mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-05-06 18:52:58 +00:00
Auto-Update: 2024-08-06T16:00:17.155581+00:00
This commit is contained in:
parent
ee5263fa28
commit
fb136c93cf
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2013-0346",
|
||||
"sourceIdentifier": "secalert@redhat.com",
|
||||
"published": "2014-02-15T14:57:07.613",
|
||||
"lastModified": "2024-05-17T00:54:28.617",
|
||||
"lastModified": "2024-08-06T15:15:26.393",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [
|
||||
{
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2014-125049",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2023-01-06T13:15:09.750",
|
||||
"lastModified": "2024-05-17T00:58:17.853",
|
||||
"lastModified": "2024-08-06T14:15:22.223",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [
|
||||
{
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2014-125061",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2023-01-07T13:15:09.210",
|
||||
"lastModified": "2024-05-17T00:58:19.220",
|
||||
"lastModified": "2024-08-06T14:15:22.550",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [
|
||||
{
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2014-9426",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2014-12-31T02:59:01.217",
|
||||
"lastModified": "2024-06-18T19:15:54.110",
|
||||
"lastModified": "2024-08-06T14:15:49.283",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [
|
||||
{
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2014-9768",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2016-03-18T14:59:00.123",
|
||||
"lastModified": "2024-05-17T01:02:24.847",
|
||||
"lastModified": "2024-08-06T14:15:58.787",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [
|
||||
{
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2018-0824",
|
||||
"sourceIdentifier": "secure@microsoft.com",
|
||||
"published": "2018-05-09T19:29:00.370",
|
||||
"lastModified": "2024-08-06T01:00:01.460",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2024-08-06T14:35:00.867",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"cisaExploitAdd": "2024-08-05",
|
||||
"cisaActionDue": "2024-08-26",
|
||||
@ -20,6 +20,28 @@
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "HIGH",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 7.5,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 1.6,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
],
|
||||
"cvssMetricV30": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
@ -78,6 +100,16 @@
|
||||
"value": "CWE-502"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-502"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
|
@ -2,100 +2,15 @@
|
||||
"id": "CVE-2023-0253",
|
||||
"sourceIdentifier": "security@wordfence.com",
|
||||
"published": "2023-02-02T21:22:47.117",
|
||||
"lastModified": "2023-11-07T03:59:58.583",
|
||||
"vulnStatus": "Modified",
|
||||
"lastModified": "2024-08-06T14:16:03.107",
|
||||
"vulnStatus": "Rejected",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "The Real Media Library: Media Library Folder & File Manager plugin for WordPress is vulnerable to Stored Cross-Site Scripting via folder names in versions up to, and including, 4.18.28 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers with author-level permissions and above to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page."
|
||||
"value": "Rejected reason: **REJECT** Accidental CVE Assignment. Please use CVE-2023-0285."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 5.4,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.3,
|
||||
"impactScore": 2.7
|
||||
},
|
||||
{
|
||||
"source": "security@wordfence.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 6.4,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 3.1,
|
||||
"impactScore": 2.7
|
||||
}
|
||||
]
|
||||
},
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:devowl:wordpress_real_media_library:*:*:*:*:*:wordpress:*:*",
|
||||
"versionEndIncluding": "4.18.28",
|
||||
"matchCriteriaId": "FC290C38-868B-4B8B-85FB-864D6823D491"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://devowlio.gitbook.io/changelogs/wordpress-plugins/real-media-library",
|
||||
"source": "security@wordfence.com",
|
||||
"tags": [
|
||||
"Release Notes",
|
||||
"Vendor Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://wordpress.org/plugins/real-media-library-lite/",
|
||||
"source": "security@wordfence.com",
|
||||
"tags": [
|
||||
"Product",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/950d71ae-29a1-4b71-b74a-b1a5c9f3326e",
|
||||
"source": "security@wordfence.com",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
"metrics": {},
|
||||
"references": []
|
||||
}
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2023-40289",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-03-27T04:15:10.220",
|
||||
"lastModified": "2024-03-27T12:29:30.307",
|
||||
"lastModified": "2024-08-06T15:35:03.140",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -15,7 +15,42 @@
|
||||
"value": "Se descubri\u00f3 un problema de inyecci\u00f3n de comandos en los dispositivos Supermicro X11SSM-F, X11SAE-F y X11SSE-F 1.66. Un atacante puede aprovechar esto para elevar los privilegios de un usuario con privilegios administrativos de BMC."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "HIGH",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 7.2,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 1.2,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-269"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.supermicro.com/en/support/security_BMC_IPMI_Oct_2023",
|
||||
|
25
CVE-2023/CVE-2023-408xx/CVE-2023-40819.json
Normal file
25
CVE-2023/CVE-2023-408xx/CVE-2023-40819.json
Normal file
@ -0,0 +1,25 @@
|
||||
{
|
||||
"id": "CVE-2023-40819",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-08-06T14:16:03.380",
|
||||
"lastModified": "2024-08-06T14:16:03.380",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "ID4Portais in version < V.2022.837.002a returns message parameter unsanitized in the response, resulting in a HTML Injection vulnerability."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://miguelsantareno.github.io/id4Portais.txt",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://www.id4software.com/",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2023-45927",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-03-27T04:15:10.847",
|
||||
"lastModified": "2024-03-27T12:29:30.307",
|
||||
"lastModified": "2024-08-06T15:35:04.090",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -15,7 +15,42 @@
|
||||
"value": "Se descubri\u00f3 que S-Lang 2.3.2 conten\u00eda una excepci\u00f3n aritm\u00e9tica mediante la funci\u00f3n tt_sprintf()."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 9.1,
|
||||
"baseSeverity": "CRITICAL"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.2
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-703"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "http://lists.jedsoft.org/lists/slang-users/2023/0000003.html",
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2023-49971",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-03-06T01:15:07.017",
|
||||
"lastModified": "2024-03-06T15:18:08.093",
|
||||
"lastModified": "2024-08-06T14:35:02.513",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -15,7 +15,42 @@
|
||||
"value": "Una vulnerabilidad de cross-site scripting (XSS) en Customer Support System v1 permite a los atacantes ejecutar scripts web arbitrarios o HTML a trav\u00e9s de un payload manipulado inyectado en el par\u00e1metro de nombre en /customer_support/index.php?page=customer_list."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 4.7,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 1.4
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/geraldoalcantara/CVE-2023-49971",
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2023-49979",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-03-21T02:49:38.600",
|
||||
"lastModified": "2024-03-21T12:58:51.093",
|
||||
"lastModified": "2024-08-06T15:35:05.213",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -15,7 +15,42 @@
|
||||
"value": "Una vulnerabilidad de listado de directorios en Customer Support System v1 permite a los atacantes enumerar directorios y archivos confidenciales dentro de la aplicaci\u00f3n sin requerir autorizaci\u00f3n."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 7.5,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-548"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/geraldoalcantara/CVE-2023-49979",
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2023-49983",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-03-21T02:49:38.763",
|
||||
"lastModified": "2024-03-21T12:58:51.093",
|
||||
"lastModified": "2024-08-06T14:35:03.603",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -15,7 +15,42 @@
|
||||
"value": "Una vulnerabilidad de cross site scripting (XSS) en el componente /management/class de School Fees Management System v1.0 permite a los atacantes ejecutar scripts web o HTML arbitrarios a trav\u00e9s de un payload manipulado inyectado en el par\u00e1metro de nombre.."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:L/A:L",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "LOW",
|
||||
"baseScore": 6.8,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.1,
|
||||
"impactScore": 4.7
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/geraldoalcantara/CVE-2023-49983",
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2023-50895",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-03-26T15:15:48.860",
|
||||
"lastModified": "2024-03-26T17:09:53.043",
|
||||
"lastModified": "2024-08-06T15:35:06.050",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -15,7 +15,30 @@
|
||||
"value": "En Janitza GridVis hasta la versi\u00f3n 9.0.66, los m\u00e9todos peligrosos expuestos en la funcionalidad de carga del proyecto de.janitza.pasw.project.server.ServerDatabaseProject permiten a usuarios administrativos remotos autenticados ejecutar c\u00f3digo Groovy arbitrario."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "HIGH",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 7.2,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 1.2,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://code-white.com",
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2023-52584",
|
||||
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"published": "2024-03-06T07:15:07.227",
|
||||
"lastModified": "2024-03-06T15:18:08.093",
|
||||
"lastModified": "2024-08-06T14:35:04.610",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -15,7 +15,42 @@
|
||||
"value": "En el kernel de Linux, se resolvi\u00f3 la siguiente vulnerabilidad: spmi: mediatek: reparar UAF en la eliminaci\u00f3n del dispositivo. Los datos del controlador pmif que contienen los relojes se asignan junto con spmi_controller. Al eliminar el dispositivo, primero se liberar\u00e1 spmi_controller y luego se limpiar\u00e1n los devres, incluidos los relojes. Esto lleva a UAF porque al poner los relojes se acceder\u00e1 a los relojes en los datos del controlador pmif, que ya est\u00e1n liberados junto con spmi_controller. Esto se puede reproducir habilitando DEBUG_TEST_DRIVER_REMOVE y compilando el kernel con KASAN. Solucione el problema de UAF utilizando clk_bulk_get() no administrado y poniendo los relojes antes de liberar spmi_controller."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "HIGH",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 3.8,
|
||||
"baseSeverity": "LOW"
|
||||
},
|
||||
"exploitabilityScore": 1.2,
|
||||
"impactScore": 2.5
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-416"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/521f28eedd6b14228c46e3b81e3bf9b90c2818d8",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-6696",
|
||||
"sourceIdentifier": "security@wordfence.com",
|
||||
"published": "2024-06-15T02:15:50.300",
|
||||
"lastModified": "2024-06-17T12:42:04.623",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2024-08-06T14:05:42.023",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -18,7 +18,7 @@
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security@wordfence.com",
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
@ -36,21 +36,81 @@
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 5.2
|
||||
},
|
||||
{
|
||||
"source": "security@wordfence.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 8.1,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 5.2
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-862"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:sygnoos:popup_builder:*:*:*:*:*:wordpress:*:*",
|
||||
"versionEndExcluding": "4.3.2",
|
||||
"matchCriteriaId": "D037081F-B950-44C3-B909-D146ECEFB211"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/browser/popup-builder/tags/4.2.3/com/classes/Ajax.php",
|
||||
"source": "security@wordfence.com"
|
||||
"source": "security@wordfence.com",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/changeset/3096000/popup-builder/trunk/com/classes/Ajax.php",
|
||||
"source": "security@wordfence.com"
|
||||
"source": "security@wordfence.com",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/9f86ec30-7a9d-4c36-8559-bde331c8b958?source=cve",
|
||||
"source": "security@wordfence.com"
|
||||
"source": "security@wordfence.com",
|
||||
"tags": [
|
||||
"Patch",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-20005",
|
||||
"sourceIdentifier": "security@mediatek.com",
|
||||
"published": "2024-03-04T03:15:06.917",
|
||||
"lastModified": "2024-03-04T13:58:23.447",
|
||||
"lastModified": "2024-08-06T15:35:06.587",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -15,7 +15,42 @@
|
||||
"value": "En da, existe una posible omisi\u00f3n de permiso debido a que falta una verificaci\u00f3n de permiso. Esto podr\u00eda conducir a una escalada local de privilegios con permisos de ejecuci\u00f3n de System necesarios. La interacci\u00f3n del usuario no es necesaria para la explotaci\u00f3n. ID de parche: ALPS08355599; ID del problema: ALPS08355599."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "HIGH",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 8.2,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 1.5,
|
||||
"impactScore": 6.0
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-276"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://corp.mediatek.com/product-security-bulletin/March-2024",
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-20027",
|
||||
"sourceIdentifier": "security@mediatek.com",
|
||||
"published": "2024-03-04T03:15:07.363",
|
||||
"lastModified": "2024-03-04T13:58:23.447",
|
||||
"lastModified": "2024-08-06T15:35:07.420",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -15,7 +15,42 @@
|
||||
"value": "En da, existe una posible escritura fuera de los l\u00edmites debido a una validaci\u00f3n de entrada incorrecta. Esto podr\u00eda conducir a una escalada local de privilegios con permisos de ejecuci\u00f3n de System necesarios. La interacci\u00f3n del usuario no es necesaria para la explotaci\u00f3n. ID de parche: ALPS08541632; ID del problema: ALPS08541633."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:N",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "HIGH",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 7.9,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 1.5,
|
||||
"impactScore": 5.8
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-787"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://corp.mediatek.com/product-security-bulletin/March-2024",
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-2053",
|
||||
"sourceIdentifier": "cve@takeonme.org",
|
||||
"published": "2024-03-21T02:52:27.250",
|
||||
"lastModified": "2024-03-21T12:58:51.093",
|
||||
"lastModified": "2024-08-06T15:35:13.397",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -15,7 +15,30 @@
|
||||
"value": "La aplicaci\u00f3n web administrativa Artica Proxy deserializar\u00e1 objetos PHP arbitrarios proporcionados por usuarios no autenticados y posteriormente permitir\u00e1 la ejecuci\u00f3n de c\u00f3digo como usuario \"www-data\". Este problema se demostr\u00f3 en la versi\u00f3n 4.50 de La aplicaci\u00f3n web administrativa Artica-Proxy intenta evitar la inclusi\u00f3n de archivos locales. Estas protecciones se pueden eludir y las solicitudes de archivos arbitrarias proporcionadas por usuarios no autenticados se devolver\u00e1n de acuerdo con los privilegios del usuario \"www-data\"."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 7.5,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "cve@takeonme.org",
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-22724",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-03-21T04:15:09.327",
|
||||
"lastModified": "2024-03-21T12:58:51.093",
|
||||
"lastModified": "2024-08-06T15:35:08.610",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -15,7 +15,42 @@
|
||||
"value": "Se descubri\u00f3 un problema en osCommerce v4 que permite a atacantes locales eludir las restricciones de carga de archivos y ejecutar c\u00f3digo arbitrario a trav\u00e9s de la funci\u00f3n de carga de fotos de perfil del administrador."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:L",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "LOW",
|
||||
"baseScore": 6.6,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 4.7
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-94"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/osCommerce/osCommerce-V4/issues/62",
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-23722",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-03-26T15:15:49.317",
|
||||
"lastModified": "2024-03-26T17:09:53.043",
|
||||
"lastModified": "2024-08-06T14:35:05.600",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -15,7 +15,42 @@
|
||||
"value": "En Fluent Bit 2.1.8 a 2.2.1, se puede provocar una desreferencia de puntero NULL a trav\u00e9s de un payload HTTP no v\u00e1lida con el tipo de contenido x-www-form-urlencoded. Se bloquea y no se reinicia. Esto podr\u00eda provocar que los registros no se entreguen correctamente."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 7.5,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-476"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/fluent/fluent-bit/compare/v2.2.1...v2.2.2",
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-26566",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-03-07T01:15:52.757",
|
||||
"lastModified": "2024-03-07T13:52:27.110",
|
||||
"lastModified": "2024-08-06T14:35:06.510",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -15,7 +15,42 @@
|
||||
"value": "Un problema en Cute Http File Server v.3.1 permite a un atacante remoto escalar privilegios a trav\u00e9s del componente de verificaci\u00f3n de contrase\u00f1a."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 8.2,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 4.2
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-288"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "http://cute.com",
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-27564",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-03-05T17:15:06.997",
|
||||
"lastModified": "2024-03-05T18:50:18.333",
|
||||
"lastModified": "2024-08-06T15:35:10.030",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -15,7 +15,42 @@
|
||||
"value": "Server-Side Request Forgery (SSRF) en pictureproxy.php de ChatGPT commit f9f4bbc permite a los atacantes forzar a la aplicaci\u00f3n a realizar solicitudes arbitrarias mediante la inyecci\u00f3n de URL manipuladas en el par\u00e1metro url."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 6.5,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 2.5
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-918"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/dirk1983/chatgpt/issues/114",
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-27707",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-03-07T21:15:08.510",
|
||||
"lastModified": "2024-03-08T14:02:57.420",
|
||||
"lastModified": "2024-08-06T14:35:07.363",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -15,7 +15,42 @@
|
||||
"value": "Vulnerabilidad de Server Side Request Forgery (SSRF) en hcengineering Huly Platform v.0.6.202 permite a los atacantes ejecutar c\u00f3digo arbitrario mediante la carga de un archivo SVG manipulado."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 4.3,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 1.4
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-918"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/b-hermes/vulnerability-research/tree/main/CVE-2024-27707",
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-28335",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-03-27T06:15:19.447",
|
||||
"lastModified": "2024-03-27T12:29:30.307",
|
||||
"lastModified": "2024-08-06T15:35:11.200",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -15,7 +15,42 @@
|
||||
"value": "Lektor anterior a 3.3.11 no sanitiza el path traversal de la base de datos. Por lo tanto, los comandos de shell pueden ejecutarse a trav\u00e9s de un archivo que se agrega al directorio de plantillas, si el navegador web de la v\u00edctima accede a un sitio web que no es de confianza y que usa JavaScript para enviar solicitudes al puerto localhost 5000, y el navegador web se ejecuta en la misma m\u00e1quina que el Comando \"servidor lector\"."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 9.1,
|
||||
"baseSeverity": "CRITICAL"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.2
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-22"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://brave.com/privacy-updates/27-localhost-permission/",
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-28545",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-03-26T21:15:53.070",
|
||||
"lastModified": "2024-03-27T12:29:30.307",
|
||||
"lastModified": "2024-08-06T14:35:08.207",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -15,7 +15,42 @@
|
||||
"value": "Tenda AC18 V15.03.05.05 contiene una vulnerabilidad de inyecci\u00f3n de comando en el par\u00e1metro deviceName de la funci\u00f3n formsetUsbUnload."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-77"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/AC18/setUsbUnload.md",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-28965",
|
||||
"sourceIdentifier": "security_alert@emc.com",
|
||||
"published": "2024-06-13T15:15:51.033",
|
||||
"lastModified": "2024-06-13T18:35:19.777",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2024-08-06T15:30:52.433",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -17,6 +17,26 @@
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 5.4,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 2.5
|
||||
},
|
||||
{
|
||||
"source": "security_alert@emc.com",
|
||||
"type": "Secondary",
|
||||
@ -41,8 +61,18 @@
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security_alert@emc.com",
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "NVD-CWE-noinfo"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "security_alert@emc.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -51,10 +81,32 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:dell:secure_connect_gateway:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "5.18.00.20",
|
||||
"versionEndIncluding": "5.22.00.18",
|
||||
"matchCriteriaId": "E22B308F-DD41-4598-81D0-5A10E43372DB"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.dell.com/support/kbdoc/en-us/000225910/dsa-2024-181-security-update-for-dell-secure-connect-gateway-application-and-appliance-vulnerabilities",
|
||||
"source": "security_alert@emc.com"
|
||||
"source": "security_alert@emc.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-28966",
|
||||
"sourceIdentifier": "security_alert@emc.com",
|
||||
"published": "2024-06-13T15:15:51.423",
|
||||
"lastModified": "2024-06-13T18:35:19.777",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2024-08-06T15:30:39.067",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -17,6 +17,26 @@
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 5.4,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 2.5
|
||||
},
|
||||
{
|
||||
"source": "security_alert@emc.com",
|
||||
"type": "Secondary",
|
||||
@ -41,8 +61,18 @@
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security_alert@emc.com",
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "NVD-CWE-noinfo"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "security_alert@emc.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -51,10 +81,32 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:dell:secure_connect_gateway:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "5.18.00.20",
|
||||
"versionEndIncluding": "5.22.00.18",
|
||||
"matchCriteriaId": "E22B308F-DD41-4598-81D0-5A10E43372DB"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.dell.com/support/kbdoc/en-us/000225910/dsa-2024-181-security-update-for-dell-secure-connect-gateway-application-and-appliance-vulnerabilities",
|
||||
"source": "security_alert@emc.com"
|
||||
"source": "security_alert@emc.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-28967",
|
||||
"sourceIdentifier": "security_alert@emc.com",
|
||||
"published": "2024-06-13T15:15:51.660",
|
||||
"lastModified": "2024-06-13T18:35:19.777",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2024-08-06T15:30:14.820",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -17,6 +17,26 @@
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 5.4,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 2.5
|
||||
},
|
||||
{
|
||||
"source": "security_alert@emc.com",
|
||||
"type": "Secondary",
|
||||
@ -41,8 +61,18 @@
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security_alert@emc.com",
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "NVD-CWE-noinfo"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "security_alert@emc.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -51,10 +81,32 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:dell:secure_connect_gateway:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "5.18.00.20",
|
||||
"versionEndIncluding": "5.22.00.18",
|
||||
"matchCriteriaId": "E22B308F-DD41-4598-81D0-5A10E43372DB"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.dell.com/support/kbdoc/en-us/000225910/dsa-2024-181-security-update-for-dell-secure-connect-gateway-application-and-appliance-vulnerabilities",
|
||||
"source": "security_alert@emc.com"
|
||||
"source": "security_alert@emc.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-28968",
|
||||
"sourceIdentifier": "security_alert@emc.com",
|
||||
"published": "2024-06-13T15:15:51.890",
|
||||
"lastModified": "2024-06-13T18:35:19.777",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2024-08-06T15:29:59.990",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -17,6 +17,26 @@
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 5.4,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 2.5
|
||||
},
|
||||
{
|
||||
"source": "security_alert@emc.com",
|
||||
"type": "Secondary",
|
||||
@ -41,8 +61,18 @@
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security_alert@emc.com",
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "NVD-CWE-noinfo"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "security_alert@emc.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -51,10 +81,32 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:dell:secure_connect_gateway:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "5.18.00.20",
|
||||
"versionEndIncluding": "5.22.00.18",
|
||||
"matchCriteriaId": "E22B308F-DD41-4598-81D0-5A10E43372DB"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.dell.com/support/kbdoc/en-us/000225910/dsa-2024-181-security-update-for-dell-secure-connect-gateway-application-and-appliance-vulnerabilities",
|
||||
"source": "security_alert@emc.com"
|
||||
"source": "security_alert@emc.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-28969",
|
||||
"sourceIdentifier": "security_alert@emc.com",
|
||||
"published": "2024-06-13T15:15:52.183",
|
||||
"lastModified": "2024-06-13T18:35:19.777",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2024-08-06T15:28:06.497",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -17,6 +17,26 @@
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 4.3,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 1.4
|
||||
},
|
||||
{
|
||||
"source": "security_alert@emc.com",
|
||||
"type": "Secondary",
|
||||
@ -41,8 +61,18 @@
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security_alert@emc.com",
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "NVD-CWE-noinfo"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "security_alert@emc.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -51,10 +81,32 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:dell:secure_connect_gateway:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "5.18.00.20",
|
||||
"versionEndIncluding": "5.22.00.18",
|
||||
"matchCriteriaId": "E22B308F-DD41-4598-81D0-5A10E43372DB"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.dell.com/support/kbdoc/en-us/000225910/dsa-2024-181-security-update-for-dell-secure-connect-gateway-application-and-appliance-vulnerabilities",
|
||||
"source": "security_alert@emc.com"
|
||||
"source": "security_alert@emc.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-29168",
|
||||
"sourceIdentifier": "security_alert@emc.com",
|
||||
"published": "2024-06-13T15:15:52.433",
|
||||
"lastModified": "2024-06-13T18:35:19.777",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2024-08-06T15:28:10.527",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -17,6 +17,26 @@
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 8.8,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 5.9
|
||||
},
|
||||
{
|
||||
"source": "security_alert@emc.com",
|
||||
"type": "Secondary",
|
||||
@ -51,10 +71,32 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:dell:secure_connect_gateway:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "5.18.00.20",
|
||||
"versionEndIncluding": "5.22.00.18",
|
||||
"matchCriteriaId": "E22B308F-DD41-4598-81D0-5A10E43372DB"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.dell.com/support/kbdoc/en-us/000225910/dsa-2024-181-security-update-for-dell-secure-connect-gateway-application-and-appliance-vulnerabilities",
|
||||
"source": "security_alert@emc.com"
|
||||
"source": "security_alert@emc.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-29684",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-03-26T14:15:09.003",
|
||||
"lastModified": "2024-03-26T17:09:53.043",
|
||||
"lastModified": "2024-08-06T15:35:12.520",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -15,7 +15,42 @@
|
||||
"value": "Se descubri\u00f3 que DedeCMS v5.7 conten\u00eda Cross-Site Request Forgery (CSRF) a trav\u00e9s del componente /src/dede/makehtml_homepage.php, lo que permit\u00eda a un atacante remoto ejecutar c\u00f3digo arbitrario."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-352"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/iimiss/cms/blob/main/1.md",
|
||||
|
25
CVE-2024/CVE-2024-301xx/CVE-2024-30170.json
Normal file
25
CVE-2024/CVE-2024-301xx/CVE-2024-30170.json
Normal file
@ -0,0 +1,25 @@
|
||||
{
|
||||
"id": "CVE-2024-30170",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-08-06T14:16:03.777",
|
||||
"lastModified": "2024-08-06T14:16:03.777",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "PrivX before 34.0 allows data exfiltration and denial of service via the REST API. This is fixed in minor versions 33.1, 32.3, 31.3, and later, and in major version 34.0 and later,"
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://info.ssh.com/improper-input-validation-faq",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://privx.docs.ssh.com/docs/security",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-33787",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-05-03T13:15:22.060",
|
||||
"lastModified": "2024-05-03T14:17:53.690",
|
||||
"lastModified": "2024-08-06T15:35:13.693",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -15,7 +15,42 @@
|
||||
"value": "Se descubri\u00f3 que Hengan Weighing Management Information Query Platform 2019-2021 53.25 contiene una vulnerabilidad de inyecci\u00f3n SQL a trav\u00e9s del par\u00e1metro tuser_Number en search_user.aspx."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 8.2,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 4.2
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-89"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/jiankeguyue/VulnerabilityReport/blob/main/hengan_weighing_management_information_query_platform.md",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-33844",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-05-03T15:15:08.157",
|
||||
"lastModified": "2024-06-10T18:45:09.903",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2024-08-06T15:35:14.480",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -49,6 +49,16 @@
|
||||
"value": "NVD-CWE-noinfo"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-404"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
|
29
CVE-2024/CVE-2024-338xx/CVE-2024-33897.json
Normal file
29
CVE-2024/CVE-2024-338xx/CVE-2024-33897.json
Normal file
@ -0,0 +1,29 @@
|
||||
{
|
||||
"id": "CVE-2024-33897",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-08-06T14:16:03.870",
|
||||
"lastModified": "2024-08-06T14:16:03.870",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A compromised HMS Networks Cosy+ device could be used to request a Certificate Signing Request from Talk2m for another device, resulting in an availability issue. The issue was patched on the Talk2m production server on April 18, 2024."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://hmsnetworks.blob.core.windows.net/nlw/docs/default-source/products/cybersecurity/security-advisory/hms-security-advisory-2024-07-29-001--ewon-several-cosy--vulnerabilities.pdf",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://www.ewon.biz/products/cosy/ewon-cosy-wifi",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://www.hms-networks.com/cyber-security",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-35206",
|
||||
"sourceIdentifier": "productcert@siemens.com",
|
||||
"published": "2024-06-11T12:15:16.337",
|
||||
"lastModified": "2024-06-11T13:54:12.057",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2024-08-06T15:02:05.777",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -61,6 +61,26 @@
|
||||
}
|
||||
],
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 8.8,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 5.9
|
||||
},
|
||||
{
|
||||
"source": "productcert@siemens.com",
|
||||
"type": "Secondary",
|
||||
@ -95,10 +115,32 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:siemens:sinec_traffic_analyzer:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "1.2",
|
||||
"matchCriteriaId": "629B3242-572B-4E48-945A-DADB5C7702AA"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://cert-portal.siemens.com/productcert/html/ssa-196737.html",
|
||||
"source": "productcert@siemens.com"
|
||||
"source": "productcert@siemens.com",
|
||||
"tags": [
|
||||
"Patch",
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-35207",
|
||||
"sourceIdentifier": "productcert@siemens.com",
|
||||
"published": "2024-06-11T12:15:16.600",
|
||||
"lastModified": "2024-06-11T13:54:12.057",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2024-08-06T15:02:16.163",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -61,6 +61,26 @@
|
||||
}
|
||||
],
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 7.8,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 5.9
|
||||
},
|
||||
{
|
||||
"source": "productcert@siemens.com",
|
||||
"type": "Secondary",
|
||||
@ -95,10 +115,32 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:siemens:sinec_traffic_analyzer:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "1.2",
|
||||
"matchCriteriaId": "629B3242-572B-4E48-945A-DADB5C7702AA"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://cert-portal.siemens.com/productcert/html/ssa-196737.html",
|
||||
"source": "productcert@siemens.com"
|
||||
"source": "productcert@siemens.com",
|
||||
"tags": [
|
||||
"Patch",
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-35208",
|
||||
"sourceIdentifier": "productcert@siemens.com",
|
||||
"published": "2024-06-11T12:15:16.923",
|
||||
"lastModified": "2024-06-11T13:54:12.057",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2024-08-06T15:08:17.727",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -61,6 +61,26 @@
|
||||
}
|
||||
],
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 5.5,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 3.6
|
||||
},
|
||||
{
|
||||
"source": "productcert@siemens.com",
|
||||
"type": "Secondary",
|
||||
@ -84,6 +104,16 @@
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-522"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "productcert@siemens.com",
|
||||
"type": "Secondary",
|
||||
@ -95,10 +125,32 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:siemens:sinec_traffic_analyzer:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "1.2",
|
||||
"matchCriteriaId": "629B3242-572B-4E48-945A-DADB5C7702AA"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://cert-portal.siemens.com/productcert/html/ssa-196737.html",
|
||||
"source": "productcert@siemens.com"
|
||||
"source": "productcert@siemens.com",
|
||||
"tags": [
|
||||
"Patch",
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-35209",
|
||||
"sourceIdentifier": "productcert@siemens.com",
|
||||
"published": "2024-06-11T12:15:17.157",
|
||||
"lastModified": "2024-06-11T13:54:12.057",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2024-08-06T15:09:04.427",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -61,6 +61,26 @@
|
||||
}
|
||||
],
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 7.5,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 3.6
|
||||
},
|
||||
{
|
||||
"source": "productcert@siemens.com",
|
||||
"type": "Secondary",
|
||||
@ -95,10 +115,32 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:siemens:sinec_traffic_analyzer:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "1.2",
|
||||
"matchCriteriaId": "629B3242-572B-4E48-945A-DADB5C7702AA"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://cert-portal.siemens.com/productcert/html/ssa-196737.html",
|
||||
"source": "productcert@siemens.com"
|
||||
"source": "productcert@siemens.com",
|
||||
"tags": [
|
||||
"Patch",
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-35210",
|
||||
"sourceIdentifier": "productcert@siemens.com",
|
||||
"published": "2024-06-11T12:15:17.397",
|
||||
"lastModified": "2024-06-11T13:54:12.057",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2024-08-06T15:09:53.797",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -61,6 +61,26 @@
|
||||
}
|
||||
],
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 7.5,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 3.6
|
||||
},
|
||||
{
|
||||
"source": "productcert@siemens.com",
|
||||
"type": "Secondary",
|
||||
@ -95,10 +115,32 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:siemens:sinec_traffic_analyzer:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "1.2",
|
||||
"matchCriteriaId": "629B3242-572B-4E48-945A-DADB5C7702AA"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://cert-portal.siemens.com/productcert/html/ssa-196737.html",
|
||||
"source": "productcert@siemens.com"
|
||||
"source": "productcert@siemens.com",
|
||||
"tags": [
|
||||
"Patch",
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-35211",
|
||||
"sourceIdentifier": "productcert@siemens.com",
|
||||
"published": "2024-06-11T12:15:17.643",
|
||||
"lastModified": "2024-06-11T13:54:12.057",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2024-08-06T15:10:56.163",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -61,6 +61,26 @@
|
||||
}
|
||||
],
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 6.5,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 3.6
|
||||
},
|
||||
{
|
||||
"source": "productcert@siemens.com",
|
||||
"type": "Secondary",
|
||||
@ -95,10 +115,32 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:siemens:sinec_traffic_analyzer:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "1.2",
|
||||
"matchCriteriaId": "629B3242-572B-4E48-945A-DADB5C7702AA"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://cert-portal.siemens.com/productcert/html/ssa-196737.html",
|
||||
"source": "productcert@siemens.com"
|
||||
"source": "productcert@siemens.com",
|
||||
"tags": [
|
||||
"Patch",
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-35212",
|
||||
"sourceIdentifier": "productcert@siemens.com",
|
||||
"published": "2024-06-11T12:15:17.897",
|
||||
"lastModified": "2024-06-11T13:54:12.057",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2024-08-06T15:11:27.243",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -61,6 +61,26 @@
|
||||
}
|
||||
],
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 7.5,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 3.6
|
||||
},
|
||||
{
|
||||
"source": "productcert@siemens.com",
|
||||
"type": "Secondary",
|
||||
@ -85,8 +105,18 @@
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "productcert@siemens.com",
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "NVD-CWE-noinfo"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "productcert@siemens.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -95,10 +125,32 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:siemens:sinec_traffic_analyzer:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "1.2",
|
||||
"matchCriteriaId": "629B3242-572B-4E48-945A-DADB5C7702AA"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://cert-portal.siemens.com/productcert/html/ssa-196737.html",
|
||||
"source": "productcert@siemens.com"
|
||||
"source": "productcert@siemens.com",
|
||||
"tags": [
|
||||
"Patch",
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
25
CVE-2024/CVE-2024-364xx/CVE-2024-36424.json
Normal file
25
CVE-2024/CVE-2024-364xx/CVE-2024-36424.json
Normal file
@ -0,0 +1,25 @@
|
||||
{
|
||||
"id": "CVE-2024-36424",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-08-06T15:15:41.843",
|
||||
"lastModified": "2024-08-06T15:15:41.843",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "K7RKScan.sys in K7 Ultimate Security before 17.0.2019 allows local users to cause a denial of service (BSOD) because of a NULL pointer dereference."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://support.k7computing.com/index.php?/selfhelp/view-article/Advisory-issued-on-5th-aug-2024-417",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://www.k7computing.com/",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
29
CVE-2024/CVE-2024-401xx/CVE-2024-40101.json
Normal file
29
CVE-2024/CVE-2024-401xx/CVE-2024-40101.json
Normal file
@ -0,0 +1,29 @@
|
||||
{
|
||||
"id": "CVE-2024-40101",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-08-06T14:16:04.117",
|
||||
"lastModified": "2024-08-06T14:16:04.117",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A Reflected Cross-site scripting (XSS) vulnerability exists in '/search' in microweber 2.0.15 and earlier allowing unauthenticated remote attackers to inject arbitrary web script or HTML via the 'keywords' parameter."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "http://microweber.com",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/microweber/microweber/commit/0dede6886c6df3d1f31c4f4e3ba1ab4a336fbf79",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://seclists.org/fulldisclosure/2024/Aug/1",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,16 +2,55 @@
|
||||
"id": "CVE-2024-40498",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-08-05T17:15:41.670",
|
||||
"lastModified": "2024-08-05T17:15:41.670",
|
||||
"lastModified": "2024-08-06T15:35:16.133",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "SQL Injection vulnerability in PuneethReddyHC Online Shopping sysstem advanced v.1.0 allows an attacker to execute arbitrary code via the register.php"
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Vulnerabilidad de inyecci\u00f3n SQL en PuneethReddyHC Online Shopping sysstem advanced v.1.0 permite a un atacante ejecutar c\u00f3digo arbitrario a trav\u00e9s de Register.php"
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-89"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/Dirac231/CVE-2024-40498",
|
||||
|
@ -2,16 +2,55 @@
|
||||
"id": "CVE-2024-40530",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-08-05T16:15:36.750",
|
||||
"lastModified": "2024-08-05T16:15:36.750",
|
||||
"lastModified": "2024-08-06T15:35:16.910",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Insecure Permissions vulnerability in UAB Lexita PanteraCRM CMS v.401.152 and Patera CRM CMS v.402.072 allows a remote attacker to execute arbitrary code via modification of the X-Forwarded-For header component."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Vulnerabilidad de permisos inseguros en UAB Lexita PanteraCRM CMS v.401.152 y Patera CRM CMS v.402.072 permite a un atacante remoto ejecutar c\u00f3digo arbitrario mediante la modificaci\u00f3n del componente de encabezado X-Forwarded-For."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-94"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://critical.lt/blog/authorization-bypass-and-mass-assignment-in-pantera-crm/",
|
||||
|
25
CVE-2024/CVE-2024-412xx/CVE-2024-41226.json
Normal file
25
CVE-2024/CVE-2024-412xx/CVE-2024-41226.json
Normal file
@ -0,0 +1,25 @@
|
||||
{
|
||||
"id": "CVE-2024-41226",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-08-06T14:16:04.240",
|
||||
"lastModified": "2024-08-06T14:16:04.240",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A CSV injection vulnerability in Automation Anywhere Automation 360 version 21094 allows attackers to execute arbitrary code via a crafted payload."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://medium.com/%40aksalsalimi/cve-2024-41226-response-manipulation-led-to-csv-injection-9ae3182dcc02",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://www.automationanywhere.com/products/automation-360",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
21
CVE-2024/CVE-2024-419xx/CVE-2024-41910.json
Normal file
21
CVE-2024/CVE-2024-419xx/CVE-2024-41910.json
Normal file
@ -0,0 +1,21 @@
|
||||
{
|
||||
"id": "CVE-2024-41910",
|
||||
"sourceIdentifier": "hp-security-alert@hp.com",
|
||||
"published": "2024-08-06T14:16:04.350",
|
||||
"lastModified": "2024-08-06T14:16:04.350",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A vulnerability was discovered in the firmware builds up to 10.10.2.2 in Poly Clariti Manager devices. The firmware contained multiple XXS vulnerabilities in the version of JavaScript used."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://support.hp.com/us-en/document/ish_11006981-11007005-16/hpsbpy03960",
|
||||
"source": "hp-security-alert@hp.com"
|
||||
}
|
||||
]
|
||||
}
|
21
CVE-2024/CVE-2024-419xx/CVE-2024-41911.json
Normal file
21
CVE-2024/CVE-2024-419xx/CVE-2024-41911.json
Normal file
@ -0,0 +1,21 @@
|
||||
{
|
||||
"id": "CVE-2024-41911",
|
||||
"sourceIdentifier": "hp-security-alert@hp.com",
|
||||
"published": "2024-08-06T14:16:04.427",
|
||||
"lastModified": "2024-08-06T14:16:04.427",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A vulnerability was discovered in the firmware builds up to 10.10.2.2 in Poly Clariti Manager devices. The flaw does not properly neutralize input during a web page generation."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://support.hp.com/us-en/document/ish_11006770-11006795-16/hpsbpy03959",
|
||||
"source": "hp-security-alert@hp.com"
|
||||
}
|
||||
]
|
||||
}
|
21
CVE-2024/CVE-2024-419xx/CVE-2024-41913.json
Normal file
21
CVE-2024/CVE-2024-419xx/CVE-2024-41913.json
Normal file
@ -0,0 +1,21 @@
|
||||
{
|
||||
"id": "CVE-2024-41913",
|
||||
"sourceIdentifier": "hp-security-alert@hp.com",
|
||||
"published": "2024-08-06T14:16:04.480",
|
||||
"lastModified": "2024-08-06T14:16:04.480",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A vulnerability was discovered in the firmware builds up to 10.10.2.2 in Poly Clariti Manager devices. The firmware flaw does not properly sanitize User input."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://support.hp.com/us-en/document/ish_11006488-11006512-16/hpsbpy03957",
|
||||
"source": "hp-security-alert@hp.com"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,16 +2,43 @@
|
||||
"id": "CVE-2024-41995",
|
||||
"sourceIdentifier": "vultures@jpcert.or.jp",
|
||||
"published": "2024-08-06T07:15:46.330",
|
||||
"lastModified": "2024-08-06T07:15:46.330",
|
||||
"lastModified": "2024-08-06T14:35:11.420",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Initialization of a resource with an insecure default vulnerability exists in JavaTM Platform Ver.12.89 and earlier. If this vulnerability is exploited, the product may be affected by some known TLS1.0 and TLS1.1 vulnerabilities. As for the specific products/models/versions of MFPs and printers that contain JavaTM Platform, see the information provided by the vendor."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "La inicializaci\u00f3n de un recurso con una vulnerabilidad predeterminada insegura existe en JavaTM Platform versi\u00f3n 12.89 y versiones anteriores. Si se aprovecha esta vulnerabilidad, el producto puede verse afectado por algunas vulnerabilidades conocidas de TLS1.0 y TLS1.1. En cuanto a los productos/modelos/versiones espec\u00edficos de impresoras multifunci\u00f3n y que contienen la plataforma JavaTM, consulte la informaci\u00f3n proporcionada por el proveedor."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 7.5,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://jp.ricoh.com/security/products/vulnerabilities/vul?id=ricoh-2024-000010",
|
||||
|
@ -2,16 +2,55 @@
|
||||
"id": "CVE-2024-42010",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-08-05T19:15:38.273",
|
||||
"lastModified": "2024-08-05T19:15:38.273",
|
||||
"lastModified": "2024-08-06T14:35:11.647",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "mod_css_styles in Roundcube through 1.5.7 and 1.6.x through 1.6.7 allows a insufficiently filters Cascading Style Sheets (CSS) token sequences in rendered e-mail messages, allowing a remote attacker to obtain sensitive information."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "mod_css_styles en Roundcube hasta 1.5.7 y 1.6.x hasta 1.6.7 permite filtrar insuficientemente secuencias de tokens de hojas de estilo en cascada (CSS) en mensajes de correo electr\u00f3nico renderizados, lo que permite a un atacante remoto obtener informaci\u00f3n confidencial."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 7.5,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-200"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/roundcube/roundcubemail/releases",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-5745",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2024-06-07T18:15:10.843",
|
||||
"lastModified": "2024-06-08T04:15:10.027",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2024-08-06T14:37:59.943",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -61,6 +61,26 @@
|
||||
}
|
||||
],
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
},
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
@ -120,22 +140,52 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:bakery_online_ordering_system_project:bakery_online_ordering_system:1.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "203B0034-B8DE-4501-B2C6-F96FD74AB519"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/L1OudFd8cl09/CVE/blob/main/07_06_2024_a.md",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Exploit"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.267414",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Permissions Required",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.267414",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?submit.351827",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,16 +2,43 @@
|
||||
"id": "CVE-2024-6651",
|
||||
"sourceIdentifier": "contact@wpscan.com",
|
||||
"published": "2024-08-06T06:15:35.973",
|
||||
"lastModified": "2024-08-06T06:15:35.973",
|
||||
"lastModified": "2024-08-06T15:35:18.050",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "The WordPress File Upload WordPress plugin before 4.24.8 does not sanitise and escape a parameter before outputting it back in the page, leading to a Reflected Cross-Site Scripting which could be used against high privilege users such as admin"
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "El complemento WordPress File Upload de WordPress anterior a 4.24.8 no sanitiza ni escapa un par\u00e1metro antes de devolverlo a la p\u00e1gina, lo que genera Cross-Site Scripting Reflejado que podr\u00eda usarse contra usuarios con privilegios elevados, como el administrador."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 6.1,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 2.7
|
||||
}
|
||||
]
|
||||
},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://wpscan.com/vulnerability/65e2c77d-09bd-4a44-81d9-d7a5db0e0f84/",
|
||||
|
@ -2,16 +2,43 @@
|
||||
"id": "CVE-2024-6766",
|
||||
"sourceIdentifier": "contact@wpscan.com",
|
||||
"published": "2024-08-06T06:15:36.047",
|
||||
"lastModified": "2024-08-06T06:15:36.047",
|
||||
"lastModified": "2024-08-06T14:35:12.940",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "The shortcodes-ultimate-pro WordPress plugin before 7.2.1 does not validate and escape some of its shortcode attributes before outputting them back in a page/post where the shortcode is embed, which could allow users with the contributor role and above to perform Stored Cross-Site Scripting attacks"
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "El complemento shortcodes-ultimate-pro de WordPress anterior a 7.2.1 no valida ni escapa algunos de sus atributos de shortcode antes de devolverlos a una p\u00e1gina/publicaci\u00f3n donde est\u00e1 incrustado el shortcode, lo que podr\u00eda permitir a los usuarios con el rol de colaborador y superiores ataques de Cross-Site Scripting Almacenado."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 5.4,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.3,
|
||||
"impactScore": 2.7
|
||||
}
|
||||
]
|
||||
},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://wpscan.com/vulnerability/77bb1dcf-4e84-497a-955e-f3c0b649ad1c/",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-7212",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2024-07-30T02:15:08.697",
|
||||
"lastModified": "2024-07-30T13:32:45.943",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2024-08-06T14:06:56.937",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -61,6 +61,26 @@
|
||||
}
|
||||
],
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 8.8,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 5.9
|
||||
},
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
@ -120,22 +140,63 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:totolink:a7000r_firmware:9.1.0u.6268_b20220504:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "3D52173F-42E7-4186-A442-5057269446AB"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:totolink:a7000r:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "603DA206-05D4-48FD-A506-F3BD8B4383B2"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/abcdefg-png/IoT-vulnerable/blob/main/TOTOLINK/A7000R/loginauth_password.md",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Exploit"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.272783",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Permissions Required"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.272783",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?submit.378312",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-7213",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2024-07-30T03:15:01.817",
|
||||
"lastModified": "2024-07-30T13:32:45.943",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2024-08-06T14:07:30.757",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -61,6 +61,26 @@
|
||||
}
|
||||
],
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 8.8,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 5.9
|
||||
},
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
@ -120,22 +140,64 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:totolink:a7000r_firmware:9.1.0u.6268_b20220504:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "3D52173F-42E7-4186-A442-5057269446AB"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:totolink:a7000r:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "603DA206-05D4-48FD-A506-F3BD8B4383B2"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/abcdefg-png/IoT-vulnerable/blob/main/TOTOLINK/A7000R/setWizardCfg.md",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Exploit"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.272784",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Permissions Required",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.272784",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?submit.378313",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-7214",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2024-07-30T03:15:02.127",
|
||||
"lastModified": "2024-07-30T13:32:45.943",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2024-08-06T14:08:05.393",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -61,6 +61,26 @@
|
||||
}
|
||||
],
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 8.8,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 5.9
|
||||
},
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
@ -120,22 +140,63 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:totolink:lr350_firmware:9.3.5u.6369_b20220309:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "6E7C618F-D415-4075-96A5-45E44B52FB62"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:totolink:lr350:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "4CA0663B-3F55-44EF-AF32-F83AB0411748"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/abcdefg-png/IoT-vulnerable/blob/main/TOTOLINK/LR350/setWanCfg.md",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Exploit"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.272785",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Permissions Required"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.272785",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?submit.378319",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-7215",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2024-07-30T04:15:03.760",
|
||||
"lastModified": "2024-07-30T13:32:45.943",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2024-08-06T14:20:22.733",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -61,6 +61,26 @@
|
||||
}
|
||||
],
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 8.8,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 5.9
|
||||
},
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
@ -120,22 +140,64 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:totolink:lr1200_firmware:9.3.1cu.2832:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "64C09FF7-B671-4B76-87BD-078F96ED06DF"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:totolink:lr1200:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "4E5FD932-A495-4413-9222-11E66C1135BD"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/abcdefg-png/IoT-vulnerable/blob/main/TOTOLINK/LR1200/NTPSyncWithHost.md",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Exploit"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.272786",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Permissions Required",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.272786",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?submit.378330",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-7216",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2024-07-30T04:15:04.690",
|
||||
"lastModified": "2024-07-30T13:32:45.943",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2024-08-06T14:28:51.927",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -61,6 +61,26 @@
|
||||
}
|
||||
],
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "HIGH",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 5.3,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 1.6,
|
||||
"impactScore": 3.6
|
||||
},
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
@ -120,22 +140,63 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:totolink:lr1200_firmware:9.3.1cu.2832:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "64C09FF7-B671-4B76-87BD-078F96ED06DF"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:totolink:lr1200:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "4E5FD932-A495-4413-9222-11E66C1135BD"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/abcdefg-png/IoT-vulnerable/blob/main/TOTOLINK/LR1200/shadow.md",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Exploit"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.272787",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Permissions Required"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.272787",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?submit.378331",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,13 +2,17 @@
|
||||
"id": "CVE-2024-7383",
|
||||
"sourceIdentifier": "secalert@redhat.com",
|
||||
"published": "2024-08-05T14:15:35.130",
|
||||
"lastModified": "2024-08-05T14:15:35.130",
|
||||
"lastModified": "2024-08-06T15:15:42.053",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A flaw was found in libnbd. The client did not always correctly verify the NBD server's certificate when using TLS to connect to an NBD server. This issue allows a man-in-the-middle attack on NBD traffic."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Se encontr\u00f3 una falla en libnbd. El cliente no siempre verificaba correctamente el certificado del servidor NBD cuando usaba TLS para conectarse a un servidor NBD. Este problema permite un ataque de intermediario al tr\u00e1fico NBD."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
@ -18,20 +22,20 @@
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "HIGH",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "NONE",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 5.9,
|
||||
"baseSeverity": "MEDIUM"
|
||||
"baseScore": 7.4,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.2,
|
||||
"impactScore": 3.6
|
||||
"impactScore": 5.2
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-7521",
|
||||
"sourceIdentifier": "security@mozilla.org",
|
||||
"published": "2024-08-06T13:15:57.167",
|
||||
"lastModified": "2024-08-06T13:15:57.167",
|
||||
"lastModified": "2024-08-06T14:35:13.910",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -11,7 +11,42 @@
|
||||
"value": "Incomplete WebAssembly exception handing could have led to a use-after-free. This vulnerability affects Firefox < 129, Firefox ESR < 115.14, and Firefox ESR < 128.1."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-755"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1904644",
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-7529",
|
||||
"sourceIdentifier": "security@mozilla.org",
|
||||
"published": "2024-08-06T13:15:57.657",
|
||||
"lastModified": "2024-08-06T13:15:57.657",
|
||||
"lastModified": "2024-08-06T14:35:14.733",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -11,7 +11,42 @@
|
||||
"value": "The date picker could partially obscure security prompts. This could be used by a malicious site to trick a user into granting permissions. This vulnerability affects Firefox < 129, Firefox ESR < 115.14, and Firefox ESR < 128.1."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 8.1,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 5.2
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-451"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1903187",
|
||||
|
137
CVE-2024/CVE-2024-75xx/CVE-2024-7552.json
Normal file
137
CVE-2024/CVE-2024-75xx/CVE-2024-7552.json
Normal file
@ -0,0 +1,137 @@
|
||||
{
|
||||
"id": "CVE-2024-7552",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2024-08-06T15:15:42.297",
|
||||
"lastModified": "2024-08-06T15:15:42.297",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A vulnerability was found in DataGear up to 5.0.0. It has been declared as critical. Affected by this vulnerability is the function evaluateVariableExpression of the file ConversionSqlParamValueMapper.java of the component Data Schema Page. The manipulation leads to improper neutralization of special elements used in an expression language statement. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-273697 was assigned to this vulnerability."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV40": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "4.0",
|
||||
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"attackRequirements": "NONE",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"vulnerableSystemConfidentiality": "LOW",
|
||||
"vulnerableSystemIntegrity": "LOW",
|
||||
"vulnerableSystemAvailability": "LOW",
|
||||
"subsequentSystemConfidentiality": "NONE",
|
||||
"subsequentSystemIntegrity": "NONE",
|
||||
"subsequentSystemAvailability": "NONE",
|
||||
"exploitMaturity": "NOT_DEFINED",
|
||||
"confidentialityRequirements": "NOT_DEFINED",
|
||||
"integrityRequirements": "NOT_DEFINED",
|
||||
"availabilityRequirements": "NOT_DEFINED",
|
||||
"modifiedAttackVector": "NOT_DEFINED",
|
||||
"modifiedAttackComplexity": "NOT_DEFINED",
|
||||
"modifiedAttackRequirements": "NOT_DEFINED",
|
||||
"modifiedPrivilegesRequired": "NOT_DEFINED",
|
||||
"modifiedUserInteraction": "NOT_DEFINED",
|
||||
"modifiedVulnerableSystemConfidentiality": "NOT_DEFINED",
|
||||
"modifiedVulnerableSystemIntegrity": "NOT_DEFINED",
|
||||
"modifiedVulnerableSystemAvailability": "NOT_DEFINED",
|
||||
"modifiedSubsequentSystemConfidentiality": "NOT_DEFINED",
|
||||
"modifiedSubsequentSystemIntegrity": "NOT_DEFINED",
|
||||
"modifiedSubsequentSystemAvailability": "NOT_DEFINED",
|
||||
"safety": "NOT_DEFINED",
|
||||
"automatable": "NOT_DEFINED",
|
||||
"recovery": "NOT_DEFINED",
|
||||
"valueDensity": "NOT_DEFINED",
|
||||
"vulnerabilityResponseEffort": "NOT_DEFINED",
|
||||
"providerUrgency": "NOT_DEFINED",
|
||||
"baseScore": 5.3,
|
||||
"baseSeverity": "MEDIUM"
|
||||
}
|
||||
}
|
||||
],
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "LOW",
|
||||
"baseScore": 6.3,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 3.4
|
||||
}
|
||||
],
|
||||
"cvssMetricV2": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "2.0",
|
||||
"vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P",
|
||||
"accessVector": "NETWORK",
|
||||
"accessComplexity": "LOW",
|
||||
"authentication": "SINGLE",
|
||||
"confidentialityImpact": "PARTIAL",
|
||||
"integrityImpact": "PARTIAL",
|
||||
"availabilityImpact": "PARTIAL",
|
||||
"baseScore": 6.5
|
||||
},
|
||||
"baseSeverity": "MEDIUM",
|
||||
"exploitabilityScore": 8.0,
|
||||
"impactScore": 6.4,
|
||||
"acInsufInfo": false,
|
||||
"obtainAllPrivilege": false,
|
||||
"obtainUserPrivilege": false,
|
||||
"obtainOtherPrivilege": false,
|
||||
"userInteractionRequired": false
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-917"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://gitee.com/datagear/datagear/issues/IAF3H7",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.273697",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.273697",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?submit.386413",
|
||||
"source": "cna@vuldb.com"
|
||||
}
|
||||
]
|
||||
}
|
92
README.md
92
README.md
@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours.
|
||||
### Last Repository Update
|
||||
|
||||
```plain
|
||||
2024-08-06T14:00:17.304709+00:00
|
||||
2024-08-06T16:00:17.155581+00:00
|
||||
```
|
||||
|
||||
### Most recent CVE Modification Timestamp synchronized with NVD
|
||||
|
||||
```plain
|
||||
2024-08-06T13:54:06.807000+00:00
|
||||
2024-08-06T15:35:18.050000+00:00
|
||||
```
|
||||
|
||||
### Last Data Feed Release
|
||||
@ -33,66 +33,54 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
|
||||
### Total Number of included CVEs
|
||||
|
||||
```plain
|
||||
259118
|
||||
259128
|
||||
```
|
||||
|
||||
### CVEs added in the last Commit
|
||||
|
||||
Recently added CVEs: `47`
|
||||
Recently added CVEs: `10`
|
||||
|
||||
- [CVE-2024-33989](CVE-2024/CVE-2024-339xx/CVE-2024-33989.json) (`2024-08-06T13:15:54.757`)
|
||||
- [CVE-2024-33990](CVE-2024/CVE-2024-339xx/CVE-2024-33990.json) (`2024-08-06T13:15:54.973`)
|
||||
- [CVE-2024-33991](CVE-2024/CVE-2024-339xx/CVE-2024-33991.json) (`2024-08-06T13:15:55.250`)
|
||||
- [CVE-2024-33992](CVE-2024/CVE-2024-339xx/CVE-2024-33992.json) (`2024-08-06T13:15:55.487`)
|
||||
- [CVE-2024-33993](CVE-2024/CVE-2024-339xx/CVE-2024-33993.json) (`2024-08-06T13:15:55.693`)
|
||||
- [CVE-2024-33994](CVE-2024/CVE-2024-339xx/CVE-2024-33994.json) (`2024-08-06T13:15:55.897`)
|
||||
- [CVE-2024-43114](CVE-2024/CVE-2024-431xx/CVE-2024-43114.json) (`2024-08-06T13:15:56.130`)
|
||||
- [CVE-2024-6357](CVE-2024/CVE-2024-63xx/CVE-2024-6357.json) (`2024-08-06T13:15:56.333`)
|
||||
- [CVE-2024-6358](CVE-2024/CVE-2024-63xx/CVE-2024-6358.json) (`2024-08-06T13:15:56.547`)
|
||||
- [CVE-2024-6359](CVE-2024/CVE-2024-63xx/CVE-2024-6359.json) (`2024-08-06T13:15:56.757`)
|
||||
- [CVE-2024-7518](CVE-2024/CVE-2024-75xx/CVE-2024-7518.json) (`2024-08-06T13:15:56.970`)
|
||||
- [CVE-2024-7519](CVE-2024/CVE-2024-75xx/CVE-2024-7519.json) (`2024-08-06T13:15:57.040`)
|
||||
- [CVE-2024-7520](CVE-2024/CVE-2024-75xx/CVE-2024-7520.json) (`2024-08-06T13:15:57.107`)
|
||||
- [CVE-2024-7521](CVE-2024/CVE-2024-75xx/CVE-2024-7521.json) (`2024-08-06T13:15:57.167`)
|
||||
- [CVE-2024-7522](CVE-2024/CVE-2024-75xx/CVE-2024-7522.json) (`2024-08-06T13:15:57.237`)
|
||||
- [CVE-2024-7523](CVE-2024/CVE-2024-75xx/CVE-2024-7523.json) (`2024-08-06T13:15:57.297`)
|
||||
- [CVE-2024-7524](CVE-2024/CVE-2024-75xx/CVE-2024-7524.json) (`2024-08-06T13:15:57.357`)
|
||||
- [CVE-2024-7525](CVE-2024/CVE-2024-75xx/CVE-2024-7525.json) (`2024-08-06T13:15:57.420`)
|
||||
- [CVE-2024-7526](CVE-2024/CVE-2024-75xx/CVE-2024-7526.json) (`2024-08-06T13:15:57.483`)
|
||||
- [CVE-2024-7527](CVE-2024/CVE-2024-75xx/CVE-2024-7527.json) (`2024-08-06T13:15:57.543`)
|
||||
- [CVE-2024-7528](CVE-2024/CVE-2024-75xx/CVE-2024-7528.json) (`2024-08-06T13:15:57.600`)
|
||||
- [CVE-2024-7529](CVE-2024/CVE-2024-75xx/CVE-2024-7529.json) (`2024-08-06T13:15:57.657`)
|
||||
- [CVE-2024-7530](CVE-2024/CVE-2024-75xx/CVE-2024-7530.json) (`2024-08-06T13:15:57.723`)
|
||||
- [CVE-2024-7531](CVE-2024/CVE-2024-75xx/CVE-2024-7531.json) (`2024-08-06T13:15:57.787`)
|
||||
- [CVE-2024-7551](CVE-2024/CVE-2024-75xx/CVE-2024-7551.json) (`2024-08-06T13:15:57.850`)
|
||||
- [CVE-2023-40819](CVE-2023/CVE-2023-408xx/CVE-2023-40819.json) (`2024-08-06T14:16:03.380`)
|
||||
- [CVE-2024-30170](CVE-2024/CVE-2024-301xx/CVE-2024-30170.json) (`2024-08-06T14:16:03.777`)
|
||||
- [CVE-2024-33897](CVE-2024/CVE-2024-338xx/CVE-2024-33897.json) (`2024-08-06T14:16:03.870`)
|
||||
- [CVE-2024-36424](CVE-2024/CVE-2024-364xx/CVE-2024-36424.json) (`2024-08-06T15:15:41.843`)
|
||||
- [CVE-2024-40101](CVE-2024/CVE-2024-401xx/CVE-2024-40101.json) (`2024-08-06T14:16:04.117`)
|
||||
- [CVE-2024-41226](CVE-2024/CVE-2024-412xx/CVE-2024-41226.json) (`2024-08-06T14:16:04.240`)
|
||||
- [CVE-2024-41910](CVE-2024/CVE-2024-419xx/CVE-2024-41910.json) (`2024-08-06T14:16:04.350`)
|
||||
- [CVE-2024-41911](CVE-2024/CVE-2024-419xx/CVE-2024-41911.json) (`2024-08-06T14:16:04.427`)
|
||||
- [CVE-2024-41913](CVE-2024/CVE-2024-419xx/CVE-2024-41913.json) (`2024-08-06T14:16:04.480`)
|
||||
- [CVE-2024-7552](CVE-2024/CVE-2024-75xx/CVE-2024-7552.json) (`2024-08-06T15:15:42.297`)
|
||||
|
||||
|
||||
### CVEs modified in the last Commit
|
||||
|
||||
Recently modified CVEs: `22`
|
||||
Recently modified CVEs: `56`
|
||||
|
||||
- [CVE-2014-4608](CVE-2014/CVE-2014-46xx/CVE-2014-4608.json) (`2024-08-06T12:15:20.573`)
|
||||
- [CVE-2014-5160](CVE-2014/CVE-2014-51xx/CVE-2014-5160.json) (`2024-08-06T12:15:31.283`)
|
||||
- [CVE-2014-6392](CVE-2014/CVE-2014-63xx/CVE-2014-6392.json) (`2024-08-06T13:15:27.023`)
|
||||
- [CVE-2014-7042](CVE-2014/CVE-2014-70xx/CVE-2014-7042.json) (`2024-08-06T13:15:35.490`)
|
||||
- [CVE-2024-37343](CVE-2024/CVE-2024-373xx/CVE-2024-37343.json) (`2024-08-06T13:48:32.297`)
|
||||
- [CVE-2024-37344](CVE-2024/CVE-2024-373xx/CVE-2024-37344.json) (`2024-08-06T13:49:14.817`)
|
||||
- [CVE-2024-37345](CVE-2024/CVE-2024-373xx/CVE-2024-37345.json) (`2024-08-06T13:49:26.063`)
|
||||
- [CVE-2024-37347](CVE-2024/CVE-2024-373xx/CVE-2024-37347.json) (`2024-08-06T13:50:02.077`)
|
||||
- [CVE-2024-38856](CVE-2024/CVE-2024-388xx/CVE-2024-38856.json) (`2024-08-06T13:35:01.497`)
|
||||
- [CVE-2024-40951](CVE-2024/CVE-2024-409xx/CVE-2024-40951.json) (`2024-08-06T13:29:07.827`)
|
||||
- [CVE-2024-41684](CVE-2024/CVE-2024-416xx/CVE-2024-41684.json) (`2024-08-06T13:25:49.640`)
|
||||
- [CVE-2024-41685](CVE-2024/CVE-2024-416xx/CVE-2024-41685.json) (`2024-08-06T12:51:23.760`)
|
||||
- [CVE-2024-41686](CVE-2024/CVE-2024-416xx/CVE-2024-41686.json) (`2024-08-06T13:20:05.540`)
|
||||
- [CVE-2024-5179](CVE-2024/CVE-2024-51xx/CVE-2024-5179.json) (`2024-08-06T12:10:17.047`)
|
||||
- [CVE-2024-6729](CVE-2024/CVE-2024-67xx/CVE-2024-6729.json) (`2024-08-06T12:15:52.700`)
|
||||
- [CVE-2024-7172](CVE-2024/CVE-2024-71xx/CVE-2024-7172.json) (`2024-08-06T12:51:40.243`)
|
||||
- [CVE-2024-7173](CVE-2024/CVE-2024-71xx/CVE-2024-7173.json) (`2024-08-06T12:52:46.230`)
|
||||
- [CVE-2024-7174](CVE-2024/CVE-2024-71xx/CVE-2024-7174.json) (`2024-08-06T13:14:59.030`)
|
||||
- [CVE-2024-7175](CVE-2024/CVE-2024-71xx/CVE-2024-7175.json) (`2024-08-06T12:57:14.623`)
|
||||
- [CVE-2024-7176](CVE-2024/CVE-2024-71xx/CVE-2024-7176.json) (`2024-08-06T12:58:00.850`)
|
||||
- [CVE-2024-7177](CVE-2024/CVE-2024-71xx/CVE-2024-7177.json) (`2024-08-06T13:15:14.603`)
|
||||
- [CVE-2024-7217](CVE-2024/CVE-2024-72xx/CVE-2024-7217.json) (`2024-08-06T13:54:06.807`)
|
||||
- [CVE-2024-29684](CVE-2024/CVE-2024-296xx/CVE-2024-29684.json) (`2024-08-06T15:35:12.520`)
|
||||
- [CVE-2024-33787](CVE-2024/CVE-2024-337xx/CVE-2024-33787.json) (`2024-08-06T15:35:13.693`)
|
||||
- [CVE-2024-33844](CVE-2024/CVE-2024-338xx/CVE-2024-33844.json) (`2024-08-06T15:35:14.480`)
|
||||
- [CVE-2024-35206](CVE-2024/CVE-2024-352xx/CVE-2024-35206.json) (`2024-08-06T15:02:05.777`)
|
||||
- [CVE-2024-35207](CVE-2024/CVE-2024-352xx/CVE-2024-35207.json) (`2024-08-06T15:02:16.163`)
|
||||
- [CVE-2024-35208](CVE-2024/CVE-2024-352xx/CVE-2024-35208.json) (`2024-08-06T15:08:17.727`)
|
||||
- [CVE-2024-35209](CVE-2024/CVE-2024-352xx/CVE-2024-35209.json) (`2024-08-06T15:09:04.427`)
|
||||
- [CVE-2024-35210](CVE-2024/CVE-2024-352xx/CVE-2024-35210.json) (`2024-08-06T15:09:53.797`)
|
||||
- [CVE-2024-35211](CVE-2024/CVE-2024-352xx/CVE-2024-35211.json) (`2024-08-06T15:10:56.163`)
|
||||
- [CVE-2024-35212](CVE-2024/CVE-2024-352xx/CVE-2024-35212.json) (`2024-08-06T15:11:27.243`)
|
||||
- [CVE-2024-40498](CVE-2024/CVE-2024-404xx/CVE-2024-40498.json) (`2024-08-06T15:35:16.133`)
|
||||
- [CVE-2024-40530](CVE-2024/CVE-2024-405xx/CVE-2024-40530.json) (`2024-08-06T15:35:16.910`)
|
||||
- [CVE-2024-41995](CVE-2024/CVE-2024-419xx/CVE-2024-41995.json) (`2024-08-06T14:35:11.420`)
|
||||
- [CVE-2024-42010](CVE-2024/CVE-2024-420xx/CVE-2024-42010.json) (`2024-08-06T14:35:11.647`)
|
||||
- [CVE-2024-5745](CVE-2024/CVE-2024-57xx/CVE-2024-5745.json) (`2024-08-06T14:37:59.943`)
|
||||
- [CVE-2024-6651](CVE-2024/CVE-2024-66xx/CVE-2024-6651.json) (`2024-08-06T15:35:18.050`)
|
||||
- [CVE-2024-6766](CVE-2024/CVE-2024-67xx/CVE-2024-6766.json) (`2024-08-06T14:35:12.940`)
|
||||
- [CVE-2024-7212](CVE-2024/CVE-2024-72xx/CVE-2024-7212.json) (`2024-08-06T14:06:56.937`)
|
||||
- [CVE-2024-7213](CVE-2024/CVE-2024-72xx/CVE-2024-7213.json) (`2024-08-06T14:07:30.757`)
|
||||
- [CVE-2024-7214](CVE-2024/CVE-2024-72xx/CVE-2024-7214.json) (`2024-08-06T14:08:05.393`)
|
||||
- [CVE-2024-7215](CVE-2024/CVE-2024-72xx/CVE-2024-7215.json) (`2024-08-06T14:20:22.733`)
|
||||
- [CVE-2024-7216](CVE-2024/CVE-2024-72xx/CVE-2024-7216.json) (`2024-08-06T14:28:51.927`)
|
||||
- [CVE-2024-7383](CVE-2024/CVE-2024-73xx/CVE-2024-7383.json) (`2024-08-06T15:15:42.053`)
|
||||
- [CVE-2024-7521](CVE-2024/CVE-2024-75xx/CVE-2024-7521.json) (`2024-08-06T14:35:13.910`)
|
||||
- [CVE-2024-7529](CVE-2024/CVE-2024-75xx/CVE-2024-7529.json) (`2024-08-06T14:35:14.733`)
|
||||
|
||||
|
||||
## Download and Usage
|
||||
|
256
_state.csv
256
_state.csv
@ -58032,7 +58032,7 @@ CVE-2013-0342,0,0,4471e381bb904f42e1225d0c50716ce099566388527839f843982bff65e506
|
||||
CVE-2013-0343,0,0,d601f03b4292a165ff85c2233b2ea9076b23f8d751ea319dd7590593e716209b,2014-03-06T04:42:55.320000
|
||||
CVE-2013-0344,0,0,2bab4429ace9671842d0c22737e04c939c56fe2af723a77e7dde2b0a9a1d300f,2023-11-07T02:13:49.473000
|
||||
CVE-2013-0345,0,0,3a95194eeb521b2e6f1ee7c9eaf2b2f72734cbc2670460b78e6ffd290add1caa,2023-11-07T02:13:49.703000
|
||||
CVE-2013-0346,0,0,77c518f6d8a33f0743b7024e34ce54240c36b72666f7023765dec035c23fce42,2024-05-17T00:54:28.617000
|
||||
CVE-2013-0346,0,1,b191e502f3fa8c95d9478015b70b856aa6124bac2218750c2963289c2c7da054,2024-08-06T15:15:26.393000
|
||||
CVE-2013-0347,0,0,cbaa0b6718b5da7941fca183a4523b08c90d3930dadcf630873dffb9ec2c7542,2017-08-29T01:33:01.447000
|
||||
CVE-2013-0348,0,0,bceb35a9d0f0cf9e4cbd29a5b700205808dcfcd1fbcd73c39b7c768b27f71a55,2023-02-13T04:41:11.723000
|
||||
CVE-2013-0349,0,0,abaf6b307a930c56bd97aea4fd1857c974e73546900b91ddb95c54847f96c088,2023-02-13T04:41:12.260000
|
||||
@ -65660,7 +65660,7 @@ CVE-2014-125045,0,0,eed804cf9ec3cda3b306f17dea743239c7afdf8472aee6950fbd1db2a3a6
|
||||
CVE-2014-125046,0,0,cbfb9e4de8f1d7a45082f6e1c93c64361c413e127176fdd66b519c2aa511cd1d,2024-05-17T00:58:17.447000
|
||||
CVE-2014-125047,0,0,78c153947ad2275b5e7f06789bf1190cc7f61e6eb3574d68ae1b12b2fe9e1952,2024-05-17T00:58:17.557000
|
||||
CVE-2014-125048,0,0,943dbc3620f50e0790f79463f75ac1daba50a41e53a1f1a92d6550a36d1ed073,2024-05-17T00:58:17.677000
|
||||
CVE-2014-125049,0,0,82c1840893cef2a5e7e983e8cc71c3a03743411a05f4e60ce55630c47a168a11,2024-05-17T00:58:17.853000
|
||||
CVE-2014-125049,0,1,b393ff1dad904db8d3ed9a82ba1dfaaf005eb456e57dc4bea5ee9f2bb003f927,2024-08-06T14:15:22.223000
|
||||
CVE-2014-125050,0,0,978102de0c3ac375d8dd6f63f1e79773857cca3fd35b21066bb54cc1cfddd954,2024-05-17T00:58:17.987000
|
||||
CVE-2014-125051,0,0,1fe526d81b21da2c5ee174e9978ae8d8a856dfd704166eeac1a9c91d58f4da14,2024-05-17T00:58:18.107000
|
||||
CVE-2014-125052,0,0,87c6ed88483cd5ec8eff9f5028f0cdcdd81cc1227c5ec6d55d52fc7ed41ca2a6,2024-05-17T00:58:18.213000
|
||||
@ -65672,7 +65672,7 @@ CVE-2014-125057,0,0,1aefdb3d8a971871b35d357c2653629cb0b983012c7329337354e21026b2
|
||||
CVE-2014-125058,0,0,4fd89cf0f845a5c9e57ad4b0db51c0644ca17200e8eb41c5acc5c638fb40e449,2024-05-17T00:58:18.873000
|
||||
CVE-2014-125059,0,0,856be1a116015207ffee96b2d7ce0ffa0c79914d27c818ea423d3ddc5c2f1d5c,2024-05-17T00:58:18.997000
|
||||
CVE-2014-125060,0,0,acf0298b6c7af775a0e782f55c0d1ca09710354b530fd2b28f7770de9d5632e3,2024-05-17T00:58:19.113000
|
||||
CVE-2014-125061,0,0,82099c97023432469b8984f9afe4eb97c002a637ab17c625dc27d20055e1c0a8,2024-05-17T00:58:19.220000
|
||||
CVE-2014-125061,0,1,286b882d8e5f6f27ce3bf1e5659b6de9d7bcd06ba7f41910caeb983360f56cd9,2024-08-06T14:15:22.550000
|
||||
CVE-2014-125062,0,0,9db2cea284008ad565f547025daedb3b7e36ec9d709524152d454289015f0ae8,2024-05-17T00:58:19.333000
|
||||
CVE-2014-125063,0,0,e37d77b1c12534b9a119ab56332ec6a2d2dffc5d223d8bf8f3e9e1cadcbbc1f5,2024-05-17T00:58:19.460000
|
||||
CVE-2014-125064,0,0,f67b1fb91d695d95fc8098b7881a95c27fdf25a65e8b4b8fea8bd3ea9e899f1e,2023-11-07T02:18:39.450000
|
||||
@ -68695,7 +68695,7 @@ CVE-2014-4604,0,0,9518cff87a2419d611e6369af0b5c4a14f017a8d094ba5b2e600de3e5231e4
|
||||
CVE-2014-4605,0,0,3f8874c6518c37d68f8b25cb763dcf2b4510b487a19d99c3c6af4f1a0c21db16,2014-07-09T18:48:18.740000
|
||||
CVE-2014-4606,0,0,d63114f062b715dc6ca859784e1b1a7c721b7d45d271547d389d7b867f9acb5d,2014-07-09T18:45:46.887000
|
||||
CVE-2014-4607,0,0,76c308a41abef0a008fc88a19bef429b478190e1a2cb12963321920266d2788b,2020-02-14T15:26:45.467000
|
||||
CVE-2014-4608,0,1,d7818b75eb63e09ed586b436a27cb492605255a958deea147ea583e62d058ab2,2024-08-06T12:15:20.573000
|
||||
CVE-2014-4608,0,0,d7818b75eb63e09ed586b436a27cb492605255a958deea147ea583e62d058ab2,2024-08-06T12:15:20.573000
|
||||
CVE-2014-4609,0,0,02f363f1f4d393ebc3c8ae96b30f28d565a2167efe6f6ed5eba18e083e921498,2020-01-21T16:49:14.900000
|
||||
CVE-2014-4610,0,0,69e982ba357cffccbdeb69b942e2cf7fc23318c8f6e1a1c9ce98382bdefeb111,2020-01-21T16:15:47.263000
|
||||
CVE-2014-4611,0,0,5b0a0b2d930406e341b0eadab49a8c3103b3e070a88dd1cdbb44744d7348b67a,2023-11-07T02:20:35.810000
|
||||
@ -69125,7 +69125,7 @@ CVE-2014-5149,0,0,bf89fff2b7d7fb1898245bb39172b1690d6a6dcf714f55e192c833521f8f3f
|
||||
CVE-2014-5157,0,0,20b30f94262d35528c8c4054941678b4012e0d73ca1bb989ac5bc05faea16745,2023-11-07T02:20:43.213000
|
||||
CVE-2014-5158,0,0,69b174d059b5613fbc8787663238e346de163fb5a34219ad608f575a9d07052b,2014-08-21T16:49:13.957000
|
||||
CVE-2014-5159,0,0,cbb914a4ffff4faac8f656bc14172cec1f496e6b93a106c0c0a79bbaac7e0927,2014-08-21T16:52:27.390000
|
||||
CVE-2014-5160,0,1,4b2352f6464a75082758270dbf5c3391ffefca2a37eee1b8ed504162c9b1e1f0,2024-08-06T12:15:31.283000
|
||||
CVE-2014-5160,0,0,4b2352f6464a75082758270dbf5c3391ffefca2a37eee1b8ed504162c9b1e1f0,2024-08-06T12:15:31.283000
|
||||
CVE-2014-5161,0,0,a5733c5886a7fd117f35743a4d62fb2ad6f5bf3a7398054dce26553f65b41efc,2023-11-07T02:20:43.307000
|
||||
CVE-2014-5162,0,0,55a074f06578f9c03bbfb061862adc51ce82414234c86ddb99e28cc655d69793,2023-11-07T02:20:43.360000
|
||||
CVE-2014-5163,0,0,0d197e409f0d56efe3be7ebc23f3a7a6c6ce2765c03651d4015b2d3f057df755,2023-11-07T02:20:43.433000
|
||||
@ -70207,7 +70207,7 @@ CVE-2014-6386,0,0,ef82c1e20abd6fddce3e54b667e7069b568034a8a8ee66cf3efaa7bdfccd29
|
||||
CVE-2014-6387,0,0,972e3cbc4b72a77f92f3f7627c7f26ba687ffa97ddb3c5305d3a355fcf6350d9,2021-01-12T18:05:59.507000
|
||||
CVE-2014-6388,0,0,12f3ce7c137bfe0765d68119caeb7cfc8dada96a9a6b2446d364aa74c4dd90ac,2023-11-07T02:21:00.773000
|
||||
CVE-2014-6389,0,0,cad73347ec1c88f3955ef944343f00ae78ebbc3947c86a62e6caddd8575ff04c,2017-09-08T01:29:14.323000
|
||||
CVE-2014-6392,0,1,3db4ef1e4fe085e0638122cb471c43a37cb37498a278324f315c328222f3f3f4,2024-08-06T13:15:27.023000
|
||||
CVE-2014-6392,0,0,3db4ef1e4fe085e0638122cb471c43a37cb37498a278324f315c328222f3f3f4,2024-08-06T13:15:27.023000
|
||||
CVE-2014-6393,0,0,43d76059da78ad5015fd5bfe8333a1086660d3510e767febac7e3c8cd7f4e226,2021-07-30T16:36:04.447000
|
||||
CVE-2014-6394,0,0,f9d29995346dd1a27f941fddd5be7eae240f45195f583c62fd35d1e336f0f9bb,2017-09-08T01:29:14.403000
|
||||
CVE-2014-6395,0,0,92184a2aefd3b7037f480e16eee81c1021d8086a8a1934d26adf4b6e3c966cad,2020-02-26T13:35:52.343000
|
||||
@ -70831,7 +70831,7 @@ CVE-2014-7038,0,0,43f538f66efc5a0c9ad9f347bb92dc3cbfb62bf8ff2fecbcbb9adb1fe0e25b
|
||||
CVE-2014-7039,0,0,703bbb7bc8333bb3b0e81946f5cdb59e2ae7d57563c96580667bb6016b90dc2e,2014-11-14T14:06:58.313000
|
||||
CVE-2014-7040,0,0,df752d3efa2c8bb27ed54b80f43838fcc810331450911bf5b97c5b0e975f11f3,2014-11-14T14:06:59.797000
|
||||
CVE-2014-7041,0,0,679e23897b29337d95abcfa90d66f31ec7b4ab58714df1e3ec10ab4c456c8295,2014-11-14T14:07:01.280000
|
||||
CVE-2014-7042,0,1,db198955c833abbabf9aa9f650c060841319cd06a7da8bb948630e373b355c43,2024-08-06T13:15:35.490000
|
||||
CVE-2014-7042,0,0,db198955c833abbabf9aa9f650c060841319cd06a7da8bb948630e373b355c43,2024-08-06T13:15:35.490000
|
||||
CVE-2014-7043,0,0,03b4d65083446f9c65cc7361c07ac8e1850c3c51a82b557ccf21e09a43ad55f7,2014-11-14T14:07:04.283000
|
||||
CVE-2014-7044,0,0,1d41bf09ddf845283a05e370faa8421a4366b01485587d02fbb366d598d4646a,2014-11-14T17:10:15.843000
|
||||
CVE-2014-7045,0,0,20a5cd0a4191deb5ad84964202c6c6b980f988bed5b64a3a08d5d4e3831719a0,2014-11-14T14:07:07.250000
|
||||
@ -72938,7 +72938,7 @@ CVE-2014-9422,0,0,27c8e7a0cf99a84ef981b8b2b672e59145d9cb55a8a19433f70fca6bfaa621
|
||||
CVE-2014-9423,0,0,dbadccf52a483c15e53cbfc8cff4f8c35dff181abefb76aad09cc936bb620341,2020-01-21T15:46:57.183000
|
||||
CVE-2014-9424,0,0,55bdda0c39ccc1cb32dee00597a52f0dc9d40ef04ef47b61da3a378a5e610d68,2014-12-30T15:35:22.727000
|
||||
CVE-2014-9425,0,0,dccca6d22e6a40ca8c10cd53a77b3ca62bb27fbd6d878e5c45a7840efff9cab2,2023-11-07T02:23:05.040000
|
||||
CVE-2014-9426,0,0,20e9ae0287a288c83b276d0b257a3280fbc25e61217050c282dbe119233666bf,2024-06-18T19:15:54.110000
|
||||
CVE-2014-9426,0,1,a5eaef3f086db66e1ab8ff75649475d0278e443df35e2d68d2b965ffc409b8a9,2024-08-06T14:15:49.283000
|
||||
CVE-2014-9427,0,0,cdf611994b2bbdb6383e0c3ae8d5b7d74beb486f34c9d704c2cf8812d341710e,2023-11-07T02:23:05.237000
|
||||
CVE-2014-9428,0,0,dab4fb56a8e7f25bde74bf56cfa79dff31b355fde3d82e45f5476f14c98784f0,2023-11-07T02:23:05.363000
|
||||
CVE-2014-9429,0,0,545088f5923f35de470761ad7721527bc41230312934d94b14622336a9798a18,2017-09-08T01:29:34.293000
|
||||
@ -73240,7 +73240,7 @@ CVE-2014-9764,0,0,cacd5acafcefb8186b47fc7e51a9d5c47e874aca0191c586b47f445115a378
|
||||
CVE-2014-9765,0,0,9efee6b8c44e63c72e1718617dead54c566fb5a7750472374ccecad758eb70f6,2018-10-30T16:27:35.843000
|
||||
CVE-2014-9766,0,0,ff424ed579229b4a2b86589fffee606029021f20d93c0f32b4dbfd81b5198e34,2016-12-03T03:02:14.157000
|
||||
CVE-2014-9767,0,0,b0a7fea4d4f417aeb431720a83fe4dbe6bb7e79430d9430508222b6616634e08,2018-01-05T02:29:58.057000
|
||||
CVE-2014-9768,0,0,d0599213bd11230047ba599621950e3e584150950b940553696c7bac7323fd17,2024-05-17T01:02:24.847000
|
||||
CVE-2014-9768,0,1,5893c4c78958bfe31a6c5c0facd02bc6409e40d180d4f8e0f1999fa395f311c6,2024-08-06T14:15:58.787000
|
||||
CVE-2014-9769,0,0,d970084f0ba2138c1c650e05172723273c843e0f088bca687b68b71bdfdfcf2d,2016-12-03T03:02:15.143000
|
||||
CVE-2014-9770,0,0,a1806e4e18121383b4b0d4b8c130e671a0df41623b0b76b575d2954139057b5d,2023-11-07T02:23:10.903000
|
||||
CVE-2014-9771,0,0,c54798ef1d5f4ed616450603410dcd5cad82e3440be07bcc7ee5478bf15914c1,2016-12-01T02:59:16.980000
|
||||
@ -110521,7 +110521,7 @@ CVE-2018-0820,0,0,37d589a7f7767da548742f43b26a7c38d523c69858e08b8d59487fdbeb3dfa
|
||||
CVE-2018-0821,0,0,37dec9a7b0ae2ffd8a131f1a880202d0667df20584fc6dd4d2087710ee9368d0,2019-10-03T00:03:26.223000
|
||||
CVE-2018-0822,0,0,c66251d7b34352211af4f5a1245ff2487d2b8b80cc2206f069acf1fd0551276c,2019-10-03T00:03:26.223000
|
||||
CVE-2018-0823,0,0,ac2d84c2f389fa31c4d934d83621a09019f5c8716fb56f16749dd620acccf433,2019-10-03T00:03:26.223000
|
||||
CVE-2018-0824,0,0,eced6f1cbffe1f5b96b9bea7e681149493819c6e5b28b166af2eb9b8efc1bdf9,2024-08-06T01:00:01.460000
|
||||
CVE-2018-0824,0,1,3538c9e425a98f5058c4bd07c6968555c87fe136fa8b058010f08867c80d8ba6,2024-08-06T14:35:00.867000
|
||||
CVE-2018-0825,0,0,19d1e409c71f6bdd74f7307c0ca3ae6349435b385c177c0f107f15ffa26c9de1,2022-05-23T17:29:15.350000
|
||||
CVE-2018-0826,0,0,0262a58d145e4ac0fc914edffbaef5cbfb5a2eb6406789cd178f229c4198538c,2019-10-03T00:03:26.223000
|
||||
CVE-2018-0827,0,0,ea8505a0898212d1f009c625f74ba880dc432a66250be2699ee30b8136b4f69f,2019-10-03T00:03:26.223000
|
||||
@ -212668,7 +212668,7 @@ CVE-2023-0249,0,0,8a3ef8711a0a45a0819b562d3824daf4341cfb3c37e4c184eeef72a1ce380b
|
||||
CVE-2023-0250,0,0,4f7de0411417fecef5cd38f512ca4c728f31d0a3ad9492df2a065dd6c7bc16c7,2023-11-07T03:59:57.943000
|
||||
CVE-2023-0251,0,0,ca2450aab4d0f63d7af8b697f02293fb4fb9898b6373eb4de69a005f8eb253c4,2023-11-07T03:59:58.143000
|
||||
CVE-2023-0252,0,0,9ae0dd213557920079a316d4f67b811e41aee4dadc3651991cb66d3c29449692,2023-11-07T03:59:58.340000
|
||||
CVE-2023-0253,0,0,218bfb62dcc835e8b8d376b1b197f7b341b0de1eff2b647556a4dc2a79f616cc,2023-11-07T03:59:58.583000
|
||||
CVE-2023-0253,0,1,56664b6d4881df27e472f68bd514e7717b560d97e07b80f17e5aa7ca48bd37f1,2024-08-06T14:16:03.107000
|
||||
CVE-2023-0254,0,0,97e32cf56eaa0768acdfb7c9a4705613297f0061618780bdd2cd4d513c9eb841,2023-11-07T03:59:58.800000
|
||||
CVE-2023-0255,0,0,4193c746774feb4991615ea0eba109a5f90f52c9d573422ddccd9e021ff58cf3,2023-11-07T03:59:59.033000
|
||||
CVE-2023-0256,0,0,16b9dd49367b70513410c61ab596ab6d6562aa4d78f1468a72bc8b56e191d319,2024-05-17T02:17:13.503000
|
||||
@ -230199,7 +230199,7 @@ CVE-2023-40285,0,0,83b82ed527d697100085339079e77b22440ed016f262c72a7b2bcfd1d63eb
|
||||
CVE-2023-40286,0,0,9555e7cb17222ef621f38f143cfd62c7e7e90c13b5d8aacdb1efb275f994eafa,2024-08-03T20:35:01.303000
|
||||
CVE-2023-40287,0,0,7ee226484007e2fe9c179b9a494f02a4ab444ae5392fb9574a50b48bb768486d,2024-08-05T15:35:04.253000
|
||||
CVE-2023-40288,0,0,0b2574f2e5ec339d07ef2936cf971235d46d87acc84d249edd7a4882b5e2e6a1,2024-08-05T15:35:05.700000
|
||||
CVE-2023-40289,0,0,123e5bbdfe93e2317673572aa8189a733fb7f15faee24ca97a892225b61beede,2024-03-27T12:29:30.307000
|
||||
CVE-2023-40289,0,1,34a9e46de0be389e67c072c4ccc060a9e6f0f34fabcbc8b066546c6e5c6f78e6,2024-08-06T15:35:03.140000
|
||||
CVE-2023-4029,0,0,952a39b088e8eb68f0fbf483bea0a12395075a40ee44c63cd47f8dce1f45dd8f,2023-08-24T20:27:25.837000
|
||||
CVE-2023-40290,0,0,d5244c16179d738ea85f3b03083a23fb288dced8ac5924f2e04427ca5dafd632,2024-03-27T12:29:30.307000
|
||||
CVE-2023-40291,0,0,fa10649dcc284ae4300a38adf3e5da6f8addb83e353c11f487b7f9d1c7c22950,2023-08-21T18:26:45.787000
|
||||
@ -230669,6 +230669,7 @@ CVE-2023-40814,0,0,d99f26c0e52d44207bc17acbb161af7a6c23c3cb6dd63caf97c39ef62d288
|
||||
CVE-2023-40815,0,0,5f25edc90fc2210a5ebae830ec62832cf1da32824568540736566b83c65ef705,2023-11-22T22:36:34.407000
|
||||
CVE-2023-40816,0,0,a37957235aab300f45e063b9b87edbb7ed84160f5e319471ae69ee0f4769c799,2023-11-22T22:36:42.793000
|
||||
CVE-2023-40817,0,0,625a1859f8fcfbfcd3b5ce08f7dbfcb221bd1f1b928d38c5495787e4931766d1,2023-11-22T22:36:51.057000
|
||||
CVE-2023-40819,1,1,17fce37ae1ffbd6e3260dc1af3fef43849d1ccc97abc8c2b8472fdebdbc52aff,2024-08-06T14:16:03.380000
|
||||
CVE-2023-40825,0,0,215dbc1ed4edf598bb5ee7080b8db47cdd5db6be957088557faef7284c704ad5,2023-08-30T00:32:16.193000
|
||||
CVE-2023-40826,0,0,15b717e2c5f648dcbddd0af0fdf20e504a201581f71d8a81aa95e72d14724f2e,2023-08-29T23:53:39.837000
|
||||
CVE-2023-40827,0,0,fbcda6f6e53bad6e092f9cc46321655215c80718e599ba5d04fe28f6ef753ffb,2023-08-29T23:56:57.150000
|
||||
@ -234132,7 +234133,7 @@ CVE-2023-45923,0,0,5270bb491fd0fbd63fc03c8346730b1c7b7aef4a63969aba918e65fb9d0d7
|
||||
CVE-2023-45924,0,0,5631408bef4259fc5da78594c28346484a4895d23715db7262e10d8cbfdd256d,2024-08-02T21:15:46.993000
|
||||
CVE-2023-45925,0,0,165cab9a6af741d0f2a0bcbf7573b725a1a3e968b819f84cfa29a2780557fd75,2024-08-02T21:15:47.087000
|
||||
CVE-2023-45926,0,0,6e11510be2a63a248f16c7fb8affbca6400a19718c1245f13dd016e0c237e809,2024-01-30T06:15:45.480000
|
||||
CVE-2023-45927,0,0,bb21bf80bee335db542c87badcea9b3aab4ec6256c75eef2f71b567821a2b86c,2024-03-27T12:29:30.307000
|
||||
CVE-2023-45927,0,1,a12db79aa98ad29e91442cb68de9be1c89ec6e698664c9aa8cb20e2332a3e9a1,2024-08-06T15:35:04.090000
|
||||
CVE-2023-45928,0,0,692773293cc994caed3570cd831cde7ba12c36d9e87f74ed0925476a93196572,2024-01-30T06:15:45.520000
|
||||
CVE-2023-45929,0,0,d06d8802f033d3364ed9d8561e56c053fac04131e0401aeeb9a382027f7e9cfe,2024-03-27T12:29:30.307000
|
||||
CVE-2023-4593,0,0,4991cf119c8ebfc10d48154734bdf0ee9365316ccc7c1b60d5d04e7ab999d216,2023-11-29T21:23:46.107000
|
||||
@ -237036,17 +237037,17 @@ CVE-2023-49968,0,0,443b0a12900df986124c3c0058d5658df13e1f540049ddc612a4f43f44d6c
|
||||
CVE-2023-49969,0,0,469876939b4b9f9c3637cadc1ea51d82fbf4e880cd6bad43cc5c9ae371564219,2024-08-01T13:45:18.787000
|
||||
CVE-2023-4997,0,0,4afed0de14254e77a99b729070c5643ffbf1676389fe16cc856891c73125b6a9,2023-10-05T17:04:09.880000
|
||||
CVE-2023-49970,0,0,5502d6fa1c46a421a8d44ecff9c8db4116bf0ff4c0f42a9e95eba6058d2868c7,2024-03-05T13:41:01.900000
|
||||
CVE-2023-49971,0,0,ca9bad332970c1257540fd45c01eab9c9974869c1035167df4351b38d32d2977,2024-03-06T15:18:08.093000
|
||||
CVE-2023-49971,0,1,374def7d9c689df8f58cc4989e4ea0ed3c5a8e848866980b25656660a7f6c663,2024-08-06T14:35:02.513000
|
||||
CVE-2023-49973,0,0,ca1ed5b6df9a46488025a136b2ec31b6790ba3cc516f6b9d8e6dd1ad7f0f7877,2024-03-06T15:18:08.093000
|
||||
CVE-2023-49974,0,0,f5124dacffcab9dae9197d45eeb738402a1e8f4da75c3be6a33ffe13a23af038,2024-03-06T15:18:08.093000
|
||||
CVE-2023-49976,0,0,b2b5a09955514926cb7972b7101cec2b04ca5d1f7f45f6c868e7087074f700e7,2024-03-06T15:18:08.093000
|
||||
CVE-2023-49977,0,0,aed154d4bf8ea5599b21c1e323a82e3dc2e828c1921d60bc14254ee66b176359,2024-03-06T15:18:08.093000
|
||||
CVE-2023-49978,0,0,255bd00c3d73b2dea40ba11475aa7facb0a30f1814b1a1bd06cd16bd820bf405,2024-08-03T20:35:02.260000
|
||||
CVE-2023-49979,0,0,0ccd68cd702ba3511abb56a221a5f0b1cf7909e9f80649bc44a8ae887dbe966f,2024-03-21T12:58:51.093000
|
||||
CVE-2023-49979,0,1,1bfb1fbed9e582e1111f18addbfe0704eae6cb7e307f14ec2629c04fb8707947,2024-08-06T15:35:05.213000
|
||||
CVE-2023-49980,0,0,fe81e40de640bbbb60a226d938993035c41f2a794f5e07463e86cf051d899933,2024-03-21T12:58:51.093000
|
||||
CVE-2023-49981,0,0,5be7a68d74a60ed3295669fb11701db2427aaf9245d4e2e54ed3beeef2fba398,2024-08-05T17:35:03.377000
|
||||
CVE-2023-49982,0,0,ec6f2a2c253ed498a1057ed3b7470bd03fbafbdd0bb791c30162603ae56aa435,2024-08-05T16:35:02.447000
|
||||
CVE-2023-49983,0,0,4cae9f7d8add2cf24854c3f4e5276c123fb042856d91f0c461ca58ac5db09752,2024-03-21T12:58:51.093000
|
||||
CVE-2023-49983,0,1,e9c175afb8b1e7f2cb699e467ef065d438ddc85b687b14c4ebacca195e1402e1,2024-08-06T14:35:03.603000
|
||||
CVE-2023-49984,0,0,a57d9275694d3ef020d9d7f055ba3135dbd08d9dbc13b6168e119b324272f7a6,2024-08-05T15:35:08.213000
|
||||
CVE-2023-49985,0,0,48621d95c58dd65f642543dd394ac7e9d6daa5b1663d066d6d97b86f6ff66be2,2024-08-04T12:35:03.467000
|
||||
CVE-2023-49986,0,0,0bfa07ebd9dbe1f0457cbd00aed62c65d63f7c4a056604f06d8368c48ba916b7,2024-08-05T16:35:03.407000
|
||||
@ -237565,7 +237566,7 @@ CVE-2023-50891,0,0,1adacf52103bf5695bdd5a8c21dfbc40c87bec0f97db9509f7b11b2449776
|
||||
CVE-2023-50892,0,0,ea816357f05ef42b8833514f544ca3e97f6534462f70ce276b6120f11221c7a2,2024-01-05T19:43:06.133000
|
||||
CVE-2023-50893,0,0,835f496c561cb55a5fb1cfae7503de7255939f53b6d1bb8e8298e04adc0d60f1,2024-01-05T18:33:07.640000
|
||||
CVE-2023-50894,0,0,aa32b467e175e3fabfb6642dcab59bdbaa2952663e9398a1009a1dc5a26c66f1,2024-08-05T17:35:04.170000
|
||||
CVE-2023-50895,0,0,69e50a2a9050272ee521d2669e1791780c9ca170819dba3891ee76e69746a9dc,2024-03-26T17:09:53.043000
|
||||
CVE-2023-50895,0,1,271536df0efad9de4e9fcecac3f3aef8f4be9b35db244cc2303d24324d3dcea7,2024-08-06T15:35:06.050000
|
||||
CVE-2023-50896,0,0,58909ae6cdd69ec36860d520a482341146ba3062544b6f2e3a1ec28f1d50ed32,2024-01-05T17:32:59.937000
|
||||
CVE-2023-50898,0,0,5521dd5ffd76f25198955d667f35660bc29ab21a929655c4d2d6c819c3ea24fc,2024-03-15T16:26:49.320000
|
||||
CVE-2023-5090,0,0,857f8555c13090b0b0748252e1a3763df646adb22c2b1003dc4bd042a71884da,2024-07-08T05:15:02.033000
|
||||
@ -238782,7 +238783,7 @@ CVE-2023-52580,0,0,b8c655d437d57a038982348defe0ba177db44113de8bbbf0a08788730933a
|
||||
CVE-2023-52581,0,0,7691221601b63aee3941e44780c6b7af99209571581645e4b8d4eab0fc7c17cc,2024-06-16T13:15:51.120000
|
||||
CVE-2023-52582,0,0,5319c9d81969b1c465eda182035ed4a9673e94b09d499044fefc2972ffc554b4,2024-03-04T13:58:23.447000
|
||||
CVE-2023-52583,0,0,8ed049626a3d866faa521f5c0ec29ba4aa11aa0550c333c97d2c4302f14a56b4,2024-06-27T13:15:53.290000
|
||||
CVE-2023-52584,0,0,675185cf7a73344ab50ccae2f06c5f6ac6943022daf2134d07fcf55bd7653e75,2024-03-06T15:18:08.093000
|
||||
CVE-2023-52584,0,1,006e4038ef636e5ce45dc9108c9592a1116ce315b254badb755b3f93c3a71dc1,2024-08-06T14:35:04.610000
|
||||
CVE-2023-52585,0,0,da225d55d03010fcb95e8adcdb858e173f87a2b48ad17790076ac4f7dd538e15,2024-06-27T14:15:12.767000
|
||||
CVE-2023-52586,0,0,545d29d25a05b795b88e1145bd1bacb3b8aa91f79f02282bb6f52947214b6c07,2024-03-06T15:18:08.093000
|
||||
CVE-2023-52587,0,0,2271e5381781b323097c4a4b197558c1e604db963190a108d3d6f27390fdf28a,2024-06-27T12:15:14.760000
|
||||
@ -240375,7 +240376,7 @@ CVE-2023-6692,0,0,9fa4e96ce1049837df269d11a8a912bde008e6e68041627c903eee00e0ee38
|
||||
CVE-2023-6693,0,0,4fbf86ce01c199959b43503970fbdface6a0c3cb5461719b0fd8b452d147d91b,2024-05-22T17:16:09.817000
|
||||
CVE-2023-6694,0,0,5324160095b95adf3e158f9599efe0a66004170eff91edcf1a8e9f68bbdace67,2024-04-10T13:24:00.070000
|
||||
CVE-2023-6695,0,0,ddf9733013b9fbaac77fe6b1fcca76eedd63d629a771ad7ca81287cb0112395d,2024-04-10T13:24:00.070000
|
||||
CVE-2023-6696,0,0,a2b4be9074422d1229ccc670c54501d23de7922ea855e00a48781abb59ebd605,2024-06-17T12:42:04.623000
|
||||
CVE-2023-6696,0,1,c36d1873db0af8ec4a8a1c5393c994faa273137858ebb453846d82c645e5a129,2024-08-06T14:05:42.023000
|
||||
CVE-2023-6697,0,0,12c273f1379c4db348aacab8ec27f123afa97fabdba674ad7bddd52c916085bf,2024-01-30T20:25:21.367000
|
||||
CVE-2023-6699,0,0,4a8624b4b6ea31b8237e0eb30e2c836ee2648ac75d07c3c9236303c77756ccbc,2024-01-17T00:02:15.700000
|
||||
CVE-2023-6700,0,0,f0219c5bfda6880f7a4b7dfd99547dcb7d3f941c1a23751cf1548d4fdf181ac9,2024-02-09T16:38:05.687000
|
||||
@ -242682,7 +242683,7 @@ CVE-2024-20001,0,0,a8fdee747320800fcefdb9757255f1452f42ea67d847a2bd5e7f0eda0e22f
|
||||
CVE-2024-20002,0,0,f15c94fde1f06dc9fce4b4ca09cb219c34a08e71aa3bec3fbc32d03240e1b76e,2024-02-09T02:01:37.090000
|
||||
CVE-2024-20003,0,0,252c3ca307d160fe322f3e6f3c838ec528b0deb286e51517bf83a2ddeb36c723,2024-07-03T01:45:42.740000
|
||||
CVE-2024-20004,0,0,f0724cab7e23c1672343a65224d29c6de9c5ef503ce348d95a653731adbda199,2024-07-03T01:45:43.630000
|
||||
CVE-2024-20005,0,0,b6f4b22a5f386498389c13f791578550d3b8f7f66c361f0a11418e472a23b966,2024-03-04T13:58:23.447000
|
||||
CVE-2024-20005,0,1,8b79a520d8c0bb0a48d91c549eb8c8939b2416a7ff7a3666de17adce15b8031c,2024-08-06T15:35:06.587000
|
||||
CVE-2024-20006,0,0,17a91c2471e0eca90fb18bbcfea0e3d03ed760ac5103107ae434f69000dabe0f,2024-07-03T01:45:44.467000
|
||||
CVE-2024-20007,0,0,0fa69a82ec65ecc3027671eba8b924b09ef511a83e0e0396f158b0acb6f78456,2024-02-09T02:05:10.947000
|
||||
CVE-2024-20009,0,0,b0f87b48d16d8ca578db6fcf902537f0919269ed2662481028fc707581f29f2b,2024-02-09T02:05:28.177000
|
||||
@ -242704,7 +242705,7 @@ CVE-2024-20023,0,0,0f3eec01af6b49c524cf4eb0c642d77efd7be67fdf33e7a68b76bb49407ad
|
||||
CVE-2024-20024,0,0,a587bfbae48c7d89e5f8cdf3a4d9f1f662ddb9590db59d2b26f356c2c055895e,2024-07-03T01:45:47.463000
|
||||
CVE-2024-20025,0,0,47e15a7ddf4a93a1f67f16f7b41159792bb8de344e0b811377a0a1f83c75f102,2024-03-04T13:58:23.447000
|
||||
CVE-2024-20026,0,0,ed800331684227c8cb6eef8a299085ff35357d20165c3fbe70fc71f0772c4645,2024-03-04T13:58:23.447000
|
||||
CVE-2024-20027,0,0,1c708a33726db9aee0559330cfdd0fc241eac47a71bb6deee6fb4084d133403f,2024-03-04T13:58:23.447000
|
||||
CVE-2024-20027,0,1,1e87a5ce444fde6917e601e7f1ba4c6df82feaec2ef698b25f20ceaf70694d54,2024-08-06T15:35:07.420000
|
||||
CVE-2024-20028,0,0,cfbf4d0a5e915e0bee3fad17577f931af15ec4fffb945f6759a6ae86484e677f,2024-07-03T01:45:48.410000
|
||||
CVE-2024-20029,0,0,5b7ec0868e4b45674158a00b46fc6ebdfeb103f2ba924485057a5965b1353952,2024-03-04T13:58:23.447000
|
||||
CVE-2024-2003,0,0,d83e6e497d0f4e0abfc3183df264ca9948c9b590f8e46873b90f110587a4b083,2024-06-21T11:22:01.687000
|
||||
@ -242907,7 +242908,7 @@ CVE-2024-2049,0,0,398a9eaf0287296877598afba029844504bbde28a3270479d8cbbb594cc11b
|
||||
CVE-2024-2050,0,0,309a92deb7dc6d1c9b389273f8521ce493fa3e8c536f740883081c4cdf858e77,2024-03-18T19:40:00.173000
|
||||
CVE-2024-2051,0,0,7b283f8057b783b668166a17f1e1ff3c63b74d0e0fa3f6b8acdcd7e3ce5a09c9,2024-03-18T19:40:00.173000
|
||||
CVE-2024-2052,0,0,b3dd7173b956ed9ab7dfaa381fa39b77e63aea1f604a72f8ac014b370895d6ab,2024-03-18T19:40:00.173000
|
||||
CVE-2024-2053,0,0,36771f130ff6b821af5971db0134b2ad0672630fbb5a07513fde1d4190d1f1e1,2024-03-21T12:58:51.093000
|
||||
CVE-2024-2053,0,1,0d41c4e474c0960eb5e2399ded25845c51347c47ec843b53809f61d1e3d8fe3e,2024-08-06T15:35:13.397000
|
||||
CVE-2024-2054,0,0,5af7272a2140be959232b9c889b5facdacd3c4cf8342e14293010d7ec8d01b60,2024-08-05T20:35:09.723000
|
||||
CVE-2024-2055,0,0,d1225e429bd7e311c49254719a5a09df3de3166cc8ee427e6cf78b87fe86c356,2024-03-06T15:18:08.093000
|
||||
CVE-2024-2056,0,0,a9b5dfc22d4ac07087230ba8c68bc5ffb616f082583f2b15378332a8153cd7c4,2024-03-06T15:18:08.093000
|
||||
@ -244506,7 +244507,7 @@ CVE-2024-22720,0,0,9b189ed7ed41dddb5c89809962586573f4f56f2a5e75240cf2e0c1b185b20
|
||||
CVE-2024-22721,0,0,adc321e89d42abc6b26e927fdcb28dc5c84ae45c2baec9ae8b21187b009f66ba,2024-04-12T12:43:57.400000
|
||||
CVE-2024-22722,0,0,2ec00a5c8e46809886d975f9e62c1646ed03ce66e913f1360753f43119db0813,2024-07-03T01:47:20.897000
|
||||
CVE-2024-22723,0,0,5e0104614f79979231b68cb0938b4f8c78660f8d758e8dd4467e139288dfbdc1,2024-08-01T13:47:01.343000
|
||||
CVE-2024-22724,0,0,f04bb0773d70e218cb04a1eae11b7ff703933a7f824a16aba4031882d5107c0c,2024-03-21T12:58:51.093000
|
||||
CVE-2024-22724,0,1,933dc01fb2520f6f9ab9fa4754177aa8d3c42e94e77de3e74dc91468db49f71f,2024-08-06T15:35:08.610000
|
||||
CVE-2024-22725,0,0,5fa379724d5fca6a5a451858a4ba6ac34ebc02b0c57c2f76559d231c12c113c5,2024-01-30T20:42:46.143000
|
||||
CVE-2024-22727,0,0,21f0a699093390ba1d8ee3a22a8e6961dde2045354957e98f8b2db244c882256,2024-02-20T19:50:53.960000
|
||||
CVE-2024-22729,0,0,768bb63a8e628d1d5ad8c32ce479e7ef65e430464c818e272a86590502c0053a,2024-02-01T15:15:34.173000
|
||||
@ -245145,7 +245146,7 @@ CVE-2024-23712,0,0,99a9a0e98f6ec74442cc23ab4a592b5612be30e655f849926f8cbd43d464c
|
||||
CVE-2024-23713,0,0,84ac23a9c686e595929bab4dad7b08bca80d94f5a0dad54d418e0bd955964876,2024-07-03T01:48:05.220000
|
||||
CVE-2024-23717,0,0,b21a496df9a56edab7f2696ca2d5dddc2c25b1c0bb8c9eac9b26a7e06e0cb676,2024-03-12T12:40:13.500000
|
||||
CVE-2024-23721,0,0,79fe202cb30d537a04fdd87ebf2ebd3911bebfb1a0ce8268579dd48022b3a9d3,2024-03-21T12:58:51.093000
|
||||
CVE-2024-23722,0,0,517e8a8f50b00422a7631eed6bef36098202e258e6465c18266f5be7c072434f,2024-03-26T17:09:53.043000
|
||||
CVE-2024-23722,0,1,af1e6a2b53efd211283ec4f6a153b9c2bd466feef4ec2b55fd6db947ef4fb0f6,2024-08-06T14:35:05.600000
|
||||
CVE-2024-23724,0,0,5cc76252bcfe665701c3f11744cfd264292f873fd21df1c2782e1c197e0c01a4,2024-08-01T23:15:47.180000
|
||||
CVE-2024-23725,0,0,96d1f58f146e10084452af188f967aa7d2c64d922f58373c2c0f92aec9556706,2024-01-29T15:25:48.110000
|
||||
CVE-2024-23726,0,0,49bfb3e940abfa1d8c182442ad4bd7c2d671bcc24ce62cd25d7197deab52125c,2024-01-29T15:25:36.090000
|
||||
@ -246944,7 +246945,7 @@ CVE-2024-2655,0,0,1c645dd82a6d9fee39650c96a2d44383dd06975f6c270faedebb8baf614d4d
|
||||
CVE-2024-26557,0,0,bce4bb7db30c44200534fa645c4e21a32632f06526ac89541f2afa8ce855d2c7,2024-03-22T12:45:36.130000
|
||||
CVE-2024-26559,0,0,59f6bfe647560e762a59ef347afb5a6e13eb28516f541334ce1dae55e8808b08,2024-02-29T13:49:47.277000
|
||||
CVE-2024-2656,0,0,1e1bbc88c0161a3acb0637c745cf054774e0c8a58563824f7d11f0999806993d,2024-04-08T18:49:25.863000
|
||||
CVE-2024-26566,0,0,2f53cb57f93da9c85b27405001d60fede69ba994ac00bfd80be2f35af3a49f40,2024-03-07T13:52:27.110000
|
||||
CVE-2024-26566,0,1,178f5f9908b56a8ca7b57493a287d425d6858d98fae12d3e88663a8ab0cf6ac4,2024-08-06T14:35:06.510000
|
||||
CVE-2024-2657,0,0,8d1ff58c39beea61aea6c79faeb579bd293dbee684695e94ca7134a1a41bac4a,2024-05-30T13:15:41.297000
|
||||
CVE-2024-26574,0,0,e97beed2b27ceabe660eb9fd95cf5205e1fe0e04e7235f562df6841e3faa926d,2024-04-08T18:48:40.217000
|
||||
CVE-2024-26577,0,0,dbbc22a74081f12f101f825b2a849670f0e76e857d5182f7169d38ee1367f887,2024-08-05T20:35:05.783000
|
||||
@ -247876,7 +247877,7 @@ CVE-2024-27559,0,0,e51cb2ad7f7a927a7b9eacf57e9dc02b64201a90b8501b228aa2354a3e2c9
|
||||
CVE-2024-2756,0,0,75b6f6197ae09c8882d105c3231ed4371ca476e77e86b0b7a32537424ab828b1,2024-06-10T18:15:30.570000
|
||||
CVE-2024-27561,0,0,3ca7922e506f2e58b3ab77ea2274792019f8619a9ef563f326589a5993420327,2024-03-05T18:50:18.333000
|
||||
CVE-2024-27563,0,0,37d316ca473ce8ee235a7a00bc2f1934f40d1081b4a3297e3b4967e39c14854c,2024-03-05T18:50:18.333000
|
||||
CVE-2024-27564,0,0,5d09b300c57dac7e43356f466af4ab8e7319496cb061b9a3a4a4f4667284eb1c,2024-03-05T18:50:18.333000
|
||||
CVE-2024-27564,0,1,4b4d4c7e144b76c27c52012d5becc86e0b5be9dc01f9b6263a0668719575530a,2024-08-06T15:35:10.030000
|
||||
CVE-2024-27565,0,0,0edf7f66daaa9b67c047bf93423dd3ee9ca4c410e75873bf1ca657086f339835,2024-03-05T18:50:18.333000
|
||||
CVE-2024-27567,0,0,ba0253b2315b31126919c66203669f237b0b455b097f59970da966ab9d67e865,2024-08-01T13:48:32.200000
|
||||
CVE-2024-27568,0,0,30a69742845b1488044d187ab76af1144dc7e9904fcf2c872ae36954db40b8a0,2024-03-01T15:23:36.177000
|
||||
@ -247942,7 +247943,7 @@ CVE-2024-2770,0,0,d26bc8bd1d4451d2ee541c7f447cc9cd2d848db62017303dfc34d573c4443d
|
||||
CVE-2024-27703,0,0,3a3573ff5860638356c3adca622c2c9c4efa92e7fefb084eae2ad570942a8faf,2024-03-14T12:52:16.723000
|
||||
CVE-2024-27705,0,0,538b62798ffb3deeb490d879f6c2b0551b7d4dbd846704c9743ab7991d01d3a0,2024-04-04T12:48:41.700000
|
||||
CVE-2024-27706,0,0,aa2f6240a68011db6b5f8dd255d0386bac6b89f2e80e3dcc46650c4b4085146f,2024-04-04T12:48:41.700000
|
||||
CVE-2024-27707,0,0,e7cc6631dc8bca8e003ed03e80704458014681fcf49a0d25544dd93611f57333,2024-03-08T14:02:57.420000
|
||||
CVE-2024-27707,0,1,97a5b1e4443445bbc3851bf93c1f743838b69b97d43532ab36e84f929a1c875f,2024-08-06T14:35:07.363000
|
||||
CVE-2024-27709,0,0,5ae0fb01fcc3e6a6feed263a5b82efd14a1c39afc6defb1474545136e5989939,2024-07-09T16:22:21.743000
|
||||
CVE-2024-2771,0,0,0d7ad290285fd8c18499405c7e6fa83595b4cbfae3f819854d1ca5d72c6a755e,2024-05-20T13:00:34.807000
|
||||
CVE-2024-27710,0,0,43de68ab0b570faf0f4235d817dd8f7006250699af7435eb090311caa9f412af,2024-07-09T16:22:22.570000
|
||||
@ -248425,7 +248426,7 @@ CVE-2024-28326,0,0,855dd245e209741ecd5af54aacc58610e12585c0f397bf5c5a4820ffc8455
|
||||
CVE-2024-28327,0,0,7ed9ed9c0231950061a20f16d0b466fa43b5d37d46730fdcd21aca4b586a20c9,2024-04-26T19:59:19.793000
|
||||
CVE-2024-28328,0,0,88f82b4f564bb2f0cfcfafe664c725ce4612a144351633fca17b714d7ef38607,2024-07-03T01:51:38.350000
|
||||
CVE-2024-2833,0,0,2bc6d91fce23c79b9817f7554599630a708e7859b230a9a2bced401cbd1dcd51,2024-04-18T13:04:28.900000
|
||||
CVE-2024-28335,0,0,17c36b6f18405264f7d3a219484beba8081b41a0ce6a0b4a158db17a233ba48c,2024-03-27T12:29:30.307000
|
||||
CVE-2024-28335,0,1,1f0f16000380dd3374bd37cd33265b4629fe1de221282bb913749763f1030c56,2024-08-06T15:35:11.200000
|
||||
CVE-2024-28338,0,0,4058229b720fcbbfc31bf8d1e879b9db75368619bf7702bfd3d1c419a7233635,2024-03-12T17:46:17.273000
|
||||
CVE-2024-28339,0,0,e7edfb08e526caa3026f659d21730d02e6fceb32876a36cf2d55238da5d3b5b6,2024-03-12T17:46:17.273000
|
||||
CVE-2024-2834,0,0,b28e87c6f045d84badec2f950b6e65f36270629b305c79d294240554601bad8c,2024-04-08T18:48:40.217000
|
||||
@ -248497,7 +248498,7 @@ CVE-2024-2853,0,0,d81bfe0f2e8d27cfb2c79cc8c8a264f27a9770cb3cd0ef6dd08d9ccd4f7731
|
||||
CVE-2024-28535,0,0,b3d344cd79be8d85dbbdedf90a4aca4a63b5679340011f1e54eaf1af4f8bc64c,2024-08-01T13:49:07.553000
|
||||
CVE-2024-28537,0,0,a1b289879a7e37eeb256b0155a9bf07c4755d98e64b0810b5b45c7e328ef254b,2024-03-18T19:40:00.173000
|
||||
CVE-2024-2854,0,0,c1c542fca188c35518ba79a264f89406944bf1f786d85f84048d2cb537d11189,2024-05-17T02:38:34.440000
|
||||
CVE-2024-28545,0,0,b234bb43a6bdfba980224fc2472196bea7480d971cd29181ffb9a0258bc8b12c,2024-03-27T12:29:30.307000
|
||||
CVE-2024-28545,0,1,e9a4e3ca98799d0101f083d2aeb4e48f2d5da7cbf73a3832ee738e6e37caad1e,2024-08-06T14:35:08.207000
|
||||
CVE-2024-28547,0,0,7e81a6a5e32cfa4864b5bc09764b2b5baaf467a0f82788b3d1943e7a59e2091d,2024-03-18T19:40:00.173000
|
||||
CVE-2024-2855,0,0,bf67a061be15a32c70da5cfde311a22d39981d3eb08b5dfae3a254bfe3ca6e82,2024-05-17T02:38:34.570000
|
||||
CVE-2024-28550,0,0,e57300171200da6138bca7c12faed1257d5a1ced8bcd637b3699d9ed4209df2a,2024-08-02T17:35:34.613000
|
||||
@ -248756,11 +248757,11 @@ CVE-2024-28961,0,0,c8a249a7c99721db71986c46abf04003bb50c28611dbaf91b07993347a57a
|
||||
CVE-2024-28962,0,0,31dcea761113ed3d2d5287bcac0ccde59721eab53808f539db6c678a026732b0,2024-08-06T04:16:45.810000
|
||||
CVE-2024-28963,0,0,46ff77abc65aaef52e66733c3c1ae0b4da0085f9d8df9e4bfbf89b9b93df3b64,2024-04-24T13:39:42.883000
|
||||
CVE-2024-28964,0,0,eacce0fb2e076889bc70a58cf7097d65229ee0f89cf37af65654afa31a5f76a3,2024-06-13T18:36:09.010000
|
||||
CVE-2024-28965,0,0,243304e77cbab7b4dbd33d38f2ed62543001dbffc348c59ebe507f143c414797,2024-06-13T18:35:19.777000
|
||||
CVE-2024-28966,0,0,8059850616658d5aecd85c5acbb6e9fab83060203b9180efea1ed79e9b6eb6e9,2024-06-13T18:35:19.777000
|
||||
CVE-2024-28967,0,0,f82472d0d6ace09131f709b8677ef2634ebabe0528f1e1608bf5e5e0608a7892,2024-06-13T18:35:19.777000
|
||||
CVE-2024-28968,0,0,afd86c5938eaf343cace2f8a60ccda5c8d44b9ee09c340c5ed37fc9c3a0af5c7,2024-06-13T18:35:19.777000
|
||||
CVE-2024-28969,0,0,7965757118d16671631493f0e1618e098ee64e46d6b8eddeab326e54299a1377,2024-06-13T18:35:19.777000
|
||||
CVE-2024-28965,0,1,864e7f335ec953da5c2c7e907f469034e931a4a4637e4de43f2a96367ccd9cf1,2024-08-06T15:30:52.433000
|
||||
CVE-2024-28966,0,1,6430710ce538aed33833d6523d76ed4e05ecdf436ddf0d76f353fb0ef57acee9,2024-08-06T15:30:39.067000
|
||||
CVE-2024-28967,0,1,1648dd50c3f81be97a86f7abed79bf1b0d6da23e4a54c3c444650653354399fb,2024-08-06T15:30:14.820000
|
||||
CVE-2024-28968,0,1,ece8961640f9a84d14132908e0bae509452d5afd2089a853aaa9402e5d3ab4fb,2024-08-06T15:29:59.990000
|
||||
CVE-2024-28969,0,1,5e2ad811d66709650c6b955b899218a119a75a237da1c6a214e4f23b4fda3854,2024-08-06T15:28:06.497000
|
||||
CVE-2024-2897,0,0,cedfc20da5ed85e9f84ef73f96b224aba1a7761f3b26b18165ca182e0276563a,2024-06-04T19:19:19.267000
|
||||
CVE-2024-28970,0,0,e8f11977500005486cf7671144dacf7215de23ccf91b6c8eb182a0c1c61d7f56,2024-06-13T18:36:09.013000
|
||||
CVE-2024-28971,0,0,977b1e796a504922885da69c0f7540513ab16cea6a678ad4098d22f0ec570269,2024-05-08T17:05:24.083000
|
||||
@ -248938,7 +248939,7 @@ CVE-2024-29164,0,0,0241c9be23a80d6ab3dceadfce1b9b19b6d47bdd0ac74b2f2c9ae593533e3
|
||||
CVE-2024-29165,0,0,3c479a3372b122f69415807cf18990c87c6bdd2637a3e4ef28a1d60fed2086fd,2024-07-03T01:52:13.840000
|
||||
CVE-2024-29166,0,0,725e6e590aa1d0d5293ed901f6d18ab0cb031637e03d15f947737ac3607357bd,2024-05-14T16:13:02.773000
|
||||
CVE-2024-29167,0,0,8c037b42f45551faa2e5b6ebfa5f5568baba75ac04a9563d88f1a9c7edd265df,2024-08-02T01:15:57.060000
|
||||
CVE-2024-29168,0,0,88c624028af14d68c4e80c287e5c8eaefd6de289ac49c1f565f6c1aa13335d5d,2024-06-13T18:35:19.777000
|
||||
CVE-2024-29168,0,1,4b03610f0e9707b91f6d4ca8302add5e9446f332d0532287451d81854b8e8e49,2024-08-06T15:28:10.527000
|
||||
CVE-2024-29169,0,0,46ae3e5e128a47a51f9060fa5b406a480b0436c4fa2b267a42e0503161231bfe,2024-07-03T01:52:14.690000
|
||||
CVE-2024-2917,0,0,bce749de88c117bab31f2480bda989ec4febf4f1b6cd352875ee070fe63e4914,2024-05-17T02:38:37.297000
|
||||
CVE-2024-29170,0,0,b197fa7a7096d94d37c613ba2c6a7ee9897dd072a00f8dfa13a38fc4064e100a,2024-06-04T16:57:41.053000
|
||||
@ -249145,7 +249146,7 @@ CVE-2024-29667,0,0,4118e10082e95e28b5db3ce405eaacc62f74bef151ef94158b87df6d64494
|
||||
CVE-2024-2967,0,0,c152c043e13b4423e324e9742145ebebea680255fd320b84aa6fd1c484253799,2024-05-02T18:00:37.360000
|
||||
CVE-2024-29672,0,0,163254366ca0dd0dd0315f6561f723f9948906fd49ed067098107871444f5c75,2024-04-05T12:40:52.763000
|
||||
CVE-2024-2968,0,0,45b6ebbb9d99cd3c2205a629e13ac67f3a4bda14dbab27666ba50c91e62a9257,2024-03-29T12:45:02.937000
|
||||
CVE-2024-29684,0,0,98879e168faf7ae7666a43b1f6a5b13e30b20feb259ae6bd6597efec13235084,2024-03-26T17:09:53.043000
|
||||
CVE-2024-29684,0,1,b36bf2e8a8667d8059487f589a89143767a320a5d181a5559cd241abd56a073c,2024-08-06T15:35:12.520000
|
||||
CVE-2024-29686,0,0,24415b8b4ad1fce01014ce0adb73b5758ac1af7cb6661af128dfb5e4207dea3b,2024-08-02T01:16:00.577000
|
||||
CVE-2024-2969,0,0,8544d89f42684c11ff0ce4f59b9b332aa5f1a74abb30a148c14e95ecc35686ff,2024-03-29T12:45:02.937000
|
||||
CVE-2024-2970,0,0,fc9de7221826a902f3a6cf19f3180d33eaf927389762bf1e23aea5c70762ccb6,2024-03-29T12:45:02.937000
|
||||
@ -249561,6 +249562,7 @@ CVE-2024-30164,0,0,3fa9289f0559618e7bad46ffe5b89aecd709c72c162900fb09331245f882a
|
||||
CVE-2024-30165,0,0,516d72029cdecb5325a90c1123b764a62c24a7b3a4fe7fb9f30a6bc38aa2d8cb,2024-07-03T01:53:53.630000
|
||||
CVE-2024-30166,0,0,50687ad455f93a12b9f6c9dbf505813d14042f7054e41b037f825261eb3f0951,2024-08-01T15:35:09.177000
|
||||
CVE-2024-3017,0,0,b401b23402ebc6f6ec3d2296f1d5b4f9799017607076ff54b8bb35750200243b,2024-06-27T19:25:12.067000
|
||||
CVE-2024-30170,1,1,84396ea2843df616af18f33890711de152cf4f27ff065ca2574ec821f8444877,2024-08-06T14:16:03.777000
|
||||
CVE-2024-30171,0,0,a303030da6dd4ea6781306128867049fd2796ab1046058a6c2cefdda88e2976e,2024-06-14T13:15:51.603000
|
||||
CVE-2024-30172,0,0,e23d65cae1ab6574d22c6026de16bab78b6c6028b759790600f9957da66d8b50,2024-06-14T13:15:51.730000
|
||||
CVE-2024-30176,0,0,b9c656776bec57369b0fb415cb86239071847d4185cfc200250f61ff82ba37c3,2024-05-01T19:50:25.633000
|
||||
@ -252038,7 +252040,7 @@ CVE-2024-33781,0,0,f92b3d1e80a012680436fd49e5bab657fd2a9b945e08254832c1c45257ab0
|
||||
CVE-2024-33782,0,0,d54261586afd08a5185da8c98a333efe96e77b0a86120ba9d5a8acb87e82f8b3,2024-07-03T01:58:46.057000
|
||||
CVE-2024-33783,0,0,ab3a37415f38062c8c0433a787e71d9de7161e1a21f1c7c7424bb11f9e8ff724,2024-07-03T01:58:46.247000
|
||||
CVE-2024-33786,0,0,4c34eaaeb6404bd11728362ca0ccaf1f06d8896bfaa0a8e30f5a7055f9db9f9d,2024-08-01T13:52:06.273000
|
||||
CVE-2024-33787,0,0,e7cc09c9a270ae17cb000970f996a17b61d199ad3336b214cdde603fe73a0562,2024-05-03T14:17:53.690000
|
||||
CVE-2024-33787,0,1,c79d3756f20fa8608bd38338556aeaa798aa21ec0e9c3dffe176487918ad4adc,2024-08-06T15:35:13.693000
|
||||
CVE-2024-33788,0,0,db496e414e9eacb69df835d7ad8cccbd3f6da6b6998f07eaab69cafc694fe336,2024-07-03T01:58:47
|
||||
CVE-2024-33789,0,0,1b705f261bdfdb3c7c0384a6685c74908e5e41969953d5575683a1d41efd63d5,2024-07-03T01:58:47.770000
|
||||
CVE-2024-33791,0,0,4a99a46cc9bc13330a58a77df6070e766b5a533f0015633cf295877892d64b94,2024-07-03T01:58:48.567000
|
||||
@ -252069,7 +252071,7 @@ CVE-2024-33832,0,0,7b3e27b34a81a08591742eaf0380d56875457acf0d341656accd4bb7693f1
|
||||
CVE-2024-33835,0,0,cffd31db3df6261e091005d9fb36253e75a61316a58e0e89b08946054d5f55ef,2024-07-03T01:58:57.853000
|
||||
CVE-2024-33836,0,0,ca4e61dbd315156f846a9cf4e6ecb006bd948e7b0e0ba1558760fe0d5dd0584d,2024-07-03T01:58:58.623000
|
||||
CVE-2024-3384,0,0,e40494f4cc79f184423be7640904e779411ddd60482c02e316992b67bcd78eae,2024-04-10T19:49:51.183000
|
||||
CVE-2024-33844,0,0,437324bc3fb95bc3edde402597b08f2d23d6855a92f3f5d5f79ef919926ec791,2024-06-10T18:45:09.903000
|
||||
CVE-2024-33844,0,1,5ec71d8512f2265bcb8f71bfb71499ff33cd9dfb829f2459bd57512bb7f17072,2024-08-06T15:35:14.480000
|
||||
CVE-2024-33847,0,0,ae667fdb2032f21fdd40b0d89c1bf951a08b3c40e1bf80331cebce5a8e5c826d,2024-06-24T19:26:47.037000
|
||||
CVE-2024-33849,0,0,711285af88da51034d770e4f7dba4f259d947b941ed83e4d1af2a2b96823faae,2024-08-01T13:52:09.410000
|
||||
CVE-2024-3385,0,0,327b76cedb073b60c4f8c3e90737eb0ba35715647736f9323adf15afbb307026,2024-04-10T19:49:51.183000
|
||||
@ -252109,6 +252111,7 @@ CVE-2024-33893,0,0,5974b8fb160227521bbec0e73b727b302fe98e5f817ff5ac28acc30b93164
|
||||
CVE-2024-33894,0,0,594f6c34d910f5d78d69ce42d3fed6fad86893a3cfd60893505546e0673750b7,2024-08-05T16:35:11.057000
|
||||
CVE-2024-33895,0,0,c6f14a57216c6ca956cf6016063e92796c068cf11b7edad49969b23d26a3673a,2024-08-05T12:41:45.957000
|
||||
CVE-2024-33896,0,0,8e96affe6107cca942e1428f9b2953f9d0a1121d43170ebf22d77edba9a0528d,2024-08-05T12:41:45.957000
|
||||
CVE-2024-33897,1,1,4569e2d794f7ae3505c64b645cc924383ed471408a2828a834a7433a17b92353,2024-08-06T14:16:03.870000
|
||||
CVE-2024-33898,0,0,d8c3e8424b1aff6ae8a0fcc91c86b5228f2623afdea66b8b7db25938bc363225,2024-08-01T13:52:11.823000
|
||||
CVE-2024-33899,0,0,215d012a0aeed617e9223e785f340f85e2514c39cf4a2326738c4b3613b1edd0,2024-07-03T01:59:09.200000
|
||||
CVE-2024-33900,0,0,269cc21c173c9c584795c12f1ce91d2738b696474fbebedc5c423a95f8259b67,2024-08-02T03:15:33.783000
|
||||
@ -252167,21 +252170,21 @@ CVE-2024-33956,0,0,92ede81a948fcf5a2df4670aeb0def8a77bc1add850b4acbb2c9c5d6e0cc7
|
||||
CVE-2024-33957,0,0,88de846bc8d97892cfd8f5e3fb77365a046bd14d735fe9ff0fdf5bdcf43f6627,2024-08-06T11:16:04.443000
|
||||
CVE-2024-33958,0,0,53178196a6e998522e42efb1164438403365268d7b5d0361801382f2258b9980,2024-08-06T11:16:04.920000
|
||||
CVE-2024-33959,0,0,d458bbf5f43f23837870d410a9e46f289d63332eee24acb672fc9cd8a2d0c483,2024-08-06T11:16:05.133000
|
||||
CVE-2024-33960,1,1,c53c593ec668667e287363e16e108fa27ae08f29f861b438346e205e55b6bf01,2024-08-06T12:15:49.130000
|
||||
CVE-2024-33961,1,1,03a2cfe3185829675da53ac4ddc9ee5f23ae56d659f31c4d457aaacfe6d3563e,2024-08-06T12:15:49.360000
|
||||
CVE-2024-33962,1,1,0f5af782ce7b0b6f1af8a57e7f1705aedaabb08b378b29d3510d617216679428,2024-08-06T12:15:49.570000
|
||||
CVE-2024-33963,1,1,850e588f9be54795f0489ea09b2fa9cbb18170832d11bb6b87faea54977e7809,2024-08-06T12:15:49.790000
|
||||
CVE-2024-33964,1,1,25b775cb98d6d75d3b8868c9df78a96e26f554bc0894605cc9030849d51599db,2024-08-06T12:15:50
|
||||
CVE-2024-33965,1,1,3ddb893fff6f2a0965a82defedff9401de724e71057282952143e3c624d8f57b,2024-08-06T12:15:50.223000
|
||||
CVE-2024-33966,1,1,f4f7eaf3e81606089ac7d13ccade1fb14397a0c2fe11216859413b3f098f44fa,2024-08-06T12:15:50.440000
|
||||
CVE-2024-33967,1,1,8ba1a67d6bcb7b88479bbe80f86e3644d2b9d7cb7e0b7d56bd484a3cfab55065,2024-08-06T12:15:50.667000
|
||||
CVE-2024-33968,1,1,2660cf9965440079050fb15a921d961214a26f55702d2cdc0e8dbeab05f6fa75,2024-08-06T12:15:50.887000
|
||||
CVE-2024-33969,1,1,70a359893f34beed5cc40710f94e1f36c74431d5f301ccb3324eea061304cd03,2024-08-06T12:15:51.100000
|
||||
CVE-2024-33970,1,1,08fc32382cf60fe53811f9961b90beb8742a746cd203e002d1fde4f7ed9f5c44,2024-08-06T12:15:51.330000
|
||||
CVE-2024-33971,1,1,45a43d4e935fb8f26ea153d3830bfbb482c3a2462495da277e1cdd1b01815ce8,2024-08-06T12:15:51.550000
|
||||
CVE-2024-33972,1,1,3750dc3a6f98d5c2d5be5e290b107afe21a4b146ac56b50fcb02d01ad53bf840,2024-08-06T12:15:51.773000
|
||||
CVE-2024-33973,1,1,31f4407e21b5d5d826f609599778c0a36b741f9666904a530b26958cc8a9aebd,2024-08-06T12:15:51.993000
|
||||
CVE-2024-33974,1,1,d25ce0a05e0a6752a4262f16ca72168b217bf65c87bd2e0f11fe6a2f6846f71e,2024-08-06T12:15:52.213000
|
||||
CVE-2024-33960,0,0,c53c593ec668667e287363e16e108fa27ae08f29f861b438346e205e55b6bf01,2024-08-06T12:15:49.130000
|
||||
CVE-2024-33961,0,0,03a2cfe3185829675da53ac4ddc9ee5f23ae56d659f31c4d457aaacfe6d3563e,2024-08-06T12:15:49.360000
|
||||
CVE-2024-33962,0,0,0f5af782ce7b0b6f1af8a57e7f1705aedaabb08b378b29d3510d617216679428,2024-08-06T12:15:49.570000
|
||||
CVE-2024-33963,0,0,850e588f9be54795f0489ea09b2fa9cbb18170832d11bb6b87faea54977e7809,2024-08-06T12:15:49.790000
|
||||
CVE-2024-33964,0,0,25b775cb98d6d75d3b8868c9df78a96e26f554bc0894605cc9030849d51599db,2024-08-06T12:15:50
|
||||
CVE-2024-33965,0,0,3ddb893fff6f2a0965a82defedff9401de724e71057282952143e3c624d8f57b,2024-08-06T12:15:50.223000
|
||||
CVE-2024-33966,0,0,f4f7eaf3e81606089ac7d13ccade1fb14397a0c2fe11216859413b3f098f44fa,2024-08-06T12:15:50.440000
|
||||
CVE-2024-33967,0,0,8ba1a67d6bcb7b88479bbe80f86e3644d2b9d7cb7e0b7d56bd484a3cfab55065,2024-08-06T12:15:50.667000
|
||||
CVE-2024-33968,0,0,2660cf9965440079050fb15a921d961214a26f55702d2cdc0e8dbeab05f6fa75,2024-08-06T12:15:50.887000
|
||||
CVE-2024-33969,0,0,70a359893f34beed5cc40710f94e1f36c74431d5f301ccb3324eea061304cd03,2024-08-06T12:15:51.100000
|
||||
CVE-2024-33970,0,0,08fc32382cf60fe53811f9961b90beb8742a746cd203e002d1fde4f7ed9f5c44,2024-08-06T12:15:51.330000
|
||||
CVE-2024-33971,0,0,45a43d4e935fb8f26ea153d3830bfbb482c3a2462495da277e1cdd1b01815ce8,2024-08-06T12:15:51.550000
|
||||
CVE-2024-33972,0,0,3750dc3a6f98d5c2d5be5e290b107afe21a4b146ac56b50fcb02d01ad53bf840,2024-08-06T12:15:51.773000
|
||||
CVE-2024-33973,0,0,31f4407e21b5d5d826f609599778c0a36b741f9666904a530b26958cc8a9aebd,2024-08-06T12:15:51.993000
|
||||
CVE-2024-33974,0,0,d25ce0a05e0a6752a4262f16ca72168b217bf65c87bd2e0f11fe6a2f6846f71e,2024-08-06T12:15:52.213000
|
||||
CVE-2024-33975,0,0,a46b370542e31d699ba01a1fac4d9ed4c848d3b0a25985f5a0ce53b5bcb63a6a,2024-08-06T11:16:05.343000
|
||||
CVE-2024-33976,0,0,02e20b804a284cea017672c564c762d3fb7d7c9c8cfcb4a61b9fa58410196b8b,2024-08-06T11:16:05.580000
|
||||
CVE-2024-33977,0,0,2eb5edafc06dded0ff925fe2cae461b6fb7bd8b6a70ba49c1b48907f8554dce2,2024-08-06T11:16:05.793000
|
||||
@ -252189,19 +252192,19 @@ CVE-2024-33978,0,0,d464745d4bd7f31f1fc51af542d385e5cae6b8ccd3d85ce164396a41cfda2
|
||||
CVE-2024-33979,0,0,b983164577546938ffe33145f2e0f3b698c4bc7ada5e2728f77b5638aeef3640,2024-08-06T11:16:06.223000
|
||||
CVE-2024-33980,0,0,dee037246a927f3ca3153211de0c62347441b8e779709e076f12ac9e0599f054,2024-08-06T11:16:06.477000
|
||||
CVE-2024-33981,0,0,e0e57ce80d6753fe0d3c97c236c4bbf725d864b47682f7bd24299ca9dc3d8626,2024-08-06T11:16:06.733000
|
||||
CVE-2024-33982,1,1,45b26bbc74b7d72080ae88d41fb6f7f413f4d8536ac87fdf45e0b60f93629fb9,2024-08-06T13:15:53.257000
|
||||
CVE-2024-33983,1,1,cab4d447ce471d1290e90dd5a1e82cc9d5252b784d55444265c55d7965dd63cd,2024-08-06T13:15:53.480000
|
||||
CVE-2024-33984,1,1,87dd0943d36eb3c143032637ffc496824366110651ae8cab4376bb323bf8ed31,2024-08-06T13:15:53.693000
|
||||
CVE-2024-33985,1,1,ef0f29bb6885e74d2e17051eff53879974402a057315b148ebe6c6235cb589c9,2024-08-06T13:15:53.907000
|
||||
CVE-2024-33986,1,1,53b9aa07d3b5aa856bbae868678e0f79fb4d50a9480eb558800c78c90fd7c811,2024-08-06T13:15:54.123000
|
||||
CVE-2024-33987,1,1,920aa0d963feab45672016a8cc41edf6f3afe79e7d7167dead3d21fdb4e4d9c7,2024-08-06T13:15:54.327000
|
||||
CVE-2024-33988,1,1,bdd7b77fbeff0ffc0758ae8b6e499a8a80438127c5c8079afedbe193b0695b10,2024-08-06T13:15:54.547000
|
||||
CVE-2024-33989,1,1,5b7284697d5328f709a9fd4fb7a2c01b2babcfd13cf9fad3ba146866e13c5d51,2024-08-06T13:15:54.757000
|
||||
CVE-2024-33990,1,1,f29dd9f16a04affb1b065ba215c8c07f5b4fcef4a165541f34cd29f79dbeffea,2024-08-06T13:15:54.973000
|
||||
CVE-2024-33991,1,1,e7848b1fbd07dc956434fc6854119e6993adba369708a89e5c7970374000cd12,2024-08-06T13:15:55.250000
|
||||
CVE-2024-33992,1,1,9b158ff86a5fea9c0143a3a28a09a3d005a2bc3a66e820f27ff31f312fed7ae4,2024-08-06T13:15:55.487000
|
||||
CVE-2024-33993,1,1,87d3be91dbfa8958a7521feb77979831ff28d2f8a3f9fb1ddb40d835def70e58,2024-08-06T13:15:55.693000
|
||||
CVE-2024-33994,1,1,2e73c4da04fec625761166167f68c922b34ac4635cfbd0439df4319cf1dc7526,2024-08-06T13:15:55.897000
|
||||
CVE-2024-33982,0,0,45b26bbc74b7d72080ae88d41fb6f7f413f4d8536ac87fdf45e0b60f93629fb9,2024-08-06T13:15:53.257000
|
||||
CVE-2024-33983,0,0,cab4d447ce471d1290e90dd5a1e82cc9d5252b784d55444265c55d7965dd63cd,2024-08-06T13:15:53.480000
|
||||
CVE-2024-33984,0,0,87dd0943d36eb3c143032637ffc496824366110651ae8cab4376bb323bf8ed31,2024-08-06T13:15:53.693000
|
||||
CVE-2024-33985,0,0,ef0f29bb6885e74d2e17051eff53879974402a057315b148ebe6c6235cb589c9,2024-08-06T13:15:53.907000
|
||||
CVE-2024-33986,0,0,53b9aa07d3b5aa856bbae868678e0f79fb4d50a9480eb558800c78c90fd7c811,2024-08-06T13:15:54.123000
|
||||
CVE-2024-33987,0,0,920aa0d963feab45672016a8cc41edf6f3afe79e7d7167dead3d21fdb4e4d9c7,2024-08-06T13:15:54.327000
|
||||
CVE-2024-33988,0,0,bdd7b77fbeff0ffc0758ae8b6e499a8a80438127c5c8079afedbe193b0695b10,2024-08-06T13:15:54.547000
|
||||
CVE-2024-33989,0,0,5b7284697d5328f709a9fd4fb7a2c01b2babcfd13cf9fad3ba146866e13c5d51,2024-08-06T13:15:54.757000
|
||||
CVE-2024-33990,0,0,f29dd9f16a04affb1b065ba215c8c07f5b4fcef4a165541f34cd29f79dbeffea,2024-08-06T13:15:54.973000
|
||||
CVE-2024-33991,0,0,e7848b1fbd07dc956434fc6854119e6993adba369708a89e5c7970374000cd12,2024-08-06T13:15:55.250000
|
||||
CVE-2024-33992,0,0,9b158ff86a5fea9c0143a3a28a09a3d005a2bc3a66e820f27ff31f312fed7ae4,2024-08-06T13:15:55.487000
|
||||
CVE-2024-33993,0,0,87d3be91dbfa8958a7521feb77979831ff28d2f8a3f9fb1ddb40d835def70e58,2024-08-06T13:15:55.693000
|
||||
CVE-2024-33994,0,0,2e73c4da04fec625761166167f68c922b34ac4635cfbd0439df4319cf1dc7526,2024-08-06T13:15:55.897000
|
||||
CVE-2024-33996,0,0,3a1ccff7b15ef74d30247c0f7f73ffcc0dc644d71df2ad9a3b66250554292391,2024-07-03T01:59:14.897000
|
||||
CVE-2024-33997,0,0,a1b67f9141e983abbb533434dc38928810b4315794a01f73fb3845b5ec77f911,2024-06-03T14:46:24.250000
|
||||
CVE-2024-33998,0,0,9e3de27d8bf76d6956fcf84fb478824118f2a7a5526fa450d9858736f7cac784,2024-06-03T14:46:24.250000
|
||||
@ -252915,14 +252918,14 @@ CVE-2024-3520,0,0,4d2ca8beda165968cfea3b64e955c18436397c1b54474f7a64b510b5eacd13
|
||||
CVE-2024-35200,0,0,4e081bc266f3339c234fd0d9836610e298ca5ba3771760c1147fa5a32be6afdb,2024-06-10T18:15:34.983000
|
||||
CVE-2024-35204,0,0,0248f812c6eb240110c4167110975a2b8317634bb6300a9657da495b3589cfbb,2024-07-03T02:01:28.703000
|
||||
CVE-2024-35205,0,0,a2e57cfbac4b8021374b26305b7394500fe6ce597517b80b00d88da379a98821,2024-05-14T16:11:39.510000
|
||||
CVE-2024-35206,0,0,f9905c58924dc527d313db67f522336406d83128cc3228382d189acbbbf8c0f8,2024-06-11T13:54:12.057000
|
||||
CVE-2024-35207,0,0,679304b3063a48b0a5579ba1ffb277f2485905516c3b4b269cb85a1ff76751a9,2024-06-11T13:54:12.057000
|
||||
CVE-2024-35208,0,0,b81c0a582fce341f329d0115040bc4d7176f9e8ec666cdc9bd82da308c515022,2024-06-11T13:54:12.057000
|
||||
CVE-2024-35209,0,0,d85ab775421b9a96d2d4b95e8cc83488152ace612a91e559fa15e02fe1bcd835,2024-06-11T13:54:12.057000
|
||||
CVE-2024-35206,0,1,2d45311ddac58ab7849b5dcc4f34358defb99853941e437129eca208b1798608,2024-08-06T15:02:05.777000
|
||||
CVE-2024-35207,0,1,d2635c7366e1ebe2e4894fe79457104ee16f907d65baaf982977b483f755a034,2024-08-06T15:02:16.163000
|
||||
CVE-2024-35208,0,1,c327ea7feda1657783c8f89d88776276d84096f0d4b51a5404de61ecb0c1687b,2024-08-06T15:08:17.727000
|
||||
CVE-2024-35209,0,1,196569b59eea3cc630421f8866e0f40dc4c0a1b634b46696e7781627ea2b69a2,2024-08-06T15:09:04.427000
|
||||
CVE-2024-3521,0,0,b7f892567f65425a908c9c954311779c22cc3162bf89c036dad8ac44a9acab25,2024-05-17T02:39:58.603000
|
||||
CVE-2024-35210,0,0,1d8a7d2287ba7df85fd0a3c7c4c899e3452559d21b0439d3f446614b43d686d5,2024-06-11T13:54:12.057000
|
||||
CVE-2024-35211,0,0,757502297e4ff557aa3e5de7584f509b32f0a15b542fb7953a1c815d98695f13,2024-06-11T13:54:12.057000
|
||||
CVE-2024-35212,0,0,c93918e3b8e91992564061eee9064bafc7032fa56935ec1cec3cbc80e31117b0,2024-06-11T13:54:12.057000
|
||||
CVE-2024-35210,0,1,81f5eb1cd2c214fed01b7d479c60a962ea85b697b02b3fceb612e3b93bbf9090,2024-08-06T15:09:53.797000
|
||||
CVE-2024-35211,0,1,19534889f081150f139415aeffdc66a9de4b652b6cde992612a0b71b906a33ab,2024-08-06T15:10:56.163000
|
||||
CVE-2024-35212,0,1,053c3edc590a8c81ff407b4c0affd7ea52fd1601e9d265a6a1927307cc6f4b93,2024-08-06T15:11:27.243000
|
||||
CVE-2024-35213,0,0,76339f3ccade6707f71873f12fb8a84bb7076efcedfad313066f61130756b80e,2024-06-13T18:36:09.013000
|
||||
CVE-2024-35218,0,0,e1184bfd50c39d7ccb9d3af67c83c225381571c141531e6e99c4b17efa5619ff,2024-05-21T16:54:26.047000
|
||||
CVE-2024-35219,0,0,d38f1e7fcd795eac766ba6f65b3b8cde339bb119340da2573ee5da93c2c59a44,2024-05-28T12:39:28.377000
|
||||
@ -253831,6 +253834,7 @@ CVE-2024-36420,0,0,f88ca1da3f418238df7aa68f8868409c11480e63fa5a419dd8cae87369fdc
|
||||
CVE-2024-36421,0,0,6377f154589fbee582a888cb89fe433db93fc2d1b9f4ba90a9e9d6ff1a5422db,2024-07-03T15:36:31.170000
|
||||
CVE-2024-36422,0,0,1c8e85fff4389539f30938d98dea0041c583b614c5e1956a8be795decf84cdf1,2024-07-03T15:38:24.297000
|
||||
CVE-2024-36423,0,0,8fccf5fe0a9c314803742689debe16a3c95c7af9b7d5f30b496e24f061127873,2024-07-02T12:09:16.907000
|
||||
CVE-2024-36424,1,1,9030014dd7df7cd9ac8c529cc389fc669e0cebee729c5777e3ebc3248705eb9b,2024-08-06T15:15:41.843000
|
||||
CVE-2024-36426,0,0,081cbabfe1f165d2e60c6bf5434c4cea5a1c1465246b1d9713d429b0a41c1ba0,2024-07-03T02:03:11.237000
|
||||
CVE-2024-36427,0,0,10c5dade9c11af5e52239a7a8c18438909a8ea6a201617061be6b7626f49e18c,2024-07-03T02:03:12.033000
|
||||
CVE-2024-36428,0,0,73719b2d94fccf2eff624fbf36dc51c2fc48c0dc66be598a72cd1ff64aaf434d,2024-05-28T12:39:28.377000
|
||||
@ -254400,11 +254404,11 @@ CVE-2024-37333,0,0,ca6a17cc22b1d717772d796bf0aa2546b83275671146f095987901bb082c3
|
||||
CVE-2024-37334,0,0,3931d383be66577632f115e0c9d908ee2bcb3dc588be0b175f4163124a70c529,2024-07-09T18:18:38.713000
|
||||
CVE-2024-37336,0,0,90e602973017f76462997dc997dd1aa43f526ec48ab9dba1852b6ff97aa50fb9,2024-07-09T18:18:38.713000
|
||||
CVE-2024-3734,0,0,1fa8bbb57ad3bce01ae853c22daddc26dfe02917c61007dac4955ee2123008cc,2024-05-02T18:00:37.360000
|
||||
CVE-2024-37343,0,1,9822edef5552dcf3d43fa2bee27bf9a4a8f63ea4d7138b0de867a8810cd5a703,2024-08-06T13:48:32.297000
|
||||
CVE-2024-37344,0,1,aabf0e402dbd52c1aa2993f072213b9b1a8b4d49253f8eb436c6f5af2aa88369,2024-08-06T13:49:14.817000
|
||||
CVE-2024-37345,0,1,095e9fcf2729a229a6d30770c6328e028d13c3564257fe3ca6a02856acea31d8,2024-08-06T13:49:26.063000
|
||||
CVE-2024-37343,0,0,9822edef5552dcf3d43fa2bee27bf9a4a8f63ea4d7138b0de867a8810cd5a703,2024-08-06T13:48:32.297000
|
||||
CVE-2024-37344,0,0,aabf0e402dbd52c1aa2993f072213b9b1a8b4d49253f8eb436c6f5af2aa88369,2024-08-06T13:49:14.817000
|
||||
CVE-2024-37345,0,0,095e9fcf2729a229a6d30770c6328e028d13c3564257fe3ca6a02856acea31d8,2024-08-06T13:49:26.063000
|
||||
CVE-2024-37346,0,0,2db4948f8270427d7ba2d74594c1333081073368dc8627246d0b026677177be1,2024-06-21T11:22:01.687000
|
||||
CVE-2024-37347,0,1,4655db1f78f90a4e012a32cf405d62b010ea59a2a5d18c6dccc795a7aa708830,2024-08-06T13:50:02.077000
|
||||
CVE-2024-37347,0,0,4655db1f78f90a4e012a32cf405d62b010ea59a2a5d18c6dccc795a7aa708830,2024-08-06T13:50:02.077000
|
||||
CVE-2024-37348,0,0,dc48fa9974ed21f9f4246b3dd80406f069a0cd0f6f5793a9ce9659a6a27d7dd1,2024-06-21T11:22:01.687000
|
||||
CVE-2024-37349,0,0,d5bdd857cd8357de07400ace5da8b29cdb394b047c72e22b130727701a2be1cc,2024-06-21T11:22:01.687000
|
||||
CVE-2024-3735,0,0,3bc0e7ae2360c04d22daf0f12463798d07ea71d58fa91621d2a939f364ece413,2024-07-19T13:15:02.083000
|
||||
@ -255258,7 +255262,7 @@ CVE-2024-3881,0,0,3699310594a82ce285b52bf9c21755fa8173160a66408c76064512e538b3fc
|
||||
CVE-2024-3882,0,0,8cf286ca42c3a62eccb821d9ac0678dabad594eee248c127390ddaf169987d46,2024-05-17T02:40:10.457000
|
||||
CVE-2024-3883,0,0,e6bda202b9fd54c10f25f29dd8ae0cebb83b1538aee636944c2fd66bf4045fff,2024-05-02T13:27:25.103000
|
||||
CVE-2024-3885,0,0,9b28a2ee85edfe77753e71858fb1438bd68a9b6ee299843f3a5752cca4753d01,2024-05-02T18:00:37.360000
|
||||
CVE-2024-38856,0,1,5bdac33e3c1769f797760792fc523b4e832fcce7196ab622177b90376f5d9d69,2024-08-06T13:35:01.497000
|
||||
CVE-2024-38856,0,0,5bdac33e3c1769f797760792fc523b4e832fcce7196ab622177b90376f5d9d69,2024-08-06T13:35:01.497000
|
||||
CVE-2024-38857,0,0,857bbf4d5ee889c68ec1450930f0cf323232ab2d5a162824c8153ee668a7e638,2024-07-02T12:09:16.907000
|
||||
CVE-2024-38867,0,0,4bc8a346a92423127914d7bd932870dc2a7efecb39fecaf6981a89bcdb11978c,2024-07-09T18:19:14.047000
|
||||
CVE-2024-3887,0,0,7992ee60f5f26d3f15d818db21e67277dbf02ae9d208c24a54e5c01935424c21,2024-05-16T13:03:05.353000
|
||||
@ -255846,6 +255850,7 @@ CVE-2024-4009,0,0,26a6ec4a10b164e2f280e8681d4c21dd6301b3a45dfa2578f28e720f7416c2
|
||||
CVE-2024-40094,0,0,5d1ab4fa5a1484beb0714ef3fcebe3147b446e4d722942df6d84c0a1bd2dd7f2,2024-07-30T13:32:45.943000
|
||||
CVE-2024-40096,0,0,42339056636dd4c75a9aaab4d34e3b72d84104680bd453c9a522c777c20bb28e,2024-08-05T12:41:45.957000
|
||||
CVE-2024-4010,0,0,6f96a951ba4d658f2d216c10726beef3ec3f9c518875bc1c492ed89999ff3fc2,2024-05-15T16:40:19.330000
|
||||
CVE-2024-40101,1,1,945f8face14acfe695b03abc70f29e7d06c3788949bf86f591c6e7b8ebc99b12,2024-08-06T14:16:04.117000
|
||||
CVE-2024-4011,0,0,3791d0b8fb3f4c8257f00293727675eba680b52984c90b375af59f25fe8844d5,2024-06-28T13:21:27.280000
|
||||
CVE-2024-40110,0,0,68d861d5d10a023f1915f02afcd75d8882ae33a201769ba967017148b1a5c0b1,2024-08-01T13:56:50.340000
|
||||
CVE-2024-40116,0,0,eb70c9a9b1b545c9ad476d8d1542c9445241ad3bd4f0dd5767e3b25e7e8e8497,2024-08-01T13:56:51.153000
|
||||
@ -255915,7 +255920,7 @@ CVE-2024-40464,0,0,3beb82f710e64d9007f097c0d34a0e44a728096673fd034d1450c47df3b8a
|
||||
CVE-2024-40465,0,0,15986f29ff1e8aef63181dd9799f409f46000c95ad7d745708fb5f0091003f8f,2024-08-02T19:35:37.367000
|
||||
CVE-2024-40492,0,0,887baeb8c822fbf96c83ae7c8317e551b9d380e125d5f646dfb0a8c0719647ab,2024-08-01T13:57:30.260000
|
||||
CVE-2024-40495,0,0,0c92b9527f5126e4b4bbf0d1f0a16c194305be9e806244080172bf727ded6b6a,2024-08-01T13:57:31.037000
|
||||
CVE-2024-40498,0,0,693a4992e211fa78eae33c413285a314ee2e96c2391f216bff6439a4ec959f59,2024-08-05T17:15:41.670000
|
||||
CVE-2024-40498,0,1,83580c66e72d4417cbf278f69d5229b1724b5433aecf7d35ee962e9f2fca21bd,2024-08-06T15:35:16.133000
|
||||
CVE-2024-40502,0,0,a7c6a31e5b7af110c861ba07a7795fbcc41db378deead021f902ae7acee4ed3f,2024-08-01T13:57:31.240000
|
||||
CVE-2024-40503,0,0,1b06db37464d646561a96f96e7332cfde7dc7941dce27a6167d21314639debe2,2024-08-01T13:57:32.010000
|
||||
CVE-2024-40505,0,0,7ece9bf9b6c0e4a275d20059391eb5add095153a9e53affa19425b4d1ec16355,2024-08-01T13:57:32.800000
|
||||
@ -255927,7 +255932,7 @@ CVE-2024-40520,0,0,a2ac37b5fe4993386ad0c401ff27a90a4ee5d292a95a31b8ec4196b4a0643
|
||||
CVE-2024-40521,0,0,f750523e60dcc32f0bb9bfafb3982029c7dd27cd5b8886a7de1a46e73ce196a6,2024-07-12T18:44:41.670000
|
||||
CVE-2024-40522,0,0,8a677ab9989e362511bec3e6f4edb768c909d11d73452c70e9694007bb6c7499,2024-08-01T13:57:36.927000
|
||||
CVE-2024-40524,0,0,90f7431206b5ecbb9d18d5d6f346e266df059fa6fac9c7463be67ad7414064c8,2024-08-01T13:57:37.610000
|
||||
CVE-2024-40530,0,0,91e4836dd99d3f6b82d865a52427238f6e6ca425543bbac026388c8a7bed52f2,2024-08-05T16:15:36.750000
|
||||
CVE-2024-40530,0,1,c8fbdd52776a605760f1b609b1cbda9fa0ad90a9f0911e264c274356777f2fcd,2024-08-06T15:35:16.910000
|
||||
CVE-2024-40531,0,0,a616f229fea4a33b63668a7566e870e7dbb2de85bb00283e2d2ae24e3b4f7692,2024-08-05T16:15:36.800000
|
||||
CVE-2024-40535,0,0,4a5d9d0c87f6ae400c205afdbc4f766e452e750a075595a5321b8d7d810f01d1,2024-07-17T13:34:20.520000
|
||||
CVE-2024-40536,0,0,8e08633375577085d9df665f2d62466b3b6eb1ecb2618a56ac5894fb283b7f3f,2024-07-17T13:34:20.520000
|
||||
@ -256160,7 +256165,7 @@ CVE-2024-40948,0,0,dc9a62e9b912dabd72d9488c7b256cd8ebcc0e72fd137118119d1730a13f8
|
||||
CVE-2024-40949,0,0,791b23d5aa5b8f2913b54416c907a4bc6a3427cfe143f82f7d7f99adf28299c3,2024-07-12T16:34:58.687000
|
||||
CVE-2024-4095,0,0,e2a40f44bdf8e372a41806afdce4161562b7b4bb2bcba8f3987036690d2e8184,2024-06-17T12:42:04.623000
|
||||
CVE-2024-40950,0,0,b6979d5e6c063eb00970b540ceafda0becb430ff51009e9e1c48a7255ff5f822,2024-07-12T16:34:58.687000
|
||||
CVE-2024-40951,0,1,15aa8df4b78f7514f02ec97aa813adcc5685b7b49e8bf3041732ce8e88b84a54,2024-08-06T13:29:07.827000
|
||||
CVE-2024-40951,0,0,15aa8df4b78f7514f02ec97aa813adcc5685b7b49e8bf3041732ce8e88b84a54,2024-08-06T13:29:07.827000
|
||||
CVE-2024-40952,0,0,284e20d0c02a4a07f0a633613bf6da63afc1e1864146bd195b56e5c256be8437,2024-07-12T16:34:58.687000
|
||||
CVE-2024-40953,0,0,b95ef29b38cb2bdc14b7d3310e089ce1c53f0ae5a8fac0aff1ea43db998d2aa8,2024-07-12T16:34:58.687000
|
||||
CVE-2024-40954,0,0,6435d77632d64383b2dd408edc2b98ec70827908a39e4fc7f1aeac09bff6b72f,2024-07-12T16:34:58.687000
|
||||
@ -256366,6 +256371,7 @@ CVE-2024-4120,0,0,820754c86895fc4e7f3a6d10baae3c2abd537610acf37474f492c12f46cc8b
|
||||
CVE-2024-41200,0,0,a85b7402470210271e38f3ba19d4d4a4fd58c351c46532db1fedf10c24fdcf89,2024-08-05T17:15:41.750000
|
||||
CVE-2024-4121,0,0,62ca255cdda2e26a7a0224389681466727634cf0831afab2f14e58a1cb5bd920,2024-06-04T19:20:30.460000
|
||||
CVE-2024-4122,0,0,3d81c7d42348f56045cc538515e4a2e136e243adec928773370fb697e11bd281,2024-06-04T19:20:30.560000
|
||||
CVE-2024-41226,1,1,1459fd7132638dd8cee61bd4d8dee7a0776b17d1f6143a7c5ce631058b7c2502,2024-08-06T14:16:04.240000
|
||||
CVE-2024-4123,0,0,b9879b7d0937c162f61c7aeebe9319c3ee0d2290b23cb569d74c82da57c569d5,2024-06-04T19:20:30.660000
|
||||
CVE-2024-4124,0,0,a8707e0967c681f9085483c77f4dbcbac39e7eb8e57f061d5b5c7f920dc545dd,2024-06-04T19:20:30.760000
|
||||
CVE-2024-4125,0,0,16553edd1211e1aa2542535f3455b94ede37886029935c5af09bcd7638ededbf,2024-05-17T02:40:16.937000
|
||||
@ -256487,9 +256493,9 @@ CVE-2024-41671,0,0,246285a77daa13e5014904fc895b261c0c0cff4d8c9ca9cc03eeeb85acc4b
|
||||
CVE-2024-41672,0,0,22d9ca4e03b108f26bbb384eff42397f3ecb90b1b86b629c7d5509df37cbcfd2,2024-07-25T12:36:39.947000
|
||||
CVE-2024-41676,0,0,61be418f160a9962fa96c6561684c479cc1e76f508200bb9c78cde88da1bdcd4,2024-07-29T16:21:52.517000
|
||||
CVE-2024-4168,0,0,7f4f833c88738c683a47d814a058bf8a730868170937a9aca799097bc79bf22f,2024-06-04T19:20:31.690000
|
||||
CVE-2024-41684,0,1,1b960d89046bc8e3eaa12e0c6287bde4affa573a56f4d64d5604ebe07482aab6,2024-08-06T13:25:49.640000
|
||||
CVE-2024-41685,0,1,a068970e4306540ce1cc9df2cfd1edb284bc63da7de6424b24a52ab81b1f3ec4,2024-08-06T12:51:23.760000
|
||||
CVE-2024-41686,0,1,0724427e4fba2566827e14754d55d09ae4da5068fe75928087f7f167ed7545e4,2024-08-06T13:20:05.540000
|
||||
CVE-2024-41684,0,0,1b960d89046bc8e3eaa12e0c6287bde4affa573a56f4d64d5604ebe07482aab6,2024-08-06T13:25:49.640000
|
||||
CVE-2024-41685,0,0,a068970e4306540ce1cc9df2cfd1edb284bc63da7de6424b24a52ab81b1f3ec4,2024-08-06T12:51:23.760000
|
||||
CVE-2024-41686,0,0,0724427e4fba2566827e14754d55d09ae4da5068fe75928087f7f167ed7545e4,2024-08-06T13:20:05.540000
|
||||
CVE-2024-41687,0,0,199fb127145ac44260897a6bcf0117750aa11faaae311cd3b70466837d9741d9,2024-08-05T21:05:30.230000
|
||||
CVE-2024-41688,0,0,e43bf0a8b23358e8a5a87799b640ea50b62cd618df1c5997479a0ac424fb65f0,2024-08-05T21:05:46.433000
|
||||
CVE-2024-41689,0,0,b6e829b3ccc25fd5870e6f72327a9c949de2035a3da497da461ad4ee01aed9c6,2024-08-05T21:05:55.990000
|
||||
@ -256560,6 +256566,9 @@ CVE-2024-41880,0,0,fb22214cf23b63ecac791ad54f65d75460df9fd80fc112c0736bcd80f342f
|
||||
CVE-2024-41881,0,0,649cc07cf7de21549ce70eef1f2f35714a84b1ff95e773c0e75090d3c6d27c2e,2024-08-01T13:59:13.313000
|
||||
CVE-2024-41889,0,0,7d97d05d2c63dbc041e7f27c9d9b9bb900acb0873f026af30a5ea731bc49fe0d,2024-08-05T12:41:45.957000
|
||||
CVE-2024-4190,0,0,937461468fcd73b26e47070e7d0620ac3009210ef2f47e2156f0b87dd1c21bc4,2024-06-13T18:36:09.013000
|
||||
CVE-2024-41910,1,1,7e640313c20313a17fc092448cc354165592e9b1324b77711ce9805ff065499b,2024-08-06T14:16:04.350000
|
||||
CVE-2024-41911,1,1,adafab6049d0c7eb160da0b2310f8f8769d422ad8d0e5cc37547fccc48247692,2024-08-06T14:16:04.427000
|
||||
CVE-2024-41913,1,1,5ed99e4c2b2b2f5b0f40b3380794bef93c8b0e44cfe2d78822359e65f909466d,2024-08-06T14:16:04.480000
|
||||
CVE-2024-41914,0,0,cbc550b915270d7e2f2879c2f4d0216e7f6bd6d1cd3a3c180c2f13327702487c,2024-08-01T13:59:14.250000
|
||||
CVE-2024-41915,0,0,79e27d81a466e27de33128fccf775ada519c090b73b4d198c18c4a0be866e968,2024-08-01T13:59:14.947000
|
||||
CVE-2024-41916,0,0,a0fecd8d5dfc5244c3f03c29349b89d02348a331ee6a39e9fbc76610f4f83ad0,2024-07-31T12:57:02.300000
|
||||
@ -256594,13 +256603,13 @@ CVE-2024-41965,0,0,744da138649373c91e2d5048d78adcc6a9461c3a3df3b2d3193826fb19936
|
||||
CVE-2024-4197,0,0,45da0b07f911473fe59b939894a184bd20b4010bb74cc514ccd6533e9d15c77b,2024-06-25T12:24:17.873000
|
||||
CVE-2024-4198,0,0,10694c0c68dfe4c7db6b33a26dfbe4eb44c2b4223bfed9be5285208f068f86b9,2024-04-26T12:58:17.720000
|
||||
CVE-2024-4199,0,0,fcf36265d6a610d83a178901804339aadd89406ac8a1349d6da6f71c3e13bfe9,2024-05-15T16:40:19.330000
|
||||
CVE-2024-41995,0,0,156b892398ee9eda29e3640460e8ccbfd7be9748436849e4e688199ff4695702,2024-08-06T07:15:46.330000
|
||||
CVE-2024-41995,0,1,f9652060fe1799ba7e0f24d1af0902f010fdc54dcbb58173ba4f59c39fb69c02,2024-08-06T14:35:11.420000
|
||||
CVE-2024-4200,0,0,4cd240b08c44457e11ab7d0e46f05e7d4edddbc268bf54e61982ff7b6b50f3a4,2024-05-15T18:35:11.453000
|
||||
CVE-2024-42007,0,0,e1546757cdc0e5c84d17bb4943631a838464f4ec8f81323b11df4d863b67b3f8,2024-08-01T13:59:16.630000
|
||||
CVE-2024-42008,0,0,7c36b5673366032826436a227180e4306bc4ec6ae9c95aa42e9426014727b43a,2024-08-05T19:15:38.153000
|
||||
CVE-2024-42009,0,0,38a314ddd4cf84005c16e16c9bb71b063dc72948224504de4bc471a8388480ac,2024-08-05T19:15:38.220000
|
||||
CVE-2024-4201,0,0,ee0badf63a3e9c653031fb01c45e3bab9160ffb251dc5a875d128957347bb089,2024-07-18T19:39:50.667000
|
||||
CVE-2024-42010,0,0,5222596d5dde6f3a463b688317aeefa326f97df3fc52b35cf484e6f3460444cb,2024-08-05T19:15:38.273000
|
||||
CVE-2024-42010,0,1,999c9e0a7fa82b335377093255b8c94119526bc623fcb15434cbdb5121ec3c65,2024-08-06T14:35:11.647000
|
||||
CVE-2024-4202,0,0,614a40ef1052d861451b397b9533024f5e9aecccff7f20e945fab06926a9f188,2024-05-15T18:35:11.453000
|
||||
CVE-2024-42029,0,0,b7c83a25bc8a9601f6f3c6ebb603ce94146556b10d1f548176b0b38619ce3b21,2024-08-01T13:59:17.407000
|
||||
CVE-2024-4203,0,0,52cf8a9be62388459acdc9c8c655685172127a00eca72ac9344c4d8920cfc78f,2024-05-02T18:00:37.360000
|
||||
@ -256824,7 +256833,7 @@ CVE-2024-4307,0,0,9af1fe76e1dfb80a8368bbb3fc69b1f2cbb4fca53c0870243e2c9aa4c3d839
|
||||
CVE-2024-4308,0,0,63b73a2fc8e8d5be636a84f19daeea12c1e2d5b3b652e500f77934bf4e894f3b,2024-07-03T02:07:22.320000
|
||||
CVE-2024-4309,0,0,5b40a8fbb2137dd0d77fe6c4c1c586190f4489f813d005ab45d5553c299b0b73,2024-04-30T13:11:16.690000
|
||||
CVE-2024-4310,0,0,08f5e8e76073c3640785934b5dbc198d89dde47497c02b1ac3fc670d20c22fd2,2024-04-30T13:11:16.690000
|
||||
CVE-2024-43114,1,1,0a5da770a0fd17923a50b31df2b87b93a494d344d1174c6f2510e7a063c78459,2024-08-06T13:15:56.130000
|
||||
CVE-2024-43114,0,0,0a5da770a0fd17923a50b31df2b87b93a494d344d1174c6f2510e7a063c78459,2024-08-06T13:15:56.130000
|
||||
CVE-2024-4312,0,0,82451935a132459ec3a52babe511fed0dc0447cacf13fc78eab91e8a5c0d303b,2024-05-14T16:11:39.510000
|
||||
CVE-2024-4313,0,0,04786fcee0b11c58facf347077c0fb8e17faddbc064f2c4dc547a3be70193e4e,2024-06-24T20:01:09.330000
|
||||
CVE-2024-4314,0,0,5b91c731cc96c112e4837604681a355586cd629f1c71449572dfc7eb6fafd4a6,2024-05-14T16:11:39.510000
|
||||
@ -257577,7 +257586,7 @@ CVE-2024-5173,0,0,e808cbd0ff507575dfa32503bcc3a2123c9461298f1a4a4ef8cd294367da64
|
||||
CVE-2024-5176,0,0,095b03ddd1cdcd739bbe8693b41d7d6e416f60f9815e0be55e0b3850508434d9,2024-06-05T15:15:12.620000
|
||||
CVE-2024-5177,0,0,4596ccdb96b84f0f6003dc91187b58acc558e0743564be9aa6ad28db4e46749c,2024-05-24T01:15:30.977000
|
||||
CVE-2024-5178,0,0,bd0c2f144426314e1167d96790d03a45b87cc8b4eeec82d66437d8c03cef924c,2024-07-11T22:15:02.467000
|
||||
CVE-2024-5179,0,1,6961559157b2692b340c3a167eca15cc044aebdebaf78fc359c62b997a6f0a1a,2024-08-06T12:10:17.047000
|
||||
CVE-2024-5179,0,0,6961559157b2692b340c3a167eca15cc044aebdebaf78fc359c62b997a6f0a1a,2024-08-06T12:10:17.047000
|
||||
CVE-2024-5181,0,0,bbf6825e1d5f360a1a58b67dff2bf4d85afbf0a93fef4d4bb8dfd7975bcf0e60,2024-06-26T12:44:29.693000
|
||||
CVE-2024-5182,0,0,11a8026128789bf16c353b6d9ea399398a270fcab4b8a2257261feecaeaad7ff,2024-06-20T12:43:25.663000
|
||||
CVE-2024-5184,0,0,913e376e9213bf80a4ef6a0008bd230beba5d0e3fbd42416956e3dc16ba16e7b,2024-06-18T17:06:20.257000
|
||||
@ -258042,7 +258051,7 @@ CVE-2024-5739,0,0,607ae99ef991c260ab7d753d294117f20a4326531a649cb8963e8228c76ca4
|
||||
CVE-2024-5741,0,0,6d324202e2efceeacccb12535a95801d87a66a1fe04ee84089df7f4c9fe71009,2024-06-17T12:42:04.623000
|
||||
CVE-2024-5742,0,0,fb1a8c1252ee22cc610fe8ff09c119041e84ac15850fc2d3efcf49cef978035c,2024-06-17T12:15:49.850000
|
||||
CVE-2024-5744,0,0,fa6836e3173f8cf048b3a987cfb64279b64d7f456da598f49d9aa4b85f5c51d9,2024-08-01T13:59:58.940000
|
||||
CVE-2024-5745,0,0,cded5ad41ef6333d80951aa3faa1a62096911219d310580ac748c5b446823d1c,2024-06-08T04:15:10.027000
|
||||
CVE-2024-5745,0,1,45e4cce1990a5332f3fc13a691f25e40551bee96d698b0361d8c0089ac80523d,2024-08-06T14:37:59.943000
|
||||
CVE-2024-5746,0,0,08e42433314420a93bea44176cf4cc0a169742251a575020722ab2e02c28ff80,2024-06-21T11:22:01.687000
|
||||
CVE-2024-5750,0,0,476ad6c00a3180d456740d0beb63c2959ea56c746a3fc254c90c1eef52867b01,2024-06-18T14:15:11.383000
|
||||
CVE-2024-5751,0,0,b021056a2386bbaab3004cd237916090181697c8a0e20dfa0ef7d94a29a0eb73,2024-06-27T19:25:12.067000
|
||||
@ -258490,9 +258499,9 @@ CVE-2024-6349,0,0,427eeb1c49748085f9d6a97a6add4281bc215342d4df9759ae2f609f0d24cf
|
||||
CVE-2024-6353,0,0,3e7ee1ed054bc0661b7c1f2f3de9fe2ed8be61a7a777eee50734c66af6748302,2024-07-12T12:49:07.030000
|
||||
CVE-2024-6354,0,0,c9410e2fdcd521ee7fa5aea0abe57bbff6ce1153eea9fc9c27ad647524c61c5c,2024-07-03T02:09:53.917000
|
||||
CVE-2024-6355,0,0,7f4c7fb5a41a7b4cf241f6b370777bf2a8cf0ede73cf75d47093e841c71a69f9,2024-06-27T14:15:16.753000
|
||||
CVE-2024-6357,1,1,7f0a44c49954c810a6542a3e9df960774f17b65963c507c1c78b7fdf4d31fac0,2024-08-06T13:15:56.333000
|
||||
CVE-2024-6358,1,1,03220ab1396339fe8dcd8d6790f519f6f3b95c0d6eb1899b445620248f6862fe,2024-08-06T13:15:56.547000
|
||||
CVE-2024-6359,1,1,e777f6a5c45409a56001ec9fd2341a39f1706acccf77083aafe7f4bee9d73ced,2024-08-06T13:15:56.757000
|
||||
CVE-2024-6357,0,0,7f0a44c49954c810a6542a3e9df960774f17b65963c507c1c78b7fdf4d31fac0,2024-08-06T13:15:56.333000
|
||||
CVE-2024-6358,0,0,03220ab1396339fe8dcd8d6790f519f6f3b95c0d6eb1899b445620248f6862fe,2024-08-06T13:15:56.547000
|
||||
CVE-2024-6359,0,0,e777f6a5c45409a56001ec9fd2341a39f1706acccf77083aafe7f4bee9d73ced,2024-08-06T13:15:56.757000
|
||||
CVE-2024-6361,0,0,36217d2b7a7c7daf2929ff08b5f573bdc0840f10e6c13048ffc771df1bf8fbc1,2024-08-05T19:15:38.333000
|
||||
CVE-2024-6362,0,0,aeb770c7b39ef36db7bd4a49056b449aeba256942be50c6b83f329d15f15257d,2024-08-01T14:00:20.147000
|
||||
CVE-2024-6363,0,0,455979652b8642d7eb5b747949e6f02be3f028b83d7cfc357521a34bb9d7438e,2024-08-01T17:00:53.130000
|
||||
@ -258674,7 +258683,7 @@ CVE-2024-6646,0,0,a88f9e9daa434a5107be71c0c1db1a6acb029566ba77a9e2207d6608da22b1
|
||||
CVE-2024-6647,0,0,09a83ea8e48b51cdfaabb2b40d44883a6e2661cca1813e6ce1c2298d3fc73eb9,2024-08-01T22:15:46.930000
|
||||
CVE-2024-6649,0,0,5cdb5b2e28b9bfeb7fd4f19389db074d98b3a7e19ad14500f164241f41fa57a0,2024-07-11T13:05:54.930000
|
||||
CVE-2024-6650,0,0,389479cac037eb791bf22f3727c10e60384d8e28492bfb0d0b7873c538245d43,2024-07-11T13:05:54.930000
|
||||
CVE-2024-6651,0,0,73d21a9d6fa7c667faf1e0f966ada3c7bf41fc1bd868e7395e05923f19cc233e,2024-08-06T06:15:35.973000
|
||||
CVE-2024-6651,0,1,6126e96ba10c7f0607db09a32b8bf87780fd7c7fe73c54f00cff0f84f3d1347c,2024-08-06T15:35:18.050000
|
||||
CVE-2024-6652,0,0,0923244b6b76f442c47a88150f368b6b9dcb9b0e76b0d2676e50d3c093d67a8a,2024-07-11T13:05:54.930000
|
||||
CVE-2024-6653,0,0,d93d31cbf15b722e8213bd0a1f350049b73a325a73fea026c81bdae5013a3c4f,2024-07-11T13:15:10.147000
|
||||
CVE-2024-6655,0,0,485f585861c9543e180875e8c8a03aa176dd69bb5a21887c98c071d6ec8a6317,2024-07-16T18:00:02.110000
|
||||
@ -258709,7 +258718,7 @@ CVE-2024-6725,0,0,02f518ea588b9f58d1f41a7ee9055d6a87d38c1076b40cf72b33d47960c5f0
|
||||
CVE-2024-6726,0,0,67da9a54e5a829e4300bb2883a5b7a4407d07a460c0b67dc5027c2e9a4f78316,2024-07-30T13:33:30.653000
|
||||
CVE-2024-6727,0,0,9d08fdd347dc87a0df3a4e157904c3068a4121c1538981e1be169dd75a3fc029,2024-07-30T13:33:30.653000
|
||||
CVE-2024-6728,0,0,9abe0a9570ded71226f4ac9c9c5189516c258bbe0afa1c3fa1605041ef7aae25,2024-07-15T13:00:34.853000
|
||||
CVE-2024-6729,0,1,bcb767224deb16bf2afeb05fe1225bef68f4362bc8d1b39fa14ddbd884997e94,2024-08-06T12:15:52.700000
|
||||
CVE-2024-6729,0,0,bcb767224deb16bf2afeb05fe1225bef68f4362bc8d1b39fa14ddbd884997e94,2024-08-06T12:15:52.700000
|
||||
CVE-2024-6730,0,0,ef30d2eb7f24b640da190afcbc16e385d73ab8dd33302ee9e560c4fd64a066a0,2024-07-15T13:00:34.853000
|
||||
CVE-2024-6731,0,0,3927dffd3359d95ae39e41949bb1bae29552ebee68f43b9bd3d899c53faf9d10,2024-08-06T11:16:07.010000
|
||||
CVE-2024-6732,0,0,debc28863268db45526dba3eb35b771205aaa0b4cc3cc7364610e353457afa91,2024-08-06T11:16:07.173000
|
||||
@ -258737,7 +258746,7 @@ CVE-2024-6755,0,0,ab1b630d4d60f43a14793abf6a91e747f24cf32e85dd2f18d0c7fae990d484
|
||||
CVE-2024-6756,0,0,f587e50343ba8d4d9984018181e54a04ca58befeaa1fc8ceb12c6bae56622e09,2024-07-24T12:55:13.223000
|
||||
CVE-2024-6761,0,0,f38b3ccdc89aa0093bd659ba31741817a9ff74cb3bee1ce8404957bf0a35b578,2024-07-29T11:15:10.140000
|
||||
CVE-2024-6765,0,0,582116fb1612a7c43e0b570dc3dd773f185a6bed827d147d00793764d2f2774e,2024-07-17T14:15:04.327000
|
||||
CVE-2024-6766,0,0,4d09ca3b6a9b021ea2575dff9ce754df4830f23a5ddff67ef81a99f1b17fc908,2024-08-06T06:15:36.047000
|
||||
CVE-2024-6766,0,1,ea85e46c6bdb016503e7c85dab4ead46752f60cc6b72afb363a2a1a5825ff0d0,2024-08-06T14:35:12.940000
|
||||
CVE-2024-6770,0,0,4e0dc06a2aaa55c8bf6c7adb0f484fa8776788d11a4220cb3908768a1c995eb7,2024-07-31T12:57:02.300000
|
||||
CVE-2024-6772,0,0,912a2e88fadcae9536686fa2edbaf67f780e09433e7c7b1a77cd2e7a853d1cc4,2024-08-01T14:00:38.260000
|
||||
CVE-2024-6773,0,0,1cc7ee73b86e05dc74bca684f8041d0b5ae20ee7d4c5d09a0a1f363d55d99edd,2024-08-01T14:00:38.483000
|
||||
@ -258904,12 +258913,12 @@ CVE-2024-7168,0,0,910224f79b3b67b053997cba38db0b80d710f3c8549be559cd68336fed4d28
|
||||
CVE-2024-7169,0,0,f5980a4e5d2ccbce4c06d69d429b6969821394672e47084769e90ea39f080d62,2024-07-29T14:12:08.783000
|
||||
CVE-2024-7170,0,0,c911de3ed6eb8f888dabc0e3c5c43c4020953d0677c78f27e334ac1aaf9f28b3,2024-07-29T14:12:08.783000
|
||||
CVE-2024-7171,0,0,f9af9fb0c23fb7b822f7b4be7ea437b892bcf51d425201c5590fc38d73eb9531,2024-07-29T14:12:08.783000
|
||||
CVE-2024-7172,0,1,bf11000a25aa390d844559afe580f0fa7d2d19a89cd008853f409aa8d14dd751,2024-08-06T12:51:40.243000
|
||||
CVE-2024-7173,0,1,6bb8cb47776fd61e45ff0c4670a366d389e4ca60f59d7257e1318c9d7c651362,2024-08-06T12:52:46.230000
|
||||
CVE-2024-7174,0,1,d36abd9cd6510076e70dd71c93b10f1e4d1fed543c9c27e06453ada743b13a00,2024-08-06T13:14:59.030000
|
||||
CVE-2024-7175,0,1,17f9f11ad73b0149cbe68b3610e56dfc726e43ad613a2d806a5692ca7828052c,2024-08-06T12:57:14.623000
|
||||
CVE-2024-7176,0,1,f0ec24b818ba0ff9dd236590bd5667a208b3bab5b5698785324754427c7e3ea5,2024-08-06T12:58:00.850000
|
||||
CVE-2024-7177,0,1,32745634451f9d23649acc91ceb28c69502a441cced914546f92ea612c820689,2024-08-06T13:15:14.603000
|
||||
CVE-2024-7172,0,0,bf11000a25aa390d844559afe580f0fa7d2d19a89cd008853f409aa8d14dd751,2024-08-06T12:51:40.243000
|
||||
CVE-2024-7173,0,0,6bb8cb47776fd61e45ff0c4670a366d389e4ca60f59d7257e1318c9d7c651362,2024-08-06T12:52:46.230000
|
||||
CVE-2024-7174,0,0,d36abd9cd6510076e70dd71c93b10f1e4d1fed543c9c27e06453ada743b13a00,2024-08-06T13:14:59.030000
|
||||
CVE-2024-7175,0,0,17f9f11ad73b0149cbe68b3610e56dfc726e43ad613a2d806a5692ca7828052c,2024-08-06T12:57:14.623000
|
||||
CVE-2024-7176,0,0,f0ec24b818ba0ff9dd236590bd5667a208b3bab5b5698785324754427c7e3ea5,2024-08-06T12:58:00.850000
|
||||
CVE-2024-7177,0,0,32745634451f9d23649acc91ceb28c69502a441cced914546f92ea612c820689,2024-08-06T13:15:14.603000
|
||||
CVE-2024-7178,0,0,52ae2b809c77291d60a9036321df7d8e5ce81e3908bf9bb5c27800ec4dcd8e64,2024-07-29T14:12:08.783000
|
||||
CVE-2024-7179,0,0,65e0f2454d780ae3c2ff2d614aa12167e348369191f0ac2bf926afbe4156da4a,2024-07-29T14:12:08.783000
|
||||
CVE-2024-7180,0,0,04e3dd812b22b1656218c3dd237532ed09069916c415498e7f349131a50802ae,2024-07-29T14:12:08.783000
|
||||
@ -258940,12 +258949,12 @@ CVE-2024-7205,0,0,f8b1cbec46ea51b223aac866d1ac39ee6fa7b6e832e6e62020df5a45e4b006
|
||||
CVE-2024-7208,0,0,23976b9c97cfc390397ceda1fa9cd6b5d178a3b311c11fb9c9f129febf7d4e73,2024-08-02T15:16:37.420000
|
||||
CVE-2024-7209,0,0,70d88ede2ff174d67b44db29b9d64c217e00f13cf62689936f75e53f7397ee7a,2024-07-31T12:57:02.300000
|
||||
CVE-2024-7211,0,0,f7cf1e82b08ec7fe9f4242ffeab1b87d553af7021ef2a87240fdd9ca70a1801c,2024-08-02T13:16:06.853000
|
||||
CVE-2024-7212,0,0,d85ae600c31799294f18b9bdf208b413cec392bb78df4aac4443ee1d547655fa,2024-07-30T13:32:45.943000
|
||||
CVE-2024-7213,0,0,f43e3a4d574beb5f0357466024a5b7d0acc9d943f364ba7f1706d9b4e0614f61,2024-07-30T13:32:45.943000
|
||||
CVE-2024-7214,0,0,cf0ff9b3c048cd8fe1cbe27d866836b45cf6f395e7f604068bddd4880fe6e623,2024-07-30T13:32:45.943000
|
||||
CVE-2024-7215,0,0,19cb74dd169a2c0adddcb9f3b1359dd5ec8b4cb73285f81c84c895b0918569f3,2024-07-30T13:32:45.943000
|
||||
CVE-2024-7216,0,0,06cb7fdb9eba9a4918c738c6ef004796ad0e05a3d2a825c6eaa07e4a67d42660,2024-07-30T13:32:45.943000
|
||||
CVE-2024-7217,0,1,7e7819767ae3464765ef049cf303542c287ee1345ab7dba2b9a6e7c05c9c0062,2024-08-06T13:54:06.807000
|
||||
CVE-2024-7212,0,1,d8e81c1df21541a2a61b1ee61c0b13c7c5575d5a7c0cad80faa94c0502ea9af9,2024-08-06T14:06:56.937000
|
||||
CVE-2024-7213,0,1,91cf0399575fcf8bfe7dc21faeb9bce09b9c6ac55860924943cc84f28093279f,2024-08-06T14:07:30.757000
|
||||
CVE-2024-7214,0,1,3a78281a383bf44c352cba681f12759123f996c9d59985652a6e46e161f7ed5e,2024-08-06T14:08:05.393000
|
||||
CVE-2024-7215,0,1,1ccd67c4053d473d76bae939b895612b63aea586e844e49a089165eb2effbb7c,2024-08-06T14:20:22.733000
|
||||
CVE-2024-7216,0,1,235180a54ea7f2ef077cfee27bcc7d839591542d508b94dc70e3dbb3739843eb,2024-08-06T14:28:51.927000
|
||||
CVE-2024-7217,0,0,7e7819767ae3464765ef049cf303542c287ee1345ab7dba2b9a6e7c05c9c0062,2024-08-06T13:54:06.807000
|
||||
CVE-2024-7218,0,0,5d0054c3fdbf03d2b2f068cbdbe6251db2dbd2a118324c2439603e07b3cc1979,2024-07-30T13:32:45.943000
|
||||
CVE-2024-7219,0,0,7e68d9931944536c53759c49211464ac06490e908e53e029d7404aa622e5549d,2024-07-30T13:32:45.943000
|
||||
CVE-2024-7220,0,0,5720c21291c5d0d772a794164cf0868f04ecdd497da40613327c3e7f8460872e,2024-07-30T13:32:45.943000
|
||||
@ -259043,7 +259052,7 @@ CVE-2024-7375,0,0,34e1bd107d2aecd6493421c4d3ab7a413fcec3731eb80185a4092f9ab654b1
|
||||
CVE-2024-7376,0,0,13c26267c4eb798d77a069115917b306a73c1051ac2cdd324720ad494f5f9add,2024-08-02T12:59:43.990000
|
||||
CVE-2024-7377,0,0,893275c8bb4a238cbfa8084a52310ea354a964d2355f34b461a91167cae84e43,2024-08-02T12:59:43.990000
|
||||
CVE-2024-7378,0,0,e031589c928455427b120173a422978fb12eba7655a2c6ad16165b36bee1f758,2024-08-02T12:59:43.990000
|
||||
CVE-2024-7383,0,0,8f160a1f5dcd9aa7ab86d2b4338288903362cf3c722e57113d2c7dd4e0acbc65,2024-08-05T14:15:35.130000
|
||||
CVE-2024-7383,0,1,ad4b02f8256cef8377261caf01ecafd578896b81cb7387e69b1622049d5408d4,2024-08-06T15:15:42.053000
|
||||
CVE-2024-7389,0,0,a5776290ae762be985431158def3f2d002b265ca6a95ce830d8f46206854f21a,2024-08-02T12:59:43.990000
|
||||
CVE-2024-7395,0,0,e06fe4d153dceb3a090350ac3c99eb11a5eab3636b8f17750ef2d5462b4a0530,2024-08-05T14:15:35.483000
|
||||
CVE-2024-7396,0,0,431a473e4f904546e17491bab2f9b1f68dbcc31eb95914f3ee1af5edf48452d3,2024-08-05T14:15:35.603000
|
||||
@ -259091,20 +259100,20 @@ CVE-2024-7499,0,0,fa466cc6c096c43b53afcea4eeed2aa00cfe03fa9d1fcaf27af1880791fed5
|
||||
CVE-2024-7500,0,0,5356987616ec53de8501f122a56ff58b8880556a3bec91f135a4cc8721caf5ce,2024-08-06T04:16:47.290000
|
||||
CVE-2024-7505,0,0,0fed448836399741239c60dad8ffe115725cd14b95fa297f3cc9afa862fb3171,2024-08-06T04:16:47.857000
|
||||
CVE-2024-7506,0,0,a716f33086cbe8664caa26445b5328b898f9ff087701d0ce048bc50b0e6ffeb8,2024-08-06T05:15:41.413000
|
||||
CVE-2024-7518,1,1,94be60491c9746dbdb16571786c4349fc86267ca1462229f1300916f0483107a,2024-08-06T13:15:56.970000
|
||||
CVE-2024-7519,1,1,e88f3f8a85d9ae2553126e26bb669bef93c95a3eedec840af737c3d1134edac1,2024-08-06T13:15:57.040000
|
||||
CVE-2024-7520,1,1,6680739995f7d2a3f78deabfb204791061ee70cbfe60d502f5317460e630fde2,2024-08-06T13:15:57.107000
|
||||
CVE-2024-7521,1,1,b84dee931c60a9429ca02e821575a4be568b84ccc15abd6f3440cdcded827a8c,2024-08-06T13:15:57.167000
|
||||
CVE-2024-7522,1,1,7320e110232d4204cf160c1a74f2837aaf54c219edc44766282941c0fabadd0f,2024-08-06T13:15:57.237000
|
||||
CVE-2024-7523,1,1,7a415d7b8bcc7ced5780da1a0c42d5a7d33035b6df26177c67f8ff68390c7520,2024-08-06T13:15:57.297000
|
||||
CVE-2024-7524,1,1,bc6ee61d57e85a8865199dd95a6dcba05f760025fc7f1efa03f773069af10cf2,2024-08-06T13:15:57.357000
|
||||
CVE-2024-7525,1,1,58ceb789cf8f9603674d6deb5b00a1918f90bfe7801a82b16ccf5221dde19622,2024-08-06T13:15:57.420000
|
||||
CVE-2024-7526,1,1,2945e010b9d3fc561759077d77bf0778898bb54ef7c04098460b61baf34cbc57,2024-08-06T13:15:57.483000
|
||||
CVE-2024-7527,1,1,635d9a4e465d05d55df4c38de27a7811daf4626d41281cb4b9bbb450ff39853d,2024-08-06T13:15:57.543000
|
||||
CVE-2024-7528,1,1,39373d362f5e4f545251a1de7a3b3494efbb84d183a6e2fa4edeaa4da34cbc78,2024-08-06T13:15:57.600000
|
||||
CVE-2024-7529,1,1,eac83591a5cf68566fdc662230f0eef4ad40e402a7fee7bd8b8c7955eee32ab1,2024-08-06T13:15:57.657000
|
||||
CVE-2024-7530,1,1,23ed4db63a2a8ef5b15c39a1b54b35b4be482b2a9c778fefa1675c316a52cd60,2024-08-06T13:15:57.723000
|
||||
CVE-2024-7531,1,1,023a8288dcdad02eeaa1918d46f22f961613e847da9fd0fc169deb0fa3e444fc,2024-08-06T13:15:57.787000
|
||||
CVE-2024-7518,0,0,94be60491c9746dbdb16571786c4349fc86267ca1462229f1300916f0483107a,2024-08-06T13:15:56.970000
|
||||
CVE-2024-7519,0,0,e88f3f8a85d9ae2553126e26bb669bef93c95a3eedec840af737c3d1134edac1,2024-08-06T13:15:57.040000
|
||||
CVE-2024-7520,0,0,6680739995f7d2a3f78deabfb204791061ee70cbfe60d502f5317460e630fde2,2024-08-06T13:15:57.107000
|
||||
CVE-2024-7521,0,1,b9765f228a24bde117657d7e00d8495683341470030c93842b4946737404b444,2024-08-06T14:35:13.910000
|
||||
CVE-2024-7522,0,0,7320e110232d4204cf160c1a74f2837aaf54c219edc44766282941c0fabadd0f,2024-08-06T13:15:57.237000
|
||||
CVE-2024-7523,0,0,7a415d7b8bcc7ced5780da1a0c42d5a7d33035b6df26177c67f8ff68390c7520,2024-08-06T13:15:57.297000
|
||||
CVE-2024-7524,0,0,bc6ee61d57e85a8865199dd95a6dcba05f760025fc7f1efa03f773069af10cf2,2024-08-06T13:15:57.357000
|
||||
CVE-2024-7525,0,0,58ceb789cf8f9603674d6deb5b00a1918f90bfe7801a82b16ccf5221dde19622,2024-08-06T13:15:57.420000
|
||||
CVE-2024-7526,0,0,2945e010b9d3fc561759077d77bf0778898bb54ef7c04098460b61baf34cbc57,2024-08-06T13:15:57.483000
|
||||
CVE-2024-7527,0,0,635d9a4e465d05d55df4c38de27a7811daf4626d41281cb4b9bbb450ff39853d,2024-08-06T13:15:57.543000
|
||||
CVE-2024-7528,0,0,39373d362f5e4f545251a1de7a3b3494efbb84d183a6e2fa4edeaa4da34cbc78,2024-08-06T13:15:57.600000
|
||||
CVE-2024-7529,0,1,55a360ab13a72c30d4892f1f1634ff194cf06f004b6de6c95a16ee1585e15a39,2024-08-06T14:35:14.733000
|
||||
CVE-2024-7530,0,0,23ed4db63a2a8ef5b15c39a1b54b35b4be482b2a9c778fefa1675c316a52cd60,2024-08-06T13:15:57.723000
|
||||
CVE-2024-7531,0,0,023a8288dcdad02eeaa1918d46f22f961613e847da9fd0fc169deb0fa3e444fc,2024-08-06T13:15:57.787000
|
||||
CVE-2024-7537,0,0,2754597430b3398e50bf24aaa7d39e994c224c64952debab317f017a960bcb01,2024-08-06T00:15:34.653000
|
||||
CVE-2024-7538,0,0,de29220cb377045c0459deaf6b69adeedda6f13b07a14f613cf81f8acd6354c8,2024-08-06T00:15:34.860000
|
||||
CVE-2024-7539,0,0,eb9af53992225ab47d134bb6cf4c86798ffb792c4ea15fadf5eeb8e0c362f9fd,2024-08-06T00:15:35.053000
|
||||
@ -259116,4 +259125,5 @@ CVE-2024-7544,0,0,080b0de39e8c8f2e6af2eaa3b14006dc3040de641ae6c032803cbfcd66ecd2
|
||||
CVE-2024-7545,0,0,573a5b23c77789a8b3edf118a7d564b619d6c9f61267341b46eaf87deada162c,2024-08-06T00:15:36.247000
|
||||
CVE-2024-7546,0,0,07ae86c51ff9b6287b4773e81c46673e6fef7a1f35d7346bf06ddaef956f485d,2024-08-06T00:15:36.450000
|
||||
CVE-2024-7547,0,0,b727ccd37ef13a960fd8492a150c0deba10508cd85a9c0f2241c9f7ddc1a02e9,2024-08-06T00:15:36.637000
|
||||
CVE-2024-7551,1,1,91e8e42faad68d533415ce39135290191a39b000131091c58c5bab8d2477b228,2024-08-06T13:15:57.850000
|
||||
CVE-2024-7551,0,0,91e8e42faad68d533415ce39135290191a39b000131091c58c5bab8d2477b228,2024-08-06T13:15:57.850000
|
||||
CVE-2024-7552,1,1,76e0dc4890ca9781c0460d2c9fe02ed3b01e46558b8ff80251dbb3da987b8420,2024-08-06T15:15:42.297000
|
||||
|
Can't render this file because it is too large.
|
Loading…
x
Reference in New Issue
Block a user