mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-06-21 17:41:05 +00:00
Auto-Update: 2024-07-12T08:00:17.869465+00:00
This commit is contained in:
parent
d4681f2875
commit
376c9d8072
21
CVE-2024/CVE-2024-09xx/CVE-2024-0974.json
Normal file
21
CVE-2024/CVE-2024-09xx/CVE-2024-0974.json
Normal file
@ -0,0 +1,21 @@
|
||||
{
|
||||
"id": "CVE-2024-0974",
|
||||
"sourceIdentifier": "contact@wpscan.com",
|
||||
"published": "2024-07-12T06:15:01.977",
|
||||
"lastModified": "2024-07-12T06:15:01.977",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "The Social Media Widget WordPress plugin before 4.0.9 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup)"
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://wpscan.com/vulnerability/7f8e5e63-a928-443e-9771-8b3f51f5eb9e/",
|
||||
"source": "contact@wpscan.com"
|
||||
}
|
||||
]
|
||||
}
|
21
CVE-2024/CVE-2024-24xx/CVE-2024-2430.json
Normal file
21
CVE-2024/CVE-2024-24xx/CVE-2024-2430.json
Normal file
@ -0,0 +1,21 @@
|
||||
{
|
||||
"id": "CVE-2024-2430",
|
||||
"sourceIdentifier": "contact@wpscan.com",
|
||||
"published": "2024-07-12T06:15:03.173",
|
||||
"lastModified": "2024-07-12T06:15:03.173",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "The Website Content in Page or Post WordPress plugin before 2024.04.09 does not validate and escape some of its shortcode attributes before outputting them back in a page/post where the shortcode is embed, which could allow users with the contributor role and above to perform Stored Cross-Site Scripting attacks"
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://wpscan.com/vulnerability/990b7d7a-3d7a-46d5-9aeb-740de817e2d9/",
|
||||
"source": "contact@wpscan.com"
|
||||
}
|
||||
]
|
||||
}
|
21
CVE-2024/CVE-2024-26xx/CVE-2024-2640.json
Normal file
21
CVE-2024/CVE-2024-26xx/CVE-2024-2640.json
Normal file
@ -0,0 +1,21 @@
|
||||
{
|
||||
"id": "CVE-2024-2640",
|
||||
"sourceIdentifier": "contact@wpscan.com",
|
||||
"published": "2024-07-12T06:15:03.433",
|
||||
"lastModified": "2024-07-12T06:15:03.433",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "The Watu Quiz WordPress plugin before 3.4.1.2 does not sanitise and escape some of its settings, which could allow users such as authors (if they've been authorized by admins) to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://wpscan.com/vulnerability/d46db635-9d84-4268-a789-406a0db4cccf/",
|
||||
"source": "contact@wpscan.com"
|
||||
}
|
||||
]
|
||||
}
|
21
CVE-2024/CVE-2024-26xx/CVE-2024-2696.json
Normal file
21
CVE-2024/CVE-2024-26xx/CVE-2024-2696.json
Normal file
@ -0,0 +1,21 @@
|
||||
{
|
||||
"id": "CVE-2024-2696",
|
||||
"sourceIdentifier": "contact@wpscan.com",
|
||||
"published": "2024-07-12T06:15:03.680",
|
||||
"lastModified": "2024-07-12T06:15:03.680",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "The socialdriver-framework WordPress plugin before 2024.04.30 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup)"
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://wpscan.com/vulnerability/b6e64af0-adeb-4e28-9a81-f4024b0446ee/",
|
||||
"source": "contact@wpscan.com"
|
||||
}
|
||||
]
|
||||
}
|
21
CVE-2024/CVE-2024-31xx/CVE-2024-3112.json
Normal file
21
CVE-2024/CVE-2024-31xx/CVE-2024-3112.json
Normal file
@ -0,0 +1,21 @@
|
||||
{
|
||||
"id": "CVE-2024-3112",
|
||||
"sourceIdentifier": "contact@wpscan.com",
|
||||
"published": "2024-07-12T06:15:03.937",
|
||||
"lastModified": "2024-07-12T06:15:03.937",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "The Quotes and Tips by BestWebSoft WordPress plugin before 1.45 does not properly validate image files uploaded, allowing high privilege users such as admin to upload arbitrary files on the server even when they should not be allowed to (for example in multisite setup)"
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://wpscan.com/vulnerability/fa6f01d6-aa3b-4452-9c5f-49bb227fea9d/",
|
||||
"source": "contact@wpscan.com"
|
||||
}
|
||||
]
|
||||
}
|
21
CVE-2024/CVE-2024-47xx/CVE-2024-4753.json
Normal file
21
CVE-2024/CVE-2024-47xx/CVE-2024-4753.json
Normal file
@ -0,0 +1,21 @@
|
||||
{
|
||||
"id": "CVE-2024-4753",
|
||||
"sourceIdentifier": "contact@wpscan.com",
|
||||
"published": "2024-07-12T06:15:04.190",
|
||||
"lastModified": "2024-07-12T06:15:04.190",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "The WP Secure Maintenance WordPress plugin before 1.7 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup)"
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://wpscan.com/vulnerability/81725b17-532a-43e6-8ce5-fe50a2ed0819/",
|
||||
"source": "contact@wpscan.com"
|
||||
}
|
||||
]
|
||||
}
|
21
CVE-2024/CVE-2024-56xx/CVE-2024-5626.json
Normal file
21
CVE-2024/CVE-2024-56xx/CVE-2024-5626.json
Normal file
@ -0,0 +1,21 @@
|
||||
{
|
||||
"id": "CVE-2024-5626",
|
||||
"sourceIdentifier": "contact@wpscan.com",
|
||||
"published": "2024-07-12T06:15:04.420",
|
||||
"lastModified": "2024-07-12T06:15:04.420",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "The Inline Related Posts WordPress plugin before 3.7.0 does not sanitise and escape a parameter before outputting it back in the page, leading to a Reflected Cross-Site Scripting which could be used against high privilege users such as admin"
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://wpscan.com/vulnerability/6b03f450-4982-4f6c-a6f1-f7e85b1deec1/",
|
||||
"source": "contact@wpscan.com"
|
||||
}
|
||||
]
|
||||
}
|
21
CVE-2024/CVE-2024-58xx/CVE-2024-5811.json
Normal file
21
CVE-2024/CVE-2024-58xx/CVE-2024-5811.json
Normal file
@ -0,0 +1,21 @@
|
||||
{
|
||||
"id": "CVE-2024-5811",
|
||||
"sourceIdentifier": "contact@wpscan.com",
|
||||
"published": "2024-07-12T06:15:04.670",
|
||||
"lastModified": "2024-07-12T06:15:04.670",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "The Simple Video Directory WordPress plugin before 1.4.4 does not sanitise and escape some of its settings, which could allow contributors and higher to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup)"
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://wpscan.com/vulnerability/bf6c2e28-51ef-443b-b1c2-d555c7e12f7f/",
|
||||
"source": "contact@wpscan.com"
|
||||
}
|
||||
]
|
||||
}
|
21
CVE-2024/CVE-2024-60xx/CVE-2024-6022.json
Normal file
21
CVE-2024/CVE-2024-60xx/CVE-2024-6022.json
Normal file
@ -0,0 +1,21 @@
|
||||
{
|
||||
"id": "CVE-2024-6022",
|
||||
"sourceIdentifier": "contact@wpscan.com",
|
||||
"published": "2024-07-12T06:15:04.893",
|
||||
"lastModified": "2024-07-12T06:15:04.893",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "The ContentLock WordPress plugin through 1.0.3 does not have CSRF check in place when updating its settings, which could allow attackers to make a logged in admin change them via a CSRF attack"
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://wpscan.com/vulnerability/871a93b5-ec67-4fe0-bc39-e5485477fbeb/",
|
||||
"source": "contact@wpscan.com"
|
||||
}
|
||||
]
|
||||
}
|
21
CVE-2024/CVE-2024-60xx/CVE-2024-6023.json
Normal file
21
CVE-2024/CVE-2024-60xx/CVE-2024-6023.json
Normal file
@ -0,0 +1,21 @@
|
||||
{
|
||||
"id": "CVE-2024-6023",
|
||||
"sourceIdentifier": "contact@wpscan.com",
|
||||
"published": "2024-07-12T06:15:05.130",
|
||||
"lastModified": "2024-07-12T06:15:05.130",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "The ContentLock WordPress plugin through 1.0.3 does not have CSRF check in place when adding emails, which could allow attackers to make a logged in admin perform such action via a CSRF attack"
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://wpscan.com/vulnerability/6e812189-2980-453d-931d-1f785e8dbcc0/",
|
||||
"source": "contact@wpscan.com"
|
||||
}
|
||||
]
|
||||
}
|
21
CVE-2024/CVE-2024-60xx/CVE-2024-6024.json
Normal file
21
CVE-2024/CVE-2024-60xx/CVE-2024-6024.json
Normal file
@ -0,0 +1,21 @@
|
||||
{
|
||||
"id": "CVE-2024-6024",
|
||||
"sourceIdentifier": "contact@wpscan.com",
|
||||
"published": "2024-07-12T06:15:05.340",
|
||||
"lastModified": "2024-07-12T06:15:05.340",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "The ContentLock WordPress plugin through 1.0.3 does not have CSRF check in place when deleting groups or emails, which could allow attackers to make a logged in admin remove them via a CSRF attack"
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://wpscan.com/vulnerability/3d2cdb4f-b7e1-4691-90d1-cddde7f5858e/",
|
||||
"source": "contact@wpscan.com"
|
||||
}
|
||||
]
|
||||
}
|
48
CVE-2024/CVE-2024-65xx/CVE-2024-6555.json
Normal file
48
CVE-2024/CVE-2024-65xx/CVE-2024-6555.json
Normal file
@ -0,0 +1,48 @@
|
||||
{
|
||||
"id": "CVE-2024-6555",
|
||||
"sourceIdentifier": "security@wordfence.com",
|
||||
"published": "2024-07-12T06:15:05.560",
|
||||
"lastModified": "2024-07-12T06:15:05.560",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "The WP Popups \u2013 WordPress Popup builder plugin for WordPress is vulnerable to Full Path Disclosure in all versions up to, and including, 2.2.0.1. This is due the plugin utilizing mobiledetect without preventing direct access to the files. This makes it possible for unauthenticated attackers to retrieve the full path of the web application, which can be used to aid other attacks. The information displayed is not useful on its own, and requires another vulnerability to be present for damage to an affected website."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security@wordfence.com",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 5.3,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 1.4
|
||||
}
|
||||
]
|
||||
},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3115849%40wp-popups-lite&new=3115849%40wp-popups-lite&sfp_email=&sfph_mail=",
|
||||
"source": "security@wordfence.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/578892f2-9841-4493-8445-61b79feb4764?source=cve",
|
||||
"source": "security@wordfence.com"
|
||||
}
|
||||
]
|
||||
}
|
56
CVE-2024/CVE-2024-65xx/CVE-2024-6588.json
Normal file
56
CVE-2024/CVE-2024-65xx/CVE-2024-6588.json
Normal file
@ -0,0 +1,56 @@
|
||||
{
|
||||
"id": "CVE-2024-6588",
|
||||
"sourceIdentifier": "security@wordfence.com",
|
||||
"published": "2024-07-12T07:15:02.387",
|
||||
"lastModified": "2024-07-12T07:15:02.387",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "The PowerPress Podcasting plugin by Blubrry plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via the \u2018media_url\u2019 parameter in all versions up to, and including, 11.9.10 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security@wordfence.com",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 6.4,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 3.1,
|
||||
"impactScore": 2.7
|
||||
}
|
||||
]
|
||||
},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/browser/powerpress/trunk/powerpress-player.php#L1015",
|
||||
"source": "security@wordfence.com"
|
||||
},
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/changeset/3115881/#file0",
|
||||
"source": "security@wordfence.com"
|
||||
},
|
||||
{
|
||||
"url": "https://wordpress.org/plugins/powerpress/#developers",
|
||||
"source": "security@wordfence.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/745262f6-4f73-453e-b650-15115536f221?source=cve",
|
||||
"source": "security@wordfence.com"
|
||||
}
|
||||
]
|
||||
}
|
24
README.md
24
README.md
@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours.
|
||||
### Last Repository Update
|
||||
|
||||
```plain
|
||||
2024-07-12T06:00:18.137492+00:00
|
||||
2024-07-12T08:00:17.869465+00:00
|
||||
```
|
||||
|
||||
### Most recent CVE Modification Timestamp synchronized with NVD
|
||||
|
||||
```plain
|
||||
2024-07-12T04:15:02.747000+00:00
|
||||
2024-07-12T07:15:02.387000+00:00
|
||||
```
|
||||
|
||||
### Last Data Feed Release
|
||||
@ -33,20 +33,32 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
|
||||
### Total Number of included CVEs
|
||||
|
||||
```plain
|
||||
256727
|
||||
256740
|
||||
```
|
||||
|
||||
### CVEs added in the last Commit
|
||||
|
||||
Recently added CVEs: `0`
|
||||
Recently added CVEs: `13`
|
||||
|
||||
- [CVE-2024-0974](CVE-2024/CVE-2024-09xx/CVE-2024-0974.json) (`2024-07-12T06:15:01.977`)
|
||||
- [CVE-2024-2430](CVE-2024/CVE-2024-24xx/CVE-2024-2430.json) (`2024-07-12T06:15:03.173`)
|
||||
- [CVE-2024-2640](CVE-2024/CVE-2024-26xx/CVE-2024-2640.json) (`2024-07-12T06:15:03.433`)
|
||||
- [CVE-2024-2696](CVE-2024/CVE-2024-26xx/CVE-2024-2696.json) (`2024-07-12T06:15:03.680`)
|
||||
- [CVE-2024-3112](CVE-2024/CVE-2024-31xx/CVE-2024-3112.json) (`2024-07-12T06:15:03.937`)
|
||||
- [CVE-2024-4753](CVE-2024/CVE-2024-47xx/CVE-2024-4753.json) (`2024-07-12T06:15:04.190`)
|
||||
- [CVE-2024-5626](CVE-2024/CVE-2024-56xx/CVE-2024-5626.json) (`2024-07-12T06:15:04.420`)
|
||||
- [CVE-2024-5811](CVE-2024/CVE-2024-58xx/CVE-2024-5811.json) (`2024-07-12T06:15:04.670`)
|
||||
- [CVE-2024-6022](CVE-2024/CVE-2024-60xx/CVE-2024-6022.json) (`2024-07-12T06:15:04.893`)
|
||||
- [CVE-2024-6023](CVE-2024/CVE-2024-60xx/CVE-2024-6023.json) (`2024-07-12T06:15:05.130`)
|
||||
- [CVE-2024-6024](CVE-2024/CVE-2024-60xx/CVE-2024-6024.json) (`2024-07-12T06:15:05.340`)
|
||||
- [CVE-2024-6555](CVE-2024/CVE-2024-65xx/CVE-2024-6555.json) (`2024-07-12T06:15:05.560`)
|
||||
- [CVE-2024-6588](CVE-2024/CVE-2024-65xx/CVE-2024-6588.json) (`2024-07-12T07:15:02.387`)
|
||||
|
||||
|
||||
### CVEs modified in the last Commit
|
||||
|
||||
Recently modified CVEs: `1`
|
||||
Recently modified CVEs: `0`
|
||||
|
||||
- [CVE-2024-23692](CVE-2024/CVE-2024-236xx/CVE-2024-23692.json) (`2024-07-12T04:15:02.747`)
|
||||
|
||||
|
||||
## Download and Usage
|
||||
|
15
_state.csv
15
_state.csv
@ -241531,6 +241531,7 @@ CVE-2024-0969,0,0,b70a3e678841d5c3e905a1a4d78ee61bc51fd818aa668b1889827f06c39355
|
||||
CVE-2024-0971,0,0,10711fc5fd019982dab0af4d04cad68f7d925a8d90883facb336aae2462a64e3,2024-03-04T22:58:00.967000
|
||||
CVE-2024-0972,0,0,2a8d3a85f6223a6c38540c13150a8805bcc289466ff43a37dc35cbb6bde1ee58,2024-06-06T14:17:35.017000
|
||||
CVE-2024-0973,0,0,87a64eeb8545d2aed4850999f1a0515438bc623727357d945a5399ed140bee41,2024-03-18T19:40:00.173000
|
||||
CVE-2024-0974,1,1,35743e316fbd5bd2047d79c5dd66d90f0f92d67f3c6b8a448670c8ab72da0761,2024-07-12T06:15:01.977000
|
||||
CVE-2024-0975,0,0,727e762e9bf21cc79d41b3d973240a06501d145479fa8fca0d0cfdc6efc382cc,2024-02-28T14:06:45.783000
|
||||
CVE-2024-0976,0,0,961ca83ff90147b357fdad21a4ce2284407f8f5fed2f5570590409615417a9e7,2024-03-13T18:16:18.563000
|
||||
CVE-2024-0977,0,0,265a9a088dbf9179612f3eba4d6866f7160bf19014cca832dc6a54c521c233b7,2024-02-14T18:46:52.707000
|
||||
@ -244801,7 +244802,7 @@ CVE-2024-23687,0,0,888c703c13765b4aadeca06043a7e3dd693e14ab5fbf0ceb683a371be24cf
|
||||
CVE-2024-23688,0,0,07f47d429f26f5d25558115321368745a1af1492969a475a8855a8882844f455,2024-01-26T15:53:31.397000
|
||||
CVE-2024-23689,0,0,d7d4e018343e45ab929852f091e2e71006911f05a5c0cdd59769a6f5a80fdcee,2024-01-26T14:50:45.023000
|
||||
CVE-2024-2369,0,0,6a36576cd82a0efb1a6cf47fca1f81c4dce9d8f7b0632041d2d5bfbf236b9c0b,2024-04-08T18:15:08.527000
|
||||
CVE-2024-23692,0,1,abd73c9a7a59bbd222f13474ddbd3975463a246b40677cd6ffc7bb75b594a88e,2024-07-12T04:15:02.747000
|
||||
CVE-2024-23692,0,0,abd73c9a7a59bbd222f13474ddbd3975463a246b40677cd6ffc7bb75b594a88e,2024-07-12T04:15:02.747000
|
||||
CVE-2024-23695,0,0,97b1bbf9668e4f1ff263ecc5095fb2ce50165cd2bc27914c0badab59b62b53eb,2024-07-11T13:06:13.187000
|
||||
CVE-2024-23696,0,0,189ee607710420766ee01561621adc5b7bb56059b2d08cc9a92c0d5f1f7c4d8e,2024-07-11T13:06:13.187000
|
||||
CVE-2024-23697,0,0,17c4488491744d62a05050e622b3358721ca6fdbe4baba48f22a7b460908a580,2024-07-11T15:05:24.920000
|
||||
@ -245158,6 +245159,7 @@ CVE-2024-2429,0,0,6f82bfe12677abd0ded60841d7ddd794d901d8b55be20f02cefabe3e057f84
|
||||
CVE-2024-24291,0,0,ed81ca1f7d07ab5682e5dc3e12510be85bd8028a8e8a8fb1a80b96c7b9ae97e4,2024-02-13T20:13:26.593000
|
||||
CVE-2024-24293,0,0,eb622a35637583d584ad609649d42dcf62a63a936bf3a82b7c98c7b05f54a6ab,2024-05-20T19:34:58.277000
|
||||
CVE-2024-24294,0,0,fb53dd3f3a0181debfcca619f6a3363f362852d8c93652ea4617fd4b0661a31c,2024-07-03T01:48:14.450000
|
||||
CVE-2024-2430,1,1,fc140285546718ea235d58e87be2326789dd8854d5c2f3b2bf18d7536424e887,2024-07-12T06:15:03.173000
|
||||
CVE-2024-24300,0,0,a8dc475a562e17ac269ab87541d5cc3de5e8b25ad6f69c16a9e202ce4fe0a524,2024-02-15T06:23:39.303000
|
||||
CVE-2024-24301,0,0,eea9ef656f8457ca391649537e978f0d3e4722722df26eae84433b0c4b119a98,2024-02-15T06:23:39.303000
|
||||
CVE-2024-24302,0,0,772bc3946fe7698710ee11197feaab740359b0c096b2ee136ddb7f1dcb856d06,2024-07-03T01:48:15.277000
|
||||
@ -246549,6 +246551,7 @@ CVE-2024-26367,0,0,ceb2808d00aec1724941312eb31317fb9ca784802bb2ae58f80e28e9667ec
|
||||
CVE-2024-26369,0,0,b0322db94f9b89a2da31dd1ffa70ef568f3b1c4901ca044ba9c0ea1e2eb29c09,2024-03-19T13:26:46
|
||||
CVE-2024-2637,0,0,41c22874cb88b645bccc5162f78b9b5c7f466bc74b1b50f3d7f10bda614ec047,2024-05-27T08:15:09.360000
|
||||
CVE-2024-2639,0,0,0a379ca73fbb79fdbd8f18fc8cd7d5818278eb25b07ecfab9db46031f52aaa19,2024-05-17T02:38:22.540000
|
||||
CVE-2024-2640,1,1,2622fb8ff167d44ed8ee16f4e8f1e686049bb2e924ac61ba7bfed6799057625c,2024-07-12T06:15:03.433000
|
||||
CVE-2024-2641,0,0,f8817d39db046b0703540421bdc7defa8773388c970d95d9af56a10acaf6505b,2024-05-17T02:38:22.647000
|
||||
CVE-2024-2642,0,0,8e9139118e526637636dbb75ee7b325451ccf936f521c86702bbdd8ba223ba4d,2024-05-17T02:38:22.743000
|
||||
CVE-2024-2644,0,0,10576652d4b00db27dae15790aec2d4421a3f554442aef5d73285e025d9ff0d8,2024-06-05T20:15:12.680000
|
||||
@ -247023,6 +247026,7 @@ CVE-2024-26956,0,0,03b8b6d93122c87e1d6edb9acf0c32232fac7a1bfa20c866ade9468ab42e2
|
||||
CVE-2024-26957,0,0,871ec22ed701e6c25fde35c12b49fcc960cd21538002ff829aa32c4c117b7686,2024-07-03T01:50:07.493000
|
||||
CVE-2024-26958,0,0,14cf34198e5226cd9903fa4b7cd1b1356a627031f18c7d5956b5b6c2e6094b25,2024-06-25T22:15:26.937000
|
||||
CVE-2024-26959,0,0,b20b713d07b74cf4ab31aefa115749077979ac722940c0353f278e6b20f8cce7,2024-05-01T13:02:20.750000
|
||||
CVE-2024-2696,1,1,7b7f0b87184f2d4d17f2ef9027db945f0b670024e9fd284f14c6faff181b461f,2024-07-12T06:15:03.680000
|
||||
CVE-2024-26960,0,0,59e6b3e033a957b45cd72dd6675eb95ba7e94918875e89eeb9cba1fa4639541c,2024-07-03T01:50:08.270000
|
||||
CVE-2024-26961,0,0,05af2764d15ac446009c797cc05088526f3e6471c70181e566519fae53a37419,2024-06-25T22:15:27.007000
|
||||
CVE-2024-26962,0,0,21615a88704d38867dbd9993e5fd2c885d58669c1484f879178b0965705ef667,2024-05-01T13:02:20.750000
|
||||
@ -249851,6 +249855,7 @@ CVE-2024-31114,0,0,2db2f19bbb762fd0846a2fd0f4c21316984760b44cf0e285d2fa1b7eb4e97
|
||||
CVE-2024-31115,0,0,f67bb2935cdc482183cf83d729450e227d4215d9791e6eef39eb5dd63dc4ee92,2024-05-08T13:15:07.937000
|
||||
CVE-2024-31116,0,0,3e5261af5d77a4c950ede646e6aaa3b3de701ce47018fc260e62e0781699fc7b,2024-04-01T01:12:59.077000
|
||||
CVE-2024-31117,0,0,f06fda643bf8c516426ab572b27573cbf6214c3aa5f8b1df27ac2265745b81dc,2024-04-01T01:12:59.077000
|
||||
CVE-2024-3112,1,1,c5dd46570e82e042ad28a609d645b3bd6689c18b631599ab974c1831a690774a,2024-07-12T06:15:03.937000
|
||||
CVE-2024-31120,0,0,7340f0aa8567a325d352b7087d6dd0d44e3a1e7ab597204dd16dbc0e323747bc,2024-04-01T01:12:59.077000
|
||||
CVE-2024-31121,0,0,4fe9a2eff5a4d2ff266e2e268b50578938b85c71b50b3bd948fd3ec69947d849,2024-04-01T01:12:59.077000
|
||||
CVE-2024-31122,0,0,745a899ec0013d7867b6d15accca135c5ce3d8a09d809883e11eb140dbea32b8,2024-04-01T01:12:59.077000
|
||||
@ -255493,6 +255498,7 @@ CVE-2024-4748,0,0,0c715b5c19ebf413f66e32e0e846756d2092313152b17f8c4e7cf0a62355ae
|
||||
CVE-2024-4749,0,0,676e331864bc41907c4c80c44886e7dac480ef6dea2c29bc22838d992753d4da,2024-06-04T16:57:41.053000
|
||||
CVE-2024-4750,0,0,423585a3e250903ac62d761ecb0e0e6dc6b4649ccd4411b90275a4e6d2f87495,2024-06-04T16:57:41.053000
|
||||
CVE-2024-4751,0,0,980cee331660133759599aaa98eeae384de48fe7bcc98af4a2333b20d054b0b6,2024-06-17T12:42:04.623000
|
||||
CVE-2024-4753,1,1,b3ef2309929abf5d543ed5b4df009173219fa7d0e9c13da237f0413ef81c648e,2024-07-12T06:15:04.190000
|
||||
CVE-2024-4754,0,0,65f7d30a77e8c92b9ac1114b7ed7f43c32a5bfb34fe46cea0e558e1fff1e464e,2024-06-24T12:57:36.513000
|
||||
CVE-2024-4755,0,0,ca5306e45de4985a027d64d4740785092288eb6abbd1ab6d1fda3377d88d4e7e,2024-07-03T02:08:01.477000
|
||||
CVE-2024-4756,0,0,b303493fc627eee25a3b39c986ea25472e7aab1866612b83c9a7c14522d2c360,2024-06-07T14:56:05.647000
|
||||
@ -256159,6 +256165,7 @@ CVE-2024-5612,0,0,24bfbb6efa391db3014703335fcf10e8f670f2b2b154031d8b7a312f92d367
|
||||
CVE-2024-5613,0,0,7e758f60ff4a249ae3d985d91b4f3417dc42ff70d8507f5e072b9cf0ad6144fd,2024-06-10T02:52:08.267000
|
||||
CVE-2024-5615,0,0,d715351de069ee256cfd127ce22346136f76094dbd1f6f173b336f3c2cdc9c0f,2024-06-11T17:55:16.103000
|
||||
CVE-2024-5616,0,0,5078c1aa917db98652cc6ffd2b310b244194da0fcbabfd9d4ed8ccf7b99de509,2024-07-08T15:49:22.437000
|
||||
CVE-2024-5626,1,1,7e133737f43d053f813abe59bccc601d2b37ed3a35e15bd1e9dc8033caf1b17c,2024-07-12T06:15:04.420000
|
||||
CVE-2024-5629,0,0,20478b62dd0cd666624f11f2e5a11c22a9915feb481805651583fe7db0518c7b,2024-06-18T18:31:05.663000
|
||||
CVE-2024-5631,0,0,25836c7f267b9208b846f73ed3ce84976cc46a5e11e6627f730b2265da803c8d,2024-07-09T21:15:15.520000
|
||||
CVE-2024-5632,0,0,18c64f64f8d77f06a181388a24f5be7d454b8919234aa93ebe8fa802fed4ac14,2024-07-10T17:15:12.517000
|
||||
@ -256284,6 +256291,7 @@ CVE-2024-5802,0,0,d43f6c3699f8442d9285759c2e90cb7a4ef138460339054d721f73295a23e6
|
||||
CVE-2024-5805,0,0,d5f814a63108fa76cde55a23a7ee4c9d4c1228e8f74ac6f24226e1e9997c1554,2024-06-25T18:50:42.040000
|
||||
CVE-2024-5806,0,0,05eca3ac8c1d3a60beb467559e1d11b02293b85393edfc15424ba5e922097af5,2024-06-26T00:15:11.293000
|
||||
CVE-2024-5810,0,0,246ea4a74a1b10a6c799aa82916b249e6dd3093a23af41d24ba222ed5e8773fa,2024-07-09T18:19:14.047000
|
||||
CVE-2024-5811,1,1,6841d5b00cca51dfa8f2f54b5ce765a92098964f97404baa5af0c21cdaef38e0,2024-07-12T06:15:04.670000
|
||||
CVE-2024-5812,0,0,b231b6b4b2edc3b100956cc90803ec880aa99de51e5a0f50bc4b9e381c5722ed,2024-06-13T18:36:45.417000
|
||||
CVE-2024-5813,0,0,d695683c807a1777a11ef158e495934f31ab7056ebdb25d58f5f11112f2d1965,2024-06-13T18:36:45.417000
|
||||
CVE-2024-5819,0,0,ff5f9599a99761c75338a6f351d5018b6b4257daf87dc238a533c6ea2133dd27,2024-07-01T12:37:24.220000
|
||||
@ -256409,6 +256417,9 @@ CVE-2024-6013,0,0,44159fdbcbcac2a689071de339f13c4fefa84302df10ce908aefe802918d32
|
||||
CVE-2024-6014,0,0,6f42b027c41cbc2bef7f3eccd4ed3d2b0646bd4a1028da377690698f14644291,2024-06-17T12:42:04.623000
|
||||
CVE-2024-6015,0,0,b5dd732698ac918c4f9a100a042e5587c72b21ba3272e6fc136fa01311e31fdc,2024-06-17T15:15:52.830000
|
||||
CVE-2024-6016,0,0,c54c9dea249da6152524c81283c2e2c500a502b8999814b114c6434b99c2c3ed,2024-06-17T14:15:12.487000
|
||||
CVE-2024-6022,1,1,04717dc72e4f900d230391c94514f514539e2d6f03457c1e6e01c07b085e71d5,2024-07-12T06:15:04.893000
|
||||
CVE-2024-6023,1,1,f5555e51bcd69fa72d32d9adab18d78136da09acba35a1ff3db6a47b83f92f36,2024-07-12T06:15:05.130000
|
||||
CVE-2024-6024,1,1,2ffd72208cdfb4095e9eec145debe41add807f1416cbe1e1b74657cdf6309221,2024-07-12T06:15:05.340000
|
||||
CVE-2024-6025,0,0,6a6f4c641ef7953aa26f54a1379cb5f6723776eec5081b3ea27a64b050e352aa,2024-07-11T13:05:54.930000
|
||||
CVE-2024-6026,0,0,60fff2a5646ac325d6aad31c739bf38b093d56b857eaa43edb3f4353a1b4128b,2024-07-11T15:06:33
|
||||
CVE-2024-6027,0,0,b2fd57616c7b740fff1978bda2368fdc3959192a2c78f320629b1920784145fa,2024-06-24T19:17:50.240000
|
||||
@ -256685,10 +256696,12 @@ CVE-2024-6531,0,0,ab53755983129ee35c1ebf76acedd24cf0a7993ae85dcf721db49ee0a8f8cc
|
||||
CVE-2024-6539,0,0,81a7a773476044a536e1904849aff55df114add8144e8265b917f8120b92d867,2024-07-11T14:56:20.733000
|
||||
CVE-2024-6550,0,0,6c4bb046e65a00df1f67c81af4edc0fc3847fdca60c1beea606bf943b5851318,2024-07-11T13:05:54.930000
|
||||
CVE-2024-6554,0,0,53d6bb38e6051e6443dd433cc7e20c95847a1e5fb1ebe77ae646383c547abeb7,2024-07-11T13:05:54.930000
|
||||
CVE-2024-6555,1,1,34e77b0d71ab261578ec7e224b96bc260ce4cb3066ee4d5d28345bbbf1a1a387,2024-07-12T06:15:05.560000
|
||||
CVE-2024-6556,0,0,246920c1b32eb0a0369982110178f9a30464427865e75d42710950bf8d6bff6c,2024-07-11T13:05:54.930000
|
||||
CVE-2024-6563,0,0,1b4d88909a8afd884220e1df693026407578c717bcca7ba5cdd4e0bbbf29fb3c,2024-07-09T14:19:19.300000
|
||||
CVE-2024-6564,0,0,b381c943e4dc87d72df0560a8008d835d4542fba3e8b6a3b21a1beca0e3a3fa5,2024-07-09T14:19:14.760000
|
||||
CVE-2024-6580,0,0,d43dfa58651574c4447e8f323f3cb1f6a00d6bdef0613d5834aefccecf968c5d,2024-07-09T18:19:14.047000
|
||||
CVE-2024-6588,1,1,ca4afaea17787f5483b2819c0c113b78343a4ecedd1dcf411a61a2d3febe92bf,2024-07-12T07:15:02.387000
|
||||
CVE-2024-6598,0,0,2f02553b1031751a689c5bf3f9b99ef5078ca790db273edd82a84af9b7d8dd36,2024-07-09T18:19:14.047000
|
||||
CVE-2024-6600,0,0,ec760b3dcbbd1d45d7d375ec69590e9486042d86ace386dac9df16cb2b0ef0ec,2024-07-09T18:19:14.047000
|
||||
CVE-2024-6601,0,0,c2d93bb90c2cb6274c0c6af67f4e9d274133dcf51e2d79042eff7154f333742d,2024-07-09T18:19:14.047000
|
||||
|
Can't render this file because it is too large.
|
Loading…
x
Reference in New Issue
Block a user