mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-06-21 17:41:05 +00:00
Auto-Update: 2024-07-19T16:00:18.490265+00:00
This commit is contained in:
parent
83929a8ba1
commit
25ae3813ae
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2014-9515",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2017-12-29T22:29:00.520",
|
||||
"lastModified": "2021-06-14T18:15:10.637",
|
||||
"lastModified": "2024-07-19T14:15:02.500",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -135,6 +135,10 @@
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://security.netapp.com/advisory/ntap-20240719-0002/",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com/security-alerts/cpuApr2021.html",
|
||||
"source": "cve@mitre.org"
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2015-0973",
|
||||
"sourceIdentifier": "cret@cert.org",
|
||||
"published": "2015-01-18T18:59:03.020",
|
||||
"lastModified": "2016-10-20T18:46:05.357",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2024-07-19T14:15:04.343",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -300,6 +300,10 @@
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://security.netapp.com/advisory/ntap-20240719-0005/",
|
||||
"source": "cret@cert.org"
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/HT206167",
|
||||
"source": "cret@cert.org",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2016-3751",
|
||||
"sourceIdentifier": "security@android.com",
|
||||
"published": "2016-07-11T01:59:51.870",
|
||||
"lastModified": "2016-07-11T17:52:53.463",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2024-07-19T14:15:04.573",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -229,6 +229,10 @@
|
||||
{
|
||||
"url": "https://android.googlesource.com/platform/external/libpng/+/9d4853418ab2f754c2b63e091c29c5529b8b86ca",
|
||||
"source": "security@android.com"
|
||||
},
|
||||
{
|
||||
"url": "https://security.netapp.com/advisory/ntap-20240719-0004/",
|
||||
"source": "security@android.com"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2018-10054",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2018-04-11T20:29:00.860",
|
||||
"lastModified": "2024-06-26T20:15:12.490",
|
||||
"lastModified": "2024-07-19T14:15:04.740",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [
|
||||
{
|
||||
@ -148,6 +148,10 @@
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://security.netapp.com/advisory/ntap-20240719-0003/",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://www.exploit-db.com/exploits/44422/",
|
||||
"source": "cve@mitre.org",
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2019-17626",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2019-10-16T12:15:12.010",
|
||||
"lastModified": "2023-11-07T03:06:23.607",
|
||||
"lastModified": "2024-07-19T14:15:04.930",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -148,6 +148,10 @@
|
||||
"url": "https://security.gentoo.org/glsa/202007-35",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://security.netapp.com/advisory/ntap-20240719-0006/",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://usn.ubuntu.com/4273-1/",
|
||||
"source": "cve@mitre.org"
|
||||
|
86
CVE-2024/CVE-2024-00xx/CVE-2024-0006.json
Normal file
86
CVE-2024/CVE-2024-00xx/CVE-2024-0006.json
Normal file
@ -0,0 +1,86 @@
|
||||
{
|
||||
"id": "CVE-2024-0006",
|
||||
"sourceIdentifier": "security@yugabyte.com",
|
||||
"published": "2024-07-19T15:15:09.930",
|
||||
"lastModified": "2024-07-19T15:15:09.930",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Information exposure in the logging system in Yugabyte Platform allows local attackers with access to application logs to obtain database user credentials in log files, potentially leading to unauthorized database access."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV40": [
|
||||
{
|
||||
"source": "security@yugabyte.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "4.0",
|
||||
"vectorString": "CVSS:4.0/AV:A/AC:H/AT:N/PR:H/UI:A/VC:H/VI:H/VA:H/SC:L/SI:L/SA:L/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
|
||||
"attackVector": "ADJACENT",
|
||||
"attackComplexity": "HIGH",
|
||||
"attackRequirements": "NONE",
|
||||
"privilegesRequired": "HIGH",
|
||||
"userInteraction": "ACTIVE",
|
||||
"vulnerableSystemConfidentiality": "HIGH",
|
||||
"vulnerableSystemIntegrity": "HIGH",
|
||||
"vulnerableSystemAvailability": "HIGH",
|
||||
"subsequentSystemConfidentiality": "LOW",
|
||||
"subsequentSystemIntegrity": "LOW",
|
||||
"subsequentSystemAvailability": "LOW",
|
||||
"exploitMaturity": "NOT_DEFINED",
|
||||
"confidentialityRequirements": "NOT_DEFINED",
|
||||
"integrityRequirements": "NOT_DEFINED",
|
||||
"availabilityRequirements": "NOT_DEFINED",
|
||||
"modifiedAttackVector": "NOT_DEFINED",
|
||||
"modifiedAttackComplexity": "NOT_DEFINED",
|
||||
"modifiedAttackRequirements": "NOT_DEFINED",
|
||||
"modifiedPrivilegesRequired": "NOT_DEFINED",
|
||||
"modifiedUserInteraction": "NOT_DEFINED",
|
||||
"modifiedVulnerableSystemConfidentiality": "NOT_DEFINED",
|
||||
"modifiedVulnerableSystemIntegrity": "NOT_DEFINED",
|
||||
"modifiedVulnerableSystemAvailability": "NOT_DEFINED",
|
||||
"modifiedSubsequentSystemConfidentiality": "NOT_DEFINED",
|
||||
"modifiedSubsequentSystemIntegrity": "NOT_DEFINED",
|
||||
"modifiedSubsequentSystemAvailability": "NOT_DEFINED",
|
||||
"safety": "NOT_DEFINED",
|
||||
"automatable": "NOT_DEFINED",
|
||||
"recovery": "NOT_DEFINED",
|
||||
"valueDensity": "NOT_DEFINED",
|
||||
"vulnerabilityResponseEffort": "NOT_DEFINED",
|
||||
"providerUrgency": "NOT_DEFINED",
|
||||
"baseScore": 5.4,
|
||||
"baseSeverity": "MEDIUM"
|
||||
}
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security@yugabyte.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-532"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/yugabyte/yugabyte-db/commit/439c6286f1971f9ac6bff2c7215b454c2025c593",
|
||||
"source": "security@yugabyte.com"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/yugabyte/yugabyte-db/commit/5cc7f4e15d6ccccbf97c57946fd0aa630f88c9e2",
|
||||
"source": "security@yugabyte.com"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/yugabyte/yugabyte-db/commit/d96e6b629f34d065b47204daeeb44064e484c579",
|
||||
"source": "security@yugabyte.com"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,13 +2,17 @@
|
||||
"id": "CVE-2024-21131",
|
||||
"sourceIdentifier": "secalert_us@oracle.com",
|
||||
"published": "2024-07-16T23:15:13.210",
|
||||
"lastModified": "2024-07-17T13:34:20.520",
|
||||
"lastModified": "2024-07-19T14:15:05.180",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Vulnerability in the Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Hotspot). Supported versions that are affected are Oracle Java SE: 8u411, 8u411-perf, 11.0.23, 17.0.11, 21.0.3, 22.0.1; Oracle GraalVM for JDK: 17.0.11, 21.0.3, 22.0.1; Oracle GraalVM Enterprise Edition: 20.3.14 and 21.3.10. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability can be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. This vulnerability also applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. CVSS 3.1 Base Score 3.7 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N)."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Vulnerabilidad en el producto Oracle Java SE, Oracle GraalVM para JDK, Oracle GraalVM Enterprise Edition de Oracle Java SE (componente: Hotspot). Las versiones compatibles que se ven afectadas son Oracle Java SE: 8u411, 8u411-perf, 11.0.23, 17.0.11, 21.0.3, 22.0.1; Oracle GraalVM para JDK: 17.0.11, 21.0.3, 22.0.1; Oracle GraalVM Enterprise Edition: 20.3.14 y 21.3.10. Una vulnerabilidad dif\u00edcil de explotar permite que un atacante no autenticado con acceso a la red a trav\u00e9s de m\u00faltiples protocolos comprometa Oracle Java SE, Oracle GraalVM para JDK y Oracle GraalVM Enterprise Edition. Los ataques exitosos a esta vulnerabilidad pueden dar como resultado una actualizaci\u00f3n, inserci\u00f3n o eliminaci\u00f3n no autorizada del acceso a algunos de los datos accesibles de Oracle Java SE, Oracle GraalVM para JDK y Oracle GraalVM Enterprise Edition. Nota: Esta vulnerabilidad se puede aprovechar utilizando API en el componente especificado, por ejemplo, a trav\u00e9s de un servicio web que proporciona datos a las API. Esta vulnerabilidad tambi\u00e9n se aplica a las implementaciones de Java, normalmente en clientes que ejecutan aplicaciones Java Web Start en un espacio aislado o subprogramas de Java en un espacio aislado, que cargan y ejecutan c\u00f3digo que no es de confianza (por ejemplo, c\u00f3digo que proviene de Internet) y dependen del entorno limitado de Java para su seguridad. CVSS 3.1 Puntaje base 3.7 (Impactos en la integridad). Vector CVSS: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N)."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
@ -36,6 +40,10 @@
|
||||
]
|
||||
},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://security.netapp.com/advisory/ntap-20240719-0008/",
|
||||
"source": "secalert_us@oracle.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com/security-alerts/cpujul2024.html",
|
||||
"source": "secalert_us@oracle.com"
|
||||
|
@ -2,13 +2,17 @@
|
||||
"id": "CVE-2024-21138",
|
||||
"sourceIdentifier": "secalert_us@oracle.com",
|
||||
"published": "2024-07-16T23:15:14.620",
|
||||
"lastModified": "2024-07-17T13:34:20.520",
|
||||
"lastModified": "2024-07-19T14:15:05.290",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Vulnerability in the Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Hotspot). Supported versions that are affected are Oracle Java SE: 8u411, 8u411-perf, 11.0.23, 17.0.11, 21.0.3, 22.0.1; Oracle GraalVM for JDK: 17.0.11, 21.0.3, 22.0.1; Oracle GraalVM Enterprise Edition: 20.3.14 and 21.3.10. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition. Note: This vulnerability can be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. This vulnerability also applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. CVSS 3.1 Base Score 3.7 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L)."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Vulnerabilidad en el producto Oracle Java SE, Oracle GraalVM para JDK, Oracle GraalVM Enterprise Edition de Oracle Java SE (componente: Hotspot). Las versiones compatibles que se ven afectadas son Oracle Java SE: 8u411, 8u411-perf, 11.0.23, 17.0.11, 21.0.3, 22.0.1; Oracle GraalVM para JDK: 17.0.11, 21.0.3, 22.0.1; Oracle GraalVM Enterprise Edition: 20.3.14 y 21.3.10. Una vulnerabilidad dif\u00edcil de explotar permite que un atacante no autenticado con acceso a la red a trav\u00e9s de m\u00faltiples protocolos comprometa Oracle Java SE, Oracle GraalVM para JDK y Oracle GraalVM Enterprise Edition. Los ataques exitosos de esta vulnerabilidad pueden resultar en una capacidad no autorizada para causar una denegaci\u00f3n de servicio parcial (DOS parcial) de Oracle Java SE, Oracle GraalVM para JDK, Oracle GraalVM Enterprise Edition. Nota: Esta vulnerabilidad se puede aprovechar utilizando API en el componente especificado, por ejemplo, a trav\u00e9s de un servicio web que proporciona datos a las API. Esta vulnerabilidad tambi\u00e9n se aplica a las implementaciones de Java, normalmente en clientes que ejecutan aplicaciones Java Web Start en un espacio aislado o subprogramas de Java en un espacio aislado, que cargan y ejecutan c\u00f3digo que no es de confianza (por ejemplo, c\u00f3digo que proviene de Internet) y dependen del entorno limitado de Java para su seguridad. CVSS 3.1 Puntuaci\u00f3n base 3.7 (impactos en la disponibilidad). Vector CVSS: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L)."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
@ -36,6 +40,10 @@
|
||||
]
|
||||
},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://security.netapp.com/advisory/ntap-20240719-0008/",
|
||||
"source": "secalert_us@oracle.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com/security-alerts/cpujul2024.html",
|
||||
"source": "secalert_us@oracle.com"
|
||||
|
@ -2,13 +2,17 @@
|
||||
"id": "CVE-2024-21140",
|
||||
"sourceIdentifier": "secalert_us@oracle.com",
|
||||
"published": "2024-07-16T23:15:15.043",
|
||||
"lastModified": "2024-07-17T13:34:20.520",
|
||||
"lastModified": "2024-07-19T14:15:05.400",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Vulnerability in the Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Hotspot). Supported versions that are affected are Oracle Java SE: 8u411, 8u411-perf, 11.0.23, 17.0.11, 21.0.3, 22.0.1; Oracle GraalVM for JDK: 17.0.11, 21.0.3, 22.0.1; Oracle GraalVM Enterprise Edition: 20.3.14 and 21.3.10. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition accessible data as well as unauthorized read access to a subset of Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability can be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. This vulnerability also applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. CVSS 3.1 Base Score 4.8 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N)."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Vulnerabilidad en el producto Oracle Java SE, Oracle GraalVM para JDK, Oracle GraalVM Enterprise Edition de Oracle Java SE (componente: Hotspot). Las versiones compatibles que se ven afectadas son Oracle Java SE: 8u411, 8u411-perf, 11.0.23, 17.0.11, 21.0.3, 22.0.1; Oracle GraalVM para JDK: 17.0.11, 21.0.3, 22.0.1; Oracle GraalVM Enterprise Edition: 20.3.14 y 21.3.10. Una vulnerabilidad dif\u00edcil de explotar permite que un atacante no autenticado con acceso a la red a trav\u00e9s de m\u00faltiples protocolos comprometa Oracle Java SE, Oracle GraalVM para JDK y Oracle GraalVM Enterprise Edition. Los ataques exitosos de esta vulnerabilidad pueden resultar en acceso no autorizado a actualizaciones, inserci\u00f3n o eliminaci\u00f3n de algunos datos accesibles de Oracle Java SE, Oracle GraalVM para JDK, Oracle GraalVM Enterprise Edition, as\u00ed como acceso de lectura no autorizado a un subconjunto de Oracle Java SE, Oracle GraalVM para JDK, datos accesibles de Oracle GraalVM Enterprise Edition. Nota: Esta vulnerabilidad se puede aprovechar utilizando API en el componente especificado, por ejemplo, a trav\u00e9s de un servicio web que proporciona datos a las API. Esta vulnerabilidad tambi\u00e9n se aplica a las implementaciones de Java, normalmente en clientes que ejecutan aplicaciones Java Web Start en un espacio aislado o subprogramas de Java en un espacio aislado, que cargan y ejecutan c\u00f3digo que no es de confianza (por ejemplo, c\u00f3digo que proviene de Internet) y dependen del entorno limitado de Java para su seguridad. CVSS 3.1 Puntaje base 4.8 (Impactos en la confidencialidad y la integridad). Vector CVSS: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N)."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
@ -36,6 +40,10 @@
|
||||
]
|
||||
},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://security.netapp.com/advisory/ntap-20240719-0008/",
|
||||
"source": "secalert_us@oracle.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com/security-alerts/cpujul2024.html",
|
||||
"source": "secalert_us@oracle.com"
|
||||
|
@ -2,13 +2,17 @@
|
||||
"id": "CVE-2024-21144",
|
||||
"sourceIdentifier": "secalert_us@oracle.com",
|
||||
"published": "2024-07-16T23:15:15.810",
|
||||
"lastModified": "2024-07-17T13:34:20.520",
|
||||
"lastModified": "2024-07-19T14:15:05.497",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Vulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Concurrency). Supported versions that are affected are Oracle Java SE: 8u411, 8u411-perf, 11.0.23; Oracle GraalVM Enterprise Edition: 20.3.14 and 21.3.10. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Oracle Java SE, Oracle GraalVM Enterprise Edition. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.1 Base Score 3.7 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L)."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Vulnerabilidad en el producto Oracle Java SE, Oracle GraalVM Enterprise Edition de Oracle Java SE (componente: Concurrencia). Las versiones compatibles que se ven afectadas son Oracle Java SE: 8u411, 8u411-perf, 11.0.23; Oracle GraalVM Enterprise Edition: 20.3.14 y 21.3.10. Una vulnerabilidad dif\u00edcil de explotar permite que un atacante no autenticado con acceso a la red a trav\u00e9s de m\u00faltiples protocolos comprometa Oracle Java SE, Oracle GraalVM Enterprise Edition. Los ataques exitosos de esta vulnerabilidad pueden resultar en una capacidad no autorizada para causar una denegaci\u00f3n de servicio parcial (DOS parcial) de Oracle Java SE, Oracle GraalVM Enterprise Edition. Nota: Esta vulnerabilidad se aplica a implementaciones de Java, generalmente en clientes que ejecutan aplicaciones Java Web Start en espacio aislado o subprogramas de Java en espacio aislado, que cargan y ejecutan c\u00f3digo que no es de confianza (por ejemplo, c\u00f3digo que proviene de Internet) y dependen del entorno limitado de Java para su seguridad. Esta vulnerabilidad no se aplica a implementaciones de Java, normalmente en servidores, que cargan y ejecutan s\u00f3lo c\u00f3digo confiable (por ejemplo, c\u00f3digo instalado por un administrador). CVSS 3.1 Puntuaci\u00f3n base 3.7 (impactos en la disponibilidad). Vector CVSS: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L)."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
@ -36,6 +40,10 @@
|
||||
]
|
||||
},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://security.netapp.com/advisory/ntap-20240719-0007/",
|
||||
"source": "secalert_us@oracle.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com/security-alerts/cpujul2024.html",
|
||||
"source": "secalert_us@oracle.com"
|
||||
|
@ -2,13 +2,17 @@
|
||||
"id": "CVE-2024-21145",
|
||||
"sourceIdentifier": "secalert_us@oracle.com",
|
||||
"published": "2024-07-16T23:15:15.993",
|
||||
"lastModified": "2024-07-17T13:34:20.520",
|
||||
"lastModified": "2024-07-19T14:15:05.580",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Vulnerability in the Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: 2D). Supported versions that are affected are Oracle Java SE: 8u411, 8u411-perf, 11.0.23, 17.0.11, 21.0.3, 22.0.1; Oracle GraalVM for JDK: 17.0.11, 21.0.3, 22.0.1; Oracle GraalVM Enterprise Edition: 20.3.14 and 21.3.10. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition accessible data as well as unauthorized read access to a subset of Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability can be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. This vulnerability also applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. CVSS 3.1 Base Score 4.8 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N)."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Vulnerabilidad en el producto Oracle Java SE, Oracle GraalVM para JDK, Oracle GraalVM Enterprise Edition de Oracle Java SE (componente: 2D). Las versiones compatibles que se ven afectadas son Oracle Java SE: 8u411, 8u411-perf, 11.0.23, 17.0.11, 21.0.3, 22.0.1; Oracle GraalVM para JDK: 17.0.11, 21.0.3, 22.0.1; Oracle GraalVM Enterprise Edition: 20.3.14 y 21.3.10. Una vulnerabilidad dif\u00edcil de explotar permite que un atacante no autenticado con acceso a la red a trav\u00e9s de m\u00faltiples protocolos comprometa Oracle Java SE, Oracle GraalVM para JDK y Oracle GraalVM Enterprise Edition. Los ataques exitosos de esta vulnerabilidad pueden resultar en acceso no autorizado a actualizaciones, inserci\u00f3n o eliminaci\u00f3n de algunos datos accesibles de Oracle Java SE, Oracle GraalVM para JDK, Oracle GraalVM Enterprise Edition, as\u00ed como acceso de lectura no autorizado a un subconjunto de Oracle Java SE, Oracle GraalVM para JDK, datos accesibles de Oracle GraalVM Enterprise Edition. Nota: Esta vulnerabilidad se puede aprovechar utilizando API en el componente especificado, por ejemplo, a trav\u00e9s de un servicio web que proporciona datos a las API. Esta vulnerabilidad tambi\u00e9n se aplica a las implementaciones de Java, normalmente en clientes que ejecutan aplicaciones Java Web Start en un espacio aislado o subprogramas de Java en un espacio aislado, que cargan y ejecutan c\u00f3digo que no es de confianza (por ejemplo, c\u00f3digo que proviene de Internet) y dependen del entorno limitado de Java para su seguridad. CVSS 3.1 Puntaje base 4.8 (Impactos en la confidencialidad y la integridad). Vector CVSS: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N)."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
@ -36,6 +40,10 @@
|
||||
]
|
||||
},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://security.netapp.com/advisory/ntap-20240719-0008/",
|
||||
"source": "secalert_us@oracle.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com/security-alerts/cpujul2024.html",
|
||||
"source": "secalert_us@oracle.com"
|
||||
|
@ -2,13 +2,17 @@
|
||||
"id": "CVE-2024-21147",
|
||||
"sourceIdentifier": "secalert_us@oracle.com",
|
||||
"published": "2024-07-16T23:15:16.377",
|
||||
"lastModified": "2024-07-17T13:34:20.520",
|
||||
"lastModified": "2024-07-19T14:15:05.667",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Vulnerability in the Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Hotspot). Supported versions that are affected are Oracle Java SE: 8u411, 8u411-perf, 11.0.23, 17.0.11, 21.0.3, 22.0.1; Oracle GraalVM for JDK: 17.0.11, 21.0.3, 22.0.1; Oracle GraalVM Enterprise Edition: 20.3.14 and 21.3.10. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition accessible data as well as unauthorized access to critical data or complete access to all Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability can be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. This vulnerability also applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. CVSS 3.1 Base Score 7.4 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N)."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Vulnerabilidad en el producto Oracle Java SE, Oracle GraalVM para JDK, Oracle GraalVM Enterprise Edition de Oracle Java SE (componente: Hotspot). Las versiones compatibles que se ven afectadas son Oracle Java SE: 8u411, 8u411-perf, 11.0.23, 17.0.11, 21.0.3, 22.0.1; Oracle GraalVM para JDK: 17.0.11, 21.0.3, 22.0.1; Oracle GraalVM Enterprise Edition: 20.3.14 y 21.3.10. Una vulnerabilidad dif\u00edcil de explotar permite que un atacante no autenticado con acceso a la red a trav\u00e9s de m\u00faltiples protocolos comprometa Oracle Java SE, Oracle GraalVM para JDK y Oracle GraalVM Enterprise Edition. Los ataques exitosos de esta vulnerabilidad pueden resultar en acceso no autorizado a la creaci\u00f3n, eliminaci\u00f3n o modificaci\u00f3n de datos cr\u00edticos o a todos los datos accesibles de Oracle Java SE, Oracle GraalVM para JDK, Oracle GraalVM Enterprise Edition, as\u00ed como acceso no autorizado a datos cr\u00edticos o acceso completo a todo Oracle Java. SE, Oracle GraalVM para JDK, datos accesibles de Oracle GraalVM Enterprise Edition. Nota: Esta vulnerabilidad se puede aprovechar utilizando API en el componente especificado, por ejemplo, a trav\u00e9s de un servicio web que proporciona datos a las API. Esta vulnerabilidad tambi\u00e9n se aplica a las implementaciones de Java, normalmente en clientes que ejecutan aplicaciones Java Web Start en un espacio aislado o subprogramas de Java en un espacio aislado, que cargan y ejecutan c\u00f3digo que no es de confianza (por ejemplo, c\u00f3digo que proviene de Internet) y dependen del entorno limitado de Java para su seguridad. CVSS 3.1 Puntaje base 7.4 (Impactos en la confidencialidad y la integridad). Vector CVSS: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N)."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
@ -36,6 +40,10 @@
|
||||
]
|
||||
},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://security.netapp.com/advisory/ntap-20240719-0008/",
|
||||
"source": "secalert_us@oracle.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com/security-alerts/cpujul2024.html",
|
||||
"source": "secalert_us@oracle.com"
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-22018",
|
||||
"sourceIdentifier": "support@hackerone.com",
|
||||
"published": "2024-07-10T02:15:03.160",
|
||||
"lastModified": "2024-07-11T19:15:11.303",
|
||||
"lastModified": "2024-07-19T14:15:05.763",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -44,6 +44,10 @@
|
||||
"url": "http://www.openwall.com/lists/oss-security/2024/07/11/6",
|
||||
"source": "support@hackerone.com"
|
||||
},
|
||||
{
|
||||
"url": "http://www.openwall.com/lists/oss-security/2024/07/19/3",
|
||||
"source": "support@hackerone.com"
|
||||
},
|
||||
{
|
||||
"url": "https://hackerone.com/reports/2145862",
|
||||
"source": "support@hackerone.com"
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-22020",
|
||||
"sourceIdentifier": "support@hackerone.com",
|
||||
"published": "2024-07-09T02:15:09.973",
|
||||
"lastModified": "2024-07-11T19:15:11.407",
|
||||
"lastModified": "2024-07-19T14:15:05.863",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -56,6 +56,10 @@
|
||||
"url": "http://www.openwall.com/lists/oss-security/2024/07/11/6",
|
||||
"source": "support@hackerone.com"
|
||||
},
|
||||
{
|
||||
"url": "http://www.openwall.com/lists/oss-security/2024/07/19/3",
|
||||
"source": "support@hackerone.com"
|
||||
},
|
||||
{
|
||||
"url": "https://hackerone.com/reports/2092749",
|
||||
"source": "support@hackerone.com"
|
||||
|
25
CVE-2024/CVE-2024-274xx/CVE-2024-27489.json
Normal file
25
CVE-2024/CVE-2024-274xx/CVE-2024-27489.json
Normal file
@ -0,0 +1,25 @@
|
||||
{
|
||||
"id": "CVE-2024-27489",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-07-19T15:15:10.210",
|
||||
"lastModified": "2024-07-19T15:15:10.210",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "An issue in the DelFile() function of WMCMS v4.4 allows attackers to delete arbitrary files via a crafted POST request."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://gist.github.com/yyyyy7777777/a36541cb60d9e55628f78f2a68968212",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://gitee.com/y1336247431/poc-public/issues/I920OW",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-35328",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-06-13T16:15:11.037",
|
||||
"lastModified": "2024-06-13T18:35:19.777",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-07-19T15:25:50.030",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -15,11 +15,66 @@
|
||||
"value": "libyaml v0.2.5 es vulnerable a DDOS. La funci\u00f3n yaml_parser_parse del archivo /src/libyaml/src/parser.c es afectada por esta vulnerabilidad."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 7.5,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-835"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:pyyaml:libyaml:0.2.5:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "A6BEAEF3-43E6-4FD6-8A52-C73530C631E9"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/idhyt/pocs/blob/main/libyaml/CVE-2024-35328.c",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Exploit"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-37474",
|
||||
"sourceIdentifier": "audit@patchstack.com",
|
||||
"published": "2024-07-04T19:15:10.790",
|
||||
"lastModified": "2024-07-05T12:55:51.367",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-07-19T15:34:49.460",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -17,6 +17,26 @@
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 5.4,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.3,
|
||||
"impactScore": 2.7
|
||||
},
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Secondary",
|
||||
@ -39,10 +59,43 @@
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:automattic:newspack:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "1.47.2",
|
||||
"matchCriteriaId": "2966F72A-C5ED-4E67-A588-F50DCAC946F7"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://patchstack.com/database/vulnerability/newspack-ads/wordpress-newspack-ads-plugin-1-47-1-cross-site-scripting-xss-vulnerability?_s_id=cve",
|
||||
"source": "audit@patchstack.com"
|
||||
"source": "audit@patchstack.com",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-37802",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-06-18T17:15:52.133",
|
||||
"lastModified": "2024-07-03T02:04:46.857",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2024-07-19T14:52:41.287",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -17,6 +17,26 @@
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 8.8,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 5.9
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
@ -40,6 +60,16 @@
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-89"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
@ -51,14 +81,38 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:health_care_hospital_management_system_project:health_care_hospital_management_system:1.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "BD74EE23-7D08-4E89-B9C8-32ABE39D428F"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://code-projects.org/health-care-hospital-in-php-css-js-and-mysql-free-download/",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Product"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/SandeepRajauriya/CVEs/blob/main/CVE-2024-37802",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-37882",
|
||||
"sourceIdentifier": "security-advisories@github.com",
|
||||
"published": "2024-06-14T16:15:12.863",
|
||||
"lastModified": "2024-06-17T12:42:04.623",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-07-19T14:57:28.583",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -17,6 +17,26 @@
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 8.1,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 5.2
|
||||
},
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Secondary",
|
||||
@ -40,6 +60,16 @@
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-281"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Secondary",
|
||||
@ -51,18 +81,112 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:nextcloud:nextcloud_server:*:*:*:*:-:*:*:*",
|
||||
"versionStartIncluding": "26.0.0",
|
||||
"versionEndExcluding": "26.0.13",
|
||||
"matchCriteriaId": "8F643317-2586-435E-8D89-721BC6161691"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:nextcloud:nextcloud_server:*:*:*:*:-:*:*:*",
|
||||
"versionStartIncluding": "27.0.0",
|
||||
"versionEndExcluding": "27.1.8",
|
||||
"matchCriteriaId": "8696DA00-5B0C-45F5-BD50-9FF1F5E4646F"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:nextcloud:nextcloud_server:*:*:*:*:-:*:*:*",
|
||||
"versionStartIncluding": "28.0.0",
|
||||
"versionEndExcluding": "28.0.4",
|
||||
"matchCriteriaId": "C3A816F7-5D5E-43CB-9C53-E4C5B1344C84"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:nextcloud:nextcloud_server:*:*:*:*:enterprise:*:*:*",
|
||||
"versionStartIncluding": "23.0.0",
|
||||
"versionEndExcluding": "23.0.12.17",
|
||||
"matchCriteriaId": "ED4378AE-1AD4-4E15-A64C-E4028FCD098F"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:nextcloud:nextcloud_server:*:*:*:*:enterprise:*:*:*",
|
||||
"versionStartIncluding": "24.0.0",
|
||||
"versionEndExcluding": "24.0.12.13",
|
||||
"matchCriteriaId": "20A172FB-2E26-4ADD-BA55-0ECC5E5FCFD1"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:nextcloud:nextcloud_server:*:*:*:*:enterprise:*:*:*",
|
||||
"versionStartIncluding": "25.0.0",
|
||||
"versionEndExcluding": "25.0.13.8",
|
||||
"matchCriteriaId": "7D2923A6-9A3C-4B66-82D4-E02A0E8F16A4"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:nextcloud:nextcloud_server:*:*:*:*:enterprise:*:*:*",
|
||||
"versionStartIncluding": "26.0.0",
|
||||
"versionEndExcluding": "26.0.13",
|
||||
"matchCriteriaId": "6909C63C-3755-4B68-B90E-4C5E14C78787"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:nextcloud:nextcloud_server:*:*:*:*:enterprise:*:*:*",
|
||||
"versionStartIncluding": "27.0.0",
|
||||
"versionEndExcluding": "27.1.8",
|
||||
"matchCriteriaId": "B6C25B03-B587-4F48-BE81-052AF67E2045"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:nextcloud:nextcloud_server:*:*:*:*:enterprise:*:*:*",
|
||||
"versionStartIncluding": "28.0.0",
|
||||
"versionEndExcluding": "28.0.4",
|
||||
"matchCriteriaId": "E04001FE-890B-4D94-B679-B0854E840F39"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-jjm3-j9xh-5xmq",
|
||||
"source": "security-advisories@github.com"
|
||||
"source": "security-advisories@github.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/nextcloud/server/pull/44339",
|
||||
"source": "security-advisories@github.com"
|
||||
"source": "security-advisories@github.com",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://hackerone.com/reports/2289425",
|
||||
"source": "security-advisories@github.com"
|
||||
"source": "security-advisories@github.com",
|
||||
"tags": [
|
||||
"Issue Tracking"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-37894",
|
||||
"sourceIdentifier": "security-advisories@github.com",
|
||||
"published": "2024-06-25T20:15:11.873",
|
||||
"lastModified": "2024-06-26T12:44:29.693",
|
||||
"lastModified": "2024-07-19T14:15:05.957",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -59,6 +59,10 @@
|
||||
{
|
||||
"url": "https://github.com/squid-cache/squid/security/advisories/GHSA-wgvf-q977-9xjg",
|
||||
"source": "security-advisories@github.com"
|
||||
},
|
||||
{
|
||||
"url": "https://security.netapp.com/advisory/ntap-20240719-0001/",
|
||||
"source": "security-advisories@github.com"
|
||||
}
|
||||
]
|
||||
}
|
21
CVE-2024/CVE-2024-399xx/CVE-2024-39962.json
Normal file
21
CVE-2024/CVE-2024-399xx/CVE-2024-39962.json
Normal file
@ -0,0 +1,21 @@
|
||||
{
|
||||
"id": "CVE-2024-39962",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-07-19T15:15:10.320",
|
||||
"lastModified": "2024-07-19T15:15:10.320",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "D-Link DIR-823X AX3000 Dual-Band Gigabit Wireless Router v21_D240126 was discovered to contain a remote code execution (RCE) vulnerability in the ntp_zone_val parameter at /goform/set_ntp. This vulnerability is exploited via a crafted HTTP request."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://gist.github.com/Swind1er/40c33f1b1549028677cb4e2e5ef69109",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
21
CVE-2024/CVE-2024-399xx/CVE-2024-39963.json
Normal file
21
CVE-2024/CVE-2024-399xx/CVE-2024-39963.json
Normal file
@ -0,0 +1,21 @@
|
||||
{
|
||||
"id": "CVE-2024-39963",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-07-19T15:15:10.383",
|
||||
"lastModified": "2024-07-19T15:15:10.383",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "AX3000 Dual-Band Gigabit Wi-Fi 6 Router AX9 V22.03.01.46 and AX3000 Dual-Band Gigabit Wi-Fi 6 Router AX12 V1.0 V22.03.01.46 were discovered to contain an authenticated remote command execution (RCE) vulnerability via the macFilterType parameter at /goform/setMacFilterCfg."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://gist.github.com/Swind1er/c8e4369c7fdfd750c8ad01a276105c57",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-40637",
|
||||
"sourceIdentifier": "security-advisories@github.com",
|
||||
"published": "2024-07-16T23:15:24.260",
|
||||
"lastModified": "2024-07-17T13:34:20.520",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-07-19T14:37:17.863",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -17,6 +17,26 @@
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 7.8,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 5.9
|
||||
},
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Secondary",
|
||||
@ -40,6 +60,16 @@
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-89"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Secondary",
|
||||
@ -51,38 +81,90 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:getdbt:dbt_core:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "1.6.14",
|
||||
"matchCriteriaId": "914D843B-54DC-45D0-ACC5-CA2EE99FE727"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:getdbt:dbt_core:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "1.7.0",
|
||||
"versionEndExcluding": "1.7.14",
|
||||
"matchCriteriaId": "9452C38F-FDF5-4F99-87A9-3C6DBBA031F2"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://docs.getdbt.com/docs/build/packages",
|
||||
"source": "security-advisories@github.com"
|
||||
"source": "security-advisories@github.com",
|
||||
"tags": [
|
||||
"Product"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://docs.getdbt.com/reference/global-configs/legacy-behaviors#behavior-change-flags",
|
||||
"source": "security-advisories@github.com"
|
||||
"source": "security-advisories@github.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/dbt-labs/dbt-core/commit/3c82a0296d227cb1be295356df314c11716f4ff6",
|
||||
"source": "security-advisories@github.com"
|
||||
"source": "security-advisories@github.com",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/dbt-labs/dbt-core/commit/87ac4deb00cc9fe334706e42a365903a1d581624",
|
||||
"source": "security-advisories@github.com"
|
||||
"source": "security-advisories@github.com",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/dbt-labs/dbt-core/security/advisories/GHSA-p3f3-5ccg-83xq",
|
||||
"source": "security-advisories@github.com"
|
||||
"source": "security-advisories@github.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://tempered.works/posts/2024/07/06/preventing-data-theft-with-gcp-service-controls",
|
||||
"source": "security-advisories@github.com"
|
||||
"source": "security-advisories@github.com",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://www.elementary-data.com/post/are-dbt-packages-secure-the-answer-lies-in-your-dwh-policies",
|
||||
"source": "security-advisories@github.com"
|
||||
"source": "security-advisories@github.com",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://www.equalexperts.com/blog/tech-focus/are-you-at-risk-from-this-critical-dbt-vulnerability",
|
||||
"source": "security-advisories@github.com"
|
||||
"source": "security-advisories@github.com",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-41009",
|
||||
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"published": "2024-07-17T07:15:01.973",
|
||||
"lastModified": "2024-07-17T13:34:20.520",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-07-19T15:06:23.827",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -15,23 +15,107 @@
|
||||
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: bpf: corrige el exceso de reservas en ringbuf. El b\u00fafer de anillo BPF se implementa internamente como un b\u00fafer circular de tama\u00f1o potencia de 2, con dos contadores l\u00f3gicos y en constante aumento: consumer_pos es el consumidor contador para mostrar en qu\u00e9 posici\u00f3n l\u00f3gica el consumidor consumi\u00f3 los datos, y productor_pos, que es el contador del productor que indica la cantidad de datos reservados por todos los productores. Cada vez que se reserva un registro, el productor \"due\u00f1o\" del registro avanzar\u00e1 exitosamente el contador de productores. En el espacio de usuario, cada vez que se lee un registro, el consumidor de los datos avanza el contador del consumidor una vez que finaliza el procesamiento. Ambos contadores se almacenan en p\u00e1ginas separadas de modo que, desde el espacio del usuario, el contador del productor sea de solo lectura y el contador del consumidor sea de lectura y escritura. Un aspecto que simplifica y, por lo tanto, acelera la implementaci\u00f3n tanto de productores como de consumidores es c\u00f3mo el \u00e1rea de datos se mapea dos veces de forma contigua y consecutiva en la memoria virtual, lo que permite no tomar medidas especiales para las muestras que tienen que envolverse en el mismo lugar. al final del \u00e1rea de datos del b\u00fafer circular, porque la p\u00e1gina siguiente despu\u00e9s de la \u00faltima p\u00e1gina de datos volver\u00eda a ser la primera p\u00e1gina de datos y, por lo tanto, la muestra seguir\u00e1 apareciendo completamente contigua en la memoria virtual. Cada registro tiene una estructura bpf_ringbuf_hdr { u32 len; u32 p\u00e1gina_apagada; } encabezado para la contabilidad de la longitud y el desplazamiento, y es inaccesible para el programa BPF. Ayudantes como bpf_ringbuf_reserve() devuelven `(void *)hdr + BPF_RINGBUF_HDR_SZ` para que lo use el programa BPF. Bing-Jhong y Muhammad informaron que, sin embargo, es posible hacer que un segundo fragmento de memoria asignado se superponga con el primer fragmento y, como resultado, el programa BPF ahora puede editar el encabezado del primer fragmento. Por ejemplo, considere la creaci\u00f3n de un mapa BPF_MAP_TYPE_RINGBUF con un tama\u00f1o de 0x4000. A continuaci\u00f3n, consumer_pos se modifica a 0x3000 /antes/ se realiza una llamada a bpf_ringbuf_reserve(). Esto asignar\u00e1 un fragmento A, que est\u00e1 en [0x0,0x3008], y el programa BPF podr\u00e1 editar [0x8,0x3008]. Ahora, asignemos un fragmento B con tama\u00f1o 0x3000. Esto tendr\u00e1 \u00e9xito porque consumer_pos se edit\u00f3 con anticipaci\u00f3n para pasar la verificaci\u00f3n `new_prod_pos - cons_pos > rb->mask`. El fragmento B estar\u00e1 en el rango [0x3008,0x6010] y el programa BPF podr\u00e1 editar [0x3010,0x6010]. Debido al dise\u00f1o de la memoria del b\u00fafer en anillo mencionado anteriormente, los rangos [0x0,0x4000] y [0x4000,0x8000] apuntan a las mismas p\u00e1ginas de datos. Esto significa que el fragmento B en [0x4000,0x4008] es el encabezado del fragmento A. bpf_ringbuf_submit() / bpf_ringbuf_discard() usa el pg_off del encabezado para luego ubicar el bpf_ringbuf a trav\u00e9s de bpf_ringbuf_restore_from_rec(). Una vez que el fragmento B modific\u00f3 el encabezado del fragmento A, bpf_ringbuf_commit() hace referencia a la p\u00e1gina incorrecta y podr\u00eda causar un bloqueo. Solucionelo calculando el pendiente_pos m\u00e1s antiguo y verifique si el rango desde el registro pendiente m\u00e1s antiguo hasta el m\u00e1s nuevo abarcar\u00eda m\u00e1s all\u00e1 del tama\u00f1o del b\u00fafer circular. Si ese es el caso, rechace la solicitud. Hemos probado con el punto de referencia del b\u00fafer de anillo en las autopruebas de BPF (./benchs/run_bench_ringbufs.sh) antes/despu\u00e9s de la correcci\u00f3n y, aunque parece un poco m\u00e1s lento en algunos puntos de referencia, todav\u00eda no es lo suficientemente significativo como para importar."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 5.5,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-770"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "5.8",
|
||||
"versionEndExcluding": "6.1.97",
|
||||
"matchCriteriaId": "5F2E2CF9-E512-4F81-AD6C-400701BDBF04"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "6.2",
|
||||
"versionEndExcluding": "6.6.37",
|
||||
"matchCriteriaId": "D72E033B-5323-4C4D-8818-36E1EBC3535F"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "6.7",
|
||||
"versionEndExcluding": "6.9.8",
|
||||
"matchCriteriaId": "E95105F2-32E3-4C5F-9D18-7AEFD0E6275C"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/47416c852f2a04d348ea66ee451cbdcf8119f225",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Mailing List",
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/511804ab701c0503b72eac08217eabfd366ba069",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Mailing List",
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/cfa1a2329a691ffd991fcf7248a57d752e712881",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Mailing List",
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/d1b9df0435bc61e0b44f578846516df8ef476686",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Mailing List",
|
||||
"Patch"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-41010",
|
||||
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"published": "2024-07-17T07:15:02.183",
|
||||
"lastModified": "2024-07-18T12:15:03.453",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2024-07-19T15:24:59.137",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -15,19 +15,92 @@
|
||||
"value": "En el kernel de Linux, se resolvi\u00f3 la siguiente vulnerabilidad: bpf: Se solucion\u00f3 el lanzamiento demasiado temprano de tcx_entry Pedro Pinto y m\u00e1s tarde, de forma independiente, tambi\u00e9n Hyunwoo Kim y Wongi Lee informaron un problema por el cual tcx_entry se puede lanzar demasiado pronto, lo que lleva a un uso posterior a la liberaci\u00f3n (UAF ) cuando una qdisc ingress o clsact antigua activa con un bloque tc compartido se reemplaza posteriormente por otra instancia de ingress o clsact. Esencialmente, la secuencia para activar la UAF (un ejemplo) puede ser la siguiente: 1. Se crea un espacio de nombres de red. 2. Se crea una qdisc de entrada. Esto asigna un tcx_entry, y &tcx_entry->miniq se almacena en el miniqp->p_miniq de la qdisc. Al mismo tiempo, se crea un bloque tcf con \u00edndice 1. 3. chain0 est\u00e1 adjunta al bloque tcf. chain0 debe estar conectado al bloque vinculado a la qdisc de ingreso para luego llegar a la funci\u00f3n tcf_chain0_head_change_cb_del() que activa la UAF. 4. Cree e injerte una qdisc clsact. Esto hace que se elimine la qdisc de entrada creada en el paso 1, liberando as\u00ed la tcx_entry previamente vinculada: rtnetlink_rcv_msg() => tc_modify_qdisc() => qdisc_create() => clsact_init() [a] => qdisc_graft() => qdisc_destroy( ) => __qdisc_destroy() => ingress_destroy() [b] => tcx_entry_free() => kfree_rcu() // tcx_entry liberado 5. Finalmente, se cierra el espacio de nombres de la red. Esto registra el trabajador cleanup_net y, durante el proceso de liberaci\u00f3n de la qdisc clsact restante, accede a tcx_entry que ya se liber\u00f3 en el paso 4, lo que provoca que se produzca la UAF: cleanup_net() => ops_exit_list() => default_device_exit_batch() => unregister_netdevice_many() => unregister_netdevice_many_notify() => dev_shutdown() => qdisc_put() => clsact_destroy() [c] => tcf_block_put_ext() => tcf_chain0_head_change_cb_del() => tcf_chain_head_change_item() => clsact_chain_head_change() => mini_qdisc_pair _intercambiar( ) // UAF Tambi\u00e9n hay otras variantes, lo esencial es agregar una qdisc de ingreso (o clsact) con un bloque compartido espec\u00edfico, luego reemplazar esa qdisc, esperar a que se ejecute tcx_entry kfree_rcu() y posteriormente acceder al activo actual miniq de qdisc de una forma u otra. La soluci\u00f3n correcta es convertir el booleano miniq_active en un contador. Lo que se puede observar, en el paso 2 anterior, el contador pasa de 0->1, en el paso [a] de 1->2 (para que el objeto miniq permanezca activo durante el reemplazo), luego en [b] de 2->1 y finalmente [c] 1->0 con el eventual lanzamiento. El contador de referencia en general oscila entre [0,2] y no necesita ser at\u00f3mico ya que todo acceso al contador est\u00e1 protegido por el mutex rtnl. Con esto implementado, ya no ocurre ning\u00fan UAF y tcx_entry se libera en el momento correcto."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 5.5,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-416"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "6.6",
|
||||
"versionEndExcluding": "6.6.41",
|
||||
"matchCriteriaId": "BBD7DB8F-6881-4008-B9ED-5588CD8061D9"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "6.7",
|
||||
"versionEndExcluding": "6.9.10",
|
||||
"matchCriteriaId": "AB2E8DEC-CFD5-4C2B-981D-E7E45A36C352"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/1cb6f0bae50441f4b4b32a28315853b279c7404e",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Mailing List",
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/230bb13650b0f186f540500fd5f5f7096a822a2a",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Mailing List",
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/f61ecf1bd5b562ebfd7d430ccb31619857e80857",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Mailing List",
|
||||
"Patch"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-41107",
|
||||
"sourceIdentifier": "security@apache.org",
|
||||
"published": "2024-07-19T11:15:03.323",
|
||||
"lastModified": "2024-07-19T13:01:44.567",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-07-19T14:15:06.080",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -25,6 +25,14 @@
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "http://www.openwall.com/lists/oss-security/2024/07/19/1",
|
||||
"source": "security@apache.org"
|
||||
},
|
||||
{
|
||||
"url": "http://www.openwall.com/lists/oss-security/2024/07/19/2",
|
||||
"source": "security@apache.org"
|
||||
},
|
||||
{
|
||||
"url": "https://cloudstack.apache.org/blog/security-release-advisory-cve-2024-41107",
|
||||
"source": "security@apache.org"
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-5251",
|
||||
"sourceIdentifier": "security@wordfence.com",
|
||||
"published": "2024-07-17T07:15:02.260",
|
||||
"lastModified": "2024-07-17T13:34:20.520",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-07-19T15:25:30.980",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -18,8 +18,28 @@
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security@wordfence.com",
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 5.4,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.3,
|
||||
"impactScore": 2.7
|
||||
},
|
||||
{
|
||||
"source": "security@wordfence.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N",
|
||||
@ -39,14 +59,50 @@
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:brainstormforce:ultimate_addons_for_wpbakery_page_builder:*:*:*:*:*:wordpress:*:*",
|
||||
"versionEndExcluding": "3.19.20.1",
|
||||
"matchCriteriaId": "E1A5EB88-A5D4-4596-957D-601BDC031A72"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://ultimate.brainstormforce.com/changelog/?utm_source=codecanyon-item-page&utm_campaign=uavc-changelog&utm_medium=changelog",
|
||||
"source": "security@wordfence.com"
|
||||
"source": "security@wordfence.com",
|
||||
"tags": [
|
||||
"Release Notes"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/e637044d-9b49-4de5-b8b8-d48a0e5e1afc?source=cve",
|
||||
"source": "security@wordfence.com"
|
||||
"source": "security@wordfence.com",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-5252",
|
||||
"sourceIdentifier": "security@wordfence.com",
|
||||
"published": "2024-07-17T07:15:02.483",
|
||||
"lastModified": "2024-07-17T13:34:20.520",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-07-19T15:29:35.447",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -17,6 +17,26 @@
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 5.4,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.3,
|
||||
"impactScore": 2.7
|
||||
},
|
||||
{
|
||||
"source": "security@wordfence.com",
|
||||
"type": "Secondary",
|
||||
@ -39,14 +59,50 @@
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:brainstormforce:ultimate_addons_for_wpbakery_page_builder:*:*:*:*:*:wordpress:*:*",
|
||||
"versionEndExcluding": "3.19.20.1",
|
||||
"matchCriteriaId": "E1A5EB88-A5D4-4596-957D-601BDC031A72"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://ultimate.brainstormforce.com/changelog/?utm_source=codecanyon-item-page&utm_campaign=uavc-changelog&utm_medium=changelog",
|
||||
"source": "security@wordfence.com"
|
||||
"source": "security@wordfence.com",
|
||||
"tags": [
|
||||
"Release Notes"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/675937dc-a032-4bc4-a449-c815fcb12db6?source=cve",
|
||||
"source": "security@wordfence.com"
|
||||
"source": "security@wordfence.com",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-5253",
|
||||
"sourceIdentifier": "security@wordfence.com",
|
||||
"published": "2024-07-17T07:15:02.690",
|
||||
"lastModified": "2024-07-17T13:34:20.520",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-07-19T15:30:34.717",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -18,8 +18,28 @@
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security@wordfence.com",
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 5.4,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.3,
|
||||
"impactScore": 2.7
|
||||
},
|
||||
{
|
||||
"source": "security@wordfence.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N",
|
||||
@ -39,14 +59,50 @@
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:brainstormforce:ultimate_addons_for_wpbakery_page_builder:*:*:*:*:*:wordpress:*:*",
|
||||
"versionEndExcluding": "3.19.20.1",
|
||||
"matchCriteriaId": "E1A5EB88-A5D4-4596-957D-601BDC031A72"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://ultimate.brainstormforce.com/changelog/?utm_source=codecanyon-item-page&utm_campaign=uavc-changelog&utm_medium=changelog",
|
||||
"source": "security@wordfence.com"
|
||||
"source": "security@wordfence.com",
|
||||
"tags": [
|
||||
"Release Notes"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/97666e54-8e86-4f18-ae32-ad8ca607aeff?source=cve",
|
||||
"source": "security@wordfence.com"
|
||||
"source": "security@wordfence.com",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-5254",
|
||||
"sourceIdentifier": "security@wordfence.com",
|
||||
"published": "2024-07-17T07:15:02.883",
|
||||
"lastModified": "2024-07-17T13:34:20.520",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-07-19T15:32:05.560",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -18,8 +18,28 @@
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security@wordfence.com",
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 5.4,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.3,
|
||||
"impactScore": 2.7
|
||||
},
|
||||
{
|
||||
"source": "security@wordfence.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N",
|
||||
@ -39,14 +59,50 @@
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:brainstormforce:ultimate_addons_for_wpbakery_page_builder:*:*:*:*:*:wordpress:*:*",
|
||||
"versionEndExcluding": "3.19.20.1",
|
||||
"matchCriteriaId": "E1A5EB88-A5D4-4596-957D-601BDC031A72"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://ultimate.brainstormforce.com/changelog/?utm_source=codecanyon-item-page&utm_campaign=uavc-changelog&utm_medium=changelog",
|
||||
"source": "security@wordfence.com"
|
||||
"source": "security@wordfence.com",
|
||||
"tags": [
|
||||
"Release Notes"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/4c8971e0-befd-47ac-8cb5-064f9cd757d7?source=cve",
|
||||
"source": "security@wordfence.com"
|
||||
"source": "security@wordfence.com",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-5255",
|
||||
"sourceIdentifier": "security@wordfence.com",
|
||||
"published": "2024-07-17T07:15:03.073",
|
||||
"lastModified": "2024-07-17T13:34:20.520",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-07-19T15:32:18.850",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -18,8 +18,28 @@
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security@wordfence.com",
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 5.4,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.3,
|
||||
"impactScore": 2.7
|
||||
},
|
||||
{
|
||||
"source": "security@wordfence.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N",
|
||||
@ -39,14 +59,50 @@
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:brainstormforce:ultimate_addons_for_wpbakery_page_builder:*:*:*:*:*:wordpress:*:*",
|
||||
"versionEndExcluding": "3.19.20.1",
|
||||
"matchCriteriaId": "E1A5EB88-A5D4-4596-957D-601BDC031A72"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://ultimate.brainstormforce.com/changelog/?utm_source=codecanyon-item-page&utm_campaign=uavc-changelog&utm_medium=changelog",
|
||||
"source": "security@wordfence.com"
|
||||
"source": "security@wordfence.com",
|
||||
"tags": [
|
||||
"Release Notes"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/66d77518-a258-4e79-b483-275855c0a416?source=cve",
|
||||
"source": "security@wordfence.com"
|
||||
"source": "security@wordfence.com",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-6008",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2024-06-15T15:15:51.033",
|
||||
"lastModified": "2024-06-17T16:15:16.140",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-07-19T14:52:08.110",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -61,6 +61,26 @@
|
||||
}
|
||||
],
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 8.8,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 5.9
|
||||
},
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
@ -120,22 +140,53 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:isourcecode:online_book_store_project_in_php_with_source_code:1.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "71AB5A7E-412A-4649-9E8D-465255D0757F"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/1902zdq/cve/issues/1",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Technical Description",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.268698",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Permissions Required"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.268698",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?submit.357143",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Issue Tracking"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-6009",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2024-06-15T16:15:09.830",
|
||||
"lastModified": "2024-06-17T12:42:04.623",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-07-19T14:24:41.657",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -61,6 +61,26 @@
|
||||
}
|
||||
],
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
},
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
@ -120,22 +140,53 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:itsourcecode:learning_management_system_project_in_php_with_source_code:1.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "AD4B5F22-F2E1-4DDB-ABEA-61B253FE76F6"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/AutoZhou1/cve/issues/1",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Technical Description",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.268699",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Permissions Required"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.268699",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?submit.357243",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Issue Tracking"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-6013",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2024-06-15T16:15:10.137",
|
||||
"lastModified": "2024-06-17T12:42:04.623",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-07-19T14:20:07.337",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -61,6 +61,26 @@
|
||||
}
|
||||
],
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
},
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
@ -120,22 +140,53 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:itsourcecode:online_book_store_project_in_php_and_mysql_with_source_code:1.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "7F4DCA80-C02C-4BE9-83EE-294CD8ECFDD1"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/gabriel202212/cve/issues/1",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Technical Description",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.268721",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Permissions Required"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.268721",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?submit.357075",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Issue Tracking"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-6014",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2024-06-15T17:15:49.100",
|
||||
"lastModified": "2024-06-17T12:42:04.623",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-07-19T14:18:17.607",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -61,6 +61,26 @@
|
||||
}
|
||||
],
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
},
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
@ -120,22 +140,53 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:itsourcecode:document_management_system_project_in_php_with_source_code:1.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "B896ED3E-BEFB-4226-9F2E-D703C9765BB1"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/gabriel202212/cve/issues/2",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Technical Description",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.268722",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Permissions Required"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.268722",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?submit.357246",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Issue Tracking"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-6015",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2024-06-15T17:15:49.403",
|
||||
"lastModified": "2024-06-17T15:15:52.830",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-07-19T14:13:10.463",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -61,6 +61,26 @@
|
||||
}
|
||||
],
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
},
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
@ -120,22 +140,53 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:itsourcecode:online_house_rental_system_project_in_php_with_source_code:1.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "83FB0E1D-9D4D-40F5-8326-94970698C31F"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/chenwulin-bit/cve/issues/1",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Technical Description",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.268723",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Permissions Required"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.268723",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?submit.357462",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Issue Tracking"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-6016",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2024-06-15T19:15:48.443",
|
||||
"lastModified": "2024-06-17T14:15:12.487",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-07-19T14:02:04.600",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -61,6 +61,26 @@
|
||||
}
|
||||
],
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
},
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
@ -120,22 +140,53 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:itsourcecode:laundry_management_system_project_in_php_with_source_code:1.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "9098A3E9-9903-45B9-8F93-8F55DD9FD767"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/chenwulin-bit/cve/issues/2",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Technical Description",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.268724",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Permissions Required"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.268724",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?submit.357463",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Issue Tracking"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-6033",
|
||||
"sourceIdentifier": "security@wordfence.com",
|
||||
"published": "2024-07-17T07:15:03.263",
|
||||
"lastModified": "2024-07-17T13:34:20.520",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-07-19T15:32:49.507",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -39,18 +39,57 @@
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-862"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:themewinter:eventin:*:*:*:*:*:wordpress:*:*",
|
||||
"versionEndExcluding": "4.0.5",
|
||||
"matchCriteriaId": "2649BF6F-6AE1-457C-BDD2-8BE619A86541"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/browser/wp-event-solution/trunk/core/admin/hooks.php#L135",
|
||||
"source": "security@wordfence.com"
|
||||
"source": "security@wordfence.com",
|
||||
"tags": [
|
||||
"Product"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/changeset/3117477/",
|
||||
"source": "security@wordfence.com"
|
||||
"source": "security@wordfence.com",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/1725c7f3-2fac-4714-a63e-6c43694483fc?source=cve",
|
||||
"source": "security@wordfence.com"
|
||||
"source": "security@wordfence.com",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-6467",
|
||||
"sourceIdentifier": "security@wordfence.com",
|
||||
"published": "2024-07-17T07:15:03.493",
|
||||
"lastModified": "2024-07-17T13:34:20.520",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-07-19T15:37:51.067",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -39,14 +39,50 @@
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "NVD-CWE-noinfo"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:reputeinfosystems:bookingpress:*:*:*:*:*:wordpress:*:*",
|
||||
"versionEndExcluding": "1.1.6",
|
||||
"matchCriteriaId": "A8CF2DD1-8A61-44C8-9AC4-F0AE958530BE"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/changeset/3116857/bookingpress-appointment-booking/trunk/core/classes/class.bookingpress.php",
|
||||
"source": "security@wordfence.com"
|
||||
"source": "security@wordfence.com",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/d0177510-cd7d-4cc5-96c3-78433aa0e3f6?source=cve",
|
||||
"source": "security@wordfence.com"
|
||||
"source": "security@wordfence.com",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-6535",
|
||||
"sourceIdentifier": "secalert@redhat.com",
|
||||
"published": "2024-07-17T03:15:01.890",
|
||||
"lastModified": "2024-07-17T13:34:20.520",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-07-19T15:00:32.153",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -17,6 +17,26 @@
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 5.3,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 1.4
|
||||
},
|
||||
{
|
||||
"source": "secalert@redhat.com",
|
||||
"type": "Secondary",
|
||||
@ -41,8 +61,18 @@
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "secalert@redhat.com",
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-287"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "secalert@redhat.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -51,14 +81,37 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:redhat:service_interconnect:1.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "12B0CF2B-D1E1-4E20-846E-6F0D873499A9"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://access.redhat.com/security/cve/CVE-2024-6535",
|
||||
"source": "secalert@redhat.com"
|
||||
"source": "secalert@redhat.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2296024",
|
||||
"source": "secalert@redhat.com"
|
||||
"source": "secalert@redhat.com",
|
||||
"tags": [
|
||||
"Issue Tracking"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-6595",
|
||||
"sourceIdentifier": "cve@gitlab.com",
|
||||
"published": "2024-07-17T02:15:10.130",
|
||||
"lastModified": "2024-07-17T13:34:20.520",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-07-19T14:52:54.943",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -17,6 +17,26 @@
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 5.3,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 1.4
|
||||
},
|
||||
{
|
||||
"source": "cve@gitlab.com",
|
||||
"type": "Secondary",
|
||||
@ -40,6 +60,16 @@
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-434"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "cve@gitlab.com",
|
||||
"type": "Secondary",
|
||||
@ -51,14 +81,75 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:gitlab:gitlab:*:*:*:*:community:*:*:*",
|
||||
"versionStartIncluding": "11.8.0",
|
||||
"versionEndExcluding": "16.11.6",
|
||||
"matchCriteriaId": "67B15D59-0B7C-46F9-80D8-CBD123B54E1D"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:gitlab:gitlab:*:*:*:*:enterprise:*:*:*",
|
||||
"versionStartIncluding": "11.8.0",
|
||||
"versionEndExcluding": "16.11.6",
|
||||
"matchCriteriaId": "BABDAF38-D90B-42A5-BACC-5565A4ADBEF6"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:gitlab:gitlab:*:*:*:*:community:*:*:*",
|
||||
"versionStartIncluding": "17.0.0",
|
||||
"versionEndExcluding": "17.0.4",
|
||||
"matchCriteriaId": "C7412902-D4C7-4172-BE56-8D4677226D96"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:gitlab:gitlab:*:*:*:*:enterprise:*:*:*",
|
||||
"versionStartIncluding": "17.0.0",
|
||||
"versionEndExcluding": "17.0.4",
|
||||
"matchCriteriaId": "12CB9371-7540-4483-A3EE-061ACAF47067"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:gitlab:gitlab:*:*:*:*:community:*:*:*",
|
||||
"versionStartIncluding": "17.1.0",
|
||||
"versionEndExcluding": "17.1.2",
|
||||
"matchCriteriaId": "45878C42-2DC4-4A09-ADA6-80BCCCF35DDA"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:gitlab:gitlab:*:*:*:*:enterprise:*:*:*",
|
||||
"versionStartIncluding": "17.1.0",
|
||||
"versionEndExcluding": "17.1.2",
|
||||
"matchCriteriaId": "19C3FE9A-BACE-4750-A2C9-E43B7E824711"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://blog.vlt.sh/blog/the-massive-hole-in-the-npm-ecosystem",
|
||||
"source": "cve@gitlab.com"
|
||||
"source": "cve@gitlab.com",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://gitlab.com/gitlab-org/gitlab/-/issues/417975",
|
||||
"source": "cve@gitlab.com"
|
||||
"source": "cve@gitlab.com",
|
||||
"tags": [
|
||||
"Issue Tracking"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-6660",
|
||||
"sourceIdentifier": "security@wordfence.com",
|
||||
"published": "2024-07-17T07:15:03.683",
|
||||
"lastModified": "2024-07-17T13:34:20.520",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-07-19T15:48:14.040",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -39,26 +39,71 @@
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-862"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:reputeinfosystems:bookingpress:*:*:*:*:*:wordpress:*:*",
|
||||
"versionEndExcluding": "1.1.6",
|
||||
"matchCriteriaId": "A8CF2DD1-8A61-44C8-9AC4-F0AE958530BE"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/browser/bookingpress-appointment-booking/trunk/core/classes/class.bookingpress_import_export.php#L1491",
|
||||
"source": "security@wordfence.com"
|
||||
"source": "security@wordfence.com",
|
||||
"tags": [
|
||||
"Product"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/browser/bookingpress-appointment-booking/trunk/core/classes/class.bookingpress_import_export.php#L410",
|
||||
"source": "security@wordfence.com"
|
||||
"source": "security@wordfence.com",
|
||||
"tags": [
|
||||
"Product"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/browser/bookingpress-appointment-booking/trunk/core/classes/class.bookingpress_import_export.php#L476",
|
||||
"source": "security@wordfence.com"
|
||||
"source": "security@wordfence.com",
|
||||
"tags": [
|
||||
"Product"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/changeset/3116857/bookingpress-appointment-booking/trunk/core/classes/class.bookingpress_import_export.php?contextall=1",
|
||||
"source": "security@wordfence.com"
|
||||
"source": "security@wordfence.com",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/851ff861-474e-4063-88ff-d8d35b10e9a0?source=cve",
|
||||
"source": "security@wordfence.com"
|
||||
"source": "security@wordfence.com",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-6669",
|
||||
"sourceIdentifier": "security@wordfence.com",
|
||||
"published": "2024-07-17T07:15:03.873",
|
||||
"lastModified": "2024-07-17T13:34:20.520",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-07-19T15:56:47.190",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -18,8 +18,28 @@
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security@wordfence.com",
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "HIGH",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 4.8,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 1.7,
|
||||
"impactScore": 2.7
|
||||
},
|
||||
{
|
||||
"source": "security@wordfence.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:L/I:L/A:N",
|
||||
@ -39,26 +59,71 @@
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:quantumcloud:ai_chatbot:*:*:*:*:*:wordpress:*:*",
|
||||
"versionEndExcluding": "5.5.8",
|
||||
"matchCriteriaId": "991EF6A7-AD8D-4148-9BBE-3D5EEBC82E4A"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/browser/chatbot/trunk/admin_ui.php#L2211",
|
||||
"source": "security@wordfence.com"
|
||||
"source": "security@wordfence.com",
|
||||
"tags": [
|
||||
"Product"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/browser/chatbot/trunk/admin_ui.php#L755",
|
||||
"source": "security@wordfence.com"
|
||||
"source": "security@wordfence.com",
|
||||
"tags": [
|
||||
"Product"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/changeset/3119022/",
|
||||
"source": "security@wordfence.com"
|
||||
"source": "security@wordfence.com",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://wordpress.org/plugins/chatbot/#developers",
|
||||
"source": "security@wordfence.com"
|
||||
"source": "security@wordfence.com",
|
||||
"tags": [
|
||||
"Release Notes"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/ce23efed-fe21-486a-ab3b-9ed0dd26a971?source=cve",
|
||||
"source": "security@wordfence.com"
|
||||
"source": "security@wordfence.com",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-6801",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2024-07-17T02:15:10.367",
|
||||
"lastModified": "2024-07-17T13:34:20.520",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-07-19T14:55:25.753",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -61,6 +61,26 @@
|
||||
}
|
||||
],
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
},
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
@ -120,22 +140,54 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:online_student_management_system_project:online_student_management_system:1.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "422F2579-A688-4D6E-97D2-873C5BCABFD8"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/aaajuna/demo/issues/1",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.271703",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Permissions Required"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.271703",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?submit.374774",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-6802",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2024-07-17T02:15:10.780",
|
||||
"lastModified": "2024-07-17T13:34:20.520",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-07-19T14:58:12.707",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -61,6 +61,26 @@
|
||||
}
|
||||
],
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
},
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
@ -120,22 +140,57 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:computer_laboratory_management_system_project:computer_laboratory_management_system:1.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "2F90DE9D-E1E0-40CF-91E5-B93DFA487DBD"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://reports-kunull.vercel.app/CVE%20research/computer-laboratory-management-system-save_record",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Broken Link"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.271704",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Permissions Required",
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.271704",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Permissions Required",
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?submit.374797",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-6803",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2024-07-17T03:15:02.130",
|
||||
"lastModified": "2024-07-17T13:34:20.520",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-07-19T15:01:50.250",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -61,6 +61,26 @@
|
||||
}
|
||||
],
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
},
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
@ -120,22 +140,55 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:document_management_system_project:document_management_system:1.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "120BA9C1-F846-4761-B02A-2880FDD0D36C"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/hzy11111111/cve/issues/3",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Issue Tracking",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.271705",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Permissions Required"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.271705",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?submit.374809",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-6807",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2024-07-17T04:15:02.720",
|
||||
"lastModified": "2024-07-17T13:34:20.520",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-07-19T15:03:08.933",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -61,6 +61,26 @@
|
||||
}
|
||||
],
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:N/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 4.1,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.3,
|
||||
"impactScore": 1.4
|
||||
},
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
@ -120,22 +140,54 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:student_study_center_desk_management_system_project:student_study_center_desk_management_system:1.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "5A7F67EA-5AEE-4BE7-8EB3-F5C2FFDC5344"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://reports-kunull.vercel.app/CVE%20research/student-study-center-desk-management-system-xss-firstname",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Broken Link"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.271706",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Permissions Required"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.271706",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?submit.374853",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-6808",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2024-07-17T04:15:03.320",
|
||||
"lastModified": "2024-07-18T16:15:08.300",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2024-07-19T15:04:43.837",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -61,6 +61,26 @@
|
||||
}
|
||||
],
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
},
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
@ -120,22 +140,55 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:code-projects:simple_task_list:1.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "B691815C-6D04-44C0-9DB6-B189933EFC52"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/qianqiusujiu/cve/issues/1",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Issue Tracking",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.271707",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Permissions Required"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.271707",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?submit.375154",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
78
CVE-2024/CVE-2024-68xx/CVE-2024-6895.json
Normal file
78
CVE-2024/CVE-2024-68xx/CVE-2024-6895.json
Normal file
@ -0,0 +1,78 @@
|
||||
{
|
||||
"id": "CVE-2024-6895",
|
||||
"sourceIdentifier": "security@yugabyte.com",
|
||||
"published": "2024-07-19T15:15:10.547",
|
||||
"lastModified": "2024-07-19T15:15:10.547",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Insufficient authentication in user account management in Yugabyte Platform allows local network attackers with a compromised user session to change critical security information without re-authentication. An attacker with user session and access to application can modify settings such as password and email without being prompted for the current password, enabling account takeover."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV40": [
|
||||
{
|
||||
"source": "security@yugabyte.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "4.0",
|
||||
"vectorString": "CVSS:4.0/AV:A/AC:H/AT:N/PR:H/UI:P/VC:H/VI:L/VA:L/SC:H/SI:H/SA:H/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
|
||||
"attackVector": "ADJACENT",
|
||||
"attackComplexity": "HIGH",
|
||||
"attackRequirements": "NONE",
|
||||
"privilegesRequired": "HIGH",
|
||||
"userInteraction": "PASSIVE",
|
||||
"vulnerableSystemConfidentiality": "HIGH",
|
||||
"vulnerableSystemIntegrity": "LOW",
|
||||
"vulnerableSystemAvailability": "LOW",
|
||||
"subsequentSystemConfidentiality": "HIGH",
|
||||
"subsequentSystemIntegrity": "HIGH",
|
||||
"subsequentSystemAvailability": "HIGH",
|
||||
"exploitMaturity": "NOT_DEFINED",
|
||||
"confidentialityRequirements": "NOT_DEFINED",
|
||||
"integrityRequirements": "NOT_DEFINED",
|
||||
"availabilityRequirements": "NOT_DEFINED",
|
||||
"modifiedAttackVector": "NOT_DEFINED",
|
||||
"modifiedAttackComplexity": "NOT_DEFINED",
|
||||
"modifiedAttackRequirements": "NOT_DEFINED",
|
||||
"modifiedPrivilegesRequired": "NOT_DEFINED",
|
||||
"modifiedUserInteraction": "NOT_DEFINED",
|
||||
"modifiedVulnerableSystemConfidentiality": "NOT_DEFINED",
|
||||
"modifiedVulnerableSystemIntegrity": "NOT_DEFINED",
|
||||
"modifiedVulnerableSystemAvailability": "NOT_DEFINED",
|
||||
"modifiedSubsequentSystemConfidentiality": "NOT_DEFINED",
|
||||
"modifiedSubsequentSystemIntegrity": "NOT_DEFINED",
|
||||
"modifiedSubsequentSystemAvailability": "NOT_DEFINED",
|
||||
"safety": "NOT_DEFINED",
|
||||
"automatable": "NOT_DEFINED",
|
||||
"recovery": "NOT_DEFINED",
|
||||
"valueDensity": "NOT_DEFINED",
|
||||
"vulnerabilityResponseEffort": "NOT_DEFINED",
|
||||
"providerUrgency": "NOT_DEFINED",
|
||||
"baseScore": 6.1,
|
||||
"baseSeverity": "MEDIUM"
|
||||
}
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security@yugabyte.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-306"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/yugabyte/yugabyte-db/commit/9687371d8777f876285b737a9d01995bc46bafa5",
|
||||
"source": "security@yugabyte.com"
|
||||
}
|
||||
]
|
||||
}
|
82
CVE-2024/CVE-2024-69xx/CVE-2024-6908.json
Normal file
82
CVE-2024/CVE-2024-69xx/CVE-2024-6908.json
Normal file
@ -0,0 +1,82 @@
|
||||
{
|
||||
"id": "CVE-2024-6908",
|
||||
"sourceIdentifier": "security@yugabyte.com",
|
||||
"published": "2024-07-19T15:15:10.747",
|
||||
"lastModified": "2024-07-19T15:15:10.747",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Improper privilege management in Yugabyte Platform allows authenticated admin users to escalate privileges to SuperAdmin via a crafted PUT HTTP request, potentially leading to unauthorized access to sensitive system functions and data."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV40": [
|
||||
{
|
||||
"source": "security@yugabyte.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "4.0",
|
||||
"vectorString": "CVSS:4.0/AV:A/AC:L/AT:P/PR:H/UI:P/VC:L/VI:H/VA:N/SC:H/SI:H/SA:H/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
|
||||
"attackVector": "ADJACENT",
|
||||
"attackComplexity": "LOW",
|
||||
"attackRequirements": "PRESENT",
|
||||
"privilegesRequired": "HIGH",
|
||||
"userInteraction": "PASSIVE",
|
||||
"vulnerableSystemConfidentiality": "LOW",
|
||||
"vulnerableSystemIntegrity": "HIGH",
|
||||
"vulnerableSystemAvailability": "NONE",
|
||||
"subsequentSystemConfidentiality": "HIGH",
|
||||
"subsequentSystemIntegrity": "HIGH",
|
||||
"subsequentSystemAvailability": "HIGH",
|
||||
"exploitMaturity": "NOT_DEFINED",
|
||||
"confidentialityRequirements": "NOT_DEFINED",
|
||||
"integrityRequirements": "NOT_DEFINED",
|
||||
"availabilityRequirements": "NOT_DEFINED",
|
||||
"modifiedAttackVector": "NOT_DEFINED",
|
||||
"modifiedAttackComplexity": "NOT_DEFINED",
|
||||
"modifiedAttackRequirements": "NOT_DEFINED",
|
||||
"modifiedPrivilegesRequired": "NOT_DEFINED",
|
||||
"modifiedUserInteraction": "NOT_DEFINED",
|
||||
"modifiedVulnerableSystemConfidentiality": "NOT_DEFINED",
|
||||
"modifiedVulnerableSystemIntegrity": "NOT_DEFINED",
|
||||
"modifiedVulnerableSystemAvailability": "NOT_DEFINED",
|
||||
"modifiedSubsequentSystemConfidentiality": "NOT_DEFINED",
|
||||
"modifiedSubsequentSystemIntegrity": "NOT_DEFINED",
|
||||
"modifiedSubsequentSystemAvailability": "NOT_DEFINED",
|
||||
"safety": "NOT_DEFINED",
|
||||
"automatable": "NOT_DEFINED",
|
||||
"recovery": "NOT_DEFINED",
|
||||
"valueDensity": "NOT_DEFINED",
|
||||
"vulnerabilityResponseEffort": "NOT_DEFINED",
|
||||
"providerUrgency": "NOT_DEFINED",
|
||||
"baseScore": 6.0,
|
||||
"baseSeverity": "MEDIUM"
|
||||
}
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security@yugabyte.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-269"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/yugabyte/yugabyte-db/commit/03b193de40b79329439bb9968a7d27a1cc57d662",
|
||||
"source": "security@yugabyte.com"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/yugabyte/yugabyte-db/commit/68f01680c565be2a370cfb7734a1b3721d6778bb",
|
||||
"source": "security@yugabyte.com"
|
||||
}
|
||||
]
|
||||
}
|
67
README.md
67
README.md
@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours.
|
||||
### Last Repository Update
|
||||
|
||||
```plain
|
||||
2024-07-19T14:00:18.683832+00:00
|
||||
2024-07-19T16:00:18.490265+00:00
|
||||
```
|
||||
|
||||
### Most recent CVE Modification Timestamp synchronized with NVD
|
||||
|
||||
```plain
|
||||
2024-07-19T13:39:30.817000+00:00
|
||||
2024-07-19T15:56:47.190000+00:00
|
||||
```
|
||||
|
||||
### Last Data Feed Release
|
||||
@ -33,45 +33,50 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
|
||||
### Total Number of included CVEs
|
||||
|
||||
```plain
|
||||
257499
|
||||
257505
|
||||
```
|
||||
|
||||
### CVEs added in the last Commit
|
||||
|
||||
Recently added CVEs: `1`
|
||||
Recently added CVEs: `6`
|
||||
|
||||
- [CVE-2024-37066](CVE-2024/CVE-2024-370xx/CVE-2024-37066.json) (`2024-07-19T12:15:02.320`)
|
||||
- [CVE-2024-0006](CVE-2024/CVE-2024-00xx/CVE-2024-0006.json) (`2024-07-19T15:15:09.930`)
|
||||
- [CVE-2024-27489](CVE-2024/CVE-2024-274xx/CVE-2024-27489.json) (`2024-07-19T15:15:10.210`)
|
||||
- [CVE-2024-39962](CVE-2024/CVE-2024-399xx/CVE-2024-39962.json) (`2024-07-19T15:15:10.320`)
|
||||
- [CVE-2024-39963](CVE-2024/CVE-2024-399xx/CVE-2024-39963.json) (`2024-07-19T15:15:10.383`)
|
||||
- [CVE-2024-6895](CVE-2024/CVE-2024-68xx/CVE-2024-6895.json) (`2024-07-19T15:15:10.547`)
|
||||
- [CVE-2024-6908](CVE-2024/CVE-2024-69xx/CVE-2024-6908.json) (`2024-07-19T15:15:10.747`)
|
||||
|
||||
|
||||
### CVEs modified in the last Commit
|
||||
|
||||
Recently modified CVEs: `80`
|
||||
Recently modified CVEs: `44`
|
||||
|
||||
- [CVE-2024-41111](CVE-2024/CVE-2024-411xx/CVE-2024-41111.json) (`2024-07-19T13:01:44.567`)
|
||||
- [CVE-2024-41172](CVE-2024/CVE-2024-411xx/CVE-2024-41172.json) (`2024-07-19T13:01:44.567`)
|
||||
- [CVE-2024-5321](CVE-2024/CVE-2024-53xx/CVE-2024-5321.json) (`2024-07-19T13:01:44.567`)
|
||||
- [CVE-2024-5604](CVE-2024/CVE-2024-56xx/CVE-2024-5604.json) (`2024-07-19T13:01:44.567`)
|
||||
- [CVE-2024-5618](CVE-2024/CVE-2024-56xx/CVE-2024-5618.json) (`2024-07-19T13:01:44.567`)
|
||||
- [CVE-2024-5619](CVE-2024/CVE-2024-56xx/CVE-2024-5619.json) (`2024-07-19T13:01:44.567`)
|
||||
- [CVE-2024-5620](CVE-2024/CVE-2024-56xx/CVE-2024-5620.json) (`2024-07-19T13:01:44.567`)
|
||||
- [CVE-2024-5625](CVE-2024/CVE-2024-56xx/CVE-2024-5625.json) (`2024-07-19T13:01:44.567`)
|
||||
- [CVE-2024-5977](CVE-2024/CVE-2024-59xx/CVE-2024-5977.json) (`2024-07-19T13:01:44.567`)
|
||||
- [CVE-2024-5997](CVE-2024/CVE-2024-59xx/CVE-2024-5997.json) (`2024-07-19T13:01:44.567`)
|
||||
- [CVE-2024-6205](CVE-2024/CVE-2024-62xx/CVE-2024-6205.json) (`2024-07-19T13:01:44.567`)
|
||||
- [CVE-2024-6338](CVE-2024/CVE-2024-63xx/CVE-2024-6338.json) (`2024-07-19T13:01:44.567`)
|
||||
- [CVE-2024-6455](CVE-2024/CVE-2024-64xx/CVE-2024-6455.json) (`2024-07-19T13:01:44.567`)
|
||||
- [CVE-2024-6799](CVE-2024/CVE-2024-67xx/CVE-2024-6799.json) (`2024-07-19T13:01:44.567`)
|
||||
- [CVE-2024-6898](CVE-2024/CVE-2024-68xx/CVE-2024-6898.json) (`2024-07-19T13:01:44.567`)
|
||||
- [CVE-2024-6899](CVE-2024/CVE-2024-68xx/CVE-2024-6899.json) (`2024-07-19T13:01:44.567`)
|
||||
- [CVE-2024-6900](CVE-2024/CVE-2024-69xx/CVE-2024-6900.json) (`2024-07-19T13:01:44.567`)
|
||||
- [CVE-2024-6901](CVE-2024/CVE-2024-69xx/CVE-2024-6901.json) (`2024-07-19T13:01:44.567`)
|
||||
- [CVE-2024-6902](CVE-2024/CVE-2024-69xx/CVE-2024-6902.json) (`2024-07-19T13:01:44.567`)
|
||||
- [CVE-2024-6903](CVE-2024/CVE-2024-69xx/CVE-2024-6903.json) (`2024-07-19T13:01:44.567`)
|
||||
- [CVE-2024-6904](CVE-2024/CVE-2024-69xx/CVE-2024-6904.json) (`2024-07-19T13:01:44.567`)
|
||||
- [CVE-2024-6905](CVE-2024/CVE-2024-69xx/CVE-2024-6905.json) (`2024-07-19T13:01:44.567`)
|
||||
- [CVE-2024-6906](CVE-2024/CVE-2024-69xx/CVE-2024-6906.json) (`2024-07-19T13:01:44.567`)
|
||||
- [CVE-2024-6907](CVE-2024/CVE-2024-69xx/CVE-2024-6907.json) (`2024-07-19T13:01:44.567`)
|
||||
- [CVE-2024-6916](CVE-2024/CVE-2024-69xx/CVE-2024-6916.json) (`2024-07-19T13:01:44.567`)
|
||||
- [CVE-2024-41009](CVE-2024/CVE-2024-410xx/CVE-2024-41009.json) (`2024-07-19T15:06:23.827`)
|
||||
- [CVE-2024-41010](CVE-2024/CVE-2024-410xx/CVE-2024-41010.json) (`2024-07-19T15:24:59.137`)
|
||||
- [CVE-2024-41107](CVE-2024/CVE-2024-411xx/CVE-2024-41107.json) (`2024-07-19T14:15:06.080`)
|
||||
- [CVE-2024-5251](CVE-2024/CVE-2024-52xx/CVE-2024-5251.json) (`2024-07-19T15:25:30.980`)
|
||||
- [CVE-2024-5252](CVE-2024/CVE-2024-52xx/CVE-2024-5252.json) (`2024-07-19T15:29:35.447`)
|
||||
- [CVE-2024-5253](CVE-2024/CVE-2024-52xx/CVE-2024-5253.json) (`2024-07-19T15:30:34.717`)
|
||||
- [CVE-2024-5254](CVE-2024/CVE-2024-52xx/CVE-2024-5254.json) (`2024-07-19T15:32:05.560`)
|
||||
- [CVE-2024-5255](CVE-2024/CVE-2024-52xx/CVE-2024-5255.json) (`2024-07-19T15:32:18.850`)
|
||||
- [CVE-2024-6008](CVE-2024/CVE-2024-60xx/CVE-2024-6008.json) (`2024-07-19T14:52:08.110`)
|
||||
- [CVE-2024-6009](CVE-2024/CVE-2024-60xx/CVE-2024-6009.json) (`2024-07-19T14:24:41.657`)
|
||||
- [CVE-2024-6013](CVE-2024/CVE-2024-60xx/CVE-2024-6013.json) (`2024-07-19T14:20:07.337`)
|
||||
- [CVE-2024-6014](CVE-2024/CVE-2024-60xx/CVE-2024-6014.json) (`2024-07-19T14:18:17.607`)
|
||||
- [CVE-2024-6015](CVE-2024/CVE-2024-60xx/CVE-2024-6015.json) (`2024-07-19T14:13:10.463`)
|
||||
- [CVE-2024-6016](CVE-2024/CVE-2024-60xx/CVE-2024-6016.json) (`2024-07-19T14:02:04.600`)
|
||||
- [CVE-2024-6033](CVE-2024/CVE-2024-60xx/CVE-2024-6033.json) (`2024-07-19T15:32:49.507`)
|
||||
- [CVE-2024-6467](CVE-2024/CVE-2024-64xx/CVE-2024-6467.json) (`2024-07-19T15:37:51.067`)
|
||||
- [CVE-2024-6535](CVE-2024/CVE-2024-65xx/CVE-2024-6535.json) (`2024-07-19T15:00:32.153`)
|
||||
- [CVE-2024-6595](CVE-2024/CVE-2024-65xx/CVE-2024-6595.json) (`2024-07-19T14:52:54.943`)
|
||||
- [CVE-2024-6660](CVE-2024/CVE-2024-66xx/CVE-2024-6660.json) (`2024-07-19T15:48:14.040`)
|
||||
- [CVE-2024-6669](CVE-2024/CVE-2024-66xx/CVE-2024-6669.json) (`2024-07-19T15:56:47.190`)
|
||||
- [CVE-2024-6801](CVE-2024/CVE-2024-68xx/CVE-2024-6801.json) (`2024-07-19T14:55:25.753`)
|
||||
- [CVE-2024-6802](CVE-2024/CVE-2024-68xx/CVE-2024-6802.json) (`2024-07-19T14:58:12.707`)
|
||||
- [CVE-2024-6803](CVE-2024/CVE-2024-68xx/CVE-2024-6803.json) (`2024-07-19T15:01:50.250`)
|
||||
- [CVE-2024-6807](CVE-2024/CVE-2024-68xx/CVE-2024-6807.json) (`2024-07-19T15:03:08.933`)
|
||||
- [CVE-2024-6808](CVE-2024/CVE-2024-68xx/CVE-2024-6808.json) (`2024-07-19T15:04:43.837`)
|
||||
|
||||
|
||||
## Download and Usage
|
||||
|
254
_state.csv
254
_state.csv
@ -29106,7 +29106,7 @@ CVE-2007-6349,0,0,55c2309c853ce1ea78f598953eac0bbbffd257655f0e04247272f36f40682e
|
||||
CVE-2007-6350,0,0,53461a66d55fce94ee8771f8c1589164b26a5137407c8a93b914a38060a54074,2011-08-08T04:00:00
|
||||
CVE-2007-6351,0,0,104fd677a458e7236e358907764e2252d7ded497fa8382007a54e0f75cb5c65c,2021-01-26T13:07:36.500000
|
||||
CVE-2007-6352,0,0,f530a14c21bfc055404c29a80912ec97b7445e32f99ddb2051e95278cf78642b,2018-10-15T21:52:19.970000
|
||||
CVE-2007-6353,0,1,3fbb9122b2d3dbf0ff1069cce1228f9fd5bc5301d0de322b4ed4666eb3ccf364,2024-07-19T13:04:35.477000
|
||||
CVE-2007-6353,0,0,3fbb9122b2d3dbf0ff1069cce1228f9fd5bc5301d0de322b4ed4666eb3ccf364,2024-07-19T13:04:35.477000
|
||||
CVE-2007-6354,0,0,9f2be0d0508b8864496e3a779e2936853f0a62ee0d84b838e31c9dc7d9e0041e,2011-05-13T04:00:00
|
||||
CVE-2007-6355,0,0,b02cf3e83b9f403b5686286eee9a5674328ff97478346cd2f406deb9f9e17877,2011-05-13T04:00:00
|
||||
CVE-2007-6356,0,0,84732a36e499b486f879b128037576ea39e0d40b6ae5bdec6082a08f9459ae21,2011-03-08T03:02:31.687000
|
||||
@ -72693,7 +72693,7 @@ CVE-2014-9153,0,0,1852fe3a0151bd62e5dc4286a28ef9334fbdff3a30a23b3a5ba8e0cbe7223f
|
||||
CVE-2014-9154,0,0,59bd739983a682bc345e74585d02d50f06d7b4e8f99f02180fb6d28be4347f40,2014-12-05T16:32:24.930000
|
||||
CVE-2014-9155,0,0,565ceaf371a314db9a7df10e83e92282637c016a54717a3daedce1a87946f1c9,2014-12-05T16:10:56.670000
|
||||
CVE-2014-9156,0,0,d8e68076b6f619078f4af9051bf6f4fd924cd6008e80510a17f25c8459b60727,2014-12-01T19:15:55.913000
|
||||
CVE-2014-9157,0,1,25f2e7a07445fb463b309b296fc12d6eb152478e4b0d875cf8a5e2b104d6b069,2024-07-19T13:02:55.980000
|
||||
CVE-2014-9157,0,0,25f2e7a07445fb463b309b296fc12d6eb152478e4b0d875cf8a5e2b104d6b069,2024-07-19T13:02:55.980000
|
||||
CVE-2014-9158,0,0,9e594330e6883ce054afa992a164552596d2d4233052544abefd7afe2a0b3cde,2014-12-12T01:40:25.750000
|
||||
CVE-2014-9159,0,0,509d5f2dd5a7b8088aee0d037a7af644ed36efde6f1510e915a6157e2c645ecd,2014-12-12T01:40:55.657000
|
||||
CVE-2014-9160,0,0,5bae4029507e5450b4ce949da937cd00adbc4dab93c07ba69378d2cba9487060,2017-01-03T02:59:22.783000
|
||||
@ -73024,7 +73024,7 @@ CVE-2014-9510,0,0,19193e66fd5db68f4c1e456f32a619257e3e6ab946f404bae7f293cab5d117
|
||||
CVE-2014-9512,0,0,2ab5a92bff5ea988b46f3c00235ff6b672ecc142bd47d1d0aa5028bc6e300774,2020-07-28T20:15:12.060000
|
||||
CVE-2014-9513,0,0,e745d9fde65a85ae96dae0b70254a67ff78cb9eebe7681bd336ec22167e84fd3,2017-09-08T02:22:47.890000
|
||||
CVE-2014-9514,0,0,23d982d511dc4dd5b0ee4d20d13ec854282abd7ffd4e0f326a23013c9c55db06,2017-08-31T13:46:55.820000
|
||||
CVE-2014-9515,0,0,522befe469b9d40f52519c18e0454e66503e6f41ddbade7816d38d3a9e79e342,2021-06-14T18:15:10.637000
|
||||
CVE-2014-9515,0,1,24be7155019de27e80399c6be5475ef64a6aedbe97577a256ae0a18f9a53e8b2,2024-07-19T14:15:02.500000
|
||||
CVE-2014-9516,0,0,6e198e840f166756d5e58760115938c2a398eec9cfd4aedac45b0f03710a6db7,2015-01-06T16:48:32.723000
|
||||
CVE-2014-9517,0,0,279a156651ad5993cc16d034460157adb07f2c6a29e6d67e65e7aceb275abac6,2023-11-17T20:01:31.690000
|
||||
CVE-2014-9518,0,0,5942cce75c2632a7a5abda187d30833574a9d1d9769e051797a5faa5f3a6d96b,2015-01-06T17:37:17.063000
|
||||
@ -74386,7 +74386,7 @@ CVE-2015-0969,0,0,98a698159207b459a01c1c68618daf4c818febd68fd91bb81989c3b302cdd6
|
||||
CVE-2015-0970,0,0,8acab781ba8956dc0da47639ab5844d9a863a603c524e26ca5728a588e8126c7,2019-09-27T16:44:28.233000
|
||||
CVE-2015-0971,0,0,fe1ad42b256a586c6c7695e21f0ec0e2da11a1b53f584460eba8191e6bc180e3,2015-05-15T15:13:25.893000
|
||||
CVE-2015-0972,0,0,13a4b8c6ef17ab64f1fb0b583479c02c9508b9578186aba569147c4411ed7607,2015-06-24T17:50:23.243000
|
||||
CVE-2015-0973,0,0,30178994f4b1d92c263cfc842e6dbd36de812993fe86681e8bc3d7f14022cd86,2016-10-20T18:46:05.357000
|
||||
CVE-2015-0973,0,1,68eaec9323199d783bace3e5c2615086955fd739151902f1903c1a081de9375d,2024-07-19T14:15:04.343000
|
||||
CVE-2015-0974,0,0,258cdcfae939df11916595c4876ef9eaccdc2ba26fd1dea8a6d5276161c32b70,2017-09-12T15:37:58.493000
|
||||
CVE-2015-0976,0,0,2459cd195fd89a053ff7217ae74342de6e3b68fd8bae7e138d0af08dc7cf7405,2015-04-03T15:16:34.467000
|
||||
CVE-2015-0977,0,0,5944267d3fb952b169bc9eb9bd7b1770691968e29cc26b84f3c43f8b400515a7,2015-02-27T17:41:21.397000
|
||||
@ -87012,7 +87012,7 @@ CVE-2016-3747,0,0,1e9866632061c3379cd0e6306f66e694439cbbedc1b178c6335abc792da298
|
||||
CVE-2016-3748,0,0,1c90f13a2854c36ccb8761c0d4511424580cf135f1a89bed8050ac8d3598fb73,2016-07-11T18:28:53.910000
|
||||
CVE-2016-3749,0,0,ae78f56f9fd18e113b7c89b9925288c976404bc1c24a2abf327a46e025b7abbc,2016-07-11T18:44:36.083000
|
||||
CVE-2016-3750,0,0,dbcd5f94bf55d295346ddcf597a79c4071914ee295c9ea0ac6d107da0c74a475,2016-07-11T17:41:12.853000
|
||||
CVE-2016-3751,0,0,d6fa721cc5b225d90a72381b15dbbe9aed866e2aaef844bb8379f29346384a4e,2016-07-11T17:52:53.463000
|
||||
CVE-2016-3751,0,1,bc5fb81d6aaede233a449dfe8134a1c0218e0b6eb2595073967828d7767ce9d9,2024-07-19T14:15:04.573000
|
||||
CVE-2016-3752,0,0,08630fd893f115bbf043182ef5338cb2b3540573825045c80ee2ab5bc120c4bd,2016-07-11T18:30:55.097000
|
||||
CVE-2016-3753,0,0,dd8974f1d4e0c13e24104b3efc7433b1c6ae7ba7ee54ada5e0fd36e0fbc8c193,2016-07-11T17:43:18.823000
|
||||
CVE-2016-3754,0,0,d435c37b580863e722e7200f62350927f37401218352adce39fd1358431d7b72,2016-07-11T14:24:05.513000
|
||||
@ -94648,7 +94648,7 @@ CVE-2017-10668,0,0,b3b508dd00bbdfc4c32f6581e93268dce58b239af608215f8dafb9abd8c85
|
||||
CVE-2017-10669,0,0,7da649796bd95a8a6a0d1a6b84a5510f1ef49df12cc5ae837320c5d13c649741,2017-07-06T17:58:48.303000
|
||||
CVE-2017-1067,0,0,5e339d272fa99fe498529e1e3f23492889219a4846a477cf56fa0d2def6fb28c,2023-11-07T02:42:16.020000
|
||||
CVE-2017-10670,0,0,75e8d8e75065c423c1872194b012eae82d189cdc3a5608e753726629523f2d01,2017-07-06T17:59:00.303000
|
||||
CVE-2017-10671,0,1,606bbab4b09c232a580fdd6efa3d3f824ac23e373bb70dd833ae3218d06c0a1f,2024-07-19T13:05:10.600000
|
||||
CVE-2017-10671,0,0,606bbab4b09c232a580fdd6efa3d3f824ac23e373bb70dd833ae3218d06c0a1f,2024-07-19T13:05:10.600000
|
||||
CVE-2017-10672,0,0,62592e865e8978294f88122696807d65be2bb0bd6d142716ae24419459c99b49,2020-03-03T16:19:15.567000
|
||||
CVE-2017-10673,0,0,65ef9bdfaef3afbef0939aefc7763de9df86875cbd97c71a7ba545a71cc477d0,2019-12-12T13:19:51.560000
|
||||
CVE-2017-10674,0,0,7851d14fd365008a24460c45a3ce5da5c2fc9ddae735a4dd058c21e94b7bc166,2017-07-06T18:07:48.387000
|
||||
@ -111218,7 +111218,7 @@ CVE-2018-1005,0,0,d15517e4e9e1db97d14dbcdeaf7d5651f0a12edff3ffd4d54845b92a268387
|
||||
CVE-2018-10050,0,0,cf969848703a9b2a59313bb2763aa6281c852347ea8fc74d79bc4af3b1a62f1b,2018-05-09T18:29:04.107000
|
||||
CVE-2018-10051,0,0,a3a0bac148a003ebba2da5967ead0666f6bef310e10c1de782105abb79ce9cd0,2018-05-09T18:08:23.747000
|
||||
CVE-2018-10052,0,0,c3523c185ff2d85e9b0d31e90c216f284db2ddf40b6a13205a1dada94b27cb86,2018-05-09T18:08:07.997000
|
||||
CVE-2018-10054,0,0,b52aafc7cb0753cd5d8aedcb5800310d90ae68be994becb0ca74c14745dbc854,2024-06-26T20:15:12.490000
|
||||
CVE-2018-10054,0,1,7f164c93c8e6890f848f21703272543af1c1fbf11f41915a444773969d4cc474,2024-07-19T14:15:04.740000
|
||||
CVE-2018-10055,0,0,19ad0ade7b7357d87bb6d75a4a0074bf851fab84c4fa3854fa7c1dc98e1e34d2,2019-04-30T18:34:22.890000
|
||||
CVE-2018-10057,0,0,8274f370e169947a28352a8fdf79fe87593e238312e1b2440e7e17f4f8c9d759,2018-07-27T14:46:42.937000
|
||||
CVE-2018-10058,0,0,6c8812623ef7c6db9316c220fe09077dc0f3d104fee66ccb3137c7904cdf1c30,2020-08-24T17:37:01.140000
|
||||
@ -135204,7 +135204,7 @@ CVE-2019-1762,0,0,3dfc024db74375afdf9a77e3e3d3e77477c0dc637b15bea512092209468fef
|
||||
CVE-2019-17621,0,0,85c741f8f9d3768b4e0bc281bd2ffe8a1855adf9bd3e1544afe4cacd9303ad45,2024-06-27T19:16:32.357000
|
||||
CVE-2019-17624,0,0,34cab4b9b8d5fd56bfc68f777500f1464c84eadfdadf7fa0aa670b2a02bdf5e3,2020-08-24T17:18:39.590000
|
||||
CVE-2019-17625,0,0,f99f6d326f4f07f8173685deb9c85452c592dde1d884b81fde79c62991d31705,2019-10-16T22:36:38.803000
|
||||
CVE-2019-17626,0,0,d1c3fb8e5ca035b4f87dd71a60e3770f7122dede40f7721dcdc139ead5251446,2023-11-07T03:06:23.607000
|
||||
CVE-2019-17626,0,1,d2aa81cde2600dfc256b5d4d18d747ff1f1ad0f938c459c4a76386c31a4f51fb,2024-07-19T14:15:04.930000
|
||||
CVE-2019-17627,0,0,2086a1ffab420c4fd78d53df0f3352f1f205cc73c687051ffb86e903c95610e9,2019-10-18T17:00:37.100000
|
||||
CVE-2019-17629,0,0,614b65deffa0b7bdceaa98f22d6aa3f8eb8c190d3d454fa4d90cc0a6f0072c6f,2019-10-16T19:11:34.597000
|
||||
CVE-2019-1763,0,0,b419eaed4c26a3ac25bfa3529a129186a61beb7ca26002e3ca272799a77e5f6a,2020-10-08T19:58:23.100000
|
||||
@ -230061,7 +230061,7 @@ CVE-2023-40154,0,0,6db426d68f75684e01202401e3ecbe622403876ecbe4560542d2a6ae15228
|
||||
CVE-2023-40155,0,0,6607ef25c31938b51bd9b5bc14fc82ea7b9d6e01e850e1c2a7260709004a339f,2024-07-03T01:41:05.087000
|
||||
CVE-2023-40156,0,0,5e8f76b298822e89ccc8b4a43484c8f474a98f9ca30f47e72c0a6bb7cf341fbd,2024-02-14T15:01:46.050000
|
||||
CVE-2023-40158,0,0,ea9ecbd6acdb9ee425f0387337774eb7bca92a549c7bbb73ec67e17a1e55242b,2023-08-29T14:35:53.187000
|
||||
CVE-2023-40159,0,1,73d39db9bfd3bad5c8e909b94a6eb837640d49007d2a26b95faa032fcf43ed99,2024-07-19T13:01:44.567000
|
||||
CVE-2023-40159,0,0,73d39db9bfd3bad5c8e909b94a6eb837640d49007d2a26b95faa032fcf43ed99,2024-07-19T13:01:44.567000
|
||||
CVE-2023-4016,0,0,fd0766ac93b2d18ad336657f47ddb29d4b25b76da4cba12e55388717e6b8762f,2023-12-15T18:19:03.787000
|
||||
CVE-2023-40160,0,0,de8c32a875ccf6f89392dafa209d66eda2b9b820e48facccb8082fc450366841,2024-03-18T01:53:02.353000
|
||||
CVE-2023-40161,0,0,811acdcf20dca77f5e641cd172c1882f83d8fefd01d88b9229bb052c09bff4e9,2024-02-14T15:01:46.050000
|
||||
@ -230123,7 +230123,7 @@ CVE-2023-40219,0,0,771f66a87abf8df69cce91491665e525ddb3d080b9e78bf4734e3298840cb
|
||||
CVE-2023-4022,0,0,d6b23d4a259ff425e0bcea23f81328a67bb6e3c44aa2685891847b3db1b81338,2023-11-07T04:22:03.600000
|
||||
CVE-2023-40220,0,0,89c4602906f60678a7794892d3cd5810d595c00980d101471846882934615bc4,2023-11-22T15:13:46.893000
|
||||
CVE-2023-40221,0,0,fc206e84687a442a6b6faace8e4cb4d304dab11b253a40c7c3859764d42592bc,2024-06-04T19:17:38.693000
|
||||
CVE-2023-40223,0,1,d04b62607941a7a62c505babe0b67a0c8d9fa8e1269f219147a221743a1b0798,2024-07-19T13:01:44.567000
|
||||
CVE-2023-40223,0,0,d04b62607941a7a62c505babe0b67a0c8d9fa8e1269f219147a221743a1b0798,2024-07-19T13:01:44.567000
|
||||
CVE-2023-40224,0,0,fe7ff7e2259903cb6a2b8a487e5657d52b403fb11aed6d8e638eabcae3a7d45a,2023-11-17T05:15:12.387000
|
||||
CVE-2023-40225,0,0,4211aba8908007a30e95209432ab11366dbf58cece809a97f23ca0a3fb4772c7,2023-08-18T20:03:17.290000
|
||||
CVE-2023-4023,0,0,9994c1fc2e5c266fe881d2394936c6b00f055b3f4cc90c0fb1f5d28d281ef9df,2023-11-07T04:22:03.717000
|
||||
@ -230396,7 +230396,7 @@ CVE-2023-40534,0,0,e8ece95a9c479f54fdd96184c96036c3ca75ef517f90de3d989a08bfce9bf
|
||||
CVE-2023-40535,0,0,3dd8b6e353e77bc78b3eaf66d47e8a5e362a0b31feec7a87804f2cc657d03e6f,2023-09-08T18:49:20.803000
|
||||
CVE-2023-40536,0,0,9551e2fe36c80eabdc1a2e97ded6be800d2fb9f544e15a4ec84bb644eba227af,2024-05-17T18:36:05.263000
|
||||
CVE-2023-40537,0,0,75f58d7d08cd8fb906c24aefd5bbf6d6b69c82ba74790056d8b068a8723a2e25,2023-10-19T16:43:11.323000
|
||||
CVE-2023-40539,0,1,0260cd4683ea1e89f6283f932c1a63c6dd5e1b1420f5c025e0cff80c05f811c3,2024-07-19T13:01:44.567000
|
||||
CVE-2023-40539,0,0,0260cd4683ea1e89f6283f932c1a63c6dd5e1b1420f5c025e0cff80c05f811c3,2024-07-19T13:01:44.567000
|
||||
CVE-2023-4054,0,0,53238c21c0a1eb83d08a1b3d2d86562b494ce0912d3fd29acf557c382ca3a9f1,2023-08-07T14:51:09.667000
|
||||
CVE-2023-40540,0,0,1e03a01e888f27e7c3ca51db2a4bc2550b4a2afd268bf6a33f8cdd0d825d3736,2023-11-22T15:13:18.220000
|
||||
CVE-2023-40541,0,0,daaec126802b21cc7a612331601c83efdf2fbb147626236fb6df03c2ce8ee7c6,2023-10-12T02:32:07.413000
|
||||
@ -230552,7 +230552,7 @@ CVE-2023-40699,0,0,1c71007d49a9bda3bb25ac8a38884f2ffc429a510e5d9039d4e8477ec5b0a
|
||||
CVE-2023-4070,0,0,a493fa1b62788c24fea8f8fc21746dc89c9760da767bd18023dad9b52c2e8327,2024-01-31T17:15:13.767000
|
||||
CVE-2023-40702,0,0,62d180282da772c8c0e58ade691879d7f1cf512a29de8bc9063c44bdbe2af130,2024-07-09T18:18:38.713000
|
||||
CVE-2023-40703,0,0,35695eb835fa32a192b950c3dccf44faf04da11a8e115230e010144a1f1eab33,2023-12-01T19:13:28.487000
|
||||
CVE-2023-40704,0,1,9209d06e6b6a45b0b11e619acb500fbe43d9b7e6a6300160ab05b4ff17ab2034,2024-07-19T13:01:44.567000
|
||||
CVE-2023-40704,0,0,9209d06e6b6a45b0b11e619acb500fbe43d9b7e6a6300160ab05b4ff17ab2034,2024-07-19T13:01:44.567000
|
||||
CVE-2023-40705,0,0,1eda5b358ba0f37be10f436ec87d2f785a6beaf853d5f29bdc0c3fdfc74c06ad,2023-09-08T18:48:31.770000
|
||||
CVE-2023-40706,0,0,adbd436305697d32e2e9942a03d182f6db0acd7a4fd1ad3603994bd286cace6d,2023-08-29T23:34:50.430000
|
||||
CVE-2023-40707,0,0,673cbc0c873be97cb20c7bf02c23c637a814b2305c2831ca2a42955e398c3f06,2023-08-29T23:34:10.753000
|
||||
@ -237203,7 +237203,7 @@ CVE-2023-50297,0,0,377af72f6c89fc0e46b9660e8b2c6192bd69c1a81ea30ef4f3f601e394b25
|
||||
CVE-2023-50298,0,0,742712a47ba4f96d9443ee08ce1588bb351566ab4f33556150a490452f46d767,2024-02-15T18:40:56.680000
|
||||
CVE-2023-5030,0,0,baa8609a990f56814a5ba8dd9495577324349a25a51fe3f4f221ce48042d5551,2024-05-17T02:32:47.803000
|
||||
CVE-2023-50303,0,0,04eac9d14bf1dc3aa65071a8bc06d9048a964b36a98faaa3bac3085f23a59b31,2024-02-28T14:06:45.783000
|
||||
CVE-2023-50304,0,1,0163e216e7599cc5300aac9287b1a999005edadbc6996f9cb69398fd41015d85,2024-07-19T13:01:44.567000
|
||||
CVE-2023-50304,0,0,0163e216e7599cc5300aac9287b1a999005edadbc6996f9cb69398fd41015d85,2024-07-19T13:01:44.567000
|
||||
CVE-2023-50305,0,0,2c664216c9930c89a7fcfadd3a31bff081c46073aca034576b3fdbe264259281,2024-03-07T17:50:18.457000
|
||||
CVE-2023-50306,0,0,4f1d3b091421856e56dbbaaa9ee4678a885aa3ffdce75c9d83e590ccb0be3e6f,2024-02-20T19:50:53.960000
|
||||
CVE-2023-50307,0,0,ea0b023cdac8ed9cf01745c0fa57889642f00eb899be12d40ee0b2d23a79439b,2024-04-12T12:43:57.400000
|
||||
@ -240821,10 +240821,11 @@ CVE-2023-7258,0,0,743a17302c5d0deefce3c9c18515bc1a780c1d3e967dd943e69bc9c091c417
|
||||
CVE-2023-7259,0,0,48e34f6790939be91bf1f945206235146161db18f274c444cfe683dbe37045a0,2024-06-04T19:18:14.193000
|
||||
CVE-2023-7261,0,0,44080cc2bc0d6a25d80bc7855327b03309b2d9def17d97f1c55e50122c67ac97,2024-07-03T01:44:30.563000
|
||||
CVE-2023-7264,0,0,51dd8b83703649c91504628a1d95022ef41c77d28d8363a527e775cafaba1511,2024-06-11T13:54:12.057000
|
||||
CVE-2023-7268,0,1,c61b2680229d9fa33f1c954c8726fa832de0e98c894a6bedd271579a687f7cbb,2024-07-19T13:01:44.567000
|
||||
CVE-2023-7269,0,1,3f1411775e418b1331660b2e2f08e21ffd79ce221427bae98ae26bf35cbe5cb7,2024-07-19T13:01:44.567000
|
||||
CVE-2023-7268,0,0,c61b2680229d9fa33f1c954c8726fa832de0e98c894a6bedd271579a687f7cbb,2024-07-19T13:01:44.567000
|
||||
CVE-2023-7269,0,0,3f1411775e418b1331660b2e2f08e21ffd79ce221427bae98ae26bf35cbe5cb7,2024-07-19T13:01:44.567000
|
||||
CVE-2023-7270,0,0,3d7ad3a206c04c3798343468b0d534eca04f86eefe46ec321113ac7e2ecdcd6a,2024-07-04T07:15:10.497000
|
||||
CVE-2023-7272,0,0,cc43888de86ffd529fd218a38f2e0a497e79588d2ca6b5dec5063052cab77d6c,2024-07-18T12:28:43.707000
|
||||
CVE-2024-0006,1,1,79db48194cb5104ac2f1b02e569f2eee06af8b9c0a4f59b9f348776648116d77,2024-07-19T15:15:09.930000
|
||||
CVE-2024-0007,0,0,7ce6d28a77975ceb6f0211a30f9905d648e1a7e8a675821fe7be046691ac9f83,2024-02-15T06:23:39.303000
|
||||
CVE-2024-0008,0,0,899bae3dea0b6932a6d046356f47764b32f025595d0eef60d8e0e433b2b04007,2024-02-15T06:23:39.303000
|
||||
CVE-2024-0009,0,0,31a37345511ab8f9e782cdcb9d09dfe3dad4751b5c25ab7a9b1c5c74d0c64c05,2024-02-15T06:23:39.303000
|
||||
@ -241560,7 +241561,7 @@ CVE-2024-0853,0,0,3c910daae8e71e1ce70b1329a110fcfb56e12ff4cd703e160872830a02778b
|
||||
CVE-2024-0854,0,0,078c838d6b39f270536d9d77e44ca7ffaa60bd2fba9534d52e2f6ab03b587b3d,2024-01-30T17:01:37.127000
|
||||
CVE-2024-0855,0,0,d6a852138d81a2f1a5b951678ed9f076f0450cdd1094ad4d8554eefd8ccce592,2024-02-27T14:20:06.637000
|
||||
CVE-2024-0856,0,0,35186061175bf94a789875417a754a8a320463b5a7778dc33b67b00319a2bfe4,2024-03-20T13:00:16.367000
|
||||
CVE-2024-0857,0,1,b0666c260e2bd7ff808ade000aadd0cab74ae18ae1df2b63d578d62ec78174c1,2024-07-19T13:01:44.567000
|
||||
CVE-2024-0857,0,0,b0666c260e2bd7ff808ade000aadd0cab74ae18ae1df2b63d578d62ec78174c1,2024-07-19T13:01:44.567000
|
||||
CVE-2024-0858,0,0,0cac4e7a1bf81dbbbf49fb45b774f9b9d61dff98c8323a87e06b4f2eb2f216bd,2024-03-18T19:40:00.173000
|
||||
CVE-2024-0859,0,0,ff784ede10a0711bc0887b221fef20123179373dca5468014d5965d599854b96,2024-02-13T19:45:29.770000
|
||||
CVE-2024-0860,0,0,831bd3ec539e95c34edc12f0e20bfc01b276aabb943cb43f0dff12e235110897,2024-03-15T12:53:06.423000
|
||||
@ -243346,23 +243347,23 @@ CVE-2024-21128,0,0,a2a656ac82ef59dca59116b1c82244049a82be2b5f8d64dc13889b409d771
|
||||
CVE-2024-21129,0,0,b1d82ad2ace6a530373fd890efc61a1afe163107a9bcd66592f3629522d0dfff,2024-07-17T13:34:20.520000
|
||||
CVE-2024-2113,0,0,d820f9174045c4a91c8de22b2f318d393b16e5183ad826479f5c93fd64192dc6,2024-03-29T12:45:02.937000
|
||||
CVE-2024-21130,0,0,bea2b2e7eaeb97d38519ed7bc1bd63b9fa51bece27537e747e45a44c55c0cdf5,2024-07-17T13:34:20.520000
|
||||
CVE-2024-21131,0,0,68e549d3e011eb9fb6078a1492e62037acd3d674c9bd719eb0d2fa59a85a39b4,2024-07-17T13:34:20.520000
|
||||
CVE-2024-21131,0,1,02165835cc6f0e203728409c02066c414e0700a6416e43c004ac7c1741f0e57f,2024-07-19T14:15:05.180000
|
||||
CVE-2024-21132,0,0,dd139dd4042d6a1178972f3ac987733a96a2e35f22144c114c5d699226824ca0,2024-07-17T13:34:20.520000
|
||||
CVE-2024-21133,0,0,c3b712618b8daaa32fb099f380783f45f3a3232041fc17f803218133bcfc018e,2024-07-17T13:34:20.520000
|
||||
CVE-2024-21134,0,0,6d06cef5bcb05ca9302f0e9cb0f7e64b3c71aa9c9e1898be8366c5e2ec7f0590,2024-07-17T13:34:20.520000
|
||||
CVE-2024-21135,0,0,5ea7533ff0f28947679285df758fb5bdd6d00b15c26c27c77e949acd7e643f06,2024-07-17T13:34:20.520000
|
||||
CVE-2024-21136,0,0,eac34267828dcd6c0e42f2949578579bca9932424a4c02dda1596c44a1615cb0,2024-07-17T13:34:20.520000
|
||||
CVE-2024-21137,0,0,5cb346ed6a76e33ff502442e6fda21ba59fabfa2b49d93de02374b0eba7b85b1,2024-07-17T13:34:20.520000
|
||||
CVE-2024-21138,0,0,bf1b292f2fc69b2f57d0eb49178fc0f3703939cbe3859388c2916d71c5b594e4,2024-07-17T13:34:20.520000
|
||||
CVE-2024-21138,0,1,48e73281e1321884b4e1b592183d2ed2dbef5bea392b3b824bf77e00d538c447,2024-07-19T14:15:05.290000
|
||||
CVE-2024-21139,0,0,1659564eccefabd1ef87f080fcf044771f881c3bd2283c028d2b7fe1481c401e,2024-07-17T13:34:20.520000
|
||||
CVE-2024-21140,0,0,5f55e20f43d23bc11cde840ec2a1ca590f33e24a9c9829d36ab276ea8b99732c,2024-07-17T13:34:20.520000
|
||||
CVE-2024-21140,0,1,a355b887f2f3e95c0cfcaf2066fbef2d48cd303288049a5e4f501e4b1ab2b1f0,2024-07-19T14:15:05.400000
|
||||
CVE-2024-21141,0,0,4c389a1b1f7194fb9ba2446906af3d7d800a96ac9f50d96dbc4d51691fe14a39,2024-07-17T13:34:20.520000
|
||||
CVE-2024-21142,0,0,7714e55c3a0eaa85d823f8a1ea286e8580188862c1a8262d24c18bcf0bedb50f,2024-07-17T13:34:20.520000
|
||||
CVE-2024-21143,0,0,a339ae05c5939594a60af63a50c64360a4c2bba1a6c72ae3134b343940b551c0,2024-07-17T13:34:20.520000
|
||||
CVE-2024-21144,0,0,545ce137ae4b7251fcbe475861991619ab96bd1118a48fbbae43d504ecb74590,2024-07-17T13:34:20.520000
|
||||
CVE-2024-21145,0,0,10662079aac9837e4851948f61900e8d072caebf410e8d98dac5180f3fbd0f0a,2024-07-17T13:34:20.520000
|
||||
CVE-2024-21144,0,1,a6e0220af7613c1fe6414e49d55f78f0a709fc1177b6fe6b6e15840375ef4e2d,2024-07-19T14:15:05.497000
|
||||
CVE-2024-21145,0,1,77d6b8d482bc9fea478023a3ac3b96ff89a156b807bd0fe4072eea7489b1a76c,2024-07-19T14:15:05.580000
|
||||
CVE-2024-21146,0,0,a3b2bee4c09cc77d71ebb85b1373e7798d1523fbed51e3bdbddcd6b262c87281,2024-07-17T13:34:20.520000
|
||||
CVE-2024-21147,0,0,80fe25d7fbae190c147cb0af161d104a4d18887fccd83f57fce5b1db56e39f37,2024-07-17T13:34:20.520000
|
||||
CVE-2024-21147,0,1,84f7acc7bc3a20d2859db41d6e11faaeb2b951c493091b63d082c86a294a3902,2024-07-19T14:15:05.667000
|
||||
CVE-2024-21148,0,0,1967fb910c0ddd4fed52a67bde1deacb54db248787d06056e78744e0393f0bfa,2024-07-17T13:34:20.520000
|
||||
CVE-2024-21149,0,0,8b715a8f90298b625399ca35204ae3b26a39ea0583be5bb2eca26773007c4f88,2024-07-17T13:34:20.520000
|
||||
CVE-2024-2115,0,0,66506b198b4ece0adfc9016031263e6294a50c545f577c56b849d0c705d750c7,2024-04-05T12:40:52.763000
|
||||
@ -243391,19 +243392,19 @@ CVE-2024-21170,0,0,e1e211bc02bcce908dec7d1017fecb46b088c41b3278227f0dd1b52c54f62
|
||||
CVE-2024-21171,0,0,d23ed38ec4935bf20f81d9f0f4264c31da7107f3450cf18daa4ea56b7c79ff29,2024-07-17T13:34:20.520000
|
||||
CVE-2024-21173,0,0,406eb663e1eea9a8921cc1039cc55ed3405ee972396ff6c4857002263fd0f5df,2024-07-17T13:34:20.520000
|
||||
CVE-2024-21174,0,0,783646b73d638ea3453f935f01445854b5206f2f8b29efee57ff0f0f6cf6ec33,2024-07-17T13:34:20.520000
|
||||
CVE-2024-21175,0,1,cb2af54db467d6cb3910a785f432573ba67f0e2903d99aac799349b33385087b,2024-07-19T13:35:41.107000
|
||||
CVE-2024-21176,0,1,b022e0a78bfd810ce5799e801c017257ad85014c0240c82465310ca387f77de2,2024-07-19T13:35:56.727000
|
||||
CVE-2024-21177,0,1,dd286b1fc1e65591b4712392d48877586e2af8d98747ab5b6ceffcb0635a5b54,2024-07-19T13:36:47.267000
|
||||
CVE-2024-21178,0,1,035beed050bbfc2990a03e92c9b347eb1c0d59a76c8a7a78fc227f93c62febb2,2024-07-19T13:36:57.527000
|
||||
CVE-2024-21179,0,1,41e6c8b33322a354c379f8845e2addcd96f161ff65c635bb9573b0314dc3b62d,2024-07-19T13:37:06.090000
|
||||
CVE-2024-21175,0,0,cb2af54db467d6cb3910a785f432573ba67f0e2903d99aac799349b33385087b,2024-07-19T13:35:41.107000
|
||||
CVE-2024-21176,0,0,b022e0a78bfd810ce5799e801c017257ad85014c0240c82465310ca387f77de2,2024-07-19T13:35:56.727000
|
||||
CVE-2024-21177,0,0,dd286b1fc1e65591b4712392d48877586e2af8d98747ab5b6ceffcb0635a5b54,2024-07-19T13:36:47.267000
|
||||
CVE-2024-21178,0,0,035beed050bbfc2990a03e92c9b347eb1c0d59a76c8a7a78fc227f93c62febb2,2024-07-19T13:36:57.527000
|
||||
CVE-2024-21179,0,0,41e6c8b33322a354c379f8845e2addcd96f161ff65c635bb9573b0314dc3b62d,2024-07-19T13:37:06.090000
|
||||
CVE-2024-2118,0,0,8cc75b149351247ebd9b7f215d921c62e30056d8a3359ddec0c5f6ccbae617de,2024-07-03T01:53:01.593000
|
||||
CVE-2024-21180,0,1,4da0fde33dfbebbe0b3ca286005ad286ff1f5b333d68223ed96e66f77c83b6f0,2024-07-19T13:37:14.707000
|
||||
CVE-2024-21181,0,1,bcc5028a8221ef30b0110435c5ffe37b8bd34748cfc42293d9ebcfa99a85594f,2024-07-19T13:37:27.357000
|
||||
CVE-2024-21182,0,1,1124989def14cb215f68114dd9b658abe71699b5e68782a29805527846fc0b21,2024-07-19T13:37:37.967000
|
||||
CVE-2024-21183,0,1,5ae39870bee023fced3efcc39ddd05bb0b0ca09db0609fc111fcd577d8d2ed2d,2024-07-19T13:37:47.980000
|
||||
CVE-2024-21184,0,1,833a2bbb045bad80556ab103664bf106ee9ce7b3911f1ef3ab655696d8412687,2024-07-19T13:38:01.037000
|
||||
CVE-2024-21185,0,1,f54700702dbfdaddcef28547e3238c76c435075d556ca83da19506ff0ce6fe1d,2024-07-19T13:38:11.350000
|
||||
CVE-2024-21188,0,1,7669d96d6b451543b1a30be166716e2130148a874048e1cadefe6966bde664f8,2024-07-19T13:39:30.817000
|
||||
CVE-2024-21180,0,0,4da0fde33dfbebbe0b3ca286005ad286ff1f5b333d68223ed96e66f77c83b6f0,2024-07-19T13:37:14.707000
|
||||
CVE-2024-21181,0,0,bcc5028a8221ef30b0110435c5ffe37b8bd34748cfc42293d9ebcfa99a85594f,2024-07-19T13:37:27.357000
|
||||
CVE-2024-21182,0,0,1124989def14cb215f68114dd9b658abe71699b5e68782a29805527846fc0b21,2024-07-19T13:37:37.967000
|
||||
CVE-2024-21183,0,0,5ae39870bee023fced3efcc39ddd05bb0b0ca09db0609fc111fcd577d8d2ed2d,2024-07-19T13:37:47.980000
|
||||
CVE-2024-21184,0,0,833a2bbb045bad80556ab103664bf106ee9ce7b3911f1ef3ab655696d8412687,2024-07-19T13:38:01.037000
|
||||
CVE-2024-21185,0,0,f54700702dbfdaddcef28547e3238c76c435075d556ca83da19506ff0ce6fe1d,2024-07-19T13:38:11.350000
|
||||
CVE-2024-21188,0,0,7669d96d6b451543b1a30be166716e2130148a874048e1cadefe6966bde664f8,2024-07-19T13:39:30.817000
|
||||
CVE-2024-2119,0,0,11b037b49d290ba489439edd17815bf1f5dbc31c03ff8b80541b76c9d70af605,2024-05-22T12:46:53.887000
|
||||
CVE-2024-2120,0,0,6b5464bebd26aefe39617ee608f8869264c47eca6efc9fe45d62e273fef6e20b,2024-03-27T12:29:30.307000
|
||||
CVE-2024-2121,0,0,2cfb1a723dc54cb3d26c2160d4679da8744349bbf9431cfc104ee6efa0d850da,2024-03-27T12:29:30.307000
|
||||
@ -243649,12 +243650,12 @@ CVE-2024-21523,0,0,1cb7f20515fe4bf9fce48ef1ad15a8074d4b45196b3f852e54372991de8b8
|
||||
CVE-2024-21524,0,0,1b404e02733b1d9bbc968bbcd180a83e2167b1bd45b755297d40db9c945a4d6e,2024-07-11T13:05:54.930000
|
||||
CVE-2024-21525,0,0,b0b4bb7ac52f850d274c4462f4e1c3c5bb13c947283cf1a8b69a39e30d235a9e,2024-07-11T13:05:54.930000
|
||||
CVE-2024-21526,0,0,effd07762d29cbaa402155d2c949789e21ab2c387b4e4af3dcba88775e370e17,2024-07-11T15:05:20.940000
|
||||
CVE-2024-21527,0,1,5f68d3fcedc529f8c61b21687ff27d1dfc424d6b1048d7df4e422495549fd852,2024-07-19T13:01:44.567000
|
||||
CVE-2024-21527,0,0,5f68d3fcedc529f8c61b21687ff27d1dfc424d6b1048d7df4e422495549fd852,2024-07-19T13:01:44.567000
|
||||
CVE-2024-2153,0,0,d3abacc4f79f5ae0d18412563134adcd72e3650da9619fcc6b902801eca849d9,2024-05-17T02:38:04.867000
|
||||
CVE-2024-2154,0,0,ab5f0b39bb38e5c25606bad964d563e0edda059ff34db22b99ca2b3670b021ff,2024-05-17T02:38:04.970000
|
||||
CVE-2024-2155,0,0,499612150b3a1be829ef430bb3388eb54a55d7bb52271f37f2a76ceb8af6c56f,2024-05-17T02:38:05.063000
|
||||
CVE-2024-2156,0,0,3e156cd1519b9856caf676cc7af155ea1ba3901c226a3a379024601d5610634d,2024-05-17T02:38:05.157000
|
||||
CVE-2024-21583,0,1,5ec658f3354d2fc39ca1e98c3b56c4da1b7944a9e0da47df38fc57405ca1a8ed,2024-07-19T13:01:44.567000
|
||||
CVE-2024-21583,0,0,5ec658f3354d2fc39ca1e98c3b56c4da1b7944a9e0da47df38fc57405ca1a8ed,2024-07-19T13:01:44.567000
|
||||
CVE-2024-21584,0,0,8b5526ceb3e16a0ab47a1bfab91d9be92bc9a5e69e8211c3726ea53cdfac9e76,2024-03-12T12:40:13.500000
|
||||
CVE-2024-21585,0,0,a95479b2f7def09a92725835fa7942a8a00417c5c30ba7ad5352ec09d8740afc,2024-01-31T00:15:45.920000
|
||||
CVE-2024-21586,0,0,74b6b891ae798fad2231a41288bd8ce03cadc786b9e5fb8f2550f3327ecdbb0e,2024-07-18T12:15:02.647000
|
||||
@ -243938,10 +243939,10 @@ CVE-2024-22014,0,0,97be981b1958260947f79b7908c49463e10e156bc85f07e7f7d4adfcc41c6
|
||||
CVE-2024-22015,0,0,ab9198a00b8902f553a18672e99e37367cbd733d408a460d3e69564e986f708c,2024-07-03T01:46:59.010000
|
||||
CVE-2024-22016,0,0,80ed0ed1953eb9bc819815a69c5782ab91648798b066ce1586fe70786fbfbdf5,2024-02-07T17:33:12.727000
|
||||
CVE-2024-22017,0,0,cfb284ce26f8ad11f97c3657da29409b43ee3aaafc69545af1b48a9314b4beb5,2024-06-10T17:16:18.773000
|
||||
CVE-2024-22018,0,0,1f9ebfd6cad21644653d2eb867e3c7aafdbec5e19696ca21a29367cf511a6cd7,2024-07-11T19:15:11.303000
|
||||
CVE-2024-22018,0,1,4fae4a09ff6c97462c219a17730a6b02641ce527ea4e228be02726c5015758d3,2024-07-19T14:15:05.763000
|
||||
CVE-2024-22019,0,0,5ea5d0f669fc75d99f03776806b9fffc572153dc1c8ef34725dc8bf55b3cedce,2024-05-01T18:15:13.800000
|
||||
CVE-2024-2202,0,0,07ee8ffdc3e2c6571649a2da17705092fde8ccafb25f9e28d35a275c632c563a,2024-03-25T01:51:01.223000
|
||||
CVE-2024-22020,0,0,93515df31575572885455709ab760c011f4b5168a38cb84e62f57e08a71c4542,2024-07-11T19:15:11.407000
|
||||
CVE-2024-22020,0,1,debd2a01716784fdc798c1002cfd1de2c7ec7af620c6ad131da757aceaba0623,2024-07-19T14:15:05.863000
|
||||
CVE-2024-22021,0,0,638048027337936cbd408ce99df3409e0af8fc4be0132d034339cad92c33270d,2024-02-29T01:44:04.690000
|
||||
CVE-2024-22022,0,0,520151bf342f8e1b6d0df34d3bdc80dc16c1dfc15f7f487e84d9dadfaf67b99c,2024-02-15T18:45:30.887000
|
||||
CVE-2024-22023,0,0,738809cdca073240a61fbce615868c0b1c3f7d174f610e159e035e11db1f2996,2024-07-03T01:46:59.843000
|
||||
@ -247736,6 +247737,7 @@ CVE-2024-27476,0,0,ee12db45de83cded307f831888a3645bddf15bc01083bf804116fb49347c3
|
||||
CVE-2024-27477,0,0,e0cd02f233cdafbc91249b5781d33c91da5035c970dc05ec11d6a3134871bf1b,2024-04-10T19:49:51.183000
|
||||
CVE-2024-2748,0,0,a5981f926316e727f1bb9455ec311db801fabdd6fc8350d94a1fb8a2edb4a89a,2024-03-21T12:58:51.093000
|
||||
CVE-2024-27488,0,0,6be2a43b71b53f166dfab0e5a48f18012ba860e052bdc0fdded0a51aae424787,2024-04-08T18:48:40.217000
|
||||
CVE-2024-27489,1,1,a6aa2da3ad6334d53775c095ef5797d567e85d0adf56993e02a21261562f73a8,2024-07-19T15:15:10.210000
|
||||
CVE-2024-2749,0,0,1d41dd2f9a8ec812d743eb2503d3459b40e5b74ef406549f3f22535f8f1ae124,2024-07-03T01:53:31.040000
|
||||
CVE-2024-27497,0,0,0a259a174ab84ccb90a6c7661916522a49292b77c0e76cb95a176d9f4412b99e,2024-03-01T15:23:36.177000
|
||||
CVE-2024-27499,0,0,2d730ced2ef06c3685db15a9c1c8006eabdbd2f39a30889dd60bb7c576c1753e,2024-03-01T22:22:25.913000
|
||||
@ -248506,7 +248508,7 @@ CVE-2024-28833,0,0,544d9d7e36f7bff315ea2576b37cb71ff7ca29653e07f9c621760e3f96474
|
||||
CVE-2024-28834,0,0,09f3a0455e20f7b6e57692de383f0a9d90c6e171b45539ab32672953d1de586c,2024-06-10T17:16:24.560000
|
||||
CVE-2024-28835,0,0,715111faf82ef85ab0456cb4278dc00b797a9390ab2213a743da9936785d8360,2024-05-16T23:15:47.883000
|
||||
CVE-2024-28836,0,0,9ccc11b71bb035583c1b166b015c712001695f475067cfa890f253410f5dc601,2024-04-03T12:38:04.840000
|
||||
CVE-2024-2884,0,1,d12938301c99206404c82c1ccf4a3924a8320d228f8e2b624467c9752f31f26e,2024-07-19T13:35:19.847000
|
||||
CVE-2024-2884,0,0,d12938301c99206404c82c1ccf4a3924a8320d228f8e2b624467c9752f31f26e,2024-07-19T13:35:19.847000
|
||||
CVE-2024-28847,0,0,014a3928809c380b33576c4296f96e850047c73296ad4ea8531dae3cd66a2798,2024-03-17T22:38:29.433000
|
||||
CVE-2024-28848,0,0,f738fe56a5bc4cdb728fabdb4b9cb52618afbf9827db3dbc12ec3f1fb91169bf,2024-03-21T02:52:25.197000
|
||||
CVE-2024-28849,0,0,059bc6bfc5a382a2468a652be1bf3530c6d1666f5b023a0877329552fb4408ba,2024-03-23T03:15:11.970000
|
||||
@ -249003,7 +249005,7 @@ CVE-2024-29732,0,0,e30fc06180575c1796869bb0b4fa02497c40c6d7939d34aba0362f12c2710
|
||||
CVE-2024-29733,0,0,0811972ef853088b726fd2b07316244d1d628e55e310910ac8174bd65d097612,2024-07-03T01:52:30.320000
|
||||
CVE-2024-29734,0,0,65bb1ba04f673142d3081922c5e4533cd4af140db3cdfbbce09ab73848e3b6c3,2024-04-03T12:38:04.840000
|
||||
CVE-2024-29735,0,0,1c27e1fe9dbb50907062f908fab6fbb55a16239f685d6be40b04c11200e2a361,2024-05-01T19:15:23.573000
|
||||
CVE-2024-29736,0,1,a7b73099f01cfc61426635b9d2fd7a10ea2008e8a44cb47bcf89de564b7f1392,2024-07-19T13:01:44.567000
|
||||
CVE-2024-29736,0,0,a7b73099f01cfc61426635b9d2fd7a10ea2008e8a44cb47bcf89de564b7f1392,2024-07-19T13:01:44.567000
|
||||
CVE-2024-29737,0,0,905f9624f62391e71e59e29113bc18cf160be44a2207e2f0ce7231f623f92d4a,2024-07-17T14:15:03.677000
|
||||
CVE-2024-29738,0,0,1c3e1564461702d87cd213d777f3523814ac3c73b5cc61bff5ae595e06e0fbeb,2024-04-08T18:49:25.863000
|
||||
CVE-2024-29739,0,0,ff7d8db191ec3bc24b9fd0a0e51d4426e2f32708f8ba1a8e8a840affcd32aeb7,2024-04-08T18:49:25.863000
|
||||
@ -249391,10 +249393,10 @@ CVE-2024-30112,0,0,b1be3742a46d695d3f82f4d182e1b02e2a0a297ddb2b6a4bf1d69911e3eb1
|
||||
CVE-2024-30119,0,0,4baed8c508a821c818525782701105249753896feab644ba3efffba269f578b9,2024-07-03T01:53:51.120000
|
||||
CVE-2024-3012,0,0,ae30314159430e25e9f2b09f2e0a440cd8bb99b7d72b62fa4eb73b4affe20188,2024-05-17T02:39:40.620000
|
||||
CVE-2024-30120,0,0,f704816cf356d01bbdb53903a0b14bef34a589a7c9185030672ca3a1f14e4a1c,2024-06-17T12:42:04.623000
|
||||
CVE-2024-30125,0,1,1e8984bc19e1a45cd2a6c4ac0b43f227ca7f3a8dcb96ab9c16c6ada82e4faa52,2024-07-19T13:01:44.567000
|
||||
CVE-2024-30126,0,1,1dc4258efb62007b2fcf00852fe3af92d237972fa2c163c391fddf8c594d1425,2024-07-19T13:01:44.567000
|
||||
CVE-2024-30125,0,0,1e8984bc19e1a45cd2a6c4ac0b43f227ca7f3a8dcb96ab9c16c6ada82e4faa52,2024-07-19T13:01:44.567000
|
||||
CVE-2024-30126,0,0,1dc4258efb62007b2fcf00852fe3af92d237972fa2c163c391fddf8c594d1425,2024-07-19T13:01:44.567000
|
||||
CVE-2024-3013,0,0,6f68abb10d211d077c48c60372c20fba216cedafa08cc66982d3e5be234b2590,2024-05-17T02:39:40.710000
|
||||
CVE-2024-30130,0,1,8448ce55a01a9b4e45eabf08a2080330d22dcd23bef5d840e0a0228a0f910b0f,2024-07-19T13:01:44.567000
|
||||
CVE-2024-30130,0,0,8448ce55a01a9b4e45eabf08a2080330d22dcd23bef5d840e0a0228a0f910b0f,2024-07-19T13:01:44.567000
|
||||
CVE-2024-30135,0,0,434c5499719264a4e2ad07af1f36d8ed1af6151b19467e0009865806919aee63,2024-06-28T10:27:00.920000
|
||||
CVE-2024-3014,0,0,c46983235075ad6c61a858c21d5be28ec226124df8363686d4a4d1cade05d3fc,2024-05-17T02:39:40.800000
|
||||
CVE-2024-3015,0,0,cf3ef36018f814f81d7c4b278b721ac941c52c0f1c0bedc65491406707b51ee6,2024-05-17T02:39:40.887000
|
||||
@ -249707,7 +249709,7 @@ CVE-2024-3047,0,0,b22e2b3bd3f2ea2e1a9b8967138f5d24af468217212d0308948532706a31b3
|
||||
CVE-2024-30470,0,0,48e5d66dc273af24da4e4b7519926c3e97f1d38856b041954b60e69533ae4645,2024-06-10T02:52:08.267000
|
||||
CVE-2024-30471,0,0,24bc68add584a17f9d1f010daaae4a0025d7a0febd84aec39d70d272cd1e669e,2024-07-17T13:34:20.520000
|
||||
CVE-2024-30472,0,0,00bb1b58fdab892a36ea40136ac2fa59e308dd9cc355f92e428b81257afaa77e,2024-06-13T18:35:19.777000
|
||||
CVE-2024-30473,0,1,cc643ea6610c054923dcda820bdbaeee3470f2fed9befe993862cdd8d56027e3,2024-07-19T13:01:44.567000
|
||||
CVE-2024-30473,0,0,cc643ea6610c054923dcda820bdbaeee3470f2fed9befe993862cdd8d56027e3,2024-07-19T13:01:44.567000
|
||||
CVE-2024-30477,0,0,2a9c94bd63166efd66be5d42497334130f49f4b0acff68b2e8385a53a877c218,2024-04-01T01:12:59.077000
|
||||
CVE-2024-30478,0,0,8648debe6405c1216a86c901736f7e8905eccc7e01f0ae6ab2126aef21a3be15,2024-04-01T01:12:59.077000
|
||||
CVE-2024-30479,0,0,dc5972e51ae5c4d9085a312951d31c7a1307033adf582d496a71c4016c267016,2024-05-17T18:36:05.263000
|
||||
@ -250119,7 +250121,7 @@ CVE-2024-31138,0,0,e862c1086da58a416fbb8daccc103d417726a0d0d62aa3907b1f09b19f01b
|
||||
CVE-2024-31139,0,0,1f981793bc0ffd1f30ec0eaae2f049959f8e2058241da40737858920eb14a44c,2024-03-28T16:07:30.893000
|
||||
CVE-2024-31140,0,0,1880c35ac5ba5af45eb21413401eeeaab09be8abf223654f6041d65ff3324893,2024-03-28T16:07:30.893000
|
||||
CVE-2024-31142,0,0,16502fe8420294098dded506476ced118645fadee97cfcf27213cce5ae7650bd,2024-05-16T15:44:44.683000
|
||||
CVE-2024-31143,0,1,eabf4443a972046b843b5c51a5a64a52c1ff6d2355a7d22418dbd22e53cf86f5,2024-07-19T13:01:44.567000
|
||||
CVE-2024-31143,0,0,eabf4443a972046b843b5c51a5a64a52c1ff6d2355a7d22418dbd22e53cf86f5,2024-07-19T13:01:44.567000
|
||||
CVE-2024-3115,0,0,ce15a233f41ff0461e80772019f46030689b0b2d2d5c745fde6ced2663519f76,2024-06-28T13:22:33.400000
|
||||
CVE-2024-31156,0,0,0196e496a3b7a6255c15a0e2200e98a2f53059591b5db0d973b7d4520d1de2fe,2024-05-08T17:05:24.083000
|
||||
CVE-2024-31159,0,0,548f0ebc12c631be1a59b512bab01930265194a04487b6bd3b57e79e2e54c960,2024-06-17T12:42:04.623000
|
||||
@ -250494,11 +250496,11 @@ CVE-2024-31666,0,0,253643df7e9c7fc7c94316b23bbda0edfbf28e84ffeb8510af634fd8ae7e9
|
||||
CVE-2024-3167,0,0,0e0e401d957a36adf31f389f0d7fa47f7901c0598b7b2fd42d4c75bdbdd76e80,2024-04-26T15:55:58.810000
|
||||
CVE-2024-31673,0,0,f08fb9f910c3a1076d50c31d40d404a72ee29f978665ed5faea697632994477c,2024-05-06T12:44:56.377000
|
||||
CVE-2024-31678,0,0,a039b430a4b65e0b97046276b6ed1c632f765fc4e4053aa5427aeefb4dac3d98,2024-04-12T12:44:04.930000
|
||||
CVE-2024-3168,0,1,1ec3737493fc3921401acce4dd6cdaf4843a7c7b01b4b9af8fa2c172a8f9fd71,2024-07-19T13:25:11.660000
|
||||
CVE-2024-3168,0,0,1ec3737493fc3921401acce4dd6cdaf4843a7c7b01b4b9af8fa2c172a8f9fd71,2024-07-19T13:25:11.660000
|
||||
CVE-2024-31680,0,0,7e1908b87f42141dc482d017d5b62a6782bb8342605d50fe2c839034d8e94921,2024-04-17T12:48:07.510000
|
||||
CVE-2024-31682,0,0,42ea6293b90227c97d91195ff4d0e78cbfa746fc21aebe2add0640f7549a80aa,2024-06-04T16:57:41.057000
|
||||
CVE-2024-31684,0,0,ad75a69893dade6ac7e684ae6347f5d7476c0bca032591c2e980bc01013d54f5,2024-06-03T19:23:17.807000
|
||||
CVE-2024-3169,0,1,d7b1415d8a31a5e1c6093ce8ac7dbac2e148bf41fec7619fab20863604b5192c,2024-07-19T13:24:56.617000
|
||||
CVE-2024-3169,0,0,d7b1415d8a31a5e1c6093ce8ac7dbac2e148bf41fec7619fab20863604b5192c,2024-07-19T13:24:56.617000
|
||||
CVE-2024-3170,0,0,5e7358dc9ec4715298a5a689fbebf23a3d7543995cc630ed65af1176171581df,2024-07-18T15:04:35.447000
|
||||
CVE-2024-31705,0,0,1e094636fab25f55fd2bbe89fbc416ff598664e06b0094a270ee264d1d302370,2024-04-30T13:11:16.690000
|
||||
CVE-2024-3171,0,0,05e23f6e21a479cfe13415837a6ca80b006bcab87b0d88c28d88a1c1c5d48fb0,2024-07-18T15:03:07.550000
|
||||
@ -250690,7 +250692,7 @@ CVE-2024-32002,0,0,8b152fa71cb7888d307cedcb6036ff42410fe299ac886c8397e8f14b70468
|
||||
CVE-2024-32003,0,0,31311e12a1795761553a56c6af2bf7b204ba79f18fac5a0250a8b13fef254e1b,2024-04-15T13:15:31.997000
|
||||
CVE-2024-32004,0,0,46c6e95c184179de4512a1da85cf6fbcce6fe2ac4189ff7da433e0234267bb88,2024-06-26T10:15:12.050000
|
||||
CVE-2024-32005,0,0,d156f3f94a9502713f64771d89d9d58b72987fd70cae51625e32aa2c9e6ee96e,2024-04-15T13:15:31.997000
|
||||
CVE-2024-32007,0,1,7725cbb0a212ec163393c6649d2fedd94f312a7ff02ad6f3a9117280b4fa47fd,2024-07-19T13:01:44.567000
|
||||
CVE-2024-32007,0,0,7725cbb0a212ec163393c6649d2fedd94f312a7ff02ad6f3a9117280b4fa47fd,2024-07-19T13:01:44.567000
|
||||
CVE-2024-3201,0,0,9d746fb1c422de83f85c51388b2057631f70f2332b71bf082d5fbeff58a4ab1e,2024-05-24T01:15:30.977000
|
||||
CVE-2024-32017,0,0,4171151be280ba186c662a4712cd0108f86c659cb0491f443a14bc31a4f95a77,2024-06-10T18:15:31.880000
|
||||
CVE-2024-32018,0,0,a57cd84bbc4228dbc73979371818ba4496491d8c8d7ae0852269ca74ca3485fd,2024-06-10T18:15:31.980000
|
||||
@ -251976,7 +251978,7 @@ CVE-2024-34009,0,0,c189f67a4f292742e7eb11598e6740d1e1f0fe6680e397db2f39bb2455a1f
|
||||
CVE-2024-34010,0,0,e5242e4e175689c741a04991b05d676f9e3bda064e1a681e08ea1b95446de349,2024-04-30T13:11:16.690000
|
||||
CVE-2024-34011,0,0,1cdf95201b7c3fac8642eb93e0c0ec77c02ae32f22e51c68db8a6f76ced93031,2024-04-30T13:11:16.690000
|
||||
CVE-2024-34012,0,0,04f4534da5173cfce7ebae120e48f12f9b737be7b5131e98dd79deccdc3d7723,2024-06-17T12:42:04.623000
|
||||
CVE-2024-34013,0,1,31f555436f56628c9b80feda54af6c121f0002b6c021c0928728c76ed328d68f,2024-07-19T13:01:44.567000
|
||||
CVE-2024-34013,0,0,31f555436f56628c9b80feda54af6c121f0002b6c021c0928728c76ed328d68f,2024-07-19T13:01:44.567000
|
||||
CVE-2024-3402,0,0,860d32d94b28d3118ff3553c4f964ad26b3d56a8c45fca055d79619e6385e5e0,2024-06-07T14:56:05.647000
|
||||
CVE-2024-34020,0,0,c4663f98778b76c33582b9d015039d06540b400c550bf7c9ee3e5b98d9ff425a,2024-07-03T01:59:16.227000
|
||||
CVE-2024-34024,0,0,0a0d832c0db4d58a70ccecce54b6344b3f181daaf3ed5285ed66313a40334a22,2024-06-20T12:44:01.637000
|
||||
@ -252656,8 +252658,8 @@ CVE-2024-35194,0,0,d148be956e67f415d7646ff65de5a97b2b79a6aea2b1221670c2eaf58e45c
|
||||
CVE-2024-35195,0,0,6c790b50c3e78a6333f9424d693f4919101146c76421c04d91f2b605ab56962b,2024-06-10T17:16:29.563000
|
||||
CVE-2024-35196,0,0,3171bb6143cfc03b7b84aa8a6110c1e96e2a6c63c73dc2a2e171d187a366d6ee,2024-05-31T19:14:47.793000
|
||||
CVE-2024-35197,0,0,80436d6dc6299a6bdf0d8897382a6e075fe7db1c6cb2ff2d7a12468a154bde4d,2024-05-24T01:15:30.977000
|
||||
CVE-2024-35198,0,1,e4e1910e071cca78b8cacf5fa783d8f7f0d361c3968aef5cb5c4b7bfa1301c36,2024-07-19T13:01:44.567000
|
||||
CVE-2024-35199,0,1,63926bc0e462abfad7a45f61d10606c266a70501317c628aa5431346b41e8b38,2024-07-19T13:01:44.567000
|
||||
CVE-2024-35198,0,0,e4e1910e071cca78b8cacf5fa783d8f7f0d361c3968aef5cb5c4b7bfa1301c36,2024-07-19T13:01:44.567000
|
||||
CVE-2024-35199,0,0,63926bc0e462abfad7a45f61d10606c266a70501317c628aa5431346b41e8b38,2024-07-19T13:01:44.567000
|
||||
CVE-2024-3520,0,0,4d2ca8beda165968cfea3b64e955c18436397c1b54474f7a64b510b5eacd13fe,2024-05-02T18:00:37.360000
|
||||
CVE-2024-35200,0,0,4e081bc266f3339c234fd0d9836610e298ca5ba3771760c1147fa5a32be6afdb,2024-06-10T18:15:34.983000
|
||||
CVE-2024-35204,0,0,0248f812c6eb240110c4167110975a2b8317634bb6300a9657da495b3589cfbb,2024-07-03T02:01:28.703000
|
||||
@ -252745,7 +252747,7 @@ CVE-2024-3532,0,0,861b69b5ea2c2097afdbe40dd2c40123c9da7c07e730e8c939be6340175b99
|
||||
CVE-2024-35324,0,0,a9d43213d6a9d4a1ea00fc60e4d2aec7e6eb81d792aae8e17b7c5cdc773898de,2024-05-28T17:11:47.007000
|
||||
CVE-2024-35325,0,0,1b7fe21e78a882e8b6a4c7cfae193ff445584367725719b7b191a7492d8ca979,2024-06-13T18:35:19.777000
|
||||
CVE-2024-35326,0,0,041a8637b63c4ab99328a0f37e7ce67805675a92fb8add508ea59bd20c8b7897,2024-06-13T18:35:19.777000
|
||||
CVE-2024-35328,0,0,b59f9a10d9cafcc0c30cbb92cbc1b1b48a1d77c803546e764ab257e3e8abcc8e,2024-06-13T18:35:19.777000
|
||||
CVE-2024-35328,0,1,fb4ef24959ef3b86e1d1e2a626668146540c0ab6d259d48f6d635a7a92dd50be,2024-07-19T15:25:50.030000
|
||||
CVE-2024-35329,0,0,4292102d3fac0226e3e155445f438715ce7df9eb09ed90a898e6b306574b942f,2024-06-12T22:15:18.400000
|
||||
CVE-2024-3533,0,0,488bd266f4041c85454e2052fe9f29a33b96935dc189b43a270de9d8362e90d3,2024-05-17T02:39:59.617000
|
||||
CVE-2024-35333,0,0,a56b2cbb1d825bab243b29d0e8302efa743a6d64a0ad5ee6a14e21ffdd4302cd,2024-05-29T19:50:25.303000
|
||||
@ -253920,7 +253922,7 @@ CVE-2024-37062,0,0,58b116066013b6d749a8f2b0cb5ea2db72b9da7fafa4e8c628598d59a99c6
|
||||
CVE-2024-37063,0,0,80954941ce1b7f85a9ddba2aa731f5591bda02de0a05b724cd044a2e0e2bf543,2024-06-04T16:57:41.053000
|
||||
CVE-2024-37064,0,0,4c38fa1163e0fea8ab5ca1b8c699de3b9ac20f20b6e58d0f246dcde7abe2ce8c,2024-06-04T16:57:41.053000
|
||||
CVE-2024-37065,0,0,98a759a5df37913375764d521d81dec2811436d61b541015e740c355e39d43cd,2024-06-04T16:57:41.053000
|
||||
CVE-2024-37066,1,1,fbf565a13efd6d49117241734c5e5a9aae56d5ff2784cc9e258072fe32e9597c,2024-07-19T13:01:44.567000
|
||||
CVE-2024-37066,0,0,fbf565a13efd6d49117241734c5e5a9aae56d5ff2784cc9e258072fe32e9597c,2024-07-19T13:01:44.567000
|
||||
CVE-2024-3707,0,0,6bfaa46ff6eb40f5f2f9b2ce66b762ad7c8a8dd85b0bee59ae4503c9e3de8bec,2024-07-05T13:15:10.997000
|
||||
CVE-2024-37077,0,0,ff2ab30c51fd1f14ba05ba8f6a2cb5932da12571ff707f15bafd014a8f78dc32,2024-07-03T18:02:47.117000
|
||||
CVE-2024-37078,0,0,009c869d231f8709f73a489f7029f4a82b9aafc8e4c52e039b4b2d9718fdb586,2024-07-05T08:15:03.130000
|
||||
@ -254090,7 +254092,7 @@ CVE-2024-37346,0,0,a4475e8bc16526d4a2cd923965b515305302813fd73edbfa3f18575d405f6
|
||||
CVE-2024-37347,0,0,6e7baea952ef385b67b23083cebbb129c77e5630de3ec6d82658c88bc410c4ea,2024-06-21T11:22:01.687000
|
||||
CVE-2024-37348,0,0,49b92234970ec422b020245ff1e6f7259c16f36e8db6b7b874fd77e08ed0a6ef,2024-06-21T11:22:01.687000
|
||||
CVE-2024-37349,0,0,d5bdd857cd8357de07400ace5da8b29cdb394b047c72e22b130727701a2be1cc,2024-06-21T11:22:01.687000
|
||||
CVE-2024-3735,0,1,3bc0e7ae2360c04d22daf0f12463798d07ea71d58fa91621d2a939f364ece413,2024-07-19T13:15:02.083000
|
||||
CVE-2024-3735,0,0,3bc0e7ae2360c04d22daf0f12463798d07ea71d58fa91621d2a939f364ece413,2024-07-19T13:15:02.083000
|
||||
CVE-2024-37350,0,0,db322a02568c197ff2f4cce28d07f13a6d84645dcf6fb2d6d98030bff57992f6,2024-06-21T11:22:01.687000
|
||||
CVE-2024-37351,0,0,5d28c3ae9e671d4e970680119129fdfd5cef4f93d0af956f6a6aef99cac6535d,2024-06-21T11:22:01.687000
|
||||
CVE-2024-37352,0,0,8cb2d15b6cc19b492a4019e2458fe1e37bdb4a8988d34a37da730385b336d322,2024-06-21T11:22:01.687000
|
||||
@ -254140,7 +254142,7 @@ CVE-2024-37464,0,0,d5dd0cd8721de83e6db957b2a4c4526c848f707b5f4204dfeac1e6b719416
|
||||
CVE-2024-3747,0,0,3219ce820822d72e46103b803901087d25784fb8e92da6509df83502f94f1ce3,2024-05-02T18:00:37.360000
|
||||
CVE-2024-37471,0,0,5edd9f6c5e3d338e594ebab0d6a40248bc10bd2ea28750bc19b1ba1459171580,2024-07-05T12:55:51.367000
|
||||
CVE-2024-37472,0,0,3954317423d61a9d54cf49fbab6fafec302a0c0f856949b52d29a5dcc939d84d,2024-07-05T12:55:51.367000
|
||||
CVE-2024-37474,0,0,27892b3c50dd37af7a1a75e3d3fbcd24b0296e576855d96535eb10a6b108ece3,2024-07-05T12:55:51.367000
|
||||
CVE-2024-37474,0,1,e29b3ccf1312f58f8b90ea5bf768b9e4ab78293e46701b43859d8d72f1b6ca41,2024-07-19T15:34:49.460000
|
||||
CVE-2024-37476,0,0,a0f3320231f39c9c5889103930f7c304a498db0d6e09c95ec7c56af3d003c3dc,2024-07-05T12:55:51.367000
|
||||
CVE-2024-37479,0,0,b47f15244b7d8bdc435b7b058e1a43515a90d9355fb7c5cb51f1025055601a89,2024-07-02T12:09:16.907000
|
||||
CVE-2024-3748,0,0,130f91484f33c46b6a8a1b827c41c8bedf887e9f91a42beeaa1df38ecf15e978,2024-07-03T02:06:31.737000
|
||||
@ -254266,7 +254268,7 @@ CVE-2024-37798,0,0,bc04f57588d0fb28785b030c799331a26805968021d11fbacde42d13b6803
|
||||
CVE-2024-37799,0,0,7daf228a97dd80358d70cc4a662e5369bebd266eafdf0efd1951071a509a7505,2024-07-03T02:04:44.730000
|
||||
CVE-2024-3780,0,0,83484fb5b744efc24cdea9908844170c52624d067b8e01e5b8f34f841ba67ba1,2024-04-15T13:15:31.997000
|
||||
CVE-2024-37800,0,0,3aebd2faaeb84484cc68215ff2c27d755488c237f64ba208bea923e908662dd8,2024-07-05T14:11:13.163000
|
||||
CVE-2024-37802,0,0,acc621703310da7f355403e50706b571175d412f17efb19e135e56be65b914ac,2024-07-03T02:04:46.857000
|
||||
CVE-2024-37802,0,1,d144fe0e12cc92285cf5a45a291aa1263aaf8f5127240eb000b3aa69fb216783,2024-07-19T14:52:41.287000
|
||||
CVE-2024-37803,0,0,e775e15ae57e6d87a1c3eae9b2633b6fb5e2150047d8db37ba8a0df6bf917fcb,2024-07-15T16:46:21.273000
|
||||
CVE-2024-3781,0,0,0166ef6fe2c7d229a771ed8a3459c0974e3bc1428bfcd1abf209c8c2e778a8e5,2024-04-15T19:12:25.887000
|
||||
CVE-2024-37818,0,0,5cb7934ffaf0f9273124a6e156c7f80c8bbf67e7edc77dc4c583d4fc2d7c2bcb,2024-06-21T11:22:01.687000
|
||||
@ -254298,7 +254300,7 @@ CVE-2024-37878,0,0,282b497331cb5e0e568eabcf2bb041155bba14f057968afb117714a18e582
|
||||
CVE-2024-3788,0,0,6b959b24977bfe93124701dc390076a86010e99d87dbe3186e4044d17a0dbe72,2024-05-14T16:11:39.510000
|
||||
CVE-2024-37880,0,0,82eff4be44645b4491042424f1f050de41161f24ce7895f2d65362440f2e1175,2024-06-12T16:30:15.053000
|
||||
CVE-2024-37881,0,0,fafe084cbebf486f837ec15aad94ff51628af0624cdbbaa015b3cc71821530aa,2024-06-20T12:44:01.637000
|
||||
CVE-2024-37882,0,0,1591ef5f43033c48132d21762e3ee547f1087c0ab48932fd92dc93f9f374339e,2024-06-17T12:42:04.623000
|
||||
CVE-2024-37882,0,1,1684452fe9676caabbe7e5f6ee8e47e99d5ba41bf75f3c683dc771f8ab16d9ee,2024-07-19T14:57:28.583000
|
||||
CVE-2024-37883,0,0,c77acb00c6918b88f907a34f95c6331dd8026d26d9df45c23ee0d7fedcbaf4bb,2024-06-17T12:42:04.623000
|
||||
CVE-2024-37884,0,0,952c4e8fbd193a9545d9e09eebd8595200777ddf3410e4c7d9e4c780747d8c23,2024-06-17T12:42:04.623000
|
||||
CVE-2024-37885,0,0,0554ded4578d680ce028ccdfb1c66cc431ad3523cf98aaf322e17a30654cd453,2024-06-17T12:42:04.623000
|
||||
@ -254310,7 +254312,7 @@ CVE-2024-3789,0,0,2bd1998a949e0866cad7ea41db064c445677b92506394ffb5a3d7ae99f9984
|
||||
CVE-2024-37890,0,0,d8e638c3d74286b0169c02eca757908ace16d60e933c94acfab66b9500a67b5c,2024-06-20T12:44:22.977000
|
||||
CVE-2024-37891,0,0,ddade946d98463a2c8f8cfbb3e55e1c2664330986b4bd67bacc4915522a6cc76,2024-06-20T12:44:22.977000
|
||||
CVE-2024-37893,0,0,1e621ca1efe8ed2ab7c42c8bab6b80feddd2af900ca46095cf7b6980e321a4b3,2024-06-20T12:44:22.977000
|
||||
CVE-2024-37894,0,0,424d8ed8a48fd7cd5e8c57134310a02f78cc91b6a429d6219c4e31dd01ead29b,2024-06-26T12:44:29.693000
|
||||
CVE-2024-37894,0,1,5c3e1c011e44e5c8bcf6a6398118ad2efcba003a19994815d77c769e906a42dc,2024-07-19T14:15:05.957000
|
||||
CVE-2024-37895,0,0,83fc999b914f31ef5377ea2f4739df1f86727e09c7234e6711ade849e83102e2,2024-06-20T12:44:22.977000
|
||||
CVE-2024-37896,0,0,accc5cd71320f643f30fd3c58fb4ef952e3edd98e66520b2d1ebf95954392e5e,2024-06-20T12:44:22.977000
|
||||
CVE-2024-37897,0,0,eb358c8b4bf1d804a542a3de3cc644f3b57f51c972b900353c845858b20c9acf,2024-06-21T11:22:01.687000
|
||||
@ -254447,7 +254449,7 @@ CVE-2024-3812,0,0,aee0c212c8bdd18b48eb1b3684691508393eebae6c9908dea995a90b32a5da
|
||||
CVE-2024-3813,0,0,255e2bbf5db93c0e3292fd35c927e47a1f392d6327b9d4c6707ef52776c11659,2024-06-17T12:42:04.623000
|
||||
CVE-2024-3814,0,0,af559420ce1e3044689136ce469515a498db3d8c3f527cd805c49729f88c5c18,2024-06-17T12:42:04.623000
|
||||
CVE-2024-3815,0,0,b8c8a85ee4e0df355cab9e3d8b72a412d3d9d1a29cf1232bd66e69ecee9ede27,2024-06-17T12:42:04.623000
|
||||
CVE-2024-38156,0,1,b24436c85d01ced9aa10bffdcc3048064061e2106e9f06caaac14532dc6e9f6d,2024-07-19T13:01:44.567000
|
||||
CVE-2024-38156,0,0,b24436c85d01ced9aa10bffdcc3048064061e2106e9f06caaac14532dc6e9f6d,2024-07-19T13:01:44.567000
|
||||
CVE-2024-3816,0,0,ca9c8b3746ea2ebbbc383e9aa135dd99550dbafdbe5ff9c69dbe15b33a0feabf,2024-07-03T14:37:07.750000
|
||||
CVE-2024-3817,0,0,4cefb34eb15d4ef81a2470a00ac0f43601ef6263c0fd4425e7542c27d02dfa54,2024-04-18T13:04:28.900000
|
||||
CVE-2024-3818,0,0,b4c982a18364880791124fa7ba25840b7eb37a53aa1551fa23324d948b6ddd3f,2024-04-19T13:10:25.637000
|
||||
@ -254480,7 +254482,7 @@ CVE-2024-38293,0,0,db540509e2b09b1cf976c07d02eb5180e9ce221e532de6476381169b8943d
|
||||
CVE-2024-38294,0,0,cfe666b9712fab71a124db5665eed08c4872b4737e6668b46d4396d88c0aebaa,2024-06-13T18:36:09.010000
|
||||
CVE-2024-38295,0,0,03d5fac9c56dd868c4010b14a3eb31cfcfc8b05ace907fed84907dc669fa51ee,2024-06-13T18:36:09.010000
|
||||
CVE-2024-38301,0,0,f2a37402ef8b0d31ff3ea0e1d564c9225d55bf4ff53ba3d88dbb3b4cbe725ed6,2024-07-11T13:05:54.930000
|
||||
CVE-2024-38302,0,1,e77ca3bd1f42a6aa7992c70d7c2a8c98c0238a3f11a590553b92597fb717d1f6,2024-07-19T13:01:44.567000
|
||||
CVE-2024-38302,0,0,e77ca3bd1f42a6aa7992c70d7c2a8c98c0238a3f11a590553b92597fb717d1f6,2024-07-19T13:01:44.567000
|
||||
CVE-2024-38306,0,0,302c251894cd8175c95dcaa248535d0e8a6962400e46ca01099390440f888d26,2024-06-25T18:50:42.040000
|
||||
CVE-2024-3831,0,0,50e818929dc56e84afc0dd8fe8fae7a8b323529f272034386ddae5543191124f,2024-05-14T16:11:39.510000
|
||||
CVE-2024-38312,0,0,62eb62b9d7b5ef969e29b7a666a055ad4f1c195d2f96322b61c091e6e406a8ac,2024-06-17T12:43:31.090000
|
||||
@ -254753,7 +254755,7 @@ CVE-2024-3878,0,0,5053df083f23b6f337fe4f8fdf53fe0df42d421dbd3425cfd92b488e4629a9
|
||||
CVE-2024-38780,0,0,ae16337cc2f7b6345cfbc91dc7be992225f0e3cd48711d005c1594aad3b12d58,2024-07-15T07:15:14.603000
|
||||
CVE-2024-3879,0,0,a6db760401fb215a79d8f48992cc838e1a5c23839a86defd39dd342ef1c5f8a8,2024-05-17T02:40:10.177000
|
||||
CVE-2024-3880,0,0,6dd5da57a8412b823038a64a32d07af4547e4dfdd637b54b90b4556bfd34431d,2024-06-04T19:20:26
|
||||
CVE-2024-38806,0,1,aa1ff0885d521aab036aaf6506258a484aa869322b524482869e0e1df3ac4a48,2024-07-19T13:01:44.567000
|
||||
CVE-2024-38806,0,0,aa1ff0885d521aab036aaf6506258a484aa869322b524482869e0e1df3ac4a48,2024-07-19T13:01:44.567000
|
||||
CVE-2024-3881,0,0,3699310594a82ce285b52bf9c21755fa8173160a66408c76064512e538b3fcc8,2024-05-17T02:40:10.360000
|
||||
CVE-2024-3882,0,0,8cf286ca42c3a62eccb821d9ac0678dabad594eee248c127390ddaf169987d46,2024-05-17T02:40:10.457000
|
||||
CVE-2024-3883,0,0,e6bda202b9fd54c10f25f29dd8ae0cebb83b1538aee636944c2fd66bf4045fff,2024-05-02T13:27:25.103000
|
||||
@ -254833,7 +254835,7 @@ CVE-2024-39071,0,0,195ebf652ba5fdec3966b79507d582422df3145f15e690eeba2499c0a1d26
|
||||
CVE-2024-39072,0,0,31b7b2f8b8e84ff26cbb01ff0fdf400f7d970c8f96ac4f5eabe40a5bf0f78dad,2024-07-11T13:05:54.930000
|
||||
CVE-2024-3908,0,0,42c7c9b2b31f61816d945d69672e5e24b20e282cc849fd87286a4170779d810f,2024-06-04T19:20:26.660000
|
||||
CVE-2024-3909,0,0,ea272c17ff869087d9799ba3efa606456d1ea78a711f72e5984479fd9f006e55,2024-06-04T19:20:26.763000
|
||||
CVE-2024-39090,0,1,0d32ce4acc0048b7409fcf710f16d81b2ac7b3f9a846a81af31a5670d016f555,2024-07-19T13:01:44.567000
|
||||
CVE-2024-39090,0,0,0d32ce4acc0048b7409fcf710f16d81b2ac7b3f9a846a81af31a5670d016f555,2024-07-19T13:01:44.567000
|
||||
CVE-2024-3910,0,0,5517b92ffa84ce0352fdc1fcc785da8fc488f0a213ee6670945494d32f02de6a,2024-06-04T19:20:26.870000
|
||||
CVE-2024-3911,0,0,554ab1929819d1eb25e95db5b6b72b7d88b66260392eaf976b13306fbbfd7fd3,2024-07-03T02:06:52.050000
|
||||
CVE-2024-39118,0,0,c73221ddf1d7aabf1cde04e3cc8495d2b93ac9b8498b2f760ce56c4f1b9d2289,2024-07-11T18:30:13.010000
|
||||
@ -254862,7 +254864,7 @@ CVE-2024-3916,0,0,f95518a402c56c15214d8c7d6dfe42604495d4bb38ccc0f52b32e4da2a1f88
|
||||
CVE-2024-39165,0,0,73505f78c1b9aaeee94abeacaf375a0ada22d254c42d8c2b004bd82562025a88,2024-07-05T12:55:51.367000
|
||||
CVE-2024-3917,0,0,87493362103f61e3758851588aca1cc3facb0cf1f97ad5b068e06e988e9b2161,2024-07-03T02:06:53.877000
|
||||
CVE-2024-39171,0,0,979bc13509f362c564b7984548b10a6ed307c7ff17f59734c1b5aba694dfcb6e,2024-07-12T17:15:38.200000
|
||||
CVE-2024-39173,0,1,4a92644ed2652b9bb3da2843df35fed8ae84e8e0843ed6c47d90979d53a77858,2024-07-19T13:01:44.567000
|
||||
CVE-2024-39173,0,0,4a92644ed2652b9bb3da2843df35fed8ae84e8e0843ed6c47d90979d53a77858,2024-07-19T13:01:44.567000
|
||||
CVE-2024-39174,0,0,e23d16c301dd77bcbf0c998cdb1fd9e2250ff32896205d07ec7d2fbcb29c498f,2024-07-08T15:49:22.437000
|
||||
CVE-2024-39178,0,0,941809397cc55551932a6950a6f2b95c443b08d8ccb5b2192a192df3dfe41968,2024-07-09T16:22:51.013000
|
||||
CVE-2024-3918,0,0,476a46be6ec9c148a29f5d8b4706a927d6b38a7387c9465eb6003c281a1d7618,2024-05-24T01:15:30.977000
|
||||
@ -254958,7 +254960,7 @@ CVE-2024-39429,0,0,c0f0ea0961d667a14523724c8241b9d1f206aa304e922487a3184313c2bde
|
||||
CVE-2024-3943,0,0,fecb7894fc8f71bb1eb318ec20be6409020b761b3221fbb9ca597f81fb48f5da,2024-05-30T13:15:41.297000
|
||||
CVE-2024-39430,0,0,64e823bdb7084987f6e4f2dcc4ad0f20791cdd196a0003b3469db98557837678,2024-07-01T12:37:24.220000
|
||||
CVE-2024-3945,0,0,f529a76504b589632a786b994a7e59172142cd26cd001d628e7f3ff9658da8b1,2024-05-30T13:15:41.297000
|
||||
CVE-2024-39457,0,1,56e1deb6213e966d38aa162f6114a67ee205460480d1b6740f1a9974b4d73e7f,2024-07-19T13:01:44.567000
|
||||
CVE-2024-39457,0,0,56e1deb6213e966d38aa162f6114a67ee205460480d1b6740f1a9974b4d73e7f,2024-07-19T13:01:44.567000
|
||||
CVE-2024-39458,0,0,057d26d6064abe38c6844996c076741573b3fb5797f6e26a9cfc5dd443dbc18e,2024-06-27T12:47:19.847000
|
||||
CVE-2024-39459,0,0,a2d4a360bea52f929e9e67b789c87ad1cf52c7054f238a5096a4acbd8cc22855,2024-06-27T12:47:19.847000
|
||||
CVE-2024-3946,0,0,ab824b4f2a8403c27b100f5c3d6e7f8d9dd1c20c9aa138888e04631941f166f6,2024-05-30T13:15:41.297000
|
||||
@ -255194,11 +255196,11 @@ CVE-2024-39901,0,0,2e70a8f9f46cc19984c51f63370a0f8333bfb1ff58b809a78b0486415e619
|
||||
CVE-2024-39903,0,0,138b301be2353a9e3b0b27c4af1a1a55145a503c57863f4b07d601b2ac0aca9c,2024-07-12T16:34:58.687000
|
||||
CVE-2024-39904,0,0,12dfcb7489fbbc04166f8899b5558b4641d719eb33eca1dcad68903cd7888843,2024-07-11T18:09:58.777000
|
||||
CVE-2024-39905,0,0,80f913a61cef6f1c2b28da4a228824e63a50833144469e0ed56e623dda317247,2024-07-11T18:09:58.777000
|
||||
CVE-2024-39907,0,1,bd1711309f44a56ff6fd5c90a3d3730e0655f011ed3baab78935be3a78a05112,2024-07-19T13:01:44.567000
|
||||
CVE-2024-39907,0,0,bd1711309f44a56ff6fd5c90a3d3730e0655f011ed3baab78935be3a78a05112,2024-07-19T13:01:44.567000
|
||||
CVE-2024-39908,0,0,08d14bdaf18f2ed74e9b6ee71dfe514c41d48f98781bfe1f038503cd39467df4,2024-07-17T13:34:20.520000
|
||||
CVE-2024-39909,0,0,84d207bd7916a7aa0c749989b5f6df126cc82f60739ec52f44f8de2604f130ed,2024-07-12T16:34:58.687000
|
||||
CVE-2024-3991,0,0,8fc5cec164b75a61473f46907d411f1d06a3bf1fdc70a00ae47e8c931a83fb1a,2024-05-02T18:00:37.360000
|
||||
CVE-2024-39911,0,1,ce593cca829f23641e34802a63c29a224f25ec101baa494868b880f46f8dbf40,2024-07-19T13:01:44.567000
|
||||
CVE-2024-39911,0,0,ce593cca829f23641e34802a63c29a224f25ec101baa494868b880f46f8dbf40,2024-07-19T13:01:44.567000
|
||||
CVE-2024-39912,0,0,4436d60855b958a3375758a6aab42c07e9fab81e2780af44769632fe57f2c7e5,2024-07-16T13:43:58.773000
|
||||
CVE-2024-39914,0,0,fc85dcd483038cc9947eead0920b62559c30fc46579f4bdee42403db053af4c1,2024-07-12T16:34:58.687000
|
||||
CVE-2024-39915,0,0,5ec2bdefe8c5cab79f2425e6d7423ca1431bc3eed9fc27e781bc8d91b05089c7,2024-07-16T13:43:58.773000
|
||||
@ -255222,6 +255224,8 @@ CVE-2024-39937,0,0,1f82f5b58ad230c732d9cc7b90ed7f292cb38d4f538cd1c141ede474ebd9d
|
||||
CVE-2024-3994,0,0,1a9bed43f4b2f43f8d685322cd3b5005094af7345fc065cd7144b7703ac2b568,2024-04-25T13:18:02.660000
|
||||
CVE-2024-39943,0,0,3de3703190bb81e39ee7c36efe8f307ccc0155c112a035e437cb302295eb462f,2024-07-08T16:42:25.603000
|
||||
CVE-2024-3995,0,0,a7fe690817691037765b680c602849c2a36e767bb2849159693fe5a7864f46cb,2024-07-01T14:15:05.680000
|
||||
CVE-2024-39962,1,1,b1aaa4e08376ce43b551fc23e10a14348461b89da0b769d5b76b6b4090edc3fc,2024-07-19T15:15:10.320000
|
||||
CVE-2024-39963,1,1,ee059b8c54354e03d7be8b8edac5b858d32e3796923f5746a1878d0fad50b757,2024-07-19T15:15:10.383000
|
||||
CVE-2024-3997,0,0,1f2576b07f1c26f802b0f1e551eeeee57100d1eaa419296265017e09a1456b97,2024-05-24T01:15:30.977000
|
||||
CVE-2024-3999,0,0,4248dd2372447004bc43614b1896e27a040049c0dba411de9512ee0e6f816fb7,2024-07-03T15:44:56.130000
|
||||
CVE-2024-4000,0,0,7c8c2f5334fecf0f2ab22d97b46108b7e41243cb0a54444d2343bca0b6a11052,2024-05-02T18:00:37.360000
|
||||
@ -255348,23 +255352,23 @@ CVE-2024-4062,0,0,695b7b6d53140e91ee1c447f6f5acafad0b73fbbd2558cb89ae9d4c0c7616e
|
||||
CVE-2024-40624,0,0,4a20911ba5017c22f7067e7eea43b4f5d49d24af0046266156676a49862c806b,2024-07-16T13:43:58.773000
|
||||
CVE-2024-40626,0,0,39de0d110e3c1039d3a20d10cfa670212de054a0a02a529b738910a4f0544e46,2024-07-16T18:00:02.110000
|
||||
CVE-2024-40627,0,0,9135682f430d5bd3e848a020970fdae52f5ba66833f8d323b6fb81718428c2a6,2024-07-16T13:43:58.773000
|
||||
CVE-2024-40628,0,1,97542434aaedd6d0d3469c237db978665a1c67f0643ba1911e47734618959708,2024-07-19T13:01:44.567000
|
||||
CVE-2024-40629,0,1,5aade287d48ab090ae707ebaff210653202d02d310a954cbbb601ee1614f7a9d,2024-07-19T13:01:44.567000
|
||||
CVE-2024-40628,0,0,97542434aaedd6d0d3469c237db978665a1c67f0643ba1911e47734618959708,2024-07-19T13:01:44.567000
|
||||
CVE-2024-40629,0,0,5aade287d48ab090ae707ebaff210653202d02d310a954cbbb601ee1614f7a9d,2024-07-19T13:01:44.567000
|
||||
CVE-2024-4063,0,0,a86a41867bbd8268c01f6e42ab82f3f97444cd9242de57f43e4b9e5669394e5f,2024-06-04T19:20:29.120000
|
||||
CVE-2024-40630,0,0,7de2616afe35fe6a2f4466f98346fd28ee106a7dd06220a48b0a183cb2c5ca6f,2024-07-16T13:43:58.773000
|
||||
CVE-2024-40631,0,0,e76fc6e49d84a60697f94ea752f6e05b7f5417e39730b8ace11ee475f8eb8441,2024-07-16T13:43:58.773000
|
||||
CVE-2024-40632,0,0,e6e0d67d4d0269bad5508951d35718e2d8be48cd6b922ab10030a5117e405f96,2024-07-16T13:43:58.773000
|
||||
CVE-2024-40633,0,0,cb8b1e46d2fb0350ee65397b524eda33b035785c4ff54d8f631326909af07b87,2024-07-18T12:28:43.707000
|
||||
CVE-2024-40636,0,0,98744b954b3d196b3f10d684008952126f958b809a4f56d792514a1180b74df0,2024-07-18T12:28:43.707000
|
||||
CVE-2024-40637,0,0,54ffb49542381dd02d325bdc0440dd33e103feee559c71f6b3bfb9145dba117f,2024-07-17T13:34:20.520000
|
||||
CVE-2024-40637,0,1,8f01e513c3194bcf30056752321b26e2f21549acaed31b1fc0f5890d359b45ae,2024-07-19T14:37:17.863000
|
||||
CVE-2024-40639,0,0,8bbb50b2a25542a9b7af4d56fa6e5b2d2c32a2fc32f95961ce4984af08c80bab,2024-07-17T20:15:06.603000
|
||||
CVE-2024-4064,0,0,3a1a40467a64f04bfa80ae5c066454b06b4092014a9e47cc1a50eb6eb22d315c,2024-05-17T02:40:14.223000
|
||||
CVE-2024-40640,0,0,7e1f28a17873c57850e387e604bc4923eccdf39126e84bd67e6dd03b6e2f6417,2024-07-18T12:28:43.707000
|
||||
CVE-2024-40641,0,0,522a4579f3ed40c8409e84cbd3831ae35d4e964d4b63997db7ecee22d7238032,2024-07-18T12:28:43.707000
|
||||
CVE-2024-40642,0,1,52188ba83c5687a42ca6bf3b40cbb605fd36febbce87a10af01b131e81625f9d,2024-07-19T13:01:44.567000
|
||||
CVE-2024-40644,0,1,8d0ece2aba41191aa8cffc7ae7308207db8244882c164f6563e6a939c3d6015e,2024-07-19T13:01:44.567000
|
||||
CVE-2024-40647,0,1,20e5e587d0777d0bcce77df9be17d322be6b8b310278f85b131c82750480c300,2024-07-19T13:01:44.567000
|
||||
CVE-2024-40648,0,1,e2349aa5f69c8421d1802e501ed70a5d9670cb28532fa26d74d83879e98ba750,2024-07-19T13:01:44.567000
|
||||
CVE-2024-40642,0,0,52188ba83c5687a42ca6bf3b40cbb605fd36febbce87a10af01b131e81625f9d,2024-07-19T13:01:44.567000
|
||||
CVE-2024-40644,0,0,8d0ece2aba41191aa8cffc7ae7308207db8244882c164f6563e6a939c3d6015e,2024-07-19T13:01:44.567000
|
||||
CVE-2024-40647,0,0,20e5e587d0777d0bcce77df9be17d322be6b8b310278f85b131c82750480c300,2024-07-19T13:01:44.567000
|
||||
CVE-2024-40648,0,0,e2349aa5f69c8421d1802e501ed70a5d9670cb28532fa26d74d83879e98ba750,2024-07-19T13:01:44.567000
|
||||
CVE-2024-4065,0,0,e9243298c32ccba8ab1ac6d427150517ee98217790d2dec0b1b5ec685d8cbc83,2024-06-04T19:20:29.227000
|
||||
CVE-2024-4066,0,0,5674d1317b0a03adb324e31f70d35a87031f26ca2ea2869349483359d081bdf7,2024-06-04T19:20:29.323000
|
||||
CVE-2024-4067,0,0,9e7f1211bf79e7110903241dcc25ab8bd46e04dab02a9e051766a97ad7f670bf,2024-05-22T12:15:10.767000
|
||||
@ -255374,7 +255378,7 @@ CVE-2024-40690,0,0,0a05f7a4f7971e105a22713da576e2849ab9ee90c08902f265b260950371b
|
||||
CVE-2024-4070,0,0,f50441c69b27e00682c793729b411e41b0ab8839510e28fbeccbd72a35bcaeb5,2024-06-04T19:20:29.567000
|
||||
CVE-2024-4071,0,0,5f6b5ae6c8e3d6e0ce3e89718b14a6bb17b22a46ae9131966ebec62404b12da9,2024-05-17T02:40:14.747000
|
||||
CVE-2024-4072,0,0,5325ee2ea26a58f6ec285799bb6ee6c62eeadace5f641482183f3a76d39bf009,2024-05-17T02:40:14.847000
|
||||
CVE-2024-40724,0,1,07e21dd8086f51b2f0ac6b15bc7615c27469a6b73a4728771314d2544f7ccb8c,2024-07-19T13:01:44.567000
|
||||
CVE-2024-40724,0,0,07e21dd8086f51b2f0ac6b15bc7615c27469a6b73a4728771314d2544f7ccb8c,2024-07-19T13:01:44.567000
|
||||
CVE-2024-40725,0,0,11d004e87674b6d12438f654b88589fb007f4c0a9cd9fd16855d5d14c7be5722,2024-07-18T12:28:43.707000
|
||||
CVE-2024-40726,0,0,763881d353b2a872c395d06db8ff47aa2480183ffa56c57536446e062ec43bc5,2024-07-11T15:06:22.967000
|
||||
CVE-2024-40727,0,0,b9db12f74fa9e60fafdd87d2e3b118721f9da9edf52efc272fb39aa64e4cd584,2024-07-11T15:06:23.850000
|
||||
@ -255525,8 +255529,8 @@ CVE-2024-41005,0,0,95f568882fd1e16260f486a6121f76b4a7b47a9225c03cbcf7d46d652c71f
|
||||
CVE-2024-41006,0,0,58bd6c502a79651b26621eacf2c0dc46dab924e02809c912fba2631a5541c0df,2024-07-12T16:34:58.687000
|
||||
CVE-2024-41007,0,0,3a5f8217b27f31f94659ee14ad4d3eb5769831e9479c2468b28332be75d954c4,2024-07-18T12:15:03.357000
|
||||
CVE-2024-41008,0,0,44accff6edd09848f65c4ea30c272c9f4e4cafd7e8013f5ed231ff575ad7b53e,2024-07-16T13:43:58.773000
|
||||
CVE-2024-41009,0,0,1ef19d3a6350817f09e7f0a1cc785e4d5b3dd9bf898020c5ce3302bfe332d3bc,2024-07-17T13:34:20.520000
|
||||
CVE-2024-41010,0,0,86472970e8578f9cf515f3b02e7178e84fc33304ffe01eed8e1ec71ca37e601c,2024-07-18T12:15:03.453000
|
||||
CVE-2024-41009,0,1,b973764a3f5390614759bf6dad52e86dad86b20c98263f759698c0703f8fb179,2024-07-19T15:06:23.827000
|
||||
CVE-2024-41010,0,1,ae8d1d1b3ebaab40dc6ac6afde49ce66895bb7f4e7ee92f295ff5ca1fa79b217,2024-07-19T15:24:59.137000
|
||||
CVE-2024-41011,0,0,5448bb43e82962b35456558e414651f36e8eafb86b92da98f77189318aaccec2,2024-07-18T12:28:43.707000
|
||||
CVE-2024-4102,0,0,1b0aaa7efbf772a3034d5138f2cde018af6a8f41a0229b0c5f36e4d66092a2a3,2024-07-09T18:19:14.047000
|
||||
CVE-2024-4103,0,0,ff27f3988e30e41f465bfc5b7800f7ae2f96b1e2cd71c1414de16617b75fe4fe,2024-05-14T16:11:39.510000
|
||||
@ -255534,16 +255538,16 @@ CVE-2024-4104,0,0,069e7afb1610585640d00d566d3fc4756dff3571ed269cd2ef1d63c8e8ce45
|
||||
CVE-2024-4105,0,0,5dcbaf8d64f37f58816de0666875f99544dc68f0a9ee2a9bf8d53a5a9c60191e,2024-06-26T12:44:29.693000
|
||||
CVE-2024-4106,0,0,3fc11eee434aa540a2e37440bd2e3ba6e18faae117022d3f68496d405f62ba7f,2024-06-26T12:44:29.693000
|
||||
CVE-2024-4107,0,0,ce88498baf95f06d1267d29854f2a9888ac0ddfe7fc00ea3036ccad453e487fa,2024-05-14T16:11:39.510000
|
||||
CVE-2024-41107,0,1,23274597458da7a9f06d14f567bbc9c55442ae3cacd9818d933bb7ba0a974592,2024-07-19T13:01:44.567000
|
||||
CVE-2024-41107,0,1,652a52b6606e110f3534fe4630dd6711a03cc8b36414513968170cc7d60165da,2024-07-19T14:15:06.080000
|
||||
CVE-2024-4111,0,0,a3e4bcb39778569b3be84e8d38a6497dbc2fc6b5a3693d9cc21532b8df994ada,2024-06-04T19:20:29.827000
|
||||
CVE-2024-41111,0,1,52a25c3214b943235db4ca14cf3f4d1ccd955b2141e1d6abf224fc5c4732905d,2024-07-19T13:01:44.567000
|
||||
CVE-2024-41111,0,0,52a25c3214b943235db4ca14cf3f4d1ccd955b2141e1d6abf224fc5c4732905d,2024-07-19T13:01:44.567000
|
||||
CVE-2024-4112,0,0,66f333e775e64b1480506fa97b6a827bfd5dac62e9e10520346f3a867cac6cdd,2024-05-17T02:40:15.740000
|
||||
CVE-2024-4113,0,0,e0d06b1b449a5e3093ad238184a1fc3bb7c021d3199342ed4f77b54476531329,2024-05-17T02:40:15.830000
|
||||
CVE-2024-4114,0,0,387f9ca6df27ba000d0f44d990ccd6bb074258bb946c87938379db9652dc0a14,2024-05-17T02:40:15.917000
|
||||
CVE-2024-4115,0,0,89bc89df66a101d446d6568b359dec67345256fa579984420e2e2fe7ea4994ac,2024-06-04T19:20:29.937000
|
||||
CVE-2024-4116,0,0,6ee64e85b69f8f11f599040da371bf02d3a94742e1ecd0f467d9a48f26243458,2024-05-17T02:40:16.110000
|
||||
CVE-2024-4117,0,0,439d2da59fd01a25f254df6698027149837f261eb1a16ba5752d7e62667d1bfc,2024-06-04T19:20:30.043000
|
||||
CVE-2024-41172,0,1,7ff2c1ab31750efec911d6f77936d20ab0d41d18e897382dcdb87b18ab700b32,2024-07-19T13:01:44.567000
|
||||
CVE-2024-41172,0,0,7ff2c1ab31750efec911d6f77936d20ab0d41d18e897382dcdb87b18ab700b32,2024-07-19T13:01:44.567000
|
||||
CVE-2024-4118,0,0,261b7c2db2db4c5bd0863007ba022afd6141eeb3c40d43094e801a457a5edb93,2024-06-04T19:20:30.147000
|
||||
CVE-2024-41184,0,0,3aa7a7d3229054604eab34d61ec1dc93a7d382f6b0438d40096cf79453690f27,2024-07-18T14:15:05.137000
|
||||
CVE-2024-4119,0,0,1787463dab796293e9249fc34f7a40843b12d1d129a7d5ccdb513e5ec2672067,2024-06-04T19:20:30.247000
|
||||
@ -256512,11 +256516,11 @@ CVE-2024-5245,0,0,8367cc316d7fd622697ed020483e2edc6264aea8aa776978b7228518baa317
|
||||
CVE-2024-5246,0,0,481ebf23b779dd3e32e9e0cda77aaee7d0bfc9eca82266cde6c77415f4c9c730,2024-07-03T02:08:44.767000
|
||||
CVE-2024-5247,0,0,fdfe6c1388c42f602cdcb0ffda38b56b5f1ed960e60bfada435f42d294b2956e,2024-05-24T01:15:30.977000
|
||||
CVE-2024-5248,0,0,2c3e52f7d10efa84a65c2d56e808c7c6b6e082b4d0e6c7b1b0a814f5918d2bf2,2024-06-07T14:56:05.647000
|
||||
CVE-2024-5251,0,0,4796cbb3b42f0a690ee03b3cd93b6294e6cec2e698949c47a2ce09d6d1f7aabc,2024-07-17T13:34:20.520000
|
||||
CVE-2024-5252,0,0,35e14245b82aa24bc3c367b1abfd026ee06fb2416bc15456ada1738976a26f10,2024-07-17T13:34:20.520000
|
||||
CVE-2024-5253,0,0,bf9183552c283029a0bdb30e3d7c77bba5cfa7fe6141ceea8ac0eb9c1982ed9e,2024-07-17T13:34:20.520000
|
||||
CVE-2024-5254,0,0,db3b82ed38e66cc455a38971516e009071894574c4da01a94cae994f4fcf4c33,2024-07-17T13:34:20.520000
|
||||
CVE-2024-5255,0,0,583678a17d043ddf4c248db87c3d2e96379310b5323b537393f97b7d62335487,2024-07-17T13:34:20.520000
|
||||
CVE-2024-5251,0,1,7d84d2df7bf6674f7d634954defb2f38b0363c19ae19f78012df0aa633abf27a,2024-07-19T15:25:30.980000
|
||||
CVE-2024-5252,0,1,1b28d536afc88eae5088fe06ff49428bbad5ffcb2aa7139fe40c4c06d2601422,2024-07-19T15:29:35.447000
|
||||
CVE-2024-5253,0,1,73f9562f224a9a11b8b8279a7bf00d920003fa046cb7c88a3a55caf281adabe4,2024-07-19T15:30:34.717000
|
||||
CVE-2024-5254,0,1,78882d871be0a19bc95888168cf12372f503de77ac359f287536c8f062c38532,2024-07-19T15:32:05.560000
|
||||
CVE-2024-5255,0,1,a9d47c22e8985fc8d8b40f4bef3272595484bdbc8485e44830cb58ee997ab90f,2024-07-19T15:32:18.850000
|
||||
CVE-2024-5256,0,0,7546c1517da1882e18d942ab700b65cdd397cd67565c940d6efb24b85fa1c2bd,2024-06-07T14:56:05.647000
|
||||
CVE-2024-5257,0,0,e4fba0a5c9dc635ae9582dcee356a08c90165a6e8c8a0a01b6dfbef5e885cd24,2024-07-12T16:54:34.517000
|
||||
CVE-2024-5258,0,0,51134eb56f05332c584317818ff995de56b2de598a9752cb1990f31f73c535e3,2024-05-24T01:15:30.977000
|
||||
@ -256573,7 +256577,7 @@ CVE-2024-5314,0,0,a7cdac28c15b59d972bbd1ad7f63aae58232f4c63fcf8544d4cfc91c709ee3
|
||||
CVE-2024-5315,0,0,8579169b825e98cf3238daa1adb0a4d2ea9e4baf40a7a9906b16d52fd8bd309a,2024-05-24T13:03:05.093000
|
||||
CVE-2024-5317,0,0,ca9413f34c0b442e0ebe516eaf4713c47241a346ee54ab90be673b58c28dbb75,2024-06-11T17:22:08.007000
|
||||
CVE-2024-5318,0,0,57c4f59f6a451d6f05e81bdd8afab94c5de1c9afb56a5a0aa1d0fc569b3192c2,2024-05-24T18:09:20.027000
|
||||
CVE-2024-5321,0,1,fec7922c58ce8cd726297ee4febb74d7bc97b03487c287977380c1cb890912c0,2024-07-19T13:01:44.567000
|
||||
CVE-2024-5321,0,0,fec7922c58ce8cd726297ee4febb74d7bc97b03487c287977380c1cb890912c0,2024-07-19T13:01:44.567000
|
||||
CVE-2024-5322,0,0,34d5429047e5a1854ac8faff5145e41fb19a8e0b0a19efc95aa08c4b8fb570df,2024-07-02T12:09:16.907000
|
||||
CVE-2024-5324,0,0,5e2a0edd7d52fdd781c71961fc96e8e4892ea284c973f4fdaaac9fb76e2276bc,2024-06-06T14:17:35.017000
|
||||
CVE-2024-5325,0,0,18c2f6d476daa18335c2e6768222449a066fc898992619a7b5e7a30be6df7d11,2024-07-12T16:34:58.687000
|
||||
@ -256795,7 +256799,7 @@ CVE-2024-5598,0,0,dea97cf43130ffc7ec8c1e0439cc4a1d595d430c970e2a6bb452f71273924c
|
||||
CVE-2024-5599,0,0,e2a52dc8fb81a6d016503d8fbd621cff191add725c15ae779eff77632921d437,2024-06-11T18:24:39.057000
|
||||
CVE-2024-5600,0,0,cbb44154b53a9ff19bb9b8607051bff7897a220aae51af46369a9f79546fe419,2024-07-09T18:19:14.047000
|
||||
CVE-2024-5601,0,0,e22064ef868b7763ab6a035a66dc94fbf47f776f059b7b471d5873c49e582f7a,2024-06-28T13:25:40.677000
|
||||
CVE-2024-5604,0,1,3fc5f4822707c10b93ac858cb809bfd200b008140e07ef20d84f7ed8208c8435,2024-07-19T13:01:44.567000
|
||||
CVE-2024-5604,0,0,3fc5f4822707c10b93ac858cb809bfd200b008140e07ef20d84f7ed8208c8435,2024-07-19T13:01:44.567000
|
||||
CVE-2024-5605,0,0,e4ab13f44aee681834db0b09d11c486a794d1d811bed7db97810cd3bad2b3e86,2024-07-17T14:02:16.537000
|
||||
CVE-2024-5606,0,0,954b2855130670426569975aef75e63a345bb5d86a76ecc86734db71e762262f,2024-07-08T14:19:15.450000
|
||||
CVE-2024-5607,0,0,ae3ce9023a2ae1c6b37a7951db185bd6eb638714bf41f7bd2c0952a16523527d,2024-06-07T14:56:05.647000
|
||||
@ -256805,10 +256809,10 @@ CVE-2024-5612,0,0,c48d9d85ab6fb6f375c9bae41bb41f013f62cc7d97e523d92c986f223f9ac3
|
||||
CVE-2024-5613,0,0,d9550d95a21bd950ae7717d597381d24b04054ec554e6d52d8ed280e70034f18,2024-06-10T02:52:08.267000
|
||||
CVE-2024-5615,0,0,0b80425a78ce7696e161012e7d95058779d0861d3b6927cc392e7a553c227a9e,2024-06-11T17:55:16.103000
|
||||
CVE-2024-5616,0,0,5078c1aa917db98652cc6ffd2b310b244194da0fcbabfd9d4ed8ccf7b99de509,2024-07-08T15:49:22.437000
|
||||
CVE-2024-5618,0,1,ebe36b14a25a2ade3e64c60f6c84014fea87ffe3e6c056e2ec2d4c12a7dbd5bd,2024-07-19T13:01:44.567000
|
||||
CVE-2024-5619,0,1,1dd4749b6be6d7e6dc7272136e2a3e724b171183a64961a248fdb4990b57a472,2024-07-19T13:01:44.567000
|
||||
CVE-2024-5620,0,1,e414f2b903fd835e5fe0db0e605e2aee6c78620744a7541756005a422222af46,2024-07-19T13:01:44.567000
|
||||
CVE-2024-5625,0,1,2e44049535f78135e500a8f8d54d8f4d59ba5936e80e3b134df5c51262f22971,2024-07-19T13:01:44.567000
|
||||
CVE-2024-5618,0,0,ebe36b14a25a2ade3e64c60f6c84014fea87ffe3e6c056e2ec2d4c12a7dbd5bd,2024-07-19T13:01:44.567000
|
||||
CVE-2024-5619,0,0,1dd4749b6be6d7e6dc7272136e2a3e724b171183a64961a248fdb4990b57a472,2024-07-19T13:01:44.567000
|
||||
CVE-2024-5620,0,0,e414f2b903fd835e5fe0db0e605e2aee6c78620744a7541756005a422222af46,2024-07-19T13:01:44.567000
|
||||
CVE-2024-5625,0,0,2e44049535f78135e500a8f8d54d8f4d59ba5936e80e3b134df5c51262f22971,2024-07-19T13:01:44.567000
|
||||
CVE-2024-5626,0,0,7932ffd73aaf78514b606728bf1a761d189d38c2a5a283b9b4110e01ed2b4d16,2024-07-12T12:49:07.030000
|
||||
CVE-2024-5627,0,0,b223ea977e14432dc305de4592ca7e0252873a120062584093cd834d6b6d0c82,2024-07-15T13:00:34.853000
|
||||
CVE-2024-5629,0,0,7b249822418cf5aa1c707605ba6baf660f2f435a4da7f400697e48d05f897bc1,2024-06-18T18:31:05.663000
|
||||
@ -257049,7 +257053,7 @@ CVE-2024-5971,0,0,357987ac7415afbcb31d94ddf79e1610c1e4bcbc7b687b78aa636fbb9a4c84
|
||||
CVE-2024-5972,0,0,3700c5b3eb4bcd1d3bafe18b568e7aab0a0471128c3ce92a2f73ba8aa9a9cb4f,2024-06-28T19:15:07.500000
|
||||
CVE-2024-5974,0,0,fd52c68141e6ff6d700f6466616845a44fbd39c5ab415ece01ca8d456d4e8b30,2024-07-09T18:19:14.047000
|
||||
CVE-2024-5976,0,0,0d4a23e2583616de98536e1ad4d7b2a882021b32cad502d23a934bbf343ef666,2024-06-17T12:43:31.090000
|
||||
CVE-2024-5977,0,1,727b1e5bc9a2fdbbe2a201a80b666337239515f573706de037d068dde3bc3f8c,2024-07-19T13:01:44.567000
|
||||
CVE-2024-5977,0,0,727b1e5bc9a2fdbbe2a201a80b666337239515f573706de037d068dde3bc3f8c,2024-07-19T13:01:44.567000
|
||||
CVE-2024-5979,0,0,2890db7bdc2045eea751460532af007391576d7da8d9f838bf14583c0290ae73,2024-06-27T19:25:12.067000
|
||||
CVE-2024-5980,0,0,915920a5c8bdff0e9b559c6fdf1db06079562e1ee1f1333b9d9e824a78939fce,2024-06-27T19:25:12.067000
|
||||
CVE-2024-5981,0,0,6efd4ce65d0be4286973240a22b49938ee7da116677222eebd9958d92f31bba4,2024-06-17T12:43:31.090000
|
||||
@ -257064,20 +257068,20 @@ CVE-2024-5993,0,0,b45a0ae570b278a2a66647d60174ec8036c753d27cba9d6e9660698bbc3fa2
|
||||
CVE-2024-5994,0,0,c1974f8e417911883c192155213f25e6e809cb75c20fd828172f5e744b8258d3,2024-06-17T12:42:04.623000
|
||||
CVE-2024-5995,0,0,8d0649a03e9f8bd101521287664fde419efa05e0cba1e926a7b9f4f0e9253177,2024-06-17T12:42:04.623000
|
||||
CVE-2024-5996,0,0,918847ed31e9a63de46ac039dd01d572fa8e980691ed5ebebacc312a719edc7b,2024-06-17T12:42:04.623000
|
||||
CVE-2024-5997,0,1,f617c2b08e97b588522e326e884bd8b2d7e5f36631694be3e5e4c23ccbcfc0bd,2024-07-19T13:01:44.567000
|
||||
CVE-2024-5997,0,0,f617c2b08e97b588522e326e884bd8b2d7e5f36631694be3e5e4c23ccbcfc0bd,2024-07-19T13:01:44.567000
|
||||
CVE-2024-6000,0,0,4ab86aa4bce235d1120437fd5cb3b34fb6bdae181005ebaa070e8c0afe83cf87,2024-06-17T12:42:04.623000
|
||||
CVE-2024-6003,0,0,14279c0384813c4cf50ab75a79953f2b0469d9bedd7f76c2b6cebfd90962fd14,2024-06-17T16:15:16.027000
|
||||
CVE-2024-6005,0,0,4d74c6c4a521a164f63a9fe529c141dc8da0592a0575e27e0e62d822beb9b877,2024-06-17T12:42:04.623000
|
||||
CVE-2024-6006,0,0,da8e313e14db96255e115f081c2f199aa734bf4f3a245ddcbe0fc940a6272d5f,2024-06-17T15:15:52.693000
|
||||
CVE-2024-6007,0,0,168f29713bfc3d324900731ff252d7ac39dc3f3059397dc39713b17d5dee00d3,2024-06-17T12:42:04.623000
|
||||
CVE-2024-6008,0,0,4981ff7807e88c1f8b4d359e2cef28bc1c5f6b09c66a566cffc45ed30847b945,2024-06-17T16:15:16.140000
|
||||
CVE-2024-6009,0,0,bff9169cd0b647f3240090ab5144b9bc1d53f891f5a2501a8dd424bcd87aba6e,2024-06-17T12:42:04.623000
|
||||
CVE-2024-6008,0,1,e339bd5f37f67074a3982bb584c73bf8dda0cb7cd7304fe99aa6ea6d9b2ef2e4,2024-07-19T14:52:08.110000
|
||||
CVE-2024-6009,0,1,e0a24374cca31358971f963f7084d5ca791c42b65310b9cca023d09b825a9a06,2024-07-19T14:24:41.657000
|
||||
CVE-2024-6011,0,0,dbfe34d08d913fed3fe65c2dbee56080431baf13326e1312e38a9909dc7ace99,2024-07-02T18:07:31.577000
|
||||
CVE-2024-6012,0,0,1211f74927850d1cfa08a87570ca9d2ab2f4417a41bad983e72a2d4354dee21b,2024-07-02T18:07:54.430000
|
||||
CVE-2024-6013,0,0,4e5648a7dc6c96abe65307e6aa1037738e042c0ac9f6243b9c097655b6ee6cec,2024-06-17T12:42:04.623000
|
||||
CVE-2024-6014,0,0,c98f9e90e95e02a515d46acbf2b3153d6c1f93a5af25c259b597856be8d3673a,2024-06-17T12:42:04.623000
|
||||
CVE-2024-6015,0,0,346129762229c269cf6e307cf409b651125cd6b2d793094b9e036b88eb54e832,2024-06-17T15:15:52.830000
|
||||
CVE-2024-6016,0,0,095e7569a99cbe538193e07d7f4f79a2f81daca39e3152345de0c698955e57eb,2024-06-17T14:15:12.487000
|
||||
CVE-2024-6013,0,1,dd5aadcad9485c7b63e2c76668a62eba788e1248615fab9fd06bf5aaf41af2a9,2024-07-19T14:20:07.337000
|
||||
CVE-2024-6014,0,1,6f9e64ff8fbf43e19b3d7e24c13ad8adc071c58e85b8bf9a829322ea55abcf8f,2024-07-19T14:18:17.607000
|
||||
CVE-2024-6015,0,1,c2460029f18cca819988d11dbd49466b5328ee3d26de8c6ec6e0519debb7ea98,2024-07-19T14:13:10.463000
|
||||
CVE-2024-6016,0,1,db11fa4e2db5dca1bf67cd82c1ae54777d6d6de86c83abed9806f80a5c1a5385,2024-07-19T14:02:04.600000
|
||||
CVE-2024-6022,0,0,24cd03c9fcf6723524309e986cc2addb57b0569071dd40fa02ef59a2355b1c5a,2024-07-12T12:49:07.030000
|
||||
CVE-2024-6023,0,0,0fbe5d2ca782056f31cb55e3e7e649afa27f8639de55449b0e6b5b1b24eaf884,2024-07-12T12:49:07.030000
|
||||
CVE-2024-6024,0,0,0c9dac9804939f4358bda0a07a9c71c46e84018a1e951997775f9c46353d018f,2024-07-12T16:12:07.453000
|
||||
@ -257085,7 +257089,7 @@ CVE-2024-6025,0,0,2653befc93f455636e57cde83404a5ff884ae434fc80abd19f04944c84a702
|
||||
CVE-2024-6026,0,0,2970248e3866f379267d0cae7e3b9bb934f39b25cb3198f3dfbaa23423c08ff9,2024-07-12T16:55:44.240000
|
||||
CVE-2024-6027,0,0,d36139a3f6402ad17d96a83c3d61f6ce213e515812c77112f328495c0bcd9928,2024-06-24T19:17:50.240000
|
||||
CVE-2024-6028,0,0,a068f17d13f3176b06fe0181735235198b8a42900e26e5af12021baf09b50c20,2024-06-25T12:24:17.873000
|
||||
CVE-2024-6033,0,0,8cfff70812f0fd734249d7491b07b714d4db7a7e879c5b2b3eab35b868b9bc26,2024-07-17T13:34:20.520000
|
||||
CVE-2024-6033,0,1,752465a708ea245148cff8e77846a7ba88d4d0bef6b4e047d1479c5311cd83dd,2024-07-19T15:32:49.507000
|
||||
CVE-2024-6035,0,0,71705709079183c78c8ed383ff1dde0d9a61df1fcd0014b5485dcff6ce00c8bd,2024-07-15T18:15:05.840000
|
||||
CVE-2024-6036,0,0,ec75d3b088377f3e157bda1807d973db13644b79a58ce7816702ab31b3d039ce,2024-07-11T13:05:54.930000
|
||||
CVE-2024-6037,0,0,6693b31ec7c6312863697d20bd04a1bdff52b0f0104cd13eb0277621b822579c,2024-07-11T13:05:54.930000
|
||||
@ -257205,7 +257209,7 @@ CVE-2024-6193,0,0,00fd76685b00c66c75878efc81598a588f58971e8df576cbee2d630c4caeff
|
||||
CVE-2024-6194,0,0,2fd14db6633e624a38e90bae695b4c4d57fa0e3aaeb642623d447d03f1402676,2024-06-21T11:22:01.687000
|
||||
CVE-2024-6195,0,0,6a062efe55296f0b78677192fb0a748b37d8f49a4a61cffdf8e5d965a387b28b,2024-06-21T11:22:01.687000
|
||||
CVE-2024-6196,0,0,ee53490a34820f9c77a5a8ca54b2af4db4b9298e709dd53453d8c4a657cc2768,2024-06-21T17:15:11.350000
|
||||
CVE-2024-6205,0,1,8522b9cc1b5d1a5df21e355f77848148672ea3ccc036a48aa36b3c3473c36fd7,2024-07-19T13:01:44.567000
|
||||
CVE-2024-6205,0,0,8522b9cc1b5d1a5df21e355f77848148672ea3ccc036a48aa36b3c3473c36fd7,2024-07-19T13:01:44.567000
|
||||
CVE-2024-6206,0,0,7ae31b087265fa68705a3f153945ecef18a4fdd89eba1b0f5f6a9be630fb6cf5,2024-06-26T12:44:29.693000
|
||||
CVE-2024-6209,0,0,dde817e69ddab612402867a39af366fc36713e43c4758f0a34432256fd885f93,2024-07-08T15:35:25.837000
|
||||
CVE-2024-6210,0,0,d08d160d43811c5bb8dcf64fef0c280a0a7b1e98d094babc485e09ce9fa86125,2024-07-11T13:05:54.930000
|
||||
@ -257291,7 +257295,7 @@ CVE-2024-6326,0,0,7f3dd075f877db7303a493f59304e094cd076f4bffd073b2a606c370e31f6e
|
||||
CVE-2024-6328,0,0,1dc9c3c4a448080717651ebabfb2fc281b4a1c036cabba31a96124b6cb4e8cbc,2024-07-12T12:49:07.030000
|
||||
CVE-2024-6334,0,0,3daf0dfe09252e7765ca30c739cfcc033a43a657c17c0275e173ac670504522a,2024-07-09T18:19:14.047000
|
||||
CVE-2024-6336,0,0,cbe18bd9d2fe447b7a1ae02266749a6e6d80ba22cbea894f6c946ded39640177,2024-07-17T13:34:20.520000
|
||||
CVE-2024-6338,0,1,f9fea8203b4948d06aca89926bdbc4e8a3831bef5e51673b6dc46c826f518e10,2024-07-19T13:01:44.567000
|
||||
CVE-2024-6338,0,0,f9fea8203b4948d06aca89926bdbc4e8a3831bef5e51673b6dc46c826f518e10,2024-07-19T13:01:44.567000
|
||||
CVE-2024-6340,0,0,fd12f25a45d92fefbb8c0ec47428250f4f56bb9c686a12a52e54d86e24fec10a,2024-07-03T18:27:40.903000
|
||||
CVE-2024-6341,0,0,528f4fdde1526d72477e90a767b2f2316b168f65b64effeddb9446d8a5cdcaf5,2024-07-02T18:15:03.900000
|
||||
CVE-2024-6344,0,0,ddc89c494afe0b7b80a518e0bed96070c096d29b8a0f403bdd242f60ce193de2,2024-06-27T00:15:13.360000
|
||||
@ -257354,13 +257358,13 @@ CVE-2024-6441,0,0,15383e1684ea64dc1d374e71fe60467b8bfc18bde94b0e73415ebe68688c21
|
||||
CVE-2024-6447,0,0,45fe1e3b45bb9052a54143ac6931092e1b37ff897cd56aa11e3df59780bc06cb,2024-07-11T13:05:54.930000
|
||||
CVE-2024-6452,0,0,c694c1bdf54902e69172121aae2a54d0747cfc16750499c01d3cf3c9c6ef3263,2024-07-03T12:53:24.977000
|
||||
CVE-2024-6453,0,0,f8f94ef1371b1813320fb500c8f5a2a5c78562059f37a370c24f1cfd03cdaa59,2024-07-03T12:53:24.977000
|
||||
CVE-2024-6455,0,1,8630ebc1a98e741e91f009e85126d02bca9a8a2c6f3c48f74f4c74c8c868f369,2024-07-19T13:01:44.567000
|
||||
CVE-2024-6455,0,0,8630ebc1a98e741e91f009e85126d02bca9a8a2c6f3c48f74f4c74c8c868f369,2024-07-19T13:01:44.567000
|
||||
CVE-2024-6457,0,0,3f8fd462f3f8c08854de8c2b7a3218f7387f47da9a3a1dd75e4a135f6aa135cb,2024-07-16T13:43:58.773000
|
||||
CVE-2024-6461,0,0,86a214d0c7bd3f57cea37cd567b01f1a0e55f8d4342f6c7c46fd15b8942c8d90,2024-07-03T21:15:04.580000
|
||||
CVE-2024-6463,0,0,f8d7d80ca565804c0caafdbc8214fe1eca7dc83d43861affc813af07365c0cc0,2024-07-03T21:15:04.640000
|
||||
CVE-2024-6464,0,0,8fab89d1b3aef32a257cf0d7fb909cce6ac18d5ef8dc898bb9f0cc6c52356cbf,2024-07-03T21:15:04.697000
|
||||
CVE-2024-6465,0,0,1a52d419caf12d1d223520a109b2aa019665792454012b51a06898ed38739a48,2024-07-15T13:00:34.853000
|
||||
CVE-2024-6467,0,0,5b9ead3379b44b10c36af0988b505d8c9049b4b9963978db665ebe162faf6d93,2024-07-17T13:34:20.520000
|
||||
CVE-2024-6467,0,1,40d89c875ad7013f32015f1ef7736b3fb0ce3fd8c16e4649f7f0da01810ff45c,2024-07-19T15:37:51.067000
|
||||
CVE-2024-6468,0,0,35510ca663346ec39c4261a703db141288708f1a8a294ff4bff13dfd2b2ac57d,2024-07-12T12:49:11.340000
|
||||
CVE-2024-6469,0,0,8a9cc14cdc15687cebe1f067587bd279bfc289daac6283040462018576c0d534,2024-07-05T17:09:54.870000
|
||||
CVE-2024-6470,0,0,c9a33c23ec7370c50b4df58ad71ec5e181cf8d29947a984c43804e0a58dc7723,2024-07-05T12:55:51.367000
|
||||
@ -257384,7 +257388,7 @@ CVE-2024-6526,0,0,0395771cb83da3c31d3258df800a7adc493a41c6b23cd6248bbb973fb8ab4b
|
||||
CVE-2024-6527,0,0,4cbacb620d5954abb73dae2b3bfdb2a8824258a4de25ce8e7c75649e12d818a5,2024-07-09T18:19:14.047000
|
||||
CVE-2024-6528,0,0,568c43fb32d79fc097335d9307aebc42d71a690423942e01ce8dbade6b5bedb0,2024-07-12T16:37:20.283000
|
||||
CVE-2024-6531,0,0,1125a21608be8cb0502ea86867294670584ed16918c5bd752fdbbd37969404b8,2024-07-12T12:49:11.340000
|
||||
CVE-2024-6535,0,0,ebcd6a15734c7bd515f473e3694f403e38dfdfb613934f319baf860afe37056e,2024-07-17T13:34:20.520000
|
||||
CVE-2024-6535,0,1,7e920196055804e6beeef53bb75ed2bd3a366087f8b193ad1d13704b3ca01837,2024-07-19T15:00:32.153000
|
||||
CVE-2024-6539,0,0,81a7a773476044a536e1904849aff55df114add8144e8265b917f8120b92d867,2024-07-11T14:56:20.733000
|
||||
CVE-2024-6540,0,0,f13af52637070826766869c9a967d13110a057955f51f107eb0d0f88b4032338,2024-07-16T18:05:37.267000
|
||||
CVE-2024-6550,0,0,6c4bb046e65a00df1f67c81af4edc0fc3847fdca60c1beea606bf943b5851318,2024-07-11T13:05:54.930000
|
||||
@ -257401,7 +257405,7 @@ CVE-2024-6574,0,0,63009fc3946aa6aa37035c823fc25710c373929512d42b52b922f4cc721537
|
||||
CVE-2024-6579,0,0,b286f5c4b3721fdb4257ac4cb9bb10daf8e7123999c9d4983b5d418f439447bf,2024-07-16T13:43:58.773000
|
||||
CVE-2024-6580,0,0,d43dfa58651574c4447e8f323f3cb1f6a00d6bdef0613d5834aefccecf968c5d,2024-07-09T18:19:14.047000
|
||||
CVE-2024-6588,0,0,67672e854c20766f2e15151fa1e111ec8310b7083a57f535c99159d2ce6e5af7,2024-07-12T12:49:07.030000
|
||||
CVE-2024-6595,0,0,4de8f055bbd2e266590b849663cbe5d6660e39d6760c9305731e3e1ae9a12884,2024-07-17T13:34:20.520000
|
||||
CVE-2024-6595,0,1,97cf6a37af39b7f5832976478077fe225f57d63ffd9a5f39caf9eca8e3545339,2024-07-19T14:52:54.943000
|
||||
CVE-2024-6598,0,0,fb802128b1cfc176540749693b684b4374936099ab1c7948c1ec819266291908,2024-07-09T18:19:14.047000
|
||||
CVE-2024-6599,0,0,037851e9df9d617d8307f9b270a87bc534f61814e2c16dbf5d0d1ccdfb3dffc4,2024-07-18T12:28:43.707000
|
||||
CVE-2024-6600,0,0,8a7bdd7b6969fa6cd69a1854f6f2130a9698184b9485e28b1c9cbb32470416d8,2024-07-16T18:15:08.737000
|
||||
@ -257435,11 +257439,11 @@ CVE-2024-6650,0,0,389479cac037eb791bf22f3727c10e60384d8e28492bfb0d0b7873c538245d
|
||||
CVE-2024-6652,0,0,32c4914a2885b2299fef5292f9b5b00052aaeaf4b92ba53d869ce14f17c7c595,2024-07-11T13:05:54.930000
|
||||
CVE-2024-6653,0,0,d93d31cbf15b722e8213bd0a1f350049b73a325a73fea026c81bdae5013a3c4f,2024-07-11T13:15:10.147000
|
||||
CVE-2024-6655,0,0,0485248ee98682a7d1526979650a74114bd662162c8fc1626488ee79436e31bf,2024-07-16T18:00:02.110000
|
||||
CVE-2024-6660,0,0,e12123b0fdc1a4cf893451c502a4c949c34272dd4951db34e902a701cd340466,2024-07-17T13:34:20.520000
|
||||
CVE-2024-6660,0,1,caad23d7b98522c6f22294c27dcab3f8925f974b7a7faae66643c3e06a0d6672,2024-07-19T15:48:14.040000
|
||||
CVE-2024-6663,0,0,7facb2637e12709d4a455340194f194dba2537cb44d31c2262ed1aa6b9ebcf89,2024-07-10T21:15:11.463000
|
||||
CVE-2024-6664,0,0,7dcdbd9efac1143da422ef778b0a605b2e75ff3874c65ca5b8e519e1d8523278,2024-07-10T21:15:11.520000
|
||||
CVE-2024-6666,0,0,6ade2353732c66fc20367582756530c33ec26bf7f6989700bd337bd969227f22,2024-07-12T16:46:48.387000
|
||||
CVE-2024-6669,0,0,1827a5cd80b70c7e4a072fdca8a75608d4a1b643851076680e62b92828d5825a,2024-07-17T13:34:20.520000
|
||||
CVE-2024-6669,0,1,87233746e73dcd3cc336669e330764691e93b16935dab43ac512a989f6e36eb0,2024-07-19T15:56:47.190000
|
||||
CVE-2024-6676,0,0,b617e99f4ff839e117300b1a5f3c494dc1ceb13864a576e2b1519c7ec5960d34,2024-07-11T13:05:54.930000
|
||||
CVE-2024-6677,0,0,d8004a1441e952f05633a34727a4f9223ac5077c2123fd1507a1955287de18f3,2024-07-12T12:49:07.030000
|
||||
CVE-2024-6679,0,0,193698b3a519c2de1af0fd23f7e404e2d54c730e4704d97d0092b63ef1c81272,2024-07-11T18:09:58.777000
|
||||
@ -257478,23 +257482,25 @@ CVE-2024-6777,0,0,a56d95e067795760df390f3c029e1e701f64cddc2191775e9444fd4f0151a2
|
||||
CVE-2024-6778,0,0,fdea16e148384a7e3dcb709a8443d007c41fffe85566adafe1ded010eb26487c,2024-07-17T13:34:20.520000
|
||||
CVE-2024-6779,0,0,a0c53973235d650b76f5a317527d64babc63b7437f664de7c206225fae1a5344,2024-07-17T13:34:20.520000
|
||||
CVE-2024-6780,0,0,54fc3efeb973ca2f40f04f54d5a723685bcfaff31befba604fec0242bd088a83,2024-07-16T13:43:58.773000
|
||||
CVE-2024-6799,0,1,261c5f62ba7eb23f22b0dcfaa72979cb179b4af28583aa3634c3f6ae02c8d066,2024-07-19T13:01:44.567000
|
||||
CVE-2024-6801,0,0,162a1f556795709c33618b00251776b5d64e78443324e3312f382d4754aaf838,2024-07-17T13:34:20.520000
|
||||
CVE-2024-6802,0,0,386226bce7b12b7500a7728e6323db5d69291b7883c492fa520631c141d51c93,2024-07-17T13:34:20.520000
|
||||
CVE-2024-6803,0,0,698fb954222e7db5d1598623eedb3617e795f993f29a35b3e0ac7c1569604491,2024-07-17T13:34:20.520000
|
||||
CVE-2024-6807,0,0,60acf58925408625a444a0bb6ffc77398b3b984199e5b0e4e7ba5e371b31f55b,2024-07-17T13:34:20.520000
|
||||
CVE-2024-6808,0,0,9e957ba9065e9b12c070f25b75e9ca36ec77b27a404450e1a18818d5661c0932,2024-07-18T16:15:08.300000
|
||||
CVE-2024-6799,0,0,261c5f62ba7eb23f22b0dcfaa72979cb179b4af28583aa3634c3f6ae02c8d066,2024-07-19T13:01:44.567000
|
||||
CVE-2024-6801,0,1,6cf94e1980aea6fcc25b038d583cb2250e04ba4c9461d4d907e1f9ce16b1e09a,2024-07-19T14:55:25.753000
|
||||
CVE-2024-6802,0,1,28d3acf4fd2d79095dac148cf5494a8bae6c6a9f871caa0540dd765a2bd6262d,2024-07-19T14:58:12.707000
|
||||
CVE-2024-6803,0,1,e77960f60e5c3ea5b22b60c53aac93b8bf6ffc93dd5f015dabaabc8b5a77736e,2024-07-19T15:01:50.250000
|
||||
CVE-2024-6807,0,1,e7a9e356d2137bfb067b0761eea1a41e11da3606f29d9b24e33a8982fadc5d78,2024-07-19T15:03:08.933000
|
||||
CVE-2024-6808,0,1,2df5a702fa4af6687f0c8dc8e100812ff9b6b346801edb239f41e0ca638c0076,2024-07-19T15:04:43.837000
|
||||
CVE-2024-6830,0,0,66325e33317c6fde8b929b285667c5104c4ae04492532b5067560968ff36e7fb,2024-07-18T12:28:43.707000
|
||||
CVE-2024-6833,0,0,b0ea48d29166f6347ac218b4f9f93d3f7fc599fd932b64c35cfa55e5a1a94672,2024-07-18T12:28:43.707000
|
||||
CVE-2024-6834,0,0,9b06026f568f95c4c2a4be9208340b1bc5ab27fea601ce9296ee0a0b671ec68d,2024-07-18T12:28:43.707000
|
||||
CVE-2024-6898,0,1,98dae2dc951da0c9f1ac4e695a7ad38573b2abb15f5508f51642ed9635c194c6,2024-07-19T13:01:44.567000
|
||||
CVE-2024-6899,0,1,862a9d8e40eab426823cca194fdd307dafe70d2837c62b14a818c2e38cfb311c,2024-07-19T13:01:44.567000
|
||||
CVE-2024-6900,0,1,f9a0db97abb2b7a030f206724ca09833acdf6dd97e33de095d4cd3f3b37ccb05,2024-07-19T13:01:44.567000
|
||||
CVE-2024-6901,0,1,e54159de50db3a8be34eb97b9e3f649430e41359e21d071d1c89b458210a168d,2024-07-19T13:01:44.567000
|
||||
CVE-2024-6902,0,1,495ce6a6d90db5ffc5fcf4c35200d986c6bd9aea37bed0cdf107762f60a152ec,2024-07-19T13:01:44.567000
|
||||
CVE-2024-6903,0,1,458cf84eca0cf9431d58c9dde569871b33a0e0cb2c0e1a1544d8b15458d5e52b,2024-07-19T13:01:44.567000
|
||||
CVE-2024-6904,0,1,7a4b54dc15a07a62a46eb4054278ab061629c71b06171b5dc53981c366a15e59,2024-07-19T13:01:44.567000
|
||||
CVE-2024-6905,0,1,93733b32b43103d2e6f495524d768f1986f9f809f44d345a79d9a3c82c1dfb61,2024-07-19T13:01:44.567000
|
||||
CVE-2024-6906,0,1,bd3edaa779f3d24c608497477495531b8c58c3f636652b3dd6d229b39e74ed48,2024-07-19T13:01:44.567000
|
||||
CVE-2024-6907,0,1,3d839b35437f0dd0faf9914e897ddc2454e64f962bdd094121c84723df304c00,2024-07-19T13:01:44.567000
|
||||
CVE-2024-6916,0,1,96455c03765030601aeb6ca7398864bb6cd18912db996a417121b3c4bb1540e3,2024-07-19T13:01:44.567000
|
||||
CVE-2024-6895,1,1,0c486e88c5dc57ed2713d59c6e5f599844da09fd6e820a24b10235451464145d,2024-07-19T15:15:10.547000
|
||||
CVE-2024-6898,0,0,98dae2dc951da0c9f1ac4e695a7ad38573b2abb15f5508f51642ed9635c194c6,2024-07-19T13:01:44.567000
|
||||
CVE-2024-6899,0,0,862a9d8e40eab426823cca194fdd307dafe70d2837c62b14a818c2e38cfb311c,2024-07-19T13:01:44.567000
|
||||
CVE-2024-6900,0,0,f9a0db97abb2b7a030f206724ca09833acdf6dd97e33de095d4cd3f3b37ccb05,2024-07-19T13:01:44.567000
|
||||
CVE-2024-6901,0,0,e54159de50db3a8be34eb97b9e3f649430e41359e21d071d1c89b458210a168d,2024-07-19T13:01:44.567000
|
||||
CVE-2024-6902,0,0,495ce6a6d90db5ffc5fcf4c35200d986c6bd9aea37bed0cdf107762f60a152ec,2024-07-19T13:01:44.567000
|
||||
CVE-2024-6903,0,0,458cf84eca0cf9431d58c9dde569871b33a0e0cb2c0e1a1544d8b15458d5e52b,2024-07-19T13:01:44.567000
|
||||
CVE-2024-6904,0,0,7a4b54dc15a07a62a46eb4054278ab061629c71b06171b5dc53981c366a15e59,2024-07-19T13:01:44.567000
|
||||
CVE-2024-6905,0,0,93733b32b43103d2e6f495524d768f1986f9f809f44d345a79d9a3c82c1dfb61,2024-07-19T13:01:44.567000
|
||||
CVE-2024-6906,0,0,bd3edaa779f3d24c608497477495531b8c58c3f636652b3dd6d229b39e74ed48,2024-07-19T13:01:44.567000
|
||||
CVE-2024-6907,0,0,3d839b35437f0dd0faf9914e897ddc2454e64f962bdd094121c84723df304c00,2024-07-19T13:01:44.567000
|
||||
CVE-2024-6908,1,1,43e596b9986e083f26060cdbf20a02be417ad9fa3161f7053b7c41e2528f0046,2024-07-19T15:15:10.747000
|
||||
CVE-2024-6916,0,0,96455c03765030601aeb6ca7398864bb6cd18912db996a417121b3c4bb1540e3,2024-07-19T13:01:44.567000
|
||||
|
Can't render this file because it is too large.
|
Loading…
x
Reference in New Issue
Block a user