mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-09-17 18:45:49 +00:00
Auto-Update: 2024-07-26T18:00:17.596024+00:00
This commit is contained in:
parent
3d631d74d9
commit
3fadace4ff
29
CVE-2023/CVE-2023-507xx/CVE-2023-50700.json
Normal file
29
CVE-2023/CVE-2023-507xx/CVE-2023-50700.json
Normal file
@ -0,0 +1,29 @@
|
||||
{
|
||||
"id": "CVE-2023-50700",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-07-26T17:15:10.803",
|
||||
"lastModified": "2024-07-26T17:15:10.803",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Insecure Permissions vulnerability in Deepin dde-file-manager 6.0.54 and earlier allows privileged operations to be called by unprivileged users via the D-Bus method."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://bugzilla.opensuse.org/show_bug.cgi?id=1134131",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://bugzilla.opensuse.org/show_bug.cgi?id=1134132",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/linuxdeepin/developer-center/issues/10007",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
21
CVE-2024/CVE-2024-242xx/CVE-2024-24257.json
Normal file
21
CVE-2024/CVE-2024-242xx/CVE-2024-24257.json
Normal file
@ -0,0 +1,21 @@
|
||||
{
|
||||
"id": "CVE-2024-24257",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-07-26T17:15:11.173",
|
||||
"lastModified": "2024-07-26T17:15:11.173",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "An issue in skteco.com Central Control Attendance Machine web management platform v.3.0 allows an attacker to obtain sensitive information via a crafted script to the csl/user component."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://idssgmcc.github.io/aran.github.io/1.html",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
21
CVE-2024/CVE-2024-265xx/CVE-2024-26520.json
Normal file
21
CVE-2024/CVE-2024-265xx/CVE-2024-26520.json
Normal file
@ -0,0 +1,21 @@
|
||||
{
|
||||
"id": "CVE-2024-26520",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-07-26T17:15:11.507",
|
||||
"lastModified": "2024-07-26T17:15:11.507",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "An issue in Hangzhou Xiongwei Technology Development Co., Ltd. Restaurant Digital Comprehensive Management platform v1 allows an attacker to bypass authentication and perform arbitrary password resets."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://idssgmcc.github.io/aran.github.io/2.html",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
21
CVE-2024/CVE-2024-273xx/CVE-2024-27357.json
Normal file
21
CVE-2024/CVE-2024-273xx/CVE-2024-27357.json
Normal file
@ -0,0 +1,21 @@
|
||||
{
|
||||
"id": "CVE-2024-27357",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-07-26T17:15:11.580",
|
||||
"lastModified": "2024-07-26T17:15:11.580",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "An issue was discovered in WithSecure Elements Agent through 23.x for macOS, WithSecure Elements Client Security through 23.x for macOS, and WithSecure MDR through 23.x for macOS. Local Privilege Escalation can occur during installations or updates by admins."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.withsecure.com/en/support/security-advisories/cve-2024-27357",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
21
CVE-2024/CVE-2024-273xx/CVE-2024-27358.json
Normal file
21
CVE-2024/CVE-2024-273xx/CVE-2024-27358.json
Normal file
@ -0,0 +1,21 @@
|
||||
{
|
||||
"id": "CVE-2024-27358",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-07-26T17:15:11.650",
|
||||
"lastModified": "2024-07-26T17:15:11.650",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "An issue was discovered in WithSecure Elements Agent through 23.x for macOS and WithSecure Elements Client Security through 23.x for macOS. Local users can block an admin from completing an installation, aka a Denial-of-Service (DoS)."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.withsecure.com/en/support/security-advisories/cve-2024-27358",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
21
CVE-2024/CVE-2024-413xx/CVE-2024-41353.json
Normal file
21
CVE-2024/CVE-2024-413xx/CVE-2024-41353.json
Normal file
@ -0,0 +1,21 @@
|
||||
{
|
||||
"id": "CVE-2024-41353",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-07-26T17:15:12.457",
|
||||
"lastModified": "2024-07-26T17:15:12.457",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "phpipam 1.6 is vulnerable to Cross Site Scripting (XSS) via app\\admin\\groups\\edit-group.php"
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/phpipam/phpipam/issues/4147",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
21
CVE-2024/CVE-2024-413xx/CVE-2024-41354.json
Normal file
21
CVE-2024/CVE-2024-413xx/CVE-2024-41354.json
Normal file
@ -0,0 +1,21 @@
|
||||
{
|
||||
"id": "CVE-2024-41354",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-07-26T17:15:12.513",
|
||||
"lastModified": "2024-07-26T17:15:12.513",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "phpipam 1.6 is vulnerable to Cross Site Scripting (XSS) via /app/admin/widgets/edit.php"
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/phpipam/phpipam/issues/4150",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
21
CVE-2024/CVE-2024-413xx/CVE-2024-41355.json
Normal file
21
CVE-2024/CVE-2024-413xx/CVE-2024-41355.json
Normal file
@ -0,0 +1,21 @@
|
||||
{
|
||||
"id": "CVE-2024-41355",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-07-26T16:15:03.277",
|
||||
"lastModified": "2024-07-26T16:15:03.277",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "phpipam 1.6 is vulnerable to Cross Site Scripting (XSS) via /app/tools/request-ip/index.php."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/phpipam/phpipam/issues/4151",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
21
CVE-2024/CVE-2024-413xx/CVE-2024-41356.json
Normal file
21
CVE-2024/CVE-2024-413xx/CVE-2024-41356.json
Normal file
@ -0,0 +1,21 @@
|
||||
{
|
||||
"id": "CVE-2024-41356",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-07-26T16:15:03.357",
|
||||
"lastModified": "2024-07-26T16:15:03.357",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "phpipam 1.6 is vulnerable to Cross Site Scripting (XSS) via app\\admin\\firewall-zones\\zones-edit-network.php."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/phpipam/phpipam/issues/4146",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
21
CVE-2024/CVE-2024-413xx/CVE-2024-41357.json
Normal file
21
CVE-2024/CVE-2024-413xx/CVE-2024-41357.json
Normal file
@ -0,0 +1,21 @@
|
||||
{
|
||||
"id": "CVE-2024-41357",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-07-26T16:15:03.427",
|
||||
"lastModified": "2024-07-26T16:15:03.427",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "phpipam 1.6 is vulnerable to Cross Site Scripting (XSS) via /app/admin/powerDNS/record-edit.php."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/phpipam/phpipam/issues/4149",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
21
CVE-2024/CVE-2024-413xx/CVE-2024-41373.json
Normal file
21
CVE-2024/CVE-2024-413xx/CVE-2024-41373.json
Normal file
@ -0,0 +1,21 @@
|
||||
{
|
||||
"id": "CVE-2024-41373",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-07-26T17:15:12.573",
|
||||
"lastModified": "2024-07-26T17:15:12.573",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "ICEcoder 8.1 contains a Path Traversal vulnerability via lib/backup-versions-preview-loader.php."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/xjzzzxx/vulFound/blob/main/icecoder/icecoder8.1_PT.md",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
21
CVE-2024/CVE-2024-413xx/CVE-2024-41374.json
Normal file
21
CVE-2024/CVE-2024-413xx/CVE-2024-41374.json
Normal file
@ -0,0 +1,21 @@
|
||||
{
|
||||
"id": "CVE-2024-41374",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-07-26T17:15:12.630",
|
||||
"lastModified": "2024-07-26T17:15:12.630",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "ICEcoder 8.1 is vulnerable to Cross Site Scripting (XSS) via lib/settings-screen.php"
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/xjzzzxx/vulFound/blob/main/icecoder/icecoder8.1_xss2.md",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
21
CVE-2024/CVE-2024-413xx/CVE-2024-41375.json
Normal file
21
CVE-2024/CVE-2024-413xx/CVE-2024-41375.json
Normal file
@ -0,0 +1,21 @@
|
||||
{
|
||||
"id": "CVE-2024-41375",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-07-26T17:15:12.690",
|
||||
"lastModified": "2024-07-26T17:15:12.690",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "ICEcoder 8.1 is vulnerable to Cross Site Scripting (XSS) via lib/terminal-xhr.php"
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/xjzzzxx/vulFound/blob/main/icecoder/icecoder8.1_xss1.md",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
16
CVE-2024/CVE-2024-418xx/CVE-2024-41807.json
Normal file
16
CVE-2024/CVE-2024-418xx/CVE-2024-41807.json
Normal file
@ -0,0 +1,16 @@
|
||||
{
|
||||
"id": "CVE-2024-41807",
|
||||
"sourceIdentifier": "security-advisories@github.com",
|
||||
"published": "2024-07-26T16:15:03.593",
|
||||
"lastModified": "2024-07-26T16:15:03.593",
|
||||
"vulnStatus": "Rejected",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Rejected reason: ** REJECT ** DO NOT USE THIS CVE RECORD. Consult IDs: CVE-2023-4759. Reason: This record is a reservation duplicate of CVE-2023-4759. Notes: All CVE users should reference CVE-2023-4759 instead of this record. All references and descriptions in this record have been removed to prevent accidental usage."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": []
|
||||
}
|
64
CVE-2024/CVE-2024-418xx/CVE-2024-41812.json
Normal file
64
CVE-2024/CVE-2024-418xx/CVE-2024-41812.json
Normal file
@ -0,0 +1,64 @@
|
||||
{
|
||||
"id": "CVE-2024-41812",
|
||||
"sourceIdentifier": "security-advisories@github.com",
|
||||
"published": "2024-07-26T17:15:12.783",
|
||||
"lastModified": "2024-07-26T17:15:12.783",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "txtdot is an HTTP proxy that parses only text, links, and pictures from pages, removing ads and heavy scripts. Prior to version 1.7.0, a Server-Side Request Forgery (SSRF) vulnerability in the `/get` route of txtdot allows remote attackers to use the server as a proxy to send HTTP GET requests to arbitrary targets and retrieve information in the internal network. Version 1.7.0 prevents displaying the response of forged requests, but the requests can still be sent. For complete mitigation, a firewall between txtdot and other internal network resources should be set."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 7.5,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-918"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/TxtDot/txtdot/blob/a7fdaf80fdf45abefe83b2eb5135ba112142dc74/src/handlers/distributor.ts#L43-L47",
|
||||
"source": "security-advisories@github.com"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/TxtDot/txtdot/commit/7c72d985f7a26ec1fd3cf628444717ca54986d2d",
|
||||
"source": "security-advisories@github.com"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/TxtDot/txtdot/security/advisories/GHSA-4gj5-xj97-j8fp",
|
||||
"source": "security-advisories@github.com"
|
||||
}
|
||||
]
|
||||
}
|
64
CVE-2024/CVE-2024-418xx/CVE-2024-41813.json
Normal file
64
CVE-2024/CVE-2024-418xx/CVE-2024-41813.json
Normal file
@ -0,0 +1,64 @@
|
||||
{
|
||||
"id": "CVE-2024-41813",
|
||||
"sourceIdentifier": "security-advisories@github.com",
|
||||
"published": "2024-07-26T17:15:12.990",
|
||||
"lastModified": "2024-07-26T17:15:12.990",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "txtdot is an HTTP proxy that parses only text, links, and pictures from pages, removing ads and heavy scripts. Starting in version 1.4.0 and prior to version 1.6.1, a Server-Side Request Forgery (SSRF) vulnerability in the `/proxy` route of txtdot allows remote attackers to use the server as a proxy to send HTTP GET requests to arbitrary targets and retrieve information in the internal network. Version 1.6.1 patches the issue."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 7.5,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-918"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/TxtDot/txtdot/blob/a7fdaf80fdf45abefe83b2eb5135ba112142dc74/src/handlers/distributor.ts#L43-L47",
|
||||
"source": "security-advisories@github.com"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/TxtDot/txtdot/commit/f241a46e05b148a39b84bf956051b5aaa489949e",
|
||||
"source": "security-advisories@github.com"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/TxtDot/txtdot/security/advisories/GHSA-4c78-229v-hf6m",
|
||||
"source": "security-advisories@github.com"
|
||||
}
|
||||
]
|
||||
}
|
78
CVE-2024/CVE-2024-70xx/CVE-2024-7050.json
Normal file
78
CVE-2024/CVE-2024-70xx/CVE-2024-7050.json
Normal file
@ -0,0 +1,78 @@
|
||||
{
|
||||
"id": "CVE-2024-7050",
|
||||
"sourceIdentifier": "security@opentext.com",
|
||||
"published": "2024-07-26T16:15:03.847",
|
||||
"lastModified": "2024-07-26T16:15:03.847",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Improper Authentication vulnerability in OpenText OpenText Directory Services may allow Multi-factor Authentication Bypass in particular scenarios.This issue affects OpenText Directory Services: 24.2."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV40": [
|
||||
{
|
||||
"source": "security@opentext.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "4.0",
|
||||
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:L/VI:N/VA:H/SC:H/SI:L/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:N/AU:N/R:A/V:D/RE:M/U:Amber",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"attackRequirements": "NONE",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "ACTIVE",
|
||||
"vulnerableSystemConfidentiality": "LOW",
|
||||
"vulnerableSystemIntegrity": "NONE",
|
||||
"vulnerableSystemAvailability": "HIGH",
|
||||
"subsequentSystemConfidentiality": "HIGH",
|
||||
"subsequentSystemIntegrity": "LOW",
|
||||
"subsequentSystemAvailability": "NONE",
|
||||
"exploitMaturity": "NOT_DEFINED",
|
||||
"confidentialityRequirements": "NOT_DEFINED",
|
||||
"integrityRequirements": "NOT_DEFINED",
|
||||
"availabilityRequirements": "NOT_DEFINED",
|
||||
"modifiedAttackVector": "NOT_DEFINED",
|
||||
"modifiedAttackComplexity": "NOT_DEFINED",
|
||||
"modifiedAttackRequirements": "NOT_DEFINED",
|
||||
"modifiedPrivilegesRequired": "NOT_DEFINED",
|
||||
"modifiedUserInteraction": "NOT_DEFINED",
|
||||
"modifiedVulnerableSystemConfidentiality": "NOT_DEFINED",
|
||||
"modifiedVulnerableSystemIntegrity": "NOT_DEFINED",
|
||||
"modifiedVulnerableSystemAvailability": "NOT_DEFINED",
|
||||
"modifiedSubsequentSystemConfidentiality": "NOT_DEFINED",
|
||||
"modifiedSubsequentSystemIntegrity": "NOT_DEFINED",
|
||||
"modifiedSubsequentSystemAvailability": "NOT_DEFINED",
|
||||
"safety": "NEGLIGIBLE",
|
||||
"automatable": "NO",
|
||||
"recovery": "AUTOMATIC",
|
||||
"valueDensity": "DIFFUSE",
|
||||
"vulnerabilityResponseEffort": "MODERATE",
|
||||
"providerUrgency": "AMBER",
|
||||
"baseScore": 8.3,
|
||||
"baseSeverity": "HIGH"
|
||||
}
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security@opentext.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-287"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://support.opentext.com/csm?id=kb_article_view&sysparm_article=KB0821213",
|
||||
"source": "security@opentext.com"
|
||||
}
|
||||
]
|
||||
}
|
47
README.md
47
README.md
@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours.
|
||||
### Last Repository Update
|
||||
|
||||
```plain
|
||||
2024-07-26T16:00:17.792205+00:00
|
||||
2024-07-26T18:00:17.596024+00:00
|
||||
```
|
||||
|
||||
### Most recent CVE Modification Timestamp synchronized with NVD
|
||||
|
||||
```plain
|
||||
2024-07-26T15:59:20.657000+00:00
|
||||
2024-07-26T17:15:12.990000+00:00
|
||||
```
|
||||
|
||||
### Last Data Feed Release
|
||||
@ -33,39 +33,36 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
|
||||
### Total Number of included CVEs
|
||||
|
||||
```plain
|
||||
258016
|
||||
258033
|
||||
```
|
||||
|
||||
### CVEs added in the last Commit
|
||||
|
||||
Recently added CVEs: `5`
|
||||
Recently added CVEs: `17`
|
||||
|
||||
- [CVE-2024-40689](CVE-2024/CVE-2024-406xx/CVE-2024-40689.json) (`2024-07-26T14:15:02.863`)
|
||||
- [CVE-2024-41670](CVE-2024/CVE-2024-416xx/CVE-2024-41670.json) (`2024-07-26T15:15:11.053`)
|
||||
- [CVE-2024-41805](CVE-2024/CVE-2024-418xx/CVE-2024-41805.json) (`2024-07-26T15:15:11.327`)
|
||||
- [CVE-2024-6922](CVE-2024/CVE-2024-69xx/CVE-2024-6922.json) (`2024-07-26T14:15:03.377`)
|
||||
- [CVE-2024-7128](CVE-2024/CVE-2024-71xx/CVE-2024-7128.json) (`2024-07-26T14:15:03.573`)
|
||||
- [CVE-2023-50700](CVE-2023/CVE-2023-507xx/CVE-2023-50700.json) (`2024-07-26T17:15:10.803`)
|
||||
- [CVE-2024-24257](CVE-2024/CVE-2024-242xx/CVE-2024-24257.json) (`2024-07-26T17:15:11.173`)
|
||||
- [CVE-2024-26520](CVE-2024/CVE-2024-265xx/CVE-2024-26520.json) (`2024-07-26T17:15:11.507`)
|
||||
- [CVE-2024-27357](CVE-2024/CVE-2024-273xx/CVE-2024-27357.json) (`2024-07-26T17:15:11.580`)
|
||||
- [CVE-2024-27358](CVE-2024/CVE-2024-273xx/CVE-2024-27358.json) (`2024-07-26T17:15:11.650`)
|
||||
- [CVE-2024-41353](CVE-2024/CVE-2024-413xx/CVE-2024-41353.json) (`2024-07-26T17:15:12.457`)
|
||||
- [CVE-2024-41354](CVE-2024/CVE-2024-413xx/CVE-2024-41354.json) (`2024-07-26T17:15:12.513`)
|
||||
- [CVE-2024-41355](CVE-2024/CVE-2024-413xx/CVE-2024-41355.json) (`2024-07-26T16:15:03.277`)
|
||||
- [CVE-2024-41356](CVE-2024/CVE-2024-413xx/CVE-2024-41356.json) (`2024-07-26T16:15:03.357`)
|
||||
- [CVE-2024-41357](CVE-2024/CVE-2024-413xx/CVE-2024-41357.json) (`2024-07-26T16:15:03.427`)
|
||||
- [CVE-2024-41373](CVE-2024/CVE-2024-413xx/CVE-2024-41373.json) (`2024-07-26T17:15:12.573`)
|
||||
- [CVE-2024-41374](CVE-2024/CVE-2024-413xx/CVE-2024-41374.json) (`2024-07-26T17:15:12.630`)
|
||||
- [CVE-2024-41375](CVE-2024/CVE-2024-413xx/CVE-2024-41375.json) (`2024-07-26T17:15:12.690`)
|
||||
- [CVE-2024-41807](CVE-2024/CVE-2024-418xx/CVE-2024-41807.json) (`2024-07-26T16:15:03.593`)
|
||||
- [CVE-2024-41812](CVE-2024/CVE-2024-418xx/CVE-2024-41812.json) (`2024-07-26T17:15:12.783`)
|
||||
- [CVE-2024-41813](CVE-2024/CVE-2024-418xx/CVE-2024-41813.json) (`2024-07-26T17:15:12.990`)
|
||||
- [CVE-2024-7050](CVE-2024/CVE-2024-70xx/CVE-2024-7050.json) (`2024-07-26T16:15:03.847`)
|
||||
|
||||
|
||||
### CVEs modified in the last Commit
|
||||
|
||||
Recently modified CVEs: `15`
|
||||
Recently modified CVEs: `0`
|
||||
|
||||
- [CVE-2024-3164](CVE-2024/CVE-2024-31xx/CVE-2024-3164.json) (`2024-07-26T14:15:02.560`)
|
||||
- [CVE-2024-3165](CVE-2024/CVE-2024-31xx/CVE-2024-3165.json) (`2024-07-26T14:15:02.690`)
|
||||
- [CVE-2024-33933](CVE-2024/CVE-2024-339xx/CVE-2024-33933.json) (`2024-07-26T14:33:56.470`)
|
||||
- [CVE-2024-37422](CVE-2024/CVE-2024-374xx/CVE-2024-37422.json) (`2024-07-26T14:17:26.487`)
|
||||
- [CVE-2024-37428](CVE-2024/CVE-2024-374xx/CVE-2024-37428.json) (`2024-07-26T14:21:55.163`)
|
||||
- [CVE-2024-37429](CVE-2024/CVE-2024-374xx/CVE-2024-37429.json) (`2024-07-26T14:26:23.967`)
|
||||
- [CVE-2024-37432](CVE-2024/CVE-2024-374xx/CVE-2024-37432.json) (`2024-07-26T14:33:35.173`)
|
||||
- [CVE-2024-38454](CVE-2024/CVE-2024-384xx/CVE-2024-38454.json) (`2024-07-26T14:11:13.043`)
|
||||
- [CVE-2024-3938](CVE-2024/CVE-2024-39xx/CVE-2024-3938.json) (`2024-07-26T14:15:02.773`)
|
||||
- [CVE-2024-39670](CVE-2024/CVE-2024-396xx/CVE-2024-39670.json) (`2024-07-26T15:59:20.657`)
|
||||
- [CVE-2024-39671](CVE-2024/CVE-2024-396xx/CVE-2024-39671.json) (`2024-07-26T15:48:03.923`)
|
||||
- [CVE-2024-39672](CVE-2024/CVE-2024-396xx/CVE-2024-39672.json) (`2024-07-26T15:53:33.043`)
|
||||
- [CVE-2024-39673](CVE-2024/CVE-2024-396xx/CVE-2024-39673.json) (`2024-07-26T15:58:18.087`)
|
||||
- [CVE-2024-39674](CVE-2024/CVE-2024-396xx/CVE-2024-39674.json) (`2024-07-26T15:58:35.743`)
|
||||
- [CVE-2024-4447](CVE-2024/CVE-2024-44xx/CVE-2024-4447.json) (`2024-07-26T14:15:03.287`)
|
||||
|
||||
|
||||
## Download and Usage
|
||||
|
57
_state.csv
57
_state.csv
@ -237371,6 +237371,7 @@ CVE-2023-50692,0,0,6348689bc92a3d7d2b93f4ab7cffabad0f40b97f51e9c86bf7ce40c57b840
|
||||
CVE-2023-50693,0,0,dd08939e4ce32c03f59f04532580821ca5b697adc34a251e1c45db564373a664,2024-03-05T21:15:07.367000
|
||||
CVE-2023-50694,0,0,78b1aa0914931a0876815df8adb1c998b4fa38e7b62d7363c774f0a97cabce80,2024-03-21T02:49:58.640000
|
||||
CVE-2023-5070,0,0,9fb6a723c8279931601cd42b57dae05abcb788776665c70d867d5b3fe8e04ffe,2023-11-07T04:23:25.600000
|
||||
CVE-2023-50700,1,1,d1a5fa63c1100d62a5873085c943b942ea0f0a96aa3b1619608f7531039c0ad7,2024-07-26T17:15:10.803000
|
||||
CVE-2023-50702,0,0,aabbc77a2d305beae7af1d1ea3729a356ffb437e099440502361eda2d189553a,2024-03-27T12:29:30.307000
|
||||
CVE-2023-50703,0,0,5412fe627eb96f0f79abae297ed08738bff2931ef5956788ab3e3239f68219e5,2023-12-29T16:32:32.477000
|
||||
CVE-2023-50704,0,0,d49cda3dff4ba1c0ede49172a75175738fe4d5075a250a9b7bfefb732a3e26ef,2023-12-29T16:31:20.133000
|
||||
@ -245390,6 +245391,7 @@ CVE-2024-2425,0,0,5244503cb81f1535e5c26158f97c8ff5a0be1d108c008e859e8897a136ecd7
|
||||
CVE-2024-24254,0,0,aa3e1e0113c1afb51d7c9ea40615c9f0ca117924787150a26ed63a73b49e27db,2024-02-15T18:46:57.737000
|
||||
CVE-2024-24255,0,0,e76da96580c60a9eda41d1841209285ca4cff39dd4bb1ea645c35657b9851939,2024-02-15T18:46:41.247000
|
||||
CVE-2024-24256,0,0,fcdfa612c3f1867287942ad18dfc81885197768fb299b50a1e03fe4abbe75856,2024-02-15T14:28:31.380000
|
||||
CVE-2024-24257,1,1,18ed26a747ee2ccb808801e335187d1f8376b6bb759fc1155321396a6fec96fe,2024-07-26T17:15:11.173000
|
||||
CVE-2024-24258,0,0,b6889ab8117d84f2b926a30d9ca7e037f41ed41c51b57e24ece8c5f1f0d35cca,2024-02-21T03:15:09.043000
|
||||
CVE-2024-24259,0,0,27500963c89a35e88885dfebaf6906d578facbf79a9197c97e367a82d6750a09,2024-02-21T03:15:09.110000
|
||||
CVE-2024-2426,0,0,6e67bd7547823c0951b38b7ed025ecb6861ed3d2534fad1723b99007466f0b1c,2024-03-26T12:55:05.010000
|
||||
@ -246853,6 +246855,7 @@ CVE-2024-26504,0,0,666faf787e5dc390b263f6f43b439704bacedd4c95ae744503624ba007956
|
||||
CVE-2024-26507,0,0,64f088a446d983fef0e9e5fe7e57b9067d595ae9ecbc4c9f4bac89b612f6dadc,2024-07-03T01:49:41.820000
|
||||
CVE-2024-2651,0,0,bd146bedf6ebe2167b2a748a6767423198ce44fb77df6650381302c98af6fd86,2024-05-14T16:13:02.773000
|
||||
CVE-2024-26517,0,0,26d33e1785f323f6a59cabe443b6ac20ef93d37ea417fa08778ea549f200621f,2024-05-14T16:13:02.773000
|
||||
CVE-2024-26520,1,1,2e8b8f31c930961addb2eb2d4dbd407df65c0a21c2f9be7dab545ed71cac96b6,2024-07-26T17:15:11.507000
|
||||
CVE-2024-26521,0,0,7985e5a46b5dbb7cac5d9bc8fb1bd033c53432230144c1b88c935a11b26cd32a,2024-03-12T12:40:13.500000
|
||||
CVE-2024-26529,0,0,bd6cd552c022306ecb15ba77a51e2bdce3a9e1417338a63b92cda08b02e6c1ab,2024-03-13T12:33:51.697000
|
||||
CVE-2024-2653,0,0,b3409d37c73c6e84286baa910f6042b0e4464dede287f82c98b61b036f897600,2024-05-01T18:15:19.257000
|
||||
@ -247670,6 +247673,8 @@ CVE-2024-27353,0,0,cbcb4ed0cb0d6b5421bdc80855b33d7fe1407fb7f951e4769d290990900af
|
||||
CVE-2024-27354,0,0,6669ef56de2629d6bd7a6c54cb75c8f6e454c14fc2065829ff46305d945b1196,2024-03-21T02:52:19.927000
|
||||
CVE-2024-27355,0,0,cbfd71f3fb28d8933e5fd0b89a2619127b39a508cc85ac5bc00d2b3fcc2d06dd,2024-03-21T02:52:19.970000
|
||||
CVE-2024-27356,0,0,749ec2d4b1e51d4aafe83652bc0802a299a54d3561d4847f2c289cb0919b6c2e,2024-02-27T14:20:06.637000
|
||||
CVE-2024-27357,1,1,f153e366e5f22bba13648a73a9e1d0766d70f4fe1ae98dfae3539e68bea8504e,2024-07-26T17:15:11.580000
|
||||
CVE-2024-27358,1,1,c6f05a12984d0b3095da6b6c5923490ab56b29a155188393a6caeac7a0b6e386,2024-07-26T17:15:11.650000
|
||||
CVE-2024-27359,0,0,3ef57b8299026e901c7562e8bbf9bafac98cc1976d3917e5c32880417a0a2746,2024-02-26T16:32:25.577000
|
||||
CVE-2024-2736,0,0,0ddab351a075258184e9da71bec86e9fd25b36338827c4a540a6ed9379b0bd6e,2024-04-10T13:23:38.787000
|
||||
CVE-2024-27360,0,0,33246297884723d4ff8bb58853158d18ca6235582cb6c304b20ea59c674486c8,2024-07-12T14:57:53.930000
|
||||
@ -250523,10 +250528,10 @@ CVE-2024-31630,0,0,2bd16e3fcef7bda0b7ed937f45148dde60c59ea9d09224ef4dc76dc8aeb1e
|
||||
CVE-2024-31631,0,0,189299e833a9bdec5625f34c9b7af7b60646f6c7b2cd4586dea999ec400d5e00,2024-06-05T17:15:13.130000
|
||||
CVE-2024-31634,0,0,cd6336332928e139372eaeb7f2fa7bd12555d147721492304ddeef71595ef37a,2024-04-16T13:24:07.103000
|
||||
CVE-2024-31636,0,0,5030ab945dd9e3d071b87a4da035a97defc5897507c6002a20e31f1008a32478,2024-07-03T01:55:16.580000
|
||||
CVE-2024-3164,0,1,38bea5ea29fb4ffa7766bbe0beb8807abf0c8d405294ac50c0e82ba1bd904579,2024-07-26T14:15:02.560000
|
||||
CVE-2024-3164,0,0,38bea5ea29fb4ffa7766bbe0beb8807abf0c8d405294ac50c0e82ba1bd904579,2024-07-26T14:15:02.560000
|
||||
CVE-2024-31648,0,0,2922cc98178cad367ce9967a9bb0554e38b9bf3f7eeaabe3324ef2b9c342145f,2024-04-16T13:24:07.103000
|
||||
CVE-2024-31649,0,0,4e97e11dec1d0224f80d5fc46b087ead4bd3503ddd935380e84b5c378f32db60,2024-04-16T13:24:07.103000
|
||||
CVE-2024-3165,0,1,80972bb4e4cfe5922196180e44e15963a79521816e646014cac03ba5f7adab4e,2024-07-26T14:15:02.690000
|
||||
CVE-2024-3165,0,0,80972bb4e4cfe5922196180e44e15963a79521816e646014cac03ba5f7adab4e,2024-07-26T14:15:02.690000
|
||||
CVE-2024-31650,0,0,f91457293ffe9951d31a570db1b9cb5f0c4dfb9ffa5e388dc3d2c34a75979925,2024-07-03T01:55:17.350000
|
||||
CVE-2024-31651,0,0,2f1b682345eecb1fdf8666f197b953cac229ba6b6b34d2f7c287258788c8508c,2024-04-16T13:24:07.103000
|
||||
CVE-2024-31652,0,0,2f3d2336fbc8f42d1dec7a1682c8c016320ebabd666e8e526baaf0f45acfa966,2024-04-16T13:24:07.103000
|
||||
@ -251985,7 +251990,7 @@ CVE-2024-33929,0,0,ee867c5f5d1ac4185dfcb2d626d3c7c256abc1eadb9e1db65712558282cdd
|
||||
CVE-2024-33930,0,0,97a124f9171798821ca496be0351936fc579390dbfd46074096e3ded3d9e26c8,2024-05-02T13:27:25.103000
|
||||
CVE-2024-33931,0,0,5d42fd8f292f8e8b0089150ded8e8ffc189bf75ffea1bfd0a28a796b49ee821b,2024-05-03T12:48:41.067000
|
||||
CVE-2024-33932,0,0,7b7b10e5cab4b1732b386d54dd924c1afde2ca07ee08bada3bb6122ce8d12cc0,2024-05-03T12:48:41.067000
|
||||
CVE-2024-33933,0,1,43e626d2383f4301661eeec0473f8ebeeae1eba33e7d385f0de4f2b1ea1e2fe2,2024-07-26T14:33:56.470000
|
||||
CVE-2024-33933,0,0,43e626d2383f4301661eeec0473f8ebeeae1eba33e7d385f0de4f2b1ea1e2fe2,2024-07-26T14:33:56.470000
|
||||
CVE-2024-33934,0,0,0c1f245d040c38cf9d0ffef223ebb8e45755a6b7319985f92c3d44ab0a47bd4d,2024-05-03T12:48:41.067000
|
||||
CVE-2024-33935,0,0,9c7e3834620bd861e077bf00204e6b8ba7e5ae45666bca6197ee1409b2328d60,2024-05-03T12:48:41.067000
|
||||
CVE-2024-33936,0,0,f19c8a26b2c4868b2285170d704f0562e5f3fc7d947194bab4345ca1cec8c30e,2024-05-03T12:48:41.067000
|
||||
@ -254234,13 +254239,13 @@ CVE-2024-37418,0,0,675b821ef8240dd93d22c5ac9b8f3319c41da8d55da693dece471e9353913
|
||||
CVE-2024-37419,0,0,7497905030a084031f9bb8bd15796449391bccdf5e342a627e00c321a312ffd7,2024-07-09T18:19:14.047000
|
||||
CVE-2024-3742,0,0,070fab29ddad5d13a23ad47122f745631dbb00aff0bcf6b77107130b4d71f112,2024-05-28T17:15:11.450000
|
||||
CVE-2024-37420,0,0,fa4fba43610346a4c73a6f42b596dded3d6dc6de3bdef2d0e568f5534a8bec1d,2024-07-09T18:19:14.047000
|
||||
CVE-2024-37422,0,1,1548d48870de86cc62e20da69fa08aade3d9d83f2ffb2a88548607a6025e893d,2024-07-26T14:17:26.487000
|
||||
CVE-2024-37422,0,0,1548d48870de86cc62e20da69fa08aade3d9d83f2ffb2a88548607a6025e893d,2024-07-26T14:17:26.487000
|
||||
CVE-2024-37424,0,0,fb16d4de8ec78b8ec08d294a6bed2c6089434892d86f157d76124906952fff11,2024-07-09T18:19:14.047000
|
||||
CVE-2024-37428,0,1,f146442dabd264be77a227ba9b03dccb9706269373ac507a457054f3345b0e91,2024-07-26T14:21:55.163000
|
||||
CVE-2024-37429,0,1,8530fe972ccd63731e61144bb487cee540e4e955b2b0d75c0f1ca3a60c119021,2024-07-26T14:26:23.967000
|
||||
CVE-2024-37428,0,0,f146442dabd264be77a227ba9b03dccb9706269373ac507a457054f3345b0e91,2024-07-26T14:21:55.163000
|
||||
CVE-2024-37429,0,0,8530fe972ccd63731e61144bb487cee540e4e955b2b0d75c0f1ca3a60c119021,2024-07-26T14:26:23.967000
|
||||
CVE-2024-3743,0,0,0a3db480b628076d3c70c79465806357c94d138ddc8641e01236cf34e89a1520,2024-05-02T18:00:37.360000
|
||||
CVE-2024-37430,0,0,f63f8a79ba000a8d3292c8fa1235cffff817858e9420c3da871f375702319449,2024-07-09T18:19:14.047000
|
||||
CVE-2024-37432,0,1,9a85e7ce6631a972224b20933aad58418f278d0a1f11eda7b83c84ff5f3966d5,2024-07-26T14:33:35.173000
|
||||
CVE-2024-37432,0,0,9a85e7ce6631a972224b20933aad58418f278d0a1f11eda7b83c84ff5f3966d5,2024-07-26T14:33:35.173000
|
||||
CVE-2024-37433,0,0,f4d9d33bda34bb62246368c517e537f865851d3bb09f759ca915a13f45136c21,2024-07-26T13:33:34.383000
|
||||
CVE-2024-37434,0,0,de4220350ea1caf8aa2bab268d0d3ea23f7a5950515fa1138c50016e02cca0dc,2024-07-26T13:34:09.707000
|
||||
CVE-2024-37436,0,0,f37bb6580351b266494b62ab4b6ddbe460804af39dfcf5264b74592c431d17c6,2024-07-22T13:00:31.330000
|
||||
@ -254745,7 +254750,7 @@ CVE-2024-38448,0,0,ba1871b7e0fa187923744d63be4c60396badf8afd9c3275c2e47e89175ed0
|
||||
CVE-2024-38449,0,0,8da6f80ac88bb7ae3e1140e6ee8382a2d6cd1d0a7f86d02f23b41c1048f2d2ac,2024-06-20T12:44:22.977000
|
||||
CVE-2024-3845,0,0,a979e2b537f528e4ac50f6006d078d735fa62fe4b7376a25443b79e4c194cadd,2024-07-03T02:06:42.887000
|
||||
CVE-2024-38453,0,0,08958525d96155b2873daad7721dd5cb57bde45d4e8e94a2b3e4a3f3b7e8c89f,2024-07-09T16:22:44.900000
|
||||
CVE-2024-38454,0,1,72d14562f500903ed20ecf4e44aff777a96cc5f26825831fa62629cb8dc6e476,2024-07-26T14:11:13.043000
|
||||
CVE-2024-38454,0,0,72d14562f500903ed20ecf4e44aff777a96cc5f26825831fa62629cb8dc6e476,2024-07-26T14:11:13.043000
|
||||
CVE-2024-38457,0,0,c127438be2d611d9181e4bd46ca453fc6b636f1c9865c6edf3c5d09f27c2b35b,2024-07-26T13:29:10.210000
|
||||
CVE-2024-38458,0,0,1c123d9196e3f5ffac1cc5622b10f7cfbc43618017fed6ddd121a084f078cd6f,2024-07-26T13:27:56.937000
|
||||
CVE-2024-38459,0,0,4ef78a4d5c93482a3188b8be60d5fc2896531e30b015b11c8a864501b9d2680f,2024-07-03T02:05:04.377000
|
||||
@ -255207,7 +255212,7 @@ CVE-2024-39373,0,0,e03c6c4e4265087cfa8c4bbe8fccd5576189838192e80bd89272e600b85fa
|
||||
CVE-2024-39374,0,0,ceb09b5bb4e8be416a15f13560d443b1e635d211ece43c085341bae7ef26131f,2024-06-27T17:11:52.390000
|
||||
CVE-2024-39375,0,0,7f7f7a9309aed2a09a305dfdf1e1d93b0589de917a3b11ae3ae79eb9d410a9e7,2024-06-27T17:11:52.390000
|
||||
CVE-2024-39376,0,0,ff38615940f53b46258a81c8b3ac7c33f4e18906965f9bf4f05657720710f5f6,2024-06-27T17:11:52.390000
|
||||
CVE-2024-3938,0,1,8887ed8e5799b16c10955230ab5dda27b9f755d2347bb21346f025730ab845b2,2024-07-26T14:15:02.773000
|
||||
CVE-2024-3938,0,0,8887ed8e5799b16c10955230ab5dda27b9f755d2347bb21346f025730ab845b2,2024-07-26T14:15:02.773000
|
||||
CVE-2024-3939,0,0,946bcd2da6cf8e6d3629d51459f4ff005d5f6fd111c61e8b42a0b8395ce78a5e,2024-05-28T12:39:28.377000
|
||||
CVE-2024-3940,0,0,9b4f68dc6c260883aad4ea511cde5305f79b78a30a9cc16969c94330d4b864d9,2024-05-14T16:11:39.510000
|
||||
CVE-2024-3941,0,0,35d6089b62c06226c8a1fbb42f6b4f7549cfd9ebea65fdddb79305777fa7b160,2024-05-14T16:11:39.510000
|
||||
@ -255352,11 +255357,11 @@ CVE-2024-3965,0,0,ca98c8c8f38859cd31112b30cbcab1577d0379601171e9b943854dcc0ce8c1
|
||||
CVE-2024-3966,0,0,73fb2ae6dbee87e9388d8eb74bc7dee75170ed92fa9ef996fc6e09e4c624edd8,2024-06-17T12:42:04.623000
|
||||
CVE-2024-39669,0,0,56d6b274e749be30b1ff4d12ff6c858882279f47b773d710e8ac61d1e37bcfa3,2024-07-03T02:05:50.580000
|
||||
CVE-2024-3967,0,0,5862f1bd72fcf48f7d564d5c642edefacf28c5dccb3d99f9648feaeaf3e033bf,2024-05-15T18:35:11.453000
|
||||
CVE-2024-39670,0,1,3a61e5a6666f112bec3cfc14e8f35d59da78387d4c3f14b676dc411cb29b4668,2024-07-26T15:59:20.657000
|
||||
CVE-2024-39671,0,1,bace222ca01f6e9712c8294adcf4317d7ee2cf68108b867abbb0f23c223b8b8a,2024-07-26T15:48:03.923000
|
||||
CVE-2024-39672,0,1,0c85de4590f18d8843ec69ec1c982b6c43c61011e65b44282aed4bf730f49623,2024-07-26T15:53:33.043000
|
||||
CVE-2024-39673,0,1,b1c068f44d0a9aaaf8f58599b1cb881e705b5c945a7c5d93ce78a0cb82068cbf,2024-07-26T15:58:18.087000
|
||||
CVE-2024-39674,0,1,2dd73b99ef60d794197fe0c13977ff0f37547f24c6b5b5c262c92f54addb5ff8,2024-07-26T15:58:35.743000
|
||||
CVE-2024-39670,0,0,3a61e5a6666f112bec3cfc14e8f35d59da78387d4c3f14b676dc411cb29b4668,2024-07-26T15:59:20.657000
|
||||
CVE-2024-39671,0,0,bace222ca01f6e9712c8294adcf4317d7ee2cf68108b867abbb0f23c223b8b8a,2024-07-26T15:48:03.923000
|
||||
CVE-2024-39672,0,0,0c85de4590f18d8843ec69ec1c982b6c43c61011e65b44282aed4bf730f49623,2024-07-26T15:53:33.043000
|
||||
CVE-2024-39673,0,0,b1c068f44d0a9aaaf8f58599b1cb881e705b5c945a7c5d93ce78a0cb82068cbf,2024-07-26T15:58:18.087000
|
||||
CVE-2024-39674,0,0,2dd73b99ef60d794197fe0c13977ff0f37547f24c6b5b5c262c92f54addb5ff8,2024-07-26T15:58:35.743000
|
||||
CVE-2024-39675,0,0,324904789d577f8da38a1b1d1fcdf082a86fba9fd2cc1697c3fb80289cc5120e,2024-07-09T18:19:14.047000
|
||||
CVE-2024-39676,0,0,e843e26a051fd9d7a6fa411a5b9172b50db33ad2a0459f672d5ecbe647af8405,2024-07-24T12:55:13.223000
|
||||
CVE-2024-39677,0,0,c1a0d9a5a9ccbb7df09329c8ee16f641c4f9bc5f42ed88da1c64c5051e623648,2024-07-08T15:49:22.437000
|
||||
@ -255659,7 +255664,7 @@ CVE-2024-4065,0,0,e9243298c32ccba8ab1ac6d427150517ee98217790d2dec0b1b5ec685d8cbc
|
||||
CVE-2024-4066,0,0,5674d1317b0a03adb324e31f70d35a87031f26ca2ea2869349483359d081bdf7,2024-06-04T19:20:29.323000
|
||||
CVE-2024-4067,0,0,9e7f1211bf79e7110903241dcc25ab8bd46e04dab02a9e051766a97ad7f670bf,2024-05-22T12:15:10.767000
|
||||
CVE-2024-4068,0,0,bb45b0f3c24ec800e9c86d4119a908807b555886bbc03073bf2175c668679f63,2024-07-03T02:07:03.943000
|
||||
CVE-2024-40689,1,1,3b73dd098ffd10ef808133a0096408e0fdb1675d9dc6022d91f722250157b513,2024-07-26T14:15:02.863000
|
||||
CVE-2024-40689,0,0,3b73dd098ffd10ef808133a0096408e0fdb1675d9dc6022d91f722250157b513,2024-07-26T14:15:02.863000
|
||||
CVE-2024-4069,0,0,fc5a2986d6746eec6d2dc8871a19fd31bd3dae122b27ac5ac325372fce08edbe,2024-06-04T19:20:29.457000
|
||||
CVE-2024-40690,0,0,288f59aa1afbad71e8a264760a25606f0765322027457660d06b06f1220570f0,2024-07-12T19:04:57.907000
|
||||
CVE-2024-4070,0,0,f50441c69b27e00682c793729b411e41b0ab8839510e28fbeccbd72a35bcaeb5,2024-06-04T19:20:29.567000
|
||||
@ -255880,6 +255885,14 @@ CVE-2024-41319,0,0,bfb437b42963b0793282d02b7344fad2f16d4a046fba71ec7cf9211564769
|
||||
CVE-2024-41320,0,0,c5a875fc50e40098ff2c260c87b7011f6622e714e9083a176560d9c8c9a46cbe,2024-07-24T12:55:13.223000
|
||||
CVE-2024-4133,0,0,809a3aebbf4e63405fb2f0740c9908f3dfcf1d711b93379e5d465ea9e56d3cba,2024-05-02T18:00:37.360000
|
||||
CVE-2024-4135,0,0,3adddfced77f8fc8630aec5e175734a40783e3f6b247cb0614a312485a8097a3,2024-05-08T13:15:00.690000
|
||||
CVE-2024-41353,1,1,54750c5e4569499a911de3318da8e088d2993f36d63804a6483e463d7bbf8dcd,2024-07-26T17:15:12.457000
|
||||
CVE-2024-41354,1,1,a95131d06e3854ea273cae7793f7fb9586163bde0c7b59a8e751b31c88c88275,2024-07-26T17:15:12.513000
|
||||
CVE-2024-41355,1,1,c156409bf09a45d25f0a710ec5b831882f88d4579da6b8033e81746055bf5774,2024-07-26T16:15:03.277000
|
||||
CVE-2024-41356,1,1,908e97943b9d3b720955cc3e4e0fca842a705eff6efabb4bd05b53df77854d72,2024-07-26T16:15:03.357000
|
||||
CVE-2024-41357,1,1,e406848b5b12fe5669062298d4e1d7eaa05802f5c089a2c805f67cda0e099040,2024-07-26T16:15:03.427000
|
||||
CVE-2024-41373,1,1,778cdf8c556519d5fa0f9858e8b1c2d8771b65713cb8a295c3c6e29a356a24c1,2024-07-26T17:15:12.573000
|
||||
CVE-2024-41374,1,1,254f3a51369b525a0addc0b6825753736c6168eb96b43ce28383cb3cff6e851f,2024-07-26T17:15:12.630000
|
||||
CVE-2024-41375,1,1,f960a9806a9c11ad700294b80195f58903c2a066c06d02efa9551a219a53b697,2024-07-26T17:15:12.690000
|
||||
CVE-2024-4138,0,0,0f7c3171dd014e7915cab9bf533b57ef231d5c30c6ae20f761b745c0767014ec,2024-05-14T19:17:55.627000
|
||||
CVE-2024-4139,0,0,d53d7324701315788576d545d1c201804fb102fe113eecb6f188d5966156345d,2024-05-14T19:17:55.627000
|
||||
CVE-2024-4140,0,0,1a159a4a143aac5301b6b2c31977a1ba9c685fc606596154a85964b944248c74,2024-06-10T18:15:36.313000
|
||||
@ -255938,7 +255951,7 @@ CVE-2024-41666,0,0,0375155254884f774ba6c1bf65be8527b5535973799e11a8779eb527e144e
|
||||
CVE-2024-41667,0,0,7a0d38f51bb876529e5a20368a13b36a328307ee0a9c9ad609e8a6d11c45fa5c,2024-07-25T12:36:39.947000
|
||||
CVE-2024-41668,0,0,d649a2a5c90e957bfc9f2698aae879b13d0f5f730255ef5d13e3e5f57ca747be,2024-07-24T12:55:13.223000
|
||||
CVE-2024-4167,0,0,a726fa69800dd2a00fe506dc5d29a370681725e72bfe1ac34a8206d50708861e,2024-06-04T19:20:31.593000
|
||||
CVE-2024-41670,1,1,996f72e995d69664ab34dbbd85fc02c0043c2bde90c254f11d889789c1ca82a0,2024-07-26T15:15:11.053000
|
||||
CVE-2024-41670,0,0,996f72e995d69664ab34dbbd85fc02c0043c2bde90c254f11d889789c1ca82a0,2024-07-26T15:15:11.053000
|
||||
CVE-2024-41672,0,0,c445ad7d826ddcac22902530a2e686289f099e89069390baf727ebdc437f2aef,2024-07-25T12:36:39.947000
|
||||
CVE-2024-4168,0,0,7f4f833c88738c683a47d814a058bf8a730868170937a9aca799097bc79bf22f,2024-06-04T19:20:31.690000
|
||||
CVE-2024-41684,0,0,95ec7e2487f3d35034f6e080c40635119e0fb4501e7dc4aadbfa01096747fcc6,2024-07-26T12:38:41.683000
|
||||
@ -255968,11 +255981,14 @@ CVE-2024-4177,0,0,e1d6d87dc8ef62b0d8de94cfe98a875b1cbd39c3640e8e02d8d5a4e8bb3cca
|
||||
CVE-2024-4180,0,0,89f84993baa10ab5b41ed58678b5b9e31ff190980a67ee18130266156f7434fc,2024-06-04T16:57:41.053000
|
||||
CVE-2024-41800,0,0,de10ad962b669cb0e83390124cefb714c566366c680caf05af31d5cbb07531ef,2024-07-26T12:38:41.683000
|
||||
CVE-2024-41801,0,0,7a4a47d8d4dd1e6f1ffdce276bee976a7b2cf6eead2e5e4570c33554bb7cb103,2024-07-26T12:38:41.683000
|
||||
CVE-2024-41805,1,1,3c0ac10ed221b83ae49fa1acd7442eed035719ddcae0f0a73ac4e2fea2344179,2024-07-26T15:15:11.327000
|
||||
CVE-2024-41805,0,0,3c0ac10ed221b83ae49fa1acd7442eed035719ddcae0f0a73ac4e2fea2344179,2024-07-26T15:15:11.327000
|
||||
CVE-2024-41806,0,0,538c83928617c702a46380612d20226d3b25d01fddbfea7d5ac18a5a8a9114ce,2024-07-26T12:38:41.683000
|
||||
CVE-2024-41807,1,1,e86c4e0879be0f622b0de12c8fba430b974ce92b24702bd4e14aaf255cc07969,2024-07-26T16:15:03.593000
|
||||
CVE-2024-41808,0,0,eee8cfba986a7a6e0e312c331c59644589f8c648c497985f0ce93d189bcf72fd,2024-07-26T12:38:41.683000
|
||||
CVE-2024-41809,0,0,073c063cc2026d2bccc0c562d18cc6e67373815bd6d185ae52f0ef0533a16567,2024-07-26T12:38:41.683000
|
||||
CVE-2024-4181,0,0,318f7b6282445099b873be7e9b6d90d9a8a899d8ebeb5f7676f33b80d9073c4d,2024-05-16T13:03:05.353000
|
||||
CVE-2024-41812,1,1,72e03de367442947df70eb890ebc6eb3d5703a91023448c09a49175b3a6f6ea9,2024-07-26T17:15:12.783000
|
||||
CVE-2024-41813,1,1,473cd175cc3d2e4776f6c69b35c7c89d44454e8b4cdec7987c900fec982b7760,2024-07-26T17:15:12.990000
|
||||
CVE-2024-4182,0,0,0d8f83951a03e7673897d4b6402c0de2918a0bc9490e2ea7f1f32823e0e2921f,2024-04-26T12:58:17.720000
|
||||
CVE-2024-41824,0,0,47989ccb6404b62a8cb0e5c16e1a456b7d013ad0bd3667ac206b0f700dc33163,2024-07-24T12:55:13.223000
|
||||
CVE-2024-41825,0,0,6aad2331189a4332679fd93c0cdd3f8949299f242c1480d90e032f6f8578050d,2024-07-24T12:55:13.223000
|
||||
@ -256208,7 +256224,7 @@ CVE-2024-4443,0,0,844cc6ae76fc91b0a9b2c7cc836e7c7382ecc4895f252d76709d68a22aac17
|
||||
CVE-2024-4444,0,0,b8ab3a280e1fea7a38298a9a71737680ed9a07734ba58de04ed034a8b48f0be8,2024-05-14T16:11:39.510000
|
||||
CVE-2024-4445,0,0,bc137eb49d08335d8d2b32a3f413016c50b301d09f6a742095c80df385aba82a,2024-05-14T19:17:55.627000
|
||||
CVE-2024-4446,0,0,1f8054153546c06c7cecced2dcd2c53333dc96b1e8806f72a87d7ba3a2b74b3c,2024-05-14T16:11:39.510000
|
||||
CVE-2024-4447,0,1,6d3e3c1756d4e08bcee828a8b84f5006760edf12deb78fbda02ebad4895c5e50,2024-07-26T14:15:03.287000
|
||||
CVE-2024-4447,0,0,6d3e3c1756d4e08bcee828a8b84f5006760edf12deb78fbda02ebad4895c5e50,2024-07-26T14:15:03.287000
|
||||
CVE-2024-4448,0,0,ff015519e7eac6c0276d907449baafc4f7a351376bd8c68f68eb22730cad6ec7,2024-05-14T16:11:39.510000
|
||||
CVE-2024-4449,0,0,dfb61d36a2fe2d114407086a514e9ce225e4230ccc913df40322e3ba386dcfdc,2024-05-14T16:11:39.510000
|
||||
CVE-2024-4450,0,0,b24b8ce0e053a361cce58b13d2cd04d00806b52c8bf56acc8e9c097bb185241c,2024-06-20T12:44:01.637000
|
||||
@ -257947,7 +257963,7 @@ CVE-2024-6911,0,0,46d89096f6e412b4d1b26c4491b89cca1edef35f1edb197cda4640c904cf98
|
||||
CVE-2024-6912,0,0,b579ffc43dbaf89f50f93b1659dc012bb7b84a2d36bcb32b984560565416f527,2024-07-24T12:55:13.223000
|
||||
CVE-2024-6913,0,0,a7b65a58f468735b3782ca0a056db617c72da8825fc6f7975e6b5a68a6fa7e93,2024-07-24T12:55:13.223000
|
||||
CVE-2024-6916,0,0,1d247ae867be71d9af12779cc6db2629ce2403155b9fbbc87b676a3b33127b65,2024-07-19T13:01:44.567000
|
||||
CVE-2024-6922,1,1,8f5221871e45dc47cd64706a094fd915a7222fa61d034a8129002705e5734e02,2024-07-26T14:15:03.377000
|
||||
CVE-2024-6922,0,0,8f5221871e45dc47cd64706a094fd915a7222fa61d034a8129002705e5734e02,2024-07-26T14:15:03.377000
|
||||
CVE-2024-6930,0,0,de9484f0df1ac338aa3b09c73b4d890cbda7e2129d6e265be8ed1831a07d234d,2024-07-24T12:55:13.223000
|
||||
CVE-2024-6932,0,0,67a8aa74150c82de9338c7f5e13237de6a0b3fc058478249ab687a9bbea18d6e,2024-07-22T13:00:31.330000
|
||||
CVE-2024-6933,0,0,31e003a378d639e27641dced44e726d35d058acd0301a48a16d76976ef2aa1ee,2024-07-22T13:00:31.330000
|
||||
@ -257992,6 +258008,7 @@ CVE-2024-7007,0,0,d661b80f381c5e5a20762050cd26d7cdbc7442dd5816d04953c75c3bb9a2e0
|
||||
CVE-2024-7014,0,0,bf4bcb57365a86d29a45ebd019245eec542daaec8aac5d2bd790565f954bcfee,2024-07-24T12:55:13.223000
|
||||
CVE-2024-7027,0,0,5a505a0256616ae7086bad971714674072a78d2b5b489c23bd05df293d4823ce,2024-07-24T12:55:13.223000
|
||||
CVE-2024-7047,0,0,a8a34e25dd02e2f4bae12fb422d77becb4b340aa4ac90e0b4f1ca7d693febb09,2024-07-25T12:36:39.947000
|
||||
CVE-2024-7050,1,1,87eb65c2fa0193ce614b51e63bdcf9b31a6757244623cb5a8ed10e25fea6ffc5,2024-07-26T16:15:03.847000
|
||||
CVE-2024-7057,0,0,134fb7ecedd83008f512f96c952415d9fe42c8f642d80f45f533232c0a6892c0,2024-07-25T12:36:39.947000
|
||||
CVE-2024-7060,0,0,290f41e25897864e5bc7f39b896930a92e0ee9d30e699cee7ddb424244610f49,2024-07-25T12:36:39.947000
|
||||
CVE-2024-7062,0,0,2de7735f54d6d57f1a0e2f635d75e3ce3e1868b3b72f7dae9b650e963fe9e8e8,2024-07-26T12:38:41.683000
|
||||
@ -258014,4 +258031,4 @@ CVE-2024-7117,0,0,7166b8d59d092089ff4cbe42af64cf756caf4f41c7f432b25d418c983632ea
|
||||
CVE-2024-7118,0,0,62d89d26f65ea1fb65d47df60031a9f710120780ee20316aed458cb0233573da,2024-07-26T12:38:41.683000
|
||||
CVE-2024-7119,0,0,4fde682fb77fb71b91b004dbf3a8e8f6c65de29e380f3ae8cf5f985df542b475,2024-07-26T12:38:41.683000
|
||||
CVE-2024-7120,0,0,b31d06866272ef86189a0e02ce3949a7ccc55f035cc829a55c9e600588efd001,2024-07-26T12:38:41.683000
|
||||
CVE-2024-7128,1,1,47460bc57c903b3fabdb73433c3bfc4f54879d354fc8cdc474587e0d4d4fa63d,2024-07-26T14:15:03.573000
|
||||
CVE-2024-7128,0,0,47460bc57c903b3fabdb73433c3bfc4f54879d354fc8cdc474587e0d4d4fa63d,2024-07-26T14:15:03.573000
|
||||
|
Can't render this file because it is too large.
|
Loading…
x
Reference in New Issue
Block a user