mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-05-07 11:07:05 +00:00
Auto-Update: 2024-07-10T22:00:18.497829+00:00
This commit is contained in:
parent
66c4c5ada2
commit
0983a585f2
@ -2,8 +2,9 @@
|
||||
"id": "CVE-2022-39227",
|
||||
"sourceIdentifier": "security-advisories@github.com",
|
||||
"published": "2022-09-23T07:15:09.300",
|
||||
"lastModified": "2023-03-04T01:43:06.280",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2024-07-10T21:15:10.210",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -111,6 +112,10 @@
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://www.vicarius.io/vsociety/posts/authentication-bypass-in-python-jwt",
|
||||
"source": "security-advisories@github.com"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2023-51105",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-12-26T15:15:08.720",
|
||||
"lastModified": "2024-07-10T04:15:03.783",
|
||||
"lastModified": "2024-07-10T20:15:02.820",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -69,6 +69,10 @@
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "http://cgit.ghostscript.com/cgi-bin/cgit.cgi/mupdf.git/commit/?id=cee86dc519d5270a3b96476ad15809ceace64a26",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/dongyuma/sox-defects/blob/main/mupdf-defects.md",
|
||||
"source": "cve@mitre.org",
|
||||
|
21
CVE-2024/CVE-2024-250xx/CVE-2024-25076.json
Normal file
21
CVE-2024/CVE-2024-250xx/CVE-2024-25076.json
Normal file
@ -0,0 +1,21 @@
|
||||
{
|
||||
"id": "CVE-2024-25076",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-07-10T20:15:02.933",
|
||||
"lastModified": "2024-07-10T20:15:02.933",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "An issue was discovered on Renesas SmartBond DA14691, DA14695, DA14697, and DA14699 devices. The bootrom function responsible for validating the Flash Product Header directly uses a user-controllable size value (Length of Flash Config Section) to control a read from the QSPI device into a fixed sized buffer, resulting in a buffer overflow and execution of arbitrary code."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/atredispartners/advisories/blob/master/ATREDIS-2024-0001.md",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
21
CVE-2024/CVE-2024-250xx/CVE-2024-25077.json
Normal file
21
CVE-2024/CVE-2024-250xx/CVE-2024-25077.json
Normal file
@ -0,0 +1,21 @@
|
||||
{
|
||||
"id": "CVE-2024-25077",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-07-10T20:15:03.023",
|
||||
"lastModified": "2024-07-10T20:15:03.023",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "An issue was discovered on Renesas SmartBond DA14691, DA14695, DA14697, and DA14699 devices. The Nonce used for on-the-fly decryption of flash images is stored in an unsigned header, allowing its value to be modified without invalidating the signature used for secureboot image verification. Because the encryption engine for on-the-fly decryption uses AES in CTR mode without authentication, an attacker-modified Nonce can result in execution of arbitrary code."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/atredispartners/advisories/blob/master/ATREDIS-2024-0001.md",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
56
CVE-2024/CVE-2024-371xx/CVE-2024-37148.json
Normal file
56
CVE-2024/CVE-2024-371xx/CVE-2024-37148.json
Normal file
@ -0,0 +1,56 @@
|
||||
{
|
||||
"id": "CVE-2024-37148",
|
||||
"sourceIdentifier": "security-advisories@github.com",
|
||||
"published": "2024-07-10T20:15:03.280",
|
||||
"lastModified": "2024-07-10T20:15:03.280",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "GLPI is an open-source asset and IT management software package that provides ITIL Service Desk features, licenses tracking and software auditing. An authenticated user can exploit a SQL injection vulnerability in some AJAX scripts to alter another user account data and take control of it. Upgrade to 10.0.16."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 8.1,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 5.2
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-89"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/glpi-project/glpi/security/advisories/GHSA-p626-hph9-p6fj",
|
||||
"source": "security-advisories@github.com"
|
||||
}
|
||||
]
|
||||
}
|
56
CVE-2024/CVE-2024-371xx/CVE-2024-37149.json
Normal file
56
CVE-2024/CVE-2024-371xx/CVE-2024-37149.json
Normal file
@ -0,0 +1,56 @@
|
||||
{
|
||||
"id": "CVE-2024-37149",
|
||||
"sourceIdentifier": "security-advisories@github.com",
|
||||
"published": "2024-07-10T20:15:03.543",
|
||||
"lastModified": "2024-07-10T20:15:03.543",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "GLPI is an open-source asset and IT management software package that provides ITIL Service Desk features, licenses tracking and software auditing. An authenticated technician user can upload a malicious PHP script and hijack the plugin loader to execute this malicious script. Upgrade to 10.0.16."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "HIGH",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 7.2,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 1.2,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-73"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/glpi-project/glpi/security/advisories/GHSA-cwvp-j887-m4xh",
|
||||
"source": "security-advisories@github.com"
|
||||
}
|
||||
]
|
||||
}
|
72
CVE-2024/CVE-2024-373xx/CVE-2024-37310.json
Normal file
72
CVE-2024/CVE-2024-373xx/CVE-2024-37310.json
Normal file
@ -0,0 +1,72 @@
|
||||
{
|
||||
"id": "CVE-2024-37310",
|
||||
"sourceIdentifier": "security-advisories@github.com",
|
||||
"published": "2024-07-10T20:15:03.790",
|
||||
"lastModified": "2024-07-10T20:15:03.790",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "EVerest is an EV charging software stack. An integer overflow in the \"v2g_incoming_v2gtp\" function in the v2g_server.cpp implementation can allow a remote attacker to overflow the process' heap. This vulnerability is fixed in 2024.3.1 and 2024.6.0."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "HIGH",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 9.0,
|
||||
"baseSeverity": "CRITICAL"
|
||||
},
|
||||
"exploitabilityScore": 2.2,
|
||||
"impactScore": 6.0
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-122"
|
||||
},
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-190"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/EVerest/everest-core/commit/f73620c4c0f626e1097068a47e10cc27b369ad8e",
|
||||
"source": "security-advisories@github.com"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/EVerest/everest-core/releases/tag/2024.3.1",
|
||||
"source": "security-advisories@github.com"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/EVerest/everest-core/releases/tag/2024.6.0",
|
||||
"source": "security-advisories@github.com"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/EVerest/everest-core/security/advisories/GHSA-8g9q-7qr9-vc96",
|
||||
"source": "security-advisories@github.com"
|
||||
}
|
||||
]
|
||||
}
|
60
CVE-2024/CVE-2024-383xx/CVE-2024-38353.json
Normal file
60
CVE-2024/CVE-2024-383xx/CVE-2024-38353.json
Normal file
@ -0,0 +1,60 @@
|
||||
{
|
||||
"id": "CVE-2024-38353",
|
||||
"sourceIdentifier": "security-advisories@github.com",
|
||||
"published": "2024-07-10T20:15:04.053",
|
||||
"lastModified": "2024-07-10T20:15:04.053",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CodiMD allows realtime collaborative markdown notes on all platforms. CodiMD before 2.5.4 is missing authentication and access control vulnerability allowing an unauthenticated attacker to gain unauthorised access to image data uploaded to CodiMD. CodiMD does not require valid authentication to access uploaded images or to upload new image data. An attacker who can determine an uploaded image's URL can gain unauthorised access to uploaded image data. Due to the insecure random filename generation in the underlying Formidable library, an attacker can determine the filenames for previously uploaded images and the likelihood of this issue being exploited is increased. This vulnerability is fixed in 2.5.4.\n"
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 5.3,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 1.4
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-338"
|
||||
},
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-862"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/hackmdio/codimd/security/advisories/GHSA-2764-jppc-p2hm",
|
||||
"source": "security-advisories@github.com"
|
||||
}
|
||||
]
|
||||
}
|
56
CVE-2024/CVE-2024-383xx/CVE-2024-38354.json
Normal file
56
CVE-2024/CVE-2024-383xx/CVE-2024-38354.json
Normal file
@ -0,0 +1,56 @@
|
||||
{
|
||||
"id": "CVE-2024-38354",
|
||||
"sourceIdentifier": "security-advisories@github.com",
|
||||
"published": "2024-07-10T20:15:04.293",
|
||||
"lastModified": "2024-07-10T20:15:04.293",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CodiMD allows realtime collaborative markdown notes on all platforms. The notebook feature of Hackmd.io permits the rendering of iframe `HTML` tags with an improperly sanitized `name` attribute. This vulnerability enables attackers to perform cross-site scripting (XSS) attacks via DOM clobbering. This vulnerability is fixed in 2.5.4."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 8.1,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 5.2
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/hackmdio/codimd/security/advisories/GHSA-22jv-vch8-2vp9",
|
||||
"source": "security-advisories@github.com"
|
||||
}
|
||||
]
|
||||
}
|
56
CVE-2024/CVE-2024-396xx/CVE-2024-39693.json
Normal file
56
CVE-2024/CVE-2024-396xx/CVE-2024-39693.json
Normal file
@ -0,0 +1,56 @@
|
||||
{
|
||||
"id": "CVE-2024-39693",
|
||||
"sourceIdentifier": "security-advisories@github.com",
|
||||
"published": "2024-07-10T20:15:04.543",
|
||||
"lastModified": "2024-07-10T20:15:04.543",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Next.js is a React framework. A Denial of Service (DoS) condition was identified in Next.js. Exploitation of the bug can trigger a crash, affecting the availability of the server. his vulnerability was resolved in Next.js 13.5 and later."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 7.5,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-400"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/vercel/next.js/security/advisories/GHSA-fq54-2j52-jc42",
|
||||
"source": "security-advisories@github.com"
|
||||
}
|
||||
]
|
||||
}
|
66
CVE-2024/CVE-2024-61xx/CVE-2024-6148.json
Normal file
66
CVE-2024/CVE-2024-61xx/CVE-2024-6148.json
Normal file
@ -0,0 +1,66 @@
|
||||
{
|
||||
"id": "CVE-2024-6148",
|
||||
"sourceIdentifier": "secure@citrix.com",
|
||||
"published": "2024-07-10T21:15:10.730",
|
||||
"lastModified": "2024-07-10T21:15:10.730",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Bypass of GACS Policy Configuration settings in Citrix Workspace app for HTML5"
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV40": [
|
||||
{
|
||||
"source": "secure@citrix.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "4.0",
|
||||
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"attackRequirements": "NONE",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"vulnerableSystemConfidentiality": "LOW",
|
||||
"vulnerableSystemIntegrity": "LOW",
|
||||
"vulnerableSystemAvailability": "NONE",
|
||||
"subsequentSystemConfidentiality": "NONE",
|
||||
"subsequentSystemIntegrity": "NONE",
|
||||
"subsequentSystemAvailability": "NONE",
|
||||
"exploitMaturity": "NOT_DEFINED",
|
||||
"confidentialityRequirements": "NOT_DEFINED",
|
||||
"integrityRequirements": "NOT_DEFINED",
|
||||
"availabilityRequirements": "NOT_DEFINED",
|
||||
"modifiedAttackVector": "NOT_DEFINED",
|
||||
"modifiedAttackComplexity": "NOT_DEFINED",
|
||||
"modifiedAttackRequirements": "NOT_DEFINED",
|
||||
"modifiedPrivilegesRequired": "NOT_DEFINED",
|
||||
"modifiedUserInteraction": "NOT_DEFINED",
|
||||
"modifiedVulnerableSystemConfidentiality": "NOT_DEFINED",
|
||||
"modifiedVulnerableSystemIntegrity": "NOT_DEFINED",
|
||||
"modifiedVulnerableSystemAvailability": "NOT_DEFINED",
|
||||
"modifiedSubsequentSystemConfidentiality": "NOT_DEFINED",
|
||||
"modifiedSubsequentSystemIntegrity": "NOT_DEFINED",
|
||||
"modifiedSubsequentSystemAvailability": "NOT_DEFINED",
|
||||
"safety": "NOT_DEFINED",
|
||||
"automatable": "NOT_DEFINED",
|
||||
"recovery": "NOT_DEFINED",
|
||||
"valueDensity": "NOT_DEFINED",
|
||||
"vulnerabilityResponseEffort": "NOT_DEFINED",
|
||||
"providerUrgency": "NOT_DEFINED",
|
||||
"baseScore": 5.3,
|
||||
"baseSeverity": "MEDIUM"
|
||||
}
|
||||
}
|
||||
]
|
||||
},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://support.citrix.com/article/CTX678037",
|
||||
"source": "secure@citrix.com"
|
||||
}
|
||||
]
|
||||
}
|
66
CVE-2024/CVE-2024-61xx/CVE-2024-6149.json
Normal file
66
CVE-2024/CVE-2024-61xx/CVE-2024-6149.json
Normal file
@ -0,0 +1,66 @@
|
||||
{
|
||||
"id": "CVE-2024-6149",
|
||||
"sourceIdentifier": "secure@citrix.com",
|
||||
"published": "2024-07-10T21:15:10.830",
|
||||
"lastModified": "2024-07-10T21:15:10.830",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Redirection of users to a vulnerable URL in\u00a0Citrix Workspace app for HTML5"
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV40": [
|
||||
{
|
||||
"source": "secure@citrix.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "4.0",
|
||||
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:A/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"attackRequirements": "NONE",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "ACTIVE",
|
||||
"vulnerableSystemConfidentiality": "NONE",
|
||||
"vulnerableSystemIntegrity": "LOW",
|
||||
"vulnerableSystemAvailability": "NONE",
|
||||
"subsequentSystemConfidentiality": "NONE",
|
||||
"subsequentSystemIntegrity": "NONE",
|
||||
"subsequentSystemAvailability": "NONE",
|
||||
"exploitMaturity": "NOT_DEFINED",
|
||||
"confidentialityRequirements": "NOT_DEFINED",
|
||||
"integrityRequirements": "NOT_DEFINED",
|
||||
"availabilityRequirements": "NOT_DEFINED",
|
||||
"modifiedAttackVector": "NOT_DEFINED",
|
||||
"modifiedAttackComplexity": "NOT_DEFINED",
|
||||
"modifiedAttackRequirements": "NOT_DEFINED",
|
||||
"modifiedPrivilegesRequired": "NOT_DEFINED",
|
||||
"modifiedUserInteraction": "NOT_DEFINED",
|
||||
"modifiedVulnerableSystemConfidentiality": "NOT_DEFINED",
|
||||
"modifiedVulnerableSystemIntegrity": "NOT_DEFINED",
|
||||
"modifiedVulnerableSystemAvailability": "NOT_DEFINED",
|
||||
"modifiedSubsequentSystemConfidentiality": "NOT_DEFINED",
|
||||
"modifiedSubsequentSystemIntegrity": "NOT_DEFINED",
|
||||
"modifiedSubsequentSystemAvailability": "NOT_DEFINED",
|
||||
"safety": "NOT_DEFINED",
|
||||
"automatable": "NOT_DEFINED",
|
||||
"recovery": "NOT_DEFINED",
|
||||
"valueDensity": "NOT_DEFINED",
|
||||
"vulnerabilityResponseEffort": "NOT_DEFINED",
|
||||
"providerUrgency": "NOT_DEFINED",
|
||||
"baseScore": 4.8,
|
||||
"baseSeverity": "MEDIUM"
|
||||
}
|
||||
}
|
||||
]
|
||||
},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://support.citrix.com/article/CTX678037",
|
||||
"source": "secure@citrix.com"
|
||||
}
|
||||
]
|
||||
}
|
66
CVE-2024/CVE-2024-61xx/CVE-2024-6150.json
Normal file
66
CVE-2024/CVE-2024-61xx/CVE-2024-6150.json
Normal file
@ -0,0 +1,66 @@
|
||||
{
|
||||
"id": "CVE-2024-6150",
|
||||
"sourceIdentifier": "secure@citrix.com",
|
||||
"published": "2024-07-10T21:15:10.920",
|
||||
"lastModified": "2024-07-10T21:15:10.920",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A non-admin user can cause short-term disruption in Target VM availability\u00a0in\u00a0Citrix Provisioning"
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV40": [
|
||||
{
|
||||
"source": "secure@citrix.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "4.0",
|
||||
"vectorString": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"attackRequirements": "NONE",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"vulnerableSystemConfidentiality": "LOW",
|
||||
"vulnerableSystemIntegrity": "LOW",
|
||||
"vulnerableSystemAvailability": "LOW",
|
||||
"subsequentSystemConfidentiality": "NONE",
|
||||
"subsequentSystemIntegrity": "NONE",
|
||||
"subsequentSystemAvailability": "NONE",
|
||||
"exploitMaturity": "NOT_DEFINED",
|
||||
"confidentialityRequirements": "NOT_DEFINED",
|
||||
"integrityRequirements": "NOT_DEFINED",
|
||||
"availabilityRequirements": "NOT_DEFINED",
|
||||
"modifiedAttackVector": "NOT_DEFINED",
|
||||
"modifiedAttackComplexity": "NOT_DEFINED",
|
||||
"modifiedAttackRequirements": "NOT_DEFINED",
|
||||
"modifiedPrivilegesRequired": "NOT_DEFINED",
|
||||
"modifiedUserInteraction": "NOT_DEFINED",
|
||||
"modifiedVulnerableSystemConfidentiality": "NOT_DEFINED",
|
||||
"modifiedVulnerableSystemIntegrity": "NOT_DEFINED",
|
||||
"modifiedVulnerableSystemAvailability": "NOT_DEFINED",
|
||||
"modifiedSubsequentSystemConfidentiality": "NOT_DEFINED",
|
||||
"modifiedSubsequentSystemIntegrity": "NOT_DEFINED",
|
||||
"modifiedSubsequentSystemAvailability": "NOT_DEFINED",
|
||||
"safety": "NOT_DEFINED",
|
||||
"automatable": "NOT_DEFINED",
|
||||
"recovery": "NOT_DEFINED",
|
||||
"valueDensity": "NOT_DEFINED",
|
||||
"vulnerabilityResponseEffort": "NOT_DEFINED",
|
||||
"providerUrgency": "NOT_DEFINED",
|
||||
"baseScore": 4.8,
|
||||
"baseSeverity": "MEDIUM"
|
||||
}
|
||||
}
|
||||
]
|
||||
},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://support.citrix.com/article/CTX678025",
|
||||
"source": "secure@citrix.com"
|
||||
}
|
||||
]
|
||||
}
|
66
CVE-2024/CVE-2024-61xx/CVE-2024-6151.json
Normal file
66
CVE-2024/CVE-2024-61xx/CVE-2024-6151.json
Normal file
@ -0,0 +1,66 @@
|
||||
{
|
||||
"id": "CVE-2024-6151",
|
||||
"sourceIdentifier": "secure@citrix.com",
|
||||
"published": "2024-07-10T21:15:11.013",
|
||||
"lastModified": "2024-07-10T21:15:11.013",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Local Privilege escalation allows a low-privileged user to gain SYSTEM privileges\u00a0in\u00a0Virtual Delivery Agent for Windows used by Citrix Virtual Apps and Desktops and Citrix DaaS"
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV40": [
|
||||
{
|
||||
"source": "secure@citrix.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "4.0",
|
||||
"vectorString": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"attackRequirements": "NONE",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"vulnerableSystemConfidentiality": "HIGH",
|
||||
"vulnerableSystemIntegrity": "HIGH",
|
||||
"vulnerableSystemAvailability": "HIGH",
|
||||
"subsequentSystemConfidentiality": "NONE",
|
||||
"subsequentSystemIntegrity": "NONE",
|
||||
"subsequentSystemAvailability": "NONE",
|
||||
"exploitMaturity": "NOT_DEFINED",
|
||||
"confidentialityRequirements": "NOT_DEFINED",
|
||||
"integrityRequirements": "NOT_DEFINED",
|
||||
"availabilityRequirements": "NOT_DEFINED",
|
||||
"modifiedAttackVector": "NOT_DEFINED",
|
||||
"modifiedAttackComplexity": "NOT_DEFINED",
|
||||
"modifiedAttackRequirements": "NOT_DEFINED",
|
||||
"modifiedPrivilegesRequired": "NOT_DEFINED",
|
||||
"modifiedUserInteraction": "NOT_DEFINED",
|
||||
"modifiedVulnerableSystemConfidentiality": "NOT_DEFINED",
|
||||
"modifiedVulnerableSystemIntegrity": "NOT_DEFINED",
|
||||
"modifiedVulnerableSystemAvailability": "NOT_DEFINED",
|
||||
"modifiedSubsequentSystemConfidentiality": "NOT_DEFINED",
|
||||
"modifiedSubsequentSystemIntegrity": "NOT_DEFINED",
|
||||
"modifiedSubsequentSystemAvailability": "NOT_DEFINED",
|
||||
"safety": "NOT_DEFINED",
|
||||
"automatable": "NOT_DEFINED",
|
||||
"recovery": "NOT_DEFINED",
|
||||
"valueDensity": "NOT_DEFINED",
|
||||
"vulnerabilityResponseEffort": "NOT_DEFINED",
|
||||
"providerUrgency": "NOT_DEFINED",
|
||||
"baseScore": 8.5,
|
||||
"baseSeverity": "HIGH"
|
||||
}
|
||||
}
|
||||
]
|
||||
},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://support.citrix.com/article/CTX678035",
|
||||
"source": "secure@citrix.com"
|
||||
}
|
||||
]
|
||||
}
|
66
CVE-2024/CVE-2024-62xx/CVE-2024-6236.json
Normal file
66
CVE-2024/CVE-2024-62xx/CVE-2024-6236.json
Normal file
@ -0,0 +1,66 @@
|
||||
{
|
||||
"id": "CVE-2024-6236",
|
||||
"sourceIdentifier": "secure@citrix.com",
|
||||
"published": "2024-07-10T21:15:11.120",
|
||||
"lastModified": "2024-07-10T21:15:11.120",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Denial of Service in\u00a0NetScaler Console (formerly NetScaler ADM), NetScaler Agent, and NetScaler SDX"
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV40": [
|
||||
{
|
||||
"source": "secure@citrix.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "4.0",
|
||||
"vectorString": "CVSS:4.0/AV:A/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
|
||||
"attackVector": "ADJACENT",
|
||||
"attackComplexity": "LOW",
|
||||
"attackRequirements": "NONE",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"vulnerableSystemConfidentiality": "NONE",
|
||||
"vulnerableSystemIntegrity": "NONE",
|
||||
"vulnerableSystemAvailability": "HIGH",
|
||||
"subsequentSystemConfidentiality": "NONE",
|
||||
"subsequentSystemIntegrity": "NONE",
|
||||
"subsequentSystemAvailability": "NONE",
|
||||
"exploitMaturity": "NOT_DEFINED",
|
||||
"confidentialityRequirements": "NOT_DEFINED",
|
||||
"integrityRequirements": "NOT_DEFINED",
|
||||
"availabilityRequirements": "NOT_DEFINED",
|
||||
"modifiedAttackVector": "NOT_DEFINED",
|
||||
"modifiedAttackComplexity": "NOT_DEFINED",
|
||||
"modifiedAttackRequirements": "NOT_DEFINED",
|
||||
"modifiedPrivilegesRequired": "NOT_DEFINED",
|
||||
"modifiedUserInteraction": "NOT_DEFINED",
|
||||
"modifiedVulnerableSystemConfidentiality": "NOT_DEFINED",
|
||||
"modifiedVulnerableSystemIntegrity": "NOT_DEFINED",
|
||||
"modifiedVulnerableSystemAvailability": "NOT_DEFINED",
|
||||
"modifiedSubsequentSystemConfidentiality": "NOT_DEFINED",
|
||||
"modifiedSubsequentSystemIntegrity": "NOT_DEFINED",
|
||||
"modifiedSubsequentSystemAvailability": "NOT_DEFINED",
|
||||
"safety": "NOT_DEFINED",
|
||||
"automatable": "NOT_DEFINED",
|
||||
"recovery": "NOT_DEFINED",
|
||||
"valueDensity": "NOT_DEFINED",
|
||||
"vulnerabilityResponseEffort": "NOT_DEFINED",
|
||||
"providerUrgency": "NOT_DEFINED",
|
||||
"baseScore": 7.1,
|
||||
"baseSeverity": "HIGH"
|
||||
}
|
||||
}
|
||||
]
|
||||
},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://support.citrix.com/article/CTX677998",
|
||||
"source": "secure@citrix.com"
|
||||
}
|
||||
]
|
||||
}
|
66
CVE-2024/CVE-2024-62xx/CVE-2024-6286.json
Normal file
66
CVE-2024/CVE-2024-62xx/CVE-2024-6286.json
Normal file
@ -0,0 +1,66 @@
|
||||
{
|
||||
"id": "CVE-2024-6286",
|
||||
"sourceIdentifier": "secure@citrix.com",
|
||||
"published": "2024-07-10T21:15:11.210",
|
||||
"lastModified": "2024-07-10T21:15:11.210",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Local Privilege escalation allows a low-privileged user to gain SYSTEM privileges in\u00a0Citrix Workspace app for Windows"
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV40": [
|
||||
{
|
||||
"source": "secure@citrix.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "4.0",
|
||||
"vectorString": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"attackRequirements": "NONE",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"vulnerableSystemConfidentiality": "HIGH",
|
||||
"vulnerableSystemIntegrity": "HIGH",
|
||||
"vulnerableSystemAvailability": "HIGH",
|
||||
"subsequentSystemConfidentiality": "NONE",
|
||||
"subsequentSystemIntegrity": "NONE",
|
||||
"subsequentSystemAvailability": "NONE",
|
||||
"exploitMaturity": "NOT_DEFINED",
|
||||
"confidentialityRequirements": "NOT_DEFINED",
|
||||
"integrityRequirements": "NOT_DEFINED",
|
||||
"availabilityRequirements": "NOT_DEFINED",
|
||||
"modifiedAttackVector": "NOT_DEFINED",
|
||||
"modifiedAttackComplexity": "NOT_DEFINED",
|
||||
"modifiedAttackRequirements": "NOT_DEFINED",
|
||||
"modifiedPrivilegesRequired": "NOT_DEFINED",
|
||||
"modifiedUserInteraction": "NOT_DEFINED",
|
||||
"modifiedVulnerableSystemConfidentiality": "NOT_DEFINED",
|
||||
"modifiedVulnerableSystemIntegrity": "NOT_DEFINED",
|
||||
"modifiedVulnerableSystemAvailability": "NOT_DEFINED",
|
||||
"modifiedSubsequentSystemConfidentiality": "NOT_DEFINED",
|
||||
"modifiedSubsequentSystemIntegrity": "NOT_DEFINED",
|
||||
"modifiedSubsequentSystemAvailability": "NOT_DEFINED",
|
||||
"safety": "NOT_DEFINED",
|
||||
"automatable": "NOT_DEFINED",
|
||||
"recovery": "NOT_DEFINED",
|
||||
"valueDensity": "NOT_DEFINED",
|
||||
"vulnerabilityResponseEffort": "NOT_DEFINED",
|
||||
"providerUrgency": "NOT_DEFINED",
|
||||
"baseScore": 8.5,
|
||||
"baseSeverity": "HIGH"
|
||||
}
|
||||
}
|
||||
]
|
||||
},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://support.citrix.com/article/CTX678036",
|
||||
"source": "secure@citrix.com"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-6409",
|
||||
"sourceIdentifier": "secalert@redhat.com",
|
||||
"published": "2024-07-08T18:15:09.487",
|
||||
"lastModified": "2024-07-10T17:15:12.847",
|
||||
"lastModified": "2024-07-10T20:15:04.853",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -92,6 +92,10 @@
|
||||
"url": "https://explore.alas.aws.amazon.com/CVE-2024-6409.html",
|
||||
"source": "secalert@redhat.com"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/openela-main/openssh/commit/c00da7741d42029e49047dd89e266d91dcfbffa0",
|
||||
"source": "secalert@redhat.com"
|
||||
},
|
||||
{
|
||||
"url": "https://security-tracker.debian.org/tracker/CVE-2024-6409",
|
||||
"source": "secalert@redhat.com"
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-6647",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2024-07-10T18:15:05.763",
|
||||
"lastModified": "2024-07-10T18:15:05.763",
|
||||
"lastModified": "2024-07-10T21:15:11.350",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [
|
||||
{
|
||||
|
16
CVE-2024/CVE-2024-66xx/CVE-2024-6663.json
Normal file
16
CVE-2024/CVE-2024-66xx/CVE-2024-6663.json
Normal file
@ -0,0 +1,16 @@
|
||||
{
|
||||
"id": "CVE-2024-6663",
|
||||
"sourceIdentifier": "15c01472-ff32-4bec-916d-912e60a9fe4c",
|
||||
"published": "2024-07-10T21:15:11.463",
|
||||
"lastModified": "2024-07-10T21:15:11.463",
|
||||
"vulnStatus": "Rejected",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate is unused by its CNA. Notes: none."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": []
|
||||
}
|
16
CVE-2024/CVE-2024-66xx/CVE-2024-6664.json
Normal file
16
CVE-2024/CVE-2024-66xx/CVE-2024-6664.json
Normal file
@ -0,0 +1,16 @@
|
||||
{
|
||||
"id": "CVE-2024-6664",
|
||||
"sourceIdentifier": "15c01472-ff32-4bec-916d-912e60a9fe4c",
|
||||
"published": "2024-07-10T21:15:11.520",
|
||||
"lastModified": "2024-07-10T21:15:11.520",
|
||||
"vulnStatus": "Rejected",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate is unused by its CNA. Notes: none."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": []
|
||||
}
|
59
README.md
59
README.md
@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours.
|
||||
### Last Repository Update
|
||||
|
||||
```plain
|
||||
2024-07-10T20:00:18.758367+00:00
|
||||
2024-07-10T22:00:18.497829+00:00
|
||||
```
|
||||
|
||||
### Most recent CVE Modification Timestamp synchronized with NVD
|
||||
|
||||
```plain
|
||||
2024-07-10T19:15:12.070000+00:00
|
||||
2024-07-10T21:15:11.520000+00:00
|
||||
```
|
||||
|
||||
### Last Data Feed Release
|
||||
@ -33,48 +33,39 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
|
||||
### Total Number of included CVEs
|
||||
|
||||
```plain
|
||||
256604
|
||||
256620
|
||||
```
|
||||
|
||||
### CVEs added in the last Commit
|
||||
|
||||
Recently added CVEs: `24`
|
||||
Recently added CVEs: `16`
|
||||
|
||||
- [CVE-2024-27090](CVE-2024/CVE-2024-270xx/CVE-2024-27090.json) (`2024-07-10T19:15:10.133`)
|
||||
- [CVE-2024-27095](CVE-2024/CVE-2024-270xx/CVE-2024-27095.json) (`2024-07-10T19:15:10.407`)
|
||||
- [CVE-2024-32469](CVE-2024/CVE-2024-324xx/CVE-2024-32469.json) (`2024-07-10T19:15:10.667`)
|
||||
- [CVE-2024-32759](CVE-2024/CVE-2024-327xx/CVE-2024-32759.json) (`2024-07-10T18:15:03.220`)
|
||||
- [CVE-2024-37110](CVE-2024/CVE-2024-371xx/CVE-2024-37110.json) (`2024-07-10T18:15:03.373`)
|
||||
- [CVE-2024-37113](CVE-2024/CVE-2024-371xx/CVE-2024-37113.json) (`2024-07-10T18:15:03.630`)
|
||||
- [CVE-2024-37115](CVE-2024/CVE-2024-371xx/CVE-2024-37115.json) (`2024-07-10T18:15:03.857`)
|
||||
- [CVE-2024-37147](CVE-2024/CVE-2024-371xx/CVE-2024-37147.json) (`2024-07-10T19:15:10.930`)
|
||||
- [CVE-2024-37205](CVE-2024/CVE-2024-372xx/CVE-2024-37205.json) (`2024-07-10T18:15:04.080`)
|
||||
- [CVE-2024-37270](CVE-2024/CVE-2024-372xx/CVE-2024-37270.json) (`2024-07-10T18:15:04.300`)
|
||||
- [CVE-2024-37498](CVE-2024/CVE-2024-374xx/CVE-2024-37498.json) (`2024-07-10T18:15:04.523`)
|
||||
- [CVE-2024-37504](CVE-2024/CVE-2024-375xx/CVE-2024-37504.json) (`2024-07-10T18:15:04.750`)
|
||||
- [CVE-2024-37770](CVE-2024/CVE-2024-377xx/CVE-2024-37770.json) (`2024-07-10T18:15:04.983`)
|
||||
- [CVE-2024-5491](CVE-2024/CVE-2024-54xx/CVE-2024-5491.json) (`2024-07-10T19:15:11.190`)
|
||||
- [CVE-2024-5492](CVE-2024/CVE-2024-54xx/CVE-2024-5492.json) (`2024-07-10T19:15:11.293`)
|
||||
- [CVE-2024-5910](CVE-2024/CVE-2024-59xx/CVE-2024-5910.json) (`2024-07-10T19:15:11.390`)
|
||||
- [CVE-2024-5911](CVE-2024/CVE-2024-59xx/CVE-2024-5911.json) (`2024-07-10T19:15:11.547`)
|
||||
- [CVE-2024-5912](CVE-2024/CVE-2024-59xx/CVE-2024-5912.json) (`2024-07-10T19:15:11.697`)
|
||||
- [CVE-2024-5913](CVE-2024/CVE-2024-59xx/CVE-2024-5913.json) (`2024-07-10T19:15:11.837`)
|
||||
- [CVE-2024-6235](CVE-2024/CVE-2024-62xx/CVE-2024-6235.json) (`2024-07-10T19:15:11.973`)
|
||||
- [CVE-2024-6630](CVE-2024/CVE-2024-66xx/CVE-2024-6630.json) (`2024-07-10T18:15:05.407`)
|
||||
- [CVE-2024-6646](CVE-2024/CVE-2024-66xx/CVE-2024-6646.json) (`2024-07-10T18:15:05.480`)
|
||||
- [CVE-2024-6647](CVE-2024/CVE-2024-66xx/CVE-2024-6647.json) (`2024-07-10T18:15:05.763`)
|
||||
- [CVE-2024-6649](CVE-2024/CVE-2024-66xx/CVE-2024-6649.json) (`2024-07-10T19:15:12.070`)
|
||||
- [CVE-2024-25076](CVE-2024/CVE-2024-250xx/CVE-2024-25076.json) (`2024-07-10T20:15:02.933`)
|
||||
- [CVE-2024-25077](CVE-2024/CVE-2024-250xx/CVE-2024-25077.json) (`2024-07-10T20:15:03.023`)
|
||||
- [CVE-2024-37148](CVE-2024/CVE-2024-371xx/CVE-2024-37148.json) (`2024-07-10T20:15:03.280`)
|
||||
- [CVE-2024-37149](CVE-2024/CVE-2024-371xx/CVE-2024-37149.json) (`2024-07-10T20:15:03.543`)
|
||||
- [CVE-2024-37310](CVE-2024/CVE-2024-373xx/CVE-2024-37310.json) (`2024-07-10T20:15:03.790`)
|
||||
- [CVE-2024-38353](CVE-2024/CVE-2024-383xx/CVE-2024-38353.json) (`2024-07-10T20:15:04.053`)
|
||||
- [CVE-2024-38354](CVE-2024/CVE-2024-383xx/CVE-2024-38354.json) (`2024-07-10T20:15:04.293`)
|
||||
- [CVE-2024-39693](CVE-2024/CVE-2024-396xx/CVE-2024-39693.json) (`2024-07-10T20:15:04.543`)
|
||||
- [CVE-2024-6148](CVE-2024/CVE-2024-61xx/CVE-2024-6148.json) (`2024-07-10T21:15:10.730`)
|
||||
- [CVE-2024-6149](CVE-2024/CVE-2024-61xx/CVE-2024-6149.json) (`2024-07-10T21:15:10.830`)
|
||||
- [CVE-2024-6150](CVE-2024/CVE-2024-61xx/CVE-2024-6150.json) (`2024-07-10T21:15:10.920`)
|
||||
- [CVE-2024-6151](CVE-2024/CVE-2024-61xx/CVE-2024-6151.json) (`2024-07-10T21:15:11.013`)
|
||||
- [CVE-2024-6236](CVE-2024/CVE-2024-62xx/CVE-2024-6236.json) (`2024-07-10T21:15:11.120`)
|
||||
- [CVE-2024-6286](CVE-2024/CVE-2024-62xx/CVE-2024-6286.json) (`2024-07-10T21:15:11.210`)
|
||||
- [CVE-2024-6663](CVE-2024/CVE-2024-66xx/CVE-2024-6663.json) (`2024-07-10T21:15:11.463`)
|
||||
- [CVE-2024-6664](CVE-2024/CVE-2024-66xx/CVE-2024-6664.json) (`2024-07-10T21:15:11.520`)
|
||||
|
||||
|
||||
### CVEs modified in the last Commit
|
||||
|
||||
Recently modified CVEs: `5`
|
||||
Recently modified CVEs: `4`
|
||||
|
||||
- [CVE-2023-41915](CVE-2023/CVE-2023-419xx/CVE-2023-41915.json) (`2024-07-10T18:15:02.900`)
|
||||
- [CVE-2024-0985](CVE-2024/CVE-2024-09xx/CVE-2024-0985.json) (`2024-07-10T18:15:03.083`)
|
||||
- [CVE-2024-20399](CVE-2024/CVE-2024-203xx/CVE-2024-20399.json) (`2024-07-10T19:15:09.840`)
|
||||
- [CVE-2024-4879](CVE-2024/CVE-2024-48xx/CVE-2024-4879.json) (`2024-07-10T18:15:05.070`)
|
||||
- [CVE-2024-6387](CVE-2024/CVE-2024-63xx/CVE-2024-6387.json) (`2024-07-10T18:15:05.163`)
|
||||
- [CVE-2022-39227](CVE-2022/CVE-2022-392xx/CVE-2022-39227.json) (`2024-07-10T21:15:10.210`)
|
||||
- [CVE-2023-51105](CVE-2023/CVE-2023-511xx/CVE-2023-51105.json) (`2024-07-10T20:15:02.820`)
|
||||
- [CVE-2024-6409](CVE-2024/CVE-2024-64xx/CVE-2024-6409.json) (`2024-07-10T20:15:04.853`)
|
||||
- [CVE-2024-6647](CVE-2024/CVE-2024-66xx/CVE-2024-6647.json) (`2024-07-10T21:15:11.350`)
|
||||
|
||||
|
||||
## Download and Usage
|
||||
|
80
_state.csv
80
_state.csv
@ -205371,7 +205371,7 @@ CVE-2022-39222,0,0,d5c5959de85d8399f7df5df7fe710a9317d7041d9b0b4b33bf3ae297bcc6e
|
||||
CVE-2022-39224,0,0,74ea89dc06f9e57b983f75ca05855fc4f4cb512ab1741b0a4530707b87a7d9ec,2022-09-26T13:41:40.930000
|
||||
CVE-2022-39225,0,0,1ffacad34887b15c068e75426ef754e90dae5870ac74bcf9503b989bb98b1547,2022-09-28T13:50:43.977000
|
||||
CVE-2022-39226,0,0,acbe605eedc5b8513fa1a9550dfce48c9078a9ebdc3877e2da3d43c5379e7076,2022-10-05T21:16:28.857000
|
||||
CVE-2022-39227,0,0,9acc588f90d85e915728b7154d9b6ba34888eab83ec4eea86b58102d75dc6326,2023-03-04T01:43:06.280000
|
||||
CVE-2022-39227,0,1,019614e57b7ad104fb5797fe27fc61c9be6c1561596ea79fd21f3c74865f95f5,2024-07-10T21:15:10.210000
|
||||
CVE-2022-39228,0,0,9ac109f41184e5b247f5400110c9db7bb5e2c50a63cd3683f4750827719518ad,2023-11-07T03:50:22.207000
|
||||
CVE-2022-39229,0,0,15c32822b0b02ba916b7978b1911da429757ff74dff8754a1162c942ec0c715d,2022-10-19T14:10:31.537000
|
||||
CVE-2022-3923,0,0,c8833e201274cfbe638e6a0e7d3dae3aac2f4aae1f4ceb74dd47079222d175e6,2023-11-07T03:51:58.120000
|
||||
@ -231314,7 +231314,7 @@ CVE-2023-41910,0,0,ddadb74f9e50737d21120f0b88022d8c15ee68cc56eb3c4577229fb7986d3
|
||||
CVE-2023-41911,0,0,c370f1652ab4a7704bdb8c1c18b508b07e9446ea3a6134c45133ba3207c3be67,2023-10-02T19:02:19.277000
|
||||
CVE-2023-41913,0,0,ac6a5dec8a2ef981599760c1bd584c0a3e1984d30935032e705f83162150cb05,2024-06-11T04:15:10.863000
|
||||
CVE-2023-41914,0,0,27c5c2c3c84cd968ddce119075b7bda7c87709505c9fb5104442489dec8eacba,2023-11-09T22:11:29.870000
|
||||
CVE-2023-41915,0,1,36dcb97e8e88c3fa222716fa41549145bf1bf8e3b34064739182cd4dfb8684ab,2024-07-10T18:15:02.900000
|
||||
CVE-2023-41915,0,0,36dcb97e8e88c3fa222716fa41549145bf1bf8e3b34064739182cd4dfb8684ab,2024-07-10T18:15:02.900000
|
||||
CVE-2023-41917,0,0,f3161e8d6c620e45be8c901747b972f5e1c375ee92e6d63bc7e00bef339a5387,2024-07-02T12:09:16.907000
|
||||
CVE-2023-41918,0,0,0856e5fa41285db5b029ff0214e8d51ede0087304c24a711546183f0175c9d9e,2024-07-02T12:09:16.907000
|
||||
CVE-2023-41919,0,0,6807d33f550dbbb2d90b8f4fce9a8f7ee1053b0fb9f312837bd90277e545973a,2024-07-02T12:09:16.907000
|
||||
@ -237542,7 +237542,7 @@ CVE-2023-51101,0,0,715bd2375e465539f78b9589de724a3b44b5b751f2a2bdeeadbb172b19954
|
||||
CVE-2023-51102,0,0,43e4885799f2da8dffd65a72e501f08b192ea7fe94ed89bfde6db81b2efa7f22,2023-12-30T03:19:15.973000
|
||||
CVE-2023-51103,0,0,71cf8eb36c512e4486b80f2008e48d245df5f090a9237a985a5b7ec951e695d4,2024-01-05T16:25:15.997000
|
||||
CVE-2023-51104,0,0,4e7f57d88a96c53c8983850e0ce64f7f7f64d18b84efb70425e41eb2b5c6ccf2,2024-07-09T21:15:11.690000
|
||||
CVE-2023-51105,0,0,0ca9b19e4f3cf057471922c4af92ba7fe5eb5fe608c1bfb3887e9b619a4c9085,2024-07-10T04:15:03.783000
|
||||
CVE-2023-51105,0,1,4abe2872b1e377f4ee0d31e3315aedcd1a647380c8a18113bab0a1851833e7a2,2024-07-10T20:15:02.820000
|
||||
CVE-2023-51106,0,0,2ad42e3fc60bf937fccd789a94702f6663bceff82ffdd09e8001ab565c4bd666,2024-03-18T04:15:08.790000
|
||||
CVE-2023-51107,0,0,c5d5f3f75be31a12b33532bfd4bfc63c33f71406b1ed3956b0081dc9f8320e93,2024-01-05T17:14:48.820000
|
||||
CVE-2023-5111,0,0,9aa75e6a8b2cdd2372d791a9a0def8ce9e9d4923ff9c71c4dfed5da5d92d1561,2023-10-06T17:58:29.377000
|
||||
@ -241536,7 +241536,7 @@ CVE-2024-0979,0,0,7723165f13ecdb2435ed2fb1f551bb8ae4a819c47830717a3e66000b31abf2
|
||||
CVE-2024-0980,0,0,c8c9084fb2baad3341765fe36b79c09c499a2498d7806837427d52160f9ced2a,2024-07-03T01:44:56.397000
|
||||
CVE-2024-0983,0,0,ae05daa2819fc42abf2cc0aed0ec977b40d58c31465549c2cfe7791e8c6cecae,2024-02-29T13:49:29.390000
|
||||
CVE-2024-0984,0,0,32a53697d4c68794e0f7d534229f2199d1ec3163c027c80a4fc5f01ab0bb8955,2024-02-29T13:49:29.390000
|
||||
CVE-2024-0985,0,1,6feb39a8a7f264b3cb456efd47a6c85fdf3bdc2b683c0aef1c01ee214b73b389,2024-07-10T18:15:03.083000
|
||||
CVE-2024-0985,0,0,6feb39a8a7f264b3cb456efd47a6c85fdf3bdc2b683c0aef1c01ee214b73b389,2024-07-10T18:15:03.083000
|
||||
CVE-2024-0986,0,0,db8cf9eb2f7a46bf133ee84ffb6d8ed24811070bc99e9657ef13aa39771842ba,2024-07-05T23:15:09.907000
|
||||
CVE-2024-0987,0,0,5801414b82c7b2917af43c39141dfe1f1e7f0c982b0bef329ac6f9b0b28c20b8,2024-05-17T02:35:07.313000
|
||||
CVE-2024-0988,0,0,68860901f1965c1c448789084d069aceca0887686a8256d545e41c2ea5ae82cd,2024-05-17T02:35:07.413000
|
||||
@ -242671,7 +242671,7 @@ CVE-2024-2039,0,0,4f1e5a8a814f51edc0234cc5670da2107cc2a93a2ef1eadc628898e3eec44b
|
||||
CVE-2024-20391,0,0,f91eada0700f8cd9f2eaea2b871ba7d3969d87e51919a0eb478edbaaab6f3a9d,2024-05-15T18:35:11.453000
|
||||
CVE-2024-20392,0,0,ace66ba4c79c3f433832bd6cfa0988701f79a2b5d6c0fbe5016f71bba33a0a9b,2024-05-15T18:35:11.453000
|
||||
CVE-2024-20394,0,0,d0e5fc3a79dfeb923dc3f02320ce7649899cba8340301b836f168cfe3139baa9,2024-05-15T18:35:11.453000
|
||||
CVE-2024-20399,0,1,3444b8848702aea256ab827839689885201c8a881aff9e7e34cb07cc0d115aad,2024-07-10T19:15:09.840000
|
||||
CVE-2024-20399,0,0,3444b8848702aea256ab827839689885201c8a881aff9e7e34cb07cc0d115aad,2024-07-10T19:15:09.840000
|
||||
CVE-2024-2040,0,0,84818b4f00c676396e69702449b7daec96ba4021835b05a5adb074a919ab8480,2024-07-08T14:18:10.367000
|
||||
CVE-2024-20404,0,0,679bbd668c3128b9d2c298395d952eaf5fd76470dbc9bd0e765678566e0d175f,2024-06-13T20:25:46.837000
|
||||
CVE-2024-20405,0,0,e5acdd821474e29805e089211fec2d1d30a76e0d4d4635efbeb215040858791b,2024-06-18T18:04:04.497000
|
||||
@ -245614,6 +245614,8 @@ CVE-2024-25064,0,0,1c648660fe74d25bd4bc9587030796b3cc77cb44c915d4df3e4024ac11525
|
||||
CVE-2024-25065,0,0,f671f82a7697d47568409b085db18a169bcbb80a6a570c1657ffbf02010a7804,2024-02-29T13:49:29.390000
|
||||
CVE-2024-2507,0,0,ea9c85786faadd0442f075fa7cedcc51f34924f4764686abb8afe0beed882661,2024-04-10T13:23:38.787000
|
||||
CVE-2024-25075,0,0,8f1ad7795ac9be7789e9412ad24a6f478ed4bba46ede8202f16d701d6f470c93,2024-04-03T12:38:04.840000
|
||||
CVE-2024-25076,1,1,d66bc17d91809cc2f78f3102ffe32b214bc987b6cd580c79f6170144ca43d7b5,2024-07-10T20:15:02.933000
|
||||
CVE-2024-25077,1,1,1f8486cd645938c03e21e9baea1f7aad5d57b438c9e14c7dfeed86cd8586c3f4,2024-07-10T20:15:03.023000
|
||||
CVE-2024-25078,0,0,14ea593bbd760f1a861775a7e6100acb3fd7a8f88d884ae3f61694ec3c2b2927,2024-07-03T01:48:39.997000
|
||||
CVE-2024-25079,0,0,df3a5b95b7f6f4370caee005112754774cb6bfa4fa30f82a6ed48ecf2a7fc17d,2024-07-03T01:48:40.830000
|
||||
CVE-2024-25080,0,0,b71676650e0fe980740d0ba2f09b4ab96eab09f2522aeb1c79a8cba30e06c62f,2024-04-01T12:49:00.877000
|
||||
@ -247151,12 +247153,12 @@ CVE-2024-27087,0,0,5b9b7040107e78bc917a74369bf7f558be05fd7da0faff9d2dcfc4d25d506
|
||||
CVE-2024-27088,0,0,3fb76382074583fb576fbdf0cb4fa8d92b0b1baa24e2319c4835f05f8f5cd3a0,2024-02-26T22:10:40.463000
|
||||
CVE-2024-27089,0,0,80888df8a8beb579eb58ecd8e5017bb9d7c0dad21161e687af8e50a608c5d017,2024-02-26T20:19:06.073000
|
||||
CVE-2024-2709,0,0,f4d31bf466dd83e1847d553cf0a3bb09712a5fa83628223c69b729872cb64e17,2024-05-17T02:38:26.403000
|
||||
CVE-2024-27090,1,1,e9308c4cd905f026b0e1d34882d09b2f5322895e44ce7b9a4cf2affac5f0bf07,2024-07-10T19:15:10.133000
|
||||
CVE-2024-27090,0,0,e9308c4cd905f026b0e1d34882d09b2f5322895e44ce7b9a4cf2affac5f0bf07,2024-07-10T19:15:10.133000
|
||||
CVE-2024-27091,0,0,58ecd8a96ef6f650b7d3c6ff6b05851611594128b34909d27a436679cef1102c,2024-03-27T15:49:51.300000
|
||||
CVE-2024-27092,0,0,d29804f8da91855d6bf2c97046f8c4ca58e3a02ea6326a3e526f30254e2615ec,2024-02-29T13:49:29.390000
|
||||
CVE-2024-27093,0,0,2adc536c19af535e2a03a5b98ba4818457cc5a617ec41b1d012943c718349d43,2024-02-27T14:20:06.637000
|
||||
CVE-2024-27094,0,0,3eb9d388805681273fe676dee514eb17768b55ae9e888103a362a03c5b963467,2024-03-21T12:58:51.093000
|
||||
CVE-2024-27095,1,1,ce96d6468f8756e20699aa04eb140e103a4ae0edd0949864fc1065d298a3b029,2024-07-10T19:15:10.407000
|
||||
CVE-2024-27095,0,0,ce96d6468f8756e20699aa04eb140e103a4ae0edd0949864fc1065d298a3b029,2024-07-10T19:15:10.407000
|
||||
CVE-2024-27096,0,0,894f84a8f35148cbaeda9b34b2b2f12d5ff563f2928b15a6110bff9a018bb47b,2024-03-18T19:40:00.173000
|
||||
CVE-2024-27097,0,0,119cd9ece0e90261671b57d6900026bac78dfbf4d2981ae69a65322120d02a50,2024-03-14T12:52:16.723000
|
||||
CVE-2024-27098,0,0,c30df5c26e61dcf06585d0b82c2ff5020648cb39dac27e46934cf3772eacbcc0,2024-03-18T19:40:00.173000
|
||||
@ -250673,7 +250675,7 @@ CVE-2024-32464,0,0,d64afe641f7795bed40e9f07611c1dfe8212b69350ddb9db2c6c76fe5f6eb
|
||||
CVE-2024-32465,0,0,de49c4bc3569bd8fc526b2ed90be14380d3f0af6ad16131814b913b625e310fd,2024-06-26T10:15:12.280000
|
||||
CVE-2024-32466,0,0,db7f064bb346349536bc1029a9138c718e3a99de40435ac8076a2153a72d304b,2024-04-18T18:25:55.267000
|
||||
CVE-2024-32467,0,0,c3595d52e60c3fa31f1ede27ca8549a3938c2ca59fe6ab3708d95e8b6d1a0b5d,2024-04-25T17:24:59.967000
|
||||
CVE-2024-32469,1,1,bcdfb0c818ad2ae6b3a6d6e13881f240c89e3a29a724398fdd68c2b01210d441,2024-07-10T19:15:10.667000
|
||||
CVE-2024-32469,0,0,bcdfb0c818ad2ae6b3a6d6e13881f240c89e3a29a724398fdd68c2b01210d441,2024-07-10T19:15:10.667000
|
||||
CVE-2024-3247,0,0,095afc187e8f976bc1a2eaa79a4c0328aa3c3e2487a10203585d8616775f8a4d,2024-04-03T12:38:04.840000
|
||||
CVE-2024-32470,0,0,d7909429b510db3e426dc3bd0d7cd9294d139aa1133b013525c796626cb985fe,2024-04-18T18:25:55.267000
|
||||
CVE-2024-32472,0,0,975c522c6d17c4f52e07ac47d9093d86335976bcc8a63a5556dc578cb868f760,2024-04-18T13:04:28.900000
|
||||
@ -250949,7 +250951,7 @@ CVE-2024-32754,0,0,607be943cbec19ebc26898f36a5e33ae0135cc060ad9e54e1f721e2b27b87
|
||||
CVE-2024-32755,0,0,b3528b194ab6699a4c0497b49f6b23d52c2b5f75510289aa8a21b02eac9ad3f2,2024-07-02T17:44:45.700000
|
||||
CVE-2024-32756,0,0,7fa05cf39c6d3a5e903ec1a0f9f35b8a778ea0981647bd11b5e6e512e0af0b8a,2024-07-02T17:44:45.700000
|
||||
CVE-2024-32757,0,0,324c62945352fac9f5590a80aa452fac7e1848c97df1fe1af0c1554b075a0f46,2024-07-02T17:44:45.700000
|
||||
CVE-2024-32759,1,1,97d4502fb7a975cedf0589f3d4ed5f8399c616cfac3ccc48e027ca6adcb337c3,2024-07-10T18:15:03.220000
|
||||
CVE-2024-32759,0,0,97d4502fb7a975cedf0589f3d4ed5f8399c616cfac3ccc48e027ca6adcb337c3,2024-07-10T18:15:03.220000
|
||||
CVE-2024-3276,0,0,954e640f132b9cefdd02d650fab115252b37920b2c727ceb9c716e480c00b1fe,2024-07-08T14:19:01.997000
|
||||
CVE-2024-32760,0,0,67074d2cb149a548f5ca201a895261189c469e9d7c384fe074a8d7f159cb359a,2024-06-10T18:15:34.203000
|
||||
CVE-2024-32761,0,0,ce6e18957362490cfabf91767930741349195476d374863f1eaf0c6108afcfd0,2024-05-08T17:05:24.083000
|
||||
@ -253624,11 +253626,11 @@ CVE-2024-37098,0,0,e259cf517a4b26891930426aed13a9c53ee339a8d724318e920ba4b291cc4
|
||||
CVE-2024-37107,0,0,e1e665b99eff19349add9836ced9fe988bed019b20e4b821ff990f5cecaee417,2024-06-28T13:15:02.503000
|
||||
CVE-2024-37109,0,0,db0889e1d7d2a1ef5dcc67a2d3dfbd32c0e2f4e2cbde02826f15e64ccae72227,2024-06-28T13:15:02.650000
|
||||
CVE-2024-3711,0,0,00ee502ae0ae8bdc802cd38eb1ec1e1356c10e1c18d766a4effd20297a066f55,2024-05-24T01:15:30.977000
|
||||
CVE-2024-37110,1,1,dcb0920072ee7af0db2b1b8e454d5ac82c1e0bb236300f87b06899035f213c18,2024-07-10T18:15:03.373000
|
||||
CVE-2024-37110,0,0,dcb0920072ee7af0db2b1b8e454d5ac82c1e0bb236300f87b06899035f213c18,2024-07-10T18:15:03.373000
|
||||
CVE-2024-37111,0,0,2257ad3ccadca4c80305b1109feafea1f23c81cf8da2e182d0e85f183c413dd1,2024-06-28T13:15:02.750000
|
||||
CVE-2024-37112,0,0,906b6afd1221b533b38819c616c93e995b341fa67c658fbfc350c9fd924bc330,2024-07-09T18:19:14.047000
|
||||
CVE-2024-37113,1,1,4438f53914302ea623d53825c9b6e0bac2830b84758d3b3ce85db2327783bad6,2024-07-10T18:15:03.630000
|
||||
CVE-2024-37115,1,1,88d3997f11f7cdf28d0ea92358e1e6b1b162beb0431d5203b0ebd5eccd8ab445,2024-07-10T18:15:03.857000
|
||||
CVE-2024-37113,0,0,4438f53914302ea623d53825c9b6e0bac2830b84758d3b3ce85db2327783bad6,2024-07-10T18:15:03.630000
|
||||
CVE-2024-37115,0,0,88d3997f11f7cdf28d0ea92358e1e6b1b162beb0431d5203b0ebd5eccd8ab445,2024-07-10T18:15:03.857000
|
||||
CVE-2024-37118,0,0,0ad56c9c4204404fc625d311f20c0b9c243a12023f3ae9f31f4a46be59aef39f,2024-06-24T18:55:07.707000
|
||||
CVE-2024-37124,0,0,36b2aea5b40210d79bc623ba24647826a1125982402ceccf247fbf8a08ffdaed,2024-07-03T02:04:07.457000
|
||||
CVE-2024-37126,0,0,1f6046db51cdcb2727f4678a45f9e51ce9aa79ec8b1a1ad373e1661d9aaf1cda,2024-07-03T18:00:57.573000
|
||||
@ -253645,7 +253647,9 @@ CVE-2024-37140,0,0,681b63037246d6321b6224834e07a5ad4187e2f092d956b5d7b807798dd34
|
||||
CVE-2024-37141,0,0,b03df6d0d6f897b221dc842eaee3003cdd6e5a584378ab9df9bc91aaf0755cad,2024-06-26T12:44:29.693000
|
||||
CVE-2024-37145,0,0,5c583bad753181323e403ceb6f4418c69209cee6463fe8ada19cf90c7991fb5f,2024-07-02T12:09:16.907000
|
||||
CVE-2024-37146,0,0,d5817f16e70393732c114867d4a0a6a7a44408de06d35e1f4b6b81d6827c298f,2024-07-02T12:09:16.907000
|
||||
CVE-2024-37147,1,1,7a31258544a4e88adf524ac1293ead93cd96672924da2d1697b8fab4e9cdc221,2024-07-10T19:15:10.930000
|
||||
CVE-2024-37147,0,0,7a31258544a4e88adf524ac1293ead93cd96672924da2d1697b8fab4e9cdc221,2024-07-10T19:15:10.930000
|
||||
CVE-2024-37148,1,1,d34a4e96289a16ca2babafd1684df282e85bccbb8fc2fc0400b81e026d541ad3,2024-07-10T20:15:03.280000
|
||||
CVE-2024-37149,1,1,b981686ad01124fa84f3021eb2d86d5c07e4a35cbc3f848d00608f80820f520b,2024-07-10T20:15:03.543000
|
||||
CVE-2024-3715,0,0,902861be5261e2c029ed83a5c6920fde180817c53e05bb93208dc31c820658c5,2024-05-02T18:00:37.360000
|
||||
CVE-2024-37150,0,0,97cf533630a2e81b430f11fe12ccc7be397791e2299035e9f7d7a243e494791c,2024-06-07T14:56:05.647000
|
||||
CVE-2024-37152,0,0,d5beb8b2bc90de99efc40fac5a89948f3b2a0d50610a65220e35a91d41ce9369,2024-06-07T14:56:05.647000
|
||||
@ -253682,7 +253686,7 @@ CVE-2024-37185,0,0,ce3a2eeaa366e0078438541c31768228f57c06809ab185bd78a5053ce3cc0
|
||||
CVE-2024-3719,0,0,d2320674d04cefde56a0b36b463f74328d6f18494803030bdfe9b0b1b4374afd,2024-06-04T19:20:23.553000
|
||||
CVE-2024-37198,0,0,8919c8b8db43ac2a9639793fec092e2666b55422ab58e48ee04c39b0bd19361a,2024-06-24T18:55:25.417000
|
||||
CVE-2024-3720,0,0,f4e69514093cc630aeda39d0a41fe705e0d9916a1077cef429b7dcf05a404308,2024-06-04T19:20:23.660000
|
||||
CVE-2024-37205,1,1,404473518d59c1aebcc74cbe03dceebbf60d2fa650daad38f292961b7ee82936,2024-07-10T18:15:04.080000
|
||||
CVE-2024-37205,0,0,404473518d59c1aebcc74cbe03dceebbf60d2fa650daad38f292961b7ee82936,2024-07-10T18:15:04.080000
|
||||
CVE-2024-37208,0,0,88780676ffe1ae9fd897090b91bc042de66f491603ea11b382a3765c84e6e5c8,2024-07-08T15:49:22.437000
|
||||
CVE-2024-3721,0,0,ec8dc4b0ad5d1d9ba11acb18015142f7d1715fd653f7ca2987e266e9c9e8ef01,2024-05-17T02:40:05.290000
|
||||
CVE-2024-37212,0,0,cb0e3003beb0d778b1e3e4d8f1145799c285874f36dc8f863bd0c5bf6222df34,2024-06-24T18:55:34.983000
|
||||
@ -253709,7 +253713,7 @@ CVE-2024-37260,0,0,71ae32d07f60a869d4092274a4024739c347edcdf7f6c400a5ce16269ff56
|
||||
CVE-2024-37266,0,0,f306a5e2ad401442cb409c7d61e85e756a658f2ffb85a90cbbbbc5543a190165,2024-07-09T18:19:14.047000
|
||||
CVE-2024-37268,0,0,3ed75f71eb245fffa2f72817fa04519725ace840b74091a925a997ed8515bf4c,2024-07-09T18:19:14.047000
|
||||
CVE-2024-3727,0,0,8e07517a9dca0048f3a5546e14ea5eaec2b195c195e356a5ec35a7e996ce9012,2024-07-03T17:15:04.780000
|
||||
CVE-2024-37270,1,1,d083d76167baf46ffa6cd6f14dc6f156433a1a41b5e6e1adba14abb79cdfeaa9,2024-07-10T18:15:04.300000
|
||||
CVE-2024-37270,0,0,d083d76167baf46ffa6cd6f14dc6f156433a1a41b5e6e1adba14abb79cdfeaa9,2024-07-10T18:15:04.300000
|
||||
CVE-2024-37273,0,0,8e9dee449ebc3c902c8a48603bfb19c8ba061254dd865164dc4adc81e57806ef,2024-06-11T14:12:23.210000
|
||||
CVE-2024-37279,0,0,23b5ab6d6e7d20abbef93be4c8b8a6f2f980c082bdec809528b549006da1d24b,2024-06-13T18:35:19.777000
|
||||
CVE-2024-3728,0,0,43844043222c66b8f700e8c46db9fa69a4e80d2868161363811005c77777bc69,2024-05-02T18:00:37.360000
|
||||
@ -253733,6 +253737,7 @@ CVE-2024-37307,0,0,307a9077f465a844bb3929ae05a1dcebcb701d8b2ae344b6539171566dfcc
|
||||
CVE-2024-37308,0,0,789ac1ee79bf50a380c8842b793e1f03cbcea96755a8db8c09ad817d1922f353,2024-06-13T18:35:19.777000
|
||||
CVE-2024-37309,0,0,665df876b2164bd39f49af0dbd8eb55d8bda11b715021fb1a958468109ece0ed,2024-06-13T18:35:19.777000
|
||||
CVE-2024-3731,0,0,bdcc8f677627b7b108ec8e839a01e7cc6ba34354d6004394dff79046d7838f40,2024-04-19T13:10:25.637000
|
||||
CVE-2024-37310,1,1,b89dce05a6fcfa197b0f3591505fabefb6ccff051d6496173d06bbcf5f585311,2024-07-10T20:15:03.790000
|
||||
CVE-2024-37312,0,0,ba4f355e4f74a8bde30dcfd48ce758e7796e43079453cb77192f0999aacce83a,2024-06-17T12:42:04.623000
|
||||
CVE-2024-37313,0,0,bad34f14f8fcac47115250f6ec4bbac8493c061a0b49da4b4fbe2645f7a82474,2024-06-17T12:42:04.623000
|
||||
CVE-2024-37314,0,0,bbb529e96a1bf18f91583a0e4981cbc0e945b7a77e11c3672e59d0ae8b6a6421,2024-06-17T12:42:04.623000
|
||||
@ -253824,12 +253829,12 @@ CVE-2024-37486,0,0,89762654a3c14df0582a836b68f1756216cde47d535ca51b0f096751def5b
|
||||
CVE-2024-3749,0,0,b3391f40e1bcbcef1a08d3c4874bc14a907340ab4c3bf6aac04f7b2d59e58359,2024-07-03T02:06:31.950000
|
||||
CVE-2024-37494,0,0,b88e83b573725f4d6071fa3bac5e334c7dc8623314e237fe1108a022bee0ee27,2024-07-09T18:19:14.047000
|
||||
CVE-2024-37497,0,0,f3a028679a67965f61b937156a53d1c18994178b3cd3c35e2a4dd898dd2a4aa7,2024-07-09T18:19:14.047000
|
||||
CVE-2024-37498,1,1,cfd42f3e3dbbef4b55354ec588acbf91cd0af1d57791f8a118c4c23764c54cb6,2024-07-10T18:15:04.523000
|
||||
CVE-2024-37498,0,0,cfd42f3e3dbbef4b55354ec588acbf91cd0af1d57791f8a118c4c23764c54cb6,2024-07-10T18:15:04.523000
|
||||
CVE-2024-37499,0,0,f79cc5cf94609c9d5258a38082f5705921e4f313d9316f7fd282a1335ce3d3df,2024-07-09T18:19:14.047000
|
||||
CVE-2024-3750,0,0,803f7e301e80982b4e00371ccc1f410724a29d03fdd424fb4c54aeb0b034ff94,2024-05-16T13:03:05.353000
|
||||
CVE-2024-37501,0,0,b78cf79ca308008e9008944af9630d58467f84a62f039c6a1e72ef46a8059faa,2024-07-09T18:19:14.047000
|
||||
CVE-2024-37502,0,0,d47167ecc1dd174282378f6124abb3b4511994970b4449ae0fee9b8869d0d91f,2024-07-09T18:19:14.047000
|
||||
CVE-2024-37504,1,1,b9660b7a3e07087d7633248bb969baccc1f65fed64d808935be7bfad1ba2aca9,2024-07-10T18:15:04.750000
|
||||
CVE-2024-37504,0,0,b9660b7a3e07087d7633248bb969baccc1f65fed64d808935be7bfad1ba2aca9,2024-07-10T18:15:04.750000
|
||||
CVE-2024-37513,0,0,7976ba8e13d80d009daa78a2652c36463c2f0e67f7f7a4f5972797a366211b7d,2024-07-09T18:19:14.047000
|
||||
CVE-2024-3752,0,0,06a3522f543993aef42f352f0c011207c560c2e5a1d63c9d8ccc34a87adab0ce,2024-05-06T12:44:56.377000
|
||||
CVE-2024-37520,0,0,3e7ac03ec07ed8765d851e3f933c883863d11b4c139c55a8abe614aadf329238,2024-07-09T18:19:14.047000
|
||||
@ -253925,7 +253930,7 @@ CVE-2024-37767,0,0,7877c2515670214a904346d470123e251242a9f2784362e3de48ee06ec75e
|
||||
CVE-2024-37768,0,0,870c2e3ce3bd390df1e2f6d00c0b12856feb7e2e88c5200a479a671bc34243b0,2024-07-08T16:41:23.650000
|
||||
CVE-2024-37769,0,0,0dd3289504de1965084308bd25d0eda77c1cd774bf0e49f4dc5febf221f8f325,2024-07-08T16:37:28.323000
|
||||
CVE-2024-3777,0,0,2d62b43478a2af7b370a2abe8fef4e62ecbb9b40c3be97e2e0fc1ef910b6e9d4,2024-04-15T13:15:31.997000
|
||||
CVE-2024-37770,1,1,ae1146338933a26ae6578998f9481f574d3c6949e604fe6e68446c277bba031d,2024-07-10T18:15:04.983000
|
||||
CVE-2024-37770,0,0,ae1146338933a26ae6578998f9481f574d3c6949e604fe6e68446c277bba031d,2024-07-10T18:15:04.983000
|
||||
CVE-2024-3778,0,0,c2c38fcb38179fdb87f4043dc10c922f64da16bb588bfaf10dd1fb23e229fcc9,2024-04-15T13:15:31.997000
|
||||
CVE-2024-37790,0,0,c4b9ad019e7e91da343033108d4192111ff0d3cad7ad744d191eced3457024f8,2024-06-21T16:15:12.440000
|
||||
CVE-2024-37791,0,0,aac0a75365a73d05a49838e7a7b1ba90a794339affdf6e30eec1aa9fd749c48e,2024-06-20T12:44:01.637000
|
||||
@ -254158,6 +254163,8 @@ CVE-2024-38347,0,0,4d613454dc1780690a10a13a7c4d0d38fa70bfa9e6afa8cdcbdd33d7a9b43
|
||||
CVE-2024-38348,0,0,6e5ce391b6cb124e038ae8273d56ab90f89cf43a2075c68d341d5350c665dadb,2024-07-03T02:04:55.710000
|
||||
CVE-2024-38351,0,0,fc316049b1243ceecf4f16bb932622b3d32a9ec242887e0258f3f20fe77446f1,2024-06-20T12:44:01.637000
|
||||
CVE-2024-38352,0,0,13a6e81e4d4d40a0591843c161ee638c75aac348990bf4d2603a4c2fb8cf2a30,2024-06-19T18:15:11.507000
|
||||
CVE-2024-38353,1,1,eb08852e451b97fe5122a1a9fd19cf3f0fa69e538523a9e0cadf1b54c38e5960,2024-07-10T20:15:04.053000
|
||||
CVE-2024-38354,1,1,1a991e4e7ebf191a695b1f99de82173b0105016b21d5ba679577ef4299e69da5,2024-07-10T20:15:04.293000
|
||||
CVE-2024-38355,0,0,548f855fd76fea3ae91cbde1441c70071a7c7d1a3d657b48a4999a1a744b1672,2024-06-20T12:43:25.663000
|
||||
CVE-2024-38356,0,0,4d5684a2a5b21833c79b0d8355427fc3daf538540dd8f7d1cfa341630e75ced1,2024-06-20T12:43:25.663000
|
||||
CVE-2024-38357,0,0,db932e7bd44b2292bed66681b7d77a847d541a79cdeb9df0d08a424975405801,2024-06-20T12:43:25.663000
|
||||
@ -254657,6 +254664,7 @@ CVE-2024-39687,0,0,1f0dde45c697bd142eb547e4c25395e40bc6f58804b4b24f10fa4126a251a
|
||||
CVE-2024-39689,0,0,86295f6760848f0b510226e65028fed1b62502a931685ba6acf948103d5d29cb,2024-07-08T15:49:22.437000
|
||||
CVE-2024-3969,0,0,793622b6641cb8c2dc34802adf1ab9ece645cce7d321b9faf1a6b76d5e28ec78,2024-05-28T17:11:55.903000
|
||||
CVE-2024-39691,0,0,5b1b13e200d826d3f40f75a75371b183af197da1146b1c1721e666feddcea9c6,2024-07-08T15:49:22.437000
|
||||
CVE-2024-39693,1,1,2bedde3e8044c66cb2a446cc4094e8e76f63af8ced7065586d84c6768c76810b,2024-07-10T20:15:04.543000
|
||||
CVE-2024-39695,0,0,fbaaa4e185fc8d8718a1bd681584149a106333fea090ef242205e9fceffe21eb,2024-07-09T14:47:19.767000
|
||||
CVE-2024-39696,0,0,48bfab7e50339e1ca25125b7d36bfdf66ca4035d9f4c1ba7b967c71b544827af,2024-07-08T15:49:22.437000
|
||||
CVE-2024-39697,0,0,9186fda2eab5f78df936964a06e0cbab87d706d772078d108f219ea7a02555a3,2024-07-09T18:19:14.047000
|
||||
@ -255514,7 +255522,7 @@ CVE-2024-4873,0,0,6d8194e640b182e2a2eb107c362a6b36fc019fdb0666ba51ea48c7f29b4462
|
||||
CVE-2024-4874,0,0,e489f4227689f3d8a28a1c171b72c6312c838f037435967f317d135bb1153eae,2024-06-24T19:41:12.293000
|
||||
CVE-2024-4875,0,0,aa35cb89fee530b58aa987ffc67ea97738c0ba567903bf01429a1a1259923db8,2024-05-21T12:37:59.687000
|
||||
CVE-2024-4876,0,0,02aac8d1be489833aa2e07f8be8ce083249ac7dc2fcc33fd144386b8d365fef2,2024-05-21T12:37:59.687000
|
||||
CVE-2024-4879,0,1,de981101384ec0eb69d645ad034e5f914591ac78ae883e02998458bac9a93a06,2024-07-10T18:15:05.070000
|
||||
CVE-2024-4879,0,0,de981101384ec0eb69d645ad034e5f914591ac78ae883e02998458bac9a93a06,2024-07-10T18:15:05.070000
|
||||
CVE-2024-4881,0,0,4f17be95dbf63ebb1e221e9270b941e4838c9b4d4b1f7c998cfbd25da7153e04,2024-06-07T14:56:05.647000
|
||||
CVE-2024-4882,0,0,a4855f599041359b65e48a15f937a27e2ec2e91d9343d627eb58fe60c3b171c1,2024-07-09T18:19:14.047000
|
||||
CVE-2024-4883,0,0,4968eaa5ac5e1ee17a980c68456ded7b931eebe67d4a414b20bc214305c03a05,2024-06-26T12:44:29.693000
|
||||
@ -255996,8 +256004,8 @@ CVE-2024-5484,0,0,7de35f8eee9232651ed147ec3168f6740617b1737ec3ff6913988b98b84f6e
|
||||
CVE-2024-5485,0,0,dca0cc3d797ec50003ec75de23195400e6c002137c330b8a6fe7501d852f23b7,2024-06-04T16:57:41.053000
|
||||
CVE-2024-5488,0,0,36664283baf396592c4e35eea335f5722cbf42bf1f5665184ae35a27e595d9e7,2024-07-09T18:19:14.047000
|
||||
CVE-2024-5489,0,0,9bb79263edce390c6997c8d9f9fe7d295077e49147dbdcc1c480d08892e3d2f5,2024-06-11T18:15:01.617000
|
||||
CVE-2024-5491,1,1,2f05114998827e32300a42e2de57c3624b9c94cbc1f8d85b510f1bf5917cd6aa,2024-07-10T19:15:11.190000
|
||||
CVE-2024-5492,1,1,98ca61dd6b125f67106f528e9fd90c0c57a573cef0a8f3da1e62444944450907,2024-07-10T19:15:11.293000
|
||||
CVE-2024-5491,0,0,2f05114998827e32300a42e2de57c3624b9c94cbc1f8d85b510f1bf5917cd6aa,2024-07-10T19:15:11.190000
|
||||
CVE-2024-5492,0,0,98ca61dd6b125f67106f528e9fd90c0c57a573cef0a8f3da1e62444944450907,2024-07-10T19:15:11.293000
|
||||
CVE-2024-5493,0,0,6197d264f9043f6827bed7540062d250b0374cc18469d389f548454d0f106bc1,2024-07-03T02:08:58.650000
|
||||
CVE-2024-5494,0,0,873b32b5a8631a7cfafda5ef05f4cca30f0a687443c321eec260009bcbcc903d,2024-07-03T02:08:59.420000
|
||||
CVE-2024-5495,0,0,0a1c44916768f321aa0f99dcbbf7835c3f375f68104a303716ad9e841a86c5f0,2024-06-10T17:16:34.740000
|
||||
@ -256263,10 +256271,10 @@ CVE-2024-5906,0,0,b7fc466b9931ce265a1ef81017e39098b5ad31bf494bc22103ede7f6c2cace
|
||||
CVE-2024-5907,0,0,17327a712757852c4b43c811f24252c9a6d5917388dc8b093882f86e14b7ae5b,2024-06-13T18:36:09.010000
|
||||
CVE-2024-5908,0,0,626d4ee0c59c97ce53ee1de5871da8e08f754ec4c69aaf4477321803dc309ac6,2024-06-13T18:36:09.010000
|
||||
CVE-2024-5909,0,0,135cc10869213a459dd71b8b5da7a5af9b37ed5f304a5a3bf425c78b00034c69,2024-06-13T18:36:09.010000
|
||||
CVE-2024-5910,1,1,1acb753d2e88901e967b804222845e43c9699c302f4b4582706fcd2c6a29195b,2024-07-10T19:15:11.390000
|
||||
CVE-2024-5911,1,1,8a6e879c2208cd5de10f9c1cb9641e87ae8a4b2966dcce9db9ad381842c936c9,2024-07-10T19:15:11.547000
|
||||
CVE-2024-5912,1,1,c966f93537b840ffc1873604fdfb6b553e2d6aed4c1b4e36047db4d4f60803c2,2024-07-10T19:15:11.697000
|
||||
CVE-2024-5913,1,1,d05ebf205747ef3a72c3254aa3b64a5d9d644844ef8cb323b5d23e9fb1f34aeb,2024-07-10T19:15:11.837000
|
||||
CVE-2024-5910,0,0,1acb753d2e88901e967b804222845e43c9699c302f4b4582706fcd2c6a29195b,2024-07-10T19:15:11.390000
|
||||
CVE-2024-5911,0,0,8a6e879c2208cd5de10f9c1cb9641e87ae8a4b2966dcce9db9ad381842c936c9,2024-07-10T19:15:11.547000
|
||||
CVE-2024-5912,0,0,c966f93537b840ffc1873604fdfb6b553e2d6aed4c1b4e36047db4d4f60803c2,2024-07-10T19:15:11.697000
|
||||
CVE-2024-5913,0,0,d05ebf205747ef3a72c3254aa3b64a5d9d644844ef8cb323b5d23e9fb1f34aeb,2024-07-10T19:15:11.837000
|
||||
CVE-2024-5922,0,0,e29cc1185c6dbfaaa56af47c566fc115571f883f702dae9a40d1739b93329831,2024-06-28T10:27:00.920000
|
||||
CVE-2024-5924,0,0,c5c85908e1bc3136c78f0f5690507eea3ba6b330ba27c618aeeb0cde0122c6a0,2024-06-17T12:43:31.090000
|
||||
CVE-2024-5925,0,0,9927dea575613975cb1f3595ae91835696c41f49e37b56a7c3c9724b111ba81c,2024-06-28T10:27:00.920000
|
||||
@ -256395,6 +256403,10 @@ CVE-2024-6144,0,0,282f248ec161eadd8599a33b6d11a75bd4ed1ccd1aa15e9b959a4a72d41d30
|
||||
CVE-2024-6145,0,0,74f99a0157ef2eb5160bc64159bab3cd3614efb0f0cae9420b13288ce6d516ff,2024-06-20T12:44:01.637000
|
||||
CVE-2024-6146,0,0,835232b778d7e80b1c73cad2f19f1275692bff270d5e664fd4c7fc64973110ef,2024-06-20T12:44:01.637000
|
||||
CVE-2024-6147,0,0,4a4919271ad23db4250af2d646dfd99f64704c8a0c63e163a55ff156915fc472,2024-06-21T11:22:01.687000
|
||||
CVE-2024-6148,1,1,dcd83a245e39fa43db402f0637ad356b0d0e0667882f01d90e6c3c6107206e98,2024-07-10T21:15:10.730000
|
||||
CVE-2024-6149,1,1,a9578230ee145225e434c626fca85a259f303801ec1a7121abf0ec884010a742,2024-07-10T21:15:10.830000
|
||||
CVE-2024-6150,1,1,6ad8b9667f4da237273307618c00aa9adad0e60508a636fb2e1e33190d440247,2024-07-10T21:15:10.920000
|
||||
CVE-2024-6151,1,1,135328139a2a1eaf24b04738d199c3901e649153e54ef8d081a281ad2900fd4d,2024-07-10T21:15:11.013000
|
||||
CVE-2024-6153,0,0,a3cbabebaa196b7fc704a5b9ef76e592e68ec6c4195aa6f7531f701a27a837d5,2024-06-21T11:22:01.687000
|
||||
CVE-2024-6154,0,0,14c261dad2c658f3f85287831ecf663ba772d4a017166d6d5d3cda8ce8388677,2024-06-21T11:22:01.687000
|
||||
CVE-2024-6160,0,0,e0e9df11502e0f78d6d764c03981bde61fa7fdce13ce5e8e72c2edbfe567293b,2024-06-24T12:57:36.513000
|
||||
@ -256442,7 +256454,8 @@ CVE-2024-6222,0,0,7d8ad82668d6d98e0f167e915dde6d9fa8875b44590f66f2e873d05e89e247
|
||||
CVE-2024-6225,0,0,05da1495d7d116987721ea4d8dad783669e833db8afd42c6e9b9d7b36358250e,2024-06-24T19:21:28.450000
|
||||
CVE-2024-6227,0,0,6448b237469b4af8add5bea6ce3efd3ec79e9126dca5090705d4ceeb86be54e2,2024-07-09T18:19:14.047000
|
||||
CVE-2024-6229,0,0,8c75c4089f9bb2b690871cceb6de9502d8662dbaa4dc8109053b9a0e9bdfb643,2024-07-08T15:49:22.437000
|
||||
CVE-2024-6235,1,1,e3c37bb4fde984e1ccadb66beb9f2d57535be87aa4e3d6539029d59968be2e76,2024-07-10T19:15:11.973000
|
||||
CVE-2024-6235,0,0,e3c37bb4fde984e1ccadb66beb9f2d57535be87aa4e3d6539029d59968be2e76,2024-07-10T19:15:11.973000
|
||||
CVE-2024-6236,1,1,959a1f53fbd24ac8bbba6562ae5b94299031a022f324a67305fde8f021d5c507,2024-07-10T21:15:11.120000
|
||||
CVE-2024-6237,0,0,8eb889363f8a87d3bb3f430f1da56ccf68ff66b11eeffce13455da0850e4107b,2024-07-09T18:18:38.713000
|
||||
CVE-2024-6238,0,0,01bce4fcd5bf21099e3fa29fb7e34bf0d2a461d152d0ae3d9b913c1fb46d1451,2024-06-25T18:50:42.040000
|
||||
CVE-2024-6239,0,0,4d98a21d53ef2e5917897cadc254a12ee654ff1e3575a82a15151981272f61b5,2024-06-24T19:06:27.537000
|
||||
@ -256472,6 +256485,7 @@ CVE-2024-6280,0,0,4e5bdd720fdc6d68a51312dcfd366ac88ed5daebd5ed348aefe6d5aa74c577
|
||||
CVE-2024-6283,0,0,84796e0660e5beb3ad885e74e117108f941d8d6090497e3b6867080b852b92df,2024-06-28T13:37:44.763000
|
||||
CVE-2024-6284,0,0,73ccbe59cd13df171bbc79ab6b910254c728a7cb44133bad73b07b9d4dc26d5e,2024-07-05T12:55:51.367000
|
||||
CVE-2024-6285,0,0,e2996efda4e983a3551e96b4c79fe85947d0c5facb8b6e94cf5ae2183076f6f4,2024-06-26T14:24:38.113000
|
||||
CVE-2024-6286,1,1,465273d6f75a4d4193bc59c5929b52288f5d34220942ae74fab2f5d29f1b2acf,2024-07-10T21:15:11.210000
|
||||
CVE-2024-6287,0,0,91ea920d50ec75aef59aca2b29908a9542c1a59d5111a1068e10d538d24873e6,2024-06-26T14:36:08.507000
|
||||
CVE-2024-6288,0,0,759e3147da1b3805ee22c246688b7816f816dcaacd990c0e2025b974262129c2,2024-06-28T10:27:00.920000
|
||||
CVE-2024-6290,0,0,f38106d9e1179e3770e59e6eaa72c9e7b486c800903b3806d0d60fbc8ab354e0,2024-07-03T02:09:49.960000
|
||||
@ -256525,13 +256539,13 @@ CVE-2024-6376,0,0,2eceea6553f0e47a0e34ab01650b7781a20682f6799be39f9cd1e64f3f1985
|
||||
CVE-2024-6381,0,0,2822fb12d769fe1cca32125b45cae52ba3e5807419213b6087c6db8de8d2b326,2024-07-03T12:53:24.977000
|
||||
CVE-2024-6382,0,0,9f140af24f460b4413fa844f95383cc153754360a136939b8743c2d8327ebf99,2024-07-03T12:53:24.977000
|
||||
CVE-2024-6383,0,0,4622f4fc90fbde51d6570a14e2ee494e3e71659c68201475e4e4eb659c036ac0,2024-07-05T12:55:51.367000
|
||||
CVE-2024-6387,0,1,b1fbdb98f6e404bd38c8139822d83a145f2d2f6b94a3b15541c37a70e5fde04f,2024-07-10T18:15:05.163000
|
||||
CVE-2024-6387,0,0,b1fbdb98f6e404bd38c8139822d83a145f2d2f6b94a3b15541c37a70e5fde04f,2024-07-10T18:15:05.163000
|
||||
CVE-2024-6388,0,0,e641c9d869769d4291da87145b48d15b4f200c046d6b100142bc686375a84738,2024-06-27T17:11:52.390000
|
||||
CVE-2024-6391,0,0,7ce7aeffa0d0436a5dc8c66236e9fdb421bf2fd0e842089663d3cb7d1491a998,2024-07-09T18:19:14.047000
|
||||
CVE-2024-6402,0,0,795485c4534407e246daec51c1daaa33b95f6651688fed743a8fb9054cdaedba,2024-07-01T12:37:24.220000
|
||||
CVE-2024-6403,0,0,e44b9cfa8d9ae367e624a8cdf179ef52ea1e98c2115d7a956299d17747a6a56b,2024-07-01T12:37:24.220000
|
||||
CVE-2024-6405,0,0,fdb62e3d2213e21f6cf3d269e158ee31cc07c01f1a5a460b466ccce5203f82ee,2024-07-01T12:37:24.220000
|
||||
CVE-2024-6409,0,0,4aeceb7aada4288b3e92bef85eaeda3c41a47def607b76a1ba5fe7675bc8439f,2024-07-10T17:15:12.847000
|
||||
CVE-2024-6409,0,1,9bc68adee8126d980e539ed0340617319811b9c1ec91d5c6d49c8bedd8ee2b95,2024-07-10T20:15:04.853000
|
||||
CVE-2024-6410,0,0,4a23711af9b75fd5d9c836acb666fb2c064959ce225737e22ec0f19711868ab5,2024-07-10T05:15:12.313000
|
||||
CVE-2024-6411,0,0,c411733ced490230d62545353c4c7ed0b98f77df3ab30f2e11b0169200346139,2024-07-10T05:15:12.497000
|
||||
CVE-2024-6414,0,0,ae0d661be5f3239fdfe6f0d08030fef27c03212dc1e12675bcf532fd90369002,2024-07-01T12:37:24.220000
|
||||
@ -256596,10 +256610,12 @@ CVE-2024-6612,0,0,8ea660f335d1e8552a64db073fe7466306fd1f2e5cc9fbb77910ed6aa806d5
|
||||
CVE-2024-6613,0,0,1044faeab37e5e6a281bf238170e48cbf6d6c882aa1c2ca89983ecc271027c0a,2024-07-09T18:18:38.713000
|
||||
CVE-2024-6614,0,0,4bab9d3e1891f10867b2f4d5e4a2817e40eb603b99a7dab59e27fb07817b5d0c,2024-07-09T18:18:38.713000
|
||||
CVE-2024-6615,0,0,51ee5ed3b9bac56f9be4d0a991ad4a60e35d63343d0ef008dc875e1c3fdef69f,2024-07-09T18:18:38.713000
|
||||
CVE-2024-6630,1,1,7742b604143993a9d769b9ab9c3e5aab85337a51e6772bb186961af80d29fee2,2024-07-10T18:15:05.407000
|
||||
CVE-2024-6630,0,0,7742b604143993a9d769b9ab9c3e5aab85337a51e6772bb186961af80d29fee2,2024-07-10T18:15:05.407000
|
||||
CVE-2024-6642,0,0,8d96c1180af1047f7b667e53dd25106a95583c9fef6033b783f527ef0b9e4e6b,2024-07-10T13:15:11.140000
|
||||
CVE-2024-6644,0,0,4ac0927b6bee710b6d7aa47a319df161deab572b53510067cbeff9a5913bdd4c,2024-07-10T17:15:12.980000
|
||||
CVE-2024-6645,0,0,8ee317125a412d226c217d8aa7e29bf02176cbf9e3265855272fdc48170e0bd4,2024-07-10T17:15:13.320000
|
||||
CVE-2024-6646,1,1,01c30e39566e822aad5b619eab7c1cda5be4c04760003ec04ead5d5505b412a8,2024-07-10T18:15:05.480000
|
||||
CVE-2024-6647,1,1,777e03d3351043524e4b93060af6228c5a5f635d70d75e1e1e2cc217a2855ca0,2024-07-10T18:15:05.763000
|
||||
CVE-2024-6649,1,1,ba27e99c640a915a148c2cc576aa13e58beea119b44959dc391310f141dd2bdb,2024-07-10T19:15:12.070000
|
||||
CVE-2024-6646,0,0,01c30e39566e822aad5b619eab7c1cda5be4c04760003ec04ead5d5505b412a8,2024-07-10T18:15:05.480000
|
||||
CVE-2024-6647,0,1,d85de7e2a89b23bef0d7c402bdb84b5d7bcecaf5214acb2011ddba0aeacad46c,2024-07-10T21:15:11.350000
|
||||
CVE-2024-6649,0,0,ba27e99c640a915a148c2cc576aa13e58beea119b44959dc391310f141dd2bdb,2024-07-10T19:15:12.070000
|
||||
CVE-2024-6663,1,1,7facb2637e12709d4a455340194f194dba2537cb44d31c2262ed1aa6b9ebcf89,2024-07-10T21:15:11.463000
|
||||
CVE-2024-6664,1,1,7dcdbd9efac1143da422ef778b0a605b2e75ff3874c65ca5b8e519e1d8523278,2024-07-10T21:15:11.520000
|
||||
|
Can't render this file because it is too large.
|
Loading…
x
Reference in New Issue
Block a user