Auto-Update: 2024-07-02T18:03:24.910841+00:00

This commit is contained in:
cad-safe-bot 2024-07-02 18:06:18 +00:00
parent 528c29a3bc
commit ff378ccac2
96 changed files with 72353 additions and 1466 deletions

View File

@ -2,8 +2,9 @@
"id": "CVE-2007-3010",
"sourceIdentifier": "cve@mitre.org",
"published": "2007-09-18T21:17:00.000",
"lastModified": "2018-10-16T16:46:56.620",
"vulnStatus": "Modified",
"lastModified": "2024-07-02T17:43:30.203",
"vulnStatus": "Analyzed",
"cveTags": [],
"cisaExploitAdd": "2022-04-15",
"cisaActionDue": "2022-05-06",
"cisaRequiredAction": "Apply updates per vendor instructions.",
@ -19,6 +20,28 @@
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
],
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
@ -52,7 +75,7 @@
"description": [
{
"lang": "en",
"value": "CWE-20"
"value": "NVD-CWE-noinfo"
}
]
}
@ -66,8 +89,9 @@
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:alcatel-lucent:omnipcx:7.1:*:enterprise:*:*:*:*:*",
"matchCriteriaId": "98313BF7-A5D3-472C-B38D-D79B85110C7B"
"criteria": "cpe:2.3:a:al-enterprise:omnipcx_enterprise_communication_server:*:*:*:*:*:*:*:*",
"versionEndIncluding": "7.1",
"matchCriteriaId": "F79AE451-3E20-4FBA-BD9E-EAC3A74BDE3B"
}
]
}
@ -79,43 +103,71 @@
"url": "http://marc.info/?l=full-disclosure&m=119002152126755&w=2",
"source": "cve@mitre.org",
"tags": [
"Exploit"
"Exploit",
"Mailing List"
]
},
{
"url": "http://osvdb.org/40521",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Broken Link"
]
},
{
"url": "http://secunia.com/advisories/26853",
"source": "cve@mitre.org",
"tags": [
"Broken Link",
"Vendor Advisory"
]
},
{
"url": "http://www.redteam-pentesting.de/advisories/rt-sa-2007-001.php",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Broken Link"
]
},
{
"url": "http://www.securityfocus.com/archive/1/479699/100/0/threaded",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Broken Link",
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "http://www.securityfocus.com/bid/25694",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Broken Link",
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "http://www.vupen.com/english/advisories/2007/3185",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Broken Link"
]
},
{
"url": "http://www1.alcatel-lucent.com/psirt/statements/2007002/OXEUMT.htm",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Broken Link"
]
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/36632",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
}
]
}

View File

@ -2,8 +2,9 @@
"id": "CVE-2014-0160",
"sourceIdentifier": "secalert@redhat.com",
"published": "2014-04-07T22:55:03.893",
"lastModified": "2023-11-07T02:18:10.590",
"vulnStatus": "Modified",
"lastModified": "2024-07-02T16:52:39.560",
"vulnStatus": "Analyzed",
"cveTags": [],
"evaluatorImpact": "CVSS V2 scoring evaluates the impact of the vulnerability on the host where the vulnerability is located. When evaluating the impact of this vulnerability to your organization, take into account the nature of the data that is being protected and act according to your organization\u2019s risk acceptance. While CVE-2014-0160 does not allow unrestricted access to memory on the targeted host, a successful exploit does leak information from memory locations which have the potential to contain particularly sensitive information, e.g., cryptographic keys and passwords. Theft of this information could enable other attacks on the information system, the impact of which would depend on the sensitivity of the data and functions of that system.",
"cisaExploitAdd": "2022-05-04",
"cisaActionDue": "2022-05-25",
@ -548,6 +549,43 @@
]
}
]
},
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:broadcom:symantec_messaging_gateway:10.6.0:*:*:*:*:*:*:*",
"matchCriteriaId": "1745640A-621C-458B-92C6-C24BA06D79E5"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:broadcom:symantec_messaging_gateway:10.6.1:*:*:*:*:*:*:*",
"matchCriteriaId": "D4DEF17D-93AD-4E79-96ED-E7C44332BD52"
}
]
}
]
},
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:splunk:splunk:*:*:*:*:enterprise:*:*:*",
"versionStartIncluding": "6.0.0",
"versionEndExcluding": "6.0.3",
"matchCriteriaId": "F660A53D-39E7-422A-9E77-3D69A91F2E07"
}
]
}
]
}
],
"references": [
@ -562,6 +600,7 @@
"url": "http://blog.fox-it.com/2014/04/08/openssl-heartbleed-bug-live-blog/",
"source": "secalert@redhat.com",
"tags": [
"Issue Tracking",
"Third Party Advisory"
]
},
@ -569,8 +608,7 @@
"url": "http://cogentdatahub.com/ReleaseNotes.html",
"source": "secalert@redhat.com",
"tags": [
"Release Notes",
"Third Party Advisory"
"Release Notes"
]
},
{
@ -582,7 +620,10 @@
},
{
"url": "http://git.openssl.org/gitweb/?p=openssl.git%3Ba=commit%3Bh=96db9023b881d7cd9f379b0c154650d6c108e9a3",
"source": "secalert@redhat.com"
"source": "secalert@redhat.com",
"tags": [
"Broken Link"
]
},
{
"url": "http://heartbleed.com/",
@ -595,6 +636,7 @@
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2014-April/131221.html",
"source": "secalert@redhat.com",
"tags": [
"Broken Link",
"Third Party Advisory"
]
},
@ -602,6 +644,7 @@
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2014-April/131291.html",
"source": "secalert@redhat.com",
"tags": [
"Broken Link",
"Third Party Advisory"
]
},
@ -641,6 +684,7 @@
"url": "http://marc.info/?l=bugtraq&m=139722163017074&w=2",
"source": "secalert@redhat.com",
"tags": [
"Mailing List",
"Third Party Advisory"
]
},
@ -648,6 +692,7 @@
"url": "http://marc.info/?l=bugtraq&m=139757726426985&w=2",
"source": "secalert@redhat.com",
"tags": [
"Mailing List",
"Third Party Advisory"
]
},
@ -655,6 +700,7 @@
"url": "http://marc.info/?l=bugtraq&m=139757819327350&w=2",
"source": "secalert@redhat.com",
"tags": [
"Mailing List",
"Third Party Advisory"
]
},
@ -662,6 +708,7 @@
"url": "http://marc.info/?l=bugtraq&m=139757919027752&w=2",
"source": "secalert@redhat.com",
"tags": [
"Mailing List",
"Third Party Advisory"
]
},
@ -669,6 +716,7 @@
"url": "http://marc.info/?l=bugtraq&m=139758572430452&w=2",
"source": "secalert@redhat.com",
"tags": [
"Mailing List",
"Third Party Advisory"
]
},
@ -676,6 +724,7 @@
"url": "http://marc.info/?l=bugtraq&m=139765756720506&w=2",
"source": "secalert@redhat.com",
"tags": [
"Mailing List",
"Third Party Advisory"
]
},
@ -683,6 +732,7 @@
"url": "http://marc.info/?l=bugtraq&m=139774054614965&w=2",
"source": "secalert@redhat.com",
"tags": [
"Mailing List",
"Third Party Advisory"
]
},
@ -690,6 +740,7 @@
"url": "http://marc.info/?l=bugtraq&m=139774703817488&w=2",
"source": "secalert@redhat.com",
"tags": [
"Mailing List",
"Third Party Advisory"
]
},
@ -697,6 +748,7 @@
"url": "http://marc.info/?l=bugtraq&m=139808058921905&w=2",
"source": "secalert@redhat.com",
"tags": [
"Mailing List",
"Third Party Advisory"
]
},
@ -704,6 +756,7 @@
"url": "http://marc.info/?l=bugtraq&m=139817685517037&w=2",
"source": "secalert@redhat.com",
"tags": [
"Mailing List",
"Third Party Advisory"
]
},
@ -711,6 +764,7 @@
"url": "http://marc.info/?l=bugtraq&m=139817727317190&w=2",
"source": "secalert@redhat.com",
"tags": [
"Mailing List",
"Third Party Advisory"
]
},
@ -718,6 +772,7 @@
"url": "http://marc.info/?l=bugtraq&m=139817782017443&w=2",
"source": "secalert@redhat.com",
"tags": [
"Mailing List",
"Third Party Advisory"
]
},
@ -725,6 +780,7 @@
"url": "http://marc.info/?l=bugtraq&m=139824923705461&w=2",
"source": "secalert@redhat.com",
"tags": [
"Mailing List",
"Third Party Advisory"
]
},
@ -732,6 +788,7 @@
"url": "http://marc.info/?l=bugtraq&m=139824993005633&w=2",
"source": "secalert@redhat.com",
"tags": [
"Mailing List",
"Third Party Advisory"
]
},
@ -739,6 +796,7 @@
"url": "http://marc.info/?l=bugtraq&m=139833395230364&w=2",
"source": "secalert@redhat.com",
"tags": [
"Mailing List",
"Third Party Advisory"
]
},
@ -746,6 +804,7 @@
"url": "http://marc.info/?l=bugtraq&m=139835815211508&w=2",
"source": "secalert@redhat.com",
"tags": [
"Mailing List",
"Third Party Advisory"
]
},
@ -753,6 +812,7 @@
"url": "http://marc.info/?l=bugtraq&m=139835844111589&w=2",
"source": "secalert@redhat.com",
"tags": [
"Mailing List",
"Third Party Advisory"
]
},
@ -760,6 +820,7 @@
"url": "http://marc.info/?l=bugtraq&m=139836085512508&w=2",
"source": "secalert@redhat.com",
"tags": [
"Mailing List",
"Third Party Advisory"
]
},
@ -767,6 +828,7 @@
"url": "http://marc.info/?l=bugtraq&m=139842151128341&w=2",
"source": "secalert@redhat.com",
"tags": [
"Mailing List",
"Third Party Advisory"
]
},
@ -774,6 +836,7 @@
"url": "http://marc.info/?l=bugtraq&m=139843768401936&w=2",
"source": "secalert@redhat.com",
"tags": [
"Mailing List",
"Third Party Advisory"
]
},
@ -781,6 +844,7 @@
"url": "http://marc.info/?l=bugtraq&m=139869720529462&w=2",
"source": "secalert@redhat.com",
"tags": [
"Mailing List",
"Third Party Advisory"
]
},
@ -788,6 +852,7 @@
"url": "http://marc.info/?l=bugtraq&m=139869891830365&w=2",
"source": "secalert@redhat.com",
"tags": [
"Mailing List",
"Third Party Advisory"
]
},
@ -795,6 +860,7 @@
"url": "http://marc.info/?l=bugtraq&m=139889113431619&w=2",
"source": "secalert@redhat.com",
"tags": [
"Mailing List",
"Third Party Advisory"
]
},
@ -802,6 +868,7 @@
"url": "http://marc.info/?l=bugtraq&m=139889295732144&w=2",
"source": "secalert@redhat.com",
"tags": [
"Mailing List",
"Third Party Advisory"
]
},
@ -809,6 +876,7 @@
"url": "http://marc.info/?l=bugtraq&m=139905202427693&w=2",
"source": "secalert@redhat.com",
"tags": [
"Mailing List",
"Third Party Advisory"
]
},
@ -816,6 +884,7 @@
"url": "http://marc.info/?l=bugtraq&m=139905243827825&w=2",
"source": "secalert@redhat.com",
"tags": [
"Mailing List",
"Third Party Advisory"
]
},
@ -823,6 +892,7 @@
"url": "http://marc.info/?l=bugtraq&m=139905295427946&w=2",
"source": "secalert@redhat.com",
"tags": [
"Mailing List",
"Third Party Advisory"
]
},
@ -830,6 +900,7 @@
"url": "http://marc.info/?l=bugtraq&m=139905351928096&w=2",
"source": "secalert@redhat.com",
"tags": [
"Mailing List",
"Third Party Advisory"
]
},
@ -837,6 +908,7 @@
"url": "http://marc.info/?l=bugtraq&m=139905405728262&w=2",
"source": "secalert@redhat.com",
"tags": [
"Mailing List",
"Third Party Advisory"
]
},
@ -844,6 +916,7 @@
"url": "http://marc.info/?l=bugtraq&m=139905458328378&w=2",
"source": "secalert@redhat.com",
"tags": [
"Mailing List",
"Third Party Advisory"
]
},
@ -851,6 +924,7 @@
"url": "http://marc.info/?l=bugtraq&m=139905653828999&w=2",
"source": "secalert@redhat.com",
"tags": [
"Mailing List",
"Third Party Advisory"
]
},
@ -858,6 +932,7 @@
"url": "http://marc.info/?l=bugtraq&m=139905868529690&w=2",
"source": "secalert@redhat.com",
"tags": [
"Mailing List",
"Third Party Advisory"
]
},
@ -865,6 +940,7 @@
"url": "http://marc.info/?l=bugtraq&m=140015787404650&w=2",
"source": "secalert@redhat.com",
"tags": [
"Mailing List",
"Third Party Advisory"
]
},
@ -872,6 +948,7 @@
"url": "http://marc.info/?l=bugtraq&m=140075368411126&w=2",
"source": "secalert@redhat.com",
"tags": [
"Mailing List",
"Third Party Advisory"
]
},
@ -879,6 +956,7 @@
"url": "http://marc.info/?l=bugtraq&m=140724451518351&w=2",
"source": "secalert@redhat.com",
"tags": [
"Mailing List",
"Third Party Advisory"
]
},
@ -886,6 +964,7 @@
"url": "http://marc.info/?l=bugtraq&m=140752315422991&w=2",
"source": "secalert@redhat.com",
"tags": [
"Mailing List",
"Third Party Advisory"
]
},
@ -893,6 +972,7 @@
"url": "http://marc.info/?l=bugtraq&m=141287864628122&w=2",
"source": "secalert@redhat.com",
"tags": [
"Mailing List",
"Third Party Advisory"
]
},
@ -900,6 +980,7 @@
"url": "http://marc.info/?l=bugtraq&m=142660345230545&w=2",
"source": "secalert@redhat.com",
"tags": [
"Mailing List",
"Third Party Advisory"
]
},
@ -914,6 +995,7 @@
"url": "http://public.support.unisys.com/common/public/vulnerability/NVD_Detail_Rpt.aspx?ID=3",
"source": "secalert@redhat.com",
"tags": [
"Permissions Required",
"Third Party Advisory"
]
},
@ -997,6 +1079,7 @@
"url": "http://secunia.com/advisories/57347",
"source": "secalert@redhat.com",
"tags": [
"Broken Link",
"Third Party Advisory"
]
},
@ -1004,6 +1087,7 @@
"url": "http://secunia.com/advisories/57483",
"source": "secalert@redhat.com",
"tags": [
"Broken Link",
"Third Party Advisory"
]
},
@ -1011,6 +1095,7 @@
"url": "http://secunia.com/advisories/57721",
"source": "secalert@redhat.com",
"tags": [
"Broken Link",
"Third Party Advisory"
]
},
@ -1018,6 +1103,7 @@
"url": "http://secunia.com/advisories/57836",
"source": "secalert@redhat.com",
"tags": [
"Broken Link",
"Third Party Advisory"
]
},
@ -1025,6 +1111,7 @@
"url": "http://secunia.com/advisories/57966",
"source": "secalert@redhat.com",
"tags": [
"Broken Link",
"Third Party Advisory"
]
},
@ -1032,6 +1119,7 @@
"url": "http://secunia.com/advisories/57968",
"source": "secalert@redhat.com",
"tags": [
"Broken Link",
"Third Party Advisory"
]
},
@ -1039,6 +1127,7 @@
"url": "http://secunia.com/advisories/59139",
"source": "secalert@redhat.com",
"tags": [
"Broken Link",
"Third Party Advisory"
]
},
@ -1046,6 +1135,7 @@
"url": "http://secunia.com/advisories/59243",
"source": "secalert@redhat.com",
"tags": [
"Broken Link",
"Third Party Advisory"
]
},
@ -1053,6 +1143,7 @@
"url": "http://secunia.com/advisories/59347",
"source": "secalert@redhat.com",
"tags": [
"Broken Link",
"Third Party Advisory"
]
},
@ -1102,6 +1193,7 @@
"url": "http://www.apcmedia.com/salestools/SJHN-7RKGNM/SJHN-7RKGNM_R4_EN.pdf",
"source": "secalert@redhat.com",
"tags": [
"Broken Link",
"Third Party Advisory"
]
},
@ -1116,6 +1208,7 @@
"url": "http://www.debian.org/security/2014/dsa-2896",
"source": "secalert@redhat.com",
"tags": [
"Mailing List",
"Third Party Advisory"
]
},
@ -1141,6 +1234,7 @@
"url": "http://www.f-secure.com/en/web/labs_global/fsc-2014-1",
"source": "secalert@redhat.com",
"tags": [
"Broken Link",
"Third Party Advisory"
]
},
@ -1148,7 +1242,7 @@
"url": "http://www.getchef.com/blog/2014/04/09/chef-server-11-0-12-release/",
"source": "secalert@redhat.com",
"tags": [
"Third Party Advisory"
"Release Notes"
]
},
{
@ -1162,14 +1256,14 @@
"url": "http://www.getchef.com/blog/2014/04/09/enterprise-chef-1-4-9-release/",
"source": "secalert@redhat.com",
"tags": [
"Third Party Advisory"
"Release Notes"
]
},
{
"url": "http://www.getchef.com/blog/2014/04/09/enterprise-chef-11-1-3-release/",
"source": "secalert@redhat.com",
"tags": [
"Third Party Advisory"
"Release Notes"
]
},
{
@ -1191,6 +1285,7 @@
"url": "http://www.kerio.com/support/kerio-control/release-history",
"source": "secalert@redhat.com",
"tags": [
"Broken Link",
"Third Party Advisory"
]
},
@ -1198,6 +1293,7 @@
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2015:062",
"source": "secalert@redhat.com",
"tags": [
"Broken Link",
"Third Party Advisory"
]
},
@ -1205,6 +1301,7 @@
"url": "http://www.openssl.org/news/secadv_20140407.txt",
"source": "secalert@redhat.com",
"tags": [
"Broken Link",
"Vendor Advisory"
]
},
@ -1212,6 +1309,7 @@
"url": "http://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.html",
"source": "secalert@redhat.com",
"tags": [
"Patch",
"Third Party Advisory"
]
},
@ -1219,6 +1317,7 @@
"url": "http://www.oracle.com/technetwork/topics/security/opensslheartbleedcve-2014-0160-2188454.html",
"source": "secalert@redhat.com",
"tags": [
"Patch",
"Third Party Advisory"
]
},
@ -1226,6 +1325,7 @@
"url": "http://www.securityfocus.com/archive/1/534161/100/0/threaded",
"source": "secalert@redhat.com",
"tags": [
"Broken Link",
"Not Applicable",
"Third Party Advisory",
"VDB Entry"
@ -1235,6 +1335,7 @@
"url": "http://www.securityfocus.com/bid/66690",
"source": "secalert@redhat.com",
"tags": [
"Broken Link",
"Third Party Advisory",
"VDB Entry"
]
@ -1243,6 +1344,7 @@
"url": "http://www.securitytracker.com/id/1030026",
"source": "secalert@redhat.com",
"tags": [
"Broken Link",
"Third Party Advisory",
"VDB Entry"
]
@ -1251,6 +1353,7 @@
"url": "http://www.securitytracker.com/id/1030074",
"source": "secalert@redhat.com",
"tags": [
"Broken Link",
"Third Party Advisory",
"VDB Entry"
]
@ -1259,6 +1362,7 @@
"url": "http://www.securitytracker.com/id/1030077",
"source": "secalert@redhat.com",
"tags": [
"Broken Link",
"Third Party Advisory",
"VDB Entry"
]
@ -1267,6 +1371,7 @@
"url": "http://www.securitytracker.com/id/1030078",
"source": "secalert@redhat.com",
"tags": [
"Broken Link",
"Third Party Advisory",
"VDB Entry"
]
@ -1275,6 +1380,7 @@
"url": "http://www.securitytracker.com/id/1030079",
"source": "secalert@redhat.com",
"tags": [
"Broken Link",
"Third Party Advisory",
"VDB Entry"
]
@ -1283,6 +1389,7 @@
"url": "http://www.securitytracker.com/id/1030080",
"source": "secalert@redhat.com",
"tags": [
"Broken Link",
"Third Party Advisory",
"VDB Entry"
]
@ -1291,6 +1398,7 @@
"url": "http://www.securitytracker.com/id/1030081",
"source": "secalert@redhat.com",
"tags": [
"Broken Link",
"Third Party Advisory",
"VDB Entry"
]
@ -1299,6 +1407,7 @@
"url": "http://www.securitytracker.com/id/1030082",
"source": "secalert@redhat.com",
"tags": [
"Broken Link",
"Third Party Advisory",
"VDB Entry"
]
@ -1336,21 +1445,21 @@
"url": "http://www.vmware.com/security/advisories/VMSA-2014-0012.html",
"source": "secalert@redhat.com",
"tags": [
"Not Applicable"
"Broken Link"
]
},
{
"url": "http://www.websense.com/support/article/kbarticle/Vulnerabilities-resolved-in-TRITON-APX-Version-8-0",
"source": "secalert@redhat.com",
"tags": [
"Not Applicable"
"Broken Link"
]
},
{
"url": "https://blog.torproject.org/blog/openssl-bug-cve-2014-0160",
"source": "secalert@redhat.com",
"tags": [
"Third Party Advisory"
"Issue Tracking"
]
},
{
@ -1372,22 +1481,21 @@
"url": "https://code.google.com/p/mod-spdy/issues/detail?id=85",
"source": "secalert@redhat.com",
"tags": [
"Third Party Advisory"
"Issue Tracking"
]
},
{
"url": "https://filezilla-project.org/versions.php?type=server",
"source": "secalert@redhat.com",
"tags": [
"Release Notes",
"Third Party Advisory"
"Release Notes"
]
},
{
"url": "https://gist.github.com/chapmajs/10473815",
"source": "secalert@redhat.com",
"tags": [
"Third Party Advisory"
"Exploit"
]
},
{
@ -1399,24 +1507,45 @@
},
{
"url": "https://lists.apache.org/thread.html/ba661b0edd913b39ff129a32d855620dd861883ade05fd88a8ce517d%40%3Cdev.tomcat.apache.org%3E",
"source": "secalert@redhat.com"
"source": "secalert@redhat.com",
"tags": [
"Mailing List",
"Patch",
"Third Party Advisory"
]
},
{
"url": "https://lists.apache.org/thread.html/f8e0814e11c7f21f42224b6de111cb3f5e5ab5c15b78924c516d4ec2%40%3Cdev.tomcat.apache.org%3E",
"source": "secalert@redhat.com"
"source": "secalert@redhat.com",
"tags": [
"Mailing List",
"Patch",
"Third Party Advisory"
]
},
{
"url": "https://lists.apache.org/thread.html/re3b72cbb13e1dfe85c4a06959a3b6ca6d939b407ecca80db12b54220%40%3Cdev.tomcat.apache.org%3E",
"source": "secalert@redhat.com"
"source": "secalert@redhat.com",
"tags": [
"Mailing List",
"Patch",
"Third Party Advisory"
]
},
{
"url": "https://lists.apache.org/thread.html/rf8e8c091182b45daa50d3557cad9b10bb4198e3f08cf8f1c66a1b08d%40%3Cdev.tomcat.apache.org%3E",
"source": "secalert@redhat.com"
"source": "secalert@redhat.com",
"tags": [
"Mailing List",
"Patch",
"Third Party Advisory"
]
},
{
"url": "https://lists.balabit.hu/pipermail/syslog-ng-announce/2014-April/000184.html",
"source": "secalert@redhat.com",
"tags": [
"Mailing List",
"Third Party Advisory"
]
},
@ -1425,6 +1554,7 @@
"source": "secalert@redhat.com",
"tags": [
"Exploit",
"Permissions Required",
"Third Party Advisory"
]
},
@ -1446,6 +1576,7 @@
"url": "https://www.cert.fi/en/reports/2014/vulnerability788210.html",
"source": "secalert@redhat.com",
"tags": [
"Not Applicable",
"Third Party Advisory"
]
},
@ -1460,6 +1591,7 @@
"url": "https://yunus-shn.medium.com/ricon-industrial-cellular-router-heartbleed-attack-2634221c02bd",
"source": "secalert@redhat.com",
"tags": [
"Broken Link",
"Exploit",
"Third Party Advisory"
]

View File

@ -2,8 +2,9 @@
"id": "CVE-2014-0322",
"sourceIdentifier": "secure@microsoft.com",
"published": "2014-02-14T16:55:07.500",
"lastModified": "2018-10-12T22:05:53.590",
"vulnStatus": "Modified",
"lastModified": "2024-07-02T16:50:50.417",
"vulnStatus": "Analyzed",
"cveTags": [],
"cisaExploitAdd": "2022-05-04",
"cisaActionDue": "2022-05-25",
"cisaRequiredAction": "Apply updates per vendor instructions.",
@ -19,6 +20,28 @@
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
}
],
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
@ -59,6 +82,7 @@
],
"configurations": [
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
@ -68,13 +92,81 @@
"vulnerable": true,
"criteria": "cpe:2.3:a:microsoft:internet_explorer:9:*:*:*:*:*:*:*",
"matchCriteriaId": "C043EDDD-41BF-4718-BDCF-158BBBDB6360"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:o:microsoft:windows_7:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E33796DB-4523-4F04-B564-ADF030553D51"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:o:microsoft:windows_server_2008:-:*:*:*:*:*:*:*",
"matchCriteriaId": "32623D48-7000-4C7D-823F-7D2A9841D88C"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:o:microsoft:windows_server_2008:r2:*:*:*:*:*:*:*",
"matchCriteriaId": "36559BC0-44D7-48B3-86FF-1BFF0257B5ED"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:o:microsoft:windows_vista:-:*:*:*:*:*:*:*",
"matchCriteriaId": "7CAEEA81-5037-4B68-98D9-83AAEBC98E20"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:microsoft:internet_explorer:10:*:*:*:*:*:*:*",
"matchCriteriaId": "D5808661-A082-4CBE-808C-B253972487B4"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:o:microsoft:windows_7:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E33796DB-4523-4F04-B564-ADF030553D51"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:o:microsoft:windows_8:-:*:*:*:*:*:*:*",
"matchCriteriaId": "0D229E41-A971-4284-9657-16D78414B93F"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:o:microsoft:windows_rt:-:*:*:*:*:*:*:*",
"matchCriteriaId": "ABC7A32C-4A4A-4533-B42E-350E728ADFEB"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:o:microsoft:windows_server_2008:r2:*:*:*:*:*:*:*",
"matchCriteriaId": "36559BC0-44D7-48B3-86FF-1BFF0257B5ED"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A7DF96F8-BA6A-4780-9CA3-F719B3F81074"
}
]
}
]
}
@ -84,6 +176,7 @@
"url": "http://community.websense.com/blogs/securitylabs/archive/2014/02/13/msie-0-day-exploit-cve-2014-0322-possibly-targeting-french-aerospace-organization.aspx",
"source": "secure@microsoft.com",
"tags": [
"Broken Link",
"Permissions Required"
]
},
@ -91,7 +184,6 @@
"url": "http://technet.microsoft.com/security/advisory/2934088",
"source": "secure@microsoft.com",
"tags": [
"Mitigation",
"Patch",
"Vendor Advisory"
]
@ -107,14 +199,18 @@
"url": "http://www.exploit-db.com/exploits/32851",
"source": "secure@microsoft.com",
"tags": [
"Exploit"
"Exploit",
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "http://www.exploit-db.com/exploits/32904",
"source": "secure@microsoft.com",
"tags": [
"Exploit"
"Exploit",
"Third Party Advisory",
"VDB Entry"
]
},
{
@ -141,16 +237,24 @@
},
{
"url": "http://www.osvdb.org/103354",
"source": "secure@microsoft.com"
"source": "secure@microsoft.com",
"tags": [
"Broken Link"
]
},
{
"url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2014/ms14-012",
"source": "secure@microsoft.com"
"source": "secure@microsoft.com",
"tags": [
"Patch",
"Vendor Advisory"
]
},
{
"url": "https://www.dropbox.com/s/pyxjgycmudirbqe/CVE-2014-0322.zip",
"source": "secure@microsoft.com",
"tags": [
"Broken Link",
"Exploit"
]
}

View File

@ -2,8 +2,9 @@
"id": "CVE-2014-0780",
"sourceIdentifier": "ics-cert@hq.dhs.gov",
"published": "2014-04-25T05:12:07.787",
"lastModified": "2017-09-16T01:29:00.513",
"vulnStatus": "Modified",
"lastModified": "2024-07-02T16:56:31.520",
"vulnStatus": "Analyzed",
"cveTags": [],
"cisaExploitAdd": "2022-04-15",
"cisaActionDue": "2022-05-06",
"cisaRequiredAction": "Apply updates per vendor instructions.",
@ -19,6 +20,28 @@
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
],
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
@ -64,12 +87,6 @@
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:indusoft:web_studio:*:sp2:*:*:*:*:*:*",
"versionEndIncluding": "7.1",
"matchCriteriaId": "DF9D06D2-1A09-4878-A863-978AF8B9DA10"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:indusoft:web_studio:7.1:-:*:*:*:*:*:*",
@ -79,6 +96,11 @@
"vulnerable": true,
"criteria": "cpe:2.3:a:indusoft:web_studio:7.1:sp1:*:*:*:*:*:*",
"matchCriteriaId": "15896AF9-B4C0-42B5-AE78-AB05B629D9C4"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:indusoft:web_studio:7.1:sp2:*:*:*:*:*:*",
"matchCriteriaId": "446AC1D0-4F70-42C1-9083-E859F23E1357"
}
]
}
@ -91,16 +113,27 @@
"source": "ics-cert@hq.dhs.gov",
"tags": [
"Patch",
"Third Party Advisory",
"US Government Resource"
]
},
{
"url": "http://www.securityfocus.com/bid/67056",
"source": "ics-cert@hq.dhs.gov"
"source": "ics-cert@hq.dhs.gov",
"tags": [
"Broken Link",
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "https://www.exploit-db.com/exploits/42699/",
"source": "ics-cert@hq.dhs.gov"
"source": "ics-cert@hq.dhs.gov",
"tags": [
"Exploit",
"Third Party Advisory",
"VDB Entry"
]
}
]
}

View File

@ -2,8 +2,9 @@
"id": "CVE-2014-4113",
"sourceIdentifier": "secure@microsoft.com",
"published": "2014-10-15T10:55:07.473",
"lastModified": "2019-02-26T14:04:02.400",
"vulnStatus": "Modified",
"lastModified": "2024-07-02T16:57:12.317",
"vulnStatus": "Analyzed",
"cveTags": [],
"cisaExploitAdd": "2022-05-04",
"cisaActionDue": "2022-05-25",
"cisaRequiredAction": "Apply updates per vendor instructions.",
@ -19,6 +20,28 @@
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
}
],
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
@ -52,7 +75,7 @@
"description": [
{
"lang": "en",
"value": "CWE-264"
"value": "NVD-CWE-noinfo"
}
]
}
@ -81,8 +104,8 @@
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_rt:-:gold:*:*:*:*:*:*",
"matchCriteriaId": "DC5F631C-5461-4C0B-AE80-079A987912DA"
"criteria": "cpe:2.3:o:microsoft:windows_rt:-:*:*:*:*:*:*:*",
"matchCriteriaId": "ABC7A32C-4A4A-4533-B42E-350E728ADFEB"
},
{
"vulnerable": true,
@ -91,13 +114,13 @@
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_server_2003:*:sp2:*:*:*:*:*:*",
"matchCriteriaId": "4D3B5E4F-56A6-4696-BBB4-19DF3613D020"
"criteria": "cpe:2.3:o:microsoft:windows_server_2003:-:sp2:*:*:*:*:*:*",
"matchCriteriaId": "1D929AA2-EE0B-4AA1-805D-69BCCA11B77F"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_server_2008:*:sp2:*:*:*:*:*:*",
"matchCriteriaId": "0C28897B-044A-447B-AD76-6397F8190177"
"criteria": "cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:*:*",
"matchCriteriaId": "5F422A8C-2C4E-42C8-B420-E0728037E15C"
},
{
"vulnerable": true,
@ -106,8 +129,8 @@
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_server_2012:-:gold:*:*:*:*:*:*",
"matchCriteriaId": "AB506484-7F0C-46BF-8EA6-4FB5AF454CED"
"criteria": "cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A7DF96F8-BA6A-4780-9CA3-F719B3F81074"
},
{
"vulnerable": true,
@ -116,8 +139,8 @@
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_vista:*:sp2:*:*:*:*:*:*",
"matchCriteriaId": "0A0D2704-C058-420B-B368-372D1129E914"
"criteria": "cpe:2.3:o:microsoft:windows_vista:-:sp2:*:*:*:*:*:*",
"matchCriteriaId": "BF1AD1A1-EE20-4BCE-9EE6-84B27139811C"
}
]
}
@ -129,54 +152,90 @@
"url": "http://blog.trendmicro.com/trendlabs-security-intelligence/an-analysis-of-a-windows-kernel-mode-vulnerability-cve-2014-4113/",
"source": "secure@microsoft.com",
"tags": [
"Exploit"
"Exploit",
"Not Applicable"
]
},
{
"url": "http://blogs.technet.com/b/srd/archive/2014/10/14/accessing-risk-for-the-october-2014-security-updates.aspx",
"source": "secure@microsoft.com",
"tags": [
"Not Applicable",
"Vendor Advisory"
]
},
{
"url": "http://osvdb.org/show/osvdb/113167",
"source": "secure@microsoft.com"
"source": "secure@microsoft.com",
"tags": [
"Broken Link"
]
},
{
"url": "http://packetstormsecurity.com/files/131964/Windows-8.0-8.1-x64-TrackPopupMenu-Privilege-Escalation.html",
"source": "secure@microsoft.com"
"source": "secure@microsoft.com",
"tags": [
"Exploit",
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "http://secunia.com/advisories/60970",
"source": "secure@microsoft.com"
"source": "secure@microsoft.com",
"tags": [
"Broken Link"
]
},
{
"url": "http://www.exploit-db.com/exploits/35101",
"source": "secure@microsoft.com",
"tags": [
"Exploit"
"Exploit",
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "http://www.securityfocus.com/bid/70364",
"source": "secure@microsoft.com"
"source": "secure@microsoft.com",
"tags": [
"Broken Link",
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2014/ms14-058",
"source": "secure@microsoft.com"
"source": "secure@microsoft.com",
"tags": [
"Patch",
"Vendor Advisory"
]
},
{
"url": "https://github.com/sam-b/CVE-2014-4113",
"source": "secure@microsoft.com"
"source": "secure@microsoft.com",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://www.exploit-db.com/exploits/37064/",
"source": "secure@microsoft.com"
"source": "secure@microsoft.com",
"tags": [
"Exploit",
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "https://www.exploit-db.com/exploits/39666/",
"source": "secure@microsoft.com"
"source": "secure@microsoft.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
}
]
}

View File

@ -2,8 +2,9 @@
"id": "CVE-2015-0311",
"sourceIdentifier": "psirt@adobe.com",
"published": "2015-01-23T21:59:04.897",
"lastModified": "2015-02-14T03:00:01.597",
"vulnStatus": "Modified",
"lastModified": "2024-07-02T17:41:45.947",
"vulnStatus": "Analyzed",
"cveTags": [],
"cisaExploitAdd": "2022-04-13",
"cisaActionDue": "2022-05-04",
"cisaRequiredAction": "The impacted product is end-of-life and should be disconnected if still in use.",
@ -19,6 +20,28 @@
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
],
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
@ -101,68 +124,10 @@
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:flash_player:14.0.0.125:*:*:*:*:*:*:*",
"matchCriteriaId": "D5D7202D-56DF-400B-9F09-E7D9938222D3"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:flash_player:14.0.0.145:*:*:*:*:*:*:*",
"matchCriteriaId": "4D4F0D21-A64B-46C1-9591-96529661DF0B"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:flash_player:14.0.0.176:*:*:*:*:*:*:*",
"matchCriteriaId": "86961019-3B81-458E-949F-A2F006EA55FE"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:flash_player:14.0.0.179:*:*:*:*:*:*:*",
"matchCriteriaId": "25895BE9-71FD-4DE7-90FC-0199470A8738"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:flash_player:15.0.0.152:*:*:*:*:*:*:*",
"matchCriteriaId": "4D55A950-7D48-413C-AD43-6AC64FBE790C"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:flash_player:15.0.0.167:*:*:*:*:*:*:*",
"matchCriteriaId": "F1A22B74-453D-4A8A-B79A-2B3143A0D995"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:flash_player:15.0.0.189:*:*:*:*:*:*:*",
"matchCriteriaId": "3FE4B077-67D1-4B25-976E-715FB6B2A1D1"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:flash_player:15.0.0.223:*:*:*:*:*:*:*",
"matchCriteriaId": "BFC91B68-6B35-47BD-BC02-3F836E772CF3"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:flash_player:15.0.0.239:*:*:*:*:*:*:*",
"matchCriteriaId": "A3BE6004-C30A-46E2-9F25-785E12BBF640"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:flash_player:15.0.0.246:*:*:*:*:*:*:*",
"matchCriteriaId": "CFE8E51F-7A32-41A4-B03A-73E52EB64C04"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:flash_player:16.0.0.235:*:*:*:*:*:*:*",
"matchCriteriaId": "3E13E927-A77C-4681-AFDE-A5A14093234D"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:flash_player:16.0.0.257:*:*:*:*:*:*:*",
"matchCriteriaId": "27629FF0-5EB9-476F-B5B3-115F663AB65E"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:flash_player:16.0.0.287:*:*:*:*:*:*:*",
"matchCriteriaId": "C0AB583F-3EBD-47B6-975E-7754CC32CCA7"
"criteria": "cpe:2.3:a:adobe:flash_player:*:*:*:*:*:*:*:*",
"versionStartIncluding": "14.0.0.125",
"versionEndExcluding": "16.0.0.287",
"matchCriteriaId": "4112453A-E2BA-4C22-AC5A-F186F953012B"
}
]
},
@ -183,6 +148,137 @@
]
}
]
},
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:suse:linux_enterprise_desktop:11:sp3:*:*:*:*:*:*",
"matchCriteriaId": "3ED68ADD-BBDA-4485-BC76-58F011D72311"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:suse:linux_enterprise_desktop:12:-:*:*:*:*:*:*",
"matchCriteriaId": "D2DF4815-B8CB-4AD3-B91D-2E09A8E318E9"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:suse:linux_enterprise_workstation_extension:12:-:*:*:*:*:*:*",
"matchCriteriaId": "028ABA8F-4E7B-4CD0-B6FC-3A0941E254BA"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:microsoft:internet_explorer:10:*:*:*:*:*:*:*",
"matchCriteriaId": "D5808661-A082-4CBE-808C-B253972487B4"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:o:microsoft:windows_8:-:*:*:*:*:*:*:*",
"matchCriteriaId": "0D229E41-A971-4284-9657-16D78414B93F"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:o:microsoft:windows_rt:-:*:*:*:*:*:*:*",
"matchCriteriaId": "ABC7A32C-4A4A-4533-B42E-350E728ADFEB"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A7DF96F8-BA6A-4780-9CA3-F719B3F81074"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:microsoft:internet_explorer:11:-:*:*:*:*:*:*",
"matchCriteriaId": "D7809F78-8D56-4925-A8F9-4119B973A667"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:o:microsoft:windows_10_1507:-:*:*:*:*:*:*:*",
"matchCriteriaId": "542DAEEC-73CC-46C6-A630-BF474A3446AC"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:o:microsoft:windows_8.1:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E93068DB-549B-45AB-8E5C-00EB5D8B5CF8"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:o:microsoft:windows_rt_8.1:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C6CE5198-C498-4672-AF4C-77AB4BE06C5C"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*",
"matchCriteriaId": "DB18C4CE-5917-401E-ACF7-2747084FD36E"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:microsoft:edge:-:*:*:*:*:*:*:*",
"matchCriteriaId": "77D197D7-57FB-4898-8C70-B19D5F0D5BE0"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:o:microsoft:windows_10_1507:-:*:*:*:*:*:*:*",
"matchCriteriaId": "542DAEEC-73CC-46C6-A630-BF474A3446AC"
}
]
}
]
}
],
"references": [
@ -190,61 +286,106 @@
"url": "http://helpx.adobe.com/security/products/flash-player/apsa15-01.html",
"source": "psirt@adobe.com",
"tags": [
"Patch",
"Vendor Advisory"
]
},
{
"url": "http://helpx.adobe.com/security/products/flash-player/apsb15-03.html",
"source": "psirt@adobe.com"
"source": "psirt@adobe.com",
"tags": [
"Broken Link"
]
},
{
"url": "http://lists.opensuse.org/opensuse-security-announce/2015-01/msg00027.html",
"source": "psirt@adobe.com"
"source": "psirt@adobe.com",
"tags": [
"Mailing List",
"Third Party Advisory"
]
},
{
"url": "http://lists.opensuse.org/opensuse-security-announce/2015-01/msg00031.html",
"source": "psirt@adobe.com"
"source": "psirt@adobe.com",
"tags": [
"Mailing List",
"Third Party Advisory"
]
},
{
"url": "http://malware.dontneedcoffee.com/2015/01/unpatched-vulnerability-0day-in-flash.html",
"source": "psirt@adobe.com"
"source": "psirt@adobe.com",
"tags": [
"Third Party Advisory"
]
},
{
"url": "http://secunia.com/advisories/62432",
"source": "psirt@adobe.com"
"source": "psirt@adobe.com",
"tags": [
"Broken Link"
]
},
{
"url": "http://secunia.com/advisories/62543",
"source": "psirt@adobe.com"
"source": "psirt@adobe.com",
"tags": [
"Broken Link"
]
},
{
"url": "http://secunia.com/advisories/62650",
"source": "psirt@adobe.com"
"source": "psirt@adobe.com",
"tags": [
"Broken Link"
]
},
{
"url": "http://secunia.com/advisories/62660",
"source": "psirt@adobe.com"
"source": "psirt@adobe.com",
"tags": [
"Broken Link"
]
},
{
"url": "http://secunia.com/advisories/62740",
"source": "psirt@adobe.com"
"source": "psirt@adobe.com",
"tags": [
"Broken Link"
]
},
{
"url": "http://security.gentoo.org/glsa/glsa-201502-02.xml",
"source": "psirt@adobe.com"
"source": "psirt@adobe.com",
"tags": [
"Third Party Advisory"
]
},
{
"url": "http://www.securityfocus.com/bid/72283",
"source": "psirt@adobe.com"
"source": "psirt@adobe.com",
"tags": [
"Broken Link",
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "http://www.securitytracker.com/id/1031597",
"source": "psirt@adobe.com"
"source": "psirt@adobe.com",
"tags": [
"Broken Link",
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "https://technet.microsoft.com/library/security/2755801",
"source": "psirt@adobe.com"
"source": "psirt@adobe.com",
"tags": [
"Patch",
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,9 @@
"id": "CVE-2015-0313",
"sourceIdentifier": "psirt@adobe.com",
"published": "2015-02-02T19:59:00.053",
"lastModified": "2017-09-08T01:29:39.403",
"vulnStatus": "Modified",
"lastModified": "2024-07-02T17:41:33.407",
"vulnStatus": "Analyzed",
"cveTags": [],
"cisaExploitAdd": "2022-04-13",
"cisaActionDue": "2022-05-04",
"cisaRequiredAction": "The impacted product is end-of-life and should be disconnected if still in use.",
@ -19,6 +20,28 @@
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
],
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
@ -52,7 +75,7 @@
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
"value": "CWE-416"
}
]
}
@ -68,8 +91,8 @@
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:flash_player:*:*:*:*:*:*:*:*",
"versionEndIncluding": "11.2.202.440",
"matchCriteriaId": "BD7D850A-22AB-4392-9322-B7C85C81FCAB"
"versionEndExcluding": "11.2.202.442",
"matchCriteriaId": "85336B7E-F3A3-42C7-B698-673C2F159F43"
}
]
},
@ -96,78 +119,15 @@
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:flash_player:*:*:*:*:*:*:*:*",
"versionEndIncluding": "13.0.0.264",
"matchCriteriaId": "35A39AB2-E3C6-4C70-8CC9-0050184DB2B5"
"versionEndExcluding": "13.0.0.269",
"matchCriteriaId": "EDF64939-9286-49D2-83DF-A3C9E944F367"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:flash_player:14.0.0.125:*:*:*:*:*:*:*",
"matchCriteriaId": "D5D7202D-56DF-400B-9F09-E7D9938222D3"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:flash_player:14.0.0.145:*:*:*:*:*:*:*",
"matchCriteriaId": "4D4F0D21-A64B-46C1-9591-96529661DF0B"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:flash_player:14.0.0.176:*:*:*:*:*:*:*",
"matchCriteriaId": "86961019-3B81-458E-949F-A2F006EA55FE"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:flash_player:14.0.0.179:*:*:*:*:*:*:*",
"matchCriteriaId": "25895BE9-71FD-4DE7-90FC-0199470A8738"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:flash_player:15.0.0.152:*:*:*:*:*:*:*",
"matchCriteriaId": "4D55A950-7D48-413C-AD43-6AC64FBE790C"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:flash_player:15.0.0.167:*:*:*:*:*:*:*",
"matchCriteriaId": "F1A22B74-453D-4A8A-B79A-2B3143A0D995"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:flash_player:15.0.0.189:*:*:*:*:*:*:*",
"matchCriteriaId": "3FE4B077-67D1-4B25-976E-715FB6B2A1D1"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:flash_player:15.0.0.223:*:*:*:*:*:*:*",
"matchCriteriaId": "BFC91B68-6B35-47BD-BC02-3F836E772CF3"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:flash_player:15.0.0.239:*:*:*:*:*:*:*",
"matchCriteriaId": "A3BE6004-C30A-46E2-9F25-785E12BBF640"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:flash_player:15.0.0.246:*:*:*:*:*:*:*",
"matchCriteriaId": "CFE8E51F-7A32-41A4-B03A-73E52EB64C04"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:flash_player:16.0.0.235:*:*:*:*:*:*:*",
"matchCriteriaId": "3E13E927-A77C-4681-AFDE-A5A14093234D"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:flash_player:16.0.0.257:*:*:*:*:*:*:*",
"matchCriteriaId": "27629FF0-5EB9-476F-B5B3-115F663AB65E"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:flash_player:16.0.0.287:*:*:*:*:*:*:*",
"matchCriteriaId": "C0AB583F-3EBD-47B6-975E-7754CC32CCA7"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:flash_player:16.0.0.296:*:*:*:*:*:*:*",
"matchCriteriaId": "B58DE1A9-0510-4B65-AB18-75F9263A7818"
"criteria": "cpe:2.3:a:adobe:flash_player:*:*:*:*:*:*:*:*",
"versionStartIncluding": "14.0.0.125",
"versionEndExcluding": "16.0.0.305",
"matchCriteriaId": "81D18A4C-3F1B-4C2D-A024-09D5811B4957"
}
]
},
@ -188,56 +148,249 @@
]
}
]
},
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:opensuse:evergreen:11.4:*:*:*:*:*:*:*",
"matchCriteriaId": "CCE4D64E-8C4B-4F21-A9B0-90637C85C1D0"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*",
"matchCriteriaId": "A10BC294-9196-425F-9FB0-B1625465B47F"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*",
"matchCriteriaId": "03117DF1-3BEC-4B8D-AD63-DBBDB2126081"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:suse:linux_enterprise_desktop:11:sp3:*:*:*:*:*:*",
"matchCriteriaId": "3ED68ADD-BBDA-4485-BC76-58F011D72311"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:suse:linux_enterprise_desktop:12:-:*:*:*:*:*:*",
"matchCriteriaId": "D2DF4815-B8CB-4AD3-B91D-2E09A8E318E9"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:suse:linux_enterprise_workstation_extension:12:-:*:*:*:*:*:*",
"matchCriteriaId": "028ABA8F-4E7B-4CD0-B6FC-3A0941E254BA"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:microsoft:internet_explorer:10:*:*:*:*:*:*:*",
"matchCriteriaId": "D5808661-A082-4CBE-808C-B253972487B4"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:o:microsoft:windows_8:-:*:*:*:*:*:*:*",
"matchCriteriaId": "0D229E41-A971-4284-9657-16D78414B93F"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:o:microsoft:windows_rt:-:*:*:*:*:*:*:*",
"matchCriteriaId": "ABC7A32C-4A4A-4533-B42E-350E728ADFEB"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A7DF96F8-BA6A-4780-9CA3-F719B3F81074"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:microsoft:internet_explorer:11:-:*:*:*:*:*:*",
"matchCriteriaId": "D7809F78-8D56-4925-A8F9-4119B973A667"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:o:microsoft:windows_10_1507:-:*:*:*:*:*:*:*",
"matchCriteriaId": "542DAEEC-73CC-46C6-A630-BF474A3446AC"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:o:microsoft:windows_8.1:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E93068DB-549B-45AB-8E5C-00EB5D8B5CF8"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:o:microsoft:windows_rt_8.1:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C6CE5198-C498-4672-AF4C-77AB4BE06C5C"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*",
"matchCriteriaId": "DB18C4CE-5917-401E-ACF7-2747084FD36E"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:microsoft:edge:-:*:*:*:*:*:*:*",
"matchCriteriaId": "77D197D7-57FB-4898-8C70-B19D5F0D5BE0"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:o:microsoft:windows_10_1507:-:*:*:*:*:*:*:*",
"matchCriteriaId": "542DAEEC-73CC-46C6-A630-BF474A3446AC"
}
]
}
]
}
],
"references": [
{
"url": "http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00006.html",
"source": "psirt@adobe.com"
"source": "psirt@adobe.com",
"tags": [
"Mailing List",
"Third Party Advisory"
]
},
{
"url": "http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00007.html",
"source": "psirt@adobe.com"
"source": "psirt@adobe.com",
"tags": [
"Mailing List",
"Third Party Advisory"
]
},
{
"url": "http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00008.html",
"source": "psirt@adobe.com"
"source": "psirt@adobe.com",
"tags": [
"Mailing List",
"Third Party Advisory"
]
},
{
"url": "http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00009.html",
"source": "psirt@adobe.com"
"source": "psirt@adobe.com",
"tags": [
"Mailing List",
"Third Party Advisory"
]
},
{
"url": "http://packetstormsecurity.com/files/131189/Adobe-Flash-Player-ByteArray-With-Workers-Use-After-Free.html",
"source": "psirt@adobe.com"
"source": "psirt@adobe.com",
"tags": [
"Exploit",
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "http://secunia.com/advisories/62528",
"source": "psirt@adobe.com"
"source": "psirt@adobe.com",
"tags": [
"Broken Link"
]
},
{
"url": "http://secunia.com/advisories/62777",
"source": "psirt@adobe.com"
"source": "psirt@adobe.com",
"tags": [
"Broken Link"
]
},
{
"url": "http://secunia.com/advisories/62895",
"source": "psirt@adobe.com"
"source": "psirt@adobe.com",
"tags": [
"Broken Link"
]
},
{
"url": "http://www.osvdb.org/117853",
"source": "psirt@adobe.com"
"source": "psirt@adobe.com",
"tags": [
"Broken Link"
]
},
{
"url": "http://www.securityfocus.com/bid/72429",
"source": "psirt@adobe.com"
"source": "psirt@adobe.com",
"tags": [
"Broken Link",
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "http://www.securitytracker.com/id/1031686",
"source": "psirt@adobe.com"
"source": "psirt@adobe.com",
"tags": [
"Broken Link",
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/100641",
"source": "psirt@adobe.com"
"source": "psirt@adobe.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "https://helpx.adobe.com/security/products/flash-player/apsa15-02.html",
@ -248,15 +401,27 @@
},
{
"url": "https://helpx.adobe.com/security/products/flash-player/apsb15-04.html",
"source": "psirt@adobe.com"
"source": "psirt@adobe.com",
"tags": [
"Broken Link"
]
},
{
"url": "https://technet.microsoft.com/library/security/2755801",
"source": "psirt@adobe.com"
"source": "psirt@adobe.com",
"tags": [
"Patch",
"Vendor Advisory"
]
},
{
"url": "https://www.exploit-db.com/exploits/36579/",
"source": "psirt@adobe.com"
"source": "psirt@adobe.com",
"tags": [
"Exploit",
"Third Party Advisory",
"VDB Entry"
]
}
]
}

View File

@ -2,8 +2,9 @@
"id": "CVE-2015-2502",
"sourceIdentifier": "secure@microsoft.com",
"published": "2015-08-19T10:59:00.090",
"lastModified": "2018-10-12T22:09:50.873",
"vulnStatus": "Modified",
"lastModified": "2024-07-02T17:42:08.410",
"vulnStatus": "Analyzed",
"cveTags": [],
"cisaExploitAdd": "2022-04-13",
"cisaActionDue": "2022-05-04",
"cisaRequiredAction": "Apply updates per vendor instructions.",
@ -19,6 +20,28 @@
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
}
],
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
@ -52,13 +75,14 @@
"description": [
{
"lang": "en",
"value": "CWE-119"
"value": "CWE-787"
}
]
}
],
"configurations": [
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
@ -68,26 +92,200 @@
"vulnerable": true,
"criteria": "cpe:2.3:a:microsoft:internet_explorer:7:*:*:*:*:*:*:*",
"matchCriteriaId": "1A33FA7F-BB2A-4C66-B608-72997A2BD1DB"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:*:*",
"matchCriteriaId": "5F422A8C-2C4E-42C8-B420-E0728037E15C"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:o:microsoft:windows_vista:-:sp2:*:*:*:*:*:*",
"matchCriteriaId": "BF1AD1A1-EE20-4BCE-9EE6-84B27139811C"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:microsoft:internet_explorer:8:*:*:*:*:*:*:*",
"matchCriteriaId": "A52E757F-9B41-43B4-9D67-3FEDACA71283"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:o:microsoft:windows_7:-:sp1:*:*:*:*:*:*",
"matchCriteriaId": "C2B1C231-DE19-4B8F-A4AA-5B3A65276E46"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:*:*",
"matchCriteriaId": "5F422A8C-2C4E-42C8-B420-E0728037E15C"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:*:*",
"matchCriteriaId": "2ACA9287-B475-4AF7-A4DA-A7143CEF9E57"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:o:microsoft:windows_vista:-:sp2:*:*:*:*:*:*",
"matchCriteriaId": "BF1AD1A1-EE20-4BCE-9EE6-84B27139811C"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:microsoft:internet_explorer:9:*:*:*:*:*:*:*",
"matchCriteriaId": "C043EDDD-41BF-4718-BDCF-158BBBDB6360"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:o:microsoft:windows_7:-:sp1:*:*:*:*:*:*",
"matchCriteriaId": "C2B1C231-DE19-4B8F-A4AA-5B3A65276E46"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:*:*",
"matchCriteriaId": "5F422A8C-2C4E-42C8-B420-E0728037E15C"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*",
"matchCriteriaId": "AF07A81D-12E5-4B1D-BFF9-C8D08C32FF4F"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:o:microsoft:windows_vista:-:sp2:*:*:*:*:*:*",
"matchCriteriaId": "BF1AD1A1-EE20-4BCE-9EE6-84B27139811C"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:microsoft:internet_explorer:10:*:*:*:*:*:*:*",
"matchCriteriaId": "D5808661-A082-4CBE-808C-B253972487B4"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:o:microsoft:windows_7:-:sp1:*:*:*:*:*:*",
"matchCriteriaId": "C2B1C231-DE19-4B8F-A4AA-5B3A65276E46"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:o:microsoft:windows_8:-:*:*:*:*:*:*:*",
"matchCriteriaId": "0D229E41-A971-4284-9657-16D78414B93F"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*",
"matchCriteriaId": "AF07A81D-12E5-4B1D-BFF9-C8D08C32FF4F"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A7DF96F8-BA6A-4780-9CA3-F719B3F81074"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:microsoft:internet_explorer:11:-:*:*:*:*:*:*",
"matchCriteriaId": "D7809F78-8D56-4925-A8F9-4119B973A667"
"criteria": "cpe:2.3:a:microsoft:internet_explorer:11:*:*:*:*:*:*:*",
"matchCriteriaId": "15BAAA8C-7AF1-46CE-9FFB-3A498508A1BF"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:o:microsoft:windows_10_1507:-:*:*:*:*:*:*:*",
"matchCriteriaId": "542DAEEC-73CC-46C6-A630-BF474A3446AC"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:o:microsoft:windows_7:-:sp1:*:*:*:*:*:*",
"matchCriteriaId": "C2B1C231-DE19-4B8F-A4AA-5B3A65276E46"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:o:microsoft:windows_8.1:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E93068DB-549B-45AB-8E5C-00EB5D8B5CF8"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:o:microsoft:windows_rt_8.1:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C6CE5198-C498-4672-AF4C-77AB4BE06C5C"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*",
"matchCriteriaId": "AF07A81D-12E5-4B1D-BFF9-C8D08C32FF4F"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*",
"matchCriteriaId": "DB18C4CE-5917-401E-ACF7-2747084FD36E"
}
]
}
@ -97,27 +295,50 @@
"references": [
{
"url": "http://twitter.com/Laughing_Mantis/statuses/633839231840841728",
"source": "secure@microsoft.com"
"source": "secure@microsoft.com",
"tags": [
"Exploit"
]
},
{
"url": "http://twitter.com/Laughing_Mantis/statuses/633839771865886721",
"source": "secure@microsoft.com"
"source": "secure@microsoft.com",
"tags": [
"Broken Link"
]
},
{
"url": "http://www.securityfocus.com/bid/76403",
"source": "secure@microsoft.com"
"source": "secure@microsoft.com",
"tags": [
"Broken Link",
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "http://www.securitytracker.com/id/1033317",
"source": "secure@microsoft.com"
"source": "secure@microsoft.com",
"tags": [
"Broken Link",
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "http://www.securityweek.com/microsoft-issues-emergency-patch-critical-ie-flaw-exploited-wild",
"source": "secure@microsoft.com"
"source": "secure@microsoft.com",
"tags": [
"Press/Media Coverage"
]
},
{
"url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2015/ms15-093",
"source": "secure@microsoft.com"
"source": "secure@microsoft.com",
"tags": [
"Patch",
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,9 @@
"id": "CVE-2015-3113",
"sourceIdentifier": "psirt@adobe.com",
"published": "2015-06-23T21:59:01.960",
"lastModified": "2017-11-08T02:29:01.367",
"vulnStatus": "Modified",
"lastModified": "2024-07-02T17:41:54.833",
"vulnStatus": "Analyzed",
"cveTags": [],
"cisaExploitAdd": "2022-04-13",
"cisaActionDue": "2022-05-04",
"cisaRequiredAction": "The impacted product is end-of-life and should be disconnected if still in use.",
@ -19,6 +20,28 @@
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
],
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
@ -52,7 +75,7 @@
"description": [
{
"lang": "en",
"value": "CWE-119"
"value": "CWE-787"
}
]
}
@ -68,98 +91,15 @@
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:flash_player:*:*:*:*:*:*:*:*",
"versionEndIncluding": "13.0.0.292",
"matchCriteriaId": "DC0775F6-313B-457D-920A-01569689CD15"
"versionEndExcluding": "13.0.0.296",
"matchCriteriaId": "D0A6D8F3-8060-4F1E-B4E3-5097DBB199E5"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:flash_player:14.0.0.125:*:*:*:*:*:*:*",
"matchCriteriaId": "D5D7202D-56DF-400B-9F09-E7D9938222D3"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:flash_player:14.0.0.145:*:*:*:*:*:*:*",
"matchCriteriaId": "4D4F0D21-A64B-46C1-9591-96529661DF0B"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:flash_player:14.0.0.176:*:*:*:*:*:*:*",
"matchCriteriaId": "86961019-3B81-458E-949F-A2F006EA55FE"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:flash_player:14.0.0.179:*:*:*:*:*:*:*",
"matchCriteriaId": "25895BE9-71FD-4DE7-90FC-0199470A8738"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:flash_player:15.0.0.152:*:*:*:*:*:*:*",
"matchCriteriaId": "4D55A950-7D48-413C-AD43-6AC64FBE790C"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:flash_player:15.0.0.167:*:*:*:*:*:*:*",
"matchCriteriaId": "F1A22B74-453D-4A8A-B79A-2B3143A0D995"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:flash_player:15.0.0.189:*:*:*:*:*:*:*",
"matchCriteriaId": "3FE4B077-67D1-4B25-976E-715FB6B2A1D1"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:flash_player:15.0.0.223:*:*:*:*:*:*:*",
"matchCriteriaId": "BFC91B68-6B35-47BD-BC02-3F836E772CF3"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:flash_player:15.0.0.239:*:*:*:*:*:*:*",
"matchCriteriaId": "A3BE6004-C30A-46E2-9F25-785E12BBF640"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:flash_player:15.0.0.246:*:*:*:*:*:*:*",
"matchCriteriaId": "CFE8E51F-7A32-41A4-B03A-73E52EB64C04"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:flash_player:16.0.0.235:*:*:*:*:*:*:*",
"matchCriteriaId": "3E13E927-A77C-4681-AFDE-A5A14093234D"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:flash_player:16.0.0.257:*:*:*:*:*:*:*",
"matchCriteriaId": "27629FF0-5EB9-476F-B5B3-115F663AB65E"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:flash_player:16.0.0.287:*:*:*:*:*:*:*",
"matchCriteriaId": "C0AB583F-3EBD-47B6-975E-7754CC32CCA7"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:flash_player:16.0.0.296:*:*:*:*:*:*:*",
"matchCriteriaId": "B58DE1A9-0510-4B65-AB18-75F9263A7818"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:flash_player:17.0.0.134:*:*:*:*:*:*:*",
"matchCriteriaId": "1BC4FAD0-4A54-4EDF-BE39-28138B34E719"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:flash_player:17.0.0.169:*:*:*:*:*:*:*",
"matchCriteriaId": "BE1FBC20-3DE6-4426-9E97-42AFCEF8CEE4"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:flash_player:17.0.0.188:*:*:*:*:*:*:*",
"matchCriteriaId": "40EF2221-DE87-4D8F-B92D-8FD21EEBEABA"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:flash_player:18.0.0.161:*:*:*:*:*:*:*",
"matchCriteriaId": "2845F410-7E79-45B4-AFE6-8CF7D15925C2"
"criteria": "cpe:2.3:a:adobe:flash_player:*:*:*:*:*:*:*:*",
"versionStartIncluding": "14.0.0.125",
"versionEndExcluding": "18.0.0.194",
"matchCriteriaId": "28041519-51EA-4E8B-97BF-22E33466CBD1"
}
]
},
@ -191,8 +131,8 @@
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:flash_player:*:*:*:*:*:*:*:*",
"versionEndIncluding": "11.2.202.466",
"matchCriteriaId": "6AA338BA-8C37-4F59-AFBF-0ABFE1C960F0"
"versionEndExcluding": "11.2.202.468",
"matchCriteriaId": "B1781AF4-923C-441A-BE16-4F16C3788F59"
}
]
},
@ -208,64 +148,224 @@
]
}
]
},
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:opensuse:evergreen:11.4:*:*:*:*:*:*:*",
"matchCriteriaId": "CCE4D64E-8C4B-4F21-A9B0-90637C85C1D0"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*",
"matchCriteriaId": "A10BC294-9196-425F-9FB0-B1625465B47F"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*",
"matchCriteriaId": "03117DF1-3BEC-4B8D-AD63-DBBDB2126081"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:suse:linux_enterprise_desktop:12:-:*:*:*:*:*:*",
"matchCriteriaId": "D2DF4815-B8CB-4AD3-B91D-2E09A8E318E9"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:suse:linux_enterprise_workstation_extension:12:-:*:*:*:*:*:*",
"matchCriteriaId": "028ABA8F-4E7B-4CD0-B6FC-3A0941E254BA"
}
]
}
]
},
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:hp:insight_orchestration:*:*:*:*:*:*:*:*",
"versionEndExcluding": "7.5.0",
"matchCriteriaId": "01285B2A-0494-493D-93B3-7B8F93A76F66"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:hp:system_management_homepage:*:*:*:*:*:*:*:*",
"versionEndExcluding": "7.5.0",
"matchCriteriaId": "F39B8B36-2DC3-4791-A5BA-93C11F60FC1B"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:hp:systems_insight_manager:*:*:*:*:*:*:*:*",
"versionEndExcluding": "7.5",
"matchCriteriaId": "E87A4868-2C76-4632-BC54-A697A245F8AB"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:hp:version_control_agent:*:*:*:*:*:*:*:*",
"versionEndExcluding": "7.5.0",
"matchCriteriaId": "7E1DF4E5-F767-4948-9A42-C0B59740D557"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:hp:version_control_repository_manager:*:*:*:*:*:*:*:*",
"versionEndExcluding": "7.5.0",
"matchCriteriaId": "677729B1-4B3E-47E5-83CF-1A32979418FD"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:hp:version_control_repository_manager:7.6:*:*:*:*:*:*:*",
"matchCriteriaId": "DA5BC2D4-BFA8-4B05-B060-38417F815EF8"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:hp:virtual_connect_enterprise_manager:*:*:*:*:*:*:*:*",
"versionEndExcluding": "7.5.0",
"matchCriteriaId": "9D01C600-6D32-4886-9CB3-2D2FEFED2EF1"
}
]
}
]
},
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*",
"matchCriteriaId": "EE249E1B-A1FD-4E08-AA71-A0E1F10FFE97"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:redhat:enterprise_linux_eus:6.6:*:*:*:*:*:*:*",
"matchCriteriaId": "319EC0C6-94C5-494A-9C5D-DC5124DFC8E1"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*",
"matchCriteriaId": "9BBCD86A-E6C7-4444-9D74-F861084090F0"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*",
"matchCriteriaId": "E5ED5807-55B7-47C5-97A6-03233F4FBC3A"
}
]
}
]
}
],
"references": [
{
"url": "http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00020.html",
"source": "psirt@adobe.com"
"source": "psirt@adobe.com",
"tags": [
"Mailing List",
"Third Party Advisory"
]
},
{
"url": "http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00025.html",
"source": "psirt@adobe.com"
"source": "psirt@adobe.com",
"tags": [
"Mailing List",
"Third Party Advisory"
]
},
{
"url": "http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00002.html",
"source": "psirt@adobe.com"
"source": "psirt@adobe.com",
"tags": [
"Mailing List",
"Third Party Advisory"
]
},
{
"url": "http://marc.info/?l=bugtraq&m=144050155601375&w=2",
"source": "psirt@adobe.com"
"source": "psirt@adobe.com",
"tags": [
"Mailing List"
]
},
{
"url": "http://rhn.redhat.com/errata/RHSA-2015-1184.html",
"source": "psirt@adobe.com"
"source": "psirt@adobe.com",
"tags": [
"Third Party Advisory"
]
},
{
"url": "http://www.securityfocus.com/bid/75371",
"source": "psirt@adobe.com"
"source": "psirt@adobe.com",
"tags": [
"Broken Link",
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "http://www.securitytracker.com/id/1032696",
"source": "psirt@adobe.com"
"source": "psirt@adobe.com",
"tags": [
"Broken Link",
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1235036",
"source": "psirt@adobe.com"
"source": "psirt@adobe.com",
"tags": [
"Issue Tracking"
]
},
{
"url": "https://bugzilla.suse.com/show_bug.cgi?id=935701",
"source": "psirt@adobe.com"
"source": "psirt@adobe.com",
"tags": [
"Issue Tracking"
]
},
{
"url": "https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04952467",
"source": "psirt@adobe.com"
"source": "psirt@adobe.com",
"tags": [
"Broken Link"
]
},
{
"url": "https://helpx.adobe.com/security/products/flash-player/apsb15-14.html",
"source": "psirt@adobe.com",
"tags": [
"Broken Link",
"Patch",
"Vendor Advisory"
]
},
{
"url": "https://security.gentoo.org/glsa/201507-13",
"source": "psirt@adobe.com"
"source": "psirt@adobe.com",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://www.suse.com/security/cve/CVE-2015-3113.html",
"source": "psirt@adobe.com"
"source": "psirt@adobe.com",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,9 @@
"id": "CVE-2015-5122",
"sourceIdentifier": "psirt@adobe.com",
"published": "2015-07-14T10:59:00.213",
"lastModified": "2023-05-08T13:29:02.290",
"vulnStatus": "Modified",
"lastModified": "2024-07-02T17:42:40.230",
"vulnStatus": "Analyzed",
"cveTags": [],
"evaluatorComment": "<a href=\"http://cwe.mitre.org/data/definitions/416.html\" rel=\"nofollow\">CWE-416: Use After Free</a>",
"cisaExploitAdd": "2022-04-13",
"cisaActionDue": "2022-05-04",
@ -20,6 +21,28 @@
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
],
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
@ -53,7 +76,7 @@
"description": [
{
"lang": "en",
"value": "NVD-CWE-Other"
"value": "CWE-416"
}
]
}
@ -324,6 +347,7 @@
"url": "http://packetstormsecurity.com/files/132663/Adobe-Flash-opaqueBackground-Use-After-Free.html",
"source": "psirt@adobe.com",
"tags": [
"Exploit",
"Third Party Advisory",
"VDB Entry"
]
@ -354,6 +378,7 @@
"url": "http://www.securityfocus.com/bid/75712",
"source": "psirt@adobe.com",
"tags": [
"Broken Link",
"Third Party Advisory",
"VDB Entry"
]
@ -362,6 +387,7 @@
"url": "http://www.securitytracker.com/id/1032890",
"source": "psirt@adobe.com",
"tags": [
"Broken Link",
"Third Party Advisory",
"VDB Entry"
]
@ -378,6 +404,7 @@
"url": "https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04796784",
"source": "psirt@adobe.com",
"tags": [
"Broken Link",
"Third Party Advisory"
]
},
@ -392,6 +419,7 @@
"url": "https://helpx.adobe.com/security/products/flash-player/apsa15-04.html",
"source": "psirt@adobe.com",
"tags": [
"Broken Link",
"Vendor Advisory"
]
},
@ -399,6 +427,7 @@
"url": "https://helpx.adobe.com/security/products/flash-player/apsb15-18.html",
"source": "psirt@adobe.com",
"tags": [
"Broken Link",
"Vendor Advisory"
]
},
@ -406,6 +435,7 @@
"url": "https://perception-point.io/2018/04/11/breaking-cfi-cve-2015-5122-coop/",
"source": "psirt@adobe.com",
"tags": [
"Broken Link",
"Third Party Advisory"
]
},
@ -413,6 +443,7 @@
"url": "https://perception-point.io/new/breaking-cfi.php",
"source": "psirt@adobe.com",
"tags": [
"Broken Link",
"Third Party Advisory"
]
},
@ -427,6 +458,7 @@
"url": "https://www.exploit-db.com/exploits/37599/",
"source": "psirt@adobe.com",
"tags": [
"Exploit",
"Third Party Advisory",
"VDB Entry"
]
@ -435,6 +467,7 @@
"url": "https://www.fireeye.com/blog/threat-research/2015/07/cve-2015-5122_-_seco.html",
"source": "psirt@adobe.com",
"tags": [
"Broken Link",
"Third Party Advisory"
]
}

View File

@ -2,8 +2,9 @@
"id": "CVE-2015-5123",
"sourceIdentifier": "psirt@adobe.com",
"published": "2015-07-14T10:59:01.337",
"lastModified": "2021-09-08T17:19:26.453",
"vulnStatus": "Modified",
"lastModified": "2024-07-02T17:42:19.550",
"vulnStatus": "Analyzed",
"cveTags": [],
"cisaExploitAdd": "2022-04-13",
"cisaActionDue": "2022-05-04",
"cisaRequiredAction": "The impacted product is end-of-life and should be disconnected if still in use.",
@ -19,6 +20,28 @@
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
],
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
@ -221,6 +244,7 @@
"url": "http://blog.trendmicro.com/trendlabs-security-intelligence/new-zero-day-vulnerability-cve-2015-5123-in-adobe-flash-emerges-from-hacking-team-leak/",
"source": "psirt@adobe.com",
"tags": [
"Broken Link",
"Third Party Advisory"
]
},
@ -275,6 +299,7 @@
"url": "http://www.securityfocus.com/bid/75710",
"source": "psirt@adobe.com",
"tags": [
"Broken Link",
"Third Party Advisory",
"VDB Entry"
]
@ -283,6 +308,7 @@
"url": "http://www.securitytracker.com/id/1032890",
"source": "psirt@adobe.com",
"tags": [
"Broken Link",
"Third Party Advisory",
"VDB Entry"
]
@ -299,6 +325,7 @@
"url": "https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04796784",
"source": "psirt@adobe.com",
"tags": [
"Broken Link",
"Third Party Advisory"
]
},
@ -306,6 +333,7 @@
"url": "https://helpx.adobe.com/security/products/flash-player/apsa15-04.html",
"source": "psirt@adobe.com",
"tags": [
"Broken Link",
"Vendor Advisory"
]
},
@ -313,6 +341,7 @@
"url": "https://helpx.adobe.com/security/products/flash-player/apsb15-18.html",
"source": "psirt@adobe.com",
"tags": [
"Broken Link",
"Vendor Advisory"
]
},

View File

@ -2,8 +2,9 @@
"id": "CVE-2016-4523",
"sourceIdentifier": "ics-cert@hq.dhs.gov",
"published": "2016-06-09T10:59:04.073",
"lastModified": "2016-11-28T20:18:36.087",
"vulnStatus": "Modified",
"lastModified": "2024-07-02T16:57:38.053",
"vulnStatus": "Analyzed",
"cveTags": [],
"cisaExploitAdd": "2022-04-15",
"cisaActionDue": "2022-05-06",
"cisaRequiredAction": "Apply updates per vendor instructions.",
@ -19,13 +20,13 @@
}
],
"metrics": {
"cvssMetricV30": [
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.0",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
@ -74,7 +75,7 @@
"description": [
{
"lang": "en",
"value": "CWE-119"
"value": "CWE-125"
}
]
}
@ -88,333 +89,10 @@
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:trihedral:vtscada:9.0.02:*:*:*:*:*:*:*",
"matchCriteriaId": "F47D9BD4-A05E-4696-A6D9-7AEFE20BBD14"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:trihedral:vtscada:9.0.03:*:*:*:*:*:*:*",
"matchCriteriaId": "A1A85151-B206-4307-88C3-9107366C867F"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:trihedral:vtscada:9.0.08:*:*:*:*:*:*:*",
"matchCriteriaId": "3A1D1396-B8FA-4092-B136-899E2167B446"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:trihedral:vtscada:9.1.02:*:*:*:*:*:*:*",
"matchCriteriaId": "C1277933-197D-45D8-940C-1951212F9D95"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:trihedral:vtscada:9.1.03:*:*:*:*:*:*:*",
"matchCriteriaId": "6D5D9BD5-6C99-45E0-9CE0-B25C2C5353F5"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:trihedral:vtscada:9.1.05:*:*:*:*:*:*:*",
"matchCriteriaId": "42DB3997-3DCF-403F-B054-3F8AF25BC089"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:trihedral:vtscada:9.1.09:*:*:*:*:*:*:*",
"matchCriteriaId": "B5535DFC-4C77-4339-9C7A-C38BEC4404BA"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:trihedral:vtscada:9.1.11:*:*:*:*:*:*:*",
"matchCriteriaId": "6DC20DC9-6606-460E-97AE-02D1F579E37C"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:trihedral:vtscada:9.1.14:*:*:*:*:*:*:*",
"matchCriteriaId": "DBC2BF11-CE15-4216-928B-BF63B587FE8C"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:trihedral:vtscada:9.1.20:*:*:*:*:*:*:*",
"matchCriteriaId": "1BCCFB2C-00B7-4828-BCE3-97EBC4057669"
}
]
}
]
},
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:trihedral:vtscada:11.0.05:*:*:*:*:*:*:*",
"matchCriteriaId": "B5EB9BB9-F8C9-4661-AC5A-E3FD79AD4EEF"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:trihedral:vtscada:11.0.07:*:*:*:*:*:*:*",
"matchCriteriaId": "D5E6832C-B4EA-4A72-8ADF-B17F76DEE676"
}
]
}
]
},
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:trihedral:vtscada:10.0.11:*:*:*:*:*:*:*",
"matchCriteriaId": "697CBAB8-7025-44A6-A5A6-AFDDFA506CF2"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:trihedral:vtscada:10.0.13:*:*:*:*:*:*:*",
"matchCriteriaId": "8AC6FD46-0B0B-4859-A25C-292257454B66"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:trihedral:vtscada:10.0.14:*:*:*:*:*:*:*",
"matchCriteriaId": "C42E3FF1-2FF0-433A-B450-185079707242"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:trihedral:vtscada:10.0.16:*:*:*:*:*:*:*",
"matchCriteriaId": "591B8DE2-8150-4E4B-B293-D58598112E3F"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:trihedral:vtscada:10.0.17:*:*:*:*:*:*:*",
"matchCriteriaId": "F9D4C8A2-1B3B-4A2C-BADC-B3745F4001F7"
}
]
}
]
},
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:trihedral:vtscada:10.1.05:*:*:*:*:*:*:*",
"matchCriteriaId": "CE5FB3C2-42F0-4112-835F-EF71D4E17D2B"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:trihedral:vtscada:10.1.06:*:*:*:*:*:*:*",
"matchCriteriaId": "49946BC8-E01F-4F74-88B4-5F0B1A6179C3"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:trihedral:vtscada:10.1.07:*:*:*:*:*:*:*",
"matchCriteriaId": "0E9BB54A-83AE-41F8-B40B-BC3CB37683DD"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:trihedral:vtscada:10.1.12:*:*:*:*:*:*:*",
"matchCriteriaId": "DEA21497-E048-4510-AA31-887235217F80"
}
]
}
]
},
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:trihedral:vtscada:10.2.05:*:*:*:*:*:*:*",
"matchCriteriaId": "40460E2C-6919-4BF1-9E24-B3EE408FA995"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:trihedral:vtscada:10.2.07:*:*:*:*:*:*:*",
"matchCriteriaId": "3C031266-31AF-436C-9F36-D7112D1EE9BA"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:trihedral:vtscada:10.2.08:*:*:*:*:*:*:*",
"matchCriteriaId": "862D6C1B-0765-43C9-BD39-7C9F90025C50"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:trihedral:vtscada:10.2.11:*:*:*:*:*:*:*",
"matchCriteriaId": "95A94950-0F03-42FD-A74D-8ADE7A59DDD2"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:trihedral:vtscada:10.2.13:*:*:*:*:*:*:*",
"matchCriteriaId": "0B1798A8-EC8D-4CC5-AEBA-16EC45D1E754"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:trihedral:vtscada:10.2.14:*:*:*:*:*:*:*",
"matchCriteriaId": "57B7C44C-9920-439A-BDDD-EC3C3DC171A5"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:trihedral:vtscada:10.2.15:*:*:*:*:*:*:*",
"matchCriteriaId": "0F4BFACD-CEDB-4F1C-8BA6-E8B0BEF735F7"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:trihedral:vtscada:10.2.17:*:*:*:*:*:*:*",
"matchCriteriaId": "10349B72-13D3-4B70-B8CB-1223381F3630"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:trihedral:vtscada:10.2.19:*:*:*:*:*:*:*",
"matchCriteriaId": "721D6C57-2ADA-4400-A876-80281819CE1E"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:trihedral:vtscada:10.2.20:*:*:*:*:*:*:*",
"matchCriteriaId": "4266371D-4476-4455-8CAF-83DAD092783C"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:trihedral:vtscada:10.2.21:*:*:*:*:*:*:*",
"matchCriteriaId": "92EBB482-30B1-4AB3-A26A-0F1B66DFE5F3"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:trihedral:vtscada:10.2.22:*:*:*:*:*:*:*",
"matchCriteriaId": "1AC79329-249A-41C6-A545-B681DD494606"
}
]
}
]
},
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:trihedral:vtscada:8.0.05:*:*:*:*:*:*:*",
"matchCriteriaId": "35A5A441-F299-4E51-B2BF-872F263AC96C"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:trihedral:vtscada:8.0.12:*:*:*:*:*:*:*",
"matchCriteriaId": "D881DA9B-332A-47B0-9E1D-3936CC0E1761"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:trihedral:vtscada:8.0.16:*:*:*:*:*:*:*",
"matchCriteriaId": "8DB1488E-ABD2-443A-B51C-328FF32D4E52"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:trihedral:vtscada:8.0.18:*:*:*:*:*:*:*",
"matchCriteriaId": "EFB14116-AA51-408D-B632-5605CCD18D7A"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:trihedral:vtscada:8.1.05:*:*:*:*:*:*:*",
"matchCriteriaId": "5B1122D8-6E21-40A8-916A-E66622146CC0"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:trihedral:vtscada:8.1.06:*:*:*:*:*:*:*",
"matchCriteriaId": "AB0611D9-9C16-480A-BDB8-CC4FA289E6FF"
}
]
}
]
},
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:trihedral:vtscada:11.1.05:*:*:*:*:*:*:*",
"matchCriteriaId": "5ED3D431-13B0-4A2C-BE9F-64B89877DEEA"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:trihedral:vtscada:11.1.06:*:*:*:*:*:*:*",
"matchCriteriaId": "E6C1112A-8D28-4E58-B6E6-A8E95C09B06C"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:trihedral:vtscada:11.1.09:*:*:*:*:*:*:*",
"matchCriteriaId": "9155F402-CED2-47BE-A77E-04B8CA33C820"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:trihedral:vtscada:11.1.10:*:*:*:*:*:*:*",
"matchCriteriaId": "B0BC5077-7CE2-4670-8DCE-89168EB9EB45"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:trihedral:vtscada:11.1.13:*:*:*:*:*:*:*",
"matchCriteriaId": "3121360F-A114-46C9-A2D2-183B9481E9D7"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:trihedral:vtscada:11.1.14:*:*:*:*:*:*:*",
"matchCriteriaId": "3C0EAFD7-0D67-4865-8537-E81B193A11B8"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:trihedral:vtscada:11.1.15:*:*:*:*:*:*:*",
"matchCriteriaId": "0921489A-10AA-46D1-AD45-F29F0D97E302"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:trihedral:vtscada:11.1.16:*:*:*:*:*:*:*",
"matchCriteriaId": "1C4BB39D-3EC5-4F81-9AB8-C003FB40ECE8"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:trihedral:vtscada:11.1.17:*:*:*:*:*:*:*",
"matchCriteriaId": "E3F18ED0-7095-4126-B839-688994778D45"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:trihedral:vtscada:11.1.18:*:*:*:*:*:*:*",
"matchCriteriaId": "5775D09F-02F8-45FE-94E4-B5BAB6A5FFFC"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:trihedral:vtscada:11.1.19:*:*:*:*:*:*:*",
"matchCriteriaId": "6EA6AD0D-B2EA-4112-B437-F87C4265B9CA"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:trihedral:vtscada:11.1.20:*:*:*:*:*:*:*",
"matchCriteriaId": "6C41FA48-FDAF-48FC-9E98-F95C2E9AC835"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:trihedral:vtscada:11.1.21:*:*:*:*:*:*:*",
"matchCriteriaId": "EA71226A-7AFA-4185-A8A5-174C44C173C8"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:trihedral:vtscada:11.1.22:*:*:*:*:*:*:*",
"matchCriteriaId": "1203617F-45D8-47C3-B32D-0F0DED539D24"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:trihedral:vtscada:11.1.24:*:*:*:*:*:*:*",
"matchCriteriaId": "FDF04525-41E4-4DEE-BBF0-268F8B6969DB"
"criteria": "cpe:2.3:a:trihedral:vtscada:*:*:*:*:*:*:*:*",
"versionStartIncluding": "8.0.05",
"versionEndExcluding": "11.2.02",
"matchCriteriaId": "4FB0C125-20F0-47CC-84C3-9355F45C5387"
}
]
}
@ -424,11 +102,20 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/91077",
"source": "ics-cert@hq.dhs.gov"
"source": "ics-cert@hq.dhs.gov",
"tags": [
"Broken Link",
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "http://www.zerodayinitiative.com/advisories/ZDI-16-405",
"source": "ics-cert@hq.dhs.gov"
"source": "ics-cert@hq.dhs.gov",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "https://ics-cert.us-cert.gov/advisories/ICSA-16-159-01",

View File

@ -2,8 +2,9 @@
"id": "CVE-2018-7602",
"sourceIdentifier": "mlhess@drupal.org",
"published": "2018-07-19T17:29:00.373",
"lastModified": "2023-11-07T03:01:03.523",
"vulnStatus": "Modified",
"lastModified": "2024-07-02T17:41:16.867",
"vulnStatus": "Analyzed",
"cveTags": [],
"cisaExploitAdd": "2022-04-13",
"cisaActionDue": "2022-05-04",
"cisaRequiredAction": "Apply updates per vendor instructions.",
@ -142,6 +143,7 @@
"url": "http://www.securityfocus.com/bid/103985",
"source": "mlhess@drupal.org",
"tags": [
"Broken Link",
"Third Party Advisory",
"VDB Entry"
]
@ -150,6 +152,7 @@
"url": "http://www.securitytracker.com/id/1040754",
"source": "mlhess@drupal.org",
"tags": [
"Broken Link",
"Third Party Advisory",
"VDB Entry"
]

View File

@ -2,8 +2,9 @@
"id": "CVE-2019-1003029",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2019-03-08T21:29:00.297",
"lastModified": "2023-10-25T18:16:02.980",
"vulnStatus": "Modified",
"lastModified": "2024-07-02T16:58:12.100",
"vulnStatus": "Analyzed",
"cveTags": [],
"cisaExploitAdd": "2022-04-25",
"cisaActionDue": "2022-05-16",
"cisaRequiredAction": "Apply updates per vendor instructions.",
@ -89,8 +90,8 @@
{
"vulnerable": true,
"criteria": "cpe:2.3:a:jenkins:script_security:*:*:*:*:*:jenkins:*:*",
"versionEndIncluding": "1.53",
"matchCriteriaId": "4F309F6A-5D2A-4E7E-9C91-FA5E6413F498"
"versionEndExcluding": "1.54",
"matchCriteriaId": "B7D4D86E-A7CD-49D3-B63A-1063AD24DF1E"
}
]
}
@ -125,7 +126,9 @@
"url": "http://www.securityfocus.com/bid/107476",
"source": "jenkinsci-cert@googlegroups.com",
"tags": [
"Broken Link"
"Broken Link",
"Third Party Advisory",
"VDB Entry"
]
},
{
@ -137,7 +140,10 @@
},
{
"url": "https://jenkins.io/security/advisory/2019-03-06/#SECURITY-1336%20%281%29",
"source": "jenkinsci-cert@googlegroups.com"
"source": "jenkinsci-cert@googlegroups.com",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,9 @@
"id": "CVE-2019-11708",
"sourceIdentifier": "security@mozilla.org",
"published": "2019-07-23T14:15:15.327",
"lastModified": "2019-08-15T18:15:17.287",
"vulnStatus": "Modified",
"lastModified": "2024-07-02T17:02:19.720",
"vulnStatus": "Analyzed",
"cveTags": [],
"cisaExploitAdd": "2022-05-23",
"cisaActionDue": "2022-06-13",
"cisaRequiredAction": "Apply updates per vendor instructions.",
@ -19,13 +20,13 @@
}
],
"metrics": {
"cvssMetricV30": [
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.0",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H",
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
@ -112,20 +113,26 @@
"references": [
{
"url": "http://packetstormsecurity.com/files/155592/Mozilla-Firefox-Windows-64-Bit-Chain-Exploit.html",
"source": "security@mozilla.org"
"source": "security@mozilla.org",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1559858",
"source": "security@mozilla.org",
"tags": [
"Issue Tracking",
"Permissions Required",
"Vendor Advisory"
]
},
{
"url": "https://security.gentoo.org/glsa/201908-12",
"source": "security@mozilla.org"
"source": "security@mozilla.org",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://www.mozilla.org/security/advisories/mfsa2019-19/",

View File

@ -2,8 +2,9 @@
"id": "CVE-2019-3568",
"sourceIdentifier": "cve-assign@fb.com",
"published": "2019-05-14T20:29:03.187",
"lastModified": "2019-08-13T21:15:11.770",
"vulnStatus": "Modified",
"lastModified": "2024-07-02T17:01:19.757",
"vulnStatus": "Analyzed",
"cveTags": [],
"cisaExploitAdd": "2022-04-19",
"cisaActionDue": "2022-05-10",
"cisaRequiredAction": "Apply updates per vendor instructions.",
@ -19,13 +20,13 @@
}
],
"metrics": {
"cvssMetricV30": [
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.0",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
@ -142,6 +143,7 @@
"url": "http://www.securityfocus.com/bid/108329",
"source": "cve-assign@fb.com",
"tags": [
"Broken Link",
"Third Party Advisory",
"VDB Entry"
]

View File

@ -2,8 +2,9 @@
"id": "CVE-2019-5786",
"sourceIdentifier": "chrome-cve-admin@google.com",
"published": "2019-06-27T17:15:13.770",
"lastModified": "2024-02-15T02:00:01.647",
"vulnStatus": "Modified",
"lastModified": "2024-07-02T17:01:48.787",
"vulnStatus": "Analyzed",
"cveTags": [],
"cisaExploitAdd": "2022-05-23",
"cisaActionDue": "2022-06-13",
"cisaRequiredAction": "Apply updates per vendor instructions.",
@ -95,32 +96,24 @@
]
}
]
},
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:google:puppeteer:*:*:*:*:*:node.js:*:*",
"versionEndExcluding": "1.13.0",
"matchCriteriaId": "20462440-7431-416E-BBBF-074B1F72020D"
}
]
}
]
}
],
"references": [
{
"url": "https://chromereleases.googleblog.com/2019/03/stable-channel-update-for-desktop.html",
"source": "chrome-cve-admin@google.com"
"source": "chrome-cve-admin@google.com",
"tags": [
"Release Notes",
"Vendor Advisory"
]
},
{
"url": "https://crbug.com/936448",
"source": "chrome-cve-admin@google.com"
"source": "chrome-cve-admin@google.com",
"tags": [
"Exploit",
"Issue Tracking"
]
}
]
}

View File

@ -2,8 +2,9 @@
"id": "CVE-2021-1789",
"sourceIdentifier": "product-security@apple.com",
"published": "2021-04-02T18:15:21.747",
"lastModified": "2023-11-07T03:28:51.430",
"vulnStatus": "Modified",
"lastModified": "2024-07-02T17:02:47.677",
"vulnStatus": "Analyzed",
"cveTags": [],
"cisaExploitAdd": "2022-05-04",
"cisaActionDue": "2022-05-25",
"cisaRequiredAction": "Apply updates per vendor instructions.",
@ -255,11 +256,17 @@
"references": [
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JN6ZOD62CTO54CHTMJTHVEF6R2Y532TJ/",
"source": "product-security@apple.com"
"source": "product-security@apple.com",
"tags": [
"Mailing List"
]
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/L3L6ZZOU5JS7E3RFYGLP7UFLXCG7TNLU/",
"source": "product-security@apple.com"
"source": "product-security@apple.com",
"tags": [
"Mailing List"
]
},
{
"url": "https://security.gentoo.org/glsa/202104-03",

View File

@ -2,8 +2,9 @@
"id": "CVE-2021-30883",
"sourceIdentifier": "product-security@apple.com",
"published": "2021-08-24T19:15:16.403",
"lastModified": "2023-11-07T03:33:41.033",
"vulnStatus": "Modified",
"lastModified": "2024-07-02T17:03:21.260",
"vulnStatus": "Analyzed",
"cveTags": [],
"cisaExploitAdd": "2022-05-23",
"cisaActionDue": "2022-06-13",
"cisaRequiredAction": "Apply updates per vendor instructions.",
@ -94,13 +95,10 @@
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:apple:ipados:15.0:*:*:*:*:*:*:*",
"matchCriteriaId": "6361C54F-4F5D-4624-8A1F-69DBC6AD4A69"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:apple:ipados:15.0.1:*:*:*:*:*:*:*",
"matchCriteriaId": "45E581A3-DFD3-4999-8B55-006C2D633C6C"
"criteria": "cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*",
"versionStartIncluding": "15.0",
"versionEndExcluding": "15.0.2",
"matchCriteriaId": "89B99D1D-5C89-4389-AF8A-E61FEF6B717A"
},
{
"vulnerable": true,
@ -110,13 +108,10 @@
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:apple:iphone_os:15.0:*:*:*:*:*:*:*",
"matchCriteriaId": "A332DEC8-FB74-404E-BE6A-46DB0DEDAA59"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:apple:iphone_os:15.0.1:*:*:*:*:*:*:*",
"matchCriteriaId": "71D5AE70-0104-442F-927A-8378C22D1941"
"criteria": "cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*",
"versionStartIncluding": "15.0",
"versionEndExcluding": "15.0.2",
"matchCriteriaId": "FEF6C34B-E255-4EA4-AA92-1A8B09EA6275"
},
{
"vulnerable": true,
@ -150,27 +145,45 @@
"references": [
{
"url": "https://support.apple.com/en-us/HT212846",
"source": "product-security@apple.com"
"source": "product-security@apple.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://support.apple.com/en-us/HT212868",
"source": "product-security@apple.com"
"source": "product-security@apple.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://support.apple.com/en-us/HT212869",
"source": "product-security@apple.com"
"source": "product-security@apple.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://support.apple.com/en-us/HT212872",
"source": "product-security@apple.com"
"source": "product-security@apple.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://support.apple.com/en-us/HT212874",
"source": "product-security@apple.com"
"source": "product-security@apple.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://support.apple.com/en-us/HT212876",
"source": "product-security@apple.com"
"source": "product-security@apple.com",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,9 @@
"id": "CVE-2021-40450",
"sourceIdentifier": "secure@microsoft.com",
"published": "2021-10-13T01:15:09.750",
"lastModified": "2023-08-08T14:21:49.707",
"vulnStatus": "Modified",
"lastModified": "2024-07-02T17:03:33.753",
"vulnStatus": "Analyzed",
"cveTags": [],
"cisaExploitAdd": "2022-04-25",
"cisaActionDue": "2022-05-16",
"cisaRequiredAction": "Apply updates per vendor instructions.",
@ -108,108 +109,63 @@
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_10:20h2:*:*:*:*:*:arm64:*",
"matchCriteriaId": "610B33F9-0309-4CF7-B7E4-5152D9B2FFE4"
"criteria": "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:*:*",
"versionEndExcluding": "10.0.17763.2237",
"matchCriteriaId": "D03564D3-788A-4BD7-B717-B3681515A5BE"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_10:20h2:*:*:*:*:*:x64:*",
"matchCriteriaId": "21074553-EDF2-468D-8E79-C39851B5BC79"
"criteria": "cpe:2.3:o:microsoft:windows_10_1909:*:*:*:*:*:*:*:*",
"versionEndExcluding": "10.0.18363.1854",
"matchCriteriaId": "2DFF53D4-2910-4A58-81DF-6DDC01D2C523"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_10:20h2:*:*:*:*:*:x86:*",
"matchCriteriaId": "4E62F9CB-D1B6-4B4D-BCCD-7F4D36A73B4D"
"criteria": "cpe:2.3:o:microsoft:windows_10_2004:*:*:*:*:*:*:*:*",
"versionEndExcluding": "10.0.19041.1288",
"matchCriteriaId": "C995398E-B786-4AC7-B6D4-790ED8C68F8C"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_10:21h1:*:*:*:*:*:arm64:*",
"matchCriteriaId": "49A4BBDA-0389-4171-AA49-6837F7DF4454"
"criteria": "cpe:2.3:o:microsoft:windows_10_20h2:*:*:*:*:*:*:*:*",
"versionEndExcluding": "10.0.19042.1288",
"matchCriteriaId": "129B19A3-40D5-48D4-B3CA-8934062E6933"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_10:21h1:*:*:*:*:*:x64:*",
"matchCriteriaId": "F8C238FA-B20F-40A5-B861-A8295858F4BE"
"criteria": "cpe:2.3:o:microsoft:windows_10_21h1:*:*:*:*:*:*:*:*",
"versionEndExcluding": "10.0.19043.1288",
"matchCriteriaId": "D78C68AE-C471-4234-B0D0-7E09D2E131AB"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_10:21h1:*:*:*:*:*:x86:*",
"matchCriteriaId": "56513BCA-A9F5-4112-BDE6-77E9B8D2677E"
"criteria": "cpe:2.3:o:microsoft:windows_11_21h2:*:*:*:*:*:*:*:*",
"versionEndExcluding": "10.0.22000.258",
"matchCriteriaId": "2FF279C0-02C7-4D60-85E8-9FB89492D738"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_10:1809:*:*:*:*:*:arm64:*",
"matchCriteriaId": "925B8C67-C96F-4A4D-9BE7-CCCD78EF3C31"
"criteria": "cpe:2.3:o:microsoft:windows_server_2004:*:*:*:*:*:*:*:*",
"versionEndExcluding": "10.0.19041.1288",
"matchCriteriaId": "486E7F23-6A3B-46AA-9F31-91EDF933B36A"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_10:1809:*:*:*:*:*:x64:*",
"matchCriteriaId": "6CF580BA-6938-40F6-9D86-F43044A6BACA"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_10:1809:*:*:*:*:*:x86:*",
"matchCriteriaId": "C5E038AA-514F-48AC-B45E-859EE32525B4"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_10:1909:*:*:*:*:*:arm64:*",
"matchCriteriaId": "31622391-A67E-4E2A-A855-1316B6E38630"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_10:1909:*:*:*:*:*:x64:*",
"matchCriteriaId": "61F0792D-7587-4297-8EE7-D4DC3A30EE84"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_10:1909:*:*:*:*:*:x86:*",
"matchCriteriaId": "7649042B-4430-4BD9-B82F-984A2831A651"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_10:2004:*:*:*:*:*:arm64:*",
"matchCriteriaId": "E6132F03-DA28-4830-A69F-C2154C7FD96C"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_10:2004:*:*:*:*:*:x64:*",
"matchCriteriaId": "09D9A720-8D3C-4699-AC57-CB4531E5BFEB"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_10:2004:*:*:*:*:*:x86:*",
"matchCriteriaId": "BF67A7F7-466F-467D-8D2B-3273714D43C3"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_11:-:*:*:*:*:*:arm64:*",
"matchCriteriaId": "B9F64296-66BF-4F1D-A11C-0C44C347E2AC"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_11:-:*:*:*:*:*:x64:*",
"matchCriteriaId": "5D7F7DDB-440E-42CD-82F4-B2C13F3CC462"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_server:20h2:*:*:*:*:*:*:*",
"matchCriteriaId": "1EAF6DBA-6E3A-4854-BFBF-B5DC36CE5929"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_server_2016:2004:*:*:*:*:*:*:*",
"matchCriteriaId": "0B60D940-80C7-49F0-8F4E-3F99AC15FA82"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*",
"matchCriteriaId": "DB79EE26-FC32-417D-A49C-A1A63165A968"
"criteria": "cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*",
"versionEndExcluding": "10.0.17763.2237",
"matchCriteriaId": "A555704D-BB77-46A3-A0F9-62409FCC5F40"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_server_2022:*:*:*:*:*:*:*:*",
"matchCriteriaId": "1F0241B0-855A-489C-9AAE-68BC2556F24D"
"versionEndExcluding": "10.0.20348.288",
"matchCriteriaId": "6E5F3F99-530D-4065-9133-9C251F89B406"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_server_20h2:*:*:*:*:*:*:*:*",
"versionEndExcluding": "10.0.19042.1288",
"matchCriteriaId": "224FA1B7-84EF-435F-BBFA-33BD39C32595"
}
]
}

View File

@ -2,8 +2,9 @@
"id": "CVE-2021-41357",
"sourceIdentifier": "secure@microsoft.com",
"published": "2021-10-13T01:15:13.950",
"lastModified": "2023-08-08T14:21:49.707",
"vulnStatus": "Modified",
"lastModified": "2024-07-02T17:03:44.287",
"vulnStatus": "Analyzed",
"cveTags": [],
"cisaExploitAdd": "2022-04-25",
"cisaActionDue": "2022-05-16",
"cisaRequiredAction": "Apply updates per vendor instructions.",
@ -108,43 +109,45 @@
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_10:20h2:*:*:*:*:*:*:*",
"matchCriteriaId": "9E2C378B-1507-4C81-82F6-9F599616845A"
"criteria": "cpe:2.3:o:microsoft:windows_10_2004:*:*:*:*:*:*:*:*",
"versionEndExcluding": "10.0.19041.1288",
"matchCriteriaId": "C995398E-B786-4AC7-B6D4-790ED8C68F8C"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_10:21h1:*:*:*:*:*:*:*",
"matchCriteriaId": "FAE4278F-71A7-43E9-8F79-1CBFAE71D730"
"criteria": "cpe:2.3:o:microsoft:windows_10_20h2:*:*:*:*:*:*:*:*",
"versionEndExcluding": "10.0.19042.1288",
"matchCriteriaId": "129B19A3-40D5-48D4-B3CA-8934062E6933"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_10:2004:*:*:*:*:*:*:*",
"matchCriteriaId": "AAE74AF3-C559-4645-A6C0-25C3D647AAC8"
"criteria": "cpe:2.3:o:microsoft:windows_10_21h1:*:*:*:*:*:*:*:*",
"versionEndExcluding": "10.0.19043.1288",
"matchCriteriaId": "D78C68AE-C471-4234-B0D0-7E09D2E131AB"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_11:-:*:*:*:*:*:arm64:*",
"matchCriteriaId": "B9F64296-66BF-4F1D-A11C-0C44C347E2AC"
"criteria": "cpe:2.3:o:microsoft:windows_11_21h2:*:*:*:*:*:*:*:*",
"versionEndExcluding": "10.0.22000.258",
"matchCriteriaId": "2FF279C0-02C7-4D60-85E8-9FB89492D738"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_11:-:*:*:*:*:*:x64:*",
"matchCriteriaId": "5D7F7DDB-440E-42CD-82F4-B2C13F3CC462"
"criteria": "cpe:2.3:o:microsoft:windows_server_2004:*:*:*:*:*:*:*:*",
"versionEndExcluding": "10.0.19041.1288",
"matchCriteriaId": "486E7F23-6A3B-46AA-9F31-91EDF933B36A"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_server_2016:20h2:*:*:*:*:*:*:*",
"matchCriteriaId": "4A190388-AA82-4504-9D5A-624F23268C9F"
"criteria": "cpe:2.3:o:microsoft:windows_server_2022:*:*:*:*:*:*:*:*",
"versionEndExcluding": "10.0.20348.288",
"matchCriteriaId": "6E5F3F99-530D-4065-9133-9C251F89B406"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_server_2016:2004:*:*:*:*:*:*:*",
"matchCriteriaId": "0B60D940-80C7-49F0-8F4E-3F99AC15FA82"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_server_2022:-:*:*:*:*:*:*:*",
"matchCriteriaId": "821614DD-37DD-44E2-A8A4-FE8D23A33C3C"
"criteria": "cpe:2.3:o:microsoft:windows_server_20h2:*:*:*:*:*:*:*:*",
"versionEndExcluding": "10.0.19042.1288",
"matchCriteriaId": "224FA1B7-84EF-435F-BBFA-33BD39C32595"
}
]
}

View File

@ -2,8 +2,9 @@
"id": "CVE-2022-0847",
"sourceIdentifier": "secalert@redhat.com",
"published": "2022-03-10T17:44:57.283",
"lastModified": "2024-01-12T16:15:50.633",
"vulnStatus": "Modified",
"lastModified": "2024-07-02T17:05:01.307",
"vulnStatus": "Analyzed",
"cveTags": [],
"cisaExploitAdd": "2022-04-25",
"cisaActionDue": "2022-05-16",
"cisaRequiredAction": "Apply updates per vendor instructions.",
@ -589,9 +590,10 @@
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:siemens:scalance_lpe9403:-:*:*:*:*:*:*:*",
"matchCriteriaId": "52A77C9D-E59C-4397-B834-797D7B334A6B"
"vulnerable": true,
"criteria": "cpe:2.3:o:siemens:scalance_lpe9403_firmware:*:*:*:*:*:*:*:*",
"versionEndExcluding": "2.0",
"matchCriteriaId": "9FC41AD4-69E5-48D8-8216-671F485C3C40"
}
]
},
@ -600,10 +602,9 @@
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:siemens:scalance_lpe9403_firmware:*:*:*:*:*:*:*:*",
"versionEndExcluding": "2.0",
"matchCriteriaId": "9FC41AD4-69E5-48D8-8216-671F485C3C40"
"vulnerable": false,
"criteria": "cpe:2.3:h:siemens:scalance_lpe9403:-:*:*:*:*:*:*:*",
"matchCriteriaId": "52A77C9D-E59C-4397-B834-797D7B334A6B"
}
]
}
@ -617,9 +618,10 @@
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:sonicwall:sma1000:-:*:*:*:*:*:*:*",
"matchCriteriaId": "DB78952C-B6BB-4A5A-A216-BA64AAC83D4D"
"vulnerable": true,
"criteria": "cpe:2.3:o:sonicwall:sma1000_firmware:*:*:*:*:*:*:*:*",
"versionEndIncluding": "12.4.2-02044",
"matchCriteriaId": "7F4BE1A7-14AA-4E0F-AA13-46D3B9D48F2F"
}
]
},
@ -628,10 +630,9 @@
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:sonicwall:sma1000_firmware:*:*:*:*:*:*:*:*",
"versionEndIncluding": "12.4.2-02044",
"matchCriteriaId": "7F4BE1A7-14AA-4E0F-AA13-46D3B9D48F2F"
"vulnerable": false,
"criteria": "cpe:2.3:h:sonicwall:sma1000:-:*:*:*:*:*:*:*",
"matchCriteriaId": "DB78952C-B6BB-4A5A-A216-BA64AAC83D4D"
}
]
}
@ -668,7 +669,11 @@
},
{
"url": "http://packetstormsecurity.com/files/176534/Linux-4.20-KTLS-Read-Only-Write.html",
"source": "secalert@redhat.com"
"source": "secalert@redhat.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2060795",

View File

@ -2,8 +2,9 @@
"id": "CVE-2022-20821",
"sourceIdentifier": "ykramarz@cisco.com",
"published": "2022-05-26T14:15:08.123",
"lastModified": "2023-11-07T03:43:02.907",
"vulnStatus": "Modified",
"lastModified": "2024-07-02T17:05:51.197",
"vulnStatus": "Analyzed",
"cveTags": [],
"cisaExploitAdd": "2022-05-23",
"cisaActionDue": "2022-06-13",
"cisaRequiredAction": "Apply updates per vendor instructions.",
@ -94,7 +95,7 @@
"description": [
{
"lang": "en",
"value": "CWE-200"
"value": "NVD-CWE-noinfo"
}
]
},
@ -113,6 +114,17 @@
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:cisco:ios_xr:-:*:*:*:*:*:*:*",
"matchCriteriaId": "92587AA0-BDB6-4594-8F14-DC2A91FA4CD6"
}
]
},
{
"operator": "OR",
"negate": false,
@ -253,17 +265,6 @@
"matchCriteriaId": "63ED034E-5A46-44A8-9101-8ACD6D334FF5"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:cisco:ios_xr:-:*:*:*:*:*:*:*",
"matchCriteriaId": "92587AA0-BDB6-4594-8F14-DC2A91FA4CD6"
}
]
}
]
}

View File

@ -2,8 +2,9 @@
"id": "CVE-2022-21919",
"sourceIdentifier": "secure@microsoft.com",
"published": "2022-01-11T21:15:13.463",
"lastModified": "2023-12-21T01:15:25.740",
"vulnStatus": "Modified",
"lastModified": "2024-07-02T17:03:57.950",
"vulnStatus": "Analyzed",
"cveTags": [],
"cisaExploitAdd": "2022-04-25",
"cisaActionDue": "2022-05-16",
"cisaRequiredAction": "Apply updates per vendor instructions.",
@ -88,153 +89,71 @@
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:x64:*",
"matchCriteriaId": "084984D5-D241-497B-B118-50C6C1EAD468"
"criteria": "cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:*:*",
"versionEndExcluding": "10.0.10240.19177",
"matchCriteriaId": "E35D1476-A761-432E-9105-3C57929D75D3"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:x86:*",
"matchCriteriaId": "BA592626-F17C-4F46-823B-0947D102BBD2"
"criteria": "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:*:*",
"versionEndExcluding": "10.0.14393.4886",
"matchCriteriaId": "D197C143-21B8-4024-AF78-818DAA10D9F2"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_10:20h2:*:*:*:*:*:arm64:*",
"matchCriteriaId": "610B33F9-0309-4CF7-B7E4-5152D9B2FFE4"
"criteria": "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:*:*",
"versionEndExcluding": "10.0.17763.2452",
"matchCriteriaId": "86E8ADB6-8720-454D-AAFE-C5B4C65EB462"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_10:20h2:*:*:*:*:*:x64:*",
"matchCriteriaId": "21074553-EDF2-468D-8E79-C39851B5BC79"
"criteria": "cpe:2.3:o:microsoft:windows_10_1909:*:*:*:*:*:*:*:*",
"versionEndExcluding": "10.0.18363.2037",
"matchCriteriaId": "2358BDB5-DB2B-4A60-A9F2-06F2CB0628EB"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_10:20h2:*:*:*:*:*:x86:*",
"matchCriteriaId": "4E62F9CB-D1B6-4B4D-BCCD-7F4D36A73B4D"
"criteria": "cpe:2.3:o:microsoft:windows_10_20h2:*:*:*:*:*:*:*:*",
"versionEndExcluding": "10.0.19042.1466",
"matchCriteriaId": "EE8DAF46-1702-46D1-AAF3-CEFA567953D1"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_10:21h1:*:*:*:*:*:arm64:*",
"matchCriteriaId": "49A4BBDA-0389-4171-AA49-6837F7DF4454"
"criteria": "cpe:2.3:o:microsoft:windows_10_21h1:*:*:*:*:*:*:*:*",
"versionEndExcluding": "10.0.19043.1466",
"matchCriteriaId": "9D4CB80E-5C0A-430C-9F56-9295EBBFD9C4"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_10:21h1:*:*:*:*:*:x64:*",
"matchCriteriaId": "F8C238FA-B20F-40A5-B861-A8295858F4BE"
"criteria": "cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:*:*",
"versionEndExcluding": "10.0.19044.1466",
"matchCriteriaId": "38105E41-F04D-444B-A9F7-51E94726E1E2"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_10:21h1:*:*:*:*:*:x86:*",
"matchCriteriaId": "56513BCA-A9F5-4112-BDE6-77E9B8D2677E"
"criteria": "cpe:2.3:o:microsoft:windows_11_21h2:*:*:*:*:*:*:*:*",
"versionEndExcluding": "10.0.22000.434",
"matchCriteriaId": "7048A3C3-6FB5-46FA-A709-4A51362E84B2"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_10:21h2:*:*:*:*:*:arm64:*",
"matchCriteriaId": "665EA912-D724-41EB-86A9-24EB4FE87B54"
"criteria": "cpe:2.3:o:microsoft:windows_7:-:sp1:*:*:*:*:*:*",
"matchCriteriaId": "C2B1C231-DE19-4B8F-A4AA-5B3A65276E46"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_10:21h2:*:*:*:*:*:x64:*",
"matchCriteriaId": "77E07B96-EAAA-4DD6-9172-0DE98A36726F"
"criteria": "cpe:2.3:o:microsoft:windows_8.1:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E93068DB-549B-45AB-8E5C-00EB5D8B5CF8"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_10:21h2:*:*:*:*:*:x86:*",
"matchCriteriaId": "B846A736-E77C-4665-B28B-4E511880D575"
"criteria": "cpe:2.3:o:microsoft:windows_rt_8.1:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C6CE5198-C498-4672-AF4C-77AB4BE06C5C"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_10:1607:*:*:*:*:*:x64:*",
"matchCriteriaId": "897A48D7-FCA1-4560-AFBB-718AF19BA3A2"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_10:1607:*:*:*:*:*:x86:*",
"matchCriteriaId": "507EB48C-F479-424C-8ABA-C279AB4FE3F4"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_10:1809:*:*:*:*:*:arm64:*",
"matchCriteriaId": "925B8C67-C96F-4A4D-9BE7-CCCD78EF3C31"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_10:1809:*:*:*:*:*:x64:*",
"matchCriteriaId": "6CF580BA-6938-40F6-9D86-F43044A6BACA"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_10:1809:*:*:*:*:*:x86:*",
"matchCriteriaId": "C5E038AA-514F-48AC-B45E-859EE32525B4"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_10:1909:*:*:*:*:*:arm64:*",
"matchCriteriaId": "31622391-A67E-4E2A-A855-1316B6E38630"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_10:1909:*:*:*:*:*:x64:*",
"matchCriteriaId": "61F0792D-7587-4297-8EE7-D4DC3A30EE84"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_10:1909:*:*:*:*:*:x86:*",
"matchCriteriaId": "7649042B-4430-4BD9-B82F-984A2831A651"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_11:-:*:*:*:*:*:arm64:*",
"matchCriteriaId": "B9F64296-66BF-4F1D-A11C-0C44C347E2AC"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_11:-:*:*:*:*:*:x64:*",
"matchCriteriaId": "5D7F7DDB-440E-42CD-82F4-B2C13F3CC462"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_7:-:sp1:*:*:*:*:x64:*",
"matchCriteriaId": "7FE8B00B-4F39-4755-A323-8AD71F5E3EBE"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_7:-:sp1:*:*:*:*:x86:*",
"matchCriteriaId": "06BBFA69-94E2-4BAB-AFD3-BC434B11D106"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_8.1:-:*:*:*:-:*:x64:*",
"matchCriteriaId": "9D654D3A-6A99-4904-8B37-E52E80F7C85A"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_8.1:-:*:*:*:-:*:x86:*",
"matchCriteriaId": "01A6D6B4-B97F-4C8C-AD09-11454F0A39CE"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_8.1:-:*:*:*:rt:*:*:*",
"matchCriteriaId": "D01999BB-2CD6-4C84-A518-3A3BB78F1105"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_server:20h2:*:*:*:*:*:*:*",
"matchCriteriaId": "1EAF6DBA-6E3A-4854-BFBF-B5DC36CE5929"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_server:2022:*:*:*:*:*:*:*",
"matchCriteriaId": "BE257836-4F4D-4352-8293-B9CAD34F8794"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:x64:*",
"matchCriteriaId": "2127D10C-B6F3-4C1D-B9AA-5D78513CC996"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:x86:*",
"matchCriteriaId": "AB425562-C0A0-452E-AABE-F70522F15E1A"
"criteria": "cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:*:*",
"matchCriteriaId": "5F422A8C-2C4E-42C8-B420-E0728037E15C"
},
{
"vulnerable": true,
@ -253,13 +172,27 @@
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*",
"matchCriteriaId": "041FF8BA-0B12-4A1F-B4BF-9C4F33B7C1E7"
"criteria": "cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:*",
"versionEndExcluding": "10.0.14393.4886",
"matchCriteriaId": "384BE788-0F86-417D-BB7A-3082BA4063A7"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*",
"matchCriteriaId": "DB79EE26-FC32-417D-A49C-A1A63165A968"
"criteria": "cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*",
"versionEndExcluding": "10.0.17763.2452",
"matchCriteriaId": "5B6FDB29-C2F4-44FB-8703-962E4FC7E842"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_server_2022:*:*:*:*:*:*:*:*",
"versionEndExcluding": "10.0.20348.469",
"matchCriteriaId": "E428440E-270F-40D6-872E-C5EA389860DB"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_server_20h2:*:*:*:*:*:*:*:*",
"versionEndExcluding": "10.0.19042.1466",
"matchCriteriaId": "D0EE46D4-66CC-4A17-9847-DCFB4B15D40E"
}
]
}

View File

@ -2,8 +2,9 @@
"id": "CVE-2022-22718",
"sourceIdentifier": "secure@microsoft.com",
"published": "2022-02-09T17:15:10.280",
"lastModified": "2023-08-08T14:22:24.967",
"vulnStatus": "Modified",
"lastModified": "2024-07-02T17:04:49.533",
"vulnStatus": "Analyzed",
"cveTags": [],
"cisaExploitAdd": "2022-04-19",
"cisaActionDue": "2022-05-10",
"cisaRequiredAction": "Apply updates per vendor instructions.",
@ -88,128 +89,61 @@
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:x64:*",
"matchCriteriaId": "084984D5-D241-497B-B118-50C6C1EAD468"
"criteria": "cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:*:*",
"versionEndExcluding": "10.0.10240.19204",
"matchCriteriaId": "BC358662-D194-422E-8F3A-6ADCFE4FA005"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:x86:*",
"matchCriteriaId": "BA592626-F17C-4F46-823B-0947D102BBD2"
"criteria": "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:*:*",
"versionEndExcluding": "10.0.14393.4946",
"matchCriteriaId": "EA2B6C6D-14F0-4094-B2B9-E83F0A1C9D5D"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_10:20h2:*:*:*:*:*:arm64:*",
"matchCriteriaId": "610B33F9-0309-4CF7-B7E4-5152D9B2FFE4"
"criteria": "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:*:*",
"versionEndExcluding": "10.0.17763.2565",
"matchCriteriaId": "F47D7D57-5C24-46D8-A515-8007757F5498"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_10:20h2:*:*:*:*:*:x64:*",
"matchCriteriaId": "21074553-EDF2-468D-8E79-C39851B5BC79"
"criteria": "cpe:2.3:o:microsoft:windows_10_1909:*:*:*:*:*:*:*:*",
"versionEndIncluding": "10.0.18363.2094",
"matchCriteriaId": "0006B3A5-4FCD-4B33-87D2-67C59462A4E8"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_10:20h2:*:*:*:*:*:x86:*",
"matchCriteriaId": "4E62F9CB-D1B6-4B4D-BCCD-7F4D36A73B4D"
"criteria": "cpe:2.3:o:microsoft:windows_10_20h2:*:*:*:*:*:*:*:*",
"versionEndExcluding": "10.0.19042.1526",
"matchCriteriaId": "B3D9A9C7-8331-4549-9153-65BDD758A583"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_10:21h1:*:*:*:*:*:arm64:*",
"matchCriteriaId": "49A4BBDA-0389-4171-AA49-6837F7DF4454"
"criteria": "cpe:2.3:o:microsoft:windows_10_21h1:*:*:*:*:*:*:*:*",
"versionEndExcluding": "10.0.19043.1526",
"matchCriteriaId": "B40311C2-4ED8-4B9A-B9B5-2CCAB28EEA66"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_10:21h1:*:*:*:*:*:x64:*",
"matchCriteriaId": "F8C238FA-B20F-40A5-B861-A8295858F4BE"
"criteria": "cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:*:*",
"versionEndExcluding": "10.0.19044.1526",
"matchCriteriaId": "05511CD6-CBAB-4534-A8E3-B846ECC3DDFF"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_10:21h1:*:*:*:*:*:x86:*",
"matchCriteriaId": "56513BCA-A9F5-4112-BDE6-77E9B8D2677E"
"criteria": "cpe:2.3:o:microsoft:windows_11_21h2:*:*:*:*:*:*:*:*",
"versionEndExcluding": "10.0.22000.493",
"matchCriteriaId": "9B3F7AF6-7251-4EF7-B044-99699E97B5C9"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_10:21h2:*:*:*:*:*:arm64:*",
"matchCriteriaId": "665EA912-D724-41EB-86A9-24EB4FE87B54"
"criteria": "cpe:2.3:o:microsoft:windows_7:-:sp1:*:*:*:*:*:*",
"matchCriteriaId": "C2B1C231-DE19-4B8F-A4AA-5B3A65276E46"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_10:21h2:*:*:*:*:*:x64:*",
"matchCriteriaId": "77E07B96-EAAA-4DD6-9172-0DE98A36726F"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_10:21h2:*:*:*:*:*:x86:*",
"matchCriteriaId": "B846A736-E77C-4665-B28B-4E511880D575"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_10:1607:*:*:*:*:*:x64:*",
"matchCriteriaId": "897A48D7-FCA1-4560-AFBB-718AF19BA3A2"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_10:1607:*:*:*:*:*:x86:*",
"matchCriteriaId": "507EB48C-F479-424C-8ABA-C279AB4FE3F4"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_10:1809:*:*:*:*:*:arm64:*",
"matchCriteriaId": "925B8C67-C96F-4A4D-9BE7-CCCD78EF3C31"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_10:1809:*:*:*:*:*:x64:*",
"matchCriteriaId": "6CF580BA-6938-40F6-9D86-F43044A6BACA"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_10:1809:*:*:*:*:*:x86:*",
"matchCriteriaId": "C5E038AA-514F-48AC-B45E-859EE32525B4"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_10:1909:*:*:*:*:*:arm64:*",
"matchCriteriaId": "31622391-A67E-4E2A-A855-1316B6E38630"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_10:1909:*:*:*:*:*:x64:*",
"matchCriteriaId": "61F0792D-7587-4297-8EE7-D4DC3A30EE84"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_10:1909:*:*:*:*:*:x86:*",
"matchCriteriaId": "7649042B-4430-4BD9-B82F-984A2831A651"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_11:-:*:*:*:*:*:arm64:*",
"matchCriteriaId": "B9F64296-66BF-4F1D-A11C-0C44C347E2AC"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_11:-:*:*:*:*:*:x64:*",
"matchCriteriaId": "5D7F7DDB-440E-42CD-82F4-B2C13F3CC462"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_7:sp1:*:*:*:*:*:x64:*",
"matchCriteriaId": "20F0ED9B-E55B-4859-86C2-999219818677"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_7:sp1:*:*:*:*:*:x86:*",
"matchCriteriaId": "74C73F73-9303-486E-BC67-E7FED69FDE7D"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_8.1:-:*:*:*:*:*:x64:*",
"matchCriteriaId": "C936FD4F-959C-43B8-9917-E2A0DF4A8793"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_8.1:-:*:*:*:*:*:x86:*",
"matchCriteriaId": "DF8ABB14-84CF-4BBC-99C9-DA6C0F7A0619"
"criteria": "cpe:2.3:o:microsoft:windows_8.1:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E93068DB-549B-45AB-8E5C-00EB5D8B5CF8"
},
{
"vulnerable": true,
@ -218,28 +152,8 @@
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_server:20h2:*:*:*:*:*:*:*",
"matchCriteriaId": "1EAF6DBA-6E3A-4854-BFBF-B5DC36CE5929"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_server:2022:*:*:*:*:*:*:*",
"matchCriteriaId": "BE257836-4F4D-4352-8293-B9CAD34F8794"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_server:2022:*:*:*:azure:*:*:*",
"matchCriteriaId": "114F8FDE-174E-41C0-A2C1-81761690939B"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:x64:*",
"matchCriteriaId": "2127D10C-B6F3-4C1D-B9AA-5D78513CC996"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:x86:*",
"matchCriteriaId": "AB425562-C0A0-452E-AABE-F70522F15E1A"
"criteria": "cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:*:*",
"matchCriteriaId": "5F422A8C-2C4E-42C8-B420-E0728037E15C"
},
{
"vulnerable": true,
@ -258,13 +172,27 @@
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*",
"matchCriteriaId": "041FF8BA-0B12-4A1F-B4BF-9C4F33B7C1E7"
"criteria": "cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:*",
"versionEndExcluding": "10.0.14393.4946",
"matchCriteriaId": "40D7B6EE-13D8-4520-913C-D53B79E9E3AD"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*",
"matchCriteriaId": "DB79EE26-FC32-417D-A49C-A1A63165A968"
"criteria": "cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*",
"versionEndExcluding": "10.0.17763.2565",
"matchCriteriaId": "B5E25CB9-F0C4-44F2-A302-41D2C7C9DB4A"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_server_2022:*:*:*:*:*:*:*:*",
"versionEndExcluding": "10.0.20348.524",
"matchCriteriaId": "97C266DC-3AD4-4593-A9A8-27F6D5E61AED"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_server_20h2:*:*:*:*:*:*:*:*",
"versionEndExcluding": "10.0.19042.1526",
"matchCriteriaId": "E5161F88-F831-4E07-A54F-E3E7A019A355"
}
]
}
@ -274,7 +202,11 @@
"references": [
{
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-22718",
"source": "secure@microsoft.com"
"source": "secure@microsoft.com",
"tags": [
"Patch",
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,9 @@
"id": "CVE-2022-22960",
"sourceIdentifier": "security@vmware.com",
"published": "2022-04-13T18:15:13.510",
"lastModified": "2023-08-08T14:22:24.967",
"vulnStatus": "Modified",
"lastModified": "2024-07-02T17:42:53.177",
"vulnStatus": "Analyzed",
"cveTags": [],
"cisaExploitAdd": "2022-04-15",
"cisaActionDue": "2022-05-06",
"cisaRequiredAction": "Apply updates per vendor instructions.",
@ -172,15 +173,30 @@
"references": [
{
"url": "http://packetstormsecurity.com/files/171918/Mware-Workspace-ONE-Remote-Code-Execution.html",
"source": "security@vmware.com"
"source": "security@vmware.com",
"tags": [
"Exploit",
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "http://packetstormsecurity.com/files/171918/VMware-Workspace-ONE-Remote-Code-Execution.html",
"source": "security@vmware.com"
"source": "security@vmware.com",
"tags": [
"Exploit",
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "http://packetstormsecurity.com/files/171935/VMware-Workspace-ONE-Access-Privilege-Escalation.html",
"source": "security@vmware.com"
"source": "security@vmware.com",
"tags": [
"Exploit",
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "https://www.vmware.com/security/advisories/VMSA-2022-0011.html",

View File

@ -2,8 +2,9 @@
"id": "CVE-2022-26904",
"sourceIdentifier": "secure@microsoft.com",
"published": "2022-04-15T19:15:15.027",
"lastModified": "2023-06-29T01:15:45.370",
"vulnStatus": "Modified",
"lastModified": "2024-07-02T17:05:13.203",
"vulnStatus": "Analyzed",
"cveTags": [],
"cisaExploitAdd": "2022-04-25",
"cisaActionDue": "2022-05-16",
"cisaRequiredAction": "Apply updates per vendor instructions.",
@ -88,48 +89,51 @@
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:*:*",
"matchCriteriaId": "21540673-614A-4D40-8BD7-3F07723803B0"
"criteria": "cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:*:*",
"versionEndExcluding": "10.0.10240.19265",
"matchCriteriaId": "80835FAD-93BC-4412-82B5-6F94319BD56A"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_10:20h2:*:*:*:*:*:*:*",
"matchCriteriaId": "9E2C378B-1507-4C81-82F6-9F599616845A"
"criteria": "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:*:*",
"versionEndExcluding": "10.0.14393.5066",
"matchCriteriaId": "64FB64EC-4AB3-422B-8887-19C1355BF4AE"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_10:21h1:*:*:*:*:*:*:*",
"matchCriteriaId": "FAE4278F-71A7-43E9-8F79-1CBFAE71D730"
"criteria": "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:*:*",
"versionEndExcluding": "10.0.17763.2803",
"matchCriteriaId": "5BA95A39-52FE-476B-B0BD-4593F2577531"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_10:21h2:*:*:*:*:*:*:*",
"matchCriteriaId": "71E65CB9-6DC2-4A90-8C6A-103BEDC99823"
"criteria": "cpe:2.3:o:microsoft:windows_10_1909:*:*:*:*:*:*:*:*",
"versionEndExcluding": "10.0.18363.2212",
"matchCriteriaId": "89E25B03-5C50-4F9E-B32C-620DB02B9A64"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_10:1607:*:*:*:*:*:*:*",
"matchCriteriaId": "E01A4CCA-4C43-46E0-90E6-3E4DBFBACD64"
"criteria": "cpe:2.3:o:microsoft:windows_10_20h2:*:*:*:*:*:*:*:*",
"versionEndExcluding": "10.0.19042.1645",
"matchCriteriaId": "D88AC965-D7C9-40C1-91FA-5A59AB51B1B0"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_10:1809:*:*:*:*:*:*:*",
"matchCriteriaId": "6B8F3DD2-A145-4AF1-8545-CC42892DA3D1"
"criteria": "cpe:2.3:o:microsoft:windows_10_21h1:*:*:*:*:*:*:*:*",
"versionEndExcluding": "10.0.19043.1645",
"matchCriteriaId": "5991C983-14B9-43C4-8A21-86BDAD59D4CB"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_10:1909:*:*:*:*:*:*:*",
"matchCriteriaId": "E9273B95-20ED-4547-B0A8-95AD15B30372"
"criteria": "cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:*:*",
"versionEndExcluding": "10.0.19044.1645",
"matchCriteriaId": "DDB6F5DD-3AF4-4032-A47F-008F6654B0B7"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_11:-:*:*:*:*:*:arm64:*",
"matchCriteriaId": "B9F64296-66BF-4F1D-A11C-0C44C347E2AC"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_11:-:*:*:*:*:*:x64:*",
"matchCriteriaId": "5D7F7DDB-440E-42CD-82F4-B2C13F3CC462"
"criteria": "cpe:2.3:o:microsoft:windows_11_21h2:*:*:*:*:*:*:*:*",
"versionEndExcluding": "10.0.22000.613",
"matchCriteriaId": "1F134A85-E9BA-4DB5-AE3B-B7C50FE1D828"
},
{
"vulnerable": true,
@ -168,23 +172,27 @@
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*",
"matchCriteriaId": "041FF8BA-0B12-4A1F-B4BF-9C4F33B7C1E7"
"criteria": "cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:*",
"versionEndExcluding": "10.0.14393.5066",
"matchCriteriaId": "41F352C2-5CFE-44C9-BD95-CE675C758065"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_server_2016:20h2:*:*:*:*:*:*:*",
"matchCriteriaId": "4A190388-AA82-4504-9D5A-624F23268C9F"
"criteria": "cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*",
"versionEndExcluding": "10.0.17763.2803",
"matchCriteriaId": "14299175-DC1B-482E-AB7F-017B0563FF15"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*",
"matchCriteriaId": "DB79EE26-FC32-417D-A49C-A1A63165A968"
"criteria": "cpe:2.3:o:microsoft:windows_server_2022:*:*:*:*:*:*:*:*",
"versionEndExcluding": "10.0.20348.643",
"matchCriteriaId": "60A428F7-0772-4E67-9DCE-59BD41C0A9C9"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_server_2022:-:*:*:*:*:*:*:*",
"matchCriteriaId": "821614DD-37DD-44E2-A8A4-FE8D23A33C3C"
"criteria": "cpe:2.3:o:microsoft:windows_server_20h2:*:*:*:*:*:*:*:*",
"versionEndExcluding": "10.0.19042.1645",
"matchCriteriaId": "99EDE32C-E0DB-4AC2-A4B0-04267C362FE9"
}
]
}
@ -194,7 +202,11 @@
"references": [
{
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-26904",
"source": "secure@microsoft.com"
"source": "secure@microsoft.com",
"tags": [
"Patch",
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,9 @@
"id": "CVE-2022-29464",
"sourceIdentifier": "cve@mitre.org",
"published": "2022-04-18T22:15:09.027",
"lastModified": "2023-10-23T22:15:09.020",
"vulnStatus": "Modified",
"lastModified": "2024-07-02T17:05:29.787",
"vulnStatus": "Analyzed",
"cveTags": [],
"cisaExploitAdd": "2022-04-25",
"cisaActionDue": "2022-05-16",
"cisaRequiredAction": "Apply updates per vendor instructions.",
@ -153,6 +154,25 @@
"versionStartIncluding": "5.3.0",
"versionEndIncluding": "5.10.0",
"matchCriteriaId": "77334E1B-A4C9-40A1-8ED9-7123476817E5"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:wso2:open_banking_am:*:*:*:*:*:*:*:*",
"versionStartIncluding": "1.3.0",
"versionEndIncluding": "2.0.0",
"matchCriteriaId": "3B9E4BCA-7BD2-442F-B99B-734232249C04"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:wso2:open_banking_iam:2.0.0:*:*:*:*:*:*:*",
"matchCriteriaId": "D7C241A3-8EA0-41E4-ABF3-21B9D8E7A5BE"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:wso2:open_banking_km:*:*:*:*:*:*:*:*",
"versionStartIncluding": "1.3.0",
"versionEndIncluding": "1.5.0",
"matchCriteriaId": "A8364191-344F-4F73-A9CF-2516F24E856C"
}
]
}
@ -187,7 +207,10 @@
},
{
"url": "https://security.docs.wso2.com/en/latest/security-announcements/security-advisories/2022/WSO2-2021-1738/",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -0,0 +1,16 @@
{
"id": "CVE-2022-32147",
"sourceIdentifier": "security@golang.org",
"published": "2024-07-02T17:15:03.273",
"lastModified": "2024-07-02T17:15:03.273",
"vulnStatus": "Rejected",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Rejected reason: reserved but not needed"
}
],
"metrics": {},
"references": []
}

View File

@ -0,0 +1,16 @@
{
"id": "CVE-2022-32191",
"sourceIdentifier": "security@golang.org",
"published": "2024-07-02T17:15:04.040",
"lastModified": "2024-07-02T17:15:04.040",
"vulnStatus": "Rejected",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Rejected reason: reserved but not needed"
}
],
"metrics": {},
"references": []
}

View File

@ -0,0 +1,16 @@
{
"id": "CVE-2022-3428",
"sourceIdentifier": "security@golang.org",
"published": "2024-07-02T17:15:04.250",
"lastModified": "2024-07-02T17:15:04.250",
"vulnStatus": "Rejected",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Rejected reason: reserved but not needed"
}
],
"metrics": {},
"references": []
}

View File

@ -0,0 +1,16 @@
{
"id": "CVE-2022-41718",
"sourceIdentifier": "security@golang.org",
"published": "2024-07-02T17:15:04.360",
"lastModified": "2024-07-02T17:15:04.360",
"vulnStatus": "Rejected",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Rejected reason: reserved but not needed"
}
],
"metrics": {},
"references": []
}

View File

@ -0,0 +1,16 @@
{
"id": "CVE-2022-41726",
"sourceIdentifier": "security@golang.org",
"published": "2024-07-02T17:15:04.430",
"lastModified": "2024-07-02T17:15:04.430",
"vulnStatus": "Rejected",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Rejected reason: reserved but not needed"
}
],
"metrics": {},
"references": []
}

View File

@ -0,0 +1,16 @@
{
"id": "CVE-2022-41728",
"sourceIdentifier": "security@golang.org",
"published": "2024-07-02T17:15:04.497",
"lastModified": "2024-07-02T17:15:04.497",
"vulnStatus": "Rejected",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Rejected reason: reserved but not needed"
}
],
"metrics": {},
"references": []
}

View File

@ -0,0 +1,16 @@
{
"id": "CVE-2022-41729",
"sourceIdentifier": "security@golang.org",
"published": "2024-07-02T17:15:04.550",
"lastModified": "2024-07-02T17:15:04.550",
"vulnStatus": "Rejected",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Rejected reason: reserved but not needed"
}
],
"metrics": {},
"references": []
}

View File

@ -0,0 +1,16 @@
{
"id": "CVE-2022-41730",
"sourceIdentifier": "security@golang.org",
"published": "2024-07-02T17:15:04.610",
"lastModified": "2024-07-02T17:15:04.610",
"vulnStatus": "Rejected",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Rejected reason: reserved but not needed"
}
],
"metrics": {},
"references": []
}

View File

@ -0,0 +1,16 @@
{
"id": "CVE-2023-39324",
"sourceIdentifier": "security@golang.org",
"published": "2024-07-02T17:15:04.737",
"lastModified": "2024-07-02T17:15:04.737",
"vulnStatus": "Rejected",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Rejected reason: reserved but not needed"
}
],
"metrics": {},
"references": []
}

File diff suppressed because it is too large Load Diff

View File

@ -2,13 +2,13 @@
"id": "CVE-2023-51776",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-07-02T15:15:10.663",
"lastModified": "2024-07-02T15:15:10.663",
"vulnStatus": "Received",
"lastModified": "2024-07-02T17:44:45.700",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Improper privilege management in Jungo WinDriver 12.1.0 allows local attackers to escalate privileges and execute arbitrary code."
"value": "Improper privilege management in Jungo WinDriver before 12.1.0 allows local attackers to escalate privileges and execute arbitrary code."
}
],
"metrics": {},

View File

@ -2,13 +2,13 @@
"id": "CVE-2023-51777",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-07-02T15:15:10.807",
"lastModified": "2024-07-02T15:15:10.807",
"vulnStatus": "Received",
"lastModified": "2024-07-02T17:44:45.700",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Denial of Service (DoS) vulnerability in Jungo WinDriver 12.1.0 allows local attackers to cause a Windows blue screen error."
"value": "Denial of Service (DoS) vulnerability in Jungo WinDriver before 12.1.0 allows local attackers to cause a Windows blue screen error."
}
],
"metrics": {},

View File

@ -2,13 +2,13 @@
"id": "CVE-2023-51778",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-07-02T15:15:10.890",
"lastModified": "2024-07-02T15:15:10.890",
"vulnStatus": "Received",
"lastModified": "2024-07-02T17:44:45.700",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Out-of-Bounds Write vulnerability in Jungo WinDriver 12.1.0 allows local attackers to cause a Windows blue screen error and Denial of Service (DoS)."
"value": "Out-of-Bounds Write vulnerability in Jungo WinDriver before 12.1.0 allows local attackers to cause a Windows blue screen error and Denial of Service (DoS)."
}
],
"metrics": {},

File diff suppressed because it is too large Load Diff

File diff suppressed because it is too large Load Diff

View File

@ -2,20 +2,44 @@
"id": "CVE-2024-21460",
"sourceIdentifier": "product-security@qualcomm.com",
"published": "2024-07-01T15:15:14.063",
"lastModified": "2024-07-01T16:37:39.040",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-07-02T17:56:38.783",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Information disclosure when ASLR relocates the IMEM and Secure DDR portions as one chunk in virtual address space."
},
{
"lang": "es",
"value": "Divulgaci\u00f3n de informaci\u00f3n cuando ASLR reubica las partes IMEM y DDR segura como un solo fragmento en el espacio de direcciones virtuales."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "product-security@qualcomm.com",
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "CHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.0,
"impactScore": 4.0
},
{
"source": "product-security@qualcomm.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N",
@ -36,6 +60,16 @@
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-330"
}
]
},
{
"source": "product-security@qualcomm.com",
"type": "Secondary",
@ -47,10 +81,420 @@
]
}
],
"configurations": [
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:qualcomm:fastconnect_6900_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E670F500-9B71-4BBE-B5DA-221D35803C89"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:qualcomm:fastconnect_6900:-:*:*:*:*:*:*:*",
"matchCriteriaId": "9ADEB5C5-B79A-4F45-B7D3-75945B38DB6C"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:qualcomm:fastconnect_7800_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B3053D68-C5D8-4D47-A4F0-9F3AF2289E1D"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:qualcomm:fastconnect_7800:-:*:*:*:*:*:*:*",
"matchCriteriaId": "638DBC7F-456F-487D-BED2-2214DFF8BEE2"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:qualcomm:qcm8550_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "646B241B-2971-4929-9FB6-7A4CBF801CBB"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:qualcomm:qcm8550:-:*:*:*:*:*:*:*",
"matchCriteriaId": "5654FFB5-9A89-4399-AFAB-0A26726DEC81"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:qualcomm:qcs8550_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "FFF23DDB-98A0-4343-ADD3-5AB9C2383E7E"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:qualcomm:qcs8550:-:*:*:*:*:*:*:*",
"matchCriteriaId": "5ACB8AFB-5B91-4AA1-BA3A-1AF0B3503080"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:qualcomm:sg8275p_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "8509F3A3-A1CA-466B-9031-4146C36B9AF8"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:qualcomm:sg8275p:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B1813AB7-44F5-476B-9533-536F5B2F26BB"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:qualcomm:sm8550p_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C4CDD6A2-5A3C-4572-8CE1-2F102333BB79"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:qualcomm:sm8550p:-:*:*:*:*:*:*:*",
"matchCriteriaId": "699E5D17-6144-4F0A-8D52-1E8C83990E52"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:qualcomm:snapdragon_8_gen_2_mobile_platform_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "60F5899C-BA8D-4B6B-BC61-F77B1EB64739"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:qualcomm:snapdragon_8_gen_2_mobile_platform:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D39AD7CE-A017-4D74-A348-9E4B08363799"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:qualcomm:snapdragon_8\\+_gen_2_mobile_platform_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "1FEDF458-DEA7-42A1-A56D-E11250139545"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:qualcomm:snapdragon_8\\+_gen_2_mobile_platform:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D5693438-0F20-47BB-BA32-7175C3152368"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:qualcomm:wcd9380_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "70292B01-617F-44AD-AF77-1AFC1450523D"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:qualcomm:wcd9380:-:*:*:*:*:*:*:*",
"matchCriteriaId": "FA94C6D6-85DB-4031-AAF4-C399019AE16D"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:qualcomm:wcd9385_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "92B17201-8185-47F1-9720-5AB4ECD11B22"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:qualcomm:wcd9385:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E1FA2EB9-416F-4D69-8786-386CC73978AE"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:qualcomm:wcd9390_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "896F1C04-9957-440F-BF01-C3772CC3B3DF"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:qualcomm:wcd9390:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A90555EB-47A7-4717-92D5-35B561825F06"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:qualcomm:wcd9395_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "699056F6-1517-4F25-AE07-4FFCF6923B9F"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:qualcomm:wcd9395:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E4C023D2-6FF5-4FFC-B9F2-895979166580"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:qualcomm:wsa8840_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "CA33DE15-C177-43B3-AD50-FF797753D12E"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:qualcomm:wsa8840:-:*:*:*:*:*:*:*",
"matchCriteriaId": "AE1A5841-5BCB-4033-ACB9-23F3FCA65309"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:qualcomm:wsa8845_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "5B47BF35-3AA0-4667-842E-19B0FE30BF3C"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:qualcomm:wsa8845:-:*:*:*:*:*:*:*",
"matchCriteriaId": "8A071672-9405-4418-9141-35CEADBB65AF"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:qualcomm:wsa8845h_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "BB7CF473-8B25-4851-91F2-1BD693CCDC85"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:qualcomm:wsa8845h:-:*:*:*:*:*:*:*",
"matchCriteriaId": "91E591F2-8F72-4A5A-9264-2742EB2DABDA"
}
]
}
]
}
],
"references": [
{
"url": "https://docs.qualcomm.com/product/publicresources/securitybulletin/july-2024-bulletin.html",
"source": "product-security@qualcomm.com"
"source": "product-security@qualcomm.com",
"tags": [
"Vendor Advisory"
]
}
]
}

File diff suppressed because it is too large Load Diff

File diff suppressed because it is too large Load Diff

File diff suppressed because it is too large Load Diff

File diff suppressed because it is too large Load Diff

File diff suppressed because it is too large Load Diff

File diff suppressed because it is too large Load Diff

View File

@ -2,13 +2,13 @@
"id": "CVE-2024-22102",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-07-02T15:15:11.070",
"lastModified": "2024-07-02T15:15:11.070",
"vulnStatus": "Received",
"lastModified": "2024-07-02T17:44:45.700",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Denial of Service (DoS) vulnerability in Jungo WinDriver 12.6.0 allows local attackers to cause a Windows blue screen error."
"value": "Denial of Service (DoS) vulnerability in Jungo WinDriver before 12.6.0 allows local attackers to cause a Windows blue screen error."
}
],
"metrics": {},

View File

@ -2,13 +2,13 @@
"id": "CVE-2024-22103",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-07-02T15:15:11.150",
"lastModified": "2024-07-02T15:15:11.150",
"vulnStatus": "Received",
"lastModified": "2024-07-02T17:44:45.700",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Out-of-Bounds Write vulnerability in Jungo WinDriver 12.6.0 allows local attackers to cause a Windows blue screen error and Denial of Service (DoS)."
"value": "Out-of-Bounds Write vulnerability in Jungo WinDriver before 12.6.0 allows local attackers to cause a Windows blue screen error and Denial of Service (DoS)."
}
],
"metrics": {},

View File

@ -2,13 +2,13 @@
"id": "CVE-2024-22104",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-07-02T15:15:11.227",
"lastModified": "2024-07-02T15:15:11.227",
"vulnStatus": "Received",
"lastModified": "2024-07-02T17:44:45.700",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Out-of-Bounds Write vulnerability in Jungo WinDriver 12.5.1 allows local attackers to cause a Windows blue screen error and Denial of Service (DoS)."
"value": "Out-of-Bounds Write vulnerability in Jungo WinDriver before 12.5.1 allows local attackers to cause a Windows blue screen error and Denial of Service (DoS)."
}
],
"metrics": {},

View File

@ -0,0 +1,29 @@
{
"id": "CVE-2024-22105",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-07-02T16:15:03.877",
"lastModified": "2024-07-02T17:44:45.700",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Denial of Service (DoS) vulnerability in Jungo WinDriver before 12.5.1 allows local attackers to cause a Windows blue screen error."
}
],
"metrics": {},
"references": [
{
"url": "https://jungo.com/windriver/versions/",
"source": "cve@mitre.org"
},
{
"url": "https://www.cisa.gov/news-events/ics-advisories/icsa-24-135-04",
"source": "cve@mitre.org"
},
{
"url": "https://www.mitsubishielectric.com/en/psirt/vulnerability/pdf/2024-001_en.pdf",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,29 @@
{
"id": "CVE-2024-22106",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-07-02T16:15:03.980",
"lastModified": "2024-07-02T17:44:45.700",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Improper privilege management in Jungo WinDriver before 12.5.1 allows local attackers to escalate privileges, execute arbitrary code, or cause a Denial of Service (DoS)."
}
],
"metrics": {},
"references": [
{
"url": "https://jungo.com/windriver/versions/",
"source": "cve@mitre.org"
},
{
"url": "https://www.cisa.gov/news-events/ics-advisories/icsa-24-135-04",
"source": "cve@mitre.org"
},
{
"url": "https://www.mitsubishielectric.com/en/psirt/vulnerability/pdf/2024-001_en.pdf",
"source": "cve@mitre.org"
}
]
}

File diff suppressed because it is too large Load Diff

File diff suppressed because it is too large Load Diff

File diff suppressed because it is too large Load Diff

File diff suppressed because it is too large Load Diff

View File

@ -0,0 +1,29 @@
{
"id": "CVE-2024-25086",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-07-02T16:15:04.070",
"lastModified": "2024-07-02T17:44:45.700",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Improper privilege management in Jungo WinDriver before 12.2.0 allows local attackers to escalate privileges and execute arbitrary code."
}
],
"metrics": {},
"references": [
{
"url": "https://jungo.com/windriver/versions/",
"source": "cve@mitre.org"
},
{
"url": "https://www.cisa.gov/news-events/ics-advisories/icsa-24-135-04",
"source": "cve@mitre.org"
},
{
"url": "https://www.mitsubishielectric.com/en/psirt/vulnerability/pdf/2024-001_en.pdf",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,29 @@
{
"id": "CVE-2024-25087",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-07-02T16:15:04.157",
"lastModified": "2024-07-02T17:44:45.700",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Denial of Service (DoS) vulnerability in Jungo WinDriver before 12.7.0 allows local attackers to cause a Windows blue screen error."
}
],
"metrics": {},
"references": [
{
"url": "https://jungo.com/windriver/versions/",
"source": "cve@mitre.org"
},
{
"url": "https://www.cisa.gov/news-events/ics-advisories/icsa-24-135-04",
"source": "cve@mitre.org"
},
{
"url": "https://www.mitsubishielectric.com/en/psirt/vulnerability/pdf/2024-001_en.pdf",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,29 @@
{
"id": "CVE-2024-25088",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-07-02T16:15:04.250",
"lastModified": "2024-07-02T17:44:45.700",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Improper privilege management in Jungo WinDriver before 12.5.1 allows local attackers to escalate privileges and execute arbitrary code."
}
],
"metrics": {},
"references": [
{
"url": "https://jungo.com/windriver/versions/",
"source": "cve@mitre.org"
},
{
"url": "https://www.cisa.gov/news-events/ics-advisories/icsa-24-135-04",
"source": "cve@mitre.org"
},
{
"url": "https://www.mitsubishielectric.com/en/psirt/vulnerability/pdf/2024-001_en.pdf",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,29 @@
{
"id": "CVE-2024-26314",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-07-02T16:15:04.330",
"lastModified": "2024-07-02T17:44:45.700",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Improper privilege management in Jungo WinDriver 6.0.0 through 16.1.0 allows local attackers to escalate privileges and execute arbitrary code."
}
],
"metrics": {},
"references": [
{
"url": "https://jungo.com/windriver/versions/",
"source": "cve@mitre.org"
},
{
"url": "https://www.cisa.gov/news-events/ics-advisories/icsa-24-135-04",
"source": "cve@mitre.org"
},
{
"url": "https://www.mitsubishielectric.com/en/psirt/vulnerability/pdf/2024-001_en.pdf",
"source": "cve@mitre.org"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-32755",
"sourceIdentifier": "productsecurity@jci.com",
"published": "2024-07-02T14:15:12.333",
"lastModified": "2024-07-02T14:15:12.333",
"vulnStatus": "Received",
"lastModified": "2024-07-02T17:44:45.700",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-32756",
"sourceIdentifier": "productsecurity@jci.com",
"published": "2024-07-02T14:15:12.567",
"lastModified": "2024-07-02T14:15:12.567",
"vulnStatus": "Received",
"lastModified": "2024-07-02T17:44:45.700",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-32757",
"sourceIdentifier": "productsecurity@jci.com",
"published": "2024-07-02T14:15:12.783",
"lastModified": "2024-07-02T14:15:12.783",
"vulnStatus": "Received",
"lastModified": "2024-07-02T17:44:45.700",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-32932",
"sourceIdentifier": "productsecurity@jci.com",
"published": "2024-07-02T15:15:11.373",
"lastModified": "2024-07-02T15:15:11.373",
"vulnStatus": "Received",
"lastModified": "2024-07-02T17:44:45.700",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-34122",
"sourceIdentifier": "psirt@adobe.com",
"published": "2024-07-02T14:15:13.000",
"lastModified": "2024-07-02T14:15:13.000",
"vulnStatus": "Received",
"lastModified": "2024-07-02T17:44:45.700",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-34590",
"sourceIdentifier": "mobile.security@samsung.com",
"published": "2024-07-02T10:15:07.250",
"lastModified": "2024-07-02T12:09:16.907",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2024-07-02T17:59:38.153",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -17,6 +17,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "LOW",
"baseScore": 4.3,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 1.4
},
{
"source": "mobile.security@samsung.com",
"type": "Secondary",
@ -39,10 +59,417 @@
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:samsung:android:12.0:-:*:*:*:*:*:*",
"matchCriteriaId": "D757450C-270E-4FB2-A50C-7F769FED558A"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:samsung:android:12.0:smr-apr-2022-r1:*:*:*:*:*:*",
"matchCriteriaId": "EC4A2EBA-038B-44D5-84F3-FF326CD1C62D"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:samsung:android:12.0:smr-apr-2023-r1:*:*:*:*:*:*",
"matchCriteriaId": "40EB3FC1-D79A-40C7-9E2B-573E20780982"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:samsung:android:12.0:smr-apr-2024-r1:*:*:*:*:*:*",
"matchCriteriaId": "F1525232-54F0-467F-9575-2445F73F43B5"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:samsung:android:12.0:smr-aug-2022-r1:*:*:*:*:*:*",
"matchCriteriaId": "0ABFBBDB-E935-4C54-865A-0E607497DA87"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:samsung:android:12.0:smr-aug-2023-r1:*:*:*:*:*:*",
"matchCriteriaId": "7B738B6B-78CE-4618-B70D-6BC9ED453105"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:samsung:android:12.0:smr-dec-2021-r1:*:*:*:*:*:*",
"matchCriteriaId": "3899E3E7-1284-4223-A258-DA691F5D62FE"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:samsung:android:12.0:smr-dec-2022-r1:*:*:*:*:*:*",
"matchCriteriaId": "ECD961EA-6881-4A14-83DE-C6972F6F681C"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:samsung:android:12.0:smr-dec-2023-r1:*:*:*:*:*:*",
"matchCriteriaId": "18940389-1FBD-48B2-BCF0-1D709C2C3045"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:samsung:android:12.0:smr-feb-2022-r1:*:*:*:*:*:*",
"matchCriteriaId": "011CC4F5-6701-41E9-BC7D-CFE6EFF682AC"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:samsung:android:12.0:smr-feb-2023-r1:*:*:*:*:*:*",
"matchCriteriaId": "13E145E2-CE11-4EE5-9085-B4960FE4F52F"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:samsung:android:12.0:smr-feb-2024-r1:*:*:*:*:*:*",
"matchCriteriaId": "B3556856-6F56-465C-8254-BB3CD8252FF7"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:samsung:android:12.0:smr-jan-2022-r1:*:*:*:*:*:*",
"matchCriteriaId": "A3BBC8B6-1D2B-47C9-93EE-3D3DC43062F1"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:samsung:android:12.0:smr-jan-2023-r1:*:*:*:*:*:*",
"matchCriteriaId": "02600CDD-6862-4146-88E8-A2E73B7ED534"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:samsung:android:12.0:smr-jan-2024-r1:*:*:*:*:*:*",
"matchCriteriaId": "2DB353A1-BE96-4FB5-9F4D-0119DC51F24E"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:samsung:android:12.0:smr-jul-2022-r1:*:*:*:*:*:*",
"matchCriteriaId": "35F40D59-034B-44FB-8DCD-D469B50DE7E1"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:samsung:android:12.0:smr-jul-2023-r1:*:*:*:*:*:*",
"matchCriteriaId": "CC84021B-9846-40FB-834B-7C5BECEFFEAC"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:samsung:android:12.0:smr-jun-2022-r1:*:*:*:*:*:*",
"matchCriteriaId": "BC3F8572-578B-4D19-9453-1D03DA55EF70"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:samsung:android:12.0:smr-jun-2023-r1:*:*:*:*:*:*",
"matchCriteriaId": "EEABF42E-578E-4689-B80D-B305467AA72D"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:samsung:android:12.0:smr-jun-2024-r1:*:*:*:*:*:*",
"matchCriteriaId": "E070DA79-8F09-4877-BFBA-3F23564DD8C8"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:samsung:android:12.0:smr-mar-2022-r1:*:*:*:*:*:*",
"matchCriteriaId": "9137C66C-4966-4C90-ABE9-7E22F7E29BA7"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:samsung:android:12.0:smr-mar-2023-r1:*:*:*:*:*:*",
"matchCriteriaId": "E261C9D8-1E74-44B8-9F11-F5769CF8B7FD"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:samsung:android:12.0:smr-mar-2024-r1:*:*:*:*:*:*",
"matchCriteriaId": "D80C2C7A-6F48-48B8-ACAD-720FC797F836"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:samsung:android:12.0:smr-may-2022-r1:*:*:*:*:*:*",
"matchCriteriaId": "18CD523B-530E-4187-8BFF-729CDAC69282"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:samsung:android:12.0:smr-may-2023-r1:*:*:*:*:*:*",
"matchCriteriaId": "4C28D3CD-DD34-4334-B03F-794B31A4BF48"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:samsung:android:12.0:smr-may-2024-r1:*:*:*:*:*:*",
"matchCriteriaId": "EE03013A-AAB3-4426-BB22-E1487D3B3F6C"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:samsung:android:12.0:smr-nov-2021-r1:*:*:*:*:*:*",
"matchCriteriaId": "5A81C86D-F1FE-4166-8F37-D7170E6B30FE"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:samsung:android:12.0:smr-nov-2022-r1:*:*:*:*:*:*",
"matchCriteriaId": "A3D80783-523A-455E-B1AD-0961086F79E6"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:samsung:android:12.0:smr-nov-2023-r1:*:*:*:*:*:*",
"matchCriteriaId": "D5EF09DB-023A-40CB-9C94-020172383EEC"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:samsung:android:12.0:smr-oct-2022-r1:*:*:*:*:*:*",
"matchCriteriaId": "89BE2958-0BEE-4CFD-A0BA-494DE62E7F32"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:samsung:android:12.0:smr-oct-2023-r1:*:*:*:*:*:*",
"matchCriteriaId": "5C5B44E9-BA5B-4CFB-8452-B52B6CC833F5"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:samsung:android:12.0:smr-sep-2022-r1:*:*:*:*:*:*",
"matchCriteriaId": "B0329C50-B904-480D-8EBB-F2757049FC81"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:samsung:android:12.0:smr-sep-2023-r1:*:*:*:*:*:*",
"matchCriteriaId": "E1553CEA-FCF4-4A9C-85FE-F7DB7A500443"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:samsung:android:13.0:-:*:*:*:*:*:*",
"matchCriteriaId": "A123EDB1-3048-44B0-8D4D-39A2B24B5F6B"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:samsung:android:13.0:smr-apr-2023-r1:*:*:*:*:*:*",
"matchCriteriaId": "70825981-F895-4BFD-9B6E-92BFF0D67023"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:samsung:android:13.0:smr-apr-2024-r1:*:*:*:*:*:*",
"matchCriteriaId": "A5E68B7B-BA08-4E8C-B60A-B3836C6986BC"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:samsung:android:13.0:smr-aug-2023-r1:*:*:*:*:*:*",
"matchCriteriaId": "88DC0A82-CAF3-4E88-8A4D-8AF79D0C226D"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:samsung:android:13.0:smr-dec-2022-r1:*:*:*:*:*:*",
"matchCriteriaId": "299284DA-85AB-4162-B858-E67E5C6C14F7"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:samsung:android:13.0:smr-dec-2023-r1:*:*:*:*:*:*",
"matchCriteriaId": "38B7AB56-AB65-4557-A91C-40CA2FD12351"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:samsung:android:13.0:smr-feb-2023-r1:*:*:*:*:*:*",
"matchCriteriaId": "D98F307E-3B01-4C17-86E5-1C6299919417"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:samsung:android:13.0:smr-feb-2024-r1:*:*:*:*:*:*",
"matchCriteriaId": "952CA843-7CF0-4424-BDA4-3F2A93E077B6"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:samsung:android:13.0:smr-jan-2023-r1:*:*:*:*:*:*",
"matchCriteriaId": "7D7DA96D-9C25-4DDA-A6BF-D998AC346B89"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:samsung:android:13.0:smr-jan-2024-r1:*:*:*:*:*:*",
"matchCriteriaId": "07AC19C6-D245-4C3A-90CC-A931A901EA0A"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:samsung:android:13.0:smr-jul-2023-r1:*:*:*:*:*:*",
"matchCriteriaId": "34114DDC-DCDA-4306-8D23-2E628873171F"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:samsung:android:13.0:smr-jun-2023-r1:*:*:*:*:*:*",
"matchCriteriaId": "85E4E8C1-749F-4A1C-8333-6BAFBF8B64D1"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:samsung:android:13.0:smr-jun-2024-r1:*:*:*:*:*:*",
"matchCriteriaId": "E346DCBD-7DEB-464F-B917-8624BE87D646"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:samsung:android:13.0:smr-mar-2023-r1:*:*:*:*:*:*",
"matchCriteriaId": "5F73D594-178F-4FC8-9F40-0E545E2647B0"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:samsung:android:13.0:smr-mar-2024-r1:*:*:*:*:*:*",
"matchCriteriaId": "5697984D-08BA-412F-9BDF-26B658B0ADBC"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:samsung:android:13.0:smr-may-2023-r1:*:*:*:*:*:*",
"matchCriteriaId": "3F3EF3F1-4E54-46E3-A308-69656A29FBD2"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:samsung:android:13.0:smr-may-2024-r1:*:*:*:*:*:*",
"matchCriteriaId": "73F22C26-52FC-42A7-B263-0CC7770A8C6A"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:samsung:android:13.0:smr-nov-2022-r1:*:*:*:*:*:*",
"matchCriteriaId": "D2B24866-2B3A-4A1A-8B75-EF7A7541797A"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:samsung:android:13.0:smr-nov-2023-r1:*:*:*:*:*:*",
"matchCriteriaId": "3D30C02C-91FB-4D29-AF49-7903158E8FEB"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:samsung:android:13.0:smr-oct-2022-r1:*:*:*:*:*:*",
"matchCriteriaId": "EBB29F18-A929-432B-B20C-365401E6CA12"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:samsung:android:13.0:smr-oct-2023-r1:*:*:*:*:*:*",
"matchCriteriaId": "2B6D9064-844B-4D3F-AAE4-D170DF45EF8D"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:samsung:android:13.0:smr-sep-2023-r1:*:*:*:*:*:*",
"matchCriteriaId": "C581B7EE-CD08-4D6E-8858-EA8FA631F84C"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:samsung:android:14.0:-:*:*:*:*:*:*",
"matchCriteriaId": "3093F6FE-C562-4F62-97B7-CA0D2DDF9BBE"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:samsung:android:14.0:smr-apr-2023-r1:*:*:*:*:*:*",
"matchCriteriaId": "DAB2A0D7-8F4F-4128-AE09-D2658D793BF7"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:samsung:android:14.0:smr-apr-2024-r1:*:*:*:*:*:*",
"matchCriteriaId": "6A89AE5B-4D1A-4ADA-B572-38B1FC4ED54C"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:samsung:android:14.0:smr-aug-2023-r1:*:*:*:*:*:*",
"matchCriteriaId": "CC6E2FC7-2BAF-4C7B-9E0F-D9F844041A35"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:samsung:android:14.0:smr-dec-2022-r1:*:*:*:*:*:*",
"matchCriteriaId": "2A901EFE-90BA-474C-88D2-8A3E7D99C0E7"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:samsung:android:14.0:smr-dec-2023-r1:*:*:*:*:*:*",
"matchCriteriaId": "DF7B3213-520A-49F0-A183-C73A37A56854"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:samsung:android:14.0:smr-feb-2023-r1:*:*:*:*:*:*",
"matchCriteriaId": "FD8B9CD3-063E-481E-BE7C-1628ADA71849"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:samsung:android:14.0:smr-jan-2023-r1:*:*:*:*:*:*",
"matchCriteriaId": "9CE09EF7-B024-4D79-9400-C8223CDFBB86"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:samsung:android:14.0:smr-jan-2024-r1:*:*:*:*:*:*",
"matchCriteriaId": "C339A665-413D-443F-AD04-F71C161235D0"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:samsung:android:14.0:smr-jul-2023-r1:*:*:*:*:*:*",
"matchCriteriaId": "3DD61EDA-98ED-4309-B54F-0CF8B7D07DC7"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:samsung:android:14.0:smr-jun-2023-r1:*:*:*:*:*:*",
"matchCriteriaId": "4ECB0B7A-590C-460C-878B-9A78CB37D259"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:samsung:android:14.0:smr-jun-2024-r1:*:*:*:*:*:*",
"matchCriteriaId": "D66CF415-6C4A-4AF3-B660-B2E9CF484B51"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:samsung:android:14.0:smr-mar-2023-r1:*:*:*:*:*:*",
"matchCriteriaId": "EAFE015F-8130-4F10-A553-420F0BB2A132"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:samsung:android:14.0:smr-mar-2024-r1:*:*:*:*:*:*",
"matchCriteriaId": "141E541B-8FA5-4829-A413-4F1DC19E9AE1"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:samsung:android:14.0:smr-may-2023-r1:*:*:*:*:*:*",
"matchCriteriaId": "ACEA385E-3931-4438-A2A9-0357651F9B48"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:samsung:android:14.0:smr-may-2024-r1:*:*:*:*:*:*",
"matchCriteriaId": "A57CB118-46CC-4CE8-ACC3-A806CD2C25A9"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:samsung:android:14.0:smr-nov-2022-r1:*:*:*:*:*:*",
"matchCriteriaId": "6DD1F78D-EA98-4825-A0EA-703196DDE5E4"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:samsung:android:14.0:smr-nov-2023-r1:*:*:*:*:*:*",
"matchCriteriaId": "BDDB3FBE-99EC-4763-961B-2C436D864A1A"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:samsung:android:14.0:smr-oct-2022-r1:*:*:*:*:*:*",
"matchCriteriaId": "1B02110E-71FB-495F-86CA-F2A4E55C0E42"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:samsung:android:14.0:smr-oct-2023-r1:*:*:*:*:*:*",
"matchCriteriaId": "931CC6D7-A42D-4482-B901-B539DFF89C3E"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:samsung:android:14.0:smr-sep-2023-r1:*:*:*:*:*:*",
"matchCriteriaId": "84ED2366-D4BA-4094-94AC-AD6E7AEBB6FF"
}
]
}
]
}
],
"references": [
{
"url": "https://security.samsungmobile.com/securityUpdate.smsb?year=2024&month=07",
"source": "mobile.security@samsung.com"
"source": "mobile.security@samsung.com",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-34591",
"sourceIdentifier": "mobile.security@samsung.com",
"published": "2024-07-02T10:15:07.423",
"lastModified": "2024-07-02T12:09:16.907",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2024-07-02T17:59:58.230",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -17,6 +17,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "LOW",
"baseScore": 4.3,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 1.4
},
{
"source": "mobile.security@samsung.com",
"type": "Secondary",
@ -39,10 +59,417 @@
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:samsung:android:12.0:-:*:*:*:*:*:*",
"matchCriteriaId": "D757450C-270E-4FB2-A50C-7F769FED558A"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:samsung:android:12.0:smr-apr-2022-r1:*:*:*:*:*:*",
"matchCriteriaId": "EC4A2EBA-038B-44D5-84F3-FF326CD1C62D"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:samsung:android:12.0:smr-apr-2023-r1:*:*:*:*:*:*",
"matchCriteriaId": "40EB3FC1-D79A-40C7-9E2B-573E20780982"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:samsung:android:12.0:smr-apr-2024-r1:*:*:*:*:*:*",
"matchCriteriaId": "F1525232-54F0-467F-9575-2445F73F43B5"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:samsung:android:12.0:smr-aug-2022-r1:*:*:*:*:*:*",
"matchCriteriaId": "0ABFBBDB-E935-4C54-865A-0E607497DA87"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:samsung:android:12.0:smr-aug-2023-r1:*:*:*:*:*:*",
"matchCriteriaId": "7B738B6B-78CE-4618-B70D-6BC9ED453105"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:samsung:android:12.0:smr-dec-2021-r1:*:*:*:*:*:*",
"matchCriteriaId": "3899E3E7-1284-4223-A258-DA691F5D62FE"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:samsung:android:12.0:smr-dec-2022-r1:*:*:*:*:*:*",
"matchCriteriaId": "ECD961EA-6881-4A14-83DE-C6972F6F681C"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:samsung:android:12.0:smr-dec-2023-r1:*:*:*:*:*:*",
"matchCriteriaId": "18940389-1FBD-48B2-BCF0-1D709C2C3045"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:samsung:android:12.0:smr-feb-2022-r1:*:*:*:*:*:*",
"matchCriteriaId": "011CC4F5-6701-41E9-BC7D-CFE6EFF682AC"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:samsung:android:12.0:smr-feb-2023-r1:*:*:*:*:*:*",
"matchCriteriaId": "13E145E2-CE11-4EE5-9085-B4960FE4F52F"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:samsung:android:12.0:smr-feb-2024-r1:*:*:*:*:*:*",
"matchCriteriaId": "B3556856-6F56-465C-8254-BB3CD8252FF7"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:samsung:android:12.0:smr-jan-2022-r1:*:*:*:*:*:*",
"matchCriteriaId": "A3BBC8B6-1D2B-47C9-93EE-3D3DC43062F1"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:samsung:android:12.0:smr-jan-2023-r1:*:*:*:*:*:*",
"matchCriteriaId": "02600CDD-6862-4146-88E8-A2E73B7ED534"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:samsung:android:12.0:smr-jan-2024-r1:*:*:*:*:*:*",
"matchCriteriaId": "2DB353A1-BE96-4FB5-9F4D-0119DC51F24E"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:samsung:android:12.0:smr-jul-2022-r1:*:*:*:*:*:*",
"matchCriteriaId": "35F40D59-034B-44FB-8DCD-D469B50DE7E1"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:samsung:android:12.0:smr-jul-2023-r1:*:*:*:*:*:*",
"matchCriteriaId": "CC84021B-9846-40FB-834B-7C5BECEFFEAC"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:samsung:android:12.0:smr-jun-2022-r1:*:*:*:*:*:*",
"matchCriteriaId": "BC3F8572-578B-4D19-9453-1D03DA55EF70"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:samsung:android:12.0:smr-jun-2023-r1:*:*:*:*:*:*",
"matchCriteriaId": "EEABF42E-578E-4689-B80D-B305467AA72D"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:samsung:android:12.0:smr-jun-2024-r1:*:*:*:*:*:*",
"matchCriteriaId": "E070DA79-8F09-4877-BFBA-3F23564DD8C8"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:samsung:android:12.0:smr-mar-2022-r1:*:*:*:*:*:*",
"matchCriteriaId": "9137C66C-4966-4C90-ABE9-7E22F7E29BA7"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:samsung:android:12.0:smr-mar-2023-r1:*:*:*:*:*:*",
"matchCriteriaId": "E261C9D8-1E74-44B8-9F11-F5769CF8B7FD"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:samsung:android:12.0:smr-mar-2024-r1:*:*:*:*:*:*",
"matchCriteriaId": "D80C2C7A-6F48-48B8-ACAD-720FC797F836"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:samsung:android:12.0:smr-may-2022-r1:*:*:*:*:*:*",
"matchCriteriaId": "18CD523B-530E-4187-8BFF-729CDAC69282"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:samsung:android:12.0:smr-may-2023-r1:*:*:*:*:*:*",
"matchCriteriaId": "4C28D3CD-DD34-4334-B03F-794B31A4BF48"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:samsung:android:12.0:smr-may-2024-r1:*:*:*:*:*:*",
"matchCriteriaId": "EE03013A-AAB3-4426-BB22-E1487D3B3F6C"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:samsung:android:12.0:smr-nov-2021-r1:*:*:*:*:*:*",
"matchCriteriaId": "5A81C86D-F1FE-4166-8F37-D7170E6B30FE"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:samsung:android:12.0:smr-nov-2022-r1:*:*:*:*:*:*",
"matchCriteriaId": "A3D80783-523A-455E-B1AD-0961086F79E6"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:samsung:android:12.0:smr-nov-2023-r1:*:*:*:*:*:*",
"matchCriteriaId": "D5EF09DB-023A-40CB-9C94-020172383EEC"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:samsung:android:12.0:smr-oct-2022-r1:*:*:*:*:*:*",
"matchCriteriaId": "89BE2958-0BEE-4CFD-A0BA-494DE62E7F32"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:samsung:android:12.0:smr-oct-2023-r1:*:*:*:*:*:*",
"matchCriteriaId": "5C5B44E9-BA5B-4CFB-8452-B52B6CC833F5"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:samsung:android:12.0:smr-sep-2022-r1:*:*:*:*:*:*",
"matchCriteriaId": "B0329C50-B904-480D-8EBB-F2757049FC81"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:samsung:android:12.0:smr-sep-2023-r1:*:*:*:*:*:*",
"matchCriteriaId": "E1553CEA-FCF4-4A9C-85FE-F7DB7A500443"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:samsung:android:13.0:-:*:*:*:*:*:*",
"matchCriteriaId": "A123EDB1-3048-44B0-8D4D-39A2B24B5F6B"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:samsung:android:13.0:smr-apr-2023-r1:*:*:*:*:*:*",
"matchCriteriaId": "70825981-F895-4BFD-9B6E-92BFF0D67023"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:samsung:android:13.0:smr-apr-2024-r1:*:*:*:*:*:*",
"matchCriteriaId": "A5E68B7B-BA08-4E8C-B60A-B3836C6986BC"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:samsung:android:13.0:smr-aug-2023-r1:*:*:*:*:*:*",
"matchCriteriaId": "88DC0A82-CAF3-4E88-8A4D-8AF79D0C226D"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:samsung:android:13.0:smr-dec-2022-r1:*:*:*:*:*:*",
"matchCriteriaId": "299284DA-85AB-4162-B858-E67E5C6C14F7"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:samsung:android:13.0:smr-dec-2023-r1:*:*:*:*:*:*",
"matchCriteriaId": "38B7AB56-AB65-4557-A91C-40CA2FD12351"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:samsung:android:13.0:smr-feb-2023-r1:*:*:*:*:*:*",
"matchCriteriaId": "D98F307E-3B01-4C17-86E5-1C6299919417"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:samsung:android:13.0:smr-feb-2024-r1:*:*:*:*:*:*",
"matchCriteriaId": "952CA843-7CF0-4424-BDA4-3F2A93E077B6"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:samsung:android:13.0:smr-jan-2023-r1:*:*:*:*:*:*",
"matchCriteriaId": "7D7DA96D-9C25-4DDA-A6BF-D998AC346B89"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:samsung:android:13.0:smr-jan-2024-r1:*:*:*:*:*:*",
"matchCriteriaId": "07AC19C6-D245-4C3A-90CC-A931A901EA0A"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:samsung:android:13.0:smr-jul-2023-r1:*:*:*:*:*:*",
"matchCriteriaId": "34114DDC-DCDA-4306-8D23-2E628873171F"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:samsung:android:13.0:smr-jun-2023-r1:*:*:*:*:*:*",
"matchCriteriaId": "85E4E8C1-749F-4A1C-8333-6BAFBF8B64D1"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:samsung:android:13.0:smr-jun-2024-r1:*:*:*:*:*:*",
"matchCriteriaId": "E346DCBD-7DEB-464F-B917-8624BE87D646"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:samsung:android:13.0:smr-mar-2023-r1:*:*:*:*:*:*",
"matchCriteriaId": "5F73D594-178F-4FC8-9F40-0E545E2647B0"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:samsung:android:13.0:smr-mar-2024-r1:*:*:*:*:*:*",
"matchCriteriaId": "5697984D-08BA-412F-9BDF-26B658B0ADBC"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:samsung:android:13.0:smr-may-2023-r1:*:*:*:*:*:*",
"matchCriteriaId": "3F3EF3F1-4E54-46E3-A308-69656A29FBD2"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:samsung:android:13.0:smr-may-2024-r1:*:*:*:*:*:*",
"matchCriteriaId": "73F22C26-52FC-42A7-B263-0CC7770A8C6A"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:samsung:android:13.0:smr-nov-2022-r1:*:*:*:*:*:*",
"matchCriteriaId": "D2B24866-2B3A-4A1A-8B75-EF7A7541797A"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:samsung:android:13.0:smr-nov-2023-r1:*:*:*:*:*:*",
"matchCriteriaId": "3D30C02C-91FB-4D29-AF49-7903158E8FEB"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:samsung:android:13.0:smr-oct-2022-r1:*:*:*:*:*:*",
"matchCriteriaId": "EBB29F18-A929-432B-B20C-365401E6CA12"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:samsung:android:13.0:smr-oct-2023-r1:*:*:*:*:*:*",
"matchCriteriaId": "2B6D9064-844B-4D3F-AAE4-D170DF45EF8D"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:samsung:android:13.0:smr-sep-2023-r1:*:*:*:*:*:*",
"matchCriteriaId": "C581B7EE-CD08-4D6E-8858-EA8FA631F84C"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:samsung:android:14.0:-:*:*:*:*:*:*",
"matchCriteriaId": "3093F6FE-C562-4F62-97B7-CA0D2DDF9BBE"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:samsung:android:14.0:smr-apr-2023-r1:*:*:*:*:*:*",
"matchCriteriaId": "DAB2A0D7-8F4F-4128-AE09-D2658D793BF7"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:samsung:android:14.0:smr-apr-2024-r1:*:*:*:*:*:*",
"matchCriteriaId": "6A89AE5B-4D1A-4ADA-B572-38B1FC4ED54C"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:samsung:android:14.0:smr-aug-2023-r1:*:*:*:*:*:*",
"matchCriteriaId": "CC6E2FC7-2BAF-4C7B-9E0F-D9F844041A35"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:samsung:android:14.0:smr-dec-2022-r1:*:*:*:*:*:*",
"matchCriteriaId": "2A901EFE-90BA-474C-88D2-8A3E7D99C0E7"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:samsung:android:14.0:smr-dec-2023-r1:*:*:*:*:*:*",
"matchCriteriaId": "DF7B3213-520A-49F0-A183-C73A37A56854"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:samsung:android:14.0:smr-feb-2023-r1:*:*:*:*:*:*",
"matchCriteriaId": "FD8B9CD3-063E-481E-BE7C-1628ADA71849"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:samsung:android:14.0:smr-jan-2023-r1:*:*:*:*:*:*",
"matchCriteriaId": "9CE09EF7-B024-4D79-9400-C8223CDFBB86"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:samsung:android:14.0:smr-jan-2024-r1:*:*:*:*:*:*",
"matchCriteriaId": "C339A665-413D-443F-AD04-F71C161235D0"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:samsung:android:14.0:smr-jul-2023-r1:*:*:*:*:*:*",
"matchCriteriaId": "3DD61EDA-98ED-4309-B54F-0CF8B7D07DC7"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:samsung:android:14.0:smr-jun-2023-r1:*:*:*:*:*:*",
"matchCriteriaId": "4ECB0B7A-590C-460C-878B-9A78CB37D259"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:samsung:android:14.0:smr-jun-2024-r1:*:*:*:*:*:*",
"matchCriteriaId": "D66CF415-6C4A-4AF3-B660-B2E9CF484B51"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:samsung:android:14.0:smr-mar-2023-r1:*:*:*:*:*:*",
"matchCriteriaId": "EAFE015F-8130-4F10-A553-420F0BB2A132"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:samsung:android:14.0:smr-mar-2024-r1:*:*:*:*:*:*",
"matchCriteriaId": "141E541B-8FA5-4829-A413-4F1DC19E9AE1"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:samsung:android:14.0:smr-may-2023-r1:*:*:*:*:*:*",
"matchCriteriaId": "ACEA385E-3931-4438-A2A9-0357651F9B48"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:samsung:android:14.0:smr-may-2024-r1:*:*:*:*:*:*",
"matchCriteriaId": "A57CB118-46CC-4CE8-ACC3-A806CD2C25A9"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:samsung:android:14.0:smr-nov-2022-r1:*:*:*:*:*:*",
"matchCriteriaId": "6DD1F78D-EA98-4825-A0EA-703196DDE5E4"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:samsung:android:14.0:smr-nov-2023-r1:*:*:*:*:*:*",
"matchCriteriaId": "BDDB3FBE-99EC-4763-961B-2C436D864A1A"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:samsung:android:14.0:smr-oct-2022-r1:*:*:*:*:*:*",
"matchCriteriaId": "1B02110E-71FB-495F-86CA-F2A4E55C0E42"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:samsung:android:14.0:smr-oct-2023-r1:*:*:*:*:*:*",
"matchCriteriaId": "931CC6D7-A42D-4482-B901-B539DFF89C3E"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:samsung:android:14.0:smr-sep-2023-r1:*:*:*:*:*:*",
"matchCriteriaId": "84ED2366-D4BA-4094-94AC-AD6E7AEBB6FF"
}
]
}
]
}
],
"references": [
{
"url": "https://security.samsungmobile.com/securityUpdate.smsb?year=2024&month=07",
"source": "mobile.security@samsung.com"
"source": "mobile.security@samsung.com",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-34592",
"sourceIdentifier": "mobile.security@samsung.com",
"published": "2024-07-02T10:15:07.600",
"lastModified": "2024-07-02T12:09:16.907",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2024-07-02T18:00:19.693",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -17,6 +17,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "LOW",
"baseScore": 4.3,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 1.4
},
{
"source": "mobile.security@samsung.com",
"type": "Secondary",
@ -39,10 +59,417 @@
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:samsung:android:12.0:-:*:*:*:*:*:*",
"matchCriteriaId": "D757450C-270E-4FB2-A50C-7F769FED558A"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:samsung:android:12.0:smr-apr-2022-r1:*:*:*:*:*:*",
"matchCriteriaId": "EC4A2EBA-038B-44D5-84F3-FF326CD1C62D"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:samsung:android:12.0:smr-apr-2023-r1:*:*:*:*:*:*",
"matchCriteriaId": "40EB3FC1-D79A-40C7-9E2B-573E20780982"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:samsung:android:12.0:smr-apr-2024-r1:*:*:*:*:*:*",
"matchCriteriaId": "F1525232-54F0-467F-9575-2445F73F43B5"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:samsung:android:12.0:smr-aug-2022-r1:*:*:*:*:*:*",
"matchCriteriaId": "0ABFBBDB-E935-4C54-865A-0E607497DA87"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:samsung:android:12.0:smr-aug-2023-r1:*:*:*:*:*:*",
"matchCriteriaId": "7B738B6B-78CE-4618-B70D-6BC9ED453105"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:samsung:android:12.0:smr-dec-2021-r1:*:*:*:*:*:*",
"matchCriteriaId": "3899E3E7-1284-4223-A258-DA691F5D62FE"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:samsung:android:12.0:smr-dec-2022-r1:*:*:*:*:*:*",
"matchCriteriaId": "ECD961EA-6881-4A14-83DE-C6972F6F681C"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:samsung:android:12.0:smr-dec-2023-r1:*:*:*:*:*:*",
"matchCriteriaId": "18940389-1FBD-48B2-BCF0-1D709C2C3045"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:samsung:android:12.0:smr-feb-2022-r1:*:*:*:*:*:*",
"matchCriteriaId": "011CC4F5-6701-41E9-BC7D-CFE6EFF682AC"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:samsung:android:12.0:smr-feb-2023-r1:*:*:*:*:*:*",
"matchCriteriaId": "13E145E2-CE11-4EE5-9085-B4960FE4F52F"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:samsung:android:12.0:smr-feb-2024-r1:*:*:*:*:*:*",
"matchCriteriaId": "B3556856-6F56-465C-8254-BB3CD8252FF7"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:samsung:android:12.0:smr-jan-2022-r1:*:*:*:*:*:*",
"matchCriteriaId": "A3BBC8B6-1D2B-47C9-93EE-3D3DC43062F1"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:samsung:android:12.0:smr-jan-2023-r1:*:*:*:*:*:*",
"matchCriteriaId": "02600CDD-6862-4146-88E8-A2E73B7ED534"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:samsung:android:12.0:smr-jan-2024-r1:*:*:*:*:*:*",
"matchCriteriaId": "2DB353A1-BE96-4FB5-9F4D-0119DC51F24E"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:samsung:android:12.0:smr-jul-2022-r1:*:*:*:*:*:*",
"matchCriteriaId": "35F40D59-034B-44FB-8DCD-D469B50DE7E1"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:samsung:android:12.0:smr-jul-2023-r1:*:*:*:*:*:*",
"matchCriteriaId": "CC84021B-9846-40FB-834B-7C5BECEFFEAC"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:samsung:android:12.0:smr-jun-2022-r1:*:*:*:*:*:*",
"matchCriteriaId": "BC3F8572-578B-4D19-9453-1D03DA55EF70"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:samsung:android:12.0:smr-jun-2023-r1:*:*:*:*:*:*",
"matchCriteriaId": "EEABF42E-578E-4689-B80D-B305467AA72D"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:samsung:android:12.0:smr-jun-2024-r1:*:*:*:*:*:*",
"matchCriteriaId": "E070DA79-8F09-4877-BFBA-3F23564DD8C8"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:samsung:android:12.0:smr-mar-2022-r1:*:*:*:*:*:*",
"matchCriteriaId": "9137C66C-4966-4C90-ABE9-7E22F7E29BA7"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:samsung:android:12.0:smr-mar-2023-r1:*:*:*:*:*:*",
"matchCriteriaId": "E261C9D8-1E74-44B8-9F11-F5769CF8B7FD"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:samsung:android:12.0:smr-mar-2024-r1:*:*:*:*:*:*",
"matchCriteriaId": "D80C2C7A-6F48-48B8-ACAD-720FC797F836"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:samsung:android:12.0:smr-may-2022-r1:*:*:*:*:*:*",
"matchCriteriaId": "18CD523B-530E-4187-8BFF-729CDAC69282"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:samsung:android:12.0:smr-may-2023-r1:*:*:*:*:*:*",
"matchCriteriaId": "4C28D3CD-DD34-4334-B03F-794B31A4BF48"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:samsung:android:12.0:smr-may-2024-r1:*:*:*:*:*:*",
"matchCriteriaId": "EE03013A-AAB3-4426-BB22-E1487D3B3F6C"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:samsung:android:12.0:smr-nov-2021-r1:*:*:*:*:*:*",
"matchCriteriaId": "5A81C86D-F1FE-4166-8F37-D7170E6B30FE"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:samsung:android:12.0:smr-nov-2022-r1:*:*:*:*:*:*",
"matchCriteriaId": "A3D80783-523A-455E-B1AD-0961086F79E6"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:samsung:android:12.0:smr-nov-2023-r1:*:*:*:*:*:*",
"matchCriteriaId": "D5EF09DB-023A-40CB-9C94-020172383EEC"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:samsung:android:12.0:smr-oct-2022-r1:*:*:*:*:*:*",
"matchCriteriaId": "89BE2958-0BEE-4CFD-A0BA-494DE62E7F32"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:samsung:android:12.0:smr-oct-2023-r1:*:*:*:*:*:*",
"matchCriteriaId": "5C5B44E9-BA5B-4CFB-8452-B52B6CC833F5"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:samsung:android:12.0:smr-sep-2022-r1:*:*:*:*:*:*",
"matchCriteriaId": "B0329C50-B904-480D-8EBB-F2757049FC81"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:samsung:android:12.0:smr-sep-2023-r1:*:*:*:*:*:*",
"matchCriteriaId": "E1553CEA-FCF4-4A9C-85FE-F7DB7A500443"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:samsung:android:13.0:-:*:*:*:*:*:*",
"matchCriteriaId": "A123EDB1-3048-44B0-8D4D-39A2B24B5F6B"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:samsung:android:13.0:smr-apr-2023-r1:*:*:*:*:*:*",
"matchCriteriaId": "70825981-F895-4BFD-9B6E-92BFF0D67023"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:samsung:android:13.0:smr-apr-2024-r1:*:*:*:*:*:*",
"matchCriteriaId": "A5E68B7B-BA08-4E8C-B60A-B3836C6986BC"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:samsung:android:13.0:smr-aug-2023-r1:*:*:*:*:*:*",
"matchCriteriaId": "88DC0A82-CAF3-4E88-8A4D-8AF79D0C226D"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:samsung:android:13.0:smr-dec-2022-r1:*:*:*:*:*:*",
"matchCriteriaId": "299284DA-85AB-4162-B858-E67E5C6C14F7"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:samsung:android:13.0:smr-dec-2023-r1:*:*:*:*:*:*",
"matchCriteriaId": "38B7AB56-AB65-4557-A91C-40CA2FD12351"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:samsung:android:13.0:smr-feb-2023-r1:*:*:*:*:*:*",
"matchCriteriaId": "D98F307E-3B01-4C17-86E5-1C6299919417"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:samsung:android:13.0:smr-feb-2024-r1:*:*:*:*:*:*",
"matchCriteriaId": "952CA843-7CF0-4424-BDA4-3F2A93E077B6"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:samsung:android:13.0:smr-jan-2023-r1:*:*:*:*:*:*",
"matchCriteriaId": "7D7DA96D-9C25-4DDA-A6BF-D998AC346B89"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:samsung:android:13.0:smr-jan-2024-r1:*:*:*:*:*:*",
"matchCriteriaId": "07AC19C6-D245-4C3A-90CC-A931A901EA0A"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:samsung:android:13.0:smr-jul-2023-r1:*:*:*:*:*:*",
"matchCriteriaId": "34114DDC-DCDA-4306-8D23-2E628873171F"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:samsung:android:13.0:smr-jun-2023-r1:*:*:*:*:*:*",
"matchCriteriaId": "85E4E8C1-749F-4A1C-8333-6BAFBF8B64D1"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:samsung:android:13.0:smr-jun-2024-r1:*:*:*:*:*:*",
"matchCriteriaId": "E346DCBD-7DEB-464F-B917-8624BE87D646"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:samsung:android:13.0:smr-mar-2023-r1:*:*:*:*:*:*",
"matchCriteriaId": "5F73D594-178F-4FC8-9F40-0E545E2647B0"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:samsung:android:13.0:smr-mar-2024-r1:*:*:*:*:*:*",
"matchCriteriaId": "5697984D-08BA-412F-9BDF-26B658B0ADBC"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:samsung:android:13.0:smr-may-2023-r1:*:*:*:*:*:*",
"matchCriteriaId": "3F3EF3F1-4E54-46E3-A308-69656A29FBD2"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:samsung:android:13.0:smr-may-2024-r1:*:*:*:*:*:*",
"matchCriteriaId": "73F22C26-52FC-42A7-B263-0CC7770A8C6A"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:samsung:android:13.0:smr-nov-2022-r1:*:*:*:*:*:*",
"matchCriteriaId": "D2B24866-2B3A-4A1A-8B75-EF7A7541797A"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:samsung:android:13.0:smr-nov-2023-r1:*:*:*:*:*:*",
"matchCriteriaId": "3D30C02C-91FB-4D29-AF49-7903158E8FEB"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:samsung:android:13.0:smr-oct-2022-r1:*:*:*:*:*:*",
"matchCriteriaId": "EBB29F18-A929-432B-B20C-365401E6CA12"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:samsung:android:13.0:smr-oct-2023-r1:*:*:*:*:*:*",
"matchCriteriaId": "2B6D9064-844B-4D3F-AAE4-D170DF45EF8D"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:samsung:android:13.0:smr-sep-2023-r1:*:*:*:*:*:*",
"matchCriteriaId": "C581B7EE-CD08-4D6E-8858-EA8FA631F84C"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:samsung:android:14.0:-:*:*:*:*:*:*",
"matchCriteriaId": "3093F6FE-C562-4F62-97B7-CA0D2DDF9BBE"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:samsung:android:14.0:smr-apr-2023-r1:*:*:*:*:*:*",
"matchCriteriaId": "DAB2A0D7-8F4F-4128-AE09-D2658D793BF7"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:samsung:android:14.0:smr-apr-2024-r1:*:*:*:*:*:*",
"matchCriteriaId": "6A89AE5B-4D1A-4ADA-B572-38B1FC4ED54C"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:samsung:android:14.0:smr-aug-2023-r1:*:*:*:*:*:*",
"matchCriteriaId": "CC6E2FC7-2BAF-4C7B-9E0F-D9F844041A35"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:samsung:android:14.0:smr-dec-2022-r1:*:*:*:*:*:*",
"matchCriteriaId": "2A901EFE-90BA-474C-88D2-8A3E7D99C0E7"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:samsung:android:14.0:smr-dec-2023-r1:*:*:*:*:*:*",
"matchCriteriaId": "DF7B3213-520A-49F0-A183-C73A37A56854"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:samsung:android:14.0:smr-feb-2023-r1:*:*:*:*:*:*",
"matchCriteriaId": "FD8B9CD3-063E-481E-BE7C-1628ADA71849"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:samsung:android:14.0:smr-jan-2023-r1:*:*:*:*:*:*",
"matchCriteriaId": "9CE09EF7-B024-4D79-9400-C8223CDFBB86"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:samsung:android:14.0:smr-jan-2024-r1:*:*:*:*:*:*",
"matchCriteriaId": "C339A665-413D-443F-AD04-F71C161235D0"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:samsung:android:14.0:smr-jul-2023-r1:*:*:*:*:*:*",
"matchCriteriaId": "3DD61EDA-98ED-4309-B54F-0CF8B7D07DC7"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:samsung:android:14.0:smr-jun-2023-r1:*:*:*:*:*:*",
"matchCriteriaId": "4ECB0B7A-590C-460C-878B-9A78CB37D259"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:samsung:android:14.0:smr-jun-2024-r1:*:*:*:*:*:*",
"matchCriteriaId": "D66CF415-6C4A-4AF3-B660-B2E9CF484B51"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:samsung:android:14.0:smr-mar-2023-r1:*:*:*:*:*:*",
"matchCriteriaId": "EAFE015F-8130-4F10-A553-420F0BB2A132"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:samsung:android:14.0:smr-mar-2024-r1:*:*:*:*:*:*",
"matchCriteriaId": "141E541B-8FA5-4829-A413-4F1DC19E9AE1"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:samsung:android:14.0:smr-may-2023-r1:*:*:*:*:*:*",
"matchCriteriaId": "ACEA385E-3931-4438-A2A9-0357651F9B48"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:samsung:android:14.0:smr-may-2024-r1:*:*:*:*:*:*",
"matchCriteriaId": "A57CB118-46CC-4CE8-ACC3-A806CD2C25A9"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:samsung:android:14.0:smr-nov-2022-r1:*:*:*:*:*:*",
"matchCriteriaId": "6DD1F78D-EA98-4825-A0EA-703196DDE5E4"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:samsung:android:14.0:smr-nov-2023-r1:*:*:*:*:*:*",
"matchCriteriaId": "BDDB3FBE-99EC-4763-961B-2C436D864A1A"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:samsung:android:14.0:smr-oct-2022-r1:*:*:*:*:*:*",
"matchCriteriaId": "1B02110E-71FB-495F-86CA-F2A4E55C0E42"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:samsung:android:14.0:smr-oct-2023-r1:*:*:*:*:*:*",
"matchCriteriaId": "931CC6D7-A42D-4482-B901-B539DFF89C3E"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:samsung:android:14.0:smr-sep-2023-r1:*:*:*:*:*:*",
"matchCriteriaId": "84ED2366-D4BA-4094-94AC-AD6E7AEBB6FF"
}
]
}
]
}
],
"references": [
{
"url": "https://security.samsungmobile.com/securityUpdate.smsb?year=2024&month=07",
"source": "mobile.security@samsung.com"
"source": "mobile.security@samsung.com",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-34593",
"sourceIdentifier": "mobile.security@samsung.com",
"published": "2024-07-02T10:15:07.797",
"lastModified": "2024-07-02T12:09:16.907",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2024-07-02T18:00:59.957",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -17,6 +17,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
},
{
"source": "mobile.security@samsung.com",
"type": "Secondary",
@ -39,10 +59,417 @@
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:samsung:android:12.0:-:*:*:*:*:*:*",
"matchCriteriaId": "D757450C-270E-4FB2-A50C-7F769FED558A"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:samsung:android:12.0:smr-apr-2022-r1:*:*:*:*:*:*",
"matchCriteriaId": "EC4A2EBA-038B-44D5-84F3-FF326CD1C62D"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:samsung:android:12.0:smr-apr-2023-r1:*:*:*:*:*:*",
"matchCriteriaId": "40EB3FC1-D79A-40C7-9E2B-573E20780982"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:samsung:android:12.0:smr-apr-2024-r1:*:*:*:*:*:*",
"matchCriteriaId": "F1525232-54F0-467F-9575-2445F73F43B5"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:samsung:android:12.0:smr-aug-2022-r1:*:*:*:*:*:*",
"matchCriteriaId": "0ABFBBDB-E935-4C54-865A-0E607497DA87"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:samsung:android:12.0:smr-aug-2023-r1:*:*:*:*:*:*",
"matchCriteriaId": "7B738B6B-78CE-4618-B70D-6BC9ED453105"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:samsung:android:12.0:smr-dec-2021-r1:*:*:*:*:*:*",
"matchCriteriaId": "3899E3E7-1284-4223-A258-DA691F5D62FE"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:samsung:android:12.0:smr-dec-2022-r1:*:*:*:*:*:*",
"matchCriteriaId": "ECD961EA-6881-4A14-83DE-C6972F6F681C"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:samsung:android:12.0:smr-dec-2023-r1:*:*:*:*:*:*",
"matchCriteriaId": "18940389-1FBD-48B2-BCF0-1D709C2C3045"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:samsung:android:12.0:smr-feb-2022-r1:*:*:*:*:*:*",
"matchCriteriaId": "011CC4F5-6701-41E9-BC7D-CFE6EFF682AC"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:samsung:android:12.0:smr-feb-2023-r1:*:*:*:*:*:*",
"matchCriteriaId": "13E145E2-CE11-4EE5-9085-B4960FE4F52F"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:samsung:android:12.0:smr-feb-2024-r1:*:*:*:*:*:*",
"matchCriteriaId": "B3556856-6F56-465C-8254-BB3CD8252FF7"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:samsung:android:12.0:smr-jan-2022-r1:*:*:*:*:*:*",
"matchCriteriaId": "A3BBC8B6-1D2B-47C9-93EE-3D3DC43062F1"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:samsung:android:12.0:smr-jan-2023-r1:*:*:*:*:*:*",
"matchCriteriaId": "02600CDD-6862-4146-88E8-A2E73B7ED534"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:samsung:android:12.0:smr-jan-2024-r1:*:*:*:*:*:*",
"matchCriteriaId": "2DB353A1-BE96-4FB5-9F4D-0119DC51F24E"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:samsung:android:12.0:smr-jul-2022-r1:*:*:*:*:*:*",
"matchCriteriaId": "35F40D59-034B-44FB-8DCD-D469B50DE7E1"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:samsung:android:12.0:smr-jul-2023-r1:*:*:*:*:*:*",
"matchCriteriaId": "CC84021B-9846-40FB-834B-7C5BECEFFEAC"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:samsung:android:12.0:smr-jun-2022-r1:*:*:*:*:*:*",
"matchCriteriaId": "BC3F8572-578B-4D19-9453-1D03DA55EF70"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:samsung:android:12.0:smr-jun-2023-r1:*:*:*:*:*:*",
"matchCriteriaId": "EEABF42E-578E-4689-B80D-B305467AA72D"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:samsung:android:12.0:smr-jun-2024-r1:*:*:*:*:*:*",
"matchCriteriaId": "E070DA79-8F09-4877-BFBA-3F23564DD8C8"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:samsung:android:12.0:smr-mar-2022-r1:*:*:*:*:*:*",
"matchCriteriaId": "9137C66C-4966-4C90-ABE9-7E22F7E29BA7"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:samsung:android:12.0:smr-mar-2023-r1:*:*:*:*:*:*",
"matchCriteriaId": "E261C9D8-1E74-44B8-9F11-F5769CF8B7FD"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:samsung:android:12.0:smr-mar-2024-r1:*:*:*:*:*:*",
"matchCriteriaId": "D80C2C7A-6F48-48B8-ACAD-720FC797F836"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:samsung:android:12.0:smr-may-2022-r1:*:*:*:*:*:*",
"matchCriteriaId": "18CD523B-530E-4187-8BFF-729CDAC69282"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:samsung:android:12.0:smr-may-2023-r1:*:*:*:*:*:*",
"matchCriteriaId": "4C28D3CD-DD34-4334-B03F-794B31A4BF48"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:samsung:android:12.0:smr-may-2024-r1:*:*:*:*:*:*",
"matchCriteriaId": "EE03013A-AAB3-4426-BB22-E1487D3B3F6C"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:samsung:android:12.0:smr-nov-2021-r1:*:*:*:*:*:*",
"matchCriteriaId": "5A81C86D-F1FE-4166-8F37-D7170E6B30FE"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:samsung:android:12.0:smr-nov-2022-r1:*:*:*:*:*:*",
"matchCriteriaId": "A3D80783-523A-455E-B1AD-0961086F79E6"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:samsung:android:12.0:smr-nov-2023-r1:*:*:*:*:*:*",
"matchCriteriaId": "D5EF09DB-023A-40CB-9C94-020172383EEC"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:samsung:android:12.0:smr-oct-2022-r1:*:*:*:*:*:*",
"matchCriteriaId": "89BE2958-0BEE-4CFD-A0BA-494DE62E7F32"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:samsung:android:12.0:smr-oct-2023-r1:*:*:*:*:*:*",
"matchCriteriaId": "5C5B44E9-BA5B-4CFB-8452-B52B6CC833F5"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:samsung:android:12.0:smr-sep-2022-r1:*:*:*:*:*:*",
"matchCriteriaId": "B0329C50-B904-480D-8EBB-F2757049FC81"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:samsung:android:12.0:smr-sep-2023-r1:*:*:*:*:*:*",
"matchCriteriaId": "E1553CEA-FCF4-4A9C-85FE-F7DB7A500443"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:samsung:android:13.0:-:*:*:*:*:*:*",
"matchCriteriaId": "A123EDB1-3048-44B0-8D4D-39A2B24B5F6B"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:samsung:android:13.0:smr-apr-2023-r1:*:*:*:*:*:*",
"matchCriteriaId": "70825981-F895-4BFD-9B6E-92BFF0D67023"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:samsung:android:13.0:smr-apr-2024-r1:*:*:*:*:*:*",
"matchCriteriaId": "A5E68B7B-BA08-4E8C-B60A-B3836C6986BC"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:samsung:android:13.0:smr-aug-2023-r1:*:*:*:*:*:*",
"matchCriteriaId": "88DC0A82-CAF3-4E88-8A4D-8AF79D0C226D"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:samsung:android:13.0:smr-dec-2022-r1:*:*:*:*:*:*",
"matchCriteriaId": "299284DA-85AB-4162-B858-E67E5C6C14F7"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:samsung:android:13.0:smr-dec-2023-r1:*:*:*:*:*:*",
"matchCriteriaId": "38B7AB56-AB65-4557-A91C-40CA2FD12351"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:samsung:android:13.0:smr-feb-2023-r1:*:*:*:*:*:*",
"matchCriteriaId": "D98F307E-3B01-4C17-86E5-1C6299919417"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:samsung:android:13.0:smr-feb-2024-r1:*:*:*:*:*:*",
"matchCriteriaId": "952CA843-7CF0-4424-BDA4-3F2A93E077B6"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:samsung:android:13.0:smr-jan-2023-r1:*:*:*:*:*:*",
"matchCriteriaId": "7D7DA96D-9C25-4DDA-A6BF-D998AC346B89"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:samsung:android:13.0:smr-jan-2024-r1:*:*:*:*:*:*",
"matchCriteriaId": "07AC19C6-D245-4C3A-90CC-A931A901EA0A"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:samsung:android:13.0:smr-jul-2023-r1:*:*:*:*:*:*",
"matchCriteriaId": "34114DDC-DCDA-4306-8D23-2E628873171F"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:samsung:android:13.0:smr-jun-2023-r1:*:*:*:*:*:*",
"matchCriteriaId": "85E4E8C1-749F-4A1C-8333-6BAFBF8B64D1"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:samsung:android:13.0:smr-jun-2024-r1:*:*:*:*:*:*",
"matchCriteriaId": "E346DCBD-7DEB-464F-B917-8624BE87D646"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:samsung:android:13.0:smr-mar-2023-r1:*:*:*:*:*:*",
"matchCriteriaId": "5F73D594-178F-4FC8-9F40-0E545E2647B0"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:samsung:android:13.0:smr-mar-2024-r1:*:*:*:*:*:*",
"matchCriteriaId": "5697984D-08BA-412F-9BDF-26B658B0ADBC"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:samsung:android:13.0:smr-may-2023-r1:*:*:*:*:*:*",
"matchCriteriaId": "3F3EF3F1-4E54-46E3-A308-69656A29FBD2"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:samsung:android:13.0:smr-may-2024-r1:*:*:*:*:*:*",
"matchCriteriaId": "73F22C26-52FC-42A7-B263-0CC7770A8C6A"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:samsung:android:13.0:smr-nov-2022-r1:*:*:*:*:*:*",
"matchCriteriaId": "D2B24866-2B3A-4A1A-8B75-EF7A7541797A"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:samsung:android:13.0:smr-nov-2023-r1:*:*:*:*:*:*",
"matchCriteriaId": "3D30C02C-91FB-4D29-AF49-7903158E8FEB"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:samsung:android:13.0:smr-oct-2022-r1:*:*:*:*:*:*",
"matchCriteriaId": "EBB29F18-A929-432B-B20C-365401E6CA12"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:samsung:android:13.0:smr-oct-2023-r1:*:*:*:*:*:*",
"matchCriteriaId": "2B6D9064-844B-4D3F-AAE4-D170DF45EF8D"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:samsung:android:13.0:smr-sep-2023-r1:*:*:*:*:*:*",
"matchCriteriaId": "C581B7EE-CD08-4D6E-8858-EA8FA631F84C"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:samsung:android:14.0:-:*:*:*:*:*:*",
"matchCriteriaId": "3093F6FE-C562-4F62-97B7-CA0D2DDF9BBE"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:samsung:android:14.0:smr-apr-2023-r1:*:*:*:*:*:*",
"matchCriteriaId": "DAB2A0D7-8F4F-4128-AE09-D2658D793BF7"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:samsung:android:14.0:smr-apr-2024-r1:*:*:*:*:*:*",
"matchCriteriaId": "6A89AE5B-4D1A-4ADA-B572-38B1FC4ED54C"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:samsung:android:14.0:smr-aug-2023-r1:*:*:*:*:*:*",
"matchCriteriaId": "CC6E2FC7-2BAF-4C7B-9E0F-D9F844041A35"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:samsung:android:14.0:smr-dec-2022-r1:*:*:*:*:*:*",
"matchCriteriaId": "2A901EFE-90BA-474C-88D2-8A3E7D99C0E7"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:samsung:android:14.0:smr-dec-2023-r1:*:*:*:*:*:*",
"matchCriteriaId": "DF7B3213-520A-49F0-A183-C73A37A56854"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:samsung:android:14.0:smr-feb-2023-r1:*:*:*:*:*:*",
"matchCriteriaId": "FD8B9CD3-063E-481E-BE7C-1628ADA71849"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:samsung:android:14.0:smr-jan-2023-r1:*:*:*:*:*:*",
"matchCriteriaId": "9CE09EF7-B024-4D79-9400-C8223CDFBB86"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:samsung:android:14.0:smr-jan-2024-r1:*:*:*:*:*:*",
"matchCriteriaId": "C339A665-413D-443F-AD04-F71C161235D0"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:samsung:android:14.0:smr-jul-2023-r1:*:*:*:*:*:*",
"matchCriteriaId": "3DD61EDA-98ED-4309-B54F-0CF8B7D07DC7"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:samsung:android:14.0:smr-jun-2023-r1:*:*:*:*:*:*",
"matchCriteriaId": "4ECB0B7A-590C-460C-878B-9A78CB37D259"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:samsung:android:14.0:smr-jun-2024-r1:*:*:*:*:*:*",
"matchCriteriaId": "D66CF415-6C4A-4AF3-B660-B2E9CF484B51"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:samsung:android:14.0:smr-mar-2023-r1:*:*:*:*:*:*",
"matchCriteriaId": "EAFE015F-8130-4F10-A553-420F0BB2A132"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:samsung:android:14.0:smr-mar-2024-r1:*:*:*:*:*:*",
"matchCriteriaId": "141E541B-8FA5-4829-A413-4F1DC19E9AE1"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:samsung:android:14.0:smr-may-2023-r1:*:*:*:*:*:*",
"matchCriteriaId": "ACEA385E-3931-4438-A2A9-0357651F9B48"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:samsung:android:14.0:smr-may-2024-r1:*:*:*:*:*:*",
"matchCriteriaId": "A57CB118-46CC-4CE8-ACC3-A806CD2C25A9"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:samsung:android:14.0:smr-nov-2022-r1:*:*:*:*:*:*",
"matchCriteriaId": "6DD1F78D-EA98-4825-A0EA-703196DDE5E4"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:samsung:android:14.0:smr-nov-2023-r1:*:*:*:*:*:*",
"matchCriteriaId": "BDDB3FBE-99EC-4763-961B-2C436D864A1A"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:samsung:android:14.0:smr-oct-2022-r1:*:*:*:*:*:*",
"matchCriteriaId": "1B02110E-71FB-495F-86CA-F2A4E55C0E42"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:samsung:android:14.0:smr-oct-2023-r1:*:*:*:*:*:*",
"matchCriteriaId": "931CC6D7-A42D-4482-B901-B539DFF89C3E"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:samsung:android:14.0:smr-sep-2023-r1:*:*:*:*:*:*",
"matchCriteriaId": "84ED2366-D4BA-4094-94AC-AD6E7AEBB6FF"
}
]
}
]
}
],
"references": [
{
"url": "https://security.samsungmobile.com/securityUpdate.smsb?year=2024&month=07",
"source": "mobile.security@samsung.com"
"source": "mobile.security@samsung.com",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-34594",
"sourceIdentifier": "mobile.security@samsung.com",
"published": "2024-07-02T10:15:07.983",
"lastModified": "2024-07-02T12:09:16.907",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2024-07-02T18:01:18.317",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -17,6 +17,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5.5,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6
},
{
"source": "mobile.security@samsung.com",
"type": "Secondary",
@ -39,10 +59,417 @@
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:samsung:android:12.0:-:*:*:*:*:*:*",
"matchCriteriaId": "D757450C-270E-4FB2-A50C-7F769FED558A"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:samsung:android:12.0:smr-apr-2022-r1:*:*:*:*:*:*",
"matchCriteriaId": "EC4A2EBA-038B-44D5-84F3-FF326CD1C62D"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:samsung:android:12.0:smr-apr-2023-r1:*:*:*:*:*:*",
"matchCriteriaId": "40EB3FC1-D79A-40C7-9E2B-573E20780982"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:samsung:android:12.0:smr-apr-2024-r1:*:*:*:*:*:*",
"matchCriteriaId": "F1525232-54F0-467F-9575-2445F73F43B5"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:samsung:android:12.0:smr-aug-2022-r1:*:*:*:*:*:*",
"matchCriteriaId": "0ABFBBDB-E935-4C54-865A-0E607497DA87"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:samsung:android:12.0:smr-aug-2023-r1:*:*:*:*:*:*",
"matchCriteriaId": "7B738B6B-78CE-4618-B70D-6BC9ED453105"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:samsung:android:12.0:smr-dec-2021-r1:*:*:*:*:*:*",
"matchCriteriaId": "3899E3E7-1284-4223-A258-DA691F5D62FE"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:samsung:android:12.0:smr-dec-2022-r1:*:*:*:*:*:*",
"matchCriteriaId": "ECD961EA-6881-4A14-83DE-C6972F6F681C"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:samsung:android:12.0:smr-dec-2023-r1:*:*:*:*:*:*",
"matchCriteriaId": "18940389-1FBD-48B2-BCF0-1D709C2C3045"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:samsung:android:12.0:smr-feb-2022-r1:*:*:*:*:*:*",
"matchCriteriaId": "011CC4F5-6701-41E9-BC7D-CFE6EFF682AC"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:samsung:android:12.0:smr-feb-2023-r1:*:*:*:*:*:*",
"matchCriteriaId": "13E145E2-CE11-4EE5-9085-B4960FE4F52F"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:samsung:android:12.0:smr-feb-2024-r1:*:*:*:*:*:*",
"matchCriteriaId": "B3556856-6F56-465C-8254-BB3CD8252FF7"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:samsung:android:12.0:smr-jan-2022-r1:*:*:*:*:*:*",
"matchCriteriaId": "A3BBC8B6-1D2B-47C9-93EE-3D3DC43062F1"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:samsung:android:12.0:smr-jan-2023-r1:*:*:*:*:*:*",
"matchCriteriaId": "02600CDD-6862-4146-88E8-A2E73B7ED534"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:samsung:android:12.0:smr-jan-2024-r1:*:*:*:*:*:*",
"matchCriteriaId": "2DB353A1-BE96-4FB5-9F4D-0119DC51F24E"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:samsung:android:12.0:smr-jul-2022-r1:*:*:*:*:*:*",
"matchCriteriaId": "35F40D59-034B-44FB-8DCD-D469B50DE7E1"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:samsung:android:12.0:smr-jul-2023-r1:*:*:*:*:*:*",
"matchCriteriaId": "CC84021B-9846-40FB-834B-7C5BECEFFEAC"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:samsung:android:12.0:smr-jun-2022-r1:*:*:*:*:*:*",
"matchCriteriaId": "BC3F8572-578B-4D19-9453-1D03DA55EF70"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:samsung:android:12.0:smr-jun-2023-r1:*:*:*:*:*:*",
"matchCriteriaId": "EEABF42E-578E-4689-B80D-B305467AA72D"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:samsung:android:12.0:smr-jun-2024-r1:*:*:*:*:*:*",
"matchCriteriaId": "E070DA79-8F09-4877-BFBA-3F23564DD8C8"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:samsung:android:12.0:smr-mar-2022-r1:*:*:*:*:*:*",
"matchCriteriaId": "9137C66C-4966-4C90-ABE9-7E22F7E29BA7"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:samsung:android:12.0:smr-mar-2023-r1:*:*:*:*:*:*",
"matchCriteriaId": "E261C9D8-1E74-44B8-9F11-F5769CF8B7FD"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:samsung:android:12.0:smr-mar-2024-r1:*:*:*:*:*:*",
"matchCriteriaId": "D80C2C7A-6F48-48B8-ACAD-720FC797F836"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:samsung:android:12.0:smr-may-2022-r1:*:*:*:*:*:*",
"matchCriteriaId": "18CD523B-530E-4187-8BFF-729CDAC69282"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:samsung:android:12.0:smr-may-2023-r1:*:*:*:*:*:*",
"matchCriteriaId": "4C28D3CD-DD34-4334-B03F-794B31A4BF48"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:samsung:android:12.0:smr-may-2024-r1:*:*:*:*:*:*",
"matchCriteriaId": "EE03013A-AAB3-4426-BB22-E1487D3B3F6C"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:samsung:android:12.0:smr-nov-2021-r1:*:*:*:*:*:*",
"matchCriteriaId": "5A81C86D-F1FE-4166-8F37-D7170E6B30FE"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:samsung:android:12.0:smr-nov-2022-r1:*:*:*:*:*:*",
"matchCriteriaId": "A3D80783-523A-455E-B1AD-0961086F79E6"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:samsung:android:12.0:smr-nov-2023-r1:*:*:*:*:*:*",
"matchCriteriaId": "D5EF09DB-023A-40CB-9C94-020172383EEC"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:samsung:android:12.0:smr-oct-2022-r1:*:*:*:*:*:*",
"matchCriteriaId": "89BE2958-0BEE-4CFD-A0BA-494DE62E7F32"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:samsung:android:12.0:smr-oct-2023-r1:*:*:*:*:*:*",
"matchCriteriaId": "5C5B44E9-BA5B-4CFB-8452-B52B6CC833F5"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:samsung:android:12.0:smr-sep-2022-r1:*:*:*:*:*:*",
"matchCriteriaId": "B0329C50-B904-480D-8EBB-F2757049FC81"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:samsung:android:12.0:smr-sep-2023-r1:*:*:*:*:*:*",
"matchCriteriaId": "E1553CEA-FCF4-4A9C-85FE-F7DB7A500443"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:samsung:android:13.0:-:*:*:*:*:*:*",
"matchCriteriaId": "A123EDB1-3048-44B0-8D4D-39A2B24B5F6B"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:samsung:android:13.0:smr-apr-2023-r1:*:*:*:*:*:*",
"matchCriteriaId": "70825981-F895-4BFD-9B6E-92BFF0D67023"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:samsung:android:13.0:smr-apr-2024-r1:*:*:*:*:*:*",
"matchCriteriaId": "A5E68B7B-BA08-4E8C-B60A-B3836C6986BC"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:samsung:android:13.0:smr-aug-2023-r1:*:*:*:*:*:*",
"matchCriteriaId": "88DC0A82-CAF3-4E88-8A4D-8AF79D0C226D"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:samsung:android:13.0:smr-dec-2022-r1:*:*:*:*:*:*",
"matchCriteriaId": "299284DA-85AB-4162-B858-E67E5C6C14F7"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:samsung:android:13.0:smr-dec-2023-r1:*:*:*:*:*:*",
"matchCriteriaId": "38B7AB56-AB65-4557-A91C-40CA2FD12351"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:samsung:android:13.0:smr-feb-2023-r1:*:*:*:*:*:*",
"matchCriteriaId": "D98F307E-3B01-4C17-86E5-1C6299919417"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:samsung:android:13.0:smr-feb-2024-r1:*:*:*:*:*:*",
"matchCriteriaId": "952CA843-7CF0-4424-BDA4-3F2A93E077B6"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:samsung:android:13.0:smr-jan-2023-r1:*:*:*:*:*:*",
"matchCriteriaId": "7D7DA96D-9C25-4DDA-A6BF-D998AC346B89"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:samsung:android:13.0:smr-jan-2024-r1:*:*:*:*:*:*",
"matchCriteriaId": "07AC19C6-D245-4C3A-90CC-A931A901EA0A"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:samsung:android:13.0:smr-jul-2023-r1:*:*:*:*:*:*",
"matchCriteriaId": "34114DDC-DCDA-4306-8D23-2E628873171F"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:samsung:android:13.0:smr-jun-2023-r1:*:*:*:*:*:*",
"matchCriteriaId": "85E4E8C1-749F-4A1C-8333-6BAFBF8B64D1"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:samsung:android:13.0:smr-jun-2024-r1:*:*:*:*:*:*",
"matchCriteriaId": "E346DCBD-7DEB-464F-B917-8624BE87D646"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:samsung:android:13.0:smr-mar-2023-r1:*:*:*:*:*:*",
"matchCriteriaId": "5F73D594-178F-4FC8-9F40-0E545E2647B0"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:samsung:android:13.0:smr-mar-2024-r1:*:*:*:*:*:*",
"matchCriteriaId": "5697984D-08BA-412F-9BDF-26B658B0ADBC"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:samsung:android:13.0:smr-may-2023-r1:*:*:*:*:*:*",
"matchCriteriaId": "3F3EF3F1-4E54-46E3-A308-69656A29FBD2"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:samsung:android:13.0:smr-may-2024-r1:*:*:*:*:*:*",
"matchCriteriaId": "73F22C26-52FC-42A7-B263-0CC7770A8C6A"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:samsung:android:13.0:smr-nov-2022-r1:*:*:*:*:*:*",
"matchCriteriaId": "D2B24866-2B3A-4A1A-8B75-EF7A7541797A"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:samsung:android:13.0:smr-nov-2023-r1:*:*:*:*:*:*",
"matchCriteriaId": "3D30C02C-91FB-4D29-AF49-7903158E8FEB"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:samsung:android:13.0:smr-oct-2022-r1:*:*:*:*:*:*",
"matchCriteriaId": "EBB29F18-A929-432B-B20C-365401E6CA12"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:samsung:android:13.0:smr-oct-2023-r1:*:*:*:*:*:*",
"matchCriteriaId": "2B6D9064-844B-4D3F-AAE4-D170DF45EF8D"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:samsung:android:13.0:smr-sep-2023-r1:*:*:*:*:*:*",
"matchCriteriaId": "C581B7EE-CD08-4D6E-8858-EA8FA631F84C"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:samsung:android:14.0:-:*:*:*:*:*:*",
"matchCriteriaId": "3093F6FE-C562-4F62-97B7-CA0D2DDF9BBE"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:samsung:android:14.0:smr-apr-2023-r1:*:*:*:*:*:*",
"matchCriteriaId": "DAB2A0D7-8F4F-4128-AE09-D2658D793BF7"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:samsung:android:14.0:smr-apr-2024-r1:*:*:*:*:*:*",
"matchCriteriaId": "6A89AE5B-4D1A-4ADA-B572-38B1FC4ED54C"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:samsung:android:14.0:smr-aug-2023-r1:*:*:*:*:*:*",
"matchCriteriaId": "CC6E2FC7-2BAF-4C7B-9E0F-D9F844041A35"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:samsung:android:14.0:smr-dec-2022-r1:*:*:*:*:*:*",
"matchCriteriaId": "2A901EFE-90BA-474C-88D2-8A3E7D99C0E7"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:samsung:android:14.0:smr-dec-2023-r1:*:*:*:*:*:*",
"matchCriteriaId": "DF7B3213-520A-49F0-A183-C73A37A56854"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:samsung:android:14.0:smr-feb-2023-r1:*:*:*:*:*:*",
"matchCriteriaId": "FD8B9CD3-063E-481E-BE7C-1628ADA71849"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:samsung:android:14.0:smr-jan-2023-r1:*:*:*:*:*:*",
"matchCriteriaId": "9CE09EF7-B024-4D79-9400-C8223CDFBB86"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:samsung:android:14.0:smr-jan-2024-r1:*:*:*:*:*:*",
"matchCriteriaId": "C339A665-413D-443F-AD04-F71C161235D0"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:samsung:android:14.0:smr-jul-2023-r1:*:*:*:*:*:*",
"matchCriteriaId": "3DD61EDA-98ED-4309-B54F-0CF8B7D07DC7"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:samsung:android:14.0:smr-jun-2023-r1:*:*:*:*:*:*",
"matchCriteriaId": "4ECB0B7A-590C-460C-878B-9A78CB37D259"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:samsung:android:14.0:smr-jun-2024-r1:*:*:*:*:*:*",
"matchCriteriaId": "D66CF415-6C4A-4AF3-B660-B2E9CF484B51"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:samsung:android:14.0:smr-mar-2023-r1:*:*:*:*:*:*",
"matchCriteriaId": "EAFE015F-8130-4F10-A553-420F0BB2A132"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:samsung:android:14.0:smr-mar-2024-r1:*:*:*:*:*:*",
"matchCriteriaId": "141E541B-8FA5-4829-A413-4F1DC19E9AE1"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:samsung:android:14.0:smr-may-2023-r1:*:*:*:*:*:*",
"matchCriteriaId": "ACEA385E-3931-4438-A2A9-0357651F9B48"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:samsung:android:14.0:smr-may-2024-r1:*:*:*:*:*:*",
"matchCriteriaId": "A57CB118-46CC-4CE8-ACC3-A806CD2C25A9"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:samsung:android:14.0:smr-nov-2022-r1:*:*:*:*:*:*",
"matchCriteriaId": "6DD1F78D-EA98-4825-A0EA-703196DDE5E4"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:samsung:android:14.0:smr-nov-2023-r1:*:*:*:*:*:*",
"matchCriteriaId": "BDDB3FBE-99EC-4763-961B-2C436D864A1A"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:samsung:android:14.0:smr-oct-2022-r1:*:*:*:*:*:*",
"matchCriteriaId": "1B02110E-71FB-495F-86CA-F2A4E55C0E42"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:samsung:android:14.0:smr-oct-2023-r1:*:*:*:*:*:*",
"matchCriteriaId": "931CC6D7-A42D-4482-B901-B539DFF89C3E"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:samsung:android:14.0:smr-sep-2023-r1:*:*:*:*:*:*",
"matchCriteriaId": "84ED2366-D4BA-4094-94AC-AD6E7AEBB6FF"
}
]
}
]
}
],
"references": [
{
"url": "https://security.samsungmobile.com/securityUpdate.smsb?year=2024&month=07",
"source": "mobile.security@samsung.com"
"source": "mobile.security@samsung.com",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-34595",
"sourceIdentifier": "mobile.security@samsung.com",
"published": "2024-07-02T10:15:08.150",
"lastModified": "2024-07-02T12:09:16.907",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2024-07-02T18:01:45.897",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -17,6 +17,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
},
{
"source": "mobile.security@samsung.com",
"type": "Secondary",
@ -39,10 +59,417 @@
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-Other"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:samsung:android:12.0:-:*:*:*:*:*:*",
"matchCriteriaId": "D757450C-270E-4FB2-A50C-7F769FED558A"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:samsung:android:12.0:smr-apr-2022-r1:*:*:*:*:*:*",
"matchCriteriaId": "EC4A2EBA-038B-44D5-84F3-FF326CD1C62D"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:samsung:android:12.0:smr-apr-2023-r1:*:*:*:*:*:*",
"matchCriteriaId": "40EB3FC1-D79A-40C7-9E2B-573E20780982"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:samsung:android:12.0:smr-apr-2024-r1:*:*:*:*:*:*",
"matchCriteriaId": "F1525232-54F0-467F-9575-2445F73F43B5"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:samsung:android:12.0:smr-aug-2022-r1:*:*:*:*:*:*",
"matchCriteriaId": "0ABFBBDB-E935-4C54-865A-0E607497DA87"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:samsung:android:12.0:smr-aug-2023-r1:*:*:*:*:*:*",
"matchCriteriaId": "7B738B6B-78CE-4618-B70D-6BC9ED453105"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:samsung:android:12.0:smr-dec-2021-r1:*:*:*:*:*:*",
"matchCriteriaId": "3899E3E7-1284-4223-A258-DA691F5D62FE"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:samsung:android:12.0:smr-dec-2022-r1:*:*:*:*:*:*",
"matchCriteriaId": "ECD961EA-6881-4A14-83DE-C6972F6F681C"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:samsung:android:12.0:smr-dec-2023-r1:*:*:*:*:*:*",
"matchCriteriaId": "18940389-1FBD-48B2-BCF0-1D709C2C3045"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:samsung:android:12.0:smr-feb-2022-r1:*:*:*:*:*:*",
"matchCriteriaId": "011CC4F5-6701-41E9-BC7D-CFE6EFF682AC"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:samsung:android:12.0:smr-feb-2023-r1:*:*:*:*:*:*",
"matchCriteriaId": "13E145E2-CE11-4EE5-9085-B4960FE4F52F"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:samsung:android:12.0:smr-feb-2024-r1:*:*:*:*:*:*",
"matchCriteriaId": "B3556856-6F56-465C-8254-BB3CD8252FF7"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:samsung:android:12.0:smr-jan-2022-r1:*:*:*:*:*:*",
"matchCriteriaId": "A3BBC8B6-1D2B-47C9-93EE-3D3DC43062F1"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:samsung:android:12.0:smr-jan-2023-r1:*:*:*:*:*:*",
"matchCriteriaId": "02600CDD-6862-4146-88E8-A2E73B7ED534"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:samsung:android:12.0:smr-jan-2024-r1:*:*:*:*:*:*",
"matchCriteriaId": "2DB353A1-BE96-4FB5-9F4D-0119DC51F24E"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:samsung:android:12.0:smr-jul-2022-r1:*:*:*:*:*:*",
"matchCriteriaId": "35F40D59-034B-44FB-8DCD-D469B50DE7E1"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:samsung:android:12.0:smr-jul-2023-r1:*:*:*:*:*:*",
"matchCriteriaId": "CC84021B-9846-40FB-834B-7C5BECEFFEAC"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:samsung:android:12.0:smr-jun-2022-r1:*:*:*:*:*:*",
"matchCriteriaId": "BC3F8572-578B-4D19-9453-1D03DA55EF70"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:samsung:android:12.0:smr-jun-2023-r1:*:*:*:*:*:*",
"matchCriteriaId": "EEABF42E-578E-4689-B80D-B305467AA72D"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:samsung:android:12.0:smr-jun-2024-r1:*:*:*:*:*:*",
"matchCriteriaId": "E070DA79-8F09-4877-BFBA-3F23564DD8C8"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:samsung:android:12.0:smr-mar-2022-r1:*:*:*:*:*:*",
"matchCriteriaId": "9137C66C-4966-4C90-ABE9-7E22F7E29BA7"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:samsung:android:12.0:smr-mar-2023-r1:*:*:*:*:*:*",
"matchCriteriaId": "E261C9D8-1E74-44B8-9F11-F5769CF8B7FD"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:samsung:android:12.0:smr-mar-2024-r1:*:*:*:*:*:*",
"matchCriteriaId": "D80C2C7A-6F48-48B8-ACAD-720FC797F836"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:samsung:android:12.0:smr-may-2022-r1:*:*:*:*:*:*",
"matchCriteriaId": "18CD523B-530E-4187-8BFF-729CDAC69282"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:samsung:android:12.0:smr-may-2023-r1:*:*:*:*:*:*",
"matchCriteriaId": "4C28D3CD-DD34-4334-B03F-794B31A4BF48"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:samsung:android:12.0:smr-may-2024-r1:*:*:*:*:*:*",
"matchCriteriaId": "EE03013A-AAB3-4426-BB22-E1487D3B3F6C"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:samsung:android:12.0:smr-nov-2021-r1:*:*:*:*:*:*",
"matchCriteriaId": "5A81C86D-F1FE-4166-8F37-D7170E6B30FE"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:samsung:android:12.0:smr-nov-2022-r1:*:*:*:*:*:*",
"matchCriteriaId": "A3D80783-523A-455E-B1AD-0961086F79E6"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:samsung:android:12.0:smr-nov-2023-r1:*:*:*:*:*:*",
"matchCriteriaId": "D5EF09DB-023A-40CB-9C94-020172383EEC"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:samsung:android:12.0:smr-oct-2022-r1:*:*:*:*:*:*",
"matchCriteriaId": "89BE2958-0BEE-4CFD-A0BA-494DE62E7F32"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:samsung:android:12.0:smr-oct-2023-r1:*:*:*:*:*:*",
"matchCriteriaId": "5C5B44E9-BA5B-4CFB-8452-B52B6CC833F5"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:samsung:android:12.0:smr-sep-2022-r1:*:*:*:*:*:*",
"matchCriteriaId": "B0329C50-B904-480D-8EBB-F2757049FC81"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:samsung:android:12.0:smr-sep-2023-r1:*:*:*:*:*:*",
"matchCriteriaId": "E1553CEA-FCF4-4A9C-85FE-F7DB7A500443"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:samsung:android:13.0:-:*:*:*:*:*:*",
"matchCriteriaId": "A123EDB1-3048-44B0-8D4D-39A2B24B5F6B"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:samsung:android:13.0:smr-apr-2023-r1:*:*:*:*:*:*",
"matchCriteriaId": "70825981-F895-4BFD-9B6E-92BFF0D67023"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:samsung:android:13.0:smr-apr-2024-r1:*:*:*:*:*:*",
"matchCriteriaId": "A5E68B7B-BA08-4E8C-B60A-B3836C6986BC"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:samsung:android:13.0:smr-aug-2023-r1:*:*:*:*:*:*",
"matchCriteriaId": "88DC0A82-CAF3-4E88-8A4D-8AF79D0C226D"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:samsung:android:13.0:smr-dec-2022-r1:*:*:*:*:*:*",
"matchCriteriaId": "299284DA-85AB-4162-B858-E67E5C6C14F7"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:samsung:android:13.0:smr-dec-2023-r1:*:*:*:*:*:*",
"matchCriteriaId": "38B7AB56-AB65-4557-A91C-40CA2FD12351"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:samsung:android:13.0:smr-feb-2023-r1:*:*:*:*:*:*",
"matchCriteriaId": "D98F307E-3B01-4C17-86E5-1C6299919417"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:samsung:android:13.0:smr-feb-2024-r1:*:*:*:*:*:*",
"matchCriteriaId": "952CA843-7CF0-4424-BDA4-3F2A93E077B6"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:samsung:android:13.0:smr-jan-2023-r1:*:*:*:*:*:*",
"matchCriteriaId": "7D7DA96D-9C25-4DDA-A6BF-D998AC346B89"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:samsung:android:13.0:smr-jan-2024-r1:*:*:*:*:*:*",
"matchCriteriaId": "07AC19C6-D245-4C3A-90CC-A931A901EA0A"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:samsung:android:13.0:smr-jul-2023-r1:*:*:*:*:*:*",
"matchCriteriaId": "34114DDC-DCDA-4306-8D23-2E628873171F"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:samsung:android:13.0:smr-jun-2023-r1:*:*:*:*:*:*",
"matchCriteriaId": "85E4E8C1-749F-4A1C-8333-6BAFBF8B64D1"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:samsung:android:13.0:smr-jun-2024-r1:*:*:*:*:*:*",
"matchCriteriaId": "E346DCBD-7DEB-464F-B917-8624BE87D646"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:samsung:android:13.0:smr-mar-2023-r1:*:*:*:*:*:*",
"matchCriteriaId": "5F73D594-178F-4FC8-9F40-0E545E2647B0"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:samsung:android:13.0:smr-mar-2024-r1:*:*:*:*:*:*",
"matchCriteriaId": "5697984D-08BA-412F-9BDF-26B658B0ADBC"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:samsung:android:13.0:smr-may-2023-r1:*:*:*:*:*:*",
"matchCriteriaId": "3F3EF3F1-4E54-46E3-A308-69656A29FBD2"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:samsung:android:13.0:smr-may-2024-r1:*:*:*:*:*:*",
"matchCriteriaId": "73F22C26-52FC-42A7-B263-0CC7770A8C6A"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:samsung:android:13.0:smr-nov-2022-r1:*:*:*:*:*:*",
"matchCriteriaId": "D2B24866-2B3A-4A1A-8B75-EF7A7541797A"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:samsung:android:13.0:smr-nov-2023-r1:*:*:*:*:*:*",
"matchCriteriaId": "3D30C02C-91FB-4D29-AF49-7903158E8FEB"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:samsung:android:13.0:smr-oct-2022-r1:*:*:*:*:*:*",
"matchCriteriaId": "EBB29F18-A929-432B-B20C-365401E6CA12"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:samsung:android:13.0:smr-oct-2023-r1:*:*:*:*:*:*",
"matchCriteriaId": "2B6D9064-844B-4D3F-AAE4-D170DF45EF8D"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:samsung:android:13.0:smr-sep-2023-r1:*:*:*:*:*:*",
"matchCriteriaId": "C581B7EE-CD08-4D6E-8858-EA8FA631F84C"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:samsung:android:14.0:-:*:*:*:*:*:*",
"matchCriteriaId": "3093F6FE-C562-4F62-97B7-CA0D2DDF9BBE"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:samsung:android:14.0:smr-apr-2023-r1:*:*:*:*:*:*",
"matchCriteriaId": "DAB2A0D7-8F4F-4128-AE09-D2658D793BF7"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:samsung:android:14.0:smr-apr-2024-r1:*:*:*:*:*:*",
"matchCriteriaId": "6A89AE5B-4D1A-4ADA-B572-38B1FC4ED54C"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:samsung:android:14.0:smr-aug-2023-r1:*:*:*:*:*:*",
"matchCriteriaId": "CC6E2FC7-2BAF-4C7B-9E0F-D9F844041A35"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:samsung:android:14.0:smr-dec-2022-r1:*:*:*:*:*:*",
"matchCriteriaId": "2A901EFE-90BA-474C-88D2-8A3E7D99C0E7"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:samsung:android:14.0:smr-dec-2023-r1:*:*:*:*:*:*",
"matchCriteriaId": "DF7B3213-520A-49F0-A183-C73A37A56854"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:samsung:android:14.0:smr-feb-2023-r1:*:*:*:*:*:*",
"matchCriteriaId": "FD8B9CD3-063E-481E-BE7C-1628ADA71849"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:samsung:android:14.0:smr-jan-2023-r1:*:*:*:*:*:*",
"matchCriteriaId": "9CE09EF7-B024-4D79-9400-C8223CDFBB86"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:samsung:android:14.0:smr-jan-2024-r1:*:*:*:*:*:*",
"matchCriteriaId": "C339A665-413D-443F-AD04-F71C161235D0"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:samsung:android:14.0:smr-jul-2023-r1:*:*:*:*:*:*",
"matchCriteriaId": "3DD61EDA-98ED-4309-B54F-0CF8B7D07DC7"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:samsung:android:14.0:smr-jun-2023-r1:*:*:*:*:*:*",
"matchCriteriaId": "4ECB0B7A-590C-460C-878B-9A78CB37D259"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:samsung:android:14.0:smr-jun-2024-r1:*:*:*:*:*:*",
"matchCriteriaId": "D66CF415-6C4A-4AF3-B660-B2E9CF484B51"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:samsung:android:14.0:smr-mar-2023-r1:*:*:*:*:*:*",
"matchCriteriaId": "EAFE015F-8130-4F10-A553-420F0BB2A132"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:samsung:android:14.0:smr-mar-2024-r1:*:*:*:*:*:*",
"matchCriteriaId": "141E541B-8FA5-4829-A413-4F1DC19E9AE1"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:samsung:android:14.0:smr-may-2023-r1:*:*:*:*:*:*",
"matchCriteriaId": "ACEA385E-3931-4438-A2A9-0357651F9B48"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:samsung:android:14.0:smr-may-2024-r1:*:*:*:*:*:*",
"matchCriteriaId": "A57CB118-46CC-4CE8-ACC3-A806CD2C25A9"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:samsung:android:14.0:smr-nov-2022-r1:*:*:*:*:*:*",
"matchCriteriaId": "6DD1F78D-EA98-4825-A0EA-703196DDE5E4"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:samsung:android:14.0:smr-nov-2023-r1:*:*:*:*:*:*",
"matchCriteriaId": "BDDB3FBE-99EC-4763-961B-2C436D864A1A"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:samsung:android:14.0:smr-oct-2022-r1:*:*:*:*:*:*",
"matchCriteriaId": "1B02110E-71FB-495F-86CA-F2A4E55C0E42"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:samsung:android:14.0:smr-oct-2023-r1:*:*:*:*:*:*",
"matchCriteriaId": "931CC6D7-A42D-4482-B901-B539DFF89C3E"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:samsung:android:14.0:smr-sep-2023-r1:*:*:*:*:*:*",
"matchCriteriaId": "84ED2366-D4BA-4094-94AC-AD6E7AEBB6FF"
}
]
}
]
}
],
"references": [
{
"url": "https://security.samsungmobile.com/securityUpdate.smsb?year=2024&month=07",
"source": "mobile.security@samsung.com"
"source": "mobile.security@samsung.com",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-36404",
"sourceIdentifier": "security-advisories@github.com",
"published": "2024-07-02T14:15:13.450",
"lastModified": "2024-07-02T14:15:13.450",
"vulnStatus": "Received",
"lastModified": "2024-07-02T17:44:45.700",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-38366",
"sourceIdentifier": "security-advisories@github.com",
"published": "2024-07-01T21:15:03.797",
"lastModified": "2024-07-02T12:09:16.907",
"lastModified": "2024-07-02T17:15:05.180",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
@ -22,19 +22,19 @@
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "HIGH",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "CHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.0,
"baseScore": 10.0,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 2.2,
"exploitabilityScore": 3.9,
"impactScore": 6.0
}
]

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-38367",
"sourceIdentifier": "security-advisories@github.com",
"published": "2024-07-01T21:15:04.020",
"lastModified": "2024-07-02T12:09:16.907",
"lastModified": "2024-07-02T17:15:05.410",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
@ -22,20 +22,20 @@
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:N/I:H/A:H",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "HIGH",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "NONE",
"confidentialityImpact": "LOW",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.0,
"baseScore": 8.2,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 1.6,
"impactScore": 5.8
"impactScore": 6.0
}
]
},

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-38368",
"sourceIdentifier": "security-advisories@github.com",
"published": "2024-07-01T21:15:04.250",
"lastModified": "2024-07-02T12:09:16.907",
"lastModified": "2024-07-02T17:15:05.590",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
@ -22,20 +22,20 @@
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:L/A:L",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:H/A:L",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "CHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "LOW",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"availabilityImpact": "LOW",
"baseScore": 9.9,
"baseScore": 9.3,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.9,
"impactScore": 5.3
"impactScore": 4.7
}
]
},

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-38519",
"sourceIdentifier": "security-advisories@github.com",
"published": "2024-07-02T14:15:13.737",
"lastModified": "2024-07-02T14:15:13.737",
"vulnStatus": "Received",
"lastModified": "2024-07-02T17:44:45.700",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{

View File

@ -2,8 +2,9 @@
"id": "CVE-2024-38520",
"sourceIdentifier": "security-advisories@github.com",
"published": "2024-06-26T19:15:13.890",
"lastModified": "2024-06-27T12:47:19.847",
"lastModified": "2024-07-02T16:15:04.517",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
@ -21,7 +22,7 @@
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
@ -29,12 +30,12 @@
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH"
"availabilityImpact": "LOW",
"baseScore": 5.3,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
"impactScore": 1.4
}
]
},

View File

@ -0,0 +1,78 @@
{
"id": "CVE-2024-3826",
"sourceIdentifier": "security@puppet.com",
"published": "2024-07-02T16:15:05.230",
"lastModified": "2024-07-02T17:44:45.700",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "In versions of Akana in versions prior to and including 2022.1.3 validation is broken when using the SAML Single Sign-On (SSO) functionality."
}
],
"metrics": {
"cvssMetricV40": [
{
"source": "security@puppet.com",
"type": "Secondary",
"cvssData": {
"version": "4.0",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"vulnerableSystemConfidentiality": "HIGH",
"vulnerableSystemIntegrity": "HIGH",
"vulnerableSystemAvailability": "NONE",
"subsequentSystemConfidentiality": "NONE",
"subsequentSystemIntegrity": "NONE",
"subsequentSystemAvailability": "NONE",
"exploitMaturity": "NOT_DEFINED",
"confidentialityRequirements": "NOT_DEFINED",
"integrityRequirements": "NOT_DEFINED",
"availabilityRequirements": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnerableSystemConfidentiality": "NOT_DEFINED",
"modifiedVulnerableSystemIntegrity": "NOT_DEFINED",
"modifiedVulnerableSystemAvailability": "NOT_DEFINED",
"modifiedSubsequentSystemConfidentiality": "NOT_DEFINED",
"modifiedSubsequentSystemIntegrity": "NOT_DEFINED",
"modifiedSubsequentSystemAvailability": "NOT_DEFINED",
"safety": "NOT_DEFINED",
"automatable": "NOT_DEFINED",
"recovery": "NOT_DEFINED",
"valueDensity": "NOT_DEFINED",
"vulnerabilityResponseEffort": "NOT_DEFINED",
"providerUrgency": "NOT_DEFINED",
"baseScore": 8.6,
"baseSeverity": "HIGH"
}
}
]
},
"weaknesses": [
{
"source": "security@puppet.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-287"
}
]
}
],
"references": [
{
"url": "https://portal.perforce.com/s/detail/a91PA000001SUAfYAO",
"source": "security@puppet.com"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-39119",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-07-02T13:15:10.850",
"lastModified": "2024-07-02T13:15:10.850",
"vulnStatus": "Received",
"lastModified": "2024-07-02T17:44:45.700",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-39143",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-07-02T14:15:13.990",
"lastModified": "2024-07-02T14:15:13.990",
"vulnStatus": "Received",
"lastModified": "2024-07-02T17:44:45.700",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{

View File

@ -0,0 +1,64 @@
{
"id": "CVE-2024-39316",
"sourceIdentifier": "security-advisories@github.com",
"published": "2024-07-02T16:15:04.753",
"lastModified": "2024-07-02T17:44:45.700",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Rack is a modular Ruby web server interface. Starting in version 3.1.0 and prior to version 3.1.5, Regular Expression Denial of Service (ReDoS) vulnerability exists in the `Rack::Request::Helpers` module when parsing HTTP Accept headers. This vulnerability can be exploited by an attacker sending specially crafted `Accept-Encoding` or `Accept-Language` headers, causing the server to spend excessive time processing the request and leading to a Denial of Service (DoS). The fix for CVE-2024-26146 was not applied to the main branch and thus while the issue was fixed for the Rack v3.0 release series, it was not fixed in the v3.1 release series until v3.1.5. Users of versions on the 3.1 branch should upgrade to version 3.1.5 to receive the fix."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security-advisories@github.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH",
"baseScore": 6.5,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "security-advisories@github.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-1333"
}
]
}
],
"references": [
{
"url": "https://github.com/rack/rack/commit/412c980450ca729ee37f90a2661f166a9665e058",
"source": "security-advisories@github.com"
},
{
"url": "https://github.com/rack/rack/security/advisories/GHSA-54rr-7fvw-6x8f",
"source": "security-advisories@github.com"
},
{
"url": "https://github.com/rack/rack/security/advisories/GHSA-cj83-2ww7-mvq7",
"source": "security-advisories@github.com"
}
]
}

View File

@ -0,0 +1,72 @@
{
"id": "CVE-2024-39323",
"sourceIdentifier": "security-advisories@github.com",
"published": "2024-07-02T16:15:04.983",
"lastModified": "2024-07-02T17:44:45.700",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "aimeos/ai-admin-graphql is the Aimeos GraphQL API admin interface. Starting in version 2022.04.01 and prior to versions 2022.10.10, 2023.10.6, and 2024.04.6, an improper access control vulnerability allows an editor to modify and take over an admin account in the back end. Versions 2022.10.10, 2023.10.6, and 2024.04.6 fix this issue.\n"
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security-advisories@github.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:L",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"availabilityImpact": "LOW",
"baseScore": 7.1,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 4.2
}
]
},
"weaknesses": [
{
"source": "security-advisories@github.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-1220"
},
{
"lang": "en",
"value": "CWE-863"
}
]
}
],
"references": [
{
"url": "https://github.com/aimeos/ai-admin-graphql/commit/2d89d98cdcad880a9244b50736b08c1a171379ca",
"source": "security-advisories@github.com"
},
{
"url": "https://github.com/aimeos/ai-admin-graphql/commit/54d6b7cf4530cb3b95f52775c24056c48e6d26e9",
"source": "security-advisories@github.com"
},
{
"url": "https://github.com/aimeos/ai-admin-graphql/commit/787028de0a3ecbf3e9f63ab1454eac99ce7693a9",
"source": "security-advisories@github.com"
},
{
"url": "https://github.com/aimeos/ai-admin-graphql/security/advisories/GHSA-vc7j-99jw-jrqm",
"source": "security-advisories@github.com"
}
]
}

View File

@ -0,0 +1,60 @@
{
"id": "CVE-2024-4467",
"sourceIdentifier": "secalert@redhat.com",
"published": "2024-07-02T16:15:05.423",
"lastModified": "2024-07-02T17:44:45.700",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A flaw was found in the QEMU disk image utility (qemu-img) 'info' command. A specially crafted image file containing a `json:{}` value describing block devices in QMP could cause the qemu-img process on the host to consume large amounts of memory or CPU time, leading to denial of service or read/write to an existing external file."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "secalert@redhat.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "secalert@redhat.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-400"
}
]
}
],
"references": [
{
"url": "https://access.redhat.com/security/cve/CVE-2024-4467",
"source": "secalert@redhat.com"
},
{
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2278875",
"source": "secalert@redhat.com"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-4897",
"sourceIdentifier": "security@huntr.dev",
"published": "2024-07-02T15:15:11.853",
"lastModified": "2024-07-02T15:15:11.853",
"vulnStatus": "Received",
"lastModified": "2024-07-02T17:44:45.700",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2024-5865",
"sourceIdentifier": "vulnerability@kaspersky.com",
"published": "2024-07-02T16:15:05.667",
"lastModified": "2024-07-02T17:44:45.700",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Vulnerability in Delinea Centrify PAS v. 21.3 and possibly others. The application is prone to the path traversal vulnerability allowing arbitrary files reading outside the web publish directory. Versions 23.1-HF7 and on have the patch."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "vulnerability@kaspersky.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "CHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 7.7,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 3.1,
"impactScore": 4.0
}
]
},
"weaknesses": [
{
"source": "vulnerability@kaspersky.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-26"
}
]
}
],
"references": [
{
"url": "https://github.com/klsecservices/Advisories/blob/master/K-Delinea-2023-001.md",
"source": "vulnerability@kaspersky.com"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2024-5866",
"sourceIdentifier": "vulnerability@kaspersky.com",
"published": "2024-07-02T16:15:05.900",
"lastModified": "2024-07-02T17:44:45.700",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Vulnerability in Delinea Centrify PAS v. 21.3 and possibly others. The application is prone to the path traversal vulnerability allowing listing of arbitrary directory outside the root directory of the web application. Versions 23.1-HF7 and on have the patch."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "vulnerability@kaspersky.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5.0,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 3.1,
"impactScore": 1.4
}
]
},
"weaknesses": [
{
"source": "vulnerability@kaspersky.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-26"
}
]
}
],
"references": [
{
"url": "https://github.com/klsecservices/Advisories/blob/master/K-Delinea-2023-002.md",
"source": "vulnerability@kaspersky.com"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-6264",
"sourceIdentifier": "security@wordfence.com",
"published": "2024-07-02T11:15:10.840",
"lastModified": "2024-07-02T12:09:16.907",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2024-07-02T17:57:31.737",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -14,8 +14,28 @@
"metrics": {
"cvssMetricV31": [
{
"source": "security@wordfence.com",
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 5.4,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.3,
"impactScore": 2.7
},
{
"source": "security@wordfence.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N",
@ -35,26 +55,71 @@
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:wpexpertplugins:post_meta_data_manager:*:*:*:*:*:wordpress:*:*",
"versionEndExcluding": "1.3.0",
"matchCriteriaId": "BE5599F2-9109-4418-BF1F-19AF364A92B8"
}
]
}
]
}
],
"references": [
{
"url": "https://plugins.trac.wordpress.org/browser/post-meta-data-manager/trunk/includes/admin/html/pmdm_wp_display_post_metadata_html.php#L23",
"source": "security@wordfence.com"
"source": "security@wordfence.com",
"tags": [
"Product"
]
},
{
"url": "https://plugins.trac.wordpress.org/browser/post-meta-data-manager/trunk/includes/admin/html/pmdm_wp_display_term_metadata_html.php#L32",
"source": "security@wordfence.com"
"source": "security@wordfence.com",
"tags": [
"Product"
]
},
{
"url": "https://plugins.trac.wordpress.org/browser/post-meta-data-manager/trunk/includes/admin/html/pmdm_wp_display_user_metadata_html.php#L31",
"source": "security@wordfence.com"
"source": "security@wordfence.com",
"tags": [
"Product"
]
},
{
"url": "https://plugins.trac.wordpress.org/changeset/3109558/",
"source": "security@wordfence.com"
"source": "security@wordfence.com",
"tags": [
"Patch"
]
},
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/9dd6828b-6235-4284-bce6-be23b79ac70e?source=cve",
"source": "security@wordfence.com"
"source": "security@wordfence.com",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-6438",
"sourceIdentifier": "cna@vuldb.com",
"published": "2024-07-02T11:15:11.027",
"lastModified": "2024-07-02T12:09:16.907",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2024-07-02T17:54:02.370",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -57,6 +57,26 @@
}
],
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 3.6
},
{
"source": "cna@vuldb.com",
"type": "Secondary",
@ -116,22 +136,55 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:hitout:carsale:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "80E1087B-FD78-44F8-BDB9-6CA4FE559F91"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/Hitout/carsale/issues/23",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Issue Tracking"
]
},
{
"url": "https://vuldb.com/?ctiid.270166",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Permissions Required",
"VDB Entry"
]
},
{
"url": "https://vuldb.com/?id.270166",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "https://vuldb.com/?submit.366239",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-6439",
"sourceIdentifier": "cna@vuldb.com",
"published": "2024-07-02T11:15:11.523",
"lastModified": "2024-07-02T12:09:16.907",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2024-07-02T17:58:39.773",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -57,6 +57,26 @@
}
],
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
},
{
"source": "cna@vuldb.com",
"type": "Secondary",
@ -116,22 +136,54 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:home_owners_collection_management_system_project:home_owners_collection_management_system:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "FDB75A84-7EE7-4D4A-9B5F-77365D793307"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/GAO-UNO/cve/blob/main/upload.md",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Exploit"
]
},
{
"url": "https://vuldb.com/?ctiid.270167",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Permissions Required",
"VDB Entry"
]
},
{
"url": "https://vuldb.com/?id.270167",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "https://vuldb.com/?submit.366753",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-6440",
"sourceIdentifier": "cna@vuldb.com",
"published": "2024-07-02T11:15:11.783",
"lastModified": "2024-07-02T12:09:16.907",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2024-07-02T17:58:15.410",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -57,6 +57,26 @@
}
],
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
},
{
"source": "cna@vuldb.com",
"type": "Secondary",
@ -116,22 +136,55 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:home_owners_collection_management_system_project:home_owners_collection_management_system:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "FDB75A84-7EE7-4D4A-9B5F-77365D793307"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/reverseD0G/cve/blob/main/sql.md",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Exploit"
]
},
{
"url": "https://vuldb.com/?ctiid.270168",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Permissions Required",
"VDB Entry"
]
},
{
"url": "https://vuldb.com/?id.270168",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Permissions Required",
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "https://vuldb.com/?submit.366988",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-6441",
"sourceIdentifier": "cna@vuldb.com",
"published": "2024-07-02T12:15:03.123",
"lastModified": "2024-07-02T12:15:03.123",
"vulnStatus": "Received",
"lastModified": "2024-07-02T17:44:45.700",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{

View File

@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours.
### Last Repository Update
```plain
2024-07-02T16:00:46.764257+00:00
2024-07-02T18:03:24.910841+00:00
```
### Most recent CVE Modification Timestamp synchronized with NVD
```plain
2024-07-02T15:15:11.853000+00:00
2024-07-02T18:01:45.897000+00:00
```
### Last Data Feed Release
@ -33,52 +33,65 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
### Total Number of included CVEs
```plain
255743
255764
```
### CVEs added in the last Commit
Recently added CVEs: `15`
Recently added CVEs: `21`
- [CVE-2023-51776](CVE-2023/CVE-2023-517xx/CVE-2023-51776.json) (`2024-07-02T15:15:10.663`)
- [CVE-2023-51777](CVE-2023/CVE-2023-517xx/CVE-2023-51777.json) (`2024-07-02T15:15:10.807`)
- [CVE-2023-51778](CVE-2023/CVE-2023-517xx/CVE-2023-51778.json) (`2024-07-02T15:15:10.890`)
- [CVE-2024-22102](CVE-2024/CVE-2024-221xx/CVE-2024-22102.json) (`2024-07-02T15:15:11.070`)
- [CVE-2024-22103](CVE-2024/CVE-2024-221xx/CVE-2024-22103.json) (`2024-07-02T15:15:11.150`)
- [CVE-2024-22104](CVE-2024/CVE-2024-221xx/CVE-2024-22104.json) (`2024-07-02T15:15:11.227`)
- [CVE-2024-32755](CVE-2024/CVE-2024-327xx/CVE-2024-32755.json) (`2024-07-02T14:15:12.333`)
- [CVE-2024-32756](CVE-2024/CVE-2024-327xx/CVE-2024-32756.json) (`2024-07-02T14:15:12.567`)
- [CVE-2024-32757](CVE-2024/CVE-2024-327xx/CVE-2024-32757.json) (`2024-07-02T14:15:12.783`)
- [CVE-2024-32932](CVE-2024/CVE-2024-329xx/CVE-2024-32932.json) (`2024-07-02T15:15:11.373`)
- [CVE-2024-34122](CVE-2024/CVE-2024-341xx/CVE-2024-34122.json) (`2024-07-02T14:15:13.000`)
- [CVE-2024-36404](CVE-2024/CVE-2024-364xx/CVE-2024-36404.json) (`2024-07-02T14:15:13.450`)
- [CVE-2024-38519](CVE-2024/CVE-2024-385xx/CVE-2024-38519.json) (`2024-07-02T14:15:13.737`)
- [CVE-2024-39143](CVE-2024/CVE-2024-391xx/CVE-2024-39143.json) (`2024-07-02T14:15:13.990`)
- [CVE-2024-4897](CVE-2024/CVE-2024-48xx/CVE-2024-4897.json) (`2024-07-02T15:15:11.853`)
- [CVE-2022-32147](CVE-2022/CVE-2022-321xx/CVE-2022-32147.json) (`2024-07-02T17:15:03.273`)
- [CVE-2022-32191](CVE-2022/CVE-2022-321xx/CVE-2022-32191.json) (`2024-07-02T17:15:04.040`)
- [CVE-2022-3428](CVE-2022/CVE-2022-34xx/CVE-2022-3428.json) (`2024-07-02T17:15:04.250`)
- [CVE-2022-41718](CVE-2022/CVE-2022-417xx/CVE-2022-41718.json) (`2024-07-02T17:15:04.360`)
- [CVE-2022-41726](CVE-2022/CVE-2022-417xx/CVE-2022-41726.json) (`2024-07-02T17:15:04.430`)
- [CVE-2022-41728](CVE-2022/CVE-2022-417xx/CVE-2022-41728.json) (`2024-07-02T17:15:04.497`)
- [CVE-2022-41729](CVE-2022/CVE-2022-417xx/CVE-2022-41729.json) (`2024-07-02T17:15:04.550`)
- [CVE-2022-41730](CVE-2022/CVE-2022-417xx/CVE-2022-41730.json) (`2024-07-02T17:15:04.610`)
- [CVE-2023-39324](CVE-2023/CVE-2023-393xx/CVE-2023-39324.json) (`2024-07-02T17:15:04.737`)
- [CVE-2024-22105](CVE-2024/CVE-2024-221xx/CVE-2024-22105.json) (`2024-07-02T16:15:03.877`)
- [CVE-2024-22106](CVE-2024/CVE-2024-221xx/CVE-2024-22106.json) (`2024-07-02T16:15:03.980`)
- [CVE-2024-25086](CVE-2024/CVE-2024-250xx/CVE-2024-25086.json) (`2024-07-02T16:15:04.070`)
- [CVE-2024-25087](CVE-2024/CVE-2024-250xx/CVE-2024-25087.json) (`2024-07-02T16:15:04.157`)
- [CVE-2024-25088](CVE-2024/CVE-2024-250xx/CVE-2024-25088.json) (`2024-07-02T16:15:04.250`)
- [CVE-2024-26314](CVE-2024/CVE-2024-263xx/CVE-2024-26314.json) (`2024-07-02T16:15:04.330`)
- [CVE-2024-3826](CVE-2024/CVE-2024-38xx/CVE-2024-3826.json) (`2024-07-02T16:15:05.230`)
- [CVE-2024-39316](CVE-2024/CVE-2024-393xx/CVE-2024-39316.json) (`2024-07-02T16:15:04.753`)
- [CVE-2024-39323](CVE-2024/CVE-2024-393xx/CVE-2024-39323.json) (`2024-07-02T16:15:04.983`)
- [CVE-2024-4467](CVE-2024/CVE-2024-44xx/CVE-2024-4467.json) (`2024-07-02T16:15:05.423`)
- [CVE-2024-5865](CVE-2024/CVE-2024-58xx/CVE-2024-5865.json) (`2024-07-02T16:15:05.667`)
- [CVE-2024-5866](CVE-2024/CVE-2024-58xx/CVE-2024-5866.json) (`2024-07-02T16:15:05.900`)
### CVEs modified in the last Commit
Recently modified CVEs: `18`
Recently modified CVEs: `73`
- [CVE-2022-24975](CVE-2022/CVE-2022-249xx/CVE-2022-24975.json) (`2024-07-02T14:15:12.013`)
- [CVE-2024-0979](CVE-2024/CVE-2024-09xx/CVE-2024-0979.json) (`2024-07-02T14:51:28.827`)
- [CVE-2024-1565](CVE-2024/CVE-2024-15xx/CVE-2024-1565.json) (`2024-07-02T14:51:17.970`)
- [CVE-2024-29060](CVE-2024/CVE-2024-290xx/CVE-2024-29060.json) (`2024-07-02T14:19:37.890`)
- [CVE-2024-30052](CVE-2024/CVE-2024-300xx/CVE-2024-30052.json) (`2024-07-02T14:20:55.230`)
- [CVE-2024-30062](CVE-2024/CVE-2024-300xx/CVE-2024-30062.json) (`2024-07-02T14:23:40.820`)
- [CVE-2024-30063](CVE-2024/CVE-2024-300xx/CVE-2024-30063.json) (`2024-07-02T14:17:47.710`)
- [CVE-2024-3032](CVE-2024/CVE-2024-30xx/CVE-2024-3032.json) (`2024-07-02T14:45:48.633`)
- [CVE-2024-3552](CVE-2024/CVE-2024-35xx/CVE-2024-3552.json) (`2024-07-02T14:45:34.543`)
- [CVE-2024-4145](CVE-2024/CVE-2024-41xx/CVE-2024-4145.json) (`2024-07-02T14:44:45.540`)
- [CVE-2024-4149](CVE-2024/CVE-2024-41xx/CVE-2024-4149.json) (`2024-07-02T14:44:29.993`)
- [CVE-2024-4576](CVE-2024/CVE-2024-45xx/CVE-2024-4576.json) (`2024-07-02T14:41:30.777`)
- [CVE-2024-4615](CVE-2024/CVE-2024-46xx/CVE-2024-4615.json) (`2024-07-02T14:51:50.013`)
- [CVE-2024-5265](CVE-2024/CVE-2024-52xx/CVE-2024-5265.json) (`2024-07-02T14:51:36.407`)
- [CVE-2024-5661](CVE-2024/CVE-2024-56xx/CVE-2024-5661.json) (`2024-07-02T14:43:40.460`)
- [CVE-2024-5757](CVE-2024/CVE-2024-57xx/CVE-2024-5757.json) (`2024-07-02T14:42:05.977`)
- [CVE-2024-5787](CVE-2024/CVE-2024-57xx/CVE-2024-5787.json) (`2024-07-02T14:41:54.887`)
- [CVE-2024-6387](CVE-2024/CVE-2024-63xx/CVE-2024-6387.json) (`2024-07-02T14:15:14.133`)
- [CVE-2024-32755](CVE-2024/CVE-2024-327xx/CVE-2024-32755.json) (`2024-07-02T17:44:45.700`)
- [CVE-2024-32756](CVE-2024/CVE-2024-327xx/CVE-2024-32756.json) (`2024-07-02T17:44:45.700`)
- [CVE-2024-32757](CVE-2024/CVE-2024-327xx/CVE-2024-32757.json) (`2024-07-02T17:44:45.700`)
- [CVE-2024-32932](CVE-2024/CVE-2024-329xx/CVE-2024-32932.json) (`2024-07-02T17:44:45.700`)
- [CVE-2024-34122](CVE-2024/CVE-2024-341xx/CVE-2024-34122.json) (`2024-07-02T17:44:45.700`)
- [CVE-2024-34590](CVE-2024/CVE-2024-345xx/CVE-2024-34590.json) (`2024-07-02T17:59:38.153`)
- [CVE-2024-34591](CVE-2024/CVE-2024-345xx/CVE-2024-34591.json) (`2024-07-02T17:59:58.230`)
- [CVE-2024-34592](CVE-2024/CVE-2024-345xx/CVE-2024-34592.json) (`2024-07-02T18:00:19.693`)
- [CVE-2024-34593](CVE-2024/CVE-2024-345xx/CVE-2024-34593.json) (`2024-07-02T18:00:59.957`)
- [CVE-2024-34594](CVE-2024/CVE-2024-345xx/CVE-2024-34594.json) (`2024-07-02T18:01:18.317`)
- [CVE-2024-34595](CVE-2024/CVE-2024-345xx/CVE-2024-34595.json) (`2024-07-02T18:01:45.897`)
- [CVE-2024-36404](CVE-2024/CVE-2024-364xx/CVE-2024-36404.json) (`2024-07-02T17:44:45.700`)
- [CVE-2024-38366](CVE-2024/CVE-2024-383xx/CVE-2024-38366.json) (`2024-07-02T17:15:05.180`)
- [CVE-2024-38367](CVE-2024/CVE-2024-383xx/CVE-2024-38367.json) (`2024-07-02T17:15:05.410`)
- [CVE-2024-38368](CVE-2024/CVE-2024-383xx/CVE-2024-38368.json) (`2024-07-02T17:15:05.590`)
- [CVE-2024-38519](CVE-2024/CVE-2024-385xx/CVE-2024-38519.json) (`2024-07-02T17:44:45.700`)
- [CVE-2024-38520](CVE-2024/CVE-2024-385xx/CVE-2024-38520.json) (`2024-07-02T16:15:04.517`)
- [CVE-2024-39119](CVE-2024/CVE-2024-391xx/CVE-2024-39119.json) (`2024-07-02T17:44:45.700`)
- [CVE-2024-39143](CVE-2024/CVE-2024-391xx/CVE-2024-39143.json) (`2024-07-02T17:44:45.700`)
- [CVE-2024-4897](CVE-2024/CVE-2024-48xx/CVE-2024-4897.json) (`2024-07-02T17:44:45.700`)
- [CVE-2024-6264](CVE-2024/CVE-2024-62xx/CVE-2024-6264.json) (`2024-07-02T17:57:31.737`)
- [CVE-2024-6438](CVE-2024/CVE-2024-64xx/CVE-2024-6438.json) (`2024-07-02T17:54:02.370`)
- [CVE-2024-6439](CVE-2024/CVE-2024-64xx/CVE-2024-6439.json) (`2024-07-02T17:58:39.773`)
- [CVE-2024-6440](CVE-2024/CVE-2024-64xx/CVE-2024-6440.json) (`2024-07-02T17:58:15.410`)
- [CVE-2024-6441](CVE-2024/CVE-2024-64xx/CVE-2024-6441.json) (`2024-07-02T17:44:45.700`)
## Download and Usage

View File

@ -25902,7 +25902,7 @@ CVE-2007-3006,0,0,d08c70236db6ed25692a5f03626f6ad61a13b5353ec0e4c1b65317bd88ff21
CVE-2007-3007,0,0,b4db8cc8c25eaeac3c205961786d524502c2a51fe9d20b12315c925ac2287ec4,2022-08-29T20:07:10.533000
CVE-2007-3008,0,0,961cec56d4e6c350de4cb8b4780e94e3fdd14434425ee78e85b392e491bc2b3c,2017-07-29T01:31:54.830000
CVE-2007-3009,0,0,47041ee6fa7ed80455a3b294a8e84a918877598df37898b39c3588236bb37525,2011-03-08T02:55:30.720000
CVE-2007-3010,0,0,3c94773a3a549d04f60fbb1dce41311f1cb5e7fdad730a468b01f4ac50c60509,2018-10-16T16:46:56.620000
CVE-2007-3010,0,1,837fe45d52f8e7f02348417d8f3fb7e4e5777fa98586a9a579120070c82335c8,2024-07-02T17:43:30.203000
CVE-2007-3011,0,0,9ba0622a628f9d11e7a68c0d919efd88070b6f645068a1bcb18873be4cbea5ec,2018-10-16T16:46:57.010000
CVE-2007-3012,0,0,25a33f79c849a477804cd5a6fc8d01a5528ab138a9e589cf7d8fbe5cb9fc9f3d,2018-10-16T16:46:57.463000
CVE-2007-3013,0,0,bb55e8ec357211d77621ac07e4a0aa32ea7306d72817f3bc04f5131e2eac6b64,2018-10-16T16:46:57.747000
@ -64641,7 +64641,7 @@ CVE-2014-0156,0,0,daf2c0221d98d8d913d7ef9f18f1fa650cca95e2f2c6536a7b41ce09838520
CVE-2014-0157,0,0,becb34c05ab8fa579ddbca4c33cad0d713faf93193a9b62ed0df648926ac3047,2023-02-13T00:34:15.500000
CVE-2014-0158,0,0,feb673c31007a64611ebb71387bafb4e70f121f51017a2aabb43761c8254c112,2020-09-09T19:56:57.267000
CVE-2014-0159,0,0,d5df39f2b81e4887e2abdf8c0175e00dcdf3ec53fab050c6f77c02049f8d4a13,2016-08-24T15:32:01.053000
CVE-2014-0160,0,0,45dc564e3ae5022faa22d2a9d1babb6bd4df51086c67066b143ac19887cc270f,2023-11-07T02:18:10.590000
CVE-2014-0160,0,1,6708857ee331a7d8e18928ebe2bd1f938449183b8bb1e583de7367fee3a17cf8,2024-07-02T16:52:39.560000
CVE-2014-0161,0,0,a30a5306bf5a35611d3ab19fa257b885bea16367f2aedd7741afe7c921e823e3,2020-01-10T15:14:57.550000
CVE-2014-0162,0,0,f33189fbe1993619e61e26b15397dca3501850db067538d0871d95cd948ff402,2023-02-13T00:34:31.640000
CVE-2014-0163,0,0,56c2af78cb139a80c1fae36775ff2d444b736a4a10651ba4196f00d7a9cb63a5,2019-12-16T14:09:45.803000
@ -64803,7 +64803,7 @@ CVE-2014-0318,0,0,1cba58b0195bc48a4a1c61616309638b580f97e9b57b3c06762604ad3720ec
CVE-2014-0319,0,0,01ff48a13adb3f717d3acf70484da73b544968fca3f028266dc425d390221a0d,2018-10-12T22:05:53.263000
CVE-2014-0320,0,0,7402b8b8005ad9566cf2e5dab20d9ea3e5d9fa79d32f6dd0e0c88124ec33696f,2023-11-07T02:18:19.193000
CVE-2014-0321,0,0,945041955fc45bfbd150a5ce17aa1b8d976f8ec24e6365f2fb4eeab90160ad50,2018-10-12T22:05:53.403000
CVE-2014-0322,0,0,913794fa667130289644441920feb71ba3891eec6111d066fe3b8e7914fc7002,2018-10-12T22:05:53.590000
CVE-2014-0322,0,1,80d3d4e8a7fff3cd3d843a0276a0d74d79cf6cbb98273699d44db7ea22aee0c2,2024-07-02T16:50:50.417000
CVE-2014-0323,0,0,79d63528eb67512cd7de4d5fe37ac12b36189faae9725759a435c338636dfa53,2019-05-13T18:31:16.110000
CVE-2014-0324,0,0,55c1fda72db99a74f089d80f601b39b708cb3d2fcfccf93f75491545300b702b,2018-10-12T22:05:55.107000
CVE-2014-0325,0,0,707ce9d24719245aab60c0fe801d0b08a96576ba38015d5420fe027001bac20a,2018-10-12T22:05:55.247000
@ -65232,7 +65232,7 @@ CVE-2014-0775,0,0,cd19bf91484f9f537790acfc643408a5dc30a797481c481f25092a06ec4d61
CVE-2014-0777,0,0,52e25972f715e1f3bfb295aa6db9aecfa720bb98f60002645154eb6104e4edc1,2014-04-14T16:19:34.417000
CVE-2014-0778,0,0,c8c02965d2f60668d96267314444a9e4da9006495e6f26e4a9697ea55c408ab1,2014-04-21T18:50:53.030000
CVE-2014-0779,0,0,9ce73a0894aeb7337fdc032e2bb18755de8e06c3765331cd6df0761b731a3d99,2018-12-31T14:23:16.887000
CVE-2014-0780,0,0,b02010922df7fcfb4767458a0a0548a4122f1ccd9f82adb88c18a1668cde63c0,2017-09-16T01:29:00.513000
CVE-2014-0780,0,1,f214f599d498f27168ca2760fd08691d1a33320b7ede0796150b3200d162b78c,2024-07-02T16:56:31.520000
CVE-2014-0781,0,0,98a06a17a7989c7714ecc45797664011894c46b55b378ac4fe5759a0c8b6d057,2015-08-05T15:45:09.840000
CVE-2014-0782,0,0,d79af42a7ab864fd1728fa9203f389a0a69e02ef9200faf41ff9ebd3fb0cc727,2014-05-19T14:57:56.633000
CVE-2014-0783,0,0,b697961cc2b39c1b3ca03001fe675e4b59853d9d449401760745ac078ebbbdeb,2015-08-05T15:50:38.073000
@ -68229,7 +68229,7 @@ CVE-2014-4109,0,0,1c75b7bda718f60a4331cb7b8f2ebcea4ddd79b6de40d8b323772acce2cfea
CVE-2014-4110,0,0,1b45a758bbffbda1039557e2f4fe9fcfada93e83831bdd0a5d84eb84ce55fed9,2018-10-12T22:07:15.363000
CVE-2014-4111,0,0,ee246bc2ae18bf53ef256da0cf801e219957adcc0e45e3acb514b7dcdd57a3dd,2018-10-12T22:07:15.707000
CVE-2014-4112,0,0,97f20051f055438be8001d8b4492de1506af3c53992413b5f84edd1b835f9982,2018-03-08T17:15:05.060000
CVE-2014-4113,0,0,3da7beb535d28e68962a99abddd27a5e7fbaf71f386912bf61679a47bc165d2a,2019-02-26T14:04:02.400000
CVE-2014-4113,0,1,722e589db274c115927331c91aeb6943abc227a53ae92bc2a5224ec36cefc45f,2024-07-02T16:57:12.317000
CVE-2014-4114,0,0,a7c7291f519b9a705351db99e87af60a8380673b55eff2dbef335e8baa1cd61b,2018-10-12T22:07:17.287000
CVE-2014-4115,0,0,8c4f43bca5e9e32cba89713d350a2a7537b86622205e0ee18275a88340260f2f,2019-02-26T14:04:02.400000
CVE-2014-4116,0,0,f27d8a35adf7c24a524972265efb6142434521da99abdc49a588bdd0a1dda0cf,2018-10-12T22:07:18.737000
@ -73762,9 +73762,9 @@ CVE-2015-0307,0,0,77a2ab6c58eb6530fbd083306d8d0c97fb5589eae3c9ddddf679a1d69347f9
CVE-2015-0308,0,0,7d18dc98e51d2727817474608beed4464cfbd40855f977fad54eb4fd76449209,2017-09-08T01:29:39.183000
CVE-2015-0309,0,0,87c3b837452e4b3af5607bc99de3cc433bb4688898df1208c217cb7121d37944,2017-09-08T01:29:39.263000
CVE-2015-0310,0,0,4c817aa8ade177a1712e1d85f902b125ad10a8496192bdee41780b329f7e994b,2015-11-13T17:08:35.050000
CVE-2015-0311,0,0,edc6c2884293eb9c0e6d38d93d5d72836b60479cbad60c984756e48871e7a7b0,2015-02-14T03:00:01.597000
CVE-2015-0311,0,1,e56fe258128d9f97b1e99a8441a9d0b3d45412f7983c2a54b7e40eaab0650836,2024-07-02T17:41:45.947000
CVE-2015-0312,0,0,d1e11e76963d3dc10d65681bd095fcc5f2015ec152793fa897d26c5466602a5a,2021-09-08T17:19:29.487000
CVE-2015-0313,0,0,d3bec7cdc32dc5dbd8c075b5e8de2b1bc7bf7fed3dfd8438d93ae268930ce249,2017-09-08T01:29:39.403000
CVE-2015-0313,0,1,32b537c35671e60ff577889083856d742cdab09c92204ae3c3745aca85e1df3c,2024-07-02T17:41:33.407000
CVE-2015-0314,0,0,ed176bb6c920953bd05a67e0dcfc4754d5be4a5cdcea6c30319cb07581d52680,2017-09-08T01:29:39.513000
CVE-2015-0315,0,0,e7c135ea0cd6e0ec857f7bed1d718aa999813ce0fb06f31ae06d7d59602f6aa5,2017-09-08T01:29:39.577000
CVE-2015-0316,0,0,9be2d11b8c3d086b7abe54eb7cf2b90ec0bcc1a87e06e7a10801fee34e0fc8fa,2017-09-08T01:29:39.637000
@ -75925,7 +75925,7 @@ CVE-2015-2498,0,0,01b1dbefd339b6e25197ba90c8891b7724feb4f35d4ad31893bef934de6c04
CVE-2015-2499,0,0,0b227917654c2cdc61048217741c61ffd55265a19a0b138b4aef08c27cf7c53c,2018-10-12T22:09:49.890000
CVE-2015-2500,0,0,49e464eba4415d8364d5136b94b9c668cbfd930a324bbaa7ec0072fe3d545867,2018-10-12T22:09:50.233000
CVE-2015-2501,0,0,f09e3a89b63869117e9692e576b97455f1304e0bc6ea1c2e9f4f884b9875305e,2018-10-12T22:09:50.547000
CVE-2015-2502,0,0,176cd86941d7ec97fc1d4396e00c1672a42f92c468a09ec408dc5c0a55bcb74c,2018-10-12T22:09:50.873000
CVE-2015-2502,0,1,1739450c3c805dcf1566a5667e220e1dea34a5ae47e1e22e321f2c494804cac8,2024-07-02T17:42:08.410000
CVE-2015-2503,0,0,24dc6deba6d14a84074612ca24d58a5b44ebc6e4bf4524ca3c877aaa0a6f6f55,2018-10-12T22:09:51.357000
CVE-2015-2504,0,0,89cc5cebaf8ff3c426f39a75e0060697fd4d53d11f5f040c71ec45dc0361a2cb,2018-10-12T22:09:51.717000
CVE-2015-2505,0,0,59b34f93f787bb8a289e02f9d8464e3655eadc48277a9bd6b666cb34e688c3c7,2018-10-12T22:09:51.967000
@ -76487,7 +76487,7 @@ CVE-2015-3109,0,0,58fd13dee5924135da2f7382950cb65bc71f0d1844a61632e61dacf1d7baea
CVE-2015-3110,0,0,ca85e264cf4ba7f926661b9c547792441d10b00e417a6380d94dd704b25aa10c,2016-12-28T02:59:10.730000
CVE-2015-3111,0,0,2b2af8c38c9e070e613fb4c5bc56d9ff6dd9d654e4aa0405a1dc62cee24a9337,2016-12-28T02:59:10.793000
CVE-2015-3112,0,0,1598d7c46c2cc10f4226117a26ac0a47f21462db8dba7f4e082897d64cd0b724,2016-12-28T02:59:10.857000
CVE-2015-3113,0,0,a5f98c35b3223a2979c9ac18d45b60b3974da5dc4e47ff91a2df6608dc97f130,2017-11-08T02:29:01.367000
CVE-2015-3113,0,1,69f048ef1d8b59c48e8916c15b5625bc091c95daa91a84bfa1760f3a90e11f79,2024-07-02T17:41:54.833000
CVE-2015-3114,0,0,850a65b20b17465d295e1fc258c2da78f17f8bfe24ab4d6ab6c159bb4f706141,2017-09-22T01:29:10.107000
CVE-2015-3115,0,0,c1062f71444e8029648aff8b63836558a5bfc5ba1dc9e739add3cca6ce9e853a,2017-09-22T01:29:10.187000
CVE-2015-3116,0,0,dc5050dbf449c424eb5796fcbbdee7372983471b587d435f08713f21b371240d,2017-09-22T01:29:10.250000
@ -78097,8 +78097,8 @@ CVE-2015-5118,0,0,f46fd750165a368364a85479398205853dfe6a6a34a165e6c198b82ec1ed11
CVE-2015-5119,0,0,2570a800bc69b776ddb7dcf4fa144c18969962c70f98698832209a46b38c6d56,2017-01-20T02:59:03.013000
CVE-2015-5120,0,0,4164b9af8db618e5e5d06bea9b49543bf0023d5130934507b6a8014e526cce05,2016-12-29T13:16:19.013000
CVE-2015-5121,0,0,95e279269b55acd69c9a2234811bef313af727acb1e6c66ea0289451963a292b,2016-12-29T13:16:22.233000
CVE-2015-5122,0,0,056170f07aeea2c0fb47f26697cf438f36a96cf145fb5c5fbc7438690e8d86b1,2023-05-08T13:29:02.290000
CVE-2015-5123,0,0,6cfbfc5482bef34a315222ec28afacab8425dbded064e3b67309cfa61777b75f,2021-09-08T17:19:26.453000
CVE-2015-5122,0,1,746576c5f6041e2d70f56f0c592957b16e7bdd0e6029d7e0e5d8f6dda465de55,2024-07-02T17:42:40.230000
CVE-2015-5123,0,1,e0c17f73e29b6026f1c6f086f04733d8d779c740ed9c154f71ec1e2365365770,2024-07-02T17:42:19.550000
CVE-2015-5124,0,0,b75f4fd50cf3597a830d66ef12ca119fa6b39b3198a60801eb7529f006e18152,2018-01-05T02:30:12.227000
CVE-2015-5125,0,0,bf466823bef2d65f4b0d4d7184058b477930f44ffbaebd3f47466bda1cb620e9,2017-09-21T01:29:10.447000
CVE-2015-5126,0,0,f9acc29f78adf1914a7a92067b848e204158931436351a1da9fdcaec54d06119,2023-11-07T02:26:01.840000
@ -87750,7 +87750,7 @@ CVE-2016-4519,0,0,4ea3135fc548f056960079e24512c1967f4d221f6f2ecf1b99e5680af4b309
CVE-2016-4520,0,0,870b0726ef6e87ea037a8c4c25f2edec0f3700b865f5c28609f2da2780242ad5,2016-11-28T20:18:34.040000
CVE-2016-4521,0,0,6d49fe9a0f4c062033e701c248ab6a6b847359d833b8b8de2e51b3f42fcde761,2016-06-01T14:29:40.607000
CVE-2016-4522,0,0,d7d3b8194879a7056ff0b2d0c32d355044d2381c093b1010aa2c0b4f1e706e96,2016-11-28T20:18:35.057000
CVE-2016-4523,0,0,7b31b13c574545649d75d89ad4f48f8249a4e8453d581b3ebde276122d23ae51,2016-11-28T20:18:36.087000
CVE-2016-4523,0,1,0d5bbf364379d713849838765f338af65f7210564bf1cfb83273cd7617a1a687,2024-07-02T16:57:38.053000
CVE-2016-4524,0,0,ae54770e508902b585db0d45b8e7fa3a86aed798a2a6b9c944042fe2a7d8c7fa,2016-06-15T18:48:34.953000
CVE-2016-4525,0,0,d0a23bce57e7d53ca449247a9456ca2870781b196da92fbe0381b1fc8b77fd54,2016-06-28T14:21:49.963000
CVE-2016-4526,0,0,fe336e51d70fba456044885bf5dd242229b08242dde907c6227b6a53d750f54a,2016-11-28T20:18:37.307000
@ -125537,7 +125537,7 @@ CVE-2018-7588,0,0,015af2b5980e5082830b70d88c720b5aca167eceb7259d240638954f79dc9a
CVE-2018-7589,0,0,0887df07b13bb1f6b2593f6c1e73c736d2193a6767d4aeae59245aa5c70d1418,2020-11-02T21:15:15.273000
CVE-2018-7590,0,0,9b0f4ac2a41d90dc4786b3b20697043603869c9a55374aa4b97a9eadabb68158,2018-03-16T17:52:40.027000
CVE-2018-7600,0,0,b77e5d89c0e84e36baa12b4f9ed0ae11f981a98c3e557f97183fbcb9a616d2a3,2019-03-01T18:04:28.047000
CVE-2018-7602,0,0,29ef9e90f42d2e13a9898a024f719f84662730e6358fb591abb5d8f1e7fa4748,2023-11-07T03:01:03.523000
CVE-2018-7602,0,1,797a8569dcea2cb0d2d456731dec4a584ead528ad25e365e14803eda1e0976e1,2024-07-02T17:41:16.867000
CVE-2018-7603,0,0,2e5d3e6d210ab481bfec705012ffa012adcb25e7982455a3e3374494c3909320,2023-11-07T03:01:03.677000
CVE-2018-7631,0,0,5574a9a85a15831a5ff0a27a40e4074e5d5a916d3412c021ec2fcd365a77e3f3,2018-12-10T16:59:35.417000
CVE-2018-7632,0,0,59ebf9e74f106ee1491e61997903db609914ef6ba184c1d86a5cf44e805c8d51,2018-12-10T17:23:37.780000
@ -127989,7 +127989,7 @@ CVE-2019-1003025,0,0,17bdb989384b3c395a17a034e1b3e4209b7932961a53eb878d48ef42263
CVE-2019-1003026,0,0,eb4e6044a93fa17c0e63d17e5d9d2668b035fdca1a645b3b3948c256f6c74f91,2023-10-25T18:16:02.787000
CVE-2019-1003027,0,0,bdf0802d13abe0afd5cb18b96a2e55de0af0d0a7385cb0cc38d67cfdfc269282,2023-10-25T18:16:02.847000
CVE-2019-1003028,0,0,9da8ebce07963bcc0904a8a4a6d82cac20d08db6464021425b27a4f1237f0fda,2023-10-25T18:16:02.910000
CVE-2019-1003029,0,0,93df322d6ad4eefad26c1f6842dc730721bbf9f823112ca15fc425dfa597b705,2023-10-25T18:16:02.980000
CVE-2019-1003029,0,1,5dcdb4535e52feaeccac885524e1681f446116fe28f2cfcb86a72a60ad555a93,2024-07-02T16:58:12.100000
CVE-2019-1003030,0,0,75460ff7f4c62056eef0599ec1918db730a21960a7aa9fe7cb7e45fc8771ee0c,2023-10-25T18:16:03.057000
CVE-2019-1003031,0,0,30bfaabafc66d011b964d2227b8fa713bd82cf8b2ab0096dd62d9292a1a66af0,2023-10-25T18:16:03.140000
CVE-2019-1003032,0,0,00379c252c93470fca2c505504ee027e4bfb19883dd9ca2197b8be73b7ab261b,2023-10-25T18:16:03.207000
@ -129874,7 +129874,7 @@ CVE-2019-11704,0,0,244bce8bd30bf207f198ff1945c0f75eac921c545e0d69c0f37eac66a0c68
CVE-2019-11705,0,0,f1c01b2ef97640361df9051ab4a2630ba6ba53a8cf3885df52af6af1393d80ba,2023-02-02T15:03:47.707000
CVE-2019-11706,0,0,031137a31a142f86250e217ce5f0b5dfeeb36dcace8bc2285bd20b48c34130cc,2023-02-02T15:07:52.103000
CVE-2019-11707,0,0,6cb6303e5c0c2c9e79428f149e18aa8853f895d5638b49630044b254a5ce1c74,2023-01-31T14:15:10.390000
CVE-2019-11708,0,0,7005a9fc07685409b062b8bbb7cd712bba8ca1b7865dbab891a28a6b49d76ebe,2019-08-15T18:15:17.287000
CVE-2019-11708,0,1,4301e5a461e22be9c35ecddaf8b9cf900d62e2e1cc894b4d7c4230854dfa0423,2024-07-02T17:02:19.720000
CVE-2019-11709,0,0,d208f7879210f96d88111752dcf78a8e3f3f6eb50a0323b0b3c8a30ebaea7c86,2022-04-18T17:02:48.217000
CVE-2019-1171,0,0,148bff9718e525f28c260ab304b680292d0142609abbbb16ec3000831b9d90be,2024-05-29T17:16:06.207000
CVE-2019-11710,0,0,f7fcdce1ac1d7528ac6821780313bacb8a28d69f08e0a415ba11fcfac38a975b,2022-04-18T17:02:55.090000
@ -138941,7 +138941,7 @@ CVE-2019-3564,0,0,097587a830e5ae6dc3532de7b53d1a7d22255810e7b5bd625c9e1324f2d550
CVE-2019-3565,0,0,8a4e3feb477d8e0bd863e8468f94d60eef4f80aab9f70403aa96bafa2ccf4cbe,2023-11-07T03:09:54.133000
CVE-2019-3566,0,0,f13c02441c8c3f0a7fd17411b3fae43a73d058fa7dbd8cbb630977674ae5dfa4,2021-09-14T12:15:52.360000
CVE-2019-3567,0,0,30c04c41a78938d6300b2b795c3db597c4817637a8717ae59e3a4feb44a9c669,2020-03-06T13:24:09.167000
CVE-2019-3568,0,0,80b1c8dcc178645b20a9ba29e17f11a4cbf55fdb9517df65502a86e82d1834b7,2019-08-13T21:15:11.770000
CVE-2019-3568,0,1,0d154086cb59e14c267407593c6991381e99f65e3224ac6d7b13c11467fb02d2,2024-07-02T17:01:19.757000
CVE-2019-3569,0,0,02ee9dc3cb0f8cc1badc76df3207b514a8c911453170dcb3567be41075b60189,2021-09-14T12:19:24.367000
CVE-2019-3570,0,0,a43182f58b1d600a3ae1cf0a39cfff288c5399070b703a66f6f3f714325cda06,2020-10-16T15:14:37.373000
CVE-2019-3571,0,0,04bbcbb5147893fdbcfeab18a39967190ca046cb0ca1aff6ade6fdc5a1e79e9c,2023-11-07T03:09:54.260000
@ -140759,7 +140759,7 @@ CVE-2019-5782,0,0,5e5e837872db01094a3f0158ec0db66394d9fba8968f5ddd6fce3afb3e2c90
CVE-2019-5783,0,0,09b0bb24af9e617aac26bae22edf5640199f554a81a80685c2bd1886f022dc6b,2023-11-07T03:12:09.660000
CVE-2019-5784,0,0,13aceb2fc37becd09ebace891e949b3a769b84c38febfb092d4bd525377d3a09,2023-11-07T03:12:10.203000
CVE-2019-5785,0,0,49f97a57736ef027335fc05813786dc9491c7d940c90d02553a2de087c98e5ef,2023-11-07T03:12:10.773000
CVE-2019-5786,0,0,fad31202dbc5becccd33ede0cac55d5bff3e5a0f8450a1d78343b241bfc50df9,2024-02-15T02:00:01.647000
CVE-2019-5786,0,1,8f6406916d47d15a7bb506051d47c9285fa73e607086f7ad174dc8e71eb2194d,2024-07-02T17:01:48.787000
CVE-2019-5787,0,0,d01cbf1c1ae79346cf857f88207040be298afa926ce1f81899e51e7bd541f407,2023-11-07T03:12:11.993000
CVE-2019-5788,0,0,b9c342f93c3df153a805f8d8f9e15fe1046062ec77c9788ec4b3bea2d01abe4e,2023-11-07T03:12:12.617000
CVE-2019-5789,0,0,defae67e52f6047322ad70e1b70eed4762404900eb87e914c206bafec783beed,2023-11-07T03:12:13.190000
@ -166107,7 +166107,7 @@ CVE-2021-1785,0,0,14ad3ea3163a8ddbb05089a4724993ebd217b0235e227e4529b72a6f39d5ce
CVE-2021-1786,0,0,bb61393a2c2d5543a8b1b4a64571d9dcfd36466eac3b8e27c83141391455bc61,2021-04-09T22:11:14.097000
CVE-2021-1787,0,0,a2c29309ff9a877286a63463a02f5202b6f1602be956e4cc51d009714ccbde7f,2021-04-09T22:12:26.693000
CVE-2021-1788,0,0,4c368c99f1ccae55f466ec8f7d450ea1d81713e4f9308f8e9a569fc018819a9a,2023-11-07T03:28:51.357000
CVE-2021-1789,0,0,21726db6cc105c73e4da717868f75c4636435ec22b9d55551de278d47859152d,2023-11-07T03:28:51.430000
CVE-2021-1789,0,1,00e1b3f8b090d202c422ece3be067d6126151de46d61edf2802db0793cd6921b,2024-07-02T17:02:47.677000
CVE-2021-1790,0,0,371fba66f07cc272f81f159105d54e99525ce2068f023c7c4d35cf27d1163d96,2021-04-12T19:24:59.253000
CVE-2021-1791,0,0,020a1c380a44c3e5a61568d3bbbc4065d5e5dbcf630cd8d3c493b4265bed18c8,2021-04-09T22:17:02.493000
CVE-2021-1792,0,0,50fb5923ba24e88416645b12fbcce6e1b2e4520146cc08ec8f73df021e932fc6,2021-04-09T22:18:01.573000
@ -174886,7 +174886,7 @@ CVE-2021-30879,0,0,e6f503b66e1997cfe12ffd71d47feea5d787dbaab7ad1ffbbf06d27dd4164
CVE-2021-30880,0,0,9fd0845c7bdd6030896fdd442a9bb56219e5c78d7788c9da4a569794ad8b6222,2023-11-07T03:33:40.207000
CVE-2021-30881,0,0,c804ae152b6b0e7d25c20dc96b3a0e7482ee05974c2ed93ddd2c173f920e75bf,2023-11-07T03:33:40.477000
CVE-2021-30882,0,0,012960930e54cac630ccb78fb3718e316126765167beebb7f1e4179e846d837c,2023-11-07T03:33:40.737000
CVE-2021-30883,0,0,180baf6827960bdddc46df8def221909492f7dd646e11a06f9f1f5e1446a6738,2023-11-07T03:33:41.033000
CVE-2021-30883,0,1,2cb646f889808237f63d5c6d5fd32de6de958ca39eaf4faf61dbb3ea98a07b56,2024-07-02T17:03:21.260000
CVE-2021-30884,0,0,4d2cfd0b9ac8a9803fc355c3c13e5ad2aa3efcd22fd078699b4e07b170ecf950,2023-11-07T03:33:41.410000
CVE-2021-30885,0,0,f5a0330958247c8fab1acdc03b8aad84fdcfe834f30db9aaa1fc6e3d86480325,2023-11-07T03:33:41.733000
CVE-2021-30886,0,0,e2f97bff1e3273e7fcbc5723eb65dc79972d2cb4abe97e0db062b224f72f6457,2023-11-07T03:33:42.057000
@ -182183,7 +182183,7 @@ CVE-2021-40447,0,0,029ac62c56205f16447ee590c2cafc338c5768e5dba2814313efc5dc007b6
CVE-2021-40448,0,0,834b86258f21a220b118b51ac6a45b818a03f4944b7ab04f969ee7bfd39fe906,2023-12-28T20:16:06.993000
CVE-2021-40449,0,0,62c880931bc80f2953829eda35e3434a766282c9b7fbb1737a6957a8351dc14b,2023-08-08T14:21:49.707000
CVE-2021-4045,0,0,5d46ea9e2ba37d23a62b7b189ba3acedb226bf020f7ecb90331803b971460811,2022-09-30T14:46:27.997000
CVE-2021-40450,0,0,e2de1090a8088495880ebb9e4c6b54123bce8b96b9372dcc218af068dff99e48,2023-08-08T14:21:49.707000
CVE-2021-40450,0,1,83e8bdea547d95f0a79756252494d856cb0960e33a447d5f868326b95665fadd,2024-07-02T17:03:33.753000
CVE-2021-40452,0,0,0e36170ae59332894a789e05bdb1bf5a092c130b12c7e8bb09ffde6b78ac4bc5,2023-12-28T00:15:08.107000
CVE-2021-40453,0,0,40e9ae5fe47fec61244111607b3dd2651b858a0c5edb7ffcd618bb3d816aecbe,2023-12-28T00:15:08.333000
CVE-2021-40454,0,0,4cffe6c8f995bd0e130e4aba6628301cd0787bc8e0bd3c3417757aa45a9c848d,2023-08-01T23:15:17.050000
@ -182954,7 +182954,7 @@ CVE-2021-41353,0,0,dccea9fc248884e10de74f7c53012b35821d179c9a0c327c7e0ad6f466489
CVE-2021-41354,0,0,5e98d105387149a3d13682a8e81a1c9f839b4cdce8d501c4e0515dc2266998db,2023-08-01T23:15:26.510000
CVE-2021-41355,0,0,b6968a587548bb104c254bb7474fdfac6555486bd3e15327a12bddb4afbcc59b,2023-08-01T23:15:26.790000
CVE-2021-41356,0,0,638ae7f72b9fe00ad801a2e152053d99b317b7516117ed6c08722d69989a1bc9,2023-12-28T16:15:50.600000
CVE-2021-41357,0,0,1ef30a8b9609a198d62bc707e49d11848f73bcc5a21dc4c652595304d40397e8,2023-08-08T14:21:49.707000
CVE-2021-41357,0,1,4c8f03744fe6ce2c22ed081e9328fcf992dab47bb1d4cd370979f7706d39e7e7,2024-07-02T17:03:44.287000
CVE-2021-4136,0,0,c3fc062bfb707c8a230d1ec8569df933f96f8da63f52ae14e149f8a6e6573d3d,2023-11-07T03:40:14.043000
CVE-2021-41360,0,0,1c7ef35794ad2c9022722cb0769d620fa45263dd2e862abb8c8d15815fb48a0f,2023-12-28T00:15:08.723000
CVE-2021-41361,0,0,89d7bd3d55e6c2d29e9305a23e9c6ee6801b87761e1c40e4c7936e3129687e94,2023-08-01T23:15:27.420000
@ -188200,7 +188200,7 @@ CVE-2022-0843,0,0,5765dc56acf4290444fe2b59f192b0dcf2fe532db665a6d78784d8f64baf4c
CVE-2022-0844,0,0,87a034a852bb55ca2e48da2dd4c60d2d9bc9ad36b747dc05edecdd61f37f4ac9,2023-11-07T03:41:35.647000
CVE-2022-0845,0,0,f38d6ba1a21182f41f9caa9946243aeefccbecd1f1c55a5b3ee9bcd30a401e53,2022-03-10T22:00:01.417000
CVE-2022-0846,0,0,4e6a46268f85f917911eedc95637511580f2ecfa545ce79fe21af931e4d38652,2022-04-04T17:52:40.903000
CVE-2022-0847,0,0,f0e3cdcb36327346789b2a83082b47e608566c19d4417710c6182c005b4d3e2b,2024-01-12T16:15:50.633000
CVE-2022-0847,0,1,5b7e10d23a381c8accc649416b99f8eb9945da1fbcaae03f2894c9991ca201fb,2024-07-02T17:05:01.307000
CVE-2022-0848,0,0,36dbc8dd6f08bd91aa72de430a511a2d4b0aaabba0109efa0454f2e01c319a65,2022-04-08T13:59:36.750000
CVE-2022-0849,0,0,57b1ea806e1fb0953ae4e15a80853f1ae06caea4f3c9b96d4c698a534da32c29,2022-03-10T21:44:05.230000
CVE-2022-0850,0,0,00b7c922bc22e4e9cc74480b9ccf82f53b414a710b767a2d03e480ed973d4540,2023-10-05T13:47:26.270000
@ -190170,7 +190170,7 @@ CVE-2022-20817,0,0,fb0d108f115d7c085eb2718d3b1e4106996cbb5b2887267f97911f9f40117
CVE-2022-20818,0,0,4642db56cfe5402322a93df242bf01332084e7267b82552a6b686aca6f6d00aa,2023-11-07T03:43:02.297000
CVE-2022-20819,0,0,56ad2c11fbb982549b1603628badc20f314e876827845ea128b190244576269a,2023-11-07T03:43:02.490000
CVE-2022-20820,0,0,84b47464dd88d1f78c16032b5fbd331f76eda9ee2f7574f1a3f3b114da4df62e,2023-11-07T03:43:02.703000
CVE-2022-20821,0,0,4cfe448519db7290a7f6a56ed1dd897c0660cee0d12a9c8746e3afda5b2aa9ee,2023-11-07T03:43:02.907000
CVE-2022-20821,0,1,a1d9ade0824bd4a8a7165c31c1f6d8429d3859051d5f89274b2a0f6a645b3041,2024-07-02T17:05:51.197000
CVE-2022-20822,0,0,3c04a1f9b1741d39c47947349f74302fe2fc4d775a580ceb1a0aec9e977426bd,2024-01-16T22:15:36.307000
CVE-2022-20823,0,0,54657657b8213bc80f4de40d35d0951d6e50b35e74e65194c63e934c0a6a7c00,2023-11-07T03:43:03.283000
CVE-2022-20824,0,0,f9ee9b8372b895a85c2bbd1263e2559d8e90df7da46987dc457a957677be4b54,2023-11-07T03:43:03.593000
@ -191169,7 +191169,7 @@ CVE-2022-21915,0,0,5da3e506d762426728c83f95c409c8bd33900ea96b0936120fa343cbf8bd9
CVE-2022-21916,0,0,78bd59e073fff8224123d4952fd8c669a4777545edb5eefc39f3e95e8ee4f397,2023-12-21T01:15:25.343000
CVE-2022-21917,0,0,b8cae0e7dc961e2f1ff127ee8a88070ae18c2030f51b4fa671b4227a39b3bc82,2023-12-21T01:15:25.470000
CVE-2022-21918,0,0,450251a2d63d740541b0195df2cad0494e219ea9161c7e7ef8a6b4fa7d0d9528,2023-12-21T01:15:25.640000
CVE-2022-21919,0,0,0ceed48ca59b0fa9a9e90203bc2a2332fb042b2525c8d2c11c3978cfe0ae72be,2023-12-21T01:15:25.740000
CVE-2022-21919,0,1,97c2d42c0163a4d392c499da18d85ffa5f8644ddcbd04d972636fd264711f8bc,2024-07-02T17:03:57.950000
CVE-2022-2192,0,0,65b1e929f08e9df1347ad260cdfb2042baafc4237929f0bb9f9b237b9bb02675,2022-07-27T07:23:43.320000
CVE-2022-21920,0,0,f130701a1d2ebd0423f048b85eea05e79988059fe89093f8b2605a14a88d0ff7,2023-12-21T01:15:25.843000
CVE-2022-21921,0,0,2b1ddfbe024dda557d367285bfc3a5264cf554194bfeb238bceb413a33e8a13c,2023-12-21T01:15:26.097000
@ -191930,7 +191930,7 @@ CVE-2022-22713,0,0,96db5eb5e944d7e0a46577d3b393eb06491345a151580971f1808e406b949
CVE-2022-22715,0,0,d81738a1e30590f1af20fd889c23d6f8616717c2f07a3f4897421b49ed451e2e,2023-08-08T14:21:49.707000
CVE-2022-22716,0,0,a1b48cc575391979d5cba0a59c8d8b9e7254b6fd4c8118a302675a4ac71a0b28,2023-08-08T14:22:24.967000
CVE-2022-22717,0,0,244d80631287b4da52f823ff69ba35d0108b48dbf7606114b470746dba0d43f9,2023-08-08T14:21:49.707000
CVE-2022-22718,0,0,3580a2b5e027c76329b7c4e5fae1f0d6ef64e25005135bcba4a8ffeafb6eccaf,2023-08-08T14:22:24.967000
CVE-2022-22718,0,1,032098967d678d2d7ae130832c6b0b9508a1fb5a9ecc7b54d85378a5d971443d,2024-07-02T17:04:49.533000
CVE-2022-22719,0,0,991975d14f1789f86a20edeb853ccaf6b57a21b7fc9f5e386aeb2466982c51b9,2023-11-07T03:43:58.290000
CVE-2022-2272,0,0,bb841b37bfab385d7683780a0b5187a3da28d31b2cf5ca85eb96ecaaee81b705,2022-08-08T18:11:00.867000
CVE-2022-22720,0,0,f9a27888313856d5e17caac45082fda992e82d100e300295d2518dddddb630f7,2023-11-07T03:43:58.403000
@ -192123,7 +192123,7 @@ CVE-2022-22957,0,0,b0e455b8c325550bac01d6ba75948d1141f3e77566aa930df32e03a432991
CVE-2022-22958,0,0,e64c9135760866499a1abd693a21d09f2d0503addfe40e12a8751287166b7977,2023-08-08T14:21:49.707000
CVE-2022-22959,0,0,343c65c1b8955147616df892db729d40c275f880f135732843af4abe843ada9e,2022-04-21T15:15:50.647000
CVE-2022-2296,0,0,6870ae78d50ea7a7e7d94429968fa45b904f23f3abd4f00dc1466477472382c9,2023-11-07T03:46:27.157000
CVE-2022-22960,0,0,d17d1b5da7f72154c32fd101294c275155098be3bbe92368e1610d0ee36d6dc5,2023-08-08T14:22:24.967000
CVE-2022-22960,0,1,823d00bf158ff8f38b442034faa76bd7c1268eb8bb1ca640d3e861840f48e89f,2024-07-02T17:42:53.177000
CVE-2022-22961,0,0,67cee2228323ec37bd4118df1ed9664f1f85314d9e3f9380aee384580bba62b7,2023-08-08T14:22:24.967000
CVE-2022-22962,0,0,a42bb2362965967fd99bbf6e8b524012212d4e10e4942fa16c4bb2dd5d7a7cba,2022-07-30T02:38:21.937000
CVE-2022-22963,0,0,ef70678e16701b53f66c30a72b13e3119cf96d6e7ae90a2a4c1a563fa934f4c1,2024-06-28T14:08:19.670000
@ -193955,7 +193955,7 @@ CVE-2022-24971,0,0,8813b2cbcbdfcdb3d2551f98741852823972f0437c19d02803aa92ae77828
CVE-2022-24972,0,0,ff25af505f4f0dd668cb5b4be005de92ea1a611dd1bd495bffeaeacf84032396,2023-04-05T03:34:41.627000
CVE-2022-24973,0,0,4f2774089e5d8624f32d72060d3fb1670abe5774d25a2d686e3a168588675f4a,2023-04-05T03:35:31.440000
CVE-2022-24974,0,0,22e65caed3f1d91b3514340d7785bc4ee31a352ae535236bc58d89bfcd8f6e2a,2022-05-11T00:21:33.083000
CVE-2022-24975,0,1,090928d5f9d7c099d5773345efee0557e0185c91541eaf0adff9eb64b31ff24e,2024-07-02T14:15:12.013000
CVE-2022-24975,0,0,090928d5f9d7c099d5773345efee0557e0185c91541eaf0adff9eb64b31ff24e,2024-07-02T14:15:12.013000
CVE-2022-24976,0,0,31661283d2786499782b63acd092f930452e2ed19a21bd1640446362c7ce387b,2022-02-23T15:51:09.573000
CVE-2022-24977,0,0,3634ec2fd28d0b35c35bb7be3d126837aa7e7544822ab4b8b3240fb485451799,2022-02-24T15:12:00.587000
CVE-2022-24978,0,0,e79beae88b915f0648155545884d9044098c10614a8e9598485a9a1764003d9a,2023-08-08T14:22:24.967000
@ -195516,7 +195516,7 @@ CVE-2022-2690,0,0,9ccee300862d6d7bbc6e837b6f51cf05ca10943dc2ebfd10e15d97f9b0229f
CVE-2022-26900,0,0,f4466a0a1fd0ec11dbcbd1a9949ab672b73693cfa2a3fcb54bafd9f3ebc4670d,2023-08-08T14:22:24.967000
CVE-2022-26901,0,0,5a4bde5346701605452717ee6d6be3293cfa34b4baff815527ef4768a20cbeca,2023-06-29T01:15:44.737000
CVE-2022-26903,0,0,031e9c77ccdf39ccf9d770cd9cb98897d395cbea26916d592df6b7b5cbbb97c2,2023-06-29T01:15:45.140000
CVE-2022-26904,0,0,acabbcfc9bc0185ab79830e9cd3e02d121aaeca16658b4722658c80909f66edc,2023-06-29T01:15:45.370000
CVE-2022-26904,0,1,288dd5cae616a4b6c0aa528be3bf7bf16d1ddbcad8e2af7470c4d5feff5050ef,2024-07-02T17:05:13.203000
CVE-2022-26905,0,0,c53a5fa3be64988da4a84237cbc3c7d270d69ad8a990c84b999e6f46780c5a2b,2023-12-21T00:15:12.523000
CVE-2022-26907,0,0,3b9eeb6656c64ea0d8b45f2bfeb488615cf5cb6a945c0823ef4599db9797938a,2023-06-29T01:15:45.540000
CVE-2022-26908,0,0,73da07a5c8e86552c6b907f242ecc72a8ac9a9367d01158f75383acf0b610e3b,2023-08-08T14:22:24.967000
@ -197560,7 +197560,7 @@ CVE-2022-29455,0,0,9c5dc89c05b154b785f3a5610346dbe1503d8edf2563756df75fd01e7f50d
CVE-2022-29457,0,0,6b981062523aa94e1762e5207ca9cc8b9c096a887de955756126d88e12d55404,2022-09-30T13:08:20.750000
CVE-2022-29458,0,0,ddc8ca6cd8e7c9aaaabf281436c7c9a039810ba3fe503a787193b84cd69727da,2023-11-07T03:46:02.100000
CVE-2022-2946,0,0,abe926974f6957b6e2c847746b2ef4feb0b08a1800110be0d1368d232d23f694,2023-11-07T03:47:07.090000
CVE-2022-29464,0,0,56e2b3407ba54bed239e9a666b08e261a0e5514a3eab66a5c8aa3c5f2a706d5e,2023-10-23T22:15:09.020000
CVE-2022-29464,0,1,c3590e76cb7ce56d466947be6db828f7a1aaf5e5f40225f8667203a65bd6d93a,2024-07-02T17:05:29.787000
CVE-2022-29465,0,0,5b6dcc5c0f77ee774fee4e238003b6d7a6489f11a16a03de0aec7c240b3dddf8,2023-06-28T20:30:42.897000
CVE-2022-29466,0,0,99119c9442cb6a6c2855d65ba03b6da347f74d22111023fa1029066266ae741c,2022-11-17T14:30:33.450000
CVE-2022-29467,0,0,1143fcb3a0c9c9f97e0e205be2d386c65fa913efed64a904ec37689386a40ea4,2023-08-08T14:22:24.967000
@ -199750,6 +199750,7 @@ CVE-2022-32141,0,0,5880d60a3771522b67e08f864ba643ee2b9b55160ed9eeae49063bacfc683
CVE-2022-32142,0,0,e9068ec5be5acecf1c3f488a826861b46858515684271b8424efe8c754e7881f,2022-07-01T13:39:07.487000
CVE-2022-32143,0,0,cf7538155911376e88410e495c50c583a51dc75b51ed208ff46901243b662835,2022-07-01T13:39:21.567000
CVE-2022-32145,0,0,dc98fa15bee9a2e0742051b33b91aea4c0bbbab4f3d0a2f66450f06d5004715e,2022-06-22T17:49:29.603000
CVE-2022-32147,1,1,a2264fd8bcc7d6a0a5e02480b2de1eb82ec9c14ea909f7a9a18a929ccf930bdc,2024-07-02T17:15:03.273000
CVE-2022-32148,0,0,46b96a977bf761a0dda57d519c3ae477abe5dd263532e6e3055dd8a9e54e2e38,2023-11-07T03:47:43.703000
CVE-2022-32149,0,0,d42d6deead221174e5d5939bfe29f04cb5a46f198f674d400c9ee6ad45539ce7,2022-10-18T17:41:31.897000
CVE-2022-3215,0,0,d5b75529f40366438ebc6616356c715476399c0df7d49a008285fc3b6b518c61,2022-09-30T23:06:38.343000
@ -199780,6 +199781,7 @@ CVE-2022-3218,0,0,52dbf747a9afa2cde6133eba657f3d1d9b8ace77ff677bca0cbdc94eab6514
CVE-2022-32189,0,0,67443e803e8197d00bebdf93b86f4a8b3a478dee02e65bed472ae2e9cc2aedec,2023-03-03T15:39:14.423000
CVE-2022-3219,0,0,084024c36535ee61b8c7ea01b8c9253403e6de48bd7cc30076d208c3be38d302,2023-05-26T16:31:34.070000
CVE-2022-32190,0,0,8448fa66ca64eef8545cf21e5e1478a07d9effc57dca04a66edd9362cf209c17,2023-11-07T03:47:45.847000
CVE-2022-32191,1,1,284a2ad5c84cd6d3a95a25fa8e9ef03d4b0b084cff544b595032c7a9e8ba6be3,2024-07-02T17:15:04.040000
CVE-2022-32192,0,0,7ace6f96a8a1ca7b3905801ac9a2f6362ff7a9324fe36b933e549625b3aad00f,2022-06-22T18:02:44.270000
CVE-2022-32193,0,0,7453cb0ddb36a495cbcf9d8bd1b996b46edd375f73df02809d3e662842d77505,2022-06-22T17:53:17.763000
CVE-2022-32195,0,0,8096834904a82a71537b6c5a9104b1ed6499bfacf28323cc0516171685bfee2f,2022-06-15T17:24:55.327000
@ -201349,6 +201351,7 @@ CVE-2022-34276,0,0,1796190df6ca2ff53aeae0c0a5d260c003d223c0602026b61bb5121452eaa
CVE-2022-34277,0,0,544dc44dcc04aa4b55058487e2bbb8f45a54470c193df0407263596446fe1b20,2022-07-15T18:54:43.820000
CVE-2022-34278,0,0,2dd5b7c5234f378f2fd74224993c9b9c7cb461a5fc2d8f1ac124ba0116c03e02,2022-07-15T18:54:23.560000
CVE-2022-34279,0,0,f4f8ff039212eb77ce398ccbf9d1d4dd206963b855c1d3c145a4d645691e1179,2022-07-15T18:53:57.187000
CVE-2022-3428,1,1,bafdc88f88c7d648b805fd5e29234235ff2262af094e371a054ecbd3a0ced5d4,2024-07-02T17:15:04.250000
CVE-2022-34280,0,0,b485d8185a331ff106baeb0cb30c316ee6be2ac5ce83e800a0f98016c70946b3,2022-07-15T18:53:35.003000
CVE-2022-34281,0,0,601926cf274e97e66909d96f36acb911fe520101e3f5f637f861ba59969fba69,2022-07-15T18:53:13.403000
CVE-2022-34282,0,0,6f04b93850d2a629215f3de2a6cad58d5ed97dd04aef68d3289c0da8096d3e3b,2022-07-15T18:52:53.090000
@ -207212,6 +207215,7 @@ CVE-2022-41714,0,0,3d992632e70944c2777ec7f0ab8b0b95133d9d07d6e8ee3dd4dceaa329069
CVE-2022-41715,0,0,f9da7867b68d520f4291ea2a7e687fe77731c24e548b102aa4876cb81f87c298,2023-11-25T11:15:09.940000
CVE-2022-41716,0,0,2d4e69e846933873fad7b0bcb71439312dfcfdbd8e446f94f02551a0762f9ae9,2023-11-07T03:52:55.307000
CVE-2022-41717,0,0,5fbb525270285c6e4c9c459b2130905903c24dcbc93189914efc7738176a33a1,2024-01-18T03:15:55.570000
CVE-2022-41718,1,1,ede4edf1910fc09ee7773999b62e824282ceda5088eab3fd9bae27fdceb8b0f5,2024-07-02T17:15:04.360000
CVE-2022-41719,0,0,302a056d683e7101bc0d5b0b02db4858d9e9105f6fe66f1c46ebd32e515f62c8,2022-11-15T20:55:04.397000
CVE-2022-4172,0,0,64025df20c96332be2db3f84b41266f6fe86c3b39d54f04a760c5a624cba26c3,2023-11-07T03:57:08.283000
CVE-2022-41720,0,0,6568be6c4bc3f73042731bc6bf6456622dc1f9a42a850190c8a1d5a7d47278cb,2022-12-12T14:58:01.733000
@ -207220,8 +207224,12 @@ CVE-2022-41722,0,0,af33da142c39eb6b0c34e441f9376508756ba7534631fe0ccff73544d6c0d
CVE-2022-41723,0,0,0076e20d621d95a94b47a9711d3cb5682135fcc7057412c003f31e1d8e070df2,2023-11-25T11:15:10.090000
CVE-2022-41724,0,0,bbb86a14d47e8926c417ff1b559a95df6212058926b563d89647832c10f7e138,2023-11-25T11:15:10.180000
CVE-2022-41725,0,0,0ee50681df0b051293442550e32df3c81297d1afd6753c66844182dde56af724,2023-11-25T11:15:10.253000
CVE-2022-41726,1,1,40763e32d05571e9a7090b5e1b87e29cc9bdf9997bb565eb0b4ab9abebbecf3f,2024-07-02T17:15:04.430000
CVE-2022-41727,0,0,ee972e89c7dbeac6aa33247cb008991f56f99cb83ac4ae7e7787e501f9567aae,2023-11-07T03:52:56.437000
CVE-2022-41728,1,1,619b960dc452b0bd6ec1f9d51be5ad5cabe7cd5e57cb3f441624ae5535276079,2024-07-02T17:15:04.497000
CVE-2022-41729,1,1,1139835bfd16cf88433c3f98c00fce31f1a590708ef9e010aeb69dbe67a8d36b,2024-07-02T17:15:04.550000
CVE-2022-4173,0,0,8506eb0c8dc73be47c50aaebaeab80d9d70f8b37ddfef3b91dabf8e6cd6dde17,2023-11-07T03:57:08.523000
CVE-2022-41730,1,1,66c48bcd389ec124a13d8e7a1172d96ac567f8cb5d58f11ad3c09aca0a7618e0,2024-07-02T17:15:04.610000
CVE-2022-41731,0,0,e0267ccf57d70a133d483491e2a8faa5bbece46abae75f1abe298fb27ea80da5,2023-11-07T03:52:56.663000
CVE-2022-41732,0,0,b809d7598d18cb2e29d50981c97be64e494a28b1a90c3178cacc76b9f89fed23,2023-11-07T03:52:56.800000
CVE-2022-41733,0,0,ccaa998e5d6e6744b8770a28a0834186fea86f80959a9bbcb0cfc05483aedfa5,2023-11-07T03:52:56.937000
@ -229275,6 +229283,7 @@ CVE-2023-39320,0,0,b8ac63ce5bddd3752cedad834ce758a0be405e0116a128776e0b9ef3b259a
CVE-2023-39321,0,0,9253d7cd308380037cca4a352abbf69da1dc18172dfd2b2d47e45486e80fa1aa,2023-11-25T11:15:17.700000
CVE-2023-39322,0,0,05de96d1587e8bb831da70fcab0d236075939d35d419fe8ff0303141455f0262,2023-11-25T11:15:17.847000
CVE-2023-39323,0,0,d2da5a246500965f999a8d84c29008728f75c547f230a13d2193b126917ed378,2024-01-04T18:04:15.457000
CVE-2023-39324,1,1,6ec2f79fc00f25fb9c6c7b8459112c051220341ced94e2f114cadb7ed5dacee0,2024-07-02T17:15:04.737000
CVE-2023-39325,0,0,58abd083daa7fb16a442cdfaef715883a0fb11da9a8652276862d7d26f2ab493,2024-04-28T04:15:09.877000
CVE-2023-39326,0,0,90a833293ecdbd92e4a1c1828cadca50fa959e82465478bc6c6b2b71065dacac,2024-01-20T04:15:07.890000
CVE-2023-3933,0,0,2d784fa3bad269d318314e0780fb5ab15203b6d9670481cab4bae609ef1ad2b5,2023-11-07T04:20:00.337000
@ -237062,7 +237071,7 @@ CVE-2023-50363,0,0,007beb9c9c826c8ff3ba07c2de46061e06937bd3e1177219f5c49a9bb2333
CVE-2023-50364,0,0,e47604eb43c17aadb72d581e49581bad4589eac6cac682ed1340e87038a754a0,2024-05-09T01:15:06.410000
CVE-2023-50368,0,0,822f875a462c17b899bc5907af8a90bdf88b03f70fa2a47891ff0cc8e05f7ab1,2023-12-18T18:51:37.847000
CVE-2023-50369,0,0,5473010ca0d536c23d0126860849245f23a6b5fb4418917816ad2a87231e17a3,2023-12-18T18:57:46.290000
CVE-2023-5037,0,0,f164cfec8e7f1d00c559d76365ccbd071d432f38c0203cbb40689a289695bcb4,2024-06-25T12:24:17.873000
CVE-2023-5037,0,1,b61f9e5293a245d0731630bde8c8e331452dbd9240703e4e53835fd60155124e,2024-07-02T17:47:47.367000
CVE-2023-50370,0,0,cb41cea2750640931e440868ffef0cc7f55b13bd1e4ad5828cdfccae735b6980,2023-12-18T19:02:02.957000
CVE-2023-50371,0,0,04d4e098cc36a4f0bfdfb2f80d9ef226cb1335fcf83d29c3ea30e956873d64b8,2023-12-18T20:14:34.887000
CVE-2023-50372,0,0,f1e1782fe08d93899978169515a94f6ddbf7dcded46e93a6577a24065511b513,2023-12-20T04:28:48.440000
@ -237945,9 +237954,9 @@ CVE-2023-51772,0,0,3ee0393fcbe2068b060b6a10337e40a5dcdda0fa3bcc32d746c925ed497d6
CVE-2023-51773,0,0,3fca7856a212f205584315672e155b01f780bc641443cddede1df375397bb534,2024-02-29T13:49:47.277000
CVE-2023-51774,0,0,fa7215009a889524612ddcab0550ac62988088568fe35ca16c3143d27b6818a6,2024-02-29T13:49:47.277000
CVE-2023-51775,0,0,56112969393cba50f3c02ebaa680b83b2f396c5e9abd491c608f39f2f1490f3b,2024-02-29T13:49:47.277000
CVE-2023-51776,1,1,b427a472ef85c0343c5d85edd91c5ea245b4b053a3188a1021b1b93c2f08e476,2024-07-02T15:15:10.663000
CVE-2023-51777,1,1,cf3c18e1ec0304deb64f1028364f842882e73f13ad83c3b835d61fbfc303d68e,2024-07-02T15:15:10.807000
CVE-2023-51778,1,1,06152bd58cfc9bb5c6771937bc41dce82cc49b077c3dc0779f5ec789c28d0716,2024-07-02T15:15:10.890000
CVE-2023-51776,0,1,42085a5dc1e7cc0d65e1ecf4f53bdc4932afe9e352241611669b97927663227a,2024-07-02T17:44:45.700000
CVE-2023-51777,0,1,dd299ab2c1dc943191542e0dafbf698bd715ed1bd2be8987b77ff7d7cb649e9f,2024-07-02T17:44:45.700000
CVE-2023-51778,0,1,8d24b7800dc3e77184b64217243b355c2d3d3c6c7e006a091a3adfe32c39cb4d,2024-07-02T17:44:45.700000
CVE-2023-51779,0,0,136b49f1980c03eabf3788cd7ee971a18154ff13396a5c4237bba5ae9126bf42,2024-06-25T21:15:51.623000
CVE-2023-5178,0,0,90a10f9054feb0d5eb4d27e4016e7cb63b10b7b343054fea2022771f54b9e5f0,2024-06-18T15:10:41.817000
CVE-2023-51780,0,0,79cd6e92464f536e130fa2000a4063f5cd270067f2c2bbfecbf436eed213aec5,2024-04-19T07:15:08.857000
@ -241453,7 +241462,7 @@ CVE-2024-0975,0,0,727e762e9bf21cc79d41b3d973240a06501d145479fa8fca0d0cfdc6efc382
CVE-2024-0976,0,0,961ca83ff90147b357fdad21a4ce2284407f8f5fed2f5570590409615417a9e7,2024-03-13T18:16:18.563000
CVE-2024-0977,0,0,265a9a088dbf9179612f3eba4d6866f7160bf19014cca832dc6a54c521c233b7,2024-02-14T18:46:52.707000
CVE-2024-0978,0,0,57707b936b24299b5240c63ec392dd38bc59dc5fe8314fbaf47e7586fd61e0f7,2024-02-29T13:49:29.390000
CVE-2024-0979,0,1,7723165f13ecdb2435ed2fb1f551bb8ae4a819c47830717a3e66000b31abf2c4,2024-07-02T14:51:28.827000
CVE-2024-0979,0,0,7723165f13ecdb2435ed2fb1f551bb8ae4a819c47830717a3e66000b31abf2c4,2024-07-02T14:51:28.827000
CVE-2024-0980,0,0,f315f58bbc7d421e9e9b581f53566d3945bc347b1ca4f3f65618a1b592d8dba3,2024-03-28T02:01:13.303000
CVE-2024-0983,0,0,ae05daa2819fc42abf2cc0aed0ec977b40d58c31465549c2cfe7791e8c6cecae,2024-02-29T13:49:29.390000
CVE-2024-0984,0,0,32a53697d4c68794e0f7d534229f2199d1ec3163c027c80a4fc5f01ab0bb8955,2024-02-29T13:49:29.390000
@ -241998,7 +242007,7 @@ CVE-2024-1561,0,0,0731ada3ed46d337aecd2791ca3768eb3d320940fe607465ad54edf665eeb2
CVE-2024-1562,0,0,19bad0af1c61f457a105e66f4eeb0fde8d2d444a29c6c496b32c177adc1d4546,2024-02-22T19:07:37.840000
CVE-2024-1563,0,0,ac871d8436144a6ee546ec0773b6ca1aaa07e76619d71421483fc96f836a0fc4,2024-02-22T19:07:27.197000
CVE-2024-1564,0,0,84875cf797fa64328b336ae33772e46886c72657e3c983b9d184a2a3d50ffd3e,2024-03-25T13:47:14.087000
CVE-2024-1565,0,1,72b0af25fd797839e199b47cdb29c978723438d785ffe3a476b917f63a57bd37,2024-07-02T14:51:17.970000
CVE-2024-1565,0,0,72b0af25fd797839e199b47cdb29c978723438d785ffe3a476b917f63a57bd37,2024-07-02T14:51:17.970000
CVE-2024-1566,0,0,bcb44d286e02234542f3c248bc98cc24bc3480b83f57b1e48ca76a36f687c2d5,2024-02-28T14:06:45.783000
CVE-2024-1567,0,0,ad9a2d9ae61853202c4b282f0e03e6ced645aef0490171c084890c326779d06e,2024-05-02T18:00:37.360000
CVE-2024-1568,0,0,7ab3f38998f0710d2dd36692efaa4d3f1b1bcb35035794e68e81071a3e18c01a,2024-02-28T14:06:45.783000
@ -243261,17 +243270,17 @@ CVE-2024-21452,0,0,02d31b115a697c05db35da661c22664c85e8181268bd7542a64483c043b4b
CVE-2024-21453,0,0,8dc35af31e64bd045ded864e7fcc07424ae51270f4588b919a1a9152eb1b9be2,2024-04-12T09:15:09.977000
CVE-2024-21454,0,0,b257edb5552eb473b4503004e3fc64a602a43324cbc07ac68d19d0a9bcb868c5,2024-04-12T09:15:10.083000
CVE-2024-21456,0,0,07dcd071bffa0c44180e19b48a0ffe105b7eb0f50ab8d8ce853bf480a4beba79,2024-07-01T16:37:39.040000
CVE-2024-21457,0,0,c51a832eee10458dc0aeca1412a2479ea404399a1c81e24c09e674525c076ae9,2024-07-01T16:37:39.040000
CVE-2024-21458,0,0,14c2fad17d35a8a4f6efb9de30e88872b7b8cc29e70f5a85ef675e3349179df6,2024-07-01T16:37:39.040000
CVE-2024-21457,0,1,0397b493f3a90fa8856b8c3877d0f328b647dc8423fd236ad4c3272a6eecd90f,2024-07-02T17:49:35.410000
CVE-2024-21458,0,1,f9498022a3fab8a9690b0ccfe79640e4fd1995291accc416b68050d29e4c1e40,2024-07-02T17:57:05.057000
CVE-2024-2146,0,0,18e858010f752fe48eba92f669210f471df0d7d5120f3dce1efba4919f090b2b,2024-05-17T02:38:04.200000
CVE-2024-21460,0,0,0e9df1da73e8e89d3208da73d1fe52ccb4cae7458b59e2c4118f61fa4495704a,2024-07-01T16:37:39.040000
CVE-2024-21461,0,0,9adf06ea3a2d17b0595d893a4b01e010e5ec314285ba3819f863f42f1203f4c7,2024-07-01T16:37:39.040000
CVE-2024-21462,0,0,7f4f62b93923e70e6f0061c6a6a972af20bd3d80676b9a4d7adc24c73365f1bf,2024-07-01T16:37:39.040000
CVE-2024-21460,0,1,0c869051a7bf5c102fc39f7d38dcbd0fc846e7c052df96073a2167a652c0c0f9,2024-07-02T17:56:38.783000
CVE-2024-21461,0,1,ac25505af13a35361ceb7f16605f0cfca259ef68ed10829c0d3e31293d323092,2024-07-02T17:55:28.060000
CVE-2024-21462,0,1,5cedd65c73985f6dde9484e8ad163be8c223c2d127fd4d93cfd5f4315dd6cce4,2024-07-02T17:55:01.690000
CVE-2024-21463,0,0,8f929d15ea58ffe4c907e382121f59ff2b72bea6ff85918078d89258f2adb890,2024-04-12T09:15:10.193000
CVE-2024-21465,0,0,3e1dac5abf4816a2f1def9ac836d078377b5f3e3e4971c3ea83b094120784cb7,2024-07-01T16:37:39.040000
CVE-2024-21466,0,0,214b2fa5c6140f13f2d523313417fd06b636cd4166c5763ecef1308a2f4969d7,2024-07-01T16:37:39.040000
CVE-2024-21465,0,1,2abb4e9679959c04d3fd667f5ec067326f8edbfe44c972fb6fe418d5c04800d5,2024-07-02T17:54:26.723000
CVE-2024-21466,0,1,fd9b2eb9ef6bfaac42b05c276935b6e7dd7f7ab052ceb19db5ee9ffb9e32cecb,2024-07-02T17:52:28.207000
CVE-2024-21468,0,0,f2b93df747dc8ffb1a67bf6170c8b74d59ead8db487ef5519f8ed51313b18879,2024-04-12T09:15:10.303000
CVE-2024-21469,0,0,5a0e43ca387de69963299e78ff42a35d9e2739b9a6e5573dabcf69b8593c9905,2024-07-01T16:37:39.040000
CVE-2024-21469,0,1,3f07e64b612ecb9e379befb8b585812d9468daeb4b78107092a31bde37df8b61,2024-07-02T17:52:06.700000
CVE-2024-2147,0,0,3efc249503b7d31cf02f2428bf4511d025fa9f2f838acc89eb93938f9981992f,2024-05-17T02:38:04.293000
CVE-2024-21470,0,0,acd6c1381826abd35aa0c5fc63da2cad3d21675cd9907feb7858c393a543a7f4,2024-04-12T09:15:10.433000
CVE-2024-21471,0,0,e1abb0c50539103876297a632f25378f1444ddda8faad24e49920b56b9ea4a01,2024-05-06T16:00:59.253000
@ -243284,7 +243293,7 @@ CVE-2024-21477,0,0,2dfc1d466e14269455d623dbe436a1e6d9dccf3c01b4aaeec3bd9b9f104b4
CVE-2024-21478,0,0,36dfa412cb137cba65151bfea20c0e66b2ab35d0e6033873c7da5a111874076d,2024-06-03T14:46:24.250000
CVE-2024-2148,0,0,f9ad2f00527f5c10697ce47ba63c57e584aab0240fc88e91a15c3572a9aa5790,2024-05-17T02:38:04.387000
CVE-2024-21480,0,0,8440778e45413c0e24db83877880d3ede6fda18ff0fea3fa59c66be00cec51d0,2024-05-06T16:00:59.253000
CVE-2024-21482,0,0,7561b73ed526473db4d45c97eb162833eab13e81a0d452b67db4bb6caf2e0cd7,2024-07-01T16:37:39.040000
CVE-2024-21482,0,1,a1338b6f330d2eb5d0f4ebfab8716243966b7865599de7ef86fae57578a2170f,2024-07-02T17:51:45.687000
CVE-2024-21483,0,0,9151aea81f4a61f57a2b42ef8dafe022eeea7af379bf181ee6a30f8665567492,2024-03-12T12:40:13.500000
CVE-2024-21484,0,0,5f19ab0f68120a92041bdc33d9c29463ccd0d23c1b4da1c7441e6cd0612506af,2024-03-06T14:15:47.533000
CVE-2024-21485,0,0,0775bbbb470f3ac41cc07f785a9ceabee9d1e54c43c7bfd148d7325914f9c235,2024-03-06T14:15:47.760000
@ -243658,9 +243667,11 @@ CVE-2024-22098,0,0,143b86afbf5a983f03c2f584969195c0ed3a1e44177534377f9bd3d74e39f
CVE-2024-22099,0,0,1ca221f767509ed389320bf6e17bb08d430c1bb802873593e5ee88df116cfcce,2024-06-27T12:15:17.870000
CVE-2024-2210,0,0,5a03f758877779e9677ec1f83746a6fce63214add6c369b78804c38534e8d822,2024-03-27T12:29:30.307000
CVE-2024-22100,0,0,a6ff3a70b4f3071cb6edf59573e0a019914b2e075d17d6c1c64c20010521b0fb,2024-03-01T14:04:26.010000
CVE-2024-22102,1,1,eee27233e2faa7c03cba348572f54fcfef40905ddf8475bd57dbe0bfc6a31952,2024-07-02T15:15:11.070000
CVE-2024-22103,1,1,ebd5b957b899991c3216c44746ac8eb922bf23101acb58a8626cd71ab865c965,2024-07-02T15:15:11.150000
CVE-2024-22104,1,1,c059a1366e48f0df40940cd96b733fc0cc82f66048a8e16a68b81bda81e9a295,2024-07-02T15:15:11.227000
CVE-2024-22102,0,1,d95547a89c084be0eb15a34268c23156cd9dcb017353433ab47ab8013a00898c,2024-07-02T17:44:45.700000
CVE-2024-22103,0,1,6e1d65fdb3cf474d9e88e77145f3b0071363290b216874b8510845964b73fc52,2024-07-02T17:44:45.700000
CVE-2024-22104,0,1,0c00a222c49023fb7d23209c7a2e23d50832446a91f69f43dbf37e749397fc53,2024-07-02T17:44:45.700000
CVE-2024-22105,1,1,af1c58cbed2ba7357c4b3cb20ef053301db567530bde3b44f88c2c6bacb21416,2024-07-02T17:44:45.700000
CVE-2024-22106,1,1,95a81ffb858c556ed361ac455c5d6f1f41eb92223b95426dd50fedb27842f26b,2024-07-02T17:44:45.700000
CVE-2024-22107,0,0,e3cca6041ab5ebaddd7412e3f1116f94d2eef4d2646eefe8a425a6cd027599ec,2024-02-09T19:44:32.497000
CVE-2024-22108,0,0,cdaf61a2506aec5c5c15705bb009e8054dc2f9e9fadf39ff642fb65becdf0793,2024-02-09T19:39:12.853000
CVE-2024-2211,0,0,f252c5769fd953dc08095bc92fa002da1e59442805565547bd754c92279eb026,2024-03-06T15:18:08.093000
@ -244447,11 +244458,11 @@ CVE-2024-23354,0,0,524905b4df533efbcae0403dea5cdcdf4f507ec96e09f870f5c27c0b03f65
CVE-2024-2336,0,0,858071e914ebaea9fbe161c5ef8e540e29b84f9d635c439141db287421da0568,2024-04-10T13:23:38.787000
CVE-2024-23360,0,0,a0e02beef64771c409bba62a59974a7242efe2beed7ec1a0338b8289be7e2051,2024-06-03T14:46:24.250000
CVE-2024-23363,0,0,0707bd01da1cb508f4a1ec84537ade1624792b9e876ac1f60a112ad96d849177,2024-06-03T14:46:24.250000
CVE-2024-23368,0,0,8180b4639ea83220498176de7e78708b88091a6f2a71b2bf5cf84238bff611ae,2024-07-01T16:37:39.040000
CVE-2024-23372,0,0,7519fb06aa0ed092bf1c99fb8933d24ae7c3408390ebe7fd86f7c68a2dbc9495,2024-07-01T16:37:39.040000
CVE-2024-23373,0,0,39fe96bb830b1086d3b0178680b5afc566021eecde10c0bf0afbcf30bd08a1c3,2024-07-01T16:37:39.040000
CVE-2024-23368,0,1,5726397ddc8ddada7ad85b481081c827980e0b31f00843d9c4a575a1cdcf7c17,2024-07-02T17:51:25.690000
CVE-2024-23372,0,1,23b270a28eac6f2e33d3cc96090d40d8bd34b2e6172d17ba5be5b87ce6bb3571,2024-07-02T17:51:04.530000
CVE-2024-23373,0,1,5f71e52681ce9b4c683001ee0714339e5fcbf3b0ac462fe47ab6cd76399fa906,2024-07-02T17:50:38.573000
CVE-2024-2338,0,0,2d543a556e65d2c959c15e10c3e9a74031d18693370229ae5e1770e5ef380b4c,2024-03-08T21:19:43.127000
CVE-2024-23380,0,0,377f8c128db77fa02e9a86f529bfed45986a96dff61429f9c0df47dea4c61b15,2024-07-01T16:37:39.040000
CVE-2024-23380,0,1,bf0ce83ac3185ab9d5bec787958ddc81b954eccc336ea58dd24a5df8b6433ba9,2024-07-02T17:50:17.873000
CVE-2024-23387,0,0,651b9110a70ec6d8150b78d412ab0c449da5b24d5059a74c85bc0d06b6759568,2024-01-25T02:00:29.210000
CVE-2024-23388,0,0,d9ef291f69bac73e9b23ebc37df19469f57319d5ff49c901cd1cd709d40899ff,2024-02-05T15:18:21.920000
CVE-2024-2339,0,0,fdf2e9587a4f32c10532c2236faf6d2db35a7825d1bc11064100d013b4c7d19f,2024-03-08T21:19:43.127000
@ -245472,6 +245483,9 @@ CVE-2024-25080,0,0,b71676650e0fe980740d0ba2f09b4ab96eab09f2522aeb1c79a8cba30e06c
CVE-2024-25081,0,0,37094cd80b0e02ee04bd4b4ad310191b35edfe5b1b26bd730c126ade0890fc6e,2024-05-01T19:15:22.183000
CVE-2024-25082,0,0,73cee04ee797f69b5a7d548ce52642d4be8f4f30b151a272c43f273d4c926f75,2024-05-01T19:15:22.237000
CVE-2024-25083,0,0,ecc895ce722780048524674e78ace2df40ec2c99910e00911749a5ffd9d0dca3,2024-02-16T21:39:50.223000
CVE-2024-25086,1,1,2486a20dbc230be31b45c0265918e4c1e78343efe8379ef27746c14bbd21da48,2024-07-02T17:44:45.700000
CVE-2024-25087,1,1,189fff92b1879b541729bb27a59416a8cc10248cdc3f2566012939e56a4a869f,2024-07-02T17:44:45.700000
CVE-2024-25088,1,1,35ea77a928ff967f8a8b623f0e595e0ad53ecdc9ed5356569b06ed8430196a2b,2024-07-02T17:44:45.700000
CVE-2024-25089,0,0,5efabd2c26974f37d1846cb1668b5b36df31dff51c549d5b8d4c512bfb0c7d05,2024-02-13T00:38:12.137000
CVE-2024-2509,0,0,d87071763c3f045575858adf9ceada540509d3a47b1787f91e2dde65a0044380,2024-04-08T18:15:08.580000
CVE-2024-25091,0,0,01b357047b564e780ed13b7e87b2fb8ec79ae12ad4e744cc9437e3dc74a94964,2024-03-01T14:04:04.827000
@ -246353,6 +246367,7 @@ CVE-2024-26310,0,0,cdf3231f7a059b92520dd591ab7449fe300f81e89c81c63cb479e44416fa6
CVE-2024-26311,0,0,c10525456294b75c6b4919ba396921719972a7cc08a82934dcff79f6c0deabee,2024-02-22T19:07:27.197000
CVE-2024-26312,0,0,0c7256602f4c7a7373cf9d9a58827aa9f1abc86874588a78f13a6e093c4ede7e,2024-05-06T19:53:38.797000
CVE-2024-26313,0,0,307927a31aa9525f579ecee601093796b34c0481bc031cf5fc7cd7d3e73f1218,2024-03-08T14:02:57.420000
CVE-2024-26314,1,1,0d34c3ef9621fd978ad0be298f858bcd5d61c687de97df8a2778efccfa284634,2024-07-02T17:44:45.700000
CVE-2024-26318,0,0,5a8434e81e693bc0f90a66d9a6d8655df17a4e5f3f1f4a63075d970f5e64fed9,2024-02-20T19:50:53.960000
CVE-2024-2632,0,0,ea393f116b0cce8559537657b6b48805c98531cb8a651d292d9e39cc33b1c1ca,2024-03-19T13:26:46
CVE-2024-26327,0,0,cdb018804c204ef80ecdc8daa637463eea9f06e211b3135332b7863d1171c7d8,2024-04-19T07:15:09.703000
@ -248245,7 +248260,7 @@ CVE-2024-29056,0,0,82c4eeb84f591e37e38e666909386b7e618d15d7e5328d971904ca4eca3d8
CVE-2024-29057,0,0,e3fa93bf6a4b50918bd06f45579666036581b79b8850f2791ac4719e113d2b62,2024-06-11T16:15:24.533000
CVE-2024-29059,0,0,d93ec606be992e55fa01c28ef1ad5d3cf38a06f675d6b6e016fe3fa040aeab38,2024-04-04T22:15:09.033000
CVE-2024-2906,0,0,7907d5a5cd3460f6f133374b708901f61c1d81fd1b49c6a2c33ea92916afc2fe,2024-03-26T17:09:53.043000
CVE-2024-29060,0,1,1c2e2dd3e45ec4760a7db2bd39f56f0fa193172710aaa331dac67ef957881ea6,2024-07-02T14:19:37.890000
CVE-2024-29060,0,0,1c2e2dd3e45ec4760a7db2bd39f56f0fa193172710aaa331dac67ef957881ea6,2024-07-02T14:19:37.890000
CVE-2024-29061,0,0,a31dff802cf963e2879fb3cc29c95735e93be72849d5c1e87c5d3416671642f5,2024-04-26T15:57:55.730000
CVE-2024-29062,0,0,1d53838ab94a7d925862a1a5153e7725a52f2346542bc98f0648bd0406cc991a,2024-04-26T15:57:33.763000
CVE-2024-29063,0,0,9dd92692e86c18107436ef4a5c609dee7af8a065ae51bf02187ee7cc8285048a,2024-04-10T13:24:00.070000
@ -248860,7 +248875,7 @@ CVE-2024-30049,0,0,c9b68946c51550d1d84d266d8b5652717f9d8c71c9ece7fbafddfc1dbcf97
CVE-2024-3005,0,0,3c8eaaa1feab3a9dd15a4bb7ad0f233dba19b722fe013443779e312c69c376cf,2024-05-02T13:27:25.103000
CVE-2024-30050,0,0,046221e4f9bbadd6d8ff30d6621a0c15596646e6a7436f074bd91a44ad741c8d,2024-06-11T16:15:27.137000
CVE-2024-30051,0,0,4ac4285f8006cbbd83ffbb55080b4ef3b305ba722d6583b382438526b24254f0,2024-05-16T20:27:22.830000
CVE-2024-30052,0,1,bd8b9f6cadebfe1e64f7416eccb3e938316cf292f11c0d4ac3022e963441dd3a,2024-07-02T14:20:55.230000
CVE-2024-30052,0,0,bd8b9f6cadebfe1e64f7416eccb3e938316cf292f11c0d4ac3022e963441dd3a,2024-07-02T14:20:55.230000
CVE-2024-30053,0,0,de0d3887ecd8088140dfe95e3f9311cc6a39bee41667e1f60a9fd1f03b4a7c20,2024-05-14T19:17:55.627000
CVE-2024-30054,0,0,4bef1769b874d4ff9047765ac17cb428233424000152b0497aba8ed1ea3cade9,2024-05-14T19:17:55.627000
CVE-2024-30055,0,0,3c1bf54fd3fe6c5ab3703162f359c88c3cd7915d8f1fdb651cdd28bec89280a6,2024-05-15T20:15:11.047000
@ -248870,8 +248885,8 @@ CVE-2024-30058,0,0,e6962890a9824ef753f4a4c15f3b5e8d5d77a7cacfc1a8193e6f995befab2
CVE-2024-30059,0,0,0e87263445f5c97fb9a9f1ad7d5045c3390ca52e934287a08ee2b0f2dd5a42eb,2024-05-14T19:17:55.627000
CVE-2024-3006,0,0,a3349f2fae283580197c9d70e5010e27f73c2425a5df8de3e4af5a848c49e4b6,2024-05-17T02:39:40.117000
CVE-2024-30060,0,0,2d2a2a35846e7a2325ed3d83fd6e93b127058a9b2ed174c7bcd985716e44cfaf,2024-05-17T18:36:05.263000
CVE-2024-30062,0,1,4bfd7750976332cbf3138fa7bc5c8220095dd88b267408654f472c79216ff00b,2024-07-02T14:23:40.820000
CVE-2024-30063,0,1,a6c18ee19af78813a7336be786c53d09e4ab4504175485aac84c4fe78f9e753b,2024-07-02T14:17:47.710000
CVE-2024-30062,0,0,4bfd7750976332cbf3138fa7bc5c8220095dd88b267408654f472c79216ff00b,2024-07-02T14:23:40.820000
CVE-2024-30063,0,0,a6c18ee19af78813a7336be786c53d09e4ab4504175485aac84c4fe78f9e753b,2024-07-02T14:17:47.710000
CVE-2024-30064,0,0,7a179afa450eed85d7ee628ffb2feb5ee613adc6c371f16fb51f2d7c19805799,2024-07-02T13:51:08.770000
CVE-2024-30065,0,0,ce7f214a2d94686693a3c1f057c7c93aaecce95ce71c8d6f1ed8b4f60a48ee92,2024-07-02T13:44:37.760000
CVE-2024-30066,0,0,7682cd238cdd68fb98c54fcc32e922c3c1a47efbe79076306aa7a06e38e6735a,2024-07-02T13:47:47
@ -249081,7 +249096,7 @@ CVE-2024-30310,0,0,83f49301bae9d9ce1f4f10baaa19cd19c5d8338561e896cd48c650144ecc0
CVE-2024-30311,0,0,9d217824227954911dd5a3bdb06324510e4c2d800d17c3d3d8e7c71eb2bd297d,2024-06-10T18:15:30.757000
CVE-2024-30312,0,0,07602b35ce17259a48da425f51ef913f48381cf49e65fcb7583eae5ee1007be0,2024-06-10T18:15:30.880000
CVE-2024-30314,0,0,1c6263a9ec0b1b4c544180b477adf01c0311e37fed95feb72da46c3babb52d01,2024-05-22T08:15:09.777000
CVE-2024-3032,0,1,3ff0e9ee56a036f5520ddd218b15f57f43b4ef20b5bd57e06a8e81c2e3d08ed1,2024-07-02T14:45:48.633000
CVE-2024-3032,0,0,3ff0e9ee56a036f5520ddd218b15f57f43b4ef20b5bd57e06a8e81c2e3d08ed1,2024-07-02T14:45:48.633000
CVE-2024-30322,0,0,82127178dd2c4390457a625b1b802dc21960ed844c23f33ac3f61e8d8c162a4f,2024-04-03T17:24:18.150000
CVE-2024-30323,0,0,4ba71c995b9c718766f72cb8f425ef56f31d70d4141fb317ff1b84d1d4bea62f,2024-04-03T17:24:18.150000
CVE-2024-30324,0,0,b34850e80ab56aec12159793bc4cf321b46343aaa9dfe2615612dc24168ff93e,2024-04-03T17:24:18.150000
@ -250703,9 +250718,9 @@ CVE-2024-32745,0,0,7c7ddc449e8c742cc889f2211c73cf5b3fd566001a852588319e29620ec00
CVE-2024-32746,0,0,15529f833c25b7b5b5022877593c49d5afec10018bbf65b56334a694e0bc455a,2024-04-18T13:04:28.900000
CVE-2024-3275,0,0,911ea91aef7f88befc82f4227a09867c3c1d7c5e1f1eaf9e7dcf15d1eb26a443,2024-05-02T18:00:37.360000
CVE-2024-32752,0,0,397ccf54ed3571b7d395be8ff9092e3859eac6f23898bbdd1a86af941d776e4c,2024-06-07T14:56:05.647000
CVE-2024-32755,1,1,ee750fc90c938d8e395298289e31538795619218408e9a034300ac02956885b3,2024-07-02T14:15:12.333000
CVE-2024-32756,1,1,9b8148236607120d8d8516e4d536f83bd390acdc921e0b9c079c435012adbae5,2024-07-02T14:15:12.567000
CVE-2024-32757,1,1,3b8ca86766d204287cc5bbc553ffc40612a471032b69d97315db0c4250b1fa79,2024-07-02T14:15:12.783000
CVE-2024-32755,0,1,b3528b194ab6699a4c0497b49f6b23d52c2b5f75510289aa8a21b02eac9ad3f2,2024-07-02T17:44:45.700000
CVE-2024-32756,0,1,7fa05cf39c6d3a5e903ec1a0f9f35b8a778ea0981647bd11b5e6e512e0af0b8a,2024-07-02T17:44:45.700000
CVE-2024-32757,0,1,324c62945352fac9f5590a80aa452fac7e1848c97df1fe1af0c1554b075a0f46,2024-07-02T17:44:45.700000
CVE-2024-3276,0,0,b9bc05998c576f7ede7b358eceadf281580f2a31856045bde52e20100a737365,2024-06-20T12:44:01.637000
CVE-2024-32760,0,0,67074d2cb149a548f5ca201a895261189c469e9d7c384fe074a8d7f159cb359a,2024-06-10T18:15:34.203000
CVE-2024-32761,0,0,ce6e18957362490cfabf91767930741349195476d374863f1eaf0c6108afcfd0,2024-05-08T17:05:24.083000
@ -250858,7 +250873,7 @@ CVE-2024-32926,0,0,4d59d95e67f06dae310ae8a2d40220ef0668f77838338af7211426ab3456f
CVE-2024-32929,0,0,fca85852b4f9b4be325600280f8ac834cdec05282edbd84dc56f53976dad74ad,2024-06-17T12:43:31.090000
CVE-2024-3293,0,0,3552485a27a6b6c8b2cadd17fbdb3e630238722099a3e2d8d97b0f239cd2dc1a,2024-04-23T12:52:26.253000
CVE-2024-32930,0,0,227270845521cff2d941eab53c1796fbaed28c3c5549cca0d58682d82af5d494,2024-06-17T12:43:31.090000
CVE-2024-32932,1,1,16794b65474e8fac335b44df3b1e615d79ec3cb16b7ae5a142bf20467fb69427,2024-07-02T15:15:11.373000
CVE-2024-32932,0,1,379c0ae6cc2f94f410885ca7cc028fe0bf4b04f9e7e3efc2f3c97b4b40e1ac9c,2024-07-02T17:44:45.700000
CVE-2024-32936,0,0,a98023d22d8fe34ca67d2e41b0f1a0096283ac909ae52ca8a63dcd8b920ad836,2024-06-24T19:26:47.037000
CVE-2024-32943,0,0,681ae4b7d296514b2b529abffaf20ed5b5c5e8eb8fff0f6f2bae62e656ffc6eb,2024-06-21T11:22:01.687000
CVE-2024-32944,0,0,357727703d6a86b0d608eb9af0488af030fe8a85e9a27818f7be4cd525bf7172,2024-05-28T12:39:28.377000
@ -251511,7 +251526,7 @@ CVE-2024-34116,0,0,9b7ce91cda38b2af538329ac739004f68244780355edc244605f027069450
CVE-2024-34119,0,0,2b28f435955ad18fc8fcb42f0ece270dcf2db721e55508a9a5713cf9797699fb,2024-06-14T20:03:08.293000
CVE-2024-3412,0,0,eba0eb1a658dd1d7813104d95660e0a431a5e786fc8e6854f237ea1b5879eab4,2024-05-29T13:02:09.280000
CVE-2024-34120,0,0,5d7df179ca1b4156f6cc057947fff0d548e9af4c6b85c2f9635b6b268004f3b7,2024-06-14T20:02:45.567000
CVE-2024-34122,1,1,e3a89da42bb4a6339e464551cfb7b91c8790699c7f772c27a7a4da275e7dbd33,2024-07-02T14:15:13
CVE-2024-34122,0,1,4f9228b802a53076ae2e05a9634541c34d86113269eb50413207e641d1aa51eb,2024-07-02T17:44:45.700000
CVE-2024-34129,0,0,d3dc43049d80f783794d9399825be80ea683040539452e8a7be93120bda8c4de,2024-06-13T18:35:19.777000
CVE-2024-3413,0,0,8bf7e231eaef8a1fb270998ee982f12463c5a7d17ff17eb8735dbc8fc584bd57,2024-05-17T02:39:54.073000
CVE-2024-34130,0,0,89584332f9dd3125064424fac4aabed722eb075df05ba25c9a02617aa8a6856c,2024-06-13T18:35:19.777000
@ -251807,12 +251822,12 @@ CVE-2024-34587,0,0,12a6bb49f8fa1d3da9fa63d0f36b9f078a4757ebe15d04c02460d0cd53601
CVE-2024-34588,0,0,a275430012018959c7d174af3eadfc14360e460989e6a88ade7b7b5351a0ca65,2024-07-02T12:09:16.907000
CVE-2024-34589,0,0,956b208d2d0c444489cfeec6231ba9f3c4ad34dfb3988e773f52dc6f4881f4cb,2024-07-02T12:09:16.907000
CVE-2024-3459,0,0,03bb87c9d0cbd21911c231bc7c0f724e986c00982489be8ee05c29896de95c1d,2024-05-14T16:11:39.510000
CVE-2024-34590,0,0,8f3fb3927656fa2d14e3392a6e398a281723d19dea19a81ae3801b96176bfc79,2024-07-02T12:09:16.907000
CVE-2024-34591,0,0,15267c1276708e8a87709b3fa7413ed02ec168367e18a65d557f0a5ba71ab8ec,2024-07-02T12:09:16.907000
CVE-2024-34592,0,0,6177ee72e92e7b13e9febe759d513d0f5647dbdebaa0b24d79c591f9306e0858,2024-07-02T12:09:16.907000
CVE-2024-34593,0,0,efb889178ecddf4171c752b636d0b5d09805ad458277754b5aa44d572bbd7bfa,2024-07-02T12:09:16.907000
CVE-2024-34594,0,0,7df83e6df81878c54e3d28356250bebc1e9696813ce34c0b039144cdb687793e,2024-07-02T12:09:16.907000
CVE-2024-34595,0,0,a38d0c7b2fd2bb569e2b4e40391b2cb448ac43e2008e781c0e232d9dd83113a1,2024-07-02T12:09:16.907000
CVE-2024-34590,0,1,e34eb6dd566cdeec56e53238e8e60308650d9d93ad3bb0a6485ab5e9787f627c,2024-07-02T17:59:38.153000
CVE-2024-34591,0,1,15f194e8fbedd367b61a2a9e8ae50a388e5b11d94a4689a63990dd09dac8a8be,2024-07-02T17:59:58.230000
CVE-2024-34592,0,1,1ee566894c302fe71c1461f3cb79ed1769518d89d3dacecde74d15f8e8648f91,2024-07-02T18:00:19.693000
CVE-2024-34593,0,1,d0d46e6c2e8354b7e8a937f69d30c13f185f05d9ae10963fe18b687300e08e91,2024-07-02T18:00:59.957000
CVE-2024-34594,0,1,3de419a0d5e895f0825619bb1589a252bf8b02077e22739a191c778c10e81ca5,2024-07-02T18:01:18.317000
CVE-2024-34595,0,1,dd0586c7cfd65915e93146d51ca5ff123e3b81570ba9d26c8a9115ce97611928,2024-07-02T18:01:45.897000
CVE-2024-34596,0,0,b77e3b3df4818670ab73090f33fca963e554dc43145f59237e2356b61f8d7465,2024-07-02T12:09:16.907000
CVE-2024-34597,0,0,cb69c35d146173aa83779938915540067a7bca69204ccda631811a5c19f4fb48,2024-07-02T12:09:16.907000
CVE-2024-34599,0,0,607ffe3a3d18b30471a9db8e2a57a1e1e9955aff6a535d4f0ac70e2ef01c85be,2024-07-02T12:09:16.907000
@ -252235,7 +252250,7 @@ CVE-2024-3551,0,0,0b53eeac67d78da7f449ca2544acbc24b1d30e959723fbcf9808dc22d9b1d6
CVE-2024-35510,0,0,244a039d3e43a77d1e1c1bfa1c93465718af15f6d6ebd597960608d48e40fc7c,2024-05-29T13:02:09.280000
CVE-2024-35511,0,0,88c11e90f79a9ed0aca8c4301cc3b328c70f04cb419aacefe9fa82a87fbd22d6,2024-05-29T13:02:09.280000
CVE-2024-35512,0,0,c9d23c736120f04931cbbc7470489190e83340be8d46b2f2d0f2c886a0a46a7d,2024-05-29T19:50:25.303000
CVE-2024-3552,0,1,b573d704f72bfadd96d903b41988b7617b9a930535c0b223b9c260b4778dcd0d,2024-07-02T14:45:34.543000
CVE-2024-3552,0,0,b573d704f72bfadd96d903b41988b7617b9a930535c0b223b9c260b4778dcd0d,2024-07-02T14:45:34.543000
CVE-2024-35526,0,0,9145d718b99666c752b72c23585259f6b43d68cd740cf1774e7de05603733122,2024-06-26T12:44:29.693000
CVE-2024-35527,0,0,a44c745f43d9e9ab4b1f265a434cfd75cb0985cd6431373e28e04bd4dbaff24c,2024-06-26T12:44:29.693000
CVE-2024-3553,0,0,35fab26edb78f51246dfea40a1da2d2c641df3766aad72a071763d4720020731,2024-05-02T18:00:37.360000
@ -252950,7 +252965,7 @@ CVE-2024-36399,0,0,32a084399fffaab7b007a4925030bc8dfc9c8bbd3d7f25f567b275cd72694
CVE-2024-3640,0,0,abbf5a33cbca708fe19710dda7a796491ae1d1614e9cd03f43d6cddef8b09500,2024-05-17T18:36:31.297000
CVE-2024-36400,0,0,6b10ab1f058055da0b7f6513936a46e66d6922b94171c5e956b85881f675cf7c,2024-06-10T19:39:21.660000
CVE-2024-36401,0,0,87e986c6abcb99589eb18d897c1eae35aa261f64a143786484b486b18d465a85,2024-07-01T16:37:39.040000
CVE-2024-36404,1,1,7ddf88f02c3b42874fc759f175bc5320a77bc0412d76e879f7fd0504ce27142a,2024-07-02T14:15:13.450000
CVE-2024-36404,0,1,bc349d6b7c657155d15e1c421e7bc9ad56ba3fcfaca14ccdbb458b8f57d45518,2024-07-02T17:44:45.700000
CVE-2024-36405,0,0,342cb049567ebebbbb5ec2f471f348f7e69a152097c662b875d4729bb76af752,2024-06-10T18:06:22.600000
CVE-2024-36406,0,0,4c4f64b7223e45baf0f4fcf71db77f8f804dae22bb20bd965ed8f0d422b0ddc0,2024-06-10T18:06:22.600000
CVE-2024-36407,0,0,3fa9b8688b87bb89923ff6af2953ac9e3c3d75823a9915954eac5e78dc625b42,2024-06-12T18:17:38.777000
@ -253625,6 +253640,7 @@ CVE-2024-3822,0,0,fc2c97d17f172eec9f94cdc5060f4aab438cbcb9ae5ff2766add603f099f29
CVE-2024-3823,0,0,cd28ea160a68276fdd70271b0ec926d19fdc3598e922bafa9bf05d9fdd41ea0b,2024-05-15T16:40:19.330000
CVE-2024-3824,0,0,8545575d3e734e1433cd4d7c91c77cd29907e6f5ee87d4739239efdf13c20f26,2024-05-15T16:40:19.330000
CVE-2024-3825,0,0,f398f78dcc905612b8b1fff020bcc62d405b80ffdf3a9053d9f90f163c40baa7,2024-04-17T15:31:50.160000
CVE-2024-3826,1,1,10ffa95cb51e486fcc946b2a28efb2050c4071b3872b8880e6dd4ec9c1c73231,2024-07-02T17:44:45.700000
CVE-2024-38271,0,0,8e2b25e7088c2e4efa2d97ea33a18261f508acceb96bd53692012b5e2b16a935,2024-06-27T12:47:19.847000
CVE-2024-38272,0,0,2795ed77f29b68791fe21d161abb3166a24d42cf0b3bc8a5427ac6bfbbc1e33b,2024-06-27T12:47:19.847000
CVE-2024-38273,0,0,aa930ae8c440a2647a011bf0695d4747b271b56264e48ff4863a5149d1b66b6e,2024-06-27T03:15:50.130000
@ -253665,9 +253681,9 @@ CVE-2024-38358,0,0,d7fa4473d29cbfc514ec5a6118f6b700b95e48744d7580b8a99541a6dd9ba
CVE-2024-38359,0,0,3c4a78257f1dc283c0e90aef4e0803c297f82552e9ac95d2cc406a3431781604,2024-06-21T11:22:01.687000
CVE-2024-38361,0,0,a76df29cb5f27115adee4ca4e20976361dfcfc6eae95b97031ba2314a1f45bae,2024-06-21T11:22:01.687000
CVE-2024-38364,0,0,af41b56a7f2f7758c06f324097079d559fb0340d3186315d52e465f177fe03d2,2024-06-26T12:44:29.693000
CVE-2024-38366,0,0,1f349531a5f6b7a28308565ae65c6690c37af4be07c477ed5012555568c19954,2024-07-02T12:09:16.907000
CVE-2024-38367,0,0,04731705adc3898df457ba6532b4f734c38ecc1c91b8da70a1f121287c6f3f97,2024-07-02T12:09:16.907000
CVE-2024-38368,0,0,5b5b936a3bcd9335c9d7bf006b929f57b0e8aae7f536085de0a5b277ee30d9ce,2024-07-02T12:09:16.907000
CVE-2024-38366,0,1,c804f94bd9a9281c50163d6bd850f11de47bf9dfcd004925ce0ed31a43c4b0bc,2024-07-02T17:15:05.180000
CVE-2024-38367,0,1,d3326a47bb3d237ae822354ef25e3ecc075d6076ace31be51fee96ae9db93c06,2024-07-02T17:15:05.410000
CVE-2024-38368,0,1,03b9c449b31d9a7d3f598bc6d45d21df03487372325a1e752596006346b7f273,2024-07-02T17:15:05.590000
CVE-2024-38369,0,0,fdff0768878da5d618998a51bbfecfa3dac560d76fa8e5e20682482a3b336371,2024-06-26T14:47:05.077000
CVE-2024-3837,0,0,5046b04f6fff161407832d91f839d6c01f3dcf30bcf75f620bfd7221b5de1c27,2024-05-03T03:16:29.010000
CVE-2024-38371,0,0,89525bd0cac36f8169b7c7660aac33ce1fe77dbe859f180f5d0a019c34cd3913,2024-07-01T12:37:24.220000
@ -253734,9 +253750,9 @@ CVE-2024-38514,0,0,20901c301d0b800903255c5b44f5dc35cf1b46988f760c885c8c2631fef64
CVE-2024-38515,0,0,a4e93bf008d994404518fb6f8f4cb2097325f0beeca2a32bbb087976322bd094,2024-06-27T13:16:00.717000
CVE-2024-38516,0,0,1e8a930f3bd7a4d706b02f40cc5af32d0943db58e97c615d4b2fd82bf154a7f3,2024-06-26T12:44:29.693000
CVE-2024-38518,0,0,aa2f02f8ed86bcfd7fc6b425ddf1679e310303c5dfcfa85d7522473c60b19adb,2024-07-01T12:37:24.220000
CVE-2024-38519,1,1,cfd2e05ebab821cd03ffbec85712ee0c2b3988fe236d87c06c15dcdb1bac2275,2024-07-02T14:15:13.737000
CVE-2024-38519,0,1,e39694de68d399ffb04e75d040046561d83a8a72674fb0d599e16cb1c2511c02,2024-07-02T17:44:45.700000
CVE-2024-3852,0,0,3038e46972183e994310b2b410f139aaace8bd74e7e7e979d336a57b5feba459,2024-04-22T10:15:07.430000
CVE-2024-38520,0,0,41960473f376d2053670358f1b74b11612e5d6f0cfeae75c4ae0b80f5904ac0a,2024-06-27T12:47:19.847000
CVE-2024-38520,0,1,5adf4dbb90762553b78084199dfb3abdb3d5337ac3a1f068b4f090511f700047,2024-07-02T16:15:04.517000
CVE-2024-38521,0,0,2311d8af284d8ecd997452bb188fd1cef58d4fe05ff15f59ded69f45525ae8c7,2024-07-01T12:37:24.220000
CVE-2024-38522,0,0,ab564dc444a369fc5518b1b865033967f292e4b44f2517e37c5c794af744484c,2024-07-01T12:37:24.220000
CVE-2024-38523,0,0,ac61dc2188539e4a5eb60d89d7d71145cb5cdc9b9c189d4c888f2c0f8ba6ad05,2024-06-28T10:27:00.920000
@ -253940,7 +253956,7 @@ CVE-2024-3908,0,0,85d7a8c4b6c04a1bc64d61b9b16434d97a56cd08e916479d8cc7f65ce540b0
CVE-2024-3909,0,0,6f873c0cc6c632ea64d9fdc22b1186e18e9f299b7d6a7c7d2c90d68e95f354ef,2024-06-04T19:20:26.763000
CVE-2024-3910,0,0,fa7c708844465781fdb892c0231d561199c2b00af1f9ed7e9ce37d02f9d0ff7f,2024-06-04T19:20:26.870000
CVE-2024-3911,0,0,421a4146dc8ebd653de189c62bd791d7d943c2a07a6c17029678795c1bffde3d,2024-04-24T13:39:42.883000
CVE-2024-39119,0,0,a0f8ed7edc5e18eaa0ca89ca1d56a2bf128c765847a0a7558b417a995821442c,2024-07-02T13:15:10.850000
CVE-2024-39119,0,1,1a69b24f1f94ef8540905f4cb9572420f76889d8a155c3d3a5e32d4b0cb231f3,2024-07-02T17:44:45.700000
CVE-2024-3912,0,0,40b98d6972fd8b29682fb9d5c479312d61b03f7aa0ccbcb16e7844b5a5f893f3,2024-06-17T12:42:04.623000
CVE-2024-39129,0,0,9312806d832c51933c3038527273101f0daf3190355080fae05f2347855542dc,2024-06-28T10:27:00.920000
CVE-2024-39130,0,0,bb74f9ef3dbe13379a9cc84dff2ba44f866c8769dabd039c7af844d86cae9a61,2024-06-28T10:27:00.920000
@ -253948,7 +253964,7 @@ CVE-2024-39132,0,0,6ab3e2e5c27f090632724618bb18b9fb986b73a73dd0cc0fb1e85e724f201
CVE-2024-39133,0,0,bee3791c46864c4a7b9c3f57bb0aa0f799667bbae7ebc1a8d271d663377ee518,2024-06-28T10:27:00.920000
CVE-2024-39134,0,0,f9c7f878a3bea6aa0088d9c47c65ec47ca6b4af545c333528f13dc2543300c00,2024-06-28T10:27:00.920000
CVE-2024-3914,0,0,4e5bf7e4bbf357662295118acaf46c6e90e6b4b9830d6a3e29a74e49dd14203f,2024-05-03T03:16:29.340000
CVE-2024-39143,1,1,aa4cf2eea1dc89bfe299fa2011e23c095fe000b71eb7aef62bdf53385f28aee7,2024-07-02T14:15:13.990000
CVE-2024-39143,0,1,8f47b682c75fd28fc97feee7618bc9433dc6b816cc495ebda3dd3935812a92e7,2024-07-02T17:44:45.700000
CVE-2024-3915,0,0,a29a2abe3549638b7baa29d25d43b9e7f1e9b70435ac870f9f426e12fb2f2812,2024-05-14T16:11:39.510000
CVE-2024-39153,0,0,79c92bc44ceaef2ab705e7fa71d1fb5741f4e73f892ec71cd6ced02eb978bda3,2024-06-27T17:11:52.390000
CVE-2024-39154,0,0,e9267e643c64c5fe4f5e9c26e884ce63a143ad4aff34e62518725c8c14557f85,2024-06-27T17:11:52.390000
@ -253995,7 +254011,9 @@ CVE-2024-3931,0,0,ff26b5a8728d6a7f3e1f8095f9d431d98f0c624577950ceaf4dc1cf9ad6880
CVE-2024-39310,0,0,187be4dc945171a7657d1459e6c80fed53aa1f7d448ef02205a5dc997f08bebc,2024-07-02T12:09:16.907000
CVE-2024-39313,0,0,9e833554bfb77c34493fd31ffb1eaf0ef9773e2886372005ffb0d80f9a99cb5e,2024-07-02T12:09:16.907000
CVE-2024-39314,0,0,f08a68c1585aac53ed3340b30b7ca1fee7f99b287e34df66dd62620bc6eee2c4,2024-07-02T12:09:16.907000
CVE-2024-39316,1,1,d47aca3c5197170fc8f05033ffa682fd40e1aa1436fadb43bcca23faeaecd5c8,2024-07-02T17:44:45.700000
CVE-2024-3932,0,0,371291a71f9c99e371f96e7d7b61e3e11967567047c07fae80310c4772d1c0c7,2024-06-06T20:15:14.030000
CVE-2024-39323,1,1,8b592e233643a568789a282215e3d651e9257e7274946ce7dfcbad9339346353,2024-07-02T17:44:45.700000
CVE-2024-3933,0,0,1d08d4e317596700be65ef5300f76b449794bb2d8b1542a98c34b9cd74fea015,2024-05-28T12:39:28.377000
CVE-2024-39331,0,0,c5bb3e665b31aacdbf907c7032da4f6d49d6bc82a59a96e6be39b1d4f66a92fd,2024-06-29T07:15:02.060000
CVE-2024-39334,0,0,7a242c73a28ed17874e43348a26da2104869d7ef8d91c48fe0d8d7e00f57c31d,2024-06-24T12:57:36.513000
@ -254192,10 +254210,10 @@ CVE-2024-4140,0,0,722eee4132feb9c9f6e2ce08731c2e9140964d3eba63910346dbf63a264f25
CVE-2024-4141,0,0,569cd2fcd9188d9eabeb08d432690880975d5549c17482aa7e239fef9c6bb2e6,2024-04-24T19:58:40.710000
CVE-2024-4142,0,0,6297707db3df670a282f3d4e6720e4836d7467220b5fcc108ef053e6a6308f68,2024-05-02T13:27:25.103000
CVE-2024-4144,0,0,804f070eb7c147c92dd9f6be5c3d4dba7563c2bc35d2c208518fc5d01b232644,2024-05-14T19:17:55.627000
CVE-2024-4145,0,1,3c9762f04821050a58ad2e9967155f35715c1845669fa0a585ddbcc8a17cbed8,2024-07-02T14:44:45.540000
CVE-2024-4145,0,0,3c9762f04821050a58ad2e9967155f35715c1845669fa0a585ddbcc8a17cbed8,2024-07-02T14:44:45.540000
CVE-2024-4146,0,0,a114759907c2b4b4964d82b3e640cc98e9895c1fdec80a727da3c0deb49d3ce1,2024-06-10T02:52:08.267000
CVE-2024-4148,0,0,99472767520f10bad17ca80099c5e2a59b64c04b882cb0fc99c8823f2860bd7b,2024-06-03T14:46:24.250000
CVE-2024-4149,0,1,28fd6853c4bd2a7bfb26cdd043f9abfc9e17f0ae1c9764bac61fec52fa0d04ad,2024-07-02T14:44:29.993000
CVE-2024-4149,0,0,28fd6853c4bd2a7bfb26cdd043f9abfc9e17f0ae1c9764bac61fec52fa0d04ad,2024-07-02T14:44:29.993000
CVE-2024-4150,0,0,faed1039ecc56269b946edc3dde84ea0ad72d4967895c1be6d39f317de75f649,2024-05-14T16:11:39.510000
CVE-2024-4151,0,0,500903b4f0f30e11a0df3621c175651eac21ce51d803c0af0322e88c41c92b80,2024-05-20T15:17:54.513000
CVE-2024-4152,0,0,13d6846d5d8de8b62b05f9517615f61344c09651c47417acc47cbce42e9e3dd9,2024-06-07T17:15:51.580000
@ -254461,6 +254479,7 @@ CVE-2024-4461,0,0,ad05f4e37257e33f27f784f842f8dfa34f685ff06dd273bc6842a04c51c93b
CVE-2024-4462,0,0,c8f7490df4b9ef7118fdef5b7ade6db6ae196f6576f8cec5720233f982c7a0b4,2024-06-04T16:57:41.053000
CVE-2024-4463,0,0,aaa5b32073fcbc7160927d348961b4790302ca7b8c414e16cdb6cacefbfd98b3,2024-05-14T16:11:39.510000
CVE-2024-4466,0,0,d6c981370b54d7938faad670495d8ca5b736025a1a2ded921b62354a18385ccc,2024-05-03T12:48:41.067000
CVE-2024-4467,1,1,8a66aac2733c4e9f85aa4f73b772814e7ba82ba02f8b67188b34e06a80e0f43e,2024-07-02T17:44:45.700000
CVE-2024-4468,0,0,0ca1519b3786abed41420557bdcc900f05c07970f7b2d2d6a490ebaf1139dd06,2024-06-10T02:52:08.267000
CVE-2024-4469,0,0,38345c865c5feb52902e530671fff3d9d47caec782b7e2a3a7d5d275ffe98f44,2024-05-31T13:01:46.727000
CVE-2024-4470,0,0,a1486a2c35813e6b458e62c6cab3ba58a94b094bc9cbcdae130972a477a7e8d0,2024-05-21T12:37:59.687000
@ -254559,7 +254578,7 @@ CVE-2024-4571,0,0,b379f15291a8a65b330c223bc6a31fd0a21b183a906c0a4077ca3cf5d38b8a
CVE-2024-4572,0,0,f5ca5c1acec751c453949e3111f6be45773ff402d3c1d2b8e88127a059aa7b1b,2024-05-14T15:44:06.153000
CVE-2024-4574,0,0,313ec0d117ac92e67c29da349740abe9395db1d3208f8156cb88d417271721b1,2024-05-14T16:11:39.510000
CVE-2024-4575,0,0,6bded3a6c54fd2b7daead76b33ebe13f0b01e085cf3109c110abbf745910c26e,2024-05-24T01:15:30.977000
CVE-2024-4576,0,1,bef0c1eb81bb0f4c3eef72c993d9a673f04f17bc2d954741979507814d4ccd99,2024-07-02T14:41:30.777000
CVE-2024-4576,0,0,bef0c1eb81bb0f4c3eef72c993d9a673f04f17bc2d954741979507814d4ccd99,2024-07-02T14:41:30.777000
CVE-2024-4577,0,0,f9db2e3f93232756711cfeb92c49234ac43086f6bf87252b5e9f8120d806e0c1,2024-06-21T19:15:30.620000
CVE-2024-4578,0,0,288727eedfeacd3e622e0b94216c2d11ddecfe08ef7e2d5930857cc4b8985c21,2024-06-27T19:25:12.067000
CVE-2024-4579,0,0,92215db7ae90e73ed5f9ed593ac042a14c345d9cfa9b9e96b650abf914d87abf,2024-05-14T15:44:07.607000
@ -254593,7 +254612,7 @@ CVE-2024-4609,0,0,c23c3de39dc98d86dc6853d31c2bc52148fecec26ec42d14e3cca3645de4f8
CVE-2024-4610,0,0,81ff3ae6e48750d7db743becd24b39c747725961f69d5bed9a772eadd337b280,2024-06-13T01:00:02.087000
CVE-2024-4611,0,0,0152495de6f2454e6b1280dd3d20184c586b399950947591d94dfb5475ea0272,2024-05-29T13:02:09.280000
CVE-2024-4614,0,0,beb5630ff5db8a415fa4bf6f109dad49279ea5965bb91a1d7f892cd406978f05,2024-05-14T15:44:12.883000
CVE-2024-4615,0,1,7b5276905c165aa4f37a2a2e956283f0d8e2b47a85a8c0a930e4cc6ae0292a24,2024-07-02T14:51:50.013000
CVE-2024-4615,0,0,7b5276905c165aa4f37a2a2e956283f0d8e2b47a85a8c0a930e4cc6ae0292a24,2024-07-02T14:51:50.013000
CVE-2024-4616,0,0,13d57af2453b5014cfa715f0a52b43c9fc2eef49b20057ac9a17cde3c8ed0294,2024-06-24T19:34:00.263000
CVE-2024-4617,0,0,a9ac6f97f78093fda60c756da599c06372e99e21d7b1347de185ba0119cb6cca,2024-05-16T13:03:05.353000
CVE-2024-4618,0,0,60eca777456ce5379ff16ab59d0e8db1fff28f58a76fe14d606e7a27666b586b,2024-05-15T16:40:19.330000
@ -254821,7 +254840,7 @@ CVE-2024-4893,0,0,d5ebc2dfcb13b74b4f1951a124d2e638a95f79aa05d19e6fadfe65b7ad1c4f
CVE-2024-4894,0,0,d68130303d356c053d0f6768d0ee08506e206d16216142c952b9b56af8835d24,2024-05-15T16:40:19.330000
CVE-2024-4895,0,0,be42ef886a64c01ec9437b4cfbce4dfdf0b902fbee0c6083bfc71de776f15b0e,2024-05-24T01:15:30.977000
CVE-2024-4896,0,0,6456cc9b22aff68532bfeeb7637d5235216630d84771d1ec52d84fa467e4b7a6,2024-05-22T12:46:53.887000
CVE-2024-4897,1,1,e8e47debc3a57553e3f4234c1ed463859825c3e9e21ff485bb821dbf63329f89,2024-07-02T15:15:11.853000
CVE-2024-4897,0,1,a273fa1e610a27e4ca9c04a635a2633f6f061e2bbcc8255661a4476b491a2085,2024-07-02T17:44:45.700000
CVE-2024-4898,0,0,4ea5d2aea02f0385cebab454e7d6b2e480bf3eab8470b7157c155067bed66344,2024-06-13T18:36:09.010000
CVE-2024-4899,0,0,67b323357bb49d8a98f8aef30f13d75a082b23ba24ff9269116bd3a4e859e8a6,2024-06-24T12:57:36.513000
CVE-2024-4900,0,0,bf21c014329db3bdc252e0dfea038d8cc3dd03e7972d5bd787db3fb8215cd9e5,2024-06-24T12:57:36.513000
@ -255109,7 +255128,7 @@ CVE-2024-5261,0,0,aaf01fa82c00aa1f97fee6034b7f06b519644bd8c7ab6c8a9a02aece19be14
CVE-2024-5262,0,0,9ac0e56dcac973bc4b8e5b6fa9933e9dd09a608d6b80fb71c1aa4404fea36f64,2024-06-11T17:18:50.600000
CVE-2024-5263,0,0,796ba510b7017654bdfbf9b75644ebd80198f9cf52c47b5302f3a82ca304a5bf,2024-06-17T12:42:04.623000
CVE-2024-5264,0,0,ee26fa1cdb46887f4a061b2862ebd7aa837d5beaa51e34b236fe172dd36cc1a5,2024-06-21T17:18:00.973000
CVE-2024-5265,0,1,23ae6b699421b146407b64fc352f84f4385a86a37bc2f3798f85fec07534db6d,2024-07-02T14:51:36.407000
CVE-2024-5265,0,0,23ae6b699421b146407b64fc352f84f4385a86a37bc2f3798f85fec07534db6d,2024-07-02T14:51:36.407000
CVE-2024-5266,0,0,86da14f7dd15bb1eaf8815a4821d27b270633d0873e58e8a5d59efb09c7ed714,2024-06-13T18:36:09.010000
CVE-2024-5267,0,0,56a46198c3e1065879dc87513ff3136ec5650c767fa2a117d737d28ecae53cf4,2024-06-07T14:56:05.647000
CVE-2024-5268,0,0,6c62d2c4f5ec7f076ad3a77daef4a605562ab9ff106410d5ae35773de78d45b5,2024-06-07T14:56:05.647000
@ -255373,7 +255392,7 @@ CVE-2024-5656,0,0,40c34e526e2032c59043b8834b1648291001d5e69a19326cbf74d918e6c8fb
CVE-2024-5657,0,0,223911cca93e713dc15810800584c4abe481e0e2143d3e3f3795c2d130280eb3,2024-06-11T17:40:47.823000
CVE-2024-5658,0,0,e420aa15660fefecd013eab0de4dee690ff0f155b141d8b1d4392a16606c7ad5,2024-06-11T18:21:52.377000
CVE-2024-5659,0,0,dbb598e16e86b9c719d485b541188ff6e8ea72d57c8ec148ee2290d2bb1f427d,2024-06-17T12:42:04.623000
CVE-2024-5661,0,1,64c610f4ac197974e4a9f4370e828aefe9bbaabb0bf444795d194a1356128a89,2024-07-02T14:43:40.460000
CVE-2024-5661,0,0,64c610f4ac197974e4a9f4370e828aefe9bbaabb0bf444795d194a1356128a89,2024-07-02T14:43:40.460000
CVE-2024-5662,0,0,c30bff5b2d503274ccfb42c77a6a2f90af33779b4134c5919fad644e092eec26,2024-06-28T10:27:00.920000
CVE-2024-5663,0,0,e65ed9bd668d6456ce5b39954ddd0ae3860f1cde2bd069c4d43e4b5601627808,2024-06-10T02:52:08.267000
CVE-2024-5665,0,0,cf98b8118d31a45b868938fcf4b0239a4be77d7cb3995f06e552251067a9cecd,2024-06-11T17:47:45.033000
@ -255427,7 +255446,7 @@ CVE-2024-5750,0,0,03159524f0152f136fbf677dd96b04f6ea701d7a55e178491af9632e522096
CVE-2024-5751,0,0,ca61b23591712a8cff5f4d60dc25f9af29a80e50dd51936dc41b0c0c08f825ad,2024-06-27T19:25:12.067000
CVE-2024-5755,0,0,b75b82993304e8d2e2f0a897bb014b8925b1bcd9c9ad3c9ceeb5f909bfddc6d2,2024-06-27T19:25:12.067000
CVE-2024-5756,0,0,932863b7175086c01d8c5c65a4beadccfd018caa98aec2852a5c281821078bb5,2024-06-21T11:22:01.687000
CVE-2024-5757,0,1,5cb8c18a619114307d2634441346064118b79a7aeac4723897e195eaa5132dad,2024-07-02T14:42:05.977000
CVE-2024-5757,0,0,5cb8c18a619114307d2634441346064118b79a7aeac4723897e195eaa5132dad,2024-07-02T14:42:05.977000
CVE-2024-5758,0,0,250b274bfcefb72defbd26103c82d5c8ed585b7571d3785565c3013fdb6e4a03,2024-06-13T21:15:57.543000
CVE-2024-5759,0,0,a8b20ed9df5a502bc1dbe4283a67eed19771ffb4a4f02a90724215ed5101a898,2024-06-13T18:36:09.010000
CVE-2024-5761,0,0,e0022a8d80317cd3941058bae14b514f68707790a5051038049a1d552ba8de69,2024-06-07T19:15:24.467000
@ -255450,7 +255469,7 @@ CVE-2024-5782,0,0,1a8a2620a565d05a1a6c2c4c72d75648296e70bf5f89433612bbf40ebc42c7
CVE-2024-5783,0,0,e65b469aba92209e135f01d801ec2e7ebd41770aa11624b30224f43d98aec806,2024-06-12T08:15:51.480000
CVE-2024-5785,0,0,b8e4d96c063df13aad53416cef79463db3c390621a0b569b6ab0f4db2568beeb,2024-06-10T18:06:22.600000
CVE-2024-5786,0,0,ed5396800d42f59a8cc5d452fd1faa0265b1965bb10ec68fd437a404a4a909e1,2024-06-10T18:06:22.600000
CVE-2024-5787,0,1,7676e1b0ab184e8654efc91f56a8d84cd9d6d539bf642c0a4ff7f743a62b9daf,2024-07-02T14:41:54.887000
CVE-2024-5787,0,0,7676e1b0ab184e8654efc91f56a8d84cd9d6d539bf642c0a4ff7f743a62b9daf,2024-07-02T14:41:54.887000
CVE-2024-5788,0,0,b8c011e09345f8c438c15d748dc7ecb5f2eb62164ea0c1da7169d985a2f9f593,2024-06-28T10:27:00.920000
CVE-2024-5790,0,0,f8b87ca5470f9146716524e5e38538dc26468d2ae797b52818768e7113cbca8a,2024-07-01T12:37:24.220000
CVE-2024-5791,0,0,424014ca254e257c8c57009775e061d0dd2abf87fc81691a50ea6d1a360bb310,2024-06-24T20:00:46.390000
@ -255494,6 +255513,8 @@ CVE-2024-5860,0,0,f855eee13286327286a851090329abd51f0ce228b863644ab8e1f7f80e1d73
CVE-2024-5862,0,0,8a220661cafbb333e5e6ccd0618a6e1d05daa829a8bf612cc996a5557415f6ab,2024-06-24T19:26:47.037000
CVE-2024-5863,0,0,5a844e6908bc4baedd1c1a08db9c8485c4b63d69e2ed1acace3737cdce4b462d,2024-06-28T10:27:00.920000
CVE-2024-5864,0,0,8b8d87391d74668e6e2fee730839a4ab70ee9b4eed3251f512277f79f0902e59,2024-06-28T10:27:00.920000
CVE-2024-5865,1,1,07d061aa23325b9a024d17980b3b159ff03feda9472945bfca7caf97b93512aa,2024-07-02T17:44:45.700000
CVE-2024-5866,1,1,818f5ea49546cdae3583c6b6cf8ac2355af8dfa2dd6e771c0ddc9253a4f3dba5,2024-07-02T17:44:45.700000
CVE-2024-5868,0,0,cddb0a1baa550d897574c2505eb276b5cd69c2fd57d27d79dec0dad91553a572,2024-06-17T12:42:04.623000
CVE-2024-5871,0,0,83e6d3ea3d7363cdcbcb485d9161ada2b3d6bba887290fa58ab89820983d4022,2024-06-17T12:42:04.623000
CVE-2024-5873,0,0,4affe4b1f71505ca05298a33c7e23c3ae147869580237755bed2d180fbea1b8e,2024-06-12T08:15:51.550000
@ -255674,7 +255695,7 @@ CVE-2024-6252,0,0,468e259f2025efbae92579ad89a45c9f2c8b2e33c6f209272de57a1e66debc
CVE-2024-6253,0,0,a6e4514e5a27665a5cb6260b36ae56e5c2da14fd9a2d1da643a44ff2f3f2cb21,2024-06-25T18:15:12
CVE-2024-6257,0,0,2981da6c17c705bcf0d80e44b1fa14b0c6655b2077fb275b971c6bc5c7c2b720,2024-06-25T18:50:42.040000
CVE-2024-6262,0,0,f703f7a7fbd3e1fe9efa1e5946752e209a081bf36124182aca731e3f05a363a4,2024-06-27T12:47:19.847000
CVE-2024-6264,0,0,35dcfb42f0f22ef3ca5a93e9b789ebc943597cada696f50bb9d93f61b3db94f2,2024-07-02T12:09:16.907000
CVE-2024-6264,0,1,f9ab73ef94330a3cc9bcff915e884763c0b072f9f74618431a2c7d5cbe25dc82,2024-07-02T17:57:31.737000
CVE-2024-6265,0,0,dd53419ac5d71f3843314be14fea17b7338fd9f39ae5539064d4c12df7d66cd7,2024-07-01T12:37:24.220000
CVE-2024-6266,0,0,f14331da5cd861226d53e015f2a1f08c9e1d5e7f7b1b843a3feb7cb151cc145a,2024-06-24T12:57:36.513000
CVE-2024-6267,0,0,d0d81696a0fe56042eb20b9f0c7d606c3ec4ab44f43adaf7633e08749cae8d6a,2024-06-24T15:15:12.093000
@ -255725,7 +255746,7 @@ CVE-2024-6373,0,0,ffc7549884eeecbe338ce0f17f670d62abf2209962cbc27b0291f9ddbed7c1
CVE-2024-6374,0,0,951e3f10ed1a8de2c137bcf7721b529de76cab1c6430f8094753092eaf9ecd40,2024-06-27T17:11:52.390000
CVE-2024-6375,0,0,63966b93eb46e16d023260fad8c0d7013b7249b4716b3dc1473565015805b694,2024-07-01T16:37:39.040000
CVE-2024-6376,0,0,5b1144f575b26ee71024cb47efd50b0c100b6444589a68c6e121da4ff25018c3,2024-07-01T16:37:39.040000
CVE-2024-6387,0,1,ff2dda8dcff025fb3f2bdd95ad8179238adf8f2f6e85567d02d7fbf2e758ebe6,2024-07-02T14:15:14.133000
CVE-2024-6387,0,0,ff2dda8dcff025fb3f2bdd95ad8179238adf8f2f6e85567d02d7fbf2e758ebe6,2024-07-02T14:15:14.133000
CVE-2024-6388,0,0,e641c9d869769d4291da87145b48d15b4f200c046d6b100142bc686375a84738,2024-06-27T17:11:52.390000
CVE-2024-6402,0,0,795485c4534407e246daec51c1daaa33b95f6651688fed743a8fb9054cdaedba,2024-07-01T12:37:24.220000
CVE-2024-6403,0,0,e44b9cfa8d9ae367e624a8cdf179ef52ea1e98c2115d7a956299d17747a6a56b,2024-07-01T12:37:24.220000
@ -255738,7 +255759,7 @@ CVE-2024-6418,0,0,b63bb78bc20fc7c9074df0590cf44ede2aa2ea9145f7e2ea976342cbbc9ede
CVE-2024-6419,0,0,e1f22570d75c49fa5726171947ce4e56ea60b543707fecfaebe18f84b2ff48d5,2024-07-01T12:37:24.220000
CVE-2024-6424,0,0,8d5a2fd0dee2ac07d57032a1c81c2c412cad276a027b89c1b7d3574f7c28481d,2024-07-01T16:37:39.040000
CVE-2024-6425,0,0,adbfecb8c3cc947ec785870957655621e37e6a4ecfa332482b1b765f471fc897,2024-07-01T16:37:39.040000
CVE-2024-6438,0,0,014a97f167204e1cc399d7130b397b178df204fdf3ddf71fc810a758f751fc1d,2024-07-02T12:09:16.907000
CVE-2024-6439,0,0,29be1fb8954ebc6c7c684fd756553dbe24b7d3bb1af6acc5745f4d42c8c8cc47,2024-07-02T12:09:16.907000
CVE-2024-6440,0,0,3bd360fd63def35ac8dcfca465e818019e5cf3b279a7fb1a3fd755faf1b59f71,2024-07-02T12:09:16.907000
CVE-2024-6441,0,0,ff336b80bdc4f21f4beb1d1df9f9932b71557a62c2585aeabf2f9624a6f7fa72,2024-07-02T12:15:03.123000
CVE-2024-6438,0,1,c89c4e3ccf031fb42672508ffc0236a74fd652409f3f814c1aa7277296a22143,2024-07-02T17:54:02.370000
CVE-2024-6439,0,1,1bd5e2a149e15b87b2ec1d9e23e870c4f5a97c502c5089c3f0a60fbd028209c7,2024-07-02T17:58:39.773000
CVE-2024-6440,0,1,4db20ef0878ff896f7a92a0fb63819a7fd586b5cd61940caee4cf26cda6cf8f9,2024-07-02T17:58:15.410000
CVE-2024-6441,0,1,fadd9560f894739af460dd107a14c73f394f82b357796461abb110045106f46c,2024-07-02T17:44:45.700000

Can't render this file because it is too large.