mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-06-19 17:31:42 +00:00
Auto-Update: 2024-08-28T22:00:17.522415+00:00
This commit is contained in:
parent
4bbe8b0f33
commit
fc8df9596f
@ -2,7 +2,7 @@
|
|||||||
"id": "CVE-2022-23086",
|
"id": "CVE-2022-23086",
|
||||||
"sourceIdentifier": "secteam@freebsd.org",
|
"sourceIdentifier": "secteam@freebsd.org",
|
||||||
"published": "2024-02-15T05:15:09.273",
|
"published": "2024-02-15T05:15:09.273",
|
||||||
"lastModified": "2024-04-19T07:15:08.670",
|
"lastModified": "2024-08-28T20:35:00.763",
|
||||||
"vulnStatus": "Awaiting Analysis",
|
"vulnStatus": "Awaiting Analysis",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
@ -15,7 +15,42 @@
|
|||||||
"value": "Los controladores para *_CFG_PAGE lectura/escritura ioctls en los controladores mpr, mps y mpt asignaron un b\u00fafer de un tama\u00f1o especificado por la persona que llama, pero copiaron en \u00e9l un encabezado de tama\u00f1o fijo. Otro contenido del mont\u00f3n se sobrescribir\u00eda si el tama\u00f1o especificado fuera demasiado peque\u00f1o. Los usuarios con acceso al nodo del dispositivo mpr, mps o mpt pueden sobrescribir los datos del mont\u00f3n, lo que podr\u00eda provocar una escalada de privilegios. Tenga en cuenta que solo el usuario ra\u00edz y los miembros del grupo de operadores pueden acceder al nodo del dispositivo."
|
"value": "Los controladores para *_CFG_PAGE lectura/escritura ioctls en los controladores mpr, mps y mpt asignaron un b\u00fafer de un tama\u00f1o especificado por la persona que llama, pero copiaron en \u00e9l un encabezado de tama\u00f1o fijo. Otro contenido del mont\u00f3n se sobrescribir\u00eda si el tama\u00f1o especificado fuera demasiado peque\u00f1o. Los usuarios con acceso al nodo del dispositivo mpr, mps o mpt pueden sobrescribir los datos del mont\u00f3n, lo que podr\u00eda provocar una escalada de privilegios. Tenga en cuenta que solo el usuario ra\u00edz y los miembros del grupo de operadores pueden acceder al nodo del dispositivo."
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"metrics": {},
|
"metrics": {
|
||||||
|
"cvssMetricV31": [
|
||||||
|
{
|
||||||
|
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||||
|
"type": "Secondary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||||
|
"attackVector": "NETWORK",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "NONE",
|
||||||
|
"userInteraction": "NONE",
|
||||||
|
"scope": "UNCHANGED",
|
||||||
|
"confidentialityImpact": "HIGH",
|
||||||
|
"integrityImpact": "HIGH",
|
||||||
|
"availabilityImpact": "HIGH",
|
||||||
|
"baseScore": 9.8,
|
||||||
|
"baseSeverity": "CRITICAL"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 3.9,
|
||||||
|
"impactScore": 5.9
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"weaknesses": [
|
||||||
|
{
|
||||||
|
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||||
|
"type": "Secondary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-122"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
"references": [
|
"references": [
|
||||||
{
|
{
|
||||||
"url": "https://security.freebsd.org/advisories/FreeBSD-SA-22:06.ioctl.asc",
|
"url": "https://security.freebsd.org/advisories/FreeBSD-SA-22:06.ioctl.asc",
|
||||||
|
@ -2,8 +2,8 @@
|
|||||||
"id": "CVE-2022-33162",
|
"id": "CVE-2022-33162",
|
||||||
"sourceIdentifier": "psirt@us.ibm.com",
|
"sourceIdentifier": "psirt@us.ibm.com",
|
||||||
"published": "2024-08-16T19:15:06.213",
|
"published": "2024-08-16T19:15:06.213",
|
||||||
"lastModified": "2024-08-19T13:00:23.117",
|
"lastModified": "2024-08-28T21:50:06.957",
|
||||||
"vulnStatus": "Undergoing Analysis",
|
"vulnStatus": "Analyzed",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
@ -17,6 +17,26 @@
|
|||||||
],
|
],
|
||||||
"metrics": {
|
"metrics": {
|
||||||
"cvssMetricV31": [
|
"cvssMetricV31": [
|
||||||
|
{
|
||||||
|
"source": "nvd@nist.gov",
|
||||||
|
"type": "Primary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||||
|
"attackVector": "NETWORK",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "NONE",
|
||||||
|
"userInteraction": "NONE",
|
||||||
|
"scope": "UNCHANGED",
|
||||||
|
"confidentialityImpact": "HIGH",
|
||||||
|
"integrityImpact": "HIGH",
|
||||||
|
"availabilityImpact": "HIGH",
|
||||||
|
"baseScore": 9.8,
|
||||||
|
"baseSeverity": "CRITICAL"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 3.9,
|
||||||
|
"impactScore": 5.9
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"source": "psirt@us.ibm.com",
|
"source": "psirt@us.ibm.com",
|
||||||
"type": "Secondary",
|
"type": "Secondary",
|
||||||
@ -41,8 +61,18 @@
|
|||||||
},
|
},
|
||||||
"weaknesses": [
|
"weaknesses": [
|
||||||
{
|
{
|
||||||
"source": "psirt@us.ibm.com",
|
"source": "nvd@nist.gov",
|
||||||
"type": "Primary",
|
"type": "Primary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "NVD-CWE-noinfo"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"source": "psirt@us.ibm.com",
|
||||||
|
"type": "Secondary",
|
||||||
"description": [
|
"description": [
|
||||||
{
|
{
|
||||||
"lang": "en",
|
"lang": "en",
|
||||||
@ -51,14 +81,42 @@
|
|||||||
]
|
]
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"references": [
|
"configurations": [
|
||||||
{
|
{
|
||||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/228570",
|
"nodes": [
|
||||||
"source": "psirt@us.ibm.com"
|
{
|
||||||
|
"operator": "OR",
|
||||||
|
"negate": false,
|
||||||
|
"cpeMatch": [
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:a:ibm:security_directory_integrator:7.2.0:*:*:*:*:*:*:*",
|
||||||
|
"matchCriteriaId": "65A1A95C-1687-4304-88C5-1BEB58BBC8DF"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"url": "https://www.ibm.com/support/pages/node/7161442",
|
"vulnerable": true,
|
||||||
"source": "psirt@us.ibm.com"
|
"criteria": "cpe:2.3:a:ibm:security_verify_directory_integrator:10.0.0:*:*:*:*:*:*:*",
|
||||||
|
"matchCriteriaId": "76B2C187-CEC8-4991-94E2-058B6584A40A"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/228570",
|
||||||
|
"source": "psirt@us.ibm.com",
|
||||||
|
"tags": [
|
||||||
|
"VDB Entry"
|
||||||
|
]
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://www.ibm.com/support/pages/node/7161442",
|
||||||
|
"source": "psirt@us.ibm.com",
|
||||||
|
"tags": [
|
||||||
|
"Vendor Advisory"
|
||||||
|
]
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
@ -2,7 +2,7 @@
|
|||||||
"id": "CVE-2022-46497",
|
"id": "CVE-2022-46497",
|
||||||
"sourceIdentifier": "cve@mitre.org",
|
"sourceIdentifier": "cve@mitre.org",
|
||||||
"published": "2024-03-07T09:15:37.970",
|
"published": "2024-03-07T09:15:37.970",
|
||||||
"lastModified": "2024-03-07T13:52:27.110",
|
"lastModified": "2024-08-28T21:35:00.797",
|
||||||
"vulnStatus": "Awaiting Analysis",
|
"vulnStatus": "Awaiting Analysis",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
@ -15,7 +15,42 @@
|
|||||||
"value": "Se descubri\u00f3 que Hospital Management System 1.0 conten\u00eda una vulnerabilidad de inyecci\u00f3n SQL a trav\u00e9s del par\u00e1metro pat_number en his_doc_view_single_patien.php."
|
"value": "Se descubri\u00f3 que Hospital Management System 1.0 conten\u00eda una vulnerabilidad de inyecci\u00f3n SQL a trav\u00e9s del par\u00e1metro pat_number en his_doc_view_single_patien.php."
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"metrics": {},
|
"metrics": {
|
||||||
|
"cvssMetricV31": [
|
||||||
|
{
|
||||||
|
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||||
|
"type": "Secondary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N",
|
||||||
|
"attackVector": "NETWORK",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "LOW",
|
||||||
|
"userInteraction": "NONE",
|
||||||
|
"scope": "UNCHANGED",
|
||||||
|
"confidentialityImpact": "HIGH",
|
||||||
|
"integrityImpact": "HIGH",
|
||||||
|
"availabilityImpact": "NONE",
|
||||||
|
"baseScore": 8.1,
|
||||||
|
"baseSeverity": "HIGH"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 2.8,
|
||||||
|
"impactScore": 5.2
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"weaknesses": [
|
||||||
|
{
|
||||||
|
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||||
|
"type": "Secondary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-89"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
"references": [
|
"references": [
|
||||||
{
|
{
|
||||||
"url": "https://github.com/ASR511-OO7/CVE-2022-46497/blob/main/CVE-33",
|
"url": "https://github.com/ASR511-OO7/CVE-2022-46497/blob/main/CVE-33",
|
||||||
|
@ -2,7 +2,7 @@
|
|||||||
"id": "CVE-2023-42873",
|
"id": "CVE-2023-42873",
|
||||||
"sourceIdentifier": "product-security@apple.com",
|
"sourceIdentifier": "product-security@apple.com",
|
||||||
"published": "2024-02-21T07:15:49.997",
|
"published": "2024-02-21T07:15:49.997",
|
||||||
"lastModified": "2024-02-22T19:07:27.197",
|
"lastModified": "2024-08-28T20:35:03.950",
|
||||||
"vulnStatus": "Awaiting Analysis",
|
"vulnStatus": "Awaiting Analysis",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
@ -15,7 +15,30 @@
|
|||||||
"value": "El problema se solucion\u00f3 con comprobaciones de los l\u00edmites mejoradas. Este problema se solucion\u00f3 en macOS Sonoma 14.1, tvOS 17.1, macOS Monterey 12.7.1, iOS 16.7.2 y iPadOS 16.7.2, iOS 17.1 y iPadOS 17.1, macOS Ventura 13.6.1. Una aplicaci\u00f3n puede ejecutar c\u00f3digo arbitrario con privilegios del kernel."
|
"value": "El problema se solucion\u00f3 con comprobaciones de los l\u00edmites mejoradas. Este problema se solucion\u00f3 en macOS Sonoma 14.1, tvOS 17.1, macOS Monterey 12.7.1, iOS 16.7.2 y iPadOS 16.7.2, iOS 17.1 y iPadOS 17.1, macOS Ventura 13.6.1. Una aplicaci\u00f3n puede ejecutar c\u00f3digo arbitrario con privilegios del kernel."
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"metrics": {},
|
"metrics": {
|
||||||
|
"cvssMetricV31": [
|
||||||
|
{
|
||||||
|
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||||
|
"type": "Secondary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||||
|
"attackVector": "LOCAL",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "LOW",
|
||||||
|
"userInteraction": "NONE",
|
||||||
|
"scope": "UNCHANGED",
|
||||||
|
"confidentialityImpact": "HIGH",
|
||||||
|
"integrityImpact": "HIGH",
|
||||||
|
"availabilityImpact": "HIGH",
|
||||||
|
"baseScore": 7.8,
|
||||||
|
"baseSeverity": "HIGH"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 1.8,
|
||||||
|
"impactScore": 5.9
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
"references": [
|
"references": [
|
||||||
{
|
{
|
||||||
"url": "https://support.apple.com/en-us/HT213981",
|
"url": "https://support.apple.com/en-us/HT213981",
|
||||||
|
@ -2,8 +2,8 @@
|
|||||||
"id": "CVE-2023-47728",
|
"id": "CVE-2023-47728",
|
||||||
"sourceIdentifier": "psirt@us.ibm.com",
|
"sourceIdentifier": "psirt@us.ibm.com",
|
||||||
"published": "2024-08-16T20:15:09.780",
|
"published": "2024-08-16T20:15:09.780",
|
||||||
"lastModified": "2024-08-19T13:00:23.117",
|
"lastModified": "2024-08-28T21:40:55.593",
|
||||||
"vulnStatus": "Undergoing Analysis",
|
"vulnStatus": "Analyzed",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
@ -17,6 +17,26 @@
|
|||||||
],
|
],
|
||||||
"metrics": {
|
"metrics": {
|
||||||
"cvssMetricV31": [
|
"cvssMetricV31": [
|
||||||
|
{
|
||||||
|
"source": "nvd@nist.gov",
|
||||||
|
"type": "Primary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
|
||||||
|
"attackVector": "NETWORK",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "NONE",
|
||||||
|
"userInteraction": "NONE",
|
||||||
|
"scope": "UNCHANGED",
|
||||||
|
"confidentialityImpact": "HIGH",
|
||||||
|
"integrityImpact": "NONE",
|
||||||
|
"availabilityImpact": "NONE",
|
||||||
|
"baseScore": 7.5,
|
||||||
|
"baseSeverity": "HIGH"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 3.9,
|
||||||
|
"impactScore": 3.6
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"source": "psirt@us.ibm.com",
|
"source": "psirt@us.ibm.com",
|
||||||
"type": "Secondary",
|
"type": "Secondary",
|
||||||
@ -51,14 +71,46 @@
|
|||||||
]
|
]
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"references": [
|
"configurations": [
|
||||||
{
|
{
|
||||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/272201",
|
"nodes": [
|
||||||
"source": "psirt@us.ibm.com"
|
{
|
||||||
|
"operator": "OR",
|
||||||
|
"negate": false,
|
||||||
|
"cpeMatch": [
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:a:ibm:cloud_pak_for_security:*:*:*:*:*:*:*:*",
|
||||||
|
"versionStartIncluding": "1.10.0.0",
|
||||||
|
"versionEndIncluding": "1.10.11.0",
|
||||||
|
"matchCriteriaId": "8FA89838-3E05-4778-9323-DE51CC10FD18"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"url": "https://www.ibm.com/support/pages/node/7161427",
|
"vulnerable": true,
|
||||||
"source": "psirt@us.ibm.com"
|
"criteria": "cpe:2.3:a:ibm:qradar_suite:*:*:*:*:*:*:*:*",
|
||||||
|
"versionStartIncluding": "1.10.12.0",
|
||||||
|
"versionEndExcluding": "1.10.23.0",
|
||||||
|
"matchCriteriaId": "4E1101FE-F579-4869-BFFD-6383D0F9C6A6"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/272201",
|
||||||
|
"source": "psirt@us.ibm.com",
|
||||||
|
"tags": [
|
||||||
|
"Broken Link"
|
||||||
|
]
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://www.ibm.com/support/pages/node/7161427",
|
||||||
|
"source": "psirt@us.ibm.com",
|
||||||
|
"tags": [
|
||||||
|
"Vendor Advisory"
|
||||||
|
]
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
@ -2,7 +2,7 @@
|
|||||||
"id": "CVE-2023-49543",
|
"id": "CVE-2023-49543",
|
||||||
"sourceIdentifier": "cve@mitre.org",
|
"sourceIdentifier": "cve@mitre.org",
|
||||||
"published": "2024-03-01T22:15:47.640",
|
"published": "2024-03-01T22:15:47.640",
|
||||||
"lastModified": "2024-03-01T22:22:25.913",
|
"lastModified": "2024-08-28T20:35:04.473",
|
||||||
"vulnStatus": "Awaiting Analysis",
|
"vulnStatus": "Awaiting Analysis",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
@ -15,7 +15,42 @@
|
|||||||
"value": "El control de acceso incorrecto en Book Store Management System v1 permite a los atacantes acceder a p\u00e1ginas no autorizadas y ejecutar funciones administrativas sin autenticarse."
|
"value": "El control de acceso incorrecto en Book Store Management System v1 permite a los atacantes acceder a p\u00e1ginas no autorizadas y ejecutar funciones administrativas sin autenticarse."
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"metrics": {},
|
"metrics": {
|
||||||
|
"cvssMetricV31": [
|
||||||
|
{
|
||||||
|
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||||
|
"type": "Secondary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||||
|
"attackVector": "NETWORK",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "NONE",
|
||||||
|
"userInteraction": "NONE",
|
||||||
|
"scope": "UNCHANGED",
|
||||||
|
"confidentialityImpact": "HIGH",
|
||||||
|
"integrityImpact": "HIGH",
|
||||||
|
"availabilityImpact": "HIGH",
|
||||||
|
"baseScore": 9.8,
|
||||||
|
"baseSeverity": "CRITICAL"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 3.9,
|
||||||
|
"impactScore": 5.9
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"weaknesses": [
|
||||||
|
{
|
||||||
|
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||||
|
"type": "Secondary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-284"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
"references": [
|
"references": [
|
||||||
{
|
{
|
||||||
"url": "https://github.com/geraldoalcantara/CVE-2023-49543",
|
"url": "https://github.com/geraldoalcantara/CVE-2023-49543",
|
||||||
|
@ -2,7 +2,7 @@
|
|||||||
"id": "CVE-2023-51835",
|
"id": "CVE-2023-51835",
|
||||||
"sourceIdentifier": "cve@mitre.org",
|
"sourceIdentifier": "cve@mitre.org",
|
||||||
"published": "2024-02-29T01:42:05.830",
|
"published": "2024-02-29T01:42:05.830",
|
||||||
"lastModified": "2024-02-29T13:49:47.277",
|
"lastModified": "2024-08-28T20:35:05.240",
|
||||||
"vulnStatus": "Awaiting Analysis",
|
"vulnStatus": "Awaiting Analysis",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
@ -15,7 +15,42 @@
|
|||||||
"value": "Un problema en TRENDnet TEW-822DRE v.1.03B02 permite a un atacante local ejecutar c\u00f3digo arbitrario a trav\u00e9s de los par\u00e1metros ipv4_ping en /boafrm/formSystemCheck."
|
"value": "Un problema en TRENDnet TEW-822DRE v.1.03B02 permite a un atacante local ejecutar c\u00f3digo arbitrario a trav\u00e9s de los par\u00e1metros ipv4_ping en /boafrm/formSystemCheck."
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"metrics": {},
|
"metrics": {
|
||||||
|
"cvssMetricV31": [
|
||||||
|
{
|
||||||
|
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||||
|
"type": "Secondary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
|
||||||
|
"attackVector": "ADJACENT_NETWORK",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "HIGH",
|
||||||
|
"userInteraction": "NONE",
|
||||||
|
"scope": "UNCHANGED",
|
||||||
|
"confidentialityImpact": "HIGH",
|
||||||
|
"integrityImpact": "HIGH",
|
||||||
|
"availabilityImpact": "HIGH",
|
||||||
|
"baseScore": 6.8,
|
||||||
|
"baseSeverity": "MEDIUM"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 0.9,
|
||||||
|
"impactScore": 5.9
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"weaknesses": [
|
||||||
|
{
|
||||||
|
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||||
|
"type": "Secondary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-77"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
"references": [
|
"references": [
|
||||||
{
|
{
|
||||||
"url": "https://warp-desk-89d.notion.site/TEW-822DRE-5289eb95796749c2878843519ab451d8",
|
"url": "https://warp-desk-89d.notion.site/TEW-822DRE-5289eb95796749c2878843519ab451d8",
|
||||||
|
@ -2,7 +2,7 @@
|
|||||||
"id": "CVE-2024-1174",
|
"id": "CVE-2024-1174",
|
||||||
"sourceIdentifier": "hp-security-alert@hp.com",
|
"sourceIdentifier": "hp-security-alert@hp.com",
|
||||||
"published": "2024-03-01T20:15:47.213",
|
"published": "2024-03-01T20:15:47.213",
|
||||||
"lastModified": "2024-03-01T22:22:25.913",
|
"lastModified": "2024-08-28T21:35:03.473",
|
||||||
"vulnStatus": "Awaiting Analysis",
|
"vulnStatus": "Awaiting Analysis",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
@ -15,7 +15,30 @@
|
|||||||
"value": "Las versiones anteriores de HP ThinPro (anteriores a HP ThinPro 8.0 SP 8) podr\u00edan contener vulnerabilidades de seguridad. HP lanz\u00f3 HP ThinPro 8.0 SP 8, que incluye actualizaciones para mitigar posibles vulnerabilidades."
|
"value": "Las versiones anteriores de HP ThinPro (anteriores a HP ThinPro 8.0 SP 8) podr\u00edan contener vulnerabilidades de seguridad. HP lanz\u00f3 HP ThinPro 8.0 SP 8, que incluye actualizaciones para mitigar posibles vulnerabilidades."
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"metrics": {},
|
"metrics": {
|
||||||
|
"cvssMetricV31": [
|
||||||
|
{
|
||||||
|
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||||
|
"type": "Secondary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:H",
|
||||||
|
"attackVector": "LOCAL",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "LOW",
|
||||||
|
"userInteraction": "REQUIRED",
|
||||||
|
"scope": "CHANGED",
|
||||||
|
"confidentialityImpact": "HIGH",
|
||||||
|
"integrityImpact": "HIGH",
|
||||||
|
"availabilityImpact": "HIGH",
|
||||||
|
"baseScore": 8.2,
|
||||||
|
"baseSeverity": "HIGH"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 1.5,
|
||||||
|
"impactScore": 6.0
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
"references": [
|
"references": [
|
||||||
{
|
{
|
||||||
"url": "https://support.hp.com/us-en/document/ish_10232639-10232671-16/hpsbhf03919",
|
"url": "https://support.hp.com/us-en/document/ish_10232639-10232671-16/hpsbhf03919",
|
||||||
|
@ -2,7 +2,7 @@
|
|||||||
"id": "CVE-2024-23114",
|
"id": "CVE-2024-23114",
|
||||||
"sourceIdentifier": "security@apache.org",
|
"sourceIdentifier": "security@apache.org",
|
||||||
"published": "2024-02-20T15:15:10.333",
|
"published": "2024-02-20T15:15:10.333",
|
||||||
"lastModified": "2024-02-20T19:50:53.960",
|
"lastModified": "2024-08-28T20:35:06.210",
|
||||||
"vulnStatus": "Awaiting Analysis",
|
"vulnStatus": "Awaiting Analysis",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
@ -15,7 +15,30 @@
|
|||||||
"value": "Vulnerabilidad de deserializaci\u00f3n de datos no confiables en Apache Camel CassandraQL Component AggregationRepository que es vulnerable a una deserializaci\u00f3n insegura. Bajo condiciones espec\u00edficas, es posible deserializar la carga \u00fatil maliciosa. Este problema afecta a Apache Camel: desde 3.0.0 antes de 3.21.4, desde 3.22.0 antes de 3.22.1, desde 4.0.0 antes de 4.0.4, desde 4.1.0 antes de 4.4 .0. Se recomienda a los usuarios actualizar a la versi\u00f3n 4.4.0, que soluciona el problema. Si los usuarios est\u00e1n en el flujo de versiones 4.0.x LTS, se les sugiere actualizar a 4.0.4. Si los usuarios est\u00e1n en 3.x, se les sugiere pasar a 3.21.4 o 3.22.1"
|
"value": "Vulnerabilidad de deserializaci\u00f3n de datos no confiables en Apache Camel CassandraQL Component AggregationRepository que es vulnerable a una deserializaci\u00f3n insegura. Bajo condiciones espec\u00edficas, es posible deserializar la carga \u00fatil maliciosa. Este problema afecta a Apache Camel: desde 3.0.0 antes de 3.21.4, desde 3.22.0 antes de 3.22.1, desde 4.0.0 antes de 4.0.4, desde 4.1.0 antes de 4.4 .0. Se recomienda a los usuarios actualizar a la versi\u00f3n 4.4.0, que soluciona el problema. Si los usuarios est\u00e1n en el flujo de versiones 4.0.x LTS, se les sugiere actualizar a 4.0.4. Si los usuarios est\u00e1n en 3.x, se les sugiere pasar a 3.21.4 o 3.22.1"
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"metrics": {},
|
"metrics": {
|
||||||
|
"cvssMetricV31": [
|
||||||
|
{
|
||||||
|
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||||
|
"type": "Secondary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||||
|
"attackVector": "NETWORK",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "NONE",
|
||||||
|
"userInteraction": "NONE",
|
||||||
|
"scope": "UNCHANGED",
|
||||||
|
"confidentialityImpact": "HIGH",
|
||||||
|
"integrityImpact": "HIGH",
|
||||||
|
"availabilityImpact": "HIGH",
|
||||||
|
"baseScore": 9.8,
|
||||||
|
"baseSeverity": "CRITICAL"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 3.9,
|
||||||
|
"impactScore": 5.9
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
"weaknesses": [
|
"weaknesses": [
|
||||||
{
|
{
|
||||||
"source": "security@apache.org",
|
"source": "security@apache.org",
|
||||||
|
@ -2,7 +2,7 @@
|
|||||||
"id": "CVE-2024-24310",
|
"id": "CVE-2024-24310",
|
||||||
"sourceIdentifier": "cve@mitre.org",
|
"sourceIdentifier": "cve@mitre.org",
|
||||||
"published": "2024-02-23T22:15:54.970",
|
"published": "2024-02-23T22:15:54.970",
|
||||||
"lastModified": "2024-02-26T13:42:22.567",
|
"lastModified": "2024-08-28T21:35:04.093",
|
||||||
"vulnStatus": "Awaiting Analysis",
|
"vulnStatus": "Awaiting Analysis",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
@ -15,7 +15,42 @@
|
|||||||
"value": "En el m\u00f3dulo \"Generar c\u00f3digo de barras en factura/albar\u00e1n de entrega\" (ecgeneratebarcode) de Ether Creation <= 1.2.0 para PrestaShop, un invitado puede realizar una inyecci\u00f3n SQL."
|
"value": "En el m\u00f3dulo \"Generar c\u00f3digo de barras en factura/albar\u00e1n de entrega\" (ecgeneratebarcode) de Ether Creation <= 1.2.0 para PrestaShop, un invitado puede realizar una inyecci\u00f3n SQL."
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"metrics": {},
|
"metrics": {
|
||||||
|
"cvssMetricV31": [
|
||||||
|
{
|
||||||
|
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||||
|
"type": "Secondary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||||
|
"attackVector": "NETWORK",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "LOW",
|
||||||
|
"userInteraction": "NONE",
|
||||||
|
"scope": "UNCHANGED",
|
||||||
|
"confidentialityImpact": "HIGH",
|
||||||
|
"integrityImpact": "HIGH",
|
||||||
|
"availabilityImpact": "HIGH",
|
||||||
|
"baseScore": 8.8,
|
||||||
|
"baseSeverity": "HIGH"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 2.8,
|
||||||
|
"impactScore": 5.9
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"weaknesses": [
|
||||||
|
{
|
||||||
|
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||||
|
"type": "Secondary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-89"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
"references": [
|
"references": [
|
||||||
{
|
{
|
||||||
"url": "https://addons.prestashop.com/en/preparation-shipping/24123-generate-barcode-on-invoice-delivery-slip.html",
|
"url": "https://addons.prestashop.com/en/preparation-shipping/24123-generate-barcode-on-invoice-delivery-slip.html",
|
||||||
|
@ -2,8 +2,8 @@
|
|||||||
"id": "CVE-2024-25024",
|
"id": "CVE-2024-25024",
|
||||||
"sourceIdentifier": "psirt@us.ibm.com",
|
"sourceIdentifier": "psirt@us.ibm.com",
|
||||||
"published": "2024-08-15T03:15:04.353",
|
"published": "2024-08-15T03:15:04.353",
|
||||||
"lastModified": "2024-08-15T13:01:10.150",
|
"lastModified": "2024-08-28T21:53:10.720",
|
||||||
"vulnStatus": "Undergoing Analysis",
|
"vulnStatus": "Analyzed",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
@ -17,6 +17,26 @@
|
|||||||
],
|
],
|
||||||
"metrics": {
|
"metrics": {
|
||||||
"cvssMetricV31": [
|
"cvssMetricV31": [
|
||||||
|
{
|
||||||
|
"source": "nvd@nist.gov",
|
||||||
|
"type": "Primary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
|
||||||
|
"attackVector": "LOCAL",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "LOW",
|
||||||
|
"userInteraction": "NONE",
|
||||||
|
"scope": "UNCHANGED",
|
||||||
|
"confidentialityImpact": "HIGH",
|
||||||
|
"integrityImpact": "NONE",
|
||||||
|
"availabilityImpact": "NONE",
|
||||||
|
"baseScore": 5.5,
|
||||||
|
"baseSeverity": "MEDIUM"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 1.8,
|
||||||
|
"impactScore": 3.6
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"source": "psirt@us.ibm.com",
|
"source": "psirt@us.ibm.com",
|
||||||
"type": "Secondary",
|
"type": "Secondary",
|
||||||
@ -39,14 +59,58 @@
|
|||||||
}
|
}
|
||||||
]
|
]
|
||||||
},
|
},
|
||||||
"references": [
|
"weaknesses": [
|
||||||
{
|
{
|
||||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/281430",
|
"source": "nvd@nist.gov",
|
||||||
"source": "psirt@us.ibm.com"
|
"type": "Primary",
|
||||||
},
|
"description": [
|
||||||
{
|
{
|
||||||
"url": "https://www.ibm.com/support/pages/node/7165488",
|
"lang": "en",
|
||||||
"source": "psirt@us.ibm.com"
|
"value": "CWE-312"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"configurations": [
|
||||||
|
{
|
||||||
|
"nodes": [
|
||||||
|
{
|
||||||
|
"operator": "OR",
|
||||||
|
"negate": false,
|
||||||
|
"cpeMatch": [
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:a:ibm:cloud_pak_for_security:*:*:*:*:*:*:*:*",
|
||||||
|
"versionStartIncluding": "1.10.0.0",
|
||||||
|
"versionEndIncluding": "1.10.11.0",
|
||||||
|
"matchCriteriaId": "8FA89838-3E05-4778-9323-DE51CC10FD18"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:a:ibm:qradar_suite:*:*:*:*:*:*:*:*",
|
||||||
|
"versionStartIncluding": "1.10.12.0",
|
||||||
|
"versionEndExcluding": "1.10.24.0",
|
||||||
|
"matchCriteriaId": "BE4221C4-D274-4B1E-B8CF-21C6E51ABD48"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/281430",
|
||||||
|
"source": "psirt@us.ibm.com",
|
||||||
|
"tags": [
|
||||||
|
"VDB Entry"
|
||||||
|
]
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://www.ibm.com/support/pages/node/7165488",
|
||||||
|
"source": "psirt@us.ibm.com",
|
||||||
|
"tags": [
|
||||||
|
"Vendor Advisory"
|
||||||
|
]
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
@ -2,7 +2,7 @@
|
|||||||
"id": "CVE-2024-25187",
|
"id": "CVE-2024-25187",
|
||||||
"sourceIdentifier": "cve@mitre.org",
|
"sourceIdentifier": "cve@mitre.org",
|
||||||
"published": "2024-04-02T04:15:12.203",
|
"published": "2024-04-02T04:15:12.203",
|
||||||
"lastModified": "2024-04-02T12:50:42.233",
|
"lastModified": "2024-08-28T20:35:06.460",
|
||||||
"vulnStatus": "Awaiting Analysis",
|
"vulnStatus": "Awaiting Analysis",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
@ -15,7 +15,42 @@
|
|||||||
"value": "La vulnerabilidad de Server Side Request Forgery (SSRF) en 71cms v1.0.0 permite a atacantes remotos no autenticados obtener informaci\u00f3n confidencial a trav\u00e9s de getweather.html."
|
"value": "La vulnerabilidad de Server Side Request Forgery (SSRF) en 71cms v1.0.0 permite a atacantes remotos no autenticados obtener informaci\u00f3n confidencial a trav\u00e9s de getweather.html."
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"metrics": {},
|
"metrics": {
|
||||||
|
"cvssMetricV31": [
|
||||||
|
{
|
||||||
|
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||||
|
"type": "Secondary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:L",
|
||||||
|
"attackVector": "NETWORK",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "NONE",
|
||||||
|
"userInteraction": "NONE",
|
||||||
|
"scope": "UNCHANGED",
|
||||||
|
"confidentialityImpact": "HIGH",
|
||||||
|
"integrityImpact": "LOW",
|
||||||
|
"availabilityImpact": "LOW",
|
||||||
|
"baseScore": 8.6,
|
||||||
|
"baseSeverity": "HIGH"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 3.9,
|
||||||
|
"impactScore": 4.7
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"weaknesses": [
|
||||||
|
{
|
||||||
|
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||||
|
"type": "Secondary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-918"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
"references": [
|
"references": [
|
||||||
{
|
{
|
||||||
"url": "https://gist.github.com/wisejayer/d365e93ce09b8a36641165e1d1a0a06c",
|
"url": "https://gist.github.com/wisejayer/d365e93ce09b8a36641165e1d1a0a06c",
|
||||||
|
@ -2,8 +2,8 @@
|
|||||||
"id": "CVE-2024-25212",
|
"id": "CVE-2024-25212",
|
||||||
"sourceIdentifier": "cve@mitre.org",
|
"sourceIdentifier": "cve@mitre.org",
|
||||||
"published": "2024-02-14T15:15:09.063",
|
"published": "2024-02-14T15:15:09.063",
|
||||||
"lastModified": "2024-02-15T06:27:12.610",
|
"lastModified": "2024-08-28T20:35:07.213",
|
||||||
"vulnStatus": "Analyzed",
|
"vulnStatus": "Modified",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
@ -36,6 +36,26 @@
|
|||||||
},
|
},
|
||||||
"exploitabilityScore": 1.2,
|
"exploitabilityScore": 1.2,
|
||||||
"impactScore": 5.9
|
"impactScore": 5.9
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||||
|
"type": "Secondary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
|
||||||
|
"attackVector": "NETWORK",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "HIGH",
|
||||||
|
"userInteraction": "NONE",
|
||||||
|
"scope": "UNCHANGED",
|
||||||
|
"confidentialityImpact": "HIGH",
|
||||||
|
"integrityImpact": "HIGH",
|
||||||
|
"availabilityImpact": "HIGH",
|
||||||
|
"baseScore": 7.2,
|
||||||
|
"baseSeverity": "HIGH"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 1.2,
|
||||||
|
"impactScore": 5.9
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
},
|
},
|
||||||
@ -49,6 +69,16 @@
|
|||||||
"value": "CWE-89"
|
"value": "CWE-89"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||||
|
"type": "Secondary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-89"
|
||||||
|
}
|
||||||
|
]
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"configurations": [
|
"configurations": [
|
||||||
|
@ -2,7 +2,7 @@
|
|||||||
"id": "CVE-2024-25415",
|
"id": "CVE-2024-25415",
|
||||||
"sourceIdentifier": "cve@mitre.org",
|
"sourceIdentifier": "cve@mitre.org",
|
||||||
"published": "2024-02-16T02:15:51.443",
|
"published": "2024-02-16T02:15:51.443",
|
||||||
"lastModified": "2024-06-07T15:15:49.860",
|
"lastModified": "2024-08-28T20:35:08.127",
|
||||||
"vulnStatus": "Awaiting Analysis",
|
"vulnStatus": "Awaiting Analysis",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
@ -15,7 +15,42 @@
|
|||||||
"value": "Una vulnerabilidad de ejecuci\u00f3n remota de c\u00f3digo (RCE) en /admin/define_language.php de CE Phoenix v1.0.8.20 permite a atacantes ejecutar c\u00f3digo PHP de su elecci\u00f3n inyectando un payload manipulado en el archivo english.php."
|
"value": "Una vulnerabilidad de ejecuci\u00f3n remota de c\u00f3digo (RCE) en /admin/define_language.php de CE Phoenix v1.0.8.20 permite a atacantes ejecutar c\u00f3digo PHP de su elecci\u00f3n inyectando un payload manipulado en el archivo english.php."
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"metrics": {},
|
"metrics": {
|
||||||
|
"cvssMetricV31": [
|
||||||
|
{
|
||||||
|
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||||
|
"type": "Secondary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
|
||||||
|
"attackVector": "NETWORK",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "HIGH",
|
||||||
|
"userInteraction": "NONE",
|
||||||
|
"scope": "UNCHANGED",
|
||||||
|
"confidentialityImpact": "HIGH",
|
||||||
|
"integrityImpact": "HIGH",
|
||||||
|
"availabilityImpact": "HIGH",
|
||||||
|
"baseScore": 7.2,
|
||||||
|
"baseSeverity": "HIGH"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 1.2,
|
||||||
|
"impactScore": 5.9
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"weaknesses": [
|
||||||
|
{
|
||||||
|
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||||
|
"type": "Secondary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-94"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
"references": [
|
"references": [
|
||||||
{
|
{
|
||||||
"url": "https://github.com/capture0x/Phoenix",
|
"url": "https://github.com/capture0x/Phoenix",
|
||||||
|
@ -2,7 +2,7 @@
|
|||||||
"id": "CVE-2024-25713",
|
"id": "CVE-2024-25713",
|
||||||
"sourceIdentifier": "cve@mitre.org",
|
"sourceIdentifier": "cve@mitre.org",
|
||||||
"published": "2024-02-29T01:44:16.333",
|
"published": "2024-02-29T01:44:16.333",
|
||||||
"lastModified": "2024-04-19T23:15:10.380",
|
"lastModified": "2024-08-28T21:35:04.973",
|
||||||
"vulnStatus": "Awaiting Analysis",
|
"vulnStatus": "Awaiting Analysis",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
@ -15,7 +15,42 @@
|
|||||||
"value": "yyjson hasta 0.8.0 tiene un doble free, lo que lleva a la ejecuci\u00f3n remota de c\u00f3digo en algunos casos, porque la funci\u00f3n pool_free carece de comprobaciones de bucle. (pool_free es parte del asignador de series de grupos, junto con pool_malloc y pool_realloc)."
|
"value": "yyjson hasta 0.8.0 tiene un doble free, lo que lleva a la ejecuci\u00f3n remota de c\u00f3digo en algunos casos, porque la funci\u00f3n pool_free carece de comprobaciones de bucle. (pool_free es parte del asignador de series de grupos, junto con pool_malloc y pool_realloc)."
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"metrics": {},
|
"metrics": {
|
||||||
|
"cvssMetricV31": [
|
||||||
|
{
|
||||||
|
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||||
|
"type": "Secondary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:L",
|
||||||
|
"attackVector": "NETWORK",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "NONE",
|
||||||
|
"userInteraction": "NONE",
|
||||||
|
"scope": "UNCHANGED",
|
||||||
|
"confidentialityImpact": "LOW",
|
||||||
|
"integrityImpact": "HIGH",
|
||||||
|
"availabilityImpact": "LOW",
|
||||||
|
"baseScore": 8.6,
|
||||||
|
"baseSeverity": "HIGH"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 3.9,
|
||||||
|
"impactScore": 4.7
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"weaknesses": [
|
||||||
|
{
|
||||||
|
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||||
|
"type": "Secondary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-94"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
"references": [
|
"references": [
|
||||||
{
|
{
|
||||||
"url": "https://github.com/ibireme/yyjson/security/advisories/GHSA-q4m7-9pcm-fpxh",
|
"url": "https://github.com/ibireme/yyjson/security/advisories/GHSA-q4m7-9pcm-fpxh",
|
||||||
|
@ -2,7 +2,7 @@
|
|||||||
"id": "CVE-2024-25893",
|
"id": "CVE-2024-25893",
|
||||||
"sourceIdentifier": "cve@mitre.org",
|
"sourceIdentifier": "cve@mitre.org",
|
||||||
"published": "2024-02-21T18:15:51.580",
|
"published": "2024-02-21T18:15:51.580",
|
||||||
"lastModified": "2024-02-22T19:07:27.197",
|
"lastModified": "2024-08-28T21:35:05.727",
|
||||||
"vulnStatus": "Awaiting Analysis",
|
"vulnStatus": "Awaiting Analysis",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
@ -15,7 +15,42 @@
|
|||||||
"value": "ChurchCRM 5.5.0 FRCertificates.php es vulnerable a la inyecci\u00f3n ciega de SQL (basada en el tiempo) a trav\u00e9s del par\u00e1metro GET CurrentFundraiser."
|
"value": "ChurchCRM 5.5.0 FRCertificates.php es vulnerable a la inyecci\u00f3n ciega de SQL (basada en el tiempo) a trav\u00e9s del par\u00e1metro GET CurrentFundraiser."
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"metrics": {},
|
"metrics": {
|
||||||
|
"cvssMetricV31": [
|
||||||
|
{
|
||||||
|
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||||
|
"type": "Secondary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N",
|
||||||
|
"attackVector": "NETWORK",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "NONE",
|
||||||
|
"userInteraction": "NONE",
|
||||||
|
"scope": "UNCHANGED",
|
||||||
|
"confidentialityImpact": "HIGH",
|
||||||
|
"integrityImpact": "HIGH",
|
||||||
|
"availabilityImpact": "NONE",
|
||||||
|
"baseScore": 9.1,
|
||||||
|
"baseSeverity": "CRITICAL"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 3.9,
|
||||||
|
"impactScore": 5.2
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"weaknesses": [
|
||||||
|
{
|
||||||
|
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||||
|
"type": "Secondary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-89"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
"references": [
|
"references": [
|
||||||
{
|
{
|
||||||
"url": "https://github.com/ChurchCRM/CRM/issues/6856",
|
"url": "https://github.com/ChurchCRM/CRM/issues/6856",
|
||||||
|
@ -2,7 +2,7 @@
|
|||||||
"id": "CVE-2024-26445",
|
"id": "CVE-2024-26445",
|
||||||
"sourceIdentifier": "cve@mitre.org",
|
"sourceIdentifier": "cve@mitre.org",
|
||||||
"published": "2024-02-22T14:15:47.263",
|
"published": "2024-02-22T14:15:47.263",
|
||||||
"lastModified": "2024-02-22T19:07:27.197",
|
"lastModified": "2024-08-28T21:35:06.473",
|
||||||
"vulnStatus": "Awaiting Analysis",
|
"vulnStatus": "Awaiting Analysis",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
@ -15,7 +15,42 @@
|
|||||||
"value": "Se descubri\u00f3 que flusity-CMS v2.33 conten\u00eda Cross-Site Request Forgery (CSRF) a trav\u00e9s del componente /core/tools/delete_place.php"
|
"value": "Se descubri\u00f3 que flusity-CMS v2.33 conten\u00eda Cross-Site Request Forgery (CSRF) a trav\u00e9s del componente /core/tools/delete_place.php"
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"metrics": {},
|
"metrics": {
|
||||||
|
"cvssMetricV31": [
|
||||||
|
{
|
||||||
|
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||||
|
"type": "Secondary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
|
||||||
|
"attackVector": "NETWORK",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "NONE",
|
||||||
|
"userInteraction": "REQUIRED",
|
||||||
|
"scope": "CHANGED",
|
||||||
|
"confidentialityImpact": "LOW",
|
||||||
|
"integrityImpact": "LOW",
|
||||||
|
"availabilityImpact": "NONE",
|
||||||
|
"baseScore": 6.1,
|
||||||
|
"baseSeverity": "MEDIUM"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 2.8,
|
||||||
|
"impactScore": 2.7
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"weaknesses": [
|
||||||
|
{
|
||||||
|
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||||
|
"type": "Secondary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-352"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
"references": [
|
"references": [
|
||||||
{
|
{
|
||||||
"url": "https://github.com/xiaolanjing0/cms/blob/main/1.md",
|
"url": "https://github.com/xiaolanjing0/cms/blob/main/1.md",
|
||||||
|
@ -2,7 +2,7 @@
|
|||||||
"id": "CVE-2024-26455",
|
"id": "CVE-2024-26455",
|
||||||
"sourceIdentifier": "cve@mitre.org",
|
"sourceIdentifier": "cve@mitre.org",
|
||||||
"published": "2024-02-26T18:15:07.863",
|
"published": "2024-02-26T18:15:07.863",
|
||||||
"lastModified": "2024-02-26T22:10:40.463",
|
"lastModified": "2024-08-28T21:35:07.220",
|
||||||
"vulnStatus": "Awaiting Analysis",
|
"vulnStatus": "Awaiting Analysis",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
@ -15,7 +15,42 @@
|
|||||||
"value": "fluent-bit 2.2.2 contiene una vulnerabilidad Use-After-Free en /fluent-bit/plugins/custom_calyptia/calyptia.c."
|
"value": "fluent-bit 2.2.2 contiene una vulnerabilidad Use-After-Free en /fluent-bit/plugins/custom_calyptia/calyptia.c."
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"metrics": {},
|
"metrics": {
|
||||||
|
"cvssMetricV31": [
|
||||||
|
{
|
||||||
|
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||||
|
"type": "Secondary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
|
||||||
|
"attackVector": "NETWORK",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "NONE",
|
||||||
|
"userInteraction": "NONE",
|
||||||
|
"scope": "UNCHANGED",
|
||||||
|
"confidentialityImpact": "NONE",
|
||||||
|
"integrityImpact": "NONE",
|
||||||
|
"availabilityImpact": "HIGH",
|
||||||
|
"baseScore": 7.5,
|
||||||
|
"baseSeverity": "HIGH"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 3.9,
|
||||||
|
"impactScore": 3.6
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"weaknesses": [
|
||||||
|
{
|
||||||
|
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||||
|
"type": "Secondary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-416"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
"references": [
|
"references": [
|
||||||
{
|
{
|
||||||
"url": "https://github.com/LuMingYinDetect/fluent-bit_defects/blob/main/fluent-bit_detect_1.md",
|
"url": "https://github.com/LuMingYinDetect/fluent-bit_defects/blob/main/fluent-bit_detect_1.md",
|
||||||
|
@ -2,7 +2,7 @@
|
|||||||
"id": "CVE-2024-26491",
|
"id": "CVE-2024-26491",
|
||||||
"sourceIdentifier": "cve@mitre.org",
|
"sourceIdentifier": "cve@mitre.org",
|
||||||
"published": "2024-02-22T06:15:57.973",
|
"published": "2024-02-22T06:15:57.973",
|
||||||
"lastModified": "2024-02-22T19:07:27.197",
|
"lastModified": "2024-08-28T20:35:09.023",
|
||||||
"vulnStatus": "Awaiting Analysis",
|
"vulnStatus": "Awaiting Analysis",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
@ -15,7 +15,42 @@
|
|||||||
"value": "Una vulnerabilidad de Cross-Site Scripting (XSS) en el m\u00f3dulo adicional JD Flusity 'Galer\u00eda de medios con descripci\u00f3n' de flusity-CMS v2.33 permite a los atacantes ejecutar script web o HTML arbitrario a trav\u00e9s de un payload manipulado inyectado en el campo de texto del nombre de la Galer\u00eda."
|
"value": "Una vulnerabilidad de Cross-Site Scripting (XSS) en el m\u00f3dulo adicional JD Flusity 'Galer\u00eda de medios con descripci\u00f3n' de flusity-CMS v2.33 permite a los atacantes ejecutar script web o HTML arbitrario a trav\u00e9s de un payload manipulado inyectado en el campo de texto del nombre de la Galer\u00eda."
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"metrics": {},
|
"metrics": {
|
||||||
|
"cvssMetricV31": [
|
||||||
|
{
|
||||||
|
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||||
|
"type": "Secondary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
|
||||||
|
"attackVector": "NETWORK",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "NONE",
|
||||||
|
"userInteraction": "REQUIRED",
|
||||||
|
"scope": "CHANGED",
|
||||||
|
"confidentialityImpact": "LOW",
|
||||||
|
"integrityImpact": "LOW",
|
||||||
|
"availabilityImpact": "NONE",
|
||||||
|
"baseScore": 6.1,
|
||||||
|
"baseSeverity": "MEDIUM"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 2.8,
|
||||||
|
"impactScore": 2.7
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"weaknesses": [
|
||||||
|
{
|
||||||
|
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||||
|
"type": "Secondary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-79"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
"references": [
|
"references": [
|
||||||
{
|
{
|
||||||
"url": "https://github.com/2111715623/cms/blob/main/1.md",
|
"url": "https://github.com/2111715623/cms/blob/main/1.md",
|
||||||
|
@ -2,7 +2,7 @@
|
|||||||
"id": "CVE-2024-28215",
|
"id": "CVE-2024-28215",
|
||||||
"sourceIdentifier": "cve@navercorp.com",
|
"sourceIdentifier": "cve@navercorp.com",
|
||||||
"published": "2024-03-07T05:15:54.940",
|
"published": "2024-03-07T05:15:54.940",
|
||||||
"lastModified": "2024-03-07T13:52:27.110",
|
"lastModified": "2024-08-28T21:35:07.973",
|
||||||
"vulnStatus": "Awaiting Analysis",
|
"vulnStatus": "Awaiting Analysis",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
@ -15,7 +15,30 @@
|
|||||||
"value": "nGrinder anterior a 3.5.9 permite a un atacante crear o actualizar la configuraci\u00f3n de webhook debido a la falta de control de acceso, lo que podr\u00eda ser la causa de la divulgaci\u00f3n de informaci\u00f3n y Server-Side Request Forgery."
|
"value": "nGrinder anterior a 3.5.9 permite a un atacante crear o actualizar la configuraci\u00f3n de webhook debido a la falta de control de acceso, lo que podr\u00eda ser la causa de la divulgaci\u00f3n de informaci\u00f3n y Server-Side Request Forgery."
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"metrics": {},
|
"metrics": {
|
||||||
|
"cvssMetricV31": [
|
||||||
|
{
|
||||||
|
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||||
|
"type": "Secondary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
|
||||||
|
"attackVector": "NETWORK",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "NONE",
|
||||||
|
"userInteraction": "NONE",
|
||||||
|
"scope": "UNCHANGED",
|
||||||
|
"confidentialityImpact": "HIGH",
|
||||||
|
"integrityImpact": "NONE",
|
||||||
|
"availabilityImpact": "NONE",
|
||||||
|
"baseScore": 7.5,
|
||||||
|
"baseSeverity": "HIGH"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 3.9,
|
||||||
|
"impactScore": 3.6
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
"weaknesses": [
|
"weaknesses": [
|
||||||
{
|
{
|
||||||
"source": "cve@navercorp.com",
|
"source": "cve@navercorp.com",
|
||||||
|
@ -2,7 +2,7 @@
|
|||||||
"id": "CVE-2024-28396",
|
"id": "CVE-2024-28396",
|
||||||
"sourceIdentifier": "cve@mitre.org",
|
"sourceIdentifier": "cve@mitre.org",
|
||||||
"published": "2024-03-20T14:15:08.650",
|
"published": "2024-03-20T14:15:08.650",
|
||||||
"lastModified": "2024-03-20T17:18:26.603",
|
"lastModified": "2024-08-28T21:35:08.140",
|
||||||
"vulnStatus": "Awaiting Analysis",
|
"vulnStatus": "Awaiting Analysis",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
@ -11,7 +11,42 @@
|
|||||||
"value": "An issue in MyPrestaModules ordersexport v.6.0.2 and before allows a remote attacker to execute arbitrary code via the download.php component."
|
"value": "An issue in MyPrestaModules ordersexport v.6.0.2 and before allows a remote attacker to execute arbitrary code via the download.php component."
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"metrics": {},
|
"metrics": {
|
||||||
|
"cvssMetricV31": [
|
||||||
|
{
|
||||||
|
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||||
|
"type": "Secondary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
|
||||||
|
"attackVector": "NETWORK",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "NONE",
|
||||||
|
"userInteraction": "NONE",
|
||||||
|
"scope": "UNCHANGED",
|
||||||
|
"confidentialityImpact": "HIGH",
|
||||||
|
"integrityImpact": "NONE",
|
||||||
|
"availabilityImpact": "NONE",
|
||||||
|
"baseScore": 7.5,
|
||||||
|
"baseSeverity": "HIGH"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 3.9,
|
||||||
|
"impactScore": 3.6
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"weaknesses": [
|
||||||
|
{
|
||||||
|
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||||
|
"type": "Secondary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-94"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
"references": [
|
"references": [
|
||||||
{
|
{
|
||||||
"url": "https://addons.prestashop.com/en/data-import-export/17596-orders-csv-excel-export-pro.html",
|
"url": "https://addons.prestashop.com/en/data-import-export/17596-orders-csv-excel-export-pro.html",
|
||||||
|
@ -2,7 +2,7 @@
|
|||||||
"id": "CVE-2024-28434",
|
"id": "CVE-2024-28434",
|
||||||
"sourceIdentifier": "cve@mitre.org",
|
"sourceIdentifier": "cve@mitre.org",
|
||||||
"published": "2024-03-25T14:15:09.720",
|
"published": "2024-03-25T14:15:09.720",
|
||||||
"lastModified": "2024-03-25T16:43:06.137",
|
"lastModified": "2024-08-28T21:35:08.910",
|
||||||
"vulnStatus": "Awaiting Analysis",
|
"vulnStatus": "Awaiting Analysis",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
@ -15,7 +15,42 @@
|
|||||||
"value": "La plataforma CRM Twenty es vulnerable a cross site scripting almacenado mediante la carga de archivos en la versi\u00f3n 0.3.0. Un archivo svg manipulado puede desencadenar la ejecuci\u00f3n del c\u00f3digo javascript."
|
"value": "La plataforma CRM Twenty es vulnerable a cross site scripting almacenado mediante la carga de archivos en la versi\u00f3n 0.3.0. Un archivo svg manipulado puede desencadenar la ejecuci\u00f3n del c\u00f3digo javascript."
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"metrics": {},
|
"metrics": {
|
||||||
|
"cvssMetricV31": [
|
||||||
|
{
|
||||||
|
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||||
|
"type": "Secondary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:H/A:L",
|
||||||
|
"attackVector": "NETWORK",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "NONE",
|
||||||
|
"userInteraction": "REQUIRED",
|
||||||
|
"scope": "UNCHANGED",
|
||||||
|
"confidentialityImpact": "LOW",
|
||||||
|
"integrityImpact": "HIGH",
|
||||||
|
"availabilityImpact": "LOW",
|
||||||
|
"baseScore": 7.6,
|
||||||
|
"baseSeverity": "HIGH"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 2.8,
|
||||||
|
"impactScore": 4.7
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"weaknesses": [
|
||||||
|
{
|
||||||
|
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||||
|
"type": "Secondary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-79"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
"references": [
|
"references": [
|
||||||
{
|
{
|
||||||
"url": "https://github.com/b-hermes/vulnerability-research/tree/main/CVE-2024-28434",
|
"url": "https://github.com/b-hermes/vulnerability-research/tree/main/CVE-2024-28434",
|
||||||
|
@ -2,7 +2,7 @@
|
|||||||
"id": "CVE-2024-29435",
|
"id": "CVE-2024-29435",
|
||||||
"sourceIdentifier": "cve@mitre.org",
|
"sourceIdentifier": "cve@mitre.org",
|
||||||
"published": "2024-04-01T20:15:20.710",
|
"published": "2024-04-01T20:15:20.710",
|
||||||
"lastModified": "2024-04-02T12:50:42.233",
|
"lastModified": "2024-08-28T20:35:10.057",
|
||||||
"vulnStatus": "Awaiting Analysis",
|
"vulnStatus": "Awaiting Analysis",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
@ -15,7 +15,42 @@
|
|||||||
"value": "Un problema descubierto en Alldata v0.4.6 permite a un atacante ejecutar comandos arbitrarios a trav\u00e9s del par\u00e1metro ProcessId."
|
"value": "Un problema descubierto en Alldata v0.4.6 permite a un atacante ejecutar comandos arbitrarios a trav\u00e9s del par\u00e1metro ProcessId."
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"metrics": {},
|
"metrics": {
|
||||||
|
"cvssMetricV31": [
|
||||||
|
{
|
||||||
|
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||||
|
"type": "Secondary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L",
|
||||||
|
"attackVector": "PHYSICAL",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "NONE",
|
||||||
|
"userInteraction": "REQUIRED",
|
||||||
|
"scope": "UNCHANGED",
|
||||||
|
"confidentialityImpact": "LOW",
|
||||||
|
"integrityImpact": "LOW",
|
||||||
|
"availabilityImpact": "LOW",
|
||||||
|
"baseScore": 4.1,
|
||||||
|
"baseSeverity": "MEDIUM"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 0.7,
|
||||||
|
"impactScore": 3.4
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"weaknesses": [
|
||||||
|
{
|
||||||
|
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||||
|
"type": "Secondary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-77"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
"references": [
|
"references": [
|
||||||
{
|
{
|
||||||
"url": "https://gist.github.com/Raybye/ea3a46adc5ea51e659c42218f05153fa",
|
"url": "https://gist.github.com/Raybye/ea3a46adc5ea51e659c42218f05153fa",
|
||||||
|
@ -2,7 +2,7 @@
|
|||||||
"id": "CVE-2024-29469",
|
"id": "CVE-2024-29469",
|
||||||
"sourceIdentifier": "cve@mitre.org",
|
"sourceIdentifier": "cve@mitre.org",
|
||||||
"published": "2024-03-20T21:15:32.267",
|
"published": "2024-03-20T21:15:32.267",
|
||||||
"lastModified": "2024-03-21T12:58:51.093",
|
"lastModified": "2024-08-28T21:35:09.653",
|
||||||
"vulnStatus": "Awaiting Analysis",
|
"vulnStatus": "Awaiting Analysis",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
@ -15,7 +15,42 @@
|
|||||||
"value": "Una vulnerabilidad de cross-site scripting (XSS) almacenado en OneBlog v2.3.4 permite a los atacantes ejecutar scripts web o HTML arbitrarios a trav\u00e9s de un payload manipulado inyectado en el par\u00e1metro Lista de categor\u00edas en el m\u00f3dulo Lab. "
|
"value": "Una vulnerabilidad de cross-site scripting (XSS) almacenado en OneBlog v2.3.4 permite a los atacantes ejecutar scripts web o HTML arbitrarios a trav\u00e9s de un payload manipulado inyectado en el par\u00e1metro Lista de categor\u00edas en el m\u00f3dulo Lab. "
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"metrics": {},
|
"metrics": {
|
||||||
|
"cvssMetricV31": [
|
||||||
|
{
|
||||||
|
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||||
|
"type": "Secondary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
|
||||||
|
"attackVector": "NETWORK",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "NONE",
|
||||||
|
"userInteraction": "REQUIRED",
|
||||||
|
"scope": "CHANGED",
|
||||||
|
"confidentialityImpact": "LOW",
|
||||||
|
"integrityImpact": "LOW",
|
||||||
|
"availabilityImpact": "NONE",
|
||||||
|
"baseScore": 6.1,
|
||||||
|
"baseSeverity": "MEDIUM"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 2.8,
|
||||||
|
"impactScore": 2.7
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"weaknesses": [
|
||||||
|
{
|
||||||
|
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||||
|
"type": "Secondary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-79"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
"references": [
|
"references": [
|
||||||
{
|
{
|
||||||
"url": "https://gitee.com/yadong.zhang/DBlog/issues/I98O8V",
|
"url": "https://gitee.com/yadong.zhang/DBlog/issues/I98O8V",
|
||||||
|
56
CVE-2024/CVE-2024-341xx/CVE-2024-34195.json
Normal file
56
CVE-2024/CVE-2024-341xx/CVE-2024-34195.json
Normal file
@ -0,0 +1,56 @@
|
|||||||
|
{
|
||||||
|
"id": "CVE-2024-34195",
|
||||||
|
"sourceIdentifier": "cve@mitre.org",
|
||||||
|
"published": "2024-08-28T20:15:07.580",
|
||||||
|
"lastModified": "2024-08-28T20:35:10.893",
|
||||||
|
"vulnStatus": "Received",
|
||||||
|
"cveTags": [],
|
||||||
|
"descriptions": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "TOTOLINK AC1200 Wireless Router A3002R Firmware V1.1.1-B20200824 is vulnerable to Buffer Overflow. In the boa server program's CGI handling function formWlEncrypt, there is a lack of length restriction on the wlan_ssid field. This oversight leads to potential buffer overflow under specific circumstances. For instance, by invoking the formWlanRedirect function with specific parameters to alter wlan_idx's value and subsequently invoking the formWlEncrypt function, an attacker can trigger buffer overflow, enabling arbitrary command execution or denial of service attacks."
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"metrics": {
|
||||||
|
"cvssMetricV31": [
|
||||||
|
{
|
||||||
|
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||||
|
"type": "Secondary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||||
|
"attackVector": "ADJACENT_NETWORK",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "NONE",
|
||||||
|
"userInteraction": "NONE",
|
||||||
|
"scope": "UNCHANGED",
|
||||||
|
"confidentialityImpact": "HIGH",
|
||||||
|
"integrityImpact": "HIGH",
|
||||||
|
"availabilityImpact": "HIGH",
|
||||||
|
"baseScore": 8.8,
|
||||||
|
"baseSeverity": "HIGH"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 2.8,
|
||||||
|
"impactScore": 5.9
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"weaknesses": [
|
||||||
|
{
|
||||||
|
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||||
|
"type": "Secondary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-121"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://gist.github.com/Swind1er/84161b607d06d060fba5adcdd92bceb4",
|
||||||
|
"source": "cve@mitre.org"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
@ -2,8 +2,8 @@
|
|||||||
"id": "CVE-2024-34906",
|
"id": "CVE-2024-34906",
|
||||||
"sourceIdentifier": "cve@mitre.org",
|
"sourceIdentifier": "cve@mitre.org",
|
||||||
"published": "2024-05-15T20:15:13.460",
|
"published": "2024-05-15T20:15:13.460",
|
||||||
"lastModified": "2024-05-23T20:42:22.080",
|
"lastModified": "2024-08-28T21:35:11.000",
|
||||||
"vulnStatus": "Analyzed",
|
"vulnStatus": "Modified",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
@ -36,6 +36,26 @@
|
|||||||
},
|
},
|
||||||
"exploitabilityScore": 2.3,
|
"exploitabilityScore": 2.3,
|
||||||
"impactScore": 2.7
|
"impactScore": 2.7
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||||
|
"type": "Secondary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L",
|
||||||
|
"attackVector": "NETWORK",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "NONE",
|
||||||
|
"userInteraction": "REQUIRED",
|
||||||
|
"scope": "UNCHANGED",
|
||||||
|
"confidentialityImpact": "LOW",
|
||||||
|
"integrityImpact": "LOW",
|
||||||
|
"availabilityImpact": "LOW",
|
||||||
|
"baseScore": 6.3,
|
||||||
|
"baseSeverity": "MEDIUM"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 2.8,
|
||||||
|
"impactScore": 3.4
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
},
|
},
|
||||||
@ -53,6 +73,16 @@
|
|||||||
"value": "CWE-79"
|
"value": "CWE-79"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||||
|
"type": "Secondary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-79"
|
||||||
|
}
|
||||||
|
]
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"configurations": [
|
"configurations": [
|
||||||
|
@ -2,7 +2,7 @@
|
|||||||
"id": "CVE-2024-35344",
|
"id": "CVE-2024-35344",
|
||||||
"sourceIdentifier": "cve@mitre.org",
|
"sourceIdentifier": "cve@mitre.org",
|
||||||
"published": "2024-05-28T17:15:10.650",
|
"published": "2024-05-28T17:15:10.650",
|
||||||
"lastModified": "2024-05-29T13:02:09.280",
|
"lastModified": "2024-08-28T20:35:11.640",
|
||||||
"vulnStatus": "Awaiting Analysis",
|
"vulnStatus": "Awaiting Analysis",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
@ -15,7 +15,42 @@
|
|||||||
"value": "Ciertos productos Anpviz contienen una clave criptogr\u00e1fica codificada almacenada en el firmware del dispositivo. Esto afecta a IPC-D250, IPC-D260, IPC-B850, IPC-D850, IPC-D350, IPC-D3150, IPC-D4250, IPC-D380, IPC-D880, IPC-D280, IPC-D3180, MC800N, YM500L, Firmware YM800N_N2, YMF50B, YM800SV2, YM500L8 y YM200E10 v3.2.2.2 y versiones anteriores y posiblemente m\u00e1s proveedores/modelos de c\u00e1mara IP."
|
"value": "Ciertos productos Anpviz contienen una clave criptogr\u00e1fica codificada almacenada en el firmware del dispositivo. Esto afecta a IPC-D250, IPC-D260, IPC-B850, IPC-D850, IPC-D350, IPC-D3150, IPC-D4250, IPC-D380, IPC-D880, IPC-D280, IPC-D3180, MC800N, YM500L, Firmware YM800N_N2, YMF50B, YM800SV2, YM500L8 y YM200E10 v3.2.2.2 y versiones anteriores y posiblemente m\u00e1s proveedores/modelos de c\u00e1mara IP."
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"metrics": {},
|
"metrics": {
|
||||||
|
"cvssMetricV31": [
|
||||||
|
{
|
||||||
|
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||||
|
"type": "Secondary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H",
|
||||||
|
"attackVector": "NETWORK",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "LOW",
|
||||||
|
"userInteraction": "NONE",
|
||||||
|
"scope": "CHANGED",
|
||||||
|
"confidentialityImpact": "HIGH",
|
||||||
|
"integrityImpact": "HIGH",
|
||||||
|
"availabilityImpact": "HIGH",
|
||||||
|
"baseScore": 9.9,
|
||||||
|
"baseSeverity": "CRITICAL"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 3.1,
|
||||||
|
"impactScore": 6.0
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"weaknesses": [
|
||||||
|
{
|
||||||
|
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||||
|
"type": "Secondary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-321"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
"references": [
|
"references": [
|
||||||
{
|
{
|
||||||
"url": "https://willgu.es/pages/anpviz-ip-camera-vuln.html",
|
"url": "https://willgu.es/pages/anpviz-ip-camera-vuln.html",
|
||||||
|
@ -2,8 +2,8 @@
|
|||||||
"id": "CVE-2024-37325",
|
"id": "CVE-2024-37325",
|
||||||
"sourceIdentifier": "secure@microsoft.com",
|
"sourceIdentifier": "secure@microsoft.com",
|
||||||
"published": "2024-06-11T17:16:04.477",
|
"published": "2024-06-11T17:16:04.477",
|
||||||
"lastModified": "2024-06-13T18:36:09.013",
|
"lastModified": "2024-08-28T21:29:34.533",
|
||||||
"vulnStatus": "Undergoing Analysis",
|
"vulnStatus": "Analyzed",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
@ -40,6 +40,16 @@
|
|||||||
]
|
]
|
||||||
},
|
},
|
||||||
"weaknesses": [
|
"weaknesses": [
|
||||||
|
{
|
||||||
|
"source": "nvd@nist.gov",
|
||||||
|
"type": "Primary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "NVD-CWE-noinfo"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"source": "secure@microsoft.com",
|
"source": "secure@microsoft.com",
|
||||||
"type": "Secondary",
|
"type": "Secondary",
|
||||||
@ -51,10 +61,31 @@
|
|||||||
]
|
]
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"references": [
|
"configurations": [
|
||||||
{
|
{
|
||||||
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-37325",
|
"nodes": [
|
||||||
"source": "secure@microsoft.com"
|
{
|
||||||
|
"operator": "OR",
|
||||||
|
"negate": false,
|
||||||
|
"cpeMatch": [
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:a:microsoft:azure_data_science_virtual_machine:*:*:*:*:*:linux:*:*",
|
||||||
|
"versionEndExcluding": "24.05.24",
|
||||||
|
"matchCriteriaId": "5CB6563E-EAC9-41D9-A809-930BC0A40DF7"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-37325",
|
||||||
|
"source": "secure@microsoft.com",
|
||||||
|
"tags": [
|
||||||
|
"Vendor Advisory"
|
||||||
|
]
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
@ -2,8 +2,8 @@
|
|||||||
"id": "CVE-2024-42462",
|
"id": "CVE-2024-42462",
|
||||||
"sourceIdentifier": "80f39f49-2521-4ee7-9e17-af5d55e8032f",
|
"sourceIdentifier": "80f39f49-2521-4ee7-9e17-af5d55e8032f",
|
||||||
"published": "2024-08-16T14:15:13.253",
|
"published": "2024-08-16T14:15:13.253",
|
||||||
"lastModified": "2024-08-19T13:00:23.117",
|
"lastModified": "2024-08-28T20:46:39.227",
|
||||||
"vulnStatus": "Undergoing Analysis",
|
"vulnStatus": "Analyzed",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
@ -59,9 +59,41 @@
|
|||||||
"baseSeverity": "CRITICAL"
|
"baseSeverity": "CRITICAL"
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
],
|
||||||
|
"cvssMetricV31": [
|
||||||
|
{
|
||||||
|
"source": "nvd@nist.gov",
|
||||||
|
"type": "Primary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||||
|
"attackVector": "NETWORK",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "NONE",
|
||||||
|
"userInteraction": "NONE",
|
||||||
|
"scope": "UNCHANGED",
|
||||||
|
"confidentialityImpact": "HIGH",
|
||||||
|
"integrityImpact": "HIGH",
|
||||||
|
"availabilityImpact": "HIGH",
|
||||||
|
"baseScore": 9.8,
|
||||||
|
"baseSeverity": "CRITICAL"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 3.9,
|
||||||
|
"impactScore": 5.9
|
||||||
|
}
|
||||||
]
|
]
|
||||||
},
|
},
|
||||||
"weaknesses": [
|
"weaknesses": [
|
||||||
|
{
|
||||||
|
"source": "nvd@nist.gov",
|
||||||
|
"type": "Primary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-287"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"source": "80f39f49-2521-4ee7-9e17-af5d55e8032f",
|
"source": "80f39f49-2521-4ee7-9e17-af5d55e8032f",
|
||||||
"type": "Secondary",
|
"type": "Secondary",
|
||||||
@ -73,10 +105,31 @@
|
|||||||
]
|
]
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"references": [
|
"configurations": [
|
||||||
{
|
{
|
||||||
"url": "https://support.upkeeper.se/hc/en-us/articles/15432045399452-CVE-2024-42462-Bypass-multifactor-authentication",
|
"nodes": [
|
||||||
"source": "80f39f49-2521-4ee7-9e17-af5d55e8032f"
|
{
|
||||||
|
"operator": "OR",
|
||||||
|
"negate": false,
|
||||||
|
"cpeMatch": [
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:a:upkeeper:upkeeper_manager:*:*:*:*:*:*:*:*",
|
||||||
|
"versionEndExcluding": "5.1.10",
|
||||||
|
"matchCriteriaId": "B73FC0BE-7AD4-4C24-B884-EDFA4E70B0E0"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://support.upkeeper.se/hc/en-us/articles/15432045399452-CVE-2024-42462-Bypass-multifactor-authentication",
|
||||||
|
"source": "80f39f49-2521-4ee7-9e17-af5d55e8032f",
|
||||||
|
"tags": [
|
||||||
|
"Vendor Advisory"
|
||||||
|
]
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
@ -2,8 +2,8 @@
|
|||||||
"id": "CVE-2024-42463",
|
"id": "CVE-2024-42463",
|
||||||
"sourceIdentifier": "80f39f49-2521-4ee7-9e17-af5d55e8032f",
|
"sourceIdentifier": "80f39f49-2521-4ee7-9e17-af5d55e8032f",
|
||||||
"published": "2024-08-16T14:15:13.650",
|
"published": "2024-08-16T14:15:13.650",
|
||||||
"lastModified": "2024-08-19T13:00:23.117",
|
"lastModified": "2024-08-28T20:38:25.227",
|
||||||
"vulnStatus": "Undergoing Analysis",
|
"vulnStatus": "Analyzed",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
@ -59,9 +59,41 @@
|
|||||||
"baseSeverity": "HIGH"
|
"baseSeverity": "HIGH"
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
],
|
||||||
|
"cvssMetricV31": [
|
||||||
|
{
|
||||||
|
"source": "nvd@nist.gov",
|
||||||
|
"type": "Primary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
|
||||||
|
"attackVector": "NETWORK",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "LOW",
|
||||||
|
"userInteraction": "NONE",
|
||||||
|
"scope": "UNCHANGED",
|
||||||
|
"confidentialityImpact": "HIGH",
|
||||||
|
"integrityImpact": "NONE",
|
||||||
|
"availabilityImpact": "NONE",
|
||||||
|
"baseScore": 6.5,
|
||||||
|
"baseSeverity": "MEDIUM"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 2.8,
|
||||||
|
"impactScore": 3.6
|
||||||
|
}
|
||||||
]
|
]
|
||||||
},
|
},
|
||||||
"weaknesses": [
|
"weaknesses": [
|
||||||
|
{
|
||||||
|
"source": "nvd@nist.gov",
|
||||||
|
"type": "Primary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-639"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"source": "80f39f49-2521-4ee7-9e17-af5d55e8032f",
|
"source": "80f39f49-2521-4ee7-9e17-af5d55e8032f",
|
||||||
"type": "Secondary",
|
"type": "Secondary",
|
||||||
@ -73,10 +105,31 @@
|
|||||||
]
|
]
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"references": [
|
"configurations": [
|
||||||
{
|
{
|
||||||
"url": "https://support.upkeeper.se/hc/en-us/articles/15432241822620-CVE-2024-42463-Leak-of-organizations-messages",
|
"nodes": [
|
||||||
"source": "80f39f49-2521-4ee7-9e17-af5d55e8032f"
|
{
|
||||||
|
"operator": "OR",
|
||||||
|
"negate": false,
|
||||||
|
"cpeMatch": [
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:a:upkeeper:upkeeper_manager:*:*:*:*:*:*:*:*",
|
||||||
|
"versionEndExcluding": "5.1.10",
|
||||||
|
"matchCriteriaId": "B73FC0BE-7AD4-4C24-B884-EDFA4E70B0E0"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://support.upkeeper.se/hc/en-us/articles/15432241822620-CVE-2024-42463-Leak-of-organizations-messages",
|
||||||
|
"source": "80f39f49-2521-4ee7-9e17-af5d55e8032f",
|
||||||
|
"tags": [
|
||||||
|
"Vendor Advisory"
|
||||||
|
]
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
@ -2,8 +2,8 @@
|
|||||||
"id": "CVE-2024-42464",
|
"id": "CVE-2024-42464",
|
||||||
"sourceIdentifier": "80f39f49-2521-4ee7-9e17-af5d55e8032f",
|
"sourceIdentifier": "80f39f49-2521-4ee7-9e17-af5d55e8032f",
|
||||||
"published": "2024-08-16T14:15:13.933",
|
"published": "2024-08-16T14:15:13.933",
|
||||||
"lastModified": "2024-08-19T13:00:23.117",
|
"lastModified": "2024-08-28T20:35:52.940",
|
||||||
"vulnStatus": "Undergoing Analysis",
|
"vulnStatus": "Analyzed",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
@ -59,9 +59,41 @@
|
|||||||
"baseSeverity": "HIGH"
|
"baseSeverity": "HIGH"
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
],
|
||||||
|
"cvssMetricV31": [
|
||||||
|
{
|
||||||
|
"source": "nvd@nist.gov",
|
||||||
|
"type": "Primary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
|
||||||
|
"attackVector": "NETWORK",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "LOW",
|
||||||
|
"userInteraction": "NONE",
|
||||||
|
"scope": "UNCHANGED",
|
||||||
|
"confidentialityImpact": "HIGH",
|
||||||
|
"integrityImpact": "NONE",
|
||||||
|
"availabilityImpact": "NONE",
|
||||||
|
"baseScore": 6.5,
|
||||||
|
"baseSeverity": "MEDIUM"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 2.8,
|
||||||
|
"impactScore": 3.6
|
||||||
|
}
|
||||||
]
|
]
|
||||||
},
|
},
|
||||||
"weaknesses": [
|
"weaknesses": [
|
||||||
|
{
|
||||||
|
"source": "nvd@nist.gov",
|
||||||
|
"type": "Primary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-639"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"source": "80f39f49-2521-4ee7-9e17-af5d55e8032f",
|
"source": "80f39f49-2521-4ee7-9e17-af5d55e8032f",
|
||||||
"type": "Secondary",
|
"type": "Secondary",
|
||||||
@ -73,10 +105,31 @@
|
|||||||
]
|
]
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"references": [
|
"configurations": [
|
||||||
{
|
{
|
||||||
"url": "https://support.upkeeper.se/hc/en-us/articles/15432275702044-CVE-2024-42464-Leak-of-user-Information",
|
"nodes": [
|
||||||
"source": "80f39f49-2521-4ee7-9e17-af5d55e8032f"
|
{
|
||||||
|
"operator": "OR",
|
||||||
|
"negate": false,
|
||||||
|
"cpeMatch": [
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:a:upkeeper:upkeeper_manager:*:*:*:*:*:*:*:*",
|
||||||
|
"versionEndExcluding": "5.1.10",
|
||||||
|
"matchCriteriaId": "B73FC0BE-7AD4-4C24-B884-EDFA4E70B0E0"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://support.upkeeper.se/hc/en-us/articles/15432275702044-CVE-2024-42464-Leak-of-user-Information",
|
||||||
|
"source": "80f39f49-2521-4ee7-9e17-af5d55e8032f",
|
||||||
|
"tags": [
|
||||||
|
"Vendor Advisory"
|
||||||
|
]
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
@ -2,8 +2,8 @@
|
|||||||
"id": "CVE-2024-42465",
|
"id": "CVE-2024-42465",
|
||||||
"sourceIdentifier": "80f39f49-2521-4ee7-9e17-af5d55e8032f",
|
"sourceIdentifier": "80f39f49-2521-4ee7-9e17-af5d55e8032f",
|
||||||
"published": "2024-08-16T14:15:14.133",
|
"published": "2024-08-16T14:15:14.133",
|
||||||
"lastModified": "2024-08-19T13:00:23.117",
|
"lastModified": "2024-08-28T20:32:31.737",
|
||||||
"vulnStatus": "Undergoing Analysis",
|
"vulnStatus": "Analyzed",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
@ -59,9 +59,41 @@
|
|||||||
"baseSeverity": "CRITICAL"
|
"baseSeverity": "CRITICAL"
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
],
|
||||||
|
"cvssMetricV31": [
|
||||||
|
{
|
||||||
|
"source": "nvd@nist.gov",
|
||||||
|
"type": "Primary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||||
|
"attackVector": "NETWORK",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "NONE",
|
||||||
|
"userInteraction": "NONE",
|
||||||
|
"scope": "UNCHANGED",
|
||||||
|
"confidentialityImpact": "HIGH",
|
||||||
|
"integrityImpact": "HIGH",
|
||||||
|
"availabilityImpact": "HIGH",
|
||||||
|
"baseScore": 9.8,
|
||||||
|
"baseSeverity": "CRITICAL"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 3.9,
|
||||||
|
"impactScore": 5.9
|
||||||
|
}
|
||||||
]
|
]
|
||||||
},
|
},
|
||||||
"weaknesses": [
|
"weaknesses": [
|
||||||
|
{
|
||||||
|
"source": "nvd@nist.gov",
|
||||||
|
"type": "Primary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-307"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"source": "80f39f49-2521-4ee7-9e17-af5d55e8032f",
|
"source": "80f39f49-2521-4ee7-9e17-af5d55e8032f",
|
||||||
"type": "Secondary",
|
"type": "Secondary",
|
||||||
@ -73,10 +105,31 @@
|
|||||||
]
|
]
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"references": [
|
"configurations": [
|
||||||
{
|
{
|
||||||
"url": "https://support.upkeeper.se/hc/en-us/articles/15432332385564-CVE-2024-42465-Lack-of-resources-and-rate-limiting-two-factor-authentication",
|
"nodes": [
|
||||||
"source": "80f39f49-2521-4ee7-9e17-af5d55e8032f"
|
{
|
||||||
|
"operator": "OR",
|
||||||
|
"negate": false,
|
||||||
|
"cpeMatch": [
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:a:upkeeper:upkeeper_manager:*:*:*:*:*:*:*:*",
|
||||||
|
"versionEndIncluding": "5.1.10",
|
||||||
|
"matchCriteriaId": "89DE4E9D-0FC2-459B-95C7-93830E885A9E"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://support.upkeeper.se/hc/en-us/articles/15432332385564-CVE-2024-42465-Lack-of-resources-and-rate-limiting-two-factor-authentication",
|
||||||
|
"source": "80f39f49-2521-4ee7-9e17-af5d55e8032f",
|
||||||
|
"tags": [
|
||||||
|
"Vendor Advisory"
|
||||||
|
]
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
@ -2,8 +2,8 @@
|
|||||||
"id": "CVE-2024-42466",
|
"id": "CVE-2024-42466",
|
||||||
"sourceIdentifier": "80f39f49-2521-4ee7-9e17-af5d55e8032f",
|
"sourceIdentifier": "80f39f49-2521-4ee7-9e17-af5d55e8032f",
|
||||||
"published": "2024-08-16T14:15:14.343",
|
"published": "2024-08-16T14:15:14.343",
|
||||||
"lastModified": "2024-08-19T13:00:23.117",
|
"lastModified": "2024-08-28T20:48:14.917",
|
||||||
"vulnStatus": "Undergoing Analysis",
|
"vulnStatus": "Analyzed",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
@ -59,9 +59,41 @@
|
|||||||
"baseSeverity": "CRITICAL"
|
"baseSeverity": "CRITICAL"
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
],
|
||||||
|
"cvssMetricV31": [
|
||||||
|
{
|
||||||
|
"source": "nvd@nist.gov",
|
||||||
|
"type": "Primary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||||
|
"attackVector": "NETWORK",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "NONE",
|
||||||
|
"userInteraction": "NONE",
|
||||||
|
"scope": "UNCHANGED",
|
||||||
|
"confidentialityImpact": "HIGH",
|
||||||
|
"integrityImpact": "HIGH",
|
||||||
|
"availabilityImpact": "HIGH",
|
||||||
|
"baseScore": 9.8,
|
||||||
|
"baseSeverity": "CRITICAL"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 3.9,
|
||||||
|
"impactScore": 5.9
|
||||||
|
}
|
||||||
]
|
]
|
||||||
},
|
},
|
||||||
"weaknesses": [
|
"weaknesses": [
|
||||||
|
{
|
||||||
|
"source": "nvd@nist.gov",
|
||||||
|
"type": "Primary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-307"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"source": "80f39f49-2521-4ee7-9e17-af5d55e8032f",
|
"source": "80f39f49-2521-4ee7-9e17-af5d55e8032f",
|
||||||
"type": "Secondary",
|
"type": "Secondary",
|
||||||
@ -73,10 +105,31 @@
|
|||||||
]
|
]
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"references": [
|
"configurations": [
|
||||||
{
|
{
|
||||||
"url": "https://support.upkeeper.se/hc/en-us/articles/15432408367260-CVE-2024-42466-Lack-of-resources-and-rate-limiting-login",
|
"nodes": [
|
||||||
"source": "80f39f49-2521-4ee7-9e17-af5d55e8032f"
|
{
|
||||||
|
"operator": "OR",
|
||||||
|
"negate": false,
|
||||||
|
"cpeMatch": [
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:a:upkeeper:upkeeper_manager:*:*:*:*:*:*:*:*",
|
||||||
|
"versionEndExcluding": "5.1.10",
|
||||||
|
"matchCriteriaId": "B73FC0BE-7AD4-4C24-B884-EDFA4E70B0E0"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://support.upkeeper.se/hc/en-us/articles/15432408367260-CVE-2024-42466-Lack-of-resources-and-rate-limiting-login",
|
||||||
|
"source": "80f39f49-2521-4ee7-9e17-af5d55e8032f",
|
||||||
|
"tags": [
|
||||||
|
"Vendor Advisory"
|
||||||
|
]
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
60
CVE-2024/CVE-2024-427xx/CVE-2024-42793.json
Normal file
60
CVE-2024/CVE-2024-427xx/CVE-2024-42793.json
Normal file
@ -0,0 +1,60 @@
|
|||||||
|
{
|
||||||
|
"id": "CVE-2024-42793",
|
||||||
|
"sourceIdentifier": "cve@mitre.org",
|
||||||
|
"published": "2024-08-28T20:15:07.707",
|
||||||
|
"lastModified": "2024-08-28T20:35:12.570",
|
||||||
|
"vulnStatus": "Received",
|
||||||
|
"cveTags": [],
|
||||||
|
"descriptions": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "A Cross-Site Request Forgery (CSRF) vulnerability was found in Kashipara Music Management System v1.0 via a crafted request to the /music/ajax.php?action=save_user page."
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"metrics": {
|
||||||
|
"cvssMetricV31": [
|
||||||
|
{
|
||||||
|
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||||
|
"type": "Secondary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
|
||||||
|
"attackVector": "NETWORK",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "LOW",
|
||||||
|
"userInteraction": "REQUIRED",
|
||||||
|
"scope": "CHANGED",
|
||||||
|
"confidentialityImpact": "LOW",
|
||||||
|
"integrityImpact": "LOW",
|
||||||
|
"availabilityImpact": "NONE",
|
||||||
|
"baseScore": 5.4,
|
||||||
|
"baseSeverity": "MEDIUM"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 2.3,
|
||||||
|
"impactScore": 2.7
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"weaknesses": [
|
||||||
|
{
|
||||||
|
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||||
|
"type": "Secondary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-352"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://github.com/takekaramey/CVE_Writeup/blob/main/Kashipara/Music%20Management%20System%20v1.0/CSRF%20-%20Edit%20User.pdf",
|
||||||
|
"source": "cve@mitre.org"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://www.kashipara.com/project/php/12978/music-management-system-in-php-php-project-source-code",
|
||||||
|
"source": "cve@mitre.org"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
@ -2,13 +2,17 @@
|
|||||||
"id": "CVE-2024-42851",
|
"id": "CVE-2024-42851",
|
||||||
"sourceIdentifier": "cve@mitre.org",
|
"sourceIdentifier": "cve@mitre.org",
|
||||||
"published": "2024-08-27T18:15:14.993",
|
"published": "2024-08-27T18:15:14.993",
|
||||||
"lastModified": "2024-08-27T19:35:28.000",
|
"lastModified": "2024-08-28T20:15:07.787",
|
||||||
"vulnStatus": "Awaiting Analysis",
|
"vulnStatus": "Undergoing Analysis",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
"lang": "en",
|
"lang": "en",
|
||||||
"value": "Buffer Overflow vulnerability in open source exiftags v.1.01 allows a local attacker to execute arbitrary code via the paresetag function."
|
"value": "Buffer Overflow vulnerability in open source exiftags v.1.01 allows a local attacker to execute arbitrary code via the paresetag function."
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"lang": "es",
|
||||||
|
"value": "La vulnerabilidad de desbordamiento de b\u00fafer en exiftags de c\u00f3digo abierto v.1.01 permite a un atacante local ejecutar c\u00f3digo arbitrario a trav\u00e9s de la funci\u00f3n paresetag."
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"metrics": {
|
"metrics": {
|
||||||
@ -49,7 +53,7 @@
|
|||||||
],
|
],
|
||||||
"references": [
|
"references": [
|
||||||
{
|
{
|
||||||
"url": "https://github.com/T1anyang/fuzzing/blob/main/exiftags/crash.md",
|
"url": "https://github.com/T1anyang/fuzzing/tree/main/exiftags",
|
||||||
"source": "cve@mitre.org"
|
"source": "cve@mitre.org"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
|
@ -2,19 +2,23 @@
|
|||||||
"id": "CVE-2024-42913",
|
"id": "CVE-2024-42913",
|
||||||
"sourceIdentifier": "cve@mitre.org",
|
"sourceIdentifier": "cve@mitre.org",
|
||||||
"published": "2024-08-26T18:15:07.283",
|
"published": "2024-08-26T18:15:07.283",
|
||||||
"lastModified": "2024-08-26T19:10:09.607",
|
"lastModified": "2024-08-28T20:15:07.880",
|
||||||
"vulnStatus": "Awaiting Analysis",
|
"vulnStatus": "Undergoing Analysis",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
"lang": "en",
|
"lang": "en",
|
||||||
"value": "RuoYi CMS v4.7.9 was discovered to contain a SQL injection vulnerability via the job_id parameter at /sasfs1."
|
"value": "RuoYi CMS v4.7.9 was discovered to contain a SQL injection vulnerability via the job_id parameter at /sasfs1."
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"lang": "es",
|
||||||
|
"value": "Se descubri\u00f3 que RuoYi CMS v4.7.9 contiene una vulnerabilidad de inyecci\u00f3n SQL a trav\u00e9s del par\u00e1metro job_id en /sasfs1."
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"metrics": {},
|
"metrics": {},
|
||||||
"references": [
|
"references": [
|
||||||
{
|
{
|
||||||
"url": "https://github.com/yangzongzhuan/RuoYi",
|
"url": "https://github.com/kkll5875",
|
||||||
"source": "cve@mitre.org"
|
"source": "cve@mitre.org"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
|
56
CVE-2024/CVE-2024-438xx/CVE-2024-43805.json
Normal file
56
CVE-2024/CVE-2024-438xx/CVE-2024-43805.json
Normal file
@ -0,0 +1,56 @@
|
|||||||
|
{
|
||||||
|
"id": "CVE-2024-43805",
|
||||||
|
"sourceIdentifier": "security-advisories@github.com",
|
||||||
|
"published": "2024-08-28T20:15:07.963",
|
||||||
|
"lastModified": "2024-08-28T20:15:07.963",
|
||||||
|
"vulnStatus": "Received",
|
||||||
|
"cveTags": [],
|
||||||
|
"descriptions": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "jupyterlab is an extensible environment for interactive and reproducible computing, based on the Jupyter Notebook Architecture. This vulnerability depends on user interaction by opening a malicious notebook with Markdown cells, or Markdown file using JupyterLab preview feature. A malicious user can access any data that the attacked user has access to as well as perform arbitrary requests acting as the attacked user. JupyterLab v3.6.8, v4.2.5 and Jupyter Notebook v7.2.2 have been patched to resolve this issue. Users are advised to upgrade. There is no workaround for the underlying DOM Clobbering susceptibility. However, select plugins can be disabled on deployments which cannot update in a timely fashion to minimise the risk. These are: 1. `@jupyterlab/mathjax-extension:plugin` - users will loose ability to preview mathematical equations. 2. `@jupyterlab/markdownviewer-extension:plugin` - users will loose ability to open Markdown previews. 3. `@jupyterlab/mathjax2-extension:plugin` (if installed with optional `jupyterlab-mathjax2` package) - an older version of the mathjax plugin for JupyterLab 4.x. To disable these extensions run: ```jupyter labextension disable @jupyterlab/markdownviewer-extension:plugin && jupyter labextension disable @jupyterlab/mathjax-extension:plugin && jupyter labextension disable @jupyterlab/mathjax2-extension:plugin ``` in bash."
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"metrics": {
|
||||||
|
"cvssMetricV31": [
|
||||||
|
{
|
||||||
|
"source": "security-advisories@github.com",
|
||||||
|
"type": "Secondary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:L/A:L",
|
||||||
|
"attackVector": "NETWORK",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "NONE",
|
||||||
|
"userInteraction": "REQUIRED",
|
||||||
|
"scope": "UNCHANGED",
|
||||||
|
"confidentialityImpact": "HIGH",
|
||||||
|
"integrityImpact": "LOW",
|
||||||
|
"availabilityImpact": "LOW",
|
||||||
|
"baseScore": 7.6,
|
||||||
|
"baseSeverity": "HIGH"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 2.8,
|
||||||
|
"impactScore": 4.7
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"weaknesses": [
|
||||||
|
{
|
||||||
|
"source": "security-advisories@github.com",
|
||||||
|
"type": "Secondary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-79"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://github.com/jupyterlab/jupyterlab/security/advisories/GHSA-9q39-rmj3-p4r2",
|
||||||
|
"source": "security-advisories@github.com"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
56
CVE-2024/CVE-2024-447xx/CVE-2024-44760.json
Normal file
56
CVE-2024/CVE-2024-447xx/CVE-2024-44760.json
Normal file
@ -0,0 +1,56 @@
|
|||||||
|
{
|
||||||
|
"id": "CVE-2024-44760",
|
||||||
|
"sourceIdentifier": "cve@mitre.org",
|
||||||
|
"published": "2024-08-28T20:15:08.230",
|
||||||
|
"lastModified": "2024-08-28T21:35:14.657",
|
||||||
|
"vulnStatus": "Received",
|
||||||
|
"cveTags": [],
|
||||||
|
"descriptions": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "Incorrect access control in the component /servlet/SnoopServlet of Shenzhou News Union Enterprise Management System v5.0 through v18.8 allows attackers to access sensitive information regarding the server."
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"metrics": {
|
||||||
|
"cvssMetricV31": [
|
||||||
|
{
|
||||||
|
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||||
|
"type": "Secondary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N",
|
||||||
|
"attackVector": "NETWORK",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "NONE",
|
||||||
|
"userInteraction": "NONE",
|
||||||
|
"scope": "UNCHANGED",
|
||||||
|
"confidentialityImpact": "HIGH",
|
||||||
|
"integrityImpact": "HIGH",
|
||||||
|
"availabilityImpact": "NONE",
|
||||||
|
"baseScore": 9.1,
|
||||||
|
"baseSeverity": "CRITICAL"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 3.9,
|
||||||
|
"impactScore": 5.2
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"weaknesses": [
|
||||||
|
{
|
||||||
|
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||||
|
"type": "Secondary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-276"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://github.com/WarmBrew/web_vul/blob/main/SunmoEMS/SunmoEMS-info.md",
|
||||||
|
"source": "cve@mitre.org"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
@ -2,7 +2,7 @@
|
|||||||
"id": "CVE-2024-44761",
|
"id": "CVE-2024-44761",
|
||||||
"sourceIdentifier": "cve@mitre.org",
|
"sourceIdentifier": "cve@mitre.org",
|
||||||
"published": "2024-08-28T19:15:08.933",
|
"published": "2024-08-28T19:15:08.933",
|
||||||
"lastModified": "2024-08-28T19:15:08.933",
|
"lastModified": "2024-08-28T20:35:14.040",
|
||||||
"vulnStatus": "Received",
|
"vulnStatus": "Received",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
@ -11,7 +11,42 @@
|
|||||||
"value": "An issue in EQ Enterprise Management System before v2.0.0 allows attackers to execute a directory traversal via crafted requests."
|
"value": "An issue in EQ Enterprise Management System before v2.0.0 allows attackers to execute a directory traversal via crafted requests."
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"metrics": {},
|
"metrics": {
|
||||||
|
"cvssMetricV31": [
|
||||||
|
{
|
||||||
|
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||||
|
"type": "Secondary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H",
|
||||||
|
"attackVector": "NETWORK",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "LOW",
|
||||||
|
"userInteraction": "NONE",
|
||||||
|
"scope": "CHANGED",
|
||||||
|
"confidentialityImpact": "HIGH",
|
||||||
|
"integrityImpact": "HIGH",
|
||||||
|
"availabilityImpact": "HIGH",
|
||||||
|
"baseScore": 9.9,
|
||||||
|
"baseSeverity": "CRITICAL"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 3.1,
|
||||||
|
"impactScore": 6.0
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"weaknesses": [
|
||||||
|
{
|
||||||
|
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||||
|
"type": "Secondary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-89"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
"references": [
|
"references": [
|
||||||
{
|
{
|
||||||
"url": "https://github.com/WarmBrew/web_vul/blob/main/EQ/EQEMS.md",
|
"url": "https://github.com/WarmBrew/web_vul/blob/main/EQ/EQEMS.md",
|
||||||
|
92
CVE-2024/CVE-2024-450xx/CVE-2024-45043.json
Normal file
92
CVE-2024/CVE-2024-450xx/CVE-2024-45043.json
Normal file
@ -0,0 +1,92 @@
|
|||||||
|
{
|
||||||
|
"id": "CVE-2024-45043",
|
||||||
|
"sourceIdentifier": "security-advisories@github.com",
|
||||||
|
"published": "2024-08-28T20:15:08.347",
|
||||||
|
"lastModified": "2024-08-28T20:15:08.347",
|
||||||
|
"vulnStatus": "Received",
|
||||||
|
"cveTags": [],
|
||||||
|
"descriptions": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "The OpenTelemetry Collector module AWS firehose receiver is for ingesting AWS Kinesis Data Firehose delivery stream messages and parsing the records received based on the configured record type. `awsfirehosereceiver` allows unauthenticated remote requests, even when configured to require a key. OpenTelemetry Collector can be configured to receive CloudWatch metrics via an AWS Firehose Stream. Firehose sets the header `X-Amz-Firehose-Access-Key` with an arbitrary configured string. The OpenTelemetry Collector awsfirehosereceiver can optionally be configured to require this key on incoming requests. However, when this is configured it **still accepts incoming requests with no key**. Only OpenTelemetry Collector users configured with the \u201calpha\u201d `awsfirehosereceiver` module are affected. This module was added in version v0.49.0 of the \u201cContrib\u201d distribution (or may be included in custom builds). There is a risk of unauthorized users writing metrics. Carefully crafted metrics could hide other malicious activity. There is no risk of exfiltrating data. It\u2019s likely these endpoints will be exposed to the public internet, as Firehose does not support private HTTP endpoints. A fix was introduced in PR #34847 and released with v0.108.0. All users are advised to upgrade. There are no known workarounds for this vulnerability."
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"metrics": {
|
||||||
|
"cvssMetricV31": [
|
||||||
|
{
|
||||||
|
"source": "security-advisories@github.com",
|
||||||
|
"type": "Secondary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N",
|
||||||
|
"attackVector": "NETWORK",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "NONE",
|
||||||
|
"userInteraction": "NONE",
|
||||||
|
"scope": "UNCHANGED",
|
||||||
|
"confidentialityImpact": "NONE",
|
||||||
|
"integrityImpact": "LOW",
|
||||||
|
"availabilityImpact": "NONE",
|
||||||
|
"baseScore": 5.3,
|
||||||
|
"baseSeverity": "MEDIUM"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 3.9,
|
||||||
|
"impactScore": 1.4
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"weaknesses": [
|
||||||
|
{
|
||||||
|
"source": "security-advisories@github.com",
|
||||||
|
"type": "Secondary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-200"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-863"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://docs.aws.amazon.com/firehose/latest/dev/controlling-access.html#using-iam-http",
|
||||||
|
"source": "security-advisories@github.com"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://docs.aws.amazon.com/firehose/latest/dev/httpdeliveryrequestresponse.html",
|
||||||
|
"source": "security-advisories@github.com"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://github.com/open-telemetry/opentelemetry-collector#alpha",
|
||||||
|
"source": "security-advisories@github.com"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://github.com/open-telemetry/opentelemetry-collector-contrib/pull/34847",
|
||||||
|
"source": "security-advisories@github.com"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://github.com/open-telemetry/opentelemetry-collector-contrib/security/advisories/GHSA-prf6-xjxh-p698",
|
||||||
|
"source": "security-advisories@github.com"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://github.com/open-telemetry/opentelemetry-collector-contrib/tree/main/receiver/awsfirehosereceiver",
|
||||||
|
"source": "security-advisories@github.com"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://github.com/open-telemetry/opentelemetry-collector-releases/pull/74",
|
||||||
|
"source": "security-advisories@github.com"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://github.com/open-telemetry/opentelemetry-collector-releases/releases/tag/v0.108.0",
|
||||||
|
"source": "security-advisories@github.com"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://github.com/open-telemetry/opentelemetry-collector-releases/tree/main/distributions/otelcol-contrib",
|
||||||
|
"source": "security-advisories@github.com"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
64
CVE-2024/CVE-2024-450xx/CVE-2024-45046.json
Normal file
64
CVE-2024/CVE-2024-450xx/CVE-2024-45046.json
Normal file
@ -0,0 +1,64 @@
|
|||||||
|
{
|
||||||
|
"id": "CVE-2024-45046",
|
||||||
|
"sourceIdentifier": "security-advisories@github.com",
|
||||||
|
"published": "2024-08-28T21:15:06.603",
|
||||||
|
"lastModified": "2024-08-28T21:15:06.603",
|
||||||
|
"vulnStatus": "Received",
|
||||||
|
"cveTags": [],
|
||||||
|
"descriptions": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "PHPSpreadsheet is a pure PHP library for reading and writing spreadsheet files. In affected versions `\\PhpOffice\\PhpSpreadsheet\\Writer\\Html` doesn't sanitize spreadsheet styling information such as font names, allowing an attacker to inject arbitrary JavaScript on the page. As a result an attacker may used a crafted spreadsheet to fully takeover a session of a user viewing spreadsheet files as HTML. This issue has been addressed in release version 2.1.0. All users are advised to upgrade. There are no known workarounds for this vulnerability."
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"metrics": {
|
||||||
|
"cvssMetricV31": [
|
||||||
|
{
|
||||||
|
"source": "security-advisories@github.com",
|
||||||
|
"type": "Secondary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
|
||||||
|
"attackVector": "NETWORK",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "LOW",
|
||||||
|
"userInteraction": "REQUIRED",
|
||||||
|
"scope": "CHANGED",
|
||||||
|
"confidentialityImpact": "LOW",
|
||||||
|
"integrityImpact": "LOW",
|
||||||
|
"availabilityImpact": "NONE",
|
||||||
|
"baseScore": 5.4,
|
||||||
|
"baseSeverity": "MEDIUM"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 2.3,
|
||||||
|
"impactScore": 2.7
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"weaknesses": [
|
||||||
|
{
|
||||||
|
"source": "security-advisories@github.com",
|
||||||
|
"type": "Secondary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-79"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://github.com/PHPOffice/PhpSpreadsheet/commit/f7cf378faed2e11cf4825bf8bafea4922ae44667",
|
||||||
|
"source": "security-advisories@github.com"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://github.com/PHPOffice/PhpSpreadsheet/pull/3957",
|
||||||
|
"source": "security-advisories@github.com"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://github.com/PHPOffice/PhpSpreadsheet/security/advisories/GHSA-wgmf-q9vr-vww6",
|
||||||
|
"source": "security-advisories@github.com"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
60
CVE-2024/CVE-2024-450xx/CVE-2024-45048.json
Normal file
60
CVE-2024/CVE-2024-450xx/CVE-2024-45048.json
Normal file
@ -0,0 +1,60 @@
|
|||||||
|
{
|
||||||
|
"id": "CVE-2024-45048",
|
||||||
|
"sourceIdentifier": "security-advisories@github.com",
|
||||||
|
"published": "2024-08-28T21:15:06.817",
|
||||||
|
"lastModified": "2024-08-28T21:15:06.817",
|
||||||
|
"vulnStatus": "Received",
|
||||||
|
"cveTags": [],
|
||||||
|
"descriptions": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "PHPSpreadsheet is a pure PHP library for reading and writing spreadsheet files. Affected versions are subject to a bypassing of a filter which allows for an XXE-attack. This in turn allows attacker to obtain contents of local files, even if error reporting is muted. This vulnerability has been addressed in release version 2.2.1. All users are advised to upgrade. There are no known workarounds for this vulnerability."
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"metrics": {
|
||||||
|
"cvssMetricV31": [
|
||||||
|
{
|
||||||
|
"source": "security-advisories@github.com",
|
||||||
|
"type": "Secondary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||||||
|
"attackVector": "NETWORK",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "NONE",
|
||||||
|
"userInteraction": "REQUIRED",
|
||||||
|
"scope": "UNCHANGED",
|
||||||
|
"confidentialityImpact": "HIGH",
|
||||||
|
"integrityImpact": "HIGH",
|
||||||
|
"availabilityImpact": "HIGH",
|
||||||
|
"baseScore": 8.8,
|
||||||
|
"baseSeverity": "HIGH"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 2.8,
|
||||||
|
"impactScore": 5.9
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"weaknesses": [
|
||||||
|
{
|
||||||
|
"source": "security-advisories@github.com",
|
||||||
|
"type": "Secondary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-611"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://github.com/PHPOffice/PhpSpreadsheet/commit/bea2d4b30f24bcc8a7712e208d1359e603b45dda",
|
||||||
|
"source": "security-advisories@github.com"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://github.com/PHPOffice/PhpSpreadsheet/security/advisories/GHSA-ghg6-32f9-2jp7",
|
||||||
|
"source": "security-advisories@github.com"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
72
CVE-2024/CVE-2024-450xx/CVE-2024-45054.json
Normal file
72
CVE-2024/CVE-2024-450xx/CVE-2024-45054.json
Normal file
@ -0,0 +1,72 @@
|
|||||||
|
{
|
||||||
|
"id": "CVE-2024-45054",
|
||||||
|
"sourceIdentifier": "security-advisories@github.com",
|
||||||
|
"published": "2024-08-28T20:15:08.547",
|
||||||
|
"lastModified": "2024-08-28T20:15:08.547",
|
||||||
|
"vulnStatus": "Received",
|
||||||
|
"cveTags": [],
|
||||||
|
"descriptions": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "Hwameistor is an HA local storage system for cloud-native stateful workloads. This ClusterRole has * verbs of * resources. If a malicious user can access the worker node which has hwameistor's deployment, he/she can abuse these excessive permissions to do whatever he/she likes to the whole cluster, resulting in a cluster-level privilege escalation. This issue has been patched in version 0.14.6. All users are advised to upgrade. Users unable to upgrade should update and limit the ClusterRole using security-role."
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"metrics": {
|
||||||
|
"cvssMetricV31": [
|
||||||
|
{
|
||||||
|
"source": "security-advisories@github.com",
|
||||||
|
"type": "Secondary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:C/C:L/I:N/A:N",
|
||||||
|
"attackVector": "LOCAL",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "HIGH",
|
||||||
|
"userInteraction": "REQUIRED",
|
||||||
|
"scope": "CHANGED",
|
||||||
|
"confidentialityImpact": "LOW",
|
||||||
|
"integrityImpact": "NONE",
|
||||||
|
"availabilityImpact": "NONE",
|
||||||
|
"baseScore": 2.8,
|
||||||
|
"baseSeverity": "LOW"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 1.1,
|
||||||
|
"impactScore": 1.4
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"weaknesses": [
|
||||||
|
{
|
||||||
|
"source": "security-advisories@github.com",
|
||||||
|
"type": "Secondary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-200"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://github.com/hwameistor/hwameistor/blob/main/helm/hwameistor/templates/clusterrole.yaml",
|
||||||
|
"source": "security-advisories@github.com"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://github.com/hwameistor/hwameistor/commit/edf4cebed73cadd230bf97eab65c5311f2858450",
|
||||||
|
"source": "security-advisories@github.com"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://github.com/hwameistor/hwameistor/issues/1457",
|
||||||
|
"source": "security-advisories@github.com"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://github.com/hwameistor/hwameistor/issues/1460",
|
||||||
|
"source": "security-advisories@github.com"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://github.com/hwameistor/hwameistor/security/advisories/GHSA-mgwr-h7mv-fh29",
|
||||||
|
"source": "security-advisories@github.com"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
60
CVE-2024/CVE-2024-450xx/CVE-2024-45057.json
Normal file
60
CVE-2024/CVE-2024-450xx/CVE-2024-45057.json
Normal file
@ -0,0 +1,60 @@
|
|||||||
|
{
|
||||||
|
"id": "CVE-2024-45057",
|
||||||
|
"sourceIdentifier": "security-advisories@github.com",
|
||||||
|
"published": "2024-08-28T21:15:07.027",
|
||||||
|
"lastModified": "2024-08-28T21:15:07.027",
|
||||||
|
"vulnStatus": "Received",
|
||||||
|
"cveTags": [],
|
||||||
|
"descriptions": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "i-Educar is free, completely online school management software that allows school secretaries, teachers, coordinators and area managers. The lack of sanitization of user-controlled parameters for generating HTML field values \u200b\u200bdynamically leads to XSS (Cross-Site Scripting) attacks. The dynamic generation of HTML fields in the ieducar/intranet/include/clsCampos.inc.php file does not perform the correct validation or sanitization, reflecting the user-controlled values \u200b\u200bto be shown in the page's HTML. This allows an attacker to inject a specific XSS payload into a parameter. Successful exploitation of this flaw allows an attacker to trick the victim into clicking a vulnerable URL, enabling JavaScript scripts to be executed in the browser. Due to the configuration of session cookies, with the HttpOnly and SameSite=Lax flags being defined, there is little an attacker can do to steal the session or force the victim to perform actions within the application. This issue hast been patched but a new release has not yet been made. Users are advised to contact the developer and to coordinate an update schedule."
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"metrics": {
|
||||||
|
"cvssMetricV30": [
|
||||||
|
{
|
||||||
|
"source": "security-advisories@github.com",
|
||||||
|
"type": "Secondary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.0",
|
||||||
|
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L",
|
||||||
|
"attackVector": "NETWORK",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "NONE",
|
||||||
|
"userInteraction": "REQUIRED",
|
||||||
|
"scope": "UNCHANGED",
|
||||||
|
"confidentialityImpact": "LOW",
|
||||||
|
"integrityImpact": "LOW",
|
||||||
|
"availabilityImpact": "LOW",
|
||||||
|
"baseScore": 6.3,
|
||||||
|
"baseSeverity": "MEDIUM"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 2.8,
|
||||||
|
"impactScore": 3.4
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"weaknesses": [
|
||||||
|
{
|
||||||
|
"source": "security-advisories@github.com",
|
||||||
|
"type": "Secondary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-79"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://github.com/portabilis/i-educar/commit/f2d768534aabc09b2a1fc8a5cc5f9c93925cb273",
|
||||||
|
"source": "security-advisories@github.com"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://github.com/portabilis/i-educar/security/advisories/GHSA-fqwh-c3c8-7gwj",
|
||||||
|
"source": "security-advisories@github.com"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
60
CVE-2024/CVE-2024-450xx/CVE-2024-45058.json
Normal file
60
CVE-2024/CVE-2024-450xx/CVE-2024-45058.json
Normal file
@ -0,0 +1,60 @@
|
|||||||
|
{
|
||||||
|
"id": "CVE-2024-45058",
|
||||||
|
"sourceIdentifier": "security-advisories@github.com",
|
||||||
|
"published": "2024-08-28T21:15:07.283",
|
||||||
|
"lastModified": "2024-08-28T21:15:07.283",
|
||||||
|
"vulnStatus": "Received",
|
||||||
|
"cveTags": [],
|
||||||
|
"descriptions": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "i-Educar is free, completely online school management software that allows school secretaries, teachers, coordinators and area managers. An attacker with only minimal viewing privileges in the settings section is able to change their user type to Administrator (or another type with super-permissions). Any user is capable of becoming an administrator, which can lead to account theft, changing administrative tasks, etc. The failure occurs in the file located in ieducar/intranet/educar_usuario_cad.php on line 446 , which does not perform checks on the user's current permission level to make changes. This issue has not yet been patched. Users are advised to contact the developer and to coordinate an update schedule."
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"metrics": {
|
||||||
|
"cvssMetricV30": [
|
||||||
|
{
|
||||||
|
"source": "security-advisories@github.com",
|
||||||
|
"type": "Secondary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.0",
|
||||||
|
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N",
|
||||||
|
"attackVector": "NETWORK",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "LOW",
|
||||||
|
"userInteraction": "NONE",
|
||||||
|
"scope": "UNCHANGED",
|
||||||
|
"confidentialityImpact": "HIGH",
|
||||||
|
"integrityImpact": "HIGH",
|
||||||
|
"availabilityImpact": "NONE",
|
||||||
|
"baseScore": 8.1,
|
||||||
|
"baseSeverity": "HIGH"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 2.8,
|
||||||
|
"impactScore": 5.2
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"weaknesses": [
|
||||||
|
{
|
||||||
|
"source": "security-advisories@github.com",
|
||||||
|
"type": "Secondary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-20"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-269"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://github.com/portabilis/i-educar/security/advisories/GHSA-53vj-fq8x-2mvg",
|
||||||
|
"source": "security-advisories@github.com"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
64
CVE-2024/CVE-2024-450xx/CVE-2024-45059.json
Normal file
64
CVE-2024/CVE-2024-450xx/CVE-2024-45059.json
Normal file
@ -0,0 +1,64 @@
|
|||||||
|
{
|
||||||
|
"id": "CVE-2024-45059",
|
||||||
|
"sourceIdentifier": "security-advisories@github.com",
|
||||||
|
"published": "2024-08-28T21:15:07.473",
|
||||||
|
"lastModified": "2024-08-28T21:15:07.473",
|
||||||
|
"vulnStatus": "Received",
|
||||||
|
"cveTags": [],
|
||||||
|
"descriptions": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "i-Educar is free, completely online school management software that allows school secretaries, teachers, coordinators and area managers. In affected versions Creating a SQL query from a concatenation of a user-controlled GET parameter allows an attacker to manipulate the query. Successful exploitation of this flaw allows an attacker to have complete and unrestricted access to the database, with a web user with minimal permissions. This may involve obtaining user information, such as emails, password hashes, etc. This issue has not yet been patched. Users are advised to contact the developer and to coordinate an update schedule."
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"metrics": {
|
||||||
|
"cvssMetricV30": [
|
||||||
|
{
|
||||||
|
"source": "security-advisories@github.com",
|
||||||
|
"type": "Secondary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.0",
|
||||||
|
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||||
|
"attackVector": "NETWORK",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "LOW",
|
||||||
|
"userInteraction": "NONE",
|
||||||
|
"scope": "UNCHANGED",
|
||||||
|
"confidentialityImpact": "HIGH",
|
||||||
|
"integrityImpact": "HIGH",
|
||||||
|
"availabilityImpact": "HIGH",
|
||||||
|
"baseScore": 8.8,
|
||||||
|
"baseSeverity": "HIGH"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 2.8,
|
||||||
|
"impactScore": 5.9
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"weaknesses": [
|
||||||
|
{
|
||||||
|
"source": "security-advisories@github.com",
|
||||||
|
"type": "Secondary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-89"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://cheatsheetseries.owasp.org/cheatsheets/SQL_Injection_Prevention_Cheat_Sheet.html",
|
||||||
|
"source": "security-advisories@github.com"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://github.com/portabilis/i-educar/security/advisories/GHSA-2v4w-7xqr-hxmr",
|
||||||
|
"source": "security-advisories@github.com"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://portswigger.net/web-security/sql-injection",
|
||||||
|
"source": "security-advisories@github.com"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
@ -2,8 +2,8 @@
|
|||||||
"id": "CVE-2024-7851",
|
"id": "CVE-2024-7851",
|
||||||
"sourceIdentifier": "cna@vuldb.com",
|
"sourceIdentifier": "cna@vuldb.com",
|
||||||
"published": "2024-08-16T02:15:18.720",
|
"published": "2024-08-16T02:15:18.720",
|
||||||
"lastModified": "2024-08-19T13:00:23.117",
|
"lastModified": "2024-08-28T21:10:07.750",
|
||||||
"vulnStatus": "Awaiting Analysis",
|
"vulnStatus": "Analyzed",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
@ -61,6 +61,26 @@
|
|||||||
}
|
}
|
||||||
],
|
],
|
||||||
"cvssMetricV31": [
|
"cvssMetricV31": [
|
||||||
|
{
|
||||||
|
"source": "nvd@nist.gov",
|
||||||
|
"type": "Primary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||||
|
"attackVector": "NETWORK",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "NONE",
|
||||||
|
"userInteraction": "NONE",
|
||||||
|
"scope": "UNCHANGED",
|
||||||
|
"confidentialityImpact": "HIGH",
|
||||||
|
"integrityImpact": "HIGH",
|
||||||
|
"availabilityImpact": "HIGH",
|
||||||
|
"baseScore": 9.8,
|
||||||
|
"baseSeverity": "CRITICAL"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 3.9,
|
||||||
|
"impactScore": 5.9
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"source": "cna@vuldb.com",
|
"source": "cna@vuldb.com",
|
||||||
"type": "Secondary",
|
"type": "Secondary",
|
||||||
@ -110,8 +130,18 @@
|
|||||||
},
|
},
|
||||||
"weaknesses": [
|
"weaknesses": [
|
||||||
{
|
{
|
||||||
"source": "cna@vuldb.com",
|
"source": "nvd@nist.gov",
|
||||||
"type": "Primary",
|
"type": "Primary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "NVD-CWE-noinfo"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"source": "cna@vuldb.com",
|
||||||
|
"type": "Secondary",
|
||||||
"description": [
|
"description": [
|
||||||
{
|
{
|
||||||
"lang": "en",
|
"lang": "en",
|
||||||
@ -120,22 +150,53 @@
|
|||||||
]
|
]
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"references": [
|
"configurations": [
|
||||||
{
|
{
|
||||||
"url": "https://github.com/Wsstiger/cve/blob/main/Yoga_add.md",
|
"nodes": [
|
||||||
"source": "cna@vuldb.com"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"url": "https://vuldb.com/?ctiid.274756",
|
"operator": "OR",
|
||||||
"source": "cna@vuldb.com"
|
"negate": false,
|
||||||
},
|
"cpeMatch": [
|
||||||
{
|
{
|
||||||
"url": "https://vuldb.com/?id.274756",
|
"vulnerable": true,
|
||||||
"source": "cna@vuldb.com"
|
"criteria": "cpe:2.3:a:tips23:yoga_class_registration_system:1.0:*:*:*:*:*:*:*",
|
||||||
},
|
"matchCriteriaId": "399EC5C3-47E9-42A9-B028-17E7BBF60AC0"
|
||||||
{
|
}
|
||||||
"url": "https://vuldb.com/?submit.391640",
|
]
|
||||||
"source": "cna@vuldb.com"
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://github.com/Wsstiger/cve/blob/main/Yoga_add.md",
|
||||||
|
"source": "cna@vuldb.com",
|
||||||
|
"tags": [
|
||||||
|
"Exploit",
|
||||||
|
"Third Party Advisory"
|
||||||
|
]
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://vuldb.com/?ctiid.274756",
|
||||||
|
"source": "cna@vuldb.com",
|
||||||
|
"tags": [
|
||||||
|
"Permissions Required",
|
||||||
|
"VDB Entry"
|
||||||
|
]
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://vuldb.com/?id.274756",
|
||||||
|
"source": "cna@vuldb.com",
|
||||||
|
"tags": [
|
||||||
|
"VDB Entry"
|
||||||
|
]
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://vuldb.com/?submit.391640",
|
||||||
|
"source": "cna@vuldb.com",
|
||||||
|
"tags": [
|
||||||
|
"VDB Entry"
|
||||||
|
]
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
@ -2,8 +2,8 @@
|
|||||||
"id": "CVE-2024-7852",
|
"id": "CVE-2024-7852",
|
||||||
"sourceIdentifier": "cna@vuldb.com",
|
"sourceIdentifier": "cna@vuldb.com",
|
||||||
"published": "2024-08-16T02:15:18.960",
|
"published": "2024-08-16T02:15:18.960",
|
||||||
"lastModified": "2024-08-19T13:00:23.117",
|
"lastModified": "2024-08-28T21:07:30.690",
|
||||||
"vulnStatus": "Awaiting Analysis",
|
"vulnStatus": "Analyzed",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
@ -61,6 +61,26 @@
|
|||||||
}
|
}
|
||||||
],
|
],
|
||||||
"cvssMetricV31": [
|
"cvssMetricV31": [
|
||||||
|
{
|
||||||
|
"source": "nvd@nist.gov",
|
||||||
|
"type": "Primary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
|
||||||
|
"attackVector": "NETWORK",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "LOW",
|
||||||
|
"userInteraction": "REQUIRED",
|
||||||
|
"scope": "CHANGED",
|
||||||
|
"confidentialityImpact": "LOW",
|
||||||
|
"integrityImpact": "LOW",
|
||||||
|
"availabilityImpact": "NONE",
|
||||||
|
"baseScore": 5.4,
|
||||||
|
"baseSeverity": "MEDIUM"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 2.3,
|
||||||
|
"impactScore": 2.7
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"source": "cna@vuldb.com",
|
"source": "cna@vuldb.com",
|
||||||
"type": "Secondary",
|
"type": "Secondary",
|
||||||
@ -120,22 +140,53 @@
|
|||||||
]
|
]
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"references": [
|
"configurations": [
|
||||||
{
|
{
|
||||||
"url": "https://github.com/Wsstiger/cve/blob/main/Yoga_xss.md",
|
"nodes": [
|
||||||
"source": "cna@vuldb.com"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"url": "https://vuldb.com/?ctiid.274757",
|
"operator": "OR",
|
||||||
"source": "cna@vuldb.com"
|
"negate": false,
|
||||||
},
|
"cpeMatch": [
|
||||||
{
|
{
|
||||||
"url": "https://vuldb.com/?id.274757",
|
"vulnerable": true,
|
||||||
"source": "cna@vuldb.com"
|
"criteria": "cpe:2.3:a:tips23:yoga_class_registration_system:1.0:*:*:*:*:*:*:*",
|
||||||
},
|
"matchCriteriaId": "399EC5C3-47E9-42A9-B028-17E7BBF60AC0"
|
||||||
{
|
}
|
||||||
"url": "https://vuldb.com/?submit.391663",
|
]
|
||||||
"source": "cna@vuldb.com"
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://github.com/Wsstiger/cve/blob/main/Yoga_xss.md",
|
||||||
|
"source": "cna@vuldb.com",
|
||||||
|
"tags": [
|
||||||
|
"Exploit",
|
||||||
|
"Third Party Advisory"
|
||||||
|
]
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://vuldb.com/?ctiid.274757",
|
||||||
|
"source": "cna@vuldb.com",
|
||||||
|
"tags": [
|
||||||
|
"Permissions Required",
|
||||||
|
"VDB Entry"
|
||||||
|
]
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://vuldb.com/?id.274757",
|
||||||
|
"source": "cna@vuldb.com",
|
||||||
|
"tags": [
|
||||||
|
"VDB Entry"
|
||||||
|
]
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://vuldb.com/?submit.391663",
|
||||||
|
"source": "cna@vuldb.com",
|
||||||
|
"tags": [
|
||||||
|
"VDB Entry"
|
||||||
|
]
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
@ -2,8 +2,8 @@
|
|||||||
"id": "CVE-2024-7853",
|
"id": "CVE-2024-7853",
|
||||||
"sourceIdentifier": "cna@vuldb.com",
|
"sourceIdentifier": "cna@vuldb.com",
|
||||||
"published": "2024-08-16T02:15:19.217",
|
"published": "2024-08-16T02:15:19.217",
|
||||||
"lastModified": "2024-08-19T13:00:23.117",
|
"lastModified": "2024-08-28T21:03:35.003",
|
||||||
"vulnStatus": "Awaiting Analysis",
|
"vulnStatus": "Analyzed",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
@ -61,6 +61,26 @@
|
|||||||
}
|
}
|
||||||
],
|
],
|
||||||
"cvssMetricV31": [
|
"cvssMetricV31": [
|
||||||
|
{
|
||||||
|
"source": "nvd@nist.gov",
|
||||||
|
"type": "Primary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||||
|
"attackVector": "NETWORK",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "LOW",
|
||||||
|
"userInteraction": "NONE",
|
||||||
|
"scope": "UNCHANGED",
|
||||||
|
"confidentialityImpact": "HIGH",
|
||||||
|
"integrityImpact": "HIGH",
|
||||||
|
"availabilityImpact": "HIGH",
|
||||||
|
"baseScore": 8.8,
|
||||||
|
"baseSeverity": "HIGH"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 2.8,
|
||||||
|
"impactScore": 5.9
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"source": "cna@vuldb.com",
|
"source": "cna@vuldb.com",
|
||||||
"type": "Secondary",
|
"type": "Secondary",
|
||||||
@ -120,22 +140,53 @@
|
|||||||
]
|
]
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"references": [
|
"configurations": [
|
||||||
{
|
{
|
||||||
"url": "https://github.com/Wsstiger/cve/blob/main/Yoga_sql.md",
|
"nodes": [
|
||||||
"source": "cna@vuldb.com"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"url": "https://vuldb.com/?ctiid.274758",
|
"operator": "OR",
|
||||||
"source": "cna@vuldb.com"
|
"negate": false,
|
||||||
},
|
"cpeMatch": [
|
||||||
{
|
{
|
||||||
"url": "https://vuldb.com/?id.274758",
|
"vulnerable": true,
|
||||||
"source": "cna@vuldb.com"
|
"criteria": "cpe:2.3:a:tips23:yoga_class_registration_system:1.0:*:*:*:*:*:*:*",
|
||||||
},
|
"matchCriteriaId": "399EC5C3-47E9-42A9-B028-17E7BBF60AC0"
|
||||||
{
|
}
|
||||||
"url": "https://vuldb.com/?submit.391666",
|
]
|
||||||
"source": "cna@vuldb.com"
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://github.com/Wsstiger/cve/blob/main/Yoga_sql.md",
|
||||||
|
"source": "cna@vuldb.com",
|
||||||
|
"tags": [
|
||||||
|
"Exploit",
|
||||||
|
"Third Party Advisory"
|
||||||
|
]
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://vuldb.com/?ctiid.274758",
|
||||||
|
"source": "cna@vuldb.com",
|
||||||
|
"tags": [
|
||||||
|
"Permissions Required",
|
||||||
|
"VDB Entry"
|
||||||
|
]
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://vuldb.com/?id.274758",
|
||||||
|
"source": "cna@vuldb.com",
|
||||||
|
"tags": [
|
||||||
|
"VDB Entry"
|
||||||
|
]
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://vuldb.com/?submit.391666",
|
||||||
|
"source": "cna@vuldb.com",
|
||||||
|
"tags": [
|
||||||
|
"VDB Entry"
|
||||||
|
]
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
@ -2,8 +2,8 @@
|
|||||||
"id": "CVE-2024-7867",
|
"id": "CVE-2024-7867",
|
||||||
"sourceIdentifier": "xpdf@xpdfreader.com",
|
"sourceIdentifier": "xpdf@xpdfreader.com",
|
||||||
"published": "2024-08-15T20:15:18.967",
|
"published": "2024-08-15T20:15:18.967",
|
||||||
"lastModified": "2024-08-19T13:00:23.117",
|
"lastModified": "2024-08-28T21:59:33.973",
|
||||||
"vulnStatus": "Undergoing Analysis",
|
"vulnStatus": "Analyzed",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
@ -59,9 +59,45 @@
|
|||||||
"baseSeverity": "LOW"
|
"baseSeverity": "LOW"
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
],
|
||||||
|
"cvssMetricV31": [
|
||||||
|
{
|
||||||
|
"source": "nvd@nist.gov",
|
||||||
|
"type": "Primary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
|
||||||
|
"attackVector": "LOCAL",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "NONE",
|
||||||
|
"userInteraction": "NONE",
|
||||||
|
"scope": "UNCHANGED",
|
||||||
|
"confidentialityImpact": "NONE",
|
||||||
|
"integrityImpact": "NONE",
|
||||||
|
"availabilityImpact": "HIGH",
|
||||||
|
"baseScore": 6.2,
|
||||||
|
"baseSeverity": "MEDIUM"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 2.5,
|
||||||
|
"impactScore": 3.6
|
||||||
|
}
|
||||||
]
|
]
|
||||||
},
|
},
|
||||||
"weaknesses": [
|
"weaknesses": [
|
||||||
|
{
|
||||||
|
"source": "nvd@nist.gov",
|
||||||
|
"type": "Primary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-190"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-369"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"source": "xpdf@xpdfreader.com",
|
"source": "xpdf@xpdfreader.com",
|
||||||
"type": "Secondary",
|
"type": "Secondary",
|
||||||
@ -77,10 +113,31 @@
|
|||||||
]
|
]
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"references": [
|
"configurations": [
|
||||||
{
|
{
|
||||||
"url": "https://www.xpdfreader.com/security-bug/CVE-2024-7867.html",
|
"nodes": [
|
||||||
"source": "xpdf@xpdfreader.com"
|
{
|
||||||
|
"operator": "OR",
|
||||||
|
"negate": false,
|
||||||
|
"cpeMatch": [
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:a:xpdfreader:xpdf:*:*:*:*:*:*:*:*",
|
||||||
|
"versionEndIncluding": "4.05",
|
||||||
|
"matchCriteriaId": "20E42312-53C6-4D3F-963D-06CD49603AF3"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://www.xpdfreader.com/security-bug/CVE-2024-7867.html",
|
||||||
|
"source": "xpdf@xpdfreader.com",
|
||||||
|
"tags": [
|
||||||
|
"Vendor Advisory"
|
||||||
|
]
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
77
README.md
77
README.md
@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours.
|
|||||||
### Last Repository Update
|
### Last Repository Update
|
||||||
|
|
||||||
```plain
|
```plain
|
||||||
2024-08-28T20:00:17.696095+00:00
|
2024-08-28T22:00:17.522415+00:00
|
||||||
```
|
```
|
||||||
|
|
||||||
### Most recent CVE Modification Timestamp synchronized with NVD
|
### Most recent CVE Modification Timestamp synchronized with NVD
|
||||||
|
|
||||||
```plain
|
```plain
|
||||||
2024-08-28T19:59:22.927000+00:00
|
2024-08-28T21:59:33.973000+00:00
|
||||||
```
|
```
|
||||||
|
|
||||||
### Last Data Feed Release
|
### Last Data Feed Release
|
||||||
@ -33,50 +33,55 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
|
|||||||
### Total Number of included CVEs
|
### Total Number of included CVEs
|
||||||
|
|
||||||
```plain
|
```plain
|
||||||
261393
|
261404
|
||||||
```
|
```
|
||||||
|
|
||||||
### CVEs added in the last Commit
|
### CVEs added in the last Commit
|
||||||
|
|
||||||
Recently added CVEs: `6`
|
Recently added CVEs: `11`
|
||||||
|
|
||||||
- [CVE-2024-41236](CVE-2024/CVE-2024-412xx/CVE-2024-41236.json) (`2024-08-28T18:15:09.497`)
|
- [CVE-2024-34195](CVE-2024/CVE-2024-341xx/CVE-2024-34195.json) (`2024-08-28T20:15:07.580`)
|
||||||
- [CVE-2024-42905](CVE-2024/CVE-2024-429xx/CVE-2024-42905.json) (`2024-08-28T18:15:09.630`)
|
- [CVE-2024-42793](CVE-2024/CVE-2024-427xx/CVE-2024-42793.json) (`2024-08-28T20:15:07.707`)
|
||||||
- [CVE-2024-44761](CVE-2024/CVE-2024-447xx/CVE-2024-44761.json) (`2024-08-28T19:15:08.933`)
|
- [CVE-2024-43805](CVE-2024/CVE-2024-438xx/CVE-2024-43805.json) (`2024-08-28T20:15:07.963`)
|
||||||
- [CVE-2024-44913](CVE-2024/CVE-2024-449xx/CVE-2024-44913.json) (`2024-08-28T18:15:09.707`)
|
- [CVE-2024-44760](CVE-2024/CVE-2024-447xx/CVE-2024-44760.json) (`2024-08-28T20:15:08.230`)
|
||||||
- [CVE-2024-44914](CVE-2024/CVE-2024-449xx/CVE-2024-44914.json) (`2024-08-28T18:15:09.780`)
|
- [CVE-2024-45043](CVE-2024/CVE-2024-450xx/CVE-2024-45043.json) (`2024-08-28T20:15:08.347`)
|
||||||
- [CVE-2024-44915](CVE-2024/CVE-2024-449xx/CVE-2024-44915.json) (`2024-08-28T18:15:09.863`)
|
- [CVE-2024-45046](CVE-2024/CVE-2024-450xx/CVE-2024-45046.json) (`2024-08-28T21:15:06.603`)
|
||||||
|
- [CVE-2024-45048](CVE-2024/CVE-2024-450xx/CVE-2024-45048.json) (`2024-08-28T21:15:06.817`)
|
||||||
|
- [CVE-2024-45054](CVE-2024/CVE-2024-450xx/CVE-2024-45054.json) (`2024-08-28T20:15:08.547`)
|
||||||
|
- [CVE-2024-45057](CVE-2024/CVE-2024-450xx/CVE-2024-45057.json) (`2024-08-28T21:15:07.027`)
|
||||||
|
- [CVE-2024-45058](CVE-2024/CVE-2024-450xx/CVE-2024-45058.json) (`2024-08-28T21:15:07.283`)
|
||||||
|
- [CVE-2024-45059](CVE-2024/CVE-2024-450xx/CVE-2024-45059.json) (`2024-08-28T21:15:07.473`)
|
||||||
|
|
||||||
|
|
||||||
### CVEs modified in the last Commit
|
### CVEs modified in the last Commit
|
||||||
|
|
||||||
Recently modified CVEs: `57`
|
Recently modified CVEs: `39`
|
||||||
|
|
||||||
- [CVE-2024-30624](CVE-2024/CVE-2024-306xx/CVE-2024-30624.json) (`2024-08-28T18:35:15.953`)
|
- [CVE-2024-25713](CVE-2024/CVE-2024-257xx/CVE-2024-25713.json) (`2024-08-28T21:35:04.973`)
|
||||||
- [CVE-2024-31819](CVE-2024/CVE-2024-318xx/CVE-2024-31819.json) (`2024-08-28T19:35:18.897`)
|
- [CVE-2024-25893](CVE-2024/CVE-2024-258xx/CVE-2024-25893.json) (`2024-08-28T21:35:05.727`)
|
||||||
- [CVE-2024-39504](CVE-2024/CVE-2024-395xx/CVE-2024-39504.json) (`2024-08-28T19:58:45.653`)
|
- [CVE-2024-26445](CVE-2024/CVE-2024-264xx/CVE-2024-26445.json) (`2024-08-28T21:35:06.473`)
|
||||||
- [CVE-2024-39506](CVE-2024/CVE-2024-395xx/CVE-2024-39506.json) (`2024-08-28T19:58:56.013`)
|
- [CVE-2024-26455](CVE-2024/CVE-2024-264xx/CVE-2024-26455.json) (`2024-08-28T21:35:07.220`)
|
||||||
- [CVE-2024-39510](CVE-2024/CVE-2024-395xx/CVE-2024-39510.json) (`2024-08-28T19:59:12.947`)
|
- [CVE-2024-26491](CVE-2024/CVE-2024-264xx/CVE-2024-26491.json) (`2024-08-28T20:35:09.023`)
|
||||||
- [CVE-2024-39717](CVE-2024/CVE-2024-397xx/CVE-2024-39717.json) (`2024-08-28T19:47:25.410`)
|
- [CVE-2024-28215](CVE-2024/CVE-2024-282xx/CVE-2024-28215.json) (`2024-08-28T21:35:07.973`)
|
||||||
- [CVE-2024-40530](CVE-2024/CVE-2024-405xx/CVE-2024-40530.json) (`2024-08-28T19:15:08.717`)
|
- [CVE-2024-28396](CVE-2024/CVE-2024-283xx/CVE-2024-28396.json) (`2024-08-28T21:35:08.140`)
|
||||||
- [CVE-2024-40531](CVE-2024/CVE-2024-405xx/CVE-2024-40531.json) (`2024-08-28T19:15:08.797`)
|
- [CVE-2024-28434](CVE-2024/CVE-2024-284xx/CVE-2024-28434.json) (`2024-08-28T21:35:08.910`)
|
||||||
- [CVE-2024-40899](CVE-2024/CVE-2024-408xx/CVE-2024-40899.json) (`2024-08-28T19:59:22.927`)
|
- [CVE-2024-29435](CVE-2024/CVE-2024-294xx/CVE-2024-29435.json) (`2024-08-28T20:35:10.057`)
|
||||||
- [CVE-2024-40932](CVE-2024/CVE-2024-409xx/CVE-2024-40932.json) (`2024-08-28T19:48:53.420`)
|
- [CVE-2024-29469](CVE-2024/CVE-2024-294xx/CVE-2024-29469.json) (`2024-08-28T21:35:09.653`)
|
||||||
- [CVE-2024-40934](CVE-2024/CVE-2024-409xx/CVE-2024-40934.json) (`2024-08-28T19:49:04.307`)
|
- [CVE-2024-34906](CVE-2024/CVE-2024-349xx/CVE-2024-34906.json) (`2024-08-28T21:35:11.000`)
|
||||||
- [CVE-2024-40954](CVE-2024/CVE-2024-409xx/CVE-2024-40954.json) (`2024-08-28T19:43:58.273`)
|
- [CVE-2024-35344](CVE-2024/CVE-2024-353xx/CVE-2024-35344.json) (`2024-08-28T20:35:11.640`)
|
||||||
- [CVE-2024-40955](CVE-2024/CVE-2024-409xx/CVE-2024-40955.json) (`2024-08-28T19:45:37.080`)
|
- [CVE-2024-37325](CVE-2024/CVE-2024-373xx/CVE-2024-37325.json) (`2024-08-28T21:29:34.533`)
|
||||||
- [CVE-2024-40956](CVE-2024/CVE-2024-409xx/CVE-2024-40956.json) (`2024-08-28T18:58:48.433`)
|
- [CVE-2024-42462](CVE-2024/CVE-2024-424xx/CVE-2024-42462.json) (`2024-08-28T20:46:39.227`)
|
||||||
- [CVE-2024-40957](CVE-2024/CVE-2024-409xx/CVE-2024-40957.json) (`2024-08-28T18:58:59.793`)
|
- [CVE-2024-42463](CVE-2024/CVE-2024-424xx/CVE-2024-42463.json) (`2024-08-28T20:38:25.227`)
|
||||||
- [CVE-2024-40958](CVE-2024/CVE-2024-409xx/CVE-2024-40958.json) (`2024-08-28T18:46:29.543`)
|
- [CVE-2024-42464](CVE-2024/CVE-2024-424xx/CVE-2024-42464.json) (`2024-08-28T20:35:52.940`)
|
||||||
- [CVE-2024-40959](CVE-2024/CVE-2024-409xx/CVE-2024-40959.json) (`2024-08-28T18:46:52.453`)
|
- [CVE-2024-42465](CVE-2024/CVE-2024-424xx/CVE-2024-42465.json) (`2024-08-28T20:32:31.737`)
|
||||||
- [CVE-2024-43472](CVE-2024/CVE-2024-434xx/CVE-2024-43472.json) (`2024-08-28T19:13:21.393`)
|
- [CVE-2024-42466](CVE-2024/CVE-2024-424xx/CVE-2024-42466.json) (`2024-08-28T20:48:14.917`)
|
||||||
- [CVE-2024-45191](CVE-2024/CVE-2024-451xx/CVE-2024-45191.json) (`2024-08-28T19:15:09.110`)
|
- [CVE-2024-42851](CVE-2024/CVE-2024-428xx/CVE-2024-42851.json) (`2024-08-28T20:15:07.787`)
|
||||||
- [CVE-2024-45192](CVE-2024/CVE-2024-451xx/CVE-2024-45192.json) (`2024-08-28T19:15:09.210`)
|
- [CVE-2024-42913](CVE-2024/CVE-2024-429xx/CVE-2024-42913.json) (`2024-08-28T20:15:07.880`)
|
||||||
- [CVE-2024-45193](CVE-2024/CVE-2024-451xx/CVE-2024-45193.json) (`2024-08-28T19:15:09.297`)
|
- [CVE-2024-44761](CVE-2024/CVE-2024-447xx/CVE-2024-44761.json) (`2024-08-28T20:35:14.040`)
|
||||||
- [CVE-2024-6361](CVE-2024/CVE-2024-63xx/CVE-2024-6361.json) (`2024-08-28T18:17:35.497`)
|
- [CVE-2024-7851](CVE-2024/CVE-2024-78xx/CVE-2024-7851.json) (`2024-08-28T21:10:07.750`)
|
||||||
- [CVE-2024-7061](CVE-2024/CVE-2024-70xx/CVE-2024-7061.json) (`2024-08-28T18:25:38.217`)
|
- [CVE-2024-7852](CVE-2024/CVE-2024-78xx/CVE-2024-7852.json) (`2024-08-28T21:07:30.690`)
|
||||||
- [CVE-2024-7578](CVE-2024/CVE-2024-75xx/CVE-2024-7578.json) (`2024-08-28T18:27:18.510`)
|
- [CVE-2024-7853](CVE-2024/CVE-2024-78xx/CVE-2024-7853.json) (`2024-08-28T21:03:35.003`)
|
||||||
- [CVE-2024-7579](CVE-2024/CVE-2024-75xx/CVE-2024-7579.json) (`2024-08-28T18:26:46.117`)
|
- [CVE-2024-7867](CVE-2024/CVE-2024-78xx/CVE-2024-7867.json) (`2024-08-28T21:59:33.973`)
|
||||||
|
|
||||||
|
|
||||||
## Download and Usage
|
## Download and Usage
|
||||||
|
213
_state.csv
213
_state.csv
@ -172434,7 +172434,7 @@ CVE-2021-27306,0,0,6abb731f828d50dc31f5f8837f00ca666d352d589a763274228d94676f30c
|
|||||||
CVE-2021-27308,0,0,e75f64a338a590d6b8449ea646ab6c14feb2426700cc002f9c97dbfbf9db1140,2022-05-23T22:32:02.527000
|
CVE-2021-27308,0,0,e75f64a338a590d6b8449ea646ab6c14feb2426700cc002f9c97dbfbf9db1140,2022-05-23T22:32:02.527000
|
||||||
CVE-2021-27309,0,0,8f9d76be4305a6f70900f6114f260a4b3c8b50eb1326d17357d09b984d01979e,2021-03-24T18:49:25.550000
|
CVE-2021-27309,0,0,8f9d76be4305a6f70900f6114f260a4b3c8b50eb1326d17357d09b984d01979e,2021-03-24T18:49:25.550000
|
||||||
CVE-2021-27310,0,0,17a88a926ef1eb0c9fffe07d584ba0bf2cca7e1fb363224d505448be27be189d,2021-03-24T18:49:16.487000
|
CVE-2021-27310,0,0,17a88a926ef1eb0c9fffe07d584ba0bf2cca7e1fb363224d505448be27be189d,2021-03-24T18:49:16.487000
|
||||||
CVE-2021-27312,0,1,582b4519c2f7da9307132dd1ce33c17599b9214773e4d22a91abd408d1004b84,2024-08-28T19:35:00.870000
|
CVE-2021-27312,0,0,582b4519c2f7da9307132dd1ce33c17599b9214773e4d22a91abd408d1004b84,2024-08-28T19:35:00.870000
|
||||||
CVE-2021-27314,0,0,ef81da613fa1d85737a5304fe0630c44874df715bb96267109aa2ed2ca143cf7,2021-03-05T20:45:06.427000
|
CVE-2021-27314,0,0,ef81da613fa1d85737a5304fe0630c44874df715bb96267109aa2ed2ca143cf7,2021-03-05T20:45:06.427000
|
||||||
CVE-2021-27315,0,0,3677cea89d40f4da4399e75a818af2539c61b38b6962a639337d49aae8920b57,2021-03-24T15:53:20.323000
|
CVE-2021-27315,0,0,3677cea89d40f4da4399e75a818af2539c61b38b6962a639337d49aae8920b57,2021-03-24T15:53:20.323000
|
||||||
CVE-2021-27316,0,0,337c98afb6705298ed6fdf81f64738cc12146f58af35bb909361215bab6049a6,2021-03-24T15:54:58.873000
|
CVE-2021-27316,0,0,337c98afb6705298ed6fdf81f64738cc12146f58af35bb909361215bab6049a6,2021-03-24T15:54:58.873000
|
||||||
@ -192298,7 +192298,7 @@ CVE-2022-23082,0,0,ed78bdf538bf7b60edbc93ab6504b678e167f80f5b68fc48b75db1e83d985
|
|||||||
CVE-2022-23083,0,0,684a6dd88ae5ed867b99fc818b8fefbb26179e2cd128f1a245762ef7032c445b,2022-01-26T14:23:02.100000
|
CVE-2022-23083,0,0,684a6dd88ae5ed867b99fc818b8fefbb26179e2cd128f1a245762ef7032c445b,2022-01-26T14:23:02.100000
|
||||||
CVE-2022-23084,0,0,eed95f3fcb710f55aeaa0b13782419b97e1ab24731bc10139becaf7cdc3a00c6,2024-04-19T07:15:08.510000
|
CVE-2022-23084,0,0,eed95f3fcb710f55aeaa0b13782419b97e1ab24731bc10139becaf7cdc3a00c6,2024-04-19T07:15:08.510000
|
||||||
CVE-2022-23085,0,0,6c73d80fe53102f1d24a88a241ff940732efb10aff95a9e7b73dbc233257f85c,2024-08-01T13:42:36.137000
|
CVE-2022-23085,0,0,6c73d80fe53102f1d24a88a241ff940732efb10aff95a9e7b73dbc233257f85c,2024-08-01T13:42:36.137000
|
||||||
CVE-2022-23086,0,0,1986afec393a76319bf2f11604293837b0b02358fda7fa1eee7a754322983738,2024-04-19T07:15:08.670000
|
CVE-2022-23086,0,1,c169c43dc828a3b0f4274b523e5d0ee92a8d70ae315844f678d28d2b1843e91c,2024-08-28T20:35:00.763000
|
||||||
CVE-2022-23087,0,0,7c11c887965510f82185d4811a8db490ae631d7aafb2819d8ae31377af05c24f,2024-05-14T10:18:03.900000
|
CVE-2022-23087,0,0,7c11c887965510f82185d4811a8db490ae631d7aafb2819d8ae31377af05c24f,2024-05-14T10:18:03.900000
|
||||||
CVE-2022-23088,0,0,41b982ff884b09c7af016b00e2197b8636d45745a8254c2bcb871053e56fd8c8,2024-08-01T13:42:36.930000
|
CVE-2022-23088,0,0,41b982ff884b09c7af016b00e2197b8636d45745a8254c2bcb871053e56fd8c8,2024-08-01T13:42:36.930000
|
||||||
CVE-2022-23089,0,0,a18ed816bdf6550bacfc7602b0b6a6a3a9b978a024fd3339be9009323e78d936,2024-05-14T10:18:04.163000
|
CVE-2022-23089,0,0,a18ed816bdf6550bacfc7602b0b6a6a3a9b978a024fd3339be9009323e78d936,2024-05-14T10:18:04.163000
|
||||||
@ -200717,7 +200717,7 @@ CVE-2022-33159,0,0,09a6d779ef2e921e906741d69945a5716b4aa63c927464d64d0cc321c8c2b
|
|||||||
CVE-2022-3316,0,0,0e352ce0dc79277646c38d84f177d0d41bf6a8506e72acb1afb6e4cdb4e789e9,2023-08-08T14:22:24.967000
|
CVE-2022-3316,0,0,0e352ce0dc79277646c38d84f177d0d41bf6a8506e72acb1afb6e4cdb4e789e9,2023-08-08T14:22:24.967000
|
||||||
CVE-2022-33160,0,0,4524e302e986f2f11251ec9420ef9a332e5b897db2b323b489b3697e20151940,2023-10-10T19:33:22.613000
|
CVE-2022-33160,0,0,4524e302e986f2f11251ec9420ef9a332e5b897db2b323b489b3697e20151940,2023-10-10T19:33:22.613000
|
||||||
CVE-2022-33161,0,0,9b564272eda8422bcfdb9e610ed785f83a39fd4e9f350f5a12254c1413af8489,2023-10-18T20:32:01.117000
|
CVE-2022-33161,0,0,9b564272eda8422bcfdb9e610ed785f83a39fd4e9f350f5a12254c1413af8489,2023-10-18T20:32:01.117000
|
||||||
CVE-2022-33162,0,0,ddc66ac41c43ce4a11c7c91a727316fec131c8c06fea536a9d66a05d08dbbd2d,2024-08-19T13:00:23.117000
|
CVE-2022-33162,0,1,ee83992396dc1d90b25687e547b058d924eb9adc5b04664ce4d4fc20d72bc710,2024-08-28T21:50:06.957000
|
||||||
CVE-2022-33163,0,0,b61f3ea147baa21e6ebf2ff08a6d967daea38661c6a0960dc98920da3d5f205f,2023-06-21T01:21:30.867000
|
CVE-2022-33163,0,0,b61f3ea147baa21e6ebf2ff08a6d967daea38661c6a0960dc98920da3d5f205f,2023-06-21T01:21:30.867000
|
||||||
CVE-2022-33164,0,0,dbaf77514b572a2cfd8228382e6c957006b84e1d6ae63a3e84231dd2ca0b472b,2023-09-12T19:32:37.400000
|
CVE-2022-33164,0,0,dbaf77514b572a2cfd8228382e6c957006b84e1d6ae63a3e84231dd2ca0b472b,2023-09-12T19:32:37.400000
|
||||||
CVE-2022-33165,0,0,e7688469b7d6da31601d151e4c0adf399b51978b7602bb1f42ecf3e3278543da,2023-10-18T20:34:14.447000
|
CVE-2022-33165,0,0,e7688469b7d6da31601d151e4c0adf399b51978b7602bb1f42ecf3e3278543da,2023-10-18T20:34:14.447000
|
||||||
@ -210719,7 +210719,7 @@ CVE-2022-46491,0,0,7cf787b0158a46d4d0a3a850683fc606cd27e2e320475f05bf2ddc7245cee
|
|||||||
CVE-2022-46492,0,0,0d81290360c5ada607484ec0ad93da74f5a2923c0d38acd52abc7a99f70f88df,2022-12-30T21:58:26.497000
|
CVE-2022-46492,0,0,0d81290360c5ada607484ec0ad93da74f5a2923c0d38acd52abc7a99f70f88df,2022-12-30T21:58:26.497000
|
||||||
CVE-2022-46493,0,0,8bc0a9915aba601c6842b74a3b025d212c7066b5f6bd6752f00c22069375ded3,2022-12-30T21:51:55.933000
|
CVE-2022-46493,0,0,8bc0a9915aba601c6842b74a3b025d212c7066b5f6bd6752f00c22069375ded3,2022-12-30T21:51:55.933000
|
||||||
CVE-2022-46496,0,0,c3befa1df0c30d834ae1c378018c388a17eda39b09699ab7fe1e9a9331d9cad5,2023-02-14T23:37:54.023000
|
CVE-2022-46496,0,0,c3befa1df0c30d834ae1c378018c388a17eda39b09699ab7fe1e9a9331d9cad5,2023-02-14T23:37:54.023000
|
||||||
CVE-2022-46497,0,0,dcd1abb9de3dc65c257ba425d5a9b9928fa3724a60328a4a2de7f515de6199f3,2024-03-07T13:52:27.110000
|
CVE-2022-46497,0,1,fdd15307fcbb61cc1ee8fe6578d9fff4954a47ac5f48f3971ddbb2807d571379,2024-08-28T21:35:00.797000
|
||||||
CVE-2022-46498,0,0,062148cc3061fa91c4a108e42bef3a9f125c3d1f2bb16b9b89663981c79acc97,2024-08-01T13:43:03.260000
|
CVE-2022-46498,0,0,062148cc3061fa91c4a108e42bef3a9f125c3d1f2bb16b9b89663981c79acc97,2024-08-01T13:43:03.260000
|
||||||
CVE-2022-46499,0,0,d33b165617169a7122716363ce1c101954c885dac6453896a659fcba4e0adcf1,2024-08-14T19:35:07.510000
|
CVE-2022-46499,0,0,d33b165617169a7122716363ce1c101954c885dac6453896a659fcba4e0adcf1,2024-08-14T19:35:07.510000
|
||||||
CVE-2022-4650,0,0,f3263e15cad35090681797f47376b7071744d021767c2be8dc922dbf6caa2f31,2023-11-07T03:58:28.357000
|
CVE-2022-4650,0,0,f3263e15cad35090681797f47376b7071744d021767c2be8dc922dbf6caa2f31,2023-11-07T03:58:28.357000
|
||||||
@ -218046,7 +218046,7 @@ CVE-2023-2433,0,0,fcefb1d744e2436ca34c1e96068dcbd24fc8579f4fa267fa852ea1937f688b
|
|||||||
CVE-2023-24330,0,0,f05bada3541e493f7c0e952b860209e4955262c38b475c09bca0b6c5156aade2,2024-08-01T13:43:24.723000
|
CVE-2023-24330,0,0,f05bada3541e493f7c0e952b860209e4955262c38b475c09bca0b6c5156aade2,2024-08-01T13:43:24.723000
|
||||||
CVE-2023-24331,0,0,050f04d9bf3b2540619b4f1f79736e1598d2474273dc0664c9e95b1007380a03,2024-02-22T19:07:27.197000
|
CVE-2023-24331,0,0,050f04d9bf3b2540619b4f1f79736e1598d2474273dc0664c9e95b1007380a03,2024-02-22T19:07:27.197000
|
||||||
CVE-2023-24332,0,0,1c7be458c561d88b0c65bf8a70fcb4598344686f5f419e9a0237e871f28b3aa5,2024-08-14T15:35:01.550000
|
CVE-2023-24332,0,0,1c7be458c561d88b0c65bf8a70fcb4598344686f5f419e9a0237e871f28b3aa5,2024-08-14T15:35:01.550000
|
||||||
CVE-2023-24333,0,1,7e9df531c069ed4755a06f2fb82b4efefe770605f70313b1d809bac7d59607a8,2024-08-28T18:35:00.873000
|
CVE-2023-24333,0,0,7e9df531c069ed4755a06f2fb82b4efefe770605f70313b1d809bac7d59607a8,2024-08-28T18:35:00.873000
|
||||||
CVE-2023-24334,0,0,6e7ba58a919aa1ee8ff4fce321878db0fcd5ef0e2aebc034e541821e975781cb,2024-08-01T13:43:27.040000
|
CVE-2023-24334,0,0,6e7ba58a919aa1ee8ff4fce321878db0fcd5ef0e2aebc034e541821e975781cb,2024-08-01T13:43:27.040000
|
||||||
CVE-2023-2434,0,0,a9f172aa8578fb49449bc37bd820ab24b165eed89a9643a4cca796b2ac20b5bf,2023-12-18T15:32:39.347000
|
CVE-2023-2434,0,0,a9f172aa8578fb49449bc37bd820ab24b165eed89a9643a4cca796b2ac20b5bf,2023-12-18T15:32:39.347000
|
||||||
CVE-2023-24343,0,0,d251214a0e80bbc1652809830ae45654632b0e128cea4fecfea9ad00cc1f3017,2023-04-26T18:55:30.893000
|
CVE-2023-24343,0,0,d251214a0e80bbc1652809830ae45654632b0e128cea4fecfea9ad00cc1f3017,2023-04-26T18:55:30.893000
|
||||||
@ -225418,7 +225418,7 @@ CVE-2023-33672,0,0,291fb7f59d1eae6b75bde1b5d591242bc0fb25cab928068f6a85a8688c610
|
|||||||
CVE-2023-33673,0,0,c54995448b4f5118860c2c72a41cb2379fdd61584cffca9b1c4f30c22fddffd4,2023-06-12T13:15:10.967000
|
CVE-2023-33673,0,0,c54995448b4f5118860c2c72a41cb2379fdd61584cffca9b1c4f30c22fddffd4,2023-06-12T13:15:10.967000
|
||||||
CVE-2023-33675,0,0,381da06a94ad6f9361a878c803e4e1fb1f9a7067c3b213f78ad9c1dfbf3d4a3c,2023-06-12T13:15:11.027000
|
CVE-2023-33675,0,0,381da06a94ad6f9361a878c803e4e1fb1f9a7067c3b213f78ad9c1dfbf3d4a3c,2023-06-12T13:15:11.027000
|
||||||
CVE-2023-33676,0,0,d8f74a6186c94f33f7f4dd75f85dc420a2cca6e4b92a04965885a06575277154,2024-08-16T17:35:02.057000
|
CVE-2023-33676,0,0,d8f74a6186c94f33f7f4dd75f85dc420a2cca6e4b92a04965885a06575277154,2024-08-16T17:35:02.057000
|
||||||
CVE-2023-33677,0,1,35438bc3c583b720476f0810047f72c89de7148b69d615cdaedc0dd5902008d1,2024-08-28T19:35:04.520000
|
CVE-2023-33677,0,0,35438bc3c583b720476f0810047f72c89de7148b69d615cdaedc0dd5902008d1,2024-08-28T19:35:04.520000
|
||||||
CVE-2023-3368,0,0,b9cfa1fb1e0c63886e4f96496a557e99b9be48828e3aceb01ab78631664a93ea,2023-12-04T18:57:35.040000
|
CVE-2023-3368,0,0,b9cfa1fb1e0c63886e4f96496a557e99b9be48828e3aceb01ab78631664a93ea,2023-12-04T18:57:35.040000
|
||||||
CVE-2023-33684,0,0,afc92e89b7d5bca4bcdf52147d5685baff42318e93d9730a4d548a1a2dfb30f9,2024-02-16T20:34:46.687000
|
CVE-2023-33684,0,0,afc92e89b7d5bca4bcdf52147d5685baff42318e93d9730a4d548a1a2dfb30f9,2024-02-16T20:34:46.687000
|
||||||
CVE-2023-3369,0,0,29db5da69a767c35aea22ed723b1c6ee7c43f48ed1175441113bf5511d1f51e2,2023-11-07T04:18:36.577000
|
CVE-2023-3369,0,0,29db5da69a767c35aea22ed723b1c6ee7c43f48ed1175441113bf5511d1f51e2,2023-11-07T04:18:36.577000
|
||||||
@ -230203,7 +230203,7 @@ CVE-2023-40096,0,0,80c28bf71c8b791e73e10c9865fe8d8ebce552d17765524b6f7ba8d0a8a23
|
|||||||
CVE-2023-40097,0,0,fcc14a5c69e91f7c4d728f7cbe0f0a48c2badf3e8d8d2f00222df0c4c9ef7a84,2024-02-02T03:14:39.080000
|
CVE-2023-40097,0,0,fcc14a5c69e91f7c4d728f7cbe0f0a48c2badf3e8d8d2f00222df0c4c9ef7a84,2024-02-02T03:14:39.080000
|
||||||
CVE-2023-40098,0,0,69f1206eae11d461353fadcedd8eb7551d87c233816314ea6c393cc2539141ed,2024-02-02T03:14:34.950000
|
CVE-2023-40098,0,0,69f1206eae11d461353fadcedd8eb7551d87c233816314ea6c393cc2539141ed,2024-02-02T03:14:34.950000
|
||||||
CVE-2023-4010,0,0,a8a9f7812f565816476651b6e5296effbd88d1bb2d79eb39527cfc3f0a26dfd0,2023-11-07T04:22:02.797000
|
CVE-2023-4010,0,0,a8a9f7812f565816476651b6e5296effbd88d1bb2d79eb39527cfc3f0a26dfd0,2023-11-07T04:22:02.797000
|
||||||
CVE-2023-40100,0,1,d865222f08aa85ede2d3681caf9207be6bcb8c87eca41307d9aef1926195b418,2024-08-28T19:35:06.173000
|
CVE-2023-40100,0,0,d865222f08aa85ede2d3681caf9207be6bcb8c87eca41307d9aef1926195b418,2024-08-28T19:35:06.173000
|
||||||
CVE-2023-40101,0,0,3ce51d90b0e7e589809d744dc88bb96b7c66c60685aebf47c83df3167c5dd843,2023-11-07T00:52:28.560000
|
CVE-2023-40101,0,0,3ce51d90b0e7e589809d744dc88bb96b7c66c60685aebf47c83df3167c5dd843,2023-11-07T00:52:28.560000
|
||||||
CVE-2023-40103,0,0,450c3a391def7a8afcbefb17dfde1c695cebaffcfd18ba45db0f0094ffb67ee0,2024-02-02T03:14:29.707000
|
CVE-2023-40103,0,0,450c3a391def7a8afcbefb17dfde1c695cebaffcfd18ba45db0f0094ffb67ee0,2024-02-02T03:14:29.707000
|
||||||
CVE-2023-40104,0,0,0cf270b8607bfa9d4e1d8714c505120c5fc75b5ddb276c75d9c23f91e95a9b08,2024-08-01T13:44:27.157000
|
CVE-2023-40104,0,0,0cf270b8607bfa9d4e1d8714c505120c5fc75b5ddb276c75d9c23f91e95a9b08,2024-08-01T13:44:27.157000
|
||||||
@ -230327,8 +230327,8 @@ CVE-2023-40235,0,0,72105b9c559b1ddc2ad9f13c18ab13a9fa55a22727500e92992c4e0f4ec55
|
|||||||
CVE-2023-40236,0,0,14f71801e1dfdcd9b355f3adbfa06238032294610f81b46a111266eb7777a93e,2023-12-29T18:39:44.950000
|
CVE-2023-40236,0,0,14f71801e1dfdcd9b355f3adbfa06238032294610f81b46a111266eb7777a93e,2023-12-29T18:39:44.950000
|
||||||
CVE-2023-40238,0,0,8cd9a6ac9959ba296d215977c1b87d1d771afcf7aab5c34be210430f1271dda5,2024-01-05T18:15:29.060000
|
CVE-2023-40238,0,0,8cd9a6ac9959ba296d215977c1b87d1d771afcf7aab5c34be210430f1271dda5,2024-01-05T18:15:29.060000
|
||||||
CVE-2023-40239,0,0,aa0e89bb1e96bd5e8e2f363b3dde8360217f94f32277b47a1c6e77ce38b58a84,2023-09-07T16:26:26.913000
|
CVE-2023-40239,0,0,aa0e89bb1e96bd5e8e2f363b3dde8360217f94f32277b47a1c6e77ce38b58a84,2023-09-07T16:26:26.913000
|
||||||
CVE-2023-4024,0,1,3263f70bc4cfa471a1ebfbe3b6dd7f1caa59a19b55a8814fb5cad997ea7b1073,2024-08-28T18:32:02.433000
|
CVE-2023-4024,0,0,3263f70bc4cfa471a1ebfbe3b6dd7f1caa59a19b55a8814fb5cad997ea7b1073,2024-08-28T18:32:02.433000
|
||||||
CVE-2023-4025,0,1,875d633a8539be92bae12be6b1a35372471c5c3157e9171ada60f67dadd02517,2024-08-28T18:30:15.657000
|
CVE-2023-4025,0,0,875d633a8539be92bae12be6b1a35372471c5c3157e9171ada60f67dadd02517,2024-08-28T18:30:15.657000
|
||||||
CVE-2023-40250,0,0,e7ce0448e3779d770797cca3047b64ac1d7604cdc050879a2952ebbea5fc57b1,2024-01-18T20:24:35.633000
|
CVE-2023-40250,0,0,e7ce0448e3779d770797cca3047b64ac1d7604cdc050879a2952ebbea5fc57b1,2024-01-18T20:24:35.633000
|
||||||
CVE-2023-40251,0,0,e47d373aa9704daf646bd928a2cc0678149d495cfca9b7abbd3818e5c74903f1,2023-08-29T02:15:08.277000
|
CVE-2023-40251,0,0,e47d373aa9704daf646bd928a2cc0678149d495cfca9b7abbd3818e5c74903f1,2023-08-29T02:15:08.277000
|
||||||
CVE-2023-40252,0,0,27897e9f2fd3e9374d607e66dbdfb25f185ac2f919ae5207dfb1a7fd5974c153,2023-08-29T02:15:08.503000
|
CVE-2023-40252,0,0,27897e9f2fd3e9374d607e66dbdfb25f185ac2f919ae5207dfb1a7fd5974c153,2023-08-29T02:15:08.503000
|
||||||
@ -231325,7 +231325,7 @@ CVE-2023-4149,0,0,5a341b7a68a99d862a2511fd7c4a78db3797c78d3afe50d681d537931f6fe4
|
|||||||
CVE-2023-4150,0,0,9e17d01d6dfd1bbad4581e9bdc99c95cb8eb97d9ecbd407283e813b7b9285ddf,2023-11-07T04:22:11.360000
|
CVE-2023-4150,0,0,9e17d01d6dfd1bbad4581e9bdc99c95cb8eb97d9ecbd407283e813b7b9285ddf,2023-11-07T04:22:11.360000
|
||||||
CVE-2023-41503,0,0,21a3f966ba8ab913409d2ff2fb633345f410b80e162d1526608421e53802bf8f,2024-08-02T19:35:22.577000
|
CVE-2023-41503,0,0,21a3f966ba8ab913409d2ff2fb633345f410b80e162d1526608421e53802bf8f,2024-08-02T19:35:22.577000
|
||||||
CVE-2023-41504,0,0,848cc4699c1e8eb18242fd890d1d1b583b0b775a2ec9c39e2320016a91149dcd,2024-08-05T14:35:01.417000
|
CVE-2023-41504,0,0,848cc4699c1e8eb18242fd890d1d1b583b0b775a2ec9c39e2320016a91149dcd,2024-08-05T14:35:01.417000
|
||||||
CVE-2023-41505,0,1,aefb47bffb6d5b20a178fde4ec0b5b68799db86995d46b1812020cc11de222af,2024-08-28T19:35:06.953000
|
CVE-2023-41505,0,0,aefb47bffb6d5b20a178fde4ec0b5b68799db86995d46b1812020cc11de222af,2024-08-28T19:35:06.953000
|
||||||
CVE-2023-41506,0,0,d854ac7b20badfa924f73cdc9c8d229d9b3405b1560ab063fe84fca34598864e,2024-08-27T20:35:01.473000
|
CVE-2023-41506,0,0,d854ac7b20badfa924f73cdc9c8d229d9b3405b1560ab063fe84fca34598864e,2024-08-27T20:35:01.473000
|
||||||
CVE-2023-41507,0,0,42d7d587d5d24994ad22c5fee4b7a0d6974f9356ec83148dba96a9f7c6064ec6,2023-09-08T16:51:07.547000
|
CVE-2023-41507,0,0,42d7d587d5d24994ad22c5fee4b7a0d6974f9356ec83148dba96a9f7c6064ec6,2023-09-08T16:51:07.547000
|
||||||
CVE-2023-41508,0,0,9c51a520e4e0cd0b92dd417c82bafa4b094dbd24138cf8d018d6424f00a3ea0c,2023-09-11T18:53:12.833000
|
CVE-2023-41508,0,0,9c51a520e4e0cd0b92dd417c82bafa4b094dbd24138cf8d018d6424f00a3ea0c,2023-09-11T18:53:12.833000
|
||||||
@ -232092,7 +232092,7 @@ CVE-2023-42578,0,0,23816d96a4e8f8e7a85e681befe6c1b4beef53cae2b13da25d8ba105d77fb
|
|||||||
CVE-2023-42579,0,0,943fbf5d99df6edb832545cbbb389aa9f400ef688a2c81d3258a334debe4480e,2023-12-12T21:22:00.157000
|
CVE-2023-42579,0,0,943fbf5d99df6edb832545cbbb389aa9f400ef688a2c81d3258a334debe4480e,2023-12-12T21:22:00.157000
|
||||||
CVE-2023-4258,0,0,70cc916926ada92ee8983ef15a32e9a54f92480bc5437f4dc1fabee6bc18e751,2023-09-26T17:19:08.510000
|
CVE-2023-4258,0,0,70cc916926ada92ee8983ef15a32e9a54f92480bc5437f4dc1fabee6bc18e751,2023-09-26T17:19:08.510000
|
||||||
CVE-2023-42580,0,0,857d6b0c372e6663712d898c016feff0c3c218909136cd95337a864def798f99,2023-12-12T17:09:19.990000
|
CVE-2023-42580,0,0,857d6b0c372e6663712d898c016feff0c3c218909136cd95337a864def798f99,2023-12-12T17:09:19.990000
|
||||||
CVE-2023-42581,0,1,51a00bb7f2ed622b0d566db5c08d53683b1453c01821648994dfe0bb825438d4,2024-08-28T19:35:07.143000
|
CVE-2023-42581,0,0,51a00bb7f2ed622b0d566db5c08d53683b1453c01821648994dfe0bb825438d4,2024-08-28T19:35:07.143000
|
||||||
CVE-2023-4259,0,0,66c07068928725737fca6c815c044a284bfe54d498bc2dc1dfdc90d5db05576a,2023-12-22T19:33:51.477000
|
CVE-2023-4259,0,0,66c07068928725737fca6c815c044a284bfe54d498bc2dc1dfdc90d5db05576a,2023-12-22T19:33:51.477000
|
||||||
CVE-2023-4260,0,0,825d2e262d09d358795c77a30ca8ce45e8b4eeaff5088b76af0e3b42b67d864b,2023-12-22T19:33:33.067000
|
CVE-2023-4260,0,0,825d2e262d09d358795c77a30ca8ce45e8b4eeaff5088b76af0e3b42b67d864b,2023-12-22T19:33:33.067000
|
||||||
CVE-2023-4262,0,0,96c5e685e0ea51dcabf79db9f0bdc769da7bbc4411b11be6252f295df8d63962,2024-08-01T00:15:02.090000
|
CVE-2023-4262,0,0,96c5e685e0ea51dcabf79db9f0bdc769da7bbc4411b11be6252f295df8d63962,2024-08-01T00:15:02.090000
|
||||||
@ -232337,7 +232337,7 @@ CVE-2023-42869,0,0,2efc0c625b3f1a276a18ac7ae086c1c80073dac1702473316e3e6db4eb620
|
|||||||
CVE-2023-42870,0,0,85fcae2d7fb76b4e32365c34612d1da44d242ece827fcc97bcfc9ce0e906872d,2024-01-16T23:52:09.227000
|
CVE-2023-42870,0,0,85fcae2d7fb76b4e32365c34612d1da44d242ece827fcc97bcfc9ce0e906872d,2024-01-16T23:52:09.227000
|
||||||
CVE-2023-42871,0,0,833a3e23a8d61427d074f23dee0288edd3316bac0beeec700383292c5a110e03,2024-01-16T23:52:19.197000
|
CVE-2023-42871,0,0,833a3e23a8d61427d074f23dee0288edd3316bac0beeec700383292c5a110e03,2024-01-16T23:52:19.197000
|
||||||
CVE-2023-42872,0,0,89caf9b59964cf9b9d094258bce26b8b185e25cef5a5508065b1c6001ad7b56e,2024-01-16T23:52:30.453000
|
CVE-2023-42872,0,0,89caf9b59964cf9b9d094258bce26b8b185e25cef5a5508065b1c6001ad7b56e,2024-01-16T23:52:30.453000
|
||||||
CVE-2023-42873,0,0,e686cea391819c4142966b12ed58d878dc6bba5d3054cec5e70eef0f4876faf8,2024-02-22T19:07:27.197000
|
CVE-2023-42873,0,1,f1055070f5d2c8964679f9d4c375bc90c864cdc2b3efb5cf9fe0466754f266b2,2024-08-28T20:35:03.950000
|
||||||
CVE-2023-42874,0,0,964baee28b6c72a15098069b9e881e1b193059d80a9fe10f47c0787dba9650a1,2023-12-13T23:29:19.097000
|
CVE-2023-42874,0,0,964baee28b6c72a15098069b9e881e1b193059d80a9fe10f47c0787dba9650a1,2023-12-13T23:29:19.097000
|
||||||
CVE-2023-42876,0,0,974317a11812600494105057904f88983c49db0f187d890a9f6b1ea5995af4ff,2024-01-12T14:42:40.430000
|
CVE-2023-42876,0,0,974317a11812600494105057904f88983c49db0f187d890a9f6b1ea5995af4ff,2024-01-12T14:42:40.430000
|
||||||
CVE-2023-42877,0,0,6cad27eae60657c9f948e06003fc8819bbc3ef2215aadba8c1d4e84902953011,2024-08-01T13:44:48.073000
|
CVE-2023-42877,0,0,6cad27eae60657c9f948e06003fc8819bbc3ef2215aadba8c1d4e84902953011,2024-08-01T13:44:48.073000
|
||||||
@ -232582,7 +232582,7 @@ CVE-2023-43298,0,0,9dc228ff73bdf528d43d0ed69906bd07f68ca6fc9bc3f0ef853fca3322473
|
|||||||
CVE-2023-43299,0,0,d94c0bf3ab73b965669565a71d51568c9bc57077de1c801b8cedf6d024d95ce3,2023-12-11T17:49:28.370000
|
CVE-2023-43299,0,0,d94c0bf3ab73b965669565a71d51568c9bc57077de1c801b8cedf6d024d95ce3,2023-12-11T17:49:28.370000
|
||||||
CVE-2023-4330,0,0,2fd86e9dd0e579883f8f7c0829ab8b7bda8ac701dd8a56f071347c2e4152f68e,2023-11-07T04:22:28.047000
|
CVE-2023-4330,0,0,2fd86e9dd0e579883f8f7c0829ab8b7bda8ac701dd8a56f071347c2e4152f68e,2023-11-07T04:22:28.047000
|
||||||
CVE-2023-43300,0,0,f0be1d017072b0cff316436c66a7299c83b2fd4838fb89ce71859847a9053a33,2023-12-13T21:24:31.183000
|
CVE-2023-43300,0,0,f0be1d017072b0cff316436c66a7299c83b2fd4838fb89ce71859847a9053a33,2023-12-13T21:24:31.183000
|
||||||
CVE-2023-43301,0,1,6f50951f3b5632dfdd837d8c68cd8a26f5a2fe1134449bdb506bbd5fe04343bb,2024-08-28T18:35:04.500000
|
CVE-2023-43301,0,0,6f50951f3b5632dfdd837d8c68cd8a26f5a2fe1134449bdb506bbd5fe04343bb,2024-08-28T18:35:04.500000
|
||||||
CVE-2023-43302,0,0,edd1d8c368949a8601a81887ecd4be6df4ec6d90acda56627d9aeac98fd2253e,2023-12-13T21:24:15.203000
|
CVE-2023-43302,0,0,edd1d8c368949a8601a81887ecd4be6df4ec6d90acda56627d9aeac98fd2253e,2023-12-13T21:24:15.203000
|
||||||
CVE-2023-43303,0,0,01a5e9c635cbf46583a40d8cd583b7ab7550198f2870556b254d79899012babb,2023-12-13T21:24:10.403000
|
CVE-2023-43303,0,0,01a5e9c635cbf46583a40d8cd583b7ab7550198f2870556b254d79899012babb,2023-12-13T21:24:10.403000
|
||||||
CVE-2023-43304,0,0,5c0749626957cae1c690c285ce09a1c1b29fbb73d61b41212b63ce9ff0280580,2023-12-13T21:24:04.613000
|
CVE-2023-43304,0,0,5c0749626957cae1c690c285ce09a1c1b29fbb73d61b41212b63ce9ff0280580,2023-12-13T21:24:04.613000
|
||||||
@ -235612,7 +235612,7 @@ CVE-2023-4772,0,0,a5b93b502ddd01f9ee27674c836bf711ac9d02f44090fbc833b759d04d7de8
|
|||||||
CVE-2023-47722,0,0,4f8feb65ac7241c12bbfc6f420a659b6dc9261f80cca7593f7d59fc3078ebf18,2023-12-12T21:04:18.177000
|
CVE-2023-47722,0,0,4f8feb65ac7241c12bbfc6f420a659b6dc9261f80cca7593f7d59fc3078ebf18,2023-12-12T21:04:18.177000
|
||||||
CVE-2023-47726,0,0,ceb40283504932a4e91f9e28d60424f146c7ffbecdb57c926139775e8d80827a,2024-06-20T12:44:01.637000
|
CVE-2023-47726,0,0,ceb40283504932a4e91f9e28d60424f146c7ffbecdb57c926139775e8d80827a,2024-06-20T12:44:01.637000
|
||||||
CVE-2023-47727,0,0,1611cf4537a23d5fbfc3a2499faf292e60ac118492bebcff86e1854dfc9ea8f7,2024-05-02T18:00:37.360000
|
CVE-2023-47727,0,0,1611cf4537a23d5fbfc3a2499faf292e60ac118492bebcff86e1854dfc9ea8f7,2024-05-02T18:00:37.360000
|
||||||
CVE-2023-47728,0,0,d5fe6c1fa9be5819dc3a81d2161e01e198896c58d4166a1e912cbc704f80b62c,2024-08-19T13:00:23.117000
|
CVE-2023-47728,0,1,9d9b004fcde3982f43b196d097d8f47dbe8e79b165e63e4e225567a4a70b10dd,2024-08-28T21:40:55.593000
|
||||||
CVE-2023-4773,0,0,01f0d277e96ad9628dd6920885ad7b499f840100cbeefdbe3a242a19aa900bdd,2023-11-07T04:22:57.903000
|
CVE-2023-4773,0,0,01f0d277e96ad9628dd6920885ad7b499f840100cbeefdbe3a242a19aa900bdd,2023-11-07T04:22:57.903000
|
||||||
CVE-2023-47731,0,0,bdb6aabed94397db2521c199a558a02d451711e75ae9322b4498e9bbac095b67,2024-04-24T13:39:42.883000
|
CVE-2023-47731,0,0,bdb6aabed94397db2521c199a558a02d451711e75ae9322b4498e9bbac095b67,2024-04-24T13:39:42.883000
|
||||||
CVE-2023-4774,0,0,18865190999a54b58dcf753cd88068601ff8cb29b163a504c848eb5e82d8b2e4,2023-11-07T04:22:58.080000
|
CVE-2023-4774,0,0,18865190999a54b58dcf753cd88068601ff8cb29b163a504c848eb5e82d8b2e4,2023-11-07T04:22:58.080000
|
||||||
@ -236914,7 +236914,7 @@ CVE-2023-49515,0,0,fba6ae4b9dbda87bf77d58079d1e7fdc5597e983326dac218dacc086c68e8
|
|||||||
CVE-2023-49528,0,0,bcff757c4ee07f22736afa13a889e6d02ee86ae241b71b1c98b3c18a1dcdacf5,2024-07-03T01:42:36.973000
|
CVE-2023-49528,0,0,bcff757c4ee07f22736afa13a889e6d02ee86ae241b71b1c98b3c18a1dcdacf5,2024-07-03T01:42:36.973000
|
||||||
CVE-2023-49539,0,0,3d9077c363f63e00a9a99e014f79fcf2da947642965bca45dcb61b1a8743768c,2024-03-01T22:22:25.913000
|
CVE-2023-49539,0,0,3d9077c363f63e00a9a99e014f79fcf2da947642965bca45dcb61b1a8743768c,2024-03-01T22:22:25.913000
|
||||||
CVE-2023-49540,0,0,fc00996658e2e1a07b2142617d49b74a28a84c9993046a375e13324fccec29b2,2024-08-06T16:35:02.663000
|
CVE-2023-49540,0,0,fc00996658e2e1a07b2142617d49b74a28a84c9993046a375e13324fccec29b2,2024-08-06T16:35:02.663000
|
||||||
CVE-2023-49543,0,0,9b27cf28e2f4c20b40d2a61fced0fc62af90f21931996c253e884b5f19a62074,2024-03-01T22:22:25.913000
|
CVE-2023-49543,0,1,5e9a28d34c8c9dccbca41948423cad2a9c85e5bdcb29ea577934b5fccba83d1b,2024-08-28T20:35:04.473000
|
||||||
CVE-2023-49544,0,0,4165df005ca812878112fcb221906d65322102731e6bd43d48afbe4e5ae39573,2024-08-01T13:45:11.667000
|
CVE-2023-49544,0,0,4165df005ca812878112fcb221906d65322102731e6bd43d48afbe4e5ae39573,2024-08-01T13:45:11.667000
|
||||||
CVE-2023-49545,0,0,5c8aa915328bef2165801ea42c2341178b1be4c886fc54a48ff456640387987f,2024-08-26T20:35:08.767000
|
CVE-2023-49545,0,0,5c8aa915328bef2165801ea42c2341178b1be4c886fc54a48ff456640387987f,2024-08-26T20:35:08.767000
|
||||||
CVE-2023-49546,0,0,651265cc1835f191987d8dea805e802734a1a950ddf6c3305c2a4b545571de95,2024-08-28T15:35:07.920000
|
CVE-2023-49546,0,0,651265cc1835f191987d8dea805e802734a1a950ddf6c3305c2a4b545571de95,2024-08-28T15:35:07.920000
|
||||||
@ -238418,7 +238418,7 @@ CVE-2023-51820,0,0,7aa0f7d98725dd77268f0caeb4fb8d7e759133db0c7956115ba3b94b4e25c
|
|||||||
CVE-2023-51828,0,0,90063f5e09b01f503f1f6e58b8400efb2ad9738539cfe67915469ad778201a68,2024-08-27T19:35:09.897000
|
CVE-2023-51828,0,0,90063f5e09b01f503f1f6e58b8400efb2ad9738539cfe67915469ad778201a68,2024-08-27T19:35:09.897000
|
||||||
CVE-2023-5183,0,0,b93a57cbfd23c7656908cf8ce0c47fe83e4871febf63c360b65228bdb8fcae2a,2023-10-02T19:22:03.777000
|
CVE-2023-5183,0,0,b93a57cbfd23c7656908cf8ce0c47fe83e4871febf63c360b65228bdb8fcae2a,2023-10-02T19:22:03.777000
|
||||||
CVE-2023-51833,0,0,b10ac15f68016bd5d4bd8d474cb15f2be07ff92fa1dfb1c5cbe6b8926dbb6e85,2024-01-31T23:32:20.930000
|
CVE-2023-51833,0,0,b10ac15f68016bd5d4bd8d474cb15f2be07ff92fa1dfb1c5cbe6b8926dbb6e85,2024-01-31T23:32:20.930000
|
||||||
CVE-2023-51835,0,0,95cc4db7c615cdb1c602639e2e37c3a762bd3c301b530acb72f57667401f78e7,2024-02-29T13:49:47.277000
|
CVE-2023-51835,0,1,1004f16e80cfae3e9d64447b344df5ce8071dd9ded705f59fac6569aa35fdf59,2024-08-28T20:35:05.240000
|
||||||
CVE-2023-51837,0,0,ee6381e3ad2625a17fc9f7c6d4f9ac85250766336ea84c83e6b004280ea3c079,2024-02-05T18:26:18.803000
|
CVE-2023-51837,0,0,ee6381e3ad2625a17fc9f7c6d4f9ac85250766336ea84c83e6b004280ea3c079,2024-02-05T18:26:18.803000
|
||||||
CVE-2023-51838,0,0,7d9f6553d406d679830def1ed8648869865057343b17af403444c3ad443f10fa,2024-02-10T04:04:47.587000
|
CVE-2023-51838,0,0,7d9f6553d406d679830def1ed8648869865057343b17af403444c3ad443f10fa,2024-02-10T04:04:47.587000
|
||||||
CVE-2023-51839,0,0,8034f770436aab6d940c193dd221e45f8cd0e35b2a744ae0d6fd22bcab3ad938,2024-02-06T17:02:34.433000
|
CVE-2023-51839,0,0,8034f770436aab6d940c193dd221e45f8cd0e35b2a744ae0d6fd22bcab3ad938,2024-02-06T17:02:34.433000
|
||||||
@ -240125,7 +240125,7 @@ CVE-2023-6139,0,0,58b38774f648051a2e873a85ff7a37aee0cf4ea89e9a3a4e1cb9e586395309
|
|||||||
CVE-2023-6140,0,0,d7aafe3b370ae93fdafc86b9788a271fc411e8123752fb92571bb74932be1e51,2024-01-11T19:50:08.143000
|
CVE-2023-6140,0,0,d7aafe3b370ae93fdafc86b9788a271fc411e8123752fb92571bb74932be1e51,2024-01-11T19:50:08.143000
|
||||||
CVE-2023-6141,0,0,c8dcaa0f230bcf4bab61b5120b835e0002022e253aa8729320cdbf7d8b88a7c3,2024-01-11T19:48:22.663000
|
CVE-2023-6141,0,0,c8dcaa0f230bcf4bab61b5120b835e0002022e253aa8729320cdbf7d8b88a7c3,2024-01-11T19:48:22.663000
|
||||||
CVE-2023-6142,0,0,3fe59169d0ca291deeb17bb2da3d1e912e0369f1ef3de114449566381868dbc1,2023-11-29T17:21:22.010000
|
CVE-2023-6142,0,0,3fe59169d0ca291deeb17bb2da3d1e912e0369f1ef3de114449566381868dbc1,2023-11-29T17:21:22.010000
|
||||||
CVE-2023-6143,0,1,2b02b2a87e188ae67b19643934110db253247a6a6318ed4d21a616265991aa41,2024-08-28T19:35:07.420000
|
CVE-2023-6143,0,0,2b02b2a87e188ae67b19643934110db253247a6a6318ed4d21a616265991aa41,2024-08-28T19:35:07.420000
|
||||||
CVE-2023-6144,0,0,f1ada52cef47fbae7861cb468cbf9029aefa6079f9529a530cc69ebc44690282,2023-11-29T17:21:04.480000
|
CVE-2023-6144,0,0,f1ada52cef47fbae7861cb468cbf9029aefa6079f9529a530cc69ebc44690282,2023-11-29T17:21:04.480000
|
||||||
CVE-2023-6145,0,0,b6eb696be83bb3d8e6f03bcc3cffbbf6ce301a3b5d147393bbef0fd0f87c4ee0,2024-02-29T01:42:33.440000
|
CVE-2023-6145,0,0,b6eb696be83bb3d8e6f03bcc3cffbbf6ce301a3b5d147393bbef0fd0f87c4ee0,2024-02-29T01:42:33.440000
|
||||||
CVE-2023-6146,0,0,0a628bb48560248a46754aa0cc3ac6ec47651dc2ffdb0446c47e5313a06edf08,2023-12-12T17:20:59.940000
|
CVE-2023-6146,0,0,0a628bb48560248a46754aa0cc3ac6ec47651dc2ffdb0446c47e5313a06edf08,2023-12-12T17:20:59.940000
|
||||||
@ -241139,10 +241139,10 @@ CVE-2024-0044,0,0,1b47d31ca0f3ca49c0b5dc05a9176417e6a0ac469a146bb9b6eda355db8c47
|
|||||||
CVE-2024-0045,0,0,219694127471d45a5a7cb3601b897968c387c3bc537ef76e491ce903819a3e03,2024-08-27T18:35:02.623000
|
CVE-2024-0045,0,0,219694127471d45a5a7cb3601b897968c387c3bc537ef76e491ce903819a3e03,2024-08-27T18:35:02.623000
|
||||||
CVE-2024-0046,0,0,652dd2830858c9f5da14ce2fb1063779ed8d3adc9358318f9bd8799e5a854450,2024-08-05T20:35:02.317000
|
CVE-2024-0046,0,0,652dd2830858c9f5da14ce2fb1063779ed8d3adc9358318f9bd8799e5a854450,2024-08-05T20:35:02.317000
|
||||||
CVE-2024-0047,0,0,c25f47e47c68f8ba9b41086c423ef72168ff29979539e7bc97672b3ded3ec18c,2024-03-12T12:40:13.500000
|
CVE-2024-0047,0,0,c25f47e47c68f8ba9b41086c423ef72168ff29979539e7bc97672b3ded3ec18c,2024-03-12T12:40:13.500000
|
||||||
CVE-2024-0048,0,1,2b50afbb16484af02f7a9fac9c6d27f3ee81b516e9d386d878d7bca0ff138175,2024-08-28T19:35:07.667000
|
CVE-2024-0048,0,0,2b50afbb16484af02f7a9fac9c6d27f3ee81b516e9d386d878d7bca0ff138175,2024-08-28T19:35:07.667000
|
||||||
CVE-2024-0049,0,0,f9f835822b69f6be57714cc4435ee72c0d6574c4bbf25abdddb096ed40c941c2,2024-08-01T13:45:56.777000
|
CVE-2024-0049,0,0,f9f835822b69f6be57714cc4435ee72c0d6574c4bbf25abdddb096ed40c941c2,2024-08-01T13:45:56.777000
|
||||||
CVE-2024-0050,0,0,58a42c9b281faf7f034f105a443afa241b3c1edb6abc4c502f110ae260e2255e,2024-08-14T20:35:05.473000
|
CVE-2024-0050,0,0,58a42c9b281faf7f034f105a443afa241b3c1edb6abc4c502f110ae260e2255e,2024-08-14T20:35:05.473000
|
||||||
CVE-2024-0051,0,1,d8619ee025d9755a2c3cbb0bd85ce3e0383bc5138599bd4fcfc12bfd088fcc67,2024-08-28T19:35:08.443000
|
CVE-2024-0051,0,0,d8619ee025d9755a2c3cbb0bd85ce3e0383bc5138599bd4fcfc12bfd088fcc67,2024-08-28T19:35:08.443000
|
||||||
CVE-2024-0052,0,0,028f0ef50c0a5bd8d4204c572d3df54976f47eea47c82f4c337b4b73e60f4aea,2024-03-12T12:40:13.500000
|
CVE-2024-0052,0,0,028f0ef50c0a5bd8d4204c572d3df54976f47eea47c82f4c337b4b73e60f4aea,2024-03-12T12:40:13.500000
|
||||||
CVE-2024-0053,0,0,1819b010c6a0341de8f41f40de4966b4aa1ac2481826c4f42a23be7eb74898c6,2024-03-12T12:40:13.500000
|
CVE-2024-0053,0,0,1819b010c6a0341de8f41f40de4966b4aa1ac2481826c4f42a23be7eb74898c6,2024-03-12T12:40:13.500000
|
||||||
CVE-2024-0054,0,0,65ffdd62a15fbba9fa1857978982b951512db6bc7615451d76f1e47eca67a7de,2024-03-19T13:26:46
|
CVE-2024-0054,0,0,65ffdd62a15fbba9fa1857978982b951512db6bc7615451d76f1e47eca67a7de,2024-03-19T13:26:46
|
||||||
@ -242141,7 +242141,7 @@ CVE-2024-1170,0,0,ef14266ea2026fd1e77d96d081d12f376a313e532bfd85bbf7562d8a6e990c
|
|||||||
CVE-2024-1171,0,0,59f6a72a19a26da04118a5786af1566b99863895f524fbe4b34406571782a615,2024-02-29T13:49:29.390000
|
CVE-2024-1171,0,0,59f6a72a19a26da04118a5786af1566b99863895f524fbe4b34406571782a615,2024-02-29T13:49:29.390000
|
||||||
CVE-2024-1172,0,0,11b44e5ce5101f5b7c8ab7c5bd49458795761e0ba5cf2024c3b79ca4ef4be57d,2024-02-29T13:49:29.390000
|
CVE-2024-1172,0,0,11b44e5ce5101f5b7c8ab7c5bd49458795761e0ba5cf2024c3b79ca4ef4be57d,2024-02-29T13:49:29.390000
|
||||||
CVE-2024-1173,0,0,d3495940fb5216c0fbed831a88233211893c24cb888781ac48f1d76bb3bc26ba,2024-05-02T18:00:37.360000
|
CVE-2024-1173,0,0,d3495940fb5216c0fbed831a88233211893c24cb888781ac48f1d76bb3bc26ba,2024-05-02T18:00:37.360000
|
||||||
CVE-2024-1174,0,0,5819d7dc07530e4f78032d8ca2898aeefda75500673f943b0bbe932afae90f9f,2024-03-01T22:22:25.913000
|
CVE-2024-1174,0,1,1a20d0936daa8c05ea33a8dfff3a4c4c734ee1e57e74d832a558685298d668aa,2024-08-28T21:35:03.473000
|
||||||
CVE-2024-1175,0,0,190484da8a43d8915393af59d3a99a603fc65c2c05796109a63c7e3028461e1e,2024-07-24T20:32:01.573000
|
CVE-2024-1175,0,0,190484da8a43d8915393af59d3a99a603fc65c2c05796109a63c7e3028461e1e,2024-07-24T20:32:01.573000
|
||||||
CVE-2024-1176,0,0,3a9729597b8ae5d1f7a6b2981371f9af662d86aa4ba3ac1ac5a3a2992dbcfc6a,2024-03-13T18:16:18.563000
|
CVE-2024-1176,0,0,3a9729597b8ae5d1f7a6b2981371f9af662d86aa4ba3ac1ac5a3a2992dbcfc6a,2024-03-13T18:16:18.563000
|
||||||
CVE-2024-1177,0,0,d9cdcff987bd78d6f32a7f8b0a8d2970109268852041331a890d212ad12ebb88,2024-02-13T14:06:04.817000
|
CVE-2024-1177,0,0,d9cdcff987bd78d6f32a7f8b0a8d2970109268852041331a890d212ad12ebb88,2024-02-13T14:06:04.817000
|
||||||
@ -243948,7 +243948,7 @@ CVE-2024-21498,0,0,3c9376a89b1471a3f3dcd2f26b2302ecf028dd3649469284754d6d6bbe15e
|
|||||||
CVE-2024-21499,0,0,056024a19cf11190da9415625f86200e7f99c9c1c15d5f4eac3772c0369f1c48,2024-02-20T19:50:53.960000
|
CVE-2024-21499,0,0,056024a19cf11190da9415625f86200e7f99c9c1c15d5f4eac3772c0369f1c48,2024-02-20T19:50:53.960000
|
||||||
CVE-2024-2150,0,0,c22643bdc0b2ebd66d5b5ba194b52141f4bdaa1a38843b6dbc7c558d59d8b77c,2024-05-17T02:38:04.570000
|
CVE-2024-2150,0,0,c22643bdc0b2ebd66d5b5ba194b52141f4bdaa1a38843b6dbc7c558d59d8b77c,2024-05-17T02:38:04.570000
|
||||||
CVE-2024-21500,0,0,e32cca032c5c817f0140a0fc7fc7560c3a63cfca90476fe248b7470595a38be1,2024-02-20T19:50:53.960000
|
CVE-2024-21500,0,0,e32cca032c5c817f0140a0fc7fc7560c3a63cfca90476fe248b7470595a38be1,2024-02-20T19:50:53.960000
|
||||||
CVE-2024-21501,0,1,d04e2442e85706ba7437e49b49125d8ebfada3b71184a475809a9f06322396f6,2024-08-28T18:35:07.823000
|
CVE-2024-21501,0,0,d04e2442e85706ba7437e49b49125d8ebfada3b71184a475809a9f06322396f6,2024-08-28T18:35:07.823000
|
||||||
CVE-2024-21502,0,0,fb5ae175e215ddb01ef01146351120b7135179219e17913fc19fbdc46d2b3141,2024-02-26T13:42:22.567000
|
CVE-2024-21502,0,0,fb5ae175e215ddb01ef01146351120b7135179219e17913fc19fbdc46d2b3141,2024-02-26T13:42:22.567000
|
||||||
CVE-2024-21503,0,0,e2363221420f9e91165d2e5e4f11cb5254f6968c7e760608a87c93e517f340a6,2024-07-03T01:46:41.680000
|
CVE-2024-21503,0,0,e2363221420f9e91165d2e5e4f11cb5254f6968c7e760608a87c93e517f340a6,2024-07-03T01:46:41.680000
|
||||||
CVE-2024-21504,0,0,d1975e31d99912870265dfe3c0f9fa565e4267402a6881e83026bdfe490998fd,2024-03-19T13:26:46
|
CVE-2024-21504,0,0,d1975e31d99912870265dfe3c0f9fa565e4267402a6881e83026bdfe490998fd,2024-03-19T13:26:46
|
||||||
@ -244949,7 +244949,7 @@ CVE-2024-23110,0,0,1ac4a7144e9209f9a89949f05fe1e7cc8c377744b32bfb607f177f1a970f3
|
|||||||
CVE-2024-23111,0,0,752974f238ed1f3e5e428baa91d031d0aceea7be33f8a58b9a2a43bae855557c,2024-08-23T02:47:13.560000
|
CVE-2024-23111,0,0,752974f238ed1f3e5e428baa91d031d0aceea7be33f8a58b9a2a43bae855557c,2024-08-23T02:47:13.560000
|
||||||
CVE-2024-23112,0,0,95e5175d7388e29c67df9af8c672941dd9e221ee4e0a1ee87f756c639ee8dad2,2024-03-15T14:51:58.497000
|
CVE-2024-23112,0,0,95e5175d7388e29c67df9af8c672941dd9e221ee4e0a1ee87f756c639ee8dad2,2024-03-15T14:51:58.497000
|
||||||
CVE-2024-23113,0,0,a86bcac9b7145820c2db580ab2ab4b188eadec5244c508e4a8d29ba1588a2fac,2024-02-22T15:33:00.970000
|
CVE-2024-23113,0,0,a86bcac9b7145820c2db580ab2ab4b188eadec5244c508e4a8d29ba1588a2fac,2024-02-22T15:33:00.970000
|
||||||
CVE-2024-23114,0,0,03e50e602026c87049fc39891badf0add6dff4aacb97347ed09b1b72c8d9744c,2024-02-20T19:50:53.960000
|
CVE-2024-23114,0,1,7252a5a302093b43221ea76f9a6a29eda61311bf101ae44cd86a63862ce26956,2024-08-28T20:35:06.210000
|
||||||
CVE-2024-23115,0,0,7b60c057c6ecb2992362930744ce2990e40a5ef55d9da25b0609baa5f284fa28,2024-04-02T12:50:42.233000
|
CVE-2024-23115,0,0,7b60c057c6ecb2992362930744ce2990e40a5ef55d9da25b0609baa5f284fa28,2024-04-02T12:50:42.233000
|
||||||
CVE-2024-23116,0,0,b697b868738862e20bfb62cd043729402a6443f2a45a0bdae976d2a021726d27,2024-04-02T12:50:42.233000
|
CVE-2024-23116,0,0,b697b868738862e20bfb62cd043729402a6443f2a45a0bdae976d2a021726d27,2024-04-02T12:50:42.233000
|
||||||
CVE-2024-23117,0,0,35c4c339ac9e75a53935ba1466f971b15f8b507bfeb01dc62bdf9baf493fb678,2024-04-02T12:50:42.233000
|
CVE-2024-23117,0,0,35c4c339ac9e75a53935ba1466f971b15f8b507bfeb01dc62bdf9baf493fb678,2024-04-02T12:50:42.233000
|
||||||
@ -245803,7 +245803,7 @@ CVE-2024-24307,0,0,2fcf14ca38bab8cba1cdf2b8a636d3012bd525398130d18348b221d8feb4a
|
|||||||
CVE-2024-24308,0,0,9ada0d13ba5340544a70c5b14e080090e424c427d0bb515a6aa9cb42f7e5a321,2024-08-19T17:35:09.203000
|
CVE-2024-24308,0,0,9ada0d13ba5340544a70c5b14e080090e424c427d0bb515a6aa9cb42f7e5a321,2024-08-19T17:35:09.203000
|
||||||
CVE-2024-24309,0,0,74ad226e5a232da1142911f5bab25c55d444703b053d90d81df4ec63a1f3a3f6,2024-08-01T13:47:25.043000
|
CVE-2024-24309,0,0,74ad226e5a232da1142911f5bab25c55d444703b053d90d81df4ec63a1f3a3f6,2024-08-01T13:47:25.043000
|
||||||
CVE-2024-2431,0,0,dd32a7ce0f7c35ba1e9622f905a1fe8fb75316c93f0f97412aef8e5b2aa9d804,2024-03-13T18:15:58.530000
|
CVE-2024-2431,0,0,dd32a7ce0f7c35ba1e9622f905a1fe8fb75316c93f0f97412aef8e5b2aa9d804,2024-03-13T18:15:58.530000
|
||||||
CVE-2024-24310,0,0,af04adebe05e8114c2a9b004dbebb8cc6f695f58ee0a67c77d2adc708c42b448,2024-02-26T13:42:22.567000
|
CVE-2024-24310,0,1,49de2d229494dcaf88bdbea8808fdf97cef92477947ea551609470feec6450a8,2024-08-28T21:35:04.093000
|
||||||
CVE-2024-24311,0,0,0b1cb4c07817a4dcaf8ad6ee7df96b5fd803208f5f5402c3441d71356d2e8e1c,2024-02-14T21:39:26.980000
|
CVE-2024-24311,0,0,0b1cb4c07817a4dcaf8ad6ee7df96b5fd803208f5f5402c3441d71356d2e8e1c,2024-02-14T21:39:26.980000
|
||||||
CVE-2024-24312,0,0,c3d81851b0a21c153d5502fcc6af6d534386ad04fb506c5f3df2dbd0255efd0a,2024-07-03T01:48:16.113000
|
CVE-2024-24312,0,0,c3d81851b0a21c153d5502fcc6af6d534386ad04fb506c5f3df2dbd0255efd0a,2024-07-03T01:48:16.113000
|
||||||
CVE-2024-24313,0,0,fb5ae34a5906d70e9a89b5d57ccc3ef0ec67afb90df0388312d4db57d8583f43,2024-07-03T01:48:16.943000
|
CVE-2024-24313,0,0,fb5ae34a5906d70e9a89b5d57ccc3ef0ec67afb90df0388312d4db57d8583f43,2024-07-03T01:48:16.943000
|
||||||
@ -246253,7 +246253,7 @@ CVE-2024-25015,0,0,4c1212c8f769823bd4e7049fb129f848dc20c143fc1cc72b02abca5f7451e
|
|||||||
CVE-2024-25016,0,0,0e9311458b59df4142779e7a8b1d9bd170deea1a4bb4a555b03bbf822c263b92,2024-03-04T13:58:23.447000
|
CVE-2024-25016,0,0,0e9311458b59df4142779e7a8b1d9bd170deea1a4bb4a555b03bbf822c263b92,2024-03-04T13:58:23.447000
|
||||||
CVE-2024-25021,0,0,8332f86306f4ceab760e5f5e3a003f3f5c62fd1b6b574c6e3af70a41de71cd64,2024-02-22T19:07:27.197000
|
CVE-2024-25021,0,0,8332f86306f4ceab760e5f5e3a003f3f5c62fd1b6b574c6e3af70a41de71cd64,2024-02-22T19:07:27.197000
|
||||||
CVE-2024-25023,0,0,3b6e01d80c9261e3c9d5f00ef664e0cb38b680e426f57b9aa0b21aa4414e149e,2024-07-11T13:05:54.930000
|
CVE-2024-25023,0,0,3b6e01d80c9261e3c9d5f00ef664e0cb38b680e426f57b9aa0b21aa4414e149e,2024-07-11T13:05:54.930000
|
||||||
CVE-2024-25024,0,0,5b50d32398b3d8009e2e511ffa51300a2834b21c0a317a99bfa2ae17a818833f,2024-08-15T13:01:10.150000
|
CVE-2024-25024,0,1,c5213c97e29706cc8502e6ba764e983599ae5293cf5cf0bdf7f7d6886ba77ef4,2024-08-28T21:53:10.720000
|
||||||
CVE-2024-25026,0,0,51187726c38059d92f52ec9be2e9837ba43ea1016581cd7fb52f8ca8d70895d6,2024-04-25T13:18:02.660000
|
CVE-2024-25026,0,0,51187726c38059d92f52ec9be2e9837ba43ea1016581cd7fb52f8ca8d70895d6,2024-04-25T13:18:02.660000
|
||||||
CVE-2024-25027,0,0,119aec53d2012d07639e5485533be77b5b9837d2988927dbbb62ff5ba0a76624,2024-04-02T17:57:34.440000
|
CVE-2024-25027,0,0,119aec53d2012d07639e5485533be77b5b9837d2988927dbbb62ff5ba0a76624,2024-04-02T17:57:34.440000
|
||||||
CVE-2024-25029,0,0,73ebd4fbdc79e08bf51bbd35bffc00987416d5257a1f182e37909ac1996360e7,2024-04-08T18:48:40.217000
|
CVE-2024-25029,0,0,73ebd4fbdc79e08bf51bbd35bffc00987416d5257a1f182e37909ac1996360e7,2024-04-08T18:48:40.217000
|
||||||
@ -246366,7 +246366,7 @@ CVE-2024-25170,0,0,5a57c221aced5771a411a434828fd35e5d41dcc64fd1585dedec2f988b96a
|
|||||||
CVE-2024-25175,0,0,82ee8e03ebec4e8b131826423b9193f799e642892bb29c3d5eecad8e1ca0ad29,2024-08-15T21:35:06.723000
|
CVE-2024-25175,0,0,82ee8e03ebec4e8b131826423b9193f799e642892bb29c3d5eecad8e1ca0ad29,2024-08-15T21:35:06.723000
|
||||||
CVE-2024-2518,0,0,67143896f82c167febad3b5ae58ed9a1bb65a46487dbef8c359c6c9e56cccd8d,2024-05-17T02:38:16.523000
|
CVE-2024-2518,0,0,67143896f82c167febad3b5ae58ed9a1bb65a46487dbef8c359c6c9e56cccd8d,2024-05-17T02:38:16.523000
|
||||||
CVE-2024-25180,0,0,8c8cea33a8c1bad01398ae9d5caf8e0f261db9188d8abf6e5630bbb7f06810da,2024-08-26T20:35:12.890000
|
CVE-2024-25180,0,0,8c8cea33a8c1bad01398ae9d5caf8e0f261db9188d8abf6e5630bbb7f06810da,2024-08-26T20:35:12.890000
|
||||||
CVE-2024-25187,0,0,235931cb55f2324cb5235f058c93cb713e862085431cae896b9108cfe9eba975,2024-04-02T12:50:42.233000
|
CVE-2024-25187,0,1,3f849b5c9e9055fc7421b5d436dcb2dd592f0d29cf293a63eb0bdef9513504b8,2024-08-28T20:35:06.460000
|
||||||
CVE-2024-25189,0,0,b7285685c6f5c1c6f11a2dabc1c6b4d00245303e64f2bbc0a8b2b13145e32ef7,2024-08-26T19:35:15.397000
|
CVE-2024-25189,0,0,b7285685c6f5c1c6f11a2dabc1c6b4d00245303e64f2bbc0a8b2b13145e32ef7,2024-08-26T19:35:15.397000
|
||||||
CVE-2024-2519,0,0,eb14bc0f40cc4481fcfca7e958fe17ad792ad1814e9d752d8e87eadfd574ac80,2024-05-17T02:38:16.610000
|
CVE-2024-2519,0,0,eb14bc0f40cc4481fcfca7e958fe17ad792ad1814e9d752d8e87eadfd574ac80,2024-05-17T02:38:16.610000
|
||||||
CVE-2024-25190,0,0,c3a0f2b38cd0b3f7473eb6954f63f83b24d13fd5e163be63555d08acedef83ae,2024-08-19T20:35:06.090000
|
CVE-2024-25190,0,0,c3a0f2b38cd0b3f7473eb6954f63f83b24d13fd5e163be63555d08acedef83ae,2024-08-19T20:35:06.090000
|
||||||
@ -246385,7 +246385,7 @@ CVE-2024-25209,0,0,d5a869bb410fd2403b975aa6acf4c48509a1d388c3696e8d5965ba3440b96
|
|||||||
CVE-2024-2521,0,0,0838497f1916a708252295ddb1e5512e6c3ac757ef93b04ae3f403784c7490e3,2024-05-17T02:38:16.787000
|
CVE-2024-2521,0,0,0838497f1916a708252295ddb1e5512e6c3ac757ef93b04ae3f403784c7490e3,2024-05-17T02:38:16.787000
|
||||||
CVE-2024-25210,0,0,dd28b2c6cb9a88a5b91c68f6ad7360de203218fb8e2273a408f42a17c2d3394b,2024-02-14T16:13:16.563000
|
CVE-2024-25210,0,0,dd28b2c6cb9a88a5b91c68f6ad7360de203218fb8e2273a408f42a17c2d3394b,2024-02-14T16:13:16.563000
|
||||||
CVE-2024-25211,0,0,f0c0cc0b75a85bd287956104006e6509dabb58e126ecbb91e5dbba932e52990a,2024-02-14T16:13:16.563000
|
CVE-2024-25211,0,0,f0c0cc0b75a85bd287956104006e6509dabb58e126ecbb91e5dbba932e52990a,2024-02-14T16:13:16.563000
|
||||||
CVE-2024-25212,0,0,4989dc122506c608076abea65ae7e0b9789e3d95d8eb0664d8c70c9ad9009364,2024-02-15T06:27:12.610000
|
CVE-2024-25212,0,1,2f511dbe53dda725f1026e6fb3684ad3dcdbb4e3a9bf4b3999eacf1d7a2579a0,2024-08-28T20:35:07.213000
|
||||||
CVE-2024-25213,0,0,c54ec18894af4a5d6ced7000bcaa8c487846e8fcbfc5321ba8aad242a58f22d8,2024-02-15T06:27:20.520000
|
CVE-2024-25213,0,0,c54ec18894af4a5d6ced7000bcaa8c487846e8fcbfc5321ba8aad242a58f22d8,2024-02-15T06:27:20.520000
|
||||||
CVE-2024-25214,0,0,1ba8af84b5d311dbb39674bae13cefbf6d7fcb4d9ffa5558f51b66ae2fef5be2,2024-08-16T20:35:06.060000
|
CVE-2024-25214,0,0,1ba8af84b5d311dbb39674bae13cefbf6d7fcb4d9ffa5558f51b66ae2fef5be2,2024-08-16T20:35:06.060000
|
||||||
CVE-2024-25215,0,0,3b37a94df90b65e7417dee74161c3b1b221d93df92a185b49be1c5811fcd762a,2024-02-15T06:27:41.287000
|
CVE-2024-25215,0,0,3b37a94df90b65e7417dee74161c3b1b221d93df92a185b49be1c5811fcd762a,2024-02-15T06:27:41.287000
|
||||||
@ -246488,7 +246488,7 @@ CVE-2024-25407,0,0,acf0dedeaaf5cb4ed513286f293369fa64a4aa24615bdc4521396e5298313
|
|||||||
CVE-2024-25410,0,0,bd9e79518cb72a7506fa003003f0ba0ca5f3409a943529c82b970295f2c8078b,2024-08-16T17:35:06.847000
|
CVE-2024-25410,0,0,bd9e79518cb72a7506fa003003f0ba0ca5f3409a943529c82b970295f2c8078b,2024-08-16T17:35:06.847000
|
||||||
CVE-2024-25413,0,0,e60164141d6ef6aae483b347bcb438f10cf90b0fdc503439bf774c3a45e4d7f4,2024-08-06T16:35:06.130000
|
CVE-2024-25413,0,0,e60164141d6ef6aae483b347bcb438f10cf90b0fdc503439bf774c3a45e4d7f4,2024-08-06T16:35:06.130000
|
||||||
CVE-2024-25414,0,0,e37faede54af522703a4e537065f1d12f9e2e079cddb040df250a6ab47704e37,2024-02-16T13:37:51.433000
|
CVE-2024-25414,0,0,e37faede54af522703a4e537065f1d12f9e2e079cddb040df250a6ab47704e37,2024-02-16T13:37:51.433000
|
||||||
CVE-2024-25415,0,0,669eb2c339e3bc5aae821eb5536f61ec9a8ace328fdd7918c4b65de35957067d,2024-06-07T15:15:49.860000
|
CVE-2024-25415,0,1,43d479f30c3959db40e37d85a2a1b1d045a277956526655bc82aa0e8d248892a,2024-08-28T20:35:08.127000
|
||||||
CVE-2024-25417,0,0,cf357097a5dbee01106addf2bdb29bed8730a5f939b7183e3782b75ef2c81884,2024-02-12T21:39:48.423000
|
CVE-2024-25417,0,0,cf357097a5dbee01106addf2bdb29bed8730a5f939b7183e3782b75ef2c81884,2024-02-12T21:39:48.423000
|
||||||
CVE-2024-25418,0,0,fbf3230abb474f635289b641f229f06b9a80ca6e048d349c7b63bb08b846e66c,2024-02-12T21:39:57.963000
|
CVE-2024-25418,0,0,fbf3230abb474f635289b641f229f06b9a80ca6e048d349c7b63bb08b846e66c,2024-02-12T21:39:57.963000
|
||||||
CVE-2024-25419,0,0,86ab500bc7ab26f561a7c75d9375e21b9bceb9aa3d956bf22a9e15d3fe2a75df,2024-02-12T21:40:04.610000
|
CVE-2024-25419,0,0,86ab500bc7ab26f561a7c75d9375e21b9bceb9aa3d956bf22a9e15d3fe2a75df,2024-02-12T21:40:04.610000
|
||||||
@ -246683,7 +246683,7 @@ CVE-2024-2571,0,0,944818011263aece939e20c7251816424f7831487c7b65e2eb2d8bf532c69b
|
|||||||
CVE-2024-25710,0,0,d1e1c2f14ac0fdaa17f43a1220d128117b47331cb5ccaceca080941af70611b1,2024-03-07T17:15:12.940000
|
CVE-2024-25710,0,0,d1e1c2f14ac0fdaa17f43a1220d128117b47331cb5ccaceca080941af70611b1,2024-03-07T17:15:12.940000
|
||||||
CVE-2024-25711,0,0,c4c08c8cc09954759ac01254a6c034bf78d852c0e2f0fb9c387add767b4de561,2024-02-27T14:20:06.637000
|
CVE-2024-25711,0,0,c4c08c8cc09954759ac01254a6c034bf78d852c0e2f0fb9c387add767b4de561,2024-02-27T14:20:06.637000
|
||||||
CVE-2024-25712,0,0,cd76bf59fa3b149c026f0736470198c42042811b7fa0e2166e37d9fe09aff8b0,2024-02-29T13:49:29.390000
|
CVE-2024-25712,0,0,cd76bf59fa3b149c026f0736470198c42042811b7fa0e2166e37d9fe09aff8b0,2024-02-29T13:49:29.390000
|
||||||
CVE-2024-25713,0,0,35921be59b83d8af2e145b580a5667b3fbf17b7b509666f1c0fba54cc2b0bcc8,2024-04-19T23:15:10.380000
|
CVE-2024-25713,0,1,3d79b0984c1664e4ac69ee01cb3f8d7ad091cc5b18ae7eaaba60f08548db4afd,2024-08-28T21:35:04.973000
|
||||||
CVE-2024-25714,0,0,70f54472da145604490960ea7894946414b866256679ffb698af736efe283386,2024-08-01T13:47:49.190000
|
CVE-2024-25714,0,0,70f54472da145604490960ea7894946414b866256679ffb698af736efe283386,2024-08-01T13:47:49.190000
|
||||||
CVE-2024-25715,0,0,c088d4b977142e9dcb9ad21b32e4f9aa61385e1d7ddbd4c017103ce015b7a37f,2024-02-16T21:35:54.270000
|
CVE-2024-25715,0,0,c088d4b977142e9dcb9ad21b32e4f9aa61385e1d7ddbd4c017103ce015b7a37f,2024-02-16T21:35:54.270000
|
||||||
CVE-2024-25718,0,0,36013110a47522378a7f909cc9712cbde51ab694884ada3d0c70dc8ae34e1797,2024-08-01T20:35:25.977000
|
CVE-2024-25718,0,0,36013110a47522378a7f909cc9712cbde51ab694884ada3d0c70dc8ae34e1797,2024-08-01T20:35:25.977000
|
||||||
@ -246708,8 +246708,8 @@ CVE-2024-25741,0,0,fa774b03cf2ebe73114d17fe942f33d91843719d380f7003343f1feba56a5
|
|||||||
CVE-2024-25742,0,0,64a7e49ba77fe66b1f40220a562db53fca6672cb5535d529c8b5770ce2d5e19b,2024-05-20T13:00:34.807000
|
CVE-2024-25742,0,0,64a7e49ba77fe66b1f40220a562db53fca6672cb5535d529c8b5770ce2d5e19b,2024-05-20T13:00:34.807000
|
||||||
CVE-2024-25743,0,0,1c0eddf9ff39c172b1917b2af6c386627e5412677b9092ed1b4c80ec112bb6af,2024-08-15T16:35:04.743000
|
CVE-2024-25743,0,0,1c0eddf9ff39c172b1917b2af6c386627e5412677b9092ed1b4c80ec112bb6af,2024-08-15T16:35:04.743000
|
||||||
CVE-2024-25744,0,0,fc000ffd12e257e2403c7531be849ad7ae284e04e5faaeff0bd3c4b1bee1e1f6,2024-02-12T14:20:03.287000
|
CVE-2024-25744,0,0,fc000ffd12e257e2403c7531be849ad7ae284e04e5faaeff0bd3c4b1bee1e1f6,2024-02-12T14:20:03.287000
|
||||||
CVE-2024-25746,0,1,8855a194466e5deeab9baa1ad399e9a9947473b628737c1175263f75df97cfa1,2024-08-28T18:35:09.110000
|
CVE-2024-25746,0,0,8855a194466e5deeab9baa1ad399e9a9947473b628737c1175263f75df97cfa1,2024-08-28T18:35:09.110000
|
||||||
CVE-2024-25748,0,1,5bb6acf358e655979178d585c8c32b626bf8ea83fccfe3ee7cdea479e1332b26,2024-08-28T18:35:10.337000
|
CVE-2024-25748,0,0,5bb6acf358e655979178d585c8c32b626bf8ea83fccfe3ee7cdea479e1332b26,2024-08-28T18:35:10.337000
|
||||||
CVE-2024-2575,0,0,a80d23ced381ef92b364937b2fb4dfbb5da5d71a7483fe8d8649f5052e293551,2024-06-07T20:15:11.520000
|
CVE-2024-2575,0,0,a80d23ced381ef92b364937b2fb4dfbb5da5d71a7483fe8d8649f5052e293551,2024-06-07T20:15:11.520000
|
||||||
CVE-2024-25751,0,0,8b180bfbf73b312b967d5200f41f4f4e3328a340941b788f5a6ee93c4d770b58,2024-08-27T19:35:15.767000
|
CVE-2024-25751,0,0,8b180bfbf73b312b967d5200f41f4f4e3328a340941b788f5a6ee93c4d770b58,2024-08-27T19:35:15.767000
|
||||||
CVE-2024-25753,0,0,3303d3f561a201b11986a4546c74260382f6d919781c88643b2fe7778dcd9e8b,2024-08-01T13:47:51.623000
|
CVE-2024-25753,0,0,3303d3f561a201b11986a4546c74260382f6d919781c88643b2fe7778dcd9e8b,2024-08-01T13:47:51.623000
|
||||||
@ -246773,7 +246773,7 @@ CVE-2024-2588,0,0,d929ea9fc76d73a92e0f60853fb9e3277ed73e9df922a4da6e549ab75ddb35
|
|||||||
CVE-2024-2589,0,0,c013a892db4b6c9e5083074a6ba63c6dd2462c0f9900a29d5df8d96a9aeef8ee,2024-03-18T19:40:00.173000
|
CVE-2024-2589,0,0,c013a892db4b6c9e5083074a6ba63c6dd2462c0f9900a29d5df8d96a9aeef8ee,2024-03-18T19:40:00.173000
|
||||||
CVE-2024-25891,0,0,84cfc5f312c597141ee54b1ce3a081aaaa3c04f515375840db467867fd6cd895,2024-02-22T19:07:27.197000
|
CVE-2024-25891,0,0,84cfc5f312c597141ee54b1ce3a081aaaa3c04f515375840db467867fd6cd895,2024-02-22T19:07:27.197000
|
||||||
CVE-2024-25892,0,0,07c9353c0d552f69039cc71e4568ea59bc368ec591c74518e59aba5979c0e7bd,2024-08-14T15:35:06.250000
|
CVE-2024-25892,0,0,07c9353c0d552f69039cc71e4568ea59bc368ec591c74518e59aba5979c0e7bd,2024-08-14T15:35:06.250000
|
||||||
CVE-2024-25893,0,0,6074afa7b83b45196c5c6ba86bd6a55a5db84fa3d221197e7e610730da7175c7,2024-02-22T19:07:27.197000
|
CVE-2024-25893,0,1,e6dd333e76ca528d7682aca848e688db2c531a8ac894f28a9101c266e57021da,2024-08-28T21:35:05.727000
|
||||||
CVE-2024-25894,0,0,110687aa8f80df3297624f90f6f33809d75def9197abe56922d406f86b8dd02c,2024-08-01T13:47:55.813000
|
CVE-2024-25894,0,0,110687aa8f80df3297624f90f6f33809d75def9197abe56922d406f86b8dd02c,2024-08-01T13:47:55.813000
|
||||||
CVE-2024-25895,0,0,4ad6b56345de948a6e266d7d9c59e0f3f67a87b7a67e84d7f7541ae3635b9194,2024-08-15T20:35:04.423000
|
CVE-2024-25895,0,0,4ad6b56345de948a6e266d7d9c59e0f3f67a87b7a67e84d7f7541ae3635b9194,2024-08-15T20:35:04.423000
|
||||||
CVE-2024-25896,0,0,08f878ee14441b76754056ef0405ddf3a84202dc82f048a455b46423ba277c2d,2024-02-22T19:07:27.197000
|
CVE-2024-25896,0,0,08f878ee14441b76754056ef0405ddf3a84202dc82f048a455b46423ba277c2d,2024-02-22T19:07:27.197000
|
||||||
@ -246877,7 +246877,7 @@ CVE-2024-25989,0,0,14738c46f94e94e6b7897446658f285f8e9a188c6fec45e970fce017c50eb
|
|||||||
CVE-2024-2599,0,0,448bf984845294b825ad64c45fc7ff6a1a97b88712ab8f0c7b9899ecc5e48ad8,2024-03-18T19:40:00.173000
|
CVE-2024-2599,0,0,448bf984845294b825ad64c45fc7ff6a1a97b88712ab8f0c7b9899ecc5e48ad8,2024-03-18T19:40:00.173000
|
||||||
CVE-2024-25990,0,0,05042610d9d9eeed77c351ef8461507e7363f5a24856c830f88125ac3a7bb105,2024-08-01T13:47:57.997000
|
CVE-2024-25990,0,0,05042610d9d9eeed77c351ef8461507e7363f5a24856c830f88125ac3a7bb105,2024-08-01T13:47:57.997000
|
||||||
CVE-2024-25991,0,0,55a93164172a1b22ef8f30a0ed89816155551a2ca968148a5c0da905634180b8,2024-03-12T12:40:13.500000
|
CVE-2024-25991,0,0,55a93164172a1b22ef8f30a0ed89816155551a2ca968148a5c0da905634180b8,2024-03-12T12:40:13.500000
|
||||||
CVE-2024-25992,0,1,caaba6874e69765d9fe6451819eb539f4e123768237e917b71bdea3c61f79a30,2024-08-28T19:35:09.697000
|
CVE-2024-25992,0,0,caaba6874e69765d9fe6451819eb539f4e123768237e917b71bdea3c61f79a30,2024-08-28T19:35:09.697000
|
||||||
CVE-2024-25993,0,0,e7cf4460dc5198c620b3541161c2ca1906e1b44bebbdda031856c68acc35baa6,2024-08-15T20:35:05.303000
|
CVE-2024-25993,0,0,e7cf4460dc5198c620b3541161c2ca1906e1b44bebbdda031856c68acc35baa6,2024-08-15T20:35:05.303000
|
||||||
CVE-2024-25994,0,0,4a9979fd659a52838af4203d59aee9f2f6fbf6a2d3333b82853712f36ab74c9a,2024-03-12T12:40:13.500000
|
CVE-2024-25994,0,0,4a9979fd659a52838af4203d59aee9f2f6fbf6a2d3333b82853712f36ab74c9a,2024-03-12T12:40:13.500000
|
||||||
CVE-2024-25995,0,0,7785cd6f8b87e1198fedd03d14b86de2a700a99574185f6812c6d8bee7390322,2024-03-12T12:40:13.500000
|
CVE-2024-25995,0,0,7785cd6f8b87e1198fedd03d14b86de2a700a99574185f6812c6d8bee7390322,2024-03-12T12:40:13.500000
|
||||||
@ -247222,11 +247222,11 @@ CVE-2024-2640,0,0,d67ac0f9a6f6b556e0c1b723f2f31c17146e454f4580301ea55d956e5019b2
|
|||||||
CVE-2024-2641,0,0,9224bc0a65307cb53933c2d7858f8e3abf23dbc7ae542920adafdc9d5bf4c895,2024-05-17T02:38:22.647000
|
CVE-2024-2641,0,0,9224bc0a65307cb53933c2d7858f8e3abf23dbc7ae542920adafdc9d5bf4c895,2024-05-17T02:38:22.647000
|
||||||
CVE-2024-2642,0,0,f4d5d0409211a54140db72574a0074f769063560d7df04b7b7402f6cc784e4a4,2024-05-17T02:38:22.743000
|
CVE-2024-2642,0,0,f4d5d0409211a54140db72574a0074f769063560d7df04b7b7402f6cc784e4a4,2024-05-17T02:38:22.743000
|
||||||
CVE-2024-2644,0,0,fab6e7415abdc266e0f9914dee035a72adfdb797420e958820a3298690e993b0,2024-06-05T20:15:12.680000
|
CVE-2024-2644,0,0,fab6e7415abdc266e0f9914dee035a72adfdb797420e958820a3298690e993b0,2024-06-05T20:15:12.680000
|
||||||
CVE-2024-26445,0,0,74115bffcb152deed7c7fab52d82a4ce2ff67f5690ad0b6e7b2b606b95da4bcd,2024-02-22T19:07:27.197000
|
CVE-2024-26445,0,1,3ad35fce57999549366fe75957d1ee38511704ca77b59a13d71bd470d9abd074,2024-08-28T21:35:06.473000
|
||||||
CVE-2024-2645,0,0,67f71252e39d0ed76704dae79e75d677c0e90051473290647c0cf447a8a8225f,2024-06-27T20:15:20.417000
|
CVE-2024-2645,0,0,67f71252e39d0ed76704dae79e75d677c0e90051473290647c0cf447a8a8225f,2024-06-27T20:15:20.417000
|
||||||
CVE-2024-26450,0,0,2146e3629e9f66432c697f6f39985fce2f3781294b94d7100d7ec0e05de5d8ff,2024-03-09T08:15:06.120000
|
CVE-2024-26450,0,0,2146e3629e9f66432c697f6f39985fce2f3781294b94d7100d7ec0e05de5d8ff,2024-03-09T08:15:06.120000
|
||||||
CVE-2024-26454,0,0,81eabbcddc4452199e1fbc82a1f9c649bd6c739560f3b4e9fd2208f082955849,2024-03-15T12:53:06.423000
|
CVE-2024-26454,0,0,81eabbcddc4452199e1fbc82a1f9c649bd6c739560f3b4e9fd2208f082955849,2024-03-15T12:53:06.423000
|
||||||
CVE-2024-26455,0,0,4a35ecf92a208e49d66ccdff386f1d2053fb9597db1a9f9f2c48be61a141ec4e,2024-02-26T22:10:40.463000
|
CVE-2024-26455,0,1,24002b24bc6de1eece0f3fc2139bf437dca858793debcca4d45e15415e2ceb55,2024-08-28T21:35:07.220000
|
||||||
CVE-2024-26458,0,0,a765d34e6f5b725d584f2b00225139e479f8d76beade21f52c1720860105f89b,2024-05-14T15:09:00.470000
|
CVE-2024-26458,0,0,a765d34e6f5b725d584f2b00225139e479f8d76beade21f52c1720860105f89b,2024-05-14T15:09:00.470000
|
||||||
CVE-2024-2646,0,0,ee46ce874cc14b8f1b3378e14871fd20ec8fc831984d94fc396d6a2b62dd0259,2024-05-17T02:38:23.033000
|
CVE-2024-2646,0,0,ee46ce874cc14b8f1b3378e14871fd20ec8fc831984d94fc396d6a2b62dd0259,2024-05-17T02:38:23.033000
|
||||||
CVE-2024-26461,0,0,0b892c8bcbbbf8814ae786a53ca82ff2dc0971c3ced34bcc3c4cddb340bd0150,2024-08-14T16:35:10.207000
|
CVE-2024-26461,0,0,0b892c8bcbbbf8814ae786a53ca82ff2dc0971c3ced34bcc3c4cddb340bd0150,2024-08-14T16:35:10.207000
|
||||||
@ -247252,7 +247252,7 @@ CVE-2024-26484,0,0,c8047678f7231824b5c927e31411e2a4e30944b1f11ae642e23849e18530b
|
|||||||
CVE-2024-26489,0,0,66cfbedf131a53c21ff3313641983aeb0011805244fec1b387ac6a56f1259318,2024-02-22T19:07:27.197000
|
CVE-2024-26489,0,0,66cfbedf131a53c21ff3313641983aeb0011805244fec1b387ac6a56f1259318,2024-02-22T19:07:27.197000
|
||||||
CVE-2024-2649,0,0,33b94c38d3a45f74f6718ae1eb94103cab8852874cf5ba7ffe3119736f42cfff,2024-05-17T02:38:23.307000
|
CVE-2024-2649,0,0,33b94c38d3a45f74f6718ae1eb94103cab8852874cf5ba7ffe3119736f42cfff,2024-05-17T02:38:23.307000
|
||||||
CVE-2024-26490,0,0,aa5c95d9568ffeff67d082f5e625a8d3790e84f13ee3d4cb803a75ca49441fa4,2024-02-22T19:07:27.197000
|
CVE-2024-26490,0,0,aa5c95d9568ffeff67d082f5e625a8d3790e84f13ee3d4cb803a75ca49441fa4,2024-02-22T19:07:27.197000
|
||||||
CVE-2024-26491,0,0,3d9a25d9d13dab43f4fccb79edc1a9c15bdabd787c28cc0e8ec66c7f9fee32e0,2024-02-22T19:07:27.197000
|
CVE-2024-26491,0,1,74f1ba8b39e9410256b69e956a81c1395874aa769444270185f7eb4f2f689d03,2024-08-28T20:35:09.023000
|
||||||
CVE-2024-26492,0,0,776536ff3e72d199deab8e9d9e1f16da2e95ac241f37505598569b095df6bfc6,2024-03-08T14:02:57.420000
|
CVE-2024-26492,0,0,776536ff3e72d199deab8e9d9e1f16da2e95ac241f37505598569b095df6bfc6,2024-03-08T14:02:57.420000
|
||||||
CVE-2024-26495,0,0,3c32f7bed61a7925414ccba584adc4484e3c603c024ccad8423c6f927ec096b6,2024-04-03T12:38:04.840000
|
CVE-2024-26495,0,0,3c32f7bed61a7925414ccba584adc4484e3c603c024ccad8423c6f927ec096b6,2024-04-03T12:38:04.840000
|
||||||
CVE-2024-2650,0,0,4b5612c4084720b2f75ed069d914fcdc0a38f0f53c7b3b04b755c2a4e98778bb,2024-04-10T13:23:38.787000
|
CVE-2024-2650,0,0,4b5612c4084720b2f75ed069d914fcdc0a38f0f53c7b3b04b755c2a4e98778bb,2024-04-10T13:23:38.787000
|
||||||
@ -247263,7 +247263,7 @@ CVE-2024-2651,0,0,bd146bedf6ebe2167b2a748a6767423198ce44fb77df6650381302c98af6fd
|
|||||||
CVE-2024-26517,0,0,26d33e1785f323f6a59cabe443b6ac20ef93d37ea417fa08778ea549f200621f,2024-05-14T16:13:02.773000
|
CVE-2024-26517,0,0,26d33e1785f323f6a59cabe443b6ac20ef93d37ea417fa08778ea549f200621f,2024-05-14T16:13:02.773000
|
||||||
CVE-2024-26520,0,0,86e0582816b93edd4eb3d1c9ff436171e7839b198d50b34d2ff44523de982520,2024-08-01T15:35:07.080000
|
CVE-2024-26520,0,0,86e0582816b93edd4eb3d1c9ff436171e7839b198d50b34d2ff44523de982520,2024-08-01T15:35:07.080000
|
||||||
CVE-2024-26521,0,0,ff2a5c02f9a6415a5b63e6732629254f75c56e7bdeff107f4eb34b7b12623384,2024-08-27T21:35:14.300000
|
CVE-2024-26521,0,0,ff2a5c02f9a6415a5b63e6732629254f75c56e7bdeff107f4eb34b7b12623384,2024-08-27T21:35:14.300000
|
||||||
CVE-2024-26529,0,1,a99f8b82dd93bb8e095cf66957c2511d719283fb972a26f9f23d0d1aca2bb1bf,2024-08-28T19:35:10.463000
|
CVE-2024-26529,0,0,a99f8b82dd93bb8e095cf66957c2511d719283fb972a26f9f23d0d1aca2bb1bf,2024-08-28T19:35:10.463000
|
||||||
CVE-2024-2653,0,0,b3409d37c73c6e84286baa910f6042b0e4464dede287f82c98b61b036f897600,2024-05-01T18:15:19.257000
|
CVE-2024-2653,0,0,b3409d37c73c6e84286baa910f6042b0e4464dede287f82c98b61b036f897600,2024-05-01T18:15:19.257000
|
||||||
CVE-2024-2654,0,0,44518084de18b3ca2eeba7166bf4da9d0a7d05a78603be70a4c69d74aa776745,2024-04-10T13:23:38.787000
|
CVE-2024-2654,0,0,44518084de18b3ca2eeba7166bf4da9d0a7d05a78603be70a4c69d74aa776745,2024-04-10T13:23:38.787000
|
||||||
CVE-2024-26540,0,0,261971c75fd99d69bc373d27d0b3c0e0616255d37283f552b45502ec0054fabe,2024-08-27T18:35:05.790000
|
CVE-2024-26540,0,0,261971c75fd99d69bc373d27d0b3c0e0616255d37283f552b45502ec0054fabe,2024-08-27T18:35:05.790000
|
||||||
@ -247953,7 +247953,7 @@ CVE-2024-27209,0,0,88724fb64803101f437886fbfbe86fa525a1caaa815e888f256e5571c93f2
|
|||||||
CVE-2024-2721,0,0,c7dffe084f91bae26b936c1afd1da9c04f9b37aef98b6753f280b03d8572eb4e,2024-03-20T13:00:16.367000
|
CVE-2024-2721,0,0,c7dffe084f91bae26b936c1afd1da9c04f9b37aef98b6753f280b03d8572eb4e,2024-03-20T13:00:16.367000
|
||||||
CVE-2024-27210,0,0,745478bdb4403a82fac13021bc89339c878beb6d9492b165b8482fafb3cfd461,2024-08-01T13:48:18.507000
|
CVE-2024-27210,0,0,745478bdb4403a82fac13021bc89339c878beb6d9492b165b8482fafb3cfd461,2024-08-01T13:48:18.507000
|
||||||
CVE-2024-27211,0,0,6894b26756f6df7632bdb8a4b3513238346653fd0ee071685f883ad79c0a0f9c,2024-08-05T15:35:12.083000
|
CVE-2024-27211,0,0,6894b26756f6df7632bdb8a4b3513238346653fd0ee071685f883ad79c0a0f9c,2024-08-05T15:35:12.083000
|
||||||
CVE-2024-27212,0,1,cd8d0cb9f45aa7ccf7d445110f8f2832810df99d9a78af5cf6414a8df74e5422,2024-08-28T19:35:10.640000
|
CVE-2024-27212,0,0,cd8d0cb9f45aa7ccf7d445110f8f2832810df99d9a78af5cf6414a8df74e5422,2024-08-28T19:35:10.640000
|
||||||
CVE-2024-27213,0,0,38bf62e6cca45cb13c31c1b3c1f577caf25772cec3b7bdb3ce04f4d4c6e5cbdf,2024-08-01T13:48:19.280000
|
CVE-2024-27213,0,0,38bf62e6cca45cb13c31c1b3c1f577caf25772cec3b7bdb3ce04f4d4c6e5cbdf,2024-08-01T13:48:19.280000
|
||||||
CVE-2024-27215,0,0,60ef065eae63cf58718fd9a5d80dfa62c007813e270493517bc98a19fcefe594,2024-02-21T18:15:52.060000
|
CVE-2024-27215,0,0,60ef065eae63cf58718fd9a5d80dfa62c007813e270493517bc98a19fcefe594,2024-02-21T18:15:52.060000
|
||||||
CVE-2024-27217,0,0,cb0dbfe9327fc52a02d056b77105239417a7cff860961ae434eeaf1ef6d2cb33,2024-05-07T13:39:32.710000
|
CVE-2024-27217,0,0,cb0dbfe9327fc52a02d056b77105239417a7cff860961ae434eeaf1ef6d2cb33,2024-05-07T13:39:32.710000
|
||||||
@ -247968,7 +247968,7 @@ CVE-2024-27224,0,0,a3ab635f09865455059477937ba40dabd5c75c049ca5d090f69e7a764213a
|
|||||||
CVE-2024-27225,0,0,aa18bff66f03b0f275eac87bd5ea1a86e059d41f5a0861894165d74704434328,2024-03-12T12:40:13.500000
|
CVE-2024-27225,0,0,aa18bff66f03b0f275eac87bd5ea1a86e059d41f5a0861894165d74704434328,2024-03-12T12:40:13.500000
|
||||||
CVE-2024-27226,0,0,09f15816885dbcfaf6362ca8e72640a49144f9653a0b3d4a746337108ce37a78,2024-08-27T15:35:10.130000
|
CVE-2024-27226,0,0,09f15816885dbcfaf6362ca8e72640a49144f9653a0b3d4a746337108ce37a78,2024-08-27T15:35:10.130000
|
||||||
CVE-2024-27227,0,0,07bb188ed9b66fc7fd965d8a240bed8b19d74680ddaf7fc1bf461b043fbb3889,2024-03-15T20:15:09.153000
|
CVE-2024-27227,0,0,07bb188ed9b66fc7fd965d8a240bed8b19d74680ddaf7fc1bf461b043fbb3889,2024-03-15T20:15:09.153000
|
||||||
CVE-2024-27228,0,1,5262c725eb223b05821eaec558c5d806b0071760b0a14d4556c2fbb1a42bc548,2024-08-28T19:35:11.443000
|
CVE-2024-27228,0,0,5262c725eb223b05821eaec558c5d806b0071760b0a14d4556c2fbb1a42bc548,2024-08-28T19:35:11.443000
|
||||||
CVE-2024-27229,0,0,b8b459ee0fc242831e7e68eb1fe9ed70ba0320038a180145828d0bdce79101e7,2024-03-12T12:40:13.500000
|
CVE-2024-27229,0,0,b8b459ee0fc242831e7e68eb1fe9ed70ba0320038a180145828d0bdce79101e7,2024-03-12T12:40:13.500000
|
||||||
CVE-2024-2723,0,0,a5d6e6fcb13799b6bac3165664e5b326db07e4b162d1f25e3d1dd5f10681ec04,2024-03-22T15:34:43.663000
|
CVE-2024-2723,0,0,a5d6e6fcb13799b6bac3165664e5b326db07e4b162d1f25e3d1dd5f10681ec04,2024-03-22T15:34:43.663000
|
||||||
CVE-2024-27230,0,0,9420863bbd94fd05dcdfd0ca39954afd3c251ba38b740d930d8e5974939f128d,2024-03-12T12:40:13.500000
|
CVE-2024-27230,0,0,9420863bbd94fd05dcdfd0ca39954afd3c251ba38b740d930d8e5974939f128d,2024-03-12T12:40:13.500000
|
||||||
@ -248217,7 +248217,7 @@ CVE-2024-27563,0,0,37d316ca473ce8ee235a7a00bc2f1934f40d1081b4a3297e3b4967e39c148
|
|||||||
CVE-2024-27564,0,0,4b4d4c7e144b76c27c52012d5becc86e0b5be9dc01f9b6263a0668719575530a,2024-08-06T15:35:10.030000
|
CVE-2024-27564,0,0,4b4d4c7e144b76c27c52012d5becc86e0b5be9dc01f9b6263a0668719575530a,2024-08-06T15:35:10.030000
|
||||||
CVE-2024-27565,0,0,0edf7f66daaa9b67c047bf93423dd3ee9ca4c410e75873bf1ca657086f339835,2024-03-05T18:50:18.333000
|
CVE-2024-27565,0,0,0edf7f66daaa9b67c047bf93423dd3ee9ca4c410e75873bf1ca657086f339835,2024-03-05T18:50:18.333000
|
||||||
CVE-2024-27567,0,0,ba0253b2315b31126919c66203669f237b0b455b097f59970da966ab9d67e865,2024-08-01T13:48:32.200000
|
CVE-2024-27567,0,0,ba0253b2315b31126919c66203669f237b0b455b097f59970da966ab9d67e865,2024-08-01T13:48:32.200000
|
||||||
CVE-2024-27568,0,1,5ef0355531266755ad4e5c631ffae6be8854ea4f1050fa4f02e42546b592e64c,2024-08-28T19:35:12.240000
|
CVE-2024-27568,0,0,5ef0355531266755ad4e5c631ffae6be8854ea4f1050fa4f02e42546b592e64c,2024-08-28T19:35:12.240000
|
||||||
CVE-2024-27569,0,0,5c0a695bc7a1524024f1806d6c6d1550c657ccc9dd1fad298805953a7e078574,2024-08-19T20:35:08.430000
|
CVE-2024-27569,0,0,5c0a695bc7a1524024f1806d6c6d1550c657ccc9dd1fad298805953a7e078574,2024-08-19T20:35:08.430000
|
||||||
CVE-2024-2757,0,0,4c422aba4be6a9a5da2652e2a836599ffe438bdae4eb45bb7067f46f34ffd36e,2024-07-03T01:53:32.100000
|
CVE-2024-2757,0,0,4c422aba4be6a9a5da2652e2a836599ffe438bdae4eb45bb7067f46f34ffd36e,2024-07-03T01:53:32.100000
|
||||||
CVE-2024-27570,0,0,8d5d62ec43c878f6bf09a9b5316375d908c11d0b5ec079a9674eb8a4339f1ea2,2024-03-01T15:23:36.177000
|
CVE-2024-27570,0,0,8d5d62ec43c878f6bf09a9b5316375d908c11d0b5ec079a9674eb8a4339f1ea2,2024-03-01T15:23:36.177000
|
||||||
@ -248249,7 +248249,7 @@ CVE-2024-27628,0,0,4ce05c55412fc4c447421f46fe72c28be9e75420f28dfb2af66d8c4d8126c
|
|||||||
CVE-2024-27629,0,0,ca701c59a502c4787b60da8baa107f0262ef924b3c876e947b7b71c4687e448d,2024-08-01T13:48:34.650000
|
CVE-2024-27629,0,0,ca701c59a502c4787b60da8baa107f0262ef924b3c876e947b7b71c4687e448d,2024-08-01T13:48:34.650000
|
||||||
CVE-2024-2763,0,0,fa0860401e6fc5d5f4cf46ca75d9efd537ac3aaa7b5e2d61b6a29dcaeeced91c,2024-05-17T02:38:28.787000
|
CVE-2024-2763,0,0,fa0860401e6fc5d5f4cf46ca75d9efd537ac3aaa7b5e2d61b6a29dcaeeced91c,2024-05-17T02:38:28.787000
|
||||||
CVE-2024-27630,0,0,a1ea11c1c8b1f1d78e79a31b066ec8424df55ae64238847d3d73b77f87b170a7,2024-08-16T19:35:06.250000
|
CVE-2024-27630,0,0,a1ea11c1c8b1f1d78e79a31b066ec8424df55ae64238847d3d73b77f87b170a7,2024-08-16T19:35:06.250000
|
||||||
CVE-2024-27631,0,1,823cf2520a1b79ed7d411349f6166aa032b72a764cabcf9507963ec85aab2169,2024-08-28T19:35:13.040000
|
CVE-2024-27631,0,0,823cf2520a1b79ed7d411349f6166aa032b72a764cabcf9507963ec85aab2169,2024-08-28T19:35:13.040000
|
||||||
CVE-2024-27632,0,0,0bf9f7e4e2b38f2fc36100c20b55c947c0d336f90050dc79733290c2e357ef37,2024-08-16T19:35:06.933000
|
CVE-2024-27632,0,0,0bf9f7e4e2b38f2fc36100c20b55c947c0d336f90050dc79733290c2e357ef37,2024-08-16T19:35:06.933000
|
||||||
CVE-2024-2764,0,0,31aa1e4cc55fa8edb093bc5aa135070b01e8111153eb7b17aab12d3117a8f555,2024-05-17T02:38:28.880000
|
CVE-2024-2764,0,0,31aa1e4cc55fa8edb093bc5aa135070b01e8111153eb7b17aab12d3117a8f555,2024-05-17T02:38:28.880000
|
||||||
CVE-2024-2765,0,0,fdf9b012a44b1c7f6607dd1b547bd408571aa1e43b10c68fb7aad7dc812bebe9,2024-05-02T18:00:37.360000
|
CVE-2024-2765,0,0,fdf9b012a44b1c7f6607dd1b547bd408571aa1e43b10c68fb7aad7dc812bebe9,2024-05-02T18:00:37.360000
|
||||||
@ -248278,7 +248278,7 @@ CVE-2024-27694,0,0,ae7bf3b211028d282f997fe080b53d7dbd8277270cbb44dbcd90c920ce9d7
|
|||||||
CVE-2024-27698,0,0,d2be8f7c8e71227d00832ec4e65de145e12c9d05abf2103ca0b08b325e7399ca,2024-03-09T23:15:49.403000
|
CVE-2024-27698,0,0,d2be8f7c8e71227d00832ec4e65de145e12c9d05abf2103ca0b08b325e7399ca,2024-03-09T23:15:49.403000
|
||||||
CVE-2024-2770,0,0,d26bc8bd1d4451d2ee541c7f447cc9cd2d848db62017303dfc34d573c4443d94,2024-05-17T02:38:29.393000
|
CVE-2024-2770,0,0,d26bc8bd1d4451d2ee541c7f447cc9cd2d848db62017303dfc34d573c4443d94,2024-05-17T02:38:29.393000
|
||||||
CVE-2024-27703,0,0,21fa3dc3529306a6c5b9fe280ab0c0cb14191a6db9f9334f8f905f40616d832e,2024-08-27T19:35:18.967000
|
CVE-2024-27703,0,0,21fa3dc3529306a6c5b9fe280ab0c0cb14191a6db9f9334f8f905f40616d832e,2024-08-27T19:35:18.967000
|
||||||
CVE-2024-27705,0,1,54a199ba78880b9893651da6ac13e5ae7eff87b01c1a1af6fe633bcde862516c,2024-08-28T19:35:13.840000
|
CVE-2024-27705,0,0,54a199ba78880b9893651da6ac13e5ae7eff87b01c1a1af6fe633bcde862516c,2024-08-28T19:35:13.840000
|
||||||
CVE-2024-27706,0,0,aa2f6240a68011db6b5f8dd255d0386bac6b89f2e80e3dcc46650c4b4085146f,2024-04-04T12:48:41.700000
|
CVE-2024-27706,0,0,aa2f6240a68011db6b5f8dd255d0386bac6b89f2e80e3dcc46650c4b4085146f,2024-04-04T12:48:41.700000
|
||||||
CVE-2024-27707,0,0,97a5b1e4443445bbc3851bf93c1f743838b69b97d43532ab36e84f929a1c875f,2024-08-06T14:35:07.363000
|
CVE-2024-27707,0,0,97a5b1e4443445bbc3851bf93c1f743838b69b97d43532ab36e84f929a1c875f,2024-08-06T14:35:07.363000
|
||||||
CVE-2024-27709,0,0,5ae0fb01fcc3e6a6feed263a5b82efd14a1c39afc6defb1474545136e5989939,2024-07-09T16:22:21.743000
|
CVE-2024-27709,0,0,5ae0fb01fcc3e6a6feed263a5b82efd14a1c39afc6defb1474545136e5989939,2024-07-09T16:22:21.743000
|
||||||
@ -248704,7 +248704,7 @@ CVE-2024-28211,0,0,430c54d116686ae784e7eaccdb0936e227c2ec2e15c8ea6c22903f691dfd9
|
|||||||
CVE-2024-28212,0,0,3b3d6720fb2aa8dafb59498c8538517295e37550c07951206db2faaac9a82c47,2024-08-12T20:35:02.707000
|
CVE-2024-28212,0,0,3b3d6720fb2aa8dafb59498c8538517295e37550c07951206db2faaac9a82c47,2024-08-12T20:35:02.707000
|
||||||
CVE-2024-28213,0,0,bfeb5a9850403273fba4fe10f3167a73d5223f6f7fda26be2c4ac6dd12d8be00,2024-08-22T20:35:07.957000
|
CVE-2024-28213,0,0,bfeb5a9850403273fba4fe10f3167a73d5223f6f7fda26be2c4ac6dd12d8be00,2024-08-22T20:35:07.957000
|
||||||
CVE-2024-28214,0,0,39bba1286ca0521fe316864fd954bf03f219b032070caf8de48b3a3685bfb8b5,2024-03-07T13:52:27.110000
|
CVE-2024-28214,0,0,39bba1286ca0521fe316864fd954bf03f219b032070caf8de48b3a3685bfb8b5,2024-03-07T13:52:27.110000
|
||||||
CVE-2024-28215,0,0,6b2656e187f54be3b8692756e38dcefabd67fa7060f9733da9dff9ce708bf4af,2024-03-07T13:52:27.110000
|
CVE-2024-28215,0,1,a538bdef30dbb031199c7dfaee20eca8adf76f8b58f82232828c1af7095801cd,2024-08-28T21:35:07.973000
|
||||||
CVE-2024-28216,0,0,f89fd6be85ceea4def53181b2265abb3d7c379c6ee2f0473f5a0630c050a6151,2024-08-12T20:35:02.990000
|
CVE-2024-28216,0,0,f89fd6be85ceea4def53181b2265abb3d7c379c6ee2f0473f5a0630c050a6151,2024-08-12T20:35:02.990000
|
||||||
CVE-2024-28219,0,0,565e95e78290480ce059c2c945e1cbfe2222bb0e5f4c019f24f3af4bf523bbf1,2024-08-20T20:35:22.290000
|
CVE-2024-28219,0,0,565e95e78290480ce059c2c945e1cbfe2222bb0e5f4c019f24f3af4bf523bbf1,2024-08-20T20:35:22.290000
|
||||||
CVE-2024-2822,0,0,5135e9aa23c4836200c76de0e1596e8aa68817f4e4641238aa9f03a498ac5941,2024-08-23T21:35:06.587000
|
CVE-2024-2822,0,0,5135e9aa23c4836200c76de0e1596e8aa68817f4e4641238aa9f03a498ac5941,2024-08-23T21:35:06.587000
|
||||||
@ -248775,7 +248775,7 @@ CVE-2024-28327,0,0,7ed9ed9c0231950061a20f16d0b466fa43b5d37d46730fdcd21aca4b586a2
|
|||||||
CVE-2024-28328,0,0,88f82b4f564bb2f0cfcfafe664c725ce4612a144351633fca17b714d7ef38607,2024-07-03T01:51:38.350000
|
CVE-2024-28328,0,0,88f82b4f564bb2f0cfcfafe664c725ce4612a144351633fca17b714d7ef38607,2024-07-03T01:51:38.350000
|
||||||
CVE-2024-2833,0,0,2bc6d91fce23c79b9817f7554599630a708e7859b230a9a2bced401cbd1dcd51,2024-04-18T13:04:28.900000
|
CVE-2024-2833,0,0,2bc6d91fce23c79b9817f7554599630a708e7859b230a9a2bced401cbd1dcd51,2024-04-18T13:04:28.900000
|
||||||
CVE-2024-28335,0,0,1f0f16000380dd3374bd37cd33265b4629fe1de221282bb913749763f1030c56,2024-08-06T15:35:11.200000
|
CVE-2024-28335,0,0,1f0f16000380dd3374bd37cd33265b4629fe1de221282bb913749763f1030c56,2024-08-06T15:35:11.200000
|
||||||
CVE-2024-28338,0,1,fa368ff4231d46bff92ce959939349d4377377b2a7cc5fa138cc06ab225389c8,2024-08-28T19:35:14.627000
|
CVE-2024-28338,0,0,fa368ff4231d46bff92ce959939349d4377377b2a7cc5fa138cc06ab225389c8,2024-08-28T19:35:14.627000
|
||||||
CVE-2024-28339,0,0,1c5cb4ff3f5e62c64fce21c9b445d5a13cbabae48573837fd8e9a43861da7ac6,2024-08-28T14:35:08.337000
|
CVE-2024-28339,0,0,1c5cb4ff3f5e62c64fce21c9b445d5a13cbabae48573837fd8e9a43861da7ac6,2024-08-28T14:35:08.337000
|
||||||
CVE-2024-2834,0,0,b28e87c6f045d84badec2f950b6e65f36270629b305c79d294240554601bad8c,2024-04-08T18:48:40.217000
|
CVE-2024-2834,0,0,b28e87c6f045d84badec2f950b6e65f36270629b305c79d294240554601bad8c,2024-04-08T18:48:40.217000
|
||||||
CVE-2024-28340,0,0,df1f6b0e64753fa9fcb1e44290eba32c1363678518f4321559c5625366bd5374,2024-08-21T16:35:05.830000
|
CVE-2024-28340,0,0,df1f6b0e64753fa9fcb1e44290eba32c1363678518f4321559c5625366bd5374,2024-08-21T16:35:05.830000
|
||||||
@ -248799,7 +248799,7 @@ CVE-2024-28392,0,0,06cb10a631fd05972f01d306a65738665b321fedeaef5f914b0141bbfeeda
|
|||||||
CVE-2024-28393,0,0,98451f8d9822a6b89492c2246ee689f6a0cd0063a443e3e1e266aaee6d314fd8,2024-08-27T20:35:26.183000
|
CVE-2024-28393,0,0,98451f8d9822a6b89492c2246ee689f6a0cd0063a443e3e1e266aaee6d314fd8,2024-08-27T20:35:26.183000
|
||||||
CVE-2024-28394,0,0,deda5a51a503650846c49022c68c524e604146c1517d74b07ab34d848f21e6e1,2024-08-05T17:35:09.203000
|
CVE-2024-28394,0,0,deda5a51a503650846c49022c68c524e604146c1517d74b07ab34d848f21e6e1,2024-08-05T17:35:09.203000
|
||||||
CVE-2024-28395,0,0,75690be4a0e06f64f466f922ea142c5dcb8737bca683828d65c2ab40844c2948,2024-08-01T13:49:05.027000
|
CVE-2024-28395,0,0,75690be4a0e06f64f466f922ea142c5dcb8737bca683828d65c2ab40844c2948,2024-08-01T13:49:05.027000
|
||||||
CVE-2024-28396,0,0,e2e5ec394ca570d1a0e7ca873049e09f9ea87c9a858dde784a7ae9cd510f7e8a,2024-03-20T17:18:26.603000
|
CVE-2024-28396,0,1,8cb5fabb0fee24ec43485928975014b880ae447df888f2a2c1c1b2d99d360299,2024-08-28T21:35:08.140000
|
||||||
CVE-2024-28397,0,0,8753dce28e32cd8db0feb9191cd053a133c82c9d87d7dd695b0e0743ff864c05,2024-07-03T01:51:40.043000
|
CVE-2024-28397,0,0,8753dce28e32cd8db0feb9191cd053a133c82c9d87d7dd695b0e0743ff864c05,2024-07-03T01:51:40.043000
|
||||||
CVE-2024-2840,0,0,d22529ec081718c114a32dcf5767c6cdef3a269eb91ab5eeb1189d10f2a33e86,2024-05-02T18:00:37.360000
|
CVE-2024-2840,0,0,d22529ec081718c114a32dcf5767c6cdef3a269eb91ab5eeb1189d10f2a33e86,2024-05-02T18:00:37.360000
|
||||||
CVE-2024-28401,0,0,f4b5194cb0dd8b5d39958cccf56c345aac334d6aa2a694b4c9032746830c6bf8,2024-03-17T22:38:29.433000
|
CVE-2024-28401,0,0,f4b5194cb0dd8b5d39958cccf56c345aac334d6aa2a694b4c9032746830c6bf8,2024-03-17T22:38:29.433000
|
||||||
@ -248820,7 +248820,7 @@ CVE-2024-2843,0,0,ec6fc6f68f72e3acc7e3cf9a461f6426012340a0a7859f669b2fed1af3faf2
|
|||||||
CVE-2024-28430,0,0,1f48afa9bf4d947c1ce61d4a7a4ead3c4544a34c0818c90617ece3e71ea09b44,2024-08-02T19:35:26.997000
|
CVE-2024-28430,0,0,1f48afa9bf4d947c1ce61d4a7a4ead3c4544a34c0818c90617ece3e71ea09b44,2024-08-02T19:35:26.997000
|
||||||
CVE-2024-28431,0,0,187dbaabbf0136fed911938811416ce05a422db491326bbc9a1774dcc2dbc8d0,2024-08-06T16:35:09.430000
|
CVE-2024-28431,0,0,187dbaabbf0136fed911938811416ce05a422db491326bbc9a1774dcc2dbc8d0,2024-08-06T16:35:09.430000
|
||||||
CVE-2024-28432,0,0,fcdf955800ccb293dde53594dd09dc78313f9ac8f6f86ebf0d39d32c444079dc,2024-08-05T18:35:14.987000
|
CVE-2024-28432,0,0,fcdf955800ccb293dde53594dd09dc78313f9ac8f6f86ebf0d39d32c444079dc,2024-08-05T18:35:14.987000
|
||||||
CVE-2024-28434,0,0,ec4590de9963214229aa112f1c2ad2fa85380f4041b7dae287eb880ebccdce0a,2024-03-25T16:43:06.137000
|
CVE-2024-28434,0,1,222cca26fc6bcca325de7c3fc66f0ca84ff351a367d8e3c5edb1f1654c6b9247,2024-08-28T21:35:08.910000
|
||||||
CVE-2024-28435,0,0,56edd25b761c3ffb8a735b3d38a367cd1e0143a3f57c9ae6abc90ef28134618d,2024-08-26T16:35:07.230000
|
CVE-2024-28435,0,0,56edd25b761c3ffb8a735b3d38a367cd1e0143a3f57c9ae6abc90ef28134618d,2024-08-26T16:35:07.230000
|
||||||
CVE-2024-28436,0,0,f0499ab721c50eb1235cd653eb0433c4817c1b654cfff253ce1e58bd858ba26c,2024-04-22T19:24:06.727000
|
CVE-2024-28436,0,0,f0499ab721c50eb1235cd653eb0433c4817c1b654cfff253ce1e58bd858ba26c,2024-04-22T19:24:06.727000
|
||||||
CVE-2024-2844,0,0,894b7bd298d78fe3d2c3a3679ae19f19f64e2dda7f94e19d66505e36627d9d53,2024-03-29T12:45:02.937000
|
CVE-2024-2844,0,0,894b7bd298d78fe3d2c3a3679ae19f19f64e2dda7f94e19d66505e36627d9d53,2024-03-29T12:45:02.937000
|
||||||
@ -248851,7 +248851,7 @@ CVE-2024-28547,0,0,6c303f8f5613978f1a0a818439df37889df3d74dbcbb9a87f20cfa2eecd13
|
|||||||
CVE-2024-2855,0,0,bf67a061be15a32c70da5cfde311a22d39981d3eb08b5dfae3a254bfe3ca6e82,2024-05-17T02:38:34.570000
|
CVE-2024-2855,0,0,bf67a061be15a32c70da5cfde311a22d39981d3eb08b5dfae3a254bfe3ca6e82,2024-05-17T02:38:34.570000
|
||||||
CVE-2024-28550,0,0,e57300171200da6138bca7c12faed1257d5a1ced8bcd637b3699d9ed4209df2a,2024-08-02T17:35:34.613000
|
CVE-2024-28550,0,0,e57300171200da6138bca7c12faed1257d5a1ced8bcd637b3699d9ed4209df2a,2024-08-02T17:35:34.613000
|
||||||
CVE-2024-28551,0,0,c28fe5afcd679c3aa0a3784905b4c05c433762c4432fa1ed2b44c099adba75a4,2024-08-05T20:35:07.203000
|
CVE-2024-28551,0,0,c28fe5afcd679c3aa0a3784905b4c05c433762c4432fa1ed2b44c099adba75a4,2024-08-05T20:35:07.203000
|
||||||
CVE-2024-28553,0,1,d2d49d3b32b4ad4e5ed1fb793d3a4f18745439a22613343ef69fff92328aa945,2024-08-28T18:35:12.120000
|
CVE-2024-28553,0,0,d2d49d3b32b4ad4e5ed1fb793d3a4f18745439a22613343ef69fff92328aa945,2024-08-28T18:35:12.120000
|
||||||
CVE-2024-28556,0,0,c7a9f11c6c2b705f23220da2e3877bcb36402bff752864a8069f34266c46e417,2024-07-03T01:51:41.963000
|
CVE-2024-28556,0,0,c7a9f11c6c2b705f23220da2e3877bcb36402bff752864a8069f34266c46e417,2024-07-03T01:51:41.963000
|
||||||
CVE-2024-28557,0,0,77a8a38b1b31bd457d2e1155d30ba64028e47880496797c0f23104b8d60d248a,2024-08-21T15:35:04.820000
|
CVE-2024-28557,0,0,77a8a38b1b31bd457d2e1155d30ba64028e47880496797c0f23104b8d60d248a,2024-08-21T15:35:04.820000
|
||||||
CVE-2024-28558,0,0,7b30a622f0a0af74fb84bf56f284f0001ad46af28ee0c7db870ba46879fc3d39,2024-08-01T13:49:08.363000
|
CVE-2024-28558,0,0,7b30a622f0a0af74fb84bf56f284f0001ad46af28ee0c7db870ba46879fc3d39,2024-08-01T13:49:08.363000
|
||||||
@ -248913,12 +248913,12 @@ CVE-2024-28672,0,0,538db36b26db573d0bb55cb40ad522fa7947acf5e2956b1e113432093746b
|
|||||||
CVE-2024-28673,0,0,bd6746b41a01ccf049d37eb60c73f070158ae6b16895b623dddfc8455f2801ff,2024-08-02T21:35:24.280000
|
CVE-2024-28673,0,0,bd6746b41a01ccf049d37eb60c73f070158ae6b16895b623dddfc8455f2801ff,2024-08-02T21:35:24.280000
|
||||||
CVE-2024-28675,0,0,80c451d1a35a0ff52d3fba9d95128727c58bec6c40fc50594a98fbdeafd67949,2024-08-06T16:35:10.273000
|
CVE-2024-28675,0,0,80c451d1a35a0ff52d3fba9d95128727c58bec6c40fc50594a98fbdeafd67949,2024-08-06T16:35:10.273000
|
||||||
CVE-2024-28676,0,0,63c5e4a02262e2b79dceab3a95058f444bf46b54f5978008708a63245a5f9f99,2024-08-01T13:49:11.717000
|
CVE-2024-28676,0,0,63c5e4a02262e2b79dceab3a95058f444bf46b54f5978008708a63245a5f9f99,2024-08-01T13:49:11.717000
|
||||||
CVE-2024-28677,0,1,0f69f140894f68c5b932d6edf8946595fb50d2c8b4a12358d0887d19b71fe56c,2024-08-28T19:35:15.447000
|
CVE-2024-28677,0,0,0f69f140894f68c5b932d6edf8946595fb50d2c8b4a12358d0887d19b71fe56c,2024-08-28T19:35:15.447000
|
||||||
CVE-2024-28678,0,0,b5c73aa5d385f8f65998ff1de30b4021247079d7e1aba9c219ff89ef49624a6a,2024-08-26T17:35:03.903000
|
CVE-2024-28678,0,0,b5c73aa5d385f8f65998ff1de30b4021247079d7e1aba9c219ff89ef49624a6a,2024-08-26T17:35:03.903000
|
||||||
CVE-2024-28679,0,0,105ed47445b8d9fc8d56f311cb3b3bd3771e3a0f797a39fdf0ae6eee229ff71d,2024-03-13T18:15:58.530000
|
CVE-2024-28679,0,0,105ed47445b8d9fc8d56f311cb3b3bd3771e3a0f797a39fdf0ae6eee229ff71d,2024-03-13T18:15:58.530000
|
||||||
CVE-2024-2868,0,0,0d0f218c7c83d10c9f9d6ae0e3c918a300514bd5c38acefa57e4da2fb68b6b16,2024-04-04T12:48:41.700000
|
CVE-2024-2868,0,0,0d0f218c7c83d10c9f9d6ae0e3c918a300514bd5c38acefa57e4da2fb68b6b16,2024-04-04T12:48:41.700000
|
||||||
CVE-2024-28680,0,0,2c015a2a3060000c7ef4f8456bbc810496f8be9f148fccbda02f285f4310a0c8,2024-08-15T20:35:07.960000
|
CVE-2024-28680,0,0,2c015a2a3060000c7ef4f8456bbc810496f8be9f148fccbda02f285f4310a0c8,2024-08-15T20:35:07.960000
|
||||||
CVE-2024-28681,0,1,8a70f4514954d5b714df36fb204c3727ca85171b03b512322548d2cf00cd1bfc,2024-08-28T19:35:16.270000
|
CVE-2024-28681,0,0,8a70f4514954d5b714df36fb204c3727ca85171b03b512322548d2cf00cd1bfc,2024-08-28T19:35:16.270000
|
||||||
CVE-2024-28682,0,0,4f5f2d89be528d37359d245e4477bd20041973e3a5c07eac11756c948035a466,2024-08-28T14:35:09.923000
|
CVE-2024-28682,0,0,4f5f2d89be528d37359d245e4477bd20041973e3a5c07eac11756c948035a466,2024-08-28T14:35:09.923000
|
||||||
CVE-2024-28683,0,0,a84750ef7113628223a83f3f1bafccf8cc7ce4d93141f0176c20c984e9a69c9f,2024-08-15T20:35:08.767000
|
CVE-2024-28683,0,0,a84750ef7113628223a83f3f1bafccf8cc7ce4d93141f0176c20c984e9a69c9f,2024-08-15T20:35:08.767000
|
||||||
CVE-2024-28684,0,0,ad6bf053cac6fb6852a9113f5958a7b88b0baa069360a39369fc3cdf983cbd42,2024-08-05T18:35:16.690000
|
CVE-2024-28684,0,0,ad6bf053cac6fb6852a9113f5958a7b88b0baa069360a39369fc3cdf983cbd42,2024-08-05T18:35:16.690000
|
||||||
@ -249417,7 +249417,7 @@ CVE-2024-29387,0,0,a7de4d7b83fd64ee90e8a52b42eaf0b9beccc3b6bea7a05d204d65990fc8f
|
|||||||
CVE-2024-2939,0,0,2535289099c8d33fbb19094f7fbda628b2a57cb3f5893b4424d20e832d7b98bf,2024-05-17T02:38:38.230000
|
CVE-2024-2939,0,0,2535289099c8d33fbb19094f7fbda628b2a57cb3f5893b4424d20e832d7b98bf,2024-05-17T02:38:38.230000
|
||||||
CVE-2024-29390,0,0,814ac687e5b2e01cf32c7127e50bbccad0da0364edfe1ee5a384153ed32a0446,2024-07-03T01:52:25.827000
|
CVE-2024-29390,0,0,814ac687e5b2e01cf32c7127e50bbccad0da0364edfe1ee5a384153ed32a0446,2024-07-03T01:52:25.827000
|
||||||
CVE-2024-29392,0,0,5e4ea30f516a843bdc62850b43582fcaf1c5126262e50fed5352ce6a7a6be694,2024-05-22T18:59:20.240000
|
CVE-2024-29392,0,0,5e4ea30f516a843bdc62850b43582fcaf1c5126262e50fed5352ce6a7a6be694,2024-05-22T18:59:20.240000
|
||||||
CVE-2024-29399,0,1,697a66baad6ee4bae50c3e5a1e61a40d3516a4fa5056cb7fa4cab7012d6514f5,2024-08-28T18:35:13.337000
|
CVE-2024-29399,0,0,697a66baad6ee4bae50c3e5a1e61a40d3516a4fa5056cb7fa4cab7012d6514f5,2024-08-28T18:35:13.337000
|
||||||
CVE-2024-2940,0,0,ff445ca7ce0af843f5f704c8c90659aeb6511c9f210bd6d3afa6e1f01b0df39a,2024-06-05T20:15:13.267000
|
CVE-2024-2940,0,0,ff445ca7ce0af843f5f704c8c90659aeb6511c9f210bd6d3afa6e1f01b0df39a,2024-06-05T20:15:13.267000
|
||||||
CVE-2024-29400,0,0,8f34751d18d63c75601eb947e8c0e3714d1d567d723f8c0dc5c4c493f22e06b6,2024-07-03T01:52:26.027000
|
CVE-2024-29400,0,0,8f34751d18d63c75601eb947e8c0e3714d1d567d723f8c0dc5c4c493f22e06b6,2024-07-03T01:52:26.027000
|
||||||
CVE-2024-29401,0,0,14e4834e03b78a3df05cd8e04bcdf90a5bfad72c514740bf2fbb87c81dad0d19,2024-08-05T19:35:11.287000
|
CVE-2024-29401,0,0,14e4834e03b78a3df05cd8e04bcdf90a5bfad72c514740bf2fbb87c81dad0d19,2024-08-05T19:35:11.287000
|
||||||
@ -249433,7 +249433,7 @@ CVE-2024-2943,0,0,f4b6ad287b4a622c4b41944858fa2f89e0fbf42a503dbbb6e34a72b168b98f
|
|||||||
CVE-2024-29432,0,0,1f40369b53faae4e5d7b1d21dfb652ce13f2ec8046b060be84a2ef35a51b0061,2024-08-27T16:35:10.203000
|
CVE-2024-29432,0,0,1f40369b53faae4e5d7b1d21dfb652ce13f2ec8046b060be84a2ef35a51b0061,2024-08-27T16:35:10.203000
|
||||||
CVE-2024-29433,0,0,1d2b8851aa0f5fe2986e1714c213ddc2e530a38e6018ee3fbc359ceb0627168a,2024-04-02T12:50:42.233000
|
CVE-2024-29433,0,0,1d2b8851aa0f5fe2986e1714c213ddc2e530a38e6018ee3fbc359ceb0627168a,2024-04-02T12:50:42.233000
|
||||||
CVE-2024-29434,0,0,2d35bfe8233ada26f52a8aa24ec4bb94ada1e07f5e74fe641dc47a96ca48d619,2024-04-03T12:38:04.840000
|
CVE-2024-29434,0,0,2d35bfe8233ada26f52a8aa24ec4bb94ada1e07f5e74fe641dc47a96ca48d619,2024-04-03T12:38:04.840000
|
||||||
CVE-2024-29435,0,0,875cbdaf24fc385b5e7a9e6b4648f22f1ae4b6f76f07a45f82a4354af5229b55,2024-04-02T12:50:42.233000
|
CVE-2024-29435,0,1,20d58edc46c6a6b5293600c5a6b42d712862fc08450fab6e6e1fcd84ee305434,2024-08-28T20:35:10.057000
|
||||||
CVE-2024-29439,0,0,071dc3c8f449deb74ddce6b8d054e2fea88eca6c0700f7f8d6ed7663f767e1ba,2024-05-27T01:15:14.397000
|
CVE-2024-29439,0,0,071dc3c8f449deb74ddce6b8d054e2fea88eca6c0700f7f8d6ed7663f767e1ba,2024-05-27T01:15:14.397000
|
||||||
CVE-2024-2944,0,0,d1dd72df0b9b939fa739d98df646f3f94ca4f14d2968c93f0c6764852c0e47b3,2024-05-17T02:38:38.893000
|
CVE-2024-2944,0,0,d1dd72df0b9b939fa739d98df646f3f94ca4f14d2968c93f0c6764852c0e47b3,2024-05-17T02:38:38.893000
|
||||||
CVE-2024-29440,0,0,5b5e3b17b0e40e37a1bc2598ac1913c0af07a4c46f5b9983183aaa750b04d2f6,2024-05-27T01:15:14.497000
|
CVE-2024-29440,0,0,5b5e3b17b0e40e37a1bc2598ac1913c0af07a4c46f5b9983183aaa750b04d2f6,2024-05-27T01:15:14.497000
|
||||||
@ -249454,7 +249454,7 @@ CVE-2024-2946,0,0,220fbf3d281fb179dce3b92b2f13da4971e0ad50361a1c155497aeea2ac2f8
|
|||||||
CVE-2024-29460,0,0,f954a0fb0d0ecede72346246898998047378b0ff85ba4078b6d862a1eed2ae65,2024-08-01T13:49:30.940000
|
CVE-2024-29460,0,0,f954a0fb0d0ecede72346246898998047378b0ff85ba4078b6d862a1eed2ae65,2024-08-01T13:49:30.940000
|
||||||
CVE-2024-29461,0,0,7435a5125007ae496ee06dfe30d9a23e23411a0a41be62219557118da196f31f,2024-07-11T15:05:34.270000
|
CVE-2024-29461,0,0,7435a5125007ae496ee06dfe30d9a23e23411a0a41be62219557118da196f31f,2024-07-11T15:05:34.270000
|
||||||
CVE-2024-29466,0,0,4fa136a9b1a51af6517f939484fb1c8a80e3e0537d7615acddb3c99d86059b49,2024-07-03T01:52:27.797000
|
CVE-2024-29466,0,0,4fa136a9b1a51af6517f939484fb1c8a80e3e0537d7615acddb3c99d86059b49,2024-07-03T01:52:27.797000
|
||||||
CVE-2024-29469,0,0,2079505dc0da5a3cbf2c6e066fddfdad1eb85fcaa078af0bbb19417ca0e16ca0,2024-03-21T12:58:51.093000
|
CVE-2024-29469,0,1,83f06e4c8f7934a02756619832b06a82358511a99079845e0d056ac078f5e062,2024-08-28T21:35:09.653000
|
||||||
CVE-2024-2947,0,0,7fa842f2bc2c8f223df34834539dd7f7d20bc53e8c380819b606cea859d50c0a,2024-06-12T09:15:17.717000
|
CVE-2024-2947,0,0,7fa842f2bc2c8f223df34834539dd7f7d20bc53e8c380819b606cea859d50c0a,2024-06-12T09:15:17.717000
|
||||||
CVE-2024-29470,0,0,56425811d021c212dbd848b24d323bfc83ff20dfcd604f9dd34d98a1dfae7b6e,2024-03-21T12:58:51.093000
|
CVE-2024-29470,0,0,56425811d021c212dbd848b24d323bfc83ff20dfcd604f9dd34d98a1dfae7b6e,2024-03-21T12:58:51.093000
|
||||||
CVE-2024-29471,0,0,5558733fa7b1a4697bbc8cd56d5ef313ce31c2ab78e350286f8e19f0c34b081d,2024-08-15T20:35:10.563000
|
CVE-2024-29471,0,0,5558733fa7b1a4697bbc8cd56d5ef313ce31c2ab78e350286f8e19f0c34b081d,2024-08-15T20:35:10.563000
|
||||||
@ -249478,7 +249478,7 @@ CVE-2024-2951,0,0,f710e6d4245ad6c04fc32de495a410058cbe73872608e5a79d1a40f0d8a1be
|
|||||||
CVE-2024-29510,0,0,51d0625dfaf62c75da9e9bb8fd0fc5d3519f674d47bd05e2a65a6c09ad7cf0da,2024-07-08T14:18:07.743000
|
CVE-2024-29510,0,0,51d0625dfaf62c75da9e9bb8fd0fc5d3519f674d47bd05e2a65a6c09ad7cf0da,2024-07-08T14:18:07.743000
|
||||||
CVE-2024-29511,0,0,71f40c07ffc6ddcd2ad428aa635a90b1b076d74d8bc5a2a3a20f87b7f6b658a4,2024-07-08T14:18:08.567000
|
CVE-2024-29511,0,0,71f40c07ffc6ddcd2ad428aa635a90b1b076d74d8bc5a2a3a20f87b7f6b658a4,2024-07-08T14:18:08.567000
|
||||||
CVE-2024-29513,0,0,8cfcc3ee68a773ba517d1f3723d5fc41ae5eef49bbfc2250bce477983b34e599,2024-08-01T13:49:32.137000
|
CVE-2024-29513,0,0,8cfcc3ee68a773ba517d1f3723d5fc41ae5eef49bbfc2250bce477983b34e599,2024-08-01T13:49:32.137000
|
||||||
CVE-2024-29514,0,1,7caae15adf93c68426a0607e9f9430b69dadcf282c5b338343171d0469306829,2024-08-28T19:35:17.070000
|
CVE-2024-29514,0,0,7caae15adf93c68426a0607e9f9430b69dadcf282c5b338343171d0469306829,2024-08-28T19:35:17.070000
|
||||||
CVE-2024-29515,0,0,6c02acdf8486fd71d1a6a0f7b1121d658755c5e1493296a773ba3e16d5535a56,2024-08-19T20:35:11.413000
|
CVE-2024-29515,0,0,6c02acdf8486fd71d1a6a0f7b1121d658755c5e1493296a773ba3e16d5535a56,2024-08-19T20:35:11.413000
|
||||||
CVE-2024-2952,0,0,9ca75cd38bb98c444fe6c898c357072e1eb1c9edb6d026f3884b5faa65c0c5c5,2024-04-15T18:15:11.027000
|
CVE-2024-2952,0,0,9ca75cd38bb98c444fe6c898c357072e1eb1c9edb6d026f3884b5faa65c0c5c5,2024-04-15T18:15:11.027000
|
||||||
CVE-2024-2953,0,0,72a01e417ee80dcceae8cb4163f101b7f2f672f028d8c1a0f25757daf02eaeed,2024-05-22T12:46:53.887000
|
CVE-2024-2953,0,0,72a01e417ee80dcceae8cb4163f101b7f2f672f028d8c1a0f25757daf02eaeed,2024-05-22T12:46:53.887000
|
||||||
@ -249540,7 +249540,7 @@ CVE-2024-29753,0,0,2fe72d442a3bd6e3a448018f4b0c5fd08bbb9368714b97406c81c1f0d2544
|
|||||||
CVE-2024-29754,0,0,b25a573175d6d8364c520f2c021a5fa5bc0a8d78f24f393d4d4bf2a3811b35a3,2024-04-08T18:49:25.863000
|
CVE-2024-29754,0,0,b25a573175d6d8364c520f2c021a5fa5bc0a8d78f24f393d4d4bf2a3811b35a3,2024-04-08T18:49:25.863000
|
||||||
CVE-2024-29755,0,0,461a086b173843c1ce38032ceaf4026cd899fd13096838c66c3bf8c91a37dca7,2024-04-08T18:49:25.863000
|
CVE-2024-29755,0,0,461a086b173843c1ce38032ceaf4026cd899fd13096838c66c3bf8c91a37dca7,2024-04-08T18:49:25.863000
|
||||||
CVE-2024-29756,0,0,a317fd9c651464f79ee6fff622436852efb1b09b79adc8a90233c2482f2cabef,2024-08-13T20:35:08.120000
|
CVE-2024-29756,0,0,a317fd9c651464f79ee6fff622436852efb1b09b79adc8a90233c2482f2cabef,2024-08-13T20:35:08.120000
|
||||||
CVE-2024-29757,0,1,1258c85600b0e0b6c3574edf77ce10dfb1958d15da1a6a11aec242b319b28be3,2024-08-28T19:35:17.877000
|
CVE-2024-29757,0,0,1258c85600b0e0b6c3574edf77ce10dfb1958d15da1a6a11aec242b319b28be3,2024-08-28T19:35:17.877000
|
||||||
CVE-2024-29758,0,0,e99e03c9577f34d61d791ec358a8107af85a294778a310a65b4722e9f6af13d4,2024-03-27T15:49:41.437000
|
CVE-2024-29758,0,0,e99e03c9577f34d61d791ec358a8107af85a294778a310a65b4722e9f6af13d4,2024-03-27T15:49:41.437000
|
||||||
CVE-2024-29759,0,0,f4cc1ab31785f6c5323fd4d9a7da94ce475eca6cb36b30795902b25143b7dbeb,2024-03-27T15:49:41.437000
|
CVE-2024-29759,0,0,f4cc1ab31785f6c5323fd4d9a7da94ce475eca6cb36b30795902b25143b7dbeb,2024-03-27T15:49:41.437000
|
||||||
CVE-2024-2976,0,0,31ce9b59b83e33d10ee556791a66c7b468926a678a71bf4f87b9bde3e94a00ea,2024-05-17T02:38:39.800000
|
CVE-2024-2976,0,0,31ce9b59b83e33d10ee556791a66c7b468926a678a71bf4f87b9bde3e94a00ea,2024-05-17T02:38:39.800000
|
||||||
@ -250321,7 +250321,7 @@ CVE-2024-3056,0,0,c33c3028618acd56970d704007cc8cb0c1300b261807cf531015dd6f1b2728
|
|||||||
CVE-2024-30560,0,0,29358f4cfba46b880efc18b382f49655b8da1f57de09ea2f3b221ee017e11a93,2024-05-14T15:23:17.730000
|
CVE-2024-30560,0,0,29358f4cfba46b880efc18b382f49655b8da1f57de09ea2f3b221ee017e11a93,2024-05-14T15:23:17.730000
|
||||||
CVE-2024-30561,0,0,317571b22962e8d6e5d0cb62ac3952d7d76cb14c6191157ad5ef89ba7149e860,2024-04-01T01:12:59.077000
|
CVE-2024-30561,0,0,317571b22962e8d6e5d0cb62ac3952d7d76cb14c6191157ad5ef89ba7149e860,2024-04-01T01:12:59.077000
|
||||||
CVE-2024-30564,0,0,5b72a00e1c04b6fa93ffaa761b95fbd264190bcd29898850fc62b4910b45e5e3,2024-08-22T16:35:01.923000
|
CVE-2024-30564,0,0,5b72a00e1c04b6fa93ffaa761b95fbd264190bcd29898850fc62b4910b45e5e3,2024-08-22T16:35:01.923000
|
||||||
CVE-2024-30565,0,1,339f35b13bfd7475887e9d4aa2098d8942efc5c8efceb8855a2ae15b1ed6d216,2024-08-28T19:35:18.093000
|
CVE-2024-30565,0,0,339f35b13bfd7475887e9d4aa2098d8942efc5c8efceb8855a2ae15b1ed6d216,2024-08-28T19:35:18.093000
|
||||||
CVE-2024-30567,0,0,f2a4d1211b738fa363bb6c48ea72578b3372d81c87f66a2aa1c7f2df3ee8bec0,2024-08-01T13:50:09.870000
|
CVE-2024-30567,0,0,f2a4d1211b738fa363bb6c48ea72578b3372d81c87f66a2aa1c7f2df3ee8bec0,2024-08-01T13:50:09.870000
|
||||||
CVE-2024-30568,0,0,44c25f2577fa5438de7f51a90d4ade231e906e1e0fac9c82f2eeb8db8041cb68,2024-08-21T15:35:06.717000
|
CVE-2024-30568,0,0,44c25f2577fa5438de7f51a90d4ade231e906e1e0fac9c82f2eeb8db8041cb68,2024-08-21T15:35:06.717000
|
||||||
CVE-2024-30569,0,0,d1232d2fff132152976a2834ea98d5f033f65e7554f5a22412d98913c4904d30,2024-08-27T15:35:14.373000
|
CVE-2024-30569,0,0,d1232d2fff132152976a2834ea98d5f033f65e7554f5a22412d98913c4904d30,2024-08-27T15:35:14.373000
|
||||||
@ -250338,14 +250338,14 @@ CVE-2024-30588,0,0,08e16a935f9fee8841f929d18032525bac7add60ccde5932cbd5663b4480d
|
|||||||
CVE-2024-30589,0,0,c6b1c9cba15556f8da9ae1af68138bacf841ae1da95dafd281283439cde5b9ae,2024-08-13T16:35:00.980000
|
CVE-2024-30589,0,0,c6b1c9cba15556f8da9ae1af68138bacf841ae1da95dafd281283439cde5b9ae,2024-08-13T16:35:00.980000
|
||||||
CVE-2024-3059,0,0,efb84c5280bb6d93917140ecb34e4d9d916e8aaa9c3b2370c96c352f4a530300,2024-07-03T02:05:57.660000
|
CVE-2024-3059,0,0,efb84c5280bb6d93917140ecb34e4d9d916e8aaa9c3b2370c96c352f4a530300,2024-07-03T02:05:57.660000
|
||||||
CVE-2024-30590,0,0,74e13fafb4ea3fa2c3367d4c745d913b8700a9f648c307a3b7eeb10d783ad4d0,2024-08-01T13:50:13.810000
|
CVE-2024-30590,0,0,74e13fafb4ea3fa2c3367d4c745d913b8700a9f648c307a3b7eeb10d783ad4d0,2024-08-01T13:50:13.810000
|
||||||
CVE-2024-30591,0,1,e902c9af734db5833927060c0bddd3a7ba217bf46fdf47a12b5c187281d25d93,2024-08-28T18:35:14.280000
|
CVE-2024-30591,0,0,e902c9af734db5833927060c0bddd3a7ba217bf46fdf47a12b5c187281d25d93,2024-08-28T18:35:14.280000
|
||||||
CVE-2024-30592,0,0,507c49506de5111d6c96010bf6286cc127ab92c8bc8bbb896558bfe34d4346f9,2024-08-01T13:50:14.590000
|
CVE-2024-30592,0,0,507c49506de5111d6c96010bf6286cc127ab92c8bc8bbb896558bfe34d4346f9,2024-08-01T13:50:14.590000
|
||||||
CVE-2024-30593,0,0,408d3bb4f55aa72702260e4a6dec5da795a667370808b6fd57e94ac266b7ab6e,2024-08-01T13:50:15.377000
|
CVE-2024-30593,0,0,408d3bb4f55aa72702260e4a6dec5da795a667370808b6fd57e94ac266b7ab6e,2024-08-01T13:50:15.377000
|
||||||
CVE-2024-30594,0,0,031ab14998cc22e319a2672b5d267e5c02bd96f6f8b3034c7bd0cc097da3d0fc,2024-08-16T19:35:08.517000
|
CVE-2024-30594,0,0,031ab14998cc22e319a2672b5d267e5c02bd96f6f8b3034c7bd0cc097da3d0fc,2024-08-16T19:35:08.517000
|
||||||
CVE-2024-30595,0,0,4cbe3a1903ff2e8fa29d74cbfe2f90b968c54e4378a49a8e7a552056ca416818,2024-07-08T14:18:21.630000
|
CVE-2024-30595,0,0,4cbe3a1903ff2e8fa29d74cbfe2f90b968c54e4378a49a8e7a552056ca416818,2024-07-08T14:18:21.630000
|
||||||
CVE-2024-30596,0,0,3e2307388e29cecf1eee26f29964858677d06f5c8613113eca2047417d85c54f,2024-08-27T21:35:21.827000
|
CVE-2024-30596,0,0,3e2307388e29cecf1eee26f29964858677d06f5c8613113eca2047417d85c54f,2024-08-27T21:35:21.827000
|
||||||
CVE-2024-30597,0,0,850e4910803a98578d5f042e07a5f96647f12b4e67d43adaef74644382ed2f1a,2024-08-01T13:50:16.157000
|
CVE-2024-30597,0,0,850e4910803a98578d5f042e07a5f96647f12b4e67d43adaef74644382ed2f1a,2024-08-01T13:50:16.157000
|
||||||
CVE-2024-30598,0,1,6ed6779adc284652fa82476796af034f1e40ee104aa46937c35f6a5778b7c19a,2024-08-28T18:35:15.197000
|
CVE-2024-30598,0,0,6ed6779adc284652fa82476796af034f1e40ee104aa46937c35f6a5778b7c19a,2024-08-28T18:35:15.197000
|
||||||
CVE-2024-30599,0,0,a2de538454d934b66527a50625bb2ef5a8d7c80970adc9056aac0bf14f9e96b4,2024-08-01T13:50:16.990000
|
CVE-2024-30599,0,0,a2de538454d934b66527a50625bb2ef5a8d7c80970adc9056aac0bf14f9e96b4,2024-08-01T13:50:16.990000
|
||||||
CVE-2024-3060,0,0,1a2ca1531bb6941b20d9224cca8c4925ba7109cf026646e1258f2bbe2b20e308,2024-07-03T02:05:57.883000
|
CVE-2024-3060,0,0,1a2ca1531bb6941b20d9224cca8c4925ba7109cf026646e1258f2bbe2b20e308,2024-07-03T02:05:57.883000
|
||||||
CVE-2024-30600,0,0,afb4ecd397678c812aa9252d63371e78d9b731787a22ea38c05d01f1336b7300,2024-08-27T19:35:20.830000
|
CVE-2024-30600,0,0,afb4ecd397678c812aa9252d63371e78d9b731787a22ea38c05d01f1336b7300,2024-08-27T19:35:20.830000
|
||||||
@ -250363,7 +250363,7 @@ CVE-2024-30620,0,0,cb2dae6c6270bb539b2166cb7fc038684b4c961f4662350232b399db4e69a
|
|||||||
CVE-2024-30621,0,0,c30c1529b2190a6ab334a4d43b23be8a438f3a9728c71ea136b98a3e95653561,2024-08-19T20:35:13.943000
|
CVE-2024-30621,0,0,c30c1529b2190a6ab334a4d43b23be8a438f3a9728c71ea136b98a3e95653561,2024-08-19T20:35:13.943000
|
||||||
CVE-2024-30622,0,0,9349da08418f3c5641f38670dab1e797cf4839fe3c9959b5e399bf11323db712,2024-08-13T15:35:09.960000
|
CVE-2024-30622,0,0,9349da08418f3c5641f38670dab1e797cf4839fe3c9959b5e399bf11323db712,2024-08-13T15:35:09.960000
|
||||||
CVE-2024-30623,0,0,068ad85c64fcd7c5771be6968a3fe4899f42b182e4626cc9e0835726390d147d,2024-07-03T01:54:12.180000
|
CVE-2024-30623,0,0,068ad85c64fcd7c5771be6968a3fe4899f42b182e4626cc9e0835726390d147d,2024-07-03T01:54:12.180000
|
||||||
CVE-2024-30624,0,1,ff6bf3285a4a0405e10b51a01d4154fed0ab5f5e8637b8cc2e4a3a03c98f121e,2024-08-28T18:35:15.953000
|
CVE-2024-30624,0,0,ff6bf3285a4a0405e10b51a01d4154fed0ab5f5e8637b8cc2e4a3a03c98f121e,2024-08-28T18:35:15.953000
|
||||||
CVE-2024-30625,0,0,c1d8544845866766a9c20cd1dd31dab57f6c7377e49b11e4618d24aa420ac546,2024-08-01T13:50:20.930000
|
CVE-2024-30625,0,0,c1d8544845866766a9c20cd1dd31dab57f6c7377e49b11e4618d24aa420ac546,2024-08-01T13:50:20.930000
|
||||||
CVE-2024-30626,0,0,1aa9c6016c2b1f3328d360421842f1f87c091d5d7ea99ae5c5df6807c10e0be3,2024-08-27T19:35:24.760000
|
CVE-2024-30626,0,0,1aa9c6016c2b1f3328d360421842f1f87c091d5d7ea99ae5c5df6807c10e0be3,2024-08-27T19:35:24.760000
|
||||||
CVE-2024-30627,0,0,b1dca4695abc9495ba7ec29f0112baaeb190e4bfd416384d570f2292f523f60d,2024-08-01T13:50:21.693000
|
CVE-2024-30627,0,0,b1dca4695abc9495ba7ec29f0112baaeb190e4bfd416384d570f2292f523f60d,2024-08-01T13:50:21.693000
|
||||||
@ -251081,7 +251081,7 @@ CVE-2024-31815,0,0,3a4fb879bd99cdccbff5aa7dddf7124d852246045820d3d5445bebcfb10f3
|
|||||||
CVE-2024-31816,0,0,b044f3a9b0aa1619e0c2fca0cc8f8b5745d80dbd48fcbf7e00f1caed5cc7299b,2024-08-14T14:35:18.370000
|
CVE-2024-31816,0,0,b044f3a9b0aa1619e0c2fca0cc8f8b5745d80dbd48fcbf7e00f1caed5cc7299b,2024-08-14T14:35:18.370000
|
||||||
CVE-2024-31817,0,0,24b4e557f7af935e7754f7b85cb41f724f58a7b4e914343cc50d4eac0b54d001,2024-08-01T13:51:12.960000
|
CVE-2024-31817,0,0,24b4e557f7af935e7754f7b85cb41f724f58a7b4e914343cc50d4eac0b54d001,2024-08-01T13:51:12.960000
|
||||||
CVE-2024-31818,0,0,eee16737d75f73f8b945462c1dcd4c5cb19514639603d213fd1ee2d8a446805c,2024-07-03T01:55:23.933000
|
CVE-2024-31818,0,0,eee16737d75f73f8b945462c1dcd4c5cb19514639603d213fd1ee2d8a446805c,2024-07-03T01:55:23.933000
|
||||||
CVE-2024-31819,0,1,bfd6addbaf0640b479e38e78486acd7f48f4365622b9d1c32199ef52964cc949,2024-08-28T19:35:18.897000
|
CVE-2024-31819,0,0,bfd6addbaf0640b479e38e78486acd7f48f4365622b9d1c32199ef52964cc949,2024-08-28T19:35:18.897000
|
||||||
CVE-2024-3182,0,0,5b91472f2c23656576ba0485d37ef11d644641d0d37c54a71b00010283df192c,2024-08-01T16:35:10.453000
|
CVE-2024-3182,0,0,5b91472f2c23656576ba0485d37ef11d644641d0d37c54a71b00010283df192c,2024-08-01T16:35:10.453000
|
||||||
CVE-2024-31820,0,0,c45ae4d9cf96e998a8e3836a25349d6dbd49df94bb64d18020aab9488babbb10,2024-08-01T13:51:13.733000
|
CVE-2024-31820,0,0,c45ae4d9cf96e998a8e3836a25349d6dbd49df94bb64d18020aab9488babbb10,2024-08-01T13:51:13.733000
|
||||||
CVE-2024-31821,0,0,7ffbf5610a7d2af61b143191111032e3581481a662d8ad2f16b1a632dc4600a8,2024-07-03T01:55:24.693000
|
CVE-2024-31821,0,0,7ffbf5610a7d2af61b143191111032e3581481a662d8ad2f16b1a632dc4600a8,2024-07-03T01:55:24.693000
|
||||||
@ -252745,6 +252745,7 @@ CVE-2024-3418,0,0,502fc54d23469afbe964523306f6a78a43aa4bbda684d42d8a15714665a919
|
|||||||
CVE-2024-3419,0,0,55e9e939cce7031c82bff2b248ad3247eb5f6b71fadfe890fcd9e67ed87233e2,2024-05-17T02:39:54.607000
|
CVE-2024-3419,0,0,55e9e939cce7031c82bff2b248ad3247eb5f6b71fadfe890fcd9e67ed87233e2,2024-05-17T02:39:54.607000
|
||||||
CVE-2024-34191,0,0,dbd580573375fd2d1820adc0049af00ef94f1f54fcce834415d344bda1271c56,2024-05-14T19:17:55.627000
|
CVE-2024-34191,0,0,dbd580573375fd2d1820adc0049af00ef94f1f54fcce834415d344bda1271c56,2024-05-14T19:17:55.627000
|
||||||
CVE-2024-34193,0,0,e28053bd0a22d022848badc9c3f75e2fb164790fa29e948e479e4871e120d21a,2024-08-20T15:35:11.077000
|
CVE-2024-34193,0,0,e28053bd0a22d022848badc9c3f75e2fb164790fa29e948e479e4871e120d21a,2024-08-20T15:35:11.077000
|
||||||
|
CVE-2024-34195,1,1,85b392229a6201caf031923e85b74fa52c56af0784be74d04a74145fdcf21d9f,2024-08-28T20:35:10.893000
|
||||||
CVE-2024-34196,0,0,fa10f060dde56de72ad527f194a43f50d5d3befcfd4eea3294712a1774de38b0,2024-08-01T13:52:15.947000
|
CVE-2024-34196,0,0,fa10f060dde56de72ad527f194a43f50d5d3befcfd4eea3294712a1774de38b0,2024-08-01T13:52:15.947000
|
||||||
CVE-2024-34198,0,0,ba93ef8fc5dbbb63bf24a83115f601ac65bb25dbfcfc498c53d09eed142379f4,2024-08-28T15:46:39.613000
|
CVE-2024-34198,0,0,ba93ef8fc5dbbb63bf24a83115f601ac65bb25dbfcfc498c53d09eed142379f4,2024-08-28T15:46:39.613000
|
||||||
CVE-2024-34199,0,0,27f51e6e9a085d1edb0a1380e0bfff4433e52f8f9e25d5bec96a743b9a9ffd85,2024-07-03T01:59:29.647000
|
CVE-2024-34199,0,0,27f51e6e9a085d1edb0a1380e0bfff4433e52f8f9e25d5bec96a743b9a9ffd85,2024-07-03T01:59:29.647000
|
||||||
@ -253229,7 +253230,7 @@ CVE-2024-3489,0,0,ea9bd95a767998b3f2d98747bee17b3d4435734727140c279148a23c982681
|
|||||||
CVE-2024-34899,0,0,8587795bcb80eaac03ccdd83ddcd275c805b44aa37227142776a20079d894d2e,2024-05-14T16:12:23.490000
|
CVE-2024-34899,0,0,8587795bcb80eaac03ccdd83ddcd275c805b44aa37227142776a20079d894d2e,2024-05-14T16:12:23.490000
|
||||||
CVE-2024-3490,0,0,fde4feb36b1284855cd6b30fa66a3af34b0e61e505831180625a8b1a9752ddb6,2024-05-02T13:27:25.103000
|
CVE-2024-3490,0,0,fde4feb36b1284855cd6b30fa66a3af34b0e61e505831180625a8b1a9752ddb6,2024-05-02T13:27:25.103000
|
||||||
CVE-2024-34905,0,0,f78ccd452da80c6b8b88b8df2150e212f5062dc9ace03288d809e1d46c16b911,2024-08-19T18:35:11.410000
|
CVE-2024-34905,0,0,f78ccd452da80c6b8b88b8df2150e212f5062dc9ace03288d809e1d46c16b911,2024-08-19T18:35:11.410000
|
||||||
CVE-2024-34906,0,0,2d514f74a75383567e242812745d1978f5a5608d1bafa528fe1c42a0f093f8ed,2024-05-23T20:42:22.080000
|
CVE-2024-34906,0,1,f750c2112b1b61a4b0d4bb941243c567b56a2b55a50a8501386482dd06b49ac1,2024-08-28T21:35:11
|
||||||
CVE-2024-34909,0,0,75ef6b64b1e62b9391afd10085bc7fe5995801e2be117fc0dc8d712e21d5d32b,2024-07-03T02:00:52.603000
|
CVE-2024-34909,0,0,75ef6b64b1e62b9391afd10085bc7fe5995801e2be117fc0dc8d712e21d5d32b,2024-07-03T02:00:52.603000
|
||||||
CVE-2024-3491,0,0,3f53627a80e697de4556db2343c1e928afb824dee19f0a6a29ac6e39296f869d,2024-04-23T12:52:09.397000
|
CVE-2024-3491,0,0,3f53627a80e697de4556db2343c1e928afb824dee19f0a6a29ac6e39296f869d,2024-04-23T12:52:09.397000
|
||||||
CVE-2024-34913,0,0,4ee00b2163d3042020be6fa672a11467385e4c8bf271adab1a0d83cdeeaf8210,2024-05-23T20:59:34.540000
|
CVE-2024-34913,0,0,4ee00b2163d3042020be6fa672a11467385e4c8bf271adab1a0d83cdeeaf8210,2024-05-23T20:59:34.540000
|
||||||
@ -253474,7 +253475,7 @@ CVE-2024-35340,0,0,1292363a48b3318ab4eea61a21d1774d64143b2f1ea71749d49412fca7f08
|
|||||||
CVE-2024-35341,0,0,2394ba36fcc9e849f9840edb2ba384b36eee4d7eebd73846ccbdccf118ee1563,2024-08-01T13:52:36.597000
|
CVE-2024-35341,0,0,2394ba36fcc9e849f9840edb2ba384b36eee4d7eebd73846ccbdccf118ee1563,2024-08-01T13:52:36.597000
|
||||||
CVE-2024-35342,0,0,a4f7369f8f0a6de9d16902cacb7a44f46ba0a7d7f218612f1259029d70c7f06e,2024-05-29T13:02:09.280000
|
CVE-2024-35342,0,0,a4f7369f8f0a6de9d16902cacb7a44f46ba0a7d7f218612f1259029d70c7f06e,2024-05-29T13:02:09.280000
|
||||||
CVE-2024-35343,0,0,afbb68674236a89009facceb114c5d242ad657f17e86d5d8fbbfd0cec8107edb,2024-08-01T13:52:37.563000
|
CVE-2024-35343,0,0,afbb68674236a89009facceb114c5d242ad657f17e86d5d8fbbfd0cec8107edb,2024-08-01T13:52:37.563000
|
||||||
CVE-2024-35344,0,0,bc74dd675a5dce7f00a3f726cd43afdec09d5a821ebe8ae8c283145b225cfc80,2024-05-29T13:02:09.280000
|
CVE-2024-35344,0,1,347a536906c9cd275b6604bba463b1e6f3bbbbe6dff687daf180f85bf210928a,2024-08-28T20:35:11.640000
|
||||||
CVE-2024-35345,0,0,94f6cac212d9f349d4de9b7da46a3407365d342f37822b3360eee738ef0a1e40,2024-08-19T17:35:17.703000
|
CVE-2024-35345,0,0,94f6cac212d9f349d4de9b7da46a3407365d342f37822b3360eee738ef0a1e40,2024-08-19T17:35:17.703000
|
||||||
CVE-2024-35349,0,0,11658c700be6076291828420e77d9bdb67d68c65b2a15cfc033913a7e5b5639c,2024-08-01T13:52:38.343000
|
CVE-2024-35349,0,0,11658c700be6076291828420e77d9bdb67d68c65b2a15cfc033913a7e5b5639c,2024-08-01T13:52:38.343000
|
||||||
CVE-2024-3535,0,0,73d791a5850d78576003eae31f8a489c9a6c4b90f35033ec73a578c9367a898c,2024-05-17T02:39:59.803000
|
CVE-2024-3535,0,0,73d791a5850d78576003eae31f8a489c9a6c4b90f35033ec73a578c9367a898c,2024-05-17T02:39:59.803000
|
||||||
@ -254892,7 +254893,7 @@ CVE-2024-37321,0,0,e43d264e800a81e0d6029e42f0d44c2c5a3a79449b2b0be508db95416510e
|
|||||||
CVE-2024-37322,0,0,d2c3e4ead54adc24099fd08e32c15f700d67b352b7a8bd2d3b4bfc1ce21a81e9,2024-08-20T15:47:23.830000
|
CVE-2024-37322,0,0,d2c3e4ead54adc24099fd08e32c15f700d67b352b7a8bd2d3b4bfc1ce21a81e9,2024-08-20T15:47:23.830000
|
||||||
CVE-2024-37323,0,0,4d91cfc2869ee17646bfec1969f43f1ccc3bb5b998368edbb19a54f7b2235add,2024-08-20T15:47:26.383000
|
CVE-2024-37323,0,0,4d91cfc2869ee17646bfec1969f43f1ccc3bb5b998368edbb19a54f7b2235add,2024-08-20T15:47:26.383000
|
||||||
CVE-2024-37324,0,0,abc8ac852770b9e6c0196ac0f888a778413aab684c72411dcdd7abfdca6af10e,2024-08-20T15:47:29.147000
|
CVE-2024-37324,0,0,abc8ac852770b9e6c0196ac0f888a778413aab684c72411dcdd7abfdca6af10e,2024-08-20T15:47:29.147000
|
||||||
CVE-2024-37325,0,0,1d87585535a572046f3269d4a6e53e39d113df4fc37e43ad494b3059408daa64,2024-06-13T18:36:09.013000
|
CVE-2024-37325,0,1,6294d12bef740deef9232a4260a6662461a231eb0cf805c573aaa423ed122236,2024-08-28T21:29:34.533000
|
||||||
CVE-2024-37326,0,0,ac7472d1fb1d18503007a35e6fe41ee1151b7dc6ef627e10a11e757c5664ebf5,2024-08-20T15:47:31.987000
|
CVE-2024-37326,0,0,ac7472d1fb1d18503007a35e6fe41ee1151b7dc6ef627e10a11e757c5664ebf5,2024-08-20T15:47:31.987000
|
||||||
CVE-2024-37327,0,0,6d3d3ead5193ba04066eb6050d2d8a7e0a77d229a7111950b5a3609d911907f0,2024-08-20T15:47:34.730000
|
CVE-2024-37327,0,0,6d3d3ead5193ba04066eb6050d2d8a7e0a77d229a7111950b5a3609d911907f0,2024-08-20T15:47:34.730000
|
||||||
CVE-2024-37328,0,0,76f8e407d4325cd98c4d4d2117be19b060f62c1c032de62e6462543f2d8b8dac,2024-08-20T15:47:37.937000
|
CVE-2024-37328,0,0,76f8e407d4325cd98c4d4d2117be19b060f62c1c032de62e6462543f2d8b8dac,2024-08-20T15:47:37.937000
|
||||||
@ -256231,14 +256232,14 @@ CVE-2024-39500,0,0,32e48803900f332ecd0b386dfab340711259f55424109f63b42ef311f1aa9
|
|||||||
CVE-2024-39501,0,0,dbed8cdce2846df04987988dc191be230e467953108dbad3ef1866484e01944e,2024-07-12T16:34:58.687000
|
CVE-2024-39501,0,0,dbed8cdce2846df04987988dc191be230e467953108dbad3ef1866484e01944e,2024-07-12T16:34:58.687000
|
||||||
CVE-2024-39502,0,0,99b689f6371529c59a665d9c426727398f43183fffa63b58cc95bb184d69fa0a,2024-07-12T16:34:58.687000
|
CVE-2024-39502,0,0,99b689f6371529c59a665d9c426727398f43183fffa63b58cc95bb184d69fa0a,2024-07-12T16:34:58.687000
|
||||||
CVE-2024-39503,0,0,5e4d34ef2c4459378b0d2181b74587a03eb064853eaebcf5be4aab1548d06b82,2024-07-12T16:34:58.687000
|
CVE-2024-39503,0,0,5e4d34ef2c4459378b0d2181b74587a03eb064853eaebcf5be4aab1548d06b82,2024-07-12T16:34:58.687000
|
||||||
CVE-2024-39504,0,1,bdccaf811e8fa1282cf93f14389fa178db83a9dd861ab1a8383eecda34377824,2024-08-28T19:58:45.653000
|
CVE-2024-39504,0,0,bdccaf811e8fa1282cf93f14389fa178db83a9dd861ab1a8383eecda34377824,2024-08-28T19:58:45.653000
|
||||||
CVE-2024-39505,0,0,33dc1a3989cb5c060d5c4f30fa91554943c85a657f65588f826529ceef0f94a9,2024-07-12T16:34:58.687000
|
CVE-2024-39505,0,0,33dc1a3989cb5c060d5c4f30fa91554943c85a657f65588f826529ceef0f94a9,2024-07-12T16:34:58.687000
|
||||||
CVE-2024-39506,0,1,8c462840acc6bb08d9230b602444b2f73c8c80f6b650776b8310449d2261b908,2024-08-28T19:58:56.013000
|
CVE-2024-39506,0,0,8c462840acc6bb08d9230b602444b2f73c8c80f6b650776b8310449d2261b908,2024-08-28T19:58:56.013000
|
||||||
CVE-2024-39507,0,0,1f47c187fd37c3a4a4dbd94d24344ef551d55fa35ab3ff979c4b1cc67002f4d5,2024-07-12T16:34:58.687000
|
CVE-2024-39507,0,0,1f47c187fd37c3a4a4dbd94d24344ef551d55fa35ab3ff979c4b1cc67002f4d5,2024-07-12T16:34:58.687000
|
||||||
CVE-2024-39508,0,0,26013578589e34725fa81a94c339e09cc309ea5ca5a92a64ba271fcd81f91dee,2024-07-12T16:34:58.687000
|
CVE-2024-39508,0,0,26013578589e34725fa81a94c339e09cc309ea5ca5a92a64ba271fcd81f91dee,2024-07-12T16:34:58.687000
|
||||||
CVE-2024-39509,0,0,6f4a3358b91af56191a71e0d0b835dd811a8ac97ff57de735049825822c090da,2024-07-12T16:34:58.687000
|
CVE-2024-39509,0,0,6f4a3358b91af56191a71e0d0b835dd811a8ac97ff57de735049825822c090da,2024-07-12T16:34:58.687000
|
||||||
CVE-2024-3951,0,0,5ca8c536acbbd299aeb225ced02a6adee99ff33cec2e6b61bb0e0674eb9863cc,2024-05-08T17:05:24.083000
|
CVE-2024-3951,0,0,5ca8c536acbbd299aeb225ced02a6adee99ff33cec2e6b61bb0e0674eb9863cc,2024-05-08T17:05:24.083000
|
||||||
CVE-2024-39510,0,1,219c25ef60503ac3e7f220cf8600d0b269f5ff3251fb7cce8e3ea23df3d2c0a2,2024-08-28T19:59:12.947000
|
CVE-2024-39510,0,0,219c25ef60503ac3e7f220cf8600d0b269f5ff3251fb7cce8e3ea23df3d2c0a2,2024-08-28T19:59:12.947000
|
||||||
CVE-2024-39511,0,0,8ff64d2b76cac616818d233531010fca566a954b6d7754e7506b08d9563d0619,2024-07-11T13:05:54.930000
|
CVE-2024-39511,0,0,8ff64d2b76cac616818d233531010fca566a954b6d7754e7506b08d9563d0619,2024-07-11T13:05:54.930000
|
||||||
CVE-2024-39512,0,0,8dc06e3a41bd79c2b8acee90011e9252ad90bde4c1d3ea0321002de14ee56805,2024-07-11T13:05:54.930000
|
CVE-2024-39512,0,0,8dc06e3a41bd79c2b8acee90011e9252ad90bde4c1d3ea0321002de14ee56805,2024-07-11T13:05:54.930000
|
||||||
CVE-2024-39513,0,0,c9005dbac22de69512a9faa58a7ede6f14f1995b0d447d6210a9f7d9af401e1d,2024-07-11T13:05:54.930000
|
CVE-2024-39513,0,0,c9005dbac22de69512a9faa58a7ede6f14f1995b0d447d6210a9f7d9af401e1d,2024-07-11T13:05:54.930000
|
||||||
@ -256396,7 +256397,7 @@ CVE-2024-39705,0,0,e4b6d32dbf56290b80b8c0b89889459c855e182d434956c162d34a43f4f67
|
|||||||
CVE-2024-39708,0,0,2eafb164d29e8efc470b1c615a7a961efa5060a31edd6795a1174fbb57cde7b9,2024-08-15T16:15:20.100000
|
CVE-2024-39708,0,0,2eafb164d29e8efc470b1c615a7a961efa5060a31edd6795a1174fbb57cde7b9,2024-08-15T16:15:20.100000
|
||||||
CVE-2024-3971,0,0,232de18e9e74ddfe0c81af44fc47161b6db81bcc698685ef24ea3f7084d9ef87,2024-07-29T16:51:34.570000
|
CVE-2024-3971,0,0,232de18e9e74ddfe0c81af44fc47161b6db81bcc698685ef24ea3f7084d9ef87,2024-07-29T16:51:34.570000
|
||||||
CVE-2024-39713,0,0,99e8a316dad486c18bb302062018548767182c9767b7c9ef5e1c3b6a3cdb13f2,2024-08-05T12:41:45.957000
|
CVE-2024-39713,0,0,99e8a316dad486c18bb302062018548767182c9767b7c9ef5e1c3b6a3cdb13f2,2024-08-05T12:41:45.957000
|
||||||
CVE-2024-39717,0,1,5c727700f5fb9ffcdff7d74de82f8cc7669d0dbb9bbb395cb4e4ef77f2b2701c,2024-08-28T19:47:25.410000
|
CVE-2024-39717,0,0,5c727700f5fb9ffcdff7d74de82f8cc7669d0dbb9bbb395cb4e4ef77f2b2701c,2024-08-28T19:47:25.410000
|
||||||
CVE-2024-3972,0,0,0caddd7b34d493c3554c875afe72275890f23d83038241874e85ef811a9076b6,2024-08-01T13:56:47.637000
|
CVE-2024-3972,0,0,0caddd7b34d493c3554c875afe72275890f23d83038241874e85ef811a9076b6,2024-08-01T13:56:47.637000
|
||||||
CVE-2024-39723,0,0,003097d794792a3e1194202f71608927b35e402887d5f5ddf07d35b5dd183916,2024-07-11T14:54:10.243000
|
CVE-2024-39723,0,0,003097d794792a3e1194202f71608927b35e402887d5f5ddf07d35b5dd183916,2024-07-11T14:54:10.243000
|
||||||
CVE-2024-39728,0,0,fba26233ce0c4692619efffa132c45bfb836485ad2132e6f2e6d7ce0ec6f97d0,2024-07-16T13:57:37.203000
|
CVE-2024-39728,0,0,fba26233ce0c4692619efffa132c45bfb836485ad2132e6f2e6d7ce0ec6f97d0,2024-07-16T13:57:37.203000
|
||||||
@ -256666,8 +256667,8 @@ CVE-2024-40520,0,0,a2ac37b5fe4993386ad0c401ff27a90a4ee5d292a95a31b8ec4196b4a0643
|
|||||||
CVE-2024-40521,0,0,f750523e60dcc32f0bb9bfafb3982029c7dd27cd5b8886a7de1a46e73ce196a6,2024-07-12T18:44:41.670000
|
CVE-2024-40521,0,0,f750523e60dcc32f0bb9bfafb3982029c7dd27cd5b8886a7de1a46e73ce196a6,2024-07-12T18:44:41.670000
|
||||||
CVE-2024-40522,0,0,8a677ab9989e362511bec3e6f4edb768c909d11d73452c70e9694007bb6c7499,2024-08-01T13:57:36.927000
|
CVE-2024-40522,0,0,8a677ab9989e362511bec3e6f4edb768c909d11d73452c70e9694007bb6c7499,2024-08-01T13:57:36.927000
|
||||||
CVE-2024-40524,0,0,90f7431206b5ecbb9d18d5d6f346e266df059fa6fac9c7463be67ad7414064c8,2024-08-01T13:57:37.610000
|
CVE-2024-40524,0,0,90f7431206b5ecbb9d18d5d6f346e266df059fa6fac9c7463be67ad7414064c8,2024-08-01T13:57:37.610000
|
||||||
CVE-2024-40530,0,1,efb514f12fd7b373398adea8678758d12c23eb4a56afc33b6cb2a0d986bc14b0,2024-08-28T19:15:08.717000
|
CVE-2024-40530,0,0,efb514f12fd7b373398adea8678758d12c23eb4a56afc33b6cb2a0d986bc14b0,2024-08-28T19:15:08.717000
|
||||||
CVE-2024-40531,0,1,197fc6f6a80e1880502547f174bb330235e9a4fff00fb8be3255641a40fc91b4,2024-08-28T19:15:08.797000
|
CVE-2024-40531,0,0,197fc6f6a80e1880502547f174bb330235e9a4fff00fb8be3255641a40fc91b4,2024-08-28T19:15:08.797000
|
||||||
CVE-2024-40535,0,0,1510e098104a1d2f524b97f4ba986590a1c7d9af78dd4e91187f28763928fd2c,2024-08-22T19:35:35.893000
|
CVE-2024-40535,0,0,1510e098104a1d2f524b97f4ba986590a1c7d9af78dd4e91187f28763928fd2c,2024-08-22T19:35:35.893000
|
||||||
CVE-2024-40536,0,0,8e08633375577085d9df665f2d62466b3b6eb1ecb2618a56ac5894fb283b7f3f,2024-07-17T13:34:20.520000
|
CVE-2024-40536,0,0,8e08633375577085d9df665f2d62466b3b6eb1ecb2618a56ac5894fb283b7f3f,2024-07-17T13:34:20.520000
|
||||||
CVE-2024-40539,0,0,8ebc42c1390ef84ac367ae8d1ba0b0ce9ac095f50c081e4e40b961f1bf0b144d,2024-08-01T13:57:39.077000
|
CVE-2024-40539,0,0,8ebc42c1390ef84ac367ae8d1ba0b0ce9ac095f50c081e4e40b961f1bf0b144d,2024-08-01T13:57:39.077000
|
||||||
@ -256853,7 +256854,7 @@ CVE-2024-40893,0,0,3220dba971e1861a31a0659deabcf8dc81ec736d5ed6a5b82a9eb1d0c8650
|
|||||||
CVE-2024-40895,0,0,8c1e79c4f9b4c4aa0a454566e9355d762509535d530511413d5b712e02da1fc1,2024-08-01T13:58:15.617000
|
CVE-2024-40895,0,0,8c1e79c4f9b4c4aa0a454566e9355d762509535d530511413d5b712e02da1fc1,2024-08-01T13:58:15.617000
|
||||||
CVE-2024-40897,0,0,7f0ff77f7480d176e5ca1f86675f7cea8983627e8b9afaea0e9328e4e4b96a32,2024-08-27T13:52:53.790000
|
CVE-2024-40897,0,0,7f0ff77f7480d176e5ca1f86675f7cea8983627e8b9afaea0e9328e4e4b96a32,2024-08-27T13:52:53.790000
|
||||||
CVE-2024-40898,0,0,c6ad18799f7505669566d9c81fb73660e4e14c652ad1fc12f5c5f928e7c51636,2024-08-08T16:02:40.887000
|
CVE-2024-40898,0,0,c6ad18799f7505669566d9c81fb73660e4e14c652ad1fc12f5c5f928e7c51636,2024-08-08T16:02:40.887000
|
||||||
CVE-2024-40899,0,1,e780b074d783a002df6b4261424c6db082994ffa39e09f112feba6d38138eca6,2024-08-28T19:59:22.927000
|
CVE-2024-40899,0,0,e780b074d783a002df6b4261424c6db082994ffa39e09f112feba6d38138eca6,2024-08-28T19:59:22.927000
|
||||||
CVE-2024-4090,0,0,bd5db9aa43fdf043c385c9f06c114ad9fbfb60a7cd8406c1329f0be062b40775,2024-08-01T14:35:12.593000
|
CVE-2024-4090,0,0,bd5db9aa43fdf043c385c9f06c114ad9fbfb60a7cd8406c1329f0be062b40775,2024-08-01T14:35:12.593000
|
||||||
CVE-2024-40900,0,0,d5b683c8350615b20febf47a29bbffae93edd0a350147e3cd873aa7a5a37926c,2024-07-12T16:34:58.687000
|
CVE-2024-40900,0,0,d5b683c8350615b20febf47a29bbffae93edd0a350147e3cd873aa7a5a37926c,2024-07-12T16:34:58.687000
|
||||||
CVE-2024-40901,0,0,e26097fb6f292c0ef621a3948768a962501ab86f3daa859d54d1945bd865aa16,2024-07-12T16:34:58.687000
|
CVE-2024-40901,0,0,e26097fb6f292c0ef621a3948768a962501ab86f3daa859d54d1945bd865aa16,2024-07-12T16:34:58.687000
|
||||||
@ -256889,9 +256890,9 @@ CVE-2024-40929,0,0,922566e6896182fcd86bab51cbd2b2f5e83578ebe1d9528e2a3d395a2a144
|
|||||||
CVE-2024-4093,0,0,4094c134af1a117994cc6fa0b479bc18db1d53d46b6fa3e1bad5f760245c30a1,2024-05-17T02:40:15.433000
|
CVE-2024-4093,0,0,4094c134af1a117994cc6fa0b479bc18db1d53d46b6fa3e1bad5f760245c30a1,2024-05-17T02:40:15.433000
|
||||||
CVE-2024-40930,0,0,b4f4f0f521513c469fe141e4f04568fa708146afbf26b9e43ef67c49fbb97034,2024-07-12T16:34:58.687000
|
CVE-2024-40930,0,0,b4f4f0f521513c469fe141e4f04568fa708146afbf26b9e43ef67c49fbb97034,2024-07-12T16:34:58.687000
|
||||||
CVE-2024-40931,0,0,1ce51d0c1cf3e56971909d12fef17b7b190325030f87851f102025b07310a339,2024-07-12T16:34:58.687000
|
CVE-2024-40931,0,0,1ce51d0c1cf3e56971909d12fef17b7b190325030f87851f102025b07310a339,2024-07-12T16:34:58.687000
|
||||||
CVE-2024-40932,0,1,a9cf96830b006378bce6c68ed0757ef896fae1b35ee3940d03a768e94ae65c5a,2024-08-28T19:48:53.420000
|
CVE-2024-40932,0,0,a9cf96830b006378bce6c68ed0757ef896fae1b35ee3940d03a768e94ae65c5a,2024-08-28T19:48:53.420000
|
||||||
CVE-2024-40933,0,0,96771d62b803cb6fb8413f216e98fe7325b9f160d5178302017c1ebbfdf41ad1,2024-07-12T16:34:58.687000
|
CVE-2024-40933,0,0,96771d62b803cb6fb8413f216e98fe7325b9f160d5178302017c1ebbfdf41ad1,2024-07-12T16:34:58.687000
|
||||||
CVE-2024-40934,0,1,0f4fa006864a9d48c0a4ffb7ec8d6898f10d1c1eb85215eb8c4ca2a5d7b3ba19,2024-08-28T19:49:04.307000
|
CVE-2024-40934,0,0,0f4fa006864a9d48c0a4ffb7ec8d6898f10d1c1eb85215eb8c4ca2a5d7b3ba19,2024-08-28T19:49:04.307000
|
||||||
CVE-2024-40935,0,0,a229105c5d2bb66ee17d53a34892f169d9c296108d2f7d99e57d4944bc30c1f0,2024-07-12T16:34:58.687000
|
CVE-2024-40935,0,0,a229105c5d2bb66ee17d53a34892f169d9c296108d2f7d99e57d4944bc30c1f0,2024-07-12T16:34:58.687000
|
||||||
CVE-2024-40936,0,0,34f66f9dfd47f0ce49d1c77b26ffc55123e4f460cffd6c4a4b7f8e6444317e13,2024-07-12T16:34:58.687000
|
CVE-2024-40936,0,0,34f66f9dfd47f0ce49d1c77b26ffc55123e4f460cffd6c4a4b7f8e6444317e13,2024-07-12T16:34:58.687000
|
||||||
CVE-2024-40937,0,0,18b0b0dc1e836fe3ae2e170c8982a2b4836f0393f58deb5f92b95d810e69aed1,2024-07-12T16:34:58.687000
|
CVE-2024-40937,0,0,18b0b0dc1e836fe3ae2e170c8982a2b4836f0393f58deb5f92b95d810e69aed1,2024-07-12T16:34:58.687000
|
||||||
@ -256913,12 +256914,12 @@ CVE-2024-40950,0,0,b6979d5e6c063eb00970b540ceafda0becb430ff51009e9e1c48a7255ff5f
|
|||||||
CVE-2024-40951,0,0,15aa8df4b78f7514f02ec97aa813adcc5685b7b49e8bf3041732ce8e88b84a54,2024-08-06T13:29:07.827000
|
CVE-2024-40951,0,0,15aa8df4b78f7514f02ec97aa813adcc5685b7b49e8bf3041732ce8e88b84a54,2024-08-06T13:29:07.827000
|
||||||
CVE-2024-40952,0,0,0e259c5b64d27b28a64029bae66b9c49f91a589d68389fee91a3e779c87dcc5c,2024-08-21T16:50:34.377000
|
CVE-2024-40952,0,0,0e259c5b64d27b28a64029bae66b9c49f91a589d68389fee91a3e779c87dcc5c,2024-08-21T16:50:34.377000
|
||||||
CVE-2024-40953,0,0,b95ef29b38cb2bdc14b7d3310e089ce1c53f0ae5a8fac0aff1ea43db998d2aa8,2024-07-12T16:34:58.687000
|
CVE-2024-40953,0,0,b95ef29b38cb2bdc14b7d3310e089ce1c53f0ae5a8fac0aff1ea43db998d2aa8,2024-07-12T16:34:58.687000
|
||||||
CVE-2024-40954,0,1,78f0e309af3fbd1c7a3f44fe20c2a180906cb9fb2c93280aadfa346fd4829390,2024-08-28T19:43:58.273000
|
CVE-2024-40954,0,0,78f0e309af3fbd1c7a3f44fe20c2a180906cb9fb2c93280aadfa346fd4829390,2024-08-28T19:43:58.273000
|
||||||
CVE-2024-40955,0,1,944ef62a2af0db3b5c2b157398d008c072a9239350e5ae4417455b3911010b14,2024-08-28T19:45:37.080000
|
CVE-2024-40955,0,0,944ef62a2af0db3b5c2b157398d008c072a9239350e5ae4417455b3911010b14,2024-08-28T19:45:37.080000
|
||||||
CVE-2024-40956,0,1,b38583adc04d97ec9d688f8f059ebfc65c5239ed7aba58f834e95c4bc80bb3b7,2024-08-28T18:58:48.433000
|
CVE-2024-40956,0,0,b38583adc04d97ec9d688f8f059ebfc65c5239ed7aba58f834e95c4bc80bb3b7,2024-08-28T18:58:48.433000
|
||||||
CVE-2024-40957,0,1,4169395d36d8df754af0ff2f0952d94b9d03cad9228a2cd953255dac27d54c21,2024-08-28T18:58:59.793000
|
CVE-2024-40957,0,0,4169395d36d8df754af0ff2f0952d94b9d03cad9228a2cd953255dac27d54c21,2024-08-28T18:58:59.793000
|
||||||
CVE-2024-40958,0,1,4055162d5de8cf1b7ae3f4360cf522ef9d8bb94c58b99c5968e7d3b887a367e8,2024-08-28T18:46:29.543000
|
CVE-2024-40958,0,0,4055162d5de8cf1b7ae3f4360cf522ef9d8bb94c58b99c5968e7d3b887a367e8,2024-08-28T18:46:29.543000
|
||||||
CVE-2024-40959,0,1,3efe7268d6bd3d9c0e7792eede131c4531003b8b0a406d93c2abed58e13790c2,2024-08-28T18:46:52.453000
|
CVE-2024-40959,0,0,3efe7268d6bd3d9c0e7792eede131c4531003b8b0a406d93c2abed58e13790c2,2024-08-28T18:46:52.453000
|
||||||
CVE-2024-4096,0,0,50bdcb96d8146d46d54f79639093726453baeacacf83f329111a9e971fb9861d,2024-08-01T13:59:25.313000
|
CVE-2024-4096,0,0,50bdcb96d8146d46d54f79639093726453baeacacf83f329111a9e971fb9861d,2024-08-01T13:59:25.313000
|
||||||
CVE-2024-40960,0,0,224fc8abfb2f94783b28083c93e2292ac4ee8186631329fe5a1366c6e0afb3e1,2024-08-21T16:53:01.407000
|
CVE-2024-40960,0,0,224fc8abfb2f94783b28083c93e2292ac4ee8186631329fe5a1366c6e0afb3e1,2024-08-21T16:53:01.407000
|
||||||
CVE-2024-40961,0,0,46c5313b9439073911d138fda8b8a768c839675dbf78976afbf75297f27433b1,2024-08-21T16:54:20.817000
|
CVE-2024-40961,0,0,46c5313b9439073911d138fda8b8a768c839675dbf78976afbf75297f27433b1,2024-08-21T16:54:20.817000
|
||||||
@ -257125,7 +257126,7 @@ CVE-2024-4121,0,0,62ca255cdda2e26a7a0224389681466727634cf0831afab2f14e58a1cb5bd9
|
|||||||
CVE-2024-4122,0,0,3d81c7d42348f56045cc538515e4a2e136e243adec928773370fb697e11bd281,2024-06-04T19:20:30.560000
|
CVE-2024-4122,0,0,3d81c7d42348f56045cc538515e4a2e136e243adec928773370fb697e11bd281,2024-06-04T19:20:30.560000
|
||||||
CVE-2024-41226,0,0,0f1b0fab09deb513b318e5339bb250b54a4148cca3ff553dad16500490764bac,2024-08-12T16:01:32.383000
|
CVE-2024-41226,0,0,0f1b0fab09deb513b318e5339bb250b54a4148cca3ff553dad16500490764bac,2024-08-12T16:01:32.383000
|
||||||
CVE-2024-4123,0,0,b9879b7d0937c162f61c7aeebe9319c3ee0d2290b23cb569d74c82da57c569d5,2024-06-04T19:20:30.660000
|
CVE-2024-4123,0,0,b9879b7d0937c162f61c7aeebe9319c3ee0d2290b23cb569d74c82da57c569d5,2024-06-04T19:20:30.660000
|
||||||
CVE-2024-41236,1,1,c4e6a64b54b2e943aa2644b716126f214c4e5e917f99a2fe950f6695e8ec8574,2024-08-28T18:35:16.790000
|
CVE-2024-41236,0,0,c4e6a64b54b2e943aa2644b716126f214c4e5e917f99a2fe950f6695e8ec8574,2024-08-28T18:35:16.790000
|
||||||
CVE-2024-41237,0,0,8ccb4952f164337b681989e54cc147e9e164fc596c980ba694a928ee7e458af2,2024-08-08T20:53:45.827000
|
CVE-2024-41237,0,0,8ccb4952f164337b681989e54cc147e9e164fc596c980ba694a928ee7e458af2,2024-08-08T20:53:45.827000
|
||||||
CVE-2024-41238,0,0,f705e2f0b1f5d028406d99f056a8ab6c4a04267fa568b3aa67b3ab220a8ce6db,2024-08-12T15:06:26.557000
|
CVE-2024-41238,0,0,f705e2f0b1f5d028406d99f056a8ab6c4a04267fa568b3aa67b3ab220a8ce6db,2024-08-12T15:06:26.557000
|
||||||
CVE-2024-41239,0,0,131b357876f7631347cb4a7eac6921190f3c4ad817f4e0a0fd5e6c6c0d9100d6,2024-08-08T19:04:43.380000
|
CVE-2024-41239,0,0,131b357876f7631347cb4a7eac6921190f3c4ad817f4e0a0fd5e6c6c0d9100d6,2024-08-08T19:04:43.380000
|
||||||
@ -257819,11 +257820,11 @@ CVE-2024-42459,0,0,1b31e68c1b4d33528b48a03fd6d9767f75dade645a7a5642b37f7704ee8ff
|
|||||||
CVE-2024-4246,0,0,d1ecb5c9b82db83c5f960ba668d8749b982008f4e59e30cf96ab22ab0b209b32,2024-06-04T19:20:33.790000
|
CVE-2024-4246,0,0,d1ecb5c9b82db83c5f960ba668d8749b982008f4e59e30cf96ab22ab0b209b32,2024-06-04T19:20:33.790000
|
||||||
CVE-2024-42460,0,0,7cc8f5c50a101241ded3ad554de6ff811573b60cf374e61565e85a5cfdefc0e9,2024-08-02T16:35:53.760000
|
CVE-2024-42460,0,0,7cc8f5c50a101241ded3ad554de6ff811573b60cf374e61565e85a5cfdefc0e9,2024-08-02T16:35:53.760000
|
||||||
CVE-2024-42461,0,0,bba68fac1714eca06b2f70a5c715b9fe71087992bafdb6d29066928e025c5f76,2024-08-16T16:51:40.270000
|
CVE-2024-42461,0,0,bba68fac1714eca06b2f70a5c715b9fe71087992bafdb6d29066928e025c5f76,2024-08-16T16:51:40.270000
|
||||||
CVE-2024-42462,0,0,b19edc28fc2a0bfff5cef08f2bf42ed64517efd4df4ba40c3d5c0700285641c9,2024-08-19T13:00:23.117000
|
CVE-2024-42462,0,1,8ae903dc9e00dcb9d20585b4534acebe4eef4829225fa8001c74505d7d4227e8,2024-08-28T20:46:39.227000
|
||||||
CVE-2024-42463,0,0,81d9a620e868a0ee28f0a813c40c25ffd53a77197edb11311bdbccacef4f97a2,2024-08-19T13:00:23.117000
|
CVE-2024-42463,0,1,1887d4b9dbb205a7918713aab61d422ae1234ef53aa6637fd3664544692f6740,2024-08-28T20:38:25.227000
|
||||||
CVE-2024-42464,0,0,d02c3f121530d2f61ac64a8500ff797e919368a6bce85f1a457f8ab7d180089e,2024-08-19T13:00:23.117000
|
CVE-2024-42464,0,1,c028981b0f05209b8f9398c3d10076a5d141612668af4661ca8e9b565e3a5a68,2024-08-28T20:35:52.940000
|
||||||
CVE-2024-42465,0,0,370301b2cfcf79d37c820942768e011b48c883a5ad5f34c844a8b31f6c852503,2024-08-19T13:00:23.117000
|
CVE-2024-42465,0,1,cc1706811a59c806dba0a5fe5e46aaf63eb46135d4336575a42fc94641a6632d,2024-08-28T20:32:31.737000
|
||||||
CVE-2024-42466,0,0,b7b0b6e42cec15c89fd794bcf02c2ed85362d59270ae7e0a3cc806f9fa81dfcd,2024-08-19T13:00:23.117000
|
CVE-2024-42466,0,1,b147a6143c0f1b29bc81d9c541a33cc57bd399450bc78084e7c0d7553a8f8a24,2024-08-28T20:48:14.917000
|
||||||
CVE-2024-42467,0,0,e23e0abc0a807db2a53f3a498d6ca2ef36fe18197da36ac218027e00b6ca7984,2024-08-12T13:41:36.517000
|
CVE-2024-42467,0,0,e23e0abc0a807db2a53f3a498d6ca2ef36fe18197da36ac218027e00b6ca7984,2024-08-12T13:41:36.517000
|
||||||
CVE-2024-42468,0,0,20ab5d9f17a6b01a0da06bad1509e9a4dc8119cebd6158ac0abf8cefec4df7e5,2024-08-12T13:41:36.517000
|
CVE-2024-42468,0,0,20ab5d9f17a6b01a0da06bad1509e9a4dc8119cebd6158ac0abf8cefec4df7e5,2024-08-12T13:41:36.517000
|
||||||
CVE-2024-42469,0,0,30cb7e23c62f8ac5ce9bc45ebb27cbde0a399d6ba51c92609f7c3b2c2f4965cc,2024-08-12T13:41:36.517000
|
CVE-2024-42469,0,0,30cb7e23c62f8ac5ce9bc45ebb27cbde0a399d6ba51c92609f7c3b2c2f4965cc,2024-08-12T13:41:36.517000
|
||||||
@ -258012,6 +258013,7 @@ CVE-2024-4279,0,0,dfbad3c4052d0097199e5a57f42abb52975c0de3af4475a04c90870b0d97f0
|
|||||||
CVE-2024-42790,0,0,7510b4b53ddc671a204c6c9918e039c11322e8be8788350ff1b1615bcf8a1bd2,2024-08-27T14:35:06.047000
|
CVE-2024-42790,0,0,7510b4b53ddc671a204c6c9918e039c11322e8be8788350ff1b1615bcf8a1bd2,2024-08-27T14:35:06.047000
|
||||||
CVE-2024-42791,0,0,229b4927d8c73b78aebdb2269dabb59bb0e6061ec8574ac1a3619991917c1649,2024-08-26T19:35:30.910000
|
CVE-2024-42791,0,0,229b4927d8c73b78aebdb2269dabb59bb0e6061ec8574ac1a3619991917c1649,2024-08-26T19:35:30.910000
|
||||||
CVE-2024-42792,0,0,4eaaa19a355275b40166aa1a2acd468fef8bb5420612bb7385f6e2e1abaacd08,2024-08-26T19:10:09.607000
|
CVE-2024-42792,0,0,4eaaa19a355275b40166aa1a2acd468fef8bb5420612bb7385f6e2e1abaacd08,2024-08-26T19:10:09.607000
|
||||||
|
CVE-2024-42793,1,1,2fd1699f07cb06cbca846a8c551b761a2dfd05d711fbd58716ff3794ae7bdac7,2024-08-28T20:35:12.570000
|
||||||
CVE-2024-4280,0,0,f46c38f13eff52b4d020fb374e18f92e6528a4bade2042627b2165ccf7b62772,2024-05-14T16:11:39.510000
|
CVE-2024-4280,0,0,f46c38f13eff52b4d020fb374e18f92e6528a4bade2042627b2165ccf7b62772,2024-05-14T16:11:39.510000
|
||||||
CVE-2024-4281,0,0,cb48c26c252b1c83fb4810210335ce05e1fcbd94e5804419418b4f73b9d5c028,2024-05-08T13:15:00.690000
|
CVE-2024-4281,0,0,cb48c26c252b1c83fb4810210335ce05e1fcbd94e5804419418b4f73b9d5c028,2024-05-08T13:15:00.690000
|
||||||
CVE-2024-42812,0,0,d754a1b3fa22845b1ec28a5e3b423343f3a09420e9ed62b3cb19e2fa117c33b2,2024-08-20T15:44:20.567000
|
CVE-2024-42812,0,0,d754a1b3fa22845b1ec28a5e3b423343f3a09420e9ed62b3cb19e2fa117c33b2,2024-08-20T15:44:20.567000
|
||||||
@ -258024,7 +258026,7 @@ CVE-2024-42843,0,0,147a94e278dd08ceb9ff0b00f505eb868d7a1e59c01ddecc9d1420e344e9e
|
|||||||
CVE-2024-42845,0,0,f506b40591f84fe588a1ebf10f79903d4e58b530d7a712a8d7ac529b24aba892,2024-08-28T16:35:23.650000
|
CVE-2024-42845,0,0,f506b40591f84fe588a1ebf10f79903d4e58b530d7a712a8d7ac529b24aba892,2024-08-28T16:35:23.650000
|
||||||
CVE-2024-42849,0,0,476a8b05abd0e5119b7af3cdc63ecacc25e4b753be03084352759f8b34a540b8,2024-08-19T13:00:23.117000
|
CVE-2024-42849,0,0,476a8b05abd0e5119b7af3cdc63ecacc25e4b753be03084352759f8b34a540b8,2024-08-19T13:00:23.117000
|
||||||
CVE-2024-42850,0,0,a72d6cc9fb65147822ff703ae140dbf9bc418b2813da9b6084ec42fe436f4f06,2024-08-19T16:35:24.160000
|
CVE-2024-42850,0,0,a72d6cc9fb65147822ff703ae140dbf9bc418b2813da9b6084ec42fe436f4f06,2024-08-19T16:35:24.160000
|
||||||
CVE-2024-42851,0,0,6c308263fb08a775e02bfe8a8bf1ad5061e10f5571a88f89a609b0ef630568bc,2024-08-27T19:35:28
|
CVE-2024-42851,0,1,00274099170db6704046005a45a40a4a9a23778f1139c6df90d1c8a79410eb5f,2024-08-28T20:15:07.787000
|
||||||
CVE-2024-42852,0,0,a01c2a98e1188b6b13c1dcf03329d746e5ba476590f73862f604a3ade35f9775,2024-08-23T19:35:15.240000
|
CVE-2024-42852,0,0,a01c2a98e1188b6b13c1dcf03329d746e5ba476590f73862f604a3ade35f9775,2024-08-23T19:35:15.240000
|
||||||
CVE-2024-4286,0,0,4b983e074dfcf6df9bba7e92a07b4865c0022e26c41bba4144154cfeae541d31,2024-05-28T12:39:28.377000
|
CVE-2024-4286,0,0,4b983e074dfcf6df9bba7e92a07b4865c0022e26c41bba4144154cfeae541d31,2024-05-28T12:39:28.377000
|
||||||
CVE-2024-4287,0,0,e4eaa9cc0eedd48e962bf47bbdeb2988e2d50ccd6011525ef3609c758b0c263c,2024-05-20T15:17:54.513000
|
CVE-2024-4287,0,0,e4eaa9cc0eedd48e962bf47bbdeb2988e2d50ccd6011525ef3609c758b0c263c,2024-05-20T15:17:54.513000
|
||||||
@ -258032,10 +258034,10 @@ CVE-2024-4288,0,0,98dba4b61502f5abd6b75fde706ee82a9bae31a5b0be7db458ed8cfdf0d8bf
|
|||||||
CVE-2024-4289,0,0,00867bfd0f1ec036543766f70ad029cfafef69b68de16bba7569db7276222c78,2024-05-21T12:37:59.687000
|
CVE-2024-4289,0,0,00867bfd0f1ec036543766f70ad029cfafef69b68de16bba7569db7276222c78,2024-05-21T12:37:59.687000
|
||||||
CVE-2024-4290,0,0,96468cd9b26f589eaa99a2991d568962f6532fbc65b02b2950965134d65bb1ac,2024-08-01T13:59:30.177000
|
CVE-2024-4290,0,0,96468cd9b26f589eaa99a2991d568962f6532fbc65b02b2950965134d65bb1ac,2024-08-01T13:59:30.177000
|
||||||
CVE-2024-42900,0,0,03cb4ee58025e2ddb00a8eae086634a9edd3cd52073546780083b1fedebf3f3d,2024-08-28T16:35:24.427000
|
CVE-2024-42900,0,0,03cb4ee58025e2ddb00a8eae086634a9edd3cd52073546780083b1fedebf3f3d,2024-08-28T16:35:24.427000
|
||||||
CVE-2024-42905,1,1,63b2e3708e6370f68c8f0eab942c4bf94d6d07b2bc063f6d5b24c75cc4e46eeb,2024-08-28T19:35:20.503000
|
CVE-2024-42905,0,0,63b2e3708e6370f68c8f0eab942c4bf94d6d07b2bc063f6d5b24c75cc4e46eeb,2024-08-28T19:35:20.503000
|
||||||
CVE-2024-42906,0,0,83be373189250265e4f12ae408fac34eb129a889121f0ce4e7f0836727cd3453,2024-08-27T13:02:05.683000
|
CVE-2024-42906,0,0,83be373189250265e4f12ae408fac34eb129a889121f0ce4e7f0836727cd3453,2024-08-27T13:02:05.683000
|
||||||
CVE-2024-4291,0,0,3555454673f17bb302e51e81ea2fe7cd049aabde203c094d5792666ddbcea9c8,2024-07-03T02:07:20.773000
|
CVE-2024-4291,0,0,3555454673f17bb302e51e81ea2fe7cd049aabde203c094d5792666ddbcea9c8,2024-07-03T02:07:20.773000
|
||||||
CVE-2024-42913,0,0,796fb1ba4b67987b44a9370ce058c2b037b19ffa316e1a186c445f2c01301c3c,2024-08-26T19:10:09.607000
|
CVE-2024-42913,0,1,4ee002af12bf9d3762c244fec3fad984905617a81f77c95a7eb3d308c6c9d288,2024-08-28T20:15:07.880000
|
||||||
CVE-2024-42914,0,0,3f5ac8ab7960d4d4afba31e3c38cdf6845691feab9592a20b6c730d697770531,2024-08-26T17:35:10.510000
|
CVE-2024-42914,0,0,3f5ac8ab7960d4d4afba31e3c38cdf6845691feab9592a20b6c730d697770531,2024-08-26T17:35:10.510000
|
||||||
CVE-2024-42915,0,0,f864c31afbca80b902e69688b4024ae2389f775878951406a546e92d288d6fa4,2024-08-23T18:35:05.490000
|
CVE-2024-42915,0,0,f864c31afbca80b902e69688b4024ae2389f775878951406a546e92d288d6fa4,2024-08-23T18:35:05.490000
|
||||||
CVE-2024-42918,0,0,657578840f633e762a27e4a0853fb47eccdc1027e81e0975d029fe8916be4e17,2024-08-27T14:47:12.097000
|
CVE-2024-42918,0,0,657578840f633e762a27e4a0853fb47eccdc1027e81e0975d029fe8916be4e17,2024-08-27T14:47:12.097000
|
||||||
@ -258333,7 +258335,7 @@ CVE-2024-43444,0,0,fbee9de686ac80a9fde5553d13b4aef0864614401bc5081d1c7ab76503d44
|
|||||||
CVE-2024-4345,0,0,991a52fb88968c952c460a76f59f283c0ad80fedc25d9533338fbc3b0d515f60,2024-05-07T13:39:32.710000
|
CVE-2024-4345,0,0,991a52fb88968c952c460a76f59f283c0ad80fedc25d9533338fbc3b0d515f60,2024-05-07T13:39:32.710000
|
||||||
CVE-2024-4346,0,0,9d7617b39f85e35f3b425bc36c01c8cc51c24d84e65ff0d34bf4ea7488f000ec,2024-05-07T13:39:32.710000
|
CVE-2024-4346,0,0,9d7617b39f85e35f3b425bc36c01c8cc51c24d84e65ff0d34bf4ea7488f000ec,2024-05-07T13:39:32.710000
|
||||||
CVE-2024-4347,0,0,f9a9185c34e13435315e8c5679dcdbef88eacdd68a031d012b94daf573ce3f3f,2024-05-24T01:15:30.977000
|
CVE-2024-4347,0,0,f9a9185c34e13435315e8c5679dcdbef88eacdd68a031d012b94daf573ce3f3f,2024-05-24T01:15:30.977000
|
||||||
CVE-2024-43472,0,1,4f801f83921e67b67f46b12b24b80ffa004f18db83d5caf5b1035ebd0cb2bc74,2024-08-28T19:13:21.393000
|
CVE-2024-43472,0,0,4f801f83921e67b67f46b12b24b80ffa004f18db83d5caf5b1035ebd0cb2bc74,2024-08-28T19:13:21.393000
|
||||||
CVE-2024-43477,0,0,7032b6e49493834ede52e5f56f0a124d3ffe61f7e9da696a9c0c79526fdcc194,2024-08-23T16:18:28.547000
|
CVE-2024-43477,0,0,7032b6e49493834ede52e5f56f0a124d3ffe61f7e9da696a9c0c79526fdcc194,2024-08-23T16:18:28.547000
|
||||||
CVE-2024-4348,0,0,6e86bc5560fea8dde0d2ebca4133582cb5d1167a5aec18ad6c6b9b23741c69df,2024-06-04T19:20:36.223000
|
CVE-2024-4348,0,0,6e86bc5560fea8dde0d2ebca4133582cb5d1167a5aec18ad6c6b9b23741c69df,2024-06-04T19:20:36.223000
|
||||||
CVE-2024-4349,0,0,a8b03025f36b8713c52951e7ebcf312d165d904bb8cd188665520ff04ec5e58b,2024-06-04T19:20:36.340000
|
CVE-2024-4349,0,0,a8b03025f36b8713c52951e7ebcf312d165d904bb8cd188665520ff04ec5e58b,2024-06-04T19:20:36.340000
|
||||||
@ -258379,6 +258381,7 @@ CVE-2024-43791,0,0,343f2e18bef5efeacf2cd8005024025a5d76578a60f2c9c2f207bc81f2ca8
|
|||||||
CVE-2024-43794,0,0,896bb2e8ce2811b7436ee4acf4b9708cca2e72737878d04fdbf593ce2a59df9c,2024-08-23T18:46:31.730000
|
CVE-2024-43794,0,0,896bb2e8ce2811b7436ee4acf4b9708cca2e72737878d04fdbf593ce2a59df9c,2024-08-23T18:46:31.730000
|
||||||
CVE-2024-43798,0,0,0f4c51b4b2459096a21f79a4c43df1119a11b4e9a3f2bc6fda3ce5410f7de574,2024-08-27T13:01:37.913000
|
CVE-2024-43798,0,0,0f4c51b4b2459096a21f79a4c43df1119a11b4e9a3f2bc6fda3ce5410f7de574,2024-08-27T13:01:37.913000
|
||||||
CVE-2024-43802,0,0,e6e6b0823c543afdd24537863512362b0ca92682a64b51ee319640612d5e52b9,2024-08-27T13:02:05.683000
|
CVE-2024-43802,0,0,e6e6b0823c543afdd24537863512362b0ca92682a64b51ee319640612d5e52b9,2024-08-27T13:02:05.683000
|
||||||
|
CVE-2024-43805,1,1,b99c33cd6517c00926284743df2ece4d29840e6987c1cb900e897f113c9998cd,2024-08-28T20:15:07.963000
|
||||||
CVE-2024-43806,0,0,541f1dd38cc99ea47f0a1d3247e689afdaff86c352817f08eb0b94af02655385,2024-08-27T13:02:05.683000
|
CVE-2024-43806,0,0,541f1dd38cc99ea47f0a1d3247e689afdaff86c352817f08eb0b94af02655385,2024-08-27T13:02:05.683000
|
||||||
CVE-2024-43807,0,0,3f91dd87019f53cf891d3a83100dd5c601626acd9f1336f0bde904afb8c4caa9,2024-08-19T21:09:42.313000
|
CVE-2024-43807,0,0,3f91dd87019f53cf891d3a83100dd5c601626acd9f1336f0bde904afb8c4caa9,2024-08-19T21:09:42.313000
|
||||||
CVE-2024-43808,0,0,5904dacb826507090b9d583058f58aa9b73c36079d8a4861440bfd52d34f3890,2024-08-19T21:10:14.093000
|
CVE-2024-43808,0,0,5904dacb826507090b9d583058f58aa9b73c36079d8a4861440bfd52d34f3890,2024-08-19T21:10:14.093000
|
||||||
@ -258593,7 +258596,8 @@ CVE-2024-4471,0,0,44899070168831f8c9dbf9959b26f4abead5dc804569bf5f22dbe3807408cb
|
|||||||
CVE-2024-4473,0,0,8a0cf4a98efdbfb5770862e11c920028f2e3a9a43c44eb843685fb5ef0c3f72b,2024-05-14T19:17:55.627000
|
CVE-2024-4473,0,0,8a0cf4a98efdbfb5770862e11c920028f2e3a9a43c44eb843685fb5ef0c3f72b,2024-05-14T19:17:55.627000
|
||||||
CVE-2024-4474,0,0,f8c1a36ad14efe96f98dae06e1720ed737c744e50cd9a9e3991eaed9f98aef96,2024-07-17T02:48:04.213000
|
CVE-2024-4474,0,0,f8c1a36ad14efe96f98dae06e1720ed737c744e50cd9a9e3991eaed9f98aef96,2024-07-17T02:48:04.213000
|
||||||
CVE-2024-4475,0,0,b199ea7732b827fa53d53ebb43badb03a8dff248a786cc8d7d2459800e62c08e,2024-07-17T02:47:07.620000
|
CVE-2024-4475,0,0,b199ea7732b827fa53d53ebb43badb03a8dff248a786cc8d7d2459800e62c08e,2024-07-17T02:47:07.620000
|
||||||
CVE-2024-44761,1,1,361838cb7a1b116b9f497344dd8aff3b164952f24f968d85f6ede5ec3de92766,2024-08-28T19:15:08.933000
|
CVE-2024-44760,1,1,9cf81a9e0ab04798a87becebbd5fde247ae48b2da57114bbb10303113ed6f0ac,2024-08-28T21:35:14.657000
|
||||||
|
CVE-2024-44761,0,1,7d80c180501c990311d966122b1346cb700cb148eb429229d3870413a61d343c,2024-08-28T20:35:14.040000
|
||||||
CVE-2024-4477,0,0,b275cf91a81ef0e33ced77c1c5ba5e17245e6b33fc991fd87901e463b723d83e,2024-07-12T16:12:03.717000
|
CVE-2024-4477,0,0,b275cf91a81ef0e33ced77c1c5ba5e17245e6b33fc991fd87901e463b723d83e,2024-07-12T16:12:03.717000
|
||||||
CVE-2024-4478,0,0,df092e6d564da1ba274f237ab38d20f4d3626835a8920b1b768f819806d6fce1,2024-05-16T13:03:05.353000
|
CVE-2024-4478,0,0,df092e6d564da1ba274f237ab38d20f4d3626835a8920b1b768f819806d6fce1,2024-05-16T13:03:05.353000
|
||||||
CVE-2024-4479,0,0,19a5d52fe32f562c79c648f88a021706b773334e3193aa8af739d9d0094fe357,2024-07-26T13:35:32.397000
|
CVE-2024-4479,0,0,19a5d52fe32f562c79c648f88a021706b773334e3193aa8af739d9d0094fe357,2024-07-26T13:35:32.397000
|
||||||
@ -258614,9 +258618,9 @@ CVE-2024-4488,0,0,1067ee59b8b50187d3b6e6dcedd09634fc158d8d3cf8abb63a1cced20ae50a
|
|||||||
CVE-2024-4489,0,0,982cbf89b6458fc8989b334c07bea5cd0f34b9af1a316c2d08ef53a4dd4e8b8f,2024-06-11T18:07:03.573000
|
CVE-2024-4489,0,0,982cbf89b6458fc8989b334c07bea5cd0f34b9af1a316c2d08ef53a4dd4e8b8f,2024-06-11T18:07:03.573000
|
||||||
CVE-2024-4490,0,0,46d58037d58f18ff9df6b6b94f91d6beb02adec3983ce96102d15aba21f19fde,2024-05-14T16:11:39.510000
|
CVE-2024-4490,0,0,46d58037d58f18ff9df6b6b94f91d6beb02adec3983ce96102d15aba21f19fde,2024-05-14T16:11:39.510000
|
||||||
CVE-2024-4491,0,0,fec0fa99feb905362d1059ae18d849f25d02b15efc10c179ce136112d1e08871,2024-06-04T19:20:38.950000
|
CVE-2024-4491,0,0,fec0fa99feb905362d1059ae18d849f25d02b15efc10c179ce136112d1e08871,2024-06-04T19:20:38.950000
|
||||||
CVE-2024-44913,1,1,3d0a718f021ba05c36d3cde74252c706d497214671f8cff4d115bea728d16df4,2024-08-28T19:35:21.377000
|
CVE-2024-44913,0,0,3d0a718f021ba05c36d3cde74252c706d497214671f8cff4d115bea728d16df4,2024-08-28T19:35:21.377000
|
||||||
CVE-2024-44914,1,1,f9f8ba7025d22966f03b97ab83fc8a2749a603d218d7389ac39cfd20db2d5481,2024-08-28T19:35:22.160000
|
CVE-2024-44914,0,0,f9f8ba7025d22966f03b97ab83fc8a2749a603d218d7389ac39cfd20db2d5481,2024-08-28T19:35:22.160000
|
||||||
CVE-2024-44915,1,1,9030bbe2236b67114df101ba08f9c9855f4e55916353587c850f6e3720a8d862,2024-08-28T19:35:22.957000
|
CVE-2024-44915,0,0,9030bbe2236b67114df101ba08f9c9855f4e55916353587c850f6e3720a8d862,2024-08-28T19:35:22.957000
|
||||||
CVE-2024-4492,0,0,0237cea7742a82f916a95c7121fd101b19e30a52d4f326fc68f5db785a621a29,2024-06-04T19:20:39.047000
|
CVE-2024-4492,0,0,0237cea7742a82f916a95c7121fd101b19e30a52d4f326fc68f5db785a621a29,2024-06-04T19:20:39.047000
|
||||||
CVE-2024-4493,0,0,890374eb1d5a1051bad1d8c630ec03ea130ffcf654be5d03c4d1c85a0ebc3c87,2024-06-04T19:20:39.143000
|
CVE-2024-4493,0,0,890374eb1d5a1051bad1d8c630ec03ea130ffcf654be5d03c4d1c85a0ebc3c87,2024-06-04T19:20:39.143000
|
||||||
CVE-2024-44931,0,0,a811432be893129eec1153f2a1f5cf79e00f6cda4409f2898f7f29e87e49d41f,2024-08-26T12:47:20.187000
|
CVE-2024-44931,0,0,a811432be893129eec1153f2a1f5cf79e00f6cda4409f2898f7f29e87e49d41f,2024-08-26T12:47:20.187000
|
||||||
@ -258646,8 +258650,15 @@ CVE-2024-45036,0,0,b93ba1b942c2a90c7150ffd72c683d09bcb868f6dc285088962d5acc53d2e
|
|||||||
CVE-2024-45037,0,0,0a75dee24a9a0746d4b594073f73eebe38a0d6b0ee92331f507c53bf54c314fe,2024-08-28T12:57:39.090000
|
CVE-2024-45037,0,0,0a75dee24a9a0746d4b594073f73eebe38a0d6b0ee92331f507c53bf54c314fe,2024-08-28T12:57:39.090000
|
||||||
CVE-2024-45038,0,0,9bc86932f350806c3a4bfe09c65e8bf9ee10a426832d16050cb88cd3f58d1bd8,2024-08-28T12:57:39.090000
|
CVE-2024-45038,0,0,9bc86932f350806c3a4bfe09c65e8bf9ee10a426832d16050cb88cd3f58d1bd8,2024-08-28T12:57:39.090000
|
||||||
CVE-2024-4504,0,0,db7504bed7bbf326ed6569d421c20101dbf56fa9ab20eccbe7468f7c026f345b,2024-06-04T19:20:39.947000
|
CVE-2024-4504,0,0,db7504bed7bbf326ed6569d421c20101dbf56fa9ab20eccbe7468f7c026f345b,2024-06-04T19:20:39.947000
|
||||||
|
CVE-2024-45043,1,1,64e1d74029a8220ee97cc913320ac0ff74a6720da3a17522c390ec0155ccaf98,2024-08-28T20:15:08.347000
|
||||||
|
CVE-2024-45046,1,1,8cdac0b20865765113a8b4b0b2d2ef87a79d79d8e2fc42a7271e4d63391523e6,2024-08-28T21:15:06.603000
|
||||||
|
CVE-2024-45048,1,1,f69fdb24175b6f7ace06b9eb02d37b28bd8091a69e42131265e80e387c282be3,2024-08-28T21:15:06.817000
|
||||||
CVE-2024-45049,0,0,2db7654aac013903b19c74b15111e80acc65bf9e641d52dffa75f446b2d1ef2f,2024-08-28T12:57:39.090000
|
CVE-2024-45049,0,0,2db7654aac013903b19c74b15111e80acc65bf9e641d52dffa75f446b2d1ef2f,2024-08-28T12:57:39.090000
|
||||||
CVE-2024-4505,0,0,4ef7357f00ff85be3b87c4353ae099f1aed84eaee3f1c1bda33ed5ec6e115293,2024-06-04T19:20:40.050000
|
CVE-2024-4505,0,0,4ef7357f00ff85be3b87c4353ae099f1aed84eaee3f1c1bda33ed5ec6e115293,2024-06-04T19:20:40.050000
|
||||||
|
CVE-2024-45054,1,1,a13624c329f0bdd0fd7658e8735d8dc858ccaeb0147d1b3630226002f3177470,2024-08-28T20:15:08.547000
|
||||||
|
CVE-2024-45057,1,1,dae225468c5e970563487e367d430f56eab47b0de224e37bbd34b62154462c20,2024-08-28T21:15:07.027000
|
||||||
|
CVE-2024-45058,1,1,1d7b030bfdf11ee9e7b86fb4c1f5d13d8fdd33b4e5da1c1474457fed7bc73e59,2024-08-28T21:15:07.283000
|
||||||
|
CVE-2024-45059,1,1,1b1554031fc92d503bcd73c79a9939703fac7a68247e1643f55a22d235390e8e,2024-08-28T21:15:07.473000
|
||||||
CVE-2024-4506,0,0,ddf6bfe33c9fb68b792eae19c37cbcf6030ec7e8a9a0c1f6ead94d2f62170a3f,2024-06-04T19:20:40.150000
|
CVE-2024-4506,0,0,ddf6bfe33c9fb68b792eae19c37cbcf6030ec7e8a9a0c1f6ead94d2f62170a3f,2024-06-04T19:20:40.150000
|
||||||
CVE-2024-4507,0,0,feffcf27ced8e6be5fca9d21b321343c494624929485135b513ee1c93a346051,2024-06-04T19:20:40.250000
|
CVE-2024-4507,0,0,feffcf27ced8e6be5fca9d21b321343c494624929485135b513ee1c93a346051,2024-06-04T19:20:40.250000
|
||||||
CVE-2024-4508,0,0,26388c420646a8ddc4ee2de628a691e0fa51808e2f848ae0f9b7aad58ccb1298,2024-05-17T02:40:26.220000
|
CVE-2024-4508,0,0,26388c420646a8ddc4ee2de628a691e0fa51808e2f848ae0f9b7aad58ccb1298,2024-05-17T02:40:26.220000
|
||||||
@ -258672,9 +258683,9 @@ CVE-2024-45188,0,0,b715e0fd98dc9de103c52fc47a055822268226fc14af5f0a01f3a3eab3db9
|
|||||||
CVE-2024-45189,0,0,a1a91d374d9461d5778df63a2cf5d241a6c11d01b78d41c23bf70fd5616239fd,2024-08-26T12:47:20.187000
|
CVE-2024-45189,0,0,a1a91d374d9461d5778df63a2cf5d241a6c11d01b78d41c23bf70fd5616239fd,2024-08-26T12:47:20.187000
|
||||||
CVE-2024-4519,0,0,5f7c1c0aa362af4fc3ba7e1d12e176f4028e88f0167af6f63c30c7ec7da86837,2024-06-04T19:20:41.127000
|
CVE-2024-4519,0,0,5f7c1c0aa362af4fc3ba7e1d12e176f4028e88f0167af6f63c30c7ec7da86837,2024-06-04T19:20:41.127000
|
||||||
CVE-2024-45190,0,0,d66cd4c54a74e68d49ead3a1a738b5a5af6006ce6c10ee38db19e97b19943350,2024-08-26T12:47:20.187000
|
CVE-2024-45190,0,0,d66cd4c54a74e68d49ead3a1a738b5a5af6006ce6c10ee38db19e97b19943350,2024-08-26T12:47:20.187000
|
||||||
CVE-2024-45191,0,1,24320cb2d6c99102884a32a46b7a31b3437a78a394995949745365d8548a79f9,2024-08-28T19:15:09.110000
|
CVE-2024-45191,0,0,24320cb2d6c99102884a32a46b7a31b3437a78a394995949745365d8548a79f9,2024-08-28T19:15:09.110000
|
||||||
CVE-2024-45192,0,1,4666f187009b1a4ab720c7a921aa9d4f66b4b44b91cc16546d5c51cd8fcccab7,2024-08-28T19:15:09.210000
|
CVE-2024-45192,0,0,4666f187009b1a4ab720c7a921aa9d4f66b4b44b91cc16546d5c51cd8fcccab7,2024-08-28T19:15:09.210000
|
||||||
CVE-2024-45193,0,1,450979f4ae6c2f3dd1e7534dcc90d4edb6b061770952d9d6772a5ec5592929a7,2024-08-28T19:15:09.297000
|
CVE-2024-45193,0,0,450979f4ae6c2f3dd1e7534dcc90d4edb6b061770952d9d6772a5ec5592929a7,2024-08-28T19:15:09.297000
|
||||||
CVE-2024-4520,0,0,b2949348c863aeabf77cf8262dadc8a1301ac645ed88723ebde503df8cb28e51,2024-06-11T17:02:16.967000
|
CVE-2024-4520,0,0,b2949348c863aeabf77cf8262dadc8a1301ac645ed88723ebde503df8cb28e51,2024-06-11T17:02:16.967000
|
||||||
CVE-2024-45201,0,0,83db05d7484ca5c2638e18e64e3b5c06d28a9caaae332ad6d01f844ea902b04a,2024-08-23T16:18:28.547000
|
CVE-2024-45201,0,0,83db05d7484ca5c2638e18e64e3b5c06d28a9caaae332ad6d01f844ea902b04a,2024-08-23T16:18:28.547000
|
||||||
CVE-2024-4521,0,0,a1d240438f25322e21494c2ddd2f5ee26b23410f012534bc2c27a0a49b09a860,2024-06-04T19:20:41.223000
|
CVE-2024-4521,0,0,a1d240438f25322e21494c2ddd2f5ee26b23410f012534bc2c27a0a49b09a860,2024-06-04T19:20:41.223000
|
||||||
@ -260246,7 +260257,7 @@ CVE-2024-6355,0,0,7f4c7fb5a41a7b4cf241f6b370777bf2a8cf0ede73cf75d47093e841c71a69
|
|||||||
CVE-2024-6357,0,0,d17a8b9a4a9bc17bd90a79ef1b2a022c26416b8ede91adaf116bd0fc1d0de886,2024-08-19T17:23:16.973000
|
CVE-2024-6357,0,0,d17a8b9a4a9bc17bd90a79ef1b2a022c26416b8ede91adaf116bd0fc1d0de886,2024-08-19T17:23:16.973000
|
||||||
CVE-2024-6358,0,0,3e184968ad38f7e6dfc49915eadebc5cb02badfeeeea523a574397eb20c849cc,2024-08-19T17:31:29.647000
|
CVE-2024-6358,0,0,3e184968ad38f7e6dfc49915eadebc5cb02badfeeeea523a574397eb20c849cc,2024-08-19T17:31:29.647000
|
||||||
CVE-2024-6359,0,0,093dea73109d9b2f23d9e6885d4ebbb2b84fce28b7a075a363fc879a286259cb,2024-08-19T17:30:31.880000
|
CVE-2024-6359,0,0,093dea73109d9b2f23d9e6885d4ebbb2b84fce28b7a075a363fc879a286259cb,2024-08-19T17:30:31.880000
|
||||||
CVE-2024-6361,0,1,a3e4bbdd0f4905fca66747fb0442673a0924c1ae81b12b0ea7c60a6803fd61d3,2024-08-28T18:17:35.497000
|
CVE-2024-6361,0,0,a3e4bbdd0f4905fca66747fb0442673a0924c1ae81b12b0ea7c60a6803fd61d3,2024-08-28T18:17:35.497000
|
||||||
CVE-2024-6362,0,0,aeb770c7b39ef36db7bd4a49056b449aeba256942be50c6b83f329d15f15257d,2024-08-01T14:00:20.147000
|
CVE-2024-6362,0,0,aeb770c7b39ef36db7bd4a49056b449aeba256942be50c6b83f329d15f15257d,2024-08-01T14:00:20.147000
|
||||||
CVE-2024-6363,0,0,455979652b8642d7eb5b747949e6f02be3f028b83d7cfc357521a34bb9d7438e,2024-08-01T17:00:53.130000
|
CVE-2024-6363,0,0,455979652b8642d7eb5b747949e6f02be3f028b83d7cfc357521a34bb9d7438e,2024-08-01T17:00:53.130000
|
||||||
CVE-2024-6365,0,0,4363950e80c53434fcfd5afd5a384a9df5c49d102c20d1b50eb31e33005d9f26,2024-07-09T18:19:14.047000
|
CVE-2024-6365,0,0,4363950e80c53434fcfd5afd5a384a9df5c49d102c20d1b50eb31e33005d9f26,2024-07-09T18:19:14.047000
|
||||||
@ -260700,7 +260711,7 @@ CVE-2024-7054,0,0,c2f192d88d8b2a817d17540b8fda16fcd38e463cdb3b6d5e52e3cf243830ad
|
|||||||
CVE-2024-7055,0,0,b0e8b0793ccc61abbc70699af6d91421241877ab1f640f57d490cff121ecbcd0,2024-08-06T16:30:24.547000
|
CVE-2024-7055,0,0,b0e8b0793ccc61abbc70699af6d91421241877ab1f640f57d490cff121ecbcd0,2024-08-06T16:30:24.547000
|
||||||
CVE-2024-7057,0,0,e86292da776d8c2eee12db885a241ac453174252cdfea8e6058f6d373bd4dc19,2024-07-25T12:36:39.947000
|
CVE-2024-7057,0,0,e86292da776d8c2eee12db885a241ac453174252cdfea8e6058f6d373bd4dc19,2024-07-25T12:36:39.947000
|
||||||
CVE-2024-7060,0,0,2e0c92013c1ddde1bca0ad9e62aa50d23e69e1a598796a2170f54fccf61e7f4b,2024-07-25T12:36:39.947000
|
CVE-2024-7060,0,0,2e0c92013c1ddde1bca0ad9e62aa50d23e69e1a598796a2170f54fccf61e7f4b,2024-07-25T12:36:39.947000
|
||||||
CVE-2024-7061,0,1,c3926c914ac99fe62f5bebfc1891b2d96043768b2289b704236ec0dafd824355,2024-08-28T18:25:38.217000
|
CVE-2024-7061,0,0,c3926c914ac99fe62f5bebfc1891b2d96043768b2289b704236ec0dafd824355,2024-08-28T18:25:38.217000
|
||||||
CVE-2024-7062,0,0,95520405d89c9e85e2e20b19a5c4882dbc79fcc2537e689d2c94915f74a470cf,2024-08-27T14:00:21.543000
|
CVE-2024-7062,0,0,95520405d89c9e85e2e20b19a5c4882dbc79fcc2537e689d2c94915f74a470cf,2024-08-27T14:00:21.543000
|
||||||
CVE-2024-7063,0,0,0d05b5614f7552a1191547d1c63e6af55c9bef6fb9e919ea51ef069e5df2841d,2024-08-15T13:01:10.150000
|
CVE-2024-7063,0,0,0d05b5614f7552a1191547d1c63e6af55c9bef6fb9e919ea51ef069e5df2841d,2024-08-15T13:01:10.150000
|
||||||
CVE-2024-7064,0,0,5f6dedf11b173ba1a8a6a366c520a45122cad062892b1564ebd329daa4d14d92,2024-08-15T13:01:10.150000
|
CVE-2024-7064,0,0,5f6dedf11b173ba1a8a6a366c520a45122cad062892b1564ebd329daa4d14d92,2024-08-15T13:01:10.150000
|
||||||
@ -261053,8 +261064,8 @@ CVE-2024-7569,0,0,07c556a0d4f236c73af8fac785c7f2963a3da01e4fc90b977a8fbdbb989590
|
|||||||
CVE-2024-7570,0,0,5fffab459f0b197c9cc8f01b0f615f787054152c65ebadc4d4a680afc4fd51fa,2024-08-14T02:07:05.410000
|
CVE-2024-7570,0,0,5fffab459f0b197c9cc8f01b0f615f787054152c65ebadc4d4a680afc4fd51fa,2024-08-14T02:07:05.410000
|
||||||
CVE-2024-7573,0,0,7b157c1bc586485011758f6317cb8548eaad83544501bf2e76c604287d08292a,2024-08-28T12:57:27.610000
|
CVE-2024-7573,0,0,7b157c1bc586485011758f6317cb8548eaad83544501bf2e76c604287d08292a,2024-08-28T12:57:27.610000
|
||||||
CVE-2024-7574,0,0,20d9970481b83bc1831e248b5fd88e17f245f697fcf3310f9ca87d287eec943e,2024-08-12T13:41:36.517000
|
CVE-2024-7574,0,0,20d9970481b83bc1831e248b5fd88e17f245f697fcf3310f9ca87d287eec943e,2024-08-12T13:41:36.517000
|
||||||
CVE-2024-7578,0,1,fafe75f6c08f3db49e42d74dbc7c12d20ded3ec028530cd367a8cd3d9bc7695e,2024-08-28T18:27:18.510000
|
CVE-2024-7578,0,0,fafe75f6c08f3db49e42d74dbc7c12d20ded3ec028530cd367a8cd3d9bc7695e,2024-08-28T18:27:18.510000
|
||||||
CVE-2024-7579,0,1,a0ae8fffc497f7c325419faf1d1612b2d58409c260f2e266adab0d394e09c9de,2024-08-28T18:26:46.117000
|
CVE-2024-7579,0,0,a0ae8fffc497f7c325419faf1d1612b2d58409c260f2e266adab0d394e09c9de,2024-08-28T18:26:46.117000
|
||||||
CVE-2024-7580,0,0,42ecba325b4da39abdd4ffa702c3c1ac9ada1ac7a2f4a8a88b82d9e7776d5322,2024-08-07T20:47:00.277000
|
CVE-2024-7580,0,0,42ecba325b4da39abdd4ffa702c3c1ac9ada1ac7a2f4a8a88b82d9e7776d5322,2024-08-07T20:47:00.277000
|
||||||
CVE-2024-7581,0,0,f07aa40688c73c9e33d119ea47382f8f327c1f1763032f4818fad72345e632d2,2024-08-07T19:59:00.853000
|
CVE-2024-7581,0,0,f07aa40688c73c9e33d119ea47382f8f327c1f1763032f4818fad72345e632d2,2024-08-07T19:59:00.853000
|
||||||
CVE-2024-7582,0,0,b5d30de3379d4f1314d865a318bcbb3d58683288c246ed462b10743522033514,2024-08-08T20:55:07.530000
|
CVE-2024-7582,0,0,b5d30de3379d4f1314d865a318bcbb3d58683288c246ed462b10743522033514,2024-08-08T20:55:07.530000
|
||||||
@ -261206,12 +261217,12 @@ CVE-2024-7845,0,0,a27541ca47acd484f46c609f3698b7013802437eb8a6a96b9ef6a93b64b025
|
|||||||
CVE-2024-7848,0,0,0ee368073eef37c35843cc78ada12ebce75ec11f5e51f0fe556018a4bb2deefe,2024-08-22T12:48:02.790000
|
CVE-2024-7848,0,0,0ee368073eef37c35843cc78ada12ebce75ec11f5e51f0fe556018a4bb2deefe,2024-08-22T12:48:02.790000
|
||||||
CVE-2024-7849,0,0,e63d24df06d5f4555672e0892a25c4e5c95ca031f7861c25398c177add1bd8f5,2024-08-19T13:00:23.117000
|
CVE-2024-7849,0,0,e63d24df06d5f4555672e0892a25c4e5c95ca031f7861c25398c177add1bd8f5,2024-08-19T13:00:23.117000
|
||||||
CVE-2024-7850,0,0,eac62d06d40978b154610fb0b8829f684d203615f4f5ebfcbc586877034ad096,2024-08-20T15:44:20.567000
|
CVE-2024-7850,0,0,eac62d06d40978b154610fb0b8829f684d203615f4f5ebfcbc586877034ad096,2024-08-20T15:44:20.567000
|
||||||
CVE-2024-7851,0,0,a3f499a96b03d0001447f268138d29dda5356c0889ebe13c4e09da447417c59f,2024-08-19T13:00:23.117000
|
CVE-2024-7851,0,1,a6804e632dae2a5227b1aeec5affef71a5e6512f1f3daab8681dcd169bd0ed5e,2024-08-28T21:10:07.750000
|
||||||
CVE-2024-7852,0,0,d81b5371e4f0add1d395c3b1194a942c6ec099c1cdc2d46560d4b57bf5d930b7,2024-08-19T13:00:23.117000
|
CVE-2024-7852,0,1,90686965379176e60723e17deb3351871fe4c0caf2dc6a3e7de2597d0bb591c0,2024-08-28T21:07:30.690000
|
||||||
CVE-2024-7853,0,0,602b79ace26812f03f94bfc9d8a0781cb4744715aed03debdd7aa8ad39738b45,2024-08-19T13:00:23.117000
|
CVE-2024-7853,0,1,14a48e1ad8f1b546c0c87aa2d80a70dd8973b153912e39385d618671fd730a73,2024-08-28T21:03:35.003000
|
||||||
CVE-2024-7854,0,0,c7d42abb2b322c04201a8af34648ccfdb0ede7da24776e4c0b3ca238a25bf3a0,2024-08-21T12:30:33.697000
|
CVE-2024-7854,0,0,c7d42abb2b322c04201a8af34648ccfdb0ede7da24776e4c0b3ca238a25bf3a0,2024-08-21T12:30:33.697000
|
||||||
CVE-2024-7866,0,0,4c0cb0c858c0ff2de3d3bc9c6187348080bb51d5934bb16167513e626d441be5,2024-08-20T19:23:02.780000
|
CVE-2024-7866,0,0,4c0cb0c858c0ff2de3d3bc9c6187348080bb51d5934bb16167513e626d441be5,2024-08-20T19:23:02.780000
|
||||||
CVE-2024-7867,0,0,82b57dfccdd939abae2ae322a7ca7d62e21983bdf28e6531a7b846c252314b6b,2024-08-19T13:00:23.117000
|
CVE-2024-7867,0,1,cc4e8e2cbae6cc9c2393332b56b3dc1a7160836d4b3b7919e8d1234e73599a3b,2024-08-28T21:59:33.973000
|
||||||
CVE-2024-7868,0,0,426aac72107d4f020c4b4c2ec1e49b6873953f44556989351b1605a1e98035d8,2024-08-19T13:00:23.117000
|
CVE-2024-7868,0,0,426aac72107d4f020c4b4c2ec1e49b6873953f44556989351b1605a1e98035d8,2024-08-19T13:00:23.117000
|
||||||
CVE-2024-7885,0,0,53926a53ab4f71fc31c04b79b6d61e8c39bb180f373c05a721578db45aa87a6a,2024-08-23T17:05:24.343000
|
CVE-2024-7885,0,0,53926a53ab4f71fc31c04b79b6d61e8c39bb180f373c05a721578db45aa87a6a,2024-08-23T17:05:24.343000
|
||||||
CVE-2024-7886,0,0,b8c1f856b8479c6982faa8a2fc4a6d8b2480e045b8b096d9bd3b8640a06eb6f3,2024-08-19T13:00:23.117000
|
CVE-2024-7886,0,0,b8c1f856b8479c6982faa8a2fc4a6d8b2480e045b8b096d9bd3b8640a06eb6f3,2024-08-19T13:00:23.117000
|
||||||
|
Can't render this file because it is too large.
|
Loading…
x
Reference in New Issue
Block a user