mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-09-17 18:45:49 +00:00
Auto-Update: 2024-08-15T23:55:17.544518+00:00
This commit is contained in:
parent
1721cddc63
commit
fa6328298e
@ -2,13 +2,13 @@
|
||||
"id": "CVE-2023-20971",
|
||||
"sourceIdentifier": "security@android.com",
|
||||
"published": "2023-03-24T20:15:10.913",
|
||||
"lastModified": "2023-06-28T18:15:11.803",
|
||||
"lastModified": "2024-08-15T22:15:05.817",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "In updatePermissionTreeSourcePackage of PermissionManagerServiceImpl.java, there is a possible way to obtain dangerous permissions without user consent due to a logic error in the code. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-13Android ID: A-225880325"
|
||||
"value": "In removePermission of PermissionManagerServiceImpl.java, there is a possible way to obtain dangerous permissions without user consent due to a logic error in the code. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
@ -66,7 +66,11 @@
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://source.android.com/security/bulletin/pixel/2023-06-01",
|
||||
"url": "https://android.googlesource.com/platform/frameworks/base/+/6c22d6c1e69676c5c68d21928aa5486bfd1bd131",
|
||||
"source": "security@android.com"
|
||||
},
|
||||
{
|
||||
"url": "https://source.android.com/security/bulletin/2024-08-01",
|
||||
"source": "security@android.com"
|
||||
}
|
||||
]
|
||||
|
@ -2,13 +2,13 @@
|
||||
"id": "CVE-2023-21351",
|
||||
"sourceIdentifier": "security@android.com",
|
||||
"published": "2023-10-30T17:15:51.303",
|
||||
"lastModified": "2023-11-04T03:22:15.930",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2024-08-15T22:15:05.977",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "In Activity Manager, there is a possible background activity launch due to a logic error in the code. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation."
|
||||
"value": "In multiple locations, there is a possible background activity launch due to a logic error in the code. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
@ -70,11 +70,12 @@
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://source.android.com/docs/security/bulletin/android-14",
|
||||
"source": "security@android.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
"url": "https://android.googlesource.com/platform/frameworks/base/+/26522c0e82fd3a9bcbd01409217291d97dcdabcf",
|
||||
"source": "security@android.com"
|
||||
},
|
||||
{
|
||||
"url": "https://source.android.com/security/bulletin/2024-08-01",
|
||||
"source": "security@android.com"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-0084",
|
||||
"sourceIdentifier": "psirt@nvidia.com",
|
||||
"published": "2024-06-13T22:15:11.220",
|
||||
"lastModified": "2024-06-17T12:43:31.090",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-08-15T22:00:16.147",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -17,6 +17,26 @@
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 7.8,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 5.9
|
||||
},
|
||||
{
|
||||
"source": "psirt@nvidia.com",
|
||||
"type": "Secondary",
|
||||
@ -40,6 +60,16 @@
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "NVD-CWE-Other"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "psirt@nvidia.com",
|
||||
"type": "Secondary",
|
||||
@ -51,10 +81,105 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:nvidia:virtual_gpu:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "13.11",
|
||||
"matchCriteriaId": "44592EFE-8D69-4B7F-B089-A612B5217199"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:nvidia:virtual_gpu:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "14.0",
|
||||
"versionEndExcluding": "16.6",
|
||||
"matchCriteriaId": "A5CBF021-7A5A-412A-BBC2-EB75C6343BB1"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:nvidia:virtual_gpu:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "17.0",
|
||||
"versionEndExcluding": "17.2",
|
||||
"matchCriteriaId": "2DFC08A7-3121-4D8F-88A6-9304C173A439"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:o:canonical:ubuntu_linux:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "019A2188-0877-45DE-8512-F0BF70DD179C"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:o:citrix:hypervisor:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "F7AE5C32-E060-44BA-8C13-3D73204191EE"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:o:redhat:enterprise_linux_kernel-based_virtual_machine:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "06C8B1C5-6401-45F9-8D3E-47E32067F428"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:o:vmware:vsphere:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "8E4A22C5-B3E1-4106-997C-D1C845F2C1EE"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:nvidia:cloud_gaming:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "555.52.04",
|
||||
"matchCriteriaId": "699C6D58-B26C-4F27-A1BD-A1A80E0D6A36"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:o:redhat:enterprise_linux_kernel-based_virtual_machine:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "06C8B1C5-6401-45F9-8D3E-47E32067F428"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:o:vmware:vsphere:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "8E4A22C5-B3E1-4106-997C-D1C845F2C1EE"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://nvidia.custhelp.com/app/answers/detail/a_id/5551",
|
||||
"source": "psirt@nvidia.com"
|
||||
"source": "psirt@nvidia.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-0085",
|
||||
"sourceIdentifier": "psirt@nvidia.com",
|
||||
"published": "2024-06-13T22:15:11.483",
|
||||
"lastModified": "2024-06-17T12:43:31.090",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-08-15T22:03:21.767",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -17,6 +17,26 @@
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 7.8,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 5.9
|
||||
},
|
||||
{
|
||||
"source": "psirt@nvidia.com",
|
||||
"type": "Secondary",
|
||||
@ -40,6 +60,16 @@
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "NVD-CWE-Other"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "psirt@nvidia.com",
|
||||
"type": "Secondary",
|
||||
@ -51,10 +81,133 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:nvidia:virtual_gpu:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "13.11",
|
||||
"matchCriteriaId": "44592EFE-8D69-4B7F-B089-A612B5217199"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:nvidia:virtual_gpu:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "14.0",
|
||||
"versionEndExcluding": "16.6",
|
||||
"matchCriteriaId": "A5CBF021-7A5A-412A-BBC2-EB75C6343BB1"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:nvidia:virtual_gpu:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "17.0",
|
||||
"versionEndExcluding": "17.2",
|
||||
"matchCriteriaId": "2DFC08A7-3121-4D8F-88A6-9304C173A439"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:a:vmware:vsphere:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "A83E0A15-0D3D-453F-B11F-F0B493ECD208"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:o:canonical:ubuntu_linux:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "019A2188-0877-45DE-8512-F0BF70DD179C"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:o:citrix:hypervisor:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "F7AE5C32-E060-44BA-8C13-3D73204191EE"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:o:redhat:enterprise_linux_kernel-based_virtual_machine:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "06C8B1C5-6401-45F9-8D3E-47E32067F428"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:nvidia:cloud_gaming:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "555.52.04",
|
||||
"matchCriteriaId": "699C6D58-B26C-4F27-A1BD-A1A80E0D6A36"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:o:redhat:enterprise_linux_kernel-based_virtual_machine:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "06C8B1C5-6401-45F9-8D3E-47E32067F428"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:o:vmware:vsphere:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "8E4A22C5-B3E1-4106-997C-D1C845F2C1EE"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:nvidia:virtual_gpu:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "17.2",
|
||||
"matchCriteriaId": "6907E2B7-9C1A-4964-A6D3-CF16E376B91E"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:a:microsoft:azure_stack_hci:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "1CF31A34-9492-498F-8A78-F233C0075CB2"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://nvidia.custhelp.com/app/answers/detail/a_id/5551",
|
||||
"source": "psirt@nvidia.com"
|
||||
"source": "psirt@nvidia.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-0086",
|
||||
"sourceIdentifier": "psirt@nvidia.com",
|
||||
"published": "2024-06-13T22:15:11.717",
|
||||
"lastModified": "2024-06-17T12:43:31.090",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-08-15T22:05:10.547",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -17,6 +17,26 @@
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 5.5,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 3.6
|
||||
},
|
||||
{
|
||||
"source": "psirt@nvidia.com",
|
||||
"type": "Secondary",
|
||||
@ -40,6 +60,16 @@
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-476"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "psirt@nvidia.com",
|
||||
"type": "Secondary",
|
||||
@ -51,10 +81,105 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:nvidia:virtual_gpu:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "13.11",
|
||||
"matchCriteriaId": "44592EFE-8D69-4B7F-B089-A612B5217199"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:nvidia:virtual_gpu:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "14.0",
|
||||
"versionEndExcluding": "16.6",
|
||||
"matchCriteriaId": "A5CBF021-7A5A-412A-BBC2-EB75C6343BB1"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:nvidia:virtual_gpu:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "17.0",
|
||||
"versionEndExcluding": "17.2",
|
||||
"matchCriteriaId": "2DFC08A7-3121-4D8F-88A6-9304C173A439"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:o:canonical:ubuntu_linux:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "019A2188-0877-45DE-8512-F0BF70DD179C"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:o:citrix:hypervisor:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "F7AE5C32-E060-44BA-8C13-3D73204191EE"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:o:redhat:enterprise_linux_kernel-based_virtual_machine:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "06C8B1C5-6401-45F9-8D3E-47E32067F428"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:o:vmware:vsphere:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "8E4A22C5-B3E1-4106-997C-D1C845F2C1EE"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:nvidia:cloud_gaming:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "555.52.04",
|
||||
"matchCriteriaId": "699C6D58-B26C-4F27-A1BD-A1A80E0D6A36"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:o:redhat:enterprise_linux_kernel-based_virtual_machine:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "06C8B1C5-6401-45F9-8D3E-47E32067F428"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:o:vmware:vsphere:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "8E4A22C5-B3E1-4106-997C-D1C845F2C1EE"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://nvidia.custhelp.com/app/answers/detail/a_id/5551",
|
||||
"source": "psirt@nvidia.com"
|
||||
"source": "psirt@nvidia.com",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-0089",
|
||||
"sourceIdentifier": "psirt@nvidia.com",
|
||||
"published": "2024-06-13T22:15:11.940",
|
||||
"lastModified": "2024-06-17T12:43:31.090",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-08-15T22:08:51.187",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -17,6 +17,26 @@
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 7.8,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 5.9
|
||||
},
|
||||
{
|
||||
"source": "psirt@nvidia.com",
|
||||
"type": "Secondary",
|
||||
@ -40,6 +60,16 @@
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-665"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "psirt@nvidia.com",
|
||||
"type": "Secondary",
|
||||
@ -51,10 +81,160 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:nvidia:gpu_display_driver:*:*:*:*:*:windows:*:*",
|
||||
"versionStartIncluding": "470",
|
||||
"versionEndExcluding": "475.06",
|
||||
"matchCriteriaId": "32EB51D2-1F34-4D1D-8B23-4029E350140F"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:nvidia:gpu_display_driver:*:*:*:*:*:windows:*:*",
|
||||
"versionStartIncluding": "535",
|
||||
"versionEndExcluding": "538.67",
|
||||
"matchCriteriaId": "6A930DF9-CB95-4BE4-999C-D75AB2C8C4AC"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:nvidia:gpu_display_driver:*:*:*:*:*:windows:*:*",
|
||||
"versionStartIncluding": "550",
|
||||
"versionEndExcluding": "552.55",
|
||||
"matchCriteriaId": "5C44719A-BFA0-479C-97D4-26301F4E2C63"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:nvidia:gpu_display_driver:*:*:*:*:*:windows:*:*",
|
||||
"versionStartIncluding": "555",
|
||||
"versionEndExcluding": "555.99",
|
||||
"matchCriteriaId": "940E9BEA-9FBE-4E3B-A79D-111C52653E5F"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:a:nvidia:geforce:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "24DE5CC2-3787-4605-8EFA-77590E36E960"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:a:nvidia:nvs:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "333646B0-AAD5-4DD7-8940-6334D0A8E77C"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:a:nvidia:quadro:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "A1DB9FB5-E115-4E96-98F8-3FAFAC120E98"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:a:nvidia:rtx:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "08C63EA1-8719-4F5C-922A-C77ED4CEF7C7"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:a:nvidia:studio:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "C1ED5DE2-7677-4F38-8177-3BF0B3D03A09"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:a:nvidia:tesla:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "D135086F-CA5E-4242-ACBA-C3AC82F4BE03"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:nvidia:virtual_gpu:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "13.11",
|
||||
"matchCriteriaId": "44592EFE-8D69-4B7F-B089-A612B5217199"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:nvidia:virtual_gpu:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "14.0",
|
||||
"versionEndExcluding": "16.6",
|
||||
"matchCriteriaId": "A5CBF021-7A5A-412A-BBC2-EB75C6343BB1"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:nvidia:virtual_gpu:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "17.0",
|
||||
"versionEndExcluding": "17.2",
|
||||
"matchCriteriaId": "2DFC08A7-3121-4D8F-88A6-9304C173A439"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "A2572D17-1DE6-457B-99CC-64AFD54487EA"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:nvidia:cloud_gaming:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "555.99",
|
||||
"matchCriteriaId": "5C8E669A-9DE1-42BD-94B1-98437BB66002"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "A2572D17-1DE6-457B-99CC-64AFD54487EA"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://nvidia.custhelp.com/app/answers/detail/a_id/5551",
|
||||
"source": "psirt@nvidia.com"
|
||||
"source": "psirt@nvidia.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-0090",
|
||||
"sourceIdentifier": "psirt@nvidia.com",
|
||||
"published": "2024-06-13T22:15:12.170",
|
||||
"lastModified": "2024-06-17T12:43:31.090",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-08-15T22:17:49.847",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -17,6 +17,26 @@
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 7.8,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 5.9
|
||||
},
|
||||
{
|
||||
"source": "psirt@nvidia.com",
|
||||
"type": "Secondary",
|
||||
@ -40,6 +60,16 @@
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-787"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "psirt@nvidia.com",
|
||||
"type": "Secondary",
|
||||
@ -51,10 +81,321 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:nvidia:gpu_display_driver:*:*:*:*:*:windows:*:*",
|
||||
"versionStartIncluding": "470",
|
||||
"versionEndExcluding": "475.06",
|
||||
"matchCriteriaId": "32EB51D2-1F34-4D1D-8B23-4029E350140F"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:nvidia:gpu_display_driver:*:*:*:*:*:windows:*:*",
|
||||
"versionStartIncluding": "535",
|
||||
"versionEndExcluding": "538.67",
|
||||
"matchCriteriaId": "6A930DF9-CB95-4BE4-999C-D75AB2C8C4AC"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:nvidia:gpu_display_driver:*:*:*:*:*:windows:*:*",
|
||||
"versionStartIncluding": "550",
|
||||
"versionEndExcluding": "552.55",
|
||||
"matchCriteriaId": "5C44719A-BFA0-479C-97D4-26301F4E2C63"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:nvidia:gpu_display_driver:*:*:*:*:*:windows:*:*",
|
||||
"versionStartIncluding": "555",
|
||||
"versionEndExcluding": "555.99",
|
||||
"matchCriteriaId": "940E9BEA-9FBE-4E3B-A79D-111C52653E5F"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:a:nvidia:geforce:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "24DE5CC2-3787-4605-8EFA-77590E36E960"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:a:nvidia:nvs:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "333646B0-AAD5-4DD7-8940-6334D0A8E77C"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:a:nvidia:quadro:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "A1DB9FB5-E115-4E96-98F8-3FAFAC120E98"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:a:nvidia:rtx:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "08C63EA1-8719-4F5C-922A-C77ED4CEF7C7"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:a:nvidia:studio:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "C1ED5DE2-7677-4F38-8177-3BF0B3D03A09"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:a:nvidia:tesla:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "D135086F-CA5E-4242-ACBA-C3AC82F4BE03"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:nvidia:gpu_display_driver:*:*:*:*:*:linux:*:*",
|
||||
"versionStartIncluding": "470",
|
||||
"versionEndExcluding": "470.256.02",
|
||||
"matchCriteriaId": "D66C0B72-0A3F-4D61-8BF5-B0BED03014E0"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:nvidia:gpu_display_driver:*:*:*:*:*:linux:*:*",
|
||||
"versionStartIncluding": "535",
|
||||
"versionEndExcluding": "535.180.01",
|
||||
"matchCriteriaId": "3EC43E03-3909-4AB5-A9FD-198E55167AD2"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:nvidia:gpu_display_driver:*:*:*:*:*:linux:*:*",
|
||||
"versionStartIncluding": "550",
|
||||
"versionEndExcluding": "550.90.07",
|
||||
"matchCriteriaId": "9BEA1462-AA33-4ED9-91CD-737525B9E2C4"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:nvidia:gpu_display_driver:*:*:*:*:*:linux:*:*",
|
||||
"versionStartIncluding": "555",
|
||||
"versionEndExcluding": "555.52.04",
|
||||
"matchCriteriaId": "B0AB9E55-DB20-4FA4-8900-61C224514B49"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:a:nvidia:geforce:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "24DE5CC2-3787-4605-8EFA-77590E36E960"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:a:nvidia:nvs:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "333646B0-AAD5-4DD7-8940-6334D0A8E77C"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:a:nvidia:quadro:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "A1DB9FB5-E115-4E96-98F8-3FAFAC120E98"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:a:nvidia:rtx:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "08C63EA1-8719-4F5C-922A-C77ED4CEF7C7"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:a:nvidia:tesla:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "D135086F-CA5E-4242-ACBA-C3AC82F4BE03"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:nvidia:virtual_gpu:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "13.11",
|
||||
"matchCriteriaId": "44592EFE-8D69-4B7F-B089-A612B5217199"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:nvidia:virtual_gpu:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "14.0",
|
||||
"versionEndExcluding": "16.6",
|
||||
"matchCriteriaId": "A5CBF021-7A5A-412A-BBC2-EB75C6343BB1"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:nvidia:virtual_gpu:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "17.0",
|
||||
"versionEndExcluding": "17.2",
|
||||
"matchCriteriaId": "2DFC08A7-3121-4D8F-88A6-9304C173A439"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:o:canonical:ubuntu_linux:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "019A2188-0877-45DE-8512-F0BF70DD179C"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:o:citrix:hypervisor:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "F7AE5C32-E060-44BA-8C13-3D73204191EE"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "703AF700-7A70-47E2-BC3A-7FD03B3CA9C1"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "A2572D17-1DE6-457B-99CC-64AFD54487EA"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:o:redhat:enterprise_linux_kernel-based_virtual_machine:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "06C8B1C5-6401-45F9-8D3E-47E32067F428"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:o:vmware:vsphere:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "8E4A22C5-B3E1-4106-997C-D1C845F2C1EE"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:nvidia:cloud_gaming:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "555.99",
|
||||
"matchCriteriaId": "5C8E669A-9DE1-42BD-94B1-98437BB66002"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "A2572D17-1DE6-457B-99CC-64AFD54487EA"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:nvidia:cloud_gaming:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "555.52.04",
|
||||
"matchCriteriaId": "699C6D58-B26C-4F27-A1BD-A1A80E0D6A36"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "703AF700-7A70-47E2-BC3A-7FD03B3CA9C1"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:o:redhat:enterprise_linux_kernel-based_virtual_machine:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "06C8B1C5-6401-45F9-8D3E-47E32067F428"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:o:vmware:vsphere:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "8E4A22C5-B3E1-4106-997C-D1C845F2C1EE"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:nvidia:virtual_gpu:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "17.2",
|
||||
"matchCriteriaId": "6907E2B7-9C1A-4964-A6D3-CF16E376B91E"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:a:microsoft:azure_stack_hci:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "1CF31A34-9492-498F-8A78-F233C0075CB2"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://nvidia.custhelp.com/app/answers/detail/a_id/5551",
|
||||
"source": "psirt@nvidia.com"
|
||||
"source": "psirt@nvidia.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-0091",
|
||||
"sourceIdentifier": "psirt@nvidia.com",
|
||||
"published": "2024-06-13T22:15:12.430",
|
||||
"lastModified": "2024-06-17T12:43:31.090",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-08-15T22:20:16.097",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -17,6 +17,26 @@
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 7.8,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 5.9
|
||||
},
|
||||
{
|
||||
"source": "psirt@nvidia.com",
|
||||
"type": "Secondary",
|
||||
@ -40,6 +60,16 @@
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "NVD-CWE-Other"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "psirt@nvidia.com",
|
||||
"type": "Secondary",
|
||||
@ -51,10 +81,293 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:nvidia:gpu_display_driver:*:*:*:*:*:windows:*:*",
|
||||
"versionStartIncluding": "550",
|
||||
"versionEndExcluding": "552.55",
|
||||
"matchCriteriaId": "5C44719A-BFA0-479C-97D4-26301F4E2C63"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:nvidia:gpu_display_driver:*:*:*:*:*:windows:*:*",
|
||||
"versionStartIncluding": "555",
|
||||
"versionEndExcluding": "555.99",
|
||||
"matchCriteriaId": "940E9BEA-9FBE-4E3B-A79D-111C52653E5F"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:a:nvidia:geforce:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "24DE5CC2-3787-4605-8EFA-77590E36E960"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:a:nvidia:nvs:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "333646B0-AAD5-4DD7-8940-6334D0A8E77C"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:a:nvidia:quadro:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "A1DB9FB5-E115-4E96-98F8-3FAFAC120E98"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:a:nvidia:rtx:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "08C63EA1-8719-4F5C-922A-C77ED4CEF7C7"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:a:nvidia:studio:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "C1ED5DE2-7677-4F38-8177-3BF0B3D03A09"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:a:nvidia:tesla:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "D135086F-CA5E-4242-ACBA-C3AC82F4BE03"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:nvidia:gpu_display_driver:*:*:*:*:*:linux:*:*",
|
||||
"versionStartIncluding": "550",
|
||||
"versionEndExcluding": "550.90.07",
|
||||
"matchCriteriaId": "9BEA1462-AA33-4ED9-91CD-737525B9E2C4"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:nvidia:gpu_display_driver:*:*:*:*:*:linux:*:*",
|
||||
"versionStartIncluding": "555",
|
||||
"versionEndExcluding": "555.52.04",
|
||||
"matchCriteriaId": "B0AB9E55-DB20-4FA4-8900-61C224514B49"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:a:nvidia:geforce:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "24DE5CC2-3787-4605-8EFA-77590E36E960"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:a:nvidia:nvs:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "333646B0-AAD5-4DD7-8940-6334D0A8E77C"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:a:nvidia:quadro:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "A1DB9FB5-E115-4E96-98F8-3FAFAC120E98"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:a:nvidia:rtx:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "08C63EA1-8719-4F5C-922A-C77ED4CEF7C7"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:a:nvidia:tesla:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "D135086F-CA5E-4242-ACBA-C3AC82F4BE03"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:nvidia:virtual_gpu:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "13.11",
|
||||
"matchCriteriaId": "44592EFE-8D69-4B7F-B089-A612B5217199"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:nvidia:virtual_gpu:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "14.0",
|
||||
"versionEndExcluding": "16.6",
|
||||
"matchCriteriaId": "A5CBF021-7A5A-412A-BBC2-EB75C6343BB1"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:nvidia:virtual_gpu:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "17.0",
|
||||
"versionEndExcluding": "17.2",
|
||||
"matchCriteriaId": "2DFC08A7-3121-4D8F-88A6-9304C173A439"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:o:canonical:ubuntu_linux:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "019A2188-0877-45DE-8512-F0BF70DD179C"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:o:citrix:hypervisor:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "F7AE5C32-E060-44BA-8C13-3D73204191EE"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "703AF700-7A70-47E2-BC3A-7FD03B3CA9C1"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "A2572D17-1DE6-457B-99CC-64AFD54487EA"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:o:redhat:enterprise_linux_kernel-based_virtual_machine:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "06C8B1C5-6401-45F9-8D3E-47E32067F428"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:o:vmware:vsphere:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "8E4A22C5-B3E1-4106-997C-D1C845F2C1EE"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:nvidia:cloud_gaming:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "555.99",
|
||||
"matchCriteriaId": "5C8E669A-9DE1-42BD-94B1-98437BB66002"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "A2572D17-1DE6-457B-99CC-64AFD54487EA"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:nvidia:cloud_gaming:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "555.52.04",
|
||||
"matchCriteriaId": "699C6D58-B26C-4F27-A1BD-A1A80E0D6A36"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "703AF700-7A70-47E2-BC3A-7FD03B3CA9C1"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:o:redhat:enterprise_linux_kernel-based_virtual_machine:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "06C8B1C5-6401-45F9-8D3E-47E32067F428"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:o:vmware:vsphere:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "8E4A22C5-B3E1-4106-997C-D1C845F2C1EE"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:nvidia:virtual_gpu:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "17.2",
|
||||
"matchCriteriaId": "6907E2B7-9C1A-4964-A6D3-CF16E376B91E"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:a:microsoft:azure_stack_hci:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "1CF31A34-9492-498F-8A78-F233C0075CB2"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://nvidia.custhelp.com/app/answers/detail/a_id/5551",
|
||||
"source": "psirt@nvidia.com"
|
||||
"source": "psirt@nvidia.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-0092",
|
||||
"sourceIdentifier": "psirt@nvidia.com",
|
||||
"published": "2024-06-13T22:15:12.647",
|
||||
"lastModified": "2024-06-17T12:43:31.090",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-08-15T22:22:52.747",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -17,6 +17,26 @@
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 5.5,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 3.6
|
||||
},
|
||||
{
|
||||
"source": "psirt@nvidia.com",
|
||||
"type": "Secondary",
|
||||
@ -40,6 +60,16 @@
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "NVD-CWE-noinfo"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "psirt@nvidia.com",
|
||||
"type": "Secondary",
|
||||
@ -51,10 +81,283 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:nvidia:gpu_display_driver:*:*:*:*:*:windows:*:*",
|
||||
"versionStartIncluding": "470",
|
||||
"versionEndExcluding": "475.06",
|
||||
"matchCriteriaId": "32EB51D2-1F34-4D1D-8B23-4029E350140F"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:nvidia:gpu_display_driver:*:*:*:*:*:windows:*:*",
|
||||
"versionStartIncluding": "535",
|
||||
"versionEndExcluding": "538.67",
|
||||
"matchCriteriaId": "6A930DF9-CB95-4BE4-999C-D75AB2C8C4AC"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:nvidia:gpu_display_driver:*:*:*:*:*:windows:*:*",
|
||||
"versionStartIncluding": "550",
|
||||
"versionEndExcluding": "552.55",
|
||||
"matchCriteriaId": "5C44719A-BFA0-479C-97D4-26301F4E2C63"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:nvidia:gpu_display_driver:*:*:*:*:*:windows:*:*",
|
||||
"versionStartIncluding": "555",
|
||||
"versionEndExcluding": "555.99",
|
||||
"matchCriteriaId": "940E9BEA-9FBE-4E3B-A79D-111C52653E5F"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:a:nvidia:geforce:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "24DE5CC2-3787-4605-8EFA-77590E36E960"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:a:nvidia:nvs:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "333646B0-AAD5-4DD7-8940-6334D0A8E77C"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:a:nvidia:quadro:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "A1DB9FB5-E115-4E96-98F8-3FAFAC120E98"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:a:nvidia:rtx:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "08C63EA1-8719-4F5C-922A-C77ED4CEF7C7"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:a:nvidia:studio:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "C1ED5DE2-7677-4F38-8177-3BF0B3D03A09"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:a:nvidia:tesla:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "D135086F-CA5E-4242-ACBA-C3AC82F4BE03"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:nvidia:gpu_display_driver:*:*:*:*:*:linux:*:*",
|
||||
"versionStartIncluding": "470",
|
||||
"versionEndExcluding": "470.256.02",
|
||||
"matchCriteriaId": "D66C0B72-0A3F-4D61-8BF5-B0BED03014E0"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:nvidia:gpu_display_driver:*:*:*:*:*:linux:*:*",
|
||||
"versionStartIncluding": "535",
|
||||
"versionEndExcluding": "535.180.01",
|
||||
"matchCriteriaId": "3EC43E03-3909-4AB5-A9FD-198E55167AD2"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:nvidia:gpu_display_driver:*:*:*:*:*:linux:*:*",
|
||||
"versionStartIncluding": "550",
|
||||
"versionEndExcluding": "550.90.07",
|
||||
"matchCriteriaId": "9BEA1462-AA33-4ED9-91CD-737525B9E2C4"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:nvidia:gpu_display_driver:*:*:*:*:*:linux:*:*",
|
||||
"versionStartIncluding": "555",
|
||||
"versionEndExcluding": "555.52.04",
|
||||
"matchCriteriaId": "B0AB9E55-DB20-4FA4-8900-61C224514B49"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:a:nvidia:geforce:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "24DE5CC2-3787-4605-8EFA-77590E36E960"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:a:nvidia:nvs:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "333646B0-AAD5-4DD7-8940-6334D0A8E77C"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:a:nvidia:quadro:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "A1DB9FB5-E115-4E96-98F8-3FAFAC120E98"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:a:nvidia:rtx:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "08C63EA1-8719-4F5C-922A-C77ED4CEF7C7"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:a:nvidia:tesla:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "D135086F-CA5E-4242-ACBA-C3AC82F4BE03"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:nvidia:virtual_gpu:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "13.11",
|
||||
"matchCriteriaId": "44592EFE-8D69-4B7F-B089-A612B5217199"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:nvidia:virtual_gpu:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "14.0",
|
||||
"versionEndExcluding": "16.6",
|
||||
"matchCriteriaId": "A5CBF021-7A5A-412A-BBC2-EB75C6343BB1"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:nvidia:virtual_gpu:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "17.0",
|
||||
"versionEndExcluding": "17.2",
|
||||
"matchCriteriaId": "2DFC08A7-3121-4D8F-88A6-9304C173A439"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:o:canonical:ubuntu_linux:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "019A2188-0877-45DE-8512-F0BF70DD179C"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:o:citrix:hypervisor:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "F7AE5C32-E060-44BA-8C13-3D73204191EE"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:o:redhat:enterprise_linux_kernel-based_virtual_machine:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "06C8B1C5-6401-45F9-8D3E-47E32067F428"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:o:vmware:vsphere:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "8E4A22C5-B3E1-4106-997C-D1C845F2C1EE"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:nvidia:cloud_gaming:*:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "29526088-0276-428D-AD82-F3F91666A9DA"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:nvidia:cloud_gaming:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "555.52.04",
|
||||
"matchCriteriaId": "699C6D58-B26C-4F27-A1BD-A1A80E0D6A36"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:o:redhat:enterprise_linux_kernel-based_virtual_machine:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "06C8B1C5-6401-45F9-8D3E-47E32067F428"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:o:vmware:vsphere:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "8E4A22C5-B3E1-4106-997C-D1C845F2C1EE"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:nvidia:virtual_gpu:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "17.2",
|
||||
"matchCriteriaId": "6907E2B7-9C1A-4964-A6D3-CF16E376B91E"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:a:microsoft:azure_stack_hci:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "1CF31A34-9492-498F-8A78-F233C0075CB2"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://nvidia.custhelp.com/app/answers/detail/a_id/5551",
|
||||
"source": "psirt@nvidia.com"
|
||||
"source": "psirt@nvidia.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-0093",
|
||||
"sourceIdentifier": "psirt@nvidia.com",
|
||||
"published": "2024-06-13T22:15:12.863",
|
||||
"lastModified": "2024-06-17T12:43:31.090",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-08-15T22:23:20.247",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -17,6 +17,26 @@
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 5.5,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 3.6
|
||||
},
|
||||
{
|
||||
"source": "psirt@nvidia.com",
|
||||
"type": "Secondary",
|
||||
@ -40,6 +60,16 @@
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "NVD-CWE-noinfo"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "psirt@nvidia.com",
|
||||
"type": "Secondary",
|
||||
@ -51,10 +81,105 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:nvidia:virtual_gpu:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "13.11",
|
||||
"matchCriteriaId": "44592EFE-8D69-4B7F-B089-A612B5217199"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:nvidia:virtual_gpu:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "14.0",
|
||||
"versionEndExcluding": "16.6",
|
||||
"matchCriteriaId": "A5CBF021-7A5A-412A-BBC2-EB75C6343BB1"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:nvidia:virtual_gpu:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "17.0",
|
||||
"versionEndExcluding": "17.2",
|
||||
"matchCriteriaId": "2DFC08A7-3121-4D8F-88A6-9304C173A439"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:o:canonical:ubuntu_linux:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "019A2188-0877-45DE-8512-F0BF70DD179C"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:o:citrix:hypervisor:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "F7AE5C32-E060-44BA-8C13-3D73204191EE"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:o:redhat:enterprise_linux_kernel-based_virtual_machine:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "06C8B1C5-6401-45F9-8D3E-47E32067F428"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:o:vmware:vsphere:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "8E4A22C5-B3E1-4106-997C-D1C845F2C1EE"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:nvidia:cloud_gaming:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "555.52.04",
|
||||
"matchCriteriaId": "699C6D58-B26C-4F27-A1BD-A1A80E0D6A36"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:o:redhat:enterprise_linux_kernel-based_virtual_machine:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "06C8B1C5-6401-45F9-8D3E-47E32067F428"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:o:vmware:vsphere:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "8E4A22C5-B3E1-4106-997C-D1C845F2C1EE"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://nvidia.custhelp.com/app/answers/detail/a_id/5551",
|
||||
"source": "psirt@nvidia.com"
|
||||
"source": "psirt@nvidia.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,13 +2,13 @@
|
||||
"id": "CVE-2024-21302",
|
||||
"sourceIdentifier": "secure@microsoft.com",
|
||||
"published": "2024-08-08T02:15:37.827",
|
||||
"lastModified": "2024-08-14T05:15:12.820",
|
||||
"lastModified": "2024-08-15T23:15:06.727",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Summary:\nMicrosoft was notified that an elevation of privilege vulnerability exists in Windows based systems supporting Virtualization Based Security (VBS), including a subset of Azure Virtual Machine SKUS. This vulnerability enables an attacker with administrator privileges to replace current versions of Windows system files with outdated versions. By exploiting this vulnerability, an attacker could reintroduce previously mitigated vulnerabilities, circumvent some features of VBS, and exfiltrate data protected by VBS.\nMicrosoft is developing a security update to mitigate this threat, but it is not yet available. Guidance to help customers reduce the risks associated with this vulnerability and to protect their systems until the mitigation is available in a Windows security update is provided in the Recommended Actions section of this CVE.\nThis CVE will be updated when the mitigation is available in a Windows security update. We highly encourage customers to subscribe to Security Update Guide notifications to receive an alert when this update occurs.\nUpdate: August 13, 2024\nMicrosoft has released the August 2024 security updates that include an opt-in revocation policy mitigation to address this vulnerability. Customers running affected versions of Windows are encouraged to review KB5042562: Guidance for blocking rollback of virtualization-based security related updates to assess if this opt-in policy meets the needs of their environment before implementing this mitigation. There are risks associated with this mitigation that should be understood prior to applying it to your systems. Detailed information about these risks is also available in KB5042562.\nDetails:\nA security researcher informed Microsoft of an elevation of privilege vulnerability in Windows 10, Windows 11, Windows Server 2016, and higher based systems including Azure Virtual Machines (VM) that support VBS. For more information on Windows versions and VM SKUs supporting VBS, reference: Virtualization-based Security (VBS) | Microsoft Learn.\nThe vulnerability enables an attacker with administrator privileges on the target system to replace current Windows system files with outdated versions. Successful exploitation provides an attacker with the ability to reintroduce previously mitigated vulnerabilities, circumvent VBS security features, and exfiltrate data protected by VBS.\nMicrosoft is developing a security update that will revoke outdated, unpatched VBS system files to mitigate this vulnerability, but it is not yet available. Due to the complexity of blocking such a large quantity of files, rigorous testing is required to avoid integration failures or regressions. This CVE will be updated with new information and links to security updates once available. For more information see Microsoft Technical Security Notifications and Security Update Guide Notification System News: Create your profile now \u2013 Microsoft Security Response Center\nMicrosoft is not aware of any attempts to exploit this vulnerability. However, a public presentation regarding this vulnerability was hosted at BlackHat on August 7, 2024. The presentation was appropriately coordinated with Microsoft but may change the threat landscape. Customers concerned with these risks should reference the guidance provided in the Recommended Actions section to protect their systems.\nRecommended Actions:\nMicrosoft has released an opt-in mitigation available as an interim solution to help protect customers concerned about this vulnerability until the final mitigation is available in a security update.\n\nFor Windows 10 1809 and later, Windows 11 version 21H2 and later, and Windows Server 2019 and later, administrators can deploy a Microsoft-signed revocation policy (SkuSiPolicy.p7b) to block vulnerable, unpatched versions of VBS system files from being loaded by the operating system. For more information, refer to KB5042562: Guidance for blocking rollback of virtualization-based security related..."
|
||||
"value": "Summary:\nMicrosoft was notified that an elevation of privilege vulnerability exists in Windows based systems supporting Virtualization Based Security (VBS), including a subset of Azure Virtual Machine SKUS. This vulnerability enables an attacker with administrator privileges to replace current versions of Windows system files with outdated versions. By exploiting this vulnerability, an attacker could reintroduce previously mitigated vulnerabilities, circumvent some features of VBS, and exfiltrate data protected by VBS.\nMicrosoft is developing a security update to mitigate this threat, but it is not yet available. Guidance to help customers reduce the risks associated with this vulnerability and to protect their systems until the mitigation is available in a Windows security update is provided in the Recommended Actions section of this CVE.\nThis CVE will be updated when the mitigation is available in a Windows security update. We highly encourage customers to subscribe to Security Update Guide notifications to receive an alert when this update occurs.\nUpdate: August 13, 2024\nMicrosoft has released the August 2024 security updates that include an opt-in revocation policy mitigation to address this vulnerability. Customers running affected versions of Windows are encouraged to review KB5042562: Guidance for blocking rollback of virtualization-based security related updates to assess if this opt-in policy meets the needs of their environment before implementing this mitigation. There are risks associated with this mitigation that should be understood prior to applying it to your systems. Detailed information about these risks is also available in KB5042562.\nDetails:\nA security researcher informed Microsoft of an elevation of privilege vulnerability in Windows 10, Windows 11, Windows Server 2016, and higher based systems including Azure Virtual Machines (VM) that support VBS. For more information on Windows versions and VM SKUs supporting VBS, reference: Virtualization-based Security (VBS) | Microsoft Learn.\nThe vulnerability enables an attacker with administrator privileges on the target system to replace current Windows system files with outdated versions. Successful exploitation provides an attacker with the ability to reintroduce previously mitigated vulnerabilities, circumvent VBS security features, and exfiltrate data protected by VBS.\nMicrosoft is developing a security update that will revoke outdated, unpatched VBS system files to mitigate this vulnerability, but it is not yet available. Due to the complexity of blocking such a large quantity of files, rigorous testing is required to avoid integration failures or regressions. This CVE will be updated with new information and links to the security updates once available. We highly encourage customers subscribe to Security Update Guide notifications to be alerted of updates. For more information see Microsoft Technical Security Notifications and Security Update Guide Notification System News: Create your profile now \u2013 Microsoft Security Response Center\nMicrosoft is not aware of any attempts to exploit this vulnerability. However, a public presentation regarding this vulnerability was hosted at BlackHat on August 7, 2024. The presentation was appropriately coordinated with Microsoft but may change the threat landscape. Customers concerned with these risks should reference the guidance provided in the Recommended Actions section to protect their systems.\nRecommended Actions:\nMicrosoft has released an opt-in mitigation available as an interim solution to help protect customers concerned about this vulnerability until the final mitigation is available in a security update.\n\nFor Windows 10 1809 and later, Windows 11 version 21H2 and later, and Windows Server 2019 and later, administrators can deploy a Microsoft-signed revocation policy (SkuSiPolicy.p7b) to block vulnerable, unpatched versions of VBS system files from being loaded by the operating system. For more information, refer to KB5042562: Guidance for blocking rollback of virtualization-based security related..."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
|
21
CVE-2024/CVE-2024-313xx/CVE-2024-31333.json
Normal file
21
CVE-2024/CVE-2024-313xx/CVE-2024-31333.json
Normal file
@ -0,0 +1,21 @@
|
||||
{
|
||||
"id": "CVE-2024-31333",
|
||||
"sourceIdentifier": "security@android.com",
|
||||
"published": "2024-08-15T22:15:06.123",
|
||||
"lastModified": "2024-08-15T22:15:06.123",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "In _MMU_AllocLevel of mmu_common.c, there is a possible arbitrary code execution due to an integer overflow. This could lead to local escalation of privilege in the kernel with no additional execution privileges needed. User interaction is not needed for exploitation."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://source.android.com/security/bulletin/2024-08-01",
|
||||
"source": "security@android.com"
|
||||
}
|
||||
]
|
||||
}
|
25
CVE-2024/CVE-2024-347xx/CVE-2024-34727.json
Normal file
25
CVE-2024/CVE-2024-347xx/CVE-2024-34727.json
Normal file
@ -0,0 +1,25 @@
|
||||
{
|
||||
"id": "CVE-2024-34727",
|
||||
"sourceIdentifier": "security@android.com",
|
||||
"published": "2024-08-15T22:15:06.190",
|
||||
"lastModified": "2024-08-15T22:15:06.190",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "In sdpu_compare_uuid_with_attr of sdp_utils.cc, there is a possible out of bounds read due to a heap buffer overflow. This could lead to remote information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://android.googlesource.com/platform/packages/modules/Bluetooth/+/6afad4b377b5bc3f38b28296e746b674173f99d8",
|
||||
"source": "security@android.com"
|
||||
},
|
||||
{
|
||||
"url": "https://source.android.com/security/bulletin/2024-08-01",
|
||||
"source": "security@android.com"
|
||||
}
|
||||
]
|
||||
}
|
41
CVE-2024/CVE-2024-347xx/CVE-2024-34731.json
Normal file
41
CVE-2024/CVE-2024-347xx/CVE-2024-34731.json
Normal file
@ -0,0 +1,41 @@
|
||||
{
|
||||
"id": "CVE-2024-34731",
|
||||
"sourceIdentifier": "security@android.com",
|
||||
"published": "2024-08-15T22:15:06.263",
|
||||
"lastModified": "2024-08-15T22:15:06.263",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "In multiple functions of TranscodingResourcePolicy.cpp, there is a possible memory corruption due to a race condition. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://android.googlesource.com/platform/frameworks/av/+/4b68b00993849b6a7f0e6d075bc2c8bb2e184e61",
|
||||
"source": "security@android.com"
|
||||
},
|
||||
{
|
||||
"url": "https://android.googlesource.com/platform/hardware/interfaces/+/0ff19d1f89614fce9454fb415bcbfcbcf3caf76e",
|
||||
"source": "security@android.com"
|
||||
},
|
||||
{
|
||||
"url": "https://android.googlesource.com/platform/hardware/interfaces/+/d63d09261806f7f1aa01406867f2a9e169356fca",
|
||||
"source": "security@android.com"
|
||||
},
|
||||
{
|
||||
"url": "https://android.googlesource.com/platform/system/nfc/+/1037992b9abcde1e3560bd895f62644a68563b3d",
|
||||
"source": "security@android.com"
|
||||
},
|
||||
{
|
||||
"url": "https://android.googlesource.com/platform/system/security/+/d3805312d73433e34ef69a645b553a2969c5dc93",
|
||||
"source": "security@android.com"
|
||||
},
|
||||
{
|
||||
"url": "https://source.android.com/security/bulletin/2024-08-01",
|
||||
"source": "security@android.com"
|
||||
}
|
||||
]
|
||||
}
|
25
CVE-2024/CVE-2024-347xx/CVE-2024-34734.json
Normal file
25
CVE-2024/CVE-2024-347xx/CVE-2024-34734.json
Normal file
@ -0,0 +1,25 @@
|
||||
{
|
||||
"id": "CVE-2024-34734",
|
||||
"sourceIdentifier": "security@android.com",
|
||||
"published": "2024-08-15T22:15:06.337",
|
||||
"lastModified": "2024-08-15T22:15:06.337",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "In onForegroundServiceButtonClicked of FooterActionsViewModel.kt, there is a possible way to disable the active VPN app from the lockscreen due to an insecure default value. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://android.googlesource.com/platform/frameworks/base/+/207584fb6f820eba14251251d7e9331bfd57adb8",
|
||||
"source": "security@android.com"
|
||||
},
|
||||
{
|
||||
"url": "https://source.android.com/security/bulletin/2024-08-01",
|
||||
"source": "security@android.com"
|
||||
}
|
||||
]
|
||||
}
|
25
CVE-2024/CVE-2024-347xx/CVE-2024-34736.json
Normal file
25
CVE-2024/CVE-2024-347xx/CVE-2024-34736.json
Normal file
@ -0,0 +1,25 @@
|
||||
{
|
||||
"id": "CVE-2024-34736",
|
||||
"sourceIdentifier": "security@android.com",
|
||||
"published": "2024-08-15T22:15:06.400",
|
||||
"lastModified": "2024-08-15T22:15:06.400",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "In setupVideoEncoder of StagefrightRecorder.cpp, there is a possible asynchronous playback when B-frame support is enabled. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://android.googlesource.com/platform/frameworks/av/+/6cfd048292b2cc706811a22c9078208cfa8e6d24",
|
||||
"source": "security@android.com"
|
||||
},
|
||||
{
|
||||
"url": "https://source.android.com/security/bulletin/2024-08-01",
|
||||
"source": "security@android.com"
|
||||
}
|
||||
]
|
||||
}
|
25
CVE-2024/CVE-2024-347xx/CVE-2024-34737.json
Normal file
25
CVE-2024/CVE-2024-347xx/CVE-2024-34737.json
Normal file
@ -0,0 +1,25 @@
|
||||
{
|
||||
"id": "CVE-2024-34737",
|
||||
"sourceIdentifier": "security@android.com",
|
||||
"published": "2024-08-15T22:15:06.467",
|
||||
"lastModified": "2024-08-15T22:15:06.467",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "In ensureSetPipAspectRatioQuotaTracker of ActivityClientController.java, there is a possible way to generate unmovable and undeletable pip windows due to a logic error in the code. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://android.googlesource.com/platform/frameworks/base/+/8b473b3f79642f42eeeffbfe572df6c6cbe9d79e",
|
||||
"source": "security@android.com"
|
||||
},
|
||||
{
|
||||
"url": "https://source.android.com/security/bulletin/2024-08-01",
|
||||
"source": "security@android.com"
|
||||
}
|
||||
]
|
||||
}
|
25
CVE-2024/CVE-2024-347xx/CVE-2024-34738.json
Normal file
25
CVE-2024/CVE-2024-347xx/CVE-2024-34738.json
Normal file
@ -0,0 +1,25 @@
|
||||
{
|
||||
"id": "CVE-2024-34738",
|
||||
"sourceIdentifier": "security@android.com",
|
||||
"published": "2024-08-15T22:15:06.623",
|
||||
"lastModified": "2024-08-15T22:15:06.623",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "In multiple functions of AppOpsService.java, there is a possible way for unprivileged apps to read their own restrictRead app-op states due to a logic error in the code. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://android.googlesource.com/platform/frameworks/base/+/21d764807b3dcd402d63e2b4c9fbae1c9965400a",
|
||||
"source": "security@android.com"
|
||||
},
|
||||
{
|
||||
"url": "https://source.android.com/security/bulletin/2024-08-01",
|
||||
"source": "security@android.com"
|
||||
}
|
||||
]
|
||||
}
|
25
CVE-2024/CVE-2024-347xx/CVE-2024-34739.json
Normal file
25
CVE-2024/CVE-2024-347xx/CVE-2024-34739.json
Normal file
@ -0,0 +1,25 @@
|
||||
{
|
||||
"id": "CVE-2024-34739",
|
||||
"sourceIdentifier": "security@android.com",
|
||||
"published": "2024-08-15T22:15:06.690",
|
||||
"lastModified": "2024-08-15T22:15:06.690",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "In shouldRestrictOverlayActivities of UsbProfileGroupSettingsManager.java, there is a possible escape from SUW due to a logic error in the code. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is needed for exploitation."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://android.googlesource.com/platform/frameworks/base/+/50e1f8f36e32928d10e72324c05a203a6db9f7fb",
|
||||
"source": "security@android.com"
|
||||
},
|
||||
{
|
||||
"url": "https://source.android.com/security/bulletin/2024-08-01",
|
||||
"source": "security@android.com"
|
||||
}
|
||||
]
|
||||
}
|
29
CVE-2024/CVE-2024-347xx/CVE-2024-34740.json
Normal file
29
CVE-2024/CVE-2024-347xx/CVE-2024-34740.json
Normal file
@ -0,0 +1,29 @@
|
||||
{
|
||||
"id": "CVE-2024-34740",
|
||||
"sourceIdentifier": "security@android.com",
|
||||
"published": "2024-08-15T22:15:06.753",
|
||||
"lastModified": "2024-08-15T22:15:06.753",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "In attributeBytesBase64 and attributeBytesHex of BinaryXmlSerializer.java, there is a possible arbitrary XML injection due to an integer overflow. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://android.googlesource.com/platform/frameworks/base/+/e8b6505647be558ed3a167a1e13c53dfc227d22b",
|
||||
"source": "security@android.com"
|
||||
},
|
||||
{
|
||||
"url": "https://android.googlesource.com/platform/frameworks/libs/modules-utils/+/700c28908051ceb55e1456d2d21229bc17c6895a",
|
||||
"source": "security@android.com"
|
||||
},
|
||||
{
|
||||
"url": "https://source.android.com/security/bulletin/2024-08-01",
|
||||
"source": "security@android.com"
|
||||
}
|
||||
]
|
||||
}
|
25
CVE-2024/CVE-2024-347xx/CVE-2024-34741.json
Normal file
25
CVE-2024/CVE-2024-347xx/CVE-2024-34741.json
Normal file
@ -0,0 +1,25 @@
|
||||
{
|
||||
"id": "CVE-2024-34741",
|
||||
"sourceIdentifier": "security@android.com",
|
||||
"published": "2024-08-15T22:15:06.820",
|
||||
"lastModified": "2024-08-15T22:15:06.820",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "In setForceHideNonSystemOverlayWindowIfNeeded of WindowState.java, there is a possible way for message content to be visible on the screensaver while lock screen visibility settings are restricted by the user due to a logic error in the code. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://android.googlesource.com/platform/frameworks/base/+/abfaf702ef833dc4d374492d45c615c6e6de7f01",
|
||||
"source": "security@android.com"
|
||||
},
|
||||
{
|
||||
"url": "https://source.android.com/security/bulletin/2024-08-01",
|
||||
"source": "security@android.com"
|
||||
}
|
||||
]
|
||||
}
|
25
CVE-2024/CVE-2024-347xx/CVE-2024-34742.json
Normal file
25
CVE-2024/CVE-2024-347xx/CVE-2024-34742.json
Normal file
@ -0,0 +1,25 @@
|
||||
{
|
||||
"id": "CVE-2024-34742",
|
||||
"sourceIdentifier": "security@android.com",
|
||||
"published": "2024-08-15T22:15:06.890",
|
||||
"lastModified": "2024-08-15T22:15:06.890",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "In shouldWrite of OwnersData.java, there is a possible edge case that prevents MDM policies from being persisted due to a logic error in the code. This could lead to local denial of service with no additional execution privileges needed. User interaction is not needed for exploitation."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://android.googlesource.com/platform/frameworks/base/+/688e5c3012eb0a4ea88361588cf5026c10e4a42c",
|
||||
"source": "security@android.com"
|
||||
},
|
||||
{
|
||||
"url": "https://source.android.com/security/bulletin/2024-08-01",
|
||||
"source": "security@android.com"
|
||||
}
|
||||
]
|
||||
}
|
25
CVE-2024/CVE-2024-347xx/CVE-2024-34743.json
Normal file
25
CVE-2024/CVE-2024-347xx/CVE-2024-34743.json
Normal file
@ -0,0 +1,25 @@
|
||||
{
|
||||
"id": "CVE-2024-34743",
|
||||
"sourceIdentifier": "security@android.com",
|
||||
"published": "2024-08-15T22:15:06.957",
|
||||
"lastModified": "2024-08-15T22:15:06.957",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "In setTransactionState of SurfaceFlinger.cpp, there is a possible way to perform tapjacking due to a logic error in the code. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://android.googlesource.com/platform/frameworks/native/+/3f85323b27d95a57bfa87cbf68dd4a143f9f88ad",
|
||||
"source": "security@android.com"
|
||||
},
|
||||
{
|
||||
"url": "https://source.android.com/security/bulletin/2024-08-01",
|
||||
"source": "security@android.com"
|
||||
}
|
||||
]
|
||||
}
|
137
CVE-2024/CVE-2024-78xx/CVE-2024-7841.json
Normal file
137
CVE-2024/CVE-2024-78xx/CVE-2024-7841.json
Normal file
@ -0,0 +1,137 @@
|
||||
{
|
||||
"id": "CVE-2024-7841",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2024-08-15T22:15:07.020",
|
||||
"lastModified": "2024-08-15T22:15:07.020",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A vulnerability classified as critical was found in SourceCodester Clinics Patient Management System 1.0. This vulnerability affects unknown code of the file /pms/ajax/check_user_name.php. The manipulation of the argument user_name leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV40": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "4.0",
|
||||
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"attackRequirements": "NONE",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"vulnerableSystemConfidentiality": "LOW",
|
||||
"vulnerableSystemIntegrity": "LOW",
|
||||
"vulnerableSystemAvailability": "LOW",
|
||||
"subsequentSystemConfidentiality": "NONE",
|
||||
"subsequentSystemIntegrity": "NONE",
|
||||
"subsequentSystemAvailability": "NONE",
|
||||
"exploitMaturity": "NOT_DEFINED",
|
||||
"confidentialityRequirements": "NOT_DEFINED",
|
||||
"integrityRequirements": "NOT_DEFINED",
|
||||
"availabilityRequirements": "NOT_DEFINED",
|
||||
"modifiedAttackVector": "NOT_DEFINED",
|
||||
"modifiedAttackComplexity": "NOT_DEFINED",
|
||||
"modifiedAttackRequirements": "NOT_DEFINED",
|
||||
"modifiedPrivilegesRequired": "NOT_DEFINED",
|
||||
"modifiedUserInteraction": "NOT_DEFINED",
|
||||
"modifiedVulnerableSystemConfidentiality": "NOT_DEFINED",
|
||||
"modifiedVulnerableSystemIntegrity": "NOT_DEFINED",
|
||||
"modifiedVulnerableSystemAvailability": "NOT_DEFINED",
|
||||
"modifiedSubsequentSystemConfidentiality": "NOT_DEFINED",
|
||||
"modifiedSubsequentSystemIntegrity": "NOT_DEFINED",
|
||||
"modifiedSubsequentSystemAvailability": "NOT_DEFINED",
|
||||
"safety": "NOT_DEFINED",
|
||||
"automatable": "NOT_DEFINED",
|
||||
"recovery": "NOT_DEFINED",
|
||||
"valueDensity": "NOT_DEFINED",
|
||||
"vulnerabilityResponseEffort": "NOT_DEFINED",
|
||||
"providerUrgency": "NOT_DEFINED",
|
||||
"baseScore": 5.3,
|
||||
"baseSeverity": "MEDIUM"
|
||||
}
|
||||
}
|
||||
],
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "LOW",
|
||||
"baseScore": 6.3,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 3.4
|
||||
}
|
||||
],
|
||||
"cvssMetricV2": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "2.0",
|
||||
"vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P",
|
||||
"accessVector": "NETWORK",
|
||||
"accessComplexity": "LOW",
|
||||
"authentication": "SINGLE",
|
||||
"confidentialityImpact": "PARTIAL",
|
||||
"integrityImpact": "PARTIAL",
|
||||
"availabilityImpact": "PARTIAL",
|
||||
"baseScore": 6.5
|
||||
},
|
||||
"baseSeverity": "MEDIUM",
|
||||
"exploitabilityScore": 8.0,
|
||||
"impactScore": 6.4,
|
||||
"acInsufInfo": false,
|
||||
"obtainAllPrivilege": false,
|
||||
"obtainUserPrivilege": false,
|
||||
"obtainOtherPrivilege": false,
|
||||
"userInteractionRequired": false
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-89"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/qqlove555/cve/blob/main/sql.md",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.274744",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.274744",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?submit.391540",
|
||||
"source": "cna@vuldb.com"
|
||||
}
|
||||
]
|
||||
}
|
137
CVE-2024/CVE-2024-78xx/CVE-2024-7842.json
Normal file
137
CVE-2024/CVE-2024-78xx/CVE-2024-7842.json
Normal file
@ -0,0 +1,137 @@
|
||||
{
|
||||
"id": "CVE-2024-7842",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2024-08-15T22:15:07.310",
|
||||
"lastModified": "2024-08-15T22:15:07.310",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A vulnerability, which was classified as problematic, has been found in SourceCodester Online Graduate Tracer System 1.0. This issue affects some unknown processing of the file /tracking/admin/export_it.php. The manipulation leads to information disclosure. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV40": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "4.0",
|
||||
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"attackRequirements": "NONE",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"vulnerableSystemConfidentiality": "LOW",
|
||||
"vulnerableSystemIntegrity": "NONE",
|
||||
"vulnerableSystemAvailability": "NONE",
|
||||
"subsequentSystemConfidentiality": "NONE",
|
||||
"subsequentSystemIntegrity": "NONE",
|
||||
"subsequentSystemAvailability": "NONE",
|
||||
"exploitMaturity": "NOT_DEFINED",
|
||||
"confidentialityRequirements": "NOT_DEFINED",
|
||||
"integrityRequirements": "NOT_DEFINED",
|
||||
"availabilityRequirements": "NOT_DEFINED",
|
||||
"modifiedAttackVector": "NOT_DEFINED",
|
||||
"modifiedAttackComplexity": "NOT_DEFINED",
|
||||
"modifiedAttackRequirements": "NOT_DEFINED",
|
||||
"modifiedPrivilegesRequired": "NOT_DEFINED",
|
||||
"modifiedUserInteraction": "NOT_DEFINED",
|
||||
"modifiedVulnerableSystemConfidentiality": "NOT_DEFINED",
|
||||
"modifiedVulnerableSystemIntegrity": "NOT_DEFINED",
|
||||
"modifiedVulnerableSystemAvailability": "NOT_DEFINED",
|
||||
"modifiedSubsequentSystemConfidentiality": "NOT_DEFINED",
|
||||
"modifiedSubsequentSystemIntegrity": "NOT_DEFINED",
|
||||
"modifiedSubsequentSystemAvailability": "NOT_DEFINED",
|
||||
"safety": "NOT_DEFINED",
|
||||
"automatable": "NOT_DEFINED",
|
||||
"recovery": "NOT_DEFINED",
|
||||
"valueDensity": "NOT_DEFINED",
|
||||
"vulnerabilityResponseEffort": "NOT_DEFINED",
|
||||
"providerUrgency": "NOT_DEFINED",
|
||||
"baseScore": 6.9,
|
||||
"baseSeverity": "MEDIUM"
|
||||
}
|
||||
}
|
||||
],
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 5.3,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 1.4
|
||||
}
|
||||
],
|
||||
"cvssMetricV2": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "2.0",
|
||||
"vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
|
||||
"accessVector": "NETWORK",
|
||||
"accessComplexity": "LOW",
|
||||
"authentication": "NONE",
|
||||
"confidentialityImpact": "PARTIAL",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 5.0
|
||||
},
|
||||
"baseSeverity": "MEDIUM",
|
||||
"exploitabilityScore": 10.0,
|
||||
"impactScore": 2.9,
|
||||
"acInsufInfo": false,
|
||||
"obtainAllPrivilege": false,
|
||||
"obtainUserPrivilege": false,
|
||||
"obtainOtherPrivilege": false,
|
||||
"userInteractionRequired": false
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-200"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/Wsstiger/cve/blob/main/Tracer_info.md",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.274745",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.274745",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?submit.391562",
|
||||
"source": "cna@vuldb.com"
|
||||
}
|
||||
]
|
||||
}
|
137
CVE-2024/CVE-2024-78xx/CVE-2024-7843.json
Normal file
137
CVE-2024/CVE-2024-78xx/CVE-2024-7843.json
Normal file
@ -0,0 +1,137 @@
|
||||
{
|
||||
"id": "CVE-2024-7843",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2024-08-15T23:15:10.453",
|
||||
"lastModified": "2024-08-15T23:15:10.453",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A vulnerability, which was classified as problematic, was found in SourceCodester Online Graduate Tracer System 1.0. Affected is an unknown function of the file /tracking/admin/exportcs.php. The manipulation leads to information disclosure. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV40": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "4.0",
|
||||
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"attackRequirements": "NONE",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"vulnerableSystemConfidentiality": "LOW",
|
||||
"vulnerableSystemIntegrity": "NONE",
|
||||
"vulnerableSystemAvailability": "NONE",
|
||||
"subsequentSystemConfidentiality": "NONE",
|
||||
"subsequentSystemIntegrity": "NONE",
|
||||
"subsequentSystemAvailability": "NONE",
|
||||
"exploitMaturity": "NOT_DEFINED",
|
||||
"confidentialityRequirements": "NOT_DEFINED",
|
||||
"integrityRequirements": "NOT_DEFINED",
|
||||
"availabilityRequirements": "NOT_DEFINED",
|
||||
"modifiedAttackVector": "NOT_DEFINED",
|
||||
"modifiedAttackComplexity": "NOT_DEFINED",
|
||||
"modifiedAttackRequirements": "NOT_DEFINED",
|
||||
"modifiedPrivilegesRequired": "NOT_DEFINED",
|
||||
"modifiedUserInteraction": "NOT_DEFINED",
|
||||
"modifiedVulnerableSystemConfidentiality": "NOT_DEFINED",
|
||||
"modifiedVulnerableSystemIntegrity": "NOT_DEFINED",
|
||||
"modifiedVulnerableSystemAvailability": "NOT_DEFINED",
|
||||
"modifiedSubsequentSystemConfidentiality": "NOT_DEFINED",
|
||||
"modifiedSubsequentSystemIntegrity": "NOT_DEFINED",
|
||||
"modifiedSubsequentSystemAvailability": "NOT_DEFINED",
|
||||
"safety": "NOT_DEFINED",
|
||||
"automatable": "NOT_DEFINED",
|
||||
"recovery": "NOT_DEFINED",
|
||||
"valueDensity": "NOT_DEFINED",
|
||||
"vulnerabilityResponseEffort": "NOT_DEFINED",
|
||||
"providerUrgency": "NOT_DEFINED",
|
||||
"baseScore": 6.9,
|
||||
"baseSeverity": "MEDIUM"
|
||||
}
|
||||
}
|
||||
],
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 5.3,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 1.4
|
||||
}
|
||||
],
|
||||
"cvssMetricV2": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "2.0",
|
||||
"vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
|
||||
"accessVector": "NETWORK",
|
||||
"accessComplexity": "LOW",
|
||||
"authentication": "NONE",
|
||||
"confidentialityImpact": "PARTIAL",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 5.0
|
||||
},
|
||||
"baseSeverity": "MEDIUM",
|
||||
"exploitabilityScore": 10.0,
|
||||
"impactScore": 2.9,
|
||||
"acInsufInfo": false,
|
||||
"obtainAllPrivilege": false,
|
||||
"obtainUserPrivilege": false,
|
||||
"obtainOtherPrivilege": false,
|
||||
"userInteractionRequired": false
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-200"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/Wsstiger/cve/blob/main/Tracer_info2.md",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.274746",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.274746",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?submit.391563",
|
||||
"source": "cna@vuldb.com"
|
||||
}
|
||||
]
|
||||
}
|
137
CVE-2024/CVE-2024-78xx/CVE-2024-7844.json
Normal file
137
CVE-2024/CVE-2024-78xx/CVE-2024-7844.json
Normal file
@ -0,0 +1,137 @@
|
||||
{
|
||||
"id": "CVE-2024-7844",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2024-08-15T23:15:10.740",
|
||||
"lastModified": "2024-08-15T23:15:10.740",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A vulnerability has been found in SourceCodester Online Graduate Tracer System 1.0 and classified as problematic. Affected by this vulnerability is an unknown functionality of the file /tracking/admin/add_acc.php. The manipulation of the argument name/user/position leads to cross site scripting. The attack can be launched remotely. The exploit has been disclosed to the public and may be used."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV40": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "4.0",
|
||||
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"attackRequirements": "NONE",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"vulnerableSystemConfidentiality": "NONE",
|
||||
"vulnerableSystemIntegrity": "LOW",
|
||||
"vulnerableSystemAvailability": "NONE",
|
||||
"subsequentSystemConfidentiality": "NONE",
|
||||
"subsequentSystemIntegrity": "NONE",
|
||||
"subsequentSystemAvailability": "NONE",
|
||||
"exploitMaturity": "NOT_DEFINED",
|
||||
"confidentialityRequirements": "NOT_DEFINED",
|
||||
"integrityRequirements": "NOT_DEFINED",
|
||||
"availabilityRequirements": "NOT_DEFINED",
|
||||
"modifiedAttackVector": "NOT_DEFINED",
|
||||
"modifiedAttackComplexity": "NOT_DEFINED",
|
||||
"modifiedAttackRequirements": "NOT_DEFINED",
|
||||
"modifiedPrivilegesRequired": "NOT_DEFINED",
|
||||
"modifiedUserInteraction": "NOT_DEFINED",
|
||||
"modifiedVulnerableSystemConfidentiality": "NOT_DEFINED",
|
||||
"modifiedVulnerableSystemIntegrity": "NOT_DEFINED",
|
||||
"modifiedVulnerableSystemAvailability": "NOT_DEFINED",
|
||||
"modifiedSubsequentSystemConfidentiality": "NOT_DEFINED",
|
||||
"modifiedSubsequentSystemIntegrity": "NOT_DEFINED",
|
||||
"modifiedSubsequentSystemAvailability": "NOT_DEFINED",
|
||||
"safety": "NOT_DEFINED",
|
||||
"automatable": "NOT_DEFINED",
|
||||
"recovery": "NOT_DEFINED",
|
||||
"valueDensity": "NOT_DEFINED",
|
||||
"vulnerabilityResponseEffort": "NOT_DEFINED",
|
||||
"providerUrgency": "NOT_DEFINED",
|
||||
"baseScore": 5.3,
|
||||
"baseSeverity": "MEDIUM"
|
||||
}
|
||||
}
|
||||
],
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 3.5,
|
||||
"baseSeverity": "LOW"
|
||||
},
|
||||
"exploitabilityScore": 2.1,
|
||||
"impactScore": 1.4
|
||||
}
|
||||
],
|
||||
"cvssMetricV2": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "2.0",
|
||||
"vectorString": "AV:N/AC:L/Au:S/C:N/I:P/A:N",
|
||||
"accessVector": "NETWORK",
|
||||
"accessComplexity": "LOW",
|
||||
"authentication": "SINGLE",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "PARTIAL",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 4.0
|
||||
},
|
||||
"baseSeverity": "MEDIUM",
|
||||
"exploitabilityScore": 8.0,
|
||||
"impactScore": 2.9,
|
||||
"acInsufInfo": false,
|
||||
"obtainAllPrivilege": false,
|
||||
"obtainUserPrivilege": false,
|
||||
"obtainOtherPrivilege": false,
|
||||
"userInteractionRequired": false
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/Wsstiger/cve/blob/main/Tracer_XSS.md",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.274747",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.274747",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?submit.391566",
|
||||
"source": "cna@vuldb.com"
|
||||
}
|
||||
]
|
||||
}
|
72
README.md
72
README.md
@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours.
|
||||
### Last Repository Update
|
||||
|
||||
```plain
|
||||
2024-08-15T22:00:17.761064+00:00
|
||||
2024-08-15T23:55:17.544518+00:00
|
||||
```
|
||||
|
||||
### Most recent CVE Modification Timestamp synchronized with NVD
|
||||
|
||||
```plain
|
||||
2024-08-15T21:46:11.737000+00:00
|
||||
2024-08-15T23:15:10.740000+00:00
|
||||
```
|
||||
|
||||
### Last Data Feed Release
|
||||
@ -33,54 +33,46 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
|
||||
### Total Number of included CVEs
|
||||
|
||||
```plain
|
||||
260172
|
||||
260188
|
||||
```
|
||||
|
||||
### CVEs added in the last Commit
|
||||
|
||||
Recently added CVEs: `10`
|
||||
Recently added CVEs: `16`
|
||||
|
||||
- [CVE-2024-42487](CVE-2024/CVE-2024-424xx/CVE-2024-42487.json) (`2024-08-15T21:15:16.997`)
|
||||
- [CVE-2024-42488](CVE-2024/CVE-2024-424xx/CVE-2024-42488.json) (`2024-08-15T21:15:17.270`)
|
||||
- [CVE-2024-43366](CVE-2024/CVE-2024-433xx/CVE-2024-43366.json) (`2024-08-15T21:15:17.520`)
|
||||
- [CVE-2024-43367](CVE-2024/CVE-2024-433xx/CVE-2024-43367.json) (`2024-08-15T21:15:17.777`)
|
||||
- [CVE-2024-6456](CVE-2024/CVE-2024-64xx/CVE-2024-6456.json) (`2024-08-15T21:15:18.047`)
|
||||
- [CVE-2024-7838](CVE-2024/CVE-2024-78xx/CVE-2024-7838.json) (`2024-08-15T20:15:18.457`)
|
||||
- [CVE-2024-7839](CVE-2024/CVE-2024-78xx/CVE-2024-7839.json) (`2024-08-15T21:15:18.237`)
|
||||
- [CVE-2024-7866](CVE-2024/CVE-2024-78xx/CVE-2024-7866.json) (`2024-08-15T20:15:18.793`)
|
||||
- [CVE-2024-7867](CVE-2024/CVE-2024-78xx/CVE-2024-7867.json) (`2024-08-15T20:15:18.967`)
|
||||
- [CVE-2024-7868](CVE-2024/CVE-2024-78xx/CVE-2024-7868.json) (`2024-08-15T21:15:18.530`)
|
||||
- [CVE-2024-31333](CVE-2024/CVE-2024-313xx/CVE-2024-31333.json) (`2024-08-15T22:15:06.123`)
|
||||
- [CVE-2024-34727](CVE-2024/CVE-2024-347xx/CVE-2024-34727.json) (`2024-08-15T22:15:06.190`)
|
||||
- [CVE-2024-34731](CVE-2024/CVE-2024-347xx/CVE-2024-34731.json) (`2024-08-15T22:15:06.263`)
|
||||
- [CVE-2024-34734](CVE-2024/CVE-2024-347xx/CVE-2024-34734.json) (`2024-08-15T22:15:06.337`)
|
||||
- [CVE-2024-34736](CVE-2024/CVE-2024-347xx/CVE-2024-34736.json) (`2024-08-15T22:15:06.400`)
|
||||
- [CVE-2024-34737](CVE-2024/CVE-2024-347xx/CVE-2024-34737.json) (`2024-08-15T22:15:06.467`)
|
||||
- [CVE-2024-34738](CVE-2024/CVE-2024-347xx/CVE-2024-34738.json) (`2024-08-15T22:15:06.623`)
|
||||
- [CVE-2024-34739](CVE-2024/CVE-2024-347xx/CVE-2024-34739.json) (`2024-08-15T22:15:06.690`)
|
||||
- [CVE-2024-34740](CVE-2024/CVE-2024-347xx/CVE-2024-34740.json) (`2024-08-15T22:15:06.753`)
|
||||
- [CVE-2024-34741](CVE-2024/CVE-2024-347xx/CVE-2024-34741.json) (`2024-08-15T22:15:06.820`)
|
||||
- [CVE-2024-34742](CVE-2024/CVE-2024-347xx/CVE-2024-34742.json) (`2024-08-15T22:15:06.890`)
|
||||
- [CVE-2024-34743](CVE-2024/CVE-2024-347xx/CVE-2024-34743.json) (`2024-08-15T22:15:06.957`)
|
||||
- [CVE-2024-7841](CVE-2024/CVE-2024-78xx/CVE-2024-7841.json) (`2024-08-15T22:15:07.020`)
|
||||
- [CVE-2024-7842](CVE-2024/CVE-2024-78xx/CVE-2024-7842.json) (`2024-08-15T22:15:07.310`)
|
||||
- [CVE-2024-7843](CVE-2024/CVE-2024-78xx/CVE-2024-7843.json) (`2024-08-15T23:15:10.453`)
|
||||
- [CVE-2024-7844](CVE-2024/CVE-2024-78xx/CVE-2024-7844.json) (`2024-08-15T23:15:10.740`)
|
||||
|
||||
|
||||
### CVEs modified in the last Commit
|
||||
|
||||
Recently modified CVEs: `45`
|
||||
Recently modified CVEs: `11`
|
||||
|
||||
- [CVE-2024-27680](CVE-2024/CVE-2024-276xx/CVE-2024-27680.json) (`2024-08-15T21:35:11.063`)
|
||||
- [CVE-2024-28020](CVE-2024/CVE-2024-280xx/CVE-2024-28020.json) (`2024-08-15T21:32:33.467`)
|
||||
- [CVE-2024-28021](CVE-2024/CVE-2024-280xx/CVE-2024-28021.json) (`2024-08-15T21:29:46.697`)
|
||||
- [CVE-2024-28022](CVE-2024/CVE-2024-280xx/CVE-2024-28022.json) (`2024-08-15T21:44:20.677`)
|
||||
- [CVE-2024-28024](CVE-2024/CVE-2024-280xx/CVE-2024-28024.json) (`2024-08-15T21:46:11.737`)
|
||||
- [CVE-2024-28623](CVE-2024/CVE-2024-286xx/CVE-2024-28623.json) (`2024-08-15T21:35:11.883`)
|
||||
- [CVE-2024-28670](CVE-2024/CVE-2024-286xx/CVE-2024-28670.json) (`2024-08-15T20:35:07.023`)
|
||||
- [CVE-2024-28680](CVE-2024/CVE-2024-286xx/CVE-2024-28680.json) (`2024-08-15T20:35:07.960`)
|
||||
- [CVE-2024-28683](CVE-2024/CVE-2024-286xx/CVE-2024-28683.json) (`2024-08-15T20:35:08.767`)
|
||||
- [CVE-2024-29374](CVE-2024/CVE-2024-293xx/CVE-2024-29374.json) (`2024-08-15T20:35:09.683`)
|
||||
- [CVE-2024-29471](CVE-2024/CVE-2024-294xx/CVE-2024-29471.json) (`2024-08-15T20:35:10.563`)
|
||||
- [CVE-2024-30632](CVE-2024/CVE-2024-306xx/CVE-2024-30632.json) (`2024-08-15T20:35:11.387`)
|
||||
- [CVE-2024-30639](CVE-2024/CVE-2024-306xx/CVE-2024-30639.json) (`2024-08-15T20:35:12.280`)
|
||||
- [CVE-2024-38191](CVE-2024/CVE-2024-381xx/CVE-2024-38191.json) (`2024-08-15T20:58:12.813`)
|
||||
- [CVE-2024-38195](CVE-2024/CVE-2024-381xx/CVE-2024-38195.json) (`2024-08-15T20:56:25.100`)
|
||||
- [CVE-2024-38196](CVE-2024/CVE-2024-381xx/CVE-2024-38196.json) (`2024-08-15T20:54:50.510`)
|
||||
- [CVE-2024-38197](CVE-2024/CVE-2024-381xx/CVE-2024-38197.json) (`2024-08-15T20:40:58.547`)
|
||||
- [CVE-2024-38198](CVE-2024/CVE-2024-381xx/CVE-2024-38198.json) (`2024-08-15T20:39:20.260`)
|
||||
- [CVE-2024-38199](CVE-2024/CVE-2024-381xx/CVE-2024-38199.json) (`2024-08-15T20:32:42.193`)
|
||||
- [CVE-2024-38201](CVE-2024/CVE-2024-382xx/CVE-2024-38201.json) (`2024-08-15T20:30:00.737`)
|
||||
- [CVE-2024-38211](CVE-2024/CVE-2024-382xx/CVE-2024-38211.json) (`2024-08-15T20:29:19.557`)
|
||||
- [CVE-2024-38214](CVE-2024/CVE-2024-382xx/CVE-2024-38214.json) (`2024-08-15T20:28:25.893`)
|
||||
- [CVE-2024-38223](CVE-2024/CVE-2024-382xx/CVE-2024-38223.json) (`2024-08-15T20:18:28.240`)
|
||||
- [CVE-2024-39338](CVE-2024/CVE-2024-393xx/CVE-2024-39338.json) (`2024-08-15T20:35:13.427`)
|
||||
- [CVE-2024-40704](CVE-2024/CVE-2024-407xx/CVE-2024-40704.json) (`2024-08-15T20:03:13.530`)
|
||||
- [CVE-2023-20971](CVE-2023/CVE-2023-209xx/CVE-2023-20971.json) (`2024-08-15T22:15:05.817`)
|
||||
- [CVE-2023-21351](CVE-2023/CVE-2023-213xx/CVE-2023-21351.json) (`2024-08-15T22:15:05.977`)
|
||||
- [CVE-2024-0084](CVE-2024/CVE-2024-00xx/CVE-2024-0084.json) (`2024-08-15T22:00:16.147`)
|
||||
- [CVE-2024-0085](CVE-2024/CVE-2024-00xx/CVE-2024-0085.json) (`2024-08-15T22:03:21.767`)
|
||||
- [CVE-2024-0086](CVE-2024/CVE-2024-00xx/CVE-2024-0086.json) (`2024-08-15T22:05:10.547`)
|
||||
- [CVE-2024-0089](CVE-2024/CVE-2024-00xx/CVE-2024-0089.json) (`2024-08-15T22:08:51.187`)
|
||||
- [CVE-2024-0090](CVE-2024/CVE-2024-00xx/CVE-2024-0090.json) (`2024-08-15T22:17:49.847`)
|
||||
- [CVE-2024-0091](CVE-2024/CVE-2024-00xx/CVE-2024-0091.json) (`2024-08-15T22:20:16.097`)
|
||||
- [CVE-2024-0092](CVE-2024/CVE-2024-00xx/CVE-2024-0092.json) (`2024-08-15T22:22:52.747`)
|
||||
- [CVE-2024-0093](CVE-2024/CVE-2024-00xx/CVE-2024-0093.json) (`2024-08-15T22:23:20.247`)
|
||||
- [CVE-2024-21302](CVE-2024/CVE-2024-213xx/CVE-2024-21302.json) (`2024-08-15T23:15:06.727`)
|
||||
|
||||
|
||||
## Download and Usage
|
||||
|
148
_state.csv
148
_state.csv
@ -215075,7 +215075,7 @@ CVE-2023-20968,0,0,0593e274e5b52ee6771934e6e469a42d0bd47456ec2387701f9119e173a41
|
||||
CVE-2023-20969,0,0,b160d8b885d289b1f85223a944d11b7d380fdf1fde03b82f112f0e796c2fe523,2023-03-28T19:35:58.747000
|
||||
CVE-2023-2097,0,0,d09cb3c104dedf428e696f2a5cb54326b34cd90495c9a7cce84be619f12be408,2024-05-17T02:22:39.977000
|
||||
CVE-2023-20970,0,0,ef1ea87115db6310ea7a76ba7d54c8d3388b4632e02be6294aad0d6280b77c94,2023-03-28T19:35:42.523000
|
||||
CVE-2023-20971,0,0,1c2e8a6df0653c68baa541d592f4fe57dd6c54ac8ff3e6bd7fdcd1ef9cbe5be8,2023-06-28T18:15:11.803000
|
||||
CVE-2023-20971,0,1,90572d5a1c7f944bc3e53ca1af637d18aadb16c69079356dd23663f1417d61ec,2024-08-15T22:15:05.817000
|
||||
CVE-2023-20972,0,0,a3407678aaac2f5bd89628ba70850ccc381aa8a22dadd1ff6a3fbfff76b9dc4c,2023-06-28T18:15:11.877000
|
||||
CVE-2023-20973,0,0,c50c8a3ede5e78f4a5173995928da423fbe73e991efefe568b731edd02365e85,2023-06-28T18:15:11.943000
|
||||
CVE-2023-20974,0,0,6e6bea94a39b70db59271596adaee4e7f01db28e82a1d32e8c6b04a2c6f440ee,2023-06-28T18:15:12.007000
|
||||
@ -215475,7 +215475,7 @@ CVE-2023-21348,0,0,6536205321d5fe5c8ecb581d119686017cf544a48b45f9971c9987430c9d5
|
||||
CVE-2023-21349,0,0,6db4fdb58824ed6add2774434860256244faea3a5778dec5dee8a7389bbf3391,2023-11-03T18:59:35.570000
|
||||
CVE-2023-2135,0,0,4975a001fe13471f3f36bbc1a515f8a00221f54cd705ee38f3b61a934cb9f011,2023-10-20T20:53:18.983000
|
||||
CVE-2023-21350,0,0,190e6cfe06286946a16c7d06283fc13546904bc93f168f3bd1a752e5caa577dc,2023-11-04T03:22:37.570000
|
||||
CVE-2023-21351,0,0,bde66ae4cfee1163a82bcd816ff3f3b6a2ea7700b5abdf22265c7ebc7264b852,2023-11-04T03:22:15.930000
|
||||
CVE-2023-21351,0,1,e8a409ff20085cac260c3931894a69e60a8ecb955407043e6cf87afe466d1e44,2024-08-15T22:15:05.977000
|
||||
CVE-2023-21352,0,0,bf9bbc836531e62cddd0e2eb36967636a5feba7eeb8a8cc199d223cecbe99cd0,2023-11-04T03:22:08.317000
|
||||
CVE-2023-21353,0,0,c66984d1d99a5b13dc3ec131e5a274aa6bd6b74fe67d618fbf20f8803ecf6638,2023-11-04T03:22:00.393000
|
||||
CVE-2023-21354,0,0,d6461086ceeb0e8c3fc21b5518c694b08fab2af77c245181d061ef4d315b3c02,2023-11-04T03:21:47.663000
|
||||
@ -237091,7 +237091,7 @@ CVE-2023-4997,0,0,4afed0de14254e77a99b729070c5643ffbf1676389fe16cc856891c73125b6
|
||||
CVE-2023-49970,0,0,5502d6fa1c46a421a8d44ecff9c8db4116bf0ff4c0f42a9e95eba6058d2868c7,2024-03-05T13:41:01.900000
|
||||
CVE-2023-49971,0,0,374def7d9c689df8f58cc4989e4ea0ed3c5a8e848866980b25656660a7f6c663,2024-08-06T14:35:02.513000
|
||||
CVE-2023-49973,0,0,ca1ed5b6df9a46488025a136b2ec31b6790ba3cc516f6b9d8e6dd1ad7f0f7877,2024-03-06T15:18:08.093000
|
||||
CVE-2023-49974,0,1,083867d392522ad7619f542837964c1e212931b3849e0d016c825b75a8d2f854,2024-08-15T21:35:00.653000
|
||||
CVE-2023-49974,0,0,083867d392522ad7619f542837964c1e212931b3849e0d016c825b75a8d2f854,2024-08-15T21:35:00.653000
|
||||
CVE-2023-49976,0,0,b2b5a09955514926cb7972b7101cec2b04ca5d1f7f45f6c868e7087074f700e7,2024-03-06T15:18:08.093000
|
||||
CVE-2023-49977,0,0,aed154d4bf8ea5599b21c1e323a82e3dc2e828c1921d60bc14254ee66b176359,2024-03-06T15:18:08.093000
|
||||
CVE-2023-49978,0,0,255bd00c3d73b2dea40ba11475aa7facb0a30f1814b1a1bd06cd16bd820bf405,2024-08-03T20:35:02.260000
|
||||
@ -241005,16 +241005,16 @@ CVE-2024-0080,0,0,f6769690c2666f11c1424e97f6e58ae7e55c4683c29ac1139187f1c55a77c5
|
||||
CVE-2024-0081,0,0,1a679f72e4845d1a811c05ca00ebbbdbb905ceb8d7ef48bbc5ac1599b35a01be,2024-04-08T18:49:25.863000
|
||||
CVE-2024-0082,0,0,ce9143c638db70c8c26385b56567a33835e7016fe077f197bee030d5c72d6953,2024-04-09T12:48:04.090000
|
||||
CVE-2024-0083,0,0,775ef9ada9a038a0722ac6d7f9ad11b2376cae2e29dd60e4a728cf7eecbac3f1,2024-04-09T12:48:04.090000
|
||||
CVE-2024-0084,0,0,d040d235a886da6cd73020ce83cf7d33bd532a93c349a2a7804c86334c82d25f,2024-06-17T12:43:31.090000
|
||||
CVE-2024-0085,0,0,9c8defc833b7e92de910f7154d7b5a6e558b9da6f89ac12a36aee3834bad24d4,2024-06-17T12:43:31.090000
|
||||
CVE-2024-0086,0,0,8fd0c98d7f7e385bc4d7614c658b29e7f0019c6ca8fa767f466f318385d504b7,2024-06-17T12:43:31.090000
|
||||
CVE-2024-0084,0,1,3b0e89369ce1751f549cbc8f390baa24a7f12261a8e686c81832a54818b3c0e2,2024-08-15T22:00:16.147000
|
||||
CVE-2024-0085,0,1,8b830b873f1af126df2d22903bac02c490bf90af3b6cd04c56de1525e8c367ff,2024-08-15T22:03:21.767000
|
||||
CVE-2024-0086,0,1,9c2c1cea436bf67cddb2c576a9bcdcd4aa1a141f23da22f6322295a2121a5f0f,2024-08-15T22:05:10.547000
|
||||
CVE-2024-0087,0,0,ee4ec49a8c6f66ace623fc3cc46aad5218e7bd7ce6ac821a1ba859dace8ffec0,2024-05-14T16:13:02.773000
|
||||
CVE-2024-0088,0,0,c51c2fa370408ac9dadafbf3a08e15814979c02288c5ce3c426334da96087cf2,2024-05-14T16:13:02.773000
|
||||
CVE-2024-0089,0,0,b857965e7d9020788a4d9ff43f048466937065a2608a8a84e5eeb5a23d176d7f,2024-06-17T12:43:31.090000
|
||||
CVE-2024-0090,0,0,d0932eeb44825b6bf299ec6aaf3600cdc698b5d3009dc4ebddec62a8397b431b,2024-06-17T12:43:31.090000
|
||||
CVE-2024-0091,0,0,74d2d7d23d4fca25986e7ff317ebb3882207c213b8427e74fa6ce6796a7a1682,2024-06-17T12:43:31.090000
|
||||
CVE-2024-0092,0,0,7871e933ef9b46b3d1ce98010e4e25fe083d28b7ed3bec1bfc525d4664f0b3c5,2024-06-17T12:43:31.090000
|
||||
CVE-2024-0093,0,0,9e8c3e59f9c9ac5e697befb0c0d9e386074cfa9869724abb3f9586d98a90d6dd,2024-06-17T12:43:31.090000
|
||||
CVE-2024-0089,0,1,b356a120285bc1939b484809569cf3884e735309f3e458cb51981a234d2f8732,2024-08-15T22:08:51.187000
|
||||
CVE-2024-0090,0,1,66d9625bf06553a1195e03f2cbcc052acd7accb893aebd1c3f5f3c62a122e5b4,2024-08-15T22:17:49.847000
|
||||
CVE-2024-0091,0,1,945adbbd391135a4f0f04af841e8d7a109de63b97cf2361a4d5dccf97bad1cf2,2024-08-15T22:20:16.097000
|
||||
CVE-2024-0092,0,1,77c25dd7fe99a406318d27d0cc983d9c5d44c0efca6575118ed278113abb8554,2024-08-15T22:22:52.747000
|
||||
CVE-2024-0093,0,1,13c4bc707399b649a6f404289bc9802faf394b7474316e3739e9b5de35da0447,2024-08-15T22:23:20.247000
|
||||
CVE-2024-0094,0,0,9e7cffdfba1e4614e0ab501866a5a54ea72a17fc0cc2c50918de3cdf4ed9f3ba,2024-06-17T12:43:31.090000
|
||||
CVE-2024-0095,0,0,ff25aacb8117c141d07db85db39a98668feb5d2ce1fbc34c3c23906b636024fe,2024-06-17T12:43:31.090000
|
||||
CVE-2024-0096,0,0,57a8b4d9757f61cb650ca749e79c4580db5c56554907ccd97b1e10b1d2011d31,2024-05-14T16:13:02.773000
|
||||
@ -242831,9 +242831,9 @@ CVE-2024-20081,0,0,c71489cf0f2bedca59bdc5569ddfc23bc345fff8731fd4100ad31f358075b
|
||||
CVE-2024-20082,0,0,939e07ac5f7d9003c45edd70cf6af9d2fbc21054841b5895f6c66ae55e7316de,2024-08-14T15:35:04.003000
|
||||
CVE-2024-20083,0,0,52f24323029e3ba78b5348b46f1326d2ec4dbf8da62d0eef76d56966d5671c89,2024-08-14T13:00:48.243000
|
||||
CVE-2024-2009,0,0,e315bb187496fdfbd237809339603453c22bbf947712d2f37b8c2f26c500e401,2024-05-17T02:37:59.337000
|
||||
CVE-2024-2011,0,1,4150023a6f5b05ff7bb1f10e004dac522c292e22a6fa4bc68fed9003ca68fddf,2024-08-15T21:25:45.037000
|
||||
CVE-2024-2012,0,1,02707995e28bba3e21e37a0cc9698bd91832709b25d71785b53bd5ea8c9a7518,2024-08-15T21:19:03.770000
|
||||
CVE-2024-2013,0,1,00ec85b9018843d83179244785c9b4c96e5ba8e015239a21d2d4ac8bf1b712fa,2024-08-15T21:08:02.010000
|
||||
CVE-2024-2011,0,0,4150023a6f5b05ff7bb1f10e004dac522c292e22a6fa4bc68fed9003ca68fddf,2024-08-15T21:25:45.037000
|
||||
CVE-2024-2012,0,0,02707995e28bba3e21e37a0cc9698bd91832709b25d71785b53bd5ea8c9a7518,2024-08-15T21:19:03.770000
|
||||
CVE-2024-2013,0,0,00ec85b9018843d83179244785c9b4c96e5ba8e015239a21d2d4ac8bf1b712fa,2024-08-15T21:08:02.010000
|
||||
CVE-2024-2014,0,0,97c4d99afb7da491efaae3ff0fb6836102849098937eeb69745707d3dbc15b2d,2024-05-17T02:37:59.427000
|
||||
CVE-2024-2015,0,0,bb3d603120b99e575edb7baace469be8f767dc6e32ed33cf2700f4d2936e46ac,2024-05-17T02:37:59.517000
|
||||
CVE-2024-2016,0,0,8c172ad566a2e375a3ac2c22bb48a79ffa778559105a1fd5ded9fbaceb4cfb2c,2024-06-04T19:19:12.807000
|
||||
@ -243561,7 +243561,7 @@ CVE-2024-2127,0,0,fee555ba22c69f33931ace66815b77d0a5796e2ad55c5d25b843a412734e73
|
||||
CVE-2024-2128,0,0,ad241575873847a0cb8491370112d4603dbee504ed1e31d448d346ee3b31a6d6,2024-03-08T14:02:57.420000
|
||||
CVE-2024-2129,0,0,4e7afd99b608981f119f3e5da184ba51484f21aa33b32d2a6446850d6a9f1652,2024-03-20T13:00:16.367000
|
||||
CVE-2024-2130,0,0,949f4490e30f20ac86b94271cd74ebfff8857dc5306a19f843591857ffe5e5d6,2024-03-13T12:33:51.697000
|
||||
CVE-2024-21302,0,0,a518fe1d9cd41393a6627122cfb813ee38d87458b8806dd865a2a42bbf757410,2024-08-14T05:15:12.820000
|
||||
CVE-2024-21302,0,1,d9336565ea8df676235fa9f060c58bd7180b6aaf387827fbdd6b7b1c5f52675c,2024-08-15T23:15:06.727000
|
||||
CVE-2024-21303,0,0,d58ef53ce2250cc88ff41c4958354d161d0e089fca6702a30570cf750b5a8215,2024-07-09T18:18:38.713000
|
||||
CVE-2024-21304,0,0,aee35375e056bcda8357796076fddae312bf87811aac2cea1256e28fc4176e51,2024-06-11T15:15:58.253000
|
||||
CVE-2024-21305,0,0,53ae725a4db9001e5894d4654d0d4d95d10acc8936d902ba245a4100e59e1d3e,2024-06-11T15:15:58.433000
|
||||
@ -244699,7 +244699,7 @@ CVE-2024-22913,0,0,0c8b6c34e29795c7d7dae2efe2da07b63ec68a5280e3316e86b2a2826fa48
|
||||
CVE-2024-22914,0,0,a1b39b94972a65d744b75ca9176cb7fc53b2a7dcb9c255507add1ee70bdd4a9b,2024-01-25T15:25:00.303000
|
||||
CVE-2024-22915,0,0,58002f77f5b9ff7f33975074fb9cfcf4c4e1a939c3bae512fc22e732ac7275f5,2024-01-25T15:25:19.217000
|
||||
CVE-2024-22916,0,0,7fc468417d1b514ab55cd3ad532c732548e17e78a99d7d9891769c8cff354c44,2024-01-24T17:04:22.573000
|
||||
CVE-2024-22917,0,1,d827d36e2bae2c5ebdd29dede1f05f80c1087afddec129461640bf9812693ea9,2024-08-15T21:35:02.417000
|
||||
CVE-2024-22917,0,0,d827d36e2bae2c5ebdd29dede1f05f80c1087afddec129461640bf9812693ea9,2024-08-15T21:35:02.417000
|
||||
CVE-2024-22919,0,0,ab4482c61edecd1158b8763653952b1fb29fcb9f0c9aec13247fb053ecc1703e,2024-01-25T14:54:29.357000
|
||||
CVE-2024-22920,0,0,a4e70f8dc7ff196d0f8fe2f46b66b45084abe2c6743f3e5bb2a799094a7564be,2024-01-25T20:26:16.860000
|
||||
CVE-2024-22922,0,0,1ba32e986182936be0f21cbd2fe00d51afc7a660a8bd508ab3ea329b99649cd2,2024-01-29T15:58:07.447000
|
||||
@ -244818,7 +244818,7 @@ CVE-2024-23157,0,0,11b0d8091c8fa8dd11dadbcf1fbb903ad812d8f095800e3ccd96bef2996bf
|
||||
CVE-2024-23158,0,0,7c083896ae118c56bbbf5e942c8384ee2397bcd81ab6e0a549fde13b2ebb526d,2024-07-03T01:47:36.407000
|
||||
CVE-2024-23159,0,0,4caf10c46ce8846c250a24031e5b623ee32b37adaf5a74b6dad704236bf3795e,2024-07-03T01:47:36.637000
|
||||
CVE-2024-2316,0,0,b886d554fbb39a8ab156ebbf04afa7dff2abe542e80901fe75a178728a777e10,2024-05-17T02:38:09.927000
|
||||
CVE-2024-23168,0,1,516b014321b2d23dd5e11228b3f4c27201251a7b2e88523a0fca984a63e33e9a,2024-08-15T21:35:03.230000
|
||||
CVE-2024-23168,0,0,516b014321b2d23dd5e11228b3f4c27201251a7b2e88523a0fca984a63e33e9a,2024-08-15T21:35:03.230000
|
||||
CVE-2024-2317,0,0,8e30ab648286b0ea978301e5a5beda2d9abdf16065d34269cbb1824bfad23955,2024-05-17T02:38:10.027000
|
||||
CVE-2024-23170,0,0,2d2c8288a6a12ddbc7a1710ba6e09b64e14fe785fb79b86b20a944c1ecfef869,2024-02-22T03:15:08.297000
|
||||
CVE-2024-23171,0,0,f88bf803a0c4fbc4509407858b9247c6d4fbb766b717bcd811063458329b2ee7,2024-01-18T20:23:45.707000
|
||||
@ -245506,7 +245506,7 @@ CVE-2024-24028,0,0,c63943ee6dfc53b25a3ab5d44f70abf633bd3f12660446bcc8d4289144acf
|
||||
CVE-2024-24029,0,0,f48b5fef1e233f5b2615b26a0c9b1d6622e82a3c72c6c352158b88f9b48f9c5e,2024-02-06T21:04:04.993000
|
||||
CVE-2024-2403,0,0,6dbf3c7b9ae6279f2eb08793701f0e3b4c85c484143147f528659885f0bc2bec,2024-03-13T18:15:58.530000
|
||||
CVE-2024-24034,0,0,2a4d3db6cf3b4e5048c500ebce4bb202246f9fdd0a665422910e0d80f673dc32,2024-02-08T13:44:21.670000
|
||||
CVE-2024-24035,0,1,d0abb7c64f0c98440e73299b8a7786cd92f1d8fbb7861de6744b39b120e98037,2024-08-15T21:35:04.070000
|
||||
CVE-2024-24035,0,0,d0abb7c64f0c98440e73299b8a7786cd92f1d8fbb7861de6744b39b120e98037,2024-08-15T21:35:04.070000
|
||||
CVE-2024-2404,0,0,9d875e94c9294fe9953ccca085b1745d0613b8cf9f0f07db3175f75218af4ec0,2024-08-09T19:35:05.613000
|
||||
CVE-2024-24041,0,0,4a0d654eb23409577a23026cb4704f48de37c0bc2bebd1ee3faa99b68f3773e8,2024-02-07T17:14:41.607000
|
||||
CVE-2024-24042,0,0,6dc779be2a8b1425083e370c5845f2cde7c5662e2542d528419ae61ff3ec779e,2024-03-19T13:26:46
|
||||
@ -245676,7 +245676,7 @@ CVE-2024-24468,0,0,bbac026196c9a5e8ca29f54a8d36ba3e229b24779335db2752c28502233c7
|
||||
CVE-2024-24469,0,0,ebeddfd52fa0c1e7530b09b05474fbfc79f2e6c0d68157610fdaa187714cf129,2024-02-07T22:02:57.743000
|
||||
CVE-2024-2447,0,0,6305c2b7cb7de274154ca47c393d8343e28d151abe5d313800ccc312259a2658,2024-04-05T12:40:52.763000
|
||||
CVE-2024-24470,0,0,16e381fa0a431abc8440a13d798da189428114544eb84ba0cdf0c6b44081e4ca,2024-02-06T21:07:34.547000
|
||||
CVE-2024-24474,0,1,7e9666bf8baf4869b81de15eea7d74142cdbcec829ea181976812d1817d9f045,2024-08-15T21:35:04.887000
|
||||
CVE-2024-24474,0,0,7e9666bf8baf4869b81de15eea7d74142cdbcec829ea181976812d1817d9f045,2024-08-15T21:35:04.887000
|
||||
CVE-2024-24475,0,0,cc33da32b8386d85f2716db0b7573f224c2a2466da82581395da702e95a8ad4c,2024-02-21T01:15:07.890000
|
||||
CVE-2024-24476,0,0,f4b1eaee12a3672aa3ce2076a41e7e21bf4ac04a6f045fb2b55db6f5bb90f517,2024-08-02T00:15:19.267000
|
||||
CVE-2024-24478,0,0,b94544886ad00605269b35b690b03335a5085810bb0290de0a4c36a28c5a785e,2024-08-02T00:15:19.350000
|
||||
@ -245695,11 +245695,11 @@ CVE-2024-24497,0,0,4486a5209afad695cf15372283d911b20ffd5a0694006d7e7ad69dd4f26f2
|
||||
CVE-2024-24498,0,0,0aa227dc68d56b6857000c562a4cac27071ca2f47030d798b9bd4912ab1310b0,2024-04-25T06:15:56.283000
|
||||
CVE-2024-24499,0,0,e4ff37cd2db9d4d32f1157041bef41498f67a3696e29884293222c73e4e39b9b,2024-04-24T21:15:47.147000
|
||||
CVE-2024-2450,0,0,755e866a7b0db6589d3e0a883887ca70c54bd78a033c510c6d171025dcde46e1,2024-03-15T12:53:06.423000
|
||||
CVE-2024-24506,0,1,300162b102880c909fef7627ff3cbf7be694917201d061517c5fddd5106c6c17,2024-08-15T20:35:02.267000
|
||||
CVE-2024-24506,0,0,300162b102880c909fef7627ff3cbf7be694917201d061517c5fddd5106c6c17,2024-08-15T20:35:02.267000
|
||||
CVE-2024-24507,0,0,db6d74810f343dc9083835da56a72771c241b14db21b5bd25cdd0f323d95a56d,2024-07-24T12:55:13.223000
|
||||
CVE-2024-2451,0,0,ed8963260b73d0c2914199c7ccad86d4c10e40338037d43fae0b6a4b737eaa20,2024-05-28T17:11:55.903000
|
||||
CVE-2024-24511,0,0,19e56e69a02039183df0e76b3f6b366a0c7fe610ce5511009ebec6b3e2899678,2024-08-06T16:35:04.493000
|
||||
CVE-2024-24512,0,1,46fb434c74a35036e4b3e461f16bf1067dceccece23e9aa7bd866d4f9010f0c7,2024-08-15T21:35:05.897000
|
||||
CVE-2024-24512,0,0,46fb434c74a35036e4b3e461f16bf1067dceccece23e9aa7bd866d4f9010f0c7,2024-08-15T21:35:05.897000
|
||||
CVE-2024-2452,0,0,cca6a173274889cd69a2095d63054482ce0ac9763c76eccaa731ce2a40b02048,2024-06-10T19:15:53.417000
|
||||
CVE-2024-24520,0,0,3c774368f33e309a9aff5a70713a9d6c94a70066616aae4e879a98640fa83db5,2024-07-03T01:48:18.843000
|
||||
CVE-2024-24524,0,0,61939d34114517af38312bcfbce13ad9e833fb758fc861ac1b9c4d60456d9a12,2024-07-03T01:48:19.690000
|
||||
@ -246152,7 +246152,7 @@ CVE-2024-25138,0,0,5216fc591ac60d49fd017d17c222c81ab9d6ca5294460860349d6bb46cb75
|
||||
CVE-2024-25139,0,0,c88b223ab467593ac8de29d9a0590df6a82e1476f4af9f7ff43561b04a15b98e,2024-08-05T14:35:05.477000
|
||||
CVE-2024-2514,0,0,956e72a82145af5df3731620e2db9c4a0fa06ee5f96614ef673f99b0f16dc312,2024-05-17T02:38:16.170000
|
||||
CVE-2024-25140,0,0,2efd0c5629a3b4005a26b66a24cac50566792a4a7f9314aa9d76f11ed38db984,2024-08-02T00:15:26.257000
|
||||
CVE-2024-25141,0,1,8a66a513cc3d5a929dbc0c208ddda5ccbe2cb769979056b34d518690cf1f89c1,2024-08-15T20:35:03.310000
|
||||
CVE-2024-25141,0,0,8a66a513cc3d5a929dbc0c208ddda5ccbe2cb769979056b34d518690cf1f89c1,2024-08-15T20:35:03.310000
|
||||
CVE-2024-25142,0,0,19d4bb5bd9d9370afd571c0a6d80ffe65e65cfd553d5b4ccef4ef771df0d1e04,2024-06-17T12:42:04.623000
|
||||
CVE-2024-25143,0,0,10a6bb922da86e2acb7fedc41f329f10932019b09aa65cbea04bcb9e229da526,2024-02-07T17:04:54.407000
|
||||
CVE-2024-25144,0,0,8416cb9676120788fbc94760aa779f11f83eeafe55e75ecc3de9574dca979c73,2024-02-15T04:36:24.350000
|
||||
@ -246179,7 +246179,7 @@ CVE-2024-25168,0,0,dad8d6efa703d292b2e1316077e648b5d024741360f9670fbd7a5b3f86b84
|
||||
CVE-2024-25169,0,0,ddfaf7adafd107d54fdd755c9a7f5c8ead3bddd5d293a6320fdace627636b9a5,2024-02-29T13:49:47.277000
|
||||
CVE-2024-2517,0,0,fd27584c55a08a26b7b1fdff8ab4423fb114835c3aa51e3c4abdd3a6801696e6,2024-05-17T02:38:16.440000
|
||||
CVE-2024-25170,0,0,5a57c221aced5771a411a434828fd35e5d41dcc64fd1585dedec2f988b96ac80,2024-02-29T13:49:47.277000
|
||||
CVE-2024-25175,0,1,82ee8e03ebec4e8b131826423b9193f799e642892bb29c3d5eecad8e1ca0ad29,2024-08-15T21:35:06.723000
|
||||
CVE-2024-25175,0,0,82ee8e03ebec4e8b131826423b9193f799e642892bb29c3d5eecad8e1ca0ad29,2024-08-15T21:35:06.723000
|
||||
CVE-2024-2518,0,0,67143896f82c167febad3b5ae58ed9a1bb65a46487dbef8c359c6c9e56cccd8d,2024-05-17T02:38:16.523000
|
||||
CVE-2024-25180,0,0,7ba581c3caef0d3c03c0f8f2ecb5a0dce1d4af599fb0dc59bceacf92113e3f6b,2024-08-02T00:15:26.843000
|
||||
CVE-2024-25187,0,0,235931cb55f2324cb5235f058c93cb713e862085431cae896b9108cfe9eba975,2024-04-02T12:50:42.233000
|
||||
@ -246265,7 +246265,7 @@ CVE-2024-25318,0,0,816caedc6e45e8daf872d525cbac5de4c424378189abd90933e824060204b
|
||||
CVE-2024-2532,0,0,dbd2e90a8b9f0e6a244b6c6163b20f8979fc7a3177b780d02e1509ee97c26b6a,2024-05-17T02:38:17.753000
|
||||
CVE-2024-25320,0,0,af842a9080e1a2474b48f9d94aba0e31c99f072b88471f69ccaea451c1f5904e,2024-02-16T19:26:55.393000
|
||||
CVE-2024-25325,0,0,5dc3e9eaa4b68d64dbfeed83e2113e7339ef26567f6f094d65da12c277401023,2024-03-12T12:40:13.500000
|
||||
CVE-2024-25327,0,1,9be8a5c5832d3bb0b7e516f20a61af14feb4f1acbdf8b85612033608526c3789,2024-08-15T21:35:07.617000
|
||||
CVE-2024-25327,0,0,9be8a5c5832d3bb0b7e516f20a61af14feb4f1acbdf8b85612033608526c3789,2024-08-15T21:35:07.617000
|
||||
CVE-2024-2533,0,0,6520d041e2b7ba39d1700487d120781106e9a9e9b41da5c3ad12ec52a81a1e5b,2024-05-17T02:38:17.843000
|
||||
CVE-2024-25331,0,0,4f27830f39927c3895bcf33b02286589a44e6189e721c70e2368b6ca05c425b4,2024-08-05T15:35:11.043000
|
||||
CVE-2024-2534,0,0,4887af7a0ab37b01ddfa2f72430762a504040b1465853138458422ea16a2da1b,2024-05-17T02:38:17.933000
|
||||
@ -246318,7 +246318,7 @@ CVE-2024-2543,0,0,90e05f36a3d2dfc0c0cb0570a48a9a80b8042b66097a9bbd3537fdf34c177b
|
||||
CVE-2024-25434,0,0,26bac245bd5b6380c1089f8063086eb0c8545596793c0265b0d4261729bfcdb4,2024-03-04T13:58:23.447000
|
||||
CVE-2024-25435,0,0,b518f964ef14d92ab1a5ca1db15bba6ee80949a3cea6fd366efd019d37dc656f,2024-02-29T13:49:47.277000
|
||||
CVE-2024-25436,0,0,16fb2e1f886d8db1c20751b88d1af87dc346511e3a7b7468111bb026aa3d1366,2024-03-04T13:58:23.447000
|
||||
CVE-2024-25438,0,1,7a94e2bcbb6935042e8614eb14df1b32d07f24ed5598dfbc3b09e64d13fe9544,2024-08-15T21:35:08.530000
|
||||
CVE-2024-25438,0,0,7a94e2bcbb6935042e8614eb14df1b32d07f24ed5598dfbc3b09e64d13fe9544,2024-08-15T21:35:08.530000
|
||||
CVE-2024-2544,0,0,ed2d05b42178fff9a17d6f22998085016a1e0e93b19acb35a0624153a8b064cb,2024-08-08T15:27:52.437000
|
||||
CVE-2024-25442,0,0,eb84b12a8b6870c7b4be7ea073493dd91ec0cf779e81ffeb769d60880071c8d7,2024-02-20T02:15:51.217000
|
||||
CVE-2024-25443,0,0,f9f46e03349c3c7bab20646f2d76799e4fab073653be96db01bac732191b3058,2024-02-20T02:15:51.313000
|
||||
@ -246334,7 +246334,7 @@ CVE-2024-25453,0,0,6c26623f3a213339d332369aa2196301f829be136c6f86125273e619866f9
|
||||
CVE-2024-25454,0,0,8ab63453c76a5630b02c9a4acc28cd19e727677c1ac1b8b1e1b94ff8d701b7fe,2024-02-12T21:39:19.300000
|
||||
CVE-2024-25458,0,0,883238ad1910abf3be131d65578a9146b081aa618c9d002b21ea014aab5330f3,2024-08-15T16:35:03.913000
|
||||
CVE-2024-2546,0,0,08a8dee38ee812f84c4c40bdcc0668312236b55abd93840557efb145295c9cba,2024-05-17T02:38:18.283000
|
||||
CVE-2024-25461,0,1,8db6a140bbc64b5af9f21a58ef0d9e6bf050fd6cc1f8f9c53b140972b95af9fe,2024-08-15T20:35:03.633000
|
||||
CVE-2024-25461,0,0,8db6a140bbc64b5af9f21a58ef0d9e6bf050fd6cc1f8f9c53b140972b95af9fe,2024-08-15T20:35:03.633000
|
||||
CVE-2024-25466,0,0,4f8ddadef0f0c470fac1d08a20c254a296296fab619f433d46a2ccdc8a4b306f,2024-02-16T13:37:51.433000
|
||||
CVE-2024-25468,0,0,3864d1f55affa64d70277d4fba0d3f88289336bf2eb6f1b29a5e8a856bd9e72c,2024-02-20T19:50:53.960000
|
||||
CVE-2024-25469,0,0,c93aa28e3914b49b6c5094bb3a85adbe0a6d382b0bed611cf4ed2908051d45fc,2024-02-26T13:42:22.567000
|
||||
@ -246581,7 +246581,7 @@ CVE-2024-25869,0,0,748b3f6208379a05bd57fedf558ac81540396f4b22ed44a19829a3ed8cbeb
|
||||
CVE-2024-2587,0,0,e2d83da8cabb60e53d324491ce37ed304b28f02c73e9f44ebaa65b6ebded5337,2024-03-18T19:40:00.173000
|
||||
CVE-2024-25873,0,0,8a4faa4943ee6e0e03bd7795594e92abaa0f28587f9f5694820c6cc3d79de9cd,2024-02-22T19:07:27.197000
|
||||
CVE-2024-25874,0,0,6d2389bddde8527bf2136be3df99fb38d1df3f190ca0f8297eea242b1fbad855,2024-02-22T19:07:27.197000
|
||||
CVE-2024-25875,0,1,632b54a489df7bdc09e0b8bc1d6535cebf3df53d32564f2ff9029e61a6f4935a,2024-08-15T21:35:09.433000
|
||||
CVE-2024-25875,0,0,632b54a489df7bdc09e0b8bc1d6535cebf3df53d32564f2ff9029e61a6f4935a,2024-08-15T21:35:09.433000
|
||||
CVE-2024-25876,0,0,eab75ff187e39cea5a5bd43607d99f08c93997057646f878e61338d1a27cf6de,2024-02-22T19:07:27.197000
|
||||
CVE-2024-2588,0,0,d929ea9fc76d73a92e0f60853fb9e3277ed73e9df922a4da6e549ab75ddb350a,2024-03-18T19:40:00.173000
|
||||
CVE-2024-2589,0,0,c013a892db4b6c9e5083074a6ba63c6dd2462c0f9900a29d5df8d96a9aeef8ee,2024-03-18T19:40:00.173000
|
||||
@ -246589,7 +246589,7 @@ CVE-2024-25891,0,0,84cfc5f312c597141ee54b1ce3a081aaaa3c04f515375840db467867fd6cd
|
||||
CVE-2024-25892,0,0,07c9353c0d552f69039cc71e4568ea59bc368ec591c74518e59aba5979c0e7bd,2024-08-14T15:35:06.250000
|
||||
CVE-2024-25893,0,0,6074afa7b83b45196c5c6ba86bd6a55a5db84fa3d221197e7e610730da7175c7,2024-02-22T19:07:27.197000
|
||||
CVE-2024-25894,0,0,110687aa8f80df3297624f90f6f33809d75def9197abe56922d406f86b8dd02c,2024-08-01T13:47:55.813000
|
||||
CVE-2024-25895,0,1,4ad6b56345de948a6e266d7d9c59e0f3f67a87b7a67e84d7f7541ae3635b9194,2024-08-15T20:35:04.423000
|
||||
CVE-2024-25895,0,0,4ad6b56345de948a6e266d7d9c59e0f3f67a87b7a67e84d7f7541ae3635b9194,2024-08-15T20:35:04.423000
|
||||
CVE-2024-25896,0,0,08f878ee14441b76754056ef0405ddf3a84202dc82f048a455b46423ba277c2d,2024-02-22T19:07:27.197000
|
||||
CVE-2024-25897,0,0,3213328e6055109c729a79555e408be1167e003093cb1be559eee482ac1df1a8,2024-08-01T13:47:56.570000
|
||||
CVE-2024-25898,0,0,44c4d18d364691615141c272c666cd64d62bb83c92d766f5a80a7a5cbee93172,2024-02-22T19:07:27.197000
|
||||
@ -246692,7 +246692,7 @@ CVE-2024-2599,0,0,448bf984845294b825ad64c45fc7ff6a1a97b88712ab8f0c7b9899ecc5e48a
|
||||
CVE-2024-25990,0,0,05042610d9d9eeed77c351ef8461507e7363f5a24856c830f88125ac3a7bb105,2024-08-01T13:47:57.997000
|
||||
CVE-2024-25991,0,0,55a93164172a1b22ef8f30a0ed89816155551a2ca968148a5c0da905634180b8,2024-03-12T12:40:13.500000
|
||||
CVE-2024-25992,0,0,9077f849d4dddde51329fbf2553fb349784d84e4a5aa50feb6dadd6e5e8acf0c,2024-03-12T12:40:13.500000
|
||||
CVE-2024-25993,0,1,e7cf4460dc5198c620b3541161c2ca1906e1b44bebbdda031856c68acc35baa6,2024-08-15T20:35:05.303000
|
||||
CVE-2024-25993,0,0,e7cf4460dc5198c620b3541161c2ca1906e1b44bebbdda031856c68acc35baa6,2024-08-15T20:35:05.303000
|
||||
CVE-2024-25994,0,0,4a9979fd659a52838af4203d59aee9f2f6fbf6a2d3333b82853712f36ab74c9a,2024-03-12T12:40:13.500000
|
||||
CVE-2024-25995,0,0,7785cd6f8b87e1198fedd03d14b86de2a700a99574185f6812c6d8bee7390322,2024-03-12T12:40:13.500000
|
||||
CVE-2024-25996,0,0,b7b4bd77042e96294c38d7d1bda93598dd0d513f4128d7212ac13d0be2bb25f7,2024-03-12T12:40:13.500000
|
||||
@ -247081,7 +247081,7 @@ CVE-2024-26529,0,0,bd6cd552c022306ecb15ba77a51e2bdce3a9e1417338a63b92cda08b02e6c
|
||||
CVE-2024-2653,0,0,b3409d37c73c6e84286baa910f6042b0e4464dede287f82c98b61b036f897600,2024-05-01T18:15:19.257000
|
||||
CVE-2024-2654,0,0,44518084de18b3ca2eeba7166bf4da9d0a7d05a78603be70a4c69d74aa776745,2024-04-10T13:23:38.787000
|
||||
CVE-2024-26540,0,0,6576c4885606d2c13376308bfe770084b7f2e54af2c02ae0a3e8966e16709f35,2024-03-15T12:53:06.423000
|
||||
CVE-2024-26542,0,1,0552587f0d89665ed80dc12bb31e4bf79576fc07cfb6b7e3f69abcad15ec010e,2024-08-15T21:35:10.243000
|
||||
CVE-2024-26542,0,0,0552587f0d89665ed80dc12bb31e4bf79576fc07cfb6b7e3f69abcad15ec010e,2024-08-15T21:35:10.243000
|
||||
CVE-2024-26548,0,0,a14221a020c4eadf543d91f52da71379b261a56fd8977996e8b1456e032b4731,2024-03-01T14:04:26.010000
|
||||
CVE-2024-2655,0,0,1c645dd82a6d9fee39650c96a2d44383dd06975f6c270faedebb8baf614d4d6e,2024-04-10T13:23:38.787000
|
||||
CVE-2024-26557,0,0,bce4bb7db30c44200534fa645c4e21a32632f06526ac89541f2afa8ce855d2c7,2024-03-22T12:45:36.130000
|
||||
@ -247768,7 +247768,7 @@ CVE-2024-27213,0,0,38bf62e6cca45cb13c31c1b3c1f577caf25772cec3b7bdb3ce04f4d4c6e5c
|
||||
CVE-2024-27215,0,0,60ef065eae63cf58718fd9a5d80dfa62c007813e270493517bc98a19fcefe594,2024-02-21T18:15:52.060000
|
||||
CVE-2024-27217,0,0,cb0dbfe9327fc52a02d056b77105239417a7cff860961ae434eeaf1ef6d2cb33,2024-05-07T13:39:32.710000
|
||||
CVE-2024-27218,0,0,b2b126ff7fe34ab697f8634bcd6e10d8f03d8a1ff2b55462d7717768f1583a4d,2024-03-15T20:15:08.960000
|
||||
CVE-2024-27219,0,1,6380ac10382315d4da0453b5e48de21d3e106d94e656f543da93609a89c868c9,2024-08-15T20:35:06.643000
|
||||
CVE-2024-27219,0,0,6380ac10382315d4da0453b5e48de21d3e106d94e656f543da93609a89c868c9,2024-08-15T20:35:06.643000
|
||||
CVE-2024-2722,0,0,3d547fbfae7104f0dbf6c0b76ddd02751536ed8c09a63381f891ff8e3f28de99,2024-03-22T15:34:43.663000
|
||||
CVE-2024-27220,0,0,6aa117866566feca4db0bf9d961972fe519fb1f249380c2ccd18e46e235df101,2024-03-15T20:15:09.010000
|
||||
CVE-2024-27221,0,0,275da2c75e59fe51a6d2607d4b2206bfcadad2f1626d8a1a46fd3353d31e8ed1,2024-03-15T20:15:09.050000
|
||||
@ -248078,7 +248078,7 @@ CVE-2024-2767,0,0,0bf7785127743211b004b316b19cc2da72c8338b0475b0f75d892aa6611c2d
|
||||
CVE-2024-27673,0,0,b827936180312254f56c8c18e1a9e00f4dbc9d441e499ec6aaa928d4b3451535,2024-04-03T16:15:07.173000
|
||||
CVE-2024-27674,0,0,21e90956bc1e5ed96e828710d1d2cfc02b0d7dccfda52db8ef3f15b53b564e06,2024-04-03T17:24:18.150000
|
||||
CVE-2024-2768,0,0,0b84ff7a8fc27bec621c4b70ea2ffe24b05256a8731b19de5edef9f22c9c6afb,2024-05-17T02:38:29.203000
|
||||
CVE-2024-27680,0,1,04311f4d03420b2c1425da98e63f040cd24e3866a5e41c11e24fd3b4f68152b8,2024-08-15T21:35:11.063000
|
||||
CVE-2024-27680,0,0,04311f4d03420b2c1425da98e63f040cd24e3866a5e41c11e24fd3b4f68152b8,2024-08-15T21:35:11.063000
|
||||
CVE-2024-27683,0,0,907eeb18dbdd6bbefaa7b9be484cc98a16f164c9a600e2bae77550cea0d2db2c,2024-08-14T19:35:21.653000
|
||||
CVE-2024-27684,0,0,7ad8756d24f2571ad9256e43ef045290d6acdd43e24c12c1e3cfdd0dce330fdc,2024-03-04T15:35:25.673000
|
||||
CVE-2024-27689,0,0,2f9863a2ed79e44545ccb0840f57d72c6748eaf9261e1b5cf11563ef5b1b6f39,2024-08-08T21:35:06.920000
|
||||
@ -248358,11 +248358,11 @@ CVE-2024-28014,0,0,baa237796e504a857089db5ec5b80237d79b2645a24add79eb9cfcbdb3266
|
||||
CVE-2024-28015,0,0,ddab8347a9d5b773cb065bee42a10bfd446d895d29f2da6b469440cd52b2e1f0,2024-08-01T13:48:56.427000
|
||||
CVE-2024-28016,0,0,a98b26e25e4286269fedcc6031733336ad844bd31295954b2cf043a68c799c14,2024-04-02T06:15:15.603000
|
||||
CVE-2024-2802,0,0,4d7e48fbf79d86b86a336401cd7856f9a2e312e8845717a11d0136644698f700,2024-03-26T15:15:49.677000
|
||||
CVE-2024-28020,0,1,20d763f6a7d879da851798b82fa90e89f1e3cf4560e3c465ec8e7510e66b7ffc,2024-08-15T21:32:33.467000
|
||||
CVE-2024-28021,0,1,698af9df63c869e8bcfc4e84d62db6e4d7ff182600a91f2bc02d26dab9f88c10,2024-08-15T21:29:46.697000
|
||||
CVE-2024-28022,0,1,05ab2292ec2d5764d60dc41d68acf6b7ed0f81413d1d5304ceb85ddefc5f7d7d,2024-08-15T21:44:20.677000
|
||||
CVE-2024-28020,0,0,20d763f6a7d879da851798b82fa90e89f1e3cf4560e3c465ec8e7510e66b7ffc,2024-08-15T21:32:33.467000
|
||||
CVE-2024-28021,0,0,698af9df63c869e8bcfc4e84d62db6e4d7ff182600a91f2bc02d26dab9f88c10,2024-08-15T21:29:46.697000
|
||||
CVE-2024-28022,0,0,05ab2292ec2d5764d60dc41d68acf6b7ed0f81413d1d5304ceb85ddefc5f7d7d,2024-08-15T21:44:20.677000
|
||||
CVE-2024-28023,0,0,95e92873beee8f336f4c9cf0229eba10eb803f09aac2855be4773e8156ab7584,2024-06-13T18:36:45.417000
|
||||
CVE-2024-28024,0,1,023885276663800ce2b5419331ef97f1151e80df5fff534e76aea30066f91b6f,2024-08-15T21:46:11.737000
|
||||
CVE-2024-28024,0,0,023885276663800ce2b5419331ef97f1151e80df5fff534e76aea30066f91b6f,2024-08-15T21:46:11.737000
|
||||
CVE-2024-28029,0,0,b95079061ab17fc2818c1925165793c8c13dcc14c8729d51ad302026ac5a145d,2024-03-25T16:06:44.403000
|
||||
CVE-2024-2803,0,0,22f2c86ca1c88d78ce00e8d709ea3d268b625d199c05ddcd35d56c7f9860f31d,2024-04-04T12:48:41.700000
|
||||
CVE-2024-28033,0,0,b3c00174c596428be92cce453e3547082c3550d2faa9dae834e019420834a8b4,2024-08-02T17:35:33.770000
|
||||
@ -248699,7 +248699,7 @@ CVE-2024-2860,0,0,46217b9da2b2fddda54a23d86fd9667171b5afae15a6ec5a04d81b349c2499
|
||||
CVE-2024-2861,0,0,978a1015efa40b0403e35a6152b7f5d6b235fd3f9d4adac2eb469279c47e40ff,2024-05-24T01:15:30.977000
|
||||
CVE-2024-28613,0,0,a54ab1f2e9b074c0005ceac95268c51f4526b7bbad2e62927797643c18df7693,2024-04-24T13:39:42.883000
|
||||
CVE-2024-2862,0,0,a23b81783b91b2bbbcfde47ace372e4762456e140bdf506d0fced8226e2738a0,2024-03-25T13:47:14.087000
|
||||
CVE-2024-28623,0,1,79616151150b38e903c5a53d907c32ebad20bca0de7abc40dd486b1f904d4588,2024-08-15T21:35:11.883000
|
||||
CVE-2024-28623,0,0,79616151150b38e903c5a53d907c32ebad20bca0de7abc40dd486b1f904d4588,2024-08-15T21:35:11.883000
|
||||
CVE-2024-28627,0,0,c3fbcb53d4bd8b45e2ac137db3c6b6a64476aafbbecf256367ec9be49dd43388,2024-07-03T01:51:44.343000
|
||||
CVE-2024-2863,0,0,51f45da8967ac2e9bd5b7be7c2b96b4f6f6eb08fbb2e67a9216114664ff1a479,2024-03-25T13:47:14.087000
|
||||
CVE-2024-28635,0,0,3ea376c2382b19ba1c40e1ca96db4a046dad170ab353c27de44a820093ca692e,2024-08-02T16:35:41.160000
|
||||
@ -248715,7 +248715,7 @@ CVE-2024-28667,0,0,a722c74094b46413cd2f0e1e6663b7ae2104332e1b5c605e7cc511a2a8371
|
||||
CVE-2024-28668,0,0,dfab810650daaa38b417cd38363fcb259e164356905554402cb2ffe391f0ae90,2024-08-02T19:35:34.313000
|
||||
CVE-2024-28669,0,0,7e7c51ad09a2f0694752bdd394c9ed2f89e1b1247bb99fcc406852b79b139fc6,2024-03-13T18:15:58.530000
|
||||
CVE-2024-2867,0,0,22ce17bc91c68b182edb0434ac76ac7f869c6c754fce9597b9e7c40c50afa2f7,2024-05-02T18:00:37.360000
|
||||
CVE-2024-28670,0,1,845945b47c5eff5f2f3fd7e5bf1a4a985e355f96d0a2e2e63d9e2637032bebea,2024-08-15T20:35:07.023000
|
||||
CVE-2024-28670,0,0,845945b47c5eff5f2f3fd7e5bf1a4a985e355f96d0a2e2e63d9e2637032bebea,2024-08-15T20:35:07.023000
|
||||
CVE-2024-28671,0,0,9a1d1290de5a4ba6867a05ae1d283c711cdd9d5647299d6bacd992d6df39a6cf,2024-08-01T13:49:10.897000
|
||||
CVE-2024-28672,0,0,cd39d1fdf90137bb06b7bf130d6e97d1809e7cb18d315c08621547499fb882df,2024-03-13T18:15:58.530000
|
||||
CVE-2024-28673,0,0,bd6746b41a01ccf049d37eb60c73f070158ae6b16895b623dddfc8455f2801ff,2024-08-02T21:35:24.280000
|
||||
@ -248725,10 +248725,10 @@ CVE-2024-28677,0,0,c212bc6abeb632592f29fbc5fe22ee750468c999ed8be8e2db7f3e23376a0
|
||||
CVE-2024-28678,0,0,e5023173fc11d3622828b4613c2efc53b1e9700f74a309c2cce387d24da005e5,2024-03-13T18:15:58.530000
|
||||
CVE-2024-28679,0,0,105ed47445b8d9fc8d56f311cb3b3bd3771e3a0f797a39fdf0ae6eee229ff71d,2024-03-13T18:15:58.530000
|
||||
CVE-2024-2868,0,0,0d0f218c7c83d10c9f9d6ae0e3c918a300514bd5c38acefa57e4da2fb68b6b16,2024-04-04T12:48:41.700000
|
||||
CVE-2024-28680,0,1,2c015a2a3060000c7ef4f8456bbc810496f8be9f148fccbda02f285f4310a0c8,2024-08-15T20:35:07.960000
|
||||
CVE-2024-28680,0,0,2c015a2a3060000c7ef4f8456bbc810496f8be9f148fccbda02f285f4310a0c8,2024-08-15T20:35:07.960000
|
||||
CVE-2024-28681,0,0,4b7cba0eeeff2f30c6b385de9946c7001ab8d0046bea262780a6c07cbb70db8c,2024-03-13T18:15:58.530000
|
||||
CVE-2024-28682,0,0,02be1c405dc5aebe82585b37c498baa25485b44921e1eb4fbc423effbc8757f7,2024-03-13T18:15:58.530000
|
||||
CVE-2024-28683,0,1,a84750ef7113628223a83f3f1bafccf8cc7ce4d93141f0176c20c984e9a69c9f,2024-08-15T20:35:08.767000
|
||||
CVE-2024-28683,0,0,a84750ef7113628223a83f3f1bafccf8cc7ce4d93141f0176c20c984e9a69c9f,2024-08-15T20:35:08.767000
|
||||
CVE-2024-28684,0,0,ad6bf053cac6fb6852a9113f5958a7b88b0baa069360a39369fc3cdf983cbd42,2024-08-05T18:35:16.690000
|
||||
CVE-2024-28698,0,0,396cba3e1e1963c7f40bf85fd9f50e44dce9235019edfebcdaa211dedffb5752,2024-08-01T13:49:12.527000
|
||||
CVE-2024-28699,0,0,0b9a4e0b313e8b2e6ec1b9d8b9287e8c737e0019e26671b77c33fd8106965c4d,2024-07-03T01:51:45.310000
|
||||
@ -249212,7 +249212,7 @@ CVE-2024-2936,0,0,ded3e6858b21938cc6332525608363ca633684eee87859a8f9504838347f2c
|
||||
CVE-2024-29366,0,0,c6def951532345f5745b43a5275ceff56f9c33aee73b404cffac4524e7e2c006,2024-08-01T13:49:29.947000
|
||||
CVE-2024-29368,0,0,0901e7b80a5ee0e48b0a83048196418207989c0e792e75fa11268199f70a424c,2024-04-23T14:15:08.440000
|
||||
CVE-2024-2937,0,0,79954cfe98c2940c0942106d942fe05f3c11cf3e503a3ae1500fa6b5fca01f84,2024-08-05T16:35:09.543000
|
||||
CVE-2024-29374,0,1,be8e602eebbb83c03bdd549b3faaa1f0dfc77d0ca5e7f9526b71be3aea9cae09,2024-08-15T20:35:09.683000
|
||||
CVE-2024-29374,0,0,be8e602eebbb83c03bdd549b3faaa1f0dfc77d0ca5e7f9526b71be3aea9cae09,2024-08-15T20:35:09.683000
|
||||
CVE-2024-29375,0,0,716fc3c8e0ccb042475d24e7fe2ab7abf1b6955d8021a6ba9e6aecf5e8253511,2024-04-04T12:48:41.700000
|
||||
CVE-2024-29376,0,0,ef2434b33b4ebabd1988c2573e7e291cc10d7cd1308168626cdd5db2860751e3,2024-07-03T01:52:24.250000
|
||||
CVE-2024-2938,0,0,ab88b913066937a047849ba483b0f7e9bae4b5bc13ea45b9cc5b395f17c9e679,2024-05-17T02:38:38.137000
|
||||
@ -249263,7 +249263,7 @@ CVE-2024-29466,0,0,4fa136a9b1a51af6517f939484fb1c8a80e3e0537d7615acddb3c99d86059
|
||||
CVE-2024-29469,0,0,2079505dc0da5a3cbf2c6e066fddfdad1eb85fcaa078af0bbb19417ca0e16ca0,2024-03-21T12:58:51.093000
|
||||
CVE-2024-2947,0,0,7fa842f2bc2c8f223df34834539dd7f7d20bc53e8c380819b606cea859d50c0a,2024-06-12T09:15:17.717000
|
||||
CVE-2024-29470,0,0,56425811d021c212dbd848b24d323bfc83ff20dfcd604f9dd34d98a1dfae7b6e,2024-03-21T12:58:51.093000
|
||||
CVE-2024-29471,0,1,5558733fa7b1a4697bbc8cd56d5ef313ce31c2ab78e350286f8e19f0c34b081d,2024-08-15T20:35:10.563000
|
||||
CVE-2024-29471,0,0,5558733fa7b1a4697bbc8cd56d5ef313ce31c2ab78e350286f8e19f0c34b081d,2024-08-15T20:35:10.563000
|
||||
CVE-2024-29472,0,0,e62aac3c11b80b896f7dce9bc263bf444e326ccaa5bb3a22d5f14836d30cf59d,2024-04-30T20:22:59.060000
|
||||
CVE-2024-29473,0,0,8245ba1b7b6cfc2fd736894d074e12778ffb6419be24c78b4098d989642f62f6,2024-03-21T12:58:51.093000
|
||||
CVE-2024-29474,0,0,1e6da7c761ee3de98f7b759f0097c1b775ea91f11305f8a90e1129070ffdd028,2024-08-02T20:35:28.270000
|
||||
@ -250178,14 +250178,14 @@ CVE-2024-30629,0,0,065564e121e3b652e8f433bc4bebac9590da04ba26d95145648a65cf0a32c
|
||||
CVE-2024-3063,0,0,e4ccb06d5ff3e906359417688d6094345cf7b0c3520fac98072d600493716bc5,2024-05-30T13:15:41.297000
|
||||
CVE-2024-30630,0,0,d1f2c24f30d736799fbd9614b05322c8af9640ffb03dab0097ee140dec9fb5dc,2024-03-29T13:28:22.880000
|
||||
CVE-2024-30631,0,0,41f838085add8cf1dec118fb7468de6b4fc9bce111467eb8baa174f9e9137432,2024-08-01T15:35:12.897000
|
||||
CVE-2024-30632,0,1,3f8589dc8873f1f40fc2805a6241d9d5b4cb8cf8b5c1194f5bfaa117d3af4731,2024-08-15T20:35:11.387000
|
||||
CVE-2024-30632,0,0,3f8589dc8873f1f40fc2805a6241d9d5b4cb8cf8b5c1194f5bfaa117d3af4731,2024-08-15T20:35:11.387000
|
||||
CVE-2024-30633,0,0,0e20fbff7533df843343aa1ca8784af549e42237ddf63007c09299ebacdd216c,2024-08-01T13:50:23.153000
|
||||
CVE-2024-30634,0,0,9a5935e8c0707d47485f35151f5f78ee198d5683ff7c1df187b9b9e0a14e2e20,2024-08-01T13:50:23.927000
|
||||
CVE-2024-30635,0,0,9867b65ad790b03849102a4433871e5822d9883f60fd5996addd4ba7b4f88aa1,2024-08-01T13:50:24.723000
|
||||
CVE-2024-30636,0,0,7706c251cc6730da406f80ce2a2cf3af8e2faaef16970992a4ea0e2557948f7a,2024-04-01T01:12:59.077000
|
||||
CVE-2024-30637,0,0,4903be2e34292b70c4fd64a16207b4d414e56da06073b801c097feb452620a21,2024-07-03T01:54:12.967000
|
||||
CVE-2024-30638,0,0,3f3309eb59690079a4df49f920e01371c189055cc07ce956d10dd836bf37277b,2024-08-01T15:35:13.663000
|
||||
CVE-2024-30639,0,1,39f672cc581579724326721635f68afc28980ec46087cc7a94592c4210078965,2024-08-15T20:35:12.280000
|
||||
CVE-2024-30639,0,0,39f672cc581579724326721635f68afc28980ec46087cc7a94592c4210078965,2024-08-15T20:35:12.280000
|
||||
CVE-2024-3064,0,0,8a36a79ace74b39564c56ff7401e476ffc08c1a4de80ba6f8cd5a5d5cd60f7fb,2024-04-10T13:23:38.787000
|
||||
CVE-2024-30645,0,0,77873f1c56920b575cbc0a26f80968d9589bdd66fb005fe46610787de441aca3,2024-08-01T13:50:25.530000
|
||||
CVE-2024-3065,0,0,0bda0f080fba1f5572d33c440e40f60c6a3ce2d985dfed057962a87436804b26,2024-05-24T01:15:30.977000
|
||||
@ -250601,6 +250601,7 @@ CVE-2024-31327,0,0,6cb945d11f8664a0277f1157bd8eac8d374886bfe8f127c66f41c26468520
|
||||
CVE-2024-3133,0,0,a5199a1ff93b7f0b9b2c8f7c4014dbfb416c9e59a9d9caab3f26a064ce40a24e,2024-06-07T19:15:24.213000
|
||||
CVE-2024-31331,0,0,d63ee06c884fadbebb4e0ffd30f7de42c6d5483b78b8ccdaba35e5ffeb309e42,2024-07-12T16:11:33.867000
|
||||
CVE-2024-31332,0,0,fe533958eb1f5014a983744e26d4dc56008592fb4b2dc96ebd425a317d9ee5f4,2024-07-11T15:05:41.733000
|
||||
CVE-2024-31333,1,1,0efd66e4971ec47af26bb6c2dff2715f6dd2434636f08b23c3145dbb0d2ca6b6,2024-08-15T22:15:06.123000
|
||||
CVE-2024-31334,0,0,69828e729ce39e0f18173fda19e01cf9f4d39333d7345a58dacf94a302bbacd6,2024-07-11T15:05:41.960000
|
||||
CVE-2024-31335,0,0,3a5c3c43b9344b158e79d76d5bd0e2d36d3e7822b50bec9afc211045c26c9812,2024-08-01T13:50:52.347000
|
||||
CVE-2024-31339,0,0,cd4c96aade7176a5aa7427f1e13d7eb03c1e703de2eb92c3c6c97472cece1e5c,2024-07-12T16:11:34.910000
|
||||
@ -252915,8 +252916,19 @@ CVE-2024-34723,0,0,9ee1e9ea0079333d8123e1479d0c1b548d28a892d3601137f6e64ded9880a
|
||||
CVE-2024-34724,0,0,0452aa45e04971f6e547ee694d42ca35f85625c1031b931eba0ca8059efefaef,2024-07-12T16:11:39.470000
|
||||
CVE-2024-34725,0,0,71c51510eb6c519ede5c0bd5b935ecb821799239014d1b6c0035512d0bff6cbf,2024-08-01T13:52:25.887000
|
||||
CVE-2024-34726,0,0,148667699b7fd62da52cb8a62c1c3c6fd756ca900c40298f1823e1d94f76998b,2024-07-11T15:05:45.340000
|
||||
CVE-2024-34727,1,1,d3a2c747ee927f1291c35785807c6dbb5ec4b02ae6150a400652401339eb68d8,2024-08-15T22:15:06.190000
|
||||
CVE-2024-3473,0,0,174ffd5ba26767424b634a780ad377f8ae33849c44036babd665d0b98ce27738,2024-05-02T18:00:37.360000
|
||||
CVE-2024-34731,1,1,b51cb61d77413f6d67292900a24e1e65fcdd74df05e1169bddd91e74d048994c,2024-08-15T22:15:06.263000
|
||||
CVE-2024-34734,1,1,292c6f80066717b5f1b331e37b35051d1357dd7ba0e13c2fc70ba8ac1f3eda7c,2024-08-15T22:15:06.337000
|
||||
CVE-2024-34736,1,1,e31a789529c464401dd83172b804c99ebe04c32cc188ce2e95f92b9abe1bc6ea,2024-08-15T22:15:06.400000
|
||||
CVE-2024-34737,1,1,01bc6556a83f1b4d4c8b93a5e8d8fc5e20c66cd636d6f8b4490b9dd7c6ff12d3,2024-08-15T22:15:06.467000
|
||||
CVE-2024-34738,1,1,b8edd06816259c50ad1bd3d5f97e3ecb82fdf4064b0b844f196e639463fab22c,2024-08-15T22:15:06.623000
|
||||
CVE-2024-34739,1,1,5fc318e22c2b2494f6940e6df370db1ae846597699f2ed5a8136a28604d800ec,2024-08-15T22:15:06.690000
|
||||
CVE-2024-3474,0,0,f8fe69ded09f8f3335cb0a291c0ff93be246183a89b6f2a9db60adabf1ff9a0d,2024-05-02T13:27:25.103000
|
||||
CVE-2024-34740,1,1,3abeeb4d3f9946b749c3f47b65fff1950025b42adef7d3e6bb12f887b86192d9,2024-08-15T22:15:06.753000
|
||||
CVE-2024-34741,1,1,ffc119c2b062b459351b84600fe5fda211e601923a32345a664710007a08e353,2024-08-15T22:15:06.820000
|
||||
CVE-2024-34742,1,1,810e6764d5ddb3d52b814c091bfdc919e6fb1c2ff52eaed58ccd0c8bd96c8188,2024-08-15T22:15:06.890000
|
||||
CVE-2024-34743,1,1,e813f78a1c3c1f053825d2df9fc7d52e06e3c3fcd645217e4ada409f53307702,2024-08-15T22:15:06.957000
|
||||
CVE-2024-34749,0,0,048a4718a6adf63bcc95dd588dc6297f930a23113bd2619e190eb8b7852c3de9,2024-08-02T03:15:45.390000
|
||||
CVE-2024-3475,0,0,3d68cde343ddcb97ac984b733d2ae7662c97a24c514b9a563c1c306f42f1759f,2024-05-02T13:27:25.103000
|
||||
CVE-2024-34750,0,0,c670e390c383fbaa0e17449b121645c068a83500fff53e2ba8ec3633bed5a922,2024-07-09T16:22:37.120000
|
||||
@ -255202,27 +255214,27 @@ CVE-2024-38186,0,0,e48699951b83a13a8c545a7bb39dc766d490dd0a39c76d8a25aa85e46c5ed
|
||||
CVE-2024-38187,0,0,426ec9e92ff0a407b183738cdd31a21c97647274d94618ee0b6aa72a02fffbbf,2024-08-14T02:07:05.410000
|
||||
CVE-2024-38189,0,0,548200171a7637a1944ce86ea38e36c3daaf16d5a029877c7e9488a838ab8ca5,2024-08-14T02:07:05.410000
|
||||
CVE-2024-3819,0,0,c25bdc543ba06fd05ac51b0b8912467c3fc6d8848be54d697bfdb5995b1a7e51,2024-05-02T18:00:37.360000
|
||||
CVE-2024-38191,0,1,9730b06694f8b54c9807aa14f7df48bed6f98d855f940894c24b2328b7f114e6,2024-08-15T20:58:12.813000
|
||||
CVE-2024-38191,0,0,9730b06694f8b54c9807aa14f7df48bed6f98d855f940894c24b2328b7f114e6,2024-08-15T20:58:12.813000
|
||||
CVE-2024-38193,0,0,f683727b02704ad7b117b644e084a2e01a414a802e0c9c89e2d81dddf3e07bbe,2024-08-14T16:31:06.880000
|
||||
CVE-2024-38195,0,1,d7663b0e9aa556c8ce10c21ef451a7d773e7f876b8747c98159d99dc83716a8b,2024-08-15T20:56:25.100000
|
||||
CVE-2024-38196,0,1,036126fa4e67f7c18a11733658d35aa169249f60e5767c04da0dc3a714533203,2024-08-15T20:54:50.510000
|
||||
CVE-2024-38197,0,1,9a40abe98c5d54835551587ddc4b75a591055dcd8f35ba539478fb7646793bd3,2024-08-15T20:40:58.547000
|
||||
CVE-2024-38198,0,1,628cd807f7bcba6952b2c2062766a5214149c29bd5be742232c43abd2bc51e12,2024-08-15T20:39:20.260000
|
||||
CVE-2024-38199,0,1,642a12aa02f5e7b673baecdb6185f8efbceb0f3cbe1ac18a60e869ce79b2e0f4,2024-08-15T20:32:42.193000
|
||||
CVE-2024-38195,0,0,d7663b0e9aa556c8ce10c21ef451a7d773e7f876b8747c98159d99dc83716a8b,2024-08-15T20:56:25.100000
|
||||
CVE-2024-38196,0,0,036126fa4e67f7c18a11733658d35aa169249f60e5767c04da0dc3a714533203,2024-08-15T20:54:50.510000
|
||||
CVE-2024-38197,0,0,9a40abe98c5d54835551587ddc4b75a591055dcd8f35ba539478fb7646793bd3,2024-08-15T20:40:58.547000
|
||||
CVE-2024-38198,0,0,628cd807f7bcba6952b2c2062766a5214149c29bd5be742232c43abd2bc51e12,2024-08-15T20:39:20.260000
|
||||
CVE-2024-38199,0,0,642a12aa02f5e7b673baecdb6185f8efbceb0f3cbe1ac18a60e869ce79b2e0f4,2024-08-15T20:32:42.193000
|
||||
CVE-2024-3820,0,0,8985e7d1e7aecc5fe081b43705d723ec0ca067093ca4a65f30dd280cab84082f,2024-06-03T14:46:24.250000
|
||||
CVE-2024-38200,0,0,d566a27ccd0b19f8229e9b6ce0a19c6b80662cfcd111693b799cdefa30455084,2024-08-13T18:15:29.720000
|
||||
CVE-2024-38201,0,1,53005100dd7a84f045f26370f955e41247a7f9394ca3dbb51556ee597d1af3a2,2024-08-15T20:30:00.737000
|
||||
CVE-2024-38201,0,0,53005100dd7a84f045f26370f955e41247a7f9394ca3dbb51556ee597d1af3a2,2024-08-15T20:30:00.737000
|
||||
CVE-2024-38202,0,0,e2d641c476f9dc13a8d336a19bdebe9a3b3a110a87f90a532b99552457779a18,2024-08-13T18:15:30.203000
|
||||
CVE-2024-38206,0,0,159422281702f43b217eea303b5c7354ebb2179d51ac658c6c0c018b5ec16a40,2024-08-14T00:15:08.213000
|
||||
CVE-2024-3821,0,0,3ffbadbdaf34f564e9c498f1baa8fe758531e73989a1bbb861692bcbfdfc262c,2024-06-03T14:46:24.250000
|
||||
CVE-2024-38211,0,1,51e2e73d6d93c77460ccfd3a0684ba8ffade47d470b416e9dbd607fd57a6c040,2024-08-15T20:29:19.557000
|
||||
CVE-2024-38211,0,0,51e2e73d6d93c77460ccfd3a0684ba8ffade47d470b416e9dbd607fd57a6c040,2024-08-15T20:29:19.557000
|
||||
CVE-2024-38213,0,0,a57ec7b97080baf05c7c67e1e8b814c6ef63e8cb4eb809fa5c6a9e16af89b3b3,2024-08-14T14:55:49.887000
|
||||
CVE-2024-38214,0,1,36d440db09d4a2cbf6127fa4a6571f8fdbf7003c0a2820ce7057958b7fe01f75,2024-08-15T20:28:25.893000
|
||||
CVE-2024-38214,0,0,36d440db09d4a2cbf6127fa4a6571f8fdbf7003c0a2820ce7057958b7fe01f75,2024-08-15T20:28:25.893000
|
||||
CVE-2024-38215,0,0,1d004986cdbbdb186909c75ded4a7501590ae50a83feca56ee16c60de3d95af5,2024-08-14T02:07:05.410000
|
||||
CVE-2024-38218,0,0,d8154113c709876f61605539852c344572b202f6d86619699565b8c3f572b9b4,2024-08-13T18:15:31.500000
|
||||
CVE-2024-38219,0,0,e14090e36cb268ebd4ddc662de283a811b72a0453a256d8c6fb64b84db762356,2024-08-13T18:15:31.623000
|
||||
CVE-2024-3822,0,0,51b0f82a9028abb2f3a6ab312236a4c8392000a211092257ada320c541b18cc9,2024-05-15T16:40:19.330000
|
||||
CVE-2024-38223,0,1,bc14ce3f021016f5d7fdf26984192d7afd912fddeb21523c067e8db2fe7a06a5,2024-08-15T20:18:28.240000
|
||||
CVE-2024-38223,0,0,bc14ce3f021016f5d7fdf26984192d7afd912fddeb21523c067e8db2fe7a06a5,2024-08-15T20:18:28.240000
|
||||
CVE-2024-3823,0,0,53ae63b27eb43a6740a92f1ff13f05ddd2a8941167fdfb2924cdfa6b561369e6,2024-05-15T16:40:19.330000
|
||||
CVE-2024-3824,0,0,e8430e8e74668eaaf1515aab02bbd50450b435f6ff0c9f12ee70566d9f9578b4,2024-05-15T16:40:19.330000
|
||||
CVE-2024-3825,0,0,0797baa725c3e17399d5d91a8de7a7a1a558d256247589a07a334c4f415b4b15,2024-04-17T15:31:50.160000
|
||||
@ -255848,7 +255860,7 @@ CVE-2024-39330,0,0,df282f57bb00a86772e9e77e51a445a51be95fedbc3011c51977bbb06b0f3
|
||||
CVE-2024-39331,0,0,e27921e016dec51173f86ad420de9e9174de4baa540da3f53e6e1157ef72adc9,2024-07-03T02:05:47.260000
|
||||
CVE-2024-39334,0,0,94cae5ba65ec50bed6d17b2b54650000947aeee42b8249838d1ebdc24642a191,2024-06-24T12:57:36.513000
|
||||
CVE-2024-39337,0,0,ae96e6e5658ac679eff4c9acfa518814cd5ee8874dd941939a565173aee28094,2024-06-24T12:57:36.513000
|
||||
CVE-2024-39338,0,1,b2902b8c8fc819dc7cfd9bba42bea4279b850087be05ea18d3d2870591906304,2024-08-15T20:35:13.427000
|
||||
CVE-2024-39338,0,0,b2902b8c8fc819dc7cfd9bba42bea4279b850087be05ea18d3d2870591906304,2024-08-15T20:35:13.427000
|
||||
CVE-2024-3934,0,0,3e23cb8746110c86130adc40e1a1911de8a168d18836a34bacdc1437f4453cac,2024-07-22T13:00:53.287000
|
||||
CVE-2024-39340,0,0,5ebdab5b5b68a92db4ff353d7a08162224794f82acef11835fd7731e9f604ef2,2024-08-01T13:55:49.473000
|
||||
CVE-2024-39345,0,0,a7fe401efcbb2b3728b6e10777ee0a9c04a224d785c5c0839b1d13cfea4ecde8,2024-08-01T13:55:50.247000
|
||||
@ -256462,7 +256474,7 @@ CVE-2024-4069,0,0,fc5a2986d6746eec6d2dc8871a19fd31bd3dae122b27ac5ac325372fce08ed
|
||||
CVE-2024-40690,0,0,288f59aa1afbad71e8a264760a25606f0765322027457660d06b06f1220570f0,2024-07-12T19:04:57.907000
|
||||
CVE-2024-40697,0,0,bebf3d413c945a3b35cf93ef4b95b34b89f9c389fda4792714ebafea2974c936,2024-08-13T12:58:25.437000
|
||||
CVE-2024-4070,0,0,f50441c69b27e00682c793729b411e41b0ab8839510e28fbeccbd72a35bcaeb5,2024-06-04T19:20:29.567000
|
||||
CVE-2024-40704,0,1,2cad5906579743e8e98ddcd83d02c56b18a31e7ad68147157b568c3e9be363eb,2024-08-15T20:03:13.530000
|
||||
CVE-2024-40704,0,0,2cad5906579743e8e98ddcd83d02c56b18a31e7ad68147157b568c3e9be363eb,2024-08-15T20:03:13.530000
|
||||
CVE-2024-40705,0,0,275d0b75adf60123909502ce4ab0bfe2d790c03f0eb4301b2362936b51ce0432,2024-08-15T19:57:34.780000
|
||||
CVE-2024-4071,0,0,5f6b5ae6c8e3d6e0ce3e89718b14a6bb17b22a46ae9131966ebec62404b12da9,2024-05-17T02:40:14.747000
|
||||
CVE-2024-40719,0,0,b6da62d4912c9bd07427fa16443cd7668b6b1bac31228d96cfe2dfe539bd5688,2024-08-09T14:36:32.300000
|
||||
@ -257433,8 +257445,8 @@ CVE-2024-42480,0,0,d6ef3c6db5a498c7b4cc4b77be4e0c4132e9804f02867681cb2b417c4a3c0
|
||||
CVE-2024-42481,0,0,ad34942ce8111bc952fcd265a37f1d388b31063c4018bd73b3f6d858abc1a1ad,2024-08-12T18:57:29.247000
|
||||
CVE-2024-42482,0,0,b30158f5b674bded8c099de403a1859157e22ee6eae596b9cbf6c6cda1ffed96,2024-08-12T18:57:17.383000
|
||||
CVE-2024-42485,0,0,fe887079979720fde6a2564dece883024602b52e3edd829141a610d95ce6aeb6,2024-08-12T18:57:17.383000
|
||||
CVE-2024-42487,1,1,268550579915872b28630196fcd08762a9f824be6b68b39fadbf6356d7ded081,2024-08-15T21:15:16.997000
|
||||
CVE-2024-42488,1,1,2ac3d3c300a22378eb838a987000238154148bda4b1a1a7af2a05964a033aa16,2024-08-15T21:15:17.270000
|
||||
CVE-2024-42487,0,0,268550579915872b28630196fcd08762a9f824be6b68b39fadbf6356d7ded081,2024-08-15T21:15:16.997000
|
||||
CVE-2024-42488,0,0,2ac3d3c300a22378eb838a987000238154148bda4b1a1a7af2a05964a033aa16,2024-08-15T21:15:17.270000
|
||||
CVE-2024-42489,0,0,1203b17e47b8d78391ae8374fec72a221549be23a40702733d44133e504634fc,2024-08-12T18:57:17.383000
|
||||
CVE-2024-4249,0,0,20dbadf05c38d413ed14f5d424310da5ffa119a0ccbbcb5b690e0c54ceac344f,2024-06-04T19:20:34.093000
|
||||
CVE-2024-42493,0,0,f6b5486c33bc66cf003608659d12007760e6f11e14f162d8f0f6b524c3d0cd10,2024-08-08T18:55:19.180000
|
||||
@ -257644,8 +257656,8 @@ CVE-2024-43358,0,0,fbf8fe905c3ca9abb9115b42cc5614eccd0cebf28f3e14adb9347834e27ff
|
||||
CVE-2024-43359,0,0,65d4fabedd6480e45a35d791ca8acdefa39599f7f2c5dac0d8096fc11d685101,2024-08-13T12:58:25.437000
|
||||
CVE-2024-4336,0,0,c134d6edc5435f42ac06617edd246079dd96557f1185ced7c01e0aea0bd59b88,2024-04-30T13:11:16.690000
|
||||
CVE-2024-43360,0,0,5e83697ea820bba28f28ac74c16eaa49368718cf4d29d0f4eeaac44e95899ac3,2024-08-13T12:58:25.437000
|
||||
CVE-2024-43366,1,1,c6a0c9b79f40e9ac6adfe96e8a726d4a739758a69bf451c548536be75a4590b2,2024-08-15T21:15:17.520000
|
||||
CVE-2024-43367,1,1,aa40d7ce5e159a344ef88943101f5635e11309c45219cf73c00055952573916e,2024-08-15T21:15:17.777000
|
||||
CVE-2024-43366,0,0,c6a0c9b79f40e9ac6adfe96e8a726d4a739758a69bf451c548536be75a4590b2,2024-08-15T21:15:17.520000
|
||||
CVE-2024-43367,0,0,aa40d7ce5e159a344ef88943101f5635e11309c45219cf73c00055952573916e,2024-08-15T21:15:17.777000
|
||||
CVE-2024-43368,0,0,bc8404f29bdb04258d364b3952f9782a6581bd81b6fee1a7f290b39a6cca9c9f,2024-08-15T13:01:10.150000
|
||||
CVE-2024-4337,0,0,87f9a4f489ef032776e3da435c02385147be0cf8fdf2fdcc393190f8f887eca5,2024-04-30T13:11:16.690000
|
||||
CVE-2024-43373,0,0,69d56183bd2a33523e74549d732339012a778a169f9424729adc89709a9fb8e3,2024-08-15T17:34:07.033000
|
||||
@ -259383,7 +259395,7 @@ CVE-2024-6447,0,0,45fe1e3b45bb9052a54143ac6931092e1b37ff897cd56aa11e3df59780bc06
|
||||
CVE-2024-6452,0,0,c694c1bdf54902e69172121aae2a54d0747cfc16750499c01d3cf3c9c6ef3263,2024-07-03T12:53:24.977000
|
||||
CVE-2024-6453,0,0,a31f9b2d11e920ef5820d5943bd943df178bc2e27d100b648bd1b922afad8eca,2024-07-03T12:53:24.977000
|
||||
CVE-2024-6455,0,0,8630ebc1a98e741e91f009e85126d02bca9a8a2c6f3c48f74f4c74c8c868f369,2024-07-19T13:01:44.567000
|
||||
CVE-2024-6456,1,1,bc36926cd39d9c147941407431b009e2492d4daa481901d0ea883b3657b0a7bf,2024-08-15T21:15:18.047000
|
||||
CVE-2024-6456,0,0,bc36926cd39d9c147941407431b009e2492d4daa481901d0ea883b3657b0a7bf,2024-08-15T21:15:18.047000
|
||||
CVE-2024-6457,0,0,2021b397e47ab38cda013de2c201fe3ea53b49570246fbb65269f60be90e5ab4,2024-07-16T13:43:58.773000
|
||||
CVE-2024-6458,0,0,e6f4f9a699790cfa92517dafe90bcdba32232615fceb305817a9ccda94d06fc4,2024-07-29T14:12:08.783000
|
||||
CVE-2024-6461,0,0,86a214d0c7bd3f57cea37cd567b01f1a0e55f8d4342f6c7c46fd15b8942c8d90,2024-07-03T21:15:04.580000
|
||||
@ -260166,8 +260178,12 @@ CVE-2024-7830,0,0,45175212ec7bdf20d19dd48afd4b20ecd81d3922aa2b6b23e80ca74b4822c2
|
||||
CVE-2024-7831,0,0,6b336f36e84f924efd73293c9c063709dd72cbe1db48e780f4be49ea64db2706,2024-08-15T16:15:25.957000
|
||||
CVE-2024-7832,0,0,00d2014761e47bd40d6e682a4ee12fe2eb058ba3b7621c75452dfb99e80b88e1,2024-08-15T17:34:07.033000
|
||||
CVE-2024-7833,0,0,41a645ce5af3bb29e8224b7a5935f3873d565966d12ccc5e0059eebfd7ee4d00,2024-08-15T17:34:07.033000
|
||||
CVE-2024-7838,1,1,c712dc588f45dde05958418e0db93c4d0a113dcbc2aed2850c5d20f660b89673,2024-08-15T20:15:18.457000
|
||||
CVE-2024-7839,1,1,74eedb667d5f5074a851b0a27ea50f1d8dc2517ed085e073c6a09e4486928282,2024-08-15T21:15:18.237000
|
||||
CVE-2024-7866,1,1,7b21c6eb36d73c92e1f7d8bb8574d36dfd6e1deee61d5ef7c7c7b7a0b352193c,2024-08-15T20:15:18.793000
|
||||
CVE-2024-7867,1,1,2c6807e6cda13329c05cc32828904aaff7f4fcd646d878acd15e994ea1a532df,2024-08-15T20:15:18.967000
|
||||
CVE-2024-7868,1,1,1270b7dc6c77cab6c2ea3d2de21860bb4fd556dbaed1521f53d18e8f28829e9b,2024-08-15T21:15:18.530000
|
||||
CVE-2024-7838,0,0,c712dc588f45dde05958418e0db93c4d0a113dcbc2aed2850c5d20f660b89673,2024-08-15T20:15:18.457000
|
||||
CVE-2024-7839,0,0,74eedb667d5f5074a851b0a27ea50f1d8dc2517ed085e073c6a09e4486928282,2024-08-15T21:15:18.237000
|
||||
CVE-2024-7841,1,1,4632c3971b04a57562f61d399cd515c2019f246d80ccf6d4c535c7b4361e8c28,2024-08-15T22:15:07.020000
|
||||
CVE-2024-7842,1,1,12f11ac340531e2626da79ded774ccfb3de899c06029be44f6c75df1710957a6,2024-08-15T22:15:07.310000
|
||||
CVE-2024-7843,1,1,519d47bcb9fc9e3a27bbd644c576e4cb35d41e45b051fa509cdd6678ff80bc77,2024-08-15T23:15:10.453000
|
||||
CVE-2024-7844,1,1,59508ebc076bca47c92fd6f0f56b8bc2f4a5223afe39a11234df2e1523ff3db6,2024-08-15T23:15:10.740000
|
||||
CVE-2024-7866,0,0,7b21c6eb36d73c92e1f7d8bb8574d36dfd6e1deee61d5ef7c7c7b7a0b352193c,2024-08-15T20:15:18.793000
|
||||
CVE-2024-7867,0,0,2c6807e6cda13329c05cc32828904aaff7f4fcd646d878acd15e994ea1a532df,2024-08-15T20:15:18.967000
|
||||
CVE-2024-7868,0,0,1270b7dc6c77cab6c2ea3d2de21860bb4fd556dbaed1521f53d18e8f28829e9b,2024-08-15T21:15:18.530000
|
||||
|
Can't render this file because it is too large.
|
Loading…
x
Reference in New Issue
Block a user