644fca40063e1c8a42,2024-11-18T17:11:17.393000
|
||||||
CVE-2024-5258,0,0,51134eb56f05332c584317818ff995de56b2de598a9752cb1990f31f73c535e3,2024-05-24T01:15:30.977000
|
CVE-2024-5258,0,0,51134eb56f05332c584317818ff995de56b2de598a9752cb1990f31f73c535e3,2024-05-24T01:15:30.977000
|
||||||
|
CVE-2024-52582,1,1,978d5539534d9accb3a2088797ab35afeadf6cc002801a01ce1e2705a709493b,2024-11-19T16:15:20.207000
|
||||||
CVE-2024-52583,0,0,3f74b228ab64088216191bfcab227a1a2ea6855c6a93b9a484f9332b231d47f4,2024-11-18T21:15:06.810000
|
CVE-2024-52583,0,0,3f74b228ab64088216191bfcab227a1a2ea6855c6a93b9a484f9332b231d47f4,2024-11-18T21:15:06.810000
|
||||||
CVE-2024-52584,0,0,d2b7950e5cd1ed8945feddf6cf51c8abf30da2c40a1a73fd6ae66bd7da83b57b,2024-11-18T21:15:07.047000
|
CVE-2024-52584,0,1,23a26c97848e4c401f63f6b5b612d4f27d57ad71dbf8b810d2f44645b1279cee,2024-11-19T16:35:18.180000
|
||||||
CVE-2024-52585,0,0,69a1fca89c1d0eb429ab56c8a4d32afbcc612ce9cc5c2249b1896c5a16b5f7dd,2024-11-18T21:15:07.183000
|
CVE-2024-52585,0,1,c99253a3594402b71c7620d674ac85d650f754e205581c2ecef2a30b146e8e0b,2024-11-19T16:35:18.380000
|
||||||
CVE-2024-52587,0,0,f2a2f41cb4d8f27ae863025f28f49edcc4abfbe7242c2d4d882b27237626995d,2024-11-18T22:15:09.557000
|
CVE-2024-52587,0,1,b753c478eb1e07f984a98bf0ed57f7cd4222c704b268dc10ece20d391056a018,2024-11-19T15:35:15.427000
|
||||||
CVE-2024-5259,0,0,b3c664cd11ddb9db1b34b50011b18499fc5ac06e8b6b6a588e8cf7d8bc26fc37,2024-06-11T17:44:42.783000
|
CVE-2024-5259,0,0,b3c664cd11ddb9db1b34b50011b18499fc5ac06e8b6b6a588e8cf7d8bc26fc37,2024-06-11T17:44:42.783000
|
||||||
CVE-2024-5260,0,0,1ea9956e2812efb1ad02a50e6e15b3c5419e86ea96923b6afc83449c65511582,2024-07-02T12:09:16.907000
|
CVE-2024-5260,0,0,1ea9956e2812efb1ad02a50e6e15b3c5419e86ea96923b6afc83449c65511582,2024-07-02T12:09:16.907000
|
||||||
CVE-2024-5261,0,0,0592ac8c89e0cb8027f6648912b9536cab36db7fb70868109d4e1f51168ecc2f,2024-06-25T18:50:42.040000
|
CVE-2024-5261,0,0,0592ac8c89e0cb8027f6648912b9536cab36db7fb70868109d4e1f51168ecc2f,2024-06-25T18:50:42.040000
|
||||||
@ -266597,12 +266600,12 @@ CVE-2024-5264,0,0,7660c1edaddd779c29789898410be8f6784b9b682f1b3f0cb339e7e58b2976
|
|||||||
CVE-2024-5265,0,0,23ae6b699421b146407b64fc352f84f4385a86a37bc2f3798f85fec07534db6d,2024-07-02T14:51:36.407000
|
CVE-2024-5265,0,0,23ae6b699421b146407b64fc352f84f4385a86a37bc2f3798f85fec07534db6d,2024-07-02T14:51:36.407000
|
||||||
CVE-2024-5266,0,0,0ac195748009e62b525761c49acf97f593b0c2f3ac01d138f9c93c4ef03661dd,2024-07-23T20:17:55.073000
|
CVE-2024-5266,0,0,0ac195748009e62b525761c49acf97f593b0c2f3ac01d138f9c93c4ef03661dd,2024-07-23T20:17:55.073000
|
||||||
CVE-2024-5267,0,0,46668d154f6ef78d29586983d5d2edaa995ecd77518ea035f59ce7176b7147a1,2024-09-24T18:56:10.507000
|
CVE-2024-5267,0,0,46668d154f6ef78d29586983d5d2edaa995ecd77518ea035f59ce7176b7147a1,2024-09-24T18:56:10.507000
|
||||||
CVE-2024-52675,1,1,2b3759886469230e81e4630134f8a90022497ce2cdfd34c020e9b1c3fe70eda4,2024-11-19T13:15:04.700000
|
CVE-2024-52675,0,0,2b3759886469230e81e4630134f8a90022497ce2cdfd34c020e9b1c3fe70eda4,2024-11-19T13:15:04.700000
|
||||||
CVE-2024-5268,0,0,a6d8167214bc75f9071a59fc8bc107cab067c253ba36f8c70c02e602f94a1506,2024-09-24T18:47:03.597000
|
CVE-2024-5268,0,0,a6d8167214bc75f9071a59fc8bc107cab067c253ba36f8c70c02e602f94a1506,2024-09-24T18:47:03.597000
|
||||||
CVE-2024-5269,0,0,fcc703e959dc9fcd54d2dba10777aa46d0a7036a8f955bfd8c508426ccf0b225,2024-09-24T17:50:07.957000
|
CVE-2024-5269,0,0,fcc703e959dc9fcd54d2dba10777aa46d0a7036a8f955bfd8c508426ccf0b225,2024-09-24T17:50:07.957000
|
||||||
CVE-2024-5270,0,0,7ec6ed8f215026bf9d30718594365eb1a902134340d8c0dfba08c80435c07d35,2024-05-28T12:39:28.377000
|
CVE-2024-5270,0,0,7ec6ed8f215026bf9d30718594365eb1a902134340d8c0dfba08c80435c07d35,2024-05-28T12:39:28.377000
|
||||||
CVE-2024-5271,0,0,7285855bafca9dd1fc033351db47cae9ea7831aeb2f80b9313f86f9100e15f62,2024-05-31T13:01:46.727000
|
CVE-2024-5271,0,0,7285855bafca9dd1fc033351db47cae9ea7831aeb2f80b9313f86f9100e15f62,2024-05-31T13:01:46.727000
|
||||||
CVE-2024-52711,1,1,ec17aaf4daa36a3b4840ae9c2e59c39b0dfdc1e3f4c268a568196421c142ac48,2024-11-19T14:15:18.207000
|
CVE-2024-52711,0,0,ec17aaf4daa36a3b4840ae9c2e59c39b0dfdc1e3f4c268a568196421c142ac48,2024-11-19T14:15:18.207000
|
||||||
CVE-2024-5272,0,0,d387d985ee64cb70308558e1288744b27040b8f28ef99da7e8b0a0af44167dd6,2024-05-28T12:39:28.377000
|
CVE-2024-5272,0,0,d387d985ee64cb70308558e1288744b27040b8f28ef99da7e8b0a0af44167dd6,2024-05-28T12:39:28.377000
|
||||||
CVE-2024-5273,0,0,098baedadde55d65116b7be974965fe184b3495f86a75c5fc729e60404fd76e0,2024-11-07T15:35:14.380000
|
CVE-2024-5273,0,0,098baedadde55d65116b7be974965fe184b3495f86a75c5fc729e60404fd76e0,2024-11-07T15:35:14.380000
|
||||||
CVE-2024-5274,0,0,e7d74c38d2c202c949e1ef012213e640b18c31c48483d84bb8a4761d2997d225,2024-08-14T17:07:13.270000
|
CVE-2024-5274,0,0,e7d74c38d2c202c949e1ef012213e640b18c31c48483d84bb8a4761d2997d225,2024-08-14T17:07:13.270000
|
||||||
@ -266618,7 +266621,7 @@ CVE-2024-5283,0,0,b38d3b6d84c245f47c02c6b1221c64126cc1590c1b6b303a3d39721ab1dfca
|
|||||||
CVE-2024-5284,0,0,a632d154686ad4201398091156d5b5851cc181b1b36b426c7e50520edad6a7e5,2024-08-01T13:59:43.927000
|
CVE-2024-5284,0,0,a632d154686ad4201398091156d5b5851cc181b1b36b426c7e50520edad6a7e5,2024-08-01T13:59:43.927000
|
||||||
CVE-2024-5285,0,0,f5fe057b3eff57d7472395b5cf3577db89e74c15c7e806cbb99af18bbf9a648f,2024-08-01T13:59:44.103000
|
CVE-2024-5285,0,0,f5fe057b3eff57d7472395b5cf3577db89e74c15c7e806cbb99af18bbf9a648f,2024-08-01T13:59:44.103000
|
||||||
CVE-2024-5286,0,0,e962fadcb8b0d0d0a4155e18c685e9afa8633703c8403a48cdc3bee697298672,2024-08-01T13:59:44.950000
|
CVE-2024-5286,0,0,e962fadcb8b0d0d0a4155e18c685e9afa8633703c8403a48cdc3bee697298672,2024-08-01T13:59:44.950000
|
||||||
CVE-2024-52867,0,0,0b0882acd5de52cdfd31646d879cc4d64802f76ec8f0a66bcd2a8d5bda665151,2024-11-18T17:11:17.393000
|
CVE-2024-52867,0,1,6bac765312da56bf51c82cb7e47db1a297720d6556228f4058b497d0cb4d9042,2024-11-19T16:35:18.583000
|
||||||
CVE-2024-5287,0,0,13c5ee44df7955897b1f2b3c68a920faa26439fbe1c9c489df67cb947fa427e4,2024-08-01T13:59:45.123000
|
CVE-2024-5287,0,0,13c5ee44df7955897b1f2b3c68a920faa26439fbe1c9c489df67cb947fa427e4,2024-08-01T13:59:45.123000
|
||||||
CVE-2024-52871,0,0,fbb45245ca19e2c77e29db135af4fe37412081323f711d5753aa0acf28d33d5d,2024-11-18T18:35:09.027000
|
CVE-2024-52871,0,0,fbb45245ca19e2c77e29db135af4fe37412081323f711d5753aa0acf28d33d5d,2024-11-18T18:35:09.027000
|
||||||
CVE-2024-52872,0,0,d563b0c61f4165e3ef70090846ba3ce24408d217ad938562d8cab8356c89722b,2024-11-18T18:35:09.270000
|
CVE-2024-52872,0,0,d563b0c61f4165e3ef70090846ba3ce24408d217ad938562d8cab8356c89722b,2024-11-18T18:35:09.270000
|
||||||
@ -266646,8 +266649,8 @@ CVE-2024-52940,0,0,4899ba7a4b0253bf6736cdb115d3b83a6d38ef8f644ea7c3b0ceff9826e83
|
|||||||
CVE-2024-52941,0,0,994a90a347299304b8eae5625a81e79879ba1642baaa7bb0fd2515230fec7b46,2024-11-18T17:11:17.393000
|
CVE-2024-52941,0,0,994a90a347299304b8eae5625a81e79879ba1642baaa7bb0fd2515230fec7b46,2024-11-18T17:11:17.393000
|
||||||
CVE-2024-52942,0,0,2d71991d3f620c8d414abd7959e93219f8ba421f1204035494c4ef43cfc04a08,2024-11-18T17:11:17.393000
|
CVE-2024-52942,0,0,2d71991d3f620c8d414abd7959e93219f8ba421f1204035494c4ef43cfc04a08,2024-11-18T17:11:17.393000
|
||||||
CVE-2024-52943,0,0,1b61c110823c3190af49de4fecc893fde6501d47c2afacf8e23cc10dc5b35773,2024-11-18T17:11:17.393000
|
CVE-2024-52943,0,0,1b61c110823c3190af49de4fecc893fde6501d47c2afacf8e23cc10dc5b35773,2024-11-18T17:11:17.393000
|
||||||
CVE-2024-52944,0,0,ef607cc6d31e32417624ea6ea83186d7e60f5493f4efdfbaafbb44b80ae9aabe,2024-11-18T17:11:17.393000
|
CVE-2024-52944,0,1,891b166dc630c154b3b088f9607ee62ecd73eada6f254a4630122c61f4fa3591,2024-11-19T16:35:19.310000
|
||||||
CVE-2024-52945,0,0,245fda9a6f281ef2fc6d1964888db2508fd69b063898a2bbffc6d6c19d7ff415,2024-11-18T17:11:17.393000
|
CVE-2024-52945,0,1,63027697b61e71930738cff69e21a659b1ff06f97d852d7c9fcc49bfd776881d,2024-11-19T16:35:20.020000
|
||||||
CVE-2024-52946,0,0,ef4806982226269ca873cfccc34dff633254ace5ad4fa6e29d31cbf5dd0c16de,2024-11-18T17:11:17.393000
|
CVE-2024-52946,0,0,ef4806982226269ca873cfccc34dff633254ace5ad4fa6e29d31cbf5dd0c16de,2024-11-18T17:11:17.393000
|
||||||
CVE-2024-52947,0,0,032f06f1ece995cd81c8fde69d4726dfc9340376c69a3aad6534cd5f5b5e3ade,2024-11-18T18:35:09.517000
|
CVE-2024-52947,0,0,032f06f1ece995cd81c8fde69d4726dfc9340376c69a3aad6534cd5f5b5e3ade,2024-11-18T18:35:09.517000
|
||||||
CVE-2024-5295,0,0,a4e592514ef2498b5a4a173dae0a6cbcfb9c607b7fa3ff86ebe7c3784f138898,2024-05-24T01:15:30.977000
|
CVE-2024-5295,0,0,a4e592514ef2498b5a4a173dae0a6cbcfb9c607b7fa3ff86ebe7c3784f138898,2024-05-24T01:15:30.977000
|
||||||
@ -268954,7 +268957,7 @@ CVE-2024-7993,0,0,f5d8ce4e740e416affd8e0aa81b49c04864f17ee770befacf4a96c4d998858
|
|||||||
CVE-2024-7994,0,0,5869f45b11df8c023b86ee171f284a639849bded2dfdba799d5d6a2b878c2a64,2024-10-21T18:35:55.397000
|
CVE-2024-7994,0,0,5869f45b11df8c023b86ee171f284a639849bded2dfdba799d5d6a2b878c2a64,2024-10-21T18:35:55.397000
|
||||||
CVE-2024-7995,0,0,9b722cec7fe5ddfbfa2ed97d7d4fe0f5947f1a72064ec24ff3d88276777efbc5,2024-11-06T18:17:17.287000
|
CVE-2024-7995,0,0,9b722cec7fe5ddfbfa2ed97d7d4fe0f5947f1a72064ec24ff3d88276777efbc5,2024-11-06T18:17:17.287000
|
||||||
CVE-2024-7998,0,0,8aa3505a1b6ed462573d7b65c55c5633ff88a81168885ae03bec6b1db69a2167,2024-08-21T12:30:33.697000
|
CVE-2024-7998,0,0,8aa3505a1b6ed462573d7b65c55c5633ff88a81168885ae03bec6b1db69a2167,2024-08-21T12:30:33.697000
|
||||||
CVE-2024-8001,0,0,48cc38c0b32ef1bad6a49e2d1565da4e291140d61179cde5d8642db4a28d5257,2024-11-13T17:01:16.850000
|
CVE-2024-8001,0,1,806349a97813103cc3e8eb86d0f86a64cc01077a115d397b4a475acb9a23d258,2024-11-19T15:41:25.973000
|
||||||
CVE-2024-8003,0,0,1eb6cc8bd16248d54ed281136e233da0a723cb74879af6e3337c9532a3caf8e1,2024-08-21T15:51:28.397000
|
CVE-2024-8003,0,0,1eb6cc8bd16248d54ed281136e233da0a723cb74879af6e3337c9532a3caf8e1,2024-08-21T15:51:28.397000
|
||||||
CVE-2024-8004,0,0,6053860c0b4fdc62f3a7122a051813b35afd677f12aaae8780fae160750aa789,2024-09-04T14:56:46.947000
|
CVE-2024-8004,0,0,6053860c0b4fdc62f3a7122a051813b35afd677f12aaae8780fae160750aa789,2024-09-04T14:56:46.947000
|
||||||
CVE-2024-8005,0,0,c059370cb975aea915e5671e32cb80d879151797480dbd5423b1593aeba96675,2024-08-21T15:49:59.470000
|
CVE-2024-8005,0,0,c059370cb975aea915e5671e32cb80d879151797480dbd5423b1593aeba96675,2024-08-21T15:49:59.470000
|
||||||
@ -269711,7 +269714,7 @@ CVE-2024-9050,0,0,78b9638634d0ff28e0659c218fd386df1d4e4f7c5c88d6469370350eb2679b
|
|||||||
CVE-2024-9051,0,0,e0f892f6090989bc65bfe2c27d48e7e51216899c12a8aa5d44d38bf2b4829ddc,2024-10-15T12:58:51.050000
|
CVE-2024-9051,0,0,e0f892f6090989bc65bfe2c27d48e7e51216899c12a8aa5d44d38bf2b4829ddc,2024-10-15T12:58:51.050000
|
||||||
CVE-2024-9054,0,0,8ac0760d3aa06e14d98991152c0b4a90664b0b925ad15b2f9f9f67c478cb9754,2024-10-17T15:19:32.803000
|
CVE-2024-9054,0,0,8ac0760d3aa06e14d98991152c0b4a90664b0b925ad15b2f9f9f67c478cb9754,2024-10-17T15:19:32.803000
|
||||||
CVE-2024-9057,0,0,1e7730ffd6c424e386d911bdf2bfee9e4291e522521f210193a354376f62eabc,2024-10-15T13:58:19.960000
|
CVE-2024-9057,0,0,1e7730ffd6c424e386d911bdf2bfee9e4291e522521f210193a354376f62eabc,2024-10-15T13:58:19.960000
|
||||||
CVE-2024-9059,0,0,3bf1e313ffb5fa569199e5ef4c73b4067e7879bf62d303bf4aa5a8a83e0558c4,2024-11-13T17:01:16.850000
|
CVE-2024-9059,0,1,4d4eca66fdabff300ba12a6c3aa840e717659fd399e0c46eca6a0c562dee781c,2024-11-19T15:53:56.680000
|
||||||
CVE-2024-9060,0,0,362dff7d92c4f79cdb773c7965db43bbd7eb0923ce5f0445c06b15d2c9fc0e79,2024-10-04T13:51:25.567000
|
CVE-2024-9060,0,0,362dff7d92c4f79cdb773c7965db43bbd7eb0923ce5f0445c06b15d2c9fc0e79,2024-10-04T13:51:25.567000
|
||||||
CVE-2024-9061,0,0,68964a8d24a934fad1df20bd8f6d5ba6a330caf51ca0e0445a293becf4ee4892,2024-10-30T21:11:17.450000
|
CVE-2024-9061,0,0,68964a8d24a934fad1df20bd8f6d5ba6a330caf51ca0e0445a293becf4ee4892,2024-10-30T21:11:17.450000
|
||||||
CVE-2024-9063,0,0,df96d256cb802a721004c9ac9223f80a26c192f9136fb3599130ecff1f9d6c94,2024-09-25T01:15:48.670000
|
CVE-2024-9063,0,0,df96d256cb802a721004c9ac9223f80a26c192f9136fb3599130ecff1f9d6c94,2024-09-25T01:15:48.670000
|
||||||
@ -269946,7 +269949,7 @@ CVE-2024-9402,0,0,04bb4c5739f014caa4b772ec804b7222edbe186c7bb2fe331673658400879b
|
|||||||
CVE-2024-9403,0,0,c1afe1062aca6f3e2bbfc345cdb3697cf0c5243163e1e418a6944c658c5bb841,2024-10-04T13:51:25.567000
|
CVE-2024-9403,0,0,c1afe1062aca6f3e2bbfc345cdb3697cf0c5243163e1e418a6944c658c5bb841,2024-10-04T13:51:25.567000
|
||||||
CVE-2024-9405,0,0,5a1aaacdf03c4deeb5787d411c40d8ad3aed60be9320ac0ab9cd4983368bffee,2024-10-04T13:51:25.567000
|
CVE-2024-9405,0,0,5a1aaacdf03c4deeb5787d411c40d8ad3aed60be9320ac0ab9cd4983368bffee,2024-10-04T13:51:25.567000
|
||||||
CVE-2024-9407,0,0,97b0f3234f51cc30c3a97226cb930f5fbbe39fd25f9f23131a758552af9f8ee9,2024-11-12T18:15:48.057000
|
CVE-2024-9407,0,0,97b0f3234f51cc30c3a97226cb930f5fbbe39fd25f9f23131a758552af9f8ee9,2024-11-12T18:15:48.057000
|
||||||
CVE-2024-9409,0,0,bd26a6d58a7fb40d2ba0ec55a264bb1d6254e13220d49c2ad9283b1761c05cc3,2024-11-13T17:01:16.850000
|
CVE-2024-9409,0,1,3e506ee5c668e864fe32d06ea4b7a74953a7f1e2f6b3e039755ec706eb3daca9,2024-11-19T15:59:21.690000
|
||||||
CVE-2024-9410,0,0,f1caeb057101bc11b923104c4939c2a18b358804c54a293851a2bbe945ca8cb5,2024-10-07T17:48:28.117000
|
CVE-2024-9410,0,0,f1caeb057101bc11b923104c4939c2a18b358804c54a293851a2bbe945ca8cb5,2024-10-07T17:48:28.117000
|
||||||
CVE-2024-9411,0,0,09446adc9a52ba88acfc951352e9088b24cfd1cdb8a001643ee070875c43ffef,2024-10-04T13:51:25.567000
|
CVE-2024-9411,0,0,09446adc9a52ba88acfc951352e9088b24cfd1cdb8a001643ee070875c43ffef,2024-10-04T13:51:25.567000
|
||||||
CVE-2024-9412,0,0,aa9a3d3cdb3659b02012ef158f2f0c675ff0de511272afae470c48f556502feb,2024-10-10T12:51:56.987000
|
CVE-2024-9412,0,0,aa9a3d3cdb3659b02012ef158f2f0c675ff0de511272afae470c48f556502feb,2024-10-10T12:51:56.987000
|
||||||
@ -270114,7 +270117,7 @@ CVE-2024-9655,0,0,5f64b0ed215cc4c47eaa212ce6a6578c092759946c6128b0f32509f44691e3
|
|||||||
CVE-2024-9656,0,0,0baa2843f7043c4ebd829d23f2741f972b762b755442a0f0f83539eb7761035b,2024-10-15T12:57:46.880000
|
CVE-2024-9656,0,0,0baa2843f7043c4ebd829d23f2741f972b762b755442a0f0f83539eb7761035b,2024-10-15T12:57:46.880000
|
||||||
CVE-2024-9657,0,0,fb687953042b10eb922558cb840c65de9e3c4da22e7016c1d2e6ab79c6132615,2024-11-08T16:00:28.320000
|
CVE-2024-9657,0,0,fb687953042b10eb922558cb840c65de9e3c4da22e7016c1d2e6ab79c6132615,2024-11-08T16:00:28.320000
|
||||||
CVE-2024-9667,0,0,db0574de12822738c38c8016441ce46841c68ee532fe6a4e072cebc9412ff13d,2024-11-08T15:27:25.697000
|
CVE-2024-9667,0,0,db0574de12822738c38c8016441ce46841c68ee532fe6a4e072cebc9412ff13d,2024-11-08T15:27:25.697000
|
||||||
CVE-2024-9668,0,0,a2b64111ed3fcb39da017ed8dd6ee17b6527527483477a555ba970e89525e620,2024-11-13T17:01:16.850000
|
CVE-2024-9668,0,1,f818a6b8cdaa67cfd4295b3c202a4554201abb8c6b4c20c52c4343e3261d3200,2024-11-19T15:55:00.840000
|
||||||
CVE-2024-9670,0,0,f306c0fbbcbde1e6a65006fd3bdd50d366f02be816ff2a6f00ef3348b3b76328,2024-10-15T12:57:46.880000
|
CVE-2024-9670,0,0,f306c0fbbcbde1e6a65006fd3bdd50d366f02be816ff2a6f00ef3348b3b76328,2024-10-15T12:57:46.880000
|
||||||
CVE-2024-9671,0,0,421f1b0ad6825ff096efd81ac122f33bafcdf7b21693a85f65613389bca55f89,2024-10-10T12:51:56.987000
|
CVE-2024-9671,0,0,421f1b0ad6825ff096efd81ac122f33bafcdf7b21693a85f65613389bca55f89,2024-10-10T12:51:56.987000
|
||||||
CVE-2024-9674,0,0,99b8206db3c3741ff50725aa3969c36280edf4a37082b6473da1336e00a39d59,2024-10-22T14:02:50.473000
|
CVE-2024-9674,0,0,99b8206db3c3741ff50725aa3969c36280edf4a37082b6473da1336e00a39d59,2024-10-22T14:02:50.473000
|
||||||
@ -270123,7 +270126,7 @@ CVE-2024-9676,0,0,1897b84483cd6c89b04e83ecacec899f569bb352f44e2b4ce92e396a9b4e4b
|
|||||||
CVE-2024-9677,0,0,944e049c847e061867c66e6b586a0cd99260b04bc2e2059d736567bf47cae00c,2024-10-23T15:12:34.673000
|
CVE-2024-9677,0,0,944e049c847e061867c66e6b586a0cd99260b04bc2e2059d736567bf47cae00c,2024-10-23T15:12:34.673000
|
||||||
CVE-2024-9680,0,0,1340ffd522c0f98d94e438210e293691db5000f0c9358d314e16255a4e3643c8,2024-11-18T19:15:05.853000
|
CVE-2024-9680,0,0,1340ffd522c0f98d94e438210e293691db5000f0c9358d314e16255a4e3643c8,2024-11-18T19:15:05.853000
|
||||||
CVE-2024-9681,0,0,5184b45d0c5be56c6e66f5f4d21584d3fd220046fb9bac6604ac868b54d81bd8,2024-11-06T18:17:17.287000
|
CVE-2024-9681,0,0,5184b45d0c5be56c6e66f5f4d21584d3fd220046fb9bac6604ac868b54d81bd8,2024-11-06T18:17:17.287000
|
||||||
CVE-2024-9682,0,0,75407b3c90c4cc5de15f8d94b112a96c95f23c932b7e7d251fb761382ea8f8af,2024-11-13T17:01:16.850000
|
CVE-2024-9682,0,1,2122d85927443e1998d90f1dfaf0e30f87a59df9f9140f4f34d3cb7460150d67,2024-11-19T15:47:07.517000
|
||||||
CVE-2024-9683,0,0,a648737766df3deb74ddc86e7dcd00883598b7b3c943d9054e11451b5f185407,2024-10-18T12:52:33.507000
|
CVE-2024-9683,0,0,a648737766df3deb74ddc86e7dcd00883598b7b3c943d9054e11451b5f185407,2024-10-18T12:52:33.507000
|
||||||
CVE-2024-9685,0,0,a93c724a8b2ee6ce4a46c54a35028c939ad55b1fb441a5b479f473edc57de420,2024-10-15T14:30:00.483000
|
CVE-2024-9685,0,0,a93c724a8b2ee6ce4a46c54a35028c939ad55b1fb441a5b479f473edc57de420,2024-10-15T14:30:00.483000
|
||||||
CVE-2024-9686,0,0,8a91e1ae5070fa70337820c934475166fa3e061411ab7464abf260ed961a0668,2024-11-06T16:19:04.333000
|
CVE-2024-9686,0,0,8a91e1ae5070fa70337820c934475166fa3e061411ab7464abf260ed961a0668,2024-11-06T16:19:04.333000
|
||||||
@ -270141,7 +270144,7 @@ CVE-2024-9756,0,0,8173cad728731052b89b4b59f3b4da8665b01e9fe6a8b575d907d967b2da64
|
|||||||
CVE-2024-9772,0,0,0d1b30d428fb6796ba367d377c6619e6bf9b25cc03796237a99e8a8d275b84f3,2024-10-28T13:58:09.230000
|
CVE-2024-9772,0,0,0d1b30d428fb6796ba367d377c6619e6bf9b25cc03796237a99e8a8d275b84f3,2024-10-28T13:58:09.230000
|
||||||
CVE-2024-9775,0,0,e3916d71ec9dd0d5246614a59a1cb4484a6342794b8a5103a7b8b237fed4d20b,2024-11-12T13:56:24.513000
|
CVE-2024-9775,0,0,e3916d71ec9dd0d5246614a59a1cb4484a6342794b8a5103a7b8b237fed4d20b,2024-11-12T13:56:24.513000
|
||||||
CVE-2024-9776,0,0,82a616b68a2c5818c813f35d61772c622935aa1b119f178b9eaa21355bac63d9,2024-10-15T12:57:46.880000
|
CVE-2024-9776,0,0,82a616b68a2c5818c813f35d61772c622935aa1b119f178b9eaa21355bac63d9,2024-10-15T12:57:46.880000
|
||||||
CVE-2024-9777,1,1,19b139ad7dcd6fccfeb635876a4cf8731bb5d59162a8950e9feb0f7c70c4529b,2024-11-19T13:15:04.850000
|
CVE-2024-9777,0,0,19b139ad7dcd6fccfeb635876a4cf8731bb5d59162a8950e9feb0f7c70c4529b,2024-11-19T13:15:04.850000
|
||||||
CVE-2024-9778,0,0,0fe7ee5860b89dbc53027fbdd06b191ad5c5e349a3553ba6bc5769975646dd12,2024-10-15T12:57:46.880000
|
CVE-2024-9778,0,0,0fe7ee5860b89dbc53027fbdd06b191ad5c5e349a3553ba6bc5769975646dd12,2024-10-15T12:57:46.880000
|
||||||
CVE-2024-9780,0,0,82a65b59c0bb0f4aa37b7bc9835ace6b2d8eb95b730adf88705db9589433fda5,2024-10-17T14:18:18.433000
|
CVE-2024-9780,0,0,82a65b59c0bb0f4aa37b7bc9835ace6b2d8eb95b730adf88705db9589433fda5,2024-10-17T14:18:18.433000
|
||||||
CVE-2024-9781,0,0,cd6f657ed9ef660338f0d777935f231b52aede3f9edb8681363de05250c2257d,2024-10-10T12:51:56.987000
|
CVE-2024-9781,0,0,cd6f657ed9ef660338f0d777935f231b52aede3f9edb8681363de05250c2257d,2024-10-10T12:51:56.987000
|
||||||
@ -270187,7 +270190,7 @@ CVE-2024-9825,0,0,43f77069eab20c6659796a5ca73cb04eb18b719fa0ad0721704c789de71379
|
|||||||
CVE-2024-9826,0,0,c03e2e0710a5712915ae2341fa5030e5bd74d5917743f7fdf85c043b115b921d,2024-11-01T16:17:10.620000
|
CVE-2024-9826,0,0,c03e2e0710a5712915ae2341fa5030e5bd74d5917743f7fdf85c043b115b921d,2024-11-01T16:17:10.620000
|
||||||
CVE-2024-9827,0,0,c5e7676b9d011eef0934f8d1e51cd92697f77495088547784042162cb4944824,2024-11-01T16:17:07.187000
|
CVE-2024-9827,0,0,c5e7676b9d011eef0934f8d1e51cd92697f77495088547784042162cb4944824,2024-11-01T16:17:07.187000
|
||||||
CVE-2024-9829,0,0,ea980a1e481fc86407edeb6f0040d6f4a6ff2d17edcbe8d18dd95381292ad49b,2024-10-25T16:30:44.520000
|
CVE-2024-9829,0,0,ea980a1e481fc86407edeb6f0040d6f4a6ff2d17edcbe8d18dd95381292ad49b,2024-10-25T16:30:44.520000
|
||||||
CVE-2024-9830,1,1,c466e8da0db30e41d5f5f4af952931114240163fd91e6216b7b894fd7be529e6,2024-11-19T13:15:05.107000
|
CVE-2024-9830,0,0,c466e8da0db30e41d5f5f4af952931114240163fd91e6216b7b894fd7be529e6,2024-11-19T13:15:05.107000
|
||||||
CVE-2024-9832,0,0,f83569141ad467d0d58d6d102fc2c3d41921b26196f3d65ebeb4a5f0b165400e,2024-11-15T13:58:08.913000
|
CVE-2024-9832,0,0,f83569141ad467d0d58d6d102fc2c3d41921b26196f3d65ebeb4a5f0b165400e,2024-11-15T13:58:08.913000
|
||||||
CVE-2024-9834,0,0,58a96ed6d2e0276f3eaa10de898ae35fd311ab0f6605b68b83724fedae743534,2024-11-15T13:58:08.913000
|
CVE-2024-9834,0,0,58a96ed6d2e0276f3eaa10de898ae35fd311ab0f6605b68b83724fedae743534,2024-11-15T13:58:08.913000
|
||||||
CVE-2024-9835,0,0,ca18e7b41fab9b483950f5f59199903f1b661b24923c7a18a4c44cf7bcb08f14,2024-11-12T15:35:17.853000
|
CVE-2024-9835,0,0,ca18e7b41fab9b483950f5f59199903f1b661b24923c7a18a4c44cf7bcb08f14,2024-11-12T15:35:17.853000
|
||||||
|
Can't render this file because it is too large.
|
Loading…
x
Reference in New Issue
Block a user