mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-06-19 17:31:42 +00:00
Auto-Update: 2024-07-03T16:01:48.944347+00:00
This commit is contained in:
parent
649cc54acc
commit
35d2420c82
@ -2,8 +2,9 @@
|
|||||||
"id": "CVE-2016-7515",
|
"id": "CVE-2016-7515",
|
||||||
"sourceIdentifier": "security@debian.org",
|
"sourceIdentifier": "security@debian.org",
|
||||||
"published": "2017-04-19T14:59:00.270",
|
"published": "2017-04-19T14:59:00.270",
|
||||||
"lastModified": "2017-05-09T12:40:02.777",
|
"lastModified": "2024-07-03T15:16:39.567",
|
||||||
"vulnStatus": "Analyzed",
|
"vulnStatus": "Analyzed",
|
||||||
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
"lang": "en",
|
"lang": "en",
|
||||||
@ -15,13 +16,13 @@
|
|||||||
}
|
}
|
||||||
],
|
],
|
||||||
"metrics": {
|
"metrics": {
|
||||||
"cvssMetricV30": [
|
"cvssMetricV31": [
|
||||||
{
|
{
|
||||||
"source": "nvd@nist.gov",
|
"source": "nvd@nist.gov",
|
||||||
"type": "Primary",
|
"type": "Primary",
|
||||||
"cvssData": {
|
"cvssData": {
|
||||||
"version": "3.0",
|
"version": "3.1",
|
||||||
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
|
||||||
"attackVector": "NETWORK",
|
"attackVector": "NETWORK",
|
||||||
"attackComplexity": "LOW",
|
"attackComplexity": "LOW",
|
||||||
"privilegesRequired": "NONE",
|
"privilegesRequired": "NONE",
|
||||||
@ -84,8 +85,9 @@
|
|||||||
"cpeMatch": [
|
"cpeMatch": [
|
||||||
{
|
{
|
||||||
"vulnerable": true,
|
"vulnerable": true,
|
||||||
"criteria": "cpe:2.3:a:imagemagick:imagemagick:-:*:*:*:*:*:*:*",
|
"criteria": "cpe:2.3:a:imagemagick:imagemagick:*:*:*:*:*:*:*:*",
|
||||||
"matchCriteriaId": "6E6BE7A5-6FF7-4916-B671-9EE11CA54F65"
|
"versionEndExcluding": "6.9.4-0",
|
||||||
|
"matchCriteriaId": "CFC2C780-A54E-4426-9C52-46A20216339E"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -2,8 +2,9 @@
|
|||||||
"id": "CVE-2016-7516",
|
"id": "CVE-2016-7516",
|
||||||
"sourceIdentifier": "security@debian.org",
|
"sourceIdentifier": "security@debian.org",
|
||||||
"published": "2017-04-20T18:59:00.937",
|
"published": "2017-04-20T18:59:00.937",
|
||||||
"lastModified": "2017-05-09T12:40:00.260",
|
"lastModified": "2024-07-03T15:23:36.440",
|
||||||
"vulnStatus": "Analyzed",
|
"vulnStatus": "Analyzed",
|
||||||
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
"lang": "en",
|
"lang": "en",
|
||||||
@ -15,13 +16,13 @@
|
|||||||
}
|
}
|
||||||
],
|
],
|
||||||
"metrics": {
|
"metrics": {
|
||||||
"cvssMetricV30": [
|
"cvssMetricV31": [
|
||||||
{
|
{
|
||||||
"source": "nvd@nist.gov",
|
"source": "nvd@nist.gov",
|
||||||
"type": "Primary",
|
"type": "Primary",
|
||||||
"cvssData": {
|
"cvssData": {
|
||||||
"version": "3.0",
|
"version": "3.1",
|
||||||
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
|
||||||
"attackVector": "NETWORK",
|
"attackVector": "NETWORK",
|
||||||
"attackComplexity": "LOW",
|
"attackComplexity": "LOW",
|
||||||
"privilegesRequired": "NONE",
|
"privilegesRequired": "NONE",
|
||||||
@ -84,8 +85,9 @@
|
|||||||
"cpeMatch": [
|
"cpeMatch": [
|
||||||
{
|
{
|
||||||
"vulnerable": true,
|
"vulnerable": true,
|
||||||
"criteria": "cpe:2.3:a:imagemagick:imagemagick:-:*:*:*:*:*:*:*",
|
"criteria": "cpe:2.3:a:imagemagick:imagemagick:*:*:*:*:*:*:*:*",
|
||||||
"matchCriteriaId": "6E6BE7A5-6FF7-4916-B671-9EE11CA54F65"
|
"versionEndExcluding": "6.9.4-0",
|
||||||
|
"matchCriteriaId": "CFC2C780-A54E-4426-9C52-46A20216339E"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -2,8 +2,9 @@
|
|||||||
"id": "CVE-2016-7517",
|
"id": "CVE-2016-7517",
|
||||||
"sourceIdentifier": "security@debian.org",
|
"sourceIdentifier": "security@debian.org",
|
||||||
"published": "2017-04-20T18:59:00.967",
|
"published": "2017-04-20T18:59:00.967",
|
||||||
"lastModified": "2017-05-09T12:39:56.680",
|
"lastModified": "2024-07-03T15:17:05.433",
|
||||||
"vulnStatus": "Analyzed",
|
"vulnStatus": "Analyzed",
|
||||||
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
"lang": "en",
|
"lang": "en",
|
||||||
@ -15,13 +16,13 @@
|
|||||||
}
|
}
|
||||||
],
|
],
|
||||||
"metrics": {
|
"metrics": {
|
||||||
"cvssMetricV30": [
|
"cvssMetricV31": [
|
||||||
{
|
{
|
||||||
"source": "nvd@nist.gov",
|
"source": "nvd@nist.gov",
|
||||||
"type": "Primary",
|
"type": "Primary",
|
||||||
"cvssData": {
|
"cvssData": {
|
||||||
"version": "3.0",
|
"version": "3.1",
|
||||||
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
|
||||||
"attackVector": "NETWORK",
|
"attackVector": "NETWORK",
|
||||||
"attackComplexity": "LOW",
|
"attackComplexity": "LOW",
|
||||||
"privilegesRequired": "NONE",
|
"privilegesRequired": "NONE",
|
||||||
@ -84,8 +85,9 @@
|
|||||||
"cpeMatch": [
|
"cpeMatch": [
|
||||||
{
|
{
|
||||||
"vulnerable": true,
|
"vulnerable": true,
|
||||||
"criteria": "cpe:2.3:a:imagemagick:imagemagick:-:*:*:*:*:*:*:*",
|
"criteria": "cpe:2.3:a:imagemagick:imagemagick:*:*:*:*:*:*:*:*",
|
||||||
"matchCriteriaId": "6E6BE7A5-6FF7-4916-B671-9EE11CA54F65"
|
"versionEndExcluding": "6.9.4-0",
|
||||||
|
"matchCriteriaId": "CFC2C780-A54E-4426-9C52-46A20216339E"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -2,8 +2,9 @@
|
|||||||
"id": "CVE-2016-7518",
|
"id": "CVE-2016-7518",
|
||||||
"sourceIdentifier": "security@debian.org",
|
"sourceIdentifier": "security@debian.org",
|
||||||
"published": "2017-04-20T18:59:01.013",
|
"published": "2017-04-20T18:59:01.013",
|
||||||
"lastModified": "2017-05-09T12:39:53.323",
|
"lastModified": "2024-07-03T15:24:22.567",
|
||||||
"vulnStatus": "Analyzed",
|
"vulnStatus": "Analyzed",
|
||||||
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
"lang": "en",
|
"lang": "en",
|
||||||
@ -15,13 +16,13 @@
|
|||||||
}
|
}
|
||||||
],
|
],
|
||||||
"metrics": {
|
"metrics": {
|
||||||
"cvssMetricV30": [
|
"cvssMetricV31": [
|
||||||
{
|
{
|
||||||
"source": "nvd@nist.gov",
|
"source": "nvd@nist.gov",
|
||||||
"type": "Primary",
|
"type": "Primary",
|
||||||
"cvssData": {
|
"cvssData": {
|
||||||
"version": "3.0",
|
"version": "3.1",
|
||||||
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
|
||||||
"attackVector": "NETWORK",
|
"attackVector": "NETWORK",
|
||||||
"attackComplexity": "LOW",
|
"attackComplexity": "LOW",
|
||||||
"privilegesRequired": "NONE",
|
"privilegesRequired": "NONE",
|
||||||
@ -84,8 +85,9 @@
|
|||||||
"cpeMatch": [
|
"cpeMatch": [
|
||||||
{
|
{
|
||||||
"vulnerable": true,
|
"vulnerable": true,
|
||||||
"criteria": "cpe:2.3:a:imagemagick:imagemagick:-:*:*:*:*:*:*:*",
|
"criteria": "cpe:2.3:a:imagemagick:imagemagick:*:*:*:*:*:*:*:*",
|
||||||
"matchCriteriaId": "6E6BE7A5-6FF7-4916-B671-9EE11CA54F65"
|
"versionEndExcluding": "6.9.4-0",
|
||||||
|
"matchCriteriaId": "CFC2C780-A54E-4426-9C52-46A20216339E"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -2,8 +2,9 @@
|
|||||||
"id": "CVE-2016-7519",
|
"id": "CVE-2016-7519",
|
||||||
"sourceIdentifier": "security@debian.org",
|
"sourceIdentifier": "security@debian.org",
|
||||||
"published": "2017-04-19T14:59:00.317",
|
"published": "2017-04-19T14:59:00.317",
|
||||||
"lastModified": "2017-05-09T12:39:50.057",
|
"lastModified": "2024-07-03T15:23:33.607",
|
||||||
"vulnStatus": "Analyzed",
|
"vulnStatus": "Analyzed",
|
||||||
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
"lang": "en",
|
"lang": "en",
|
||||||
@ -15,13 +16,13 @@
|
|||||||
}
|
}
|
||||||
],
|
],
|
||||||
"metrics": {
|
"metrics": {
|
||||||
"cvssMetricV30": [
|
"cvssMetricV31": [
|
||||||
{
|
{
|
||||||
"source": "nvd@nist.gov",
|
"source": "nvd@nist.gov",
|
||||||
"type": "Primary",
|
"type": "Primary",
|
||||||
"cvssData": {
|
"cvssData": {
|
||||||
"version": "3.0",
|
"version": "3.1",
|
||||||
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
|
||||||
"attackVector": "NETWORK",
|
"attackVector": "NETWORK",
|
||||||
"attackComplexity": "LOW",
|
"attackComplexity": "LOW",
|
||||||
"privilegesRequired": "NONE",
|
"privilegesRequired": "NONE",
|
||||||
@ -84,8 +85,9 @@
|
|||||||
"cpeMatch": [
|
"cpeMatch": [
|
||||||
{
|
{
|
||||||
"vulnerable": true,
|
"vulnerable": true,
|
||||||
"criteria": "cpe:2.3:a:imagemagick:imagemagick:-:*:*:*:*:*:*:*",
|
"criteria": "cpe:2.3:a:imagemagick:imagemagick:*:*:*:*:*:*:*:*",
|
||||||
"matchCriteriaId": "6E6BE7A5-6FF7-4916-B671-9EE11CA54F65"
|
"versionEndExcluding": "6.9.4-0",
|
||||||
|
"matchCriteriaId": "CFC2C780-A54E-4426-9C52-46A20216339E"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -2,8 +2,9 @@
|
|||||||
"id": "CVE-2016-7520",
|
"id": "CVE-2016-7520",
|
||||||
"sourceIdentifier": "security@debian.org",
|
"sourceIdentifier": "security@debian.org",
|
||||||
"published": "2017-04-20T18:59:01.060",
|
"published": "2017-04-20T18:59:01.060",
|
||||||
"lastModified": "2017-05-09T12:39:45.993",
|
"lastModified": "2024-07-03T15:20:18.050",
|
||||||
"vulnStatus": "Analyzed",
|
"vulnStatus": "Analyzed",
|
||||||
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
"lang": "en",
|
"lang": "en",
|
||||||
@ -15,13 +16,13 @@
|
|||||||
}
|
}
|
||||||
],
|
],
|
||||||
"metrics": {
|
"metrics": {
|
||||||
"cvssMetricV30": [
|
"cvssMetricV31": [
|
||||||
{
|
{
|
||||||
"source": "nvd@nist.gov",
|
"source": "nvd@nist.gov",
|
||||||
"type": "Primary",
|
"type": "Primary",
|
||||||
"cvssData": {
|
"cvssData": {
|
||||||
"version": "3.0",
|
"version": "3.1",
|
||||||
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
|
||||||
"attackVector": "NETWORK",
|
"attackVector": "NETWORK",
|
||||||
"attackComplexity": "LOW",
|
"attackComplexity": "LOW",
|
||||||
"privilegesRequired": "NONE",
|
"privilegesRequired": "NONE",
|
||||||
@ -84,8 +85,9 @@
|
|||||||
"cpeMatch": [
|
"cpeMatch": [
|
||||||
{
|
{
|
||||||
"vulnerable": true,
|
"vulnerable": true,
|
||||||
"criteria": "cpe:2.3:a:imagemagick:imagemagick:-:*:*:*:*:*:*:*",
|
"criteria": "cpe:2.3:a:imagemagick:imagemagick:*:*:*:*:*:*:*:*",
|
||||||
"matchCriteriaId": "6E6BE7A5-6FF7-4916-B671-9EE11CA54F65"
|
"versionEndExcluding": "6.9.4-0",
|
||||||
|
"matchCriteriaId": "CFC2C780-A54E-4426-9C52-46A20216339E"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -2,8 +2,9 @@
|
|||||||
"id": "CVE-2016-7521",
|
"id": "CVE-2016-7521",
|
||||||
"sourceIdentifier": "security@debian.org",
|
"sourceIdentifier": "security@debian.org",
|
||||||
"published": "2017-04-20T18:59:01.093",
|
"published": "2017-04-20T18:59:01.093",
|
||||||
"lastModified": "2017-05-09T12:39:43.383",
|
"lastModified": "2024-07-03T15:20:33.760",
|
||||||
"vulnStatus": "Analyzed",
|
"vulnStatus": "Analyzed",
|
||||||
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
"lang": "en",
|
"lang": "en",
|
||||||
@ -15,13 +16,13 @@
|
|||||||
}
|
}
|
||||||
],
|
],
|
||||||
"metrics": {
|
"metrics": {
|
||||||
"cvssMetricV30": [
|
"cvssMetricV31": [
|
||||||
{
|
{
|
||||||
"source": "nvd@nist.gov",
|
"source": "nvd@nist.gov",
|
||||||
"type": "Primary",
|
"type": "Primary",
|
||||||
"cvssData": {
|
"cvssData": {
|
||||||
"version": "3.0",
|
"version": "3.1",
|
||||||
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
|
||||||
"attackVector": "NETWORK",
|
"attackVector": "NETWORK",
|
||||||
"attackComplexity": "LOW",
|
"attackComplexity": "LOW",
|
||||||
"privilegesRequired": "NONE",
|
"privilegesRequired": "NONE",
|
||||||
@ -84,8 +85,9 @@
|
|||||||
"cpeMatch": [
|
"cpeMatch": [
|
||||||
{
|
{
|
||||||
"vulnerable": true,
|
"vulnerable": true,
|
||||||
"criteria": "cpe:2.3:a:imagemagick:imagemagick:-:*:*:*:*:*:*:*",
|
"criteria": "cpe:2.3:a:imagemagick:imagemagick:*:*:*:*:*:*:*:*",
|
||||||
"matchCriteriaId": "6E6BE7A5-6FF7-4916-B671-9EE11CA54F65"
|
"versionEndExcluding": "6.9.4-0",
|
||||||
|
"matchCriteriaId": "CFC2C780-A54E-4426-9C52-46A20216339E"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -2,8 +2,9 @@
|
|||||||
"id": "CVE-2016-7522",
|
"id": "CVE-2016-7522",
|
||||||
"sourceIdentifier": "security@debian.org",
|
"sourceIdentifier": "security@debian.org",
|
||||||
"published": "2017-04-19T14:59:00.367",
|
"published": "2017-04-19T14:59:00.367",
|
||||||
"lastModified": "2017-05-09T12:39:40.680",
|
"lastModified": "2024-07-03T15:20:47.917",
|
||||||
"vulnStatus": "Analyzed",
|
"vulnStatus": "Analyzed",
|
||||||
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
"lang": "en",
|
"lang": "en",
|
||||||
@ -15,13 +16,13 @@
|
|||||||
}
|
}
|
||||||
],
|
],
|
||||||
"metrics": {
|
"metrics": {
|
||||||
"cvssMetricV30": [
|
"cvssMetricV31": [
|
||||||
{
|
{
|
||||||
"source": "nvd@nist.gov",
|
"source": "nvd@nist.gov",
|
||||||
"type": "Primary",
|
"type": "Primary",
|
||||||
"cvssData": {
|
"cvssData": {
|
||||||
"version": "3.0",
|
"version": "3.1",
|
||||||
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
|
||||||
"attackVector": "NETWORK",
|
"attackVector": "NETWORK",
|
||||||
"attackComplexity": "LOW",
|
"attackComplexity": "LOW",
|
||||||
"privilegesRequired": "NONE",
|
"privilegesRequired": "NONE",
|
||||||
@ -84,8 +85,9 @@
|
|||||||
"cpeMatch": [
|
"cpeMatch": [
|
||||||
{
|
{
|
||||||
"vulnerable": true,
|
"vulnerable": true,
|
||||||
"criteria": "cpe:2.3:a:imagemagick:imagemagick:-:*:*:*:*:*:*:*",
|
"criteria": "cpe:2.3:a:imagemagick:imagemagick:*:*:*:*:*:*:*:*",
|
||||||
"matchCriteriaId": "6E6BE7A5-6FF7-4916-B671-9EE11CA54F65"
|
"versionEndExcluding": "6.9.4-0",
|
||||||
|
"matchCriteriaId": "CFC2C780-A54E-4426-9C52-46A20216339E"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -2,8 +2,9 @@
|
|||||||
"id": "CVE-2016-7523",
|
"id": "CVE-2016-7523",
|
||||||
"sourceIdentifier": "security@debian.org",
|
"sourceIdentifier": "security@debian.org",
|
||||||
"published": "2020-02-06T14:15:10.737",
|
"published": "2020-02-06T14:15:10.737",
|
||||||
"lastModified": "2020-02-10T14:15:40.907",
|
"lastModified": "2024-07-03T15:21:09.250",
|
||||||
"vulnStatus": "Analyzed",
|
"vulnStatus": "Analyzed",
|
||||||
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
"lang": "en",
|
"lang": "en",
|
||||||
@ -84,8 +85,9 @@
|
|||||||
"cpeMatch": [
|
"cpeMatch": [
|
||||||
{
|
{
|
||||||
"vulnerable": true,
|
"vulnerable": true,
|
||||||
"criteria": "cpe:2.3:a:imagemagick:imagemagick:-:*:*:*:*:*:*:*",
|
"criteria": "cpe:2.3:a:imagemagick:imagemagick:*:*:*:*:*:*:*:*",
|
||||||
"matchCriteriaId": "6E6BE7A5-6FF7-4916-B671-9EE11CA54F65"
|
"versionEndExcluding": "6.9.4-0",
|
||||||
|
"matchCriteriaId": "CFC2C780-A54E-4426-9C52-46A20216339E"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -2,8 +2,9 @@
|
|||||||
"id": "CVE-2016-7524",
|
"id": "CVE-2016-7524",
|
||||||
"sourceIdentifier": "security@debian.org",
|
"sourceIdentifier": "security@debian.org",
|
||||||
"published": "2020-02-06T14:15:10.830",
|
"published": "2020-02-06T14:15:10.830",
|
||||||
"lastModified": "2020-02-10T14:15:18.203",
|
"lastModified": "2024-07-03T15:21:23.107",
|
||||||
"vulnStatus": "Analyzed",
|
"vulnStatus": "Analyzed",
|
||||||
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
"lang": "en",
|
"lang": "en",
|
||||||
@ -84,8 +85,9 @@
|
|||||||
"cpeMatch": [
|
"cpeMatch": [
|
||||||
{
|
{
|
||||||
"vulnerable": true,
|
"vulnerable": true,
|
||||||
"criteria": "cpe:2.3:a:imagemagick:imagemagick:-:*:*:*:*:*:*:*",
|
"criteria": "cpe:2.3:a:imagemagick:imagemagick:*:*:*:*:*:*:*:*",
|
||||||
"matchCriteriaId": "6E6BE7A5-6FF7-4916-B671-9EE11CA54F65"
|
"versionEndExcluding": "6.9.4-0",
|
||||||
|
"matchCriteriaId": "CFC2C780-A54E-4426-9C52-46A20216339E"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -2,8 +2,9 @@
|
|||||||
"id": "CVE-2016-7525",
|
"id": "CVE-2016-7525",
|
||||||
"sourceIdentifier": "security@debian.org",
|
"sourceIdentifier": "security@debian.org",
|
||||||
"published": "2017-04-20T18:59:01.140",
|
"published": "2017-04-20T18:59:01.140",
|
||||||
"lastModified": "2017-05-09T12:39:38.103",
|
"lastModified": "2024-07-03T15:21:41.860",
|
||||||
"vulnStatus": "Analyzed",
|
"vulnStatus": "Analyzed",
|
||||||
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
"lang": "en",
|
"lang": "en",
|
||||||
@ -15,13 +16,13 @@
|
|||||||
}
|
}
|
||||||
],
|
],
|
||||||
"metrics": {
|
"metrics": {
|
||||||
"cvssMetricV30": [
|
"cvssMetricV31": [
|
||||||
{
|
{
|
||||||
"source": "nvd@nist.gov",
|
"source": "nvd@nist.gov",
|
||||||
"type": "Primary",
|
"type": "Primary",
|
||||||
"cvssData": {
|
"cvssData": {
|
||||||
"version": "3.0",
|
"version": "3.1",
|
||||||
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
|
||||||
"attackVector": "NETWORK",
|
"attackVector": "NETWORK",
|
||||||
"attackComplexity": "LOW",
|
"attackComplexity": "LOW",
|
||||||
"privilegesRequired": "NONE",
|
"privilegesRequired": "NONE",
|
||||||
@ -84,8 +85,9 @@
|
|||||||
"cpeMatch": [
|
"cpeMatch": [
|
||||||
{
|
{
|
||||||
"vulnerable": true,
|
"vulnerable": true,
|
||||||
"criteria": "cpe:2.3:a:imagemagick:imagemagick:-:*:*:*:*:*:*:*",
|
"criteria": "cpe:2.3:a:imagemagick:imagemagick:*:*:*:*:*:*:*:*",
|
||||||
"matchCriteriaId": "6E6BE7A5-6FF7-4916-B671-9EE11CA54F65"
|
"versionEndExcluding": "6.9.4-0",
|
||||||
|
"matchCriteriaId": "CFC2C780-A54E-4426-9C52-46A20216339E"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -2,8 +2,9 @@
|
|||||||
"id": "CVE-2016-7526",
|
"id": "CVE-2016-7526",
|
||||||
"sourceIdentifier": "security@debian.org",
|
"sourceIdentifier": "security@debian.org",
|
||||||
"published": "2017-04-20T18:59:01.187",
|
"published": "2017-04-20T18:59:01.187",
|
||||||
"lastModified": "2020-11-16T19:39:56.297",
|
"lastModified": "2024-07-03T15:21:49.110",
|
||||||
"vulnStatus": "Analyzed",
|
"vulnStatus": "Analyzed",
|
||||||
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
"lang": "en",
|
"lang": "en",
|
||||||
@ -84,8 +85,9 @@
|
|||||||
"cpeMatch": [
|
"cpeMatch": [
|
||||||
{
|
{
|
||||||
"vulnerable": true,
|
"vulnerable": true,
|
||||||
"criteria": "cpe:2.3:a:imagemagick:imagemagick:-:*:*:*:*:*:*:*",
|
"criteria": "cpe:2.3:a:imagemagick:imagemagick:*:*:*:*:*:*:*:*",
|
||||||
"matchCriteriaId": "6E6BE7A5-6FF7-4916-B671-9EE11CA54F65"
|
"versionEndExcluding": "6.9.4-0",
|
||||||
|
"matchCriteriaId": "CFC2C780-A54E-4426-9C52-46A20216339E"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -2,8 +2,9 @@
|
|||||||
"id": "CVE-2016-7527",
|
"id": "CVE-2016-7527",
|
||||||
"sourceIdentifier": "security@debian.org",
|
"sourceIdentifier": "security@debian.org",
|
||||||
"published": "2017-04-20T18:59:01.217",
|
"published": "2017-04-20T18:59:01.217",
|
||||||
"lastModified": "2020-11-16T19:37:51.120",
|
"lastModified": "2024-07-03T15:22:01.010",
|
||||||
"vulnStatus": "Analyzed",
|
"vulnStatus": "Analyzed",
|
||||||
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
"lang": "en",
|
"lang": "en",
|
||||||
@ -84,8 +85,9 @@
|
|||||||
"cpeMatch": [
|
"cpeMatch": [
|
||||||
{
|
{
|
||||||
"vulnerable": true,
|
"vulnerable": true,
|
||||||
"criteria": "cpe:2.3:a:imagemagick:imagemagick:-:*:*:*:*:*:*:*",
|
"criteria": "cpe:2.3:a:imagemagick:imagemagick:*:*:*:*:*:*:*:*",
|
||||||
"matchCriteriaId": "6E6BE7A5-6FF7-4916-B671-9EE11CA54F65"
|
"versionEndExcluding": "6.9.4-0",
|
||||||
|
"matchCriteriaId": "CFC2C780-A54E-4426-9C52-46A20216339E"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -2,8 +2,9 @@
|
|||||||
"id": "CVE-2016-7528",
|
"id": "CVE-2016-7528",
|
||||||
"sourceIdentifier": "security@debian.org",
|
"sourceIdentifier": "security@debian.org",
|
||||||
"published": "2017-04-19T14:59:00.397",
|
"published": "2017-04-19T14:59:00.397",
|
||||||
"lastModified": "2020-11-16T19:36:05.883",
|
"lastModified": "2024-07-03T15:22:10.600",
|
||||||
"vulnStatus": "Analyzed",
|
"vulnStatus": "Analyzed",
|
||||||
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
"lang": "en",
|
"lang": "en",
|
||||||
@ -84,8 +85,9 @@
|
|||||||
"cpeMatch": [
|
"cpeMatch": [
|
||||||
{
|
{
|
||||||
"vulnerable": true,
|
"vulnerable": true,
|
||||||
"criteria": "cpe:2.3:a:imagemagick:imagemagick:-:*:*:*:*:*:*:*",
|
"criteria": "cpe:2.3:a:imagemagick:imagemagick:*:*:*:*:*:*:*:*",
|
||||||
"matchCriteriaId": "6E6BE7A5-6FF7-4916-B671-9EE11CA54F65"
|
"versionEndExcluding": "6.9.4-0",
|
||||||
|
"matchCriteriaId": "CFC2C780-A54E-4426-9C52-46A20216339E"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -2,8 +2,9 @@
|
|||||||
"id": "CVE-2016-7529",
|
"id": "CVE-2016-7529",
|
||||||
"sourceIdentifier": "security@debian.org",
|
"sourceIdentifier": "security@debian.org",
|
||||||
"published": "2017-04-19T14:59:00.443",
|
"published": "2017-04-19T14:59:00.443",
|
||||||
"lastModified": "2017-05-09T12:39:23.460",
|
"lastModified": "2024-07-03T15:22:20.367",
|
||||||
"vulnStatus": "Analyzed",
|
"vulnStatus": "Analyzed",
|
||||||
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
"lang": "en",
|
"lang": "en",
|
||||||
@ -15,13 +16,13 @@
|
|||||||
}
|
}
|
||||||
],
|
],
|
||||||
"metrics": {
|
"metrics": {
|
||||||
"cvssMetricV30": [
|
"cvssMetricV31": [
|
||||||
{
|
{
|
||||||
"source": "nvd@nist.gov",
|
"source": "nvd@nist.gov",
|
||||||
"type": "Primary",
|
"type": "Primary",
|
||||||
"cvssData": {
|
"cvssData": {
|
||||||
"version": "3.0",
|
"version": "3.1",
|
||||||
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
|
||||||
"attackVector": "NETWORK",
|
"attackVector": "NETWORK",
|
||||||
"attackComplexity": "LOW",
|
"attackComplexity": "LOW",
|
||||||
"privilegesRequired": "NONE",
|
"privilegesRequired": "NONE",
|
||||||
@ -84,8 +85,9 @@
|
|||||||
"cpeMatch": [
|
"cpeMatch": [
|
||||||
{
|
{
|
||||||
"vulnerable": true,
|
"vulnerable": true,
|
||||||
"criteria": "cpe:2.3:a:imagemagick:imagemagick:-:*:*:*:*:*:*:*",
|
"criteria": "cpe:2.3:a:imagemagick:imagemagick:*:*:*:*:*:*:*:*",
|
||||||
"matchCriteriaId": "6E6BE7A5-6FF7-4916-B671-9EE11CA54F65"
|
"versionEndExcluding": "6.9.4-0",
|
||||||
|
"matchCriteriaId": "CFC2C780-A54E-4426-9C52-46A20216339E"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -2,8 +2,9 @@
|
|||||||
"id": "CVE-2016-7530",
|
"id": "CVE-2016-7530",
|
||||||
"sourceIdentifier": "security@debian.org",
|
"sourceIdentifier": "security@debian.org",
|
||||||
"published": "2017-04-20T18:59:01.263",
|
"published": "2017-04-20T18:59:01.263",
|
||||||
"lastModified": "2017-05-09T12:39:19.320",
|
"lastModified": "2024-07-03T15:22:34.133",
|
||||||
"vulnStatus": "Analyzed",
|
"vulnStatus": "Analyzed",
|
||||||
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
"lang": "en",
|
"lang": "en",
|
||||||
@ -15,13 +16,13 @@
|
|||||||
}
|
}
|
||||||
],
|
],
|
||||||
"metrics": {
|
"metrics": {
|
||||||
"cvssMetricV30": [
|
"cvssMetricV31": [
|
||||||
{
|
{
|
||||||
"source": "nvd@nist.gov",
|
"source": "nvd@nist.gov",
|
||||||
"type": "Primary",
|
"type": "Primary",
|
||||||
"cvssData": {
|
"cvssData": {
|
||||||
"version": "3.0",
|
"version": "3.1",
|
||||||
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
|
||||||
"attackVector": "NETWORK",
|
"attackVector": "NETWORK",
|
||||||
"attackComplexity": "LOW",
|
"attackComplexity": "LOW",
|
||||||
"privilegesRequired": "NONE",
|
"privilegesRequired": "NONE",
|
||||||
@ -84,8 +85,9 @@
|
|||||||
"cpeMatch": [
|
"cpeMatch": [
|
||||||
{
|
{
|
||||||
"vulnerable": true,
|
"vulnerable": true,
|
||||||
"criteria": "cpe:2.3:a:imagemagick:imagemagick:-:*:*:*:*:*:*:*",
|
"criteria": "cpe:2.3:a:imagemagick:imagemagick:*:*:*:*:*:*:*:*",
|
||||||
"matchCriteriaId": "6E6BE7A5-6FF7-4916-B671-9EE11CA54F65"
|
"versionEndExcluding": "6.9.4-0",
|
||||||
|
"matchCriteriaId": "CFC2C780-A54E-4426-9C52-46A20216339E"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -2,8 +2,9 @@
|
|||||||
"id": "CVE-2016-7533",
|
"id": "CVE-2016-7533",
|
||||||
"sourceIdentifier": "security@debian.org",
|
"sourceIdentifier": "security@debian.org",
|
||||||
"published": "2017-04-19T14:59:00.520",
|
"published": "2017-04-19T14:59:00.520",
|
||||||
"lastModified": "2017-05-09T12:39:08.790",
|
"lastModified": "2024-07-03T15:23:17.167",
|
||||||
"vulnStatus": "Analyzed",
|
"vulnStatus": "Analyzed",
|
||||||
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
"lang": "en",
|
"lang": "en",
|
||||||
@ -15,13 +16,13 @@
|
|||||||
}
|
}
|
||||||
],
|
],
|
||||||
"metrics": {
|
"metrics": {
|
||||||
"cvssMetricV30": [
|
"cvssMetricV31": [
|
||||||
{
|
{
|
||||||
"source": "nvd@nist.gov",
|
"source": "nvd@nist.gov",
|
||||||
"type": "Primary",
|
"type": "Primary",
|
||||||
"cvssData": {
|
"cvssData": {
|
||||||
"version": "3.0",
|
"version": "3.1",
|
||||||
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
|
||||||
"attackVector": "NETWORK",
|
"attackVector": "NETWORK",
|
||||||
"attackComplexity": "LOW",
|
"attackComplexity": "LOW",
|
||||||
"privilegesRequired": "NONE",
|
"privilegesRequired": "NONE",
|
||||||
@ -84,8 +85,9 @@
|
|||||||
"cpeMatch": [
|
"cpeMatch": [
|
||||||
{
|
{
|
||||||
"vulnerable": true,
|
"vulnerable": true,
|
||||||
"criteria": "cpe:2.3:a:imagemagick:imagemagick:-:*:*:*:*:*:*:*",
|
"criteria": "cpe:2.3:a:imagemagick:imagemagick:*:*:*:*:*:*:*:*",
|
||||||
"matchCriteriaId": "6E6BE7A5-6FF7-4916-B671-9EE11CA54F65"
|
"versionEndExcluding": "6.9.4-0",
|
||||||
|
"matchCriteriaId": "CFC2C780-A54E-4426-9C52-46A20216339E"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -2,8 +2,16 @@
|
|||||||
"id": "CVE-2021-27798",
|
"id": "CVE-2021-27798",
|
||||||
"sourceIdentifier": "sirt@brocade.com",
|
"sourceIdentifier": "sirt@brocade.com",
|
||||||
"published": "2022-08-05T16:15:10.807",
|
"published": "2022-08-05T16:15:10.807",
|
||||||
"lastModified": "2024-05-17T01:55:38.763",
|
"lastModified": "2024-07-03T15:15:05.193",
|
||||||
"vulnStatus": "Modified",
|
"vulnStatus": "Modified",
|
||||||
|
"cveTags": [
|
||||||
|
{
|
||||||
|
"sourceIdentifier": "sirt@brocade.com",
|
||||||
|
"tags": [
|
||||||
|
"unsupported-when-assigned"
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
"lang": "en",
|
"lang": "en",
|
||||||
|
@ -2,8 +2,16 @@
|
|||||||
"id": "CVE-2022-31362",
|
"id": "CVE-2022-31362",
|
||||||
"sourceIdentifier": "cve@mitre.org",
|
"sourceIdentifier": "cve@mitre.org",
|
||||||
"published": "2022-06-23T17:15:13.123",
|
"published": "2022-06-23T17:15:13.123",
|
||||||
"lastModified": "2024-05-17T02:09:31.817",
|
"lastModified": "2024-07-03T14:15:04.330",
|
||||||
"vulnStatus": "Modified",
|
"vulnStatus": "Modified",
|
||||||
|
"cveTags": [
|
||||||
|
{
|
||||||
|
"sourceIdentifier": "cve@mitre.org",
|
||||||
|
"tags": [
|
||||||
|
"unsupported-when-assigned"
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
"lang": "en",
|
"lang": "en",
|
||||||
|
@ -2,8 +2,16 @@
|
|||||||
"id": "CVE-2022-40297",
|
"id": "CVE-2022-40297",
|
||||||
"sourceIdentifier": "cve@mitre.org",
|
"sourceIdentifier": "cve@mitre.org",
|
||||||
"published": "2022-09-09T00:15:08.793",
|
"published": "2022-09-09T00:15:08.793",
|
||||||
"lastModified": "2024-05-17T02:13:18.643",
|
"lastModified": "2024-07-03T15:15:05.423",
|
||||||
"vulnStatus": "Modified",
|
"vulnStatus": "Modified",
|
||||||
|
"cveTags": [
|
||||||
|
{
|
||||||
|
"sourceIdentifier": "cve@mitre.org",
|
||||||
|
"tags": [
|
||||||
|
"disputed"
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
"lang": "en",
|
"lang": "en",
|
||||||
|
@ -2,8 +2,8 @@
|
|||||||
"id": "CVE-2024-1427",
|
"id": "CVE-2024-1427",
|
||||||
"sourceIdentifier": "security@wordfence.com",
|
"sourceIdentifier": "security@wordfence.com",
|
||||||
"published": "2024-07-02T06:15:02.253",
|
"published": "2024-07-02T06:15:02.253",
|
||||||
"lastModified": "2024-07-02T12:09:16.907",
|
"lastModified": "2024-07-03T15:44:40.083",
|
||||||
"vulnStatus": "Awaiting Analysis",
|
"vulnStatus": "Analyzed",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
@ -18,8 +18,28 @@
|
|||||||
"metrics": {
|
"metrics": {
|
||||||
"cvssMetricV31": [
|
"cvssMetricV31": [
|
||||||
{
|
{
|
||||||
"source": "security@wordfence.com",
|
"source": "nvd@nist.gov",
|
||||||
"type": "Primary",
|
"type": "Primary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
|
||||||
|
"attackVector": "NETWORK",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "LOW",
|
||||||
|
"userInteraction": "REQUIRED",
|
||||||
|
"scope": "CHANGED",
|
||||||
|
"confidentialityImpact": "LOW",
|
||||||
|
"integrityImpact": "LOW",
|
||||||
|
"availabilityImpact": "NONE",
|
||||||
|
"baseScore": 5.4,
|
||||||
|
"baseSeverity": "MEDIUM"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 2.3,
|
||||||
|
"impactScore": 2.7
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"source": "security@wordfence.com",
|
||||||
|
"type": "Secondary",
|
||||||
"cvssData": {
|
"cvssData": {
|
||||||
"version": "3.1",
|
"version": "3.1",
|
||||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N",
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N",
|
||||||
@ -39,18 +59,57 @@
|
|||||||
}
|
}
|
||||||
]
|
]
|
||||||
},
|
},
|
||||||
|
"weaknesses": [
|
||||||
|
{
|
||||||
|
"source": "nvd@nist.gov",
|
||||||
|
"type": "Primary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-79"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"configurations": [
|
||||||
|
{
|
||||||
|
"nodes": [
|
||||||
|
{
|
||||||
|
"operator": "OR",
|
||||||
|
"negate": false,
|
||||||
|
"cpeMatch": [
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:a:radiustheme:the_post_grid:*:*:*:*:*:wordpress:*:*",
|
||||||
|
"versionEndExcluding": "7.7.2",
|
||||||
|
"matchCriteriaId": "0181ECD4-44C0-432C-80B6-70123A9FBE22"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
"references": [
|
"references": [
|
||||||
{
|
{
|
||||||
"url": "https://plugins.trac.wordpress.org/browser/the-post-grid/tags/7.4.2/app/Helpers/Fns.php#L1051",
|
"url": "https://plugins.trac.wordpress.org/browser/the-post-grid/tags/7.4.2/app/Helpers/Fns.php#L1051",
|
||||||
"source": "security@wordfence.com"
|
"source": "security@wordfence.com",
|
||||||
|
"tags": [
|
||||||
|
"Product"
|
||||||
|
]
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"url": "https://plugins.trac.wordpress.org/changeset/3080313/#file347",
|
"url": "https://plugins.trac.wordpress.org/changeset/3080313/#file347",
|
||||||
"source": "security@wordfence.com"
|
"source": "security@wordfence.com",
|
||||||
|
"tags": [
|
||||||
|
"Patch"
|
||||||
|
]
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/fc870ce5-1352-43f2-b80b-45065ceed750?source=cve",
|
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/fc870ce5-1352-43f2-b80b-45065ceed750?source=cve",
|
||||||
"source": "security@wordfence.com"
|
"source": "security@wordfence.com",
|
||||||
|
"tags": [
|
||||||
|
"Third Party Advisory"
|
||||||
|
]
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
@ -2,8 +2,9 @@
|
|||||||
"id": "CVE-2024-1931",
|
"id": "CVE-2024-1931",
|
||||||
"sourceIdentifier": "sep@nlnetlabs.nl",
|
"sourceIdentifier": "sep@nlnetlabs.nl",
|
||||||
"published": "2024-03-07T10:15:07.037",
|
"published": "2024-03-07T10:15:07.037",
|
||||||
"lastModified": "2024-04-28T04:15:11.000",
|
"lastModified": "2024-07-03T15:15:05.560",
|
||||||
"vulnStatus": "Awaiting Analysis",
|
"vulnStatus": "Awaiting Analysis",
|
||||||
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
"lang": "en",
|
"lang": "en",
|
||||||
@ -63,6 +64,10 @@
|
|||||||
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RBR4H7RCVMJ6H76S4LLRSY5EBFTYWGXK/",
|
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RBR4H7RCVMJ6H76S4LLRSY5EBFTYWGXK/",
|
||||||
"source": "sep@nlnetlabs.nl"
|
"source": "sep@nlnetlabs.nl"
|
||||||
},
|
},
|
||||||
|
{
|
||||||
|
"url": "https://lists.freebsd.org/archives/freebsd-security/2024-July/000283.html",
|
||||||
|
"source": "sep@nlnetlabs.nl"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"url": "https://www.nlnetlabs.nl/downloads/unbound/CVE-2024-1931.txt",
|
"url": "https://www.nlnetlabs.nl/downloads/unbound/CVE-2024-1931.txt",
|
||||||
"source": "sep@nlnetlabs.nl"
|
"source": "sep@nlnetlabs.nl"
|
||||||
|
@ -2,8 +2,8 @@
|
|||||||
"id": "CVE-2024-27857",
|
"id": "CVE-2024-27857",
|
||||||
"sourceIdentifier": "product-security@apple.com",
|
"sourceIdentifier": "product-security@apple.com",
|
||||||
"published": "2024-06-10T21:15:51.833",
|
"published": "2024-06-10T21:15:51.833",
|
||||||
"lastModified": "2024-07-03T01:51:14.753",
|
"lastModified": "2024-07-03T15:43:17.007",
|
||||||
"vulnStatus": "Undergoing Analysis",
|
"vulnStatus": "Analyzed",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
@ -17,6 +17,26 @@
|
|||||||
],
|
],
|
||||||
"metrics": {
|
"metrics": {
|
||||||
"cvssMetricV31": [
|
"cvssMetricV31": [
|
||||||
|
{
|
||||||
|
"source": "nvd@nist.gov",
|
||||||
|
"type": "Primary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||||||
|
"attackVector": "LOCAL",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "NONE",
|
||||||
|
"userInteraction": "REQUIRED",
|
||||||
|
"scope": "UNCHANGED",
|
||||||
|
"confidentialityImpact": "HIGH",
|
||||||
|
"integrityImpact": "HIGH",
|
||||||
|
"availabilityImpact": "HIGH",
|
||||||
|
"baseScore": 7.8,
|
||||||
|
"baseSeverity": "HIGH"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 1.8,
|
||||||
|
"impactScore": 5.9
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||||
"type": "Secondary",
|
"type": "Secondary",
|
||||||
@ -40,6 +60,16 @@
|
|||||||
]
|
]
|
||||||
},
|
},
|
||||||
"weaknesses": [
|
"weaknesses": [
|
||||||
|
{
|
||||||
|
"source": "nvd@nist.gov",
|
||||||
|
"type": "Primary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-119"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||||
"type": "Secondary",
|
"type": "Secondary",
|
||||||
@ -51,42 +81,113 @@
|
|||||||
]
|
]
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
|
"configurations": [
|
||||||
|
{
|
||||||
|
"nodes": [
|
||||||
|
{
|
||||||
|
"operator": "OR",
|
||||||
|
"negate": false,
|
||||||
|
"cpeMatch": [
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*",
|
||||||
|
"versionEndExcluding": "17.5",
|
||||||
|
"matchCriteriaId": "E7F2E11C-4A7D-4E71-BFAA-396B0549F649"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*",
|
||||||
|
"versionEndExcluding": "17.5",
|
||||||
|
"matchCriteriaId": "E9C4B45E-AF58-4D7C-B73A-618B06AED56E"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*",
|
||||||
|
"versionStartIncluding": "14.0",
|
||||||
|
"versionEndExcluding": "14.5",
|
||||||
|
"matchCriteriaId": "6AB18623-7D06-4946-99FC-808A4A913ED9"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*",
|
||||||
|
"versionEndExcluding": "17.5",
|
||||||
|
"matchCriteriaId": "003383BF-F06C-4300-908D-D1C8498C6BCD"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:o:apple:visionos:*:*:*:*:*:*:*:*",
|
||||||
|
"versionEndExcluding": "1.2",
|
||||||
|
"matchCriteriaId": "20FA533E-AA15-4561-AAF1-F8C3F5283C88"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
"references": [
|
"references": [
|
||||||
{
|
{
|
||||||
"url": "http://seclists.org/fulldisclosure/2024/Jun/5",
|
"url": "http://seclists.org/fulldisclosure/2024/Jun/5",
|
||||||
"source": "product-security@apple.com"
|
"source": "product-security@apple.com",
|
||||||
|
"tags": [
|
||||||
|
"Mailing List",
|
||||||
|
"Third Party Advisory"
|
||||||
|
]
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"url": "https://support.apple.com/en-us/HT214101",
|
"url": "https://support.apple.com/en-us/HT214101",
|
||||||
"source": "product-security@apple.com"
|
"source": "product-security@apple.com",
|
||||||
|
"tags": [
|
||||||
|
"Vendor Advisory"
|
||||||
|
]
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"url": "https://support.apple.com/en-us/HT214102",
|
"url": "https://support.apple.com/en-us/HT214102",
|
||||||
"source": "product-security@apple.com"
|
"source": "product-security@apple.com",
|
||||||
|
"tags": [
|
||||||
|
"Vendor Advisory"
|
||||||
|
]
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"url": "https://support.apple.com/en-us/HT214106",
|
"url": "https://support.apple.com/en-us/HT214106",
|
||||||
"source": "product-security@apple.com"
|
"source": "product-security@apple.com",
|
||||||
|
"tags": [
|
||||||
|
"Vendor Advisory"
|
||||||
|
]
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"url": "https://support.apple.com/en-us/HT214108",
|
"url": "https://support.apple.com/en-us/HT214108",
|
||||||
"source": "product-security@apple.com"
|
"source": "product-security@apple.com",
|
||||||
|
"tags": [
|
||||||
|
"Vendor Advisory"
|
||||||
|
]
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"url": "https://support.apple.com/kb/HT214101",
|
"url": "https://support.apple.com/kb/HT214101",
|
||||||
"source": "product-security@apple.com"
|
"source": "product-security@apple.com",
|
||||||
|
"tags": [
|
||||||
|
"Vendor Advisory"
|
||||||
|
]
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"url": "https://support.apple.com/kb/HT214102",
|
"url": "https://support.apple.com/kb/HT214102",
|
||||||
"source": "product-security@apple.com"
|
"source": "product-security@apple.com",
|
||||||
|
"tags": [
|
||||||
|
"Vendor Advisory"
|
||||||
|
]
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"url": "https://support.apple.com/kb/HT214106",
|
"url": "https://support.apple.com/kb/HT214106",
|
||||||
"source": "product-security@apple.com"
|
"source": "product-security@apple.com",
|
||||||
|
"tags": [
|
||||||
|
"Vendor Advisory"
|
||||||
|
]
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"url": "https://support.apple.com/kb/HT214108",
|
"url": "https://support.apple.com/kb/HT214108",
|
||||||
"source": "product-security@apple.com"
|
"source": "product-security@apple.com",
|
||||||
|
"tags": [
|
||||||
|
"Vendor Advisory"
|
||||||
|
]
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
@ -2,8 +2,9 @@
|
|||||||
"id": "CVE-2024-27885",
|
"id": "CVE-2024-27885",
|
||||||
"sourceIdentifier": "product-security@apple.com",
|
"sourceIdentifier": "product-security@apple.com",
|
||||||
"published": "2024-06-10T21:15:51.903",
|
"published": "2024-06-10T21:15:51.903",
|
||||||
"lastModified": "2024-06-11T13:54:12.057",
|
"lastModified": "2024-07-03T15:44:29.397",
|
||||||
"vulnStatus": "Undergoing Analysis",
|
"vulnStatus": "Analyzed",
|
||||||
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
"lang": "en",
|
"lang": "en",
|
||||||
@ -14,31 +15,116 @@
|
|||||||
"value": "Este problema se solucion\u00f3 con una validaci\u00f3n mejorada de los enlaces simb\u00f3licos. Este problema se solucion\u00f3 en macOS Sonoma 14.5, macOS Ventura 13.6.7, macOS Monterey 12.7.5. Es posible que una aplicaci\u00f3n pueda modificar partes protegidas del sistema de archivos."
|
"value": "Este problema se solucion\u00f3 con una validaci\u00f3n mejorada de los enlaces simb\u00f3licos. Este problema se solucion\u00f3 en macOS Sonoma 14.5, macOS Ventura 13.6.7, macOS Monterey 12.7.5. Es posible que una aplicaci\u00f3n pueda modificar partes protegidas del sistema de archivos."
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"metrics": {},
|
"metrics": {
|
||||||
|
"cvssMetricV31": [
|
||||||
|
{
|
||||||
|
"source": "nvd@nist.gov",
|
||||||
|
"type": "Primary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:N/I:H/A:N",
|
||||||
|
"attackVector": "LOCAL",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "NONE",
|
||||||
|
"userInteraction": "REQUIRED",
|
||||||
|
"scope": "CHANGED",
|
||||||
|
"confidentialityImpact": "NONE",
|
||||||
|
"integrityImpact": "HIGH",
|
||||||
|
"availabilityImpact": "NONE",
|
||||||
|
"baseScore": 6.3,
|
||||||
|
"baseSeverity": "MEDIUM"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 1.8,
|
||||||
|
"impactScore": 4.0
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"weaknesses": [
|
||||||
|
{
|
||||||
|
"source": "nvd@nist.gov",
|
||||||
|
"type": "Primary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-59"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"configurations": [
|
||||||
|
{
|
||||||
|
"nodes": [
|
||||||
|
{
|
||||||
|
"operator": "OR",
|
||||||
|
"negate": false,
|
||||||
|
"cpeMatch": [
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*",
|
||||||
|
"versionEndExcluding": "12.7.5",
|
||||||
|
"matchCriteriaId": "3121F2A4-6F9C-4E03-837E-2A4C2B65CB09"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*",
|
||||||
|
"versionStartIncluding": "13.0",
|
||||||
|
"versionEndExcluding": "13.6.7",
|
||||||
|
"matchCriteriaId": "2D797210-B0F0-44AE-9028-47C18C22AFA5"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*",
|
||||||
|
"versionStartIncluding": "14.0",
|
||||||
|
"versionEndExcluding": "14.5",
|
||||||
|
"matchCriteriaId": "6AB18623-7D06-4946-99FC-808A4A913ED9"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
"references": [
|
"references": [
|
||||||
{
|
{
|
||||||
"url": "https://support.apple.com/en-us/HT214105",
|
"url": "https://support.apple.com/en-us/HT214105",
|
||||||
"source": "product-security@apple.com"
|
"source": "product-security@apple.com",
|
||||||
|
"tags": [
|
||||||
|
"Vendor Advisory"
|
||||||
|
]
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"url": "https://support.apple.com/en-us/HT214106",
|
"url": "https://support.apple.com/en-us/HT214106",
|
||||||
"source": "product-security@apple.com"
|
"source": "product-security@apple.com",
|
||||||
|
"tags": [
|
||||||
|
"Vendor Advisory"
|
||||||
|
]
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"url": "https://support.apple.com/en-us/HT214107",
|
"url": "https://support.apple.com/en-us/HT214107",
|
||||||
"source": "product-security@apple.com"
|
"source": "product-security@apple.com",
|
||||||
|
"tags": [
|
||||||
|
"Vendor Advisory"
|
||||||
|
]
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"url": "https://support.apple.com/kb/HT214105",
|
"url": "https://support.apple.com/kb/HT214105",
|
||||||
"source": "product-security@apple.com"
|
"source": "product-security@apple.com",
|
||||||
|
"tags": [
|
||||||
|
"Vendor Advisory"
|
||||||
|
]
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"url": "https://support.apple.com/kb/HT214106",
|
"url": "https://support.apple.com/kb/HT214106",
|
||||||
"source": "product-security@apple.com"
|
"source": "product-security@apple.com",
|
||||||
|
"tags": [
|
||||||
|
"Vendor Advisory"
|
||||||
|
]
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"url": "https://support.apple.com/kb/HT214107",
|
"url": "https://support.apple.com/kb/HT214107",
|
||||||
"source": "product-security@apple.com"
|
"source": "product-security@apple.com",
|
||||||
|
"tags": [
|
||||||
|
"Vendor Advisory"
|
||||||
|
]
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
60
CVE-2024/CVE-2024-329xx/CVE-2024-32937.json
Normal file
60
CVE-2024/CVE-2024-329xx/CVE-2024-32937.json
Normal file
@ -0,0 +1,60 @@
|
|||||||
|
{
|
||||||
|
"id": "CVE-2024-32937",
|
||||||
|
"sourceIdentifier": "talos-cna@cisco.com",
|
||||||
|
"published": "2024-07-03T14:15:05.340",
|
||||||
|
"lastModified": "2024-07-03T15:15:05.803",
|
||||||
|
"vulnStatus": "Received",
|
||||||
|
"cveTags": [],
|
||||||
|
"descriptions": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "An os command injection vulnerability exists in the CWMP SelfDefinedTimeZone functionality of Grandstream GXP2135 1.0.9.129, 1.0.11.74 and 1.0.11.79. A specially crafted network packet can lead to arbitrary command execution. An attacker can send a sequence of malicious packets to trigger this vulnerability."
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"metrics": {
|
||||||
|
"cvssMetricV31": [
|
||||||
|
{
|
||||||
|
"source": "talos-cna@cisco.com",
|
||||||
|
"type": "Primary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||||
|
"attackVector": "NETWORK",
|
||||||
|
"attackComplexity": "HIGH",
|
||||||
|
"privilegesRequired": "NONE",
|
||||||
|
"userInteraction": "NONE",
|
||||||
|
"scope": "UNCHANGED",
|
||||||
|
"confidentialityImpact": "HIGH",
|
||||||
|
"integrityImpact": "HIGH",
|
||||||
|
"availabilityImpact": "HIGH",
|
||||||
|
"baseScore": 8.1,
|
||||||
|
"baseSeverity": "HIGH"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 2.2,
|
||||||
|
"impactScore": 5.9
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"weaknesses": [
|
||||||
|
{
|
||||||
|
"source": "talos-cna@cisco.com",
|
||||||
|
"type": "Primary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-78"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://talosintelligence.com/vulnerability_reports/TALOS-2024-1978",
|
||||||
|
"source": "talos-cna@cisco.com"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://www.talosintelligence.com/vulnerability_reports/TALOS-2024-1978",
|
||||||
|
"source": "talos-cna@cisco.com"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
@ -2,17 +2,41 @@
|
|||||||
"id": "CVE-2024-34696",
|
"id": "CVE-2024-34696",
|
||||||
"sourceIdentifier": "security-advisories@github.com",
|
"sourceIdentifier": "security-advisories@github.com",
|
||||||
"published": "2024-07-01T15:15:16.907",
|
"published": "2024-07-01T15:15:16.907",
|
||||||
"lastModified": "2024-07-01T16:37:39.040",
|
"lastModified": "2024-07-03T14:42:49.743",
|
||||||
"vulnStatus": "Awaiting Analysis",
|
"vulnStatus": "Analyzed",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
"lang": "en",
|
"lang": "en",
|
||||||
"value": "GeoServer is an open source server that allows users to share and edit geospatial data. Starting in version 2.10.0 and prior to versions 2.24.4 and 2.25.1, GeoServer's Server Status page and REST API lists all environment variables and Java properties to any GeoServer user with administrative rights as part of those modules' status message. These variables/properties can also contain sensitive information, such as database passwords or API keys/tokens. Additionally, many community-developed GeoServer container images `export` other credentials from their start-up scripts as environment variables to the GeoServer (`java`) process. The precise scope of the issue depends on which container image is used and how it is configured.\n\nThe `about status` API endpoint which powers the Server Status page is only available to administrators.Depending on the operating environment, administrators might have legitimate access to credentials in other ways, but this issue defeats more sophisticated controls (like break-glass access to secrets or role accounts).By default, GeoServer only allows same-origin authenticated API access. This limits the scope for a third-party attacker to use an administrator\u2019s credentials to gain access to credentials. The researchers who found the vulnerability were unable to determine any other conditions under which the GeoServer REST API may be available more broadly.\n\nUsers should update container images to use GeoServer 2.24.4 or 2.25.1 to get the bug fix. As a workaround, leave environment variables and Java system properties hidden by default. Those who provide the option to re-enable it should communicate the impact and risks so that users can make an informed choice."
|
"value": "GeoServer is an open source server that allows users to share and edit geospatial data. Starting in version 2.10.0 and prior to versions 2.24.4 and 2.25.1, GeoServer's Server Status page and REST API lists all environment variables and Java properties to any GeoServer user with administrative rights as part of those modules' status message. These variables/properties can also contain sensitive information, such as database passwords or API keys/tokens. Additionally, many community-developed GeoServer container images `export` other credentials from their start-up scripts as environment variables to the GeoServer (`java`) process. The precise scope of the issue depends on which container image is used and how it is configured.\n\nThe `about status` API endpoint which powers the Server Status page is only available to administrators.Depending on the operating environment, administrators might have legitimate access to credentials in other ways, but this issue defeats more sophisticated controls (like break-glass access to secrets or role accounts).By default, GeoServer only allows same-origin authenticated API access. This limits the scope for a third-party attacker to use an administrator\u2019s credentials to gain access to credentials. The researchers who found the vulnerability were unable to determine any other conditions under which the GeoServer REST API may be available more broadly.\n\nUsers should update container images to use GeoServer 2.24.4 or 2.25.1 to get the bug fix. As a workaround, leave environment variables and Java system properties hidden by default. Those who provide the option to re-enable it should communicate the impact and risks so that users can make an informed choice."
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"lang": "es",
|
||||||
|
"value": "GeoServer es un servidor de c\u00f3digo abierto que permite a los usuarios compartir y editar datos geoespaciales. A partir de la versi\u00f3n 2.10.0 y antes de las versiones 2.24.4 y 2.25.1, la p\u00e1gina Estado del servidor de GeoServer y la API REST enumeran todas las variables de entorno y propiedades de Java para cualquier usuario de GeoServer con derechos administrativos como parte del mensaje de estado de esos m\u00f3dulos. Estas variables/propiedades tambi\u00e9n pueden contener informaci\u00f3n confidencial, como contrase\u00f1as de bases de datos o keys/tokens API. Adem\u00e1s, muchas im\u00e1genes de contenedores de GeoServer desarrolladas por la comunidad \"exportan\" otras credenciales desde sus scripts de inicio como variables de entorno al proceso de GeoServer (\"java\"). El alcance preciso del problema depende de qu\u00e9 imagen de contenedor se utiliza y c\u00f3mo est\u00e1 configurada. El endpoint API \"acerca del estado\" que impulsa la p\u00e1gina Estado del servidor solo est\u00e1 disponible para los administradores. Dependiendo del entorno operativo, los administradores pueden tener acceso leg\u00edtimo a las credenciales de otras maneras, pero este problema anula controles m\u00e1s sofisticados (como el acceso sin barreras a secretos o cuentas de rol). De forma predeterminada, GeoServer solo permite el acceso API autenticado del mismo origen. Esto limita las posibilidades de que un atacante externo utilice las credenciales de un administrador para obtener acceso a las credenciales. Los investigadores que encontraron la vulnerabilidad no pudieron determinar otras condiciones bajo las cuales la API REST de GeoServer pueda estar disponible de manera m\u00e1s amplia. Los usuarios deben actualizar las im\u00e1genes del contenedor para usar GeoServer 2.24.4 o 2.25.1 para corregir el error. Como workaround, deje las variables de entorno y las propiedades del sistema Java ocultas de forma predeterminada. Quienes brinden la opci\u00f3n de volver a habilitarlo deben comunicar el impacto y los riesgos para que los usuarios puedan tomar una decisi\u00f3n informada."
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"metrics": {
|
"metrics": {
|
||||||
"cvssMetricV31": [
|
"cvssMetricV31": [
|
||||||
|
{
|
||||||
|
"source": "nvd@nist.gov",
|
||||||
|
"type": "Primary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N",
|
||||||
|
"attackVector": "NETWORK",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "HIGH",
|
||||||
|
"userInteraction": "NONE",
|
||||||
|
"scope": "UNCHANGED",
|
||||||
|
"confidentialityImpact": "HIGH",
|
||||||
|
"integrityImpact": "NONE",
|
||||||
|
"availabilityImpact": "NONE",
|
||||||
|
"baseScore": 4.9,
|
||||||
|
"baseSeverity": "MEDIUM"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 1.2,
|
||||||
|
"impactScore": 3.6
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"source": "security-advisories@github.com",
|
"source": "security-advisories@github.com",
|
||||||
"type": "Secondary",
|
"type": "Secondary",
|
||||||
@ -36,6 +60,16 @@
|
|||||||
]
|
]
|
||||||
},
|
},
|
||||||
"weaknesses": [
|
"weaknesses": [
|
||||||
|
{
|
||||||
|
"source": "nvd@nist.gov",
|
||||||
|
"type": "Primary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "NVD-CWE-noinfo"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"source": "security-advisories@github.com",
|
"source": "security-advisories@github.com",
|
||||||
"type": "Secondary",
|
"type": "Secondary",
|
||||||
@ -47,10 +81,39 @@
|
|||||||
]
|
]
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
|
"configurations": [
|
||||||
|
{
|
||||||
|
"nodes": [
|
||||||
|
{
|
||||||
|
"operator": "OR",
|
||||||
|
"negate": false,
|
||||||
|
"cpeMatch": [
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:a:geoserver:geoserver:*:*:*:*:*:*:*:*",
|
||||||
|
"versionStartIncluding": "2.10.0",
|
||||||
|
"versionEndExcluding": "2.24.4",
|
||||||
|
"matchCriteriaId": "779270D7-89BA-47CA-A5E5-4539668BC18E"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:a:geoserver:geoserver:*:*:*:*:*:*:*:*",
|
||||||
|
"versionStartIncluding": "2.25.0",
|
||||||
|
"versionEndExcluding": "2.25.1",
|
||||||
|
"matchCriteriaId": "F63F5E42-FB6D-4264-BF8A-17DEB863054C"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
"references": [
|
"references": [
|
||||||
{
|
{
|
||||||
"url": "https://github.com/geoserver/geoserver/security/advisories/GHSA-j59v-vgcr-hxvf",
|
"url": "https://github.com/geoserver/geoserver/security/advisories/GHSA-j59v-vgcr-hxvf",
|
||||||
"source": "security-advisories@github.com"
|
"source": "security-advisories@github.com",
|
||||||
|
"tags": [
|
||||||
|
"Vendor Advisory"
|
||||||
|
]
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
@ -2,17 +2,41 @@
|
|||||||
"id": "CVE-2024-36401",
|
"id": "CVE-2024-36401",
|
||||||
"sourceIdentifier": "security-advisories@github.com",
|
"sourceIdentifier": "security-advisories@github.com",
|
||||||
"published": "2024-07-01T16:15:04.120",
|
"published": "2024-07-01T16:15:04.120",
|
||||||
"lastModified": "2024-07-01T16:37:39.040",
|
"lastModified": "2024-07-03T15:07:42.777",
|
||||||
"vulnStatus": "Awaiting Analysis",
|
"vulnStatus": "Analyzed",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
"lang": "en",
|
"lang": "en",
|
||||||
"value": "GeoServer is an open source server that allows users to share and edit geospatial data. Prior to versions 2.23.6, 2.24.4, and 2.25.2, multiple OGC request parameters allow Remote Code Execution (RCE) by unauthenticated users through specially crafted input against a default GeoServer installation due to unsafely evaluating property names as XPath expressions.\n\nThe GeoTools library API that GeoServer calls evaluates property/attribute names for feature types in a way that unsafely passes them to the commons-jxpath library which can execute arbitrary code when evaluating XPath expressions. This XPath evaluation is intended to be used only by complex feature types (i.e., Application Schema data stores) but is incorrectly being applied to simple feature types as well which makes this vulnerability apply to **ALL** GeoServer instances. No public PoC is provided but this vulnerability has been confirmed to be exploitable through WFS GetFeature, WFS GetPropertyValue, WMS GetMap, WMS GetFeatureInfo, WMS GetLegendGraphic and WPS Execute requests. This vulnerability can lead to executing arbitrary code.\n\nVersions 2.23.6, 2.24.4, and 2.25.2 contain a patch for the issue. A workaround exists by removing the `gt-complex-x.y.jar` file from the GeoServer where `x.y` is the GeoTools version (e.g., `gt-complex-31.1.jar` if running GeoServer 2.25.1). This will remove the vulnerable code from GeoServer but may break some GeoServer functionality or prevent GeoServer from deploying if the gt-complex module is needed."
|
"value": "GeoServer is an open source server that allows users to share and edit geospatial data. Prior to versions 2.23.6, 2.24.4, and 2.25.2, multiple OGC request parameters allow Remote Code Execution (RCE) by unauthenticated users through specially crafted input against a default GeoServer installation due to unsafely evaluating property names as XPath expressions.\n\nThe GeoTools library API that GeoServer calls evaluates property/attribute names for feature types in a way that unsafely passes them to the commons-jxpath library which can execute arbitrary code when evaluating XPath expressions. This XPath evaluation is intended to be used only by complex feature types (i.e., Application Schema data stores) but is incorrectly being applied to simple feature types as well which makes this vulnerability apply to **ALL** GeoServer instances. No public PoC is provided but this vulnerability has been confirmed to be exploitable through WFS GetFeature, WFS GetPropertyValue, WMS GetMap, WMS GetFeatureInfo, WMS GetLegendGraphic and WPS Execute requests. This vulnerability can lead to executing arbitrary code.\n\nVersions 2.23.6, 2.24.4, and 2.25.2 contain a patch for the issue. A workaround exists by removing the `gt-complex-x.y.jar` file from the GeoServer where `x.y` is the GeoTools version (e.g., `gt-complex-31.1.jar` if running GeoServer 2.25.1). This will remove the vulnerable code from GeoServer but may break some GeoServer functionality or prevent GeoServer from deploying if the gt-complex module is needed."
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"lang": "es",
|
||||||
|
"value": "GeoServer es un servidor de c\u00f3digo abierto que permite a los usuarios compartir y editar datos geoespaciales. Antes de las versiones 2.23.6, 2.24.4 y 2.25.2, varios par\u00e1metros de solicitud de OGC permit\u00edan la ejecuci\u00f3n remota de c\u00f3digo (RCE) por parte de usuarios no autenticados a trav\u00e9s de entradas especialmente dise\u00f1adas en una instalaci\u00f3n predeterminada de GeoServer debido a la evaluaci\u00f3n insegura de nombres de propiedades como expresiones XPath. La API de la librer\u00eda GeoTools a la que llama GeoServer eval\u00faa los nombres de propiedades/atributos para tipos de entidades de una manera que los pasa de manera insegura a la librer\u00eda commons-jxpath, que puede ejecutar c\u00f3digo arbitrario al evaluar expresiones XPath. Esta evaluaci\u00f3n XPath est\u00e1 destinada a ser utilizada \u00fanicamente por tipos de funciones complejas (es decir, almacenes de datos de esquemas de aplicaci\u00f3n), pero tambi\u00e9n se aplica incorrectamente a tipos de funciones simples, lo que hace que esta vulnerabilidad se aplique a **TODAS** las instancias de GeoServer. No se proporciona ninguna PoC p\u00fablica, pero se ha confirmado que esta vulnerabilidad es explotable a trav\u00e9s de solicitudes WFS GetFeature, WFS GetPropertyValue, WMS GetMap, WMS GetFeatureInfo, WMS GetLegendGraphic y WPS Execute. Esta vulnerabilidad puede llevar a la ejecuci\u00f3n de c\u00f3digo arbitrario. Las versiones 2.23.6, 2.24.4 y 2.25.2 contienen un parche para el problema. Existe una workaround eliminando el archivo `gt-complex-xyjar` del GeoServer donde `xy` es la versi\u00f3n de GeoTools (por ejemplo, `gt-complex-31.1.jar` si ejecuta GeoServer 2.25.1). Esto eliminar\u00e1 el c\u00f3digo vulnerable de GeoServer, pero puede interrumpir algunas funciones de GeoServer o evitar que GeoServer se implemente si se necesita el m\u00f3dulo gt-complex."
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"metrics": {
|
"metrics": {
|
||||||
"cvssMetricV31": [
|
"cvssMetricV31": [
|
||||||
|
{
|
||||||
|
"source": "nvd@nist.gov",
|
||||||
|
"type": "Primary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||||
|
"attackVector": "NETWORK",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "NONE",
|
||||||
|
"userInteraction": "NONE",
|
||||||
|
"scope": "UNCHANGED",
|
||||||
|
"confidentialityImpact": "HIGH",
|
||||||
|
"integrityImpact": "HIGH",
|
||||||
|
"availabilityImpact": "HIGH",
|
||||||
|
"baseScore": 9.8,
|
||||||
|
"baseSeverity": "CRITICAL"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 3.9,
|
||||||
|
"impactScore": 5.9
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"source": "security-advisories@github.com",
|
"source": "security-advisories@github.com",
|
||||||
"type": "Secondary",
|
"type": "Secondary",
|
||||||
@ -36,6 +60,16 @@
|
|||||||
]
|
]
|
||||||
},
|
},
|
||||||
"weaknesses": [
|
"weaknesses": [
|
||||||
|
{
|
||||||
|
"source": "nvd@nist.gov",
|
||||||
|
"type": "Primary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-94"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"source": "security-advisories@github.com",
|
"source": "security-advisories@github.com",
|
||||||
"type": "Secondary",
|
"type": "Secondary",
|
||||||
@ -47,26 +81,97 @@
|
|||||||
]
|
]
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
|
"configurations": [
|
||||||
|
{
|
||||||
|
"nodes": [
|
||||||
|
{
|
||||||
|
"operator": "OR",
|
||||||
|
"negate": false,
|
||||||
|
"cpeMatch": [
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:a:geoserver:geoserver:*:*:*:*:*:*:*:*",
|
||||||
|
"versionEndExcluding": "2.23.6",
|
||||||
|
"matchCriteriaId": "9C28BE03-93E6-4FC4-AA6E-00E41AF25CB0"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:a:geoserver:geoserver:*:*:*:*:*:*:*:*",
|
||||||
|
"versionStartIncluding": "2.24.0",
|
||||||
|
"versionEndExcluding": "2.24.4",
|
||||||
|
"matchCriteriaId": "6A407E94-A7F2-4A4F-B96E-2B3DC8FF6DF3"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:a:geoserver:geoserver:*:*:*:*:*:*:*:*",
|
||||||
|
"versionStartIncluding": "2.25.0",
|
||||||
|
"versionEndExcluding": "2.25.2",
|
||||||
|
"matchCriteriaId": "CFBAEC7A-6250-45FE-AB54-30D72C03F62D"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:a:geotools:geotools:*:*:*:*:*:*:*:*",
|
||||||
|
"versionEndExcluding": "29.6",
|
||||||
|
"matchCriteriaId": "732DE428-3515-459F-AE5F-08407BA1A049"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:a:geotools:geotools:*:*:*:*:*:*:*:*",
|
||||||
|
"versionStartIncluding": "30.0",
|
||||||
|
"versionEndExcluding": "30.4",
|
||||||
|
"matchCriteriaId": "D3B2BC3D-0015-4E5D-979A-AB7D18185A57"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:a:geotools:geotools:*:*:*:*:*:*:*:*",
|
||||||
|
"versionStartIncluding": "31.0",
|
||||||
|
"versionEndExcluding": "31.2",
|
||||||
|
"matchCriteriaId": "50BB4154-B19C-4BFD-8E88-9ED445680706"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
"references": [
|
"references": [
|
||||||
{
|
{
|
||||||
"url": "https://github.com/Warxim/CVE-2022-41852?tab=readme-ov-file#workaround-for-cve-2022-41852",
|
"url": "https://github.com/Warxim/CVE-2022-41852?tab=readme-ov-file#workaround-for-cve-2022-41852",
|
||||||
"source": "security-advisories@github.com"
|
"source": "security-advisories@github.com",
|
||||||
|
"tags": [
|
||||||
|
"Exploit",
|
||||||
|
"Third Party Advisory"
|
||||||
|
]
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"url": "https://github.com/geoserver/geoserver/security/advisories/GHSA-6jj6-gm7p-fcvv",
|
"url": "https://github.com/geoserver/geoserver/security/advisories/GHSA-6jj6-gm7p-fcvv",
|
||||||
"source": "security-advisories@github.com"
|
"source": "security-advisories@github.com",
|
||||||
|
"tags": [
|
||||||
|
"Mitigation",
|
||||||
|
"Vendor Advisory"
|
||||||
|
]
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"url": "https://github.com/geotools/geotools/pull/4797",
|
"url": "https://github.com/geotools/geotools/pull/4797",
|
||||||
"source": "security-advisories@github.com"
|
"source": "security-advisories@github.com",
|
||||||
|
"tags": [
|
||||||
|
"Issue Tracking",
|
||||||
|
"Patch"
|
||||||
|
]
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"url": "https://github.com/geotools/geotools/security/advisories/GHSA-w3pj-wh35-fq8w",
|
"url": "https://github.com/geotools/geotools/security/advisories/GHSA-w3pj-wh35-fq8w",
|
||||||
"source": "security-advisories@github.com"
|
"source": "security-advisories@github.com",
|
||||||
|
"tags": [
|
||||||
|
"Exploit",
|
||||||
|
"Vendor Advisory"
|
||||||
|
]
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"url": "https://osgeo-org.atlassian.net/browse/GEOT-7587",
|
"url": "https://osgeo-org.atlassian.net/browse/GEOT-7587",
|
||||||
"source": "security-advisories@github.com"
|
"source": "security-advisories@github.com",
|
||||||
|
"tags": [
|
||||||
|
"Vendor Advisory"
|
||||||
|
]
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
@ -2,17 +2,41 @@
|
|||||||
"id": "CVE-2024-36420",
|
"id": "CVE-2024-36420",
|
||||||
"sourceIdentifier": "security-advisories@github.com",
|
"sourceIdentifier": "security-advisories@github.com",
|
||||||
"published": "2024-07-01T16:15:04.377",
|
"published": "2024-07-01T16:15:04.377",
|
||||||
"lastModified": "2024-07-01T16:37:39.040",
|
"lastModified": "2024-07-03T15:29:45.557",
|
||||||
"vulnStatus": "Awaiting Analysis",
|
"vulnStatus": "Analyzed",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
"lang": "en",
|
"lang": "en",
|
||||||
"value": "Flowise is a drag & drop user interface to build a customized large language model flow. In version 1.4.3 of Flowise, the `/api/v1/openai-assistants-file` endpoint in `index.ts` is vulnerable to arbitrary file read due to lack of sanitization of the `fileName` body parameter. No known patches for this issue are available."
|
"value": "Flowise is a drag & drop user interface to build a customized large language model flow. In version 1.4.3 of Flowise, the `/api/v1/openai-assistants-file` endpoint in `index.ts` is vulnerable to arbitrary file read due to lack of sanitization of the `fileName` body parameter. No known patches for this issue are available."
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"lang": "es",
|
||||||
|
"value": "Flowise es una interfaz de usuario de arrastrar y soltar para crear un flujo de modelo de lenguaje grande personalizado. En la versi\u00f3n 1.4.3 de Flowise, el endpoint `/api/v1/openai-assistants-file` en `index.ts` es vulnerable a la lectura arbitraria de archivos debido a la falta de sanitizaci\u00f3n del par\u00e1metro del cuerpo `fileName`. No hay parches conocidos disponibles para este problema."
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"metrics": {
|
"metrics": {
|
||||||
"cvssMetricV31": [
|
"cvssMetricV31": [
|
||||||
|
{
|
||||||
|
"source": "nvd@nist.gov",
|
||||||
|
"type": "Primary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
|
||||||
|
"attackVector": "NETWORK",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "NONE",
|
||||||
|
"userInteraction": "NONE",
|
||||||
|
"scope": "UNCHANGED",
|
||||||
|
"confidentialityImpact": "HIGH",
|
||||||
|
"integrityImpact": "NONE",
|
||||||
|
"availabilityImpact": "NONE",
|
||||||
|
"baseScore": 7.5,
|
||||||
|
"baseSeverity": "HIGH"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 3.9,
|
||||||
|
"impactScore": 3.6
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"source": "security-advisories@github.com",
|
"source": "security-advisories@github.com",
|
||||||
"type": "Secondary",
|
"type": "Secondary",
|
||||||
@ -36,6 +60,16 @@
|
|||||||
]
|
]
|
||||||
},
|
},
|
||||||
"weaknesses": [
|
"weaknesses": [
|
||||||
|
{
|
||||||
|
"source": "nvd@nist.gov",
|
||||||
|
"type": "Primary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-74"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"source": "security-advisories@github.com",
|
"source": "security-advisories@github.com",
|
||||||
"type": "Secondary",
|
"type": "Secondary",
|
||||||
@ -47,14 +81,38 @@
|
|||||||
]
|
]
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
|
"configurations": [
|
||||||
|
{
|
||||||
|
"nodes": [
|
||||||
|
{
|
||||||
|
"operator": "OR",
|
||||||
|
"negate": false,
|
||||||
|
"cpeMatch": [
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:a:flowiseai:flowise:1.4.3:*:*:*:*:*:*:*",
|
||||||
|
"matchCriteriaId": "46DEFB82-D429-4A21-A963-B9DD1EB58AD5"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
"references": [
|
"references": [
|
||||||
{
|
{
|
||||||
"url": "https://github.com/FlowiseAI/Flowise/blob/e93ce07851cdc0fcde12374f301b8070f2043687/packages/server/src/index.ts#L982",
|
"url": "https://github.com/FlowiseAI/Flowise/blob/e93ce07851cdc0fcde12374f301b8070f2043687/packages/server/src/index.ts#L982",
|
||||||
"source": "security-advisories@github.com"
|
"source": "security-advisories@github.com",
|
||||||
|
"tags": [
|
||||||
|
"Product"
|
||||||
|
]
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"url": "https://securitylab.github.com/advisories/GHSL-2023-232_GHSL-2023-234_Flowise/",
|
"url": "https://securitylab.github.com/advisories/GHSL-2023-232_GHSL-2023-234_Flowise/",
|
||||||
"source": "security-advisories@github.com"
|
"source": "security-advisories@github.com",
|
||||||
|
"tags": [
|
||||||
|
"Exploit",
|
||||||
|
"Third Party Advisory"
|
||||||
|
]
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
@ -2,17 +2,41 @@
|
|||||||
"id": "CVE-2024-36421",
|
"id": "CVE-2024-36421",
|
||||||
"sourceIdentifier": "security-advisories@github.com",
|
"sourceIdentifier": "security-advisories@github.com",
|
||||||
"published": "2024-07-01T16:15:04.623",
|
"published": "2024-07-01T16:15:04.623",
|
||||||
"lastModified": "2024-07-01T16:37:39.040",
|
"lastModified": "2024-07-03T15:36:31.170",
|
||||||
"vulnStatus": "Awaiting Analysis",
|
"vulnStatus": "Analyzed",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
"lang": "en",
|
"lang": "en",
|
||||||
"value": "Flowise is a drag & drop user interface to build a customized large language model flow. In version 1.4.3 of Flowise, A CORS misconfiguration sets the Access-Control-Allow-Origin header to all, allowing arbitrary origins to connect to the website. In the default configuration (unauthenticated), arbitrary origins may be able to make requests to Flowise, stealing information from the user. This CORS misconfiguration may be chained with the path injection to allow an attacker attackers without access to Flowise to read arbitrary files from the Flowise server. As of time of publication, no known patches are available."
|
"value": "Flowise is a drag & drop user interface to build a customized large language model flow. In version 1.4.3 of Flowise, A CORS misconfiguration sets the Access-Control-Allow-Origin header to all, allowing arbitrary origins to connect to the website. In the default configuration (unauthenticated), arbitrary origins may be able to make requests to Flowise, stealing information from the user. This CORS misconfiguration may be chained with the path injection to allow an attacker attackers without access to Flowise to read arbitrary files from the Flowise server. As of time of publication, no known patches are available."
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"lang": "es",
|
||||||
|
"value": "Flowise es una interfaz de usuario de arrastrar y soltar para crear un flujo de modelo de lenguaje grande personalizado. En la versi\u00f3n 1.4.3 de Flowise, una mala configuraci\u00f3n de CORS establece el encabezado Access-Control-Allow-Origin en todos, lo que permite que or\u00edgenes arbitrarios se conecten al sitio web. En la configuraci\u00f3n predeterminada (no autenticado), or\u00edgenes arbitrarios pueden realizar solicitudes a Flowise, robando informaci\u00f3n del usuario. Esta configuraci\u00f3n err\u00f3nea de CORS puede estar encadenada con la inyecci\u00f3n de ruta para permitir que un atacante sin acceso a Flowise lea archivos arbitrarios del servidor Flowise. Al momento de la publicaci\u00f3n, no hay parches conocidos disponibles."
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"metrics": {
|
"metrics": {
|
||||||
"cvssMetricV31": [
|
"cvssMetricV31": [
|
||||||
|
{
|
||||||
|
"source": "nvd@nist.gov",
|
||||||
|
"type": "Primary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
|
||||||
|
"attackVector": "NETWORK",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "NONE",
|
||||||
|
"userInteraction": "NONE",
|
||||||
|
"scope": "UNCHANGED",
|
||||||
|
"confidentialityImpact": "HIGH",
|
||||||
|
"integrityImpact": "NONE",
|
||||||
|
"availabilityImpact": "NONE",
|
||||||
|
"baseScore": 7.5,
|
||||||
|
"baseSeverity": "HIGH"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 3.9,
|
||||||
|
"impactScore": 3.6
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"source": "security-advisories@github.com",
|
"source": "security-advisories@github.com",
|
||||||
"type": "Secondary",
|
"type": "Secondary",
|
||||||
@ -36,6 +60,16 @@
|
|||||||
]
|
]
|
||||||
},
|
},
|
||||||
"weaknesses": [
|
"weaknesses": [
|
||||||
|
{
|
||||||
|
"source": "nvd@nist.gov",
|
||||||
|
"type": "Primary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-346"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"source": "security-advisories@github.com",
|
"source": "security-advisories@github.com",
|
||||||
"type": "Secondary",
|
"type": "Secondary",
|
||||||
@ -47,14 +81,38 @@
|
|||||||
]
|
]
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
|
"configurations": [
|
||||||
|
{
|
||||||
|
"nodes": [
|
||||||
|
{
|
||||||
|
"operator": "OR",
|
||||||
|
"negate": false,
|
||||||
|
"cpeMatch": [
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:a:flowiseai:flowise:1.4.3:*:*:*:*:*:*:*",
|
||||||
|
"matchCriteriaId": "46DEFB82-D429-4A21-A963-B9DD1EB58AD5"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
"references": [
|
"references": [
|
||||||
{
|
{
|
||||||
"url": "https://github.com/FlowiseAI/Flowise/blob/e93ce07851cdc0fcde12374f301b8070f2043687/packages/server/src/index.ts#L122",
|
"url": "https://github.com/FlowiseAI/Flowise/blob/e93ce07851cdc0fcde12374f301b8070f2043687/packages/server/src/index.ts#L122",
|
||||||
"source": "security-advisories@github.com"
|
"source": "security-advisories@github.com",
|
||||||
|
"tags": [
|
||||||
|
"Product"
|
||||||
|
]
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"url": "https://securitylab.github.com/advisories/GHSL-2023-232_GHSL-2023-234_Flowise/",
|
"url": "https://securitylab.github.com/advisories/GHSL-2023-232_GHSL-2023-234_Flowise/",
|
||||||
"source": "security-advisories@github.com"
|
"source": "security-advisories@github.com",
|
||||||
|
"tags": [
|
||||||
|
"Exploit",
|
||||||
|
"Third Party Advisory"
|
||||||
|
]
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
@ -2,17 +2,41 @@
|
|||||||
"id": "CVE-2024-36422",
|
"id": "CVE-2024-36422",
|
||||||
"sourceIdentifier": "security-advisories@github.com",
|
"sourceIdentifier": "security-advisories@github.com",
|
||||||
"published": "2024-07-01T16:15:04.860",
|
"published": "2024-07-01T16:15:04.860",
|
||||||
"lastModified": "2024-07-01T16:37:39.040",
|
"lastModified": "2024-07-03T15:38:24.297",
|
||||||
"vulnStatus": "Awaiting Analysis",
|
"vulnStatus": "Analyzed",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
"lang": "en",
|
"lang": "en",
|
||||||
"value": "Flowise is a drag & drop user interface to build a customized large language model flow. In version 1.4.3 of Flowise, a reflected cross-site scripting vulnerability occurs in the `api/v1/chatflows/id` endpoint. If the default configuration is used (unauthenticated), an attacker may be able to craft a specially crafted URL that injects Javascript into the user sessions, allowing the attacker to steal information, create false popups, or even redirect the user to other websites without interaction. If the chatflow ID is not found, its value is reflected in the 404 page, which has type text/html. This allows an attacker to attach arbitrary scripts to the page, allowing an attacker to steal sensitive information. This XSS may be chained with the path injection to allow an attacker without direct access to Flowise to read arbitrary files from the Flowise server. As of time of publication, no known patches are available."
|
"value": "Flowise is a drag & drop user interface to build a customized large language model flow. In version 1.4.3 of Flowise, a reflected cross-site scripting vulnerability occurs in the `api/v1/chatflows/id` endpoint. If the default configuration is used (unauthenticated), an attacker may be able to craft a specially crafted URL that injects Javascript into the user sessions, allowing the attacker to steal information, create false popups, or even redirect the user to other websites without interaction. If the chatflow ID is not found, its value is reflected in the 404 page, which has type text/html. This allows an attacker to attach arbitrary scripts to the page, allowing an attacker to steal sensitive information. This XSS may be chained with the path injection to allow an attacker without direct access to Flowise to read arbitrary files from the Flowise server. As of time of publication, no known patches are available."
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"lang": "es",
|
||||||
|
"value": "Flowise es una interfaz de usuario de arrastrar y soltar para crear un flujo de modelo de lenguaje grande personalizado. En la versi\u00f3n 1.4.3 de Flowise, se produce una vulnerabilidad de cross-site scripting reflejado en el endpoint `api/v1/chatflows/id`. Si se utiliza la configuraci\u00f3n predeterminada (no autenticada), un atacante puede crear una URL especialmente manipulada que inyecta Javascript en las sesiones del usuario, lo que le permite robar informaci\u00f3n, crear ventanas emergentes falsas o incluso redirigir al usuario a otros sitios web sin interacci\u00f3n. Si no se encuentra el ID del flujo de chat, su valor se refleja en la p\u00e1gina 404, que tiene el tipo texto/html. Esto permite a un atacante adjuntar scripts arbitrarios a la p\u00e1gina, lo que le permite robar informaci\u00f3n confidencial. Este XSS puede encadenarse con la inyecci\u00f3n de ruta para permitir que un atacante sin acceso directo a Flowise lea archivos arbitrarios del servidor Flowise. Al momento de la publicaci\u00f3n, no hay parches conocidos disponibles."
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"metrics": {
|
"metrics": {
|
||||||
"cvssMetricV31": [
|
"cvssMetricV31": [
|
||||||
|
{
|
||||||
|
"source": "nvd@nist.gov",
|
||||||
|
"type": "Primary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
|
||||||
|
"attackVector": "NETWORK",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "NONE",
|
||||||
|
"userInteraction": "REQUIRED",
|
||||||
|
"scope": "CHANGED",
|
||||||
|
"confidentialityImpact": "LOW",
|
||||||
|
"integrityImpact": "LOW",
|
||||||
|
"availabilityImpact": "NONE",
|
||||||
|
"baseScore": 6.1,
|
||||||
|
"baseSeverity": "MEDIUM"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 2.8,
|
||||||
|
"impactScore": 2.7
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"source": "security-advisories@github.com",
|
"source": "security-advisories@github.com",
|
||||||
"type": "Secondary",
|
"type": "Secondary",
|
||||||
@ -36,6 +60,16 @@
|
|||||||
]
|
]
|
||||||
},
|
},
|
||||||
"weaknesses": [
|
"weaknesses": [
|
||||||
|
{
|
||||||
|
"source": "nvd@nist.gov",
|
||||||
|
"type": "Primary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-79"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"source": "security-advisories@github.com",
|
"source": "security-advisories@github.com",
|
||||||
"type": "Secondary",
|
"type": "Secondary",
|
||||||
@ -47,14 +81,38 @@
|
|||||||
]
|
]
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
|
"configurations": [
|
||||||
|
{
|
||||||
|
"nodes": [
|
||||||
|
{
|
||||||
|
"operator": "OR",
|
||||||
|
"negate": false,
|
||||||
|
"cpeMatch": [
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:a:flowiseai:flowise:1.4.3:*:*:*:*:*:*:*",
|
||||||
|
"matchCriteriaId": "46DEFB82-D429-4A21-A963-B9DD1EB58AD5"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
"references": [
|
"references": [
|
||||||
{
|
{
|
||||||
"url": "https://github.com/FlowiseAI/Flowise/blob/flowise-ui%401.4.0/packages/server/src/index.ts#L312-L312",
|
"url": "https://github.com/FlowiseAI/Flowise/blob/flowise-ui%401.4.0/packages/server/src/index.ts#L312-L312",
|
||||||
"source": "security-advisories@github.com"
|
"source": "security-advisories@github.com",
|
||||||
|
"tags": [
|
||||||
|
"Product"
|
||||||
|
]
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"url": "https://securitylab.github.com/advisories/GHSL-2023-232_GHSL-2023-234_Flowise/",
|
"url": "https://securitylab.github.com/advisories/GHSL-2023-232_GHSL-2023-234_Flowise/",
|
||||||
"source": "security-advisories@github.com"
|
"source": "security-advisories@github.com",
|
||||||
|
"tags": [
|
||||||
|
"Exploit",
|
||||||
|
"Third Party Advisory"
|
||||||
|
]
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
21
CVE-2024/CVE-2024-377xx/CVE-2024-37726.json
Normal file
21
CVE-2024/CVE-2024-377xx/CVE-2024-37726.json
Normal file
@ -0,0 +1,21 @@
|
|||||||
|
{
|
||||||
|
"id": "CVE-2024-37726",
|
||||||
|
"sourceIdentifier": "cve@mitre.org",
|
||||||
|
"published": "2024-07-03T14:15:06.120",
|
||||||
|
"lastModified": "2024-07-03T14:15:06.120",
|
||||||
|
"vulnStatus": "Received",
|
||||||
|
"cveTags": [],
|
||||||
|
"descriptions": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "Insecure Permissions vulnerability in Micro-Star International Co., Ltd MSI Center v.2.0.36.0 allows a local attacker to escalate privileges via the Export System Info function in MSI.CentralServer.exe"
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"metrics": {},
|
||||||
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://github.com/carsonchan12345/CVE-2024-37726-MSI-Center-Local-Privilege-Escalation",
|
||||||
|
"source": "cve@mitre.org"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
@ -2,8 +2,8 @@
|
|||||||
"id": "CVE-2024-37741",
|
"id": "CVE-2024-37741",
|
||||||
"sourceIdentifier": "cve@mitre.org",
|
"sourceIdentifier": "cve@mitre.org",
|
||||||
"published": "2024-06-28T13:15:02.860",
|
"published": "2024-06-28T13:15:02.860",
|
||||||
"lastModified": "2024-07-03T02:04:40.153",
|
"lastModified": "2024-07-03T14:27:08.057",
|
||||||
"vulnStatus": "Undergoing Analysis",
|
"vulnStatus": "Analyzed",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
@ -17,6 +17,26 @@
|
|||||||
],
|
],
|
||||||
"metrics": {
|
"metrics": {
|
||||||
"cvssMetricV31": [
|
"cvssMetricV31": [
|
||||||
|
{
|
||||||
|
"source": "nvd@nist.gov",
|
||||||
|
"type": "Primary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
|
||||||
|
"attackVector": "NETWORK",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "LOW",
|
||||||
|
"userInteraction": "REQUIRED",
|
||||||
|
"scope": "CHANGED",
|
||||||
|
"confidentialityImpact": "LOW",
|
||||||
|
"integrityImpact": "LOW",
|
||||||
|
"availabilityImpact": "NONE",
|
||||||
|
"baseScore": 5.4,
|
||||||
|
"baseSeverity": "MEDIUM"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 2.3,
|
||||||
|
"impactScore": 2.7
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||||
"type": "Secondary",
|
"type": "Secondary",
|
||||||
@ -40,6 +60,16 @@
|
|||||||
]
|
]
|
||||||
},
|
},
|
||||||
"weaknesses": [
|
"weaknesses": [
|
||||||
|
{
|
||||||
|
"source": "nvd@nist.gov",
|
||||||
|
"type": "Primary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-79"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||||
"type": "Secondary",
|
"type": "Secondary",
|
||||||
@ -51,18 +81,57 @@
|
|||||||
]
|
]
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
|
"configurations": [
|
||||||
|
{
|
||||||
|
"operator": "AND",
|
||||||
|
"nodes": [
|
||||||
|
{
|
||||||
|
"operator": "OR",
|
||||||
|
"negate": false,
|
||||||
|
"cpeMatch": [
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:o:openplcproject:openplc_v3_firmware:-:*:*:*:*:*:*:*",
|
||||||
|
"matchCriteriaId": "7624BE59-886B-421D-96CC-105F185AE070"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"operator": "OR",
|
||||||
|
"negate": false,
|
||||||
|
"cpeMatch": [
|
||||||
|
{
|
||||||
|
"vulnerable": false,
|
||||||
|
"criteria": "cpe:2.3:h:openplcproject:openplc_v3:-:*:*:*:*:*:*:*",
|
||||||
|
"matchCriteriaId": "6861E863-E6AC-4BFB-8CDE-2328A045540D"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
"references": [
|
"references": [
|
||||||
{
|
{
|
||||||
"url": "https://1d8.github.io/cves/cve_2024_37741/",
|
"url": "https://1d8.github.io/cves/cve_2024_37741/",
|
||||||
"source": "cve@mitre.org"
|
"source": "cve@mitre.org",
|
||||||
|
"tags": [
|
||||||
|
"Exploit"
|
||||||
|
]
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"url": "https://github.com/thiagoralves/OpenPLC_v3/blob/9cd8f1b53a50f9d38708096bfc72bcbb1ef47343/webserver/pages.py#L992",
|
"url": "https://github.com/thiagoralves/OpenPLC_v3/blob/9cd8f1b53a50f9d38708096bfc72bcbb1ef47343/webserver/pages.py#L992",
|
||||||
"source": "cve@mitre.org"
|
"source": "cve@mitre.org",
|
||||||
|
"tags": [
|
||||||
|
"Product"
|
||||||
|
]
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"url": "https://github.com/thiagoralves/OpenPLC_v3/issues/242",
|
"url": "https://github.com/thiagoralves/OpenPLC_v3/issues/242",
|
||||||
"source": "cve@mitre.org"
|
"source": "cve@mitre.org",
|
||||||
|
"tags": [
|
||||||
|
"Exploit",
|
||||||
|
"Issue Tracking"
|
||||||
|
]
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
@ -2,17 +2,54 @@
|
|||||||
"id": "CVE-2024-3800",
|
"id": "CVE-2024-3800",
|
||||||
"sourceIdentifier": "cvd@cert.pl",
|
"sourceIdentifier": "cvd@cert.pl",
|
||||||
"published": "2024-06-28T13:15:02.990",
|
"published": "2024-06-28T13:15:02.990",
|
||||||
"lastModified": "2024-06-28T13:38:47.077",
|
"lastModified": "2024-07-03T14:36:22.273",
|
||||||
"vulnStatus": "Awaiting Analysis",
|
"vulnStatus": "Analyzed",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
"lang": "en",
|
"lang": "en",
|
||||||
"value": "Sites managed in S@M CMS (Concept Intermedia) might be vulnerable to Reflected XSS\u00a0via including scripts in requested file names.\u00a0\nOnly a part of observed services is vulnerable, but since vendor has not investigated the root problem, it is hard to determine when the issue appears."
|
"value": "Sites managed in S@M CMS (Concept Intermedia) might be vulnerable to Reflected XSS\u00a0via including scripts in requested file names.\u00a0\nOnly a part of observed services is vulnerable, but since vendor has not investigated the root problem, it is hard to determine when the issue appears."
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"lang": "es",
|
||||||
|
"value": "Los sitios administrados en S@M CMS (Concept Intermedia) pueden ser vulnerables a XSS Reflejado al incluir scripts en los nombres de archivos solicitados. S\u00f3lo una parte de los servicios observados es vulnerable, pero como el proveedor no ha investigado la ra\u00edz del problema, es dif\u00edcil determinar cu\u00e1ndo aparece el problema."
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"metrics": {},
|
"metrics": {
|
||||||
|
"cvssMetricV31": [
|
||||||
|
{
|
||||||
|
"source": "nvd@nist.gov",
|
||||||
|
"type": "Primary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
|
||||||
|
"attackVector": "NETWORK",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "NONE",
|
||||||
|
"userInteraction": "REQUIRED",
|
||||||
|
"scope": "CHANGED",
|
||||||
|
"confidentialityImpact": "LOW",
|
||||||
|
"integrityImpact": "LOW",
|
||||||
|
"availabilityImpact": "NONE",
|
||||||
|
"baseScore": 6.1,
|
||||||
|
"baseSeverity": "MEDIUM"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 2.8,
|
||||||
|
"impactScore": 2.7
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
"weaknesses": [
|
"weaknesses": [
|
||||||
|
{
|
||||||
|
"source": "nvd@nist.gov",
|
||||||
|
"type": "Primary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-79"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"source": "cvd@cert.pl",
|
"source": "cvd@cert.pl",
|
||||||
"type": "Secondary",
|
"type": "Secondary",
|
||||||
@ -24,14 +61,38 @@
|
|||||||
]
|
]
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
|
"configurations": [
|
||||||
|
{
|
||||||
|
"nodes": [
|
||||||
|
{
|
||||||
|
"operator": "OR",
|
||||||
|
"negate": false,
|
||||||
|
"cpeMatch": [
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:a:conceptintermedia:s\\@m_cms:*:*:*:*:*:*:*:*",
|
||||||
|
"versionEndIncluding": "3.3",
|
||||||
|
"matchCriteriaId": "00A1AF5A-47FF-4080-A506-DB634A54CD6C"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
"references": [
|
"references": [
|
||||||
{
|
{
|
||||||
"url": "https://cert.pl/en/posts/2024/06/CVE-2024-3800",
|
"url": "https://cert.pl/en/posts/2024/06/CVE-2024-3800",
|
||||||
"source": "cvd@cert.pl"
|
"source": "cvd@cert.pl",
|
||||||
|
"tags": [
|
||||||
|
"Third Party Advisory"
|
||||||
|
]
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"url": "https://cert.pl/posts/2024/06/CVE-2024-3800",
|
"url": "https://cert.pl/posts/2024/06/CVE-2024-3800",
|
||||||
"source": "cvd@cert.pl"
|
"source": "cvd@cert.pl",
|
||||||
|
"tags": [
|
||||||
|
"Third Party Advisory"
|
||||||
|
]
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
@ -2,17 +2,54 @@
|
|||||||
"id": "CVE-2024-3801",
|
"id": "CVE-2024-3801",
|
||||||
"sourceIdentifier": "cvd@cert.pl",
|
"sourceIdentifier": "cvd@cert.pl",
|
||||||
"published": "2024-06-28T13:15:03.157",
|
"published": "2024-06-28T13:15:03.157",
|
||||||
"lastModified": "2024-06-28T13:38:47.077",
|
"lastModified": "2024-07-03T14:36:52.797",
|
||||||
"vulnStatus": "Awaiting Analysis",
|
"vulnStatus": "Analyzed",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
"lang": "en",
|
"lang": "en",
|
||||||
"value": "Sites managed in S@M CMS (Concept Intermedia) might be vulnerable to Reflected XSS\u00a0via including scripts in one of GET header parameters.\u00a0\nOnly a part of observed services is vulnerable, but since vendor has not investigated the root problem, it is hard to determine when the issue appears."
|
"value": "Sites managed in S@M CMS (Concept Intermedia) might be vulnerable to Reflected XSS\u00a0via including scripts in one of GET header parameters.\u00a0\nOnly a part of observed services is vulnerable, but since vendor has not investigated the root problem, it is hard to determine when the issue appears."
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"lang": "es",
|
||||||
|
"value": "Los sitios administrados en S@M CMS (Concept Intermedia) pueden ser vulnerables a XSS Reflejado al incluir scripts en uno de los par\u00e1metros del encabezado GET. S\u00f3lo una parte de los servicios observados es vulnerable, pero como el proveedor no ha investigado la ra\u00edz del problema, es dif\u00edcil determinar cu\u00e1ndo aparece el problema."
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"metrics": {},
|
"metrics": {
|
||||||
|
"cvssMetricV31": [
|
||||||
|
{
|
||||||
|
"source": "nvd@nist.gov",
|
||||||
|
"type": "Primary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
|
||||||
|
"attackVector": "NETWORK",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "NONE",
|
||||||
|
"userInteraction": "REQUIRED",
|
||||||
|
"scope": "CHANGED",
|
||||||
|
"confidentialityImpact": "LOW",
|
||||||
|
"integrityImpact": "LOW",
|
||||||
|
"availabilityImpact": "NONE",
|
||||||
|
"baseScore": 6.1,
|
||||||
|
"baseSeverity": "MEDIUM"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 2.8,
|
||||||
|
"impactScore": 2.7
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
"weaknesses": [
|
"weaknesses": [
|
||||||
|
{
|
||||||
|
"source": "nvd@nist.gov",
|
||||||
|
"type": "Primary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-79"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"source": "cvd@cert.pl",
|
"source": "cvd@cert.pl",
|
||||||
"type": "Secondary",
|
"type": "Secondary",
|
||||||
@ -24,14 +61,38 @@
|
|||||||
]
|
]
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
|
"configurations": [
|
||||||
|
{
|
||||||
|
"nodes": [
|
||||||
|
{
|
||||||
|
"operator": "OR",
|
||||||
|
"negate": false,
|
||||||
|
"cpeMatch": [
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:a:conceptintermedia:s\\@m_cms:*:*:*:*:*:*:*:*",
|
||||||
|
"versionEndIncluding": "3.3",
|
||||||
|
"matchCriteriaId": "00A1AF5A-47FF-4080-A506-DB634A54CD6C"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
"references": [
|
"references": [
|
||||||
{
|
{
|
||||||
"url": "https://cert.pl/en/posts/2024/06/CVE-2024-3800",
|
"url": "https://cert.pl/en/posts/2024/06/CVE-2024-3800",
|
||||||
"source": "cvd@cert.pl"
|
"source": "cvd@cert.pl",
|
||||||
|
"tags": [
|
||||||
|
"Third Party Advisory"
|
||||||
|
]
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"url": "https://cert.pl/posts/2024/06/CVE-2024-3800",
|
"url": "https://cert.pl/posts/2024/06/CVE-2024-3800",
|
||||||
"source": "cvd@cert.pl"
|
"source": "cvd@cert.pl",
|
||||||
|
"tags": [
|
||||||
|
"Third Party Advisory"
|
||||||
|
]
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
@ -2,17 +2,54 @@
|
|||||||
"id": "CVE-2024-3816",
|
"id": "CVE-2024-3816",
|
||||||
"sourceIdentifier": "cvd@cert.pl",
|
"sourceIdentifier": "cvd@cert.pl",
|
||||||
"published": "2024-06-28T13:15:03.283",
|
"published": "2024-06-28T13:15:03.283",
|
||||||
"lastModified": "2024-06-28T13:38:47.077",
|
"lastModified": "2024-07-03T14:37:07.750",
|
||||||
"vulnStatus": "Awaiting Analysis",
|
"vulnStatus": "Analyzed",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
"lang": "en",
|
"lang": "en",
|
||||||
"value": "Sites managed in S@M CMS (Concept Intermedia) might be vulnerable to a blind SQL Injection executed using the search bar.\u00a0\nOnly a part of observed services is vulnerable, but since vendor has not investigated the root problem, it is hard to determine when the issue appears."
|
"value": "Sites managed in S@M CMS (Concept Intermedia) might be vulnerable to a blind SQL Injection executed using the search bar.\u00a0\nOnly a part of observed services is vulnerable, but since vendor has not investigated the root problem, it is hard to determine when the issue appears."
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"lang": "es",
|
||||||
|
"value": "Los sitios administrados en S@M CMS (Concept Intermedia) pueden ser vulnerables a una inyecci\u00f3n SQL ciega ejecutada mediante la barra de b\u00fasqueda. S\u00f3lo una parte de los servicios observados es vulnerable, pero como el proveedor no ha investigado la ra\u00edz del problema, es dif\u00edcil determinar cu\u00e1ndo aparece el problema."
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"metrics": {},
|
"metrics": {
|
||||||
|
"cvssMetricV31": [
|
||||||
|
{
|
||||||
|
"source": "nvd@nist.gov",
|
||||||
|
"type": "Primary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||||
|
"attackVector": "NETWORK",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "NONE",
|
||||||
|
"userInteraction": "NONE",
|
||||||
|
"scope": "UNCHANGED",
|
||||||
|
"confidentialityImpact": "HIGH",
|
||||||
|
"integrityImpact": "HIGH",
|
||||||
|
"availabilityImpact": "HIGH",
|
||||||
|
"baseScore": 9.8,
|
||||||
|
"baseSeverity": "CRITICAL"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 3.9,
|
||||||
|
"impactScore": 5.9
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
"weaknesses": [
|
"weaknesses": [
|
||||||
|
{
|
||||||
|
"source": "nvd@nist.gov",
|
||||||
|
"type": "Primary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-89"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"source": "cvd@cert.pl",
|
"source": "cvd@cert.pl",
|
||||||
"type": "Secondary",
|
"type": "Secondary",
|
||||||
@ -24,14 +61,38 @@
|
|||||||
]
|
]
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
|
"configurations": [
|
||||||
|
{
|
||||||
|
"nodes": [
|
||||||
|
{
|
||||||
|
"operator": "OR",
|
||||||
|
"negate": false,
|
||||||
|
"cpeMatch": [
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:a:conceptintermedia:s\\@m_cms:*:*:*:*:*:*:*:*",
|
||||||
|
"versionEndIncluding": "3.3",
|
||||||
|
"matchCriteriaId": "00A1AF5A-47FF-4080-A506-DB634A54CD6C"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
"references": [
|
"references": [
|
||||||
{
|
{
|
||||||
"url": "https://cert.pl/en/posts/2024/06/CVE-2024-3800",
|
"url": "https://cert.pl/en/posts/2024/06/CVE-2024-3800",
|
||||||
"source": "cvd@cert.pl"
|
"source": "cvd@cert.pl",
|
||||||
|
"tags": [
|
||||||
|
"Third Party Advisory"
|
||||||
|
]
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"url": "https://cert.pl/posts/2024/06/CVE-2024-3800",
|
"url": "https://cert.pl/posts/2024/06/CVE-2024-3800",
|
||||||
"source": "cvd@cert.pl"
|
"source": "cvd@cert.pl",
|
||||||
|
"tags": [
|
||||||
|
"Third Party Advisory"
|
||||||
|
]
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
25
CVE-2024/CVE-2024-392xx/CVE-2024-39220.json
Normal file
25
CVE-2024/CVE-2024-392xx/CVE-2024-39220.json
Normal file
@ -0,0 +1,25 @@
|
|||||||
|
{
|
||||||
|
"id": "CVE-2024-39220",
|
||||||
|
"sourceIdentifier": "cve@mitre.org",
|
||||||
|
"published": "2024-07-03T15:15:05.993",
|
||||||
|
"lastModified": "2024-07-03T15:15:05.993",
|
||||||
|
"vulnStatus": "Received",
|
||||||
|
"cveTags": [],
|
||||||
|
"descriptions": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "BAS-IP AV-01D, AV-01MD, AV-01MFD, AV-01ED, AV-01KD, AV-01BD, AV-01KBD, AV-02D, AV-02IDE, AV-02IDR, AV-02IPD, AV-02FDE, AV-02FDR, AV-03D, AV-03BD, AV-04AFD, AV-04ASD, AV-04FD, AV-04SD, AV-05FD, AV-05SD, AA-07BD, AA-07BDI, BA-04BD, BA-04MD, BA-08BD, BA-08MD, BA-12BD, BA-12MD, CR-02BD before firmware v3.9.2 allows authenticated attackers to read SIP account passwords via a crafted GET request."
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"metrics": {},
|
||||||
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://bas-ip.com/bsa-000001",
|
||||||
|
"source": "cve@mitre.org"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://github.com/DrieVlad/BAS-IP-vulnerabilities",
|
||||||
|
"source": "cve@mitre.org"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
29
CVE-2024/CVE-2024-392xx/CVE-2024-39223.json
Normal file
29
CVE-2024/CVE-2024-392xx/CVE-2024-39223.json
Normal file
@ -0,0 +1,29 @@
|
|||||||
|
{
|
||||||
|
"id": "CVE-2024-39223",
|
||||||
|
"sourceIdentifier": "cve@mitre.org",
|
||||||
|
"published": "2024-07-03T15:15:06.083",
|
||||||
|
"lastModified": "2024-07-03T15:15:06.083",
|
||||||
|
"vulnStatus": "Received",
|
||||||
|
"cveTags": [],
|
||||||
|
"descriptions": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "An authentication bypass in the SSH service of gost v2.11.5 allows attackers to intercept communications via setting the HostKeyCallback function to ssh.InsecureIgnoreHostKey"
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"metrics": {},
|
||||||
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://gist.github.com/nyxfqq/a7242170b1118e78436a62dee4e09e8a",
|
||||||
|
"source": "cve@mitre.org"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://github.com/ginuerzh/gost/blob/729d0e70005607dc7c69fc1de62fd8fe21f85355/ssh.go#L229",
|
||||||
|
"source": "cve@mitre.org"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://github.com/ginuerzh/gost/issues/1034",
|
||||||
|
"source": "cve@mitre.org"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
@ -2,24 +2,87 @@
|
|||||||
"id": "CVE-2024-39704",
|
"id": "CVE-2024-39704",
|
||||||
"sourceIdentifier": "cve@mitre.org",
|
"sourceIdentifier": "cve@mitre.org",
|
||||||
"published": "2024-06-28T13:15:02.927",
|
"published": "2024-06-28T13:15:02.927",
|
||||||
"lastModified": "2024-06-28T13:38:47.077",
|
"lastModified": "2024-07-03T14:32:56.510",
|
||||||
"vulnStatus": "Awaiting Analysis",
|
"vulnStatus": "Analyzed",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
"lang": "en",
|
"lang": "en",
|
||||||
"value": "Soft Circle French-Bread Melty Blood: Actress Again: Current Code through 1.07 Rev. 1.4.0 allows a remote attacker to execute arbitrary code on a client's machine via a crafted packet on TCP port 46318."
|
"value": "Soft Circle French-Bread Melty Blood: Actress Again: Current Code through 1.07 Rev. 1.4.0 allows a remote attacker to execute arbitrary code on a client's machine via a crafted packet on TCP port 46318."
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"lang": "es",
|
||||||
|
"value": "Soft Circle French-Bread Melty Blood: Actress Again: Current Code hasta 1.07 Rev. 1.4.0 permite a un atacante remoto ejecutar c\u00f3digo arbitrario en la m\u00e1quina de un cliente a trav\u00e9s de un paquete manipulado en el puerto TCP 46318."
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"metrics": {
|
||||||
|
"cvssMetricV31": [
|
||||||
|
{
|
||||||
|
"source": "nvd@nist.gov",
|
||||||
|
"type": "Primary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||||
|
"attackVector": "NETWORK",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "NONE",
|
||||||
|
"userInteraction": "NONE",
|
||||||
|
"scope": "UNCHANGED",
|
||||||
|
"confidentialityImpact": "HIGH",
|
||||||
|
"integrityImpact": "HIGH",
|
||||||
|
"availabilityImpact": "HIGH",
|
||||||
|
"baseScore": 9.8,
|
||||||
|
"baseSeverity": "CRITICAL"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 3.9,
|
||||||
|
"impactScore": 5.9
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"weaknesses": [
|
||||||
|
{
|
||||||
|
"source": "nvd@nist.gov",
|
||||||
|
"type": "Primary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-74"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"configurations": [
|
||||||
|
{
|
||||||
|
"nodes": [
|
||||||
|
{
|
||||||
|
"operator": "OR",
|
||||||
|
"negate": false,
|
||||||
|
"cpeMatch": [
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:a:unknown-corp:melty_blood_actress_again_current_code:*:*:*:*:*:*:*:*",
|
||||||
|
"versionEndIncluding": "1.07",
|
||||||
|
"matchCriteriaId": "AFE0E80B-E798-4931-9952-54D596CCE5A7"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
]
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"metrics": {},
|
|
||||||
"references": [
|
"references": [
|
||||||
{
|
{
|
||||||
"url": "https://github.com/MikeIsAStar/Melty-Blood-Actress-Again-Current-Code-Remote-Code-Execution",
|
"url": "https://github.com/MikeIsAStar/Melty-Blood-Actress-Again-Current-Code-Remote-Code-Execution",
|
||||||
"source": "cve@mitre.org"
|
"source": "cve@mitre.org",
|
||||||
|
"tags": [
|
||||||
|
"Third Party Advisory"
|
||||||
|
]
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"url": "https://pastebin.com/agpnQmhu",
|
"url": "https://pastebin.com/agpnQmhu",
|
||||||
"source": "cve@mitre.org"
|
"source": "cve@mitre.org",
|
||||||
|
"tags": [
|
||||||
|
"Exploit"
|
||||||
|
]
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
@ -2,8 +2,8 @@
|
|||||||
"id": "CVE-2024-3999",
|
"id": "CVE-2024-3999",
|
||||||
"sourceIdentifier": "contact@wpscan.com",
|
"sourceIdentifier": "contact@wpscan.com",
|
||||||
"published": "2024-07-02T06:15:04.050",
|
"published": "2024-07-02T06:15:04.050",
|
||||||
"lastModified": "2024-07-03T02:06:58.680",
|
"lastModified": "2024-07-03T15:44:56.130",
|
||||||
"vulnStatus": "Awaiting Analysis",
|
"vulnStatus": "Analyzed",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
@ -17,6 +17,26 @@
|
|||||||
],
|
],
|
||||||
"metrics": {
|
"metrics": {
|
||||||
"cvssMetricV31": [
|
"cvssMetricV31": [
|
||||||
|
{
|
||||||
|
"source": "nvd@nist.gov",
|
||||||
|
"type": "Primary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N",
|
||||||
|
"attackVector": "NETWORK",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "HIGH",
|
||||||
|
"userInteraction": "REQUIRED",
|
||||||
|
"scope": "CHANGED",
|
||||||
|
"confidentialityImpact": "LOW",
|
||||||
|
"integrityImpact": "LOW",
|
||||||
|
"availabilityImpact": "NONE",
|
||||||
|
"baseScore": 4.8,
|
||||||
|
"baseSeverity": "MEDIUM"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 1.7,
|
||||||
|
"impactScore": 2.7
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||||
"type": "Secondary",
|
"type": "Secondary",
|
||||||
@ -39,10 +59,44 @@
|
|||||||
}
|
}
|
||||||
]
|
]
|
||||||
},
|
},
|
||||||
|
"weaknesses": [
|
||||||
|
{
|
||||||
|
"source": "nvd@nist.gov",
|
||||||
|
"type": "Primary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-79"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"configurations": [
|
||||||
|
{
|
||||||
|
"nodes": [
|
||||||
|
{
|
||||||
|
"operator": "OR",
|
||||||
|
"negate": false,
|
||||||
|
"cpeMatch": [
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:a:spider-themes:eazydocs:*:*:*:*:*:wordpress:*:*",
|
||||||
|
"versionEndExcluding": "2.5.0",
|
||||||
|
"matchCriteriaId": "D84E69AF-BB0B-4BB9-B5EA-6D03511649A9"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
"references": [
|
"references": [
|
||||||
{
|
{
|
||||||
"url": "https://wpscan.com/vulnerability/6a8a1deb-6836-40f1-856b-7b3e4ba867d6/",
|
"url": "https://wpscan.com/vulnerability/6a8a1deb-6836-40f1-856b-7b3e4ba867d6/",
|
||||||
"source": "contact@wpscan.com"
|
"source": "contact@wpscan.com",
|
||||||
|
"tags": [
|
||||||
|
"Exploit",
|
||||||
|
"Third Party Advisory"
|
||||||
|
]
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
@ -2,8 +2,8 @@
|
|||||||
"id": "CVE-2024-4627",
|
"id": "CVE-2024-4627",
|
||||||
"sourceIdentifier": "contact@wpscan.com",
|
"sourceIdentifier": "contact@wpscan.com",
|
||||||
"published": "2024-07-02T06:15:04.400",
|
"published": "2024-07-02T06:15:04.400",
|
||||||
"lastModified": "2024-07-03T02:07:51.527",
|
"lastModified": "2024-07-03T15:45:08.187",
|
||||||
"vulnStatus": "Awaiting Analysis",
|
"vulnStatus": "Analyzed",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
@ -17,6 +17,26 @@
|
|||||||
],
|
],
|
||||||
"metrics": {
|
"metrics": {
|
||||||
"cvssMetricV31": [
|
"cvssMetricV31": [
|
||||||
|
{
|
||||||
|
"source": "nvd@nist.gov",
|
||||||
|
"type": "Primary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
|
||||||
|
"attackVector": "NETWORK",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "LOW",
|
||||||
|
"userInteraction": "REQUIRED",
|
||||||
|
"scope": "CHANGED",
|
||||||
|
"confidentialityImpact": "LOW",
|
||||||
|
"integrityImpact": "LOW",
|
||||||
|
"availabilityImpact": "NONE",
|
||||||
|
"baseScore": 5.4,
|
||||||
|
"baseSeverity": "MEDIUM"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 2.3,
|
||||||
|
"impactScore": 2.7
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||||
"type": "Secondary",
|
"type": "Secondary",
|
||||||
@ -39,10 +59,44 @@
|
|||||||
}
|
}
|
||||||
]
|
]
|
||||||
},
|
},
|
||||||
|
"weaknesses": [
|
||||||
|
{
|
||||||
|
"source": "nvd@nist.gov",
|
||||||
|
"type": "Primary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-79"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"configurations": [
|
||||||
|
{
|
||||||
|
"nodes": [
|
||||||
|
{
|
||||||
|
"operator": "OR",
|
||||||
|
"negate": false,
|
||||||
|
"cpeMatch": [
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:a:rankmath:seo:*:*:*:*:free:wordpress:*:*",
|
||||||
|
"versionEndExcluding": "1.0.219",
|
||||||
|
"matchCriteriaId": "D3446436-48C0-417A-A0E8-53AD3E2F8298"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
"references": [
|
"references": [
|
||||||
{
|
{
|
||||||
"url": "https://wpscan.com/vulnerability/c0058fcc-36f6-40bf-9848-fbe2d751d754/",
|
"url": "https://wpscan.com/vulnerability/c0058fcc-36f6-40bf-9848-fbe2d751d754/",
|
||||||
"source": "contact@wpscan.com"
|
"source": "contact@wpscan.com",
|
||||||
|
"tags": [
|
||||||
|
"Exploit",
|
||||||
|
"Third Party Advisory"
|
||||||
|
]
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
@ -2,8 +2,8 @@
|
|||||||
"id": "CVE-2024-5349",
|
"id": "CVE-2024-5349",
|
||||||
"sourceIdentifier": "security@wordfence.com",
|
"sourceIdentifier": "security@wordfence.com",
|
||||||
"published": "2024-07-02T05:15:10.470",
|
"published": "2024-07-02T05:15:10.470",
|
||||||
"lastModified": "2024-07-02T12:09:16.907",
|
"lastModified": "2024-07-03T15:44:23.807",
|
||||||
"vulnStatus": "Awaiting Analysis",
|
"vulnStatus": "Analyzed",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
@ -39,14 +39,50 @@
|
|||||||
}
|
}
|
||||||
]
|
]
|
||||||
},
|
},
|
||||||
|
"weaknesses": [
|
||||||
|
{
|
||||||
|
"source": "nvd@nist.gov",
|
||||||
|
"type": "Primary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "NVD-CWE-Other"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"configurations": [
|
||||||
|
{
|
||||||
|
"nodes": [
|
||||||
|
{
|
||||||
|
"operator": "OR",
|
||||||
|
"negate": false,
|
||||||
|
"cpeMatch": [
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:a:la-studioweb:element_kit_for_elementor:*:*:*:*:*:wordpress:*:*",
|
||||||
|
"versionEndExcluding": "1.3.9",
|
||||||
|
"matchCriteriaId": "2AB75FE2-C692-4F70-8726-45F5000C98BF"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
"references": [
|
"references": [
|
||||||
{
|
{
|
||||||
"url": "https://plugins.trac.wordpress.org/changeset/3108501/lastudio-element-kit/trunk/includes/addons/google-maps.php",
|
"url": "https://plugins.trac.wordpress.org/changeset/3108501/lastudio-element-kit/trunk/includes/addons/google-maps.php",
|
||||||
"source": "security@wordfence.com"
|
"source": "security@wordfence.com",
|
||||||
|
"tags": [
|
||||||
|
"Patch"
|
||||||
|
]
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/2e29a67b-2b67-4cd5-a5ae-a931900c75cd?source=cve",
|
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/2e29a67b-2b67-4cd5-a5ae-a931900c75cd?source=cve",
|
||||||
"source": "security@wordfence.com"
|
"source": "security@wordfence.com",
|
||||||
|
"tags": [
|
||||||
|
"Third Party Advisory"
|
||||||
|
]
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
@ -2,8 +2,8 @@
|
|||||||
"id": "CVE-2024-5419",
|
"id": "CVE-2024-5419",
|
||||||
"sourceIdentifier": "security@wordfence.com",
|
"sourceIdentifier": "security@wordfence.com",
|
||||||
"published": "2024-07-02T04:15:03.417",
|
"published": "2024-07-02T04:15:03.417",
|
||||||
"lastModified": "2024-07-02T12:09:16.907",
|
"lastModified": "2024-07-03T15:43:09.450",
|
||||||
"vulnStatus": "Awaiting Analysis",
|
"vulnStatus": "Analyzed",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
@ -18,8 +18,28 @@
|
|||||||
"metrics": {
|
"metrics": {
|
||||||
"cvssMetricV31": [
|
"cvssMetricV31": [
|
||||||
{
|
{
|
||||||
"source": "security@wordfence.com",
|
"source": "nvd@nist.gov",
|
||||||
"type": "Primary",
|
"type": "Primary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
|
||||||
|
"attackVector": "NETWORK",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "LOW",
|
||||||
|
"userInteraction": "REQUIRED",
|
||||||
|
"scope": "CHANGED",
|
||||||
|
"confidentialityImpact": "LOW",
|
||||||
|
"integrityImpact": "LOW",
|
||||||
|
"availabilityImpact": "NONE",
|
||||||
|
"baseScore": 5.4,
|
||||||
|
"baseSeverity": "MEDIUM"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 2.3,
|
||||||
|
"impactScore": 2.7
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"source": "security@wordfence.com",
|
||||||
|
"type": "Secondary",
|
||||||
"cvssData": {
|
"cvssData": {
|
||||||
"version": "3.1",
|
"version": "3.1",
|
||||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N",
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N",
|
||||||
@ -39,18 +59,57 @@
|
|||||||
}
|
}
|
||||||
]
|
]
|
||||||
},
|
},
|
||||||
|
"weaknesses": [
|
||||||
|
{
|
||||||
|
"source": "nvd@nist.gov",
|
||||||
|
"type": "Primary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-79"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"configurations": [
|
||||||
|
{
|
||||||
|
"nodes": [
|
||||||
|
{
|
||||||
|
"operator": "OR",
|
||||||
|
"negate": false,
|
||||||
|
"cpeMatch": [
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:a:voidcoders:void_contact_form_7_widget_for_elementor_page_builder:*:*:*:*:*:wordpress:*:*",
|
||||||
|
"versionEndExcluding": "2.4.1",
|
||||||
|
"matchCriteriaId": "135B2D6F-B132-456B-A8C8-317BD02A7DB2"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
"references": [
|
"references": [
|
||||||
{
|
{
|
||||||
"url": "https://plugins.trac.wordpress.org/browser/cf7-widget-elementor/tags/2.4/widgets/void-section-cf7.php#L1672",
|
"url": "https://plugins.trac.wordpress.org/browser/cf7-widget-elementor/tags/2.4/widgets/void-section-cf7.php#L1672",
|
||||||
"source": "security@wordfence.com"
|
"source": "security@wordfence.com",
|
||||||
|
"tags": [
|
||||||
|
"Product"
|
||||||
|
]
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"url": "https://plugins.trac.wordpress.org/changeset/3109802/#file6",
|
"url": "https://plugins.trac.wordpress.org/changeset/3109802/#file6",
|
||||||
"source": "security@wordfence.com"
|
"source": "security@wordfence.com",
|
||||||
|
"tags": [
|
||||||
|
"Patch"
|
||||||
|
]
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/2837c9b2-419e-453a-b011-5ec1ef050d62?source=cve",
|
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/2837c9b2-419e-453a-b011-5ec1ef050d62?source=cve",
|
||||||
"source": "security@wordfence.com"
|
"source": "security@wordfence.com",
|
||||||
|
"tags": [
|
||||||
|
"Third Party Advisory"
|
||||||
|
]
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
@ -2,8 +2,8 @@
|
|||||||
"id": "CVE-2024-5606",
|
"id": "CVE-2024-5606",
|
||||||
"sourceIdentifier": "contact@wpscan.com",
|
"sourceIdentifier": "contact@wpscan.com",
|
||||||
"published": "2024-07-02T06:15:04.760",
|
"published": "2024-07-02T06:15:04.760",
|
||||||
"lastModified": "2024-07-02T12:09:16.907",
|
"lastModified": "2024-07-03T15:45:19.513",
|
||||||
"vulnStatus": "Awaiting Analysis",
|
"vulnStatus": "Analyzed",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
@ -15,11 +15,68 @@
|
|||||||
"value": "El complemento Quiz and Survey Master (QSM) WordPress anterior a 9.0.2 es vulnerable, no valida ni escapa el par\u00e1metro question_id en la acci\u00f3n AJAX qsm_bulk_delete_question_from_database, lo que lleva a una inyecci\u00f3n de SQL explotable por los Colaboradores y roles superiores."
|
"value": "El complemento Quiz and Survey Master (QSM) WordPress anterior a 9.0.2 es vulnerable, no valida ni escapa el par\u00e1metro question_id en la acci\u00f3n AJAX qsm_bulk_delete_question_from_database, lo que lleva a una inyecci\u00f3n de SQL explotable por los Colaboradores y roles superiores."
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"metrics": {},
|
"metrics": {
|
||||||
|
"cvssMetricV31": [
|
||||||
|
{
|
||||||
|
"source": "nvd@nist.gov",
|
||||||
|
"type": "Primary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||||
|
"attackVector": "NETWORK",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "LOW",
|
||||||
|
"userInteraction": "NONE",
|
||||||
|
"scope": "UNCHANGED",
|
||||||
|
"confidentialityImpact": "HIGH",
|
||||||
|
"integrityImpact": "HIGH",
|
||||||
|
"availabilityImpact": "HIGH",
|
||||||
|
"baseScore": 8.8,
|
||||||
|
"baseSeverity": "HIGH"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 2.8,
|
||||||
|
"impactScore": 5.9
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"weaknesses": [
|
||||||
|
{
|
||||||
|
"source": "nvd@nist.gov",
|
||||||
|
"type": "Primary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-89"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"configurations": [
|
||||||
|
{
|
||||||
|
"nodes": [
|
||||||
|
{
|
||||||
|
"operator": "OR",
|
||||||
|
"negate": false,
|
||||||
|
"cpeMatch": [
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:a:expresstech:quiz_and_survey_master:*:*:*:*:*:wordpress:*:*",
|
||||||
|
"versionEndExcluding": "9.0.2",
|
||||||
|
"matchCriteriaId": "57725447-AB0A-4B25-BB23-9292AFA5FB01"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
"references": [
|
"references": [
|
||||||
{
|
{
|
||||||
"url": "https://wpscan.com/vulnerability/e3eee6bc-1f69-4be1-b323-0c9b5fe7535e/",
|
"url": "https://wpscan.com/vulnerability/e3eee6bc-1f69-4be1-b323-0c9b5fe7535e/",
|
||||||
"source": "contact@wpscan.com"
|
"source": "contact@wpscan.com",
|
||||||
|
"tags": [
|
||||||
|
"Exploit",
|
||||||
|
"Third Party Advisory"
|
||||||
|
]
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
@ -2,13 +2,17 @@
|
|||||||
"id": "CVE-2024-5735",
|
"id": "CVE-2024-5735",
|
||||||
"sourceIdentifier": "cvd@cert.pl",
|
"sourceIdentifier": "cvd@cert.pl",
|
||||||
"published": "2024-06-28T12:15:10.117",
|
"published": "2024-06-28T12:15:10.117",
|
||||||
"lastModified": "2024-06-28T13:38:47.077",
|
"lastModified": "2024-07-03T15:45:57.677",
|
||||||
"vulnStatus": "Awaiting Analysis",
|
"vulnStatus": "Analyzed",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
"lang": "en",
|
"lang": "en",
|
||||||
"value": "Full Path Disclosure vulnerability in AdmirorFrames Joomla! extension in afHelper.php script allows an unauthorised attacker to retrieve location of web root folder.\u00a0This issue affects AdmirorFrames: before 5.0."
|
"value": "Full Path Disclosure vulnerability in AdmirorFrames Joomla! extension in afHelper.php script allows an unauthorised attacker to retrieve location of web root folder.\u00a0This issue affects AdmirorFrames: before 5.0."
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"lang": "es",
|
||||||
|
"value": "Vulnerabilidad de divulgaci\u00f3n de ruta completa en AdmirorFrames Joomla! La extensi\u00f3n en el script afHelper.php permite a un atacante no autorizado recuperar la ubicaci\u00f3n de la carpeta ra\u00edz web. Este problema afecta a AdmirorFrames: anteriores a 5.0."
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"metrics": {
|
"metrics": {
|
||||||
@ -55,9 +59,41 @@
|
|||||||
"baseSeverity": "MEDIUM"
|
"baseSeverity": "MEDIUM"
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
],
|
||||||
|
"cvssMetricV31": [
|
||||||
|
{
|
||||||
|
"source": "nvd@nist.gov",
|
||||||
|
"type": "Primary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
|
||||||
|
"attackVector": "NETWORK",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "NONE",
|
||||||
|
"userInteraction": "NONE",
|
||||||
|
"scope": "UNCHANGED",
|
||||||
|
"confidentialityImpact": "HIGH",
|
||||||
|
"integrityImpact": "NONE",
|
||||||
|
"availabilityImpact": "NONE",
|
||||||
|
"baseScore": 7.5,
|
||||||
|
"baseSeverity": "HIGH"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 3.9,
|
||||||
|
"impactScore": 3.6
|
||||||
|
}
|
||||||
]
|
]
|
||||||
},
|
},
|
||||||
"weaknesses": [
|
"weaknesses": [
|
||||||
|
{
|
||||||
|
"source": "nvd@nist.gov",
|
||||||
|
"type": "Primary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "NVD-CWE-Other"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"source": "cvd@cert.pl",
|
"source": "cvd@cert.pl",
|
||||||
"type": "Secondary",
|
"type": "Secondary",
|
||||||
@ -69,26 +105,61 @@
|
|||||||
]
|
]
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
|
"configurations": [
|
||||||
|
{
|
||||||
|
"nodes": [
|
||||||
|
{
|
||||||
|
"operator": "OR",
|
||||||
|
"negate": false,
|
||||||
|
"cpeMatch": [
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:a:admiror-design-studio:admirorframes:*:*:*:*:*:joomla\\!:*:*",
|
||||||
|
"versionEndExcluding": "5.0",
|
||||||
|
"matchCriteriaId": "C5EF0F23-1AE6-4174-96B5-D0ADAC6163BC"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
"references": [
|
"references": [
|
||||||
{
|
{
|
||||||
"url": "https://cert.pl/en/posts/2024/06/CVE-2024-5735/",
|
"url": "https://cert.pl/en/posts/2024/06/CVE-2024-5735/",
|
||||||
"source": "cvd@cert.pl"
|
"source": "cvd@cert.pl",
|
||||||
|
"tags": [
|
||||||
|
"Third Party Advisory"
|
||||||
|
]
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"url": "https://cert.pl/posts/2024/06/CVE-2024-5735/",
|
"url": "https://cert.pl/posts/2024/06/CVE-2024-5735/",
|
||||||
"source": "cvd@cert.pl"
|
"source": "cvd@cert.pl",
|
||||||
|
"tags": [
|
||||||
|
"Third Party Advisory"
|
||||||
|
]
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"url": "https://github.com/afine-com/CVE-2024-5735",
|
"url": "https://github.com/afine-com/CVE-2024-5735",
|
||||||
"source": "cvd@cert.pl"
|
"source": "cvd@cert.pl",
|
||||||
|
"tags": [
|
||||||
|
"Exploit",
|
||||||
|
"Third Party Advisory"
|
||||||
|
]
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"url": "https://github.com/sectroyer/CVEs/tree/main/CVE-2024-5735",
|
"url": "https://github.com/sectroyer/CVEs/tree/main/CVE-2024-5735",
|
||||||
"source": "cvd@cert.pl"
|
"source": "cvd@cert.pl",
|
||||||
|
"tags": [
|
||||||
|
"Exploit",
|
||||||
|
"Third Party Advisory"
|
||||||
|
]
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"url": "https://github.com/vasiljevski/admirorframes/issues/3",
|
"url": "https://github.com/vasiljevski/admirorframes/issues/3",
|
||||||
"source": "cvd@cert.pl"
|
"source": "cvd@cert.pl",
|
||||||
|
"tags": [
|
||||||
|
"Issue Tracking"
|
||||||
|
]
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
@ -2,13 +2,17 @@
|
|||||||
"id": "CVE-2024-5736",
|
"id": "CVE-2024-5736",
|
||||||
"sourceIdentifier": "cvd@cert.pl",
|
"sourceIdentifier": "cvd@cert.pl",
|
||||||
"published": "2024-06-28T12:15:10.923",
|
"published": "2024-06-28T12:15:10.923",
|
||||||
"lastModified": "2024-06-28T13:38:47.077",
|
"lastModified": "2024-07-03T15:46:08.877",
|
||||||
"vulnStatus": "Awaiting Analysis",
|
"vulnStatus": "Analyzed",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
"lang": "en",
|
"lang": "en",
|
||||||
"value": "Server Side Request Forgery (SSRF) vulnerability in AdmirorFrames Joomla! extension in afGdStream.php script allows to access local files or server pages available only from localhost.\u00a0This issue affects AdmirorFrames: before 5.0."
|
"value": "Server Side Request Forgery (SSRF) vulnerability in AdmirorFrames Joomla! extension in afGdStream.php script allows to access local files or server pages available only from localhost.\u00a0This issue affects AdmirorFrames: before 5.0."
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"lang": "es",
|
||||||
|
"value": "Vulnerabilidad de Server Side Request Forgery (SSRF) en AdmirorFrames Joomla! La extensi\u00f3n en el script afGdStream.php permite acceder a archivos locales o p\u00e1ginas del servidor disponibles solo desde localhost. Este problema afecta a AdmirorFrames: anteriores a 5.0."
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"metrics": {
|
"metrics": {
|
||||||
@ -55,9 +59,41 @@
|
|||||||
"baseSeverity": "HIGH"
|
"baseSeverity": "HIGH"
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
],
|
||||||
|
"cvssMetricV31": [
|
||||||
|
{
|
||||||
|
"source": "nvd@nist.gov",
|
||||||
|
"type": "Primary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
|
||||||
|
"attackVector": "NETWORK",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "NONE",
|
||||||
|
"userInteraction": "NONE",
|
||||||
|
"scope": "UNCHANGED",
|
||||||
|
"confidentialityImpact": "HIGH",
|
||||||
|
"integrityImpact": "NONE",
|
||||||
|
"availabilityImpact": "NONE",
|
||||||
|
"baseScore": 7.5,
|
||||||
|
"baseSeverity": "HIGH"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 3.9,
|
||||||
|
"impactScore": 3.6
|
||||||
|
}
|
||||||
]
|
]
|
||||||
},
|
},
|
||||||
"weaknesses": [
|
"weaknesses": [
|
||||||
|
{
|
||||||
|
"source": "nvd@nist.gov",
|
||||||
|
"type": "Primary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-918"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"source": "cvd@cert.pl",
|
"source": "cvd@cert.pl",
|
||||||
"type": "Secondary",
|
"type": "Secondary",
|
||||||
@ -69,26 +105,61 @@
|
|||||||
]
|
]
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
|
"configurations": [
|
||||||
|
{
|
||||||
|
"nodes": [
|
||||||
|
{
|
||||||
|
"operator": "OR",
|
||||||
|
"negate": false,
|
||||||
|
"cpeMatch": [
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:a:admiror-design-studio:admirorframes:*:*:*:*:*:joomla\\!:*:*",
|
||||||
|
"versionEndExcluding": "5.0",
|
||||||
|
"matchCriteriaId": "C5EF0F23-1AE6-4174-96B5-D0ADAC6163BC"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
"references": [
|
"references": [
|
||||||
{
|
{
|
||||||
"url": "https://cert.pl/en/posts/2024/06/CVE-2024-5735/",
|
"url": "https://cert.pl/en/posts/2024/06/CVE-2024-5735/",
|
||||||
"source": "cvd@cert.pl"
|
"source": "cvd@cert.pl",
|
||||||
|
"tags": [
|
||||||
|
"Third Party Advisory"
|
||||||
|
]
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"url": "https://cert.pl/posts/2024/06/CVE-2024-5735/",
|
"url": "https://cert.pl/posts/2024/06/CVE-2024-5735/",
|
||||||
"source": "cvd@cert.pl"
|
"source": "cvd@cert.pl",
|
||||||
|
"tags": [
|
||||||
|
"Third Party Advisory"
|
||||||
|
]
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"url": "https://github.com/afine-com/CVE-2024-5736",
|
"url": "https://github.com/afine-com/CVE-2024-5736",
|
||||||
"source": "cvd@cert.pl"
|
"source": "cvd@cert.pl",
|
||||||
|
"tags": [
|
||||||
|
"Exploit",
|
||||||
|
"Third Party Advisory"
|
||||||
|
]
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"url": "https://github.com/sectroyer/CVEs/tree/main/CVE-2024-5736",
|
"url": "https://github.com/sectroyer/CVEs/tree/main/CVE-2024-5736",
|
||||||
"source": "cvd@cert.pl"
|
"source": "cvd@cert.pl",
|
||||||
|
"tags": [
|
||||||
|
"Exploit",
|
||||||
|
"Third Party Advisory"
|
||||||
|
]
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"url": "https://github.com/vasiljevski/admirorframes/issues/3",
|
"url": "https://github.com/vasiljevski/admirorframes/issues/3",
|
||||||
"source": "cvd@cert.pl"
|
"source": "cvd@cert.pl",
|
||||||
|
"tags": [
|
||||||
|
"Issue Tracking"
|
||||||
|
]
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
@ -2,13 +2,17 @@
|
|||||||
"id": "CVE-2024-5737",
|
"id": "CVE-2024-5737",
|
||||||
"sourceIdentifier": "cvd@cert.pl",
|
"sourceIdentifier": "cvd@cert.pl",
|
||||||
"published": "2024-06-28T12:15:11.060",
|
"published": "2024-06-28T12:15:11.060",
|
||||||
"lastModified": "2024-06-28T13:38:47.077",
|
"lastModified": "2024-07-03T14:09:22.483",
|
||||||
"vulnStatus": "Awaiting Analysis",
|
"vulnStatus": "Analyzed",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
"lang": "en",
|
"lang": "en",
|
||||||
"value": "Script afGdStream.php in\u00a0AdmirorFrames Joomla! extension doesn\u2019t specify a content type and as a result default (text/html) is used. An attacker may embed HTML tags directly in image data which is rendered by a webpage as HTML.\u00a0This issue affects AdmirorFrames: before 5.0."
|
"value": "Script afGdStream.php in\u00a0AdmirorFrames Joomla! extension doesn\u2019t specify a content type and as a result default (text/html) is used. An attacker may embed HTML tags directly in image data which is rendered by a webpage as HTML.\u00a0This issue affects AdmirorFrames: before 5.0."
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"lang": "es",
|
||||||
|
"value": "Script afGdStream.php en AdmirorFrames Joomla! La extensi\u00f3n no especifica un tipo de contenido y, como resultado, se utiliza el valor predeterminado (texto/html). Un atacante puede incrustar etiquetas HTML directamente en datos de im\u00e1genes que una p\u00e1gina web representa como HTML. Este problema afecta a AdmirorFrames: anteriores a 5.0."
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"metrics": {
|
"metrics": {
|
||||||
@ -55,9 +59,41 @@
|
|||||||
"baseSeverity": "MEDIUM"
|
"baseSeverity": "MEDIUM"
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
],
|
||||||
|
"cvssMetricV31": [
|
||||||
|
{
|
||||||
|
"source": "nvd@nist.gov",
|
||||||
|
"type": "Primary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
|
||||||
|
"attackVector": "NETWORK",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "NONE",
|
||||||
|
"userInteraction": "REQUIRED",
|
||||||
|
"scope": "CHANGED",
|
||||||
|
"confidentialityImpact": "LOW",
|
||||||
|
"integrityImpact": "LOW",
|
||||||
|
"availabilityImpact": "NONE",
|
||||||
|
"baseScore": 6.1,
|
||||||
|
"baseSeverity": "MEDIUM"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 2.8,
|
||||||
|
"impactScore": 2.7
|
||||||
|
}
|
||||||
]
|
]
|
||||||
},
|
},
|
||||||
"weaknesses": [
|
"weaknesses": [
|
||||||
|
{
|
||||||
|
"source": "nvd@nist.gov",
|
||||||
|
"type": "Primary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-79"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"source": "cvd@cert.pl",
|
"source": "cvd@cert.pl",
|
||||||
"type": "Secondary",
|
"type": "Secondary",
|
||||||
@ -69,26 +105,61 @@
|
|||||||
]
|
]
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
|
"configurations": [
|
||||||
|
{
|
||||||
|
"nodes": [
|
||||||
|
{
|
||||||
|
"operator": "OR",
|
||||||
|
"negate": false,
|
||||||
|
"cpeMatch": [
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:a:admiror-design-studio:admirorframes:*:*:*:*:*:joomla\\!:*:*",
|
||||||
|
"versionEndExcluding": "5.0",
|
||||||
|
"matchCriteriaId": "C5EF0F23-1AE6-4174-96B5-D0ADAC6163BC"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
"references": [
|
"references": [
|
||||||
{
|
{
|
||||||
"url": "https://cert.pl/en/posts/2024/06/CVE-2024-5735/",
|
"url": "https://cert.pl/en/posts/2024/06/CVE-2024-5735/",
|
||||||
"source": "cvd@cert.pl"
|
"source": "cvd@cert.pl",
|
||||||
|
"tags": [
|
||||||
|
"Third Party Advisory"
|
||||||
|
]
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"url": "https://cert.pl/posts/2024/06/CVE-2024-5735/",
|
"url": "https://cert.pl/posts/2024/06/CVE-2024-5735/",
|
||||||
"source": "cvd@cert.pl"
|
"source": "cvd@cert.pl",
|
||||||
|
"tags": [
|
||||||
|
"Third Party Advisory"
|
||||||
|
]
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"url": "https://github.com/afine-com/CVE-2024-5737",
|
"url": "https://github.com/afine-com/CVE-2024-5737",
|
||||||
"source": "cvd@cert.pl"
|
"source": "cvd@cert.pl",
|
||||||
|
"tags": [
|
||||||
|
"Exploit",
|
||||||
|
"Third Party Advisory"
|
||||||
|
]
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"url": "https://github.com/sectroyer/CVEs/tree/main/CVE-2024-5737",
|
"url": "https://github.com/sectroyer/CVEs/tree/main/CVE-2024-5737",
|
||||||
"source": "cvd@cert.pl"
|
"source": "cvd@cert.pl",
|
||||||
|
"tags": [
|
||||||
|
"Exploit",
|
||||||
|
"Third Party Advisory"
|
||||||
|
]
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"url": "https://github.com/vasiljevski/admirorframes/issues/3",
|
"url": "https://github.com/vasiljevski/admirorframes/issues/3",
|
||||||
"source": "cvd@cert.pl"
|
"source": "cvd@cert.pl",
|
||||||
|
"tags": [
|
||||||
|
"Issue Tracking"
|
||||||
|
]
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
@ -2,8 +2,8 @@
|
|||||||
"id": "CVE-2024-5767",
|
"id": "CVE-2024-5767",
|
||||||
"sourceIdentifier": "contact@wpscan.com",
|
"sourceIdentifier": "contact@wpscan.com",
|
||||||
"published": "2024-07-02T06:15:05.063",
|
"published": "2024-07-02T06:15:05.063",
|
||||||
"lastModified": "2024-07-02T12:09:16.907",
|
"lastModified": "2024-07-03T15:26:29.050",
|
||||||
"vulnStatus": "Awaiting Analysis",
|
"vulnStatus": "Analyzed",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
@ -15,11 +15,68 @@
|
|||||||
"value": "El complemento sitetweet de WordPress hasta la versi\u00f3n 0.2 no tiene control CSRF en algunos lugares y le falta sanitizaci\u00f3n y escape, lo que podr\u00eda permitir a los atacantes hacer que el administrador que haya iniciado sesi\u00f3n agregue payloads XSS almacenado a trav\u00e9s de un ataque CSRF."
|
"value": "El complemento sitetweet de WordPress hasta la versi\u00f3n 0.2 no tiene control CSRF en algunos lugares y le falta sanitizaci\u00f3n y escape, lo que podr\u00eda permitir a los atacantes hacer que el administrador que haya iniciado sesi\u00f3n agregue payloads XSS almacenado a trav\u00e9s de un ataque CSRF."
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"metrics": {},
|
"metrics": {
|
||||||
|
"cvssMetricV31": [
|
||||||
|
{
|
||||||
|
"source": "nvd@nist.gov",
|
||||||
|
"type": "Primary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||||||
|
"attackVector": "NETWORK",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "NONE",
|
||||||
|
"userInteraction": "REQUIRED",
|
||||||
|
"scope": "UNCHANGED",
|
||||||
|
"confidentialityImpact": "HIGH",
|
||||||
|
"integrityImpact": "HIGH",
|
||||||
|
"availabilityImpact": "HIGH",
|
||||||
|
"baseScore": 8.8,
|
||||||
|
"baseSeverity": "HIGH"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 2.8,
|
||||||
|
"impactScore": 5.9
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"weaknesses": [
|
||||||
|
{
|
||||||
|
"source": "nvd@nist.gov",
|
||||||
|
"type": "Primary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-352"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"configurations": [
|
||||||
|
{
|
||||||
|
"nodes": [
|
||||||
|
{
|
||||||
|
"operator": "OR",
|
||||||
|
"negate": false,
|
||||||
|
"cpeMatch": [
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:a:sitetweet_project:sitetweet:*:*:*:*:*:wordpress:*:*",
|
||||||
|
"versionEndIncluding": "0.2",
|
||||||
|
"matchCriteriaId": "45A2DEB6-4F70-4E8A-9744-9EC3474517FD"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
"references": [
|
"references": [
|
||||||
{
|
{
|
||||||
"url": "https://wpscan.com/vulnerability/e4ba26b4-5f4f-4c9e-aa37-885b30ef8088/",
|
"url": "https://wpscan.com/vulnerability/e4ba26b4-5f4f-4c9e-aa37-885b30ef8088/",
|
||||||
"source": "contact@wpscan.com"
|
"source": "contact@wpscan.com",
|
||||||
|
"tags": [
|
||||||
|
"Exploit",
|
||||||
|
"Third Party Advisory"
|
||||||
|
]
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
56
CVE-2024/CVE-2024-60xx/CVE-2024-6052.json
Normal file
56
CVE-2024/CVE-2024-60xx/CVE-2024-6052.json
Normal file
@ -0,0 +1,56 @@
|
|||||||
|
{
|
||||||
|
"id": "CVE-2024-6052",
|
||||||
|
"sourceIdentifier": "security@checkmk.com",
|
||||||
|
"published": "2024-07-03T15:15:06.223",
|
||||||
|
"lastModified": "2024-07-03T15:15:06.223",
|
||||||
|
"vulnStatus": "Received",
|
||||||
|
"cveTags": [],
|
||||||
|
"descriptions": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "Stored XSS in Checkmk before versions 2.3.0p8, 2.2.0p29, 2.1.0p45, and 2.0.0 (EOL) allows users to execute arbitrary scripts by injecting HTML elements"
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"metrics": {
|
||||||
|
"cvssMetricV31": [
|
||||||
|
{
|
||||||
|
"source": "security@checkmk.com",
|
||||||
|
"type": "Secondary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L",
|
||||||
|
"attackVector": "NETWORK",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "LOW",
|
||||||
|
"userInteraction": "REQUIRED",
|
||||||
|
"scope": "CHANGED",
|
||||||
|
"confidentialityImpact": "LOW",
|
||||||
|
"integrityImpact": "LOW",
|
||||||
|
"availabilityImpact": "LOW",
|
||||||
|
"baseScore": 6.5,
|
||||||
|
"baseSeverity": "MEDIUM"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 2.3,
|
||||||
|
"impactScore": 3.7
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"weaknesses": [
|
||||||
|
{
|
||||||
|
"source": "security@checkmk.com",
|
||||||
|
"type": "Secondary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-80"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://checkmk.com/werk/17010",
|
||||||
|
"source": "security@checkmk.com"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
60
CVE-2024/CVE-2024-61xx/CVE-2024-6126.json
Normal file
60
CVE-2024/CVE-2024-61xx/CVE-2024-6126.json
Normal file
@ -0,0 +1,60 @@
|
|||||||
|
{
|
||||||
|
"id": "CVE-2024-6126",
|
||||||
|
"sourceIdentifier": "secalert@redhat.com",
|
||||||
|
"published": "2024-07-03T15:15:06.470",
|
||||||
|
"lastModified": "2024-07-03T15:15:06.470",
|
||||||
|
"vulnStatus": "Received",
|
||||||
|
"cveTags": [],
|
||||||
|
"descriptions": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "A flaw was found in the cockpit package. This flaw allows an authenticated user to kill any process when enabling the pam_env's user_readenv option, which leads to a denial of service (DoS) attack."
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"metrics": {
|
||||||
|
"cvssMetricV31": [
|
||||||
|
{
|
||||||
|
"source": "secalert@redhat.com",
|
||||||
|
"type": "Secondary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:C/C:N/I:N/A:L",
|
||||||
|
"attackVector": "LOCAL",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "LOW",
|
||||||
|
"userInteraction": "REQUIRED",
|
||||||
|
"scope": "CHANGED",
|
||||||
|
"confidentialityImpact": "NONE",
|
||||||
|
"integrityImpact": "NONE",
|
||||||
|
"availabilityImpact": "LOW",
|
||||||
|
"baseScore": 3.2,
|
||||||
|
"baseSeverity": "LOW"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 1.5,
|
||||||
|
"impactScore": 1.4
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"weaknesses": [
|
||||||
|
{
|
||||||
|
"source": "secalert@redhat.com",
|
||||||
|
"type": "Primary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-400"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://access.redhat.com/security/cve/CVE-2024-6126",
|
||||||
|
"source": "secalert@redhat.com"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2292897",
|
||||||
|
"source": "secalert@redhat.com"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
@ -2,17 +2,41 @@
|
|||||||
"id": "CVE-2024-6375",
|
"id": "CVE-2024-6375",
|
||||||
"sourceIdentifier": "cna@mongodb.com",
|
"sourceIdentifier": "cna@mongodb.com",
|
||||||
"published": "2024-07-01T15:15:17.430",
|
"published": "2024-07-01T15:15:17.430",
|
||||||
"lastModified": "2024-07-01T16:37:39.040",
|
"lastModified": "2024-07-03T14:54:52.427",
|
||||||
"vulnStatus": "Awaiting Analysis",
|
"vulnStatus": "Analyzed",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
"lang": "en",
|
"lang": "en",
|
||||||
"value": "A command for refining a collection shard key is missing an authorization check. This may cause the command to run directly on a shard, leading to either degradation of query performance, or to revealing chunk boundaries through timing side channels. This affects MongoDB Server v5.0 versions, prior to 5.0.22, MongoDB Server v6.0 versions, prior to 6.0.11 and MongoDB Server v7.0 versions prior to 7.0.3."
|
"value": "A command for refining a collection shard key is missing an authorization check. This may cause the command to run directly on a shard, leading to either degradation of query performance, or to revealing chunk boundaries through timing side channels. This affects MongoDB Server v5.0 versions, prior to 5.0.22, MongoDB Server v6.0 versions, prior to 6.0.11 and MongoDB Server v7.0 versions prior to 7.0.3."
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"lang": "es",
|
||||||
|
"value": "A un comando para refinar una clave de fragmento de colecci\u00f3n le falta una verificaci\u00f3n de autorizaci\u00f3n. Esto puede hacer que el comando se ejecute directamente en un fragmento, lo que provoca una degradaci\u00f3n del rendimiento de la consulta o revela l\u00edmites de fragmentos a trav\u00e9s de canales laterales de temporizaci\u00f3n. Esto afecta a las versiones de MongoDB Server v5.0, anteriores a la 5.0.22, a las versiones de MongoDB Server v6.0, anteriores a la 6.0.11 y a las versiones de MongoDB Server v7.0 anteriores a la 7.0.3."
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"metrics": {
|
"metrics": {
|
||||||
"cvssMetricV31": [
|
"cvssMetricV31": [
|
||||||
|
{
|
||||||
|
"source": "nvd@nist.gov",
|
||||||
|
"type": "Primary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L",
|
||||||
|
"attackVector": "NETWORK",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "NONE",
|
||||||
|
"userInteraction": "NONE",
|
||||||
|
"scope": "UNCHANGED",
|
||||||
|
"confidentialityImpact": "LOW",
|
||||||
|
"integrityImpact": "NONE",
|
||||||
|
"availabilityImpact": "LOW",
|
||||||
|
"baseScore": 6.5,
|
||||||
|
"baseSeverity": "MEDIUM"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 3.9,
|
||||||
|
"impactScore": 2.5
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"source": "cna@mongodb.com",
|
"source": "cna@mongodb.com",
|
||||||
"type": "Secondary",
|
"type": "Secondary",
|
||||||
@ -36,6 +60,16 @@
|
|||||||
]
|
]
|
||||||
},
|
},
|
||||||
"weaknesses": [
|
"weaknesses": [
|
||||||
|
{
|
||||||
|
"source": "nvd@nist.gov",
|
||||||
|
"type": "Primary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-862"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"source": "cna@mongodb.com",
|
"source": "cna@mongodb.com",
|
||||||
"type": "Secondary",
|
"type": "Secondary",
|
||||||
@ -47,10 +81,48 @@
|
|||||||
]
|
]
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
|
"configurations": [
|
||||||
|
{
|
||||||
|
"nodes": [
|
||||||
|
{
|
||||||
|
"operator": "OR",
|
||||||
|
"negate": false,
|
||||||
|
"cpeMatch": [
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:a:mongodb:mongodb:*:*:*:*:*:*:*:*",
|
||||||
|
"versionStartIncluding": "5.0.0",
|
||||||
|
"versionEndExcluding": "5.0.22",
|
||||||
|
"matchCriteriaId": "52107780-5C9C-4DE0-9D16-89F128662C49"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:a:mongodb:mongodb:*:*:*:*:*:*:*:*",
|
||||||
|
"versionStartIncluding": "6.0.0",
|
||||||
|
"versionEndExcluding": "6.0.11",
|
||||||
|
"matchCriteriaId": "E8EEF504-8B18-4258-89AA-CDA99F3E5875"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:a:mongodb:mongodb:*:*:*:*:*:*:*:*",
|
||||||
|
"versionStartIncluding": "7.0.0",
|
||||||
|
"versionEndExcluding": "7.0.3",
|
||||||
|
"matchCriteriaId": "301B06FC-E692-4D15-8E45-86268D648D6C"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
"references": [
|
"references": [
|
||||||
{
|
{
|
||||||
"url": "https://jira.mongodb.org/browse/SERVER-79327",
|
"url": "https://jira.mongodb.org/browse/SERVER-79327",
|
||||||
"source": "cna@mongodb.com"
|
"source": "cna@mongodb.com",
|
||||||
|
"tags": [
|
||||||
|
"Issue Tracking",
|
||||||
|
"Patch",
|
||||||
|
"Vendor Advisory"
|
||||||
|
]
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
@ -2,17 +2,41 @@
|
|||||||
"id": "CVE-2024-6376",
|
"id": "CVE-2024-6376",
|
||||||
"sourceIdentifier": "cna@mongodb.com",
|
"sourceIdentifier": "cna@mongodb.com",
|
||||||
"published": "2024-07-01T15:15:17.673",
|
"published": "2024-07-01T15:15:17.673",
|
||||||
"lastModified": "2024-07-01T16:37:39.040",
|
"lastModified": "2024-07-03T15:04:52.463",
|
||||||
"vulnStatus": "Awaiting Analysis",
|
"vulnStatus": "Analyzed",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
"lang": "en",
|
"lang": "en",
|
||||||
"value": "MongoDB Compass may be susceptible to code injection due to insufficient sandbox protection settings with the usage of ejson shell parser in Compass' connection handling. This issue affects MongoDB Compass versions prior to version 1.42.2"
|
"value": "MongoDB Compass may be susceptible to code injection due to insufficient sandbox protection settings with the usage of ejson shell parser in Compass' connection handling. This issue affects MongoDB Compass versions prior to version 1.42.2"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"lang": "es",
|
||||||
|
"value": "MongoDB Compass puede ser susceptible a la inyecci\u00f3n de c\u00f3digo debido a una configuraci\u00f3n insuficiente de protecci\u00f3n de la zona de pruebas con el uso del analizador de shell ejson en el manejo de conexiones de Compass. Este problema afecta a las versiones de MongoDB Compass anteriores a la versi\u00f3n 1.42.2"
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"metrics": {
|
"metrics": {
|
||||||
"cvssMetricV31": [
|
"cvssMetricV31": [
|
||||||
|
{
|
||||||
|
"source": "nvd@nist.gov",
|
||||||
|
"type": "Primary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||||
|
"attackVector": "NETWORK",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "NONE",
|
||||||
|
"userInteraction": "NONE",
|
||||||
|
"scope": "UNCHANGED",
|
||||||
|
"confidentialityImpact": "HIGH",
|
||||||
|
"integrityImpact": "HIGH",
|
||||||
|
"availabilityImpact": "HIGH",
|
||||||
|
"baseScore": 9.8,
|
||||||
|
"baseSeverity": "CRITICAL"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 3.9,
|
||||||
|
"impactScore": 5.9
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"source": "cna@mongodb.com",
|
"source": "cna@mongodb.com",
|
||||||
"type": "Secondary",
|
"type": "Secondary",
|
||||||
@ -36,6 +60,16 @@
|
|||||||
]
|
]
|
||||||
},
|
},
|
||||||
"weaknesses": [
|
"weaknesses": [
|
||||||
|
{
|
||||||
|
"source": "nvd@nist.gov",
|
||||||
|
"type": "Primary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-94"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"source": "cna@mongodb.com",
|
"source": "cna@mongodb.com",
|
||||||
"type": "Secondary",
|
"type": "Secondary",
|
||||||
@ -47,10 +81,33 @@
|
|||||||
]
|
]
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
|
"configurations": [
|
||||||
|
{
|
||||||
|
"nodes": [
|
||||||
|
{
|
||||||
|
"operator": "OR",
|
||||||
|
"negate": false,
|
||||||
|
"cpeMatch": [
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:a:mongodb:compass:*:*:*:*:*:*:*:*",
|
||||||
|
"versionEndExcluding": "1.42.2",
|
||||||
|
"matchCriteriaId": "2C0CC548-DDB4-4527-AEBC-1993B3E39EDA"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
"references": [
|
"references": [
|
||||||
{
|
{
|
||||||
"url": "https://jira.mongodb.org/browse/COMPASS-7496",
|
"url": "https://jira.mongodb.org/browse/COMPASS-7496",
|
||||||
"source": "cna@mongodb.com"
|
"source": "cna@mongodb.com",
|
||||||
|
"tags": [
|
||||||
|
"Issue Tracking",
|
||||||
|
"Patch",
|
||||||
|
"Vendor Advisory"
|
||||||
|
]
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
137
CVE-2024/CVE-2024-64xx/CVE-2024-6471.json
Normal file
137
CVE-2024/CVE-2024-64xx/CVE-2024-6471.json
Normal file
@ -0,0 +1,137 @@
|
|||||||
|
{
|
||||||
|
"id": "CVE-2024-6471",
|
||||||
|
"sourceIdentifier": "cna@vuldb.com",
|
||||||
|
"published": "2024-07-03T14:15:06.490",
|
||||||
|
"lastModified": "2024-07-03T14:15:06.490",
|
||||||
|
"vulnStatus": "Received",
|
||||||
|
"cveTags": [],
|
||||||
|
"descriptions": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "A vulnerability classified as critical has been found in SourceCodester Online Tours & Travels Management 1.0. This affects an unknown part of the file sms_setting.php. The manipulation of the argument uname leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-270279."
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"metrics": {
|
||||||
|
"cvssMetricV40": [
|
||||||
|
{
|
||||||
|
"source": "cna@vuldb.com",
|
||||||
|
"type": "Secondary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "4.0",
|
||||||
|
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
|
||||||
|
"attackVector": "NETWORK",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"attackRequirements": "NONE",
|
||||||
|
"privilegesRequired": "LOW",
|
||||||
|
"userInteraction": "NONE",
|
||||||
|
"vulnerableSystemConfidentiality": "LOW",
|
||||||
|
"vulnerableSystemIntegrity": "LOW",
|
||||||
|
"vulnerableSystemAvailability": "LOW",
|
||||||
|
"subsequentSystemConfidentiality": "NONE",
|
||||||
|
"subsequentSystemIntegrity": "NONE",
|
||||||
|
"subsequentSystemAvailability": "NONE",
|
||||||
|
"exploitMaturity": "NOT_DEFINED",
|
||||||
|
"confidentialityRequirements": "NOT_DEFINED",
|
||||||
|
"integrityRequirements": "NOT_DEFINED",
|
||||||
|
"availabilityRequirements": "NOT_DEFINED",
|
||||||
|
"modifiedAttackVector": "NOT_DEFINED",
|
||||||
|
"modifiedAttackComplexity": "NOT_DEFINED",
|
||||||
|
"modifiedAttackRequirements": "NOT_DEFINED",
|
||||||
|
"modifiedPrivilegesRequired": "NOT_DEFINED",
|
||||||
|
"modifiedUserInteraction": "NOT_DEFINED",
|
||||||
|
"modifiedVulnerableSystemConfidentiality": "NOT_DEFINED",
|
||||||
|
"modifiedVulnerableSystemIntegrity": "NOT_DEFINED",
|
||||||
|
"modifiedVulnerableSystemAvailability": "NOT_DEFINED",
|
||||||
|
"modifiedSubsequentSystemConfidentiality": "NOT_DEFINED",
|
||||||
|
"modifiedSubsequentSystemIntegrity": "NOT_DEFINED",
|
||||||
|
"modifiedSubsequentSystemAvailability": "NOT_DEFINED",
|
||||||
|
"safety": "NOT_DEFINED",
|
||||||
|
"automatable": "NOT_DEFINED",
|
||||||
|
"recovery": "NOT_DEFINED",
|
||||||
|
"valueDensity": "NOT_DEFINED",
|
||||||
|
"vulnerabilityResponseEffort": "NOT_DEFINED",
|
||||||
|
"providerUrgency": "NOT_DEFINED",
|
||||||
|
"baseScore": 5.3,
|
||||||
|
"baseSeverity": "MEDIUM"
|
||||||
|
}
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"cvssMetricV31": [
|
||||||
|
{
|
||||||
|
"source": "cna@vuldb.com",
|
||||||
|
"type": "Secondary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
|
||||||
|
"attackVector": "NETWORK",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "LOW",
|
||||||
|
"userInteraction": "NONE",
|
||||||
|
"scope": "UNCHANGED",
|
||||||
|
"confidentialityImpact": "LOW",
|
||||||
|
"integrityImpact": "LOW",
|
||||||
|
"availabilityImpact": "LOW",
|
||||||
|
"baseScore": 6.3,
|
||||||
|
"baseSeverity": "MEDIUM"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 2.8,
|
||||||
|
"impactScore": 3.4
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"cvssMetricV2": [
|
||||||
|
{
|
||||||
|
"source": "cna@vuldb.com",
|
||||||
|
"type": "Secondary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "2.0",
|
||||||
|
"vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P",
|
||||||
|
"accessVector": "NETWORK",
|
||||||
|
"accessComplexity": "LOW",
|
||||||
|
"authentication": "SINGLE",
|
||||||
|
"confidentialityImpact": "PARTIAL",
|
||||||
|
"integrityImpact": "PARTIAL",
|
||||||
|
"availabilityImpact": "PARTIAL",
|
||||||
|
"baseScore": 6.5
|
||||||
|
},
|
||||||
|
"baseSeverity": "MEDIUM",
|
||||||
|
"exploitabilityScore": 8.0,
|
||||||
|
"impactScore": 6.4,
|
||||||
|
"acInsufInfo": false,
|
||||||
|
"obtainAllPrivilege": false,
|
||||||
|
"obtainUserPrivilege": false,
|
||||||
|
"obtainOtherPrivilege": false,
|
||||||
|
"userInteractionRequired": false
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"weaknesses": [
|
||||||
|
{
|
||||||
|
"source": "cna@vuldb.com",
|
||||||
|
"type": "Primary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-89"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://blog.csdn.net/ENTICE1208/article/details/140141934",
|
||||||
|
"source": "cna@vuldb.com"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://vuldb.com/?ctiid.270279",
|
||||||
|
"source": "cna@vuldb.com"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://vuldb.com/?id.270279",
|
||||||
|
"source": "cna@vuldb.com"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://vuldb.com/?submit.367953",
|
||||||
|
"source": "cna@vuldb.com"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
71
README.md
71
README.md
@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours.
|
|||||||
### Last Repository Update
|
### Last Repository Update
|
||||||
|
|
||||||
```plain
|
```plain
|
||||||
2024-07-03T14:02:10.825146+00:00
|
2024-07-03T16:01:48.944347+00:00
|
||||||
```
|
```
|
||||||
|
|
||||||
### Most recent CVE Modification Timestamp synchronized with NVD
|
### Most recent CVE Modification Timestamp synchronized with NVD
|
||||||
|
|
||||||
```plain
|
```plain
|
||||||
2024-07-03T13:33:20.297000+00:00
|
2024-07-03T15:46:08.877000+00:00
|
||||||
```
|
```
|
||||||
|
|
||||||
### Last Data Feed Release
|
### Last Data Feed Release
|
||||||
@ -33,48 +33,51 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
|
|||||||
### Total Number of included CVEs
|
### Total Number of included CVEs
|
||||||
|
|
||||||
```plain
|
```plain
|
||||||
255812
|
255819
|
||||||
```
|
```
|
||||||
|
|
||||||
### CVEs added in the last Commit
|
### CVEs added in the last Commit
|
||||||
|
|
||||||
Recently added CVEs: `4`
|
Recently added CVEs: `7`
|
||||||
|
|
||||||
- [CVE-2024-5672](CVE-2024/CVE-2024-56xx/CVE-2024-5672.json) (`2024-07-03T13:15:03.043`)
|
- [CVE-2024-32937](CVE-2024/CVE-2024-329xx/CVE-2024-32937.json) (`2024-07-03T14:15:05.340`)
|
||||||
- [CVE-2024-6426](CVE-2024/CVE-2024-64xx/CVE-2024-6426.json) (`2024-07-03T12:15:03.150`)
|
- [CVE-2024-37726](CVE-2024/CVE-2024-377xx/CVE-2024-37726.json) (`2024-07-03T14:15:06.120`)
|
||||||
- [CVE-2024-6427](CVE-2024/CVE-2024-64xx/CVE-2024-6427.json) (`2024-07-03T12:15:03.430`)
|
- [CVE-2024-39220](CVE-2024/CVE-2024-392xx/CVE-2024-39220.json) (`2024-07-03T15:15:05.993`)
|
||||||
- [CVE-2024-6470](CVE-2024/CVE-2024-64xx/CVE-2024-6470.json) (`2024-07-03T13:15:03.703`)
|
- [CVE-2024-39223](CVE-2024/CVE-2024-392xx/CVE-2024-39223.json) (`2024-07-03T15:15:06.083`)
|
||||||
|
- [CVE-2024-6052](CVE-2024/CVE-2024-60xx/CVE-2024-6052.json) (`2024-07-03T15:15:06.223`)
|
||||||
|
- [CVE-2024-6126](CVE-2024/CVE-2024-61xx/CVE-2024-6126.json) (`2024-07-03T15:15:06.470`)
|
||||||
|
- [CVE-2024-6471](CVE-2024/CVE-2024-64xx/CVE-2024-6471.json) (`2024-07-03T14:15:06.490`)
|
||||||
|
|
||||||
|
|
||||||
### CVEs modified in the last Commit
|
### CVEs modified in the last Commit
|
||||||
|
|
||||||
Recently modified CVEs: `49`
|
Recently modified CVEs: `45`
|
||||||
|
|
||||||
- [CVE-2024-39206](CVE-2024/CVE-2024-392xx/CVE-2024-39206.json) (`2024-07-03T12:53:24.977`)
|
- [CVE-2024-1427](CVE-2024/CVE-2024-14xx/CVE-2024-1427.json) (`2024-07-03T15:44:40.083`)
|
||||||
- [CVE-2024-39315](CVE-2024/CVE-2024-393xx/CVE-2024-39315.json) (`2024-07-03T12:53:24.977`)
|
- [CVE-2024-1931](CVE-2024/CVE-2024-19xx/CVE-2024-1931.json) (`2024-07-03T15:15:05.560`)
|
||||||
- [CVE-2024-39322](CVE-2024/CVE-2024-393xx/CVE-2024-39322.json) (`2024-07-03T12:53:24.977`)
|
- [CVE-2024-27857](CVE-2024/CVE-2024-278xx/CVE-2024-27857.json) (`2024-07-03T15:43:17.007`)
|
||||||
- [CVE-2024-39324](CVE-2024/CVE-2024-393xx/CVE-2024-39324.json) (`2024-07-03T12:53:24.977`)
|
- [CVE-2024-27885](CVE-2024/CVE-2024-278xx/CVE-2024-27885.json) (`2024-07-03T15:44:29.397`)
|
||||||
- [CVE-2024-39325](CVE-2024/CVE-2024-393xx/CVE-2024-39325.json) (`2024-07-03T12:53:24.977`)
|
- [CVE-2024-34696](CVE-2024/CVE-2024-346xx/CVE-2024-34696.json) (`2024-07-03T14:42:49.743`)
|
||||||
- [CVE-2024-39326](CVE-2024/CVE-2024-393xx/CVE-2024-39326.json) (`2024-07-03T12:53:24.977`)
|
- [CVE-2024-36401](CVE-2024/CVE-2024-364xx/CVE-2024-36401.json) (`2024-07-03T15:07:42.777`)
|
||||||
- [CVE-2024-39353](CVE-2024/CVE-2024-393xx/CVE-2024-39353.json) (`2024-07-03T12:53:24.977`)
|
- [CVE-2024-36420](CVE-2024/CVE-2024-364xx/CVE-2024-36420.json) (`2024-07-03T15:29:45.557`)
|
||||||
- [CVE-2024-39361](CVE-2024/CVE-2024-393xx/CVE-2024-39361.json) (`2024-07-03T12:53:24.977`)
|
- [CVE-2024-36421](CVE-2024/CVE-2024-364xx/CVE-2024-36421.json) (`2024-07-03T15:36:31.170`)
|
||||||
- [CVE-2024-39807](CVE-2024/CVE-2024-398xx/CVE-2024-39807.json) (`2024-07-03T12:53:24.977`)
|
- [CVE-2024-36422](CVE-2024/CVE-2024-364xx/CVE-2024-36422.json) (`2024-07-03T15:38:24.297`)
|
||||||
- [CVE-2024-39830](CVE-2024/CVE-2024-398xx/CVE-2024-39830.json) (`2024-07-03T12:53:24.977`)
|
- [CVE-2024-37741](CVE-2024/CVE-2024-377xx/CVE-2024-37741.json) (`2024-07-03T14:27:08.057`)
|
||||||
- [CVE-2024-39891](CVE-2024/CVE-2024-398xx/CVE-2024-39891.json) (`2024-07-03T12:53:24.977`)
|
- [CVE-2024-3800](CVE-2024/CVE-2024-38xx/CVE-2024-3800.json) (`2024-07-03T14:36:22.273`)
|
||||||
- [CVE-2024-39894](CVE-2024/CVE-2024-398xx/CVE-2024-39894.json) (`2024-07-03T13:15:02.890`)
|
- [CVE-2024-3801](CVE-2024/CVE-2024-38xx/CVE-2024-3801.json) (`2024-07-03T14:36:52.797`)
|
||||||
- [CVE-2024-39920](CVE-2024/CVE-2024-399xx/CVE-2024-39920.json) (`2024-07-03T12:53:24.977`)
|
- [CVE-2024-3816](CVE-2024/CVE-2024-38xx/CVE-2024-3816.json) (`2024-07-03T14:37:07.750`)
|
||||||
- [CVE-2024-4482](CVE-2024/CVE-2024-44xx/CVE-2024-4482.json) (`2024-07-03T12:53:24.977`)
|
- [CVE-2024-39704](CVE-2024/CVE-2024-397xx/CVE-2024-39704.json) (`2024-07-03T14:32:56.510`)
|
||||||
- [CVE-2024-4543](CVE-2024/CVE-2024-45xx/CVE-2024-4543.json) (`2024-07-03T12:53:24.977`)
|
- [CVE-2024-3999](CVE-2024/CVE-2024-39xx/CVE-2024-3999.json) (`2024-07-03T15:44:56.130`)
|
||||||
- [CVE-2024-4708](CVE-2024/CVE-2024-47xx/CVE-2024-4708.json) (`2024-07-03T12:53:24.977`)
|
- [CVE-2024-4627](CVE-2024/CVE-2024-46xx/CVE-2024-4627.json) (`2024-07-03T15:45:08.187`)
|
||||||
- [CVE-2024-6263](CVE-2024/CVE-2024-62xx/CVE-2024-6263.json) (`2024-07-03T12:53:24.977`)
|
- [CVE-2024-5349](CVE-2024/CVE-2024-53xx/CVE-2024-5349.json) (`2024-07-03T15:44:23.807`)
|
||||||
- [CVE-2024-6340](CVE-2024/CVE-2024-63xx/CVE-2024-6340.json) (`2024-07-03T12:53:24.977`)
|
- [CVE-2024-5419](CVE-2024/CVE-2024-54xx/CVE-2024-5419.json) (`2024-07-03T15:43:09.450`)
|
||||||
- [CVE-2024-6381](CVE-2024/CVE-2024-63xx/CVE-2024-6381.json) (`2024-07-03T12:53:24.977`)
|
- [CVE-2024-5606](CVE-2024/CVE-2024-56xx/CVE-2024-5606.json) (`2024-07-03T15:45:19.513`)
|
||||||
- [CVE-2024-6382](CVE-2024/CVE-2024-63xx/CVE-2024-6382.json) (`2024-07-03T12:53:24.977`)
|
- [CVE-2024-5735](CVE-2024/CVE-2024-57xx/CVE-2024-5735.json) (`2024-07-03T15:45:57.677`)
|
||||||
- [CVE-2024-6387](CVE-2024/CVE-2024-63xx/CVE-2024-6387.json) (`2024-07-03T13:15:03.493`)
|
- [CVE-2024-5736](CVE-2024/CVE-2024-57xx/CVE-2024-5736.json) (`2024-07-03T15:46:08.877`)
|
||||||
- [CVE-2024-6428](CVE-2024/CVE-2024-64xx/CVE-2024-6428.json) (`2024-07-03T12:53:24.977`)
|
- [CVE-2024-5737](CVE-2024/CVE-2024-57xx/CVE-2024-5737.json) (`2024-07-03T14:09:22.483`)
|
||||||
- [CVE-2024-6452](CVE-2024/CVE-2024-64xx/CVE-2024-6452.json) (`2024-07-03T12:53:24.977`)
|
- [CVE-2024-5767](CVE-2024/CVE-2024-57xx/CVE-2024-5767.json) (`2024-07-03T15:26:29.050`)
|
||||||
- [CVE-2024-6453](CVE-2024/CVE-2024-64xx/CVE-2024-6453.json) (`2024-07-03T12:53:24.977`)
|
- [CVE-2024-6375](CVE-2024/CVE-2024-63xx/CVE-2024-6375.json) (`2024-07-03T14:54:52.427`)
|
||||||
- [CVE-2024-6469](CVE-2024/CVE-2024-64xx/CVE-2024-6469.json) (`2024-07-03T12:53:24.977`)
|
- [CVE-2024-6376](CVE-2024/CVE-2024-63xx/CVE-2024-6376.json) (`2024-07-03T15:04:52.463`)
|
||||||
|
|
||||||
|
|
||||||
## Download and Usage
|
## Download and Usage
|
||||||
|
203
_state.csv
203
_state.csv
@ -90436,25 +90436,25 @@ CVE-2016-7510,0,0,1779d722e1e3abcce643f3990841f703ae46a4e3e7f1fe529ffead6d50061a
|
|||||||
CVE-2016-7511,0,0,61e45c42288f92ed219bf7af9d1eebb46bd81957c5eaf585ba2634d48c3cbb81,2022-03-01T14:30:27.027000
|
CVE-2016-7511,0,0,61e45c42288f92ed219bf7af9d1eebb46bd81957c5eaf585ba2634d48c3cbb81,2022-03-01T14:30:27.027000
|
||||||
CVE-2016-7513,0,0,f3d58cf54ee5cc2b5f44e21575d4af3e7368d520a46e2dc28b8c8d9f5f3fb390,2017-05-09T12:40:08.853000
|
CVE-2016-7513,0,0,f3d58cf54ee5cc2b5f44e21575d4af3e7368d520a46e2dc28b8c8d9f5f3fb390,2017-05-09T12:40:08.853000
|
||||||
CVE-2016-7514,0,0,5acf4c11c6b23e52c011f5a018c2c2d90c756ec80883de77cf9634931bafa504,2017-05-09T12:40:05.697000
|
CVE-2016-7514,0,0,5acf4c11c6b23e52c011f5a018c2c2d90c756ec80883de77cf9634931bafa504,2017-05-09T12:40:05.697000
|
||||||
CVE-2016-7515,0,0,8335ec89d3b69556f658943cd45115cda1b3ad0170dcd5f33a693e91e75a647a,2017-05-09T12:40:02.777000
|
CVE-2016-7515,0,1,fb21f83cddf722a0fa141decdcb6439bb9471e713258d2e816160282eb06f528,2024-07-03T15:16:39.567000
|
||||||
CVE-2016-7516,0,0,dc00e35f4b14c9b3a5e2393e045f38f4ca3058fd0d88058f81bbd114e82f8fe3,2017-05-09T12:40:00.260000
|
CVE-2016-7516,0,1,16f3cb2e75aa3271d960b831f33e06b2ac04b1f800e594681cff4861326c988c,2024-07-03T15:23:36.440000
|
||||||
CVE-2016-7517,0,0,cae4a9021f8c6b24d69e74a964a23c761f46a0ef032301d0403500a83530e742,2017-05-09T12:39:56.680000
|
CVE-2016-7517,0,1,ba6d8f42f3bed4f3167468c0c8b26ac137e75f436e56310716e1ba6e03647184,2024-07-03T15:17:05.433000
|
||||||
CVE-2016-7518,0,0,e44c44e9af0ad7221c32d73bd55787a24594dab4bf5fbecb788c0722c9a82aa4,2017-05-09T12:39:53.323000
|
CVE-2016-7518,0,1,c57244a716e7ab0556596acc51d32b901d7b3eadab1f15f85c056c01ecd21d1e,2024-07-03T15:24:22.567000
|
||||||
CVE-2016-7519,0,0,48abfeaf70b2b93e677bd5ad1c54531c4b013a123c508cb1a2b4868cda9c8a96,2017-05-09T12:39:50.057000
|
CVE-2016-7519,0,1,70699c133d2441078f7f4d30b8096de84a4d22f60eff27facd14aa994b106686,2024-07-03T15:23:33.607000
|
||||||
CVE-2016-7520,0,0,8675f7f6001b6f933e8c681a7b1990fc67310de9ae93d72b0c1a893eb58f0c9d,2017-05-09T12:39:45.993000
|
CVE-2016-7520,0,1,d25b55ff825e16fbdb286b4905082bc39f3c8d5f89ce9016285e6765c9befc0f,2024-07-03T15:20:18.050000
|
||||||
CVE-2016-7521,0,0,e3f2b76578e137cff20a485b0cc75441b6730b1e7fb7796ad8f2f44062118381,2017-05-09T12:39:43.383000
|
CVE-2016-7521,0,1,ecff0a82b907397233ff4a3f7994ba7a05bc18e9489c91c2b2a4f04888f27e6c,2024-07-03T15:20:33.760000
|
||||||
CVE-2016-7522,0,0,c3c6c82172f5a1233846580b5edc56aec6ecaef9ab4a92ff578a44fb00223b73,2017-05-09T12:39:40.680000
|
CVE-2016-7522,0,1,0f2318969e17069bd3a2cc23db3cbfd02ac91fd63091a4da607379f4602f307b,2024-07-03T15:20:47.917000
|
||||||
CVE-2016-7523,0,0,50dca58580cd78b20739cdfbf227b34cc617e8e4568bfb3975aa098ff36b0718,2020-02-10T14:15:40.907000
|
CVE-2016-7523,0,1,81afb97facadafaf98e4cf71b37bec404c0305cb8747f4511dc526ae0104d0bd,2024-07-03T15:21:09.250000
|
||||||
CVE-2016-7524,0,0,6108f244a4ee1cc990698125f9da3fdd61b2b2255b7e4e07de38a624bb5f19e2,2020-02-10T14:15:18.203000
|
CVE-2016-7524,0,1,a5ccddebd6162757a051cd005775bf0135905bae1479300855e017885dda4f9d,2024-07-03T15:21:23.107000
|
||||||
CVE-2016-7525,0,0,0699ab481775613d23891b4f338e2d7cd11551c5326896711f3ed3d706cec560,2017-05-09T12:39:38.103000
|
CVE-2016-7525,0,1,6cfc8323236f9ba0441ab9f3c1aebca91e972e9feb03f0c011ac6f8c22863b1b,2024-07-03T15:21:41.860000
|
||||||
CVE-2016-7526,0,0,90da6ce2733cdbd7e7d4333b8952b53b9fed1f61d51f8634f16efcdfda70a1e7,2020-11-16T19:39:56.297000
|
CVE-2016-7526,0,1,ea8a140b9c9a22fb6f394bb3f5dc9c6786ec9edd7f940d729c09fd88b648b97e,2024-07-03T15:21:49.110000
|
||||||
CVE-2016-7527,0,0,c72655326862b8292653f51074d141ee78fba673e82c7f5679c057ee38b0806c,2020-11-16T19:37:51.120000
|
CVE-2016-7527,0,1,95861de21872f14f8012815df306132ca4c4ec0ee42221e09d57528c086234df,2024-07-03T15:22:01.010000
|
||||||
CVE-2016-7528,0,0,e6e8407aee98e532990eb5340b712ecb7e72972b42501e3a7757fe91c6ecab1b,2020-11-16T19:36:05.883000
|
CVE-2016-7528,0,1,c16129d2462881b38bc83868468c620340a98142b2c9d4ae0116ffa0131b6255,2024-07-03T15:22:10.600000
|
||||||
CVE-2016-7529,0,0,4d58b906ef227eb004895d75595dcbd4c0183a62beb2720c9de995ecda4f8357,2017-05-09T12:39:23.460000
|
CVE-2016-7529,0,1,815c7fdada9f9e2bc75a51b9f5d1bf734db049324d2d75ffe30ad23eea1b27df,2024-07-03T15:22:20.367000
|
||||||
CVE-2016-7530,0,0,d9bc05def810b9da8532adfc595a9a397dabe0925319a92e656af3f45715f13f,2017-05-09T12:39:19.320000
|
CVE-2016-7530,0,1,6492e65bbb8672ec847a4514447a6f39c1d56b13a2cf7c79ef9c970546f67022,2024-07-03T15:22:34.133000
|
||||||
CVE-2016-7531,0,0,f254a92940c7423fd73ff710e03b79d4d929be67d2537f3cb9bec6848a5ef628,2017-05-09T12:39:15.447000
|
CVE-2016-7531,0,0,f254a92940c7423fd73ff710e03b79d4d929be67d2537f3cb9bec6848a5ef628,2017-05-09T12:39:15.447000
|
||||||
CVE-2016-7532,0,0,809a94082802a4face8a9254ec7175501e10c205d92aa5b1330f0cee57b2adb7,2017-05-09T12:39:12.837000
|
CVE-2016-7532,0,0,809a94082802a4face8a9254ec7175501e10c205d92aa5b1330f0cee57b2adb7,2017-05-09T12:39:12.837000
|
||||||
CVE-2016-7533,0,0,f8529d644609cab03ecc261e74050dc40f1870a20a589550cbe46f28258c0799,2017-05-09T12:39:08.790000
|
CVE-2016-7533,0,1,0b5c1dbe1976d2fc2f4abf252703deacc66d9d8030522be17c5c1c20eb40fb1b,2024-07-03T15:23:17.167000
|
||||||
CVE-2016-7534,0,0,bceb0238cb8ce38db11107a89888e488bbdb754e0bd6a6d35f4addc83364c973,2017-05-09T12:39:03.697000
|
CVE-2016-7534,0,0,bceb0238cb8ce38db11107a89888e488bbdb754e0bd6a6d35f4addc83364c973,2017-05-09T12:39:03.697000
|
||||||
CVE-2016-7535,0,0,23fadd8cbcc8163a830df0d83144ba1cd318528b25b6b58138132d55347c5bbf,2017-05-09T12:38:58.727000
|
CVE-2016-7535,0,0,23fadd8cbcc8163a830df0d83144ba1cd318528b25b6b58138132d55347c5bbf,2017-05-09T12:38:58.727000
|
||||||
CVE-2016-7536,0,0,4b02a4d8372a703d7d8b994f35aa31e84f2c877453f888a1d7c73b17cadfb25c,2020-11-16T19:34:51.070000
|
CVE-2016-7536,0,0,4b02a4d8372a703d7d8b994f35aa31e84f2c877453f888a1d7c73b17cadfb25c,2020-11-16T19:34:51.070000
|
||||||
@ -95267,7 +95267,7 @@ CVE-2017-11309,0,0,0a1015ad413714840fd17bdb185f1070c94f45d2b31bf8df3eae1b31bfd6c
|
|||||||
CVE-2017-1131,0,0,6097510a934b58e996eedd162fa96e251a8c69f87fa9344db179b52fae37d20b,2017-06-27T01:29:00.780000
|
CVE-2017-1131,0,0,6097510a934b58e996eedd162fa96e251a8c69f87fa9344db179b52fae37d20b,2017-06-27T01:29:00.780000
|
||||||
CVE-2017-11310,0,0,56b936587222c5c48de0aa3a4968d9e7406c62f8c69628e2b7b86d8e6b29417e,2019-10-03T00:03:26.223000
|
CVE-2017-11310,0,0,56b936587222c5c48de0aa3a4968d9e7406c62f8c69628e2b7b86d8e6b29417e,2019-10-03T00:03:26.223000
|
||||||
CVE-2017-11311,0,0,90cdd67c89f76972e750afb94ff98b31a502d7f8df9bebdf7df8cf4fae2d7581,2017-07-27T01:30:09.713000
|
CVE-2017-11311,0,0,90cdd67c89f76972e750afb94ff98b31a502d7f8df9bebdf7df8cf4fae2d7581,2017-07-27T01:30:09.713000
|
||||||
CVE-2017-11317,0,1,1d5f5723a2ae116b3580708d22e34e67d9dac0c90c625c41cb5f3bd084416c9f,2024-07-03T13:16:48.240000
|
CVE-2017-11317,0,0,1d5f5723a2ae116b3580708d22e34e67d9dac0c90c625c41cb5f3bd084416c9f,2024-07-03T13:16:48.240000
|
||||||
CVE-2017-11318,0,0,873b3b942be64b72e00ede40092823f6d4f16af03d741a696bb1672693f3e88d,2017-08-07T18:48:45.740000
|
CVE-2017-11318,0,0,873b3b942be64b72e00ede40092823f6d4f16af03d741a696bb1672693f3e88d,2017-08-07T18:48:45.740000
|
||||||
CVE-2017-11319,0,0,f9e5ba563f877740060c1429e268873b1045d0570effb97efb4ddc73ac52fc09,2019-10-03T00:03:26.223000
|
CVE-2017-11319,0,0,f9e5ba563f877740060c1429e268873b1045d0570effb97efb4ddc73ac52fc09,2019-10-03T00:03:26.223000
|
||||||
CVE-2017-1132,0,0,3753fbeb602509c19bbf232f979c0cf13effaf9be4bd299eceae899413f255b3,2017-06-27T01:29:00.827000
|
CVE-2017-1132,0,0,3753fbeb602509c19bbf232f979c0cf13effaf9be4bd299eceae899413f255b3,2017-06-27T01:29:00.827000
|
||||||
@ -172757,7 +172757,7 @@ CVE-2021-27794,0,0,5902753dd3a47ac44d61ce05dcba1f7b330e85fa17e8176e91a0923c27e21
|
|||||||
CVE-2021-27795,0,0,f335211bb2ba6ce8ee545f6882567e515644e4901ba6200771713d168f749dec,2023-12-11T19:44:39.613000
|
CVE-2021-27795,0,0,f335211bb2ba6ce8ee545f6882567e515644e4901ba6200771713d168f749dec,2023-12-11T19:44:39.613000
|
||||||
CVE-2021-27796,0,0,980d4cf765b69ffde1fdfff98c2b85c39dc01b92a5e37275f92f055a12379a1c,2022-03-01T23:43:08.080000
|
CVE-2021-27796,0,0,980d4cf765b69ffde1fdfff98c2b85c39dc01b92a5e37275f92f055a12379a1c,2022-03-01T23:43:08.080000
|
||||||
CVE-2021-27797,0,0,0870ff126239a4e5f86bc10712ec007b6ec52054473b47d89b72aeadc12b0f5e,2022-03-01T16:09:03.430000
|
CVE-2021-27797,0,0,0870ff126239a4e5f86bc10712ec007b6ec52054473b47d89b72aeadc12b0f5e,2022-03-01T16:09:03.430000
|
||||||
CVE-2021-27798,0,0,530c4ae9b2b37aa0bc4adc42227a5bde18a9b92e23c523b1ff578d0c66b51f58,2024-05-17T01:55:38.763000
|
CVE-2021-27798,0,1,b5806bfc660dc90e93ffa902dcf25d7957e45c3e8c4a0ebb0757bd1ebb50e403,2024-07-03T15:15:05.193000
|
||||||
CVE-2021-27799,0,0,d0ee11302a63b3ea6271e540a0af8af46a88a1457074166c885a7131a2a9c36c,2021-03-10T16:59:06.673000
|
CVE-2021-27799,0,0,d0ee11302a63b3ea6271e540a0af8af46a88a1457074166c885a7131a2a9c36c,2021-03-10T16:59:06.673000
|
||||||
CVE-2021-27802,0,0,0981e3e97b8714a98f050af16eacca81b240a96d94957da281ba951efb0d6c99,2023-11-07T03:32:01.343000
|
CVE-2021-27802,0,0,0981e3e97b8714a98f050af16eacca81b240a96d94957da281ba951efb0d6c99,2023-11-07T03:32:01.343000
|
||||||
CVE-2021-27803,0,0,679f77f0866982accd53b086375067dd27d2b62dec0e43e395886545a3abeff6,2023-11-07T03:32:01.380000
|
CVE-2021-27803,0,0,679f77f0866982accd53b086375067dd27d2b62dec0e43e395886545a3abeff6,2023-11-07T03:32:01.380000
|
||||||
@ -172777,7 +172777,7 @@ CVE-2021-27845,0,0,27cb14f9d81d75cf37f66d513914098129e2c9d54a1efbef43b698e6ec3d2
|
|||||||
CVE-2021-27847,0,0,4cf1fd0379081a029d66fa26d168bd2c43e45765e7eeb80369436f7543702298,2023-09-29T11:18:03.783000
|
CVE-2021-27847,0,0,4cf1fd0379081a029d66fa26d168bd2c43e45765e7eeb80369436f7543702298,2023-09-29T11:18:03.783000
|
||||||
CVE-2021-27850,0,0,ae1e4d711acbf93339f3f5768281261f381eb85bce7c33e584fe39ab7469964d,2021-06-02T15:15:24.743000
|
CVE-2021-27850,0,0,ae1e4d711acbf93339f3f5768281261f381eb85bce7c33e584fe39ab7469964d,2021-06-02T15:15:24.743000
|
||||||
CVE-2021-27851,0,0,87df816154ae443a8ab20fda387988a009fd8b3e4ce9c62e18ca04a19430b28b,2022-07-29T16:34:08
|
CVE-2021-27851,0,0,87df816154ae443a8ab20fda387988a009fd8b3e4ce9c62e18ca04a19430b28b,2022-07-29T16:34:08
|
||||||
CVE-2021-27852,0,1,33f33266bcdb69cefe22f17c67f9d46cedbde0fc4e833493e35a294d1b256c5b,2024-07-03T13:32:45.603000
|
CVE-2021-27852,0,0,33f33266bcdb69cefe22f17c67f9d46cedbde0fc4e833493e35a294d1b256c5b,2024-07-03T13:32:45.603000
|
||||||
CVE-2021-27853,0,0,2190e5b9e70d6aaa8444bfefac172608cba6fdc4ca02e42f4588c939dcb8c904,2022-11-16T17:26:33.420000
|
CVE-2021-27853,0,0,2190e5b9e70d6aaa8444bfefac172608cba6fdc4ca02e42f4588c939dcb8c904,2022-11-16T17:26:33.420000
|
||||||
CVE-2021-27854,0,0,702202158f71ed2ac3bf9ea57dc1eb53096d0d64aa7b77c1a59fab044dce83bd,2022-10-12T13:15:10.407000
|
CVE-2021-27854,0,0,702202158f71ed2ac3bf9ea57dc1eb53096d0d64aa7b77c1a59fab044dce83bd,2022-10-12T13:15:10.407000
|
||||||
CVE-2021-27855,0,0,7bf2b99b844c425075ceabde2e33edefdaaaa742621b6194b09423c55d06494d,2022-10-29T02:58:34.047000
|
CVE-2021-27855,0,0,7bf2b99b844c425075ceabde2e33edefdaaaa742621b6194b09423c55d06494d,2022-10-29T02:58:34.047000
|
||||||
@ -183602,7 +183602,7 @@ CVE-2021-42274,0,0,5fe086d50763566c992a71f303150c7a3fb31e0e7ea54b731945b48adbc10
|
|||||||
CVE-2021-42275,0,0,68fbee182e3e5e235f5dab48ff67db5861054648192ae667fd45691d6c2d8855,2023-12-28T16:15:54.560000
|
CVE-2021-42275,0,0,68fbee182e3e5e235f5dab48ff67db5861054648192ae667fd45691d6c2d8855,2023-12-28T16:15:54.560000
|
||||||
CVE-2021-42276,0,0,cba257dd2610587252c0b30a0f6c17e6ce094ed26ee7ef7c888da2ef3a9547bf,2023-12-28T16:15:54.763000
|
CVE-2021-42276,0,0,cba257dd2610587252c0b30a0f6c17e6ce094ed26ee7ef7c888da2ef3a9547bf,2023-12-28T16:15:54.763000
|
||||||
CVE-2021-42277,0,0,c99f72b4dfb97cbc34be38c0b68b72470eda5fc36135ae6e129bc3d819ee89ed,2023-12-28T16:15:54.970000
|
CVE-2021-42277,0,0,c99f72b4dfb97cbc34be38c0b68b72470eda5fc36135ae6e129bc3d819ee89ed,2023-12-28T16:15:54.970000
|
||||||
CVE-2021-42278,0,1,400aabdcb7a86831676301656391b3db63df5600fca04fbfea6b1b9bf48fa79d,2024-07-03T13:33:20.297000
|
CVE-2021-42278,0,0,400aabdcb7a86831676301656391b3db63df5600fca04fbfea6b1b9bf48fa79d,2024-07-03T13:33:20.297000
|
||||||
CVE-2021-42279,0,0,632d8f89c71a38d5480b12f205614381121bf4159617260406a55e81fe114c94,2023-12-28T16:15:55.363000
|
CVE-2021-42279,0,0,632d8f89c71a38d5480b12f205614381121bf4159617260406a55e81fe114c94,2023-12-28T16:15:55.363000
|
||||||
CVE-2021-4228,0,0,93e491af6c6b2b147521fd6dd3f3bc75f943340ce2fe2bd78fcdd33793a3aaad,2023-02-03T13:52:26.017000
|
CVE-2021-4228,0,0,93e491af6c6b2b147521fd6dd3f3bc75f943340ce2fe2bd78fcdd33793a3aaad,2023-02-03T13:52:26.017000
|
||||||
CVE-2021-42280,0,0,d341f543ea9165319ef5363ed48f3eba6dc753f5b125f982e963d9d421c38191,2023-12-28T16:15:55.567000
|
CVE-2021-42280,0,0,d341f543ea9165319ef5363ed48f3eba6dc753f5b125f982e963d9d421c38191,2023-12-28T16:15:55.567000
|
||||||
@ -193521,7 +193521,7 @@ CVE-2022-24517,0,0,e79c91bcb3b68c52828825c5ff897cb06a35a224accc6eaadc9f204413d37
|
|||||||
CVE-2022-24518,0,0,5538572c537b65ea02a0df690f4981398b2f38dd3d6737fb0dc62b48d9d87042,2023-08-08T14:22:24.967000
|
CVE-2022-24518,0,0,5538572c537b65ea02a0df690f4981398b2f38dd3d6737fb0dc62b48d9d87042,2023-08-08T14:22:24.967000
|
||||||
CVE-2022-24519,0,0,1acf09adea2addc45cd1f8a1bba6e14d1a8e6a450aad26061db4b802473be0a8,2023-08-08T14:22:24.967000
|
CVE-2022-24519,0,0,1acf09adea2addc45cd1f8a1bba6e14d1a8e6a450aad26061db4b802473be0a8,2023-08-08T14:22:24.967000
|
||||||
CVE-2022-24520,0,0,23e43fae09c725a7acbd1fbdee71bd0cdd417371a852bdfb65928bb05a74d42c,2023-06-29T02:15:15.267000
|
CVE-2022-24520,0,0,23e43fae09c725a7acbd1fbdee71bd0cdd417371a852bdfb65928bb05a74d42c,2023-06-29T02:15:15.267000
|
||||||
CVE-2022-24521,0,1,bc2765fccfa743e69828de99f5d1abb88227f4af23f1dbc4b53662f5aefc84de,2024-07-03T13:16:06.577000
|
CVE-2022-24521,0,0,bc2765fccfa743e69828de99f5d1abb88227f4af23f1dbc4b53662f5aefc84de,2024-07-03T13:16:06.577000
|
||||||
CVE-2022-24522,0,0,8e4c1c707fb0dbb6e272e25b8ce9d9115f051bb7037004f4c39d824c952297df,2023-08-08T14:22:24.967000
|
CVE-2022-24522,0,0,8e4c1c707fb0dbb6e272e25b8ce9d9115f051bb7037004f4c39d824c952297df,2023-08-08T14:22:24.967000
|
||||||
CVE-2022-24523,0,0,faca6eb1725f9e2af1f2a19aaad5b494587d75e16caac5f32dd9f7b87170c477,2023-06-29T01:15:29.707000
|
CVE-2022-24523,0,0,faca6eb1725f9e2af1f2a19aaad5b494587d75e16caac5f32dd9f7b87170c477,2023-06-29T01:15:29.707000
|
||||||
CVE-2022-24525,0,0,32a11adb8270a4ea8950c8b2227729e32f8fafc96e46255f0fca9cbabfa0de9b,2023-06-29T02:15:15.457000
|
CVE-2022-24525,0,0,32a11adb8270a4ea8950c8b2227729e32f8fafc96e46255f0fca9cbabfa0de9b,2023-06-29T02:15:15.457000
|
||||||
@ -194354,10 +194354,10 @@ CVE-2022-25464,0,0,231fd3080576b3684ae82435ee901df2499bdd2b12996f22985cb04f4c481
|
|||||||
CVE-2022-25465,0,0,83ff884fffb03f7448bef58e02010e947d986d6c2e472bc0f3add87f72a5660c,2022-03-11T15:55:36.710000
|
CVE-2022-25465,0,0,83ff884fffb03f7448bef58e02010e947d986d6c2e472bc0f3add87f72a5660c,2022-03-11T15:55:36.710000
|
||||||
CVE-2022-2547,0,0,73d14d5654e374eff01adccf9a7a8251705f6da64d59cea565fd779629f3f010,2022-08-19T01:43:28.157000
|
CVE-2022-2547,0,0,73d14d5654e374eff01adccf9a7a8251705f6da64d59cea565fd779629f3f010,2022-08-19T01:43:28.157000
|
||||||
CVE-2022-25471,0,0,3a109f099cb1061a853e5b50f13b9d0fc3efb3654456f758cc15cdf5ad1cc75d,2022-03-09T19:47:15.070000
|
CVE-2022-25471,0,0,3a109f099cb1061a853e5b50f13b9d0fc3efb3654456f758cc15cdf5ad1cc75d,2022-03-09T19:47:15.070000
|
||||||
CVE-2022-25477,0,1,f5947fa43ee6d57d57151bf27eb934c1e8cf30d33379a811dcf9110928cf0bda,2024-07-03T12:53:24.977000
|
CVE-2022-25477,0,0,f5947fa43ee6d57d57151bf27eb934c1e8cf30d33379a811dcf9110928cf0bda,2024-07-03T12:53:24.977000
|
||||||
CVE-2022-25478,0,1,7bd7f3ad2cf598c72e979cf04e2bae20dac87654e7334e4884eb68cfa1874609,2024-07-03T12:53:24.977000
|
CVE-2022-25478,0,0,7bd7f3ad2cf598c72e979cf04e2bae20dac87654e7334e4884eb68cfa1874609,2024-07-03T12:53:24.977000
|
||||||
CVE-2022-25479,0,1,8e8380855069d84dabbdaf641b904e87a9f4117a0d0d49c8aa1a1a1137a9bb4d,2024-07-03T12:53:24.977000
|
CVE-2022-25479,0,0,8e8380855069d84dabbdaf641b904e87a9f4117a0d0d49c8aa1a1a1137a9bb4d,2024-07-03T12:53:24.977000
|
||||||
CVE-2022-25480,0,1,39886115f70f1d1b40972742fcf44e4e22fe5f53707cddad00cae2c888e60577,2024-07-03T12:53:24.977000
|
CVE-2022-25480,0,0,39886115f70f1d1b40972742fcf44e4e22fe5f53707cddad00cae2c888e60577,2024-07-03T12:53:24.977000
|
||||||
CVE-2022-25481,0,0,d8914892ae94539e6b18fbcd727395bf982994a1a334a92092d2f4e3819a8123,2024-07-03T01:38:19.293000
|
CVE-2022-25481,0,0,d8914892ae94539e6b18fbcd727395bf982994a1a334a92092d2f4e3819a8123,2024-07-03T01:38:19.293000
|
||||||
CVE-2022-25484,0,0,99a222d35a5c2f1b2db0f90a8390321c73db93867e67f18b2c213513a13e5439,2022-03-28T20:53:05.180000
|
CVE-2022-25484,0,0,99a222d35a5c2f1b2db0f90a8390321c73db93867e67f18b2c213513a13e5439,2022-03-28T20:53:05.180000
|
||||||
CVE-2022-25485,0,0,f943c508b3e38959fea36ca9f014627ff6eee45f93d348f17a276f89be77fc1e,2022-03-23T18:18:46.160000
|
CVE-2022-25485,0,0,f943c508b3e38959fea36ca9f014627ff6eee45f93d348f17a276f89be77fc1e,2022-03-23T18:18:46.160000
|
||||||
@ -198507,7 +198507,7 @@ CVE-2022-30632,0,0,f214153a7d78a1f18ea22ef856e8035d77e066ffe05cf4d3cd2d155a8fe2b
|
|||||||
CVE-2022-30633,0,0,b54ca08085af5e8cef18a74cec122d184dc8b4373d642fc24f7ba9cd5e61484d,2023-11-07T03:47:16.833000
|
CVE-2022-30633,0,0,b54ca08085af5e8cef18a74cec122d184dc8b4373d642fc24f7ba9cd5e61484d,2023-11-07T03:47:16.833000
|
||||||
CVE-2022-30634,0,0,6756594dd3720ca90dbd7390befd3951adf8b8ddf821e4fa717ae67733da7843,2023-11-07T03:47:16.960000
|
CVE-2022-30634,0,0,6756594dd3720ca90dbd7390befd3951adf8b8ddf821e4fa717ae67733da7843,2023-11-07T03:47:16.960000
|
||||||
CVE-2022-30635,0,0,05b714781f3ac4496fa9fd2fec8e57abb3bdf107549dd52f7a6ca2248a8a28fe,2023-11-07T03:47:17.070000
|
CVE-2022-30635,0,0,05b714781f3ac4496fa9fd2fec8e57abb3bdf107549dd52f7a6ca2248a8a28fe,2023-11-07T03:47:17.070000
|
||||||
CVE-2022-30636,0,1,950a2fe1c5b00dbda0db499d214490d40e5deb1e821994dd67e179a2f1d77889,2024-07-03T12:53:24.977000
|
CVE-2022-30636,0,0,950a2fe1c5b00dbda0db499d214490d40e5deb1e821994dd67e179a2f1d77889,2024-07-03T12:53:24.977000
|
||||||
CVE-2022-30637,0,0,59aa98121a73381f879297e9c17146b4bb1b6e52c9c1e7f3e0a2be631b87e64a,2023-09-09T03:42:43.520000
|
CVE-2022-30637,0,0,59aa98121a73381f879297e9c17146b4bb1b6e52c9c1e7f3e0a2be631b87e64a,2023-09-09T03:42:43.520000
|
||||||
CVE-2022-30638,0,0,d268c0135ae5f7942a9397265321619b85cbe35450007798147fa4b1fe86d34d,2023-09-09T03:42:36.757000
|
CVE-2022-30638,0,0,d268c0135ae5f7942a9397265321619b85cbe35450007798147fa4b1fe86d34d,2023-09-09T03:42:36.757000
|
||||||
CVE-2022-30639,0,0,63e210ad5e4743756ed81cab634881e23db9b06e79d4bdff1a84f2aca5e5afc2,2023-09-09T03:42:18.143000
|
CVE-2022-30639,0,0,63e210ad5e4743756ed81cab634881e23db9b06e79d4bdff1a84f2aca5e5afc2,2023-09-09T03:42:18.143000
|
||||||
@ -199167,7 +199167,7 @@ CVE-2022-31357,0,0,0117d3bd77cde592c54614f7b9b3ba07e3620b33e1ed372ed0aa3d61842da
|
|||||||
CVE-2022-31358,0,0,99e295cf2650192fb9061fc7fb33a864e05c69c246c6175b92e491b13dffdb4b,2023-11-07T03:47:37.213000
|
CVE-2022-31358,0,0,99e295cf2650192fb9061fc7fb33a864e05c69c246c6175b92e491b13dffdb4b,2023-11-07T03:47:37.213000
|
||||||
CVE-2022-3136,0,0,348faa475dc105d9dc7ca0b6825af678dd4a6880325fcaad1f62607b87f27634,2022-10-12T16:42:29.870000
|
CVE-2022-3136,0,0,348faa475dc105d9dc7ca0b6825af678dd4a6880325fcaad1f62607b87f27634,2022-10-12T16:42:29.870000
|
||||||
CVE-2022-31361,0,0,7c7a13a509ccc79dce98e213c13410afb594204a49db8971d4b7261121c52936,2024-05-17T02:09:31.713000
|
CVE-2022-31361,0,0,7c7a13a509ccc79dce98e213c13410afb594204a49db8971d4b7261121c52936,2024-05-17T02:09:31.713000
|
||||||
CVE-2022-31362,0,0,c1da100c9bc04ee11e70dd090864de98b2758f14b734d9419060088dbd0cd2cb,2024-05-17T02:09:31.817000
|
CVE-2022-31362,0,1,ce3fa4bd27c48417b8e9f66ae424852288eeffe718d961d070c2335e776696f6,2024-07-03T14:15:04.330000
|
||||||
CVE-2022-31363,0,0,2cdc9f5e6bce1c868cd6a6cc903c192623e0a62d2cb3e21d517c37c48e27d60d,2023-02-09T20:44:48.020000
|
CVE-2022-31363,0,0,2cdc9f5e6bce1c868cd6a6cc903c192623e0a62d2cb3e21d517c37c48e27d60d,2023-02-09T20:44:48.020000
|
||||||
CVE-2022-31364,0,0,16c44bc65c1ef1e94a01ddd40700a46a03bbda2d51fb3d63a950d1bba09e434c,2023-02-09T20:50:44.917000
|
CVE-2022-31364,0,0,16c44bc65c1ef1e94a01ddd40700a46a03bbda2d51fb3d63a950d1bba09e434c,2023-02-09T20:50:44.917000
|
||||||
CVE-2022-31366,0,0,67f42e566e099c711c555187131c25df8d6f9a820fd3a367aef31e2c71645659,2022-10-21T16:18:59.077000
|
CVE-2022-31366,0,0,67f42e566e099c711c555187131c25df8d6f9a820fd3a367aef31e2c71645659,2022-10-21T16:18:59.077000
|
||||||
@ -206054,7 +206054,7 @@ CVE-2022-40293,0,0,c609d733a24235de62748fe66d7225f5f2be4a1b7d6ebfda78738adee232d
|
|||||||
CVE-2022-40294,0,0,ff48ea8004771e1ad176e146f4141a6bf1f6af63ded7d0439b11976237a989c7,2023-10-25T18:17:16.443000
|
CVE-2022-40294,0,0,ff48ea8004771e1ad176e146f4141a6bf1f6af63ded7d0439b11976237a989c7,2023-10-25T18:17:16.443000
|
||||||
CVE-2022-40295,0,0,417ec344689cf18cbe6163ad761fda8fbef5dbddd7bb733ed5d647c1fc9bc1ff,2023-10-25T18:17:16.503000
|
CVE-2022-40295,0,0,417ec344689cf18cbe6163ad761fda8fbef5dbddd7bb733ed5d647c1fc9bc1ff,2023-10-25T18:17:16.503000
|
||||||
CVE-2022-40296,0,0,78154ab5bcd8116e5b7f62a9e5e2fcfc3da41d5ec60b414a2189a3fe32758d33,2023-10-25T18:17:16.567000
|
CVE-2022-40296,0,0,78154ab5bcd8116e5b7f62a9e5e2fcfc3da41d5ec60b414a2189a3fe32758d33,2023-10-25T18:17:16.567000
|
||||||
CVE-2022-40297,0,0,43a551162cb7e0b0dee481c87c9b0cbc1426beef0c59b47d89fd0295b3b288b0,2024-05-17T02:13:18.643000
|
CVE-2022-40297,0,1,d23b1493b99457a642376f24446356d15b5924fb33aca414b8962424b633c31e,2024-07-03T15:15:05.423000
|
||||||
CVE-2022-40298,0,0,9d356f1450e16dd5ebda560da24d68d82018f96f198840edce14165bb2a990d5,2023-08-08T14:21:49.707000
|
CVE-2022-40298,0,0,9d356f1450e16dd5ebda560da24d68d82018f96f198840edce14165bb2a990d5,2023-08-08T14:21:49.707000
|
||||||
CVE-2022-40299,0,0,36f3dfca3faf782369516a7311b05a02ea5b584f3c6b04e15d95bc7724ba6eb1,2023-08-08T14:22:24.967000
|
CVE-2022-40299,0,0,36f3dfca3faf782369516a7311b05a02ea5b584f3c6b04e15d95bc7724ba6eb1,2023-08-08T14:22:24.967000
|
||||||
CVE-2022-4030,0,0,7a8aeb590d9751df9668da3c2f397b6e07abe04112fccee4a2e1be5dd56e675e,2023-11-07T03:56:45.093000
|
CVE-2022-4030,0,0,7a8aeb590d9751df9668da3c2f397b6e07abe04112fccee4a2e1be5dd56e675e,2023-11-07T03:56:45.093000
|
||||||
@ -217972,7 +217972,7 @@ CVE-2023-24528,0,0,899533432d6d75cedea57fd4563bb59a08ab30d04e09c55b0e4759297d9a5
|
|||||||
CVE-2023-24529,0,0,d5ec6c7946d019b7d7e407212b00e6ee585f0c40c199c1d7212c76e02ba691c9,2023-04-11T22:15:08.633000
|
CVE-2023-24529,0,0,d5ec6c7946d019b7d7e407212b00e6ee585f0c40c199c1d7212c76e02ba691c9,2023-04-11T22:15:08.633000
|
||||||
CVE-2023-2453,0,0,35571d748e261a04ce5c1ada40f40e506192da5c60ca32152a9fefe31414f468,2023-09-08T17:27:41.190000
|
CVE-2023-2453,0,0,35571d748e261a04ce5c1ada40f40e506192da5c60ca32152a9fefe31414f468,2023-09-08T17:27:41.190000
|
||||||
CVE-2023-24530,0,0,819456e45a97d34c0861fc0ddba145d10cfdb134d103842d97b3038412001184,2023-04-11T22:15:08.690000
|
CVE-2023-24530,0,0,819456e45a97d34c0861fc0ddba145d10cfdb134d103842d97b3038412001184,2023-04-11T22:15:08.690000
|
||||||
CVE-2023-24531,0,1,179bb04436befa20e8424debc4490783b95c6da99d26ce06668e99f09890aa04,2024-07-03T12:53:24.977000
|
CVE-2023-24531,0,0,179bb04436befa20e8424debc4490783b95c6da99d26ce06668e99f09890aa04,2024-07-03T12:53:24.977000
|
||||||
CVE-2023-24532,0,0,933a884c817efe4414cd72b8f640229cca761b1f2eba3a0e93cdae834fbffd9a,2023-11-07T04:08:30.867000
|
CVE-2023-24532,0,0,933a884c817efe4414cd72b8f640229cca761b1f2eba3a0e93cdae834fbffd9a,2023-11-07T04:08:30.867000
|
||||||
CVE-2023-24533,0,0,d66d114c302bdadf5cd961e00ee83c5556439c2ddedc40b37fc6e0dbe36b75d9,2023-11-07T04:08:31.050000
|
CVE-2023-24533,0,0,d66d114c302bdadf5cd961e00ee83c5556439c2ddedc40b37fc6e0dbe36b75d9,2023-11-07T04:08:31.050000
|
||||||
CVE-2023-24534,0,0,32da01c00ffd6bfd831b88c5dab9cd458b775383e6192afc2c330a9197e1873e,2023-11-25T11:15:14.030000
|
CVE-2023-24534,0,0,32da01c00ffd6bfd831b88c5dab9cd458b775383e6192afc2c330a9197e1873e,2023-11-25T11:15:14.030000
|
||||||
@ -241889,7 +241889,7 @@ CVE-2024-1423,0,0,6e27005a2bc9cac940b744a08e145c97df4169105a5c6ac980f63cd4cfdbe7
|
|||||||
CVE-2024-1424,0,0,e4ad8b68f1fbe246b31a884aab471f453604ee73fa66399cab9d94287d5c1f39,2024-04-10T13:24:00.070000
|
CVE-2024-1424,0,0,e4ad8b68f1fbe246b31a884aab471f453604ee73fa66399cab9d94287d5c1f39,2024-04-10T13:24:00.070000
|
||||||
CVE-2024-1425,0,0,02a330ca28e70c5f4fd75a53f6a884cfaa02f29dea0e5d02e5dff002ed045e32,2024-02-29T13:49:29.390000
|
CVE-2024-1425,0,0,02a330ca28e70c5f4fd75a53f6a884cfaa02f29dea0e5d02e5dff002ed045e32,2024-02-29T13:49:29.390000
|
||||||
CVE-2024-1426,0,0,b20e0201854f673684d69c4a30e03c882940d605ff386eb76a0bcedb20be1b61,2024-04-18T13:04:28.900000
|
CVE-2024-1426,0,0,b20e0201854f673684d69c4a30e03c882940d605ff386eb76a0bcedb20be1b61,2024-04-18T13:04:28.900000
|
||||||
CVE-2024-1427,0,0,63dddd2d42d3e35c84d49f8aaa22caa244648752e9da148e60af21d3fce7beb2,2024-07-02T12:09:16.907000
|
CVE-2024-1427,0,1,192e94c8c1db3f7bb99c2eb13227bbd24cc5d98969af5836b6320be2953a05b7,2024-07-03T15:44:40.083000
|
||||||
CVE-2024-1428,0,0,4c77834f86d069dd8ac6582c1158d4ce9778d9d2d0db6d53457b9fcb3238fd50,2024-04-08T18:48:40.217000
|
CVE-2024-1428,0,0,4c77834f86d069dd8ac6582c1158d4ce9778d9d2d0db6d53457b9fcb3238fd50,2024-04-08T18:48:40.217000
|
||||||
CVE-2024-1429,0,0,ab6402cd6da16458b964af8d77be31dfc0567f7c2e61e8846287eab7a4f0dc54,2024-04-18T13:04:28.900000
|
CVE-2024-1429,0,0,ab6402cd6da16458b964af8d77be31dfc0567f7c2e61e8846287eab7a4f0dc54,2024-04-18T13:04:28.900000
|
||||||
CVE-2024-1430,0,0,eba723d82d624f4abb9107b4882898514197c1baa9de876205b497551b76bb7f,2024-05-17T02:35:26.640000
|
CVE-2024-1430,0,0,eba723d82d624f4abb9107b4882898514197c1baa9de876205b497551b76bb7f,2024-05-17T02:35:26.640000
|
||||||
@ -242336,7 +242336,7 @@ CVE-2024-1927,0,0,31be343b20122f13e26ef76f7f4fe10a59226978014536249707ce2d72de81
|
|||||||
CVE-2024-1928,0,0,b3421eda40eadd8f94f725465ed49c06463a4553cfbc0b59715a025d1f01d712,2024-05-17T02:35:42.223000
|
CVE-2024-1928,0,0,b3421eda40eadd8f94f725465ed49c06463a4553cfbc0b59715a025d1f01d712,2024-05-17T02:35:42.223000
|
||||||
CVE-2024-1929,0,0,3332c348abe2ec55e440f6248fed1a4ed270158e5658f7c88b1e6bb963ccdab9,2024-05-08T13:15:00.690000
|
CVE-2024-1929,0,0,3332c348abe2ec55e440f6248fed1a4ed270158e5658f7c88b1e6bb963ccdab9,2024-05-08T13:15:00.690000
|
||||||
CVE-2024-1930,0,0,fdb59fca49fb5e54ea59db9c9eb6e43f53d3770fb02303c610334b8657eb9ae1,2024-05-08T13:15:00.690000
|
CVE-2024-1930,0,0,fdb59fca49fb5e54ea59db9c9eb6e43f53d3770fb02303c610334b8657eb9ae1,2024-05-08T13:15:00.690000
|
||||||
CVE-2024-1931,0,0,e71f7a88f68b5d3702fc1141e5fbdcf00d33a90e3791bbd349a9e1c6ddf3f008,2024-04-28T04:15:11
|
CVE-2024-1931,0,1,74525c1ab84bdef9a56fce2ad1f66433b6d371babf800064dbee863c8b3d6ae8,2024-07-03T15:15:05.560000
|
||||||
CVE-2024-1932,0,0,dfd6617a73caabfbfba2b5ee899213931b787c71ad6a77e11bae9543ad134a99,2024-02-28T14:06:45.783000
|
CVE-2024-1932,0,0,dfd6617a73caabfbfba2b5ee899213931b787c71ad6a77e11bae9543ad134a99,2024-02-28T14:06:45.783000
|
||||||
CVE-2024-1933,0,0,22dab3b8ed3dbdec751e3b3ea3557732635c7de83916428fa2e460c959fedb1c,2024-03-26T17:09:53.043000
|
CVE-2024-1933,0,0,22dab3b8ed3dbdec751e3b3ea3557732635c7de83916428fa2e460c959fedb1c,2024-03-26T17:09:53.043000
|
||||||
CVE-2024-1934,0,0,baca09a1b552c022c94ad7f29c48bc581577a9c65fef6c6ea2b90bc1a8cad40e,2024-04-10T13:23:38.787000
|
CVE-2024-1934,0,0,baca09a1b552c022c94ad7f29c48bc581577a9c65fef6c6ea2b90bc1a8cad40e,2024-04-10T13:23:38.787000
|
||||||
@ -242603,8 +242603,8 @@ CVE-2024-2039,0,0,4f1e5a8a814f51edc0234cc5670da2107cc2a93a2ef1eadc628898e3eec44b
|
|||||||
CVE-2024-20391,0,0,f91eada0700f8cd9f2eaea2b871ba7d3969d87e51919a0eb478edbaaab6f3a9d,2024-05-15T18:35:11.453000
|
CVE-2024-20391,0,0,f91eada0700f8cd9f2eaea2b871ba7d3969d87e51919a0eb478edbaaab6f3a9d,2024-05-15T18:35:11.453000
|
||||||
CVE-2024-20392,0,0,ace66ba4c79c3f433832bd6cfa0988701f79a2b5d6c0fbe5016f71bba33a0a9b,2024-05-15T18:35:11.453000
|
CVE-2024-20392,0,0,ace66ba4c79c3f433832bd6cfa0988701f79a2b5d6c0fbe5016f71bba33a0a9b,2024-05-15T18:35:11.453000
|
||||||
CVE-2024-20394,0,0,d0e5fc3a79dfeb923dc3f02320ce7649899cba8340301b836f168cfe3139baa9,2024-05-15T18:35:11.453000
|
CVE-2024-20394,0,0,d0e5fc3a79dfeb923dc3f02320ce7649899cba8340301b836f168cfe3139baa9,2024-05-15T18:35:11.453000
|
||||||
CVE-2024-20399,0,1,40162d3d58c44619359063d12b3450c60237a60b95e0ce2c02a9d7dd539d8ffd,2024-07-03T12:42:39.597000
|
CVE-2024-20399,0,0,40162d3d58c44619359063d12b3450c60237a60b95e0ce2c02a9d7dd539d8ffd,2024-07-03T12:42:39.597000
|
||||||
CVE-2024-2040,0,1,4eb156f2f336b9896eaa73d7b780fac89b9f39a2cf5be2d12faa4b9a10061303,2024-07-03T12:53:24.977000
|
CVE-2024-2040,0,0,4eb156f2f336b9896eaa73d7b780fac89b9f39a2cf5be2d12faa4b9a10061303,2024-07-03T12:53:24.977000
|
||||||
CVE-2024-20404,0,0,679bbd668c3128b9d2c298395d952eaf5fd76470dbc9bd0e765678566e0d175f,2024-06-13T20:25:46.837000
|
CVE-2024-20404,0,0,679bbd668c3128b9d2c298395d952eaf5fd76470dbc9bd0e765678566e0d175f,2024-06-13T20:25:46.837000
|
||||||
CVE-2024-20405,0,0,e5acdd821474e29805e089211fec2d1d30a76e0d4d4635efbeb215040858791b,2024-06-18T18:04:04.497000
|
CVE-2024-20405,0,0,e5acdd821474e29805e089211fec2d1d30a76e0d4d4635efbeb215040858791b,2024-06-18T18:04:04.497000
|
||||||
CVE-2024-2041,0,0,f285d116ebee20fb02fc2c7de4f69fe8567e76fe9eda446fb7969801431b3d7d,2024-05-06T14:15:07.747000
|
CVE-2024-2041,0,0,f285d116ebee20fb02fc2c7de4f69fe8567e76fe9eda446fb7969801431b3d7d,2024-05-06T14:15:07.747000
|
||||||
@ -243861,7 +243861,7 @@ CVE-2024-22306,0,0,5427f196cd2fc064fa3cdf34238c9c0432fe7231acc9557add0074b844121
|
|||||||
CVE-2024-22307,0,0,612500eeac06983bafbc014843c236d8c463241187c2baf6a06b160bc5b163de,2024-02-06T15:52:58.037000
|
CVE-2024-22307,0,0,612500eeac06983bafbc014843c236d8c463241187c2baf6a06b160bc5b163de,2024-02-06T15:52:58.037000
|
||||||
CVE-2024-22308,0,0,f72408efdea3f3f2120dbeafd0b38992093a473ba2aa0a2b4bc8ffb90cf9e200,2024-01-30T17:45:59.927000
|
CVE-2024-22308,0,0,f72408efdea3f3f2120dbeafd0b38992093a473ba2aa0a2b4bc8ffb90cf9e200,2024-01-30T17:45:59.927000
|
||||||
CVE-2024-22309,0,0,1093afc20ffe4dba6071bc2d2a5c666f7d5a7f27092b0aa5704b12fac569bad5,2024-01-30T22:18:55.947000
|
CVE-2024-22309,0,0,1093afc20ffe4dba6071bc2d2a5c666f7d5a7f27092b0aa5704b12fac569bad5,2024-01-30T22:18:55.947000
|
||||||
CVE-2024-2231,0,1,c96321cf6ad3d9918686b86829ec340b1580d2567aeee874dbee65cd54c7e011,2024-07-03T12:53:24.977000
|
CVE-2024-2231,0,0,c96321cf6ad3d9918686b86829ec340b1580d2567aeee874dbee65cd54c7e011,2024-07-03T12:53:24.977000
|
||||||
CVE-2024-22310,0,0,97f58d74bad578babbc5c2fb902488ef3a20e73ec8d238c07475dac86db860dd,2024-02-06T16:08:42.910000
|
CVE-2024-22310,0,0,97f58d74bad578babbc5c2fb902488ef3a20e73ec8d238c07475dac86db860dd,2024-02-06T16:08:42.910000
|
||||||
CVE-2024-22311,0,0,1b2896f06b8d2a60f5f4320525fd0e0a2ff9a9add83fae0db40bd38deadccd39,2024-03-27T12:29:30.307000
|
CVE-2024-22311,0,0,1b2896f06b8d2a60f5f4320525fd0e0a2ff9a9add83fae0db40bd38deadccd39,2024-03-27T12:29:30.307000
|
||||||
CVE-2024-22312,0,0,502cad1c70aca19be54f1a146a057702eb2ad6518581e46eff801281d9dde1eb,2024-02-15T04:38:23.153000
|
CVE-2024-22312,0,0,502cad1c70aca19be54f1a146a057702eb2ad6518581e46eff801281d9dde1eb,2024-02-15T04:38:23.153000
|
||||||
@ -243873,7 +243873,7 @@ CVE-2024-22320,0,0,b7e6bc5c871bb2a076b1c4d217e351ebb443d568b1fdbb86f9513f16f0da1
|
|||||||
CVE-2024-22326,0,0,611aa89f02e2c1b3e79c0d2da37798e3e77fccc4ee223e6b80d6313dd22973d4,2024-06-07T14:56:05.647000
|
CVE-2024-22326,0,0,611aa89f02e2c1b3e79c0d2da37798e3e77fccc4ee223e6b80d6313dd22973d4,2024-06-07T14:56:05.647000
|
||||||
CVE-2024-22328,0,0,1d3eba54d3dcb9850fbd9a86e1475d83621830be3d74777232b85acf89e88234,2024-04-08T18:48:40.217000
|
CVE-2024-22328,0,0,1d3eba54d3dcb9850fbd9a86e1475d83621830be3d74777232b85acf89e88234,2024-04-08T18:48:40.217000
|
||||||
CVE-2024-22329,0,0,6b484ef8d82a649c0162bc9be85600528b13c1a759ed8ec79e69e3b10b67e2d3,2024-04-17T12:48:07.510000
|
CVE-2024-22329,0,0,6b484ef8d82a649c0162bc9be85600528b13c1a759ed8ec79e69e3b10b67e2d3,2024-04-17T12:48:07.510000
|
||||||
CVE-2024-2233,0,1,3f560edb3aa2a0572e5aea14b67e8e85b9187be1302884edd007ad6b24cb2b39,2024-07-03T12:53:24.977000
|
CVE-2024-2233,0,0,3f560edb3aa2a0572e5aea14b67e8e85b9187be1302884edd007ad6b24cb2b39,2024-07-03T12:53:24.977000
|
||||||
CVE-2024-22331,0,0,79325856c8baa9082651d9383783f7a4198ba299d30e2c67010ba88c7f1776a4,2024-02-13T20:26:23.780000
|
CVE-2024-22331,0,0,79325856c8baa9082651d9383783f7a4198ba299d30e2c67010ba88c7f1776a4,2024-02-13T20:26:23.780000
|
||||||
CVE-2024-22332,0,0,a27f7ab666232b70f986037d449131d6bde483413718019674022f07be0d9b9e,2024-04-03T02:15:07.973000
|
CVE-2024-22332,0,0,a27f7ab666232b70f986037d449131d6bde483413718019674022f07be0d9b9e,2024-04-03T02:15:07.973000
|
||||||
CVE-2024-22333,0,0,dc6ffe95ff5a7403a67c60cf469ac371d4effee2bd0a4db051204dcf972f9e7e,2024-06-13T18:35:19.777000
|
CVE-2024-22333,0,0,dc6ffe95ff5a7403a67c60cf469ac371d4effee2bd0a4db051204dcf972f9e7e,2024-06-13T18:35:19.777000
|
||||||
@ -243883,12 +243883,12 @@ CVE-2024-22336,0,0,92b17f3ddf77b7c8a53a41f903603d0d36207de06fae8bd71fc2469777bc3
|
|||||||
CVE-2024-22337,0,0,9a674fac9bc4716d61a028d3be9473027552f3c1c11335efca4b4ddefd1e14f0,2024-02-20T19:50:53.960000
|
CVE-2024-22337,0,0,9a674fac9bc4716d61a028d3be9473027552f3c1c11335efca4b4ddefd1e14f0,2024-02-20T19:50:53.960000
|
||||||
CVE-2024-22338,0,0,6e079f32e725c30ab50d30a352b744d0c760c6659785a2e99ec5f98e6f27b645,2024-05-31T13:01:46.727000
|
CVE-2024-22338,0,0,6e079f32e725c30ab50d30a352b744d0c760c6659785a2e99ec5f98e6f27b645,2024-05-31T13:01:46.727000
|
||||||
CVE-2024-22339,0,0,7da5694b93905b7c6d93ed93108dac6dab6202238259984860ef1d6e1bec9ec9,2024-04-15T13:15:31.997000
|
CVE-2024-22339,0,0,7da5694b93905b7c6d93ed93108dac6dab6202238259984860ef1d6e1bec9ec9,2024-04-15T13:15:31.997000
|
||||||
CVE-2024-2234,0,1,678c50cf7e63b0e2ecb3786b9b3e9c1466245abe875c1d626a9365b6ae9b7ae9,2024-07-03T12:53:24.977000
|
CVE-2024-2234,0,0,678c50cf7e63b0e2ecb3786b9b3e9c1466245abe875c1d626a9365b6ae9b7ae9,2024-07-03T12:53:24.977000
|
||||||
CVE-2024-22343,0,0,98c7840ac2eb50dcfa88f4141a657f976aab7d39f92de1ccb97b49719a76ede0,2024-05-14T16:13:02.773000
|
CVE-2024-22343,0,0,98c7840ac2eb50dcfa88f4141a657f976aab7d39f92de1ccb97b49719a76ede0,2024-05-14T16:13:02.773000
|
||||||
CVE-2024-22344,0,0,dd931266b7e962044b40a6567c41617f6ff2ceb50100fcd1ed62bcdaadd651ee,2024-05-14T16:13:02.773000
|
CVE-2024-22344,0,0,dd931266b7e962044b40a6567c41617f6ff2ceb50100fcd1ed62bcdaadd651ee,2024-05-14T16:13:02.773000
|
||||||
CVE-2024-22345,0,0,a53b92e2f5ec18ca2cba51b0a304f5cdd6926e00d82cbe49f8f763399c2a3daf,2024-05-14T16:13:02.773000
|
CVE-2024-22345,0,0,a53b92e2f5ec18ca2cba51b0a304f5cdd6926e00d82cbe49f8f763399c2a3daf,2024-05-14T16:13:02.773000
|
||||||
CVE-2024-22346,0,0,638ee4e9687c7c28032b432c317662713c057110b08b4b27024e81eb8453bf9e,2024-03-19T16:50:10.570000
|
CVE-2024-22346,0,0,638ee4e9687c7c28032b432c317662713c057110b08b4b27024e81eb8453bf9e,2024-03-19T16:50:10.570000
|
||||||
CVE-2024-2235,0,1,aca307fcff1fcb062b670545536481e4b283817f6d6be40c8af90057bf71f503,2024-07-03T12:53:24.977000
|
CVE-2024-2235,0,0,aca307fcff1fcb062b670545536481e4b283817f6d6be40c8af90057bf71f503,2024-07-03T12:53:24.977000
|
||||||
CVE-2024-22352,0,0,8ad74f9c108b142191e10d9f1af5800c7055fc5b8e79f7a9a2cf40171c06b8cd,2024-04-01T15:23:54.530000
|
CVE-2024-22352,0,0,8ad74f9c108b142191e10d9f1af5800c7055fc5b8e79f7a9a2cf40171c06b8cd,2024-04-01T15:23:54.530000
|
||||||
CVE-2024-22353,0,0,ad692a077e5b804e1764ffb4f197bc72c54e38388ae47b5f805ac59827db6799,2024-05-16T00:15:08.057000
|
CVE-2024-22353,0,0,ad692a077e5b804e1764ffb4f197bc72c54e38388ae47b5f805ac59827db6799,2024-05-16T00:15:08.057000
|
||||||
CVE-2024-22354,0,0,68792703b2560a4c3917a12fc2257c1fa0af627e17204b8c7ed6a62e6c56f559,2024-05-21T19:15:09.413000
|
CVE-2024-22354,0,0,68792703b2560a4c3917a12fc2257c1fa0af627e17204b8c7ed6a62e6c56f559,2024-05-21T19:15:09.413000
|
||||||
@ -244715,7 +244715,7 @@ CVE-2024-23745,0,0,0997a46b1366c968f7b9f767523f67b6c77ab399053d9f0736951af88cf15
|
|||||||
CVE-2024-23746,0,0,4231b3151cad9797b59bfa65c9d1a0aba18262be508b41df48aa646e6b64ee48,2024-03-21T02:52:08.563000
|
CVE-2024-23746,0,0,4231b3151cad9797b59bfa65c9d1a0aba18262be508b41df48aa646e6b64ee48,2024-03-21T02:52:08.563000
|
||||||
CVE-2024-23747,0,0,e5badc646080ce0998e1e81852fb21e000c7398188715a4f0ce89130386d9ea5,2024-02-02T02:03:39.093000
|
CVE-2024-23747,0,0,e5badc646080ce0998e1e81852fb21e000c7398188715a4f0ce89130386d9ea5,2024-02-02T02:03:39.093000
|
||||||
CVE-2024-23749,0,0,e489f7636c813784a61d3812299289346709b8bf63acb59822c186709b469431,2024-02-14T13:59:39.353000
|
CVE-2024-23749,0,0,e489f7636c813784a61d3812299289346709b8bf63acb59822c186709b469431,2024-02-14T13:59:39.353000
|
||||||
CVE-2024-2375,0,1,c3de96d78afc3bc6ffc67daacece32aaeeb0bdb870ad0b2df79a86e04f8b2ec1,2024-07-03T12:53:24.977000
|
CVE-2024-2375,0,0,c3de96d78afc3bc6ffc67daacece32aaeeb0bdb870ad0b2df79a86e04f8b2ec1,2024-07-03T12:53:24.977000
|
||||||
CVE-2024-23750,0,0,8e012c8bf46e4d6b122cd9676a67ed8063eceaae10c8b41283586e2acd25aff1,2024-01-29T16:51:14.573000
|
CVE-2024-23750,0,0,8e012c8bf46e4d6b122cd9676a67ed8063eceaae10c8b41283586e2acd25aff1,2024-01-29T16:51:14.573000
|
||||||
CVE-2024-23751,0,0,f4277632a799f5e0167c42d856d852fb64898f90e4d81aec065a43806c32cb6a,2024-01-29T15:06:44.003000
|
CVE-2024-23751,0,0,f4277632a799f5e0167c42d856d852fb64898f90e4d81aec065a43806c32cb6a,2024-01-29T15:06:44.003000
|
||||||
CVE-2024-23752,0,0,18d704b9462928669577bd2ecf8e771bfdc29bdedea9912638fd3f521668a073,2024-01-29T19:27:17.040000
|
CVE-2024-23752,0,0,18d704b9462928669577bd2ecf8e771bfdc29bdedea9912638fd3f521668a073,2024-01-29T19:27:17.040000
|
||||||
@ -244723,7 +244723,7 @@ CVE-2024-23755,0,0,20f404ef06f0de4002ad00bfcb3ecba797133c7898cd26c253955293bcb6e
|
|||||||
CVE-2024-23756,0,0,ad98c26cac3e251d6e147a06061ab8f37933ff482c3e1fc10e9847ddd0a56975,2024-02-15T16:01:08.870000
|
CVE-2024-23756,0,0,ad98c26cac3e251d6e147a06061ab8f37933ff482c3e1fc10e9847ddd0a56975,2024-02-15T16:01:08.870000
|
||||||
CVE-2024-23758,0,0,0b90af0eb87a8b48149c5b2c24a267ebd8f5a25fb833966d160033fff9e77828,2024-02-22T19:07:37.840000
|
CVE-2024-23758,0,0,0b90af0eb87a8b48149c5b2c24a267ebd8f5a25fb833966d160033fff9e77828,2024-02-22T19:07:37.840000
|
||||||
CVE-2024-23759,0,0,73fe4ef6829a19943e815065d62e01eb8bcfa2b42e847a75f95d5c33c8cd1503,2024-02-15T04:49:02.133000
|
CVE-2024-23759,0,0,73fe4ef6829a19943e815065d62e01eb8bcfa2b42e847a75f95d5c33c8cd1503,2024-02-15T04:49:02.133000
|
||||||
CVE-2024-2376,0,1,a82d5e4ce1caa6e63dc9804b1f9d96ffb899caa17adf18ce75e0dea64bcecd21,2024-07-03T12:53:24.977000
|
CVE-2024-2376,0,0,a82d5e4ce1caa6e63dc9804b1f9d96ffb899caa17adf18ce75e0dea64bcecd21,2024-07-03T12:53:24.977000
|
||||||
CVE-2024-23760,0,0,bb86044c0a5dcc35ef326482cd22c362ff5c354c2c47549b45272f40e914b5cf,2024-02-15T04:49:31.847000
|
CVE-2024-23760,0,0,bb86044c0a5dcc35ef326482cd22c362ff5c354c2c47549b45272f40e914b5cf,2024-02-15T04:49:31.847000
|
||||||
CVE-2024-23761,0,0,91423f3fc0ae4a6c135e3093d5ba2f92b18f0705b43e8497a65147830ffb84f4,2024-02-15T04:49:36.837000
|
CVE-2024-23761,0,0,91423f3fc0ae4a6c135e3093d5ba2f92b18f0705b43e8497a65147830ffb84f4,2024-02-15T04:49:36.837000
|
||||||
CVE-2024-23762,0,0,1fc25d58731097f8aad4c8f7676cdc9a123654581fd6c8477b826714cd9e330b,2024-02-15T04:49:42.123000
|
CVE-2024-23762,0,0,1fc25d58731097f8aad4c8f7676cdc9a123654581fd6c8477b826714cd9e330b,2024-02-15T04:49:42.123000
|
||||||
@ -245273,7 +245273,7 @@ CVE-2024-24788,0,0,ec3a0e2bb85b04f6091132ce0b358d8c88079508c68a38db8ec47a1c1ba68
|
|||||||
CVE-2024-24789,0,0,fd6a5b95d991b0dab3309c11b164e4c1e60de61b7d4a99fed36d8b88b927fd59,2024-07-03T01:48:25.510000
|
CVE-2024-24789,0,0,fd6a5b95d991b0dab3309c11b164e4c1e60de61b7d4a99fed36d8b88b927fd59,2024-07-03T01:48:25.510000
|
||||||
CVE-2024-2479,0,0,62ab2572f43d54e062a6ec9f07869b63a0bdfad1924b8c09404f39717bdfbd77,2024-05-17T02:38:14.640000
|
CVE-2024-2479,0,0,62ab2572f43d54e062a6ec9f07869b63a0bdfad1924b8c09404f39717bdfbd77,2024-05-17T02:38:14.640000
|
||||||
CVE-2024-24790,0,0,eea6958e81d73afbece6bae935d256b81d43a28af6bfcc689fa474522b0325d6,2024-06-18T17:59:12.547000
|
CVE-2024-24790,0,0,eea6958e81d73afbece6bae935d256b81d43a28af6bfcc689fa474522b0325d6,2024-06-18T17:59:12.547000
|
||||||
CVE-2024-24791,0,1,d6750c1bff921be3db20c9661706ae6a1028345b03fca5380ec164ecc9b52e93,2024-07-03T12:53:24.977000
|
CVE-2024-24791,0,0,d6750c1bff921be3db20c9661706ae6a1028345b03fca5380ec164ecc9b52e93,2024-07-03T12:53:24.977000
|
||||||
CVE-2024-24792,0,0,856277335b0a65941c91908e89bfe8db9fa7dd817204d99e1f16a0e92b8015e5,2024-06-27T19:25:12.067000
|
CVE-2024-24792,0,0,856277335b0a65941c91908e89bfe8db9fa7dd817204d99e1f16a0e92b8015e5,2024-06-27T19:25:12.067000
|
||||||
CVE-2024-24793,0,0,c02d48f5d574325816298b4b1d2848ca92f5dc7aa67a2fd30978e3885630bc1b,2024-02-20T19:50:53.960000
|
CVE-2024-24793,0,0,c02d48f5d574325816298b4b1d2848ca92f5dc7aa67a2fd30978e3885630bc1b,2024-02-20T19:50:53.960000
|
||||||
CVE-2024-24794,0,0,0d491c54da3b197a1321ac69102f9de79d058e3462ee7572209ea583555d837a,2024-02-20T19:50:53.960000
|
CVE-2024-24794,0,0,0d491c54da3b197a1321ac69102f9de79d058e3462ee7572209ea583555d837a,2024-02-20T19:50:53.960000
|
||||||
@ -247536,12 +247536,12 @@ CVE-2024-27850,0,0,e1d4379d6b3d34c01ebe4dd5e7858f8de64aeb5953240c61d195d17d1f48e
|
|||||||
CVE-2024-27851,0,0,20416253b2599df26c3b322a6efc6a4efc655856220ad817be23d3b30dc68157,2024-07-03T01:51:13.350000
|
CVE-2024-27851,0,0,20416253b2599df26c3b322a6efc6a4efc655856220ad817be23d3b30dc68157,2024-07-03T01:51:13.350000
|
||||||
CVE-2024-27852,0,0,2264a1594190812a9b29fc0e3f886882ab3c63c917f94e71ed2dc96c8e6c2c94,2024-06-10T18:15:29.900000
|
CVE-2024-27852,0,0,2264a1594190812a9b29fc0e3f886882ab3c63c917f94e71ed2dc96c8e6c2c94,2024-06-10T18:15:29.900000
|
||||||
CVE-2024-27855,0,0,7a41b8238436a46025b45552c8cda3356564589cbbf3b4bae7d5eb20d8672a8c,2024-06-11T13:54:12.057000
|
CVE-2024-27855,0,0,7a41b8238436a46025b45552c8cda3356564589cbbf3b4bae7d5eb20d8672a8c,2024-06-11T13:54:12.057000
|
||||||
CVE-2024-27857,0,0,c656440d8235ebe336c8f0cb6c0dbbed059f704b9d7b7858d9d6b284ae7c3693,2024-07-03T01:51:14.753000
|
CVE-2024-27857,0,1,b12d57be271aa438e5d4c668c7f18ead13afc3b08569565d9c95a215938e9ba2,2024-07-03T15:43:17.007000
|
||||||
CVE-2024-2786,0,0,dcf647d15f4b220698a959a93f7a5cdfd4a7ecd495ee9aa1ef69052001df8b00,2024-04-10T13:23:38.787000
|
CVE-2024-2786,0,0,dcf647d15f4b220698a959a93f7a5cdfd4a7ecd495ee9aa1ef69052001df8b00,2024-04-10T13:23:38.787000
|
||||||
CVE-2024-27867,0,0,929b60a50faac760812cfff090aaa2b01b31cf8cfca2ab2ec6bdf5a9e5f514fb,2024-06-26T12:44:29.693000
|
CVE-2024-27867,0,0,929b60a50faac760812cfff090aaa2b01b31cf8cfca2ab2ec6bdf5a9e5f514fb,2024-06-26T12:44:29.693000
|
||||||
CVE-2024-2787,0,0,496195d9f69f32f0c6a6baaf1ee3e4e62db7dfd0c17c88d9010b922be319ee45,2024-04-10T13:23:38.787000
|
CVE-2024-2787,0,0,496195d9f69f32f0c6a6baaf1ee3e4e62db7dfd0c17c88d9010b922be319ee45,2024-04-10T13:23:38.787000
|
||||||
CVE-2024-2788,0,0,088d65d193232fcb72b866e8c41bac364578345792bee984e7ddfd9f7a9953b9,2024-04-10T13:23:38.787000
|
CVE-2024-2788,0,0,088d65d193232fcb72b866e8c41bac364578345792bee984e7ddfd9f7a9953b9,2024-04-10T13:23:38.787000
|
||||||
CVE-2024-27885,0,0,c59de475c576c44e129a9e58b8769caffc1b189d40a0172434b38c39f1ec2eb6,2024-06-11T13:54:12.057000
|
CVE-2024-27885,0,1,e3765a253be02afcb43d4bff90a02eb9cc8683032aa7319a1325bda028b43ed5,2024-07-03T15:44:29.397000
|
||||||
CVE-2024-27889,0,0,fafa75eb559da0736cbe5f975005d2c6007c4614a71da5e60cbad40c6f594a2b,2024-03-05T13:41:01.900000
|
CVE-2024-27889,0,0,fafa75eb559da0736cbe5f975005d2c6007c4614a71da5e60cbad40c6f594a2b,2024-03-05T13:41:01.900000
|
||||||
CVE-2024-2789,0,0,c1532315076419efcbf6da1ca657d2b247ea6915b4f0b97827f3803af3830f0d,2024-04-10T13:23:38.787000
|
CVE-2024-2789,0,0,c1532315076419efcbf6da1ca657d2b247ea6915b4f0b97827f3803af3830f0d,2024-04-10T13:23:38.787000
|
||||||
CVE-2024-27894,0,0,b3f2bb1a7a3eca33b6d3782ab00745453be745ced11b5b6cc9ac93cd4156f4f3,2024-05-01T17:15:30.557000
|
CVE-2024-27894,0,0,b3f2bb1a7a3eca33b6d3782ab00745453be745ced11b5b6cc9ac93cd4156f4f3,2024-05-01T17:15:30.557000
|
||||||
@ -250653,7 +250653,7 @@ CVE-2024-32664,0,0,718b297c1c7558858a3c6f09924665172ffd7ff066b9e99da8e046f6aca66
|
|||||||
CVE-2024-32669,0,0,120909758c684acb7a51e36d8f01a68b3f4d03ded247287f26cab48d9139b029,2024-05-14T16:12:23.490000
|
CVE-2024-32669,0,0,120909758c684acb7a51e36d8f01a68b3f4d03ded247287f26cab48d9139b029,2024-05-14T16:12:23.490000
|
||||||
CVE-2024-3267,0,0,00a210ede7a73ca33b64d3b8a0e382509d5bafa34ae84022125b180763aee2bd,2024-04-10T13:23:38.787000
|
CVE-2024-3267,0,0,00a210ede7a73ca33b64d3b8a0e382509d5bafa34ae84022125b180763aee2bd,2024-04-10T13:23:38.787000
|
||||||
CVE-2024-32672,0,0,ee6c48c3e0e38e8c391ea6261e7813807f206a60f2ac1e86a9d8d6aba39ed1b6,2024-05-14T16:12:23.490000
|
CVE-2024-32672,0,0,ee6c48c3e0e38e8c391ea6261e7813807f206a60f2ac1e86a9d8d6aba39ed1b6,2024-05-14T16:12:23.490000
|
||||||
CVE-2024-32673,0,1,c9f67d54777fc1d6a602ef9ed03e4f5b3605cc09e4b1087225be42a1b82669fa,2024-07-03T12:53:24.977000
|
CVE-2024-32673,0,0,c9f67d54777fc1d6a602ef9ed03e4f5b3605cc09e4b1087225be42a1b82669fa,2024-07-03T12:53:24.977000
|
||||||
CVE-2024-32674,0,0,8e274e9762e7b32d105911c76fa84ee156bae08969022295a61c40a0ca8ab4bf,2024-07-03T01:56:55.253000
|
CVE-2024-32674,0,0,8e274e9762e7b32d105911c76fa84ee156bae08969022295a61c40a0ca8ab4bf,2024-07-03T01:56:55.253000
|
||||||
CVE-2024-32675,0,0,87b463967c2204618d7e556d0f9b434f519dfbe770ec74ef985201062de7ccc7,2024-04-24T17:16:50.397000
|
CVE-2024-32675,0,0,87b463967c2204618d7e556d0f9b434f519dfbe770ec74ef985201062de7ccc7,2024-04-24T17:16:50.397000
|
||||||
CVE-2024-32676,0,0,c48bb61830c9720695f0f8b0e8d63e64e27e7902456d765223bd42b42ebc2759,2024-05-17T09:15:38.620000
|
CVE-2024-32676,0,0,c48bb61830c9720695f0f8b0e8d63e64e27e7902456d765223bd42b42ebc2759,2024-05-17T09:15:38.620000
|
||||||
@ -250890,6 +250890,7 @@ CVE-2024-3293,0,0,3552485a27a6b6c8b2cadd17fbdb3e630238722099a3e2d8d97b0f239cd2dc
|
|||||||
CVE-2024-32930,0,0,fb1d198b0a6f1c4a99609fcd492e188ff0ceff2fe76051eb0cb8c91155418b98,2024-07-03T01:57:20.283000
|
CVE-2024-32930,0,0,fb1d198b0a6f1c4a99609fcd492e188ff0ceff2fe76051eb0cb8c91155418b98,2024-07-03T01:57:20.283000
|
||||||
CVE-2024-32932,0,0,379c0ae6cc2f94f410885ca7cc028fe0bf4b04f9e7e3efc2f3c97b4b40e1ac9c,2024-07-02T17:44:45.700000
|
CVE-2024-32932,0,0,379c0ae6cc2f94f410885ca7cc028fe0bf4b04f9e7e3efc2f3c97b4b40e1ac9c,2024-07-02T17:44:45.700000
|
||||||
CVE-2024-32936,0,0,a98023d22d8fe34ca67d2e41b0f1a0096283ac909ae52ca8a63dcd8b920ad836,2024-06-24T19:26:47.037000
|
CVE-2024-32936,0,0,a98023d22d8fe34ca67d2e41b0f1a0096283ac909ae52ca8a63dcd8b920ad836,2024-06-24T19:26:47.037000
|
||||||
|
CVE-2024-32937,1,1,78a388a1ecaf925d74c3df02d2c7aa0b4c157156f6027d67bc22546b8a4aa00c,2024-07-03T15:15:05.803000
|
||||||
CVE-2024-32943,0,0,681ae4b7d296514b2b529abffaf20ed5b5c5e8eb8fff0f6f2bae62e656ffc6eb,2024-06-21T11:22:01.687000
|
CVE-2024-32943,0,0,681ae4b7d296514b2b529abffaf20ed5b5c5e8eb8fff0f6f2bae62e656ffc6eb,2024-06-21T11:22:01.687000
|
||||||
CVE-2024-32944,0,0,357727703d6a86b0d608eb9af0488af030fe8a85e9a27818f7be4cd525bf7172,2024-05-28T12:39:28.377000
|
CVE-2024-32944,0,0,357727703d6a86b0d608eb9af0488af030fe8a85e9a27818f7be4cd525bf7172,2024-05-28T12:39:28.377000
|
||||||
CVE-2024-32947,0,0,35287e8f28304ee9599f9712f94ac6e419772e1d66820555100faf85f8aeebf3,2024-04-24T17:16:50.397000
|
CVE-2024-32947,0,0,35287e8f28304ee9599f9712f94ac6e419772e1d66820555100faf85f8aeebf3,2024-04-24T17:16:50.397000
|
||||||
@ -251868,7 +251869,7 @@ CVE-2024-34691,0,0,827395ff4b0bf99f2642a5cd3134d1fe0effa60012a62490a349f26f4db25
|
|||||||
CVE-2024-34693,0,0,6da431cb088539cdedaef048562e52acae68c24a7fe449888c5724e281a42b04,2024-06-20T12:43:25.663000
|
CVE-2024-34693,0,0,6da431cb088539cdedaef048562e52acae68c24a7fe449888c5724e281a42b04,2024-06-20T12:43:25.663000
|
||||||
CVE-2024-34694,0,0,c52b0ddd7913e7b99d778e62e2419069bd9d8eb90d9108e75c7e8088bb5608e8,2024-06-17T12:42:04.623000
|
CVE-2024-34694,0,0,c52b0ddd7913e7b99d778e62e2419069bd9d8eb90d9108e75c7e8088bb5608e8,2024-06-17T12:42:04.623000
|
||||||
CVE-2024-34695,0,0,d5ed5d99c8f0d08b73ea3cb249327295e787f14594542dd2f27279ab9312830c,2024-05-14T16:12:23.490000
|
CVE-2024-34695,0,0,d5ed5d99c8f0d08b73ea3cb249327295e787f14594542dd2f27279ab9312830c,2024-05-14T16:12:23.490000
|
||||||
CVE-2024-34696,0,0,1697446274bb3cd395c26226b01c7397470c20a75a90bbad0605ce462858be0c,2024-07-01T16:37:39.040000
|
CVE-2024-34696,0,1,fc37f1f871594e87cfe2d19d9897a201f28cf21e82debe0acdfd6232ba7f8f65,2024-07-03T14:42:49.743000
|
||||||
CVE-2024-34697,0,0,95295a45851b4a50f600527e364638272a5d24a08a1ec02edb19abea712755b2,2024-05-14T16:12:23.490000
|
CVE-2024-34697,0,0,95295a45851b4a50f600527e364638272a5d24a08a1ec02edb19abea712755b2,2024-05-14T16:12:23.490000
|
||||||
CVE-2024-34698,0,0,10e59d69dc4df1155204551f8483405755bab4be109bdea52b3a75e369d53b1b,2024-05-14T16:12:23.490000
|
CVE-2024-34698,0,0,10e59d69dc4df1155204551f8483405755bab4be109bdea52b3a75e369d53b1b,2024-05-14T16:12:23.490000
|
||||||
CVE-2024-34699,0,0,25f405235bcdebbbdbdc15ae858e3622caf3e07dac211b82cab5ea59f42ec719,2024-05-14T16:12:23.490000
|
CVE-2024-34699,0,0,25f405235bcdebbbdbdc15ae858e3622caf3e07dac211b82cab5ea59f42ec719,2024-05-14T16:12:23.490000
|
||||||
@ -252912,7 +252913,7 @@ CVE-2024-36246,0,0,50338f85842e71924c1397e2b0a309f647146226696bf59a5411ba0e6e468
|
|||||||
CVE-2024-3625,0,0,bb7fa72c43d725aef9f66641f31c3359a614ed8ba414acf9f05b8e44148cef81,2024-04-26T12:58:17.720000
|
CVE-2024-3625,0,0,bb7fa72c43d725aef9f66641f31c3359a614ed8ba414acf9f05b8e44148cef81,2024-04-26T12:58:17.720000
|
||||||
CVE-2024-36252,0,0,4edf18ae557d8c3498076af1a69a7b853e545554a27b9b0b40bcb780d22c50d6,2024-07-03T02:02:59.060000
|
CVE-2024-36252,0,0,4edf18ae557d8c3498076af1a69a7b853e545554a27b9b0b40bcb780d22c50d6,2024-07-03T02:02:59.060000
|
||||||
CVE-2024-36255,0,0,22b21684452ad4563618ad5cee66dc719af723b04c8a1647fe9cf6d970347f9a,2024-05-28T12:39:28.377000
|
CVE-2024-36255,0,0,22b21684452ad4563618ad5cee66dc719af723b04c8a1647fe9cf6d970347f9a,2024-05-28T12:39:28.377000
|
||||||
CVE-2024-36257,0,1,9dbf9f66bb71e56c15b7e6d1dac9a861cf932c1cba4dbcbe34f8663012d6624b,2024-07-03T12:53:24.977000
|
CVE-2024-36257,0,0,9dbf9f66bb71e56c15b7e6d1dac9a861cf932c1cba4dbcbe34f8663012d6624b,2024-07-03T12:53:24.977000
|
||||||
CVE-2024-3626,0,0,668faec6d18ac8a7c33197af94901aaf7ddac1dec4c77c1d646fba224d5f8541,2024-05-24T01:15:30.977000
|
CVE-2024-3626,0,0,668faec6d18ac8a7c33197af94901aaf7ddac1dec4c77c1d646fba224d5f8541,2024-05-24T01:15:30.977000
|
||||||
CVE-2024-36260,0,0,268f67cf195b2e7e5437e7777158f76d317b4cf206300592ea57a0575c8548af,2024-07-02T12:09:16.907000
|
CVE-2024-36260,0,0,268f67cf195b2e7e5437e7777158f76d317b4cf206300592ea57a0575c8548af,2024-07-02T12:09:16.907000
|
||||||
CVE-2024-36263,0,0,8fc77ae12c809e003508687bca8ef69500efdb9e489f26efe8ffb68dd267fd3b,2024-06-13T18:36:09.010000
|
CVE-2024-36263,0,0,8fc77ae12c809e003508687bca8ef69500efdb9e489f26efe8ffb68dd267fd3b,2024-06-13T18:36:09.010000
|
||||||
@ -252980,7 +252981,7 @@ CVE-2024-36397,0,0,b682d6f470c0dada217073740a5ad29ca1b1f9032f70f4edd7bab7bdfb1f6
|
|||||||
CVE-2024-36399,0,0,32a084399fffaab7b007a4925030bc8dfc9c8bbd3d7f25f567b275cd72694397,2024-06-07T14:56:05.647000
|
CVE-2024-36399,0,0,32a084399fffaab7b007a4925030bc8dfc9c8bbd3d7f25f567b275cd72694397,2024-06-07T14:56:05.647000
|
||||||
CVE-2024-3640,0,0,abbf5a33cbca708fe19710dda7a796491ae1d1614e9cd03f43d6cddef8b09500,2024-05-17T18:36:31.297000
|
CVE-2024-3640,0,0,abbf5a33cbca708fe19710dda7a796491ae1d1614e9cd03f43d6cddef8b09500,2024-05-17T18:36:31.297000
|
||||||
CVE-2024-36400,0,0,6b10ab1f058055da0b7f6513936a46e66d6922b94171c5e956b85881f675cf7c,2024-06-10T19:39:21.660000
|
CVE-2024-36400,0,0,6b10ab1f058055da0b7f6513936a46e66d6922b94171c5e956b85881f675cf7c,2024-06-10T19:39:21.660000
|
||||||
CVE-2024-36401,0,0,87e986c6abcb99589eb18d897c1eae35aa261f64a143786484b486b18d465a85,2024-07-01T16:37:39.040000
|
CVE-2024-36401,0,1,4e7824d6e0ba409db0bd3352043278eb790179388b8d748fbe3f7bbd11d705c2,2024-07-03T15:07:42.777000
|
||||||
CVE-2024-36404,0,0,bc349d6b7c657155d15e1c421e7bc9ad56ba3fcfaca14ccdbb458b8f57d45518,2024-07-02T17:44:45.700000
|
CVE-2024-36404,0,0,bc349d6b7c657155d15e1c421e7bc9ad56ba3fcfaca14ccdbb458b8f57d45518,2024-07-02T17:44:45.700000
|
||||||
CVE-2024-36405,0,0,342cb049567ebebbbb5ec2f471f348f7e69a152097c662b875d4729bb76af752,2024-06-10T18:06:22.600000
|
CVE-2024-36405,0,0,342cb049567ebebbbb5ec2f471f348f7e69a152097c662b875d4729bb76af752,2024-06-10T18:06:22.600000
|
||||||
CVE-2024-36406,0,0,4c4f64b7223e45baf0f4fcf71db77f8f804dae22bb20bd965ed8f0d422b0ddc0,2024-06-10T18:06:22.600000
|
CVE-2024-36406,0,0,4c4f64b7223e45baf0f4fcf71db77f8f804dae22bb20bd965ed8f0d422b0ddc0,2024-06-10T18:06:22.600000
|
||||||
@ -252999,9 +253000,9 @@ CVE-2024-36417,0,0,7f72be2da88bd03f2618a97d909b76dab66b1196af11257e6aa2fac632513
|
|||||||
CVE-2024-36418,0,0,52272dc570f5081df6975298e5712cf123b760ef720bb4951287c4366378282e,2024-06-11T13:54:12.057000
|
CVE-2024-36418,0,0,52272dc570f5081df6975298e5712cf123b760ef720bb4951287c4366378282e,2024-06-11T13:54:12.057000
|
||||||
CVE-2024-36419,0,0,e561cf6fec966fa1d9dbaeadf6c1b7f0c1186aebf1fa6c9a3ce263fb312ad74d,2024-06-11T13:54:12.057000
|
CVE-2024-36419,0,0,e561cf6fec966fa1d9dbaeadf6c1b7f0c1186aebf1fa6c9a3ce263fb312ad74d,2024-06-11T13:54:12.057000
|
||||||
CVE-2024-3642,0,0,bbed1ee941355da6f32a6eba37e95a843dd7913c7dd227d8da7f65dcb683674b,2024-05-16T13:03:05.353000
|
CVE-2024-3642,0,0,bbed1ee941355da6f32a6eba37e95a843dd7913c7dd227d8da7f65dcb683674b,2024-05-16T13:03:05.353000
|
||||||
CVE-2024-36420,0,0,e58b727e60b33d8076352d7d95342e64e8bdeb9a8c852f7906107955156df602,2024-07-01T16:37:39.040000
|
CVE-2024-36420,0,1,f88ca1da3f418238df7aa68f8868409c11480e63fa5a419dd8cae87369fdc260,2024-07-03T15:29:45.557000
|
||||||
CVE-2024-36421,0,0,2db1f42564f0eaf58b885bc52aa44daebec6dc523b1d77558c17c8fa19b2495f,2024-07-01T16:37:39.040000
|
CVE-2024-36421,0,1,6377f154589fbee582a888cb89fe433db93fc2d1b9f4ba90a9e9d6ff1a5422db,2024-07-03T15:36:31.170000
|
||||||
CVE-2024-36422,0,0,8982caabe6eb3eda8c34b1bc1a267af26cb5987e2c96eeefaf11d8ef2ed30e14,2024-07-01T16:37:39.040000
|
CVE-2024-36422,0,1,1c8e85fff4389539f30938d98dea0041c583b614c5e1956a8be795decf84cdf1,2024-07-03T15:38:24.297000
|
||||||
CVE-2024-36423,0,0,7993080f22032ce73ea739ef8e8e51e988ab7f86f630514176f775aada6bbe21,2024-07-02T12:09:16.907000
|
CVE-2024-36423,0,0,7993080f22032ce73ea739ef8e8e51e988ab7f86f630514176f775aada6bbe21,2024-07-02T12:09:16.907000
|
||||||
CVE-2024-36426,0,0,081cbabfe1f165d2e60c6bf5434c4cea5a1c1465246b1d9713d429b0a41c1ba0,2024-07-03T02:03:11.237000
|
CVE-2024-36426,0,0,081cbabfe1f165d2e60c6bf5434c4cea5a1c1465246b1d9713d429b0a41c1ba0,2024-07-03T02:03:11.237000
|
||||||
CVE-2024-36427,0,0,10c5dade9c11af5e52239a7a8c18438909a8ea6a201617061be6b7626f49e18c,2024-07-03T02:03:12.033000
|
CVE-2024-36427,0,0,10c5dade9c11af5e52239a7a8c18438909a8ea6a201617061be6b7626f49e18c,2024-07-03T02:03:12.033000
|
||||||
@ -253336,7 +253337,7 @@ CVE-2024-37079,0,0,9bbd76d5444005ceb39d0ac68b0b4e335d82d5da3fc1107a95914993fa985
|
|||||||
CVE-2024-3708,0,0,09132fb1644ebf0c808002aa8ac15b19f13ae71d0beb378f7a9664a5ae685f9a,2024-05-24T01:15:30.977000
|
CVE-2024-3708,0,0,09132fb1644ebf0c808002aa8ac15b19f13ae71d0beb378f7a9664a5ae685f9a,2024-05-24T01:15:30.977000
|
||||||
CVE-2024-37080,0,0,c953e426661198e9665c742ef09fb44af751efb40a1f491b02b9f5389b1d3d21,2024-06-20T12:44:01.637000
|
CVE-2024-37080,0,0,c953e426661198e9665c742ef09fb44af751efb40a1f491b02b9f5389b1d3d21,2024-06-20T12:44:01.637000
|
||||||
CVE-2024-37081,0,0,1657c2c6215fa861c8bf708a3b65df9501dd8a14588c6f7d5718007f5ce77c8d,2024-07-03T02:04:05.970000
|
CVE-2024-37081,0,0,1657c2c6215fa861c8bf708a3b65df9501dd8a14588c6f7d5718007f5ce77c8d,2024-07-03T02:04:05.970000
|
||||||
CVE-2024-37082,0,1,328caacf63ca1ae228af83a0f72fd44cf3348c7af63b09a9299e7e3e6e5de895,2024-07-03T12:53:24.977000
|
CVE-2024-37082,0,0,328caacf63ca1ae228af83a0f72fd44cf3348c7af63b09a9299e7e3e6e5de895,2024-07-03T12:53:24.977000
|
||||||
CVE-2024-37085,0,0,cd98b81b11dac217262bd62ad7a681095bdd9649a519f6ee026fccbd3bf44a32,2024-06-25T18:50:42.040000
|
CVE-2024-37085,0,0,cd98b81b11dac217262bd62ad7a681095bdd9649a519f6ee026fccbd3bf44a32,2024-06-25T18:50:42.040000
|
||||||
CVE-2024-37086,0,0,9acda53f27945df629654a7ed0b5babbb28f25e9a7ac50fce3893c7a6b8964b4,2024-06-25T18:50:42.040000
|
CVE-2024-37086,0,0,9acda53f27945df629654a7ed0b5babbb28f25e9a7ac50fce3893c7a6b8964b4,2024-06-25T18:50:42.040000
|
||||||
CVE-2024-37087,0,0,4e40b7ea7a56e7d2dfeb244220c863a1ed6df7c4211908de27563a1ed62e9bbc,2024-06-25T18:50:42.040000
|
CVE-2024-37087,0,0,4e40b7ea7a56e7d2dfeb244220c863a1ed6df7c4211908de27563a1ed62e9bbc,2024-06-25T18:50:42.040000
|
||||||
@ -253554,10 +253555,11 @@ CVE-2024-37699,0,0,e6aa9aad96c5cb91a6fa4201b1b47001ba232f78e3136af80ddfa6d4248f5
|
|||||||
CVE-2024-3770,0,0,8954a3ad0db5fc9b48d9243a1de01e444d03084d0f8b5d5da9ebc562e8f0e6a6,2024-05-17T02:40:07.387000
|
CVE-2024-3770,0,0,8954a3ad0db5fc9b48d9243a1de01e444d03084d0f8b5d5da9ebc562e8f0e6a6,2024-05-17T02:40:07.387000
|
||||||
CVE-2024-3771,0,0,1bf22922ed0657906343b6368a2362d22a78a1ff9d5272db064e582b3b0855d4,2024-05-17T02:40:07.477000
|
CVE-2024-3771,0,0,1bf22922ed0657906343b6368a2362d22a78a1ff9d5272db064e582b3b0855d4,2024-05-17T02:40:07.477000
|
||||||
CVE-2024-3772,0,0,184d29c2faf230c27e7c42ad45c478e7862cbffdde795ec4220824e36861b510,2024-04-26T02:15:06.983000
|
CVE-2024-3772,0,0,184d29c2faf230c27e7c42ad45c478e7862cbffdde795ec4220824e36861b510,2024-04-26T02:15:06.983000
|
||||||
|
CVE-2024-37726,1,1,cf8c8adbac07e4ab41cdbeea022956581b212f36b844acfc4ccad3eb7e389f64,2024-07-03T14:15:06.120000
|
||||||
CVE-2024-37732,0,0,8bcaa977ac18e5833de4fd0520da90883ea1f9cf5405317587bb381c54de852f,2024-07-03T02:04:38.513000
|
CVE-2024-37732,0,0,8bcaa977ac18e5833de4fd0520da90883ea1f9cf5405317587bb381c54de852f,2024-07-03T02:04:38.513000
|
||||||
CVE-2024-37734,0,0,0e5d8052c40ece19eb47666a762eea5411abf63f936921b36baec3d43e53baa8,2024-07-03T02:04:39.343000
|
CVE-2024-37734,0,0,0e5d8052c40ece19eb47666a762eea5411abf63f936921b36baec3d43e53baa8,2024-07-03T02:04:39.343000
|
||||||
CVE-2024-3774,0,0,430454733381ff5a96eb00158d8d932d4c087496720223836bce2968611b5152,2024-04-15T13:15:31.997000
|
CVE-2024-3774,0,0,430454733381ff5a96eb00158d8d932d4c087496720223836bce2968611b5152,2024-04-15T13:15:31.997000
|
||||||
CVE-2024-37741,0,0,3c71ffbbf01e4a0e4425969bd458658ba5fb7e837c3a88f69ccf919fc0b22481,2024-07-03T02:04:40.153000
|
CVE-2024-37741,0,1,f5ed3254675cb5ce3a67ab08ad08f5443ff303292af76c58fe640715a6de27a4,2024-07-03T14:27:08.057000
|
||||||
CVE-2024-37742,0,0,82d0f7bd796b50c91f2398edb7b6a7a5b24c344e32d17491fc5d315bfb23b371,2024-06-26T20:15:15.917000
|
CVE-2024-37742,0,0,82d0f7bd796b50c91f2398edb7b6a7a5b24c344e32d17491fc5d315bfb23b371,2024-06-26T20:15:15.917000
|
||||||
CVE-2024-3775,0,0,a79253f4f0c7633f40fa5e33903553d0137ff03b4a2d8425a028bb5ddf1c6b0a,2024-04-15T13:15:31.997000
|
CVE-2024-3775,0,0,a79253f4f0c7633f40fa5e33903553d0137ff03b4a2d8425a028bb5ddf1c6b0a,2024-04-15T13:15:31.997000
|
||||||
CVE-2024-37759,0,0,fcc8ead5df9d431db40c232755b8d406131bfe6bf2637fa79e9581b47deb8f46,2024-07-03T02:04:41.510000
|
CVE-2024-37759,0,0,fcc8ead5df9d431db40c232755b8d406131bfe6bf2637fa79e9581b47deb8f46,2024-07-03T02:04:41.510000
|
||||||
@ -253629,8 +253631,8 @@ CVE-2024-3794,0,0,153385e096cd7f2ece15b2458b2e9fc3a616d4e8c794288f506409f055c027
|
|||||||
CVE-2024-3795,0,0,394c789f966243db6d7a4bfee356db0989703de57fa4252b7833b38d6036f026,2024-05-14T16:11:39.510000
|
CVE-2024-3795,0,0,394c789f966243db6d7a4bfee356db0989703de57fa4252b7833b38d6036f026,2024-05-14T16:11:39.510000
|
||||||
CVE-2024-3796,0,0,8b56f1ae3498f70c780deb392dd70e4b0e2eb55d8dc491cebdead02f06bb596a,2024-05-14T16:11:39.510000
|
CVE-2024-3796,0,0,8b56f1ae3498f70c780deb392dd70e4b0e2eb55d8dc491cebdead02f06bb596a,2024-05-14T16:11:39.510000
|
||||||
CVE-2024-3797,0,0,ee6a5db4c86b7a1cb7dddd0f923d514d4da716af84fa2cbea88db014d700ce37,2024-05-17T02:40:08.123000
|
CVE-2024-3797,0,0,ee6a5db4c86b7a1cb7dddd0f923d514d4da716af84fa2cbea88db014d700ce37,2024-05-17T02:40:08.123000
|
||||||
CVE-2024-3800,0,0,0aee6a42b2039215c9eaef826d097369b3f1d3a7d2da64d84dcd5461a8ce6887,2024-06-28T13:38:47.077000
|
CVE-2024-3800,0,1,f8f57ef4bdedf9e336bba69e6db949ed7a578f3b2a10988d7c69ed3685de0000,2024-07-03T14:36:22.273000
|
||||||
CVE-2024-3801,0,0,fcfad6b0ce02399c7d678f395fb128f6fba813bc23e60b051d597cd380d4b8e6,2024-06-28T13:38:47.077000
|
CVE-2024-3801,0,1,59de265ce1af1c02a0bfcf9801db717e0400c3bfeeedabcf1fa6b682733a5570,2024-07-03T14:36:52.797000
|
||||||
CVE-2024-3802,0,0,aaa997a68afe711762ac8536c5d0fad15740edaa6785e851a1495f0cf1f43e75,2024-06-04T02:15:49.290000
|
CVE-2024-3802,0,0,aaa997a68afe711762ac8536c5d0fad15740edaa6785e851a1495f0cf1f43e75,2024-06-04T02:15:49.290000
|
||||||
CVE-2024-3803,0,0,cefb64222fdf80706b1a9eb17e095bbe2f795f698686df2fa7fab7399b51955d,2024-05-17T02:40:08.240000
|
CVE-2024-3803,0,0,cefb64222fdf80706b1a9eb17e095bbe2f795f698686df2fa7fab7399b51955d,2024-05-17T02:40:08.240000
|
||||||
CVE-2024-3804,0,0,6cbbef68e2216a1b6714fc89ff2a16fd432ad36dd1cabadaff597df2e56ce61a,2024-06-04T19:20:24.583000
|
CVE-2024-3804,0,0,6cbbef68e2216a1b6714fc89ff2a16fd432ad36dd1cabadaff597df2e56ce61a,2024-06-04T19:20:24.583000
|
||||||
@ -253647,7 +253649,7 @@ CVE-2024-3812,0,0,f751171253b8aec65ad3eb6d2474d3ee930fd7bd925f44cbf577354bd9ac3c
|
|||||||
CVE-2024-3813,0,0,86c7d7a0e1d2bdb1014ab3bb60ae32f55f8deca1eac3a0f16e2b300f92de13c6,2024-06-17T12:42:04.623000
|
CVE-2024-3813,0,0,86c7d7a0e1d2bdb1014ab3bb60ae32f55f8deca1eac3a0f16e2b300f92de13c6,2024-06-17T12:42:04.623000
|
||||||
CVE-2024-3814,0,0,6acb0a54e9f66c1fa69cea6ef32be45b05b60edf6b85ffbcc82a92f37f75e3c1,2024-06-17T12:42:04.623000
|
CVE-2024-3814,0,0,6acb0a54e9f66c1fa69cea6ef32be45b05b60edf6b85ffbcc82a92f37f75e3c1,2024-06-17T12:42:04.623000
|
||||||
CVE-2024-3815,0,0,6bd5773f540c574f8e28080694e60819f34c3381e2d8c38f1a9a67bfdd0a3098,2024-06-17T12:42:04.623000
|
CVE-2024-3815,0,0,6bd5773f540c574f8e28080694e60819f34c3381e2d8c38f1a9a67bfdd0a3098,2024-06-17T12:42:04.623000
|
||||||
CVE-2024-3816,0,0,2c60ea3e6d8885876bc73fbf9a3e32dbc86d267cf2e909cefcb1e686654852dd,2024-06-28T13:38:47.077000
|
CVE-2024-3816,0,1,ca9c8b3746ea2ebbbc383e9aa135dd99550dbafdbe5ff9c69dbe15b33a0feabf,2024-07-03T14:37:07.750000
|
||||||
CVE-2024-3817,0,0,46e4b3903939ad7f28eeb8afee28fc4c5b18be71847d60ae426ede3b66e11122,2024-04-18T13:04:28.900000
|
CVE-2024-3817,0,0,46e4b3903939ad7f28eeb8afee28fc4c5b18be71847d60ae426ede3b66e11122,2024-04-18T13:04:28.900000
|
||||||
CVE-2024-3818,0,0,3b93c96d931c7712dba585285a5a0f954163c40c8ab2b4d2e42e74b7a416a166,2024-04-19T13:10:25.637000
|
CVE-2024-3818,0,0,3b93c96d931c7712dba585285a5a0f954163c40c8ab2b4d2e42e74b7a416a166,2024-04-19T13:10:25.637000
|
||||||
CVE-2024-3819,0,0,070335cf0d21b4518c9cf130cbde224bb7db7bd3582033700dab419bc756cd20,2024-05-02T18:00:37.360000
|
CVE-2024-3819,0,0,070335cf0d21b4518c9cf130cbde224bb7db7bd3582033700dab419bc756cd20,2024-05-02T18:00:37.360000
|
||||||
@ -253732,7 +253734,7 @@ CVE-2024-38443,0,0,f13f48a0a21a67520512a3ec2ab6e073a68af4c8b774478a4c1ef20277a5f
|
|||||||
CVE-2024-38448,0,0,ba1871b7e0fa187923744d63be4c60396badf8afd9c3275c2e47e89175ed02ba,2024-07-03T02:05:03.433000
|
CVE-2024-38448,0,0,ba1871b7e0fa187923744d63be4c60396badf8afd9c3275c2e47e89175ed02ba,2024-07-03T02:05:03.433000
|
||||||
CVE-2024-38449,0,0,d69089b504731433d7b543e10e4b6e57d1623551f30ae8f192ba71fc59819634,2024-06-20T12:44:22.977000
|
CVE-2024-38449,0,0,d69089b504731433d7b543e10e4b6e57d1623551f30ae8f192ba71fc59819634,2024-06-20T12:44:22.977000
|
||||||
CVE-2024-3845,0,0,a979e2b537f528e4ac50f6006d078d735fa62fe4b7376a25443b79e4c194cadd,2024-07-03T02:06:42.887000
|
CVE-2024-3845,0,0,a979e2b537f528e4ac50f6006d078d735fa62fe4b7376a25443b79e4c194cadd,2024-07-03T02:06:42.887000
|
||||||
CVE-2024-38453,0,1,b37e4b9aac2e83312b7d279f2154b9c8c3686acce89ef9f2a457cc06a849c6a9,2024-07-03T12:53:24.977000
|
CVE-2024-38453,0,0,b37e4b9aac2e83312b7d279f2154b9c8c3686acce89ef9f2a457cc06a849c6a9,2024-07-03T12:53:24.977000
|
||||||
CVE-2024-38454,0,0,9e16cbeba5810d367094a131b56862641aa42d77b0ed4c90d4e4d7e92bb854dc,2024-06-17T12:42:04.623000
|
CVE-2024-38454,0,0,9e16cbeba5810d367094a131b56862641aa42d77b0ed4c90d4e4d7e92bb854dc,2024-06-17T12:42:04.623000
|
||||||
CVE-2024-38457,0,0,c77550a7e2a9252924a4646a20696a029639d1882dc30abb38808d48a175ba0c,2024-06-17T12:42:04.623000
|
CVE-2024-38457,0,0,c77550a7e2a9252924a4646a20696a029639d1882dc30abb38808d48a175ba0c,2024-06-17T12:42:04.623000
|
||||||
CVE-2024-38458,0,0,6851fd0120a71792de2b3d031afad7ff8acc6e8b0a3bf2458c8fd1c3754c1414,2024-06-17T12:42:04.623000
|
CVE-2024-38458,0,0,6851fd0120a71792de2b3d031afad7ff8acc6e8b0a3bf2458c8fd1c3754c1414,2024-06-17T12:42:04.623000
|
||||||
@ -253782,7 +253784,7 @@ CVE-2024-3853,0,0,7e352b0debfe2ff1972966571472dc1ad9a92992dff183ce4b7132f5ac558f
|
|||||||
CVE-2024-38531,0,0,b56de69adb9e29b508ff804eef5c2919280b3646aaf65838ea0969fdce8b1636,2024-07-01T12:37:24.220000
|
CVE-2024-38531,0,0,b56de69adb9e29b508ff804eef5c2919280b3646aaf65838ea0969fdce8b1636,2024-07-01T12:37:24.220000
|
||||||
CVE-2024-38532,0,0,3a3b54122bd6780d32b0357101fa3b70c56bf5cfbd9b29132bcf407b07a6cf4a,2024-07-01T12:37:24.220000
|
CVE-2024-38532,0,0,3a3b54122bd6780d32b0357101fa3b70c56bf5cfbd9b29132bcf407b07a6cf4a,2024-07-01T12:37:24.220000
|
||||||
CVE-2024-38533,0,0,bc3eb3ef979bf5295d109db19e6d12afcecc2e011ea06aeec96e0b38c48ef42a,2024-07-01T12:37:24.220000
|
CVE-2024-38533,0,0,bc3eb3ef979bf5295d109db19e6d12afcecc2e011ea06aeec96e0b38c48ef42a,2024-07-01T12:37:24.220000
|
||||||
CVE-2024-38537,0,1,103402269a270a67bfe215eff7f2c87681abb6bef0d7dc124a63de178d731b3b,2024-07-03T12:53:24.977000
|
CVE-2024-38537,0,0,103402269a270a67bfe215eff7f2c87681abb6bef0d7dc124a63de178d731b3b,2024-07-03T12:53:24.977000
|
||||||
CVE-2024-38538,0,0,fd8d0c414421b9d83404be9e58919f8d1c04c080d100c149e46c3a374cade8e2,2024-06-20T12:44:01.637000
|
CVE-2024-38538,0,0,fd8d0c414421b9d83404be9e58919f8d1c04c080d100c149e46c3a374cade8e2,2024-06-20T12:44:01.637000
|
||||||
CVE-2024-38539,0,0,bb07b10cb8e27f63a4ad4d8d9f4efc546da28e9a77992ff13895f8e8066ae4a7,2024-06-20T12:44:01.637000
|
CVE-2024-38539,0,0,bb07b10cb8e27f63a4ad4d8d9f4efc546da28e9a77992ff13895f8e8066ae4a7,2024-06-20T12:44:01.637000
|
||||||
CVE-2024-3854,0,0,f383320435301230a2dac28bdc7db79c6e74ee12f38932e432ec4f2020fa918e,2024-07-03T02:06:46.110000
|
CVE-2024-3854,0,0,f383320435301230a2dac28bdc7db79c6e74ee12f38932e432ec4f2020fa918e,2024-07-03T02:06:46.110000
|
||||||
@ -253995,12 +253997,14 @@ CVE-2024-3916,0,0,67c028ed5cffa81651cfdb7590d8583ba32a4964953feede869ed8c9f6426e
|
|||||||
CVE-2024-3917,0,0,87493362103f61e3758851588aca1cc3facb0cf1f97ad5b068e06e988e9b2161,2024-07-03T02:06:53.877000
|
CVE-2024-3917,0,0,87493362103f61e3758851588aca1cc3facb0cf1f97ad5b068e06e988e9b2161,2024-07-03T02:06:53.877000
|
||||||
CVE-2024-3918,0,0,f0312710b8f2207cc4daf3e960aa8906c7e8839f8babda55f2853fd4763a97f9,2024-05-24T01:15:30.977000
|
CVE-2024-3918,0,0,f0312710b8f2207cc4daf3e960aa8906c7e8839f8babda55f2853fd4763a97f9,2024-05-24T01:15:30.977000
|
||||||
CVE-2024-3920,0,0,5dbee28fbacc5f4bbc65481ff7f645499d60469b501d304207882ca441f74491,2024-05-24T01:15:30.977000
|
CVE-2024-3920,0,0,5dbee28fbacc5f4bbc65481ff7f645499d60469b501d304207882ca441f74491,2024-05-24T01:15:30.977000
|
||||||
CVE-2024-39206,0,1,f9fb00f1e181a34e546a4d02526b8d7182abaed8338954851ed4beadabf72272,2024-07-03T12:53:24.977000
|
CVE-2024-39206,0,0,f9fb00f1e181a34e546a4d02526b8d7182abaed8338954851ed4beadabf72272,2024-07-03T12:53:24.977000
|
||||||
CVE-2024-39207,0,0,d8e667b43b76095c528f5867a8617c4177e3d9ac8aefab820b7b82f9e44a4991,2024-06-28T10:27:00.920000
|
CVE-2024-39207,0,0,d8e667b43b76095c528f5867a8617c4177e3d9ac8aefab820b7b82f9e44a4991,2024-06-28T10:27:00.920000
|
||||||
CVE-2024-39208,0,0,bfca919135cb16c924d14a3e46a90c36fb45e8d6f50651e543c7c3b74462722a,2024-07-03T02:05:43.393000
|
CVE-2024-39208,0,0,bfca919135cb16c924d14a3e46a90c36fb45e8d6f50651e543c7c3b74462722a,2024-07-03T02:05:43.393000
|
||||||
CVE-2024-39209,0,0,846eb9e93730bd8a4e0e342a01db126b493a0877c61de0d40de722388e34129c,2024-06-28T10:27:00.920000
|
CVE-2024-39209,0,0,846eb9e93730bd8a4e0e342a01db126b493a0877c61de0d40de722388e34129c,2024-06-28T10:27:00.920000
|
||||||
CVE-2024-3921,0,0,dc44586c5c7e1c74f5850e7b4d244cf53da902f950a29ac6c4f232f966454542,2024-05-29T13:02:09.280000
|
CVE-2024-3921,0,0,dc44586c5c7e1c74f5850e7b4d244cf53da902f950a29ac6c4f232f966454542,2024-05-29T13:02:09.280000
|
||||||
CVE-2024-3922,0,0,9c35bb7d9bca4b5559bb1a4dfea91676bf1d098f4dc5952b2a109bcc30a68d2c,2024-06-13T18:36:09.010000
|
CVE-2024-3922,0,0,9c35bb7d9bca4b5559bb1a4dfea91676bf1d098f4dc5952b2a109bcc30a68d2c,2024-06-13T18:36:09.010000
|
||||||
|
CVE-2024-39220,1,1,ee539c7dd926c4141adfea89a293da82fc291d0c8bbf25ffc9e07f033b77b6dd,2024-07-03T15:15:05.993000
|
||||||
|
CVE-2024-39223,1,1,edd1c5b1f2e5387a540545af51f1838c7b3d17fcd3fbb559bc7e28e94aed9c4c,2024-07-03T15:15:06.083000
|
||||||
CVE-2024-3923,0,0,dcd7a979944a34edd9f4dd960691916feb4f3b194c37e215c41a761a1e13cac2,2024-05-14T16:11:39.510000
|
CVE-2024-3923,0,0,dcd7a979944a34edd9f4dd960691916feb4f3b194c37e215c41a761a1e13cac2,2024-05-14T16:11:39.510000
|
||||||
CVE-2024-39236,0,0,5bedffcf34ebde5608a8c6d0266193b958a561f9cfe93a597c1123eb6d56c52a,2024-07-03T02:05:44.203000
|
CVE-2024-39236,0,0,5bedffcf34ebde5608a8c6d0266193b958a561f9cfe93a597c1123eb6d56c52a,2024-07-03T02:05:44.203000
|
||||||
CVE-2024-3924,0,0,396cfe762c72fbd5a1960b1ddaed612b95d18abd602e0e4dd151e2967ca06c2d,2024-05-30T18:19:11.743000
|
CVE-2024-3924,0,0,396cfe762c72fbd5a1960b1ddaed612b95d18abd602e0e4dd151e2967ca06c2d,2024-05-30T18:19:11.743000
|
||||||
@ -254031,14 +254035,14 @@ CVE-2024-3931,0,0,ff26b5a8728d6a7f3e1f8095f9d431d98f0c624577950ceaf4dc1cf9ad6880
|
|||||||
CVE-2024-39310,0,0,187be4dc945171a7657d1459e6c80fed53aa1f7d448ef02205a5dc997f08bebc,2024-07-02T12:09:16.907000
|
CVE-2024-39310,0,0,187be4dc945171a7657d1459e6c80fed53aa1f7d448ef02205a5dc997f08bebc,2024-07-02T12:09:16.907000
|
||||||
CVE-2024-39313,0,0,9e833554bfb77c34493fd31ffb1eaf0ef9773e2886372005ffb0d80f9a99cb5e,2024-07-02T12:09:16.907000
|
CVE-2024-39313,0,0,9e833554bfb77c34493fd31ffb1eaf0ef9773e2886372005ffb0d80f9a99cb5e,2024-07-02T12:09:16.907000
|
||||||
CVE-2024-39314,0,0,f08a68c1585aac53ed3340b30b7ca1fee7f99b287e34df66dd62620bc6eee2c4,2024-07-02T12:09:16.907000
|
CVE-2024-39314,0,0,f08a68c1585aac53ed3340b30b7ca1fee7f99b287e34df66dd62620bc6eee2c4,2024-07-02T12:09:16.907000
|
||||||
CVE-2024-39315,0,1,a63beff0a6cc21a12673e8ba65716d45b6c52abc54b22460a729ebfe04cdda63,2024-07-03T12:53:24.977000
|
CVE-2024-39315,0,0,a63beff0a6cc21a12673e8ba65716d45b6c52abc54b22460a729ebfe04cdda63,2024-07-03T12:53:24.977000
|
||||||
CVE-2024-39316,0,0,d47aca3c5197170fc8f05033ffa682fd40e1aa1436fadb43bcca23faeaecd5c8,2024-07-02T17:44:45.700000
|
CVE-2024-39316,0,0,d47aca3c5197170fc8f05033ffa682fd40e1aa1436fadb43bcca23faeaecd5c8,2024-07-02T17:44:45.700000
|
||||||
CVE-2024-3932,0,0,371291a71f9c99e371f96e7d7b61e3e11967567047c07fae80310c4772d1c0c7,2024-06-06T20:15:14.030000
|
CVE-2024-3932,0,0,371291a71f9c99e371f96e7d7b61e3e11967567047c07fae80310c4772d1c0c7,2024-06-06T20:15:14.030000
|
||||||
CVE-2024-39322,0,1,708cd5de8c07f904d1ba83d6367c23eacb2b2cf3f907adf630b27179cc7d25d8,2024-07-03T12:53:24.977000
|
CVE-2024-39322,0,0,708cd5de8c07f904d1ba83d6367c23eacb2b2cf3f907adf630b27179cc7d25d8,2024-07-03T12:53:24.977000
|
||||||
CVE-2024-39323,0,0,8b592e233643a568789a282215e3d651e9257e7274946ce7dfcbad9339346353,2024-07-02T17:44:45.700000
|
CVE-2024-39323,0,0,8b592e233643a568789a282215e3d651e9257e7274946ce7dfcbad9339346353,2024-07-02T17:44:45.700000
|
||||||
CVE-2024-39324,0,1,75a65563a1468710cdae5af44a5e63fb7b35b0a6c50055f03af94f2ccbf33c01,2024-07-03T12:53:24.977000
|
CVE-2024-39324,0,0,75a65563a1468710cdae5af44a5e63fb7b35b0a6c50055f03af94f2ccbf33c01,2024-07-03T12:53:24.977000
|
||||||
CVE-2024-39325,0,1,014e4593e1f5768db5ed0f4f9796d958998c433eda4ad78f248afb017315aecf,2024-07-03T12:53:24.977000
|
CVE-2024-39325,0,0,014e4593e1f5768db5ed0f4f9796d958998c433eda4ad78f248afb017315aecf,2024-07-03T12:53:24.977000
|
||||||
CVE-2024-39326,0,1,967fc66349db0f6c5363f95a2959465d03482ebce2b1293649c92ff8d8a8034a,2024-07-03T12:53:24.977000
|
CVE-2024-39326,0,0,967fc66349db0f6c5363f95a2959465d03482ebce2b1293649c92ff8d8a8034a,2024-07-03T12:53:24.977000
|
||||||
CVE-2024-3933,0,0,1d08d4e317596700be65ef5300f76b449794bb2d8b1542a98c34b9cd74fea015,2024-05-28T12:39:28.377000
|
CVE-2024-3933,0,0,1d08d4e317596700be65ef5300f76b449794bb2d8b1542a98c34b9cd74fea015,2024-05-28T12:39:28.377000
|
||||||
CVE-2024-39331,0,0,e27921e016dec51173f86ad420de9e9174de4baa540da3f53e6e1157ef72adc9,2024-07-03T02:05:47.260000
|
CVE-2024-39331,0,0,e27921e016dec51173f86ad420de9e9174de4baa540da3f53e6e1157ef72adc9,2024-07-03T02:05:47.260000
|
||||||
CVE-2024-39334,0,0,7a242c73a28ed17874e43348a26da2104869d7ef8d91c48fe0d8d7e00f57c31d,2024-06-24T12:57:36.513000
|
CVE-2024-39334,0,0,7a242c73a28ed17874e43348a26da2104869d7ef8d91c48fe0d8d7e00f57c31d,2024-06-24T12:57:36.513000
|
||||||
@ -254049,9 +254053,9 @@ CVE-2024-39349,0,0,e2c0ea0897db587383c2ec6939a8e8f30324733a4c2be5e6f6d88b1c64f32
|
|||||||
CVE-2024-39350,0,0,2818f75b3d24495902c39d5dd3d46a13088a057469d774fcd7dea3e2c6f7b648,2024-06-28T10:27:00.920000
|
CVE-2024-39350,0,0,2818f75b3d24495902c39d5dd3d46a13088a057469d774fcd7dea3e2c6f7b648,2024-06-28T10:27:00.920000
|
||||||
CVE-2024-39351,0,0,73835562ac8c8f624018ac3f57736429a15ab60f19fdda354656ce6bebf2a36c,2024-06-28T10:27:00.920000
|
CVE-2024-39351,0,0,73835562ac8c8f624018ac3f57736429a15ab60f19fdda354656ce6bebf2a36c,2024-06-28T10:27:00.920000
|
||||||
CVE-2024-39352,0,0,a6ac4cc6df4e978ab98d2526b0d0ca42ad6af92292b36fb34063680949363975,2024-06-28T10:27:00.920000
|
CVE-2024-39352,0,0,a6ac4cc6df4e978ab98d2526b0d0ca42ad6af92292b36fb34063680949363975,2024-06-28T10:27:00.920000
|
||||||
CVE-2024-39353,0,1,dee41995885732d5f01d40a8c0c8c8774900d0671d3f357636f60643bdb33d7a,2024-07-03T12:53:24.977000
|
CVE-2024-39353,0,0,dee41995885732d5f01d40a8c0c8c8774900d0671d3f357636f60643bdb33d7a,2024-07-03T12:53:24.977000
|
||||||
CVE-2024-3936,0,0,1a9ebdb5653b792bdb8abb0138184d539d6d0e0c9af8da519de630a92cc0aee0,2024-05-02T18:00:37.360000
|
CVE-2024-3936,0,0,1a9ebdb5653b792bdb8abb0138184d539d6d0e0c9af8da519de630a92cc0aee0,2024-05-02T18:00:37.360000
|
||||||
CVE-2024-39361,0,1,0c97fb023368f7ebdede00eba9599cd831fbc033a414f99280ed3ea4b7636734,2024-07-03T12:53:24.977000
|
CVE-2024-39361,0,0,0c97fb023368f7ebdede00eba9599cd831fbc033a414f99280ed3ea4b7636734,2024-07-03T12:53:24.977000
|
||||||
CVE-2024-39362,0,0,a4e72d457ad79497d234146ef4f9a3e9f07fed3f9039766cdc9d7026e27b2016,2024-07-02T20:15:06.353000
|
CVE-2024-39362,0,0,a4e72d457ad79497d234146ef4f9a3e9f07fed3f9039766cdc9d7026e27b2016,2024-07-02T20:15:06.353000
|
||||||
CVE-2024-3937,0,0,47b49a69bcae07617978c4de23b5bd0d4eef565a4a3d61421481625d7a4abea5,2024-05-29T13:02:09.280000
|
CVE-2024-3937,0,0,47b49a69bcae07617978c4de23b5bd0d4eef565a4a3d61421481625d7a4abea5,2024-05-29T13:02:09.280000
|
||||||
CVE-2024-39371,0,0,8c1a1238e769d76e82e2c2cc608bc61bb27789621e5380cf2965b3d5a5e744e4,2024-06-25T18:50:42.040000
|
CVE-2024-39371,0,0,8c1a1238e769d76e82e2c2cc608bc61bb27789621e5380cf2965b3d5a5e744e4,2024-06-25T18:50:42.040000
|
||||||
@ -254103,7 +254107,7 @@ CVE-2024-3967,0,0,b2af76e65b0ac2fff588b8ab332f0978e5b083cdcdd41f3fd643403fe236fa
|
|||||||
CVE-2024-3968,0,0,cdd73cfcec56ac4302e4eb4a932f862086b9a3ed46ed5ff92d17197e11553e8f,2024-05-15T18:35:11.453000
|
CVE-2024-3968,0,0,cdd73cfcec56ac4302e4eb4a932f862086b9a3ed46ed5ff92d17197e11553e8f,2024-05-15T18:35:11.453000
|
||||||
CVE-2024-3969,0,0,793622b6641cb8c2dc34802adf1ab9ece645cce7d321b9faf1a6b76d5e28ec78,2024-05-28T17:11:55.903000
|
CVE-2024-3969,0,0,793622b6641cb8c2dc34802adf1ab9ece645cce7d321b9faf1a6b76d5e28ec78,2024-05-28T17:11:55.903000
|
||||||
CVE-2024-3970,0,0,a6d2ad116e736372d8ee0cd28cd0cbfef25f3ce953ea92bdb2b1ac922e65eedf,2024-05-15T18:35:11.453000
|
CVE-2024-3970,0,0,a6d2ad116e736372d8ee0cd28cd0cbfef25f3ce953ea92bdb2b1ac922e65eedf,2024-05-15T18:35:11.453000
|
||||||
CVE-2024-39704,0,0,46d48385d4d162b3ac12c54e9ccb839ccae9f35d96e3edd9d9bfd3968e019316,2024-06-28T13:38:47.077000
|
CVE-2024-39704,0,1,1d59c065d69d465eb86bf6114b5299aaf44c728f69d6748df6b6bd65077d4590,2024-07-03T14:32:56.510000
|
||||||
CVE-2024-39705,0,0,91d39f33d5bd2d9618d124407e406b5aefb3921b0f0d526c128476a4653583c8,2024-07-03T02:05:51.507000
|
CVE-2024-39705,0,0,91d39f33d5bd2d9618d124407e406b5aefb3921b0f0d526c128476a4653583c8,2024-07-03T02:05:51.507000
|
||||||
CVE-2024-39708,0,0,111516979aea28b8e657aa098e90e19a44667358e9b94bc0cc0d55aace553cee,2024-06-28T10:27:00.920000
|
CVE-2024-39708,0,0,111516979aea28b8e657aa098e90e19a44667358e9b94bc0cc0d55aace553cee,2024-06-28T10:27:00.920000
|
||||||
CVE-2024-3971,0,0,1320cc801330d2d12e5c1ffdfdf6be7f25a4100ca447a2f7a5815c90f2431f60,2024-06-17T12:42:04.623000
|
CVE-2024-3971,0,0,1320cc801330d2d12e5c1ffdfdf6be7f25a4100ca447a2f7a5815c90f2431f60,2024-06-17T12:42:04.623000
|
||||||
@ -254112,9 +254116,9 @@ CVE-2024-3974,0,0,30b94b89b01dd2c6057362330f67dc78937f3f3edffa0c5a57e7602f711f91
|
|||||||
CVE-2024-3977,0,0,e9f44416847592725fc2cd47ffed9c743bca75989a5c2d940c73903d22d68b79,2024-06-17T12:42:04.623000
|
CVE-2024-3977,0,0,e9f44416847592725fc2cd47ffed9c743bca75989a5c2d940c73903d22d68b79,2024-06-17T12:42:04.623000
|
||||||
CVE-2024-3978,0,0,338ec55d360d0ecf1dfe595690a2d37e24aa4129fa5a75aae324bfa31cd2fe9a,2024-06-17T12:42:04.623000
|
CVE-2024-3978,0,0,338ec55d360d0ecf1dfe595690a2d37e24aa4129fa5a75aae324bfa31cd2fe9a,2024-06-17T12:42:04.623000
|
||||||
CVE-2024-3979,0,0,4ac2126fe63098861061c1ed3772b0712449f42e64a5481492de94fd61a5b947,2024-06-06T20:15:14.127000
|
CVE-2024-3979,0,0,4ac2126fe63098861061c1ed3772b0712449f42e64a5481492de94fd61a5b947,2024-06-06T20:15:14.127000
|
||||||
CVE-2024-39807,0,1,07c386020311e145a20dcae00a754aea7481144e104f9b99b56a5a82372beea8,2024-07-03T12:53:24.977000
|
CVE-2024-39807,0,0,07c386020311e145a20dcae00a754aea7481144e104f9b99b56a5a82372beea8,2024-07-03T12:53:24.977000
|
||||||
CVE-2024-39828,0,0,a076e079a0d15f60c3c4a55d02ae6ed731ea38682b9215046585ce79ae4cfb80,2024-07-01T12:37:24.220000
|
CVE-2024-39828,0,0,a076e079a0d15f60c3c4a55d02ae6ed731ea38682b9215046585ce79ae4cfb80,2024-07-01T12:37:24.220000
|
||||||
CVE-2024-39830,0,1,215aa5fd15609846dfbec6cfbf9cc2bf59b25eefbdaea3ac7fa164cf6842c628,2024-07-03T12:53:24.977000
|
CVE-2024-39830,0,0,215aa5fd15609846dfbec6cfbf9cc2bf59b25eefbdaea3ac7fa164cf6842c628,2024-07-03T12:53:24.977000
|
||||||
CVE-2024-3984,0,0,bee410e9bf0342c5ecf3886d76050e2314329db97e17f53f9285ff32a0d9ee8f,2024-06-20T12:44:01.637000
|
CVE-2024-3984,0,0,bee410e9bf0342c5ecf3886d76050e2314329db97e17f53f9285ff32a0d9ee8f,2024-06-20T12:44:01.637000
|
||||||
CVE-2024-39840,0,0,5d7e4142131887a411bdbeea93ed887c2e0abb0654faa364c29fef4ac994d185,2024-07-03T02:05:52.307000
|
CVE-2024-39840,0,0,5d7e4142131887a411bdbeea93ed887c2e0abb0654faa364c29fef4ac994d185,2024-07-03T02:05:52.307000
|
||||||
CVE-2024-39846,0,0,cc3d14fb15e20c985bb7fdeb359e7a12ea1918f79b7c4c3ac03373ad528c69cf,2024-07-01T12:37:24.220000
|
CVE-2024-39846,0,0,cc3d14fb15e20c985bb7fdeb359e7a12ea1918f79b7c4c3ac03373ad528c69cf,2024-07-01T12:37:24.220000
|
||||||
@ -254126,17 +254130,17 @@ CVE-2024-39878,0,0,038c252a5df59aef0ff494dd466e8c23160164cb5ac894aeb1a33e06001b7
|
|||||||
CVE-2024-39879,0,0,1b030ce3798bca0bad33a3937cca95b776786d7918bf02f25bff668e667acaa0,2024-07-02T12:09:16.907000
|
CVE-2024-39879,0,0,1b030ce3798bca0bad33a3937cca95b776786d7918bf02f25bff668e667acaa0,2024-07-02T12:09:16.907000
|
||||||
CVE-2024-3988,0,0,ed49ad0e503298ba2fe40c90a665a86dcb918b5087ac61c1edfd746c2ca95d24,2024-04-25T13:18:13.537000
|
CVE-2024-3988,0,0,ed49ad0e503298ba2fe40c90a665a86dcb918b5087ac61c1edfd746c2ca95d24,2024-04-25T13:18:13.537000
|
||||||
CVE-2024-3989,0,0,41a6b1dcae0354fb8cba40366dc7ed1eeb84d6a6a33689c35123198fe63c8f01,2024-05-14T16:11:39.510000
|
CVE-2024-3989,0,0,41a6b1dcae0354fb8cba40366dc7ed1eeb84d6a6a33689c35123198fe63c8f01,2024-05-14T16:11:39.510000
|
||||||
CVE-2024-39891,0,1,41ce53dbbcfb923c73770e761bd2bd927865451911c7f7e17390a498d286d470,2024-07-03T12:53:24.977000
|
CVE-2024-39891,0,0,41ce53dbbcfb923c73770e761bd2bd927865451911c7f7e17390a498d286d470,2024-07-03T12:53:24.977000
|
||||||
CVE-2024-39894,0,1,c61bb2661100853548279e349e76a635cba102e2f9a2c3076410b71ec944a6f0,2024-07-03T13:15:02.890000
|
CVE-2024-39894,0,0,c61bb2661100853548279e349e76a635cba102e2f9a2c3076410b71ec944a6f0,2024-07-03T13:15:02.890000
|
||||||
CVE-2024-3990,0,0,7879115af68e1891db08bd2dafc44fb55db15680f59885de2ed87fd5c16d9492,2024-05-14T16:11:39.510000
|
CVE-2024-3990,0,0,7879115af68e1891db08bd2dafc44fb55db15680f59885de2ed87fd5c16d9492,2024-05-14T16:11:39.510000
|
||||||
CVE-2024-3991,0,0,f4b27e31b2ebe06401478accd9d85264142bf207d27ef139c240399354705c4f,2024-05-02T18:00:37.360000
|
CVE-2024-3991,0,0,f4b27e31b2ebe06401478accd9d85264142bf207d27ef139c240399354705c4f,2024-05-02T18:00:37.360000
|
||||||
CVE-2024-3992,0,0,ff644523dcb07d662c2bf53b9e125872cf5c9b9df16e03b5f8dec25363b303ae,2024-06-17T12:42:04.623000
|
CVE-2024-3992,0,0,ff644523dcb07d662c2bf53b9e125872cf5c9b9df16e03b5f8dec25363b303ae,2024-06-17T12:42:04.623000
|
||||||
CVE-2024-39920,0,1,8281f1288058876e172a78a04b7e10123b671826d2c29ba249d059d614d38347,2024-07-03T12:53:24.977000
|
CVE-2024-39920,0,0,8281f1288058876e172a78a04b7e10123b671826d2c29ba249d059d614d38347,2024-07-03T12:53:24.977000
|
||||||
CVE-2024-3993,0,0,a2f94f13d02cfe8603a71433706e6cc2c5ad0c0e3e2fd5d51c299cf3fc301a73,2024-07-03T02:06:58.160000
|
CVE-2024-3993,0,0,a2f94f13d02cfe8603a71433706e6cc2c5ad0c0e3e2fd5d51c299cf3fc301a73,2024-07-03T02:06:58.160000
|
||||||
CVE-2024-3994,0,0,292539249e741e7003c555a5d4fa2182b15a01b393fb04fa15e675750c01906e,2024-04-25T13:18:02.660000
|
CVE-2024-3994,0,0,292539249e741e7003c555a5d4fa2182b15a01b393fb04fa15e675750c01906e,2024-04-25T13:18:02.660000
|
||||||
CVE-2024-3995,0,0,a7fe690817691037765b680c602849c2a36e767bb2849159693fe5a7864f46cb,2024-07-01T14:15:05.680000
|
CVE-2024-3995,0,0,a7fe690817691037765b680c602849c2a36e767bb2849159693fe5a7864f46cb,2024-07-01T14:15:05.680000
|
||||||
CVE-2024-3997,0,0,507ae8762d75f9d68eda75aa3a6fbbaf1b3579404dfa0ecd9f2978d2aa87a55f,2024-05-24T01:15:30.977000
|
CVE-2024-3997,0,0,507ae8762d75f9d68eda75aa3a6fbbaf1b3579404dfa0ecd9f2978d2aa87a55f,2024-05-24T01:15:30.977000
|
||||||
CVE-2024-3999,0,0,d855e263f238cc0580530dcbe41b732e5a7fc792eec652c4279dc80589279eed,2024-07-03T02:06:58.680000
|
CVE-2024-3999,0,1,4248dd2372447004bc43614b1896e27a040049c0dba411de9512ee0e6f816fb7,2024-07-03T15:44:56.130000
|
||||||
CVE-2024-4000,0,0,63e68b686bb1abbdcd2ddeab613f2e83d1883c904c164f21a1076ada49583fc9,2024-05-02T18:00:37.360000
|
CVE-2024-4000,0,0,63e68b686bb1abbdcd2ddeab613f2e83d1883c904c164f21a1076ada49583fc9,2024-05-02T18:00:37.360000
|
||||||
CVE-2024-4001,0,0,01ff67c0d3df1be38408b913fb09a0fa8e839c64a815c3de41b48a61aa2ae8cb,2024-06-11T17:27:53.637000
|
CVE-2024-4001,0,0,01ff67c0d3df1be38408b913fb09a0fa8e839c64a815c3de41b48a61aa2ae8cb,2024-06-11T17:27:53.637000
|
||||||
CVE-2024-4003,0,0,9b9be828f15a04db891b79e7c6ebf75d000360176e249e61f2acbb014741196d,2024-05-02T18:00:37.360000
|
CVE-2024-4003,0,0,9b9be828f15a04db891b79e7c6ebf75d000360176e249e61f2acbb014741196d,2024-05-02T18:00:37.360000
|
||||||
@ -254524,7 +254528,7 @@ CVE-2024-4478,0,0,31a4a4c48861c0c170c939e3aa0b10661ec97e9653465707919926dbd35951
|
|||||||
CVE-2024-4479,0,0,5ea4f16cbb65b856fd1892d7f18a0653a4e499cdb8b18f25028aa3d91283004d,2024-06-17T12:42:04.623000
|
CVE-2024-4479,0,0,5ea4f16cbb65b856fd1892d7f18a0653a4e499cdb8b18f25028aa3d91283004d,2024-06-17T12:42:04.623000
|
||||||
CVE-2024-4480,0,0,585ced159bf2873044aaa034a55a2124aa433419daa101a5837cc3efb9afe316,2024-06-17T12:42:04.623000
|
CVE-2024-4480,0,0,585ced159bf2873044aaa034a55a2124aa433419daa101a5837cc3efb9afe316,2024-06-17T12:42:04.623000
|
||||||
CVE-2024-4481,0,0,7ecf88f2a22a659849266bdc0bd40c464d195e3dafdf490c58869a301c87572b,2024-05-14T16:11:39.510000
|
CVE-2024-4481,0,0,7ecf88f2a22a659849266bdc0bd40c464d195e3dafdf490c58869a301c87572b,2024-05-14T16:11:39.510000
|
||||||
CVE-2024-4482,0,1,eefc183aff4d36a44c2b3a173766fba4bf4f7bbebf2739a2af7c403553ee5888,2024-07-03T12:53:24.977000
|
CVE-2024-4482,0,0,eefc183aff4d36a44c2b3a173766fba4bf4f7bbebf2739a2af7c403553ee5888,2024-07-03T12:53:24.977000
|
||||||
CVE-2024-4484,0,0,72c4859b8727b60eeb9f8012483883c0571b4cb8b1cb2ce9a8b1f5e495641e3c,2024-05-24T13:03:05.093000
|
CVE-2024-4484,0,0,72c4859b8727b60eeb9f8012483883c0571b4cb8b1cb2ce9a8b1f5e495641e3c,2024-05-24T13:03:05.093000
|
||||||
CVE-2024-4485,0,0,856a7368e5f121163f839e4b6c92a8e77de213c5eccf98592455e970e028d37d,2024-05-24T13:03:05.093000
|
CVE-2024-4485,0,0,856a7368e5f121163f839e4b6c92a8e77de213c5eccf98592455e970e028d37d,2024-05-24T13:03:05.093000
|
||||||
CVE-2024-4486,0,0,da9bfd47ef59b3a57d52a6c66bb31a65c305ed47bc1cc335b2b3ca5ab24769e0,2024-05-24T01:15:30.977000
|
CVE-2024-4486,0,0,da9bfd47ef59b3a57d52a6c66bb31a65c305ed47bc1cc335b2b3ca5ab24769e0,2024-05-24T01:15:30.977000
|
||||||
@ -254584,7 +254588,7 @@ CVE-2024-4539,0,0,83e8dd6ad2ba7f5df744ac27f19ba7dd20f88687370090b4e13c20c65e81aa
|
|||||||
CVE-2024-4540,0,0,dc537153d649e10b7c874b04ae96fc2345a92f4b276e017e0d8b384efb35ed61,2024-06-03T23:15:08.930000
|
CVE-2024-4540,0,0,dc537153d649e10b7c874b04ae96fc2345a92f4b276e017e0d8b384efb35ed61,2024-06-03T23:15:08.930000
|
||||||
CVE-2024-4541,0,0,4a3da304d2331b57d3e541aebfe20ad4a144b63766e310ccc54304f1be43b1dd,2024-06-20T12:44:01.637000
|
CVE-2024-4541,0,0,4a3da304d2331b57d3e541aebfe20ad4a144b63766e310ccc54304f1be43b1dd,2024-06-20T12:44:01.637000
|
||||||
CVE-2024-4542,0,0,d17f875757344f90ad0b6ea46d223a5444286908c9043b3fba1504d3883c4c6d,2024-05-16T14:15:08.980000
|
CVE-2024-4542,0,0,d17f875757344f90ad0b6ea46d223a5444286908c9043b3fba1504d3883c4c6d,2024-05-16T14:15:08.980000
|
||||||
CVE-2024-4543,0,1,69391ca27ea6f73754fb8fe52f104143168f4fbeb7d93137e3866d4e169f292e,2024-07-03T12:53:24.977000
|
CVE-2024-4543,0,0,69391ca27ea6f73754fb8fe52f104143168f4fbeb7d93137e3866d4e169f292e,2024-07-03T12:53:24.977000
|
||||||
CVE-2024-4544,0,0,5a154bb8f5362adfa7d1d9ca8e07fcce2012291bc3a87e95a1b546af1c241c8c,2024-05-24T13:03:11.993000
|
CVE-2024-4544,0,0,5a154bb8f5362adfa7d1d9ca8e07fcce2012291bc3a87e95a1b546af1c241c8c,2024-05-24T13:03:11.993000
|
||||||
CVE-2024-4545,0,0,6a8513e5f42227bdebff4b9eb7cd99ee2da82484e9d02165945026400c877f9c,2024-05-14T16:11:39.510000
|
CVE-2024-4545,0,0,6a8513e5f42227bdebff4b9eb7cd99ee2da82484e9d02165945026400c877f9c,2024-05-14T16:11:39.510000
|
||||||
CVE-2024-4546,0,0,3d8214b19328ce0698128d2541020c31eac589ba32f1eccefac58acec39f32be,2024-05-16T13:03:05.353000
|
CVE-2024-4546,0,0,3d8214b19328ce0698128d2541020c31eac589ba32f1eccefac58acec39f32be,2024-05-16T13:03:05.353000
|
||||||
@ -254657,7 +254661,7 @@ CVE-2024-4622,0,0,4b1992fe33b227c66e64bdd4cf1c71e31b73a98abda6bdd8e7687e0db4e861
|
|||||||
CVE-2024-4623,0,0,47ffc2e7580d30150a9d70c6a59a76ed1e3bc3dd5141525204779a13dc1a77fb,2024-06-20T12:44:01.637000
|
CVE-2024-4623,0,0,47ffc2e7580d30150a9d70c6a59a76ed1e3bc3dd5141525204779a13dc1a77fb,2024-06-20T12:44:01.637000
|
||||||
CVE-2024-4624,0,0,2a601b2b9934f4e4184c90fc3ba9cbddeec712a59701e0372ed6d18cfcc3b7c7,2024-05-14T19:17:55.627000
|
CVE-2024-4624,0,0,2a601b2b9934f4e4184c90fc3ba9cbddeec712a59701e0372ed6d18cfcc3b7c7,2024-05-14T19:17:55.627000
|
||||||
CVE-2024-4626,0,0,f72dde4d01fdccbcae8f7fa43d1f4fdba6634ccf9a4eedc330d8e157eccf8120,2024-06-20T12:43:25.663000
|
CVE-2024-4626,0,0,f72dde4d01fdccbcae8f7fa43d1f4fdba6634ccf9a4eedc330d8e157eccf8120,2024-06-20T12:43:25.663000
|
||||||
CVE-2024-4627,0,0,54bd30bead354294b48fe249d643bc73bcc7d1380abeeb01ca2b741806fe2836,2024-07-03T02:07:51.527000
|
CVE-2024-4627,0,1,a94951b310ac8fa22dfdfb5dfa1a6f0b0e4706e2176059eb33a39431470f56d3,2024-07-03T15:45:08.187000
|
||||||
CVE-2024-4630,0,0,f5808b44be131bdae6b6920228d425b0dd235ef4afe8685cc2ea30d538a619f5,2024-05-14T16:11:39.510000
|
CVE-2024-4630,0,0,f5808b44be131bdae6b6920228d425b0dd235ef4afe8685cc2ea30d538a619f5,2024-05-14T16:11:39.510000
|
||||||
CVE-2024-4631,0,0,e8ed3d07eca49fd9ce5a62406bcf23da9793cbcc792a956665a267b4f25fd693,2024-05-14T15:44:13.487000
|
CVE-2024-4631,0,0,e8ed3d07eca49fd9ce5a62406bcf23da9793cbcc792a956665a267b4f25fd693,2024-05-14T15:44:13.487000
|
||||||
CVE-2024-4632,0,0,34df16eb26fbe037cb544d7499c4d02f03b9e69baf43a3990c97609a249304ed,2024-06-20T12:44:01.637000
|
CVE-2024-4632,0,0,34df16eb26fbe037cb544d7499c4d02f03b9e69baf43a3990c97609a249304ed,2024-06-20T12:44:01.637000
|
||||||
@ -254723,7 +254727,7 @@ CVE-2024-4704,0,0,9637a93e192a5f32142e05687e31ff3688b029254561fc4728d18bbfa1666d
|
|||||||
CVE-2024-4705,0,0,b45f335ad46575e30510e82573f02b490faa16d9b6ee89b66a9844ff390b53aa,2024-06-06T14:17:35.017000
|
CVE-2024-4705,0,0,b45f335ad46575e30510e82573f02b490faa16d9b6ee89b66a9844ff390b53aa,2024-06-06T14:17:35.017000
|
||||||
CVE-2024-4706,0,0,a959e13293b1a5966007eb60c79cb973f34e4d1d8bd1c12986cac54d81ac9a3d,2024-05-24T01:15:30.977000
|
CVE-2024-4706,0,0,a959e13293b1a5966007eb60c79cb973f34e4d1d8bd1c12986cac54d81ac9a3d,2024-05-24T01:15:30.977000
|
||||||
CVE-2024-4707,0,0,d6a01a1a459dfd9ab21945d56af40919cce44b311e282118c993194b130db955,2024-06-06T14:17:35.017000
|
CVE-2024-4707,0,0,d6a01a1a459dfd9ab21945d56af40919cce44b311e282118c993194b130db955,2024-06-06T14:17:35.017000
|
||||||
CVE-2024-4708,0,1,8cec8d3c98f03426276473bd86d4c40854969a664eb1a1ad68a38c039fa7f150,2024-07-03T12:53:24.977000
|
CVE-2024-4708,0,0,8cec8d3c98f03426276473bd86d4c40854969a664eb1a1ad68a38c039fa7f150,2024-07-03T12:53:24.977000
|
||||||
CVE-2024-4709,0,0,c27b22c30c2569acd5c758eb82bd584c5ae09da5862ed28e288bc8b8f592259a,2024-05-20T13:00:34.807000
|
CVE-2024-4709,0,0,c27b22c30c2569acd5c758eb82bd584c5ae09da5862ed28e288bc8b8f592259a,2024-05-20T13:00:34.807000
|
||||||
CVE-2024-4710,0,0,500a7d3af356181a474ebd9523b50fd3ae653f9a07ad01e5b7699589bd4ccc5d,2024-05-21T12:37:59.687000
|
CVE-2024-4710,0,0,500a7d3af356181a474ebd9523b50fd3ae653f9a07ad01e5b7699589bd4ccc5d,2024-05-21T12:37:59.687000
|
||||||
CVE-2024-4711,0,0,5c0c1fdafdfc7c3555551e67a6280882d1277b637b3ccb31a4bc6994c2c7441c,2024-06-03T14:46:24.250000
|
CVE-2024-4711,0,0,5c0c1fdafdfc7c3555551e67a6280882d1277b637b3ccb31a4bc6994c2c7441c,2024-06-03T14:46:24.250000
|
||||||
@ -255224,7 +255228,7 @@ CVE-2024-5345,0,0,6eb378e53e73ecd765d027e2916fd67b3a9d8ae24f673780d53a54e981925c
|
|||||||
CVE-2024-5346,0,0,c05bf26dcfcb17ea5e2642ece4ffc41fdd320d61cead8cd0f113cb8dff16ff08,2024-06-24T20:00:59.240000
|
CVE-2024-5346,0,0,c05bf26dcfcb17ea5e2642ece4ffc41fdd320d61cead8cd0f113cb8dff16ff08,2024-06-24T20:00:59.240000
|
||||||
CVE-2024-5347,0,0,1da2ccb898789a7c7262d2aa6524b222bbe92ed9796804e25855dd4dd20a5fae,2024-05-31T13:01:46.727000
|
CVE-2024-5347,0,0,1da2ccb898789a7c7262d2aa6524b222bbe92ed9796804e25855dd4dd20a5fae,2024-05-31T13:01:46.727000
|
||||||
CVE-2024-5348,0,0,cdabb7de233f48a7127c4333bb3ba86c3b13ada38da5d506ab1226337e3a511b,2024-06-03T14:46:24.250000
|
CVE-2024-5348,0,0,cdabb7de233f48a7127c4333bb3ba86c3b13ada38da5d506ab1226337e3a511b,2024-06-03T14:46:24.250000
|
||||||
CVE-2024-5349,0,0,d9c1031fed50c00ff212f0d63c2d8a2e426ecf9d35b8f18b93d3efe678c116af,2024-07-02T12:09:16.907000
|
CVE-2024-5349,0,1,095035450c60a13c08898917421d5656b2399179b1253e40806dcf47c3a4d9f7,2024-07-03T15:44:23.807000
|
||||||
CVE-2024-5350,0,0,60bbd22831ddecb115d40713a9dc768f9983e70563a63aa9f7486c68fbd4f9e1,2024-05-28T12:39:42.673000
|
CVE-2024-5350,0,0,60bbd22831ddecb115d40713a9dc768f9983e70563a63aa9f7486c68fbd4f9e1,2024-05-28T12:39:42.673000
|
||||||
CVE-2024-5351,0,0,849c563f6a9785a6decafe5b39b97f8dd3babada31dd9f1d8018a42e31dcbe7f,2024-06-04T19:21:05.570000
|
CVE-2024-5351,0,0,849c563f6a9785a6decafe5b39b97f8dd3babada31dd9f1d8018a42e31dcbe7f,2024-06-04T19:21:05.570000
|
||||||
CVE-2024-5352,0,0,8e62b3751e48149af890214c9d6b69b191b794c04287005ea69e03ffcccdf095,2024-06-21T18:15:11.303000
|
CVE-2024-5352,0,0,8e62b3751e48149af890214c9d6b69b191b794c04287005ea69e03ffcccdf095,2024-06-21T18:15:11.303000
|
||||||
@ -255288,7 +255292,7 @@ CVE-2024-5413,0,0,7e9a221441ea2188d01aa42e534f11d3e951030583aa76eb413a65755ac241
|
|||||||
CVE-2024-5414,0,0,faf8733c0a06d2e39229c90d7881f5076ce30b09e5d94ecd5fd2768bd6a1a3f5,2024-05-28T14:59:09.827000
|
CVE-2024-5414,0,0,faf8733c0a06d2e39229c90d7881f5076ce30b09e5d94ecd5fd2768bd6a1a3f5,2024-05-28T14:59:09.827000
|
||||||
CVE-2024-5415,0,0,e615267af075200e8a68eba737ca986180838ab470ec27ba44066223fc68c93f,2024-05-28T14:59:09.827000
|
CVE-2024-5415,0,0,e615267af075200e8a68eba737ca986180838ab470ec27ba44066223fc68c93f,2024-05-28T14:59:09.827000
|
||||||
CVE-2024-5418,0,0,34559e586e07e049a8a9a117bb9e7e6c096f39aba1e2b0a8b270afaa7cae4590,2024-05-31T13:01:46.727000
|
CVE-2024-5418,0,0,34559e586e07e049a8a9a117bb9e7e6c096f39aba1e2b0a8b270afaa7cae4590,2024-05-31T13:01:46.727000
|
||||||
CVE-2024-5419,0,0,ca56ebdbe0bec4ab68fa7131037a346882d6a83fcd3b933da3e72484dcb3a1c7,2024-07-02T12:09:16.907000
|
CVE-2024-5419,0,1,0d1c725f53c48278ea7823202c4adf24cf8a04c4aff5d8363f101c1d9f2798db,2024-07-03T15:43:09.450000
|
||||||
CVE-2024-5420,0,0,222f60409f504903340df1620dc6c61965c58fdcf056b93ed6f6eb922650d2fa,2024-06-10T18:15:38.367000
|
CVE-2024-5420,0,0,222f60409f504903340df1620dc6c61965c58fdcf056b93ed6f6eb922650d2fa,2024-06-10T18:15:38.367000
|
||||||
CVE-2024-5421,0,0,eeaae547052b8ba8c3bcc84128ffe19889621e4502681053a6fefc5f154f36a9,2024-06-10T18:15:38.447000
|
CVE-2024-5421,0,0,eeaae547052b8ba8c3bcc84128ffe19889621e4502681053a6fefc5f154f36a9,2024-06-10T18:15:38.447000
|
||||||
CVE-2024-5422,0,0,e03ce382c526ecd3bfff8f1e460f72d6c4cd6a77ce94308cc520da1bff4b9a65,2024-06-10T18:15:38.520000
|
CVE-2024-5422,0,0,e03ce382c526ecd3bfff8f1e460f72d6c4cd6a77ce94308cc520da1bff4b9a65,2024-06-10T18:15:38.520000
|
||||||
@ -255401,7 +255405,7 @@ CVE-2024-5598,0,0,dea97cf43130ffc7ec8c1e0439cc4a1d595d430c970e2a6bb452f71273924c
|
|||||||
CVE-2024-5599,0,0,e4d8d3217ca804a33354b51b54e1f3f41ce0e1fc1f554dedfe90ad1a46a87370,2024-06-11T18:24:39.057000
|
CVE-2024-5599,0,0,e4d8d3217ca804a33354b51b54e1f3f41ce0e1fc1f554dedfe90ad1a46a87370,2024-06-11T18:24:39.057000
|
||||||
CVE-2024-5601,0,0,e22064ef868b7763ab6a035a66dc94fbf47f776f059b7b471d5873c49e582f7a,2024-06-28T13:25:40.677000
|
CVE-2024-5601,0,0,e22064ef868b7763ab6a035a66dc94fbf47f776f059b7b471d5873c49e582f7a,2024-06-28T13:25:40.677000
|
||||||
CVE-2024-5605,0,0,4bb70fac398eb5e1fc6a3b8761dcfee9993510711b196c5d9f90dc1e34c785a3,2024-06-20T12:43:25.663000
|
CVE-2024-5605,0,0,4bb70fac398eb5e1fc6a3b8761dcfee9993510711b196c5d9f90dc1e34c785a3,2024-06-20T12:43:25.663000
|
||||||
CVE-2024-5606,0,0,67661dfc366570a7697ddfbe211235e18c34fcd62cf069ffa21e3dabe87c16a5,2024-07-02T12:09:16.907000
|
CVE-2024-5606,0,1,77ca044404d627b5230fd0abf899745b4715aa4e19e52966299c5c3e2cb213db,2024-07-03T15:45:19.513000
|
||||||
CVE-2024-5607,0,0,9601597658129a089207c1a0e7e7267aceda952302ad39754d738e7307549543,2024-06-07T14:56:05.647000
|
CVE-2024-5607,0,0,9601597658129a089207c1a0e7e7267aceda952302ad39754d738e7307549543,2024-06-07T14:56:05.647000
|
||||||
CVE-2024-5609,0,0,f28c83e3e9d04345913d36de3bfdbd0d644d73b3d20045d9399b3368319c8d47,2024-06-06T19:16:09.920000
|
CVE-2024-5609,0,0,f28c83e3e9d04345913d36de3bfdbd0d644d73b3d20045d9399b3368319c8d47,2024-06-06T19:16:09.920000
|
||||||
CVE-2024-5611,0,0,7f38716b1ccbe035f7f86ea6c7617ab6f4cac8651e00e7906bbdbf77091ab5a1,2024-06-17T12:42:04.623000
|
CVE-2024-5611,0,0,7f38716b1ccbe035f7f86ea6c7617ab6f4cac8651e00e7906bbdbf77091ab5a1,2024-06-17T12:42:04.623000
|
||||||
@ -255433,7 +255437,7 @@ CVE-2024-5663,0,0,e65ed9bd668d6456ce5b39954ddd0ae3860f1cde2bd069c4d43e4b56016278
|
|||||||
CVE-2024-5665,0,0,cf98b8118d31a45b868938fcf4b0239a4be77d7cb3995f06e552251067a9cecd,2024-06-11T17:47:45.033000
|
CVE-2024-5665,0,0,cf98b8118d31a45b868938fcf4b0239a4be77d7cb3995f06e552251067a9cecd,2024-06-11T17:47:45.033000
|
||||||
CVE-2024-5666,0,0,c2cb648af5be31cc7b97e094a0871dd39fea80d2d3a0f373e615f5ae502553a5,2024-07-01T12:37:24.220000
|
CVE-2024-5666,0,0,c2cb648af5be31cc7b97e094a0871dd39fea80d2d3a0f373e615f5ae502553a5,2024-07-01T12:37:24.220000
|
||||||
CVE-2024-5671,0,0,b302da9933b51baa02aebe638443397fc8a4c366af898c1301a8da6525832546,2024-06-17T12:42:04.623000
|
CVE-2024-5671,0,0,b302da9933b51baa02aebe638443397fc8a4c366af898c1301a8da6525832546,2024-06-17T12:42:04.623000
|
||||||
CVE-2024-5672,1,1,ea7898705d9632f8d927cb0e1e6a11530834ac1751da3472c25ad47a8dfbc839,2024-07-03T13:15:03.043000
|
CVE-2024-5672,0,0,ea7898705d9632f8d927cb0e1e6a11530834ac1751da3472c25ad47a8dfbc839,2024-07-03T13:15:03.043000
|
||||||
CVE-2024-5673,0,0,f6db27a8b7c99bb0a58922425d96edcb461eeb527f78adfd8d9aed9c99330140,2024-06-11T18:17:10.037000
|
CVE-2024-5673,0,0,f6db27a8b7c99bb0a58922425d96edcb461eeb527f78adfd8d9aed9c99330140,2024-06-11T18:17:10.037000
|
||||||
CVE-2024-5674,0,0,69b0f5cdcc6414c1b3093ac76e322fc42e17eb869b8f1b328084f458395232cf,2024-06-13T18:36:09.010000
|
CVE-2024-5674,0,0,69b0f5cdcc6414c1b3093ac76e322fc42e17eb869b8f1b328084f458395232cf,2024-06-13T18:36:09.010000
|
||||||
CVE-2024-5675,0,0,c04fc1bf8ef6e3f232c30ddf0bd6a524958c9eab63fe205331e1fedef14ccf13,2024-06-11T18:14:02.017000
|
CVE-2024-5675,0,0,c04fc1bf8ef6e3f232c30ddf0bd6a524958c9eab63fe205331e1fedef14ccf13,2024-06-11T18:14:02.017000
|
||||||
@ -255470,9 +255474,9 @@ CVE-2024-5731,0,0,f8f18711dc1e7684e37f428b0d6e39ca275690790dad9599ea32c8e89b131e
|
|||||||
CVE-2024-5732,0,0,2b69cb5542c2f91e3e2021ac007049b3634a9137bdf0c325241236594abc7cc6,2024-06-11T17:57:13.767000
|
CVE-2024-5732,0,0,2b69cb5542c2f91e3e2021ac007049b3634a9137bdf0c325241236594abc7cc6,2024-06-11T17:57:13.767000
|
||||||
CVE-2024-5733,0,0,78152e13cdabf162486c62849d39e4c95e26727ad5623fb603c3826108c4ab9b,2024-06-11T18:30:50.690000
|
CVE-2024-5733,0,0,78152e13cdabf162486c62849d39e4c95e26727ad5623fb603c3826108c4ab9b,2024-06-11T18:30:50.690000
|
||||||
CVE-2024-5734,0,0,42e64867c1cdebe5031caec9548ec6393cd9bc290658f317ad4788de56fd156c,2024-06-11T18:30:16.727000
|
CVE-2024-5734,0,0,42e64867c1cdebe5031caec9548ec6393cd9bc290658f317ad4788de56fd156c,2024-06-11T18:30:16.727000
|
||||||
CVE-2024-5735,0,0,cc0561f495bade816cdeaced53011b07f3cb6a0e24901667ac6b88439c52c12a,2024-06-28T13:38:47.077000
|
CVE-2024-5735,0,1,5164f7c1a233150ee53341ccee6b477fac348115ef4d5352757fe303df2f5a54,2024-07-03T15:45:57.677000
|
||||||
CVE-2024-5736,0,0,525c83f0d9c4bb50f89240615c5f2211bfd076d0392343c37d0ccb4f622d76cb,2024-06-28T13:38:47.077000
|
CVE-2024-5736,0,1,542f55758b5fdb7d00740d25c91b14abb056e9aea19176254ebe8a8a94099d0d,2024-07-03T15:46:08.877000
|
||||||
CVE-2024-5737,0,0,33e4dfb4b6ecc95a25b3463ae07a17fb1eb0a57cb72699fc113aff6b8c2d0ea5,2024-06-28T13:38:47.077000
|
CVE-2024-5737,0,1,d0320412366343a8bfdfa83f09ec33ad8bab76c39c727d4c2240c621c15a4ff2,2024-07-03T14:09:22.483000
|
||||||
CVE-2024-5739,0,0,4e4cf687173db1796e93002e6527d7eafacb6ad9e3e1f9441d82638a10b1e4ca,2024-06-13T18:36:09.013000
|
CVE-2024-5739,0,0,4e4cf687173db1796e93002e6527d7eafacb6ad9e3e1f9441d82638a10b1e4ca,2024-06-13T18:36:09.013000
|
||||||
CVE-2024-5741,0,0,d3e87c617441ebc91021d514ecbbaffa42c181f23db631a685b052a1b8e8e820,2024-06-17T12:42:04.623000
|
CVE-2024-5741,0,0,d3e87c617441ebc91021d514ecbbaffa42c181f23db631a685b052a1b8e8e820,2024-06-17T12:42:04.623000
|
||||||
CVE-2024-5742,0,0,a52d500d47b6c5d306e493aed82844a67ba1ec935bd3dcc9d1575df0fba9dc97,2024-06-17T12:15:49.850000
|
CVE-2024-5742,0,0,a52d500d47b6c5d306e493aed82844a67ba1ec935bd3dcc9d1575df0fba9dc97,2024-06-17T12:15:49.850000
|
||||||
@ -255487,7 +255491,7 @@ CVE-2024-5758,0,0,250b274bfcefb72defbd26103c82d5c8ed585b7571d3785565c3013fdb6e4a
|
|||||||
CVE-2024-5759,0,0,a8b20ed9df5a502bc1dbe4283a67eed19771ffb4a4f02a90724215ed5101a898,2024-06-13T18:36:09.010000
|
CVE-2024-5759,0,0,a8b20ed9df5a502bc1dbe4283a67eed19771ffb4a4f02a90724215ed5101a898,2024-06-13T18:36:09.010000
|
||||||
CVE-2024-5761,0,0,e0022a8d80317cd3941058bae14b514f68707790a5051038049a1d552ba8de69,2024-06-07T19:15:24.467000
|
CVE-2024-5761,0,0,e0022a8d80317cd3941058bae14b514f68707790a5051038049a1d552ba8de69,2024-06-07T19:15:24.467000
|
||||||
CVE-2024-5766,0,0,f4f0065e1ad74a475f6d00e1f328df39da374dfe97f7b4c54df1858a2ce42e5e,2024-06-10T02:52:08.267000
|
CVE-2024-5766,0,0,f4f0065e1ad74a475f6d00e1f328df39da374dfe97f7b4c54df1858a2ce42e5e,2024-06-10T02:52:08.267000
|
||||||
CVE-2024-5767,0,0,2cdcdd5f8fd65e586a4117744c4cc9c0fa1bd1cd4ae542b2fabb912f848a248c,2024-07-02T12:09:16.907000
|
CVE-2024-5767,0,1,23a2de5cc642d98e40b9cd54645c60f113c9b3696a937d49f8d435c3dba338d7,2024-07-03T15:26:29.050000
|
||||||
CVE-2024-5768,0,0,4723f0c08a5f7c047718f7b87ad6f2c66db14b3e8d318e841a1bb9034ace5943,2024-06-20T12:44:01.637000
|
CVE-2024-5768,0,0,4723f0c08a5f7c047718f7b87ad6f2c66db14b3e8d318e841a1bb9034ace5943,2024-06-20T12:44:01.637000
|
||||||
CVE-2024-5770,0,0,25b3f0241d69604556f37a6471fa9a6892ce290ef4b03f2d5525dd585c681fcd,2024-06-10T02:52:08.267000
|
CVE-2024-5770,0,0,25b3f0241d69604556f37a6471fa9a6892ce290ef4b03f2d5525dd585c681fcd,2024-06-10T02:52:08.267000
|
||||||
CVE-2024-5771,0,0,378b86ddb7266a39f3407b18465f75a96b2cb76a6e911ad726ef8ee0f827d15d,2024-06-10T02:52:08.267000
|
CVE-2024-5771,0,0,378b86ddb7266a39f3407b18465f75a96b2cb76a6e911ad726ef8ee0f827d15d,2024-06-10T02:52:08.267000
|
||||||
@ -255635,6 +255639,7 @@ CVE-2024-6046,0,0,91371f2b9afd0a654dc4dc6a88ac5fb04a186cb82713804dda3cac2d7733c3
|
|||||||
CVE-2024-6047,0,0,4cdf0f1acff12373f8f857c8d442b9de2221d44745323cc3f60bf66bccd7a239,2024-06-17T14:15:13.040000
|
CVE-2024-6047,0,0,4cdf0f1acff12373f8f857c8d442b9de2221d44745323cc3f60bf66bccd7a239,2024-06-17T14:15:13.040000
|
||||||
CVE-2024-6048,0,0,03e9485ef23720c113f11fed6c539200d9a1624e025ca24798cddf9d0c1a9e3b,2024-06-17T12:42:04.623000
|
CVE-2024-6048,0,0,03e9485ef23720c113f11fed6c539200d9a1624e025ca24798cddf9d0c1a9e3b,2024-06-17T12:42:04.623000
|
||||||
CVE-2024-6050,0,0,304778e708041d822ddb3dbacfa423baa973c842b9b5dea1cb2a29aed7ec7b6d,2024-07-01T16:37:39.040000
|
CVE-2024-6050,0,0,304778e708041d822ddb3dbacfa423baa973c842b9b5dea1cb2a29aed7ec7b6d,2024-07-01T16:37:39.040000
|
||||||
|
CVE-2024-6052,1,1,043613cf1c108efd4df1b8c641fcfc3aae24d3f12d61f8d9bc4d4a8136d4a5d2,2024-07-03T15:15:06.223000
|
||||||
CVE-2024-6054,0,0,dbd3e49036b5938301871d5a6c67ee17ba89370e3288082b00ca89a51a1f06ed,2024-06-28T13:11:58.810000
|
CVE-2024-6054,0,0,dbd3e49036b5938301871d5a6c67ee17ba89370e3288082b00ca89a51a1f06ed,2024-06-28T13:11:58.810000
|
||||||
CVE-2024-6055,0,0,7490ef4c1367b62a13fc44ec964fb12263f9fa479e5bd4bbc3820296c19002e0,2024-06-20T12:44:22.977000
|
CVE-2024-6055,0,0,7490ef4c1367b62a13fc44ec964fb12263f9fa479e5bd4bbc3820296c19002e0,2024-06-20T12:44:22.977000
|
||||||
CVE-2024-6056,0,0,9210a6d5e69cda44c36495fe4964320c8f6a47f4e723a559827fc7a6d2ee595f,2024-06-20T12:44:22.977000
|
CVE-2024-6056,0,0,9210a6d5e69cda44c36495fe4964320c8f6a47f4e723a559827fc7a6d2ee595f,2024-06-20T12:44:22.977000
|
||||||
@ -255675,6 +255680,7 @@ CVE-2024-6115,0,0,3c5ab17ce7a1f33a2dee71d5335f67c2e99b7d6204dc28e4e10a70d6ca6b07
|
|||||||
CVE-2024-6116,0,0,5843dd08daba10a4f1c43a634f4172ccf9c702c464ac49dc5f784b4aa5e3fcb5,2024-06-20T12:44:01.637000
|
CVE-2024-6116,0,0,5843dd08daba10a4f1c43a634f4172ccf9c702c464ac49dc5f784b4aa5e3fcb5,2024-06-20T12:44:01.637000
|
||||||
CVE-2024-6120,0,0,5c59cd273da1e2ed6c553cf441ff0a5530e8c4d18132ff0e8595e05e3633cb46,2024-06-24T20:03:04.363000
|
CVE-2024-6120,0,0,5c59cd273da1e2ed6c553cf441ff0a5530e8c4d18132ff0e8595e05e3633cb46,2024-06-24T20:03:04.363000
|
||||||
CVE-2024-6125,0,0,85b92914638eb24a081146fd823c584c2333b183768ef26d618955e83646311b,2024-06-20T12:44:01.637000
|
CVE-2024-6125,0,0,85b92914638eb24a081146fd823c584c2333b183768ef26d618955e83646311b,2024-06-20T12:44:01.637000
|
||||||
|
CVE-2024-6126,1,1,eac314364b69d7994f4911171bc2b4c5e18e3a158bd0616141df97bd068d1e38,2024-07-03T15:15:06.470000
|
||||||
CVE-2024-6127,0,0,8f3f3591469382ebb006087ec5b5be799ca274948ebd71b090f997c1ae2c89a9,2024-06-28T10:27:00.920000
|
CVE-2024-6127,0,0,8f3f3591469382ebb006087ec5b5be799ca274948ebd71b090f997c1ae2c89a9,2024-06-28T10:27:00.920000
|
||||||
CVE-2024-6128,0,0,cd2531d89b3a76f4be34b5ead44f5b65458326ae9dfb5c97dcd0243e237eb5b3,2024-06-21T16:15:12.570000
|
CVE-2024-6128,0,0,cd2531d89b3a76f4be34b5ead44f5b65458326ae9dfb5c97dcd0243e237eb5b3,2024-06-21T16:15:12.570000
|
||||||
CVE-2024-6129,0,0,dfa20fd20a0a3099fcdc2f66c56de27040819ee45bd7efe66cb95f894b77d645,2024-06-20T12:44:01.637000
|
CVE-2024-6129,0,0,dfa20fd20a0a3099fcdc2f66c56de27040819ee45bd7efe66cb95f894b77d645,2024-06-20T12:44:01.637000
|
||||||
@ -255731,7 +255737,7 @@ CVE-2024-6252,0,0,468e259f2025efbae92579ad89a45c9f2c8b2e33c6f209272de57a1e66debc
|
|||||||
CVE-2024-6253,0,0,a6e4514e5a27665a5cb6260b36ae56e5c2da14fd9a2d1da643a44ff2f3f2cb21,2024-06-25T18:15:12
|
CVE-2024-6253,0,0,a6e4514e5a27665a5cb6260b36ae56e5c2da14fd9a2d1da643a44ff2f3f2cb21,2024-06-25T18:15:12
|
||||||
CVE-2024-6257,0,0,2981da6c17c705bcf0d80e44b1fa14b0c6655b2077fb275b971c6bc5c7c2b720,2024-06-25T18:50:42.040000
|
CVE-2024-6257,0,0,2981da6c17c705bcf0d80e44b1fa14b0c6655b2077fb275b971c6bc5c7c2b720,2024-06-25T18:50:42.040000
|
||||||
CVE-2024-6262,0,0,f703f7a7fbd3e1fe9efa1e5946752e209a081bf36124182aca731e3f05a363a4,2024-06-27T12:47:19.847000
|
CVE-2024-6262,0,0,f703f7a7fbd3e1fe9efa1e5946752e209a081bf36124182aca731e3f05a363a4,2024-06-27T12:47:19.847000
|
||||||
CVE-2024-6263,0,1,eef514c44d6052a87015ac43d52225e5228d7c5e601a8a4d2fb9447b4977342f,2024-07-03T12:53:24.977000
|
CVE-2024-6263,0,0,eef514c44d6052a87015ac43d52225e5228d7c5e601a8a4d2fb9447b4977342f,2024-07-03T12:53:24.977000
|
||||||
CVE-2024-6264,0,0,f9ab73ef94330a3cc9bcff915e884763c0b072f9f74618431a2c7d5cbe25dc82,2024-07-02T17:57:31.737000
|
CVE-2024-6264,0,0,f9ab73ef94330a3cc9bcff915e884763c0b072f9f74618431a2c7d5cbe25dc82,2024-07-02T17:57:31.737000
|
||||||
CVE-2024-6265,0,0,dd53419ac5d71f3843314be14fea17b7338fd9f39ae5539064d4c12df7d66cd7,2024-07-01T12:37:24.220000
|
CVE-2024-6265,0,0,dd53419ac5d71f3843314be14fea17b7338fd9f39ae5539064d4c12df7d66cd7,2024-07-01T12:37:24.220000
|
||||||
CVE-2024-6266,0,0,f14331da5cd861226d53e015f2a1f08c9e1d5e7f7b1b843a3feb7cb151cc145a,2024-06-24T12:57:36.513000
|
CVE-2024-6266,0,0,f14331da5cd861226d53e015f2a1f08c9e1d5e7f7b1b843a3feb7cb151cc145a,2024-06-24T12:57:36.513000
|
||||||
@ -255768,7 +255774,7 @@ CVE-2024-6306,0,0,711bff153bb36aca97259b9a58665f79686710d592de1aed3b99962d3c3067
|
|||||||
CVE-2024-6307,0,0,a6037df0fa8617c9aaeffdc703000fa7423e885d439338f30eb38eb0279e87b9,2024-06-28T13:15:03.453000
|
CVE-2024-6307,0,0,a6037df0fa8617c9aaeffdc703000fa7423e885d439338f30eb38eb0279e87b9,2024-06-28T13:15:03.453000
|
||||||
CVE-2024-6308,0,0,483bab7c0040f40965fba497a0be9e45fef6974a263c54d39149185a218f4b43,2024-06-25T21:16:02.087000
|
CVE-2024-6308,0,0,483bab7c0040f40965fba497a0be9e45fef6974a263c54d39149185a218f4b43,2024-06-25T21:16:02.087000
|
||||||
CVE-2024-6323,0,0,16f93962f537d8478d96317e8b0d9cad0e3aee225ed0ebdb8d6f6bf214bb804e,2024-06-28T13:15:19.317000
|
CVE-2024-6323,0,0,16f93962f537d8478d96317e8b0d9cad0e3aee225ed0ebdb8d6f6bf214bb804e,2024-06-28T13:15:19.317000
|
||||||
CVE-2024-6340,0,1,bb1108ed10839a26b4c1dc57d9b0dce8e4cd3d484be78fa39962e8c27bf9bdb2,2024-07-03T12:53:24.977000
|
CVE-2024-6340,0,0,bb1108ed10839a26b4c1dc57d9b0dce8e4cd3d484be78fa39962e8c27bf9bdb2,2024-07-03T12:53:24.977000
|
||||||
CVE-2024-6341,0,0,528f4fdde1526d72477e90a767b2f2316b168f65b64effeddb9446d8a5cdcaf5,2024-07-02T18:15:03.900000
|
CVE-2024-6341,0,0,528f4fdde1526d72477e90a767b2f2316b168f65b64effeddb9446d8a5cdcaf5,2024-07-02T18:15:03.900000
|
||||||
CVE-2024-6344,0,0,f8fe072181ab91a453822e0b523eb31f74817bc4efb68c7d2134a2d41a8e3557,2024-06-27T00:15:13.360000
|
CVE-2024-6344,0,0,f8fe072181ab91a453822e0b523eb31f74817bc4efb68c7d2134a2d41a8e3557,2024-06-27T00:15:13.360000
|
||||||
CVE-2024-6349,0,0,f01d61e3475192c945ec3639c2eda3b231a23d2f279c2f15b4719385fb2bd065,2024-06-26T15:15:20.690000
|
CVE-2024-6349,0,0,f01d61e3475192c945ec3639c2eda3b231a23d2f279c2f15b4719385fb2bd065,2024-06-26T15:15:20.690000
|
||||||
@ -255783,11 +255789,11 @@ CVE-2024-6371,0,0,4c649bc248258025ed325d77948a1f8525c46141bb22c90a65b416ad94095e
|
|||||||
CVE-2024-6372,0,0,ec8243842e1fb3e0d20056a877723ac3e2b0533a4741cd15fbbcbf6a553aa1c3,2024-06-27T17:11:52.390000
|
CVE-2024-6372,0,0,ec8243842e1fb3e0d20056a877723ac3e2b0533a4741cd15fbbcbf6a553aa1c3,2024-06-27T17:11:52.390000
|
||||||
CVE-2024-6373,0,0,ffc7549884eeecbe338ce0f17f670d62abf2209962cbc27b0291f9ddbed7c163,2024-06-27T18:15:22.280000
|
CVE-2024-6373,0,0,ffc7549884eeecbe338ce0f17f670d62abf2209962cbc27b0291f9ddbed7c163,2024-06-27T18:15:22.280000
|
||||||
CVE-2024-6374,0,0,951e3f10ed1a8de2c137bcf7721b529de76cab1c6430f8094753092eaf9ecd40,2024-06-27T17:11:52.390000
|
CVE-2024-6374,0,0,951e3f10ed1a8de2c137bcf7721b529de76cab1c6430f8094753092eaf9ecd40,2024-06-27T17:11:52.390000
|
||||||
CVE-2024-6375,0,0,63966b93eb46e16d023260fad8c0d7013b7249b4716b3dc1473565015805b694,2024-07-01T16:37:39.040000
|
CVE-2024-6375,0,1,2086f7a0dc16d184277c490b35389aec9b32cc5c6b68030b97b503ee789a3958,2024-07-03T14:54:52.427000
|
||||||
CVE-2024-6376,0,0,5b1144f575b26ee71024cb47efd50b0c100b6444589a68c6e121da4ff25018c3,2024-07-01T16:37:39.040000
|
CVE-2024-6376,0,1,2eceea6553f0e47a0e34ab01650b7781a20682f6799be39f9cd1e64f3f19856f,2024-07-03T15:04:52.463000
|
||||||
CVE-2024-6381,0,1,2822fb12d769fe1cca32125b45cae52ba3e5807419213b6087c6db8de8d2b326,2024-07-03T12:53:24.977000
|
CVE-2024-6381,0,0,2822fb12d769fe1cca32125b45cae52ba3e5807419213b6087c6db8de8d2b326,2024-07-03T12:53:24.977000
|
||||||
CVE-2024-6382,0,1,9f140af24f460b4413fa844f95383cc153754360a136939b8743c2d8327ebf99,2024-07-03T12:53:24.977000
|
CVE-2024-6382,0,0,9f140af24f460b4413fa844f95383cc153754360a136939b8743c2d8327ebf99,2024-07-03T12:53:24.977000
|
||||||
CVE-2024-6387,0,1,e6a56f8a69b7b260ae53a144224efd4334f1883c642273209a623900a790dcba,2024-07-03T13:15:03.493000
|
CVE-2024-6387,0,0,e6a56f8a69b7b260ae53a144224efd4334f1883c642273209a623900a790dcba,2024-07-03T13:15:03.493000
|
||||||
CVE-2024-6388,0,0,e641c9d869769d4291da87145b48d15b4f200c046d6b100142bc686375a84738,2024-06-27T17:11:52.390000
|
CVE-2024-6388,0,0,e641c9d869769d4291da87145b48d15b4f200c046d6b100142bc686375a84738,2024-06-27T17:11:52.390000
|
||||||
CVE-2024-6402,0,0,795485c4534407e246daec51c1daaa33b95f6651688fed743a8fb9054cdaedba,2024-07-01T12:37:24.220000
|
CVE-2024-6402,0,0,795485c4534407e246daec51c1daaa33b95f6651688fed743a8fb9054cdaedba,2024-07-01T12:37:24.220000
|
||||||
CVE-2024-6403,0,0,e44b9cfa8d9ae367e624a8cdf179ef52ea1e98c2115d7a956299d17747a6a56b,2024-07-01T12:37:24.220000
|
CVE-2024-6403,0,0,e44b9cfa8d9ae367e624a8cdf179ef52ea1e98c2115d7a956299d17747a6a56b,2024-07-01T12:37:24.220000
|
||||||
@ -255800,14 +255806,15 @@ CVE-2024-6418,0,0,b63bb78bc20fc7c9074df0590cf44ede2aa2ea9145f7e2ea976342cbbc9ede
|
|||||||
CVE-2024-6419,0,0,e1f22570d75c49fa5726171947ce4e56ea60b543707fecfaebe18f84b2ff48d5,2024-07-01T12:37:24.220000
|
CVE-2024-6419,0,0,e1f22570d75c49fa5726171947ce4e56ea60b543707fecfaebe18f84b2ff48d5,2024-07-01T12:37:24.220000
|
||||||
CVE-2024-6424,0,0,8d5a2fd0dee2ac07d57032a1c81c2c412cad276a027b89c1b7d3574f7c28481d,2024-07-01T16:37:39.040000
|
CVE-2024-6424,0,0,8d5a2fd0dee2ac07d57032a1c81c2c412cad276a027b89c1b7d3574f7c28481d,2024-07-01T16:37:39.040000
|
||||||
CVE-2024-6425,0,0,adbfecb8c3cc947ec785870957655621e37e6a4ecfa332482b1b765f471fc897,2024-07-01T16:37:39.040000
|
CVE-2024-6425,0,0,adbfecb8c3cc947ec785870957655621e37e6a4ecfa332482b1b765f471fc897,2024-07-01T16:37:39.040000
|
||||||
CVE-2024-6426,1,1,743cead7bfbb6d52b9a38edd8f28e270cc396ea75af77fc494cdf15f853aedb8,2024-07-03T12:53:24.977000
|
CVE-2024-6426,0,0,743cead7bfbb6d52b9a38edd8f28e270cc396ea75af77fc494cdf15f853aedb8,2024-07-03T12:53:24.977000
|
||||||
CVE-2024-6427,1,1,57065ff923a64c20753385de741e3156cf426d3558cd727998195d1e669fe19f,2024-07-03T12:53:24.977000
|
CVE-2024-6427,0,0,57065ff923a64c20753385de741e3156cf426d3558cd727998195d1e669fe19f,2024-07-03T12:53:24.977000
|
||||||
CVE-2024-6428,0,1,31d69642490b0b5c14fae0235cb6cc8aea9d2d4868dab2c3323c281656122a48,2024-07-03T12:53:24.977000
|
CVE-2024-6428,0,0,31d69642490b0b5c14fae0235cb6cc8aea9d2d4868dab2c3323c281656122a48,2024-07-03T12:53:24.977000
|
||||||
CVE-2024-6438,0,0,c89c4e3ccf031fb42672508ffc0236a74fd652409f3f814c1aa7277296a22143,2024-07-02T17:54:02.370000
|
CVE-2024-6438,0,0,c89c4e3ccf031fb42672508ffc0236a74fd652409f3f814c1aa7277296a22143,2024-07-02T17:54:02.370000
|
||||||
CVE-2024-6439,0,0,1bd5e2a149e15b87b2ec1d9e23e870c4f5a97c502c5089c3f0a60fbd028209c7,2024-07-02T17:58:39.773000
|
CVE-2024-6439,0,0,1bd5e2a149e15b87b2ec1d9e23e870c4f5a97c502c5089c3f0a60fbd028209c7,2024-07-02T17:58:39.773000
|
||||||
CVE-2024-6440,0,0,4db20ef0878ff896f7a92a0fb63819a7fd586b5cd61940caee4cf26cda6cf8f9,2024-07-02T17:58:15.410000
|
CVE-2024-6440,0,0,4db20ef0878ff896f7a92a0fb63819a7fd586b5cd61940caee4cf26cda6cf8f9,2024-07-02T17:58:15.410000
|
||||||
CVE-2024-6441,0,0,fadd9560f894739af460dd107a14c73f394f82b357796461abb110045106f46c,2024-07-02T17:44:45.700000
|
CVE-2024-6441,0,0,fadd9560f894739af460dd107a14c73f394f82b357796461abb110045106f46c,2024-07-02T17:44:45.700000
|
||||||
CVE-2024-6452,0,1,c694c1bdf54902e69172121aae2a54d0747cfc16750499c01d3cf3c9c6ef3263,2024-07-03T12:53:24.977000
|
CVE-2024-6452,0,0,c694c1bdf54902e69172121aae2a54d0747cfc16750499c01d3cf3c9c6ef3263,2024-07-03T12:53:24.977000
|
||||||
CVE-2024-6453,0,1,f8f94ef1371b1813320fb500c8f5a2a5c78562059f37a370c24f1cfd03cdaa59,2024-07-03T12:53:24.977000
|
CVE-2024-6453,0,0,f8f94ef1371b1813320fb500c8f5a2a5c78562059f37a370c24f1cfd03cdaa59,2024-07-03T12:53:24.977000
|
||||||
CVE-2024-6469,0,1,af3fa5ade340d0b228353896e96620b5cb15d570ccca154043a04cdd86241984,2024-07-03T12:53:24.977000
|
CVE-2024-6469,0,0,af3fa5ade340d0b228353896e96620b5cb15d570ccca154043a04cdd86241984,2024-07-03T12:53:24.977000
|
||||||
CVE-2024-6470,1,1,758942473ba4664d9706c7b27089a9d538cad027719295d3c67dfb54a747e72b,2024-07-03T13:15:03.703000
|
CVE-2024-6470,0,0,758942473ba4664d9706c7b27089a9d538cad027719295d3c67dfb54a747e72b,2024-07-03T13:15:03.703000
|
||||||
|
CVE-2024-6471,1,1,33db1e0271959450d1204c1eba113a94befddf6a5610d2c3f2f72d1021d9b28f,2024-07-03T14:15:06.490000
|
||||||
|
Can't render this file because it is too large.
|
Loading…
x
Reference in New Issue
Block a user