Auto-Update: 2024-07-03T16:01:48.944347+00:00

This commit is contained in:
cad-safe-bot 2024-07-03 16:04:42 +00:00
parent 649cc54acc
commit 35d2420c82
54 changed files with 2370 additions and 347 deletions

View File

@ -2,8 +2,9 @@
"id": "CVE-2016-7515",
"sourceIdentifier": "security@debian.org",
"published": "2017-04-19T14:59:00.270",
"lastModified": "2017-05-09T12:40:02.777",
"lastModified": "2024-07-03T15:16:39.567",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
"lang": "en",
@ -15,13 +16,13 @@
}
],
"metrics": {
"cvssMetricV30": [
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.0",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
@ -84,8 +85,9 @@
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:imagemagick:imagemagick:-:*:*:*:*:*:*:*",
"matchCriteriaId": "6E6BE7A5-6FF7-4916-B671-9EE11CA54F65"
"criteria": "cpe:2.3:a:imagemagick:imagemagick:*:*:*:*:*:*:*:*",
"versionEndExcluding": "6.9.4-0",
"matchCriteriaId": "CFC2C780-A54E-4426-9C52-46A20216339E"
}
]
}

View File

@ -2,8 +2,9 @@
"id": "CVE-2016-7516",
"sourceIdentifier": "security@debian.org",
"published": "2017-04-20T18:59:00.937",
"lastModified": "2017-05-09T12:40:00.260",
"lastModified": "2024-07-03T15:23:36.440",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
"lang": "en",
@ -15,13 +16,13 @@
}
],
"metrics": {
"cvssMetricV30": [
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.0",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
@ -84,8 +85,9 @@
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:imagemagick:imagemagick:-:*:*:*:*:*:*:*",
"matchCriteriaId": "6E6BE7A5-6FF7-4916-B671-9EE11CA54F65"
"criteria": "cpe:2.3:a:imagemagick:imagemagick:*:*:*:*:*:*:*:*",
"versionEndExcluding": "6.9.4-0",
"matchCriteriaId": "CFC2C780-A54E-4426-9C52-46A20216339E"
}
]
}

View File

@ -2,8 +2,9 @@
"id": "CVE-2016-7517",
"sourceIdentifier": "security@debian.org",
"published": "2017-04-20T18:59:00.967",
"lastModified": "2017-05-09T12:39:56.680",
"lastModified": "2024-07-03T15:17:05.433",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
"lang": "en",
@ -15,13 +16,13 @@
}
],
"metrics": {
"cvssMetricV30": [
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.0",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
@ -84,8 +85,9 @@
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:imagemagick:imagemagick:-:*:*:*:*:*:*:*",
"matchCriteriaId": "6E6BE7A5-6FF7-4916-B671-9EE11CA54F65"
"criteria": "cpe:2.3:a:imagemagick:imagemagick:*:*:*:*:*:*:*:*",
"versionEndExcluding": "6.9.4-0",
"matchCriteriaId": "CFC2C780-A54E-4426-9C52-46A20216339E"
}
]
}

View File

@ -2,8 +2,9 @@
"id": "CVE-2016-7518",
"sourceIdentifier": "security@debian.org",
"published": "2017-04-20T18:59:01.013",
"lastModified": "2017-05-09T12:39:53.323",
"lastModified": "2024-07-03T15:24:22.567",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
"lang": "en",
@ -15,13 +16,13 @@
}
],
"metrics": {
"cvssMetricV30": [
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.0",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
@ -84,8 +85,9 @@
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:imagemagick:imagemagick:-:*:*:*:*:*:*:*",
"matchCriteriaId": "6E6BE7A5-6FF7-4916-B671-9EE11CA54F65"
"criteria": "cpe:2.3:a:imagemagick:imagemagick:*:*:*:*:*:*:*:*",
"versionEndExcluding": "6.9.4-0",
"matchCriteriaId": "CFC2C780-A54E-4426-9C52-46A20216339E"
}
]
}

View File

@ -2,8 +2,9 @@
"id": "CVE-2016-7519",
"sourceIdentifier": "security@debian.org",
"published": "2017-04-19T14:59:00.317",
"lastModified": "2017-05-09T12:39:50.057",
"lastModified": "2024-07-03T15:23:33.607",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
"lang": "en",
@ -15,13 +16,13 @@
}
],
"metrics": {
"cvssMetricV30": [
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.0",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
@ -84,8 +85,9 @@
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:imagemagick:imagemagick:-:*:*:*:*:*:*:*",
"matchCriteriaId": "6E6BE7A5-6FF7-4916-B671-9EE11CA54F65"
"criteria": "cpe:2.3:a:imagemagick:imagemagick:*:*:*:*:*:*:*:*",
"versionEndExcluding": "6.9.4-0",
"matchCriteriaId": "CFC2C780-A54E-4426-9C52-46A20216339E"
}
]
}

View File

@ -2,8 +2,9 @@
"id": "CVE-2016-7520",
"sourceIdentifier": "security@debian.org",
"published": "2017-04-20T18:59:01.060",
"lastModified": "2017-05-09T12:39:45.993",
"lastModified": "2024-07-03T15:20:18.050",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
"lang": "en",
@ -15,13 +16,13 @@
}
],
"metrics": {
"cvssMetricV30": [
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.0",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
@ -84,8 +85,9 @@
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:imagemagick:imagemagick:-:*:*:*:*:*:*:*",
"matchCriteriaId": "6E6BE7A5-6FF7-4916-B671-9EE11CA54F65"
"criteria": "cpe:2.3:a:imagemagick:imagemagick:*:*:*:*:*:*:*:*",
"versionEndExcluding": "6.9.4-0",
"matchCriteriaId": "CFC2C780-A54E-4426-9C52-46A20216339E"
}
]
}

View File

@ -2,8 +2,9 @@
"id": "CVE-2016-7521",
"sourceIdentifier": "security@debian.org",
"published": "2017-04-20T18:59:01.093",
"lastModified": "2017-05-09T12:39:43.383",
"lastModified": "2024-07-03T15:20:33.760",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
"lang": "en",
@ -15,13 +16,13 @@
}
],
"metrics": {
"cvssMetricV30": [
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.0",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
@ -84,8 +85,9 @@
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:imagemagick:imagemagick:-:*:*:*:*:*:*:*",
"matchCriteriaId": "6E6BE7A5-6FF7-4916-B671-9EE11CA54F65"
"criteria": "cpe:2.3:a:imagemagick:imagemagick:*:*:*:*:*:*:*:*",
"versionEndExcluding": "6.9.4-0",
"matchCriteriaId": "CFC2C780-A54E-4426-9C52-46A20216339E"
}
]
}

View File

@ -2,8 +2,9 @@
"id": "CVE-2016-7522",
"sourceIdentifier": "security@debian.org",
"published": "2017-04-19T14:59:00.367",
"lastModified": "2017-05-09T12:39:40.680",
"lastModified": "2024-07-03T15:20:47.917",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
"lang": "en",
@ -15,13 +16,13 @@
}
],
"metrics": {
"cvssMetricV30": [
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.0",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
@ -84,8 +85,9 @@
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:imagemagick:imagemagick:-:*:*:*:*:*:*:*",
"matchCriteriaId": "6E6BE7A5-6FF7-4916-B671-9EE11CA54F65"
"criteria": "cpe:2.3:a:imagemagick:imagemagick:*:*:*:*:*:*:*:*",
"versionEndExcluding": "6.9.4-0",
"matchCriteriaId": "CFC2C780-A54E-4426-9C52-46A20216339E"
}
]
}

View File

@ -2,8 +2,9 @@
"id": "CVE-2016-7523",
"sourceIdentifier": "security@debian.org",
"published": "2020-02-06T14:15:10.737",
"lastModified": "2020-02-10T14:15:40.907",
"lastModified": "2024-07-03T15:21:09.250",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
"lang": "en",
@ -84,8 +85,9 @@
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:imagemagick:imagemagick:-:*:*:*:*:*:*:*",
"matchCriteriaId": "6E6BE7A5-6FF7-4916-B671-9EE11CA54F65"
"criteria": "cpe:2.3:a:imagemagick:imagemagick:*:*:*:*:*:*:*:*",
"versionEndExcluding": "6.9.4-0",
"matchCriteriaId": "CFC2C780-A54E-4426-9C52-46A20216339E"
}
]
}

View File

@ -2,8 +2,9 @@
"id": "CVE-2016-7524",
"sourceIdentifier": "security@debian.org",
"published": "2020-02-06T14:15:10.830",
"lastModified": "2020-02-10T14:15:18.203",
"lastModified": "2024-07-03T15:21:23.107",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
"lang": "en",
@ -84,8 +85,9 @@
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:imagemagick:imagemagick:-:*:*:*:*:*:*:*",
"matchCriteriaId": "6E6BE7A5-6FF7-4916-B671-9EE11CA54F65"
"criteria": "cpe:2.3:a:imagemagick:imagemagick:*:*:*:*:*:*:*:*",
"versionEndExcluding": "6.9.4-0",
"matchCriteriaId": "CFC2C780-A54E-4426-9C52-46A20216339E"
}
]
}

View File

@ -2,8 +2,9 @@
"id": "CVE-2016-7525",
"sourceIdentifier": "security@debian.org",
"published": "2017-04-20T18:59:01.140",
"lastModified": "2017-05-09T12:39:38.103",
"lastModified": "2024-07-03T15:21:41.860",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
"lang": "en",
@ -15,13 +16,13 @@
}
],
"metrics": {
"cvssMetricV30": [
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.0",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
@ -84,8 +85,9 @@
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:imagemagick:imagemagick:-:*:*:*:*:*:*:*",
"matchCriteriaId": "6E6BE7A5-6FF7-4916-B671-9EE11CA54F65"
"criteria": "cpe:2.3:a:imagemagick:imagemagick:*:*:*:*:*:*:*:*",
"versionEndExcluding": "6.9.4-0",
"matchCriteriaId": "CFC2C780-A54E-4426-9C52-46A20216339E"
}
]
}

View File

@ -2,8 +2,9 @@
"id": "CVE-2016-7526",
"sourceIdentifier": "security@debian.org",
"published": "2017-04-20T18:59:01.187",
"lastModified": "2020-11-16T19:39:56.297",
"lastModified": "2024-07-03T15:21:49.110",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
"lang": "en",
@ -84,8 +85,9 @@
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:imagemagick:imagemagick:-:*:*:*:*:*:*:*",
"matchCriteriaId": "6E6BE7A5-6FF7-4916-B671-9EE11CA54F65"
"criteria": "cpe:2.3:a:imagemagick:imagemagick:*:*:*:*:*:*:*:*",
"versionEndExcluding": "6.9.4-0",
"matchCriteriaId": "CFC2C780-A54E-4426-9C52-46A20216339E"
}
]
}

View File

@ -2,8 +2,9 @@
"id": "CVE-2016-7527",
"sourceIdentifier": "security@debian.org",
"published": "2017-04-20T18:59:01.217",
"lastModified": "2020-11-16T19:37:51.120",
"lastModified": "2024-07-03T15:22:01.010",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
"lang": "en",
@ -84,8 +85,9 @@
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:imagemagick:imagemagick:-:*:*:*:*:*:*:*",
"matchCriteriaId": "6E6BE7A5-6FF7-4916-B671-9EE11CA54F65"
"criteria": "cpe:2.3:a:imagemagick:imagemagick:*:*:*:*:*:*:*:*",
"versionEndExcluding": "6.9.4-0",
"matchCriteriaId": "CFC2C780-A54E-4426-9C52-46A20216339E"
}
]
}

View File

@ -2,8 +2,9 @@
"id": "CVE-2016-7528",
"sourceIdentifier": "security@debian.org",
"published": "2017-04-19T14:59:00.397",
"lastModified": "2020-11-16T19:36:05.883",
"lastModified": "2024-07-03T15:22:10.600",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
"lang": "en",
@ -84,8 +85,9 @@
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:imagemagick:imagemagick:-:*:*:*:*:*:*:*",
"matchCriteriaId": "6E6BE7A5-6FF7-4916-B671-9EE11CA54F65"
"criteria": "cpe:2.3:a:imagemagick:imagemagick:*:*:*:*:*:*:*:*",
"versionEndExcluding": "6.9.4-0",
"matchCriteriaId": "CFC2C780-A54E-4426-9C52-46A20216339E"
}
]
}

View File

@ -2,8 +2,9 @@
"id": "CVE-2016-7529",
"sourceIdentifier": "security@debian.org",
"published": "2017-04-19T14:59:00.443",
"lastModified": "2017-05-09T12:39:23.460",
"lastModified": "2024-07-03T15:22:20.367",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
"lang": "en",
@ -15,13 +16,13 @@
}
],
"metrics": {
"cvssMetricV30": [
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.0",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
@ -84,8 +85,9 @@
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:imagemagick:imagemagick:-:*:*:*:*:*:*:*",
"matchCriteriaId": "6E6BE7A5-6FF7-4916-B671-9EE11CA54F65"
"criteria": "cpe:2.3:a:imagemagick:imagemagick:*:*:*:*:*:*:*:*",
"versionEndExcluding": "6.9.4-0",
"matchCriteriaId": "CFC2C780-A54E-4426-9C52-46A20216339E"
}
]
}

View File

@ -2,8 +2,9 @@
"id": "CVE-2016-7530",
"sourceIdentifier": "security@debian.org",
"published": "2017-04-20T18:59:01.263",
"lastModified": "2017-05-09T12:39:19.320",
"lastModified": "2024-07-03T15:22:34.133",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
"lang": "en",
@ -15,13 +16,13 @@
}
],
"metrics": {
"cvssMetricV30": [
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.0",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
@ -84,8 +85,9 @@
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:imagemagick:imagemagick:-:*:*:*:*:*:*:*",
"matchCriteriaId": "6E6BE7A5-6FF7-4916-B671-9EE11CA54F65"
"criteria": "cpe:2.3:a:imagemagick:imagemagick:*:*:*:*:*:*:*:*",
"versionEndExcluding": "6.9.4-0",
"matchCriteriaId": "CFC2C780-A54E-4426-9C52-46A20216339E"
}
]
}

View File

@ -2,8 +2,9 @@
"id": "CVE-2016-7533",
"sourceIdentifier": "security@debian.org",
"published": "2017-04-19T14:59:00.520",
"lastModified": "2017-05-09T12:39:08.790",
"lastModified": "2024-07-03T15:23:17.167",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
"lang": "en",
@ -15,13 +16,13 @@
}
],
"metrics": {
"cvssMetricV30": [
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.0",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
@ -84,8 +85,9 @@
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:imagemagick:imagemagick:-:*:*:*:*:*:*:*",
"matchCriteriaId": "6E6BE7A5-6FF7-4916-B671-9EE11CA54F65"
"criteria": "cpe:2.3:a:imagemagick:imagemagick:*:*:*:*:*:*:*:*",
"versionEndExcluding": "6.9.4-0",
"matchCriteriaId": "CFC2C780-A54E-4426-9C52-46A20216339E"
}
]
}

View File

@ -2,8 +2,16 @@
"id": "CVE-2021-27798",
"sourceIdentifier": "sirt@brocade.com",
"published": "2022-08-05T16:15:10.807",
"lastModified": "2024-05-17T01:55:38.763",
"lastModified": "2024-07-03T15:15:05.193",
"vulnStatus": "Modified",
"cveTags": [
{
"sourceIdentifier": "sirt@brocade.com",
"tags": [
"unsupported-when-assigned"
]
}
],
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,16 @@
"id": "CVE-2022-31362",
"sourceIdentifier": "cve@mitre.org",
"published": "2022-06-23T17:15:13.123",
"lastModified": "2024-05-17T02:09:31.817",
"lastModified": "2024-07-03T14:15:04.330",
"vulnStatus": "Modified",
"cveTags": [
{
"sourceIdentifier": "cve@mitre.org",
"tags": [
"unsupported-when-assigned"
]
}
],
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,16 @@
"id": "CVE-2022-40297",
"sourceIdentifier": "cve@mitre.org",
"published": "2022-09-09T00:15:08.793",
"lastModified": "2024-05-17T02:13:18.643",
"lastModified": "2024-07-03T15:15:05.423",
"vulnStatus": "Modified",
"cveTags": [
{
"sourceIdentifier": "cve@mitre.org",
"tags": [
"disputed"
]
}
],
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-1427",
"sourceIdentifier": "security@wordfence.com",
"published": "2024-07-02T06:15:02.253",
"lastModified": "2024-07-02T12:09:16.907",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-07-03T15:44:40.083",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -18,8 +18,28 @@
"metrics": {
"cvssMetricV31": [
{
"source": "security@wordfence.com",
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 5.4,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.3,
"impactScore": 2.7
},
{
"source": "security@wordfence.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N",
@ -39,18 +59,57 @@
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:radiustheme:the_post_grid:*:*:*:*:*:wordpress:*:*",
"versionEndExcluding": "7.7.2",
"matchCriteriaId": "0181ECD4-44C0-432C-80B6-70123A9FBE22"
}
]
}
]
}
],
"references": [
{
"url": "https://plugins.trac.wordpress.org/browser/the-post-grid/tags/7.4.2/app/Helpers/Fns.php#L1051",
"source": "security@wordfence.com"
"source": "security@wordfence.com",
"tags": [
"Product"
]
},
{
"url": "https://plugins.trac.wordpress.org/changeset/3080313/#file347",
"source": "security@wordfence.com"
"source": "security@wordfence.com",
"tags": [
"Patch"
]
},
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/fc870ce5-1352-43f2-b80b-45065ceed750?source=cve",
"source": "security@wordfence.com"
"source": "security@wordfence.com",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,9 @@
"id": "CVE-2024-1931",
"sourceIdentifier": "sep@nlnetlabs.nl",
"published": "2024-03-07T10:15:07.037",
"lastModified": "2024-04-28T04:15:11.000",
"lastModified": "2024-07-03T15:15:05.560",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
@ -63,6 +64,10 @@
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RBR4H7RCVMJ6H76S4LLRSY5EBFTYWGXK/",
"source": "sep@nlnetlabs.nl"
},
{
"url": "https://lists.freebsd.org/archives/freebsd-security/2024-July/000283.html",
"source": "sep@nlnetlabs.nl"
},
{
"url": "https://www.nlnetlabs.nl/downloads/unbound/CVE-2024-1931.txt",
"source": "sep@nlnetlabs.nl"

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-27857",
"sourceIdentifier": "product-security@apple.com",
"published": "2024-06-10T21:15:51.833",
"lastModified": "2024-07-03T01:51:14.753",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2024-07-03T15:43:17.007",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -17,6 +17,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
@ -40,6 +60,16 @@
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-119"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
@ -51,42 +81,113 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*",
"versionEndExcluding": "17.5",
"matchCriteriaId": "E7F2E11C-4A7D-4E71-BFAA-396B0549F649"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*",
"versionEndExcluding": "17.5",
"matchCriteriaId": "E9C4B45E-AF58-4D7C-B73A-618B06AED56E"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*",
"versionStartIncluding": "14.0",
"versionEndExcluding": "14.5",
"matchCriteriaId": "6AB18623-7D06-4946-99FC-808A4A913ED9"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*",
"versionEndExcluding": "17.5",
"matchCriteriaId": "003383BF-F06C-4300-908D-D1C8498C6BCD"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:apple:visionos:*:*:*:*:*:*:*:*",
"versionEndExcluding": "1.2",
"matchCriteriaId": "20FA533E-AA15-4561-AAF1-F8C3F5283C88"
}
]
}
]
}
],
"references": [
{
"url": "http://seclists.org/fulldisclosure/2024/Jun/5",
"source": "product-security@apple.com"
"source": "product-security@apple.com",
"tags": [
"Mailing List",
"Third Party Advisory"
]
},
{
"url": "https://support.apple.com/en-us/HT214101",
"source": "product-security@apple.com"
"source": "product-security@apple.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://support.apple.com/en-us/HT214102",
"source": "product-security@apple.com"
"source": "product-security@apple.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://support.apple.com/en-us/HT214106",
"source": "product-security@apple.com"
"source": "product-security@apple.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://support.apple.com/en-us/HT214108",
"source": "product-security@apple.com"
"source": "product-security@apple.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://support.apple.com/kb/HT214101",
"source": "product-security@apple.com"
"source": "product-security@apple.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://support.apple.com/kb/HT214102",
"source": "product-security@apple.com"
"source": "product-security@apple.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://support.apple.com/kb/HT214106",
"source": "product-security@apple.com"
"source": "product-security@apple.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://support.apple.com/kb/HT214108",
"source": "product-security@apple.com"
"source": "product-security@apple.com",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,9 @@
"id": "CVE-2024-27885",
"sourceIdentifier": "product-security@apple.com",
"published": "2024-06-10T21:15:51.903",
"lastModified": "2024-06-11T13:54:12.057",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2024-07-03T15:44:29.397",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
"lang": "en",
@ -14,31 +15,116 @@
"value": "Este problema se solucion\u00f3 con una validaci\u00f3n mejorada de los enlaces simb\u00f3licos. Este problema se solucion\u00f3 en macOS Sonoma 14.5, macOS Ventura 13.6.7, macOS Monterey 12.7.5. Es posible que una aplicaci\u00f3n pueda modificar partes protegidas del sistema de archivos."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:N/I:H/A:N",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"availabilityImpact": "NONE",
"baseScore": 6.3,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.8,
"impactScore": 4.0
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-59"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*",
"versionEndExcluding": "12.7.5",
"matchCriteriaId": "3121F2A4-6F9C-4E03-837E-2A4C2B65CB09"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*",
"versionStartIncluding": "13.0",
"versionEndExcluding": "13.6.7",
"matchCriteriaId": "2D797210-B0F0-44AE-9028-47C18C22AFA5"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*",
"versionStartIncluding": "14.0",
"versionEndExcluding": "14.5",
"matchCriteriaId": "6AB18623-7D06-4946-99FC-808A4A913ED9"
}
]
}
]
}
],
"references": [
{
"url": "https://support.apple.com/en-us/HT214105",
"source": "product-security@apple.com"
"source": "product-security@apple.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://support.apple.com/en-us/HT214106",
"source": "product-security@apple.com"
"source": "product-security@apple.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://support.apple.com/en-us/HT214107",
"source": "product-security@apple.com"
"source": "product-security@apple.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://support.apple.com/kb/HT214105",
"source": "product-security@apple.com"
"source": "product-security@apple.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://support.apple.com/kb/HT214106",
"source": "product-security@apple.com"
"source": "product-security@apple.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://support.apple.com/kb/HT214107",
"source": "product-security@apple.com"
"source": "product-security@apple.com",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -0,0 +1,60 @@
{
"id": "CVE-2024-32937",
"sourceIdentifier": "talos-cna@cisco.com",
"published": "2024-07-03T14:15:05.340",
"lastModified": "2024-07-03T15:15:05.803",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "An os command injection vulnerability exists in the CWMP SelfDefinedTimeZone functionality of Grandstream GXP2135 1.0.9.129, 1.0.11.74 and 1.0.11.79. A specially crafted network packet can lead to arbitrary command execution. An attacker can send a sequence of malicious packets to trigger this vulnerability."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "talos-cna@cisco.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "HIGH",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.1,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.2,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "talos-cna@cisco.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-78"
}
]
}
],
"references": [
{
"url": "https://talosintelligence.com/vulnerability_reports/TALOS-2024-1978",
"source": "talos-cna@cisco.com"
},
{
"url": "https://www.talosintelligence.com/vulnerability_reports/TALOS-2024-1978",
"source": "talos-cna@cisco.com"
}
]
}

View File

@ -2,17 +2,41 @@
"id": "CVE-2024-34696",
"sourceIdentifier": "security-advisories@github.com",
"published": "2024-07-01T15:15:16.907",
"lastModified": "2024-07-01T16:37:39.040",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-07-03T14:42:49.743",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "GeoServer is an open source server that allows users to share and edit geospatial data. Starting in version 2.10.0 and prior to versions 2.24.4 and 2.25.1, GeoServer's Server Status page and REST API lists all environment variables and Java properties to any GeoServer user with administrative rights as part of those modules' status message. These variables/properties can also contain sensitive information, such as database passwords or API keys/tokens. Additionally, many community-developed GeoServer container images `export` other credentials from their start-up scripts as environment variables to the GeoServer (`java`) process. The precise scope of the issue depends on which container image is used and how it is configured.\n\nThe `about status` API endpoint which powers the Server Status page is only available to administrators.Depending on the operating environment, administrators might have legitimate access to credentials in other ways, but this issue defeats more sophisticated controls (like break-glass access to secrets or role accounts).By default, GeoServer only allows same-origin authenticated API access. This limits the scope for a third-party attacker to use an administrator\u2019s credentials to gain access to credentials. The researchers who found the vulnerability were unable to determine any other conditions under which the GeoServer REST API may be available more broadly.\n\nUsers should update container images to use GeoServer 2.24.4 or 2.25.1 to get the bug fix. As a workaround, leave environment variables and Java system properties hidden by default. Those who provide the option to re-enable it should communicate the impact and risks so that users can make an informed choice."
},
{
"lang": "es",
"value": "GeoServer es un servidor de c\u00f3digo abierto que permite a los usuarios compartir y editar datos geoespaciales. A partir de la versi\u00f3n 2.10.0 y antes de las versiones 2.24.4 y 2.25.1, la p\u00e1gina Estado del servidor de GeoServer y la API REST enumeran todas las variables de entorno y propiedades de Java para cualquier usuario de GeoServer con derechos administrativos como parte del mensaje de estado de esos m\u00f3dulos. Estas variables/propiedades tambi\u00e9n pueden contener informaci\u00f3n confidencial, como contrase\u00f1as de bases de datos o keys/tokens API. Adem\u00e1s, muchas im\u00e1genes de contenedores de GeoServer desarrolladas por la comunidad \"exportan\" otras credenciales desde sus scripts de inicio como variables de entorno al proceso de GeoServer (\"java\"). El alcance preciso del problema depende de qu\u00e9 imagen de contenedor se utiliza y c\u00f3mo est\u00e1 configurada. El endpoint API \"acerca del estado\" que impulsa la p\u00e1gina Estado del servidor solo est\u00e1 disponible para los administradores. Dependiendo del entorno operativo, los administradores pueden tener acceso leg\u00edtimo a las credenciales de otras maneras, pero este problema anula controles m\u00e1s sofisticados (como el acceso sin barreras a secretos o cuentas de rol). De forma predeterminada, GeoServer solo permite el acceso API autenticado del mismo origen. Esto limita las posibilidades de que un atacante externo utilice las credenciales de un administrador para obtener acceso a las credenciales. Los investigadores que encontraron la vulnerabilidad no pudieron determinar otras condiciones bajo las cuales la API REST de GeoServer pueda estar disponible de manera m\u00e1s amplia. Los usuarios deben actualizar las im\u00e1genes del contenedor para usar GeoServer 2.24.4 o 2.25.1 para corregir el error. Como workaround, deje las variables de entorno y las propiedades del sistema Java ocultas de forma predeterminada. Quienes brinden la opci\u00f3n de volver a habilitarlo deben comunicar el impacto y los riesgos para que los usuarios puedan tomar una decisi\u00f3n informada."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.9,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.2,
"impactScore": 3.6
},
{
"source": "security-advisories@github.com",
"type": "Secondary",
@ -36,6 +60,16 @@
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
},
{
"source": "security-advisories@github.com",
"type": "Secondary",
@ -47,10 +81,39 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:geoserver:geoserver:*:*:*:*:*:*:*:*",
"versionStartIncluding": "2.10.0",
"versionEndExcluding": "2.24.4",
"matchCriteriaId": "779270D7-89BA-47CA-A5E5-4539668BC18E"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:geoserver:geoserver:*:*:*:*:*:*:*:*",
"versionStartIncluding": "2.25.0",
"versionEndExcluding": "2.25.1",
"matchCriteriaId": "F63F5E42-FB6D-4264-BF8A-17DEB863054C"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/geoserver/geoserver/security/advisories/GHSA-j59v-vgcr-hxvf",
"source": "security-advisories@github.com"
"source": "security-advisories@github.com",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,17 +2,41 @@
"id": "CVE-2024-36401",
"sourceIdentifier": "security-advisories@github.com",
"published": "2024-07-01T16:15:04.120",
"lastModified": "2024-07-01T16:37:39.040",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-07-03T15:07:42.777",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "GeoServer is an open source server that allows users to share and edit geospatial data. Prior to versions 2.23.6, 2.24.4, and 2.25.2, multiple OGC request parameters allow Remote Code Execution (RCE) by unauthenticated users through specially crafted input against a default GeoServer installation due to unsafely evaluating property names as XPath expressions.\n\nThe GeoTools library API that GeoServer calls evaluates property/attribute names for feature types in a way that unsafely passes them to the commons-jxpath library which can execute arbitrary code when evaluating XPath expressions. This XPath evaluation is intended to be used only by complex feature types (i.e., Application Schema data stores) but is incorrectly being applied to simple feature types as well which makes this vulnerability apply to **ALL** GeoServer instances. No public PoC is provided but this vulnerability has been confirmed to be exploitable through WFS GetFeature, WFS GetPropertyValue, WMS GetMap, WMS GetFeatureInfo, WMS GetLegendGraphic and WPS Execute requests. This vulnerability can lead to executing arbitrary code.\n\nVersions 2.23.6, 2.24.4, and 2.25.2 contain a patch for the issue. A workaround exists by removing the `gt-complex-x.y.jar` file from the GeoServer where `x.y` is the GeoTools version (e.g., `gt-complex-31.1.jar` if running GeoServer 2.25.1). This will remove the vulnerable code from GeoServer but may break some GeoServer functionality or prevent GeoServer from deploying if the gt-complex module is needed."
},
{
"lang": "es",
"value": "GeoServer es un servidor de c\u00f3digo abierto que permite a los usuarios compartir y editar datos geoespaciales. Antes de las versiones 2.23.6, 2.24.4 y 2.25.2, varios par\u00e1metros de solicitud de OGC permit\u00edan la ejecuci\u00f3n remota de c\u00f3digo (RCE) por parte de usuarios no autenticados a trav\u00e9s de entradas especialmente dise\u00f1adas en una instalaci\u00f3n predeterminada de GeoServer debido a la evaluaci\u00f3n insegura de nombres de propiedades como expresiones XPath. La API de la librer\u00eda GeoTools a la que llama GeoServer eval\u00faa los nombres de propiedades/atributos para tipos de entidades de una manera que los pasa de manera insegura a la librer\u00eda commons-jxpath, que puede ejecutar c\u00f3digo arbitrario al evaluar expresiones XPath. Esta evaluaci\u00f3n XPath est\u00e1 destinada a ser utilizada \u00fanicamente por tipos de funciones complejas (es decir, almacenes de datos de esquemas de aplicaci\u00f3n), pero tambi\u00e9n se aplica incorrectamente a tipos de funciones simples, lo que hace que esta vulnerabilidad se aplique a **TODAS** las instancias de GeoServer. No se proporciona ninguna PoC p\u00fablica, pero se ha confirmado que esta vulnerabilidad es explotable a trav\u00e9s de solicitudes WFS GetFeature, WFS GetPropertyValue, WMS GetMap, WMS GetFeatureInfo, WMS GetLegendGraphic y WPS Execute. Esta vulnerabilidad puede llevar a la ejecuci\u00f3n de c\u00f3digo arbitrario. Las versiones 2.23.6, 2.24.4 y 2.25.2 contienen un parche para el problema. Existe una workaround eliminando el archivo `gt-complex-xyjar` del GeoServer donde `xy` es la versi\u00f3n de GeoTools (por ejemplo, `gt-complex-31.1.jar` si ejecuta GeoServer 2.25.1). Esto eliminar\u00e1 el c\u00f3digo vulnerable de GeoServer, pero puede interrumpir algunas funciones de GeoServer o evitar que GeoServer se implemente si se necesita el m\u00f3dulo gt-complex."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
},
{
"source": "security-advisories@github.com",
"type": "Secondary",
@ -36,6 +60,16 @@
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-94"
}
]
},
{
"source": "security-advisories@github.com",
"type": "Secondary",
@ -47,26 +81,97 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:geoserver:geoserver:*:*:*:*:*:*:*:*",
"versionEndExcluding": "2.23.6",
"matchCriteriaId": "9C28BE03-93E6-4FC4-AA6E-00E41AF25CB0"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:geoserver:geoserver:*:*:*:*:*:*:*:*",
"versionStartIncluding": "2.24.0",
"versionEndExcluding": "2.24.4",
"matchCriteriaId": "6A407E94-A7F2-4A4F-B96E-2B3DC8FF6DF3"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:geoserver:geoserver:*:*:*:*:*:*:*:*",
"versionStartIncluding": "2.25.0",
"versionEndExcluding": "2.25.2",
"matchCriteriaId": "CFBAEC7A-6250-45FE-AB54-30D72C03F62D"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:geotools:geotools:*:*:*:*:*:*:*:*",
"versionEndExcluding": "29.6",
"matchCriteriaId": "732DE428-3515-459F-AE5F-08407BA1A049"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:geotools:geotools:*:*:*:*:*:*:*:*",
"versionStartIncluding": "30.0",
"versionEndExcluding": "30.4",
"matchCriteriaId": "D3B2BC3D-0015-4E5D-979A-AB7D18185A57"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:geotools:geotools:*:*:*:*:*:*:*:*",
"versionStartIncluding": "31.0",
"versionEndExcluding": "31.2",
"matchCriteriaId": "50BB4154-B19C-4BFD-8E88-9ED445680706"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/Warxim/CVE-2022-41852?tab=readme-ov-file#workaround-for-cve-2022-41852",
"source": "security-advisories@github.com"
"source": "security-advisories@github.com",
"tags": [
"Exploit",
"Third Party Advisory"
]
},
{
"url": "https://github.com/geoserver/geoserver/security/advisories/GHSA-6jj6-gm7p-fcvv",
"source": "security-advisories@github.com"
"source": "security-advisories@github.com",
"tags": [
"Mitigation",
"Vendor Advisory"
]
},
{
"url": "https://github.com/geotools/geotools/pull/4797",
"source": "security-advisories@github.com"
"source": "security-advisories@github.com",
"tags": [
"Issue Tracking",
"Patch"
]
},
{
"url": "https://github.com/geotools/geotools/security/advisories/GHSA-w3pj-wh35-fq8w",
"source": "security-advisories@github.com"
"source": "security-advisories@github.com",
"tags": [
"Exploit",
"Vendor Advisory"
]
},
{
"url": "https://osgeo-org.atlassian.net/browse/GEOT-7587",
"source": "security-advisories@github.com"
"source": "security-advisories@github.com",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,17 +2,41 @@
"id": "CVE-2024-36420",
"sourceIdentifier": "security-advisories@github.com",
"published": "2024-07-01T16:15:04.377",
"lastModified": "2024-07-01T16:37:39.040",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-07-03T15:29:45.557",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Flowise is a drag & drop user interface to build a customized large language model flow. In version 1.4.3 of Flowise, the `/api/v1/openai-assistants-file` endpoint in `index.ts` is vulnerable to arbitrary file read due to lack of sanitization of the `fileName` body parameter. No known patches for this issue are available."
},
{
"lang": "es",
"value": "Flowise es una interfaz de usuario de arrastrar y soltar para crear un flujo de modelo de lenguaje grande personalizado. En la versi\u00f3n 1.4.3 de Flowise, el endpoint `/api/v1/openai-assistants-file` en `index.ts` es vulnerable a la lectura arbitraria de archivos debido a la falta de sanitizaci\u00f3n del par\u00e1metro del cuerpo `fileName`. No hay parches conocidos disponibles para este problema."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 7.5,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
},
{
"source": "security-advisories@github.com",
"type": "Secondary",
@ -36,6 +60,16 @@
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-74"
}
]
},
{
"source": "security-advisories@github.com",
"type": "Secondary",
@ -47,14 +81,38 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:flowiseai:flowise:1.4.3:*:*:*:*:*:*:*",
"matchCriteriaId": "46DEFB82-D429-4A21-A963-B9DD1EB58AD5"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/FlowiseAI/Flowise/blob/e93ce07851cdc0fcde12374f301b8070f2043687/packages/server/src/index.ts#L982",
"source": "security-advisories@github.com"
"source": "security-advisories@github.com",
"tags": [
"Product"
]
},
{
"url": "https://securitylab.github.com/advisories/GHSL-2023-232_GHSL-2023-234_Flowise/",
"source": "security-advisories@github.com"
"source": "security-advisories@github.com",
"tags": [
"Exploit",
"Third Party Advisory"
]
}
]
}

View File

@ -2,17 +2,41 @@
"id": "CVE-2024-36421",
"sourceIdentifier": "security-advisories@github.com",
"published": "2024-07-01T16:15:04.623",
"lastModified": "2024-07-01T16:37:39.040",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-07-03T15:36:31.170",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Flowise is a drag & drop user interface to build a customized large language model flow. In version 1.4.3 of Flowise, A CORS misconfiguration sets the Access-Control-Allow-Origin header to all, allowing arbitrary origins to connect to the website. In the default configuration (unauthenticated), arbitrary origins may be able to make requests to Flowise, stealing information from the user. This CORS misconfiguration may be chained with the path injection to allow an attacker attackers without access to Flowise to read arbitrary files from the Flowise server. As of time of publication, no known patches are available."
},
{
"lang": "es",
"value": "Flowise es una interfaz de usuario de arrastrar y soltar para crear un flujo de modelo de lenguaje grande personalizado. En la versi\u00f3n 1.4.3 de Flowise, una mala configuraci\u00f3n de CORS establece el encabezado Access-Control-Allow-Origin en todos, lo que permite que or\u00edgenes arbitrarios se conecten al sitio web. En la configuraci\u00f3n predeterminada (no autenticado), or\u00edgenes arbitrarios pueden realizar solicitudes a Flowise, robando informaci\u00f3n del usuario. Esta configuraci\u00f3n err\u00f3nea de CORS puede estar encadenada con la inyecci\u00f3n de ruta para permitir que un atacante sin acceso a Flowise lea archivos arbitrarios del servidor Flowise. Al momento de la publicaci\u00f3n, no hay parches conocidos disponibles."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 7.5,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
},
{
"source": "security-advisories@github.com",
"type": "Secondary",
@ -36,6 +60,16 @@
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-346"
}
]
},
{
"source": "security-advisories@github.com",
"type": "Secondary",
@ -47,14 +81,38 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:flowiseai:flowise:1.4.3:*:*:*:*:*:*:*",
"matchCriteriaId": "46DEFB82-D429-4A21-A963-B9DD1EB58AD5"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/FlowiseAI/Flowise/blob/e93ce07851cdc0fcde12374f301b8070f2043687/packages/server/src/index.ts#L122",
"source": "security-advisories@github.com"
"source": "security-advisories@github.com",
"tags": [
"Product"
]
},
{
"url": "https://securitylab.github.com/advisories/GHSL-2023-232_GHSL-2023-234_Flowise/",
"source": "security-advisories@github.com"
"source": "security-advisories@github.com",
"tags": [
"Exploit",
"Third Party Advisory"
]
}
]
}

View File

@ -2,17 +2,41 @@
"id": "CVE-2024-36422",
"sourceIdentifier": "security-advisories@github.com",
"published": "2024-07-01T16:15:04.860",
"lastModified": "2024-07-01T16:37:39.040",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-07-03T15:38:24.297",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Flowise is a drag & drop user interface to build a customized large language model flow. In version 1.4.3 of Flowise, a reflected cross-site scripting vulnerability occurs in the `api/v1/chatflows/id` endpoint. If the default configuration is used (unauthenticated), an attacker may be able to craft a specially crafted URL that injects Javascript into the user sessions, allowing the attacker to steal information, create false popups, or even redirect the user to other websites without interaction. If the chatflow ID is not found, its value is reflected in the 404 page, which has type text/html. This allows an attacker to attach arbitrary scripts to the page, allowing an attacker to steal sensitive information. This XSS may be chained with the path injection to allow an attacker without direct access to Flowise to read arbitrary files from the Flowise server. As of time of publication, no known patches are available."
},
{
"lang": "es",
"value": "Flowise es una interfaz de usuario de arrastrar y soltar para crear un flujo de modelo de lenguaje grande personalizado. En la versi\u00f3n 1.4.3 de Flowise, se produce una vulnerabilidad de cross-site scripting reflejado en el endpoint `api/v1/chatflows/id`. Si se utiliza la configuraci\u00f3n predeterminada (no autenticada), un atacante puede crear una URL especialmente manipulada que inyecta Javascript en las sesiones del usuario, lo que le permite robar informaci\u00f3n, crear ventanas emergentes falsas o incluso redirigir al usuario a otros sitios web sin interacci\u00f3n. Si no se encuentra el ID del flujo de chat, su valor se refleja en la p\u00e1gina 404, que tiene el tipo texto/html. Esto permite a un atacante adjuntar scripts arbitrarios a la p\u00e1gina, lo que le permite robar informaci\u00f3n confidencial. Este XSS puede encadenarse con la inyecci\u00f3n de ruta para permitir que un atacante sin acceso directo a Flowise lea archivos arbitrarios del servidor Flowise. Al momento de la publicaci\u00f3n, no hay parches conocidos disponibles."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 6.1,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 2.7
},
{
"source": "security-advisories@github.com",
"type": "Secondary",
@ -36,6 +60,16 @@
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
},
{
"source": "security-advisories@github.com",
"type": "Secondary",
@ -47,14 +81,38 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:flowiseai:flowise:1.4.3:*:*:*:*:*:*:*",
"matchCriteriaId": "46DEFB82-D429-4A21-A963-B9DD1EB58AD5"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/FlowiseAI/Flowise/blob/flowise-ui%401.4.0/packages/server/src/index.ts#L312-L312",
"source": "security-advisories@github.com"
"source": "security-advisories@github.com",
"tags": [
"Product"
]
},
{
"url": "https://securitylab.github.com/advisories/GHSL-2023-232_GHSL-2023-234_Flowise/",
"source": "security-advisories@github.com"
"source": "security-advisories@github.com",
"tags": [
"Exploit",
"Third Party Advisory"
]
}
]
}

View File

@ -0,0 +1,21 @@
{
"id": "CVE-2024-37726",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-07-03T14:15:06.120",
"lastModified": "2024-07-03T14:15:06.120",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Insecure Permissions vulnerability in Micro-Star International Co., Ltd MSI Center v.2.0.36.0 allows a local attacker to escalate privileges via the Export System Info function in MSI.CentralServer.exe"
}
],
"metrics": {},
"references": [
{
"url": "https://github.com/carsonchan12345/CVE-2024-37726-MSI-Center-Local-Privilege-Escalation",
"source": "cve@mitre.org"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-37741",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-06-28T13:15:02.860",
"lastModified": "2024-07-03T02:04:40.153",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2024-07-03T14:27:08.057",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -17,6 +17,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 5.4,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.3,
"impactScore": 2.7
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
@ -40,6 +60,16 @@
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
@ -51,18 +81,57 @@
]
}
],
"configurations": [
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:openplcproject:openplc_v3_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "7624BE59-886B-421D-96CC-105F185AE070"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:openplcproject:openplc_v3:-:*:*:*:*:*:*:*",
"matchCriteriaId": "6861E863-E6AC-4BFB-8CDE-2328A045540D"
}
]
}
]
}
],
"references": [
{
"url": "https://1d8.github.io/cves/cve_2024_37741/",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Exploit"
]
},
{
"url": "https://github.com/thiagoralves/OpenPLC_v3/blob/9cd8f1b53a50f9d38708096bfc72bcbb1ef47343/webserver/pages.py#L992",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Product"
]
},
{
"url": "https://github.com/thiagoralves/OpenPLC_v3/issues/242",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking"
]
}
]
}

View File

@ -2,17 +2,54 @@
"id": "CVE-2024-3800",
"sourceIdentifier": "cvd@cert.pl",
"published": "2024-06-28T13:15:02.990",
"lastModified": "2024-06-28T13:38:47.077",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-07-03T14:36:22.273",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Sites managed in S@M CMS (Concept Intermedia) might be vulnerable to Reflected XSS\u00a0via including scripts in requested file names.\u00a0\nOnly a part of observed services is vulnerable, but since vendor has not investigated the root problem, it is hard to determine when the issue appears."
},
{
"lang": "es",
"value": "Los sitios administrados en S@M CMS (Concept Intermedia) pueden ser vulnerables a XSS Reflejado al incluir scripts en los nombres de archivos solicitados. S\u00f3lo una parte de los servicios observados es vulnerable, pero como el proveedor no ha investigado la ra\u00edz del problema, es dif\u00edcil determinar cu\u00e1ndo aparece el problema."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 6.1,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 2.7
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
},
{
"source": "cvd@cert.pl",
"type": "Secondary",
@ -24,14 +61,38 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:conceptintermedia:s\\@m_cms:*:*:*:*:*:*:*:*",
"versionEndIncluding": "3.3",
"matchCriteriaId": "00A1AF5A-47FF-4080-A506-DB634A54CD6C"
}
]
}
]
}
],
"references": [
{
"url": "https://cert.pl/en/posts/2024/06/CVE-2024-3800",
"source": "cvd@cert.pl"
"source": "cvd@cert.pl",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://cert.pl/posts/2024/06/CVE-2024-3800",
"source": "cvd@cert.pl"
"source": "cvd@cert.pl",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,17 +2,54 @@
"id": "CVE-2024-3801",
"sourceIdentifier": "cvd@cert.pl",
"published": "2024-06-28T13:15:03.157",
"lastModified": "2024-06-28T13:38:47.077",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-07-03T14:36:52.797",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Sites managed in S@M CMS (Concept Intermedia) might be vulnerable to Reflected XSS\u00a0via including scripts in one of GET header parameters.\u00a0\nOnly a part of observed services is vulnerable, but since vendor has not investigated the root problem, it is hard to determine when the issue appears."
},
{
"lang": "es",
"value": "Los sitios administrados en S@M CMS (Concept Intermedia) pueden ser vulnerables a XSS Reflejado al incluir scripts en uno de los par\u00e1metros del encabezado GET. S\u00f3lo una parte de los servicios observados es vulnerable, pero como el proveedor no ha investigado la ra\u00edz del problema, es dif\u00edcil determinar cu\u00e1ndo aparece el problema."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 6.1,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 2.7
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
},
{
"source": "cvd@cert.pl",
"type": "Secondary",
@ -24,14 +61,38 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:conceptintermedia:s\\@m_cms:*:*:*:*:*:*:*:*",
"versionEndIncluding": "3.3",
"matchCriteriaId": "00A1AF5A-47FF-4080-A506-DB634A54CD6C"
}
]
}
]
}
],
"references": [
{
"url": "https://cert.pl/en/posts/2024/06/CVE-2024-3800",
"source": "cvd@cert.pl"
"source": "cvd@cert.pl",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://cert.pl/posts/2024/06/CVE-2024-3800",
"source": "cvd@cert.pl"
"source": "cvd@cert.pl",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,17 +2,54 @@
"id": "CVE-2024-3816",
"sourceIdentifier": "cvd@cert.pl",
"published": "2024-06-28T13:15:03.283",
"lastModified": "2024-06-28T13:38:47.077",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-07-03T14:37:07.750",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Sites managed in S@M CMS (Concept Intermedia) might be vulnerable to a blind SQL Injection executed using the search bar.\u00a0\nOnly a part of observed services is vulnerable, but since vendor has not investigated the root problem, it is hard to determine when the issue appears."
},
{
"lang": "es",
"value": "Los sitios administrados en S@M CMS (Concept Intermedia) pueden ser vulnerables a una inyecci\u00f3n SQL ciega ejecutada mediante la barra de b\u00fasqueda. S\u00f3lo una parte de los servicios observados es vulnerable, pero como el proveedor no ha investigado la ra\u00edz del problema, es dif\u00edcil determinar cu\u00e1ndo aparece el problema."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-89"
}
]
},
{
"source": "cvd@cert.pl",
"type": "Secondary",
@ -24,14 +61,38 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:conceptintermedia:s\\@m_cms:*:*:*:*:*:*:*:*",
"versionEndIncluding": "3.3",
"matchCriteriaId": "00A1AF5A-47FF-4080-A506-DB634A54CD6C"
}
]
}
]
}
],
"references": [
{
"url": "https://cert.pl/en/posts/2024/06/CVE-2024-3800",
"source": "cvd@cert.pl"
"source": "cvd@cert.pl",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://cert.pl/posts/2024/06/CVE-2024-3800",
"source": "cvd@cert.pl"
"source": "cvd@cert.pl",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -0,0 +1,25 @@
{
"id": "CVE-2024-39220",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-07-03T15:15:05.993",
"lastModified": "2024-07-03T15:15:05.993",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "BAS-IP AV-01D, AV-01MD, AV-01MFD, AV-01ED, AV-01KD, AV-01BD, AV-01KBD, AV-02D, AV-02IDE, AV-02IDR, AV-02IPD, AV-02FDE, AV-02FDR, AV-03D, AV-03BD, AV-04AFD, AV-04ASD, AV-04FD, AV-04SD, AV-05FD, AV-05SD, AA-07BD, AA-07BDI, BA-04BD, BA-04MD, BA-08BD, BA-08MD, BA-12BD, BA-12MD, CR-02BD before firmware v3.9.2 allows authenticated attackers to read SIP account passwords via a crafted GET request."
}
],
"metrics": {},
"references": [
{
"url": "https://bas-ip.com/bsa-000001",
"source": "cve@mitre.org"
},
{
"url": "https://github.com/DrieVlad/BAS-IP-vulnerabilities",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,29 @@
{
"id": "CVE-2024-39223",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-07-03T15:15:06.083",
"lastModified": "2024-07-03T15:15:06.083",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "An authentication bypass in the SSH service of gost v2.11.5 allows attackers to intercept communications via setting the HostKeyCallback function to ssh.InsecureIgnoreHostKey"
}
],
"metrics": {},
"references": [
{
"url": "https://gist.github.com/nyxfqq/a7242170b1118e78436a62dee4e09e8a",
"source": "cve@mitre.org"
},
{
"url": "https://github.com/ginuerzh/gost/blob/729d0e70005607dc7c69fc1de62fd8fe21f85355/ssh.go#L229",
"source": "cve@mitre.org"
},
{
"url": "https://github.com/ginuerzh/gost/issues/1034",
"source": "cve@mitre.org"
}
]
}

View File

@ -2,24 +2,87 @@
"id": "CVE-2024-39704",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-06-28T13:15:02.927",
"lastModified": "2024-06-28T13:38:47.077",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-07-03T14:32:56.510",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Soft Circle French-Bread Melty Blood: Actress Again: Current Code through 1.07 Rev. 1.4.0 allows a remote attacker to execute arbitrary code on a client's machine via a crafted packet on TCP port 46318."
},
{
"lang": "es",
"value": "Soft Circle French-Bread Melty Blood: Actress Again: Current Code hasta 1.07 Rev. 1.4.0 permite a un atacante remoto ejecutar c\u00f3digo arbitrario en la m\u00e1quina de un cliente a trav\u00e9s de un paquete manipulado en el puerto TCP 46318."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-74"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:unknown-corp:melty_blood_actress_again_current_code:*:*:*:*:*:*:*:*",
"versionEndIncluding": "1.07",
"matchCriteriaId": "AFE0E80B-E798-4931-9952-54D596CCE5A7"
}
]
}
]
}
],
"metrics": {},
"references": [
{
"url": "https://github.com/MikeIsAStar/Melty-Blood-Actress-Again-Current-Code-Remote-Code-Execution",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://pastebin.com/agpnQmhu",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Exploit"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-3999",
"sourceIdentifier": "contact@wpscan.com",
"published": "2024-07-02T06:15:04.050",
"lastModified": "2024-07-03T02:06:58.680",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-07-03T15:44:56.130",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -17,6 +17,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 4.8,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.7,
"impactScore": 2.7
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
@ -39,10 +59,44 @@
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:spider-themes:eazydocs:*:*:*:*:*:wordpress:*:*",
"versionEndExcluding": "2.5.0",
"matchCriteriaId": "D84E69AF-BB0B-4BB9-B5EA-6D03511649A9"
}
]
}
]
}
],
"references": [
{
"url": "https://wpscan.com/vulnerability/6a8a1deb-6836-40f1-856b-7b3e4ba867d6/",
"source": "contact@wpscan.com"
"source": "contact@wpscan.com",
"tags": [
"Exploit",
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-4627",
"sourceIdentifier": "contact@wpscan.com",
"published": "2024-07-02T06:15:04.400",
"lastModified": "2024-07-03T02:07:51.527",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-07-03T15:45:08.187",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -17,6 +17,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 5.4,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.3,
"impactScore": 2.7
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
@ -39,10 +59,44 @@
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:rankmath:seo:*:*:*:*:free:wordpress:*:*",
"versionEndExcluding": "1.0.219",
"matchCriteriaId": "D3446436-48C0-417A-A0E8-53AD3E2F8298"
}
]
}
]
}
],
"references": [
{
"url": "https://wpscan.com/vulnerability/c0058fcc-36f6-40bf-9848-fbe2d751d754/",
"source": "contact@wpscan.com"
"source": "contact@wpscan.com",
"tags": [
"Exploit",
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-5349",
"sourceIdentifier": "security@wordfence.com",
"published": "2024-07-02T05:15:10.470",
"lastModified": "2024-07-02T12:09:16.907",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-07-03T15:44:23.807",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -39,14 +39,50 @@
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-Other"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:la-studioweb:element_kit_for_elementor:*:*:*:*:*:wordpress:*:*",
"versionEndExcluding": "1.3.9",
"matchCriteriaId": "2AB75FE2-C692-4F70-8726-45F5000C98BF"
}
]
}
]
}
],
"references": [
{
"url": "https://plugins.trac.wordpress.org/changeset/3108501/lastudio-element-kit/trunk/includes/addons/google-maps.php",
"source": "security@wordfence.com"
"source": "security@wordfence.com",
"tags": [
"Patch"
]
},
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/2e29a67b-2b67-4cd5-a5ae-a931900c75cd?source=cve",
"source": "security@wordfence.com"
"source": "security@wordfence.com",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-5419",
"sourceIdentifier": "security@wordfence.com",
"published": "2024-07-02T04:15:03.417",
"lastModified": "2024-07-02T12:09:16.907",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-07-03T15:43:09.450",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -18,8 +18,28 @@
"metrics": {
"cvssMetricV31": [
{
"source": "security@wordfence.com",
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 5.4,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.3,
"impactScore": 2.7
},
{
"source": "security@wordfence.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N",
@ -39,18 +59,57 @@
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:voidcoders:void_contact_form_7_widget_for_elementor_page_builder:*:*:*:*:*:wordpress:*:*",
"versionEndExcluding": "2.4.1",
"matchCriteriaId": "135B2D6F-B132-456B-A8C8-317BD02A7DB2"
}
]
}
]
}
],
"references": [
{
"url": "https://plugins.trac.wordpress.org/browser/cf7-widget-elementor/tags/2.4/widgets/void-section-cf7.php#L1672",
"source": "security@wordfence.com"
"source": "security@wordfence.com",
"tags": [
"Product"
]
},
{
"url": "https://plugins.trac.wordpress.org/changeset/3109802/#file6",
"source": "security@wordfence.com"
"source": "security@wordfence.com",
"tags": [
"Patch"
]
},
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/2837c9b2-419e-453a-b011-5ec1ef050d62?source=cve",
"source": "security@wordfence.com"
"source": "security@wordfence.com",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-5606",
"sourceIdentifier": "contact@wpscan.com",
"published": "2024-07-02T06:15:04.760",
"lastModified": "2024-07-02T12:09:16.907",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-07-03T15:45:19.513",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -15,11 +15,68 @@
"value": "El complemento Quiz and Survey Master (QSM) WordPress anterior a 9.0.2 es vulnerable, no valida ni escapa el par\u00e1metro question_id en la acci\u00f3n AJAX qsm_bulk_delete_question_from_database, lo que lleva a una inyecci\u00f3n de SQL explotable por los Colaboradores y roles superiores."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-89"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:expresstech:quiz_and_survey_master:*:*:*:*:*:wordpress:*:*",
"versionEndExcluding": "9.0.2",
"matchCriteriaId": "57725447-AB0A-4B25-BB23-9292AFA5FB01"
}
]
}
]
}
],
"references": [
{
"url": "https://wpscan.com/vulnerability/e3eee6bc-1f69-4be1-b323-0c9b5fe7535e/",
"source": "contact@wpscan.com"
"source": "contact@wpscan.com",
"tags": [
"Exploit",
"Third Party Advisory"
]
}
]
}

View File

@ -2,13 +2,17 @@
"id": "CVE-2024-5735",
"sourceIdentifier": "cvd@cert.pl",
"published": "2024-06-28T12:15:10.117",
"lastModified": "2024-06-28T13:38:47.077",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-07-03T15:45:57.677",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Full Path Disclosure vulnerability in AdmirorFrames Joomla! extension in afHelper.php script allows an unauthorised attacker to retrieve location of web root folder.\u00a0This issue affects AdmirorFrames: before 5.0."
},
{
"lang": "es",
"value": "Vulnerabilidad de divulgaci\u00f3n de ruta completa en AdmirorFrames Joomla! La extensi\u00f3n en el script afHelper.php permite a un atacante no autorizado recuperar la ubicaci\u00f3n de la carpeta ra\u00edz web. Este problema afecta a AdmirorFrames: anteriores a 5.0."
}
],
"metrics": {
@ -55,9 +59,41 @@
"baseSeverity": "MEDIUM"
}
}
],
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 7.5,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-Other"
}
]
},
{
"source": "cvd@cert.pl",
"type": "Secondary",
@ -69,26 +105,61 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:admiror-design-studio:admirorframes:*:*:*:*:*:joomla\\!:*:*",
"versionEndExcluding": "5.0",
"matchCriteriaId": "C5EF0F23-1AE6-4174-96B5-D0ADAC6163BC"
}
]
}
]
}
],
"references": [
{
"url": "https://cert.pl/en/posts/2024/06/CVE-2024-5735/",
"source": "cvd@cert.pl"
"source": "cvd@cert.pl",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://cert.pl/posts/2024/06/CVE-2024-5735/",
"source": "cvd@cert.pl"
"source": "cvd@cert.pl",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://github.com/afine-com/CVE-2024-5735",
"source": "cvd@cert.pl"
"source": "cvd@cert.pl",
"tags": [
"Exploit",
"Third Party Advisory"
]
},
{
"url": "https://github.com/sectroyer/CVEs/tree/main/CVE-2024-5735",
"source": "cvd@cert.pl"
"source": "cvd@cert.pl",
"tags": [
"Exploit",
"Third Party Advisory"
]
},
{
"url": "https://github.com/vasiljevski/admirorframes/issues/3",
"source": "cvd@cert.pl"
"source": "cvd@cert.pl",
"tags": [
"Issue Tracking"
]
}
]
}

View File

@ -2,13 +2,17 @@
"id": "CVE-2024-5736",
"sourceIdentifier": "cvd@cert.pl",
"published": "2024-06-28T12:15:10.923",
"lastModified": "2024-06-28T13:38:47.077",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-07-03T15:46:08.877",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Server Side Request Forgery (SSRF) vulnerability in AdmirorFrames Joomla! extension in afGdStream.php script allows to access local files or server pages available only from localhost.\u00a0This issue affects AdmirorFrames: before 5.0."
},
{
"lang": "es",
"value": "Vulnerabilidad de Server Side Request Forgery (SSRF) en AdmirorFrames Joomla! La extensi\u00f3n en el script afGdStream.php permite acceder a archivos locales o p\u00e1ginas del servidor disponibles solo desde localhost. Este problema afecta a AdmirorFrames: anteriores a 5.0."
}
],
"metrics": {
@ -55,9 +59,41 @@
"baseSeverity": "HIGH"
}
}
],
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 7.5,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-918"
}
]
},
{
"source": "cvd@cert.pl",
"type": "Secondary",
@ -69,26 +105,61 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:admiror-design-studio:admirorframes:*:*:*:*:*:joomla\\!:*:*",
"versionEndExcluding": "5.0",
"matchCriteriaId": "C5EF0F23-1AE6-4174-96B5-D0ADAC6163BC"
}
]
}
]
}
],
"references": [
{
"url": "https://cert.pl/en/posts/2024/06/CVE-2024-5735/",
"source": "cvd@cert.pl"
"source": "cvd@cert.pl",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://cert.pl/posts/2024/06/CVE-2024-5735/",
"source": "cvd@cert.pl"
"source": "cvd@cert.pl",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://github.com/afine-com/CVE-2024-5736",
"source": "cvd@cert.pl"
"source": "cvd@cert.pl",
"tags": [
"Exploit",
"Third Party Advisory"
]
},
{
"url": "https://github.com/sectroyer/CVEs/tree/main/CVE-2024-5736",
"source": "cvd@cert.pl"
"source": "cvd@cert.pl",
"tags": [
"Exploit",
"Third Party Advisory"
]
},
{
"url": "https://github.com/vasiljevski/admirorframes/issues/3",
"source": "cvd@cert.pl"
"source": "cvd@cert.pl",
"tags": [
"Issue Tracking"
]
}
]
}

View File

@ -2,13 +2,17 @@
"id": "CVE-2024-5737",
"sourceIdentifier": "cvd@cert.pl",
"published": "2024-06-28T12:15:11.060",
"lastModified": "2024-06-28T13:38:47.077",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-07-03T14:09:22.483",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Script afGdStream.php in\u00a0AdmirorFrames Joomla! extension doesn\u2019t specify a content type and as a result default (text/html) is used. An attacker may embed HTML tags directly in image data which is rendered by a webpage as HTML.\u00a0This issue affects AdmirorFrames: before 5.0."
},
{
"lang": "es",
"value": "Script afGdStream.php en AdmirorFrames Joomla! La extensi\u00f3n no especifica un tipo de contenido y, como resultado, se utiliza el valor predeterminado (texto/html). Un atacante puede incrustar etiquetas HTML directamente en datos de im\u00e1genes que una p\u00e1gina web representa como HTML. Este problema afecta a AdmirorFrames: anteriores a 5.0."
}
],
"metrics": {
@ -55,9 +59,41 @@
"baseSeverity": "MEDIUM"
}
}
],
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 6.1,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 2.7
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
},
{
"source": "cvd@cert.pl",
"type": "Secondary",
@ -69,26 +105,61 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:admiror-design-studio:admirorframes:*:*:*:*:*:joomla\\!:*:*",
"versionEndExcluding": "5.0",
"matchCriteriaId": "C5EF0F23-1AE6-4174-96B5-D0ADAC6163BC"
}
]
}
]
}
],
"references": [
{
"url": "https://cert.pl/en/posts/2024/06/CVE-2024-5735/",
"source": "cvd@cert.pl"
"source": "cvd@cert.pl",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://cert.pl/posts/2024/06/CVE-2024-5735/",
"source": "cvd@cert.pl"
"source": "cvd@cert.pl",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://github.com/afine-com/CVE-2024-5737",
"source": "cvd@cert.pl"
"source": "cvd@cert.pl",
"tags": [
"Exploit",
"Third Party Advisory"
]
},
{
"url": "https://github.com/sectroyer/CVEs/tree/main/CVE-2024-5737",
"source": "cvd@cert.pl"
"source": "cvd@cert.pl",
"tags": [
"Exploit",
"Third Party Advisory"
]
},
{
"url": "https://github.com/vasiljevski/admirorframes/issues/3",
"source": "cvd@cert.pl"
"source": "cvd@cert.pl",
"tags": [
"Issue Tracking"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-5767",
"sourceIdentifier": "contact@wpscan.com",
"published": "2024-07-02T06:15:05.063",
"lastModified": "2024-07-02T12:09:16.907",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-07-03T15:26:29.050",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -15,11 +15,68 @@
"value": "El complemento sitetweet de WordPress hasta la versi\u00f3n 0.2 no tiene control CSRF en algunos lugares y le falta sanitizaci\u00f3n y escape, lo que podr\u00eda permitir a los atacantes hacer que el administrador que haya iniciado sesi\u00f3n agregue payloads XSS almacenado a trav\u00e9s de un ataque CSRF."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-352"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:sitetweet_project:sitetweet:*:*:*:*:*:wordpress:*:*",
"versionEndIncluding": "0.2",
"matchCriteriaId": "45A2DEB6-4F70-4E8A-9744-9EC3474517FD"
}
]
}
]
}
],
"references": [
{
"url": "https://wpscan.com/vulnerability/e4ba26b4-5f4f-4c9e-aa37-885b30ef8088/",
"source": "contact@wpscan.com"
"source": "contact@wpscan.com",
"tags": [
"Exploit",
"Third Party Advisory"
]
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2024-6052",
"sourceIdentifier": "security@checkmk.com",
"published": "2024-07-03T15:15:06.223",
"lastModified": "2024-07-03T15:15:06.223",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Stored XSS in Checkmk before versions 2.3.0p8, 2.2.0p29, 2.1.0p45, and 2.0.0 (EOL) allows users to execute arbitrary scripts by injecting HTML elements"
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security@checkmk.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW",
"baseScore": 6.5,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.3,
"impactScore": 3.7
}
]
},
"weaknesses": [
{
"source": "security@checkmk.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-80"
}
]
}
],
"references": [
{
"url": "https://checkmk.com/werk/17010",
"source": "security@checkmk.com"
}
]
}

View File

@ -0,0 +1,60 @@
{
"id": "CVE-2024-6126",
"sourceIdentifier": "secalert@redhat.com",
"published": "2024-07-03T15:15:06.470",
"lastModified": "2024-07-03T15:15:06.470",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A flaw was found in the cockpit package. This flaw allows an authenticated user to kill any process when enabling the pam_env's user_readenv option, which leads to a denial of service (DoS) attack."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "secalert@redhat.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:C/C:N/I:N/A:L",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "LOW",
"baseScore": 3.2,
"baseSeverity": "LOW"
},
"exploitabilityScore": 1.5,
"impactScore": 1.4
}
]
},
"weaknesses": [
{
"source": "secalert@redhat.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-400"
}
]
}
],
"references": [
{
"url": "https://access.redhat.com/security/cve/CVE-2024-6126",
"source": "secalert@redhat.com"
},
{
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2292897",
"source": "secalert@redhat.com"
}
]
}

View File

@ -2,17 +2,41 @@
"id": "CVE-2024-6375",
"sourceIdentifier": "cna@mongodb.com",
"published": "2024-07-01T15:15:17.430",
"lastModified": "2024-07-01T16:37:39.040",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-07-03T14:54:52.427",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A command for refining a collection shard key is missing an authorization check. This may cause the command to run directly on a shard, leading to either degradation of query performance, or to revealing chunk boundaries through timing side channels. This affects MongoDB Server v5.0 versions, prior to 5.0.22, MongoDB Server v6.0 versions, prior to 6.0.11 and MongoDB Server v7.0 versions prior to 7.0.3."
},
{
"lang": "es",
"value": "A un comando para refinar una clave de fragmento de colecci\u00f3n le falta una verificaci\u00f3n de autorizaci\u00f3n. Esto puede hacer que el comando se ejecute directamente en un fragmento, lo que provoca una degradaci\u00f3n del rendimiento de la consulta o revela l\u00edmites de fragmentos a trav\u00e9s de canales laterales de temporizaci\u00f3n. Esto afecta a las versiones de MongoDB Server v5.0, anteriores a la 5.0.22, a las versiones de MongoDB Server v6.0, anteriores a la 6.0.11 y a las versiones de MongoDB Server v7.0 anteriores a la 7.0.3."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"availabilityImpact": "LOW",
"baseScore": 6.5,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 3.9,
"impactScore": 2.5
},
{
"source": "cna@mongodb.com",
"type": "Secondary",
@ -36,6 +60,16 @@
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-862"
}
]
},
{
"source": "cna@mongodb.com",
"type": "Secondary",
@ -47,10 +81,48 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:mongodb:mongodb:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.0.0",
"versionEndExcluding": "5.0.22",
"matchCriteriaId": "52107780-5C9C-4DE0-9D16-89F128662C49"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:mongodb:mongodb:*:*:*:*:*:*:*:*",
"versionStartIncluding": "6.0.0",
"versionEndExcluding": "6.0.11",
"matchCriteriaId": "E8EEF504-8B18-4258-89AA-CDA99F3E5875"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:mongodb:mongodb:*:*:*:*:*:*:*:*",
"versionStartIncluding": "7.0.0",
"versionEndExcluding": "7.0.3",
"matchCriteriaId": "301B06FC-E692-4D15-8E45-86268D648D6C"
}
]
}
]
}
],
"references": [
{
"url": "https://jira.mongodb.org/browse/SERVER-79327",
"source": "cna@mongodb.com"
"source": "cna@mongodb.com",
"tags": [
"Issue Tracking",
"Patch",
"Vendor Advisory"
]
}
]
}

View File

@ -2,17 +2,41 @@
"id": "CVE-2024-6376",
"sourceIdentifier": "cna@mongodb.com",
"published": "2024-07-01T15:15:17.673",
"lastModified": "2024-07-01T16:37:39.040",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-07-03T15:04:52.463",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "MongoDB Compass may be susceptible to code injection due to insufficient sandbox protection settings with the usage of ejson shell parser in Compass' connection handling. This issue affects MongoDB Compass versions prior to version 1.42.2"
},
{
"lang": "es",
"value": "MongoDB Compass puede ser susceptible a la inyecci\u00f3n de c\u00f3digo debido a una configuraci\u00f3n insuficiente de protecci\u00f3n de la zona de pruebas con el uso del analizador de shell ejson en el manejo de conexiones de Compass. Este problema afecta a las versiones de MongoDB Compass anteriores a la versi\u00f3n 1.42.2"
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
},
{
"source": "cna@mongodb.com",
"type": "Secondary",
@ -36,6 +60,16 @@
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-94"
}
]
},
{
"source": "cna@mongodb.com",
"type": "Secondary",
@ -47,10 +81,33 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:mongodb:compass:*:*:*:*:*:*:*:*",
"versionEndExcluding": "1.42.2",
"matchCriteriaId": "2C0CC548-DDB4-4527-AEBC-1993B3E39EDA"
}
]
}
]
}
],
"references": [
{
"url": "https://jira.mongodb.org/browse/COMPASS-7496",
"source": "cna@mongodb.com"
"source": "cna@mongodb.com",
"tags": [
"Issue Tracking",
"Patch",
"Vendor Advisory"
]
}
]
}

View File

@ -0,0 +1,137 @@
{
"id": "CVE-2024-6471",
"sourceIdentifier": "cna@vuldb.com",
"published": "2024-07-03T14:15:06.490",
"lastModified": "2024-07-03T14:15:06.490",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability classified as critical has been found in SourceCodester Online Tours & Travels Management 1.0. This affects an unknown part of the file sms_setting.php. The manipulation of the argument uname leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-270279."
}
],
"metrics": {
"cvssMetricV40": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "4.0",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"vulnerableSystemConfidentiality": "LOW",
"vulnerableSystemIntegrity": "LOW",
"vulnerableSystemAvailability": "LOW",
"subsequentSystemConfidentiality": "NONE",
"subsequentSystemIntegrity": "NONE",
"subsequentSystemAvailability": "NONE",
"exploitMaturity": "NOT_DEFINED",
"confidentialityRequirements": "NOT_DEFINED",
"integrityRequirements": "NOT_DEFINED",
"availabilityRequirements": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnerableSystemConfidentiality": "NOT_DEFINED",
"modifiedVulnerableSystemIntegrity": "NOT_DEFINED",
"modifiedVulnerableSystemAvailability": "NOT_DEFINED",
"modifiedSubsequentSystemConfidentiality": "NOT_DEFINED",
"modifiedSubsequentSystemIntegrity": "NOT_DEFINED",
"modifiedSubsequentSystemAvailability": "NOT_DEFINED",
"safety": "NOT_DEFINED",
"automatable": "NOT_DEFINED",
"recovery": "NOT_DEFINED",
"valueDensity": "NOT_DEFINED",
"vulnerabilityResponseEffort": "NOT_DEFINED",
"providerUrgency": "NOT_DEFINED",
"baseScore": 5.3,
"baseSeverity": "MEDIUM"
}
}
],
"cvssMetricV31": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW",
"baseScore": 6.3,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 3.4
}
],
"cvssMetricV2": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P",
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "SINGLE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"availabilityImpact": "PARTIAL",
"baseScore": 6.5
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 8.0,
"impactScore": 6.4,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-89"
}
]
}
],
"references": [
{
"url": "https://blog.csdn.net/ENTICE1208/article/details/140141934",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?ctiid.270279",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?id.270279",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?submit.367953",
"source": "cna@vuldb.com"
}
]
}

View File

@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours.
### Last Repository Update
```plain
2024-07-03T14:02:10.825146+00:00
2024-07-03T16:01:48.944347+00:00
```
### Most recent CVE Modification Timestamp synchronized with NVD
```plain
2024-07-03T13:33:20.297000+00:00
2024-07-03T15:46:08.877000+00:00
```
### Last Data Feed Release
@ -33,48 +33,51 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
### Total Number of included CVEs
```plain
255812
255819
```
### CVEs added in the last Commit
Recently added CVEs: `4`
Recently added CVEs: `7`
- [CVE-2024-5672](CVE-2024/CVE-2024-56xx/CVE-2024-5672.json) (`2024-07-03T13:15:03.043`)
- [CVE-2024-6426](CVE-2024/CVE-2024-64xx/CVE-2024-6426.json) (`2024-07-03T12:15:03.150`)
- [CVE-2024-6427](CVE-2024/CVE-2024-64xx/CVE-2024-6427.json) (`2024-07-03T12:15:03.430`)
- [CVE-2024-6470](CVE-2024/CVE-2024-64xx/CVE-2024-6470.json) (`2024-07-03T13:15:03.703`)
- [CVE-2024-32937](CVE-2024/CVE-2024-329xx/CVE-2024-32937.json) (`2024-07-03T14:15:05.340`)
- [CVE-2024-37726](CVE-2024/CVE-2024-377xx/CVE-2024-37726.json) (`2024-07-03T14:15:06.120`)
- [CVE-2024-39220](CVE-2024/CVE-2024-392xx/CVE-2024-39220.json) (`2024-07-03T15:15:05.993`)
- [CVE-2024-39223](CVE-2024/CVE-2024-392xx/CVE-2024-39223.json) (`2024-07-03T15:15:06.083`)
- [CVE-2024-6052](CVE-2024/CVE-2024-60xx/CVE-2024-6052.json) (`2024-07-03T15:15:06.223`)
- [CVE-2024-6126](CVE-2024/CVE-2024-61xx/CVE-2024-6126.json) (`2024-07-03T15:15:06.470`)
- [CVE-2024-6471](CVE-2024/CVE-2024-64xx/CVE-2024-6471.json) (`2024-07-03T14:15:06.490`)
### CVEs modified in the last Commit
Recently modified CVEs: `49`
Recently modified CVEs: `45`
- [CVE-2024-39206](CVE-2024/CVE-2024-392xx/CVE-2024-39206.json) (`2024-07-03T12:53:24.977`)
- [CVE-2024-39315](CVE-2024/CVE-2024-393xx/CVE-2024-39315.json) (`2024-07-03T12:53:24.977`)
- [CVE-2024-39322](CVE-2024/CVE-2024-393xx/CVE-2024-39322.json) (`2024-07-03T12:53:24.977`)
- [CVE-2024-39324](CVE-2024/CVE-2024-393xx/CVE-2024-39324.json) (`2024-07-03T12:53:24.977`)
- [CVE-2024-39325](CVE-2024/CVE-2024-393xx/CVE-2024-39325.json) (`2024-07-03T12:53:24.977`)
- [CVE-2024-39326](CVE-2024/CVE-2024-393xx/CVE-2024-39326.json) (`2024-07-03T12:53:24.977`)
- [CVE-2024-39353](CVE-2024/CVE-2024-393xx/CVE-2024-39353.json) (`2024-07-03T12:53:24.977`)
- [CVE-2024-39361](CVE-2024/CVE-2024-393xx/CVE-2024-39361.json) (`2024-07-03T12:53:24.977`)
- [CVE-2024-39807](CVE-2024/CVE-2024-398xx/CVE-2024-39807.json) (`2024-07-03T12:53:24.977`)
- [CVE-2024-39830](CVE-2024/CVE-2024-398xx/CVE-2024-39830.json) (`2024-07-03T12:53:24.977`)
- [CVE-2024-39891](CVE-2024/CVE-2024-398xx/CVE-2024-39891.json) (`2024-07-03T12:53:24.977`)
- [CVE-2024-39894](CVE-2024/CVE-2024-398xx/CVE-2024-39894.json) (`2024-07-03T13:15:02.890`)
- [CVE-2024-39920](CVE-2024/CVE-2024-399xx/CVE-2024-39920.json) (`2024-07-03T12:53:24.977`)
- [CVE-2024-4482](CVE-2024/CVE-2024-44xx/CVE-2024-4482.json) (`2024-07-03T12:53:24.977`)
- [CVE-2024-4543](CVE-2024/CVE-2024-45xx/CVE-2024-4543.json) (`2024-07-03T12:53:24.977`)
- [CVE-2024-4708](CVE-2024/CVE-2024-47xx/CVE-2024-4708.json) (`2024-07-03T12:53:24.977`)
- [CVE-2024-6263](CVE-2024/CVE-2024-62xx/CVE-2024-6263.json) (`2024-07-03T12:53:24.977`)
- [CVE-2024-6340](CVE-2024/CVE-2024-63xx/CVE-2024-6340.json) (`2024-07-03T12:53:24.977`)
- [CVE-2024-6381](CVE-2024/CVE-2024-63xx/CVE-2024-6381.json) (`2024-07-03T12:53:24.977`)
- [CVE-2024-6382](CVE-2024/CVE-2024-63xx/CVE-2024-6382.json) (`2024-07-03T12:53:24.977`)
- [CVE-2024-6387](CVE-2024/CVE-2024-63xx/CVE-2024-6387.json) (`2024-07-03T13:15:03.493`)
- [CVE-2024-6428](CVE-2024/CVE-2024-64xx/CVE-2024-6428.json) (`2024-07-03T12:53:24.977`)
- [CVE-2024-6452](CVE-2024/CVE-2024-64xx/CVE-2024-6452.json) (`2024-07-03T12:53:24.977`)
- [CVE-2024-6453](CVE-2024/CVE-2024-64xx/CVE-2024-6453.json) (`2024-07-03T12:53:24.977`)
- [CVE-2024-6469](CVE-2024/CVE-2024-64xx/CVE-2024-6469.json) (`2024-07-03T12:53:24.977`)
- [CVE-2024-1427](CVE-2024/CVE-2024-14xx/CVE-2024-1427.json) (`2024-07-03T15:44:40.083`)
- [CVE-2024-1931](CVE-2024/CVE-2024-19xx/CVE-2024-1931.json) (`2024-07-03T15:15:05.560`)
- [CVE-2024-27857](CVE-2024/CVE-2024-278xx/CVE-2024-27857.json) (`2024-07-03T15:43:17.007`)
- [CVE-2024-27885](CVE-2024/CVE-2024-278xx/CVE-2024-27885.json) (`2024-07-03T15:44:29.397`)
- [CVE-2024-34696](CVE-2024/CVE-2024-346xx/CVE-2024-34696.json) (`2024-07-03T14:42:49.743`)
- [CVE-2024-36401](CVE-2024/CVE-2024-364xx/CVE-2024-36401.json) (`2024-07-03T15:07:42.777`)
- [CVE-2024-36420](CVE-2024/CVE-2024-364xx/CVE-2024-36420.json) (`2024-07-03T15:29:45.557`)
- [CVE-2024-36421](CVE-2024/CVE-2024-364xx/CVE-2024-36421.json) (`2024-07-03T15:36:31.170`)
- [CVE-2024-36422](CVE-2024/CVE-2024-364xx/CVE-2024-36422.json) (`2024-07-03T15:38:24.297`)
- [CVE-2024-37741](CVE-2024/CVE-2024-377xx/CVE-2024-37741.json) (`2024-07-03T14:27:08.057`)
- [CVE-2024-3800](CVE-2024/CVE-2024-38xx/CVE-2024-3800.json) (`2024-07-03T14:36:22.273`)
- [CVE-2024-3801](CVE-2024/CVE-2024-38xx/CVE-2024-3801.json) (`2024-07-03T14:36:52.797`)
- [CVE-2024-3816](CVE-2024/CVE-2024-38xx/CVE-2024-3816.json) (`2024-07-03T14:37:07.750`)
- [CVE-2024-39704](CVE-2024/CVE-2024-397xx/CVE-2024-39704.json) (`2024-07-03T14:32:56.510`)
- [CVE-2024-3999](CVE-2024/CVE-2024-39xx/CVE-2024-3999.json) (`2024-07-03T15:44:56.130`)
- [CVE-2024-4627](CVE-2024/CVE-2024-46xx/CVE-2024-4627.json) (`2024-07-03T15:45:08.187`)
- [CVE-2024-5349](CVE-2024/CVE-2024-53xx/CVE-2024-5349.json) (`2024-07-03T15:44:23.807`)
- [CVE-2024-5419](CVE-2024/CVE-2024-54xx/CVE-2024-5419.json) (`2024-07-03T15:43:09.450`)
- [CVE-2024-5606](CVE-2024/CVE-2024-56xx/CVE-2024-5606.json) (`2024-07-03T15:45:19.513`)
- [CVE-2024-5735](CVE-2024/CVE-2024-57xx/CVE-2024-5735.json) (`2024-07-03T15:45:57.677`)
- [CVE-2024-5736](CVE-2024/CVE-2024-57xx/CVE-2024-5736.json) (`2024-07-03T15:46:08.877`)
- [CVE-2024-5737](CVE-2024/CVE-2024-57xx/CVE-2024-5737.json) (`2024-07-03T14:09:22.483`)
- [CVE-2024-5767](CVE-2024/CVE-2024-57xx/CVE-2024-5767.json) (`2024-07-03T15:26:29.050`)
- [CVE-2024-6375](CVE-2024/CVE-2024-63xx/CVE-2024-6375.json) (`2024-07-03T14:54:52.427`)
- [CVE-2024-6376](CVE-2024/CVE-2024-63xx/CVE-2024-6376.json) (`2024-07-03T15:04:52.463`)
## Download and Usage

View File

@ -90436,25 +90436,25 @@ CVE-2016-7510,0,0,1779d722e1e3abcce643f3990841f703ae46a4e3e7f1fe529ffead6d50061a
CVE-2016-7511,0,0,61e45c42288f92ed219bf7af9d1eebb46bd81957c5eaf585ba2634d48c3cbb81,2022-03-01T14:30:27.027000
CVE-2016-7513,0,0,f3d58cf54ee5cc2b5f44e21575d4af3e7368d520a46e2dc28b8c8d9f5f3fb390,2017-05-09T12:40:08.853000
CVE-2016-7514,0,0,5acf4c11c6b23e52c011f5a018c2c2d90c756ec80883de77cf9634931bafa504,2017-05-09T12:40:05.697000
CVE-2016-7515,0,0,8335ec89d3b69556f658943cd45115cda1b3ad0170dcd5f33a693e91e75a647a,2017-05-09T12:40:02.777000
CVE-2016-7516,0,0,dc00e35f4b14c9b3a5e2393e045f38f4ca3058fd0d88058f81bbd114e82f8fe3,2017-05-09T12:40:00.260000
CVE-2016-7517,0,0,cae4a9021f8c6b24d69e74a964a23c761f46a0ef032301d0403500a83530e742,2017-05-09T12:39:56.680000
CVE-2016-7518,0,0,e44c44e9af0ad7221c32d73bd55787a24594dab4bf5fbecb788c0722c9a82aa4,2017-05-09T12:39:53.323000
CVE-2016-7519,0,0,48abfeaf70b2b93e677bd5ad1c54531c4b013a123c508cb1a2b4868cda9c8a96,2017-05-09T12:39:50.057000
CVE-2016-7520,0,0,8675f7f6001b6f933e8c681a7b1990fc67310de9ae93d72b0c1a893eb58f0c9d,2017-05-09T12:39:45.993000
CVE-2016-7521,0,0,e3f2b76578e137cff20a485b0cc75441b6730b1e7fb7796ad8f2f44062118381,2017-05-09T12:39:43.383000
CVE-2016-7522,0,0,c3c6c82172f5a1233846580b5edc56aec6ecaef9ab4a92ff578a44fb00223b73,2017-05-09T12:39:40.680000
CVE-2016-7523,0,0,50dca58580cd78b20739cdfbf227b34cc617e8e4568bfb3975aa098ff36b0718,2020-02-10T14:15:40.907000
CVE-2016-7524,0,0,6108f244a4ee1cc990698125f9da3fdd61b2b2255b7e4e07de38a624bb5f19e2,2020-02-10T14:15:18.203000
CVE-2016-7525,0,0,0699ab481775613d23891b4f338e2d7cd11551c5326896711f3ed3d706cec560,2017-05-09T12:39:38.103000
CVE-2016-7526,0,0,90da6ce2733cdbd7e7d4333b8952b53b9fed1f61d51f8634f16efcdfda70a1e7,2020-11-16T19:39:56.297000
CVE-2016-7527,0,0,c72655326862b8292653f51074d141ee78fba673e82c7f5679c057ee38b0806c,2020-11-16T19:37:51.120000
CVE-2016-7528,0,0,e6e8407aee98e532990eb5340b712ecb7e72972b42501e3a7757fe91c6ecab1b,2020-11-16T19:36:05.883000
CVE-2016-7529,0,0,4d58b906ef227eb004895d75595dcbd4c0183a62beb2720c9de995ecda4f8357,2017-05-09T12:39:23.460000
CVE-2016-7530,0,0,d9bc05def810b9da8532adfc595a9a397dabe0925319a92e656af3f45715f13f,2017-05-09T12:39:19.320000
CVE-2016-7515,0,1,fb21f83cddf722a0fa141decdcb6439bb9471e713258d2e816160282eb06f528,2024-07-03T15:16:39.567000
CVE-2016-7516,0,1,16f3cb2e75aa3271d960b831f33e06b2ac04b1f800e594681cff4861326c988c,2024-07-03T15:23:36.440000
CVE-2016-7517,0,1,ba6d8f42f3bed4f3167468c0c8b26ac137e75f436e56310716e1ba6e03647184,2024-07-03T15:17:05.433000
CVE-2016-7518,0,1,c57244a716e7ab0556596acc51d32b901d7b3eadab1f15f85c056c01ecd21d1e,2024-07-03T15:24:22.567000
CVE-2016-7519,0,1,70699c133d2441078f7f4d30b8096de84a4d22f60eff27facd14aa994b106686,2024-07-03T15:23:33.607000
CVE-2016-7520,0,1,d25b55ff825e16fbdb286b4905082bc39f3c8d5f89ce9016285e6765c9befc0f,2024-07-03T15:20:18.050000
CVE-2016-7521,0,1,ecff0a82b907397233ff4a3f7994ba7a05bc18e9489c91c2b2a4f04888f27e6c,2024-07-03T15:20:33.760000
CVE-2016-7522,0,1,0f2318969e17069bd3a2cc23db3cbfd02ac91fd63091a4da607379f4602f307b,2024-07-03T15:20:47.917000
CVE-2016-7523,0,1,81afb97facadafaf98e4cf71b37bec404c0305cb8747f4511dc526ae0104d0bd,2024-07-03T15:21:09.250000
CVE-2016-7524,0,1,a5ccddebd6162757a051cd005775bf0135905bae1479300855e017885dda4f9d,2024-07-03T15:21:23.107000
CVE-2016-7525,0,1,6cfc8323236f9ba0441ab9f3c1aebca91e972e9feb03f0c011ac6f8c22863b1b,2024-07-03T15:21:41.860000
CVE-2016-7526,0,1,ea8a140b9c9a22fb6f394bb3f5dc9c6786ec9edd7f940d729c09fd88b648b97e,2024-07-03T15:21:49.110000
CVE-2016-7527,0,1,95861de21872f14f8012815df306132ca4c4ec0ee42221e09d57528c086234df,2024-07-03T15:22:01.010000
CVE-2016-7528,0,1,c16129d2462881b38bc83868468c620340a98142b2c9d4ae0116ffa0131b6255,2024-07-03T15:22:10.600000
CVE-2016-7529,0,1,815c7fdada9f9e2bc75a51b9f5d1bf734db049324d2d75ffe30ad23eea1b27df,2024-07-03T15:22:20.367000
CVE-2016-7530,0,1,6492e65bbb8672ec847a4514447a6f39c1d56b13a2cf7c79ef9c970546f67022,2024-07-03T15:22:34.133000
CVE-2016-7531,0,0,f254a92940c7423fd73ff710e03b79d4d929be67d2537f3cb9bec6848a5ef628,2017-05-09T12:39:15.447000
CVE-2016-7532,0,0,809a94082802a4face8a9254ec7175501e10c205d92aa5b1330f0cee57b2adb7,2017-05-09T12:39:12.837000
CVE-2016-7533,0,0,f8529d644609cab03ecc261e74050dc40f1870a20a589550cbe46f28258c0799,2017-05-09T12:39:08.790000
CVE-2016-7533,0,1,0b5c1dbe1976d2fc2f4abf252703deacc66d9d8030522be17c5c1c20eb40fb1b,2024-07-03T15:23:17.167000
CVE-2016-7534,0,0,bceb0238cb8ce38db11107a89888e488bbdb754e0bd6a6d35f4addc83364c973,2017-05-09T12:39:03.697000
CVE-2016-7535,0,0,23fadd8cbcc8163a830df0d83144ba1cd318528b25b6b58138132d55347c5bbf,2017-05-09T12:38:58.727000
CVE-2016-7536,0,0,4b02a4d8372a703d7d8b994f35aa31e84f2c877453f888a1d7c73b17cadfb25c,2020-11-16T19:34:51.070000
@ -95267,7 +95267,7 @@ CVE-2017-11309,0,0,0a1015ad413714840fd17bdb185f1070c94f45d2b31bf8df3eae1b31bfd6c
CVE-2017-1131,0,0,6097510a934b58e996eedd162fa96e251a8c69f87fa9344db179b52fae37d20b,2017-06-27T01:29:00.780000
CVE-2017-11310,0,0,56b936587222c5c48de0aa3a4968d9e7406c62f8c69628e2b7b86d8e6b29417e,2019-10-03T00:03:26.223000
CVE-2017-11311,0,0,90cdd67c89f76972e750afb94ff98b31a502d7f8df9bebdf7df8cf4fae2d7581,2017-07-27T01:30:09.713000
CVE-2017-11317,0,1,1d5f5723a2ae116b3580708d22e34e67d9dac0c90c625c41cb5f3bd084416c9f,2024-07-03T13:16:48.240000
CVE-2017-11317,0,0,1d5f5723a2ae116b3580708d22e34e67d9dac0c90c625c41cb5f3bd084416c9f,2024-07-03T13:16:48.240000
CVE-2017-11318,0,0,873b3b942be64b72e00ede40092823f6d4f16af03d741a696bb1672693f3e88d,2017-08-07T18:48:45.740000
CVE-2017-11319,0,0,f9e5ba563f877740060c1429e268873b1045d0570effb97efb4ddc73ac52fc09,2019-10-03T00:03:26.223000
CVE-2017-1132,0,0,3753fbeb602509c19bbf232f979c0cf13effaf9be4bd299eceae899413f255b3,2017-06-27T01:29:00.827000
@ -172757,7 +172757,7 @@ CVE-2021-27794,0,0,5902753dd3a47ac44d61ce05dcba1f7b330e85fa17e8176e91a0923c27e21
CVE-2021-27795,0,0,f335211bb2ba6ce8ee545f6882567e515644e4901ba6200771713d168f749dec,2023-12-11T19:44:39.613000
CVE-2021-27796,0,0,980d4cf765b69ffde1fdfff98c2b85c39dc01b92a5e37275f92f055a12379a1c,2022-03-01T23:43:08.080000
CVE-2021-27797,0,0,0870ff126239a4e5f86bc10712ec007b6ec52054473b47d89b72aeadc12b0f5e,2022-03-01T16:09:03.430000
CVE-2021-27798,0,0,530c4ae9b2b37aa0bc4adc42227a5bde18a9b92e23c523b1ff578d0c66b51f58,2024-05-17T01:55:38.763000
CVE-2021-27798,0,1,b5806bfc660dc90e93ffa902dcf25d7957e45c3e8c4a0ebb0757bd1ebb50e403,2024-07-03T15:15:05.193000
CVE-2021-27799,0,0,d0ee11302a63b3ea6271e540a0af8af46a88a1457074166c885a7131a2a9c36c,2021-03-10T16:59:06.673000
CVE-2021-27802,0,0,0981e3e97b8714a98f050af16eacca81b240a96d94957da281ba951efb0d6c99,2023-11-07T03:32:01.343000
CVE-2021-27803,0,0,679f77f0866982accd53b086375067dd27d2b62dec0e43e395886545a3abeff6,2023-11-07T03:32:01.380000
@ -172777,7 +172777,7 @@ CVE-2021-27845,0,0,27cb14f9d81d75cf37f66d513914098129e2c9d54a1efbef43b698e6ec3d2
CVE-2021-27847,0,0,4cf1fd0379081a029d66fa26d168bd2c43e45765e7eeb80369436f7543702298,2023-09-29T11:18:03.783000
CVE-2021-27850,0,0,ae1e4d711acbf93339f3f5768281261f381eb85bce7c33e584fe39ab7469964d,2021-06-02T15:15:24.743000
CVE-2021-27851,0,0,87df816154ae443a8ab20fda387988a009fd8b3e4ce9c62e18ca04a19430b28b,2022-07-29T16:34:08
CVE-2021-27852,0,1,33f33266bcdb69cefe22f17c67f9d46cedbde0fc4e833493e35a294d1b256c5b,2024-07-03T13:32:45.603000
CVE-2021-27852,0,0,33f33266bcdb69cefe22f17c67f9d46cedbde0fc4e833493e35a294d1b256c5b,2024-07-03T13:32:45.603000
CVE-2021-27853,0,0,2190e5b9e70d6aaa8444bfefac172608cba6fdc4ca02e42f4588c939dcb8c904,2022-11-16T17:26:33.420000
CVE-2021-27854,0,0,702202158f71ed2ac3bf9ea57dc1eb53096d0d64aa7b77c1a59fab044dce83bd,2022-10-12T13:15:10.407000
CVE-2021-27855,0,0,7bf2b99b844c425075ceabde2e33edefdaaaa742621b6194b09423c55d06494d,2022-10-29T02:58:34.047000
@ -183602,7 +183602,7 @@ CVE-2021-42274,0,0,5fe086d50763566c992a71f303150c7a3fb31e0e7ea54b731945b48adbc10
CVE-2021-42275,0,0,68fbee182e3e5e235f5dab48ff67db5861054648192ae667fd45691d6c2d8855,2023-12-28T16:15:54.560000
CVE-2021-42276,0,0,cba257dd2610587252c0b30a0f6c17e6ce094ed26ee7ef7c888da2ef3a9547bf,2023-12-28T16:15:54.763000
CVE-2021-42277,0,0,c99f72b4dfb97cbc34be38c0b68b72470eda5fc36135ae6e129bc3d819ee89ed,2023-12-28T16:15:54.970000
CVE-2021-42278,0,1,400aabdcb7a86831676301656391b3db63df5600fca04fbfea6b1b9bf48fa79d,2024-07-03T13:33:20.297000
CVE-2021-42278,0,0,400aabdcb7a86831676301656391b3db63df5600fca04fbfea6b1b9bf48fa79d,2024-07-03T13:33:20.297000
CVE-2021-42279,0,0,632d8f89c71a38d5480b12f205614381121bf4159617260406a55e81fe114c94,2023-12-28T16:15:55.363000
CVE-2021-4228,0,0,93e491af6c6b2b147521fd6dd3f3bc75f943340ce2fe2bd78fcdd33793a3aaad,2023-02-03T13:52:26.017000
CVE-2021-42280,0,0,d341f543ea9165319ef5363ed48f3eba6dc753f5b125f982e963d9d421c38191,2023-12-28T16:15:55.567000
@ -193521,7 +193521,7 @@ CVE-2022-24517,0,0,e79c91bcb3b68c52828825c5ff897cb06a35a224accc6eaadc9f204413d37
CVE-2022-24518,0,0,5538572c537b65ea02a0df690f4981398b2f38dd3d6737fb0dc62b48d9d87042,2023-08-08T14:22:24.967000
CVE-2022-24519,0,0,1acf09adea2addc45cd1f8a1bba6e14d1a8e6a450aad26061db4b802473be0a8,2023-08-08T14:22:24.967000
CVE-2022-24520,0,0,23e43fae09c725a7acbd1fbdee71bd0cdd417371a852bdfb65928bb05a74d42c,2023-06-29T02:15:15.267000
CVE-2022-24521,0,1,bc2765fccfa743e69828de99f5d1abb88227f4af23f1dbc4b53662f5aefc84de,2024-07-03T13:16:06.577000
CVE-2022-24521,0,0,bc2765fccfa743e69828de99f5d1abb88227f4af23f1dbc4b53662f5aefc84de,2024-07-03T13:16:06.577000
CVE-2022-24522,0,0,8e4c1c707fb0dbb6e272e25b8ce9d9115f051bb7037004f4c39d824c952297df,2023-08-08T14:22:24.967000
CVE-2022-24523,0,0,faca6eb1725f9e2af1f2a19aaad5b494587d75e16caac5f32dd9f7b87170c477,2023-06-29T01:15:29.707000
CVE-2022-24525,0,0,32a11adb8270a4ea8950c8b2227729e32f8fafc96e46255f0fca9cbabfa0de9b,2023-06-29T02:15:15.457000
@ -194354,10 +194354,10 @@ CVE-2022-25464,0,0,231fd3080576b3684ae82435ee901df2499bdd2b12996f22985cb04f4c481
CVE-2022-25465,0,0,83ff884fffb03f7448bef58e02010e947d986d6c2e472bc0f3add87f72a5660c,2022-03-11T15:55:36.710000
CVE-2022-2547,0,0,73d14d5654e374eff01adccf9a7a8251705f6da64d59cea565fd779629f3f010,2022-08-19T01:43:28.157000
CVE-2022-25471,0,0,3a109f099cb1061a853e5b50f13b9d0fc3efb3654456f758cc15cdf5ad1cc75d,2022-03-09T19:47:15.070000
CVE-2022-25477,0,1,f5947fa43ee6d57d57151bf27eb934c1e8cf30d33379a811dcf9110928cf0bda,2024-07-03T12:53:24.977000
CVE-2022-25478,0,1,7bd7f3ad2cf598c72e979cf04e2bae20dac87654e7334e4884eb68cfa1874609,2024-07-03T12:53:24.977000
CVE-2022-25479,0,1,8e8380855069d84dabbdaf641b904e87a9f4117a0d0d49c8aa1a1a1137a9bb4d,2024-07-03T12:53:24.977000
CVE-2022-25480,0,1,39886115f70f1d1b40972742fcf44e4e22fe5f53707cddad00cae2c888e60577,2024-07-03T12:53:24.977000
CVE-2022-25477,0,0,f5947fa43ee6d57d57151bf27eb934c1e8cf30d33379a811dcf9110928cf0bda,2024-07-03T12:53:24.977000
CVE-2022-25478,0,0,7bd7f3ad2cf598c72e979cf04e2bae20dac87654e7334e4884eb68cfa1874609,2024-07-03T12:53:24.977000
CVE-2022-25479,0,0,8e8380855069d84dabbdaf641b904e87a9f4117a0d0d49c8aa1a1a1137a9bb4d,2024-07-03T12:53:24.977000
CVE-2022-25480,0,0,39886115f70f1d1b40972742fcf44e4e22fe5f53707cddad00cae2c888e60577,2024-07-03T12:53:24.977000
CVE-2022-25481,0,0,d8914892ae94539e6b18fbcd727395bf982994a1a334a92092d2f4e3819a8123,2024-07-03T01:38:19.293000
CVE-2022-25484,0,0,99a222d35a5c2f1b2db0f90a8390321c73db93867e67f18b2c213513a13e5439,2022-03-28T20:53:05.180000
CVE-2022-25485,0,0,f943c508b3e38959fea36ca9f014627ff6eee45f93d348f17a276f89be77fc1e,2022-03-23T18:18:46.160000
@ -198507,7 +198507,7 @@ CVE-2022-30632,0,0,f214153a7d78a1f18ea22ef856e8035d77e066ffe05cf4d3cd2d155a8fe2b
CVE-2022-30633,0,0,b54ca08085af5e8cef18a74cec122d184dc8b4373d642fc24f7ba9cd5e61484d,2023-11-07T03:47:16.833000
CVE-2022-30634,0,0,6756594dd3720ca90dbd7390befd3951adf8b8ddf821e4fa717ae67733da7843,2023-11-07T03:47:16.960000
CVE-2022-30635,0,0,05b714781f3ac4496fa9fd2fec8e57abb3bdf107549dd52f7a6ca2248a8a28fe,2023-11-07T03:47:17.070000
CVE-2022-30636,0,1,950a2fe1c5b00dbda0db499d214490d40e5deb1e821994dd67e179a2f1d77889,2024-07-03T12:53:24.977000
CVE-2022-30636,0,0,950a2fe1c5b00dbda0db499d214490d40e5deb1e821994dd67e179a2f1d77889,2024-07-03T12:53:24.977000
CVE-2022-30637,0,0,59aa98121a73381f879297e9c17146b4bb1b6e52c9c1e7f3e0a2be631b87e64a,2023-09-09T03:42:43.520000
CVE-2022-30638,0,0,d268c0135ae5f7942a9397265321619b85cbe35450007798147fa4b1fe86d34d,2023-09-09T03:42:36.757000
CVE-2022-30639,0,0,63e210ad5e4743756ed81cab634881e23db9b06e79d4bdff1a84f2aca5e5afc2,2023-09-09T03:42:18.143000
@ -199167,7 +199167,7 @@ CVE-2022-31357,0,0,0117d3bd77cde592c54614f7b9b3ba07e3620b33e1ed372ed0aa3d61842da
CVE-2022-31358,0,0,99e295cf2650192fb9061fc7fb33a864e05c69c246c6175b92e491b13dffdb4b,2023-11-07T03:47:37.213000
CVE-2022-3136,0,0,348faa475dc105d9dc7ca0b6825af678dd4a6880325fcaad1f62607b87f27634,2022-10-12T16:42:29.870000
CVE-2022-31361,0,0,7c7a13a509ccc79dce98e213c13410afb594204a49db8971d4b7261121c52936,2024-05-17T02:09:31.713000
CVE-2022-31362,0,0,c1da100c9bc04ee11e70dd090864de98b2758f14b734d9419060088dbd0cd2cb,2024-05-17T02:09:31.817000
CVE-2022-31362,0,1,ce3fa4bd27c48417b8e9f66ae424852288eeffe718d961d070c2335e776696f6,2024-07-03T14:15:04.330000
CVE-2022-31363,0,0,2cdc9f5e6bce1c868cd6a6cc903c192623e0a62d2cb3e21d517c37c48e27d60d,2023-02-09T20:44:48.020000
CVE-2022-31364,0,0,16c44bc65c1ef1e94a01ddd40700a46a03bbda2d51fb3d63a950d1bba09e434c,2023-02-09T20:50:44.917000
CVE-2022-31366,0,0,67f42e566e099c711c555187131c25df8d6f9a820fd3a367aef31e2c71645659,2022-10-21T16:18:59.077000
@ -206054,7 +206054,7 @@ CVE-2022-40293,0,0,c609d733a24235de62748fe66d7225f5f2be4a1b7d6ebfda78738adee232d
CVE-2022-40294,0,0,ff48ea8004771e1ad176e146f4141a6bf1f6af63ded7d0439b11976237a989c7,2023-10-25T18:17:16.443000
CVE-2022-40295,0,0,417ec344689cf18cbe6163ad761fda8fbef5dbddd7bb733ed5d647c1fc9bc1ff,2023-10-25T18:17:16.503000
CVE-2022-40296,0,0,78154ab5bcd8116e5b7f62a9e5e2fcfc3da41d5ec60b414a2189a3fe32758d33,2023-10-25T18:17:16.567000
CVE-2022-40297,0,0,43a551162cb7e0b0dee481c87c9b0cbc1426beef0c59b47d89fd0295b3b288b0,2024-05-17T02:13:18.643000
CVE-2022-40297,0,1,d23b1493b99457a642376f24446356d15b5924fb33aca414b8962424b633c31e,2024-07-03T15:15:05.423000
CVE-2022-40298,0,0,9d356f1450e16dd5ebda560da24d68d82018f96f198840edce14165bb2a990d5,2023-08-08T14:21:49.707000
CVE-2022-40299,0,0,36f3dfca3faf782369516a7311b05a02ea5b584f3c6b04e15d95bc7724ba6eb1,2023-08-08T14:22:24.967000
CVE-2022-4030,0,0,7a8aeb590d9751df9668da3c2f397b6e07abe04112fccee4a2e1be5dd56e675e,2023-11-07T03:56:45.093000
@ -217972,7 +217972,7 @@ CVE-2023-24528,0,0,899533432d6d75cedea57fd4563bb59a08ab30d04e09c55b0e4759297d9a5
CVE-2023-24529,0,0,d5ec6c7946d019b7d7e407212b00e6ee585f0c40c199c1d7212c76e02ba691c9,2023-04-11T22:15:08.633000
CVE-2023-2453,0,0,35571d748e261a04ce5c1ada40f40e506192da5c60ca32152a9fefe31414f468,2023-09-08T17:27:41.190000
CVE-2023-24530,0,0,819456e45a97d34c0861fc0ddba145d10cfdb134d103842d97b3038412001184,2023-04-11T22:15:08.690000
CVE-2023-24531,0,1,179bb04436befa20e8424debc4490783b95c6da99d26ce06668e99f09890aa04,2024-07-03T12:53:24.977000
CVE-2023-24531,0,0,179bb04436befa20e8424debc4490783b95c6da99d26ce06668e99f09890aa04,2024-07-03T12:53:24.977000
CVE-2023-24532,0,0,933a884c817efe4414cd72b8f640229cca761b1f2eba3a0e93cdae834fbffd9a,2023-11-07T04:08:30.867000
CVE-2023-24533,0,0,d66d114c302bdadf5cd961e00ee83c5556439c2ddedc40b37fc6e0dbe36b75d9,2023-11-07T04:08:31.050000
CVE-2023-24534,0,0,32da01c00ffd6bfd831b88c5dab9cd458b775383e6192afc2c330a9197e1873e,2023-11-25T11:15:14.030000
@ -241889,7 +241889,7 @@ CVE-2024-1423,0,0,6e27005a2bc9cac940b744a08e145c97df4169105a5c6ac980f63cd4cfdbe7
CVE-2024-1424,0,0,e4ad8b68f1fbe246b31a884aab471f453604ee73fa66399cab9d94287d5c1f39,2024-04-10T13:24:00.070000
CVE-2024-1425,0,0,02a330ca28e70c5f4fd75a53f6a884cfaa02f29dea0e5d02e5dff002ed045e32,2024-02-29T13:49:29.390000
CVE-2024-1426,0,0,b20e0201854f673684d69c4a30e03c882940d605ff386eb76a0bcedb20be1b61,2024-04-18T13:04:28.900000
CVE-2024-1427,0,0,63dddd2d42d3e35c84d49f8aaa22caa244648752e9da148e60af21d3fce7beb2,2024-07-02T12:09:16.907000
CVE-2024-1427,0,1,192e94c8c1db3f7bb99c2eb13227bbd24cc5d98969af5836b6320be2953a05b7,2024-07-03T15:44:40.083000
CVE-2024-1428,0,0,4c77834f86d069dd8ac6582c1158d4ce9778d9d2d0db6d53457b9fcb3238fd50,2024-04-08T18:48:40.217000
CVE-2024-1429,0,0,ab6402cd6da16458b964af8d77be31dfc0567f7c2e61e8846287eab7a4f0dc54,2024-04-18T13:04:28.900000
CVE-2024-1430,0,0,eba723d82d624f4abb9107b4882898514197c1baa9de876205b497551b76bb7f,2024-05-17T02:35:26.640000
@ -242336,7 +242336,7 @@ CVE-2024-1927,0,0,31be343b20122f13e26ef76f7f4fe10a59226978014536249707ce2d72de81
CVE-2024-1928,0,0,b3421eda40eadd8f94f725465ed49c06463a4553cfbc0b59715a025d1f01d712,2024-05-17T02:35:42.223000
CVE-2024-1929,0,0,3332c348abe2ec55e440f6248fed1a4ed270158e5658f7c88b1e6bb963ccdab9,2024-05-08T13:15:00.690000
CVE-2024-1930,0,0,fdb59fca49fb5e54ea59db9c9eb6e43f53d3770fb02303c610334b8657eb9ae1,2024-05-08T13:15:00.690000
CVE-2024-1931,0,0,e71f7a88f68b5d3702fc1141e5fbdcf00d33a90e3791bbd349a9e1c6ddf3f008,2024-04-28T04:15:11
CVE-2024-1931,0,1,74525c1ab84bdef9a56fce2ad1f66433b6d371babf800064dbee863c8b3d6ae8,2024-07-03T15:15:05.560000
CVE-2024-1932,0,0,dfd6617a73caabfbfba2b5ee899213931b787c71ad6a77e11bae9543ad134a99,2024-02-28T14:06:45.783000
CVE-2024-1933,0,0,22dab3b8ed3dbdec751e3b3ea3557732635c7de83916428fa2e460c959fedb1c,2024-03-26T17:09:53.043000
CVE-2024-1934,0,0,baca09a1b552c022c94ad7f29c48bc581577a9c65fef6c6ea2b90bc1a8cad40e,2024-04-10T13:23:38.787000
@ -242603,8 +242603,8 @@ CVE-2024-2039,0,0,4f1e5a8a814f51edc0234cc5670da2107cc2a93a2ef1eadc628898e3eec44b
CVE-2024-20391,0,0,f91eada0700f8cd9f2eaea2b871ba7d3969d87e51919a0eb478edbaaab6f3a9d,2024-05-15T18:35:11.453000
CVE-2024-20392,0,0,ace66ba4c79c3f433832bd6cfa0988701f79a2b5d6c0fbe5016f71bba33a0a9b,2024-05-15T18:35:11.453000
CVE-2024-20394,0,0,d0e5fc3a79dfeb923dc3f02320ce7649899cba8340301b836f168cfe3139baa9,2024-05-15T18:35:11.453000
CVE-2024-20399,0,1,40162d3d58c44619359063d12b3450c60237a60b95e0ce2c02a9d7dd539d8ffd,2024-07-03T12:42:39.597000
CVE-2024-2040,0,1,4eb156f2f336b9896eaa73d7b780fac89b9f39a2cf5be2d12faa4b9a10061303,2024-07-03T12:53:24.977000
CVE-2024-20399,0,0,40162d3d58c44619359063d12b3450c60237a60b95e0ce2c02a9d7dd539d8ffd,2024-07-03T12:42:39.597000
CVE-2024-2040,0,0,4eb156f2f336b9896eaa73d7b780fac89b9f39a2cf5be2d12faa4b9a10061303,2024-07-03T12:53:24.977000
CVE-2024-20404,0,0,679bbd668c3128b9d2c298395d952eaf5fd76470dbc9bd0e765678566e0d175f,2024-06-13T20:25:46.837000
CVE-2024-20405,0,0,e5acdd821474e29805e089211fec2d1d30a76e0d4d4635efbeb215040858791b,2024-06-18T18:04:04.497000
CVE-2024-2041,0,0,f285d116ebee20fb02fc2c7de4f69fe8567e76fe9eda446fb7969801431b3d7d,2024-05-06T14:15:07.747000
@ -243861,7 +243861,7 @@ CVE-2024-22306,0,0,5427f196cd2fc064fa3cdf34238c9c0432fe7231acc9557add0074b844121
CVE-2024-22307,0,0,612500eeac06983bafbc014843c236d8c463241187c2baf6a06b160bc5b163de,2024-02-06T15:52:58.037000
CVE-2024-22308,0,0,f72408efdea3f3f2120dbeafd0b38992093a473ba2aa0a2b4bc8ffb90cf9e200,2024-01-30T17:45:59.927000
CVE-2024-22309,0,0,1093afc20ffe4dba6071bc2d2a5c666f7d5a7f27092b0aa5704b12fac569bad5,2024-01-30T22:18:55.947000
CVE-2024-2231,0,1,c96321cf6ad3d9918686b86829ec340b1580d2567aeee874dbee65cd54c7e011,2024-07-03T12:53:24.977000
CVE-2024-2231,0,0,c96321cf6ad3d9918686b86829ec340b1580d2567aeee874dbee65cd54c7e011,2024-07-03T12:53:24.977000
CVE-2024-22310,0,0,97f58d74bad578babbc5c2fb902488ef3a20e73ec8d238c07475dac86db860dd,2024-02-06T16:08:42.910000
CVE-2024-22311,0,0,1b2896f06b8d2a60f5f4320525fd0e0a2ff9a9add83fae0db40bd38deadccd39,2024-03-27T12:29:30.307000
CVE-2024-22312,0,0,502cad1c70aca19be54f1a146a057702eb2ad6518581e46eff801281d9dde1eb,2024-02-15T04:38:23.153000
@ -243873,7 +243873,7 @@ CVE-2024-22320,0,0,b7e6bc5c871bb2a076b1c4d217e351ebb443d568b1fdbb86f9513f16f0da1
CVE-2024-22326,0,0,611aa89f02e2c1b3e79c0d2da37798e3e77fccc4ee223e6b80d6313dd22973d4,2024-06-07T14:56:05.647000
CVE-2024-22328,0,0,1d3eba54d3dcb9850fbd9a86e1475d83621830be3d74777232b85acf89e88234,2024-04-08T18:48:40.217000
CVE-2024-22329,0,0,6b484ef8d82a649c0162bc9be85600528b13c1a759ed8ec79e69e3b10b67e2d3,2024-04-17T12:48:07.510000
CVE-2024-2233,0,1,3f560edb3aa2a0572e5aea14b67e8e85b9187be1302884edd007ad6b24cb2b39,2024-07-03T12:53:24.977000
CVE-2024-2233,0,0,3f560edb3aa2a0572e5aea14b67e8e85b9187be1302884edd007ad6b24cb2b39,2024-07-03T12:53:24.977000
CVE-2024-22331,0,0,79325856c8baa9082651d9383783f7a4198ba299d30e2c67010ba88c7f1776a4,2024-02-13T20:26:23.780000
CVE-2024-22332,0,0,a27f7ab666232b70f986037d449131d6bde483413718019674022f07be0d9b9e,2024-04-03T02:15:07.973000
CVE-2024-22333,0,0,dc6ffe95ff5a7403a67c60cf469ac371d4effee2bd0a4db051204dcf972f9e7e,2024-06-13T18:35:19.777000
@ -243883,12 +243883,12 @@ CVE-2024-22336,0,0,92b17f3ddf77b7c8a53a41f903603d0d36207de06fae8bd71fc2469777bc3
CVE-2024-22337,0,0,9a674fac9bc4716d61a028d3be9473027552f3c1c11335efca4b4ddefd1e14f0,2024-02-20T19:50:53.960000
CVE-2024-22338,0,0,6e079f32e725c30ab50d30a352b744d0c760c6659785a2e99ec5f98e6f27b645,2024-05-31T13:01:46.727000
CVE-2024-22339,0,0,7da5694b93905b7c6d93ed93108dac6dab6202238259984860ef1d6e1bec9ec9,2024-04-15T13:15:31.997000
CVE-2024-2234,0,1,678c50cf7e63b0e2ecb3786b9b3e9c1466245abe875c1d626a9365b6ae9b7ae9,2024-07-03T12:53:24.977000
CVE-2024-2234,0,0,678c50cf7e63b0e2ecb3786b9b3e9c1466245abe875c1d626a9365b6ae9b7ae9,2024-07-03T12:53:24.977000
CVE-2024-22343,0,0,98c7840ac2eb50dcfa88f4141a657f976aab7d39f92de1ccb97b49719a76ede0,2024-05-14T16:13:02.773000
CVE-2024-22344,0,0,dd931266b7e962044b40a6567c41617f6ff2ceb50100fcd1ed62bcdaadd651ee,2024-05-14T16:13:02.773000
CVE-2024-22345,0,0,a53b92e2f5ec18ca2cba51b0a304f5cdd6926e00d82cbe49f8f763399c2a3daf,2024-05-14T16:13:02.773000
CVE-2024-22346,0,0,638ee4e9687c7c28032b432c317662713c057110b08b4b27024e81eb8453bf9e,2024-03-19T16:50:10.570000
CVE-2024-2235,0,1,aca307fcff1fcb062b670545536481e4b283817f6d6be40c8af90057bf71f503,2024-07-03T12:53:24.977000
CVE-2024-2235,0,0,aca307fcff1fcb062b670545536481e4b283817f6d6be40c8af90057bf71f503,2024-07-03T12:53:24.977000
CVE-2024-22352,0,0,8ad74f9c108b142191e10d9f1af5800c7055fc5b8e79f7a9a2cf40171c06b8cd,2024-04-01T15:23:54.530000
CVE-2024-22353,0,0,ad692a077e5b804e1764ffb4f197bc72c54e38388ae47b5f805ac59827db6799,2024-05-16T00:15:08.057000
CVE-2024-22354,0,0,68792703b2560a4c3917a12fc2257c1fa0af627e17204b8c7ed6a62e6c56f559,2024-05-21T19:15:09.413000
@ -244715,7 +244715,7 @@ CVE-2024-23745,0,0,0997a46b1366c968f7b9f767523f67b6c77ab399053d9f0736951af88cf15
CVE-2024-23746,0,0,4231b3151cad9797b59bfa65c9d1a0aba18262be508b41df48aa646e6b64ee48,2024-03-21T02:52:08.563000
CVE-2024-23747,0,0,e5badc646080ce0998e1e81852fb21e000c7398188715a4f0ce89130386d9ea5,2024-02-02T02:03:39.093000
CVE-2024-23749,0,0,e489f7636c813784a61d3812299289346709b8bf63acb59822c186709b469431,2024-02-14T13:59:39.353000
CVE-2024-2375,0,1,c3de96d78afc3bc6ffc67daacece32aaeeb0bdb870ad0b2df79a86e04f8b2ec1,2024-07-03T12:53:24.977000
CVE-2024-2375,0,0,c3de96d78afc3bc6ffc67daacece32aaeeb0bdb870ad0b2df79a86e04f8b2ec1,2024-07-03T12:53:24.977000
CVE-2024-23750,0,0,8e012c8bf46e4d6b122cd9676a67ed8063eceaae10c8b41283586e2acd25aff1,2024-01-29T16:51:14.573000
CVE-2024-23751,0,0,f4277632a799f5e0167c42d856d852fb64898f90e4d81aec065a43806c32cb6a,2024-01-29T15:06:44.003000
CVE-2024-23752,0,0,18d704b9462928669577bd2ecf8e771bfdc29bdedea9912638fd3f521668a073,2024-01-29T19:27:17.040000
@ -244723,7 +244723,7 @@ CVE-2024-23755,0,0,20f404ef06f0de4002ad00bfcb3ecba797133c7898cd26c253955293bcb6e
CVE-2024-23756,0,0,ad98c26cac3e251d6e147a06061ab8f37933ff482c3e1fc10e9847ddd0a56975,2024-02-15T16:01:08.870000
CVE-2024-23758,0,0,0b90af0eb87a8b48149c5b2c24a267ebd8f5a25fb833966d160033fff9e77828,2024-02-22T19:07:37.840000
CVE-2024-23759,0,0,73fe4ef6829a19943e815065d62e01eb8bcfa2b42e847a75f95d5c33c8cd1503,2024-02-15T04:49:02.133000
CVE-2024-2376,0,1,a82d5e4ce1caa6e63dc9804b1f9d96ffb899caa17adf18ce75e0dea64bcecd21,2024-07-03T12:53:24.977000
CVE-2024-2376,0,0,a82d5e4ce1caa6e63dc9804b1f9d96ffb899caa17adf18ce75e0dea64bcecd21,2024-07-03T12:53:24.977000
CVE-2024-23760,0,0,bb86044c0a5dcc35ef326482cd22c362ff5c354c2c47549b45272f40e914b5cf,2024-02-15T04:49:31.847000
CVE-2024-23761,0,0,91423f3fc0ae4a6c135e3093d5ba2f92b18f0705b43e8497a65147830ffb84f4,2024-02-15T04:49:36.837000
CVE-2024-23762,0,0,1fc25d58731097f8aad4c8f7676cdc9a123654581fd6c8477b826714cd9e330b,2024-02-15T04:49:42.123000
@ -245273,7 +245273,7 @@ CVE-2024-24788,0,0,ec3a0e2bb85b04f6091132ce0b358d8c88079508c68a38db8ec47a1c1ba68
CVE-2024-24789,0,0,fd6a5b95d991b0dab3309c11b164e4c1e60de61b7d4a99fed36d8b88b927fd59,2024-07-03T01:48:25.510000
CVE-2024-2479,0,0,62ab2572f43d54e062a6ec9f07869b63a0bdfad1924b8c09404f39717bdfbd77,2024-05-17T02:38:14.640000
CVE-2024-24790,0,0,eea6958e81d73afbece6bae935d256b81d43a28af6bfcc689fa474522b0325d6,2024-06-18T17:59:12.547000
CVE-2024-24791,0,1,d6750c1bff921be3db20c9661706ae6a1028345b03fca5380ec164ecc9b52e93,2024-07-03T12:53:24.977000
CVE-2024-24791,0,0,d6750c1bff921be3db20c9661706ae6a1028345b03fca5380ec164ecc9b52e93,2024-07-03T12:53:24.977000
CVE-2024-24792,0,0,856277335b0a65941c91908e89bfe8db9fa7dd817204d99e1f16a0e92b8015e5,2024-06-27T19:25:12.067000
CVE-2024-24793,0,0,c02d48f5d574325816298b4b1d2848ca92f5dc7aa67a2fd30978e3885630bc1b,2024-02-20T19:50:53.960000
CVE-2024-24794,0,0,0d491c54da3b197a1321ac69102f9de79d058e3462ee7572209ea583555d837a,2024-02-20T19:50:53.960000
@ -247536,12 +247536,12 @@ CVE-2024-27850,0,0,e1d4379d6b3d34c01ebe4dd5e7858f8de64aeb5953240c61d195d17d1f48e
CVE-2024-27851,0,0,20416253b2599df26c3b322a6efc6a4efc655856220ad817be23d3b30dc68157,2024-07-03T01:51:13.350000
CVE-2024-27852,0,0,2264a1594190812a9b29fc0e3f886882ab3c63c917f94e71ed2dc96c8e6c2c94,2024-06-10T18:15:29.900000
CVE-2024-27855,0,0,7a41b8238436a46025b45552c8cda3356564589cbbf3b4bae7d5eb20d8672a8c,2024-06-11T13:54:12.057000
CVE-2024-27857,0,0,c656440d8235ebe336c8f0cb6c0dbbed059f704b9d7b7858d9d6b284ae7c3693,2024-07-03T01:51:14.753000
CVE-2024-27857,0,1,b12d57be271aa438e5d4c668c7f18ead13afc3b08569565d9c95a215938e9ba2,2024-07-03T15:43:17.007000
CVE-2024-2786,0,0,dcf647d15f4b220698a959a93f7a5cdfd4a7ecd495ee9aa1ef69052001df8b00,2024-04-10T13:23:38.787000
CVE-2024-27867,0,0,929b60a50faac760812cfff090aaa2b01b31cf8cfca2ab2ec6bdf5a9e5f514fb,2024-06-26T12:44:29.693000
CVE-2024-2787,0,0,496195d9f69f32f0c6a6baaf1ee3e4e62db7dfd0c17c88d9010b922be319ee45,2024-04-10T13:23:38.787000
CVE-2024-2788,0,0,088d65d193232fcb72b866e8c41bac364578345792bee984e7ddfd9f7a9953b9,2024-04-10T13:23:38.787000
CVE-2024-27885,0,0,c59de475c576c44e129a9e58b8769caffc1b189d40a0172434b38c39f1ec2eb6,2024-06-11T13:54:12.057000
CVE-2024-27885,0,1,e3765a253be02afcb43d4bff90a02eb9cc8683032aa7319a1325bda028b43ed5,2024-07-03T15:44:29.397000
CVE-2024-27889,0,0,fafa75eb559da0736cbe5f975005d2c6007c4614a71da5e60cbad40c6f594a2b,2024-03-05T13:41:01.900000
CVE-2024-2789,0,0,c1532315076419efcbf6da1ca657d2b247ea6915b4f0b97827f3803af3830f0d,2024-04-10T13:23:38.787000
CVE-2024-27894,0,0,b3f2bb1a7a3eca33b6d3782ab00745453be745ced11b5b6cc9ac93cd4156f4f3,2024-05-01T17:15:30.557000
@ -250653,7 +250653,7 @@ CVE-2024-32664,0,0,718b297c1c7558858a3c6f09924665172ffd7ff066b9e99da8e046f6aca66
CVE-2024-32669,0,0,120909758c684acb7a51e36d8f01a68b3f4d03ded247287f26cab48d9139b029,2024-05-14T16:12:23.490000
CVE-2024-3267,0,0,00a210ede7a73ca33b64d3b8a0e382509d5bafa34ae84022125b180763aee2bd,2024-04-10T13:23:38.787000
CVE-2024-32672,0,0,ee6c48c3e0e38e8c391ea6261e7813807f206a60f2ac1e86a9d8d6aba39ed1b6,2024-05-14T16:12:23.490000
CVE-2024-32673,0,1,c9f67d54777fc1d6a602ef9ed03e4f5b3605cc09e4b1087225be42a1b82669fa,2024-07-03T12:53:24.977000
CVE-2024-32673,0,0,c9f67d54777fc1d6a602ef9ed03e4f5b3605cc09e4b1087225be42a1b82669fa,2024-07-03T12:53:24.977000
CVE-2024-32674,0,0,8e274e9762e7b32d105911c76fa84ee156bae08969022295a61c40a0ca8ab4bf,2024-07-03T01:56:55.253000
CVE-2024-32675,0,0,87b463967c2204618d7e556d0f9b434f519dfbe770ec74ef985201062de7ccc7,2024-04-24T17:16:50.397000
CVE-2024-32676,0,0,c48bb61830c9720695f0f8b0e8d63e64e27e7902456d765223bd42b42ebc2759,2024-05-17T09:15:38.620000
@ -250890,6 +250890,7 @@ CVE-2024-3293,0,0,3552485a27a6b6c8b2cadd17fbdb3e630238722099a3e2d8d97b0f239cd2dc
CVE-2024-32930,0,0,fb1d198b0a6f1c4a99609fcd492e188ff0ceff2fe76051eb0cb8c91155418b98,2024-07-03T01:57:20.283000
CVE-2024-32932,0,0,379c0ae6cc2f94f410885ca7cc028fe0bf4b04f9e7e3efc2f3c97b4b40e1ac9c,2024-07-02T17:44:45.700000
CVE-2024-32936,0,0,a98023d22d8fe34ca67d2e41b0f1a0096283ac909ae52ca8a63dcd8b920ad836,2024-06-24T19:26:47.037000
CVE-2024-32937,1,1,78a388a1ecaf925d74c3df02d2c7aa0b4c157156f6027d67bc22546b8a4aa00c,2024-07-03T15:15:05.803000
CVE-2024-32943,0,0,681ae4b7d296514b2b529abffaf20ed5b5c5e8eb8fff0f6f2bae62e656ffc6eb,2024-06-21T11:22:01.687000
CVE-2024-32944,0,0,357727703d6a86b0d608eb9af0488af030fe8a85e9a27818f7be4cd525bf7172,2024-05-28T12:39:28.377000
CVE-2024-32947,0,0,35287e8f28304ee9599f9712f94ac6e419772e1d66820555100faf85f8aeebf3,2024-04-24T17:16:50.397000
@ -251868,7 +251869,7 @@ CVE-2024-34691,0,0,827395ff4b0bf99f2642a5cd3134d1fe0effa60012a62490a349f26f4db25
CVE-2024-34693,0,0,6da431cb088539cdedaef048562e52acae68c24a7fe449888c5724e281a42b04,2024-06-20T12:43:25.663000
CVE-2024-34694,0,0,c52b0ddd7913e7b99d778e62e2419069bd9d8eb90d9108e75c7e8088bb5608e8,2024-06-17T12:42:04.623000
CVE-2024-34695,0,0,d5ed5d99c8f0d08b73ea3cb249327295e787f14594542dd2f27279ab9312830c,2024-05-14T16:12:23.490000
CVE-2024-34696,0,0,1697446274bb3cd395c26226b01c7397470c20a75a90bbad0605ce462858be0c,2024-07-01T16:37:39.040000
CVE-2024-34696,0,1,fc37f1f871594e87cfe2d19d9897a201f28cf21e82debe0acdfd6232ba7f8f65,2024-07-03T14:42:49.743000
CVE-2024-34697,0,0,95295a45851b4a50f600527e364638272a5d24a08a1ec02edb19abea712755b2,2024-05-14T16:12:23.490000
CVE-2024-34698,0,0,10e59d69dc4df1155204551f8483405755bab4be109bdea52b3a75e369d53b1b,2024-05-14T16:12:23.490000
CVE-2024-34699,0,0,25f405235bcdebbbdbdc15ae858e3622caf3e07dac211b82cab5ea59f42ec719,2024-05-14T16:12:23.490000
@ -252912,7 +252913,7 @@ CVE-2024-36246,0,0,50338f85842e71924c1397e2b0a309f647146226696bf59a5411ba0e6e468
CVE-2024-3625,0,0,bb7fa72c43d725aef9f66641f31c3359a614ed8ba414acf9f05b8e44148cef81,2024-04-26T12:58:17.720000
CVE-2024-36252,0,0,4edf18ae557d8c3498076af1a69a7b853e545554a27b9b0b40bcb780d22c50d6,2024-07-03T02:02:59.060000
CVE-2024-36255,0,0,22b21684452ad4563618ad5cee66dc719af723b04c8a1647fe9cf6d970347f9a,2024-05-28T12:39:28.377000
CVE-2024-36257,0,1,9dbf9f66bb71e56c15b7e6d1dac9a861cf932c1cba4dbcbe34f8663012d6624b,2024-07-03T12:53:24.977000
CVE-2024-36257,0,0,9dbf9f66bb71e56c15b7e6d1dac9a861cf932c1cba4dbcbe34f8663012d6624b,2024-07-03T12:53:24.977000
CVE-2024-3626,0,0,668faec6d18ac8a7c33197af94901aaf7ddac1dec4c77c1d646fba224d5f8541,2024-05-24T01:15:30.977000
CVE-2024-36260,0,0,268f67cf195b2e7e5437e7777158f76d317b4cf206300592ea57a0575c8548af,2024-07-02T12:09:16.907000
CVE-2024-36263,0,0,8fc77ae12c809e003508687bca8ef69500efdb9e489f26efe8ffb68dd267fd3b,2024-06-13T18:36:09.010000
@ -252980,7 +252981,7 @@ CVE-2024-36397,0,0,b682d6f470c0dada217073740a5ad29ca1b1f9032f70f4edd7bab7bdfb1f6
CVE-2024-36399,0,0,32a084399fffaab7b007a4925030bc8dfc9c8bbd3d7f25f567b275cd72694397,2024-06-07T14:56:05.647000
CVE-2024-3640,0,0,abbf5a33cbca708fe19710dda7a796491ae1d1614e9cd03f43d6cddef8b09500,2024-05-17T18:36:31.297000
CVE-2024-36400,0,0,6b10ab1f058055da0b7f6513936a46e66d6922b94171c5e956b85881f675cf7c,2024-06-10T19:39:21.660000
CVE-2024-36401,0,0,87e986c6abcb99589eb18d897c1eae35aa261f64a143786484b486b18d465a85,2024-07-01T16:37:39.040000
CVE-2024-36401,0,1,4e7824d6e0ba409db0bd3352043278eb790179388b8d748fbe3f7bbd11d705c2,2024-07-03T15:07:42.777000
CVE-2024-36404,0,0,bc349d6b7c657155d15e1c421e7bc9ad56ba3fcfaca14ccdbb458b8f57d45518,2024-07-02T17:44:45.700000
CVE-2024-36405,0,0,342cb049567ebebbbb5ec2f471f348f7e69a152097c662b875d4729bb76af752,2024-06-10T18:06:22.600000
CVE-2024-36406,0,0,4c4f64b7223e45baf0f4fcf71db77f8f804dae22bb20bd965ed8f0d422b0ddc0,2024-06-10T18:06:22.600000
@ -252999,9 +253000,9 @@ CVE-2024-36417,0,0,7f72be2da88bd03f2618a97d909b76dab66b1196af11257e6aa2fac632513
CVE-2024-36418,0,0,52272dc570f5081df6975298e5712cf123b760ef720bb4951287c4366378282e,2024-06-11T13:54:12.057000
CVE-2024-36419,0,0,e561cf6fec966fa1d9dbaeadf6c1b7f0c1186aebf1fa6c9a3ce263fb312ad74d,2024-06-11T13:54:12.057000
CVE-2024-3642,0,0,bbed1ee941355da6f32a6eba37e95a843dd7913c7dd227d8da7f65dcb683674b,2024-05-16T13:03:05.353000
CVE-2024-36420,0,0,e58b727e60b33d8076352d7d95342e64e8bdeb9a8c852f7906107955156df602,2024-07-01T16:37:39.040000
CVE-2024-36421,0,0,2db1f42564f0eaf58b885bc52aa44daebec6dc523b1d77558c17c8fa19b2495f,2024-07-01T16:37:39.040000
CVE-2024-36422,0,0,8982caabe6eb3eda8c34b1bc1a267af26cb5987e2c96eeefaf11d8ef2ed30e14,2024-07-01T16:37:39.040000
CVE-2024-36420,0,1,f88ca1da3f418238df7aa68f8868409c11480e63fa5a419dd8cae87369fdc260,2024-07-03T15:29:45.557000
CVE-2024-36421,0,1,6377f154589fbee582a888cb89fe433db93fc2d1b9f4ba90a9e9d6ff1a5422db,2024-07-03T15:36:31.170000
CVE-2024-36422,0,1,1c8e85fff4389539f30938d98dea0041c583b614c5e1956a8be795decf84cdf1,2024-07-03T15:38:24.297000
CVE-2024-36423,0,0,7993080f22032ce73ea739ef8e8e51e988ab7f86f630514176f775aada6bbe21,2024-07-02T12:09:16.907000
CVE-2024-36426,0,0,081cbabfe1f165d2e60c6bf5434c4cea5a1c1465246b1d9713d429b0a41c1ba0,2024-07-03T02:03:11.237000
CVE-2024-36427,0,0,10c5dade9c11af5e52239a7a8c18438909a8ea6a201617061be6b7626f49e18c,2024-07-03T02:03:12.033000
@ -253336,7 +253337,7 @@ CVE-2024-37079,0,0,9bbd76d5444005ceb39d0ac68b0b4e335d82d5da3fc1107a95914993fa985
CVE-2024-3708,0,0,09132fb1644ebf0c808002aa8ac15b19f13ae71d0beb378f7a9664a5ae685f9a,2024-05-24T01:15:30.977000
CVE-2024-37080,0,0,c953e426661198e9665c742ef09fb44af751efb40a1f491b02b9f5389b1d3d21,2024-06-20T12:44:01.637000
CVE-2024-37081,0,0,1657c2c6215fa861c8bf708a3b65df9501dd8a14588c6f7d5718007f5ce77c8d,2024-07-03T02:04:05.970000
CVE-2024-37082,0,1,328caacf63ca1ae228af83a0f72fd44cf3348c7af63b09a9299e7e3e6e5de895,2024-07-03T12:53:24.977000
CVE-2024-37082,0,0,328caacf63ca1ae228af83a0f72fd44cf3348c7af63b09a9299e7e3e6e5de895,2024-07-03T12:53:24.977000
CVE-2024-37085,0,0,cd98b81b11dac217262bd62ad7a681095bdd9649a519f6ee026fccbd3bf44a32,2024-06-25T18:50:42.040000
CVE-2024-37086,0,0,9acda53f27945df629654a7ed0b5babbb28f25e9a7ac50fce3893c7a6b8964b4,2024-06-25T18:50:42.040000
CVE-2024-37087,0,0,4e40b7ea7a56e7d2dfeb244220c863a1ed6df7c4211908de27563a1ed62e9bbc,2024-06-25T18:50:42.040000
@ -253554,10 +253555,11 @@ CVE-2024-37699,0,0,e6aa9aad96c5cb91a6fa4201b1b47001ba232f78e3136af80ddfa6d4248f5
CVE-2024-3770,0,0,8954a3ad0db5fc9b48d9243a1de01e444d03084d0f8b5d5da9ebc562e8f0e6a6,2024-05-17T02:40:07.387000
CVE-2024-3771,0,0,1bf22922ed0657906343b6368a2362d22a78a1ff9d5272db064e582b3b0855d4,2024-05-17T02:40:07.477000
CVE-2024-3772,0,0,184d29c2faf230c27e7c42ad45c478e7862cbffdde795ec4220824e36861b510,2024-04-26T02:15:06.983000
CVE-2024-37726,1,1,cf8c8adbac07e4ab41cdbeea022956581b212f36b844acfc4ccad3eb7e389f64,2024-07-03T14:15:06.120000
CVE-2024-37732,0,0,8bcaa977ac18e5833de4fd0520da90883ea1f9cf5405317587bb381c54de852f,2024-07-03T02:04:38.513000
CVE-2024-37734,0,0,0e5d8052c40ece19eb47666a762eea5411abf63f936921b36baec3d43e53baa8,2024-07-03T02:04:39.343000
CVE-2024-3774,0,0,430454733381ff5a96eb00158d8d932d4c087496720223836bce2968611b5152,2024-04-15T13:15:31.997000
CVE-2024-37741,0,0,3c71ffbbf01e4a0e4425969bd458658ba5fb7e837c3a88f69ccf919fc0b22481,2024-07-03T02:04:40.153000
CVE-2024-37741,0,1,f5ed3254675cb5ce3a67ab08ad08f5443ff303292af76c58fe640715a6de27a4,2024-07-03T14:27:08.057000
CVE-2024-37742,0,0,82d0f7bd796b50c91f2398edb7b6a7a5b24c344e32d17491fc5d315bfb23b371,2024-06-26T20:15:15.917000
CVE-2024-3775,0,0,a79253f4f0c7633f40fa5e33903553d0137ff03b4a2d8425a028bb5ddf1c6b0a,2024-04-15T13:15:31.997000
CVE-2024-37759,0,0,fcc8ead5df9d431db40c232755b8d406131bfe6bf2637fa79e9581b47deb8f46,2024-07-03T02:04:41.510000
@ -253629,8 +253631,8 @@ CVE-2024-3794,0,0,153385e096cd7f2ece15b2458b2e9fc3a616d4e8c794288f506409f055c027
CVE-2024-3795,0,0,394c789f966243db6d7a4bfee356db0989703de57fa4252b7833b38d6036f026,2024-05-14T16:11:39.510000
CVE-2024-3796,0,0,8b56f1ae3498f70c780deb392dd70e4b0e2eb55d8dc491cebdead02f06bb596a,2024-05-14T16:11:39.510000
CVE-2024-3797,0,0,ee6a5db4c86b7a1cb7dddd0f923d514d4da716af84fa2cbea88db014d700ce37,2024-05-17T02:40:08.123000
CVE-2024-3800,0,0,0aee6a42b2039215c9eaef826d097369b3f1d3a7d2da64d84dcd5461a8ce6887,2024-06-28T13:38:47.077000
CVE-2024-3801,0,0,fcfad6b0ce02399c7d678f395fb128f6fba813bc23e60b051d597cd380d4b8e6,2024-06-28T13:38:47.077000
CVE-2024-3800,0,1,f8f57ef4bdedf9e336bba69e6db949ed7a578f3b2a10988d7c69ed3685de0000,2024-07-03T14:36:22.273000
CVE-2024-3801,0,1,59de265ce1af1c02a0bfcf9801db717e0400c3bfeeedabcf1fa6b682733a5570,2024-07-03T14:36:52.797000
CVE-2024-3802,0,0,aaa997a68afe711762ac8536c5d0fad15740edaa6785e851a1495f0cf1f43e75,2024-06-04T02:15:49.290000
CVE-2024-3803,0,0,cefb64222fdf80706b1a9eb17e095bbe2f795f698686df2fa7fab7399b51955d,2024-05-17T02:40:08.240000
CVE-2024-3804,0,0,6cbbef68e2216a1b6714fc89ff2a16fd432ad36dd1cabadaff597df2e56ce61a,2024-06-04T19:20:24.583000
@ -253647,7 +253649,7 @@ CVE-2024-3812,0,0,f751171253b8aec65ad3eb6d2474d3ee930fd7bd925f44cbf577354bd9ac3c
CVE-2024-3813,0,0,86c7d7a0e1d2bdb1014ab3bb60ae32f55f8deca1eac3a0f16e2b300f92de13c6,2024-06-17T12:42:04.623000
CVE-2024-3814,0,0,6acb0a54e9f66c1fa69cea6ef32be45b05b60edf6b85ffbcc82a92f37f75e3c1,2024-06-17T12:42:04.623000
CVE-2024-3815,0,0,6bd5773f540c574f8e28080694e60819f34c3381e2d8c38f1a9a67bfdd0a3098,2024-06-17T12:42:04.623000
CVE-2024-3816,0,0,2c60ea3e6d8885876bc73fbf9a3e32dbc86d267cf2e909cefcb1e686654852dd,2024-06-28T13:38:47.077000
CVE-2024-3816,0,1,ca9c8b3746ea2ebbbc383e9aa135dd99550dbafdbe5ff9c69dbe15b33a0feabf,2024-07-03T14:37:07.750000
CVE-2024-3817,0,0,46e4b3903939ad7f28eeb8afee28fc4c5b18be71847d60ae426ede3b66e11122,2024-04-18T13:04:28.900000
CVE-2024-3818,0,0,3b93c96d931c7712dba585285a5a0f954163c40c8ab2b4d2e42e74b7a416a166,2024-04-19T13:10:25.637000
CVE-2024-3819,0,0,070335cf0d21b4518c9cf130cbde224bb7db7bd3582033700dab419bc756cd20,2024-05-02T18:00:37.360000
@ -253732,7 +253734,7 @@ CVE-2024-38443,0,0,f13f48a0a21a67520512a3ec2ab6e073a68af4c8b774478a4c1ef20277a5f
CVE-2024-38448,0,0,ba1871b7e0fa187923744d63be4c60396badf8afd9c3275c2e47e89175ed02ba,2024-07-03T02:05:03.433000
CVE-2024-38449,0,0,d69089b504731433d7b543e10e4b6e57d1623551f30ae8f192ba71fc59819634,2024-06-20T12:44:22.977000
CVE-2024-3845,0,0,a979e2b537f528e4ac50f6006d078d735fa62fe4b7376a25443b79e4c194cadd,2024-07-03T02:06:42.887000
CVE-2024-38453,0,1,b37e4b9aac2e83312b7d279f2154b9c8c3686acce89ef9f2a457cc06a849c6a9,2024-07-03T12:53:24.977000
CVE-2024-38453,0,0,b37e4b9aac2e83312b7d279f2154b9c8c3686acce89ef9f2a457cc06a849c6a9,2024-07-03T12:53:24.977000
CVE-2024-38454,0,0,9e16cbeba5810d367094a131b56862641aa42d77b0ed4c90d4e4d7e92bb854dc,2024-06-17T12:42:04.623000
CVE-2024-38457,0,0,c77550a7e2a9252924a4646a20696a029639d1882dc30abb38808d48a175ba0c,2024-06-17T12:42:04.623000
CVE-2024-38458,0,0,6851fd0120a71792de2b3d031afad7ff8acc6e8b0a3bf2458c8fd1c3754c1414,2024-06-17T12:42:04.623000
@ -253782,7 +253784,7 @@ CVE-2024-3853,0,0,7e352b0debfe2ff1972966571472dc1ad9a92992dff183ce4b7132f5ac558f
CVE-2024-38531,0,0,b56de69adb9e29b508ff804eef5c2919280b3646aaf65838ea0969fdce8b1636,2024-07-01T12:37:24.220000
CVE-2024-38532,0,0,3a3b54122bd6780d32b0357101fa3b70c56bf5cfbd9b29132bcf407b07a6cf4a,2024-07-01T12:37:24.220000
CVE-2024-38533,0,0,bc3eb3ef979bf5295d109db19e6d12afcecc2e011ea06aeec96e0b38c48ef42a,2024-07-01T12:37:24.220000
CVE-2024-38537,0,1,103402269a270a67bfe215eff7f2c87681abb6bef0d7dc124a63de178d731b3b,2024-07-03T12:53:24.977000
CVE-2024-38537,0,0,103402269a270a67bfe215eff7f2c87681abb6bef0d7dc124a63de178d731b3b,2024-07-03T12:53:24.977000
CVE-2024-38538,0,0,fd8d0c414421b9d83404be9e58919f8d1c04c080d100c149e46c3a374cade8e2,2024-06-20T12:44:01.637000
CVE-2024-38539,0,0,bb07b10cb8e27f63a4ad4d8d9f4efc546da28e9a77992ff13895f8e8066ae4a7,2024-06-20T12:44:01.637000
CVE-2024-3854,0,0,f383320435301230a2dac28bdc7db79c6e74ee12f38932e432ec4f2020fa918e,2024-07-03T02:06:46.110000
@ -253995,12 +253997,14 @@ CVE-2024-3916,0,0,67c028ed5cffa81651cfdb7590d8583ba32a4964953feede869ed8c9f6426e
CVE-2024-3917,0,0,87493362103f61e3758851588aca1cc3facb0cf1f97ad5b068e06e988e9b2161,2024-07-03T02:06:53.877000
CVE-2024-3918,0,0,f0312710b8f2207cc4daf3e960aa8906c7e8839f8babda55f2853fd4763a97f9,2024-05-24T01:15:30.977000
CVE-2024-3920,0,0,5dbee28fbacc5f4bbc65481ff7f645499d60469b501d304207882ca441f74491,2024-05-24T01:15:30.977000
CVE-2024-39206,0,1,f9fb00f1e181a34e546a4d02526b8d7182abaed8338954851ed4beadabf72272,2024-07-03T12:53:24.977000
CVE-2024-39206,0,0,f9fb00f1e181a34e546a4d02526b8d7182abaed8338954851ed4beadabf72272,2024-07-03T12:53:24.977000
CVE-2024-39207,0,0,d8e667b43b76095c528f5867a8617c4177e3d9ac8aefab820b7b82f9e44a4991,2024-06-28T10:27:00.920000
CVE-2024-39208,0,0,bfca919135cb16c924d14a3e46a90c36fb45e8d6f50651e543c7c3b74462722a,2024-07-03T02:05:43.393000
CVE-2024-39209,0,0,846eb9e93730bd8a4e0e342a01db126b493a0877c61de0d40de722388e34129c,2024-06-28T10:27:00.920000
CVE-2024-3921,0,0,dc44586c5c7e1c74f5850e7b4d244cf53da902f950a29ac6c4f232f966454542,2024-05-29T13:02:09.280000
CVE-2024-3922,0,0,9c35bb7d9bca4b5559bb1a4dfea91676bf1d098f4dc5952b2a109bcc30a68d2c,2024-06-13T18:36:09.010000
CVE-2024-39220,1,1,ee539c7dd926c4141adfea89a293da82fc291d0c8bbf25ffc9e07f033b77b6dd,2024-07-03T15:15:05.993000
CVE-2024-39223,1,1,edd1c5b1f2e5387a540545af51f1838c7b3d17fcd3fbb559bc7e28e94aed9c4c,2024-07-03T15:15:06.083000
CVE-2024-3923,0,0,dcd7a979944a34edd9f4dd960691916feb4f3b194c37e215c41a761a1e13cac2,2024-05-14T16:11:39.510000
CVE-2024-39236,0,0,5bedffcf34ebde5608a8c6d0266193b958a561f9cfe93a597c1123eb6d56c52a,2024-07-03T02:05:44.203000
CVE-2024-3924,0,0,396cfe762c72fbd5a1960b1ddaed612b95d18abd602e0e4dd151e2967ca06c2d,2024-05-30T18:19:11.743000
@ -254031,14 +254035,14 @@ CVE-2024-3931,0,0,ff26b5a8728d6a7f3e1f8095f9d431d98f0c624577950ceaf4dc1cf9ad6880
CVE-2024-39310,0,0,187be4dc945171a7657d1459e6c80fed53aa1f7d448ef02205a5dc997f08bebc,2024-07-02T12:09:16.907000
CVE-2024-39313,0,0,9e833554bfb77c34493fd31ffb1eaf0ef9773e2886372005ffb0d80f9a99cb5e,2024-07-02T12:09:16.907000
CVE-2024-39314,0,0,f08a68c1585aac53ed3340b30b7ca1fee7f99b287e34df66dd62620bc6eee2c4,2024-07-02T12:09:16.907000
CVE-2024-39315,0,1,a63beff0a6cc21a12673e8ba65716d45b6c52abc54b22460a729ebfe04cdda63,2024-07-03T12:53:24.977000
CVE-2024-39315,0,0,a63beff0a6cc21a12673e8ba65716d45b6c52abc54b22460a729ebfe04cdda63,2024-07-03T12:53:24.977000
CVE-2024-39316,0,0,d47aca3c5197170fc8f05033ffa682fd40e1aa1436fadb43bcca23faeaecd5c8,2024-07-02T17:44:45.700000
CVE-2024-3932,0,0,371291a71f9c99e371f96e7d7b61e3e11967567047c07fae80310c4772d1c0c7,2024-06-06T20:15:14.030000
CVE-2024-39322,0,1,708cd5de8c07f904d1ba83d6367c23eacb2b2cf3f907adf630b27179cc7d25d8,2024-07-03T12:53:24.977000
CVE-2024-39322,0,0,708cd5de8c07f904d1ba83d6367c23eacb2b2cf3f907adf630b27179cc7d25d8,2024-07-03T12:53:24.977000
CVE-2024-39323,0,0,8b592e233643a568789a282215e3d651e9257e7274946ce7dfcbad9339346353,2024-07-02T17:44:45.700000
CVE-2024-39324,0,1,75a65563a1468710cdae5af44a5e63fb7b35b0a6c50055f03af94f2ccbf33c01,2024-07-03T12:53:24.977000
CVE-2024-39325,0,1,014e4593e1f5768db5ed0f4f9796d958998c433eda4ad78f248afb017315aecf,2024-07-03T12:53:24.977000
CVE-2024-39326,0,1,967fc66349db0f6c5363f95a2959465d03482ebce2b1293649c92ff8d8a8034a,2024-07-03T12:53:24.977000
CVE-2024-39324,0,0,75a65563a1468710cdae5af44a5e63fb7b35b0a6c50055f03af94f2ccbf33c01,2024-07-03T12:53:24.977000
CVE-2024-39325,0,0,014e4593e1f5768db5ed0f4f9796d958998c433eda4ad78f248afb017315aecf,2024-07-03T12:53:24.977000
CVE-2024-39326,0,0,967fc66349db0f6c5363f95a2959465d03482ebce2b1293649c92ff8d8a8034a,2024-07-03T12:53:24.977000
CVE-2024-3933,0,0,1d08d4e317596700be65ef5300f76b449794bb2d8b1542a98c34b9cd74fea015,2024-05-28T12:39:28.377000
CVE-2024-39331,0,0,e27921e016dec51173f86ad420de9e9174de4baa540da3f53e6e1157ef72adc9,2024-07-03T02:05:47.260000
CVE-2024-39334,0,0,7a242c73a28ed17874e43348a26da2104869d7ef8d91c48fe0d8d7e00f57c31d,2024-06-24T12:57:36.513000
@ -254049,9 +254053,9 @@ CVE-2024-39349,0,0,e2c0ea0897db587383c2ec6939a8e8f30324733a4c2be5e6f6d88b1c64f32
CVE-2024-39350,0,0,2818f75b3d24495902c39d5dd3d46a13088a057469d774fcd7dea3e2c6f7b648,2024-06-28T10:27:00.920000
CVE-2024-39351,0,0,73835562ac8c8f624018ac3f57736429a15ab60f19fdda354656ce6bebf2a36c,2024-06-28T10:27:00.920000
CVE-2024-39352,0,0,a6ac4cc6df4e978ab98d2526b0d0ca42ad6af92292b36fb34063680949363975,2024-06-28T10:27:00.920000
CVE-2024-39353,0,1,dee41995885732d5f01d40a8c0c8c8774900d0671d3f357636f60643bdb33d7a,2024-07-03T12:53:24.977000
CVE-2024-39353,0,0,dee41995885732d5f01d40a8c0c8c8774900d0671d3f357636f60643bdb33d7a,2024-07-03T12:53:24.977000
CVE-2024-3936,0,0,1a9ebdb5653b792bdb8abb0138184d539d6d0e0c9af8da519de630a92cc0aee0,2024-05-02T18:00:37.360000
CVE-2024-39361,0,1,0c97fb023368f7ebdede00eba9599cd831fbc033a414f99280ed3ea4b7636734,2024-07-03T12:53:24.977000
CVE-2024-39361,0,0,0c97fb023368f7ebdede00eba9599cd831fbc033a414f99280ed3ea4b7636734,2024-07-03T12:53:24.977000
CVE-2024-39362,0,0,a4e72d457ad79497d234146ef4f9a3e9f07fed3f9039766cdc9d7026e27b2016,2024-07-02T20:15:06.353000
CVE-2024-3937,0,0,47b49a69bcae07617978c4de23b5bd0d4eef565a4a3d61421481625d7a4abea5,2024-05-29T13:02:09.280000
CVE-2024-39371,0,0,8c1a1238e769d76e82e2c2cc608bc61bb27789621e5380cf2965b3d5a5e744e4,2024-06-25T18:50:42.040000
@ -254103,7 +254107,7 @@ CVE-2024-3967,0,0,b2af76e65b0ac2fff588b8ab332f0978e5b083cdcdd41f3fd643403fe236fa
CVE-2024-3968,0,0,cdd73cfcec56ac4302e4eb4a932f862086b9a3ed46ed5ff92d17197e11553e8f,2024-05-15T18:35:11.453000
CVE-2024-3969,0,0,793622b6641cb8c2dc34802adf1ab9ece645cce7d321b9faf1a6b76d5e28ec78,2024-05-28T17:11:55.903000
CVE-2024-3970,0,0,a6d2ad116e736372d8ee0cd28cd0cbfef25f3ce953ea92bdb2b1ac922e65eedf,2024-05-15T18:35:11.453000
CVE-2024-39704,0,0,46d48385d4d162b3ac12c54e9ccb839ccae9f35d96e3edd9d9bfd3968e019316,2024-06-28T13:38:47.077000
CVE-2024-39704,0,1,1d59c065d69d465eb86bf6114b5299aaf44c728f69d6748df6b6bd65077d4590,2024-07-03T14:32:56.510000
CVE-2024-39705,0,0,91d39f33d5bd2d9618d124407e406b5aefb3921b0f0d526c128476a4653583c8,2024-07-03T02:05:51.507000
CVE-2024-39708,0,0,111516979aea28b8e657aa098e90e19a44667358e9b94bc0cc0d55aace553cee,2024-06-28T10:27:00.920000
CVE-2024-3971,0,0,1320cc801330d2d12e5c1ffdfdf6be7f25a4100ca447a2f7a5815c90f2431f60,2024-06-17T12:42:04.623000
@ -254112,9 +254116,9 @@ CVE-2024-3974,0,0,30b94b89b01dd2c6057362330f67dc78937f3f3edffa0c5a57e7602f711f91
CVE-2024-3977,0,0,e9f44416847592725fc2cd47ffed9c743bca75989a5c2d940c73903d22d68b79,2024-06-17T12:42:04.623000
CVE-2024-3978,0,0,338ec55d360d0ecf1dfe595690a2d37e24aa4129fa5a75aae324bfa31cd2fe9a,2024-06-17T12:42:04.623000
CVE-2024-3979,0,0,4ac2126fe63098861061c1ed3772b0712449f42e64a5481492de94fd61a5b947,2024-06-06T20:15:14.127000
CVE-2024-39807,0,1,07c386020311e145a20dcae00a754aea7481144e104f9b99b56a5a82372beea8,2024-07-03T12:53:24.977000
CVE-2024-39807,0,0,07c386020311e145a20dcae00a754aea7481144e104f9b99b56a5a82372beea8,2024-07-03T12:53:24.977000
CVE-2024-39828,0,0,a076e079a0d15f60c3c4a55d02ae6ed731ea38682b9215046585ce79ae4cfb80,2024-07-01T12:37:24.220000
CVE-2024-39830,0,1,215aa5fd15609846dfbec6cfbf9cc2bf59b25eefbdaea3ac7fa164cf6842c628,2024-07-03T12:53:24.977000
CVE-2024-39830,0,0,215aa5fd15609846dfbec6cfbf9cc2bf59b25eefbdaea3ac7fa164cf6842c628,2024-07-03T12:53:24.977000
CVE-2024-3984,0,0,bee410e9bf0342c5ecf3886d76050e2314329db97e17f53f9285ff32a0d9ee8f,2024-06-20T12:44:01.637000
CVE-2024-39840,0,0,5d7e4142131887a411bdbeea93ed887c2e0abb0654faa364c29fef4ac994d185,2024-07-03T02:05:52.307000
CVE-2024-39846,0,0,cc3d14fb15e20c985bb7fdeb359e7a12ea1918f79b7c4c3ac03373ad528c69cf,2024-07-01T12:37:24.220000
@ -254126,17 +254130,17 @@ CVE-2024-39878,0,0,038c252a5df59aef0ff494dd466e8c23160164cb5ac894aeb1a33e06001b7
CVE-2024-39879,0,0,1b030ce3798bca0bad33a3937cca95b776786d7918bf02f25bff668e667acaa0,2024-07-02T12:09:16.907000
CVE-2024-3988,0,0,ed49ad0e503298ba2fe40c90a665a86dcb918b5087ac61c1edfd746c2ca95d24,2024-04-25T13:18:13.537000
CVE-2024-3989,0,0,41a6b1dcae0354fb8cba40366dc7ed1eeb84d6a6a33689c35123198fe63c8f01,2024-05-14T16:11:39.510000
CVE-2024-39891,0,1,41ce53dbbcfb923c73770e761bd2bd927865451911c7f7e17390a498d286d470,2024-07-03T12:53:24.977000
CVE-2024-39894,0,1,c61bb2661100853548279e349e76a635cba102e2f9a2c3076410b71ec944a6f0,2024-07-03T13:15:02.890000
CVE-2024-39891,0,0,41ce53dbbcfb923c73770e761bd2bd927865451911c7f7e17390a498d286d470,2024-07-03T12:53:24.977000
CVE-2024-39894,0,0,c61bb2661100853548279e349e76a635cba102e2f9a2c3076410b71ec944a6f0,2024-07-03T13:15:02.890000
CVE-2024-3990,0,0,7879115af68e1891db08bd2dafc44fb55db15680f59885de2ed87fd5c16d9492,2024-05-14T16:11:39.510000
CVE-2024-3991,0,0,f4b27e31b2ebe06401478accd9d85264142bf207d27ef139c240399354705c4f,2024-05-02T18:00:37.360000
CVE-2024-3992,0,0,ff644523dcb07d662c2bf53b9e125872cf5c9b9df16e03b5f8dec25363b303ae,2024-06-17T12:42:04.623000
CVE-2024-39920,0,1,8281f1288058876e172a78a04b7e10123b671826d2c29ba249d059d614d38347,2024-07-03T12:53:24.977000
CVE-2024-39920,0,0,8281f1288058876e172a78a04b7e10123b671826d2c29ba249d059d614d38347,2024-07-03T12:53:24.977000
CVE-2024-3993,0,0,a2f94f13d02cfe8603a71433706e6cc2c5ad0c0e3e2fd5d51c299cf3fc301a73,2024-07-03T02:06:58.160000
CVE-2024-3994,0,0,292539249e741e7003c555a5d4fa2182b15a01b393fb04fa15e675750c01906e,2024-04-25T13:18:02.660000
CVE-2024-3995,0,0,a7fe690817691037765b680c602849c2a36e767bb2849159693fe5a7864f46cb,2024-07-01T14:15:05.680000
CVE-2024-3997,0,0,507ae8762d75f9d68eda75aa3a6fbbaf1b3579404dfa0ecd9f2978d2aa87a55f,2024-05-24T01:15:30.977000
CVE-2024-3999,0,0,d855e263f238cc0580530dcbe41b732e5a7fc792eec652c4279dc80589279eed,2024-07-03T02:06:58.680000
CVE-2024-3999,0,1,4248dd2372447004bc43614b1896e27a040049c0dba411de9512ee0e6f816fb7,2024-07-03T15:44:56.130000
CVE-2024-4000,0,0,63e68b686bb1abbdcd2ddeab613f2e83d1883c904c164f21a1076ada49583fc9,2024-05-02T18:00:37.360000
CVE-2024-4001,0,0,01ff67c0d3df1be38408b913fb09a0fa8e839c64a815c3de41b48a61aa2ae8cb,2024-06-11T17:27:53.637000
CVE-2024-4003,0,0,9b9be828f15a04db891b79e7c6ebf75d000360176e249e61f2acbb014741196d,2024-05-02T18:00:37.360000
@ -254524,7 +254528,7 @@ CVE-2024-4478,0,0,31a4a4c48861c0c170c939e3aa0b10661ec97e9653465707919926dbd35951
CVE-2024-4479,0,0,5ea4f16cbb65b856fd1892d7f18a0653a4e499cdb8b18f25028aa3d91283004d,2024-06-17T12:42:04.623000
CVE-2024-4480,0,0,585ced159bf2873044aaa034a55a2124aa433419daa101a5837cc3efb9afe316,2024-06-17T12:42:04.623000
CVE-2024-4481,0,0,7ecf88f2a22a659849266bdc0bd40c464d195e3dafdf490c58869a301c87572b,2024-05-14T16:11:39.510000
CVE-2024-4482,0,1,eefc183aff4d36a44c2b3a173766fba4bf4f7bbebf2739a2af7c403553ee5888,2024-07-03T12:53:24.977000
CVE-2024-4482,0,0,eefc183aff4d36a44c2b3a173766fba4bf4f7bbebf2739a2af7c403553ee5888,2024-07-03T12:53:24.977000
CVE-2024-4484,0,0,72c4859b8727b60eeb9f8012483883c0571b4cb8b1cb2ce9a8b1f5e495641e3c,2024-05-24T13:03:05.093000
CVE-2024-4485,0,0,856a7368e5f121163f839e4b6c92a8e77de213c5eccf98592455e970e028d37d,2024-05-24T13:03:05.093000
CVE-2024-4486,0,0,da9bfd47ef59b3a57d52a6c66bb31a65c305ed47bc1cc335b2b3ca5ab24769e0,2024-05-24T01:15:30.977000
@ -254584,7 +254588,7 @@ CVE-2024-4539,0,0,83e8dd6ad2ba7f5df744ac27f19ba7dd20f88687370090b4e13c20c65e81aa
CVE-2024-4540,0,0,dc537153d649e10b7c874b04ae96fc2345a92f4b276e017e0d8b384efb35ed61,2024-06-03T23:15:08.930000
CVE-2024-4541,0,0,4a3da304d2331b57d3e541aebfe20ad4a144b63766e310ccc54304f1be43b1dd,2024-06-20T12:44:01.637000
CVE-2024-4542,0,0,d17f875757344f90ad0b6ea46d223a5444286908c9043b3fba1504d3883c4c6d,2024-05-16T14:15:08.980000
CVE-2024-4543,0,1,69391ca27ea6f73754fb8fe52f104143168f4fbeb7d93137e3866d4e169f292e,2024-07-03T12:53:24.977000
CVE-2024-4543,0,0,69391ca27ea6f73754fb8fe52f104143168f4fbeb7d93137e3866d4e169f292e,2024-07-03T12:53:24.977000
CVE-2024-4544,0,0,5a154bb8f5362adfa7d1d9ca8e07fcce2012291bc3a87e95a1b546af1c241c8c,2024-05-24T13:03:11.993000
CVE-2024-4545,0,0,6a8513e5f42227bdebff4b9eb7cd99ee2da82484e9d02165945026400c877f9c,2024-05-14T16:11:39.510000
CVE-2024-4546,0,0,3d8214b19328ce0698128d2541020c31eac589ba32f1eccefac58acec39f32be,2024-05-16T13:03:05.353000
@ -254657,7 +254661,7 @@ CVE-2024-4622,0,0,4b1992fe33b227c66e64bdd4cf1c71e31b73a98abda6bdd8e7687e0db4e861
CVE-2024-4623,0,0,47ffc2e7580d30150a9d70c6a59a76ed1e3bc3dd5141525204779a13dc1a77fb,2024-06-20T12:44:01.637000
CVE-2024-4624,0,0,2a601b2b9934f4e4184c90fc3ba9cbddeec712a59701e0372ed6d18cfcc3b7c7,2024-05-14T19:17:55.627000
CVE-2024-4626,0,0,f72dde4d01fdccbcae8f7fa43d1f4fdba6634ccf9a4eedc330d8e157eccf8120,2024-06-20T12:43:25.663000
CVE-2024-4627,0,0,54bd30bead354294b48fe249d643bc73bcc7d1380abeeb01ca2b741806fe2836,2024-07-03T02:07:51.527000
CVE-2024-4627,0,1,a94951b310ac8fa22dfdfb5dfa1a6f0b0e4706e2176059eb33a39431470f56d3,2024-07-03T15:45:08.187000
CVE-2024-4630,0,0,f5808b44be131bdae6b6920228d425b0dd235ef4afe8685cc2ea30d538a619f5,2024-05-14T16:11:39.510000
CVE-2024-4631,0,0,e8ed3d07eca49fd9ce5a62406bcf23da9793cbcc792a956665a267b4f25fd693,2024-05-14T15:44:13.487000
CVE-2024-4632,0,0,34df16eb26fbe037cb544d7499c4d02f03b9e69baf43a3990c97609a249304ed,2024-06-20T12:44:01.637000
@ -254723,7 +254727,7 @@ CVE-2024-4704,0,0,9637a93e192a5f32142e05687e31ff3688b029254561fc4728d18bbfa1666d
CVE-2024-4705,0,0,b45f335ad46575e30510e82573f02b490faa16d9b6ee89b66a9844ff390b53aa,2024-06-06T14:17:35.017000
CVE-2024-4706,0,0,a959e13293b1a5966007eb60c79cb973f34e4d1d8bd1c12986cac54d81ac9a3d,2024-05-24T01:15:30.977000
CVE-2024-4707,0,0,d6a01a1a459dfd9ab21945d56af40919cce44b311e282118c993194b130db955,2024-06-06T14:17:35.017000
CVE-2024-4708,0,1,8cec8d3c98f03426276473bd86d4c40854969a664eb1a1ad68a38c039fa7f150,2024-07-03T12:53:24.977000
CVE-2024-4708,0,0,8cec8d3c98f03426276473bd86d4c40854969a664eb1a1ad68a38c039fa7f150,2024-07-03T12:53:24.977000
CVE-2024-4709,0,0,c27b22c30c2569acd5c758eb82bd584c5ae09da5862ed28e288bc8b8f592259a,2024-05-20T13:00:34.807000
CVE-2024-4710,0,0,500a7d3af356181a474ebd9523b50fd3ae653f9a07ad01e5b7699589bd4ccc5d,2024-05-21T12:37:59.687000
CVE-2024-4711,0,0,5c0c1fdafdfc7c3555551e67a6280882d1277b637b3ccb31a4bc6994c2c7441c,2024-06-03T14:46:24.250000
@ -255224,7 +255228,7 @@ CVE-2024-5345,0,0,6eb378e53e73ecd765d027e2916fd67b3a9d8ae24f673780d53a54e981925c
CVE-2024-5346,0,0,c05bf26dcfcb17ea5e2642ece4ffc41fdd320d61cead8cd0f113cb8dff16ff08,2024-06-24T20:00:59.240000
CVE-2024-5347,0,0,1da2ccb898789a7c7262d2aa6524b222bbe92ed9796804e25855dd4dd20a5fae,2024-05-31T13:01:46.727000
CVE-2024-5348,0,0,cdabb7de233f48a7127c4333bb3ba86c3b13ada38da5d506ab1226337e3a511b,2024-06-03T14:46:24.250000
CVE-2024-5349,0,0,d9c1031fed50c00ff212f0d63c2d8a2e426ecf9d35b8f18b93d3efe678c116af,2024-07-02T12:09:16.907000
CVE-2024-5349,0,1,095035450c60a13c08898917421d5656b2399179b1253e40806dcf47c3a4d9f7,2024-07-03T15:44:23.807000
CVE-2024-5350,0,0,60bbd22831ddecb115d40713a9dc768f9983e70563a63aa9f7486c68fbd4f9e1,2024-05-28T12:39:42.673000
CVE-2024-5351,0,0,849c563f6a9785a6decafe5b39b97f8dd3babada31dd9f1d8018a42e31dcbe7f,2024-06-04T19:21:05.570000
CVE-2024-5352,0,0,8e62b3751e48149af890214c9d6b69b191b794c04287005ea69e03ffcccdf095,2024-06-21T18:15:11.303000
@ -255288,7 +255292,7 @@ CVE-2024-5413,0,0,7e9a221441ea2188d01aa42e534f11d3e951030583aa76eb413a65755ac241
CVE-2024-5414,0,0,faf8733c0a06d2e39229c90d7881f5076ce30b09e5d94ecd5fd2768bd6a1a3f5,2024-05-28T14:59:09.827000
CVE-2024-5415,0,0,e615267af075200e8a68eba737ca986180838ab470ec27ba44066223fc68c93f,2024-05-28T14:59:09.827000
CVE-2024-5418,0,0,34559e586e07e049a8a9a117bb9e7e6c096f39aba1e2b0a8b270afaa7cae4590,2024-05-31T13:01:46.727000
CVE-2024-5419,0,0,ca56ebdbe0bec4ab68fa7131037a346882d6a83fcd3b933da3e72484dcb3a1c7,2024-07-02T12:09:16.907000
CVE-2024-5419,0,1,0d1c725f53c48278ea7823202c4adf24cf8a04c4aff5d8363f101c1d9f2798db,2024-07-03T15:43:09.450000
CVE-2024-5420,0,0,222f60409f504903340df1620dc6c61965c58fdcf056b93ed6f6eb922650d2fa,2024-06-10T18:15:38.367000
CVE-2024-5421,0,0,eeaae547052b8ba8c3bcc84128ffe19889621e4502681053a6fefc5f154f36a9,2024-06-10T18:15:38.447000
CVE-2024-5422,0,0,e03ce382c526ecd3bfff8f1e460f72d6c4cd6a77ce94308cc520da1bff4b9a65,2024-06-10T18:15:38.520000
@ -255401,7 +255405,7 @@ CVE-2024-5598,0,0,dea97cf43130ffc7ec8c1e0439cc4a1d595d430c970e2a6bb452f71273924c
CVE-2024-5599,0,0,e4d8d3217ca804a33354b51b54e1f3f41ce0e1fc1f554dedfe90ad1a46a87370,2024-06-11T18:24:39.057000
CVE-2024-5601,0,0,e22064ef868b7763ab6a035a66dc94fbf47f776f059b7b471d5873c49e582f7a,2024-06-28T13:25:40.677000
CVE-2024-5605,0,0,4bb70fac398eb5e1fc6a3b8761dcfee9993510711b196c5d9f90dc1e34c785a3,2024-06-20T12:43:25.663000
CVE-2024-5606,0,0,67661dfc366570a7697ddfbe211235e18c34fcd62cf069ffa21e3dabe87c16a5,2024-07-02T12:09:16.907000
CVE-2024-5606,0,1,77ca044404d627b5230fd0abf899745b4715aa4e19e52966299c5c3e2cb213db,2024-07-03T15:45:19.513000
CVE-2024-5607,0,0,9601597658129a089207c1a0e7e7267aceda952302ad39754d738e7307549543,2024-06-07T14:56:05.647000
CVE-2024-5609,0,0,f28c83e3e9d04345913d36de3bfdbd0d644d73b3d20045d9399b3368319c8d47,2024-06-06T19:16:09.920000
CVE-2024-5611,0,0,7f38716b1ccbe035f7f86ea6c7617ab6f4cac8651e00e7906bbdbf77091ab5a1,2024-06-17T12:42:04.623000
@ -255433,7 +255437,7 @@ CVE-2024-5663,0,0,e65ed9bd668d6456ce5b39954ddd0ae3860f1cde2bd069c4d43e4b56016278
CVE-2024-5665,0,0,cf98b8118d31a45b868938fcf4b0239a4be77d7cb3995f06e552251067a9cecd,2024-06-11T17:47:45.033000
CVE-2024-5666,0,0,c2cb648af5be31cc7b97e094a0871dd39fea80d2d3a0f373e615f5ae502553a5,2024-07-01T12:37:24.220000
CVE-2024-5671,0,0,b302da9933b51baa02aebe638443397fc8a4c366af898c1301a8da6525832546,2024-06-17T12:42:04.623000
CVE-2024-5672,1,1,ea7898705d9632f8d927cb0e1e6a11530834ac1751da3472c25ad47a8dfbc839,2024-07-03T13:15:03.043000
CVE-2024-5672,0,0,ea7898705d9632f8d927cb0e1e6a11530834ac1751da3472c25ad47a8dfbc839,2024-07-03T13:15:03.043000
CVE-2024-5673,0,0,f6db27a8b7c99bb0a58922425d96edcb461eeb527f78adfd8d9aed9c99330140,2024-06-11T18:17:10.037000
CVE-2024-5674,0,0,69b0f5cdcc6414c1b3093ac76e322fc42e17eb869b8f1b328084f458395232cf,2024-06-13T18:36:09.010000
CVE-2024-5675,0,0,c04fc1bf8ef6e3f232c30ddf0bd6a524958c9eab63fe205331e1fedef14ccf13,2024-06-11T18:14:02.017000
@ -255470,9 +255474,9 @@ CVE-2024-5731,0,0,f8f18711dc1e7684e37f428b0d6e39ca275690790dad9599ea32c8e89b131e
CVE-2024-5732,0,0,2b69cb5542c2f91e3e2021ac007049b3634a9137bdf0c325241236594abc7cc6,2024-06-11T17:57:13.767000
CVE-2024-5733,0,0,78152e13cdabf162486c62849d39e4c95e26727ad5623fb603c3826108c4ab9b,2024-06-11T18:30:50.690000
CVE-2024-5734,0,0,42e64867c1cdebe5031caec9548ec6393cd9bc290658f317ad4788de56fd156c,2024-06-11T18:30:16.727000
CVE-2024-5735,0,0,cc0561f495bade816cdeaced53011b07f3cb6a0e24901667ac6b88439c52c12a,2024-06-28T13:38:47.077000
CVE-2024-5736,0,0,525c83f0d9c4bb50f89240615c5f2211bfd076d0392343c37d0ccb4f622d76cb,2024-06-28T13:38:47.077000
CVE-2024-5737,0,0,33e4dfb4b6ecc95a25b3463ae07a17fb1eb0a57cb72699fc113aff6b8c2d0ea5,2024-06-28T13:38:47.077000
CVE-2024-5735,0,1,5164f7c1a233150ee53341ccee6b477fac348115ef4d5352757fe303df2f5a54,2024-07-03T15:45:57.677000
CVE-2024-5736,0,1,542f55758b5fdb7d00740d25c91b14abb056e9aea19176254ebe8a8a94099d0d,2024-07-03T15:46:08.877000
CVE-2024-5737,0,1,d0320412366343a8bfdfa83f09ec33ad8bab76c39c727d4c2240c621c15a4ff2,2024-07-03T14:09:22.483000
CVE-2024-5739,0,0,4e4cf687173db1796e93002e6527d7eafacb6ad9e3e1f9441d82638a10b1e4ca,2024-06-13T18:36:09.013000
CVE-2024-5741,0,0,d3e87c617441ebc91021d514ecbbaffa42c181f23db631a685b052a1b8e8e820,2024-06-17T12:42:04.623000
CVE-2024-5742,0,0,a52d500d47b6c5d306e493aed82844a67ba1ec935bd3dcc9d1575df0fba9dc97,2024-06-17T12:15:49.850000
@ -255487,7 +255491,7 @@ CVE-2024-5758,0,0,250b274bfcefb72defbd26103c82d5c8ed585b7571d3785565c3013fdb6e4a
CVE-2024-5759,0,0,a8b20ed9df5a502bc1dbe4283a67eed19771ffb4a4f02a90724215ed5101a898,2024-06-13T18:36:09.010000
CVE-2024-5761,0,0,e0022a8d80317cd3941058bae14b514f68707790a5051038049a1d552ba8de69,2024-06-07T19:15:24.467000
CVE-2024-5766,0,0,f4f0065e1ad74a475f6d00e1f328df39da374dfe97f7b4c54df1858a2ce42e5e,2024-06-10T02:52:08.267000
CVE-2024-5767,0,0,2cdcdd5f8fd65e586a4117744c4cc9c0fa1bd1cd4ae542b2fabb912f848a248c,2024-07-02T12:09:16.907000
CVE-2024-5767,0,1,23a2de5cc642d98e40b9cd54645c60f113c9b3696a937d49f8d435c3dba338d7,2024-07-03T15:26:29.050000
CVE-2024-5768,0,0,4723f0c08a5f7c047718f7b87ad6f2c66db14b3e8d318e841a1bb9034ace5943,2024-06-20T12:44:01.637000
CVE-2024-5770,0,0,25b3f0241d69604556f37a6471fa9a6892ce290ef4b03f2d5525dd585c681fcd,2024-06-10T02:52:08.267000
CVE-2024-5771,0,0,378b86ddb7266a39f3407b18465f75a96b2cb76a6e911ad726ef8ee0f827d15d,2024-06-10T02:52:08.267000
@ -255635,6 +255639,7 @@ CVE-2024-6046,0,0,91371f2b9afd0a654dc4dc6a88ac5fb04a186cb82713804dda3cac2d7733c3
CVE-2024-6047,0,0,4cdf0f1acff12373f8f857c8d442b9de2221d44745323cc3f60bf66bccd7a239,2024-06-17T14:15:13.040000
CVE-2024-6048,0,0,03e9485ef23720c113f11fed6c539200d9a1624e025ca24798cddf9d0c1a9e3b,2024-06-17T12:42:04.623000
CVE-2024-6050,0,0,304778e708041d822ddb3dbacfa423baa973c842b9b5dea1cb2a29aed7ec7b6d,2024-07-01T16:37:39.040000
CVE-2024-6052,1,1,043613cf1c108efd4df1b8c641fcfc3aae24d3f12d61f8d9bc4d4a8136d4a5d2,2024-07-03T15:15:06.223000
CVE-2024-6054,0,0,dbd3e49036b5938301871d5a6c67ee17ba89370e3288082b00ca89a51a1f06ed,2024-06-28T13:11:58.810000
CVE-2024-6055,0,0,7490ef4c1367b62a13fc44ec964fb12263f9fa479e5bd4bbc3820296c19002e0,2024-06-20T12:44:22.977000
CVE-2024-6056,0,0,9210a6d5e69cda44c36495fe4964320c8f6a47f4e723a559827fc7a6d2ee595f,2024-06-20T12:44:22.977000
@ -255675,6 +255680,7 @@ CVE-2024-6115,0,0,3c5ab17ce7a1f33a2dee71d5335f67c2e99b7d6204dc28e4e10a70d6ca6b07
CVE-2024-6116,0,0,5843dd08daba10a4f1c43a634f4172ccf9c702c464ac49dc5f784b4aa5e3fcb5,2024-06-20T12:44:01.637000
CVE-2024-6120,0,0,5c59cd273da1e2ed6c553cf441ff0a5530e8c4d18132ff0e8595e05e3633cb46,2024-06-24T20:03:04.363000
CVE-2024-6125,0,0,85b92914638eb24a081146fd823c584c2333b183768ef26d618955e83646311b,2024-06-20T12:44:01.637000
CVE-2024-6126,1,1,eac314364b69d7994f4911171bc2b4c5e18e3a158bd0616141df97bd068d1e38,2024-07-03T15:15:06.470000
CVE-2024-6127,0,0,8f3f3591469382ebb006087ec5b5be799ca274948ebd71b090f997c1ae2c89a9,2024-06-28T10:27:00.920000
CVE-2024-6128,0,0,cd2531d89b3a76f4be34b5ead44f5b65458326ae9dfb5c97dcd0243e237eb5b3,2024-06-21T16:15:12.570000
CVE-2024-6129,0,0,dfa20fd20a0a3099fcdc2f66c56de27040819ee45bd7efe66cb95f894b77d645,2024-06-20T12:44:01.637000
@ -255731,7 +255737,7 @@ CVE-2024-6252,0,0,468e259f2025efbae92579ad89a45c9f2c8b2e33c6f209272de57a1e66debc
CVE-2024-6253,0,0,a6e4514e5a27665a5cb6260b36ae56e5c2da14fd9a2d1da643a44ff2f3f2cb21,2024-06-25T18:15:12
CVE-2024-6257,0,0,2981da6c17c705bcf0d80e44b1fa14b0c6655b2077fb275b971c6bc5c7c2b720,2024-06-25T18:50:42.040000
CVE-2024-6262,0,0,f703f7a7fbd3e1fe9efa1e5946752e209a081bf36124182aca731e3f05a363a4,2024-06-27T12:47:19.847000
CVE-2024-6263,0,1,eef514c44d6052a87015ac43d52225e5228d7c5e601a8a4d2fb9447b4977342f,2024-07-03T12:53:24.977000
CVE-2024-6263,0,0,eef514c44d6052a87015ac43d52225e5228d7c5e601a8a4d2fb9447b4977342f,2024-07-03T12:53:24.977000
CVE-2024-6264,0,0,f9ab73ef94330a3cc9bcff915e884763c0b072f9f74618431a2c7d5cbe25dc82,2024-07-02T17:57:31.737000
CVE-2024-6265,0,0,dd53419ac5d71f3843314be14fea17b7338fd9f39ae5539064d4c12df7d66cd7,2024-07-01T12:37:24.220000
CVE-2024-6266,0,0,f14331da5cd861226d53e015f2a1f08c9e1d5e7f7b1b843a3feb7cb151cc145a,2024-06-24T12:57:36.513000
@ -255768,7 +255774,7 @@ CVE-2024-6306,0,0,711bff153bb36aca97259b9a58665f79686710d592de1aed3b99962d3c3067
CVE-2024-6307,0,0,a6037df0fa8617c9aaeffdc703000fa7423e885d439338f30eb38eb0279e87b9,2024-06-28T13:15:03.453000
CVE-2024-6308,0,0,483bab7c0040f40965fba497a0be9e45fef6974a263c54d39149185a218f4b43,2024-06-25T21:16:02.087000
CVE-2024-6323,0,0,16f93962f537d8478d96317e8b0d9cad0e3aee225ed0ebdb8d6f6bf214bb804e,2024-06-28T13:15:19.317000
CVE-2024-6340,0,1,bb1108ed10839a26b4c1dc57d9b0dce8e4cd3d484be78fa39962e8c27bf9bdb2,2024-07-03T12:53:24.977000
CVE-2024-6340,0,0,bb1108ed10839a26b4c1dc57d9b0dce8e4cd3d484be78fa39962e8c27bf9bdb2,2024-07-03T12:53:24.977000
CVE-2024-6341,0,0,528f4fdde1526d72477e90a767b2f2316b168f65b64effeddb9446d8a5cdcaf5,2024-07-02T18:15:03.900000
CVE-2024-6344,0,0,f8fe072181ab91a453822e0b523eb31f74817bc4efb68c7d2134a2d41a8e3557,2024-06-27T00:15:13.360000
CVE-2024-6349,0,0,f01d61e3475192c945ec3639c2eda3b231a23d2f279c2f15b4719385fb2bd065,2024-06-26T15:15:20.690000
@ -255783,11 +255789,11 @@ CVE-2024-6371,0,0,4c649bc248258025ed325d77948a1f8525c46141bb22c90a65b416ad94095e
CVE-2024-6372,0,0,ec8243842e1fb3e0d20056a877723ac3e2b0533a4741cd15fbbcbf6a553aa1c3,2024-06-27T17:11:52.390000
CVE-2024-6373,0,0,ffc7549884eeecbe338ce0f17f670d62abf2209962cbc27b0291f9ddbed7c163,2024-06-27T18:15:22.280000
CVE-2024-6374,0,0,951e3f10ed1a8de2c137bcf7721b529de76cab1c6430f8094753092eaf9ecd40,2024-06-27T17:11:52.390000
CVE-2024-6375,0,0,63966b93eb46e16d023260fad8c0d7013b7249b4716b3dc1473565015805b694,2024-07-01T16:37:39.040000
CVE-2024-6376,0,0,5b1144f575b26ee71024cb47efd50b0c100b6444589a68c6e121da4ff25018c3,2024-07-01T16:37:39.040000
CVE-2024-6381,0,1,2822fb12d769fe1cca32125b45cae52ba3e5807419213b6087c6db8de8d2b326,2024-07-03T12:53:24.977000
CVE-2024-6382,0,1,9f140af24f460b4413fa844f95383cc153754360a136939b8743c2d8327ebf99,2024-07-03T12:53:24.977000
CVE-2024-6387,0,1,e6a56f8a69b7b260ae53a144224efd4334f1883c642273209a623900a790dcba,2024-07-03T13:15:03.493000
CVE-2024-6375,0,1,2086f7a0dc16d184277c490b35389aec9b32cc5c6b68030b97b503ee789a3958,2024-07-03T14:54:52.427000
CVE-2024-6376,0,1,2eceea6553f0e47a0e34ab01650b7781a20682f6799be39f9cd1e64f3f19856f,2024-07-03T15:04:52.463000
CVE-2024-6381,0,0,2822fb12d769fe1cca32125b45cae52ba3e5807419213b6087c6db8de8d2b326,2024-07-03T12:53:24.977000
CVE-2024-6382,0,0,9f140af24f460b4413fa844f95383cc153754360a136939b8743c2d8327ebf99,2024-07-03T12:53:24.977000
CVE-2024-6387,0,0,e6a56f8a69b7b260ae53a144224efd4334f1883c642273209a623900a790dcba,2024-07-03T13:15:03.493000
CVE-2024-6388,0,0,e641c9d869769d4291da87145b48d15b4f200c046d6b100142bc686375a84738,2024-06-27T17:11:52.390000
CVE-2024-6402,0,0,795485c4534407e246daec51c1daaa33b95f6651688fed743a8fb9054cdaedba,2024-07-01T12:37:24.220000
CVE-2024-6403,0,0,e44b9cfa8d9ae367e624a8cdf179ef52ea1e98c2115d7a956299d17747a6a56b,2024-07-01T12:37:24.220000
@ -255800,14 +255806,15 @@ CVE-2024-6418,0,0,b63bb78bc20fc7c9074df0590cf44ede2aa2ea9145f7e2ea976342cbbc9ede
CVE-2024-6419,0,0,e1f22570d75c49fa5726171947ce4e56ea60b543707fecfaebe18f84b2ff48d5,2024-07-01T12:37:24.220000
CVE-2024-6424,0,0,8d5a2fd0dee2ac07d57032a1c81c2c412cad276a027b89c1b7d3574f7c28481d,2024-07-01T16:37:39.040000
CVE-2024-6425,0,0,adbfecb8c3cc947ec785870957655621e37e6a4ecfa332482b1b765f471fc897,2024-07-01T16:37:39.040000
CVE-2024-6426,1,1,743cead7bfbb6d52b9a38edd8f28e270cc396ea75af77fc494cdf15f853aedb8,2024-07-03T12:53:24.977000
CVE-2024-6427,1,1,57065ff923a64c20753385de741e3156cf426d3558cd727998195d1e669fe19f,2024-07-03T12:53:24.977000
CVE-2024-6428,0,1,31d69642490b0b5c14fae0235cb6cc8aea9d2d4868dab2c3323c281656122a48,2024-07-03T12:53:24.977000
CVE-2024-6426,0,0,743cead7bfbb6d52b9a38edd8f28e270cc396ea75af77fc494cdf15f853aedb8,2024-07-03T12:53:24.977000
CVE-2024-6427,0,0,57065ff923a64c20753385de741e3156cf426d3558cd727998195d1e669fe19f,2024-07-03T12:53:24.977000
CVE-2024-6428,0,0,31d69642490b0b5c14fae0235cb6cc8aea9d2d4868dab2c3323c281656122a48,2024-07-03T12:53:24.977000
CVE-2024-6438,0,0,c89c4e3ccf031fb42672508ffc0236a74fd652409f3f814c1aa7277296a22143,2024-07-02T17:54:02.370000
CVE-2024-6439,0,0,1bd5e2a149e15b87b2ec1d9e23e870c4f5a97c502c5089c3f0a60fbd028209c7,2024-07-02T17:58:39.773000
CVE-2024-6440,0,0,4db20ef0878ff896f7a92a0fb63819a7fd586b5cd61940caee4cf26cda6cf8f9,2024-07-02T17:58:15.410000
CVE-2024-6441,0,0,fadd9560f894739af460dd107a14c73f394f82b357796461abb110045106f46c,2024-07-02T17:44:45.700000
CVE-2024-6452,0,1,c694c1bdf54902e69172121aae2a54d0747cfc16750499c01d3cf3c9c6ef3263,2024-07-03T12:53:24.977000
CVE-2024-6453,0,1,f8f94ef1371b1813320fb500c8f5a2a5c78562059f37a370c24f1cfd03cdaa59,2024-07-03T12:53:24.977000
CVE-2024-6469,0,1,af3fa5ade340d0b228353896e96620b5cb15d570ccca154043a04cdd86241984,2024-07-03T12:53:24.977000
CVE-2024-6470,1,1,758942473ba4664d9706c7b27089a9d538cad027719295d3c67dfb54a747e72b,2024-07-03T13:15:03.703000
CVE-2024-6452,0,0,c694c1bdf54902e69172121aae2a54d0747cfc16750499c01d3cf3c9c6ef3263,2024-07-03T12:53:24.977000
CVE-2024-6453,0,0,f8f94ef1371b1813320fb500c8f5a2a5c78562059f37a370c24f1cfd03cdaa59,2024-07-03T12:53:24.977000
CVE-2024-6469,0,0,af3fa5ade340d0b228353896e96620b5cb15d570ccca154043a04cdd86241984,2024-07-03T12:53:24.977000
CVE-2024-6470,0,0,758942473ba4664d9706c7b27089a9d538cad027719295d3c67dfb54a747e72b,2024-07-03T13:15:03.703000
CVE-2024-6471,1,1,33db1e0271959450d1204c1eba113a94befddf6a5610d2c3f2f72d1021d9b28f,2024-07-03T14:15:06.490000

Can't render this file because it is too large.