mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-07-11 16:13:34 +00:00
Auto-Update: 2024-06-27T02:00:19.251168+00:00
This commit is contained in:
parent
7c1d37e0de
commit
4710913ce3
@ -2,8 +2,12 @@
|
||||
"id": "CVE-2020-13965",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2020-06-09T03:15:11.250",
|
||||
"lastModified": "2023-11-07T03:17:04.467",
|
||||
"lastModified": "2024-06-27T01:00:01.260",
|
||||
"vulnStatus": "Modified",
|
||||
"cisaExploitAdd": "2024-06-26",
|
||||
"cisaActionDue": "2024-07-17",
|
||||
"cisaRequiredAction": "Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.",
|
||||
"cisaVulnerabilityName": "Roundcube Webmail Cross-Site Scripting (XSS) Vulnerability",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,12 @@
|
||||
"id": "CVE-2022-24816",
|
||||
"sourceIdentifier": "security-advisories@github.com",
|
||||
"published": "2022-04-13T21:15:07.683",
|
||||
"lastModified": "2023-02-16T19:08:35.947",
|
||||
"lastModified": "2024-06-27T01:00:01.260",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cisaExploitAdd": "2024-06-26",
|
||||
"cisaActionDue": "2024-07-17",
|
||||
"cisaRequiredAction": "Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.",
|
||||
"cisaVulnerabilityName": "GeoSolutionsGroup JAI-EXT Code Injection Vulnerability",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,12 @@
|
||||
"id": "CVE-2022-2586",
|
||||
"sourceIdentifier": "security@ubuntu.com",
|
||||
"published": "2024-01-08T18:15:44.620",
|
||||
"lastModified": "2024-01-12T16:21:26.710",
|
||||
"lastModified": "2024-06-27T01:00:01.260",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cisaExploitAdd": "2024-06-26",
|
||||
"cisaActionDue": "2024-07-17",
|
||||
"cisaRequiredAction": "Apply updates per vendor instructions or discontinue use of the product if updates are unavailable.",
|
||||
"cisaVulnerabilityName": "Linux Kernel Use-After-Free Vulnerability",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
59
CVE-2024/CVE-2024-14xx/CVE-2024-1493.json
Normal file
59
CVE-2024/CVE-2024-14xx/CVE-2024-1493.json
Normal file
@ -0,0 +1,59 @@
|
||||
{
|
||||
"id": "CVE-2024-1493",
|
||||
"sourceIdentifier": "cve@gitlab.com",
|
||||
"published": "2024-06-27T00:15:10.283",
|
||||
"lastModified": "2024-06-27T00:15:10.283",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "An issue was discovered in GitLab CE/EE affecting all versions starting from 9.2 prior to 16.11.5, starting from 17.0 prior to 17.0.3, and starting from 17.1 prior to 17.1.1, with the processing logic for generating link in dependency files can lead to a regular expression DoS attack on the server"
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "cve@gitlab.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 6.5,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "cve@gitlab.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-400"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://gitlab.com/gitlab-org/gitlab/-/issues/441806",
|
||||
"source": "cve@gitlab.com"
|
||||
},
|
||||
{
|
||||
"url": "https://hackerone.com/reports/2370084",
|
||||
"source": "cve@gitlab.com"
|
||||
}
|
||||
]
|
||||
}
|
59
CVE-2024/CVE-2024-18xx/CVE-2024-1816.json
Normal file
59
CVE-2024/CVE-2024-18xx/CVE-2024-1816.json
Normal file
@ -0,0 +1,59 @@
|
||||
{
|
||||
"id": "CVE-2024-1816",
|
||||
"sourceIdentifier": "cve@gitlab.com",
|
||||
"published": "2024-06-27T00:15:10.523",
|
||||
"lastModified": "2024-06-27T00:15:10.523",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "An issue was discovered in GitLab CE/EE affecting all versions starting from 12.0 prior to 16.11.5, starting from 17.0 prior to 17.0.3, and starting from 17.1 prior to 17.1.1, which allows for an attacker to cause a denial of service using a crafted OpenAPI file."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "cve@gitlab.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "HIGH",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 5.3,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 1.6,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "cve@gitlab.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-400"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://gitlab.com/gitlab-org/gitlab/-/issues/442852",
|
||||
"source": "cve@gitlab.com"
|
||||
},
|
||||
{
|
||||
"url": "https://hackerone.com/reports/2370737",
|
||||
"source": "cve@gitlab.com"
|
||||
}
|
||||
]
|
||||
}
|
59
CVE-2024/CVE-2024-21xx/CVE-2024-2191.json
Normal file
59
CVE-2024/CVE-2024-21xx/CVE-2024-2191.json
Normal file
@ -0,0 +1,59 @@
|
||||
{
|
||||
"id": "CVE-2024-2191",
|
||||
"sourceIdentifier": "cve@gitlab.com",
|
||||
"published": "2024-06-27T00:15:10.790",
|
||||
"lastModified": "2024-06-27T00:15:10.790",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "An issue was discovered in GitLab CE/EE affecting all versions starting from 16.9 prior to 16.11.5, starting from 17.0 prior to 17.0.3, and starting from 17.1 prior to 17.1.1, which allows merge request title to be visible publicly despite being set as project members only."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "cve@gitlab.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 5.3,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 1.4
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "cve@gitlab.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-284"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://gitlab.com/gitlab-org/gitlab/-/issues/444655",
|
||||
"source": "cve@gitlab.com"
|
||||
},
|
||||
{
|
||||
"url": "https://hackerone.com/reports/2357370",
|
||||
"source": "cve@gitlab.com"
|
||||
}
|
||||
]
|
||||
}
|
59
CVE-2024/CVE-2024-31xx/CVE-2024-3115.json
Normal file
59
CVE-2024/CVE-2024-31xx/CVE-2024-3115.json
Normal file
@ -0,0 +1,59 @@
|
||||
{
|
||||
"id": "CVE-2024-3115",
|
||||
"sourceIdentifier": "cve@gitlab.com",
|
||||
"published": "2024-06-27T00:15:11.190",
|
||||
"lastModified": "2024-06-27T00:15:11.190",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "An issue was discovered in GitLab EE affecting all versions starting from 16.0 prior to 16.11.5, starting from 17.0 prior to 17.0.3, and starting from 17.1 prior to 17.1.1, which allows an attacker to access issues and epics without having an SSO session using Duo Chat."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "cve@gitlab.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 4.3,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 1.4
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "cve@gitlab.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-200"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://gitlab.com/gitlab-org/gitlab/-/issues/452548",
|
||||
"source": "cve@gitlab.com"
|
||||
},
|
||||
{
|
||||
"url": "https://hackerone.com/reports/2417868",
|
||||
"source": "cve@gitlab.com"
|
||||
}
|
||||
]
|
||||
}
|
59
CVE-2024/CVE-2024-39xx/CVE-2024-3959.json
Normal file
59
CVE-2024/CVE-2024-39xx/CVE-2024-3959.json
Normal file
@ -0,0 +1,59 @@
|
||||
{
|
||||
"id": "CVE-2024-3959",
|
||||
"sourceIdentifier": "cve@gitlab.com",
|
||||
"published": "2024-06-27T00:15:11.420",
|
||||
"lastModified": "2024-06-27T00:15:11.420",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "An issue was discovered in GitLab CE/EE affecting all versions starting from 16.7 prior to 16.11.5, starting from 17.0 prior to 17.0.3, and starting from 17.1 prior to 17.1.1, which allows private job artifacts can be accessed by any user."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "cve@gitlab.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 6.5,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "cve@gitlab.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-285"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://gitlab.com/gitlab-org/gitlab/-/issues/456989",
|
||||
"source": "cve@gitlab.com"
|
||||
},
|
||||
{
|
||||
"url": "https://hackerone.com/reports/2456845",
|
||||
"source": "cve@gitlab.com"
|
||||
}
|
||||
]
|
||||
}
|
59
CVE-2024/CVE-2024-40xx/CVE-2024-4011.json
Normal file
59
CVE-2024/CVE-2024-40xx/CVE-2024-4011.json
Normal file
@ -0,0 +1,59 @@
|
||||
{
|
||||
"id": "CVE-2024-4011",
|
||||
"sourceIdentifier": "cve@gitlab.com",
|
||||
"published": "2024-06-27T00:15:11.643",
|
||||
"lastModified": "2024-06-27T00:15:11.643",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "An issue was discovered in GitLab CE/EE affecting all versions starting from 16.1 prior to 16.11.5, starting from 17.0 prior to 17.0.3, and starting from 17.1 prior to 17.1.1, which allows non-project member to promote key results to objectives."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "cve@gitlab.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "HIGH",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 3.1,
|
||||
"baseSeverity": "LOW"
|
||||
},
|
||||
"exploitabilityScore": 1.6,
|
||||
"impactScore": 1.4
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "cve@gitlab.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-284"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://gitlab.com/gitlab-org/gitlab/-/issues/457235",
|
||||
"source": "cve@gitlab.com"
|
||||
},
|
||||
{
|
||||
"url": "https://hackerone.com/reports/2456186",
|
||||
"source": "cve@gitlab.com"
|
||||
}
|
||||
]
|
||||
}
|
59
CVE-2024/CVE-2024-45xx/CVE-2024-4557.json
Normal file
59
CVE-2024/CVE-2024-45xx/CVE-2024-4557.json
Normal file
@ -0,0 +1,59 @@
|
||||
{
|
||||
"id": "CVE-2024-4557",
|
||||
"sourceIdentifier": "cve@gitlab.com",
|
||||
"published": "2024-06-27T00:15:11.863",
|
||||
"lastModified": "2024-06-27T00:15:11.863",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Multiple Denial of Service (DoS) conditions has been discovered in GitLab CE/EE affecting all versions starting from 1.0 prior to 16.11.5, starting from 17.0 prior to 17.0.3, and starting from 17.1 prior to 17.1.1 which allowed an attacker to cause resource exhaustion via banzai pipeline."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "cve@gitlab.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 6.5,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "cve@gitlab.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-400"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://gitlab.com/gitlab-org/gitlab/-/issues/460517",
|
||||
"source": "cve@gitlab.com"
|
||||
},
|
||||
{
|
||||
"url": "https://hackerone.com/reports/2485172",
|
||||
"source": "cve@gitlab.com"
|
||||
}
|
||||
]
|
||||
}
|
59
CVE-2024/CVE-2024-49xx/CVE-2024-4901.json
Normal file
59
CVE-2024/CVE-2024-49xx/CVE-2024-4901.json
Normal file
@ -0,0 +1,59 @@
|
||||
{
|
||||
"id": "CVE-2024-4901",
|
||||
"sourceIdentifier": "cve@gitlab.com",
|
||||
"published": "2024-06-27T00:15:12.263",
|
||||
"lastModified": "2024-06-27T00:15:12.263",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "An issue was discovered in GitLab CE/EE affecting all versions starting from 16.9 prior to 16.11.5, starting from 17.0 prior to 17.0.3, and starting from 17.1 prior to 17.1.1, where a stored XSS vulnerability could be imported from a project with malicious commit notes."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "cve@gitlab.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 8.7,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.3,
|
||||
"impactScore": 5.8
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "cve@gitlab.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://gitlab.com/gitlab-org/gitlab/-/issues/461773",
|
||||
"source": "cve@gitlab.com"
|
||||
},
|
||||
{
|
||||
"url": "https://hackerone.com/reports/2500163",
|
||||
"source": "cve@gitlab.com"
|
||||
}
|
||||
]
|
||||
}
|
59
CVE-2024/CVE-2024-54xx/CVE-2024-5430.json
Normal file
59
CVE-2024/CVE-2024-54xx/CVE-2024-5430.json
Normal file
@ -0,0 +1,59 @@
|
||||
{
|
||||
"id": "CVE-2024-5430",
|
||||
"sourceIdentifier": "cve@gitlab.com",
|
||||
"published": "2024-06-27T00:15:12.650",
|
||||
"lastModified": "2024-06-27T00:15:12.650",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "An issue was discovered in GitLab CE/EE affecting all versions starting from 16.10 prior to 16.11.5, starting from 17.0 prior to 17.0.3, and starting from 17.1 prior to 17.1.1, which allows a project maintainer can delete the merge request approval policy via graphQL."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "cve@gitlab.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:N/I:H/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "HIGH",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 6.8,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.3,
|
||||
"impactScore": 4.0
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "cve@gitlab.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-284"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://gitlab.com/gitlab-org/gitlab/-/issues/464017",
|
||||
"source": "cve@gitlab.com"
|
||||
},
|
||||
{
|
||||
"url": "https://hackerone.com/reports/2520947",
|
||||
"source": "cve@gitlab.com"
|
||||
}
|
||||
]
|
||||
}
|
59
CVE-2024/CVE-2024-56xx/CVE-2024-5655.json
Normal file
59
CVE-2024/CVE-2024-56xx/CVE-2024-5655.json
Normal file
@ -0,0 +1,59 @@
|
||||
{
|
||||
"id": "CVE-2024-5655",
|
||||
"sourceIdentifier": "cve@gitlab.com",
|
||||
"published": "2024-06-27T00:15:12.887",
|
||||
"lastModified": "2024-06-27T00:15:12.887",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "An issue was discovered in GitLab CE/EE affecting all versions starting from 15.8 prior to 16.11.5, starting from 17.0 prior to 17.0.3, and starting from 17.1 prior to 17.1.1, which allows an attacker to trigger a pipeline as another user under certain circumstances."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "cve@gitlab.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 9.6,
|
||||
"baseSeverity": "CRITICAL"
|
||||
},
|
||||
"exploitabilityScore": 3.1,
|
||||
"impactScore": 5.8
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "cve@gitlab.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-284"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://gitlab.com/gitlab-org/gitlab/-/issues/465862",
|
||||
"source": "cve@gitlab.com"
|
||||
},
|
||||
{
|
||||
"url": "https://hackerone.com/reports/2536320",
|
||||
"source": "cve@gitlab.com"
|
||||
}
|
||||
]
|
||||
}
|
55
CVE-2024/CVE-2024-63xx/CVE-2024-6323.json
Normal file
55
CVE-2024/CVE-2024-63xx/CVE-2024-6323.json
Normal file
@ -0,0 +1,55 @@
|
||||
{
|
||||
"id": "CVE-2024-6323",
|
||||
"sourceIdentifier": "cve@gitlab.com",
|
||||
"published": "2024-06-27T00:15:13.130",
|
||||
"lastModified": "2024-06-27T00:15:13.130",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Improper authorization in global search in GitLab EE affecting all versions from 16.11 prior to 16.11.5 and 17.0 prior to 17.0.3 and 17.1 prior to 17.1.1 allows an attacker leak content of a private repository in a public project."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "cve@gitlab.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 7.5,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "cve@gitlab.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-653"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://gitlab.com/gitlab-org/gitlab/-/issues/457912",
|
||||
"source": "cve@gitlab.com"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-6344",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2024-06-26T11:15:52.073",
|
||||
"lastModified": "2024-06-26T12:44:29.693",
|
||||
"lastModified": "2024-06-27T00:15:13.360",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
|
34
README.md
34
README.md
@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours.
|
||||
### Last Repository Update
|
||||
|
||||
```plain
|
||||
2024-06-26T23:55:17.875424+00:00
|
||||
2024-06-27T02:00:19.251168+00:00
|
||||
```
|
||||
|
||||
### Most recent CVE Modification Timestamp synchronized with NVD
|
||||
|
||||
```plain
|
||||
2024-06-26T23:15:19.800000+00:00
|
||||
2024-06-27T01:00:01.260000+00:00
|
||||
```
|
||||
|
||||
### Last Data Feed Release
|
||||
@ -27,32 +27,40 @@ Repository synchronizes with the NVD every 2 hours.
|
||||
Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/releases/latest)
|
||||
|
||||
```plain
|
||||
2024-06-26T00:00:08.662795+00:00
|
||||
2024-06-27T00:00:08.641951+00:00
|
||||
```
|
||||
|
||||
### Total Number of included CVEs
|
||||
|
||||
```plain
|
||||
255278
|
||||
255289
|
||||
```
|
||||
|
||||
### CVEs added in the last Commit
|
||||
|
||||
Recently added CVEs: `7`
|
||||
Recently added CVEs: `11`
|
||||
|
||||
- [CVE-2024-28982](CVE-2024/CVE-2024-289xx/CVE-2024-28982.json) (`2024-06-26T23:15:19.287`)
|
||||
- [CVE-2024-28983](CVE-2024/CVE-2024-289xx/CVE-2024-28983.json) (`2024-06-26T23:15:19.597`)
|
||||
- [CVE-2024-28984](CVE-2024/CVE-2024-289xx/CVE-2024-28984.json) (`2024-06-26T23:15:19.800`)
|
||||
- [CVE-2024-37247](CVE-2024/CVE-2024-372xx/CVE-2024-37247.json) (`2024-06-26T22:15:10.000`)
|
||||
- [CVE-2024-37248](CVE-2024/CVE-2024-372xx/CVE-2024-37248.json) (`2024-06-26T22:15:10.223`)
|
||||
- [CVE-2024-37571](CVE-2024/CVE-2024-375xx/CVE-2024-37571.json) (`2024-06-26T22:15:10.450`)
|
||||
- [CVE-2024-37734](CVE-2024/CVE-2024-377xx/CVE-2024-37734.json) (`2024-06-26T22:15:10.533`)
|
||||
- [CVE-2024-1493](CVE-2024/CVE-2024-14xx/CVE-2024-1493.json) (`2024-06-27T00:15:10.283`)
|
||||
- [CVE-2024-1816](CVE-2024/CVE-2024-18xx/CVE-2024-1816.json) (`2024-06-27T00:15:10.523`)
|
||||
- [CVE-2024-2191](CVE-2024/CVE-2024-21xx/CVE-2024-2191.json) (`2024-06-27T00:15:10.790`)
|
||||
- [CVE-2024-3115](CVE-2024/CVE-2024-31xx/CVE-2024-3115.json) (`2024-06-27T00:15:11.190`)
|
||||
- [CVE-2024-3959](CVE-2024/CVE-2024-39xx/CVE-2024-3959.json) (`2024-06-27T00:15:11.420`)
|
||||
- [CVE-2024-4011](CVE-2024/CVE-2024-40xx/CVE-2024-4011.json) (`2024-06-27T00:15:11.643`)
|
||||
- [CVE-2024-4557](CVE-2024/CVE-2024-45xx/CVE-2024-4557.json) (`2024-06-27T00:15:11.863`)
|
||||
- [CVE-2024-4901](CVE-2024/CVE-2024-49xx/CVE-2024-4901.json) (`2024-06-27T00:15:12.263`)
|
||||
- [CVE-2024-5430](CVE-2024/CVE-2024-54xx/CVE-2024-5430.json) (`2024-06-27T00:15:12.650`)
|
||||
- [CVE-2024-5655](CVE-2024/CVE-2024-56xx/CVE-2024-5655.json) (`2024-06-27T00:15:12.887`)
|
||||
- [CVE-2024-6323](CVE-2024/CVE-2024-63xx/CVE-2024-6323.json) (`2024-06-27T00:15:13.130`)
|
||||
|
||||
|
||||
### CVEs modified in the last Commit
|
||||
|
||||
Recently modified CVEs: `0`
|
||||
Recently modified CVEs: `4`
|
||||
|
||||
- [CVE-2020-13965](CVE-2020/CVE-2020-139xx/CVE-2020-13965.json) (`2024-06-27T01:00:01.260`)
|
||||
- [CVE-2022-24816](CVE-2022/CVE-2022-248xx/CVE-2022-24816.json) (`2024-06-27T01:00:01.260`)
|
||||
- [CVE-2022-2586](CVE-2022/CVE-2022-25xx/CVE-2022-2586.json) (`2024-06-27T01:00:01.260`)
|
||||
- [CVE-2024-6344](CVE-2024/CVE-2024-63xx/CVE-2024-6344.json) (`2024-06-27T00:15:13.360`)
|
||||
|
||||
|
||||
## Download and Usage
|
||||
|
33
_state.csv
33
_state.csv
@ -148741,7 +148741,7 @@ CVE-2020-13961,0,0,1fe463453099b23513150647de34a505435c3e49bfb1bd37008a666a6fd18
|
||||
CVE-2020-13962,0,0,73efb252eadcc56a142d208d0445dc25a58d319b90a52e53e0c7ef8825dcf6b3,2023-11-07T03:17:04.313000
|
||||
CVE-2020-13963,0,0,5a2208f871acab2397f31e74f10b59d9b44e43f17a6c3a1b3c64f29aa547891c,2022-11-05T02:04:33.607000
|
||||
CVE-2020-13964,0,0,4164273b77e227c4c8f846f5383d7c8a507930d52d88ee08b556d2b4408e2e82,2023-11-07T03:17:04.400000
|
||||
CVE-2020-13965,0,0,977d24811079e80afc6db4a1ba194be5ce7759f031b22b9db7dd4b8bb50f31e8,2023-11-07T03:17:04.467000
|
||||
CVE-2020-13965,0,1,ea7699876a196ccf4eabb2c6537170d56966c6d66c99bab1ad9ae45581cfba34,2024-06-27T01:00:01.260000
|
||||
CVE-2020-13968,0,0,31f2705e5110608578328547025f665cb791c3bf95647fd72cce63dd0efb9c76,2020-12-23T19:23:28.590000
|
||||
CVE-2020-13969,0,0,ef7ada27dc8f94a96c31abd823098e38b638d6e725d18bf5b8b998ea32c4422f,2020-12-23T19:21:31.573000
|
||||
CVE-2020-1397,0,0,e79ab87fef1aa5c692c9714693118d984c5317843a4a8b70d569e39bb4504ccc,2021-07-21T11:39:23.747000
|
||||
@ -193792,7 +193792,7 @@ CVE-2022-24812,0,0,ce008f94aa10997bc97e737f1581229f965621f271cc46721cdafe11260a1
|
||||
CVE-2022-24813,0,0,21ba8ed56728391b9f4068642fe209902ce9d4668995613066f13664d2737d7c,2023-06-23T19:01:44.610000
|
||||
CVE-2022-24814,0,0,c34269b3916e111edfece9930cd1dcecd024d367fe722288b09584af9d301a09,2022-04-12T09:32:46.507000
|
||||
CVE-2022-24815,0,0,e6146cbd0495acf0ea87773ccf591074d71af7a634fde01c1f689ee043ed10c5,2022-04-19T17:34:41.830000
|
||||
CVE-2022-24816,0,0,391fda4a44f870e2b39268e1556d3627a5a74c4fc8384c68814fd868e7ac557c,2023-02-16T19:08:35.947000
|
||||
CVE-2022-24816,0,1,22407f64e0ad67908b13509712c5fc03d31b81b2225b25775f668e6e4a0f04ec,2024-06-27T01:00:01.260000
|
||||
CVE-2022-24817,0,0,5c0c5c45813ea6d9f608d52968c0a40a7a526a447160224b62aec34fdea32535,2022-05-16T19:07:10.690000
|
||||
CVE-2022-24818,0,0,9ac843ce1b2caadc3021e7ef5ee2cc200c22cc2ae89c33012a9b4ee118517641,2023-06-23T19:10:04.380000
|
||||
CVE-2022-24819,0,0,2d4d291a72285b3b2dfb5c3a7b80b4adeca73083862020d2f3576c636e356ae1,2022-04-15T14:21:46.140000
|
||||
@ -194680,7 +194680,7 @@ CVE-2022-25855,0,0,56d19463dbc3e146d1994bbdf063d0858d63b634a17f60ae1c26014ec39d0
|
||||
CVE-2022-25856,0,0,07f5ad3fb091bafe0bb4df4d564e59807dadbd3447c334e19c4d70e416433646,2023-08-08T14:21:49.707000
|
||||
CVE-2022-25857,0,0,9de37fa5a541e6e6e55304f8c732e3976dc46c326424d33bff1dc7faed3d8df8,2024-03-15T11:15:07.750000
|
||||
CVE-2022-25858,0,0,fe9f7aeb783b3bb633367010deb14b348155b3c3454f10b072ec54fab20b4c3d,2023-08-08T14:22:24.967000
|
||||
CVE-2022-2586,0,0,20643e91afc20570c916bb6f4219909d0ce99bb9aa7d8e4034056546f7bc44e8,2024-01-12T16:21:26.710000
|
||||
CVE-2022-2586,0,1,4873c76f72cabcc57d433ec15b0219fd6ba19a76d3da8a5823728b390d6012cf,2024-06-27T01:00:01.260000
|
||||
CVE-2022-25860,0,0,7cc8aecf55d643d11a461f2461575fe6f2165d6ec5e1cb329d0bc452ff684856,2023-11-07T03:44:51.413000
|
||||
CVE-2022-25862,0,0,fcb1188af140419d0300cfd89d71bb4b2670945a962ceb9b622edde4c7622489,2022-05-24T15:12:18.177000
|
||||
CVE-2022-25863,0,0,4e8b9a01c94e8650103c7fdc293fd554bbda909c958e0e820c97a335b2eef85e,2022-06-17T18:40:18.720000
|
||||
@ -241893,6 +241893,7 @@ CVE-2024-1488,0,0,03e683b77c18e258ada6411156a13c686c4496eec0687a6c9cafd2107fba5d
|
||||
CVE-2024-1489,0,0,601abc5a034fbcf389e475f712bdb62e609e01342eb7a5cc6cdf4f20f6ce0143,2024-03-13T18:15:58.530000
|
||||
CVE-2024-1491,0,0,5bd5c8d4823c76c59f53c9f7559e7fec7b518fd1a891195d4c1b847086d33147,2024-05-28T17:15:09.103000
|
||||
CVE-2024-1492,0,0,ac491e1ac05085ffca5a01bc169673ef656902c869bec5c48f97ccc7785388e6,2024-02-29T13:49:29.390000
|
||||
CVE-2024-1493,1,1,ed503cc06ad939a1d9dbb6375b9daa56d6b2d30c68a9894a25193f62712566c4,2024-06-27T00:15:10.283000
|
||||
CVE-2024-1495,0,0,fb62d81a04863e1feb1aaf54e194ce1d2be35e43a2717c4349592d976859a74a,2024-06-13T18:36:09.010000
|
||||
CVE-2024-1496,0,0,cb4e1e2b66486c1532bf5fd9642c761fbe286057f303a98e25c71b95ed8fd1ee,2024-02-29T13:49:29.390000
|
||||
CVE-2024-1497,0,0,84c0cad6cfa5eb0a51311cf784383979e7b18f97e3410e261be2597241b19a2b,2024-03-13T18:15:58.530000
|
||||
@ -242170,6 +242171,7 @@ CVE-2024-1812,0,0,1a6f9eeab96c73268af7052134c8cf1c44932ad69fbc301edf8d35b130e7f4
|
||||
CVE-2024-1813,0,0,7221461b551b49805924c88f7a02ee625bae550432e647062e4543b6083025c7,2024-04-10T13:23:38.787000
|
||||
CVE-2024-1814,0,0,0b1e2db7106be181c074b53f672647c26a1befc789f8a090beaccc8e7ce1a1ab,2024-05-24T01:15:30.977000
|
||||
CVE-2024-1815,0,0,9977db768a350aa8d7588584513fe0dfb6e464418c1beb6188f5eecf3642f719,2024-05-24T01:15:30.977000
|
||||
CVE-2024-1816,1,1,c9ca140216970a839889bf1f648f550a96ab8fc5d68c8e2439834c69ab1e3f2f,2024-06-27T00:15:10.523000
|
||||
CVE-2024-1817,0,0,d22678ba5046366220ff2f5ee22240282d315c7945fb2fd131031a18112a5a4a,2024-05-17T02:35:37.207000
|
||||
CVE-2024-1818,0,0,160ee525d5ff48a751a727de0287a62c274d8c7c0090e0c76c9649776d3b8ac7,2024-05-17T02:35:37.310000
|
||||
CVE-2024-1819,0,0,200100b2029b16af7aba6a64011b8f852960cff67c1c8b594d8a140448c1f883,2024-05-17T02:35:37.403000
|
||||
@ -243477,6 +243479,7 @@ CVE-2024-21905,0,0,adf99f19af2fd4f47febc9f1430872cfbd6f08389bdadd5f441acb45fc9c4
|
||||
CVE-2024-21907,0,0,e97acedaa5fff8f35a2639917d8b0e8affd6b5d126dc549f4b2d35936c62833b,2024-01-17T15:24:07.360000
|
||||
CVE-2024-21908,0,0,329abb805b48ea46c40d9625a0e5a18857ae42d6b89a82f5c3cf797095821263,2024-01-08T19:46:41.157000
|
||||
CVE-2024-21909,0,0,1862a33cb8cb7c096543042cface003ed2658c185ec7603674a262510a57f13e,2024-02-08T02:15:40.883000
|
||||
CVE-2024-2191,1,1,8d9a95569a5fa799cfa236e5e6b2d19c45440bfa63ce92c49a633517743d1edb,2024-06-27T00:15:10.790000
|
||||
CVE-2024-21910,0,0,43ca7fc1e52b2bce376dbad269237609f1115a9e3e85611002acd3d35f8eee88,2024-01-08T19:46:25.757000
|
||||
CVE-2024-21911,0,0,30b0952621022b198f37c9fc7c47e2aaa3233be56e7cd5684ca7f588e4860d48,2024-01-08T19:46:14.513000
|
||||
CVE-2024-21912,0,0,e55852665e09c5ab48cbae6c65a3f0dbff3703123b8a6aa762360ad6e81dcd4e,2024-03-26T17:09:53.043000
|
||||
@ -248068,9 +248071,9 @@ CVE-2024-28977,0,0,10444a4b4519bac5d968aeb163eaf3f249ecc5460e5b7c0067db957ce6a37
|
||||
CVE-2024-28978,0,0,c1808ba5cc7d394021a34c4436b18922fdfd0f689f028622205841f891e3f4cf,2024-05-23T19:05:13.353000
|
||||
CVE-2024-28979,0,0,1e8150fa51d059ee46f9ef1bfb23a0a517c44eb200b6531263fa54ebf9d48ec5,2024-05-23T19:05:51.923000
|
||||
CVE-2024-2898,0,0,76a38588eeca70ecb25472849eb8998ee4d4f74eb5e3aa36fdb6d66de01eda42,2024-05-17T02:38:36.130000
|
||||
CVE-2024-28982,1,1,601804d1b7e1b4ed7885e7cf09bdfefb082dab0c0fd96f246e03d1c2e2012e1d,2024-06-26T23:15:19.287000
|
||||
CVE-2024-28983,1,1,4fbcf479ba5c237ec856893da16ba677568af179b571d3959c84a9f68c3f5066,2024-06-26T23:15:19.597000
|
||||
CVE-2024-28984,1,1,a41765e88d788d62f9df5822538642f7767edfb537e29409a710106dff33613d,2024-06-26T23:15:19.800000
|
||||
CVE-2024-28982,0,0,601804d1b7e1b4ed7885e7cf09bdfefb082dab0c0fd96f246e03d1c2e2012e1d,2024-06-26T23:15:19.287000
|
||||
CVE-2024-28983,0,0,4fbcf479ba5c237ec856893da16ba677568af179b571d3959c84a9f68c3f5066,2024-06-26T23:15:19.597000
|
||||
CVE-2024-28984,0,0,a41765e88d788d62f9df5822538642f7767edfb537e29409a710106dff33613d,2024-06-26T23:15:19.800000
|
||||
CVE-2024-2899,0,0,4aa5ec01ca1d3b835467a231d9836714c4e4cef27dea7210f2a97d49ae8b91f5,2024-05-17T02:38:36.220000
|
||||
CVE-2024-28995,0,0,7f6bfacc6577e5540c3ea3c9fa39d7440addd0797be30b15d88a9d1a10d16e9d,2024-06-11T17:47:22.867000
|
||||
CVE-2024-28996,0,0,5733b25206f61033b9bade6885819d3353d454454ea3290c2e7bb4df83194bba,2024-06-06T16:23:24.377000
|
||||
@ -249515,6 +249518,7 @@ CVE-2024-31138,0,0,80619d8b23ffb923a4bb521ee1877f29e2a086a5161850672cdc2424af6c6
|
||||
CVE-2024-31139,0,0,6254efb24474a93bf19fb224a952376f20b94666e671b313ffb9fb5d6ba4e123,2024-03-28T16:07:30.893000
|
||||
CVE-2024-31140,0,0,8ac72cdd6b5f7f56e71e87459ff46ad8714fcc8b963def523c845a786f9f62ca,2024-03-28T16:07:30.893000
|
||||
CVE-2024-31142,0,0,1e729ac327535cc35260a14a69a0b20eeb370b6701c117105871d2595322a9f3,2024-05-16T15:44:44.683000
|
||||
CVE-2024-3115,1,1,66272355aec891e166d1da44d334e8e97f1c422ac3867b7e081440eebd9562af,2024-06-27T00:15:11.190000
|
||||
CVE-2024-31156,0,0,da4c4994c24daaccd314311728d10a4342bd95e8cf67e2b87207a10f13558958,2024-05-08T17:05:24.083000
|
||||
CVE-2024-31159,0,0,8f2140422377394a9df40aab7654ea68717fd5b1399ff91747ee6c2dd96f3205,2024-06-17T12:42:04.623000
|
||||
CVE-2024-3116,0,0,398207d2760952c7d30e8a692022e3a890986df7c49b38076f15d6ef6a9e4edb,2024-04-23T02:15:48.310000
|
||||
@ -253156,8 +253160,8 @@ CVE-2024-37230,0,0,c056784fe1461835022ae4387a349a1e9e9676537a6bd83c972fd23b96229
|
||||
CVE-2024-37231,0,0,2975c060fd817766775d3e3ec5265250dfcb406eb3856b3f2d8635478d7fc4db,2024-06-24T19:26:47.037000
|
||||
CVE-2024-37233,0,0,dcdb23af544a8046a4ecb68f34b48a3a15207d5a73bdc6182df1b28a0bb5e19c,2024-06-24T19:26:47.037000
|
||||
CVE-2024-3724,0,0,a2f08bb0a2e36a5c374b862fb3e4beff315b3d6672953c5eeabe10290b435e2c,2024-05-02T18:00:37.360000
|
||||
CVE-2024-37247,1,1,39799302f14a72cae7273eb39cf8a4da93a251d9d3251b7915227c3a8addfb7c,2024-06-26T22:15:10
|
||||
CVE-2024-37248,1,1,a514882bf58b655d6f3adffbf4a2946682aefbe8602430af2556e89235c968c3,2024-06-26T22:15:10.223000
|
||||
CVE-2024-37247,0,0,39799302f14a72cae7273eb39cf8a4da93a251d9d3251b7915227c3a8addfb7c,2024-06-26T22:15:10
|
||||
CVE-2024-37248,0,0,a514882bf58b655d6f3adffbf4a2946682aefbe8602430af2556e89235c968c3,2024-06-26T22:15:10.223000
|
||||
CVE-2024-3725,0,0,dd194c190207038aca40dcc17eaac7bd7c6f9f34e04d00c016e0de6cd9837da0,2024-05-02T18:00:37.360000
|
||||
CVE-2024-37252,0,0,faf33ef7b8f72660b3f71af61d55db3b928cbbfdda8d6a6c03b3fcf0d979da09,2024-06-26T12:44:29.693000
|
||||
CVE-2024-3726,0,0,5d13f10d5b73efb7ab7c6448eee56ee5b7f1a739226807fb6eef2a4ab850d2f7,2024-05-30T13:15:41.297000
|
||||
@ -253244,7 +253248,7 @@ CVE-2024-37568,0,0,e54134c743ff1c9089094584276cdc79416cb675a0fc4a7177e49bc6dbf3b
|
||||
CVE-2024-37569,0,0,748406cd7b0e731a2b9037b16c6d1dde7e8c81aa1003e1ce6c82275ceb288683,2024-06-12T16:32:56.203000
|
||||
CVE-2024-3757,0,0,62301a2775fcbfb9e8b5b1aa90b79aa074cd639699f2863765d338333af4b798,2024-05-07T13:39:32.710000
|
||||
CVE-2024-37570,0,0,a374041c2622c9ba66d2048315fc9e015af6a8717cce4f8beb5b59800398626a,2024-06-12T16:32:34.513000
|
||||
CVE-2024-37571,1,1,40ce128b41b9e1b1159c87948720a9755b00a31509a7fa89c376c163b75d3a6d,2024-06-26T22:15:10.450000
|
||||
CVE-2024-37571,0,0,40ce128b41b9e1b1159c87948720a9755b00a31509a7fa89c376c163b75d3a6d,2024-06-26T22:15:10.450000
|
||||
CVE-2024-3758,0,0,3ea9ecbea279ca1eb1159e542db09b1cab2d2435be79c6a6a563dc4d73ca4285,2024-05-07T13:39:32.710000
|
||||
CVE-2024-3759,0,0,20211226ea875c33805e71e9c0afa18c7ce1ad112702c8859afd48ee84347f62,2024-05-07T13:39:32.710000
|
||||
CVE-2024-3761,0,0,c0af44e486388b5bef077e784125f415f33c54c3c3a8677d0ab80af1f3e8df6c,2024-05-20T13:00:04.957000
|
||||
@ -253302,7 +253306,7 @@ CVE-2024-3770,0,0,8954a3ad0db5fc9b48d9243a1de01e444d03084d0f8b5d5da9ebc562e8f0e6
|
||||
CVE-2024-3771,0,0,1bf22922ed0657906343b6368a2362d22a78a1ff9d5272db064e582b3b0855d4,2024-05-17T02:40:07.477000
|
||||
CVE-2024-3772,0,0,184d29c2faf230c27e7c42ad45c478e7862cbffdde795ec4220824e36861b510,2024-04-26T02:15:06.983000
|
||||
CVE-2024-37732,0,0,c4e29c0f7175fe60ae396c5841d69538b22a36865a0b8a792362db7866454fcc,2024-06-26T17:49:36.837000
|
||||
CVE-2024-37734,1,1,14e40f6b7a0c3e90f8f320e0513e6c1e49b4c97e16cc04e3b13842f04dbbb369,2024-06-26T22:15:10.533000
|
||||
CVE-2024-37734,0,0,14e40f6b7a0c3e90f8f320e0513e6c1e49b4c97e16cc04e3b13842f04dbbb369,2024-06-26T22:15:10.533000
|
||||
CVE-2024-3774,0,0,430454733381ff5a96eb00158d8d932d4c087496720223836bce2968611b5152,2024-04-15T13:15:31.997000
|
||||
CVE-2024-37742,0,0,82d0f7bd796b50c91f2398edb7b6a7a5b24c344e32d17491fc5d315bfb23b371,2024-06-26T20:15:15.917000
|
||||
CVE-2024-3775,0,0,a79253f4f0c7633f40fa5e33903553d0137ff03b4a2d8425a028bb5ddf1c6b0a,2024-04-15T13:15:31.997000
|
||||
@ -253727,6 +253731,7 @@ CVE-2024-3954,0,0,45f1b348fcace6f84e3157e2d0f8a54fc4228bb396d26e03c9556cd235947f
|
||||
CVE-2024-3955,0,0,bba90f25cff74c274e08a67a3936bf55505a38180fc074269167b54bd0903537,2024-05-02T13:27:25.103000
|
||||
CVE-2024-3956,0,0,84c84e343f731479baad188521c68e2e10d428da5ee4bd61443cf640ccedc17a,2024-05-14T16:11:39.510000
|
||||
CVE-2024-3957,0,0,6e4e327328ad5c18e880466a103b162c10591051d90490bf0a67f6889d728425,2024-05-02T18:00:37.360000
|
||||
CVE-2024-3959,1,1,80a9d69e211db946a79ce1293fee1a985ceb27e08a867b47f88832b6cabd73ee,2024-06-27T00:15:11.420000
|
||||
CVE-2024-3961,0,0,6646adb167e87c94860ebd5d8d983b1f971f6dc9fb8c86a5eaff8de194f86033,2024-06-21T11:22:01.687000
|
||||
CVE-2024-3962,0,0,9de964d29f43823164300439a0e71453bbca4a5c1f5767eca51db600267798cd,2024-04-26T12:58:17.720000
|
||||
CVE-2024-3965,0,0,6a2d24a56808a8dbb9160c44f3b8ea17e074c89928316addbe1fa0ca0aaeb11f,2024-06-17T12:42:04.623000
|
||||
@ -253760,6 +253765,7 @@ CVE-2024-4006,0,0,cea97555ee62217aaca46943155964ba917aa17a210befae3806ab46c66060
|
||||
CVE-2024-4008,0,0,d029b79ac31ad712a3b682c30b4ebfe0bc85fbedb677b90d81d7c6af81a5600e,2024-06-18T17:00:01.570000
|
||||
CVE-2024-4009,0,0,82f6778b19e61d18cb6bad03fb43730c90019cd4ed3dad3648b480d1adbe3427,2024-06-18T17:01:19.897000
|
||||
CVE-2024-4010,0,0,b0efc140530d7080bd135b9c9b54b60a51a2a7dd68cfd5652cea86eef30822c4,2024-05-15T16:40:19.330000
|
||||
CVE-2024-4011,1,1,0928c50e2d80f152c9b9e77de4f093296246b7047a5b64859da921dea63c465f,2024-06-27T00:15:11.643000
|
||||
CVE-2024-4013,0,0,0bcb784021209931ac496a163310ba1a6e977841cc5a1bcc570cbfa4732ae6ef,2024-06-07T14:56:05.647000
|
||||
CVE-2024-4014,0,0,321273114f78ac117c4f7a805b62a62926b23a5461c74b2705504b7b2e21d158,2024-04-22T13:28:43.747000
|
||||
CVE-2024-4017,0,0,9cc899b07e49c20d1d42511c9c41a533c695fd74b1701843b26490566c6e33e3,2024-04-22T13:28:50.310000
|
||||
@ -254202,6 +254208,7 @@ CVE-2024-4549,0,0,6f08cdb7bdf1bc14a6d26c3a39b799558e43e67fec9cb01e1f3b74f80a87ac
|
||||
CVE-2024-4551,0,0,bde23bacf66d6a3da20cc3762eb00d7dfd03b874f5885e9a67eebb6780ae65b6,2024-06-17T12:42:04.623000
|
||||
CVE-2024-4552,0,0,e23892055f41d68c57f1d172e5ea3d0a2ee46019e9d286872c115b7aad205614,2024-06-04T16:57:41.053000
|
||||
CVE-2024-4553,0,0,8b88b932112e5db46be28f06635e2ec7d2585d5bcb10d64401d792f4b888b1c3,2024-05-21T12:37:59.687000
|
||||
CVE-2024-4557,1,1,257513c35e60e7548e5e9147b496a724c69101b2430b3df3e7137e1c8201ea87,2024-06-27T00:15:11.863000
|
||||
CVE-2024-4558,0,0,fcb727202a9f43a9bf70ed6e025c63a0fd8208e4c1e99d83d4aee5cebbd5fae2,2024-06-10T18:15:36.760000
|
||||
CVE-2024-4559,0,0,8380b9787705277bd83d6c6288181f3738a86c645934830c7e5c61a4edd855f6,2024-06-10T18:15:36.837000
|
||||
CVE-2024-4560,0,0,01330bc30e6abf90cd0e894076fd4822775b90946ecfbbe71c3855f1f2c00212,2024-05-14T16:11:39.510000
|
||||
@ -254476,6 +254483,7 @@ CVE-2024-4896,0,0,6456cc9b22aff68532bfeeb7637d5235216630d84771d1ec52d84fa467e4b7
|
||||
CVE-2024-4898,0,0,4ea5d2aea02f0385cebab454e7d6b2e480bf3eab8470b7157c155067bed66344,2024-06-13T18:36:09.010000
|
||||
CVE-2024-4899,0,0,67b323357bb49d8a98f8aef30f13d75a082b23ba24ff9269116bd3a4e859e8a6,2024-06-24T12:57:36.513000
|
||||
CVE-2024-4900,0,0,bf21c014329db3bdc252e0dfea038d8cc3dd03e7972d5bd787db3fb8215cd9e5,2024-06-24T12:57:36.513000
|
||||
CVE-2024-4901,1,1,7238018e624eed5d4a711b08e413688112d7a37593f314d4993be0dcc7616867,2024-06-27T00:15:12.263000
|
||||
CVE-2024-4902,0,0,190ae6556b466a5228ce6680f8d8f4ba4789cfafa6765b2e868dc7feb28ee1e3,2024-06-07T14:56:05.647000
|
||||
CVE-2024-4903,0,0,74f6793baa838082db19325ded8d53157feab60a90892d7bb13ebdea205ed94c,2024-06-07T20:15:11.967000
|
||||
CVE-2024-4904,0,0,44558a4b32290e2f940be10d0a83b859aa6fae2c01ef1c881d37a435bb46f91d,2024-06-04T19:20:52.380000
|
||||
@ -254881,6 +254889,7 @@ CVE-2024-5425,0,0,198a56668ec12904be81f8cc7c88bdb7cf556c1b42bf2a53d8f10dc0d316d5
|
||||
CVE-2024-5426,0,0,463afa72e5ec754a0d270917d456b87514b8458a939d0b61aeddc71dea0e191e,2024-06-11T18:03:58.213000
|
||||
CVE-2024-5427,0,0,e86cc201b7d64d377c97e091606dc3804ebb54017d6aedd32a3c8a9e9f3ee33f,2024-05-31T13:01:46.727000
|
||||
CVE-2024-5428,0,0,febfd9b4f977de4c3dc04e5fc8e71b9454e3ad809e74595cd325ad9561a295a7,2024-05-28T14:59:09.827000
|
||||
CVE-2024-5430,1,1,50d0358bd7a9dd3f7e75fbec60a9431ca513f04fff717ff8b392ca13bde9346f,2024-06-27T00:15:12.650000
|
||||
CVE-2024-5431,0,0,42e70412ed260a519e4eab6a93ce97c65de39fa732f015eeb2fa3ed75a13dc72,2024-06-25T12:24:17.873000
|
||||
CVE-2024-5432,0,0,ab9a775fb9b6438a5280e4ab8778e43fe4811f4ee641a114adeb9e5317236c9d,2024-06-20T12:43:25.663000
|
||||
CVE-2024-5433,0,0,d0946774ada383b4af0e78f23b9c449d05f83a7124810af4e383f90b0cdbda75,2024-05-29T13:02:09.280000
|
||||
@ -254994,6 +255003,7 @@ CVE-2024-5649,0,0,dc95f59c6efdf5cedf3d7e0f6c5bd262dc96a14a6be79337241ad862a08882
|
||||
CVE-2024-5650,0,0,65f855892c82055621a01afe5dfbac2eeb37ab3d50eb12f09dc0d9a40779b9ee,2024-06-17T12:42:04.623000
|
||||
CVE-2024-5653,0,0,283076b6ccce08ae3d1ddf9d7f5983a839d66c80929543a8a527d0bfdf86a2f9,2024-06-06T14:17:35.017000
|
||||
CVE-2024-5654,0,0,e22a0b433d38e113ff7c2fe935a2ac4a2eac96ee27b605312aa4a4c8d50d69a0,2024-06-10T02:52:08.267000
|
||||
CVE-2024-5655,1,1,d8a71b5d30b695a6efc14d9f636905eb2f41126b608ee8f05fb5f6cde0bb90a1,2024-06-27T00:15:12.887000
|
||||
CVE-2024-5656,0,0,40c34e526e2032c59043b8834b1648291001d5e69a19326cbf74d918e6c8fbc1,2024-06-13T14:15:13.397000
|
||||
CVE-2024-5657,0,0,223911cca93e713dc15810800584c4abe481e0e2143d3e3f3795c2d130280eb3,2024-06-11T17:40:47.823000
|
||||
CVE-2024-5658,0,0,e420aa15660fefecd013eab0de4dee690ff0f155b141d8b1d4392a16606c7ad5,2024-06-11T18:21:52.377000
|
||||
@ -255273,7 +255283,8 @@ CVE-2024-6305,0,0,f99f0e2fe8305a118a77228b9078f8dc9ee1845d0c6e4aa828aaf18dadf372
|
||||
CVE-2024-6306,0,0,711bff153bb36aca97259b9a58665f79686710d592de1aed3b99962d3c3067a2,2024-06-25T17:15:11.107000
|
||||
CVE-2024-6307,0,0,8ab5a431e062520bb1ad7f310d46410dbbde3d3f7608d294c115bc975c016c27,2024-06-25T12:24:17.873000
|
||||
CVE-2024-6308,0,0,483bab7c0040f40965fba497a0be9e45fef6974a263c54d39149185a218f4b43,2024-06-25T21:16:02.087000
|
||||
CVE-2024-6344,0,0,158fe8ce5a3890f545b2644b2bf88be098b9fb0d23e412b15a910b7a664aee59,2024-06-26T12:44:29.693000
|
||||
CVE-2024-6323,1,1,a13781b7b076a5a32737ff654fab9a311b721465dc2b074e3d948723fe795b77,2024-06-27T00:15:13.130000
|
||||
CVE-2024-6344,0,1,f8fe072181ab91a453822e0b523eb31f74817bc4efb68c7d2134a2d41a8e3557,2024-06-27T00:15:13.360000
|
||||
CVE-2024-6349,0,0,f01d61e3475192c945ec3639c2eda3b231a23d2f279c2f15b4719385fb2bd065,2024-06-26T15:15:20.690000
|
||||
CVE-2024-6354,0,0,7d18b67617b23c02d3a517e6ca456b4bc3978471ddff450d6c05c10b62c889de,2024-06-26T17:15:27.497000
|
||||
CVE-2024-6355,0,0,2a4505c0394d23db4b3d3539af3feab878a09a04e5d76bc801d2e38c9653479e,2024-06-26T21:15:13.533000
|
||||
|
Can't render this file because it is too large.
|
Loading…
x
Reference in New Issue
Block a user