Auto-Update: 2024-07-03T16:01:48.944347+00:00

This commit is contained in:
cad-safe-bot 2024-07-03 16:04:42 +00:00
parent 649cc54acc
commit 35d2420c82
54 changed files with 2370 additions and 347 deletions

View File

@ -2,8 +2,9 @@
"id": "CVE-2016-7515", "id": "CVE-2016-7515",
"sourceIdentifier": "security@debian.org", "sourceIdentifier": "security@debian.org",
"published": "2017-04-19T14:59:00.270", "published": "2017-04-19T14:59:00.270",
"lastModified": "2017-05-09T12:40:02.777", "lastModified": "2024-07-03T15:16:39.567",
"vulnStatus": "Analyzed", "vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",
@ -15,13 +16,13 @@
} }
], ],
"metrics": { "metrics": {
"cvssMetricV30": [ "cvssMetricV31": [
{ {
"source": "nvd@nist.gov", "source": "nvd@nist.gov",
"type": "Primary", "type": "Primary",
"cvssData": { "cvssData": {
"version": "3.0", "version": "3.1",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"attackVector": "NETWORK", "attackVector": "NETWORK",
"attackComplexity": "LOW", "attackComplexity": "LOW",
"privilegesRequired": "NONE", "privilegesRequired": "NONE",
@ -84,8 +85,9 @@
"cpeMatch": [ "cpeMatch": [
{ {
"vulnerable": true, "vulnerable": true,
"criteria": "cpe:2.3:a:imagemagick:imagemagick:-:*:*:*:*:*:*:*", "criteria": "cpe:2.3:a:imagemagick:imagemagick:*:*:*:*:*:*:*:*",
"matchCriteriaId": "6E6BE7A5-6FF7-4916-B671-9EE11CA54F65" "versionEndExcluding": "6.9.4-0",
"matchCriteriaId": "CFC2C780-A54E-4426-9C52-46A20216339E"
} }
] ]
} }

View File

@ -2,8 +2,9 @@
"id": "CVE-2016-7516", "id": "CVE-2016-7516",
"sourceIdentifier": "security@debian.org", "sourceIdentifier": "security@debian.org",
"published": "2017-04-20T18:59:00.937", "published": "2017-04-20T18:59:00.937",
"lastModified": "2017-05-09T12:40:00.260", "lastModified": "2024-07-03T15:23:36.440",
"vulnStatus": "Analyzed", "vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",
@ -15,13 +16,13 @@
} }
], ],
"metrics": { "metrics": {
"cvssMetricV30": [ "cvssMetricV31": [
{ {
"source": "nvd@nist.gov", "source": "nvd@nist.gov",
"type": "Primary", "type": "Primary",
"cvssData": { "cvssData": {
"version": "3.0", "version": "3.1",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"attackVector": "NETWORK", "attackVector": "NETWORK",
"attackComplexity": "LOW", "attackComplexity": "LOW",
"privilegesRequired": "NONE", "privilegesRequired": "NONE",
@ -84,8 +85,9 @@
"cpeMatch": [ "cpeMatch": [
{ {
"vulnerable": true, "vulnerable": true,
"criteria": "cpe:2.3:a:imagemagick:imagemagick:-:*:*:*:*:*:*:*", "criteria": "cpe:2.3:a:imagemagick:imagemagick:*:*:*:*:*:*:*:*",
"matchCriteriaId": "6E6BE7A5-6FF7-4916-B671-9EE11CA54F65" "versionEndExcluding": "6.9.4-0",
"matchCriteriaId": "CFC2C780-A54E-4426-9C52-46A20216339E"
} }
] ]
} }

View File

@ -2,8 +2,9 @@
"id": "CVE-2016-7517", "id": "CVE-2016-7517",
"sourceIdentifier": "security@debian.org", "sourceIdentifier": "security@debian.org",
"published": "2017-04-20T18:59:00.967", "published": "2017-04-20T18:59:00.967",
"lastModified": "2017-05-09T12:39:56.680", "lastModified": "2024-07-03T15:17:05.433",
"vulnStatus": "Analyzed", "vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",
@ -15,13 +16,13 @@
} }
], ],
"metrics": { "metrics": {
"cvssMetricV30": [ "cvssMetricV31": [
{ {
"source": "nvd@nist.gov", "source": "nvd@nist.gov",
"type": "Primary", "type": "Primary",
"cvssData": { "cvssData": {
"version": "3.0", "version": "3.1",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"attackVector": "NETWORK", "attackVector": "NETWORK",
"attackComplexity": "LOW", "attackComplexity": "LOW",
"privilegesRequired": "NONE", "privilegesRequired": "NONE",
@ -84,8 +85,9 @@
"cpeMatch": [ "cpeMatch": [
{ {
"vulnerable": true, "vulnerable": true,
"criteria": "cpe:2.3:a:imagemagick:imagemagick:-:*:*:*:*:*:*:*", "criteria": "cpe:2.3:a:imagemagick:imagemagick:*:*:*:*:*:*:*:*",
"matchCriteriaId": "6E6BE7A5-6FF7-4916-B671-9EE11CA54F65" "versionEndExcluding": "6.9.4-0",
"matchCriteriaId": "CFC2C780-A54E-4426-9C52-46A20216339E"
} }
] ]
} }

View File

@ -2,8 +2,9 @@
"id": "CVE-2016-7518", "id": "CVE-2016-7518",
"sourceIdentifier": "security@debian.org", "sourceIdentifier": "security@debian.org",
"published": "2017-04-20T18:59:01.013", "published": "2017-04-20T18:59:01.013",
"lastModified": "2017-05-09T12:39:53.323", "lastModified": "2024-07-03T15:24:22.567",
"vulnStatus": "Analyzed", "vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",
@ -15,13 +16,13 @@
} }
], ],
"metrics": { "metrics": {
"cvssMetricV30": [ "cvssMetricV31": [
{ {
"source": "nvd@nist.gov", "source": "nvd@nist.gov",
"type": "Primary", "type": "Primary",
"cvssData": { "cvssData": {
"version": "3.0", "version": "3.1",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"attackVector": "NETWORK", "attackVector": "NETWORK",
"attackComplexity": "LOW", "attackComplexity": "LOW",
"privilegesRequired": "NONE", "privilegesRequired": "NONE",
@ -84,8 +85,9 @@
"cpeMatch": [ "cpeMatch": [
{ {
"vulnerable": true, "vulnerable": true,
"criteria": "cpe:2.3:a:imagemagick:imagemagick:-:*:*:*:*:*:*:*", "criteria": "cpe:2.3:a:imagemagick:imagemagick:*:*:*:*:*:*:*:*",
"matchCriteriaId": "6E6BE7A5-6FF7-4916-B671-9EE11CA54F65" "versionEndExcluding": "6.9.4-0",
"matchCriteriaId": "CFC2C780-A54E-4426-9C52-46A20216339E"
} }
] ]
} }

View File

@ -2,8 +2,9 @@
"id": "CVE-2016-7519", "id": "CVE-2016-7519",
"sourceIdentifier": "security@debian.org", "sourceIdentifier": "security@debian.org",
"published": "2017-04-19T14:59:00.317", "published": "2017-04-19T14:59:00.317",
"lastModified": "2017-05-09T12:39:50.057", "lastModified": "2024-07-03T15:23:33.607",
"vulnStatus": "Analyzed", "vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",
@ -15,13 +16,13 @@
} }
], ],
"metrics": { "metrics": {
"cvssMetricV30": [ "cvssMetricV31": [
{ {
"source": "nvd@nist.gov", "source": "nvd@nist.gov",
"type": "Primary", "type": "Primary",
"cvssData": { "cvssData": {
"version": "3.0", "version": "3.1",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"attackVector": "NETWORK", "attackVector": "NETWORK",
"attackComplexity": "LOW", "attackComplexity": "LOW",
"privilegesRequired": "NONE", "privilegesRequired": "NONE",
@ -84,8 +85,9 @@
"cpeMatch": [ "cpeMatch": [
{ {
"vulnerable": true, "vulnerable": true,
"criteria": "cpe:2.3:a:imagemagick:imagemagick:-:*:*:*:*:*:*:*", "criteria": "cpe:2.3:a:imagemagick:imagemagick:*:*:*:*:*:*:*:*",
"matchCriteriaId": "6E6BE7A5-6FF7-4916-B671-9EE11CA54F65" "versionEndExcluding": "6.9.4-0",
"matchCriteriaId": "CFC2C780-A54E-4426-9C52-46A20216339E"
} }
] ]
} }

View File

@ -2,8 +2,9 @@
"id": "CVE-2016-7520", "id": "CVE-2016-7520",
"sourceIdentifier": "security@debian.org", "sourceIdentifier": "security@debian.org",
"published": "2017-04-20T18:59:01.060", "published": "2017-04-20T18:59:01.060",
"lastModified": "2017-05-09T12:39:45.993", "lastModified": "2024-07-03T15:20:18.050",
"vulnStatus": "Analyzed", "vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",
@ -15,13 +16,13 @@
} }
], ],
"metrics": { "metrics": {
"cvssMetricV30": [ "cvssMetricV31": [
{ {
"source": "nvd@nist.gov", "source": "nvd@nist.gov",
"type": "Primary", "type": "Primary",
"cvssData": { "cvssData": {
"version": "3.0", "version": "3.1",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"attackVector": "NETWORK", "attackVector": "NETWORK",
"attackComplexity": "LOW", "attackComplexity": "LOW",
"privilegesRequired": "NONE", "privilegesRequired": "NONE",
@ -84,8 +85,9 @@
"cpeMatch": [ "cpeMatch": [
{ {
"vulnerable": true, "vulnerable": true,
"criteria": "cpe:2.3:a:imagemagick:imagemagick:-:*:*:*:*:*:*:*", "criteria": "cpe:2.3:a:imagemagick:imagemagick:*:*:*:*:*:*:*:*",
"matchCriteriaId": "6E6BE7A5-6FF7-4916-B671-9EE11CA54F65" "versionEndExcluding": "6.9.4-0",
"matchCriteriaId": "CFC2C780-A54E-4426-9C52-46A20216339E"
} }
] ]
} }

View File

@ -2,8 +2,9 @@
"id": "CVE-2016-7521", "id": "CVE-2016-7521",
"sourceIdentifier": "security@debian.org", "sourceIdentifier": "security@debian.org",
"published": "2017-04-20T18:59:01.093", "published": "2017-04-20T18:59:01.093",
"lastModified": "2017-05-09T12:39:43.383", "lastModified": "2024-07-03T15:20:33.760",
"vulnStatus": "Analyzed", "vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",
@ -15,13 +16,13 @@
} }
], ],
"metrics": { "metrics": {
"cvssMetricV30": [ "cvssMetricV31": [
{ {
"source": "nvd@nist.gov", "source": "nvd@nist.gov",
"type": "Primary", "type": "Primary",
"cvssData": { "cvssData": {
"version": "3.0", "version": "3.1",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"attackVector": "NETWORK", "attackVector": "NETWORK",
"attackComplexity": "LOW", "attackComplexity": "LOW",
"privilegesRequired": "NONE", "privilegesRequired": "NONE",
@ -84,8 +85,9 @@
"cpeMatch": [ "cpeMatch": [
{ {
"vulnerable": true, "vulnerable": true,
"criteria": "cpe:2.3:a:imagemagick:imagemagick:-:*:*:*:*:*:*:*", "criteria": "cpe:2.3:a:imagemagick:imagemagick:*:*:*:*:*:*:*:*",
"matchCriteriaId": "6E6BE7A5-6FF7-4916-B671-9EE11CA54F65" "versionEndExcluding": "6.9.4-0",
"matchCriteriaId": "CFC2C780-A54E-4426-9C52-46A20216339E"
} }
] ]
} }

View File

@ -2,8 +2,9 @@
"id": "CVE-2016-7522", "id": "CVE-2016-7522",
"sourceIdentifier": "security@debian.org", "sourceIdentifier": "security@debian.org",
"published": "2017-04-19T14:59:00.367", "published": "2017-04-19T14:59:00.367",
"lastModified": "2017-05-09T12:39:40.680", "lastModified": "2024-07-03T15:20:47.917",
"vulnStatus": "Analyzed", "vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",
@ -15,13 +16,13 @@
} }
], ],
"metrics": { "metrics": {
"cvssMetricV30": [ "cvssMetricV31": [
{ {
"source": "nvd@nist.gov", "source": "nvd@nist.gov",
"type": "Primary", "type": "Primary",
"cvssData": { "cvssData": {
"version": "3.0", "version": "3.1",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"attackVector": "NETWORK", "attackVector": "NETWORK",
"attackComplexity": "LOW", "attackComplexity": "LOW",
"privilegesRequired": "NONE", "privilegesRequired": "NONE",
@ -84,8 +85,9 @@
"cpeMatch": [ "cpeMatch": [
{ {
"vulnerable": true, "vulnerable": true,
"criteria": "cpe:2.3:a:imagemagick:imagemagick:-:*:*:*:*:*:*:*", "criteria": "cpe:2.3:a:imagemagick:imagemagick:*:*:*:*:*:*:*:*",
"matchCriteriaId": "6E6BE7A5-6FF7-4916-B671-9EE11CA54F65" "versionEndExcluding": "6.9.4-0",
"matchCriteriaId": "CFC2C780-A54E-4426-9C52-46A20216339E"
} }
] ]
} }

View File

@ -2,8 +2,9 @@
"id": "CVE-2016-7523", "id": "CVE-2016-7523",
"sourceIdentifier": "security@debian.org", "sourceIdentifier": "security@debian.org",
"published": "2020-02-06T14:15:10.737", "published": "2020-02-06T14:15:10.737",
"lastModified": "2020-02-10T14:15:40.907", "lastModified": "2024-07-03T15:21:09.250",
"vulnStatus": "Analyzed", "vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",
@ -84,8 +85,9 @@
"cpeMatch": [ "cpeMatch": [
{ {
"vulnerable": true, "vulnerable": true,
"criteria": "cpe:2.3:a:imagemagick:imagemagick:-:*:*:*:*:*:*:*", "criteria": "cpe:2.3:a:imagemagick:imagemagick:*:*:*:*:*:*:*:*",
"matchCriteriaId": "6E6BE7A5-6FF7-4916-B671-9EE11CA54F65" "versionEndExcluding": "6.9.4-0",
"matchCriteriaId": "CFC2C780-A54E-4426-9C52-46A20216339E"
} }
] ]
} }

View File

@ -2,8 +2,9 @@
"id": "CVE-2016-7524", "id": "CVE-2016-7524",
"sourceIdentifier": "security@debian.org", "sourceIdentifier": "security@debian.org",
"published": "2020-02-06T14:15:10.830", "published": "2020-02-06T14:15:10.830",
"lastModified": "2020-02-10T14:15:18.203", "lastModified": "2024-07-03T15:21:23.107",
"vulnStatus": "Analyzed", "vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",
@ -84,8 +85,9 @@
"cpeMatch": [ "cpeMatch": [
{ {
"vulnerable": true, "vulnerable": true,
"criteria": "cpe:2.3:a:imagemagick:imagemagick:-:*:*:*:*:*:*:*", "criteria": "cpe:2.3:a:imagemagick:imagemagick:*:*:*:*:*:*:*:*",
"matchCriteriaId": "6E6BE7A5-6FF7-4916-B671-9EE11CA54F65" "versionEndExcluding": "6.9.4-0",
"matchCriteriaId": "CFC2C780-A54E-4426-9C52-46A20216339E"
} }
] ]
} }

View File

@ -2,8 +2,9 @@
"id": "CVE-2016-7525", "id": "CVE-2016-7525",
"sourceIdentifier": "security@debian.org", "sourceIdentifier": "security@debian.org",
"published": "2017-04-20T18:59:01.140", "published": "2017-04-20T18:59:01.140",
"lastModified": "2017-05-09T12:39:38.103", "lastModified": "2024-07-03T15:21:41.860",
"vulnStatus": "Analyzed", "vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",
@ -15,13 +16,13 @@
} }
], ],
"metrics": { "metrics": {
"cvssMetricV30": [ "cvssMetricV31": [
{ {
"source": "nvd@nist.gov", "source": "nvd@nist.gov",
"type": "Primary", "type": "Primary",
"cvssData": { "cvssData": {
"version": "3.0", "version": "3.1",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"attackVector": "NETWORK", "attackVector": "NETWORK",
"attackComplexity": "LOW", "attackComplexity": "LOW",
"privilegesRequired": "NONE", "privilegesRequired": "NONE",
@ -84,8 +85,9 @@
"cpeMatch": [ "cpeMatch": [
{ {
"vulnerable": true, "vulnerable": true,
"criteria": "cpe:2.3:a:imagemagick:imagemagick:-:*:*:*:*:*:*:*", "criteria": "cpe:2.3:a:imagemagick:imagemagick:*:*:*:*:*:*:*:*",
"matchCriteriaId": "6E6BE7A5-6FF7-4916-B671-9EE11CA54F65" "versionEndExcluding": "6.9.4-0",
"matchCriteriaId": "CFC2C780-A54E-4426-9C52-46A20216339E"
} }
] ]
} }

View File

@ -2,8 +2,9 @@
"id": "CVE-2016-7526", "id": "CVE-2016-7526",
"sourceIdentifier": "security@debian.org", "sourceIdentifier": "security@debian.org",
"published": "2017-04-20T18:59:01.187", "published": "2017-04-20T18:59:01.187",
"lastModified": "2020-11-16T19:39:56.297", "lastModified": "2024-07-03T15:21:49.110",
"vulnStatus": "Analyzed", "vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",
@ -84,8 +85,9 @@
"cpeMatch": [ "cpeMatch": [
{ {
"vulnerable": true, "vulnerable": true,
"criteria": "cpe:2.3:a:imagemagick:imagemagick:-:*:*:*:*:*:*:*", "criteria": "cpe:2.3:a:imagemagick:imagemagick:*:*:*:*:*:*:*:*",
"matchCriteriaId": "6E6BE7A5-6FF7-4916-B671-9EE11CA54F65" "versionEndExcluding": "6.9.4-0",
"matchCriteriaId": "CFC2C780-A54E-4426-9C52-46A20216339E"
} }
] ]
} }

View File

@ -2,8 +2,9 @@
"id": "CVE-2016-7527", "id": "CVE-2016-7527",
"sourceIdentifier": "security@debian.org", "sourceIdentifier": "security@debian.org",
"published": "2017-04-20T18:59:01.217", "published": "2017-04-20T18:59:01.217",
"lastModified": "2020-11-16T19:37:51.120", "lastModified": "2024-07-03T15:22:01.010",
"vulnStatus": "Analyzed", "vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",
@ -84,8 +85,9 @@
"cpeMatch": [ "cpeMatch": [
{ {
"vulnerable": true, "vulnerable": true,
"criteria": "cpe:2.3:a:imagemagick:imagemagick:-:*:*:*:*:*:*:*", "criteria": "cpe:2.3:a:imagemagick:imagemagick:*:*:*:*:*:*:*:*",
"matchCriteriaId": "6E6BE7A5-6FF7-4916-B671-9EE11CA54F65" "versionEndExcluding": "6.9.4-0",
"matchCriteriaId": "CFC2C780-A54E-4426-9C52-46A20216339E"
} }
] ]
} }

View File

@ -2,8 +2,9 @@
"id": "CVE-2016-7528", "id": "CVE-2016-7528",
"sourceIdentifier": "security@debian.org", "sourceIdentifier": "security@debian.org",
"published": "2017-04-19T14:59:00.397", "published": "2017-04-19T14:59:00.397",
"lastModified": "2020-11-16T19:36:05.883", "lastModified": "2024-07-03T15:22:10.600",
"vulnStatus": "Analyzed", "vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",
@ -84,8 +85,9 @@
"cpeMatch": [ "cpeMatch": [
{ {
"vulnerable": true, "vulnerable": true,
"criteria": "cpe:2.3:a:imagemagick:imagemagick:-:*:*:*:*:*:*:*", "criteria": "cpe:2.3:a:imagemagick:imagemagick:*:*:*:*:*:*:*:*",
"matchCriteriaId": "6E6BE7A5-6FF7-4916-B671-9EE11CA54F65" "versionEndExcluding": "6.9.4-0",
"matchCriteriaId": "CFC2C780-A54E-4426-9C52-46A20216339E"
} }
] ]
} }

View File

@ -2,8 +2,9 @@
"id": "CVE-2016-7529", "id": "CVE-2016-7529",
"sourceIdentifier": "security@debian.org", "sourceIdentifier": "security@debian.org",
"published": "2017-04-19T14:59:00.443", "published": "2017-04-19T14:59:00.443",
"lastModified": "2017-05-09T12:39:23.460", "lastModified": "2024-07-03T15:22:20.367",
"vulnStatus": "Analyzed", "vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",
@ -15,13 +16,13 @@
} }
], ],
"metrics": { "metrics": {
"cvssMetricV30": [ "cvssMetricV31": [
{ {
"source": "nvd@nist.gov", "source": "nvd@nist.gov",
"type": "Primary", "type": "Primary",
"cvssData": { "cvssData": {
"version": "3.0", "version": "3.1",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"attackVector": "NETWORK", "attackVector": "NETWORK",
"attackComplexity": "LOW", "attackComplexity": "LOW",
"privilegesRequired": "NONE", "privilegesRequired": "NONE",
@ -84,8 +85,9 @@
"cpeMatch": [ "cpeMatch": [
{ {
"vulnerable": true, "vulnerable": true,
"criteria": "cpe:2.3:a:imagemagick:imagemagick:-:*:*:*:*:*:*:*", "criteria": "cpe:2.3:a:imagemagick:imagemagick:*:*:*:*:*:*:*:*",
"matchCriteriaId": "6E6BE7A5-6FF7-4916-B671-9EE11CA54F65" "versionEndExcluding": "6.9.4-0",
"matchCriteriaId": "CFC2C780-A54E-4426-9C52-46A20216339E"
} }
] ]
} }

View File

@ -2,8 +2,9 @@
"id": "CVE-2016-7530", "id": "CVE-2016-7530",
"sourceIdentifier": "security@debian.org", "sourceIdentifier": "security@debian.org",
"published": "2017-04-20T18:59:01.263", "published": "2017-04-20T18:59:01.263",
"lastModified": "2017-05-09T12:39:19.320", "lastModified": "2024-07-03T15:22:34.133",
"vulnStatus": "Analyzed", "vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",
@ -15,13 +16,13 @@
} }
], ],
"metrics": { "metrics": {
"cvssMetricV30": [ "cvssMetricV31": [
{ {
"source": "nvd@nist.gov", "source": "nvd@nist.gov",
"type": "Primary", "type": "Primary",
"cvssData": { "cvssData": {
"version": "3.0", "version": "3.1",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"attackVector": "NETWORK", "attackVector": "NETWORK",
"attackComplexity": "LOW", "attackComplexity": "LOW",
"privilegesRequired": "NONE", "privilegesRequired": "NONE",
@ -84,8 +85,9 @@
"cpeMatch": [ "cpeMatch": [
{ {
"vulnerable": true, "vulnerable": true,
"criteria": "cpe:2.3:a:imagemagick:imagemagick:-:*:*:*:*:*:*:*", "criteria": "cpe:2.3:a:imagemagick:imagemagick:*:*:*:*:*:*:*:*",
"matchCriteriaId": "6E6BE7A5-6FF7-4916-B671-9EE11CA54F65" "versionEndExcluding": "6.9.4-0",
"matchCriteriaId": "CFC2C780-A54E-4426-9C52-46A20216339E"
} }
] ]
} }

View File

@ -2,8 +2,9 @@
"id": "CVE-2016-7533", "id": "CVE-2016-7533",
"sourceIdentifier": "security@debian.org", "sourceIdentifier": "security@debian.org",
"published": "2017-04-19T14:59:00.520", "published": "2017-04-19T14:59:00.520",
"lastModified": "2017-05-09T12:39:08.790", "lastModified": "2024-07-03T15:23:17.167",
"vulnStatus": "Analyzed", "vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",
@ -15,13 +16,13 @@
} }
], ],
"metrics": { "metrics": {
"cvssMetricV30": [ "cvssMetricV31": [
{ {
"source": "nvd@nist.gov", "source": "nvd@nist.gov",
"type": "Primary", "type": "Primary",
"cvssData": { "cvssData": {
"version": "3.0", "version": "3.1",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"attackVector": "NETWORK", "attackVector": "NETWORK",
"attackComplexity": "LOW", "attackComplexity": "LOW",
"privilegesRequired": "NONE", "privilegesRequired": "NONE",
@ -84,8 +85,9 @@
"cpeMatch": [ "cpeMatch": [
{ {
"vulnerable": true, "vulnerable": true,
"criteria": "cpe:2.3:a:imagemagick:imagemagick:-:*:*:*:*:*:*:*", "criteria": "cpe:2.3:a:imagemagick:imagemagick:*:*:*:*:*:*:*:*",
"matchCriteriaId": "6E6BE7A5-6FF7-4916-B671-9EE11CA54F65" "versionEndExcluding": "6.9.4-0",
"matchCriteriaId": "CFC2C780-A54E-4426-9C52-46A20216339E"
} }
] ]
} }

View File

@ -2,8 +2,16 @@
"id": "CVE-2021-27798", "id": "CVE-2021-27798",
"sourceIdentifier": "sirt@brocade.com", "sourceIdentifier": "sirt@brocade.com",
"published": "2022-08-05T16:15:10.807", "published": "2022-08-05T16:15:10.807",
"lastModified": "2024-05-17T01:55:38.763", "lastModified": "2024-07-03T15:15:05.193",
"vulnStatus": "Modified", "vulnStatus": "Modified",
"cveTags": [
{
"sourceIdentifier": "sirt@brocade.com",
"tags": [
"unsupported-when-assigned"
]
}
],
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",

View File

@ -2,8 +2,16 @@
"id": "CVE-2022-31362", "id": "CVE-2022-31362",
"sourceIdentifier": "cve@mitre.org", "sourceIdentifier": "cve@mitre.org",
"published": "2022-06-23T17:15:13.123", "published": "2022-06-23T17:15:13.123",
"lastModified": "2024-05-17T02:09:31.817", "lastModified": "2024-07-03T14:15:04.330",
"vulnStatus": "Modified", "vulnStatus": "Modified",
"cveTags": [
{
"sourceIdentifier": "cve@mitre.org",
"tags": [
"unsupported-when-assigned"
]
}
],
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",

View File

@ -2,8 +2,16 @@
"id": "CVE-2022-40297", "id": "CVE-2022-40297",
"sourceIdentifier": "cve@mitre.org", "sourceIdentifier": "cve@mitre.org",
"published": "2022-09-09T00:15:08.793", "published": "2022-09-09T00:15:08.793",
"lastModified": "2024-05-17T02:13:18.643", "lastModified": "2024-07-03T15:15:05.423",
"vulnStatus": "Modified", "vulnStatus": "Modified",
"cveTags": [
{
"sourceIdentifier": "cve@mitre.org",
"tags": [
"disputed"
]
}
],
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-1427", "id": "CVE-2024-1427",
"sourceIdentifier": "security@wordfence.com", "sourceIdentifier": "security@wordfence.com",
"published": "2024-07-02T06:15:02.253", "published": "2024-07-02T06:15:02.253",
"lastModified": "2024-07-02T12:09:16.907", "lastModified": "2024-07-03T15:44:40.083",
"vulnStatus": "Awaiting Analysis", "vulnStatus": "Analyzed",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
{ {
@ -18,8 +18,28 @@
"metrics": { "metrics": {
"cvssMetricV31": [ "cvssMetricV31": [
{ {
"source": "security@wordfence.com", "source": "nvd@nist.gov",
"type": "Primary", "type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 5.4,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.3,
"impactScore": 2.7
},
{
"source": "security@wordfence.com",
"type": "Secondary",
"cvssData": { "cvssData": {
"version": "3.1", "version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N",
@ -39,18 +59,57 @@
} }
] ]
}, },
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:radiustheme:the_post_grid:*:*:*:*:*:wordpress:*:*",
"versionEndExcluding": "7.7.2",
"matchCriteriaId": "0181ECD4-44C0-432C-80B6-70123A9FBE22"
}
]
}
]
}
],
"references": [ "references": [
{ {
"url": "https://plugins.trac.wordpress.org/browser/the-post-grid/tags/7.4.2/app/Helpers/Fns.php#L1051", "url": "https://plugins.trac.wordpress.org/browser/the-post-grid/tags/7.4.2/app/Helpers/Fns.php#L1051",
"source": "security@wordfence.com" "source": "security@wordfence.com",
"tags": [
"Product"
]
}, },
{ {
"url": "https://plugins.trac.wordpress.org/changeset/3080313/#file347", "url": "https://plugins.trac.wordpress.org/changeset/3080313/#file347",
"source": "security@wordfence.com" "source": "security@wordfence.com",
"tags": [
"Patch"
]
}, },
{ {
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/fc870ce5-1352-43f2-b80b-45065ceed750?source=cve", "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/fc870ce5-1352-43f2-b80b-45065ceed750?source=cve",
"source": "security@wordfence.com" "source": "security@wordfence.com",
"tags": [
"Third Party Advisory"
]
} }
] ]
} }

View File

@ -2,8 +2,9 @@
"id": "CVE-2024-1931", "id": "CVE-2024-1931",
"sourceIdentifier": "sep@nlnetlabs.nl", "sourceIdentifier": "sep@nlnetlabs.nl",
"published": "2024-03-07T10:15:07.037", "published": "2024-03-07T10:15:07.037",
"lastModified": "2024-04-28T04:15:11.000", "lastModified": "2024-07-03T15:15:05.560",
"vulnStatus": "Awaiting Analysis", "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",
@ -63,6 +64,10 @@
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RBR4H7RCVMJ6H76S4LLRSY5EBFTYWGXK/", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RBR4H7RCVMJ6H76S4LLRSY5EBFTYWGXK/",
"source": "sep@nlnetlabs.nl" "source": "sep@nlnetlabs.nl"
}, },
{
"url": "https://lists.freebsd.org/archives/freebsd-security/2024-July/000283.html",
"source": "sep@nlnetlabs.nl"
},
{ {
"url": "https://www.nlnetlabs.nl/downloads/unbound/CVE-2024-1931.txt", "url": "https://www.nlnetlabs.nl/downloads/unbound/CVE-2024-1931.txt",
"source": "sep@nlnetlabs.nl" "source": "sep@nlnetlabs.nl"

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-27857", "id": "CVE-2024-27857",
"sourceIdentifier": "product-security@apple.com", "sourceIdentifier": "product-security@apple.com",
"published": "2024-06-10T21:15:51.833", "published": "2024-06-10T21:15:51.833",
"lastModified": "2024-07-03T01:51:14.753", "lastModified": "2024-07-03T15:43:17.007",
"vulnStatus": "Undergoing Analysis", "vulnStatus": "Analyzed",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
{ {
@ -17,6 +17,26 @@
], ],
"metrics": { "metrics": {
"cvssMetricV31": [ "cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
},
{ {
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary", "type": "Secondary",
@ -40,6 +60,16 @@
] ]
}, },
"weaknesses": [ "weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-119"
}
]
},
{ {
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary", "type": "Secondary",
@ -51,42 +81,113 @@
] ]
} }
], ],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*",
"versionEndExcluding": "17.5",
"matchCriteriaId": "E7F2E11C-4A7D-4E71-BFAA-396B0549F649"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*",
"versionEndExcluding": "17.5",
"matchCriteriaId": "E9C4B45E-AF58-4D7C-B73A-618B06AED56E"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*",
"versionStartIncluding": "14.0",
"versionEndExcluding": "14.5",
"matchCriteriaId": "6AB18623-7D06-4946-99FC-808A4A913ED9"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*",
"versionEndExcluding": "17.5",
"matchCriteriaId": "003383BF-F06C-4300-908D-D1C8498C6BCD"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:apple:visionos:*:*:*:*:*:*:*:*",
"versionEndExcluding": "1.2",
"matchCriteriaId": "20FA533E-AA15-4561-AAF1-F8C3F5283C88"
}
]
}
]
}
],
"references": [ "references": [
{ {
"url": "http://seclists.org/fulldisclosure/2024/Jun/5", "url": "http://seclists.org/fulldisclosure/2024/Jun/5",
"source": "product-security@apple.com" "source": "product-security@apple.com",
"tags": [
"Mailing List",
"Third Party Advisory"
]
}, },
{ {
"url": "https://support.apple.com/en-us/HT214101", "url": "https://support.apple.com/en-us/HT214101",
"source": "product-security@apple.com" "source": "product-security@apple.com",
"tags": [
"Vendor Advisory"
]
}, },
{ {
"url": "https://support.apple.com/en-us/HT214102", "url": "https://support.apple.com/en-us/HT214102",
"source": "product-security@apple.com" "source": "product-security@apple.com",
"tags": [
"Vendor Advisory"
]
}, },
{ {
"url": "https://support.apple.com/en-us/HT214106", "url": "https://support.apple.com/en-us/HT214106",
"source": "product-security@apple.com" "source": "product-security@apple.com",
"tags": [
"Vendor Advisory"
]
}, },
{ {
"url": "https://support.apple.com/en-us/HT214108", "url": "https://support.apple.com/en-us/HT214108",
"source": "product-security@apple.com" "source": "product-security@apple.com",
"tags": [
"Vendor Advisory"
]
}, },
{ {
"url": "https://support.apple.com/kb/HT214101", "url": "https://support.apple.com/kb/HT214101",
"source": "product-security@apple.com" "source": "product-security@apple.com",
"tags": [
"Vendor Advisory"
]
}, },
{ {
"url": "https://support.apple.com/kb/HT214102", "url": "https://support.apple.com/kb/HT214102",
"source": "product-security@apple.com" "source": "product-security@apple.com",
"tags": [
"Vendor Advisory"
]
}, },
{ {
"url": "https://support.apple.com/kb/HT214106", "url": "https://support.apple.com/kb/HT214106",
"source": "product-security@apple.com" "source": "product-security@apple.com",
"tags": [
"Vendor Advisory"
]
}, },
{ {
"url": "https://support.apple.com/kb/HT214108", "url": "https://support.apple.com/kb/HT214108",
"source": "product-security@apple.com" "source": "product-security@apple.com",
"tags": [
"Vendor Advisory"
]
} }
] ]
} }

View File

@ -2,8 +2,9 @@
"id": "CVE-2024-27885", "id": "CVE-2024-27885",
"sourceIdentifier": "product-security@apple.com", "sourceIdentifier": "product-security@apple.com",
"published": "2024-06-10T21:15:51.903", "published": "2024-06-10T21:15:51.903",
"lastModified": "2024-06-11T13:54:12.057", "lastModified": "2024-07-03T15:44:29.397",
"vulnStatus": "Undergoing Analysis", "vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",
@ -14,31 +15,116 @@
"value": "Este problema se solucion\u00f3 con una validaci\u00f3n mejorada de los enlaces simb\u00f3licos. Este problema se solucion\u00f3 en macOS Sonoma 14.5, macOS Ventura 13.6.7, macOS Monterey 12.7.5. Es posible que una aplicaci\u00f3n pueda modificar partes protegidas del sistema de archivos." "value": "Este problema se solucion\u00f3 con una validaci\u00f3n mejorada de los enlaces simb\u00f3licos. Este problema se solucion\u00f3 en macOS Sonoma 14.5, macOS Ventura 13.6.7, macOS Monterey 12.7.5. Es posible que una aplicaci\u00f3n pueda modificar partes protegidas del sistema de archivos."
} }
], ],
"metrics": {}, "metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:N/I:H/A:N",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"availabilityImpact": "NONE",
"baseScore": 6.3,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.8,
"impactScore": 4.0
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-59"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*",
"versionEndExcluding": "12.7.5",
"matchCriteriaId": "3121F2A4-6F9C-4E03-837E-2A4C2B65CB09"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*",
"versionStartIncluding": "13.0",
"versionEndExcluding": "13.6.7",
"matchCriteriaId": "2D797210-B0F0-44AE-9028-47C18C22AFA5"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*",
"versionStartIncluding": "14.0",
"versionEndExcluding": "14.5",
"matchCriteriaId": "6AB18623-7D06-4946-99FC-808A4A913ED9"
}
]
}
]
}
],
"references": [ "references": [
{ {
"url": "https://support.apple.com/en-us/HT214105", "url": "https://support.apple.com/en-us/HT214105",
"source": "product-security@apple.com" "source": "product-security@apple.com",
"tags": [
"Vendor Advisory"
]
}, },
{ {
"url": "https://support.apple.com/en-us/HT214106", "url": "https://support.apple.com/en-us/HT214106",
"source": "product-security@apple.com" "source": "product-security@apple.com",
"tags": [
"Vendor Advisory"
]
}, },
{ {
"url": "https://support.apple.com/en-us/HT214107", "url": "https://support.apple.com/en-us/HT214107",
"source": "product-security@apple.com" "source": "product-security@apple.com",
"tags": [
"Vendor Advisory"
]
}, },
{ {
"url": "https://support.apple.com/kb/HT214105", "url": "https://support.apple.com/kb/HT214105",
"source": "product-security@apple.com" "source": "product-security@apple.com",
"tags": [
"Vendor Advisory"
]
}, },
{ {
"url": "https://support.apple.com/kb/HT214106", "url": "https://support.apple.com/kb/HT214106",
"source": "product-security@apple.com" "source": "product-security@apple.com",
"tags": [
"Vendor Advisory"
]
}, },
{ {
"url": "https://support.apple.com/kb/HT214107", "url": "https://support.apple.com/kb/HT214107",
"source": "product-security@apple.com" "source": "product-security@apple.com",
"tags": [
"Vendor Advisory"
]
} }
] ]
} }

View File

@ -0,0 +1,60 @@
{
"id": "CVE-2024-32937",
"sourceIdentifier": "talos-cna@cisco.com",
"published": "2024-07-03T14:15:05.340",
"lastModified": "2024-07-03T15:15:05.803",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "An os command injection vulnerability exists in the CWMP SelfDefinedTimeZone functionality of Grandstream GXP2135 1.0.9.129, 1.0.11.74 and 1.0.11.79. A specially crafted network packet can lead to arbitrary command execution. An attacker can send a sequence of malicious packets to trigger this vulnerability."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "talos-cna@cisco.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "HIGH",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.1,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.2,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "talos-cna@cisco.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-78"
}
]
}
],
"references": [
{
"url": "https://talosintelligence.com/vulnerability_reports/TALOS-2024-1978",
"source": "talos-cna@cisco.com"
},
{
"url": "https://www.talosintelligence.com/vulnerability_reports/TALOS-2024-1978",
"source": "talos-cna@cisco.com"
}
]
}

View File

@ -2,17 +2,41 @@
"id": "CVE-2024-34696", "id": "CVE-2024-34696",
"sourceIdentifier": "security-advisories@github.com", "sourceIdentifier": "security-advisories@github.com",
"published": "2024-07-01T15:15:16.907", "published": "2024-07-01T15:15:16.907",
"lastModified": "2024-07-01T16:37:39.040", "lastModified": "2024-07-03T14:42:49.743",
"vulnStatus": "Awaiting Analysis", "vulnStatus": "Analyzed",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",
"value": "GeoServer is an open source server that allows users to share and edit geospatial data. Starting in version 2.10.0 and prior to versions 2.24.4 and 2.25.1, GeoServer's Server Status page and REST API lists all environment variables and Java properties to any GeoServer user with administrative rights as part of those modules' status message. These variables/properties can also contain sensitive information, such as database passwords or API keys/tokens. Additionally, many community-developed GeoServer container images `export` other credentials from their start-up scripts as environment variables to the GeoServer (`java`) process. The precise scope of the issue depends on which container image is used and how it is configured.\n\nThe `about status` API endpoint which powers the Server Status page is only available to administrators.Depending on the operating environment, administrators might have legitimate access to credentials in other ways, but this issue defeats more sophisticated controls (like break-glass access to secrets or role accounts).By default, GeoServer only allows same-origin authenticated API access. This limits the scope for a third-party attacker to use an administrator\u2019s credentials to gain access to credentials. The researchers who found the vulnerability were unable to determine any other conditions under which the GeoServer REST API may be available more broadly.\n\nUsers should update container images to use GeoServer 2.24.4 or 2.25.1 to get the bug fix. As a workaround, leave environment variables and Java system properties hidden by default. Those who provide the option to re-enable it should communicate the impact and risks so that users can make an informed choice." "value": "GeoServer is an open source server that allows users to share and edit geospatial data. Starting in version 2.10.0 and prior to versions 2.24.4 and 2.25.1, GeoServer's Server Status page and REST API lists all environment variables and Java properties to any GeoServer user with administrative rights as part of those modules' status message. These variables/properties can also contain sensitive information, such as database passwords or API keys/tokens. Additionally, many community-developed GeoServer container images `export` other credentials from their start-up scripts as environment variables to the GeoServer (`java`) process. The precise scope of the issue depends on which container image is used and how it is configured.\n\nThe `about status` API endpoint which powers the Server Status page is only available to administrators.Depending on the operating environment, administrators might have legitimate access to credentials in other ways, but this issue defeats more sophisticated controls (like break-glass access to secrets or role accounts).By default, GeoServer only allows same-origin authenticated API access. This limits the scope for a third-party attacker to use an administrator\u2019s credentials to gain access to credentials. The researchers who found the vulnerability were unable to determine any other conditions under which the GeoServer REST API may be available more broadly.\n\nUsers should update container images to use GeoServer 2.24.4 or 2.25.1 to get the bug fix. As a workaround, leave environment variables and Java system properties hidden by default. Those who provide the option to re-enable it should communicate the impact and risks so that users can make an informed choice."
},
{
"lang": "es",
"value": "GeoServer es un servidor de c\u00f3digo abierto que permite a los usuarios compartir y editar datos geoespaciales. A partir de la versi\u00f3n 2.10.0 y antes de las versiones 2.24.4 y 2.25.1, la p\u00e1gina Estado del servidor de GeoServer y la API REST enumeran todas las variables de entorno y propiedades de Java para cualquier usuario de GeoServer con derechos administrativos como parte del mensaje de estado de esos m\u00f3dulos. Estas variables/propiedades tambi\u00e9n pueden contener informaci\u00f3n confidencial, como contrase\u00f1as de bases de datos o keys/tokens API. Adem\u00e1s, muchas im\u00e1genes de contenedores de GeoServer desarrolladas por la comunidad \"exportan\" otras credenciales desde sus scripts de inicio como variables de entorno al proceso de GeoServer (\"java\"). El alcance preciso del problema depende de qu\u00e9 imagen de contenedor se utiliza y c\u00f3mo est\u00e1 configurada. El endpoint API \"acerca del estado\" que impulsa la p\u00e1gina Estado del servidor solo est\u00e1 disponible para los administradores. Dependiendo del entorno operativo, los administradores pueden tener acceso leg\u00edtimo a las credenciales de otras maneras, pero este problema anula controles m\u00e1s sofisticados (como el acceso sin barreras a secretos o cuentas de rol). De forma predeterminada, GeoServer solo permite el acceso API autenticado del mismo origen. Esto limita las posibilidades de que un atacante externo utilice las credenciales de un administrador para obtener acceso a las credenciales. Los investigadores que encontraron la vulnerabilidad no pudieron determinar otras condiciones bajo las cuales la API REST de GeoServer pueda estar disponible de manera m\u00e1s amplia. Los usuarios deben actualizar las im\u00e1genes del contenedor para usar GeoServer 2.24.4 o 2.25.1 para corregir el error. Como workaround, deje las variables de entorno y las propiedades del sistema Java ocultas de forma predeterminada. Quienes brinden la opci\u00f3n de volver a habilitarlo deben comunicar el impacto y los riesgos para que los usuarios puedan tomar una decisi\u00f3n informada."
} }
], ],
"metrics": { "metrics": {
"cvssMetricV31": [ "cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.9,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.2,
"impactScore": 3.6
},
{ {
"source": "security-advisories@github.com", "source": "security-advisories@github.com",
"type": "Secondary", "type": "Secondary",
@ -36,6 +60,16 @@
] ]
}, },
"weaknesses": [ "weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
},
{ {
"source": "security-advisories@github.com", "source": "security-advisories@github.com",
"type": "Secondary", "type": "Secondary",
@ -47,10 +81,39 @@
] ]
} }
], ],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:geoserver:geoserver:*:*:*:*:*:*:*:*",
"versionStartIncluding": "2.10.0",
"versionEndExcluding": "2.24.4",
"matchCriteriaId": "779270D7-89BA-47CA-A5E5-4539668BC18E"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:geoserver:geoserver:*:*:*:*:*:*:*:*",
"versionStartIncluding": "2.25.0",
"versionEndExcluding": "2.25.1",
"matchCriteriaId": "F63F5E42-FB6D-4264-BF8A-17DEB863054C"
}
]
}
]
}
],
"references": [ "references": [
{ {
"url": "https://github.com/geoserver/geoserver/security/advisories/GHSA-j59v-vgcr-hxvf", "url": "https://github.com/geoserver/geoserver/security/advisories/GHSA-j59v-vgcr-hxvf",
"source": "security-advisories@github.com" "source": "security-advisories@github.com",
"tags": [
"Vendor Advisory"
]
} }
] ]
} }

View File

@ -2,17 +2,41 @@
"id": "CVE-2024-36401", "id": "CVE-2024-36401",
"sourceIdentifier": "security-advisories@github.com", "sourceIdentifier": "security-advisories@github.com",
"published": "2024-07-01T16:15:04.120", "published": "2024-07-01T16:15:04.120",
"lastModified": "2024-07-01T16:37:39.040", "lastModified": "2024-07-03T15:07:42.777",
"vulnStatus": "Awaiting Analysis", "vulnStatus": "Analyzed",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",
"value": "GeoServer is an open source server that allows users to share and edit geospatial data. Prior to versions 2.23.6, 2.24.4, and 2.25.2, multiple OGC request parameters allow Remote Code Execution (RCE) by unauthenticated users through specially crafted input against a default GeoServer installation due to unsafely evaluating property names as XPath expressions.\n\nThe GeoTools library API that GeoServer calls evaluates property/attribute names for feature types in a way that unsafely passes them to the commons-jxpath library which can execute arbitrary code when evaluating XPath expressions. This XPath evaluation is intended to be used only by complex feature types (i.e., Application Schema data stores) but is incorrectly being applied to simple feature types as well which makes this vulnerability apply to **ALL** GeoServer instances. No public PoC is provided but this vulnerability has been confirmed to be exploitable through WFS GetFeature, WFS GetPropertyValue, WMS GetMap, WMS GetFeatureInfo, WMS GetLegendGraphic and WPS Execute requests. This vulnerability can lead to executing arbitrary code.\n\nVersions 2.23.6, 2.24.4, and 2.25.2 contain a patch for the issue. A workaround exists by removing the `gt-complex-x.y.jar` file from the GeoServer where `x.y` is the GeoTools version (e.g., `gt-complex-31.1.jar` if running GeoServer 2.25.1). This will remove the vulnerable code from GeoServer but may break some GeoServer functionality or prevent GeoServer from deploying if the gt-complex module is needed." "value": "GeoServer is an open source server that allows users to share and edit geospatial data. Prior to versions 2.23.6, 2.24.4, and 2.25.2, multiple OGC request parameters allow Remote Code Execution (RCE) by unauthenticated users through specially crafted input against a default GeoServer installation due to unsafely evaluating property names as XPath expressions.\n\nThe GeoTools library API that GeoServer calls evaluates property/attribute names for feature types in a way that unsafely passes them to the commons-jxpath library which can execute arbitrary code when evaluating XPath expressions. This XPath evaluation is intended to be used only by complex feature types (i.e., Application Schema data stores) but is incorrectly being applied to simple feature types as well which makes this vulnerability apply to **ALL** GeoServer instances. No public PoC is provided but this vulnerability has been confirmed to be exploitable through WFS GetFeature, WFS GetPropertyValue, WMS GetMap, WMS GetFeatureInfo, WMS GetLegendGraphic and WPS Execute requests. This vulnerability can lead to executing arbitrary code.\n\nVersions 2.23.6, 2.24.4, and 2.25.2 contain a patch for the issue. A workaround exists by removing the `gt-complex-x.y.jar` file from the GeoServer where `x.y` is the GeoTools version (e.g., `gt-complex-31.1.jar` if running GeoServer 2.25.1). This will remove the vulnerable code from GeoServer but may break some GeoServer functionality or prevent GeoServer from deploying if the gt-complex module is needed."
},
{
"lang": "es",
"value": "GeoServer es un servidor de c\u00f3digo abierto que permite a los usuarios compartir y editar datos geoespaciales. Antes de las versiones 2.23.6, 2.24.4 y 2.25.2, varios par\u00e1metros de solicitud de OGC permit\u00edan la ejecuci\u00f3n remota de c\u00f3digo (RCE) por parte de usuarios no autenticados a trav\u00e9s de entradas especialmente dise\u00f1adas en una instalaci\u00f3n predeterminada de GeoServer debido a la evaluaci\u00f3n insegura de nombres de propiedades como expresiones XPath. La API de la librer\u00eda GeoTools a la que llama GeoServer eval\u00faa los nombres de propiedades/atributos para tipos de entidades de una manera que los pasa de manera insegura a la librer\u00eda commons-jxpath, que puede ejecutar c\u00f3digo arbitrario al evaluar expresiones XPath. Esta evaluaci\u00f3n XPath est\u00e1 destinada a ser utilizada \u00fanicamente por tipos de funciones complejas (es decir, almacenes de datos de esquemas de aplicaci\u00f3n), pero tambi\u00e9n se aplica incorrectamente a tipos de funciones simples, lo que hace que esta vulnerabilidad se aplique a **TODAS** las instancias de GeoServer. No se proporciona ninguna PoC p\u00fablica, pero se ha confirmado que esta vulnerabilidad es explotable a trav\u00e9s de solicitudes WFS GetFeature, WFS GetPropertyValue, WMS GetMap, WMS GetFeatureInfo, WMS GetLegendGraphic y WPS Execute. Esta vulnerabilidad puede llevar a la ejecuci\u00f3n de c\u00f3digo arbitrario. Las versiones 2.23.6, 2.24.4 y 2.25.2 contienen un parche para el problema. Existe una workaround eliminando el archivo `gt-complex-xyjar` del GeoServer donde `xy` es la versi\u00f3n de GeoTools (por ejemplo, `gt-complex-31.1.jar` si ejecuta GeoServer 2.25.1). Esto eliminar\u00e1 el c\u00f3digo vulnerable de GeoServer, pero puede interrumpir algunas funciones de GeoServer o evitar que GeoServer se implemente si se necesita el m\u00f3dulo gt-complex."
} }
], ],
"metrics": { "metrics": {
"cvssMetricV31": [ "cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
},
{ {
"source": "security-advisories@github.com", "source": "security-advisories@github.com",
"type": "Secondary", "type": "Secondary",
@ -36,6 +60,16 @@
] ]
}, },
"weaknesses": [ "weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-94"
}
]
},
{ {
"source": "security-advisories@github.com", "source": "security-advisories@github.com",
"type": "Secondary", "type": "Secondary",
@ -47,26 +81,97 @@
] ]
} }
], ],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:geoserver:geoserver:*:*:*:*:*:*:*:*",
"versionEndExcluding": "2.23.6",
"matchCriteriaId": "9C28BE03-93E6-4FC4-AA6E-00E41AF25CB0"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:geoserver:geoserver:*:*:*:*:*:*:*:*",
"versionStartIncluding": "2.24.0",
"versionEndExcluding": "2.24.4",
"matchCriteriaId": "6A407E94-A7F2-4A4F-B96E-2B3DC8FF6DF3"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:geoserver:geoserver:*:*:*:*:*:*:*:*",
"versionStartIncluding": "2.25.0",
"versionEndExcluding": "2.25.2",
"matchCriteriaId": "CFBAEC7A-6250-45FE-AB54-30D72C03F62D"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:geotools:geotools:*:*:*:*:*:*:*:*",
"versionEndExcluding": "29.6",
"matchCriteriaId": "732DE428-3515-459F-AE5F-08407BA1A049"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:geotools:geotools:*:*:*:*:*:*:*:*",
"versionStartIncluding": "30.0",
"versionEndExcluding": "30.4",
"matchCriteriaId": "D3B2BC3D-0015-4E5D-979A-AB7D18185A57"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:geotools:geotools:*:*:*:*:*:*:*:*",
"versionStartIncluding": "31.0",
"versionEndExcluding": "31.2",
"matchCriteriaId": "50BB4154-B19C-4BFD-8E88-9ED445680706"
}
]
}
]
}
],
"references": [ "references": [
{ {
"url": "https://github.com/Warxim/CVE-2022-41852?tab=readme-ov-file#workaround-for-cve-2022-41852", "url": "https://github.com/Warxim/CVE-2022-41852?tab=readme-ov-file#workaround-for-cve-2022-41852",
"source": "security-advisories@github.com" "source": "security-advisories@github.com",
"tags": [
"Exploit",
"Third Party Advisory"
]
}, },
{ {
"url": "https://github.com/geoserver/geoserver/security/advisories/GHSA-6jj6-gm7p-fcvv", "url": "https://github.com/geoserver/geoserver/security/advisories/GHSA-6jj6-gm7p-fcvv",
"source": "security-advisories@github.com" "source": "security-advisories@github.com",
"tags": [
"Mitigation",
"Vendor Advisory"
]
}, },
{ {
"url": "https://github.com/geotools/geotools/pull/4797", "url": "https://github.com/geotools/geotools/pull/4797",
"source": "security-advisories@github.com" "source": "security-advisories@github.com",
"tags": [
"Issue Tracking",
"Patch"
]
}, },
{ {
"url": "https://github.com/geotools/geotools/security/advisories/GHSA-w3pj-wh35-fq8w", "url": "https://github.com/geotools/geotools/security/advisories/GHSA-w3pj-wh35-fq8w",
"source": "security-advisories@github.com" "source": "security-advisories@github.com",
"tags": [
"Exploit",
"Vendor Advisory"
]
}, },
{ {
"url": "https://osgeo-org.atlassian.net/browse/GEOT-7587", "url": "https://osgeo-org.atlassian.net/browse/GEOT-7587",
"source": "security-advisories@github.com" "source": "security-advisories@github.com",
"tags": [
"Vendor Advisory"
]
} }
] ]
} }

View File

@ -2,17 +2,41 @@
"id": "CVE-2024-36420", "id": "CVE-2024-36420",
"sourceIdentifier": "security-advisories@github.com", "sourceIdentifier": "security-advisories@github.com",
"published": "2024-07-01T16:15:04.377", "published": "2024-07-01T16:15:04.377",
"lastModified": "2024-07-01T16:37:39.040", "lastModified": "2024-07-03T15:29:45.557",
"vulnStatus": "Awaiting Analysis", "vulnStatus": "Analyzed",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",
"value": "Flowise is a drag & drop user interface to build a customized large language model flow. In version 1.4.3 of Flowise, the `/api/v1/openai-assistants-file` endpoint in `index.ts` is vulnerable to arbitrary file read due to lack of sanitization of the `fileName` body parameter. No known patches for this issue are available." "value": "Flowise is a drag & drop user interface to build a customized large language model flow. In version 1.4.3 of Flowise, the `/api/v1/openai-assistants-file` endpoint in `index.ts` is vulnerable to arbitrary file read due to lack of sanitization of the `fileName` body parameter. No known patches for this issue are available."
},
{
"lang": "es",
"value": "Flowise es una interfaz de usuario de arrastrar y soltar para crear un flujo de modelo de lenguaje grande personalizado. En la versi\u00f3n 1.4.3 de Flowise, el endpoint `/api/v1/openai-assistants-file` en `index.ts` es vulnerable a la lectura arbitraria de archivos debido a la falta de sanitizaci\u00f3n del par\u00e1metro del cuerpo `fileName`. No hay parches conocidos disponibles para este problema."
} }
], ],
"metrics": { "metrics": {
"cvssMetricV31": [ "cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 7.5,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
},
{ {
"source": "security-advisories@github.com", "source": "security-advisories@github.com",
"type": "Secondary", "type": "Secondary",
@ -36,6 +60,16 @@
] ]
}, },
"weaknesses": [ "weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-74"
}
]
},
{ {
"source": "security-advisories@github.com", "source": "security-advisories@github.com",
"type": "Secondary", "type": "Secondary",
@ -47,14 +81,38 @@
] ]
} }
], ],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:flowiseai:flowise:1.4.3:*:*:*:*:*:*:*",
"matchCriteriaId": "46DEFB82-D429-4A21-A963-B9DD1EB58AD5"
}
]
}
]
}
],
"references": [ "references": [
{ {
"url": "https://github.com/FlowiseAI/Flowise/blob/e93ce07851cdc0fcde12374f301b8070f2043687/packages/server/src/index.ts#L982", "url": "https://github.com/FlowiseAI/Flowise/blob/e93ce07851cdc0fcde12374f301b8070f2043687/packages/server/src/index.ts#L982",
"source": "security-advisories@github.com" "source": "security-advisories@github.com",
"tags": [
"Product"
]
}, },
{ {
"url": "https://securitylab.github.com/advisories/GHSL-2023-232_GHSL-2023-234_Flowise/", "url": "https://securitylab.github.com/advisories/GHSL-2023-232_GHSL-2023-234_Flowise/",
"source": "security-advisories@github.com" "source": "security-advisories@github.com",
"tags": [
"Exploit",
"Third Party Advisory"
]
} }
] ]
} }

View File

@ -2,17 +2,41 @@
"id": "CVE-2024-36421", "id": "CVE-2024-36421",
"sourceIdentifier": "security-advisories@github.com", "sourceIdentifier": "security-advisories@github.com",
"published": "2024-07-01T16:15:04.623", "published": "2024-07-01T16:15:04.623",
"lastModified": "2024-07-01T16:37:39.040", "lastModified": "2024-07-03T15:36:31.170",
"vulnStatus": "Awaiting Analysis", "vulnStatus": "Analyzed",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",
"value": "Flowise is a drag & drop user interface to build a customized large language model flow. In version 1.4.3 of Flowise, A CORS misconfiguration sets the Access-Control-Allow-Origin header to all, allowing arbitrary origins to connect to the website. In the default configuration (unauthenticated), arbitrary origins may be able to make requests to Flowise, stealing information from the user. This CORS misconfiguration may be chained with the path injection to allow an attacker attackers without access to Flowise to read arbitrary files from the Flowise server. As of time of publication, no known patches are available." "value": "Flowise is a drag & drop user interface to build a customized large language model flow. In version 1.4.3 of Flowise, A CORS misconfiguration sets the Access-Control-Allow-Origin header to all, allowing arbitrary origins to connect to the website. In the default configuration (unauthenticated), arbitrary origins may be able to make requests to Flowise, stealing information from the user. This CORS misconfiguration may be chained with the path injection to allow an attacker attackers without access to Flowise to read arbitrary files from the Flowise server. As of time of publication, no known patches are available."
},
{
"lang": "es",
"value": "Flowise es una interfaz de usuario de arrastrar y soltar para crear un flujo de modelo de lenguaje grande personalizado. En la versi\u00f3n 1.4.3 de Flowise, una mala configuraci\u00f3n de CORS establece el encabezado Access-Control-Allow-Origin en todos, lo que permite que or\u00edgenes arbitrarios se conecten al sitio web. En la configuraci\u00f3n predeterminada (no autenticado), or\u00edgenes arbitrarios pueden realizar solicitudes a Flowise, robando informaci\u00f3n del usuario. Esta configuraci\u00f3n err\u00f3nea de CORS puede estar encadenada con la inyecci\u00f3n de ruta para permitir que un atacante sin acceso a Flowise lea archivos arbitrarios del servidor Flowise. Al momento de la publicaci\u00f3n, no hay parches conocidos disponibles."
} }
], ],
"metrics": { "metrics": {
"cvssMetricV31": [ "cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 7.5,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
},
{ {
"source": "security-advisories@github.com", "source": "security-advisories@github.com",
"type": "Secondary", "type": "Secondary",
@ -36,6 +60,16 @@
] ]
}, },
"weaknesses": [ "weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-346"
}
]
},
{ {
"source": "security-advisories@github.com", "source": "security-advisories@github.com",
"type": "Secondary", "type": "Secondary",
@ -47,14 +81,38 @@
] ]
} }
], ],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:flowiseai:flowise:1.4.3:*:*:*:*:*:*:*",
"matchCriteriaId": "46DEFB82-D429-4A21-A963-B9DD1EB58AD5"
}
]
}
]
}
],
"references": [ "references": [
{ {
"url": "https://github.com/FlowiseAI/Flowise/blob/e93ce07851cdc0fcde12374f301b8070f2043687/packages/server/src/index.ts#L122", "url": "https://github.com/FlowiseAI/Flowise/blob/e93ce07851cdc0fcde12374f301b8070f2043687/packages/server/src/index.ts#L122",
"source": "security-advisories@github.com" "source": "security-advisories@github.com",
"tags": [
"Product"
]
}, },
{ {
"url": "https://securitylab.github.com/advisories/GHSL-2023-232_GHSL-2023-234_Flowise/", "url": "https://securitylab.github.com/advisories/GHSL-2023-232_GHSL-2023-234_Flowise/",
"source": "security-advisories@github.com" "source": "security-advisories@github.com",
"tags": [
"Exploit",
"Third Party Advisory"
]
} }
] ]
} }

View File

@ -2,17 +2,41 @@
"id": "CVE-2024-36422", "id": "CVE-2024-36422",
"sourceIdentifier": "security-advisories@github.com", "sourceIdentifier": "security-advisories@github.com",
"published": "2024-07-01T16:15:04.860", "published": "2024-07-01T16:15:04.860",
"lastModified": "2024-07-01T16:37:39.040", "lastModified": "2024-07-03T15:38:24.297",
"vulnStatus": "Awaiting Analysis", "vulnStatus": "Analyzed",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",
"value": "Flowise is a drag & drop user interface to build a customized large language model flow. In version 1.4.3 of Flowise, a reflected cross-site scripting vulnerability occurs in the `api/v1/chatflows/id` endpoint. If the default configuration is used (unauthenticated), an attacker may be able to craft a specially crafted URL that injects Javascript into the user sessions, allowing the attacker to steal information, create false popups, or even redirect the user to other websites without interaction. If the chatflow ID is not found, its value is reflected in the 404 page, which has type text/html. This allows an attacker to attach arbitrary scripts to the page, allowing an attacker to steal sensitive information. This XSS may be chained with the path injection to allow an attacker without direct access to Flowise to read arbitrary files from the Flowise server. As of time of publication, no known patches are available." "value": "Flowise is a drag & drop user interface to build a customized large language model flow. In version 1.4.3 of Flowise, a reflected cross-site scripting vulnerability occurs in the `api/v1/chatflows/id` endpoint. If the default configuration is used (unauthenticated), an attacker may be able to craft a specially crafted URL that injects Javascript into the user sessions, allowing the attacker to steal information, create false popups, or even redirect the user to other websites without interaction. If the chatflow ID is not found, its value is reflected in the 404 page, which has type text/html. This allows an attacker to attach arbitrary scripts to the page, allowing an attacker to steal sensitive information. This XSS may be chained with the path injection to allow an attacker without direct access to Flowise to read arbitrary files from the Flowise server. As of time of publication, no known patches are available."
},
{
"lang": "es",
"value": "Flowise es una interfaz de usuario de arrastrar y soltar para crear un flujo de modelo de lenguaje grande personalizado. En la versi\u00f3n 1.4.3 de Flowise, se produce una vulnerabilidad de cross-site scripting reflejado en el endpoint `api/v1/chatflows/id`. Si se utiliza la configuraci\u00f3n predeterminada (no autenticada), un atacante puede crear una URL especialmente manipulada que inyecta Javascript en las sesiones del usuario, lo que le permite robar informaci\u00f3n, crear ventanas emergentes falsas o incluso redirigir al usuario a otros sitios web sin interacci\u00f3n. Si no se encuentra el ID del flujo de chat, su valor se refleja en la p\u00e1gina 404, que tiene el tipo texto/html. Esto permite a un atacante adjuntar scripts arbitrarios a la p\u00e1gina, lo que le permite robar informaci\u00f3n confidencial. Este XSS puede encadenarse con la inyecci\u00f3n de ruta para permitir que un atacante sin acceso directo a Flowise lea archivos arbitrarios del servidor Flowise. Al momento de la publicaci\u00f3n, no hay parches conocidos disponibles."
} }
], ],
"metrics": { "metrics": {
"cvssMetricV31": [ "cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 6.1,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 2.7
},
{ {
"source": "security-advisories@github.com", "source": "security-advisories@github.com",
"type": "Secondary", "type": "Secondary",
@ -36,6 +60,16 @@
] ]
}, },
"weaknesses": [ "weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
},
{ {
"source": "security-advisories@github.com", "source": "security-advisories@github.com",
"type": "Secondary", "type": "Secondary",
@ -47,14 +81,38 @@
] ]
} }
], ],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:flowiseai:flowise:1.4.3:*:*:*:*:*:*:*",
"matchCriteriaId": "46DEFB82-D429-4A21-A963-B9DD1EB58AD5"
}
]
}
]
}
],
"references": [ "references": [
{ {
"url": "https://github.com/FlowiseAI/Flowise/blob/flowise-ui%401.4.0/packages/server/src/index.ts#L312-L312", "url": "https://github.com/FlowiseAI/Flowise/blob/flowise-ui%401.4.0/packages/server/src/index.ts#L312-L312",
"source": "security-advisories@github.com" "source": "security-advisories@github.com",
"tags": [
"Product"
]
}, },
{ {
"url": "https://securitylab.github.com/advisories/GHSL-2023-232_GHSL-2023-234_Flowise/", "url": "https://securitylab.github.com/advisories/GHSL-2023-232_GHSL-2023-234_Flowise/",
"source": "security-advisories@github.com" "source": "security-advisories@github.com",
"tags": [
"Exploit",
"Third Party Advisory"
]
} }
] ]
} }

View File

@ -0,0 +1,21 @@
{
"id": "CVE-2024-37726",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-07-03T14:15:06.120",
"lastModified": "2024-07-03T14:15:06.120",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Insecure Permissions vulnerability in Micro-Star International Co., Ltd MSI Center v.2.0.36.0 allows a local attacker to escalate privileges via the Export System Info function in MSI.CentralServer.exe"
}
],
"metrics": {},
"references": [
{
"url": "https://github.com/carsonchan12345/CVE-2024-37726-MSI-Center-Local-Privilege-Escalation",
"source": "cve@mitre.org"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-37741", "id": "CVE-2024-37741",
"sourceIdentifier": "cve@mitre.org", "sourceIdentifier": "cve@mitre.org",
"published": "2024-06-28T13:15:02.860", "published": "2024-06-28T13:15:02.860",
"lastModified": "2024-07-03T02:04:40.153", "lastModified": "2024-07-03T14:27:08.057",
"vulnStatus": "Undergoing Analysis", "vulnStatus": "Analyzed",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
{ {
@ -17,6 +17,26 @@
], ],
"metrics": { "metrics": {
"cvssMetricV31": [ "cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 5.4,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.3,
"impactScore": 2.7
},
{ {
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary", "type": "Secondary",
@ -40,6 +60,16 @@
] ]
}, },
"weaknesses": [ "weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
},
{ {
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary", "type": "Secondary",
@ -51,18 +81,57 @@
] ]
} }
], ],
"configurations": [
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:openplcproject:openplc_v3_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "7624BE59-886B-421D-96CC-105F185AE070"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:openplcproject:openplc_v3:-:*:*:*:*:*:*:*",
"matchCriteriaId": "6861E863-E6AC-4BFB-8CDE-2328A045540D"
}
]
}
]
}
],
"references": [ "references": [
{ {
"url": "https://1d8.github.io/cves/cve_2024_37741/", "url": "https://1d8.github.io/cves/cve_2024_37741/",
"source": "cve@mitre.org" "source": "cve@mitre.org",
"tags": [
"Exploit"
]
}, },
{ {
"url": "https://github.com/thiagoralves/OpenPLC_v3/blob/9cd8f1b53a50f9d38708096bfc72bcbb1ef47343/webserver/pages.py#L992", "url": "https://github.com/thiagoralves/OpenPLC_v3/blob/9cd8f1b53a50f9d38708096bfc72bcbb1ef47343/webserver/pages.py#L992",
"source": "cve@mitre.org" "source": "cve@mitre.org",
"tags": [
"Product"
]
}, },
{ {
"url": "https://github.com/thiagoralves/OpenPLC_v3/issues/242", "url": "https://github.com/thiagoralves/OpenPLC_v3/issues/242",
"source": "cve@mitre.org" "source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking"
]
} }
] ]
} }

View File

@ -2,17 +2,54 @@
"id": "CVE-2024-3800", "id": "CVE-2024-3800",
"sourceIdentifier": "cvd@cert.pl", "sourceIdentifier": "cvd@cert.pl",
"published": "2024-06-28T13:15:02.990", "published": "2024-06-28T13:15:02.990",
"lastModified": "2024-06-28T13:38:47.077", "lastModified": "2024-07-03T14:36:22.273",
"vulnStatus": "Awaiting Analysis", "vulnStatus": "Analyzed",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",
"value": "Sites managed in S@M CMS (Concept Intermedia) might be vulnerable to Reflected XSS\u00a0via including scripts in requested file names.\u00a0\nOnly a part of observed services is vulnerable, but since vendor has not investigated the root problem, it is hard to determine when the issue appears." "value": "Sites managed in S@M CMS (Concept Intermedia) might be vulnerable to Reflected XSS\u00a0via including scripts in requested file names.\u00a0\nOnly a part of observed services is vulnerable, but since vendor has not investigated the root problem, it is hard to determine when the issue appears."
},
{
"lang": "es",
"value": "Los sitios administrados en S@M CMS (Concept Intermedia) pueden ser vulnerables a XSS Reflejado al incluir scripts en los nombres de archivos solicitados. S\u00f3lo una parte de los servicios observados es vulnerable, pero como el proveedor no ha investigado la ra\u00edz del problema, es dif\u00edcil determinar cu\u00e1ndo aparece el problema."
} }
], ],
"metrics": {}, "metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 6.1,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 2.7
}
]
},
"weaknesses": [ "weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
},
{ {
"source": "cvd@cert.pl", "source": "cvd@cert.pl",
"type": "Secondary", "type": "Secondary",
@ -24,14 +61,38 @@
] ]
} }
], ],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:conceptintermedia:s\\@m_cms:*:*:*:*:*:*:*:*",
"versionEndIncluding": "3.3",
"matchCriteriaId": "00A1AF5A-47FF-4080-A506-DB634A54CD6C"
}
]
}
]
}
],
"references": [ "references": [
{ {
"url": "https://cert.pl/en/posts/2024/06/CVE-2024-3800", "url": "https://cert.pl/en/posts/2024/06/CVE-2024-3800",
"source": "cvd@cert.pl" "source": "cvd@cert.pl",
"tags": [
"Third Party Advisory"
]
}, },
{ {
"url": "https://cert.pl/posts/2024/06/CVE-2024-3800", "url": "https://cert.pl/posts/2024/06/CVE-2024-3800",
"source": "cvd@cert.pl" "source": "cvd@cert.pl",
"tags": [
"Third Party Advisory"
]
} }
] ]
} }

View File

@ -2,17 +2,54 @@
"id": "CVE-2024-3801", "id": "CVE-2024-3801",
"sourceIdentifier": "cvd@cert.pl", "sourceIdentifier": "cvd@cert.pl",
"published": "2024-06-28T13:15:03.157", "published": "2024-06-28T13:15:03.157",
"lastModified": "2024-06-28T13:38:47.077", "lastModified": "2024-07-03T14:36:52.797",
"vulnStatus": "Awaiting Analysis", "vulnStatus": "Analyzed",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",
"value": "Sites managed in S@M CMS (Concept Intermedia) might be vulnerable to Reflected XSS\u00a0via including scripts in one of GET header parameters.\u00a0\nOnly a part of observed services is vulnerable, but since vendor has not investigated the root problem, it is hard to determine when the issue appears." "value": "Sites managed in S@M CMS (Concept Intermedia) might be vulnerable to Reflected XSS\u00a0via including scripts in one of GET header parameters.\u00a0\nOnly a part of observed services is vulnerable, but since vendor has not investigated the root problem, it is hard to determine when the issue appears."
},
{
"lang": "es",
"value": "Los sitios administrados en S@M CMS (Concept Intermedia) pueden ser vulnerables a XSS Reflejado al incluir scripts en uno de los par\u00e1metros del encabezado GET. S\u00f3lo una parte de los servicios observados es vulnerable, pero como el proveedor no ha investigado la ra\u00edz del problema, es dif\u00edcil determinar cu\u00e1ndo aparece el problema."
} }
], ],
"metrics": {}, "metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 6.1,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 2.7
}
]
},
"weaknesses": [ "weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
},
{ {
"source": "cvd@cert.pl", "source": "cvd@cert.pl",
"type": "Secondary", "type": "Secondary",
@ -24,14 +61,38 @@
] ]
} }
], ],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:conceptintermedia:s\\@m_cms:*:*:*:*:*:*:*:*",
"versionEndIncluding": "3.3",
"matchCriteriaId": "00A1AF5A-47FF-4080-A506-DB634A54CD6C"
}
]
}
]
}
],
"references": [ "references": [
{ {
"url": "https://cert.pl/en/posts/2024/06/CVE-2024-3800", "url": "https://cert.pl/en/posts/2024/06/CVE-2024-3800",
"source": "cvd@cert.pl" "source": "cvd@cert.pl",
"tags": [
"Third Party Advisory"
]
}, },
{ {
"url": "https://cert.pl/posts/2024/06/CVE-2024-3800", "url": "https://cert.pl/posts/2024/06/CVE-2024-3800",
"source": "cvd@cert.pl" "source": "cvd@cert.pl",
"tags": [
"Third Party Advisory"
]
} }
] ]
} }

View File

@ -2,17 +2,54 @@
"id": "CVE-2024-3816", "id": "CVE-2024-3816",
"sourceIdentifier": "cvd@cert.pl", "sourceIdentifier": "cvd@cert.pl",
"published": "2024-06-28T13:15:03.283", "published": "2024-06-28T13:15:03.283",
"lastModified": "2024-06-28T13:38:47.077", "lastModified": "2024-07-03T14:37:07.750",
"vulnStatus": "Awaiting Analysis", "vulnStatus": "Analyzed",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",
"value": "Sites managed in S@M CMS (Concept Intermedia) might be vulnerable to a blind SQL Injection executed using the search bar.\u00a0\nOnly a part of observed services is vulnerable, but since vendor has not investigated the root problem, it is hard to determine when the issue appears." "value": "Sites managed in S@M CMS (Concept Intermedia) might be vulnerable to a blind SQL Injection executed using the search bar.\u00a0\nOnly a part of observed services is vulnerable, but since vendor has not investigated the root problem, it is hard to determine when the issue appears."
},
{
"lang": "es",
"value": "Los sitios administrados en S@M CMS (Concept Intermedia) pueden ser vulnerables a una inyecci\u00f3n SQL ciega ejecutada mediante la barra de b\u00fasqueda. S\u00f3lo una parte de los servicios observados es vulnerable, pero como el proveedor no ha investigado la ra\u00edz del problema, es dif\u00edcil determinar cu\u00e1ndo aparece el problema."
} }
], ],
"metrics": {}, "metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
]
},
"weaknesses": [ "weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-89"
}
]
},
{ {
"source": "cvd@cert.pl", "source": "cvd@cert.pl",
"type": "Secondary", "type": "Secondary",
@ -24,14 +61,38 @@
] ]
} }
], ],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:conceptintermedia:s\\@m_cms:*:*:*:*:*:*:*:*",
"versionEndIncluding": "3.3",
"matchCriteriaId": "00A1AF5A-47FF-4080-A506-DB634A54CD6C"
}
]
}
]
}
],
"references": [ "references": [
{ {
"url": "https://cert.pl/en/posts/2024/06/CVE-2024-3800", "url": "https://cert.pl/en/posts/2024/06/CVE-2024-3800",
"source": "cvd@cert.pl" "source": "cvd@cert.pl",
"tags": [
"Third Party Advisory"
]
}, },
{ {
"url": "https://cert.pl/posts/2024/06/CVE-2024-3800", "url": "https://cert.pl/posts/2024/06/CVE-2024-3800",
"source": "cvd@cert.pl" "source": "cvd@cert.pl",
"tags": [
"Third Party Advisory"
]
} }
] ]
} }

View File

@ -0,0 +1,25 @@
{
"id": "CVE-2024-39220",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-07-03T15:15:05.993",
"lastModified": "2024-07-03T15:15:05.993",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "BAS-IP AV-01D, AV-01MD, AV-01MFD, AV-01ED, AV-01KD, AV-01BD, AV-01KBD, AV-02D, AV-02IDE, AV-02IDR, AV-02IPD, AV-02FDE, AV-02FDR, AV-03D, AV-03BD, AV-04AFD, AV-04ASD, AV-04FD, AV-04SD, AV-05FD, AV-05SD, AA-07BD, AA-07BDI, BA-04BD, BA-04MD, BA-08BD, BA-08MD, BA-12BD, BA-12MD, CR-02BD before firmware v3.9.2 allows authenticated attackers to read SIP account passwords via a crafted GET request."
}
],
"metrics": {},
"references": [
{
"url": "https://bas-ip.com/bsa-000001",
"source": "cve@mitre.org"
},
{
"url": "https://github.com/DrieVlad/BAS-IP-vulnerabilities",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,29 @@
{
"id": "CVE-2024-39223",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-07-03T15:15:06.083",
"lastModified": "2024-07-03T15:15:06.083",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "An authentication bypass in the SSH service of gost v2.11.5 allows attackers to intercept communications via setting the HostKeyCallback function to ssh.InsecureIgnoreHostKey"
}
],
"metrics": {},
"references": [
{
"url": "https://gist.github.com/nyxfqq/a7242170b1118e78436a62dee4e09e8a",
"source": "cve@mitre.org"
},
{
"url": "https://github.com/ginuerzh/gost/blob/729d0e70005607dc7c69fc1de62fd8fe21f85355/ssh.go#L229",
"source": "cve@mitre.org"
},
{
"url": "https://github.com/ginuerzh/gost/issues/1034",
"source": "cve@mitre.org"
}
]
}

View File

@ -2,24 +2,87 @@
"id": "CVE-2024-39704", "id": "CVE-2024-39704",
"sourceIdentifier": "cve@mitre.org", "sourceIdentifier": "cve@mitre.org",
"published": "2024-06-28T13:15:02.927", "published": "2024-06-28T13:15:02.927",
"lastModified": "2024-06-28T13:38:47.077", "lastModified": "2024-07-03T14:32:56.510",
"vulnStatus": "Awaiting Analysis", "vulnStatus": "Analyzed",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",
"value": "Soft Circle French-Bread Melty Blood: Actress Again: Current Code through 1.07 Rev. 1.4.0 allows a remote attacker to execute arbitrary code on a client's machine via a crafted packet on TCP port 46318." "value": "Soft Circle French-Bread Melty Blood: Actress Again: Current Code through 1.07 Rev. 1.4.0 allows a remote attacker to execute arbitrary code on a client's machine via a crafted packet on TCP port 46318."
},
{
"lang": "es",
"value": "Soft Circle French-Bread Melty Blood: Actress Again: Current Code hasta 1.07 Rev. 1.4.0 permite a un atacante remoto ejecutar c\u00f3digo arbitrario en la m\u00e1quina de un cliente a trav\u00e9s de un paquete manipulado en el puerto TCP 46318."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-74"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:unknown-corp:melty_blood_actress_again_current_code:*:*:*:*:*:*:*:*",
"versionEndIncluding": "1.07",
"matchCriteriaId": "AFE0E80B-E798-4931-9952-54D596CCE5A7"
}
]
}
]
} }
], ],
"metrics": {},
"references": [ "references": [
{ {
"url": "https://github.com/MikeIsAStar/Melty-Blood-Actress-Again-Current-Code-Remote-Code-Execution", "url": "https://github.com/MikeIsAStar/Melty-Blood-Actress-Again-Current-Code-Remote-Code-Execution",
"source": "cve@mitre.org" "source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
]
}, },
{ {
"url": "https://pastebin.com/agpnQmhu", "url": "https://pastebin.com/agpnQmhu",
"source": "cve@mitre.org" "source": "cve@mitre.org",
"tags": [
"Exploit"
]
} }
] ]
} }

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-3999", "id": "CVE-2024-3999",
"sourceIdentifier": "contact@wpscan.com", "sourceIdentifier": "contact@wpscan.com",
"published": "2024-07-02T06:15:04.050", "published": "2024-07-02T06:15:04.050",
"lastModified": "2024-07-03T02:06:58.680", "lastModified": "2024-07-03T15:44:56.130",
"vulnStatus": "Awaiting Analysis", "vulnStatus": "Analyzed",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
{ {
@ -17,6 +17,26 @@
], ],
"metrics": { "metrics": {
"cvssMetricV31": [ "cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 4.8,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.7,
"impactScore": 2.7
},
{ {
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary", "type": "Secondary",
@ -39,10 +59,44 @@
} }
] ]
}, },
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:spider-themes:eazydocs:*:*:*:*:*:wordpress:*:*",
"versionEndExcluding": "2.5.0",
"matchCriteriaId": "D84E69AF-BB0B-4BB9-B5EA-6D03511649A9"
}
]
}
]
}
],
"references": [ "references": [
{ {
"url": "https://wpscan.com/vulnerability/6a8a1deb-6836-40f1-856b-7b3e4ba867d6/", "url": "https://wpscan.com/vulnerability/6a8a1deb-6836-40f1-856b-7b3e4ba867d6/",
"source": "contact@wpscan.com" "source": "contact@wpscan.com",
"tags": [
"Exploit",
"Third Party Advisory"
]
} }
] ]
} }

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-4627", "id": "CVE-2024-4627",
"sourceIdentifier": "contact@wpscan.com", "sourceIdentifier": "contact@wpscan.com",
"published": "2024-07-02T06:15:04.400", "published": "2024-07-02T06:15:04.400",
"lastModified": "2024-07-03T02:07:51.527", "lastModified": "2024-07-03T15:45:08.187",
"vulnStatus": "Awaiting Analysis", "vulnStatus": "Analyzed",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
{ {
@ -17,6 +17,26 @@
], ],
"metrics": { "metrics": {
"cvssMetricV31": [ "cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 5.4,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.3,
"impactScore": 2.7
},
{ {
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary", "type": "Secondary",
@ -39,10 +59,44 @@
} }
] ]
}, },
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:rankmath:seo:*:*:*:*:free:wordpress:*:*",
"versionEndExcluding": "1.0.219",
"matchCriteriaId": "D3446436-48C0-417A-A0E8-53AD3E2F8298"
}
]
}
]
}
],
"references": [ "references": [
{ {
"url": "https://wpscan.com/vulnerability/c0058fcc-36f6-40bf-9848-fbe2d751d754/", "url": "https://wpscan.com/vulnerability/c0058fcc-36f6-40bf-9848-fbe2d751d754/",
"source": "contact@wpscan.com" "source": "contact@wpscan.com",
"tags": [
"Exploit",
"Third Party Advisory"
]
} }
] ]
} }

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-5349", "id": "CVE-2024-5349",
"sourceIdentifier": "security@wordfence.com", "sourceIdentifier": "security@wordfence.com",
"published": "2024-07-02T05:15:10.470", "published": "2024-07-02T05:15:10.470",
"lastModified": "2024-07-02T12:09:16.907", "lastModified": "2024-07-03T15:44:23.807",
"vulnStatus": "Awaiting Analysis", "vulnStatus": "Analyzed",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
{ {
@ -39,14 +39,50 @@
} }
] ]
}, },
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-Other"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:la-studioweb:element_kit_for_elementor:*:*:*:*:*:wordpress:*:*",
"versionEndExcluding": "1.3.9",
"matchCriteriaId": "2AB75FE2-C692-4F70-8726-45F5000C98BF"
}
]
}
]
}
],
"references": [ "references": [
{ {
"url": "https://plugins.trac.wordpress.org/changeset/3108501/lastudio-element-kit/trunk/includes/addons/google-maps.php", "url": "https://plugins.trac.wordpress.org/changeset/3108501/lastudio-element-kit/trunk/includes/addons/google-maps.php",
"source": "security@wordfence.com" "source": "security@wordfence.com",
"tags": [
"Patch"
]
}, },
{ {
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/2e29a67b-2b67-4cd5-a5ae-a931900c75cd?source=cve", "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/2e29a67b-2b67-4cd5-a5ae-a931900c75cd?source=cve",
"source": "security@wordfence.com" "source": "security@wordfence.com",
"tags": [
"Third Party Advisory"
]
} }
] ]
} }

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-5419", "id": "CVE-2024-5419",
"sourceIdentifier": "security@wordfence.com", "sourceIdentifier": "security@wordfence.com",
"published": "2024-07-02T04:15:03.417", "published": "2024-07-02T04:15:03.417",
"lastModified": "2024-07-02T12:09:16.907", "lastModified": "2024-07-03T15:43:09.450",
"vulnStatus": "Awaiting Analysis", "vulnStatus": "Analyzed",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
{ {
@ -18,8 +18,28 @@
"metrics": { "metrics": {
"cvssMetricV31": [ "cvssMetricV31": [
{ {
"source": "security@wordfence.com", "source": "nvd@nist.gov",
"type": "Primary", "type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 5.4,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.3,
"impactScore": 2.7
},
{
"source": "security@wordfence.com",
"type": "Secondary",
"cvssData": { "cvssData": {
"version": "3.1", "version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N",
@ -39,18 +59,57 @@
} }
] ]
}, },
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:voidcoders:void_contact_form_7_widget_for_elementor_page_builder:*:*:*:*:*:wordpress:*:*",
"versionEndExcluding": "2.4.1",
"matchCriteriaId": "135B2D6F-B132-456B-A8C8-317BD02A7DB2"
}
]
}
]
}
],
"references": [ "references": [
{ {
"url": "https://plugins.trac.wordpress.org/browser/cf7-widget-elementor/tags/2.4/widgets/void-section-cf7.php#L1672", "url": "https://plugins.trac.wordpress.org/browser/cf7-widget-elementor/tags/2.4/widgets/void-section-cf7.php#L1672",
"source": "security@wordfence.com" "source": "security@wordfence.com",
"tags": [
"Product"
]
}, },
{ {
"url": "https://plugins.trac.wordpress.org/changeset/3109802/#file6", "url": "https://plugins.trac.wordpress.org/changeset/3109802/#file6",
"source": "security@wordfence.com" "source": "security@wordfence.com",
"tags": [
"Patch"
]
}, },
{ {
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/2837c9b2-419e-453a-b011-5ec1ef050d62?source=cve", "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/2837c9b2-419e-453a-b011-5ec1ef050d62?source=cve",
"source": "security@wordfence.com" "source": "security@wordfence.com",
"tags": [
"Third Party Advisory"
]
} }
] ]
} }

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-5606", "id": "CVE-2024-5606",
"sourceIdentifier": "contact@wpscan.com", "sourceIdentifier": "contact@wpscan.com",
"published": "2024-07-02T06:15:04.760", "published": "2024-07-02T06:15:04.760",
"lastModified": "2024-07-02T12:09:16.907", "lastModified": "2024-07-03T15:45:19.513",
"vulnStatus": "Awaiting Analysis", "vulnStatus": "Analyzed",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
{ {
@ -15,11 +15,68 @@
"value": "El complemento Quiz and Survey Master (QSM) WordPress anterior a 9.0.2 es vulnerable, no valida ni escapa el par\u00e1metro question_id en la acci\u00f3n AJAX qsm_bulk_delete_question_from_database, lo que lleva a una inyecci\u00f3n de SQL explotable por los Colaboradores y roles superiores." "value": "El complemento Quiz and Survey Master (QSM) WordPress anterior a 9.0.2 es vulnerable, no valida ni escapa el par\u00e1metro question_id en la acci\u00f3n AJAX qsm_bulk_delete_question_from_database, lo que lleva a una inyecci\u00f3n de SQL explotable por los Colaboradores y roles superiores."
} }
], ],
"metrics": {}, "metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-89"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:expresstech:quiz_and_survey_master:*:*:*:*:*:wordpress:*:*",
"versionEndExcluding": "9.0.2",
"matchCriteriaId": "57725447-AB0A-4B25-BB23-9292AFA5FB01"
}
]
}
]
}
],
"references": [ "references": [
{ {
"url": "https://wpscan.com/vulnerability/e3eee6bc-1f69-4be1-b323-0c9b5fe7535e/", "url": "https://wpscan.com/vulnerability/e3eee6bc-1f69-4be1-b323-0c9b5fe7535e/",
"source": "contact@wpscan.com" "source": "contact@wpscan.com",
"tags": [
"Exploit",
"Third Party Advisory"
]
} }
] ]
} }

View File

@ -2,13 +2,17 @@
"id": "CVE-2024-5735", "id": "CVE-2024-5735",
"sourceIdentifier": "cvd@cert.pl", "sourceIdentifier": "cvd@cert.pl",
"published": "2024-06-28T12:15:10.117", "published": "2024-06-28T12:15:10.117",
"lastModified": "2024-06-28T13:38:47.077", "lastModified": "2024-07-03T15:45:57.677",
"vulnStatus": "Awaiting Analysis", "vulnStatus": "Analyzed",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",
"value": "Full Path Disclosure vulnerability in AdmirorFrames Joomla! extension in afHelper.php script allows an unauthorised attacker to retrieve location of web root folder.\u00a0This issue affects AdmirorFrames: before 5.0." "value": "Full Path Disclosure vulnerability in AdmirorFrames Joomla! extension in afHelper.php script allows an unauthorised attacker to retrieve location of web root folder.\u00a0This issue affects AdmirorFrames: before 5.0."
},
{
"lang": "es",
"value": "Vulnerabilidad de divulgaci\u00f3n de ruta completa en AdmirorFrames Joomla! La extensi\u00f3n en el script afHelper.php permite a un atacante no autorizado recuperar la ubicaci\u00f3n de la carpeta ra\u00edz web. Este problema afecta a AdmirorFrames: anteriores a 5.0."
} }
], ],
"metrics": { "metrics": {
@ -55,9 +59,41 @@
"baseSeverity": "MEDIUM" "baseSeverity": "MEDIUM"
} }
} }
],
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 7.5,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
}
] ]
}, },
"weaknesses": [ "weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-Other"
}
]
},
{ {
"source": "cvd@cert.pl", "source": "cvd@cert.pl",
"type": "Secondary", "type": "Secondary",
@ -69,26 +105,61 @@
] ]
} }
], ],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:admiror-design-studio:admirorframes:*:*:*:*:*:joomla\\!:*:*",
"versionEndExcluding": "5.0",
"matchCriteriaId": "C5EF0F23-1AE6-4174-96B5-D0ADAC6163BC"
}
]
}
]
}
],
"references": [ "references": [
{ {
"url": "https://cert.pl/en/posts/2024/06/CVE-2024-5735/", "url": "https://cert.pl/en/posts/2024/06/CVE-2024-5735/",
"source": "cvd@cert.pl" "source": "cvd@cert.pl",
"tags": [
"Third Party Advisory"
]
}, },
{ {
"url": "https://cert.pl/posts/2024/06/CVE-2024-5735/", "url": "https://cert.pl/posts/2024/06/CVE-2024-5735/",
"source": "cvd@cert.pl" "source": "cvd@cert.pl",
"tags": [
"Third Party Advisory"
]
}, },
{ {
"url": "https://github.com/afine-com/CVE-2024-5735", "url": "https://github.com/afine-com/CVE-2024-5735",
"source": "cvd@cert.pl" "source": "cvd@cert.pl",
"tags": [
"Exploit",
"Third Party Advisory"
]
}, },
{ {
"url": "https://github.com/sectroyer/CVEs/tree/main/CVE-2024-5735", "url": "https://github.com/sectroyer/CVEs/tree/main/CVE-2024-5735",
"source": "cvd@cert.pl" "source": "cvd@cert.pl",
"tags": [
"Exploit",
"Third Party Advisory"
]
}, },
{ {
"url": "https://github.com/vasiljevski/admirorframes/issues/3", "url": "https://github.com/vasiljevski/admirorframes/issues/3",
"source": "cvd@cert.pl" "source": "cvd@cert.pl",
"tags": [
"Issue Tracking"
]
} }
] ]
} }

View File

@ -2,13 +2,17 @@
"id": "CVE-2024-5736", "id": "CVE-2024-5736",
"sourceIdentifier": "cvd@cert.pl", "sourceIdentifier": "cvd@cert.pl",
"published": "2024-06-28T12:15:10.923", "published": "2024-06-28T12:15:10.923",
"lastModified": "2024-06-28T13:38:47.077", "lastModified": "2024-07-03T15:46:08.877",
"vulnStatus": "Awaiting Analysis", "vulnStatus": "Analyzed",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",
"value": "Server Side Request Forgery (SSRF) vulnerability in AdmirorFrames Joomla! extension in afGdStream.php script allows to access local files or server pages available only from localhost.\u00a0This issue affects AdmirorFrames: before 5.0." "value": "Server Side Request Forgery (SSRF) vulnerability in AdmirorFrames Joomla! extension in afGdStream.php script allows to access local files or server pages available only from localhost.\u00a0This issue affects AdmirorFrames: before 5.0."
},
{
"lang": "es",
"value": "Vulnerabilidad de Server Side Request Forgery (SSRF) en AdmirorFrames Joomla! La extensi\u00f3n en el script afGdStream.php permite acceder a archivos locales o p\u00e1ginas del servidor disponibles solo desde localhost. Este problema afecta a AdmirorFrames: anteriores a 5.0."
} }
], ],
"metrics": { "metrics": {
@ -55,9 +59,41 @@
"baseSeverity": "HIGH" "baseSeverity": "HIGH"
} }
} }
],
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 7.5,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
}
] ]
}, },
"weaknesses": [ "weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-918"
}
]
},
{ {
"source": "cvd@cert.pl", "source": "cvd@cert.pl",
"type": "Secondary", "type": "Secondary",
@ -69,26 +105,61 @@
] ]
} }
], ],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:admiror-design-studio:admirorframes:*:*:*:*:*:joomla\\!:*:*",
"versionEndExcluding": "5.0",
"matchCriteriaId": "C5EF0F23-1AE6-4174-96B5-D0ADAC6163BC"
}
]
}
]
}
],
"references": [ "references": [
{ {
"url": "https://cert.pl/en/posts/2024/06/CVE-2024-5735/", "url": "https://cert.pl/en/posts/2024/06/CVE-2024-5735/",
"source": "cvd@cert.pl" "source": "cvd@cert.pl",
"tags": [
"Third Party Advisory"
]
}, },
{ {
"url": "https://cert.pl/posts/2024/06/CVE-2024-5735/", "url": "https://cert.pl/posts/2024/06/CVE-2024-5735/",
"source": "cvd@cert.pl" "source": "cvd@cert.pl",
"tags": [
"Third Party Advisory"
]
}, },
{ {
"url": "https://github.com/afine-com/CVE-2024-5736", "url": "https://github.com/afine-com/CVE-2024-5736",
"source": "cvd@cert.pl" "source": "cvd@cert.pl",
"tags": [
"Exploit",
"Third Party Advisory"
]
}, },
{ {
"url": "https://github.com/sectroyer/CVEs/tree/main/CVE-2024-5736", "url": "https://github.com/sectroyer/CVEs/tree/main/CVE-2024-5736",
"source": "cvd@cert.pl" "source": "cvd@cert.pl",
"tags": [
"Exploit",
"Third Party Advisory"
]
}, },
{ {
"url": "https://github.com/vasiljevski/admirorframes/issues/3", "url": "https://github.com/vasiljevski/admirorframes/issues/3",
"source": "cvd@cert.pl" "source": "cvd@cert.pl",
"tags": [
"Issue Tracking"
]
} }
] ]
} }

View File

@ -2,13 +2,17 @@
"id": "CVE-2024-5737", "id": "CVE-2024-5737",
"sourceIdentifier": "cvd@cert.pl", "sourceIdentifier": "cvd@cert.pl",
"published": "2024-06-28T12:15:11.060", "published": "2024-06-28T12:15:11.060",
"lastModified": "2024-06-28T13:38:47.077", "lastModified": "2024-07-03T14:09:22.483",
"vulnStatus": "Awaiting Analysis", "vulnStatus": "Analyzed",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",
"value": "Script afGdStream.php in\u00a0AdmirorFrames Joomla! extension doesn\u2019t specify a content type and as a result default (text/html) is used. An attacker may embed HTML tags directly in image data which is rendered by a webpage as HTML.\u00a0This issue affects AdmirorFrames: before 5.0." "value": "Script afGdStream.php in\u00a0AdmirorFrames Joomla! extension doesn\u2019t specify a content type and as a result default (text/html) is used. An attacker may embed HTML tags directly in image data which is rendered by a webpage as HTML.\u00a0This issue affects AdmirorFrames: before 5.0."
},
{
"lang": "es",
"value": "Script afGdStream.php en AdmirorFrames Joomla! La extensi\u00f3n no especifica un tipo de contenido y, como resultado, se utiliza el valor predeterminado (texto/html). Un atacante puede incrustar etiquetas HTML directamente en datos de im\u00e1genes que una p\u00e1gina web representa como HTML. Este problema afecta a AdmirorFrames: anteriores a 5.0."
} }
], ],
"metrics": { "metrics": {
@ -55,9 +59,41 @@
"baseSeverity": "MEDIUM" "baseSeverity": "MEDIUM"
} }
} }
],
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 6.1,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 2.7
}
] ]
}, },
"weaknesses": [ "weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
},
{ {
"source": "cvd@cert.pl", "source": "cvd@cert.pl",
"type": "Secondary", "type": "Secondary",
@ -69,26 +105,61 @@
] ]
} }
], ],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:admiror-design-studio:admirorframes:*:*:*:*:*:joomla\\!:*:*",
"versionEndExcluding": "5.0",
"matchCriteriaId": "C5EF0F23-1AE6-4174-96B5-D0ADAC6163BC"
}
]
}
]
}
],
"references": [ "references": [
{ {
"url": "https://cert.pl/en/posts/2024/06/CVE-2024-5735/", "url": "https://cert.pl/en/posts/2024/06/CVE-2024-5735/",
"source": "cvd@cert.pl" "source": "cvd@cert.pl",
"tags": [
"Third Party Advisory"
]
}, },
{ {
"url": "https://cert.pl/posts/2024/06/CVE-2024-5735/", "url": "https://cert.pl/posts/2024/06/CVE-2024-5735/",
"source": "cvd@cert.pl" "source": "cvd@cert.pl",
"tags": [
"Third Party Advisory"
]
}, },
{ {
"url": "https://github.com/afine-com/CVE-2024-5737", "url": "https://github.com/afine-com/CVE-2024-5737",
"source": "cvd@cert.pl" "source": "cvd@cert.pl",
"tags": [
"Exploit",
"Third Party Advisory"
]
}, },
{ {
"url": "https://github.com/sectroyer/CVEs/tree/main/CVE-2024-5737", "url": "https://github.com/sectroyer/CVEs/tree/main/CVE-2024-5737",
"source": "cvd@cert.pl" "source": "cvd@cert.pl",
"tags": [
"Exploit",
"Third Party Advisory"
]
}, },
{ {
"url": "https://github.com/vasiljevski/admirorframes/issues/3", "url": "https://github.com/vasiljevski/admirorframes/issues/3",
"source": "cvd@cert.pl" "source": "cvd@cert.pl",
"tags": [
"Issue Tracking"
]
} }
] ]
} }

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-5767", "id": "CVE-2024-5767",
"sourceIdentifier": "contact@wpscan.com", "sourceIdentifier": "contact@wpscan.com",
"published": "2024-07-02T06:15:05.063", "published": "2024-07-02T06:15:05.063",
"lastModified": "2024-07-02T12:09:16.907", "lastModified": "2024-07-03T15:26:29.050",
"vulnStatus": "Awaiting Analysis", "vulnStatus": "Analyzed",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
{ {
@ -15,11 +15,68 @@
"value": "El complemento sitetweet de WordPress hasta la versi\u00f3n 0.2 no tiene control CSRF en algunos lugares y le falta sanitizaci\u00f3n y escape, lo que podr\u00eda permitir a los atacantes hacer que el administrador que haya iniciado sesi\u00f3n agregue payloads XSS almacenado a trav\u00e9s de un ataque CSRF." "value": "El complemento sitetweet de WordPress hasta la versi\u00f3n 0.2 no tiene control CSRF en algunos lugares y le falta sanitizaci\u00f3n y escape, lo que podr\u00eda permitir a los atacantes hacer que el administrador que haya iniciado sesi\u00f3n agregue payloads XSS almacenado a trav\u00e9s de un ataque CSRF."
} }
], ],
"metrics": {}, "metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-352"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:sitetweet_project:sitetweet:*:*:*:*:*:wordpress:*:*",
"versionEndIncluding": "0.2",
"matchCriteriaId": "45A2DEB6-4F70-4E8A-9744-9EC3474517FD"
}
]
}
]
}
],
"references": [ "references": [
{ {
"url": "https://wpscan.com/vulnerability/e4ba26b4-5f4f-4c9e-aa37-885b30ef8088/", "url": "https://wpscan.com/vulnerability/e4ba26b4-5f4f-4c9e-aa37-885b30ef8088/",
"source": "contact@wpscan.com" "source": "contact@wpscan.com",
"tags": [
"Exploit",
"Third Party Advisory"
]
} }
] ]
} }

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2024-6052",
"sourceIdentifier": "security@checkmk.com",
"published": "2024-07-03T15:15:06.223",
"lastModified": "2024-07-03T15:15:06.223",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Stored XSS in Checkmk before versions 2.3.0p8, 2.2.0p29, 2.1.0p45, and 2.0.0 (EOL) allows users to execute arbitrary scripts by injecting HTML elements"
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security@checkmk.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW",
"baseScore": 6.5,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.3,
"impactScore": 3.7
}
]
},
"weaknesses": [
{
"source": "security@checkmk.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-80"
}
]
}
],
"references": [
{
"url": "https://checkmk.com/werk/17010",
"source": "security@checkmk.com"
}
]
}

View File

@ -0,0 +1,60 @@
{
"id": "CVE-2024-6126",
"sourceIdentifier": "secalert@redhat.com",
"published": "2024-07-03T15:15:06.470",
"lastModified": "2024-07-03T15:15:06.470",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A flaw was found in the cockpit package. This flaw allows an authenticated user to kill any process when enabling the pam_env's user_readenv option, which leads to a denial of service (DoS) attack."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "secalert@redhat.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:C/C:N/I:N/A:L",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "LOW",
"baseScore": 3.2,
"baseSeverity": "LOW"
},
"exploitabilityScore": 1.5,
"impactScore": 1.4
}
]
},
"weaknesses": [
{
"source": "secalert@redhat.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-400"
}
]
}
],
"references": [
{
"url": "https://access.redhat.com/security/cve/CVE-2024-6126",
"source": "secalert@redhat.com"
},
{
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2292897",
"source": "secalert@redhat.com"
}
]
}

View File

@ -2,17 +2,41 @@
"id": "CVE-2024-6375", "id": "CVE-2024-6375",
"sourceIdentifier": "cna@mongodb.com", "sourceIdentifier": "cna@mongodb.com",
"published": "2024-07-01T15:15:17.430", "published": "2024-07-01T15:15:17.430",
"lastModified": "2024-07-01T16:37:39.040", "lastModified": "2024-07-03T14:54:52.427",
"vulnStatus": "Awaiting Analysis", "vulnStatus": "Analyzed",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",
"value": "A command for refining a collection shard key is missing an authorization check. This may cause the command to run directly on a shard, leading to either degradation of query performance, or to revealing chunk boundaries through timing side channels. This affects MongoDB Server v5.0 versions, prior to 5.0.22, MongoDB Server v6.0 versions, prior to 6.0.11 and MongoDB Server v7.0 versions prior to 7.0.3." "value": "A command for refining a collection shard key is missing an authorization check. This may cause the command to run directly on a shard, leading to either degradation of query performance, or to revealing chunk boundaries through timing side channels. This affects MongoDB Server v5.0 versions, prior to 5.0.22, MongoDB Server v6.0 versions, prior to 6.0.11 and MongoDB Server v7.0 versions prior to 7.0.3."
},
{
"lang": "es",
"value": "A un comando para refinar una clave de fragmento de colecci\u00f3n le falta una verificaci\u00f3n de autorizaci\u00f3n. Esto puede hacer que el comando se ejecute directamente en un fragmento, lo que provoca una degradaci\u00f3n del rendimiento de la consulta o revela l\u00edmites de fragmentos a trav\u00e9s de canales laterales de temporizaci\u00f3n. Esto afecta a las versiones de MongoDB Server v5.0, anteriores a la 5.0.22, a las versiones de MongoDB Server v6.0, anteriores a la 6.0.11 y a las versiones de MongoDB Server v7.0 anteriores a la 7.0.3."
} }
], ],
"metrics": { "metrics": {
"cvssMetricV31": [ "cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"availabilityImpact": "LOW",
"baseScore": 6.5,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 3.9,
"impactScore": 2.5
},
{ {
"source": "cna@mongodb.com", "source": "cna@mongodb.com",
"type": "Secondary", "type": "Secondary",
@ -36,6 +60,16 @@
] ]
}, },
"weaknesses": [ "weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-862"
}
]
},
{ {
"source": "cna@mongodb.com", "source": "cna@mongodb.com",
"type": "Secondary", "type": "Secondary",
@ -47,10 +81,48 @@
] ]
} }
], ],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:mongodb:mongodb:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.0.0",
"versionEndExcluding": "5.0.22",
"matchCriteriaId": "52107780-5C9C-4DE0-9D16-89F128662C49"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:mongodb:mongodb:*:*:*:*:*:*:*:*",
"versionStartIncluding": "6.0.0",
"versionEndExcluding": "6.0.11",
"matchCriteriaId": "E8EEF504-8B18-4258-89AA-CDA99F3E5875"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:mongodb:mongodb:*:*:*:*:*:*:*:*",
"versionStartIncluding": "7.0.0",
"versionEndExcluding": "7.0.3",
"matchCriteriaId": "301B06FC-E692-4D15-8E45-86268D648D6C"
}
]
}
]
}
],
"references": [ "references": [
{ {
"url": "https://jira.mongodb.org/browse/SERVER-79327", "url": "https://jira.mongodb.org/browse/SERVER-79327",
"source": "cna@mongodb.com" "source": "cna@mongodb.com",
"tags": [
"Issue Tracking",
"Patch",
"Vendor Advisory"
]
} }
] ]
} }

View File

@ -2,17 +2,41 @@
"id": "CVE-2024-6376", "id": "CVE-2024-6376",
"sourceIdentifier": "cna@mongodb.com", "sourceIdentifier": "cna@mongodb.com",
"published": "2024-07-01T15:15:17.673", "published": "2024-07-01T15:15:17.673",
"lastModified": "2024-07-01T16:37:39.040", "lastModified": "2024-07-03T15:04:52.463",
"vulnStatus": "Awaiting Analysis", "vulnStatus": "Analyzed",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",
"value": "MongoDB Compass may be susceptible to code injection due to insufficient sandbox protection settings with the usage of ejson shell parser in Compass' connection handling. This issue affects MongoDB Compass versions prior to version 1.42.2" "value": "MongoDB Compass may be susceptible to code injection due to insufficient sandbox protection settings with the usage of ejson shell parser in Compass' connection handling. This issue affects MongoDB Compass versions prior to version 1.42.2"
},
{
"lang": "es",
"value": "MongoDB Compass puede ser susceptible a la inyecci\u00f3n de c\u00f3digo debido a una configuraci\u00f3n insuficiente de protecci\u00f3n de la zona de pruebas con el uso del analizador de shell ejson en el manejo de conexiones de Compass. Este problema afecta a las versiones de MongoDB Compass anteriores a la versi\u00f3n 1.42.2"
} }
], ],
"metrics": { "metrics": {
"cvssMetricV31": [ "cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
},
{ {
"source": "cna@mongodb.com", "source": "cna@mongodb.com",
"type": "Secondary", "type": "Secondary",
@ -36,6 +60,16 @@
] ]
}, },
"weaknesses": [ "weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-94"
}
]
},
{ {
"source": "cna@mongodb.com", "source": "cna@mongodb.com",
"type": "Secondary", "type": "Secondary",
@ -47,10 +81,33 @@
] ]
} }
], ],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:mongodb:compass:*:*:*:*:*:*:*:*",
"versionEndExcluding": "1.42.2",
"matchCriteriaId": "2C0CC548-DDB4-4527-AEBC-1993B3E39EDA"
}
]
}
]
}
],
"references": [ "references": [
{ {
"url": "https://jira.mongodb.org/browse/COMPASS-7496", "url": "https://jira.mongodb.org/browse/COMPASS-7496",
"source": "cna@mongodb.com" "source": "cna@mongodb.com",
"tags": [
"Issue Tracking",
"Patch",
"Vendor Advisory"
]
} }
] ]
} }

View File

@ -0,0 +1,137 @@
{
"id": "CVE-2024-6471",
"sourceIdentifier": "cna@vuldb.com",
"published": "2024-07-03T14:15:06.490",
"lastModified": "2024-07-03T14:15:06.490",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability classified as critical has been found in SourceCodester Online Tours & Travels Management 1.0. This affects an unknown part of the file sms_setting.php. The manipulation of the argument uname leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-270279."
}
],
"metrics": {
"cvssMetricV40": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "4.0",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"vulnerableSystemConfidentiality": "LOW",
"vulnerableSystemIntegrity": "LOW",
"vulnerableSystemAvailability": "LOW",
"subsequentSystemConfidentiality": "NONE",
"subsequentSystemIntegrity": "NONE",
"subsequentSystemAvailability": "NONE",
"exploitMaturity": "NOT_DEFINED",
"confidentialityRequirements": "NOT_DEFINED",
"integrityRequirements": "NOT_DEFINED",
"availabilityRequirements": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnerableSystemConfidentiality": "NOT_DEFINED",
"modifiedVulnerableSystemIntegrity": "NOT_DEFINED",
"modifiedVulnerableSystemAvailability": "NOT_DEFINED",
"modifiedSubsequentSystemConfidentiality": "NOT_DEFINED",
"modifiedSubsequentSystemIntegrity": "NOT_DEFINED",
"modifiedSubsequentSystemAvailability": "NOT_DEFINED",
"safety": "NOT_DEFINED",
"automatable": "NOT_DEFINED",
"recovery": "NOT_DEFINED",
"valueDensity": "NOT_DEFINED",
"vulnerabilityResponseEffort": "NOT_DEFINED",
"providerUrgency": "NOT_DEFINED",
"baseScore": 5.3,
"baseSeverity": "MEDIUM"
}
}
],
"cvssMetricV31": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW",
"baseScore": 6.3,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 3.4
}
],
"cvssMetricV2": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P",
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "SINGLE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"availabilityImpact": "PARTIAL",
"baseScore": 6.5
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 8.0,
"impactScore": 6.4,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-89"
}
]
}
],
"references": [
{
"url": "https://blog.csdn.net/ENTICE1208/article/details/140141934",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?ctiid.270279",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?id.270279",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?submit.367953",
"source": "cna@vuldb.com"
}
]
}

View File

@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours.
### Last Repository Update ### Last Repository Update
```plain ```plain
2024-07-03T14:02:10.825146+00:00 2024-07-03T16:01:48.944347+00:00
``` ```
### Most recent CVE Modification Timestamp synchronized with NVD ### Most recent CVE Modification Timestamp synchronized with NVD
```plain ```plain
2024-07-03T13:33:20.297000+00:00 2024-07-03T15:46:08.877000+00:00
``` ```
### Last Data Feed Release ### Last Data Feed Release
@ -33,48 +33,51 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
### Total Number of included CVEs ### Total Number of included CVEs
```plain ```plain
255812 255819
``` ```
### CVEs added in the last Commit ### CVEs added in the last Commit
Recently added CVEs: `4` Recently added CVEs: `7`
- [CVE-2024-5672](CVE-2024/CVE-2024-56xx/CVE-2024-5672.json) (`2024-07-03T13:15:03.043`) - [CVE-2024-32937](CVE-2024/CVE-2024-329xx/CVE-2024-32937.json) (`2024-07-03T14:15:05.340`)
- [CVE-2024-6426](CVE-2024/CVE-2024-64xx/CVE-2024-6426.json) (`2024-07-03T12:15:03.150`) - [CVE-2024-37726](CVE-2024/CVE-2024-377xx/CVE-2024-37726.json) (`2024-07-03T14:15:06.120`)
- [CVE-2024-6427](CVE-2024/CVE-2024-64xx/CVE-2024-6427.json) (`2024-07-03T12:15:03.430`) - [CVE-2024-39220](CVE-2024/CVE-2024-392xx/CVE-2024-39220.json) (`2024-07-03T15:15:05.993`)
- [CVE-2024-6470](CVE-2024/CVE-2024-64xx/CVE-2024-6470.json) (`2024-07-03T13:15:03.703`) - [CVE-2024-39223](CVE-2024/CVE-2024-392xx/CVE-2024-39223.json) (`2024-07-03T15:15:06.083`)
- [CVE-2024-6052](CVE-2024/CVE-2024-60xx/CVE-2024-6052.json) (`2024-07-03T15:15:06.223`)
- [CVE-2024-6126](CVE-2024/CVE-2024-61xx/CVE-2024-6126.json) (`2024-07-03T15:15:06.470`)
- [CVE-2024-6471](CVE-2024/CVE-2024-64xx/CVE-2024-6471.json) (`2024-07-03T14:15:06.490`)
### CVEs modified in the last Commit ### CVEs modified in the last Commit
Recently modified CVEs: `49` Recently modified CVEs: `45`
- [CVE-2024-39206](CVE-2024/CVE-2024-392xx/CVE-2024-39206.json) (`2024-07-03T12:53:24.977`) - [CVE-2024-1427](CVE-2024/CVE-2024-14xx/CVE-2024-1427.json) (`2024-07-03T15:44:40.083`)
- [CVE-2024-39315](CVE-2024/CVE-2024-393xx/CVE-2024-39315.json) (`2024-07-03T12:53:24.977`) - [CVE-2024-1931](CVE-2024/CVE-2024-19xx/CVE-2024-1931.json) (`2024-07-03T15:15:05.560`)
- [CVE-2024-39322](CVE-2024/CVE-2024-393xx/CVE-2024-39322.json) (`2024-07-03T12:53:24.977`) - [CVE-2024-27857](CVE-2024/CVE-2024-278xx/CVE-2024-27857.json) (`2024-07-03T15:43:17.007`)
- [CVE-2024-39324](CVE-2024/CVE-2024-393xx/CVE-2024-39324.json) (`2024-07-03T12:53:24.977`) - [CVE-2024-27885](CVE-2024/CVE-2024-278xx/CVE-2024-27885.json) (`2024-07-03T15:44:29.397`)
- [CVE-2024-39325](CVE-2024/CVE-2024-393xx/CVE-2024-39325.json) (`2024-07-03T12:53:24.977`) - [CVE-2024-34696](CVE-2024/CVE-2024-346xx/CVE-2024-34696.json) (`2024-07-03T14:42:49.743`)
- [CVE-2024-39326](CVE-2024/CVE-2024-393xx/CVE-2024-39326.json) (`2024-07-03T12:53:24.977`) - [CVE-2024-36401](CVE-2024/CVE-2024-364xx/CVE-2024-36401.json) (`2024-07-03T15:07:42.777`)
- [CVE-2024-39353](CVE-2024/CVE-2024-393xx/CVE-2024-39353.json) (`2024-07-03T12:53:24.977`) - [CVE-2024-36420](CVE-2024/CVE-2024-364xx/CVE-2024-36420.json) (`2024-07-03T15:29:45.557`)
- [CVE-2024-39361](CVE-2024/CVE-2024-393xx/CVE-2024-39361.json) (`2024-07-03T12:53:24.977`) - [CVE-2024-36421](CVE-2024/CVE-2024-364xx/CVE-2024-36421.json) (`2024-07-03T15:36:31.170`)
- [CVE-2024-39807](CVE-2024/CVE-2024-398xx/CVE-2024-39807.json) (`2024-07-03T12:53:24.977`) - [CVE-2024-36422](CVE-2024/CVE-2024-364xx/CVE-2024-36422.json) (`2024-07-03T15:38:24.297`)
- [CVE-2024-39830](CVE-2024/CVE-2024-398xx/CVE-2024-39830.json) (`2024-07-03T12:53:24.977`) - [CVE-2024-37741](CVE-2024/CVE-2024-377xx/CVE-2024-37741.json) (`2024-07-03T14:27:08.057`)
- [CVE-2024-39891](CVE-2024/CVE-2024-398xx/CVE-2024-39891.json) (`2024-07-03T12:53:24.977`) - [CVE-2024-3800](CVE-2024/CVE-2024-38xx/CVE-2024-3800.json) (`2024-07-03T14:36:22.273`)
- [CVE-2024-39894](CVE-2024/CVE-2024-398xx/CVE-2024-39894.json) (`2024-07-03T13:15:02.890`) - [CVE-2024-3801](CVE-2024/CVE-2024-38xx/CVE-2024-3801.json) (`2024-07-03T14:36:52.797`)
- [CVE-2024-39920](CVE-2024/CVE-2024-399xx/CVE-2024-39920.json) (`2024-07-03T12:53:24.977`) - [CVE-2024-3816](CVE-2024/CVE-2024-38xx/CVE-2024-3816.json) (`2024-07-03T14:37:07.750`)
- [CVE-2024-4482](CVE-2024/CVE-2024-44xx/CVE-2024-4482.json) (`2024-07-03T12:53:24.977`) - [CVE-2024-39704](CVE-2024/CVE-2024-397xx/CVE-2024-39704.json) (`2024-07-03T14:32:56.510`)
- [CVE-2024-4543](CVE-2024/CVE-2024-45xx/CVE-2024-4543.json) (`2024-07-03T12:53:24.977`) - [CVE-2024-3999](CVE-2024/CVE-2024-39xx/CVE-2024-3999.json) (`2024-07-03T15:44:56.130`)
- [CVE-2024-4708](CVE-2024/CVE-2024-47xx/CVE-2024-4708.json) (`2024-07-03T12:53:24.977`) - [CVE-2024-4627](CVE-2024/CVE-2024-46xx/CVE-2024-4627.json) (`2024-07-03T15:45:08.187`)
- [CVE-2024-6263](CVE-2024/CVE-2024-62xx/CVE-2024-6263.json) (`2024-07-03T12:53:24.977`) - [CVE-2024-5349](CVE-2024/CVE-2024-53xx/CVE-2024-5349.json) (`2024-07-03T15:44:23.807`)
- [CVE-2024-6340](CVE-2024/CVE-2024-63xx/CVE-2024-6340.json) (`2024-07-03T12:53:24.977`) - [CVE-2024-5419](CVE-2024/CVE-2024-54xx/CVE-2024-5419.json) (`2024-07-03T15:43:09.450`)
- [CVE-2024-6381](CVE-2024/CVE-2024-63xx/CVE-2024-6381.json) (`2024-07-03T12:53:24.977`) - [CVE-2024-5606](CVE-2024/CVE-2024-56xx/CVE-2024-5606.json) (`2024-07-03T15:45:19.513`)
- [CVE-2024-6382](CVE-2024/CVE-2024-63xx/CVE-2024-6382.json) (`2024-07-03T12:53:24.977`) - [CVE-2024-5735](CVE-2024/CVE-2024-57xx/CVE-2024-5735.json) (`2024-07-03T15:45:57.677`)
- [CVE-2024-6387](CVE-2024/CVE-2024-63xx/CVE-2024-6387.json) (`2024-07-03T13:15:03.493`) - [CVE-2024-5736](CVE-2024/CVE-2024-57xx/CVE-2024-5736.json) (`2024-07-03T15:46:08.877`)
- [CVE-2024-6428](CVE-2024/CVE-2024-64xx/CVE-2024-6428.json) (`2024-07-03T12:53:24.977`) - [CVE-2024-5737](CVE-2024/CVE-2024-57xx/CVE-2024-5737.json) (`2024-07-03T14:09:22.483`)
- [CVE-2024-6452](CVE-2024/CVE-2024-64xx/CVE-2024-6452.json) (`2024-07-03T12:53:24.977`) - [CVE-2024-5767](CVE-2024/CVE-2024-57xx/CVE-2024-5767.json) (`2024-07-03T15:26:29.050`)
- [CVE-2024-6453](CVE-2024/CVE-2024-64xx/CVE-2024-6453.json) (`2024-07-03T12:53:24.977`) - [CVE-2024-6375](CVE-2024/CVE-2024-63xx/CVE-2024-6375.json) (`2024-07-03T14:54:52.427`)
- [CVE-2024-6469](CVE-2024/CVE-2024-64xx/CVE-2024-6469.json) (`2024-07-03T12:53:24.977`) - [CVE-2024-6376](CVE-2024/CVE-2024-63xx/CVE-2024-6376.json) (`2024-07-03T15:04:52.463`)
## Download and Usage ## Download and Usage

View File

@ -90436,25 +90436,25 @@ CVE-2016-7510,0,0,1779d722e1e3abcce643f3990841f703ae46a4e3e7f1fe529ffead6d50061a
CVE-2016-7511,0,0,61e45c42288f92ed219bf7af9d1eebb46bd81957c5eaf585ba2634d48c3cbb81,2022-03-01T14:30:27.027000 CVE-2016-7511,0,0,61e45c42288f92ed219bf7af9d1eebb46bd81957c5eaf585ba2634d48c3cbb81,2022-03-01T14:30:27.027000
CVE-2016-7513,0,0,f3d58cf54ee5cc2b5f44e21575d4af3e7368d520a46e2dc28b8c8d9f5f3fb390,2017-05-09T12:40:08.853000 CVE-2016-7513,0,0,f3d58cf54ee5cc2b5f44e21575d4af3e7368d520a46e2dc28b8c8d9f5f3fb390,2017-05-09T12:40:08.853000
CVE-2016-7514,0,0,5acf4c11c6b23e52c011f5a018c2c2d90c756ec80883de77cf9634931bafa504,2017-05-09T12:40:05.697000 CVE-2016-7514,0,0,5acf4c11c6b23e52c011f5a018c2c2d90c756ec80883de77cf9634931bafa504,2017-05-09T12:40:05.697000
CVE-2016-7515,0,0,8335ec89d3b69556f658943cd45115cda1b3ad0170dcd5f33a693e91e75a647a,2017-05-09T12:40:02.777000 CVE-2016-7515,0,1,fb21f83cddf722a0fa141decdcb6439bb9471e713258d2e816160282eb06f528,2024-07-03T15:16:39.567000
CVE-2016-7516,0,0,dc00e35f4b14c9b3a5e2393e045f38f4ca3058fd0d88058f81bbd114e82f8fe3,2017-05-09T12:40:00.260000 CVE-2016-7516,0,1,16f3cb2e75aa3271d960b831f33e06b2ac04b1f800e594681cff4861326c988c,2024-07-03T15:23:36.440000
CVE-2016-7517,0,0,cae4a9021f8c6b24d69e74a964a23c761f46a0ef032301d0403500a83530e742,2017-05-09T12:39:56.680000 CVE-2016-7517,0,1,ba6d8f42f3bed4f3167468c0c8b26ac137e75f436e56310716e1ba6e03647184,2024-07-03T15:17:05.433000
CVE-2016-7518,0,0,e44c44e9af0ad7221c32d73bd55787a24594dab4bf5fbecb788c0722c9a82aa4,2017-05-09T12:39:53.323000 CVE-2016-7518,0,1,c57244a716e7ab0556596acc51d32b901d7b3eadab1f15f85c056c01ecd21d1e,2024-07-03T15:24:22.567000
CVE-2016-7519,0,0,48abfeaf70b2b93e677bd5ad1c54531c4b013a123c508cb1a2b4868cda9c8a96,2017-05-09T12:39:50.057000 CVE-2016-7519,0,1,70699c133d2441078f7f4d30b8096de84a4d22f60eff27facd14aa994b106686,2024-07-03T15:23:33.607000
CVE-2016-7520,0,0,8675f7f6001b6f933e8c681a7b1990fc67310de9ae93d72b0c1a893eb58f0c9d,2017-05-09T12:39:45.993000 CVE-2016-7520,0,1,d25b55ff825e16fbdb286b4905082bc39f3c8d5f89ce9016285e6765c9befc0f,2024-07-03T15:20:18.050000
CVE-2016-7521,0,0,e3f2b76578e137cff20a485b0cc75441b6730b1e7fb7796ad8f2f44062118381,2017-05-09T12:39:43.383000 CVE-2016-7521,0,1,ecff0a82b907397233ff4a3f7994ba7a05bc18e9489c91c2b2a4f04888f27e6c,2024-07-03T15:20:33.760000
CVE-2016-7522,0,0,c3c6c82172f5a1233846580b5edc56aec6ecaef9ab4a92ff578a44fb00223b73,2017-05-09T12:39:40.680000 CVE-2016-7522,0,1,0f2318969e17069bd3a2cc23db3cbfd02ac91fd63091a4da607379f4602f307b,2024-07-03T15:20:47.917000
CVE-2016-7523,0,0,50dca58580cd78b20739cdfbf227b34cc617e8e4568bfb3975aa098ff36b0718,2020-02-10T14:15:40.907000 CVE-2016-7523,0,1,81afb97facadafaf98e4cf71b37bec404c0305cb8747f4511dc526ae0104d0bd,2024-07-03T15:21:09.250000
CVE-2016-7524,0,0,6108f244a4ee1cc990698125f9da3fdd61b2b2255b7e4e07de38a624bb5f19e2,2020-02-10T14:15:18.203000 CVE-2016-7524,0,1,a5ccddebd6162757a051cd005775bf0135905bae1479300855e017885dda4f9d,2024-07-03T15:21:23.107000
CVE-2016-7525,0,0,0699ab481775613d23891b4f338e2d7cd11551c5326896711f3ed3d706cec560,2017-05-09T12:39:38.103000 CVE-2016-7525,0,1,6cfc8323236f9ba0441ab9f3c1aebca91e972e9feb03f0c011ac6f8c22863b1b,2024-07-03T15:21:41.860000
CVE-2016-7526,0,0,90da6ce2733cdbd7e7d4333b8952b53b9fed1f61d51f8634f16efcdfda70a1e7,2020-11-16T19:39:56.297000 CVE-2016-7526,0,1,ea8a140b9c9a22fb6f394bb3f5dc9c6786ec9edd7f940d729c09fd88b648b97e,2024-07-03T15:21:49.110000
CVE-2016-7527,0,0,c72655326862b8292653f51074d141ee78fba673e82c7f5679c057ee38b0806c,2020-11-16T19:37:51.120000 CVE-2016-7527,0,1,95861de21872f14f8012815df306132ca4c4ec0ee42221e09d57528c086234df,2024-07-03T15:22:01.010000
CVE-2016-7528,0,0,e6e8407aee98e532990eb5340b712ecb7e72972b42501e3a7757fe91c6ecab1b,2020-11-16T19:36:05.883000 CVE-2016-7528,0,1,c16129d2462881b38bc83868468c620340a98142b2c9d4ae0116ffa0131b6255,2024-07-03T15:22:10.600000
CVE-2016-7529,0,0,4d58b906ef227eb004895d75595dcbd4c0183a62beb2720c9de995ecda4f8357,2017-05-09T12:39:23.460000 CVE-2016-7529,0,1,815c7fdada9f9e2bc75a51b9f5d1bf734db049324d2d75ffe30ad23eea1b27df,2024-07-03T15:22:20.367000
CVE-2016-7530,0,0,d9bc05def810b9da8532adfc595a9a397dabe0925319a92e656af3f45715f13f,2017-05-09T12:39:19.320000 CVE-2016-7530,0,1,6492e65bbb8672ec847a4514447a6f39c1d56b13a2cf7c79ef9c970546f67022,2024-07-03T15:22:34.133000
CVE-2016-7531,0,0,f254a92940c7423fd73ff710e03b79d4d929be67d2537f3cb9bec6848a5ef628,2017-05-09T12:39:15.447000 CVE-2016-7531,0,0,f254a92940c7423fd73ff710e03b79d4d929be67d2537f3cb9bec6848a5ef628,2017-05-09T12:39:15.447000
CVE-2016-7532,0,0,809a94082802a4face8a9254ec7175501e10c205d92aa5b1330f0cee57b2adb7,2017-05-09T12:39:12.837000 CVE-2016-7532,0,0,809a94082802a4face8a9254ec7175501e10c205d92aa5b1330f0cee57b2adb7,2017-05-09T12:39:12.837000
CVE-2016-7533,0,0,f8529d644609cab03ecc261e74050dc40f1870a20a589550cbe46f28258c0799,2017-05-09T12:39:08.790000 CVE-2016-7533,0,1,0b5c1dbe1976d2fc2f4abf252703deacc66d9d8030522be17c5c1c20eb40fb1b,2024-07-03T15:23:17.167000
CVE-2016-7534,0,0,bceb0238cb8ce38db11107a89888e488bbdb754e0bd6a6d35f4addc83364c973,2017-05-09T12:39:03.697000 CVE-2016-7534,0,0,bceb0238cb8ce38db11107a89888e488bbdb754e0bd6a6d35f4addc83364c973,2017-05-09T12:39:03.697000
CVE-2016-7535,0,0,23fadd8cbcc8163a830df0d83144ba1cd318528b25b6b58138132d55347c5bbf,2017-05-09T12:38:58.727000 CVE-2016-7535,0,0,23fadd8cbcc8163a830df0d83144ba1cd318528b25b6b58138132d55347c5bbf,2017-05-09T12:38:58.727000
CVE-2016-7536,0,0,4b02a4d8372a703d7d8b994f35aa31e84f2c877453f888a1d7c73b17cadfb25c,2020-11-16T19:34:51.070000 CVE-2016-7536,0,0,4b02a4d8372a703d7d8b994f35aa31e84f2c877453f888a1d7c73b17cadfb25c,2020-11-16T19:34:51.070000
@ -95267,7 +95267,7 @@ CVE-2017-11309,0,0,0a1015ad413714840fd17bdb185f1070c94f45d2b31bf8df3eae1b31bfd6c
CVE-2017-1131,0,0,6097510a934b58e996eedd162fa96e251a8c69f87fa9344db179b52fae37d20b,2017-06-27T01:29:00.780000 CVE-2017-1131,0,0,6097510a934b58e996eedd162fa96e251a8c69f87fa9344db179b52fae37d20b,2017-06-27T01:29:00.780000
CVE-2017-11310,0,0,56b936587222c5c48de0aa3a4968d9e7406c62f8c69628e2b7b86d8e6b29417e,2019-10-03T00:03:26.223000 CVE-2017-11310,0,0,56b936587222c5c48de0aa3a4968d9e7406c62f8c69628e2b7b86d8e6b29417e,2019-10-03T00:03:26.223000
CVE-2017-11311,0,0,90cdd67c89f76972e750afb94ff98b31a502d7f8df9bebdf7df8cf4fae2d7581,2017-07-27T01:30:09.713000 CVE-2017-11311,0,0,90cdd67c89f76972e750afb94ff98b31a502d7f8df9bebdf7df8cf4fae2d7581,2017-07-27T01:30:09.713000
CVE-2017-11317,0,1,1d5f5723a2ae116b3580708d22e34e67d9dac0c90c625c41cb5f3bd084416c9f,2024-07-03T13:16:48.240000 CVE-2017-11317,0,0,1d5f5723a2ae116b3580708d22e34e67d9dac0c90c625c41cb5f3bd084416c9f,2024-07-03T13:16:48.240000
CVE-2017-11318,0,0,873b3b942be64b72e00ede40092823f6d4f16af03d741a696bb1672693f3e88d,2017-08-07T18:48:45.740000 CVE-2017-11318,0,0,873b3b942be64b72e00ede40092823f6d4f16af03d741a696bb1672693f3e88d,2017-08-07T18:48:45.740000
CVE-2017-11319,0,0,f9e5ba563f877740060c1429e268873b1045d0570effb97efb4ddc73ac52fc09,2019-10-03T00:03:26.223000 CVE-2017-11319,0,0,f9e5ba563f877740060c1429e268873b1045d0570effb97efb4ddc73ac52fc09,2019-10-03T00:03:26.223000
CVE-2017-1132,0,0,3753fbeb602509c19bbf232f979c0cf13effaf9be4bd299eceae899413f255b3,2017-06-27T01:29:00.827000 CVE-2017-1132,0,0,3753fbeb602509c19bbf232f979c0cf13effaf9be4bd299eceae899413f255b3,2017-06-27T01:29:00.827000
@ -172757,7 +172757,7 @@ CVE-2021-27794,0,0,5902753dd3a47ac44d61ce05dcba1f7b330e85fa17e8176e91a0923c27e21
CVE-2021-27795,0,0,f335211bb2ba6ce8ee545f6882567e515644e4901ba6200771713d168f749dec,2023-12-11T19:44:39.613000 CVE-2021-27795,0,0,f335211bb2ba6ce8ee545f6882567e515644e4901ba6200771713d168f749dec,2023-12-11T19:44:39.613000
CVE-2021-27796,0,0,980d4cf765b69ffde1fdfff98c2b85c39dc01b92a5e37275f92f055a12379a1c,2022-03-01T23:43:08.080000 CVE-2021-27796,0,0,980d4cf765b69ffde1fdfff98c2b85c39dc01b92a5e37275f92f055a12379a1c,2022-03-01T23:43:08.080000
CVE-2021-27797,0,0,0870ff126239a4e5f86bc10712ec007b6ec52054473b47d89b72aeadc12b0f5e,2022-03-01T16:09:03.430000 CVE-2021-27797,0,0,0870ff126239a4e5f86bc10712ec007b6ec52054473b47d89b72aeadc12b0f5e,2022-03-01T16:09:03.430000
CVE-2021-27798,0,0,530c4ae9b2b37aa0bc4adc42227a5bde18a9b92e23c523b1ff578d0c66b51f58,2024-05-17T01:55:38.763000 CVE-2021-27798,0,1,b5806bfc660dc90e93ffa902dcf25d7957e45c3e8c4a0ebb0757bd1ebb50e403,2024-07-03T15:15:05.193000
CVE-2021-27799,0,0,d0ee11302a63b3ea6271e540a0af8af46a88a1457074166c885a7131a2a9c36c,2021-03-10T16:59:06.673000 CVE-2021-27799,0,0,d0ee11302a63b3ea6271e540a0af8af46a88a1457074166c885a7131a2a9c36c,2021-03-10T16:59:06.673000
CVE-2021-27802,0,0,0981e3e97b8714a98f050af16eacca81b240a96d94957da281ba951efb0d6c99,2023-11-07T03:32:01.343000 CVE-2021-27802,0,0,0981e3e97b8714a98f050af16eacca81b240a96d94957da281ba951efb0d6c99,2023-11-07T03:32:01.343000
CVE-2021-27803,0,0,679f77f0866982accd53b086375067dd27d2b62dec0e43e395886545a3abeff6,2023-11-07T03:32:01.380000 CVE-2021-27803,0,0,679f77f0866982accd53b086375067dd27d2b62dec0e43e395886545a3abeff6,2023-11-07T03:32:01.380000
@ -172777,7 +172777,7 @@ CVE-2021-27845,0,0,27cb14f9d81d75cf37f66d513914098129e2c9d54a1efbef43b698e6ec3d2
CVE-2021-27847,0,0,4cf1fd0379081a029d66fa26d168bd2c43e45765e7eeb80369436f7543702298,2023-09-29T11:18:03.783000 CVE-2021-27847,0,0,4cf1fd0379081a029d66fa26d168bd2c43e45765e7eeb80369436f7543702298,2023-09-29T11:18:03.783000
CVE-2021-27850,0,0,ae1e4d711acbf93339f3f5768281261f381eb85bce7c33e584fe39ab7469964d,2021-06-02T15:15:24.743000 CVE-2021-27850,0,0,ae1e4d711acbf93339f3f5768281261f381eb85bce7c33e584fe39ab7469964d,2021-06-02T15:15:24.743000
CVE-2021-27851,0,0,87df816154ae443a8ab20fda387988a009fd8b3e4ce9c62e18ca04a19430b28b,2022-07-29T16:34:08 CVE-2021-27851,0,0,87df816154ae443a8ab20fda387988a009fd8b3e4ce9c62e18ca04a19430b28b,2022-07-29T16:34:08
CVE-2021-27852,0,1,33f33266bcdb69cefe22f17c67f9d46cedbde0fc4e833493e35a294d1b256c5b,2024-07-03T13:32:45.603000 CVE-2021-27852,0,0,33f33266bcdb69cefe22f17c67f9d46cedbde0fc4e833493e35a294d1b256c5b,2024-07-03T13:32:45.603000
CVE-2021-27853,0,0,2190e5b9e70d6aaa8444bfefac172608cba6fdc4ca02e42f4588c939dcb8c904,2022-11-16T17:26:33.420000 CVE-2021-27853,0,0,2190e5b9e70d6aaa8444bfefac172608cba6fdc4ca02e42f4588c939dcb8c904,2022-11-16T17:26:33.420000
CVE-2021-27854,0,0,702202158f71ed2ac3bf9ea57dc1eb53096d0d64aa7b77c1a59fab044dce83bd,2022-10-12T13:15:10.407000 CVE-2021-27854,0,0,702202158f71ed2ac3bf9ea57dc1eb53096d0d64aa7b77c1a59fab044dce83bd,2022-10-12T13:15:10.407000
CVE-2021-27855,0,0,7bf2b99b844c425075ceabde2e33edefdaaaa742621b6194b09423c55d06494d,2022-10-29T02:58:34.047000 CVE-2021-27855,0,0,7bf2b99b844c425075ceabde2e33edefdaaaa742621b6194b09423c55d06494d,2022-10-29T02:58:34.047000
@ -183602,7 +183602,7 @@ CVE-2021-42274,0,0,5fe086d50763566c992a71f303150c7a3fb31e0e7ea54b731945b48adbc10
CVE-2021-42275,0,0,68fbee182e3e5e235f5dab48ff67db5861054648192ae667fd45691d6c2d8855,2023-12-28T16:15:54.560000 CVE-2021-42275,0,0,68fbee182e3e5e235f5dab48ff67db5861054648192ae667fd45691d6c2d8855,2023-12-28T16:15:54.560000
CVE-2021-42276,0,0,cba257dd2610587252c0b30a0f6c17e6ce094ed26ee7ef7c888da2ef3a9547bf,2023-12-28T16:15:54.763000 CVE-2021-42276,0,0,cba257dd2610587252c0b30a0f6c17e6ce094ed26ee7ef7c888da2ef3a9547bf,2023-12-28T16:15:54.763000
CVE-2021-42277,0,0,c99f72b4dfb97cbc34be38c0b68b72470eda5fc36135ae6e129bc3d819ee89ed,2023-12-28T16:15:54.970000 CVE-2021-42277,0,0,c99f72b4dfb97cbc34be38c0b68b72470eda5fc36135ae6e129bc3d819ee89ed,2023-12-28T16:15:54.970000
CVE-2021-42278,0,1,400aabdcb7a86831676301656391b3db63df5600fca04fbfea6b1b9bf48fa79d,2024-07-03T13:33:20.297000 CVE-2021-42278,0,0,400aabdcb7a86831676301656391b3db63df5600fca04fbfea6b1b9bf48fa79d,2024-07-03T13:33:20.297000
CVE-2021-42279,0,0,632d8f89c71a38d5480b12f205614381121bf4159617260406a55e81fe114c94,2023-12-28T16:15:55.363000 CVE-2021-42279,0,0,632d8f89c71a38d5480b12f205614381121bf4159617260406a55e81fe114c94,2023-12-28T16:15:55.363000
CVE-2021-4228,0,0,93e491af6c6b2b147521fd6dd3f3bc75f943340ce2fe2bd78fcdd33793a3aaad,2023-02-03T13:52:26.017000 CVE-2021-4228,0,0,93e491af6c6b2b147521fd6dd3f3bc75f943340ce2fe2bd78fcdd33793a3aaad,2023-02-03T13:52:26.017000
CVE-2021-42280,0,0,d341f543ea9165319ef5363ed48f3eba6dc753f5b125f982e963d9d421c38191,2023-12-28T16:15:55.567000 CVE-2021-42280,0,0,d341f543ea9165319ef5363ed48f3eba6dc753f5b125f982e963d9d421c38191,2023-12-28T16:15:55.567000
@ -193521,7 +193521,7 @@ CVE-2022-24517,0,0,e79c91bcb3b68c52828825c5ff897cb06a35a224accc6eaadc9f204413d37
CVE-2022-24518,0,0,5538572c537b65ea02a0df690f4981398b2f38dd3d6737fb0dc62b48d9d87042,2023-08-08T14:22:24.967000 CVE-2022-24518,0,0,5538572c537b65ea02a0df690f4981398b2f38dd3d6737fb0dc62b48d9d87042,2023-08-08T14:22:24.967000
CVE-2022-24519,0,0,1acf09adea2addc45cd1f8a1bba6e14d1a8e6a450aad26061db4b802473be0a8,2023-08-08T14:22:24.967000 CVE-2022-24519,0,0,1acf09adea2addc45cd1f8a1bba6e14d1a8e6a450aad26061db4b802473be0a8,2023-08-08T14:22:24.967000
CVE-2022-24520,0,0,23e43fae09c725a7acbd1fbdee71bd0cdd417371a852bdfb65928bb05a74d42c,2023-06-29T02:15:15.267000 CVE-2022-24520,0,0,23e43fae09c725a7acbd1fbdee71bd0cdd417371a852bdfb65928bb05a74d42c,2023-06-29T02:15:15.267000
CVE-2022-24521,0,1,bc2765fccfa743e69828de99f5d1abb88227f4af23f1dbc4b53662f5aefc84de,2024-07-03T13:16:06.577000 CVE-2022-24521,0,0,bc2765fccfa743e69828de99f5d1abb88227f4af23f1dbc4b53662f5aefc84de,2024-07-03T13:16:06.577000
CVE-2022-24522,0,0,8e4c1c707fb0dbb6e272e25b8ce9d9115f051bb7037004f4c39d824c952297df,2023-08-08T14:22:24.967000 CVE-2022-24522,0,0,8e4c1c707fb0dbb6e272e25b8ce9d9115f051bb7037004f4c39d824c952297df,2023-08-08T14:22:24.967000
CVE-2022-24523,0,0,faca6eb1725f9e2af1f2a19aaad5b494587d75e16caac5f32dd9f7b87170c477,2023-06-29T01:15:29.707000 CVE-2022-24523,0,0,faca6eb1725f9e2af1f2a19aaad5b494587d75e16caac5f32dd9f7b87170c477,2023-06-29T01:15:29.707000
CVE-2022-24525,0,0,32a11adb8270a4ea8950c8b2227729e32f8fafc96e46255f0fca9cbabfa0de9b,2023-06-29T02:15:15.457000 CVE-2022-24525,0,0,32a11adb8270a4ea8950c8b2227729e32f8fafc96e46255f0fca9cbabfa0de9b,2023-06-29T02:15:15.457000
@ -194354,10 +194354,10 @@ CVE-2022-25464,0,0,231fd3080576b3684ae82435ee901df2499bdd2b12996f22985cb04f4c481
CVE-2022-25465,0,0,83ff884fffb03f7448bef58e02010e947d986d6c2e472bc0f3add87f72a5660c,2022-03-11T15:55:36.710000 CVE-2022-25465,0,0,83ff884fffb03f7448bef58e02010e947d986d6c2e472bc0f3add87f72a5660c,2022-03-11T15:55:36.710000
CVE-2022-2547,0,0,73d14d5654e374eff01adccf9a7a8251705f6da64d59cea565fd779629f3f010,2022-08-19T01:43:28.157000 CVE-2022-2547,0,0,73d14d5654e374eff01adccf9a7a8251705f6da64d59cea565fd779629f3f010,2022-08-19T01:43:28.157000
CVE-2022-25471,0,0,3a109f099cb1061a853e5b50f13b9d0fc3efb3654456f758cc15cdf5ad1cc75d,2022-03-09T19:47:15.070000 CVE-2022-25471,0,0,3a109f099cb1061a853e5b50f13b9d0fc3efb3654456f758cc15cdf5ad1cc75d,2022-03-09T19:47:15.070000
CVE-2022-25477,0,1,f5947fa43ee6d57d57151bf27eb934c1e8cf30d33379a811dcf9110928cf0bda,2024-07-03T12:53:24.977000 CVE-2022-25477,0,0,f5947fa43ee6d57d57151bf27eb934c1e8cf30d33379a811dcf9110928cf0bda,2024-07-03T12:53:24.977000
CVE-2022-25478,0,1,7bd7f3ad2cf598c72e979cf04e2bae20dac87654e7334e4884eb68cfa1874609,2024-07-03T12:53:24.977000 CVE-2022-25478,0,0,7bd7f3ad2cf598c72e979cf04e2bae20dac87654e7334e4884eb68cfa1874609,2024-07-03T12:53:24.977000
CVE-2022-25479,0,1,8e8380855069d84dabbdaf641b904e87a9f4117a0d0d49c8aa1a1a1137a9bb4d,2024-07-03T12:53:24.977000 CVE-2022-25479,0,0,8e8380855069d84dabbdaf641b904e87a9f4117a0d0d49c8aa1a1a1137a9bb4d,2024-07-03T12:53:24.977000
CVE-2022-25480,0,1,39886115f70f1d1b40972742fcf44e4e22fe5f53707cddad00cae2c888e60577,2024-07-03T12:53:24.977000 CVE-2022-25480,0,0,39886115f70f1d1b40972742fcf44e4e22fe5f53707cddad00cae2c888e60577,2024-07-03T12:53:24.977000
CVE-2022-25481,0,0,d8914892ae94539e6b18fbcd727395bf982994a1a334a92092d2f4e3819a8123,2024-07-03T01:38:19.293000 CVE-2022-25481,0,0,d8914892ae94539e6b18fbcd727395bf982994a1a334a92092d2f4e3819a8123,2024-07-03T01:38:19.293000
CVE-2022-25484,0,0,99a222d35a5c2f1b2db0f90a8390321c73db93867e67f18b2c213513a13e5439,2022-03-28T20:53:05.180000 CVE-2022-25484,0,0,99a222d35a5c2f1b2db0f90a8390321c73db93867e67f18b2c213513a13e5439,2022-03-28T20:53:05.180000
CVE-2022-25485,0,0,f943c508b3e38959fea36ca9f014627ff6eee45f93d348f17a276f89be77fc1e,2022-03-23T18:18:46.160000 CVE-2022-25485,0,0,f943c508b3e38959fea36ca9f014627ff6eee45f93d348f17a276f89be77fc1e,2022-03-23T18:18:46.160000
@ -198507,7 +198507,7 @@ CVE-2022-30632,0,0,f214153a7d78a1f18ea22ef856e8035d77e066ffe05cf4d3cd2d155a8fe2b
CVE-2022-30633,0,0,b54ca08085af5e8cef18a74cec122d184dc8b4373d642fc24f7ba9cd5e61484d,2023-11-07T03:47:16.833000 CVE-2022-30633,0,0,b54ca08085af5e8cef18a74cec122d184dc8b4373d642fc24f7ba9cd5e61484d,2023-11-07T03:47:16.833000
CVE-2022-30634,0,0,6756594dd3720ca90dbd7390befd3951adf8b8ddf821e4fa717ae67733da7843,2023-11-07T03:47:16.960000 CVE-2022-30634,0,0,6756594dd3720ca90dbd7390befd3951adf8b8ddf821e4fa717ae67733da7843,2023-11-07T03:47:16.960000
CVE-2022-30635,0,0,05b714781f3ac4496fa9fd2fec8e57abb3bdf107549dd52f7a6ca2248a8a28fe,2023-11-07T03:47:17.070000 CVE-2022-30635,0,0,05b714781f3ac4496fa9fd2fec8e57abb3bdf107549dd52f7a6ca2248a8a28fe,2023-11-07T03:47:17.070000
CVE-2022-30636,0,1,950a2fe1c5b00dbda0db499d214490d40e5deb1e821994dd67e179a2f1d77889,2024-07-03T12:53:24.977000 CVE-2022-30636,0,0,950a2fe1c5b00dbda0db499d214490d40e5deb1e821994dd67e179a2f1d77889,2024-07-03T12:53:24.977000
CVE-2022-30637,0,0,59aa98121a73381f879297e9c17146b4bb1b6e52c9c1e7f3e0a2be631b87e64a,2023-09-09T03:42:43.520000 CVE-2022-30637,0,0,59aa98121a73381f879297e9c17146b4bb1b6e52c9c1e7f3e0a2be631b87e64a,2023-09-09T03:42:43.520000
CVE-2022-30638,0,0,d268c0135ae5f7942a9397265321619b85cbe35450007798147fa4b1fe86d34d,2023-09-09T03:42:36.757000 CVE-2022-30638,0,0,d268c0135ae5f7942a9397265321619b85cbe35450007798147fa4b1fe86d34d,2023-09-09T03:42:36.757000
CVE-2022-30639,0,0,63e210ad5e4743756ed81cab634881e23db9b06e79d4bdff1a84f2aca5e5afc2,2023-09-09T03:42:18.143000 CVE-2022-30639,0,0,63e210ad5e4743756ed81cab634881e23db9b06e79d4bdff1a84f2aca5e5afc2,2023-09-09T03:42:18.143000
@ -199167,7 +199167,7 @@ CVE-2022-31357,0,0,0117d3bd77cde592c54614f7b9b3ba07e3620b33e1ed372ed0aa3d61842da
CVE-2022-31358,0,0,99e295cf2650192fb9061fc7fb33a864e05c69c246c6175b92e491b13dffdb4b,2023-11-07T03:47:37.213000 CVE-2022-31358,0,0,99e295cf2650192fb9061fc7fb33a864e05c69c246c6175b92e491b13dffdb4b,2023-11-07T03:47:37.213000
CVE-2022-3136,0,0,348faa475dc105d9dc7ca0b6825af678dd4a6880325fcaad1f62607b87f27634,2022-10-12T16:42:29.870000 CVE-2022-3136,0,0,348faa475dc105d9dc7ca0b6825af678dd4a6880325fcaad1f62607b87f27634,2022-10-12T16:42:29.870000
CVE-2022-31361,0,0,7c7a13a509ccc79dce98e213c13410afb594204a49db8971d4b7261121c52936,2024-05-17T02:09:31.713000 CVE-2022-31361,0,0,7c7a13a509ccc79dce98e213c13410afb594204a49db8971d4b7261121c52936,2024-05-17T02:09:31.713000
CVE-2022-31362,0,0,c1da100c9bc04ee11e70dd090864de98b2758f14b734d9419060088dbd0cd2cb,2024-05-17T02:09:31.817000 CVE-2022-31362,0,1,ce3fa4bd27c48417b8e9f66ae424852288eeffe718d961d070c2335e776696f6,2024-07-03T14:15:04.330000
CVE-2022-31363,0,0,2cdc9f5e6bce1c868cd6a6cc903c192623e0a62d2cb3e21d517c37c48e27d60d,2023-02-09T20:44:48.020000 CVE-2022-31363,0,0,2cdc9f5e6bce1c868cd6a6cc903c192623e0a62d2cb3e21d517c37c48e27d60d,2023-02-09T20:44:48.020000
CVE-2022-31364,0,0,16c44bc65c1ef1e94a01ddd40700a46a03bbda2d51fb3d63a950d1bba09e434c,2023-02-09T20:50:44.917000 CVE-2022-31364,0,0,16c44bc65c1ef1e94a01ddd40700a46a03bbda2d51fb3d63a950d1bba09e434c,2023-02-09T20:50:44.917000
CVE-2022-31366,0,0,67f42e566e099c711c555187131c25df8d6f9a820fd3a367aef31e2c71645659,2022-10-21T16:18:59.077000 CVE-2022-31366,0,0,67f42e566e099c711c555187131c25df8d6f9a820fd3a367aef31e2c71645659,2022-10-21T16:18:59.077000
@ -206054,7 +206054,7 @@ CVE-2022-40293,0,0,c609d733a24235de62748fe66d7225f5f2be4a1b7d6ebfda78738adee232d
CVE-2022-40294,0,0,ff48ea8004771e1ad176e146f4141a6bf1f6af63ded7d0439b11976237a989c7,2023-10-25T18:17:16.443000 CVE-2022-40294,0,0,ff48ea8004771e1ad176e146f4141a6bf1f6af63ded7d0439b11976237a989c7,2023-10-25T18:17:16.443000
CVE-2022-40295,0,0,417ec344689cf18cbe6163ad761fda8fbef5dbddd7bb733ed5d647c1fc9bc1ff,2023-10-25T18:17:16.503000 CVE-2022-40295,0,0,417ec344689cf18cbe6163ad761fda8fbef5dbddd7bb733ed5d647c1fc9bc1ff,2023-10-25T18:17:16.503000
CVE-2022-40296,0,0,78154ab5bcd8116e5b7f62a9e5e2fcfc3da41d5ec60b414a2189a3fe32758d33,2023-10-25T18:17:16.567000 CVE-2022-40296,0,0,78154ab5bcd8116e5b7f62a9e5e2fcfc3da41d5ec60b414a2189a3fe32758d33,2023-10-25T18:17:16.567000
CVE-2022-40297,0,0,43a551162cb7e0b0dee481c87c9b0cbc1426beef0c59b47d89fd0295b3b288b0,2024-05-17T02:13:18.643000 CVE-2022-40297,0,1,d23b1493b99457a642376f24446356d15b5924fb33aca414b8962424b633c31e,2024-07-03T15:15:05.423000
CVE-2022-40298,0,0,9d356f1450e16dd5ebda560da24d68d82018f96f198840edce14165bb2a990d5,2023-08-08T14:21:49.707000 CVE-2022-40298,0,0,9d356f1450e16dd5ebda560da24d68d82018f96f198840edce14165bb2a990d5,2023-08-08T14:21:49.707000
CVE-2022-40299,0,0,36f3dfca3faf782369516a7311b05a02ea5b584f3c6b04e15d95bc7724ba6eb1,2023-08-08T14:22:24.967000 CVE-2022-40299,0,0,36f3dfca3faf782369516a7311b05a02ea5b584f3c6b04e15d95bc7724ba6eb1,2023-08-08T14:22:24.967000
CVE-2022-4030,0,0,7a8aeb590d9751df9668da3c2f397b6e07abe04112fccee4a2e1be5dd56e675e,2023-11-07T03:56:45.093000 CVE-2022-4030,0,0,7a8aeb590d9751df9668da3c2f397b6e07abe04112fccee4a2e1be5dd56e675e,2023-11-07T03:56:45.093000
@ -217972,7 +217972,7 @@ CVE-2023-24528,0,0,899533432d6d75cedea57fd4563bb59a08ab30d04e09c55b0e4759297d9a5
CVE-2023-24529,0,0,d5ec6c7946d019b7d7e407212b00e6ee585f0c40c199c1d7212c76e02ba691c9,2023-04-11T22:15:08.633000 CVE-2023-24529,0,0,d5ec6c7946d019b7d7e407212b00e6ee585f0c40c199c1d7212c76e02ba691c9,2023-04-11T22:15:08.633000
CVE-2023-2453,0,0,35571d748e261a04ce5c1ada40f40e506192da5c60ca32152a9fefe31414f468,2023-09-08T17:27:41.190000 CVE-2023-2453,0,0,35571d748e261a04ce5c1ada40f40e506192da5c60ca32152a9fefe31414f468,2023-09-08T17:27:41.190000
CVE-2023-24530,0,0,819456e45a97d34c0861fc0ddba145d10cfdb134d103842d97b3038412001184,2023-04-11T22:15:08.690000 CVE-2023-24530,0,0,819456e45a97d34c0861fc0ddba145d10cfdb134d103842d97b3038412001184,2023-04-11T22:15:08.690000
CVE-2023-24531,0,1,179bb04436befa20e8424debc4490783b95c6da99d26ce06668e99f09890aa04,2024-07-03T12:53:24.977000 CVE-2023-24531,0,0,179bb04436befa20e8424debc4490783b95c6da99d26ce06668e99f09890aa04,2024-07-03T12:53:24.977000
CVE-2023-24532,0,0,933a884c817efe4414cd72b8f640229cca761b1f2eba3a0e93cdae834fbffd9a,2023-11-07T04:08:30.867000 CVE-2023-24532,0,0,933a884c817efe4414cd72b8f640229cca761b1f2eba3a0e93cdae834fbffd9a,2023-11-07T04:08:30.867000
CVE-2023-24533,0,0,d66d114c302bdadf5cd961e00ee83c5556439c2ddedc40b37fc6e0dbe36b75d9,2023-11-07T04:08:31.050000 CVE-2023-24533,0,0,d66d114c302bdadf5cd961e00ee83c5556439c2ddedc40b37fc6e0dbe36b75d9,2023-11-07T04:08:31.050000
CVE-2023-24534,0,0,32da01c00ffd6bfd831b88c5dab9cd458b775383e6192afc2c330a9197e1873e,2023-11-25T11:15:14.030000 CVE-2023-24534,0,0,32da01c00ffd6bfd831b88c5dab9cd458b775383e6192afc2c330a9197e1873e,2023-11-25T11:15:14.030000
@ -241889,7 +241889,7 @@ CVE-2024-1423,0,0,6e27005a2bc9cac940b744a08e145c97df4169105a5c6ac980f63cd4cfdbe7
CVE-2024-1424,0,0,e4ad8b68f1fbe246b31a884aab471f453604ee73fa66399cab9d94287d5c1f39,2024-04-10T13:24:00.070000 CVE-2024-1424,0,0,e4ad8b68f1fbe246b31a884aab471f453604ee73fa66399cab9d94287d5c1f39,2024-04-10T13:24:00.070000
CVE-2024-1425,0,0,02a330ca28e70c5f4fd75a53f6a884cfaa02f29dea0e5d02e5dff002ed045e32,2024-02-29T13:49:29.390000 CVE-2024-1425,0,0,02a330ca28e70c5f4fd75a53f6a884cfaa02f29dea0e5d02e5dff002ed045e32,2024-02-29T13:49:29.390000
CVE-2024-1426,0,0,b20e0201854f673684d69c4a30e03c882940d605ff386eb76a0bcedb20be1b61,2024-04-18T13:04:28.900000 CVE-2024-1426,0,0,b20e0201854f673684d69c4a30e03c882940d605ff386eb76a0bcedb20be1b61,2024-04-18T13:04:28.900000
CVE-2024-1427,0,0,63dddd2d42d3e35c84d49f8aaa22caa244648752e9da148e60af21d3fce7beb2,2024-07-02T12:09:16.907000 CVE-2024-1427,0,1,192e94c8c1db3f7bb99c2eb13227bbd24cc5d98969af5836b6320be2953a05b7,2024-07-03T15:44:40.083000
CVE-2024-1428,0,0,4c77834f86d069dd8ac6582c1158d4ce9778d9d2d0db6d53457b9fcb3238fd50,2024-04-08T18:48:40.217000 CVE-2024-1428,0,0,4c77834f86d069dd8ac6582c1158d4ce9778d9d2d0db6d53457b9fcb3238fd50,2024-04-08T18:48:40.217000
CVE-2024-1429,0,0,ab6402cd6da16458b964af8d77be31dfc0567f7c2e61e8846287eab7a4f0dc54,2024-04-18T13:04:28.900000 CVE-2024-1429,0,0,ab6402cd6da16458b964af8d77be31dfc0567f7c2e61e8846287eab7a4f0dc54,2024-04-18T13:04:28.900000
CVE-2024-1430,0,0,eba723d82d624f4abb9107b4882898514197c1baa9de876205b497551b76bb7f,2024-05-17T02:35:26.640000 CVE-2024-1430,0,0,eba723d82d624f4abb9107b4882898514197c1baa9de876205b497551b76bb7f,2024-05-17T02:35:26.640000
@ -242336,7 +242336,7 @@ CVE-2024-1927,0,0,31be343b20122f13e26ef76f7f4fe10a59226978014536249707ce2d72de81
CVE-2024-1928,0,0,b3421eda40eadd8f94f725465ed49c06463a4553cfbc0b59715a025d1f01d712,2024-05-17T02:35:42.223000 CVE-2024-1928,0,0,b3421eda40eadd8f94f725465ed49c06463a4553cfbc0b59715a025d1f01d712,2024-05-17T02:35:42.223000
CVE-2024-1929,0,0,3332c348abe2ec55e440f6248fed1a4ed270158e5658f7c88b1e6bb963ccdab9,2024-05-08T13:15:00.690000 CVE-2024-1929,0,0,3332c348abe2ec55e440f6248fed1a4ed270158e5658f7c88b1e6bb963ccdab9,2024-05-08T13:15:00.690000
CVE-2024-1930,0,0,fdb59fca49fb5e54ea59db9c9eb6e43f53d3770fb02303c610334b8657eb9ae1,2024-05-08T13:15:00.690000 CVE-2024-1930,0,0,fdb59fca49fb5e54ea59db9c9eb6e43f53d3770fb02303c610334b8657eb9ae1,2024-05-08T13:15:00.690000
CVE-2024-1931,0,0,e71f7a88f68b5d3702fc1141e5fbdcf00d33a90e3791bbd349a9e1c6ddf3f008,2024-04-28T04:15:11 CVE-2024-1931,0,1,74525c1ab84bdef9a56fce2ad1f66433b6d371babf800064dbee863c8b3d6ae8,2024-07-03T15:15:05.560000
CVE-2024-1932,0,0,dfd6617a73caabfbfba2b5ee899213931b787c71ad6a77e11bae9543ad134a99,2024-02-28T14:06:45.783000 CVE-2024-1932,0,0,dfd6617a73caabfbfba2b5ee899213931b787c71ad6a77e11bae9543ad134a99,2024-02-28T14:06:45.783000
CVE-2024-1933,0,0,22dab3b8ed3dbdec751e3b3ea3557732635c7de83916428fa2e460c959fedb1c,2024-03-26T17:09:53.043000 CVE-2024-1933,0,0,22dab3b8ed3dbdec751e3b3ea3557732635c7de83916428fa2e460c959fedb1c,2024-03-26T17:09:53.043000
CVE-2024-1934,0,0,baca09a1b552c022c94ad7f29c48bc581577a9c65fef6c6ea2b90bc1a8cad40e,2024-04-10T13:23:38.787000 CVE-2024-1934,0,0,baca09a1b552c022c94ad7f29c48bc581577a9c65fef6c6ea2b90bc1a8cad40e,2024-04-10T13:23:38.787000
@ -242603,8 +242603,8 @@ CVE-2024-2039,0,0,4f1e5a8a814f51edc0234cc5670da2107cc2a93a2ef1eadc628898e3eec44b
CVE-2024-20391,0,0,f91eada0700f8cd9f2eaea2b871ba7d3969d87e51919a0eb478edbaaab6f3a9d,2024-05-15T18:35:11.453000 CVE-2024-20391,0,0,f91eada0700f8cd9f2eaea2b871ba7d3969d87e51919a0eb478edbaaab6f3a9d,2024-05-15T18:35:11.453000
CVE-2024-20392,0,0,ace66ba4c79c3f433832bd6cfa0988701f79a2b5d6c0fbe5016f71bba33a0a9b,2024-05-15T18:35:11.453000 CVE-2024-20392,0,0,ace66ba4c79c3f433832bd6cfa0988701f79a2b5d6c0fbe5016f71bba33a0a9b,2024-05-15T18:35:11.453000
CVE-2024-20394,0,0,d0e5fc3a79dfeb923dc3f02320ce7649899cba8340301b836f168cfe3139baa9,2024-05-15T18:35:11.453000 CVE-2024-20394,0,0,d0e5fc3a79dfeb923dc3f02320ce7649899cba8340301b836f168cfe3139baa9,2024-05-15T18:35:11.453000
CVE-2024-20399,0,1,40162d3d58c44619359063d12b3450c60237a60b95e0ce2c02a9d7dd539d8ffd,2024-07-03T12:42:39.597000 CVE-2024-20399,0,0,40162d3d58c44619359063d12b3450c60237a60b95e0ce2c02a9d7dd539d8ffd,2024-07-03T12:42:39.597000
CVE-2024-2040,0,1,4eb156f2f336b9896eaa73d7b780fac89b9f39a2cf5be2d12faa4b9a10061303,2024-07-03T12:53:24.977000 CVE-2024-2040,0,0,4eb156f2f336b9896eaa73d7b780fac89b9f39a2cf5be2d12faa4b9a10061303,2024-07-03T12:53:24.977000
CVE-2024-20404,0,0,679bbd668c3128b9d2c298395d952eaf5fd76470dbc9bd0e765678566e0d175f,2024-06-13T20:25:46.837000 CVE-2024-20404,0,0,679bbd668c3128b9d2c298395d952eaf5fd76470dbc9bd0e765678566e0d175f,2024-06-13T20:25:46.837000
CVE-2024-20405,0,0,e5acdd821474e29805e089211fec2d1d30a76e0d4d4635efbeb215040858791b,2024-06-18T18:04:04.497000 CVE-2024-20405,0,0,e5acdd821474e29805e089211fec2d1d30a76e0d4d4635efbeb215040858791b,2024-06-18T18:04:04.497000
CVE-2024-2041,0,0,f285d116ebee20fb02fc2c7de4f69fe8567e76fe9eda446fb7969801431b3d7d,2024-05-06T14:15:07.747000 CVE-2024-2041,0,0,f285d116ebee20fb02fc2c7de4f69fe8567e76fe9eda446fb7969801431b3d7d,2024-05-06T14:15:07.747000
@ -243861,7 +243861,7 @@ CVE-2024-22306,0,0,5427f196cd2fc064fa3cdf34238c9c0432fe7231acc9557add0074b844121
CVE-2024-22307,0,0,612500eeac06983bafbc014843c236d8c463241187c2baf6a06b160bc5b163de,2024-02-06T15:52:58.037000 CVE-2024-22307,0,0,612500eeac06983bafbc014843c236d8c463241187c2baf6a06b160bc5b163de,2024-02-06T15:52:58.037000
CVE-2024-22308,0,0,f72408efdea3f3f2120dbeafd0b38992093a473ba2aa0a2b4bc8ffb90cf9e200,2024-01-30T17:45:59.927000 CVE-2024-22308,0,0,f72408efdea3f3f2120dbeafd0b38992093a473ba2aa0a2b4bc8ffb90cf9e200,2024-01-30T17:45:59.927000
CVE-2024-22309,0,0,1093afc20ffe4dba6071bc2d2a5c666f7d5a7f27092b0aa5704b12fac569bad5,2024-01-30T22:18:55.947000 CVE-2024-22309,0,0,1093afc20ffe4dba6071bc2d2a5c666f7d5a7f27092b0aa5704b12fac569bad5,2024-01-30T22:18:55.947000
CVE-2024-2231,0,1,c96321cf6ad3d9918686b86829ec340b1580d2567aeee874dbee65cd54c7e011,2024-07-03T12:53:24.977000 CVE-2024-2231,0,0,c96321cf6ad3d9918686b86829ec340b1580d2567aeee874dbee65cd54c7e011,2024-07-03T12:53:24.977000
CVE-2024-22310,0,0,97f58d74bad578babbc5c2fb902488ef3a20e73ec8d238c07475dac86db860dd,2024-02-06T16:08:42.910000 CVE-2024-22310,0,0,97f58d74bad578babbc5c2fb902488ef3a20e73ec8d238c07475dac86db860dd,2024-02-06T16:08:42.910000
CVE-2024-22311,0,0,1b2896f06b8d2a60f5f4320525fd0e0a2ff9a9add83fae0db40bd38deadccd39,2024-03-27T12:29:30.307000 CVE-2024-22311,0,0,1b2896f06b8d2a60f5f4320525fd0e0a2ff9a9add83fae0db40bd38deadccd39,2024-03-27T12:29:30.307000
CVE-2024-22312,0,0,502cad1c70aca19be54f1a146a057702eb2ad6518581e46eff801281d9dde1eb,2024-02-15T04:38:23.153000 CVE-2024-22312,0,0,502cad1c70aca19be54f1a146a057702eb2ad6518581e46eff801281d9dde1eb,2024-02-15T04:38:23.153000
@ -243873,7 +243873,7 @@ CVE-2024-22320,0,0,b7e6bc5c871bb2a076b1c4d217e351ebb443d568b1fdbb86f9513f16f0da1
CVE-2024-22326,0,0,611aa89f02e2c1b3e79c0d2da37798e3e77fccc4ee223e6b80d6313dd22973d4,2024-06-07T14:56:05.647000 CVE-2024-22326,0,0,611aa89f02e2c1b3e79c0d2da37798e3e77fccc4ee223e6b80d6313dd22973d4,2024-06-07T14:56:05.647000
CVE-2024-22328,0,0,1d3eba54d3dcb9850fbd9a86e1475d83621830be3d74777232b85acf89e88234,2024-04-08T18:48:40.217000 CVE-2024-22328,0,0,1d3eba54d3dcb9850fbd9a86e1475d83621830be3d74777232b85acf89e88234,2024-04-08T18:48:40.217000
CVE-2024-22329,0,0,6b484ef8d82a649c0162bc9be85600528b13c1a759ed8ec79e69e3b10b67e2d3,2024-04-17T12:48:07.510000 CVE-2024-22329,0,0,6b484ef8d82a649c0162bc9be85600528b13c1a759ed8ec79e69e3b10b67e2d3,2024-04-17T12:48:07.510000
CVE-2024-2233,0,1,3f560edb3aa2a0572e5aea14b67e8e85b9187be1302884edd007ad6b24cb2b39,2024-07-03T12:53:24.977000 CVE-2024-2233,0,0,3f560edb3aa2a0572e5aea14b67e8e85b9187be1302884edd007ad6b24cb2b39,2024-07-03T12:53:24.977000
CVE-2024-22331,0,0,79325856c8baa9082651d9383783f7a4198ba299d30e2c67010ba88c7f1776a4,2024-02-13T20:26:23.780000 CVE-2024-22331,0,0,79325856c8baa9082651d9383783f7a4198ba299d30e2c67010ba88c7f1776a4,2024-02-13T20:26:23.780000
CVE-2024-22332,0,0,a27f7ab666232b70f986037d449131d6bde483413718019674022f07be0d9b9e,2024-04-03T02:15:07.973000 CVE-2024-22332,0,0,a27f7ab666232b70f986037d449131d6bde483413718019674022f07be0d9b9e,2024-04-03T02:15:07.973000
CVE-2024-22333,0,0,dc6ffe95ff5a7403a67c60cf469ac371d4effee2bd0a4db051204dcf972f9e7e,2024-06-13T18:35:19.777000 CVE-2024-22333,0,0,dc6ffe95ff5a7403a67c60cf469ac371d4effee2bd0a4db051204dcf972f9e7e,2024-06-13T18:35:19.777000
@ -243883,12 +243883,12 @@ CVE-2024-22336,0,0,92b17f3ddf77b7c8a53a41f903603d0d36207de06fae8bd71fc2469777bc3
CVE-2024-22337,0,0,9a674fac9bc4716d61a028d3be9473027552f3c1c11335efca4b4ddefd1e14f0,2024-02-20T19:50:53.960000 CVE-2024-22337,0,0,9a674fac9bc4716d61a028d3be9473027552f3c1c11335efca4b4ddefd1e14f0,2024-02-20T19:50:53.960000
CVE-2024-22338,0,0,6e079f32e725c30ab50d30a352b744d0c760c6659785a2e99ec5f98e6f27b645,2024-05-31T13:01:46.727000 CVE-2024-22338,0,0,6e079f32e725c30ab50d30a352b744d0c760c6659785a2e99ec5f98e6f27b645,2024-05-31T13:01:46.727000
CVE-2024-22339,0,0,7da5694b93905b7c6d93ed93108dac6dab6202238259984860ef1d6e1bec9ec9,2024-04-15T13:15:31.997000 CVE-2024-22339,0,0,7da5694b93905b7c6d93ed93108dac6dab6202238259984860ef1d6e1bec9ec9,2024-04-15T13:15:31.997000
CVE-2024-2234,0,1,678c50cf7e63b0e2ecb3786b9b3e9c1466245abe875c1d626a9365b6ae9b7ae9,2024-07-03T12:53:24.977000 CVE-2024-2234,0,0,678c50cf7e63b0e2ecb3786b9b3e9c1466245abe875c1d626a9365b6ae9b7ae9,2024-07-03T12:53:24.977000
CVE-2024-22343,0,0,98c7840ac2eb50dcfa88f4141a657f976aab7d39f92de1ccb97b49719a76ede0,2024-05-14T16:13:02.773000 CVE-2024-22343,0,0,98c7840ac2eb50dcfa88f4141a657f976aab7d39f92de1ccb97b49719a76ede0,2024-05-14T16:13:02.773000
CVE-2024-22344,0,0,dd931266b7e962044b40a6567c41617f6ff2ceb50100fcd1ed62bcdaadd651ee,2024-05-14T16:13:02.773000 CVE-2024-22344,0,0,dd931266b7e962044b40a6567c41617f6ff2ceb50100fcd1ed62bcdaadd651ee,2024-05-14T16:13:02.773000
CVE-2024-22345,0,0,a53b92e2f5ec18ca2cba51b0a304f5cdd6926e00d82cbe49f8f763399c2a3daf,2024-05-14T16:13:02.773000 CVE-2024-22345,0,0,a53b92e2f5ec18ca2cba51b0a304f5cdd6926e00d82cbe49f8f763399c2a3daf,2024-05-14T16:13:02.773000
CVE-2024-22346,0,0,638ee4e9687c7c28032b432c317662713c057110b08b4b27024e81eb8453bf9e,2024-03-19T16:50:10.570000 CVE-2024-22346,0,0,638ee4e9687c7c28032b432c317662713c057110b08b4b27024e81eb8453bf9e,2024-03-19T16:50:10.570000
CVE-2024-2235,0,1,aca307fcff1fcb062b670545536481e4b283817f6d6be40c8af90057bf71f503,2024-07-03T12:53:24.977000 CVE-2024-2235,0,0,aca307fcff1fcb062b670545536481e4b283817f6d6be40c8af90057bf71f503,2024-07-03T12:53:24.977000
CVE-2024-22352,0,0,8ad74f9c108b142191e10d9f1af5800c7055fc5b8e79f7a9a2cf40171c06b8cd,2024-04-01T15:23:54.530000 CVE-2024-22352,0,0,8ad74f9c108b142191e10d9f1af5800c7055fc5b8e79f7a9a2cf40171c06b8cd,2024-04-01T15:23:54.530000
CVE-2024-22353,0,0,ad692a077e5b804e1764ffb4f197bc72c54e38388ae47b5f805ac59827db6799,2024-05-16T00:15:08.057000 CVE-2024-22353,0,0,ad692a077e5b804e1764ffb4f197bc72c54e38388ae47b5f805ac59827db6799,2024-05-16T00:15:08.057000
CVE-2024-22354,0,0,68792703b2560a4c3917a12fc2257c1fa0af627e17204b8c7ed6a62e6c56f559,2024-05-21T19:15:09.413000 CVE-2024-22354,0,0,68792703b2560a4c3917a12fc2257c1fa0af627e17204b8c7ed6a62e6c56f559,2024-05-21T19:15:09.413000
@ -244715,7 +244715,7 @@ CVE-2024-23745,0,0,0997a46b1366c968f7b9f767523f67b6c77ab399053d9f0736951af88cf15
CVE-2024-23746,0,0,4231b3151cad9797b59bfa65c9d1a0aba18262be508b41df48aa646e6b64ee48,2024-03-21T02:52:08.563000 CVE-2024-23746,0,0,4231b3151cad9797b59bfa65c9d1a0aba18262be508b41df48aa646e6b64ee48,2024-03-21T02:52:08.563000
CVE-2024-23747,0,0,e5badc646080ce0998e1e81852fb21e000c7398188715a4f0ce89130386d9ea5,2024-02-02T02:03:39.093000 CVE-2024-23747,0,0,e5badc646080ce0998e1e81852fb21e000c7398188715a4f0ce89130386d9ea5,2024-02-02T02:03:39.093000
CVE-2024-23749,0,0,e489f7636c813784a61d3812299289346709b8bf63acb59822c186709b469431,2024-02-14T13:59:39.353000 CVE-2024-23749,0,0,e489f7636c813784a61d3812299289346709b8bf63acb59822c186709b469431,2024-02-14T13:59:39.353000
CVE-2024-2375,0,1,c3de96d78afc3bc6ffc67daacece32aaeeb0bdb870ad0b2df79a86e04f8b2ec1,2024-07-03T12:53:24.977000 CVE-2024-2375,0,0,c3de96d78afc3bc6ffc67daacece32aaeeb0bdb870ad0b2df79a86e04f8b2ec1,2024-07-03T12:53:24.977000
CVE-2024-23750,0,0,8e012c8bf46e4d6b122cd9676a67ed8063eceaae10c8b41283586e2acd25aff1,2024-01-29T16:51:14.573000 CVE-2024-23750,0,0,8e012c8bf46e4d6b122cd9676a67ed8063eceaae10c8b41283586e2acd25aff1,2024-01-29T16:51:14.573000
CVE-2024-23751,0,0,f4277632a799f5e0167c42d856d852fb64898f90e4d81aec065a43806c32cb6a,2024-01-29T15:06:44.003000 CVE-2024-23751,0,0,f4277632a799f5e0167c42d856d852fb64898f90e4d81aec065a43806c32cb6a,2024-01-29T15:06:44.003000
CVE-2024-23752,0,0,18d704b9462928669577bd2ecf8e771bfdc29bdedea9912638fd3f521668a073,2024-01-29T19:27:17.040000 CVE-2024-23752,0,0,18d704b9462928669577bd2ecf8e771bfdc29bdedea9912638fd3f521668a073,2024-01-29T19:27:17.040000
@ -244723,7 +244723,7 @@ CVE-2024-23755,0,0,20f404ef06f0de4002ad00bfcb3ecba797133c7898cd26c253955293bcb6e
CVE-2024-23756,0,0,ad98c26cac3e251d6e147a06061ab8f37933ff482c3e1fc10e9847ddd0a56975,2024-02-15T16:01:08.870000 CVE-2024-23756,0,0,ad98c26cac3e251d6e147a06061ab8f37933ff482c3e1fc10e9847ddd0a56975,2024-02-15T16:01:08.870000
CVE-2024-23758,0,0,0b90af0eb87a8b48149c5b2c24a267ebd8f5a25fb833966d160033fff9e77828,2024-02-22T19:07:37.840000 CVE-2024-23758,0,0,0b90af0eb87a8b48149c5b2c24a267ebd8f5a25fb833966d160033fff9e77828,2024-02-22T19:07:37.840000
CVE-2024-23759,0,0,73fe4ef6829a19943e815065d62e01eb8bcfa2b42e847a75f95d5c33c8cd1503,2024-02-15T04:49:02.133000 CVE-2024-23759,0,0,73fe4ef6829a19943e815065d62e01eb8bcfa2b42e847a75f95d5c33c8cd1503,2024-02-15T04:49:02.133000
CVE-2024-2376,0,1,a82d5e4ce1caa6e63dc9804b1f9d96ffb899caa17adf18ce75e0dea64bcecd21,2024-07-03T12:53:24.977000 CVE-2024-2376,0,0,a82d5e4ce1caa6e63dc9804b1f9d96ffb899caa17adf18ce75e0dea64bcecd21,2024-07-03T12:53:24.977000
CVE-2024-23760,0,0,bb86044c0a5dcc35ef326482cd22c362ff5c354c2c47549b45272f40e914b5cf,2024-02-15T04:49:31.847000 CVE-2024-23760,0,0,bb86044c0a5dcc35ef326482cd22c362ff5c354c2c47549b45272f40e914b5cf,2024-02-15T04:49:31.847000
CVE-2024-23761,0,0,91423f3fc0ae4a6c135e3093d5ba2f92b18f0705b43e8497a65147830ffb84f4,2024-02-15T04:49:36.837000 CVE-2024-23761,0,0,91423f3fc0ae4a6c135e3093d5ba2f92b18f0705b43e8497a65147830ffb84f4,2024-02-15T04:49:36.837000
CVE-2024-23762,0,0,1fc25d58731097f8aad4c8f7676cdc9a123654581fd6c8477b826714cd9e330b,2024-02-15T04:49:42.123000 CVE-2024-23762,0,0,1fc25d58731097f8aad4c8f7676cdc9a123654581fd6c8477b826714cd9e330b,2024-02-15T04:49:42.123000
@ -245273,7 +245273,7 @@ CVE-2024-24788,0,0,ec3a0e2bb85b04f6091132ce0b358d8c88079508c68a38db8ec47a1c1ba68
CVE-2024-24789,0,0,fd6a5b95d991b0dab3309c11b164e4c1e60de61b7d4a99fed36d8b88b927fd59,2024-07-03T01:48:25.510000 CVE-2024-24789,0,0,fd6a5b95d991b0dab3309c11b164e4c1e60de61b7d4a99fed36d8b88b927fd59,2024-07-03T01:48:25.510000
CVE-2024-2479,0,0,62ab2572f43d54e062a6ec9f07869b63a0bdfad1924b8c09404f39717bdfbd77,2024-05-17T02:38:14.640000 CVE-2024-2479,0,0,62ab2572f43d54e062a6ec9f07869b63a0bdfad1924b8c09404f39717bdfbd77,2024-05-17T02:38:14.640000
CVE-2024-24790,0,0,eea6958e81d73afbece6bae935d256b81d43a28af6bfcc689fa474522b0325d6,2024-06-18T17:59:12.547000 CVE-2024-24790,0,0,eea6958e81d73afbece6bae935d256b81d43a28af6bfcc689fa474522b0325d6,2024-06-18T17:59:12.547000
CVE-2024-24791,0,1,d6750c1bff921be3db20c9661706ae6a1028345b03fca5380ec164ecc9b52e93,2024-07-03T12:53:24.977000 CVE-2024-24791,0,0,d6750c1bff921be3db20c9661706ae6a1028345b03fca5380ec164ecc9b52e93,2024-07-03T12:53:24.977000
CVE-2024-24792,0,0,856277335b0a65941c91908e89bfe8db9fa7dd817204d99e1f16a0e92b8015e5,2024-06-27T19:25:12.067000 CVE-2024-24792,0,0,856277335b0a65941c91908e89bfe8db9fa7dd817204d99e1f16a0e92b8015e5,2024-06-27T19:25:12.067000
CVE-2024-24793,0,0,c02d48f5d574325816298b4b1d2848ca92f5dc7aa67a2fd30978e3885630bc1b,2024-02-20T19:50:53.960000 CVE-2024-24793,0,0,c02d48f5d574325816298b4b1d2848ca92f5dc7aa67a2fd30978e3885630bc1b,2024-02-20T19:50:53.960000
CVE-2024-24794,0,0,0d491c54da3b197a1321ac69102f9de79d058e3462ee7572209ea583555d837a,2024-02-20T19:50:53.960000 CVE-2024-24794,0,0,0d491c54da3b197a1321ac69102f9de79d058e3462ee7572209ea583555d837a,2024-02-20T19:50:53.960000
@ -247536,12 +247536,12 @@ CVE-2024-27850,0,0,e1d4379d6b3d34c01ebe4dd5e7858f8de64aeb5953240c61d195d17d1f48e
CVE-2024-27851,0,0,20416253b2599df26c3b322a6efc6a4efc655856220ad817be23d3b30dc68157,2024-07-03T01:51:13.350000 CVE-2024-27851,0,0,20416253b2599df26c3b322a6efc6a4efc655856220ad817be23d3b30dc68157,2024-07-03T01:51:13.350000
CVE-2024-27852,0,0,2264a1594190812a9b29fc0e3f886882ab3c63c917f94e71ed2dc96c8e6c2c94,2024-06-10T18:15:29.900000 CVE-2024-27852,0,0,2264a1594190812a9b29fc0e3f886882ab3c63c917f94e71ed2dc96c8e6c2c94,2024-06-10T18:15:29.900000
CVE-2024-27855,0,0,7a41b8238436a46025b45552c8cda3356564589cbbf3b4bae7d5eb20d8672a8c,2024-06-11T13:54:12.057000 CVE-2024-27855,0,0,7a41b8238436a46025b45552c8cda3356564589cbbf3b4bae7d5eb20d8672a8c,2024-06-11T13:54:12.057000
CVE-2024-27857,0,0,c656440d8235ebe336c8f0cb6c0dbbed059f704b9d7b7858d9d6b284ae7c3693,2024-07-03T01:51:14.753000 CVE-2024-27857,0,1,b12d57be271aa438e5d4c668c7f18ead13afc3b08569565d9c95a215938e9ba2,2024-07-03T15:43:17.007000
CVE-2024-2786,0,0,dcf647d15f4b220698a959a93f7a5cdfd4a7ecd495ee9aa1ef69052001df8b00,2024-04-10T13:23:38.787000 CVE-2024-2786,0,0,dcf647d15f4b220698a959a93f7a5cdfd4a7ecd495ee9aa1ef69052001df8b00,2024-04-10T13:23:38.787000
CVE-2024-27867,0,0,929b60a50faac760812cfff090aaa2b01b31cf8cfca2ab2ec6bdf5a9e5f514fb,2024-06-26T12:44:29.693000 CVE-2024-27867,0,0,929b60a50faac760812cfff090aaa2b01b31cf8cfca2ab2ec6bdf5a9e5f514fb,2024-06-26T12:44:29.693000
CVE-2024-2787,0,0,496195d9f69f32f0c6a6baaf1ee3e4e62db7dfd0c17c88d9010b922be319ee45,2024-04-10T13:23:38.787000 CVE-2024-2787,0,0,496195d9f69f32f0c6a6baaf1ee3e4e62db7dfd0c17c88d9010b922be319ee45,2024-04-10T13:23:38.787000
CVE-2024-2788,0,0,088d65d193232fcb72b866e8c41bac364578345792bee984e7ddfd9f7a9953b9,2024-04-10T13:23:38.787000 CVE-2024-2788,0,0,088d65d193232fcb72b866e8c41bac364578345792bee984e7ddfd9f7a9953b9,2024-04-10T13:23:38.787000
CVE-2024-27885,0,0,c59de475c576c44e129a9e58b8769caffc1b189d40a0172434b38c39f1ec2eb6,2024-06-11T13:54:12.057000 CVE-2024-27885,0,1,e3765a253be02afcb43d4bff90a02eb9cc8683032aa7319a1325bda028b43ed5,2024-07-03T15:44:29.397000
CVE-2024-27889,0,0,fafa75eb559da0736cbe5f975005d2c6007c4614a71da5e60cbad40c6f594a2b,2024-03-05T13:41:01.900000 CVE-2024-27889,0,0,fafa75eb559da0736cbe5f975005d2c6007c4614a71da5e60cbad40c6f594a2b,2024-03-05T13:41:01.900000
CVE-2024-2789,0,0,c1532315076419efcbf6da1ca657d2b247ea6915b4f0b97827f3803af3830f0d,2024-04-10T13:23:38.787000 CVE-2024-2789,0,0,c1532315076419efcbf6da1ca657d2b247ea6915b4f0b97827f3803af3830f0d,2024-04-10T13:23:38.787000
CVE-2024-27894,0,0,b3f2bb1a7a3eca33b6d3782ab00745453be745ced11b5b6cc9ac93cd4156f4f3,2024-05-01T17:15:30.557000 CVE-2024-27894,0,0,b3f2bb1a7a3eca33b6d3782ab00745453be745ced11b5b6cc9ac93cd4156f4f3,2024-05-01T17:15:30.557000
@ -250653,7 +250653,7 @@ CVE-2024-32664,0,0,718b297c1c7558858a3c6f09924665172ffd7ff066b9e99da8e046f6aca66
CVE-2024-32669,0,0,120909758c684acb7a51e36d8f01a68b3f4d03ded247287f26cab48d9139b029,2024-05-14T16:12:23.490000 CVE-2024-32669,0,0,120909758c684acb7a51e36d8f01a68b3f4d03ded247287f26cab48d9139b029,2024-05-14T16:12:23.490000
CVE-2024-3267,0,0,00a210ede7a73ca33b64d3b8a0e382509d5bafa34ae84022125b180763aee2bd,2024-04-10T13:23:38.787000 CVE-2024-3267,0,0,00a210ede7a73ca33b64d3b8a0e382509d5bafa34ae84022125b180763aee2bd,2024-04-10T13:23:38.787000
CVE-2024-32672,0,0,ee6c48c3e0e38e8c391ea6261e7813807f206a60f2ac1e86a9d8d6aba39ed1b6,2024-05-14T16:12:23.490000 CVE-2024-32672,0,0,ee6c48c3e0e38e8c391ea6261e7813807f206a60f2ac1e86a9d8d6aba39ed1b6,2024-05-14T16:12:23.490000
CVE-2024-32673,0,1,c9f67d54777fc1d6a602ef9ed03e4f5b3605cc09e4b1087225be42a1b82669fa,2024-07-03T12:53:24.977000 CVE-2024-32673,0,0,c9f67d54777fc1d6a602ef9ed03e4f5b3605cc09e4b1087225be42a1b82669fa,2024-07-03T12:53:24.977000
CVE-2024-32674,0,0,8e274e9762e7b32d105911c76fa84ee156bae08969022295a61c40a0ca8ab4bf,2024-07-03T01:56:55.253000 CVE-2024-32674,0,0,8e274e9762e7b32d105911c76fa84ee156bae08969022295a61c40a0ca8ab4bf,2024-07-03T01:56:55.253000
CVE-2024-32675,0,0,87b463967c2204618d7e556d0f9b434f519dfbe770ec74ef985201062de7ccc7,2024-04-24T17:16:50.397000 CVE-2024-32675,0,0,87b463967c2204618d7e556d0f9b434f519dfbe770ec74ef985201062de7ccc7,2024-04-24T17:16:50.397000
CVE-2024-32676,0,0,c48bb61830c9720695f0f8b0e8d63e64e27e7902456d765223bd42b42ebc2759,2024-05-17T09:15:38.620000 CVE-2024-32676,0,0,c48bb61830c9720695f0f8b0e8d63e64e27e7902456d765223bd42b42ebc2759,2024-05-17T09:15:38.620000
@ -250890,6 +250890,7 @@ CVE-2024-3293,0,0,3552485a27a6b6c8b2cadd17fbdb3e630238722099a3e2d8d97b0f239cd2dc
CVE-2024-32930,0,0,fb1d198b0a6f1c4a99609fcd492e188ff0ceff2fe76051eb0cb8c91155418b98,2024-07-03T01:57:20.283000 CVE-2024-32930,0,0,fb1d198b0a6f1c4a99609fcd492e188ff0ceff2fe76051eb0cb8c91155418b98,2024-07-03T01:57:20.283000
CVE-2024-32932,0,0,379c0ae6cc2f94f410885ca7cc028fe0bf4b04f9e7e3efc2f3c97b4b40e1ac9c,2024-07-02T17:44:45.700000 CVE-2024-32932,0,0,379c0ae6cc2f94f410885ca7cc028fe0bf4b04f9e7e3efc2f3c97b4b40e1ac9c,2024-07-02T17:44:45.700000
CVE-2024-32936,0,0,a98023d22d8fe34ca67d2e41b0f1a0096283ac909ae52ca8a63dcd8b920ad836,2024-06-24T19:26:47.037000 CVE-2024-32936,0,0,a98023d22d8fe34ca67d2e41b0f1a0096283ac909ae52ca8a63dcd8b920ad836,2024-06-24T19:26:47.037000
CVE-2024-32937,1,1,78a388a1ecaf925d74c3df02d2c7aa0b4c157156f6027d67bc22546b8a4aa00c,2024-07-03T15:15:05.803000
CVE-2024-32943,0,0,681ae4b7d296514b2b529abffaf20ed5b5c5e8eb8fff0f6f2bae62e656ffc6eb,2024-06-21T11:22:01.687000 CVE-2024-32943,0,0,681ae4b7d296514b2b529abffaf20ed5b5c5e8eb8fff0f6f2bae62e656ffc6eb,2024-06-21T11:22:01.687000
CVE-2024-32944,0,0,357727703d6a86b0d608eb9af0488af030fe8a85e9a27818f7be4cd525bf7172,2024-05-28T12:39:28.377000 CVE-2024-32944,0,0,357727703d6a86b0d608eb9af0488af030fe8a85e9a27818f7be4cd525bf7172,2024-05-28T12:39:28.377000
CVE-2024-32947,0,0,35287e8f28304ee9599f9712f94ac6e419772e1d66820555100faf85f8aeebf3,2024-04-24T17:16:50.397000 CVE-2024-32947,0,0,35287e8f28304ee9599f9712f94ac6e419772e1d66820555100faf85f8aeebf3,2024-04-24T17:16:50.397000
@ -251868,7 +251869,7 @@ CVE-2024-34691,0,0,827395ff4b0bf99f2642a5cd3134d1fe0effa60012a62490a349f26f4db25
CVE-2024-34693,0,0,6da431cb088539cdedaef048562e52acae68c24a7fe449888c5724e281a42b04,2024-06-20T12:43:25.663000 CVE-2024-34693,0,0,6da431cb088539cdedaef048562e52acae68c24a7fe449888c5724e281a42b04,2024-06-20T12:43:25.663000
CVE-2024-34694,0,0,c52b0ddd7913e7b99d778e62e2419069bd9d8eb90d9108e75c7e8088bb5608e8,2024-06-17T12:42:04.623000 CVE-2024-34694,0,0,c52b0ddd7913e7b99d778e62e2419069bd9d8eb90d9108e75c7e8088bb5608e8,2024-06-17T12:42:04.623000
CVE-2024-34695,0,0,d5ed5d99c8f0d08b73ea3cb249327295e787f14594542dd2f27279ab9312830c,2024-05-14T16:12:23.490000 CVE-2024-34695,0,0,d5ed5d99c8f0d08b73ea3cb249327295e787f14594542dd2f27279ab9312830c,2024-05-14T16:12:23.490000
CVE-2024-34696,0,0,1697446274bb3cd395c26226b01c7397470c20a75a90bbad0605ce462858be0c,2024-07-01T16:37:39.040000 CVE-2024-34696,0,1,fc37f1f871594e87cfe2d19d9897a201f28cf21e82debe0acdfd6232ba7f8f65,2024-07-03T14:42:49.743000
CVE-2024-34697,0,0,95295a45851b4a50f600527e364638272a5d24a08a1ec02edb19abea712755b2,2024-05-14T16:12:23.490000 CVE-2024-34697,0,0,95295a45851b4a50f600527e364638272a5d24a08a1ec02edb19abea712755b2,2024-05-14T16:12:23.490000
CVE-2024-34698,0,0,10e59d69dc4df1155204551f8483405755bab4be109bdea52b3a75e369d53b1b,2024-05-14T16:12:23.490000 CVE-2024-34698,0,0,10e59d69dc4df1155204551f8483405755bab4be109bdea52b3a75e369d53b1b,2024-05-14T16:12:23.490000
CVE-2024-34699,0,0,25f405235bcdebbbdbdc15ae858e3622caf3e07dac211b82cab5ea59f42ec719,2024-05-14T16:12:23.490000 CVE-2024-34699,0,0,25f405235bcdebbbdbdc15ae858e3622caf3e07dac211b82cab5ea59f42ec719,2024-05-14T16:12:23.490000
@ -252912,7 +252913,7 @@ CVE-2024-36246,0,0,50338f85842e71924c1397e2b0a309f647146226696bf59a5411ba0e6e468
CVE-2024-3625,0,0,bb7fa72c43d725aef9f66641f31c3359a614ed8ba414acf9f05b8e44148cef81,2024-04-26T12:58:17.720000 CVE-2024-3625,0,0,bb7fa72c43d725aef9f66641f31c3359a614ed8ba414acf9f05b8e44148cef81,2024-04-26T12:58:17.720000
CVE-2024-36252,0,0,4edf18ae557d8c3498076af1a69a7b853e545554a27b9b0b40bcb780d22c50d6,2024-07-03T02:02:59.060000 CVE-2024-36252,0,0,4edf18ae557d8c3498076af1a69a7b853e545554a27b9b0b40bcb780d22c50d6,2024-07-03T02:02:59.060000
CVE-2024-36255,0,0,22b21684452ad4563618ad5cee66dc719af723b04c8a1647fe9cf6d970347f9a,2024-05-28T12:39:28.377000 CVE-2024-36255,0,0,22b21684452ad4563618ad5cee66dc719af723b04c8a1647fe9cf6d970347f9a,2024-05-28T12:39:28.377000
CVE-2024-36257,0,1,9dbf9f66bb71e56c15b7e6d1dac9a861cf932c1cba4dbcbe34f8663012d6624b,2024-07-03T12:53:24.977000 CVE-2024-36257,0,0,9dbf9f66bb71e56c15b7e6d1dac9a861cf932c1cba4dbcbe34f8663012d6624b,2024-07-03T12:53:24.977000
CVE-2024-3626,0,0,668faec6d18ac8a7c33197af94901aaf7ddac1dec4c77c1d646fba224d5f8541,2024-05-24T01:15:30.977000 CVE-2024-3626,0,0,668faec6d18ac8a7c33197af94901aaf7ddac1dec4c77c1d646fba224d5f8541,2024-05-24T01:15:30.977000
CVE-2024-36260,0,0,268f67cf195b2e7e5437e7777158f76d317b4cf206300592ea57a0575c8548af,2024-07-02T12:09:16.907000 CVE-2024-36260,0,0,268f67cf195b2e7e5437e7777158f76d317b4cf206300592ea57a0575c8548af,2024-07-02T12:09:16.907000
CVE-2024-36263,0,0,8fc77ae12c809e003508687bca8ef69500efdb9e489f26efe8ffb68dd267fd3b,2024-06-13T18:36:09.010000 CVE-2024-36263,0,0,8fc77ae12c809e003508687bca8ef69500efdb9e489f26efe8ffb68dd267fd3b,2024-06-13T18:36:09.010000
@ -252980,7 +252981,7 @@ CVE-2024-36397,0,0,b682d6f470c0dada217073740a5ad29ca1b1f9032f70f4edd7bab7bdfb1f6
CVE-2024-36399,0,0,32a084399fffaab7b007a4925030bc8dfc9c8bbd3d7f25f567b275cd72694397,2024-06-07T14:56:05.647000 CVE-2024-36399,0,0,32a084399fffaab7b007a4925030bc8dfc9c8bbd3d7f25f567b275cd72694397,2024-06-07T14:56:05.647000
CVE-2024-3640,0,0,abbf5a33cbca708fe19710dda7a796491ae1d1614e9cd03f43d6cddef8b09500,2024-05-17T18:36:31.297000 CVE-2024-3640,0,0,abbf5a33cbca708fe19710dda7a796491ae1d1614e9cd03f43d6cddef8b09500,2024-05-17T18:36:31.297000
CVE-2024-36400,0,0,6b10ab1f058055da0b7f6513936a46e66d6922b94171c5e956b85881f675cf7c,2024-06-10T19:39:21.660000 CVE-2024-36400,0,0,6b10ab1f058055da0b7f6513936a46e66d6922b94171c5e956b85881f675cf7c,2024-06-10T19:39:21.660000
CVE-2024-36401,0,0,87e986c6abcb99589eb18d897c1eae35aa261f64a143786484b486b18d465a85,2024-07-01T16:37:39.040000 CVE-2024-36401,0,1,4e7824d6e0ba409db0bd3352043278eb790179388b8d748fbe3f7bbd11d705c2,2024-07-03T15:07:42.777000
CVE-2024-36404,0,0,bc349d6b7c657155d15e1c421e7bc9ad56ba3fcfaca14ccdbb458b8f57d45518,2024-07-02T17:44:45.700000 CVE-2024-36404,0,0,bc349d6b7c657155d15e1c421e7bc9ad56ba3fcfaca14ccdbb458b8f57d45518,2024-07-02T17:44:45.700000
CVE-2024-36405,0,0,342cb049567ebebbbb5ec2f471f348f7e69a152097c662b875d4729bb76af752,2024-06-10T18:06:22.600000 CVE-2024-36405,0,0,342cb049567ebebbbb5ec2f471f348f7e69a152097c662b875d4729bb76af752,2024-06-10T18:06:22.600000
CVE-2024-36406,0,0,4c4f64b7223e45baf0f4fcf71db77f8f804dae22bb20bd965ed8f0d422b0ddc0,2024-06-10T18:06:22.600000 CVE-2024-36406,0,0,4c4f64b7223e45baf0f4fcf71db77f8f804dae22bb20bd965ed8f0d422b0ddc0,2024-06-10T18:06:22.600000
@ -252999,9 +253000,9 @@ CVE-2024-36417,0,0,7f72be2da88bd03f2618a97d909b76dab66b1196af11257e6aa2fac632513
CVE-2024-36418,0,0,52272dc570f5081df6975298e5712cf123b760ef720bb4951287c4366378282e,2024-06-11T13:54:12.057000 CVE-2024-36418,0,0,52272dc570f5081df6975298e5712cf123b760ef720bb4951287c4366378282e,2024-06-11T13:54:12.057000
CVE-2024-36419,0,0,e561cf6fec966fa1d9dbaeadf6c1b7f0c1186aebf1fa6c9a3ce263fb312ad74d,2024-06-11T13:54:12.057000 CVE-2024-36419,0,0,e561cf6fec966fa1d9dbaeadf6c1b7f0c1186aebf1fa6c9a3ce263fb312ad74d,2024-06-11T13:54:12.057000
CVE-2024-3642,0,0,bbed1ee941355da6f32a6eba37e95a843dd7913c7dd227d8da7f65dcb683674b,2024-05-16T13:03:05.353000 CVE-2024-3642,0,0,bbed1ee941355da6f32a6eba37e95a843dd7913c7dd227d8da7f65dcb683674b,2024-05-16T13:03:05.353000
CVE-2024-36420,0,0,e58b727e60b33d8076352d7d95342e64e8bdeb9a8c852f7906107955156df602,2024-07-01T16:37:39.040000 CVE-2024-36420,0,1,f88ca1da3f418238df7aa68f8868409c11480e63fa5a419dd8cae87369fdc260,2024-07-03T15:29:45.557000
CVE-2024-36421,0,0,2db1f42564f0eaf58b885bc52aa44daebec6dc523b1d77558c17c8fa19b2495f,2024-07-01T16:37:39.040000 CVE-2024-36421,0,1,6377f154589fbee582a888cb89fe433db93fc2d1b9f4ba90a9e9d6ff1a5422db,2024-07-03T15:36:31.170000
CVE-2024-36422,0,0,8982caabe6eb3eda8c34b1bc1a267af26cb5987e2c96eeefaf11d8ef2ed30e14,2024-07-01T16:37:39.040000 CVE-2024-36422,0,1,1c8e85fff4389539f30938d98dea0041c583b614c5e1956a8be795decf84cdf1,2024-07-03T15:38:24.297000
CVE-2024-36423,0,0,7993080f22032ce73ea739ef8e8e51e988ab7f86f630514176f775aada6bbe21,2024-07-02T12:09:16.907000 CVE-2024-36423,0,0,7993080f22032ce73ea739ef8e8e51e988ab7f86f630514176f775aada6bbe21,2024-07-02T12:09:16.907000
CVE-2024-36426,0,0,081cbabfe1f165d2e60c6bf5434c4cea5a1c1465246b1d9713d429b0a41c1ba0,2024-07-03T02:03:11.237000 CVE-2024-36426,0,0,081cbabfe1f165d2e60c6bf5434c4cea5a1c1465246b1d9713d429b0a41c1ba0,2024-07-03T02:03:11.237000
CVE-2024-36427,0,0,10c5dade9c11af5e52239a7a8c18438909a8ea6a201617061be6b7626f49e18c,2024-07-03T02:03:12.033000 CVE-2024-36427,0,0,10c5dade9c11af5e52239a7a8c18438909a8ea6a201617061be6b7626f49e18c,2024-07-03T02:03:12.033000
@ -253336,7 +253337,7 @@ CVE-2024-37079,0,0,9bbd76d5444005ceb39d0ac68b0b4e335d82d5da3fc1107a95914993fa985
CVE-2024-3708,0,0,09132fb1644ebf0c808002aa8ac15b19f13ae71d0beb378f7a9664a5ae685f9a,2024-05-24T01:15:30.977000 CVE-2024-3708,0,0,09132fb1644ebf0c808002aa8ac15b19f13ae71d0beb378f7a9664a5ae685f9a,2024-05-24T01:15:30.977000
CVE-2024-37080,0,0,c953e426661198e9665c742ef09fb44af751efb40a1f491b02b9f5389b1d3d21,2024-06-20T12:44:01.637000 CVE-2024-37080,0,0,c953e426661198e9665c742ef09fb44af751efb40a1f491b02b9f5389b1d3d21,2024-06-20T12:44:01.637000
CVE-2024-37081,0,0,1657c2c6215fa861c8bf708a3b65df9501dd8a14588c6f7d5718007f5ce77c8d,2024-07-03T02:04:05.970000 CVE-2024-37081,0,0,1657c2c6215fa861c8bf708a3b65df9501dd8a14588c6f7d5718007f5ce77c8d,2024-07-03T02:04:05.970000
CVE-2024-37082,0,1,328caacf63ca1ae228af83a0f72fd44cf3348c7af63b09a9299e7e3e6e5de895,2024-07-03T12:53:24.977000 CVE-2024-37082,0,0,328caacf63ca1ae228af83a0f72fd44cf3348c7af63b09a9299e7e3e6e5de895,2024-07-03T12:53:24.977000
CVE-2024-37085,0,0,cd98b81b11dac217262bd62ad7a681095bdd9649a519f6ee026fccbd3bf44a32,2024-06-25T18:50:42.040000 CVE-2024-37085,0,0,cd98b81b11dac217262bd62ad7a681095bdd9649a519f6ee026fccbd3bf44a32,2024-06-25T18:50:42.040000
CVE-2024-37086,0,0,9acda53f27945df629654a7ed0b5babbb28f25e9a7ac50fce3893c7a6b8964b4,2024-06-25T18:50:42.040000 CVE-2024-37086,0,0,9acda53f27945df629654a7ed0b5babbb28f25e9a7ac50fce3893c7a6b8964b4,2024-06-25T18:50:42.040000
CVE-2024-37087,0,0,4e40b7ea7a56e7d2dfeb244220c863a1ed6df7c4211908de27563a1ed62e9bbc,2024-06-25T18:50:42.040000 CVE-2024-37087,0,0,4e40b7ea7a56e7d2dfeb244220c863a1ed6df7c4211908de27563a1ed62e9bbc,2024-06-25T18:50:42.040000
@ -253554,10 +253555,11 @@ CVE-2024-37699,0,0,e6aa9aad96c5cb91a6fa4201b1b47001ba232f78e3136af80ddfa6d4248f5
CVE-2024-3770,0,0,8954a3ad0db5fc9b48d9243a1de01e444d03084d0f8b5d5da9ebc562e8f0e6a6,2024-05-17T02:40:07.387000 CVE-2024-3770,0,0,8954a3ad0db5fc9b48d9243a1de01e444d03084d0f8b5d5da9ebc562e8f0e6a6,2024-05-17T02:40:07.387000
CVE-2024-3771,0,0,1bf22922ed0657906343b6368a2362d22a78a1ff9d5272db064e582b3b0855d4,2024-05-17T02:40:07.477000 CVE-2024-3771,0,0,1bf22922ed0657906343b6368a2362d22a78a1ff9d5272db064e582b3b0855d4,2024-05-17T02:40:07.477000
CVE-2024-3772,0,0,184d29c2faf230c27e7c42ad45c478e7862cbffdde795ec4220824e36861b510,2024-04-26T02:15:06.983000 CVE-2024-3772,0,0,184d29c2faf230c27e7c42ad45c478e7862cbffdde795ec4220824e36861b510,2024-04-26T02:15:06.983000
CVE-2024-37726,1,1,cf8c8adbac07e4ab41cdbeea022956581b212f36b844acfc4ccad3eb7e389f64,2024-07-03T14:15:06.120000
CVE-2024-37732,0,0,8bcaa977ac18e5833de4fd0520da90883ea1f9cf5405317587bb381c54de852f,2024-07-03T02:04:38.513000 CVE-2024-37732,0,0,8bcaa977ac18e5833de4fd0520da90883ea1f9cf5405317587bb381c54de852f,2024-07-03T02:04:38.513000
CVE-2024-37734,0,0,0e5d8052c40ece19eb47666a762eea5411abf63f936921b36baec3d43e53baa8,2024-07-03T02:04:39.343000 CVE-2024-37734,0,0,0e5d8052c40ece19eb47666a762eea5411abf63f936921b36baec3d43e53baa8,2024-07-03T02:04:39.343000
CVE-2024-3774,0,0,430454733381ff5a96eb00158d8d932d4c087496720223836bce2968611b5152,2024-04-15T13:15:31.997000 CVE-2024-3774,0,0,430454733381ff5a96eb00158d8d932d4c087496720223836bce2968611b5152,2024-04-15T13:15:31.997000
CVE-2024-37741,0,0,3c71ffbbf01e4a0e4425969bd458658ba5fb7e837c3a88f69ccf919fc0b22481,2024-07-03T02:04:40.153000 CVE-2024-37741,0,1,f5ed3254675cb5ce3a67ab08ad08f5443ff303292af76c58fe640715a6de27a4,2024-07-03T14:27:08.057000
CVE-2024-37742,0,0,82d0f7bd796b50c91f2398edb7b6a7a5b24c344e32d17491fc5d315bfb23b371,2024-06-26T20:15:15.917000 CVE-2024-37742,0,0,82d0f7bd796b50c91f2398edb7b6a7a5b24c344e32d17491fc5d315bfb23b371,2024-06-26T20:15:15.917000
CVE-2024-3775,0,0,a79253f4f0c7633f40fa5e33903553d0137ff03b4a2d8425a028bb5ddf1c6b0a,2024-04-15T13:15:31.997000 CVE-2024-3775,0,0,a79253f4f0c7633f40fa5e33903553d0137ff03b4a2d8425a028bb5ddf1c6b0a,2024-04-15T13:15:31.997000
CVE-2024-37759,0,0,fcc8ead5df9d431db40c232755b8d406131bfe6bf2637fa79e9581b47deb8f46,2024-07-03T02:04:41.510000 CVE-2024-37759,0,0,fcc8ead5df9d431db40c232755b8d406131bfe6bf2637fa79e9581b47deb8f46,2024-07-03T02:04:41.510000
@ -253629,8 +253631,8 @@ CVE-2024-3794,0,0,153385e096cd7f2ece15b2458b2e9fc3a616d4e8c794288f506409f055c027
CVE-2024-3795,0,0,394c789f966243db6d7a4bfee356db0989703de57fa4252b7833b38d6036f026,2024-05-14T16:11:39.510000 CVE-2024-3795,0,0,394c789f966243db6d7a4bfee356db0989703de57fa4252b7833b38d6036f026,2024-05-14T16:11:39.510000
CVE-2024-3796,0,0,8b56f1ae3498f70c780deb392dd70e4b0e2eb55d8dc491cebdead02f06bb596a,2024-05-14T16:11:39.510000 CVE-2024-3796,0,0,8b56f1ae3498f70c780deb392dd70e4b0e2eb55d8dc491cebdead02f06bb596a,2024-05-14T16:11:39.510000
CVE-2024-3797,0,0,ee6a5db4c86b7a1cb7dddd0f923d514d4da716af84fa2cbea88db014d700ce37,2024-05-17T02:40:08.123000 CVE-2024-3797,0,0,ee6a5db4c86b7a1cb7dddd0f923d514d4da716af84fa2cbea88db014d700ce37,2024-05-17T02:40:08.123000
CVE-2024-3800,0,0,0aee6a42b2039215c9eaef826d097369b3f1d3a7d2da64d84dcd5461a8ce6887,2024-06-28T13:38:47.077000 CVE-2024-3800,0,1,f8f57ef4bdedf9e336bba69e6db949ed7a578f3b2a10988d7c69ed3685de0000,2024-07-03T14:36:22.273000
CVE-2024-3801,0,0,fcfad6b0ce02399c7d678f395fb128f6fba813bc23e60b051d597cd380d4b8e6,2024-06-28T13:38:47.077000 CVE-2024-3801,0,1,59de265ce1af1c02a0bfcf9801db717e0400c3bfeeedabcf1fa6b682733a5570,2024-07-03T14:36:52.797000
CVE-2024-3802,0,0,aaa997a68afe711762ac8536c5d0fad15740edaa6785e851a1495f0cf1f43e75,2024-06-04T02:15:49.290000 CVE-2024-3802,0,0,aaa997a68afe711762ac8536c5d0fad15740edaa6785e851a1495f0cf1f43e75,2024-06-04T02:15:49.290000
CVE-2024-3803,0,0,cefb64222fdf80706b1a9eb17e095bbe2f795f698686df2fa7fab7399b51955d,2024-05-17T02:40:08.240000 CVE-2024-3803,0,0,cefb64222fdf80706b1a9eb17e095bbe2f795f698686df2fa7fab7399b51955d,2024-05-17T02:40:08.240000
CVE-2024-3804,0,0,6cbbef68e2216a1b6714fc89ff2a16fd432ad36dd1cabadaff597df2e56ce61a,2024-06-04T19:20:24.583000 CVE-2024-3804,0,0,6cbbef68e2216a1b6714fc89ff2a16fd432ad36dd1cabadaff597df2e56ce61a,2024-06-04T19:20:24.583000
@ -253647,7 +253649,7 @@ CVE-2024-3812,0,0,f751171253b8aec65ad3eb6d2474d3ee930fd7bd925f44cbf577354bd9ac3c
CVE-2024-3813,0,0,86c7d7a0e1d2bdb1014ab3bb60ae32f55f8deca1eac3a0f16e2b300f92de13c6,2024-06-17T12:42:04.623000 CVE-2024-3813,0,0,86c7d7a0e1d2bdb1014ab3bb60ae32f55f8deca1eac3a0f16e2b300f92de13c6,2024-06-17T12:42:04.623000
CVE-2024-3814,0,0,6acb0a54e9f66c1fa69cea6ef32be45b05b60edf6b85ffbcc82a92f37f75e3c1,2024-06-17T12:42:04.623000 CVE-2024-3814,0,0,6acb0a54e9f66c1fa69cea6ef32be45b05b60edf6b85ffbcc82a92f37f75e3c1,2024-06-17T12:42:04.623000
CVE-2024-3815,0,0,6bd5773f540c574f8e28080694e60819f34c3381e2d8c38f1a9a67bfdd0a3098,2024-06-17T12:42:04.623000 CVE-2024-3815,0,0,6bd5773f540c574f8e28080694e60819f34c3381e2d8c38f1a9a67bfdd0a3098,2024-06-17T12:42:04.623000
CVE-2024-3816,0,0,2c60ea3e6d8885876bc73fbf9a3e32dbc86d267cf2e909cefcb1e686654852dd,2024-06-28T13:38:47.077000 CVE-2024-3816,0,1,ca9c8b3746ea2ebbbc383e9aa135dd99550dbafdbe5ff9c69dbe15b33a0feabf,2024-07-03T14:37:07.750000
CVE-2024-3817,0,0,46e4b3903939ad7f28eeb8afee28fc4c5b18be71847d60ae426ede3b66e11122,2024-04-18T13:04:28.900000 CVE-2024-3817,0,0,46e4b3903939ad7f28eeb8afee28fc4c5b18be71847d60ae426ede3b66e11122,2024-04-18T13:04:28.900000
CVE-2024-3818,0,0,3b93c96d931c7712dba585285a5a0f954163c40c8ab2b4d2e42e74b7a416a166,2024-04-19T13:10:25.637000 CVE-2024-3818,0,0,3b93c96d931c7712dba585285a5a0f954163c40c8ab2b4d2e42e74b7a416a166,2024-04-19T13:10:25.637000
CVE-2024-3819,0,0,070335cf0d21b4518c9cf130cbde224bb7db7bd3582033700dab419bc756cd20,2024-05-02T18:00:37.360000 CVE-2024-3819,0,0,070335cf0d21b4518c9cf130cbde224bb7db7bd3582033700dab419bc756cd20,2024-05-02T18:00:37.360000
@ -253732,7 +253734,7 @@ CVE-2024-38443,0,0,f13f48a0a21a67520512a3ec2ab6e073a68af4c8b774478a4c1ef20277a5f
CVE-2024-38448,0,0,ba1871b7e0fa187923744d63be4c60396badf8afd9c3275c2e47e89175ed02ba,2024-07-03T02:05:03.433000 CVE-2024-38448,0,0,ba1871b7e0fa187923744d63be4c60396badf8afd9c3275c2e47e89175ed02ba,2024-07-03T02:05:03.433000
CVE-2024-38449,0,0,d69089b504731433d7b543e10e4b6e57d1623551f30ae8f192ba71fc59819634,2024-06-20T12:44:22.977000 CVE-2024-38449,0,0,d69089b504731433d7b543e10e4b6e57d1623551f30ae8f192ba71fc59819634,2024-06-20T12:44:22.977000
CVE-2024-3845,0,0,a979e2b537f528e4ac50f6006d078d735fa62fe4b7376a25443b79e4c194cadd,2024-07-03T02:06:42.887000 CVE-2024-3845,0,0,a979e2b537f528e4ac50f6006d078d735fa62fe4b7376a25443b79e4c194cadd,2024-07-03T02:06:42.887000
CVE-2024-38453,0,1,b37e4b9aac2e83312b7d279f2154b9c8c3686acce89ef9f2a457cc06a849c6a9,2024-07-03T12:53:24.977000 CVE-2024-38453,0,0,b37e4b9aac2e83312b7d279f2154b9c8c3686acce89ef9f2a457cc06a849c6a9,2024-07-03T12:53:24.977000
CVE-2024-38454,0,0,9e16cbeba5810d367094a131b56862641aa42d77b0ed4c90d4e4d7e92bb854dc,2024-06-17T12:42:04.623000 CVE-2024-38454,0,0,9e16cbeba5810d367094a131b56862641aa42d77b0ed4c90d4e4d7e92bb854dc,2024-06-17T12:42:04.623000
CVE-2024-38457,0,0,c77550a7e2a9252924a4646a20696a029639d1882dc30abb38808d48a175ba0c,2024-06-17T12:42:04.623000 CVE-2024-38457,0,0,c77550a7e2a9252924a4646a20696a029639d1882dc30abb38808d48a175ba0c,2024-06-17T12:42:04.623000
CVE-2024-38458,0,0,6851fd0120a71792de2b3d031afad7ff8acc6e8b0a3bf2458c8fd1c3754c1414,2024-06-17T12:42:04.623000 CVE-2024-38458,0,0,6851fd0120a71792de2b3d031afad7ff8acc6e8b0a3bf2458c8fd1c3754c1414,2024-06-17T12:42:04.623000
@ -253782,7 +253784,7 @@ CVE-2024-3853,0,0,7e352b0debfe2ff1972966571472dc1ad9a92992dff183ce4b7132f5ac558f
CVE-2024-38531,0,0,b56de69adb9e29b508ff804eef5c2919280b3646aaf65838ea0969fdce8b1636,2024-07-01T12:37:24.220000 CVE-2024-38531,0,0,b56de69adb9e29b508ff804eef5c2919280b3646aaf65838ea0969fdce8b1636,2024-07-01T12:37:24.220000
CVE-2024-38532,0,0,3a3b54122bd6780d32b0357101fa3b70c56bf5cfbd9b29132bcf407b07a6cf4a,2024-07-01T12:37:24.220000 CVE-2024-38532,0,0,3a3b54122bd6780d32b0357101fa3b70c56bf5cfbd9b29132bcf407b07a6cf4a,2024-07-01T12:37:24.220000
CVE-2024-38533,0,0,bc3eb3ef979bf5295d109db19e6d12afcecc2e011ea06aeec96e0b38c48ef42a,2024-07-01T12:37:24.220000 CVE-2024-38533,0,0,bc3eb3ef979bf5295d109db19e6d12afcecc2e011ea06aeec96e0b38c48ef42a,2024-07-01T12:37:24.220000
CVE-2024-38537,0,1,103402269a270a67bfe215eff7f2c87681abb6bef0d7dc124a63de178d731b3b,2024-07-03T12:53:24.977000 CVE-2024-38537,0,0,103402269a270a67bfe215eff7f2c87681abb6bef0d7dc124a63de178d731b3b,2024-07-03T12:53:24.977000
CVE-2024-38538,0,0,fd8d0c414421b9d83404be9e58919f8d1c04c080d100c149e46c3a374cade8e2,2024-06-20T12:44:01.637000 CVE-2024-38538,0,0,fd8d0c414421b9d83404be9e58919f8d1c04c080d100c149e46c3a374cade8e2,2024-06-20T12:44:01.637000
CVE-2024-38539,0,0,bb07b10cb8e27f63a4ad4d8d9f4efc546da28e9a77992ff13895f8e8066ae4a7,2024-06-20T12:44:01.637000 CVE-2024-38539,0,0,bb07b10cb8e27f63a4ad4d8d9f4efc546da28e9a77992ff13895f8e8066ae4a7,2024-06-20T12:44:01.637000
CVE-2024-3854,0,0,f383320435301230a2dac28bdc7db79c6e74ee12f38932e432ec4f2020fa918e,2024-07-03T02:06:46.110000 CVE-2024-3854,0,0,f383320435301230a2dac28bdc7db79c6e74ee12f38932e432ec4f2020fa918e,2024-07-03T02:06:46.110000
@ -253995,12 +253997,14 @@ CVE-2024-3916,0,0,67c028ed5cffa81651cfdb7590d8583ba32a4964953feede869ed8c9f6426e
CVE-2024-3917,0,0,87493362103f61e3758851588aca1cc3facb0cf1f97ad5b068e06e988e9b2161,2024-07-03T02:06:53.877000 CVE-2024-3917,0,0,87493362103f61e3758851588aca1cc3facb0cf1f97ad5b068e06e988e9b2161,2024-07-03T02:06:53.877000
CVE-2024-3918,0,0,f0312710b8f2207cc4daf3e960aa8906c7e8839f8babda55f2853fd4763a97f9,2024-05-24T01:15:30.977000 CVE-2024-3918,0,0,f0312710b8f2207cc4daf3e960aa8906c7e8839f8babda55f2853fd4763a97f9,2024-05-24T01:15:30.977000
CVE-2024-3920,0,0,5dbee28fbacc5f4bbc65481ff7f645499d60469b501d304207882ca441f74491,2024-05-24T01:15:30.977000 CVE-2024-3920,0,0,5dbee28fbacc5f4bbc65481ff7f645499d60469b501d304207882ca441f74491,2024-05-24T01:15:30.977000
CVE-2024-39206,0,1,f9fb00f1e181a34e546a4d02526b8d7182abaed8338954851ed4beadabf72272,2024-07-03T12:53:24.977000 CVE-2024-39206,0,0,f9fb00f1e181a34e546a4d02526b8d7182abaed8338954851ed4beadabf72272,2024-07-03T12:53:24.977000
CVE-2024-39207,0,0,d8e667b43b76095c528f5867a8617c4177e3d9ac8aefab820b7b82f9e44a4991,2024-06-28T10:27:00.920000 CVE-2024-39207,0,0,d8e667b43b76095c528f5867a8617c4177e3d9ac8aefab820b7b82f9e44a4991,2024-06-28T10:27:00.920000
CVE-2024-39208,0,0,bfca919135cb16c924d14a3e46a90c36fb45e8d6f50651e543c7c3b74462722a,2024-07-03T02:05:43.393000 CVE-2024-39208,0,0,bfca919135cb16c924d14a3e46a90c36fb45e8d6f50651e543c7c3b74462722a,2024-07-03T02:05:43.393000
CVE-2024-39209,0,0,846eb9e93730bd8a4e0e342a01db126b493a0877c61de0d40de722388e34129c,2024-06-28T10:27:00.920000 CVE-2024-39209,0,0,846eb9e93730bd8a4e0e342a01db126b493a0877c61de0d40de722388e34129c,2024-06-28T10:27:00.920000
CVE-2024-3921,0,0,dc44586c5c7e1c74f5850e7b4d244cf53da902f950a29ac6c4f232f966454542,2024-05-29T13:02:09.280000 CVE-2024-3921,0,0,dc44586c5c7e1c74f5850e7b4d244cf53da902f950a29ac6c4f232f966454542,2024-05-29T13:02:09.280000
CVE-2024-3922,0,0,9c35bb7d9bca4b5559bb1a4dfea91676bf1d098f4dc5952b2a109bcc30a68d2c,2024-06-13T18:36:09.010000 CVE-2024-3922,0,0,9c35bb7d9bca4b5559bb1a4dfea91676bf1d098f4dc5952b2a109bcc30a68d2c,2024-06-13T18:36:09.010000
CVE-2024-39220,1,1,ee539c7dd926c4141adfea89a293da82fc291d0c8bbf25ffc9e07f033b77b6dd,2024-07-03T15:15:05.993000
CVE-2024-39223,1,1,edd1c5b1f2e5387a540545af51f1838c7b3d17fcd3fbb559bc7e28e94aed9c4c,2024-07-03T15:15:06.083000
CVE-2024-3923,0,0,dcd7a979944a34edd9f4dd960691916feb4f3b194c37e215c41a761a1e13cac2,2024-05-14T16:11:39.510000 CVE-2024-3923,0,0,dcd7a979944a34edd9f4dd960691916feb4f3b194c37e215c41a761a1e13cac2,2024-05-14T16:11:39.510000
CVE-2024-39236,0,0,5bedffcf34ebde5608a8c6d0266193b958a561f9cfe93a597c1123eb6d56c52a,2024-07-03T02:05:44.203000 CVE-2024-39236,0,0,5bedffcf34ebde5608a8c6d0266193b958a561f9cfe93a597c1123eb6d56c52a,2024-07-03T02:05:44.203000
CVE-2024-3924,0,0,396cfe762c72fbd5a1960b1ddaed612b95d18abd602e0e4dd151e2967ca06c2d,2024-05-30T18:19:11.743000 CVE-2024-3924,0,0,396cfe762c72fbd5a1960b1ddaed612b95d18abd602e0e4dd151e2967ca06c2d,2024-05-30T18:19:11.743000
@ -254031,14 +254035,14 @@ CVE-2024-3931,0,0,ff26b5a8728d6a7f3e1f8095f9d431d98f0c624577950ceaf4dc1cf9ad6880
CVE-2024-39310,0,0,187be4dc945171a7657d1459e6c80fed53aa1f7d448ef02205a5dc997f08bebc,2024-07-02T12:09:16.907000 CVE-2024-39310,0,0,187be4dc945171a7657d1459e6c80fed53aa1f7d448ef02205a5dc997f08bebc,2024-07-02T12:09:16.907000
CVE-2024-39313,0,0,9e833554bfb77c34493fd31ffb1eaf0ef9773e2886372005ffb0d80f9a99cb5e,2024-07-02T12:09:16.907000 CVE-2024-39313,0,0,9e833554bfb77c34493fd31ffb1eaf0ef9773e2886372005ffb0d80f9a99cb5e,2024-07-02T12:09:16.907000
CVE-2024-39314,0,0,f08a68c1585aac53ed3340b30b7ca1fee7f99b287e34df66dd62620bc6eee2c4,2024-07-02T12:09:16.907000 CVE-2024-39314,0,0,f08a68c1585aac53ed3340b30b7ca1fee7f99b287e34df66dd62620bc6eee2c4,2024-07-02T12:09:16.907000
CVE-2024-39315,0,1,a63beff0a6cc21a12673e8ba65716d45b6c52abc54b22460a729ebfe04cdda63,2024-07-03T12:53:24.977000 CVE-2024-39315,0,0,a63beff0a6cc21a12673e8ba65716d45b6c52abc54b22460a729ebfe04cdda63,2024-07-03T12:53:24.977000
CVE-2024-39316,0,0,d47aca3c5197170fc8f05033ffa682fd40e1aa1436fadb43bcca23faeaecd5c8,2024-07-02T17:44:45.700000 CVE-2024-39316,0,0,d47aca3c5197170fc8f05033ffa682fd40e1aa1436fadb43bcca23faeaecd5c8,2024-07-02T17:44:45.700000
CVE-2024-3932,0,0,371291a71f9c99e371f96e7d7b61e3e11967567047c07fae80310c4772d1c0c7,2024-06-06T20:15:14.030000 CVE-2024-3932,0,0,371291a71f9c99e371f96e7d7b61e3e11967567047c07fae80310c4772d1c0c7,2024-06-06T20:15:14.030000
CVE-2024-39322,0,1,708cd5de8c07f904d1ba83d6367c23eacb2b2cf3f907adf630b27179cc7d25d8,2024-07-03T12:53:24.977000 CVE-2024-39322,0,0,708cd5de8c07f904d1ba83d6367c23eacb2b2cf3f907adf630b27179cc7d25d8,2024-07-03T12:53:24.977000
CVE-2024-39323,0,0,8b592e233643a568789a282215e3d651e9257e7274946ce7dfcbad9339346353,2024-07-02T17:44:45.700000 CVE-2024-39323,0,0,8b592e233643a568789a282215e3d651e9257e7274946ce7dfcbad9339346353,2024-07-02T17:44:45.700000
CVE-2024-39324,0,1,75a65563a1468710cdae5af44a5e63fb7b35b0a6c50055f03af94f2ccbf33c01,2024-07-03T12:53:24.977000 CVE-2024-39324,0,0,75a65563a1468710cdae5af44a5e63fb7b35b0a6c50055f03af94f2ccbf33c01,2024-07-03T12:53:24.977000
CVE-2024-39325,0,1,014e4593e1f5768db5ed0f4f9796d958998c433eda4ad78f248afb017315aecf,2024-07-03T12:53:24.977000 CVE-2024-39325,0,0,014e4593e1f5768db5ed0f4f9796d958998c433eda4ad78f248afb017315aecf,2024-07-03T12:53:24.977000
CVE-2024-39326,0,1,967fc66349db0f6c5363f95a2959465d03482ebce2b1293649c92ff8d8a8034a,2024-07-03T12:53:24.977000 CVE-2024-39326,0,0,967fc66349db0f6c5363f95a2959465d03482ebce2b1293649c92ff8d8a8034a,2024-07-03T12:53:24.977000
CVE-2024-3933,0,0,1d08d4e317596700be65ef5300f76b449794bb2d8b1542a98c34b9cd74fea015,2024-05-28T12:39:28.377000 CVE-2024-3933,0,0,1d08d4e317596700be65ef5300f76b449794bb2d8b1542a98c34b9cd74fea015,2024-05-28T12:39:28.377000
CVE-2024-39331,0,0,e27921e016dec51173f86ad420de9e9174de4baa540da3f53e6e1157ef72adc9,2024-07-03T02:05:47.260000 CVE-2024-39331,0,0,e27921e016dec51173f86ad420de9e9174de4baa540da3f53e6e1157ef72adc9,2024-07-03T02:05:47.260000
CVE-2024-39334,0,0,7a242c73a28ed17874e43348a26da2104869d7ef8d91c48fe0d8d7e00f57c31d,2024-06-24T12:57:36.513000 CVE-2024-39334,0,0,7a242c73a28ed17874e43348a26da2104869d7ef8d91c48fe0d8d7e00f57c31d,2024-06-24T12:57:36.513000
@ -254049,9 +254053,9 @@ CVE-2024-39349,0,0,e2c0ea0897db587383c2ec6939a8e8f30324733a4c2be5e6f6d88b1c64f32
CVE-2024-39350,0,0,2818f75b3d24495902c39d5dd3d46a13088a057469d774fcd7dea3e2c6f7b648,2024-06-28T10:27:00.920000 CVE-2024-39350,0,0,2818f75b3d24495902c39d5dd3d46a13088a057469d774fcd7dea3e2c6f7b648,2024-06-28T10:27:00.920000
CVE-2024-39351,0,0,73835562ac8c8f624018ac3f57736429a15ab60f19fdda354656ce6bebf2a36c,2024-06-28T10:27:00.920000 CVE-2024-39351,0,0,73835562ac8c8f624018ac3f57736429a15ab60f19fdda354656ce6bebf2a36c,2024-06-28T10:27:00.920000
CVE-2024-39352,0,0,a6ac4cc6df4e978ab98d2526b0d0ca42ad6af92292b36fb34063680949363975,2024-06-28T10:27:00.920000 CVE-2024-39352,0,0,a6ac4cc6df4e978ab98d2526b0d0ca42ad6af92292b36fb34063680949363975,2024-06-28T10:27:00.920000
CVE-2024-39353,0,1,dee41995885732d5f01d40a8c0c8c8774900d0671d3f357636f60643bdb33d7a,2024-07-03T12:53:24.977000 CVE-2024-39353,0,0,dee41995885732d5f01d40a8c0c8c8774900d0671d3f357636f60643bdb33d7a,2024-07-03T12:53:24.977000
CVE-2024-3936,0,0,1a9ebdb5653b792bdb8abb0138184d539d6d0e0c9af8da519de630a92cc0aee0,2024-05-02T18:00:37.360000 CVE-2024-3936,0,0,1a9ebdb5653b792bdb8abb0138184d539d6d0e0c9af8da519de630a92cc0aee0,2024-05-02T18:00:37.360000
CVE-2024-39361,0,1,0c97fb023368f7ebdede00eba9599cd831fbc033a414f99280ed3ea4b7636734,2024-07-03T12:53:24.977000 CVE-2024-39361,0,0,0c97fb023368f7ebdede00eba9599cd831fbc033a414f99280ed3ea4b7636734,2024-07-03T12:53:24.977000
CVE-2024-39362,0,0,a4e72d457ad79497d234146ef4f9a3e9f07fed3f9039766cdc9d7026e27b2016,2024-07-02T20:15:06.353000 CVE-2024-39362,0,0,a4e72d457ad79497d234146ef4f9a3e9f07fed3f9039766cdc9d7026e27b2016,2024-07-02T20:15:06.353000
CVE-2024-3937,0,0,47b49a69bcae07617978c4de23b5bd0d4eef565a4a3d61421481625d7a4abea5,2024-05-29T13:02:09.280000 CVE-2024-3937,0,0,47b49a69bcae07617978c4de23b5bd0d4eef565a4a3d61421481625d7a4abea5,2024-05-29T13:02:09.280000
CVE-2024-39371,0,0,8c1a1238e769d76e82e2c2cc608bc61bb27789621e5380cf2965b3d5a5e744e4,2024-06-25T18:50:42.040000 CVE-2024-39371,0,0,8c1a1238e769d76e82e2c2cc608bc61bb27789621e5380cf2965b3d5a5e744e4,2024-06-25T18:50:42.040000
@ -254103,7 +254107,7 @@ CVE-2024-3967,0,0,b2af76e65b0ac2fff588b8ab332f0978e5b083cdcdd41f3fd643403fe236fa
CVE-2024-3968,0,0,cdd73cfcec56ac4302e4eb4a932f862086b9a3ed46ed5ff92d17197e11553e8f,2024-05-15T18:35:11.453000 CVE-2024-3968,0,0,cdd73cfcec56ac4302e4eb4a932f862086b9a3ed46ed5ff92d17197e11553e8f,2024-05-15T18:35:11.453000
CVE-2024-3969,0,0,793622b6641cb8c2dc34802adf1ab9ece645cce7d321b9faf1a6b76d5e28ec78,2024-05-28T17:11:55.903000 CVE-2024-3969,0,0,793622b6641cb8c2dc34802adf1ab9ece645cce7d321b9faf1a6b76d5e28ec78,2024-05-28T17:11:55.903000
CVE-2024-3970,0,0,a6d2ad116e736372d8ee0cd28cd0cbfef25f3ce953ea92bdb2b1ac922e65eedf,2024-05-15T18:35:11.453000 CVE-2024-3970,0,0,a6d2ad116e736372d8ee0cd28cd0cbfef25f3ce953ea92bdb2b1ac922e65eedf,2024-05-15T18:35:11.453000
CVE-2024-39704,0,0,46d48385d4d162b3ac12c54e9ccb839ccae9f35d96e3edd9d9bfd3968e019316,2024-06-28T13:38:47.077000 CVE-2024-39704,0,1,1d59c065d69d465eb86bf6114b5299aaf44c728f69d6748df6b6bd65077d4590,2024-07-03T14:32:56.510000
CVE-2024-39705,0,0,91d39f33d5bd2d9618d124407e406b5aefb3921b0f0d526c128476a4653583c8,2024-07-03T02:05:51.507000 CVE-2024-39705,0,0,91d39f33d5bd2d9618d124407e406b5aefb3921b0f0d526c128476a4653583c8,2024-07-03T02:05:51.507000
CVE-2024-39708,0,0,111516979aea28b8e657aa098e90e19a44667358e9b94bc0cc0d55aace553cee,2024-06-28T10:27:00.920000 CVE-2024-39708,0,0,111516979aea28b8e657aa098e90e19a44667358e9b94bc0cc0d55aace553cee,2024-06-28T10:27:00.920000
CVE-2024-3971,0,0,1320cc801330d2d12e5c1ffdfdf6be7f25a4100ca447a2f7a5815c90f2431f60,2024-06-17T12:42:04.623000 CVE-2024-3971,0,0,1320cc801330d2d12e5c1ffdfdf6be7f25a4100ca447a2f7a5815c90f2431f60,2024-06-17T12:42:04.623000
@ -254112,9 +254116,9 @@ CVE-2024-3974,0,0,30b94b89b01dd2c6057362330f67dc78937f3f3edffa0c5a57e7602f711f91
CVE-2024-3977,0,0,e9f44416847592725fc2cd47ffed9c743bca75989a5c2d940c73903d22d68b79,2024-06-17T12:42:04.623000 CVE-2024-3977,0,0,e9f44416847592725fc2cd47ffed9c743bca75989a5c2d940c73903d22d68b79,2024-06-17T12:42:04.623000
CVE-2024-3978,0,0,338ec55d360d0ecf1dfe595690a2d37e24aa4129fa5a75aae324bfa31cd2fe9a,2024-06-17T12:42:04.623000 CVE-2024-3978,0,0,338ec55d360d0ecf1dfe595690a2d37e24aa4129fa5a75aae324bfa31cd2fe9a,2024-06-17T12:42:04.623000
CVE-2024-3979,0,0,4ac2126fe63098861061c1ed3772b0712449f42e64a5481492de94fd61a5b947,2024-06-06T20:15:14.127000 CVE-2024-3979,0,0,4ac2126fe63098861061c1ed3772b0712449f42e64a5481492de94fd61a5b947,2024-06-06T20:15:14.127000
CVE-2024-39807,0,1,07c386020311e145a20dcae00a754aea7481144e104f9b99b56a5a82372beea8,2024-07-03T12:53:24.977000 CVE-2024-39807,0,0,07c386020311e145a20dcae00a754aea7481144e104f9b99b56a5a82372beea8,2024-07-03T12:53:24.977000
CVE-2024-39828,0,0,a076e079a0d15f60c3c4a55d02ae6ed731ea38682b9215046585ce79ae4cfb80,2024-07-01T12:37:24.220000 CVE-2024-39828,0,0,a076e079a0d15f60c3c4a55d02ae6ed731ea38682b9215046585ce79ae4cfb80,2024-07-01T12:37:24.220000
CVE-2024-39830,0,1,215aa5fd15609846dfbec6cfbf9cc2bf59b25eefbdaea3ac7fa164cf6842c628,2024-07-03T12:53:24.977000 CVE-2024-39830,0,0,215aa5fd15609846dfbec6cfbf9cc2bf59b25eefbdaea3ac7fa164cf6842c628,2024-07-03T12:53:24.977000
CVE-2024-3984,0,0,bee410e9bf0342c5ecf3886d76050e2314329db97e17f53f9285ff32a0d9ee8f,2024-06-20T12:44:01.637000 CVE-2024-3984,0,0,bee410e9bf0342c5ecf3886d76050e2314329db97e17f53f9285ff32a0d9ee8f,2024-06-20T12:44:01.637000
CVE-2024-39840,0,0,5d7e4142131887a411bdbeea93ed887c2e0abb0654faa364c29fef4ac994d185,2024-07-03T02:05:52.307000 CVE-2024-39840,0,0,5d7e4142131887a411bdbeea93ed887c2e0abb0654faa364c29fef4ac994d185,2024-07-03T02:05:52.307000
CVE-2024-39846,0,0,cc3d14fb15e20c985bb7fdeb359e7a12ea1918f79b7c4c3ac03373ad528c69cf,2024-07-01T12:37:24.220000 CVE-2024-39846,0,0,cc3d14fb15e20c985bb7fdeb359e7a12ea1918f79b7c4c3ac03373ad528c69cf,2024-07-01T12:37:24.220000
@ -254126,17 +254130,17 @@ CVE-2024-39878,0,0,038c252a5df59aef0ff494dd466e8c23160164cb5ac894aeb1a33e06001b7
CVE-2024-39879,0,0,1b030ce3798bca0bad33a3937cca95b776786d7918bf02f25bff668e667acaa0,2024-07-02T12:09:16.907000 CVE-2024-39879,0,0,1b030ce3798bca0bad33a3937cca95b776786d7918bf02f25bff668e667acaa0,2024-07-02T12:09:16.907000
CVE-2024-3988,0,0,ed49ad0e503298ba2fe40c90a665a86dcb918b5087ac61c1edfd746c2ca95d24,2024-04-25T13:18:13.537000 CVE-2024-3988,0,0,ed49ad0e503298ba2fe40c90a665a86dcb918b5087ac61c1edfd746c2ca95d24,2024-04-25T13:18:13.537000
CVE-2024-3989,0,0,41a6b1dcae0354fb8cba40366dc7ed1eeb84d6a6a33689c35123198fe63c8f01,2024-05-14T16:11:39.510000 CVE-2024-3989,0,0,41a6b1dcae0354fb8cba40366dc7ed1eeb84d6a6a33689c35123198fe63c8f01,2024-05-14T16:11:39.510000
CVE-2024-39891,0,1,41ce53dbbcfb923c73770e761bd2bd927865451911c7f7e17390a498d286d470,2024-07-03T12:53:24.977000 CVE-2024-39891,0,0,41ce53dbbcfb923c73770e761bd2bd927865451911c7f7e17390a498d286d470,2024-07-03T12:53:24.977000
CVE-2024-39894,0,1,c61bb2661100853548279e349e76a635cba102e2f9a2c3076410b71ec944a6f0,2024-07-03T13:15:02.890000 CVE-2024-39894,0,0,c61bb2661100853548279e349e76a635cba102e2f9a2c3076410b71ec944a6f0,2024-07-03T13:15:02.890000
CVE-2024-3990,0,0,7879115af68e1891db08bd2dafc44fb55db15680f59885de2ed87fd5c16d9492,2024-05-14T16:11:39.510000 CVE-2024-3990,0,0,7879115af68e1891db08bd2dafc44fb55db15680f59885de2ed87fd5c16d9492,2024-05-14T16:11:39.510000
CVE-2024-3991,0,0,f4b27e31b2ebe06401478accd9d85264142bf207d27ef139c240399354705c4f,2024-05-02T18:00:37.360000 CVE-2024-3991,0,0,f4b27e31b2ebe06401478accd9d85264142bf207d27ef139c240399354705c4f,2024-05-02T18:00:37.360000
CVE-2024-3992,0,0,ff644523dcb07d662c2bf53b9e125872cf5c9b9df16e03b5f8dec25363b303ae,2024-06-17T12:42:04.623000 CVE-2024-3992,0,0,ff644523dcb07d662c2bf53b9e125872cf5c9b9df16e03b5f8dec25363b303ae,2024-06-17T12:42:04.623000
CVE-2024-39920,0,1,8281f1288058876e172a78a04b7e10123b671826d2c29ba249d059d614d38347,2024-07-03T12:53:24.977000 CVE-2024-39920,0,0,8281f1288058876e172a78a04b7e10123b671826d2c29ba249d059d614d38347,2024-07-03T12:53:24.977000
CVE-2024-3993,0,0,a2f94f13d02cfe8603a71433706e6cc2c5ad0c0e3e2fd5d51c299cf3fc301a73,2024-07-03T02:06:58.160000 CVE-2024-3993,0,0,a2f94f13d02cfe8603a71433706e6cc2c5ad0c0e3e2fd5d51c299cf3fc301a73,2024-07-03T02:06:58.160000
CVE-2024-3994,0,0,292539249e741e7003c555a5d4fa2182b15a01b393fb04fa15e675750c01906e,2024-04-25T13:18:02.660000 CVE-2024-3994,0,0,292539249e741e7003c555a5d4fa2182b15a01b393fb04fa15e675750c01906e,2024-04-25T13:18:02.660000
CVE-2024-3995,0,0,a7fe690817691037765b680c602849c2a36e767bb2849159693fe5a7864f46cb,2024-07-01T14:15:05.680000 CVE-2024-3995,0,0,a7fe690817691037765b680c602849c2a36e767bb2849159693fe5a7864f46cb,2024-07-01T14:15:05.680000
CVE-2024-3997,0,0,507ae8762d75f9d68eda75aa3a6fbbaf1b3579404dfa0ecd9f2978d2aa87a55f,2024-05-24T01:15:30.977000 CVE-2024-3997,0,0,507ae8762d75f9d68eda75aa3a6fbbaf1b3579404dfa0ecd9f2978d2aa87a55f,2024-05-24T01:15:30.977000
CVE-2024-3999,0,0,d855e263f238cc0580530dcbe41b732e5a7fc792eec652c4279dc80589279eed,2024-07-03T02:06:58.680000 CVE-2024-3999,0,1,4248dd2372447004bc43614b1896e27a040049c0dba411de9512ee0e6f816fb7,2024-07-03T15:44:56.130000
CVE-2024-4000,0,0,63e68b686bb1abbdcd2ddeab613f2e83d1883c904c164f21a1076ada49583fc9,2024-05-02T18:00:37.360000 CVE-2024-4000,0,0,63e68b686bb1abbdcd2ddeab613f2e83d1883c904c164f21a1076ada49583fc9,2024-05-02T18:00:37.360000
CVE-2024-4001,0,0,01ff67c0d3df1be38408b913fb09a0fa8e839c64a815c3de41b48a61aa2ae8cb,2024-06-11T17:27:53.637000 CVE-2024-4001,0,0,01ff67c0d3df1be38408b913fb09a0fa8e839c64a815c3de41b48a61aa2ae8cb,2024-06-11T17:27:53.637000
CVE-2024-4003,0,0,9b9be828f15a04db891b79e7c6ebf75d000360176e249e61f2acbb014741196d,2024-05-02T18:00:37.360000 CVE-2024-4003,0,0,9b9be828f15a04db891b79e7c6ebf75d000360176e249e61f2acbb014741196d,2024-05-02T18:00:37.360000
@ -254524,7 +254528,7 @@ CVE-2024-4478,0,0,31a4a4c48861c0c170c939e3aa0b10661ec97e9653465707919926dbd35951
CVE-2024-4479,0,0,5ea4f16cbb65b856fd1892d7f18a0653a4e499cdb8b18f25028aa3d91283004d,2024-06-17T12:42:04.623000 CVE-2024-4479,0,0,5ea4f16cbb65b856fd1892d7f18a0653a4e499cdb8b18f25028aa3d91283004d,2024-06-17T12:42:04.623000
CVE-2024-4480,0,0,585ced159bf2873044aaa034a55a2124aa433419daa101a5837cc3efb9afe316,2024-06-17T12:42:04.623000 CVE-2024-4480,0,0,585ced159bf2873044aaa034a55a2124aa433419daa101a5837cc3efb9afe316,2024-06-17T12:42:04.623000
CVE-2024-4481,0,0,7ecf88f2a22a659849266bdc0bd40c464d195e3dafdf490c58869a301c87572b,2024-05-14T16:11:39.510000 CVE-2024-4481,0,0,7ecf88f2a22a659849266bdc0bd40c464d195e3dafdf490c58869a301c87572b,2024-05-14T16:11:39.510000
CVE-2024-4482,0,1,eefc183aff4d36a44c2b3a173766fba4bf4f7bbebf2739a2af7c403553ee5888,2024-07-03T12:53:24.977000 CVE-2024-4482,0,0,eefc183aff4d36a44c2b3a173766fba4bf4f7bbebf2739a2af7c403553ee5888,2024-07-03T12:53:24.977000
CVE-2024-4484,0,0,72c4859b8727b60eeb9f8012483883c0571b4cb8b1cb2ce9a8b1f5e495641e3c,2024-05-24T13:03:05.093000 CVE-2024-4484,0,0,72c4859b8727b60eeb9f8012483883c0571b4cb8b1cb2ce9a8b1f5e495641e3c,2024-05-24T13:03:05.093000
CVE-2024-4485,0,0,856a7368e5f121163f839e4b6c92a8e77de213c5eccf98592455e970e028d37d,2024-05-24T13:03:05.093000 CVE-2024-4485,0,0,856a7368e5f121163f839e4b6c92a8e77de213c5eccf98592455e970e028d37d,2024-05-24T13:03:05.093000
CVE-2024-4486,0,0,da9bfd47ef59b3a57d52a6c66bb31a65c305ed47bc1cc335b2b3ca5ab24769e0,2024-05-24T01:15:30.977000 CVE-2024-4486,0,0,da9bfd47ef59b3a57d52a6c66bb31a65c305ed47bc1cc335b2b3ca5ab24769e0,2024-05-24T01:15:30.977000
@ -254584,7 +254588,7 @@ CVE-2024-4539,0,0,83e8dd6ad2ba7f5df744ac27f19ba7dd20f88687370090b4e13c20c65e81aa
CVE-2024-4540,0,0,dc537153d649e10b7c874b04ae96fc2345a92f4b276e017e0d8b384efb35ed61,2024-06-03T23:15:08.930000 CVE-2024-4540,0,0,dc537153d649e10b7c874b04ae96fc2345a92f4b276e017e0d8b384efb35ed61,2024-06-03T23:15:08.930000
CVE-2024-4541,0,0,4a3da304d2331b57d3e541aebfe20ad4a144b63766e310ccc54304f1be43b1dd,2024-06-20T12:44:01.637000 CVE-2024-4541,0,0,4a3da304d2331b57d3e541aebfe20ad4a144b63766e310ccc54304f1be43b1dd,2024-06-20T12:44:01.637000
CVE-2024-4542,0,0,d17f875757344f90ad0b6ea46d223a5444286908c9043b3fba1504d3883c4c6d,2024-05-16T14:15:08.980000 CVE-2024-4542,0,0,d17f875757344f90ad0b6ea46d223a5444286908c9043b3fba1504d3883c4c6d,2024-05-16T14:15:08.980000
CVE-2024-4543,0,1,69391ca27ea6f73754fb8fe52f104143168f4fbeb7d93137e3866d4e169f292e,2024-07-03T12:53:24.977000 CVE-2024-4543,0,0,69391ca27ea6f73754fb8fe52f104143168f4fbeb7d93137e3866d4e169f292e,2024-07-03T12:53:24.977000
CVE-2024-4544,0,0,5a154bb8f5362adfa7d1d9ca8e07fcce2012291bc3a87e95a1b546af1c241c8c,2024-05-24T13:03:11.993000 CVE-2024-4544,0,0,5a154bb8f5362adfa7d1d9ca8e07fcce2012291bc3a87e95a1b546af1c241c8c,2024-05-24T13:03:11.993000
CVE-2024-4545,0,0,6a8513e5f42227bdebff4b9eb7cd99ee2da82484e9d02165945026400c877f9c,2024-05-14T16:11:39.510000 CVE-2024-4545,0,0,6a8513e5f42227bdebff4b9eb7cd99ee2da82484e9d02165945026400c877f9c,2024-05-14T16:11:39.510000
CVE-2024-4546,0,0,3d8214b19328ce0698128d2541020c31eac589ba32f1eccefac58acec39f32be,2024-05-16T13:03:05.353000 CVE-2024-4546,0,0,3d8214b19328ce0698128d2541020c31eac589ba32f1eccefac58acec39f32be,2024-05-16T13:03:05.353000
@ -254657,7 +254661,7 @@ CVE-2024-4622,0,0,4b1992fe33b227c66e64bdd4cf1c71e31b73a98abda6bdd8e7687e0db4e861
CVE-2024-4623,0,0,47ffc2e7580d30150a9d70c6a59a76ed1e3bc3dd5141525204779a13dc1a77fb,2024-06-20T12:44:01.637000 CVE-2024-4623,0,0,47ffc2e7580d30150a9d70c6a59a76ed1e3bc3dd5141525204779a13dc1a77fb,2024-06-20T12:44:01.637000
CVE-2024-4624,0,0,2a601b2b9934f4e4184c90fc3ba9cbddeec712a59701e0372ed6d18cfcc3b7c7,2024-05-14T19:17:55.627000 CVE-2024-4624,0,0,2a601b2b9934f4e4184c90fc3ba9cbddeec712a59701e0372ed6d18cfcc3b7c7,2024-05-14T19:17:55.627000
CVE-2024-4626,0,0,f72dde4d01fdccbcae8f7fa43d1f4fdba6634ccf9a4eedc330d8e157eccf8120,2024-06-20T12:43:25.663000 CVE-2024-4626,0,0,f72dde4d01fdccbcae8f7fa43d1f4fdba6634ccf9a4eedc330d8e157eccf8120,2024-06-20T12:43:25.663000
CVE-2024-4627,0,0,54bd30bead354294b48fe249d643bc73bcc7d1380abeeb01ca2b741806fe2836,2024-07-03T02:07:51.527000 CVE-2024-4627,0,1,a94951b310ac8fa22dfdfb5dfa1a6f0b0e4706e2176059eb33a39431470f56d3,2024-07-03T15:45:08.187000
CVE-2024-4630,0,0,f5808b44be131bdae6b6920228d425b0dd235ef4afe8685cc2ea30d538a619f5,2024-05-14T16:11:39.510000 CVE-2024-4630,0,0,f5808b44be131bdae6b6920228d425b0dd235ef4afe8685cc2ea30d538a619f5,2024-05-14T16:11:39.510000
CVE-2024-4631,0,0,e8ed3d07eca49fd9ce5a62406bcf23da9793cbcc792a956665a267b4f25fd693,2024-05-14T15:44:13.487000 CVE-2024-4631,0,0,e8ed3d07eca49fd9ce5a62406bcf23da9793cbcc792a956665a267b4f25fd693,2024-05-14T15:44:13.487000
CVE-2024-4632,0,0,34df16eb26fbe037cb544d7499c4d02f03b9e69baf43a3990c97609a249304ed,2024-06-20T12:44:01.637000 CVE-2024-4632,0,0,34df16eb26fbe037cb544d7499c4d02f03b9e69baf43a3990c97609a249304ed,2024-06-20T12:44:01.637000
@ -254723,7 +254727,7 @@ CVE-2024-4704,0,0,9637a93e192a5f32142e05687e31ff3688b029254561fc4728d18bbfa1666d
CVE-2024-4705,0,0,b45f335ad46575e30510e82573f02b490faa16d9b6ee89b66a9844ff390b53aa,2024-06-06T14:17:35.017000 CVE-2024-4705,0,0,b45f335ad46575e30510e82573f02b490faa16d9b6ee89b66a9844ff390b53aa,2024-06-06T14:17:35.017000
CVE-2024-4706,0,0,a959e13293b1a5966007eb60c79cb973f34e4d1d8bd1c12986cac54d81ac9a3d,2024-05-24T01:15:30.977000 CVE-2024-4706,0,0,a959e13293b1a5966007eb60c79cb973f34e4d1d8bd1c12986cac54d81ac9a3d,2024-05-24T01:15:30.977000
CVE-2024-4707,0,0,d6a01a1a459dfd9ab21945d56af40919cce44b311e282118c993194b130db955,2024-06-06T14:17:35.017000 CVE-2024-4707,0,0,d6a01a1a459dfd9ab21945d56af40919cce44b311e282118c993194b130db955,2024-06-06T14:17:35.017000
CVE-2024-4708,0,1,8cec8d3c98f03426276473bd86d4c40854969a664eb1a1ad68a38c039fa7f150,2024-07-03T12:53:24.977000 CVE-2024-4708,0,0,8cec8d3c98f03426276473bd86d4c40854969a664eb1a1ad68a38c039fa7f150,2024-07-03T12:53:24.977000
CVE-2024-4709,0,0,c27b22c30c2569acd5c758eb82bd584c5ae09da5862ed28e288bc8b8f592259a,2024-05-20T13:00:34.807000 CVE-2024-4709,0,0,c27b22c30c2569acd5c758eb82bd584c5ae09da5862ed28e288bc8b8f592259a,2024-05-20T13:00:34.807000
CVE-2024-4710,0,0,500a7d3af356181a474ebd9523b50fd3ae653f9a07ad01e5b7699589bd4ccc5d,2024-05-21T12:37:59.687000 CVE-2024-4710,0,0,500a7d3af356181a474ebd9523b50fd3ae653f9a07ad01e5b7699589bd4ccc5d,2024-05-21T12:37:59.687000
CVE-2024-4711,0,0,5c0c1fdafdfc7c3555551e67a6280882d1277b637b3ccb31a4bc6994c2c7441c,2024-06-03T14:46:24.250000 CVE-2024-4711,0,0,5c0c1fdafdfc7c3555551e67a6280882d1277b637b3ccb31a4bc6994c2c7441c,2024-06-03T14:46:24.250000
@ -255224,7 +255228,7 @@ CVE-2024-5345,0,0,6eb378e53e73ecd765d027e2916fd67b3a9d8ae24f673780d53a54e981925c
CVE-2024-5346,0,0,c05bf26dcfcb17ea5e2642ece4ffc41fdd320d61cead8cd0f113cb8dff16ff08,2024-06-24T20:00:59.240000 CVE-2024-5346,0,0,c05bf26dcfcb17ea5e2642ece4ffc41fdd320d61cead8cd0f113cb8dff16ff08,2024-06-24T20:00:59.240000
CVE-2024-5347,0,0,1da2ccb898789a7c7262d2aa6524b222bbe92ed9796804e25855dd4dd20a5fae,2024-05-31T13:01:46.727000 CVE-2024-5347,0,0,1da2ccb898789a7c7262d2aa6524b222bbe92ed9796804e25855dd4dd20a5fae,2024-05-31T13:01:46.727000
CVE-2024-5348,0,0,cdabb7de233f48a7127c4333bb3ba86c3b13ada38da5d506ab1226337e3a511b,2024-06-03T14:46:24.250000 CVE-2024-5348,0,0,cdabb7de233f48a7127c4333bb3ba86c3b13ada38da5d506ab1226337e3a511b,2024-06-03T14:46:24.250000
CVE-2024-5349,0,0,d9c1031fed50c00ff212f0d63c2d8a2e426ecf9d35b8f18b93d3efe678c116af,2024-07-02T12:09:16.907000 CVE-2024-5349,0,1,095035450c60a13c08898917421d5656b2399179b1253e40806dcf47c3a4d9f7,2024-07-03T15:44:23.807000
CVE-2024-5350,0,0,60bbd22831ddecb115d40713a9dc768f9983e70563a63aa9f7486c68fbd4f9e1,2024-05-28T12:39:42.673000 CVE-2024-5350,0,0,60bbd22831ddecb115d40713a9dc768f9983e70563a63aa9f7486c68fbd4f9e1,2024-05-28T12:39:42.673000
CVE-2024-5351,0,0,849c563f6a9785a6decafe5b39b97f8dd3babada31dd9f1d8018a42e31dcbe7f,2024-06-04T19:21:05.570000 CVE-2024-5351,0,0,849c563f6a9785a6decafe5b39b97f8dd3babada31dd9f1d8018a42e31dcbe7f,2024-06-04T19:21:05.570000
CVE-2024-5352,0,0,8e62b3751e48149af890214c9d6b69b191b794c04287005ea69e03ffcccdf095,2024-06-21T18:15:11.303000 CVE-2024-5352,0,0,8e62b3751e48149af890214c9d6b69b191b794c04287005ea69e03ffcccdf095,2024-06-21T18:15:11.303000
@ -255288,7 +255292,7 @@ CVE-2024-5413,0,0,7e9a221441ea2188d01aa42e534f11d3e951030583aa76eb413a65755ac241
CVE-2024-5414,0,0,faf8733c0a06d2e39229c90d7881f5076ce30b09e5d94ecd5fd2768bd6a1a3f5,2024-05-28T14:59:09.827000 CVE-2024-5414,0,0,faf8733c0a06d2e39229c90d7881f5076ce30b09e5d94ecd5fd2768bd6a1a3f5,2024-05-28T14:59:09.827000
CVE-2024-5415,0,0,e615267af075200e8a68eba737ca986180838ab470ec27ba44066223fc68c93f,2024-05-28T14:59:09.827000 CVE-2024-5415,0,0,e615267af075200e8a68eba737ca986180838ab470ec27ba44066223fc68c93f,2024-05-28T14:59:09.827000
CVE-2024-5418,0,0,34559e586e07e049a8a9a117bb9e7e6c096f39aba1e2b0a8b270afaa7cae4590,2024-05-31T13:01:46.727000 CVE-2024-5418,0,0,34559e586e07e049a8a9a117bb9e7e6c096f39aba1e2b0a8b270afaa7cae4590,2024-05-31T13:01:46.727000
CVE-2024-5419,0,0,ca56ebdbe0bec4ab68fa7131037a346882d6a83fcd3b933da3e72484dcb3a1c7,2024-07-02T12:09:16.907000 CVE-2024-5419,0,1,0d1c725f53c48278ea7823202c4adf24cf8a04c4aff5d8363f101c1d9f2798db,2024-07-03T15:43:09.450000
CVE-2024-5420,0,0,222f60409f504903340df1620dc6c61965c58fdcf056b93ed6f6eb922650d2fa,2024-06-10T18:15:38.367000 CVE-2024-5420,0,0,222f60409f504903340df1620dc6c61965c58fdcf056b93ed6f6eb922650d2fa,2024-06-10T18:15:38.367000
CVE-2024-5421,0,0,eeaae547052b8ba8c3bcc84128ffe19889621e4502681053a6fefc5f154f36a9,2024-06-10T18:15:38.447000 CVE-2024-5421,0,0,eeaae547052b8ba8c3bcc84128ffe19889621e4502681053a6fefc5f154f36a9,2024-06-10T18:15:38.447000
CVE-2024-5422,0,0,e03ce382c526ecd3bfff8f1e460f72d6c4cd6a77ce94308cc520da1bff4b9a65,2024-06-10T18:15:38.520000 CVE-2024-5422,0,0,e03ce382c526ecd3bfff8f1e460f72d6c4cd6a77ce94308cc520da1bff4b9a65,2024-06-10T18:15:38.520000
@ -255401,7 +255405,7 @@ CVE-2024-5598,0,0,dea97cf43130ffc7ec8c1e0439cc4a1d595d430c970e2a6bb452f71273924c
CVE-2024-5599,0,0,e4d8d3217ca804a33354b51b54e1f3f41ce0e1fc1f554dedfe90ad1a46a87370,2024-06-11T18:24:39.057000 CVE-2024-5599,0,0,e4d8d3217ca804a33354b51b54e1f3f41ce0e1fc1f554dedfe90ad1a46a87370,2024-06-11T18:24:39.057000
CVE-2024-5601,0,0,e22064ef868b7763ab6a035a66dc94fbf47f776f059b7b471d5873c49e582f7a,2024-06-28T13:25:40.677000 CVE-2024-5601,0,0,e22064ef868b7763ab6a035a66dc94fbf47f776f059b7b471d5873c49e582f7a,2024-06-28T13:25:40.677000
CVE-2024-5605,0,0,4bb70fac398eb5e1fc6a3b8761dcfee9993510711b196c5d9f90dc1e34c785a3,2024-06-20T12:43:25.663000 CVE-2024-5605,0,0,4bb70fac398eb5e1fc6a3b8761dcfee9993510711b196c5d9f90dc1e34c785a3,2024-06-20T12:43:25.663000
CVE-2024-5606,0,0,67661dfc366570a7697ddfbe211235e18c34fcd62cf069ffa21e3dabe87c16a5,2024-07-02T12:09:16.907000 CVE-2024-5606,0,1,77ca044404d627b5230fd0abf899745b4715aa4e19e52966299c5c3e2cb213db,2024-07-03T15:45:19.513000
CVE-2024-5607,0,0,9601597658129a089207c1a0e7e7267aceda952302ad39754d738e7307549543,2024-06-07T14:56:05.647000 CVE-2024-5607,0,0,9601597658129a089207c1a0e7e7267aceda952302ad39754d738e7307549543,2024-06-07T14:56:05.647000
CVE-2024-5609,0,0,f28c83e3e9d04345913d36de3bfdbd0d644d73b3d20045d9399b3368319c8d47,2024-06-06T19:16:09.920000 CVE-2024-5609,0,0,f28c83e3e9d04345913d36de3bfdbd0d644d73b3d20045d9399b3368319c8d47,2024-06-06T19:16:09.920000
CVE-2024-5611,0,0,7f38716b1ccbe035f7f86ea6c7617ab6f4cac8651e00e7906bbdbf77091ab5a1,2024-06-17T12:42:04.623000 CVE-2024-5611,0,0,7f38716b1ccbe035f7f86ea6c7617ab6f4cac8651e00e7906bbdbf77091ab5a1,2024-06-17T12:42:04.623000
@ -255433,7 +255437,7 @@ CVE-2024-5663,0,0,e65ed9bd668d6456ce5b39954ddd0ae3860f1cde2bd069c4d43e4b56016278
CVE-2024-5665,0,0,cf98b8118d31a45b868938fcf4b0239a4be77d7cb3995f06e552251067a9cecd,2024-06-11T17:47:45.033000 CVE-2024-5665,0,0,cf98b8118d31a45b868938fcf4b0239a4be77d7cb3995f06e552251067a9cecd,2024-06-11T17:47:45.033000
CVE-2024-5666,0,0,c2cb648af5be31cc7b97e094a0871dd39fea80d2d3a0f373e615f5ae502553a5,2024-07-01T12:37:24.220000 CVE-2024-5666,0,0,c2cb648af5be31cc7b97e094a0871dd39fea80d2d3a0f373e615f5ae502553a5,2024-07-01T12:37:24.220000
CVE-2024-5671,0,0,b302da9933b51baa02aebe638443397fc8a4c366af898c1301a8da6525832546,2024-06-17T12:42:04.623000 CVE-2024-5671,0,0,b302da9933b51baa02aebe638443397fc8a4c366af898c1301a8da6525832546,2024-06-17T12:42:04.623000
CVE-2024-5672,1,1,ea7898705d9632f8d927cb0e1e6a11530834ac1751da3472c25ad47a8dfbc839,2024-07-03T13:15:03.043000 CVE-2024-5672,0,0,ea7898705d9632f8d927cb0e1e6a11530834ac1751da3472c25ad47a8dfbc839,2024-07-03T13:15:03.043000
CVE-2024-5673,0,0,f6db27a8b7c99bb0a58922425d96edcb461eeb527f78adfd8d9aed9c99330140,2024-06-11T18:17:10.037000 CVE-2024-5673,0,0,f6db27a8b7c99bb0a58922425d96edcb461eeb527f78adfd8d9aed9c99330140,2024-06-11T18:17:10.037000
CVE-2024-5674,0,0,69b0f5cdcc6414c1b3093ac76e322fc42e17eb869b8f1b328084f458395232cf,2024-06-13T18:36:09.010000 CVE-2024-5674,0,0,69b0f5cdcc6414c1b3093ac76e322fc42e17eb869b8f1b328084f458395232cf,2024-06-13T18:36:09.010000
CVE-2024-5675,0,0,c04fc1bf8ef6e3f232c30ddf0bd6a524958c9eab63fe205331e1fedef14ccf13,2024-06-11T18:14:02.017000 CVE-2024-5675,0,0,c04fc1bf8ef6e3f232c30ddf0bd6a524958c9eab63fe205331e1fedef14ccf13,2024-06-11T18:14:02.017000
@ -255470,9 +255474,9 @@ CVE-2024-5731,0,0,f8f18711dc1e7684e37f428b0d6e39ca275690790dad9599ea32c8e89b131e
CVE-2024-5732,0,0,2b69cb5542c2f91e3e2021ac007049b3634a9137bdf0c325241236594abc7cc6,2024-06-11T17:57:13.767000 CVE-2024-5732,0,0,2b69cb5542c2f91e3e2021ac007049b3634a9137bdf0c325241236594abc7cc6,2024-06-11T17:57:13.767000
CVE-2024-5733,0,0,78152e13cdabf162486c62849d39e4c95e26727ad5623fb603c3826108c4ab9b,2024-06-11T18:30:50.690000 CVE-2024-5733,0,0,78152e13cdabf162486c62849d39e4c95e26727ad5623fb603c3826108c4ab9b,2024-06-11T18:30:50.690000
CVE-2024-5734,0,0,42e64867c1cdebe5031caec9548ec6393cd9bc290658f317ad4788de56fd156c,2024-06-11T18:30:16.727000 CVE-2024-5734,0,0,42e64867c1cdebe5031caec9548ec6393cd9bc290658f317ad4788de56fd156c,2024-06-11T18:30:16.727000
CVE-2024-5735,0,0,cc0561f495bade816cdeaced53011b07f3cb6a0e24901667ac6b88439c52c12a,2024-06-28T13:38:47.077000 CVE-2024-5735,0,1,5164f7c1a233150ee53341ccee6b477fac348115ef4d5352757fe303df2f5a54,2024-07-03T15:45:57.677000
CVE-2024-5736,0,0,525c83f0d9c4bb50f89240615c5f2211bfd076d0392343c37d0ccb4f622d76cb,2024-06-28T13:38:47.077000 CVE-2024-5736,0,1,542f55758b5fdb7d00740d25c91b14abb056e9aea19176254ebe8a8a94099d0d,2024-07-03T15:46:08.877000
CVE-2024-5737,0,0,33e4dfb4b6ecc95a25b3463ae07a17fb1eb0a57cb72699fc113aff6b8c2d0ea5,2024-06-28T13:38:47.077000 CVE-2024-5737,0,1,d0320412366343a8bfdfa83f09ec33ad8bab76c39c727d4c2240c621c15a4ff2,2024-07-03T14:09:22.483000
CVE-2024-5739,0,0,4e4cf687173db1796e93002e6527d7eafacb6ad9e3e1f9441d82638a10b1e4ca,2024-06-13T18:36:09.013000 CVE-2024-5739,0,0,4e4cf687173db1796e93002e6527d7eafacb6ad9e3e1f9441d82638a10b1e4ca,2024-06-13T18:36:09.013000
CVE-2024-5741,0,0,d3e87c617441ebc91021d514ecbbaffa42c181f23db631a685b052a1b8e8e820,2024-06-17T12:42:04.623000 CVE-2024-5741,0,0,d3e87c617441ebc91021d514ecbbaffa42c181f23db631a685b052a1b8e8e820,2024-06-17T12:42:04.623000
CVE-2024-5742,0,0,a52d500d47b6c5d306e493aed82844a67ba1ec935bd3dcc9d1575df0fba9dc97,2024-06-17T12:15:49.850000 CVE-2024-5742,0,0,a52d500d47b6c5d306e493aed82844a67ba1ec935bd3dcc9d1575df0fba9dc97,2024-06-17T12:15:49.850000
@ -255487,7 +255491,7 @@ CVE-2024-5758,0,0,250b274bfcefb72defbd26103c82d5c8ed585b7571d3785565c3013fdb6e4a
CVE-2024-5759,0,0,a8b20ed9df5a502bc1dbe4283a67eed19771ffb4a4f02a90724215ed5101a898,2024-06-13T18:36:09.010000 CVE-2024-5759,0,0,a8b20ed9df5a502bc1dbe4283a67eed19771ffb4a4f02a90724215ed5101a898,2024-06-13T18:36:09.010000
CVE-2024-5761,0,0,e0022a8d80317cd3941058bae14b514f68707790a5051038049a1d552ba8de69,2024-06-07T19:15:24.467000 CVE-2024-5761,0,0,e0022a8d80317cd3941058bae14b514f68707790a5051038049a1d552ba8de69,2024-06-07T19:15:24.467000
CVE-2024-5766,0,0,f4f0065e1ad74a475f6d00e1f328df39da374dfe97f7b4c54df1858a2ce42e5e,2024-06-10T02:52:08.267000 CVE-2024-5766,0,0,f4f0065e1ad74a475f6d00e1f328df39da374dfe97f7b4c54df1858a2ce42e5e,2024-06-10T02:52:08.267000
CVE-2024-5767,0,0,2cdcdd5f8fd65e586a4117744c4cc9c0fa1bd1cd4ae542b2fabb912f848a248c,2024-07-02T12:09:16.907000 CVE-2024-5767,0,1,23a2de5cc642d98e40b9cd54645c60f113c9b3696a937d49f8d435c3dba338d7,2024-07-03T15:26:29.050000
CVE-2024-5768,0,0,4723f0c08a5f7c047718f7b87ad6f2c66db14b3e8d318e841a1bb9034ace5943,2024-06-20T12:44:01.637000 CVE-2024-5768,0,0,4723f0c08a5f7c047718f7b87ad6f2c66db14b3e8d318e841a1bb9034ace5943,2024-06-20T12:44:01.637000
CVE-2024-5770,0,0,25b3f0241d69604556f37a6471fa9a6892ce290ef4b03f2d5525dd585c681fcd,2024-06-10T02:52:08.267000 CVE-2024-5770,0,0,25b3f0241d69604556f37a6471fa9a6892ce290ef4b03f2d5525dd585c681fcd,2024-06-10T02:52:08.267000
CVE-2024-5771,0,0,378b86ddb7266a39f3407b18465f75a96b2cb76a6e911ad726ef8ee0f827d15d,2024-06-10T02:52:08.267000 CVE-2024-5771,0,0,378b86ddb7266a39f3407b18465f75a96b2cb76a6e911ad726ef8ee0f827d15d,2024-06-10T02:52:08.267000
@ -255635,6 +255639,7 @@ CVE-2024-6046,0,0,91371f2b9afd0a654dc4dc6a88ac5fb04a186cb82713804dda3cac2d7733c3
CVE-2024-6047,0,0,4cdf0f1acff12373f8f857c8d442b9de2221d44745323cc3f60bf66bccd7a239,2024-06-17T14:15:13.040000 CVE-2024-6047,0,0,4cdf0f1acff12373f8f857c8d442b9de2221d44745323cc3f60bf66bccd7a239,2024-06-17T14:15:13.040000
CVE-2024-6048,0,0,03e9485ef23720c113f11fed6c539200d9a1624e025ca24798cddf9d0c1a9e3b,2024-06-17T12:42:04.623000 CVE-2024-6048,0,0,03e9485ef23720c113f11fed6c539200d9a1624e025ca24798cddf9d0c1a9e3b,2024-06-17T12:42:04.623000
CVE-2024-6050,0,0,304778e708041d822ddb3dbacfa423baa973c842b9b5dea1cb2a29aed7ec7b6d,2024-07-01T16:37:39.040000 CVE-2024-6050,0,0,304778e708041d822ddb3dbacfa423baa973c842b9b5dea1cb2a29aed7ec7b6d,2024-07-01T16:37:39.040000
CVE-2024-6052,1,1,043613cf1c108efd4df1b8c641fcfc3aae24d3f12d61f8d9bc4d4a8136d4a5d2,2024-07-03T15:15:06.223000
CVE-2024-6054,0,0,dbd3e49036b5938301871d5a6c67ee17ba89370e3288082b00ca89a51a1f06ed,2024-06-28T13:11:58.810000 CVE-2024-6054,0,0,dbd3e49036b5938301871d5a6c67ee17ba89370e3288082b00ca89a51a1f06ed,2024-06-28T13:11:58.810000
CVE-2024-6055,0,0,7490ef4c1367b62a13fc44ec964fb12263f9fa479e5bd4bbc3820296c19002e0,2024-06-20T12:44:22.977000 CVE-2024-6055,0,0,7490ef4c1367b62a13fc44ec964fb12263f9fa479e5bd4bbc3820296c19002e0,2024-06-20T12:44:22.977000
CVE-2024-6056,0,0,9210a6d5e69cda44c36495fe4964320c8f6a47f4e723a559827fc7a6d2ee595f,2024-06-20T12:44:22.977000 CVE-2024-6056,0,0,9210a6d5e69cda44c36495fe4964320c8f6a47f4e723a559827fc7a6d2ee595f,2024-06-20T12:44:22.977000
@ -255675,6 +255680,7 @@ CVE-2024-6115,0,0,3c5ab17ce7a1f33a2dee71d5335f67c2e99b7d6204dc28e4e10a70d6ca6b07
CVE-2024-6116,0,0,5843dd08daba10a4f1c43a634f4172ccf9c702c464ac49dc5f784b4aa5e3fcb5,2024-06-20T12:44:01.637000 CVE-2024-6116,0,0,5843dd08daba10a4f1c43a634f4172ccf9c702c464ac49dc5f784b4aa5e3fcb5,2024-06-20T12:44:01.637000
CVE-2024-6120,0,0,5c59cd273da1e2ed6c553cf441ff0a5530e8c4d18132ff0e8595e05e3633cb46,2024-06-24T20:03:04.363000 CVE-2024-6120,0,0,5c59cd273da1e2ed6c553cf441ff0a5530e8c4d18132ff0e8595e05e3633cb46,2024-06-24T20:03:04.363000
CVE-2024-6125,0,0,85b92914638eb24a081146fd823c584c2333b183768ef26d618955e83646311b,2024-06-20T12:44:01.637000 CVE-2024-6125,0,0,85b92914638eb24a081146fd823c584c2333b183768ef26d618955e83646311b,2024-06-20T12:44:01.637000
CVE-2024-6126,1,1,eac314364b69d7994f4911171bc2b4c5e18e3a158bd0616141df97bd068d1e38,2024-07-03T15:15:06.470000
CVE-2024-6127,0,0,8f3f3591469382ebb006087ec5b5be799ca274948ebd71b090f997c1ae2c89a9,2024-06-28T10:27:00.920000 CVE-2024-6127,0,0,8f3f3591469382ebb006087ec5b5be799ca274948ebd71b090f997c1ae2c89a9,2024-06-28T10:27:00.920000
CVE-2024-6128,0,0,cd2531d89b3a76f4be34b5ead44f5b65458326ae9dfb5c97dcd0243e237eb5b3,2024-06-21T16:15:12.570000 CVE-2024-6128,0,0,cd2531d89b3a76f4be34b5ead44f5b65458326ae9dfb5c97dcd0243e237eb5b3,2024-06-21T16:15:12.570000
CVE-2024-6129,0,0,dfa20fd20a0a3099fcdc2f66c56de27040819ee45bd7efe66cb95f894b77d645,2024-06-20T12:44:01.637000 CVE-2024-6129,0,0,dfa20fd20a0a3099fcdc2f66c56de27040819ee45bd7efe66cb95f894b77d645,2024-06-20T12:44:01.637000
@ -255731,7 +255737,7 @@ CVE-2024-6252,0,0,468e259f2025efbae92579ad89a45c9f2c8b2e33c6f209272de57a1e66debc
CVE-2024-6253,0,0,a6e4514e5a27665a5cb6260b36ae56e5c2da14fd9a2d1da643a44ff2f3f2cb21,2024-06-25T18:15:12 CVE-2024-6253,0,0,a6e4514e5a27665a5cb6260b36ae56e5c2da14fd9a2d1da643a44ff2f3f2cb21,2024-06-25T18:15:12
CVE-2024-6257,0,0,2981da6c17c705bcf0d80e44b1fa14b0c6655b2077fb275b971c6bc5c7c2b720,2024-06-25T18:50:42.040000 CVE-2024-6257,0,0,2981da6c17c705bcf0d80e44b1fa14b0c6655b2077fb275b971c6bc5c7c2b720,2024-06-25T18:50:42.040000
CVE-2024-6262,0,0,f703f7a7fbd3e1fe9efa1e5946752e209a081bf36124182aca731e3f05a363a4,2024-06-27T12:47:19.847000 CVE-2024-6262,0,0,f703f7a7fbd3e1fe9efa1e5946752e209a081bf36124182aca731e3f05a363a4,2024-06-27T12:47:19.847000
CVE-2024-6263,0,1,eef514c44d6052a87015ac43d52225e5228d7c5e601a8a4d2fb9447b4977342f,2024-07-03T12:53:24.977000 CVE-2024-6263,0,0,eef514c44d6052a87015ac43d52225e5228d7c5e601a8a4d2fb9447b4977342f,2024-07-03T12:53:24.977000
CVE-2024-6264,0,0,f9ab73ef94330a3cc9bcff915e884763c0b072f9f74618431a2c7d5cbe25dc82,2024-07-02T17:57:31.737000 CVE-2024-6264,0,0,f9ab73ef94330a3cc9bcff915e884763c0b072f9f74618431a2c7d5cbe25dc82,2024-07-02T17:57:31.737000
CVE-2024-6265,0,0,dd53419ac5d71f3843314be14fea17b7338fd9f39ae5539064d4c12df7d66cd7,2024-07-01T12:37:24.220000 CVE-2024-6265,0,0,dd53419ac5d71f3843314be14fea17b7338fd9f39ae5539064d4c12df7d66cd7,2024-07-01T12:37:24.220000
CVE-2024-6266,0,0,f14331da5cd861226d53e015f2a1f08c9e1d5e7f7b1b843a3feb7cb151cc145a,2024-06-24T12:57:36.513000 CVE-2024-6266,0,0,f14331da5cd861226d53e015f2a1f08c9e1d5e7f7b1b843a3feb7cb151cc145a,2024-06-24T12:57:36.513000
@ -255768,7 +255774,7 @@ CVE-2024-6306,0,0,711bff153bb36aca97259b9a58665f79686710d592de1aed3b99962d3c3067
CVE-2024-6307,0,0,a6037df0fa8617c9aaeffdc703000fa7423e885d439338f30eb38eb0279e87b9,2024-06-28T13:15:03.453000 CVE-2024-6307,0,0,a6037df0fa8617c9aaeffdc703000fa7423e885d439338f30eb38eb0279e87b9,2024-06-28T13:15:03.453000
CVE-2024-6308,0,0,483bab7c0040f40965fba497a0be9e45fef6974a263c54d39149185a218f4b43,2024-06-25T21:16:02.087000 CVE-2024-6308,0,0,483bab7c0040f40965fba497a0be9e45fef6974a263c54d39149185a218f4b43,2024-06-25T21:16:02.087000
CVE-2024-6323,0,0,16f93962f537d8478d96317e8b0d9cad0e3aee225ed0ebdb8d6f6bf214bb804e,2024-06-28T13:15:19.317000 CVE-2024-6323,0,0,16f93962f537d8478d96317e8b0d9cad0e3aee225ed0ebdb8d6f6bf214bb804e,2024-06-28T13:15:19.317000
CVE-2024-6340,0,1,bb1108ed10839a26b4c1dc57d9b0dce8e4cd3d484be78fa39962e8c27bf9bdb2,2024-07-03T12:53:24.977000 CVE-2024-6340,0,0,bb1108ed10839a26b4c1dc57d9b0dce8e4cd3d484be78fa39962e8c27bf9bdb2,2024-07-03T12:53:24.977000
CVE-2024-6341,0,0,528f4fdde1526d72477e90a767b2f2316b168f65b64effeddb9446d8a5cdcaf5,2024-07-02T18:15:03.900000 CVE-2024-6341,0,0,528f4fdde1526d72477e90a767b2f2316b168f65b64effeddb9446d8a5cdcaf5,2024-07-02T18:15:03.900000
CVE-2024-6344,0,0,f8fe072181ab91a453822e0b523eb31f74817bc4efb68c7d2134a2d41a8e3557,2024-06-27T00:15:13.360000 CVE-2024-6344,0,0,f8fe072181ab91a453822e0b523eb31f74817bc4efb68c7d2134a2d41a8e3557,2024-06-27T00:15:13.360000
CVE-2024-6349,0,0,f01d61e3475192c945ec3639c2eda3b231a23d2f279c2f15b4719385fb2bd065,2024-06-26T15:15:20.690000 CVE-2024-6349,0,0,f01d61e3475192c945ec3639c2eda3b231a23d2f279c2f15b4719385fb2bd065,2024-06-26T15:15:20.690000
@ -255783,11 +255789,11 @@ CVE-2024-6371,0,0,4c649bc248258025ed325d77948a1f8525c46141bb22c90a65b416ad94095e
CVE-2024-6372,0,0,ec8243842e1fb3e0d20056a877723ac3e2b0533a4741cd15fbbcbf6a553aa1c3,2024-06-27T17:11:52.390000 CVE-2024-6372,0,0,ec8243842e1fb3e0d20056a877723ac3e2b0533a4741cd15fbbcbf6a553aa1c3,2024-06-27T17:11:52.390000
CVE-2024-6373,0,0,ffc7549884eeecbe338ce0f17f670d62abf2209962cbc27b0291f9ddbed7c163,2024-06-27T18:15:22.280000 CVE-2024-6373,0,0,ffc7549884eeecbe338ce0f17f670d62abf2209962cbc27b0291f9ddbed7c163,2024-06-27T18:15:22.280000
CVE-2024-6374,0,0,951e3f10ed1a8de2c137bcf7721b529de76cab1c6430f8094753092eaf9ecd40,2024-06-27T17:11:52.390000 CVE-2024-6374,0,0,951e3f10ed1a8de2c137bcf7721b529de76cab1c6430f8094753092eaf9ecd40,2024-06-27T17:11:52.390000
CVE-2024-6375,0,0,63966b93eb46e16d023260fad8c0d7013b7249b4716b3dc1473565015805b694,2024-07-01T16:37:39.040000 CVE-2024-6375,0,1,2086f7a0dc16d184277c490b35389aec9b32cc5c6b68030b97b503ee789a3958,2024-07-03T14:54:52.427000
CVE-2024-6376,0,0,5b1144f575b26ee71024cb47efd50b0c100b6444589a68c6e121da4ff25018c3,2024-07-01T16:37:39.040000 CVE-2024-6376,0,1,2eceea6553f0e47a0e34ab01650b7781a20682f6799be39f9cd1e64f3f19856f,2024-07-03T15:04:52.463000
CVE-2024-6381,0,1,2822fb12d769fe1cca32125b45cae52ba3e5807419213b6087c6db8de8d2b326,2024-07-03T12:53:24.977000 CVE-2024-6381,0,0,2822fb12d769fe1cca32125b45cae52ba3e5807419213b6087c6db8de8d2b326,2024-07-03T12:53:24.977000
CVE-2024-6382,0,1,9f140af24f460b4413fa844f95383cc153754360a136939b8743c2d8327ebf99,2024-07-03T12:53:24.977000 CVE-2024-6382,0,0,9f140af24f460b4413fa844f95383cc153754360a136939b8743c2d8327ebf99,2024-07-03T12:53:24.977000
CVE-2024-6387,0,1,e6a56f8a69b7b260ae53a144224efd4334f1883c642273209a623900a790dcba,2024-07-03T13:15:03.493000 CVE-2024-6387,0,0,e6a56f8a69b7b260ae53a144224efd4334f1883c642273209a623900a790dcba,2024-07-03T13:15:03.493000
CVE-2024-6388,0,0,e641c9d869769d4291da87145b48d15b4f200c046d6b100142bc686375a84738,2024-06-27T17:11:52.390000 CVE-2024-6388,0,0,e641c9d869769d4291da87145b48d15b4f200c046d6b100142bc686375a84738,2024-06-27T17:11:52.390000
CVE-2024-6402,0,0,795485c4534407e246daec51c1daaa33b95f6651688fed743a8fb9054cdaedba,2024-07-01T12:37:24.220000 CVE-2024-6402,0,0,795485c4534407e246daec51c1daaa33b95f6651688fed743a8fb9054cdaedba,2024-07-01T12:37:24.220000
CVE-2024-6403,0,0,e44b9cfa8d9ae367e624a8cdf179ef52ea1e98c2115d7a956299d17747a6a56b,2024-07-01T12:37:24.220000 CVE-2024-6403,0,0,e44b9cfa8d9ae367e624a8cdf179ef52ea1e98c2115d7a956299d17747a6a56b,2024-07-01T12:37:24.220000
@ -255800,14 +255806,15 @@ CVE-2024-6418,0,0,b63bb78bc20fc7c9074df0590cf44ede2aa2ea9145f7e2ea976342cbbc9ede
CVE-2024-6419,0,0,e1f22570d75c49fa5726171947ce4e56ea60b543707fecfaebe18f84b2ff48d5,2024-07-01T12:37:24.220000 CVE-2024-6419,0,0,e1f22570d75c49fa5726171947ce4e56ea60b543707fecfaebe18f84b2ff48d5,2024-07-01T12:37:24.220000
CVE-2024-6424,0,0,8d5a2fd0dee2ac07d57032a1c81c2c412cad276a027b89c1b7d3574f7c28481d,2024-07-01T16:37:39.040000 CVE-2024-6424,0,0,8d5a2fd0dee2ac07d57032a1c81c2c412cad276a027b89c1b7d3574f7c28481d,2024-07-01T16:37:39.040000
CVE-2024-6425,0,0,adbfecb8c3cc947ec785870957655621e37e6a4ecfa332482b1b765f471fc897,2024-07-01T16:37:39.040000 CVE-2024-6425,0,0,adbfecb8c3cc947ec785870957655621e37e6a4ecfa332482b1b765f471fc897,2024-07-01T16:37:39.040000
CVE-2024-6426,1,1,743cead7bfbb6d52b9a38edd8f28e270cc396ea75af77fc494cdf15f853aedb8,2024-07-03T12:53:24.977000 CVE-2024-6426,0,0,743cead7bfbb6d52b9a38edd8f28e270cc396ea75af77fc494cdf15f853aedb8,2024-07-03T12:53:24.977000
CVE-2024-6427,1,1,57065ff923a64c20753385de741e3156cf426d3558cd727998195d1e669fe19f,2024-07-03T12:53:24.977000 CVE-2024-6427,0,0,57065ff923a64c20753385de741e3156cf426d3558cd727998195d1e669fe19f,2024-07-03T12:53:24.977000
CVE-2024-6428,0,1,31d69642490b0b5c14fae0235cb6cc8aea9d2d4868dab2c3323c281656122a48,2024-07-03T12:53:24.977000 CVE-2024-6428,0,0,31d69642490b0b5c14fae0235cb6cc8aea9d2d4868dab2c3323c281656122a48,2024-07-03T12:53:24.977000
CVE-2024-6438,0,0,c89c4e3ccf031fb42672508ffc0236a74fd652409f3f814c1aa7277296a22143,2024-07-02T17:54:02.370000 CVE-2024-6438,0,0,c89c4e3ccf031fb42672508ffc0236a74fd652409f3f814c1aa7277296a22143,2024-07-02T17:54:02.370000
CVE-2024-6439,0,0,1bd5e2a149e15b87b2ec1d9e23e870c4f5a97c502c5089c3f0a60fbd028209c7,2024-07-02T17:58:39.773000 CVE-2024-6439,0,0,1bd5e2a149e15b87b2ec1d9e23e870c4f5a97c502c5089c3f0a60fbd028209c7,2024-07-02T17:58:39.773000
CVE-2024-6440,0,0,4db20ef0878ff896f7a92a0fb63819a7fd586b5cd61940caee4cf26cda6cf8f9,2024-07-02T17:58:15.410000 CVE-2024-6440,0,0,4db20ef0878ff896f7a92a0fb63819a7fd586b5cd61940caee4cf26cda6cf8f9,2024-07-02T17:58:15.410000
CVE-2024-6441,0,0,fadd9560f894739af460dd107a14c73f394f82b357796461abb110045106f46c,2024-07-02T17:44:45.700000 CVE-2024-6441,0,0,fadd9560f894739af460dd107a14c73f394f82b357796461abb110045106f46c,2024-07-02T17:44:45.700000
CVE-2024-6452,0,1,c694c1bdf54902e69172121aae2a54d0747cfc16750499c01d3cf3c9c6ef3263,2024-07-03T12:53:24.977000 CVE-2024-6452,0,0,c694c1bdf54902e69172121aae2a54d0747cfc16750499c01d3cf3c9c6ef3263,2024-07-03T12:53:24.977000
CVE-2024-6453,0,1,f8f94ef1371b1813320fb500c8f5a2a5c78562059f37a370c24f1cfd03cdaa59,2024-07-03T12:53:24.977000 CVE-2024-6453,0,0,f8f94ef1371b1813320fb500c8f5a2a5c78562059f37a370c24f1cfd03cdaa59,2024-07-03T12:53:24.977000
CVE-2024-6469,0,1,af3fa5ade340d0b228353896e96620b5cb15d570ccca154043a04cdd86241984,2024-07-03T12:53:24.977000 CVE-2024-6469,0,0,af3fa5ade340d0b228353896e96620b5cb15d570ccca154043a04cdd86241984,2024-07-03T12:53:24.977000
CVE-2024-6470,1,1,758942473ba4664d9706c7b27089a9d538cad027719295d3c67dfb54a747e72b,2024-07-03T13:15:03.703000 CVE-2024-6470,0,0,758942473ba4664d9706c7b27089a9d538cad027719295d3c67dfb54a747e72b,2024-07-03T13:15:03.703000
CVE-2024-6471,1,1,33db1e0271959450d1204c1eba113a94befddf6a5610d2c3f2f72d1021d9b28f,2024-07-03T14:15:06.490000

Can't render this file because it is too large.