Auto-Update: 2024-06-26T14:00:18.791020+00:00

This commit is contained in:
cad-safe-bot 2024-06-26 14:03:10 +00:00
parent 8fbee460d6
commit 0e9d8c51cd
80 changed files with 775 additions and 283 deletions

View File

@ -2,12 +2,12 @@
"id": "CVE-2022-29420", "id": "CVE-2022-29420",
"sourceIdentifier": "audit@patchstack.com", "sourceIdentifier": "audit@patchstack.com",
"published": "2022-05-06T17:15:09.157", "published": "2022-05-06T17:15:09.157",
"lastModified": "2022-05-16T16:40:13.520", "lastModified": "2024-06-26T13:15:49.553",
"vulnStatus": "Analyzed", "vulnStatus": "Modified",
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",
"value": "Authenticated (admin+) Stored Cross-Site Scripting (XSS) vulnerability in Adam Skaat's Countdown & Clock plugin <= 2.3.2 at WordPress via &ycd-circle-countdown-before-countdown and &ycd-circle-countdown-after-countdown vulnerable parameters." "value": "Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Adam Skaat Countdown & Clock (WordPress plugin) countdown-builder allows Stored XSS.This issue affects Countdown & Clock (WordPress plugin): from n/a through 2.3.2."
}, },
{ {
"lang": "es", "lang": "es",
@ -41,20 +41,20 @@
"type": "Secondary", "type": "Secondary",
"cvssData": { "cvssData": {
"version": "3.1", "version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:N/I:L/A:N", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:L",
"attackVector": "NETWORK", "attackVector": "NETWORK",
"attackComplexity": "LOW", "attackComplexity": "LOW",
"privilegesRequired": "HIGH", "privilegesRequired": "HIGH",
"userInteraction": "REQUIRED", "userInteraction": "REQUIRED",
"scope": "CHANGED", "scope": "CHANGED",
"confidentialityImpact": "NONE", "confidentialityImpact": "LOW",
"integrityImpact": "LOW", "integrityImpact": "LOW",
"availabilityImpact": "NONE", "availabilityImpact": "LOW",
"baseScore": 3.4, "baseScore": 5.9,
"baseSeverity": "LOW" "baseSeverity": "MEDIUM"
}, },
"exploitabilityScore": 1.7, "exploitabilityScore": 1.7,
"impactScore": 1.4 "impactScore": 3.7
} }
], ],
"cvssMetricV2": [ "cvssMetricV2": [
@ -120,14 +120,6 @@
"tags": [ "tags": [
"Third Party Advisory" "Third Party Advisory"
] ]
},
{
"url": "https://wordpress.org/plugins/countdown-builder/",
"source": "audit@patchstack.com",
"tags": [
"Product",
"Third Party Advisory"
]
} }
] ]
} }

View File

@ -2,12 +2,16 @@
"id": "CVE-2024-21520", "id": "CVE-2024-21520",
"sourceIdentifier": "report@snyk.io", "sourceIdentifier": "report@snyk.io",
"published": "2024-06-26T05:15:50.093", "published": "2024-06-26T05:15:50.093",
"lastModified": "2024-06-26T05:15:50.093", "lastModified": "2024-06-26T12:44:29.693",
"vulnStatus": "Received", "vulnStatus": "Awaiting Analysis",
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",
"value": "Versions of the package djangorestframework before 3.15.2 are vulnerable to Cross-site Scripting (XSS) via the break_long_headers template filter due to improper input sanitization before splitting and joining with <br> tags." "value": "Versions of the package djangorestframework before 3.15.2 are vulnerable to Cross-site Scripting (XSS) via the break_long_headers template filter due to improper input sanitization before splitting and joining with <br> tags."
},
{
"lang": "es",
"value": "Las versiones del paquete djangorestframework anteriores a la 3.15.2 son vulnerables a Cross-site Scripting (XSS) a trav\u00e9s del filtro de plantilla break_long_headers debido a una sanitizaci\u00f3n inadecuada de la entrada antes de dividir y unir con etiquetas <br>."
} }
], ],
"metrics": { "metrics": {

View File

@ -2,12 +2,16 @@
"id": "CVE-2024-21739", "id": "CVE-2024-21739",
"sourceIdentifier": "cve@mitre.org", "sourceIdentifier": "cve@mitre.org",
"published": "2024-06-25T21:15:57.007", "published": "2024-06-25T21:15:57.007",
"lastModified": "2024-06-25T21:15:57.007", "lastModified": "2024-06-26T12:44:29.693",
"vulnStatus": "Received", "vulnStatus": "Awaiting Analysis",
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",
"value": "Geehy APM32F103CCT6, APM32F103RCT6, APM32F103RCT7, and APM32F103VCT6 devices have Incorrect Access Control." "value": "Geehy APM32F103CCT6, APM32F103RCT6, APM32F103RCT7, and APM32F103VCT6 devices have Incorrect Access Control."
},
{
"lang": "es",
"value": "Los dispositivos Geehy APM32F103CCT6, APM32F103RCT6, APM32F103RCT7 y APM32F103VCT6 tienen control de acceso incorrecto."
} }
], ],
"metrics": {}, "metrics": {},

View File

@ -2,12 +2,16 @@
"id": "CVE-2024-21740", "id": "CVE-2024-21740",
"sourceIdentifier": "cve@mitre.org", "sourceIdentifier": "cve@mitre.org",
"published": "2024-06-25T21:15:57.190", "published": "2024-06-25T21:15:57.190",
"lastModified": "2024-06-25T21:15:57.190", "lastModified": "2024-06-26T12:44:29.693",
"vulnStatus": "Received", "vulnStatus": "Awaiting Analysis",
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",
"value": "Artery AT32F415CBT7 and AT32F421C8T7 devices have Incorrect Access Control." "value": "Artery AT32F415CBT7 and AT32F421C8T7 devices have Incorrect Access Control."
},
{
"lang": "es",
"value": "Los dispositivos Artery AT32F415CBT7 y AT32F421C8T7 tienen control de acceso incorrecto."
} }
], ],
"metrics": {}, "metrics": {},

View File

@ -2,12 +2,16 @@
"id": "CVE-2024-21741", "id": "CVE-2024-21741",
"sourceIdentifier": "cve@mitre.org", "sourceIdentifier": "cve@mitre.org",
"published": "2024-06-25T21:15:57.357", "published": "2024-06-25T21:15:57.357",
"lastModified": "2024-06-25T21:15:57.357", "lastModified": "2024-06-26T12:44:29.693",
"vulnStatus": "Received", "vulnStatus": "Awaiting Analysis",
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",
"value": "GigaDevice GD32E103C8T6 devices have Incorrect Access Control." "value": "GigaDevice GD32E103C8T6 devices have Incorrect Access Control."
},
{
"lang": "es",
"value": "Los dispositivos GigaDevice GD32E103C8T6 tienen un control de acceso incorrecto."
} }
], ],
"metrics": {}, "metrics": {},

View File

@ -2,12 +2,16 @@
"id": "CVE-2024-24764", "id": "CVE-2024-24764",
"sourceIdentifier": "security-advisories@github.com", "sourceIdentifier": "security-advisories@github.com",
"published": "2024-06-26T01:15:47.890", "published": "2024-06-26T01:15:47.890",
"lastModified": "2024-06-26T01:15:47.890", "lastModified": "2024-06-26T12:44:29.693",
"vulnStatus": "Received", "vulnStatus": "Awaiting Analysis",
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",
"value": "October is a self-hosted CMS platform based on the Laravel PHP Framework. This issue affects authenticated administrators who may be redirected to an untrusted URL using the PageFinder schema. The resolver for the page finder link schema (`october://`) allowed external links, therefore allowing an open redirect outside the scope of the active host. This vulnerability has been patched in version 3.5.15." "value": "October is a self-hosted CMS platform based on the Laravel PHP Framework. This issue affects authenticated administrators who may be redirected to an untrusted URL using the PageFinder schema. The resolver for the page finder link schema (`october://`) allowed external links, therefore allowing an open redirect outside the scope of the active host. This vulnerability has been patched in version 3.5.15."
},
{
"lang": "es",
"value": "October es una plataforma CMS autohospedada basada en Laravel PHP Framework. Este problema afecta a los administradores autenticados que pueden ser redirigidos a una URL que no es de confianza mediante el esquema de PageFinder. El solucionador del esquema de enlace del buscador de p\u00e1ginas (`october://`) permit\u00eda enlaces externos, por lo que permit\u00eda una redirecci\u00f3n abierta fuera del alcance del host activo. Esta vulnerabilidad ha sido parcheada en la versi\u00f3n 3.5.15."
} }
], ],
"metrics": { "metrics": {

View File

@ -2,12 +2,16 @@
"id": "CVE-2024-27867", "id": "CVE-2024-27867",
"sourceIdentifier": "product-security@apple.com", "sourceIdentifier": "product-security@apple.com",
"published": "2024-06-26T04:15:11.637", "published": "2024-06-26T04:15:11.637",
"lastModified": "2024-06-26T04:15:11.637", "lastModified": "2024-06-26T12:44:29.693",
"vulnStatus": "Received", "vulnStatus": "Awaiting Analysis",
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",
"value": "An authentication issue was addressed with improved state management. This issue is fixed in AirPods Firmware Update 6A326, AirPods Firmware Update 6F8, and Beats Firmware Update 6F8. When your headphones are seeking a connection request to one of your previously paired devices, an attacker in Bluetooth range might be able to spoof the intended source device and gain access to your headphones." "value": "An authentication issue was addressed with improved state management. This issue is fixed in AirPods Firmware Update 6A326, AirPods Firmware Update 6F8, and Beats Firmware Update 6F8. When your headphones are seeking a connection request to one of your previously paired devices, an attacker in Bluetooth range might be able to spoof the intended source device and gain access to your headphones."
},
{
"lang": "es",
"value": "Se solucion\u00f3 un problema de autenticaci\u00f3n con una gesti\u00f3n de estado mejorada. Este problema se solucion\u00f3 en la Actualizaci\u00f3n de firmware de AirPods 6A326, la Actualizaci\u00f3n de firmware de AirPods 6F8 y la Actualizaci\u00f3n de firmware de Beats 6F8. Cuando sus auriculares buscan una solicitud de conexi\u00f3n a uno de sus dispositivos previamente emparejados, un atacante dentro del alcance de Bluetooth podr\u00eda falsificar el dispositivo fuente deseado y obtener acceso a sus auriculares."
} }
], ],
"metrics": {}, "metrics": {},

View File

@ -2,12 +2,16 @@
"id": "CVE-2024-28830", "id": "CVE-2024-28830",
"sourceIdentifier": "security@checkmk.com", "sourceIdentifier": "security@checkmk.com",
"published": "2024-06-26T08:15:09.630", "published": "2024-06-26T08:15:09.630",
"lastModified": "2024-06-26T08:15:09.630", "lastModified": "2024-06-26T12:44:29.693",
"vulnStatus": "Received", "vulnStatus": "Awaiting Analysis",
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",
"value": "Insertion of Sensitive Information into Log File in Checkmk GmbH's Checkmk versions <2.3.0p7, <2.2.0p28, <2.1.0p45 and <=2.0.0p39 (EOL) causes automation user secrets to be written to audit log files accessible to administrators." "value": "Insertion of Sensitive Information into Log File in Checkmk GmbH's Checkmk versions <2.3.0p7, <2.2.0p28, <2.1.0p45 and <=2.0.0p39 (EOL) causes automation user secrets to be written to audit log files accessible to administrators."
},
{
"lang": "es",
"value": "La inserci\u00f3n de informaci\u00f3n confidencial en un archivo de registro en las versiones de Checkmk GmbH &lt;2.3.0p7, &lt;2.2.0p28, &lt;2.1.0p45 y &lt;=2.0.0p39 (EOL) hace que los secretos de usuario de automatizaci\u00f3n se escriban en archivos de registro de auditor\u00eda accesibles a los administradores."
} }
], ],
"metrics": { "metrics": {

View File

@ -2,12 +2,16 @@
"id": "CVE-2024-28973", "id": "CVE-2024-28973",
"sourceIdentifier": "security_alert@emc.com", "sourceIdentifier": "security_alert@emc.com",
"published": "2024-06-26T03:15:09.640", "published": "2024-06-26T03:15:09.640",
"lastModified": "2024-06-26T03:15:09.640", "lastModified": "2024-06-26T12:44:29.693",
"vulnStatus": "Received", "vulnStatus": "Awaiting Analysis",
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",
"value": "Dell PowerProtect DD, versions prior to 8.0, LTS 7.13.1.0, LTS 7.10.1.30, LTS 7.7.5.40 contain a Stored Cross-Site Scripting Vulnerability. A remote high privileged attacker could potentially exploit this vulnerability, leading to the storage of malicious HTML or JavaScript codes in a trusted application data store. When a high privileged victim user accesses the data store through their browsers, the malicious code gets executed by the web browser in the context of the vulnerable web application. Exploitation may lead to information disclosure, session theft, or client-side request forgery" "value": "Dell PowerProtect DD, versions prior to 8.0, LTS 7.13.1.0, LTS 7.10.1.30, LTS 7.7.5.40 contain a Stored Cross-Site Scripting Vulnerability. A remote high privileged attacker could potentially exploit this vulnerability, leading to the storage of malicious HTML or JavaScript codes in a trusted application data store. When a high privileged victim user accesses the data store through their browsers, the malicious code gets executed by the web browser in the context of the vulnerable web application. Exploitation may lead to information disclosure, session theft, or client-side request forgery"
},
{
"lang": "es",
"value": "Dell PowerProtect DD, versiones anteriores a 8.0, LTS 7.13.1.0, LTS 7.10.1.30, LTS 7.7.5.40 contienen una vulnerabilidad de Cross-Site Scripting Almacenado. Un atacante remoto con altos privilegios podr\u00eda explotar esta vulnerabilidad, lo que llevar\u00eda al almacenamiento de c\u00f3digos HTML o JavaScript maliciosos en un almac\u00e9n de datos de aplicaciones confiable. Cuando un usuario v\u00edctima con altos privilegios accede al almac\u00e9n de datos a trav\u00e9s de sus navegadores, el navegador web ejecuta el c\u00f3digo malicioso en el contexto de la aplicaci\u00f3n web vulnerable. La explotaci\u00f3n puede dar lugar a la divulgaci\u00f3n de informaci\u00f3n, el robo de sesiones o la falsificaci\u00f3n de solicitudes por parte del cliente."
} }
], ],
"metrics": { "metrics": {

View File

@ -2,12 +2,16 @@
"id": "CVE-2024-29173", "id": "CVE-2024-29173",
"sourceIdentifier": "security_alert@emc.com", "sourceIdentifier": "security_alert@emc.com",
"published": "2024-06-26T03:15:09.877", "published": "2024-06-26T03:15:09.877",
"lastModified": "2024-06-26T03:15:09.877", "lastModified": "2024-06-26T12:44:29.693",
"vulnStatus": "Received", "vulnStatus": "Awaiting Analysis",
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",
"value": "Dell PowerProtect DD, versions prior to 8.0, LTS 7.13.1.0, LTS 7.10.1.30, LTS 7.7.5.40 contain a Server-Side Request Forgery (SSRF) vulnerability. A remote high privileged attacker could potentially exploit this vulnerability, leading to disclosure of information on the application or remote client." "value": "Dell PowerProtect DD, versions prior to 8.0, LTS 7.13.1.0, LTS 7.10.1.30, LTS 7.7.5.40 contain a Server-Side Request Forgery (SSRF) vulnerability. A remote high privileged attacker could potentially exploit this vulnerability, leading to disclosure of information on the application or remote client."
},
{
"lang": "es",
"value": "Dell PowerProtect DD, versiones anteriores a 8.0, LTS 7.13.1.0, LTS 7.10.1.30, LTS 7.7.5.40 contienen una vulnerabilidad de Server Side Request Forgery (SSRF). Un atacante remoto con altos privilegios podr\u00eda explotar esta vulnerabilidad, lo que llevar\u00eda a la divulgaci\u00f3n de informaci\u00f3n sobre la aplicaci\u00f3n o el cliente remoto."
} }
], ],
"metrics": { "metrics": {

View File

@ -2,12 +2,16 @@
"id": "CVE-2024-29174", "id": "CVE-2024-29174",
"sourceIdentifier": "security_alert@emc.com", "sourceIdentifier": "security_alert@emc.com",
"published": "2024-06-26T03:15:10.100", "published": "2024-06-26T03:15:10.100",
"lastModified": "2024-06-26T03:15:10.100", "lastModified": "2024-06-26T12:44:29.693",
"vulnStatus": "Received", "vulnStatus": "Awaiting Analysis",
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",
"value": "Dell Data Domain, versions prior to 7.13.0.0, LTS 7.7.5.30, LTS 7.10.1.20 contain an SQL Injection vulnerability. A local low privileged attacker could potentially exploit this vulnerability, leading to the execution of certain SQL commands on the application's backend database causing unauthorized access to application data." "value": "Dell Data Domain, versions prior to 7.13.0.0, LTS 7.7.5.30, LTS 7.10.1.20 contain an SQL Injection vulnerability. A local low privileged attacker could potentially exploit this vulnerability, leading to the execution of certain SQL commands on the application's backend database causing unauthorized access to application data."
},
{
"lang": "es",
"value": "Dell Data Domain, versiones anteriores a 7.13.0.0, LTS 7.7.5.30, LTS 7.10.1.20 contienen una vulnerabilidad de inyecci\u00f3n SQL. Un atacante local con pocos privilegios podr\u00eda explotar esta vulnerabilidad, lo que llevar\u00eda a la ejecuci\u00f3n de ciertos comandos SQL en la base de datos backend de la aplicaci\u00f3n, lo que provocar\u00eda un acceso no autorizado a los datos de la aplicaci\u00f3n."
} }
], ],
"metrics": { "metrics": {

View File

@ -2,12 +2,16 @@
"id": "CVE-2024-29175", "id": "CVE-2024-29175",
"sourceIdentifier": "security_alert@emc.com", "sourceIdentifier": "security_alert@emc.com",
"published": "2024-06-26T03:15:10.303", "published": "2024-06-26T03:15:10.303",
"lastModified": "2024-06-26T03:15:10.303", "lastModified": "2024-06-26T12:44:29.693",
"vulnStatus": "Received", "vulnStatus": "Awaiting Analysis",
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",
"value": "Dell PowerProtect Data Domain, versions prior to 7.13.0.0, LTS 7.7.5.40, LTS 7.10.1.30 contain an weak cryptographic algorithm vulnerability. A remote unauthenticated attacker could potentially exploit this vulnerability, leading to man-in-the-middle attack that exposes sensitive session information." "value": "Dell PowerProtect Data Domain, versions prior to 7.13.0.0, LTS 7.7.5.40, LTS 7.10.1.30 contain an weak cryptographic algorithm vulnerability. A remote unauthenticated attacker could potentially exploit this vulnerability, leading to man-in-the-middle attack that exposes sensitive session information."
},
{
"lang": "es",
"value": "Dell PowerProtect Data Domain, versiones anteriores a 7.13.0.0, LTS 7.7.5.40, LTS 7.10.1.30 contienen una vulnerabilidad de algoritmo criptogr\u00e1fico d\u00e9bil. Un atacante remoto no autenticado podr\u00eda explotar esta vulnerabilidad, lo que provocar\u00eda un ataque de intermediario que exponga informaci\u00f3n confidencial de la sesi\u00f3n."
} }
], ],
"metrics": { "metrics": {

View File

@ -2,12 +2,16 @@
"id": "CVE-2024-29176", "id": "CVE-2024-29176",
"sourceIdentifier": "security_alert@emc.com", "sourceIdentifier": "security_alert@emc.com",
"published": "2024-06-26T03:15:10.533", "published": "2024-06-26T03:15:10.533",
"lastModified": "2024-06-26T03:15:10.533", "lastModified": "2024-06-26T12:44:29.693",
"vulnStatus": "Received", "vulnStatus": "Awaiting Analysis",
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",
"value": "Dell PowerProtect DD, versions prior to 8.0, LTS 7.13.1.0, LTS 7.10.1.30, LTS 7.7.5.40 contain a buffer overflow vulnerability. A remote low privileged attacker could potentially exploit this vulnerability, leading to an application crash or execution of arbitrary code on the vulnerable application's underlying operating system with privileges of the vulnerable application." "value": "Dell PowerProtect DD, versions prior to 8.0, LTS 7.13.1.0, LTS 7.10.1.30, LTS 7.7.5.40 contain a buffer overflow vulnerability. A remote low privileged attacker could potentially exploit this vulnerability, leading to an application crash or execution of arbitrary code on the vulnerable application's underlying operating system with privileges of the vulnerable application."
},
{
"lang": "es",
"value": "Dell PowerProtect DD, versiones anteriores a 8.0, LTS 7.13.1.0, LTS 7.10.1.30, LTS 7.7.5.40 contienen una vulnerabilidad de desbordamiento del b\u00fafer. Un atacante remoto con pocos privilegios podr\u00eda explotar esta vulnerabilidad, lo que provocar\u00eda un bloqueo de la aplicaci\u00f3n o la ejecuci\u00f3n de c\u00f3digo arbitrario en el sistema operativo subyacente de la aplicaci\u00f3n vulnerable con los privilegios de la aplicaci\u00f3n vulnerable."
} }
], ],
"metrics": { "metrics": {

View File

@ -2,12 +2,16 @@
"id": "CVE-2024-29177", "id": "CVE-2024-29177",
"sourceIdentifier": "security_alert@emc.com", "sourceIdentifier": "security_alert@emc.com",
"published": "2024-06-26T03:15:10.767", "published": "2024-06-26T03:15:10.767",
"lastModified": "2024-06-26T03:15:10.767", "lastModified": "2024-06-26T12:44:29.693",
"vulnStatus": "Received", "vulnStatus": "Awaiting Analysis",
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",
"value": "Dell PowerProtect DD, versions prior to 8.0, LTS 7.13.1.0, LTS 7.10.1.30, LTS 7.7.5.40 contain a disclosure of temporary sensitive information vulnerability. A remote high privileged attacker could potentially exploit this vulnerability, leading to the reuse of disclosed information to gain unauthorized access to the application report." "value": "Dell PowerProtect DD, versions prior to 8.0, LTS 7.13.1.0, LTS 7.10.1.30, LTS 7.7.5.40 contain a disclosure of temporary sensitive information vulnerability. A remote high privileged attacker could potentially exploit this vulnerability, leading to the reuse of disclosed information to gain unauthorized access to the application report."
},
{
"lang": "es",
"value": "Dell PowerProtect DD, versiones anteriores a 8.0, LTS 7.13.1.0, LTS 7.10.1.30, LTS 7.7.5.40 contienen una divulgaci\u00f3n de vulnerabilidad de informaci\u00f3n confidencial temporal. Un atacante remoto con privilegios elevados podr\u00eda explotar esta vulnerabilidad, lo que llevar\u00eda a la reutilizaci\u00f3n de la informaci\u00f3n divulgada para obtener acceso no autorizado al informe de la aplicaci\u00f3n."
} }
], ],
"metrics": { "metrics": {

View File

@ -2,12 +2,16 @@
"id": "CVE-2024-29953", "id": "CVE-2024-29953",
"sourceIdentifier": "sirt@brocade.com", "sourceIdentifier": "sirt@brocade.com",
"published": "2024-06-26T00:15:10.030", "published": "2024-06-26T00:15:10.030",
"lastModified": "2024-06-26T00:15:10.030", "lastModified": "2024-06-26T12:44:29.693",
"vulnStatus": "Received", "vulnStatus": "Awaiting Analysis",
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",
"value": "A vulnerability in the web interface in Brocade Fabric OS before v9.2.1, v9.2.0b, and v9.1.1d prints encoded session passwords on session storage for Virtual Fabric platforms. \nThis could allow an authenticated user to view other users' session encoded passwords." "value": "A vulnerability in the web interface in Brocade Fabric OS before v9.2.1, v9.2.0b, and v9.1.1d prints encoded session passwords on session storage for Virtual Fabric platforms. \nThis could allow an authenticated user to view other users' session encoded passwords."
},
{
"lang": "es",
"value": "Una vulnerabilidad en la interfaz web en Brocade Fabric OS anterior a v9.2.1, v9.2.0b y v9.1.1d imprime contrase\u00f1as de sesi\u00f3n codificadas en el almacenamiento de sesiones para plataformas Virtual Fabric. Esto podr\u00eda permitir que un usuario autenticado vea las contrase\u00f1as codificadas de sesi\u00f3n de otros usuarios."
} }
], ],
"metrics": { "metrics": {

View File

@ -2,12 +2,16 @@
"id": "CVE-2024-29954", "id": "CVE-2024-29954",
"sourceIdentifier": "sirt@brocade.com", "sourceIdentifier": "sirt@brocade.com",
"published": "2024-06-26T00:15:10.263", "published": "2024-06-26T00:15:10.263",
"lastModified": "2024-06-26T00:15:10.263", "lastModified": "2024-06-26T12:44:29.693",
"vulnStatus": "Received", "vulnStatus": "Awaiting Analysis",
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",
"value": "A vulnerability in a password management API in Brocade Fabric OS versions before v9.2.1, v9.2.0b, v9.1.1d, and v8.2.3e prints sensitive information in log files. This could allow an authenticated user to view the server passwords for protocols such as scp and sftp.\n\nDetail.\nWhen the firmwaredownload command is incorrectly entered or points to an erroneous file, the firmware download log captures the failed command, including any password entered in the command line." "value": "A vulnerability in a password management API in Brocade Fabric OS versions before v9.2.1, v9.2.0b, v9.1.1d, and v8.2.3e prints sensitive information in log files. This could allow an authenticated user to view the server passwords for protocols such as scp and sftp.\n\nDetail.\nWhen the firmwaredownload command is incorrectly entered or points to an erroneous file, the firmware download log captures the failed command, including any password entered in the command line."
},
{
"lang": "es",
"value": "Una vulnerabilidad en una API de administraci\u00f3n de contrase\u00f1as en las versiones de Brocade Fabric OS anteriores a v9.2.1, v9.2.0b, v9.1.1d y v8.2.3e imprime informaci\u00f3n confidencial en archivos de registro. Esto podr\u00eda permitir a un usuario autenticado ver las contrase\u00f1as del servidor para protocolos como scp y sftp. Detalle. Cuando el comando de descarga de firmware se ingresa incorrectamente o apunta a un archivo err\u00f3neo, el registro de descarga de firmware captura el comando fallido, incluida cualquier contrase\u00f1a ingresada en la l\u00ednea de comando."
} }
], ],
"metrics": { "metrics": {

View File

@ -2,12 +2,16 @@
"id": "CVE-2024-30112", "id": "CVE-2024-30112",
"sourceIdentifier": "psirt@hcl.com", "sourceIdentifier": "psirt@hcl.com",
"published": "2024-06-25T22:15:30.117", "published": "2024-06-25T22:15:30.117",
"lastModified": "2024-06-25T22:15:30.117", "lastModified": "2024-06-26T12:44:29.693",
"vulnStatus": "Received", "vulnStatus": "Awaiting Analysis",
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",
"value": "HCL Connections is vulnerable to a cross-site scripting attack where an attacker may leverage this issue to execute arbitrary script code in the browser of an unsuspecting user which leads to executing malicious script code. This may let the attacker steal cookie-based authentication credentials and comprise user's account then launch other attacks." "value": "HCL Connections is vulnerable to a cross-site scripting attack where an attacker may leverage this issue to execute arbitrary script code in the browser of an unsuspecting user which leads to executing malicious script code. This may let the attacker steal cookie-based authentication credentials and comprise user's account then launch other attacks."
},
{
"lang": "es",
"value": "HCL Connections es vulnerable a un ataque de Cross-Site Scripting en el que un atacante puede aprovechar este problema para ejecutar c\u00f3digo de script arbitrario en el navegador de un usuario desprevenido, lo que lleva a la ejecuci\u00f3n de c\u00f3digo de scripts maliciosos. Esto puede permitir al atacante robar credenciales de autenticaci\u00f3n basadas en cookies, acceder a la cuenta del usuario y luego lanzar otros ataques."
} }
], ],
"metrics": { "metrics": {

View File

@ -2,12 +2,16 @@
"id": "CVE-2024-30931", "id": "CVE-2024-30931",
"sourceIdentifier": "cve@mitre.org", "sourceIdentifier": "cve@mitre.org",
"published": "2024-06-25T22:15:30.313", "published": "2024-06-25T22:15:30.313",
"lastModified": "2024-06-25T22:15:30.313", "lastModified": "2024-06-26T12:44:29.693",
"vulnStatus": "Received", "vulnStatus": "Awaiting Analysis",
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",
"value": "Stored Cross Site Scripting vulnerability in Emby Media Server Emby Media Server 4.8.3.0 allows a remote attacker to escalate privileges via the notifications.html component." "value": "Stored Cross Site Scripting vulnerability in Emby Media Server Emby Media Server 4.8.3.0 allows a remote attacker to escalate privileges via the notifications.html component."
},
{
"lang": "es",
"value": "Vulnerabilidad de Cross-Site Scripting almacenado en Emby Media Server Emby Media Server 4.8.3.0 permite a un atacante remoto escalar privilegios a trav\u00e9s del componente Notifications.html."
} }
], ],
"metrics": {}, "metrics": {},

View File

@ -2,12 +2,16 @@
"id": "CVE-2024-34400", "id": "CVE-2024-34400",
"sourceIdentifier": "cve@mitre.org", "sourceIdentifier": "cve@mitre.org",
"published": "2024-06-25T21:15:59.090", "published": "2024-06-25T21:15:59.090",
"lastModified": "2024-06-25T21:15:59.090", "lastModified": "2024-06-26T12:44:29.693",
"vulnStatus": "Received", "vulnStatus": "Awaiting Analysis",
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",
"value": "An issue was discovered in VirtoSoftware Virto Kanban Board Web Part before 5.3.5.1 for SharePoint 2019. There is /_layouts/15/Virto.KanbanTaskManager/api/KanbanData.ashx LinkTitle2 XSS." "value": "An issue was discovered in VirtoSoftware Virto Kanban Board Web Part before 5.3.5.1 for SharePoint 2019. There is /_layouts/15/Virto.KanbanTaskManager/api/KanbanData.ashx LinkTitle2 XSS."
},
{
"lang": "es",
"value": "Se descubri\u00f3 un problema en VirtoSoftware Virto Kanban Board Web Part anterior a 5.3.5.1 para SharePoint 2019. Hay /_layouts/15/Virto.KanbanTaskManager/api/KanbanData.ashx LinkTitle2 XSS."
} }
], ],
"metrics": {}, "metrics": {},

View File

@ -2,12 +2,16 @@
"id": "CVE-2024-34580", "id": "CVE-2024-34580",
"sourceIdentifier": "cve@mitre.org", "sourceIdentifier": "cve@mitre.org",
"published": "2024-06-26T05:15:51.093", "published": "2024-06-26T05:15:51.093",
"lastModified": "2024-06-26T05:15:51.093", "lastModified": "2024-06-26T12:44:29.693",
"vulnStatus": "Received", "vulnStatus": "Awaiting Analysis",
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",
"value": "Apache XML Security for C++ through 2.0.4 implements the XML Signature Syntax and Processing (XMLDsig) specification without protection against an SSRF payload in a KeyInfo element. NOTE: the supplier disputes this CVE Record on the grounds that they are implementing the specification \"correctly\" and are not \"at fault.\"" "value": "Apache XML Security for C++ through 2.0.4 implements the XML Signature Syntax and Processing (XMLDsig) specification without protection against an SSRF payload in a KeyInfo element. NOTE: the supplier disputes this CVE Record on the grounds that they are implementing the specification \"correctly\" and are not \"at fault.\""
},
{
"lang": "es",
"value": "Apache XML Security para C++ hasta 2.0.4 implementa la especificaci\u00f3n de procesamiento y sintaxis de firma XML (XMLDsig) sin protecci\u00f3n contra un payload SSRF en un elemento KeyInfo. NOTA: el proveedor cuestiona este Registro CVE con el argumento de que est\u00e1 implementando la especificaci\u00f3n \"correctamente\" y no tiene \"culpa\"."
} }
], ],
"metrics": {}, "metrics": {},

View File

@ -2,12 +2,16 @@
"id": "CVE-2024-34581", "id": "CVE-2024-34581",
"sourceIdentifier": "cve@mitre.org", "sourceIdentifier": "cve@mitre.org",
"published": "2024-06-26T05:15:51.227", "published": "2024-06-26T05:15:51.227",
"lastModified": "2024-06-26T06:15:13.983", "lastModified": "2024-06-26T12:44:29.693",
"vulnStatus": "Received", "vulnStatus": "Awaiting Analysis",
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",
"value": "The W3C XML Signature Syntax and Processing (XMLDsig) specification, starting with 1.0, was originally published with a \"RetrievalMethod is a URI ... that may be used to obtain key and/or certificate information\" statement and no accompanying information about SSRF risks, and this may have contributed to vulnerable implementations such as those discussed in CVE-2023-36661 and CVE-2024-21893. NOTE: this was mitigated in 1.1 and 2.0 via a directly referenced Best Practices document that calls on implementers to be wary of SSRF." "value": "The W3C XML Signature Syntax and Processing (XMLDsig) specification, starting with 1.0, was originally published with a \"RetrievalMethod is a URI ... that may be used to obtain key and/or certificate information\" statement and no accompanying information about SSRF risks, and this may have contributed to vulnerable implementations such as those discussed in CVE-2023-36661 and CVE-2024-21893. NOTE: this was mitigated in 1.1 and 2.0 via a directly referenced Best Practices document that calls on implementers to be wary of SSRF."
},
{
"lang": "es",
"value": "La especificaci\u00f3n W3C XML Signature Syntax and Processing (XMLDsig), a partir de 1.0, se public\u00f3 originalmente con una declaraci\u00f3n \"RetrievalMethod es un URI... que puede usarse para obtener informaci\u00f3n de clave y/o certificado\" y sin informaci\u00f3n adjunta sobre los riesgos de SSRF, y esto puede haber contribuido a implementaciones vulnerables como las analizadas en CVE-2023-36661 y CVE-2024-21893. NOTA: esto se mitig\u00f3 en 1.1 y 2.0 a trav\u00e9s de un documento de Mejores Pr\u00e1cticas al que se hace referencia directamente y que pide a los implementadores que tengan cuidado con la SSRF."
} }
], ],
"metrics": {}, "metrics": {},

View File

@ -2,12 +2,16 @@
"id": "CVE-2024-35526", "id": "CVE-2024-35526",
"sourceIdentifier": "cve@mitre.org", "sourceIdentifier": "cve@mitre.org",
"published": "2024-06-25T21:15:59.170", "published": "2024-06-25T21:15:59.170",
"lastModified": "2024-06-25T21:15:59.170", "lastModified": "2024-06-26T12:44:29.693",
"vulnStatus": "Received", "vulnStatus": "Awaiting Analysis",
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",
"value": "An issue in Daemon PTY Limited FarCry Core framework before 7.2.14 allows attackers to access sensitive information in the /facade directory." "value": "An issue in Daemon PTY Limited FarCry Core framework before 7.2.14 allows attackers to access sensitive information in the /facade directory."
},
{
"lang": "es",
"value": "Un problema en Daemon PTY Limited FarCry Core framework anterior a 7.2.14 permite a los atacantes acceder a informaci\u00f3n confidencial en el directorio /facade."
} }
], ],
"metrics": {}, "metrics": {},

View File

@ -2,12 +2,16 @@
"id": "CVE-2024-35527", "id": "CVE-2024-35527",
"sourceIdentifier": "cve@mitre.org", "sourceIdentifier": "cve@mitre.org",
"published": "2024-06-25T22:15:30.403", "published": "2024-06-25T22:15:30.403",
"lastModified": "2024-06-25T22:15:30.403", "lastModified": "2024-06-26T12:44:29.693",
"vulnStatus": "Received", "vulnStatus": "Awaiting Analysis",
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",
"value": "An arbitrary file upload vulnerability in /fileupload/upload.cfm in Daemon PTY Limited FarCry Core framework before 7.2.14 allows attackers to execute arbitrary code via uploading a crafted .cfm file." "value": "An arbitrary file upload vulnerability in /fileupload/upload.cfm in Daemon PTY Limited FarCry Core framework before 7.2.14 allows attackers to execute arbitrary code via uploading a crafted .cfm file."
},
{
"lang": "es",
"value": "Una vulnerabilidad de carga de archivos arbitrarios en /fileupload/upload.cfm en Daemon PTY Limited FarCry Core framework anterior a 7.2.14 permite a los atacantes ejecutar c\u00f3digo arbitrario cargando un archivo .cfm manipulado."
} }
], ],
"metrics": {}, "metrics": {},

View File

@ -2,12 +2,16 @@
"id": "CVE-2024-36819", "id": "CVE-2024-36819",
"sourceIdentifier": "cve@mitre.org", "sourceIdentifier": "cve@mitre.org",
"published": "2024-06-25T19:15:11.837", "published": "2024-06-25T19:15:11.837",
"lastModified": "2024-06-25T19:15:11.837", "lastModified": "2024-06-26T12:44:29.693",
"vulnStatus": "Received", "vulnStatus": "Awaiting Analysis",
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",
"value": "MAP-OS 4.45.0 and earlier is vulnerable to Cross-Site Scripting (XSS). This vulnerability allows malicious users to insert a malicious payload into the \"Client Name\" input. When a service order from this client is created, the malicious payload is displayed on the administrator and employee dashboards, resulting in unauthorized script execution whenever the dashboard is loaded." "value": "MAP-OS 4.45.0 and earlier is vulnerable to Cross-Site Scripting (XSS). This vulnerability allows malicious users to insert a malicious payload into the \"Client Name\" input. When a service order from this client is created, the malicious payload is displayed on the administrator and employee dashboards, resulting in unauthorized script execution whenever the dashboard is loaded."
},
{
"lang": "es",
"value": "MAP-OS 4.45.0 y versiones anteriores son vulnerables a Cross-Site Scripting (XSS). Esta vulnerabilidad permite a usuarios malintencionados insertar un payload malicioso en la entrada \"Nombre del cliente\". Cuando se crea una orden de servicio de este cliente, el payload malicioso se muestra en los paneles de administrador y de empleado, lo que resulta en la ejecuci\u00f3n de scripts no autorizados cada vez que se carga el panel."
} }
], ],
"metrics": {}, "metrics": {},

View File

@ -2,12 +2,16 @@
"id": "CVE-2024-3633", "id": "CVE-2024-3633",
"sourceIdentifier": "contact@wpscan.com", "sourceIdentifier": "contact@wpscan.com",
"published": "2024-06-26T06:15:15.400", "published": "2024-06-26T06:15:15.400",
"lastModified": "2024-06-26T06:15:15.400", "lastModified": "2024-06-26T12:44:29.693",
"vulnStatus": "Received", "vulnStatus": "Awaiting Analysis",
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",
"value": "The WebP & SVG Support WordPress plugin through 1.4.0 does not sanitise uploaded SVG files, which could allow users with a role as low as Author to upload a malicious SVG containing XSS payloads." "value": "The WebP & SVG Support WordPress plugin through 1.4.0 does not sanitise uploaded SVG files, which could allow users with a role as low as Author to upload a malicious SVG containing XSS payloads."
},
{
"lang": "es",
"value": "El complemento WebP &amp; SVG Support de WordPress hasta la versi\u00f3n 1.4.0 no sanitiza los archivos SVG cargados, lo que podr\u00eda permitir a los usuarios con un rol tan bajo como Autor cargar un SVG malicioso que contenga payloads XSS."
} }
], ],
"metrics": {}, "metrics": {},

View File

@ -2,12 +2,16 @@
"id": "CVE-2024-37098", "id": "CVE-2024-37098",
"sourceIdentifier": "audit@patchstack.com", "sourceIdentifier": "audit@patchstack.com",
"published": "2024-06-26T11:15:51.613", "published": "2024-06-26T11:15:51.613",
"lastModified": "2024-06-26T11:15:51.613", "lastModified": "2024-06-26T12:44:29.693",
"vulnStatus": "Received", "vulnStatus": "Awaiting Analysis",
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",
"value": "Server-Side Request Forgery (SSRF) vulnerability in Blossom Themes BlossomThemes Email Newsletter.This issue affects BlossomThemes Email Newsletter: from n/a through 2.2.6." "value": "Server-Side Request Forgery (SSRF) vulnerability in Blossom Themes BlossomThemes Email Newsletter.This issue affects BlossomThemes Email Newsletter: from n/a through 2.2.6."
},
{
"lang": "es",
"value": "Vulnerabilidad de Server Side Request Forgery (SSRF) en Blossom Themes BlossomThemes Email Newsletter. Este problema afecta a BlossomThemes Email Newsletter: desde n/a hasta 2.2.6."
} }
], ],
"metrics": { "metrics": {

View File

@ -2,12 +2,16 @@
"id": "CVE-2024-37138", "id": "CVE-2024-37138",
"sourceIdentifier": "security_alert@emc.com", "sourceIdentifier": "security_alert@emc.com",
"published": "2024-06-26T04:15:13.000", "published": "2024-06-26T04:15:13.000",
"lastModified": "2024-06-26T04:15:13.000", "lastModified": "2024-06-26T12:44:29.693",
"vulnStatus": "Received", "vulnStatus": "Awaiting Analysis",
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",
"value": "Dell PowerProtect DD, versions prior to 8.0, LTS 7.13.1.0, LTS 7.10.1.30, LTS 7.7.5.40 on DDMC contain a relative path traversal vulnerability. A remote high privileged attacker could potentially exploit this vulnerability, leading to the application sending over an unauthorized file to the managed system." "value": "Dell PowerProtect DD, versions prior to 8.0, LTS 7.13.1.0, LTS 7.10.1.30, LTS 7.7.5.40 on DDMC contain a relative path traversal vulnerability. A remote high privileged attacker could potentially exploit this vulnerability, leading to the application sending over an unauthorized file to the managed system."
},
{
"lang": "es",
"value": "Dell PowerProtect DD, versiones anteriores a 8.0, LTS 7.13.1.0, LTS 7.10.1.30, LTS 7.7.5.40 en DDMC contienen una vulnerabilidad de Path Traversal relativo. Un atacante remoto con altos privilegios podr\u00eda explotar esta vulnerabilidad, lo que provocar\u00eda que la aplicaci\u00f3n env\u00ede un archivo no autorizado al sistema administrado."
} }
], ],
"metrics": { "metrics": {

View File

@ -2,12 +2,16 @@
"id": "CVE-2024-37139", "id": "CVE-2024-37139",
"sourceIdentifier": "security_alert@emc.com", "sourceIdentifier": "security_alert@emc.com",
"published": "2024-06-26T04:15:13.350", "published": "2024-06-26T04:15:13.350",
"lastModified": "2024-06-26T04:15:13.350", "lastModified": "2024-06-26T12:44:29.693",
"vulnStatus": "Received", "vulnStatus": "Awaiting Analysis",
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",
"value": "Dell PowerProtect DD, versions prior to 8.0, LTS 7.13.1.0, LTS 7.10.1.30, LTS 7.7.5.40 contain an Improper Control of a Resource Through its Lifetime vulnerability in an admin operation. A remote low privileged attacker could potentially exploit this vulnerability, leading to temporary resource constraint of system application. Exploitation may lead to denial of service of the application." "value": "Dell PowerProtect DD, versions prior to 8.0, LTS 7.13.1.0, LTS 7.10.1.30, LTS 7.7.5.40 contain an Improper Control of a Resource Through its Lifetime vulnerability in an admin operation. A remote low privileged attacker could potentially exploit this vulnerability, leading to temporary resource constraint of system application. Exploitation may lead to denial of service of the application."
},
{
"lang": "es",
"value": "Dell PowerProtect DD, versiones anteriores a 8.0, LTS 7.13.1.0, LTS 7.10.1.30, LTS 7.7.5.40 contienen una vulnerabilidad de control inadecuado de un recurso durante su vida \u00fatil en una operaci\u00f3n de administraci\u00f3n. Un atacante remoto con pocos privilegios podr\u00eda explotar esta vulnerabilidad, lo que provocar\u00eda una limitaci\u00f3n temporal de recursos de la aplicaci\u00f3n del sistema. La explotaci\u00f3n puede dar lugar a la denegaci\u00f3n del servicio de la aplicaci\u00f3n."
} }
], ],
"metrics": { "metrics": {

View File

@ -2,12 +2,16 @@
"id": "CVE-2024-37140", "id": "CVE-2024-37140",
"sourceIdentifier": "security_alert@emc.com", "sourceIdentifier": "security_alert@emc.com",
"published": "2024-06-26T04:15:13.667", "published": "2024-06-26T04:15:13.667",
"lastModified": "2024-06-26T04:15:13.667", "lastModified": "2024-06-26T12:44:29.693",
"vulnStatus": "Received", "vulnStatus": "Awaiting Analysis",
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",
"value": "Dell PowerProtect DD, versions prior to 8.0, LTS 7.13.1.0, LTS 7.10.1.30, LTS 7.7.5.40 contain an OS command injection vulnerability in an admin operation. A remote low privileged attacker could potentially exploit this vulnerability, leading to the execution of arbitrary OS commands on the system application's underlying OS with the privileges of the vulnerable application. Exploitation may lead to a system take over by an attacker." "value": "Dell PowerProtect DD, versions prior to 8.0, LTS 7.13.1.0, LTS 7.10.1.30, LTS 7.7.5.40 contain an OS command injection vulnerability in an admin operation. A remote low privileged attacker could potentially exploit this vulnerability, leading to the execution of arbitrary OS commands on the system application's underlying OS with the privileges of the vulnerable application. Exploitation may lead to a system take over by an attacker."
},
{
"lang": "es",
"value": "Dell PowerProtect DD, versiones anteriores a 8.0, LTS 7.13.1.0, LTS 7.10.1.30, LTS 7.7.5.40 contienen una vulnerabilidad de inyecci\u00f3n de comandos del sistema operativo en una operaci\u00f3n de administraci\u00f3n. Un atacante remoto con pocos privilegios podr\u00eda explotar esta vulnerabilidad, lo que llevar\u00eda a la ejecuci\u00f3n de comandos arbitrarios del sistema operativo en el sistema operativo subyacente de la aplicaci\u00f3n del sistema con los privilegios de la aplicaci\u00f3n vulnerable. La explotaci\u00f3n puede llevar a que un atacante se apodere del sistema."
} }
], ],
"metrics": { "metrics": {

View File

@ -2,12 +2,16 @@
"id": "CVE-2024-37141", "id": "CVE-2024-37141",
"sourceIdentifier": "security_alert@emc.com", "sourceIdentifier": "security_alert@emc.com",
"published": "2024-06-26T04:15:13.940", "published": "2024-06-26T04:15:13.940",
"lastModified": "2024-06-26T04:15:13.940", "lastModified": "2024-06-26T12:44:29.693",
"vulnStatus": "Received", "vulnStatus": "Awaiting Analysis",
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",
"value": "Dell PowerProtect DD, versions prior to 8.0, LTS 7.13.1.0, LTS 7.10.1.30, LTS 7.7.5.40 contain an open redirect vulnerability. A remote low privileged attacker could potentially exploit this vulnerability, leading to information disclosure." "value": "Dell PowerProtect DD, versions prior to 8.0, LTS 7.13.1.0, LTS 7.10.1.30, LTS 7.7.5.40 contain an open redirect vulnerability. A remote low privileged attacker could potentially exploit this vulnerability, leading to information disclosure."
},
{
"lang": "es",
"value": "Dell PowerProtect DD, versiones anteriores a 8.0, LTS 7.13.1.0, LTS 7.10.1.30, LTS 7.7.5.40 contienen una vulnerabilidad de redireccionamiento abierto. Un atacante remoto con pocos privilegios podr\u00eda explotar esta vulnerabilidad, lo que llevar\u00eda a la divulgaci\u00f3n de informaci\u00f3n."
} }
], ],
"metrics": { "metrics": {

View File

@ -2,12 +2,16 @@
"id": "CVE-2024-37167", "id": "CVE-2024-37167",
"sourceIdentifier": "security-advisories@github.com", "sourceIdentifier": "security-advisories@github.com",
"published": "2024-06-25T20:15:11.513", "published": "2024-06-25T20:15:11.513",
"lastModified": "2024-06-25T20:15:11.513", "lastModified": "2024-06-26T12:44:29.693",
"vulnStatus": "Received", "vulnStatus": "Awaiting Analysis",
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",
"value": "Tuleap is an Open Source Suite to improve management of software developments and collaboration. Users are able to see backlog items that they should not see. This issue has been patched in Tuleap Community Edition version 15.9.99.97." "value": "Tuleap is an Open Source Suite to improve management of software developments and collaboration. Users are able to see backlog items that they should not see. This issue has been patched in Tuleap Community Edition version 15.9.99.97."
},
{
"lang": "es",
"value": "Tuleap es una suite de c\u00f3digo abierto para mejorar la gesti\u00f3n de los desarrollos de software y la colaboraci\u00f3n. Los usuarios pueden ver los elementos pendientes que no deber\u00edan ver. Este problema se solucion\u00f3 en la versi\u00f3n 15.9.99.97 de Tuleap Community Edition."
} }
], ],
"metrics": { "metrics": {

View File

@ -2,12 +2,16 @@
"id": "CVE-2024-37252", "id": "CVE-2024-37252",
"sourceIdentifier": "audit@patchstack.com", "sourceIdentifier": "audit@patchstack.com",
"published": "2024-06-26T11:15:51.860", "published": "2024-06-26T11:15:51.860",
"lastModified": "2024-06-26T11:15:51.860", "lastModified": "2024-06-26T12:44:29.693",
"vulnStatus": "Received", "vulnStatus": "Awaiting Analysis",
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",
"value": "Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Icegram Email Subscribers & Newsletters allows SQL Injection.This issue affects Email Subscribers & Newsletters: from n/a through 5.7.25." "value": "Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Icegram Email Subscribers & Newsletters allows SQL Injection.This issue affects Email Subscribers & Newsletters: from n/a through 5.7.25."
},
{
"lang": "es",
"value": "La neutralizaci\u00f3n inadecuada de elementos especiales utilizados en una vulnerabilidad de comando SQL ('inyecci\u00f3n SQL') en Icegram Email Subscribers &amp; Newsletters permite la inyecci\u00f3n de SQL. Este problema afecta a Email Subscribers &amp; Newsletters: desde n/a hasta 5.7.25."
} }
], ],
"metrics": { "metrics": {

View File

@ -2,12 +2,16 @@
"id": "CVE-2024-37742", "id": "CVE-2024-37742",
"sourceIdentifier": "cve@mitre.org", "sourceIdentifier": "cve@mitre.org",
"published": "2024-06-25T22:15:35.183", "published": "2024-06-25T22:15:35.183",
"lastModified": "2024-06-25T22:15:35.183", "lastModified": "2024-06-26T12:44:29.693",
"vulnStatus": "Received", "vulnStatus": "Awaiting Analysis",
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",
"value": "An issue in Safe Exam Browser for Windows before 3.6 allows an attacker to share clipboard data between the SEB kiosk mode and the underlying system, compromising exam integrity which may lead to arbitrary code execution and obtaining sensitive information via the Clipboard Management component." "value": "An issue in Safe Exam Browser for Windows before 3.6 allows an attacker to share clipboard data between the SEB kiosk mode and the underlying system, compromising exam integrity which may lead to arbitrary code execution and obtaining sensitive information via the Clipboard Management component."
},
{
"lang": "es",
"value": "Un problema en Safe Exam Browser para Windows anterior a 3.6 permite a un atacante compartir datos del portapapeles entre el modo quiosco SEB y el sistema subyacente, comprometiendo la integridad del examen, lo que puede llevar a la ejecuci\u00f3n de c\u00f3digo arbitrario y a la obtenci\u00f3n de informaci\u00f3n confidencial a trav\u00e9s del componente de administraci\u00f3n del portapapeles."
} }
], ],
"metrics": {}, "metrics": {},

View File

@ -2,12 +2,16 @@
"id": "CVE-2024-37820", "id": "CVE-2024-37820",
"sourceIdentifier": "cve@mitre.org", "sourceIdentifier": "cve@mitre.org",
"published": "2024-06-25T19:15:11.943", "published": "2024-06-25T19:15:11.943",
"lastModified": "2024-06-25T19:15:11.943", "lastModified": "2024-06-26T12:44:29.693",
"vulnStatus": "Received", "vulnStatus": "Awaiting Analysis",
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",
"value": "A nil pointer dereference in PingCAP TiDB v8.2.0-alpha-216-gfe5858b allows attackers to crash the application via expression.inferCollation." "value": "A nil pointer dereference in PingCAP TiDB v8.2.0-alpha-216-gfe5858b allows attackers to crash the application via expression.inferCollation."
},
{
"lang": "es",
"value": "Una desreferencia de puntero nulo en PingCAP TiDB v8.2.0-alpha-216-gfe5858b permite a los atacantes bloquear la aplicaci\u00f3n mediante expression.inferCollation."
} }
], ],
"metrics": {}, "metrics": {},

View File

@ -2,12 +2,16 @@
"id": "CVE-2024-37843", "id": "CVE-2024-37843",
"sourceIdentifier": "cve@mitre.org", "sourceIdentifier": "cve@mitre.org",
"published": "2024-06-25T21:15:59.770", "published": "2024-06-25T21:15:59.770",
"lastModified": "2024-06-25T21:15:59.770", "lastModified": "2024-06-26T12:44:29.693",
"vulnStatus": "Received", "vulnStatus": "Awaiting Analysis",
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",
"value": "Craft CMS up to v3.7.31 was discovered to contain a SQL injection vulnerability via the GraphQL API endpoint." "value": "Craft CMS up to v3.7.31 was discovered to contain a SQL injection vulnerability via the GraphQL API endpoint."
},
{
"lang": "es",
"value": "Se descubri\u00f3 que Craft CMS hasta v3.7.31 conten\u00eda una vulnerabilidad de inyecci\u00f3n SQL a trav\u00e9s del endpoint de la API GraphQL."
} }
], ],
"metrics": {}, "metrics": {},

View File

@ -2,12 +2,16 @@
"id": "CVE-2024-37855", "id": "CVE-2024-37855",
"sourceIdentifier": "cve@mitre.org", "sourceIdentifier": "cve@mitre.org",
"published": "2024-06-25T21:15:59.867", "published": "2024-06-25T21:15:59.867",
"lastModified": "2024-06-25T21:15:59.867", "lastModified": "2024-06-26T12:44:29.693",
"vulnStatus": "Received", "vulnStatus": "Awaiting Analysis",
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",
"value": "An issue in Nepstech Wifi Router xpon (terminal) NTPL-Xpon1GFEVN, hardware verstion 1.0 firmware 2.0.1 allows a remote attacker to execute arbitrary code via the router's Telnet port 2345 without requiring authentication credentials." "value": "An issue in Nepstech Wifi Router xpon (terminal) NTPL-Xpon1GFEVN, hardware verstion 1.0 firmware 2.0.1 allows a remote attacker to execute arbitrary code via the router's Telnet port 2345 without requiring authentication credentials."
},
{
"lang": "es",
"value": "Un problema en Nepstech Wifi Router xpon (terminal) NTPL-Xpon1GFEVN, la versi\u00f3n de hardware 1.0, firmware 2.0.1, permite a un atacante remoto ejecutar c\u00f3digo arbitrario a trav\u00e9s del puerto Telnet 2345 del enrutador sin requerir credenciales de autenticaci\u00f3n."
} }
], ],
"metrics": {}, "metrics": {},

View File

@ -2,12 +2,16 @@
"id": "CVE-2024-37894", "id": "CVE-2024-37894",
"sourceIdentifier": "security-advisories@github.com", "sourceIdentifier": "security-advisories@github.com",
"published": "2024-06-25T20:15:11.873", "published": "2024-06-25T20:15:11.873",
"lastModified": "2024-06-25T20:15:11.873", "lastModified": "2024-06-26T12:44:29.693",
"vulnStatus": "Received", "vulnStatus": "Awaiting Analysis",
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",
"value": "Squid is a caching proxy for the Web supporting HTTP, HTTPS, FTP, and more. Due to an Out-of-bounds Write error when assigning ESI variables, Squid is susceptible to a Memory Corruption error. This error can lead to a Denial of Service attack." "value": "Squid is a caching proxy for the Web supporting HTTP, HTTPS, FTP, and more. Due to an Out-of-bounds Write error when assigning ESI variables, Squid is susceptible to a Memory Corruption error. This error can lead to a Denial of Service attack."
},
{
"lang": "es",
"value": "Squid es un proxy de almacenamiento en cach\u00e9 para la Web que admite HTTP, HTTPS, FTP y m\u00e1s. Debido a un error de escritura fuera de los l\u00edmites al asignar variables ESI, Squid es susceptible a un error de corrupci\u00f3n de memoria. Este error puede provocar un ataque de denegaci\u00f3n de servicio."
} }
], ],
"metrics": { "metrics": {

View File

@ -2,12 +2,16 @@
"id": "CVE-2024-38364", "id": "CVE-2024-38364",
"sourceIdentifier": "security-advisories@github.com", "sourceIdentifier": "security-advisories@github.com",
"published": "2024-06-26T00:15:10.480", "published": "2024-06-26T00:15:10.480",
"lastModified": "2024-06-26T00:15:10.480", "lastModified": "2024-06-26T12:44:29.693",
"vulnStatus": "Received", "vulnStatus": "Awaiting Analysis",
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",
"value": "DSpace is an open source software is a turnkey repository application used by more than 2,000 organizations and institutions worldwide to provide durable access to digital resources. In DSpace 7.0 through 7.6.1, when an HTML, XML or JavaScript Bitstream is downloaded, the user's browser may execute any embedded JavaScript. If that embedded JavaScript is malicious, there is a risk of an XSS attack. This vulnerability has been patched in version 7.6.2." "value": "DSpace is an open source software is a turnkey repository application used by more than 2,000 organizations and institutions worldwide to provide durable access to digital resources. In DSpace 7.0 through 7.6.1, when an HTML, XML or JavaScript Bitstream is downloaded, the user's browser may execute any embedded JavaScript. If that embedded JavaScript is malicious, there is a risk of an XSS attack. This vulnerability has been patched in version 7.6.2."
},
{
"lang": "es",
"value": "DSpace es un software de c\u00f3digo abierto, una aplicaci\u00f3n de repositorio llave en mano utilizada por m\u00e1s de 2000 organizaciones e instituciones en todo el mundo para brindar acceso duradero a recursos digitales. En DSpace 7.0 a 7.6.1, cuando se descarga un Bitstream HTML, XML o JavaScript, el navegador del usuario puede ejecutar cualquier JavaScript incrustado. Si ese JavaScript incrustado es malicioso, existe el riesgo de sufrir un ataque XSS. Esta vulnerabilidad ha sido parcheada en la versi\u00f3n 7.6.2."
} }
], ],
"metrics": { "metrics": {

View File

@ -2,12 +2,16 @@
"id": "CVE-2024-38516", "id": "CVE-2024-38516",
"sourceIdentifier": "security-advisories@github.com", "sourceIdentifier": "security-advisories@github.com",
"published": "2024-06-25T21:15:59.957", "published": "2024-06-25T21:15:59.957",
"lastModified": "2024-06-25T21:15:59.957", "lastModified": "2024-06-26T12:44:29.693",
"vulnStatus": "Received", "vulnStatus": "Awaiting Analysis",
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",
"value": "ai-client-html is an Aimeos e-commerce HTML client component. Debug information revealed sensitive information from environment variables in error log. This issue has been patched in versions 2024.04.7, 2023.10.15, 2022.10.13 and 2021.10.22." "value": "ai-client-html is an Aimeos e-commerce HTML client component. Debug information revealed sensitive information from environment variables in error log. This issue has been patched in versions 2024.04.7, 2023.10.15, 2022.10.13 and 2021.10.22."
},
{
"lang": "es",
"value": "ai-client-html es un componente del cliente HTML de comercio electr\u00f3nico de Aimeos. La informaci\u00f3n de depuraci\u00f3n revel\u00f3 informaci\u00f3n confidencial de las variables de entorno en el registro de errores. Este problema se solucion\u00f3 en las versiones 2024.04.7, 2023.10.15, 2022.10.13 y 2021.10.22."
} }
], ],
"metrics": { "metrics": {

View File

@ -2,12 +2,16 @@
"id": "CVE-2024-38526", "id": "CVE-2024-38526",
"sourceIdentifier": "security-advisories@github.com", "sourceIdentifier": "security-advisories@github.com",
"published": "2024-06-26T00:15:10.703", "published": "2024-06-26T00:15:10.703",
"lastModified": "2024-06-26T00:15:10.703", "lastModified": "2024-06-26T12:44:29.693",
"vulnStatus": "Received", "vulnStatus": "Awaiting Analysis",
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",
"value": "pdoc provides API Documentation for Python Projects. Documentation generated with `pdoc --math` linked to JavaScript files from polyfill.io. The polyfill.io CDN has been sold and now serves malicious code. This issue has been fixed in pdoc 14.5.1." "value": "pdoc provides API Documentation for Python Projects. Documentation generated with `pdoc --math` linked to JavaScript files from polyfill.io. The polyfill.io CDN has been sold and now serves malicious code. This issue has been fixed in pdoc 14.5.1."
},
{
"lang": "es",
"value": "pdoc proporciona documentaci\u00f3n API para proyectos Python. Documentaci\u00f3n generada con `pdoc --math` vinculada a archivos JavaScript de polyfill.io. El CDN polyfill.io se vendi\u00f3 y ahora contiene c\u00f3digo malicioso. Este problema se solucion\u00f3 en pdoc 14.5.1."
} }
], ],
"metrics": { "metrics": {

View File

@ -2,27 +2,115 @@
"id": "CVE-2024-38664", "id": "CVE-2024-38664",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2024-06-24T14:15:12.707", "published": "2024-06-24T14:15:12.707",
"lastModified": "2024-06-24T19:26:35.967", "lastModified": "2024-06-26T13:52:23.033",
"vulnStatus": "Awaiting Analysis", "vulnStatus": "Analyzed",
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm: zynqmp_dpsub: Always register bridge\n\nWe must always register the DRM bridge, since zynqmp_dp_hpd_work_func\ncalls drm_bridge_hpd_notify, which in turn expects hpd_mutex to be\ninitialized. We do this before zynqmp_dpsub_drm_init since that calls\ndrm_bridge_attach. This fixes the following lockdep warning:\n\n[ 19.217084] ------------[ cut here ]------------\n[ 19.227530] DEBUG_LOCKS_WARN_ON(lock->magic != lock)\n[ 19.227768] WARNING: CPU: 0 PID: 140 at kernel/locking/mutex.c:582 __mutex_lock+0x4bc/0x550\n[ 19.241696] Modules linked in:\n[ 19.244937] CPU: 0 PID: 140 Comm: kworker/0:4 Not tainted 6.6.20+ #96\n[ 19.252046] Hardware name: xlnx,zynqmp (DT)\n[ 19.256421] Workqueue: events zynqmp_dp_hpd_work_func\n[ 19.261795] pstate: 60000005 (nZCv daif -PAN -UAO -TCO -DIT -SSBS BTYPE=--)\n[ 19.269104] pc : __mutex_lock+0x4bc/0x550\n[ 19.273364] lr : __mutex_lock+0x4bc/0x550\n[ 19.277592] sp : ffffffc085c5bbe0\n[ 19.281066] x29: ffffffc085c5bbe0 x28: 0000000000000000 x27: ffffff88009417f8\n[ 19.288624] x26: ffffff8800941788 x25: ffffff8800020008 x24: ffffffc082aa3000\n[ 19.296227] x23: ffffffc080d90e3c x22: 0000000000000002 x21: 0000000000000000\n[ 19.303744] x20: 0000000000000000 x19: ffffff88002f5210 x18: 0000000000000000\n[ 19.311295] x17: 6c707369642e3030 x16: 3030613464662072 x15: 0720072007200720\n[ 19.318922] x14: 0000000000000000 x13: 284e4f5f4e524157 x12: 0000000000000001\n[ 19.326442] x11: 0001ffc085c5b940 x10: 0001ff88003f388b x9 : 0001ff88003f3888\n[ 19.334003] x8 : 0001ff88003f3888 x7 : 0000000000000000 x6 : 0000000000000000\n[ 19.341537] x5 : 0000000000000000 x4 : 0000000000001668 x3 : 0000000000000000\n[ 19.349054] x2 : 0000000000000000 x1 : 0000000000000000 x0 : ffffff88003f3880\n[ 19.356581] Call trace:\n[ 19.359160] __mutex_lock+0x4bc/0x550\n[ 19.363032] mutex_lock_nested+0x24/0x30\n[ 19.367187] drm_bridge_hpd_notify+0x2c/0x6c\n[ 19.371698] zynqmp_dp_hpd_work_func+0x44/0x54\n[ 19.376364] process_one_work+0x3ac/0x988\n[ 19.380660] worker_thread+0x398/0x694\n[ 19.384736] kthread+0x1bc/0x1c0\n[ 19.388241] ret_from_fork+0x10/0x20\n[ 19.392031] irq event stamp: 183\n[ 19.395450] hardirqs last enabled at (183): [<ffffffc0800b9278>] finish_task_switch.isra.0+0xa8/0x2d4\n[ 19.405140] hardirqs last disabled at (182): [<ffffffc081ad3754>] __schedule+0x714/0xd04\n[ 19.413612] softirqs last enabled at (114): [<ffffffc080133de8>] srcu_invoke_callbacks+0x158/0x23c\n[ 19.423128] softirqs last disabled at (110): [<ffffffc080133de8>] srcu_invoke_callbacks+0x158/0x23c\n[ 19.432614] ---[ end trace 0000000000000000 ]---\n\n(cherry picked from commit 61ba791c4a7a09a370c45b70a81b8c7d4cf6b2ae)" "value": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm: zynqmp_dpsub: Always register bridge\n\nWe must always register the DRM bridge, since zynqmp_dp_hpd_work_func\ncalls drm_bridge_hpd_notify, which in turn expects hpd_mutex to be\ninitialized. We do this before zynqmp_dpsub_drm_init since that calls\ndrm_bridge_attach. This fixes the following lockdep warning:\n\n[ 19.217084] ------------[ cut here ]------------\n[ 19.227530] DEBUG_LOCKS_WARN_ON(lock->magic != lock)\n[ 19.227768] WARNING: CPU: 0 PID: 140 at kernel/locking/mutex.c:582 __mutex_lock+0x4bc/0x550\n[ 19.241696] Modules linked in:\n[ 19.244937] CPU: 0 PID: 140 Comm: kworker/0:4 Not tainted 6.6.20+ #96\n[ 19.252046] Hardware name: xlnx,zynqmp (DT)\n[ 19.256421] Workqueue: events zynqmp_dp_hpd_work_func\n[ 19.261795] pstate: 60000005 (nZCv daif -PAN -UAO -TCO -DIT -SSBS BTYPE=--)\n[ 19.269104] pc : __mutex_lock+0x4bc/0x550\n[ 19.273364] lr : __mutex_lock+0x4bc/0x550\n[ 19.277592] sp : ffffffc085c5bbe0\n[ 19.281066] x29: ffffffc085c5bbe0 x28: 0000000000000000 x27: ffffff88009417f8\n[ 19.288624] x26: ffffff8800941788 x25: ffffff8800020008 x24: ffffffc082aa3000\n[ 19.296227] x23: ffffffc080d90e3c x22: 0000000000000002 x21: 0000000000000000\n[ 19.303744] x20: 0000000000000000 x19: ffffff88002f5210 x18: 0000000000000000\n[ 19.311295] x17: 6c707369642e3030 x16: 3030613464662072 x15: 0720072007200720\n[ 19.318922] x14: 0000000000000000 x13: 284e4f5f4e524157 x12: 0000000000000001\n[ 19.326442] x11: 0001ffc085c5b940 x10: 0001ff88003f388b x9 : 0001ff88003f3888\n[ 19.334003] x8 : 0001ff88003f3888 x7 : 0000000000000000 x6 : 0000000000000000\n[ 19.341537] x5 : 0000000000000000 x4 : 0000000000001668 x3 : 0000000000000000\n[ 19.349054] x2 : 0000000000000000 x1 : 0000000000000000 x0 : ffffff88003f3880\n[ 19.356581] Call trace:\n[ 19.359160] __mutex_lock+0x4bc/0x550\n[ 19.363032] mutex_lock_nested+0x24/0x30\n[ 19.367187] drm_bridge_hpd_notify+0x2c/0x6c\n[ 19.371698] zynqmp_dp_hpd_work_func+0x44/0x54\n[ 19.376364] process_one_work+0x3ac/0x988\n[ 19.380660] worker_thread+0x398/0x694\n[ 19.384736] kthread+0x1bc/0x1c0\n[ 19.388241] ret_from_fork+0x10/0x20\n[ 19.392031] irq event stamp: 183\n[ 19.395450] hardirqs last enabled at (183): [<ffffffc0800b9278>] finish_task_switch.isra.0+0xa8/0x2d4\n[ 19.405140] hardirqs last disabled at (182): [<ffffffc081ad3754>] __schedule+0x714/0xd04\n[ 19.413612] softirqs last enabled at (114): [<ffffffc080133de8>] srcu_invoke_callbacks+0x158/0x23c\n[ 19.423128] softirqs last disabled at (110): [<ffffffc080133de8>] srcu_invoke_callbacks+0x158/0x23c\n[ 19.432614] ---[ end trace 0000000000000000 ]---\n\n(cherry picked from commit 61ba791c4a7a09a370c45b70a81b8c7d4cf6b2ae)"
},
{
"lang": "es",
"value": "En el kernel de Linux se ha resuelto la siguiente vulnerabilidad: drm: zynqmp_dpsub: Registrar siempre puente Siempre debemos registrar el puente DRM, ya que zynqmp_dp_hpd_work_func llama a drm_bridge_hpd_notify, que a su vez espera que hpd_mutex se inicialice. Hacemos esto antes de zynqmp_dpsub_drm_init ya que llama a drm_bridge_attach. Esto corrige la siguiente advertencia de bloqueo: [19.217084] ------------[ cortar aqu\u00ed ]------------ [ 19.227530] DEBUG_LOCKS_WARN_ON(lock-&gt;magic != lock ) [ 19.227768] ADVERTENCIA: CPU: 0 PID: 140 en kernel/locking/mutex.c:582 __mutex_lock+0x4bc/0x550 [ 19.241696] M\u00f3dulos vinculados en: [ 19.244937] CPU: 0 PID: 140 Comm: kworker/0:4 No contaminado 6.6.20+ #96 [19.252046] Nombre de hardware: xlnx,zynqmp (DT) [19.256421] Cola de trabajo: eventos zynqmp_dp_hpd_work_func [19.261795] pstate: 60000005 (nZCv daif -PAN -UAO -TCO -DIT -SSBS PE=-- ) [ 19.269104] pc : __mutex_lock+0x4bc/0x550 [ 19.273364] lr : __mutex_lock+0x4bc/0x550 [ 19.277592] sp : ffffffc085c5bbe0 [ 19.281066] x29: ffffffc085c5bbe0 8: 0000000000000000 x27: ffffff88009417f8 [ 19.288624] x26: ffffff8800941788 x25: ffffff8800020008 x24: ffffffc082aa3000 [ 19.296227] x23: ffffffc080d90e3c x22: 0000000000000002 x21: 00000000000000000 [ 19.303744] x20: 0000000000000000 x19: ffffff88002f5210 x18: 0000000000000000 [ 19.311295] x17: 6c707369642e3030 x16: 3030613464662072 x15: 0720072007200720 [ 19.318922] 4: 0000000000000000 x13: 284e4f5f4e524157 x12: 0000000000000001 [ 19.326442] x11: 0001ffc085c5b940 x10: 0001ff88003f388b x9: 0001ff88003f3888 [19.334003] x8: 0001ff88003f3888 x7: 0000000000000000 x6 : 0000000000000000 [ 19.341537] x5 : 0000000000000000 x4 : 0000000000001668 x3 : 0000000000000000 [ 19.349054] x2 : 0000000000000000 x1 : 0000000000000000 x0 : ffffff88003f3880 [ 19.356581] Seguimiento de llamadas: [ 19.359160] __mutex_lock+0x4bc/0x550 [ 19.363032] mutex_lock_nested+0x24/0x30 [ 19.367187] drm_bridge_hpd_notify+0x2c/0x6c [ zynqmp_dp_hpd_work_func +0x44/0x54 [ 19.376364] proceso_un_trabajo+0x3ac/0x988 [ 19.380660] hilo_trabajador+0x398/ 0x694 [19.384736] kthread+0x1bc/0x1c0 [19.388241] ret_from_fork+0x10/0x20 [19.392031] sello de evento irq: 183 [19.395450] hardirqs habilitado por \u00faltima vez en (183): [] terminar_task_switch.isra.0+0xa8/0x2d4 [ 19.405140] hardirqs deshabilitado por \u00faltima vez en (182): [] __schedule+0x714/0xd04 [ 19.413612] softirqs habilitado por \u00faltima vez en (114): [] srcu_invoke_callbacks+0x158/0x23c 19.423128] softirqs se deshabilit\u00f3 por \u00faltima vez en ( 110): [] srcu_invoke_callbacks+0x158/0x23c [ 19.432614] ---[ end trace 0000000000000000 ]--- (seleccionado de el commit 61ba791c4a7a09a370c45b70a81b8c7d4 cf6b2ae)"
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-667"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionEndExcluding": "6.2",
"matchCriteriaId": "108695B6-7133-4B6C-80AF-0F66880FE858"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "6.6",
"versionEndExcluding": "6.6.33",
"matchCriteriaId": "53BC60D9-65A5-4D8F-96C8-149F09214DBD"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "6.9",
"versionEndExcluding": "6.9.4",
"matchCriteriaId": "A500F935-F0ED-4DC7-AD02-9D7C365D13AE"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:6.10.0:rc1:*:*:*:*:*:*",
"matchCriteriaId": "C40DD2D9-90E3-4E95-9F1A-E7C680F11F2A"
}
]
}
]
} }
], ],
"metrics": {},
"references": [ "references": [
{ {
"url": "https://git.kernel.org/stable/c/603661357056b5e5ba6d86f505fbc936eff396ba", "url": "https://git.kernel.org/stable/c/603661357056b5e5ba6d86f505fbc936eff396ba",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Mailing List",
"Patch"
]
}, },
{ {
"url": "https://git.kernel.org/stable/c/6ead3eccf67bc8318b1ce95ed879b2cc05b4fce9", "url": "https://git.kernel.org/stable/c/6ead3eccf67bc8318b1ce95ed879b2cc05b4fce9",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Mailing List",
"Patch"
]
}, },
{ {
"url": "https://git.kernel.org/stable/c/be3f3042391d061cfca2bd22630e0d101acea5fc", "url": "https://git.kernel.org/stable/c/be3f3042391d061cfca2bd22630e0d101acea5fc",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Mailing List",
"Patch"
]
} }
] ]
} }

View File

@ -2,31 +2,130 @@
"id": "CVE-2024-38667", "id": "CVE-2024-38667",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2024-06-24T14:15:12.790", "published": "2024-06-24T14:15:12.790",
"lastModified": "2024-06-24T19:26:35.967", "lastModified": "2024-06-26T13:53:56.883",
"vulnStatus": "Awaiting Analysis", "vulnStatus": "Analyzed",
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\nriscv: prevent pt_regs corruption for secondary idle threads\n\nTop of the kernel thread stack should be reserved for pt_regs. However\nthis is not the case for the idle threads of the secondary boot harts.\nTheir stacks overlap with their pt_regs, so both may get corrupted.\n\nSimilar issue has been fixed for the primary hart, see c7cdd96eca28\n(\"riscv: prevent stack corruption by reserving task_pt_regs(p) early\").\nHowever that fix was not propagated to the secondary harts. The problem\nhas been noticed in some CPU hotplug tests with V enabled. The function\nsmp_callin stored several registers on stack, corrupting top of pt_regs\nstructure including status field. As a result, kernel attempted to save\nor restore inexistent V context." "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nriscv: prevent pt_regs corruption for secondary idle threads\n\nTop of the kernel thread stack should be reserved for pt_regs. However\nthis is not the case for the idle threads of the secondary boot harts.\nTheir stacks overlap with their pt_regs, so both may get corrupted.\n\nSimilar issue has been fixed for the primary hart, see c7cdd96eca28\n(\"riscv: prevent stack corruption by reserving task_pt_regs(p) early\").\nHowever that fix was not propagated to the secondary harts. The problem\nhas been noticed in some CPU hotplug tests with V enabled. The function\nsmp_callin stored several registers on stack, corrupting top of pt_regs\nstructure including status field. As a result, kernel attempted to save\nor restore inexistent V context."
},
{
"lang": "es",
"value": "En el kernel de Linux, se resolvi\u00f3 la siguiente vulnerabilidad: riscv: evita la corrupci\u00f3n de pt_regs para subprocesos inactivos secundarios La parte superior de la pila de subprocesos del kernel debe reservarse para pt_regs. Sin embargo, este no es el caso de los subprocesos inactivos de los corazones de arranque secundarios. Sus pilas se superponen con sus pt_regs, por lo que ambos pueden corromperse. Se ha solucionado un problema similar para el coraz\u00f3n principal; consulte c7cdd96eca28 (\"riscv: evite la corrupci\u00f3n de la pila reservando task_pt_regs(p) anticipadamente\"). Sin embargo, esa soluci\u00f3n no se propag\u00f3 a los corazones secundarios. El problema se ha observado en algunas pruebas de conexi\u00f3n en caliente de CPU con V habilitado. La funci\u00f3n smp_callin almacen\u00f3 varios registros en la pila, corrompiendo la parte superior de la estructura pt_regs, incluido el campo de estado. Como resultado, el kernel intent\u00f3 guardar o restaurar el contexto V inexistente."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-787"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionEndExcluding": "5.7",
"matchCriteriaId": "C3821E00-CCBB-4CD4-AD2C-D47DFF2F5A34"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "6.1",
"versionEndExcluding": "6.1.93",
"matchCriteriaId": "7446FC33-DC4F-4D31-94B5-FB577CFA66F4"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "6.6",
"versionEndExcluding": "6.6.33",
"matchCriteriaId": "53BC60D9-65A5-4D8F-96C8-149F09214DBD"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "6.9",
"versionEndExcluding": "6.9.4",
"matchCriteriaId": "A500F935-F0ED-4DC7-AD02-9D7C365D13AE"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:6.10.0:rc1:*:*:*:*:*:*",
"matchCriteriaId": "C40DD2D9-90E3-4E95-9F1A-E7C680F11F2A"
}
]
}
]
} }
], ],
"metrics": {},
"references": [ "references": [
{ {
"url": "https://git.kernel.org/stable/c/0c1f28c32a194303da630fca89481334b9547b80", "url": "https://git.kernel.org/stable/c/0c1f28c32a194303da630fca89481334b9547b80",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Mailing List",
"Patch"
]
}, },
{ {
"url": "https://git.kernel.org/stable/c/3090c06d50eaa91317f84bf3eac4c265e6cb8d44", "url": "https://git.kernel.org/stable/c/3090c06d50eaa91317f84bf3eac4c265e6cb8d44",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Mailing List",
"Patch"
]
}, },
{ {
"url": "https://git.kernel.org/stable/c/a638b0461b58aa3205cd9d5f14d6f703d795b4af", "url": "https://git.kernel.org/stable/c/a638b0461b58aa3205cd9d5f14d6f703d795b4af",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Mailing List",
"Patch"
]
}, },
{ {
"url": "https://git.kernel.org/stable/c/ea22d4195cca13d5fdbc4d6555a2dfb8a7867a9e", "url": "https://git.kernel.org/stable/c/ea22d4195cca13d5fdbc4d6555a2dfb8a7867a9e",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Mailing List",
"Patch"
]
} }
] ]
} }

View File

@ -2,12 +2,16 @@
"id": "CVE-2024-4105", "id": "CVE-2024-4105",
"sourceIdentifier": "7168b535-132a-4efe-a076-338f829b2eb9", "sourceIdentifier": "7168b535-132a-4efe-a076-338f829b2eb9",
"published": "2024-06-26T06:15:15.500", "published": "2024-06-26T06:15:15.500",
"lastModified": "2024-06-26T06:15:15.500", "lastModified": "2024-06-26T12:44:29.693",
"vulnStatus": "Received", "vulnStatus": "Awaiting Analysis",
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",
"value": "A vulnerability has been found in FAST/TOOLS and CI Server. The affected product's WEB HMI server's function to process HTTP requests has a security flaw (Reflected XSS) that allows the execution of malicious scripts. Therefore, if a client PC with inadequate security measures accesses a product URL containing a malicious request, the malicious script may be executed on the client PC.\nThe affected products and versions are as follows:\nFAST/TOOLS (Packages: RVSVRN, UNSVRN, HMIWEB, FTEES, HMIMOB) R9.01 to R10.04\nCI Server R1.01.00 to R1.03.00" "value": "A vulnerability has been found in FAST/TOOLS and CI Server. The affected product's WEB HMI server's function to process HTTP requests has a security flaw (Reflected XSS) that allows the execution of malicious scripts. Therefore, if a client PC with inadequate security measures accesses a product URL containing a malicious request, the malicious script may be executed on the client PC.\nThe affected products and versions are as follows:\nFAST/TOOLS (Packages: RVSVRN, UNSVRN, HMIWEB, FTEES, HMIMOB) R9.01 to R10.04\nCI Server R1.01.00 to R1.03.00"
},
{
"lang": "es",
"value": "Se ha encontrado una vulnerabilidad en FAST/TOOLS y CI Server. La funci\u00f3n del servidor WEB HMI del producto afectado para procesar solicitudes HTTP tiene un fallo de seguridad (XSS Reflejado) que permite la ejecuci\u00f3n de scripts maliciosos. Por lo tanto, si una PC cliente con medidas de seguridad inadecuadas accede a la URL de un producto que contiene una solicitud maliciosa, el script malicioso puede ejecutarse en la PC cliente. Los productos y versiones afectados son los siguientes: FAST/TOOLS (Paquetes: RVSVRN, UNSVRN, HMIWEB, FTEES, HMIMOB) R9.01 a R10.04 CI Server R1.01.00 a R1.03.00"
} }
], ],
"metrics": { "metrics": {

View File

@ -2,12 +2,16 @@
"id": "CVE-2024-4106", "id": "CVE-2024-4106",
"sourceIdentifier": "7168b535-132a-4efe-a076-338f829b2eb9", "sourceIdentifier": "7168b535-132a-4efe-a076-338f829b2eb9",
"published": "2024-06-26T06:15:15.830", "published": "2024-06-26T06:15:15.830",
"lastModified": "2024-06-26T06:15:15.830", "lastModified": "2024-06-26T12:44:29.693",
"vulnStatus": "Received", "vulnStatus": "Awaiting Analysis",
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",
"value": "A vulnerability has been found in FAST/TOOLS and CI Server. The affected products have built-in accounts with no passwords set. Therefore, if the product is operated without a password set by default, an attacker can break into the affected product.\nThe affected products and versions are as follows:\nFAST/TOOLS (Packages: RVSVRN, UNSVRN, HMIWEB, FTEES, HMIMOB) R9.01 to R10.04\nCI Server R1.01.00 to R1.03.00" "value": "A vulnerability has been found in FAST/TOOLS and CI Server. The affected products have built-in accounts with no passwords set. Therefore, if the product is operated without a password set by default, an attacker can break into the affected product.\nThe affected products and versions are as follows:\nFAST/TOOLS (Packages: RVSVRN, UNSVRN, HMIWEB, FTEES, HMIMOB) R9.01 to R10.04\nCI Server R1.01.00 to R1.03.00"
},
{
"lang": "es",
"value": "Se ha encontrado una vulnerabilidad en FAST/TOOLS y CI Server. Los productos afectados tienen cuentas integradas sin contrase\u00f1as establecidas. Por lo tanto, si el producto se utiliza sin una contrase\u00f1a predeterminada, un atacante puede acceder al producto afectado. Los productos y versiones afectados son los siguientes: FAST/TOOLS (Paquetes: RVSVRN, UNSVRN, HMIWEB, FTEES, HMIMOB) R9.01 a R10.04 CI Server R1.01.00 a R1.03.00"
} }
], ],
"metrics": { "metrics": {

View File

@ -2,12 +2,16 @@
"id": "CVE-2024-4498", "id": "CVE-2024-4498",
"sourceIdentifier": "security@huntr.dev", "sourceIdentifier": "security@huntr.dev",
"published": "2024-06-25T20:15:12.127", "published": "2024-06-25T20:15:12.127",
"lastModified": "2024-06-25T20:15:12.127", "lastModified": "2024-06-26T12:44:29.693",
"vulnStatus": "Received", "vulnStatus": "Awaiting Analysis",
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",
"value": "A Path Traversal and Remote File Inclusion (RFI) vulnerability exists in the parisneo/lollms-webui application, affecting versions v9.7 to the latest. The vulnerability arises from insufficient input validation in the `/apply_settings` function, allowing an attacker to manipulate the `discussion_db_name` parameter to traverse the file system and include arbitrary files. This issue is compounded by the bypass of input filtering in the `install_binding`, `reinstall_binding`, and `unInstall_binding` endpoints, despite the presence of a `sanitize_path_from_endpoint(data.name)` filter. Successful exploitation enables an attacker to upload and execute malicious code on the victim's system, leading to Remote Code Execution (RCE)." "value": "A Path Traversal and Remote File Inclusion (RFI) vulnerability exists in the parisneo/lollms-webui application, affecting versions v9.7 to the latest. The vulnerability arises from insufficient input validation in the `/apply_settings` function, allowing an attacker to manipulate the `discussion_db_name` parameter to traverse the file system and include arbitrary files. This issue is compounded by the bypass of input filtering in the `install_binding`, `reinstall_binding`, and `unInstall_binding` endpoints, despite the presence of a `sanitize_path_from_endpoint(data.name)` filter. Successful exploitation enables an attacker to upload and execute malicious code on the victim's system, leading to Remote Code Execution (RCE)."
},
{
"lang": "es",
"value": "Existe una vulnerabilidad de Path Traversal e inclusi\u00f3n remota de archivos (RFI) en la aplicaci\u00f3n parisneo/lollms-webui, que afecta a las versiones v9.7 hasta la \u00faltima. La vulnerabilidad surge de una validaci\u00f3n de entrada insuficiente en la funci\u00f3n `/apply_settings`, lo que permite a un atacante manipular el par\u00e1metro `discussion_db_name` para atravesar el sistema de archivos e incluir archivos arbitrarios. Este problema se ve agravado por la omisi\u00f3n del filtrado de entrada en los endpoints `install_binding`, `reinstall_binding` y `unInstall_binding`, a pesar de la presencia de un filtro `sanitize_path_from_endpoint(data.name)`. La explotaci\u00f3n exitosa permite a un atacante cargar y ejecutar c\u00f3digo malicioso en el sistema de la v\u00edctima, lo que lleva a la ejecuci\u00f3n remota de c\u00f3digo (RCE)."
} }
], ],
"metrics": { "metrics": {

View File

@ -2,12 +2,16 @@
"id": "CVE-2024-4758", "id": "CVE-2024-4758",
"sourceIdentifier": "contact@wpscan.com", "sourceIdentifier": "contact@wpscan.com",
"published": "2024-06-26T06:15:16.133", "published": "2024-06-26T06:15:16.133",
"lastModified": "2024-06-26T06:15:16.133", "lastModified": "2024-06-26T12:44:29.693",
"vulnStatus": "Received", "vulnStatus": "Awaiting Analysis",
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",
"value": "The Muslim Prayer Time BD WordPress plugin through 2.4 does not have CSRF check in place when reseting its settings, which could allow attackers to make a logged in admin reset them via a CSRF attack" "value": "The Muslim Prayer Time BD WordPress plugin through 2.4 does not have CSRF check in place when reseting its settings, which could allow attackers to make a logged in admin reset them via a CSRF attack"
},
{
"lang": "es",
"value": "El complemento Muslim Prayer Time BD de WordPress hasta la versi\u00f3n 2.4 no tiene activada la verificaci\u00f3n CSRF al restablecer su configuraci\u00f3n, lo que podr\u00eda permitir a los atacantes hacer que un administrador que haya iniciado sesi\u00f3n los restablezca mediante un ataque CSRF."
} }
], ],
"metrics": {}, "metrics": {},

View File

@ -2,12 +2,16 @@
"id": "CVE-2024-4869", "id": "CVE-2024-4869",
"sourceIdentifier": "security@wordfence.com", "sourceIdentifier": "security@wordfence.com",
"published": "2024-06-26T00:15:10.897", "published": "2024-06-26T00:15:10.897",
"lastModified": "2024-06-26T00:15:10.897", "lastModified": "2024-06-26T12:44:29.693",
"vulnStatus": "Received", "vulnStatus": "Awaiting Analysis",
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",
"value": "The WP Cookie Consent ( for GDPR, CCPA & ePrivacy ) plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the \u2018Client-IP\u2019 header in all versions up to, and including, 3.2.0 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page." "value": "The WP Cookie Consent ( for GDPR, CCPA & ePrivacy ) plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the \u2018Client-IP\u2019 header in all versions up to, and including, 3.2.0 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page."
},
{
"lang": "es",
"value": "El complemento WP Cookie Consent (para GDPR, CCPA y ePrivacy) para WordPress es vulnerable a Cross-Site Scripting Almacenado a trav\u00e9s del encabezado 'Client-IP' en todas las versiones hasta la 3.2.0 incluida debido a una sanitizaci\u00f3n insuficiente de la entrada y un escape de salida. Esto hace posible que atacantes no autenticados inyecten scripts web arbitrarios en p\u00e1ginas que se ejecutar\u00e1n cada vez que un usuario acceda a una p\u00e1gina inyectada."
} }
], ],
"metrics": { "metrics": {

View File

@ -2,12 +2,16 @@
"id": "CVE-2024-4883", "id": "CVE-2024-4883",
"sourceIdentifier": "security@progress.com", "sourceIdentifier": "security@progress.com",
"published": "2024-06-25T20:15:12.320", "published": "2024-06-25T20:15:12.320",
"lastModified": "2024-06-25T20:15:12.320", "lastModified": "2024-06-26T12:44:29.693",
"vulnStatus": "Received", "vulnStatus": "Awaiting Analysis",
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",
"value": "In WhatsUp Gold versions released before 2023.1.3, a Remote Code Execution issue exists in Progress WhatsUp Gold. This vulnerability allows an unauthenticated attacker to achieve the RCE as a service account through NmApi.exe." "value": "In WhatsUp Gold versions released before 2023.1.3, a Remote Code Execution issue exists in Progress WhatsUp Gold. This vulnerability allows an unauthenticated attacker to achieve the RCE as a service account through NmApi.exe."
},
{
"lang": "es",
"value": "En las versiones de WhatsUp Gold lanzadas antes de 2023.1.3, existe un problema de ejecuci\u00f3n remota de c\u00f3digo en Progress WhatsUp Gold. Esta vulnerabilidad permite que un atacante no autenticado obtenga RCE como cuenta de servicio a trav\u00e9s de NmApi.exe."
} }
], ],
"metrics": { "metrics": {

View File

@ -2,12 +2,16 @@
"id": "CVE-2024-4884", "id": "CVE-2024-4884",
"sourceIdentifier": "security@progress.com", "sourceIdentifier": "security@progress.com",
"published": "2024-06-25T20:15:12.547", "published": "2024-06-25T20:15:12.547",
"lastModified": "2024-06-25T20:15:12.547", "lastModified": "2024-06-26T12:44:29.693",
"vulnStatus": "Received", "vulnStatus": "Awaiting Analysis",
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",
"value": "In WhatsUp Gold versions released before 2023.1.3,\u00a0an unauthenticated Remote Code Execution vulnerability in Progress WhatsUpGold.\u00a0\u00a0The Apm.UI.Areas.APM.Controllers.CommunityController\n\n allows execution of commands with iisapppool\\nmconsole privileges." "value": "In WhatsUp Gold versions released before 2023.1.3,\u00a0an unauthenticated Remote Code Execution vulnerability in Progress WhatsUpGold.\u00a0\u00a0The Apm.UI.Areas.APM.Controllers.CommunityController\n\n allows execution of commands with iisapppool\\nmconsole privileges."
},
{
"lang": "es",
"value": "En las versiones de WhatsUp Gold lanzadas antes de 2023.1.3, se detect\u00f3 una vulnerabilidad de ejecuci\u00f3n remota de c\u00f3digo no autenticada en WhatsUpGold en curso. Apm.UI.Areas.APM.Controllers.CommunityController permite la ejecuci\u00f3n de comandos con privilegios de iisapppool\\nmconsole."
} }
], ],
"metrics": { "metrics": {

View File

@ -2,12 +2,16 @@
"id": "CVE-2024-4885", "id": "CVE-2024-4885",
"sourceIdentifier": "security@progress.com", "sourceIdentifier": "security@progress.com",
"published": "2024-06-25T20:15:12.970", "published": "2024-06-25T20:15:12.970",
"lastModified": "2024-06-25T20:15:12.970", "lastModified": "2024-06-26T12:44:29.693",
"vulnStatus": "Received", "vulnStatus": "Awaiting Analysis",
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",
"value": "In WhatsUp Gold versions released before 2023.1.3,\u00a0an unauthenticated Remote Code Execution vulnerability in Progress WhatsUpGold.\u00a0\u00a0The \n\nWhatsUp.ExportUtilities.Export.GetFileWithoutZip\n\n\n\n allows execution of commands with iisapppool\\nmconsole privileges." "value": "In WhatsUp Gold versions released before 2023.1.3,\u00a0an unauthenticated Remote Code Execution vulnerability in Progress WhatsUpGold.\u00a0\u00a0The \n\nWhatsUp.ExportUtilities.Export.GetFileWithoutZip\n\n\n\n allows execution of commands with iisapppool\\nmconsole privileges."
},
{
"lang": "es",
"value": "En las versiones de WhatsUp Gold lanzadas antes de 2023.1.3, se detect\u00f3 una vulnerabilidad de ejecuci\u00f3n remota de c\u00f3digo no autenticada en WhatsUpGold en curso. WhatsUp.ExportUtilities.Export.GetFileWithoutZip permite la ejecuci\u00f3n de comandos con privilegios de iisapppool\\nmconsole."
} }
], ],
"metrics": { "metrics": {

View File

@ -2,12 +2,16 @@
"id": "CVE-2024-4957", "id": "CVE-2024-4957",
"sourceIdentifier": "contact@wpscan.com", "sourceIdentifier": "contact@wpscan.com",
"published": "2024-06-26T06:15:16.237", "published": "2024-06-26T06:15:16.237",
"lastModified": "2024-06-26T06:15:16.237", "lastModified": "2024-06-26T12:44:29.693",
"vulnStatus": "Received", "vulnStatus": "Awaiting Analysis",
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",
"value": "The Frontend Checklist WordPress plugin through 2.3.2 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup)" "value": "The Frontend Checklist WordPress plugin through 2.3.2 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup)"
},
{
"lang": "es",
"value": "El complemento Frontend Checklist de WordPress hasta la versi\u00f3n 2.3.2 no sanitiza ni escapa a algunas de sus configuraciones, lo que podr\u00eda permitir a usuarios con privilegios elevados, como el administrador, realizar ataques de Cross-Site Scripting Almacenado incluso cuando la capacidad unfiltered_html no est\u00e1 permitida (por ejemplo, en una configuraci\u00f3n multisitio)."
} }
], ],
"metrics": {}, "metrics": {},

View File

@ -2,12 +2,16 @@
"id": "CVE-2024-4959", "id": "CVE-2024-4959",
"sourceIdentifier": "contact@wpscan.com", "sourceIdentifier": "contact@wpscan.com",
"published": "2024-06-26T06:15:16.347", "published": "2024-06-26T06:15:16.347",
"lastModified": "2024-06-26T06:15:16.347", "lastModified": "2024-06-26T12:44:29.693",
"vulnStatus": "Received", "vulnStatus": "Awaiting Analysis",
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",
"value": "The Frontend Checklist WordPress plugin through 2.3.2 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup)" "value": "The Frontend Checklist WordPress plugin through 2.3.2 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup)"
},
{
"lang": "es",
"value": "El complemento Frontend Checklist de WordPress hasta la versi\u00f3n 2.3.2 no sanitiza ni escapa a algunas de sus configuraciones, lo que podr\u00eda permitir a usuarios con privilegios elevados, como el administrador, realizar ataques de Cross-Site Scripting Almacenado incluso cuando la capacidad unfiltered_html no est\u00e1 permitida (por ejemplo, en una configuraci\u00f3n multisitio)."
} }
], ],
"metrics": {}, "metrics": {},

View File

@ -2,12 +2,16 @@
"id": "CVE-2024-5008", "id": "CVE-2024-5008",
"sourceIdentifier": "security@progress.com", "sourceIdentifier": "security@progress.com",
"published": "2024-06-25T20:15:13.173", "published": "2024-06-25T20:15:13.173",
"lastModified": "2024-06-25T20:15:13.173", "lastModified": "2024-06-26T12:44:29.693",
"vulnStatus": "Received", "vulnStatus": "Awaiting Analysis",
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",
"value": "In WhatsUp Gold versions released before 2023.1.3, \n\nan authenticated user with certain permissions can upload an arbitrary file and obtain RCE using\u00a0Apm.UI.Areas.APM.Controllers.Api.Applications.AppProfileImportController." "value": "In WhatsUp Gold versions released before 2023.1.3, \n\nan authenticated user with certain permissions can upload an arbitrary file and obtain RCE using\u00a0Apm.UI.Areas.APM.Controllers.Api.Applications.AppProfileImportController."
},
{
"lang": "es",
"value": "En las versiones de WhatsUp Gold lanzadas antes de 2023.1.3, un usuario autenticado con ciertos permisos puede cargar un archivo arbitrario y obtener RCE usando Apm.UI.Areas.APM.Controllers.Api.Applications.AppProfileImportController."
} }
], ],
"metrics": { "metrics": {

View File

@ -2,12 +2,16 @@
"id": "CVE-2024-5009", "id": "CVE-2024-5009",
"sourceIdentifier": "security@progress.com", "sourceIdentifier": "security@progress.com",
"published": "2024-06-25T20:15:13.427", "published": "2024-06-25T20:15:13.427",
"lastModified": "2024-06-25T20:15:13.427", "lastModified": "2024-06-26T12:44:29.693",
"vulnStatus": "Received", "vulnStatus": "Awaiting Analysis",
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",
"value": "In WhatsUp Gold versions released before 2023.1.3,\u00a0an Improper Access Control vulnerability in Wug.UI.Controllers.InstallController.SetAdminPassword allows local attackers to modify admin's password." "value": "In WhatsUp Gold versions released before 2023.1.3,\u00a0an Improper Access Control vulnerability in Wug.UI.Controllers.InstallController.SetAdminPassword allows local attackers to modify admin's password."
},
{
"lang": "es",
"value": "En las versiones de WhatsUp Gold lanzadas antes de 2023.1.3, una vulnerabilidad de control de acceso inadecuado en Wug.UI.Controllers.InstallController.SetAdminPassword permite a atacantes locales modificar la contrase\u00f1a del administrador."
} }
], ],
"metrics": { "metrics": {

View File

@ -2,12 +2,16 @@
"id": "CVE-2024-5010", "id": "CVE-2024-5010",
"sourceIdentifier": "security@progress.com", "sourceIdentifier": "security@progress.com",
"published": "2024-06-25T20:15:13.617", "published": "2024-06-25T20:15:13.617",
"lastModified": "2024-06-25T20:15:13.617", "lastModified": "2024-06-26T12:44:29.693",
"vulnStatus": "Received", "vulnStatus": "Awaiting Analysis",
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",
"value": "In WhatsUp Gold versions released before 2023.1.3, a vulnerability exists in the TestController functionality.\u00a0 A specially crafted \n\nunauthenticated\n\nHTTP request can lead to a disclosure of sensitive information." "value": "In WhatsUp Gold versions released before 2023.1.3, a vulnerability exists in the TestController functionality.\u00a0 A specially crafted \n\nunauthenticated\n\nHTTP request can lead to a disclosure of sensitive information."
},
{
"lang": "es",
"value": "En las versiones de WhatsUp Gold lanzadas antes de 2023.1.3, existe una vulnerabilidad en la funcionalidad TestController. Una solicitud HTTP no autenticada especialmente manipulada puede dar lugar a la divulgaci\u00f3n de informaci\u00f3n confidencial."
} }
], ],
"metrics": { "metrics": {

View File

@ -2,12 +2,16 @@
"id": "CVE-2024-5011", "id": "CVE-2024-5011",
"sourceIdentifier": "security@progress.com", "sourceIdentifier": "security@progress.com",
"published": "2024-06-25T20:15:13.810", "published": "2024-06-25T20:15:13.810",
"lastModified": "2024-06-25T20:15:13.810", "lastModified": "2024-06-26T12:44:29.693",
"vulnStatus": "Received", "vulnStatus": "Awaiting Analysis",
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",
"value": "In WhatsUp Gold versions released before 2023.1.3, an uncontrolled resource consumption vulnerability exists.\u00a0A specially crafted unauthenticated HTTP request\u00a0to the TestController Chart functionality\u00a0can lead to denial of service." "value": "In WhatsUp Gold versions released before 2023.1.3, an uncontrolled resource consumption vulnerability exists.\u00a0A specially crafted unauthenticated HTTP request\u00a0to the TestController Chart functionality\u00a0can lead to denial of service."
},
{
"lang": "es",
"value": "En las versiones de WhatsUp Gold lanzadas antes de 2023.1.3, existe una vulnerabilidad de consumo descontrolado de recursos. Una solicitud HTTP no autenticada especialmente manipulada para la funcionalidad TestController Chart puede provocar una denegaci\u00f3n de servicio."
} }
], ],
"metrics": { "metrics": {

View File

@ -2,12 +2,16 @@
"id": "CVE-2024-5012", "id": "CVE-2024-5012",
"sourceIdentifier": "security@progress.com", "sourceIdentifier": "security@progress.com",
"published": "2024-06-25T21:16:00.320", "published": "2024-06-25T21:16:00.320",
"lastModified": "2024-06-25T21:16:00.320", "lastModified": "2024-06-26T12:44:29.693",
"vulnStatus": "Received", "vulnStatus": "Awaiting Analysis",
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",
"value": "In WhatsUp Gold versions released before 2023.1.3, there is a\u00a0missing authentication vulnerability in WUGDataAccess.Credentials. This\u00a0vulnerability allows\u00a0unauthenticated attackers to disclose Windows Credentials stored in the product Credential Library." "value": "In WhatsUp Gold versions released before 2023.1.3, there is a\u00a0missing authentication vulnerability in WUGDataAccess.Credentials. This\u00a0vulnerability allows\u00a0unauthenticated attackers to disclose Windows Credentials stored in the product Credential Library."
},
{
"lang": "es",
"value": "En las versiones de WhatsUp Gold lanzadas antes de 2023.1.3, falta una vulnerabilidad de autenticaci\u00f3n en WUGDataAccess.Credentials. Esta vulnerabilidad permite a atacantes no autenticados revelar las credenciales de Windows almacenadas en la librer\u00eda de credenciales del producto."
} }
], ],
"metrics": { "metrics": {

View File

@ -2,12 +2,16 @@
"id": "CVE-2024-5013", "id": "CVE-2024-5013",
"sourceIdentifier": "security@progress.com", "sourceIdentifier": "security@progress.com",
"published": "2024-06-25T21:16:00.510", "published": "2024-06-25T21:16:00.510",
"lastModified": "2024-06-25T21:16:00.510", "lastModified": "2024-06-26T12:44:29.693",
"vulnStatus": "Received", "vulnStatus": "Awaiting Analysis",
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",
"value": "In WhatsUp Gold versions released before 2023.1.3,\u00a0an unauthenticated Denial of Service \n\nvulnerability was identified.\u00a0An unauthenticated attacker can put the application into the SetAdminPassword installation step, which renders the application non-accessible." "value": "In WhatsUp Gold versions released before 2023.1.3,\u00a0an unauthenticated Denial of Service \n\nvulnerability was identified.\u00a0An unauthenticated attacker can put the application into the SetAdminPassword installation step, which renders the application non-accessible."
},
{
"lang": "es",
"value": "En las versiones de WhatsUp Gold lanzadas antes de 2023.1.3, se identific\u00f3 una vulnerabilidad de denegaci\u00f3n de servicio no autenticada. Un atacante no autenticado puede colocar la aplicaci\u00f3n en el paso de instalaci\u00f3n SetAdminPassword, lo que hace que la aplicaci\u00f3n no sea accesible."
} }
], ],
"metrics": { "metrics": {

View File

@ -2,12 +2,16 @@
"id": "CVE-2024-5014", "id": "CVE-2024-5014",
"sourceIdentifier": "security@progress.com", "sourceIdentifier": "security@progress.com",
"published": "2024-06-25T21:16:00.703", "published": "2024-06-25T21:16:00.703",
"lastModified": "2024-06-25T21:16:00.703", "lastModified": "2024-06-26T12:44:29.693",
"vulnStatus": "Received", "vulnStatus": "Awaiting Analysis",
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",
"value": "In WhatsUp Gold versions released before 2023.1.3, a Server Side Request Forgery vulnerability exists in the\u00a0GetASPReport feature. This allows any authenticated user to retrieve ASP reports from an HTML form." "value": "In WhatsUp Gold versions released before 2023.1.3, a Server Side Request Forgery vulnerability exists in the\u00a0GetASPReport feature. This allows any authenticated user to retrieve ASP reports from an HTML form."
},
{
"lang": "es",
"value": "En las versiones de WhatsUp Gold lanzadas antes de 2023.1.3, existe una vulnerabilidad de Server Side Request Forgery en la funci\u00f3n GetASPReport. Esto permite que cualquier usuario autenticado recupere informes ASP desde un formulario HTML."
} }
], ],
"metrics": { "metrics": {

View File

@ -2,12 +2,16 @@
"id": "CVE-2024-5015", "id": "CVE-2024-5015",
"sourceIdentifier": "security@progress.com", "sourceIdentifier": "security@progress.com",
"published": "2024-06-25T21:16:00.890", "published": "2024-06-25T21:16:00.890",
"lastModified": "2024-06-25T21:16:00.890", "lastModified": "2024-06-26T12:44:29.693",
"vulnStatus": "Received", "vulnStatus": "Awaiting Analysis",
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",
"value": "In WhatsUp Gold versions released before 2023.1.3,\u00a0an authenticated SSRF vulnerability in Wug.UI.Areas.Wug.Controllers.SessionControler.Update allows a low privileged user to chain this SSRF with an Improper Access Control vulnerability. This can be used to escalate privileges to Admin." "value": "In WhatsUp Gold versions released before 2023.1.3,\u00a0an authenticated SSRF vulnerability in Wug.UI.Areas.Wug.Controllers.SessionControler.Update allows a low privileged user to chain this SSRF with an Improper Access Control vulnerability. This can be used to escalate privileges to Admin."
},
{
"lang": "es",
"value": "En las versiones de WhatsUp Gold lanzadas antes de 2023.1.3, una vulnerabilidad SSRF autenticada en Wug.UI.Areas.Wug.Controllers.SessionControler.Update permite a un usuario con pocos privilegios encadenar esta SSRF con una vulnerabilidad de control de acceso inadecuado. Esto se puede utilizar para escalar privilegios a Administrador."
} }
], ],
"metrics": { "metrics": {

View File

@ -2,12 +2,16 @@
"id": "CVE-2024-5016", "id": "CVE-2024-5016",
"sourceIdentifier": "security@progress.com", "sourceIdentifier": "security@progress.com",
"published": "2024-06-25T21:16:01.163", "published": "2024-06-25T21:16:01.163",
"lastModified": "2024-06-25T21:16:01.163", "lastModified": "2024-06-26T12:44:29.693",
"vulnStatus": "Received", "vulnStatus": "Awaiting Analysis",
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",
"value": "In WhatsUp Gold versions released before 2023.1.3, Distributed Edition installations can be exploited by using a deserialization\u00a0tool to achieve a Remote Code Execution as SYSTEM.\u00a0\nThe vulnerability exists in the main message processing routines\u00a0NmDistributed.DistributedServiceBehavior.OnMessage for server and NmDistributed.DistributedClient.OnMessage for clients." "value": "In WhatsUp Gold versions released before 2023.1.3, Distributed Edition installations can be exploited by using a deserialization\u00a0tool to achieve a Remote Code Execution as SYSTEM.\u00a0\nThe vulnerability exists in the main message processing routines\u00a0NmDistributed.DistributedServiceBehavior.OnMessage for server and NmDistributed.DistributedClient.OnMessage for clients."
},
{
"lang": "es",
"value": "En las versiones de WhatsUp Gold lanzadas antes de 2023.1.3, las instalaciones de Distributed Edition se pueden explotar mediante el uso de una herramienta de deserializaci\u00f3n para lograr una ejecuci\u00f3n remota de c\u00f3digo como SYSTEM. La vulnerabilidad existe en las rutinas principales de procesamiento de mensajes NmDistributed.DistributedServiceBehavior.OnMessage para el servidor y NmDistributed.DistributedClient.OnMessage para los clientes."
} }
], ],
"metrics": { "metrics": {

View File

@ -2,12 +2,16 @@
"id": "CVE-2024-5017", "id": "CVE-2024-5017",
"sourceIdentifier": "security@progress.com", "sourceIdentifier": "security@progress.com",
"published": "2024-06-25T21:16:01.357", "published": "2024-06-25T21:16:01.357",
"lastModified": "2024-06-25T21:16:01.357", "lastModified": "2024-06-26T12:44:29.693",
"vulnStatus": "Received", "vulnStatus": "Awaiting Analysis",
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",
"value": "In WhatsUp Gold versions released before 2023.1.3, a path traversal vulnerability exists.\u00a0A specially crafted unauthenticated HTTP request\u00a0to AppProfileImport can lead can lead to information disclosure." "value": "In WhatsUp Gold versions released before 2023.1.3, a path traversal vulnerability exists.\u00a0A specially crafted unauthenticated HTTP request\u00a0to AppProfileImport can lead can lead to information disclosure."
},
{
"lang": "es",
"value": "En las versiones de WhatsUp Gold lanzadas antes de 2023.1.3, existe una vulnerabilidad de Path Traversal. Una solicitud HTTP no autenticada especialmente manipulada para AppProfileImport puede dar lugar a la divulgaci\u00f3n de informaci\u00f3n."
} }
], ],
"metrics": { "metrics": {

View File

@ -2,12 +2,16 @@
"id": "CVE-2024-5018", "id": "CVE-2024-5018",
"sourceIdentifier": "security@progress.com", "sourceIdentifier": "security@progress.com",
"published": "2024-06-25T21:16:01.543", "published": "2024-06-25T21:16:01.543",
"lastModified": "2024-06-25T21:16:01.543", "lastModified": "2024-06-26T12:44:29.693",
"vulnStatus": "Received", "vulnStatus": "Awaiting Analysis",
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",
"value": "In WhatsUp Gold versions released before 2023.1.3, an unauthenticated Path Traversal vulnerability exists Wug.UI.Areas.Wug.Controllers.SessionController.LoadNMScript. This allows allows reading of any file from the applications web-root directory ." "value": "In WhatsUp Gold versions released before 2023.1.3, an unauthenticated Path Traversal vulnerability exists Wug.UI.Areas.Wug.Controllers.SessionController.LoadNMScript. This allows allows reading of any file from the applications web-root directory ."
},
{
"lang": "es",
"value": "En las versiones de WhatsUp Gold lanzadas antes de 2023.1.3, existe una vulnerabilidad de Path Traversal no autenticada Wug.UI.Areas.Wug.Controllers.SessionController.LoadNMScript. Esto permite la lectura de cualquier archivo desde el directorio ra\u00edz web de la aplicaci\u00f3n."
} }
], ],
"metrics": { "metrics": {

View File

@ -2,12 +2,16 @@
"id": "CVE-2024-5019", "id": "CVE-2024-5019",
"sourceIdentifier": "security@progress.com", "sourceIdentifier": "security@progress.com",
"published": "2024-06-25T21:16:01.743", "published": "2024-06-25T21:16:01.743",
"lastModified": "2024-06-25T21:16:01.743", "lastModified": "2024-06-26T12:44:29.693",
"vulnStatus": "Received", "vulnStatus": "Awaiting Analysis",
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",
"value": "In WhatsUp Gold versions released before 2023.1.3,\u00a0\n\nan unauthenticated Arbitrary File Read issue exists in Wug.UI.Areas.Wug.Controllers.SessionController.CachedCSS. This\u00a0vulnerability allows reading of any file with iisapppool\\NmConsole privileges." "value": "In WhatsUp Gold versions released before 2023.1.3,\u00a0\n\nan unauthenticated Arbitrary File Read issue exists in Wug.UI.Areas.Wug.Controllers.SessionController.CachedCSS. This\u00a0vulnerability allows reading of any file with iisapppool\\NmConsole privileges."
},
{
"lang": "es",
"value": "En las versiones de WhatsUp Gold lanzadas antes de 2023.1.3, existe un problema de lectura arbitraria de archivos no autenticados en Wug.UI.Areas.Wug.Controllers.SessionController.CachedCSS. Esta vulnerabilidad permite la lectura de cualquier archivo con privilegios iisapppool\\NmConsole."
} }
], ],
"metrics": { "metrics": {

View File

@ -2,12 +2,16 @@
"id": "CVE-2024-5071", "id": "CVE-2024-5071",
"sourceIdentifier": "contact@wpscan.com", "sourceIdentifier": "contact@wpscan.com",
"published": "2024-06-26T06:15:16.463", "published": "2024-06-26T06:15:16.463",
"lastModified": "2024-06-26T06:15:16.463", "lastModified": "2024-06-26T12:44:29.693",
"vulnStatus": "Received", "vulnStatus": "Awaiting Analysis",
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",
"value": "The Bookster WordPress plugin through 1.1.0 allows adding sensitive parameters when validating appointments allowing attackers to manipulate the data sent when booking an appointment (the request body) to change its status from pending to approved." "value": "The Bookster WordPress plugin through 1.1.0 allows adding sensitive parameters when validating appointments allowing attackers to manipulate the data sent when booking an appointment (the request body) to change its status from pending to approved."
},
{
"lang": "es",
"value": "El complemento Bookster WordPress hasta la versi\u00f3n 1.1.0 permite agregar par\u00e1metros confidenciales al validar citas, lo que permite a los atacantes manipular los datos enviados al reservar una cita (el cuerpo de la solicitud) para cambiar su estado de pendiente a aprobado."
} }
], ],
"metrics": {}, "metrics": {},

View File

@ -2,12 +2,16 @@
"id": "CVE-2024-5169", "id": "CVE-2024-5169",
"sourceIdentifier": "contact@wpscan.com", "sourceIdentifier": "contact@wpscan.com",
"published": "2024-06-26T06:15:16.543", "published": "2024-06-26T06:15:16.543",
"lastModified": "2024-06-26T06:15:16.543", "lastModified": "2024-06-26T12:44:29.693",
"vulnStatus": "Received", "vulnStatus": "Awaiting Analysis",
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",
"value": "The Video Widget WordPress plugin through 1.2.3 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup)" "value": "The Video Widget WordPress plugin through 1.2.3 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup)"
},
{
"lang": "es",
"value": "El complemento Video Widget de WordPress hasta la versi\u00f3n 1.2.3 no sanitiza ni escapa a algunas de sus configuraciones, lo que podr\u00eda permitir a usuarios con privilegios elevados, como el administrador, realizar ataques de Cross-Site Scripting Almacenado incluso cuando la capacidad unfiltered_html no est\u00e1 permitida (por ejemplo, en una configuraci\u00f3n multisitio)."
} }
], ],
"metrics": {}, "metrics": {},

View File

@ -2,12 +2,16 @@
"id": "CVE-2024-5173", "id": "CVE-2024-5173",
"sourceIdentifier": "security@wordfence.com", "sourceIdentifier": "security@wordfence.com",
"published": "2024-06-26T02:15:09.340", "published": "2024-06-26T02:15:09.340",
"lastModified": "2024-06-26T02:15:09.340", "lastModified": "2024-06-26T12:44:29.693",
"vulnStatus": "Received", "vulnStatus": "Awaiting Analysis",
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",
"value": "The HT Mega \u2013 Absolute Addons For Elementor plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the Video player widget settings in all versions up to, and including, 2.5.5 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page." "value": "The HT Mega \u2013 Absolute Addons For Elementor plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the Video player widget settings in all versions up to, and including, 2.5.5 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page."
},
{
"lang": "es",
"value": "El complemento HT Mega \u2013 Absolute Addons For Elementor para WordPress es vulnerable a Cross-Site Scripting Almacenado a trav\u00e9s de la configuraci\u00f3n del widget del reproductor de video en todas las versiones hasta la 2.5.5 incluida debido a una sanitizaci\u00f3n de entrada insuficiente y a un escape de salida en los atributos proporcionados por el usuario. Esto hace posible que atacantes autenticados, con acceso de nivel de colaborador y superior, inyecten scripts web arbitrarios en p\u00e1ginas que se ejecutar\u00e1n cada vez que un usuario acceda a una p\u00e1gina inyectada."
} }
], ],
"metrics": { "metrics": {

View File

@ -2,12 +2,16 @@
"id": "CVE-2024-5181", "id": "CVE-2024-5181",
"sourceIdentifier": "security@huntr.dev", "sourceIdentifier": "security@huntr.dev",
"published": "2024-06-26T03:15:10.987", "published": "2024-06-26T03:15:10.987",
"lastModified": "2024-06-26T03:15:10.987", "lastModified": "2024-06-26T12:44:29.693",
"vulnStatus": "Received", "vulnStatus": "Awaiting Analysis",
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",
"value": "A command injection vulnerability exists in the mudler/localai version 2.14.0. The vulnerability arises from the application's handling of the backend parameter in the configuration file, which is used in the name of the initialized process. An attacker can exploit this vulnerability by manipulating the path of the vulnerable binary file specified in the backend parameter, allowing the execution of arbitrary code on the system. This issue is due to improper neutralization of special elements used in an OS command, leading to potential full control over the affected system." "value": "A command injection vulnerability exists in the mudler/localai version 2.14.0. The vulnerability arises from the application's handling of the backend parameter in the configuration file, which is used in the name of the initialized process. An attacker can exploit this vulnerability by manipulating the path of the vulnerable binary file specified in the backend parameter, allowing the execution of arbitrary code on the system. This issue is due to improper neutralization of special elements used in an OS command, leading to potential full control over the affected system."
},
{
"lang": "es",
"value": "Existe una vulnerabilidad de inyecci\u00f3n de comandos en la versi\u00f3n 2.14.0 de mudler/localai. La vulnerabilidad surge del manejo por parte de la aplicaci\u00f3n del par\u00e1metro backend en el archivo de configuraci\u00f3n, que se utiliza en el nombre del proceso inicializado. Un atacante puede explotar esta vulnerabilidad manipulando la ruta del archivo binario vulnerable especificado en el par\u00e1metro backend, permitiendo la ejecuci\u00f3n de c\u00f3digo arbitrario en el sistema. Este problema se debe a una neutralizaci\u00f3n inadecuada de elementos especiales utilizados en un comando del sistema operativo, lo que lleva a un posible control total sobre el sistema afectado."
} }
], ],
"metrics": { "metrics": {

View File

@ -2,12 +2,16 @@
"id": "CVE-2024-5199", "id": "CVE-2024-5199",
"sourceIdentifier": "contact@wpscan.com", "sourceIdentifier": "contact@wpscan.com",
"published": "2024-06-26T06:15:16.633", "published": "2024-06-26T06:15:16.633",
"lastModified": "2024-06-26T06:15:16.633", "lastModified": "2024-06-26T12:44:29.693",
"vulnStatus": "Received", "vulnStatus": "Awaiting Analysis",
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",
"value": "The Spotify Play Button WordPress plugin through 1.0 does not validate and escape some of its shortcode attributes before outputting them back in a page/post where the shortcode is embed, which could allow users with the contributor role and above to perform Stored Cross-Site Scripting attacks." "value": "The Spotify Play Button WordPress plugin through 1.0 does not validate and escape some of its shortcode attributes before outputting them back in a page/post where the shortcode is embed, which could allow users with the contributor role and above to perform Stored Cross-Site Scripting attacks."
},
{
"lang": "es",
"value": "El complemento Spotify Play Button de WordPress hasta la versi\u00f3n 1.0 no valida ni escapa algunos de sus atributos de c\u00f3digo corto antes de devolverlos a una p\u00e1gina/publicaci\u00f3n donde est\u00e1 incrustado el c\u00f3digo corto, lo que podr\u00eda permitir a los usuarios con el rol de colaborador y superior realizar ataques de Cross-Site Scripting Almacenado."
} }
], ],
"metrics": {}, "metrics": {},

View File

@ -2,12 +2,16 @@
"id": "CVE-2024-5215", "id": "CVE-2024-5215",
"sourceIdentifier": "security@wordfence.com", "sourceIdentifier": "security@wordfence.com",
"published": "2024-06-26T07:15:11.013", "published": "2024-06-26T07:15:11.013",
"lastModified": "2024-06-26T07:15:11.013", "lastModified": "2024-06-26T12:44:29.693",
"vulnStatus": "Received", "vulnStatus": "Awaiting Analysis",
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",
"value": "The HT Mega \u2013 Absolute Addons For Elementor plugin for WordPress is vulnerable to Stored Cross-Site Scripting via multiple widgets in all versions up to, and including, 2.5.5 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page." "value": "The HT Mega \u2013 Absolute Addons For Elementor plugin for WordPress is vulnerable to Stored Cross-Site Scripting via multiple widgets in all versions up to, and including, 2.5.5 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page."
},
{
"lang": "es",
"value": "El complemento HT Mega \u2013 Absolute Addons For Elementor para WordPress es vulnerable a Cross-Site Scripting Almacenado a trav\u00e9s de m\u00faltiples widgets en todas las versiones hasta la 2.5.5 incluida debido a una sanitizaci\u00f3n de entrada insuficiente y a un escape de salida en los atributos proporcionados por el usuario. Esto hace posible que atacantes autenticados, con acceso de nivel de colaborador y superior, inyecten scripts web arbitrarios en p\u00e1ginas que se ejecutar\u00e1n cada vez que un usuario acceda a una p\u00e1gina inyectada."
} }
], ],
"metrics": { "metrics": {

View File

@ -2,12 +2,16 @@
"id": "CVE-2024-5276", "id": "CVE-2024-5276",
"sourceIdentifier": "df4dee71-de3a-4139-9588-11b62fe6c0ff", "sourceIdentifier": "df4dee71-de3a-4139-9588-11b62fe6c0ff",
"published": "2024-06-25T20:15:14.013", "published": "2024-06-25T20:15:14.013",
"lastModified": "2024-06-25T20:15:14.013", "lastModified": "2024-06-26T12:44:29.693",
"vulnStatus": "Received", "vulnStatus": "Awaiting Analysis",
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",
"value": "A SQL Injection vulnerability in Fortra FileCatalyst Workflow allows an attacker to modify application data.\u00a0 Likely impacts include creation of administrative users and deletion or modification of data in the application database. Data exfiltration via SQL injection is not possible using this vulnerability. Successful unauthenticated exploitation requires a Workflow system with anonymous access enabled, otherwise an authenticated user is required.\u00a0This issue affects all versions of FileCatalyst Workflow from 5.1.6 Build 135 and earlier." "value": "A SQL Injection vulnerability in Fortra FileCatalyst Workflow allows an attacker to modify application data.\u00a0 Likely impacts include creation of administrative users and deletion or modification of data in the application database. Data exfiltration via SQL injection is not possible using this vulnerability. Successful unauthenticated exploitation requires a Workflow system with anonymous access enabled, otherwise an authenticated user is required.\u00a0This issue affects all versions of FileCatalyst Workflow from 5.1.6 Build 135 and earlier."
},
{
"lang": "es",
"value": "Una vulnerabilidad de inyecci\u00f3n SQL en Fortra FileCatalyst Workflow permite a un atacante modificar los datos de la aplicaci\u00f3n. Los impactos probables incluyen la creaci\u00f3n de usuarios administrativos y la eliminaci\u00f3n o modificaci\u00f3n de datos en la base de datos de la aplicaci\u00f3n. La exfiltraci\u00f3n de datos mediante inyecci\u00f3n SQL no es posible gracias a esta vulnerabilidad. La explotaci\u00f3n exitosa sin autenticaci\u00f3n requiere un sistema de flujo de trabajo con acceso an\u00f3nimo habilitado; de lo contrario, se requiere un usuario autenticado. Este problema afecta a todas las versiones de FileCatalyst Workflow desde 5.1.6 Build 135 y anteriores."
} }
], ],
"metrics": { "metrics": {

View File

@ -2,12 +2,16 @@
"id": "CVE-2024-5332", "id": "CVE-2024-5332",
"sourceIdentifier": "security@wordfence.com", "sourceIdentifier": "security@wordfence.com",
"published": "2024-06-26T06:15:16.740", "published": "2024-06-26T06:15:16.740",
"lastModified": "2024-06-26T06:15:16.740", "lastModified": "2024-06-26T12:44:29.693",
"vulnStatus": "Received", "vulnStatus": "Awaiting Analysis",
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",
"value": "The Exclusive Addons for Elementor plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's Card widget in all versions up to, and including, 2.6.9.8 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page." "value": "The Exclusive Addons for Elementor plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's Card widget in all versions up to, and including, 2.6.9.8 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page."
},
{
"lang": "es",
"value": "Los complementos Exclusive Addons for Elementor para WordPress son vulnerables a Cross-Site Scripting Almacenado a trav\u00e9s del widget de tarjeta del complemento en todas las versiones hasta la 2.6.9.8 incluida debido a una sanitizaci\u00f3n de entrada insuficiente y a un escape de salida en los atributos proporcionados por el usuario. Esto hace posible que atacantes autenticados, con acceso de nivel de colaborador y superior, inyecten scripts web arbitrarios en p\u00e1ginas que se ejecutar\u00e1n cada vez que un usuario acceda a una p\u00e1gina inyectada."
} }
], ],
"metrics": { "metrics": {

View File

@ -2,12 +2,16 @@
"id": "CVE-2024-5460", "id": "CVE-2024-5460",
"sourceIdentifier": "sirt@brocade.com", "sourceIdentifier": "sirt@brocade.com",
"published": "2024-06-26T00:15:11.093", "published": "2024-06-26T00:15:11.093",
"lastModified": "2024-06-26T00:15:11.093", "lastModified": "2024-06-26T12:44:29.693",
"vulnStatus": "Received", "vulnStatus": "Awaiting Analysis",
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",
"value": "A vulnerability in the default configuration of the Simple Network \nManagement Protocol (SNMP) feature of Brocade Fabric OS versions before \nv9.0.0 could allow an authenticated, remote attacker to read data from \nan affected device via SNMP. The vulnerability is due to hard-coded, \ndefault community string in the configuration file for the SNMP daemon. \nAn attacker could exploit this vulnerability by using the static \ncommunity string in SNMP version 1 queries to an affected device." "value": "A vulnerability in the default configuration of the Simple Network \nManagement Protocol (SNMP) feature of Brocade Fabric OS versions before \nv9.0.0 could allow an authenticated, remote attacker to read data from \nan affected device via SNMP. The vulnerability is due to hard-coded, \ndefault community string in the configuration file for the SNMP daemon. \nAn attacker could exploit this vulnerability by using the static \ncommunity string in SNMP version 1 queries to an affected device."
},
{
"lang": "es",
"value": "Una vulnerabilidad en la configuraci\u00f3n predeterminada de la funci\u00f3n del Protocolo simple de administraci\u00f3n de red (SNMP) de las versiones de Brocade Fabric OS anteriores a v9.0.0 podr\u00eda permitir que un atacante remoto autenticado lea datos de un dispositivo afectado a trav\u00e9s de SNMP. La vulnerabilidad se debe a una cadena de comunidad predeterminada codificada en el archivo de configuraci\u00f3n del demonio SNMP. Un atacante podr\u00eda aprovechar esta vulnerabilidad utilizando la cadena de comunidad est\u00e1tica en las consultas SNMP versi\u00f3n 1 a un dispositivo afectado."
} }
], ],
"metrics": { "metrics": {

View File

@ -2,12 +2,16 @@
"id": "CVE-2024-5473", "id": "CVE-2024-5473",
"sourceIdentifier": "contact@wpscan.com", "sourceIdentifier": "contact@wpscan.com",
"published": "2024-06-26T06:15:17.197", "published": "2024-06-26T06:15:17.197",
"lastModified": "2024-06-26T06:15:17.197", "lastModified": "2024-06-26T12:44:29.693",
"vulnStatus": "Received", "vulnStatus": "Awaiting Analysis",
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",
"value": "The Simple Photoswipe WordPress plugin through 0.1 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup)." "value": "The Simple Photoswipe WordPress plugin through 0.1 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup)."
},
{
"lang": "es",
"value": "El complemento Simple Photoswipe de WordPress hasta la versi\u00f3n 0.1 no sanitiza ni escapa a algunas de sus configuraciones, lo que podr\u00eda permitir a usuarios con privilegios elevados, como el administrador, realizar ataques de Cross-Site Scripting Almacenado incluso cuando la capacidad unfiltered_html no est\u00e1 permitida (por ejemplo, en una configuraci\u00f3n multisitio)."
} }
], ],
"metrics": {}, "metrics": {},

View File

@ -2,12 +2,16 @@
"id": "CVE-2024-5573", "id": "CVE-2024-5573",
"sourceIdentifier": "contact@wpscan.com", "sourceIdentifier": "contact@wpscan.com",
"published": "2024-06-26T06:15:17.300", "published": "2024-06-26T06:15:17.300",
"lastModified": "2024-06-26T06:15:17.300", "lastModified": "2024-06-26T12:44:29.693",
"vulnStatus": "Received", "vulnStatus": "Awaiting Analysis",
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",
"value": "The Easy Table of Contents WordPress plugin before 2.0.66 does not sanitise and escape some of its settings, which could allow high privilege users such as editors to perform Cross-Site Scripting attacks even when unfiltered_html is disallowed" "value": "The Easy Table of Contents WordPress plugin before 2.0.66 does not sanitise and escape some of its settings, which could allow high privilege users such as editors to perform Cross-Site Scripting attacks even when unfiltered_html is disallowed"
},
{
"lang": "es",
"value": "El complemento Easy Table of Contents de WordPress anterior a 2.0.66 no sanitiza ni escapa a algunas de sus configuraciones, lo que podr\u00eda permitir a usuarios con altos privilegios, como editores, realizar ataques de Cross-Site Scripting incluso cuando unfiltered_html no est\u00e1 permitido."
} }
], ],
"metrics": {}, "metrics": {},

View File

@ -2,12 +2,16 @@
"id": "CVE-2024-6060", "id": "CVE-2024-6060",
"sourceIdentifier": "103e4ec9-0a87-450b-af77-479448ddef11", "sourceIdentifier": "103e4ec9-0a87-450b-af77-479448ddef11",
"published": "2024-06-25T22:15:35.347", "published": "2024-06-25T22:15:35.347",
"lastModified": "2024-06-25T22:15:35.347", "lastModified": "2024-06-26T12:44:29.693",
"vulnStatus": "Received", "vulnStatus": "Awaiting Analysis",
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",
"value": "An information disclosure vulnerability in Phloc Webscopes 7.0.0 allows local attackers with access to the log files to view logged HTTP requests that contain user passwords or other sensitive information." "value": "An information disclosure vulnerability in Phloc Webscopes 7.0.0 allows local attackers with access to the log files to view logged HTTP requests that contain user passwords or other sensitive information."
},
{
"lang": "es",
"value": "Una vulnerabilidad de divulgaci\u00f3n de informaci\u00f3n en Phloc Webscopes 7.0.0 permite a atacantes locales con acceso a los archivos de registro ver solicitudes HTTP registradas que contienen contrase\u00f1as de usuario u otra informaci\u00f3n confidencial."
} }
], ],
"metrics": {}, "metrics": {},

View File

@ -2,12 +2,16 @@
"id": "CVE-2024-6206", "id": "CVE-2024-6206",
"sourceIdentifier": "security-alert@hpe.com", "sourceIdentifier": "security-alert@hpe.com",
"published": "2024-06-25T20:15:14.210", "published": "2024-06-25T20:15:14.210",
"lastModified": "2024-06-25T20:15:14.210", "lastModified": "2024-06-26T12:44:29.693",
"vulnStatus": "Received", "vulnStatus": "Awaiting Analysis",
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",
"value": "A security vulnerability has been identified in HPE Athonet Mobile Core software. The core application contains a code injection vulnerability where a threat actor could execute arbitrary commands with the privilege of the underlying container leading to complete takeover of the target system." "value": "A security vulnerability has been identified in HPE Athonet Mobile Core software. The core application contains a code injection vulnerability where a threat actor could execute arbitrary commands with the privilege of the underlying container leading to complete takeover of the target system."
},
{
"lang": "es",
"value": "Se ha identificado una vulnerabilidad de seguridad en el software HPE Athonet Mobile Core. La aplicaci\u00f3n principal contiene una vulnerabilidad de inyecci\u00f3n de c\u00f3digo donde un actor de amenazas podr\u00eda ejecutar comandos arbitrarios con el privilegio del contenedor subyacente, lo que llevar\u00eda a tomar el control completo del sistema de destino."
} }
], ],
"metrics": { "metrics": {

View File

@ -2,12 +2,16 @@
"id": "CVE-2024-6344", "id": "CVE-2024-6344",
"sourceIdentifier": "cna@vuldb.com", "sourceIdentifier": "cna@vuldb.com",
"published": "2024-06-26T11:15:52.073", "published": "2024-06-26T11:15:52.073",
"lastModified": "2024-06-26T11:15:52.073", "lastModified": "2024-06-26T12:44:29.693",
"vulnStatus": "Received", "vulnStatus": "Awaiting Analysis",
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",
"value": "A vulnerability, which was classified as problematic, was found in ZKTeco ZKBio CVSecurity V5000 4.1.0. This affects an unknown part of the component Push Configuration Section. The manipulation of the argument Configuration Name leads to cross site scripting. It is possible to initiate the attack remotely. The identifier VDB-269733 was assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way." "value": "A vulnerability, which was classified as problematic, was found in ZKTeco ZKBio CVSecurity V5000 4.1.0. This affects an unknown part of the component Push Configuration Section. The manipulation of the argument Configuration Name leads to cross site scripting. It is possible to initiate the attack remotely. The identifier VDB-269733 was assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way."
},
{
"lang": "es",
"value": "Una vulnerabilidad fue encontrada en ZKTeco ZKBio CVSecurity V5000 4.1.0 y clasificada como problem\u00e1tica. Una parte desconocida del componente Push Configuration afecta a una parte desconocida. La manipulaci\u00f3n del argumento Nombre de configuraci\u00f3n conduce a Cross-Site Scripting. Es posible iniciar el ataque de forma remota. A esta vulnerabilidad se le asign\u00f3 el identificador VDB-269733. NOTA: Se contact\u00f3 primeramente con el proveedor sobre esta divulgaci\u00f3n, pero no respondi\u00f3 de ninguna manera."
} }
], ],
"metrics": { "metrics": {

View File

@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours.
### Last Repository Update ### Last Repository Update
```plain ```plain
2024-06-26T12:00:18.997842+00:00 2024-06-26T14:00:18.791020+00:00
``` ```
### Most recent CVE Modification Timestamp synchronized with NVD ### Most recent CVE Modification Timestamp synchronized with NVD
```plain ```plain
2024-06-26T11:15:52.073000+00:00 2024-06-26T13:53:56.883000+00:00
``` ```
### Last Data Feed Release ### Last Data Feed Release
@ -38,26 +38,39 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
### CVEs added in the last Commit ### CVEs added in the last Commit
Recently added CVEs: `3` Recently added CVEs: `0`
- [CVE-2024-37098](CVE-2024/CVE-2024-370xx/CVE-2024-37098.json) (`2024-06-26T11:15:51.613`)
- [CVE-2024-37252](CVE-2024/CVE-2024-372xx/CVE-2024-37252.json) (`2024-06-26T11:15:51.860`)
- [CVE-2024-6344](CVE-2024/CVE-2024-63xx/CVE-2024-6344.json) (`2024-06-26T11:15:52.073`)
### CVEs modified in the last Commit ### CVEs modified in the last Commit
Recently modified CVEs: `9` Recently modified CVEs: `78`
- [CVE-2019-1387](CVE-2019/CVE-2019-13xx/CVE-2019-1387.json) (`2024-06-26T10:15:10.077`) - [CVE-2024-5009](CVE-2024/CVE-2024-50xx/CVE-2024-5009.json) (`2024-06-26T12:44:29.693`)
- [CVE-2023-25652](CVE-2023/CVE-2023-256xx/CVE-2023-25652.json) (`2024-06-26T10:15:11.267`) - [CVE-2024-5010](CVE-2024/CVE-2024-50xx/CVE-2024-5010.json) (`2024-06-26T12:44:29.693`)
- [CVE-2023-25815](CVE-2023/CVE-2023-258xx/CVE-2023-25815.json) (`2024-06-26T10:15:11.530`) - [CVE-2024-5011](CVE-2024/CVE-2024-50xx/CVE-2024-5011.json) (`2024-06-26T12:44:29.693`)
- [CVE-2023-29007](CVE-2023/CVE-2023-290xx/CVE-2023-29007.json) (`2024-06-26T10:15:11.693`) - [CVE-2024-5012](CVE-2024/CVE-2024-50xx/CVE-2024-5012.json) (`2024-06-26T12:44:29.693`)
- [CVE-2024-1394](CVE-2024/CVE-2024-13xx/CVE-2024-1394.json) (`2024-06-26T11:15:51.163`) - [CVE-2024-5013](CVE-2024/CVE-2024-50xx/CVE-2024-5013.json) (`2024-06-26T12:44:29.693`)
- [CVE-2024-32002](CVE-2024/CVE-2024-320xx/CVE-2024-32002.json) (`2024-06-26T10:15:11.863`) - [CVE-2024-5014](CVE-2024/CVE-2024-50xx/CVE-2024-5014.json) (`2024-06-26T12:44:29.693`)
- [CVE-2024-32004](CVE-2024/CVE-2024-320xx/CVE-2024-32004.json) (`2024-06-26T10:15:12.050`) - [CVE-2024-5015](CVE-2024/CVE-2024-50xx/CVE-2024-5015.json) (`2024-06-26T12:44:29.693`)
- [CVE-2024-32021](CVE-2024/CVE-2024-320xx/CVE-2024-32021.json) (`2024-06-26T10:15:12.167`) - [CVE-2024-5016](CVE-2024/CVE-2024-50xx/CVE-2024-5016.json) (`2024-06-26T12:44:29.693`)
- [CVE-2024-32465](CVE-2024/CVE-2024-324xx/CVE-2024-32465.json) (`2024-06-26T10:15:12.280`) - [CVE-2024-5017](CVE-2024/CVE-2024-50xx/CVE-2024-5017.json) (`2024-06-26T12:44:29.693`)
- [CVE-2024-5018](CVE-2024/CVE-2024-50xx/CVE-2024-5018.json) (`2024-06-26T12:44:29.693`)
- [CVE-2024-5019](CVE-2024/CVE-2024-50xx/CVE-2024-5019.json) (`2024-06-26T12:44:29.693`)
- [CVE-2024-5071](CVE-2024/CVE-2024-50xx/CVE-2024-5071.json) (`2024-06-26T12:44:29.693`)
- [CVE-2024-5169](CVE-2024/CVE-2024-51xx/CVE-2024-5169.json) (`2024-06-26T12:44:29.693`)
- [CVE-2024-5173](CVE-2024/CVE-2024-51xx/CVE-2024-5173.json) (`2024-06-26T12:44:29.693`)
- [CVE-2024-5181](CVE-2024/CVE-2024-51xx/CVE-2024-5181.json) (`2024-06-26T12:44:29.693`)
- [CVE-2024-5199](CVE-2024/CVE-2024-51xx/CVE-2024-5199.json) (`2024-06-26T12:44:29.693`)
- [CVE-2024-5215](CVE-2024/CVE-2024-52xx/CVE-2024-5215.json) (`2024-06-26T12:44:29.693`)
- [CVE-2024-5276](CVE-2024/CVE-2024-52xx/CVE-2024-5276.json) (`2024-06-26T12:44:29.693`)
- [CVE-2024-5332](CVE-2024/CVE-2024-53xx/CVE-2024-5332.json) (`2024-06-26T12:44:29.693`)
- [CVE-2024-5460](CVE-2024/CVE-2024-54xx/CVE-2024-5460.json) (`2024-06-26T12:44:29.693`)
- [CVE-2024-5473](CVE-2024/CVE-2024-54xx/CVE-2024-5473.json) (`2024-06-26T12:44:29.693`)
- [CVE-2024-5573](CVE-2024/CVE-2024-55xx/CVE-2024-5573.json) (`2024-06-26T12:44:29.693`)
- [CVE-2024-6060](CVE-2024/CVE-2024-60xx/CVE-2024-6060.json) (`2024-06-26T12:44:29.693`)
- [CVE-2024-6206](CVE-2024/CVE-2024-62xx/CVE-2024-6206.json) (`2024-06-26T12:44:29.693`)
- [CVE-2024-6344](CVE-2024/CVE-2024-63xx/CVE-2024-6344.json) (`2024-06-26T12:44:29.693`)
## Download and Usage ## Download and Usage

View File

@ -131771,7 +131771,7 @@ CVE-2019-1383,0,0,7f2c753cec0551fb0c66b9bfb870cc6fd274bfac57a40d15ebb3389bd0cb86
CVE-2019-1384,0,0,9a1caf46de03c456349a03301243efa5540f9889203fffb26a31e1a6409c4343,2020-08-24T17:37:01.140000 CVE-2019-1384,0,0,9a1caf46de03c456349a03301243efa5540f9889203fffb26a31e1a6409c4343,2020-08-24T17:37:01.140000
CVE-2019-1385,0,0,1efb98f5567372b76b221489e1edd3eb127d4cad2de411d662d3818497804740,2020-08-24T17:37:01.140000 CVE-2019-1385,0,0,1efb98f5567372b76b221489e1edd3eb127d4cad2de411d662d3818497804740,2020-08-24T17:37:01.140000
CVE-2019-1386,0,0,f2ebadc9ee475d7dcb7475d08fb074eed1566e96343dd08bf8f809566e660791,2023-11-07T03:08:05.490000 CVE-2019-1386,0,0,f2ebadc9ee475d7dcb7475d08fb074eed1566e96343dd08bf8f809566e660791,2023-11-07T03:08:05.490000
CVE-2019-1387,0,1,58cbb4b857cd272f1d9b352573bb7bdf91702b2d582c5e91ad74dfe9ea837e4e,2024-06-26T10:15:10.077000 CVE-2019-1387,0,0,58cbb4b857cd272f1d9b352573bb7bdf91702b2d582c5e91ad74dfe9ea837e4e,2024-06-26T10:15:10.077000
CVE-2019-1388,0,0,1c077e381878bb5a53d42e5b7efd532eb72b5e99679b1f6335472ec410a18588,2019-11-14T19:19:18.903000 CVE-2019-1388,0,0,1c077e381878bb5a53d42e5b7efd532eb72b5e99679b1f6335472ec410a18588,2019-11-14T19:19:18.903000
CVE-2019-1389,0,0,cf574a90fea03ac798213a0da9e4a409959e03bbeead7b12a8b2fdeb31b37efa,2020-09-28T12:58:11.220000 CVE-2019-1389,0,0,cf574a90fea03ac798213a0da9e4a409959e03bbeead7b12a8b2fdeb31b37efa,2020-09-28T12:58:11.220000
CVE-2019-1390,0,0,4e89bdee299cdfc0ccfc14ea8df1f928e64612e130029a70c732a6de37f93819,2020-08-24T17:37:01.140000 CVE-2019-1390,0,0,4e89bdee299cdfc0ccfc14ea8df1f928e64612e130029a70c732a6de37f93819,2020-08-24T17:37:01.140000
@ -197516,7 +197516,7 @@ CVE-2022-29416,0,0,3810281bc1437d3e8bcf1fd797e438ec7187dbfc50837590d76dadb91be4b
CVE-2022-29417,0,0,ebf411b1e7eca581efd353861d4daa73896cbbc8df39000ab014e95fc79c51cb,2023-07-20T18:07:43.587000 CVE-2022-29417,0,0,ebf411b1e7eca581efd353861d4daa73896cbbc8df39000ab014e95fc79c51cb,2023-07-20T18:07:43.587000
CVE-2022-29418,0,0,471d0cd927dfe5d0b5747b2ba0877212bda9b62425809edc822aff82c7d6f0cd,2022-05-05T18:30:50.540000 CVE-2022-29418,0,0,471d0cd927dfe5d0b5747b2ba0877212bda9b62425809edc822aff82c7d6f0cd,2022-05-05T18:30:50.540000
CVE-2022-29419,0,0,bf9f07916258e8d51cf819d84dcd2ebc24d308ce9e2569f3cae3936daa9e1fb2,2022-05-05T18:41:24.810000 CVE-2022-29419,0,0,bf9f07916258e8d51cf819d84dcd2ebc24d308ce9e2569f3cae3936daa9e1fb2,2022-05-05T18:41:24.810000
CVE-2022-29420,0,0,67730d1e4606c01c1d85cb1b0ef790e9e60cd840f1a5fca2db9d033a7a883cc5,2022-05-16T16:40:13.520000 CVE-2022-29420,0,1,14672a488147e97be357c64b21a0505af31582523d4cd73b5b763c677baf961e,2024-06-26T13:15:49.553000
CVE-2022-29421,0,0,aa35dd1eaa7f8a0113462ff4976d40dee13cd86068049766730b4ef8e4369357,2022-05-16T16:24:53.127000 CVE-2022-29421,0,0,aa35dd1eaa7f8a0113462ff4976d40dee13cd86068049766730b4ef8e4369357,2022-05-16T16:24:53.127000
CVE-2022-29422,0,0,98cfdf2ee8a1edaa34624a2084839254dbd2127143a20a3fe9cdc05cca020993,2022-05-16T16:31:23.163000 CVE-2022-29422,0,0,98cfdf2ee8a1edaa34624a2084839254dbd2127143a20a3fe9cdc05cca020993,2022-05-16T16:31:23.163000
CVE-2022-29423,0,0,8569ccef1818a38cab6849ab86dcbb8be313866e1b763a5747e13a22800e2852,2023-07-20T18:08:55.013000 CVE-2022-29423,0,0,8569ccef1818a38cab6849ab86dcbb8be313866e1b763a5747e13a22800e2852,2023-07-20T18:08:55.013000
@ -218831,7 +218831,7 @@ CVE-2023-25649,0,0,7fdca89abb02c0a04c1a8d8d1c0be240d887fa7c73c6b501606d77250afdc
CVE-2023-2565,0,0,783ddff3351c0791075207478b40973795d5bd2f09d06722b032dd3b4296fa2e,2024-05-17T02:23:03.640000 CVE-2023-2565,0,0,783ddff3351c0791075207478b40973795d5bd2f09d06722b032dd3b4296fa2e,2024-05-17T02:23:03.640000
CVE-2023-25650,0,0,d8b1b26bb91d4d3109306d76bfbb2b03429ed7e68a862e799b46f5c2f97bc6f1,2023-12-19T19:24:52.120000 CVE-2023-25650,0,0,d8b1b26bb91d4d3109306d76bfbb2b03429ed7e68a862e799b46f5c2f97bc6f1,2023-12-19T19:24:52.120000
CVE-2023-25651,0,0,6806a158fad35273df088b5694b29f79360a8cf9ade7d43c3f150bc00b3feee9,2023-12-19T18:46:27.270000 CVE-2023-25651,0,0,6806a158fad35273df088b5694b29f79360a8cf9ade7d43c3f150bc00b3feee9,2023-12-19T18:46:27.270000
CVE-2023-25652,0,1,85ba2ed77d4cd1740e662acc1e6af2ee271486fe03a1c3de5387f99dd5152781,2024-06-26T10:15:11.267000 CVE-2023-25652,0,0,85ba2ed77d4cd1740e662acc1e6af2ee271486fe03a1c3de5387f99dd5152781,2024-06-26T10:15:11.267000
CVE-2023-25653,0,0,4edb03d5bf56af3933d62a86b2cd294e6cb7e6c60c69b3f5d67d02ec07347632,2023-11-07T04:09:04.830000 CVE-2023-25653,0,0,4edb03d5bf56af3933d62a86b2cd294e6cb7e6c60c69b3f5d67d02ec07347632,2023-11-07T04:09:04.830000
CVE-2023-25654,0,0,46daa10015012557f752912182dd2e0f373d6d3e78314e930e6a7ad1866e2cb5,2023-03-28T15:01:44.877000 CVE-2023-25654,0,0,46daa10015012557f752912182dd2e0f373d6d3e78314e930e6a7ad1866e2cb5,2023-03-28T15:01:44.877000
CVE-2023-25655,0,0,01e9638ae81748ecabea30b167c085913e1032cd338a88c8250fb6dcbcf0655a,2023-03-28T15:02:27.250000 CVE-2023-25655,0,0,01e9638ae81748ecabea30b167c085913e1032cd338a88c8250fb6dcbcf0655a,2023-03-28T15:02:27.250000
@ -218997,7 +218997,7 @@ CVE-2023-25811,0,0,9e3dc92a6d92245f9657144eaeb0e3e3a5dc9d5923fb2489dfcf629189dc9
CVE-2023-25812,0,0,b1f7e2069d51dc8b0c91b44e868e734cc8aca503ffc34a0b70dc60c7be6e75af,2023-11-07T04:09:12.860000 CVE-2023-25812,0,0,b1f7e2069d51dc8b0c91b44e868e734cc8aca503ffc34a0b70dc60c7be6e75af,2023-11-07T04:09:12.860000
CVE-2023-25813,0,0,4b10b691446c75332feb9888174eff37d69eea5ddb5dbe6b6d614314648b5f19,2023-03-03T02:04:19.600000 CVE-2023-25813,0,0,4b10b691446c75332feb9888174eff37d69eea5ddb5dbe6b6d614314648b5f19,2023-03-03T02:04:19.600000
CVE-2023-25814,0,0,cc141185d6aa0a074472830029d80dcfab297ada19c75c6210f6d35748b7dfbf,2023-03-15T16:35:07.443000 CVE-2023-25814,0,0,cc141185d6aa0a074472830029d80dcfab297ada19c75c6210f6d35748b7dfbf,2023-03-15T16:35:07.443000
CVE-2023-25815,0,1,a6e25e4fc6362deaecfcc2cb388f46d306456554c5e7c9f00e0a6a6219eb7df7,2024-06-26T10:15:11.530000 CVE-2023-25815,0,0,a6e25e4fc6362deaecfcc2cb388f46d306456554c5e7c9f00e0a6a6219eb7df7,2024-06-26T10:15:11.530000
CVE-2023-25816,0,0,03a0695c6efa94330749dc394e7af629d636ca6dbcc6a22794b7f52252467fbc,2023-11-07T04:09:13.087000 CVE-2023-25816,0,0,03a0695c6efa94330749dc394e7af629d636ca6dbcc6a22794b7f52252467fbc,2023-11-07T04:09:13.087000
CVE-2023-25817,0,0,91a7ef2c9ef6a93200cd21102e85030e3496d7cb186356314756d6f20d961574,2023-04-01T01:42:57.327000 CVE-2023-25817,0,0,91a7ef2c9ef6a93200cd21102e85030e3496d7cb186356314756d6f20d961574,2023-04-01T01:42:57.327000
CVE-2023-25818,0,0,e2204d1b2d241ee3ce125c4cc44a1fae8cbf8cf7ff6abaf491e2aeee2a6b1576,2023-04-03T16:55:57.387000 CVE-2023-25818,0,0,e2204d1b2d241ee3ce125c4cc44a1fae8cbf8cf7ff6abaf491e2aeee2a6b1576,2023-04-03T16:55:57.387000
@ -221607,7 +221607,7 @@ CVE-2023-29003,0,0,871deaaa08d1362771e7cc70a18cdb5bf390e0d3a9126e03c3f40a64c0f52
CVE-2023-29004,0,0,58d279b080d1428fd0d69088ea1860465501c9ab33b5b9e1ce47f0b1c2b2ac2d,2023-04-26T19:34:10.293000 CVE-2023-29004,0,0,58d279b080d1428fd0d69088ea1860465501c9ab33b5b9e1ce47f0b1c2b2ac2d,2023-04-26T19:34:10.293000
CVE-2023-29005,0,0,499354d86599ad5d43c42b0e4e79d88751868d36469f1d7d442e587841e8abd1,2023-04-18T17:02:56.903000 CVE-2023-29005,0,0,499354d86599ad5d43c42b0e4e79d88751868d36469f1d7d442e587841e8abd1,2023-04-18T17:02:56.903000
CVE-2023-29006,0,0,c6ff9b315116447f0023cacf3de6ebd6daf8a68060147e843ed198166f39e32a,2023-04-12T15:53:29.377000 CVE-2023-29006,0,0,c6ff9b315116447f0023cacf3de6ebd6daf8a68060147e843ed198166f39e32a,2023-04-12T15:53:29.377000
CVE-2023-29007,0,1,6967c114c24fb32b528360f8c2bd13687ae0d7da018ba5889c4873a5c0bd4eee,2024-06-26T10:15:11.693000 CVE-2023-29007,0,0,6967c114c24fb32b528360f8c2bd13687ae0d7da018ba5889c4873a5c0bd4eee,2024-06-26T10:15:11.693000
CVE-2023-29008,0,0,b31b8d56f85f48cbf0b9b3a51aee00f3630b09220d667a9927582d87a87b62a5,2023-11-07T04:11:00.297000 CVE-2023-29008,0,0,b31b8d56f85f48cbf0b9b3a51aee00f3630b09220d667a9927582d87a87b62a5,2023-11-07T04:11:00.297000
CVE-2023-29009,0,0,76ed46fb234b946eafc978236d3a8d3cafdd09aef1e8bfe44874515d765fcd41,2023-11-07T19:48:54.330000 CVE-2023-29009,0,0,76ed46fb234b946eafc978236d3a8d3cafdd09aef1e8bfe44874515d765fcd41,2023-11-07T19:48:54.330000
CVE-2023-2901,0,0,076b72f6b5bcf824bfc8d46d72397d17f860c9ab193bb85facecc1e0004feb53,2024-05-17T02:23:21.227000 CVE-2023-2901,0,0,076b72f6b5bcf824bfc8d46d72397d17f860c9ab193bb85facecc1e0004feb53,2024-05-17T02:23:21.227000
@ -241797,7 +241797,7 @@ CVE-2024-1390,0,0,71eb0c49e1915160a890c9df4d2040fa529dd6e699ca4bdcf3f6829a9c0e60
CVE-2024-1391,0,0,95159e2513e9127a66f6050cbc2679326245e87281e8aee9653919649cc97f74,2024-03-13T18:15:58.530000 CVE-2024-1391,0,0,95159e2513e9127a66f6050cbc2679326245e87281e8aee9653919649cc97f74,2024-03-13T18:15:58.530000
CVE-2024-1392,0,0,0948736f211221c32ddb432668205bccae67223b950d877ef11c76bff68a1c8f,2024-03-13T18:15:58.530000 CVE-2024-1392,0,0,0948736f211221c32ddb432668205bccae67223b950d877ef11c76bff68a1c8f,2024-03-13T18:15:58.530000
CVE-2024-1393,0,0,d7662d0cf4655f5dc37cac1727274e85c0d695350e85be99fa06d400366cbddc,2024-03-13T18:15:58.530000 CVE-2024-1393,0,0,d7662d0cf4655f5dc37cac1727274e85c0d695350e85be99fa06d400366cbddc,2024-03-13T18:15:58.530000
CVE-2024-1394,0,1,de36a3874a91298af40c37a23c5b85077a771f527ed1bc543f700ac43aeb4260,2024-06-26T11:15:51.163000 CVE-2024-1394,0,0,de36a3874a91298af40c37a23c5b85077a771f527ed1bc543f700ac43aeb4260,2024-06-26T11:15:51.163000
CVE-2024-1395,0,0,bc906c24f3b97a1f76fb28d9eb27a1438a7ca78483d0c0a7452e9b7efa2da958,2024-05-03T14:17:53.690000 CVE-2024-1395,0,0,bc906c24f3b97a1f76fb28d9eb27a1438a7ca78483d0c0a7452e9b7efa2da958,2024-05-03T14:17:53.690000
CVE-2024-1396,0,0,c2c7f8124754e0c20b02f3a3637cca1d95a3c2b253208efd7a2814f2d0550bd5,2024-05-02T18:00:37.360000 CVE-2024-1396,0,0,c2c7f8124754e0c20b02f3a3637cca1d95a3c2b253208efd7a2814f2d0550bd5,2024-05-02T18:00:37.360000
CVE-2024-1397,0,0,e6d8c9c2beca75d3fdc5f918cb423cf21913a9c807f46126d5b49c29c7bd60f0,2024-03-13T12:33:51.697000 CVE-2024-1397,0,0,e6d8c9c2beca75d3fdc5f918cb423cf21913a9c807f46126d5b49c29c7bd60f0,2024-03-13T12:33:51.697000
@ -243242,7 +243242,7 @@ CVE-2024-21517,0,0,186f90d2088e8e33683da894eb00f6f13b8f4ae5479bdad5267ce001807a5
CVE-2024-21518,0,0,83a4ac5f480325e602a67a8a1958abd8c4414c62288c5217c40c0680b80ab4b9,2024-06-24T19:56:14.723000 CVE-2024-21518,0,0,83a4ac5f480325e602a67a8a1958abd8c4414c62288c5217c40c0680b80ab4b9,2024-06-24T19:56:14.723000
CVE-2024-21519,0,0,99cb820000050c4a8347abec593294f82b25bdfbd4e4a3b0cc4286db32ec2098,2024-06-24T19:55:07.760000 CVE-2024-21519,0,0,99cb820000050c4a8347abec593294f82b25bdfbd4e4a3b0cc4286db32ec2098,2024-06-24T19:55:07.760000
CVE-2024-2152,0,0,3cc97618eb3606d7138054800fe4c9dd1b810706cf75a720e72d22a25acc79fd,2024-05-17T02:38:04.770000 CVE-2024-2152,0,0,3cc97618eb3606d7138054800fe4c9dd1b810706cf75a720e72d22a25acc79fd,2024-05-17T02:38:04.770000
CVE-2024-21520,0,0,766b14725ab03d27ef0363de8e54b3a1b2d0f37198ab6fad6c83bd0f65046707,2024-06-26T05:15:50.093000 CVE-2024-21520,0,1,719b2dc3254f707e72c103bbdbbe58152dcb2f4bbbb92f02a73b99a9ae3141f8,2024-06-26T12:44:29.693000
CVE-2024-2153,0,0,32d949763a8c44673b751742c2df9fc58704fdbb602a296b8827b8bcaaa1ed2f,2024-05-17T02:38:04.867000 CVE-2024-2153,0,0,32d949763a8c44673b751742c2df9fc58704fdbb602a296b8827b8bcaaa1ed2f,2024-05-17T02:38:04.867000
CVE-2024-2154,0,0,ad1f5443da5008cd83aa665fb0ec59294e0b766fedda6af927118b7949d4ad34,2024-05-17T02:38:04.970000 CVE-2024-2154,0,0,ad1f5443da5008cd83aa665fb0ec59294e0b766fedda6af927118b7949d4ad34,2024-05-17T02:38:04.970000
CVE-2024-2155,0,0,c86c3d15a9193973ee1ceda0debbe4aef69c0b1f1d6389239087d9ae6543935d,2024-05-17T02:38:05.063000 CVE-2024-2155,0,0,c86c3d15a9193973ee1ceda0debbe4aef69c0b1f1d6389239087d9ae6543935d,2024-05-17T02:38:05.063000
@ -243359,10 +243359,10 @@ CVE-2024-21735,0,0,ed6afe70db786b939f8ed329719d7a86e59b6c7dfc9686233e59aea2f49a2
CVE-2024-21736,0,0,dc3c8ab8b5a3b98fcdc115679aceff92a81f74174ec4a57f3b3675e6b7bcb197,2024-01-19T17:30:01.407000 CVE-2024-21736,0,0,dc3c8ab8b5a3b98fcdc115679aceff92a81f74174ec4a57f3b3675e6b7bcb197,2024-01-19T17:30:01.407000
CVE-2024-21737,0,0,a90af93e6af88ab1e63750439f8a51408da352f40c4dd8d5d341f3011c62bce3,2024-01-16T17:45:47.083000 CVE-2024-21737,0,0,a90af93e6af88ab1e63750439f8a51408da352f40c4dd8d5d341f3011c62bce3,2024-01-16T17:45:47.083000
CVE-2024-21738,0,0,278c1bdd65ae1ef741a29fb166b2b284a0905063e85efd5ce35f4fc963819f3a,2024-01-11T22:54:02.190000 CVE-2024-21738,0,0,278c1bdd65ae1ef741a29fb166b2b284a0905063e85efd5ce35f4fc963819f3a,2024-01-11T22:54:02.190000
CVE-2024-21739,0,0,50561082e07c8797b84e5a4c234482ef4cd4dc89d69f70f90c67982df959d956,2024-06-25T21:15:57.007000 CVE-2024-21739,0,1,07f93ee1de6db4cd150e8044f6df8dfeec5c0df6671390dcd392c083d70bdcb1,2024-06-26T12:44:29.693000
CVE-2024-2174,0,0,02677fb92d9ec9e938d433dc80bb7dba037bdfac0e28c902361565b03794253f,2024-03-23T03:15:12.243000 CVE-2024-2174,0,0,02677fb92d9ec9e938d433dc80bb7dba037bdfac0e28c902361565b03794253f,2024-03-23T03:15:12.243000
CVE-2024-21740,0,0,bb493b9fa1141f25eee369efc251a9d7298c641ad9bfd0dea360580582b45c4f,2024-06-25T21:15:57.190000 CVE-2024-21740,0,1,80331fbcb4933bf7f4b07b3e6c688ccc6372ad93a7d99105a5d11a968ea5fbe7,2024-06-26T12:44:29.693000
CVE-2024-21741,0,0,2edc34ea0a15d21b2d574ccd0733ef38ee5f1827ca3017cbc8e641dc8764a958,2024-06-25T21:15:57.357000 CVE-2024-21741,0,1,d2196869594799b3d3a519e07d5725cef751911c38e7ad74939dddf42da7bb29,2024-06-26T12:44:29.693000
CVE-2024-21742,0,0,f05425c22b68eed9b18152111fdcbba099b7d5c68b9f0b2090a8077e4941bea6,2024-02-29T01:44:04.040000 CVE-2024-21742,0,0,f05425c22b68eed9b18152111fdcbba099b7d5c68b9f0b2090a8077e4941bea6,2024-02-29T01:44:04.040000
CVE-2024-21744,0,0,75da6a88047b7dd10fd2808157b826b0359816427c478b970c1329b6cad90830,2024-01-11T18:45:53.040000 CVE-2024-21744,0,0,75da6a88047b7dd10fd2808157b826b0359816427c478b970c1329b6cad90830,2024-01-11T18:45:53.040000
CVE-2024-21745,0,0,bf3a505c3e58c8e06145ffd7ba2bd556421c95bc4b61cb5874ba3a8a81e74cc4,2024-01-11T18:45:19.053000 CVE-2024-21745,0,0,bf3a505c3e58c8e06145ffd7ba2bd556421c95bc4b61cb5874ba3a8a81e74cc4,2024-01-11T18:45:19.053000
@ -245123,7 +245123,7 @@ CVE-2024-24760,0,0,594ada425d15a322e3f99c422c4b0f972382ba4b06e7c8a0c717620b32aab
CVE-2024-24761,0,0,f5eac0618ee154794d07ce4f478624bae3215db8694682143ff6dbdc5db1e3ca,2024-03-06T21:42:48.053000 CVE-2024-24761,0,0,f5eac0618ee154794d07ce4f478624bae3215db8694682143ff6dbdc5db1e3ca,2024-03-06T21:42:48.053000
CVE-2024-24762,0,0,a7cf7384426b8870b434de7e00d3a1d16f7b399a4804ad1be81b6ff5f0245082,2024-02-17T02:15:52.700000 CVE-2024-24762,0,0,a7cf7384426b8870b434de7e00d3a1d16f7b399a4804ad1be81b6ff5f0245082,2024-02-17T02:15:52.700000
CVE-2024-24763,0,0,d3d10c4404a25ab91ba5900f9f4433bf2e3db86ddd4c01b5399c2cabfe532355,2024-02-20T19:50:53.960000 CVE-2024-24763,0,0,d3d10c4404a25ab91ba5900f9f4433bf2e3db86ddd4c01b5399c2cabfe532355,2024-02-20T19:50:53.960000
CVE-2024-24764,0,0,358fa806be83c92f23415e242070c610d8f46dbce823244e974f49980a7f8da3,2024-06-26T01:15:47.890000 CVE-2024-24764,0,1,a6d0fb533519fe852d722fe8020356774ed6802154fe41d14b3389eb1a3b4fd4,2024-06-26T12:44:29.693000
CVE-2024-24765,0,0,d4e092e03ff38847b8fb4953a3b2c4b9c1a3da8cedc2236971507409fb416552,2024-03-06T21:42:48.053000 CVE-2024-24765,0,0,d4e092e03ff38847b8fb4953a3b2c4b9c1a3da8cedc2236971507409fb416552,2024-03-06T21:42:48.053000
CVE-2024-24766,0,0,f87e50a4000cb92af6a7930ee1d7171e8e2a69d0d8f8e017d8f56fc485535257,2024-03-06T21:42:48.053000 CVE-2024-24766,0,0,f87e50a4000cb92af6a7930ee1d7171e8e2a69d0d8f8e017d8f56fc485535257,2024-03-06T21:42:48.053000
CVE-2024-24767,0,0,ea24984314aeb3ff2151e28966f94b67d2b6ccb20d9e7417a6389a5c24bcc1ed,2024-03-06T21:42:48.053000 CVE-2024-24767,0,0,ea24984314aeb3ff2151e28966f94b67d2b6ccb20d9e7417a6389a5c24bcc1ed,2024-03-06T21:42:48.053000
@ -247401,7 +247401,7 @@ CVE-2024-27852,0,0,2264a1594190812a9b29fc0e3f886882ab3c63c917f94e71ed2dc96c8e6c2
CVE-2024-27855,0,0,7a41b8238436a46025b45552c8cda3356564589cbbf3b4bae7d5eb20d8672a8c,2024-06-11T13:54:12.057000 CVE-2024-27855,0,0,7a41b8238436a46025b45552c8cda3356564589cbbf3b4bae7d5eb20d8672a8c,2024-06-11T13:54:12.057000
CVE-2024-27857,0,0,803d8efe7bb49cf3c18a557e9bdcd3fe89c30050e4113fcd0f030929c76c160d,2024-06-12T04:15:12.663000 CVE-2024-27857,0,0,803d8efe7bb49cf3c18a557e9bdcd3fe89c30050e4113fcd0f030929c76c160d,2024-06-12T04:15:12.663000
CVE-2024-2786,0,0,dcf647d15f4b220698a959a93f7a5cdfd4a7ecd495ee9aa1ef69052001df8b00,2024-04-10T13:23:38.787000 CVE-2024-2786,0,0,dcf647d15f4b220698a959a93f7a5cdfd4a7ecd495ee9aa1ef69052001df8b00,2024-04-10T13:23:38.787000
CVE-2024-27867,0,0,91270cd124799f1f9f06f9ca436483d490e2ee8271ba3cd258a23502983b916d,2024-06-26T04:15:11.637000 CVE-2024-27867,0,1,929b60a50faac760812cfff090aaa2b01b31cf8cfca2ab2ec6bdf5a9e5f514fb,2024-06-26T12:44:29.693000
CVE-2024-2787,0,0,496195d9f69f32f0c6a6baaf1ee3e4e62db7dfd0c17c88d9010b922be319ee45,2024-04-10T13:23:38.787000 CVE-2024-2787,0,0,496195d9f69f32f0c6a6baaf1ee3e4e62db7dfd0c17c88d9010b922be319ee45,2024-04-10T13:23:38.787000
CVE-2024-2788,0,0,088d65d193232fcb72b866e8c41bac364578345792bee984e7ddfd9f7a9953b9,2024-04-10T13:23:38.787000 CVE-2024-2788,0,0,088d65d193232fcb72b866e8c41bac364578345792bee984e7ddfd9f7a9953b9,2024-04-10T13:23:38.787000
CVE-2024-27885,0,0,c59de475c576c44e129a9e58b8769caffc1b189d40a0172434b38c39f1ec2eb6,2024-06-11T13:54:12.057000 CVE-2024-27885,0,0,c59de475c576c44e129a9e58b8769caffc1b189d40a0172434b38c39f1ec2eb6,2024-06-11T13:54:12.057000
@ -247941,7 +247941,7 @@ CVE-2024-28824,0,0,5a9476ae0fdb0520e3a986c832f5f9e27a50da5cb3aa11e06910544296f0e
CVE-2024-28825,0,0,9e6f2228e06896e59bb560ffc81c60a9a09c25eeaded2122eaaaf9d670949d13,2024-04-24T13:39:42.883000 CVE-2024-28825,0,0,9e6f2228e06896e59bb560ffc81c60a9a09c25eeaded2122eaaaf9d670949d13,2024-04-24T13:39:42.883000
CVE-2024-28826,0,0,af714d67b245e2002324726263b60e676423e9fa16954adb4190fa57b660a93f,2024-05-29T13:02:09.280000 CVE-2024-28826,0,0,af714d67b245e2002324726263b60e676423e9fa16954adb4190fa57b660a93f,2024-05-29T13:02:09.280000
CVE-2024-2883,0,0,e66be81816608580e2e81ffcb02cca4ae9a2aa5cbea60907cc2e1d80cffbaf4a,2024-03-29T04:15:08.743000 CVE-2024-2883,0,0,e66be81816608580e2e81ffcb02cca4ae9a2aa5cbea60907cc2e1d80cffbaf4a,2024-03-29T04:15:08.743000
CVE-2024-28830,0,0,b631bc8d126de4a695f850828988431fd36fe3645eefa950646d377d9d34ae30,2024-06-26T08:15:09.630000 CVE-2024-28830,0,1,0345769512c8d0617caa5313f559fdb9de7066aaa2f880b3d0fe2b7aa28290e3,2024-06-26T12:44:29.693000
CVE-2024-28831,0,0,53daadc6768590b1e9dcc34c033a018728a5349f5fb865309e9216560e5790eb,2024-06-25T12:24:17.873000 CVE-2024-28831,0,0,53daadc6768590b1e9dcc34c033a018728a5349f5fb865309e9216560e5790eb,2024-06-25T12:24:17.873000
CVE-2024-28832,0,0,e20e133fb158c153d5c99472d0490b974e0599ab693822dcae94c1e3de7df5f9,2024-06-25T12:24:17.873000 CVE-2024-28832,0,0,e20e133fb158c153d5c99472d0490b974e0599ab693822dcae94c1e3de7df5f9,2024-06-25T12:24:17.873000
CVE-2024-28833,0,0,c28d0621123671b94853f5763fc92ce8098ea4f6621d0443f950677dd9d3b57a,2024-06-12T17:53:57.103000 CVE-2024-28833,0,0,c28d0621123671b94853f5763fc92ce8098ea4f6621d0443f950677dd9d3b57a,2024-06-12T17:53:57.103000
@ -248055,7 +248055,7 @@ CVE-2024-28969,0,0,0d46f305bfcdd2aeb8896dc74821c5d2eeb84b39b3a56a357f2be0e0423a2
CVE-2024-2897,0,0,0e1e1d677ec9e72b6995e546603f98ab77935f85885a6483b68b217559eb34fe,2024-06-04T19:19:19.267000 CVE-2024-2897,0,0,0e1e1d677ec9e72b6995e546603f98ab77935f85885a6483b68b217559eb34fe,2024-06-04T19:19:19.267000
CVE-2024-28970,0,0,5bffd12458b221b41ea3b33f5f0020bc2e9dc510db5d065982a4e953584ee03e,2024-06-13T18:36:09.013000 CVE-2024-28970,0,0,5bffd12458b221b41ea3b33f5f0020bc2e9dc510db5d065982a4e953584ee03e,2024-06-13T18:36:09.013000
CVE-2024-28971,0,0,5cc2a2bfd21b51036452ce03834ca76b5f458ae1e1ea0b2042ea0e7434d790f7,2024-05-08T17:05:24.083000 CVE-2024-28971,0,0,5cc2a2bfd21b51036452ce03834ca76b5f458ae1e1ea0b2042ea0e7434d790f7,2024-05-08T17:05:24.083000
CVE-2024-28973,0,0,019da7517e327021608351b5a638e3160a21874ff261df61863b1e7e8695d0e9,2024-06-26T03:15:09.640000 CVE-2024-28973,0,1,445fd7711088b55e40e2b43795308674dff1c80005d024ab722ae827c4a8703a,2024-06-26T12:44:29.693000
CVE-2024-28974,0,0,81a5bba2a762d0674b42f5cdf64af2db18e6b20fdc63a42838587e31bbd76d2a,2024-05-29T19:50:25.303000 CVE-2024-28974,0,0,81a5bba2a762d0674b42f5cdf64af2db18e6b20fdc63a42838587e31bbd76d2a,2024-05-29T19:50:25.303000
CVE-2024-28976,0,0,224761c00a34a63d518e2df17d9e4e0dcdf6133206e4a1c859d89e6d8634ce80,2024-04-24T13:39:42.883000 CVE-2024-28976,0,0,224761c00a34a63d518e2df17d9e4e0dcdf6133206e4a1c859d89e6d8634ce80,2024-04-24T13:39:42.883000
CVE-2024-28977,0,0,10444a4b4519bac5d968aeb163eaf3f249ecc5460e5b7c0067db957ce6a37f95,2024-04-24T13:39:42.883000 CVE-2024-28977,0,0,10444a4b4519bac5d968aeb163eaf3f249ecc5460e5b7c0067db957ce6a37f95,2024-04-24T13:39:42.883000
@ -248216,11 +248216,11 @@ CVE-2024-29168,0,0,55eaa2f8aa34951f2678d17cd09a8762011ab04d052991a6497f1ac90304a
CVE-2024-29169,0,0,a02805aa944e613162d66dc748a6a46569f5a7dce5956826de0d7f8e99e21193,2024-06-13T18:35:19.777000 CVE-2024-29169,0,0,a02805aa944e613162d66dc748a6a46569f5a7dce5956826de0d7f8e99e21193,2024-06-13T18:35:19.777000
CVE-2024-2917,0,0,738b9419e321262581cbcbc36e60bc25c85f82bd40a8ab12d5b727ad6cc0972c,2024-05-17T02:38:37.297000 CVE-2024-2917,0,0,738b9419e321262581cbcbc36e60bc25c85f82bd40a8ab12d5b727ad6cc0972c,2024-05-17T02:38:37.297000
CVE-2024-29170,0,0,3a6ff2257b9f972ea2c611b834271a3e0fac88ad6ff708b8c384b495ffa37bbe,2024-06-04T16:57:41.053000 CVE-2024-29170,0,0,3a6ff2257b9f972ea2c611b834271a3e0fac88ad6ff708b8c384b495ffa37bbe,2024-06-04T16:57:41.053000
CVE-2024-29173,0,0,70ac3ac13a35e920798411569a961af5d7a25a998965a99bd2b5593d3c9e47f7,2024-06-26T03:15:09.877000 CVE-2024-29173,0,1,7834c8352c9984126ce7ef4158fbeb815c062c8fc3f1eb7ec698c2f25391dde6,2024-06-26T12:44:29.693000
CVE-2024-29174,0,0,83c5e25972461137ca31b78634820d90b2d6efc155fad75b729798a6a5fe7a54,2024-06-26T03:15:10.100000 CVE-2024-29174,0,1,791dcbeb3e5c58908c6b471dbc46dd56ea357e942a054a530a4a33bd2c338139,2024-06-26T12:44:29.693000
CVE-2024-29175,0,0,b3316a8b97b3f488995898ec0279c25cfc91fae25f16ae4a9f6526a9a7820d75,2024-06-26T03:15:10.303000 CVE-2024-29175,0,1,8a1ec4e0b66f906bd9dfc20b98e8d022bb9c64ca265b8159a008184078816fd1,2024-06-26T12:44:29.693000
CVE-2024-29176,0,0,2f9347f0ac00905d49db00a36d30ed218368df9ff0343519594aebcd7c856c14,2024-06-26T03:15:10.533000 CVE-2024-29176,0,1,ecdaddfdd54fc9e866b0e67eba85f428b40c26f7734eff114138f662219bf9be,2024-06-26T12:44:29.693000
CVE-2024-29177,0,0,1ec7e1f5d6388a26840fbe486fd2ecde2fcf68752fda0647ca97ee4e253d21cd,2024-06-26T03:15:10.767000 CVE-2024-29177,0,1,7dca2d4debfdfc22017c620f610b7387ec04f0380acf479af526a5cd6f2648f9,2024-06-26T12:44:29.693000
CVE-2024-29179,0,0,f19d4d0a9f8b6dc85e6e021ab22950c73dd30b1b16e940f3cfc8d8b6deab42d4,2024-03-26T12:55:05.010000 CVE-2024-29179,0,0,f19d4d0a9f8b6dc85e6e021ab22950c73dd30b1b16e940f3cfc8d8b6deab42d4,2024-03-26T12:55:05.010000
CVE-2024-2918,0,0,ce50c7c24dc6b969578ed47f388645920a5e5c8ad0b49917ec2e7ecd8d9606ee,2024-04-10T13:23:38.787000 CVE-2024-2918,0,0,ce50c7c24dc6b969578ed47f388645920a5e5c8ad0b49917ec2e7ecd8d9606ee,2024-04-10T13:23:38.787000
CVE-2024-29180,0,0,41debf5c02b25447b090e1fe17310ae2918a3e33749dbf7033ce058b1311f912,2024-03-21T19:47:03.943000 CVE-2024-29180,0,0,41debf5c02b25447b090e1fe17310ae2918a3e33749dbf7033ce058b1311f912,2024-03-21T19:47:03.943000
@ -248636,8 +248636,8 @@ CVE-2024-2995,0,0,89218e2c0ab16118b6716e42dcc7ae77885e1ea2436151ccfacfbce504d640
CVE-2024-29950,0,0,59d0dc7b41788e98cd313b2897de3b183cd3675df6f723ff671afe20bfa20432,2024-04-17T20:08:21.887000 CVE-2024-29950,0,0,59d0dc7b41788e98cd313b2897de3b183cd3675df6f723ff671afe20bfa20432,2024-04-17T20:08:21.887000
CVE-2024-29951,0,0,6925a52af5105d475e345d844926848365b048c62a2d3f697034b8967d354270,2024-04-18T13:04:28.900000 CVE-2024-29951,0,0,6925a52af5105d475e345d844926848365b048c62a2d3f697034b8967d354270,2024-04-18T13:04:28.900000
CVE-2024-29952,0,0,a080202dc3806a65e4bf2066cba6f0509ab2487b03cc3575d217fb6ebe9d555c,2024-04-18T13:04:28.900000 CVE-2024-29952,0,0,a080202dc3806a65e4bf2066cba6f0509ab2487b03cc3575d217fb6ebe9d555c,2024-04-18T13:04:28.900000
CVE-2024-29953,0,0,53abb4f1851313c37b2d9a4448fd162901f9a7ffbb5b547dac637f5f7dae2927,2024-06-26T00:15:10.030000 CVE-2024-29953,0,1,9b5223d55561286edec0e5b1b9b056c61664f03bc59e7de27ececd1d03107e0e,2024-06-26T12:44:29.693000
CVE-2024-29954,0,0,4315c5b9aa34cf656b0628f5ac2caae585635d7b9fcf2699b58b96c3e237d362,2024-06-26T00:15:10.263000 CVE-2024-29954,0,1,41f643b3f302d9e334ed2a22e7bdee669cdaa767dd4d736fe6a0ad665bdbfe78,2024-06-26T12:44:29.693000
CVE-2024-29955,0,0,47a53812514a7578906cfe4f12e13f4ef474d0421763eaa923aee25ceff7b533,2024-04-18T13:04:28.900000 CVE-2024-29955,0,0,47a53812514a7578906cfe4f12e13f4ef474d0421763eaa923aee25ceff7b533,2024-04-18T13:04:28.900000
CVE-2024-29956,0,0,126826bc7262b3fd52d7ec8c2ab9f240aff208f37ad9157a7c1a3fe5fe08dca2,2024-04-18T13:04:28.900000 CVE-2024-29956,0,0,126826bc7262b3fd52d7ec8c2ab9f240aff208f37ad9157a7c1a3fe5fe08dca2,2024-04-18T13:04:28.900000
CVE-2024-29957,0,0,fecc998428c3db04062cf2ac371ef979be5cd87fa510b5833cc1b2291494a722,2024-04-19T13:10:25.637000 CVE-2024-29957,0,0,fecc998428c3db04062cf2ac371ef979be5cd87fa510b5833cc1b2291494a722,2024-04-19T13:10:25.637000
@ -248789,7 +248789,7 @@ CVE-2024-30103,0,0,e9b11315180cc2be70516f393013c4d68dd205d4a54691a3e15d1cbe00247
CVE-2024-30104,0,0,5a9d1985e988cec27229a284222c230de4fd29fc24d0330a38548721a0729d9d,2024-06-20T17:27:01.447000 CVE-2024-30104,0,0,5a9d1985e988cec27229a284222c230de4fd29fc24d0330a38548721a0729d9d,2024-06-20T17:27:01.447000
CVE-2024-30107,0,0,7e9f39013645f69ffc09f932047c5fded8481e31de256075b8ab56490f9048bd,2024-04-19T13:10:25.637000 CVE-2024-30107,0,0,7e9f39013645f69ffc09f932047c5fded8481e31de256075b8ab56490f9048bd,2024-04-19T13:10:25.637000
CVE-2024-3011,0,0,1567706f33ba4a3729190a5acfa17d903c76e23445fbf38d371926fb70a5af71,2024-05-17T02:39:40.533000 CVE-2024-3011,0,0,1567706f33ba4a3729190a5acfa17d903c76e23445fbf38d371926fb70a5af71,2024-05-17T02:39:40.533000
CVE-2024-30112,0,0,c0e5546ba904304918e40279a9198340589b4e9b62d105f08498c0db16fb4497,2024-06-25T22:15:30.117000 CVE-2024-30112,0,1,7776e48af0349613d262d23e79d54eaf55862c79c613ef95710a33f68285b593,2024-06-26T12:44:29.693000
CVE-2024-30119,0,0,faff61cb55bb1e1c818b9460a2a056f4c8970e03380dd9d518774564c9b27a5c,2024-06-17T12:42:04.623000 CVE-2024-30119,0,0,faff61cb55bb1e1c818b9460a2a056f4c8970e03380dd9d518774564c9b27a5c,2024-06-17T12:42:04.623000
CVE-2024-3012,0,0,3d13067eee5369169a098d5c023f7c1a68bff1bb4361076791d74ce86fdf610f,2024-05-17T02:39:40.620000 CVE-2024-3012,0,0,3d13067eee5369169a098d5c023f7c1a68bff1bb4361076791d74ce86fdf610f,2024-05-17T02:39:40.620000
CVE-2024-30120,0,0,e36717a45c134ce96ee2f16d093d8717c8dcca8c5bf419fdf3e6a16688a2f2e7,2024-06-17T12:42:04.623000 CVE-2024-30120,0,0,e36717a45c134ce96ee2f16d093d8717c8dcca8c5bf419fdf3e6a16688a2f2e7,2024-06-17T12:42:04.623000
@ -249389,7 +249389,7 @@ CVE-2024-30927,0,0,7f5fb9dbb74187186c12e2f8edd52380a2fe14d4923fe303fe1e826ee9046
CVE-2024-30928,0,0,caf910b47d65799a57161146e34602829f47360642a8c8fe911c2d8ad140dddb,2024-04-19T13:10:25.637000 CVE-2024-30928,0,0,caf910b47d65799a57161146e34602829f47360642a8c8fe911c2d8ad140dddb,2024-04-19T13:10:25.637000
CVE-2024-30929,0,0,3a4b987ba39620a2fa553421d0680484415e43d1909ca51832f180e76c2d2d0f,2024-04-19T13:10:25.637000 CVE-2024-30929,0,0,3a4b987ba39620a2fa553421d0680484415e43d1909ca51832f180e76c2d2d0f,2024-04-19T13:10:25.637000
CVE-2024-3093,0,0,88e99931e3bb45e3b00bfc123293a0bff2319b704247b4d251e357b27062aff3,2024-05-07T13:15:48.260000 CVE-2024-3093,0,0,88e99931e3bb45e3b00bfc123293a0bff2319b704247b4d251e357b27062aff3,2024-05-07T13:15:48.260000
CVE-2024-30931,0,0,112aee0fe69ce5368891c98cc4fa993fd79532c2ab60bcc12bcbd0eae1220f2f,2024-06-25T22:15:30.313000 CVE-2024-30931,0,1,c336f970cb863df7d55794c1c1216e535d9fa98cb01a6ae24e794a0505fdb1d1,2024-06-26T12:44:29.693000
CVE-2024-30938,0,0,bb3c87898373ca38f4e6504fd7f34baf274fe16334abf7626317b091c9072986,2024-04-19T13:10:25.637000 CVE-2024-30938,0,0,bb3c87898373ca38f4e6504fd7f34baf274fe16334abf7626317b091c9072986,2024-04-19T13:10:25.637000
CVE-2024-30939,0,0,2c9741729607a2e80601d31a316dfe5a77e488a194c61c09d029bf2778d383d7,2024-04-26T12:58:17.720000 CVE-2024-30939,0,0,2c9741729607a2e80601d31a316dfe5a77e488a194c61c09d029bf2778d383d7,2024-04-26T12:58:17.720000
CVE-2024-3094,0,0,8ed23f1232ed36fe384d7a52f468b21b74026ccef3e50e7fa1460af68654fd3b,2024-05-01T19:15:27.340000 CVE-2024-3094,0,0,8ed23f1232ed36fe384d7a52f468b21b74026ccef3e50e7fa1460af68654fd3b,2024-05-01T19:15:27.340000
@ -250023,9 +250023,9 @@ CVE-2024-31999,0,0,92063baa188f8d1eb46101bed0277138de32335b249687b065a40c476ebda
CVE-2024-3200,0,0,50eee4824af89335680b4f427188be74af85a435ac22ce60b4280b3fd9f3aff7,2024-06-03T14:46:24.250000 CVE-2024-3200,0,0,50eee4824af89335680b4f427188be74af85a435ac22ce60b4280b3fd9f3aff7,2024-06-03T14:46:24.250000
CVE-2024-32000,0,0,5a1773951b9e4056d222ee9010995a856338856d61b3ccc3a9db5455d3c02bfb,2024-04-15T13:15:31.997000 CVE-2024-32000,0,0,5a1773951b9e4056d222ee9010995a856338856d61b3ccc3a9db5455d3c02bfb,2024-04-15T13:15:31.997000
CVE-2024-32001,0,0,5f137f0e0d607eeec96c185575fc4489622e4c58e021858f7aee0551fd5f0547,2024-04-11T12:47:44.137000 CVE-2024-32001,0,0,5f137f0e0d607eeec96c185575fc4489622e4c58e021858f7aee0551fd5f0547,2024-04-11T12:47:44.137000
CVE-2024-32002,0,1,f2760ce11775d7216bc2d3aa4e32bd74a65a2db6c8e667c788c1f08052241b93,2024-06-26T10:15:11.863000 CVE-2024-32002,0,0,f2760ce11775d7216bc2d3aa4e32bd74a65a2db6c8e667c788c1f08052241b93,2024-06-26T10:15:11.863000
CVE-2024-32003,0,0,8e8c8d945f0ee0a518068e981d0cc584a07044ae728a9a77ce2d918bc43c232f,2024-04-15T13:15:31.997000 CVE-2024-32003,0,0,8e8c8d945f0ee0a518068e981d0cc584a07044ae728a9a77ce2d918bc43c232f,2024-04-15T13:15:31.997000
CVE-2024-32004,0,1,4beb054e63081ab40bdb206eb93e7d01eb696e33760b81eee8a1eb63de5f2f3c,2024-06-26T10:15:12.050000 CVE-2024-32004,0,0,4beb054e63081ab40bdb206eb93e7d01eb696e33760b81eee8a1eb63de5f2f3c,2024-06-26T10:15:12.050000
CVE-2024-32005,0,0,67300e4989f99e2e013d8397bc4806c53fe7ab524173b29e08f1814aa041fd14,2024-04-15T13:15:31.997000 CVE-2024-32005,0,0,67300e4989f99e2e013d8397bc4806c53fe7ab524173b29e08f1814aa041fd14,2024-04-15T13:15:31.997000
CVE-2024-3201,0,0,44e60b8f4dad0313de170a06bda14135e6a023e53a6317170e365451385b7999,2024-05-24T01:15:30.977000 CVE-2024-3201,0,0,44e60b8f4dad0313de170a06bda14135e6a023e53a6317170e365451385b7999,2024-05-24T01:15:30.977000
CVE-2024-32017,0,0,c59472fff1ac3380592aadc3ec53fc745f88f8e2f34d8c3b8730814392c43e11,2024-06-10T18:15:31.880000 CVE-2024-32017,0,0,c59472fff1ac3380592aadc3ec53fc745f88f8e2f34d8c3b8730814392c43e11,2024-06-10T18:15:31.880000
@ -250033,7 +250033,7 @@ CVE-2024-32018,0,0,c61269c0254937eeac93c2ade0a2a69eed9a0e0a19698d0aa2ae8836ebc41
CVE-2024-32019,0,0,7d17b262f48d84e5d46deb667dc18694c73147c4bad7ea42fd1b388af87a63d3,2024-04-15T13:15:31.997000 CVE-2024-32019,0,0,7d17b262f48d84e5d46deb667dc18694c73147c4bad7ea42fd1b388af87a63d3,2024-04-15T13:15:31.997000
CVE-2024-3202,0,0,961fed9fa99528aad4565c46d792af48cf7cf4de9e528a65e42986bbd026d3c2,2024-05-17T02:39:46.577000 CVE-2024-3202,0,0,961fed9fa99528aad4565c46d792af48cf7cf4de9e528a65e42986bbd026d3c2,2024-05-17T02:39:46.577000
CVE-2024-32020,0,0,f2c71ac565b9f08fa1f1d90a62847c701e796fa277fbcea1cbaca687b305ff5d,2024-06-10T18:15:32.080000 CVE-2024-32020,0,0,f2c71ac565b9f08fa1f1d90a62847c701e796fa277fbcea1cbaca687b305ff5d,2024-06-10T18:15:32.080000
CVE-2024-32021,0,1,7dff6f8d8e1a4d7fc2d76dbbb4d0e044f98278ef9f9c8a6728b7047a40acd852,2024-06-26T10:15:12.167000 CVE-2024-32021,0,0,7dff6f8d8e1a4d7fc2d76dbbb4d0e044f98278ef9f9c8a6728b7047a40acd852,2024-06-26T10:15:12.167000
CVE-2024-32022,0,0,83ce972a62cb0d496d93021f959db1a9c7d93bf991779ee98a131d07725482e2,2024-04-19T16:15:10.533000 CVE-2024-32022,0,0,83ce972a62cb0d496d93021f959db1a9c7d93bf991779ee98a131d07725482e2,2024-04-19T16:15:10.533000
CVE-2024-32023,0,0,adb78947d782fcb7041c1fc7768e7f3d3c9be214fb8ab1e71bb129805ba1aaf5,2024-04-19T16:15:10.607000 CVE-2024-32023,0,0,adb78947d782fcb7041c1fc7768e7f3d3c9be214fb8ab1e71bb129805ba1aaf5,2024-04-19T16:15:10.607000
CVE-2024-32024,0,0,02bb672a3ecdc1cc89be08499a8d52a34fd79fba894d179733ab551e6c2e5746,2024-04-19T16:15:10.680000 CVE-2024-32024,0,0,02bb672a3ecdc1cc89be08499a8d52a34fd79fba894d179733ab551e6c2e5746,2024-04-19T16:15:10.680000
@ -250287,7 +250287,7 @@ CVE-2024-32461,0,0,3941d8bd271b020582637450c6381a991de4b9ffa39f4db030841834b9e2a
CVE-2024-32462,0,0,5d7e199d9ef87a9ead0aaa6e45da944ead2c54f7c8bd33536b92a885a6b7e6b3,2024-05-01T18:15:24.140000 CVE-2024-32462,0,0,5d7e199d9ef87a9ead0aaa6e45da944ead2c54f7c8bd33536b92a885a6b7e6b3,2024-05-01T18:15:24.140000
CVE-2024-32463,0,0,1671e195c4973ac11a31a2856358d6fb78fc6f39ffe0d1d851cfbba7a397b723,2024-04-17T16:51:07.347000 CVE-2024-32463,0,0,1671e195c4973ac11a31a2856358d6fb78fc6f39ffe0d1d851cfbba7a397b723,2024-04-17T16:51:07.347000
CVE-2024-32464,0,0,d64afe641f7795bed40e9f07611c1dfe8212b69350ddb9db2c6c76fe5f6eb6dc,2024-06-11T15:24:13.467000 CVE-2024-32464,0,0,d64afe641f7795bed40e9f07611c1dfe8212b69350ddb9db2c6c76fe5f6eb6dc,2024-06-11T15:24:13.467000
CVE-2024-32465,0,1,de49c4bc3569bd8fc526b2ed90be14380d3f0af6ad16131814b913b625e310fd,2024-06-26T10:15:12.280000 CVE-2024-32465,0,0,de49c4bc3569bd8fc526b2ed90be14380d3f0af6ad16131814b913b625e310fd,2024-06-26T10:15:12.280000
CVE-2024-32466,0,0,db7f064bb346349536bc1029a9138c718e3a99de40435ac8076a2153a72d304b,2024-04-18T18:25:55.267000 CVE-2024-32466,0,0,db7f064bb346349536bc1029a9138c718e3a99de40435ac8076a2153a72d304b,2024-04-18T18:25:55.267000
CVE-2024-32467,0,0,c3595d52e60c3fa31f1ede27ca8549a3938c2ca59fe6ab3708d95e8b6d1a0b5d,2024-04-25T17:24:59.967000 CVE-2024-32467,0,0,c3595d52e60c3fa31f1ede27ca8549a3938c2ca59fe6ab3708d95e8b6d1a0b5d,2024-04-25T17:24:59.967000
CVE-2024-3247,0,0,095afc187e8f976bc1a2eaa79a4c0328aa3c3e2487a10203585d8616775f8a4d,2024-04-03T12:38:04.840000 CVE-2024-3247,0,0,095afc187e8f976bc1a2eaa79a4c0328aa3c3e2487a10203585d8616775f8a4d,2024-04-03T12:38:04.840000
@ -251499,7 +251499,7 @@ CVE-2024-34393,0,0,3bc65dc02de347dab9aa9145e771abb692c039ee73fb6fb4a908e37504bcc
CVE-2024-34394,0,0,dd84e5afccd36638fa1005749183a9abcd7d4326df580dc45135f744820792df,2024-05-03T12:50:34.250000 CVE-2024-34394,0,0,dd84e5afccd36638fa1005749183a9abcd7d4326df580dc45135f744820792df,2024-05-03T12:50:34.250000
CVE-2024-34397,0,0,70854b1ad6ab06679e1af787bf84a8a6de29444e6873fb72f86f5216cc743817,2024-06-10T18:15:34.863000 CVE-2024-34397,0,0,70854b1ad6ab06679e1af787bf84a8a6de29444e6873fb72f86f5216cc743817,2024-06-10T18:15:34.863000
CVE-2024-3440,0,0,b6e021f0a39374e5963047ffe0e563b4f8644f79c10282228c1df76f022468ec,2024-05-17T02:39:56.370000 CVE-2024-3440,0,0,b6e021f0a39374e5963047ffe0e563b4f8644f79c10282228c1df76f022468ec,2024-05-17T02:39:56.370000
CVE-2024-34400,0,0,dbd48dfab68c06d0f74745fe02d891b979d943426f98fe747ff7d5c3d9706189,2024-06-25T21:15:59.090000 CVE-2024-34400,0,1,e8519dd13fbf5464c7676c8cf94fdad109e7bb0206ce725dc62d2fd8b95ef432,2024-06-26T12:44:29.693000
CVE-2024-34401,0,0,0cfb896ccce711bbc7db6c4bbd385298b085bc508f7ecdead1ed17bc160057da,2024-05-03T12:50:34.250000 CVE-2024-34401,0,0,0cfb896ccce711bbc7db6c4bbd385298b085bc508f7ecdead1ed17bc160057da,2024-05-03T12:50:34.250000
CVE-2024-34402,0,0,07f2f76782d12e6f122a9b732cd1dd6fe7d9eda4cbe8011f65dcaa034c10eae3,2024-06-10T17:16:29.087000 CVE-2024-34402,0,0,07f2f76782d12e6f122a9b732cd1dd6fe7d9eda4cbe8011f65dcaa034c10eae3,2024-06-10T17:16:29.087000
CVE-2024-34403,0,0,b827cf042756a5c1d96ff977631d7c263d5dd53378a344d1a81844f92201b89b,2024-06-10T17:16:29.170000 CVE-2024-34403,0,0,b827cf042756a5c1d96ff977631d7c263d5dd53378a344d1a81844f92201b89b,2024-06-10T17:16:29.170000
@ -251637,8 +251637,8 @@ CVE-2024-34573,0,0,41ab5ca1c62c51e2d5398c3ef19591aec3618667df7c2294a33f2fd9794a6
CVE-2024-34574,0,0,da62f69044cff1544e9db72428db6676f4511c77628679a41b2b8efda0b3bd93,2024-05-08T13:15:00.690000 CVE-2024-34574,0,0,da62f69044cff1544e9db72428db6676f4511c77628679a41b2b8efda0b3bd93,2024-05-08T13:15:00.690000
CVE-2024-34575,0,0,f874cba4be84fe80062f36c4a92c1529344b91ba4a22c0305bd8b082f4f4d827,2024-05-17T18:36:05.263000 CVE-2024-34575,0,0,f874cba4be84fe80062f36c4a92c1529344b91ba4a22c0305bd8b082f4f4d827,2024-05-17T18:36:05.263000
CVE-2024-3458,0,0,95e4aaffa4279b78a2b992b7ca84a76b9c0fc4040617906bdb6d2a26fd53d894,2024-05-17T02:39:57.243000 CVE-2024-3458,0,0,95e4aaffa4279b78a2b992b7ca84a76b9c0fc4040617906bdb6d2a26fd53d894,2024-05-17T02:39:57.243000
CVE-2024-34580,0,0,ed46d261085e8dc776d086f96ac14da619cecbdda82470dd85508a06a0556809,2024-06-26T05:15:51.093000 CVE-2024-34580,0,1,59e1156a68acc4ca563a1b8da2c501e0447e66b674ff0733b0ed3b21d0daede4,2024-06-26T12:44:29.693000
CVE-2024-34581,0,0,eea49f6fad056ca40974148f88205ff4693a3e7025aaabf63826239f85ab0311,2024-06-26T06:15:13.983000 CVE-2024-34581,0,1,101eae71972fe0e0b512a60a9bdc31b241f90f9c819f01ada4065ee44845d826,2024-06-26T12:44:29.693000
CVE-2024-34582,0,0,4844e743472b7231bfa5452c2e20c2f3ad08007eb97cbefe2d71005b993ee4bd,2024-05-16T15:44:44.683000 CVE-2024-34582,0,0,4844e743472b7231bfa5452c2e20c2f3ad08007eb97cbefe2d71005b993ee4bd,2024-05-16T15:44:44.683000
CVE-2024-3459,0,0,03bb87c9d0cbd21911c231bc7c0f724e986c00982489be8ee05c29896de95c1d,2024-05-14T16:11:39.510000 CVE-2024-3459,0,0,03bb87c9d0cbd21911c231bc7c0f724e986c00982489be8ee05c29896de95c1d,2024-05-14T16:11:39.510000
CVE-2024-3460,0,0,5d753d09cd0688d7cf59cbd53a149eb7d45b8f22859b402f63de2cfaab817466,2024-05-14T16:11:39.510000 CVE-2024-3460,0,0,5d753d09cd0688d7cf59cbd53a149eb7d45b8f22859b402f63de2cfaab817466,2024-05-14T16:11:39.510000
@ -252048,8 +252048,8 @@ CVE-2024-35510,0,0,244a039d3e43a77d1e1c1bfa1c93465718af15f6d6ebd597960608d48e40f
CVE-2024-35511,0,0,88c11e90f79a9ed0aca8c4301cc3b328c70f04cb419aacefe9fa82a87fbd22d6,2024-05-29T13:02:09.280000 CVE-2024-35511,0,0,88c11e90f79a9ed0aca8c4301cc3b328c70f04cb419aacefe9fa82a87fbd22d6,2024-05-29T13:02:09.280000
CVE-2024-35512,0,0,c9d23c736120f04931cbbc7470489190e83340be8d46b2f2d0f2c886a0a46a7d,2024-05-29T19:50:25.303000 CVE-2024-35512,0,0,c9d23c736120f04931cbbc7470489190e83340be8d46b2f2d0f2c886a0a46a7d,2024-05-29T19:50:25.303000
CVE-2024-3552,0,0,fa4171774caf4f107f7bd7bc705072afb6b03f384e26f4e538ab01a75ca7b0ff,2024-06-13T18:36:09.010000 CVE-2024-3552,0,0,fa4171774caf4f107f7bd7bc705072afb6b03f384e26f4e538ab01a75ca7b0ff,2024-06-13T18:36:09.010000
CVE-2024-35526,0,0,2a7c56c3526e4083994155103b9152720a423d690ede778285683ecd15130287,2024-06-25T21:15:59.170000 CVE-2024-35526,0,1,9145d718b99666c752b72c23585259f6b43d68cd740cf1774e7de05603733122,2024-06-26T12:44:29.693000
CVE-2024-35527,0,0,4ceec9287c7db70f2182fdde2284aa9c4dc76f37ca54c1e3eec875228a4710fa,2024-06-25T22:15:30.403000 CVE-2024-35527,0,1,a44c745f43d9e9ab4b1f265a434cfd75cb0985cd6431373e28e04bd4dbaff24c,2024-06-26T12:44:29.693000
CVE-2024-3553,0,0,35fab26edb78f51246dfea40a1da2d2c641df3766aad72a071763d4720020731,2024-05-02T18:00:37.360000 CVE-2024-3553,0,0,35fab26edb78f51246dfea40a1da2d2c641df3766aad72a071763d4720020731,2024-05-02T18:00:37.360000
CVE-2024-35537,0,0,40b24ff825bd5479d6cda748f4b6fa0164be52128bb4d8df6dce48131ef1f731,2024-06-24T19:40:04.190000 CVE-2024-35537,0,0,40b24ff825bd5479d6cda748f4b6fa0164be52128bb4d8df6dce48131ef1f731,2024-06-24T19:40:04.190000
CVE-2024-3554,0,0,b4c32859301bcc314e2dd2301d5e454826bca59cac4e6957d0f808d223349460,2024-05-02T18:00:37.360000 CVE-2024-3554,0,0,b4c32859301bcc314e2dd2301d5e454826bca59cac4e6957d0f808d223349460,2024-05-02T18:00:37.360000
@ -252712,7 +252712,7 @@ CVE-2024-36305,0,0,25c6009804152d7b9979d9821e9e70f3611f20519825a820152254cf8944c
CVE-2024-36306,0,0,b7a506dff1a266cee79d9db49c2ffc0e2570931464b091df5cbe92fde0600ec5,2024-06-11T13:54:12.057000 CVE-2024-36306,0,0,b7a506dff1a266cee79d9db49c2ffc0e2570931464b091df5cbe92fde0600ec5,2024-06-11T13:54:12.057000
CVE-2024-36307,0,0,65c2a77849c0c655edb7178a3a2e5c766b2febfc39d9416a3d5029d11e9e67ca,2024-06-11T13:54:12.057000 CVE-2024-36307,0,0,65c2a77849c0c655edb7178a3a2e5c766b2febfc39d9416a3d5029d11e9e67ca,2024-06-11T13:54:12.057000
CVE-2024-3631,0,0,52e896a80c9b063fda6224c04771bbd75f72f78e3d3636ccff4bb724fd16615d,2024-05-15T16:40:19.330000 CVE-2024-3631,0,0,52e896a80c9b063fda6224c04771bbd75f72f78e3d3636ccff4bb724fd16615d,2024-05-15T16:40:19.330000
CVE-2024-3633,0,0,e0af5a341d33864cc79e3254854bcb13a6f481c646889bf21b6e575321b5cc50,2024-06-26T06:15:15.400000 CVE-2024-3633,0,1,2db7ffc7f459790f265177a4532d2ef952cf54b88f78dafb34a118075cb27942,2024-06-26T12:44:29.693000
CVE-2024-3634,0,0,940ae4dd6e92f9452379e49ccdcd29aa6fe6e9bda25faf9f7045c78090371ae8,2024-05-15T16:40:19.330000 CVE-2024-3634,0,0,940ae4dd6e92f9452379e49ccdcd29aa6fe6e9bda25faf9f7045c78090371ae8,2024-05-15T16:40:19.330000
CVE-2024-36358,0,0,0b6d0d7e847e5e80626827024fae1ecc3aa20949dc775e143afeabadd5937bd0,2024-06-11T13:54:12.057000 CVE-2024-36358,0,0,0b6d0d7e847e5e80626827024fae1ecc3aa20949dc775e143afeabadd5937bd0,2024-06-11T13:54:12.057000
CVE-2024-36359,0,0,e478cf489bb1ede60e62fa94e4217a61161e3068e762986d86e699f0d3644034,2024-06-11T13:54:12.057000 CVE-2024-36359,0,0,e478cf489bb1ede60e62fa94e4217a61161e3068e762986d86e699f0d3644034,2024-06-11T13:54:12.057000
@ -252904,7 +252904,7 @@ CVE-2024-36801,0,0,848abb34bc225b988b494ddeb65181be8a5b6f82df4ba5b51418160f74bd0
CVE-2024-36802,0,0,0794bc25a584635ebd68caf9b4e7f3e8a9a13cbfa911223045a2bae9d1392520,2024-06-26T06:15:15.200000 CVE-2024-36802,0,0,0794bc25a584635ebd68caf9b4e7f3e8a9a13cbfa911223045a2bae9d1392520,2024-06-26T06:15:15.200000
CVE-2024-3681,0,0,4cc6e1e77320458af0f4beee59a38c9a663fe20b962b28f234c099bc7c23ab32,2024-05-02T18:00:37.360000 CVE-2024-3681,0,0,4cc6e1e77320458af0f4beee59a38c9a663fe20b962b28f234c099bc7c23ab32,2024-05-02T18:00:37.360000
CVE-2024-36811,0,0,6e0af3c6c3cf0f68333eeeac219e850c0e24dcad6b3b12a43292843727697674,2024-06-07T19:24:09.243000 CVE-2024-36811,0,0,6e0af3c6c3cf0f68333eeeac219e850c0e24dcad6b3b12a43292843727697674,2024-06-07T19:24:09.243000
CVE-2024-36819,0,0,4ede6a47f0bd9f284499e43777ca27e1f926e2a99ca218fde01b45e60f50c00f,2024-06-25T19:15:11.837000 CVE-2024-36819,0,1,f54632612004d4b1595527e4995b2ea47098f3053b3b7672d8dcb3157d17960f,2024-06-26T12:44:29.693000
CVE-2024-3682,0,0,a140f5eb71acf183c1e80e0d2f5a14a5c7d8a92c7cf9dd3ea5250a20e3cb490f,2024-04-26T12:58:17.720000 CVE-2024-3682,0,0,a140f5eb71acf183c1e80e0d2f5a14a5c7d8a92c7cf9dd3ea5250a20e3cb490f,2024-04-26T12:58:17.720000
CVE-2024-36821,0,0,592e31c2ea7119b4c103b5ca67eefeb91773768141e1fc0daf62c86176d3afa7,2024-06-17T21:15:50.960000 CVE-2024-36821,0,0,592e31c2ea7119b4c103b5ca67eefeb91773768141e1fc0daf62c86176d3afa7,2024-06-17T21:15:50.960000
CVE-2024-36823,0,0,aad699347c3b05ee3cd9abd97cd2dd91acd777507ac0def145495f15e3829674,2024-06-07T14:56:05.647000 CVE-2024-36823,0,0,aad699347c3b05ee3cd9abd97cd2dd91acd777507ac0def145495f15e3829674,2024-06-07T14:56:05.647000
@ -253088,7 +253088,7 @@ CVE-2024-37087,0,0,4e40b7ea7a56e7d2dfeb244220c863a1ed6df7c4211908de27563a1ed62e9
CVE-2024-37089,0,0,546734d08a472f24d21b11f96a62ff07ba2d9777252aa2840029efb67a03052d,2024-06-24T12:57:36.513000 CVE-2024-37089,0,0,546734d08a472f24d21b11f96a62ff07ba2d9777252aa2840029efb67a03052d,2024-06-24T12:57:36.513000
CVE-2024-37091,0,0,70ef4cb5aa59df22f5d9bec3c45f39a3b926dd43e7416671f8860a54328745e5,2024-06-24T12:57:36.513000 CVE-2024-37091,0,0,70ef4cb5aa59df22f5d9bec3c45f39a3b926dd43e7416671f8860a54328745e5,2024-06-24T12:57:36.513000
CVE-2024-37092,0,0,ddf8bb50ed996f71f2c9e3e9b63faabe2c52ea8cb34e6f0fcdb53b1c55be2132,2024-06-24T19:26:54.367000 CVE-2024-37092,0,0,ddf8bb50ed996f71f2c9e3e9b63faabe2c52ea8cb34e6f0fcdb53b1c55be2132,2024-06-24T19:26:54.367000
CVE-2024-37098,1,1,7d95ef966e30798c946e7faa214e1c41030e8f9e9bfdead3f487566ade8579f3,2024-06-26T11:15:51.613000 CVE-2024-37098,0,1,e259cf517a4b26891930426aed13a9c53ee339a8d724318e920ba4b291cc4d99,2024-06-26T12:44:29.693000
CVE-2024-37107,0,0,eaa9cf5a94a28aaa8385b24580f4e0847a5f8e8f7ba8d50d5e3cfa9d3405c236,2024-06-24T19:26:54.367000 CVE-2024-37107,0,0,eaa9cf5a94a28aaa8385b24580f4e0847a5f8e8f7ba8d50d5e3cfa9d3405c236,2024-06-24T19:26:54.367000
CVE-2024-37109,0,0,f2a7bf283e738683324f72b6b020147166c767610404b259a82d4d2ec2c96435,2024-06-24T19:26:47.037000 CVE-2024-37109,0,0,f2a7bf283e738683324f72b6b020147166c767610404b259a82d4d2ec2c96435,2024-06-24T19:26:47.037000
CVE-2024-3711,0,0,00ee502ae0ae8bdc802cd38eb1ec1e1356c10e1c18d766a4effd20297a066f55,2024-05-24T01:15:30.977000 CVE-2024-3711,0,0,00ee502ae0ae8bdc802cd38eb1ec1e1356c10e1c18d766a4effd20297a066f55,2024-05-24T01:15:30.977000
@ -253097,11 +253097,11 @@ CVE-2024-37118,0,0,0ad56c9c4204404fc625d311f20c0b9c243a12023f3ae9f31f4a46be59aef
CVE-2024-37124,0,0,bdb1c2622a72a7efb103c3f5603bc06acb88520168a2b939ad78f62d410bde2b,2024-06-20T12:44:01.637000 CVE-2024-37124,0,0,bdb1c2622a72a7efb103c3f5603bc06acb88520168a2b939ad78f62d410bde2b,2024-06-20T12:44:01.637000
CVE-2024-37130,0,0,e0f79c9f14be5102570781fc06be35c79666eecf04eb579171e468c9a760aecc,2024-06-11T13:54:12.057000 CVE-2024-37130,0,0,e0f79c9f14be5102570781fc06be35c79666eecf04eb579171e468c9a760aecc,2024-06-11T13:54:12.057000
CVE-2024-37131,0,0,9d8793df78437fefb0a970a364558bdad589a0c15e132432497cef4b2151f46f,2024-06-13T18:35:19.777000 CVE-2024-37131,0,0,9d8793df78437fefb0a970a364558bdad589a0c15e132432497cef4b2151f46f,2024-06-13T18:35:19.777000
CVE-2024-37138,0,0,4b7f663d2f0b40dec8d7a52e1d69a481ac19649ad9b230bc3dba7f0c41d5c357,2024-06-26T04:15:13 CVE-2024-37138,0,1,c32a7c21b94d343f2b3f30b7a7dc2a266744d79653d9f1f3b9c08078539e5f8e,2024-06-26T12:44:29.693000
CVE-2024-37139,0,0,76b6780ea7b3c55d1db8da0b8d8835e18baab33054f5ff52c1db095daa07b495,2024-06-26T04:15:13.350000 CVE-2024-37139,0,1,4be213816842328a788d9a10ebbbecaea533491c62f7e03adf240d5d001bdfb9,2024-06-26T12:44:29.693000
CVE-2024-3714,0,0,29d3de80cc1f6e0ff07b09e17d8d58f6e17e5f0164ed94da7b2235ed17131c18,2024-05-20T13:00:34.807000 CVE-2024-3714,0,0,29d3de80cc1f6e0ff07b09e17d8d58f6e17e5f0164ed94da7b2235ed17131c18,2024-05-20T13:00:34.807000
CVE-2024-37140,0,0,5a87b551595cd50c75379412c5493217db89a09ef6db4547724ab0d0bb7b228f,2024-06-26T04:15:13.667000 CVE-2024-37140,0,1,681b63037246d6321b6224834e07a5ad4187e2f092d956b5d7b807798dd34579,2024-06-26T12:44:29.693000
CVE-2024-37141,0,0,f9b7fc3ee3560c24da6c0cc8f788f273e783481b681145d58d75656717769fe4,2024-06-26T04:15:13.940000 CVE-2024-37141,0,1,b03df6d0d6f897b221dc842eaee3003cdd6e5a584378ab9df9bc91aaf0755cad,2024-06-26T12:44:29.693000
CVE-2024-3715,0,0,902861be5261e2c029ed83a5c6920fde180817c53e05bb93208dc31c820658c5,2024-05-02T18:00:37.360000 CVE-2024-3715,0,0,902861be5261e2c029ed83a5c6920fde180817c53e05bb93208dc31c820658c5,2024-05-02T18:00:37.360000
CVE-2024-37150,0,0,97cf533630a2e81b430f11fe12ccc7be397791e2299035e9f7d7a243e494791c,2024-06-07T14:56:05.647000 CVE-2024-37150,0,0,97cf533630a2e81b430f11fe12ccc7be397791e2299035e9f7d7a243e494791c,2024-06-07T14:56:05.647000
CVE-2024-37152,0,0,d5beb8b2bc90de99efc40fac5a89948f3b2a0d50610a65220e35a91d41ce9369,2024-06-07T14:56:05.647000 CVE-2024-37152,0,0,d5beb8b2bc90de99efc40fac5a89948f3b2a0d50610a65220e35a91d41ce9369,2024-06-07T14:56:05.647000
@ -253117,7 +253117,7 @@ CVE-2024-37162,0,0,9e7c7bf10929f252e53bb3c1fb7522aba7a72a7537c2c326190b7d6a9f92f
CVE-2024-37163,0,0,916691bf3016dea122c7d1950639e0986553d25fca8ba0614bbb26c77e64f32c,2024-06-07T19:24:09.243000 CVE-2024-37163,0,0,916691bf3016dea122c7d1950639e0986553d25fca8ba0614bbb26c77e64f32c,2024-06-07T19:24:09.243000
CVE-2024-37164,0,0,6cb207bb3fef68b878fe661a68c5d4ebf393e6a2b8cedaf5d1ceeeda9a728322,2024-06-13T18:35:19.777000 CVE-2024-37164,0,0,6cb207bb3fef68b878fe661a68c5d4ebf393e6a2b8cedaf5d1ceeeda9a728322,2024-06-13T18:35:19.777000
CVE-2024-37166,0,0,1196d2402680f5c0ea35c25969f98c6e42a601c8b7f166b15d39fc6d2b783ecf,2024-06-11T13:54:12.057000 CVE-2024-37166,0,0,1196d2402680f5c0ea35c25969f98c6e42a601c8b7f166b15d39fc6d2b783ecf,2024-06-11T13:54:12.057000
CVE-2024-37167,0,0,9f614f19d9bf02003182c0959ce5d047b04160ae01cf872892b8b8fe4c70ec67,2024-06-25T20:15:11.513000 CVE-2024-37167,0,1,8e3878203632039bd5d0fde820eb6a3f65b81345351f922c359b0f8f5a69885c,2024-06-26T12:44:29.693000
CVE-2024-37168,0,0,30a5bfe372ab5dc3b67016944b26b77b656c73122e285b83c454024b12c1f789,2024-06-11T13:54:12.057000 CVE-2024-37168,0,0,30a5bfe372ab5dc3b67016944b26b77b656c73122e285b83c454024b12c1f789,2024-06-11T13:54:12.057000
CVE-2024-37169,0,0,fdaa52111ac9b7853a3eb23a839ff4b8133f3da9944b0a746205935031e65f63,2024-06-11T13:54:12.057000 CVE-2024-37169,0,0,fdaa52111ac9b7853a3eb23a839ff4b8133f3da9944b0a746205935031e65f63,2024-06-11T13:54:12.057000
CVE-2024-3717,0,0,f925293668cd733410cea58d8de3d8ac1f08ce4fec8b5812651df64ea2fd428a,2024-05-02T18:00:37.360000 CVE-2024-3717,0,0,f925293668cd733410cea58d8de3d8ac1f08ce4fec8b5812651df64ea2fd428a,2024-05-02T18:00:37.360000
@ -253142,7 +253142,7 @@ CVE-2024-37231,0,0,2975c060fd817766775d3e3ec5265250dfcb406eb3856b3f2d8635478d7fc
CVE-2024-37233,0,0,dcdb23af544a8046a4ecb68f34b48a3a15207d5a73bdc6182df1b28a0bb5e19c,2024-06-24T19:26:47.037000 CVE-2024-37233,0,0,dcdb23af544a8046a4ecb68f34b48a3a15207d5a73bdc6182df1b28a0bb5e19c,2024-06-24T19:26:47.037000
CVE-2024-3724,0,0,a2f08bb0a2e36a5c374b862fb3e4beff315b3d6672953c5eeabe10290b435e2c,2024-05-02T18:00:37.360000 CVE-2024-3724,0,0,a2f08bb0a2e36a5c374b862fb3e4beff315b3d6672953c5eeabe10290b435e2c,2024-05-02T18:00:37.360000
CVE-2024-3725,0,0,dd194c190207038aca40dcc17eaac7bd7c6f9f34e04d00c016e0de6cd9837da0,2024-05-02T18:00:37.360000 CVE-2024-3725,0,0,dd194c190207038aca40dcc17eaac7bd7c6f9f34e04d00c016e0de6cd9837da0,2024-05-02T18:00:37.360000
CVE-2024-37252,1,1,b8ae0c0c70d4e359d61a6f55c77d883847ed72b8e25aef6affcc5550b875aec6,2024-06-26T11:15:51.860000 CVE-2024-37252,0,1,faf33ef7b8f72660b3f71af61d55db3b928cbbfdda8d6a6c03b3fcf0d979da09,2024-06-26T12:44:29.693000
CVE-2024-3726,0,0,5d13f10d5b73efb7ab7c6448eee56ee5b7f1a739226807fb6eef2a4ab850d2f7,2024-05-30T13:15:41.297000 CVE-2024-3726,0,0,5d13f10d5b73efb7ab7c6448eee56ee5b7f1a739226807fb6eef2a4ab850d2f7,2024-05-30T13:15:41.297000
CVE-2024-3727,0,0,86cd8e8c61ea501cb865624d3ca9d005a7d16ee6d168de0778eaa0bc3ca4140b,2024-06-12T02:15:10.053000 CVE-2024-3727,0,0,86cd8e8c61ea501cb865624d3ca9d005a7d16ee6d168de0778eaa0bc3ca4140b,2024-06-12T02:15:10.053000
CVE-2024-37273,0,0,8e9dee449ebc3c902c8a48603bfb19c8ba061254dd865164dc4adc81e57806ef,2024-06-11T14:12:23.210000 CVE-2024-37273,0,0,8e9dee449ebc3c902c8a48603bfb19c8ba061254dd865164dc4adc81e57806ef,2024-06-11T14:12:23.210000
@ -253285,7 +253285,7 @@ CVE-2024-3771,0,0,1bf22922ed0657906343b6368a2362d22a78a1ff9d5272db064e582b3b0855
CVE-2024-3772,0,0,184d29c2faf230c27e7c42ad45c478e7862cbffdde795ec4220824e36861b510,2024-04-26T02:15:06.983000 CVE-2024-3772,0,0,184d29c2faf230c27e7c42ad45c478e7862cbffdde795ec4220824e36861b510,2024-04-26T02:15:06.983000
CVE-2024-37732,0,0,6a86ff5d31f2b347e744ff4e9df1b84cb4205a66e561799f1161776dd71f288a,2024-06-24T19:26:35.967000 CVE-2024-37732,0,0,6a86ff5d31f2b347e744ff4e9df1b84cb4205a66e561799f1161776dd71f288a,2024-06-24T19:26:35.967000
CVE-2024-3774,0,0,430454733381ff5a96eb00158d8d932d4c087496720223836bce2968611b5152,2024-04-15T13:15:31.997000 CVE-2024-3774,0,0,430454733381ff5a96eb00158d8d932d4c087496720223836bce2968611b5152,2024-04-15T13:15:31.997000
CVE-2024-37742,0,0,0176d553303a78b07d6a9df31d494bb46be0861f0fa388b1eff0f115ae036edf,2024-06-25T22:15:35.183000 CVE-2024-37742,0,1,00d3535f17fc2025a1a3222bc5801b4b0db253d8a7b98f04f7f43ecc7b3cc901,2024-06-26T12:44:29.693000
CVE-2024-3775,0,0,a79253f4f0c7633f40fa5e33903553d0137ff03b4a2d8425a028bb5ddf1c6b0a,2024-04-15T13:15:31.997000 CVE-2024-3775,0,0,a79253f4f0c7633f40fa5e33903553d0137ff03b4a2d8425a028bb5ddf1c6b0a,2024-04-15T13:15:31.997000
CVE-2024-37759,0,0,a304f980fb14a8758546bd8c3d1faef10aef26758667c469c634d191404d3cd2,2024-06-25T12:24:17.873000 CVE-2024-37759,0,0,a304f980fb14a8758546bd8c3d1faef10aef26758667c469c634d191404d3cd2,2024-06-25T12:24:17.873000
CVE-2024-3776,0,0,55056178a3d988ca6f5c349416a81e65818f1f748e962aa89ca62657bc61cdbb,2024-04-15T13:15:31.997000 CVE-2024-3776,0,0,55056178a3d988ca6f5c349416a81e65818f1f748e962aa89ca62657bc61cdbb,2024-04-15T13:15:31.997000
@ -253304,7 +253304,7 @@ CVE-2024-37803,0,0,4f3db0375a36967be1dadee84c3c9799655c3891ffc2301c21194d9aedc22
CVE-2024-3781,0,0,bf710215509c2fb5fefd67fb85930537c2ce3a67160738297841ece3c75d6fc6,2024-04-15T19:12:25.887000 CVE-2024-3781,0,0,bf710215509c2fb5fefd67fb85930537c2ce3a67160738297841ece3c75d6fc6,2024-04-15T19:12:25.887000
CVE-2024-37818,0,0,9dde5fb80aa69772170f1a2e1414de157ca4025771910bb93ffd749e3cb749f4,2024-06-21T11:22:01.687000 CVE-2024-37818,0,0,9dde5fb80aa69772170f1a2e1414de157ca4025771910bb93ffd749e3cb749f4,2024-06-21T11:22:01.687000
CVE-2024-3782,0,0,c95ea596dccb3636dd3691321b5a7a48aa3ee2b08cd07f6f17f6b9ebb6c70325,2024-04-15T19:12:25.887000 CVE-2024-3782,0,0,c95ea596dccb3636dd3691321b5a7a48aa3ee2b08cd07f6f17f6b9ebb6c70325,2024-04-15T19:12:25.887000
CVE-2024-37820,0,0,43d1ef0f5c3a0627549c3b95d9e976dc54dc32f9a37a635c4237c2f7a29f7cbc,2024-06-25T19:15:11.943000 CVE-2024-37820,0,1,0a0996a8947e2895e99ed868e2f9dddf9b73eaadf620faf0715e497fd47a9750,2024-06-26T12:44:29.693000
CVE-2024-37821,0,0,69c8b0f219772ac85c00d152695d2a6db130f2920e14ec06f202587157691baf,2024-06-20T12:44:01.637000 CVE-2024-37821,0,0,69c8b0f219772ac85c00d152695d2a6db130f2920e14ec06f202587157691baf,2024-06-20T12:44:01.637000
CVE-2024-37825,0,0,3470a82078ea88284f350b719f730ddf231924996161e05df687c780330da112,2024-06-24T19:26:47.037000 CVE-2024-37825,0,0,3470a82078ea88284f350b719f730ddf231924996161e05df687c780330da112,2024-06-24T19:26:47.037000
CVE-2024-37828,0,0,1aec682223533f9f2174345c4486cdc5644002780b6ea2a3830079cc11688c3e,2024-06-20T12:44:22.977000 CVE-2024-37828,0,0,1aec682223533f9f2174345c4486cdc5644002780b6ea2a3830079cc11688c3e,2024-06-20T12:44:22.977000
@ -253312,11 +253312,11 @@ CVE-2024-3783,0,0,f916980cd1e532a7d588efc898e3b89c6684234f9d5fc7d911dee2ee73ce32
CVE-2024-37831,0,0,5e7eb1d81cbc03e5a6cb7a0c776550184a7e580655a65f67804199e93112edb2,2024-06-17T12:42:04.623000 CVE-2024-37831,0,0,5e7eb1d81cbc03e5a6cb7a0c776550184a7e580655a65f67804199e93112edb2,2024-06-17T12:42:04.623000
CVE-2024-3784,0,0,c3548262a5dd94ab612636409a3bf8cd74017da9deb24debb2f77536fe274623,2024-04-15T19:12:25.887000 CVE-2024-3784,0,0,c3548262a5dd94ab612636409a3bf8cd74017da9deb24debb2f77536fe274623,2024-04-15T19:12:25.887000
CVE-2024-37840,0,0,145ee429ed53f53bee37478d13303757e3c9a9f24e63bc7b6c2abc99adf58711,2024-06-20T12:44:22.977000 CVE-2024-37840,0,0,145ee429ed53f53bee37478d13303757e3c9a9f24e63bc7b6c2abc99adf58711,2024-06-20T12:44:22.977000
CVE-2024-37843,0,0,c3c4c9f46f4b65df10ec7c6c47316399af934ec6af88d02a128792f16f211b08,2024-06-25T21:15:59.770000 CVE-2024-37843,0,1,efef5b346df7408c97f3f202001c7d16fd1da906a54459bc2a40fc31bc6f652b,2024-06-26T12:44:29.693000
CVE-2024-37848,0,0,14bb88bc5c67311edd5b3500e695fbbed1a5f0a2c4a3e7baecfb228770826b1a,2024-06-20T12:44:22.977000 CVE-2024-37848,0,0,14bb88bc5c67311edd5b3500e695fbbed1a5f0a2c4a3e7baecfb228770826b1a,2024-06-20T12:44:22.977000
CVE-2024-37849,0,0,1c3bd85b42f72006ddc00210dee95fa2aec60a18f1d79fbfdd90f35c19fff4ef,2024-06-13T18:35:19.777000 CVE-2024-37849,0,0,1c3bd85b42f72006ddc00210dee95fa2aec60a18f1d79fbfdd90f35c19fff4ef,2024-06-13T18:35:19.777000
CVE-2024-3785,0,0,fc93f2e321d044bf7a0ccc45f351722880d9f0bf94368b28b702ab59c5cb3144,2024-04-15T19:12:25.887000 CVE-2024-3785,0,0,fc93f2e321d044bf7a0ccc45f351722880d9f0bf94368b28b702ab59c5cb3144,2024-04-15T19:12:25.887000
CVE-2024-37855,0,0,4b721af78045aa6d1baf9cdcee0a8253e9949b23797647c9299d413d68822695,2024-06-25T21:15:59.867000 CVE-2024-37855,0,1,45ab2f13c8dcd2eda9d39267aa7a8288f6be3e045c37d8c983fcc19a14b98e1f,2024-06-26T12:44:29.693000
CVE-2024-3786,0,0,e7dff42d10ea5f51aefb5b7728f1b7d65e7bf6f944a436f82b5cbbe6bdc82c9e,2024-04-15T19:12:25.887000 CVE-2024-3786,0,0,e7dff42d10ea5f51aefb5b7728f1b7d65e7bf6f944a436f82b5cbbe6bdc82c9e,2024-04-15T19:12:25.887000
CVE-2024-3787,0,0,570870b6338590c353431fe2587b532b039679da85c30ab8bb196a257bca2d47,2024-05-14T16:11:39.510000 CVE-2024-3787,0,0,570870b6338590c353431fe2587b532b039679da85c30ab8bb196a257bca2d47,2024-05-14T16:11:39.510000
CVE-2024-37877,0,0,977bdb17b02ee563e354d32709be15b353932c13f2b0db17e57c208cd7c3a791,2024-06-13T18:35:19.777000 CVE-2024-37877,0,0,977bdb17b02ee563e354d32709be15b353932c13f2b0db17e57c208cd7c3a791,2024-06-13T18:35:19.777000
@ -253336,7 +253336,7 @@ CVE-2024-3789,0,0,63d455d46acf2815a86f3b9bf286e732f6c1d2d557d093772c64f0c37d3153
CVE-2024-37890,0,0,64919ef90d7e50e30ea881a6670fbfc5d82541a664dbdfbc52673f8c72279c2d,2024-06-20T12:44:22.977000 CVE-2024-37890,0,0,64919ef90d7e50e30ea881a6670fbfc5d82541a664dbdfbc52673f8c72279c2d,2024-06-20T12:44:22.977000
CVE-2024-37891,0,0,7f699fe1f8c4a3ec8703a81c424d14c0900900ca3b4179e40a6b3b715e3f33f7,2024-06-20T12:44:22.977000 CVE-2024-37891,0,0,7f699fe1f8c4a3ec8703a81c424d14c0900900ca3b4179e40a6b3b715e3f33f7,2024-06-20T12:44:22.977000
CVE-2024-37893,0,0,41d25d093dc6fff20a6eda85ded9c0383f2159fafb609c8080b75906fa502b74,2024-06-20T12:44:22.977000 CVE-2024-37893,0,0,41d25d093dc6fff20a6eda85ded9c0383f2159fafb609c8080b75906fa502b74,2024-06-20T12:44:22.977000
CVE-2024-37894,0,0,6bfca4d95352740f6e810f53c60efd46fc593065b50e825c57660433a60025ef,2024-06-25T20:15:11.873000 CVE-2024-37894,0,1,3c617ec4dc81bc2a78b9e8bf26d21f253a28b055d01165e4a5241e31e3468f92,2024-06-26T12:44:29.693000
CVE-2024-37895,0,0,5a205f11ced3309e1f825afc55d41c5d514e9d7238b82fe13249e658f1877f11,2024-06-20T12:44:22.977000 CVE-2024-37895,0,0,5a205f11ced3309e1f825afc55d41c5d514e9d7238b82fe13249e658f1877f11,2024-06-20T12:44:22.977000
CVE-2024-37896,0,0,85ccee04f37e2b1a04ceeddd19a029b9400fb1a43ccfa07a1fe5a65adbb32b4e,2024-06-20T12:44:22.977000 CVE-2024-37896,0,0,85ccee04f37e2b1a04ceeddd19a029b9400fb1a43ccfa07a1fe5a65adbb32b4e,2024-06-20T12:44:22.977000
CVE-2024-37897,0,0,3a7634088b08b658ef87115cec5dc022a51bdd9e986e2e6685e19db69e7cba07,2024-06-21T11:22:01.687000 CVE-2024-37897,0,0,3a7634088b08b658ef87115cec5dc022a51bdd9e986e2e6685e19db69e7cba07,2024-06-21T11:22:01.687000
@ -253412,7 +253412,7 @@ CVE-2024-38357,0,0,db932e7bd44b2292bed66681b7d77a847d541a79cdeb9df0d08a424975405
CVE-2024-38358,0,0,d7fa4473d29cbfc514ec5a6118f6b700b95e48744d7580b8a99541a6dd9bac5b,2024-06-20T12:43:25.663000 CVE-2024-38358,0,0,d7fa4473d29cbfc514ec5a6118f6b700b95e48744d7580b8a99541a6dd9bac5b,2024-06-20T12:43:25.663000
CVE-2024-38359,0,0,3c4a78257f1dc283c0e90aef4e0803c297f82552e9ac95d2cc406a3431781604,2024-06-21T11:22:01.687000 CVE-2024-38359,0,0,3c4a78257f1dc283c0e90aef4e0803c297f82552e9ac95d2cc406a3431781604,2024-06-21T11:22:01.687000
CVE-2024-38361,0,0,a76df29cb5f27115adee4ca4e20976361dfcfc6eae95b97031ba2314a1f45bae,2024-06-21T11:22:01.687000 CVE-2024-38361,0,0,a76df29cb5f27115adee4ca4e20976361dfcfc6eae95b97031ba2314a1f45bae,2024-06-21T11:22:01.687000
CVE-2024-38364,0,0,3520408cf146cb16a953a56509b341631635084fbc5bbe68b5bf4cdd589099a1,2024-06-26T00:15:10.480000 CVE-2024-38364,0,1,af41b56a7f2f7758c06f324097079d559fb0340d3186315d52e465f177fe03d2,2024-06-26T12:44:29.693000
CVE-2024-38369,0,0,e5224b159d7a692db6492ffb5b88e69bbb6fbeca83c40da9d8cb17f66e90849e,2024-06-24T19:26:35.967000 CVE-2024-38369,0,0,e5224b159d7a692db6492ffb5b88e69bbb6fbeca83c40da9d8cb17f66e90849e,2024-06-24T19:26:35.967000
CVE-2024-3837,0,0,5046b04f6fff161407832d91f839d6c01f3dcf30bcf75f620bfd7221b5de1c27,2024-05-03T03:16:29.010000 CVE-2024-3837,0,0,5046b04f6fff161407832d91f839d6c01f3dcf30bcf75f620bfd7221b5de1c27,2024-05-03T03:16:29.010000
CVE-2024-38373,0,0,952ca8d4b23b60efe2e71a3a686b8a383ac5ed143363159c119120ce9ab78a09,2024-06-24T19:26:35.967000 CVE-2024-38373,0,0,952ca8d4b23b60efe2e71a3a686b8a383ac5ed143363159c119120ce9ab78a09,2024-06-24T19:26:35.967000
@ -253464,9 +253464,9 @@ CVE-2024-38505,0,0,be5aaa1dcdfd8c2aa334d5f57235bcc4cc51742ebd9414669481e2364aff4
CVE-2024-38506,0,0,f0cad7be1bf66b2843860132c4a1c6f7d61e84c638e965683ddee0cfb22e3838,2024-06-20T12:44:01.637000 CVE-2024-38506,0,0,f0cad7be1bf66b2843860132c4a1c6f7d61e84c638e965683ddee0cfb22e3838,2024-06-20T12:44:01.637000
CVE-2024-38507,0,0,a0f746b2efdaa14b7b3a19b053b62c389c989bd3db7005a96c00e53930c09585,2024-06-20T12:44:01.637000 CVE-2024-38507,0,0,a0f746b2efdaa14b7b3a19b053b62c389c989bd3db7005a96c00e53930c09585,2024-06-20T12:44:01.637000
CVE-2024-3851,0,0,16bcb9f87255ebcf1aad2856af6894b1b0c36049b98621e173e693ad3a900330,2024-05-16T13:03:05.353000 CVE-2024-3851,0,0,16bcb9f87255ebcf1aad2856af6894b1b0c36049b98621e173e693ad3a900330,2024-05-16T13:03:05.353000
CVE-2024-38516,0,0,3cfe3aecdb8e607df3ee76ed7741edae9748253a2b742e5575ff711298712797,2024-06-25T21:15:59.957000 CVE-2024-38516,0,1,1e8a930f3bd7a4d706b02f40cc5af32d0943db58e97c615d4b2fd82bf154a7f3,2024-06-26T12:44:29.693000
CVE-2024-3852,0,0,3038e46972183e994310b2b410f139aaace8bd74e7e7e979d336a57b5feba459,2024-04-22T10:15:07.430000 CVE-2024-3852,0,0,3038e46972183e994310b2b410f139aaace8bd74e7e7e979d336a57b5feba459,2024-04-22T10:15:07.430000
CVE-2024-38526,0,0,9a027a18b0e43b60c3249e98e6e4e3271914f58314123162240385cf3ae4de25,2024-06-26T00:15:10.703000 CVE-2024-38526,0,1,e120e388df8ce9f77a5f20e08030a40910a306bc162600677388d663f60ddcef,2024-06-26T12:44:29.693000
CVE-2024-3853,0,0,da9bcb4a065926b49732a0dd79b2f07a12fd9777c9341906bc363e07df8725cf,2024-04-17T12:48:31.863000 CVE-2024-3853,0,0,da9bcb4a065926b49732a0dd79b2f07a12fd9777c9341906bc363e07df8725cf,2024-04-17T12:48:31.863000
CVE-2024-38538,0,0,fd8d0c414421b9d83404be9e58919f8d1c04c080d100c149e46c3a374cade8e2,2024-06-20T12:44:01.637000 CVE-2024-38538,0,0,fd8d0c414421b9d83404be9e58919f8d1c04c080d100c149e46c3a374cade8e2,2024-06-20T12:44:01.637000
CVE-2024-38539,0,0,bb07b10cb8e27f63a4ad4d8d9f4efc546da28e9a77992ff13895f8e8066ae4a7,2024-06-20T12:44:01.637000 CVE-2024-38539,0,0,bb07b10cb8e27f63a4ad4d8d9f4efc546da28e9a77992ff13895f8e8066ae4a7,2024-06-20T12:44:01.637000
@ -253584,8 +253584,8 @@ CVE-2024-38659,0,0,f28961b0676a5448bd17e73bb1a6deb01287f9c08ed62cfca5dcb9aaeb49a
CVE-2024-38661,0,0,d01292ccb88aa0fd584714c04388bf37fe037da4497467ec684003ebdeaece48,2024-06-25T18:50:42.040000 CVE-2024-38661,0,0,d01292ccb88aa0fd584714c04388bf37fe037da4497467ec684003ebdeaece48,2024-06-25T18:50:42.040000
CVE-2024-38662,0,0,df490b2d1680f03df6de3bc588b5285cb29614d4f952810a45c332f43aef3cdd,2024-06-24T18:34:17.547000 CVE-2024-38662,0,0,df490b2d1680f03df6de3bc588b5285cb29614d4f952810a45c332f43aef3cdd,2024-06-24T18:34:17.547000
CVE-2024-38663,0,0,3ea2d49b13b5a6417be2e2e46e01198d7a523f2e1f725a81c5446a7828b4f9eb,2024-06-24T19:26:47.037000 CVE-2024-38663,0,0,3ea2d49b13b5a6417be2e2e46e01198d7a523f2e1f725a81c5446a7828b4f9eb,2024-06-24T19:26:47.037000
CVE-2024-38664,0,0,a8395bd0a97034fb9d591ca23c72f10e556094be356a10c281591bb618a39a41,2024-06-24T19:26:35.967000 CVE-2024-38664,0,1,72bdd64b82c0ccef218e6ae4c865049937a9a6a554fa424e47fbadbb71cab29e,2024-06-26T13:52:23.033000
CVE-2024-38667,0,0,0c4bc4fcbf0bc057a4769bc51bca36ed64a157fd0902f5fc5afc329b9d7f449d,2024-06-24T19:26:35.967000 CVE-2024-38667,0,1,6cbb2a9b35edaa306e53ab7940e7cc9ad6e630fcc1b0ac2f5cc37a7625a00ef7,2024-06-26T13:53:56.883000
CVE-2024-3867,0,0,1b62d18c2024e05920e3c0687ff0e24e4f942ae67e75e66374d57866a8214187,2024-04-16T17:15:11.113000 CVE-2024-3867,0,0,1b62d18c2024e05920e3c0687ff0e24e4f942ae67e75e66374d57866a8214187,2024-04-16T17:15:11.113000
CVE-2024-3868,0,0,fa696e39218c1556f1f2ca1f996b19eb0035252ea0508a442b035effd05169ef,2024-05-06T12:44:56.377000 CVE-2024-3868,0,0,fa696e39218c1556f1f2ca1f996b19eb0035252ea0508a442b035effd05169ef,2024-05-06T12:44:56.377000
CVE-2024-3869,0,0,5fe681dc14d2de5e9dd5b2f66bac58fa145bb31944427d754a663b3ce277c72c,2024-04-16T13:24:07.103000 CVE-2024-3869,0,0,5fe681dc14d2de5e9dd5b2f66bac58fa145bb31944427d754a663b3ce277c72c,2024-04-16T13:24:07.103000
@ -253793,8 +253793,8 @@ CVE-2024-4097,0,0,6a60177672bc62dbe43e4e7ccd78e74b9159babed54b0d3a303c5a9a6fcd00
CVE-2024-4098,0,0,a3e4777d420e1b3bcafda1cf3d039c925611c1ff1c0ae02e65a01fb1638060ec,2024-06-20T12:43:25.663000 CVE-2024-4098,0,0,a3e4777d420e1b3bcafda1cf3d039c925611c1ff1c0ae02e65a01fb1638060ec,2024-06-20T12:43:25.663000
CVE-2024-4103,0,0,db40310890aaaffd4decfd17ebe6978d2575902ae5387a15070f6cb8b96b8e99,2024-05-14T16:11:39.510000 CVE-2024-4103,0,0,db40310890aaaffd4decfd17ebe6978d2575902ae5387a15070f6cb8b96b8e99,2024-05-14T16:11:39.510000
CVE-2024-4104,0,0,8fd82744b8bcdbccac2be79cc70a35ed94046651bf70570898ef2c659d60f12d,2024-05-14T16:11:39.510000 CVE-2024-4104,0,0,8fd82744b8bcdbccac2be79cc70a35ed94046651bf70570898ef2c659d60f12d,2024-05-14T16:11:39.510000
CVE-2024-4105,0,0,f2d9729b2523675759767301544c072fb007ab1b7a83e8590eaf9acb3bb8d19a,2024-06-26T06:15:15.500000 CVE-2024-4105,0,1,d169491ce182673a92c722eeae29d8822821ffafecdac5ff838fdeb75facabe0,2024-06-26T12:44:29.693000
CVE-2024-4106,0,0,31c0c18b0c2a0dc1458f2db70d3d3370cd6262d96aa6fda79babb8776db10330,2024-06-26T06:15:15.830000 CVE-2024-4106,0,1,6398a931e2ef11599fbea0c94459a7577d953d462d4da81c12b39282c7366ae9,2024-06-26T12:44:29.693000
CVE-2024-4107,0,0,ffdcb25066b63e479c86de36da9033958cd11095a536f4d270fcccd4e4bc4dda,2024-05-14T16:11:39.510000 CVE-2024-4107,0,0,ffdcb25066b63e479c86de36da9033958cd11095a536f4d270fcccd4e4bc4dda,2024-05-14T16:11:39.510000
CVE-2024-4111,0,0,ac6d64e31cbc7a488f71b143a528eae329da0ea7954ff86b16631b337575827a,2024-06-04T19:20:29.827000 CVE-2024-4111,0,0,ac6d64e31cbc7a488f71b143a528eae329da0ea7954ff86b16631b337575827a,2024-06-04T19:20:29.827000
CVE-2024-4112,0,0,35262079a1a9e8fe76c90ac7da98d7b8194fc390ceebb0b97377d4e55612daaa,2024-05-17T02:40:15.740000 CVE-2024-4112,0,0,35262079a1a9e8fe76c90ac7da98d7b8194fc390ceebb0b97377d4e55612daaa,2024-05-17T02:40:15.740000
@ -254115,7 +254115,7 @@ CVE-2024-4494,0,0,918249bcec6c97b277e3b4f550dceb7b2011aee0beee5ec958afda7f3738c4
CVE-2024-4495,0,0,fe9f63f3d5d1b610e50beccc2de27a1d5b44365b084262ae38bb4fd9d5328cdc,2024-05-17T02:40:25.167000 CVE-2024-4495,0,0,fe9f63f3d5d1b610e50beccc2de27a1d5b44365b084262ae38bb4fd9d5328cdc,2024-05-17T02:40:25.167000
CVE-2024-4496,0,0,4878b7878675893c8860dfe2f628aacf9ba89db4defe7afc239c902840c6a063,2024-06-04T19:20:39.340000 CVE-2024-4496,0,0,4878b7878675893c8860dfe2f628aacf9ba89db4defe7afc239c902840c6a063,2024-06-04T19:20:39.340000
CVE-2024-4497,0,0,50d7ba6642949616c67705bbd4e65539b7b6c5038eedacdf442c2c58b50804af,2024-06-04T19:20:39.437000 CVE-2024-4497,0,0,50d7ba6642949616c67705bbd4e65539b7b6c5038eedacdf442c2c58b50804af,2024-06-04T19:20:39.437000
CVE-2024-4498,0,0,a6dab33069882abbdf024f1765b8897fa9d7adc98818f3b16c152bb892b19a8e,2024-06-25T20:15:12.127000 CVE-2024-4498,0,1,dbfe976c8c3826c3f46751ee4538ff00353aec210dfb41dbfd582cdd04cb39bb,2024-06-26T12:44:29.693000
CVE-2024-4499,0,0,f4b472a59fe34d2ac64bdac793946e35a6b106a1185caa9e468ffec3d977af40,2024-06-24T12:57:36.513000 CVE-2024-4499,0,0,f4b472a59fe34d2ac64bdac793946e35a6b106a1185caa9e468ffec3d977af40,2024-06-24T12:57:36.513000
CVE-2024-4500,0,0,184ac3c3db109ec0d3b3a58c1a88c0ffd13050ae02d0994392f9ed87744cbb9b,2024-06-04T19:20:39.540000 CVE-2024-4500,0,0,184ac3c3db109ec0d3b3a58c1a88c0ffd13050ae02d0994392f9ed87744cbb9b,2024-06-04T19:20:39.540000
CVE-2024-4501,0,0,78ba43474897acce19ce9d16c899049eb30d079a8149999ee597d7e98a169843,2024-06-04T19:20:39.640000 CVE-2024-4501,0,0,78ba43474897acce19ce9d16c899049eb30d079a8149999ee597d7e98a169843,2024-06-04T19:20:39.640000
@ -254333,7 +254333,7 @@ CVE-2024-4754,0,0,65f7d30a77e8c92b9ac1114b7ed7f43c32a5bfb34fe46cea0e558e1fff1e46
CVE-2024-4755,0,0,8a7a71d94c74cb52dec815eae51a85f655e8bbdb14fb2727ec4857b0eeba2dfa,2024-06-24T19:31:03.263000 CVE-2024-4755,0,0,8a7a71d94c74cb52dec815eae51a85f655e8bbdb14fb2727ec4857b0eeba2dfa,2024-06-24T19:31:03.263000
CVE-2024-4756,0,0,b303493fc627eee25a3b39c986ea25472e7aab1866612b83c9a7c14522d2c360,2024-06-07T14:56:05.647000 CVE-2024-4756,0,0,b303493fc627eee25a3b39c986ea25472e7aab1866612b83c9a7c14522d2c360,2024-06-07T14:56:05.647000
CVE-2024-4757,0,0,73657ac01744c501b9896ce49d4f00383a32113d3f80fad0403d338908d3a4f5,2024-06-25T12:24:17.873000 CVE-2024-4757,0,0,73657ac01744c501b9896ce49d4f00383a32113d3f80fad0403d338908d3a4f5,2024-06-25T12:24:17.873000
CVE-2024-4758,0,0,9c269fd67108f2909853f35d40b8bcab783575e1cd97a1ec46bf94ba5910c2c8,2024-06-26T06:15:16.133000 CVE-2024-4758,0,1,57406868ebb68bb5b6412fc9d60125c43a5e81e040ffd2f2a8dfd71351e995fb,2024-06-26T12:44:29.693000
CVE-2024-4759,0,0,8b059e177c76b9c2cc6c55c4c3ef3e13274f4cfdcd4ecb6a7973f71b5eda00d8,2024-06-25T12:24:17.873000 CVE-2024-4759,0,0,8b059e177c76b9c2cc6c55c4c3ef3e13274f4cfdcd4ecb6a7973f71b5eda00d8,2024-06-25T12:24:17.873000
CVE-2024-4760,0,0,8b9593f0d88cbd24a061db082c8cd5c20f19b8a61431542d1ce576639ef3bdc0,2024-05-16T15:44:44.683000 CVE-2024-4760,0,0,8b9593f0d88cbd24a061db082c8cd5c20f19b8a61431542d1ce576639ef3bdc0,2024-05-16T15:44:44.683000
CVE-2024-4761,0,0,1a5c101148c08794fbcc9293bdcf48ea45ef131413b853bd53bee7bfdc7d1522,2024-06-10T18:15:36.997000 CVE-2024-4761,0,0,1a5c101148c08794fbcc9293bdcf48ea45ef131413b853bd53bee7bfdc7d1522,2024-06-10T18:15:36.997000
@ -254417,7 +254417,7 @@ CVE-2024-4859,0,0,3de5434b35db9344c6a8c9ff1c0891dd93d801d8510e1a23be87da56d66078
CVE-2024-4860,0,0,078ece1acb5f59d15050f08de42942705925d025d9ef9dfb969c99e0b62152d4,2024-05-14T19:17:55.627000 CVE-2024-4860,0,0,078ece1acb5f59d15050f08de42942705925d025d9ef9dfb969c99e0b62152d4,2024-05-14T19:17:55.627000
CVE-2024-4863,0,0,0f2a759d2230ea6d690206f8dcf95872d885a68184080990b57fd14696b63895,2024-06-17T12:42:04.623000 CVE-2024-4863,0,0,0f2a759d2230ea6d690206f8dcf95872d885a68184080990b57fd14696b63895,2024-06-17T12:42:04.623000
CVE-2024-4865,0,0,034a7c12f3d6f4bd5ac54ee1f34abd70a559c5b9a18ae852351f79db6d61b9c9,2024-05-20T13:00:34.807000 CVE-2024-4865,0,0,034a7c12f3d6f4bd5ac54ee1f34abd70a559c5b9a18ae852351f79db6d61b9c9,2024-05-20T13:00:34.807000
CVE-2024-4869,0,0,593e5fb5799155f397a96e871dc7fca6c762d99ed945ee53bb54b1ba5ddac4a0,2024-06-26T00:15:10.897000 CVE-2024-4869,0,1,af51c1eee226c4cbb50e264de1c7a9cc126d126278458819152cafca85d017ce,2024-06-26T12:44:29.693000
CVE-2024-4870,0,0,789ccad79b53f3162faaa4d0c14e00ab550e7e413c46a4332529e5d35d1d0423,2024-06-04T16:57:41.053000 CVE-2024-4870,0,0,789ccad79b53f3162faaa4d0c14e00ab550e7e413c46a4332529e5d35d1d0423,2024-06-04T16:57:41.053000
CVE-2024-4871,0,0,089a89f3309c27433f20e3be4ef9a00379f9f19601c1c8029649846113aed43a,2024-05-14T19:17:55.627000 CVE-2024-4871,0,0,089a89f3309c27433f20e3be4ef9a00379f9f19601c1c8029649846113aed43a,2024-05-14T19:17:55.627000
CVE-2024-4873,0,0,6d8194e640b182e2a2eb107c362a6b36fc019fdb0666ba51ea48c7f29b4462a1,2024-06-20T12:44:01.637000 CVE-2024-4873,0,0,6d8194e640b182e2a2eb107c362a6b36fc019fdb0666ba51ea48c7f29b4462a1,2024-06-20T12:44:01.637000
@ -254425,9 +254425,9 @@ CVE-2024-4874,0,0,e489f4227689f3d8a28a1c171b72c6312c838f037435967f317d135bb1153e
CVE-2024-4875,0,0,aa35cb89fee530b58aa987ffc67ea97738c0ba567903bf01429a1a1259923db8,2024-05-21T12:37:59.687000 CVE-2024-4875,0,0,aa35cb89fee530b58aa987ffc67ea97738c0ba567903bf01429a1a1259923db8,2024-05-21T12:37:59.687000
CVE-2024-4876,0,0,02aac8d1be489833aa2e07f8be8ce083249ac7dc2fcc33fd144386b8d365fef2,2024-05-21T12:37:59.687000 CVE-2024-4876,0,0,02aac8d1be489833aa2e07f8be8ce083249ac7dc2fcc33fd144386b8d365fef2,2024-05-21T12:37:59.687000
CVE-2024-4881,0,0,4f17be95dbf63ebb1e221e9270b941e4838c9b4d4b1f7c998cfbd25da7153e04,2024-06-07T14:56:05.647000 CVE-2024-4881,0,0,4f17be95dbf63ebb1e221e9270b941e4838c9b4d4b1f7c998cfbd25da7153e04,2024-06-07T14:56:05.647000
CVE-2024-4883,0,0,406029fdd84600c4299d80bf2c3b48370ccd854e0854a6b26715e0cd6f69db60,2024-06-25T20:15:12.320000 CVE-2024-4883,0,1,4968eaa5ac5e1ee17a980c68456ded7b931eebe67d4a414b20bc214305c03a05,2024-06-26T12:44:29.693000
CVE-2024-4884,0,0,114bdb9e9fdb64b5f168a346046f1d52b4a9efa80d044fd39073855f0e5b4d15,2024-06-25T20:15:12.547000 CVE-2024-4884,0,1,a65d7c966234cc9adc7a1e341a20fb8739e51ac3dffe18ddce8072a3b2cde893,2024-06-26T12:44:29.693000
CVE-2024-4885,0,0,7ef48df6979e8fb16f242dc93c2a8416be8f5c0783ceea1122b6da2189c4a22e,2024-06-25T20:15:12.970000 CVE-2024-4885,0,1,22d6963cd58c65e49df25eb28a77834d6672add7d9ec062caa1520eac011ea2d,2024-06-26T12:44:29.693000
CVE-2024-4886,0,0,70a2658e30fa136039b1e074a6e8be9bdcf194b1162566fded2b24f4cbe33ef9,2024-06-11T17:14:56.323000 CVE-2024-4886,0,0,70a2658e30fa136039b1e074a6e8be9bdcf194b1162566fded2b24f4cbe33ef9,2024-06-11T17:14:56.323000
CVE-2024-4887,0,0,7853500fd866e5198bb0d09f7fd788dadd2992f92f7258c295ddbf77fcf1dda2,2024-06-07T14:56:05.647000 CVE-2024-4887,0,0,7853500fd866e5198bb0d09f7fd788dadd2992f92f7258c295ddbf77fcf1dda2,2024-06-07T14:56:05.647000
CVE-2024-4888,0,0,82b52d1bb0607490ca6395bb78af4ea4a91988192867806f2568c515e849d6fa,2024-06-07T14:56:05.647000 CVE-2024-4888,0,0,82b52d1bb0607490ca6395bb78af4ea4a91988192867806f2568c515e849d6fa,2024-06-07T14:56:05.647000
@ -254487,9 +254487,9 @@ CVE-2024-4948,0,0,b05b3d79ed1bf722f64863ac2977f422c8f4b6d1e09bbc1d1e2e68fdf78370
CVE-2024-4949,0,0,f0a79ad84a3544c6d743e80f76d1663673c23e46c12c5ac6e4f28e6bfa119dfe,2024-06-10T18:15:37.743000 CVE-2024-4949,0,0,f0a79ad84a3544c6d743e80f76d1663673c23e46c12c5ac6e4f28e6bfa119dfe,2024-06-10T18:15:37.743000
CVE-2024-4950,0,0,3ebada6d910a8901a57ded412adc347e7122b31907aba3a87df300b3f8515696,2024-06-10T18:15:37.830000 CVE-2024-4950,0,0,3ebada6d910a8901a57ded412adc347e7122b31907aba3a87df300b3f8515696,2024-06-10T18:15:37.830000
CVE-2024-4956,0,0,ee2bcf2dea357e2a10f3afc4aab6bf4b7aa596bd0271ebb4f60e3d58e4ce3e86,2024-05-17T18:36:31.297000 CVE-2024-4956,0,0,ee2bcf2dea357e2a10f3afc4aab6bf4b7aa596bd0271ebb4f60e3d58e4ce3e86,2024-05-17T18:36:31.297000
CVE-2024-4957,0,0,c873271fb997d5cd7833a51ea564e232e920a42fc37360d67e1a94dcf9c9e175,2024-06-26T06:15:16.237000 CVE-2024-4957,0,1,fbe11ceff64da7f3b667bbba244809e23b59951bd8423f08944f8b63f6ca14e0,2024-06-26T12:44:29.693000
CVE-2024-4958,0,0,2bbe45732cede494f69801845c1ffcb7706b51daa06d3118dc1540d009abe6d9,2024-06-03T14:46:24.250000 CVE-2024-4958,0,0,2bbe45732cede494f69801845c1ffcb7706b51daa06d3118dc1540d009abe6d9,2024-06-03T14:46:24.250000
CVE-2024-4959,0,0,819d8a79647d758d9708cddf9f6b97fd1a10562601d99f1211b2cb0f6c78de11,2024-06-26T06:15:16.347000 CVE-2024-4959,0,1,99c51fccbdc3be4ec7a4f64a5f749631191acce391b06228ed01dc94d3cc689a,2024-06-26T12:44:29.693000
CVE-2024-4960,0,0,7a8ddb2c3fde26a166a544c1ef080595386d19e05b6d4e7e6367c9f15a68a056,2024-06-04T19:20:55.213000 CVE-2024-4960,0,0,7a8ddb2c3fde26a166a544c1ef080595386d19e05b6d4e7e6367c9f15a68a056,2024-06-04T19:20:55.213000
CVE-2024-4961,0,0,0d2d4f4239c9a9f29742a2da2d8e79004d41b07adb750c3d0ef3c07228a3521b,2024-05-17T02:40:43.983000 CVE-2024-4961,0,0,0d2d4f4239c9a9f29742a2da2d8e79004d41b07adb750c3d0ef3c07228a3521b,2024-05-17T02:40:43.983000
CVE-2024-4962,0,0,6c5bd74692e7fb9e5f8bab3246b40f1edbcfa52027a31b052d3ab9d12e9821c4,2024-06-04T19:20:55.343000 CVE-2024-4962,0,0,6c5bd74692e7fb9e5f8bab3246b40f1edbcfa52027a31b052d3ab9d12e9821c4,2024-06-04T19:20:55.343000
@ -254522,18 +254522,18 @@ CVE-2024-5000,0,0,21f44bae275ca5e7f3a45da963612f2fb705c74e44c15e2681f54ff4506e6a
CVE-2024-5001,0,0,bac0073c23ed28e836068e8632acf1110bc49b73246f9cff53f5a706acc4a57d,2024-06-06T14:17:35.017000 CVE-2024-5001,0,0,bac0073c23ed28e836068e8632acf1110bc49b73246f9cff53f5a706acc4a57d,2024-06-06T14:17:35.017000
CVE-2024-5003,0,0,d7f0fc1b6b7797a26bbde28f3345c21309ee3aa5cb19350abdc4f1d0ca9ec31a,2024-06-07T14:56:05.647000 CVE-2024-5003,0,0,d7f0fc1b6b7797a26bbde28f3345c21309ee3aa5cb19350abdc4f1d0ca9ec31a,2024-06-07T14:56:05.647000
CVE-2024-5006,0,0,982820e7e91a551bd12476d9f6731c77df87e69f9a4499c2643412449b7b2aa0,2024-06-11T17:36:24 CVE-2024-5006,0,0,982820e7e91a551bd12476d9f6731c77df87e69f9a4499c2643412449b7b2aa0,2024-06-11T17:36:24
CVE-2024-5008,0,0,0f0056345fe00a49980e5cc7c2f441a3fd06090a37e88d7d6c8b34444af231c1,2024-06-25T20:15:13.173000 CVE-2024-5008,0,1,2898dba519d9d217cfd3248b0ed35ab7edbdc176d5a083ab78d6d475e7126536,2024-06-26T12:44:29.693000
CVE-2024-5009,0,0,9696936a19f9f717fb468191da657fdec3b8338693e7c48fae6d74ba44ae237a,2024-06-25T20:15:13.427000 CVE-2024-5009,0,1,6962f573c801f5b0e092acdcbfa87b6ce40236f9b33e88c574bca71c5e5b121e,2024-06-26T12:44:29.693000
CVE-2024-5010,0,0,3d9df9023da9f54d48f7a1e77a221e5e53e3bb1742183dbf1d772c4ec5f6ac38,2024-06-25T20:15:13.617000 CVE-2024-5010,0,1,b0b92bafabc7dff56074914e43252c768d22195e064f7beeee10251e5c17e37f,2024-06-26T12:44:29.693000
CVE-2024-5011,0,0,647bd1cc44c1fee15b38b2180648cea0555e3842a927e0c0b9a5a5ad94a8ddeb,2024-06-25T20:15:13.810000 CVE-2024-5011,0,1,8cc21eda0fa9be1911bbfab52f9ccc0ae1c28af27137c1e715914224ff679913,2024-06-26T12:44:29.693000
CVE-2024-5012,0,0,1fe92cc271dbb8f96116411baac6fd6171f4e7fd5e7d52812284c6f2cf41d7ae,2024-06-25T21:16:00.320000 CVE-2024-5012,0,1,f942e2c178bb8822c98edb7f1cdf4f761616644959a0e751cf58049f2bb57780,2024-06-26T12:44:29.693000
CVE-2024-5013,0,0,c1b3112417431fe3e430aff6dd883d8fa49f6fd4ebcd787ee6ba6f64da850cc4,2024-06-25T21:16:00.510000 CVE-2024-5013,0,1,bb531428c542715f61ae4ae45e51ae45cc510ff371cf607b1227d5f33cc7eac1,2024-06-26T12:44:29.693000
CVE-2024-5014,0,0,9698fdd84253787e4af61b0ffd1ad2521ea60f1a3e745e733ba9dbd59f8ccd50,2024-06-25T21:16:00.703000 CVE-2024-5014,0,1,40ce68905a989afbbb5ec46a3c3cf417ad6a1d3491129adfd61c7464eb5f5b95,2024-06-26T12:44:29.693000
CVE-2024-5015,0,0,ab2cf550d41ff45c2d0c48baee93ea8c2bea48c2ca0b40ba152c70a0ff64eaa8,2024-06-25T21:16:00.890000 CVE-2024-5015,0,1,501b12d2c355f05d8290a8a76f11d963d4a420ed6b2c942e4d48a2fc8cf03a8b,2024-06-26T12:44:29.693000
CVE-2024-5016,0,0,df7ff55dbc032cbdc73c1c1f995987209f9e53bdc12462fe530cbd70b409e9f4,2024-06-25T21:16:01.163000 CVE-2024-5016,0,1,23e7d249dbf7cbfbf778f4ac6983e2581873836b61f73559c397afcd7bb57819,2024-06-26T12:44:29.693000
CVE-2024-5017,0,0,c8116a2083c0c019a87ef14d62a7d99fbbd1883055ecf34488273624425cbab4,2024-06-25T21:16:01.357000 CVE-2024-5017,0,1,85e8e949218f92d693773a1fcc2771ac9e88ab4399fc84bc68ed25d827e9b058,2024-06-26T12:44:29.693000
CVE-2024-5018,0,0,6b20dc8688800a9e27e203c59def0ebbc2b231d613a8fbb6cf5fab86e14bd76b,2024-06-25T21:16:01.543000 CVE-2024-5018,0,1,461647626ac90c5782b3c80f310bf4c90f390eba4ec4b82d8f6d5fde1fddea42,2024-06-26T12:44:29.693000
CVE-2024-5019,0,0,1fa9697017e77e8ffea630c86ee36a9fddb8c8ff6e841b6a1d359cade8303cbe,2024-06-25T21:16:01.743000 CVE-2024-5019,0,1,d876d66882ea425a474b31a7603b2f3be5b1747685f9da4a322f9a99c6c10b4b,2024-06-26T12:44:29.693000
CVE-2024-5021,0,0,872edc6307495a559587b3d1d37e361f617cf9935ecc4133654cc9effee7c33c,2024-06-20T12:44:01.637000 CVE-2024-5021,0,0,872edc6307495a559587b3d1d37e361f617cf9935ecc4133654cc9effee7c33c,2024-06-20T12:44:01.637000
CVE-2024-5022,0,0,106355f86b530d1586a5d339031de27a1a2312467a76eb449e8e9901150235d8,2024-05-20T13:00:34.807000 CVE-2024-5022,0,0,106355f86b530d1586a5d339031de27a1a2312467a76eb449e8e9901150235d8,2024-05-20T13:00:34.807000
CVE-2024-5023,0,0,974704283893df4cc9d8e0bcce8bb65ebf635268235f75f47c922033893214ce,2024-05-17T18:36:31.297000 CVE-2024-5023,0,0,974704283893df4cc9d8e0bcce8bb65ebf635268235f75f47c922033893214ce,2024-05-17T18:36:31.297000
@ -254567,7 +254567,7 @@ CVE-2024-5064,0,0,8095cec9a36e031c818592c3e6e560630244970853fe1a2d62ef41815d0461
CVE-2024-5065,0,0,854da1df0c358fed714b464bc000dc33fba39a0799286dd037bd479cf98e0180,2024-06-04T19:20:57.977000 CVE-2024-5065,0,0,854da1df0c358fed714b464bc000dc33fba39a0799286dd037bd479cf98e0180,2024-06-04T19:20:57.977000
CVE-2024-5066,0,0,139b124858e7e99a1754c24fd2616eb6658e77af4be83fdcc1d993d51068360c,2024-05-20T13:00:34.807000 CVE-2024-5066,0,0,139b124858e7e99a1754c24fd2616eb6658e77af4be83fdcc1d993d51068360c,2024-05-20T13:00:34.807000
CVE-2024-5069,0,0,3dc695c8b89e299df0488e9d65e83af5cf3b32a39325b6a3f19785e0f56f72a0,2024-06-04T19:20:58.080000 CVE-2024-5069,0,0,3dc695c8b89e299df0488e9d65e83af5cf3b32a39325b6a3f19785e0f56f72a0,2024-06-04T19:20:58.080000
CVE-2024-5071,0,0,5370fa20240c79f0eb38a4cf7f8414dfb5767b2c62c9099153457b81fc631ea4,2024-06-26T06:15:16.463000 CVE-2024-5071,0,1,7523a9ad4bd89c0668c9224d08257b52394a4aa3d5c42354296fd45548ac40c6,2024-06-26T12:44:29.693000
CVE-2024-5072,0,0,eed82a97a0ee00f59db20864a50c358c267684d10361dc2c7c81171fccc96a9c,2024-05-17T18:35:35.070000 CVE-2024-5072,0,0,eed82a97a0ee00f59db20864a50c358c267684d10361dc2c7c81171fccc96a9c,2024-05-17T18:35:35.070000
CVE-2024-5073,0,0,7de160448d11dc97e5a2a9338d2dd6c82b34c616c4ba587347e360e1f76b10e8,2024-05-30T13:15:41.297000 CVE-2024-5073,0,0,7de160448d11dc97e5a2a9338d2dd6c82b34c616c4ba587347e360e1f76b10e8,2024-05-30T13:15:41.297000
CVE-2024-5084,0,0,92d8976ac3f9e8cdb8733c073caf2586c8f5a42e4f2b053a805034733b1a3630,2024-05-24T01:15:30.977000 CVE-2024-5084,0,0,92d8976ac3f9e8cdb8733c073caf2586c8f5a42e4f2b053a805034733b1a3630,2024-05-24T01:15:30.977000
@ -254647,14 +254647,14 @@ CVE-2024-5163,0,0,891fa577af5d712f6c3d18cebfb44e2a6f24a31af0cc2dc5481c88da80665c
CVE-2024-5165,0,0,1249b447729c1b58db4dd874ebf3238410613919325ce73c31963c57eb2e607f,2024-05-24T01:15:30.977000 CVE-2024-5165,0,0,1249b447729c1b58db4dd874ebf3238410613919325ce73c31963c57eb2e607f,2024-05-24T01:15:30.977000
CVE-2024-5166,0,0,acd04bdcb3927ae2fc6875213ce44649287d9e14ecc961e10fc982fe1f8beeeb,2024-05-22T18:59:20.240000 CVE-2024-5166,0,0,acd04bdcb3927ae2fc6875213ce44649287d9e14ecc961e10fc982fe1f8beeeb,2024-05-22T18:59:20.240000
CVE-2024-5168,0,0,306ce12eec3dfa604048647f5d45c62ae3c9962c8122be3c41030f354ed300c2,2024-05-24T01:15:30.977000 CVE-2024-5168,0,0,306ce12eec3dfa604048647f5d45c62ae3c9962c8122be3c41030f354ed300c2,2024-05-24T01:15:30.977000
CVE-2024-5169,0,0,a026be0d5bf6de064155da24b0b3a7f89cfeaf59b83c91704eeae9d134a55c4c,2024-06-26T06:15:16.543000 CVE-2024-5169,0,1,b1ca0b7cc98949f62453afcab28e83911d364c4494efe1f6507425f7cbc51120,2024-06-26T12:44:29.693000
CVE-2024-5171,0,0,527a4a17adce934d1b4f4bf563487c5773fb7d5bb5e41f4824c0714e13ba1e90,2024-06-21T13:15:12.973000 CVE-2024-5171,0,0,527a4a17adce934d1b4f4bf563487c5773fb7d5bb5e41f4824c0714e13ba1e90,2024-06-21T13:15:12.973000
CVE-2024-5172,0,0,c11e28cee00d03ca550aa31f6a4a4e2619eb7f584486db6cbc532617ccc0d3c9,2024-06-20T12:44:01.637000 CVE-2024-5172,0,0,c11e28cee00d03ca550aa31f6a4a4e2619eb7f584486db6cbc532617ccc0d3c9,2024-06-20T12:44:01.637000
CVE-2024-5173,0,0,3813c7c85f8bdc8e9bf1d287bd890858530abee0a3a487e39cf5d772019b1784,2024-06-26T02:15:09.340000 CVE-2024-5173,0,1,1d07a8c869bc825cf73f46bac935aee62b58e8e6badef703c708e935b6259cfb,2024-06-26T12:44:29.693000
CVE-2024-5176,0,0,d56ed998903dfaef1849b554412c043d7bedaec08a06683735e348a1e4cdd46d,2024-06-05T15:15:12.620000 CVE-2024-5176,0,0,d56ed998903dfaef1849b554412c043d7bedaec08a06683735e348a1e4cdd46d,2024-06-05T15:15:12.620000
CVE-2024-5177,0,0,754731e9b12ab9d5b8190add19111b94a5e340744a68664c6a765c48e93c422c,2024-05-24T01:15:30.977000 CVE-2024-5177,0,0,754731e9b12ab9d5b8190add19111b94a5e340744a68664c6a765c48e93c422c,2024-05-24T01:15:30.977000
CVE-2024-5179,0,0,54358caa6e0360966d6f1b65f621cdbf9937e802ed8f2b5c2ee31999cdede484,2024-06-06T14:17:35.017000 CVE-2024-5179,0,0,54358caa6e0360966d6f1b65f621cdbf9937e802ed8f2b5c2ee31999cdede484,2024-06-06T14:17:35.017000
CVE-2024-5181,0,0,73e7801bd51baa660163f2cdef183babc6f2e9ee4742c1086d027bd9bc51282e,2024-06-26T03:15:10.987000 CVE-2024-5181,0,1,1490518c3f763a5bc28caf27f315947d0d04f2023e03f107a32a0e693b85b149,2024-06-26T12:44:29.693000
CVE-2024-5182,0,0,05eb067250c704bd4c420313ce1da2aeb70843fd4dce4dbb10fdc9fbc9defbb8,2024-06-20T12:43:25.663000 CVE-2024-5182,0,0,05eb067250c704bd4c420313ce1da2aeb70843fd4dce4dbb10fdc9fbc9defbb8,2024-06-20T12:43:25.663000
CVE-2024-5184,0,0,de97ef0558df300043d1123a6fe8d6e2df5444a09bff76f28ec8a01317d2d79c,2024-06-18T17:06:20.257000 CVE-2024-5184,0,0,de97ef0558df300043d1123a6fe8d6e2df5444a09bff76f28ec8a01317d2d79c,2024-06-18T17:06:20.257000
CVE-2024-5185,0,0,b5caf3da810dd6351b96bbd5e231331a05f92e8956c63f18c155c13a8af19485,2024-05-29T15:18:26.427000 CVE-2024-5185,0,0,b5caf3da810dd6351b96bbd5e231331a05f92e8956c63f18c155c13a8af19485,2024-05-29T15:18:26.427000
@ -254669,7 +254669,7 @@ CVE-2024-5194,0,0,2277a7390d0159b3dc2e5dfd100175220ffc5f5725f8c88a7a9344e62a79d5
CVE-2024-5195,0,0,f6d192ea152622e2514b6c95ac0c9e8770ec516eb328b6bc7a2579d1133e54f5,2024-06-04T19:21:02.077000 CVE-2024-5195,0,0,f6d192ea152622e2514b6c95ac0c9e8770ec516eb328b6bc7a2579d1133e54f5,2024-06-04T19:21:02.077000
CVE-2024-5196,0,0,8c75ba8e0441d5b101d1cc87d2ef19242f3cca5ce8fbf68169f935d22da02519,2024-06-04T19:21:02.183000 CVE-2024-5196,0,0,8c75ba8e0441d5b101d1cc87d2ef19242f3cca5ce8fbf68169f935d22da02519,2024-06-04T19:21:02.183000
CVE-2024-5197,0,0,e5a1e2e3af76ae1463b1471e62c8e67ed3eee2f7431619804309412d3993d4cd,2024-06-16T21:15:50.820000 CVE-2024-5197,0,0,e5a1e2e3af76ae1463b1471e62c8e67ed3eee2f7431619804309412d3993d4cd,2024-06-16T21:15:50.820000
CVE-2024-5199,0,0,085b3c35699997957d05c7630e524527e19c993694abd0a60d3a606cc119bf60,2024-06-26T06:15:16.633000 CVE-2024-5199,0,1,996e0c963d565db64016e4ac10a2ddabc1c115d0eed375718c507deaae0eb73a,2024-06-26T12:44:29.693000
CVE-2024-5201,0,0,bf1f4d37f88403bb38854e126758e4f0ff9b7f5c32e7a6f763dbd9ae66e356bd,2024-05-24T01:15:30.977000 CVE-2024-5201,0,0,bf1f4d37f88403bb38854e126758e4f0ff9b7f5c32e7a6f763dbd9ae66e356bd,2024-05-24T01:15:30.977000
CVE-2024-5202,0,0,b978a5507939d8449bc120b0c8b4b839304f46efdad98898b1b0c13e65a259b1,2024-05-24T01:15:30.977000 CVE-2024-5202,0,0,b978a5507939d8449bc120b0c8b4b839304f46efdad98898b1b0c13e65a259b1,2024-05-24T01:15:30.977000
CVE-2024-5203,0,0,c1cbddceebcc79a6f3361ec6d421c84f7c0d786eefdc42d89301f7f288b04ff8,2024-06-13T18:36:09.010000 CVE-2024-5203,0,0,c1cbddceebcc79a6f3361ec6d421c84f7c0d786eefdc42d89301f7f288b04ff8,2024-06-13T18:36:09.010000
@ -254681,7 +254681,7 @@ CVE-2024-5208,0,0,3985337bac39b70213766ebf64511613ec02cc254f1933a2c8ecd567239b3c
CVE-2024-5211,0,0,a4277f26aaa565cc417eac86a473b48ddc12386cf29490b9b3d30644e664c347,2024-06-13T18:36:09.010000 CVE-2024-5211,0,0,a4277f26aaa565cc417eac86a473b48ddc12386cf29490b9b3d30644e664c347,2024-06-13T18:36:09.010000
CVE-2024-5213,0,0,5a68006f91028e70fb3202f4e898c6483c20faed2d33be845b22e07c07dc81e8,2024-06-20T12:43:25.663000 CVE-2024-5213,0,0,5a68006f91028e70fb3202f4e898c6483c20faed2d33be845b22e07c07dc81e8,2024-06-20T12:43:25.663000
CVE-2024-5214,0,0,77a86526714522a20940695733fe46b4562089752d3c663cf289b583b7c6bbda,2024-06-03T19:15:09.360000 CVE-2024-5214,0,0,77a86526714522a20940695733fe46b4562089752d3c663cf289b583b7c6bbda,2024-06-03T19:15:09.360000
CVE-2024-5215,0,0,f306a6fd683bbca9dec2b5001194f7a2aee3240780576d3d923bb70ed937d7ae,2024-06-26T07:15:11.013000 CVE-2024-5215,0,1,f42221106c0d0e877d05b8e2e26cf7673e58a6d4a9fc7867210cc0dc29795334,2024-06-26T12:44:29.693000
CVE-2024-5216,0,0,f74916bcde595c5203a7e0644e281dc01f68ce529e1f3e14cc74a2e3eb525ca3,2024-06-25T12:24:17.873000 CVE-2024-5216,0,0,f74916bcde595c5203a7e0644e281dc01f68ce529e1f3e14cc74a2e3eb525ca3,2024-06-25T12:24:17.873000
CVE-2024-5218,0,0,928b5f8d4e08afc285c0cf6e370373ec87899b716b1cb4db68027907b01d2a82,2024-05-28T12:39:42.673000 CVE-2024-5218,0,0,928b5f8d4e08afc285c0cf6e370373ec87899b716b1cb4db68027907b01d2a82,2024-05-28T12:39:42.673000
CVE-2024-5220,0,0,f61a4e43424028e9a9336f6f6ed766295c86a8a5421f6ff87daa2be13ac80d02,2024-05-28T12:39:42.673000 CVE-2024-5220,0,0,f61a4e43424028e9a9336f6f6ed766295c86a8a5421f6ff87daa2be13ac80d02,2024-05-28T12:39:42.673000
@ -254730,7 +254730,7 @@ CVE-2024-5272,0,0,485554be89aaf429d625f742d41620b7105b55f3f82c1bd7e7c2afb7e9a676
CVE-2024-5273,0,0,f7b775afc6e46cbf2933f26022bd5d6a5054d80bf2d607df2ea5eeb06bc0b97e,2024-06-10T18:15:38.157000 CVE-2024-5273,0,0,f7b775afc6e46cbf2933f26022bd5d6a5054d80bf2d607df2ea5eeb06bc0b97e,2024-06-10T18:15:38.157000
CVE-2024-5274,0,0,815675421e4b9c2b34f2340865cc1ed903b3b9cc89dafcd7624436bba1c58088,2024-06-10T17:16:34.257000 CVE-2024-5274,0,0,815675421e4b9c2b34f2340865cc1ed903b3b9cc89dafcd7624436bba1c58088,2024-06-10T17:16:34.257000
CVE-2024-5275,0,0,b81fd6634b953b380acd7d67040183676d61d3e908aa91611721c09fa7243801,2024-06-20T12:44:01.637000 CVE-2024-5275,0,0,b81fd6634b953b380acd7d67040183676d61d3e908aa91611721c09fa7243801,2024-06-20T12:44:01.637000
CVE-2024-5276,0,0,e0e0ee04023b9cd28865eece33d5f2610e99ed32ffe21f120462fb6dac6ea2f3,2024-06-25T20:15:14.013000 CVE-2024-5276,0,1,d26b15babe17aac13cc613675e4c4ad8d9ecb0a2798444e0b74aa892858078e6,2024-06-26T12:44:29.693000
CVE-2024-5277,0,0,08c2f56d5f9c6263336a67bd47c4fa52288bb09bcb2d8aeff245d6d39899edcf,2024-06-07T14:56:05.647000 CVE-2024-5277,0,0,08c2f56d5f9c6263336a67bd47c4fa52288bb09bcb2d8aeff245d6d39899edcf,2024-06-07T14:56:05.647000
CVE-2024-5278,0,0,ba4b6329b00a48ecb03cef9d2f0cd09adc7cfa79e9cd9e8eb891a1136335fb69,2024-06-07T14:56:05.647000 CVE-2024-5278,0,0,ba4b6329b00a48ecb03cef9d2f0cd09adc7cfa79e9cd9e8eb891a1136335fb69,2024-06-07T14:56:05.647000
CVE-2024-5279,0,0,1f630d4d53c39cf2174e2a1edce8e1a5ead56a314739580d23644f8e4fedef07,2024-06-04T19:21:04.240000 CVE-2024-5279,0,0,1f630d4d53c39cf2174e2a1edce8e1a5ead56a314739580d23644f8e4fedef07,2024-06-04T19:21:04.240000
@ -254763,7 +254763,7 @@ CVE-2024-5326,0,0,9beaa1147d54b3ae536a6eb0023672ae377946ef8aec317bd58c5324df5850
CVE-2024-5327,0,0,84b1605ed9f8fbbcd152a70275bed021ec8172a393ec025e57c9733c6898763a,2024-05-30T13:15:41.297000 CVE-2024-5327,0,0,84b1605ed9f8fbbcd152a70275bed021ec8172a393ec025e57c9733c6898763a,2024-05-30T13:15:41.297000
CVE-2024-5328,0,0,eccd57558969f598d341de2d66a168d40aa825b298603b31d124c5c65bd99501,2024-06-07T14:56:05.647000 CVE-2024-5328,0,0,eccd57558969f598d341de2d66a168d40aa825b298603b31d124c5c65bd99501,2024-06-07T14:56:05.647000
CVE-2024-5329,0,0,d0611aba519e3b4dd99e1f039e6e2f0eb2cd7ab02594b1f6812432d5e7c027f4,2024-06-11T17:42:26.677000 CVE-2024-5329,0,0,d0611aba519e3b4dd99e1f039e6e2f0eb2cd7ab02594b1f6812432d5e7c027f4,2024-06-11T17:42:26.677000
CVE-2024-5332,0,0,f2e86bfadefa4a246d9bede10bf15cb73747b612c1844f985800142e39da6a95,2024-06-26T06:15:16.740000 CVE-2024-5332,0,1,38119dd9a5428b9df2c1e792798f9c7c98836decd72ef41908a87c0a23701c2a,2024-06-26T12:44:29.693000
CVE-2024-5336,0,0,c369166950e96ac23803f815e7b4d2b11cfe953eea9e75568f6bd3a698e57d70,2024-06-04T19:21:04.947000 CVE-2024-5336,0,0,c369166950e96ac23803f815e7b4d2b11cfe953eea9e75568f6bd3a698e57d70,2024-06-04T19:21:04.947000
CVE-2024-5337,0,0,c248444f5c3efb36aad99df75367002d79331c50b5d3f0b33d4749de26828e2b,2024-06-04T19:21:05.063000 CVE-2024-5337,0,0,c248444f5c3efb36aad99df75367002d79331c50b5d3f0b33d4749de26828e2b,2024-06-04T19:21:05.063000
CVE-2024-5338,0,0,89168a7f7dbda5d5f11c938f5cea67ca543a537a0633e07e1ea1ce3fb43d8fd7,2024-06-04T19:21:05.170000 CVE-2024-5338,0,0,89168a7f7dbda5d5f11c938f5cea67ca543a537a0633e07e1ea1ce3fb43d8fd7,2024-06-04T19:21:05.170000
@ -254865,13 +254865,13 @@ CVE-2024-5453,0,0,f53a0f7c14e91f56fc73f4b75f7a3c7cc751f83b7f0078edb3a1d42587e454
CVE-2024-5455,0,0,fba0854666bb0b703a1a17496073d4cacfc80d7dfcf08ea3fd5bf7812a480359,2024-06-21T11:22:01.687000 CVE-2024-5455,0,0,fba0854666bb0b703a1a17496073d4cacfc80d7dfcf08ea3fd5bf7812a480359,2024-06-21T11:22:01.687000
CVE-2024-5458,0,0,9de49bd96b675511c7046065b94648120f7be327e28ebfffc7c76c5b629abe0a,2024-06-18T10:15:10.870000 CVE-2024-5458,0,0,9de49bd96b675511c7046065b94648120f7be327e28ebfffc7c76c5b629abe0a,2024-06-18T10:15:10.870000
CVE-2024-5459,0,0,81bd5d1a4ebf239ba65f5777fb4bfb17f71fa270ff31c5f59fd635927a6c453f,2024-06-13T19:35:55.083000 CVE-2024-5459,0,0,81bd5d1a4ebf239ba65f5777fb4bfb17f71fa270ff31c5f59fd635927a6c453f,2024-06-13T19:35:55.083000
CVE-2024-5460,0,0,43ac837f57e384725fb6e9f39d6687eb5f899e829fc03221538b834ea94a5270,2024-06-26T00:15:11.093000 CVE-2024-5460,0,1,85cda1c649a5547711ec36cd06d4f4f117811e9abf4f2bc54500bcb409f8f46a,2024-06-26T12:44:29.693000
CVE-2024-5463,0,0,a83ead02d534db419d64d9a246adc999062f3a690f2d2cbba14bffeb9debf0f5,2024-06-04T16:57:41.053000 CVE-2024-5463,0,0,a83ead02d534db419d64d9a246adc999062f3a690f2d2cbba14bffeb9debf0f5,2024-06-04T16:57:41.053000
CVE-2024-5464,0,0,20ac6d6efa943df789ee80e23b81c0dadba3276ccc683b7cb6fcce26ba339bb3,2024-06-17T12:42:04.623000 CVE-2024-5464,0,0,20ac6d6efa943df789ee80e23b81c0dadba3276ccc683b7cb6fcce26ba339bb3,2024-06-17T12:42:04.623000
CVE-2024-5465,0,0,9b677e9ed42136d68b443cf9dc4afa859310d29bdd1dad1920c040ce3c57d334,2024-06-17T12:42:04.623000 CVE-2024-5465,0,0,9b677e9ed42136d68b443cf9dc4afa859310d29bdd1dad1920c040ce3c57d334,2024-06-17T12:42:04.623000
CVE-2024-5468,0,0,2bc9c38a1a2994a4c4ceddf0376e8b3ff5412f95fe840378ab4577710a81e066,2024-06-13T18:36:09.010000 CVE-2024-5468,0,0,2bc9c38a1a2994a4c4ceddf0376e8b3ff5412f95fe840378ab4577710a81e066,2024-06-13T18:36:09.010000
CVE-2024-5469,0,0,a6ac25b89021bcbe477171d4304d10733bc198409739b73a4d379d6ba636b5b0,2024-06-17T12:42:04.623000 CVE-2024-5469,0,0,a6ac25b89021bcbe477171d4304d10733bc198409739b73a4d379d6ba636b5b0,2024-06-17T12:42:04.623000
CVE-2024-5473,0,0,ca431b85f40b48e144a857852f44dd99270d1c5952a8803d27b7c491a8643524,2024-06-26T06:15:17.197000 CVE-2024-5473,0,1,68bff144c97ed7e10f458e1f3ffa79e9c82cd71e1f2f5c678ae893746348b4ac,2024-06-26T12:44:29.693000
CVE-2024-5475,0,0,9a35a27ed618b47a569e72c9eedce24392059deeff1f9ce687dca2ba057faa99,2024-06-20T12:43:25.663000 CVE-2024-5475,0,0,9a35a27ed618b47a569e72c9eedce24392059deeff1f9ce687dca2ba057faa99,2024-06-20T12:43:25.663000
CVE-2024-5478,0,0,cbce39d40f4102e26dfaf35e6a6b20bf349245ad3d94d864b4543f6f43a9d245,2024-06-07T14:56:05.647000 CVE-2024-5478,0,0,cbce39d40f4102e26dfaf35e6a6b20bf349245ad3d94d864b4543f6f43a9d245,2024-06-07T14:56:05.647000
CVE-2024-5480,0,0,0c96379cb76c4f8b6d9852cdcc0f60ebab5e5f97f64e4439ef99fbfb3e3714ee,2024-06-07T14:56:05.647000 CVE-2024-5480,0,0,0c96379cb76c4f8b6d9852cdcc0f60ebab5e5f97f64e4439ef99fbfb3e3714ee,2024-06-07T14:56:05.647000
@ -254928,7 +254928,7 @@ CVE-2024-5560,0,0,f1a6e79f857dcb0da00298e85540b2901c155f3f4e8e842ef291f9f993b61e
CVE-2024-5564,0,0,dcea96840208d2ac663aaa4f0f3c3d4a29deb4a56217e3b064f75f0ccdd62128,2024-06-19T20:15:12.277000 CVE-2024-5564,0,0,dcea96840208d2ac663aaa4f0f3c3d4a29deb4a56217e3b064f75f0ccdd62128,2024-06-19T20:15:12.277000
CVE-2024-5565,0,0,830316f5c713618fdad4a0eda5b7296c22d5d93c87a8813197db3ff9cf28c4ee,2024-05-31T19:14:47.793000 CVE-2024-5565,0,0,830316f5c713618fdad4a0eda5b7296c22d5d93c87a8813197db3ff9cf28c4ee,2024-05-31T19:14:47.793000
CVE-2024-5571,0,0,105c4e644019eeccf72c6e63813cdc36601b1b9a7e3cba5bc172df86631261e6,2024-06-11T17:29:03.277000 CVE-2024-5571,0,0,105c4e644019eeccf72c6e63813cdc36601b1b9a7e3cba5bc172df86631261e6,2024-06-11T17:29:03.277000
CVE-2024-5573,0,0,7f9d6285b5085efd7797f7d94c31db15a2417902c221c2f51dae77459c33a5c5,2024-06-26T06:15:17.300000 CVE-2024-5573,0,1,51a9ffd3da1267c4eef69596ac09c3dbea287270e0762cf7f98d2ed1f452fbf5,2024-06-26T12:44:29.693000
CVE-2024-5574,0,0,3e624f806d94dcff352fde1d5be73aa27a333a70d66ed500b1d4bd0c17214488,2024-06-20T12:44:01.637000 CVE-2024-5574,0,0,3e624f806d94dcff352fde1d5be73aa27a333a70d66ed500b1d4bd0c17214488,2024-06-20T12:44:01.637000
CVE-2024-5577,0,0,0394e112329dfafbe6884a2484f7873076e1a8201ddc51d40c9b2393b5d88276,2024-06-17T12:42:04.623000 CVE-2024-5577,0,0,0394e112329dfafbe6884a2484f7873076e1a8201ddc51d40c9b2393b5d88276,2024-06-17T12:42:04.623000
CVE-2024-5584,0,0,612eacfcf6c3fd3d6fdd0ff2c66e496cc817b02568ea9f69c40277bbc0300578,2024-06-11T13:54:12.057000 CVE-2024-5584,0,0,612eacfcf6c3fd3d6fdd0ff2c66e496cc817b02568ea9f69c40277bbc0300578,2024-06-11T13:54:12.057000
@ -255131,7 +255131,7 @@ CVE-2024-6056,0,0,9210a6d5e69cda44c36495fe4964320c8f6a47f4e723a559827fc7a6d2ee59
CVE-2024-6057,0,0,3fe0cc3f033e9735165b225d202aca1a708a694e0fe3a8863e85d03de2c16d7c,2024-06-20T12:44:22.977000 CVE-2024-6057,0,0,3fe0cc3f033e9735165b225d202aca1a708a694e0fe3a8863e85d03de2c16d7c,2024-06-20T12:44:22.977000
CVE-2024-6058,0,0,a8d358e50f82c303138db4a312533e61278f479f2387c71d6c209ba9ed223766,2024-06-20T12:44:22.977000 CVE-2024-6058,0,0,a8d358e50f82c303138db4a312533e61278f479f2387c71d6c209ba9ed223766,2024-06-20T12:44:22.977000
CVE-2024-6059,0,0,0652872fd6b84bdbe955862646f7076a37dc5f6685ecdae3319bf6195e0e8f13,2024-06-20T12:44:22.977000 CVE-2024-6059,0,0,0652872fd6b84bdbe955862646f7076a37dc5f6685ecdae3319bf6195e0e8f13,2024-06-20T12:44:22.977000
CVE-2024-6060,0,0,ee47a28d94f78307c704af2d1535d0d8463f4327fe622591e6d161297aa2271c,2024-06-25T22:15:35.347000 CVE-2024-6060,0,1,4eb8b5c4a713d8fedd6d97c8e5e0153e94ea5e7058f16bc4e2bd73372c4078d4,2024-06-26T12:44:29.693000
CVE-2024-6061,0,0,3fef78bcd0588e7cd49d6e518ec4c2f5bfa6c9508485b37687f3859e72f1e0b3,2024-06-20T12:44:22.977000 CVE-2024-6061,0,0,3fef78bcd0588e7cd49d6e518ec4c2f5bfa6c9508485b37687f3859e72f1e0b3,2024-06-20T12:44:22.977000
CVE-2024-6062,0,0,4376548ceed49a6279fb764d06a2668721f5b2377b1cd81005297361a58fafee,2024-06-20T12:44:22.977000 CVE-2024-6062,0,0,4376548ceed49a6279fb764d06a2668721f5b2377b1cd81005297361a58fafee,2024-06-20T12:44:22.977000
CVE-2024-6063,0,0,105b47008bd97b9ef828e0642500faec85639c6116c40931e2e5a8256ab187a7,2024-06-20T12:44:22.977000 CVE-2024-6063,0,0,105b47008bd97b9ef828e0642500faec85639c6116c40931e2e5a8256ab187a7,2024-06-20T12:44:22.977000
@ -255192,7 +255192,7 @@ CVE-2024-6193,0,0,a4bea5283fdf7332b754649129a7a49b1681f55f64693a6877fa456de3af88
CVE-2024-6194,0,0,8fba52ae1e26593e8f532ec1813c89aa27500e4749964486d15ce611179907d5,2024-06-21T11:22:01.687000 CVE-2024-6194,0,0,8fba52ae1e26593e8f532ec1813c89aa27500e4749964486d15ce611179907d5,2024-06-21T11:22:01.687000
CVE-2024-6195,0,0,880630f7e59fe96c68db9446cad414c3056228167cb15e9eb7f8a5b897e9683e,2024-06-21T11:22:01.687000 CVE-2024-6195,0,0,880630f7e59fe96c68db9446cad414c3056228167cb15e9eb7f8a5b897e9683e,2024-06-21T11:22:01.687000
CVE-2024-6196,0,0,8d29dbc22f191f0a2e6f5022705b8c2127b1c89230e4a1900a70835df0ab8ad4,2024-06-21T17:15:11.350000 CVE-2024-6196,0,0,8d29dbc22f191f0a2e6f5022705b8c2127b1c89230e4a1900a70835df0ab8ad4,2024-06-21T17:15:11.350000
CVE-2024-6206,0,0,e75306b78153b018c6a37eb8b9ea2a7630f1bcb2e55cbbf048f4a0bc9d85d3b4,2024-06-25T20:15:14.210000 CVE-2024-6206,0,1,a239648c07eb93ed8775dc2c6fd68864bae94b397314d858106207781c570047,2024-06-26T12:44:29.693000
CVE-2024-6212,0,0,c1e9ad93b654311e54f23eb8816b7040c4009f7be4b90d449446bdaf277f7228,2024-06-21T15:15:16.313000 CVE-2024-6212,0,0,c1e9ad93b654311e54f23eb8816b7040c4009f7be4b90d449446bdaf277f7228,2024-06-21T15:15:16.313000
CVE-2024-6213,0,0,875f788502e9039ff5cde644917f38d937eec3d1fa9cda735bda62057b13f974,2024-06-21T11:22:01.687000 CVE-2024-6213,0,0,875f788502e9039ff5cde644917f38d937eec3d1fa9cda735bda62057b13f974,2024-06-21T11:22:01.687000
CVE-2024-6214,0,0,f04922fee1928885a13a6b9135dd29d8f0bc0dcf3373a5ce58e6bf8d17734328,2024-06-21T15:15:16.430000 CVE-2024-6214,0,0,f04922fee1928885a13a6b9135dd29d8f0bc0dcf3373a5ce58e6bf8d17734328,2024-06-21T15:15:16.430000
@ -255239,4 +255239,4 @@ CVE-2024-6305,0,0,f99f0e2fe8305a118a77228b9078f8dc9ee1845d0c6e4aa828aaf18dadf372
CVE-2024-6306,0,0,711bff153bb36aca97259b9a58665f79686710d592de1aed3b99962d3c3067a2,2024-06-25T17:15:11.107000 CVE-2024-6306,0,0,711bff153bb36aca97259b9a58665f79686710d592de1aed3b99962d3c3067a2,2024-06-25T17:15:11.107000
CVE-2024-6307,0,0,8ab5a431e062520bb1ad7f310d46410dbbde3d3f7608d294c115bc975c016c27,2024-06-25T12:24:17.873000 CVE-2024-6307,0,0,8ab5a431e062520bb1ad7f310d46410dbbde3d3f7608d294c115bc975c016c27,2024-06-25T12:24:17.873000
CVE-2024-6308,0,0,483bab7c0040f40965fba497a0be9e45fef6974a263c54d39149185a218f4b43,2024-06-25T21:16:02.087000 CVE-2024-6308,0,0,483bab7c0040f40965fba497a0be9e45fef6974a263c54d39149185a218f4b43,2024-06-25T21:16:02.087000
CVE-2024-6344,1,1,5156b85dd9540f99b8e29234f37ed16845cec606e9d0f2f119187d87ed527f37,2024-06-26T11:15:52.073000 CVE-2024-6344,0,1,158fe8ce5a3890f545b2644b2bf88be098b9fb0d23e412b15a910b7a664aee59,2024-06-26T12:44:29.693000

Can't render this file because it is too large.