mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-06-19 17:31:42 +00:00
Auto-Update: 2024-09-06T23:55:17.220319+00:00
This commit is contained in:
parent
7fe4afc3bb
commit
fd5e1c265f
@ -2,17 +2,41 @@
|
||||
"id": "CVE-2023-26315",
|
||||
"sourceIdentifier": "security@xiaomi.com",
|
||||
"published": "2024-08-26T12:15:05.387",
|
||||
"lastModified": "2024-08-26T12:47:20.187",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-09-06T22:25:54.637",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "The Xiaomi router AX9000 has a post-authentication command injection vulnerability. This vulnerability is caused by the lack of input filtering, allowing an attacker to exploit it to obtain root access to the device."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "El enrutador Xiaomi AX9000 tiene una vulnerabilidad de inyecci\u00f3n de comando posterior a la autenticaci\u00f3n. Esta vulnerabilidad se debe a la falta de filtrado de entrada, lo que permite a un atacante aprovecharla para obtener acceso ra\u00edz al dispositivo."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 8.8,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 5.9
|
||||
},
|
||||
{
|
||||
"source": "security@xiaomi.com",
|
||||
"type": "Secondary",
|
||||
@ -35,10 +59,56 @@
|
||||
}
|
||||
]
|
||||
},
|
||||
"references": [
|
||||
"weaknesses": [
|
||||
{
|
||||
"url": "https://trust.mi.com/zh-CN/misrc/bulletins/advisory?cveId=546",
|
||||
"source": "security@xiaomi.com"
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-77"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:mi:ax9000_firmware:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "1.0.0",
|
||||
"versionEndExcluding": "1.0.174",
|
||||
"matchCriteriaId": "5A0CFBA2-2F5A-48AD-BD76-3AE1B9BE45DB"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mi:ax9000:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "A5F71A5A-A7D4-4218-B371-25BE040BB320"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://trust.mi.com/zh-CN/misrc/bulletins/advisory?cveId=546",
|
||||
"source": "security@xiaomi.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2023-52535",
|
||||
"sourceIdentifier": "security@unisoc.com",
|
||||
"published": "2024-04-08T03:15:08.923",
|
||||
"lastModified": "2024-04-08T18:48:40.217",
|
||||
"lastModified": "2024-09-06T22:35:00.460",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -15,7 +15,42 @@
|
||||
"value": "En el controlador vsp, es posible que falte una entrada incorrecta de verificaci\u00f3n. Esto podr\u00eda provocar una denegaci\u00f3n de servicio local sin necesidad de privilegios de ejecuci\u00f3n adicionales."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "LOW",
|
||||
"baseScore": 4.4,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 2.5
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-20"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.unisoc.com/en_us/secy/announcementDetail/1777148475750809602",
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-30802",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-05-14T15:23:53.007",
|
||||
"lastModified": "2024-05-14T16:13:02.773",
|
||||
"lastModified": "2024-09-06T23:35:00.597",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -15,7 +15,42 @@
|
||||
"value": "Un problema en Vehicle Management System 7.31.0.3_20230412 permite a un atacante escalar privilegios a trav\u00e9s del componente login.html."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-1393"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/WarmBrew/web_vul/blob/main/TTX.md",
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-30939",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-04-25T19:15:49.970",
|
||||
"lastModified": "2024-04-26T12:58:17.720",
|
||||
"lastModified": "2024-09-06T23:35:01.567",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -15,7 +15,42 @@
|
||||
"value": "Un problema descubierto en Yealink VP59 Teams Editions con la versi\u00f3n de firmware 91.15.0.118 permite que un atacante f\u00edsicamente cercano obtenga el control de una cuenta a trav\u00e9s de una falla en el procedimiento de restablecimiento de f\u00e1brica."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "PHYSICAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 6.8,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 0.9,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-287"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://medium.com/%40deepsahu1/yealink-ip-phone-account-take-over-9bf9e7b847c0?source=friends_link&sk=b0d664dd5b3aad5b758e4934aca997ad",
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-31680",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-04-17T00:15:07.293",
|
||||
"lastModified": "2024-04-17T12:48:07.510",
|
||||
"lastModified": "2024-09-06T22:35:01.557",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -15,7 +15,42 @@
|
||||
"value": "Vulnerabilidad de carga de archivos en Shibang Communications Co., Ltd. IP network intercom broadcasting system v.1.0 permite a un atacante local ejecutar c\u00f3digo arbitrario a trav\u00e9s del componente my_parser.php."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 8.8,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-434"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/heidashuai5588/cve/blob/main/upload.md",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-32911",
|
||||
"sourceIdentifier": "dsap-vuln-management@google.com",
|
||||
"published": "2024-06-13T21:15:55.173",
|
||||
"lastModified": "2024-07-16T14:57:13.803",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2024-09-06T23:35:02.557",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -36,6 +36,26 @@
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "HIGH",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 7.5,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 1.6,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -49,6 +69,16 @@
|
||||
"value": "CWE-327"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-347"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-33903",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-04-29T01:15:09.600",
|
||||
"lastModified": "2024-04-29T12:42:03.667",
|
||||
"lastModified": "2024-09-06T23:35:03.347",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -15,7 +15,42 @@
|
||||
"value": "En CARLA hasta 0.9.15.2, el sensor de colisi\u00f3n maneja mal algunas situaciones que involucran a peatones o bicicletas, en parte porque la funci\u00f3n del sensor de colisi\u00f3n no est\u00e1 expuesta a la librer\u00eda Blueprint."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "HIGH",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 5.9,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.2,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-693"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/carla-simulator/carla/blob/60bd026b4822b4edb8a68cc17b9119866f303853/Docs/core_concepts.md",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-35133",
|
||||
"sourceIdentifier": "psirt@us.ibm.com",
|
||||
"published": "2024-08-29T17:15:07.250",
|
||||
"lastModified": "2024-08-30T13:00:05.390",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-09-06T22:55:33.543",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -18,8 +18,28 @@
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "psirt@us.ibm.com",
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 8.2,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 4.7
|
||||
},
|
||||
{
|
||||
"source": "psirt@us.ibm.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:N/I:H/A:N",
|
||||
@ -51,14 +71,46 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
"configurations": [
|
||||
{
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/291026",
|
||||
"source": "psirt@us.ibm.com"
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:ibm:security_verify_access:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "10.0.0",
|
||||
"versionEndIncluding": "10.0.8",
|
||||
"matchCriteriaId": "64518F40-55CF-4DC8-A15E-AAACCC38BAD1"
|
||||
},
|
||||
{
|
||||
"url": "https://www.ibm.com/support/pages/node/7166712",
|
||||
"source": "psirt@us.ibm.com"
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:ibm:security_verify_access_docker:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "10.0.0",
|
||||
"versionEndIncluding": "10.0.8",
|
||||
"matchCriteriaId": "7CE089A7-24AA-4AC4-A630-D787E4BD4F0D"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/291026",
|
||||
"source": "psirt@us.ibm.com",
|
||||
"tags": [
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://www.ibm.com/support/pages/node/7166712",
|
||||
"source": "psirt@us.ibm.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-3865",
|
||||
"sourceIdentifier": "security@mozilla.org",
|
||||
"published": "2024-04-16T16:15:08.957",
|
||||
"lastModified": "2024-04-17T12:48:31.863",
|
||||
"lastModified": "2024-09-06T22:35:02.500",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -15,7 +15,42 @@
|
||||
"value": "Errores de seguridad de la memoria presentes en Firefox 124. Algunos de estos errores mostraron evidencia de corrupci\u00f3n de la memoria y suponemos que con suficiente esfuerzo algunos de ellos podr\u00edan haberse aprovechado para ejecutar c\u00f3digo arbitrario. Esta vulnerabilidad afecta a Firefox < 125."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "HIGH",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 8.1,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.2,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-119"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://bugzilla.mozilla.org/buglist.cgi?bug_id=1881076%2C1884887%2C1885359%2C1889049",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-41964",
|
||||
"sourceIdentifier": "security-advisories@github.com",
|
||||
"published": "2024-08-29T17:15:07.980",
|
||||
"lastModified": "2024-08-30T13:00:05.390",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-09-06T22:56:18.010",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -17,6 +17,26 @@
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 8.1,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 5.2
|
||||
},
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Secondary",
|
||||
@ -40,6 +60,16 @@
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-863"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Secondary",
|
||||
@ -51,14 +81,73 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
"configurations": [
|
||||
{
|
||||
"url": "https://github.com/getkirby/kirby/commit/ab95d172667c3cd529917c2bc94d3c7969706d23",
|
||||
"source": "security-advisories@github.com"
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:getkirby:kirby:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "3.6.6.6",
|
||||
"matchCriteriaId": "FB5113F1-0EAB-408F-9574-7A9545905C52"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/getkirby/kirby/security/advisories/GHSA-jm9m-rqr3-wfmh",
|
||||
"source": "security-advisories@github.com"
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:getkirby:kirby:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "3.7.0",
|
||||
"versionEndExcluding": "3.7.5.5",
|
||||
"matchCriteriaId": "8A9E85FE-0FC5-41C1-99EB-6CEE106864E3"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:getkirby:kirby:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "3.8.0",
|
||||
"versionEndExcluding": "3.8.4.4",
|
||||
"matchCriteriaId": "DC6DA7E2-7EA2-4F0B-BECD-0481489E1A9E"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:getkirby:kirby:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "3.9.0",
|
||||
"versionEndExcluding": "3.9.8.2",
|
||||
"matchCriteriaId": "815FC984-F946-463C-8CDC-2923BF51D85D"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:getkirby:kirby:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "3.10.0",
|
||||
"versionEndExcluding": "3.10.1.1",
|
||||
"matchCriteriaId": "A359C0A7-92E0-428B-A3D1-32B43929EC6F"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:getkirby:kirby:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "4.0.0",
|
||||
"versionEndExcluding": "4.3.1",
|
||||
"matchCriteriaId": "45D93D8F-70F6-4E50-A7A7-511593473868"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/getkirby/kirby/commit/ab95d172667c3cd529917c2bc94d3c7969706d23",
|
||||
"source": "security-advisories@github.com",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/getkirby/kirby/security/advisories/GHSA-jm9m-rqr3-wfmh",
|
||||
"source": "security-advisories@github.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,17 +2,41 @@
|
||||
"id": "CVE-2024-43700",
|
||||
"sourceIdentifier": "vultures@jpcert.or.jp",
|
||||
"published": "2024-08-29T11:15:26.757",
|
||||
"lastModified": "2024-08-29T20:36:51.570",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-09-06T22:52:41.727",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "xfpt versions prior to 1.01 fails to handle appropriately some parameters inside the input data, resulting in a stack-based buffer overflow vulnerability. When a user of the affected product is tricked to process a specially crafted file, arbitrary code may be executed on the user's environment."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Las versiones de xfpt anteriores a la 1.01 no pueden manejar adecuadamente algunos par\u00e1metros dentro de los datos de entrada, lo que genera una vulnerabilidad de desbordamiento de b\u00fafer en la pila. Cuando se enga\u00f1a a un usuario del producto afectado para que procese un archivo especialmente manipulado, se puede ejecutar c\u00f3digo arbitrario en el entorno del usuario."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 7.8,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 5.9
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
@ -36,6 +60,16 @@
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-787"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
@ -47,18 +81,45 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
"configurations": [
|
||||
{
|
||||
"url": "https://github.com/PhilipHazel/xfpt",
|
||||
"source": "vultures@jpcert.or.jp"
|
||||
},
|
||||
"nodes": [
|
||||
{
|
||||
"url": "https://github.com/PhilipHazel/xfpt/commit/a690304bbd3fd19e9dfdad50dcc87ad829f744e4",
|
||||
"source": "vultures@jpcert.or.jp"
|
||||
},
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"url": "https://jvn.jp/en/vu/JVNVU96498690/",
|
||||
"source": "vultures@jpcert.or.jp"
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:philiphazel:xfpt:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "1.01",
|
||||
"matchCriteriaId": "9F8826E7-454A-427E-8472-3A45AAD6B730"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/PhilipHazel/xfpt",
|
||||
"source": "vultures@jpcert.or.jp",
|
||||
"tags": [
|
||||
"Product"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/PhilipHazel/xfpt/commit/a690304bbd3fd19e9dfdad50dcc87ad829f744e4",
|
||||
"source": "vultures@jpcert.or.jp",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://jvn.jp/en/vu/JVNVU96498690/",
|
||||
"source": "vultures@jpcert.or.jp",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-43804",
|
||||
"sourceIdentifier": "security-advisories@github.com",
|
||||
"published": "2024-08-29T17:15:08.193",
|
||||
"lastModified": "2024-08-30T13:00:05.390",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-09-06T22:57:01.697",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -17,6 +17,26 @@
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 8.8,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 5.9
|
||||
},
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Secondary",
|
||||
@ -40,6 +60,16 @@
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-78"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Secondary",
|
||||
@ -51,10 +81,31 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
"configurations": [
|
||||
{
|
||||
"url": "https://github.com/roxy-wi/roxy-wi/security/advisories/GHSA-qc52-vwwj-5585",
|
||||
"source": "security-advisories@github.com"
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:roxy-wi:roxy-wi:8.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "E92EACAF-6384-4331-8F22-5CF3B2EB4B5E"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/roxy-wi/roxy-wi/security/advisories/GHSA-qc52-vwwj-5585",
|
||||
"source": "security-advisories@github.com",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-44796",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-08-26T20:15:08.200",
|
||||
"lastModified": "2024-08-27T13:02:05.683",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-09-06T23:35:04.340",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -15,19 +15,111 @@
|
||||
"value": "Una vulnerabilidad de cross-site scripting (XSS) en el componente /auth/AzureRedirect.php de el commit de PicUploader fcf82ea permite a los atacantes ejecutar scripts web o HTML arbitrarios a trav\u00e9s de un payload manipulado inyectado en el par\u00e1metro error_description."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"url": "http://picuploader.com",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 6.1,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 2.7
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/xiebruce/PicUploader",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:C/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "HIGH",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 8.0,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 1.3,
|
||||
"impactScore": 6.0
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/xiebruce/PicUploader/issues/90",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:xiebruce:picuploader:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "2024-02-13",
|
||||
"matchCriteriaId": "C6938C89-B864-4B8D-A87B-5EF1F9912A0F"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "http://picuploader.com",
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Broken Link"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/xiebruce/PicUploader",
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Product"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/xiebruce/PicUploader/issues/90",
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Exploit"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-44797",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-08-26T20:15:08.257",
|
||||
"lastModified": "2024-08-27T15:35:18.880",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-09-06T22:27:16.177",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -17,6 +17,26 @@
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 6.1,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 2.7
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
@ -40,6 +60,16 @@
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
@ -51,18 +81,45 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
"configurations": [
|
||||
{
|
||||
"url": "http://gazelle.com",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
"nodes": [
|
||||
{
|
||||
"url": "https://github.com/WhatCD/Gazelle",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"url": "https://github.com/WhatCD/Gazelle/issues/130",
|
||||
"source": "cve@mitre.org"
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:gazelle_project:gazelle:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "2016-11-08",
|
||||
"matchCriteriaId": "032237DC-F7F0-436E-8AE6-00709E76A3A4"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "http://gazelle.com",
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Not Applicable"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/WhatCD/Gazelle",
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Product"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/WhatCD/Gazelle/issues/130",
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Exploit"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
21
CVE-2024/CVE-2024-448xx/CVE-2024-44838.json
Normal file
21
CVE-2024/CVE-2024-448xx/CVE-2024-44838.json
Normal file
@ -0,0 +1,21 @@
|
||||
{
|
||||
"id": "CVE-2024-44838",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-09-06T22:15:02.147",
|
||||
"lastModified": "2024-09-06T22:15:02.147",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "RapidCMS v1.3.1 was discovered to contain a SQL injection vulnerability via the username parameter at /resource/runlogin.php."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/OpenRapid/rapidcms/issues/17",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
21
CVE-2024/CVE-2024-448xx/CVE-2024-44839.json
Normal file
21
CVE-2024/CVE-2024-448xx/CVE-2024-44839.json
Normal file
@ -0,0 +1,21 @@
|
||||
{
|
||||
"id": "CVE-2024-44839",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-09-06T22:15:02.210",
|
||||
"lastModified": "2024-09-06T22:15:02.210",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "RapidCMS v1.3.1 was discovered to contain a SQL injection vulnerability via the articleid parameter at /default/article.php."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/OpenRapid/rapidcms/issues/18",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-44919",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-08-29T17:15:08.670",
|
||||
"lastModified": "2024-08-30T16:15:09.720",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-09-06T22:54:56.927",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -17,6 +17,26 @@
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 5.4,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.3,
|
||||
"impactScore": 2.7
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
@ -40,6 +60,16 @@
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
@ -51,14 +81,37 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
"configurations": [
|
||||
{
|
||||
"url": "https://github.com/nn0nkey/nn0nkey/blob/main/CVE-2024-44919.md",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
"nodes": [
|
||||
{
|
||||
"url": "https://github.com/nn0nkey/nn0nkey/blob/main/second.md",
|
||||
"source": "cve@mitre.org"
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:seacms:seacms:12.9:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "5A52C0BF-703A-4BF0-A5A9-E3995C30FE0D"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/nn0nkey/nn0nkey/blob/main/CVE-2024-44919.md",
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Exploit"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/nn0nkey/nn0nkey/blob/main/second.md",
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Broken Link"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-45321",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-08-27T04:15:09.010",
|
||||
"lastModified": "2024-09-06T14:35:13.113",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2024-09-06T22:30:19.337",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -17,6 +17,26 @@
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
@ -40,6 +60,16 @@
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-494"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
@ -51,18 +81,47 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
"configurations": [
|
||||
{
|
||||
"url": "https://github.com/miyagawa/cpanminus/issues/611",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
"nodes": [
|
||||
{
|
||||
"url": "https://github.com/miyagawa/cpanminus/pull/674",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"url": "https://security.metacpan.org/2024/08/26/cpanminus-downloads-code-using-insecure-http.html",
|
||||
"source": "cve@mitre.org"
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:app\\:\\:cpanminus_project:app\\:\\:cpanminus:*:*:*:*:*:perl:*:*",
|
||||
"versionEndIncluding": "1.7047",
|
||||
"matchCriteriaId": "E7633BA7-2A2E-45A8-9A0F-69E1E35D0D2A"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/miyagawa/cpanminus/issues/611",
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Issue Tracking"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/miyagawa/cpanminus/pull/674",
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Issue Tracking",
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://security.metacpan.org/2024/08/26/cpanminus-downloads-code-using-insecure-http.html",
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
21
CVE-2024/CVE-2024-457xx/CVE-2024-45771.json
Normal file
21
CVE-2024/CVE-2024-457xx/CVE-2024-45771.json
Normal file
@ -0,0 +1,21 @@
|
||||
{
|
||||
"id": "CVE-2024-45771",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-09-06T22:15:02.267",
|
||||
"lastModified": "2024-09-06T22:15:02.267",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "RapidCMS v1.3.1 was discovered to contain a SQL injection vulnerability via the password parameter at /resource/runlogin.php."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/OpenRapid/rapidcms/issues/17",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-4883",
|
||||
"sourceIdentifier": "security@progress.com",
|
||||
"published": "2024-06-25T20:15:12.320",
|
||||
"lastModified": "2024-06-26T12:44:29.693",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-09-06T22:46:17.103",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -17,6 +17,26 @@
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
},
|
||||
{
|
||||
"source": "security@progress.com",
|
||||
"type": "Secondary",
|
||||
@ -40,6 +60,16 @@
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "NVD-CWE-noinfo"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "security@progress.com",
|
||||
"type": "Secondary",
|
||||
@ -59,14 +89,38 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
"configurations": [
|
||||
{
|
||||
"url": "https://community.progress.com/s/article/WhatsUp-Gold-Security-Bulletin-June-2024",
|
||||
"source": "security@progress.com"
|
||||
},
|
||||
"nodes": [
|
||||
{
|
||||
"url": "https://www.progress.com/network-monitoring",
|
||||
"source": "security@progress.com"
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:progress:whatsup_gold:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "23.1.3",
|
||||
"matchCriteriaId": "C22487E3-6723-40C7-86A0-764EBAA37A55"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://community.progress.com/s/article/WhatsUp-Gold-Security-Bulletin-June-2024",
|
||||
"source": "security@progress.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://www.progress.com/network-monitoring",
|
||||
"source": "security@progress.com",
|
||||
"tags": [
|
||||
"Product"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-4884",
|
||||
"sourceIdentifier": "security@progress.com",
|
||||
"published": "2024-06-25T20:15:12.547",
|
||||
"lastModified": "2024-06-26T12:44:29.693",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-09-06T22:45:59.233",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -17,6 +17,26 @@
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
},
|
||||
{
|
||||
"source": "security@progress.com",
|
||||
"type": "Secondary",
|
||||
@ -40,6 +60,16 @@
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-77"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "security@progress.com",
|
||||
"type": "Secondary",
|
||||
@ -59,14 +89,38 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
"configurations": [
|
||||
{
|
||||
"url": "https://community.progress.com/s/article/WhatsUp-Gold-Security-Bulletin-June-2024",
|
||||
"source": "security@progress.com"
|
||||
},
|
||||
"nodes": [
|
||||
{
|
||||
"url": "https://www.progress.com/network-monitoring",
|
||||
"source": "security@progress.com"
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:progress:whatsup_gold:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "23.1.3",
|
||||
"matchCriteriaId": "C22487E3-6723-40C7-86A0-764EBAA37A55"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://community.progress.com/s/article/WhatsUp-Gold-Security-Bulletin-June-2024",
|
||||
"source": "security@progress.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://www.progress.com/network-monitoring",
|
||||
"source": "security@progress.com",
|
||||
"tags": [
|
||||
"Product"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-4885",
|
||||
"sourceIdentifier": "security@progress.com",
|
||||
"published": "2024-06-25T20:15:12.970",
|
||||
"lastModified": "2024-06-26T12:44:29.693",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-09-06T22:44:27.840",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -17,6 +17,26 @@
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
},
|
||||
{
|
||||
"source": "security@progress.com",
|
||||
"type": "Secondary",
|
||||
@ -40,6 +60,16 @@
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "NVD-CWE-noinfo"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "security@progress.com",
|
||||
"type": "Secondary",
|
||||
@ -51,14 +81,38 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
"configurations": [
|
||||
{
|
||||
"url": "https://community.progress.com/s/article/WhatsUp-Gold-Security-Bulletin-June-2024",
|
||||
"source": "security@progress.com"
|
||||
},
|
||||
"nodes": [
|
||||
{
|
||||
"url": "https://www.progress.com/network-monitoring",
|
||||
"source": "security@progress.com"
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:progress:whatsup_gold:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "23.1.3",
|
||||
"matchCriteriaId": "C22487E3-6723-40C7-86A0-764EBAA37A55"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://community.progress.com/s/article/WhatsUp-Gold-Security-Bulletin-June-2024",
|
||||
"source": "security@progress.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://www.progress.com/network-monitoring",
|
||||
"source": "security@progress.com",
|
||||
"tags": [
|
||||
"Product"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-5008",
|
||||
"sourceIdentifier": "security@progress.com",
|
||||
"published": "2024-06-25T20:15:13.173",
|
||||
"lastModified": "2024-06-26T12:44:29.693",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-09-06T22:43:49.557",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -17,6 +17,26 @@
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 8.8,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 5.9
|
||||
},
|
||||
{
|
||||
"source": "security@progress.com",
|
||||
"type": "Secondary",
|
||||
@ -40,6 +60,16 @@
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-434"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "security@progress.com",
|
||||
"type": "Secondary",
|
||||
@ -51,14 +81,38 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
"configurations": [
|
||||
{
|
||||
"url": "https://community.progress.com/s/article/WhatsUp-Gold-Security-Bulletin-June-2024",
|
||||
"source": "security@progress.com"
|
||||
},
|
||||
"nodes": [
|
||||
{
|
||||
"url": "https://www.progress.com/network-monitoring",
|
||||
"source": "security@progress.com"
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:progress:whatsup_gold:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "23.1.3",
|
||||
"matchCriteriaId": "C22487E3-6723-40C7-86A0-764EBAA37A55"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://community.progress.com/s/article/WhatsUp-Gold-Security-Bulletin-June-2024",
|
||||
"source": "security@progress.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://www.progress.com/network-monitoring",
|
||||
"source": "security@progress.com",
|
||||
"tags": [
|
||||
"Product"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-5009",
|
||||
"sourceIdentifier": "security@progress.com",
|
||||
"published": "2024-06-25T20:15:13.427",
|
||||
"lastModified": "2024-06-26T12:44:29.693",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-09-06T22:43:04.747",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -17,6 +17,26 @@
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 8.4,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.5,
|
||||
"impactScore": 5.9
|
||||
},
|
||||
{
|
||||
"source": "security@progress.com",
|
||||
"type": "Secondary",
|
||||
@ -40,6 +60,16 @@
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "NVD-CWE-noinfo"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "security@progress.com",
|
||||
"type": "Secondary",
|
||||
@ -51,14 +81,38 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
"configurations": [
|
||||
{
|
||||
"url": "https://community.progress.com/s/article/WhatsUp-Gold-Security-Bulletin-June-2024",
|
||||
"source": "security@progress.com"
|
||||
},
|
||||
"nodes": [
|
||||
{
|
||||
"url": "https://www.progress.com/network-monitoring",
|
||||
"source": "security@progress.com"
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:progress:whatsup_gold:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "23.1.3",
|
||||
"matchCriteriaId": "C22487E3-6723-40C7-86A0-764EBAA37A55"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://community.progress.com/s/article/WhatsUp-Gold-Security-Bulletin-June-2024",
|
||||
"source": "security@progress.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://www.progress.com/network-monitoring",
|
||||
"source": "security@progress.com",
|
||||
"tags": [
|
||||
"Product"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-5010",
|
||||
"sourceIdentifier": "security@progress.com",
|
||||
"published": "2024-06-25T20:15:13.617",
|
||||
"lastModified": "2024-06-26T14:15:11.250",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-09-06T22:42:39.017",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -17,6 +17,26 @@
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 7.5,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 3.6
|
||||
},
|
||||
{
|
||||
"source": "security@progress.com",
|
||||
"type": "Secondary",
|
||||
@ -40,6 +60,16 @@
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "NVD-CWE-noinfo"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "security@progress.com",
|
||||
"type": "Secondary",
|
||||
@ -51,18 +81,45 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
"configurations": [
|
||||
{
|
||||
"url": "https://community.progress.com/s/article/WhatsUp-Gold-Security-Bulletin-June-2024",
|
||||
"source": "security@progress.com"
|
||||
},
|
||||
"nodes": [
|
||||
{
|
||||
"url": "https://www.progress.com/network-monitoring",
|
||||
"source": "security@progress.com"
|
||||
},
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"url": "https://www.talosintelligence.com/vulnerability_reports/TALOS-2024-1933",
|
||||
"source": "security@progress.com"
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:progress:whatsup_gold:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "23.1.3",
|
||||
"matchCriteriaId": "C22487E3-6723-40C7-86A0-764EBAA37A55"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://community.progress.com/s/article/WhatsUp-Gold-Security-Bulletin-June-2024",
|
||||
"source": "security@progress.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://www.progress.com/network-monitoring",
|
||||
"source": "security@progress.com",
|
||||
"tags": [
|
||||
"Product"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://www.talosintelligence.com/vulnerability_reports/TALOS-2024-1933",
|
||||
"source": "security@progress.com",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-5011",
|
||||
"sourceIdentifier": "security@progress.com",
|
||||
"published": "2024-06-25T20:15:13.810",
|
||||
"lastModified": "2024-06-26T14:15:11.350",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-09-06T22:41:46.253",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -17,6 +17,26 @@
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 7.5,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 3.6
|
||||
},
|
||||
{
|
||||
"source": "security@progress.com",
|
||||
"type": "Secondary",
|
||||
@ -40,6 +60,16 @@
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-400"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "security@progress.com",
|
||||
"type": "Secondary",
|
||||
@ -51,18 +81,45 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
"configurations": [
|
||||
{
|
||||
"url": "https://community.progress.com/s/article/WhatsUp-Gold-Security-Bulletin-June-2024",
|
||||
"source": "security@progress.com"
|
||||
},
|
||||
"nodes": [
|
||||
{
|
||||
"url": "https://www.progress.com/network-monitoring",
|
||||
"source": "security@progress.com"
|
||||
},
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"url": "https://www.talosintelligence.com/vulnerability_reports/TALOS-2024-1934",
|
||||
"source": "security@progress.com"
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:progress:whatsup_gold:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "23.1.3",
|
||||
"matchCriteriaId": "C22487E3-6723-40C7-86A0-764EBAA37A55"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://community.progress.com/s/article/WhatsUp-Gold-Security-Bulletin-June-2024",
|
||||
"source": "security@progress.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://www.progress.com/network-monitoring",
|
||||
"source": "security@progress.com",
|
||||
"tags": [
|
||||
"Product"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://www.talosintelligence.com/vulnerability_reports/TALOS-2024-1934",
|
||||
"source": "security@progress.com",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-5991",
|
||||
"sourceIdentifier": "facts@wolfssl.com",
|
||||
"published": "2024-08-27T19:15:18.080",
|
||||
"lastModified": "2024-08-28T12:57:39.090",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-09-06T22:51:41.470",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -59,9 +59,41 @@
|
||||
"baseSeverity": "CRITICAL"
|
||||
}
|
||||
}
|
||||
],
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 7.5,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-125"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "facts@wolfssl.com",
|
||||
"type": "Secondary",
|
||||
@ -73,10 +105,39 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
"configurations": [
|
||||
{
|
||||
"url": "https://https://github.com/wolfSSL/wolfssl/pull/7604",
|
||||
"source": "facts@wolfssl.com"
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:wolfssl:wolfssl:*:*:*:*:*:*:*:*",
|
||||
"versionEndIncluding": "5.7.0",
|
||||
"matchCriteriaId": "68EDAD3E-B3D4-44BA-8F48-44DF39F1842C"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/wolfSSL/wolfssl/pull/7604",
|
||||
"source": "nvd@nist.gov",
|
||||
"tags": [
|
||||
"Issue Tracking",
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://https://github.com/wolfSSL/wolfssl/pull/7604",
|
||||
"source": "facts@wolfssl.com",
|
||||
"tags": [
|
||||
"Broken Link"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-6789",
|
||||
"sourceIdentifier": "security@m-files.com",
|
||||
"published": "2024-08-27T10:15:05.460",
|
||||
"lastModified": "2024-08-27T13:01:37.913",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-09-06T22:31:04.833",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -59,9 +59,41 @@
|
||||
"baseSeverity": "HIGH"
|
||||
}
|
||||
}
|
||||
],
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 6.5,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-22"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "security@m-files.com",
|
||||
"type": "Secondary",
|
||||
@ -73,10 +105,37 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
"configurations": [
|
||||
{
|
||||
"url": "https://product.m-files.com/security-advisories/cve-2024-6789/",
|
||||
"source": "security@m-files.com"
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:m-files:m-files_server:*:*:*:*:lts:*:*:*",
|
||||
"versionEndExcluding": "24.2.13421.15",
|
||||
"matchCriteriaId": "CE8AAF74-E9A5-4E11-BE98-651E76D8F29C"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:m-files:m-files_server:*:*:*:*:-:*:*:*",
|
||||
"versionEndExcluding": "24.8.13981.0",
|
||||
"matchCriteriaId": "E75C928B-8D24-4B22-A20D-41C2ACD44795"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://product.m-files.com/security-advisories/cve-2024-6789/",
|
||||
"source": "security@m-files.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-7593",
|
||||
"sourceIdentifier": "3c1d8aa1-5a33-4ea4-8992-aadd6440af75",
|
||||
"published": "2024-08-13T19:15:16.940",
|
||||
"lastModified": "2024-08-14T02:07:05.410",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-09-06T22:13:21.197",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -17,6 +17,26 @@
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
},
|
||||
{
|
||||
"source": "3c1d8aa1-5a33-4ea4-8992-aadd6440af75",
|
||||
"type": "Secondary",
|
||||
@ -40,6 +60,16 @@
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-287"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "3c1d8aa1-5a33-4ea4-8992-aadd6440af75",
|
||||
"type": "Secondary",
|
||||
@ -55,10 +85,57 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
"configurations": [
|
||||
{
|
||||
"url": "https://forums.ivanti.com/s/article/Security-Advisory-Ivanti-Virtual-Traffic-Manager-vTM-CVE-2024-7593",
|
||||
"source": "3c1d8aa1-5a33-4ea4-8992-aadd6440af75"
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:ivanti:virtual_traffic_management:22.2:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "D5652006-FA06-419F-90DB-B23195E1383C"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:ivanti:virtual_traffic_management:22.3:-:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "63BF5D63-D156-4BEB-9F7B-35AF9DEABDAD"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:ivanti:virtual_traffic_management:22.3:r2:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "8F23C040-4451-4CBF-B9A8-741C404121D8"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:ivanti:virtual_traffic_management:22.5:r1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "0A4F948D-F3AE-451A-A68A-013900133B83"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:ivanti:virtual_traffic_management:22.6:r1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "32931B52-335D-4887-9B2B-4DE42589496D"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:ivanti:virtual_traffic_management:22.7:r1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "4F1CCCDD-05F4-430A-979B-B050E75FE3B0"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://forums.ivanti.com/s/article/Security-Advisory-Ivanti-Virtual-Traffic-Manager-vTM-CVE-2024-7593",
|
||||
"source": "3c1d8aa1-5a33-4ea4-8992-aadd6440af75",
|
||||
"tags": [
|
||||
"Mitigation",
|
||||
"Patch",
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-7720",
|
||||
"sourceIdentifier": "hp-security-alert@hp.com",
|
||||
"published": "2024-08-27T18:15:15.840",
|
||||
"lastModified": "2024-08-28T14:35:14.160",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2024-09-06T22:33:30.767",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -17,6 +17,26 @@
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
@ -40,6 +60,16 @@
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "NVD-CWE-noinfo"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
@ -51,10 +81,30 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
"configurations": [
|
||||
{
|
||||
"url": "https://support.hp.com/us-en/document/ish_11074404-11074432-16/",
|
||||
"source": "hp-security-alert@hp.com"
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:hp:security_manager:3.11:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "2A3433EC-7F52-43BA-9BBC-4141EBF57495"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://support.hp.com/us-en/document/ish_11074404-11074432-16/",
|
||||
"source": "hp-security-alert@hp.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,13 +2,17 @@
|
||||
"id": "CVE-2024-8163",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2024-08-26T13:15:06.670",
|
||||
"lastModified": "2024-08-26T15:15:23.727",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-09-06T22:18:19.283",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A vulnerability classified as critical was found in Chengdu Everbrite Network Technology BeikeShop up to 1.5.5. Affected by this vulnerability is the function destroyFiles of the file /admin/file_manager/files. The manipulation of the argument files leads to path traversal. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. NOTE: The vendor was contacted early about this disclosure but did not respond in any way."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Una vulnerabilidad fue encontrada en Chengdu Everbrite Network Technology BeikeShop hasta 1.5.5 y clasificada como cr\u00edtica. La funci\u00f3n destroyFiles del archivo /admin/file_manager/files es afectada por esta vulnerabilidad. La manipulaci\u00f3n de los archivos de argumentos conduce a un path traversal. El ataque se puede lanzar de forma remota. El exploit ha sido divulgado al p\u00fablico y puede utilizarse. NOTA: Se contact\u00f3 primeramente con el proveedor sobre esta divulgaci\u00f3n, pero no respondi\u00f3 de ninguna manera."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
@ -57,6 +61,26 @@
|
||||
}
|
||||
],
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 8.1,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 5.2
|
||||
},
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
@ -116,22 +140,53 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
"configurations": [
|
||||
{
|
||||
"url": "https://github.com/DeepMountains/zzz/blob/main/CVE4-1.md",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
"nodes": [
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.275761",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"url": "https://vuldb.com/?id.275761",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?submit.393374",
|
||||
"source": "cna@vuldb.com"
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:beikeshop:beikeshop:*:*:*:*:*:*:*:*",
|
||||
"versionEndIncluding": "1.5.5",
|
||||
"matchCriteriaId": "E3C84BC9-CE90-429D-BA39-B61A6E9BC17C"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/DeepMountains/zzz/blob/main/CVE4-1.md",
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.275761",
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Permissions Required"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.275761",
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?submit.393374",
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,13 +2,17 @@
|
||||
"id": "CVE-2024-8164",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2024-08-26T14:15:08.063",
|
||||
"lastModified": "2024-08-26T15:15:23.727",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-09-06T22:19:53.907",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A vulnerability, which was classified as critical, has been found in Chengdu Everbrite Network Technology BeikeShop up to 1.5.5. Affected by this issue is the function rename of the file /Admin/Http/Controllers/FileManagerController.php. The manipulation of the argument new_name leads to unrestricted upload. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. NOTE: The vendor was contacted early about this disclosure but did not respond in any way."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Una vulnerabilidad fue encontrada en Chengdu Everbrite Network Technology BeikeShop hasta 1.5.5 y clasificada como cr\u00edtica. La funci\u00f3n rename del archivo /Admin/Http/Controllers/FileManagerController.php es afectada por esta vulnerabilidad. La manipulaci\u00f3n del argumento nuevo_nombre conduce a una carga sin restricciones. El ataque puede lanzarse de forma remota. El exploit ha sido divulgado al p\u00fablico y puede utilizarse. NOTA: Se contact\u00f3 primeramente con el proveedor sobre esta divulgaci\u00f3n, pero no respondi\u00f3 de ninguna manera."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
@ -57,6 +61,26 @@
|
||||
}
|
||||
],
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 8.8,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 5.9
|
||||
},
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
@ -116,22 +140,53 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
"configurations": [
|
||||
{
|
||||
"url": "https://github.com/DeepMountains/zzz/blob/main/CVE4-2.md",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
"nodes": [
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.275762",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"url": "https://vuldb.com/?id.275762",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?submit.393375",
|
||||
"source": "cna@vuldb.com"
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:beikeshop:beikeshop:*:*:*:*:*:*:*:*",
|
||||
"versionEndIncluding": "1.5.5",
|
||||
"matchCriteriaId": "E3C84BC9-CE90-429D-BA39-B61A6E9BC17C"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/DeepMountains/zzz/blob/main/CVE4-2.md",
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.275762",
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Permissions Required"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.275762",
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?submit.393375",
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,13 +2,17 @@
|
||||
"id": "CVE-2024-8165",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2024-08-26T14:15:08.337",
|
||||
"lastModified": "2024-08-26T15:15:23.727",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-09-06T22:20:41.553",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A vulnerability, which was classified as problematic, was found in Chengdu Everbrite Network Technology BeikeShop up to 1.5.5. This affects the function exportZip of the file /admin/file_manager/export. The manipulation of the argument path leads to path traversal. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. NOTE: The vendor was contacted early about this disclosure but did not respond in any way."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Una vulnerabilidad fue encontrada en Chengdu Everbrite Network Technology BeikeShop hasta 1.5.5 y clasificada como problem\u00e1tica. Esto afecta a la funci\u00f3n exportZip del archivo /admin/file_manager/export. La manipulaci\u00f3n del camino del argumento conduce al path traversal. Es posible iniciar el ataque de forma remota. El exploit ha sido divulgado al p\u00fablico y puede utilizarse. NOTA: Se contact\u00f3 primeramente con el proveedor sobre esta divulgaci\u00f3n, pero no respondi\u00f3 de ninguna manera."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
@ -57,6 +61,26 @@
|
||||
}
|
||||
],
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 6.5,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 3.6
|
||||
},
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
@ -116,22 +140,52 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
"configurations": [
|
||||
{
|
||||
"url": "https://github.com/DeepMountains/Mirage/blob/main/CVE18-1.md",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
"nodes": [
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.275763",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"url": "https://vuldb.com/?id.275763",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?submit.393376",
|
||||
"source": "cna@vuldb.com"
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:beikeshop:beikeshop:*:*:*:*:*:*:*:*",
|
||||
"versionEndIncluding": "1.5.5",
|
||||
"matchCriteriaId": "E3C84BC9-CE90-429D-BA39-B61A6E9BC17C"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/DeepMountains/Mirage/blob/main/CVE18-1.md",
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Broken Link"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.275763",
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Permissions Required"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.275763",
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?submit.393376",
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-8255",
|
||||
"sourceIdentifier": "ics-cert@hq.dhs.gov",
|
||||
"published": "2024-08-29T16:15:10.140",
|
||||
"lastModified": "2024-08-30T13:00:05.390",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-09-06T22:53:34.187",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -59,6 +59,28 @@
|
||||
"baseSeverity": "HIGH"
|
||||
}
|
||||
}
|
||||
],
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
@ -73,10 +95,32 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
"configurations": [
|
||||
{
|
||||
"url": "https://www.cisa.gov/news-events/ics-advisories/icsa-24-242-02",
|
||||
"source": "ics-cert@hq.dhs.gov"
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:deltaww:dtn_soft:*:*:*:*:*:*:*:*",
|
||||
"versionEndIncluding": "2.0.1",
|
||||
"matchCriteriaId": "D098FC76-914E-4871-AD27-E67CA85CC7F8"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.cisa.gov/news-events/ics-advisories/icsa-24-242-02",
|
||||
"source": "ics-cert@hq.dhs.gov",
|
||||
"tags": [
|
||||
"Third Party Advisory",
|
||||
"US Government Resource"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
16
CVE-2024/CVE-2024-84xx/CVE-2024-8439.json
Normal file
16
CVE-2024/CVE-2024-84xx/CVE-2024-8439.json
Normal file
@ -0,0 +1,16 @@
|
||||
{
|
||||
"id": "CVE-2024-8439",
|
||||
"sourceIdentifier": "security@wordfence.com",
|
||||
"published": "2024-09-06T22:15:02.320",
|
||||
"lastModified": "2024-09-06T22:15:02.320",
|
||||
"vulnStatus": "Rejected",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Rejected reason: Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that the issue does not pose a security risk as it falls within the expected functionality and security controls of the application."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": []
|
||||
}
|
69
README.md
69
README.md
@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours.
|
||||
### Last Repository Update
|
||||
|
||||
```plain
|
||||
2024-09-06T22:00:17.582193+00:00
|
||||
2024-09-06T23:55:17.220319+00:00
|
||||
```
|
||||
|
||||
### Most recent CVE Modification Timestamp synchronized with NVD
|
||||
|
||||
```plain
|
||||
2024-09-06T21:59:00.830000+00:00
|
||||
2024-09-06T23:35:04.340000+00:00
|
||||
```
|
||||
|
||||
### Last Data Feed Release
|
||||
@ -33,49 +33,48 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
|
||||
### Total Number of included CVEs
|
||||
|
||||
```plain
|
||||
262108
|
||||
262112
|
||||
```
|
||||
|
||||
### CVEs added in the last Commit
|
||||
|
||||
Recently added CVEs: `5`
|
||||
Recently added CVEs: `4`
|
||||
|
||||
- [CVE-2024-34155](CVE-2024/CVE-2024-341xx/CVE-2024-34155.json) (`2024-09-06T21:15:11.947`)
|
||||
- [CVE-2024-34156](CVE-2024/CVE-2024-341xx/CVE-2024-34156.json) (`2024-09-06T21:15:12.020`)
|
||||
- [CVE-2024-34158](CVE-2024/CVE-2024-341xx/CVE-2024-34158.json) (`2024-09-06T21:15:12.083`)
|
||||
- [CVE-2024-44844](CVE-2024/CVE-2024-448xx/CVE-2024-44844.json) (`2024-09-06T21:15:12.160`)
|
||||
- [CVE-2024-44845](CVE-2024/CVE-2024-448xx/CVE-2024-44845.json) (`2024-09-06T21:15:12.217`)
|
||||
- [CVE-2024-44838](CVE-2024/CVE-2024-448xx/CVE-2024-44838.json) (`2024-09-06T22:15:02.147`)
|
||||
- [CVE-2024-44839](CVE-2024/CVE-2024-448xx/CVE-2024-44839.json) (`2024-09-06T22:15:02.210`)
|
||||
- [CVE-2024-45771](CVE-2024/CVE-2024-457xx/CVE-2024-45771.json) (`2024-09-06T22:15:02.267`)
|
||||
- [CVE-2024-8439](CVE-2024/CVE-2024-84xx/CVE-2024-8439.json) (`2024-09-06T22:15:02.320`)
|
||||
|
||||
|
||||
### CVEs modified in the last Commit
|
||||
|
||||
Recently modified CVEs: `61`
|
||||
Recently modified CVEs: `31`
|
||||
|
||||
- [CVE-2024-37898](CVE-2024/CVE-2024-378xx/CVE-2024-37898.json) (`2024-09-06T21:16:55.600`)
|
||||
- [CVE-2024-37900](CVE-2024/CVE-2024-379xx/CVE-2024-37900.json) (`2024-09-06T21:06:34.223`)
|
||||
- [CVE-2024-37901](CVE-2024/CVE-2024-379xx/CVE-2024-37901.json) (`2024-09-06T20:54:20.857`)
|
||||
- [CVE-2024-38429](CVE-2024/CVE-2024-384xx/CVE-2024-38429.json) (`2024-09-06T21:38:04.370`)
|
||||
- [CVE-2024-38430](CVE-2024/CVE-2024-384xx/CVE-2024-38430.json) (`2024-09-06T21:39:15.287`)
|
||||
- [CVE-2024-38431](CVE-2024/CVE-2024-384xx/CVE-2024-38431.json) (`2024-09-06T21:41:43.017`)
|
||||
- [CVE-2024-38432](CVE-2024/CVE-2024-384xx/CVE-2024-38432.json) (`2024-09-06T21:43:36.463`)
|
||||
- [CVE-2024-39568](CVE-2024/CVE-2024-395xx/CVE-2024-39568.json) (`2024-09-06T21:26:14.400`)
|
||||
- [CVE-2024-39569](CVE-2024/CVE-2024-395xx/CVE-2024-39569.json) (`2024-09-06T21:26:49.890`)
|
||||
- [CVE-2024-39570](CVE-2024/CVE-2024-395xx/CVE-2024-39570.json) (`2024-09-06T21:20:26.347`)
|
||||
- [CVE-2024-39571](CVE-2024/CVE-2024-395xx/CVE-2024-39571.json) (`2024-09-06T21:20:00.153`)
|
||||
- [CVE-2024-41819](CVE-2024/CVE-2024-418xx/CVE-2024-41819.json) (`2024-09-06T21:34:29.067`)
|
||||
- [CVE-2024-41947](CVE-2024/CVE-2024-419xx/CVE-2024-41947.json) (`2024-09-06T20:46:01.477`)
|
||||
- [CVE-2024-42008](CVE-2024/CVE-2024-420xx/CVE-2024-42008.json) (`2024-09-06T21:48:31.597`)
|
||||
- [CVE-2024-42009](CVE-2024/CVE-2024-420xx/CVE-2024-42009.json) (`2024-09-06T21:50:47.813`)
|
||||
- [CVE-2024-44401](CVE-2024/CVE-2024-444xx/CVE-2024-44401.json) (`2024-09-06T21:35:13.733`)
|
||||
- [CVE-2024-44402](CVE-2024/CVE-2024-444xx/CVE-2024-44402.json) (`2024-09-06T21:35:15.770`)
|
||||
- [CVE-2024-44408](CVE-2024/CVE-2024-444xx/CVE-2024-44408.json) (`2024-09-06T21:35:17.720`)
|
||||
- [CVE-2024-45057](CVE-2024/CVE-2024-450xx/CVE-2024-45057.json) (`2024-09-06T20:15:04.443`)
|
||||
- [CVE-2024-45058](CVE-2024/CVE-2024-450xx/CVE-2024-45058.json) (`2024-09-06T20:15:04.547`)
|
||||
- [CVE-2024-45059](CVE-2024/CVE-2024-450xx/CVE-2024-45059.json) (`2024-09-06T20:15:04.637`)
|
||||
- [CVE-2024-5138](CVE-2024/CVE-2024-51xx/CVE-2024-5138.json) (`2024-09-06T20:35:18.950`)
|
||||
- [CVE-2024-7569](CVE-2024/CVE-2024-75xx/CVE-2024-7569.json) (`2024-09-06T21:57:23.037`)
|
||||
- [CVE-2024-7570](CVE-2024/CVE-2024-75xx/CVE-2024-7570.json) (`2024-09-06T21:59:00.830`)
|
||||
- [CVE-2024-7652](CVE-2024/CVE-2024-76xx/CVE-2024-7652.json) (`2024-09-06T21:35:19.660`)
|
||||
- [CVE-2024-33903](CVE-2024/CVE-2024-339xx/CVE-2024-33903.json) (`2024-09-06T23:35:03.347`)
|
||||
- [CVE-2024-35133](CVE-2024/CVE-2024-351xx/CVE-2024-35133.json) (`2024-09-06T22:55:33.543`)
|
||||
- [CVE-2024-3865](CVE-2024/CVE-2024-38xx/CVE-2024-3865.json) (`2024-09-06T22:35:02.500`)
|
||||
- [CVE-2024-41964](CVE-2024/CVE-2024-419xx/CVE-2024-41964.json) (`2024-09-06T22:56:18.010`)
|
||||
- [CVE-2024-43700](CVE-2024/CVE-2024-437xx/CVE-2024-43700.json) (`2024-09-06T22:52:41.727`)
|
||||
- [CVE-2024-43804](CVE-2024/CVE-2024-438xx/CVE-2024-43804.json) (`2024-09-06T22:57:01.697`)
|
||||
- [CVE-2024-44796](CVE-2024/CVE-2024-447xx/CVE-2024-44796.json) (`2024-09-06T23:35:04.340`)
|
||||
- [CVE-2024-44797](CVE-2024/CVE-2024-447xx/CVE-2024-44797.json) (`2024-09-06T22:27:16.177`)
|
||||
- [CVE-2024-44919](CVE-2024/CVE-2024-449xx/CVE-2024-44919.json) (`2024-09-06T22:54:56.927`)
|
||||
- [CVE-2024-45321](CVE-2024/CVE-2024-453xx/CVE-2024-45321.json) (`2024-09-06T22:30:19.337`)
|
||||
- [CVE-2024-4883](CVE-2024/CVE-2024-48xx/CVE-2024-4883.json) (`2024-09-06T22:46:17.103`)
|
||||
- [CVE-2024-4884](CVE-2024/CVE-2024-48xx/CVE-2024-4884.json) (`2024-09-06T22:45:59.233`)
|
||||
- [CVE-2024-4885](CVE-2024/CVE-2024-48xx/CVE-2024-4885.json) (`2024-09-06T22:44:27.840`)
|
||||
- [CVE-2024-5008](CVE-2024/CVE-2024-50xx/CVE-2024-5008.json) (`2024-09-06T22:43:49.557`)
|
||||
- [CVE-2024-5009](CVE-2024/CVE-2024-50xx/CVE-2024-5009.json) (`2024-09-06T22:43:04.747`)
|
||||
- [CVE-2024-5010](CVE-2024/CVE-2024-50xx/CVE-2024-5010.json) (`2024-09-06T22:42:39.017`)
|
||||
- [CVE-2024-5011](CVE-2024/CVE-2024-50xx/CVE-2024-5011.json) (`2024-09-06T22:41:46.253`)
|
||||
- [CVE-2024-5991](CVE-2024/CVE-2024-59xx/CVE-2024-5991.json) (`2024-09-06T22:51:41.470`)
|
||||
- [CVE-2024-6789](CVE-2024/CVE-2024-67xx/CVE-2024-6789.json) (`2024-09-06T22:31:04.833`)
|
||||
- [CVE-2024-7593](CVE-2024/CVE-2024-75xx/CVE-2024-7593.json) (`2024-09-06T22:13:21.197`)
|
||||
- [CVE-2024-7720](CVE-2024/CVE-2024-77xx/CVE-2024-7720.json) (`2024-09-06T22:33:30.767`)
|
||||
- [CVE-2024-8163](CVE-2024/CVE-2024-81xx/CVE-2024-8163.json) (`2024-09-06T22:18:19.283`)
|
||||
- [CVE-2024-8164](CVE-2024/CVE-2024-81xx/CVE-2024-8164.json) (`2024-09-06T22:19:53.907`)
|
||||
- [CVE-2024-8165](CVE-2024/CVE-2024-81xx/CVE-2024-8165.json) (`2024-09-06T22:20:41.553`)
|
||||
- [CVE-2024-8255](CVE-2024/CVE-2024-82xx/CVE-2024-8255.json) (`2024-09-06T22:53:34.187`)
|
||||
|
||||
|
||||
## Download and Usage
|
||||
|
198
_state.csv
198
_state.csv
@ -93922,7 +93922,7 @@ CVE-2017-1000249,0,0,3140698e470efa540827b2fcefa473861882638ae3d9d2c44ca64cf092a
|
||||
CVE-2017-1000250,0,0,21cccbdb024260a84237111cb83289e4c7e8c636b7b840bf370bab1c371ee906,2018-02-17T02:29:02.283000
|
||||
CVE-2017-1000251,0,0,e83929b0cc760c5c9618969d4ee424f2ddfc5bd92a9caca156ec7f5d6fbb8de6,2023-01-19T15:53:39.780000
|
||||
CVE-2017-1000252,0,0,9eea6472d04eeaf32df8b8fd22d143af69543d35d1254252d432260f2ebb8018,2019-10-03T00:03:26.223000
|
||||
CVE-2017-1000253,0,1,da1948e215774ef80914a0fafba29848ebdc16a771bd399481a88c671b7c5d60,2024-09-06T20:35:00.883000
|
||||
CVE-2017-1000253,0,0,da1948e215774ef80914a0fafba29848ebdc16a771bd399481a88c671b7c5d60,2024-09-06T20:35:00.883000
|
||||
CVE-2017-1000254,0,0,2c437201d4072ed57e29421c399393b6fc19b110c7cd6c9df970aa004560ef63,2023-11-07T02:37:56.077000
|
||||
CVE-2017-1000255,0,0,64c86fde651745d2a520f25af2dd721f03cb9d4867f5aedc3c0057d889738a48,2018-04-11T01:29:00.540000
|
||||
CVE-2017-1000256,0,0,1ba938b667acbbdb5a5a82ad18f7e44094d40463d59112d0f41ca2b5aa05b499,2023-11-07T02:37:56.177000
|
||||
@ -181710,7 +181710,7 @@ CVE-2021-39807,0,0,62ccf7edd8dc9caf624d578e63be70c237f0b3c84eb56d1f3452785739662
|
||||
CVE-2021-39808,0,0,6552244cfbacfabe118545b3b68ffc69cdaa6de85cab59066cf773dfb9d9ea67,2022-07-12T17:42:04.277000
|
||||
CVE-2021-39809,0,0,43281f2921fea01353739d0535437439d176201a8f946531369994f6ee661147,2022-04-20T15:01:56.223000
|
||||
CVE-2021-3981,0,0,36d9a95398596799dc6304ee5061e93b29dbfcf63034bda831574908a1d5af51,2024-01-16T01:15:34.110000
|
||||
CVE-2021-39810,0,1,98b7425db0b6c22241a2482c95a6c202d7e527d598b20d9e3eed1f9bb9c30b70,2024-09-06T21:35:00.760000
|
||||
CVE-2021-39810,0,0,98b7425db0b6c22241a2482c95a6c202d7e527d598b20d9e3eed1f9bb9c30b70,2024-09-06T21:35:00.760000
|
||||
CVE-2021-39812,0,0,a8c6b6992203023cbbb031e0a6d712046b550b001a0c24137ec5c45dc58d28f2,2022-04-20T14:56:48.470000
|
||||
CVE-2021-39814,0,0,24197212b38ccf6945c124fc47a9c545d376fb1514a80a146c80e1765ccc4917,2022-04-20T15:12:01.263000
|
||||
CVE-2021-39815,0,0,2590baf73ac20d5dd9ea8519c94ffc40753b833417e22f46e4d6fe53264c2d08,2022-08-29T01:03:24.013000
|
||||
@ -210199,7 +210199,7 @@ CVE-2022-45724,0,0,a56acbec26c12264b64394fe5ff676fdb1ede46f6330e3ed427ce8a775b03
|
||||
CVE-2022-45725,0,0,7d19bf373e5f37884d5838049c5244ece7b33402c2dde8efee79801c39e51747,2023-08-08T14:21:49.707000
|
||||
CVE-2022-45728,0,0,232c0f6c81afdd6419bc760d2cff9446824707eddce45f26dc4ab06a7d2086a9,2023-11-14T20:28:42.417000
|
||||
CVE-2022-45729,0,0,7a4f183504886c3fae369b096edd9121121fb7a91cd48a17ea06746536032ed2,2023-11-14T20:28:42.417000
|
||||
CVE-2022-4573,0,1,cfbce652698239b68cd5fe182f30b9c511ec35e276576ae09b9021d4fe49f003,2024-09-06T21:35:01.913000
|
||||
CVE-2022-4573,0,0,cfbce652698239b68cd5fe182f30b9c511ec35e276576ae09b9021d4fe49f003,2024-09-06T21:35:01.913000
|
||||
CVE-2022-45730,0,0,8fcd028cc7daa4573e32d7069b9029ec2a4bc3d503ea3ef7002d074dfb0d949d,2023-11-14T20:28:42.417000
|
||||
CVE-2022-4574,0,0,99ebe8cbe281a8699b19c2a6ad0c35ccacdec0cb0796b1f58967307d7342b6c8,2023-11-08T00:24:33.087000
|
||||
CVE-2022-45748,0,0,17934955b2a8e030ad347f76eb1a3ab533d6cf7f18388292068553d79a6577e9,2023-01-28T03:38:19.033000
|
||||
@ -215539,7 +215539,7 @@ CVE-2023-21294,0,0,ea0c41050220ecdbee05caac36ee7c5e3f1205dc47b2cd8ced9b5f5736c33
|
||||
CVE-2023-21295,0,0,bbbaac0f428f9007dd95a9d7f835154513a18e5f6b1c73f8d63d73088b0032c9,2023-11-07T00:45:33.037000
|
||||
CVE-2023-21296,0,0,6a66e33a6f06eae6279202129d38e6e1cfbc6f7bfb3d569e81468b2c49d3d321,2023-11-06T17:29:14.137000
|
||||
CVE-2023-21297,0,0,2f94743ac68abeafa4648e486337856f981434cffdb6c03ef499bfa7fe09d7e0,2023-11-06T17:36:33.883000
|
||||
CVE-2023-21298,0,1,718baa41571aebbb7b14fdaf458aa93bf02bcf1453fbdb57b03a4e590188e682,2024-09-06T21:35:03.240000
|
||||
CVE-2023-21298,0,0,718baa41571aebbb7b14fdaf458aa93bf02bcf1453fbdb57b03a4e590188e682,2024-09-06T21:35:03.240000
|
||||
CVE-2023-21299,0,0,0d74a4cef1230479428525e07442bae2d424015921d2845d41022d6e154d24ce,2023-11-06T17:45:22.607000
|
||||
CVE-2023-2130,0,0,49235d8db8cac3bb3cf8bd76e90ec4bef70a1ec47f724ede82c3f69aca9fb1bf,2024-05-17T02:22:41.240000
|
||||
CVE-2023-21300,0,0,27b0bd25448b1107e304a4af276ce9e24c341140ec54c25cc9d82b9281eca70d,2023-11-06T17:45:39.737000
|
||||
@ -215567,7 +215567,7 @@ CVE-2023-2132,0,0,63d2413c9f97227792af21b2461b99b4deee7861989a9f9808c25ea23f4d2e
|
||||
CVE-2023-21320,0,0,bf5c27a898752221d2d16e07d30c8abb763d6f13f92b26c620916650d964815f,2023-11-06T17:57:55.523000
|
||||
CVE-2023-21321,0,0,b8f716c502ea85352702b7a43c185f78a5bc6a5ea81a610fc1d92193697e623f,2023-11-06T17:58:03.540000
|
||||
CVE-2023-21323,0,0,58f5817ca18173e3ddbf2e2ef2721d47264154dcc4681a9a7b828ff1d0b7df4a,2023-11-06T17:58:14.793000
|
||||
CVE-2023-21324,0,1,0cbf889a70484b73e615c989f44bfdbffdab03f74b65bb057393b5dd088c6ddb,2024-09-06T21:35:06.720000
|
||||
CVE-2023-21324,0,0,0cbf889a70484b73e615c989f44bfdbffdab03f74b65bb057393b5dd088c6ddb,2024-09-06T21:35:06.720000
|
||||
CVE-2023-21325,0,0,2850018837c69988dcb2e8c6470fc88f7e0a38abfb0e896a7ab3270c619a0d23,2023-11-06T17:58:39.620000
|
||||
CVE-2023-21326,0,0,e1f704547b8f50cf3e1f2abb0d4712b58178cdc74d57543f75565f7e4d61ad59,2023-11-06T17:58:57.733000
|
||||
CVE-2023-21327,0,0,098143c627d33cef9785e28ec02a457bd1764a72f9fc19e2d0a8077fc74f4a10,2023-11-06T14:47:48.253000
|
||||
@ -215581,14 +215581,14 @@ CVE-2023-21333,0,0,2bd340646917ee8db81d1bc53d5dacab1c6d3d813843378b576c024f4e8cd
|
||||
CVE-2023-21334,0,0,2cc37bab2271647904cb54a26d33818b191a3d06b78cf0922aa6fded48d1f987,2023-11-07T00:47:46.253000
|
||||
CVE-2023-21335,0,0,6b060136a8d4a1fee04e45ed9223ac2c6708a69864a5acc47a736978514aff62,2023-11-07T00:47:27.993000
|
||||
CVE-2023-21336,0,0,eaf33d454d2c59c75139c93882d35fc70353c0db9db44565bbaf0a0c90e671d0,2023-11-07T00:49:26.617000
|
||||
CVE-2023-21337,0,1,01e35811c40a074d28fda226e12f20e78d13dec463a0fe08c95cbc3cca4d54cd,2024-09-06T21:35:08.387000
|
||||
CVE-2023-21337,0,0,01e35811c40a074d28fda226e12f20e78d13dec463a0fe08c95cbc3cca4d54cd,2024-09-06T21:35:08.387000
|
||||
CVE-2023-21338,0,0,d384ab97d80ddbf1863be82befd5791882b5f4c4cb9a7f682bf1606e3b227266,2023-11-07T00:45:00.197000
|
||||
CVE-2023-21339,0,1,1c44beceb91e47365aba3d7ea7677347711a15b45b2e1dac9fb3d80baa451fae,2024-09-06T20:35:03.200000
|
||||
CVE-2023-21339,0,0,1c44beceb91e47365aba3d7ea7677347711a15b45b2e1dac9fb3d80baa451fae,2024-09-06T20:35:03.200000
|
||||
CVE-2023-2134,0,0,f95c0539485b1029697642f141b2454db420355fbc02afabf37920a9e2632a00,2023-10-20T20:52:47.177000
|
||||
CVE-2023-21340,0,0,fa3723c0de9d38e33a3c0b88fcba4d992c6bcc380ec3b5bc2a208a8f051a56b0,2023-11-07T00:43:23.113000
|
||||
CVE-2023-21341,0,1,415218b88af663eae42f3dac04320f26520144012c5c630963f8109ce2ca2b17,2024-09-06T20:35:04.047000
|
||||
CVE-2023-21342,0,1,259d320ebc6127c0f9f077addcaf10a8bbabb7d10b865c76456eace3d9761e7f,2024-09-06T20:35:04.803000
|
||||
CVE-2023-21343,0,1,13741f341d1d55dbf27e9d2e0b06b69b24148b378c3bc2085421fdd842e89ede,2024-09-06T20:35:04.997000
|
||||
CVE-2023-21341,0,0,415218b88af663eae42f3dac04320f26520144012c5c630963f8109ce2ca2b17,2024-09-06T20:35:04.047000
|
||||
CVE-2023-21342,0,0,259d320ebc6127c0f9f077addcaf10a8bbabb7d10b865c76456eace3d9761e7f,2024-09-06T20:35:04.803000
|
||||
CVE-2023-21343,0,0,13741f341d1d55dbf27e9d2e0b06b69b24148b378c3bc2085421fdd842e89ede,2024-09-06T20:35:04.997000
|
||||
CVE-2023-21344,0,0,ae51061e7d5645c5b031bbea62d5f7626337dc20eb02a252711830635f230b87,2023-11-07T00:48:46.480000
|
||||
CVE-2023-21345,0,0,bab68c716db33ae153b7eb2d386a1148f26b18d98fefbc595add6ef7e8627123,2023-11-03T17:42:55.850000
|
||||
CVE-2023-21346,0,0,bcf1122126b368329b090e48ca2a189a8ecb47c37497af9cf9d246505a426f9a,2023-11-03T19:00:13.137000
|
||||
@ -215621,7 +215621,7 @@ CVE-2023-21370,0,0,1ea830b517da6b3468465f72f71e3f55c4b359489447cb706691f4e78846b
|
||||
CVE-2023-21371,0,0,a50c87f04b064b1ccfea6d98517fb1cb2a06b280de61319201f0da671fec7686,2023-11-02T20:38:18.707000
|
||||
CVE-2023-21372,0,0,b61b4e995b6aa37e0af794ae07b3d2accbed06caa351af145000f3aec59b4f8e,2023-11-03T18:58:47.933000
|
||||
CVE-2023-21373,0,0,020e4f0c50c15664024dd5b1dec72961e522f5bd221a1355a36e4cd491987d52,2023-11-04T03:22:52.047000
|
||||
CVE-2023-21374,0,1,8758b35a1bed546fdf23d6d929b49c3443c5b59bcca91512d34a2db049e9666e,2024-09-06T20:35:06.647000
|
||||
CVE-2023-21374,0,0,8758b35a1bed546fdf23d6d929b49c3443c5b59bcca91512d34a2db049e9666e,2024-09-06T20:35:06.647000
|
||||
CVE-2023-21375,0,0,7a3fac506500bca24b016a29c0c3dd3c1420c5883471807aacb26ffa1e20b5b6,2023-11-03T19:02:57.213000
|
||||
CVE-2023-21376,0,0,7725402cf736eb8f5dc7bd1d88c3035355c431f9c8db0fa0103f053ca3e4c709,2023-11-03T19:03:06.437000
|
||||
CVE-2023-21377,0,0,e5fe5639f10e7519c5dcc3edfa374c24d92a1d7ebb461a3be9df3fa722e0ca98,2023-11-03T19:03:15.883000
|
||||
@ -218668,7 +218668,7 @@ CVE-2023-25043,0,0,80f871cbfee4f26fcdbd3bd11f18d19d5bb1f330e0eae2b05061f16904356
|
||||
CVE-2023-25044,0,0,3838d1c27051c58e78ea9b745ca07ee80c87451a22a17801992dc973ebb054e3,2023-09-01T20:47:45.390000
|
||||
CVE-2023-25045,0,0,0332882a5d673fd95f16007677ce5037d5202788000eeb4e1a21e51347e40919,2023-11-08T02:18:12.263000
|
||||
CVE-2023-25046,0,0,6f1bf0a6e1e58854a145ce77355b6108a8401123830999ac21bce886e3de6766,2023-11-07T04:08:48.917000
|
||||
CVE-2023-25047,0,1,155b129990fc27f2e9ce424091e4b892e3c9440273a5503426b4135a7b38dc89,2024-09-06T20:35:07.623000
|
||||
CVE-2023-25047,0,0,155b129990fc27f2e9ce424091e4b892e3c9440273a5503426b4135a7b38dc89,2024-09-06T20:35:07.623000
|
||||
CVE-2023-25049,0,0,99209e68ded4b17aee5a6af088e791275b9d6cc10832f8adc40dcbd238eed48a,2023-11-07T04:08:49
|
||||
CVE-2023-2505,0,0,6efcf779f35194644d77f093cc0fa0dbddee637b5633c00604d8702797eb7312,2023-05-31T14:01:22.207000
|
||||
CVE-2023-25050,0,0,daef4eb557ea0d6701f0b52307e0f8410263dad34fe5d6af987a12eda68bb363,2024-05-17T18:36:05.263000
|
||||
@ -219709,7 +219709,7 @@ CVE-2023-2631,0,0,4bd445bd2bec8da6a2695046ad2eabb2eb9ea9d2f819ee1d12353b574204d9
|
||||
CVE-2023-26310,0,0,3bfe9588574a5466dd4da975adc93003243eae95ce6e16603dac925823abfd9a,2023-08-14T13:38:48.893000
|
||||
CVE-2023-26311,0,0,a53302d4b1bc0fe51715261bd00ff42e22fc0ce6f61dd99c4e9bea1fdf7a9e70,2023-08-15T18:59:47.580000
|
||||
CVE-2023-26314,0,0,6effb9b6980e0bc6f3ed2f4a9c1dd25114a29ad0ef15b8bc6dd364afeaa586ec,2023-03-02T20:03:30.170000
|
||||
CVE-2023-26315,0,0,fbd02cf24034f691d1cabd0fe46af320ab6c0d1abc32b9fbeda3b01ea3198c63,2024-08-26T12:47:20.187000
|
||||
CVE-2023-26315,0,1,7e3ab4d47f5232ab5703d804bcec5bfd7f9220cde67501bbc57773ca3ee6bedd,2024-09-06T22:25:54.637000
|
||||
CVE-2023-26316,0,0,b25055cc7c5cea8ff22d07e70ae7c2d4333af8a0444497a6d65e59a6b9965ec0,2023-08-07T18:01:47.890000
|
||||
CVE-2023-26317,0,0,4436e84cd6ff81a4e8afb76597369a2fd42bffc02b7acdc50dcdee19196a2376,2023-08-07T16:18:22.053000
|
||||
CVE-2023-26318,0,0,d49830620df46f2dde3da449a5ab4d59351f38e41e437bccf559cb5c96c8a3d5,2023-10-16T19:00:41.267000
|
||||
@ -229599,7 +229599,7 @@ CVE-2023-39277,0,0,ba1a506de93531243b1a6840927d3d5ce9ac7cde2d3aa11edc7f0d5f21e31
|
||||
CVE-2023-39278,0,0,51f0307dfb979d2053bc04773faeed7c8885e53af279fab9559ab2a2eec93b7c,2023-10-19T16:44:45.767000
|
||||
CVE-2023-39279,0,0,fac9fdc9f09ef37ef90e8e828c858c7233aab9273c23f45c53d69d06ba06aeca,2023-10-19T16:44:41.193000
|
||||
CVE-2023-39280,0,0,f66c01ff590a5a33540c5b722d4caadbcd584ceb11eb4eb0993b46f0de37246a,2023-10-19T16:44:36.887000
|
||||
CVE-2023-39281,0,1,1874434dc4ec2eaf4186681608efa6a16522c7873635fa24daa4a6f44da1496f,2024-09-06T20:35:07.887000
|
||||
CVE-2023-39281,0,0,1874434dc4ec2eaf4186681608efa6a16522c7873635fa24daa4a6f44da1496f,2024-09-06T20:35:07.887000
|
||||
CVE-2023-39283,0,0,33a7ba02530f9e8db4ad9f607c0258167ffb4c1905d4e9170764e0a5bf1db2a2,2023-11-10T04:12:27.713000
|
||||
CVE-2023-39284,0,0,dbfd936d99a876c85f63e2e96d78f73333cf4937bda6310a3f3095ec3afb155a,2023-11-15T20:32:55.707000
|
||||
CVE-2023-39285,0,0,96545ecda21d95bf4f40d74afea6ae328a7b9d29d6eb613dd7475e1a1a0c840a,2023-09-19T18:00:45.343000
|
||||
@ -234729,7 +234729,7 @@ CVE-2023-46480,0,0,e61260dcb44a3f60a5f4e1ec1c5341f4b741c38331825c54396f7541beaf7
|
||||
CVE-2023-46482,0,0,630ab76a1654184009f2c4141ee3045c1657f81f20ef48b367a71e569dd8a4ff,2023-11-09T00:56:40.200000
|
||||
CVE-2023-46483,0,0,a6b08a99a462418e2e5e3dfea60dc526a39e77684187df959a66ed804fa72e51,2024-09-03T20:35:03.777000
|
||||
CVE-2023-46484,0,0,1f8d63c7ddfe1eaa7ca1ffc9345766611214634a0c3a30ee307a44b4e8203940,2024-09-06T19:35:07.997000
|
||||
CVE-2023-46485,0,1,9801d9696802c8efc10f03c7b8cea0a738062f388bd2c085b548d2aa36166388,2024-09-06T20:35:09.900000
|
||||
CVE-2023-46485,0,0,9801d9696802c8efc10f03c7b8cea0a738062f388bd2c085b548d2aa36166388,2024-09-06T20:35:09.900000
|
||||
CVE-2023-4649,0,0,5746162f6fcba997b2a90f73734098878aa9162b445b6437a5e3725ea805bb35,2023-09-01T14:37:08.443000
|
||||
CVE-2023-46490,0,0,7572faf27c14631dc567fd10b90d8b8da5fa9678b69c09f03d211428cc7ea703,2023-11-13T14:30:41.820000
|
||||
CVE-2023-46491,0,0,59e819e8800151e51f1f82f3c48345bc286d5502f13a3e02ae0077f28fc2c091,2023-11-03T20:23:49.313000
|
||||
@ -235094,10 +235094,10 @@ CVE-2023-46964,0,0,0d7def73494b6867df0b91db2d842e5c633f4a9bb171d96b528d1e1045602
|
||||
CVE-2023-46967,0,0,8e0dc51372022fead7ea238ca0342fb708c07b5a138f4ce2e8f8fcb4db9359c9,2024-08-06T17:35:01.070000
|
||||
CVE-2023-4697,0,0,5cd6e03e2cabe495720e6ef9b63c46f9baf3a0316a8b4b482e402bc10576e126,2023-09-01T13:07:07.767000
|
||||
CVE-2023-46974,0,0,0b604dc4e986a27c2206d301607504c33793e4001240929900dcff4d61e041ee,2023-12-09T04:51:31.277000
|
||||
CVE-2023-46976,0,1,3b32e217954a43183a3da831b4e8da9b146568c9a89ac458ec88563772adf972,2024-09-06T20:35:10.803000
|
||||
CVE-2023-46977,0,1,43f7688072581fa12cf48597f3669a381013f7206f3ad1a6cb54258132aaa8ff,2024-09-06T20:35:11.550000
|
||||
CVE-2023-46978,0,1,a4fc554a62aeb85604d3256754afbbeb9a8b11fd08d3f484459b6520d26968c0,2024-09-06T20:35:12.317000
|
||||
CVE-2023-46979,0,1,6a36e4406edd653e24fafa4b26e51f2757f62ad2690f05fb13c8cf8e7a6bd8c7,2024-09-06T20:35:13.130000
|
||||
CVE-2023-46976,0,0,3b32e217954a43183a3da831b4e8da9b146568c9a89ac458ec88563772adf972,2024-09-06T20:35:10.803000
|
||||
CVE-2023-46977,0,0,43f7688072581fa12cf48597f3669a381013f7206f3ad1a6cb54258132aaa8ff,2024-09-06T20:35:11.550000
|
||||
CVE-2023-46978,0,0,a4fc554a62aeb85604d3256754afbbeb9a8b11fd08d3f484459b6520d26968c0,2024-09-06T20:35:12.317000
|
||||
CVE-2023-46979,0,0,6a36e4406edd653e24fafa4b26e51f2757f62ad2690f05fb13c8cf8e7a6bd8c7,2024-09-06T20:35:13.130000
|
||||
CVE-2023-4698,0,0,f67219d933e95e412da2b616588dd9f7b8818435fbd1498ccb40e5f4049ed99a,2023-09-01T13:07:30.360000
|
||||
CVE-2023-46980,0,0,cc67874b097e0fe762ff091e7672831ece4fc0faa50aca2caad3a6a3a1cb63e5,2024-09-06T14:35:08.953000
|
||||
CVE-2023-46981,0,0,865ec0b7ef3df7198714d9479b263e54d44d5181af5d1cf0172c63bfd8768173,2023-11-13T19:37:07.107000
|
||||
@ -235105,8 +235105,8 @@ CVE-2023-46987,0,0,374b064ecd125c9b3c77e3133bffffe989aa2b01517a094fbc764346da32f
|
||||
CVE-2023-46989,0,0,fd52fc2c8815b71d6a3aa76a5b70a3b0954c93b4887d037a1f94f52ffb7b26c9,2024-01-04T17:14:27.397000
|
||||
CVE-2023-4699,0,0,d7688971433e3a13914d674e0541b168882cd0e762c29ec4bad4b4f1236c3109,2023-11-14T19:10:18.253000
|
||||
CVE-2023-46990,0,0,ce43f0fc3bb795f8d83320e9a48981a22398e3c8dcf2800cd3722d82e4112167,2023-11-28T21:59:25.917000
|
||||
CVE-2023-46992,0,1,d215b6f8d4c730393fd9a8c7825d0c451c3046c57aecea0ee0af590c2c4eca07,2024-09-06T20:35:14.107000
|
||||
CVE-2023-46993,0,1,345b57a0f6b34073fa8800603bdf10a7fd580e2443040efea05347af1d1b5306,2024-09-06T20:35:14.960000
|
||||
CVE-2023-46992,0,0,d215b6f8d4c730393fd9a8c7825d0c451c3046c57aecea0ee0af590c2c4eca07,2024-09-06T20:35:14.107000
|
||||
CVE-2023-46993,0,0,345b57a0f6b34073fa8800603bdf10a7fd580e2443040efea05347af1d1b5306,2024-09-06T20:35:14.960000
|
||||
CVE-2023-46998,0,0,6e25fd61c866543a07d01980630aaacdfbd481c71dfffbe0cc0eec62842e2dce,2023-12-20T20:09:44.320000
|
||||
CVE-2023-4700,0,0,54f537d8bd565ac9e7043f20cc4db7f0e44d4a83a7ddcc004638adf6277a6d5a,2023-11-14T20:00:25.203000
|
||||
CVE-2023-47003,0,0,3bceaa921e377ee6166234257569cfbd597868e87e0fb9bbf1a2f34b3fce5f8b,2024-08-14T19:35:11.287000
|
||||
@ -238946,7 +238946,7 @@ CVE-2023-52531,0,0,139c545d33ba10eb3343fe2ebed8bb6f85f222cd821926b67d690a1cf30ff
|
||||
CVE-2023-52532,0,0,299d7cb56f6a6c17487eae201e2d466d368011ffa4a3b859f2f2a268babbfcfe,2024-03-04T13:58:23.447000
|
||||
CVE-2023-52533,0,0,87288d9acffdcc3f04e0528abc716d93f9a78d72735b2ac13e2dfefa20c9889c,2024-08-26T18:35:02.780000
|
||||
CVE-2023-52534,0,0,561b04782ad233f3a992132df8769a7ea9cca6fb96df63b18027307d5770e0c6,2024-04-08T18:48:40.217000
|
||||
CVE-2023-52535,0,0,fe6b3187a44c437c26ab3318b1139c9091f6bec389d5c218d94a801b45cfd652,2024-04-08T18:48:40.217000
|
||||
CVE-2023-52535,0,1,a8b46149ce833cf00e265bd878fbc4e9f6f9152b7344f1759d13bc7224de07eb,2024-09-06T22:35:00.460000
|
||||
CVE-2023-52536,0,0,31a4fc764ec17dfd98dd3f2041aa9cf3362d0496d5ba27ab57e1ac620a9f85cd,2024-04-08T18:48:40.217000
|
||||
CVE-2023-52537,0,0,2559d90b1b1794296f22fc0badef4074c5581bcf37f52502d595b11857600810,2024-08-01T14:35:02.953000
|
||||
CVE-2023-52538,0,0,9c269667a219bd0a186db35ef8e2818d381c8926a2b266c9f2e28d3c047bb2ee,2024-08-01T13:45:38.693000
|
||||
@ -245331,7 +245331,7 @@ CVE-2024-23494,0,0,1761cecf4d1aa42fc2142275287576a82851a4af1416d215b879da20539b4
|
||||
CVE-2024-23495,0,0,3343f5ee522cdf1bf3831719df667c337f0dd432d4bf69c58d9e4b3f2cc7f568,2024-08-31T03:38:43.080000
|
||||
CVE-2024-23496,0,0,c3856130b65624b5767002912c0501b965e2549e4b94367c7a809441839aa00b,2024-02-26T18:15:07.580000
|
||||
CVE-2024-23497,0,0,7141d52f3f16ac03f06f3ea37af329ea1f4b81b12e27f099e14cb8aa990ac67b,2024-08-14T17:49:14.177000
|
||||
CVE-2024-23499,0,1,351ed9c1ca3148c2c989549db13cddbea86ce2f99d15546ec7ae8fbdde1e39ca,2024-09-06T20:43:04.353000
|
||||
CVE-2024-23499,0,0,351ed9c1ca3148c2c989549db13cddbea86ce2f99d15546ec7ae8fbdde1e39ca,2024-09-06T20:43:04.353000
|
||||
CVE-2024-2350,0,0,b224bf65ace6a631c4679b3350fe7c7082c8e455c9408f918ff58e10f6a6fd6a,2024-07-25T12:57:24.040000
|
||||
CVE-2024-23500,0,0,9f0ca72522aa1768710bac3d52af84b3704000817095134026ac1a86c6c1c178,2024-03-28T12:42:56.150000
|
||||
CVE-2024-23501,0,0,e5aebbfbd9d9417005e3d705da6a35d8860fa8db7dc1ef11a82d27e4462980c8,2024-02-29T13:49:29.390000
|
||||
@ -245692,9 +245692,9 @@ CVE-2024-23902,0,0,23fa1c3089afd507b048db06e4ea2ffdd19863f614f27f719de97ada3a6cc
|
||||
CVE-2024-23903,0,0,46f92003a51fde0f978d2b6023e8270332b2634481c35191ff5ffb1ffce33c63,2024-08-29T20:36:08.670000
|
||||
CVE-2024-23904,0,0,a951ec872dbe283943db2cda1f329d6103f39dc8a3dbbab6b3bff9a6b9e2af38,2024-01-29T19:26:29.770000
|
||||
CVE-2024-23905,0,0,a35e7dacddd2c1f3b32033e91045b0ad026e0a51c2fa232b2e0b46787dc2be1c,2024-01-29T19:26:11.517000
|
||||
CVE-2024-23907,0,1,0cc1665330e952366866888dfdc7237aa87fdcd95bb20538ca6e0b49e80090fc,2024-09-06T20:38:29.490000
|
||||
CVE-2024-23907,0,0,0cc1665330e952366866888dfdc7237aa87fdcd95bb20538ca6e0b49e80090fc,2024-09-06T20:38:29.490000
|
||||
CVE-2024-23908,0,0,8bfe961f2cd2fcb2503f4aff8306f89c58f7b0b3f54719b8f5407f1616c019ad,2024-08-14T17:49:14.177000
|
||||
CVE-2024-23909,0,1,553111dd06cef2fea922046bd97385fac9dc9e02c030684ae1bbf37bf08d132e,2024-09-06T20:33:05.670000
|
||||
CVE-2024-23909,0,0,553111dd06cef2fea922046bd97385fac9dc9e02c030684ae1bbf37bf08d132e,2024-09-06T20:33:05.670000
|
||||
CVE-2024-2391,0,0,60da3844b5911777951235a640805c94e8dc2cfa119cea41ed5149fa8aa45d94,2024-05-17T02:38:12.397000
|
||||
CVE-2024-23910,0,0,21defb9e6d6dbf8d0f521ec76503d783a0a5ec9ee34bb29da0316f9a979d5f65,2024-08-01T13:47:21.280000
|
||||
CVE-2024-23911,0,0,fdddcb19f4466c54e569787b1df836a5978efd401f095a2d3642663fd0df94ef,2024-07-03T01:48:10
|
||||
@ -245724,7 +245724,7 @@ CVE-2024-23978,0,0,b11564d73d018e8762d289ccbaa0f5f641bc89f2639fd60e4b0e0ef314e8b
|
||||
CVE-2024-23979,0,0,6fdd5509f38519be7582661a9525c018d02e080bbc0d3ec491dc3a617317722d,2024-02-14T18:04:45.380000
|
||||
CVE-2024-2398,0,0,1df50a613e2f34671ada45040fb8ddc3d4f8857a9d7670bf2946d253e5c24780,2024-07-30T02:15:05.450000
|
||||
CVE-2024-23980,0,0,bf2b71f939973eb2601ccef55cf253f9d61b06b906f33487d035e08b35f3546f,2024-05-17T18:36:05.263000
|
||||
CVE-2024-23981,0,1,6986b178e2ea3287638a3d1f9ab311d36d0d1884ba34669bf9e0c674564a83dd,2024-09-06T20:27:57.367000
|
||||
CVE-2024-23981,0,0,6986b178e2ea3287638a3d1f9ab311d36d0d1884ba34669bf9e0c674564a83dd,2024-09-06T20:27:57.367000
|
||||
CVE-2024-23982,0,0,e20dba7ecea0c7b0131ca1d7f8e3faacb630088896c2abfd0452f78392132abf,2024-02-14T18:04:45.380000
|
||||
CVE-2024-23985,0,0,8249d0d4805632d5c5b5c3e0e9d62d8a14497ce894e5db21c14ac796aaeb2e32,2024-02-01T17:33:41.777000
|
||||
CVE-2024-2399,0,0,6767e789c5e7e80586d75b3b6704c8a0508ed89afe73da734c95859ddd63a842,2024-03-15T12:53:06.423000
|
||||
@ -246292,7 +246292,7 @@ CVE-2024-24978,0,0,b182fc4dea5fb8dabebc670a8efcee22aa4dd4621b4f7e4a6eb2d8d06cf52
|
||||
CVE-2024-24980,0,0,3fdf73457b919755fcf59939500686a4e764152c575eabbdfb315f29409758ab,2024-08-14T17:49:14.177000
|
||||
CVE-2024-24981,0,0,4778c6815162129c19c427caa98fb743cbc1e80e4ace882077c64de825799123,2024-07-03T01:48:32.340000
|
||||
CVE-2024-24983,0,0,e552e4af213b0ab57adb4ba19aeb0c4530827148e23a2e1c19c3f213b7957135,2024-08-14T17:49:14.177000
|
||||
CVE-2024-24986,0,1,77b300319c7ee1ccc9e61dd316d3dcaa5e475b38e28730cee5e5deb88cc75c00,2024-09-06T20:23:48.690000
|
||||
CVE-2024-24986,0,0,77b300319c7ee1ccc9e61dd316d3dcaa5e475b38e28730cee5e5deb88cc75c00,2024-09-06T20:23:48.690000
|
||||
CVE-2024-24988,0,0,9e4f6f88273498e8474a945212f722bcba31b159d34f99737f4277d72dd9fb6e,2024-02-29T13:49:29.390000
|
||||
CVE-2024-24989,0,0,81a2a87b35bcbca4ec34d5e22214bdf976ca0d87c889c16ca05e31de151ff5e5,2024-06-10T17:16:21.607000
|
||||
CVE-2024-2499,0,0,8ffef5ee2ad79ac60ba3298cecf691939796c05eb8a23e6745e9e8cfbf777b2d,2024-04-08T18:49:25.863000
|
||||
@ -246644,7 +246644,7 @@ CVE-2024-2557,0,0,dc8b54b171bbdaa8e41888d89825f630dc10d84a726786b12c4c722ec5ac93
|
||||
CVE-2024-25572,0,0,a19a9cf36c077c05dc278f38e37ca145a9759fc24272e685a0d3f0ff41385f00,2024-07-03T01:49:10.700000
|
||||
CVE-2024-25574,0,0,65726bda902fec4a9a49461993a5b1f1f19b916c575dd539bf5599a6d815d8df,2024-04-02T12:50:42.233000
|
||||
CVE-2024-25575,0,0,2e4887ee13b995216d77350689726b7532b0325e739fa8baefbe39600a3f9674,2024-04-30T17:52:35.057000
|
||||
CVE-2024-25576,0,1,240625f6b8a88df530eb19373f437c5caaffca27a3660adad03735e0e821105e,2024-09-06T20:17:14.003000
|
||||
CVE-2024-25576,0,0,240625f6b8a88df530eb19373f437c5caaffca27a3660adad03735e0e821105e,2024-09-06T20:17:14.003000
|
||||
CVE-2024-25578,0,0,0d1f2ffd4e03b50b29ccf39cdb2058ba91ae7a7cb01bdc49fe129aadbabc71e4,2024-03-01T14:04:26.010000
|
||||
CVE-2024-25579,0,0,e18a976cb7cc873665c4cde29595232519ed1d6333d6b865b6ffed467db01627,2024-08-28T16:35:14.267000
|
||||
CVE-2024-2558,0,0,4df4f161b02ab0ee082928d86d735f9684058e2b58c51335b3ee6abb912b22ce,2024-05-17T02:38:18.947000
|
||||
@ -246970,7 +246970,7 @@ CVE-2024-26018,0,0,504335bbc761c181e6e0e6311b5c9a67674f4d2e194452a2b54f2b4e56156
|
||||
CVE-2024-26019,0,0,c8f3817ebef24fc08c083645b2146c067190c6ce99f258e914d83a748ccfa09f,2024-04-11T12:47:44.137000
|
||||
CVE-2024-2602,0,0,68545756683921883a71e009514104eaecb0a76db274a20107afd513be41a06e,2024-07-12T16:39:51.080000
|
||||
CVE-2024-26020,0,0,c3af68fd4e405a95ac1ee216ac5199ad392060554e72b2c1dedcf9e863dfab9a,2024-07-24T12:55:13.223000
|
||||
CVE-2024-26022,0,1,a26ae471637132c4dd9ca0e595e7538384876862971be53dda4b80cd7b3fdc6d,2024-09-06T20:16:27.330000
|
||||
CVE-2024-26022,0,0,a26ae471637132c4dd9ca0e595e7538384876862971be53dda4b80cd7b3fdc6d,2024-09-06T20:16:27.330000
|
||||
CVE-2024-26023,0,0,edcfd807fdc96925d4b0905ae74cd6e42a43795e1d81a6569987258b521eef13,2024-08-01T13:47:58.927000
|
||||
CVE-2024-26024,0,0,3ab60f6be938f975935e53b7a80711b98fe8d56f189e7148a76008394bc4ac8a,2024-05-29T13:02:09.280000
|
||||
CVE-2024-26025,0,0,3352cb4bf9ea0c839d1741e6282396ec44178b4e8d69bb56155c91bf1b50fdf8,2024-09-06T18:54:37.007000
|
||||
@ -249033,7 +249033,7 @@ CVE-2024-28751,0,0,befef9aaad239486418cde9be9e0a53c20b96e9db24dd8e70484385d86fc3
|
||||
CVE-2024-28752,0,0,201eab5c3984ec2eeccdd8a718f765ccc577edf4cb5cdd6dc7af0c666b0e95ca,2024-08-01T13:49:17.413000
|
||||
CVE-2024-28753,0,0,9b7534424fcafcef08233e24d8609288fcd5326b5da35fb8ff9f88b8b46d19e0,2024-03-11T01:32:39.697000
|
||||
CVE-2024-28754,0,0,b825517ec09be0ea62da6389e64d9784f7fd2758d87d7ecb524c18a858c8d2f8,2024-03-11T01:32:39.697000
|
||||
CVE-2024-28755,0,1,7f7a5eee206773c4b8bc290c39f99033ca2e1f286ed871f0f054c7ca41a01f53,2024-09-06T20:35:16.367000
|
||||
CVE-2024-28755,0,0,7f7a5eee206773c4b8bc290c39f99033ca2e1f286ed871f0f054c7ca41a01f53,2024-09-06T20:35:16.367000
|
||||
CVE-2024-28756,0,0,382afa2a84e7631da7af99644d58f88393f4012cb74b7d61efdfef4f7d7e8fc8,2024-08-28T14:35:10.690000
|
||||
CVE-2024-28757,0,0,38e35916340cc7b59636f71fd12bb6c865345cd709ec2ad97abfbd0121697391,2024-05-01T19:15:22.567000
|
||||
CVE-2024-28759,0,0,dcdc9bf6250fc5bc69b9326038bec864cb143a6aab76dd04534ae889181ed6fb,2024-05-14T16:13:02.773000
|
||||
@ -250546,7 +250546,7 @@ CVE-2024-30799,0,0,d0be2d0f006d2c4f92e204846e2ae37ca4e292273d3e14437b5fe8a98380d
|
||||
CVE-2024-3080,0,0,6986301309c9922bc02fa19392bc6067c49e953b2f624eb66756f4ffea7fbe9a,2024-06-17T12:43:31.090000
|
||||
CVE-2024-30800,0,0,c159abf1d20ef9221dca0ce07749c41b848d269f6d72d244107e748c6895169d,2024-08-01T13:50:26.523000
|
||||
CVE-2024-30801,0,0,79037a49ae58d0454d89f94ba313d584f276e2894821b324a5e75dde95008219,2024-08-15T17:35:05.230000
|
||||
CVE-2024-30802,0,0,37683b49f88fa426fcec7397572b9c76113c55e23f5ab472e56f33731e38df96,2024-05-14T16:13:02.773000
|
||||
CVE-2024-30802,0,1,1376f3b4e3d1d6ed6e73bef87767a1a17df2d57663c8be14203281e52f5ae9c3,2024-09-06T23:35:00.597000
|
||||
CVE-2024-30804,0,0,0f43430d25009eadae7caa97b23b35ddd86648f9eae82b9b828a91f9ed0e4773,2024-08-22T19:35:22.260000
|
||||
CVE-2024-30806,0,0,d64ba375e8a4aee4aa1348cdd3ca4e1493d138147be36aa2ff70b6291ff84259,2024-09-04T16:35:07.870000
|
||||
CVE-2024-30807,0,0,4152651982bff689cfa963c375e94b647d4d42e48408c3cb0b93ed4cc183ecd1,2024-04-02T20:31:58.463000
|
||||
@ -250610,7 +250610,7 @@ CVE-2024-30929,0,0,7150ed17033c783d22cb10cc7e29801b4cdbd11e710f0261447b2fe790494
|
||||
CVE-2024-3093,0,0,fe746195c4e2001fde57b14e03afb6f54529d797bc86f2aa9c4028e9fadd8f82,2024-05-07T13:15:48.260000
|
||||
CVE-2024-30931,0,0,1c68d82180e73b8514f26d33f19b69f95be31480b9f9d1b6b39915134b180669,2024-07-03T01:54:23.343000
|
||||
CVE-2024-30938,0,0,29b8e40617dee21c8890e6dc6801cc20a4d0cd635b3d627aba79e0fa49cbd6d1,2024-07-03T01:54:24.137000
|
||||
CVE-2024-30939,0,0,533ddd8e3c3323adc4540b47a20f0ad2914d0e15fa0a4366e01edaff34cffd58,2024-04-26T12:58:17.720000
|
||||
CVE-2024-30939,0,1,4fde734a2c1073b7ace1dcb3955f64c312d3d3cb950014608581b57b7c19af95,2024-09-06T23:35:01.567000
|
||||
CVE-2024-3094,0,0,98d623c51c3718f594d063257facb535556f13c6eb9aedf81f112b165abed8fb,2024-05-01T19:15:27.340000
|
||||
CVE-2024-30946,0,0,7c64f57becf760e1029c7f17f5554dd3b55e452eafcf4a611ce8a9042ae36380,2024-07-03T01:54:24.920000
|
||||
CVE-2024-30949,0,0,202e32279483c8a9ccf9bc2c69e9e5054a0d5627a3e5e9f84dfb1934bcd5644c,2024-08-21T15:48:31.937000
|
||||
@ -250652,7 +250652,7 @@ CVE-2024-31012,0,0,ad29bbd0b94faf76dc619f91628d5426bf4af8e806ebef2aed88b1cbb982c
|
||||
CVE-2024-31013,0,0,bb000ff328032a4f208d94fb503825f394fb805157b8cf8e3eb34f87d47ca3d9,2024-08-01T13:50:40.203000
|
||||
CVE-2024-3102,0,0,b23588dfddb3d82632a71207907da6ef98bd35bc4bfa522f8686e7f4473229c0,2024-06-07T14:56:05.647000
|
||||
CVE-2024-31022,0,0,c7e2196fc2144529ae779b7c6081e3f8d64391691f708665471ce7a0ce765e5a,2024-08-01T13:50:40.970000
|
||||
CVE-2024-31025,0,1,266f5a8ff7b60cbaf297d43ee22e31a9e1b96dfba0c06978e4170eac2ee8bd02,2024-09-06T21:35:12.560000
|
||||
CVE-2024-31025,0,0,266f5a8ff7b60cbaf297d43ee22e31a9e1b96dfba0c06978e4170eac2ee8bd02,2024-09-06T21:35:12.560000
|
||||
CVE-2024-31030,0,0,55e23e64b3707eab4de6e94c5df81025e4c96cb6796b4cba9a4e287691f568e8,2024-08-01T13:50:41.730000
|
||||
CVE-2024-31031,0,0,22dbfc8ddbe94926f4450ce3680a694e3a6be4ac1b04af44fb2aad33642532ec,2024-07-03T01:54:34.620000
|
||||
CVE-2024-31032,0,0,9dc46c99afa3eb3462c2c2bb3d13abfc32da42b12a1aa1cfc0db0d7d5a534d98,2024-08-22T19:35:23.210000
|
||||
@ -251115,7 +251115,7 @@ CVE-2024-3167,0,0,0e0e401d957a36adf31f389f0d7fa47f7901c0598b7b2fd42d4c75bdbdd76e
|
||||
CVE-2024-31673,0,0,958f02eb1f314a421c4e692d99797c4d8f0e196e848d56cb014d5e77e7fc54c5,2024-08-05T19:35:12.297000
|
||||
CVE-2024-31678,0,0,45c8b2607673d8af8b3ec231962e66bcea8064211e1867ed0addb4c93b773839,2024-08-01T13:51:04.350000
|
||||
CVE-2024-3168,0,0,e53f03656f19e0e47c6622c3da3e06f5dd93aaeae623b38784e05f0c565a375b,2024-08-01T13:56:21.960000
|
||||
CVE-2024-31680,0,0,7e1908b87f42141dc482d017d5b62a6782bb8342605d50fe2c839034d8e94921,2024-04-17T12:48:07.510000
|
||||
CVE-2024-31680,0,1,c4628bff4524f4ba02ba3d3e5f2d1afd3e6b045a8d32604fb16cfbf01a187619,2024-09-06T22:35:01.557000
|
||||
CVE-2024-31682,0,0,80a6fa070deb0370560504b4fbd6eefe7a627d5dbcf4ad67176d2e92301ec450,2024-08-01T13:51:05.133000
|
||||
CVE-2024-31684,0,0,ad75a69893dade6ac7e684ae6347f5d7476c0bca032591c2e980bc01013d54f5,2024-06-03T19:23:17.807000
|
||||
CVE-2024-3169,0,0,b6d2ffb09103c8b8a3976e1d11af5d86787ae2ffc33eb4178c248279d95ed274,2024-08-01T13:56:22.240000
|
||||
@ -252022,7 +252022,7 @@ CVE-2024-32908,0,0,f22243bdf03341c4f49fe8c95d52c9746f5d3123ec78466cf58d8b7d93534
|
||||
CVE-2024-32909,0,0,1747a0b48751800c2e7098eeab32f86aca7912a949dd3414617c820a86f62b03,2024-07-11T15:05:52.807000
|
||||
CVE-2024-3291,0,0,1fc26be05fd4e8c0c75776f8dbce085d67ae03152f1c480f017ccf6b064046b2,2024-05-17T18:35:35.070000
|
||||
CVE-2024-32910,0,0,96fa2d9d7d031cd1f9c1fc15158945931873ec9256f8a9c2c7692b992096082b,2024-07-16T14:56:46.903000
|
||||
CVE-2024-32911,0,0,27d438335c273d9cab85185e9356d83b9e09719cfc0b2be8a5561f1c5c77b7f4,2024-07-16T14:57:13.803000
|
||||
CVE-2024-32911,0,1,3a0fef0abd5eab29360573b4c903482bbebef01629598c289909e1af8d4e6f74,2024-09-06T23:35:02.557000
|
||||
CVE-2024-32912,0,0,fd994f36adaadcf11decff8c54cb9ed9dfd2529041b080833bc870baeef2b9e7,2024-07-16T14:56:26.787000
|
||||
CVE-2024-32913,0,0,996f6595bdd5fe8c40fd4536473f9753d8a3be1f0d10e2434d28fb6144612388,2024-08-19T14:35:08.433000
|
||||
CVE-2024-32914,0,0,cbed74c6bf4e90dfcc109de77f32486ffc4a1bf4af82a04c39b30a381f81c36e,2024-06-17T12:43:31.090000
|
||||
@ -252614,7 +252614,7 @@ CVE-2024-33898,0,0,d8c3e8424b1aff6ae8a0fcc91c86b5228f2623afdea66b8b7db25938bc363
|
||||
CVE-2024-33899,0,0,215d012a0aeed617e9223e785f340f85e2514c39cf4a2326738c4b3613b1edd0,2024-07-03T01:59:09.200000
|
||||
CVE-2024-33900,0,0,269cc21c173c9c584795c12f1ce91d2738b696474fbebedc5c423a95f8259b67,2024-08-02T03:15:33.783000
|
||||
CVE-2024-33901,0,0,a1f0948d73a23ff6210c02030912794a258b1439fa01bfbefd0ef5985673396e,2024-08-02T03:15:33.887000
|
||||
CVE-2024-33903,0,0,66fa6f18457541069e9742d7224c491d6b0a223ce231b54f3cf8ba6c6e111733,2024-04-29T12:42:03.667000
|
||||
CVE-2024-33903,0,1,86a5cd54828614b1e7bfc3cb006bb1bc8de68743de80985523a5471be5cea7ae,2024-09-06T23:35:03.347000
|
||||
CVE-2024-33904,0,0,7f612cc39cf5cffef556560adbc4e6bcc771b421fa11cf86490b14ea4a43c0ba,2024-08-22T20:35:09.343000
|
||||
CVE-2024-33905,0,0,8733ae06a94637e7c1c0ff0f997c7e4ea1263aeaf349b0ccb59c2d115d8380be,2024-07-03T01:59:10.763000
|
||||
CVE-2024-33907,0,0,51edf1f50248f36c9e87b8d73ea1cc5abed4f93b57bba096b80e73be40374db3,2024-05-07T13:39:32.710000
|
||||
@ -252844,9 +252844,9 @@ CVE-2024-34148,0,0,39bc79113db1a4cb24c1e032d2832991ff9777a6aea1f2d179dc9afdce78b
|
||||
CVE-2024-34149,0,0,bc997c41063649e77025e7b523e84ecd9251e3e152bcf881c50ffb65d253004a,2024-08-02T03:15:37.863000
|
||||
CVE-2024-3415,0,0,34ccb97766fc5acac460b5429af5d66fea7f850526947b377f986615d31afcf6,2024-05-17T02:39:54.247000
|
||||
CVE-2024-34152,0,0,2436c8a621b0d09dd7154ff9aa9ad8e75fea3818a8a19b6b0802746c78436018,2024-05-28T12:39:28.377000
|
||||
CVE-2024-34155,1,1,16098580cbaff82b0c7090020256093dd240c2791e1babd972e5fb3d4ddc876e,2024-09-06T21:15:11.947000
|
||||
CVE-2024-34156,1,1,4ee5acde94d8bbc56dbdd2bde22f7f0d38dd09dd279009b64e363bf2a2a5d13c,2024-09-06T21:15:12.020000
|
||||
CVE-2024-34158,1,1,b5aaa917cff7ef86bde2c94b409b7991426ecb9453d606928df88e2bb83fb707,2024-09-06T21:15:12.083000
|
||||
CVE-2024-34155,0,0,16098580cbaff82b0c7090020256093dd240c2791e1babd972e5fb3d4ddc876e,2024-09-06T21:15:11.947000
|
||||
CVE-2024-34156,0,0,4ee5acde94d8bbc56dbdd2bde22f7f0d38dd09dd279009b64e363bf2a2a5d13c,2024-09-06T21:15:12.020000
|
||||
CVE-2024-34158,0,0,b5aaa917cff7ef86bde2c94b409b7991426ecb9453d606928df88e2bb83fb707,2024-09-06T21:15:12.083000
|
||||
CVE-2024-3416,0,0,a081ed6eeab1f8c610822f30cf17aa2151f535dbb3c22c142c8cc9d4a77c8f63,2024-05-17T02:39:54.337000
|
||||
CVE-2024-34161,0,0,bbdc550af4eb522ba0c0a49b8f0b0f2b8ab2486eb88097c00d555e9de7e4a0b7,2024-06-10T18:15:34.770000
|
||||
CVE-2024-34163,0,0,0359aa2bf9352c87fe65864c9b7813550ee369295a4e0ccc20c368017d1c80c6,2024-08-14T17:49:14.177000
|
||||
@ -253462,7 +253462,7 @@ CVE-2024-35119,0,0,0e35a45c77b11b12852790cdf89b3d7024286bc6ab2025f024aa0adc87ff1
|
||||
CVE-2024-3512,0,0,d94170bf3eeacc29f71f3655c6497a6a8a80969c9ad074c1a71bef4e5d51d46d,2024-04-25T13:15:51.663000
|
||||
CVE-2024-35124,0,0,934ed896994f221011d9d1e9fbaaa9455cb54cf4e40c6476e9a006a5cb4b67ea,2024-08-22T13:31:16.353000
|
||||
CVE-2024-3513,0,0,6ae7ede11126213bb060be770e97c10b68188b12ba1d1172b48d8935fa9e965c,2024-07-05T14:25:33.193000
|
||||
CVE-2024-35133,0,0,e6e600efbe6019a46042b8497356765bfde6faebef1427fb84fa89f43d45b975,2024-08-30T13:00:05.390000
|
||||
CVE-2024-35133,0,1,94682ccdd5820af4bb9202a3fe7f8708ae8d6add58e631948e27e68678fff48d,2024-09-06T22:55:33.543000
|
||||
CVE-2024-35136,0,0,3020783d3d271d3fdae4d9e8c7d963280063bef97bcec52f880461e4f52c833a,2024-08-23T19:08:06.993000
|
||||
CVE-2024-35137,0,0,77d476f5836ab7384f0bcce22116f35eb05878c239523b7719df59e2f7ac06d3,2024-07-31T20:48:10.727000
|
||||
CVE-2024-35139,0,0,b5d718d7cbc653a303c73da7348779dc88225aa141c22d6520f3ad7270cc6a42,2024-08-01T17:27:13.030000
|
||||
@ -255144,12 +255144,12 @@ CVE-2024-37484,0,0,5aa19fbeade225427f8be4047b53cf5aa423ef4d4466f797804f490d4e5cd
|
||||
CVE-2024-37485,0,0,a28d87feb836359698fd84c975d93a2c25e461c295a0332494f41ca668e6a305,2024-07-25T15:51:09.387000
|
||||
CVE-2024-37486,0,0,cf55487adcabeafd4a4ef78235d46e39d7a0cbef985b2f1b50f1d6c8b1afa29e,2024-08-02T20:35:14.243000
|
||||
CVE-2024-37487,0,0,326134cd41feff5ec6f404851524659a0bcd77d5c05096f40d7b132ca0985100,2024-08-30T21:19:20.460000
|
||||
CVE-2024-37488,0,1,fad03ef288403ea21b704ba7e4e89b6d9c5a40fb2c82414d8c2526d0c9547477,2024-09-06T21:24:24.240000
|
||||
CVE-2024-37489,0,1,7d67184809360fa706b40329dd6fff480ab2c0356505cffc07cc81b386b2f5df,2024-09-06T21:25:14.303000
|
||||
CVE-2024-37488,0,0,fad03ef288403ea21b704ba7e4e89b6d9c5a40fb2c82414d8c2526d0c9547477,2024-09-06T21:24:24.240000
|
||||
CVE-2024-37489,0,0,7d67184809360fa706b40329dd6fff480ab2c0356505cffc07cc81b386b2f5df,2024-09-06T21:25:14.303000
|
||||
CVE-2024-3749,0,0,b3391f40e1bcbcef1a08d3c4874bc14a907340ab4c3bf6aac04f7b2d59e58359,2024-07-03T02:06:31.950000
|
||||
CVE-2024-37492,0,0,f3971a670c66fc0fbc6bcf86ec5f1638cfe5a7702343a7218c60024704d58bab,2024-07-22T13:00:31.330000
|
||||
CVE-2024-37494,0,0,bb1430912d6aa0321558ee1d9d4f0c8cb5896005bedfb50082e08532d4e67d5c,2024-08-02T20:32:21.170000
|
||||
CVE-2024-37495,0,1,04aecffbaafcf85a77c5bcc572ea18dc4705b2313de79edcab2cafcd3fe72fda,2024-09-06T21:25:56.120000
|
||||
CVE-2024-37495,0,0,04aecffbaafcf85a77c5bcc572ea18dc4705b2313de79edcab2cafcd3fe72fda,2024-09-06T21:25:56.120000
|
||||
CVE-2024-37497,0,0,a5e078ff0e5f137ef0821d3799d044ca0d639a06d66db12953c2763c25fbc8d3,2024-07-09T18:19:14.047000
|
||||
CVE-2024-37498,0,0,3906b98c498ae3be512e51b42c4fa048b310c8a030ff54a6e9ec3a0bdb0a209a,2024-07-11T13:05:54.930000
|
||||
CVE-2024-37499,0,0,33077733cf962ec7124fd968ab822e83cb89a629fa94472ef274e5c155a1765b,2024-07-09T18:19:14.047000
|
||||
@ -255163,13 +255163,13 @@ CVE-2024-37509,0,0,f9e93ade29c9918317e48d188ce4960d290a72c7e104c763985255a9648c8
|
||||
CVE-2024-3751,0,0,ba887ac321a2bfaf7155c820936f84a156f9ef9329c91d46297abdea58a2350b,2024-08-01T13:56:40.890000
|
||||
CVE-2024-37512,0,0,b154a0241cfb0d8ca130eab910ec84648220c774892017c20117684126ece261,2024-07-22T13:00:31.330000
|
||||
CVE-2024-37513,0,0,1c07fcefcf90d83263e223acafda07d839ab3170ec7237f3cc19bf420f1c6cdb,2024-08-16T14:30:47.543000
|
||||
CVE-2024-37514,0,1,017431762cd806034c0397e7ba3b52966faa01f09615fd1c323b7b13e5887081,2024-09-06T21:26:30.600000
|
||||
CVE-2024-37514,0,0,017431762cd806034c0397e7ba3b52966faa01f09615fd1c323b7b13e5887081,2024-09-06T21:26:30.600000
|
||||
CVE-2024-37515,0,0,04cc8ac0f8833e2b36939b6215917d15f9cb9e17391e30434c678ba392c11039,2024-07-22T13:00:31.330000
|
||||
CVE-2024-37519,0,1,06297c4f20b9cadb68ce894a717e27e20a04a06c00ca9b94ef586bc751ac8651,2024-09-06T21:29:28.770000
|
||||
CVE-2024-37519,0,0,06297c4f20b9cadb68ce894a717e27e20a04a06c00ca9b94ef586bc751ac8651,2024-09-06T21:29:28.770000
|
||||
CVE-2024-3752,0,0,239ab2a4fa8a03a6a793fd7bad6c5508294cfd1be75f4ce013e63852e68d9c42,2024-05-06T12:44:56.377000
|
||||
CVE-2024-37520,0,0,1cad459c20e2d875630bdc07513eda15868aad6421fe450388baf16c360c4642,2024-08-29T18:39:02.407000
|
||||
CVE-2024-37521,0,1,92260650514ff9cc36fedb5b0e26b86efa3c3653012779fb5476fce986ce4885,2024-09-06T21:32:13.107000
|
||||
CVE-2024-37522,0,1,1b2f77530043cdcc607fe91a87e862ddc0dc48e27522ec3fb1bd31ea865c37b9,2024-09-06T21:33:02.857000
|
||||
CVE-2024-37521,0,0,92260650514ff9cc36fedb5b0e26b86efa3c3653012779fb5476fce986ce4885,2024-09-06T21:32:13.107000
|
||||
CVE-2024-37522,0,0,1b2f77530043cdcc607fe91a87e862ddc0dc48e27522ec3fb1bd31ea865c37b9,2024-09-06T21:33:02.857000
|
||||
CVE-2024-37523,0,0,95e87c6e9b764d7f190ed1df123d3a1fe4f39f3cc605d9d4771329a8df3befb4,2024-08-30T20:24:32.837000
|
||||
CVE-2024-37528,0,0,9c6980ff0d1442c5b7fd4f5e3f8ba4ae579879f3db1ec83280b9bd21a4726381,2024-07-11T14:49:28.177000
|
||||
CVE-2024-37529,0,0,f9accff698127aa01ca28b864c7fa6ff8749b3c683fd8343d39e26a6d0d3d7fd,2024-08-23T18:55:48.257000
|
||||
@ -255350,11 +255350,11 @@ CVE-2024-37894,0,0,5c3e1c011e44e5c8bcf6a6398118ad2efcba003a19994815d77c769e906a4
|
||||
CVE-2024-37895,0,0,83fc999b914f31ef5377ea2f4739df1f86727e09c7234e6711ade849e83102e2,2024-06-20T12:44:22.977000
|
||||
CVE-2024-37896,0,0,accc5cd71320f643f30fd3c58fb4ef952e3edd98e66520b2d1ebf95954392e5e,2024-06-20T12:44:22.977000
|
||||
CVE-2024-37897,0,0,eb358c8b4bf1d804a542a3de3cc644f3b57f51c972b900353c845858b20c9acf,2024-06-21T11:22:01.687000
|
||||
CVE-2024-37898,0,1,48ad19e1b9c6ab72c2a55d0111d8350370696bdef2f1e15844074d6b677b7bd6,2024-09-06T21:16:55.600000
|
||||
CVE-2024-37898,0,0,48ad19e1b9c6ab72c2a55d0111d8350370696bdef2f1e15844074d6b677b7bd6,2024-09-06T21:16:55.600000
|
||||
CVE-2024-37899,0,0,b15b2f0659684c15abe8d3b9fc90e954532acfe6178361a33640834566aa7b12,2024-06-21T11:22:01.687000
|
||||
CVE-2024-3790,0,0,54ff85acf33b27347b60794a0d91a04db9e5fdd7b0bb2899aaf68ff18e5328b6,2024-05-14T16:11:39.510000
|
||||
CVE-2024-37900,0,1,2fd5dd44fe4c1400ec72d3a6e323496bfc14e747150e8c52ec70fb9c5004f180,2024-09-06T21:06:34.223000
|
||||
CVE-2024-37901,0,1,7ba4e42556021b302fdecc554777630628b083580b29d09ee281a6a95b82f20b,2024-09-06T20:54:20.857000
|
||||
CVE-2024-37900,0,0,2fd5dd44fe4c1400ec72d3a6e323496bfc14e747150e8c52ec70fb9c5004f180,2024-09-06T21:06:34.223000
|
||||
CVE-2024-37901,0,0,7ba4e42556021b302fdecc554777630628b083580b29d09ee281a6a95b82f20b,2024-09-06T20:54:20.857000
|
||||
CVE-2024-37902,0,0,914ec46cc1273d7c21c7b2dab73f39d6c3f01e86944529e46279ac98efc57a11,2024-06-20T12:44:22.977000
|
||||
CVE-2024-37903,0,0,886576036d4d085b682af52548aacb4c341112369e14bf61e8ca80c2c202d58c,2024-07-08T15:49:22.437000
|
||||
CVE-2024-37904,0,0,4a1838bfa872e93babcec91edc2a58b1f777ff60512a3a43aa04f02c821270dc,2024-06-20T12:44:01.637000
|
||||
@ -255711,11 +255711,11 @@ CVE-2024-38402,0,0,0bfbbf50597e4077e5091de633e6f7dc9b2e3a47b37a9db75c35363f82e41
|
||||
CVE-2024-3841,0,0,8802855d3bfa5a1c81bb3b1500254989e91bb5a660a45184fb94e49c6e6b50a2,2024-07-03T02:06:40.900000
|
||||
CVE-2024-38427,0,0,8994acf8b0d2e9fdb11baea3df5edeec421ed8fa1c8aac7108ecf0d2784c04de,2024-07-03T02:05:00.507000
|
||||
CVE-2024-38428,0,0,e2b97f9d317b8a26d270b75eac229588c12ed4682b78a7b49e325a0c7069f57c,2024-08-08T15:05:30.617000
|
||||
CVE-2024-38429,0,1,c10e8ced8854fd8685412c45d492895eff59703298cb77e7d0526108d5505667,2024-09-06T21:38:04.370000
|
||||
CVE-2024-38429,0,0,c10e8ced8854fd8685412c45d492895eff59703298cb77e7d0526108d5505667,2024-09-06T21:38:04.370000
|
||||
CVE-2024-3843,0,0,f8304581ad62be18ba48d40e0abaf62c4d0e638c53e769e55d87254b71de405d,2024-07-03T02:06:41.770000
|
||||
CVE-2024-38430,0,1,1a296d96b0261a37f7877ae5b1666dcd3db3faea9a2a0f9613e8491365987413,2024-09-06T21:39:15.287000
|
||||
CVE-2024-38431,0,1,14b4403defebccfd4ffe89c9743c48305830cc6a4e2ac2bbc3e0ac4651e7fb53,2024-09-06T21:41:43.017000
|
||||
CVE-2024-38432,0,1,a57fb5b473d87c3852d9d382c609d40f396cea8b1e958d16b82eaf9758ceff8b,2024-09-06T21:43:36.463000
|
||||
CVE-2024-38430,0,0,1a296d96b0261a37f7877ae5b1666dcd3db3faea9a2a0f9613e8491365987413,2024-09-06T21:39:15.287000
|
||||
CVE-2024-38431,0,0,14b4403defebccfd4ffe89c9743c48305830cc6a4e2ac2bbc3e0ac4651e7fb53,2024-09-06T21:41:43.017000
|
||||
CVE-2024-38432,0,0,a57fb5b473d87c3852d9d382c609d40f396cea8b1e958d16b82eaf9758ceff8b,2024-09-06T21:43:36.463000
|
||||
CVE-2024-38433,0,0,f67092b0476b56495430d5a0a2004ef9f8edcc22248756a4bc924265edccd9ea,2024-07-15T18:26:30.693000
|
||||
CVE-2024-38434,0,0,4a8e238d88d3486572dfa29923d4eb1c064ff172ae0f1ad768133acfd895c782,2024-07-22T13:00:31.330000
|
||||
CVE-2024-38435,0,0,f20d01d49eebbc5ac4d21ace173944062cbdc481675d02e13da68c525504eca1,2024-08-30T20:59:05.307000
|
||||
@ -255925,7 +255925,7 @@ CVE-2024-3864,0,0,c7c600ab2d47995fde4727e677425dc294b0dc7019ce4f56ba3ea3d46f02c4
|
||||
CVE-2024-38640,0,0,0a9cd90ebfbe37ad1e2182183348d7a0f69130cdae9c1211d208c9fcc20b6758,2024-09-06T17:15:16.443000
|
||||
CVE-2024-38641,0,0,911194a65196a2372b31f65b46b0030ec8684f073af8b9dde60a51379b15a532,2024-09-06T17:15:16.550000
|
||||
CVE-2024-38642,0,0,0bad981e037cb7c53782d01ba764ae7638d3436cd6e0adf410e8b18a9609bdb3,2024-09-06T17:15:16.677000
|
||||
CVE-2024-3865,0,0,d6f5dd3766d85f1a043ebf5d3172442b73d2c19e5b446b7220941e0632bb3f23,2024-04-17T12:48:31.863000
|
||||
CVE-2024-3865,0,1,08b246bd9fb312136589a057fec6244b70e79a37ab7aa9f79462f36bc0eb0f7e,2024-09-06T22:35:02.500000
|
||||
CVE-2024-38652,0,0,c09b7df399ce36bfa6f99e496912789d409fa436d96980e8d3bf3eedfe5b5878,2024-08-15T17:32:39.067000
|
||||
CVE-2024-38653,0,0,c8ed77058a52701b560001b5f44bd7270c8687b6c4890948d6b9eaf03edfd74d,2024-08-15T17:32:57.587000
|
||||
CVE-2024-38659,0,0,7f018343721f0a1816fbc1d0de6ee38bcc05d21743970bb8a1218031b26bafff,2024-07-15T07:15:14.163000
|
||||
@ -256455,11 +256455,11 @@ CVE-2024-39561,0,0,2d6669fd46e5f06a296436c07948ef96b496b18cd802d54459b89b3379cbc
|
||||
CVE-2024-39562,0,0,e28be33d8ed9a3514708585e09c3a2a79edf6f92ad582e3763ed1e2ed2b7847b,2024-07-11T13:05:54.930000
|
||||
CVE-2024-39565,0,0,67e95ad66ccb875a343c94a008ae24e95d194b8d007cd8f237d44ba36352b116,2024-07-11T13:05:54.930000
|
||||
CVE-2024-39567,0,0,4a57ded9184af902b793d10964e38343dbe75d3e891132b111e62e60ba12ed7c,2024-07-09T18:19:14.047000
|
||||
CVE-2024-39568,0,1,f8994573b47195905c9ccbf8be81e7fc1ac765b7d83d3cc49f6dd1813186217f,2024-09-06T21:26:14.400000
|
||||
CVE-2024-39569,0,1,687e396635e4f2901591254e1b6191c3e6e1f055a04ea6bddeeda6b72621c623,2024-09-06T21:26:49.890000
|
||||
CVE-2024-39568,0,0,f8994573b47195905c9ccbf8be81e7fc1ac765b7d83d3cc49f6dd1813186217f,2024-09-06T21:26:14.400000
|
||||
CVE-2024-39569,0,0,687e396635e4f2901591254e1b6191c3e6e1f055a04ea6bddeeda6b72621c623,2024-09-06T21:26:49.890000
|
||||
CVE-2024-3957,0,0,6be73190d0db646071e408d26fd6054938440e63fb695d16249857bd78064902,2024-05-02T18:00:37.360000
|
||||
CVE-2024-39570,0,1,795cf07324f2cb8c6a570190fa22ff6767cfc3ce2b0050380d11d95a41e2ca40,2024-09-06T21:20:26.347000
|
||||
CVE-2024-39571,0,1,b35a4f00350faa538c88f4f6d224a7df8752eca1297d346f418e4963a4c09a43,2024-09-06T21:20:00.153000
|
||||
CVE-2024-39570,0,0,795cf07324f2cb8c6a570190fa22ff6767cfc3ce2b0050380d11d95a41e2ca40,2024-09-06T21:20:26.347000
|
||||
CVE-2024-39571,0,0,b35a4f00350faa538c88f4f6d224a7df8752eca1297d346f418e4963a4c09a43,2024-09-06T21:20:00.153000
|
||||
CVE-2024-39573,0,0,66fc7feceb0e35a8b2e536fb0fe145ff47c70fa679791c05a2dafe67c9ad9e6e,2024-07-12T14:15:16.400000
|
||||
CVE-2024-39576,0,0,b954c37b27403600557da0d261dd953de929a61b04f025c8697cd0d77090d715,2024-08-22T12:48:02.790000
|
||||
CVE-2024-39578,0,0,c57c67d60ebbfbb439cb464fedeceb835967a7da09b4f182842457f0862047f9,2024-09-03T20:56:11.277000
|
||||
@ -257572,7 +257572,7 @@ CVE-2024-41815,0,0,ba208e21e1cc4072b07e7947a406e2fc77ed18be9dcff08d15af01e0491d3
|
||||
CVE-2024-41816,0,0,ea0d789cdda6a3667e1a691465b22123d04bdab2604543ab9a518a3e01d84f0a,2024-08-06T16:30:24.547000
|
||||
CVE-2024-41817,0,0,c3e50103d6a8f469b4238c3f312796b0087815956d0c470348037696e81257f6,2024-07-29T16:21:52.517000
|
||||
CVE-2024-41818,0,0,4db2007d5d263ef00adddd9e1d74cef5ae3a3c480a8569b96e9fc77a6bc18e63,2024-08-02T20:17:01.807000
|
||||
CVE-2024-41819,0,1,1459cdf8f115364bd9f6605edf7c3ea9c16cff5892a2c1184e2ecde33d04039b,2024-09-06T21:34:29.067000
|
||||
CVE-2024-41819,0,0,1459cdf8f115364bd9f6605edf7c3ea9c16cff5892a2c1184e2ecde33d04039b,2024-09-06T21:34:29.067000
|
||||
CVE-2024-4182,0,0,0d8f83951a03e7673897d4b6402c0de2918a0bc9490e2ea7f1f32823e0e2921f,2024-04-26T12:58:17.720000
|
||||
CVE-2024-41820,0,0,66761f44932ba996701075032b581c0ebc2041a25ba2c4f14ccc68178ac408dd,2024-08-06T16:30:24.547000
|
||||
CVE-2024-41824,0,0,566dbbd1161c5c39870de656941ff3b3b11969b1e888b31722918c2b50080cfa,2024-08-07T20:46:14.917000
|
||||
@ -257662,7 +257662,7 @@ CVE-2024-41943,0,0,e9522f5ef1fc490dfac21cbf940a07ce3841f4fb783f1339fe71b8d4141a6
|
||||
CVE-2024-41944,0,0,135d3dced80bc39762656a548dac91a6dee89920c44affdb521ffafdd868d70c,2024-07-31T12:57:02.300000
|
||||
CVE-2024-41945,0,0,58045736441484d7b962c82a633dc9fabe3d1461c0f6ea954d229d59ebf06f9d,2024-07-31T12:57:02.300000
|
||||
CVE-2024-41946,0,0,0c8984641c723ad5c183e5dd0f3ccca9c504d7530b3c6a092508aec5b06adaf1,2024-09-05T16:09:45.503000
|
||||
CVE-2024-41947,0,1,0778bf62cfd1d78df175ba8432cda918a6d31369bf275494698802504a895693,2024-09-06T20:46:01.477000
|
||||
CVE-2024-41947,0,0,0778bf62cfd1d78df175ba8432cda918a6d31369bf275494698802504a895693,2024-09-06T20:46:01.477000
|
||||
CVE-2024-41948,0,0,95b8e7bd495b369e148a4aee32aaebfe7255dd0e1bf38771c2e96e2af8f6ed4e,2024-08-09T18:38:47.533000
|
||||
CVE-2024-41949,0,0,ca775db8fe7ff2b3f65a9b7415410183458d660652f7e7a24514bfd892cb0821,2024-08-09T18:32:53.153000
|
||||
CVE-2024-4195,0,0,1b874e811f63a88fe0e5040c0bc90d160eaa072aa139296a2fc692655a3d77a9,2024-04-26T12:58:17.720000
|
||||
@ -257680,7 +257680,7 @@ CVE-2024-4196,0,0,2bee927395e72028cfccdf65300c6a2b8979e20b943a96185278ab936245f1
|
||||
CVE-2024-41960,0,0,c90236af24fb252306d67097fab9fe370c116a0fe898aae960bb109a3075d5cd,2024-08-06T16:30:24.547000
|
||||
CVE-2024-41961,0,0,3c3cbde88cd825de8bae83de9e23bceebed48c0b620332721ebe0297499b9cbf,2024-08-01T16:45:25.400000
|
||||
CVE-2024-41962,0,0,db50354a8566471f488ea803a7a6894035b73491a2359165637f817d330c25eb,2024-08-16T16:34:48.873000
|
||||
CVE-2024-41964,0,0,00845ae65bb3534784c9b8fbbb60096d7620e97ac61d54d3b5042120c50027b6,2024-08-30T13:00:05.390000
|
||||
CVE-2024-41964,0,1,54621a6adee825c0636e7afd8773c219e1650b44db222dda2ec93364b11574bb,2024-09-06T22:56:18.010000
|
||||
CVE-2024-41965,0,0,2d1c3b12d760b98aa2eaba7bc040a10a4b90c52e44f9dfa32fdcb4160559d799,2024-08-09T14:09:32.507000
|
||||
CVE-2024-4197,0,0,45da0b07f911473fe59b939894a184bd20b4010bb74cc514ccd6533e9d15c77b,2024-06-25T12:24:17.873000
|
||||
CVE-2024-41976,0,0,28d622db4b0702423d465fd5f760fc3d4baf285e2f7024720bdb5fee42ef0c33,2024-08-23T18:40:16.173000
|
||||
@ -257698,8 +257698,8 @@ CVE-2024-42001,0,0,fcbbb9fe256b159250061e78a0e74ebb6632e1ed1a0fdada8381ebf9439eb
|
||||
CVE-2024-42005,0,0,31c6234f3daaff960ef384b4b5b21fd451482162fcdfabf6e4368a5912d0c3b9,2024-09-03T18:35:10.293000
|
||||
CVE-2024-42006,0,0,cac16dcebbdfd7db60164c8c9c083b31913f86e474f6e93c1530c3119039cdca,2024-08-21T13:26:54.577000
|
||||
CVE-2024-42007,0,0,e1546757cdc0e5c84d17bb4943631a838464f4ec8f81323b11df4d863b67b3f8,2024-08-01T13:59:16.630000
|
||||
CVE-2024-42008,0,1,239b4738ade78ee5cb428e4f0bc1011e17071df970bcf82670ecd9f70d12e2c4,2024-09-06T21:48:31.597000
|
||||
CVE-2024-42009,0,1,8775464dacf05b07f164d9bf135cafdb2ba4b40a363a5d9db69127bd2ae3f95b,2024-09-06T21:50:47.813000
|
||||
CVE-2024-42008,0,0,239b4738ade78ee5cb428e4f0bc1011e17071df970bcf82670ecd9f70d12e2c4,2024-09-06T21:48:31.597000
|
||||
CVE-2024-42009,0,0,8775464dacf05b07f164d9bf135cafdb2ba4b40a363a5d9db69127bd2ae3f95b,2024-09-06T21:50:47.813000
|
||||
CVE-2024-4201,0,0,ee0badf63a3e9c653031fb01c45e3bab9160ffb251dc5a875d128957347bb089,2024-07-18T19:39:50.667000
|
||||
CVE-2024-42010,0,0,f347d4c1e17b119f6d9851ca0a7b1b017e286c890135bf10b6afdc7ab31c6734,2024-08-12T14:15:07.370000
|
||||
CVE-2024-4202,0,0,614a40ef1052d861451b397b9533024f5e9aecccff7f20e945fab06926a9f188,2024-05-15T18:35:11.453000
|
||||
@ -258598,7 +258598,7 @@ CVE-2024-4368,0,0,ebedd608e412600f3409256680729c82fcf5015495435afd7648389243e696
|
||||
CVE-2024-43688,0,0,f39d1b1cd29869db949f77b65b174936ed5c42e4fb24c070ceb5bc7ef518b2eb,2024-08-26T14:35:06.680000
|
||||
CVE-2024-4369,0,0,9bcc319f475d5802b53d6dedcfa6ead4761cbf7c42adde8daf6f3ff8c0c17af2,2024-06-19T18:15:11.820000
|
||||
CVE-2024-4370,0,0,3c1f5b342c087fc6587c8bc9012541b58d80e50fdee9d14eea44daecdec82901,2024-05-15T16:40:19.330000
|
||||
CVE-2024-43700,0,0,fca232fae54c235f85f645739c5bbda87608d8ad0ce7d2e114cc15b4fe70f6e0,2024-08-29T20:36:51.570000
|
||||
CVE-2024-43700,0,1,7d9ad3bdf541499d627305e5fd2f4d5ebf1292f98ea79760d8a63eda3d4aed15,2024-09-06T22:52:41.727000
|
||||
CVE-2024-4371,0,0,a0b0e0fb8c98057b2328743d7da5c32e9a585001a67e08f1632ceab0df487dfa,2024-07-15T16:42:39.107000
|
||||
CVE-2024-4372,0,0,9ae4f43bf2d0d90214ce2e4715e0031799e31627a4319bb26ad2a73cf60988cf,2024-05-21T12:37:59.687000
|
||||
CVE-2024-4373,0,0,95ffe3cd6afce20664a5281c9740358c7cd9b7c7a4c9be8031ba5b0e36cac33d,2024-05-15T16:40:19.330000
|
||||
@ -258628,7 +258628,7 @@ CVE-2024-43798,0,0,0f4c51b4b2459096a21f79a4c43df1119a11b4e9a3f2bc6fda3ce5410f7de
|
||||
CVE-2024-43801,0,0,3057bc3523c59b7a2ce3a49766bca817655c19ea20647a6ae5a515942f4aa7c4,2024-09-03T12:59:02.453000
|
||||
CVE-2024-43802,0,0,e6e6b0823c543afdd24537863512362b0ca92682a64b51ee319640612d5e52b9,2024-08-27T13:02:05.683000
|
||||
CVE-2024-43803,0,0,d39ec93af35560ca8e8a0de326d7fde6d56bf46a552a9709abae1dbb94d4c159,2024-09-03T19:40:46.783000
|
||||
CVE-2024-43804,0,0,cbb7ec4946a5d9c01d82297dcb2398ad33b946487bfc0cd1cf2a7bd29341d9b7,2024-08-30T13:00:05.390000
|
||||
CVE-2024-43804,0,1,dfcc6bb057a0133a6590fad8e3f17989c092b880dfeea4c7e4ce29f3c77ba4ff,2024-09-06T22:57:01.697000
|
||||
CVE-2024-43805,0,0,8cc69a52f61e705cc1b61f3c5982ec9f82234c4fd7aecf6c96d7c935acee4e24,2024-08-30T15:56:16.477000
|
||||
CVE-2024-43806,0,0,541f1dd38cc99ea47f0a1d3247e689afdaff86c352817f08eb0b94af02655385,2024-08-27T13:02:05.683000
|
||||
CVE-2024-43807,0,0,3f91dd87019f53cf891d3a83100dd5c601626acd9f1336f0bde904afb8c4caa9,2024-08-19T21:09:42.313000
|
||||
@ -258841,9 +258841,9 @@ CVE-2024-4439,0,0,18d544a04352d4558f54a1793cd800ab605d9132c8464460d2f7ebbde183ef
|
||||
CVE-2024-44390,0,0,6367b383b322d2f53bd8e6d4e8d76904ca1c75a20fddee8fd1295aedac6b8243,2024-08-27T14:48:18.393000
|
||||
CVE-2024-4440,0,0,32e49728cdc055a1dbfbd90b8e03664859c56d56e36afdc46644ff6b145c71da,2024-05-14T19:17:55.627000
|
||||
CVE-2024-44400,0,0,46cca54dff368c30e19e4d79a9e5fc6607a7b0ccd1e0fdcd2b02aab471f7abd6,2024-09-06T16:15:03.030000
|
||||
CVE-2024-44401,0,1,ee2c4a2267c2b730b2023e7d052b9b36658db4f1e83370dcd2c9795a645f41ae,2024-09-06T21:35:13.733000
|
||||
CVE-2024-44402,0,1,b38946a6f0e5c6bfd13c5f46b6835ff57cc45dc65dbcc124685a3fc4210d5d2e,2024-09-06T21:35:15.770000
|
||||
CVE-2024-44408,0,1,79e6da73dfd60da300e8d621dc4645956a3af34e4d3870aab752a63a7e02ecfa,2024-09-06T21:35:17.720000
|
||||
CVE-2024-44401,0,0,ee2c4a2267c2b730b2023e7d052b9b36658db4f1e83370dcd2c9795a645f41ae,2024-09-06T21:35:13.733000
|
||||
CVE-2024-44402,0,0,b38946a6f0e5c6bfd13c5f46b6835ff57cc45dc65dbcc124685a3fc4210d5d2e,2024-09-06T21:35:15.770000
|
||||
CVE-2024-44408,0,0,79e6da73dfd60da300e8d621dc4645956a3af34e4d3870aab752a63a7e02ecfa,2024-09-06T21:35:17.720000
|
||||
CVE-2024-4441,0,0,ac0779300bad801b6c25a6a11418596c16f707acafd8505b85edf037d6de9dc4,2024-05-14T16:11:39.510000
|
||||
CVE-2024-4442,0,0,9c1eda6fa3435f8c4d08218c5481ff931fe1467531bf106c3f2c1021638ef5a8,2024-05-21T12:37:59.687000
|
||||
CVE-2024-4443,0,0,844cc6ae76fc91b0a9b2c7cc836e7c7382ecc4895f252d76709d68a22aac17cb,2024-05-22T12:46:53.887000
|
||||
@ -258907,8 +258907,8 @@ CVE-2024-4479,0,0,19a5d52fe32f562c79c648f88a021706b773334e3193aa8af739d9d0094fe3
|
||||
CVE-2024-44793,0,0,475809f13ca115bedace2b70621dd1b06c8befeab10468b4f5b0fa1c27241f87,2024-09-05T18:28:42.687000
|
||||
CVE-2024-44794,0,0,b452ddd5effb0ee34a112c584a56cc4850657b4ae996abe5b559863a6d239fc4,2024-09-05T18:28:09.247000
|
||||
CVE-2024-44795,0,0,2459dd83721718e1502976fd61ac15b289981ba6005e92e7c41d33d2e6b740f8,2024-09-05T18:26:41.490000
|
||||
CVE-2024-44796,0,0,ea2f83fd317230dba37a019c6df79333d03496931fcac69fc846f82ae10f3010,2024-08-27T13:02:05.683000
|
||||
CVE-2024-44797,0,0,7bc801096aef27df0c5244f5a3c761f34dc19dd9fff98d1b382da189467f2dbf,2024-08-27T15:35:18.880000
|
||||
CVE-2024-44796,0,1,2932c57e25f9e35c74ce36b128d46acb3231e7bd610d9d98769e690ee695d3eb,2024-09-06T23:35:04.340000
|
||||
CVE-2024-44797,0,1,045624a726ff5e1b8db30d7af17e11b2221f6b7d4bdca61ca2fe7511b3f6e808,2024-09-06T22:27:16.177000
|
||||
CVE-2024-4480,0,0,046ee1f51773a8c0ac4a6c81ddd78c147b0ada165d730df7b9b8d85146172347,2024-06-17T12:42:04.623000
|
||||
CVE-2024-44808,0,0,53ee5f88da9d15aa3ffd696fc5703153aab92dbb219aaccde4dc48186abdbb68,2024-09-05T12:53:21.110000
|
||||
CVE-2024-44809,0,0,424c650381a963ac60378eaa5a7cd36fd86829e33f994f3d0227dc416ec44e82,2024-09-04T14:35:12.707000
|
||||
@ -258921,9 +258921,11 @@ CVE-2024-44820,0,0,f15637d2ac032c543e5fcbbe9f5d1cb1b7c83c8e990be9337cf6d7655fcc3
|
||||
CVE-2024-44821,0,0,ff3428c7064f35632ec8516d4f1ffbf8326fb53cbc8ff73f0451f03ff4bad1c7,2024-09-05T12:53:21.110000
|
||||
CVE-2024-4483,0,0,d9fadea227cf106e149715592d31bb2d237147d959617b97c9049a0f6f95d28f,2024-08-01T13:59:31.397000
|
||||
CVE-2024-44837,0,0,253c4b98d471b14a46b3f3274bda3284d342567e55e989a3afe5e23485326395,2024-09-06T16:46:26.830000
|
||||
CVE-2024-44838,1,1,2159668e53931421004ef7f63efc6eecd8f2ac02a40ae2dabff642d324a59a36,2024-09-06T22:15:02.147000
|
||||
CVE-2024-44839,1,1,959d94abeeeaec1d019ee96b4425b53b7c7bad4a88fdd78dbb6e75a39d39b095,2024-09-06T22:15:02.210000
|
||||
CVE-2024-4484,0,0,f8c7c7a90ad9fb2504d28a2d6c05b973f8e6ce86f54104c89b314d37b71fcc46,2024-05-24T13:03:05.093000
|
||||
CVE-2024-44844,1,1,d5b523a8978a6ebedf01d85cd10b0ccea4097d23e938547b9d6c495c6f14e8c4,2024-09-06T21:15:12.160000
|
||||
CVE-2024-44845,1,1,ff18ab52379dc0931d16896a3679392539e78d16852233be39538265b14e027f,2024-09-06T21:15:12.217000
|
||||
CVE-2024-44844,0,0,d5b523a8978a6ebedf01d85cd10b0ccea4097d23e938547b9d6c495c6f14e8c4,2024-09-06T21:15:12.160000
|
||||
CVE-2024-44845,0,0,ff18ab52379dc0931d16896a3679392539e78d16852233be39538265b14e027f,2024-09-06T21:15:12.217000
|
||||
CVE-2024-4485,0,0,a27e77eb6786137f1ff33a4e5e44b17657a4b120ca60b51b6c6a25a52d6e7411,2024-05-24T13:03:05.093000
|
||||
CVE-2024-44859,0,0,361e21bdfe4afccedd32d666cb901903834fe5ed28d7a4a2b19923a7bb2e90ef,2024-09-05T12:53:21.110000
|
||||
CVE-2024-4486,0,0,ae6967e9ce7769ae98c2cf87c0bc0fbb14e19b3005ed8a961bec51e7089d074a,2024-05-24T01:15:30.977000
|
||||
@ -258937,7 +258939,7 @@ CVE-2024-44914,0,0,874292f6168813ddf8fc9647fc65bfb40df31b19e1ea4a9fdcd89de1a66d4
|
||||
CVE-2024-44915,0,0,599d20f62f376d9c9860ebd338604a632ba16d7b9219c3aadc9555ff97ab4b9e,2024-08-30T16:01:10.753000
|
||||
CVE-2024-44916,0,0,268f2c861c0c259cfc6a8f5831922421cd3f20b464855cae3b767189bdeba765,2024-09-03T12:59:02.453000
|
||||
CVE-2024-44918,0,0,3a0c5f40de5f64cdd7c350975f1e36ef79f8fc6234af40bbc8a6ef2e7aab0507,2024-09-03T12:59:02.453000
|
||||
CVE-2024-44919,0,0,4ce1b96ddb0a7c15b96ca851eaf197d01501859f99507e5fc4c267c2fc748b54,2024-08-30T16:15:09.720000
|
||||
CVE-2024-44919,0,1,ec1497e018c6f806f08d6bb2e463ee45aec94409b9fec3dcd0eb96daadbf42bc,2024-09-06T22:54:56.927000
|
||||
CVE-2024-4492,0,0,0237cea7742a82f916a95c7121fd101b19e30a52d4f326fc68f5db785a621a29,2024-06-04T19:20:39.047000
|
||||
CVE-2024-44920,0,0,12f1b6eb8fb8d99f08a0b224eeeb570d2ee08178391a3e25e8980965db9b7928,2024-09-04T14:59:58.250000
|
||||
CVE-2024-44921,0,0,b581e2c2532137589de006c20122d6cbe14e56f4b907946bd0416f760b5174f5,2024-09-04T15:00:15.103000
|
||||
@ -259049,9 +259051,9 @@ CVE-2024-45052,0,0,8b5354ce3732be9a4ec5c7e0d7652b2053216fa0d00ab80b71e08b5337152
|
||||
CVE-2024-45053,0,0,f91ffa38b1f1473a6604647a2be1fa377450e287db4b7cdb71eb6f698ce9f726,2024-09-06T18:20:35.430000
|
||||
CVE-2024-45054,0,0,b9a631b4140dc3b625193d3b302c7a5fbf5e7defa5c6f149bad3cc57b44dfb5d,2024-08-29T13:25:27.537000
|
||||
CVE-2024-45056,0,0,691057e2a8bd235b7cec2ff9d1864de57863221b46b0db10be9809732ea41217,2024-09-03T15:14:54.877000
|
||||
CVE-2024-45057,0,1,103b6de50ea8c78a895eccb4e8970b15e6d1e5c072b0541da4b181b9fbcee5a8,2024-09-06T20:15:04.443000
|
||||
CVE-2024-45058,0,1,e14ae7cd8c630ee9558396031b963ae5f55888ff4a83970664d1742bc54c6950,2024-09-06T20:15:04.547000
|
||||
CVE-2024-45059,0,1,bce3ec1c940acbe142fa600c9622c1e0772acc8cfb265273dae2266b40c101ce,2024-09-06T20:15:04.637000
|
||||
CVE-2024-45057,0,0,103b6de50ea8c78a895eccb4e8970b15e6d1e5c072b0541da4b181b9fbcee5a8,2024-09-06T20:15:04.443000
|
||||
CVE-2024-45058,0,0,e14ae7cd8c630ee9558396031b963ae5f55888ff4a83970664d1742bc54c6950,2024-09-06T20:15:04.547000
|
||||
CVE-2024-45059,0,0,bce3ec1c940acbe142fa600c9622c1e0772acc8cfb265273dae2266b40c101ce,2024-09-06T20:15:04.637000
|
||||
CVE-2024-4506,0,0,ddf6bfe33c9fb68b792eae19c37cbcf6030ec7e8a9a0c1f6ead94d2f62170a3f,2024-06-04T19:20:40.150000
|
||||
CVE-2024-45063,0,0,33e08634550506363c06b675c8eebdf6582cbbe73548148f8e40aee753dad000,2024-09-06T17:35:18.370000
|
||||
CVE-2024-4507,0,0,feffcf27ced8e6be5fca9d21b321343c494624929485135b513ee1c93a346051,2024-06-04T19:20:40.250000
|
||||
@ -259149,7 +259151,7 @@ CVE-2024-45312,0,0,3ab127ae457c159e255763a9cac499b257dedfb3025d06ab78788175895c2
|
||||
CVE-2024-45313,0,0,7f2c32db2a1d116c11ba8b1d5ff95be26c7a6f4c5dba7ff892eb13c5baf4c8a1,2024-09-03T12:59:02.453000
|
||||
CVE-2024-45314,0,0,b63eb7e37a749fb3c308d5e710eb140bbcfefc4e3df4519b3385c13ecabef564,2024-09-05T12:53:21.110000
|
||||
CVE-2024-4532,0,0,4fd2f02f0358f1c611846b77f1b0e80bcb1985e07f23fa6a21a71cc25593500a,2024-05-28T12:39:28.377000
|
||||
CVE-2024-45321,0,0,fb18f1dc20e468dc3e9b1a9f0b38a9a704b0b668d302eb3f364e6f7d26aab3c7,2024-09-06T14:35:13.113000
|
||||
CVE-2024-45321,0,1,385b3d1e3bf54e8ae2af5d5796ef0b1ffaf17d58c18e0fbe7542c0dcea09b2e4,2024-09-06T22:30:19.337000
|
||||
CVE-2024-4533,0,0,aca3a412ead1ce1343d6f498450801be5e059db6302d74881039b5fe75fb6c09,2024-05-28T12:39:28.377000
|
||||
CVE-2024-4534,0,0,527a3127a7586bdf18d80cd2b5b17fe74ac5ed6a2aa4ee562148173cc1d9d3e9,2024-08-09T19:35:09.923000
|
||||
CVE-2024-45346,0,0,2f7f906fa8e830e09f5dc1994b30102df77aeab36a86b7c31755a212ce377dbe,2024-08-29T03:15:05.247000
|
||||
@ -259247,6 +259249,7 @@ CVE-2024-45751,0,0,9d644b0c14d0d0ef7e1334ce6c40fff034d24fd661ea8076c5e0aad911a46
|
||||
CVE-2024-45758,0,0,2ae57583ed5e6b6b71b00c8e123d728a65162c35712be784f078e8924fe4539a,2024-09-06T18:35:13.043000
|
||||
CVE-2024-4576,0,0,bef0c1eb81bb0f4c3eef72c993d9a673f04f17bc2d954741979507814d4ccd99,2024-07-02T14:41:30.777000
|
||||
CVE-2024-4577,0,0,b55cac970df35b2daf21f1bc20cfa9dd0965f08c49eae1007fc9a139f9980913,2024-08-14T19:23:47.253000
|
||||
CVE-2024-45771,1,1,0d2b8d62b7e1308dc88774abe963b85bc32e41e5383eb66497d67169d507de0c,2024-09-06T22:15:02.267000
|
||||
CVE-2024-4578,0,0,de2bf1ab8b65cf8119579f63d8e64a9383c9519828d1fae8ddac21d6dcb5605a,2024-06-27T19:25:12.067000
|
||||
CVE-2024-4579,0,0,b44e5adee861e75c9f2de9111724b513cf79b7a7dcd7134192d107fac1782253,2024-05-14T15:44:07.607000
|
||||
CVE-2024-4580,0,0,975d7d3fa65fc4746aeff6882996f0991cc57002c73b964b5a97c9777b6d66f5,2024-05-16T13:03:05.353000
|
||||
@ -259517,9 +259520,9 @@ CVE-2024-4876,0,0,6c7ef7cd93a9d659be2199330000de11a6027348fd6a9308e40ba12083e70d
|
||||
CVE-2024-4879,0,0,49a8b41ea605df8bd1da4063a7058b50435504f1dbecb0dc4bcc8efa8c8e8867,2024-07-30T15:13:39.720000
|
||||
CVE-2024-4881,0,0,e010a6d611a1aff52f8425d30778d000b18cd2245ae12a3254f16e5b16421da7,2024-06-07T14:56:05.647000
|
||||
CVE-2024-4882,0,0,a4855f599041359b65e48a15f937a27e2ec2e91d9343d627eb58fe60c3b171c1,2024-07-09T18:19:14.047000
|
||||
CVE-2024-4883,0,0,2ff7450efd44772325cada3b845290dfe574175b9b5b8d8937e9a22721054fd1,2024-06-26T12:44:29.693000
|
||||
CVE-2024-4884,0,0,5b0f6d7b32ac809bc696cd47d1022d1d849f4d05ea4a666b656adcd11fde616b,2024-06-26T12:44:29.693000
|
||||
CVE-2024-4885,0,0,5f57649506bc0f86a710ae8ff86e41b417f875a376c5869cfc82708c69a60b8f,2024-06-26T12:44:29.693000
|
||||
CVE-2024-4883,0,1,66fd0c7113b75e4613bf51e6b10a097cc5dcf57aa3f97b3df0e5c31c4210be62,2024-09-06T22:46:17.103000
|
||||
CVE-2024-4884,0,1,a2dcec8e16e916f3e6bf44fbf27e64f395ae27ac96c65779b6d04fbf5173b4c4,2024-09-06T22:45:59.233000
|
||||
CVE-2024-4885,0,1,2608f2aa7fb5189467bda7bb610d4e03f1b43256b775a84e60ba9a3b8ac9b260,2024-09-06T22:44:27.840000
|
||||
CVE-2024-4886,0,0,d27ca09c7d3a0108a7cfa4692eb479eab6127452085468fbf17d7a45144cc1ee,2024-06-11T17:14:56.323000
|
||||
CVE-2024-4887,0,0,cd16cdbf0d661e24b4ec24b0cab770c7eb42c6fb6d3f727954351a4e0884953b,2024-06-07T14:56:05.647000
|
||||
CVE-2024-4888,0,0,fec1e03b9425eafa3abf9c794b417e5dd9f4ec5c0ccb57ecd621528833d262c0,2024-06-07T14:56:05.647000
|
||||
@ -259622,10 +259625,10 @@ CVE-2024-5002,0,0,28b740bd033d1abfd76c98a370fcc8a1a0efc6df8c7198f0eedf8751902072
|
||||
CVE-2024-5003,0,0,657f01af6ae4ffebd5508957e0a4ee664437c9c42d64fc0c4eaff54aefed6593,2024-07-18T16:18:33.020000
|
||||
CVE-2024-5004,0,0,dbb46916d3eaa00ba190ac36848b4f73f0fcf9ebf3415c8f81f52119cf8e2d54,2024-08-01T13:59:37.913000
|
||||
CVE-2024-5006,0,0,275a7db4a7750ed7acf4e95109b09b599d0f03c3ae61db2773b61bbc80a38eed,2024-06-11T17:36:24
|
||||
CVE-2024-5008,0,0,f3aaf1b56a85696455021e99c44b023e10f5e30320f1c5f1ff29548a21b19bae,2024-06-26T12:44:29.693000
|
||||
CVE-2024-5009,0,0,e5007830320ec10d10aee0ad37c5a929e2247f2929e9cd3c875dca917cc302ee,2024-06-26T12:44:29.693000
|
||||
CVE-2024-5010,0,0,af35128cc9db48220726dcddff7a65b4ed403a9dff49a9c43e67e875bed0adc1,2024-06-26T14:15:11.250000
|
||||
CVE-2024-5011,0,0,3893ac733a665090571cbc9b1d86bf3eb7381b999fcc8d59c6d135913d8c6665,2024-06-26T14:15:11.350000
|
||||
CVE-2024-5008,0,1,41c3cff745583fe16908c309126d70e41415ad78f2790f83925cbb0a70eb9065,2024-09-06T22:43:49.557000
|
||||
CVE-2024-5009,0,1,4fd7bfd86519955de695550b550ff6287bae2637bb330aab0edb8e0b318761f0,2024-09-06T22:43:04.747000
|
||||
CVE-2024-5010,0,1,3c850c266940942fbe09adbb4c98bc7afc61c3edf80ecba9d04f15eeefca6109,2024-09-06T22:42:39.017000
|
||||
CVE-2024-5011,0,1,4026c0ac2cac7aea5c94096b029296404a58ceafdfae2ce6d40eb650db37ee86,2024-09-06T22:41:46.253000
|
||||
CVE-2024-5012,0,0,5697b5fa6ba20e1501d7704fc1f19cf57893d5f71753b80662113f567a057a81,2024-08-21T13:34:41.107000
|
||||
CVE-2024-5013,0,0,2b6e46c5c558997322ab16e56ac5bd13f8f3890cf64227402cfe38f28e8502bf,2024-08-21T13:35:28.750000
|
||||
CVE-2024-5014,0,0,a159cfb950f4667dfac650da1dbd95c7b0726154dc655b46619c19dd5e035fa0,2024-08-21T13:36:06.417000
|
||||
@ -259740,7 +259743,7 @@ CVE-2024-5134,0,0,58696e79550f0b90695fd0ef5882cdbbda645a91799b45ef9d447d20546faa
|
||||
CVE-2024-5135,0,0,2e8010a5b25d8168b9552f9cffde1de1e433efa7269af046a0453f1985b50c89,2024-05-20T13:00:04.957000
|
||||
CVE-2024-5136,0,0,00acd0d99ac180a457379231db172c8713de0958aea5d4d69a24c44371050460,2024-06-04T19:21:01.267000
|
||||
CVE-2024-5137,0,0,1c94e90fa849c62df03c5c4f490c71de8dac579e548f5eda16234216f611cd2a,2024-06-04T19:21:01.370000
|
||||
CVE-2024-5138,0,1,47c03094386326d2315f3415dc7d3ef94b00cbe65c94e42ace003fc1a8714791,2024-09-06T20:35:18.950000
|
||||
CVE-2024-5138,0,0,47c03094386326d2315f3415dc7d3ef94b00cbe65c94e42ace003fc1a8714791,2024-09-06T20:35:18.950000
|
||||
CVE-2024-5141,0,0,5b006751fd2d8ca9e95fc8cef49a641b35089e8e5594eecd996fab7cf0d4e5e8,2024-07-24T17:58:54.867000
|
||||
CVE-2024-5142,0,0,8102929b9600e5392a308a1b7cfd863bc4b2848bde33508d601b388a9c02231d,2024-08-27T11:15:04.540000
|
||||
CVE-2024-5143,0,0,e21a987518c06589a6da36e0d35257f005aa787fff502677dfeaefae4b228c17,2024-05-24T01:15:30.977000
|
||||
@ -260465,7 +260468,7 @@ CVE-2024-5987,0,0,59ef1dd47c3a32e79663e3d46a9f8e7914697e67936dad31245855d212c4b5
|
||||
CVE-2024-5988,0,0,6a93e103554a4b2cea7532bb149420b2c5e22d63c1fab23818b5950d94f50a5e,2024-06-25T18:50:42.040000
|
||||
CVE-2024-5989,0,0,5b8da9d53fdfd0fd3971e8489f4ae4ce0e952b56f28f99337bb24ad669904afb,2024-06-25T18:50:42.040000
|
||||
CVE-2024-5990,0,0,815ffdec6ed9055e0c29635260b790d8ae8601700cacf3380cde4c3f20ff7240,2024-06-25T18:50:42.040000
|
||||
CVE-2024-5991,0,0,e082a26a3412cd6203ddcff1c59506086c1e6d36fa06530b6a36731be74810dd,2024-08-28T12:57:39.090000
|
||||
CVE-2024-5991,0,1,fe91480125318e1887501309371643eaea8c60c621bd042cca787c9779dab434,2024-09-06T22:51:41.470000
|
||||
CVE-2024-5992,0,0,71d2329832d35306ba58326f8edc972973ae3f2f48367fcc1028f4ed5d9fb912,2024-07-09T18:19:14.047000
|
||||
CVE-2024-5993,0,0,b45a0ae570b278a2a66647d60174ec8036c753d27cba9d6e9660698bbc3fa2d6,2024-07-09T18:19:14.047000
|
||||
CVE-2024-5994,0,0,c1974f8e417911883c192155213f25e6e809cb75c20fd828172f5e744b8258d3,2024-06-17T12:42:04.623000
|
||||
@ -261086,7 +261089,7 @@ CVE-2024-6781,0,0,678fc4d6db3dccbbb40576923dc15e296dd0a3cca23bbb526dd93d0dbc8a0c
|
||||
CVE-2024-6782,0,0,623508ea52e56d6a6e227168366ca2cd7770a1a0850e95e080f5f12fc915b728,2024-08-06T16:30:24.547000
|
||||
CVE-2024-6783,0,0,6f1f4a0fa578d50da4a4853fdfd24c63ba19a8604300ab142edf0f6cb8d9a812,2024-08-30T15:15:18.623000
|
||||
CVE-2024-6788,0,0,55fb0d510962e755b83a0ccc2efad4312001b246df777a622c08f48560e29a88,2024-08-13T17:11:53.553000
|
||||
CVE-2024-6789,0,0,231bd77c8db40b763ff18cdedd6d2a472872c681c24ea5a4e63b0563b010d2cc,2024-08-27T13:01:37.913000
|
||||
CVE-2024-6789,0,1,ea44c6537868ea4b0c5464bf7cf774ec36644f14fa858df1a024d527f74ea7b8,2024-09-06T22:31:04.833000
|
||||
CVE-2024-6791,0,0,530a9e011d938f884a817484b487117900f43c2f83e7c51084019bfb404fc80f,2024-07-24T12:55:13.223000
|
||||
CVE-2024-6792,0,0,e783451886045e1eac6661fbc4d3996b753ddb1f8514839a73a972f104f2ef73,2024-09-06T13:35:02.020000
|
||||
CVE-2024-6793,0,0,d3b7076c1491770aa57006b0fda0ca29233a316fd768110e179dab36334b145c,2024-07-24T12:55:13.223000
|
||||
@ -261614,8 +261617,8 @@ CVE-2024-7561,0,0,4f145ac8bff9e09f18481f098864cf0c68d07bfaa0facd60438519477eaf9c
|
||||
CVE-2024-7564,0,0,9647575e3fbd33f04dc9f7112e25f0abbbf3e6266c5fe28f9ec18868dfbd0106,2024-08-07T19:59:36.240000
|
||||
CVE-2024-7567,0,0,8d84928fabcffd92f0ffc65ee27fdbbaa4428b293e351afb4071fd1cdbd8dfa6,2024-08-14T02:07:05.410000
|
||||
CVE-2024-7568,0,0,d240e1c33af9e03c75feb4937b0ddf33906a854d9c30167cff3fa79482350e46,2024-08-26T12:47:20.187000
|
||||
CVE-2024-7569,0,1,7a3c8e4eac2ebf96df0505057d22d968c760196f85eb753352a8b6e99487f183,2024-09-06T21:57:23.037000
|
||||
CVE-2024-7570,0,1,a798807066be1648665e55a9f25a11b0e98e29601d4d1c9335361e48181aae93,2024-09-06T21:59:00.830000
|
||||
CVE-2024-7569,0,0,7a3c8e4eac2ebf96df0505057d22d968c760196f85eb753352a8b6e99487f183,2024-09-06T21:57:23.037000
|
||||
CVE-2024-7570,0,0,a798807066be1648665e55a9f25a11b0e98e29601d4d1c9335361e48181aae93,2024-09-06T21:59:00.830000
|
||||
CVE-2024-7573,0,0,7b157c1bc586485011758f6317cb8548eaad83544501bf2e76c604287d08292a,2024-08-28T12:57:27.610000
|
||||
CVE-2024-7574,0,0,20d9970481b83bc1831e248b5fd88e17f245f697fcf3310f9ca87d287eec943e,2024-08-12T13:41:36.517000
|
||||
CVE-2024-7578,0,0,fafe75f6c08f3db49e42d74dbc7c12d20ded3ec028530cd367a8cd3d9bc7695e,2024-08-28T18:27:18.510000
|
||||
@ -261631,7 +261634,7 @@ CVE-2024-7589,0,0,aa1647eb6c306ec7b876b5795f9775a883f5cc7b06ae7ba418ac0c8e496652
|
||||
CVE-2024-7590,0,0,7c97d5aae327ca695e1cd419af58bc8aaacb7517411055405e5e64d98b0261a2,2024-08-13T12:58:25.437000
|
||||
CVE-2024-7591,0,0,93e76a9c527669096be2abfdb6462a0311db24e202fd8d23d80d88ff40dd1ed7,2024-09-06T12:08:21.290000
|
||||
CVE-2024-7592,0,0,af44aafcb14e521ee1ae85082a6a487c5d017e994f40b59b2c958cad447a75f0,2024-09-04T21:15:14.643000
|
||||
CVE-2024-7593,0,0,2efb8857fe8e314338e0788060f0e22f0d56642d5618c3e3d62e70b5e7e24bac,2024-08-14T02:07:05.410000
|
||||
CVE-2024-7593,0,1,4da85e7ccbdae09b92bad5968b875ba9d0537591e39a68c4cb01282a2ce99145,2024-09-06T22:13:21.197000
|
||||
CVE-2024-7599,0,0,a956cdc05d3339353d73900769844a6746f6caba229f81de6c9855b66ed02e8f,2024-09-06T16:46:26.830000
|
||||
CVE-2024-7600,0,0,456ca552c9a809b72d1cc9f2b35e12282778424a2ecdfd82d7e98a6e39cd97fa,2024-08-23T16:35:31.137000
|
||||
CVE-2024-7601,0,0,db9958425836572eda0b52c7e651aff0e41e4dc47ec55ea348bc5752e1b198d2,2024-08-23T16:35:52.383000
|
||||
@ -261675,7 +261678,7 @@ CVE-2024-7647,0,0,c2417bbd838d2a2a494407e7a47e50a82d7e6b69bb49e726beca72fa9570b1
|
||||
CVE-2024-7648,0,0,2049ae7cbf0cab301bb3d8a4c000a0971cbb2a1bb7b1a04dd9face1c419d935f,2024-08-12T13:41:36.517000
|
||||
CVE-2024-7649,0,0,3d0b3905ac20943345a47479273aed49759614ef3fae3b2688335294d499ed3d,2024-08-12T13:41:36.517000
|
||||
CVE-2024-7651,0,0,386a7bb7aa0b4a32ced6fe813025ac2a231789f032ca2ee2a42adaaefdd20a30,2024-08-31T03:28:02.947000
|
||||
CVE-2024-7652,0,1,00323b94c746cc0f49a6bcca986d645cd4d56dd1a84ab67f71ac3f07744c2c1f,2024-09-06T21:35:19.660000
|
||||
CVE-2024-7652,0,0,00323b94c746cc0f49a6bcca986d645cd4d56dd1a84ab67f71ac3f07744c2c1f,2024-09-06T21:35:19.660000
|
||||
CVE-2024-7654,0,0,49383a5796e66ab6802124ac3212336a9fa34e97b446554c0840904b1dbfce6f,2024-09-05T13:53:16.540000
|
||||
CVE-2024-7656,0,0,54bddf4f1c99f206f2f263928ecdc7b2851230b8a0f25d44b79aae993350ca70,2024-08-26T12:47:20.187000
|
||||
CVE-2024-7657,0,0,b71ee6cae903ac873f30f4d097ac987c873f0095983bc9620eda1ffab659d5b8,2024-08-15T17:48:20.920000
|
||||
@ -261719,7 +261722,7 @@ CVE-2024-7711,0,0,d162b2aa52f460525a4de3c665dffbe11ff5ad157026981df71b9201129fde
|
||||
CVE-2024-7712,0,0,0b5a8e9c5ba36af8bef340cc5ae017c9fa1ba3b9186fddf3fda3dcc554ec2462,2024-08-30T16:15:11.050000
|
||||
CVE-2024-7715,0,0,cce2a99e52ea07f4f42d2501434c3e0483cd57d931341a557261d628f3236d39,2024-08-15T15:15:22.690000
|
||||
CVE-2024-7717,0,0,7bb6c5f4c19977a1c62bcb7f56c31a10a8375a822d55bfe8140c9d2426ca6889,2024-09-03T12:59:02.453000
|
||||
CVE-2024-7720,0,0,ddf81bc4df03ac1e2d7b5b61581e0a5dc6cc3f46e57542a631155ffde48ea5ad,2024-08-28T14:35:14.160000
|
||||
CVE-2024-7720,0,1,71f1c1973f29e2c7c1373dd24daaa52398594a70072a570fc445a13cbea904ba,2024-09-06T22:33:30.767000
|
||||
CVE-2024-7722,0,0,dd34a6c6fa187cfdff62390c6b38a3b9bbf49b761e6117c420a823ed09401edf,2024-08-21T17:24:59.627000
|
||||
CVE-2024-7723,0,0,0bdf76bf964a28a97b4d4d8ab086a048836c54fd8be0e41d26426907a661be8a,2024-08-21T17:24:59.627000
|
||||
CVE-2024-7724,0,0,fd9d5d4a5cde684cb1f23cf1c101e9cac57afdf61c2e095e3e5cfe8dee5c7260,2024-08-21T17:24:59.627000
|
||||
@ -261958,9 +261961,9 @@ CVE-2024-8155,0,0,fe38ccfd4767b6e01bc47bbf13a366f64470ea038445dcb6f48d6c1a6380c4
|
||||
CVE-2024-8158,0,0,8ac397614ea8bcd3bd2bf49698f88ba96c85aeae3c3edb7c31f4b63e73c01d66,2024-08-26T12:47:20.187000
|
||||
CVE-2024-8161,0,0,cd13a3f8a1d31274c9ab84b7ce8fd24ad13e50be7d970e595f1245741eba1677,2024-08-26T12:47:20.187000
|
||||
CVE-2024-8162,0,0,2f15be70d7b9e402b643053e8cc2849077cf4472f134c84060c0898ffb295f28,2024-08-27T14:28:46.927000
|
||||
CVE-2024-8163,0,0,2b33aa12e9b5396511ceeb0ddb5c09644e462e2419cefa1d9405e7869864efad,2024-08-26T15:15:23.727000
|
||||
CVE-2024-8164,0,0,b4e3e587ad2686dce20b95e66c72594ce4762348dc65ff48827050c2ee56b3f9,2024-08-26T15:15:23.727000
|
||||
CVE-2024-8165,0,0,f43afc9fcf1c1e78bc7ea9af37222216d3925e3673d7d3cab857085af5387f07,2024-08-26T15:15:23.727000
|
||||
CVE-2024-8163,0,1,34076faaf51f1e489aa58346c56061ee9718b828b5ae0365e6c357cdf31c941d,2024-09-06T22:18:19.283000
|
||||
CVE-2024-8164,0,1,f532add158f51f094ffe0f96bd30c0edbc06f69a220e37f850c6546174add3a7,2024-09-06T22:19:53.907000
|
||||
CVE-2024-8165,0,1,30af74acf30a50149c9aea2035b59ab295b6f97042636173e519627288075fcf,2024-09-06T22:20:41.553000
|
||||
CVE-2024-8166,0,0,f12f4299a569f15901062ca88855adc385daab485a9c5a1ac8234fa6d74f6eec,2024-08-27T13:03:38.227000
|
||||
CVE-2024-8167,0,0,e1d76d41e7f83c83df1202942336f7e4e5679c0385cffbe5279207329dff3a19,2024-08-26T18:45:44.287000
|
||||
CVE-2024-8168,0,0,9955e844b80349a9eb3954506e8959a22faf2c7afd6ad4972803d0a2ade5036e,2024-08-26T18:45:02.637000
|
||||
@ -262010,7 +262013,7 @@ CVE-2024-8235,0,0,d5aa509f85958c98e1ad9dcfec5d574bff6f5e3781d6d0bbdba4997de15951
|
||||
CVE-2024-8247,0,0,5202f9f70242e6e766f5bf4ee04774da230414090293c913b32ce2eadeefe661,2024-09-06T12:08:04.550000
|
||||
CVE-2024-8250,0,0,9b93a65d8c7dcee06e07a2e2b390d716b51503d05b493ec48aa5a8756ae94b8c,2024-08-30T16:32:16.917000
|
||||
CVE-2024-8252,0,0,36e1aa114a02ff2bf925a636a4ed4135ae0e6011078bf9fd8b3aff586823c205,2024-09-03T14:31:27.243000
|
||||
CVE-2024-8255,0,0,6c498c108684434305256b803e17a8c75dfbb80191f87c9993edaaba373ae570,2024-08-30T13:00:05.390000
|
||||
CVE-2024-8255,0,1,c6874ac38c80acc73ad7edcdfa1b6810f24be9f578842829800024511d128d5a,2024-09-06T22:53:34.187000
|
||||
CVE-2024-8260,0,0,80de48284b9b1f60542ccd162f62ac34372df44b6034ef82705622d907f32295,2024-09-03T12:59:02.453000
|
||||
CVE-2024-8274,0,0,81f15088246893eaf3249a3304ee5d5199071263c8883a7f9f22c293a16a376a,2024-09-03T14:28:06.853000
|
||||
CVE-2024-8276,0,0,6d091b531458424cc4635f6e051f410dabbe91d1101fd761130b66815a93f34d,2024-09-03T12:59:02.453000
|
||||
@ -262089,6 +262092,7 @@ CVE-2024-8417,0,0,a9619e26c595954087d9c9b458e78703071fbd5bf87ff4a22ec6d8ecc7076f
|
||||
CVE-2024-8418,0,0,f7342b1aaf36f471815aa50c659bed6ce97deba1a8dc8297ac025dec31c9e421,2024-09-05T14:18:49.537000
|
||||
CVE-2024-8427,0,0,1d0d7daf1e8474e50325418d52e79c4545246c244dd6a29747e6934be9944c58,2024-09-06T12:08:04.550000
|
||||
CVE-2024-8428,0,0,32f99662d2ff0a82eac2c387b5879cdce3b74766786e4d561b16e1b245df448a,2024-09-06T16:46:26.830000
|
||||
CVE-2024-8439,1,1,b4eacb6a11dc14d7212cfdbe9629a765b4f24ad00bc9c4fc2289184c4fdae508,2024-09-06T22:15:02.320000
|
||||
CVE-2024-8445,0,0,11be885f11a2f2b8a202932b0e16edeb442a7212afe3a0c8e195900656f3fddf,2024-09-05T17:44:56.007000
|
||||
CVE-2024-8460,0,0,21c8cc38664ba19f902747cfc2492ea27c718e3ca35401645ae4d1c6ff7413b5,2024-09-06T16:30:54.027000
|
||||
CVE-2024-8461,0,0,e49804a708251a77ac276dc2c87288b6f990bf8f9a9704c388f55d96a1de96d3,2024-09-05T17:45:07.877000
|
||||
|
Can't render this file because it is too large.
|
Loading…
x
Reference in New Issue
Block a user