mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-05-08 19:47:09 +00:00
Auto-Update: 2024-08-13T08:00:25.647843+00:00
This commit is contained in:
parent
27003173b6
commit
083a6c1d9d
21
CVE-2024/CVE-2024-67xx/CVE-2024-6724.json
Normal file
21
CVE-2024/CVE-2024-67xx/CVE-2024-6724.json
Normal file
@ -0,0 +1,21 @@
|
||||
{
|
||||
"id": "CVE-2024-6724",
|
||||
"sourceIdentifier": "contact@wpscan.com",
|
||||
"published": "2024-08-13T06:15:04.083",
|
||||
"lastModified": "2024-08-13T06:15:04.083",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "The Generate Images WordPress plugin before 5.2.8 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup)"
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://wpscan.com/vulnerability/0cb3158a-263d-4c4a-8029-62b453c281cb/",
|
||||
"source": "contact@wpscan.com"
|
||||
}
|
||||
]
|
||||
}
|
68
CVE-2024/CVE-2024-68xx/CVE-2024-6823.json
Normal file
68
CVE-2024/CVE-2024-68xx/CVE-2024-6823.json
Normal file
@ -0,0 +1,68 @@
|
||||
{
|
||||
"id": "CVE-2024-6823",
|
||||
"sourceIdentifier": "security@wordfence.com",
|
||||
"published": "2024-08-13T06:15:05.120",
|
||||
"lastModified": "2024-08-13T06:15:05.120",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "The Media Library Assistant plugin for WordPress is vulnerable to arbitrary file uploads due to missing file type validation involving the mla-inline-edit-upload-scripts AJAX action in all versions up to, and including, 3.18. This makes it possible for authenticated attackers, with Author-level access and above, to upload arbitrary files on the affected site's server which may make remote code execution possible."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security@wordfence.com",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 8.8,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security@wordfence.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-434"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/browser/media-library-assistant/trunk/includes/class-mla-settings.php#L32",
|
||||
"source": "security@wordfence.com"
|
||||
},
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/changeset/3133909/",
|
||||
"source": "security@wordfence.com"
|
||||
},
|
||||
{
|
||||
"url": "https://wordpress.org/plugins/media-library-assistant/#developers",
|
||||
"source": "security@wordfence.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/9a446fe7-c97a-436e-b494-b924e6518297?source=cve",
|
||||
"source": "security@wordfence.com"
|
||||
}
|
||||
]
|
||||
}
|
84
CVE-2024/CVE-2024-72xx/CVE-2024-7247.json
Normal file
84
CVE-2024/CVE-2024-72xx/CVE-2024-7247.json
Normal file
@ -0,0 +1,84 @@
|
||||
{
|
||||
"id": "CVE-2024-7247",
|
||||
"sourceIdentifier": "security@wordfence.com",
|
||||
"published": "2024-08-13T06:15:05.777",
|
||||
"lastModified": "2024-08-13T06:15:05.777",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "The Element Pack Elementor Addons (Header Footer, Template Library, Dynamic Grid & Carousel, Remote Arrows) plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's Custom Gallery and Countdown widgets in all versions up to, and including, 5.7.2 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security@wordfence.com",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 6.4,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 3.1,
|
||||
"impactScore": 2.7
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security@wordfence.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/browser/bdthemes-element-pack-lite/trunk/assets/js/bdt-uikit.js#L4223",
|
||||
"source": "security@wordfence.com"
|
||||
},
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/browser/bdthemes-element-pack-lite/trunk/assets/js/ep-scripts.js#L514",
|
||||
"source": "security@wordfence.com"
|
||||
},
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/browser/bdthemes-element-pack-lite/trunk/assets/js/ep-scripts.js#L576",
|
||||
"source": "security@wordfence.com"
|
||||
},
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/changeset/3133714/",
|
||||
"source": "security@wordfence.com"
|
||||
},
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/changeset/3133714/#file1110",
|
||||
"source": "security@wordfence.com"
|
||||
},
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3130355%40bdthemes-element-pack-lite&new=3130355%40bdthemes-element-pack-lite&sfp_email=&sfph_mail=",
|
||||
"source": "security@wordfence.com"
|
||||
},
|
||||
{
|
||||
"url": "https://wordpress.org/plugins/bdthemes-element-pack-lite/#developers",
|
||||
"source": "security@wordfence.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/86068c50-2f24-4af9-a20f-704d52e98ce2?source=cve",
|
||||
"source": "security@wordfence.com"
|
||||
}
|
||||
]
|
||||
}
|
148
CVE-2024/CVE-2024-77xx/CVE-2024-7715.json
Normal file
148
CVE-2024/CVE-2024-77xx/CVE-2024-7715.json
Normal file
@ -0,0 +1,148 @@
|
||||
{
|
||||
"id": "CVE-2024-7715",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2024-08-13T07:15:13.677",
|
||||
"lastModified": "2024-08-13T07:15:13.677",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [
|
||||
{
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"unsupported-when-assigned"
|
||||
]
|
||||
}
|
||||
],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "** UNSUPPORTED WHEN ASSIGNED ** A vulnerability was found in D-Link DNS-120, DNR-202L, DNS-315L, DNS-320, DNS-320L, DNS-320LW, DNS-321, DNR-322L, DNS-323, DNS-325, DNS-326, DNS-327L, DNR-326, DNS-340L, DNS-343, DNS-345, DNS-726-4, DNS-1100-4, DNS-1200-05 and DNS-1550-04 up to 20240812. It has been classified as critical. This affects the function sprintf of the file /cgi-bin/photocenter_mgr.cgi. The manipulation of the argument filter leads to command injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. NOTE: This vulnerability only affects products that are no longer supported by the maintainer. NOTE: Vendor was contacted early and confirmed that the product is end-of-life. It should be retired and replaced."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV40": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "4.0",
|
||||
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"attackRequirements": "NONE",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"vulnerableSystemConfidentiality": "LOW",
|
||||
"vulnerableSystemIntegrity": "LOW",
|
||||
"vulnerableSystemAvailability": "LOW",
|
||||
"subsequentSystemConfidentiality": "NONE",
|
||||
"subsequentSystemIntegrity": "NONE",
|
||||
"subsequentSystemAvailability": "NONE",
|
||||
"exploitMaturity": "NOT_DEFINED",
|
||||
"confidentialityRequirements": "NOT_DEFINED",
|
||||
"integrityRequirements": "NOT_DEFINED",
|
||||
"availabilityRequirements": "NOT_DEFINED",
|
||||
"modifiedAttackVector": "NOT_DEFINED",
|
||||
"modifiedAttackComplexity": "NOT_DEFINED",
|
||||
"modifiedAttackRequirements": "NOT_DEFINED",
|
||||
"modifiedPrivilegesRequired": "NOT_DEFINED",
|
||||
"modifiedUserInteraction": "NOT_DEFINED",
|
||||
"modifiedVulnerableSystemConfidentiality": "NOT_DEFINED",
|
||||
"modifiedVulnerableSystemIntegrity": "NOT_DEFINED",
|
||||
"modifiedVulnerableSystemAvailability": "NOT_DEFINED",
|
||||
"modifiedSubsequentSystemConfidentiality": "NOT_DEFINED",
|
||||
"modifiedSubsequentSystemIntegrity": "NOT_DEFINED",
|
||||
"modifiedSubsequentSystemAvailability": "NOT_DEFINED",
|
||||
"safety": "NOT_DEFINED",
|
||||
"automatable": "NOT_DEFINED",
|
||||
"recovery": "NOT_DEFINED",
|
||||
"valueDensity": "NOT_DEFINED",
|
||||
"vulnerabilityResponseEffort": "NOT_DEFINED",
|
||||
"providerUrgency": "NOT_DEFINED",
|
||||
"baseScore": 5.3,
|
||||
"baseSeverity": "MEDIUM"
|
||||
}
|
||||
}
|
||||
],
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "LOW",
|
||||
"baseScore": 6.3,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 3.4
|
||||
}
|
||||
],
|
||||
"cvssMetricV2": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "2.0",
|
||||
"vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P",
|
||||
"accessVector": "NETWORK",
|
||||
"accessComplexity": "LOW",
|
||||
"authentication": "SINGLE",
|
||||
"confidentialityImpact": "PARTIAL",
|
||||
"integrityImpact": "PARTIAL",
|
||||
"availabilityImpact": "PARTIAL",
|
||||
"baseScore": 6.5
|
||||
},
|
||||
"baseSeverity": "MEDIUM",
|
||||
"exploitabilityScore": 8.0,
|
||||
"impactScore": 6.4,
|
||||
"acInsufInfo": false,
|
||||
"obtainAllPrivilege": false,
|
||||
"obtainUserPrivilege": false,
|
||||
"obtainOtherPrivilege": false,
|
||||
"userInteractionRequired": false
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-77"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/BuaaIOTTeam/Iot_Dlink_NAS/blob/main/DNS_cgi_photo_search.md",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://supportannouncement.us.dlink.com/security/publication.aspx?name=SAP10383",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.274281",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.274281",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?submit.389261",
|
||||
"source": "cna@vuldb.com"
|
||||
}
|
||||
]
|
||||
}
|
30
README.md
30
README.md
@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours.
|
||||
### Last Repository Update
|
||||
|
||||
```plain
|
||||
2024-08-13T06:00:17.899409+00:00
|
||||
2024-08-13T08:00:25.647843+00:00
|
||||
```
|
||||
|
||||
### Most recent CVE Modification Timestamp synchronized with NVD
|
||||
|
||||
```plain
|
||||
2024-08-13T05:15:14.027000+00:00
|
||||
2024-08-13T07:15:13.677000+00:00
|
||||
```
|
||||
|
||||
### Last Data Feed Release
|
||||
@ -33,31 +33,17 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
|
||||
### Total Number of included CVEs
|
||||
|
||||
```plain
|
||||
259663
|
||||
259667
|
||||
```
|
||||
|
||||
### CVEs added in the last Commit
|
||||
|
||||
Recently added CVEs: `18`
|
||||
Recently added CVEs: `4`
|
||||
|
||||
- [CVE-2024-28166](CVE-2024/CVE-2024-281xx/CVE-2024-28166.json) (`2024-08-13T04:15:06.867`)
|
||||
- [CVE-2024-33003](CVE-2024/CVE-2024-330xx/CVE-2024-33003.json) (`2024-08-13T04:15:07.380`)
|
||||
- [CVE-2024-33005](CVE-2024/CVE-2024-330xx/CVE-2024-33005.json) (`2024-08-13T04:15:07.740`)
|
||||
- [CVE-2024-39591](CVE-2024/CVE-2024-395xx/CVE-2024-39591.json) (`2024-08-13T05:15:13.347`)
|
||||
- [CVE-2024-41730](CVE-2024/CVE-2024-417xx/CVE-2024-41730.json) (`2024-08-13T04:15:08.050`)
|
||||
- [CVE-2024-41731](CVE-2024/CVE-2024-417xx/CVE-2024-41731.json) (`2024-08-13T04:15:08.330`)
|
||||
- [CVE-2024-41732](CVE-2024/CVE-2024-417xx/CVE-2024-41732.json) (`2024-08-13T04:15:08.637`)
|
||||
- [CVE-2024-41733](CVE-2024/CVE-2024-417xx/CVE-2024-41733.json) (`2024-08-13T04:15:08.987`)
|
||||
- [CVE-2024-41734](CVE-2024/CVE-2024-417xx/CVE-2024-41734.json) (`2024-08-13T05:15:13.587`)
|
||||
- [CVE-2024-41735](CVE-2024/CVE-2024-417xx/CVE-2024-41735.json) (`2024-08-13T04:15:09.323`)
|
||||
- [CVE-2024-41736](CVE-2024/CVE-2024-417xx/CVE-2024-41736.json) (`2024-08-13T04:15:09.607`)
|
||||
- [CVE-2024-41737](CVE-2024/CVE-2024-417xx/CVE-2024-41737.json) (`2024-08-13T04:15:10.003`)
|
||||
- [CVE-2024-42373](CVE-2024/CVE-2024-423xx/CVE-2024-42373.json) (`2024-08-13T05:15:13.800`)
|
||||
- [CVE-2024-42374](CVE-2024/CVE-2024-423xx/CVE-2024-42374.json) (`2024-08-13T04:15:10.283`)
|
||||
- [CVE-2024-42375](CVE-2024/CVE-2024-423xx/CVE-2024-42375.json) (`2024-08-13T04:15:10.567`)
|
||||
- [CVE-2024-42376](CVE-2024/CVE-2024-423xx/CVE-2024-42376.json) (`2024-08-13T04:15:10.837`)
|
||||
- [CVE-2024-42377](CVE-2024/CVE-2024-423xx/CVE-2024-42377.json) (`2024-08-13T04:15:11.290`)
|
||||
- [CVE-2024-7092](CVE-2024/CVE-2024-70xx/CVE-2024-7092.json) (`2024-08-13T05:15:14.027`)
|
||||
- [CVE-2024-6724](CVE-2024/CVE-2024-67xx/CVE-2024-6724.json) (`2024-08-13T06:15:04.083`)
|
||||
- [CVE-2024-6823](CVE-2024/CVE-2024-68xx/CVE-2024-6823.json) (`2024-08-13T06:15:05.120`)
|
||||
- [CVE-2024-7247](CVE-2024/CVE-2024-72xx/CVE-2024-7247.json) (`2024-08-13T06:15:05.777`)
|
||||
- [CVE-2024-7715](CVE-2024/CVE-2024-77xx/CVE-2024-7715.json) (`2024-08-13T07:15:13.677`)
|
||||
|
||||
|
||||
### CVEs modified in the last Commit
|
||||
|
40
_state.csv
40
_state.csv
@ -248371,7 +248371,7 @@ CVE-2024-28162,0,0,1ec7e71177e25cd293cbbf1e2069c505933e30b0255293c8f25c76750a7bd
|
||||
CVE-2024-28163,0,0,2ab950e2f7c3eb99ef2d44d7cd9af8946dbe397a4a6d73bb020329a22bfd44bc,2024-03-12T12:40:13.500000
|
||||
CVE-2024-28164,0,0,ad548c66e5661c4e8af5a7b236b78552ef27421cd91cd0f63f8c805acf9b4cbb,2024-08-06T16:40:49.433000
|
||||
CVE-2024-28165,0,0,46715a30feb276737abc87d7ed511464bf9b4ab74c972d46bf629bd896d4f942,2024-05-14T19:18:31.490000
|
||||
CVE-2024-28166,1,1,7561ba9adc211a54ff550cf61f548d2df6c3d29c89ba4aad56553fc7158d805c,2024-08-13T04:15:06.867000
|
||||
CVE-2024-28166,0,0,7561ba9adc211a54ff550cf61f548d2df6c3d29c89ba4aad56553fc7158d805c,2024-08-13T04:15:06.867000
|
||||
CVE-2024-28167,0,0,1d78d7f4b9ae6d1ce7ebcfb3fbb052b019794bf39b0c5c69579e1b351fc0d30f,2024-04-09T12:48:04.090000
|
||||
CVE-2024-2817,0,0,c674fcdba74ce38976cc24fe7d55a331a6fbc3ee70971f1cbb43b1b952ff96f8,2024-05-17T02:38:32.210000
|
||||
CVE-2024-28171,0,0,33886fb8942146c369bad25646a1251c19953189c1ff16eea603f4d0cd1b835d,2024-03-22T12:45:36.130000
|
||||
@ -251699,9 +251699,9 @@ CVE-2024-3300,0,0,5ed420ceec7dd67c7a8c90e2661f4216c9dcb91251ff120ca64b2c4babcfd8
|
||||
CVE-2024-33000,0,0,4fa8fb2595c0457675d86cac50d60385335480588f2754c16c92238c89528578,2024-05-14T19:17:55.627000
|
||||
CVE-2024-33001,0,0,e89dbc37b1bbada386268abb25bbfd26ba11d29f63337f64d12b9c9ded295629,2024-08-09T19:36:18.637000
|
||||
CVE-2024-33002,0,0,bbd8f2f002227dcd69fa7ae031c0a1ecfe37f7776553c4961a527a6eaa21d480,2024-05-14T19:17:55.627000
|
||||
CVE-2024-33003,1,1,1602f1eee39755514cf50c32ab624620abb60d77d0069d1eb8bb4d10e7f6d86b,2024-08-13T04:15:07.380000
|
||||
CVE-2024-33003,0,0,1602f1eee39755514cf50c32ab624620abb60d77d0069d1eb8bb4d10e7f6d86b,2024-08-13T04:15:07.380000
|
||||
CVE-2024-33004,0,0,fd3947efc9f6a79b80c112947403a2b0a9c6fdaf32bf5c0bd7b38f5115845055,2024-07-03T01:57:23.963000
|
||||
CVE-2024-33005,1,1,75a50d0d6a57563982befa31a2e9e5eacdf5e969935fcb1a171c87f62269c1e6,2024-08-13T04:15:07.740000
|
||||
CVE-2024-33005,0,0,75a50d0d6a57563982befa31a2e9e5eacdf5e969935fcb1a171c87f62269c1e6,2024-08-13T04:15:07.740000
|
||||
CVE-2024-33006,0,0,36d8448e64529b3242e1d14d3223c50e6fc2fd869abf9e54a01bde3e4dc1ca08,2024-05-14T19:17:55.627000
|
||||
CVE-2024-33007,0,0,8e38d5b6d2b9eb1b80b7c4b68a0aa966535c1221f485493f9e187b5af17c2ba9,2024-07-03T01:57:24.730000
|
||||
CVE-2024-33008,0,0,0bcdb3b7e19679fd6080e0c5f4ecdde63f1bf333ca492bd35c2d1bf34e5150a9,2024-05-14T19:17:55.627000
|
||||
@ -255756,7 +255756,7 @@ CVE-2024-39571,0,0,5f5a00a374a36754f81b606fe5b7617af673280667e3ded939b747c7e23ff
|
||||
CVE-2024-39573,0,0,66fc7feceb0e35a8b2e536fb0fe145ff47c70fa679791c05a2dafe67c9ad9e6e,2024-07-12T14:15:16.400000
|
||||
CVE-2024-3958,0,0,6a863b448c805f7bc2ecb55496071d989e4d5758f7f91c3bce9d94ca75a26261,2024-08-08T13:04:18.753000
|
||||
CVE-2024-3959,0,0,1ce1302f5c536ae0ba1596a30e53c3274b88d91eb780326b1103788329e8cf86,2024-06-28T13:21:52.223000
|
||||
CVE-2024-39591,1,1,47b8fbd24f262bf31363d8c62eae4af35dd97966fd65d2ffb9a2d93516dc83d8,2024-08-13T05:15:13.347000
|
||||
CVE-2024-39591,0,0,47b8fbd24f262bf31363d8c62eae4af35dd97966fd65d2ffb9a2d93516dc83d8,2024-08-13T05:15:13.347000
|
||||
CVE-2024-39592,0,0,092a544949de7319ae89291bc739a96163c6c0d37a46e6cc9f12df6e56b452d2,2024-07-09T18:19:14.047000
|
||||
CVE-2024-39593,0,0,51f4661ccbaba7452aac7223f24d0b1eb585ba800f6962a627249fa8658c86e6,2024-07-09T18:19:14.047000
|
||||
CVE-2024-39594,0,0,637cf3efe25f76e3f7049bdd8fb7c900c50753635b8417f794e35a21a4031116,2024-07-09T18:19:14.047000
|
||||
@ -256716,14 +256716,14 @@ CVE-2024-4172,0,0,ae5cefdd41ee745a5f3463347f20f3f77110439c81ed1ad285dedf4b40da1c
|
||||
CVE-2024-41720,0,0,51d8d22362ddab17d5ebf589fc7956caae3f208813d6f6c5afe48ee9de7d866c,2024-08-05T12:41:45.957000
|
||||
CVE-2024-41726,0,0,e325c72cd77b10fa79a0c73cd0bce9d67f9472d40dd3ab04f6437f9f2b06b815,2024-08-01T13:59:09.707000
|
||||
CVE-2024-4173,0,0,47f39f3e8e603eac743ed4815cd724decf015716a2f0d9c17daf4d8fa3affc2d,2024-04-25T23:15:47.240000
|
||||
CVE-2024-41730,1,1,e17bf734c943b6202bbfa811dcc6a7236ac6ce5c1c0f693c29ef095ec38b00b8,2024-08-13T04:15:08.050000
|
||||
CVE-2024-41731,1,1,455f8a77ca54850f0d8dda84bfc39499d031631c937c80555a015fc961a5f029,2024-08-13T04:15:08.330000
|
||||
CVE-2024-41732,1,1,50da8c0b315ea9fd7548dda5a7cf64e03c1820450f60d9df33a5e039bf3fcfac,2024-08-13T04:15:08.637000
|
||||
CVE-2024-41733,1,1,a1c4a714e7b1fde25db1437d340968bdca08ddd7580730ef8cffb3479028a039,2024-08-13T04:15:08.987000
|
||||
CVE-2024-41734,1,1,60c2a737e28852ce1c0ae950a2bf3192eabf1787dfa51b4c5b646f34b52a9292,2024-08-13T05:15:13.587000
|
||||
CVE-2024-41735,1,1,64465d3a78bd983d9984c0482f5581488c06987c94a936c9318947b31b86e104,2024-08-13T04:15:09.323000
|
||||
CVE-2024-41736,1,1,d6fc4b89e5670a772dfb18d393fc0625c1347b587fb15bff596ab120a5a1a548,2024-08-13T04:15:09.607000
|
||||
CVE-2024-41737,1,1,0bdfb2dd7deafee9a43dbb34847bceaee8248377819c5049ea82baf0bf49fb5e,2024-08-13T04:15:10.003000
|
||||
CVE-2024-41730,0,0,e17bf734c943b6202bbfa811dcc6a7236ac6ce5c1c0f693c29ef095ec38b00b8,2024-08-13T04:15:08.050000
|
||||
CVE-2024-41731,0,0,455f8a77ca54850f0d8dda84bfc39499d031631c937c80555a015fc961a5f029,2024-08-13T04:15:08.330000
|
||||
CVE-2024-41732,0,0,50da8c0b315ea9fd7548dda5a7cf64e03c1820450f60d9df33a5e039bf3fcfac,2024-08-13T04:15:08.637000
|
||||
CVE-2024-41733,0,0,a1c4a714e7b1fde25db1437d340968bdca08ddd7580730ef8cffb3479028a039,2024-08-13T04:15:08.987000
|
||||
CVE-2024-41734,0,0,60c2a737e28852ce1c0ae950a2bf3192eabf1787dfa51b4c5b646f34b52a9292,2024-08-13T05:15:13.587000
|
||||
CVE-2024-41735,0,0,64465d3a78bd983d9984c0482f5581488c06987c94a936c9318947b31b86e104,2024-08-13T04:15:09.323000
|
||||
CVE-2024-41736,0,0,d6fc4b89e5670a772dfb18d393fc0625c1347b587fb15bff596ab120a5a1a548,2024-08-13T04:15:09.607000
|
||||
CVE-2024-41737,0,0,0bdfb2dd7deafee9a43dbb34847bceaee8248377819c5049ea82baf0bf49fb5e,2024-08-13T04:15:10.003000
|
||||
CVE-2024-4174,0,0,e168dfb28a2573f66b3120de326c0954bda564c12e3831aed75de7f1338d3089,2024-04-25T13:18:02.660000
|
||||
CVE-2024-4175,0,0,2f40401bb337bcc37138495e1928fb4d762f69fc829f768d707a278e8a423e1a,2024-04-25T13:18:02.660000
|
||||
CVE-2024-4176,0,0,2a1e283cc95c7d3d47b09f457f96512613ab4fb1878e9b333c02ce78f75d8385,2024-07-15T16:43:04.163000
|
||||
@ -257031,11 +257031,11 @@ CVE-2024-42366,0,0,26d79ce86c657c865adda744afaa0f4e93052091893cacc16340b64f87dbe
|
||||
CVE-2024-42367,0,0,e076a02bf03f8a97e18817904e3d95718772a1dffa8b800d6df36352b8b88cb0,2024-08-12T13:41:36.517000
|
||||
CVE-2024-4237,0,0,c38818d0c288b1eec57a9be9e655b05254cb3f3487787a1ecd91e69d9c20b38c,2024-05-17T02:40:19.580000
|
||||
CVE-2024-42370,0,0,bc0a8d588f536f34911e68724023599a65528bc23b4d4f6cda3f1a23005982af,2024-08-12T13:41:36.517000
|
||||
CVE-2024-42373,1,1,268e0cf5636ad1593dd2f3bc44571d6f21506a7ab18d4661356804bd79de6260,2024-08-13T05:15:13.800000
|
||||
CVE-2024-42374,1,1,3c9c8180947ca8ac780222a47604e8f8872ffd6769aa2151e9d00dede7d623e1,2024-08-13T04:15:10.283000
|
||||
CVE-2024-42375,1,1,6065461be6bc5e18d7c3a47d5705a7300766beef5cd778d5692a794a88ed9446,2024-08-13T04:15:10.567000
|
||||
CVE-2024-42376,1,1,89b8fa3dfa8d7405706484d0c53242159303a3d7305c907084b14e4b217a89c2,2024-08-13T04:15:10.837000
|
||||
CVE-2024-42377,1,1,6d5101c542ad0c42fa99c43c1ce885fa8c19ec270a032faca7aa5391949c8e41,2024-08-13T04:15:11.290000
|
||||
CVE-2024-42373,0,0,268e0cf5636ad1593dd2f3bc44571d6f21506a7ab18d4661356804bd79de6260,2024-08-13T05:15:13.800000
|
||||
CVE-2024-42374,0,0,3c9c8180947ca8ac780222a47604e8f8872ffd6769aa2151e9d00dede7d623e1,2024-08-13T04:15:10.283000
|
||||
CVE-2024-42375,0,0,6065461be6bc5e18d7c3a47d5705a7300766beef5cd778d5692a794a88ed9446,2024-08-13T04:15:10.567000
|
||||
CVE-2024-42376,0,0,89b8fa3dfa8d7405706484d0c53242159303a3d7305c907084b14e4b217a89c2,2024-08-13T04:15:10.837000
|
||||
CVE-2024-42377,0,0,6d5101c542ad0c42fa99c43c1ce885fa8c19ec270a032faca7aa5391949c8e41,2024-08-13T04:15:11.290000
|
||||
CVE-2024-4238,0,0,188cceccdce16b8df034bef32fee010a6dd0f801c6690e1589421c7cadfb521c,2024-06-04T19:20:33.063000
|
||||
CVE-2024-42381,0,0,a5fa1277b5fe346d1dd5469d0c93ac780c7d0547ab1d06a7617c27606bb89aa8,2024-08-01T13:59:22.207000
|
||||
CVE-2024-4239,0,0,cecc2be82896f12bf6cdae75a3b125d58c075d387f3da865cfaf565a2c454897,2024-06-04T19:20:33.163000
|
||||
@ -259112,6 +259112,7 @@ CVE-2024-6716,0,0,8ffb92442f0506288b44c8e147b3f474301f4b7d486d9477f8f7548823d67c
|
||||
CVE-2024-6717,0,0,0b065284c5a83df80f016d53c3ebe26a820992221428250ad8b4acf1f2d75be1,2024-07-24T12:55:13.223000
|
||||
CVE-2024-6720,0,0,1dc3a2e2b9f95baf4f0364462830a2005109f2f0ee9a4c40c2088696994c0bf6,2024-08-07T20:53:27.343000
|
||||
CVE-2024-6721,0,0,20bc3ac9fd25b0ef666ff8f606cfc8f742981337efa5a16bd2cfa701fac87a51,2024-07-15T16:15:03.467000
|
||||
CVE-2024-6724,1,1,d6f0c65558e68f99aa98f137ee26bad13287cde07077fb7ac2146c2fd6833cbd,2024-08-13T06:15:04.083000
|
||||
CVE-2024-6725,0,0,02f518ea588b9f58d1f41a7ee9055d6a87d38c1076b40cf72b33d47960c5f058,2024-07-31T12:57:02.300000
|
||||
CVE-2024-6726,0,0,67da9a54e5a829e4300bb2883a5b7a4407d07a460c0b67dc5027c2e9a4f78316,2024-07-30T13:33:30.653000
|
||||
CVE-2024-6727,0,0,9d08fdd347dc87a0df3a4e157904c3068a4121c1538981e1be169dd75a3fc029,2024-07-30T13:33:30.653000
|
||||
@ -259173,6 +259174,7 @@ CVE-2024-6805,0,0,df9c24152184824aaec79a13a2bf3e8af4b412b0a659321142aa5850936d97
|
||||
CVE-2024-6806,0,0,ee5c95118c41ce11e7d4b52c5bbead77dffa73ecabb9abea55db46ee557c211f,2024-07-24T12:55:13.223000
|
||||
CVE-2024-6807,0,0,e4d3dc581aa656108086542a60085fb674561ed6b78bc58e0e899b44edae1d40,2024-08-06T11:16:07.450000
|
||||
CVE-2024-6808,0,0,2df5a702fa4af6687f0c8dc8e100812ff9b6b346801edb239f41e0ca638c0076,2024-07-19T15:04:43.837000
|
||||
CVE-2024-6823,1,1,8c4a7dea1e2becf55798301bcb5fdc46f6ea3195981111648e71941f0f636703,2024-08-13T06:15:05.120000
|
||||
CVE-2024-6824,0,0,2b5b10cc415939a34f32e5b37be54f877a179f9144de8a5e8476b884ab80faa8,2024-08-08T13:04:18.753000
|
||||
CVE-2024-6828,0,0,5e3bce0050be5ef41f841daf735b80af46e729368278d26d6a7ddc5bbbdee66f,2024-07-24T12:55:13.223000
|
||||
CVE-2024-6830,0,0,66325e33317c6fde8b929b285667c5104c4ae04492532b5067560968ff36e7fb,2024-07-18T12:28:43.707000
|
||||
@ -259304,7 +259306,7 @@ CVE-2024-7081,0,0,6a139e489a9ff084a663269dd9c842c08d77e29c45f0c2d71d596839a517bb
|
||||
CVE-2024-7082,0,0,7f537cf9e56a23a456a2abd974bf40cbc8fb8378373545e42b0269e937581d9d,2024-08-06T16:30:24.547000
|
||||
CVE-2024-7084,0,0,3a2aa9dec6c248febe470c8d1edface773b4a9804761de6b43694a8997eff852,2024-08-06T16:30:24.547000
|
||||
CVE-2024-7091,0,0,ea018e26f872aadaa59f554aafa24269e38ad2d18885b5619000c0f610b93be1,2024-07-25T12:36:39.947000
|
||||
CVE-2024-7092,1,1,986c4c3c4a813ce8dd4153a922394c95340e640d4a6ba35a28e2272d3b23bcb1,2024-08-13T05:15:14.027000
|
||||
CVE-2024-7092,0,0,986c4c3c4a813ce8dd4153a922394c95340e640d4a6ba35a28e2272d3b23bcb1,2024-08-13T05:15:14.027000
|
||||
CVE-2024-7093,0,0,2af97c55d7ffe283d233de8149da5391663d6c7f2b6f21acff51e16815034b7f,2024-08-02T12:59:43.990000
|
||||
CVE-2024-7094,0,0,0a12253c503447778becc90c2babebb7883c1cb4f527863731d0138cb4fc555f,2024-08-13T03:15:04.400000
|
||||
CVE-2024-7100,0,0,dcfec02e0ae4a6f64f97ae0297c66dfbc0aebe11e663bfc596e9b5b147ad741e,2024-07-30T13:32:45.943000
|
||||
@ -259398,6 +259400,7 @@ CVE-2024-7224,0,0,af2db88c20757182d6fe4e4cfa97afc8f203736333d30a696d87d762a1939e
|
||||
CVE-2024-7225,0,0,e974c1f8e77945a548823cf60aed30edab7ed3ad9e75b60e5161d6e31cd3da09,2024-07-30T13:32:45.943000
|
||||
CVE-2024-7226,0,0,8ccb52401469e015e0678efa0fcd5200575cc7f7749dae8fc4bc7e839e645ade,2024-07-30T13:32:45.943000
|
||||
CVE-2024-7246,0,0,b268ee120ca92b4c7d0a004d06b39e1ba37d5fd50d8d0e082e72d2daefd1725e,2024-08-06T16:30:24.547000
|
||||
CVE-2024-7247,1,1,10b6563bcca9299dadfcef2964f18720d9da0668c22a520ba8f836a0ac593e11,2024-08-13T06:15:05.777000
|
||||
CVE-2024-7248,0,0,ebc2727ef1ac7b5ee7b71368a85d91d1db59260dc970f86f7476ace25fb5fea3,2024-07-30T13:32:45.943000
|
||||
CVE-2024-7249,0,0,b1c62b4f237d55dfb39f8f205e178006f9409a78ccfd426e79f2f98ca375d833,2024-07-30T13:32:45.943000
|
||||
CVE-2024-7250,0,0,2ad6dc357ed437eabcd60fe2775245fd2e54c1167d56f0a56470e33155a5fc4c,2024-07-30T13:32:45.943000
|
||||
@ -259662,3 +259665,4 @@ CVE-2024-7705,0,0,cf95b489808fa8132dfdd8d11fdf93e486e1b455e83524c7ef4630f887c078
|
||||
CVE-2024-7706,0,0,dddae6f8d636e0e2c3ba2b1628309dfeb1aca307337fd2625268eab5b9b234c9,2024-08-12T23:15:19.417000
|
||||
CVE-2024-7707,0,0,21170f2707eddb1f88d3623b0eff5f0856514ae1fb599ac77f04f14c1cb19563,2024-08-13T01:24:09.723000
|
||||
CVE-2024-7709,0,0,7f617395257f5decd3ca8318abe3ce517c53d7b8c4baa7edc2f2c2b481a048c8,2024-08-13T01:24:10.067000
|
||||
CVE-2024-7715,1,1,674e3a8487a50dd01276fd949946f18896c90b358f8f5fb3b8739aee9ce4e714,2024-08-13T07:15:13.677000
|
||||
|
Can't render this file because it is too large.
|
Loading…
x
Reference in New Issue
Block a user