mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-05-07 11:07:05 +00:00
Auto-Update: 2024-07-25T23:55:17.014307+00:00
This commit is contained in:
parent
355b139696
commit
01cc2b8402
81
CVE-2024/CVE-2024-246xx/CVE-2024-24621.json
Normal file
81
CVE-2024/CVE-2024-246xx/CVE-2024-24621.json
Normal file
@ -0,0 +1,81 @@
|
||||
{
|
||||
"id": "CVE-2024-24621",
|
||||
"sourceIdentifier": "disclosures@exodusintel.com",
|
||||
"published": "2024-07-25T22:15:05.230",
|
||||
"lastModified": "2024-07-25T22:15:05.230",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Softaculous Webuzo contains an authentication bypass vulnerability through the password reset functionality. Remote, anonymous attackers can exploit this vulnerability to gain full server access as the root user."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "disclosures@exodusintel.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
],
|
||||
"cvssMetricV2": [
|
||||
{
|
||||
"source": "disclosures@exodusintel.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "2.0",
|
||||
"vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
|
||||
"accessVector": "NETWORK",
|
||||
"accessComplexity": "LOW",
|
||||
"authentication": "NONE",
|
||||
"confidentialityImpact": "COMPLETE",
|
||||
"integrityImpact": "COMPLETE",
|
||||
"availabilityImpact": "COMPLETE",
|
||||
"baseScore": 10.0
|
||||
},
|
||||
"baseSeverity": "HIGH",
|
||||
"exploitabilityScore": 10.0,
|
||||
"impactScore": 10.0,
|
||||
"acInsufInfo": false,
|
||||
"obtainAllPrivilege": false,
|
||||
"obtainUserPrivilege": false,
|
||||
"obtainOtherPrivilege": false,
|
||||
"userInteractionRequired": false
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "disclosures@exodusintel.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-697"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://blog.exodusintel.com/2024/07/25/softaculous-webuzo-authentication-bypass/",
|
||||
"source": "disclosures@exodusintel.com"
|
||||
}
|
||||
]
|
||||
}
|
81
CVE-2024/CVE-2024-246xx/CVE-2024-24622.json
Normal file
81
CVE-2024/CVE-2024-246xx/CVE-2024-24622.json
Normal file
@ -0,0 +1,81 @@
|
||||
{
|
||||
"id": "CVE-2024-24622",
|
||||
"sourceIdentifier": "disclosures@exodusintel.com",
|
||||
"published": "2024-07-25T22:15:05.497",
|
||||
"lastModified": "2024-07-25T22:15:05.497",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Softaculous Webuzo contains a command injection in the password reset functionality. A remote, authenticated attacker can exploit this vulnerability to gain code execution on the system."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "disclosures@exodusintel.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 8.8,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
],
|
||||
"cvssMetricV2": [
|
||||
{
|
||||
"source": "disclosures@exodusintel.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "2.0",
|
||||
"vectorString": "AV:N/AC:L/Au:S/C:C/I:C/A:C",
|
||||
"accessVector": "NETWORK",
|
||||
"accessComplexity": "LOW",
|
||||
"authentication": "SINGLE",
|
||||
"confidentialityImpact": "COMPLETE",
|
||||
"integrityImpact": "COMPLETE",
|
||||
"availabilityImpact": "COMPLETE",
|
||||
"baseScore": 9.0
|
||||
},
|
||||
"baseSeverity": "HIGH",
|
||||
"exploitabilityScore": 8.0,
|
||||
"impactScore": 10.0,
|
||||
"acInsufInfo": false,
|
||||
"obtainAllPrivilege": false,
|
||||
"obtainUserPrivilege": false,
|
||||
"obtainOtherPrivilege": false,
|
||||
"userInteractionRequired": false
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "disclosures@exodusintel.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-78"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://blog.exodusintel.com/2024/07/24/softaculous-webuzo-password-reset-command-injection/",
|
||||
"source": "disclosures@exodusintel.com"
|
||||
}
|
||||
]
|
||||
}
|
88
CVE-2024/CVE-2024-246xx/CVE-2024-24623.json
Normal file
88
CVE-2024/CVE-2024-246xx/CVE-2024-24623.json
Normal file
@ -0,0 +1,88 @@
|
||||
{
|
||||
"id": "CVE-2024-24623",
|
||||
"sourceIdentifier": "disclosures@exodusintel.com",
|
||||
"published": "2024-07-25T22:15:05.767",
|
||||
"lastModified": "2024-07-25T22:15:05.767",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [
|
||||
{
|
||||
"sourceIdentifier": "disclosures@exodusintel.com",
|
||||
"tags": [
|
||||
"unsupported-when-assigned"
|
||||
]
|
||||
}
|
||||
],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Softaculous Webuzo contains a command injection vulnerability in the FTP management functionality. A remote, authenticated attacker can exploit this vulnerability to gain code execution on the system."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "disclosures@exodusintel.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 8.8,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
],
|
||||
"cvssMetricV2": [
|
||||
{
|
||||
"source": "disclosures@exodusintel.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "2.0",
|
||||
"vectorString": "AV:N/AC:L/Au:S/C:C/I:C/A:C",
|
||||
"accessVector": "NETWORK",
|
||||
"accessComplexity": "LOW",
|
||||
"authentication": "SINGLE",
|
||||
"confidentialityImpact": "COMPLETE",
|
||||
"integrityImpact": "COMPLETE",
|
||||
"availabilityImpact": "COMPLETE",
|
||||
"baseScore": 9.0
|
||||
},
|
||||
"baseSeverity": "HIGH",
|
||||
"exploitabilityScore": 8.0,
|
||||
"impactScore": 10.0,
|
||||
"acInsufInfo": false,
|
||||
"obtainAllPrivilege": false,
|
||||
"obtainUserPrivilege": false,
|
||||
"obtainOtherPrivilege": false,
|
||||
"userInteractionRequired": false
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "disclosures@exodusintel.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-78"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://blog.exodusintel.com/2024/07/25/softaculous-webuzo-ftp-management-command-injection/",
|
||||
"source": "disclosures@exodusintel.com"
|
||||
}
|
||||
]
|
||||
}
|
56
CVE-2024/CVE-2024-381xx/CVE-2024-38103.json
Normal file
56
CVE-2024/CVE-2024-381xx/CVE-2024-38103.json
Normal file
@ -0,0 +1,56 @@
|
||||
{
|
||||
"id": "CVE-2024-38103",
|
||||
"sourceIdentifier": "secure@microsoft.com",
|
||||
"published": "2024-07-25T22:15:08.280",
|
||||
"lastModified": "2024-07-25T22:15:08.280",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Microsoft Edge (Chromium-based) Information Disclosure Vulnerability"
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "secure@microsoft.com",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "HIGH",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 5.9,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 1.6,
|
||||
"impactScore": 4.2
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "secure@microsoft.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-359"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38103",
|
||||
"source": "secure@microsoft.com"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-38164",
|
||||
"sourceIdentifier": "secure@microsoft.com",
|
||||
"published": "2024-07-23T22:15:08.420",
|
||||
"lastModified": "2024-07-25T04:15:05.433",
|
||||
"lastModified": "2024-07-25T22:15:08.627",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [
|
||||
{
|
||||
@ -15,7 +15,7 @@
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "An improper access control vulnerability in GroupMe allows an a unauthenticated attacker to elevate privileges over a network by convincing a user to click on a malicious link.\n"
|
||||
"value": "An improper access control vulnerability in GroupMe allows an a unauthenticated attacker to elevate privileges over a network by convincing a user to click on a malicious link."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-38176",
|
||||
"sourceIdentifier": "secure@microsoft.com",
|
||||
"published": "2024-07-23T22:15:08.660",
|
||||
"lastModified": "2024-07-25T04:15:05.560",
|
||||
"lastModified": "2024-07-25T22:15:08.733",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [
|
||||
{
|
||||
@ -15,7 +15,7 @@
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "An improper restriction of excessive authentication attempts in GroupMe allows a unauthenticated attacker to elevate privileges over a network.\n"
|
||||
"value": "An improper restriction of excessive authentication attempts in GroupMe allows a unauthenticated attacker to elevate privileges over a network."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
|
@ -2,13 +2,13 @@
|
||||
"id": "CVE-2024-39031",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-07-09T21:15:15.147",
|
||||
"lastModified": "2024-07-12T16:11:49.347",
|
||||
"lastModified": "2024-07-25T22:15:08.837",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "In Silverpeas Core <= 6.3.5, inside of mes agendas a user can create a new event and add it to his calendar. The user can also add other users to the event from the same domain, including administrator. A normal user can create an event with XSS payload inside \u201cTitre\u201d and \u201cDescription\u201d parameters and add the administrator or any user to the event. When the other user (victim) visits his own profile (even without clicking on the event) the payload will be executed on the victim side."
|
||||
"value": "In Silverpeas Core <= 6.3.5, in Mes Agendas, a user can create new events and add them to their calendar. Additionally, users can invite others from the same domain, including administrators, to these events. A standard user can inject an XSS payload into the \"Titre\" and \"Description\" fields when creating an event and then add the administrator or any user to the event. When the invited user (victim) views their own profile, the payload will be executed on their side, even if they do not click on the event."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
|
56
CVE-2024/CVE-2024-39xx/CVE-2024-3938.json
Normal file
56
CVE-2024/CVE-2024-39xx/CVE-2024-3938.json
Normal file
@ -0,0 +1,56 @@
|
||||
{
|
||||
"id": "CVE-2024-3938",
|
||||
"sourceIdentifier": "security@dotcms.com",
|
||||
"published": "2024-07-25T22:15:08.903",
|
||||
"lastModified": "2024-07-25T22:15:08.903",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "The \"reset password\" login page accepted an HTML injection via URL parameters.\n\nThis has already been rectified via patch, and as such it cannot be demonstrated via Demo site link. Those interested to see the vulnerability may spin up a http://localhost:8082/dotAdmin/#/public/login?resetEmailSent=true&resetEmail=%3Ch1%3E%3Ca%20href%3D%22https:%2F%2Fgoogle.com%22%3ECLICK%20ME%3C%2Fa%3E%3C%2Fh1%3E \n\nThis will result in a view along these lines:\n\n\n\n\n\n * OWASP Top 10 - A03: Injection\n * CVSS Score: 5.4\n * AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N https://nvd.nist.gov/vuln-metrics/cvss/v3-calculator \n * https://nvd.nist.gov/vuln-metrics/cvss/v3-calculator?vector=AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N&... https://nvd.nist.gov/vuln-metrics/cvss/v3-calculator"
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security@dotcms.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 5.4,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 2.5
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security@dotcms.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-20"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://auth.dotcms.com/security/SI-71",
|
||||
"source": "security@dotcms.com"
|
||||
}
|
||||
]
|
||||
}
|
21
CVE-2024/CVE-2024-414xx/CVE-2024-41468.json
Normal file
21
CVE-2024/CVE-2024-414xx/CVE-2024-41468.json
Normal file
@ -0,0 +1,21 @@
|
||||
{
|
||||
"id": "CVE-2024-41468",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-07-25T22:15:09.113",
|
||||
"lastModified": "2024-07-25T22:15:09.113",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Tenda FH1201 v1.2.0.14 was discovered to contain a command injection vulnerability via the cmdinput parameter at /goform/exeCommand"
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/iotresearch/iot-vuln/blob/main/Tenda/FH1201/exeCommand/README.md",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
21
CVE-2024/CVE-2024-414xx/CVE-2024-41473.json
Normal file
21
CVE-2024/CVE-2024-414xx/CVE-2024-41473.json
Normal file
@ -0,0 +1,21 @@
|
||||
{
|
||||
"id": "CVE-2024-41473",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-07-25T22:15:09.177",
|
||||
"lastModified": "2024-07-25T22:15:09.177",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Tenda FH1201 v1.2.0.14 was discovered to contain a command injection vulnerability via the mac parameter at ip/goform/WriteFacMac"
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/iotresearch/iot-vuln/tree/main/Tenda/FH1201/WriteFacMac",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
46
README.md
46
README.md
@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours.
|
||||
### Last Repository Update
|
||||
|
||||
```plain
|
||||
2024-07-25T22:00:17.296729+00:00
|
||||
2024-07-25T23:55:17.014307+00:00
|
||||
```
|
||||
|
||||
### Most recent CVE Modification Timestamp synchronized with NVD
|
||||
|
||||
```plain
|
||||
2024-07-25T21:15:12.090000+00:00
|
||||
2024-07-25T22:15:09.177000+00:00
|
||||
```
|
||||
|
||||
### Last Data Feed Release
|
||||
@ -33,45 +33,29 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
|
||||
### Total Number of included CVEs
|
||||
|
||||
```plain
|
||||
257979
|
||||
257986
|
||||
```
|
||||
|
||||
### CVEs added in the last Commit
|
||||
|
||||
Recently added CVEs: `11`
|
||||
Recently added CVEs: `7`
|
||||
|
||||
- [CVE-2024-29068](CVE-2024/CVE-2024-290xx/CVE-2024-29068.json) (`2024-07-25T20:15:04.280`)
|
||||
- [CVE-2024-29069](CVE-2024/CVE-2024-290xx/CVE-2024-29069.json) (`2024-07-25T20:15:04.483`)
|
||||
- [CVE-2024-38287](CVE-2024/CVE-2024-382xx/CVE-2024-38287.json) (`2024-07-25T20:15:04.887`)
|
||||
- [CVE-2024-38288](CVE-2024/CVE-2024-382xx/CVE-2024-38288.json) (`2024-07-25T20:15:04.953`)
|
||||
- [CVE-2024-38289](CVE-2024/CVE-2024-382xx/CVE-2024-38289.json) (`2024-07-25T20:15:05.017`)
|
||||
- [CVE-2024-40324](CVE-2024/CVE-2024-403xx/CVE-2024-40324.json) (`2024-07-25T20:15:05.077`)
|
||||
- [CVE-2024-41808](CVE-2024/CVE-2024-418xx/CVE-2024-41808.json) (`2024-07-25T20:15:05.153`)
|
||||
- [CVE-2024-41809](CVE-2024/CVE-2024-418xx/CVE-2024-41809.json) (`2024-07-25T21:15:11.310`)
|
||||
- [CVE-2024-6558](CVE-2024/CVE-2024-65xx/CVE-2024-6558.json) (`2024-07-25T20:15:05.360`)
|
||||
- [CVE-2024-7105](CVE-2024/CVE-2024-71xx/CVE-2024-7105.json) (`2024-07-25T21:15:11.790`)
|
||||
- [CVE-2024-7106](CVE-2024/CVE-2024-71xx/CVE-2024-7106.json) (`2024-07-25T21:15:12.090`)
|
||||
- [CVE-2024-24621](CVE-2024/CVE-2024-246xx/CVE-2024-24621.json) (`2024-07-25T22:15:05.230`)
|
||||
- [CVE-2024-24622](CVE-2024/CVE-2024-246xx/CVE-2024-24622.json) (`2024-07-25T22:15:05.497`)
|
||||
- [CVE-2024-24623](CVE-2024/CVE-2024-246xx/CVE-2024-24623.json) (`2024-07-25T22:15:05.767`)
|
||||
- [CVE-2024-38103](CVE-2024/CVE-2024-381xx/CVE-2024-38103.json) (`2024-07-25T22:15:08.280`)
|
||||
- [CVE-2024-3938](CVE-2024/CVE-2024-39xx/CVE-2024-3938.json) (`2024-07-25T22:15:08.903`)
|
||||
- [CVE-2024-41468](CVE-2024/CVE-2024-414xx/CVE-2024-41468.json) (`2024-07-25T22:15:09.113`)
|
||||
- [CVE-2024-41473](CVE-2024/CVE-2024-414xx/CVE-2024-41473.json) (`2024-07-25T22:15:09.177`)
|
||||
|
||||
|
||||
### CVEs modified in the last Commit
|
||||
|
||||
Recently modified CVEs: `15`
|
||||
Recently modified CVEs: `3`
|
||||
|
||||
- [CVE-2024-1023](CVE-2024/CVE-2024-10xx/CVE-2024-1023.json) (`2024-07-25T21:15:10.280`)
|
||||
- [CVE-2024-1300](CVE-2024/CVE-2024-13xx/CVE-2024-1300.json) (`2024-07-25T21:15:10.487`)
|
||||
- [CVE-2024-1724](CVE-2024/CVE-2024-17xx/CVE-2024-1724.json) (`2024-07-25T20:15:03.800`)
|
||||
- [CVE-2024-2700](CVE-2024/CVE-2024-27xx/CVE-2024-2700.json) (`2024-07-25T21:15:10.930`)
|
||||
- [CVE-2024-3164](CVE-2024/CVE-2024-31xx/CVE-2024-3164.json) (`2024-07-25T21:15:11.093`)
|
||||
- [CVE-2024-3165](CVE-2024/CVE-2024-31xx/CVE-2024-3165.json) (`2024-07-25T21:15:11.210`)
|
||||
- [CVE-2024-37037](CVE-2024/CVE-2024-370xx/CVE-2024-37037.json) (`2024-07-25T20:25:41.760`)
|
||||
- [CVE-2024-37038](CVE-2024/CVE-2024-370xx/CVE-2024-37038.json) (`2024-07-25T20:25:10.287`)
|
||||
- [CVE-2024-37039](CVE-2024/CVE-2024-370xx/CVE-2024-37039.json) (`2024-07-25T20:21:56.307`)
|
||||
- [CVE-2024-37040](CVE-2024/CVE-2024-370xx/CVE-2024-37040.json) (`2024-07-25T20:17:38.113`)
|
||||
- [CVE-2024-37878](CVE-2024/CVE-2024-378xx/CVE-2024-37878.json) (`2024-07-25T20:16:31.443`)
|
||||
- [CVE-2024-5557](CVE-2024/CVE-2024-55xx/CVE-2024-5557.json) (`2024-07-25T20:00:46.653`)
|
||||
- [CVE-2024-5558](CVE-2024/CVE-2024-55xx/CVE-2024-5558.json) (`2024-07-25T20:00:25.773`)
|
||||
- [CVE-2024-5971](CVE-2024/CVE-2024-59xx/CVE-2024-5971.json) (`2024-07-25T21:15:11.560`)
|
||||
- [CVE-2024-6162](CVE-2024/CVE-2024-61xx/CVE-2024-6162.json) (`2024-07-25T21:15:11.677`)
|
||||
- [CVE-2024-38164](CVE-2024/CVE-2024-381xx/CVE-2024-38164.json) (`2024-07-25T22:15:08.627`)
|
||||
- [CVE-2024-38176](CVE-2024/CVE-2024-381xx/CVE-2024-38176.json) (`2024-07-25T22:15:08.733`)
|
||||
- [CVE-2024-39031](CVE-2024/CVE-2024-390xx/CVE-2024-39031.json) (`2024-07-25T22:15:08.837`)
|
||||
|
||||
|
||||
## Download and Usage
|
||||
|
65
_state.csv
65
_state.csv
@ -241726,7 +241726,7 @@ CVE-2024-1019,0,0,9d34fb91efb6a448073ac765944da7eab7ec7fd07c6fef378639c859599f68
|
||||
CVE-2024-1020,0,0,d848db5207b830f092dac5463c394c0f65f6423556f55d15e70d177c797c2de1,2024-05-17T02:35:10.867000
|
||||
CVE-2024-1021,0,0,89180a6ed9705fc79d8d8a15633a1cfe9e27adac2a4a623501249d49427826d0,2024-05-17T02:35:10.970000
|
||||
CVE-2024-1022,0,0,f42eaa1b302319f7e3148377e0522c31bf6c16d407215c446c1d3f1b55b4debd,2024-05-17T02:35:11.070000
|
||||
CVE-2024-1023,0,1,8d9bd157d13575cb2f7284ebb3a2797f2b531ebc1f530e248b6a4889677c4116,2024-07-25T21:15:10.280000
|
||||
CVE-2024-1023,0,0,8d9bd157d13575cb2f7284ebb3a2797f2b531ebc1f530e248b6a4889677c4116,2024-07-25T21:15:10.280000
|
||||
CVE-2024-1024,0,0,d47b3d3840cd70db883d335219cea52b6b4fa0e3fdfc3f4d41efc4b833dff6a1,2024-05-17T02:35:11.210000
|
||||
CVE-2024-1026,0,0,e127bb5d00442b36eed0e6ff6513a3a42c45706876a3a5f2167365447fb898e7,2024-05-17T02:35:11.320000
|
||||
CVE-2024-1027,0,0,7cdd04f65f65ce162dee4b0e860b968e4c1a6b7f21d53e978519c8259363a858,2024-05-17T02:35:11.427000
|
||||
@ -241983,7 +241983,7 @@ CVE-2024-1296,0,0,cf8635aadac748620898188ca490946b2b5c75731feefb613195ade4e01744
|
||||
CVE-2024-1297,0,0,99ab590c2d129ba188fde6f8a07a02c34afd396d53204b7be1878740241d5dfb,2024-02-20T19:50:53.960000
|
||||
CVE-2024-1298,0,0,411af97e2820bfadb11b2eaf3380004504a4d88488591f09c66407ba8874f33d,2024-06-11T04:15:12.513000
|
||||
CVE-2024-1299,0,0,47b1727e0acd46e63ac49556a737ccf9de95f19131e73e34450b5faaae9b9bfd,2024-03-07T13:52:27.110000
|
||||
CVE-2024-1300,0,1,d4f7e8e6b5ac6bd63760d8d777a219ba0fe706357403260381b501f5799316c3,2024-07-25T21:15:10.487000
|
||||
CVE-2024-1300,0,0,d4f7e8e6b5ac6bd63760d8d777a219ba0fe706357403260381b501f5799316c3,2024-07-25T21:15:10.487000
|
||||
CVE-2024-1301,0,0,aa9dff2d1f94038a5640d7365d0f71bbab0e502e1b3edb9e0b65d34a36d4daa7,2024-03-12T17:46:17.273000
|
||||
CVE-2024-1302,0,0,e9f787047b014f4b6f30daaa3fa30820f8e27de1e4755915987ac5c6f51ec22f,2024-03-12T17:46:17.273000
|
||||
CVE-2024-1303,0,0,7938284658534aa4f8cce7112905f213924253ddbfc659d61385595a0a46a57b,2024-03-12T17:46:17.273000
|
||||
@ -242368,7 +242368,7 @@ CVE-2024-1720,0,0,5f5ab364680f73fe36cdeef9e6784cd2a2ccddac9910224dc8b02d12bed9bd
|
||||
CVE-2024-1721,0,0,eb5f51f53eea8230bc7c9cfdc8a49e9ff2dfc7003ac468e860d0250fb679c030,2024-05-21T16:53:56.550000
|
||||
CVE-2024-1722,0,0,42b1784fafcdd32cd3de080a0db388e459b3fea8e17fa87d175294bba4e974fc,2024-02-29T13:49:29.390000
|
||||
CVE-2024-1723,0,0,94af9097193d9313a869e27fb9b3b59f6506dae8c000210c296f13f3a745bbf6,2024-03-13T18:15:58.530000
|
||||
CVE-2024-1724,0,1,fa0a947287b9dc29fbda5db7ec6cdee88bf657d98e8214ff142d41554a8a99af,2024-07-25T20:15:03.800000
|
||||
CVE-2024-1724,0,0,fa0a947287b9dc29fbda5db7ec6cdee88bf657d98e8214ff142d41554a8a99af,2024-07-25T20:15:03.800000
|
||||
CVE-2024-1725,0,0,0ee3e786fc3a6bde6a8ff18d77d971ec6a662811131e618f86487e4ea98156f8,2024-05-08T02:15:09.067000
|
||||
CVE-2024-1726,0,0,bc2267887b9a57c4c91a15f093198e5713873bada3d866b94302e1c02f97e158,2024-04-25T17:24:59.967000
|
||||
CVE-2024-1727,0,0,3ffad474a6b8688c8928b9908a66b725cdd6c054eaeb3d886c89c54b8393df58,2024-04-16T12:15:09.843000
|
||||
@ -245553,6 +245553,9 @@ CVE-2024-24595,0,0,60cbf43b4ffe16980edf9f066ee72877675697740095e8bc5fd2b97074fae
|
||||
CVE-2024-2460,0,0,ae8df8f819284d0f0ea1a2589261357f393234fec195be42118065d37d02123d,2024-03-20T13:00:16.367000
|
||||
CVE-2024-2461,0,0,3675df79bf0e67837aabf4aba26445efc39c7438e724314f5cb2e5a06114ad47,2024-06-11T13:54:12.057000
|
||||
CVE-2024-2462,0,0,c2850c2db0d510188371f385966a118a20022451062b0469e11f70aee3c15934,2024-06-11T13:54:12.057000
|
||||
CVE-2024-24621,1,1,025b1c8784b423fa54b9f8e0b3e122e89efb6ca01659b665506347f8882601be,2024-07-25T22:15:05.230000
|
||||
CVE-2024-24622,1,1,23f97dabe6bed621318bb16126e7b3485766f34df04c75b625744666017b2395,2024-07-25T22:15:05.497000
|
||||
CVE-2024-24623,1,1,74c00c3d98273ab2ac408fcf11a38b9046f70d78e27678130503176a38450c42,2024-07-25T22:15:05.767000
|
||||
CVE-2024-2463,0,0,24deeeee766ad4a5a7424dba127cb4cbbe9e946086a31f7db9b5902aa6111178,2024-03-21T15:24:35.093000
|
||||
CVE-2024-2464,0,0,5ff7c9aac18d394d4849e149117cdc80dedc6fee12e8baf9893132cc38ce131f,2024-03-21T15:24:35.093000
|
||||
CVE-2024-2465,0,0,6230da2d3a7d355f9109bcbe86ce790145cd318aa89b33fca16121fe02380d5a,2024-03-21T15:24:35.093000
|
||||
@ -247323,7 +247326,7 @@ CVE-2024-26996,0,0,f13300a99169a38a9b0787aa8393009120551c7b98f04ab9b92ca6acb9849
|
||||
CVE-2024-26997,0,0,454540311fe5335a43e8980f30eaa156ee7f28db2700fe42f0a36241f9986681,2024-06-27T13:15:57.663000
|
||||
CVE-2024-26998,0,0,281e6eb4c5d981f1fcef4f88265ed667d32fc924df201ebf7684cb9f100b10a0,2024-05-13T08:15:11.390000
|
||||
CVE-2024-26999,0,0,746a041d0b57a0dac118a92c96e95bc625975348006bc70154dba37cf11624b7,2024-06-25T23:15:28.903000
|
||||
CVE-2024-2700,0,1,82a9c51beca27476b54a2bd6859e19dcee4c316356467ebff59d9bbcce1bfea0,2024-07-25T21:15:10.930000
|
||||
CVE-2024-2700,0,0,82a9c51beca27476b54a2bd6859e19dcee4c316356467ebff59d9bbcce1bfea0,2024-07-25T21:15:10.930000
|
||||
CVE-2024-27000,0,0,a188327baa92543e9233de18ad4a972a4d9ab817448115f3501854ba860d8fd9,2024-06-25T23:15:29.003000
|
||||
CVE-2024-27001,0,0,183600c577d9122077ec4624ba5f391c6d325c24bd29b2ddb007399d500a2963,2024-06-27T12:15:23.673000
|
||||
CVE-2024-27002,0,0,996c4b76277c18891f74138faebaa5ccbc6a3dccb26df3f871e3eed2ae04779f,2024-05-13T08:15:11.473000
|
||||
@ -248730,8 +248733,8 @@ CVE-2024-29062,0,0,fd7e4b3c77dd4d50570502e9a76290b7938f32ddd5cdd5d39cf2ed3ca2452
|
||||
CVE-2024-29063,0,0,a8033ce9e699f35cb65dc8d63268bfdd99aa16f594ad08413d90e8003a22bf2e,2024-04-10T13:24:00.070000
|
||||
CVE-2024-29064,0,0,88daf3a7de89b464600feb0ee044529e05b02bc2ba2ebf4683d236ef22e3a252,2024-04-10T13:24:00.070000
|
||||
CVE-2024-29066,0,0,b57916d53c87b911e1996a4619a92f6e3a854e8931117c8efeb51360c73379e4,2024-04-10T13:24:00.070000
|
||||
CVE-2024-29068,1,1,9e125f91bac5a4be7be32d099461d1eb38ac8191a4502dfeedca5349a30bbf1f,2024-07-25T20:15:04.280000
|
||||
CVE-2024-29069,1,1,69616911bddd6cd929e9d8f7c1354809115585b17ed50dc9f1fd8b40d1ffbbe7,2024-07-25T20:15:04.483000
|
||||
CVE-2024-29068,0,0,9e125f91bac5a4be7be32d099461d1eb38ac8191a4502dfeedca5349a30bbf1f,2024-07-25T20:15:04.280000
|
||||
CVE-2024-29069,0,0,69616911bddd6cd929e9d8f7c1354809115585b17ed50dc9f1fd8b40d1ffbbe7,2024-07-25T20:15:04.483000
|
||||
CVE-2024-2907,0,0,bd4e59455721fd47a3f3bf4cc54009a430bac090133efd0393d311456e4d173d,2024-04-25T13:18:13.537000
|
||||
CVE-2024-29070,0,0,9bb8fc70fcc7f2f8368c3f24ea4c3b75c88f99fe4e019835c530d2dc358d46c3,2024-07-24T12:55:13.223000
|
||||
CVE-2024-29071,0,0,06a4c013d7966a06671f5afa3de9f823a9a7634e70711b0ea0f16d92c424f917,2024-03-25T13:47:14.087000
|
||||
@ -250517,10 +250520,10 @@ CVE-2024-31630,0,0,2bd16e3fcef7bda0b7ed937f45148dde60c59ea9d09224ef4dc76dc8aeb1e
|
||||
CVE-2024-31631,0,0,189299e833a9bdec5625f34c9b7af7b60646f6c7b2cd4586dea999ec400d5e00,2024-06-05T17:15:13.130000
|
||||
CVE-2024-31634,0,0,cd6336332928e139372eaeb7f2fa7bd12555d147721492304ddeef71595ef37a,2024-04-16T13:24:07.103000
|
||||
CVE-2024-31636,0,0,5030ab945dd9e3d071b87a4da035a97defc5897507c6002a20e31f1008a32478,2024-07-03T01:55:16.580000
|
||||
CVE-2024-3164,0,1,78a15a52bf4f552a7d70fc64367124c5316febc749d2958d692ae8e41e90e236,2024-07-25T21:15:11.093000
|
||||
CVE-2024-3164,0,0,78a15a52bf4f552a7d70fc64367124c5316febc749d2958d692ae8e41e90e236,2024-07-25T21:15:11.093000
|
||||
CVE-2024-31648,0,0,2922cc98178cad367ce9967a9bb0554e38b9bf3f7eeaabe3324ef2b9c342145f,2024-04-16T13:24:07.103000
|
||||
CVE-2024-31649,0,0,4e97e11dec1d0224f80d5fc46b087ead4bd3503ddd935380e84b5c378f32db60,2024-04-16T13:24:07.103000
|
||||
CVE-2024-3165,0,1,5d4125192eb880f8e0f62f3292900a808b3e92403c0986cb3fe4084513fabf17,2024-07-25T21:15:11.210000
|
||||
CVE-2024-3165,0,0,5d4125192eb880f8e0f62f3292900a808b3e92403c0986cb3fe4084513fabf17,2024-07-25T21:15:11.210000
|
||||
CVE-2024-31650,0,0,f91457293ffe9951d31a570db1b9cb5f0c4dfb9ffa5e388dc3d2c34a75979925,2024-07-03T01:55:17.350000
|
||||
CVE-2024-31651,0,0,2f1b682345eecb1fdf8666f197b953cac229ba6b6b34d2f7c287258788c8508c,2024-04-16T13:24:07.103000
|
||||
CVE-2024-31652,0,0,2f3d2336fbc8f42d1dec7a1682c8c016320ebabd666e8e526baaf0f45acfa966,2024-04-16T13:24:07.103000
|
||||
@ -253958,11 +253961,11 @@ CVE-2024-37030,0,0,229fd4bf632e5359976e983ea5a913e4683537817839ea114ee982b3925f6
|
||||
CVE-2024-37031,0,0,82ddf62a2a657c3d311c62178fe12d95bbdde7904d2439de7382b7f0bb38049e,2024-06-03T14:46:24.250000
|
||||
CVE-2024-37032,0,0,beeaa82ce4e7adb7aae5c7f769a38fdec94afd87f3fb4ab76e8b43cd58eb538b,2024-07-15T22:15:02.747000
|
||||
CVE-2024-37036,0,0,2b54af7dc068612b23a8155f4d9bf9df74610908e0974df8f03646c9dd55441d,2024-06-13T18:36:09.010000
|
||||
CVE-2024-37037,0,1,2437fc027a38caf4d1fff40b3a10b943bdb8be9b58eab07857b1bc1c0eca008e,2024-07-25T20:25:41.760000
|
||||
CVE-2024-37038,0,1,b6a592cdbbef388e98cb8a181a98f43993dd04af5a29282f5a8621e285e63d4d,2024-07-25T20:25:10.287000
|
||||
CVE-2024-37039,0,1,427e29014ccfdee6c0a0efce1d2857c8c66aa8f2c91b25d4776461240ebe8e01,2024-07-25T20:21:56.307000
|
||||
CVE-2024-37037,0,0,2437fc027a38caf4d1fff40b3a10b943bdb8be9b58eab07857b1bc1c0eca008e,2024-07-25T20:25:41.760000
|
||||
CVE-2024-37038,0,0,b6a592cdbbef388e98cb8a181a98f43993dd04af5a29282f5a8621e285e63d4d,2024-07-25T20:25:10.287000
|
||||
CVE-2024-37039,0,0,427e29014ccfdee6c0a0efce1d2857c8c66aa8f2c91b25d4776461240ebe8e01,2024-07-25T20:21:56.307000
|
||||
CVE-2024-3704,0,0,8d8edf31fe712d750bd16cd71638ddaccdd4a68add8e16c5c76ca7518cd53211,2024-07-05T13:15:10.640000
|
||||
CVE-2024-37040,0,1,1bbfae07a817bfde05104c14dbae87acc906b9fb8985fe0f6499e654b7c74082,2024-07-25T20:17:38.113000
|
||||
CVE-2024-37040,0,0,1bbfae07a817bfde05104c14dbae87acc906b9fb8985fe0f6499e654b7c74082,2024-07-25T20:17:38.113000
|
||||
CVE-2024-3705,0,0,7ec4cc9508fbe16d598471acb12ef9f10887cd89a6e60f8556987a083d32e53c,2024-07-05T13:15:10.820000
|
||||
CVE-2024-37051,0,0,3268b708226eb5bd758bffa3ca599641a98a9df6a73ccfb261433e9cd20679e2,2024-07-05T16:15:04.777000
|
||||
CVE-2024-37052,0,0,8c2ce45e1a917627156fb6f5798d593e2b2d38bf19b709592434b7d7f927dfe3,2024-06-04T16:57:41.053000
|
||||
@ -254447,7 +254450,7 @@ CVE-2024-37871,0,0,6e47b0e50b0d49ee0ab3ce3931de2ff879ddb6bce80a9c8a17ef14f992b7b
|
||||
CVE-2024-37872,0,0,55b4403e334cb9996013bbf0a392a1a97f30dd72376b633dd5dca32256bf5ac9,2024-07-12T16:11:44.030000
|
||||
CVE-2024-37873,0,0,55d4998aa453b15b9f1f9084f8c693113fcb670dbe4b4a10f682ad8eb96cb8e0,2024-07-11T13:06:13.187000
|
||||
CVE-2024-37877,0,0,98d87856290ef25573ad2760a197255731eca0e52a46652b56e8c7a7e059ade2,2024-06-13T18:35:19.777000
|
||||
CVE-2024-37878,0,1,fa121d6a32fa8cd93ec07420dccbfe683ad3a2717d3c26dc1f429f81b82f82de,2024-07-25T20:16:31.443000
|
||||
CVE-2024-37878,0,0,fa121d6a32fa8cd93ec07420dccbfe683ad3a2717d3c26dc1f429f81b82f82de,2024-07-25T20:16:31.443000
|
||||
CVE-2024-3788,0,0,6b959b24977bfe93124701dc390076a86010e99d87dbe3186e4044d17a0dbe72,2024-05-14T16:11:39.510000
|
||||
CVE-2024-37880,0,0,82eff4be44645b4491042424f1f050de41161f24ce7895f2d65362440f2e1175,2024-06-12T16:30:15.053000
|
||||
CVE-2024-37881,0,0,fafe084cbebf486f837ec15aad94ff51628af0624cdbbaa015b3cc71821530aa,2024-06-20T12:44:01.637000
|
||||
@ -254616,6 +254619,7 @@ CVE-2024-3810,0,0,4b9c7ead6ab7332e33f083e2f6cd125d9bb6a7d7cb025550c9e1df7b290846
|
||||
CVE-2024-38100,0,0,362baa65b60907783f71ef535888ecc651c6a6f88d46ab2740373fbba12147fc,2024-07-11T18:23:21.183000
|
||||
CVE-2024-38101,0,0,3184ee552caeb588c360c81315ee0416a9266764a3a583623a630f5c0b87dc6d,2024-07-11T18:23:05.597000
|
||||
CVE-2024-38102,0,0,b8f3bed70811e842b10b0e44e049aa13327d439097a470d245182f818341d462,2024-07-11T18:33:01.643000
|
||||
CVE-2024-38103,1,1,4ad136957cd72fb1c25365dbe2784f9fd1a2a0e75d8638769f81ec9e3770998e,2024-07-25T22:15:08.280000
|
||||
CVE-2024-38104,0,0,934543cd72c92227418f82cc6731b22a50ac357f374ae5c93a97a0b40688cfaa,2024-07-11T18:32:06.187000
|
||||
CVE-2024-38105,0,0,5ee7b6bcc3f23b6c027ef1e20204ab9e08d3961eefc81a59082038a3ba1cd79b,2024-07-11T18:31:05.480000
|
||||
CVE-2024-3811,0,0,7753fbebaa8d958ade5ff525a0ab8fa28bb6d42c662f58346b2bf00c9a2b2418,2024-05-20T13:00:34.807000
|
||||
@ -254626,9 +254630,9 @@ CVE-2024-3814,0,0,af559420ce1e3044689136ce469515a498db3d8c3f527cd805c49729f88c5c
|
||||
CVE-2024-3815,0,0,b8c8a85ee4e0df355cab9e3d8b72a412d3d9d1a29cf1232bd66e69ecee9ede27,2024-06-17T12:42:04.623000
|
||||
CVE-2024-38156,0,0,b24436c85d01ced9aa10bffdcc3048064061e2106e9f06caaac14532dc6e9f6d,2024-07-19T13:01:44.567000
|
||||
CVE-2024-3816,0,0,ca9c8b3746ea2ebbbc383e9aa135dd99550dbafdbe5ff9c69dbe15b33a0feabf,2024-07-03T14:37:07.750000
|
||||
CVE-2024-38164,0,0,e7eb1a1db4412ff9b61d5b019cb40685089c40e6befcdf888fce1298b753ce47,2024-07-25T04:15:05.433000
|
||||
CVE-2024-38164,0,1,de24b1c2c8757d5ae4c896b258769cf2baacb10454b223d2f886551ad476cc25,2024-07-25T22:15:08.627000
|
||||
CVE-2024-3817,0,0,4cefb34eb15d4ef81a2470a00ac0f43601ef6263c0fd4425e7542c27d02dfa54,2024-04-18T13:04:28.900000
|
||||
CVE-2024-38176,0,0,33e4cec8173ccc9dffc80b9137a6de8de96bd0ab42152d7128f7036cd96c1d3f,2024-07-25T04:15:05.560000
|
||||
CVE-2024-38176,0,1,e1638c5475998a4b11533da0fc145f86c6d27f8dcc8d9902805e782bb4392632,2024-07-25T22:15:08.733000
|
||||
CVE-2024-3818,0,0,b4c982a18364880791124fa7ba25840b7eb37a53aa1551fa23324d948b6ddd3f,2024-04-19T13:10:25.637000
|
||||
CVE-2024-3819,0,0,c25bdc543ba06fd05ac51b0b8912467c3fc6d8848be54d697bfdb5995b1a7e51,2024-05-02T18:00:37.360000
|
||||
CVE-2024-3820,0,0,8985e7d1e7aecc5fe081b43705d723ec0ca067093ca4a65f30dd280cab84082f,2024-06-03T14:46:24.250000
|
||||
@ -254654,9 +254658,9 @@ CVE-2024-38282,0,0,0b84325e8423ee1d927b510486c46be47f1c2c84d1f4cca17c487d6f5ea39
|
||||
CVE-2024-38283,0,0,797ece42e985c33b58c5d43ea734dda88927de464a1a03ca93cecae13e751b09,2024-06-13T18:35:19.777000
|
||||
CVE-2024-38284,0,0,5cfc5feb3350954f13e8af96dc3b24da21459352d04588b83c72c59d0194580e,2024-06-13T18:35:19.777000
|
||||
CVE-2024-38285,0,0,7e28442ebee8b34d71e5708e3d778f155bb5ea07375678fa14265f29cc1dda8d,2024-06-13T18:35:19.777000
|
||||
CVE-2024-38287,1,1,e498edc7b8c17a2517757a5d7a93fcb095282748653adcf2c4252e406413dbe1,2024-07-25T20:15:04.887000
|
||||
CVE-2024-38288,1,1,cccb88659ba5834bf9cab79657cfc8bde92c4fe28a17a5035c5d10ab16d5238e,2024-07-25T20:15:04.953000
|
||||
CVE-2024-38289,1,1,c8f52e710827514c48c73e5c4fb3c37e86d553703606858417f21ca21c4258d8,2024-07-25T20:15:05.017000
|
||||
CVE-2024-38287,0,0,e498edc7b8c17a2517757a5d7a93fcb095282748653adcf2c4252e406413dbe1,2024-07-25T20:15:04.887000
|
||||
CVE-2024-38288,0,0,cccb88659ba5834bf9cab79657cfc8bde92c4fe28a17a5035c5d10ab16d5238e,2024-07-25T20:15:04.953000
|
||||
CVE-2024-38289,0,0,c8f52e710827514c48c73e5c4fb3c37e86d553703606858417f21ca21c4258d8,2024-07-25T20:15:05.017000
|
||||
CVE-2024-3829,0,0,bf09bfac220b5e30500c1e820d1b81945c22904d8e9c5dfde5faaff94c981597,2024-06-03T14:46:24.250000
|
||||
CVE-2024-38293,0,0,db540509e2b09b1cf976c07d02eb5180e9ce221e532de6476381169b8943dd64,2024-07-03T02:04:54.487000
|
||||
CVE-2024-38294,0,0,cfe666b9712fab71a124db5665eed08c4872b4737e6668b46d4396d88c0aebaa,2024-06-13T18:36:09.010000
|
||||
@ -255067,7 +255071,7 @@ CVE-2024-39023,0,0,973861fba318ff13a4dd340336454548bbd625a4637128153f1ed9fe03662
|
||||
CVE-2024-39027,0,0,9f73e18bd924a22ea308a0e3f3aba42dd8cadda957e02d96adc8536dc59ded1c,2024-07-08T15:48:01
|
||||
CVE-2024-39028,0,0,a2641222edcef12e310d06c15f66d85419ac0430d888fa7eecd56f4af8dd2579,2024-07-08T15:47:26.720000
|
||||
CVE-2024-3903,0,0,e1c6da3858ae6e8352eea69425b877e7a9386bde1a277b8207c331dc00d06d7a,2024-05-14T16:11:39.510000
|
||||
CVE-2024-39031,0,0,e5520859a866921030fc1384c2ab2bf863abb5a11a15d9c4b232e5f035349aa7,2024-07-12T16:11:49.347000
|
||||
CVE-2024-39031,0,1,d24f6f8147beeb7e9c2d09f46b9b50d67c2b9ac54ebfd67e20353ba96152db2b,2024-07-25T22:15:08.837000
|
||||
CVE-2024-39036,0,0,8b0e3b7a757c7630c97609bf5affb9bafa3162d1af04d1ccd31492e6e46f7c28,2024-07-17T13:34:20.520000
|
||||
CVE-2024-3904,0,0,b47d95974559a4f3b756535a5502c34ce174362aa3e2f750b6b7a9a829cd5533,2024-07-23T01:15:09.063000
|
||||
CVE-2024-3905,0,0,67966257112781442fc6e512d6c151edda862eaaff35815fcc6adec0f7a08ca4,2024-06-04T19:20:26.357000
|
||||
@ -255198,6 +255202,7 @@ CVE-2024-39373,0,0,e03c6c4e4265087cfa8c4bbe8fccd5576189838192e80bd89272e600b85fa
|
||||
CVE-2024-39374,0,0,ceb09b5bb4e8be416a15f13560d443b1e635d211ece43c085341bae7ef26131f,2024-06-27T17:11:52.390000
|
||||
CVE-2024-39375,0,0,7f7f7a9309aed2a09a305dfdf1e1d93b0589de917a3b11ae3ae79eb9d410a9e7,2024-06-27T17:11:52.390000
|
||||
CVE-2024-39376,0,0,ff38615940f53b46258a81c8b3ac7c33f4e18906965f9bf4f05657720710f5f6,2024-06-27T17:11:52.390000
|
||||
CVE-2024-3938,1,1,32eb792b51550aeec2f84baec0958d8a050675b486c5aec4a52780d824b72546,2024-07-25T22:15:08.903000
|
||||
CVE-2024-3939,0,0,946bcd2da6cf8e6d3629d51459f4ff005d5f6fd111c61e8b42a0b8395ce78a5e,2024-05-28T12:39:28.377000
|
||||
CVE-2024-3940,0,0,9b4f68dc6c260883aad4ea511cde5305f79b78a30a9cc16969c94330d4b864d9,2024-05-14T16:11:39.510000
|
||||
CVE-2024-3941,0,0,35d6089b62c06226c8a1fbb42f6b4f7549cfd9ebea65fdddb79305777fa7b160,2024-05-14T16:11:39.510000
|
||||
@ -255529,7 +255534,7 @@ CVE-2024-4031,0,0,5f28e8c1b5067aec87f50d97cb32ada2d0e893cae64c0dbc730c44d567aac9
|
||||
CVE-2024-40318,0,0,cb8d835da8ac747b72478a7f280452dd5fc676a31f007346bf8684ae861a8946,2024-07-25T19:15:10.230000
|
||||
CVE-2024-4032,0,0,3888c98c0dc9113e1403e75c67bd485cc9805e1b1c4cbd087358208523feaf6e,2024-06-20T12:44:22.977000
|
||||
CVE-2024-40322,0,0,9e0e5f7f0965d0ebc33e4a2793beba8c7539aefbe8b3463a17519c41c1cd56fe,2024-07-16T18:00:02.110000
|
||||
CVE-2024-40324,1,1,2cd0b5566e2c85a49c1bb07b2878ba68390f2e9997fcae23c936aaf1c12193f2,2024-07-25T20:15:05.077000
|
||||
CVE-2024-40324,0,0,2cd0b5566e2c85a49c1bb07b2878ba68390f2e9997fcae23c936aaf1c12193f2,2024-07-25T20:15:05.077000
|
||||
CVE-2024-40328,0,0,1ecb3aeeb912c43ca654a9972851beb0d9eb6ba5a46f3041ea2c2c60432dd8b1,2024-07-11T15:06:20.507000
|
||||
CVE-2024-40329,0,0,26b60d9602f8b52b720fff41651ef4092fad02f73b2a1ba0d8eaca9598e4c3e0,2024-07-12T16:11:58.887000
|
||||
CVE-2024-4033,0,0,100a78a446daab2b380bdb2306f7e35c115de46018456d74b097346d037da090,2024-05-02T18:00:37.360000
|
||||
@ -255885,6 +255890,8 @@ CVE-2024-41463,0,0,bd01c30877b33f610aa36a40e0ea829fcf3c906cb5c49b0b716e6bdd4345e
|
||||
CVE-2024-41464,0,0,912b66e2d05b713f45914d4cd1fa3604e8464867c0f39c45c7d1525cacb1b691,2024-07-25T12:36:39.947000
|
||||
CVE-2024-41465,0,0,e029cd8634fe3086d10430ea064b95ae8512deac6d3845daffbb574768625c7b,2024-07-25T12:36:39.947000
|
||||
CVE-2024-41466,0,0,97aa02d971ce915f9cf78bd3459f554b45935900ee34841cc9fdabfe7a6874b8,2024-07-25T12:36:39.947000
|
||||
CVE-2024-41468,1,1,be49f6b381cc6734ca9939fc7aae65f7955765d2d2a7436114b81054c2a9c999,2024-07-25T22:15:09.113000
|
||||
CVE-2024-41473,1,1,91fc5ae31a8ce60c26cca52d8d1923b28b85b350cb7e0703df1545797f9dbcdd,2024-07-25T22:15:09.177000
|
||||
CVE-2024-4148,0,0,71d4cc4cd9749254e9c2938609496cfae5673c1a094b971881b54b705d48028f,2024-06-03T14:46:24.250000
|
||||
CVE-2024-4149,0,0,28fd6853c4bd2a7bfb26cdd043f9abfc9e17f0ae1c9764bac61fec52fa0d04ad,2024-07-02T14:44:29.993000
|
||||
CVE-2024-41492,0,0,99c2077a213e0f65a294335ccdb0c65c6a250420405be03860c1fbd393c7f4a6,2024-07-22T13:00:53.287000
|
||||
@ -255945,8 +255952,8 @@ CVE-2024-4180,0,0,89f84993baa10ab5b41ed58678b5b9e31ff190980a67ee18130266156f7434
|
||||
CVE-2024-41800,0,0,c9aa70b9eaf587ef09690849cfa26ea13534efc3690d1375ef8b5e938dedeaa9,2024-07-25T17:15:11.203000
|
||||
CVE-2024-41801,0,0,f2a624c3a8302c960ea86b1d706f87c6e20f746155fba94a3068e7373f371bea,2024-07-25T17:15:11.423000
|
||||
CVE-2024-41806,0,0,fada7d53e3e2199f0b078a325bbd8761b8dad871eaa56e934d7ea42fe2265469,2024-07-25T15:15:11.210000
|
||||
CVE-2024-41808,1,1,9027fae13f229b5c09a375ce00447e22b4b1cce2554b65768ce09d6e6df6ab50,2024-07-25T20:15:05.153000
|
||||
CVE-2024-41809,1,1,a775db40f5a4daad58b7afae1c9b7db997ff10e10527f601bde83f66eecd4170,2024-07-25T21:15:11.310000
|
||||
CVE-2024-41808,0,0,9027fae13f229b5c09a375ce00447e22b4b1cce2554b65768ce09d6e6df6ab50,2024-07-25T20:15:05.153000
|
||||
CVE-2024-41809,0,0,a775db40f5a4daad58b7afae1c9b7db997ff10e10527f601bde83f66eecd4170,2024-07-25T21:15:11.310000
|
||||
CVE-2024-4181,0,0,318f7b6282445099b873be7e9b6d90d9a8a899d8ebeb5f7676f33b80d9073c4d,2024-05-16T13:03:05.353000
|
||||
CVE-2024-4182,0,0,0d8f83951a03e7673897d4b6402c0de2918a0bc9490e2ea7f1f32823e0e2921f,2024-04-26T12:58:17.720000
|
||||
CVE-2024-41824,0,0,47989ccb6404b62a8cb0e5c16e1a456b7d013ad0bd3667ac206b0f700dc33163,2024-07-24T12:55:13.223000
|
||||
@ -257131,8 +257138,8 @@ CVE-2024-5552,0,0,7f73b574dd8e83d52dd7f28ecc579b960fbf7de562da98c7e63b5b8e0fd54b
|
||||
CVE-2024-5553,0,0,c4739ca4bfc71591786473d36aff26ccf561ba778e4c902dca863cedff7bba13,2024-06-13T18:36:09.013000
|
||||
CVE-2024-5554,0,0,74bc30aa41742477c70b24fe6a1325284ef507b86f8f58abff9cf8ec0fe1023d,2024-07-18T12:28:43.707000
|
||||
CVE-2024-5555,0,0,04da76d03dc7341c8a138d42367dd78d50c3a88f001073e3ae48b09dec66a0e6,2024-07-18T12:28:43.707000
|
||||
CVE-2024-5557,0,1,71e19027344115370537e5e9f2ac729a9013865b6ffe7632f9b652113dae4753,2024-07-25T20:00:46.653000
|
||||
CVE-2024-5558,0,1,d7061155c6f430b38a1e769635e4eca1c24478e5beedfff7ff120ab1f85e7481,2024-07-25T20:00:25.773000
|
||||
CVE-2024-5557,0,0,71e19027344115370537e5e9f2ac729a9013865b6ffe7632f9b652113dae4753,2024-07-25T20:00:46.653000
|
||||
CVE-2024-5558,0,0,d7061155c6f430b38a1e769635e4eca1c24478e5beedfff7ff120ab1f85e7481,2024-07-25T20:00:25.773000
|
||||
CVE-2024-5559,0,0,0c59604cbf219c2ba1c247f52c304752b12dd0f3c92c8b3c96e21ad233f99b0a,2024-06-13T18:36:09.010000
|
||||
CVE-2024-5560,0,0,002123ffc16696131d663e9c06724d8fb4501ef3ca4bc4191b4229c106e3346c,2024-07-25T19:59:58.017000
|
||||
CVE-2024-5564,0,0,582ae8d6e013444879054c957a9f974e1fbdab4bea18417275b8c53698226d12,2024-07-19T16:15:03.193000
|
||||
@ -257412,7 +257419,7 @@ CVE-2024-5965,0,0,9678cf2eb18ba50e506ac9918028ddeb3c443af1b219027dc9d98541cb8273
|
||||
CVE-2024-5966,0,0,554ab96b833511e084a1ba15972a76a5727ada41d1caccbee2c2fb11ec3339d5,2024-06-24T20:00:23.970000
|
||||
CVE-2024-5967,0,0,c675e381b6c54a17455bb64c66cffebfea8bdbd8774aa5359fba110937f85e27,2024-06-20T12:44:01.637000
|
||||
CVE-2024-5970,0,0,e17a8b7d022fd70a35f0b32d2191e09c5597e5e1c83547c2cb361b6d17360bc1,2024-06-20T12:44:01.637000
|
||||
CVE-2024-5971,0,1,e4f98c6267afcbb4d9afd3329ec44a1a1f7f72e0048e7418d4a554bf5527a469,2024-07-25T21:15:11.560000
|
||||
CVE-2024-5971,0,0,e4f98c6267afcbb4d9afd3329ec44a1a1f7f72e0048e7418d4a554bf5527a469,2024-07-25T21:15:11.560000
|
||||
CVE-2024-5972,0,0,3700c5b3eb4bcd1d3bafe18b568e7aab0a0471128c3ce92a2f73ba8aa9a9cb4f,2024-06-28T19:15:07.500000
|
||||
CVE-2024-5973,0,0,2d8084cf190a1aabb2055b961565b9805ce6ba0f851f188224d67d99d834e8cf,2024-07-25T15:18:05.157000
|
||||
CVE-2024-5974,0,0,7ccf1724194ada1507df11f624ca32c0386136cdfa7ae25f910321f76e1abc40,2024-07-09T18:19:14.047000
|
||||
@ -257545,7 +257552,7 @@ CVE-2024-6153,0,0,aefe9e23b8ed1d87e58382d973bdf0f329fa76bb8df894b701324ee041e253
|
||||
CVE-2024-6154,0,0,35ebac2e0d0212d63c52f8322328795df9a4917e7e1439a1c42bcda24384133e,2024-06-21T11:22:01.687000
|
||||
CVE-2024-6160,0,0,ef1a3b3e7f3366ded429b369db1d335204ba1e5aa345b7b6a0087f8051f2471a,2024-06-24T12:57:36.513000
|
||||
CVE-2024-6161,0,0,4874ef369326f57ebaead3e865a12df6057ceb7ec30e698c3deb9b52e2b10028,2024-07-09T18:19:14.047000
|
||||
CVE-2024-6162,0,1,58e77c96a091e21bc4222c97fd6c9956f581d56d70327ff91056071a087926f0,2024-07-25T21:15:11.677000
|
||||
CVE-2024-6162,0,0,58e77c96a091e21bc4222c97fd6c9956f581d56d70327ff91056071a087926f0,2024-07-25T21:15:11.677000
|
||||
CVE-2024-6163,0,0,a7111efd9bbca18864edd7eac6469f395d4eb81bc59fa76c3e42cc0c59bc6e2c,2024-07-08T15:49:22.437000
|
||||
CVE-2024-6164,0,0,614f49d1e735bb6e3edae2e7504c9e172f5564ab53752d92c142ee3a46cadc2e,2024-07-18T12:28:43.707000
|
||||
CVE-2024-6166,0,0,c93093bf8454afe95675994fb929c06931906789a59088dfba4992e2491ed4c6,2024-07-12T14:23:53.600000
|
||||
@ -257777,7 +257784,7 @@ CVE-2024-6554,0,0,c39b715167392909a130cc6479af2acca1cb23375ca0bdab5b0fb951f0bce6
|
||||
CVE-2024-6555,0,0,bf68ef8f1bd3876021fc33b504457daba53832080530806ef27f797ea5536a0b,2024-07-12T12:49:07.030000
|
||||
CVE-2024-6556,0,0,246920c1b32eb0a0369982110178f9a30464427865e75d42710950bf8d6bff6c,2024-07-11T13:05:54.930000
|
||||
CVE-2024-6557,0,0,5f8a5c5bf162c69368d24395d90aef2e1a9fd156ec4a6d0f0e02ca54e1438d8b,2024-07-16T13:43:58.773000
|
||||
CVE-2024-6558,1,1,1c60057281bdb12625fceb4e9f76bf006d596617ef2c63102136f042d62dc6ca,2024-07-25T20:15:05.360000
|
||||
CVE-2024-6558,0,0,1c60057281bdb12625fceb4e9f76bf006d596617ef2c63102136f042d62dc6ca,2024-07-25T20:15:05.360000
|
||||
CVE-2024-6559,0,0,2866b76c45bfa3fcb2a29d8b63ef335520f76c77ee94faa7443c1c34b010c185,2024-07-16T13:43:58.773000
|
||||
CVE-2024-6560,0,0,131d869035ca470d33b727fd5e6c3ee539b49dab7fe493b3f3155c0a8f2eb339,2024-07-22T13:00:53.287000
|
||||
CVE-2024-6563,0,0,1b4d88909a8afd884220e1df693026407578c717bcca7ba5cdd4e0bbbf29fb3c,2024-07-09T14:19:19.300000
|
||||
@ -257976,5 +257983,5 @@ CVE-2024-7080,0,0,0e8be1f5ff49b98f2e12f041d9740e0c98dcb4e55d2c6eaebafa31aadf939e
|
||||
CVE-2024-7081,0,0,4fe1e74e2e72cdc5207c5caa9565efa26fd09299ada94965c4896e36b361ec5f,2024-07-25T12:36:39.947000
|
||||
CVE-2024-7091,0,0,e8d0dd8bb435701b961e03b8d58836a663b21eec4a32e53ec9bb349c72e7294b,2024-07-25T12:36:39.947000
|
||||
CVE-2024-7101,0,0,e38bfce381af474fe5d83b2a017b3d9cde94994938f5c809ee169a4122de7c78,2024-07-25T16:15:04.720000
|
||||
CVE-2024-7105,1,1,79dd67af39650009390e7b476527237a1b12f53b9ae2bc840f7b6f81f68c2970,2024-07-25T21:15:11.790000
|
||||
CVE-2024-7106,1,1,5e68ef5aeb0a28231e715ea10bcf9bd287440c3361184536e65db5c8aef6e534,2024-07-25T21:15:12.090000
|
||||
CVE-2024-7105,0,0,79dd67af39650009390e7b476527237a1b12f53b9ae2bc840f7b6f81f68c2970,2024-07-25T21:15:11.790000
|
||||
CVE-2024-7106,0,0,5e68ef5aeb0a28231e715ea10bcf9bd287440c3361184536e65db5c8aef6e534,2024-07-25T21:15:12.090000
|
||||
|
Can't render this file because it is too large.
|
Loading…
x
Reference in New Issue
Block a user