Auto-Update: 2024-07-15T20:00:18.531240+00:00

This commit is contained in:
cad-safe-bot 2024-07-15 20:03:15 +00:00
parent 02fe50969a
commit 0d07fece20
24 changed files with 1066 additions and 73 deletions

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-6966",
"sourceIdentifier": "security@wordfence.com",
"published": "2024-06-06T02:15:52.607",
"lastModified": "2024-06-06T14:17:35.017",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-07-15T18:55:57.513",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -39,14 +39,50 @@
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-862"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:themoneytizer:the_moneytizer:*:*:*:*:*:wordpress:*:*",
"versionEndExcluding": "10.0.1",
"matchCriteriaId": "80061CEE-BA8D-4D0D-9105-80A52D957F76"
}
]
}
]
}
],
"references": [
{
"url": "https://plugins.trac.wordpress.org/browser/the-moneytizer/trunk/core/core_ajax.php",
"source": "security@wordfence.com"
"source": "security@wordfence.com",
"tags": [
"Patch"
]
},
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/71823e36-3899-4253-a1d2-c6f8921d18dc?source=cve",
"source": "security@wordfence.com"
"source": "security@wordfence.com",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2024-27238",
"sourceIdentifier": "security@zoom.us",
"published": "2024-07-15T18:15:03.633",
"lastModified": "2024-07-15T18:15:03.633",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Race condition in the installer for some Zoom Apps and SDKs for Windows before version 6.0.0 may allow an authenticated user to conduct a privilege escalation via local access."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security@zoom.us",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "NONE",
"baseScore": 7.1,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.2
}
]
},
"weaknesses": [
{
"source": "security@zoom.us",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-367"
}
]
}
],
"references": [
{
"url": "https://www.zoom.com/en/trust/security-bulletin/zsb-24021",
"source": "security@zoom.us"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2024-27240",
"sourceIdentifier": "security@zoom.us",
"published": "2024-07-15T18:15:03.873",
"lastModified": "2024-07-15T18:15:03.873",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Improper input validation in the installer for some Zoom Apps for Windows may allow an authenticated user to conduct a privilege escalation via local access."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security@zoom.us",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "NONE",
"baseScore": 7.1,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.2
}
]
},
"weaknesses": [
{
"source": "security@zoom.us",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-20"
}
]
}
],
"references": [
{
"url": "https://www.zoom.com/en/trust/security-bulletin/zsb-24019",
"source": "security@zoom.us"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2024-27241",
"sourceIdentifier": "security@zoom.us",
"published": "2024-07-15T18:15:04.087",
"lastModified": "2024-07-15T18:15:04.087",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Improper input validation in some Zoom Apps and SDKs may allow an authenticated user to conduct a denial of service via network access."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security@zoom.us",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "LOW",
"baseScore": 5.3,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 3.9,
"impactScore": 1.4
}
]
},
"weaknesses": [
{
"source": "security@zoom.us",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-20"
}
]
}
],
"references": [
{
"url": "https://www.zoom.com/en/trust/security-bulletin/zsb-24020",
"source": "security@zoom.us"
}
]
}

View File

@ -0,0 +1,21 @@
{
"id": "CVE-2024-31946",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-07-15T19:15:02.503",
"lastModified": "2024-07-15T19:15:02.503",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "An issue was discovered in Stormshield Network Security (SNS) 3.7.0 through 3.7.41, 3.10.0 through 3.11.29, 4.0 through 4.3.24, and 4.4.0 through 4.7.4. A user who has access to the SNS with write access on the email alerts page has the ability to create alert email containing malicious JavaScript, executed by the template preview. The following versions fix this: 3.7.42, 3.11.30, 4.3.25, and 4.7.5."
}
],
"metrics": {},
"references": [
{
"url": "https://advisories.stormshield.eu/2024-007",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,48 @@
{
"id": "CVE-2024-36432",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-07-15T19:15:02.593",
"lastModified": "2024-07-15T19:15:02.593",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "An arbitrary memory write vulnerability was discovered in Supermicro X11DPG-HGX2, X11PDG-QT, X11PDG-OT, and X11PDG-SN motherboards with BIOS firmware before 4.4."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "cve@mitre.org",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H",
"attackVector": "LOCAL",
"attackComplexity": "HIGH",
"privilegesRequired": "HIGH",
"userInteraction": "NONE",
"scope": "CHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 0.8,
"impactScore": 6.0
}
]
},
"references": [
{
"url": "https://www.supermicro.com/en/support/security_center#%21advisories",
"source": "cve@mitre.org"
},
{
"url": "https://www.supermicro.com/zh_tw/support/security_BIOS_Jul_2024",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,48 @@
{
"id": "CVE-2024-36433",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-07-15T19:15:02.837",
"lastModified": "2024-07-15T19:15:02.837",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "An arbitrary memory write vulnerability was discovered in Supermicro X11DPH-T, X11DPH-Tq, and X11DPH-i motherboards with BIOS firmware before 4.4."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "cve@mitre.org",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H",
"attackVector": "LOCAL",
"attackComplexity": "HIGH",
"privilegesRequired": "HIGH",
"userInteraction": "NONE",
"scope": "CHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 0.8,
"impactScore": 6.0
}
]
},
"references": [
{
"url": "https://www.supermicro.com/en/support/security_BIOS_Jul_2024",
"source": "cve@mitre.org"
},
{
"url": "https://www.supermicro.com/en/support/security_center#%21advisories",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,48 @@
{
"id": "CVE-2024-36434",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-07-15T19:15:03.053",
"lastModified": "2024-07-15T19:15:03.053",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "An SMM callout vulnerability was discovered in Supermicro X11DPH-T, X11DPH-Tq, and X11DPH-i motherboards with BIOS firmware before 4.4."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "cve@mitre.org",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H",
"attackVector": "LOCAL",
"attackComplexity": "HIGH",
"privilegesRequired": "HIGH",
"userInteraction": "NONE",
"scope": "CHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 0.8,
"impactScore": 6.0
}
]
},
"references": [
{
"url": "https://www.supermicro.com/en/support/security_BIOS_Jul_2024",
"source": "cve@mitre.org"
},
{
"url": "https://www.supermicro.com/en/support/security_center#%21advisories",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,25 @@
{
"id": "CVE-2024-36438",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-07-15T19:15:03.320",
"lastModified": "2024-07-15T19:15:03.320",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "eLinkSmart Hidden Smart Cabinet Lock 2024-05-22 has Incorrect Access Control and fails to perform an authorization check which can lead to card duplication and other attacks."
}
],
"metrics": {},
"references": [
{
"url": "https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2024-044.txt",
"source": "cve@mitre.org"
},
{
"url": "https://www.syss.de/pentest-blog/",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,25 @@
{
"id": "CVE-2024-37016",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-07-15T18:15:04.337",
"lastModified": "2024-07-15T18:15:04.337",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Mengshen Wireless Door Alarm M70 2024-05-24 allows Authentication Bypass via a Capture-Replay approach."
}
],
"metrics": {},
"references": [
{
"url": "https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2024-045.txt",
"source": "cve@mitre.org"
},
{
"url": "https://www.syss.de/pentest-blog/",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,21 @@
{
"id": "CVE-2024-37386",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-07-15T19:15:03.430",
"lastModified": "2024-07-15T19:15:03.430",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "An issue was discovered in Stormshield Network Security (SNS) 4.0.0 through 4.3.25, 4.4.0 through 4.7.5, and 4.8.0. Certain manipulations allow restarting in single-user mode despite the activation of secure boot. The following versions fix this: 4.3.27, 4.7.6, and 4.8.1."
}
],
"metrics": {},
"references": [
{
"url": "https://advisories.stormshield.eu/2024-017",
"source": "cve@mitre.org"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-38433",
"sourceIdentifier": "cna@cyber.gov.il",
"published": "2024-07-11T08:15:10.623",
"lastModified": "2024-07-11T13:05:54.930",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2024-07-15T18:26:30.693",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -17,6 +17,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 6.7,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 0.8,
"impactScore": 5.9
},
{
"source": "cna@cyber.gov.il",
"type": "Secondary",
@ -41,8 +61,18 @@
},
"weaknesses": [
{
"source": "cna@cyber.gov.il",
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-287"
}
]
},
{
"source": "cna@cyber.gov.il",
"type": "Secondary",
"description": [
{
"lang": "en",
@ -51,10 +81,127 @@
]
}
],
"configurations": [
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:nuvoton:npcm750r_firmware:*:*:*:*:*:*:*:*",
"versionEndExcluding": "10.10.19",
"matchCriteriaId": "D59B4482-20BA-49E5-AF90-2A4E47E2E960"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:nuvoton:npcm750r:-:*:*:*:*:*:*:*",
"matchCriteriaId": "52605376-B227-4E94-A652-5209DE575E48"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:nuvoton:npcm710r_firmware:*:*:*:*:*:*:*:*",
"versionEndExcluding": "10.10.19",
"matchCriteriaId": "935BB578-5585-4272-9285-6EFA358E3B4B"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:nuvoton:npcm710r:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F907249A-2671-4301-89BC-44E2303C2C6B"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:nuvoton:npcm730r_firmware:*:*:*:*:*:*:*:*",
"versionEndExcluding": "10.10.19",
"matchCriteriaId": "F08B3B70-F6A9-4B12-9499-92BA3F010367"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:nuvoton:npcm730r:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C5804365-723A-46E4-BB3C-84ACBD2B1EF0"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:nuvoton:npcm705r_firmware:*:*:*:*:*:*:*:*",
"versionEndExcluding": "10.10.19",
"matchCriteriaId": "596757E5-A4B2-4F9F-9FE6-DFA5508A62F2"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:nuvoton:npcm705r:-:*:*:*:*:*:*:*",
"matchCriteriaId": "2C504A29-378C-499A-9F9F-7184FBC96B0E"
}
]
}
]
}
],
"references": [
{
"url": "https://www.gov.il/en/Departments/faq/cve_advisories",
"source": "cna@cyber.gov.il"
"source": "cna@cyber.gov.il",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2024-39819",
"sourceIdentifier": "security@zoom.us",
"published": "2024-07-15T18:15:04.407",
"lastModified": "2024-07-15T18:15:04.407",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Improper privilege management in the installer for some Zoom Workplace Apps and SDKs for Windows may allow an authenticated user to conduct a privilege escalation via local access."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security@zoom.us",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H",
"attackVector": "LOCAL",
"attackComplexity": "HIGH",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 6.7,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 0.8,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "security@zoom.us",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-269"
}
]
}
],
"references": [
{
"url": "https://www.zoom.com/en/trust/security-bulletin/zsb-24026",
"source": "security@zoom.us"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2024-39820",
"sourceIdentifier": "security@zoom.us",
"published": "2024-07-15T18:15:04.620",
"lastModified": "2024-07-15T18:15:04.620",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Uncontrolled search path element in the installer for Zoom Workplace Desktop App for macOS before version 6.0.10 may allow an authenticated user to conduct a denial of service via local access."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security@zoom.us",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:H/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 6.6,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.3,
"impactScore": 5.2
}
]
},
"weaknesses": [
{
"source": "security@zoom.us",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-427"
}
]
}
],
"references": [
{
"url": "https://www.zoom.com/en/trust/security-bulletin/zsb-24027",
"source": "security@zoom.us"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2024-39821",
"sourceIdentifier": "security@zoom.us",
"published": "2024-07-15T18:15:04.827",
"lastModified": "2024-07-15T18:15:04.827",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Race condition in the installer for Zoom Workplace App for Windows and Zoom Rooms App for Windows may allow an authenticated user to conduct a denial of service via local access."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security@zoom.us",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:H/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 6.6,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.3,
"impactScore": 5.2
}
]
},
"weaknesses": [
{
"source": "security@zoom.us",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-367"
}
]
}
],
"references": [
{
"url": "https://www.zoom.com/en/trust/security-bulletin/zsb-24028",
"source": "security@zoom.us"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2024-39826",
"sourceIdentifier": "security@zoom.us",
"published": "2024-07-15T18:15:05.033",
"lastModified": "2024-07-15T18:15:05.033",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Path traversal in Team Chat for some Zoom Workplace Apps and SDKs for Windows may allow an authenticated user to conduct information disclosure via network access."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security@zoom.us",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:N/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 6.8,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.3,
"impactScore": 4.0
}
]
},
"weaknesses": [
{
"source": "security@zoom.us",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-367"
}
]
}
],
"references": [
{
"url": "https://www.zoom.com/en/trust/security-bulletin/zsb-24023",
"source": "security@zoom.us"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2024-39827",
"sourceIdentifier": "security@zoom.us",
"published": "2024-07-15T18:15:05.237",
"lastModified": "2024-07-15T18:15:05.237",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Improper input validation in the installer for Zoom Workplace Desktop App for Windows before version 6.0.10 may allow an authenticated user to conduct a denial of service via local access."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security@zoom.us",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "security@zoom.us",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-20"
}
]
}
],
"references": [
{
"url": "https://www.zoom.com/en/trust/security-bulletin/zsb-24024",
"source": "security@zoom.us"
}
]
}

View File

@ -0,0 +1,21 @@
{
"id": "CVE-2024-40415",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-07-15T18:15:05.490",
"lastModified": "2024-07-15T18:15:05.490",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability in /goform/SetStaticRouteCfg in the sub_519F4 function in Tenda AX1806 1.0.0.1 firmware leads to stack-based buffer overflow."
}
],
"metrics": {},
"references": [
{
"url": "https://github.com/Feng-ZZ-pwn/IOT/blob/main/Tenda%20AX_1806/4/SetStaticRouteCfg.md",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,21 @@
{
"id": "CVE-2024-40416",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-07-15T18:15:05.543",
"lastModified": "2024-07-15T18:15:05.543",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability in /goform/SetVirtualServerCfg in the sub_6320C function in Tenda AX1806 1.0.0.1 firmware leads to stack-based buffer overflow."
}
],
"metrics": {},
"references": [
{
"url": "https://github.com/Feng-ZZ-pwn/IOT/blob/main/Tenda%20AX_1806/3/SetVirtualServerCfg.md",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,64 @@
{
"id": "CVE-2024-40631",
"sourceIdentifier": "security-advisories@github.com",
"published": "2024-07-15T19:15:03.700",
"lastModified": "2024-07-15T19:15:03.700",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Plate media is an open source, rich-text editor for React. Editors that use `MediaEmbedElement` and pass custom `urlParsers` to the `useMediaState` hook may be vulnerable to XSS if a custom parser allows `javascript:`, `data:` or `vbscript:` URLs to be embedded. Editors that do not use `urlParsers` and consume the `url` property directly may also be vulnerable if the URL is not sanitised. The default parsers `parseTwitterUrl` and `parseVideoUrl` are not affected. `@udecode/plate-media` 36.0.10 resolves this issue by only allowing HTTP and HTTPS URLs during parsing. This affects only the `embed` property returned from `useMediaState`. In addition, the `url` property returned from `useMediaState` has been renamed to `unsafeUrl` to indicate that it has not been sanitised. The `url` property on `element` is also unsafe, but has not been renamed. If you're using either of these properties directly, you will still need to validate the URL yourself. Users are advised to upgrade. Users unable to upgrade should ensure that any custom `urlParsers` do not allow `javascript:`, `data:` or `vbscript:` URLs to be returned in the `url` property of their return values. If `url` is consumed directly, validate the URL protocol before passing it to the `iframe` element.\n\n"
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security-advisories@github.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "NONE",
"baseScore": 8.1,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.2
}
]
},
"weaknesses": [
{
"source": "security-advisories@github.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"references": [
{
"url": "https://github.com/udecode/plate/commit/1bc0971774fbfb770780c9bdb94746a6f0f196a0",
"source": "security-advisories@github.com"
},
{
"url": "https://github.com/udecode/plate/security/advisories/GHSA-h3pq-667x-r789",
"source": "security-advisories@github.com"
},
{
"url": "https://stackoverflow.com/a/43467144",
"source": "security-advisories@github.com"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-6035",
"sourceIdentifier": "security@huntr.dev",
"published": "2024-07-11T11:15:09.920",
"lastModified": "2024-07-12T18:49:07.067",
"vulnStatus": "Analyzed",
"lastModified": "2024-07-15T18:15:05.840",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
@ -44,20 +44,20 @@
"type": "Secondary",
"cvssData": {
"version": "3.0",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:N",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:N/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 9.3,
"baseSeverity": "CRITICAL"
"baseScore": 7.4,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.8
"impactScore": 4.0
}
]
},

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-6716",
"sourceIdentifier": "secalert@redhat.com",
"published": "2024-07-15T15:15:10.900",
"lastModified": "2024-07-15T15:15:10.900",
"lastModified": "2024-07-15T18:15:06.107",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
@ -55,6 +55,10 @@
{
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2297636",
"source": "secalert@redhat.com"
},
{
"url": "https://gitlab.com/libtiff/libtiff/-/issues/620",
"source": "secalert@redhat.com"
}
]
}

View File

@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours.
### Last Repository Update
```plain
2024-07-15T18:00:18.973254+00:00
2024-07-15T20:00:18.531240+00:00
```
### Most recent CVE Modification Timestamp synchronized with NVD
```plain
2024-07-15T17:37:09.007000+00:00
2024-07-15T19:15:03.700000+00:00
```
### Last Data Feed Release
@ -33,43 +33,41 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
### Total Number of included CVEs
```plain
257045
257063
```
### CVEs added in the last Commit
Recently added CVEs: `5`
Recently added CVEs: `18`
- [CVE-2024-40414](CVE-2024/CVE-2024-404xx/CVE-2024-40414.json) (`2024-07-15T17:15:02.783`)
- [CVE-2024-40553](CVE-2024/CVE-2024-405xx/CVE-2024-40553.json) (`2024-07-15T16:15:03.147`)
- [CVE-2024-40554](CVE-2024/CVE-2024-405xx/CVE-2024-40554.json) (`2024-07-15T16:15:03.223`)
- [CVE-2024-40555](CVE-2024/CVE-2024-405xx/CVE-2024-40555.json) (`2024-07-15T16:15:03.283`)
- [CVE-2024-40560](CVE-2024/CVE-2024-405xx/CVE-2024-40560.json) (`2024-07-15T16:15:03.347`)
- [CVE-2024-27238](CVE-2024/CVE-2024-272xx/CVE-2024-27238.json) (`2024-07-15T18:15:03.633`)
- [CVE-2024-27240](CVE-2024/CVE-2024-272xx/CVE-2024-27240.json) (`2024-07-15T18:15:03.873`)
- [CVE-2024-27241](CVE-2024/CVE-2024-272xx/CVE-2024-27241.json) (`2024-07-15T18:15:04.087`)
- [CVE-2024-31946](CVE-2024/CVE-2024-319xx/CVE-2024-31946.json) (`2024-07-15T19:15:02.503`)
- [CVE-2024-36432](CVE-2024/CVE-2024-364xx/CVE-2024-36432.json) (`2024-07-15T19:15:02.593`)
- [CVE-2024-36433](CVE-2024/CVE-2024-364xx/CVE-2024-36433.json) (`2024-07-15T19:15:02.837`)
- [CVE-2024-36434](CVE-2024/CVE-2024-364xx/CVE-2024-36434.json) (`2024-07-15T19:15:03.053`)
- [CVE-2024-36438](CVE-2024/CVE-2024-364xx/CVE-2024-36438.json) (`2024-07-15T19:15:03.320`)
- [CVE-2024-37016](CVE-2024/CVE-2024-370xx/CVE-2024-37016.json) (`2024-07-15T18:15:04.337`)
- [CVE-2024-37386](CVE-2024/CVE-2024-373xx/CVE-2024-37386.json) (`2024-07-15T19:15:03.430`)
- [CVE-2024-39819](CVE-2024/CVE-2024-398xx/CVE-2024-39819.json) (`2024-07-15T18:15:04.407`)
- [CVE-2024-39820](CVE-2024/CVE-2024-398xx/CVE-2024-39820.json) (`2024-07-15T18:15:04.620`)
- [CVE-2024-39821](CVE-2024/CVE-2024-398xx/CVE-2024-39821.json) (`2024-07-15T18:15:04.827`)
- [CVE-2024-39826](CVE-2024/CVE-2024-398xx/CVE-2024-39826.json) (`2024-07-15T18:15:05.033`)
- [CVE-2024-39827](CVE-2024/CVE-2024-398xx/CVE-2024-39827.json) (`2024-07-15T18:15:05.237`)
- [CVE-2024-40415](CVE-2024/CVE-2024-404xx/CVE-2024-40415.json) (`2024-07-15T18:15:05.490`)
- [CVE-2024-40416](CVE-2024/CVE-2024-404xx/CVE-2024-40416.json) (`2024-07-15T18:15:05.543`)
- [CVE-2024-40631](CVE-2024/CVE-2024-406xx/CVE-2024-40631.json) (`2024-07-15T19:15:03.700`)
### CVEs modified in the last Commit
Recently modified CVEs: `19`
Recently modified CVEs: `4`
- [CVE-2023-3204](CVE-2023/CVE-2023-32xx/CVE-2023-3204.json) (`2024-07-15T16:46:09.057`)
- [CVE-2024-30278](CVE-2024/CVE-2024-302xx/CVE-2024-30278.json) (`2024-07-15T16:15:37.093`)
- [CVE-2024-30299](CVE-2024/CVE-2024-302xx/CVE-2024-30299.json) (`2024-07-15T17:37:09.007`)
- [CVE-2024-30300](CVE-2024/CVE-2024-303xx/CVE-2024-30300.json) (`2024-07-15T17:37:06.847`)
- [CVE-2024-3073](CVE-2024/CVE-2024-30xx/CVE-2024-3073.json) (`2024-07-15T17:31:24.570`)
- [CVE-2024-3561](CVE-2024/CVE-2024-35xx/CVE-2024-3561.json) (`2024-07-15T16:45:18.173`)
- [CVE-2024-3562](CVE-2024/CVE-2024-35xx/CVE-2024-3562.json) (`2024-07-15T16:49:47.490`)
- [CVE-2024-3597](CVE-2024/CVE-2024-35xx/CVE-2024-3597.json) (`2024-07-15T16:51:05.940`)
- [CVE-2024-3602](CVE-2024/CVE-2024-36xx/CVE-2024-3602.json) (`2024-07-15T16:50:36.190`)
- [CVE-2024-3605](CVE-2024/CVE-2024-36xx/CVE-2024-3605.json) (`2024-07-15T17:12:36.967`)
- [CVE-2024-3627](CVE-2024/CVE-2024-36xx/CVE-2024-3627.json) (`2024-07-15T17:12:17.763`)
- [CVE-2024-37803](CVE-2024/CVE-2024-378xx/CVE-2024-37803.json) (`2024-07-15T16:46:21.273`)
- [CVE-2024-40412](CVE-2024/CVE-2024-404xx/CVE-2024-40412.json) (`2024-07-15T17:15:02.723`)
- [CVE-2024-4176](CVE-2024/CVE-2024-41xx/CVE-2024-4176.json) (`2024-07-15T16:43:04.163`)
- [CVE-2024-4371](CVE-2024/CVE-2024-43xx/CVE-2024-4371.json) (`2024-07-15T16:42:39.107`)
- [CVE-2024-4626](CVE-2024/CVE-2024-46xx/CVE-2024-4626.json) (`2024-07-15T17:10:52.563`)
- [CVE-2024-4742](CVE-2024/CVE-2024-47xx/CVE-2024-4742.json) (`2024-07-15T17:10:34.403`)
- [CVE-2024-5432](CVE-2024/CVE-2024-54xx/CVE-2024-5432.json) (`2024-07-15T16:53:35.600`)
- [CVE-2024-6721](CVE-2024/CVE-2024-67xx/CVE-2024-6721.json) (`2024-07-15T16:15:03.467`)
- [CVE-2023-6966](CVE-2023/CVE-2023-69xx/CVE-2023-6966.json) (`2024-07-15T18:55:57.513`)
- [CVE-2024-38433](CVE-2024/CVE-2024-384xx/CVE-2024-38433.json) (`2024-07-15T18:26:30.693`)
- [CVE-2024-6035](CVE-2024/CVE-2024-60xx/CVE-2024-6035.json) (`2024-07-15T18:15:05.840`)
- [CVE-2024-6716](CVE-2024/CVE-2024-67xx/CVE-2024-6716.json) (`2024-07-15T18:15:06.107`)
## Download and Usage

View File

@ -223722,7 +223722,7 @@ CVE-2023-32035,0,0,b6b3376a399e2f18ad0d237c44a7b487a2be739a6756dc716ee136aedc7f6
CVE-2023-32037,0,0,e6fbf656596b0f12e8a816d2fe3bb7f8172423cd51fc1dcef0179303935b19e0,2024-05-29T03:15:40.027000
CVE-2023-32038,0,0,5f30b4088982dd039555017eaf1b23d675891ea4a9027ce83009d91020a6f522,2024-05-29T03:15:40.210000
CVE-2023-32039,0,0,332044a322083261920224f8561b7ce85fb9667002581b0794eb5836ca3383b5,2024-05-29T03:15:40.413000
CVE-2023-3204,0,1,8cd0009773c1a45c783ea81dffe8ff200cde4afc0a022752c71de700c5ab0b9a,2024-07-15T16:46:09.057000
CVE-2023-3204,0,0,8cd0009773c1a45c783ea81dffe8ff200cde4afc0a022752c71de700c5ab0b9a,2024-07-15T16:46:09.057000
CVE-2023-32040,0,0,f966fb2cd44d93d5d40086bb2c7587bff9964f18dd5da7188a4b6e3b65982d89,2024-05-29T03:15:40.580000
CVE-2023-32041,0,0,064ebf8cb18c8d2bb906d6b21f2c079e074488207e7b90d11ce25ae0d5eda28d,2024-05-29T03:15:40.770000
CVE-2023-32042,0,0,299c72ce4b35604d96a5e619fa292e348d07b9ed8f1d93782e38a7ecf2e70305,2024-05-29T03:15:41.073000
@ -240444,7 +240444,7 @@ CVE-2023-6962,0,0,986479cdf0104030985cc73b8c5cd922aed26e09aac7f4f0ca21a4d53b3d66
CVE-2023-6963,0,0,5d78e338c4f8af8931aea1f2dde5afb8bbdfc8f31ec8fab4d6db3d80bfcdecf2,2024-02-14T17:05:16.533000
CVE-2023-6964,0,0,6b353abfee4e0f60ba07ed53b519d8cdcc5c6e3e583c876cd6af699df966c5a5,2024-04-10T13:24:00.070000
CVE-2023-6965,0,0,f49ac78940fe244c72647e51516e80a6e573f5fa400fc7065d825c4c692cabcd,2024-04-10T13:24:00.070000
CVE-2023-6966,0,0,eee17306b1d6ecf0ac8d17fe9db7245fd618122fd910b73bf69d1270bf7f9f8e,2024-06-06T14:17:35.017000
CVE-2023-6966,0,1,9a012b06da86b8f395f403fc3c8f5013317bd371eadeddb21759c85700f73992,2024-07-15T18:55:57.513000
CVE-2023-6967,0,0,7fa49a7c16574cbfe3664c75658ac16ae96710a4d17734528b42e15e81f0ce19,2024-04-10T13:24:00.070000
CVE-2023-6968,0,0,a4751c3d52b515d1d942809757ebd5c330a2b3fb28572a1d55882f3452313b5b,2024-06-06T14:17:35.017000
CVE-2023-6969,0,0,28305747d8b707ea006f2410a4d39a2af33e21a9599b2601ee1414912a46183e,2024-03-13T18:16:18.563000
@ -247312,7 +247312,10 @@ CVE-2024-27234,0,0,7f9c430bb757ad526adb7918516acd55f167ec46b27604bd9833832e0b615
CVE-2024-27235,0,0,ca7df1b3186edf63083ffa451556ee8cef5481ef83fd54ad47ed09114ed183d0,2024-03-15T20:15:09.253000
CVE-2024-27236,0,0,87315156a485dcd5ca2e4a3368db0027f412517fa717d3f5ab5df1cc6bb866c2,2024-03-12T12:40:13.500000
CVE-2024-27237,0,0,229917a4428117370a5145466e677b0c72a40fdcb37122ac8c08e36ef5d19033,2024-03-12T12:40:13.500000
CVE-2024-27238,1,1,462fc8e1860e98147c320e26d17ba5fee5ca1a60367d56c5f1c4f7059819041b,2024-07-15T18:15:03.633000
CVE-2024-2724,0,0,660610afdb28f5976ed634f2a472d2022e02ebb5bc503c73eac1e0b96d741829,2024-03-22T15:34:43.663000
CVE-2024-27240,1,1,58daf2f38d2758083d41f48f956c68649d1d8c824a7b219db5babb7ed75e0346,2024-07-15T18:15:03.873000
CVE-2024-27241,1,1,9e0fff38b263ebe0899e33f34b14266c4594aab0a80e4165f430f66221530bad,2024-07-15T18:15:04.087000
CVE-2024-27242,0,0,aa3d00d8440b9711083704a859c18c29ae2a7d4e0687131a6877ff32cc440bb5,2024-04-10T13:24:00.070000
CVE-2024-27243,0,0,7506fdb7727ab984462fc64398555eb3450f805c7f6a3944e9822e85e93cca4e,2024-05-16T13:03:05.353000
CVE-2024-27244,0,0,481637fe3fc7930848fab67c20215a504ece49e65656eb0a28bda5cc7f4c687a,2024-05-16T13:03:05.353000
@ -249281,7 +249284,7 @@ CVE-2024-30273,0,0,6b1d238c9e12ea2ba8fc60efb1a6f102260f96c472f5f331b760d3af4a0ce
CVE-2024-30274,0,0,e625b227f4c1edcd8894c6840804c74e62ead535c97f2e8fc44830cae7c48db1,2024-05-16T13:03:05.353000
CVE-2024-30275,0,0,1e933441e483f4fad62bd9e8a6a258edd1aaca4d5bb09d395e2677a6a5bd3120,2024-05-16T13:03:05.353000
CVE-2024-30276,0,0,0bd4be9c7f10ca7d4fd2dfa1716549a7092cbd7f9a2adabf7913546d4cdfeadd,2024-07-09T15:50:56.480000
CVE-2024-30278,0,1,61f4d7e9a9587a3224ab5f7ebbd333eb1034f085c631558b85be2564db298806,2024-07-15T16:15:37.093000
CVE-2024-30278,0,0,61f4d7e9a9587a3224ab5f7ebbd333eb1034f085c631558b85be2564db298806,2024-07-15T16:15:37.093000
CVE-2024-30279,0,0,e8959302b2a7f4b2f979d5a292d479144519886e3c4ec1eda991b8640940de58,2024-05-24T01:15:30.977000
CVE-2024-3028,0,0,9e4bef210fc19099d68fdbe2ca58f9c70793f50703ba240559787e18524fd766,2024-04-16T13:24:07.103000
CVE-2024-30280,0,0,7232cea83e4b5e67f9a2b634eb562bbb13f45b745f6ead8e9f7f82040938f49a,2024-05-24T01:15:30.977000
@ -249304,9 +249307,9 @@ CVE-2024-30295,0,0,7acbb1c4868f13b65f181cea277a794fc009caf9cee062ee7f161860d6c96
CVE-2024-30296,0,0,be0909c296e6e8e43038b5643a1a0c28c6682fe163ca23c3edf171e922ae6f6e,2024-05-16T13:03:05.353000
CVE-2024-30297,0,0,55a6b9a1f93e14e98892ac8ad42e4742b35b926da37b4c4e027266ed3205e993,2024-05-16T13:03:05.353000
CVE-2024-30298,0,0,92bbe49d33f9c926bdca52a1a92f14b21413490e1bf1dd65bcaf24fbb0fe1407,2024-05-16T13:03:05.353000
CVE-2024-30299,0,1,1654b592ab1dce50a91f0ff3960d214faa43e082d949db6429602b9ab8066e0e,2024-07-15T17:37:09.007000
CVE-2024-30299,0,0,1654b592ab1dce50a91f0ff3960d214faa43e082d949db6429602b9ab8066e0e,2024-07-15T17:37:09.007000
CVE-2024-3030,0,0,5eafba8e87a04804f0ee37eb44b2a0db0456e0dcfce765e75341d9edfec2815f,2024-04-04T12:48:41.700000
CVE-2024-30300,0,1,cb30fb32a49ef545078d6cb3d0e2c9d2976845dda248b7c3086e68c50460cc41,2024-07-15T17:37:06.847000
CVE-2024-30300,0,0,cb30fb32a49ef545078d6cb3d0e2c9d2976845dda248b7c3086e68c50460cc41,2024-07-15T17:37:06.847000
CVE-2024-30301,0,0,9b74ed05354c1aa1aaf7222bb27897d0894fcbdf51bd0565f77bbad0338cfc5f,2024-05-03T12:50:34.250000
CVE-2024-30302,0,0,dbae568de5b2417e966678cb186a0766d0a1270a494653512196e489399925de,2024-05-03T12:50:34.250000
CVE-2024-30303,0,0,29beefe281b7361c70e3d46cb1e8ccb19d06aa60b2190adf964c9790227b9a7c,2024-05-03T12:50:34.250000
@ -249684,7 +249687,7 @@ CVE-2024-30726,0,0,efb4446cd4d96112b24cdc2d4f9ffad31c723de0b805c2ec83882b225609f
CVE-2024-30727,0,0,94492425a665761069039b2945e50fcfafedef52ebacc29c5716b28a4a0bbac3,2024-05-27T01:15:19.710000
CVE-2024-30728,0,0,3bc4c37b3682468f392a00e20efc19006244f15206b4a691e5cf95f83eded5a0,2024-05-27T01:15:19.790000
CVE-2024-30729,0,0,7c764f79b0cf9ef9638397b0c7f17f9af70530d76ceffd0ab159e6bf8fc29954,2024-05-27T01:15:19.870000
CVE-2024-3073,0,1,45e6a22c22eb312115de50cc590e036ba6ec5593843fdd7bc8c65ba79b3446fa,2024-07-15T17:31:24.570000
CVE-2024-3073,0,0,45e6a22c22eb312115de50cc590e036ba6ec5593843fdd7bc8c65ba79b3446fa,2024-07-15T17:31:24.570000
CVE-2024-30730,0,0,d4716f28d51e81409f5051905cf4ab5726344a2915708c552fcb346edd08860e,2024-05-27T01:15:19.953000
CVE-2024-30733,0,0,6f8110d48dd6a51bb95f34d95d1f66cca8866d7553b9830c6a166aaa001b5992,2024-05-27T01:15:20.033000
CVE-2024-30735,0,0,753441d7803dcc475ebaf2cfa2a11fe542629a9d58de825feb7b68625b12455d,2024-05-27T01:15:20.110000
@ -250387,6 +250390,7 @@ CVE-2024-31941,0,0,afb95f4bebc84bd64697d4f74d4565720846f17ff4a035556242f3c05ce58
CVE-2024-31942,0,0,3d122d20f9462572618ef3940be00c9131d19d68aedd2b72ba341efc50cfe360,2024-04-15T13:15:31.997000
CVE-2024-31943,0,0,a3c3177de375490a3bcbe7c4dc869c6dc98de8408de3c26e8167121dc5553a55,2024-04-10T19:49:51.183000
CVE-2024-31944,0,0,9b7df1c1d68c7ba82d2a7e14fc250e4409e7410da01d69528d57b3dba1022b40,2024-04-10T19:49:51.183000
CVE-2024-31946,1,1,7a838df436f8b1519c8cddad23e2362b3257c2383bd9af684a9638bf2e00480c,2024-07-15T19:15:02.503000
CVE-2024-31947,0,0,53a07a96d235761473c51b6658ac88c324f970e3729e396995a521d5b07b0a35,2024-07-15T13:00:34.853000
CVE-2024-31948,0,0,2545f6a13668ac7d71382ed97228591f14df9b7003f52f431839a3cf2cbd6d68,2024-07-03T01:55:34.387000
CVE-2024-31949,0,0,6e39badd21c22fae949ff94d85aeafc847ebfb0900888b28cfa176432c58fd9e,2024-04-28T07:15:08.917000
@ -252597,9 +252601,9 @@ CVE-2024-35592,0,0,72c678ca31e4ec93bf22d8a1535979b48daec0d6d17d31e168e052fbb6727
CVE-2024-35593,0,0,5a7a9fd646183a9cfe0e8b357ffc98e8641fa2decf7b0d864f537dba3ee77a7b,2024-05-24T18:09:20.027000
CVE-2024-35595,0,0,1c0caac8b66ea50c55b6a38567b8221cce1fb5534ed6ea6fa786e54a9487b678,2024-07-03T02:01:55.937000
CVE-2024-3560,0,0,db76ccbf181e1e5da7ff674678a92955a50aac899b842cbcce7ee4c6ed92892a,2024-04-19T13:10:25.637000
CVE-2024-3561,0,1,5370e9e1ff8bffbf4ad8d0059e83fd31e423cd49fc364fad03b1f8cc26f5277c,2024-07-15T16:45:18.173000
CVE-2024-3561,0,0,5370e9e1ff8bffbf4ad8d0059e83fd31e423cd49fc364fad03b1f8cc26f5277c,2024-07-15T16:45:18.173000
CVE-2024-35618,0,0,909b98d4f6bab57eebe322fcd0fa9e4a02c096346d6899a3aecfb54429751f2f,2024-07-03T02:01:56.717000
CVE-2024-3562,0,1,e0decdba1b4d9f0742f62650b9f4ede7206e97be478294222e880f87c4662eac,2024-07-15T16:49:47.490000
CVE-2024-3562,0,0,e0decdba1b4d9f0742f62650b9f4ede7206e97be478294222e880f87c4662eac,2024-07-15T16:49:47.490000
CVE-2024-35621,0,0,685edeb645450da75895f43badb747e81d0e1f2d5ca055304f12a369effa59ec,2024-05-28T17:11:47.007000
CVE-2024-35627,0,0,4a039665766224ab2309171105fbc890963796bdfb66945f84a5ba2663f6bfff,2024-07-03T02:01:57.493000
CVE-2024-35628,0,0,612e797ff0e8cb8cedb262bed6040ae0abe44f1ee9b3f6c53c48f04c0f951c42,2024-06-27T13:15:58.550000
@ -252966,7 +252970,7 @@ CVE-2024-35966,0,0,a92d4fb089889747475857cdf0af029c240ab8f6fb105e68fbd72992fec50
CVE-2024-35967,0,0,e3e23303b3dc5d4a65fe66a5f540e6a1db2b9194c0c160b04b3c6d8794f3528f,2024-06-25T22:15:33.880000
CVE-2024-35968,0,0,439ccc18325908cd4ef3a9bd891d3376dacc1d470b882c7bccea812445a8152e,2024-05-20T13:00:04.957000
CVE-2024-35969,0,0,c7e6b7ae441187279ecf5e21ff7ea13c1669f067e7c32158b493f5f3f86ee309,2024-06-27T12:15:26.887000
CVE-2024-3597,0,1,75a7819de93664529fde26d6546c7502e2875af3213925a87bf3c85f5cec0e00,2024-07-15T16:51:05.940000
CVE-2024-3597,0,0,75a7819de93664529fde26d6546c7502e2875af3213925a87bf3c85f5cec0e00,2024-07-15T16:51:05.940000
CVE-2024-35970,0,0,f412b0fc32058b1c3254455ca20439b7bcea99cc8d63c3a4fb8f474b7a6fa77d,2024-05-20T13:00:04.957000
CVE-2024-35971,0,0,f6116ac7ec424eec70e9f8f9696fd8cc3c252a3be88ce23a3aea15911b12a4d8,2024-06-10T18:15:35.383000
CVE-2024-35972,0,0,f2192d50ea420577056b9a7c4e781e3b14a7a9d14514af3e2b89df5bf9f73d9b,2024-05-23T21:04:02.433000
@ -253021,7 +253025,7 @@ CVE-2024-36016,0,0,af6275dcadc896490bdfa8d75a24c446a65c13d4e371df7dc6e294e458cd8
CVE-2024-36017,0,0,418307aa110a364a6cbe46a7da7e8978367fb58331214a4b84a378b5a1a0f1e8,2024-06-27T14:15:13.943000
CVE-2024-36018,0,0,76c3ace216b452f4aa37c9643b2598864907335dde3ccb46fa666d2ecb42a8eb,2024-05-30T18:19:11.743000
CVE-2024-36019,0,0,6822b62368d372d6fe4bd8bbf9ad5e4c841c271eb7f80877f1beeef1e2b58d2e,2024-05-30T18:19:11.743000
CVE-2024-3602,0,1,406ce829351e213c6af7e0a3b9d0c99f237e3ef837f86ddf7e5919696f488a4b,2024-07-15T16:50:36.190000
CVE-2024-3602,0,0,406ce829351e213c6af7e0a3b9d0c99f237e3ef837f86ddf7e5919696f488a4b,2024-07-15T16:50:36.190000
CVE-2024-36020,0,0,38e2918ca9889dee369a741d0ef9bc41660c53e9227b9a4d7bb1cfbb3f8bc3e7,2024-06-27T12:15:27.717000
CVE-2024-36021,0,0,02495fe00f66da6dfdc76e114cbfe299166f38a54b1d2a44f261ac9e32a86975,2024-05-30T18:19:11.743000
CVE-2024-36022,0,0,c64d6f85f36bbf65cea0343ca81b6ba47092415a3c5024bf18c749096420184e,2024-05-30T18:19:11.743000
@ -253047,7 +253051,7 @@ CVE-2024-36042,0,0,5e54aecb20c44082aa92fd61c0f8a58aa5121675b55d97309cf9a5aaaf11a
CVE-2024-36043,0,0,3bd225f8561cef578aaa027f6bceef70b4450bc22a2e5dc039a9b76782f71691,2024-05-20T13:00:04.957000
CVE-2024-36048,0,0,b406f72981a8542eaabbe2b057df03d1e7a595145b2ccc619b5d1fde4d2e90e3,2024-06-10T17:16:32.167000
CVE-2024-36049,0,0,51d271179b773ae975431c0c021fa3b0015024baa0aaf9431319b88ebb604829,2024-05-24T18:09:20.027000
CVE-2024-3605,0,1,905473bba2f4b1f833e3696e0eb3a1556acdfbc79f67c22a9c6f82f499950cc7,2024-07-15T17:12:36.967000
CVE-2024-3605,0,0,905473bba2f4b1f833e3696e0eb3a1556acdfbc79f67c22a9c6f82f499950cc7,2024-07-15T17:12:36.967000
CVE-2024-36050,0,0,c50ac6e5d9529aacb1e334d114a2f6f4418d441c20a736ae9e48551abc3029b2,2024-05-22T16:15:10.777000
CVE-2024-36052,0,0,022010471f20b33cdbb9c0f6e926c1a4caaff0d72570a4d1a2abd38ceffab587,2024-05-22T12:46:53.887000
CVE-2024-36053,0,0,2b26adadb1e10190c0e2e5708c64683c631febead0f4dd9529189a0425d50810,2024-07-03T02:02:43.043000
@ -253222,7 +253226,7 @@ CVE-2024-36264,0,0,107a5f8ad4937c0982cb9f4a5a08127014ca42eef2ebad76477f1e3a073f5
CVE-2024-36265,0,0,013f12438cdeab94e645b2217e59635e5ee118c048a6c6d7490b497e97a99b2a,2024-06-13T21:15:57.170000
CVE-2024-36266,0,0,9d2961d489b0fce568e04e4c1c269f16c8c57dd6d267e14663bd78f27bc7e154,2024-06-11T13:54:12.057000
CVE-2024-36267,0,0,66b127f77fa5a54e7fcd6fbeddc446c0aeca670a52e22fd99c771e136e0935f8,2024-07-03T02:03:00.383000
CVE-2024-3627,0,1,b89e9f2ca530f3e52199f8e236751735781433429621317f8b9fc4faa8df3d5f,2024-07-15T17:12:17.763000
CVE-2024-3627,0,0,b89e9f2ca530f3e52199f8e236751735781433429621317f8b9fc4faa8df3d5f,2024-07-15T17:12:17.763000
CVE-2024-36270,0,0,d3b5ce010e9d2d0e421a800ff03990b2f8e8f91530ab5a32d5bddc378cffae67,2024-06-21T11:22:01.687000
CVE-2024-36277,0,0,af400d33a698814e148533e62eceb8aef6909a879b47a7e44b0b7cad3c452635,2024-07-03T02:03:01.187000
CVE-2024-36278,0,0,6b8ecb24f3100b2f1c21910812aabc2ecc5850755f17ecb30c413be0914d5cf2,2024-07-03T18:02:26.597000
@ -253312,7 +253316,11 @@ CVE-2024-36426,0,0,081cbabfe1f165d2e60c6bf5434c4cea5a1c1465246b1d9713d429b0a41c1
CVE-2024-36427,0,0,10c5dade9c11af5e52239a7a8c18438909a8ea6a201617061be6b7626f49e18c,2024-07-03T02:03:12.033000
CVE-2024-36428,0,0,73719b2d94fccf2eff624fbf36dc51c2fc48c0dc66be598a72cd1ff64aaf434d,2024-05-28T12:39:28.377000
CVE-2024-3643,0,0,af0c2404bd4ab34bcd75932174ab1b00c5ac556e20d57f0445020a0c94c96fe2,2024-05-16T13:03:05.353000
CVE-2024-36432,1,1,bc7dcc54c0accd9d08a7eb50f3ad4572241465881609f579fc341e21961b7c58,2024-07-15T19:15:02.593000
CVE-2024-36433,1,1,27ef33775c72c0fd42ed9b3c63df51a99b759c2ebef0c22d29deb86a1eac9de9,2024-07-15T19:15:02.837000
CVE-2024-36434,1,1,0dfd2c56938439fb6a894bd775b9cbf740e7ded5bc9d49218fae9b783d279f33,2024-07-15T19:15:03.053000
CVE-2024-36435,0,0,d5db9c80751c95bdb9d7c8677b360e81635e7c29402d5e581205685bb84d0c00,2024-07-12T12:49:11.340000
CVE-2024-36438,1,1,774be27f24fca724c25c385bb341460342aa8691fc1a30d28ca76b1c9d53b8e7,2024-07-15T19:15:03.320000
CVE-2024-3644,0,0,e904dffa636a621d1f1644a68a8bb26342dbf717ae684f12b60a37d102e4d87d,2024-05-16T13:03:05.353000
CVE-2024-3645,0,0,ea45063aa3cff8d7bb517959f0685ad339f1e48c249e10e3851af9fbba289420,2024-04-22T19:24:12.920000
CVE-2024-36450,0,0,32d48285c32086a3f09c628c1971379077a46741ecaad7df002b03827ae59ffc,2024-07-11T13:05:54.930000
@ -253614,6 +253622,7 @@ CVE-2024-37006,0,0,ce197589ee3e9b9abc62e5ee278117c11ae961db1cdfe5fd87c2da96a0f55
CVE-2024-37007,0,0,0fc601714096f5d925a9dbadf52718e2d07645aad03229b4044d058f28f4c32f,2024-07-03T02:04:01.303000
CVE-2024-3701,0,0,b97bf02f501ce8bb46bbbea962bd508392417999afee815d0c2fcfb239983cc7,2024-04-15T13:15:31.997000
CVE-2024-37014,0,0,4d8eebb55f92fd637819ddb88e1adc8dcc510ce2876a7f33ecffd1498dc89404,2024-07-03T02:04:01.523000
CVE-2024-37016,1,1,a5541b3a7f0a84fa31ec51dc66cb973b2ac5e7f89d07e0348ce7d14438de273a,2024-07-15T18:15:04.337000
CVE-2024-37017,0,0,bcf42a4afa4161d494ebe5be7e7f4777ee139dad62148a87a3f3aec02cb4dc1b,2024-07-03T02:04:02.337000
CVE-2024-37018,0,0,702b0048025811920f5478aca500fdf16e8badcce077fd8d6d40cb1d8cc37861,2024-05-31T13:01:46.727000
CVE-2024-37019,0,0,c34529539f4c6ff793225ec64e29909e2614ce1bc964c3c63810b9219791c5ca,2024-07-03T02:04:03.153000
@ -253836,6 +253845,7 @@ CVE-2024-3738,0,0,cebdf6c67207ccd8240919e9596b8485c51e6607a12a8dcdfff13f6ddbdbfe
CVE-2024-37383,0,0,3a9597c771ab199850aaeee94068cbc0182ff2bfcefd23d631ce0d7808f3745f,2024-07-03T02:04:16.250000
CVE-2024-37384,0,0,4ede7c4b4e1e1de259445d49ca3b43a6d0a75b7dcaf1ea245b8f6306c1e67bb9,2024-07-03T02:04:17.060000
CVE-2024-37385,0,0,1af5dbf4fe496116fcfe8797458a2e9292fd2ddec99a563e5137c9d207fb12bc,2024-06-07T14:56:05.647000
CVE-2024-37386,1,1,3fc6f12821cdac1c4892854bf660c25bf1a1ca57761e368d4200b885ae7dc344,2024-07-15T19:15:03.430000
CVE-2024-37387,0,0,fe2e0e702592a3b950e5c7ffa6cd887e6a1ea8123fb6a269a45db83eafdcfbbc,2024-07-03T02:04:17.790000
CVE-2024-37388,0,0,3169d306b45a011b46c4d3fe95463302fc94255a3e5bff07d58cd00bed7bba75,2024-06-07T19:24:09.243000
CVE-2024-37389,0,0,27f7927000cd6a2429ab617761c45ffb27c2f3c3199f49f01b1eda02927e348e,2024-07-11T14:48:32.300000
@ -253992,7 +254002,7 @@ CVE-2024-37799,0,0,7daf228a97dd80358d70cc4a662e5369bebd266eafdf0efd1951071a509a7
CVE-2024-3780,0,0,83484fb5b744efc24cdea9908844170c52624d067b8e01e5b8f34f841ba67ba1,2024-04-15T13:15:31.997000
CVE-2024-37800,0,0,3aebd2faaeb84484cc68215ff2c27d755488c237f64ba208bea923e908662dd8,2024-07-05T14:11:13.163000
CVE-2024-37802,0,0,acc621703310da7f355403e50706b571175d412f17efb19e135e56be65b914ac,2024-07-03T02:04:46.857000
CVE-2024-37803,0,1,e775e15ae57e6d87a1c3eae9b2633b6fb5e2150047d8db37ba8a0df6bf917fcb,2024-07-15T16:46:21.273000
CVE-2024-37803,0,0,e775e15ae57e6d87a1c3eae9b2633b6fb5e2150047d8db37ba8a0df6bf917fcb,2024-07-15T16:46:21.273000
CVE-2024-3781,0,0,0166ef6fe2c7d229a771ed8a3459c0974e3bc1428bfcd1abf209c8c2e778a8e5,2024-04-15T19:12:25.887000
CVE-2024-37818,0,0,5cb7934ffaf0f9273124a6e156c7f80c8bbf67e7edc77dc4c583d4fc2d7c2bcb,2024-06-21T11:22:01.687000
CVE-2024-3782,0,0,b45b8920e0157c6199f5ffbbbc446d8fb5e1a40daf0ca4b703a9dc70f6839c9b,2024-04-15T19:12:25.887000
@ -254259,7 +254269,7 @@ CVE-2024-3841,0,0,8802855d3bfa5a1c81bb3b1500254989e91bb5a660a45184fb94e49c6e6b50
CVE-2024-38427,0,0,8994acf8b0d2e9fdb11baea3df5edeec421ed8fa1c8aac7108ecf0d2784c04de,2024-07-03T02:05:00.507000
CVE-2024-38428,0,0,88ab77f65d2de763959b3536063d69fbc2444cb9d53c4b7dcba71cfc1a022537,2024-06-17T12:42:04.623000
CVE-2024-3843,0,0,f8304581ad62be18ba48d40e0abaf62c4d0e638c53e769e55d87254b71de405d,2024-07-03T02:06:41.770000
CVE-2024-38433,0,0,5b15c173757827b04b6aec390e8d6227c4be5fb08c0ff2d2703cb9d9bc7b7755,2024-07-11T13:05:54.930000
CVE-2024-38433,0,1,f67092b0476b56495430d5a0a2004ef9f8edcc22248756a4bc924265edccd9ea,2024-07-15T18:26:30.693000
CVE-2024-38439,0,0,8231c3155c8c2b9187a625bff6a8697fe632a7e4deddc7a4e816a03d1932df66,2024-06-30T12:15:02.293000
CVE-2024-3844,0,0,13c07c552898deff764ecc147d4cf01f9d640dbd85df9d011bb4595782c8d93e,2024-07-03T02:06:42.643000
CVE-2024-38440,0,0,6eeed0e96f15416f894572035c480d139cdee0086e466e03019ce412c35c715a,2024-06-30T12:15:02.377000
@ -254844,6 +254854,11 @@ CVE-2024-3977,0,0,87f55f2983faa9489e3ab65e96b4cea8a0d04681e4c4541cf69108c85d144a
CVE-2024-3978,0,0,e25d25f011ecf86a9a7629ea5449d530d107458e873c97f796fe325b70200d63,2024-06-17T12:42:04.623000
CVE-2024-3979,0,0,e9e7991f3b86f818ec400b9ec60245e440b2d51744d0b7d3598ed5add4c2b631,2024-06-06T20:15:14.127000
CVE-2024-39807,0,0,ba2c368fe4cdf413290b5bff8a949eddf35bb4de98ed47f43e524e6cb747e010,2024-07-05T17:07:47.090000
CVE-2024-39819,1,1,3ed27297e5dbf2b5db195ab7e433cf48cdd2011e8378ab27c539a83818e800c8,2024-07-15T18:15:04.407000
CVE-2024-39820,1,1,0a370c1960af31a93093357600b0ed4111feec64382be841777decf985639317,2024-07-15T18:15:04.620000
CVE-2024-39821,1,1,ffecc1cca9d0647f6a473cf37bb2fa90bd231ab7475e8f7e70a655aa741bd08f,2024-07-15T18:15:04.827000
CVE-2024-39826,1,1,f422588b30ad994068eda47537984282c3659d647a20e3872a22edb1bb332311,2024-07-15T18:15:05.033000
CVE-2024-39827,1,1,157c0f61a4c15fdb2ab6aa4ba54f2d4d0e2783cc207c0189f8175c7ce923d0ac,2024-07-15T18:15:05.237000
CVE-2024-39828,0,0,37815ac0cb1d59603d10017e1de409a6a7cef6f58ba5d0ea15f1cc9c3c9f34b5,2024-07-11T15:06:13.953000
CVE-2024-39830,0,0,fa16449dc31377b10db0f6c8fa3cd2e73175dcab5134adbfb18592dc79a4a80c,2024-07-05T17:08:50.197000
CVE-2024-3984,0,0,9fd51fca8e9cb62e411ab69c310516342152a8240e3126272f1618181a2d89aa,2024-06-20T12:44:01.637000
@ -254960,8 +254975,10 @@ CVE-2024-4038,0,0,9199a5f679fdf6d4f05942a1d329990ffc0905f3bf6de7561a7af327688cda
CVE-2024-4039,0,0,b18b8aac4336f296c5655f645710463e48a4544089b8c4c20638e847b5c74634,2024-05-14T16:11:39.510000
CVE-2024-4040,0,0,4c2ad1f11d479d0071ddbaeb3523edde6a0cd9c4e74c065c69d4bb5c9b1ac029,2024-04-26T15:25:47.270000
CVE-2024-4041,0,0,bd71d95aba274d30d448ad146bc23c848b8a3b9576dc252f709372f143cb7780,2024-05-14T16:11:39.510000
CVE-2024-40412,0,1,ee1648a619ace402a2695f357644480cca061a0b71a8c8619f0a343e150121f2,2024-07-15T17:15:02.723000
CVE-2024-40414,1,1,42ab5d9f1543bbb2a7588474b7f0390046f7ff960997e9ce164549f423d304ae,2024-07-15T17:15:02.783000
CVE-2024-40412,0,0,ee1648a619ace402a2695f357644480cca061a0b71a8c8619f0a343e150121f2,2024-07-15T17:15:02.723000
CVE-2024-40414,0,0,42ab5d9f1543bbb2a7588474b7f0390046f7ff960997e9ce164549f423d304ae,2024-07-15T17:15:02.783000
CVE-2024-40415,1,1,dd6b4b157d36739047024ef312bcdbc2974a75c7371ac4228d566a23bdd925f6,2024-07-15T18:15:05.490000
CVE-2024-40416,1,1,2541f9169745ccf44b3c6aaf80029bc6951ce4931a6336d52713caa5691ef3bf,2024-07-15T18:15:05.543000
CVE-2024-40417,0,0,298c0304c38ce2a49f170de68fce3e8c26e10c42ce4acaa74e6360f44eab21ad,2024-07-11T13:05:54.930000
CVE-2024-4042,0,0,f41d19a896222ab39f54d4d516c2364bd25fe65dca5e9c4b7ccc9d626f82d5ed,2024-06-07T14:56:05.647000
CVE-2024-4043,0,0,50e67cd87d2761034ee2e0514a61b1574f18a654fe271a8568be1eaa53e96b2e,2024-05-24T01:15:30.977000
@ -254987,11 +255004,11 @@ CVE-2024-40549,0,0,a0d01bcdf34afa23eab8ec4dd5d94b148230dc582c59a04f8f6da50444d2d
CVE-2024-40550,0,0,7a6954c6d53bfb86477e868f3f394991be55b1202e4ee13b62edae8e166cd83b,2024-07-12T18:40:22.040000
CVE-2024-40551,0,0,9e323c706374e77ed8fc1ea45acdfd1b484476c375557653052fb7c996a0649b,2024-07-12T18:40:13.010000
CVE-2024-40552,0,0,02ebf6fbf2ff31ad3f4bfa8a44c3c4b56d8ff7dfc506f01b4ada9a52c8671521,2024-07-12T18:39:59.150000
CVE-2024-40553,1,1,736e85c145e1c137af7fcb5ec3a7383a0d64e02e558a3942773186cb8f8c71ec,2024-07-15T16:15:03.147000
CVE-2024-40554,1,1,b82b913aff85d1115e78c21ed19913cda5f1ecdd2c218fadcdfa2f716f128c18,2024-07-15T16:15:03.223000
CVE-2024-40555,1,1,bca9188bfd5b610602fe283496cfd8eb9c467078430023fc400effb5eeac8b1b,2024-07-15T16:15:03.283000
CVE-2024-40553,0,0,736e85c145e1c137af7fcb5ec3a7383a0d64e02e558a3942773186cb8f8c71ec,2024-07-15T16:15:03.147000
CVE-2024-40554,0,0,b82b913aff85d1115e78c21ed19913cda5f1ecdd2c218fadcdfa2f716f128c18,2024-07-15T16:15:03.223000
CVE-2024-40555,0,0,bca9188bfd5b610602fe283496cfd8eb9c467078430023fc400effb5eeac8b1b,2024-07-15T16:15:03.283000
CVE-2024-4056,0,0,b8d993c32e0d1df4fc3c3b0df01e5b9a4366d92d1a2ad184a020d404aa44587a,2024-04-26T12:58:17.720000
CVE-2024-40560,1,1,fa9cfb7935924b2a220812353cf8c14602c5ee557d8f6e80e21d065266761652,2024-07-15T16:15:03.347000
CVE-2024-40560,0,0,fa9cfb7935924b2a220812353cf8c14602c5ee557d8f6e80e21d065266761652,2024-07-15T16:15:03.347000
CVE-2024-4057,0,0,26b46aa52b04f4ef8890033772544e5e99ad730f84e9e0e97b479cd36cf89ace,2024-07-03T02:07:02.197000
CVE-2024-4058,0,0,e20d454336ea887bbb54d47433e5560889db558189699560ce98773941e9b99e,2024-06-07T15:40:49.707000
CVE-2024-4059,0,0,c49986e07be30ca2c850f4613369c1702dff21e7018832f61c83284c95e0cc00,2024-05-03T03:16:29.430000
@ -255012,6 +255029,7 @@ CVE-2024-40614,0,0,5a8c90c94f1b0dc56355424420ebae65c618d536c580acb4e248f7802de21
CVE-2024-40618,0,0,339cc634a42e8a7db54f4bb39e56482affa65b57dfd2765250a61f2e694456da,2024-07-12T16:12:00.597000
CVE-2024-4062,0,0,695b7b6d53140e91ee1c447f6f5acafad0b73fbbd2558cb89ae9d4c0c7616ec0,2024-06-04T19:20:29.007000
CVE-2024-4063,0,0,a86a41867bbd8268c01f6e42ab82f3f97444cd9242de57f43e4b9e5669394e5f,2024-06-04T19:20:29.120000
CVE-2024-40631,1,1,02afd974607c209ba61a932b05cbea74ea58f5af3cb05e9df016ee708037da70,2024-07-15T19:15:03.700000
CVE-2024-4064,0,0,3a1a40467a64f04bfa80ae5c066454b06b4092014a9e47cc1a50eb6eb22d315c,2024-05-17T02:40:14.223000
CVE-2024-4065,0,0,e9243298c32ccba8ab1ac6d427150517ee98217790d2dec0b1b5ec685d8cbc83,2024-06-04T19:20:29.227000
CVE-2024-4066,0,0,5674d1317b0a03adb324e31f70d35a87031f26ca2ea2869349483359d081bdf7,2024-06-04T19:20:29.323000
@ -255231,7 +255249,7 @@ CVE-2024-4172,0,0,ae5cefdd41ee745a5f3463347f20f3f77110439c81ed1ad285dedf4b40da1c
CVE-2024-4173,0,0,47f39f3e8e603eac743ed4815cd724decf015716a2f0d9c17daf4d8fa3affc2d,2024-04-25T23:15:47.240000
CVE-2024-4174,0,0,e168dfb28a2573f66b3120de326c0954bda564c12e3831aed75de7f1338d3089,2024-04-25T13:18:02.660000
CVE-2024-4175,0,0,2f40401bb337bcc37138495e1928fb4d762f69fc829f768d707a278e8a423e1a,2024-04-25T13:18:02.660000
CVE-2024-4176,0,1,2a1e283cc95c7d3d47b09f457f96512613ab4fb1878e9b333c02ce78f75d8385,2024-07-15T16:43:04.163000
CVE-2024-4176,0,0,2a1e283cc95c7d3d47b09f457f96512613ab4fb1878e9b333c02ce78f75d8385,2024-07-15T16:43:04.163000
CVE-2024-4177,0,0,e1d6d87dc8ef62b0d8de94cfe98a875b1cbd39c3640e8e02d8d5a4e8bb3cca88,2024-06-11T17:53:13.710000
CVE-2024-4180,0,0,89f84993baa10ab5b41ed58678b5b9e31ff190980a67ee18130266156f7434fc,2024-06-04T16:57:41.053000
CVE-2024-4181,0,0,318f7b6282445099b873be7e9b6d90d9a8a899d8ebeb5f7676f33b80d9073c4d,2024-05-16T13:03:05.353000
@ -255397,7 +255415,7 @@ CVE-2024-4367,0,0,53b2562feb1cef4dfbc75c878e502bbc54b7cf80f87613aa8d663f88e3c74c
CVE-2024-4368,0,0,ebedd608e412600f3409256680729c82fcf5015495435afd7648389243e696e1,2024-07-03T02:07:28.557000
CVE-2024-4369,0,0,9bcc319f475d5802b53d6dedcfa6ead4761cbf7c42adde8daf6f3ff8c0c17af2,2024-06-19T18:15:11.820000
CVE-2024-4370,0,0,3c1f5b342c087fc6587c8bc9012541b58d80e50fdee9d14eea44daecdec82901,2024-05-15T16:40:19.330000
CVE-2024-4371,0,1,a0b0e0fb8c98057b2328743d7da5c32e9a585001a67e08f1632ceab0df487dfa,2024-07-15T16:42:39.107000
CVE-2024-4371,0,0,a0b0e0fb8c98057b2328743d7da5c32e9a585001a67e08f1632ceab0df487dfa,2024-07-15T16:42:39.107000
CVE-2024-4372,0,0,9ae4f43bf2d0d90214ce2e4715e0031799e31627a4319bb26ad2a73cf60988cf,2024-05-21T12:37:59.687000
CVE-2024-4373,0,0,95ffe3cd6afce20664a5281c9740358c7cd9b7c7a4c9be8031ba5b0e36cac33d,2024-05-15T16:40:19.330000
CVE-2024-4374,0,0,3d209a7da2a70008bba3efc6941e41bec948a9636ca11ef89a139bc015911837,2024-05-20T13:00:34.807000
@ -255620,7 +255638,7 @@ CVE-2024-4621,0,0,2ba6d981e4d5b6f91910837209ceaa779e2d1828d6d78fc3d542c33aa86982
CVE-2024-4622,0,0,7ee7f5b0dbbae0efd9526a317b5150a2af537411986feb7d056b697fe5fc8d53,2024-05-15T18:35:11.453000
CVE-2024-4623,0,0,c53a127683caa8cc49c11a88cc217ef787af901116f1ba89c4741730eb1cc926,2024-06-20T12:44:01.637000
CVE-2024-4624,0,0,8d5df292e17ba086eddadcbafacc529f2ebc3c5e49d7b6ea9488db217d327898,2024-05-14T19:17:55.627000
CVE-2024-4626,0,1,2c49c68b79a7a3d7626dfac7c1ab161b6d51a1a10b834d04b620fc9c15d7e475,2024-07-15T17:10:52.563000
CVE-2024-4626,0,0,2c49c68b79a7a3d7626dfac7c1ab161b6d51a1a10b834d04b620fc9c15d7e475,2024-07-15T17:10:52.563000
CVE-2024-4627,0,0,a94951b310ac8fa22dfdfb5dfa1a6f0b0e4706e2176059eb33a39431470f56d3,2024-07-03T15:45:08.187000
CVE-2024-4630,0,0,a8734ce37050a74e4818d023dd3913b4f4405761deda282bae815154e00346af,2024-05-14T16:11:39.510000
CVE-2024-4631,0,0,d3c7ebdf5d9c31d124bc2c67e858e716a594cef6aa78ec49eddcc538ef63a67e,2024-05-14T15:44:13.487000
@ -255720,7 +255738,7 @@ CVE-2024-4735,0,0,74f4fbd101bb46efdc880f338cfb70c8fd3a6ef365bd7732d2107c79fb3d78
CVE-2024-4736,0,0,d66d2cb2e0afad57d9d4fb0dd29db1ae480425b093ff5e46c35972ad67bf1599,2024-06-04T19:20:48.497000
CVE-2024-4737,0,0,bd8c1ff0c2bd0234c81e53807fa1f8ee5b80721a1ba19a06cab0ffcb77875865,2024-06-04T19:20:48.597000
CVE-2024-4738,0,0,fc42ba0968ce2d3cd6a759727e85c03dbbce46854db0b2e928b2a8457ade2245,2024-06-04T19:20:48.783000
CVE-2024-4742,0,1,b62cb9a09c7db689b4e755ae70bed9b2375aafaa790f8e2b3ab80c930d94850e,2024-07-15T17:10:34.403000
CVE-2024-4742,0,0,b62cb9a09c7db689b4e755ae70bed9b2375aafaa790f8e2b3ab80c930d94850e,2024-07-15T17:10:34.403000
CVE-2024-4743,0,0,213080d2ce7e290785906918b766d2dd6153d7beb42f4a36c418fabdb6096c44,2024-06-11T17:32:50.367000
CVE-2024-4744,0,0,f2a62275342fb4e02e31ad60fb7b37b3a8ac2b2376213a1fba752ece8166ef2e,2024-06-12T16:44:12.157000
CVE-2024-4745,0,0,54a19ac018881ab94cc09206a38557755449249c459a354d473ddea48bafd7eb,2024-06-12T16:23:34.197000
@ -256299,7 +256317,7 @@ CVE-2024-5427,0,0,8f69f2258320069dff3e4ca54576ebef2bbd612c89873dcb7f321da375d5ba
CVE-2024-5428,0,0,2246dbdf3f6f57b875e58f7afe2bbf25e943033499540bdd9e572873773785a4,2024-05-28T14:59:09.827000
CVE-2024-5430,0,0,7efa052e5c67b0f87e6df1de28f1712609827b19a2f0fa9870fd8d86a121a060,2024-06-28T13:17:34.380000
CVE-2024-5431,0,0,c05cafcca4db035c01a1ef8070f41d696cf1ed72d29d4b28e570debbe2ef62df,2024-06-25T12:24:17.873000
CVE-2024-5432,0,1,ab16c13801145bb5eaae071d9c21b29aca78e7920ad4908920a2f03fb30ba995,2024-07-15T16:53:35.600000
CVE-2024-5432,0,0,ab16c13801145bb5eaae071d9c21b29aca78e7920ad4908920a2f03fb30ba995,2024-07-15T16:53:35.600000
CVE-2024-5433,0,0,cf9a3f50aa3044d0d1df4fa80d5f9a0105faaa25fcb8a234110d2fd0fcff2ef0,2024-05-29T13:02:09.280000
CVE-2024-5434,0,0,bd01f6ae7a25122b4c9cfb7b6da0885ad33a7f141dec8df17c44747d924fac75,2024-05-29T13:02:09.280000
CVE-2024-5436,0,0,1f0ff22e526bae999a5752534900397469f10984712d6e1a281251b3244c7ffe,2024-05-31T13:01:46.727000
@ -256691,7 +256709,7 @@ CVE-2024-6025,0,0,2653befc93f455636e57cde83404a5ff884ae434fc80abd19f04944c84a702
CVE-2024-6026,0,0,2970248e3866f379267d0cae7e3b9bb934f39b25cb3198f3dfbaa23423c08ff9,2024-07-12T16:55:44.240000
CVE-2024-6027,0,0,d36139a3f6402ad17d96a83c3d61f6ce213e515812c77112f328495c0bcd9928,2024-06-24T19:17:50.240000
CVE-2024-6028,0,0,a068f17d13f3176b06fe0181735235198b8a42900e26e5af12021baf09b50c20,2024-06-25T12:24:17.873000
CVE-2024-6035,0,0,72b6aef12b103538a1673f781cff4e8e69794a7b8cc177c56631d30ef145bd70,2024-07-12T18:49:07.067000
CVE-2024-6035,0,1,71705709079183c78c8ed383ff1dde0d9a61df1fcd0014b5485dcff6ce00c8bd,2024-07-15T18:15:05.840000
CVE-2024-6036,0,0,ec75d3b088377f3e157bda1807d973db13644b79a58ce7816702ab31b3d039ce,2024-07-11T13:05:54.930000
CVE-2024-6037,0,0,6693b31ec7c6312863697d20bd04a1bdff52b0f0104cd13eb0277621b822579c,2024-07-11T13:05:54.930000
CVE-2024-6038,0,0,4807c09415696120707d8114a37a205bc4f3b855697eebb2268af32cdef6d3c9,2024-06-27T19:25:12.067000
@ -257023,8 +257041,8 @@ CVE-2024-6679,0,0,193698b3a519c2de1af0fd23f7e404e2d54c730e4704d97d0092b63ef1c812
CVE-2024-6680,0,0,131299d0989a76f846afb0c8ae15f4692f1a0fdd9931fad30c165660cd1232fc,2024-07-11T18:09:58.777000
CVE-2024-6681,0,0,fd87484dafd740c0f788720b14149eb40f6b6d8ce371416d0e039ce9acf82071,2024-07-11T18:09:58.777000
CVE-2024-6689,0,0,ec7131b60c617e40df7d8cd950219c4e232d1b7354523cf28a3e92438a8ddde2,2024-07-15T14:15:03.640000
CVE-2024-6716,0,0,797c9ef3fcf086496b4d0cebe79397ae66fd082966b8503c8a462e84ae03c75f,2024-07-15T15:15:10.900000
CVE-2024-6721,0,1,20bc3ac9fd25b0ef666ff8f606cfc8f742981337efa5a16bd2cfa701fac87a51,2024-07-15T16:15:03.467000
CVE-2024-6716,0,1,e3306c105d7fd24ec7a1939e295c57fdf07bdb80aad35408cde8763b9316c0be,2024-07-15T18:15:06.107000
CVE-2024-6721,0,0,20bc3ac9fd25b0ef666ff8f606cfc8f742981337efa5a16bd2cfa701fac87a51,2024-07-15T16:15:03.467000
CVE-2024-6728,0,0,9abe0a9570ded71226f4ac9c9c5189516c258bbe0afa1c3fa1605041ef7aae25,2024-07-15T13:00:34.853000
CVE-2024-6729,0,0,1a9a5aa4be1b6eedd35b675a6eb0b49764f594d7ab81dc654f200200596f44a5,2024-07-15T13:00:34.853000
CVE-2024-6730,0,0,ef30d2eb7f24b640da190afcbc16e385d73ab8dd33302ee9e560c4fd64a066a0,2024-07-15T13:00:34.853000

Can't render this file because it is too large.