Auto-Update: 2024-07-02T12:02:54.241450+00:00

This commit is contained in:
cad-safe-bot 2024-07-02 12:05:47 +00:00
parent 5b404b945e
commit 13c4dfa243
44 changed files with 2428 additions and 59 deletions

View File

@ -0,0 +1,48 @@
{
"id": "CVE-2024-20888",
"sourceIdentifier": "mobile.security@samsung.com",
"published": "2024-07-02T10:15:03.133",
"lastModified": "2024-07-02T10:15:03.133",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Improper access control in OneUIHome prior to SMR Jul-2024 Release 1 allows local attackers to launch privileged activities. User interaction is required for triggering this vulnerability."
},
{
"lang": "es",
"value": "El control de acceso inadecuado en OneUIHome antes de SMR Jul-2024 Release 1 permite a atacantes locales iniciar actividades privilegiadas. Se requiere la interacci\u00f3n del usuario para activar esta vulnerabilidad."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "mobile.security@samsung.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
}
]
},
"references": [
{
"url": "https://security.samsungmobile.com/securityUpdate.smsb?year=2024&month=07",
"source": "mobile.security@samsung.com"
}
]
}

View File

@ -0,0 +1,48 @@
{
"id": "CVE-2024-20889",
"sourceIdentifier": "mobile.security@samsung.com",
"published": "2024-07-02T10:15:03.767",
"lastModified": "2024-07-02T10:15:03.767",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Improper authentication in BLE prior to SMR Jul-2024 Release 1 allows adjacent attackers to pair with devices."
},
{
"lang": "es",
"value": "La autenticaci\u00f3n incorrecta en BLE antes de SMR, julio de 2024, versi\u00f3n 1, permite a atacantes adyacentes emparejarse con dispositivos."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "mobile.security@samsung.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:H",
"attackVector": "ADJACENT_NETWORK",
"attackComplexity": "HIGH",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH",
"baseScore": 5.9,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.6,
"impactScore": 4.2
}
]
},
"references": [
{
"url": "https://security.samsungmobile.com/securityUpdate.smsb?year=2024&month=07",
"source": "mobile.security@samsung.com"
}
]
}

View File

@ -0,0 +1,48 @@
{
"id": "CVE-2024-20890",
"sourceIdentifier": "mobile.security@samsung.com",
"published": "2024-07-02T10:15:03.947",
"lastModified": "2024-07-02T10:15:03.947",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Improper input validation in BLE prior to SMR Jul-2024 Release 1 allows adjacent attackers to trigger abnormal behavior."
},
{
"lang": "es",
"value": "La validaci\u00f3n de entrada incorrecta en BLE antes de la versi\u00f3n 1 de SMR de julio de 2024 permite a los atacantes adyacentes desencadenar un comportamiento anormal."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "mobile.security@samsung.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"attackVector": "ADJACENT_NETWORK",
"attackComplexity": "HIGH",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH",
"baseScore": 5.3,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.6,
"impactScore": 3.6
}
]
},
"references": [
{
"url": "https://security.samsungmobile.com/securityUpdate.smsb?year=2024&month=07",
"source": "mobile.security@samsung.com"
}
]
}

View File

@ -0,0 +1,48 @@
{
"id": "CVE-2024-20891",
"sourceIdentifier": "mobile.security@samsung.com",
"published": "2024-07-02T10:15:04.113",
"lastModified": "2024-07-02T10:15:04.113",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Improper access control in launchFullscreenIntent of SystemUI prior to SMR Jul-2024 Release 1 allows local attackers to launch privileged activities."
},
{
"lang": "es",
"value": "El control de acceso inadecuado en launchFullscreenIntent de SystemUI antes de SMR Jul-2024 Release 1 permite a atacantes locales iniciar actividades privilegiadas."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "mobile.security@samsung.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
}
]
},
"references": [
{
"url": "https://security.samsungmobile.com/securityUpdate.smsb?year=2024&month=07",
"source": "mobile.security@samsung.com"
}
]
}

View File

@ -0,0 +1,48 @@
{
"id": "CVE-2024-20892",
"sourceIdentifier": "mobile.security@samsung.com",
"published": "2024-07-02T10:15:04.283",
"lastModified": "2024-07-02T10:15:04.283",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Improper verification of signature in FilterProvider prior to SMR Jul-2024 Release 1 allows local attackers to execute privileged behaviors. User interaction is required for triggering this vulnerability."
},
{
"lang": "es",
"value": "La verificaci\u00f3n inadecuada de la firma en FilterProvider antes de SMR Jul-2024 Release 1 permite a atacantes locales ejecutar comportamientos privilegiados. Se requiere la interacci\u00f3n del usuario para activar esta vulnerabilidad."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "mobile.security@samsung.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:L/I:H/A:H",
"attackVector": "LOCAL",
"attackComplexity": "HIGH",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 6.5,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.0,
"impactScore": 5.5
}
]
},
"references": [
{
"url": "https://security.samsungmobile.com/securityUpdate.smsb?year=2024&month=07",
"source": "mobile.security@samsung.com"
}
]
}

View File

@ -0,0 +1,48 @@
{
"id": "CVE-2024-20893",
"sourceIdentifier": "mobile.security@samsung.com",
"published": "2024-07-02T10:15:04.457",
"lastModified": "2024-07-02T10:15:04.457",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Improper input validation in libmediaextractorservice.so prior to SMR Jul-2024 Release 1 allows local attackers to trigger memory corruption."
},
{
"lang": "es",
"value": "La validaci\u00f3n de entrada incorrecta en libmediaextractorservice.so antes de SMR Jul-2024 Release 1 permite a atacantes locales provocar da\u00f1os en la memoria."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "mobile.security@samsung.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"availabilityImpact": "HIGH",
"baseScore": 6.1,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.8,
"impactScore": 4.2
}
]
},
"references": [
{
"url": "https://security.samsungmobile.com/securityUpdate.smsb?year=2024&month=07",
"source": "mobile.security@samsung.com"
}
]
}

View File

@ -0,0 +1,48 @@
{
"id": "CVE-2024-20894",
"sourceIdentifier": "mobile.security@samsung.com",
"published": "2024-07-02T10:15:04.630",
"lastModified": "2024-07-02T10:15:04.630",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Improper handling of exceptional conditions in Secure Folder prior to SMR Jul-2024 Release 1 allows physical attackers to bypass authentication under certain condition. User interaction is required for triggering this vulnerability."
},
{
"lang": "es",
"value": "El manejo inadecuado de condiciones excepcionales en Secure Folder antes de SMR Jul-2024 Release 1 permite a los atacantes f\u00edsicos eludir la autenticaci\u00f3n bajo ciertas condiciones. Se requiere la interacci\u00f3n del usuario para activar esta vulnerabilidad."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "mobile.security@samsung.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
"attackVector": "PHYSICAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 0.7,
"impactScore": 3.6
}
]
},
"references": [
{
"url": "https://security.samsungmobile.com/securityUpdate.smsb?year=2024&month=07",
"source": "mobile.security@samsung.com"
}
]
}

View File

@ -0,0 +1,48 @@
{
"id": "CVE-2024-20895",
"sourceIdentifier": "mobile.security@samsung.com",
"published": "2024-07-02T10:15:04.823",
"lastModified": "2024-07-02T10:15:04.823",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Improper access control in Dar service prior to SMR Jul-2024 Release 1 allows local attackers to bypass restriction for calling SDP features."
},
{
"lang": "es",
"value": "El control de acceso inadecuado en el servicio Dar antes de la versi\u00f3n 1 de SMR de julio de 2024 permite a los atacantes locales eludir la restricci\u00f3n para llamar a las funciones SDP."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "mobile.security@samsung.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 7.7,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.5,
"impactScore": 5.2
}
]
},
"references": [
{
"url": "https://security.samsungmobile.com/securityUpdate.smsb?year=2024&month=07",
"source": "mobile.security@samsung.com"
}
]
}

View File

@ -0,0 +1,48 @@
{
"id": "CVE-2024-20896",
"sourceIdentifier": "mobile.security@samsung.com",
"published": "2024-07-02T10:15:04.997",
"lastModified": "2024-07-02T10:15:04.997",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Use of implicit intent for sensitive communication in Configuration message prior to SMR Jul-2024 Release 1 allows local attackers to get sensitive information."
},
{
"lang": "es",
"value": "El uso de intenci\u00f3n impl\u00edcita para comunicaci\u00f3n confidencial en el mensaje de configuraci\u00f3n anterior a SMR de julio de 2024, versi\u00f3n 1, permite a los atacantes locales obtener informaci\u00f3n confidencial."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "mobile.security@samsung.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5.5,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6
}
]
},
"references": [
{
"url": "https://security.samsungmobile.com/securityUpdate.smsb?year=2024&month=07",
"source": "mobile.security@samsung.com"
}
]
}

View File

@ -0,0 +1,48 @@
{
"id": "CVE-2024-20897",
"sourceIdentifier": "mobile.security@samsung.com",
"published": "2024-07-02T10:15:05.163",
"lastModified": "2024-07-02T10:15:05.163",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Use of implicit intent for sensitive communication in FCM function in IMS service prior to SMR Jul-2024 Release 1 allows local attackers to get sensitive information."
},
{
"lang": "es",
"value": "El uso de intenci\u00f3n impl\u00edcita para comunicaci\u00f3n confidencial en la funci\u00f3n FCM en el servicio IMS antes de SMR, julio de 2024, versi\u00f3n 1, permite a atacantes locales obtener informaci\u00f3n confidencial."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "mobile.security@samsung.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.0,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.5,
"impactScore": 1.4
}
]
},
"references": [
{
"url": "https://security.samsungmobile.com/securityUpdate.smsb?year=2024&month=07",
"source": "mobile.security@samsung.com"
}
]
}

View File

@ -0,0 +1,48 @@
{
"id": "CVE-2024-20898",
"sourceIdentifier": "mobile.security@samsung.com",
"published": "2024-07-02T10:15:05.333",
"lastModified": "2024-07-02T10:15:05.333",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Use of implicit intent for sensitive communication in SoftphoneClient in IMS service prior to SMR Jul-2024 Release 1 allows local attackers to get sensitive information."
},
{
"lang": "es",
"value": "El uso de intenci\u00f3n impl\u00edcita para comunicaciones confidenciales en SoftphoneClient en el servicio IMS antes de SMR, julio de 2024, versi\u00f3n 1, permite a atacantes locales obtener informaci\u00f3n confidencial."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "mobile.security@samsung.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.0,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.5,
"impactScore": 1.4
}
]
},
"references": [
{
"url": "https://security.samsungmobile.com/securityUpdate.smsb?year=2024&month=07",
"source": "mobile.security@samsung.com"
}
]
}

View File

@ -0,0 +1,48 @@
{
"id": "CVE-2024-20899",
"sourceIdentifier": "mobile.security@samsung.com",
"published": "2024-07-02T10:15:05.507",
"lastModified": "2024-07-02T10:15:05.507",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Use of implicit intent for sensitive communication in RCS function in IMS service prior to SMR Jul-2024 Release 1 allows local attackers to get sensitive information."
},
{
"lang": "es",
"value": "El uso de intenci\u00f3n impl\u00edcita para comunicaci\u00f3n confidencial en la funci\u00f3n RCS en el servicio IMS antes de SMR, julio de 2024, versi\u00f3n 1, permite a atacantes locales obtener informaci\u00f3n confidencial."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "mobile.security@samsung.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.0,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.5,
"impactScore": 1.4
}
]
},
"references": [
{
"url": "https://security.samsungmobile.com/securityUpdate.smsb?year=2024&month=07",
"source": "mobile.security@samsung.com"
}
]
}

View File

@ -0,0 +1,48 @@
{
"id": "CVE-2024-20900",
"sourceIdentifier": "mobile.security@samsung.com",
"published": "2024-07-02T10:15:05.690",
"lastModified": "2024-07-02T10:15:05.690",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Improper authentication in MTP application prior to SMR Jul-2024 Release 1 allows local attackers to enter MTP mode without proper authentication."
},
{
"lang": "es",
"value": "La autenticaci\u00f3n incorrecta en la aplicaci\u00f3n MTP anterior a SMR Jul-2024 Release 1 permite a atacantes locales ingresar al modo MTP sin la autenticaci\u00f3n adecuada."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "mobile.security@samsung.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N",
"attackVector": "LOCAL",
"attackComplexity": "HIGH",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 4.0,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.4,
"impactScore": 2.5
}
]
},
"references": [
{
"url": "https://security.samsungmobile.com/securityUpdate.smsb?year=2024&month=07",
"source": "mobile.security@samsung.com"
}
]
}

View File

@ -0,0 +1,48 @@
{
"id": "CVE-2024-20901",
"sourceIdentifier": "mobile.security@samsung.com",
"published": "2024-07-02T10:15:05.860",
"lastModified": "2024-07-02T10:15:05.860",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Improper input validation in copying data to buffer cache in libsaped prior to SMR Jul-2024 Release 1 allows local attackers to write out-of-bounds memory."
},
{
"lang": "es",
"value": "La validaci\u00f3n de entrada inadecuada al copiar datos al cach\u00e9 del b\u00fafer en libsaped antes de SMR Jul-2024 Release 1 permite a atacantes locales escribir memoria fuera de los l\u00edmites."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "mobile.security@samsung.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW",
"baseScore": 5.9,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.5,
"impactScore": 3.4
}
]
},
"references": [
{
"url": "https://security.samsungmobile.com/securityUpdate.smsb?year=2024&month=07",
"source": "mobile.security@samsung.com"
}
]
}

View File

@ -0,0 +1,48 @@
{
"id": "CVE-2024-34583",
"sourceIdentifier": "mobile.security@samsung.com",
"published": "2024-07-02T10:15:06.063",
"lastModified": "2024-07-02T10:15:06.063",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Improper access control in system property prior to SMR Jul-2024 Release 1 allows local attackers to get device identifier."
},
{
"lang": "es",
"value": "El control de acceso inadecuado en la propiedad del sistema antes de SMR Jul-2024 Release 1 permite a los atacantes locales obtener el identificador del dispositivo."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "mobile.security@samsung.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.0,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.5,
"impactScore": 1.4
}
]
},
"references": [
{
"url": "https://security.samsungmobile.com/securityUpdate.smsb?year=2024&month=07",
"source": "mobile.security@samsung.com"
}
]
}

View File

@ -0,0 +1,48 @@
{
"id": "CVE-2024-34584",
"sourceIdentifier": "mobile.security@samsung.com",
"published": "2024-07-02T10:15:06.233",
"lastModified": "2024-07-02T10:15:06.233",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Improper privilege management in SumeNNService prior to SMR Jul-2024 Release 1 allows local attackers to start privileged service."
},
{
"lang": "es",
"value": "La gesti\u00f3n inadecuada de privilegios en SumeNNService antes de SMR Jul-2024 Release 1 permite a atacantes locales iniciar un servicio privilegiado."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "mobile.security@samsung.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.4,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.5,
"impactScore": 5.9
}
]
},
"references": [
{
"url": "https://security.samsungmobile.com/securityUpdate.smsb?year=2024&month=07",
"source": "mobile.security@samsung.com"
}
]
}

View File

@ -0,0 +1,48 @@
{
"id": "CVE-2024-34585",
"sourceIdentifier": "mobile.security@samsung.com",
"published": "2024-07-02T10:15:06.400",
"lastModified": "2024-07-02T10:15:06.400",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Improper access control in launchApp of SystemUI prior to SMR Jul-2024 Release 1 allows local attackers to launch privileged activities."
},
{
"lang": "es",
"value": "El control de acceso inadecuado en la aplicaci\u00f3n de lanzamiento de SystemUI anterior a la versi\u00f3n 1 de SMR de julio de 2024 permite a atacantes locales iniciar actividades privilegiadas."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "mobile.security@samsung.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
}
]
},
"references": [
{
"url": "https://security.samsungmobile.com/securityUpdate.smsb?year=2024&month=07",
"source": "mobile.security@samsung.com"
}
]
}

View File

@ -0,0 +1,48 @@
{
"id": "CVE-2024-34586",
"sourceIdentifier": "mobile.security@samsung.com",
"published": "2024-07-02T10:15:06.567",
"lastModified": "2024-07-02T10:15:06.567",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Improper access control in KnoxCustomManagerService prior to SMR Jul-2024 Release 1 allows local attackers to configure Knox privacy policy."
},
{
"lang": "es",
"value": "El control de acceso inadecuado en KnoxCustomManagerService antes de SMR Jul-2024 Release 1 permite a atacantes locales configurar la pol\u00edtica de privacidad de Knox."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "mobile.security@samsung.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW",
"baseScore": 5.9,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.5,
"impactScore": 3.4
}
]
},
"references": [
{
"url": "https://security.samsungmobile.com/securityUpdate.smsb?year=2024&month=07",
"source": "mobile.security@samsung.com"
}
]
}

View File

@ -0,0 +1,48 @@
{
"id": "CVE-2024-34587",
"sourceIdentifier": "mobile.security@samsung.com",
"published": "2024-07-02T10:15:06.730",
"lastModified": "2024-07-02T10:15:06.730",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Improper input validation in parsing application information from RTCP packet in librtp.so prior to SMR Jul-2024 Release 1 allows remote attackers to execute arbitrary code with system privilege. User interaction is required for triggering this vulnerability."
},
{
"lang": "es",
"value": "La validaci\u00f3n de entrada incorrecta al analizar la informaci\u00f3n de la aplicaci\u00f3n del paquete RTCP en librtp.so antes de SMR Jul-2024 Release 1 permite a atacantes remotos ejecutar c\u00f3digo arbitrario con privilegios del sistema. Se requiere la interacci\u00f3n del usuario para activar esta vulnerabilidad."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "mobile.security@samsung.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "HIGH",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 1.6,
"impactScore": 5.9
}
]
},
"references": [
{
"url": "https://security.samsungmobile.com/securityUpdate.smsb?year=2024&month=07",
"source": "mobile.security@samsung.com"
}
]
}

View File

@ -0,0 +1,48 @@
{
"id": "CVE-2024-34588",
"sourceIdentifier": "mobile.security@samsung.com",
"published": "2024-07-02T10:15:06.903",
"lastModified": "2024-07-02T10:15:06.903",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Improper input validation\ud63bin parsing RTCP SR packet in librtp.so prior to SMR Jul-2024 Release 1 allows remote attackers to trigger temporary denial of service. User interaction is required for triggering this vulnerability."
},
{
"lang": "es",
"value": "La validaci\u00f3n de entrada incorrecta al analizar el paquete RTCP SR en librtp.so antes de SMR Jul-2024 Release 1 permite a atacantes remotos desencadenar una denegaci\u00f3n de servicio temporal. Se requiere la interacci\u00f3n del usuario para activar esta vulnerabilidad."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "mobile.security@samsung.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H",
"attackVector": "NETWORK",
"attackComplexity": "HIGH",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH",
"baseScore": 5.3,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.6,
"impactScore": 3.6
}
]
},
"references": [
{
"url": "https://security.samsungmobile.com/securityUpdate.smsb?year=2024&month=07",
"source": "mobile.security@samsung.com"
}
]
}

View File

@ -0,0 +1,48 @@
{
"id": "CVE-2024-34589",
"sourceIdentifier": "mobile.security@samsung.com",
"published": "2024-07-02T10:15:07.073",
"lastModified": "2024-07-02T10:15:07.073",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Improper input validation in parsing RTCP RR packet in librtp.so prior to SMR Jul-2024 Release 1 allows remote attackers to trigger temporary denial of service. User interaction is required for triggering this vulnerability."
},
{
"lang": "es",
"value": "La validaci\u00f3n de entrada incorrecta al analizar el paquete RTCP RR en librtp.so antes de SMR Jul-2024 Release 1 permite a atacantes remotos desencadenar una denegaci\u00f3n de servicio temporal. Se requiere la interacci\u00f3n del usuario para activar esta vulnerabilidad."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "mobile.security@samsung.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H",
"attackVector": "NETWORK",
"attackComplexity": "HIGH",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH",
"baseScore": 5.3,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.6,
"impactScore": 3.6
}
]
},
"references": [
{
"url": "https://security.samsungmobile.com/securityUpdate.smsb?year=2024&month=07",
"source": "mobile.security@samsung.com"
}
]
}

View File

@ -0,0 +1,48 @@
{
"id": "CVE-2024-34590",
"sourceIdentifier": "mobile.security@samsung.com",
"published": "2024-07-02T10:15:07.250",
"lastModified": "2024-07-02T10:15:07.250",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Improper input validation\ud63bin parsing an item type from RTCP SDES packet in librtp.so prior to SMR Jul-2024 Release 1 allows remote attackers to trigger temporary denial of service. User interaction is required for triggering this vulnerability."
},
{
"lang": "es",
"value": "La validaci\u00f3n de entrada incorrecta al analizar un tipo de elemento del paquete RTCP SDES en librtp.so antes de SMR Jul-2024 Release 1 permite a atacantes remotos desencadenar una denegaci\u00f3n de servicio temporal. Se requiere la interacci\u00f3n del usuario para activar esta vulnerabilidad."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "mobile.security@samsung.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H",
"attackVector": "NETWORK",
"attackComplexity": "HIGH",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH",
"baseScore": 5.3,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.6,
"impactScore": 3.6
}
]
},
"references": [
{
"url": "https://security.samsungmobile.com/securityUpdate.smsb?year=2024&month=07",
"source": "mobile.security@samsung.com"
}
]
}

View File

@ -0,0 +1,48 @@
{
"id": "CVE-2024-34591",
"sourceIdentifier": "mobile.security@samsung.com",
"published": "2024-07-02T10:15:07.423",
"lastModified": "2024-07-02T10:15:07.423",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Improper input validation in parsing an item data from RTCP SDES packet in librtp.so prior to SMR Jul-2024 Release 1 allows remote attackers to trigger temporary denial of service. User interaction is required for triggering this vulnerability."
},
{
"lang": "es",
"value": "La validaci\u00f3n de entrada incorrecta al analizar los datos de un elemento del paquete RTCP SDES en librtp.so antes de SMR Jul-2024 Release 1 permite a atacantes remotos desencadenar una denegaci\u00f3n de servicio temporal. Se requiere la interacci\u00f3n del usuario para activar esta vulnerabilidad."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "mobile.security@samsung.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H",
"attackVector": "NETWORK",
"attackComplexity": "HIGH",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH",
"baseScore": 5.3,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.6,
"impactScore": 3.6
}
]
},
"references": [
{
"url": "https://security.samsungmobile.com/securityUpdate.smsb?year=2024&month=07",
"source": "mobile.security@samsung.com"
}
]
}

View File

@ -0,0 +1,48 @@
{
"id": "CVE-2024-34592",
"sourceIdentifier": "mobile.security@samsung.com",
"published": "2024-07-02T10:15:07.600",
"lastModified": "2024-07-02T10:15:07.600",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Improper input validation in parsing RTCP SDES packet in librtp.so prior to SMR Jul-2024 Release 1 allows remote attackers to trigger temporary denial of service. User interaction is required for triggering this vulnerability."
},
{
"lang": "es",
"value": "La validaci\u00f3n de entrada incorrecta al analizar el paquete RTCP SDES en librtp.so antes de SMR Jul-2024 Release 1 permite a atacantes remotos desencadenar una denegaci\u00f3n de servicio temporal. Se requiere la interacci\u00f3n del usuario para activar esta vulnerabilidad."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "mobile.security@samsung.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H",
"attackVector": "NETWORK",
"attackComplexity": "HIGH",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH",
"baseScore": 5.3,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.6,
"impactScore": 3.6
}
]
},
"references": [
{
"url": "https://security.samsungmobile.com/securityUpdate.smsb?year=2024&month=07",
"source": "mobile.security@samsung.com"
}
]
}

View File

@ -0,0 +1,48 @@
{
"id": "CVE-2024-34593",
"sourceIdentifier": "mobile.security@samsung.com",
"published": "2024-07-02T10:15:07.797",
"lastModified": "2024-07-02T10:15:07.797",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Improper input validation in parsing and distributing RTCP packet in librtp.so prior to SMR Jul-2024 Release 1 allows remote attackers to execute arbitrary code with system privilege. User interaction is required for triggering this vulnerability."
},
{
"lang": "es",
"value": "La validaci\u00f3n de entrada inadecuada al analizar y distribuir paquetes RTCP en librtp.so antes de SMR Jul-2024 Release 1 permite a atacantes remotos ejecutar c\u00f3digo arbitrario con privilegios del sistema. Se requiere la interacci\u00f3n del usuario para activar esta vulnerabilidad."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "mobile.security@samsung.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "HIGH",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 1.6,
"impactScore": 5.9
}
]
},
"references": [
{
"url": "https://security.samsungmobile.com/securityUpdate.smsb?year=2024&month=07",
"source": "mobile.security@samsung.com"
}
]
}

View File

@ -0,0 +1,48 @@
{
"id": "CVE-2024-34594",
"sourceIdentifier": "mobile.security@samsung.com",
"published": "2024-07-02T10:15:07.983",
"lastModified": "2024-07-02T10:15:07.983",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Exposure of sensitive information in proc file system prior to SMR Jul-2024 Release 1 allows local attackers to read kernel memory address."
},
{
"lang": "es",
"value": "La exposici\u00f3n de informaci\u00f3n confidencial en el sistema de archivos proc anterior a SMR Jul-2024 Release 1 permite a atacantes locales leer la direcci\u00f3n de memoria del kernel."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "mobile.security@samsung.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5.5,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6
}
]
},
"references": [
{
"url": "https://security.samsungmobile.com/securityUpdate.smsb?year=2024&month=07",
"source": "mobile.security@samsung.com"
}
]
}

View File

@ -0,0 +1,48 @@
{
"id": "CVE-2024-34595",
"sourceIdentifier": "mobile.security@samsung.com",
"published": "2024-07-02T10:15:08.150",
"lastModified": "2024-07-02T10:15:08.150",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Improper access control in clickAdapterItem of SystemUI prior to SMR Jul-2024 Release 1 allows local attackers to launch privileged activities."
},
{
"lang": "es",
"value": "El control de acceso inadecuado en clickAdapterItem de SystemUI anterior a SMR Jul-2024 Release 1 permite a atacantes locales iniciar actividades privilegiadas."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "mobile.security@samsung.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
}
]
},
"references": [
{
"url": "https://security.samsungmobile.com/securityUpdate.smsb?year=2024&month=07",
"source": "mobile.security@samsung.com"
}
]
}

View File

@ -0,0 +1,48 @@
{
"id": "CVE-2024-34596",
"sourceIdentifier": "mobile.security@samsung.com",
"published": "2024-07-02T10:15:08.320",
"lastModified": "2024-07-02T10:15:08.320",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Improper authentication in SmartThings prior to version 1.8.17 allows remote attackers to bypass the expiration date for members set by the owner."
},
{
"lang": "es",
"value": "La autenticaci\u00f3n inadecuada en SmartThings anterior a la versi\u00f3n 1.8.17 permite a atacantes remotos eludir la fecha de vencimiento de los miembros establecida por el propietario."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "mobile.security@samsung.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"attackVector": "NETWORK",
"attackComplexity": "HIGH",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH",
"baseScore": 5.9,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.2,
"impactScore": 3.6
}
]
},
"references": [
{
"url": "https://security.samsungmobile.com/serviceWeb.smsb?year=2024&month=07",
"source": "mobile.security@samsung.com"
}
]
}

View File

@ -0,0 +1,48 @@
{
"id": "CVE-2024-34597",
"sourceIdentifier": "mobile.security@samsung.com",
"published": "2024-07-02T10:15:08.487",
"lastModified": "2024-07-02T10:15:08.487",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Improper input validation in Samsung Health prior to version 6.27.0.113 allows local attackers to write arbitrary document files to the sandbox of Samsung Health. User interaction is required for triggering this vulnerability."
},
{
"lang": "es",
"value": "La validaci\u00f3n de entrada incorrecta en Samsung Health anterior a la versi\u00f3n 6.27.0.113 permite a atacantes locales escribir archivos de documentos arbitrarios en la sandbox de Samsung Health. Se requiere la interacci\u00f3n del usuario para activar esta vulnerabilidad."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "mobile.security@samsung.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"availabilityImpact": "LOW",
"baseScore": 4.4,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.8,
"impactScore": 2.5
}
]
},
"references": [
{
"url": "https://security.samsungmobile.com/serviceWeb.smsb?year=2024&month=07",
"source": "mobile.security@samsung.com"
}
]
}

View File

@ -0,0 +1,48 @@
{
"id": "CVE-2024-34599",
"sourceIdentifier": "mobile.security@samsung.com",
"published": "2024-07-02T10:15:08.650",
"lastModified": "2024-07-02T10:15:08.650",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Improper input validation in Tips prior to version 6.2.9.4 in Android 14 allows local attacker to send broadcast with Tips' privilege."
},
{
"lang": "es",
"value": "La validaci\u00f3n de entrada incorrecta en Tips anteriores a la versi\u00f3n 6.2.9.4 en Android 14 permite a un atacante local enviar transmisiones con Tips' privilegio."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "mobile.security@samsung.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.0,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.5,
"impactScore": 1.4
}
]
},
"references": [
{
"url": "https://security.samsungmobile.com/serviceWeb.smsb?year=2024&month=07",
"source": "mobile.security@samsung.com"
}
]
}

View File

@ -0,0 +1,48 @@
{
"id": "CVE-2024-34600",
"sourceIdentifier": "mobile.security@samsung.com",
"published": "2024-07-02T10:15:08.813",
"lastModified": "2024-07-02T10:15:08.813",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Improper verification of intent by broadcast receiver vulnerability in Samsung Flow prior to version 4.9.13.0 allows local attackers to copy image files to external storage."
},
{
"lang": "es",
"value": "La verificaci\u00f3n inadecuada de la intenci\u00f3n mediante la vulnerabilidad del receptor de transmisi\u00f3n en Samsung Flow anterior a la versi\u00f3n 4.9.13.0 permite a atacantes locales copiar archivos de im\u00e1genes a un almacenamiento externo."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "mobile.security@samsung.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"availabilityImpact": "LOW",
"baseScore": 4.4,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.8,
"impactScore": 2.5
}
]
},
"references": [
{
"url": "https://security.samsungmobile.com/serviceWeb.smsb?year=2024&month=07",
"source": "mobile.security@samsung.com"
}
]
}

View File

@ -0,0 +1,48 @@
{
"id": "CVE-2024-34601",
"sourceIdentifier": "mobile.security@samsung.com",
"published": "2024-07-02T10:15:08.980",
"lastModified": "2024-07-02T10:15:08.980",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Improper verification of intent by broadcast receiver vulnerability in GalaxyStore prior to version 4.5.81.0 allows local attackers to launch unexported activities of GalaxyStore."
},
{
"lang": "es",
"value": "La verificaci\u00f3n inadecuada de la intenci\u00f3n mediante la vulnerabilidad del receptor de transmisi\u00f3n en GalaxyStore antes de la versi\u00f3n 4.5.81.0 permite a atacantes locales lanzar actividades no exportadas de GalaxyStore."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "mobile.security@samsung.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW",
"baseScore": 5.9,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.5,
"impactScore": 3.4
}
]
},
"references": [
{
"url": "https://security.samsungmobile.com/serviceWeb.smsb?year=2024&month=07",
"source": "mobile.security@samsung.com"
}
]
}

View File

@ -0,0 +1,88 @@
{
"id": "CVE-2024-4268",
"sourceIdentifier": "security@wordfence.com",
"published": "2024-07-02T11:15:10.250",
"lastModified": "2024-07-02T11:15:10.250",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The Ultimate Blocks \u2013 WordPress Blocks Plugin plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's blocks in all versions up to, and including, 3.1.9 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security@wordfence.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 6.4,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 3.1,
"impactScore": 2.7
}
]
},
"references": [
{
"url": "https://gist.github.com/webber-naut/0a8a4f810da286392a43c4614d31712e",
"source": "security@wordfence.com"
},
{
"url": "https://plugins.trac.wordpress.org/browser/ultimate-blocks/trunk/src/blocks/advanced-heading/block.php",
"source": "security@wordfence.com"
},
{
"url": "https://plugins.trac.wordpress.org/browser/ultimate-blocks/trunk/src/blocks/how-to/block.php",
"source": "security@wordfence.com"
},
{
"url": "https://plugins.trac.wordpress.org/browser/ultimate-blocks/trunk/src/blocks/image-slider/block.php",
"source": "security@wordfence.com"
},
{
"url": "https://plugins.trac.wordpress.org/browser/ultimate-blocks/trunk/src/blocks/styled-box/block.php",
"source": "security@wordfence.com"
},
{
"url": "https://plugins.trac.wordpress.org/browser/ultimate-blocks/trunk/src/blocks/testimonial/block.php",
"source": "security@wordfence.com"
},
{
"url": "https://plugins.trac.wordpress.org/browser/ultimate-blocks/trunk/src/extensions/custom-css/class-custom-css.php?rev=3102541#L173",
"source": "security@wordfence.com"
},
{
"url": "https://plugins.trac.wordpress.org/changeset/3075315/ultimate-blocks",
"source": "security@wordfence.com"
},
{
"url": "https://plugins.trac.wordpress.org/changeset/3108401/",
"source": "security@wordfence.com"
},
{
"url": "https://wordpress.org/plugins/ultimate-blocks/#developers",
"source": "security@wordfence.com"
},
{
"url": "https://www.dropbox.com/scl/fi/zh7t1qsvxkxk2dfhwd7nn/Ultimate-Blocks-Stored-XSS_POC_4.20.24.mov?rlkey=ws16dcu7f6mjd3h9emsqev7jm&e=2&st=fdr7q9h7&dl=0",
"source": "security@wordfence.com"
},
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/00b60b53-77bf-4640-bf2b-84e011014623?source=cve",
"source": "security@wordfence.com"
}
]
}

View File

@ -9,6 +9,10 @@
{
"lang": "en",
"value": "The Sina Extension for Elementor (Slider, Gallery, Form, Modal, Data Table, Tab, Particle, Free Elementor Widgets & Elementor Templates) plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the \u2018read_more_text\u2019 parameter in all versions up to, and including, 3.5.5 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page."
},
{
"lang": "es",
"value": "El complemento Sina Extension for Elementor (Slider, Gallery, Form, Modal, Data Table, Tab, Particle, Free Elementor Widgets & Elementor Templates) para WordPress es vulnerable a Cross-Site Scripting Almacenado a trav\u00e9s del par\u00e1metro 'read_more_text' en todas las versiones hasta, e incluido, 3.5.5 debido a una sanitizaci\u00f3n insuficiente de los insumos y al escape de los productos. Esto hace posible que atacantes autenticados, con acceso de nivel de Colaborador y superior, inyecten scripts web arbitrarios en p\u00e1ginas que se ejecutar\u00e1n cada vez que un usuario acceda a una p\u00e1gina inyectada."
}
],
"metrics": {

View File

@ -0,0 +1,64 @@
{
"id": "CVE-2024-6011",
"sourceIdentifier": "security@wordfence.com",
"published": "2024-07-02T10:15:09.170",
"lastModified": "2024-07-02T10:15:09.170",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The Cost Calculator Builder plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the \u2018textarea.description\u2019 parameter in all versions up to, and including, 3.2.12 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Administrator-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page."
},
{
"lang": "es",
"value": "El complemento Cost Calculator Builder para WordPress es vulnerable a Cross-Site Scripting Almacenado a trav\u00e9s del par\u00e1metro 'textarea.description' en todas las versiones hasta la 3.2.12 incluida debido a una sanitizaci\u00f3n de entrada y un escape de salida insuficientes. Esto hace posible que atacantes autenticados, con acceso de nivel de administrador y superior, inyecten scripts web arbitrarios en p\u00e1ginas que se ejecutar\u00e1n cada vez que un usuario acceda a una p\u00e1gina inyectada."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security@wordfence.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:C/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "HIGH",
"privilegesRequired": "HIGH",
"userInteraction": "NONE",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 4.4,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.3,
"impactScore": 2.7
}
]
},
"references": [
{
"url": "https://drive.google.com/file/d/1SFQXlRUQw7THm_Vay_pFH3pIX1cjH4AY/view?usp=sharing",
"source": "security@wordfence.com"
},
{
"url": "https://plugins.trac.wordpress.org/browser/cost-calculator-builder/trunk/templates/frontend/fields/cost-text.php#L15",
"source": "security@wordfence.com"
},
{
"url": "https://plugins.trac.wordpress.org/browser/cost-calculator-builder/trunk/templates/frontend/fields/cost-text.php#L26",
"source": "security@wordfence.com"
},
{
"url": "https://plugins.trac.wordpress.org/changeset/3108606/",
"source": "security@wordfence.com"
},
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/03ad3677-1b02-4f22-af50-e88b2ec83f54?source=cve",
"source": "security@wordfence.com"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2024-6012",
"sourceIdentifier": "security@wordfence.com",
"published": "2024-07-02T10:15:09.367",
"lastModified": "2024-07-02T10:15:09.367",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The Cost Calculator Builder plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the 'embed-create-page' and 'embed-insert-pages' functions in all versions up to, and including, 3.2.12. This makes it possible for authenticated attackers, with Subscriber-level access and above, to create arbitrary posts and append arbitrary content to existing posts."
},
{
"lang": "es",
"value": "El complemento Cost Calculator Builder para WordPress es vulnerable a modificaciones no autorizadas de datos debido a una falta de verificaci\u00f3n de capacidad en las funciones 'embed-create-page' e 'embed-insert-pages' en todas las versiones hasta la 3.2.12 incluida. Esto hace posible que atacantes autenticados, con acceso de nivel de suscriptor y superior, creen publicaciones arbitrarias y agreguen contenido arbitrario a publicaciones existentes."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security@wordfence.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 1.4
}
]
},
"references": [
{
"url": "https://plugins.trac.wordpress.org/browser/cost-calculator-builder/trunk/frontend/dist/admin.js",
"source": "security@wordfence.com"
},
{
"url": "https://plugins.trac.wordpress.org/changeset/3108606/",
"source": "security@wordfence.com"
},
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/fd7da039-f6b8-46b7-a43a-145e9f8844c3?source=cve",
"source": "security@wordfence.com"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2024-6088",
"sourceIdentifier": "security@wordfence.com",
"published": "2024-07-02T11:15:10.463",
"lastModified": "2024-07-02T11:15:10.463",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The LearnPress \u2013 WordPress LMS Plugin plugin for WordPress is vulnerable to unauthorized user registration due to a missing capability check on the 'register' function in all versions up to, and including, 4.2.6.8.1. This makes it possible for unauthenticated attackers to bypass disabled user registration to create a new account with the default role."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security@wordfence.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5.3,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 3.9,
"impactScore": 1.4
}
]
},
"references": [
{
"url": "https://plugins.trac.wordpress.org/browser/learnpress/tags/4.2.6.8.1/inc/class-lp-forms-handler.php#L235",
"source": "security@wordfence.com"
},
{
"url": "https://plugins.trac.wordpress.org/browser/learnpress/tags/4.2.6.8.1/inc/jwt/includes/class-jwt-public.php#L127",
"source": "security@wordfence.com"
},
{
"url": "https://plugins.trac.wordpress.org/changeset/3109339/",
"source": "security@wordfence.com"
},
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/04e0ddff-16af-4c85-b5b0-cf767684ee08?source=cve",
"source": "security@wordfence.com"
}
]
}

View File

@ -0,0 +1,52 @@
{
"id": "CVE-2024-6099",
"sourceIdentifier": "security@wordfence.com",
"published": "2024-07-02T11:15:10.650",
"lastModified": "2024-07-02T11:15:10.650",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The LearnPress \u2013 WordPress LMS Plugin plugin for WordPress is vulnerable to unauthenticated bypass to user registration in versions up to, and including, 4.2.6.8.1. This is due to missing checks in the 'check_validate_fields' function in the checkout. This makes it possible for unauthenticated attackers to register as the default role on the site, even if registration is disabled."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security@wordfence.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5.3,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 3.9,
"impactScore": 1.4
}
]
},
"references": [
{
"url": "https://plugins.trac.wordpress.org/browser/learnpress/tags/4.2.6.8.1/inc/class-lp-checkout.php#L124",
"source": "security@wordfence.com"
},
{
"url": "https://plugins.trac.wordpress.org/changeset/3109339/",
"source": "security@wordfence.com"
},
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/7ee714c7-4c9b-4627-9ba9-f83aeca6a0a5?source=cve",
"source": "security@wordfence.com"
}
]
}

View File

@ -0,0 +1,60 @@
{
"id": "CVE-2024-6264",
"sourceIdentifier": "security@wordfence.com",
"published": "2024-07-02T11:15:10.840",
"lastModified": "2024-07-02T11:15:10.840",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The Post Meta Data Manager plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the \u2018$meta_key\u2019 parameter in all versions up to, and including, 1.2.3 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security@wordfence.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 6.4,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 3.1,
"impactScore": 2.7
}
]
},
"references": [
{
"url": "https://plugins.trac.wordpress.org/browser/post-meta-data-manager/trunk/includes/admin/html/pmdm_wp_display_post_metadata_html.php#L23",
"source": "security@wordfence.com"
},
{
"url": "https://plugins.trac.wordpress.org/browser/post-meta-data-manager/trunk/includes/admin/html/pmdm_wp_display_term_metadata_html.php#L32",
"source": "security@wordfence.com"
},
{
"url": "https://plugins.trac.wordpress.org/browser/post-meta-data-manager/trunk/includes/admin/html/pmdm_wp_display_user_metadata_html.php#L31",
"source": "security@wordfence.com"
},
{
"url": "https://plugins.trac.wordpress.org/changeset/3109558/",
"source": "security@wordfence.com"
},
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/9dd6828b-6235-4284-bce6-be23b79ac70e?source=cve",
"source": "security@wordfence.com"
}
]
}

View File

@ -0,0 +1,137 @@
{
"id": "CVE-2024-6438",
"sourceIdentifier": "cna@vuldb.com",
"published": "2024-07-02T11:15:11.027",
"lastModified": "2024-07-02T11:15:11.027",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability has been found in Hitout Carsale 1.0 and classified as critical. This vulnerability affects unknown code of the file OrderController.java. The manipulation of the argument orderBy leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. VDB-270166 is the identifier assigned to this vulnerability."
}
],
"metrics": {
"cvssMetricV40": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "4.0",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"vulnerableSystemConfidentiality": "LOW",
"vulnerableSystemIntegrity": "LOW",
"vulnerableSystemAvailability": "LOW",
"subsequentSystemConfidentiality": "NONE",
"subsequentSystemIntegrity": "NONE",
"subsequentSystemAvailability": "NONE",
"exploitMaturity": "NOT_DEFINED",
"confidentialityRequirements": "NOT_DEFINED",
"integrityRequirements": "NOT_DEFINED",
"availabilityRequirements": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnerableSystemConfidentiality": "NOT_DEFINED",
"modifiedVulnerableSystemIntegrity": "NOT_DEFINED",
"modifiedVulnerableSystemAvailability": "NOT_DEFINED",
"modifiedSubsequentSystemConfidentiality": "NOT_DEFINED",
"modifiedSubsequentSystemIntegrity": "NOT_DEFINED",
"modifiedSubsequentSystemAvailability": "NOT_DEFINED",
"safety": "NOT_DEFINED",
"automatable": "NOT_DEFINED",
"recovery": "NOT_DEFINED",
"valueDensity": "NOT_DEFINED",
"vulnerabilityResponseEffort": "NOT_DEFINED",
"providerUrgency": "NOT_DEFINED",
"baseScore": 5.3,
"baseSeverity": "MEDIUM"
}
}
],
"cvssMetricV31": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW",
"baseScore": 6.3,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 3.4
}
],
"cvssMetricV2": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P",
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "SINGLE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"availabilityImpact": "PARTIAL",
"baseScore": 6.5
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 8.0,
"impactScore": 6.4,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-89"
}
]
}
],
"references": [
{
"url": "https://github.com/Hitout/carsale/issues/23",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?ctiid.270166",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?id.270166",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?submit.366239",
"source": "cna@vuldb.com"
}
]
}

View File

@ -0,0 +1,137 @@
{
"id": "CVE-2024-6439",
"sourceIdentifier": "cna@vuldb.com",
"published": "2024-07-02T11:15:11.523",
"lastModified": "2024-07-02T11:15:11.523",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability was found in SourceCodester Home Owners Collection Management System 1.0 and classified as critical. This issue affects some unknown processing of the file /classes/Users.php?f=save. The manipulation of the argument img leads to unrestricted upload. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-270167."
}
],
"metrics": {
"cvssMetricV40": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "4.0",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"vulnerableSystemConfidentiality": "LOW",
"vulnerableSystemIntegrity": "LOW",
"vulnerableSystemAvailability": "LOW",
"subsequentSystemConfidentiality": "NONE",
"subsequentSystemIntegrity": "NONE",
"subsequentSystemAvailability": "NONE",
"exploitMaturity": "NOT_DEFINED",
"confidentialityRequirements": "NOT_DEFINED",
"integrityRequirements": "NOT_DEFINED",
"availabilityRequirements": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnerableSystemConfidentiality": "NOT_DEFINED",
"modifiedVulnerableSystemIntegrity": "NOT_DEFINED",
"modifiedVulnerableSystemAvailability": "NOT_DEFINED",
"modifiedSubsequentSystemConfidentiality": "NOT_DEFINED",
"modifiedSubsequentSystemIntegrity": "NOT_DEFINED",
"modifiedSubsequentSystemAvailability": "NOT_DEFINED",
"safety": "NOT_DEFINED",
"automatable": "NOT_DEFINED",
"recovery": "NOT_DEFINED",
"valueDensity": "NOT_DEFINED",
"vulnerabilityResponseEffort": "NOT_DEFINED",
"providerUrgency": "NOT_DEFINED",
"baseScore": 5.3,
"baseSeverity": "MEDIUM"
}
}
],
"cvssMetricV31": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW",
"baseScore": 6.3,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 3.4
}
],
"cvssMetricV2": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P",
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "SINGLE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"availabilityImpact": "PARTIAL",
"baseScore": 6.5
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 8.0,
"impactScore": 6.4,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-434"
}
]
}
],
"references": [
{
"url": "https://github.com/GAO-UNO/cve/blob/main/upload.md",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?ctiid.270167",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?id.270167",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?submit.366753",
"source": "cna@vuldb.com"
}
]
}

View File

@ -0,0 +1,137 @@
{
"id": "CVE-2024-6440",
"sourceIdentifier": "cna@vuldb.com",
"published": "2024-07-02T11:15:11.783",
"lastModified": "2024-07-02T11:15:11.783",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability was found in SourceCodester Home Owners Collection Management System 1.0. It has been classified as critical. Affected is an unknown function of the file /classes/Master.php?f=delete_category. The manipulation of the argument id leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-270168."
}
],
"metrics": {
"cvssMetricV40": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "4.0",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"vulnerableSystemConfidentiality": "LOW",
"vulnerableSystemIntegrity": "LOW",
"vulnerableSystemAvailability": "LOW",
"subsequentSystemConfidentiality": "NONE",
"subsequentSystemIntegrity": "NONE",
"subsequentSystemAvailability": "NONE",
"exploitMaturity": "NOT_DEFINED",
"confidentialityRequirements": "NOT_DEFINED",
"integrityRequirements": "NOT_DEFINED",
"availabilityRequirements": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnerableSystemConfidentiality": "NOT_DEFINED",
"modifiedVulnerableSystemIntegrity": "NOT_DEFINED",
"modifiedVulnerableSystemAvailability": "NOT_DEFINED",
"modifiedSubsequentSystemConfidentiality": "NOT_DEFINED",
"modifiedSubsequentSystemIntegrity": "NOT_DEFINED",
"modifiedSubsequentSystemAvailability": "NOT_DEFINED",
"safety": "NOT_DEFINED",
"automatable": "NOT_DEFINED",
"recovery": "NOT_DEFINED",
"valueDensity": "NOT_DEFINED",
"vulnerabilityResponseEffort": "NOT_DEFINED",
"providerUrgency": "NOT_DEFINED",
"baseScore": 5.3,
"baseSeverity": "MEDIUM"
}
}
],
"cvssMetricV31": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW",
"baseScore": 6.3,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 3.4
}
],
"cvssMetricV2": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P",
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "SINGLE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"availabilityImpact": "PARTIAL",
"baseScore": 6.5
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 8.0,
"impactScore": 6.4,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-89"
}
]
}
],
"references": [
{
"url": "https://github.com/reverseD0G/cve/blob/main/sql.md",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?ctiid.270168",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?id.270168",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?submit.366988",
"source": "cna@vuldb.com"
}
]
}

View File

@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours.
### Last Repository Update
```plain
2024-07-02T10:03:14.646623+00:00
2024-07-02T12:02:54.241450+00:00
```
### Most recent CVE Modification Timestamp synchronized with NVD
```plain
2024-07-02T09:15:19.780000+00:00
2024-07-02T11:15:11.783000+00:00
```
### Last Data Feed Release
@ -33,44 +33,45 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
### Total Number of included CVEs
```plain
255685
255726
```
### CVEs added in the last Commit
Recently added CVEs: `29`
Recently added CVEs: `41`
- [CVE-2023-41921](CVE-2023/CVE-2023-419xx/CVE-2023-41921.json) (`2024-07-02T08:15:04.160`)
- [CVE-2023-41922](CVE-2023/CVE-2023-419xx/CVE-2023-41922.json) (`2024-07-02T08:15:04.373`)
- [CVE-2023-41923](CVE-2023/CVE-2023-419xx/CVE-2023-41923.json) (`2024-07-02T08:15:04.573`)
- [CVE-2023-41926](CVE-2023/CVE-2023-419xx/CVE-2023-41926.json) (`2024-07-02T08:15:04.773`)
- [CVE-2023-41927](CVE-2023/CVE-2023-419xx/CVE-2023-41927.json) (`2024-07-02T08:15:04.973`)
- [CVE-2023-41928](CVE-2023/CVE-2023-419xx/CVE-2023-41928.json) (`2024-07-02T08:15:05.153`)
- [CVE-2024-31071](CVE-2024/CVE-2024-310xx/CVE-2024-31071.json) (`2024-07-02T09:15:18.087`)
- [CVE-2024-3513](CVE-2024/CVE-2024-35xx/CVE-2024-3513.json) (`2024-07-02T08:15:06.600`)
- [CVE-2024-36243](CVE-2024/CVE-2024-362xx/CVE-2024-36243.json) (`2024-07-02T09:15:18.323`)
- [CVE-2024-36260](CVE-2024/CVE-2024-362xx/CVE-2024-36260.json) (`2024-07-02T09:15:18.557`)
- [CVE-2024-36278](CVE-2024/CVE-2024-362xx/CVE-2024-36278.json) (`2024-07-02T09:15:18.757`)
- [CVE-2024-37030](CVE-2024/CVE-2024-370xx/CVE-2024-37030.json) (`2024-07-02T09:15:18.963`)
- [CVE-2024-37077](CVE-2024/CVE-2024-370xx/CVE-2024-37077.json) (`2024-07-02T09:15:19.157`)
- [CVE-2024-37126](CVE-2024/CVE-2024-371xx/CVE-2024-37126.json) (`2024-07-02T08:15:05.347`)
- [CVE-2024-37132](CVE-2024/CVE-2024-371xx/CVE-2024-37132.json) (`2024-07-02T08:15:05.553`)
- [CVE-2024-37133](CVE-2024/CVE-2024-371xx/CVE-2024-37133.json) (`2024-07-02T08:15:05.773`)
- [CVE-2024-37134](CVE-2024/CVE-2024-371xx/CVE-2024-37134.json) (`2024-07-02T08:15:05.980`)
- [CVE-2024-37185](CVE-2024/CVE-2024-371xx/CVE-2024-37185.json) (`2024-07-02T09:15:19.353`)
- [CVE-2024-37479](CVE-2024/CVE-2024-374xx/CVE-2024-37479.json) (`2024-07-02T08:15:06.190`)
- [CVE-2024-38857](CVE-2024/CVE-2024-388xx/CVE-2024-38857.json) (`2024-07-02T08:15:06.387`)
- [CVE-2024-4836](CVE-2024/CVE-2024-48xx/CVE-2024-4836.json) (`2024-07-02T09:15:19.553`)
- [CVE-2024-5260](CVE-2024/CVE-2024-52xx/CVE-2024-5260.json) (`2024-07-02T09:15:19.780`)
- [CVE-2024-5504](CVE-2024/CVE-2024-55xx/CVE-2024-5504.json) (`2024-07-02T08:15:06.793`)
- [CVE-2024-5544](CVE-2024/CVE-2024-55xx/CVE-2024-5544.json) (`2024-07-02T08:15:06.997`)
- [CVE-2024-5545](CVE-2024/CVE-2024-55xx/CVE-2024-5545.json) (`2024-07-02T08:15:07.190`)
- [CVE-2024-34585](CVE-2024/CVE-2024-345xx/CVE-2024-34585.json) (`2024-07-02T10:15:06.400`)
- [CVE-2024-34586](CVE-2024/CVE-2024-345xx/CVE-2024-34586.json) (`2024-07-02T10:15:06.567`)
- [CVE-2024-34587](CVE-2024/CVE-2024-345xx/CVE-2024-34587.json) (`2024-07-02T10:15:06.730`)
- [CVE-2024-34588](CVE-2024/CVE-2024-345xx/CVE-2024-34588.json) (`2024-07-02T10:15:06.903`)
- [CVE-2024-34589](CVE-2024/CVE-2024-345xx/CVE-2024-34589.json) (`2024-07-02T10:15:07.073`)
- [CVE-2024-34590](CVE-2024/CVE-2024-345xx/CVE-2024-34590.json) (`2024-07-02T10:15:07.250`)
- [CVE-2024-34591](CVE-2024/CVE-2024-345xx/CVE-2024-34591.json) (`2024-07-02T10:15:07.423`)
- [CVE-2024-34592](CVE-2024/CVE-2024-345xx/CVE-2024-34592.json) (`2024-07-02T10:15:07.600`)
- [CVE-2024-34593](CVE-2024/CVE-2024-345xx/CVE-2024-34593.json) (`2024-07-02T10:15:07.797`)
- [CVE-2024-34594](CVE-2024/CVE-2024-345xx/CVE-2024-34594.json) (`2024-07-02T10:15:07.983`)
- [CVE-2024-34595](CVE-2024/CVE-2024-345xx/CVE-2024-34595.json) (`2024-07-02T10:15:08.150`)
- [CVE-2024-34596](CVE-2024/CVE-2024-345xx/CVE-2024-34596.json) (`2024-07-02T10:15:08.320`)
- [CVE-2024-34597](CVE-2024/CVE-2024-345xx/CVE-2024-34597.json) (`2024-07-02T10:15:08.487`)
- [CVE-2024-34599](CVE-2024/CVE-2024-345xx/CVE-2024-34599.json) (`2024-07-02T10:15:08.650`)
- [CVE-2024-34600](CVE-2024/CVE-2024-346xx/CVE-2024-34600.json) (`2024-07-02T10:15:08.813`)
- [CVE-2024-34601](CVE-2024/CVE-2024-346xx/CVE-2024-34601.json) (`2024-07-02T10:15:08.980`)
- [CVE-2024-4268](CVE-2024/CVE-2024-42xx/CVE-2024-4268.json) (`2024-07-02T11:15:10.250`)
- [CVE-2024-6011](CVE-2024/CVE-2024-60xx/CVE-2024-6011.json) (`2024-07-02T10:15:09.170`)
- [CVE-2024-6012](CVE-2024/CVE-2024-60xx/CVE-2024-6012.json) (`2024-07-02T10:15:09.367`)
- [CVE-2024-6088](CVE-2024/CVE-2024-60xx/CVE-2024-6088.json) (`2024-07-02T11:15:10.463`)
- [CVE-2024-6099](CVE-2024/CVE-2024-60xx/CVE-2024-6099.json) (`2024-07-02T11:15:10.650`)
- [CVE-2024-6264](CVE-2024/CVE-2024-62xx/CVE-2024-6264.json) (`2024-07-02T11:15:10.840`)
- [CVE-2024-6438](CVE-2024/CVE-2024-64xx/CVE-2024-6438.json) (`2024-07-02T11:15:11.027`)
- [CVE-2024-6439](CVE-2024/CVE-2024-64xx/CVE-2024-6439.json) (`2024-07-02T11:15:11.523`)
- [CVE-2024-6440](CVE-2024/CVE-2024-64xx/CVE-2024-6440.json) (`2024-07-02T11:15:11.783`)
### CVEs modified in the last Commit
Recently modified CVEs: `0`
Recently modified CVEs: `1`
- [CVE-2024-5260](CVE-2024/CVE-2024-52xx/CVE-2024-5260.json) (`2024-07-02T09:15:19.780`)
## Download and Usage

View File

@ -231270,17 +231270,17 @@ CVE-2023-41911,0,0,c370f1652ab4a7704bdb8c1c18b508b07e9446ea3a6134c45133ba3207c3b
CVE-2023-41913,0,0,ac6a5dec8a2ef981599760c1bd584c0a3e1984d30935032e705f83162150cb05,2024-06-11T04:15:10.863000
CVE-2023-41914,0,0,27c5c2c3c84cd968ddce119075b7bda7c87709505c9fb5104442489dec8eacba,2023-11-09T22:11:29.870000
CVE-2023-41915,0,0,6f98a3967a35a3981301df9522094adc983487e955c89af8c2ce098770114116,2024-01-09T03:14:55.743000
CVE-2023-41917,1,1,75a00a950661871ca70b2157c2431e4a36beb7d5658bc033c4d35ca5acc0374b,2024-07-02T08:15:03.247000
CVE-2023-41918,1,1,c2383288126007043fec82b0f8437af2f865f9316a92100e9f22f6c01da45eb2,2024-07-02T08:15:03.490000
CVE-2023-41919,1,1,102c9892e1d928393c0c51094da3fc1ce7fd8cb1356c612a65a5a28b2dbcdcae,2024-07-02T08:15:03.680000
CVE-2023-41917,0,0,75a00a950661871ca70b2157c2431e4a36beb7d5658bc033c4d35ca5acc0374b,2024-07-02T08:15:03.247000
CVE-2023-41918,0,0,c2383288126007043fec82b0f8437af2f865f9316a92100e9f22f6c01da45eb2,2024-07-02T08:15:03.490000
CVE-2023-41919,0,0,102c9892e1d928393c0c51094da3fc1ce7fd8cb1356c612a65a5a28b2dbcdcae,2024-07-02T08:15:03.680000
CVE-2023-4192,0,0,8f2f20cfbddfb9517a03eb2b1684aa1e1baae715b28b8e6aa49f25d0f9a3982a,2024-05-17T02:31:25.590000
CVE-2023-41920,1,1,075d1d09048aa471bd08834b622c2fcb6cd3ee0ec777784a6282c72b9f7bfbe2,2024-07-02T08:15:03.950000
CVE-2023-41921,1,1,2b6fb6f1125af508c6eb1057eb5ed8d6a160a0dca66da60ef4ac4df7b849c3e6,2024-07-02T08:15:04.160000
CVE-2023-41922,1,1,df72d6595e4166db6f04fc4b4dba388ecee2eacd16fea87a09b63f399a749555,2024-07-02T08:15:04.373000
CVE-2023-41923,1,1,2a2a780eb1387d1fea6de9e4c05f43e5489ab154290d21e3e7957ebfbfe36b25,2024-07-02T08:15:04.573000
CVE-2023-41926,1,1,990d62fee0a2918e883ac548120cdf2dc153607ceb9bc0b90e4e7eea004b6ad0,2024-07-02T08:15:04.773000
CVE-2023-41927,1,1,e2e3b8e3066ade08cdb58df489a199f4760a7584cffb544d82b3336b25d25ba9,2024-07-02T08:15:04.973000
CVE-2023-41928,1,1,07135084ba8ee45eb74cf9d47b84a0c92b0d30593fcfb0572a7850e3260ecd08,2024-07-02T08:15:05.153000
CVE-2023-41920,0,0,075d1d09048aa471bd08834b622c2fcb6cd3ee0ec777784a6282c72b9f7bfbe2,2024-07-02T08:15:03.950000
CVE-2023-41921,0,0,2b6fb6f1125af508c6eb1057eb5ed8d6a160a0dca66da60ef4ac4df7b849c3e6,2024-07-02T08:15:04.160000
CVE-2023-41922,0,0,df72d6595e4166db6f04fc4b4dba388ecee2eacd16fea87a09b63f399a749555,2024-07-02T08:15:04.373000
CVE-2023-41923,0,0,2a2a780eb1387d1fea6de9e4c05f43e5489ab154290d21e3e7957ebfbfe36b25,2024-07-02T08:15:04.573000
CVE-2023-41926,0,0,990d62fee0a2918e883ac548120cdf2dc153607ceb9bc0b90e4e7eea004b6ad0,2024-07-02T08:15:04.773000
CVE-2023-41927,0,0,e2e3b8e3066ade08cdb58df489a199f4760a7584cffb544d82b3336b25d25ba9,2024-07-02T08:15:04.973000
CVE-2023-41928,0,0,07135084ba8ee45eb74cf9d47b84a0c92b0d30593fcfb0572a7850e3260ecd08,2024-07-02T08:15:05.153000
CVE-2023-41929,0,0,00c6c5e803c495fa4361734a029180d7674e5e606a3dff28993b4211a0f69d2e,2023-09-21T15:27:38.020000
CVE-2023-4193,0,0,c5d71b74400789b0f2d3e7c374e733f3fa1a7a5763d02dbf603f8b5c5d597c80,2024-05-17T02:31:25.693000
CVE-2023-41930,0,0,e9174799687aa009ad856ef47d0f65b7aabb316fab23cc536508868c821cffad,2023-09-11T19:23:34.093000
@ -242844,7 +242844,21 @@ CVE-2024-20884,0,0,4ef132ff87bd8a9c9523317a196215cc86b34be55ad765a26c5bddbd57b0b
CVE-2024-20885,0,0,3ee08db8f0e4a20dd5c2f29a1d78d8af0c5e7aec5b083ecf2f8fb83cab587a25,2024-06-04T16:57:41.053000
CVE-2024-20886,0,0,0a1a939d07ac6fea7c6a5a525a557520367bda61cb7993f5fa76b2974a833911,2024-06-04T16:57:41.053000
CVE-2024-20887,0,0,f12783d6926e745ed51bbf0afd7d9fbe1365b2ac40ae720af63c4e36b7a08f85,2024-06-04T16:57:41.053000
CVE-2024-20888,1,1,45c1f8b3a0e2b5241c3268975c4351f1394070b455f5e0f6b13d6b8645d831fb,2024-07-02T10:15:03.133000
CVE-2024-20889,1,1,ed6278b6d34b749b8a383fe5843487401c0d19160684893d161d4c60f66bbce6,2024-07-02T10:15:03.767000
CVE-2024-2089,0,0,96f25c0b661864f2faa4ebe0c7639379fe17dd1bd7ce5242853acf390f1ca579,2024-05-30T13:15:41.297000
CVE-2024-20890,1,1,27a1ddbb317ddaf9a2ec7fddd2ba8cc160ff101c75274795a0c44cb778e82b98,2024-07-02T10:15:03.947000
CVE-2024-20891,1,1,0c71353808b171ca7976b4bf5b01d4a3900c3813d45d6cbc33ff74aaf7c42f2f,2024-07-02T10:15:04.113000
CVE-2024-20892,1,1,b43c9cb337f8047759bbc30e192b92aa77db601ff413d7d5e3498baa761b8345,2024-07-02T10:15:04.283000
CVE-2024-20893,1,1,35b0ee37f14912db3541ef4816e5f0b90e39896c2968a25a847ca66c386c91ac,2024-07-02T10:15:04.457000
CVE-2024-20894,1,1,a449d75e6a5cb9d45d141565e6addc39da688ff144b4e17ec9d91b342b26691c,2024-07-02T10:15:04.630000
CVE-2024-20895,1,1,e896c77c7fb7e30f4debed4c9650d6efe854457c9d05e18de9839890d813aa9b,2024-07-02T10:15:04.823000
CVE-2024-20896,1,1,3be787a3d4f825765b9b332c06f8272833b40ee9990c33147cc1f76a0ea5abc9,2024-07-02T10:15:04.997000
CVE-2024-20897,1,1,bc4d0eb3e4d7121aee185a47bc0471fef8ad78eb19d653336d42730f3e8027fb,2024-07-02T10:15:05.163000
CVE-2024-20898,1,1,0695228f5a7e9f3089af1576d31e2ae89e8585c11b6c4440535a9660ef515af5,2024-07-02T10:15:05.333000
CVE-2024-20899,1,1,dc90ddbdee83892f06b5c2e0c5935b164cc8904af6cf2a272c70ef07833f81a7,2024-07-02T10:15:05.507000
CVE-2024-20900,1,1,cd4484a6fb5c72444da5c96846e717694070287d1cde764eb8bf773cb4e01248,2024-07-02T10:15:05.690000
CVE-2024-20901,1,1,c92227c1258a933e67d6496ad61775ff1f0f4ec3579bcd30b78bfae2710daff0,2024-07-02T10:15:05.860000
CVE-2024-20903,0,0,c3900fb8b8bb00a3ce86bfd5ca527fde9099622f71073bff3bcad70680bf3f2d,2024-02-20T19:51:05.510000
CVE-2024-20904,0,0,75011684a257ea742330251f679f71917299c125d35b4c6d39df6fddd4b69f37,2024-01-20T18:42:09.760000
CVE-2024-20905,0,0,9331a8e493544ea842bda306a367f01093664d68b881f6092eb05338afffb388,2024-02-20T19:51:05.510000
@ -249560,7 +249574,7 @@ CVE-2024-31064,0,0,f87fea954d6623f92ad98dc571744769b0a41ba2a8ecac509cf34a5bc1aaa
CVE-2024-31065,0,0,36c2c4ddfef551b3df9316a574430562ba7ec0ea51f9e5ecbfa0af993c7946d3,2024-03-28T20:53:20.813000
CVE-2024-31069,0,0,d29f1e01bd410bc9e289e23142033a3c4695bcaf7cee5af8670edc7046e0bf75,2024-04-15T13:15:51.577000
CVE-2024-3107,0,0,8567b8b8d2bb62063ead5812f7765e864af3f68fdbb051cf4e93b652388b3114,2024-05-02T18:00:37.360000
CVE-2024-31071,1,1,e508ec037a5df9db7c30a1bdca4ed045779c5e06d9ac516721922015ddce8e64,2024-07-02T09:15:18.087000
CVE-2024-31071,0,0,e508ec037a5df9db7c30a1bdca4ed045779c5e06d9ac516721922015ddce8e64,2024-07-02T09:15:18.087000
CVE-2024-31076,0,0,94786ff014a244f3e9ba319b83d9624bbc33bea5fc0f1ef6152f98a455637992,2024-06-27T13:15:58.480000
CVE-2024-31077,0,0,cf1dae6bdc673263e7fd88f3fafa76996295a3cc4f001c878e21a09e0714f3a7,2024-04-23T12:52:09.397000
CVE-2024-31078,0,0,12059b4643db1f23db61cb234ce054c5e189af8320b848468c77237912b37117,2024-05-07T13:39:32.710000
@ -251774,8 +251788,26 @@ CVE-2024-3458,0,0,95e4aaffa4279b78a2b992b7ca84a76b9c0fc4040617906bdb6d2a26fd53d8
CVE-2024-34580,0,0,23e9c9e6196de214627ce70d2ecaafc9ed253a53de7670f13fae70cba93aceb8,2024-06-26T16:15:11.437000
CVE-2024-34581,0,0,101eae71972fe0e0b512a60a9bdc31b241f90f9c819f01ada4065ee44845d826,2024-06-26T12:44:29.693000
CVE-2024-34582,0,0,4844e743472b7231bfa5452c2e20c2f3ad08007eb97cbefe2d71005b993ee4bd,2024-05-16T15:44:44.683000
CVE-2024-34583,1,1,c9b0fa150b255247436c9e4f38cc316d9ebf472b0c333de03039d0acdac8fdf5,2024-07-02T10:15:06.063000
CVE-2024-34584,1,1,043b24793a1166d66ede7d1ec8649f5c94576efe509fb22ce70875b34ff4e205,2024-07-02T10:15:06.233000
CVE-2024-34585,1,1,3020594996fa316cf64b3aafcfdfb5b1c4ea1db9312bb54676bacdbf8830dd4a,2024-07-02T10:15:06.400000
CVE-2024-34586,1,1,2084a64ba86259544f2038176f7633cc93b13df525c481aa56fcbb775eb997ca,2024-07-02T10:15:06.567000
CVE-2024-34587,1,1,5ceaadd9b4cf99a8670467ce92c24c84b572f5bedccea0f698bb2f86a4fc6cbc,2024-07-02T10:15:06.730000
CVE-2024-34588,1,1,992db2b12d768b2ffc706cdc857ea538eef1a2f661380218062573a4fec8ae6d,2024-07-02T10:15:06.903000
CVE-2024-34589,1,1,8decb9ad837822510548b2f81d6124ad82244caeefd6d313954bc659d2f3399d,2024-07-02T10:15:07.073000
CVE-2024-3459,0,0,03bb87c9d0cbd21911c231bc7c0f724e986c00982489be8ee05c29896de95c1d,2024-05-14T16:11:39.510000
CVE-2024-34590,1,1,e8daccdb40f91aaa80db9fa30fb4be69ec6210c4484a59fb5f652acbc07f7d68,2024-07-02T10:15:07.250000
CVE-2024-34591,1,1,2e723be38c2c462a5cb070f2af2da577d3c1caef19d3863428eb3d86ea48ea70,2024-07-02T10:15:07.423000
CVE-2024-34592,1,1,a6b00afa7a50f450d8a82d2ce7f957440346b041e27346b446dd5273f6ce2bac,2024-07-02T10:15:07.600000
CVE-2024-34593,1,1,a5c3c815d68874bf1061f4028721f70648312a185059ac704f3352a8e259934b,2024-07-02T10:15:07.797000
CVE-2024-34594,1,1,ba424cea1ddda2c7af0782b2dccdba7a792b5eba37049a36a76d8b08d775fbe2,2024-07-02T10:15:07.983000
CVE-2024-34595,1,1,6cf1a21b3e08d91c3942bdbeceafbd2393025f32467f6b22316ccc963c3a91f9,2024-07-02T10:15:08.150000
CVE-2024-34596,1,1,4d9b2c519ba399222d662a5c79a88cb904d44d2caa284424a22536e4f3325bc6,2024-07-02T10:15:08.320000
CVE-2024-34597,1,1,09be5c4d16309813fabbf9fee5775e669b5019a74a7f7a2c296df0f2475b7487,2024-07-02T10:15:08.487000
CVE-2024-34599,1,1,f13a71e682c1c8e03d51db216db8e4ffe6fef5145ae54e381379a88519af7f37,2024-07-02T10:15:08.650000
CVE-2024-3460,0,0,5d753d09cd0688d7cf59cbd53a149eb7d45b8f22859b402f63de2cfaab817466,2024-05-14T16:11:39.510000
CVE-2024-34600,1,1,c468e0b0504fdf1ec3f223c12eef3819b500c501fed9ce0da4d2915d73d4af02,2024-07-02T10:15:08.813000
CVE-2024-34601,1,1,df2fc2fb166c82f4fa86c2ca2f49573b3535887f093f2534f8668d2c3b9baf23,2024-07-02T10:15:08.980000
CVE-2024-3461,0,0,2a4b7c0e1a8d6b06d86abf0c486b3a9f2d1fa6266081d4aec9284221b4574ee3,2024-05-14T16:11:39.510000
CVE-2024-3462,0,0,42d76b75905cddaca7c4512a98c3e5490f6eba6d1a37db8a52d4bde8c84e9ded,2024-05-14T16:11:39.510000
CVE-2024-3463,0,0,ec14f43c3b7b14f535006ee59b80bf351769520d95be8808071caf75bd274960,2024-05-17T02:39:57.447000
@ -251995,7 +252027,7 @@ CVE-2024-35110,0,0,07f2b4eefabbfedf17e2731cca374c4a367989ecaeb945f63f5af7217d209
CVE-2024-35116,0,0,91a0109df1140cd09bc7ea5c08abbe7ae8c48f4ffa4198fd96c193164e9e1703,2024-07-01T12:37:24.220000
CVE-2024-35119,0,0,f8609143b8a4a7a1f03935eb12f8fbcc6d72c76259e212fc26bb3132c6f940ad,2024-07-01T12:37:24.220000
CVE-2024-3512,0,0,7186c9ec3829c2082fd68b5fc8e23caed587fdf0f4e68c2974db5f41b90fb514,2024-04-25T13:15:51.663000
CVE-2024-3513,1,1,640a3e59b1b97961f81de9b9f2c663b54b3247deeefb18adb7389cd96298bf43,2024-07-02T08:15:06.600000
CVE-2024-3513,0,0,640a3e59b1b97961f81de9b9f2c663b54b3247deeefb18adb7389cd96298bf43,2024-07-02T08:15:06.600000
CVE-2024-35137,0,0,cfa826c0337668659733864f64c3760d46d614c0438a7a4db6c05f7406c4eeb5,2024-07-01T12:37:24.220000
CVE-2024-35139,0,0,703f975506f06b114406c8e7efad895fe907f2ada95557d6f69e2711957e3dfc,2024-07-01T12:37:24.220000
CVE-2024-3514,0,0,fd39bbcd0f0890f4d85c4ccfb46694b71dc6efa7f8c56852e1f4fd99d58e20d2,2024-04-24T17:15:47.423000
@ -252833,14 +252865,14 @@ CVE-2024-36238,0,0,ffa224703ea5d14f14feaac4631f2136ef89cf6e78b5508e4db40614bf827
CVE-2024-36239,0,0,f9d1b173110a422fa1162cdcd582db2bdb2808a4f7edf9f4c130505223b94463,2024-06-17T20:20:18.633000
CVE-2024-3624,0,0,e0ac19607b4c8d1214127703973418b820b7283270ffca198194137ef8f4191a,2024-04-26T12:58:17.720000
CVE-2024-36241,0,0,ec13df73bdae0daae51b14875ab9159491333aae8ecd7b32e3b3849163ae270e,2024-05-28T12:39:28.377000
CVE-2024-36243,1,1,37a91d37a376a2deee96f1e120ceacb2e6a276e34999224dcf44f363f4c7c6f3,2024-07-02T09:15:18.323000
CVE-2024-36243,0,0,37a91d37a376a2deee96f1e120ceacb2e6a276e34999224dcf44f363f4c7c6f3,2024-07-02T09:15:18.323000
CVE-2024-36244,0,0,038656f03db804566ce68ac1f46ed948e8ae898a69338704230a1cd93f8be7c7,2024-06-21T11:22:01.687000
CVE-2024-36246,0,0,50338f85842e71924c1397e2b0a309f647146226696bf59a5411ba0e6e468e33,2024-05-31T13:01:46.727000
CVE-2024-3625,0,0,bb7fa72c43d725aef9f66641f31c3359a614ed8ba414acf9f05b8e44148cef81,2024-04-26T12:58:17.720000
CVE-2024-36252,0,0,15f198f9d24050d47b4b65c7729189d555592843e3d7c2313de650ff4411e911,2024-06-20T12:44:01.637000
CVE-2024-36255,0,0,22b21684452ad4563618ad5cee66dc719af723b04c8a1647fe9cf6d970347f9a,2024-05-28T12:39:28.377000
CVE-2024-3626,0,0,668faec6d18ac8a7c33197af94901aaf7ddac1dec4c77c1d646fba224d5f8541,2024-05-24T01:15:30.977000
CVE-2024-36260,1,1,a8e1fbb977848568732e0ef899dc45ecf79892f492ffa6f5846647a005256d54,2024-07-02T09:15:18.557000
CVE-2024-36260,0,0,a8e1fbb977848568732e0ef899dc45ecf79892f492ffa6f5846647a005256d54,2024-07-02T09:15:18.557000
CVE-2024-36263,0,0,8fc77ae12c809e003508687bca8ef69500efdb9e489f26efe8ffb68dd267fd3b,2024-06-13T18:36:09.010000
CVE-2024-36264,0,0,3852f3a1f0d8a2d4f62090f3b6254d16b37a584c2a4799814e318aea1f24146e,2024-06-13T18:36:09.010000
CVE-2024-36265,0,0,00a9e362e8a489eb7027d68fd71b14b08824e37d9652a79a38b01c7bc61baef1,2024-06-13T21:15:57.170000
@ -252849,7 +252881,7 @@ CVE-2024-36267,0,0,5b402628b4c430b8eab614a5b3330f6f2d186537f83ff9a60bb1a91e4b3c3
CVE-2024-3627,0,0,f5c20db254155e1980cc0c244f583a6a1536d3adf64c11755694648c0d5e1776,2024-06-20T12:43:25.663000
CVE-2024-36270,0,0,291f6e458fbc676a304ed9970e06ef7e4860b79a198510d6c392b901a78fa76c,2024-06-21T11:22:01.687000
CVE-2024-36277,0,0,20d47326e280adb94d9059aa48d208d3f478f327ce890b8688aef81aa91e0089,2024-06-17T12:42:04.623000
CVE-2024-36278,1,1,f4c881e5fbba81c939793cab0776cbb302a9a6feb037cac1115c27275100d680,2024-07-02T09:15:18.757000
CVE-2024-36278,0,0,f4c881e5fbba81c939793cab0776cbb302a9a6feb037cac1115c27275100d680,2024-07-02T09:15:18.757000
CVE-2024-36279,0,0,3325b8af913fac0d163d5be9a8802e9f76dc63912c8cffea0ae3040270976e9f,2024-06-17T12:42:04.623000
CVE-2024-3628,0,0,ad2a38a3d431944b5239dd67ace3bcd2603e3057c8d0a04d847db45516b0c9ea,2024-05-07T13:39:32.710000
CVE-2024-36281,0,0,479133ce06ac02edc62536071e8e7fed1efaa94d8e73a60aac6af353af480add,2024-06-21T11:22:01.687000
@ -253228,7 +253260,7 @@ CVE-2024-37022,0,0,2e2eefd3e0454318fd9ea45982b5aef37a4139c6c043004fbe53dd71e5f37
CVE-2024-37026,0,0,d7cbfb6603c7d2d6e0f58c3d85c47d158b70aead88a80ecee6e5f9c900ea1461,2024-06-24T19:26:47.037000
CVE-2024-37029,0,0,534392cbe0894215b76b20e3854d46e7cdecbd3521fcbf5857ca9ed3ca750eae,2024-06-13T18:35:19.777000
CVE-2024-3703,0,0,46d289814974ee20b6160fe56cc828277066d832a1c60ccf5d9c1a62d06c47e2,2024-05-03T12:48:41.067000
CVE-2024-37030,1,1,db322276ba208a1920e2f90124a43051fd164c092c9d438f07f46d0d88e2be6a,2024-07-02T09:15:18.963000
CVE-2024-37030,0,0,db322276ba208a1920e2f90124a43051fd164c092c9d438f07f46d0d88e2be6a,2024-07-02T09:15:18.963000
CVE-2024-37031,0,0,967b2a62510a1f35de5969f18efe9a7e1918d9bc4c74d0011148e6a904de3800,2024-06-03T14:46:24.250000
CVE-2024-37032,0,0,2fd16d835b1a2cd56c97d409a29d6a495e6793f4206084713a4efe57de2f2107,2024-05-31T13:01:46.727000
CVE-2024-37036,0,0,951ff7c7a3ebadcdaa3a95e902df49913785292707f4e965429924c1452bc517,2024-06-13T18:36:09.010000
@ -253255,7 +253287,7 @@ CVE-2024-37063,0,0,89f5547c55b84eeb002f751591163c2bac39f3ef815bb40a0ef85dcc0021b
CVE-2024-37064,0,0,543b04bd3e0b4f44701f2ff590d34ccaab537b577720c450f51bc177073db1e8,2024-06-04T16:57:41.053000
CVE-2024-37065,0,0,77b183f2030b7bd581e452e09e55b74dee78fc06c1bd0201bb553e7d45698d31,2024-06-04T16:57:41.053000
CVE-2024-3707,0,0,cb892298714e8d1628bf09ece0bc00ef0a1a1429034ce83bb3286f4d822c160d,2024-04-15T13:15:51.577000
CVE-2024-37077,1,1,611c974db3c32f6b7c8cd2e851caa2c0502706f0f0c412a1bfcde706a7f78438,2024-07-02T09:15:19.157000
CVE-2024-37077,0,0,611c974db3c32f6b7c8cd2e851caa2c0502706f0f0c412a1bfcde706a7f78438,2024-07-02T09:15:19.157000
CVE-2024-37078,0,0,07ffa320065553977b456d5493a365b0e5630945bde4b6a809eb6cb991c42975,2024-06-25T18:50:42.040000
CVE-2024-37079,0,0,9bbd76d5444005ceb39d0ac68b0b4e335d82d5da3fc1107a95914993fa985b9a,2024-06-20T12:44:01.637000
CVE-2024-3708,0,0,09132fb1644ebf0c808002aa8ac15b19f13ae71d0beb378f7a9664a5ae685f9a,2024-05-24T01:15:30.977000
@ -253274,12 +253306,12 @@ CVE-2024-3711,0,0,00ee502ae0ae8bdc802cd38eb1ec1e1356c10e1c18d766a4effd20297a066f
CVE-2024-37111,0,0,2257ad3ccadca4c80305b1109feafea1f23c81cf8da2e182d0e85f183c413dd1,2024-06-28T13:15:02.750000
CVE-2024-37118,0,0,0ad56c9c4204404fc625d311f20c0b9c243a12023f3ae9f31f4a46be59aef39f,2024-06-24T18:55:07.707000
CVE-2024-37124,0,0,bdb1c2622a72a7efb103c3f5603bc06acb88520168a2b939ad78f62d410bde2b,2024-06-20T12:44:01.637000
CVE-2024-37126,1,1,ce51f995abf5460eae453a69dc8da4bfde291544917b9c776424ecc387dec853,2024-07-02T08:15:05.347000
CVE-2024-37126,0,0,ce51f995abf5460eae453a69dc8da4bfde291544917b9c776424ecc387dec853,2024-07-02T08:15:05.347000
CVE-2024-37130,0,0,e0f79c9f14be5102570781fc06be35c79666eecf04eb579171e468c9a760aecc,2024-06-11T13:54:12.057000
CVE-2024-37131,0,0,9d8793df78437fefb0a970a364558bdad589a0c15e132432497cef4b2151f46f,2024-06-13T18:35:19.777000
CVE-2024-37132,1,1,935e7996dc7dcc3b4137b046b34573fde3e9bdcb3a2b2860f6737130bb395397,2024-07-02T08:15:05.553000
CVE-2024-37133,1,1,e71cf9daca5f2058c6d5517475198f34a66ce3bff23fc5f57bce15eb1b674c7c,2024-07-02T08:15:05.773000
CVE-2024-37134,1,1,849038f1e08cf94ea2600f6df2008b82b389d2a56ed30e7a038e63f8072ad4e5,2024-07-02T08:15:05.980000
CVE-2024-37132,0,0,935e7996dc7dcc3b4137b046b34573fde3e9bdcb3a2b2860f6737130bb395397,2024-07-02T08:15:05.553000
CVE-2024-37133,0,0,e71cf9daca5f2058c6d5517475198f34a66ce3bff23fc5f57bce15eb1b674c7c,2024-07-02T08:15:05.773000
CVE-2024-37134,0,0,849038f1e08cf94ea2600f6df2008b82b389d2a56ed30e7a038e63f8072ad4e5,2024-07-02T08:15:05.980000
CVE-2024-37137,0,0,876b5deb6120b71515a72548a35979c3fe73b22e5c052fdfcb9847d4c38f186d,2024-06-28T10:27:00.920000
CVE-2024-37138,0,0,c32a7c21b94d343f2b3f30b7a7dc2a266744d79653d9f1f3b9c08078539e5f8e,2024-06-26T12:44:29.693000
CVE-2024-37139,0,0,4be213816842328a788d9a10ebbbecaea533491c62f7e03adf240d5d001bdfb9,2024-06-26T12:44:29.693000
@ -253313,7 +253345,7 @@ CVE-2024-37178,0,0,09d4f25c1f8a3d05343115dea3f64d1198524e716da67f7a6714a382347c3
CVE-2024-3718,0,0,a740a1633905d284711162c33f52150d8f35c5a9e41e141a82d07851d64c55d1,2024-05-24T13:03:05.093000
CVE-2024-37182,0,0,549cc5da2b56e1ffc4f85fe12d4fc3bdb7526f84c41d2237f570cc5dd0365265,2024-06-17T12:42:04.623000
CVE-2024-37183,0,0,797ee6627defafae369247d5bda2be326b262d85b9c4ea85f3eb35804b563c70,2024-06-21T11:22:01.687000
CVE-2024-37185,1,1,f4ae206b596797243dbc8ddfecb92d9b63cbae87cf98d01879bd8b2dad87d15d,2024-07-02T09:15:19.353000
CVE-2024-37185,0,0,f4ae206b596797243dbc8ddfecb92d9b63cbae87cf98d01879bd8b2dad87d15d,2024-07-02T09:15:19.353000
CVE-2024-3719,0,0,d2320674d04cefde56a0b36b463f74328d6f18494803030bdfe9b0b1b4374afd,2024-06-04T19:20:23.553000
CVE-2024-37198,0,0,8919c8b8db43ac2a9639793fec092e2666b55422ab58e48ee04c39b0bd19361a,2024-06-24T18:55:25.417000
CVE-2024-3720,0,0,f4e69514093cc630aeda39d0a41fe705e0d9916a1077cef429b7dcf05a404308,2024-06-04T19:20:23.660000
@ -253407,7 +253439,7 @@ CVE-2024-3744,0,0,3408d488e8996c91d94ffcdb9d000c212f3fb5178aa8822cd0999d10712521
CVE-2024-3745,0,0,0c97e7d88631153724030fc4589ac35dd3957f099e7d9be0c53b9ed0e2dd38f4,2024-05-20T13:00:34.807000
CVE-2024-3746,0,0,bf665bd1c63d674f7a064c0ad8040bd5128d2f5c4febe3dc8aacfad825f7d80f,2024-05-28T17:15:11.570000
CVE-2024-3747,0,0,6871870ddb764bd7e2884ba1607d3a8e3ec9c4bf7e3490a3d61f8ca42b77a2e1,2024-05-02T18:00:37.360000
CVE-2024-37479,1,1,ed651f375e21ca9ff9588b8abf061df8f9b45def73453eb6bc243bfb3df66126,2024-07-02T08:15:06.190000
CVE-2024-37479,0,0,ed651f375e21ca9ff9588b8abf061df8f9b45def73453eb6bc243bfb3df66126,2024-07-02T08:15:06.190000
CVE-2024-3748,0,0,b0e27aec04ee07a8ce410bb6d8c3b0277cb63dc4584c172af60f83cc3e59cff2,2024-05-15T16:40:19.330000
CVE-2024-3749,0,0,e5012183af13abb8287d9f7e2369a778a614f06e1c5ed11cd73c4e040e4a12f2,2024-05-15T16:40:19.330000
CVE-2024-3750,0,0,803f7e301e80982b4e00371ccc1f410724a29d03fdd424fb4c54aeb0b034ff94,2024-05-16T13:03:05.353000
@ -253840,7 +253872,7 @@ CVE-2024-3881,0,0,75d6ff7939f1eb42f8c8e14b9aa2dfb06f2eebee5e37b0b47750b4ccbacea0
CVE-2024-3882,0,0,43bad73eafa6ac43c909cb529fe3ba674146baf41b9d3a5b4ece14285f4557b3,2024-05-17T02:40:10.457000
CVE-2024-3883,0,0,c0ee3c129d03d9b7803729c6b8ba3c3dbf4ee4f2b39f81dd559f9f8568fb1be9,2024-05-02T13:27:25.103000
CVE-2024-3885,0,0,18d5fcf15976a3d948a4584d141049e724e0352960b62e33e0645d8a5c391224,2024-05-02T18:00:37.360000
CVE-2024-38857,1,1,bea59054369c0902bc49c4d31031be9a5f760948b08565f329f58a999c519391,2024-07-02T08:15:06.387000
CVE-2024-38857,0,0,bea59054369c0902bc49c4d31031be9a5f760948b08565f329f58a999c519391,2024-07-02T08:15:06.387000
CVE-2024-3887,0,0,798d7748b1074258e6c6a927f8fccffc602325526aac11c704efaf0a6ac77dca,2024-05-16T13:03:05.353000
CVE-2024-38873,0,0,480e62ff44ca44c60b79669b7942679e9800aada230c257b18bef37e33b79e3a,2024-06-21T11:22:01.687000
CVE-2024-38874,0,0,84b324545c03e3af351829556c1e9c9a1e19bfbe37e66a75476dbe17e7f3fa44,2024-06-21T11:22:01.687000
@ -254249,6 +254281,7 @@ CVE-2024-4264,0,0,fb86e94ce42096b29068bc1af12f8df8e421d67d4a541250a03ae9bd98f162
CVE-2024-4265,0,0,91d38fbd7b9c4ea0cd26c0f2028b5e1f8ee8c7d7e1c2c632d6b17cd2b7b69603,2024-05-02T18:00:37.360000
CVE-2024-4266,0,0,116b52a29fd0a6039b308734c72b0d2ae8aa871f2547c292da7232e2003a6f6b,2024-06-11T13:54:12.057000
CVE-2024-4267,0,0,ce2653255d43ae5f4599b240b7efe5c0da7fc5b70a5363cdc03dcce3fe58b4ed,2024-05-24T01:15:30.977000
CVE-2024-4268,1,1,373138a834aac697ad9e027805e352f540224bfc6efdac1f2278730dd4d85d2c,2024-07-02T11:15:10.250000
CVE-2024-4270,0,0,dae68ba24abb4217ea4781a91ce52781cf47607cfd48397395ee3a58fe8e32d1,2024-06-17T12:42:04.623000
CVE-2024-4271,0,0,b387f99302f91201ccece9e8c147bcdfc30a6615cd2543471e3490cd41180d93,2024-06-17T12:42:04.623000
CVE-2024-4273,0,0,136233599d68a0536ba99c3313767218f535edf424c12fad350903aa42bf81fa,2024-06-04T16:57:41.053000
@ -254727,7 +254760,7 @@ CVE-2024-4824,0,0,18f5c845247adede0ddca9ae15329e658bfdaa618402437af47bcb2e661d69
CVE-2024-4825,0,0,d4c986e45acea4bd51964aed53b7ed9dcec2f9adb1090e1fc394822d57edfd78,2024-05-14T16:11:39.510000
CVE-2024-4826,0,0,af3613d04b75e94cea034c72d0262809043a8c645db91b90f9ab3d043b9e8532,2024-05-16T13:15:48.163000
CVE-2024-4835,0,0,b9626bd6b7354ef649f3d482141bd2eedfd065e81dc3c11d391c7f577be02861,2024-05-24T01:15:30.977000
CVE-2024-4836,1,1,5794aa3805c40ca5d0c9510d4f3213ce195d19ffc09ca58a4b38d34f905cef29,2024-07-02T09:15:19.553000
CVE-2024-4836,0,0,5794aa3805c40ca5d0c9510d4f3213ce195d19ffc09ca58a4b38d34f905cef29,2024-07-02T09:15:19.553000
CVE-2024-4837,0,0,67f132196b6c5804deb56deda048fcbd80dd9bcaa597012fb36064245b7ca6b6,2024-05-15T18:35:11.453000
CVE-2024-4838,0,0,213892fd4e00ded7d0e7161081f565f4e4fb5fc98a2507596b17757660a932b0,2024-05-16T13:03:05.353000
CVE-2024-4839,0,0,3c3916e0334c166bdcee1348ca91ccfd36f6d6acfe79b1e13a0863625a6e0a42,2024-06-24T19:26:47.037000
@ -255055,7 +255088,7 @@ CVE-2024-5248,0,0,b78352407aadb212f93e70af46347d9b26fbbca7606ce8cffa82c8de632819
CVE-2024-5256,0,0,aef556d8e7eef39a9e473d71cb0baaf9ddd8441bfdba9b715777a96b312eec3d,2024-06-07T14:56:05.647000
CVE-2024-5258,0,0,44dc29bb0ed4f47fbd56a17c4d4592048fc8f73fd8d93b1b1d7d82e5e8477ede,2024-05-24T01:15:30.977000
CVE-2024-5259,0,0,1133f2690684f5fa329a88cb6129c4f77126359850c2cd2c69369073dabe319e,2024-06-11T17:44:42.783000
CVE-2024-5260,1,1,939f94c1e1b5d97a3d677b6d0dcfcad909c78254f7c59a0c8923d14fc17c1345,2024-07-02T09:15:19.780000
CVE-2024-5260,0,1,d295753a13055be7c56aa8c5da45694f9965222f9db42382623948ab6db18d2d,2024-07-02T09:15:19.780000
CVE-2024-5261,0,0,aaf01fa82c00aa1f97fee6034b7f06b519644bd8c7ab6c8a9a02aece19be141a,2024-06-25T18:50:42.040000
CVE-2024-5262,0,0,9ac0e56dcac973bc4b8e5b6fa9933e9dd09a608d6b80fb71c1aa4404fea36f64,2024-06-11T17:18:50.600000
CVE-2024-5263,0,0,796ba510b7017654bdfbf9b75644ebd80198f9cf52c47b5302f3a82ca304a5bf,2024-06-17T12:42:04.623000
@ -255238,7 +255271,7 @@ CVE-2024-5498,0,0,734c6c536bc56a91dbd107c39a51ae397643e3245409e39f3a56c59dbc2255
CVE-2024-5499,0,0,b5af232f34247d4ac7d3c630379d04427a676739309970b0b94548f93464ba69,2024-06-10T17:16:35.033000
CVE-2024-5501,0,0,d4e4bc8b8db5b9e6fa14f6bf5c3381308561a5d72eef767955ee99c11419b1db,2024-06-03T14:46:24.250000
CVE-2024-5503,0,0,0f697147547c2a2433c49b9b46e01de2014e93e9b95ab1682351373926d90d44,2024-06-21T11:22:01.687000
CVE-2024-5504,1,1,c757daf1b96f7ebfe2e24d0e05f9869f4616d4080c5754a9752307302ee9c336,2024-07-02T08:15:06.793000
CVE-2024-5504,0,0,c757daf1b96f7ebfe2e24d0e05f9869f4616d4080c5754a9752307302ee9c336,2024-07-02T08:15:06.793000
CVE-2024-5505,0,0,ff6feb748e9ca42b8e8d72ec970c71fc058363b762c81ee7cd5f161b90d542df,2024-06-07T14:56:05.647000
CVE-2024-5506,0,0,145a0430bcbf3c9e37cb0bfbb46dfd0872ec5ea7a67e12bde9d4f6bf02ce6bf6,2024-06-07T14:56:05.647000
CVE-2024-5507,0,0,ccb5bb2278d991403ca27e2a2c2825e9f4f1d687c84a7520e08690b80bccd919,2024-06-07T14:56:05.647000
@ -255267,8 +255300,8 @@ CVE-2024-5538,0,0,183cea799fa9410e329e72f326a10b8369aedcea9a5b7583a44bf33ecc3050
CVE-2024-5541,0,0,3cf16189373492b41668e36a2b5359be696c8d9818a4c855e885b2ed02acbca6,2024-06-20T12:44:01.637000
CVE-2024-5542,0,0,77ae3f3a7c4ffc662d4e5625f82b1efcc56a12c39abbd3546ebc6e9e7e619033,2024-06-11T18:25:51.200000
CVE-2024-5543,0,0,8e93e3d42337fd51f8d8d19b50b3f68377ba39e905a95b2594b9c3824c59b9ee,2024-06-13T18:36:09.013000
CVE-2024-5544,1,1,cebbb034f939fb29f886f6fbdc027d99a1c9d4fbf98b60e3db3177104f5e0cf2,2024-07-02T08:15:06.997000
CVE-2024-5545,1,1,9c6b5eb6c04fde5a678309953b943a6506c0c3d1997ff66558b1faa0f5ceabec,2024-07-02T08:15:07.190000
CVE-2024-5544,0,0,cebbb034f939fb29f886f6fbdc027d99a1c9d4fbf98b60e3db3177104f5e0cf2,2024-07-02T08:15:06.997000
CVE-2024-5545,0,0,9c6b5eb6c04fde5a678309953b943a6506c0c3d1997ff66558b1faa0f5ceabec,2024-07-02T08:15:07.190000
CVE-2024-5547,0,0,10fc933ab96f74e48222460cfee3e0b1d295bbaa26e68f34704c5127d22daf4a,2024-06-27T19:25:12.067000
CVE-2024-5548,0,0,0dab8d0a6f7f4b5d3115df8861f1ab0c0c70d1308be14527ce7ee2ffa61fade4,2024-06-27T19:25:12.067000
CVE-2024-5550,0,0,e4fc13aea5b719d7c555043aa9a8be47a59e2f4d5eac2e9fa0d5ff8a8edb892f,2024-06-07T14:56:05.647000
@ -255510,6 +255543,8 @@ CVE-2024-6006,0,0,9edb8ca4c0dd0d4558b143fb832fc42b328bff9f4b383b9f92efc4408ae0b0
CVE-2024-6007,0,0,10a5bf7c2814f8c45b29a7830a1e182f887cf45831b7092d81e48bb44ca9bf15,2024-06-17T12:42:04.623000
CVE-2024-6008,0,0,c91774daf5e01f51e3ed230da10d811f428be9da4023af41a23643597eb98c00,2024-06-17T16:15:16.140000
CVE-2024-6009,0,0,468577c4db742932e2254bcba365ac1e04c74b564538fb241a46994d66ec19d6,2024-06-17T12:42:04.623000
CVE-2024-6011,1,1,dc181e857e19cb0e9f401aabdf6def729ba0ca62b606e1ea550c48a0425a18f7,2024-07-02T10:15:09.170000
CVE-2024-6012,1,1,ce7f3246db6935fe269eaaf46322b0d2c4529b9ff63086a3c630333a11689645,2024-07-02T10:15:09.367000
CVE-2024-6013,0,0,44159fdbcbcac2a689071de339f13c4fefa84302df10ce908aefe802918d324e,2024-06-17T12:42:04.623000
CVE-2024-6014,0,0,6f42b027c41cbc2bef7f3eccd4ed3d2b0646bd4a1028da377690698f14644291,2024-06-17T12:42:04.623000
CVE-2024-6015,0,0,b5dd732698ac918c4f9a100a042e5587c72b21ba3272e6fc136fa01311e31fdc,2024-06-17T15:15:52.830000
@ -255548,7 +255583,9 @@ CVE-2024-6083,0,0,7e7a5636ed7255d0fcfcd2ad673b2a41cb1a824617e25b4cc387230a5aebb3
CVE-2024-6084,0,0,7af730199a10f594b6ce1f1e9ecc3a7779c7858f9e2bf364f776ef80922995a6,2024-06-20T12:44:01.637000
CVE-2024-6085,0,0,9ec0c5a378f12acda708e36f1fd937b6a37e47da0cf78939f5184a1970e8c26d,2024-06-27T19:25:12.067000
CVE-2024-6086,0,0,14860ec6fbd88099fa44eea5d54e4e6e3888339b61c575153074e11ddcd05154,2024-06-27T19:25:12.067000
CVE-2024-6088,1,1,ac71b14c5ab29d27d143da13dc9b1b5b46ea1d1cd57c29efc3ccc16a8a8eb891,2024-07-02T11:15:10.463000
CVE-2024-6090,0,0,bdfb03b5dff367089b0030453781624b3aa54f3ea84f8c38b9ecc3c69b89e51c,2024-06-27T19:25:12.067000
CVE-2024-6099,1,1,37be248195bc8793f3da6c9b3bdf3adcb6ad3c806ed0492fd4d86139917b0ad9,2024-07-02T11:15:10.650000
CVE-2024-6100,0,0,2b903b3a6c63696aea9a10797071b5fd7d0b6547a8f1416ee7dc4ff992de4ff5,2024-06-21T13:15:13.077000
CVE-2024-6101,0,0,3b6bc52ab046ce2a9a29c26d80fa3342c59ba956272c0888c64da753b102c8a5,2024-06-21T13:15:13.187000
CVE-2024-6102,0,0,229621a473a3fa4bd90193f7d8f9e1a06a3142a4c3e1de71a8a1ff5fb584365f,2024-06-21T13:15:13.277000
@ -255621,6 +255658,7 @@ CVE-2024-6252,0,0,468e259f2025efbae92579ad89a45c9f2c8b2e33c6f209272de57a1e66debc
CVE-2024-6253,0,0,a6e4514e5a27665a5cb6260b36ae56e5c2da14fd9a2d1da643a44ff2f3f2cb21,2024-06-25T18:15:12
CVE-2024-6257,0,0,2981da6c17c705bcf0d80e44b1fa14b0c6655b2077fb275b971c6bc5c7c2b720,2024-06-25T18:50:42.040000
CVE-2024-6262,0,0,f703f7a7fbd3e1fe9efa1e5946752e209a081bf36124182aca731e3f05a363a4,2024-06-27T12:47:19.847000
CVE-2024-6264,1,1,26d1dda4be31e2515cbe4463d2d268a1fba2ec15c350b4e76c8fed66f31bbeca,2024-07-02T11:15:10.840000
CVE-2024-6265,0,0,dd53419ac5d71f3843314be14fea17b7338fd9f39ae5539064d4c12df7d66cd7,2024-07-01T12:37:24.220000
CVE-2024-6266,0,0,f14331da5cd861226d53e015f2a1f08c9e1d5e7f7b1b843a3feb7cb151cc145a,2024-06-24T12:57:36.513000
CVE-2024-6267,0,0,d0d81696a0fe56042eb20b9f0c7d606c3ec4ab44f43adaf7633e08749cae8d6a,2024-06-24T15:15:12.093000
@ -255684,3 +255722,6 @@ CVE-2024-6418,0,0,b63bb78bc20fc7c9074df0590cf44ede2aa2ea9145f7e2ea976342cbbc9ede
CVE-2024-6419,0,0,e1f22570d75c49fa5726171947ce4e56ea60b543707fecfaebe18f84b2ff48d5,2024-07-01T12:37:24.220000
CVE-2024-6424,0,0,8d5a2fd0dee2ac07d57032a1c81c2c412cad276a027b89c1b7d3574f7c28481d,2024-07-01T16:37:39.040000
CVE-2024-6425,0,0,adbfecb8c3cc947ec785870957655621e37e6a4ecfa332482b1b765f471fc897,2024-07-01T16:37:39.040000
CVE-2024-6438,1,1,915bf0236f47457001ad3f9d4fbc6d470ad5a907c6c5087f5c837bdd00f05ef6,2024-07-02T11:15:11.027000
CVE-2024-6439,1,1,84b51788e96644296c65dfb50cc6c646ebebc21bdb8f32d25ae74659572ed464,2024-07-02T11:15:11.523000
CVE-2024-6440,1,1,65271531e29223d19a804163e25e9d80e81b474860e678a41a4d423fc86ab555,2024-07-02T11:15:11.783000

Can't render this file because it is too large.