mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-06-19 17:31:42 +00:00
Auto-Update: 2024-06-26T14:00:18.791020+00:00
This commit is contained in:
parent
8fbee460d6
commit
0e9d8c51cd
@ -2,12 +2,12 @@
|
||||
"id": "CVE-2022-29420",
|
||||
"sourceIdentifier": "audit@patchstack.com",
|
||||
"published": "2022-05-06T17:15:09.157",
|
||||
"lastModified": "2022-05-16T16:40:13.520",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2024-06-26T13:15:49.553",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Authenticated (admin+) Stored Cross-Site Scripting (XSS) vulnerability in Adam Skaat's Countdown & Clock plugin <= 2.3.2 at WordPress via &ycd-circle-countdown-before-countdown and &ycd-circle-countdown-after-countdown vulnerable parameters."
|
||||
"value": "Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Adam Skaat Countdown & Clock (WordPress plugin) countdown-builder allows Stored XSS.This issue affects Countdown & Clock (WordPress plugin): from n/a through 2.3.2."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
@ -41,20 +41,20 @@
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:N/I:L/A:N",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:L",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "HIGH",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 3.4,
|
||||
"baseSeverity": "LOW"
|
||||
"availabilityImpact": "LOW",
|
||||
"baseScore": 5.9,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 1.7,
|
||||
"impactScore": 1.4
|
||||
"impactScore": 3.7
|
||||
}
|
||||
],
|
||||
"cvssMetricV2": [
|
||||
@ -120,14 +120,6 @@
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://wordpress.org/plugins/countdown-builder/",
|
||||
"source": "audit@patchstack.com",
|
||||
"tags": [
|
||||
"Product",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,12 +2,16 @@
|
||||
"id": "CVE-2024-21520",
|
||||
"sourceIdentifier": "report@snyk.io",
|
||||
"published": "2024-06-26T05:15:50.093",
|
||||
"lastModified": "2024-06-26T05:15:50.093",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-06-26T12:44:29.693",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Versions of the package djangorestframework before 3.15.2 are vulnerable to Cross-site Scripting (XSS) via the break_long_headers template filter due to improper input sanitization before splitting and joining with <br> tags."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Las versiones del paquete djangorestframework anteriores a la 3.15.2 son vulnerables a Cross-site Scripting (XSS) a trav\u00e9s del filtro de plantilla break_long_headers debido a una sanitizaci\u00f3n inadecuada de la entrada antes de dividir y unir con etiquetas <br>."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
|
@ -2,12 +2,16 @@
|
||||
"id": "CVE-2024-21739",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-06-25T21:15:57.007",
|
||||
"lastModified": "2024-06-25T21:15:57.007",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-06-26T12:44:29.693",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Geehy APM32F103CCT6, APM32F103RCT6, APM32F103RCT7, and APM32F103VCT6 devices have Incorrect Access Control."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Los dispositivos Geehy APM32F103CCT6, APM32F103RCT6, APM32F103RCT7 y APM32F103VCT6 tienen control de acceso incorrecto."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
|
@ -2,12 +2,16 @@
|
||||
"id": "CVE-2024-21740",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-06-25T21:15:57.190",
|
||||
"lastModified": "2024-06-25T21:15:57.190",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-06-26T12:44:29.693",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Artery AT32F415CBT7 and AT32F421C8T7 devices have Incorrect Access Control."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Los dispositivos Artery AT32F415CBT7 y AT32F421C8T7 tienen control de acceso incorrecto."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
|
@ -2,12 +2,16 @@
|
||||
"id": "CVE-2024-21741",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-06-25T21:15:57.357",
|
||||
"lastModified": "2024-06-25T21:15:57.357",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-06-26T12:44:29.693",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "GigaDevice GD32E103C8T6 devices have Incorrect Access Control."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Los dispositivos GigaDevice GD32E103C8T6 tienen un control de acceso incorrecto."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
|
@ -2,12 +2,16 @@
|
||||
"id": "CVE-2024-24764",
|
||||
"sourceIdentifier": "security-advisories@github.com",
|
||||
"published": "2024-06-26T01:15:47.890",
|
||||
"lastModified": "2024-06-26T01:15:47.890",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-06-26T12:44:29.693",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "October is a self-hosted CMS platform based on the Laravel PHP Framework. This issue affects authenticated administrators who may be redirected to an untrusted URL using the PageFinder schema. The resolver for the page finder link schema (`october://`) allowed external links, therefore allowing an open redirect outside the scope of the active host. This vulnerability has been patched in version 3.5.15."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "October es una plataforma CMS autohospedada basada en Laravel PHP Framework. Este problema afecta a los administradores autenticados que pueden ser redirigidos a una URL que no es de confianza mediante el esquema de PageFinder. El solucionador del esquema de enlace del buscador de p\u00e1ginas (`october://`) permit\u00eda enlaces externos, por lo que permit\u00eda una redirecci\u00f3n abierta fuera del alcance del host activo. Esta vulnerabilidad ha sido parcheada en la versi\u00f3n 3.5.15."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
|
@ -2,12 +2,16 @@
|
||||
"id": "CVE-2024-27867",
|
||||
"sourceIdentifier": "product-security@apple.com",
|
||||
"published": "2024-06-26T04:15:11.637",
|
||||
"lastModified": "2024-06-26T04:15:11.637",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-06-26T12:44:29.693",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "An authentication issue was addressed with improved state management. This issue is fixed in AirPods Firmware Update 6A326, AirPods Firmware Update 6F8, and Beats Firmware Update 6F8. When your headphones are seeking a connection request to one of your previously paired devices, an attacker in Bluetooth range might be able to spoof the intended source device and gain access to your headphones."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Se solucion\u00f3 un problema de autenticaci\u00f3n con una gesti\u00f3n de estado mejorada. Este problema se solucion\u00f3 en la Actualizaci\u00f3n de firmware de AirPods 6A326, la Actualizaci\u00f3n de firmware de AirPods 6F8 y la Actualizaci\u00f3n de firmware de Beats 6F8. Cuando sus auriculares buscan una solicitud de conexi\u00f3n a uno de sus dispositivos previamente emparejados, un atacante dentro del alcance de Bluetooth podr\u00eda falsificar el dispositivo fuente deseado y obtener acceso a sus auriculares."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
|
@ -2,12 +2,16 @@
|
||||
"id": "CVE-2024-28830",
|
||||
"sourceIdentifier": "security@checkmk.com",
|
||||
"published": "2024-06-26T08:15:09.630",
|
||||
"lastModified": "2024-06-26T08:15:09.630",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-06-26T12:44:29.693",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Insertion of Sensitive Information into Log File in Checkmk GmbH's Checkmk versions <2.3.0p7, <2.2.0p28, <2.1.0p45 and <=2.0.0p39 (EOL) causes automation user secrets to be written to audit log files accessible to administrators."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "La inserci\u00f3n de informaci\u00f3n confidencial en un archivo de registro en las versiones de Checkmk GmbH <2.3.0p7, <2.2.0p28, <2.1.0p45 y <=2.0.0p39 (EOL) hace que los secretos de usuario de automatizaci\u00f3n se escriban en archivos de registro de auditor\u00eda accesibles a los administradores."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
|
@ -2,12 +2,16 @@
|
||||
"id": "CVE-2024-28973",
|
||||
"sourceIdentifier": "security_alert@emc.com",
|
||||
"published": "2024-06-26T03:15:09.640",
|
||||
"lastModified": "2024-06-26T03:15:09.640",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-06-26T12:44:29.693",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Dell PowerProtect DD, versions prior to 8.0, LTS 7.13.1.0, LTS 7.10.1.30, LTS 7.7.5.40 contain a Stored Cross-Site Scripting Vulnerability. A remote high privileged attacker could potentially exploit this vulnerability, leading to the storage of malicious HTML or JavaScript codes in a trusted application data store. When a high privileged victim user accesses the data store through their browsers, the malicious code gets executed by the web browser in the context of the vulnerable web application. Exploitation may lead to information disclosure, session theft, or client-side request forgery"
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Dell PowerProtect DD, versiones anteriores a 8.0, LTS 7.13.1.0, LTS 7.10.1.30, LTS 7.7.5.40 contienen una vulnerabilidad de Cross-Site Scripting Almacenado. Un atacante remoto con altos privilegios podr\u00eda explotar esta vulnerabilidad, lo que llevar\u00eda al almacenamiento de c\u00f3digos HTML o JavaScript maliciosos en un almac\u00e9n de datos de aplicaciones confiable. Cuando un usuario v\u00edctima con altos privilegios accede al almac\u00e9n de datos a trav\u00e9s de sus navegadores, el navegador web ejecuta el c\u00f3digo malicioso en el contexto de la aplicaci\u00f3n web vulnerable. La explotaci\u00f3n puede dar lugar a la divulgaci\u00f3n de informaci\u00f3n, el robo de sesiones o la falsificaci\u00f3n de solicitudes por parte del cliente."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
|
@ -2,12 +2,16 @@
|
||||
"id": "CVE-2024-29173",
|
||||
"sourceIdentifier": "security_alert@emc.com",
|
||||
"published": "2024-06-26T03:15:09.877",
|
||||
"lastModified": "2024-06-26T03:15:09.877",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-06-26T12:44:29.693",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Dell PowerProtect DD, versions prior to 8.0, LTS 7.13.1.0, LTS 7.10.1.30, LTS 7.7.5.40 contain a Server-Side Request Forgery (SSRF) vulnerability. A remote high privileged attacker could potentially exploit this vulnerability, leading to disclosure of information on the application or remote client."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Dell PowerProtect DD, versiones anteriores a 8.0, LTS 7.13.1.0, LTS 7.10.1.30, LTS 7.7.5.40 contienen una vulnerabilidad de Server Side Request Forgery (SSRF). Un atacante remoto con altos privilegios podr\u00eda explotar esta vulnerabilidad, lo que llevar\u00eda a la divulgaci\u00f3n de informaci\u00f3n sobre la aplicaci\u00f3n o el cliente remoto."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
|
@ -2,12 +2,16 @@
|
||||
"id": "CVE-2024-29174",
|
||||
"sourceIdentifier": "security_alert@emc.com",
|
||||
"published": "2024-06-26T03:15:10.100",
|
||||
"lastModified": "2024-06-26T03:15:10.100",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-06-26T12:44:29.693",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Dell Data Domain, versions prior to 7.13.0.0, LTS 7.7.5.30, LTS 7.10.1.20 contain an SQL Injection vulnerability. A local low privileged attacker could potentially exploit this vulnerability, leading to the execution of certain SQL commands on the application's backend database causing unauthorized access to application data."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Dell Data Domain, versiones anteriores a 7.13.0.0, LTS 7.7.5.30, LTS 7.10.1.20 contienen una vulnerabilidad de inyecci\u00f3n SQL. Un atacante local con pocos privilegios podr\u00eda explotar esta vulnerabilidad, lo que llevar\u00eda a la ejecuci\u00f3n de ciertos comandos SQL en la base de datos backend de la aplicaci\u00f3n, lo que provocar\u00eda un acceso no autorizado a los datos de la aplicaci\u00f3n."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
|
@ -2,12 +2,16 @@
|
||||
"id": "CVE-2024-29175",
|
||||
"sourceIdentifier": "security_alert@emc.com",
|
||||
"published": "2024-06-26T03:15:10.303",
|
||||
"lastModified": "2024-06-26T03:15:10.303",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-06-26T12:44:29.693",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Dell PowerProtect Data Domain, versions prior to 7.13.0.0, LTS 7.7.5.40, LTS 7.10.1.30 contain an weak cryptographic algorithm vulnerability. A remote unauthenticated attacker could potentially exploit this vulnerability, leading to man-in-the-middle attack that exposes sensitive session information."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Dell PowerProtect Data Domain, versiones anteriores a 7.13.0.0, LTS 7.7.5.40, LTS 7.10.1.30 contienen una vulnerabilidad de algoritmo criptogr\u00e1fico d\u00e9bil. Un atacante remoto no autenticado podr\u00eda explotar esta vulnerabilidad, lo que provocar\u00eda un ataque de intermediario que exponga informaci\u00f3n confidencial de la sesi\u00f3n."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
|
@ -2,12 +2,16 @@
|
||||
"id": "CVE-2024-29176",
|
||||
"sourceIdentifier": "security_alert@emc.com",
|
||||
"published": "2024-06-26T03:15:10.533",
|
||||
"lastModified": "2024-06-26T03:15:10.533",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-06-26T12:44:29.693",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Dell PowerProtect DD, versions prior to 8.0, LTS 7.13.1.0, LTS 7.10.1.30, LTS 7.7.5.40 contain a buffer overflow vulnerability. A remote low privileged attacker could potentially exploit this vulnerability, leading to an application crash or execution of arbitrary code on the vulnerable application's underlying operating system with privileges of the vulnerable application."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Dell PowerProtect DD, versiones anteriores a 8.0, LTS 7.13.1.0, LTS 7.10.1.30, LTS 7.7.5.40 contienen una vulnerabilidad de desbordamiento del b\u00fafer. Un atacante remoto con pocos privilegios podr\u00eda explotar esta vulnerabilidad, lo que provocar\u00eda un bloqueo de la aplicaci\u00f3n o la ejecuci\u00f3n de c\u00f3digo arbitrario en el sistema operativo subyacente de la aplicaci\u00f3n vulnerable con los privilegios de la aplicaci\u00f3n vulnerable."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
|
@ -2,12 +2,16 @@
|
||||
"id": "CVE-2024-29177",
|
||||
"sourceIdentifier": "security_alert@emc.com",
|
||||
"published": "2024-06-26T03:15:10.767",
|
||||
"lastModified": "2024-06-26T03:15:10.767",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-06-26T12:44:29.693",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Dell PowerProtect DD, versions prior to 8.0, LTS 7.13.1.0, LTS 7.10.1.30, LTS 7.7.5.40 contain a disclosure of temporary sensitive information vulnerability. A remote high privileged attacker could potentially exploit this vulnerability, leading to the reuse of disclosed information to gain unauthorized access to the application report."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Dell PowerProtect DD, versiones anteriores a 8.0, LTS 7.13.1.0, LTS 7.10.1.30, LTS 7.7.5.40 contienen una divulgaci\u00f3n de vulnerabilidad de informaci\u00f3n confidencial temporal. Un atacante remoto con privilegios elevados podr\u00eda explotar esta vulnerabilidad, lo que llevar\u00eda a la reutilizaci\u00f3n de la informaci\u00f3n divulgada para obtener acceso no autorizado al informe de la aplicaci\u00f3n."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
|
@ -2,12 +2,16 @@
|
||||
"id": "CVE-2024-29953",
|
||||
"sourceIdentifier": "sirt@brocade.com",
|
||||
"published": "2024-06-26T00:15:10.030",
|
||||
"lastModified": "2024-06-26T00:15:10.030",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-06-26T12:44:29.693",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A vulnerability in the web interface in Brocade Fabric OS before v9.2.1, v9.2.0b, and v9.1.1d prints encoded session passwords on session storage for Virtual Fabric platforms. \nThis could allow an authenticated user to view other users' session encoded passwords."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Una vulnerabilidad en la interfaz web en Brocade Fabric OS anterior a v9.2.1, v9.2.0b y v9.1.1d imprime contrase\u00f1as de sesi\u00f3n codificadas en el almacenamiento de sesiones para plataformas Virtual Fabric. Esto podr\u00eda permitir que un usuario autenticado vea las contrase\u00f1as codificadas de sesi\u00f3n de otros usuarios."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
|
@ -2,12 +2,16 @@
|
||||
"id": "CVE-2024-29954",
|
||||
"sourceIdentifier": "sirt@brocade.com",
|
||||
"published": "2024-06-26T00:15:10.263",
|
||||
"lastModified": "2024-06-26T00:15:10.263",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-06-26T12:44:29.693",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A vulnerability in a password management API in Brocade Fabric OS versions before v9.2.1, v9.2.0b, v9.1.1d, and v8.2.3e prints sensitive information in log files. This could allow an authenticated user to view the server passwords for protocols such as scp and sftp.\n\nDetail.\nWhen the firmwaredownload command is incorrectly entered or points to an erroneous file, the firmware download log captures the failed command, including any password entered in the command line."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Una vulnerabilidad en una API de administraci\u00f3n de contrase\u00f1as en las versiones de Brocade Fabric OS anteriores a v9.2.1, v9.2.0b, v9.1.1d y v8.2.3e imprime informaci\u00f3n confidencial en archivos de registro. Esto podr\u00eda permitir a un usuario autenticado ver las contrase\u00f1as del servidor para protocolos como scp y sftp. Detalle. Cuando el comando de descarga de firmware se ingresa incorrectamente o apunta a un archivo err\u00f3neo, el registro de descarga de firmware captura el comando fallido, incluida cualquier contrase\u00f1a ingresada en la l\u00ednea de comando."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
|
@ -2,12 +2,16 @@
|
||||
"id": "CVE-2024-30112",
|
||||
"sourceIdentifier": "psirt@hcl.com",
|
||||
"published": "2024-06-25T22:15:30.117",
|
||||
"lastModified": "2024-06-25T22:15:30.117",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-06-26T12:44:29.693",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "HCL Connections is vulnerable to a cross-site scripting attack where an attacker may leverage this issue to execute arbitrary script code in the browser of an unsuspecting user which leads to executing malicious script code. This may let the attacker steal cookie-based authentication credentials and comprise user's account then launch other attacks."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "HCL Connections es vulnerable a un ataque de Cross-Site Scripting en el que un atacante puede aprovechar este problema para ejecutar c\u00f3digo de script arbitrario en el navegador de un usuario desprevenido, lo que lleva a la ejecuci\u00f3n de c\u00f3digo de scripts maliciosos. Esto puede permitir al atacante robar credenciales de autenticaci\u00f3n basadas en cookies, acceder a la cuenta del usuario y luego lanzar otros ataques."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
|
@ -2,12 +2,16 @@
|
||||
"id": "CVE-2024-30931",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-06-25T22:15:30.313",
|
||||
"lastModified": "2024-06-25T22:15:30.313",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-06-26T12:44:29.693",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Stored Cross Site Scripting vulnerability in Emby Media Server Emby Media Server 4.8.3.0 allows a remote attacker to escalate privileges via the notifications.html component."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Vulnerabilidad de Cross-Site Scripting almacenado en Emby Media Server Emby Media Server 4.8.3.0 permite a un atacante remoto escalar privilegios a trav\u00e9s del componente Notifications.html."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
|
@ -2,12 +2,16 @@
|
||||
"id": "CVE-2024-34400",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-06-25T21:15:59.090",
|
||||
"lastModified": "2024-06-25T21:15:59.090",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-06-26T12:44:29.693",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "An issue was discovered in VirtoSoftware Virto Kanban Board Web Part before 5.3.5.1 for SharePoint 2019. There is /_layouts/15/Virto.KanbanTaskManager/api/KanbanData.ashx LinkTitle2 XSS."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Se descubri\u00f3 un problema en VirtoSoftware Virto Kanban Board Web Part anterior a 5.3.5.1 para SharePoint 2019. Hay /_layouts/15/Virto.KanbanTaskManager/api/KanbanData.ashx LinkTitle2 XSS."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
|
@ -2,12 +2,16 @@
|
||||
"id": "CVE-2024-34580",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-06-26T05:15:51.093",
|
||||
"lastModified": "2024-06-26T05:15:51.093",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-06-26T12:44:29.693",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Apache XML Security for C++ through 2.0.4 implements the XML Signature Syntax and Processing (XMLDsig) specification without protection against an SSRF payload in a KeyInfo element. NOTE: the supplier disputes this CVE Record on the grounds that they are implementing the specification \"correctly\" and are not \"at fault.\""
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Apache XML Security para C++ hasta 2.0.4 implementa la especificaci\u00f3n de procesamiento y sintaxis de firma XML (XMLDsig) sin protecci\u00f3n contra un payload SSRF en un elemento KeyInfo. NOTA: el proveedor cuestiona este Registro CVE con el argumento de que est\u00e1 implementando la especificaci\u00f3n \"correctamente\" y no tiene \"culpa\"."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
|
@ -2,12 +2,16 @@
|
||||
"id": "CVE-2024-34581",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-06-26T05:15:51.227",
|
||||
"lastModified": "2024-06-26T06:15:13.983",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-06-26T12:44:29.693",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "The W3C XML Signature Syntax and Processing (XMLDsig) specification, starting with 1.0, was originally published with a \"RetrievalMethod is a URI ... that may be used to obtain key and/or certificate information\" statement and no accompanying information about SSRF risks, and this may have contributed to vulnerable implementations such as those discussed in CVE-2023-36661 and CVE-2024-21893. NOTE: this was mitigated in 1.1 and 2.0 via a directly referenced Best Practices document that calls on implementers to be wary of SSRF."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "La especificaci\u00f3n W3C XML Signature Syntax and Processing (XMLDsig), a partir de 1.0, se public\u00f3 originalmente con una declaraci\u00f3n \"RetrievalMethod es un URI... que puede usarse para obtener informaci\u00f3n de clave y/o certificado\" y sin informaci\u00f3n adjunta sobre los riesgos de SSRF, y esto puede haber contribuido a implementaciones vulnerables como las analizadas en CVE-2023-36661 y CVE-2024-21893. NOTA: esto se mitig\u00f3 en 1.1 y 2.0 a trav\u00e9s de un documento de Mejores Pr\u00e1cticas al que se hace referencia directamente y que pide a los implementadores que tengan cuidado con la SSRF."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
|
@ -2,12 +2,16 @@
|
||||
"id": "CVE-2024-35526",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-06-25T21:15:59.170",
|
||||
"lastModified": "2024-06-25T21:15:59.170",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-06-26T12:44:29.693",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "An issue in Daemon PTY Limited FarCry Core framework before 7.2.14 allows attackers to access sensitive information in the /facade directory."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Un problema en Daemon PTY Limited FarCry Core framework anterior a 7.2.14 permite a los atacantes acceder a informaci\u00f3n confidencial en el directorio /facade."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
|
@ -2,12 +2,16 @@
|
||||
"id": "CVE-2024-35527",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-06-25T22:15:30.403",
|
||||
"lastModified": "2024-06-25T22:15:30.403",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-06-26T12:44:29.693",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "An arbitrary file upload vulnerability in /fileupload/upload.cfm in Daemon PTY Limited FarCry Core framework before 7.2.14 allows attackers to execute arbitrary code via uploading a crafted .cfm file."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Una vulnerabilidad de carga de archivos arbitrarios en /fileupload/upload.cfm en Daemon PTY Limited FarCry Core framework anterior a 7.2.14 permite a los atacantes ejecutar c\u00f3digo arbitrario cargando un archivo .cfm manipulado."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
|
@ -2,12 +2,16 @@
|
||||
"id": "CVE-2024-36819",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-06-25T19:15:11.837",
|
||||
"lastModified": "2024-06-25T19:15:11.837",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-06-26T12:44:29.693",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "MAP-OS 4.45.0 and earlier is vulnerable to Cross-Site Scripting (XSS). This vulnerability allows malicious users to insert a malicious payload into the \"Client Name\" input. When a service order from this client is created, the malicious payload is displayed on the administrator and employee dashboards, resulting in unauthorized script execution whenever the dashboard is loaded."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "MAP-OS 4.45.0 y versiones anteriores son vulnerables a Cross-Site Scripting (XSS). Esta vulnerabilidad permite a usuarios malintencionados insertar un payload malicioso en la entrada \"Nombre del cliente\". Cuando se crea una orden de servicio de este cliente, el payload malicioso se muestra en los paneles de administrador y de empleado, lo que resulta en la ejecuci\u00f3n de scripts no autorizados cada vez que se carga el panel."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
|
@ -2,12 +2,16 @@
|
||||
"id": "CVE-2024-3633",
|
||||
"sourceIdentifier": "contact@wpscan.com",
|
||||
"published": "2024-06-26T06:15:15.400",
|
||||
"lastModified": "2024-06-26T06:15:15.400",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-06-26T12:44:29.693",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "The WebP & SVG Support WordPress plugin through 1.4.0 does not sanitise uploaded SVG files, which could allow users with a role as low as Author to upload a malicious SVG containing XSS payloads."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "El complemento WebP & SVG Support de WordPress hasta la versi\u00f3n 1.4.0 no sanitiza los archivos SVG cargados, lo que podr\u00eda permitir a los usuarios con un rol tan bajo como Autor cargar un SVG malicioso que contenga payloads XSS."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
|
@ -2,12 +2,16 @@
|
||||
"id": "CVE-2024-37098",
|
||||
"sourceIdentifier": "audit@patchstack.com",
|
||||
"published": "2024-06-26T11:15:51.613",
|
||||
"lastModified": "2024-06-26T11:15:51.613",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-06-26T12:44:29.693",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Server-Side Request Forgery (SSRF) vulnerability in Blossom Themes BlossomThemes Email Newsletter.This issue affects BlossomThemes Email Newsletter: from n/a through 2.2.6."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Vulnerabilidad de Server Side Request Forgery (SSRF) en Blossom Themes BlossomThemes Email Newsletter. Este problema afecta a BlossomThemes Email Newsletter: desde n/a hasta 2.2.6."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
|
@ -2,12 +2,16 @@
|
||||
"id": "CVE-2024-37138",
|
||||
"sourceIdentifier": "security_alert@emc.com",
|
||||
"published": "2024-06-26T04:15:13.000",
|
||||
"lastModified": "2024-06-26T04:15:13.000",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-06-26T12:44:29.693",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Dell PowerProtect DD, versions prior to 8.0, LTS 7.13.1.0, LTS 7.10.1.30, LTS 7.7.5.40 on DDMC contain a relative path traversal vulnerability. A remote high privileged attacker could potentially exploit this vulnerability, leading to the application sending over an unauthorized file to the managed system."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Dell PowerProtect DD, versiones anteriores a 8.0, LTS 7.13.1.0, LTS 7.10.1.30, LTS 7.7.5.40 en DDMC contienen una vulnerabilidad de Path Traversal relativo. Un atacante remoto con altos privilegios podr\u00eda explotar esta vulnerabilidad, lo que provocar\u00eda que la aplicaci\u00f3n env\u00ede un archivo no autorizado al sistema administrado."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
|
@ -2,12 +2,16 @@
|
||||
"id": "CVE-2024-37139",
|
||||
"sourceIdentifier": "security_alert@emc.com",
|
||||
"published": "2024-06-26T04:15:13.350",
|
||||
"lastModified": "2024-06-26T04:15:13.350",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-06-26T12:44:29.693",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Dell PowerProtect DD, versions prior to 8.0, LTS 7.13.1.0, LTS 7.10.1.30, LTS 7.7.5.40 contain an Improper Control of a Resource Through its Lifetime vulnerability in an admin operation. A remote low privileged attacker could potentially exploit this vulnerability, leading to temporary resource constraint of system application. Exploitation may lead to denial of service of the application."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Dell PowerProtect DD, versiones anteriores a 8.0, LTS 7.13.1.0, LTS 7.10.1.30, LTS 7.7.5.40 contienen una vulnerabilidad de control inadecuado de un recurso durante su vida \u00fatil en una operaci\u00f3n de administraci\u00f3n. Un atacante remoto con pocos privilegios podr\u00eda explotar esta vulnerabilidad, lo que provocar\u00eda una limitaci\u00f3n temporal de recursos de la aplicaci\u00f3n del sistema. La explotaci\u00f3n puede dar lugar a la denegaci\u00f3n del servicio de la aplicaci\u00f3n."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
|
@ -2,12 +2,16 @@
|
||||
"id": "CVE-2024-37140",
|
||||
"sourceIdentifier": "security_alert@emc.com",
|
||||
"published": "2024-06-26T04:15:13.667",
|
||||
"lastModified": "2024-06-26T04:15:13.667",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-06-26T12:44:29.693",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Dell PowerProtect DD, versions prior to 8.0, LTS 7.13.1.0, LTS 7.10.1.30, LTS 7.7.5.40 contain an OS command injection vulnerability in an admin operation. A remote low privileged attacker could potentially exploit this vulnerability, leading to the execution of arbitrary OS commands on the system application's underlying OS with the privileges of the vulnerable application. Exploitation may lead to a system take over by an attacker."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Dell PowerProtect DD, versiones anteriores a 8.0, LTS 7.13.1.0, LTS 7.10.1.30, LTS 7.7.5.40 contienen una vulnerabilidad de inyecci\u00f3n de comandos del sistema operativo en una operaci\u00f3n de administraci\u00f3n. Un atacante remoto con pocos privilegios podr\u00eda explotar esta vulnerabilidad, lo que llevar\u00eda a la ejecuci\u00f3n de comandos arbitrarios del sistema operativo en el sistema operativo subyacente de la aplicaci\u00f3n del sistema con los privilegios de la aplicaci\u00f3n vulnerable. La explotaci\u00f3n puede llevar a que un atacante se apodere del sistema."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
|
@ -2,12 +2,16 @@
|
||||
"id": "CVE-2024-37141",
|
||||
"sourceIdentifier": "security_alert@emc.com",
|
||||
"published": "2024-06-26T04:15:13.940",
|
||||
"lastModified": "2024-06-26T04:15:13.940",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-06-26T12:44:29.693",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Dell PowerProtect DD, versions prior to 8.0, LTS 7.13.1.0, LTS 7.10.1.30, LTS 7.7.5.40 contain an open redirect vulnerability. A remote low privileged attacker could potentially exploit this vulnerability, leading to information disclosure."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Dell PowerProtect DD, versiones anteriores a 8.0, LTS 7.13.1.0, LTS 7.10.1.30, LTS 7.7.5.40 contienen una vulnerabilidad de redireccionamiento abierto. Un atacante remoto con pocos privilegios podr\u00eda explotar esta vulnerabilidad, lo que llevar\u00eda a la divulgaci\u00f3n de informaci\u00f3n."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
|
@ -2,12 +2,16 @@
|
||||
"id": "CVE-2024-37167",
|
||||
"sourceIdentifier": "security-advisories@github.com",
|
||||
"published": "2024-06-25T20:15:11.513",
|
||||
"lastModified": "2024-06-25T20:15:11.513",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-06-26T12:44:29.693",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Tuleap is an Open Source Suite to improve management of software developments and collaboration. Users are able to see backlog items that they should not see. This issue has been patched in Tuleap Community Edition version 15.9.99.97."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Tuleap es una suite de c\u00f3digo abierto para mejorar la gesti\u00f3n de los desarrollos de software y la colaboraci\u00f3n. Los usuarios pueden ver los elementos pendientes que no deber\u00edan ver. Este problema se solucion\u00f3 en la versi\u00f3n 15.9.99.97 de Tuleap Community Edition."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
|
@ -2,12 +2,16 @@
|
||||
"id": "CVE-2024-37252",
|
||||
"sourceIdentifier": "audit@patchstack.com",
|
||||
"published": "2024-06-26T11:15:51.860",
|
||||
"lastModified": "2024-06-26T11:15:51.860",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-06-26T12:44:29.693",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Icegram Email Subscribers & Newsletters allows SQL Injection.This issue affects Email Subscribers & Newsletters: from n/a through 5.7.25."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "La neutralizaci\u00f3n inadecuada de elementos especiales utilizados en una vulnerabilidad de comando SQL ('inyecci\u00f3n SQL') en Icegram Email Subscribers & Newsletters permite la inyecci\u00f3n de SQL. Este problema afecta a Email Subscribers & Newsletters: desde n/a hasta 5.7.25."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
|
@ -2,12 +2,16 @@
|
||||
"id": "CVE-2024-37742",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-06-25T22:15:35.183",
|
||||
"lastModified": "2024-06-25T22:15:35.183",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-06-26T12:44:29.693",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "An issue in Safe Exam Browser for Windows before 3.6 allows an attacker to share clipboard data between the SEB kiosk mode and the underlying system, compromising exam integrity which may lead to arbitrary code execution and obtaining sensitive information via the Clipboard Management component."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Un problema en Safe Exam Browser para Windows anterior a 3.6 permite a un atacante compartir datos del portapapeles entre el modo quiosco SEB y el sistema subyacente, comprometiendo la integridad del examen, lo que puede llevar a la ejecuci\u00f3n de c\u00f3digo arbitrario y a la obtenci\u00f3n de informaci\u00f3n confidencial a trav\u00e9s del componente de administraci\u00f3n del portapapeles."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
|
@ -2,12 +2,16 @@
|
||||
"id": "CVE-2024-37820",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-06-25T19:15:11.943",
|
||||
"lastModified": "2024-06-25T19:15:11.943",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-06-26T12:44:29.693",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A nil pointer dereference in PingCAP TiDB v8.2.0-alpha-216-gfe5858b allows attackers to crash the application via expression.inferCollation."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Una desreferencia de puntero nulo en PingCAP TiDB v8.2.0-alpha-216-gfe5858b permite a los atacantes bloquear la aplicaci\u00f3n mediante expression.inferCollation."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
|
@ -2,12 +2,16 @@
|
||||
"id": "CVE-2024-37843",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-06-25T21:15:59.770",
|
||||
"lastModified": "2024-06-25T21:15:59.770",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-06-26T12:44:29.693",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Craft CMS up to v3.7.31 was discovered to contain a SQL injection vulnerability via the GraphQL API endpoint."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Se descubri\u00f3 que Craft CMS hasta v3.7.31 conten\u00eda una vulnerabilidad de inyecci\u00f3n SQL a trav\u00e9s del endpoint de la API GraphQL."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
|
@ -2,12 +2,16 @@
|
||||
"id": "CVE-2024-37855",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-06-25T21:15:59.867",
|
||||
"lastModified": "2024-06-25T21:15:59.867",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-06-26T12:44:29.693",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "An issue in Nepstech Wifi Router xpon (terminal) NTPL-Xpon1GFEVN, hardware verstion 1.0 firmware 2.0.1 allows a remote attacker to execute arbitrary code via the router's Telnet port 2345 without requiring authentication credentials."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Un problema en Nepstech Wifi Router xpon (terminal) NTPL-Xpon1GFEVN, la versi\u00f3n de hardware 1.0, firmware 2.0.1, permite a un atacante remoto ejecutar c\u00f3digo arbitrario a trav\u00e9s del puerto Telnet 2345 del enrutador sin requerir credenciales de autenticaci\u00f3n."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
|
@ -2,12 +2,16 @@
|
||||
"id": "CVE-2024-37894",
|
||||
"sourceIdentifier": "security-advisories@github.com",
|
||||
"published": "2024-06-25T20:15:11.873",
|
||||
"lastModified": "2024-06-25T20:15:11.873",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-06-26T12:44:29.693",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Squid is a caching proxy for the Web supporting HTTP, HTTPS, FTP, and more. Due to an Out-of-bounds Write error when assigning ESI variables, Squid is susceptible to a Memory Corruption error. This error can lead to a Denial of Service attack."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Squid es un proxy de almacenamiento en cach\u00e9 para la Web que admite HTTP, HTTPS, FTP y m\u00e1s. Debido a un error de escritura fuera de los l\u00edmites al asignar variables ESI, Squid es susceptible a un error de corrupci\u00f3n de memoria. Este error puede provocar un ataque de denegaci\u00f3n de servicio."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
|
@ -2,12 +2,16 @@
|
||||
"id": "CVE-2024-38364",
|
||||
"sourceIdentifier": "security-advisories@github.com",
|
||||
"published": "2024-06-26T00:15:10.480",
|
||||
"lastModified": "2024-06-26T00:15:10.480",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-06-26T12:44:29.693",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "DSpace is an open source software is a turnkey repository application used by more than 2,000 organizations and institutions worldwide to provide durable access to digital resources. In DSpace 7.0 through 7.6.1, when an HTML, XML or JavaScript Bitstream is downloaded, the user's browser may execute any embedded JavaScript. If that embedded JavaScript is malicious, there is a risk of an XSS attack. This vulnerability has been patched in version 7.6.2."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "DSpace es un software de c\u00f3digo abierto, una aplicaci\u00f3n de repositorio llave en mano utilizada por m\u00e1s de 2000 organizaciones e instituciones en todo el mundo para brindar acceso duradero a recursos digitales. En DSpace 7.0 a 7.6.1, cuando se descarga un Bitstream HTML, XML o JavaScript, el navegador del usuario puede ejecutar cualquier JavaScript incrustado. Si ese JavaScript incrustado es malicioso, existe el riesgo de sufrir un ataque XSS. Esta vulnerabilidad ha sido parcheada en la versi\u00f3n 7.6.2."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
|
@ -2,12 +2,16 @@
|
||||
"id": "CVE-2024-38516",
|
||||
"sourceIdentifier": "security-advisories@github.com",
|
||||
"published": "2024-06-25T21:15:59.957",
|
||||
"lastModified": "2024-06-25T21:15:59.957",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-06-26T12:44:29.693",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "ai-client-html is an Aimeos e-commerce HTML client component. Debug information revealed sensitive information from environment variables in error log. This issue has been patched in versions 2024.04.7, 2023.10.15, 2022.10.13 and 2021.10.22."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "ai-client-html es un componente del cliente HTML de comercio electr\u00f3nico de Aimeos. La informaci\u00f3n de depuraci\u00f3n revel\u00f3 informaci\u00f3n confidencial de las variables de entorno en el registro de errores. Este problema se solucion\u00f3 en las versiones 2024.04.7, 2023.10.15, 2022.10.13 y 2021.10.22."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
|
@ -2,12 +2,16 @@
|
||||
"id": "CVE-2024-38526",
|
||||
"sourceIdentifier": "security-advisories@github.com",
|
||||
"published": "2024-06-26T00:15:10.703",
|
||||
"lastModified": "2024-06-26T00:15:10.703",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-06-26T12:44:29.693",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "pdoc provides API Documentation for Python Projects. Documentation generated with `pdoc --math` linked to JavaScript files from polyfill.io. The polyfill.io CDN has been sold and now serves malicious code. This issue has been fixed in pdoc 14.5.1."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "pdoc proporciona documentaci\u00f3n API para proyectos Python. Documentaci\u00f3n generada con `pdoc --math` vinculada a archivos JavaScript de polyfill.io. El CDN polyfill.io se vendi\u00f3 y ahora contiene c\u00f3digo malicioso. Este problema se solucion\u00f3 en pdoc 14.5.1."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
|
@ -2,27 +2,115 @@
|
||||
"id": "CVE-2024-38664",
|
||||
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"published": "2024-06-24T14:15:12.707",
|
||||
"lastModified": "2024-06-24T19:26:35.967",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-06-26T13:52:23.033",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm: zynqmp_dpsub: Always register bridge\n\nWe must always register the DRM bridge, since zynqmp_dp_hpd_work_func\ncalls drm_bridge_hpd_notify, which in turn expects hpd_mutex to be\ninitialized. We do this before zynqmp_dpsub_drm_init since that calls\ndrm_bridge_attach. This fixes the following lockdep warning:\n\n[ 19.217084] ------------[ cut here ]------------\n[ 19.227530] DEBUG_LOCKS_WARN_ON(lock->magic != lock)\n[ 19.227768] WARNING: CPU: 0 PID: 140 at kernel/locking/mutex.c:582 __mutex_lock+0x4bc/0x550\n[ 19.241696] Modules linked in:\n[ 19.244937] CPU: 0 PID: 140 Comm: kworker/0:4 Not tainted 6.6.20+ #96\n[ 19.252046] Hardware name: xlnx,zynqmp (DT)\n[ 19.256421] Workqueue: events zynqmp_dp_hpd_work_func\n[ 19.261795] pstate: 60000005 (nZCv daif -PAN -UAO -TCO -DIT -SSBS BTYPE=--)\n[ 19.269104] pc : __mutex_lock+0x4bc/0x550\n[ 19.273364] lr : __mutex_lock+0x4bc/0x550\n[ 19.277592] sp : ffffffc085c5bbe0\n[ 19.281066] x29: ffffffc085c5bbe0 x28: 0000000000000000 x27: ffffff88009417f8\n[ 19.288624] x26: ffffff8800941788 x25: ffffff8800020008 x24: ffffffc082aa3000\n[ 19.296227] x23: ffffffc080d90e3c x22: 0000000000000002 x21: 0000000000000000\n[ 19.303744] x20: 0000000000000000 x19: ffffff88002f5210 x18: 0000000000000000\n[ 19.311295] x17: 6c707369642e3030 x16: 3030613464662072 x15: 0720072007200720\n[ 19.318922] x14: 0000000000000000 x13: 284e4f5f4e524157 x12: 0000000000000001\n[ 19.326442] x11: 0001ffc085c5b940 x10: 0001ff88003f388b x9 : 0001ff88003f3888\n[ 19.334003] x8 : 0001ff88003f3888 x7 : 0000000000000000 x6 : 0000000000000000\n[ 19.341537] x5 : 0000000000000000 x4 : 0000000000001668 x3 : 0000000000000000\n[ 19.349054] x2 : 0000000000000000 x1 : 0000000000000000 x0 : ffffff88003f3880\n[ 19.356581] Call trace:\n[ 19.359160] __mutex_lock+0x4bc/0x550\n[ 19.363032] mutex_lock_nested+0x24/0x30\n[ 19.367187] drm_bridge_hpd_notify+0x2c/0x6c\n[ 19.371698] zynqmp_dp_hpd_work_func+0x44/0x54\n[ 19.376364] process_one_work+0x3ac/0x988\n[ 19.380660] worker_thread+0x398/0x694\n[ 19.384736] kthread+0x1bc/0x1c0\n[ 19.388241] ret_from_fork+0x10/0x20\n[ 19.392031] irq event stamp: 183\n[ 19.395450] hardirqs last enabled at (183): [<ffffffc0800b9278>] finish_task_switch.isra.0+0xa8/0x2d4\n[ 19.405140] hardirqs last disabled at (182): [<ffffffc081ad3754>] __schedule+0x714/0xd04\n[ 19.413612] softirqs last enabled at (114): [<ffffffc080133de8>] srcu_invoke_callbacks+0x158/0x23c\n[ 19.423128] softirqs last disabled at (110): [<ffffffc080133de8>] srcu_invoke_callbacks+0x158/0x23c\n[ 19.432614] ---[ end trace 0000000000000000 ]---\n\n(cherry picked from commit 61ba791c4a7a09a370c45b70a81b8c7d4cf6b2ae)"
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "En el kernel de Linux se ha resuelto la siguiente vulnerabilidad: drm: zynqmp_dpsub: Registrar siempre puente Siempre debemos registrar el puente DRM, ya que zynqmp_dp_hpd_work_func llama a drm_bridge_hpd_notify, que a su vez espera que hpd_mutex se inicialice. Hacemos esto antes de zynqmp_dpsub_drm_init ya que llama a drm_bridge_attach. Esto corrige la siguiente advertencia de bloqueo: [19.217084] ------------[ cortar aqu\u00ed ]------------ [ 19.227530] DEBUG_LOCKS_WARN_ON(lock->magic != lock ) [ 19.227768] ADVERTENCIA: CPU: 0 PID: 140 en kernel/locking/mutex.c:582 __mutex_lock+0x4bc/0x550 [ 19.241696] M\u00f3dulos vinculados en: [ 19.244937] CPU: 0 PID: 140 Comm: kworker/0:4 No contaminado 6.6.20+ #96 [19.252046] Nombre de hardware: xlnx,zynqmp (DT) [19.256421] Cola de trabajo: eventos zynqmp_dp_hpd_work_func [19.261795] pstate: 60000005 (nZCv daif -PAN -UAO -TCO -DIT -SSBS PE=-- ) [ 19.269104] pc : __mutex_lock+0x4bc/0x550 [ 19.273364] lr : __mutex_lock+0x4bc/0x550 [ 19.277592] sp : ffffffc085c5bbe0 [ 19.281066] x29: ffffffc085c5bbe0 8: 0000000000000000 x27: ffffff88009417f8 [ 19.288624] x26: ffffff8800941788 x25: ffffff8800020008 x24: ffffffc082aa3000 [ 19.296227] x23: ffffffc080d90e3c x22: 0000000000000002 x21: 00000000000000000 [ 19.303744] x20: 0000000000000000 x19: ffffff88002f5210 x18: 0000000000000000 [ 19.311295] x17: 6c707369642e3030 x16: 3030613464662072 x15: 0720072007200720 [ 19.318922] 4: 0000000000000000 x13: 284e4f5f4e524157 x12: 0000000000000001 [ 19.326442] x11: 0001ffc085c5b940 x10: 0001ff88003f388b x9: 0001ff88003f3888 [19.334003] x8: 0001ff88003f3888 x7: 0000000000000000 x6 : 0000000000000000 [ 19.341537] x5 : 0000000000000000 x4 : 0000000000001668 x3 : 0000000000000000 [ 19.349054] x2 : 0000000000000000 x1 : 0000000000000000 x0 : ffffff88003f3880 [ 19.356581] Seguimiento de llamadas: [ 19.359160] __mutex_lock+0x4bc/0x550 [ 19.363032] mutex_lock_nested+0x24/0x30 [ 19.367187] drm_bridge_hpd_notify+0x2c/0x6c [ zynqmp_dp_hpd_work_func +0x44/0x54 [ 19.376364] proceso_un_trabajo+0x3ac/0x988 [ 19.380660] hilo_trabajador+0x398/ 0x694 [19.384736] kthread+0x1bc/0x1c0 [19.388241] ret_from_fork+0x10/0x20 [19.392031] sello de evento irq: 183 [19.395450] hardirqs habilitado por \u00faltima vez en (183): [] terminar_task_switch.isra.0+0xa8/0x2d4 [ 19.405140] hardirqs deshabilitado por \u00faltima vez en (182): [] __schedule+0x714/0xd04 [ 19.413612] softirqs habilitado por \u00faltima vez en (114): [] srcu_invoke_callbacks+0x158/0x23c 19.423128] softirqs se deshabilit\u00f3 por \u00faltima vez en ( 110): [] srcu_invoke_callbacks+0x158/0x23c [ 19.432614] ---[ end trace 0000000000000000 ]--- (seleccionado de el commit 61ba791c4a7a09a370c45b70a81b8c7d4 cf6b2ae)"
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 7.8,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-667"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "6.2",
|
||||
"matchCriteriaId": "108695B6-7133-4B6C-80AF-0F66880FE858"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "6.6",
|
||||
"versionEndExcluding": "6.6.33",
|
||||
"matchCriteriaId": "53BC60D9-65A5-4D8F-96C8-149F09214DBD"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "6.9",
|
||||
"versionEndExcluding": "6.9.4",
|
||||
"matchCriteriaId": "A500F935-F0ED-4DC7-AD02-9D7C365D13AE"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:6.10.0:rc1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "C40DD2D9-90E3-4E95-9F1A-E7C680F11F2A"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/603661357056b5e5ba6d86f505fbc936eff396ba",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Mailing List",
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/6ead3eccf67bc8318b1ce95ed879b2cc05b4fce9",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Mailing List",
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/be3f3042391d061cfca2bd22630e0d101acea5fc",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Mailing List",
|
||||
"Patch"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,31 +2,130 @@
|
||||
"id": "CVE-2024-38667",
|
||||
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"published": "2024-06-24T14:15:12.790",
|
||||
"lastModified": "2024-06-24T19:26:35.967",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-06-26T13:53:56.883",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\nriscv: prevent pt_regs corruption for secondary idle threads\n\nTop of the kernel thread stack should be reserved for pt_regs. However\nthis is not the case for the idle threads of the secondary boot harts.\nTheir stacks overlap with their pt_regs, so both may get corrupted.\n\nSimilar issue has been fixed for the primary hart, see c7cdd96eca28\n(\"riscv: prevent stack corruption by reserving task_pt_regs(p) early\").\nHowever that fix was not propagated to the secondary harts. The problem\nhas been noticed in some CPU hotplug tests with V enabled. The function\nsmp_callin stored several registers on stack, corrupting top of pt_regs\nstructure including status field. As a result, kernel attempted to save\nor restore inexistent V context."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "En el kernel de Linux, se resolvi\u00f3 la siguiente vulnerabilidad: riscv: evita la corrupci\u00f3n de pt_regs para subprocesos inactivos secundarios La parte superior de la pila de subprocesos del kernel debe reservarse para pt_regs. Sin embargo, este no es el caso de los subprocesos inactivos de los corazones de arranque secundarios. Sus pilas se superponen con sus pt_regs, por lo que ambos pueden corromperse. Se ha solucionado un problema similar para el coraz\u00f3n principal; consulte c7cdd96eca28 (\"riscv: evite la corrupci\u00f3n de la pila reservando task_pt_regs(p) anticipadamente\"). Sin embargo, esa soluci\u00f3n no se propag\u00f3 a los corazones secundarios. El problema se ha observado en algunas pruebas de conexi\u00f3n en caliente de CPU con V habilitado. La funci\u00f3n smp_callin almacen\u00f3 varios registros en la pila, corrompiendo la parte superior de la estructura pt_regs, incluido el campo de estado. Como resultado, el kernel intent\u00f3 guardar o restaurar el contexto V inexistente."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 7.8,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-787"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "5.7",
|
||||
"matchCriteriaId": "C3821E00-CCBB-4CD4-AD2C-D47DFF2F5A34"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "6.1",
|
||||
"versionEndExcluding": "6.1.93",
|
||||
"matchCriteriaId": "7446FC33-DC4F-4D31-94B5-FB577CFA66F4"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "6.6",
|
||||
"versionEndExcluding": "6.6.33",
|
||||
"matchCriteriaId": "53BC60D9-65A5-4D8F-96C8-149F09214DBD"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "6.9",
|
||||
"versionEndExcluding": "6.9.4",
|
||||
"matchCriteriaId": "A500F935-F0ED-4DC7-AD02-9D7C365D13AE"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:6.10.0:rc1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "C40DD2D9-90E3-4E95-9F1A-E7C680F11F2A"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/0c1f28c32a194303da630fca89481334b9547b80",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Mailing List",
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/3090c06d50eaa91317f84bf3eac4c265e6cb8d44",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Mailing List",
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/a638b0461b58aa3205cd9d5f14d6f703d795b4af",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Mailing List",
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/ea22d4195cca13d5fdbc4d6555a2dfb8a7867a9e",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Mailing List",
|
||||
"Patch"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,12 +2,16 @@
|
||||
"id": "CVE-2024-4105",
|
||||
"sourceIdentifier": "7168b535-132a-4efe-a076-338f829b2eb9",
|
||||
"published": "2024-06-26T06:15:15.500",
|
||||
"lastModified": "2024-06-26T06:15:15.500",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-06-26T12:44:29.693",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A vulnerability has been found in FAST/TOOLS and CI Server. The affected product's WEB HMI server's function to process HTTP requests has a security flaw (Reflected XSS) that allows the execution of malicious scripts. Therefore, if a client PC with inadequate security measures accesses a product URL containing a malicious request, the malicious script may be executed on the client PC.\nThe affected products and versions are as follows:\nFAST/TOOLS (Packages: RVSVRN, UNSVRN, HMIWEB, FTEES, HMIMOB) R9.01 to R10.04\nCI Server R1.01.00 to R1.03.00"
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Se ha encontrado una vulnerabilidad en FAST/TOOLS y CI Server. La funci\u00f3n del servidor WEB HMI del producto afectado para procesar solicitudes HTTP tiene un fallo de seguridad (XSS Reflejado) que permite la ejecuci\u00f3n de scripts maliciosos. Por lo tanto, si una PC cliente con medidas de seguridad inadecuadas accede a la URL de un producto que contiene una solicitud maliciosa, el script malicioso puede ejecutarse en la PC cliente. Los productos y versiones afectados son los siguientes: FAST/TOOLS (Paquetes: RVSVRN, UNSVRN, HMIWEB, FTEES, HMIMOB) R9.01 a R10.04 CI Server R1.01.00 a R1.03.00"
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
|
@ -2,12 +2,16 @@
|
||||
"id": "CVE-2024-4106",
|
||||
"sourceIdentifier": "7168b535-132a-4efe-a076-338f829b2eb9",
|
||||
"published": "2024-06-26T06:15:15.830",
|
||||
"lastModified": "2024-06-26T06:15:15.830",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-06-26T12:44:29.693",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A vulnerability has been found in FAST/TOOLS and CI Server. The affected products have built-in accounts with no passwords set. Therefore, if the product is operated without a password set by default, an attacker can break into the affected product.\nThe affected products and versions are as follows:\nFAST/TOOLS (Packages: RVSVRN, UNSVRN, HMIWEB, FTEES, HMIMOB) R9.01 to R10.04\nCI Server R1.01.00 to R1.03.00"
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Se ha encontrado una vulnerabilidad en FAST/TOOLS y CI Server. Los productos afectados tienen cuentas integradas sin contrase\u00f1as establecidas. Por lo tanto, si el producto se utiliza sin una contrase\u00f1a predeterminada, un atacante puede acceder al producto afectado. Los productos y versiones afectados son los siguientes: FAST/TOOLS (Paquetes: RVSVRN, UNSVRN, HMIWEB, FTEES, HMIMOB) R9.01 a R10.04 CI Server R1.01.00 a R1.03.00"
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
|
@ -2,12 +2,16 @@
|
||||
"id": "CVE-2024-4498",
|
||||
"sourceIdentifier": "security@huntr.dev",
|
||||
"published": "2024-06-25T20:15:12.127",
|
||||
"lastModified": "2024-06-25T20:15:12.127",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-06-26T12:44:29.693",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A Path Traversal and Remote File Inclusion (RFI) vulnerability exists in the parisneo/lollms-webui application, affecting versions v9.7 to the latest. The vulnerability arises from insufficient input validation in the `/apply_settings` function, allowing an attacker to manipulate the `discussion_db_name` parameter to traverse the file system and include arbitrary files. This issue is compounded by the bypass of input filtering in the `install_binding`, `reinstall_binding`, and `unInstall_binding` endpoints, despite the presence of a `sanitize_path_from_endpoint(data.name)` filter. Successful exploitation enables an attacker to upload and execute malicious code on the victim's system, leading to Remote Code Execution (RCE)."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Existe una vulnerabilidad de Path Traversal e inclusi\u00f3n remota de archivos (RFI) en la aplicaci\u00f3n parisneo/lollms-webui, que afecta a las versiones v9.7 hasta la \u00faltima. La vulnerabilidad surge de una validaci\u00f3n de entrada insuficiente en la funci\u00f3n `/apply_settings`, lo que permite a un atacante manipular el par\u00e1metro `discussion_db_name` para atravesar el sistema de archivos e incluir archivos arbitrarios. Este problema se ve agravado por la omisi\u00f3n del filtrado de entrada en los endpoints `install_binding`, `reinstall_binding` y `unInstall_binding`, a pesar de la presencia de un filtro `sanitize_path_from_endpoint(data.name)`. La explotaci\u00f3n exitosa permite a un atacante cargar y ejecutar c\u00f3digo malicioso en el sistema de la v\u00edctima, lo que lleva a la ejecuci\u00f3n remota de c\u00f3digo (RCE)."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
|
@ -2,12 +2,16 @@
|
||||
"id": "CVE-2024-4758",
|
||||
"sourceIdentifier": "contact@wpscan.com",
|
||||
"published": "2024-06-26T06:15:16.133",
|
||||
"lastModified": "2024-06-26T06:15:16.133",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-06-26T12:44:29.693",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "The Muslim Prayer Time BD WordPress plugin through 2.4 does not have CSRF check in place when reseting its settings, which could allow attackers to make a logged in admin reset them via a CSRF attack"
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "El complemento Muslim Prayer Time BD de WordPress hasta la versi\u00f3n 2.4 no tiene activada la verificaci\u00f3n CSRF al restablecer su configuraci\u00f3n, lo que podr\u00eda permitir a los atacantes hacer que un administrador que haya iniciado sesi\u00f3n los restablezca mediante un ataque CSRF."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
|
@ -2,12 +2,16 @@
|
||||
"id": "CVE-2024-4869",
|
||||
"sourceIdentifier": "security@wordfence.com",
|
||||
"published": "2024-06-26T00:15:10.897",
|
||||
"lastModified": "2024-06-26T00:15:10.897",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-06-26T12:44:29.693",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "The WP Cookie Consent ( for GDPR, CCPA & ePrivacy ) plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the \u2018Client-IP\u2019 header in all versions up to, and including, 3.2.0 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "El complemento WP Cookie Consent (para GDPR, CCPA y ePrivacy) para WordPress es vulnerable a Cross-Site Scripting Almacenado a trav\u00e9s del encabezado 'Client-IP' en todas las versiones hasta la 3.2.0 incluida debido a una sanitizaci\u00f3n insuficiente de la entrada y un escape de salida. Esto hace posible que atacantes no autenticados inyecten scripts web arbitrarios en p\u00e1ginas que se ejecutar\u00e1n cada vez que un usuario acceda a una p\u00e1gina inyectada."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
|
@ -2,12 +2,16 @@
|
||||
"id": "CVE-2024-4883",
|
||||
"sourceIdentifier": "security@progress.com",
|
||||
"published": "2024-06-25T20:15:12.320",
|
||||
"lastModified": "2024-06-25T20:15:12.320",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-06-26T12:44:29.693",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "In WhatsUp Gold versions released before 2023.1.3, a Remote Code Execution issue exists in Progress WhatsUp Gold. This vulnerability allows an unauthenticated attacker to achieve the RCE as a service account through NmApi.exe."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "En las versiones de WhatsUp Gold lanzadas antes de 2023.1.3, existe un problema de ejecuci\u00f3n remota de c\u00f3digo en Progress WhatsUp Gold. Esta vulnerabilidad permite que un atacante no autenticado obtenga RCE como cuenta de servicio a trav\u00e9s de NmApi.exe."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
|
@ -2,12 +2,16 @@
|
||||
"id": "CVE-2024-4884",
|
||||
"sourceIdentifier": "security@progress.com",
|
||||
"published": "2024-06-25T20:15:12.547",
|
||||
"lastModified": "2024-06-25T20:15:12.547",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-06-26T12:44:29.693",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "In WhatsUp Gold versions released before 2023.1.3,\u00a0an unauthenticated Remote Code Execution vulnerability in Progress WhatsUpGold.\u00a0\u00a0The Apm.UI.Areas.APM.Controllers.CommunityController\n\n allows execution of commands with iisapppool\\nmconsole privileges."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "En las versiones de WhatsUp Gold lanzadas antes de 2023.1.3, se detect\u00f3 una vulnerabilidad de ejecuci\u00f3n remota de c\u00f3digo no autenticada en WhatsUpGold en curso. Apm.UI.Areas.APM.Controllers.CommunityController permite la ejecuci\u00f3n de comandos con privilegios de iisapppool\\nmconsole."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
|
@ -2,12 +2,16 @@
|
||||
"id": "CVE-2024-4885",
|
||||
"sourceIdentifier": "security@progress.com",
|
||||
"published": "2024-06-25T20:15:12.970",
|
||||
"lastModified": "2024-06-25T20:15:12.970",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-06-26T12:44:29.693",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "In WhatsUp Gold versions released before 2023.1.3,\u00a0an unauthenticated Remote Code Execution vulnerability in Progress WhatsUpGold.\u00a0\u00a0The \n\nWhatsUp.ExportUtilities.Export.GetFileWithoutZip\n\n\n\n allows execution of commands with iisapppool\\nmconsole privileges."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "En las versiones de WhatsUp Gold lanzadas antes de 2023.1.3, se detect\u00f3 una vulnerabilidad de ejecuci\u00f3n remota de c\u00f3digo no autenticada en WhatsUpGold en curso. WhatsUp.ExportUtilities.Export.GetFileWithoutZip permite la ejecuci\u00f3n de comandos con privilegios de iisapppool\\nmconsole."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
|
@ -2,12 +2,16 @@
|
||||
"id": "CVE-2024-4957",
|
||||
"sourceIdentifier": "contact@wpscan.com",
|
||||
"published": "2024-06-26T06:15:16.237",
|
||||
"lastModified": "2024-06-26T06:15:16.237",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-06-26T12:44:29.693",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "The Frontend Checklist WordPress plugin through 2.3.2 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup)"
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "El complemento Frontend Checklist de WordPress hasta la versi\u00f3n 2.3.2 no sanitiza ni escapa a algunas de sus configuraciones, lo que podr\u00eda permitir a usuarios con privilegios elevados, como el administrador, realizar ataques de Cross-Site Scripting Almacenado incluso cuando la capacidad unfiltered_html no est\u00e1 permitida (por ejemplo, en una configuraci\u00f3n multisitio)."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
|
@ -2,12 +2,16 @@
|
||||
"id": "CVE-2024-4959",
|
||||
"sourceIdentifier": "contact@wpscan.com",
|
||||
"published": "2024-06-26T06:15:16.347",
|
||||
"lastModified": "2024-06-26T06:15:16.347",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-06-26T12:44:29.693",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "The Frontend Checklist WordPress plugin through 2.3.2 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup)"
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "El complemento Frontend Checklist de WordPress hasta la versi\u00f3n 2.3.2 no sanitiza ni escapa a algunas de sus configuraciones, lo que podr\u00eda permitir a usuarios con privilegios elevados, como el administrador, realizar ataques de Cross-Site Scripting Almacenado incluso cuando la capacidad unfiltered_html no est\u00e1 permitida (por ejemplo, en una configuraci\u00f3n multisitio)."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
|
@ -2,12 +2,16 @@
|
||||
"id": "CVE-2024-5008",
|
||||
"sourceIdentifier": "security@progress.com",
|
||||
"published": "2024-06-25T20:15:13.173",
|
||||
"lastModified": "2024-06-25T20:15:13.173",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-06-26T12:44:29.693",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "In WhatsUp Gold versions released before 2023.1.3, \n\nan authenticated user with certain permissions can upload an arbitrary file and obtain RCE using\u00a0Apm.UI.Areas.APM.Controllers.Api.Applications.AppProfileImportController."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "En las versiones de WhatsUp Gold lanzadas antes de 2023.1.3, un usuario autenticado con ciertos permisos puede cargar un archivo arbitrario y obtener RCE usando Apm.UI.Areas.APM.Controllers.Api.Applications.AppProfileImportController."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
|
@ -2,12 +2,16 @@
|
||||
"id": "CVE-2024-5009",
|
||||
"sourceIdentifier": "security@progress.com",
|
||||
"published": "2024-06-25T20:15:13.427",
|
||||
"lastModified": "2024-06-25T20:15:13.427",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-06-26T12:44:29.693",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "In WhatsUp Gold versions released before 2023.1.3,\u00a0an Improper Access Control vulnerability in Wug.UI.Controllers.InstallController.SetAdminPassword allows local attackers to modify admin's password."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "En las versiones de WhatsUp Gold lanzadas antes de 2023.1.3, una vulnerabilidad de control de acceso inadecuado en Wug.UI.Controllers.InstallController.SetAdminPassword permite a atacantes locales modificar la contrase\u00f1a del administrador."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
|
@ -2,12 +2,16 @@
|
||||
"id": "CVE-2024-5010",
|
||||
"sourceIdentifier": "security@progress.com",
|
||||
"published": "2024-06-25T20:15:13.617",
|
||||
"lastModified": "2024-06-25T20:15:13.617",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-06-26T12:44:29.693",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "In WhatsUp Gold versions released before 2023.1.3, a vulnerability exists in the TestController functionality.\u00a0 A specially crafted \n\nunauthenticated\n\nHTTP request can lead to a disclosure of sensitive information."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "En las versiones de WhatsUp Gold lanzadas antes de 2023.1.3, existe una vulnerabilidad en la funcionalidad TestController. Una solicitud HTTP no autenticada especialmente manipulada puede dar lugar a la divulgaci\u00f3n de informaci\u00f3n confidencial."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
|
@ -2,12 +2,16 @@
|
||||
"id": "CVE-2024-5011",
|
||||
"sourceIdentifier": "security@progress.com",
|
||||
"published": "2024-06-25T20:15:13.810",
|
||||
"lastModified": "2024-06-25T20:15:13.810",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-06-26T12:44:29.693",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "In WhatsUp Gold versions released before 2023.1.3, an uncontrolled resource consumption vulnerability exists.\u00a0A specially crafted unauthenticated HTTP request\u00a0to the TestController Chart functionality\u00a0can lead to denial of service."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "En las versiones de WhatsUp Gold lanzadas antes de 2023.1.3, existe una vulnerabilidad de consumo descontrolado de recursos. Una solicitud HTTP no autenticada especialmente manipulada para la funcionalidad TestController Chart puede provocar una denegaci\u00f3n de servicio."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
|
@ -2,12 +2,16 @@
|
||||
"id": "CVE-2024-5012",
|
||||
"sourceIdentifier": "security@progress.com",
|
||||
"published": "2024-06-25T21:16:00.320",
|
||||
"lastModified": "2024-06-25T21:16:00.320",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-06-26T12:44:29.693",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "In WhatsUp Gold versions released before 2023.1.3, there is a\u00a0missing authentication vulnerability in WUGDataAccess.Credentials. This\u00a0vulnerability allows\u00a0unauthenticated attackers to disclose Windows Credentials stored in the product Credential Library."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "En las versiones de WhatsUp Gold lanzadas antes de 2023.1.3, falta una vulnerabilidad de autenticaci\u00f3n en WUGDataAccess.Credentials. Esta vulnerabilidad permite a atacantes no autenticados revelar las credenciales de Windows almacenadas en la librer\u00eda de credenciales del producto."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
|
@ -2,12 +2,16 @@
|
||||
"id": "CVE-2024-5013",
|
||||
"sourceIdentifier": "security@progress.com",
|
||||
"published": "2024-06-25T21:16:00.510",
|
||||
"lastModified": "2024-06-25T21:16:00.510",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-06-26T12:44:29.693",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "In WhatsUp Gold versions released before 2023.1.3,\u00a0an unauthenticated Denial of Service \n\nvulnerability was identified.\u00a0An unauthenticated attacker can put the application into the SetAdminPassword installation step, which renders the application non-accessible."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "En las versiones de WhatsUp Gold lanzadas antes de 2023.1.3, se identific\u00f3 una vulnerabilidad de denegaci\u00f3n de servicio no autenticada. Un atacante no autenticado puede colocar la aplicaci\u00f3n en el paso de instalaci\u00f3n SetAdminPassword, lo que hace que la aplicaci\u00f3n no sea accesible."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
|
@ -2,12 +2,16 @@
|
||||
"id": "CVE-2024-5014",
|
||||
"sourceIdentifier": "security@progress.com",
|
||||
"published": "2024-06-25T21:16:00.703",
|
||||
"lastModified": "2024-06-25T21:16:00.703",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-06-26T12:44:29.693",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "In WhatsUp Gold versions released before 2023.1.3, a Server Side Request Forgery vulnerability exists in the\u00a0GetASPReport feature. This allows any authenticated user to retrieve ASP reports from an HTML form."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "En las versiones de WhatsUp Gold lanzadas antes de 2023.1.3, existe una vulnerabilidad de Server Side Request Forgery en la funci\u00f3n GetASPReport. Esto permite que cualquier usuario autenticado recupere informes ASP desde un formulario HTML."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
|
@ -2,12 +2,16 @@
|
||||
"id": "CVE-2024-5015",
|
||||
"sourceIdentifier": "security@progress.com",
|
||||
"published": "2024-06-25T21:16:00.890",
|
||||
"lastModified": "2024-06-25T21:16:00.890",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-06-26T12:44:29.693",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "In WhatsUp Gold versions released before 2023.1.3,\u00a0an authenticated SSRF vulnerability in Wug.UI.Areas.Wug.Controllers.SessionControler.Update allows a low privileged user to chain this SSRF with an Improper Access Control vulnerability. This can be used to escalate privileges to Admin."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "En las versiones de WhatsUp Gold lanzadas antes de 2023.1.3, una vulnerabilidad SSRF autenticada en Wug.UI.Areas.Wug.Controllers.SessionControler.Update permite a un usuario con pocos privilegios encadenar esta SSRF con una vulnerabilidad de control de acceso inadecuado. Esto se puede utilizar para escalar privilegios a Administrador."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
|
@ -2,12 +2,16 @@
|
||||
"id": "CVE-2024-5016",
|
||||
"sourceIdentifier": "security@progress.com",
|
||||
"published": "2024-06-25T21:16:01.163",
|
||||
"lastModified": "2024-06-25T21:16:01.163",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-06-26T12:44:29.693",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "In WhatsUp Gold versions released before 2023.1.3, Distributed Edition installations can be exploited by using a deserialization\u00a0tool to achieve a Remote Code Execution as SYSTEM.\u00a0\nThe vulnerability exists in the main message processing routines\u00a0NmDistributed.DistributedServiceBehavior.OnMessage for server and NmDistributed.DistributedClient.OnMessage for clients."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "En las versiones de WhatsUp Gold lanzadas antes de 2023.1.3, las instalaciones de Distributed Edition se pueden explotar mediante el uso de una herramienta de deserializaci\u00f3n para lograr una ejecuci\u00f3n remota de c\u00f3digo como SYSTEM. La vulnerabilidad existe en las rutinas principales de procesamiento de mensajes NmDistributed.DistributedServiceBehavior.OnMessage para el servidor y NmDistributed.DistributedClient.OnMessage para los clientes."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
|
@ -2,12 +2,16 @@
|
||||
"id": "CVE-2024-5017",
|
||||
"sourceIdentifier": "security@progress.com",
|
||||
"published": "2024-06-25T21:16:01.357",
|
||||
"lastModified": "2024-06-25T21:16:01.357",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-06-26T12:44:29.693",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "In WhatsUp Gold versions released before 2023.1.3, a path traversal vulnerability exists.\u00a0A specially crafted unauthenticated HTTP request\u00a0to AppProfileImport can lead can lead to information disclosure."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "En las versiones de WhatsUp Gold lanzadas antes de 2023.1.3, existe una vulnerabilidad de Path Traversal. Una solicitud HTTP no autenticada especialmente manipulada para AppProfileImport puede dar lugar a la divulgaci\u00f3n de informaci\u00f3n."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
|
@ -2,12 +2,16 @@
|
||||
"id": "CVE-2024-5018",
|
||||
"sourceIdentifier": "security@progress.com",
|
||||
"published": "2024-06-25T21:16:01.543",
|
||||
"lastModified": "2024-06-25T21:16:01.543",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-06-26T12:44:29.693",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "In WhatsUp Gold versions released before 2023.1.3, an unauthenticated Path Traversal vulnerability exists Wug.UI.Areas.Wug.Controllers.SessionController.LoadNMScript. This allows allows reading of any file from the applications web-root directory ."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "En las versiones de WhatsUp Gold lanzadas antes de 2023.1.3, existe una vulnerabilidad de Path Traversal no autenticada Wug.UI.Areas.Wug.Controllers.SessionController.LoadNMScript. Esto permite la lectura de cualquier archivo desde el directorio ra\u00edz web de la aplicaci\u00f3n."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
|
@ -2,12 +2,16 @@
|
||||
"id": "CVE-2024-5019",
|
||||
"sourceIdentifier": "security@progress.com",
|
||||
"published": "2024-06-25T21:16:01.743",
|
||||
"lastModified": "2024-06-25T21:16:01.743",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-06-26T12:44:29.693",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "In WhatsUp Gold versions released before 2023.1.3,\u00a0\n\nan unauthenticated Arbitrary File Read issue exists in Wug.UI.Areas.Wug.Controllers.SessionController.CachedCSS. This\u00a0vulnerability allows reading of any file with iisapppool\\NmConsole privileges."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "En las versiones de WhatsUp Gold lanzadas antes de 2023.1.3, existe un problema de lectura arbitraria de archivos no autenticados en Wug.UI.Areas.Wug.Controllers.SessionController.CachedCSS. Esta vulnerabilidad permite la lectura de cualquier archivo con privilegios iisapppool\\NmConsole."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
|
@ -2,12 +2,16 @@
|
||||
"id": "CVE-2024-5071",
|
||||
"sourceIdentifier": "contact@wpscan.com",
|
||||
"published": "2024-06-26T06:15:16.463",
|
||||
"lastModified": "2024-06-26T06:15:16.463",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-06-26T12:44:29.693",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "The Bookster WordPress plugin through 1.1.0 allows adding sensitive parameters when validating appointments allowing attackers to manipulate the data sent when booking an appointment (the request body) to change its status from pending to approved."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "El complemento Bookster WordPress hasta la versi\u00f3n 1.1.0 permite agregar par\u00e1metros confidenciales al validar citas, lo que permite a los atacantes manipular los datos enviados al reservar una cita (el cuerpo de la solicitud) para cambiar su estado de pendiente a aprobado."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
|
@ -2,12 +2,16 @@
|
||||
"id": "CVE-2024-5169",
|
||||
"sourceIdentifier": "contact@wpscan.com",
|
||||
"published": "2024-06-26T06:15:16.543",
|
||||
"lastModified": "2024-06-26T06:15:16.543",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-06-26T12:44:29.693",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "The Video Widget WordPress plugin through 1.2.3 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup)"
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "El complemento Video Widget de WordPress hasta la versi\u00f3n 1.2.3 no sanitiza ni escapa a algunas de sus configuraciones, lo que podr\u00eda permitir a usuarios con privilegios elevados, como el administrador, realizar ataques de Cross-Site Scripting Almacenado incluso cuando la capacidad unfiltered_html no est\u00e1 permitida (por ejemplo, en una configuraci\u00f3n multisitio)."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
|
@ -2,12 +2,16 @@
|
||||
"id": "CVE-2024-5173",
|
||||
"sourceIdentifier": "security@wordfence.com",
|
||||
"published": "2024-06-26T02:15:09.340",
|
||||
"lastModified": "2024-06-26T02:15:09.340",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-06-26T12:44:29.693",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "The HT Mega \u2013 Absolute Addons For Elementor plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the Video player widget settings in all versions up to, and including, 2.5.5 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "El complemento HT Mega \u2013 Absolute Addons For Elementor para WordPress es vulnerable a Cross-Site Scripting Almacenado a trav\u00e9s de la configuraci\u00f3n del widget del reproductor de video en todas las versiones hasta la 2.5.5 incluida debido a una sanitizaci\u00f3n de entrada insuficiente y a un escape de salida en los atributos proporcionados por el usuario. Esto hace posible que atacantes autenticados, con acceso de nivel de colaborador y superior, inyecten scripts web arbitrarios en p\u00e1ginas que se ejecutar\u00e1n cada vez que un usuario acceda a una p\u00e1gina inyectada."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
|
@ -2,12 +2,16 @@
|
||||
"id": "CVE-2024-5181",
|
||||
"sourceIdentifier": "security@huntr.dev",
|
||||
"published": "2024-06-26T03:15:10.987",
|
||||
"lastModified": "2024-06-26T03:15:10.987",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-06-26T12:44:29.693",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A command injection vulnerability exists in the mudler/localai version 2.14.0. The vulnerability arises from the application's handling of the backend parameter in the configuration file, which is used in the name of the initialized process. An attacker can exploit this vulnerability by manipulating the path of the vulnerable binary file specified in the backend parameter, allowing the execution of arbitrary code on the system. This issue is due to improper neutralization of special elements used in an OS command, leading to potential full control over the affected system."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Existe una vulnerabilidad de inyecci\u00f3n de comandos en la versi\u00f3n 2.14.0 de mudler/localai. La vulnerabilidad surge del manejo por parte de la aplicaci\u00f3n del par\u00e1metro backend en el archivo de configuraci\u00f3n, que se utiliza en el nombre del proceso inicializado. Un atacante puede explotar esta vulnerabilidad manipulando la ruta del archivo binario vulnerable especificado en el par\u00e1metro backend, permitiendo la ejecuci\u00f3n de c\u00f3digo arbitrario en el sistema. Este problema se debe a una neutralizaci\u00f3n inadecuada de elementos especiales utilizados en un comando del sistema operativo, lo que lleva a un posible control total sobre el sistema afectado."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
|
@ -2,12 +2,16 @@
|
||||
"id": "CVE-2024-5199",
|
||||
"sourceIdentifier": "contact@wpscan.com",
|
||||
"published": "2024-06-26T06:15:16.633",
|
||||
"lastModified": "2024-06-26T06:15:16.633",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-06-26T12:44:29.693",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "The Spotify Play Button WordPress plugin through 1.0 does not validate and escape some of its shortcode attributes before outputting them back in a page/post where the shortcode is embed, which could allow users with the contributor role and above to perform Stored Cross-Site Scripting attacks."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "El complemento Spotify Play Button de WordPress hasta la versi\u00f3n 1.0 no valida ni escapa algunos de sus atributos de c\u00f3digo corto antes de devolverlos a una p\u00e1gina/publicaci\u00f3n donde est\u00e1 incrustado el c\u00f3digo corto, lo que podr\u00eda permitir a los usuarios con el rol de colaborador y superior realizar ataques de Cross-Site Scripting Almacenado."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
|
@ -2,12 +2,16 @@
|
||||
"id": "CVE-2024-5215",
|
||||
"sourceIdentifier": "security@wordfence.com",
|
||||
"published": "2024-06-26T07:15:11.013",
|
||||
"lastModified": "2024-06-26T07:15:11.013",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-06-26T12:44:29.693",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "The HT Mega \u2013 Absolute Addons For Elementor plugin for WordPress is vulnerable to Stored Cross-Site Scripting via multiple widgets in all versions up to, and including, 2.5.5 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "El complemento HT Mega \u2013 Absolute Addons For Elementor para WordPress es vulnerable a Cross-Site Scripting Almacenado a trav\u00e9s de m\u00faltiples widgets en todas las versiones hasta la 2.5.5 incluida debido a una sanitizaci\u00f3n de entrada insuficiente y a un escape de salida en los atributos proporcionados por el usuario. Esto hace posible que atacantes autenticados, con acceso de nivel de colaborador y superior, inyecten scripts web arbitrarios en p\u00e1ginas que se ejecutar\u00e1n cada vez que un usuario acceda a una p\u00e1gina inyectada."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
|
@ -2,12 +2,16 @@
|
||||
"id": "CVE-2024-5276",
|
||||
"sourceIdentifier": "df4dee71-de3a-4139-9588-11b62fe6c0ff",
|
||||
"published": "2024-06-25T20:15:14.013",
|
||||
"lastModified": "2024-06-25T20:15:14.013",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-06-26T12:44:29.693",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A SQL Injection vulnerability in Fortra FileCatalyst Workflow allows an attacker to modify application data.\u00a0 Likely impacts include creation of administrative users and deletion or modification of data in the application database. Data exfiltration via SQL injection is not possible using this vulnerability. Successful unauthenticated exploitation requires a Workflow system with anonymous access enabled, otherwise an authenticated user is required.\u00a0This issue affects all versions of FileCatalyst Workflow from 5.1.6 Build 135 and earlier."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Una vulnerabilidad de inyecci\u00f3n SQL en Fortra FileCatalyst Workflow permite a un atacante modificar los datos de la aplicaci\u00f3n. Los impactos probables incluyen la creaci\u00f3n de usuarios administrativos y la eliminaci\u00f3n o modificaci\u00f3n de datos en la base de datos de la aplicaci\u00f3n. La exfiltraci\u00f3n de datos mediante inyecci\u00f3n SQL no es posible gracias a esta vulnerabilidad. La explotaci\u00f3n exitosa sin autenticaci\u00f3n requiere un sistema de flujo de trabajo con acceso an\u00f3nimo habilitado; de lo contrario, se requiere un usuario autenticado. Este problema afecta a todas las versiones de FileCatalyst Workflow desde 5.1.6 Build 135 y anteriores."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
|
@ -2,12 +2,16 @@
|
||||
"id": "CVE-2024-5332",
|
||||
"sourceIdentifier": "security@wordfence.com",
|
||||
"published": "2024-06-26T06:15:16.740",
|
||||
"lastModified": "2024-06-26T06:15:16.740",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-06-26T12:44:29.693",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "The Exclusive Addons for Elementor plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's Card widget in all versions up to, and including, 2.6.9.8 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Los complementos Exclusive Addons for Elementor para WordPress son vulnerables a Cross-Site Scripting Almacenado a trav\u00e9s del widget de tarjeta del complemento en todas las versiones hasta la 2.6.9.8 incluida debido a una sanitizaci\u00f3n de entrada insuficiente y a un escape de salida en los atributos proporcionados por el usuario. Esto hace posible que atacantes autenticados, con acceso de nivel de colaborador y superior, inyecten scripts web arbitrarios en p\u00e1ginas que se ejecutar\u00e1n cada vez que un usuario acceda a una p\u00e1gina inyectada."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
|
@ -2,12 +2,16 @@
|
||||
"id": "CVE-2024-5460",
|
||||
"sourceIdentifier": "sirt@brocade.com",
|
||||
"published": "2024-06-26T00:15:11.093",
|
||||
"lastModified": "2024-06-26T00:15:11.093",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-06-26T12:44:29.693",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A vulnerability in the default configuration of the Simple Network \nManagement Protocol (SNMP) feature of Brocade Fabric OS versions before \nv9.0.0 could allow an authenticated, remote attacker to read data from \nan affected device via SNMP. The vulnerability is due to hard-coded, \ndefault community string in the configuration file for the SNMP daemon. \nAn attacker could exploit this vulnerability by using the static \ncommunity string in SNMP version 1 queries to an affected device."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Una vulnerabilidad en la configuraci\u00f3n predeterminada de la funci\u00f3n del Protocolo simple de administraci\u00f3n de red (SNMP) de las versiones de Brocade Fabric OS anteriores a v9.0.0 podr\u00eda permitir que un atacante remoto autenticado lea datos de un dispositivo afectado a trav\u00e9s de SNMP. La vulnerabilidad se debe a una cadena de comunidad predeterminada codificada en el archivo de configuraci\u00f3n del demonio SNMP. Un atacante podr\u00eda aprovechar esta vulnerabilidad utilizando la cadena de comunidad est\u00e1tica en las consultas SNMP versi\u00f3n 1 a un dispositivo afectado."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
|
@ -2,12 +2,16 @@
|
||||
"id": "CVE-2024-5473",
|
||||
"sourceIdentifier": "contact@wpscan.com",
|
||||
"published": "2024-06-26T06:15:17.197",
|
||||
"lastModified": "2024-06-26T06:15:17.197",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-06-26T12:44:29.693",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "The Simple Photoswipe WordPress plugin through 0.1 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup)."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "El complemento Simple Photoswipe de WordPress hasta la versi\u00f3n 0.1 no sanitiza ni escapa a algunas de sus configuraciones, lo que podr\u00eda permitir a usuarios con privilegios elevados, como el administrador, realizar ataques de Cross-Site Scripting Almacenado incluso cuando la capacidad unfiltered_html no est\u00e1 permitida (por ejemplo, en una configuraci\u00f3n multisitio)."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
|
@ -2,12 +2,16 @@
|
||||
"id": "CVE-2024-5573",
|
||||
"sourceIdentifier": "contact@wpscan.com",
|
||||
"published": "2024-06-26T06:15:17.300",
|
||||
"lastModified": "2024-06-26T06:15:17.300",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-06-26T12:44:29.693",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "The Easy Table of Contents WordPress plugin before 2.0.66 does not sanitise and escape some of its settings, which could allow high privilege users such as editors to perform Cross-Site Scripting attacks even when unfiltered_html is disallowed"
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "El complemento Easy Table of Contents de WordPress anterior a 2.0.66 no sanitiza ni escapa a algunas de sus configuraciones, lo que podr\u00eda permitir a usuarios con altos privilegios, como editores, realizar ataques de Cross-Site Scripting incluso cuando unfiltered_html no est\u00e1 permitido."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
|
@ -2,12 +2,16 @@
|
||||
"id": "CVE-2024-6060",
|
||||
"sourceIdentifier": "103e4ec9-0a87-450b-af77-479448ddef11",
|
||||
"published": "2024-06-25T22:15:35.347",
|
||||
"lastModified": "2024-06-25T22:15:35.347",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-06-26T12:44:29.693",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "An information disclosure vulnerability in Phloc Webscopes 7.0.0 allows local attackers with access to the log files to view logged HTTP requests that contain user passwords or other sensitive information."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Una vulnerabilidad de divulgaci\u00f3n de informaci\u00f3n en Phloc Webscopes 7.0.0 permite a atacantes locales con acceso a los archivos de registro ver solicitudes HTTP registradas que contienen contrase\u00f1as de usuario u otra informaci\u00f3n confidencial."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
|
@ -2,12 +2,16 @@
|
||||
"id": "CVE-2024-6206",
|
||||
"sourceIdentifier": "security-alert@hpe.com",
|
||||
"published": "2024-06-25T20:15:14.210",
|
||||
"lastModified": "2024-06-25T20:15:14.210",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-06-26T12:44:29.693",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A security vulnerability has been identified in HPE Athonet Mobile Core software. The core application contains a code injection vulnerability where a threat actor could execute arbitrary commands with the privilege of the underlying container leading to complete takeover of the target system."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Se ha identificado una vulnerabilidad de seguridad en el software HPE Athonet Mobile Core. La aplicaci\u00f3n principal contiene una vulnerabilidad de inyecci\u00f3n de c\u00f3digo donde un actor de amenazas podr\u00eda ejecutar comandos arbitrarios con el privilegio del contenedor subyacente, lo que llevar\u00eda a tomar el control completo del sistema de destino."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
|
@ -2,12 +2,16 @@
|
||||
"id": "CVE-2024-6344",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2024-06-26T11:15:52.073",
|
||||
"lastModified": "2024-06-26T11:15:52.073",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-06-26T12:44:29.693",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A vulnerability, which was classified as problematic, was found in ZKTeco ZKBio CVSecurity V5000 4.1.0. This affects an unknown part of the component Push Configuration Section. The manipulation of the argument Configuration Name leads to cross site scripting. It is possible to initiate the attack remotely. The identifier VDB-269733 was assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Una vulnerabilidad fue encontrada en ZKTeco ZKBio CVSecurity V5000 4.1.0 y clasificada como problem\u00e1tica. Una parte desconocida del componente Push Configuration afecta a una parte desconocida. La manipulaci\u00f3n del argumento Nombre de configuraci\u00f3n conduce a Cross-Site Scripting. Es posible iniciar el ataque de forma remota. A esta vulnerabilidad se le asign\u00f3 el identificador VDB-269733. NOTA: Se contact\u00f3 primeramente con el proveedor sobre esta divulgaci\u00f3n, pero no respondi\u00f3 de ninguna manera."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
|
45
README.md
45
README.md
@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours.
|
||||
### Last Repository Update
|
||||
|
||||
```plain
|
||||
2024-06-26T12:00:18.997842+00:00
|
||||
2024-06-26T14:00:18.791020+00:00
|
||||
```
|
||||
|
||||
### Most recent CVE Modification Timestamp synchronized with NVD
|
||||
|
||||
```plain
|
||||
2024-06-26T11:15:52.073000+00:00
|
||||
2024-06-26T13:53:56.883000+00:00
|
||||
```
|
||||
|
||||
### Last Data Feed Release
|
||||
@ -38,26 +38,39 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
|
||||
|
||||
### CVEs added in the last Commit
|
||||
|
||||
Recently added CVEs: `3`
|
||||
Recently added CVEs: `0`
|
||||
|
||||
- [CVE-2024-37098](CVE-2024/CVE-2024-370xx/CVE-2024-37098.json) (`2024-06-26T11:15:51.613`)
|
||||
- [CVE-2024-37252](CVE-2024/CVE-2024-372xx/CVE-2024-37252.json) (`2024-06-26T11:15:51.860`)
|
||||
- [CVE-2024-6344](CVE-2024/CVE-2024-63xx/CVE-2024-6344.json) (`2024-06-26T11:15:52.073`)
|
||||
|
||||
|
||||
### CVEs modified in the last Commit
|
||||
|
||||
Recently modified CVEs: `9`
|
||||
Recently modified CVEs: `78`
|
||||
|
||||
- [CVE-2019-1387](CVE-2019/CVE-2019-13xx/CVE-2019-1387.json) (`2024-06-26T10:15:10.077`)
|
||||
- [CVE-2023-25652](CVE-2023/CVE-2023-256xx/CVE-2023-25652.json) (`2024-06-26T10:15:11.267`)
|
||||
- [CVE-2023-25815](CVE-2023/CVE-2023-258xx/CVE-2023-25815.json) (`2024-06-26T10:15:11.530`)
|
||||
- [CVE-2023-29007](CVE-2023/CVE-2023-290xx/CVE-2023-29007.json) (`2024-06-26T10:15:11.693`)
|
||||
- [CVE-2024-1394](CVE-2024/CVE-2024-13xx/CVE-2024-1394.json) (`2024-06-26T11:15:51.163`)
|
||||
- [CVE-2024-32002](CVE-2024/CVE-2024-320xx/CVE-2024-32002.json) (`2024-06-26T10:15:11.863`)
|
||||
- [CVE-2024-32004](CVE-2024/CVE-2024-320xx/CVE-2024-32004.json) (`2024-06-26T10:15:12.050`)
|
||||
- [CVE-2024-32021](CVE-2024/CVE-2024-320xx/CVE-2024-32021.json) (`2024-06-26T10:15:12.167`)
|
||||
- [CVE-2024-32465](CVE-2024/CVE-2024-324xx/CVE-2024-32465.json) (`2024-06-26T10:15:12.280`)
|
||||
- [CVE-2024-5009](CVE-2024/CVE-2024-50xx/CVE-2024-5009.json) (`2024-06-26T12:44:29.693`)
|
||||
- [CVE-2024-5010](CVE-2024/CVE-2024-50xx/CVE-2024-5010.json) (`2024-06-26T12:44:29.693`)
|
||||
- [CVE-2024-5011](CVE-2024/CVE-2024-50xx/CVE-2024-5011.json) (`2024-06-26T12:44:29.693`)
|
||||
- [CVE-2024-5012](CVE-2024/CVE-2024-50xx/CVE-2024-5012.json) (`2024-06-26T12:44:29.693`)
|
||||
- [CVE-2024-5013](CVE-2024/CVE-2024-50xx/CVE-2024-5013.json) (`2024-06-26T12:44:29.693`)
|
||||
- [CVE-2024-5014](CVE-2024/CVE-2024-50xx/CVE-2024-5014.json) (`2024-06-26T12:44:29.693`)
|
||||
- [CVE-2024-5015](CVE-2024/CVE-2024-50xx/CVE-2024-5015.json) (`2024-06-26T12:44:29.693`)
|
||||
- [CVE-2024-5016](CVE-2024/CVE-2024-50xx/CVE-2024-5016.json) (`2024-06-26T12:44:29.693`)
|
||||
- [CVE-2024-5017](CVE-2024/CVE-2024-50xx/CVE-2024-5017.json) (`2024-06-26T12:44:29.693`)
|
||||
- [CVE-2024-5018](CVE-2024/CVE-2024-50xx/CVE-2024-5018.json) (`2024-06-26T12:44:29.693`)
|
||||
- [CVE-2024-5019](CVE-2024/CVE-2024-50xx/CVE-2024-5019.json) (`2024-06-26T12:44:29.693`)
|
||||
- [CVE-2024-5071](CVE-2024/CVE-2024-50xx/CVE-2024-5071.json) (`2024-06-26T12:44:29.693`)
|
||||
- [CVE-2024-5169](CVE-2024/CVE-2024-51xx/CVE-2024-5169.json) (`2024-06-26T12:44:29.693`)
|
||||
- [CVE-2024-5173](CVE-2024/CVE-2024-51xx/CVE-2024-5173.json) (`2024-06-26T12:44:29.693`)
|
||||
- [CVE-2024-5181](CVE-2024/CVE-2024-51xx/CVE-2024-5181.json) (`2024-06-26T12:44:29.693`)
|
||||
- [CVE-2024-5199](CVE-2024/CVE-2024-51xx/CVE-2024-5199.json) (`2024-06-26T12:44:29.693`)
|
||||
- [CVE-2024-5215](CVE-2024/CVE-2024-52xx/CVE-2024-5215.json) (`2024-06-26T12:44:29.693`)
|
||||
- [CVE-2024-5276](CVE-2024/CVE-2024-52xx/CVE-2024-5276.json) (`2024-06-26T12:44:29.693`)
|
||||
- [CVE-2024-5332](CVE-2024/CVE-2024-53xx/CVE-2024-5332.json) (`2024-06-26T12:44:29.693`)
|
||||
- [CVE-2024-5460](CVE-2024/CVE-2024-54xx/CVE-2024-5460.json) (`2024-06-26T12:44:29.693`)
|
||||
- [CVE-2024-5473](CVE-2024/CVE-2024-54xx/CVE-2024-5473.json) (`2024-06-26T12:44:29.693`)
|
||||
- [CVE-2024-5573](CVE-2024/CVE-2024-55xx/CVE-2024-5573.json) (`2024-06-26T12:44:29.693`)
|
||||
- [CVE-2024-6060](CVE-2024/CVE-2024-60xx/CVE-2024-6060.json) (`2024-06-26T12:44:29.693`)
|
||||
- [CVE-2024-6206](CVE-2024/CVE-2024-62xx/CVE-2024-6206.json) (`2024-06-26T12:44:29.693`)
|
||||
- [CVE-2024-6344](CVE-2024/CVE-2024-63xx/CVE-2024-6344.json) (`2024-06-26T12:44:29.693`)
|
||||
|
||||
|
||||
## Download and Usage
|
||||
|
174
_state.csv
174
_state.csv
@ -131771,7 +131771,7 @@ CVE-2019-1383,0,0,7f2c753cec0551fb0c66b9bfb870cc6fd274bfac57a40d15ebb3389bd0cb86
|
||||
CVE-2019-1384,0,0,9a1caf46de03c456349a03301243efa5540f9889203fffb26a31e1a6409c4343,2020-08-24T17:37:01.140000
|
||||
CVE-2019-1385,0,0,1efb98f5567372b76b221489e1edd3eb127d4cad2de411d662d3818497804740,2020-08-24T17:37:01.140000
|
||||
CVE-2019-1386,0,0,f2ebadc9ee475d7dcb7475d08fb074eed1566e96343dd08bf8f809566e660791,2023-11-07T03:08:05.490000
|
||||
CVE-2019-1387,0,1,58cbb4b857cd272f1d9b352573bb7bdf91702b2d582c5e91ad74dfe9ea837e4e,2024-06-26T10:15:10.077000
|
||||
CVE-2019-1387,0,0,58cbb4b857cd272f1d9b352573bb7bdf91702b2d582c5e91ad74dfe9ea837e4e,2024-06-26T10:15:10.077000
|
||||
CVE-2019-1388,0,0,1c077e381878bb5a53d42e5b7efd532eb72b5e99679b1f6335472ec410a18588,2019-11-14T19:19:18.903000
|
||||
CVE-2019-1389,0,0,cf574a90fea03ac798213a0da9e4a409959e03bbeead7b12a8b2fdeb31b37efa,2020-09-28T12:58:11.220000
|
||||
CVE-2019-1390,0,0,4e89bdee299cdfc0ccfc14ea8df1f928e64612e130029a70c732a6de37f93819,2020-08-24T17:37:01.140000
|
||||
@ -197516,7 +197516,7 @@ CVE-2022-29416,0,0,3810281bc1437d3e8bcf1fd797e438ec7187dbfc50837590d76dadb91be4b
|
||||
CVE-2022-29417,0,0,ebf411b1e7eca581efd353861d4daa73896cbbc8df39000ab014e95fc79c51cb,2023-07-20T18:07:43.587000
|
||||
CVE-2022-29418,0,0,471d0cd927dfe5d0b5747b2ba0877212bda9b62425809edc822aff82c7d6f0cd,2022-05-05T18:30:50.540000
|
||||
CVE-2022-29419,0,0,bf9f07916258e8d51cf819d84dcd2ebc24d308ce9e2569f3cae3936daa9e1fb2,2022-05-05T18:41:24.810000
|
||||
CVE-2022-29420,0,0,67730d1e4606c01c1d85cb1b0ef790e9e60cd840f1a5fca2db9d033a7a883cc5,2022-05-16T16:40:13.520000
|
||||
CVE-2022-29420,0,1,14672a488147e97be357c64b21a0505af31582523d4cd73b5b763c677baf961e,2024-06-26T13:15:49.553000
|
||||
CVE-2022-29421,0,0,aa35dd1eaa7f8a0113462ff4976d40dee13cd86068049766730b4ef8e4369357,2022-05-16T16:24:53.127000
|
||||
CVE-2022-29422,0,0,98cfdf2ee8a1edaa34624a2084839254dbd2127143a20a3fe9cdc05cca020993,2022-05-16T16:31:23.163000
|
||||
CVE-2022-29423,0,0,8569ccef1818a38cab6849ab86dcbb8be313866e1b763a5747e13a22800e2852,2023-07-20T18:08:55.013000
|
||||
@ -218831,7 +218831,7 @@ CVE-2023-25649,0,0,7fdca89abb02c0a04c1a8d8d1c0be240d887fa7c73c6b501606d77250afdc
|
||||
CVE-2023-2565,0,0,783ddff3351c0791075207478b40973795d5bd2f09d06722b032dd3b4296fa2e,2024-05-17T02:23:03.640000
|
||||
CVE-2023-25650,0,0,d8b1b26bb91d4d3109306d76bfbb2b03429ed7e68a862e799b46f5c2f97bc6f1,2023-12-19T19:24:52.120000
|
||||
CVE-2023-25651,0,0,6806a158fad35273df088b5694b29f79360a8cf9ade7d43c3f150bc00b3feee9,2023-12-19T18:46:27.270000
|
||||
CVE-2023-25652,0,1,85ba2ed77d4cd1740e662acc1e6af2ee271486fe03a1c3de5387f99dd5152781,2024-06-26T10:15:11.267000
|
||||
CVE-2023-25652,0,0,85ba2ed77d4cd1740e662acc1e6af2ee271486fe03a1c3de5387f99dd5152781,2024-06-26T10:15:11.267000
|
||||
CVE-2023-25653,0,0,4edb03d5bf56af3933d62a86b2cd294e6cb7e6c60c69b3f5d67d02ec07347632,2023-11-07T04:09:04.830000
|
||||
CVE-2023-25654,0,0,46daa10015012557f752912182dd2e0f373d6d3e78314e930e6a7ad1866e2cb5,2023-03-28T15:01:44.877000
|
||||
CVE-2023-25655,0,0,01e9638ae81748ecabea30b167c085913e1032cd338a88c8250fb6dcbcf0655a,2023-03-28T15:02:27.250000
|
||||
@ -218997,7 +218997,7 @@ CVE-2023-25811,0,0,9e3dc92a6d92245f9657144eaeb0e3e3a5dc9d5923fb2489dfcf629189dc9
|
||||
CVE-2023-25812,0,0,b1f7e2069d51dc8b0c91b44e868e734cc8aca503ffc34a0b70dc60c7be6e75af,2023-11-07T04:09:12.860000
|
||||
CVE-2023-25813,0,0,4b10b691446c75332feb9888174eff37d69eea5ddb5dbe6b6d614314648b5f19,2023-03-03T02:04:19.600000
|
||||
CVE-2023-25814,0,0,cc141185d6aa0a074472830029d80dcfab297ada19c75c6210f6d35748b7dfbf,2023-03-15T16:35:07.443000
|
||||
CVE-2023-25815,0,1,a6e25e4fc6362deaecfcc2cb388f46d306456554c5e7c9f00e0a6a6219eb7df7,2024-06-26T10:15:11.530000
|
||||
CVE-2023-25815,0,0,a6e25e4fc6362deaecfcc2cb388f46d306456554c5e7c9f00e0a6a6219eb7df7,2024-06-26T10:15:11.530000
|
||||
CVE-2023-25816,0,0,03a0695c6efa94330749dc394e7af629d636ca6dbcc6a22794b7f52252467fbc,2023-11-07T04:09:13.087000
|
||||
CVE-2023-25817,0,0,91a7ef2c9ef6a93200cd21102e85030e3496d7cb186356314756d6f20d961574,2023-04-01T01:42:57.327000
|
||||
CVE-2023-25818,0,0,e2204d1b2d241ee3ce125c4cc44a1fae8cbf8cf7ff6abaf491e2aeee2a6b1576,2023-04-03T16:55:57.387000
|
||||
@ -221607,7 +221607,7 @@ CVE-2023-29003,0,0,871deaaa08d1362771e7cc70a18cdb5bf390e0d3a9126e03c3f40a64c0f52
|
||||
CVE-2023-29004,0,0,58d279b080d1428fd0d69088ea1860465501c9ab33b5b9e1ce47f0b1c2b2ac2d,2023-04-26T19:34:10.293000
|
||||
CVE-2023-29005,0,0,499354d86599ad5d43c42b0e4e79d88751868d36469f1d7d442e587841e8abd1,2023-04-18T17:02:56.903000
|
||||
CVE-2023-29006,0,0,c6ff9b315116447f0023cacf3de6ebd6daf8a68060147e843ed198166f39e32a,2023-04-12T15:53:29.377000
|
||||
CVE-2023-29007,0,1,6967c114c24fb32b528360f8c2bd13687ae0d7da018ba5889c4873a5c0bd4eee,2024-06-26T10:15:11.693000
|
||||
CVE-2023-29007,0,0,6967c114c24fb32b528360f8c2bd13687ae0d7da018ba5889c4873a5c0bd4eee,2024-06-26T10:15:11.693000
|
||||
CVE-2023-29008,0,0,b31b8d56f85f48cbf0b9b3a51aee00f3630b09220d667a9927582d87a87b62a5,2023-11-07T04:11:00.297000
|
||||
CVE-2023-29009,0,0,76ed46fb234b946eafc978236d3a8d3cafdd09aef1e8bfe44874515d765fcd41,2023-11-07T19:48:54.330000
|
||||
CVE-2023-2901,0,0,076b72f6b5bcf824bfc8d46d72397d17f860c9ab193bb85facecc1e0004feb53,2024-05-17T02:23:21.227000
|
||||
@ -241797,7 +241797,7 @@ CVE-2024-1390,0,0,71eb0c49e1915160a890c9df4d2040fa529dd6e699ca4bdcf3f6829a9c0e60
|
||||
CVE-2024-1391,0,0,95159e2513e9127a66f6050cbc2679326245e87281e8aee9653919649cc97f74,2024-03-13T18:15:58.530000
|
||||
CVE-2024-1392,0,0,0948736f211221c32ddb432668205bccae67223b950d877ef11c76bff68a1c8f,2024-03-13T18:15:58.530000
|
||||
CVE-2024-1393,0,0,d7662d0cf4655f5dc37cac1727274e85c0d695350e85be99fa06d400366cbddc,2024-03-13T18:15:58.530000
|
||||
CVE-2024-1394,0,1,de36a3874a91298af40c37a23c5b85077a771f527ed1bc543f700ac43aeb4260,2024-06-26T11:15:51.163000
|
||||
CVE-2024-1394,0,0,de36a3874a91298af40c37a23c5b85077a771f527ed1bc543f700ac43aeb4260,2024-06-26T11:15:51.163000
|
||||
CVE-2024-1395,0,0,bc906c24f3b97a1f76fb28d9eb27a1438a7ca78483d0c0a7452e9b7efa2da958,2024-05-03T14:17:53.690000
|
||||
CVE-2024-1396,0,0,c2c7f8124754e0c20b02f3a3637cca1d95a3c2b253208efd7a2814f2d0550bd5,2024-05-02T18:00:37.360000
|
||||
CVE-2024-1397,0,0,e6d8c9c2beca75d3fdc5f918cb423cf21913a9c807f46126d5b49c29c7bd60f0,2024-03-13T12:33:51.697000
|
||||
@ -243242,7 +243242,7 @@ CVE-2024-21517,0,0,186f90d2088e8e33683da894eb00f6f13b8f4ae5479bdad5267ce001807a5
|
||||
CVE-2024-21518,0,0,83a4ac5f480325e602a67a8a1958abd8c4414c62288c5217c40c0680b80ab4b9,2024-06-24T19:56:14.723000
|
||||
CVE-2024-21519,0,0,99cb820000050c4a8347abec593294f82b25bdfbd4e4a3b0cc4286db32ec2098,2024-06-24T19:55:07.760000
|
||||
CVE-2024-2152,0,0,3cc97618eb3606d7138054800fe4c9dd1b810706cf75a720e72d22a25acc79fd,2024-05-17T02:38:04.770000
|
||||
CVE-2024-21520,0,0,766b14725ab03d27ef0363de8e54b3a1b2d0f37198ab6fad6c83bd0f65046707,2024-06-26T05:15:50.093000
|
||||
CVE-2024-21520,0,1,719b2dc3254f707e72c103bbdbbe58152dcb2f4bbbb92f02a73b99a9ae3141f8,2024-06-26T12:44:29.693000
|
||||
CVE-2024-2153,0,0,32d949763a8c44673b751742c2df9fc58704fdbb602a296b8827b8bcaaa1ed2f,2024-05-17T02:38:04.867000
|
||||
CVE-2024-2154,0,0,ad1f5443da5008cd83aa665fb0ec59294e0b766fedda6af927118b7949d4ad34,2024-05-17T02:38:04.970000
|
||||
CVE-2024-2155,0,0,c86c3d15a9193973ee1ceda0debbe4aef69c0b1f1d6389239087d9ae6543935d,2024-05-17T02:38:05.063000
|
||||
@ -243359,10 +243359,10 @@ CVE-2024-21735,0,0,ed6afe70db786b939f8ed329719d7a86e59b6c7dfc9686233e59aea2f49a2
|
||||
CVE-2024-21736,0,0,dc3c8ab8b5a3b98fcdc115679aceff92a81f74174ec4a57f3b3675e6b7bcb197,2024-01-19T17:30:01.407000
|
||||
CVE-2024-21737,0,0,a90af93e6af88ab1e63750439f8a51408da352f40c4dd8d5d341f3011c62bce3,2024-01-16T17:45:47.083000
|
||||
CVE-2024-21738,0,0,278c1bdd65ae1ef741a29fb166b2b284a0905063e85efd5ce35f4fc963819f3a,2024-01-11T22:54:02.190000
|
||||
CVE-2024-21739,0,0,50561082e07c8797b84e5a4c234482ef4cd4dc89d69f70f90c67982df959d956,2024-06-25T21:15:57.007000
|
||||
CVE-2024-21739,0,1,07f93ee1de6db4cd150e8044f6df8dfeec5c0df6671390dcd392c083d70bdcb1,2024-06-26T12:44:29.693000
|
||||
CVE-2024-2174,0,0,02677fb92d9ec9e938d433dc80bb7dba037bdfac0e28c902361565b03794253f,2024-03-23T03:15:12.243000
|
||||
CVE-2024-21740,0,0,bb493b9fa1141f25eee369efc251a9d7298c641ad9bfd0dea360580582b45c4f,2024-06-25T21:15:57.190000
|
||||
CVE-2024-21741,0,0,2edc34ea0a15d21b2d574ccd0733ef38ee5f1827ca3017cbc8e641dc8764a958,2024-06-25T21:15:57.357000
|
||||
CVE-2024-21740,0,1,80331fbcb4933bf7f4b07b3e6c688ccc6372ad93a7d99105a5d11a968ea5fbe7,2024-06-26T12:44:29.693000
|
||||
CVE-2024-21741,0,1,d2196869594799b3d3a519e07d5725cef751911c38e7ad74939dddf42da7bb29,2024-06-26T12:44:29.693000
|
||||
CVE-2024-21742,0,0,f05425c22b68eed9b18152111fdcbba099b7d5c68b9f0b2090a8077e4941bea6,2024-02-29T01:44:04.040000
|
||||
CVE-2024-21744,0,0,75da6a88047b7dd10fd2808157b826b0359816427c478b970c1329b6cad90830,2024-01-11T18:45:53.040000
|
||||
CVE-2024-21745,0,0,bf3a505c3e58c8e06145ffd7ba2bd556421c95bc4b61cb5874ba3a8a81e74cc4,2024-01-11T18:45:19.053000
|
||||
@ -245123,7 +245123,7 @@ CVE-2024-24760,0,0,594ada425d15a322e3f99c422c4b0f972382ba4b06e7c8a0c717620b32aab
|
||||
CVE-2024-24761,0,0,f5eac0618ee154794d07ce4f478624bae3215db8694682143ff6dbdc5db1e3ca,2024-03-06T21:42:48.053000
|
||||
CVE-2024-24762,0,0,a7cf7384426b8870b434de7e00d3a1d16f7b399a4804ad1be81b6ff5f0245082,2024-02-17T02:15:52.700000
|
||||
CVE-2024-24763,0,0,d3d10c4404a25ab91ba5900f9f4433bf2e3db86ddd4c01b5399c2cabfe532355,2024-02-20T19:50:53.960000
|
||||
CVE-2024-24764,0,0,358fa806be83c92f23415e242070c610d8f46dbce823244e974f49980a7f8da3,2024-06-26T01:15:47.890000
|
||||
CVE-2024-24764,0,1,a6d0fb533519fe852d722fe8020356774ed6802154fe41d14b3389eb1a3b4fd4,2024-06-26T12:44:29.693000
|
||||
CVE-2024-24765,0,0,d4e092e03ff38847b8fb4953a3b2c4b9c1a3da8cedc2236971507409fb416552,2024-03-06T21:42:48.053000
|
||||
CVE-2024-24766,0,0,f87e50a4000cb92af6a7930ee1d7171e8e2a69d0d8f8e017d8f56fc485535257,2024-03-06T21:42:48.053000
|
||||
CVE-2024-24767,0,0,ea24984314aeb3ff2151e28966f94b67d2b6ccb20d9e7417a6389a5c24bcc1ed,2024-03-06T21:42:48.053000
|
||||
@ -247401,7 +247401,7 @@ CVE-2024-27852,0,0,2264a1594190812a9b29fc0e3f886882ab3c63c917f94e71ed2dc96c8e6c2
|
||||
CVE-2024-27855,0,0,7a41b8238436a46025b45552c8cda3356564589cbbf3b4bae7d5eb20d8672a8c,2024-06-11T13:54:12.057000
|
||||
CVE-2024-27857,0,0,803d8efe7bb49cf3c18a557e9bdcd3fe89c30050e4113fcd0f030929c76c160d,2024-06-12T04:15:12.663000
|
||||
CVE-2024-2786,0,0,dcf647d15f4b220698a959a93f7a5cdfd4a7ecd495ee9aa1ef69052001df8b00,2024-04-10T13:23:38.787000
|
||||
CVE-2024-27867,0,0,91270cd124799f1f9f06f9ca436483d490e2ee8271ba3cd258a23502983b916d,2024-06-26T04:15:11.637000
|
||||
CVE-2024-27867,0,1,929b60a50faac760812cfff090aaa2b01b31cf8cfca2ab2ec6bdf5a9e5f514fb,2024-06-26T12:44:29.693000
|
||||
CVE-2024-2787,0,0,496195d9f69f32f0c6a6baaf1ee3e4e62db7dfd0c17c88d9010b922be319ee45,2024-04-10T13:23:38.787000
|
||||
CVE-2024-2788,0,0,088d65d193232fcb72b866e8c41bac364578345792bee984e7ddfd9f7a9953b9,2024-04-10T13:23:38.787000
|
||||
CVE-2024-27885,0,0,c59de475c576c44e129a9e58b8769caffc1b189d40a0172434b38c39f1ec2eb6,2024-06-11T13:54:12.057000
|
||||
@ -247941,7 +247941,7 @@ CVE-2024-28824,0,0,5a9476ae0fdb0520e3a986c832f5f9e27a50da5cb3aa11e06910544296f0e
|
||||
CVE-2024-28825,0,0,9e6f2228e06896e59bb560ffc81c60a9a09c25eeaded2122eaaaf9d670949d13,2024-04-24T13:39:42.883000
|
||||
CVE-2024-28826,0,0,af714d67b245e2002324726263b60e676423e9fa16954adb4190fa57b660a93f,2024-05-29T13:02:09.280000
|
||||
CVE-2024-2883,0,0,e66be81816608580e2e81ffcb02cca4ae9a2aa5cbea60907cc2e1d80cffbaf4a,2024-03-29T04:15:08.743000
|
||||
CVE-2024-28830,0,0,b631bc8d126de4a695f850828988431fd36fe3645eefa950646d377d9d34ae30,2024-06-26T08:15:09.630000
|
||||
CVE-2024-28830,0,1,0345769512c8d0617caa5313f559fdb9de7066aaa2f880b3d0fe2b7aa28290e3,2024-06-26T12:44:29.693000
|
||||
CVE-2024-28831,0,0,53daadc6768590b1e9dcc34c033a018728a5349f5fb865309e9216560e5790eb,2024-06-25T12:24:17.873000
|
||||
CVE-2024-28832,0,0,e20e133fb158c153d5c99472d0490b974e0599ab693822dcae94c1e3de7df5f9,2024-06-25T12:24:17.873000
|
||||
CVE-2024-28833,0,0,c28d0621123671b94853f5763fc92ce8098ea4f6621d0443f950677dd9d3b57a,2024-06-12T17:53:57.103000
|
||||
@ -248055,7 +248055,7 @@ CVE-2024-28969,0,0,0d46f305bfcdd2aeb8896dc74821c5d2eeb84b39b3a56a357f2be0e0423a2
|
||||
CVE-2024-2897,0,0,0e1e1d677ec9e72b6995e546603f98ab77935f85885a6483b68b217559eb34fe,2024-06-04T19:19:19.267000
|
||||
CVE-2024-28970,0,0,5bffd12458b221b41ea3b33f5f0020bc2e9dc510db5d065982a4e953584ee03e,2024-06-13T18:36:09.013000
|
||||
CVE-2024-28971,0,0,5cc2a2bfd21b51036452ce03834ca76b5f458ae1e1ea0b2042ea0e7434d790f7,2024-05-08T17:05:24.083000
|
||||
CVE-2024-28973,0,0,019da7517e327021608351b5a638e3160a21874ff261df61863b1e7e8695d0e9,2024-06-26T03:15:09.640000
|
||||
CVE-2024-28973,0,1,445fd7711088b55e40e2b43795308674dff1c80005d024ab722ae827c4a8703a,2024-06-26T12:44:29.693000
|
||||
CVE-2024-28974,0,0,81a5bba2a762d0674b42f5cdf64af2db18e6b20fdc63a42838587e31bbd76d2a,2024-05-29T19:50:25.303000
|
||||
CVE-2024-28976,0,0,224761c00a34a63d518e2df17d9e4e0dcdf6133206e4a1c859d89e6d8634ce80,2024-04-24T13:39:42.883000
|
||||
CVE-2024-28977,0,0,10444a4b4519bac5d968aeb163eaf3f249ecc5460e5b7c0067db957ce6a37f95,2024-04-24T13:39:42.883000
|
||||
@ -248216,11 +248216,11 @@ CVE-2024-29168,0,0,55eaa2f8aa34951f2678d17cd09a8762011ab04d052991a6497f1ac90304a
|
||||
CVE-2024-29169,0,0,a02805aa944e613162d66dc748a6a46569f5a7dce5956826de0d7f8e99e21193,2024-06-13T18:35:19.777000
|
||||
CVE-2024-2917,0,0,738b9419e321262581cbcbc36e60bc25c85f82bd40a8ab12d5b727ad6cc0972c,2024-05-17T02:38:37.297000
|
||||
CVE-2024-29170,0,0,3a6ff2257b9f972ea2c611b834271a3e0fac88ad6ff708b8c384b495ffa37bbe,2024-06-04T16:57:41.053000
|
||||
CVE-2024-29173,0,0,70ac3ac13a35e920798411569a961af5d7a25a998965a99bd2b5593d3c9e47f7,2024-06-26T03:15:09.877000
|
||||
CVE-2024-29174,0,0,83c5e25972461137ca31b78634820d90b2d6efc155fad75b729798a6a5fe7a54,2024-06-26T03:15:10.100000
|
||||
CVE-2024-29175,0,0,b3316a8b97b3f488995898ec0279c25cfc91fae25f16ae4a9f6526a9a7820d75,2024-06-26T03:15:10.303000
|
||||
CVE-2024-29176,0,0,2f9347f0ac00905d49db00a36d30ed218368df9ff0343519594aebcd7c856c14,2024-06-26T03:15:10.533000
|
||||
CVE-2024-29177,0,0,1ec7e1f5d6388a26840fbe486fd2ecde2fcf68752fda0647ca97ee4e253d21cd,2024-06-26T03:15:10.767000
|
||||
CVE-2024-29173,0,1,7834c8352c9984126ce7ef4158fbeb815c062c8fc3f1eb7ec698c2f25391dde6,2024-06-26T12:44:29.693000
|
||||
CVE-2024-29174,0,1,791dcbeb3e5c58908c6b471dbc46dd56ea357e942a054a530a4a33bd2c338139,2024-06-26T12:44:29.693000
|
||||
CVE-2024-29175,0,1,8a1ec4e0b66f906bd9dfc20b98e8d022bb9c64ca265b8159a008184078816fd1,2024-06-26T12:44:29.693000
|
||||
CVE-2024-29176,0,1,ecdaddfdd54fc9e866b0e67eba85f428b40c26f7734eff114138f662219bf9be,2024-06-26T12:44:29.693000
|
||||
CVE-2024-29177,0,1,7dca2d4debfdfc22017c620f610b7387ec04f0380acf479af526a5cd6f2648f9,2024-06-26T12:44:29.693000
|
||||
CVE-2024-29179,0,0,f19d4d0a9f8b6dc85e6e021ab22950c73dd30b1b16e940f3cfc8d8b6deab42d4,2024-03-26T12:55:05.010000
|
||||
CVE-2024-2918,0,0,ce50c7c24dc6b969578ed47f388645920a5e5c8ad0b49917ec2e7ecd8d9606ee,2024-04-10T13:23:38.787000
|
||||
CVE-2024-29180,0,0,41debf5c02b25447b090e1fe17310ae2918a3e33749dbf7033ce058b1311f912,2024-03-21T19:47:03.943000
|
||||
@ -248636,8 +248636,8 @@ CVE-2024-2995,0,0,89218e2c0ab16118b6716e42dcc7ae77885e1ea2436151ccfacfbce504d640
|
||||
CVE-2024-29950,0,0,59d0dc7b41788e98cd313b2897de3b183cd3675df6f723ff671afe20bfa20432,2024-04-17T20:08:21.887000
|
||||
CVE-2024-29951,0,0,6925a52af5105d475e345d844926848365b048c62a2d3f697034b8967d354270,2024-04-18T13:04:28.900000
|
||||
CVE-2024-29952,0,0,a080202dc3806a65e4bf2066cba6f0509ab2487b03cc3575d217fb6ebe9d555c,2024-04-18T13:04:28.900000
|
||||
CVE-2024-29953,0,0,53abb4f1851313c37b2d9a4448fd162901f9a7ffbb5b547dac637f5f7dae2927,2024-06-26T00:15:10.030000
|
||||
CVE-2024-29954,0,0,4315c5b9aa34cf656b0628f5ac2caae585635d7b9fcf2699b58b96c3e237d362,2024-06-26T00:15:10.263000
|
||||
CVE-2024-29953,0,1,9b5223d55561286edec0e5b1b9b056c61664f03bc59e7de27ececd1d03107e0e,2024-06-26T12:44:29.693000
|
||||
CVE-2024-29954,0,1,41f643b3f302d9e334ed2a22e7bdee669cdaa767dd4d736fe6a0ad665bdbfe78,2024-06-26T12:44:29.693000
|
||||
CVE-2024-29955,0,0,47a53812514a7578906cfe4f12e13f4ef474d0421763eaa923aee25ceff7b533,2024-04-18T13:04:28.900000
|
||||
CVE-2024-29956,0,0,126826bc7262b3fd52d7ec8c2ab9f240aff208f37ad9157a7c1a3fe5fe08dca2,2024-04-18T13:04:28.900000
|
||||
CVE-2024-29957,0,0,fecc998428c3db04062cf2ac371ef979be5cd87fa510b5833cc1b2291494a722,2024-04-19T13:10:25.637000
|
||||
@ -248789,7 +248789,7 @@ CVE-2024-30103,0,0,e9b11315180cc2be70516f393013c4d68dd205d4a54691a3e15d1cbe00247
|
||||
CVE-2024-30104,0,0,5a9d1985e988cec27229a284222c230de4fd29fc24d0330a38548721a0729d9d,2024-06-20T17:27:01.447000
|
||||
CVE-2024-30107,0,0,7e9f39013645f69ffc09f932047c5fded8481e31de256075b8ab56490f9048bd,2024-04-19T13:10:25.637000
|
||||
CVE-2024-3011,0,0,1567706f33ba4a3729190a5acfa17d903c76e23445fbf38d371926fb70a5af71,2024-05-17T02:39:40.533000
|
||||
CVE-2024-30112,0,0,c0e5546ba904304918e40279a9198340589b4e9b62d105f08498c0db16fb4497,2024-06-25T22:15:30.117000
|
||||
CVE-2024-30112,0,1,7776e48af0349613d262d23e79d54eaf55862c79c613ef95710a33f68285b593,2024-06-26T12:44:29.693000
|
||||
CVE-2024-30119,0,0,faff61cb55bb1e1c818b9460a2a056f4c8970e03380dd9d518774564c9b27a5c,2024-06-17T12:42:04.623000
|
||||
CVE-2024-3012,0,0,3d13067eee5369169a098d5c023f7c1a68bff1bb4361076791d74ce86fdf610f,2024-05-17T02:39:40.620000
|
||||
CVE-2024-30120,0,0,e36717a45c134ce96ee2f16d093d8717c8dcca8c5bf419fdf3e6a16688a2f2e7,2024-06-17T12:42:04.623000
|
||||
@ -249389,7 +249389,7 @@ CVE-2024-30927,0,0,7f5fb9dbb74187186c12e2f8edd52380a2fe14d4923fe303fe1e826ee9046
|
||||
CVE-2024-30928,0,0,caf910b47d65799a57161146e34602829f47360642a8c8fe911c2d8ad140dddb,2024-04-19T13:10:25.637000
|
||||
CVE-2024-30929,0,0,3a4b987ba39620a2fa553421d0680484415e43d1909ca51832f180e76c2d2d0f,2024-04-19T13:10:25.637000
|
||||
CVE-2024-3093,0,0,88e99931e3bb45e3b00bfc123293a0bff2319b704247b4d251e357b27062aff3,2024-05-07T13:15:48.260000
|
||||
CVE-2024-30931,0,0,112aee0fe69ce5368891c98cc4fa993fd79532c2ab60bcc12bcbd0eae1220f2f,2024-06-25T22:15:30.313000
|
||||
CVE-2024-30931,0,1,c336f970cb863df7d55794c1c1216e535d9fa98cb01a6ae24e794a0505fdb1d1,2024-06-26T12:44:29.693000
|
||||
CVE-2024-30938,0,0,bb3c87898373ca38f4e6504fd7f34baf274fe16334abf7626317b091c9072986,2024-04-19T13:10:25.637000
|
||||
CVE-2024-30939,0,0,2c9741729607a2e80601d31a316dfe5a77e488a194c61c09d029bf2778d383d7,2024-04-26T12:58:17.720000
|
||||
CVE-2024-3094,0,0,8ed23f1232ed36fe384d7a52f468b21b74026ccef3e50e7fa1460af68654fd3b,2024-05-01T19:15:27.340000
|
||||
@ -250023,9 +250023,9 @@ CVE-2024-31999,0,0,92063baa188f8d1eb46101bed0277138de32335b249687b065a40c476ebda
|
||||
CVE-2024-3200,0,0,50eee4824af89335680b4f427188be74af85a435ac22ce60b4280b3fd9f3aff7,2024-06-03T14:46:24.250000
|
||||
CVE-2024-32000,0,0,5a1773951b9e4056d222ee9010995a856338856d61b3ccc3a9db5455d3c02bfb,2024-04-15T13:15:31.997000
|
||||
CVE-2024-32001,0,0,5f137f0e0d607eeec96c185575fc4489622e4c58e021858f7aee0551fd5f0547,2024-04-11T12:47:44.137000
|
||||
CVE-2024-32002,0,1,f2760ce11775d7216bc2d3aa4e32bd74a65a2db6c8e667c788c1f08052241b93,2024-06-26T10:15:11.863000
|
||||
CVE-2024-32002,0,0,f2760ce11775d7216bc2d3aa4e32bd74a65a2db6c8e667c788c1f08052241b93,2024-06-26T10:15:11.863000
|
||||
CVE-2024-32003,0,0,8e8c8d945f0ee0a518068e981d0cc584a07044ae728a9a77ce2d918bc43c232f,2024-04-15T13:15:31.997000
|
||||
CVE-2024-32004,0,1,4beb054e63081ab40bdb206eb93e7d01eb696e33760b81eee8a1eb63de5f2f3c,2024-06-26T10:15:12.050000
|
||||
CVE-2024-32004,0,0,4beb054e63081ab40bdb206eb93e7d01eb696e33760b81eee8a1eb63de5f2f3c,2024-06-26T10:15:12.050000
|
||||
CVE-2024-32005,0,0,67300e4989f99e2e013d8397bc4806c53fe7ab524173b29e08f1814aa041fd14,2024-04-15T13:15:31.997000
|
||||
CVE-2024-3201,0,0,44e60b8f4dad0313de170a06bda14135e6a023e53a6317170e365451385b7999,2024-05-24T01:15:30.977000
|
||||
CVE-2024-32017,0,0,c59472fff1ac3380592aadc3ec53fc745f88f8e2f34d8c3b8730814392c43e11,2024-06-10T18:15:31.880000
|
||||
@ -250033,7 +250033,7 @@ CVE-2024-32018,0,0,c61269c0254937eeac93c2ade0a2a69eed9a0e0a19698d0aa2ae8836ebc41
|
||||
CVE-2024-32019,0,0,7d17b262f48d84e5d46deb667dc18694c73147c4bad7ea42fd1b388af87a63d3,2024-04-15T13:15:31.997000
|
||||
CVE-2024-3202,0,0,961fed9fa99528aad4565c46d792af48cf7cf4de9e528a65e42986bbd026d3c2,2024-05-17T02:39:46.577000
|
||||
CVE-2024-32020,0,0,f2c71ac565b9f08fa1f1d90a62847c701e796fa277fbcea1cbaca687b305ff5d,2024-06-10T18:15:32.080000
|
||||
CVE-2024-32021,0,1,7dff6f8d8e1a4d7fc2d76dbbb4d0e044f98278ef9f9c8a6728b7047a40acd852,2024-06-26T10:15:12.167000
|
||||
CVE-2024-32021,0,0,7dff6f8d8e1a4d7fc2d76dbbb4d0e044f98278ef9f9c8a6728b7047a40acd852,2024-06-26T10:15:12.167000
|
||||
CVE-2024-32022,0,0,83ce972a62cb0d496d93021f959db1a9c7d93bf991779ee98a131d07725482e2,2024-04-19T16:15:10.533000
|
||||
CVE-2024-32023,0,0,adb78947d782fcb7041c1fc7768e7f3d3c9be214fb8ab1e71bb129805ba1aaf5,2024-04-19T16:15:10.607000
|
||||
CVE-2024-32024,0,0,02bb672a3ecdc1cc89be08499a8d52a34fd79fba894d179733ab551e6c2e5746,2024-04-19T16:15:10.680000
|
||||
@ -250287,7 +250287,7 @@ CVE-2024-32461,0,0,3941d8bd271b020582637450c6381a991de4b9ffa39f4db030841834b9e2a
|
||||
CVE-2024-32462,0,0,5d7e199d9ef87a9ead0aaa6e45da944ead2c54f7c8bd33536b92a885a6b7e6b3,2024-05-01T18:15:24.140000
|
||||
CVE-2024-32463,0,0,1671e195c4973ac11a31a2856358d6fb78fc6f39ffe0d1d851cfbba7a397b723,2024-04-17T16:51:07.347000
|
||||
CVE-2024-32464,0,0,d64afe641f7795bed40e9f07611c1dfe8212b69350ddb9db2c6c76fe5f6eb6dc,2024-06-11T15:24:13.467000
|
||||
CVE-2024-32465,0,1,de49c4bc3569bd8fc526b2ed90be14380d3f0af6ad16131814b913b625e310fd,2024-06-26T10:15:12.280000
|
||||
CVE-2024-32465,0,0,de49c4bc3569bd8fc526b2ed90be14380d3f0af6ad16131814b913b625e310fd,2024-06-26T10:15:12.280000
|
||||
CVE-2024-32466,0,0,db7f064bb346349536bc1029a9138c718e3a99de40435ac8076a2153a72d304b,2024-04-18T18:25:55.267000
|
||||
CVE-2024-32467,0,0,c3595d52e60c3fa31f1ede27ca8549a3938c2ca59fe6ab3708d95e8b6d1a0b5d,2024-04-25T17:24:59.967000
|
||||
CVE-2024-3247,0,0,095afc187e8f976bc1a2eaa79a4c0328aa3c3e2487a10203585d8616775f8a4d,2024-04-03T12:38:04.840000
|
||||
@ -251499,7 +251499,7 @@ CVE-2024-34393,0,0,3bc65dc02de347dab9aa9145e771abb692c039ee73fb6fb4a908e37504bcc
|
||||
CVE-2024-34394,0,0,dd84e5afccd36638fa1005749183a9abcd7d4326df580dc45135f744820792df,2024-05-03T12:50:34.250000
|
||||
CVE-2024-34397,0,0,70854b1ad6ab06679e1af787bf84a8a6de29444e6873fb72f86f5216cc743817,2024-06-10T18:15:34.863000
|
||||
CVE-2024-3440,0,0,b6e021f0a39374e5963047ffe0e563b4f8644f79c10282228c1df76f022468ec,2024-05-17T02:39:56.370000
|
||||
CVE-2024-34400,0,0,dbd48dfab68c06d0f74745fe02d891b979d943426f98fe747ff7d5c3d9706189,2024-06-25T21:15:59.090000
|
||||
CVE-2024-34400,0,1,e8519dd13fbf5464c7676c8cf94fdad109e7bb0206ce725dc62d2fd8b95ef432,2024-06-26T12:44:29.693000
|
||||
CVE-2024-34401,0,0,0cfb896ccce711bbc7db6c4bbd385298b085bc508f7ecdead1ed17bc160057da,2024-05-03T12:50:34.250000
|
||||
CVE-2024-34402,0,0,07f2f76782d12e6f122a9b732cd1dd6fe7d9eda4cbe8011f65dcaa034c10eae3,2024-06-10T17:16:29.087000
|
||||
CVE-2024-34403,0,0,b827cf042756a5c1d96ff977631d7c263d5dd53378a344d1a81844f92201b89b,2024-06-10T17:16:29.170000
|
||||
@ -251637,8 +251637,8 @@ CVE-2024-34573,0,0,41ab5ca1c62c51e2d5398c3ef19591aec3618667df7c2294a33f2fd9794a6
|
||||
CVE-2024-34574,0,0,da62f69044cff1544e9db72428db6676f4511c77628679a41b2b8efda0b3bd93,2024-05-08T13:15:00.690000
|
||||
CVE-2024-34575,0,0,f874cba4be84fe80062f36c4a92c1529344b91ba4a22c0305bd8b082f4f4d827,2024-05-17T18:36:05.263000
|
||||
CVE-2024-3458,0,0,95e4aaffa4279b78a2b992b7ca84a76b9c0fc4040617906bdb6d2a26fd53d894,2024-05-17T02:39:57.243000
|
||||
CVE-2024-34580,0,0,ed46d261085e8dc776d086f96ac14da619cecbdda82470dd85508a06a0556809,2024-06-26T05:15:51.093000
|
||||
CVE-2024-34581,0,0,eea49f6fad056ca40974148f88205ff4693a3e7025aaabf63826239f85ab0311,2024-06-26T06:15:13.983000
|
||||
CVE-2024-34580,0,1,59e1156a68acc4ca563a1b8da2c501e0447e66b674ff0733b0ed3b21d0daede4,2024-06-26T12:44:29.693000
|
||||
CVE-2024-34581,0,1,101eae71972fe0e0b512a60a9bdc31b241f90f9c819f01ada4065ee44845d826,2024-06-26T12:44:29.693000
|
||||
CVE-2024-34582,0,0,4844e743472b7231bfa5452c2e20c2f3ad08007eb97cbefe2d71005b993ee4bd,2024-05-16T15:44:44.683000
|
||||
CVE-2024-3459,0,0,03bb87c9d0cbd21911c231bc7c0f724e986c00982489be8ee05c29896de95c1d,2024-05-14T16:11:39.510000
|
||||
CVE-2024-3460,0,0,5d753d09cd0688d7cf59cbd53a149eb7d45b8f22859b402f63de2cfaab817466,2024-05-14T16:11:39.510000
|
||||
@ -252048,8 +252048,8 @@ CVE-2024-35510,0,0,244a039d3e43a77d1e1c1bfa1c93465718af15f6d6ebd597960608d48e40f
|
||||
CVE-2024-35511,0,0,88c11e90f79a9ed0aca8c4301cc3b328c70f04cb419aacefe9fa82a87fbd22d6,2024-05-29T13:02:09.280000
|
||||
CVE-2024-35512,0,0,c9d23c736120f04931cbbc7470489190e83340be8d46b2f2d0f2c886a0a46a7d,2024-05-29T19:50:25.303000
|
||||
CVE-2024-3552,0,0,fa4171774caf4f107f7bd7bc705072afb6b03f384e26f4e538ab01a75ca7b0ff,2024-06-13T18:36:09.010000
|
||||
CVE-2024-35526,0,0,2a7c56c3526e4083994155103b9152720a423d690ede778285683ecd15130287,2024-06-25T21:15:59.170000
|
||||
CVE-2024-35527,0,0,4ceec9287c7db70f2182fdde2284aa9c4dc76f37ca54c1e3eec875228a4710fa,2024-06-25T22:15:30.403000
|
||||
CVE-2024-35526,0,1,9145d718b99666c752b72c23585259f6b43d68cd740cf1774e7de05603733122,2024-06-26T12:44:29.693000
|
||||
CVE-2024-35527,0,1,a44c745f43d9e9ab4b1f265a434cfd75cb0985cd6431373e28e04bd4dbaff24c,2024-06-26T12:44:29.693000
|
||||
CVE-2024-3553,0,0,35fab26edb78f51246dfea40a1da2d2c641df3766aad72a071763d4720020731,2024-05-02T18:00:37.360000
|
||||
CVE-2024-35537,0,0,40b24ff825bd5479d6cda748f4b6fa0164be52128bb4d8df6dce48131ef1f731,2024-06-24T19:40:04.190000
|
||||
CVE-2024-3554,0,0,b4c32859301bcc314e2dd2301d5e454826bca59cac4e6957d0f808d223349460,2024-05-02T18:00:37.360000
|
||||
@ -252712,7 +252712,7 @@ CVE-2024-36305,0,0,25c6009804152d7b9979d9821e9e70f3611f20519825a820152254cf8944c
|
||||
CVE-2024-36306,0,0,b7a506dff1a266cee79d9db49c2ffc0e2570931464b091df5cbe92fde0600ec5,2024-06-11T13:54:12.057000
|
||||
CVE-2024-36307,0,0,65c2a77849c0c655edb7178a3a2e5c766b2febfc39d9416a3d5029d11e9e67ca,2024-06-11T13:54:12.057000
|
||||
CVE-2024-3631,0,0,52e896a80c9b063fda6224c04771bbd75f72f78e3d3636ccff4bb724fd16615d,2024-05-15T16:40:19.330000
|
||||
CVE-2024-3633,0,0,e0af5a341d33864cc79e3254854bcb13a6f481c646889bf21b6e575321b5cc50,2024-06-26T06:15:15.400000
|
||||
CVE-2024-3633,0,1,2db7ffc7f459790f265177a4532d2ef952cf54b88f78dafb34a118075cb27942,2024-06-26T12:44:29.693000
|
||||
CVE-2024-3634,0,0,940ae4dd6e92f9452379e49ccdcd29aa6fe6e9bda25faf9f7045c78090371ae8,2024-05-15T16:40:19.330000
|
||||
CVE-2024-36358,0,0,0b6d0d7e847e5e80626827024fae1ecc3aa20949dc775e143afeabadd5937bd0,2024-06-11T13:54:12.057000
|
||||
CVE-2024-36359,0,0,e478cf489bb1ede60e62fa94e4217a61161e3068e762986d86e699f0d3644034,2024-06-11T13:54:12.057000
|
||||
@ -252904,7 +252904,7 @@ CVE-2024-36801,0,0,848abb34bc225b988b494ddeb65181be8a5b6f82df4ba5b51418160f74bd0
|
||||
CVE-2024-36802,0,0,0794bc25a584635ebd68caf9b4e7f3e8a9a13cbfa911223045a2bae9d1392520,2024-06-26T06:15:15.200000
|
||||
CVE-2024-3681,0,0,4cc6e1e77320458af0f4beee59a38c9a663fe20b962b28f234c099bc7c23ab32,2024-05-02T18:00:37.360000
|
||||
CVE-2024-36811,0,0,6e0af3c6c3cf0f68333eeeac219e850c0e24dcad6b3b12a43292843727697674,2024-06-07T19:24:09.243000
|
||||
CVE-2024-36819,0,0,4ede6a47f0bd9f284499e43777ca27e1f926e2a99ca218fde01b45e60f50c00f,2024-06-25T19:15:11.837000
|
||||
CVE-2024-36819,0,1,f54632612004d4b1595527e4995b2ea47098f3053b3b7672d8dcb3157d17960f,2024-06-26T12:44:29.693000
|
||||
CVE-2024-3682,0,0,a140f5eb71acf183c1e80e0d2f5a14a5c7d8a92c7cf9dd3ea5250a20e3cb490f,2024-04-26T12:58:17.720000
|
||||
CVE-2024-36821,0,0,592e31c2ea7119b4c103b5ca67eefeb91773768141e1fc0daf62c86176d3afa7,2024-06-17T21:15:50.960000
|
||||
CVE-2024-36823,0,0,aad699347c3b05ee3cd9abd97cd2dd91acd777507ac0def145495f15e3829674,2024-06-07T14:56:05.647000
|
||||
@ -253088,7 +253088,7 @@ CVE-2024-37087,0,0,4e40b7ea7a56e7d2dfeb244220c863a1ed6df7c4211908de27563a1ed62e9
|
||||
CVE-2024-37089,0,0,546734d08a472f24d21b11f96a62ff07ba2d9777252aa2840029efb67a03052d,2024-06-24T12:57:36.513000
|
||||
CVE-2024-37091,0,0,70ef4cb5aa59df22f5d9bec3c45f39a3b926dd43e7416671f8860a54328745e5,2024-06-24T12:57:36.513000
|
||||
CVE-2024-37092,0,0,ddf8bb50ed996f71f2c9e3e9b63faabe2c52ea8cb34e6f0fcdb53b1c55be2132,2024-06-24T19:26:54.367000
|
||||
CVE-2024-37098,1,1,7d95ef966e30798c946e7faa214e1c41030e8f9e9bfdead3f487566ade8579f3,2024-06-26T11:15:51.613000
|
||||
CVE-2024-37098,0,1,e259cf517a4b26891930426aed13a9c53ee339a8d724318e920ba4b291cc4d99,2024-06-26T12:44:29.693000
|
||||
CVE-2024-37107,0,0,eaa9cf5a94a28aaa8385b24580f4e0847a5f8e8f7ba8d50d5e3cfa9d3405c236,2024-06-24T19:26:54.367000
|
||||
CVE-2024-37109,0,0,f2a7bf283e738683324f72b6b020147166c767610404b259a82d4d2ec2c96435,2024-06-24T19:26:47.037000
|
||||
CVE-2024-3711,0,0,00ee502ae0ae8bdc802cd38eb1ec1e1356c10e1c18d766a4effd20297a066f55,2024-05-24T01:15:30.977000
|
||||
@ -253097,11 +253097,11 @@ CVE-2024-37118,0,0,0ad56c9c4204404fc625d311f20c0b9c243a12023f3ae9f31f4a46be59aef
|
||||
CVE-2024-37124,0,0,bdb1c2622a72a7efb103c3f5603bc06acb88520168a2b939ad78f62d410bde2b,2024-06-20T12:44:01.637000
|
||||
CVE-2024-37130,0,0,e0f79c9f14be5102570781fc06be35c79666eecf04eb579171e468c9a760aecc,2024-06-11T13:54:12.057000
|
||||
CVE-2024-37131,0,0,9d8793df78437fefb0a970a364558bdad589a0c15e132432497cef4b2151f46f,2024-06-13T18:35:19.777000
|
||||
CVE-2024-37138,0,0,4b7f663d2f0b40dec8d7a52e1d69a481ac19649ad9b230bc3dba7f0c41d5c357,2024-06-26T04:15:13
|
||||
CVE-2024-37139,0,0,76b6780ea7b3c55d1db8da0b8d8835e18baab33054f5ff52c1db095daa07b495,2024-06-26T04:15:13.350000
|
||||
CVE-2024-37138,0,1,c32a7c21b94d343f2b3f30b7a7dc2a266744d79653d9f1f3b9c08078539e5f8e,2024-06-26T12:44:29.693000
|
||||
CVE-2024-37139,0,1,4be213816842328a788d9a10ebbbecaea533491c62f7e03adf240d5d001bdfb9,2024-06-26T12:44:29.693000
|
||||
CVE-2024-3714,0,0,29d3de80cc1f6e0ff07b09e17d8d58f6e17e5f0164ed94da7b2235ed17131c18,2024-05-20T13:00:34.807000
|
||||
CVE-2024-37140,0,0,5a87b551595cd50c75379412c5493217db89a09ef6db4547724ab0d0bb7b228f,2024-06-26T04:15:13.667000
|
||||
CVE-2024-37141,0,0,f9b7fc3ee3560c24da6c0cc8f788f273e783481b681145d58d75656717769fe4,2024-06-26T04:15:13.940000
|
||||
CVE-2024-37140,0,1,681b63037246d6321b6224834e07a5ad4187e2f092d956b5d7b807798dd34579,2024-06-26T12:44:29.693000
|
||||
CVE-2024-37141,0,1,b03df6d0d6f897b221dc842eaee3003cdd6e5a584378ab9df9bc91aaf0755cad,2024-06-26T12:44:29.693000
|
||||
CVE-2024-3715,0,0,902861be5261e2c029ed83a5c6920fde180817c53e05bb93208dc31c820658c5,2024-05-02T18:00:37.360000
|
||||
CVE-2024-37150,0,0,97cf533630a2e81b430f11fe12ccc7be397791e2299035e9f7d7a243e494791c,2024-06-07T14:56:05.647000
|
||||
CVE-2024-37152,0,0,d5beb8b2bc90de99efc40fac5a89948f3b2a0d50610a65220e35a91d41ce9369,2024-06-07T14:56:05.647000
|
||||
@ -253117,7 +253117,7 @@ CVE-2024-37162,0,0,9e7c7bf10929f252e53bb3c1fb7522aba7a72a7537c2c326190b7d6a9f92f
|
||||
CVE-2024-37163,0,0,916691bf3016dea122c7d1950639e0986553d25fca8ba0614bbb26c77e64f32c,2024-06-07T19:24:09.243000
|
||||
CVE-2024-37164,0,0,6cb207bb3fef68b878fe661a68c5d4ebf393e6a2b8cedaf5d1ceeeda9a728322,2024-06-13T18:35:19.777000
|
||||
CVE-2024-37166,0,0,1196d2402680f5c0ea35c25969f98c6e42a601c8b7f166b15d39fc6d2b783ecf,2024-06-11T13:54:12.057000
|
||||
CVE-2024-37167,0,0,9f614f19d9bf02003182c0959ce5d047b04160ae01cf872892b8b8fe4c70ec67,2024-06-25T20:15:11.513000
|
||||
CVE-2024-37167,0,1,8e3878203632039bd5d0fde820eb6a3f65b81345351f922c359b0f8f5a69885c,2024-06-26T12:44:29.693000
|
||||
CVE-2024-37168,0,0,30a5bfe372ab5dc3b67016944b26b77b656c73122e285b83c454024b12c1f789,2024-06-11T13:54:12.057000
|
||||
CVE-2024-37169,0,0,fdaa52111ac9b7853a3eb23a839ff4b8133f3da9944b0a746205935031e65f63,2024-06-11T13:54:12.057000
|
||||
CVE-2024-3717,0,0,f925293668cd733410cea58d8de3d8ac1f08ce4fec8b5812651df64ea2fd428a,2024-05-02T18:00:37.360000
|
||||
@ -253142,7 +253142,7 @@ CVE-2024-37231,0,0,2975c060fd817766775d3e3ec5265250dfcb406eb3856b3f2d8635478d7fc
|
||||
CVE-2024-37233,0,0,dcdb23af544a8046a4ecb68f34b48a3a15207d5a73bdc6182df1b28a0bb5e19c,2024-06-24T19:26:47.037000
|
||||
CVE-2024-3724,0,0,a2f08bb0a2e36a5c374b862fb3e4beff315b3d6672953c5eeabe10290b435e2c,2024-05-02T18:00:37.360000
|
||||
CVE-2024-3725,0,0,dd194c190207038aca40dcc17eaac7bd7c6f9f34e04d00c016e0de6cd9837da0,2024-05-02T18:00:37.360000
|
||||
CVE-2024-37252,1,1,b8ae0c0c70d4e359d61a6f55c77d883847ed72b8e25aef6affcc5550b875aec6,2024-06-26T11:15:51.860000
|
||||
CVE-2024-37252,0,1,faf33ef7b8f72660b3f71af61d55db3b928cbbfdda8d6a6c03b3fcf0d979da09,2024-06-26T12:44:29.693000
|
||||
CVE-2024-3726,0,0,5d13f10d5b73efb7ab7c6448eee56ee5b7f1a739226807fb6eef2a4ab850d2f7,2024-05-30T13:15:41.297000
|
||||
CVE-2024-3727,0,0,86cd8e8c61ea501cb865624d3ca9d005a7d16ee6d168de0778eaa0bc3ca4140b,2024-06-12T02:15:10.053000
|
||||
CVE-2024-37273,0,0,8e9dee449ebc3c902c8a48603bfb19c8ba061254dd865164dc4adc81e57806ef,2024-06-11T14:12:23.210000
|
||||
@ -253285,7 +253285,7 @@ CVE-2024-3771,0,0,1bf22922ed0657906343b6368a2362d22a78a1ff9d5272db064e582b3b0855
|
||||
CVE-2024-3772,0,0,184d29c2faf230c27e7c42ad45c478e7862cbffdde795ec4220824e36861b510,2024-04-26T02:15:06.983000
|
||||
CVE-2024-37732,0,0,6a86ff5d31f2b347e744ff4e9df1b84cb4205a66e561799f1161776dd71f288a,2024-06-24T19:26:35.967000
|
||||
CVE-2024-3774,0,0,430454733381ff5a96eb00158d8d932d4c087496720223836bce2968611b5152,2024-04-15T13:15:31.997000
|
||||
CVE-2024-37742,0,0,0176d553303a78b07d6a9df31d494bb46be0861f0fa388b1eff0f115ae036edf,2024-06-25T22:15:35.183000
|
||||
CVE-2024-37742,0,1,00d3535f17fc2025a1a3222bc5801b4b0db253d8a7b98f04f7f43ecc7b3cc901,2024-06-26T12:44:29.693000
|
||||
CVE-2024-3775,0,0,a79253f4f0c7633f40fa5e33903553d0137ff03b4a2d8425a028bb5ddf1c6b0a,2024-04-15T13:15:31.997000
|
||||
CVE-2024-37759,0,0,a304f980fb14a8758546bd8c3d1faef10aef26758667c469c634d191404d3cd2,2024-06-25T12:24:17.873000
|
||||
CVE-2024-3776,0,0,55056178a3d988ca6f5c349416a81e65818f1f748e962aa89ca62657bc61cdbb,2024-04-15T13:15:31.997000
|
||||
@ -253304,7 +253304,7 @@ CVE-2024-37803,0,0,4f3db0375a36967be1dadee84c3c9799655c3891ffc2301c21194d9aedc22
|
||||
CVE-2024-3781,0,0,bf710215509c2fb5fefd67fb85930537c2ce3a67160738297841ece3c75d6fc6,2024-04-15T19:12:25.887000
|
||||
CVE-2024-37818,0,0,9dde5fb80aa69772170f1a2e1414de157ca4025771910bb93ffd749e3cb749f4,2024-06-21T11:22:01.687000
|
||||
CVE-2024-3782,0,0,c95ea596dccb3636dd3691321b5a7a48aa3ee2b08cd07f6f17f6b9ebb6c70325,2024-04-15T19:12:25.887000
|
||||
CVE-2024-37820,0,0,43d1ef0f5c3a0627549c3b95d9e976dc54dc32f9a37a635c4237c2f7a29f7cbc,2024-06-25T19:15:11.943000
|
||||
CVE-2024-37820,0,1,0a0996a8947e2895e99ed868e2f9dddf9b73eaadf620faf0715e497fd47a9750,2024-06-26T12:44:29.693000
|
||||
CVE-2024-37821,0,0,69c8b0f219772ac85c00d152695d2a6db130f2920e14ec06f202587157691baf,2024-06-20T12:44:01.637000
|
||||
CVE-2024-37825,0,0,3470a82078ea88284f350b719f730ddf231924996161e05df687c780330da112,2024-06-24T19:26:47.037000
|
||||
CVE-2024-37828,0,0,1aec682223533f9f2174345c4486cdc5644002780b6ea2a3830079cc11688c3e,2024-06-20T12:44:22.977000
|
||||
@ -253312,11 +253312,11 @@ CVE-2024-3783,0,0,f916980cd1e532a7d588efc898e3b89c6684234f9d5fc7d911dee2ee73ce32
|
||||
CVE-2024-37831,0,0,5e7eb1d81cbc03e5a6cb7a0c776550184a7e580655a65f67804199e93112edb2,2024-06-17T12:42:04.623000
|
||||
CVE-2024-3784,0,0,c3548262a5dd94ab612636409a3bf8cd74017da9deb24debb2f77536fe274623,2024-04-15T19:12:25.887000
|
||||
CVE-2024-37840,0,0,145ee429ed53f53bee37478d13303757e3c9a9f24e63bc7b6c2abc99adf58711,2024-06-20T12:44:22.977000
|
||||
CVE-2024-37843,0,0,c3c4c9f46f4b65df10ec7c6c47316399af934ec6af88d02a128792f16f211b08,2024-06-25T21:15:59.770000
|
||||
CVE-2024-37843,0,1,efef5b346df7408c97f3f202001c7d16fd1da906a54459bc2a40fc31bc6f652b,2024-06-26T12:44:29.693000
|
||||
CVE-2024-37848,0,0,14bb88bc5c67311edd5b3500e695fbbed1a5f0a2c4a3e7baecfb228770826b1a,2024-06-20T12:44:22.977000
|
||||
CVE-2024-37849,0,0,1c3bd85b42f72006ddc00210dee95fa2aec60a18f1d79fbfdd90f35c19fff4ef,2024-06-13T18:35:19.777000
|
||||
CVE-2024-3785,0,0,fc93f2e321d044bf7a0ccc45f351722880d9f0bf94368b28b702ab59c5cb3144,2024-04-15T19:12:25.887000
|
||||
CVE-2024-37855,0,0,4b721af78045aa6d1baf9cdcee0a8253e9949b23797647c9299d413d68822695,2024-06-25T21:15:59.867000
|
||||
CVE-2024-37855,0,1,45ab2f13c8dcd2eda9d39267aa7a8288f6be3e045c37d8c983fcc19a14b98e1f,2024-06-26T12:44:29.693000
|
||||
CVE-2024-3786,0,0,e7dff42d10ea5f51aefb5b7728f1b7d65e7bf6f944a436f82b5cbbe6bdc82c9e,2024-04-15T19:12:25.887000
|
||||
CVE-2024-3787,0,0,570870b6338590c353431fe2587b532b039679da85c30ab8bb196a257bca2d47,2024-05-14T16:11:39.510000
|
||||
CVE-2024-37877,0,0,977bdb17b02ee563e354d32709be15b353932c13f2b0db17e57c208cd7c3a791,2024-06-13T18:35:19.777000
|
||||
@ -253336,7 +253336,7 @@ CVE-2024-3789,0,0,63d455d46acf2815a86f3b9bf286e732f6c1d2d557d093772c64f0c37d3153
|
||||
CVE-2024-37890,0,0,64919ef90d7e50e30ea881a6670fbfc5d82541a664dbdfbc52673f8c72279c2d,2024-06-20T12:44:22.977000
|
||||
CVE-2024-37891,0,0,7f699fe1f8c4a3ec8703a81c424d14c0900900ca3b4179e40a6b3b715e3f33f7,2024-06-20T12:44:22.977000
|
||||
CVE-2024-37893,0,0,41d25d093dc6fff20a6eda85ded9c0383f2159fafb609c8080b75906fa502b74,2024-06-20T12:44:22.977000
|
||||
CVE-2024-37894,0,0,6bfca4d95352740f6e810f53c60efd46fc593065b50e825c57660433a60025ef,2024-06-25T20:15:11.873000
|
||||
CVE-2024-37894,0,1,3c617ec4dc81bc2a78b9e8bf26d21f253a28b055d01165e4a5241e31e3468f92,2024-06-26T12:44:29.693000
|
||||
CVE-2024-37895,0,0,5a205f11ced3309e1f825afc55d41c5d514e9d7238b82fe13249e658f1877f11,2024-06-20T12:44:22.977000
|
||||
CVE-2024-37896,0,0,85ccee04f37e2b1a04ceeddd19a029b9400fb1a43ccfa07a1fe5a65adbb32b4e,2024-06-20T12:44:22.977000
|
||||
CVE-2024-37897,0,0,3a7634088b08b658ef87115cec5dc022a51bdd9e986e2e6685e19db69e7cba07,2024-06-21T11:22:01.687000
|
||||
@ -253412,7 +253412,7 @@ CVE-2024-38357,0,0,db932e7bd44b2292bed66681b7d77a847d541a79cdeb9df0d08a424975405
|
||||
CVE-2024-38358,0,0,d7fa4473d29cbfc514ec5a6118f6b700b95e48744d7580b8a99541a6dd9bac5b,2024-06-20T12:43:25.663000
|
||||
CVE-2024-38359,0,0,3c4a78257f1dc283c0e90aef4e0803c297f82552e9ac95d2cc406a3431781604,2024-06-21T11:22:01.687000
|
||||
CVE-2024-38361,0,0,a76df29cb5f27115adee4ca4e20976361dfcfc6eae95b97031ba2314a1f45bae,2024-06-21T11:22:01.687000
|
||||
CVE-2024-38364,0,0,3520408cf146cb16a953a56509b341631635084fbc5bbe68b5bf4cdd589099a1,2024-06-26T00:15:10.480000
|
||||
CVE-2024-38364,0,1,af41b56a7f2f7758c06f324097079d559fb0340d3186315d52e465f177fe03d2,2024-06-26T12:44:29.693000
|
||||
CVE-2024-38369,0,0,e5224b159d7a692db6492ffb5b88e69bbb6fbeca83c40da9d8cb17f66e90849e,2024-06-24T19:26:35.967000
|
||||
CVE-2024-3837,0,0,5046b04f6fff161407832d91f839d6c01f3dcf30bcf75f620bfd7221b5de1c27,2024-05-03T03:16:29.010000
|
||||
CVE-2024-38373,0,0,952ca8d4b23b60efe2e71a3a686b8a383ac5ed143363159c119120ce9ab78a09,2024-06-24T19:26:35.967000
|
||||
@ -253464,9 +253464,9 @@ CVE-2024-38505,0,0,be5aaa1dcdfd8c2aa334d5f57235bcc4cc51742ebd9414669481e2364aff4
|
||||
CVE-2024-38506,0,0,f0cad7be1bf66b2843860132c4a1c6f7d61e84c638e965683ddee0cfb22e3838,2024-06-20T12:44:01.637000
|
||||
CVE-2024-38507,0,0,a0f746b2efdaa14b7b3a19b053b62c389c989bd3db7005a96c00e53930c09585,2024-06-20T12:44:01.637000
|
||||
CVE-2024-3851,0,0,16bcb9f87255ebcf1aad2856af6894b1b0c36049b98621e173e693ad3a900330,2024-05-16T13:03:05.353000
|
||||
CVE-2024-38516,0,0,3cfe3aecdb8e607df3ee76ed7741edae9748253a2b742e5575ff711298712797,2024-06-25T21:15:59.957000
|
||||
CVE-2024-38516,0,1,1e8a930f3bd7a4d706b02f40cc5af32d0943db58e97c615d4b2fd82bf154a7f3,2024-06-26T12:44:29.693000
|
||||
CVE-2024-3852,0,0,3038e46972183e994310b2b410f139aaace8bd74e7e7e979d336a57b5feba459,2024-04-22T10:15:07.430000
|
||||
CVE-2024-38526,0,0,9a027a18b0e43b60c3249e98e6e4e3271914f58314123162240385cf3ae4de25,2024-06-26T00:15:10.703000
|
||||
CVE-2024-38526,0,1,e120e388df8ce9f77a5f20e08030a40910a306bc162600677388d663f60ddcef,2024-06-26T12:44:29.693000
|
||||
CVE-2024-3853,0,0,da9bcb4a065926b49732a0dd79b2f07a12fd9777c9341906bc363e07df8725cf,2024-04-17T12:48:31.863000
|
||||
CVE-2024-38538,0,0,fd8d0c414421b9d83404be9e58919f8d1c04c080d100c149e46c3a374cade8e2,2024-06-20T12:44:01.637000
|
||||
CVE-2024-38539,0,0,bb07b10cb8e27f63a4ad4d8d9f4efc546da28e9a77992ff13895f8e8066ae4a7,2024-06-20T12:44:01.637000
|
||||
@ -253584,8 +253584,8 @@ CVE-2024-38659,0,0,f28961b0676a5448bd17e73bb1a6deb01287f9c08ed62cfca5dcb9aaeb49a
|
||||
CVE-2024-38661,0,0,d01292ccb88aa0fd584714c04388bf37fe037da4497467ec684003ebdeaece48,2024-06-25T18:50:42.040000
|
||||
CVE-2024-38662,0,0,df490b2d1680f03df6de3bc588b5285cb29614d4f952810a45c332f43aef3cdd,2024-06-24T18:34:17.547000
|
||||
CVE-2024-38663,0,0,3ea2d49b13b5a6417be2e2e46e01198d7a523f2e1f725a81c5446a7828b4f9eb,2024-06-24T19:26:47.037000
|
||||
CVE-2024-38664,0,0,a8395bd0a97034fb9d591ca23c72f10e556094be356a10c281591bb618a39a41,2024-06-24T19:26:35.967000
|
||||
CVE-2024-38667,0,0,0c4bc4fcbf0bc057a4769bc51bca36ed64a157fd0902f5fc5afc329b9d7f449d,2024-06-24T19:26:35.967000
|
||||
CVE-2024-38664,0,1,72bdd64b82c0ccef218e6ae4c865049937a9a6a554fa424e47fbadbb71cab29e,2024-06-26T13:52:23.033000
|
||||
CVE-2024-38667,0,1,6cbb2a9b35edaa306e53ab7940e7cc9ad6e630fcc1b0ac2f5cc37a7625a00ef7,2024-06-26T13:53:56.883000
|
||||
CVE-2024-3867,0,0,1b62d18c2024e05920e3c0687ff0e24e4f942ae67e75e66374d57866a8214187,2024-04-16T17:15:11.113000
|
||||
CVE-2024-3868,0,0,fa696e39218c1556f1f2ca1f996b19eb0035252ea0508a442b035effd05169ef,2024-05-06T12:44:56.377000
|
||||
CVE-2024-3869,0,0,5fe681dc14d2de5e9dd5b2f66bac58fa145bb31944427d754a663b3ce277c72c,2024-04-16T13:24:07.103000
|
||||
@ -253793,8 +253793,8 @@ CVE-2024-4097,0,0,6a60177672bc62dbe43e4e7ccd78e74b9159babed54b0d3a303c5a9a6fcd00
|
||||
CVE-2024-4098,0,0,a3e4777d420e1b3bcafda1cf3d039c925611c1ff1c0ae02e65a01fb1638060ec,2024-06-20T12:43:25.663000
|
||||
CVE-2024-4103,0,0,db40310890aaaffd4decfd17ebe6978d2575902ae5387a15070f6cb8b96b8e99,2024-05-14T16:11:39.510000
|
||||
CVE-2024-4104,0,0,8fd82744b8bcdbccac2be79cc70a35ed94046651bf70570898ef2c659d60f12d,2024-05-14T16:11:39.510000
|
||||
CVE-2024-4105,0,0,f2d9729b2523675759767301544c072fb007ab1b7a83e8590eaf9acb3bb8d19a,2024-06-26T06:15:15.500000
|
||||
CVE-2024-4106,0,0,31c0c18b0c2a0dc1458f2db70d3d3370cd6262d96aa6fda79babb8776db10330,2024-06-26T06:15:15.830000
|
||||
CVE-2024-4105,0,1,d169491ce182673a92c722eeae29d8822821ffafecdac5ff838fdeb75facabe0,2024-06-26T12:44:29.693000
|
||||
CVE-2024-4106,0,1,6398a931e2ef11599fbea0c94459a7577d953d462d4da81c12b39282c7366ae9,2024-06-26T12:44:29.693000
|
||||
CVE-2024-4107,0,0,ffdcb25066b63e479c86de36da9033958cd11095a536f4d270fcccd4e4bc4dda,2024-05-14T16:11:39.510000
|
||||
CVE-2024-4111,0,0,ac6d64e31cbc7a488f71b143a528eae329da0ea7954ff86b16631b337575827a,2024-06-04T19:20:29.827000
|
||||
CVE-2024-4112,0,0,35262079a1a9e8fe76c90ac7da98d7b8194fc390ceebb0b97377d4e55612daaa,2024-05-17T02:40:15.740000
|
||||
@ -254115,7 +254115,7 @@ CVE-2024-4494,0,0,918249bcec6c97b277e3b4f550dceb7b2011aee0beee5ec958afda7f3738c4
|
||||
CVE-2024-4495,0,0,fe9f63f3d5d1b610e50beccc2de27a1d5b44365b084262ae38bb4fd9d5328cdc,2024-05-17T02:40:25.167000
|
||||
CVE-2024-4496,0,0,4878b7878675893c8860dfe2f628aacf9ba89db4defe7afc239c902840c6a063,2024-06-04T19:20:39.340000
|
||||
CVE-2024-4497,0,0,50d7ba6642949616c67705bbd4e65539b7b6c5038eedacdf442c2c58b50804af,2024-06-04T19:20:39.437000
|
||||
CVE-2024-4498,0,0,a6dab33069882abbdf024f1765b8897fa9d7adc98818f3b16c152bb892b19a8e,2024-06-25T20:15:12.127000
|
||||
CVE-2024-4498,0,1,dbfe976c8c3826c3f46751ee4538ff00353aec210dfb41dbfd582cdd04cb39bb,2024-06-26T12:44:29.693000
|
||||
CVE-2024-4499,0,0,f4b472a59fe34d2ac64bdac793946e35a6b106a1185caa9e468ffec3d977af40,2024-06-24T12:57:36.513000
|
||||
CVE-2024-4500,0,0,184ac3c3db109ec0d3b3a58c1a88c0ffd13050ae02d0994392f9ed87744cbb9b,2024-06-04T19:20:39.540000
|
||||
CVE-2024-4501,0,0,78ba43474897acce19ce9d16c899049eb30d079a8149999ee597d7e98a169843,2024-06-04T19:20:39.640000
|
||||
@ -254333,7 +254333,7 @@ CVE-2024-4754,0,0,65f7d30a77e8c92b9ac1114b7ed7f43c32a5bfb34fe46cea0e558e1fff1e46
|
||||
CVE-2024-4755,0,0,8a7a71d94c74cb52dec815eae51a85f655e8bbdb14fb2727ec4857b0eeba2dfa,2024-06-24T19:31:03.263000
|
||||
CVE-2024-4756,0,0,b303493fc627eee25a3b39c986ea25472e7aab1866612b83c9a7c14522d2c360,2024-06-07T14:56:05.647000
|
||||
CVE-2024-4757,0,0,73657ac01744c501b9896ce49d4f00383a32113d3f80fad0403d338908d3a4f5,2024-06-25T12:24:17.873000
|
||||
CVE-2024-4758,0,0,9c269fd67108f2909853f35d40b8bcab783575e1cd97a1ec46bf94ba5910c2c8,2024-06-26T06:15:16.133000
|
||||
CVE-2024-4758,0,1,57406868ebb68bb5b6412fc9d60125c43a5e81e040ffd2f2a8dfd71351e995fb,2024-06-26T12:44:29.693000
|
||||
CVE-2024-4759,0,0,8b059e177c76b9c2cc6c55c4c3ef3e13274f4cfdcd4ecb6a7973f71b5eda00d8,2024-06-25T12:24:17.873000
|
||||
CVE-2024-4760,0,0,8b9593f0d88cbd24a061db082c8cd5c20f19b8a61431542d1ce576639ef3bdc0,2024-05-16T15:44:44.683000
|
||||
CVE-2024-4761,0,0,1a5c101148c08794fbcc9293bdcf48ea45ef131413b853bd53bee7bfdc7d1522,2024-06-10T18:15:36.997000
|
||||
@ -254417,7 +254417,7 @@ CVE-2024-4859,0,0,3de5434b35db9344c6a8c9ff1c0891dd93d801d8510e1a23be87da56d66078
|
||||
CVE-2024-4860,0,0,078ece1acb5f59d15050f08de42942705925d025d9ef9dfb969c99e0b62152d4,2024-05-14T19:17:55.627000
|
||||
CVE-2024-4863,0,0,0f2a759d2230ea6d690206f8dcf95872d885a68184080990b57fd14696b63895,2024-06-17T12:42:04.623000
|
||||
CVE-2024-4865,0,0,034a7c12f3d6f4bd5ac54ee1f34abd70a559c5b9a18ae852351f79db6d61b9c9,2024-05-20T13:00:34.807000
|
||||
CVE-2024-4869,0,0,593e5fb5799155f397a96e871dc7fca6c762d99ed945ee53bb54b1ba5ddac4a0,2024-06-26T00:15:10.897000
|
||||
CVE-2024-4869,0,1,af51c1eee226c4cbb50e264de1c7a9cc126d126278458819152cafca85d017ce,2024-06-26T12:44:29.693000
|
||||
CVE-2024-4870,0,0,789ccad79b53f3162faaa4d0c14e00ab550e7e413c46a4332529e5d35d1d0423,2024-06-04T16:57:41.053000
|
||||
CVE-2024-4871,0,0,089a89f3309c27433f20e3be4ef9a00379f9f19601c1c8029649846113aed43a,2024-05-14T19:17:55.627000
|
||||
CVE-2024-4873,0,0,6d8194e640b182e2a2eb107c362a6b36fc019fdb0666ba51ea48c7f29b4462a1,2024-06-20T12:44:01.637000
|
||||
@ -254425,9 +254425,9 @@ CVE-2024-4874,0,0,e489f4227689f3d8a28a1c171b72c6312c838f037435967f317d135bb1153e
|
||||
CVE-2024-4875,0,0,aa35cb89fee530b58aa987ffc67ea97738c0ba567903bf01429a1a1259923db8,2024-05-21T12:37:59.687000
|
||||
CVE-2024-4876,0,0,02aac8d1be489833aa2e07f8be8ce083249ac7dc2fcc33fd144386b8d365fef2,2024-05-21T12:37:59.687000
|
||||
CVE-2024-4881,0,0,4f17be95dbf63ebb1e221e9270b941e4838c9b4d4b1f7c998cfbd25da7153e04,2024-06-07T14:56:05.647000
|
||||
CVE-2024-4883,0,0,406029fdd84600c4299d80bf2c3b48370ccd854e0854a6b26715e0cd6f69db60,2024-06-25T20:15:12.320000
|
||||
CVE-2024-4884,0,0,114bdb9e9fdb64b5f168a346046f1d52b4a9efa80d044fd39073855f0e5b4d15,2024-06-25T20:15:12.547000
|
||||
CVE-2024-4885,0,0,7ef48df6979e8fb16f242dc93c2a8416be8f5c0783ceea1122b6da2189c4a22e,2024-06-25T20:15:12.970000
|
||||
CVE-2024-4883,0,1,4968eaa5ac5e1ee17a980c68456ded7b931eebe67d4a414b20bc214305c03a05,2024-06-26T12:44:29.693000
|
||||
CVE-2024-4884,0,1,a65d7c966234cc9adc7a1e341a20fb8739e51ac3dffe18ddce8072a3b2cde893,2024-06-26T12:44:29.693000
|
||||
CVE-2024-4885,0,1,22d6963cd58c65e49df25eb28a77834d6672add7d9ec062caa1520eac011ea2d,2024-06-26T12:44:29.693000
|
||||
CVE-2024-4886,0,0,70a2658e30fa136039b1e074a6e8be9bdcf194b1162566fded2b24f4cbe33ef9,2024-06-11T17:14:56.323000
|
||||
CVE-2024-4887,0,0,7853500fd866e5198bb0d09f7fd788dadd2992f92f7258c295ddbf77fcf1dda2,2024-06-07T14:56:05.647000
|
||||
CVE-2024-4888,0,0,82b52d1bb0607490ca6395bb78af4ea4a91988192867806f2568c515e849d6fa,2024-06-07T14:56:05.647000
|
||||
@ -254487,9 +254487,9 @@ CVE-2024-4948,0,0,b05b3d79ed1bf722f64863ac2977f422c8f4b6d1e09bbc1d1e2e68fdf78370
|
||||
CVE-2024-4949,0,0,f0a79ad84a3544c6d743e80f76d1663673c23e46c12c5ac6e4f28e6bfa119dfe,2024-06-10T18:15:37.743000
|
||||
CVE-2024-4950,0,0,3ebada6d910a8901a57ded412adc347e7122b31907aba3a87df300b3f8515696,2024-06-10T18:15:37.830000
|
||||
CVE-2024-4956,0,0,ee2bcf2dea357e2a10f3afc4aab6bf4b7aa596bd0271ebb4f60e3d58e4ce3e86,2024-05-17T18:36:31.297000
|
||||
CVE-2024-4957,0,0,c873271fb997d5cd7833a51ea564e232e920a42fc37360d67e1a94dcf9c9e175,2024-06-26T06:15:16.237000
|
||||
CVE-2024-4957,0,1,fbe11ceff64da7f3b667bbba244809e23b59951bd8423f08944f8b63f6ca14e0,2024-06-26T12:44:29.693000
|
||||
CVE-2024-4958,0,0,2bbe45732cede494f69801845c1ffcb7706b51daa06d3118dc1540d009abe6d9,2024-06-03T14:46:24.250000
|
||||
CVE-2024-4959,0,0,819d8a79647d758d9708cddf9f6b97fd1a10562601d99f1211b2cb0f6c78de11,2024-06-26T06:15:16.347000
|
||||
CVE-2024-4959,0,1,99c51fccbdc3be4ec7a4f64a5f749631191acce391b06228ed01dc94d3cc689a,2024-06-26T12:44:29.693000
|
||||
CVE-2024-4960,0,0,7a8ddb2c3fde26a166a544c1ef080595386d19e05b6d4e7e6367c9f15a68a056,2024-06-04T19:20:55.213000
|
||||
CVE-2024-4961,0,0,0d2d4f4239c9a9f29742a2da2d8e79004d41b07adb750c3d0ef3c07228a3521b,2024-05-17T02:40:43.983000
|
||||
CVE-2024-4962,0,0,6c5bd74692e7fb9e5f8bab3246b40f1edbcfa52027a31b052d3ab9d12e9821c4,2024-06-04T19:20:55.343000
|
||||
@ -254522,18 +254522,18 @@ CVE-2024-5000,0,0,21f44bae275ca5e7f3a45da963612f2fb705c74e44c15e2681f54ff4506e6a
|
||||
CVE-2024-5001,0,0,bac0073c23ed28e836068e8632acf1110bc49b73246f9cff53f5a706acc4a57d,2024-06-06T14:17:35.017000
|
||||
CVE-2024-5003,0,0,d7f0fc1b6b7797a26bbde28f3345c21309ee3aa5cb19350abdc4f1d0ca9ec31a,2024-06-07T14:56:05.647000
|
||||
CVE-2024-5006,0,0,982820e7e91a551bd12476d9f6731c77df87e69f9a4499c2643412449b7b2aa0,2024-06-11T17:36:24
|
||||
CVE-2024-5008,0,0,0f0056345fe00a49980e5cc7c2f441a3fd06090a37e88d7d6c8b34444af231c1,2024-06-25T20:15:13.173000
|
||||
CVE-2024-5009,0,0,9696936a19f9f717fb468191da657fdec3b8338693e7c48fae6d74ba44ae237a,2024-06-25T20:15:13.427000
|
||||
CVE-2024-5010,0,0,3d9df9023da9f54d48f7a1e77a221e5e53e3bb1742183dbf1d772c4ec5f6ac38,2024-06-25T20:15:13.617000
|
||||
CVE-2024-5011,0,0,647bd1cc44c1fee15b38b2180648cea0555e3842a927e0c0b9a5a5ad94a8ddeb,2024-06-25T20:15:13.810000
|
||||
CVE-2024-5012,0,0,1fe92cc271dbb8f96116411baac6fd6171f4e7fd5e7d52812284c6f2cf41d7ae,2024-06-25T21:16:00.320000
|
||||
CVE-2024-5013,0,0,c1b3112417431fe3e430aff6dd883d8fa49f6fd4ebcd787ee6ba6f64da850cc4,2024-06-25T21:16:00.510000
|
||||
CVE-2024-5014,0,0,9698fdd84253787e4af61b0ffd1ad2521ea60f1a3e745e733ba9dbd59f8ccd50,2024-06-25T21:16:00.703000
|
||||
CVE-2024-5015,0,0,ab2cf550d41ff45c2d0c48baee93ea8c2bea48c2ca0b40ba152c70a0ff64eaa8,2024-06-25T21:16:00.890000
|
||||
CVE-2024-5016,0,0,df7ff55dbc032cbdc73c1c1f995987209f9e53bdc12462fe530cbd70b409e9f4,2024-06-25T21:16:01.163000
|
||||
CVE-2024-5017,0,0,c8116a2083c0c019a87ef14d62a7d99fbbd1883055ecf34488273624425cbab4,2024-06-25T21:16:01.357000
|
||||
CVE-2024-5018,0,0,6b20dc8688800a9e27e203c59def0ebbc2b231d613a8fbb6cf5fab86e14bd76b,2024-06-25T21:16:01.543000
|
||||
CVE-2024-5019,0,0,1fa9697017e77e8ffea630c86ee36a9fddb8c8ff6e841b6a1d359cade8303cbe,2024-06-25T21:16:01.743000
|
||||
CVE-2024-5008,0,1,2898dba519d9d217cfd3248b0ed35ab7edbdc176d5a083ab78d6d475e7126536,2024-06-26T12:44:29.693000
|
||||
CVE-2024-5009,0,1,6962f573c801f5b0e092acdcbfa87b6ce40236f9b33e88c574bca71c5e5b121e,2024-06-26T12:44:29.693000
|
||||
CVE-2024-5010,0,1,b0b92bafabc7dff56074914e43252c768d22195e064f7beeee10251e5c17e37f,2024-06-26T12:44:29.693000
|
||||
CVE-2024-5011,0,1,8cc21eda0fa9be1911bbfab52f9ccc0ae1c28af27137c1e715914224ff679913,2024-06-26T12:44:29.693000
|
||||
CVE-2024-5012,0,1,f942e2c178bb8822c98edb7f1cdf4f761616644959a0e751cf58049f2bb57780,2024-06-26T12:44:29.693000
|
||||
CVE-2024-5013,0,1,bb531428c542715f61ae4ae45e51ae45cc510ff371cf607b1227d5f33cc7eac1,2024-06-26T12:44:29.693000
|
||||
CVE-2024-5014,0,1,40ce68905a989afbbb5ec46a3c3cf417ad6a1d3491129adfd61c7464eb5f5b95,2024-06-26T12:44:29.693000
|
||||
CVE-2024-5015,0,1,501b12d2c355f05d8290a8a76f11d963d4a420ed6b2c942e4d48a2fc8cf03a8b,2024-06-26T12:44:29.693000
|
||||
CVE-2024-5016,0,1,23e7d249dbf7cbfbf778f4ac6983e2581873836b61f73559c397afcd7bb57819,2024-06-26T12:44:29.693000
|
||||
CVE-2024-5017,0,1,85e8e949218f92d693773a1fcc2771ac9e88ab4399fc84bc68ed25d827e9b058,2024-06-26T12:44:29.693000
|
||||
CVE-2024-5018,0,1,461647626ac90c5782b3c80f310bf4c90f390eba4ec4b82d8f6d5fde1fddea42,2024-06-26T12:44:29.693000
|
||||
CVE-2024-5019,0,1,d876d66882ea425a474b31a7603b2f3be5b1747685f9da4a322f9a99c6c10b4b,2024-06-26T12:44:29.693000
|
||||
CVE-2024-5021,0,0,872edc6307495a559587b3d1d37e361f617cf9935ecc4133654cc9effee7c33c,2024-06-20T12:44:01.637000
|
||||
CVE-2024-5022,0,0,106355f86b530d1586a5d339031de27a1a2312467a76eb449e8e9901150235d8,2024-05-20T13:00:34.807000
|
||||
CVE-2024-5023,0,0,974704283893df4cc9d8e0bcce8bb65ebf635268235f75f47c922033893214ce,2024-05-17T18:36:31.297000
|
||||
@ -254567,7 +254567,7 @@ CVE-2024-5064,0,0,8095cec9a36e031c818592c3e6e560630244970853fe1a2d62ef41815d0461
|
||||
CVE-2024-5065,0,0,854da1df0c358fed714b464bc000dc33fba39a0799286dd037bd479cf98e0180,2024-06-04T19:20:57.977000
|
||||
CVE-2024-5066,0,0,139b124858e7e99a1754c24fd2616eb6658e77af4be83fdcc1d993d51068360c,2024-05-20T13:00:34.807000
|
||||
CVE-2024-5069,0,0,3dc695c8b89e299df0488e9d65e83af5cf3b32a39325b6a3f19785e0f56f72a0,2024-06-04T19:20:58.080000
|
||||
CVE-2024-5071,0,0,5370fa20240c79f0eb38a4cf7f8414dfb5767b2c62c9099153457b81fc631ea4,2024-06-26T06:15:16.463000
|
||||
CVE-2024-5071,0,1,7523a9ad4bd89c0668c9224d08257b52394a4aa3d5c42354296fd45548ac40c6,2024-06-26T12:44:29.693000
|
||||
CVE-2024-5072,0,0,eed82a97a0ee00f59db20864a50c358c267684d10361dc2c7c81171fccc96a9c,2024-05-17T18:35:35.070000
|
||||
CVE-2024-5073,0,0,7de160448d11dc97e5a2a9338d2dd6c82b34c616c4ba587347e360e1f76b10e8,2024-05-30T13:15:41.297000
|
||||
CVE-2024-5084,0,0,92d8976ac3f9e8cdb8733c073caf2586c8f5a42e4f2b053a805034733b1a3630,2024-05-24T01:15:30.977000
|
||||
@ -254647,14 +254647,14 @@ CVE-2024-5163,0,0,891fa577af5d712f6c3d18cebfb44e2a6f24a31af0cc2dc5481c88da80665c
|
||||
CVE-2024-5165,0,0,1249b447729c1b58db4dd874ebf3238410613919325ce73c31963c57eb2e607f,2024-05-24T01:15:30.977000
|
||||
CVE-2024-5166,0,0,acd04bdcb3927ae2fc6875213ce44649287d9e14ecc961e10fc982fe1f8beeeb,2024-05-22T18:59:20.240000
|
||||
CVE-2024-5168,0,0,306ce12eec3dfa604048647f5d45c62ae3c9962c8122be3c41030f354ed300c2,2024-05-24T01:15:30.977000
|
||||
CVE-2024-5169,0,0,a026be0d5bf6de064155da24b0b3a7f89cfeaf59b83c91704eeae9d134a55c4c,2024-06-26T06:15:16.543000
|
||||
CVE-2024-5169,0,1,b1ca0b7cc98949f62453afcab28e83911d364c4494efe1f6507425f7cbc51120,2024-06-26T12:44:29.693000
|
||||
CVE-2024-5171,0,0,527a4a17adce934d1b4f4bf563487c5773fb7d5bb5e41f4824c0714e13ba1e90,2024-06-21T13:15:12.973000
|
||||
CVE-2024-5172,0,0,c11e28cee00d03ca550aa31f6a4a4e2619eb7f584486db6cbc532617ccc0d3c9,2024-06-20T12:44:01.637000
|
||||
CVE-2024-5173,0,0,3813c7c85f8bdc8e9bf1d287bd890858530abee0a3a487e39cf5d772019b1784,2024-06-26T02:15:09.340000
|
||||
CVE-2024-5173,0,1,1d07a8c869bc825cf73f46bac935aee62b58e8e6badef703c708e935b6259cfb,2024-06-26T12:44:29.693000
|
||||
CVE-2024-5176,0,0,d56ed998903dfaef1849b554412c043d7bedaec08a06683735e348a1e4cdd46d,2024-06-05T15:15:12.620000
|
||||
CVE-2024-5177,0,0,754731e9b12ab9d5b8190add19111b94a5e340744a68664c6a765c48e93c422c,2024-05-24T01:15:30.977000
|
||||
CVE-2024-5179,0,0,54358caa6e0360966d6f1b65f621cdbf9937e802ed8f2b5c2ee31999cdede484,2024-06-06T14:17:35.017000
|
||||
CVE-2024-5181,0,0,73e7801bd51baa660163f2cdef183babc6f2e9ee4742c1086d027bd9bc51282e,2024-06-26T03:15:10.987000
|
||||
CVE-2024-5181,0,1,1490518c3f763a5bc28caf27f315947d0d04f2023e03f107a32a0e693b85b149,2024-06-26T12:44:29.693000
|
||||
CVE-2024-5182,0,0,05eb067250c704bd4c420313ce1da2aeb70843fd4dce4dbb10fdc9fbc9defbb8,2024-06-20T12:43:25.663000
|
||||
CVE-2024-5184,0,0,de97ef0558df300043d1123a6fe8d6e2df5444a09bff76f28ec8a01317d2d79c,2024-06-18T17:06:20.257000
|
||||
CVE-2024-5185,0,0,b5caf3da810dd6351b96bbd5e231331a05f92e8956c63f18c155c13a8af19485,2024-05-29T15:18:26.427000
|
||||
@ -254669,7 +254669,7 @@ CVE-2024-5194,0,0,2277a7390d0159b3dc2e5dfd100175220ffc5f5725f8c88a7a9344e62a79d5
|
||||
CVE-2024-5195,0,0,f6d192ea152622e2514b6c95ac0c9e8770ec516eb328b6bc7a2579d1133e54f5,2024-06-04T19:21:02.077000
|
||||
CVE-2024-5196,0,0,8c75ba8e0441d5b101d1cc87d2ef19242f3cca5ce8fbf68169f935d22da02519,2024-06-04T19:21:02.183000
|
||||
CVE-2024-5197,0,0,e5a1e2e3af76ae1463b1471e62c8e67ed3eee2f7431619804309412d3993d4cd,2024-06-16T21:15:50.820000
|
||||
CVE-2024-5199,0,0,085b3c35699997957d05c7630e524527e19c993694abd0a60d3a606cc119bf60,2024-06-26T06:15:16.633000
|
||||
CVE-2024-5199,0,1,996e0c963d565db64016e4ac10a2ddabc1c115d0eed375718c507deaae0eb73a,2024-06-26T12:44:29.693000
|
||||
CVE-2024-5201,0,0,bf1f4d37f88403bb38854e126758e4f0ff9b7f5c32e7a6f763dbd9ae66e356bd,2024-05-24T01:15:30.977000
|
||||
CVE-2024-5202,0,0,b978a5507939d8449bc120b0c8b4b839304f46efdad98898b1b0c13e65a259b1,2024-05-24T01:15:30.977000
|
||||
CVE-2024-5203,0,0,c1cbddceebcc79a6f3361ec6d421c84f7c0d786eefdc42d89301f7f288b04ff8,2024-06-13T18:36:09.010000
|
||||
@ -254681,7 +254681,7 @@ CVE-2024-5208,0,0,3985337bac39b70213766ebf64511613ec02cc254f1933a2c8ecd567239b3c
|
||||
CVE-2024-5211,0,0,a4277f26aaa565cc417eac86a473b48ddc12386cf29490b9b3d30644e664c347,2024-06-13T18:36:09.010000
|
||||
CVE-2024-5213,0,0,5a68006f91028e70fb3202f4e898c6483c20faed2d33be845b22e07c07dc81e8,2024-06-20T12:43:25.663000
|
||||
CVE-2024-5214,0,0,77a86526714522a20940695733fe46b4562089752d3c663cf289b583b7c6bbda,2024-06-03T19:15:09.360000
|
||||
CVE-2024-5215,0,0,f306a6fd683bbca9dec2b5001194f7a2aee3240780576d3d923bb70ed937d7ae,2024-06-26T07:15:11.013000
|
||||
CVE-2024-5215,0,1,f42221106c0d0e877d05b8e2e26cf7673e58a6d4a9fc7867210cc0dc29795334,2024-06-26T12:44:29.693000
|
||||
CVE-2024-5216,0,0,f74916bcde595c5203a7e0644e281dc01f68ce529e1f3e14cc74a2e3eb525ca3,2024-06-25T12:24:17.873000
|
||||
CVE-2024-5218,0,0,928b5f8d4e08afc285c0cf6e370373ec87899b716b1cb4db68027907b01d2a82,2024-05-28T12:39:42.673000
|
||||
CVE-2024-5220,0,0,f61a4e43424028e9a9336f6f6ed766295c86a8a5421f6ff87daa2be13ac80d02,2024-05-28T12:39:42.673000
|
||||
@ -254730,7 +254730,7 @@ CVE-2024-5272,0,0,485554be89aaf429d625f742d41620b7105b55f3f82c1bd7e7c2afb7e9a676
|
||||
CVE-2024-5273,0,0,f7b775afc6e46cbf2933f26022bd5d6a5054d80bf2d607df2ea5eeb06bc0b97e,2024-06-10T18:15:38.157000
|
||||
CVE-2024-5274,0,0,815675421e4b9c2b34f2340865cc1ed903b3b9cc89dafcd7624436bba1c58088,2024-06-10T17:16:34.257000
|
||||
CVE-2024-5275,0,0,b81fd6634b953b380acd7d67040183676d61d3e908aa91611721c09fa7243801,2024-06-20T12:44:01.637000
|
||||
CVE-2024-5276,0,0,e0e0ee04023b9cd28865eece33d5f2610e99ed32ffe21f120462fb6dac6ea2f3,2024-06-25T20:15:14.013000
|
||||
CVE-2024-5276,0,1,d26b15babe17aac13cc613675e4c4ad8d9ecb0a2798444e0b74aa892858078e6,2024-06-26T12:44:29.693000
|
||||
CVE-2024-5277,0,0,08c2f56d5f9c6263336a67bd47c4fa52288bb09bcb2d8aeff245d6d39899edcf,2024-06-07T14:56:05.647000
|
||||
CVE-2024-5278,0,0,ba4b6329b00a48ecb03cef9d2f0cd09adc7cfa79e9cd9e8eb891a1136335fb69,2024-06-07T14:56:05.647000
|
||||
CVE-2024-5279,0,0,1f630d4d53c39cf2174e2a1edce8e1a5ead56a314739580d23644f8e4fedef07,2024-06-04T19:21:04.240000
|
||||
@ -254763,7 +254763,7 @@ CVE-2024-5326,0,0,9beaa1147d54b3ae536a6eb0023672ae377946ef8aec317bd58c5324df5850
|
||||
CVE-2024-5327,0,0,84b1605ed9f8fbbcd152a70275bed021ec8172a393ec025e57c9733c6898763a,2024-05-30T13:15:41.297000
|
||||
CVE-2024-5328,0,0,eccd57558969f598d341de2d66a168d40aa825b298603b31d124c5c65bd99501,2024-06-07T14:56:05.647000
|
||||
CVE-2024-5329,0,0,d0611aba519e3b4dd99e1f039e6e2f0eb2cd7ab02594b1f6812432d5e7c027f4,2024-06-11T17:42:26.677000
|
||||
CVE-2024-5332,0,0,f2e86bfadefa4a246d9bede10bf15cb73747b612c1844f985800142e39da6a95,2024-06-26T06:15:16.740000
|
||||
CVE-2024-5332,0,1,38119dd9a5428b9df2c1e792798f9c7c98836decd72ef41908a87c0a23701c2a,2024-06-26T12:44:29.693000
|
||||
CVE-2024-5336,0,0,c369166950e96ac23803f815e7b4d2b11cfe953eea9e75568f6bd3a698e57d70,2024-06-04T19:21:04.947000
|
||||
CVE-2024-5337,0,0,c248444f5c3efb36aad99df75367002d79331c50b5d3f0b33d4749de26828e2b,2024-06-04T19:21:05.063000
|
||||
CVE-2024-5338,0,0,89168a7f7dbda5d5f11c938f5cea67ca543a537a0633e07e1ea1ce3fb43d8fd7,2024-06-04T19:21:05.170000
|
||||
@ -254865,13 +254865,13 @@ CVE-2024-5453,0,0,f53a0f7c14e91f56fc73f4b75f7a3c7cc751f83b7f0078edb3a1d42587e454
|
||||
CVE-2024-5455,0,0,fba0854666bb0b703a1a17496073d4cacfc80d7dfcf08ea3fd5bf7812a480359,2024-06-21T11:22:01.687000
|
||||
CVE-2024-5458,0,0,9de49bd96b675511c7046065b94648120f7be327e28ebfffc7c76c5b629abe0a,2024-06-18T10:15:10.870000
|
||||
CVE-2024-5459,0,0,81bd5d1a4ebf239ba65f5777fb4bfb17f71fa270ff31c5f59fd635927a6c453f,2024-06-13T19:35:55.083000
|
||||
CVE-2024-5460,0,0,43ac837f57e384725fb6e9f39d6687eb5f899e829fc03221538b834ea94a5270,2024-06-26T00:15:11.093000
|
||||
CVE-2024-5460,0,1,85cda1c649a5547711ec36cd06d4f4f117811e9abf4f2bc54500bcb409f8f46a,2024-06-26T12:44:29.693000
|
||||
CVE-2024-5463,0,0,a83ead02d534db419d64d9a246adc999062f3a690f2d2cbba14bffeb9debf0f5,2024-06-04T16:57:41.053000
|
||||
CVE-2024-5464,0,0,20ac6d6efa943df789ee80e23b81c0dadba3276ccc683b7cb6fcce26ba339bb3,2024-06-17T12:42:04.623000
|
||||
CVE-2024-5465,0,0,9b677e9ed42136d68b443cf9dc4afa859310d29bdd1dad1920c040ce3c57d334,2024-06-17T12:42:04.623000
|
||||
CVE-2024-5468,0,0,2bc9c38a1a2994a4c4ceddf0376e8b3ff5412f95fe840378ab4577710a81e066,2024-06-13T18:36:09.010000
|
||||
CVE-2024-5469,0,0,a6ac25b89021bcbe477171d4304d10733bc198409739b73a4d379d6ba636b5b0,2024-06-17T12:42:04.623000
|
||||
CVE-2024-5473,0,0,ca431b85f40b48e144a857852f44dd99270d1c5952a8803d27b7c491a8643524,2024-06-26T06:15:17.197000
|
||||
CVE-2024-5473,0,1,68bff144c97ed7e10f458e1f3ffa79e9c82cd71e1f2f5c678ae893746348b4ac,2024-06-26T12:44:29.693000
|
||||
CVE-2024-5475,0,0,9a35a27ed618b47a569e72c9eedce24392059deeff1f9ce687dca2ba057faa99,2024-06-20T12:43:25.663000
|
||||
CVE-2024-5478,0,0,cbce39d40f4102e26dfaf35e6a6b20bf349245ad3d94d864b4543f6f43a9d245,2024-06-07T14:56:05.647000
|
||||
CVE-2024-5480,0,0,0c96379cb76c4f8b6d9852cdcc0f60ebab5e5f97f64e4439ef99fbfb3e3714ee,2024-06-07T14:56:05.647000
|
||||
@ -254928,7 +254928,7 @@ CVE-2024-5560,0,0,f1a6e79f857dcb0da00298e85540b2901c155f3f4e8e842ef291f9f993b61e
|
||||
CVE-2024-5564,0,0,dcea96840208d2ac663aaa4f0f3c3d4a29deb4a56217e3b064f75f0ccdd62128,2024-06-19T20:15:12.277000
|
||||
CVE-2024-5565,0,0,830316f5c713618fdad4a0eda5b7296c22d5d93c87a8813197db3ff9cf28c4ee,2024-05-31T19:14:47.793000
|
||||
CVE-2024-5571,0,0,105c4e644019eeccf72c6e63813cdc36601b1b9a7e3cba5bc172df86631261e6,2024-06-11T17:29:03.277000
|
||||
CVE-2024-5573,0,0,7f9d6285b5085efd7797f7d94c31db15a2417902c221c2f51dae77459c33a5c5,2024-06-26T06:15:17.300000
|
||||
CVE-2024-5573,0,1,51a9ffd3da1267c4eef69596ac09c3dbea287270e0762cf7f98d2ed1f452fbf5,2024-06-26T12:44:29.693000
|
||||
CVE-2024-5574,0,0,3e624f806d94dcff352fde1d5be73aa27a333a70d66ed500b1d4bd0c17214488,2024-06-20T12:44:01.637000
|
||||
CVE-2024-5577,0,0,0394e112329dfafbe6884a2484f7873076e1a8201ddc51d40c9b2393b5d88276,2024-06-17T12:42:04.623000
|
||||
CVE-2024-5584,0,0,612eacfcf6c3fd3d6fdd0ff2c66e496cc817b02568ea9f69c40277bbc0300578,2024-06-11T13:54:12.057000
|
||||
@ -255131,7 +255131,7 @@ CVE-2024-6056,0,0,9210a6d5e69cda44c36495fe4964320c8f6a47f4e723a559827fc7a6d2ee59
|
||||
CVE-2024-6057,0,0,3fe0cc3f033e9735165b225d202aca1a708a694e0fe3a8863e85d03de2c16d7c,2024-06-20T12:44:22.977000
|
||||
CVE-2024-6058,0,0,a8d358e50f82c303138db4a312533e61278f479f2387c71d6c209ba9ed223766,2024-06-20T12:44:22.977000
|
||||
CVE-2024-6059,0,0,0652872fd6b84bdbe955862646f7076a37dc5f6685ecdae3319bf6195e0e8f13,2024-06-20T12:44:22.977000
|
||||
CVE-2024-6060,0,0,ee47a28d94f78307c704af2d1535d0d8463f4327fe622591e6d161297aa2271c,2024-06-25T22:15:35.347000
|
||||
CVE-2024-6060,0,1,4eb8b5c4a713d8fedd6d97c8e5e0153e94ea5e7058f16bc4e2bd73372c4078d4,2024-06-26T12:44:29.693000
|
||||
CVE-2024-6061,0,0,3fef78bcd0588e7cd49d6e518ec4c2f5bfa6c9508485b37687f3859e72f1e0b3,2024-06-20T12:44:22.977000
|
||||
CVE-2024-6062,0,0,4376548ceed49a6279fb764d06a2668721f5b2377b1cd81005297361a58fafee,2024-06-20T12:44:22.977000
|
||||
CVE-2024-6063,0,0,105b47008bd97b9ef828e0642500faec85639c6116c40931e2e5a8256ab187a7,2024-06-20T12:44:22.977000
|
||||
@ -255192,7 +255192,7 @@ CVE-2024-6193,0,0,a4bea5283fdf7332b754649129a7a49b1681f55f64693a6877fa456de3af88
|
||||
CVE-2024-6194,0,0,8fba52ae1e26593e8f532ec1813c89aa27500e4749964486d15ce611179907d5,2024-06-21T11:22:01.687000
|
||||
CVE-2024-6195,0,0,880630f7e59fe96c68db9446cad414c3056228167cb15e9eb7f8a5b897e9683e,2024-06-21T11:22:01.687000
|
||||
CVE-2024-6196,0,0,8d29dbc22f191f0a2e6f5022705b8c2127b1c89230e4a1900a70835df0ab8ad4,2024-06-21T17:15:11.350000
|
||||
CVE-2024-6206,0,0,e75306b78153b018c6a37eb8b9ea2a7630f1bcb2e55cbbf048f4a0bc9d85d3b4,2024-06-25T20:15:14.210000
|
||||
CVE-2024-6206,0,1,a239648c07eb93ed8775dc2c6fd68864bae94b397314d858106207781c570047,2024-06-26T12:44:29.693000
|
||||
CVE-2024-6212,0,0,c1e9ad93b654311e54f23eb8816b7040c4009f7be4b90d449446bdaf277f7228,2024-06-21T15:15:16.313000
|
||||
CVE-2024-6213,0,0,875f788502e9039ff5cde644917f38d937eec3d1fa9cda735bda62057b13f974,2024-06-21T11:22:01.687000
|
||||
CVE-2024-6214,0,0,f04922fee1928885a13a6b9135dd29d8f0bc0dcf3373a5ce58e6bf8d17734328,2024-06-21T15:15:16.430000
|
||||
@ -255239,4 +255239,4 @@ CVE-2024-6305,0,0,f99f0e2fe8305a118a77228b9078f8dc9ee1845d0c6e4aa828aaf18dadf372
|
||||
CVE-2024-6306,0,0,711bff153bb36aca97259b9a58665f79686710d592de1aed3b99962d3c3067a2,2024-06-25T17:15:11.107000
|
||||
CVE-2024-6307,0,0,8ab5a431e062520bb1ad7f310d46410dbbde3d3f7608d294c115bc975c016c27,2024-06-25T12:24:17.873000
|
||||
CVE-2024-6308,0,0,483bab7c0040f40965fba497a0be9e45fef6974a263c54d39149185a218f4b43,2024-06-25T21:16:02.087000
|
||||
CVE-2024-6344,1,1,5156b85dd9540f99b8e29234f37ed16845cec606e9d0f2f119187d87ed527f37,2024-06-26T11:15:52.073000
|
||||
CVE-2024-6344,0,1,158fe8ce5a3890f545b2644b2bf88be098b9fb0d23e412b15a910b7a664aee59,2024-06-26T12:44:29.693000
|
||||
|
Can't render this file because it is too large.
|
Loading…
x
Reference in New Issue
Block a user