Auto-Update: 2024-07-19T16:00:18.490265+00:00

This commit is contained in:
cad-safe-bot 2024-07-19 16:03:12 +00:00
parent 83929a8ba1
commit 25ae3813ae
52 changed files with 2452 additions and 335 deletions

View File

@ -2,7 +2,7 @@
"id": "CVE-2014-9515",
"sourceIdentifier": "cve@mitre.org",
"published": "2017-12-29T22:29:00.520",
"lastModified": "2021-06-14T18:15:10.637",
"lastModified": "2024-07-19T14:15:02.500",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -135,6 +135,10 @@
"Third Party Advisory"
]
},
{
"url": "https://security.netapp.com/advisory/ntap-20240719-0002/",
"source": "cve@mitre.org"
},
{
"url": "https://www.oracle.com/security-alerts/cpuApr2021.html",
"source": "cve@mitre.org"

View File

@ -2,8 +2,8 @@
"id": "CVE-2015-0973",
"sourceIdentifier": "cret@cert.org",
"published": "2015-01-18T18:59:03.020",
"lastModified": "2016-10-20T18:46:05.357",
"vulnStatus": "Analyzed",
"lastModified": "2024-07-19T14:15:04.343",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
@ -300,6 +300,10 @@
"Third Party Advisory"
]
},
{
"url": "https://security.netapp.com/advisory/ntap-20240719-0005/",
"source": "cret@cert.org"
},
{
"url": "https://support.apple.com/HT206167",
"source": "cret@cert.org",

View File

@ -2,8 +2,8 @@
"id": "CVE-2016-3751",
"sourceIdentifier": "security@android.com",
"published": "2016-07-11T01:59:51.870",
"lastModified": "2016-07-11T17:52:53.463",
"vulnStatus": "Analyzed",
"lastModified": "2024-07-19T14:15:04.573",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
@ -229,6 +229,10 @@
{
"url": "https://android.googlesource.com/platform/external/libpng/+/9d4853418ab2f754c2b63e091c29c5529b8b86ca",
"source": "security@android.com"
},
{
"url": "https://security.netapp.com/advisory/ntap-20240719-0004/",
"source": "security@android.com"
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2018-10054",
"sourceIdentifier": "cve@mitre.org",
"published": "2018-04-11T20:29:00.860",
"lastModified": "2024-06-26T20:15:12.490",
"lastModified": "2024-07-19T14:15:04.740",
"vulnStatus": "Modified",
"cveTags": [
{
@ -148,6 +148,10 @@
"Third Party Advisory"
]
},
{
"url": "https://security.netapp.com/advisory/ntap-20240719-0003/",
"source": "cve@mitre.org"
},
{
"url": "https://www.exploit-db.com/exploits/44422/",
"source": "cve@mitre.org",

View File

@ -2,7 +2,7 @@
"id": "CVE-2019-17626",
"sourceIdentifier": "cve@mitre.org",
"published": "2019-10-16T12:15:12.010",
"lastModified": "2023-11-07T03:06:23.607",
"lastModified": "2024-07-19T14:15:04.930",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -148,6 +148,10 @@
"url": "https://security.gentoo.org/glsa/202007-35",
"source": "cve@mitre.org"
},
{
"url": "https://security.netapp.com/advisory/ntap-20240719-0006/",
"source": "cve@mitre.org"
},
{
"url": "https://usn.ubuntu.com/4273-1/",
"source": "cve@mitre.org"

View File

@ -0,0 +1,86 @@
{
"id": "CVE-2024-0006",
"sourceIdentifier": "security@yugabyte.com",
"published": "2024-07-19T15:15:09.930",
"lastModified": "2024-07-19T15:15:09.930",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Information exposure in the logging system in Yugabyte Platform allows local attackers with access to application logs to obtain database user credentials in log files, potentially leading to unauthorized database access."
}
],
"metrics": {
"cvssMetricV40": [
{
"source": "security@yugabyte.com",
"type": "Secondary",
"cvssData": {
"version": "4.0",
"vectorString": "CVSS:4.0/AV:A/AC:H/AT:N/PR:H/UI:A/VC:H/VI:H/VA:H/SC:L/SI:L/SA:L/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"attackVector": "ADJACENT",
"attackComplexity": "HIGH",
"attackRequirements": "NONE",
"privilegesRequired": "HIGH",
"userInteraction": "ACTIVE",
"vulnerableSystemConfidentiality": "HIGH",
"vulnerableSystemIntegrity": "HIGH",
"vulnerableSystemAvailability": "HIGH",
"subsequentSystemConfidentiality": "LOW",
"subsequentSystemIntegrity": "LOW",
"subsequentSystemAvailability": "LOW",
"exploitMaturity": "NOT_DEFINED",
"confidentialityRequirements": "NOT_DEFINED",
"integrityRequirements": "NOT_DEFINED",
"availabilityRequirements": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnerableSystemConfidentiality": "NOT_DEFINED",
"modifiedVulnerableSystemIntegrity": "NOT_DEFINED",
"modifiedVulnerableSystemAvailability": "NOT_DEFINED",
"modifiedSubsequentSystemConfidentiality": "NOT_DEFINED",
"modifiedSubsequentSystemIntegrity": "NOT_DEFINED",
"modifiedSubsequentSystemAvailability": "NOT_DEFINED",
"safety": "NOT_DEFINED",
"automatable": "NOT_DEFINED",
"recovery": "NOT_DEFINED",
"valueDensity": "NOT_DEFINED",
"vulnerabilityResponseEffort": "NOT_DEFINED",
"providerUrgency": "NOT_DEFINED",
"baseScore": 5.4,
"baseSeverity": "MEDIUM"
}
}
]
},
"weaknesses": [
{
"source": "security@yugabyte.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-532"
}
]
}
],
"references": [
{
"url": "https://github.com/yugabyte/yugabyte-db/commit/439c6286f1971f9ac6bff2c7215b454c2025c593",
"source": "security@yugabyte.com"
},
{
"url": "https://github.com/yugabyte/yugabyte-db/commit/5cc7f4e15d6ccccbf97c57946fd0aa630f88c9e2",
"source": "security@yugabyte.com"
},
{
"url": "https://github.com/yugabyte/yugabyte-db/commit/d96e6b629f34d065b47204daeeb44064e484c579",
"source": "security@yugabyte.com"
}
]
}

View File

@ -2,13 +2,17 @@
"id": "CVE-2024-21131",
"sourceIdentifier": "secalert_us@oracle.com",
"published": "2024-07-16T23:15:13.210",
"lastModified": "2024-07-17T13:34:20.520",
"lastModified": "2024-07-19T14:15:05.180",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Vulnerability in the Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Hotspot). Supported versions that are affected are Oracle Java SE: 8u411, 8u411-perf, 11.0.23, 17.0.11, 21.0.3, 22.0.1; Oracle GraalVM for JDK: 17.0.11, 21.0.3, 22.0.1; Oracle GraalVM Enterprise Edition: 20.3.14 and 21.3.10. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability can be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. This vulnerability also applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. CVSS 3.1 Base Score 3.7 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N)."
},
{
"lang": "es",
"value": "Vulnerabilidad en el producto Oracle Java SE, Oracle GraalVM para JDK, Oracle GraalVM Enterprise Edition de Oracle Java SE (componente: Hotspot). Las versiones compatibles que se ven afectadas son Oracle Java SE: 8u411, 8u411-perf, 11.0.23, 17.0.11, 21.0.3, 22.0.1; Oracle GraalVM para JDK: 17.0.11, 21.0.3, 22.0.1; Oracle GraalVM Enterprise Edition: 20.3.14 y 21.3.10. Una vulnerabilidad dif\u00edcil de explotar permite que un atacante no autenticado con acceso a la red a trav\u00e9s de m\u00faltiples protocolos comprometa Oracle Java SE, Oracle GraalVM para JDK y Oracle GraalVM Enterprise Edition. Los ataques exitosos a esta vulnerabilidad pueden dar como resultado una actualizaci\u00f3n, inserci\u00f3n o eliminaci\u00f3n no autorizada del acceso a algunos de los datos accesibles de Oracle Java SE, Oracle GraalVM para JDK y Oracle GraalVM Enterprise Edition. Nota: Esta vulnerabilidad se puede aprovechar utilizando API en el componente especificado, por ejemplo, a trav\u00e9s de un servicio web que proporciona datos a las API. Esta vulnerabilidad tambi\u00e9n se aplica a las implementaciones de Java, normalmente en clientes que ejecutan aplicaciones Java Web Start en un espacio aislado o subprogramas de Java en un espacio aislado, que cargan y ejecutan c\u00f3digo que no es de confianza (por ejemplo, c\u00f3digo que proviene de Internet) y dependen del entorno limitado de Java para su seguridad. CVSS 3.1 Puntaje base 3.7 (Impactos en la integridad). Vector CVSS: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N)."
}
],
"metrics": {
@ -36,6 +40,10 @@
]
},
"references": [
{
"url": "https://security.netapp.com/advisory/ntap-20240719-0008/",
"source": "secalert_us@oracle.com"
},
{
"url": "https://www.oracle.com/security-alerts/cpujul2024.html",
"source": "secalert_us@oracle.com"

View File

@ -2,13 +2,17 @@
"id": "CVE-2024-21138",
"sourceIdentifier": "secalert_us@oracle.com",
"published": "2024-07-16T23:15:14.620",
"lastModified": "2024-07-17T13:34:20.520",
"lastModified": "2024-07-19T14:15:05.290",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Vulnerability in the Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Hotspot). Supported versions that are affected are Oracle Java SE: 8u411, 8u411-perf, 11.0.23, 17.0.11, 21.0.3, 22.0.1; Oracle GraalVM for JDK: 17.0.11, 21.0.3, 22.0.1; Oracle GraalVM Enterprise Edition: 20.3.14 and 21.3.10. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition. Note: This vulnerability can be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. This vulnerability also applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. CVSS 3.1 Base Score 3.7 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L)."
},
{
"lang": "es",
"value": "Vulnerabilidad en el producto Oracle Java SE, Oracle GraalVM para JDK, Oracle GraalVM Enterprise Edition de Oracle Java SE (componente: Hotspot). Las versiones compatibles que se ven afectadas son Oracle Java SE: 8u411, 8u411-perf, 11.0.23, 17.0.11, 21.0.3, 22.0.1; Oracle GraalVM para JDK: 17.0.11, 21.0.3, 22.0.1; Oracle GraalVM Enterprise Edition: 20.3.14 y 21.3.10. Una vulnerabilidad dif\u00edcil de explotar permite que un atacante no autenticado con acceso a la red a trav\u00e9s de m\u00faltiples protocolos comprometa Oracle Java SE, Oracle GraalVM para JDK y Oracle GraalVM Enterprise Edition. Los ataques exitosos de esta vulnerabilidad pueden resultar en una capacidad no autorizada para causar una denegaci\u00f3n de servicio parcial (DOS parcial) de Oracle Java SE, Oracle GraalVM para JDK, Oracle GraalVM Enterprise Edition. Nota: Esta vulnerabilidad se puede aprovechar utilizando API en el componente especificado, por ejemplo, a trav\u00e9s de un servicio web que proporciona datos a las API. Esta vulnerabilidad tambi\u00e9n se aplica a las implementaciones de Java, normalmente en clientes que ejecutan aplicaciones Java Web Start en un espacio aislado o subprogramas de Java en un espacio aislado, que cargan y ejecutan c\u00f3digo que no es de confianza (por ejemplo, c\u00f3digo que proviene de Internet) y dependen del entorno limitado de Java para su seguridad. CVSS 3.1 Puntuaci\u00f3n base 3.7 (impactos en la disponibilidad). Vector CVSS: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L)."
}
],
"metrics": {
@ -36,6 +40,10 @@
]
},
"references": [
{
"url": "https://security.netapp.com/advisory/ntap-20240719-0008/",
"source": "secalert_us@oracle.com"
},
{
"url": "https://www.oracle.com/security-alerts/cpujul2024.html",
"source": "secalert_us@oracle.com"

View File

@ -2,13 +2,17 @@
"id": "CVE-2024-21140",
"sourceIdentifier": "secalert_us@oracle.com",
"published": "2024-07-16T23:15:15.043",
"lastModified": "2024-07-17T13:34:20.520",
"lastModified": "2024-07-19T14:15:05.400",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Vulnerability in the Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Hotspot). Supported versions that are affected are Oracle Java SE: 8u411, 8u411-perf, 11.0.23, 17.0.11, 21.0.3, 22.0.1; Oracle GraalVM for JDK: 17.0.11, 21.0.3, 22.0.1; Oracle GraalVM Enterprise Edition: 20.3.14 and 21.3.10. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition accessible data as well as unauthorized read access to a subset of Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability can be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. This vulnerability also applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. CVSS 3.1 Base Score 4.8 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N)."
},
{
"lang": "es",
"value": "Vulnerabilidad en el producto Oracle Java SE, Oracle GraalVM para JDK, Oracle GraalVM Enterprise Edition de Oracle Java SE (componente: Hotspot). Las versiones compatibles que se ven afectadas son Oracle Java SE: 8u411, 8u411-perf, 11.0.23, 17.0.11, 21.0.3, 22.0.1; Oracle GraalVM para JDK: 17.0.11, 21.0.3, 22.0.1; Oracle GraalVM Enterprise Edition: 20.3.14 y 21.3.10. Una vulnerabilidad dif\u00edcil de explotar permite que un atacante no autenticado con acceso a la red a trav\u00e9s de m\u00faltiples protocolos comprometa Oracle Java SE, Oracle GraalVM para JDK y Oracle GraalVM Enterprise Edition. Los ataques exitosos de esta vulnerabilidad pueden resultar en acceso no autorizado a actualizaciones, inserci\u00f3n o eliminaci\u00f3n de algunos datos accesibles de Oracle Java SE, Oracle GraalVM para JDK, Oracle GraalVM Enterprise Edition, as\u00ed como acceso de lectura no autorizado a un subconjunto de Oracle Java SE, Oracle GraalVM para JDK, datos accesibles de Oracle GraalVM Enterprise Edition. Nota: Esta vulnerabilidad se puede aprovechar utilizando API en el componente especificado, por ejemplo, a trav\u00e9s de un servicio web que proporciona datos a las API. Esta vulnerabilidad tambi\u00e9n se aplica a las implementaciones de Java, normalmente en clientes que ejecutan aplicaciones Java Web Start en un espacio aislado o subprogramas de Java en un espacio aislado, que cargan y ejecutan c\u00f3digo que no es de confianza (por ejemplo, c\u00f3digo que proviene de Internet) y dependen del entorno limitado de Java para su seguridad. CVSS 3.1 Puntaje base 4.8 (Impactos en la confidencialidad y la integridad). Vector CVSS: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N)."
}
],
"metrics": {
@ -36,6 +40,10 @@
]
},
"references": [
{
"url": "https://security.netapp.com/advisory/ntap-20240719-0008/",
"source": "secalert_us@oracle.com"
},
{
"url": "https://www.oracle.com/security-alerts/cpujul2024.html",
"source": "secalert_us@oracle.com"

View File

@ -2,13 +2,17 @@
"id": "CVE-2024-21144",
"sourceIdentifier": "secalert_us@oracle.com",
"published": "2024-07-16T23:15:15.810",
"lastModified": "2024-07-17T13:34:20.520",
"lastModified": "2024-07-19T14:15:05.497",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Vulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Concurrency). Supported versions that are affected are Oracle Java SE: 8u411, 8u411-perf, 11.0.23; Oracle GraalVM Enterprise Edition: 20.3.14 and 21.3.10. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Oracle Java SE, Oracle GraalVM Enterprise Edition. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.1 Base Score 3.7 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L)."
},
{
"lang": "es",
"value": "Vulnerabilidad en el producto Oracle Java SE, Oracle GraalVM Enterprise Edition de Oracle Java SE (componente: Concurrencia). Las versiones compatibles que se ven afectadas son Oracle Java SE: 8u411, 8u411-perf, 11.0.23; Oracle GraalVM Enterprise Edition: 20.3.14 y 21.3.10. Una vulnerabilidad dif\u00edcil de explotar permite que un atacante no autenticado con acceso a la red a trav\u00e9s de m\u00faltiples protocolos comprometa Oracle Java SE, Oracle GraalVM Enterprise Edition. Los ataques exitosos de esta vulnerabilidad pueden resultar en una capacidad no autorizada para causar una denegaci\u00f3n de servicio parcial (DOS parcial) de Oracle Java SE, Oracle GraalVM Enterprise Edition. Nota: Esta vulnerabilidad se aplica a implementaciones de Java, generalmente en clientes que ejecutan aplicaciones Java Web Start en espacio aislado o subprogramas de Java en espacio aislado, que cargan y ejecutan c\u00f3digo que no es de confianza (por ejemplo, c\u00f3digo que proviene de Internet) y dependen del entorno limitado de Java para su seguridad. Esta vulnerabilidad no se aplica a implementaciones de Java, normalmente en servidores, que cargan y ejecutan s\u00f3lo c\u00f3digo confiable (por ejemplo, c\u00f3digo instalado por un administrador). CVSS 3.1 Puntuaci\u00f3n base 3.7 (impactos en la disponibilidad). Vector CVSS: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L)."
}
],
"metrics": {
@ -36,6 +40,10 @@
]
},
"references": [
{
"url": "https://security.netapp.com/advisory/ntap-20240719-0007/",
"source": "secalert_us@oracle.com"
},
{
"url": "https://www.oracle.com/security-alerts/cpujul2024.html",
"source": "secalert_us@oracle.com"

View File

@ -2,13 +2,17 @@
"id": "CVE-2024-21145",
"sourceIdentifier": "secalert_us@oracle.com",
"published": "2024-07-16T23:15:15.993",
"lastModified": "2024-07-17T13:34:20.520",
"lastModified": "2024-07-19T14:15:05.580",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Vulnerability in the Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: 2D). Supported versions that are affected are Oracle Java SE: 8u411, 8u411-perf, 11.0.23, 17.0.11, 21.0.3, 22.0.1; Oracle GraalVM for JDK: 17.0.11, 21.0.3, 22.0.1; Oracle GraalVM Enterprise Edition: 20.3.14 and 21.3.10. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition accessible data as well as unauthorized read access to a subset of Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability can be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. This vulnerability also applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. CVSS 3.1 Base Score 4.8 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N)."
},
{
"lang": "es",
"value": "Vulnerabilidad en el producto Oracle Java SE, Oracle GraalVM para JDK, Oracle GraalVM Enterprise Edition de Oracle Java SE (componente: 2D). Las versiones compatibles que se ven afectadas son Oracle Java SE: 8u411, 8u411-perf, 11.0.23, 17.0.11, 21.0.3, 22.0.1; Oracle GraalVM para JDK: 17.0.11, 21.0.3, 22.0.1; Oracle GraalVM Enterprise Edition: 20.3.14 y 21.3.10. Una vulnerabilidad dif\u00edcil de explotar permite que un atacante no autenticado con acceso a la red a trav\u00e9s de m\u00faltiples protocolos comprometa Oracle Java SE, Oracle GraalVM para JDK y Oracle GraalVM Enterprise Edition. Los ataques exitosos de esta vulnerabilidad pueden resultar en acceso no autorizado a actualizaciones, inserci\u00f3n o eliminaci\u00f3n de algunos datos accesibles de Oracle Java SE, Oracle GraalVM para JDK, Oracle GraalVM Enterprise Edition, as\u00ed como acceso de lectura no autorizado a un subconjunto de Oracle Java SE, Oracle GraalVM para JDK, datos accesibles de Oracle GraalVM Enterprise Edition. Nota: Esta vulnerabilidad se puede aprovechar utilizando API en el componente especificado, por ejemplo, a trav\u00e9s de un servicio web que proporciona datos a las API. Esta vulnerabilidad tambi\u00e9n se aplica a las implementaciones de Java, normalmente en clientes que ejecutan aplicaciones Java Web Start en un espacio aislado o subprogramas de Java en un espacio aislado, que cargan y ejecutan c\u00f3digo que no es de confianza (por ejemplo, c\u00f3digo que proviene de Internet) y dependen del entorno limitado de Java para su seguridad. CVSS 3.1 Puntaje base 4.8 (Impactos en la confidencialidad y la integridad). Vector CVSS: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N)."
}
],
"metrics": {
@ -36,6 +40,10 @@
]
},
"references": [
{
"url": "https://security.netapp.com/advisory/ntap-20240719-0008/",
"source": "secalert_us@oracle.com"
},
{
"url": "https://www.oracle.com/security-alerts/cpujul2024.html",
"source": "secalert_us@oracle.com"

View File

@ -2,13 +2,17 @@
"id": "CVE-2024-21147",
"sourceIdentifier": "secalert_us@oracle.com",
"published": "2024-07-16T23:15:16.377",
"lastModified": "2024-07-17T13:34:20.520",
"lastModified": "2024-07-19T14:15:05.667",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Vulnerability in the Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Hotspot). Supported versions that are affected are Oracle Java SE: 8u411, 8u411-perf, 11.0.23, 17.0.11, 21.0.3, 22.0.1; Oracle GraalVM for JDK: 17.0.11, 21.0.3, 22.0.1; Oracle GraalVM Enterprise Edition: 20.3.14 and 21.3.10. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition accessible data as well as unauthorized access to critical data or complete access to all Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability can be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. This vulnerability also applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. CVSS 3.1 Base Score 7.4 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N)."
},
{
"lang": "es",
"value": "Vulnerabilidad en el producto Oracle Java SE, Oracle GraalVM para JDK, Oracle GraalVM Enterprise Edition de Oracle Java SE (componente: Hotspot). Las versiones compatibles que se ven afectadas son Oracle Java SE: 8u411, 8u411-perf, 11.0.23, 17.0.11, 21.0.3, 22.0.1; Oracle GraalVM para JDK: 17.0.11, 21.0.3, 22.0.1; Oracle GraalVM Enterprise Edition: 20.3.14 y 21.3.10. Una vulnerabilidad dif\u00edcil de explotar permite que un atacante no autenticado con acceso a la red a trav\u00e9s de m\u00faltiples protocolos comprometa Oracle Java SE, Oracle GraalVM para JDK y Oracle GraalVM Enterprise Edition. Los ataques exitosos de esta vulnerabilidad pueden resultar en acceso no autorizado a la creaci\u00f3n, eliminaci\u00f3n o modificaci\u00f3n de datos cr\u00edticos o a todos los datos accesibles de Oracle Java SE, Oracle GraalVM para JDK, Oracle GraalVM Enterprise Edition, as\u00ed como acceso no autorizado a datos cr\u00edticos o acceso completo a todo Oracle Java. SE, Oracle GraalVM para JDK, datos accesibles de Oracle GraalVM Enterprise Edition. Nota: Esta vulnerabilidad se puede aprovechar utilizando API en el componente especificado, por ejemplo, a trav\u00e9s de un servicio web que proporciona datos a las API. Esta vulnerabilidad tambi\u00e9n se aplica a las implementaciones de Java, normalmente en clientes que ejecutan aplicaciones Java Web Start en un espacio aislado o subprogramas de Java en un espacio aislado, que cargan y ejecutan c\u00f3digo que no es de confianza (por ejemplo, c\u00f3digo que proviene de Internet) y dependen del entorno limitado de Java para su seguridad. CVSS 3.1 Puntaje base 7.4 (Impactos en la confidencialidad y la integridad). Vector CVSS: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N)."
}
],
"metrics": {
@ -36,6 +40,10 @@
]
},
"references": [
{
"url": "https://security.netapp.com/advisory/ntap-20240719-0008/",
"source": "secalert_us@oracle.com"
},
{
"url": "https://www.oracle.com/security-alerts/cpujul2024.html",
"source": "secalert_us@oracle.com"

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-22018",
"sourceIdentifier": "support@hackerone.com",
"published": "2024-07-10T02:15:03.160",
"lastModified": "2024-07-11T19:15:11.303",
"lastModified": "2024-07-19T14:15:05.763",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
@ -44,6 +44,10 @@
"url": "http://www.openwall.com/lists/oss-security/2024/07/11/6",
"source": "support@hackerone.com"
},
{
"url": "http://www.openwall.com/lists/oss-security/2024/07/19/3",
"source": "support@hackerone.com"
},
{
"url": "https://hackerone.com/reports/2145862",
"source": "support@hackerone.com"

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-22020",
"sourceIdentifier": "support@hackerone.com",
"published": "2024-07-09T02:15:09.973",
"lastModified": "2024-07-11T19:15:11.407",
"lastModified": "2024-07-19T14:15:05.863",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
@ -56,6 +56,10 @@
"url": "http://www.openwall.com/lists/oss-security/2024/07/11/6",
"source": "support@hackerone.com"
},
{
"url": "http://www.openwall.com/lists/oss-security/2024/07/19/3",
"source": "support@hackerone.com"
},
{
"url": "https://hackerone.com/reports/2092749",
"source": "support@hackerone.com"

View File

@ -0,0 +1,25 @@
{
"id": "CVE-2024-27489",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-07-19T15:15:10.210",
"lastModified": "2024-07-19T15:15:10.210",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "An issue in the DelFile() function of WMCMS v4.4 allows attackers to delete arbitrary files via a crafted POST request."
}
],
"metrics": {},
"references": [
{
"url": "https://gist.github.com/yyyyy7777777/a36541cb60d9e55628f78f2a68968212",
"source": "cve@mitre.org"
},
{
"url": "https://gitee.com/y1336247431/poc-public/issues/I920OW",
"source": "cve@mitre.org"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-35328",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-06-13T16:15:11.037",
"lastModified": "2024-06-13T18:35:19.777",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-07-19T15:25:50.030",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -15,11 +15,66 @@
"value": "libyaml v0.2.5 es vulnerable a DDOS. La funci\u00f3n yaml_parser_parse del archivo /src/libyaml/src/parser.c es afectada por esta vulnerabilidad."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-835"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:pyyaml:libyaml:0.2.5:*:*:*:*:*:*:*",
"matchCriteriaId": "A6BEAEF3-43E6-4FD6-8A52-C73530C631E9"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/idhyt/pocs/blob/main/libyaml/CVE-2024-35328.c",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Exploit"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-37474",
"sourceIdentifier": "audit@patchstack.com",
"published": "2024-07-04T19:15:10.790",
"lastModified": "2024-07-05T12:55:51.367",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-07-19T15:34:49.460",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -17,6 +17,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 5.4,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.3,
"impactScore": 2.7
},
{
"source": "audit@patchstack.com",
"type": "Secondary",
@ -39,10 +59,43 @@
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:automattic:newspack:*:*:*:*:*:*:*:*",
"versionEndExcluding": "1.47.2",
"matchCriteriaId": "2966F72A-C5ED-4E67-A588-F50DCAC946F7"
}
]
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/vulnerability/newspack-ads/wordpress-newspack-ads-plugin-1-47-1-cross-site-scripting-xss-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
"source": "audit@patchstack.com",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-37802",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-06-18T17:15:52.133",
"lastModified": "2024-07-03T02:04:46.857",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2024-07-19T14:52:41.287",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -17,6 +17,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
@ -40,6 +60,16 @@
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-89"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
@ -51,14 +81,38 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:health_care_hospital_management_system_project:health_care_hospital_management_system:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "BD74EE23-7D08-4E89-B9C8-32ABE39D428F"
}
]
}
]
}
],
"references": [
{
"url": "https://code-projects.org/health-care-hospital-in-php-css-js-and-mysql-free-download/",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Product"
]
},
{
"url": "https://github.com/SandeepRajauriya/CVEs/blob/main/CVE-2024-37802",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-37882",
"sourceIdentifier": "security-advisories@github.com",
"published": "2024-06-14T16:15:12.863",
"lastModified": "2024-06-17T12:42:04.623",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-07-19T14:57:28.583",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -17,6 +17,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "NONE",
"baseScore": 8.1,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.2
},
{
"source": "security-advisories@github.com",
"type": "Secondary",
@ -40,6 +60,16 @@
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-281"
}
]
},
{
"source": "security-advisories@github.com",
"type": "Secondary",
@ -51,18 +81,112 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:nextcloud:nextcloud_server:*:*:*:*:-:*:*:*",
"versionStartIncluding": "26.0.0",
"versionEndExcluding": "26.0.13",
"matchCriteriaId": "8F643317-2586-435E-8D89-721BC6161691"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:nextcloud:nextcloud_server:*:*:*:*:-:*:*:*",
"versionStartIncluding": "27.0.0",
"versionEndExcluding": "27.1.8",
"matchCriteriaId": "8696DA00-5B0C-45F5-BD50-9FF1F5E4646F"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:nextcloud:nextcloud_server:*:*:*:*:-:*:*:*",
"versionStartIncluding": "28.0.0",
"versionEndExcluding": "28.0.4",
"matchCriteriaId": "C3A816F7-5D5E-43CB-9C53-E4C5B1344C84"
}
]
}
]
},
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:nextcloud:nextcloud_server:*:*:*:*:enterprise:*:*:*",
"versionStartIncluding": "23.0.0",
"versionEndExcluding": "23.0.12.17",
"matchCriteriaId": "ED4378AE-1AD4-4E15-A64C-E4028FCD098F"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:nextcloud:nextcloud_server:*:*:*:*:enterprise:*:*:*",
"versionStartIncluding": "24.0.0",
"versionEndExcluding": "24.0.12.13",
"matchCriteriaId": "20A172FB-2E26-4ADD-BA55-0ECC5E5FCFD1"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:nextcloud:nextcloud_server:*:*:*:*:enterprise:*:*:*",
"versionStartIncluding": "25.0.0",
"versionEndExcluding": "25.0.13.8",
"matchCriteriaId": "7D2923A6-9A3C-4B66-82D4-E02A0E8F16A4"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:nextcloud:nextcloud_server:*:*:*:*:enterprise:*:*:*",
"versionStartIncluding": "26.0.0",
"versionEndExcluding": "26.0.13",
"matchCriteriaId": "6909C63C-3755-4B68-B90E-4C5E14C78787"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:nextcloud:nextcloud_server:*:*:*:*:enterprise:*:*:*",
"versionStartIncluding": "27.0.0",
"versionEndExcluding": "27.1.8",
"matchCriteriaId": "B6C25B03-B587-4F48-BE81-052AF67E2045"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:nextcloud:nextcloud_server:*:*:*:*:enterprise:*:*:*",
"versionStartIncluding": "28.0.0",
"versionEndExcluding": "28.0.4",
"matchCriteriaId": "E04001FE-890B-4D94-B679-B0854E840F39"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-jjm3-j9xh-5xmq",
"source": "security-advisories@github.com"
"source": "security-advisories@github.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://github.com/nextcloud/server/pull/44339",
"source": "security-advisories@github.com"
"source": "security-advisories@github.com",
"tags": [
"Patch"
]
},
{
"url": "https://hackerone.com/reports/2289425",
"source": "security-advisories@github.com"
"source": "security-advisories@github.com",
"tags": [
"Issue Tracking"
]
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-37894",
"sourceIdentifier": "security-advisories@github.com",
"published": "2024-06-25T20:15:11.873",
"lastModified": "2024-06-26T12:44:29.693",
"lastModified": "2024-07-19T14:15:05.957",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
@ -59,6 +59,10 @@
{
"url": "https://github.com/squid-cache/squid/security/advisories/GHSA-wgvf-q977-9xjg",
"source": "security-advisories@github.com"
},
{
"url": "https://security.netapp.com/advisory/ntap-20240719-0001/",
"source": "security-advisories@github.com"
}
]
}

View File

@ -0,0 +1,21 @@
{
"id": "CVE-2024-39962",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-07-19T15:15:10.320",
"lastModified": "2024-07-19T15:15:10.320",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "D-Link DIR-823X AX3000 Dual-Band Gigabit Wireless Router v21_D240126 was discovered to contain a remote code execution (RCE) vulnerability in the ntp_zone_val parameter at /goform/set_ntp. This vulnerability is exploited via a crafted HTTP request."
}
],
"metrics": {},
"references": [
{
"url": "https://gist.github.com/Swind1er/40c33f1b1549028677cb4e2e5ef69109",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,21 @@
{
"id": "CVE-2024-39963",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-07-19T15:15:10.383",
"lastModified": "2024-07-19T15:15:10.383",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "AX3000 Dual-Band Gigabit Wi-Fi 6 Router AX9 V22.03.01.46 and AX3000 Dual-Band Gigabit Wi-Fi 6 Router AX12 V1.0 V22.03.01.46 were discovered to contain an authenticated remote command execution (RCE) vulnerability via the macFilterType parameter at /goform/setMacFilterCfg."
}
],
"metrics": {},
"references": [
{
"url": "https://gist.github.com/Swind1er/c8e4369c7fdfd750c8ad01a276105c57",
"source": "cve@mitre.org"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-40637",
"sourceIdentifier": "security-advisories@github.com",
"published": "2024-07-16T23:15:24.260",
"lastModified": "2024-07-17T13:34:20.520",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-07-19T14:37:17.863",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -17,6 +17,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
},
{
"source": "security-advisories@github.com",
"type": "Secondary",
@ -40,6 +60,16 @@
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-89"
}
]
},
{
"source": "security-advisories@github.com",
"type": "Secondary",
@ -51,38 +81,90 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:getdbt:dbt_core:*:*:*:*:*:*:*:*",
"versionEndExcluding": "1.6.14",
"matchCriteriaId": "914D843B-54DC-45D0-ACC5-CA2EE99FE727"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:getdbt:dbt_core:*:*:*:*:*:*:*:*",
"versionStartIncluding": "1.7.0",
"versionEndExcluding": "1.7.14",
"matchCriteriaId": "9452C38F-FDF5-4F99-87A9-3C6DBBA031F2"
}
]
}
]
}
],
"references": [
{
"url": "https://docs.getdbt.com/docs/build/packages",
"source": "security-advisories@github.com"
"source": "security-advisories@github.com",
"tags": [
"Product"
]
},
{
"url": "https://docs.getdbt.com/reference/global-configs/legacy-behaviors#behavior-change-flags",
"source": "security-advisories@github.com"
"source": "security-advisories@github.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://github.com/dbt-labs/dbt-core/commit/3c82a0296d227cb1be295356df314c11716f4ff6",
"source": "security-advisories@github.com"
"source": "security-advisories@github.com",
"tags": [
"Patch"
]
},
{
"url": "https://github.com/dbt-labs/dbt-core/commit/87ac4deb00cc9fe334706e42a365903a1d581624",
"source": "security-advisories@github.com"
"source": "security-advisories@github.com",
"tags": [
"Patch"
]
},
{
"url": "https://github.com/dbt-labs/dbt-core/security/advisories/GHSA-p3f3-5ccg-83xq",
"source": "security-advisories@github.com"
"source": "security-advisories@github.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://tempered.works/posts/2024/07/06/preventing-data-theft-with-gcp-service-controls",
"source": "security-advisories@github.com"
"source": "security-advisories@github.com",
"tags": [
"Exploit",
"Third Party Advisory"
]
},
{
"url": "https://www.elementary-data.com/post/are-dbt-packages-secure-the-answer-lies-in-your-dwh-policies",
"source": "security-advisories@github.com"
"source": "security-advisories@github.com",
"tags": [
"Exploit",
"Third Party Advisory"
]
},
{
"url": "https://www.equalexperts.com/blog/tech-focus/are-you-at-risk-from-this-critical-dbt-vulnerability",
"source": "security-advisories@github.com"
"source": "security-advisories@github.com",
"tags": [
"Exploit",
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-41009",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2024-07-17T07:15:01.973",
"lastModified": "2024-07-17T13:34:20.520",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-07-19T15:06:23.827",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -15,23 +15,107 @@
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: bpf: corrige el exceso de reservas en ringbuf. El b\u00fafer de anillo BPF se implementa internamente como un b\u00fafer circular de tama\u00f1o potencia de 2, con dos contadores l\u00f3gicos y en constante aumento: consumer_pos es el consumidor contador para mostrar en qu\u00e9 posici\u00f3n l\u00f3gica el consumidor consumi\u00f3 los datos, y productor_pos, que es el contador del productor que indica la cantidad de datos reservados por todos los productores. Cada vez que se reserva un registro, el productor \"due\u00f1o\" del registro avanzar\u00e1 exitosamente el contador de productores. En el espacio de usuario, cada vez que se lee un registro, el consumidor de los datos avanza el contador del consumidor una vez que finaliza el procesamiento. Ambos contadores se almacenan en p\u00e1ginas separadas de modo que, desde el espacio del usuario, el contador del productor sea de solo lectura y el contador del consumidor sea de lectura y escritura. Un aspecto que simplifica y, por lo tanto, acelera la implementaci\u00f3n tanto de productores como de consumidores es c\u00f3mo el \u00e1rea de datos se mapea dos veces de forma contigua y consecutiva en la memoria virtual, lo que permite no tomar medidas especiales para las muestras que tienen que envolverse en el mismo lugar. al final del \u00e1rea de datos del b\u00fafer circular, porque la p\u00e1gina siguiente despu\u00e9s de la \u00faltima p\u00e1gina de datos volver\u00eda a ser la primera p\u00e1gina de datos y, por lo tanto, la muestra seguir\u00e1 apareciendo completamente contigua en la memoria virtual. Cada registro tiene una estructura bpf_ringbuf_hdr { u32 len; u32 p\u00e1gina_apagada; } encabezado para la contabilidad de la longitud y el desplazamiento, y es inaccesible para el programa BPF. Ayudantes como bpf_ringbuf_reserve() devuelven `(void *)hdr + BPF_RINGBUF_HDR_SZ` para que lo use el programa BPF. Bing-Jhong y Muhammad informaron que, sin embargo, es posible hacer que un segundo fragmento de memoria asignado se superponga con el primer fragmento y, como resultado, el programa BPF ahora puede editar el encabezado del primer fragmento. Por ejemplo, considere la creaci\u00f3n de un mapa BPF_MAP_TYPE_RINGBUF con un tama\u00f1o de 0x4000. A continuaci\u00f3n, consumer_pos se modifica a 0x3000 /antes/ se realiza una llamada a bpf_ringbuf_reserve(). Esto asignar\u00e1 un fragmento A, que est\u00e1 en [0x0,0x3008], y el programa BPF podr\u00e1 editar [0x8,0x3008]. Ahora, asignemos un fragmento B con tama\u00f1o 0x3000. Esto tendr\u00e1 \u00e9xito porque consumer_pos se edit\u00f3 con anticipaci\u00f3n para pasar la verificaci\u00f3n `new_prod_pos - cons_pos > rb->mask`. El fragmento B estar\u00e1 en el rango [0x3008,0x6010] y el programa BPF podr\u00e1 editar [0x3010,0x6010]. Debido al dise\u00f1o de la memoria del b\u00fafer en anillo mencionado anteriormente, los rangos [0x0,0x4000] y [0x4000,0x8000] apuntan a las mismas p\u00e1ginas de datos. Esto significa que el fragmento B en [0x4000,0x4008] es el encabezado del fragmento A. bpf_ringbuf_submit() / bpf_ringbuf_discard() usa el pg_off del encabezado para luego ubicar el bpf_ringbuf a trav\u00e9s de bpf_ringbuf_restore_from_rec(). Una vez que el fragmento B modific\u00f3 el encabezado del fragmento A, bpf_ringbuf_commit() hace referencia a la p\u00e1gina incorrecta y podr\u00eda causar un bloqueo. Solucionelo calculando el pendiente_pos m\u00e1s antiguo y verifique si el rango desde el registro pendiente m\u00e1s antiguo hasta el m\u00e1s nuevo abarcar\u00eda m\u00e1s all\u00e1 del tama\u00f1o del b\u00fafer circular. Si ese es el caso, rechace la solicitud. Hemos probado con el punto de referencia del b\u00fafer de anillo en las autopruebas de BPF (./benchs/run_bench_ringbufs.sh) antes/despu\u00e9s de la correcci\u00f3n y, aunque parece un poco m\u00e1s lento en algunos puntos de referencia, todav\u00eda no es lo suficientemente significativo como para importar."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-770"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.8",
"versionEndExcluding": "6.1.97",
"matchCriteriaId": "5F2E2CF9-E512-4F81-AD6C-400701BDBF04"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "6.2",
"versionEndExcluding": "6.6.37",
"matchCriteriaId": "D72E033B-5323-4C4D-8818-36E1EBC3535F"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "6.7",
"versionEndExcluding": "6.9.8",
"matchCriteriaId": "E95105F2-32E3-4C5F-9D18-7AEFD0E6275C"
}
]
}
]
}
],
"references": [
{
"url": "https://git.kernel.org/stable/c/47416c852f2a04d348ea66ee451cbdcf8119f225",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Mailing List",
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/511804ab701c0503b72eac08217eabfd366ba069",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Mailing List",
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/cfa1a2329a691ffd991fcf7248a57d752e712881",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Mailing List",
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/d1b9df0435bc61e0b44f578846516df8ef476686",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Mailing List",
"Patch"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-41010",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2024-07-17T07:15:02.183",
"lastModified": "2024-07-18T12:15:03.453",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2024-07-19T15:24:59.137",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -15,19 +15,92 @@
"value": "En el kernel de Linux, se resolvi\u00f3 la siguiente vulnerabilidad: bpf: Se solucion\u00f3 el lanzamiento demasiado temprano de tcx_entry Pedro Pinto y m\u00e1s tarde, de forma independiente, tambi\u00e9n Hyunwoo Kim y Wongi Lee informaron un problema por el cual tcx_entry se puede lanzar demasiado pronto, lo que lleva a un uso posterior a la liberaci\u00f3n (UAF ) cuando una qdisc ingress o clsact antigua activa con un bloque tc compartido se reemplaza posteriormente por otra instancia de ingress o clsact. Esencialmente, la secuencia para activar la UAF (un ejemplo) puede ser la siguiente: 1. Se crea un espacio de nombres de red. 2. Se crea una qdisc de entrada. Esto asigna un tcx_entry, y &tcx_entry->miniq se almacena en el miniqp->p_miniq de la qdisc. Al mismo tiempo, se crea un bloque tcf con \u00edndice 1. 3. chain0 est\u00e1 adjunta al bloque tcf. chain0 debe estar conectado al bloque vinculado a la qdisc de ingreso para luego llegar a la funci\u00f3n tcf_chain0_head_change_cb_del() que activa la UAF. 4. Cree e injerte una qdisc clsact. Esto hace que se elimine la qdisc de entrada creada en el paso 1, liberando as\u00ed la tcx_entry previamente vinculada: rtnetlink_rcv_msg() => tc_modify_qdisc() => qdisc_create() => clsact_init() [a] => qdisc_graft() => qdisc_destroy( ) => __qdisc_destroy() => ingress_destroy() [b] => tcx_entry_free() => kfree_rcu() // tcx_entry liberado 5. Finalmente, se cierra el espacio de nombres de la red. Esto registra el trabajador cleanup_net y, durante el proceso de liberaci\u00f3n de la qdisc clsact restante, accede a tcx_entry que ya se liber\u00f3 en el paso 4, lo que provoca que se produzca la UAF: cleanup_net() => ops_exit_list() => default_device_exit_batch() => unregister_netdevice_many() => unregister_netdevice_many_notify() => dev_shutdown() => qdisc_put() => clsact_destroy() [c] => tcf_block_put_ext() => tcf_chain0_head_change_cb_del() => tcf_chain_head_change_item() => clsact_chain_head_change() => mini_qdisc_pair _intercambiar( ) // UAF Tambi\u00e9n hay otras variantes, lo esencial es agregar una qdisc de ingreso (o clsact) con un bloque compartido espec\u00edfico, luego reemplazar esa qdisc, esperar a que se ejecute tcx_entry kfree_rcu() y posteriormente acceder al activo actual miniq de qdisc de una forma u otra. La soluci\u00f3n correcta es convertir el booleano miniq_active en un contador. Lo que se puede observar, en el paso 2 anterior, el contador pasa de 0->1, en el paso [a] de 1->2 (para que el objeto miniq permanezca activo durante el reemplazo), luego en [b] de 2->1 y finalmente [c] 1->0 con el eventual lanzamiento. El contador de referencia en general oscila entre [0,2] y no necesita ser at\u00f3mico ya que todo acceso al contador est\u00e1 protegido por el mutex rtnl. Con esto implementado, ya no ocurre ning\u00fan UAF y tcx_entry se libera en el momento correcto."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-416"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "6.6",
"versionEndExcluding": "6.6.41",
"matchCriteriaId": "BBD7DB8F-6881-4008-B9ED-5588CD8061D9"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "6.7",
"versionEndExcluding": "6.9.10",
"matchCriteriaId": "AB2E8DEC-CFD5-4C2B-981D-E7E45A36C352"
}
]
}
]
}
],
"references": [
{
"url": "https://git.kernel.org/stable/c/1cb6f0bae50441f4b4b32a28315853b279c7404e",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Mailing List",
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/230bb13650b0f186f540500fd5f5f7096a822a2a",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Mailing List",
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/f61ecf1bd5b562ebfd7d430ccb31619857e80857",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Mailing List",
"Patch"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-41107",
"sourceIdentifier": "security@apache.org",
"published": "2024-07-19T11:15:03.323",
"lastModified": "2024-07-19T13:01:44.567",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-07-19T14:15:06.080",
"vulnStatus": "Undergoing Analysis",
"cveTags": [],
"descriptions": [
{
@ -25,6 +25,14 @@
}
],
"references": [
{
"url": "http://www.openwall.com/lists/oss-security/2024/07/19/1",
"source": "security@apache.org"
},
{
"url": "http://www.openwall.com/lists/oss-security/2024/07/19/2",
"source": "security@apache.org"
},
{
"url": "https://cloudstack.apache.org/blog/security-release-advisory-cve-2024-41107",
"source": "security@apache.org"

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-5251",
"sourceIdentifier": "security@wordfence.com",
"published": "2024-07-17T07:15:02.260",
"lastModified": "2024-07-17T13:34:20.520",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-07-19T15:25:30.980",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -18,8 +18,28 @@
"metrics": {
"cvssMetricV31": [
{
"source": "security@wordfence.com",
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 5.4,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.3,
"impactScore": 2.7
},
{
"source": "security@wordfence.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N",
@ -39,14 +59,50 @@
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:brainstormforce:ultimate_addons_for_wpbakery_page_builder:*:*:*:*:*:wordpress:*:*",
"versionEndExcluding": "3.19.20.1",
"matchCriteriaId": "E1A5EB88-A5D4-4596-957D-601BDC031A72"
}
]
}
]
}
],
"references": [
{
"url": "https://ultimate.brainstormforce.com/changelog/?utm_source=codecanyon-item-page&utm_campaign=uavc-changelog&utm_medium=changelog",
"source": "security@wordfence.com"
"source": "security@wordfence.com",
"tags": [
"Release Notes"
]
},
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/e637044d-9b49-4de5-b8b8-d48a0e5e1afc?source=cve",
"source": "security@wordfence.com"
"source": "security@wordfence.com",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-5252",
"sourceIdentifier": "security@wordfence.com",
"published": "2024-07-17T07:15:02.483",
"lastModified": "2024-07-17T13:34:20.520",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-07-19T15:29:35.447",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -17,6 +17,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 5.4,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.3,
"impactScore": 2.7
},
{
"source": "security@wordfence.com",
"type": "Secondary",
@ -39,14 +59,50 @@
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:brainstormforce:ultimate_addons_for_wpbakery_page_builder:*:*:*:*:*:wordpress:*:*",
"versionEndExcluding": "3.19.20.1",
"matchCriteriaId": "E1A5EB88-A5D4-4596-957D-601BDC031A72"
}
]
}
]
}
],
"references": [
{
"url": "https://ultimate.brainstormforce.com/changelog/?utm_source=codecanyon-item-page&utm_campaign=uavc-changelog&utm_medium=changelog",
"source": "security@wordfence.com"
"source": "security@wordfence.com",
"tags": [
"Release Notes"
]
},
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/675937dc-a032-4bc4-a449-c815fcb12db6?source=cve",
"source": "security@wordfence.com"
"source": "security@wordfence.com",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-5253",
"sourceIdentifier": "security@wordfence.com",
"published": "2024-07-17T07:15:02.690",
"lastModified": "2024-07-17T13:34:20.520",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-07-19T15:30:34.717",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -18,8 +18,28 @@
"metrics": {
"cvssMetricV31": [
{
"source": "security@wordfence.com",
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 5.4,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.3,
"impactScore": 2.7
},
{
"source": "security@wordfence.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N",
@ -39,14 +59,50 @@
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:brainstormforce:ultimate_addons_for_wpbakery_page_builder:*:*:*:*:*:wordpress:*:*",
"versionEndExcluding": "3.19.20.1",
"matchCriteriaId": "E1A5EB88-A5D4-4596-957D-601BDC031A72"
}
]
}
]
}
],
"references": [
{
"url": "https://ultimate.brainstormforce.com/changelog/?utm_source=codecanyon-item-page&utm_campaign=uavc-changelog&utm_medium=changelog",
"source": "security@wordfence.com"
"source": "security@wordfence.com",
"tags": [
"Release Notes"
]
},
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/97666e54-8e86-4f18-ae32-ad8ca607aeff?source=cve",
"source": "security@wordfence.com"
"source": "security@wordfence.com",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-5254",
"sourceIdentifier": "security@wordfence.com",
"published": "2024-07-17T07:15:02.883",
"lastModified": "2024-07-17T13:34:20.520",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-07-19T15:32:05.560",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -18,8 +18,28 @@
"metrics": {
"cvssMetricV31": [
{
"source": "security@wordfence.com",
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 5.4,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.3,
"impactScore": 2.7
},
{
"source": "security@wordfence.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N",
@ -39,14 +59,50 @@
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:brainstormforce:ultimate_addons_for_wpbakery_page_builder:*:*:*:*:*:wordpress:*:*",
"versionEndExcluding": "3.19.20.1",
"matchCriteriaId": "E1A5EB88-A5D4-4596-957D-601BDC031A72"
}
]
}
]
}
],
"references": [
{
"url": "https://ultimate.brainstormforce.com/changelog/?utm_source=codecanyon-item-page&utm_campaign=uavc-changelog&utm_medium=changelog",
"source": "security@wordfence.com"
"source": "security@wordfence.com",
"tags": [
"Release Notes"
]
},
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/4c8971e0-befd-47ac-8cb5-064f9cd757d7?source=cve",
"source": "security@wordfence.com"
"source": "security@wordfence.com",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-5255",
"sourceIdentifier": "security@wordfence.com",
"published": "2024-07-17T07:15:03.073",
"lastModified": "2024-07-17T13:34:20.520",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-07-19T15:32:18.850",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -18,8 +18,28 @@
"metrics": {
"cvssMetricV31": [
{
"source": "security@wordfence.com",
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 5.4,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.3,
"impactScore": 2.7
},
{
"source": "security@wordfence.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N",
@ -39,14 +59,50 @@
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:brainstormforce:ultimate_addons_for_wpbakery_page_builder:*:*:*:*:*:wordpress:*:*",
"versionEndExcluding": "3.19.20.1",
"matchCriteriaId": "E1A5EB88-A5D4-4596-957D-601BDC031A72"
}
]
}
]
}
],
"references": [
{
"url": "https://ultimate.brainstormforce.com/changelog/?utm_source=codecanyon-item-page&utm_campaign=uavc-changelog&utm_medium=changelog",
"source": "security@wordfence.com"
"source": "security@wordfence.com",
"tags": [
"Release Notes"
]
},
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/66d77518-a258-4e79-b483-275855c0a416?source=cve",
"source": "security@wordfence.com"
"source": "security@wordfence.com",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-6008",
"sourceIdentifier": "cna@vuldb.com",
"published": "2024-06-15T15:15:51.033",
"lastModified": "2024-06-17T16:15:16.140",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-07-19T14:52:08.110",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -61,6 +61,26 @@
}
],
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
},
{
"source": "cna@vuldb.com",
"type": "Secondary",
@ -120,22 +140,53 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:isourcecode:online_book_store_project_in_php_with_source_code:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "71AB5A7E-412A-4649-9E8D-465255D0757F"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/1902zdq/cve/issues/1",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Technical Description",
"Third Party Advisory"
]
},
{
"url": "https://vuldb.com/?ctiid.268698",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Permissions Required"
]
},
{
"url": "https://vuldb.com/?id.268698",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://vuldb.com/?submit.357143",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Issue Tracking"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-6009",
"sourceIdentifier": "cna@vuldb.com",
"published": "2024-06-15T16:15:09.830",
"lastModified": "2024-06-17T12:42:04.623",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-07-19T14:24:41.657",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -61,6 +61,26 @@
}
],
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
},
{
"source": "cna@vuldb.com",
"type": "Secondary",
@ -120,22 +140,53 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:itsourcecode:learning_management_system_project_in_php_with_source_code:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "AD4B5F22-F2E1-4DDB-ABEA-61B253FE76F6"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/AutoZhou1/cve/issues/1",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Technical Description",
"Third Party Advisory"
]
},
{
"url": "https://vuldb.com/?ctiid.268699",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Permissions Required"
]
},
{
"url": "https://vuldb.com/?id.268699",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://vuldb.com/?submit.357243",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Issue Tracking"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-6013",
"sourceIdentifier": "cna@vuldb.com",
"published": "2024-06-15T16:15:10.137",
"lastModified": "2024-06-17T12:42:04.623",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-07-19T14:20:07.337",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -61,6 +61,26 @@
}
],
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
},
{
"source": "cna@vuldb.com",
"type": "Secondary",
@ -120,22 +140,53 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:itsourcecode:online_book_store_project_in_php_and_mysql_with_source_code:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "7F4DCA80-C02C-4BE9-83EE-294CD8ECFDD1"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/gabriel202212/cve/issues/1",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Technical Description",
"Third Party Advisory"
]
},
{
"url": "https://vuldb.com/?ctiid.268721",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Permissions Required"
]
},
{
"url": "https://vuldb.com/?id.268721",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://vuldb.com/?submit.357075",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Issue Tracking"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-6014",
"sourceIdentifier": "cna@vuldb.com",
"published": "2024-06-15T17:15:49.100",
"lastModified": "2024-06-17T12:42:04.623",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-07-19T14:18:17.607",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -61,6 +61,26 @@
}
],
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
},
{
"source": "cna@vuldb.com",
"type": "Secondary",
@ -120,22 +140,53 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:itsourcecode:document_management_system_project_in_php_with_source_code:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "B896ED3E-BEFB-4226-9F2E-D703C9765BB1"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/gabriel202212/cve/issues/2",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Technical Description",
"Third Party Advisory"
]
},
{
"url": "https://vuldb.com/?ctiid.268722",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Permissions Required"
]
},
{
"url": "https://vuldb.com/?id.268722",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://vuldb.com/?submit.357246",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Issue Tracking"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-6015",
"sourceIdentifier": "cna@vuldb.com",
"published": "2024-06-15T17:15:49.403",
"lastModified": "2024-06-17T15:15:52.830",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-07-19T14:13:10.463",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -61,6 +61,26 @@
}
],
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
},
{
"source": "cna@vuldb.com",
"type": "Secondary",
@ -120,22 +140,53 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:itsourcecode:online_house_rental_system_project_in_php_with_source_code:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "83FB0E1D-9D4D-40F5-8326-94970698C31F"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/chenwulin-bit/cve/issues/1",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Technical Description",
"Third Party Advisory"
]
},
{
"url": "https://vuldb.com/?ctiid.268723",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Permissions Required"
]
},
{
"url": "https://vuldb.com/?id.268723",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://vuldb.com/?submit.357462",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Issue Tracking"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-6016",
"sourceIdentifier": "cna@vuldb.com",
"published": "2024-06-15T19:15:48.443",
"lastModified": "2024-06-17T14:15:12.487",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-07-19T14:02:04.600",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -61,6 +61,26 @@
}
],
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
},
{
"source": "cna@vuldb.com",
"type": "Secondary",
@ -120,22 +140,53 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:itsourcecode:laundry_management_system_project_in_php_with_source_code:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "9098A3E9-9903-45B9-8F93-8F55DD9FD767"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/chenwulin-bit/cve/issues/2",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Technical Description",
"Third Party Advisory"
]
},
{
"url": "https://vuldb.com/?ctiid.268724",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Permissions Required"
]
},
{
"url": "https://vuldb.com/?id.268724",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://vuldb.com/?submit.357463",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Issue Tracking"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-6033",
"sourceIdentifier": "security@wordfence.com",
"published": "2024-07-17T07:15:03.263",
"lastModified": "2024-07-17T13:34:20.520",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-07-19T15:32:49.507",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -39,18 +39,57 @@
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-862"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:themewinter:eventin:*:*:*:*:*:wordpress:*:*",
"versionEndExcluding": "4.0.5",
"matchCriteriaId": "2649BF6F-6AE1-457C-BDD2-8BE619A86541"
}
]
}
]
}
],
"references": [
{
"url": "https://plugins.trac.wordpress.org/browser/wp-event-solution/trunk/core/admin/hooks.php#L135",
"source": "security@wordfence.com"
"source": "security@wordfence.com",
"tags": [
"Product"
]
},
{
"url": "https://plugins.trac.wordpress.org/changeset/3117477/",
"source": "security@wordfence.com"
"source": "security@wordfence.com",
"tags": [
"Patch"
]
},
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/1725c7f3-2fac-4714-a63e-6c43694483fc?source=cve",
"source": "security@wordfence.com"
"source": "security@wordfence.com",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-6467",
"sourceIdentifier": "security@wordfence.com",
"published": "2024-07-17T07:15:03.493",
"lastModified": "2024-07-17T13:34:20.520",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-07-19T15:37:51.067",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -39,14 +39,50 @@
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:reputeinfosystems:bookingpress:*:*:*:*:*:wordpress:*:*",
"versionEndExcluding": "1.1.6",
"matchCriteriaId": "A8CF2DD1-8A61-44C8-9AC4-F0AE958530BE"
}
]
}
]
}
],
"references": [
{
"url": "https://plugins.trac.wordpress.org/changeset/3116857/bookingpress-appointment-booking/trunk/core/classes/class.bookingpress.php",
"source": "security@wordfence.com"
"source": "security@wordfence.com",
"tags": [
"Patch"
]
},
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/d0177510-cd7d-4cc5-96c3-78433aa0e3f6?source=cve",
"source": "security@wordfence.com"
"source": "security@wordfence.com",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-6535",
"sourceIdentifier": "secalert@redhat.com",
"published": "2024-07-17T03:15:01.890",
"lastModified": "2024-07-17T13:34:20.520",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-07-19T15:00:32.153",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -17,6 +17,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 5.3,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 3.9,
"impactScore": 1.4
},
{
"source": "secalert@redhat.com",
"type": "Secondary",
@ -41,8 +61,18 @@
},
"weaknesses": [
{
"source": "secalert@redhat.com",
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-287"
}
]
},
{
"source": "secalert@redhat.com",
"type": "Secondary",
"description": [
{
"lang": "en",
@ -51,14 +81,37 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:redhat:service_interconnect:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "12B0CF2B-D1E1-4E20-846E-6F0D873499A9"
}
]
}
]
}
],
"references": [
{
"url": "https://access.redhat.com/security/cve/CVE-2024-6535",
"source": "secalert@redhat.com"
"source": "secalert@redhat.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2296024",
"source": "secalert@redhat.com"
"source": "secalert@redhat.com",
"tags": [
"Issue Tracking"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-6595",
"sourceIdentifier": "cve@gitlab.com",
"published": "2024-07-17T02:15:10.130",
"lastModified": "2024-07-17T13:34:20.520",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-07-19T14:52:54.943",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -17,6 +17,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 5.3,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 3.9,
"impactScore": 1.4
},
{
"source": "cve@gitlab.com",
"type": "Secondary",
@ -40,6 +60,16 @@
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-434"
}
]
},
{
"source": "cve@gitlab.com",
"type": "Secondary",
@ -51,14 +81,75 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:gitlab:gitlab:*:*:*:*:community:*:*:*",
"versionStartIncluding": "11.8.0",
"versionEndExcluding": "16.11.6",
"matchCriteriaId": "67B15D59-0B7C-46F9-80D8-CBD123B54E1D"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:gitlab:gitlab:*:*:*:*:enterprise:*:*:*",
"versionStartIncluding": "11.8.0",
"versionEndExcluding": "16.11.6",
"matchCriteriaId": "BABDAF38-D90B-42A5-BACC-5565A4ADBEF6"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:gitlab:gitlab:*:*:*:*:community:*:*:*",
"versionStartIncluding": "17.0.0",
"versionEndExcluding": "17.0.4",
"matchCriteriaId": "C7412902-D4C7-4172-BE56-8D4677226D96"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:gitlab:gitlab:*:*:*:*:enterprise:*:*:*",
"versionStartIncluding": "17.0.0",
"versionEndExcluding": "17.0.4",
"matchCriteriaId": "12CB9371-7540-4483-A3EE-061ACAF47067"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:gitlab:gitlab:*:*:*:*:community:*:*:*",
"versionStartIncluding": "17.1.0",
"versionEndExcluding": "17.1.2",
"matchCriteriaId": "45878C42-2DC4-4A09-ADA6-80BCCCF35DDA"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:gitlab:gitlab:*:*:*:*:enterprise:*:*:*",
"versionStartIncluding": "17.1.0",
"versionEndExcluding": "17.1.2",
"matchCriteriaId": "19C3FE9A-BACE-4750-A2C9-E43B7E824711"
}
]
}
]
}
],
"references": [
{
"url": "https://blog.vlt.sh/blog/the-massive-hole-in-the-npm-ecosystem",
"source": "cve@gitlab.com"
"source": "cve@gitlab.com",
"tags": [
"Exploit",
"Third Party Advisory"
]
},
{
"url": "https://gitlab.com/gitlab-org/gitlab/-/issues/417975",
"source": "cve@gitlab.com"
"source": "cve@gitlab.com",
"tags": [
"Issue Tracking"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-6660",
"sourceIdentifier": "security@wordfence.com",
"published": "2024-07-17T07:15:03.683",
"lastModified": "2024-07-17T13:34:20.520",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-07-19T15:48:14.040",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -39,26 +39,71 @@
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-862"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:reputeinfosystems:bookingpress:*:*:*:*:*:wordpress:*:*",
"versionEndExcluding": "1.1.6",
"matchCriteriaId": "A8CF2DD1-8A61-44C8-9AC4-F0AE958530BE"
}
]
}
]
}
],
"references": [
{
"url": "https://plugins.trac.wordpress.org/browser/bookingpress-appointment-booking/trunk/core/classes/class.bookingpress_import_export.php#L1491",
"source": "security@wordfence.com"
"source": "security@wordfence.com",
"tags": [
"Product"
]
},
{
"url": "https://plugins.trac.wordpress.org/browser/bookingpress-appointment-booking/trunk/core/classes/class.bookingpress_import_export.php#L410",
"source": "security@wordfence.com"
"source": "security@wordfence.com",
"tags": [
"Product"
]
},
{
"url": "https://plugins.trac.wordpress.org/browser/bookingpress-appointment-booking/trunk/core/classes/class.bookingpress_import_export.php#L476",
"source": "security@wordfence.com"
"source": "security@wordfence.com",
"tags": [
"Product"
]
},
{
"url": "https://plugins.trac.wordpress.org/changeset/3116857/bookingpress-appointment-booking/trunk/core/classes/class.bookingpress_import_export.php?contextall=1",
"source": "security@wordfence.com"
"source": "security@wordfence.com",
"tags": [
"Patch"
]
},
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/851ff861-474e-4063-88ff-d8d35b10e9a0?source=cve",
"source": "security@wordfence.com"
"source": "security@wordfence.com",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-6669",
"sourceIdentifier": "security@wordfence.com",
"published": "2024-07-17T07:15:03.873",
"lastModified": "2024-07-17T13:34:20.520",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-07-19T15:56:47.190",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -18,8 +18,28 @@
"metrics": {
"cvssMetricV31": [
{
"source": "security@wordfence.com",
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 4.8,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.7,
"impactScore": 2.7
},
{
"source": "security@wordfence.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:L/I:L/A:N",
@ -39,26 +59,71 @@
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:quantumcloud:ai_chatbot:*:*:*:*:*:wordpress:*:*",
"versionEndExcluding": "5.5.8",
"matchCriteriaId": "991EF6A7-AD8D-4148-9BBE-3D5EEBC82E4A"
}
]
}
]
}
],
"references": [
{
"url": "https://plugins.trac.wordpress.org/browser/chatbot/trunk/admin_ui.php#L2211",
"source": "security@wordfence.com"
"source": "security@wordfence.com",
"tags": [
"Product"
]
},
{
"url": "https://plugins.trac.wordpress.org/browser/chatbot/trunk/admin_ui.php#L755",
"source": "security@wordfence.com"
"source": "security@wordfence.com",
"tags": [
"Product"
]
},
{
"url": "https://plugins.trac.wordpress.org/changeset/3119022/",
"source": "security@wordfence.com"
"source": "security@wordfence.com",
"tags": [
"Patch"
]
},
{
"url": "https://wordpress.org/plugins/chatbot/#developers",
"source": "security@wordfence.com"
"source": "security@wordfence.com",
"tags": [
"Release Notes"
]
},
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/ce23efed-fe21-486a-ab3b-9ed0dd26a971?source=cve",
"source": "security@wordfence.com"
"source": "security@wordfence.com",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-6801",
"sourceIdentifier": "cna@vuldb.com",
"published": "2024-07-17T02:15:10.367",
"lastModified": "2024-07-17T13:34:20.520",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-07-19T14:55:25.753",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -61,6 +61,26 @@
}
],
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
},
{
"source": "cna@vuldb.com",
"type": "Secondary",
@ -120,22 +140,54 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:online_student_management_system_project:online_student_management_system:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "422F2579-A688-4D6E-97D2-873C5BCABFD8"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/aaajuna/demo/issues/1",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Third Party Advisory"
]
},
{
"url": "https://vuldb.com/?ctiid.271703",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Permissions Required"
]
},
{
"url": "https://vuldb.com/?id.271703",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "https://vuldb.com/?submit.374774",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-6802",
"sourceIdentifier": "cna@vuldb.com",
"published": "2024-07-17T02:15:10.780",
"lastModified": "2024-07-17T13:34:20.520",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-07-19T14:58:12.707",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -61,6 +61,26 @@
}
],
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
},
{
"source": "cna@vuldb.com",
"type": "Secondary",
@ -120,22 +140,57 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:computer_laboratory_management_system_project:computer_laboratory_management_system:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "2F90DE9D-E1E0-40CF-91E5-B93DFA487DBD"
}
]
}
]
}
],
"references": [
{
"url": "https://reports-kunull.vercel.app/CVE%20research/computer-laboratory-management-system-save_record",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Broken Link"
]
},
{
"url": "https://vuldb.com/?ctiid.271704",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Permissions Required",
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "https://vuldb.com/?id.271704",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Permissions Required",
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "https://vuldb.com/?submit.374797",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Third Party Advisory",
"VDB Entry"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-6803",
"sourceIdentifier": "cna@vuldb.com",
"published": "2024-07-17T03:15:02.130",
"lastModified": "2024-07-17T13:34:20.520",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-07-19T15:01:50.250",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -61,6 +61,26 @@
}
],
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
},
{
"source": "cna@vuldb.com",
"type": "Secondary",
@ -120,22 +140,55 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:document_management_system_project:document_management_system:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "120BA9C1-F846-4761-B02A-2880FDD0D36C"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/hzy11111111/cve/issues/3",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
]
},
{
"url": "https://vuldb.com/?ctiid.271705",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Permissions Required"
]
},
{
"url": "https://vuldb.com/?id.271705",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "https://vuldb.com/?submit.374809",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-6807",
"sourceIdentifier": "cna@vuldb.com",
"published": "2024-07-17T04:15:02.720",
"lastModified": "2024-07-17T13:34:20.520",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-07-19T15:03:08.933",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -61,6 +61,26 @@
}
],
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:N/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 4.1,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.3,
"impactScore": 1.4
},
{
"source": "cna@vuldb.com",
"type": "Secondary",
@ -120,22 +140,54 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:student_study_center_desk_management_system_project:student_study_center_desk_management_system:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "5A7F67EA-5AEE-4BE7-8EB3-F5C2FFDC5344"
}
]
}
]
}
],
"references": [
{
"url": "https://reports-kunull.vercel.app/CVE%20research/student-study-center-desk-management-system-xss-firstname",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Broken Link"
]
},
{
"url": "https://vuldb.com/?ctiid.271706",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Permissions Required"
]
},
{
"url": "https://vuldb.com/?id.271706",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "https://vuldb.com/?submit.374853",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Third Party Advisory",
"VDB Entry"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-6808",
"sourceIdentifier": "cna@vuldb.com",
"published": "2024-07-17T04:15:03.320",
"lastModified": "2024-07-18T16:15:08.300",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2024-07-19T15:04:43.837",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -61,6 +61,26 @@
}
],
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
},
{
"source": "cna@vuldb.com",
"type": "Secondary",
@ -120,22 +140,55 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:code-projects:simple_task_list:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "B691815C-6D04-44C0-9DB6-B189933EFC52"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/qianqiusujiu/cve/issues/1",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
]
},
{
"url": "https://vuldb.com/?ctiid.271707",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Permissions Required"
]
},
{
"url": "https://vuldb.com/?id.271707",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "https://vuldb.com/?submit.375154",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
}
]
}

View File

@ -0,0 +1,78 @@
{
"id": "CVE-2024-6895",
"sourceIdentifier": "security@yugabyte.com",
"published": "2024-07-19T15:15:10.547",
"lastModified": "2024-07-19T15:15:10.547",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Insufficient authentication in user account management in Yugabyte Platform allows local network attackers with a compromised user session to change critical security information without re-authentication. An attacker with user session and access to application can modify settings such as password and email without being prompted for the current password, enabling account takeover."
}
],
"metrics": {
"cvssMetricV40": [
{
"source": "security@yugabyte.com",
"type": "Secondary",
"cvssData": {
"version": "4.0",
"vectorString": "CVSS:4.0/AV:A/AC:H/AT:N/PR:H/UI:P/VC:H/VI:L/VA:L/SC:H/SI:H/SA:H/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"attackVector": "ADJACENT",
"attackComplexity": "HIGH",
"attackRequirements": "NONE",
"privilegesRequired": "HIGH",
"userInteraction": "PASSIVE",
"vulnerableSystemConfidentiality": "HIGH",
"vulnerableSystemIntegrity": "LOW",
"vulnerableSystemAvailability": "LOW",
"subsequentSystemConfidentiality": "HIGH",
"subsequentSystemIntegrity": "HIGH",
"subsequentSystemAvailability": "HIGH",
"exploitMaturity": "NOT_DEFINED",
"confidentialityRequirements": "NOT_DEFINED",
"integrityRequirements": "NOT_DEFINED",
"availabilityRequirements": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnerableSystemConfidentiality": "NOT_DEFINED",
"modifiedVulnerableSystemIntegrity": "NOT_DEFINED",
"modifiedVulnerableSystemAvailability": "NOT_DEFINED",
"modifiedSubsequentSystemConfidentiality": "NOT_DEFINED",
"modifiedSubsequentSystemIntegrity": "NOT_DEFINED",
"modifiedSubsequentSystemAvailability": "NOT_DEFINED",
"safety": "NOT_DEFINED",
"automatable": "NOT_DEFINED",
"recovery": "NOT_DEFINED",
"valueDensity": "NOT_DEFINED",
"vulnerabilityResponseEffort": "NOT_DEFINED",
"providerUrgency": "NOT_DEFINED",
"baseScore": 6.1,
"baseSeverity": "MEDIUM"
}
}
]
},
"weaknesses": [
{
"source": "security@yugabyte.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-306"
}
]
}
],
"references": [
{
"url": "https://github.com/yugabyte/yugabyte-db/commit/9687371d8777f876285b737a9d01995bc46bafa5",
"source": "security@yugabyte.com"
}
]
}

View File

@ -0,0 +1,82 @@
{
"id": "CVE-2024-6908",
"sourceIdentifier": "security@yugabyte.com",
"published": "2024-07-19T15:15:10.747",
"lastModified": "2024-07-19T15:15:10.747",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Improper privilege management in Yugabyte Platform allows authenticated admin users to escalate privileges to SuperAdmin via a crafted PUT HTTP request, potentially leading to unauthorized access to sensitive system functions and data."
}
],
"metrics": {
"cvssMetricV40": [
{
"source": "security@yugabyte.com",
"type": "Secondary",
"cvssData": {
"version": "4.0",
"vectorString": "CVSS:4.0/AV:A/AC:L/AT:P/PR:H/UI:P/VC:L/VI:H/VA:N/SC:H/SI:H/SA:H/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"attackVector": "ADJACENT",
"attackComplexity": "LOW",
"attackRequirements": "PRESENT",
"privilegesRequired": "HIGH",
"userInteraction": "PASSIVE",
"vulnerableSystemConfidentiality": "LOW",
"vulnerableSystemIntegrity": "HIGH",
"vulnerableSystemAvailability": "NONE",
"subsequentSystemConfidentiality": "HIGH",
"subsequentSystemIntegrity": "HIGH",
"subsequentSystemAvailability": "HIGH",
"exploitMaturity": "NOT_DEFINED",
"confidentialityRequirements": "NOT_DEFINED",
"integrityRequirements": "NOT_DEFINED",
"availabilityRequirements": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnerableSystemConfidentiality": "NOT_DEFINED",
"modifiedVulnerableSystemIntegrity": "NOT_DEFINED",
"modifiedVulnerableSystemAvailability": "NOT_DEFINED",
"modifiedSubsequentSystemConfidentiality": "NOT_DEFINED",
"modifiedSubsequentSystemIntegrity": "NOT_DEFINED",
"modifiedSubsequentSystemAvailability": "NOT_DEFINED",
"safety": "NOT_DEFINED",
"automatable": "NOT_DEFINED",
"recovery": "NOT_DEFINED",
"valueDensity": "NOT_DEFINED",
"vulnerabilityResponseEffort": "NOT_DEFINED",
"providerUrgency": "NOT_DEFINED",
"baseScore": 6.0,
"baseSeverity": "MEDIUM"
}
}
]
},
"weaknesses": [
{
"source": "security@yugabyte.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-269"
}
]
}
],
"references": [
{
"url": "https://github.com/yugabyte/yugabyte-db/commit/03b193de40b79329439bb9968a7d27a1cc57d662",
"source": "security@yugabyte.com"
},
{
"url": "https://github.com/yugabyte/yugabyte-db/commit/68f01680c565be2a370cfb7734a1b3721d6778bb",
"source": "security@yugabyte.com"
}
]
}

View File

@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours.
### Last Repository Update
```plain
2024-07-19T14:00:18.683832+00:00
2024-07-19T16:00:18.490265+00:00
```
### Most recent CVE Modification Timestamp synchronized with NVD
```plain
2024-07-19T13:39:30.817000+00:00
2024-07-19T15:56:47.190000+00:00
```
### Last Data Feed Release
@ -33,45 +33,50 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
### Total Number of included CVEs
```plain
257499
257505
```
### CVEs added in the last Commit
Recently added CVEs: `1`
Recently added CVEs: `6`
- [CVE-2024-37066](CVE-2024/CVE-2024-370xx/CVE-2024-37066.json) (`2024-07-19T12:15:02.320`)
- [CVE-2024-0006](CVE-2024/CVE-2024-00xx/CVE-2024-0006.json) (`2024-07-19T15:15:09.930`)
- [CVE-2024-27489](CVE-2024/CVE-2024-274xx/CVE-2024-27489.json) (`2024-07-19T15:15:10.210`)
- [CVE-2024-39962](CVE-2024/CVE-2024-399xx/CVE-2024-39962.json) (`2024-07-19T15:15:10.320`)
- [CVE-2024-39963](CVE-2024/CVE-2024-399xx/CVE-2024-39963.json) (`2024-07-19T15:15:10.383`)
- [CVE-2024-6895](CVE-2024/CVE-2024-68xx/CVE-2024-6895.json) (`2024-07-19T15:15:10.547`)
- [CVE-2024-6908](CVE-2024/CVE-2024-69xx/CVE-2024-6908.json) (`2024-07-19T15:15:10.747`)
### CVEs modified in the last Commit
Recently modified CVEs: `80`
Recently modified CVEs: `44`
- [CVE-2024-41111](CVE-2024/CVE-2024-411xx/CVE-2024-41111.json) (`2024-07-19T13:01:44.567`)
- [CVE-2024-41172](CVE-2024/CVE-2024-411xx/CVE-2024-41172.json) (`2024-07-19T13:01:44.567`)
- [CVE-2024-5321](CVE-2024/CVE-2024-53xx/CVE-2024-5321.json) (`2024-07-19T13:01:44.567`)
- [CVE-2024-5604](CVE-2024/CVE-2024-56xx/CVE-2024-5604.json) (`2024-07-19T13:01:44.567`)
- [CVE-2024-5618](CVE-2024/CVE-2024-56xx/CVE-2024-5618.json) (`2024-07-19T13:01:44.567`)
- [CVE-2024-5619](CVE-2024/CVE-2024-56xx/CVE-2024-5619.json) (`2024-07-19T13:01:44.567`)
- [CVE-2024-5620](CVE-2024/CVE-2024-56xx/CVE-2024-5620.json) (`2024-07-19T13:01:44.567`)
- [CVE-2024-5625](CVE-2024/CVE-2024-56xx/CVE-2024-5625.json) (`2024-07-19T13:01:44.567`)
- [CVE-2024-5977](CVE-2024/CVE-2024-59xx/CVE-2024-5977.json) (`2024-07-19T13:01:44.567`)
- [CVE-2024-5997](CVE-2024/CVE-2024-59xx/CVE-2024-5997.json) (`2024-07-19T13:01:44.567`)
- [CVE-2024-6205](CVE-2024/CVE-2024-62xx/CVE-2024-6205.json) (`2024-07-19T13:01:44.567`)
- [CVE-2024-6338](CVE-2024/CVE-2024-63xx/CVE-2024-6338.json) (`2024-07-19T13:01:44.567`)
- [CVE-2024-6455](CVE-2024/CVE-2024-64xx/CVE-2024-6455.json) (`2024-07-19T13:01:44.567`)
- [CVE-2024-6799](CVE-2024/CVE-2024-67xx/CVE-2024-6799.json) (`2024-07-19T13:01:44.567`)
- [CVE-2024-6898](CVE-2024/CVE-2024-68xx/CVE-2024-6898.json) (`2024-07-19T13:01:44.567`)
- [CVE-2024-6899](CVE-2024/CVE-2024-68xx/CVE-2024-6899.json) (`2024-07-19T13:01:44.567`)
- [CVE-2024-6900](CVE-2024/CVE-2024-69xx/CVE-2024-6900.json) (`2024-07-19T13:01:44.567`)
- [CVE-2024-6901](CVE-2024/CVE-2024-69xx/CVE-2024-6901.json) (`2024-07-19T13:01:44.567`)
- [CVE-2024-6902](CVE-2024/CVE-2024-69xx/CVE-2024-6902.json) (`2024-07-19T13:01:44.567`)
- [CVE-2024-6903](CVE-2024/CVE-2024-69xx/CVE-2024-6903.json) (`2024-07-19T13:01:44.567`)
- [CVE-2024-6904](CVE-2024/CVE-2024-69xx/CVE-2024-6904.json) (`2024-07-19T13:01:44.567`)
- [CVE-2024-6905](CVE-2024/CVE-2024-69xx/CVE-2024-6905.json) (`2024-07-19T13:01:44.567`)
- [CVE-2024-6906](CVE-2024/CVE-2024-69xx/CVE-2024-6906.json) (`2024-07-19T13:01:44.567`)
- [CVE-2024-6907](CVE-2024/CVE-2024-69xx/CVE-2024-6907.json) (`2024-07-19T13:01:44.567`)
- [CVE-2024-6916](CVE-2024/CVE-2024-69xx/CVE-2024-6916.json) (`2024-07-19T13:01:44.567`)
- [CVE-2024-41009](CVE-2024/CVE-2024-410xx/CVE-2024-41009.json) (`2024-07-19T15:06:23.827`)
- [CVE-2024-41010](CVE-2024/CVE-2024-410xx/CVE-2024-41010.json) (`2024-07-19T15:24:59.137`)
- [CVE-2024-41107](CVE-2024/CVE-2024-411xx/CVE-2024-41107.json) (`2024-07-19T14:15:06.080`)
- [CVE-2024-5251](CVE-2024/CVE-2024-52xx/CVE-2024-5251.json) (`2024-07-19T15:25:30.980`)
- [CVE-2024-5252](CVE-2024/CVE-2024-52xx/CVE-2024-5252.json) (`2024-07-19T15:29:35.447`)
- [CVE-2024-5253](CVE-2024/CVE-2024-52xx/CVE-2024-5253.json) (`2024-07-19T15:30:34.717`)
- [CVE-2024-5254](CVE-2024/CVE-2024-52xx/CVE-2024-5254.json) (`2024-07-19T15:32:05.560`)
- [CVE-2024-5255](CVE-2024/CVE-2024-52xx/CVE-2024-5255.json) (`2024-07-19T15:32:18.850`)
- [CVE-2024-6008](CVE-2024/CVE-2024-60xx/CVE-2024-6008.json) (`2024-07-19T14:52:08.110`)
- [CVE-2024-6009](CVE-2024/CVE-2024-60xx/CVE-2024-6009.json) (`2024-07-19T14:24:41.657`)
- [CVE-2024-6013](CVE-2024/CVE-2024-60xx/CVE-2024-6013.json) (`2024-07-19T14:20:07.337`)
- [CVE-2024-6014](CVE-2024/CVE-2024-60xx/CVE-2024-6014.json) (`2024-07-19T14:18:17.607`)
- [CVE-2024-6015](CVE-2024/CVE-2024-60xx/CVE-2024-6015.json) (`2024-07-19T14:13:10.463`)
- [CVE-2024-6016](CVE-2024/CVE-2024-60xx/CVE-2024-6016.json) (`2024-07-19T14:02:04.600`)
- [CVE-2024-6033](CVE-2024/CVE-2024-60xx/CVE-2024-6033.json) (`2024-07-19T15:32:49.507`)
- [CVE-2024-6467](CVE-2024/CVE-2024-64xx/CVE-2024-6467.json) (`2024-07-19T15:37:51.067`)
- [CVE-2024-6535](CVE-2024/CVE-2024-65xx/CVE-2024-6535.json) (`2024-07-19T15:00:32.153`)
- [CVE-2024-6595](CVE-2024/CVE-2024-65xx/CVE-2024-6595.json) (`2024-07-19T14:52:54.943`)
- [CVE-2024-6660](CVE-2024/CVE-2024-66xx/CVE-2024-6660.json) (`2024-07-19T15:48:14.040`)
- [CVE-2024-6669](CVE-2024/CVE-2024-66xx/CVE-2024-6669.json) (`2024-07-19T15:56:47.190`)
- [CVE-2024-6801](CVE-2024/CVE-2024-68xx/CVE-2024-6801.json) (`2024-07-19T14:55:25.753`)
- [CVE-2024-6802](CVE-2024/CVE-2024-68xx/CVE-2024-6802.json) (`2024-07-19T14:58:12.707`)
- [CVE-2024-6803](CVE-2024/CVE-2024-68xx/CVE-2024-6803.json) (`2024-07-19T15:01:50.250`)
- [CVE-2024-6807](CVE-2024/CVE-2024-68xx/CVE-2024-6807.json) (`2024-07-19T15:03:08.933`)
- [CVE-2024-6808](CVE-2024/CVE-2024-68xx/CVE-2024-6808.json) (`2024-07-19T15:04:43.837`)
## Download and Usage

View File

@ -29106,7 +29106,7 @@ CVE-2007-6349,0,0,55c2309c853ce1ea78f598953eac0bbbffd257655f0e04247272f36f40682e
CVE-2007-6350,0,0,53461a66d55fce94ee8771f8c1589164b26a5137407c8a93b914a38060a54074,2011-08-08T04:00:00
CVE-2007-6351,0,0,104fd677a458e7236e358907764e2252d7ded497fa8382007a54e0f75cb5c65c,2021-01-26T13:07:36.500000
CVE-2007-6352,0,0,f530a14c21bfc055404c29a80912ec97b7445e32f99ddb2051e95278cf78642b,2018-10-15T21:52:19.970000
CVE-2007-6353,0,1,3fbb9122b2d3dbf0ff1069cce1228f9fd5bc5301d0de322b4ed4666eb3ccf364,2024-07-19T13:04:35.477000
CVE-2007-6353,0,0,3fbb9122b2d3dbf0ff1069cce1228f9fd5bc5301d0de322b4ed4666eb3ccf364,2024-07-19T13:04:35.477000
CVE-2007-6354,0,0,9f2be0d0508b8864496e3a779e2936853f0a62ee0d84b838e31c9dc7d9e0041e,2011-05-13T04:00:00
CVE-2007-6355,0,0,b02cf3e83b9f403b5686286eee9a5674328ff97478346cd2f406deb9f9e17877,2011-05-13T04:00:00
CVE-2007-6356,0,0,84732a36e499b486f879b128037576ea39e0d40b6ae5bdec6082a08f9459ae21,2011-03-08T03:02:31.687000
@ -72693,7 +72693,7 @@ CVE-2014-9153,0,0,1852fe3a0151bd62e5dc4286a28ef9334fbdff3a30a23b3a5ba8e0cbe7223f
CVE-2014-9154,0,0,59bd739983a682bc345e74585d02d50f06d7b4e8f99f02180fb6d28be4347f40,2014-12-05T16:32:24.930000
CVE-2014-9155,0,0,565ceaf371a314db9a7df10e83e92282637c016a54717a3daedce1a87946f1c9,2014-12-05T16:10:56.670000
CVE-2014-9156,0,0,d8e68076b6f619078f4af9051bf6f4fd924cd6008e80510a17f25c8459b60727,2014-12-01T19:15:55.913000
CVE-2014-9157,0,1,25f2e7a07445fb463b309b296fc12d6eb152478e4b0d875cf8a5e2b104d6b069,2024-07-19T13:02:55.980000
CVE-2014-9157,0,0,25f2e7a07445fb463b309b296fc12d6eb152478e4b0d875cf8a5e2b104d6b069,2024-07-19T13:02:55.980000
CVE-2014-9158,0,0,9e594330e6883ce054afa992a164552596d2d4233052544abefd7afe2a0b3cde,2014-12-12T01:40:25.750000
CVE-2014-9159,0,0,509d5f2dd5a7b8088aee0d037a7af644ed36efde6f1510e915a6157e2c645ecd,2014-12-12T01:40:55.657000
CVE-2014-9160,0,0,5bae4029507e5450b4ce949da937cd00adbc4dab93c07ba69378d2cba9487060,2017-01-03T02:59:22.783000
@ -73024,7 +73024,7 @@ CVE-2014-9510,0,0,19193e66fd5db68f4c1e456f32a619257e3e6ab946f404bae7f293cab5d117
CVE-2014-9512,0,0,2ab5a92bff5ea988b46f3c00235ff6b672ecc142bd47d1d0aa5028bc6e300774,2020-07-28T20:15:12.060000
CVE-2014-9513,0,0,e745d9fde65a85ae96dae0b70254a67ff78cb9eebe7681bd336ec22167e84fd3,2017-09-08T02:22:47.890000
CVE-2014-9514,0,0,23d982d511dc4dd5b0ee4d20d13ec854282abd7ffd4e0f326a23013c9c55db06,2017-08-31T13:46:55.820000
CVE-2014-9515,0,0,522befe469b9d40f52519c18e0454e66503e6f41ddbade7816d38d3a9e79e342,2021-06-14T18:15:10.637000
CVE-2014-9515,0,1,24be7155019de27e80399c6be5475ef64a6aedbe97577a256ae0a18f9a53e8b2,2024-07-19T14:15:02.500000
CVE-2014-9516,0,0,6e198e840f166756d5e58760115938c2a398eec9cfd4aedac45b0f03710a6db7,2015-01-06T16:48:32.723000
CVE-2014-9517,0,0,279a156651ad5993cc16d034460157adb07f2c6a29e6d67e65e7aceb275abac6,2023-11-17T20:01:31.690000
CVE-2014-9518,0,0,5942cce75c2632a7a5abda187d30833574a9d1d9769e051797a5faa5f3a6d96b,2015-01-06T17:37:17.063000
@ -74386,7 +74386,7 @@ CVE-2015-0969,0,0,98a698159207b459a01c1c68618daf4c818febd68fd91bb81989c3b302cdd6
CVE-2015-0970,0,0,8acab781ba8956dc0da47639ab5844d9a863a603c524e26ca5728a588e8126c7,2019-09-27T16:44:28.233000
CVE-2015-0971,0,0,fe1ad42b256a586c6c7695e21f0ec0e2da11a1b53f584460eba8191e6bc180e3,2015-05-15T15:13:25.893000
CVE-2015-0972,0,0,13a4b8c6ef17ab64f1fb0b583479c02c9508b9578186aba569147c4411ed7607,2015-06-24T17:50:23.243000
CVE-2015-0973,0,0,30178994f4b1d92c263cfc842e6dbd36de812993fe86681e8bc3d7f14022cd86,2016-10-20T18:46:05.357000
CVE-2015-0973,0,1,68eaec9323199d783bace3e5c2615086955fd739151902f1903c1a081de9375d,2024-07-19T14:15:04.343000
CVE-2015-0974,0,0,258cdcfae939df11916595c4876ef9eaccdc2ba26fd1dea8a6d5276161c32b70,2017-09-12T15:37:58.493000
CVE-2015-0976,0,0,2459cd195fd89a053ff7217ae74342de6e3b68fd8bae7e138d0af08dc7cf7405,2015-04-03T15:16:34.467000
CVE-2015-0977,0,0,5944267d3fb952b169bc9eb9bd7b1770691968e29cc26b84f3c43f8b400515a7,2015-02-27T17:41:21.397000
@ -87012,7 +87012,7 @@ CVE-2016-3747,0,0,1e9866632061c3379cd0e6306f66e694439cbbedc1b178c6335abc792da298
CVE-2016-3748,0,0,1c90f13a2854c36ccb8761c0d4511424580cf135f1a89bed8050ac8d3598fb73,2016-07-11T18:28:53.910000
CVE-2016-3749,0,0,ae78f56f9fd18e113b7c89b9925288c976404bc1c24a2abf327a46e025b7abbc,2016-07-11T18:44:36.083000
CVE-2016-3750,0,0,dbcd5f94bf55d295346ddcf597a79c4071914ee295c9ea0ac6d107da0c74a475,2016-07-11T17:41:12.853000
CVE-2016-3751,0,0,d6fa721cc5b225d90a72381b15dbbe9aed866e2aaef844bb8379f29346384a4e,2016-07-11T17:52:53.463000
CVE-2016-3751,0,1,bc5fb81d6aaede233a449dfe8134a1c0218e0b6eb2595073967828d7767ce9d9,2024-07-19T14:15:04.573000
CVE-2016-3752,0,0,08630fd893f115bbf043182ef5338cb2b3540573825045c80ee2ab5bc120c4bd,2016-07-11T18:30:55.097000
CVE-2016-3753,0,0,dd8974f1d4e0c13e24104b3efc7433b1c6ae7ba7ee54ada5e0fd36e0fbc8c193,2016-07-11T17:43:18.823000
CVE-2016-3754,0,0,d435c37b580863e722e7200f62350927f37401218352adce39fd1358431d7b72,2016-07-11T14:24:05.513000
@ -94648,7 +94648,7 @@ CVE-2017-10668,0,0,b3b508dd00bbdfc4c32f6581e93268dce58b239af608215f8dafb9abd8c85
CVE-2017-10669,0,0,7da649796bd95a8a6a0d1a6b84a5510f1ef49df12cc5ae837320c5d13c649741,2017-07-06T17:58:48.303000
CVE-2017-1067,0,0,5e339d272fa99fe498529e1e3f23492889219a4846a477cf56fa0d2def6fb28c,2023-11-07T02:42:16.020000
CVE-2017-10670,0,0,75e8d8e75065c423c1872194b012eae82d189cdc3a5608e753726629523f2d01,2017-07-06T17:59:00.303000
CVE-2017-10671,0,1,606bbab4b09c232a580fdd6efa3d3f824ac23e373bb70dd833ae3218d06c0a1f,2024-07-19T13:05:10.600000
CVE-2017-10671,0,0,606bbab4b09c232a580fdd6efa3d3f824ac23e373bb70dd833ae3218d06c0a1f,2024-07-19T13:05:10.600000
CVE-2017-10672,0,0,62592e865e8978294f88122696807d65be2bb0bd6d142716ae24419459c99b49,2020-03-03T16:19:15.567000
CVE-2017-10673,0,0,65ef9bdfaef3afbef0939aefc7763de9df86875cbd97c71a7ba545a71cc477d0,2019-12-12T13:19:51.560000
CVE-2017-10674,0,0,7851d14fd365008a24460c45a3ce5da5c2fc9ddae735a4dd058c21e94b7bc166,2017-07-06T18:07:48.387000
@ -111218,7 +111218,7 @@ CVE-2018-1005,0,0,d15517e4e9e1db97d14dbcdeaf7d5651f0a12edff3ffd4d54845b92a268387
CVE-2018-10050,0,0,cf969848703a9b2a59313bb2763aa6281c852347ea8fc74d79bc4af3b1a62f1b,2018-05-09T18:29:04.107000
CVE-2018-10051,0,0,a3a0bac148a003ebba2da5967ead0666f6bef310e10c1de782105abb79ce9cd0,2018-05-09T18:08:23.747000
CVE-2018-10052,0,0,c3523c185ff2d85e9b0d31e90c216f284db2ddf40b6a13205a1dada94b27cb86,2018-05-09T18:08:07.997000
CVE-2018-10054,0,0,b52aafc7cb0753cd5d8aedcb5800310d90ae68be994becb0ca74c14745dbc854,2024-06-26T20:15:12.490000
CVE-2018-10054,0,1,7f164c93c8e6890f848f21703272543af1c1fbf11f41915a444773969d4cc474,2024-07-19T14:15:04.740000
CVE-2018-10055,0,0,19ad0ade7b7357d87bb6d75a4a0074bf851fab84c4fa3854fa7c1dc98e1e34d2,2019-04-30T18:34:22.890000
CVE-2018-10057,0,0,8274f370e169947a28352a8fdf79fe87593e238312e1b2440e7e17f4f8c9d759,2018-07-27T14:46:42.937000
CVE-2018-10058,0,0,6c8812623ef7c6db9316c220fe09077dc0f3d104fee66ccb3137c7904cdf1c30,2020-08-24T17:37:01.140000
@ -135204,7 +135204,7 @@ CVE-2019-1762,0,0,3dfc024db74375afdf9a77e3e3d3e77477c0dc637b15bea512092209468fef
CVE-2019-17621,0,0,85c741f8f9d3768b4e0bc281bd2ffe8a1855adf9bd3e1544afe4cacd9303ad45,2024-06-27T19:16:32.357000
CVE-2019-17624,0,0,34cab4b9b8d5fd56bfc68f777500f1464c84eadfdadf7fa0aa670b2a02bdf5e3,2020-08-24T17:18:39.590000
CVE-2019-17625,0,0,f99f6d326f4f07f8173685deb9c85452c592dde1d884b81fde79c62991d31705,2019-10-16T22:36:38.803000
CVE-2019-17626,0,0,d1c3fb8e5ca035b4f87dd71a60e3770f7122dede40f7721dcdc139ead5251446,2023-11-07T03:06:23.607000
CVE-2019-17626,0,1,d2aa81cde2600dfc256b5d4d18d747ff1f1ad0f938c459c4a76386c31a4f51fb,2024-07-19T14:15:04.930000
CVE-2019-17627,0,0,2086a1ffab420c4fd78d53df0f3352f1f205cc73c687051ffb86e903c95610e9,2019-10-18T17:00:37.100000
CVE-2019-17629,0,0,614b65deffa0b7bdceaa98f22d6aa3f8eb8c190d3d454fa4d90cc0a6f0072c6f,2019-10-16T19:11:34.597000
CVE-2019-1763,0,0,b419eaed4c26a3ac25bfa3529a129186a61beb7ca26002e3ca272799a77e5f6a,2020-10-08T19:58:23.100000
@ -230061,7 +230061,7 @@ CVE-2023-40154,0,0,6db426d68f75684e01202401e3ecbe622403876ecbe4560542d2a6ae15228
CVE-2023-40155,0,0,6607ef25c31938b51bd9b5bc14fc82ea7b9d6e01e850e1c2a7260709004a339f,2024-07-03T01:41:05.087000
CVE-2023-40156,0,0,5e8f76b298822e89ccc8b4a43484c8f474a98f9ca30f47e72c0a6bb7cf341fbd,2024-02-14T15:01:46.050000
CVE-2023-40158,0,0,ea9ecbd6acdb9ee425f0387337774eb7bca92a549c7bbb73ec67e17a1e55242b,2023-08-29T14:35:53.187000
CVE-2023-40159,0,1,73d39db9bfd3bad5c8e909b94a6eb837640d49007d2a26b95faa032fcf43ed99,2024-07-19T13:01:44.567000
CVE-2023-40159,0,0,73d39db9bfd3bad5c8e909b94a6eb837640d49007d2a26b95faa032fcf43ed99,2024-07-19T13:01:44.567000
CVE-2023-4016,0,0,fd0766ac93b2d18ad336657f47ddb29d4b25b76da4cba12e55388717e6b8762f,2023-12-15T18:19:03.787000
CVE-2023-40160,0,0,de8c32a875ccf6f89392dafa209d66eda2b9b820e48facccb8082fc450366841,2024-03-18T01:53:02.353000
CVE-2023-40161,0,0,811acdcf20dca77f5e641cd172c1882f83d8fefd01d88b9229bb052c09bff4e9,2024-02-14T15:01:46.050000
@ -230123,7 +230123,7 @@ CVE-2023-40219,0,0,771f66a87abf8df69cce91491665e525ddb3d080b9e78bf4734e3298840cb
CVE-2023-4022,0,0,d6b23d4a259ff425e0bcea23f81328a67bb6e3c44aa2685891847b3db1b81338,2023-11-07T04:22:03.600000
CVE-2023-40220,0,0,89c4602906f60678a7794892d3cd5810d595c00980d101471846882934615bc4,2023-11-22T15:13:46.893000
CVE-2023-40221,0,0,fc206e84687a442a6b6faace8e4cb4d304dab11b253a40c7c3859764d42592bc,2024-06-04T19:17:38.693000
CVE-2023-40223,0,1,d04b62607941a7a62c505babe0b67a0c8d9fa8e1269f219147a221743a1b0798,2024-07-19T13:01:44.567000
CVE-2023-40223,0,0,d04b62607941a7a62c505babe0b67a0c8d9fa8e1269f219147a221743a1b0798,2024-07-19T13:01:44.567000
CVE-2023-40224,0,0,fe7ff7e2259903cb6a2b8a487e5657d52b403fb11aed6d8e638eabcae3a7d45a,2023-11-17T05:15:12.387000
CVE-2023-40225,0,0,4211aba8908007a30e95209432ab11366dbf58cece809a97f23ca0a3fb4772c7,2023-08-18T20:03:17.290000
CVE-2023-4023,0,0,9994c1fc2e5c266fe881d2394936c6b00f055b3f4cc90c0fb1f5d28d281ef9df,2023-11-07T04:22:03.717000
@ -230396,7 +230396,7 @@ CVE-2023-40534,0,0,e8ece95a9c479f54fdd96184c96036c3ca75ef517f90de3d989a08bfce9bf
CVE-2023-40535,0,0,3dd8b6e353e77bc78b3eaf66d47e8a5e362a0b31feec7a87804f2cc657d03e6f,2023-09-08T18:49:20.803000
CVE-2023-40536,0,0,9551e2fe36c80eabdc1a2e97ded6be800d2fb9f544e15a4ec84bb644eba227af,2024-05-17T18:36:05.263000
CVE-2023-40537,0,0,75f58d7d08cd8fb906c24aefd5bbf6d6b69c82ba74790056d8b068a8723a2e25,2023-10-19T16:43:11.323000
CVE-2023-40539,0,1,0260cd4683ea1e89f6283f932c1a63c6dd5e1b1420f5c025e0cff80c05f811c3,2024-07-19T13:01:44.567000
CVE-2023-40539,0,0,0260cd4683ea1e89f6283f932c1a63c6dd5e1b1420f5c025e0cff80c05f811c3,2024-07-19T13:01:44.567000
CVE-2023-4054,0,0,53238c21c0a1eb83d08a1b3d2d86562b494ce0912d3fd29acf557c382ca3a9f1,2023-08-07T14:51:09.667000
CVE-2023-40540,0,0,1e03a01e888f27e7c3ca51db2a4bc2550b4a2afd268bf6a33f8cdd0d825d3736,2023-11-22T15:13:18.220000
CVE-2023-40541,0,0,daaec126802b21cc7a612331601c83efdf2fbb147626236fb6df03c2ce8ee7c6,2023-10-12T02:32:07.413000
@ -230552,7 +230552,7 @@ CVE-2023-40699,0,0,1c71007d49a9bda3bb25ac8a38884f2ffc429a510e5d9039d4e8477ec5b0a
CVE-2023-4070,0,0,a493fa1b62788c24fea8f8fc21746dc89c9760da767bd18023dad9b52c2e8327,2024-01-31T17:15:13.767000
CVE-2023-40702,0,0,62d180282da772c8c0e58ade691879d7f1cf512a29de8bc9063c44bdbe2af130,2024-07-09T18:18:38.713000
CVE-2023-40703,0,0,35695eb835fa32a192b950c3dccf44faf04da11a8e115230e010144a1f1eab33,2023-12-01T19:13:28.487000
CVE-2023-40704,0,1,9209d06e6b6a45b0b11e619acb500fbe43d9b7e6a6300160ab05b4ff17ab2034,2024-07-19T13:01:44.567000
CVE-2023-40704,0,0,9209d06e6b6a45b0b11e619acb500fbe43d9b7e6a6300160ab05b4ff17ab2034,2024-07-19T13:01:44.567000
CVE-2023-40705,0,0,1eda5b358ba0f37be10f436ec87d2f785a6beaf853d5f29bdc0c3fdfc74c06ad,2023-09-08T18:48:31.770000
CVE-2023-40706,0,0,adbd436305697d32e2e9942a03d182f6db0acd7a4fd1ad3603994bd286cace6d,2023-08-29T23:34:50.430000
CVE-2023-40707,0,0,673cbc0c873be97cb20c7bf02c23c637a814b2305c2831ca2a42955e398c3f06,2023-08-29T23:34:10.753000
@ -237203,7 +237203,7 @@ CVE-2023-50297,0,0,377af72f6c89fc0e46b9660e8b2c6192bd69c1a81ea30ef4f3f601e394b25
CVE-2023-50298,0,0,742712a47ba4f96d9443ee08ce1588bb351566ab4f33556150a490452f46d767,2024-02-15T18:40:56.680000
CVE-2023-5030,0,0,baa8609a990f56814a5ba8dd9495577324349a25a51fe3f4f221ce48042d5551,2024-05-17T02:32:47.803000
CVE-2023-50303,0,0,04eac9d14bf1dc3aa65071a8bc06d9048a964b36a98faaa3bac3085f23a59b31,2024-02-28T14:06:45.783000
CVE-2023-50304,0,1,0163e216e7599cc5300aac9287b1a999005edadbc6996f9cb69398fd41015d85,2024-07-19T13:01:44.567000
CVE-2023-50304,0,0,0163e216e7599cc5300aac9287b1a999005edadbc6996f9cb69398fd41015d85,2024-07-19T13:01:44.567000
CVE-2023-50305,0,0,2c664216c9930c89a7fcfadd3a31bff081c46073aca034576b3fdbe264259281,2024-03-07T17:50:18.457000
CVE-2023-50306,0,0,4f1d3b091421856e56dbbaaa9ee4678a885aa3ffdce75c9d83e590ccb0be3e6f,2024-02-20T19:50:53.960000
CVE-2023-50307,0,0,ea0b023cdac8ed9cf01745c0fa57889642f00eb899be12d40ee0b2d23a79439b,2024-04-12T12:43:57.400000
@ -240821,10 +240821,11 @@ CVE-2023-7258,0,0,743a17302c5d0deefce3c9c18515bc1a780c1d3e967dd943e69bc9c091c417
CVE-2023-7259,0,0,48e34f6790939be91bf1f945206235146161db18f274c444cfe683dbe37045a0,2024-06-04T19:18:14.193000
CVE-2023-7261,0,0,44080cc2bc0d6a25d80bc7855327b03309b2d9def17d97f1c55e50122c67ac97,2024-07-03T01:44:30.563000
CVE-2023-7264,0,0,51dd8b83703649c91504628a1d95022ef41c77d28d8363a527e775cafaba1511,2024-06-11T13:54:12.057000
CVE-2023-7268,0,1,c61b2680229d9fa33f1c954c8726fa832de0e98c894a6bedd271579a687f7cbb,2024-07-19T13:01:44.567000
CVE-2023-7269,0,1,3f1411775e418b1331660b2e2f08e21ffd79ce221427bae98ae26bf35cbe5cb7,2024-07-19T13:01:44.567000
CVE-2023-7268,0,0,c61b2680229d9fa33f1c954c8726fa832de0e98c894a6bedd271579a687f7cbb,2024-07-19T13:01:44.567000
CVE-2023-7269,0,0,3f1411775e418b1331660b2e2f08e21ffd79ce221427bae98ae26bf35cbe5cb7,2024-07-19T13:01:44.567000
CVE-2023-7270,0,0,3d7ad3a206c04c3798343468b0d534eca04f86eefe46ec321113ac7e2ecdcd6a,2024-07-04T07:15:10.497000
CVE-2023-7272,0,0,cc43888de86ffd529fd218a38f2e0a497e79588d2ca6b5dec5063052cab77d6c,2024-07-18T12:28:43.707000
CVE-2024-0006,1,1,79db48194cb5104ac2f1b02e569f2eee06af8b9c0a4f59b9f348776648116d77,2024-07-19T15:15:09.930000
CVE-2024-0007,0,0,7ce6d28a77975ceb6f0211a30f9905d648e1a7e8a675821fe7be046691ac9f83,2024-02-15T06:23:39.303000
CVE-2024-0008,0,0,899bae3dea0b6932a6d046356f47764b32f025595d0eef60d8e0e433b2b04007,2024-02-15T06:23:39.303000
CVE-2024-0009,0,0,31a37345511ab8f9e782cdcb9d09dfe3dad4751b5c25ab7a9b1c5c74d0c64c05,2024-02-15T06:23:39.303000
@ -241560,7 +241561,7 @@ CVE-2024-0853,0,0,3c910daae8e71e1ce70b1329a110fcfb56e12ff4cd703e160872830a02778b
CVE-2024-0854,0,0,078c838d6b39f270536d9d77e44ca7ffaa60bd2fba9534d52e2f6ab03b587b3d,2024-01-30T17:01:37.127000
CVE-2024-0855,0,0,d6a852138d81a2f1a5b951678ed9f076f0450cdd1094ad4d8554eefd8ccce592,2024-02-27T14:20:06.637000
CVE-2024-0856,0,0,35186061175bf94a789875417a754a8a320463b5a7778dc33b67b00319a2bfe4,2024-03-20T13:00:16.367000
CVE-2024-0857,0,1,b0666c260e2bd7ff808ade000aadd0cab74ae18ae1df2b63d578d62ec78174c1,2024-07-19T13:01:44.567000
CVE-2024-0857,0,0,b0666c260e2bd7ff808ade000aadd0cab74ae18ae1df2b63d578d62ec78174c1,2024-07-19T13:01:44.567000
CVE-2024-0858,0,0,0cac4e7a1bf81dbbbf49fb45b774f9b9d61dff98c8323a87e06b4f2eb2f216bd,2024-03-18T19:40:00.173000
CVE-2024-0859,0,0,ff784ede10a0711bc0887b221fef20123179373dca5468014d5965d599854b96,2024-02-13T19:45:29.770000
CVE-2024-0860,0,0,831bd3ec539e95c34edc12f0e20bfc01b276aabb943cb43f0dff12e235110897,2024-03-15T12:53:06.423000
@ -243346,23 +243347,23 @@ CVE-2024-21128,0,0,a2a656ac82ef59dca59116b1c82244049a82be2b5f8d64dc13889b409d771
CVE-2024-21129,0,0,b1d82ad2ace6a530373fd890efc61a1afe163107a9bcd66592f3629522d0dfff,2024-07-17T13:34:20.520000
CVE-2024-2113,0,0,d820f9174045c4a91c8de22b2f318d393b16e5183ad826479f5c93fd64192dc6,2024-03-29T12:45:02.937000
CVE-2024-21130,0,0,bea2b2e7eaeb97d38519ed7bc1bd63b9fa51bece27537e747e45a44c55c0cdf5,2024-07-17T13:34:20.520000
CVE-2024-21131,0,0,68e549d3e011eb9fb6078a1492e62037acd3d674c9bd719eb0d2fa59a85a39b4,2024-07-17T13:34:20.520000
CVE-2024-21131,0,1,02165835cc6f0e203728409c02066c414e0700a6416e43c004ac7c1741f0e57f,2024-07-19T14:15:05.180000
CVE-2024-21132,0,0,dd139dd4042d6a1178972f3ac987733a96a2e35f22144c114c5d699226824ca0,2024-07-17T13:34:20.520000
CVE-2024-21133,0,0,c3b712618b8daaa32fb099f380783f45f3a3232041fc17f803218133bcfc018e,2024-07-17T13:34:20.520000
CVE-2024-21134,0,0,6d06cef5bcb05ca9302f0e9cb0f7e64b3c71aa9c9e1898be8366c5e2ec7f0590,2024-07-17T13:34:20.520000
CVE-2024-21135,0,0,5ea7533ff0f28947679285df758fb5bdd6d00b15c26c27c77e949acd7e643f06,2024-07-17T13:34:20.520000
CVE-2024-21136,0,0,eac34267828dcd6c0e42f2949578579bca9932424a4c02dda1596c44a1615cb0,2024-07-17T13:34:20.520000
CVE-2024-21137,0,0,5cb346ed6a76e33ff502442e6fda21ba59fabfa2b49d93de02374b0eba7b85b1,2024-07-17T13:34:20.520000
CVE-2024-21138,0,0,bf1b292f2fc69b2f57d0eb49178fc0f3703939cbe3859388c2916d71c5b594e4,2024-07-17T13:34:20.520000
CVE-2024-21138,0,1,48e73281e1321884b4e1b592183d2ed2dbef5bea392b3b824bf77e00d538c447,2024-07-19T14:15:05.290000
CVE-2024-21139,0,0,1659564eccefabd1ef87f080fcf044771f881c3bd2283c028d2b7fe1481c401e,2024-07-17T13:34:20.520000
CVE-2024-21140,0,0,5f55e20f43d23bc11cde840ec2a1ca590f33e24a9c9829d36ab276ea8b99732c,2024-07-17T13:34:20.520000
CVE-2024-21140,0,1,a355b887f2f3e95c0cfcaf2066fbef2d48cd303288049a5e4f501e4b1ab2b1f0,2024-07-19T14:15:05.400000
CVE-2024-21141,0,0,4c389a1b1f7194fb9ba2446906af3d7d800a96ac9f50d96dbc4d51691fe14a39,2024-07-17T13:34:20.520000
CVE-2024-21142,0,0,7714e55c3a0eaa85d823f8a1ea286e8580188862c1a8262d24c18bcf0bedb50f,2024-07-17T13:34:20.520000
CVE-2024-21143,0,0,a339ae05c5939594a60af63a50c64360a4c2bba1a6c72ae3134b343940b551c0,2024-07-17T13:34:20.520000
CVE-2024-21144,0,0,545ce137ae4b7251fcbe475861991619ab96bd1118a48fbbae43d504ecb74590,2024-07-17T13:34:20.520000
CVE-2024-21145,0,0,10662079aac9837e4851948f61900e8d072caebf410e8d98dac5180f3fbd0f0a,2024-07-17T13:34:20.520000
CVE-2024-21144,0,1,a6e0220af7613c1fe6414e49d55f78f0a709fc1177b6fe6b6e15840375ef4e2d,2024-07-19T14:15:05.497000
CVE-2024-21145,0,1,77d6b8d482bc9fea478023a3ac3b96ff89a156b807bd0fe4072eea7489b1a76c,2024-07-19T14:15:05.580000
CVE-2024-21146,0,0,a3b2bee4c09cc77d71ebb85b1373e7798d1523fbed51e3bdbddcd6b262c87281,2024-07-17T13:34:20.520000
CVE-2024-21147,0,0,80fe25d7fbae190c147cb0af161d104a4d18887fccd83f57fce5b1db56e39f37,2024-07-17T13:34:20.520000
CVE-2024-21147,0,1,84f7acc7bc3a20d2859db41d6e11faaeb2b951c493091b63d082c86a294a3902,2024-07-19T14:15:05.667000
CVE-2024-21148,0,0,1967fb910c0ddd4fed52a67bde1deacb54db248787d06056e78744e0393f0bfa,2024-07-17T13:34:20.520000
CVE-2024-21149,0,0,8b715a8f90298b625399ca35204ae3b26a39ea0583be5bb2eca26773007c4f88,2024-07-17T13:34:20.520000
CVE-2024-2115,0,0,66506b198b4ece0adfc9016031263e6294a50c545f577c56b849d0c705d750c7,2024-04-05T12:40:52.763000
@ -243391,19 +243392,19 @@ CVE-2024-21170,0,0,e1e211bc02bcce908dec7d1017fecb46b088c41b3278227f0dd1b52c54f62
CVE-2024-21171,0,0,d23ed38ec4935bf20f81d9f0f4264c31da7107f3450cf18daa4ea56b7c79ff29,2024-07-17T13:34:20.520000
CVE-2024-21173,0,0,406eb663e1eea9a8921cc1039cc55ed3405ee972396ff6c4857002263fd0f5df,2024-07-17T13:34:20.520000
CVE-2024-21174,0,0,783646b73d638ea3453f935f01445854b5206f2f8b29efee57ff0f0f6cf6ec33,2024-07-17T13:34:20.520000
CVE-2024-21175,0,1,cb2af54db467d6cb3910a785f432573ba67f0e2903d99aac799349b33385087b,2024-07-19T13:35:41.107000
CVE-2024-21176,0,1,b022e0a78bfd810ce5799e801c017257ad85014c0240c82465310ca387f77de2,2024-07-19T13:35:56.727000
CVE-2024-21177,0,1,dd286b1fc1e65591b4712392d48877586e2af8d98747ab5b6ceffcb0635a5b54,2024-07-19T13:36:47.267000
CVE-2024-21178,0,1,035beed050bbfc2990a03e92c9b347eb1c0d59a76c8a7a78fc227f93c62febb2,2024-07-19T13:36:57.527000
CVE-2024-21179,0,1,41e6c8b33322a354c379f8845e2addcd96f161ff65c635bb9573b0314dc3b62d,2024-07-19T13:37:06.090000
CVE-2024-21175,0,0,cb2af54db467d6cb3910a785f432573ba67f0e2903d99aac799349b33385087b,2024-07-19T13:35:41.107000
CVE-2024-21176,0,0,b022e0a78bfd810ce5799e801c017257ad85014c0240c82465310ca387f77de2,2024-07-19T13:35:56.727000
CVE-2024-21177,0,0,dd286b1fc1e65591b4712392d48877586e2af8d98747ab5b6ceffcb0635a5b54,2024-07-19T13:36:47.267000
CVE-2024-21178,0,0,035beed050bbfc2990a03e92c9b347eb1c0d59a76c8a7a78fc227f93c62febb2,2024-07-19T13:36:57.527000
CVE-2024-21179,0,0,41e6c8b33322a354c379f8845e2addcd96f161ff65c635bb9573b0314dc3b62d,2024-07-19T13:37:06.090000
CVE-2024-2118,0,0,8cc75b149351247ebd9b7f215d921c62e30056d8a3359ddec0c5f6ccbae617de,2024-07-03T01:53:01.593000
CVE-2024-21180,0,1,4da0fde33dfbebbe0b3ca286005ad286ff1f5b333d68223ed96e66f77c83b6f0,2024-07-19T13:37:14.707000
CVE-2024-21181,0,1,bcc5028a8221ef30b0110435c5ffe37b8bd34748cfc42293d9ebcfa99a85594f,2024-07-19T13:37:27.357000
CVE-2024-21182,0,1,1124989def14cb215f68114dd9b658abe71699b5e68782a29805527846fc0b21,2024-07-19T13:37:37.967000
CVE-2024-21183,0,1,5ae39870bee023fced3efcc39ddd05bb0b0ca09db0609fc111fcd577d8d2ed2d,2024-07-19T13:37:47.980000
CVE-2024-21184,0,1,833a2bbb045bad80556ab103664bf106ee9ce7b3911f1ef3ab655696d8412687,2024-07-19T13:38:01.037000
CVE-2024-21185,0,1,f54700702dbfdaddcef28547e3238c76c435075d556ca83da19506ff0ce6fe1d,2024-07-19T13:38:11.350000
CVE-2024-21188,0,1,7669d96d6b451543b1a30be166716e2130148a874048e1cadefe6966bde664f8,2024-07-19T13:39:30.817000
CVE-2024-21180,0,0,4da0fde33dfbebbe0b3ca286005ad286ff1f5b333d68223ed96e66f77c83b6f0,2024-07-19T13:37:14.707000
CVE-2024-21181,0,0,bcc5028a8221ef30b0110435c5ffe37b8bd34748cfc42293d9ebcfa99a85594f,2024-07-19T13:37:27.357000
CVE-2024-21182,0,0,1124989def14cb215f68114dd9b658abe71699b5e68782a29805527846fc0b21,2024-07-19T13:37:37.967000
CVE-2024-21183,0,0,5ae39870bee023fced3efcc39ddd05bb0b0ca09db0609fc111fcd577d8d2ed2d,2024-07-19T13:37:47.980000
CVE-2024-21184,0,0,833a2bbb045bad80556ab103664bf106ee9ce7b3911f1ef3ab655696d8412687,2024-07-19T13:38:01.037000
CVE-2024-21185,0,0,f54700702dbfdaddcef28547e3238c76c435075d556ca83da19506ff0ce6fe1d,2024-07-19T13:38:11.350000
CVE-2024-21188,0,0,7669d96d6b451543b1a30be166716e2130148a874048e1cadefe6966bde664f8,2024-07-19T13:39:30.817000
CVE-2024-2119,0,0,11b037b49d290ba489439edd17815bf1f5dbc31c03ff8b80541b76c9d70af605,2024-05-22T12:46:53.887000
CVE-2024-2120,0,0,6b5464bebd26aefe39617ee608f8869264c47eca6efc9fe45d62e273fef6e20b,2024-03-27T12:29:30.307000
CVE-2024-2121,0,0,2cfb1a723dc54cb3d26c2160d4679da8744349bbf9431cfc104ee6efa0d850da,2024-03-27T12:29:30.307000
@ -243649,12 +243650,12 @@ CVE-2024-21523,0,0,1cb7f20515fe4bf9fce48ef1ad15a8074d4b45196b3f852e54372991de8b8
CVE-2024-21524,0,0,1b404e02733b1d9bbc968bbcd180a83e2167b1bd45b755297d40db9c945a4d6e,2024-07-11T13:05:54.930000
CVE-2024-21525,0,0,b0b4bb7ac52f850d274c4462f4e1c3c5bb13c947283cf1a8b69a39e30d235a9e,2024-07-11T13:05:54.930000
CVE-2024-21526,0,0,effd07762d29cbaa402155d2c949789e21ab2c387b4e4af3dcba88775e370e17,2024-07-11T15:05:20.940000
CVE-2024-21527,0,1,5f68d3fcedc529f8c61b21687ff27d1dfc424d6b1048d7df4e422495549fd852,2024-07-19T13:01:44.567000
CVE-2024-21527,0,0,5f68d3fcedc529f8c61b21687ff27d1dfc424d6b1048d7df4e422495549fd852,2024-07-19T13:01:44.567000
CVE-2024-2153,0,0,d3abacc4f79f5ae0d18412563134adcd72e3650da9619fcc6b902801eca849d9,2024-05-17T02:38:04.867000
CVE-2024-2154,0,0,ab5f0b39bb38e5c25606bad964d563e0edda059ff34db22b99ca2b3670b021ff,2024-05-17T02:38:04.970000
CVE-2024-2155,0,0,499612150b3a1be829ef430bb3388eb54a55d7bb52271f37f2a76ceb8af6c56f,2024-05-17T02:38:05.063000
CVE-2024-2156,0,0,3e156cd1519b9856caf676cc7af155ea1ba3901c226a3a379024601d5610634d,2024-05-17T02:38:05.157000
CVE-2024-21583,0,1,5ec658f3354d2fc39ca1e98c3b56c4da1b7944a9e0da47df38fc57405ca1a8ed,2024-07-19T13:01:44.567000
CVE-2024-21583,0,0,5ec658f3354d2fc39ca1e98c3b56c4da1b7944a9e0da47df38fc57405ca1a8ed,2024-07-19T13:01:44.567000
CVE-2024-21584,0,0,8b5526ceb3e16a0ab47a1bfab91d9be92bc9a5e69e8211c3726ea53cdfac9e76,2024-03-12T12:40:13.500000
CVE-2024-21585,0,0,a95479b2f7def09a92725835fa7942a8a00417c5c30ba7ad5352ec09d8740afc,2024-01-31T00:15:45.920000
CVE-2024-21586,0,0,74b6b891ae798fad2231a41288bd8ce03cadc786b9e5fb8f2550f3327ecdbb0e,2024-07-18T12:15:02.647000
@ -243938,10 +243939,10 @@ CVE-2024-22014,0,0,97be981b1958260947f79b7908c49463e10e156bc85f07e7f7d4adfcc41c6
CVE-2024-22015,0,0,ab9198a00b8902f553a18672e99e37367cbd733d408a460d3e69564e986f708c,2024-07-03T01:46:59.010000
CVE-2024-22016,0,0,80ed0ed1953eb9bc819815a69c5782ab91648798b066ce1586fe70786fbfbdf5,2024-02-07T17:33:12.727000
CVE-2024-22017,0,0,cfb284ce26f8ad11f97c3657da29409b43ee3aaafc69545af1b48a9314b4beb5,2024-06-10T17:16:18.773000
CVE-2024-22018,0,0,1f9ebfd6cad21644653d2eb867e3c7aafdbec5e19696ca21a29367cf511a6cd7,2024-07-11T19:15:11.303000
CVE-2024-22018,0,1,4fae4a09ff6c97462c219a17730a6b02641ce527ea4e228be02726c5015758d3,2024-07-19T14:15:05.763000
CVE-2024-22019,0,0,5ea5d0f669fc75d99f03776806b9fffc572153dc1c8ef34725dc8bf55b3cedce,2024-05-01T18:15:13.800000
CVE-2024-2202,0,0,07ee8ffdc3e2c6571649a2da17705092fde8ccafb25f9e28d35a275c632c563a,2024-03-25T01:51:01.223000
CVE-2024-22020,0,0,93515df31575572885455709ab760c011f4b5168a38cb84e62f57e08a71c4542,2024-07-11T19:15:11.407000
CVE-2024-22020,0,1,debd2a01716784fdc798c1002cfd1de2c7ec7af620c6ad131da757aceaba0623,2024-07-19T14:15:05.863000
CVE-2024-22021,0,0,638048027337936cbd408ce99df3409e0af8fc4be0132d034339cad92c33270d,2024-02-29T01:44:04.690000
CVE-2024-22022,0,0,520151bf342f8e1b6d0df34d3bdc80dc16c1dfc15f7f487e84d9dadfaf67b99c,2024-02-15T18:45:30.887000
CVE-2024-22023,0,0,738809cdca073240a61fbce615868c0b1c3f7d174f610e159e035e11db1f2996,2024-07-03T01:46:59.843000
@ -247736,6 +247737,7 @@ CVE-2024-27476,0,0,ee12db45de83cded307f831888a3645bddf15bc01083bf804116fb49347c3
CVE-2024-27477,0,0,e0cd02f233cdafbc91249b5781d33c91da5035c970dc05ec11d6a3134871bf1b,2024-04-10T19:49:51.183000
CVE-2024-2748,0,0,a5981f926316e727f1bb9455ec311db801fabdd6fc8350d94a1fb8a2edb4a89a,2024-03-21T12:58:51.093000
CVE-2024-27488,0,0,6be2a43b71b53f166dfab0e5a48f18012ba860e052bdc0fdded0a51aae424787,2024-04-08T18:48:40.217000
CVE-2024-27489,1,1,a6aa2da3ad6334d53775c095ef5797d567e85d0adf56993e02a21261562f73a8,2024-07-19T15:15:10.210000
CVE-2024-2749,0,0,1d41dd2f9a8ec812d743eb2503d3459b40e5b74ef406549f3f22535f8f1ae124,2024-07-03T01:53:31.040000
CVE-2024-27497,0,0,0a259a174ab84ccb90a6c7661916522a49292b77c0e76cb95a176d9f4412b99e,2024-03-01T15:23:36.177000
CVE-2024-27499,0,0,2d730ced2ef06c3685db15a9c1c8006eabdbd2f39a30889dd60bb7c576c1753e,2024-03-01T22:22:25.913000
@ -248506,7 +248508,7 @@ CVE-2024-28833,0,0,544d9d7e36f7bff315ea2576b37cb71ff7ca29653e07f9c621760e3f96474
CVE-2024-28834,0,0,09f3a0455e20f7b6e57692de383f0a9d90c6e171b45539ab32672953d1de586c,2024-06-10T17:16:24.560000
CVE-2024-28835,0,0,715111faf82ef85ab0456cb4278dc00b797a9390ab2213a743da9936785d8360,2024-05-16T23:15:47.883000
CVE-2024-28836,0,0,9ccc11b71bb035583c1b166b015c712001695f475067cfa890f253410f5dc601,2024-04-03T12:38:04.840000
CVE-2024-2884,0,1,d12938301c99206404c82c1ccf4a3924a8320d228f8e2b624467c9752f31f26e,2024-07-19T13:35:19.847000
CVE-2024-2884,0,0,d12938301c99206404c82c1ccf4a3924a8320d228f8e2b624467c9752f31f26e,2024-07-19T13:35:19.847000
CVE-2024-28847,0,0,014a3928809c380b33576c4296f96e850047c73296ad4ea8531dae3cd66a2798,2024-03-17T22:38:29.433000
CVE-2024-28848,0,0,f738fe56a5bc4cdb728fabdb4b9cb52618afbf9827db3dbc12ec3f1fb91169bf,2024-03-21T02:52:25.197000
CVE-2024-28849,0,0,059bc6bfc5a382a2468a652be1bf3530c6d1666f5b023a0877329552fb4408ba,2024-03-23T03:15:11.970000
@ -249003,7 +249005,7 @@ CVE-2024-29732,0,0,e30fc06180575c1796869bb0b4fa02497c40c6d7939d34aba0362f12c2710
CVE-2024-29733,0,0,0811972ef853088b726fd2b07316244d1d628e55e310910ac8174bd65d097612,2024-07-03T01:52:30.320000
CVE-2024-29734,0,0,65bb1ba04f673142d3081922c5e4533cd4af140db3cdfbbce09ab73848e3b6c3,2024-04-03T12:38:04.840000
CVE-2024-29735,0,0,1c27e1fe9dbb50907062f908fab6fbb55a16239f685d6be40b04c11200e2a361,2024-05-01T19:15:23.573000
CVE-2024-29736,0,1,a7b73099f01cfc61426635b9d2fd7a10ea2008e8a44cb47bcf89de564b7f1392,2024-07-19T13:01:44.567000
CVE-2024-29736,0,0,a7b73099f01cfc61426635b9d2fd7a10ea2008e8a44cb47bcf89de564b7f1392,2024-07-19T13:01:44.567000
CVE-2024-29737,0,0,905f9624f62391e71e59e29113bc18cf160be44a2207e2f0ce7231f623f92d4a,2024-07-17T14:15:03.677000
CVE-2024-29738,0,0,1c3e1564461702d87cd213d777f3523814ac3c73b5cc61bff5ae595e06e0fbeb,2024-04-08T18:49:25.863000
CVE-2024-29739,0,0,ff7d8db191ec3bc24b9fd0a0e51d4426e2f32708f8ba1a8e8a840affcd32aeb7,2024-04-08T18:49:25.863000
@ -249391,10 +249393,10 @@ CVE-2024-30112,0,0,b1be3742a46d695d3f82f4d182e1b02e2a0a297ddb2b6a4bf1d69911e3eb1
CVE-2024-30119,0,0,4baed8c508a821c818525782701105249753896feab644ba3efffba269f578b9,2024-07-03T01:53:51.120000
CVE-2024-3012,0,0,ae30314159430e25e9f2b09f2e0a440cd8bb99b7d72b62fa4eb73b4affe20188,2024-05-17T02:39:40.620000
CVE-2024-30120,0,0,f704816cf356d01bbdb53903a0b14bef34a589a7c9185030672ca3a1f14e4a1c,2024-06-17T12:42:04.623000
CVE-2024-30125,0,1,1e8984bc19e1a45cd2a6c4ac0b43f227ca7f3a8dcb96ab9c16c6ada82e4faa52,2024-07-19T13:01:44.567000
CVE-2024-30126,0,1,1dc4258efb62007b2fcf00852fe3af92d237972fa2c163c391fddf8c594d1425,2024-07-19T13:01:44.567000
CVE-2024-30125,0,0,1e8984bc19e1a45cd2a6c4ac0b43f227ca7f3a8dcb96ab9c16c6ada82e4faa52,2024-07-19T13:01:44.567000
CVE-2024-30126,0,0,1dc4258efb62007b2fcf00852fe3af92d237972fa2c163c391fddf8c594d1425,2024-07-19T13:01:44.567000
CVE-2024-3013,0,0,6f68abb10d211d077c48c60372c20fba216cedafa08cc66982d3e5be234b2590,2024-05-17T02:39:40.710000
CVE-2024-30130,0,1,8448ce55a01a9b4e45eabf08a2080330d22dcd23bef5d840e0a0228a0f910b0f,2024-07-19T13:01:44.567000
CVE-2024-30130,0,0,8448ce55a01a9b4e45eabf08a2080330d22dcd23bef5d840e0a0228a0f910b0f,2024-07-19T13:01:44.567000
CVE-2024-30135,0,0,434c5499719264a4e2ad07af1f36d8ed1af6151b19467e0009865806919aee63,2024-06-28T10:27:00.920000
CVE-2024-3014,0,0,c46983235075ad6c61a858c21d5be28ec226124df8363686d4a4d1cade05d3fc,2024-05-17T02:39:40.800000
CVE-2024-3015,0,0,cf3ef36018f814f81d7c4b278b721ac941c52c0f1c0bedc65491406707b51ee6,2024-05-17T02:39:40.887000
@ -249707,7 +249709,7 @@ CVE-2024-3047,0,0,b22e2b3bd3f2ea2e1a9b8967138f5d24af468217212d0308948532706a31b3
CVE-2024-30470,0,0,48e5d66dc273af24da4e4b7519926c3e97f1d38856b041954b60e69533ae4645,2024-06-10T02:52:08.267000
CVE-2024-30471,0,0,24bc68add584a17f9d1f010daaae4a0025d7a0febd84aec39d70d272cd1e669e,2024-07-17T13:34:20.520000
CVE-2024-30472,0,0,00bb1b58fdab892a36ea40136ac2fa59e308dd9cc355f92e428b81257afaa77e,2024-06-13T18:35:19.777000
CVE-2024-30473,0,1,cc643ea6610c054923dcda820bdbaeee3470f2fed9befe993862cdd8d56027e3,2024-07-19T13:01:44.567000
CVE-2024-30473,0,0,cc643ea6610c054923dcda820bdbaeee3470f2fed9befe993862cdd8d56027e3,2024-07-19T13:01:44.567000
CVE-2024-30477,0,0,2a9c94bd63166efd66be5d42497334130f49f4b0acff68b2e8385a53a877c218,2024-04-01T01:12:59.077000
CVE-2024-30478,0,0,8648debe6405c1216a86c901736f7e8905eccc7e01f0ae6ab2126aef21a3be15,2024-04-01T01:12:59.077000
CVE-2024-30479,0,0,dc5972e51ae5c4d9085a312951d31c7a1307033adf582d496a71c4016c267016,2024-05-17T18:36:05.263000
@ -250119,7 +250121,7 @@ CVE-2024-31138,0,0,e862c1086da58a416fbb8daccc103d417726a0d0d62aa3907b1f09b19f01b
CVE-2024-31139,0,0,1f981793bc0ffd1f30ec0eaae2f049959f8e2058241da40737858920eb14a44c,2024-03-28T16:07:30.893000
CVE-2024-31140,0,0,1880c35ac5ba5af45eb21413401eeeaab09be8abf223654f6041d65ff3324893,2024-03-28T16:07:30.893000
CVE-2024-31142,0,0,16502fe8420294098dded506476ced118645fadee97cfcf27213cce5ae7650bd,2024-05-16T15:44:44.683000
CVE-2024-31143,0,1,eabf4443a972046b843b5c51a5a64a52c1ff6d2355a7d22418dbd22e53cf86f5,2024-07-19T13:01:44.567000
CVE-2024-31143,0,0,eabf4443a972046b843b5c51a5a64a52c1ff6d2355a7d22418dbd22e53cf86f5,2024-07-19T13:01:44.567000
CVE-2024-3115,0,0,ce15a233f41ff0461e80772019f46030689b0b2d2d5c745fde6ced2663519f76,2024-06-28T13:22:33.400000
CVE-2024-31156,0,0,0196e496a3b7a6255c15a0e2200e98a2f53059591b5db0d973b7d4520d1de2fe,2024-05-08T17:05:24.083000
CVE-2024-31159,0,0,548f0ebc12c631be1a59b512bab01930265194a04487b6bd3b57e79e2e54c960,2024-06-17T12:42:04.623000
@ -250494,11 +250496,11 @@ CVE-2024-31666,0,0,253643df7e9c7fc7c94316b23bbda0edfbf28e84ffeb8510af634fd8ae7e9
CVE-2024-3167,0,0,0e0e401d957a36adf31f389f0d7fa47f7901c0598b7b2fd42d4c75bdbdd76e80,2024-04-26T15:55:58.810000
CVE-2024-31673,0,0,f08fb9f910c3a1076d50c31d40d404a72ee29f978665ed5faea697632994477c,2024-05-06T12:44:56.377000
CVE-2024-31678,0,0,a039b430a4b65e0b97046276b6ed1c632f765fc4e4053aa5427aeefb4dac3d98,2024-04-12T12:44:04.930000
CVE-2024-3168,0,1,1ec3737493fc3921401acce4dd6cdaf4843a7c7b01b4b9af8fa2c172a8f9fd71,2024-07-19T13:25:11.660000
CVE-2024-3168,0,0,1ec3737493fc3921401acce4dd6cdaf4843a7c7b01b4b9af8fa2c172a8f9fd71,2024-07-19T13:25:11.660000
CVE-2024-31680,0,0,7e1908b87f42141dc482d017d5b62a6782bb8342605d50fe2c839034d8e94921,2024-04-17T12:48:07.510000
CVE-2024-31682,0,0,42ea6293b90227c97d91195ff4d0e78cbfa746fc21aebe2add0640f7549a80aa,2024-06-04T16:57:41.057000
CVE-2024-31684,0,0,ad75a69893dade6ac7e684ae6347f5d7476c0bca032591c2e980bc01013d54f5,2024-06-03T19:23:17.807000
CVE-2024-3169,0,1,d7b1415d8a31a5e1c6093ce8ac7dbac2e148bf41fec7619fab20863604b5192c,2024-07-19T13:24:56.617000
CVE-2024-3169,0,0,d7b1415d8a31a5e1c6093ce8ac7dbac2e148bf41fec7619fab20863604b5192c,2024-07-19T13:24:56.617000
CVE-2024-3170,0,0,5e7358dc9ec4715298a5a689fbebf23a3d7543995cc630ed65af1176171581df,2024-07-18T15:04:35.447000
CVE-2024-31705,0,0,1e094636fab25f55fd2bbe89fbc416ff598664e06b0094a270ee264d1d302370,2024-04-30T13:11:16.690000
CVE-2024-3171,0,0,05e23f6e21a479cfe13415837a6ca80b006bcab87b0d88c28d88a1c1c5d48fb0,2024-07-18T15:03:07.550000
@ -250690,7 +250692,7 @@ CVE-2024-32002,0,0,8b152fa71cb7888d307cedcb6036ff42410fe299ac886c8397e8f14b70468
CVE-2024-32003,0,0,31311e12a1795761553a56c6af2bf7b204ba79f18fac5a0250a8b13fef254e1b,2024-04-15T13:15:31.997000
CVE-2024-32004,0,0,46c6e95c184179de4512a1da85cf6fbcce6fe2ac4189ff7da433e0234267bb88,2024-06-26T10:15:12.050000
CVE-2024-32005,0,0,d156f3f94a9502713f64771d89d9d58b72987fd70cae51625e32aa2c9e6ee96e,2024-04-15T13:15:31.997000
CVE-2024-32007,0,1,7725cbb0a212ec163393c6649d2fedd94f312a7ff02ad6f3a9117280b4fa47fd,2024-07-19T13:01:44.567000
CVE-2024-32007,0,0,7725cbb0a212ec163393c6649d2fedd94f312a7ff02ad6f3a9117280b4fa47fd,2024-07-19T13:01:44.567000
CVE-2024-3201,0,0,9d746fb1c422de83f85c51388b2057631f70f2332b71bf082d5fbeff58a4ab1e,2024-05-24T01:15:30.977000
CVE-2024-32017,0,0,4171151be280ba186c662a4712cd0108f86c659cb0491f443a14bc31a4f95a77,2024-06-10T18:15:31.880000
CVE-2024-32018,0,0,a57cd84bbc4228dbc73979371818ba4496491d8c8d7ae0852269ca74ca3485fd,2024-06-10T18:15:31.980000
@ -251976,7 +251978,7 @@ CVE-2024-34009,0,0,c189f67a4f292742e7eb11598e6740d1e1f0fe6680e397db2f39bb2455a1f
CVE-2024-34010,0,0,e5242e4e175689c741a04991b05d676f9e3bda064e1a681e08ea1b95446de349,2024-04-30T13:11:16.690000
CVE-2024-34011,0,0,1cdf95201b7c3fac8642eb93e0c0ec77c02ae32f22e51c68db8a6f76ced93031,2024-04-30T13:11:16.690000
CVE-2024-34012,0,0,04f4534da5173cfce7ebae120e48f12f9b737be7b5131e98dd79deccdc3d7723,2024-06-17T12:42:04.623000
CVE-2024-34013,0,1,31f555436f56628c9b80feda54af6c121f0002b6c021c0928728c76ed328d68f,2024-07-19T13:01:44.567000
CVE-2024-34013,0,0,31f555436f56628c9b80feda54af6c121f0002b6c021c0928728c76ed328d68f,2024-07-19T13:01:44.567000
CVE-2024-3402,0,0,860d32d94b28d3118ff3553c4f964ad26b3d56a8c45fca055d79619e6385e5e0,2024-06-07T14:56:05.647000
CVE-2024-34020,0,0,c4663f98778b76c33582b9d015039d06540b400c550bf7c9ee3e5b98d9ff425a,2024-07-03T01:59:16.227000
CVE-2024-34024,0,0,0a0d832c0db4d58a70ccecce54b6344b3f181daaf3ed5285ed66313a40334a22,2024-06-20T12:44:01.637000
@ -252656,8 +252658,8 @@ CVE-2024-35194,0,0,d148be956e67f415d7646ff65de5a97b2b79a6aea2b1221670c2eaf58e45c
CVE-2024-35195,0,0,6c790b50c3e78a6333f9424d693f4919101146c76421c04d91f2b605ab56962b,2024-06-10T17:16:29.563000
CVE-2024-35196,0,0,3171bb6143cfc03b7b84aa8a6110c1e96e2a6c63c73dc2a2e171d187a366d6ee,2024-05-31T19:14:47.793000
CVE-2024-35197,0,0,80436d6dc6299a6bdf0d8897382a6e075fe7db1c6cb2ff2d7a12468a154bde4d,2024-05-24T01:15:30.977000
CVE-2024-35198,0,1,e4e1910e071cca78b8cacf5fa783d8f7f0d361c3968aef5cb5c4b7bfa1301c36,2024-07-19T13:01:44.567000
CVE-2024-35199,0,1,63926bc0e462abfad7a45f61d10606c266a70501317c628aa5431346b41e8b38,2024-07-19T13:01:44.567000
CVE-2024-35198,0,0,e4e1910e071cca78b8cacf5fa783d8f7f0d361c3968aef5cb5c4b7bfa1301c36,2024-07-19T13:01:44.567000
CVE-2024-35199,0,0,63926bc0e462abfad7a45f61d10606c266a70501317c628aa5431346b41e8b38,2024-07-19T13:01:44.567000
CVE-2024-3520,0,0,4d2ca8beda165968cfea3b64e955c18436397c1b54474f7a64b510b5eacd13fe,2024-05-02T18:00:37.360000
CVE-2024-35200,0,0,4e081bc266f3339c234fd0d9836610e298ca5ba3771760c1147fa5a32be6afdb,2024-06-10T18:15:34.983000
CVE-2024-35204,0,0,0248f812c6eb240110c4167110975a2b8317634bb6300a9657da495b3589cfbb,2024-07-03T02:01:28.703000
@ -252745,7 +252747,7 @@ CVE-2024-3532,0,0,861b69b5ea2c2097afdbe40dd2c40123c9da7c07e730e8c939be6340175b99
CVE-2024-35324,0,0,a9d43213d6a9d4a1ea00fc60e4d2aec7e6eb81d792aae8e17b7c5cdc773898de,2024-05-28T17:11:47.007000
CVE-2024-35325,0,0,1b7fe21e78a882e8b6a4c7cfae193ff445584367725719b7b191a7492d8ca979,2024-06-13T18:35:19.777000
CVE-2024-35326,0,0,041a8637b63c4ab99328a0f37e7ce67805675a92fb8add508ea59bd20c8b7897,2024-06-13T18:35:19.777000
CVE-2024-35328,0,0,b59f9a10d9cafcc0c30cbb92cbc1b1b48a1d77c803546e764ab257e3e8abcc8e,2024-06-13T18:35:19.777000
CVE-2024-35328,0,1,fb4ef24959ef3b86e1d1e2a626668146540c0ab6d259d48f6d635a7a92dd50be,2024-07-19T15:25:50.030000
CVE-2024-35329,0,0,4292102d3fac0226e3e155445f438715ce7df9eb09ed90a898e6b306574b942f,2024-06-12T22:15:18.400000
CVE-2024-3533,0,0,488bd266f4041c85454e2052fe9f29a33b96935dc189b43a270de9d8362e90d3,2024-05-17T02:39:59.617000
CVE-2024-35333,0,0,a56b2cbb1d825bab243b29d0e8302efa743a6d64a0ad5ee6a14e21ffdd4302cd,2024-05-29T19:50:25.303000
@ -253920,7 +253922,7 @@ CVE-2024-37062,0,0,58b116066013b6d749a8f2b0cb5ea2db72b9da7fafa4e8c628598d59a99c6
CVE-2024-37063,0,0,80954941ce1b7f85a9ddba2aa731f5591bda02de0a05b724cd044a2e0e2bf543,2024-06-04T16:57:41.053000
CVE-2024-37064,0,0,4c38fa1163e0fea8ab5ca1b8c699de3b9ac20f20b6e58d0f246dcde7abe2ce8c,2024-06-04T16:57:41.053000
CVE-2024-37065,0,0,98a759a5df37913375764d521d81dec2811436d61b541015e740c355e39d43cd,2024-06-04T16:57:41.053000
CVE-2024-37066,1,1,fbf565a13efd6d49117241734c5e5a9aae56d5ff2784cc9e258072fe32e9597c,2024-07-19T13:01:44.567000
CVE-2024-37066,0,0,fbf565a13efd6d49117241734c5e5a9aae56d5ff2784cc9e258072fe32e9597c,2024-07-19T13:01:44.567000
CVE-2024-3707,0,0,6bfaa46ff6eb40f5f2f9b2ce66b762ad7c8a8dd85b0bee59ae4503c9e3de8bec,2024-07-05T13:15:10.997000
CVE-2024-37077,0,0,ff2ab30c51fd1f14ba05ba8f6a2cb5932da12571ff707f15bafd014a8f78dc32,2024-07-03T18:02:47.117000
CVE-2024-37078,0,0,009c869d231f8709f73a489f7029f4a82b9aafc8e4c52e039b4b2d9718fdb586,2024-07-05T08:15:03.130000
@ -254090,7 +254092,7 @@ CVE-2024-37346,0,0,a4475e8bc16526d4a2cd923965b515305302813fd73edbfa3f18575d405f6
CVE-2024-37347,0,0,6e7baea952ef385b67b23083cebbb129c77e5630de3ec6d82658c88bc410c4ea,2024-06-21T11:22:01.687000
CVE-2024-37348,0,0,49b92234970ec422b020245ff1e6f7259c16f36e8db6b7b874fd77e08ed0a6ef,2024-06-21T11:22:01.687000
CVE-2024-37349,0,0,d5bdd857cd8357de07400ace5da8b29cdb394b047c72e22b130727701a2be1cc,2024-06-21T11:22:01.687000
CVE-2024-3735,0,1,3bc0e7ae2360c04d22daf0f12463798d07ea71d58fa91621d2a939f364ece413,2024-07-19T13:15:02.083000
CVE-2024-3735,0,0,3bc0e7ae2360c04d22daf0f12463798d07ea71d58fa91621d2a939f364ece413,2024-07-19T13:15:02.083000
CVE-2024-37350,0,0,db322a02568c197ff2f4cce28d07f13a6d84645dcf6fb2d6d98030bff57992f6,2024-06-21T11:22:01.687000
CVE-2024-37351,0,0,5d28c3ae9e671d4e970680119129fdfd5cef4f93d0af956f6a6aef99cac6535d,2024-06-21T11:22:01.687000
CVE-2024-37352,0,0,8cb2d15b6cc19b492a4019e2458fe1e37bdb4a8988d34a37da730385b336d322,2024-06-21T11:22:01.687000
@ -254140,7 +254142,7 @@ CVE-2024-37464,0,0,d5dd0cd8721de83e6db957b2a4c4526c848f707b5f4204dfeac1e6b719416
CVE-2024-3747,0,0,3219ce820822d72e46103b803901087d25784fb8e92da6509df83502f94f1ce3,2024-05-02T18:00:37.360000
CVE-2024-37471,0,0,5edd9f6c5e3d338e594ebab0d6a40248bc10bd2ea28750bc19b1ba1459171580,2024-07-05T12:55:51.367000
CVE-2024-37472,0,0,3954317423d61a9d54cf49fbab6fafec302a0c0f856949b52d29a5dcc939d84d,2024-07-05T12:55:51.367000
CVE-2024-37474,0,0,27892b3c50dd37af7a1a75e3d3fbcd24b0296e576855d96535eb10a6b108ece3,2024-07-05T12:55:51.367000
CVE-2024-37474,0,1,e29b3ccf1312f58f8b90ea5bf768b9e4ab78293e46701b43859d8d72f1b6ca41,2024-07-19T15:34:49.460000
CVE-2024-37476,0,0,a0f3320231f39c9c5889103930f7c304a498db0d6e09c95ec7c56af3d003c3dc,2024-07-05T12:55:51.367000
CVE-2024-37479,0,0,b47f15244b7d8bdc435b7b058e1a43515a90d9355fb7c5cb51f1025055601a89,2024-07-02T12:09:16.907000
CVE-2024-3748,0,0,130f91484f33c46b6a8a1b827c41c8bedf887e9f91a42beeaa1df38ecf15e978,2024-07-03T02:06:31.737000
@ -254266,7 +254268,7 @@ CVE-2024-37798,0,0,bc04f57588d0fb28785b030c799331a26805968021d11fbacde42d13b6803
CVE-2024-37799,0,0,7daf228a97dd80358d70cc4a662e5369bebd266eafdf0efd1951071a509a7505,2024-07-03T02:04:44.730000
CVE-2024-3780,0,0,83484fb5b744efc24cdea9908844170c52624d067b8e01e5b8f34f841ba67ba1,2024-04-15T13:15:31.997000
CVE-2024-37800,0,0,3aebd2faaeb84484cc68215ff2c27d755488c237f64ba208bea923e908662dd8,2024-07-05T14:11:13.163000
CVE-2024-37802,0,0,acc621703310da7f355403e50706b571175d412f17efb19e135e56be65b914ac,2024-07-03T02:04:46.857000
CVE-2024-37802,0,1,d144fe0e12cc92285cf5a45a291aa1263aaf8f5127240eb000b3aa69fb216783,2024-07-19T14:52:41.287000
CVE-2024-37803,0,0,e775e15ae57e6d87a1c3eae9b2633b6fb5e2150047d8db37ba8a0df6bf917fcb,2024-07-15T16:46:21.273000
CVE-2024-3781,0,0,0166ef6fe2c7d229a771ed8a3459c0974e3bc1428bfcd1abf209c8c2e778a8e5,2024-04-15T19:12:25.887000
CVE-2024-37818,0,0,5cb7934ffaf0f9273124a6e156c7f80c8bbf67e7edc77dc4c583d4fc2d7c2bcb,2024-06-21T11:22:01.687000
@ -254298,7 +254300,7 @@ CVE-2024-37878,0,0,282b497331cb5e0e568eabcf2bb041155bba14f057968afb117714a18e582
CVE-2024-3788,0,0,6b959b24977bfe93124701dc390076a86010e99d87dbe3186e4044d17a0dbe72,2024-05-14T16:11:39.510000
CVE-2024-37880,0,0,82eff4be44645b4491042424f1f050de41161f24ce7895f2d65362440f2e1175,2024-06-12T16:30:15.053000
CVE-2024-37881,0,0,fafe084cbebf486f837ec15aad94ff51628af0624cdbbaa015b3cc71821530aa,2024-06-20T12:44:01.637000
CVE-2024-37882,0,0,1591ef5f43033c48132d21762e3ee547f1087c0ab48932fd92dc93f9f374339e,2024-06-17T12:42:04.623000
CVE-2024-37882,0,1,1684452fe9676caabbe7e5f6ee8e47e99d5ba41bf75f3c683dc771f8ab16d9ee,2024-07-19T14:57:28.583000
CVE-2024-37883,0,0,c77acb00c6918b88f907a34f95c6331dd8026d26d9df45c23ee0d7fedcbaf4bb,2024-06-17T12:42:04.623000
CVE-2024-37884,0,0,952c4e8fbd193a9545d9e09eebd8595200777ddf3410e4c7d9e4c780747d8c23,2024-06-17T12:42:04.623000
CVE-2024-37885,0,0,0554ded4578d680ce028ccdfb1c66cc431ad3523cf98aaf322e17a30654cd453,2024-06-17T12:42:04.623000
@ -254310,7 +254312,7 @@ CVE-2024-3789,0,0,2bd1998a949e0866cad7ea41db064c445677b92506394ffb5a3d7ae99f9984
CVE-2024-37890,0,0,d8e638c3d74286b0169c02eca757908ace16d60e933c94acfab66b9500a67b5c,2024-06-20T12:44:22.977000
CVE-2024-37891,0,0,ddade946d98463a2c8f8cfbb3e55e1c2664330986b4bd67bacc4915522a6cc76,2024-06-20T12:44:22.977000
CVE-2024-37893,0,0,1e621ca1efe8ed2ab7c42c8bab6b80feddd2af900ca46095cf7b6980e321a4b3,2024-06-20T12:44:22.977000
CVE-2024-37894,0,0,424d8ed8a48fd7cd5e8c57134310a02f78cc91b6a429d6219c4e31dd01ead29b,2024-06-26T12:44:29.693000
CVE-2024-37894,0,1,5c3e1c011e44e5c8bcf6a6398118ad2efcba003a19994815d77c769e906a42dc,2024-07-19T14:15:05.957000
CVE-2024-37895,0,0,83fc999b914f31ef5377ea2f4739df1f86727e09c7234e6711ade849e83102e2,2024-06-20T12:44:22.977000
CVE-2024-37896,0,0,accc5cd71320f643f30fd3c58fb4ef952e3edd98e66520b2d1ebf95954392e5e,2024-06-20T12:44:22.977000
CVE-2024-37897,0,0,eb358c8b4bf1d804a542a3de3cc644f3b57f51c972b900353c845858b20c9acf,2024-06-21T11:22:01.687000
@ -254447,7 +254449,7 @@ CVE-2024-3812,0,0,aee0c212c8bdd18b48eb1b3684691508393eebae6c9908dea995a90b32a5da
CVE-2024-3813,0,0,255e2bbf5db93c0e3292fd35c927e47a1f392d6327b9d4c6707ef52776c11659,2024-06-17T12:42:04.623000
CVE-2024-3814,0,0,af559420ce1e3044689136ce469515a498db3d8c3f527cd805c49729f88c5c18,2024-06-17T12:42:04.623000
CVE-2024-3815,0,0,b8c8a85ee4e0df355cab9e3d8b72a412d3d9d1a29cf1232bd66e69ecee9ede27,2024-06-17T12:42:04.623000
CVE-2024-38156,0,1,b24436c85d01ced9aa10bffdcc3048064061e2106e9f06caaac14532dc6e9f6d,2024-07-19T13:01:44.567000
CVE-2024-38156,0,0,b24436c85d01ced9aa10bffdcc3048064061e2106e9f06caaac14532dc6e9f6d,2024-07-19T13:01:44.567000
CVE-2024-3816,0,0,ca9c8b3746ea2ebbbc383e9aa135dd99550dbafdbe5ff9c69dbe15b33a0feabf,2024-07-03T14:37:07.750000
CVE-2024-3817,0,0,4cefb34eb15d4ef81a2470a00ac0f43601ef6263c0fd4425e7542c27d02dfa54,2024-04-18T13:04:28.900000
CVE-2024-3818,0,0,b4c982a18364880791124fa7ba25840b7eb37a53aa1551fa23324d948b6ddd3f,2024-04-19T13:10:25.637000
@ -254480,7 +254482,7 @@ CVE-2024-38293,0,0,db540509e2b09b1cf976c07d02eb5180e9ce221e532de6476381169b8943d
CVE-2024-38294,0,0,cfe666b9712fab71a124db5665eed08c4872b4737e6668b46d4396d88c0aebaa,2024-06-13T18:36:09.010000
CVE-2024-38295,0,0,03d5fac9c56dd868c4010b14a3eb31cfcfc8b05ace907fed84907dc669fa51ee,2024-06-13T18:36:09.010000
CVE-2024-38301,0,0,f2a37402ef8b0d31ff3ea0e1d564c9225d55bf4ff53ba3d88dbb3b4cbe725ed6,2024-07-11T13:05:54.930000
CVE-2024-38302,0,1,e77ca3bd1f42a6aa7992c70d7c2a8c98c0238a3f11a590553b92597fb717d1f6,2024-07-19T13:01:44.567000
CVE-2024-38302,0,0,e77ca3bd1f42a6aa7992c70d7c2a8c98c0238a3f11a590553b92597fb717d1f6,2024-07-19T13:01:44.567000
CVE-2024-38306,0,0,302c251894cd8175c95dcaa248535d0e8a6962400e46ca01099390440f888d26,2024-06-25T18:50:42.040000
CVE-2024-3831,0,0,50e818929dc56e84afc0dd8fe8fae7a8b323529f272034386ddae5543191124f,2024-05-14T16:11:39.510000
CVE-2024-38312,0,0,62eb62b9d7b5ef969e29b7a666a055ad4f1c195d2f96322b61c091e6e406a8ac,2024-06-17T12:43:31.090000
@ -254753,7 +254755,7 @@ CVE-2024-3878,0,0,5053df083f23b6f337fe4f8fdf53fe0df42d421dbd3425cfd92b488e4629a9
CVE-2024-38780,0,0,ae16337cc2f7b6345cfbc91dc7be992225f0e3cd48711d005c1594aad3b12d58,2024-07-15T07:15:14.603000
CVE-2024-3879,0,0,a6db760401fb215a79d8f48992cc838e1a5c23839a86defd39dd342ef1c5f8a8,2024-05-17T02:40:10.177000
CVE-2024-3880,0,0,6dd5da57a8412b823038a64a32d07af4547e4dfdd637b54b90b4556bfd34431d,2024-06-04T19:20:26
CVE-2024-38806,0,1,aa1ff0885d521aab036aaf6506258a484aa869322b524482869e0e1df3ac4a48,2024-07-19T13:01:44.567000
CVE-2024-38806,0,0,aa1ff0885d521aab036aaf6506258a484aa869322b524482869e0e1df3ac4a48,2024-07-19T13:01:44.567000
CVE-2024-3881,0,0,3699310594a82ce285b52bf9c21755fa8173160a66408c76064512e538b3fcc8,2024-05-17T02:40:10.360000
CVE-2024-3882,0,0,8cf286ca42c3a62eccb821d9ac0678dabad594eee248c127390ddaf169987d46,2024-05-17T02:40:10.457000
CVE-2024-3883,0,0,e6bda202b9fd54c10f25f29dd8ae0cebb83b1538aee636944c2fd66bf4045fff,2024-05-02T13:27:25.103000
@ -254833,7 +254835,7 @@ CVE-2024-39071,0,0,195ebf652ba5fdec3966b79507d582422df3145f15e690eeba2499c0a1d26
CVE-2024-39072,0,0,31b7b2f8b8e84ff26cbb01ff0fdf400f7d970c8f96ac4f5eabe40a5bf0f78dad,2024-07-11T13:05:54.930000
CVE-2024-3908,0,0,42c7c9b2b31f61816d945d69672e5e24b20e282cc849fd87286a4170779d810f,2024-06-04T19:20:26.660000
CVE-2024-3909,0,0,ea272c17ff869087d9799ba3efa606456d1ea78a711f72e5984479fd9f006e55,2024-06-04T19:20:26.763000
CVE-2024-39090,0,1,0d32ce4acc0048b7409fcf710f16d81b2ac7b3f9a846a81af31a5670d016f555,2024-07-19T13:01:44.567000
CVE-2024-39090,0,0,0d32ce4acc0048b7409fcf710f16d81b2ac7b3f9a846a81af31a5670d016f555,2024-07-19T13:01:44.567000
CVE-2024-3910,0,0,5517b92ffa84ce0352fdc1fcc785da8fc488f0a213ee6670945494d32f02de6a,2024-06-04T19:20:26.870000
CVE-2024-3911,0,0,554ab1929819d1eb25e95db5b6b72b7d88b66260392eaf976b13306fbbfd7fd3,2024-07-03T02:06:52.050000
CVE-2024-39118,0,0,c73221ddf1d7aabf1cde04e3cc8495d2b93ac9b8498b2f760ce56c4f1b9d2289,2024-07-11T18:30:13.010000
@ -254862,7 +254864,7 @@ CVE-2024-3916,0,0,f95518a402c56c15214d8c7d6dfe42604495d4bb38ccc0f52b32e4da2a1f88
CVE-2024-39165,0,0,73505f78c1b9aaeee94abeacaf375a0ada22d254c42d8c2b004bd82562025a88,2024-07-05T12:55:51.367000
CVE-2024-3917,0,0,87493362103f61e3758851588aca1cc3facb0cf1f97ad5b068e06e988e9b2161,2024-07-03T02:06:53.877000
CVE-2024-39171,0,0,979bc13509f362c564b7984548b10a6ed307c7ff17f59734c1b5aba694dfcb6e,2024-07-12T17:15:38.200000
CVE-2024-39173,0,1,4a92644ed2652b9bb3da2843df35fed8ae84e8e0843ed6c47d90979d53a77858,2024-07-19T13:01:44.567000
CVE-2024-39173,0,0,4a92644ed2652b9bb3da2843df35fed8ae84e8e0843ed6c47d90979d53a77858,2024-07-19T13:01:44.567000
CVE-2024-39174,0,0,e23d16c301dd77bcbf0c998cdb1fd9e2250ff32896205d07ec7d2fbcb29c498f,2024-07-08T15:49:22.437000
CVE-2024-39178,0,0,941809397cc55551932a6950a6f2b95c443b08d8ccb5b2192a192df3dfe41968,2024-07-09T16:22:51.013000
CVE-2024-3918,0,0,476a46be6ec9c148a29f5d8b4706a927d6b38a7387c9465eb6003c281a1d7618,2024-05-24T01:15:30.977000
@ -254958,7 +254960,7 @@ CVE-2024-39429,0,0,c0f0ea0961d667a14523724c8241b9d1f206aa304e922487a3184313c2bde
CVE-2024-3943,0,0,fecb7894fc8f71bb1eb318ec20be6409020b761b3221fbb9ca597f81fb48f5da,2024-05-30T13:15:41.297000
CVE-2024-39430,0,0,64e823bdb7084987f6e4f2dcc4ad0f20791cdd196a0003b3469db98557837678,2024-07-01T12:37:24.220000
CVE-2024-3945,0,0,f529a76504b589632a786b994a7e59172142cd26cd001d628e7f3ff9658da8b1,2024-05-30T13:15:41.297000
CVE-2024-39457,0,1,56e1deb6213e966d38aa162f6114a67ee205460480d1b6740f1a9974b4d73e7f,2024-07-19T13:01:44.567000
CVE-2024-39457,0,0,56e1deb6213e966d38aa162f6114a67ee205460480d1b6740f1a9974b4d73e7f,2024-07-19T13:01:44.567000
CVE-2024-39458,0,0,057d26d6064abe38c6844996c076741573b3fb5797f6e26a9cfc5dd443dbc18e,2024-06-27T12:47:19.847000
CVE-2024-39459,0,0,a2d4a360bea52f929e9e67b789c87ad1cf52c7054f238a5096a4acbd8cc22855,2024-06-27T12:47:19.847000
CVE-2024-3946,0,0,ab824b4f2a8403c27b100f5c3d6e7f8d9dd1c20c9aa138888e04631941f166f6,2024-05-30T13:15:41.297000
@ -255194,11 +255196,11 @@ CVE-2024-39901,0,0,2e70a8f9f46cc19984c51f63370a0f8333bfb1ff58b809a78b0486415e619
CVE-2024-39903,0,0,138b301be2353a9e3b0b27c4af1a1a55145a503c57863f4b07d601b2ac0aca9c,2024-07-12T16:34:58.687000
CVE-2024-39904,0,0,12dfcb7489fbbc04166f8899b5558b4641d719eb33eca1dcad68903cd7888843,2024-07-11T18:09:58.777000
CVE-2024-39905,0,0,80f913a61cef6f1c2b28da4a228824e63a50833144469e0ed56e623dda317247,2024-07-11T18:09:58.777000
CVE-2024-39907,0,1,bd1711309f44a56ff6fd5c90a3d3730e0655f011ed3baab78935be3a78a05112,2024-07-19T13:01:44.567000
CVE-2024-39907,0,0,bd1711309f44a56ff6fd5c90a3d3730e0655f011ed3baab78935be3a78a05112,2024-07-19T13:01:44.567000
CVE-2024-39908,0,0,08d14bdaf18f2ed74e9b6ee71dfe514c41d48f98781bfe1f038503cd39467df4,2024-07-17T13:34:20.520000
CVE-2024-39909,0,0,84d207bd7916a7aa0c749989b5f6df126cc82f60739ec52f44f8de2604f130ed,2024-07-12T16:34:58.687000
CVE-2024-3991,0,0,8fc5cec164b75a61473f46907d411f1d06a3bf1fdc70a00ae47e8c931a83fb1a,2024-05-02T18:00:37.360000
CVE-2024-39911,0,1,ce593cca829f23641e34802a63c29a224f25ec101baa494868b880f46f8dbf40,2024-07-19T13:01:44.567000
CVE-2024-39911,0,0,ce593cca829f23641e34802a63c29a224f25ec101baa494868b880f46f8dbf40,2024-07-19T13:01:44.567000
CVE-2024-39912,0,0,4436d60855b958a3375758a6aab42c07e9fab81e2780af44769632fe57f2c7e5,2024-07-16T13:43:58.773000
CVE-2024-39914,0,0,fc85dcd483038cc9947eead0920b62559c30fc46579f4bdee42403db053af4c1,2024-07-12T16:34:58.687000
CVE-2024-39915,0,0,5ec2bdefe8c5cab79f2425e6d7423ca1431bc3eed9fc27e781bc8d91b05089c7,2024-07-16T13:43:58.773000
@ -255222,6 +255224,8 @@ CVE-2024-39937,0,0,1f82f5b58ad230c732d9cc7b90ed7f292cb38d4f538cd1c141ede474ebd9d
CVE-2024-3994,0,0,1a9bed43f4b2f43f8d685322cd3b5005094af7345fc065cd7144b7703ac2b568,2024-04-25T13:18:02.660000
CVE-2024-39943,0,0,3de3703190bb81e39ee7c36efe8f307ccc0155c112a035e437cb302295eb462f,2024-07-08T16:42:25.603000
CVE-2024-3995,0,0,a7fe690817691037765b680c602849c2a36e767bb2849159693fe5a7864f46cb,2024-07-01T14:15:05.680000
CVE-2024-39962,1,1,b1aaa4e08376ce43b551fc23e10a14348461b89da0b769d5b76b6b4090edc3fc,2024-07-19T15:15:10.320000
CVE-2024-39963,1,1,ee059b8c54354e03d7be8b8edac5b858d32e3796923f5746a1878d0fad50b757,2024-07-19T15:15:10.383000
CVE-2024-3997,0,0,1f2576b07f1c26f802b0f1e551eeeee57100d1eaa419296265017e09a1456b97,2024-05-24T01:15:30.977000
CVE-2024-3999,0,0,4248dd2372447004bc43614b1896e27a040049c0dba411de9512ee0e6f816fb7,2024-07-03T15:44:56.130000
CVE-2024-4000,0,0,7c8c2f5334fecf0f2ab22d97b46108b7e41243cb0a54444d2343bca0b6a11052,2024-05-02T18:00:37.360000
@ -255348,23 +255352,23 @@ CVE-2024-4062,0,0,695b7b6d53140e91ee1c447f6f5acafad0b73fbbd2558cb89ae9d4c0c7616e
CVE-2024-40624,0,0,4a20911ba5017c22f7067e7eea43b4f5d49d24af0046266156676a49862c806b,2024-07-16T13:43:58.773000
CVE-2024-40626,0,0,39de0d110e3c1039d3a20d10cfa670212de054a0a02a529b738910a4f0544e46,2024-07-16T18:00:02.110000
CVE-2024-40627,0,0,9135682f430d5bd3e848a020970fdae52f5ba66833f8d323b6fb81718428c2a6,2024-07-16T13:43:58.773000
CVE-2024-40628,0,1,97542434aaedd6d0d3469c237db978665a1c67f0643ba1911e47734618959708,2024-07-19T13:01:44.567000
CVE-2024-40629,0,1,5aade287d48ab090ae707ebaff210653202d02d310a954cbbb601ee1614f7a9d,2024-07-19T13:01:44.567000
CVE-2024-40628,0,0,97542434aaedd6d0d3469c237db978665a1c67f0643ba1911e47734618959708,2024-07-19T13:01:44.567000
CVE-2024-40629,0,0,5aade287d48ab090ae707ebaff210653202d02d310a954cbbb601ee1614f7a9d,2024-07-19T13:01:44.567000
CVE-2024-4063,0,0,a86a41867bbd8268c01f6e42ab82f3f97444cd9242de57f43e4b9e5669394e5f,2024-06-04T19:20:29.120000
CVE-2024-40630,0,0,7de2616afe35fe6a2f4466f98346fd28ee106a7dd06220a48b0a183cb2c5ca6f,2024-07-16T13:43:58.773000
CVE-2024-40631,0,0,e76fc6e49d84a60697f94ea752f6e05b7f5417e39730b8ace11ee475f8eb8441,2024-07-16T13:43:58.773000
CVE-2024-40632,0,0,e6e0d67d4d0269bad5508951d35718e2d8be48cd6b922ab10030a5117e405f96,2024-07-16T13:43:58.773000
CVE-2024-40633,0,0,cb8b1e46d2fb0350ee65397b524eda33b035785c4ff54d8f631326909af07b87,2024-07-18T12:28:43.707000
CVE-2024-40636,0,0,98744b954b3d196b3f10d684008952126f958b809a4f56d792514a1180b74df0,2024-07-18T12:28:43.707000
CVE-2024-40637,0,0,54ffb49542381dd02d325bdc0440dd33e103feee559c71f6b3bfb9145dba117f,2024-07-17T13:34:20.520000
CVE-2024-40637,0,1,8f01e513c3194bcf30056752321b26e2f21549acaed31b1fc0f5890d359b45ae,2024-07-19T14:37:17.863000
CVE-2024-40639,0,0,8bbb50b2a25542a9b7af4d56fa6e5b2d2c32a2fc32f95961ce4984af08c80bab,2024-07-17T20:15:06.603000
CVE-2024-4064,0,0,3a1a40467a64f04bfa80ae5c066454b06b4092014a9e47cc1a50eb6eb22d315c,2024-05-17T02:40:14.223000
CVE-2024-40640,0,0,7e1f28a17873c57850e387e604bc4923eccdf39126e84bd67e6dd03b6e2f6417,2024-07-18T12:28:43.707000
CVE-2024-40641,0,0,522a4579f3ed40c8409e84cbd3831ae35d4e964d4b63997db7ecee22d7238032,2024-07-18T12:28:43.707000
CVE-2024-40642,0,1,52188ba83c5687a42ca6bf3b40cbb605fd36febbce87a10af01b131e81625f9d,2024-07-19T13:01:44.567000
CVE-2024-40644,0,1,8d0ece2aba41191aa8cffc7ae7308207db8244882c164f6563e6a939c3d6015e,2024-07-19T13:01:44.567000
CVE-2024-40647,0,1,20e5e587d0777d0bcce77df9be17d322be6b8b310278f85b131c82750480c300,2024-07-19T13:01:44.567000
CVE-2024-40648,0,1,e2349aa5f69c8421d1802e501ed70a5d9670cb28532fa26d74d83879e98ba750,2024-07-19T13:01:44.567000
CVE-2024-40642,0,0,52188ba83c5687a42ca6bf3b40cbb605fd36febbce87a10af01b131e81625f9d,2024-07-19T13:01:44.567000
CVE-2024-40644,0,0,8d0ece2aba41191aa8cffc7ae7308207db8244882c164f6563e6a939c3d6015e,2024-07-19T13:01:44.567000
CVE-2024-40647,0,0,20e5e587d0777d0bcce77df9be17d322be6b8b310278f85b131c82750480c300,2024-07-19T13:01:44.567000
CVE-2024-40648,0,0,e2349aa5f69c8421d1802e501ed70a5d9670cb28532fa26d74d83879e98ba750,2024-07-19T13:01:44.567000
CVE-2024-4065,0,0,e9243298c32ccba8ab1ac6d427150517ee98217790d2dec0b1b5ec685d8cbc83,2024-06-04T19:20:29.227000
CVE-2024-4066,0,0,5674d1317b0a03adb324e31f70d35a87031f26ca2ea2869349483359d081bdf7,2024-06-04T19:20:29.323000
CVE-2024-4067,0,0,9e7f1211bf79e7110903241dcc25ab8bd46e04dab02a9e051766a97ad7f670bf,2024-05-22T12:15:10.767000
@ -255374,7 +255378,7 @@ CVE-2024-40690,0,0,0a05f7a4f7971e105a22713da576e2849ab9ee90c08902f265b260950371b
CVE-2024-4070,0,0,f50441c69b27e00682c793729b411e41b0ab8839510e28fbeccbd72a35bcaeb5,2024-06-04T19:20:29.567000
CVE-2024-4071,0,0,5f6b5ae6c8e3d6e0ce3e89718b14a6bb17b22a46ae9131966ebec62404b12da9,2024-05-17T02:40:14.747000
CVE-2024-4072,0,0,5325ee2ea26a58f6ec285799bb6ee6c62eeadace5f641482183f3a76d39bf009,2024-05-17T02:40:14.847000
CVE-2024-40724,0,1,07e21dd8086f51b2f0ac6b15bc7615c27469a6b73a4728771314d2544f7ccb8c,2024-07-19T13:01:44.567000
CVE-2024-40724,0,0,07e21dd8086f51b2f0ac6b15bc7615c27469a6b73a4728771314d2544f7ccb8c,2024-07-19T13:01:44.567000
CVE-2024-40725,0,0,11d004e87674b6d12438f654b88589fb007f4c0a9cd9fd16855d5d14c7be5722,2024-07-18T12:28:43.707000
CVE-2024-40726,0,0,763881d353b2a872c395d06db8ff47aa2480183ffa56c57536446e062ec43bc5,2024-07-11T15:06:22.967000
CVE-2024-40727,0,0,b9db12f74fa9e60fafdd87d2e3b118721f9da9edf52efc272fb39aa64e4cd584,2024-07-11T15:06:23.850000
@ -255525,8 +255529,8 @@ CVE-2024-41005,0,0,95f568882fd1e16260f486a6121f76b4a7b47a9225c03cbcf7d46d652c71f
CVE-2024-41006,0,0,58bd6c502a79651b26621eacf2c0dc46dab924e02809c912fba2631a5541c0df,2024-07-12T16:34:58.687000
CVE-2024-41007,0,0,3a5f8217b27f31f94659ee14ad4d3eb5769831e9479c2468b28332be75d954c4,2024-07-18T12:15:03.357000
CVE-2024-41008,0,0,44accff6edd09848f65c4ea30c272c9f4e4cafd7e8013f5ed231ff575ad7b53e,2024-07-16T13:43:58.773000
CVE-2024-41009,0,0,1ef19d3a6350817f09e7f0a1cc785e4d5b3dd9bf898020c5ce3302bfe332d3bc,2024-07-17T13:34:20.520000
CVE-2024-41010,0,0,86472970e8578f9cf515f3b02e7178e84fc33304ffe01eed8e1ec71ca37e601c,2024-07-18T12:15:03.453000
CVE-2024-41009,0,1,b973764a3f5390614759bf6dad52e86dad86b20c98263f759698c0703f8fb179,2024-07-19T15:06:23.827000
CVE-2024-41010,0,1,ae8d1d1b3ebaab40dc6ac6afde49ce66895bb7f4e7ee92f295ff5ca1fa79b217,2024-07-19T15:24:59.137000
CVE-2024-41011,0,0,5448bb43e82962b35456558e414651f36e8eafb86b92da98f77189318aaccec2,2024-07-18T12:28:43.707000
CVE-2024-4102,0,0,1b0aaa7efbf772a3034d5138f2cde018af6a8f41a0229b0c5f36e4d66092a2a3,2024-07-09T18:19:14.047000
CVE-2024-4103,0,0,ff27f3988e30e41f465bfc5b7800f7ae2f96b1e2cd71c1414de16617b75fe4fe,2024-05-14T16:11:39.510000
@ -255534,16 +255538,16 @@ CVE-2024-4104,0,0,069e7afb1610585640d00d566d3fc4756dff3571ed269cd2ef1d63c8e8ce45
CVE-2024-4105,0,0,5dcbaf8d64f37f58816de0666875f99544dc68f0a9ee2a9bf8d53a5a9c60191e,2024-06-26T12:44:29.693000
CVE-2024-4106,0,0,3fc11eee434aa540a2e37440bd2e3ba6e18faae117022d3f68496d405f62ba7f,2024-06-26T12:44:29.693000
CVE-2024-4107,0,0,ce88498baf95f06d1267d29854f2a9888ac0ddfe7fc00ea3036ccad453e487fa,2024-05-14T16:11:39.510000
CVE-2024-41107,0,1,23274597458da7a9f06d14f567bbc9c55442ae3cacd9818d933bb7ba0a974592,2024-07-19T13:01:44.567000
CVE-2024-41107,0,1,652a52b6606e110f3534fe4630dd6711a03cc8b36414513968170cc7d60165da,2024-07-19T14:15:06.080000
CVE-2024-4111,0,0,a3e4bcb39778569b3be84e8d38a6497dbc2fc6b5a3693d9cc21532b8df994ada,2024-06-04T19:20:29.827000
CVE-2024-41111,0,1,52a25c3214b943235db4ca14cf3f4d1ccd955b2141e1d6abf224fc5c4732905d,2024-07-19T13:01:44.567000
CVE-2024-41111,0,0,52a25c3214b943235db4ca14cf3f4d1ccd955b2141e1d6abf224fc5c4732905d,2024-07-19T13:01:44.567000
CVE-2024-4112,0,0,66f333e775e64b1480506fa97b6a827bfd5dac62e9e10520346f3a867cac6cdd,2024-05-17T02:40:15.740000
CVE-2024-4113,0,0,e0d06b1b449a5e3093ad238184a1fc3bb7c021d3199342ed4f77b54476531329,2024-05-17T02:40:15.830000
CVE-2024-4114,0,0,387f9ca6df27ba000d0f44d990ccd6bb074258bb946c87938379db9652dc0a14,2024-05-17T02:40:15.917000
CVE-2024-4115,0,0,89bc89df66a101d446d6568b359dec67345256fa579984420e2e2fe7ea4994ac,2024-06-04T19:20:29.937000
CVE-2024-4116,0,0,6ee64e85b69f8f11f599040da371bf02d3a94742e1ecd0f467d9a48f26243458,2024-05-17T02:40:16.110000
CVE-2024-4117,0,0,439d2da59fd01a25f254df6698027149837f261eb1a16ba5752d7e62667d1bfc,2024-06-04T19:20:30.043000
CVE-2024-41172,0,1,7ff2c1ab31750efec911d6f77936d20ab0d41d18e897382dcdb87b18ab700b32,2024-07-19T13:01:44.567000
CVE-2024-41172,0,0,7ff2c1ab31750efec911d6f77936d20ab0d41d18e897382dcdb87b18ab700b32,2024-07-19T13:01:44.567000
CVE-2024-4118,0,0,261b7c2db2db4c5bd0863007ba022afd6141eeb3c40d43094e801a457a5edb93,2024-06-04T19:20:30.147000
CVE-2024-41184,0,0,3aa7a7d3229054604eab34d61ec1dc93a7d382f6b0438d40096cf79453690f27,2024-07-18T14:15:05.137000
CVE-2024-4119,0,0,1787463dab796293e9249fc34f7a40843b12d1d129a7d5ccdb513e5ec2672067,2024-06-04T19:20:30.247000
@ -256512,11 +256516,11 @@ CVE-2024-5245,0,0,8367cc316d7fd622697ed020483e2edc6264aea8aa776978b7228518baa317
CVE-2024-5246,0,0,481ebf23b779dd3e32e9e0cda77aaee7d0bfc9eca82266cde6c77415f4c9c730,2024-07-03T02:08:44.767000
CVE-2024-5247,0,0,fdfe6c1388c42f602cdcb0ffda38b56b5f1ed960e60bfada435f42d294b2956e,2024-05-24T01:15:30.977000
CVE-2024-5248,0,0,2c3e52f7d10efa84a65c2d56e808c7c6b6e082b4d0e6c7b1b0a814f5918d2bf2,2024-06-07T14:56:05.647000
CVE-2024-5251,0,0,4796cbb3b42f0a690ee03b3cd93b6294e6cec2e698949c47a2ce09d6d1f7aabc,2024-07-17T13:34:20.520000
CVE-2024-5252,0,0,35e14245b82aa24bc3c367b1abfd026ee06fb2416bc15456ada1738976a26f10,2024-07-17T13:34:20.520000
CVE-2024-5253,0,0,bf9183552c283029a0bdb30e3d7c77bba5cfa7fe6141ceea8ac0eb9c1982ed9e,2024-07-17T13:34:20.520000
CVE-2024-5254,0,0,db3b82ed38e66cc455a38971516e009071894574c4da01a94cae994f4fcf4c33,2024-07-17T13:34:20.520000
CVE-2024-5255,0,0,583678a17d043ddf4c248db87c3d2e96379310b5323b537393f97b7d62335487,2024-07-17T13:34:20.520000
CVE-2024-5251,0,1,7d84d2df7bf6674f7d634954defb2f38b0363c19ae19f78012df0aa633abf27a,2024-07-19T15:25:30.980000
CVE-2024-5252,0,1,1b28d536afc88eae5088fe06ff49428bbad5ffcb2aa7139fe40c4c06d2601422,2024-07-19T15:29:35.447000
CVE-2024-5253,0,1,73f9562f224a9a11b8b8279a7bf00d920003fa046cb7c88a3a55caf281adabe4,2024-07-19T15:30:34.717000
CVE-2024-5254,0,1,78882d871be0a19bc95888168cf12372f503de77ac359f287536c8f062c38532,2024-07-19T15:32:05.560000
CVE-2024-5255,0,1,a9d47c22e8985fc8d8b40f4bef3272595484bdbc8485e44830cb58ee997ab90f,2024-07-19T15:32:18.850000
CVE-2024-5256,0,0,7546c1517da1882e18d942ab700b65cdd397cd67565c940d6efb24b85fa1c2bd,2024-06-07T14:56:05.647000
CVE-2024-5257,0,0,e4fba0a5c9dc635ae9582dcee356a08c90165a6e8c8a0a01b6dfbef5e885cd24,2024-07-12T16:54:34.517000
CVE-2024-5258,0,0,51134eb56f05332c584317818ff995de56b2de598a9752cb1990f31f73c535e3,2024-05-24T01:15:30.977000
@ -256573,7 +256577,7 @@ CVE-2024-5314,0,0,a7cdac28c15b59d972bbd1ad7f63aae58232f4c63fcf8544d4cfc91c709ee3
CVE-2024-5315,0,0,8579169b825e98cf3238daa1adb0a4d2ea9e4baf40a7a9906b16d52fd8bd309a,2024-05-24T13:03:05.093000
CVE-2024-5317,0,0,ca9413f34c0b442e0ebe516eaf4713c47241a346ee54ab90be673b58c28dbb75,2024-06-11T17:22:08.007000
CVE-2024-5318,0,0,57c4f59f6a451d6f05e81bdd8afab94c5de1c9afb56a5a0aa1d0fc569b3192c2,2024-05-24T18:09:20.027000
CVE-2024-5321,0,1,fec7922c58ce8cd726297ee4febb74d7bc97b03487c287977380c1cb890912c0,2024-07-19T13:01:44.567000
CVE-2024-5321,0,0,fec7922c58ce8cd726297ee4febb74d7bc97b03487c287977380c1cb890912c0,2024-07-19T13:01:44.567000
CVE-2024-5322,0,0,34d5429047e5a1854ac8faff5145e41fb19a8e0b0a19efc95aa08c4b8fb570df,2024-07-02T12:09:16.907000
CVE-2024-5324,0,0,5e2a0edd7d52fdd781c71961fc96e8e4892ea284c973f4fdaaac9fb76e2276bc,2024-06-06T14:17:35.017000
CVE-2024-5325,0,0,18c2f6d476daa18335c2e6768222449a066fc898992619a7b5e7a30be6df7d11,2024-07-12T16:34:58.687000
@ -256795,7 +256799,7 @@ CVE-2024-5598,0,0,dea97cf43130ffc7ec8c1e0439cc4a1d595d430c970e2a6bb452f71273924c
CVE-2024-5599,0,0,e2a52dc8fb81a6d016503d8fbd621cff191add725c15ae779eff77632921d437,2024-06-11T18:24:39.057000
CVE-2024-5600,0,0,cbb44154b53a9ff19bb9b8607051bff7897a220aae51af46369a9f79546fe419,2024-07-09T18:19:14.047000
CVE-2024-5601,0,0,e22064ef868b7763ab6a035a66dc94fbf47f776f059b7b471d5873c49e582f7a,2024-06-28T13:25:40.677000
CVE-2024-5604,0,1,3fc5f4822707c10b93ac858cb809bfd200b008140e07ef20d84f7ed8208c8435,2024-07-19T13:01:44.567000
CVE-2024-5604,0,0,3fc5f4822707c10b93ac858cb809bfd200b008140e07ef20d84f7ed8208c8435,2024-07-19T13:01:44.567000
CVE-2024-5605,0,0,e4ab13f44aee681834db0b09d11c486a794d1d811bed7db97810cd3bad2b3e86,2024-07-17T14:02:16.537000
CVE-2024-5606,0,0,954b2855130670426569975aef75e63a345bb5d86a76ecc86734db71e762262f,2024-07-08T14:19:15.450000
CVE-2024-5607,0,0,ae3ce9023a2ae1c6b37a7951db185bd6eb638714bf41f7bd2c0952a16523527d,2024-06-07T14:56:05.647000
@ -256805,10 +256809,10 @@ CVE-2024-5612,0,0,c48d9d85ab6fb6f375c9bae41bb41f013f62cc7d97e523d92c986f223f9ac3
CVE-2024-5613,0,0,d9550d95a21bd950ae7717d597381d24b04054ec554e6d52d8ed280e70034f18,2024-06-10T02:52:08.267000
CVE-2024-5615,0,0,0b80425a78ce7696e161012e7d95058779d0861d3b6927cc392e7a553c227a9e,2024-06-11T17:55:16.103000
CVE-2024-5616,0,0,5078c1aa917db98652cc6ffd2b310b244194da0fcbabfd9d4ed8ccf7b99de509,2024-07-08T15:49:22.437000
CVE-2024-5618,0,1,ebe36b14a25a2ade3e64c60f6c84014fea87ffe3e6c056e2ec2d4c12a7dbd5bd,2024-07-19T13:01:44.567000
CVE-2024-5619,0,1,1dd4749b6be6d7e6dc7272136e2a3e724b171183a64961a248fdb4990b57a472,2024-07-19T13:01:44.567000
CVE-2024-5620,0,1,e414f2b903fd835e5fe0db0e605e2aee6c78620744a7541756005a422222af46,2024-07-19T13:01:44.567000
CVE-2024-5625,0,1,2e44049535f78135e500a8f8d54d8f4d59ba5936e80e3b134df5c51262f22971,2024-07-19T13:01:44.567000
CVE-2024-5618,0,0,ebe36b14a25a2ade3e64c60f6c84014fea87ffe3e6c056e2ec2d4c12a7dbd5bd,2024-07-19T13:01:44.567000
CVE-2024-5619,0,0,1dd4749b6be6d7e6dc7272136e2a3e724b171183a64961a248fdb4990b57a472,2024-07-19T13:01:44.567000
CVE-2024-5620,0,0,e414f2b903fd835e5fe0db0e605e2aee6c78620744a7541756005a422222af46,2024-07-19T13:01:44.567000
CVE-2024-5625,0,0,2e44049535f78135e500a8f8d54d8f4d59ba5936e80e3b134df5c51262f22971,2024-07-19T13:01:44.567000
CVE-2024-5626,0,0,7932ffd73aaf78514b606728bf1a761d189d38c2a5a283b9b4110e01ed2b4d16,2024-07-12T12:49:07.030000
CVE-2024-5627,0,0,b223ea977e14432dc305de4592ca7e0252873a120062584093cd834d6b6d0c82,2024-07-15T13:00:34.853000
CVE-2024-5629,0,0,7b249822418cf5aa1c707605ba6baf660f2f435a4da7f400697e48d05f897bc1,2024-06-18T18:31:05.663000
@ -257049,7 +257053,7 @@ CVE-2024-5971,0,0,357987ac7415afbcb31d94ddf79e1610c1e4bcbc7b687b78aa636fbb9a4c84
CVE-2024-5972,0,0,3700c5b3eb4bcd1d3bafe18b568e7aab0a0471128c3ce92a2f73ba8aa9a9cb4f,2024-06-28T19:15:07.500000
CVE-2024-5974,0,0,fd52c68141e6ff6d700f6466616845a44fbd39c5ab415ece01ca8d456d4e8b30,2024-07-09T18:19:14.047000
CVE-2024-5976,0,0,0d4a23e2583616de98536e1ad4d7b2a882021b32cad502d23a934bbf343ef666,2024-06-17T12:43:31.090000
CVE-2024-5977,0,1,727b1e5bc9a2fdbbe2a201a80b666337239515f573706de037d068dde3bc3f8c,2024-07-19T13:01:44.567000
CVE-2024-5977,0,0,727b1e5bc9a2fdbbe2a201a80b666337239515f573706de037d068dde3bc3f8c,2024-07-19T13:01:44.567000
CVE-2024-5979,0,0,2890db7bdc2045eea751460532af007391576d7da8d9f838bf14583c0290ae73,2024-06-27T19:25:12.067000
CVE-2024-5980,0,0,915920a5c8bdff0e9b559c6fdf1db06079562e1ee1f1333b9d9e824a78939fce,2024-06-27T19:25:12.067000
CVE-2024-5981,0,0,6efd4ce65d0be4286973240a22b49938ee7da116677222eebd9958d92f31bba4,2024-06-17T12:43:31.090000
@ -257064,20 +257068,20 @@ CVE-2024-5993,0,0,b45a0ae570b278a2a66647d60174ec8036c753d27cba9d6e9660698bbc3fa2
CVE-2024-5994,0,0,c1974f8e417911883c192155213f25e6e809cb75c20fd828172f5e744b8258d3,2024-06-17T12:42:04.623000
CVE-2024-5995,0,0,8d0649a03e9f8bd101521287664fde419efa05e0cba1e926a7b9f4f0e9253177,2024-06-17T12:42:04.623000
CVE-2024-5996,0,0,918847ed31e9a63de46ac039dd01d572fa8e980691ed5ebebacc312a719edc7b,2024-06-17T12:42:04.623000
CVE-2024-5997,0,1,f617c2b08e97b588522e326e884bd8b2d7e5f36631694be3e5e4c23ccbcfc0bd,2024-07-19T13:01:44.567000
CVE-2024-5997,0,0,f617c2b08e97b588522e326e884bd8b2d7e5f36631694be3e5e4c23ccbcfc0bd,2024-07-19T13:01:44.567000
CVE-2024-6000,0,0,4ab86aa4bce235d1120437fd5cb3b34fb6bdae181005ebaa070e8c0afe83cf87,2024-06-17T12:42:04.623000
CVE-2024-6003,0,0,14279c0384813c4cf50ab75a79953f2b0469d9bedd7f76c2b6cebfd90962fd14,2024-06-17T16:15:16.027000
CVE-2024-6005,0,0,4d74c6c4a521a164f63a9fe529c141dc8da0592a0575e27e0e62d822beb9b877,2024-06-17T12:42:04.623000
CVE-2024-6006,0,0,da8e313e14db96255e115f081c2f199aa734bf4f3a245ddcbe0fc940a6272d5f,2024-06-17T15:15:52.693000
CVE-2024-6007,0,0,168f29713bfc3d324900731ff252d7ac39dc3f3059397dc39713b17d5dee00d3,2024-06-17T12:42:04.623000
CVE-2024-6008,0,0,4981ff7807e88c1f8b4d359e2cef28bc1c5f6b09c66a566cffc45ed30847b945,2024-06-17T16:15:16.140000
CVE-2024-6009,0,0,bff9169cd0b647f3240090ab5144b9bc1d53f891f5a2501a8dd424bcd87aba6e,2024-06-17T12:42:04.623000
CVE-2024-6008,0,1,e339bd5f37f67074a3982bb584c73bf8dda0cb7cd7304fe99aa6ea6d9b2ef2e4,2024-07-19T14:52:08.110000
CVE-2024-6009,0,1,e0a24374cca31358971f963f7084d5ca791c42b65310b9cca023d09b825a9a06,2024-07-19T14:24:41.657000
CVE-2024-6011,0,0,dbfe34d08d913fed3fe65c2dbee56080431baf13326e1312e38a9909dc7ace99,2024-07-02T18:07:31.577000
CVE-2024-6012,0,0,1211f74927850d1cfa08a87570ca9d2ab2f4417a41bad983e72a2d4354dee21b,2024-07-02T18:07:54.430000
CVE-2024-6013,0,0,4e5648a7dc6c96abe65307e6aa1037738e042c0ac9f6243b9c097655b6ee6cec,2024-06-17T12:42:04.623000
CVE-2024-6014,0,0,c98f9e90e95e02a515d46acbf2b3153d6c1f93a5af25c259b597856be8d3673a,2024-06-17T12:42:04.623000
CVE-2024-6015,0,0,346129762229c269cf6e307cf409b651125cd6b2d793094b9e036b88eb54e832,2024-06-17T15:15:52.830000
CVE-2024-6016,0,0,095e7569a99cbe538193e07d7f4f79a2f81daca39e3152345de0c698955e57eb,2024-06-17T14:15:12.487000
CVE-2024-6013,0,1,dd5aadcad9485c7b63e2c76668a62eba788e1248615fab9fd06bf5aaf41af2a9,2024-07-19T14:20:07.337000
CVE-2024-6014,0,1,6f9e64ff8fbf43e19b3d7e24c13ad8adc071c58e85b8bf9a829322ea55abcf8f,2024-07-19T14:18:17.607000
CVE-2024-6015,0,1,c2460029f18cca819988d11dbd49466b5328ee3d26de8c6ec6e0519debb7ea98,2024-07-19T14:13:10.463000
CVE-2024-6016,0,1,db11fa4e2db5dca1bf67cd82c1ae54777d6d6de86c83abed9806f80a5c1a5385,2024-07-19T14:02:04.600000
CVE-2024-6022,0,0,24cd03c9fcf6723524309e986cc2addb57b0569071dd40fa02ef59a2355b1c5a,2024-07-12T12:49:07.030000
CVE-2024-6023,0,0,0fbe5d2ca782056f31cb55e3e7e649afa27f8639de55449b0e6b5b1b24eaf884,2024-07-12T12:49:07.030000
CVE-2024-6024,0,0,0c9dac9804939f4358bda0a07a9c71c46e84018a1e951997775f9c46353d018f,2024-07-12T16:12:07.453000
@ -257085,7 +257089,7 @@ CVE-2024-6025,0,0,2653befc93f455636e57cde83404a5ff884ae434fc80abd19f04944c84a702
CVE-2024-6026,0,0,2970248e3866f379267d0cae7e3b9bb934f39b25cb3198f3dfbaa23423c08ff9,2024-07-12T16:55:44.240000
CVE-2024-6027,0,0,d36139a3f6402ad17d96a83c3d61f6ce213e515812c77112f328495c0bcd9928,2024-06-24T19:17:50.240000
CVE-2024-6028,0,0,a068f17d13f3176b06fe0181735235198b8a42900e26e5af12021baf09b50c20,2024-06-25T12:24:17.873000
CVE-2024-6033,0,0,8cfff70812f0fd734249d7491b07b714d4db7a7e879c5b2b3eab35b868b9bc26,2024-07-17T13:34:20.520000
CVE-2024-6033,0,1,752465a708ea245148cff8e77846a7ba88d4d0bef6b4e047d1479c5311cd83dd,2024-07-19T15:32:49.507000
CVE-2024-6035,0,0,71705709079183c78c8ed383ff1dde0d9a61df1fcd0014b5485dcff6ce00c8bd,2024-07-15T18:15:05.840000
CVE-2024-6036,0,0,ec75d3b088377f3e157bda1807d973db13644b79a58ce7816702ab31b3d039ce,2024-07-11T13:05:54.930000
CVE-2024-6037,0,0,6693b31ec7c6312863697d20bd04a1bdff52b0f0104cd13eb0277621b822579c,2024-07-11T13:05:54.930000
@ -257205,7 +257209,7 @@ CVE-2024-6193,0,0,00fd76685b00c66c75878efc81598a588f58971e8df576cbee2d630c4caeff
CVE-2024-6194,0,0,2fd14db6633e624a38e90bae695b4c4d57fa0e3aaeb642623d447d03f1402676,2024-06-21T11:22:01.687000
CVE-2024-6195,0,0,6a062efe55296f0b78677192fb0a748b37d8f49a4a61cffdf8e5d965a387b28b,2024-06-21T11:22:01.687000
CVE-2024-6196,0,0,ee53490a34820f9c77a5a8ca54b2af4db4b9298e709dd53453d8c4a657cc2768,2024-06-21T17:15:11.350000
CVE-2024-6205,0,1,8522b9cc1b5d1a5df21e355f77848148672ea3ccc036a48aa36b3c3473c36fd7,2024-07-19T13:01:44.567000
CVE-2024-6205,0,0,8522b9cc1b5d1a5df21e355f77848148672ea3ccc036a48aa36b3c3473c36fd7,2024-07-19T13:01:44.567000
CVE-2024-6206,0,0,7ae31b087265fa68705a3f153945ecef18a4fdd89eba1b0f5f6a9be630fb6cf5,2024-06-26T12:44:29.693000
CVE-2024-6209,0,0,dde817e69ddab612402867a39af366fc36713e43c4758f0a34432256fd885f93,2024-07-08T15:35:25.837000
CVE-2024-6210,0,0,d08d160d43811c5bb8dcf64fef0c280a0a7b1e98d094babc485e09ce9fa86125,2024-07-11T13:05:54.930000
@ -257291,7 +257295,7 @@ CVE-2024-6326,0,0,7f3dd075f877db7303a493f59304e094cd076f4bffd073b2a606c370e31f6e
CVE-2024-6328,0,0,1dc9c3c4a448080717651ebabfb2fc281b4a1c036cabba31a96124b6cb4e8cbc,2024-07-12T12:49:07.030000
CVE-2024-6334,0,0,3daf0dfe09252e7765ca30c739cfcc033a43a657c17c0275e173ac670504522a,2024-07-09T18:19:14.047000
CVE-2024-6336,0,0,cbe18bd9d2fe447b7a1ae02266749a6e6d80ba22cbea894f6c946ded39640177,2024-07-17T13:34:20.520000
CVE-2024-6338,0,1,f9fea8203b4948d06aca89926bdbc4e8a3831bef5e51673b6dc46c826f518e10,2024-07-19T13:01:44.567000
CVE-2024-6338,0,0,f9fea8203b4948d06aca89926bdbc4e8a3831bef5e51673b6dc46c826f518e10,2024-07-19T13:01:44.567000
CVE-2024-6340,0,0,fd12f25a45d92fefbb8c0ec47428250f4f56bb9c686a12a52e54d86e24fec10a,2024-07-03T18:27:40.903000
CVE-2024-6341,0,0,528f4fdde1526d72477e90a767b2f2316b168f65b64effeddb9446d8a5cdcaf5,2024-07-02T18:15:03.900000
CVE-2024-6344,0,0,ddc89c494afe0b7b80a518e0bed96070c096d29b8a0f403bdd242f60ce193de2,2024-06-27T00:15:13.360000
@ -257354,13 +257358,13 @@ CVE-2024-6441,0,0,15383e1684ea64dc1d374e71fe60467b8bfc18bde94b0e73415ebe68688c21
CVE-2024-6447,0,0,45fe1e3b45bb9052a54143ac6931092e1b37ff897cd56aa11e3df59780bc06cb,2024-07-11T13:05:54.930000
CVE-2024-6452,0,0,c694c1bdf54902e69172121aae2a54d0747cfc16750499c01d3cf3c9c6ef3263,2024-07-03T12:53:24.977000
CVE-2024-6453,0,0,f8f94ef1371b1813320fb500c8f5a2a5c78562059f37a370c24f1cfd03cdaa59,2024-07-03T12:53:24.977000
CVE-2024-6455,0,1,8630ebc1a98e741e91f009e85126d02bca9a8a2c6f3c48f74f4c74c8c868f369,2024-07-19T13:01:44.567000
CVE-2024-6455,0,0,8630ebc1a98e741e91f009e85126d02bca9a8a2c6f3c48f74f4c74c8c868f369,2024-07-19T13:01:44.567000
CVE-2024-6457,0,0,3f8fd462f3f8c08854de8c2b7a3218f7387f47da9a3a1dd75e4a135f6aa135cb,2024-07-16T13:43:58.773000
CVE-2024-6461,0,0,86a214d0c7bd3f57cea37cd567b01f1a0e55f8d4342f6c7c46fd15b8942c8d90,2024-07-03T21:15:04.580000
CVE-2024-6463,0,0,f8d7d80ca565804c0caafdbc8214fe1eca7dc83d43861affc813af07365c0cc0,2024-07-03T21:15:04.640000
CVE-2024-6464,0,0,8fab89d1b3aef32a257cf0d7fb909cce6ac18d5ef8dc898bb9f0cc6c52356cbf,2024-07-03T21:15:04.697000
CVE-2024-6465,0,0,1a52d419caf12d1d223520a109b2aa019665792454012b51a06898ed38739a48,2024-07-15T13:00:34.853000
CVE-2024-6467,0,0,5b9ead3379b44b10c36af0988b505d8c9049b4b9963978db665ebe162faf6d93,2024-07-17T13:34:20.520000
CVE-2024-6467,0,1,40d89c875ad7013f32015f1ef7736b3fb0ce3fd8c16e4649f7f0da01810ff45c,2024-07-19T15:37:51.067000
CVE-2024-6468,0,0,35510ca663346ec39c4261a703db141288708f1a8a294ff4bff13dfd2b2ac57d,2024-07-12T12:49:11.340000
CVE-2024-6469,0,0,8a9cc14cdc15687cebe1f067587bd279bfc289daac6283040462018576c0d534,2024-07-05T17:09:54.870000
CVE-2024-6470,0,0,c9a33c23ec7370c50b4df58ad71ec5e181cf8d29947a984c43804e0a58dc7723,2024-07-05T12:55:51.367000
@ -257384,7 +257388,7 @@ CVE-2024-6526,0,0,0395771cb83da3c31d3258df800a7adc493a41c6b23cd6248bbb973fb8ab4b
CVE-2024-6527,0,0,4cbacb620d5954abb73dae2b3bfdb2a8824258a4de25ce8e7c75649e12d818a5,2024-07-09T18:19:14.047000
CVE-2024-6528,0,0,568c43fb32d79fc097335d9307aebc42d71a690423942e01ce8dbade6b5bedb0,2024-07-12T16:37:20.283000
CVE-2024-6531,0,0,1125a21608be8cb0502ea86867294670584ed16918c5bd752fdbbd37969404b8,2024-07-12T12:49:11.340000
CVE-2024-6535,0,0,ebcd6a15734c7bd515f473e3694f403e38dfdfb613934f319baf860afe37056e,2024-07-17T13:34:20.520000
CVE-2024-6535,0,1,7e920196055804e6beeef53bb75ed2bd3a366087f8b193ad1d13704b3ca01837,2024-07-19T15:00:32.153000
CVE-2024-6539,0,0,81a7a773476044a536e1904849aff55df114add8144e8265b917f8120b92d867,2024-07-11T14:56:20.733000
CVE-2024-6540,0,0,f13af52637070826766869c9a967d13110a057955f51f107eb0d0f88b4032338,2024-07-16T18:05:37.267000
CVE-2024-6550,0,0,6c4bb046e65a00df1f67c81af4edc0fc3847fdca60c1beea606bf943b5851318,2024-07-11T13:05:54.930000
@ -257401,7 +257405,7 @@ CVE-2024-6574,0,0,63009fc3946aa6aa37035c823fc25710c373929512d42b52b922f4cc721537
CVE-2024-6579,0,0,b286f5c4b3721fdb4257ac4cb9bb10daf8e7123999c9d4983b5d418f439447bf,2024-07-16T13:43:58.773000
CVE-2024-6580,0,0,d43dfa58651574c4447e8f323f3cb1f6a00d6bdef0613d5834aefccecf968c5d,2024-07-09T18:19:14.047000
CVE-2024-6588,0,0,67672e854c20766f2e15151fa1e111ec8310b7083a57f535c99159d2ce6e5af7,2024-07-12T12:49:07.030000
CVE-2024-6595,0,0,4de8f055bbd2e266590b849663cbe5d6660e39d6760c9305731e3e1ae9a12884,2024-07-17T13:34:20.520000
CVE-2024-6595,0,1,97cf6a37af39b7f5832976478077fe225f57d63ffd9a5f39caf9eca8e3545339,2024-07-19T14:52:54.943000
CVE-2024-6598,0,0,fb802128b1cfc176540749693b684b4374936099ab1c7948c1ec819266291908,2024-07-09T18:19:14.047000
CVE-2024-6599,0,0,037851e9df9d617d8307f9b270a87bc534f61814e2c16dbf5d0d1ccdfb3dffc4,2024-07-18T12:28:43.707000
CVE-2024-6600,0,0,8a7bdd7b6969fa6cd69a1854f6f2130a9698184b9485e28b1c9cbb32470416d8,2024-07-16T18:15:08.737000
@ -257435,11 +257439,11 @@ CVE-2024-6650,0,0,389479cac037eb791bf22f3727c10e60384d8e28492bfb0d0b7873c538245d
CVE-2024-6652,0,0,32c4914a2885b2299fef5292f9b5b00052aaeaf4b92ba53d869ce14f17c7c595,2024-07-11T13:05:54.930000
CVE-2024-6653,0,0,d93d31cbf15b722e8213bd0a1f350049b73a325a73fea026c81bdae5013a3c4f,2024-07-11T13:15:10.147000
CVE-2024-6655,0,0,0485248ee98682a7d1526979650a74114bd662162c8fc1626488ee79436e31bf,2024-07-16T18:00:02.110000
CVE-2024-6660,0,0,e12123b0fdc1a4cf893451c502a4c949c34272dd4951db34e902a701cd340466,2024-07-17T13:34:20.520000
CVE-2024-6660,0,1,caad23d7b98522c6f22294c27dcab3f8925f974b7a7faae66643c3e06a0d6672,2024-07-19T15:48:14.040000
CVE-2024-6663,0,0,7facb2637e12709d4a455340194f194dba2537cb44d31c2262ed1aa6b9ebcf89,2024-07-10T21:15:11.463000
CVE-2024-6664,0,0,7dcdbd9efac1143da422ef778b0a605b2e75ff3874c65ca5b8e519e1d8523278,2024-07-10T21:15:11.520000
CVE-2024-6666,0,0,6ade2353732c66fc20367582756530c33ec26bf7f6989700bd337bd969227f22,2024-07-12T16:46:48.387000
CVE-2024-6669,0,0,1827a5cd80b70c7e4a072fdca8a75608d4a1b643851076680e62b92828d5825a,2024-07-17T13:34:20.520000
CVE-2024-6669,0,1,87233746e73dcd3cc336669e330764691e93b16935dab43ac512a989f6e36eb0,2024-07-19T15:56:47.190000
CVE-2024-6676,0,0,b617e99f4ff839e117300b1a5f3c494dc1ceb13864a576e2b1519c7ec5960d34,2024-07-11T13:05:54.930000
CVE-2024-6677,0,0,d8004a1441e952f05633a34727a4f9223ac5077c2123fd1507a1955287de18f3,2024-07-12T12:49:07.030000
CVE-2024-6679,0,0,193698b3a519c2de1af0fd23f7e404e2d54c730e4704d97d0092b63ef1c81272,2024-07-11T18:09:58.777000
@ -257478,23 +257482,25 @@ CVE-2024-6777,0,0,a56d95e067795760df390f3c029e1e701f64cddc2191775e9444fd4f0151a2
CVE-2024-6778,0,0,fdea16e148384a7e3dcb709a8443d007c41fffe85566adafe1ded010eb26487c,2024-07-17T13:34:20.520000
CVE-2024-6779,0,0,a0c53973235d650b76f5a317527d64babc63b7437f664de7c206225fae1a5344,2024-07-17T13:34:20.520000
CVE-2024-6780,0,0,54fc3efeb973ca2f40f04f54d5a723685bcfaff31befba604fec0242bd088a83,2024-07-16T13:43:58.773000
CVE-2024-6799,0,1,261c5f62ba7eb23f22b0dcfaa72979cb179b4af28583aa3634c3f6ae02c8d066,2024-07-19T13:01:44.567000
CVE-2024-6801,0,0,162a1f556795709c33618b00251776b5d64e78443324e3312f382d4754aaf838,2024-07-17T13:34:20.520000
CVE-2024-6802,0,0,386226bce7b12b7500a7728e6323db5d69291b7883c492fa520631c141d51c93,2024-07-17T13:34:20.520000
CVE-2024-6803,0,0,698fb954222e7db5d1598623eedb3617e795f993f29a35b3e0ac7c1569604491,2024-07-17T13:34:20.520000
CVE-2024-6807,0,0,60acf58925408625a444a0bb6ffc77398b3b984199e5b0e4e7ba5e371b31f55b,2024-07-17T13:34:20.520000
CVE-2024-6808,0,0,9e957ba9065e9b12c070f25b75e9ca36ec77b27a404450e1a18818d5661c0932,2024-07-18T16:15:08.300000
CVE-2024-6799,0,0,261c5f62ba7eb23f22b0dcfaa72979cb179b4af28583aa3634c3f6ae02c8d066,2024-07-19T13:01:44.567000
CVE-2024-6801,0,1,6cf94e1980aea6fcc25b038d583cb2250e04ba4c9461d4d907e1f9ce16b1e09a,2024-07-19T14:55:25.753000
CVE-2024-6802,0,1,28d3acf4fd2d79095dac148cf5494a8bae6c6a9f871caa0540dd765a2bd6262d,2024-07-19T14:58:12.707000
CVE-2024-6803,0,1,e77960f60e5c3ea5b22b60c53aac93b8bf6ffc93dd5f015dabaabc8b5a77736e,2024-07-19T15:01:50.250000
CVE-2024-6807,0,1,e7a9e356d2137bfb067b0761eea1a41e11da3606f29d9b24e33a8982fadc5d78,2024-07-19T15:03:08.933000
CVE-2024-6808,0,1,2df5a702fa4af6687f0c8dc8e100812ff9b6b346801edb239f41e0ca638c0076,2024-07-19T15:04:43.837000
CVE-2024-6830,0,0,66325e33317c6fde8b929b285667c5104c4ae04492532b5067560968ff36e7fb,2024-07-18T12:28:43.707000
CVE-2024-6833,0,0,b0ea48d29166f6347ac218b4f9f93d3f7fc599fd932b64c35cfa55e5a1a94672,2024-07-18T12:28:43.707000
CVE-2024-6834,0,0,9b06026f568f95c4c2a4be9208340b1bc5ab27fea601ce9296ee0a0b671ec68d,2024-07-18T12:28:43.707000
CVE-2024-6898,0,1,98dae2dc951da0c9f1ac4e695a7ad38573b2abb15f5508f51642ed9635c194c6,2024-07-19T13:01:44.567000
CVE-2024-6899,0,1,862a9d8e40eab426823cca194fdd307dafe70d2837c62b14a818c2e38cfb311c,2024-07-19T13:01:44.567000
CVE-2024-6900,0,1,f9a0db97abb2b7a030f206724ca09833acdf6dd97e33de095d4cd3f3b37ccb05,2024-07-19T13:01:44.567000
CVE-2024-6901,0,1,e54159de50db3a8be34eb97b9e3f649430e41359e21d071d1c89b458210a168d,2024-07-19T13:01:44.567000
CVE-2024-6902,0,1,495ce6a6d90db5ffc5fcf4c35200d986c6bd9aea37bed0cdf107762f60a152ec,2024-07-19T13:01:44.567000
CVE-2024-6903,0,1,458cf84eca0cf9431d58c9dde569871b33a0e0cb2c0e1a1544d8b15458d5e52b,2024-07-19T13:01:44.567000
CVE-2024-6904,0,1,7a4b54dc15a07a62a46eb4054278ab061629c71b06171b5dc53981c366a15e59,2024-07-19T13:01:44.567000
CVE-2024-6905,0,1,93733b32b43103d2e6f495524d768f1986f9f809f44d345a79d9a3c82c1dfb61,2024-07-19T13:01:44.567000
CVE-2024-6906,0,1,bd3edaa779f3d24c608497477495531b8c58c3f636652b3dd6d229b39e74ed48,2024-07-19T13:01:44.567000
CVE-2024-6907,0,1,3d839b35437f0dd0faf9914e897ddc2454e64f962bdd094121c84723df304c00,2024-07-19T13:01:44.567000
CVE-2024-6916,0,1,96455c03765030601aeb6ca7398864bb6cd18912db996a417121b3c4bb1540e3,2024-07-19T13:01:44.567000
CVE-2024-6895,1,1,0c486e88c5dc57ed2713d59c6e5f599844da09fd6e820a24b10235451464145d,2024-07-19T15:15:10.547000
CVE-2024-6898,0,0,98dae2dc951da0c9f1ac4e695a7ad38573b2abb15f5508f51642ed9635c194c6,2024-07-19T13:01:44.567000
CVE-2024-6899,0,0,862a9d8e40eab426823cca194fdd307dafe70d2837c62b14a818c2e38cfb311c,2024-07-19T13:01:44.567000
CVE-2024-6900,0,0,f9a0db97abb2b7a030f206724ca09833acdf6dd97e33de095d4cd3f3b37ccb05,2024-07-19T13:01:44.567000
CVE-2024-6901,0,0,e54159de50db3a8be34eb97b9e3f649430e41359e21d071d1c89b458210a168d,2024-07-19T13:01:44.567000
CVE-2024-6902,0,0,495ce6a6d90db5ffc5fcf4c35200d986c6bd9aea37bed0cdf107762f60a152ec,2024-07-19T13:01:44.567000
CVE-2024-6903,0,0,458cf84eca0cf9431d58c9dde569871b33a0e0cb2c0e1a1544d8b15458d5e52b,2024-07-19T13:01:44.567000
CVE-2024-6904,0,0,7a4b54dc15a07a62a46eb4054278ab061629c71b06171b5dc53981c366a15e59,2024-07-19T13:01:44.567000
CVE-2024-6905,0,0,93733b32b43103d2e6f495524d768f1986f9f809f44d345a79d9a3c82c1dfb61,2024-07-19T13:01:44.567000
CVE-2024-6906,0,0,bd3edaa779f3d24c608497477495531b8c58c3f636652b3dd6d229b39e74ed48,2024-07-19T13:01:44.567000
CVE-2024-6907,0,0,3d839b35437f0dd0faf9914e897ddc2454e64f962bdd094121c84723df304c00,2024-07-19T13:01:44.567000
CVE-2024-6908,1,1,43e596b9986e083f26060cdbf20a02be417ad9fa3161f7053b7c41e2528f0046,2024-07-19T15:15:10.747000
CVE-2024-6916,0,0,96455c03765030601aeb6ca7398864bb6cd18912db996a417121b3c4bb1540e3,2024-07-19T13:01:44.567000

Can't render this file because it is too large.