mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-05-07 11:07:05 +00:00
Auto-Update: 2024-07-15T20:00:18.531240+00:00
This commit is contained in:
parent
02fe50969a
commit
0d07fece20
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-6966",
|
||||
"sourceIdentifier": "security@wordfence.com",
|
||||
"published": "2024-06-06T02:15:52.607",
|
||||
"lastModified": "2024-06-06T14:17:35.017",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-07-15T18:55:57.513",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -39,14 +39,50 @@
|
||||
}
|
||||
]
|
||||
},
|
||||
"references": [
|
||||
"weaknesses": [
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/browser/the-moneytizer/trunk/core/core_ajax.php",
|
||||
"source": "security@wordfence.com"
|
||||
},
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/71823e36-3899-4253-a1d2-c6f8921d18dc?source=cve",
|
||||
"source": "security@wordfence.com"
|
||||
"lang": "en",
|
||||
"value": "CWE-862"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:themoneytizer:the_moneytizer:*:*:*:*:*:wordpress:*:*",
|
||||
"versionEndExcluding": "10.0.1",
|
||||
"matchCriteriaId": "80061CEE-BA8D-4D0D-9105-80A52D957F76"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/browser/the-moneytizer/trunk/core/core_ajax.php",
|
||||
"source": "security@wordfence.com",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/71823e36-3899-4253-a1d2-c6f8921d18dc?source=cve",
|
||||
"source": "security@wordfence.com",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
56
CVE-2024/CVE-2024-272xx/CVE-2024-27238.json
Normal file
56
CVE-2024/CVE-2024-272xx/CVE-2024-27238.json
Normal file
@ -0,0 +1,56 @@
|
||||
{
|
||||
"id": "CVE-2024-27238",
|
||||
"sourceIdentifier": "security@zoom.us",
|
||||
"published": "2024-07-15T18:15:03.633",
|
||||
"lastModified": "2024-07-15T18:15:03.633",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Race condition in the installer for some Zoom Apps and SDKs for Windows before version 6.0.0 may allow an authenticated user to conduct a privilege escalation via local access."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security@zoom.us",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 7.1,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 5.2
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security@zoom.us",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-367"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.zoom.com/en/trust/security-bulletin/zsb-24021",
|
||||
"source": "security@zoom.us"
|
||||
}
|
||||
]
|
||||
}
|
56
CVE-2024/CVE-2024-272xx/CVE-2024-27240.json
Normal file
56
CVE-2024/CVE-2024-272xx/CVE-2024-27240.json
Normal file
@ -0,0 +1,56 @@
|
||||
{
|
||||
"id": "CVE-2024-27240",
|
||||
"sourceIdentifier": "security@zoom.us",
|
||||
"published": "2024-07-15T18:15:03.873",
|
||||
"lastModified": "2024-07-15T18:15:03.873",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Improper input validation in the installer for some Zoom Apps for Windows may allow an authenticated user to conduct a privilege escalation via local access."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security@zoom.us",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 7.1,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 5.2
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security@zoom.us",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-20"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.zoom.com/en/trust/security-bulletin/zsb-24019",
|
||||
"source": "security@zoom.us"
|
||||
}
|
||||
]
|
||||
}
|
56
CVE-2024/CVE-2024-272xx/CVE-2024-27241.json
Normal file
56
CVE-2024/CVE-2024-272xx/CVE-2024-27241.json
Normal file
@ -0,0 +1,56 @@
|
||||
{
|
||||
"id": "CVE-2024-27241",
|
||||
"sourceIdentifier": "security@zoom.us",
|
||||
"published": "2024-07-15T18:15:04.087",
|
||||
"lastModified": "2024-07-15T18:15:04.087",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Improper input validation in some Zoom Apps and SDKs may allow an authenticated user to conduct a denial of service via network access."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security@zoom.us",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "LOW",
|
||||
"baseScore": 5.3,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 1.4
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security@zoom.us",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-20"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.zoom.com/en/trust/security-bulletin/zsb-24020",
|
||||
"source": "security@zoom.us"
|
||||
}
|
||||
]
|
||||
}
|
21
CVE-2024/CVE-2024-319xx/CVE-2024-31946.json
Normal file
21
CVE-2024/CVE-2024-319xx/CVE-2024-31946.json
Normal file
@ -0,0 +1,21 @@
|
||||
{
|
||||
"id": "CVE-2024-31946",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-07-15T19:15:02.503",
|
||||
"lastModified": "2024-07-15T19:15:02.503",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "An issue was discovered in Stormshield Network Security (SNS) 3.7.0 through 3.7.41, 3.10.0 through 3.11.29, 4.0 through 4.3.24, and 4.4.0 through 4.7.4. A user who has access to the SNS with write access on the email alerts page has the ability to create alert email containing malicious JavaScript, executed by the template preview. The following versions fix this: 3.7.42, 3.11.30, 4.3.25, and 4.7.5."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://advisories.stormshield.eu/2024-007",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
48
CVE-2024/CVE-2024-364xx/CVE-2024-36432.json
Normal file
48
CVE-2024/CVE-2024-364xx/CVE-2024-36432.json
Normal file
@ -0,0 +1,48 @@
|
||||
{
|
||||
"id": "CVE-2024-36432",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-07-15T19:15:02.593",
|
||||
"lastModified": "2024-07-15T19:15:02.593",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "An arbitrary memory write vulnerability was discovered in Supermicro X11DPG-HGX2, X11PDG-QT, X11PDG-OT, and X11PDG-SN motherboards with BIOS firmware before 4.4."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "cve@mitre.org",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "HIGH",
|
||||
"privilegesRequired": "HIGH",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 7.5,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 0.8,
|
||||
"impactScore": 6.0
|
||||
}
|
||||
]
|
||||
},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.supermicro.com/en/support/security_center#%21advisories",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://www.supermicro.com/zh_tw/support/security_BIOS_Jul_2024",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
48
CVE-2024/CVE-2024-364xx/CVE-2024-36433.json
Normal file
48
CVE-2024/CVE-2024-364xx/CVE-2024-36433.json
Normal file
@ -0,0 +1,48 @@
|
||||
{
|
||||
"id": "CVE-2024-36433",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-07-15T19:15:02.837",
|
||||
"lastModified": "2024-07-15T19:15:02.837",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "An arbitrary memory write vulnerability was discovered in Supermicro X11DPH-T, X11DPH-Tq, and X11DPH-i motherboards with BIOS firmware before 4.4."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "cve@mitre.org",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "HIGH",
|
||||
"privilegesRequired": "HIGH",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 7.5,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 0.8,
|
||||
"impactScore": 6.0
|
||||
}
|
||||
]
|
||||
},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.supermicro.com/en/support/security_BIOS_Jul_2024",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://www.supermicro.com/en/support/security_center#%21advisories",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
48
CVE-2024/CVE-2024-364xx/CVE-2024-36434.json
Normal file
48
CVE-2024/CVE-2024-364xx/CVE-2024-36434.json
Normal file
@ -0,0 +1,48 @@
|
||||
{
|
||||
"id": "CVE-2024-36434",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-07-15T19:15:03.053",
|
||||
"lastModified": "2024-07-15T19:15:03.053",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "An SMM callout vulnerability was discovered in Supermicro X11DPH-T, X11DPH-Tq, and X11DPH-i motherboards with BIOS firmware before 4.4."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "cve@mitre.org",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "HIGH",
|
||||
"privilegesRequired": "HIGH",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 7.5,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 0.8,
|
||||
"impactScore": 6.0
|
||||
}
|
||||
]
|
||||
},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.supermicro.com/en/support/security_BIOS_Jul_2024",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://www.supermicro.com/en/support/security_center#%21advisories",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
25
CVE-2024/CVE-2024-364xx/CVE-2024-36438.json
Normal file
25
CVE-2024/CVE-2024-364xx/CVE-2024-36438.json
Normal file
@ -0,0 +1,25 @@
|
||||
{
|
||||
"id": "CVE-2024-36438",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-07-15T19:15:03.320",
|
||||
"lastModified": "2024-07-15T19:15:03.320",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "eLinkSmart Hidden Smart Cabinet Lock 2024-05-22 has Incorrect Access Control and fails to perform an authorization check which can lead to card duplication and other attacks."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2024-044.txt",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://www.syss.de/pentest-blog/",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
25
CVE-2024/CVE-2024-370xx/CVE-2024-37016.json
Normal file
25
CVE-2024/CVE-2024-370xx/CVE-2024-37016.json
Normal file
@ -0,0 +1,25 @@
|
||||
{
|
||||
"id": "CVE-2024-37016",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-07-15T18:15:04.337",
|
||||
"lastModified": "2024-07-15T18:15:04.337",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Mengshen Wireless Door Alarm M70 2024-05-24 allows Authentication Bypass via a Capture-Replay approach."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2024-045.txt",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://www.syss.de/pentest-blog/",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
21
CVE-2024/CVE-2024-373xx/CVE-2024-37386.json
Normal file
21
CVE-2024/CVE-2024-373xx/CVE-2024-37386.json
Normal file
@ -0,0 +1,21 @@
|
||||
{
|
||||
"id": "CVE-2024-37386",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-07-15T19:15:03.430",
|
||||
"lastModified": "2024-07-15T19:15:03.430",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "An issue was discovered in Stormshield Network Security (SNS) 4.0.0 through 4.3.25, 4.4.0 through 4.7.5, and 4.8.0. Certain manipulations allow restarting in single-user mode despite the activation of secure boot. The following versions fix this: 4.3.27, 4.7.6, and 4.8.1."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://advisories.stormshield.eu/2024-017",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-38433",
|
||||
"sourceIdentifier": "cna@cyber.gov.il",
|
||||
"published": "2024-07-11T08:15:10.623",
|
||||
"lastModified": "2024-07-11T13:05:54.930",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2024-07-15T18:26:30.693",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -17,6 +17,26 @@
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "HIGH",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 6.7,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 0.8,
|
||||
"impactScore": 5.9
|
||||
},
|
||||
{
|
||||
"source": "cna@cyber.gov.il",
|
||||
"type": "Secondary",
|
||||
@ -41,8 +61,18 @@
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "cna@cyber.gov.il",
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-287"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "cna@cyber.gov.il",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -51,10 +81,127 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
"configurations": [
|
||||
{
|
||||
"url": "https://www.gov.il/en/Departments/faq/cve_advisories",
|
||||
"source": "cna@cyber.gov.il"
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:nuvoton:npcm750r_firmware:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "10.10.19",
|
||||
"matchCriteriaId": "D59B4482-20BA-49E5-AF90-2A4E47E2E960"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:nuvoton:npcm750r:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "52605376-B227-4E94-A652-5209DE575E48"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:nuvoton:npcm710r_firmware:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "10.10.19",
|
||||
"matchCriteriaId": "935BB578-5585-4272-9285-6EFA358E3B4B"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:nuvoton:npcm710r:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "F907249A-2671-4301-89BC-44E2303C2C6B"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:nuvoton:npcm730r_firmware:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "10.10.19",
|
||||
"matchCriteriaId": "F08B3B70-F6A9-4B12-9499-92BA3F010367"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:nuvoton:npcm730r:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "C5804365-723A-46E4-BB3C-84ACBD2B1EF0"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:nuvoton:npcm705r_firmware:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "10.10.19",
|
||||
"matchCriteriaId": "596757E5-A4B2-4F9F-9FE6-DFA5508A62F2"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:nuvoton:npcm705r:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "2C504A29-378C-499A-9F9F-7184FBC96B0E"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.gov.il/en/Departments/faq/cve_advisories",
|
||||
"source": "cna@cyber.gov.il",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
56
CVE-2024/CVE-2024-398xx/CVE-2024-39819.json
Normal file
56
CVE-2024/CVE-2024-398xx/CVE-2024-39819.json
Normal file
@ -0,0 +1,56 @@
|
||||
{
|
||||
"id": "CVE-2024-39819",
|
||||
"sourceIdentifier": "security@zoom.us",
|
||||
"published": "2024-07-15T18:15:04.407",
|
||||
"lastModified": "2024-07-15T18:15:04.407",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Improper privilege management in the installer for some Zoom Workplace Apps and SDKs for Windows may allow an authenticated user to conduct a privilege escalation via local access."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security@zoom.us",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "HIGH",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 6.7,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 0.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security@zoom.us",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-269"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.zoom.com/en/trust/security-bulletin/zsb-24026",
|
||||
"source": "security@zoom.us"
|
||||
}
|
||||
]
|
||||
}
|
56
CVE-2024/CVE-2024-398xx/CVE-2024-39820.json
Normal file
56
CVE-2024/CVE-2024-398xx/CVE-2024-39820.json
Normal file
@ -0,0 +1,56 @@
|
||||
{
|
||||
"id": "CVE-2024-39820",
|
||||
"sourceIdentifier": "security@zoom.us",
|
||||
"published": "2024-07-15T18:15:04.620",
|
||||
"lastModified": "2024-07-15T18:15:04.620",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Uncontrolled search path element in the installer for Zoom Workplace Desktop App for macOS before version 6.0.10 may allow an authenticated user to conduct a denial of service via local access."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security@zoom.us",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:H/A:H",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 6.6,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 1.3,
|
||||
"impactScore": 5.2
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security@zoom.us",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-427"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.zoom.com/en/trust/security-bulletin/zsb-24027",
|
||||
"source": "security@zoom.us"
|
||||
}
|
||||
]
|
||||
}
|
56
CVE-2024/CVE-2024-398xx/CVE-2024-39821.json
Normal file
56
CVE-2024/CVE-2024-398xx/CVE-2024-39821.json
Normal file
@ -0,0 +1,56 @@
|
||||
{
|
||||
"id": "CVE-2024-39821",
|
||||
"sourceIdentifier": "security@zoom.us",
|
||||
"published": "2024-07-15T18:15:04.827",
|
||||
"lastModified": "2024-07-15T18:15:04.827",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Race condition in the installer for Zoom Workplace App for Windows and Zoom Rooms App for Windows may allow an authenticated user to conduct a denial of service via local access."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security@zoom.us",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:H/A:H",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 6.6,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 1.3,
|
||||
"impactScore": 5.2
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security@zoom.us",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-367"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.zoom.com/en/trust/security-bulletin/zsb-24028",
|
||||
"source": "security@zoom.us"
|
||||
}
|
||||
]
|
||||
}
|
56
CVE-2024/CVE-2024-398xx/CVE-2024-39826.json
Normal file
56
CVE-2024/CVE-2024-398xx/CVE-2024-39826.json
Normal file
@ -0,0 +1,56 @@
|
||||
{
|
||||
"id": "CVE-2024-39826",
|
||||
"sourceIdentifier": "security@zoom.us",
|
||||
"published": "2024-07-15T18:15:05.033",
|
||||
"lastModified": "2024-07-15T18:15:05.033",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Path traversal in Team Chat for some Zoom Workplace Apps and SDKs for Windows may allow an authenticated user to conduct information disclosure via network access."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security@zoom.us",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:N/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 6.8,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.3,
|
||||
"impactScore": 4.0
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security@zoom.us",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-367"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.zoom.com/en/trust/security-bulletin/zsb-24023",
|
||||
"source": "security@zoom.us"
|
||||
}
|
||||
]
|
||||
}
|
56
CVE-2024/CVE-2024-398xx/CVE-2024-39827.json
Normal file
56
CVE-2024/CVE-2024-398xx/CVE-2024-39827.json
Normal file
@ -0,0 +1,56 @@
|
||||
{
|
||||
"id": "CVE-2024-39827",
|
||||
"sourceIdentifier": "security@zoom.us",
|
||||
"published": "2024-07-15T18:15:05.237",
|
||||
"lastModified": "2024-07-15T18:15:05.237",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Improper input validation in the installer for Zoom Workplace Desktop App for Windows before version 6.0.10 may allow an authenticated user to conduct a denial of service via local access."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security@zoom.us",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 5.5,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security@zoom.us",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-20"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.zoom.com/en/trust/security-bulletin/zsb-24024",
|
||||
"source": "security@zoom.us"
|
||||
}
|
||||
]
|
||||
}
|
21
CVE-2024/CVE-2024-404xx/CVE-2024-40415.json
Normal file
21
CVE-2024/CVE-2024-404xx/CVE-2024-40415.json
Normal file
@ -0,0 +1,21 @@
|
||||
{
|
||||
"id": "CVE-2024-40415",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-07-15T18:15:05.490",
|
||||
"lastModified": "2024-07-15T18:15:05.490",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A vulnerability in /goform/SetStaticRouteCfg in the sub_519F4 function in Tenda AX1806 1.0.0.1 firmware leads to stack-based buffer overflow."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/Feng-ZZ-pwn/IOT/blob/main/Tenda%20AX_1806/4/SetStaticRouteCfg.md",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
21
CVE-2024/CVE-2024-404xx/CVE-2024-40416.json
Normal file
21
CVE-2024/CVE-2024-404xx/CVE-2024-40416.json
Normal file
@ -0,0 +1,21 @@
|
||||
{
|
||||
"id": "CVE-2024-40416",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-07-15T18:15:05.543",
|
||||
"lastModified": "2024-07-15T18:15:05.543",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A vulnerability in /goform/SetVirtualServerCfg in the sub_6320C function in Tenda AX1806 1.0.0.1 firmware leads to stack-based buffer overflow."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/Feng-ZZ-pwn/IOT/blob/main/Tenda%20AX_1806/3/SetVirtualServerCfg.md",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
64
CVE-2024/CVE-2024-406xx/CVE-2024-40631.json
Normal file
64
CVE-2024/CVE-2024-406xx/CVE-2024-40631.json
Normal file
@ -0,0 +1,64 @@
|
||||
{
|
||||
"id": "CVE-2024-40631",
|
||||
"sourceIdentifier": "security-advisories@github.com",
|
||||
"published": "2024-07-15T19:15:03.700",
|
||||
"lastModified": "2024-07-15T19:15:03.700",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Plate media is an open source, rich-text editor for React. Editors that use `MediaEmbedElement` and pass custom `urlParsers` to the `useMediaState` hook may be vulnerable to XSS if a custom parser allows `javascript:`, `data:` or `vbscript:` URLs to be embedded. Editors that do not use `urlParsers` and consume the `url` property directly may also be vulnerable if the URL is not sanitised. The default parsers `parseTwitterUrl` and `parseVideoUrl` are not affected. `@udecode/plate-media` 36.0.10 resolves this issue by only allowing HTTP and HTTPS URLs during parsing. This affects only the `embed` property returned from `useMediaState`. In addition, the `url` property returned from `useMediaState` has been renamed to `unsafeUrl` to indicate that it has not been sanitised. The `url` property on `element` is also unsafe, but has not been renamed. If you're using either of these properties directly, you will still need to validate the URL yourself. Users are advised to upgrade. Users unable to upgrade should ensure that any custom `urlParsers` do not allow `javascript:`, `data:` or `vbscript:` URLs to be returned in the `url` property of their return values. If `url` is consumed directly, validate the URL protocol before passing it to the `iframe` element.\n\n"
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 8.1,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 5.2
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/udecode/plate/commit/1bc0971774fbfb770780c9bdb94746a6f0f196a0",
|
||||
"source": "security-advisories@github.com"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/udecode/plate/security/advisories/GHSA-h3pq-667x-r789",
|
||||
"source": "security-advisories@github.com"
|
||||
},
|
||||
{
|
||||
"url": "https://stackoverflow.com/a/43467144",
|
||||
"source": "security-advisories@github.com"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-6035",
|
||||
"sourceIdentifier": "security@huntr.dev",
|
||||
"published": "2024-07-11T11:15:09.920",
|
||||
"lastModified": "2024-07-12T18:49:07.067",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2024-07-15T18:15:05.840",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -44,20 +44,20 @@
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.0",
|
||||
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:N",
|
||||
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:N/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 9.3,
|
||||
"baseSeverity": "CRITICAL"
|
||||
"baseScore": 7.4,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 5.8
|
||||
"impactScore": 4.0
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-6716",
|
||||
"sourceIdentifier": "secalert@redhat.com",
|
||||
"published": "2024-07-15T15:15:10.900",
|
||||
"lastModified": "2024-07-15T15:15:10.900",
|
||||
"lastModified": "2024-07-15T18:15:06.107",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -55,6 +55,10 @@
|
||||
{
|
||||
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2297636",
|
||||
"source": "secalert@redhat.com"
|
||||
},
|
||||
{
|
||||
"url": "https://gitlab.com/libtiff/libtiff/-/issues/620",
|
||||
"source": "secalert@redhat.com"
|
||||
}
|
||||
]
|
||||
}
|
56
README.md
56
README.md
@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours.
|
||||
### Last Repository Update
|
||||
|
||||
```plain
|
||||
2024-07-15T18:00:18.973254+00:00
|
||||
2024-07-15T20:00:18.531240+00:00
|
||||
```
|
||||
|
||||
### Most recent CVE Modification Timestamp synchronized with NVD
|
||||
|
||||
```plain
|
||||
2024-07-15T17:37:09.007000+00:00
|
||||
2024-07-15T19:15:03.700000+00:00
|
||||
```
|
||||
|
||||
### Last Data Feed Release
|
||||
@ -33,43 +33,41 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
|
||||
### Total Number of included CVEs
|
||||
|
||||
```plain
|
||||
257045
|
||||
257063
|
||||
```
|
||||
|
||||
### CVEs added in the last Commit
|
||||
|
||||
Recently added CVEs: `5`
|
||||
Recently added CVEs: `18`
|
||||
|
||||
- [CVE-2024-40414](CVE-2024/CVE-2024-404xx/CVE-2024-40414.json) (`2024-07-15T17:15:02.783`)
|
||||
- [CVE-2024-40553](CVE-2024/CVE-2024-405xx/CVE-2024-40553.json) (`2024-07-15T16:15:03.147`)
|
||||
- [CVE-2024-40554](CVE-2024/CVE-2024-405xx/CVE-2024-40554.json) (`2024-07-15T16:15:03.223`)
|
||||
- [CVE-2024-40555](CVE-2024/CVE-2024-405xx/CVE-2024-40555.json) (`2024-07-15T16:15:03.283`)
|
||||
- [CVE-2024-40560](CVE-2024/CVE-2024-405xx/CVE-2024-40560.json) (`2024-07-15T16:15:03.347`)
|
||||
- [CVE-2024-27238](CVE-2024/CVE-2024-272xx/CVE-2024-27238.json) (`2024-07-15T18:15:03.633`)
|
||||
- [CVE-2024-27240](CVE-2024/CVE-2024-272xx/CVE-2024-27240.json) (`2024-07-15T18:15:03.873`)
|
||||
- [CVE-2024-27241](CVE-2024/CVE-2024-272xx/CVE-2024-27241.json) (`2024-07-15T18:15:04.087`)
|
||||
- [CVE-2024-31946](CVE-2024/CVE-2024-319xx/CVE-2024-31946.json) (`2024-07-15T19:15:02.503`)
|
||||
- [CVE-2024-36432](CVE-2024/CVE-2024-364xx/CVE-2024-36432.json) (`2024-07-15T19:15:02.593`)
|
||||
- [CVE-2024-36433](CVE-2024/CVE-2024-364xx/CVE-2024-36433.json) (`2024-07-15T19:15:02.837`)
|
||||
- [CVE-2024-36434](CVE-2024/CVE-2024-364xx/CVE-2024-36434.json) (`2024-07-15T19:15:03.053`)
|
||||
- [CVE-2024-36438](CVE-2024/CVE-2024-364xx/CVE-2024-36438.json) (`2024-07-15T19:15:03.320`)
|
||||
- [CVE-2024-37016](CVE-2024/CVE-2024-370xx/CVE-2024-37016.json) (`2024-07-15T18:15:04.337`)
|
||||
- [CVE-2024-37386](CVE-2024/CVE-2024-373xx/CVE-2024-37386.json) (`2024-07-15T19:15:03.430`)
|
||||
- [CVE-2024-39819](CVE-2024/CVE-2024-398xx/CVE-2024-39819.json) (`2024-07-15T18:15:04.407`)
|
||||
- [CVE-2024-39820](CVE-2024/CVE-2024-398xx/CVE-2024-39820.json) (`2024-07-15T18:15:04.620`)
|
||||
- [CVE-2024-39821](CVE-2024/CVE-2024-398xx/CVE-2024-39821.json) (`2024-07-15T18:15:04.827`)
|
||||
- [CVE-2024-39826](CVE-2024/CVE-2024-398xx/CVE-2024-39826.json) (`2024-07-15T18:15:05.033`)
|
||||
- [CVE-2024-39827](CVE-2024/CVE-2024-398xx/CVE-2024-39827.json) (`2024-07-15T18:15:05.237`)
|
||||
- [CVE-2024-40415](CVE-2024/CVE-2024-404xx/CVE-2024-40415.json) (`2024-07-15T18:15:05.490`)
|
||||
- [CVE-2024-40416](CVE-2024/CVE-2024-404xx/CVE-2024-40416.json) (`2024-07-15T18:15:05.543`)
|
||||
- [CVE-2024-40631](CVE-2024/CVE-2024-406xx/CVE-2024-40631.json) (`2024-07-15T19:15:03.700`)
|
||||
|
||||
|
||||
### CVEs modified in the last Commit
|
||||
|
||||
Recently modified CVEs: `19`
|
||||
Recently modified CVEs: `4`
|
||||
|
||||
- [CVE-2023-3204](CVE-2023/CVE-2023-32xx/CVE-2023-3204.json) (`2024-07-15T16:46:09.057`)
|
||||
- [CVE-2024-30278](CVE-2024/CVE-2024-302xx/CVE-2024-30278.json) (`2024-07-15T16:15:37.093`)
|
||||
- [CVE-2024-30299](CVE-2024/CVE-2024-302xx/CVE-2024-30299.json) (`2024-07-15T17:37:09.007`)
|
||||
- [CVE-2024-30300](CVE-2024/CVE-2024-303xx/CVE-2024-30300.json) (`2024-07-15T17:37:06.847`)
|
||||
- [CVE-2024-3073](CVE-2024/CVE-2024-30xx/CVE-2024-3073.json) (`2024-07-15T17:31:24.570`)
|
||||
- [CVE-2024-3561](CVE-2024/CVE-2024-35xx/CVE-2024-3561.json) (`2024-07-15T16:45:18.173`)
|
||||
- [CVE-2024-3562](CVE-2024/CVE-2024-35xx/CVE-2024-3562.json) (`2024-07-15T16:49:47.490`)
|
||||
- [CVE-2024-3597](CVE-2024/CVE-2024-35xx/CVE-2024-3597.json) (`2024-07-15T16:51:05.940`)
|
||||
- [CVE-2024-3602](CVE-2024/CVE-2024-36xx/CVE-2024-3602.json) (`2024-07-15T16:50:36.190`)
|
||||
- [CVE-2024-3605](CVE-2024/CVE-2024-36xx/CVE-2024-3605.json) (`2024-07-15T17:12:36.967`)
|
||||
- [CVE-2024-3627](CVE-2024/CVE-2024-36xx/CVE-2024-3627.json) (`2024-07-15T17:12:17.763`)
|
||||
- [CVE-2024-37803](CVE-2024/CVE-2024-378xx/CVE-2024-37803.json) (`2024-07-15T16:46:21.273`)
|
||||
- [CVE-2024-40412](CVE-2024/CVE-2024-404xx/CVE-2024-40412.json) (`2024-07-15T17:15:02.723`)
|
||||
- [CVE-2024-4176](CVE-2024/CVE-2024-41xx/CVE-2024-4176.json) (`2024-07-15T16:43:04.163`)
|
||||
- [CVE-2024-4371](CVE-2024/CVE-2024-43xx/CVE-2024-4371.json) (`2024-07-15T16:42:39.107`)
|
||||
- [CVE-2024-4626](CVE-2024/CVE-2024-46xx/CVE-2024-4626.json) (`2024-07-15T17:10:52.563`)
|
||||
- [CVE-2024-4742](CVE-2024/CVE-2024-47xx/CVE-2024-4742.json) (`2024-07-15T17:10:34.403`)
|
||||
- [CVE-2024-5432](CVE-2024/CVE-2024-54xx/CVE-2024-5432.json) (`2024-07-15T16:53:35.600`)
|
||||
- [CVE-2024-6721](CVE-2024/CVE-2024-67xx/CVE-2024-6721.json) (`2024-07-15T16:15:03.467`)
|
||||
- [CVE-2023-6966](CVE-2023/CVE-2023-69xx/CVE-2023-6966.json) (`2024-07-15T18:55:57.513`)
|
||||
- [CVE-2024-38433](CVE-2024/CVE-2024-384xx/CVE-2024-38433.json) (`2024-07-15T18:26:30.693`)
|
||||
- [CVE-2024-6035](CVE-2024/CVE-2024-60xx/CVE-2024-6035.json) (`2024-07-15T18:15:05.840`)
|
||||
- [CVE-2024-6716](CVE-2024/CVE-2024-67xx/CVE-2024-6716.json) (`2024-07-15T18:15:06.107`)
|
||||
|
||||
|
||||
## Download and Usage
|
||||
|
74
_state.csv
74
_state.csv
@ -223722,7 +223722,7 @@ CVE-2023-32035,0,0,b6b3376a399e2f18ad0d237c44a7b487a2be739a6756dc716ee136aedc7f6
|
||||
CVE-2023-32037,0,0,e6fbf656596b0f12e8a816d2fe3bb7f8172423cd51fc1dcef0179303935b19e0,2024-05-29T03:15:40.027000
|
||||
CVE-2023-32038,0,0,5f30b4088982dd039555017eaf1b23d675891ea4a9027ce83009d91020a6f522,2024-05-29T03:15:40.210000
|
||||
CVE-2023-32039,0,0,332044a322083261920224f8561b7ce85fb9667002581b0794eb5836ca3383b5,2024-05-29T03:15:40.413000
|
||||
CVE-2023-3204,0,1,8cd0009773c1a45c783ea81dffe8ff200cde4afc0a022752c71de700c5ab0b9a,2024-07-15T16:46:09.057000
|
||||
CVE-2023-3204,0,0,8cd0009773c1a45c783ea81dffe8ff200cde4afc0a022752c71de700c5ab0b9a,2024-07-15T16:46:09.057000
|
||||
CVE-2023-32040,0,0,f966fb2cd44d93d5d40086bb2c7587bff9964f18dd5da7188a4b6e3b65982d89,2024-05-29T03:15:40.580000
|
||||
CVE-2023-32041,0,0,064ebf8cb18c8d2bb906d6b21f2c079e074488207e7b90d11ce25ae0d5eda28d,2024-05-29T03:15:40.770000
|
||||
CVE-2023-32042,0,0,299c72ce4b35604d96a5e619fa292e348d07b9ed8f1d93782e38a7ecf2e70305,2024-05-29T03:15:41.073000
|
||||
@ -240444,7 +240444,7 @@ CVE-2023-6962,0,0,986479cdf0104030985cc73b8c5cd922aed26e09aac7f4f0ca21a4d53b3d66
|
||||
CVE-2023-6963,0,0,5d78e338c4f8af8931aea1f2dde5afb8bbdfc8f31ec8fab4d6db3d80bfcdecf2,2024-02-14T17:05:16.533000
|
||||
CVE-2023-6964,0,0,6b353abfee4e0f60ba07ed53b519d8cdcc5c6e3e583c876cd6af699df966c5a5,2024-04-10T13:24:00.070000
|
||||
CVE-2023-6965,0,0,f49ac78940fe244c72647e51516e80a6e573f5fa400fc7065d825c4c692cabcd,2024-04-10T13:24:00.070000
|
||||
CVE-2023-6966,0,0,eee17306b1d6ecf0ac8d17fe9db7245fd618122fd910b73bf69d1270bf7f9f8e,2024-06-06T14:17:35.017000
|
||||
CVE-2023-6966,0,1,9a012b06da86b8f395f403fc3c8f5013317bd371eadeddb21759c85700f73992,2024-07-15T18:55:57.513000
|
||||
CVE-2023-6967,0,0,7fa49a7c16574cbfe3664c75658ac16ae96710a4d17734528b42e15e81f0ce19,2024-04-10T13:24:00.070000
|
||||
CVE-2023-6968,0,0,a4751c3d52b515d1d942809757ebd5c330a2b3fb28572a1d55882f3452313b5b,2024-06-06T14:17:35.017000
|
||||
CVE-2023-6969,0,0,28305747d8b707ea006f2410a4d39a2af33e21a9599b2601ee1414912a46183e,2024-03-13T18:16:18.563000
|
||||
@ -247312,7 +247312,10 @@ CVE-2024-27234,0,0,7f9c430bb757ad526adb7918516acd55f167ec46b27604bd9833832e0b615
|
||||
CVE-2024-27235,0,0,ca7df1b3186edf63083ffa451556ee8cef5481ef83fd54ad47ed09114ed183d0,2024-03-15T20:15:09.253000
|
||||
CVE-2024-27236,0,0,87315156a485dcd5ca2e4a3368db0027f412517fa717d3f5ab5df1cc6bb866c2,2024-03-12T12:40:13.500000
|
||||
CVE-2024-27237,0,0,229917a4428117370a5145466e677b0c72a40fdcb37122ac8c08e36ef5d19033,2024-03-12T12:40:13.500000
|
||||
CVE-2024-27238,1,1,462fc8e1860e98147c320e26d17ba5fee5ca1a60367d56c5f1c4f7059819041b,2024-07-15T18:15:03.633000
|
||||
CVE-2024-2724,0,0,660610afdb28f5976ed634f2a472d2022e02ebb5bc503c73eac1e0b96d741829,2024-03-22T15:34:43.663000
|
||||
CVE-2024-27240,1,1,58daf2f38d2758083d41f48f956c68649d1d8c824a7b219db5babb7ed75e0346,2024-07-15T18:15:03.873000
|
||||
CVE-2024-27241,1,1,9e0fff38b263ebe0899e33f34b14266c4594aab0a80e4165f430f66221530bad,2024-07-15T18:15:04.087000
|
||||
CVE-2024-27242,0,0,aa3d00d8440b9711083704a859c18c29ae2a7d4e0687131a6877ff32cc440bb5,2024-04-10T13:24:00.070000
|
||||
CVE-2024-27243,0,0,7506fdb7727ab984462fc64398555eb3450f805c7f6a3944e9822e85e93cca4e,2024-05-16T13:03:05.353000
|
||||
CVE-2024-27244,0,0,481637fe3fc7930848fab67c20215a504ece49e65656eb0a28bda5cc7f4c687a,2024-05-16T13:03:05.353000
|
||||
@ -249281,7 +249284,7 @@ CVE-2024-30273,0,0,6b1d238c9e12ea2ba8fc60efb1a6f102260f96c472f5f331b760d3af4a0ce
|
||||
CVE-2024-30274,0,0,e625b227f4c1edcd8894c6840804c74e62ead535c97f2e8fc44830cae7c48db1,2024-05-16T13:03:05.353000
|
||||
CVE-2024-30275,0,0,1e933441e483f4fad62bd9e8a6a258edd1aaca4d5bb09d395e2677a6a5bd3120,2024-05-16T13:03:05.353000
|
||||
CVE-2024-30276,0,0,0bd4be9c7f10ca7d4fd2dfa1716549a7092cbd7f9a2adabf7913546d4cdfeadd,2024-07-09T15:50:56.480000
|
||||
CVE-2024-30278,0,1,61f4d7e9a9587a3224ab5f7ebbd333eb1034f085c631558b85be2564db298806,2024-07-15T16:15:37.093000
|
||||
CVE-2024-30278,0,0,61f4d7e9a9587a3224ab5f7ebbd333eb1034f085c631558b85be2564db298806,2024-07-15T16:15:37.093000
|
||||
CVE-2024-30279,0,0,e8959302b2a7f4b2f979d5a292d479144519886e3c4ec1eda991b8640940de58,2024-05-24T01:15:30.977000
|
||||
CVE-2024-3028,0,0,9e4bef210fc19099d68fdbe2ca58f9c70793f50703ba240559787e18524fd766,2024-04-16T13:24:07.103000
|
||||
CVE-2024-30280,0,0,7232cea83e4b5e67f9a2b634eb562bbb13f45b745f6ead8e9f7f82040938f49a,2024-05-24T01:15:30.977000
|
||||
@ -249304,9 +249307,9 @@ CVE-2024-30295,0,0,7acbb1c4868f13b65f181cea277a794fc009caf9cee062ee7f161860d6c96
|
||||
CVE-2024-30296,0,0,be0909c296e6e8e43038b5643a1a0c28c6682fe163ca23c3edf171e922ae6f6e,2024-05-16T13:03:05.353000
|
||||
CVE-2024-30297,0,0,55a6b9a1f93e14e98892ac8ad42e4742b35b926da37b4c4e027266ed3205e993,2024-05-16T13:03:05.353000
|
||||
CVE-2024-30298,0,0,92bbe49d33f9c926bdca52a1a92f14b21413490e1bf1dd65bcaf24fbb0fe1407,2024-05-16T13:03:05.353000
|
||||
CVE-2024-30299,0,1,1654b592ab1dce50a91f0ff3960d214faa43e082d949db6429602b9ab8066e0e,2024-07-15T17:37:09.007000
|
||||
CVE-2024-30299,0,0,1654b592ab1dce50a91f0ff3960d214faa43e082d949db6429602b9ab8066e0e,2024-07-15T17:37:09.007000
|
||||
CVE-2024-3030,0,0,5eafba8e87a04804f0ee37eb44b2a0db0456e0dcfce765e75341d9edfec2815f,2024-04-04T12:48:41.700000
|
||||
CVE-2024-30300,0,1,cb30fb32a49ef545078d6cb3d0e2c9d2976845dda248b7c3086e68c50460cc41,2024-07-15T17:37:06.847000
|
||||
CVE-2024-30300,0,0,cb30fb32a49ef545078d6cb3d0e2c9d2976845dda248b7c3086e68c50460cc41,2024-07-15T17:37:06.847000
|
||||
CVE-2024-30301,0,0,9b74ed05354c1aa1aaf7222bb27897d0894fcbdf51bd0565f77bbad0338cfc5f,2024-05-03T12:50:34.250000
|
||||
CVE-2024-30302,0,0,dbae568de5b2417e966678cb186a0766d0a1270a494653512196e489399925de,2024-05-03T12:50:34.250000
|
||||
CVE-2024-30303,0,0,29beefe281b7361c70e3d46cb1e8ccb19d06aa60b2190adf964c9790227b9a7c,2024-05-03T12:50:34.250000
|
||||
@ -249684,7 +249687,7 @@ CVE-2024-30726,0,0,efb4446cd4d96112b24cdc2d4f9ffad31c723de0b805c2ec83882b225609f
|
||||
CVE-2024-30727,0,0,94492425a665761069039b2945e50fcfafedef52ebacc29c5716b28a4a0bbac3,2024-05-27T01:15:19.710000
|
||||
CVE-2024-30728,0,0,3bc4c37b3682468f392a00e20efc19006244f15206b4a691e5cf95f83eded5a0,2024-05-27T01:15:19.790000
|
||||
CVE-2024-30729,0,0,7c764f79b0cf9ef9638397b0c7f17f9af70530d76ceffd0ab159e6bf8fc29954,2024-05-27T01:15:19.870000
|
||||
CVE-2024-3073,0,1,45e6a22c22eb312115de50cc590e036ba6ec5593843fdd7bc8c65ba79b3446fa,2024-07-15T17:31:24.570000
|
||||
CVE-2024-3073,0,0,45e6a22c22eb312115de50cc590e036ba6ec5593843fdd7bc8c65ba79b3446fa,2024-07-15T17:31:24.570000
|
||||
CVE-2024-30730,0,0,d4716f28d51e81409f5051905cf4ab5726344a2915708c552fcb346edd08860e,2024-05-27T01:15:19.953000
|
||||
CVE-2024-30733,0,0,6f8110d48dd6a51bb95f34d95d1f66cca8866d7553b9830c6a166aaa001b5992,2024-05-27T01:15:20.033000
|
||||
CVE-2024-30735,0,0,753441d7803dcc475ebaf2cfa2a11fe542629a9d58de825feb7b68625b12455d,2024-05-27T01:15:20.110000
|
||||
@ -250387,6 +250390,7 @@ CVE-2024-31941,0,0,afb95f4bebc84bd64697d4f74d4565720846f17ff4a035556242f3c05ce58
|
||||
CVE-2024-31942,0,0,3d122d20f9462572618ef3940be00c9131d19d68aedd2b72ba341efc50cfe360,2024-04-15T13:15:31.997000
|
||||
CVE-2024-31943,0,0,a3c3177de375490a3bcbe7c4dc869c6dc98de8408de3c26e8167121dc5553a55,2024-04-10T19:49:51.183000
|
||||
CVE-2024-31944,0,0,9b7df1c1d68c7ba82d2a7e14fc250e4409e7410da01d69528d57b3dba1022b40,2024-04-10T19:49:51.183000
|
||||
CVE-2024-31946,1,1,7a838df436f8b1519c8cddad23e2362b3257c2383bd9af684a9638bf2e00480c,2024-07-15T19:15:02.503000
|
||||
CVE-2024-31947,0,0,53a07a96d235761473c51b6658ac88c324f970e3729e396995a521d5b07b0a35,2024-07-15T13:00:34.853000
|
||||
CVE-2024-31948,0,0,2545f6a13668ac7d71382ed97228591f14df9b7003f52f431839a3cf2cbd6d68,2024-07-03T01:55:34.387000
|
||||
CVE-2024-31949,0,0,6e39badd21c22fae949ff94d85aeafc847ebfb0900888b28cfa176432c58fd9e,2024-04-28T07:15:08.917000
|
||||
@ -252597,9 +252601,9 @@ CVE-2024-35592,0,0,72c678ca31e4ec93bf22d8a1535979b48daec0d6d17d31e168e052fbb6727
|
||||
CVE-2024-35593,0,0,5a7a9fd646183a9cfe0e8b357ffc98e8641fa2decf7b0d864f537dba3ee77a7b,2024-05-24T18:09:20.027000
|
||||
CVE-2024-35595,0,0,1c0caac8b66ea50c55b6a38567b8221cce1fb5534ed6ea6fa786e54a9487b678,2024-07-03T02:01:55.937000
|
||||
CVE-2024-3560,0,0,db76ccbf181e1e5da7ff674678a92955a50aac899b842cbcce7ee4c6ed92892a,2024-04-19T13:10:25.637000
|
||||
CVE-2024-3561,0,1,5370e9e1ff8bffbf4ad8d0059e83fd31e423cd49fc364fad03b1f8cc26f5277c,2024-07-15T16:45:18.173000
|
||||
CVE-2024-3561,0,0,5370e9e1ff8bffbf4ad8d0059e83fd31e423cd49fc364fad03b1f8cc26f5277c,2024-07-15T16:45:18.173000
|
||||
CVE-2024-35618,0,0,909b98d4f6bab57eebe322fcd0fa9e4a02c096346d6899a3aecfb54429751f2f,2024-07-03T02:01:56.717000
|
||||
CVE-2024-3562,0,1,e0decdba1b4d9f0742f62650b9f4ede7206e97be478294222e880f87c4662eac,2024-07-15T16:49:47.490000
|
||||
CVE-2024-3562,0,0,e0decdba1b4d9f0742f62650b9f4ede7206e97be478294222e880f87c4662eac,2024-07-15T16:49:47.490000
|
||||
CVE-2024-35621,0,0,685edeb645450da75895f43badb747e81d0e1f2d5ca055304f12a369effa59ec,2024-05-28T17:11:47.007000
|
||||
CVE-2024-35627,0,0,4a039665766224ab2309171105fbc890963796bdfb66945f84a5ba2663f6bfff,2024-07-03T02:01:57.493000
|
||||
CVE-2024-35628,0,0,612e797ff0e8cb8cedb262bed6040ae0abe44f1ee9b3f6c53c48f04c0f951c42,2024-06-27T13:15:58.550000
|
||||
@ -252966,7 +252970,7 @@ CVE-2024-35966,0,0,a92d4fb089889747475857cdf0af029c240ab8f6fb105e68fbd72992fec50
|
||||
CVE-2024-35967,0,0,e3e23303b3dc5d4a65fe66a5f540e6a1db2b9194c0c160b04b3c6d8794f3528f,2024-06-25T22:15:33.880000
|
||||
CVE-2024-35968,0,0,439ccc18325908cd4ef3a9bd891d3376dacc1d470b882c7bccea812445a8152e,2024-05-20T13:00:04.957000
|
||||
CVE-2024-35969,0,0,c7e6b7ae441187279ecf5e21ff7ea13c1669f067e7c32158b493f5f3f86ee309,2024-06-27T12:15:26.887000
|
||||
CVE-2024-3597,0,1,75a7819de93664529fde26d6546c7502e2875af3213925a87bf3c85f5cec0e00,2024-07-15T16:51:05.940000
|
||||
CVE-2024-3597,0,0,75a7819de93664529fde26d6546c7502e2875af3213925a87bf3c85f5cec0e00,2024-07-15T16:51:05.940000
|
||||
CVE-2024-35970,0,0,f412b0fc32058b1c3254455ca20439b7bcea99cc8d63c3a4fb8f474b7a6fa77d,2024-05-20T13:00:04.957000
|
||||
CVE-2024-35971,0,0,f6116ac7ec424eec70e9f8f9696fd8cc3c252a3be88ce23a3aea15911b12a4d8,2024-06-10T18:15:35.383000
|
||||
CVE-2024-35972,0,0,f2192d50ea420577056b9a7c4e781e3b14a7a9d14514af3e2b89df5bf9f73d9b,2024-05-23T21:04:02.433000
|
||||
@ -253021,7 +253025,7 @@ CVE-2024-36016,0,0,af6275dcadc896490bdfa8d75a24c446a65c13d4e371df7dc6e294e458cd8
|
||||
CVE-2024-36017,0,0,418307aa110a364a6cbe46a7da7e8978367fb58331214a4b84a378b5a1a0f1e8,2024-06-27T14:15:13.943000
|
||||
CVE-2024-36018,0,0,76c3ace216b452f4aa37c9643b2598864907335dde3ccb46fa666d2ecb42a8eb,2024-05-30T18:19:11.743000
|
||||
CVE-2024-36019,0,0,6822b62368d372d6fe4bd8bbf9ad5e4c841c271eb7f80877f1beeef1e2b58d2e,2024-05-30T18:19:11.743000
|
||||
CVE-2024-3602,0,1,406ce829351e213c6af7e0a3b9d0c99f237e3ef837f86ddf7e5919696f488a4b,2024-07-15T16:50:36.190000
|
||||
CVE-2024-3602,0,0,406ce829351e213c6af7e0a3b9d0c99f237e3ef837f86ddf7e5919696f488a4b,2024-07-15T16:50:36.190000
|
||||
CVE-2024-36020,0,0,38e2918ca9889dee369a741d0ef9bc41660c53e9227b9a4d7bb1cfbb3f8bc3e7,2024-06-27T12:15:27.717000
|
||||
CVE-2024-36021,0,0,02495fe00f66da6dfdc76e114cbfe299166f38a54b1d2a44f261ac9e32a86975,2024-05-30T18:19:11.743000
|
||||
CVE-2024-36022,0,0,c64d6f85f36bbf65cea0343ca81b6ba47092415a3c5024bf18c749096420184e,2024-05-30T18:19:11.743000
|
||||
@ -253047,7 +253051,7 @@ CVE-2024-36042,0,0,5e54aecb20c44082aa92fd61c0f8a58aa5121675b55d97309cf9a5aaaf11a
|
||||
CVE-2024-36043,0,0,3bd225f8561cef578aaa027f6bceef70b4450bc22a2e5dc039a9b76782f71691,2024-05-20T13:00:04.957000
|
||||
CVE-2024-36048,0,0,b406f72981a8542eaabbe2b057df03d1e7a595145b2ccc619b5d1fde4d2e90e3,2024-06-10T17:16:32.167000
|
||||
CVE-2024-36049,0,0,51d271179b773ae975431c0c021fa3b0015024baa0aaf9431319b88ebb604829,2024-05-24T18:09:20.027000
|
||||
CVE-2024-3605,0,1,905473bba2f4b1f833e3696e0eb3a1556acdfbc79f67c22a9c6f82f499950cc7,2024-07-15T17:12:36.967000
|
||||
CVE-2024-3605,0,0,905473bba2f4b1f833e3696e0eb3a1556acdfbc79f67c22a9c6f82f499950cc7,2024-07-15T17:12:36.967000
|
||||
CVE-2024-36050,0,0,c50ac6e5d9529aacb1e334d114a2f6f4418d441c20a736ae9e48551abc3029b2,2024-05-22T16:15:10.777000
|
||||
CVE-2024-36052,0,0,022010471f20b33cdbb9c0f6e926c1a4caaff0d72570a4d1a2abd38ceffab587,2024-05-22T12:46:53.887000
|
||||
CVE-2024-36053,0,0,2b26adadb1e10190c0e2e5708c64683c631febead0f4dd9529189a0425d50810,2024-07-03T02:02:43.043000
|
||||
@ -253222,7 +253226,7 @@ CVE-2024-36264,0,0,107a5f8ad4937c0982cb9f4a5a08127014ca42eef2ebad76477f1e3a073f5
|
||||
CVE-2024-36265,0,0,013f12438cdeab94e645b2217e59635e5ee118c048a6c6d7490b497e97a99b2a,2024-06-13T21:15:57.170000
|
||||
CVE-2024-36266,0,0,9d2961d489b0fce568e04e4c1c269f16c8c57dd6d267e14663bd78f27bc7e154,2024-06-11T13:54:12.057000
|
||||
CVE-2024-36267,0,0,66b127f77fa5a54e7fcd6fbeddc446c0aeca670a52e22fd99c771e136e0935f8,2024-07-03T02:03:00.383000
|
||||
CVE-2024-3627,0,1,b89e9f2ca530f3e52199f8e236751735781433429621317f8b9fc4faa8df3d5f,2024-07-15T17:12:17.763000
|
||||
CVE-2024-3627,0,0,b89e9f2ca530f3e52199f8e236751735781433429621317f8b9fc4faa8df3d5f,2024-07-15T17:12:17.763000
|
||||
CVE-2024-36270,0,0,d3b5ce010e9d2d0e421a800ff03990b2f8e8f91530ab5a32d5bddc378cffae67,2024-06-21T11:22:01.687000
|
||||
CVE-2024-36277,0,0,af400d33a698814e148533e62eceb8aef6909a879b47a7e44b0b7cad3c452635,2024-07-03T02:03:01.187000
|
||||
CVE-2024-36278,0,0,6b8ecb24f3100b2f1c21910812aabc2ecc5850755f17ecb30c413be0914d5cf2,2024-07-03T18:02:26.597000
|
||||
@ -253312,7 +253316,11 @@ CVE-2024-36426,0,0,081cbabfe1f165d2e60c6bf5434c4cea5a1c1465246b1d9713d429b0a41c1
|
||||
CVE-2024-36427,0,0,10c5dade9c11af5e52239a7a8c18438909a8ea6a201617061be6b7626f49e18c,2024-07-03T02:03:12.033000
|
||||
CVE-2024-36428,0,0,73719b2d94fccf2eff624fbf36dc51c2fc48c0dc66be598a72cd1ff64aaf434d,2024-05-28T12:39:28.377000
|
||||
CVE-2024-3643,0,0,af0c2404bd4ab34bcd75932174ab1b00c5ac556e20d57f0445020a0c94c96fe2,2024-05-16T13:03:05.353000
|
||||
CVE-2024-36432,1,1,bc7dcc54c0accd9d08a7eb50f3ad4572241465881609f579fc341e21961b7c58,2024-07-15T19:15:02.593000
|
||||
CVE-2024-36433,1,1,27ef33775c72c0fd42ed9b3c63df51a99b759c2ebef0c22d29deb86a1eac9de9,2024-07-15T19:15:02.837000
|
||||
CVE-2024-36434,1,1,0dfd2c56938439fb6a894bd775b9cbf740e7ded5bc9d49218fae9b783d279f33,2024-07-15T19:15:03.053000
|
||||
CVE-2024-36435,0,0,d5db9c80751c95bdb9d7c8677b360e81635e7c29402d5e581205685bb84d0c00,2024-07-12T12:49:11.340000
|
||||
CVE-2024-36438,1,1,774be27f24fca724c25c385bb341460342aa8691fc1a30d28ca76b1c9d53b8e7,2024-07-15T19:15:03.320000
|
||||
CVE-2024-3644,0,0,e904dffa636a621d1f1644a68a8bb26342dbf717ae684f12b60a37d102e4d87d,2024-05-16T13:03:05.353000
|
||||
CVE-2024-3645,0,0,ea45063aa3cff8d7bb517959f0685ad339f1e48c249e10e3851af9fbba289420,2024-04-22T19:24:12.920000
|
||||
CVE-2024-36450,0,0,32d48285c32086a3f09c628c1971379077a46741ecaad7df002b03827ae59ffc,2024-07-11T13:05:54.930000
|
||||
@ -253614,6 +253622,7 @@ CVE-2024-37006,0,0,ce197589ee3e9b9abc62e5ee278117c11ae961db1cdfe5fd87c2da96a0f55
|
||||
CVE-2024-37007,0,0,0fc601714096f5d925a9dbadf52718e2d07645aad03229b4044d058f28f4c32f,2024-07-03T02:04:01.303000
|
||||
CVE-2024-3701,0,0,b97bf02f501ce8bb46bbbea962bd508392417999afee815d0c2fcfb239983cc7,2024-04-15T13:15:31.997000
|
||||
CVE-2024-37014,0,0,4d8eebb55f92fd637819ddb88e1adc8dcc510ce2876a7f33ecffd1498dc89404,2024-07-03T02:04:01.523000
|
||||
CVE-2024-37016,1,1,a5541b3a7f0a84fa31ec51dc66cb973b2ac5e7f89d07e0348ce7d14438de273a,2024-07-15T18:15:04.337000
|
||||
CVE-2024-37017,0,0,bcf42a4afa4161d494ebe5be7e7f4777ee139dad62148a87a3f3aec02cb4dc1b,2024-07-03T02:04:02.337000
|
||||
CVE-2024-37018,0,0,702b0048025811920f5478aca500fdf16e8badcce077fd8d6d40cb1d8cc37861,2024-05-31T13:01:46.727000
|
||||
CVE-2024-37019,0,0,c34529539f4c6ff793225ec64e29909e2614ce1bc964c3c63810b9219791c5ca,2024-07-03T02:04:03.153000
|
||||
@ -253836,6 +253845,7 @@ CVE-2024-3738,0,0,cebdf6c67207ccd8240919e9596b8485c51e6607a12a8dcdfff13f6ddbdbfe
|
||||
CVE-2024-37383,0,0,3a9597c771ab199850aaeee94068cbc0182ff2bfcefd23d631ce0d7808f3745f,2024-07-03T02:04:16.250000
|
||||
CVE-2024-37384,0,0,4ede7c4b4e1e1de259445d49ca3b43a6d0a75b7dcaf1ea245b8f6306c1e67bb9,2024-07-03T02:04:17.060000
|
||||
CVE-2024-37385,0,0,1af5dbf4fe496116fcfe8797458a2e9292fd2ddec99a563e5137c9d207fb12bc,2024-06-07T14:56:05.647000
|
||||
CVE-2024-37386,1,1,3fc6f12821cdac1c4892854bf660c25bf1a1ca57761e368d4200b885ae7dc344,2024-07-15T19:15:03.430000
|
||||
CVE-2024-37387,0,0,fe2e0e702592a3b950e5c7ffa6cd887e6a1ea8123fb6a269a45db83eafdcfbbc,2024-07-03T02:04:17.790000
|
||||
CVE-2024-37388,0,0,3169d306b45a011b46c4d3fe95463302fc94255a3e5bff07d58cd00bed7bba75,2024-06-07T19:24:09.243000
|
||||
CVE-2024-37389,0,0,27f7927000cd6a2429ab617761c45ffb27c2f3c3199f49f01b1eda02927e348e,2024-07-11T14:48:32.300000
|
||||
@ -253992,7 +254002,7 @@ CVE-2024-37799,0,0,7daf228a97dd80358d70cc4a662e5369bebd266eafdf0efd1951071a509a7
|
||||
CVE-2024-3780,0,0,83484fb5b744efc24cdea9908844170c52624d067b8e01e5b8f34f841ba67ba1,2024-04-15T13:15:31.997000
|
||||
CVE-2024-37800,0,0,3aebd2faaeb84484cc68215ff2c27d755488c237f64ba208bea923e908662dd8,2024-07-05T14:11:13.163000
|
||||
CVE-2024-37802,0,0,acc621703310da7f355403e50706b571175d412f17efb19e135e56be65b914ac,2024-07-03T02:04:46.857000
|
||||
CVE-2024-37803,0,1,e775e15ae57e6d87a1c3eae9b2633b6fb5e2150047d8db37ba8a0df6bf917fcb,2024-07-15T16:46:21.273000
|
||||
CVE-2024-37803,0,0,e775e15ae57e6d87a1c3eae9b2633b6fb5e2150047d8db37ba8a0df6bf917fcb,2024-07-15T16:46:21.273000
|
||||
CVE-2024-3781,0,0,0166ef6fe2c7d229a771ed8a3459c0974e3bc1428bfcd1abf209c8c2e778a8e5,2024-04-15T19:12:25.887000
|
||||
CVE-2024-37818,0,0,5cb7934ffaf0f9273124a6e156c7f80c8bbf67e7edc77dc4c583d4fc2d7c2bcb,2024-06-21T11:22:01.687000
|
||||
CVE-2024-3782,0,0,b45b8920e0157c6199f5ffbbbc446d8fb5e1a40daf0ca4b703a9dc70f6839c9b,2024-04-15T19:12:25.887000
|
||||
@ -254259,7 +254269,7 @@ CVE-2024-3841,0,0,8802855d3bfa5a1c81bb3b1500254989e91bb5a660a45184fb94e49c6e6b50
|
||||
CVE-2024-38427,0,0,8994acf8b0d2e9fdb11baea3df5edeec421ed8fa1c8aac7108ecf0d2784c04de,2024-07-03T02:05:00.507000
|
||||
CVE-2024-38428,0,0,88ab77f65d2de763959b3536063d69fbc2444cb9d53c4b7dcba71cfc1a022537,2024-06-17T12:42:04.623000
|
||||
CVE-2024-3843,0,0,f8304581ad62be18ba48d40e0abaf62c4d0e638c53e769e55d87254b71de405d,2024-07-03T02:06:41.770000
|
||||
CVE-2024-38433,0,0,5b15c173757827b04b6aec390e8d6227c4be5fb08c0ff2d2703cb9d9bc7b7755,2024-07-11T13:05:54.930000
|
||||
CVE-2024-38433,0,1,f67092b0476b56495430d5a0a2004ef9f8edcc22248756a4bc924265edccd9ea,2024-07-15T18:26:30.693000
|
||||
CVE-2024-38439,0,0,8231c3155c8c2b9187a625bff6a8697fe632a7e4deddc7a4e816a03d1932df66,2024-06-30T12:15:02.293000
|
||||
CVE-2024-3844,0,0,13c07c552898deff764ecc147d4cf01f9d640dbd85df9d011bb4595782c8d93e,2024-07-03T02:06:42.643000
|
||||
CVE-2024-38440,0,0,6eeed0e96f15416f894572035c480d139cdee0086e466e03019ce412c35c715a,2024-06-30T12:15:02.377000
|
||||
@ -254844,6 +254854,11 @@ CVE-2024-3977,0,0,87f55f2983faa9489e3ab65e96b4cea8a0d04681e4c4541cf69108c85d144a
|
||||
CVE-2024-3978,0,0,e25d25f011ecf86a9a7629ea5449d530d107458e873c97f796fe325b70200d63,2024-06-17T12:42:04.623000
|
||||
CVE-2024-3979,0,0,e9e7991f3b86f818ec400b9ec60245e440b2d51744d0b7d3598ed5add4c2b631,2024-06-06T20:15:14.127000
|
||||
CVE-2024-39807,0,0,ba2c368fe4cdf413290b5bff8a949eddf35bb4de98ed47f43e524e6cb747e010,2024-07-05T17:07:47.090000
|
||||
CVE-2024-39819,1,1,3ed27297e5dbf2b5db195ab7e433cf48cdd2011e8378ab27c539a83818e800c8,2024-07-15T18:15:04.407000
|
||||
CVE-2024-39820,1,1,0a370c1960af31a93093357600b0ed4111feec64382be841777decf985639317,2024-07-15T18:15:04.620000
|
||||
CVE-2024-39821,1,1,ffecc1cca9d0647f6a473cf37bb2fa90bd231ab7475e8f7e70a655aa741bd08f,2024-07-15T18:15:04.827000
|
||||
CVE-2024-39826,1,1,f422588b30ad994068eda47537984282c3659d647a20e3872a22edb1bb332311,2024-07-15T18:15:05.033000
|
||||
CVE-2024-39827,1,1,157c0f61a4c15fdb2ab6aa4ba54f2d4d0e2783cc207c0189f8175c7ce923d0ac,2024-07-15T18:15:05.237000
|
||||
CVE-2024-39828,0,0,37815ac0cb1d59603d10017e1de409a6a7cef6f58ba5d0ea15f1cc9c3c9f34b5,2024-07-11T15:06:13.953000
|
||||
CVE-2024-39830,0,0,fa16449dc31377b10db0f6c8fa3cd2e73175dcab5134adbfb18592dc79a4a80c,2024-07-05T17:08:50.197000
|
||||
CVE-2024-3984,0,0,9fd51fca8e9cb62e411ab69c310516342152a8240e3126272f1618181a2d89aa,2024-06-20T12:44:01.637000
|
||||
@ -254960,8 +254975,10 @@ CVE-2024-4038,0,0,9199a5f679fdf6d4f05942a1d329990ffc0905f3bf6de7561a7af327688cda
|
||||
CVE-2024-4039,0,0,b18b8aac4336f296c5655f645710463e48a4544089b8c4c20638e847b5c74634,2024-05-14T16:11:39.510000
|
||||
CVE-2024-4040,0,0,4c2ad1f11d479d0071ddbaeb3523edde6a0cd9c4e74c065c69d4bb5c9b1ac029,2024-04-26T15:25:47.270000
|
||||
CVE-2024-4041,0,0,bd71d95aba274d30d448ad146bc23c848b8a3b9576dc252f709372f143cb7780,2024-05-14T16:11:39.510000
|
||||
CVE-2024-40412,0,1,ee1648a619ace402a2695f357644480cca061a0b71a8c8619f0a343e150121f2,2024-07-15T17:15:02.723000
|
||||
CVE-2024-40414,1,1,42ab5d9f1543bbb2a7588474b7f0390046f7ff960997e9ce164549f423d304ae,2024-07-15T17:15:02.783000
|
||||
CVE-2024-40412,0,0,ee1648a619ace402a2695f357644480cca061a0b71a8c8619f0a343e150121f2,2024-07-15T17:15:02.723000
|
||||
CVE-2024-40414,0,0,42ab5d9f1543bbb2a7588474b7f0390046f7ff960997e9ce164549f423d304ae,2024-07-15T17:15:02.783000
|
||||
CVE-2024-40415,1,1,dd6b4b157d36739047024ef312bcdbc2974a75c7371ac4228d566a23bdd925f6,2024-07-15T18:15:05.490000
|
||||
CVE-2024-40416,1,1,2541f9169745ccf44b3c6aaf80029bc6951ce4931a6336d52713caa5691ef3bf,2024-07-15T18:15:05.543000
|
||||
CVE-2024-40417,0,0,298c0304c38ce2a49f170de68fce3e8c26e10c42ce4acaa74e6360f44eab21ad,2024-07-11T13:05:54.930000
|
||||
CVE-2024-4042,0,0,f41d19a896222ab39f54d4d516c2364bd25fe65dca5e9c4b7ccc9d626f82d5ed,2024-06-07T14:56:05.647000
|
||||
CVE-2024-4043,0,0,50e67cd87d2761034ee2e0514a61b1574f18a654fe271a8568be1eaa53e96b2e,2024-05-24T01:15:30.977000
|
||||
@ -254987,11 +255004,11 @@ CVE-2024-40549,0,0,a0d01bcdf34afa23eab8ec4dd5d94b148230dc582c59a04f8f6da50444d2d
|
||||
CVE-2024-40550,0,0,7a6954c6d53bfb86477e868f3f394991be55b1202e4ee13b62edae8e166cd83b,2024-07-12T18:40:22.040000
|
||||
CVE-2024-40551,0,0,9e323c706374e77ed8fc1ea45acdfd1b484476c375557653052fb7c996a0649b,2024-07-12T18:40:13.010000
|
||||
CVE-2024-40552,0,0,02ebf6fbf2ff31ad3f4bfa8a44c3c4b56d8ff7dfc506f01b4ada9a52c8671521,2024-07-12T18:39:59.150000
|
||||
CVE-2024-40553,1,1,736e85c145e1c137af7fcb5ec3a7383a0d64e02e558a3942773186cb8f8c71ec,2024-07-15T16:15:03.147000
|
||||
CVE-2024-40554,1,1,b82b913aff85d1115e78c21ed19913cda5f1ecdd2c218fadcdfa2f716f128c18,2024-07-15T16:15:03.223000
|
||||
CVE-2024-40555,1,1,bca9188bfd5b610602fe283496cfd8eb9c467078430023fc400effb5eeac8b1b,2024-07-15T16:15:03.283000
|
||||
CVE-2024-40553,0,0,736e85c145e1c137af7fcb5ec3a7383a0d64e02e558a3942773186cb8f8c71ec,2024-07-15T16:15:03.147000
|
||||
CVE-2024-40554,0,0,b82b913aff85d1115e78c21ed19913cda5f1ecdd2c218fadcdfa2f716f128c18,2024-07-15T16:15:03.223000
|
||||
CVE-2024-40555,0,0,bca9188bfd5b610602fe283496cfd8eb9c467078430023fc400effb5eeac8b1b,2024-07-15T16:15:03.283000
|
||||
CVE-2024-4056,0,0,b8d993c32e0d1df4fc3c3b0df01e5b9a4366d92d1a2ad184a020d404aa44587a,2024-04-26T12:58:17.720000
|
||||
CVE-2024-40560,1,1,fa9cfb7935924b2a220812353cf8c14602c5ee557d8f6e80e21d065266761652,2024-07-15T16:15:03.347000
|
||||
CVE-2024-40560,0,0,fa9cfb7935924b2a220812353cf8c14602c5ee557d8f6e80e21d065266761652,2024-07-15T16:15:03.347000
|
||||
CVE-2024-4057,0,0,26b46aa52b04f4ef8890033772544e5e99ad730f84e9e0e97b479cd36cf89ace,2024-07-03T02:07:02.197000
|
||||
CVE-2024-4058,0,0,e20d454336ea887bbb54d47433e5560889db558189699560ce98773941e9b99e,2024-06-07T15:40:49.707000
|
||||
CVE-2024-4059,0,0,c49986e07be30ca2c850f4613369c1702dff21e7018832f61c83284c95e0cc00,2024-05-03T03:16:29.430000
|
||||
@ -255012,6 +255029,7 @@ CVE-2024-40614,0,0,5a8c90c94f1b0dc56355424420ebae65c618d536c580acb4e248f7802de21
|
||||
CVE-2024-40618,0,0,339cc634a42e8a7db54f4bb39e56482affa65b57dfd2765250a61f2e694456da,2024-07-12T16:12:00.597000
|
||||
CVE-2024-4062,0,0,695b7b6d53140e91ee1c447f6f5acafad0b73fbbd2558cb89ae9d4c0c7616ec0,2024-06-04T19:20:29.007000
|
||||
CVE-2024-4063,0,0,a86a41867bbd8268c01f6e42ab82f3f97444cd9242de57f43e4b9e5669394e5f,2024-06-04T19:20:29.120000
|
||||
CVE-2024-40631,1,1,02afd974607c209ba61a932b05cbea74ea58f5af3cb05e9df016ee708037da70,2024-07-15T19:15:03.700000
|
||||
CVE-2024-4064,0,0,3a1a40467a64f04bfa80ae5c066454b06b4092014a9e47cc1a50eb6eb22d315c,2024-05-17T02:40:14.223000
|
||||
CVE-2024-4065,0,0,e9243298c32ccba8ab1ac6d427150517ee98217790d2dec0b1b5ec685d8cbc83,2024-06-04T19:20:29.227000
|
||||
CVE-2024-4066,0,0,5674d1317b0a03adb324e31f70d35a87031f26ca2ea2869349483359d081bdf7,2024-06-04T19:20:29.323000
|
||||
@ -255231,7 +255249,7 @@ CVE-2024-4172,0,0,ae5cefdd41ee745a5f3463347f20f3f77110439c81ed1ad285dedf4b40da1c
|
||||
CVE-2024-4173,0,0,47f39f3e8e603eac743ed4815cd724decf015716a2f0d9c17daf4d8fa3affc2d,2024-04-25T23:15:47.240000
|
||||
CVE-2024-4174,0,0,e168dfb28a2573f66b3120de326c0954bda564c12e3831aed75de7f1338d3089,2024-04-25T13:18:02.660000
|
||||
CVE-2024-4175,0,0,2f40401bb337bcc37138495e1928fb4d762f69fc829f768d707a278e8a423e1a,2024-04-25T13:18:02.660000
|
||||
CVE-2024-4176,0,1,2a1e283cc95c7d3d47b09f457f96512613ab4fb1878e9b333c02ce78f75d8385,2024-07-15T16:43:04.163000
|
||||
CVE-2024-4176,0,0,2a1e283cc95c7d3d47b09f457f96512613ab4fb1878e9b333c02ce78f75d8385,2024-07-15T16:43:04.163000
|
||||
CVE-2024-4177,0,0,e1d6d87dc8ef62b0d8de94cfe98a875b1cbd39c3640e8e02d8d5a4e8bb3cca88,2024-06-11T17:53:13.710000
|
||||
CVE-2024-4180,0,0,89f84993baa10ab5b41ed58678b5b9e31ff190980a67ee18130266156f7434fc,2024-06-04T16:57:41.053000
|
||||
CVE-2024-4181,0,0,318f7b6282445099b873be7e9b6d90d9a8a899d8ebeb5f7676f33b80d9073c4d,2024-05-16T13:03:05.353000
|
||||
@ -255397,7 +255415,7 @@ CVE-2024-4367,0,0,53b2562feb1cef4dfbc75c878e502bbc54b7cf80f87613aa8d663f88e3c74c
|
||||
CVE-2024-4368,0,0,ebedd608e412600f3409256680729c82fcf5015495435afd7648389243e696e1,2024-07-03T02:07:28.557000
|
||||
CVE-2024-4369,0,0,9bcc319f475d5802b53d6dedcfa6ead4761cbf7c42adde8daf6f3ff8c0c17af2,2024-06-19T18:15:11.820000
|
||||
CVE-2024-4370,0,0,3c1f5b342c087fc6587c8bc9012541b58d80e50fdee9d14eea44daecdec82901,2024-05-15T16:40:19.330000
|
||||
CVE-2024-4371,0,1,a0b0e0fb8c98057b2328743d7da5c32e9a585001a67e08f1632ceab0df487dfa,2024-07-15T16:42:39.107000
|
||||
CVE-2024-4371,0,0,a0b0e0fb8c98057b2328743d7da5c32e9a585001a67e08f1632ceab0df487dfa,2024-07-15T16:42:39.107000
|
||||
CVE-2024-4372,0,0,9ae4f43bf2d0d90214ce2e4715e0031799e31627a4319bb26ad2a73cf60988cf,2024-05-21T12:37:59.687000
|
||||
CVE-2024-4373,0,0,95ffe3cd6afce20664a5281c9740358c7cd9b7c7a4c9be8031ba5b0e36cac33d,2024-05-15T16:40:19.330000
|
||||
CVE-2024-4374,0,0,3d209a7da2a70008bba3efc6941e41bec948a9636ca11ef89a139bc015911837,2024-05-20T13:00:34.807000
|
||||
@ -255620,7 +255638,7 @@ CVE-2024-4621,0,0,2ba6d981e4d5b6f91910837209ceaa779e2d1828d6d78fc3d542c33aa86982
|
||||
CVE-2024-4622,0,0,7ee7f5b0dbbae0efd9526a317b5150a2af537411986feb7d056b697fe5fc8d53,2024-05-15T18:35:11.453000
|
||||
CVE-2024-4623,0,0,c53a127683caa8cc49c11a88cc217ef787af901116f1ba89c4741730eb1cc926,2024-06-20T12:44:01.637000
|
||||
CVE-2024-4624,0,0,8d5df292e17ba086eddadcbafacc529f2ebc3c5e49d7b6ea9488db217d327898,2024-05-14T19:17:55.627000
|
||||
CVE-2024-4626,0,1,2c49c68b79a7a3d7626dfac7c1ab161b6d51a1a10b834d04b620fc9c15d7e475,2024-07-15T17:10:52.563000
|
||||
CVE-2024-4626,0,0,2c49c68b79a7a3d7626dfac7c1ab161b6d51a1a10b834d04b620fc9c15d7e475,2024-07-15T17:10:52.563000
|
||||
CVE-2024-4627,0,0,a94951b310ac8fa22dfdfb5dfa1a6f0b0e4706e2176059eb33a39431470f56d3,2024-07-03T15:45:08.187000
|
||||
CVE-2024-4630,0,0,a8734ce37050a74e4818d023dd3913b4f4405761deda282bae815154e00346af,2024-05-14T16:11:39.510000
|
||||
CVE-2024-4631,0,0,d3c7ebdf5d9c31d124bc2c67e858e716a594cef6aa78ec49eddcc538ef63a67e,2024-05-14T15:44:13.487000
|
||||
@ -255720,7 +255738,7 @@ CVE-2024-4735,0,0,74f4fbd101bb46efdc880f338cfb70c8fd3a6ef365bd7732d2107c79fb3d78
|
||||
CVE-2024-4736,0,0,d66d2cb2e0afad57d9d4fb0dd29db1ae480425b093ff5e46c35972ad67bf1599,2024-06-04T19:20:48.497000
|
||||
CVE-2024-4737,0,0,bd8c1ff0c2bd0234c81e53807fa1f8ee5b80721a1ba19a06cab0ffcb77875865,2024-06-04T19:20:48.597000
|
||||
CVE-2024-4738,0,0,fc42ba0968ce2d3cd6a759727e85c03dbbce46854db0b2e928b2a8457ade2245,2024-06-04T19:20:48.783000
|
||||
CVE-2024-4742,0,1,b62cb9a09c7db689b4e755ae70bed9b2375aafaa790f8e2b3ab80c930d94850e,2024-07-15T17:10:34.403000
|
||||
CVE-2024-4742,0,0,b62cb9a09c7db689b4e755ae70bed9b2375aafaa790f8e2b3ab80c930d94850e,2024-07-15T17:10:34.403000
|
||||
CVE-2024-4743,0,0,213080d2ce7e290785906918b766d2dd6153d7beb42f4a36c418fabdb6096c44,2024-06-11T17:32:50.367000
|
||||
CVE-2024-4744,0,0,f2a62275342fb4e02e31ad60fb7b37b3a8ac2b2376213a1fba752ece8166ef2e,2024-06-12T16:44:12.157000
|
||||
CVE-2024-4745,0,0,54a19ac018881ab94cc09206a38557755449249c459a354d473ddea48bafd7eb,2024-06-12T16:23:34.197000
|
||||
@ -256299,7 +256317,7 @@ CVE-2024-5427,0,0,8f69f2258320069dff3e4ca54576ebef2bbd612c89873dcb7f321da375d5ba
|
||||
CVE-2024-5428,0,0,2246dbdf3f6f57b875e58f7afe2bbf25e943033499540bdd9e572873773785a4,2024-05-28T14:59:09.827000
|
||||
CVE-2024-5430,0,0,7efa052e5c67b0f87e6df1de28f1712609827b19a2f0fa9870fd8d86a121a060,2024-06-28T13:17:34.380000
|
||||
CVE-2024-5431,0,0,c05cafcca4db035c01a1ef8070f41d696cf1ed72d29d4b28e570debbe2ef62df,2024-06-25T12:24:17.873000
|
||||
CVE-2024-5432,0,1,ab16c13801145bb5eaae071d9c21b29aca78e7920ad4908920a2f03fb30ba995,2024-07-15T16:53:35.600000
|
||||
CVE-2024-5432,0,0,ab16c13801145bb5eaae071d9c21b29aca78e7920ad4908920a2f03fb30ba995,2024-07-15T16:53:35.600000
|
||||
CVE-2024-5433,0,0,cf9a3f50aa3044d0d1df4fa80d5f9a0105faaa25fcb8a234110d2fd0fcff2ef0,2024-05-29T13:02:09.280000
|
||||
CVE-2024-5434,0,0,bd01f6ae7a25122b4c9cfb7b6da0885ad33a7f141dec8df17c44747d924fac75,2024-05-29T13:02:09.280000
|
||||
CVE-2024-5436,0,0,1f0ff22e526bae999a5752534900397469f10984712d6e1a281251b3244c7ffe,2024-05-31T13:01:46.727000
|
||||
@ -256691,7 +256709,7 @@ CVE-2024-6025,0,0,2653befc93f455636e57cde83404a5ff884ae434fc80abd19f04944c84a702
|
||||
CVE-2024-6026,0,0,2970248e3866f379267d0cae7e3b9bb934f39b25cb3198f3dfbaa23423c08ff9,2024-07-12T16:55:44.240000
|
||||
CVE-2024-6027,0,0,d36139a3f6402ad17d96a83c3d61f6ce213e515812c77112f328495c0bcd9928,2024-06-24T19:17:50.240000
|
||||
CVE-2024-6028,0,0,a068f17d13f3176b06fe0181735235198b8a42900e26e5af12021baf09b50c20,2024-06-25T12:24:17.873000
|
||||
CVE-2024-6035,0,0,72b6aef12b103538a1673f781cff4e8e69794a7b8cc177c56631d30ef145bd70,2024-07-12T18:49:07.067000
|
||||
CVE-2024-6035,0,1,71705709079183c78c8ed383ff1dde0d9a61df1fcd0014b5485dcff6ce00c8bd,2024-07-15T18:15:05.840000
|
||||
CVE-2024-6036,0,0,ec75d3b088377f3e157bda1807d973db13644b79a58ce7816702ab31b3d039ce,2024-07-11T13:05:54.930000
|
||||
CVE-2024-6037,0,0,6693b31ec7c6312863697d20bd04a1bdff52b0f0104cd13eb0277621b822579c,2024-07-11T13:05:54.930000
|
||||
CVE-2024-6038,0,0,4807c09415696120707d8114a37a205bc4f3b855697eebb2268af32cdef6d3c9,2024-06-27T19:25:12.067000
|
||||
@ -257023,8 +257041,8 @@ CVE-2024-6679,0,0,193698b3a519c2de1af0fd23f7e404e2d54c730e4704d97d0092b63ef1c812
|
||||
CVE-2024-6680,0,0,131299d0989a76f846afb0c8ae15f4692f1a0fdd9931fad30c165660cd1232fc,2024-07-11T18:09:58.777000
|
||||
CVE-2024-6681,0,0,fd87484dafd740c0f788720b14149eb40f6b6d8ce371416d0e039ce9acf82071,2024-07-11T18:09:58.777000
|
||||
CVE-2024-6689,0,0,ec7131b60c617e40df7d8cd950219c4e232d1b7354523cf28a3e92438a8ddde2,2024-07-15T14:15:03.640000
|
||||
CVE-2024-6716,0,0,797c9ef3fcf086496b4d0cebe79397ae66fd082966b8503c8a462e84ae03c75f,2024-07-15T15:15:10.900000
|
||||
CVE-2024-6721,0,1,20bc3ac9fd25b0ef666ff8f606cfc8f742981337efa5a16bd2cfa701fac87a51,2024-07-15T16:15:03.467000
|
||||
CVE-2024-6716,0,1,e3306c105d7fd24ec7a1939e295c57fdf07bdb80aad35408cde8763b9316c0be,2024-07-15T18:15:06.107000
|
||||
CVE-2024-6721,0,0,20bc3ac9fd25b0ef666ff8f606cfc8f742981337efa5a16bd2cfa701fac87a51,2024-07-15T16:15:03.467000
|
||||
CVE-2024-6728,0,0,9abe0a9570ded71226f4ac9c9c5189516c258bbe0afa1c3fa1605041ef7aae25,2024-07-15T13:00:34.853000
|
||||
CVE-2024-6729,0,0,1a9a5aa4be1b6eedd35b675a6eb0b49764f594d7ab81dc654f200200596f44a5,2024-07-15T13:00:34.853000
|
||||
CVE-2024-6730,0,0,ef30d2eb7f24b640da190afcbc16e385d73ab8dd33302ee9e560c4fd64a066a0,2024-07-15T13:00:34.853000
|
||||
|
Can't render this file because it is too large.
|
Loading…
x
Reference in New Issue
Block a user