Auto-Update: 2024-07-01T20:01:26.920930+00:00

This commit is contained in:
cad-safe-bot 2024-07-01 20:04:24 +00:00
parent 7d032d8631
commit 6521fac271
95 changed files with 3936 additions and 314 deletions

View File

@ -2,8 +2,9 @@
"id": "CVE-2015-6175",
"sourceIdentifier": "secure@microsoft.com",
"published": "2015-12-09T11:59:56.580",
"lastModified": "2018-10-30T16:27:22.263",
"vulnStatus": "Modified",
"lastModified": "2024-07-01T17:41:27.987",
"vulnStatus": "Analyzed",
"cveTags": [],
"cisaExploitAdd": "2022-05-25",
"cisaActionDue": "2022-06-15",
"cisaRequiredAction": "Apply updates per vendor instructions.",
@ -19,6 +20,28 @@
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
}
],
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
@ -52,7 +75,7 @@
"description": [
{
"lang": "en",
"value": "CWE-264"
"value": "NVD-CWE-noinfo"
}
]
}
@ -66,13 +89,8 @@
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:x64:*",
"matchCriteriaId": "084984D5-D241-497B-B118-50C6C1EAD468"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:x86:*",
"matchCriteriaId": "BA592626-F17C-4F46-823B-0947D102BBD2"
"criteria": "cpe:2.3:o:microsoft:windows_10_1507:-:*:*:*:*:*:*:*",
"matchCriteriaId": "542DAEEC-73CC-46C6-A630-BF474A3446AC"
}
]
}
@ -82,11 +100,20 @@
"references": [
{
"url": "http://www.securitytracker.com/id/1034334",
"source": "secure@microsoft.com"
"source": "secure@microsoft.com",
"tags": [
"Broken Link",
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2015/ms15-135",
"source": "secure@microsoft.com"
"source": "secure@microsoft.com",
"tags": [
"Patch",
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,9 @@
"id": "CVE-2015-8651",
"sourceIdentifier": "psirt@adobe.com",
"published": "2015-12-28T23:59:19.050",
"lastModified": "2017-02-17T02:59:09.950",
"vulnStatus": "Modified",
"lastModified": "2024-07-01T17:43:25.627",
"vulnStatus": "Analyzed",
"cveTags": [],
"cisaExploitAdd": "2022-05-25",
"cisaActionDue": "2022-06-15",
"cisaRequiredAction": "The impacted product is end-of-life and should be disconnected if still in use.",
@ -19,13 +20,13 @@
}
],
"metrics": {
"cvssMetricV30": [
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.0",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
@ -74,7 +75,7 @@
"description": [
{
"lang": "en",
"value": "CWE-189"
"value": "CWE-190"
}
]
}
@ -90,14 +91,14 @@
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:air_sdk:*:*:*:*:*:*:*:*",
"versionEndIncluding": "20.0.0.204",
"matchCriteriaId": "95299551-EDD0-4F8F-9F18-C3049CB3A9F4"
"versionEndExcluding": "20.0.0.233",
"matchCriteriaId": "D5AEC3F3-52AF-46E6-A4D1-79854036B3C0"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:air_sdk_\\&_compiler:*:*:*:*:*:*:*:*",
"versionEndIncluding": "20.0.0.204",
"matchCriteriaId": "8338438E-18F8-4DCE-95E0-5FEFCEC15026"
"versionEndExcluding": "20.0.0.233",
"matchCriteriaId": "8C954724-30BB-4215-8BEA-930A81B73ADF"
}
]
},
@ -139,8 +140,8 @@
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:flash_player:*:*:*:*:*:*:*:*",
"versionEndIncluding": "11.2.202.554",
"matchCriteriaId": "140657B1-1638-48BD-95B5-565EF5CF5BE5"
"versionEndExcluding": "11.2.202.559",
"matchCriteriaId": "1A5D0BB1-753D-4C3C-9D86-D095C7964A50"
}
]
},
@ -167,8 +168,8 @@
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:air:*:*:*:*:*:*:*:*",
"versionEndIncluding": "20.0.0.204",
"matchCriteriaId": "8F5182AB-63F9-4BF3-B8A9-44B182E86A80"
"versionEndExcluding": "20.0.0.233",
"matchCriteriaId": "94665D71-220E-47CF-9108-4ABAA833FC87"
}
]
},
@ -205,38 +206,15 @@
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:flash_player:*:*:*:*:*:*:*:*",
"versionEndIncluding": "18.0.0.268",
"matchCriteriaId": "99CE27CD-BCFA-4065-AD5A-A6206C15AC37"
"versionEndExcluding": "18.0.0.324",
"matchCriteriaId": "CA77DE00-4A06-4C87-96BB-81A6430456D8"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:flash_player:19.0.0.185:*:*:*:*:*:*:*",
"matchCriteriaId": "130D56D9-BFAD-44AB-BA04-1E6E2F18A049"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:flash_player:19.0.0.207:*:*:*:*:*:*:*",
"matchCriteriaId": "A0CE2650-25EB-446E-B2C9-631177740E87"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:flash_player:19.0.0.226:*:*:*:*:*:*:*",
"matchCriteriaId": "CBAE999D-B558-4714-854D-42D45A7A48BB"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:flash_player:19.0.0.245:*:*:*:*:*:*:*",
"matchCriteriaId": "0E47897F-1045-4CED-B208-4BED652FAE6F"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:flash_player:20.0.0.228:*:*:*:*:*:*:*",
"matchCriteriaId": "1AA036B2-C5F2-4DCD-B414-05045E3575B9"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:flash_player:20.0.0.235:*:*:*:*:*:*:*",
"matchCriteriaId": "7E3F4354-3066-45F0-8FE1-FB0496465C83"
"criteria": "cpe:2.3:a:adobe:flash_player:*:*:*:*:*:*:*:*",
"versionStartIncluding": "19.0.0.185",
"versionEndExcluding": "20.0.0.267",
"matchCriteriaId": "17AEDAF8-0784-4735-8245-DE60751067DA"
}
]
},
@ -257,60 +235,242 @@
]
}
]
},
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:redhat:enterprise_linux_desktop:5.0:*:*:*:*:*:*:*",
"matchCriteriaId": "133AAFA7-AF42-4D7B-8822-AA2E85611BF5"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*",
"matchCriteriaId": "EE249E1B-A1FD-4E08-AA71-A0E1F10FFE97"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:redhat:enterprise_linux_server:5.0:*:*:*:*:*:*:*",
"matchCriteriaId": "54D669D4-6D7E-449D-80C1-28FA44F06FFE"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*",
"matchCriteriaId": "9BBCD86A-E6C7-4444-9D74-F861084090F0"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:redhat:enterprise_linux_workstation:5.0:*:*:*:*:*:*:*",
"matchCriteriaId": "D0AC5CD5-6E58-433C-9EB3-6DFE5656463E"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*",
"matchCriteriaId": "E5ED5807-55B7-47C5-97A6-03233F4FBC3A"
}
]
}
]
},
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:opensuse:evergreen:11.4:*:*:*:*:*:*:*",
"matchCriteriaId": "CCE4D64E-8C4B-4F21-A9B0-90637C85C1D0"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*",
"matchCriteriaId": "A10BC294-9196-425F-9FB0-B1625465B47F"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*",
"matchCriteriaId": "03117DF1-3BEC-4B8D-AD63-DBBDB2126081"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:suse:linux_enterprise_desktop:11:sp3:*:*:*:*:*:*",
"matchCriteriaId": "3ED68ADD-BBDA-4485-BC76-58F011D72311"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:suse:linux_enterprise_desktop:11:sp4:*:*:*:*:*:*",
"matchCriteriaId": "17D4B6F2-514D-4BC2-B2C5-4E2FCCAC594C"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:suse:linux_enterprise_desktop:12:-:*:*:*:*:*:*",
"matchCriteriaId": "D2DF4815-B8CB-4AD3-B91D-2E09A8E318E9"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:suse:linux_enterprise_desktop:12:sp1:*:*:*:*:*:*",
"matchCriteriaId": "3A0BA503-3F96-48DA-AF47-FBA37A9D0C48"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:suse:linux_enterprise_workstation_extension:12:-:*:*:*:*:*:*",
"matchCriteriaId": "028ABA8F-4E7B-4CD0-B6FC-3A0941E254BA"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:suse:linux_enterprise_workstation_extension:12:sp1:*:*:*:*:*:*",
"matchCriteriaId": "ED540469-C4DD-485D-9B89-6877B2A74217"
}
]
}
]
},
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:hp:insight_control:*:*:*:*:*:*:*:*",
"versionEndExcluding": "7.6",
"matchCriteriaId": "FB12FFA6-C8C5-4052-B6C3-F83119FF21EC"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:hp:insight_control_server_provisioning:*:*:*:*:*:*:*:*",
"versionEndExcluding": "7.6",
"matchCriteriaId": "661098DB-F0F8-4AC1-A758-23B33E70BD91"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:hp:matrix_operating_environment:7.6:*:*:*:*:*:*:*",
"matchCriteriaId": "17A5B13C-7BC0-4E6B-9260-12C29AD068AE"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:hp:system_management_homepage:*:*:*:*:*:*:*:*",
"versionEndExcluding": "7.6",
"matchCriteriaId": "0B49E6F3-2FA7-4B1A-A6AC-AD655CB83586"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:hp:systems_insight_manager:*:*:*:*:*:*:*:*",
"versionEndExcluding": "7.6",
"matchCriteriaId": "C2928FF2-3AD4-4220-B5E3-6069499ABD97"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:hp:version_control_repository_manager:*:*:*:*:*:*:*:*",
"versionEndExcluding": "7.6",
"matchCriteriaId": "E08DDFC5-1DE5-4729-927C-823BB2E087FE"
}
]
}
]
}
],
"references": [
{
"url": "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00045.html",
"source": "psirt@adobe.com"
"source": "psirt@adobe.com",
"tags": [
"Mailing List",
"Third Party Advisory"
]
},
{
"url": "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00046.html",
"source": "psirt@adobe.com"
"source": "psirt@adobe.com",
"tags": [
"Mailing List",
"Third Party Advisory"
]
},
{
"url": "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00047.html",
"source": "psirt@adobe.com"
"source": "psirt@adobe.com",
"tags": [
"Mailing List",
"Third Party Advisory"
]
},
{
"url": "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00048.html",
"source": "psirt@adobe.com"
"source": "psirt@adobe.com",
"tags": [
"Mailing List",
"Third Party Advisory"
]
},
{
"url": "http://rhn.redhat.com/errata/RHSA-2015-2697.html",
"source": "psirt@adobe.com"
"source": "psirt@adobe.com",
"tags": [
"Third Party Advisory"
]
},
{
"url": "http://www.securityfocus.com/bid/79705",
"source": "psirt@adobe.com"
"source": "psirt@adobe.com",
"tags": [
"Broken Link",
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "http://www.securitytracker.com/id/1034544",
"source": "psirt@adobe.com"
"source": "psirt@adobe.com",
"tags": [
"Broken Link",
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05356388",
"source": "psirt@adobe.com"
"source": "psirt@adobe.com",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05385680",
"source": "psirt@adobe.com"
"source": "psirt@adobe.com",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722",
"source": "psirt@adobe.com"
"source": "psirt@adobe.com",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://helpx.adobe.com/security/products/flash-player/apsb16-01.html",
"source": "psirt@adobe.com",
"tags": [
"Not Applicable",
"Patch",
"Vendor Advisory"
]
},
{
"url": "https://security.gentoo.org/glsa/201601-03",
"source": "psirt@adobe.com"
"source": "psirt@adobe.com",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,9 @@
"id": "CVE-2016-0034",
"sourceIdentifier": "secure@microsoft.com",
"published": "2016-01-13T05:59:22.657",
"lastModified": "2018-10-12T22:10:48.720",
"vulnStatus": "Modified",
"lastModified": "2024-07-01T17:56:03.857",
"vulnStatus": "Analyzed",
"cveTags": [],
"cisaExploitAdd": "2022-05-25",
"cisaActionDue": "2022-06-15",
"cisaRequiredAction": "The impacted products are end-of-life and should be disconnected if still in use.",
@ -19,13 +20,13 @@
}
],
"metrics": {
"cvssMetricV30": [
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.0",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
@ -74,7 +75,7 @@
"description": [
{
"lang": "en",
"value": "CWE-20"
"value": "NVD-CWE-noinfo"
}
]
}
@ -88,8 +89,10 @@
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:microsoft:silverlight:5.0:*:*:*:*:*:*:*",
"matchCriteriaId": "D6EF9A3D-4EB8-4B2E-B388-04CC0751A93F"
"criteria": "cpe:2.3:a:microsoft:silverlight:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.0",
"versionEndExcluding": "5.1.41212.0",
"matchCriteriaId": "CBFAC3EC-5210-4BB0-A8DE-95778A80AC50"
}
]
}
@ -99,11 +102,20 @@
"references": [
{
"url": "http://www.securitytracker.com/id/1034655",
"source": "secure@microsoft.com"
"source": "secure@microsoft.com",
"tags": [
"Broken Link",
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2016/ms16-006",
"source": "secure@microsoft.com"
"source": "secure@microsoft.com",
"tags": [
"Patch",
"Vendor Advisory"
]
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2023-43554",
"sourceIdentifier": "product-security@qualcomm.com",
"published": "2024-07-01T15:15:13.000",
"lastModified": "2024-07-01T16:37:39.040",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Memory corruption while processing IOCTL handler in FastRPC."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "product-security@qualcomm.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.4,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.5,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "product-security@qualcomm.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-119"
}
]
}
],
"references": [
{
"url": "https://docs.qualcomm.com/product/publicresources/securitybulletin/july-2024-bulletin.html",
"source": "product-security@qualcomm.com"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2024-20399",
"sourceIdentifier": "ykramarz@cisco.com",
"published": "2024-07-01T17:15:04.383",
"lastModified": "2024-07-01T17:15:04.383",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability in the CLI of Cisco NX-OS Software could allow an authenticated, local attacker to execute arbitrary commands as root on the underlying operating system of an affected device.\r\n\r This vulnerability is due to insufficient validation of arguments that are passed to specific configuration CLI commands. An attacker could exploit this vulnerability by including crafted input as the argument of an affected configuration CLI command. A successful exploit could allow the attacker to execute arbitrary commands on the underlying operating system with the privileges of root.\r\n\r Note: To successfully exploit this vulnerability on a Cisco NX-OS device, an attacker must have Administrator credentials."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "ykramarz@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "NONE",
"baseScore": 6.0,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 0.8,
"impactScore": 5.2
}
]
},
"weaknesses": [
{
"source": "ykramarz@cisco.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-78"
}
]
}
],
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-nxos-cmd-injection-xD9OhyOP",
"source": "ykramarz@cisco.com"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2024-21456",
"sourceIdentifier": "product-security@qualcomm.com",
"published": "2024-07-01T15:15:13.387",
"lastModified": "2024-07-01T16:37:39.040",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Information Disclosure while parsing beacon frame in STA."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "product-security@qualcomm.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"availabilityImpact": "LOW",
"baseScore": 6.5,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 3.9,
"impactScore": 2.5
}
]
},
"weaknesses": [
{
"source": "product-security@qualcomm.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-126"
}
]
}
],
"references": [
{
"url": "https://docs.qualcomm.com/product/publicresources/securitybulletin/july-2024-bulletin.html",
"source": "product-security@qualcomm.com"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2024-21457",
"sourceIdentifier": "product-security@qualcomm.com",
"published": "2024-07-01T15:15:13.620",
"lastModified": "2024-07-01T16:37:39.040",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "INformation disclosure while handling Multi-link IE in beacon frame."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "product-security@qualcomm.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"availabilityImpact": "LOW",
"baseScore": 6.5,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 3.9,
"impactScore": 2.5
}
]
},
"weaknesses": [
{
"source": "product-security@qualcomm.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-126"
}
]
}
],
"references": [
{
"url": "https://docs.qualcomm.com/product/publicresources/securitybulletin/july-2024-bulletin.html",
"source": "product-security@qualcomm.com"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2024-21458",
"sourceIdentifier": "product-security@qualcomm.com",
"published": "2024-07-01T15:15:13.847",
"lastModified": "2024-07-01T16:37:39.040",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Information disclosure while handling SA query action frame."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "product-security@qualcomm.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"availabilityImpact": "LOW",
"baseScore": 6.5,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 3.9,
"impactScore": 2.5
}
]
},
"weaknesses": [
{
"source": "product-security@qualcomm.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-126"
}
]
}
],
"references": [
{
"url": "https://docs.qualcomm.com/product/publicresources/securitybulletin/july-2024-bulletin.html",
"source": "product-security@qualcomm.com"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2024-21460",
"sourceIdentifier": "product-security@qualcomm.com",
"published": "2024-07-01T15:15:14.063",
"lastModified": "2024-07-01T16:37:39.040",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Information disclosure when ASLR relocates the IMEM and Secure DDR portions as one chunk in virtual address space."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "product-security@qualcomm.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "CHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 7.1,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.5,
"impactScore": 4.0
}
]
},
"weaknesses": [
{
"source": "product-security@qualcomm.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-330"
}
]
}
],
"references": [
{
"url": "https://docs.qualcomm.com/product/publicresources/securitybulletin/july-2024-bulletin.html",
"source": "product-security@qualcomm.com"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2024-21461",
"sourceIdentifier": "product-security@qualcomm.com",
"published": "2024-07-01T15:15:14.293",
"lastModified": "2024-07-01T16:37:39.040",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Memory corruption while performing finish HMAC operation when context is freed by keymaster."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "product-security@qualcomm.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.4,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.5,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "product-security@qualcomm.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-415"
}
]
}
],
"references": [
{
"url": "https://docs.qualcomm.com/product/publicresources/securitybulletin/july-2024-bulletin.html",
"source": "product-security@qualcomm.com"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2024-21462",
"sourceIdentifier": "product-security@qualcomm.com",
"published": "2024-07-01T15:15:14.557",
"lastModified": "2024-07-01T16:37:39.040",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Transient DOS while loading the TA ELF file."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "product-security@qualcomm.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "CHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH",
"baseScore": 7.1,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.5,
"impactScore": 4.0
}
]
},
"weaknesses": [
{
"source": "product-security@qualcomm.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-126"
}
]
}
],
"references": [
{
"url": "https://docs.qualcomm.com/product/publicresources/securitybulletin/july-2024-bulletin.html",
"source": "product-security@qualcomm.com"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2024-21465",
"sourceIdentifier": "product-security@qualcomm.com",
"published": "2024-07-01T15:15:14.797",
"lastModified": "2024-07-01T16:37:39.040",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Memory corruption while processing key blob passed by the user."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "product-security@qualcomm.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "product-security@qualcomm.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-126"
}
]
}
],
"references": [
{
"url": "https://docs.qualcomm.com/product/publicresources/securitybulletin/july-2024-bulletin.html",
"source": "product-security@qualcomm.com"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2024-21466",
"sourceIdentifier": "product-security@qualcomm.com",
"published": "2024-07-01T15:15:15.033",
"lastModified": "2024-07-01T16:37:39.040",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Information disclosure while parsing sub-IE length during new IE generation."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "product-security@qualcomm.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"availabilityImpact": "LOW",
"baseScore": 6.5,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 3.9,
"impactScore": 2.5
}
]
},
"weaknesses": [
{
"source": "product-security@qualcomm.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-191"
}
]
}
],
"references": [
{
"url": "https://docs.qualcomm.com/product/publicresources/securitybulletin/july-2024-bulletin.html",
"source": "product-security@qualcomm.com"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2024-21469",
"sourceIdentifier": "product-security@qualcomm.com",
"published": "2024-07-01T15:15:15.270",
"lastModified": "2024-07-01T16:37:39.040",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Memory corruption when an invoke call and a TEE call are bound for the same trusted application."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "product-security@qualcomm.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 7.3,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.5
}
]
},
"weaknesses": [
{
"source": "product-security@qualcomm.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-264"
}
]
}
],
"references": [
{
"url": "https://docs.qualcomm.com/product/publicresources/securitybulletin/july-2024-bulletin.html",
"source": "product-security@qualcomm.com"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2024-21482",
"sourceIdentifier": "product-security@qualcomm.com",
"published": "2024-07-01T15:15:15.497",
"lastModified": "2024-07-01T16:37:39.040",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Memory corruption during the secure boot process, when the `bootm` command is used, it bypasses the authentication of the kernel/rootfs image."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "product-security@qualcomm.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "PHYSICAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 6.8,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 0.9,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "product-security@qualcomm.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-119"
}
]
}
],
"references": [
{
"url": "https://docs.qualcomm.com/product/publicresources/securitybulletin/july-2024-bulletin.html",
"source": "product-security@qualcomm.com"
}
]
}

View File

@ -0,0 +1,100 @@
{
"id": "CVE-2024-21586",
"sourceIdentifier": "sirt@juniper.net",
"published": "2024-07-01T17:15:05.193",
"lastModified": "2024-07-01T17:15:05.193",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "An Improper Check for Unusual or Exceptional Conditions vulnerability in the Packet Forwarding Engine (PFE) of Juniper Networks Junos OS on SRX Series allows an unauthenticated, network-based attacker to cause a Denial-of-Service (DoS).\n\nIf an SRX Series device receives specific valid traffic destined to the device, it will cause the PFE to crash and restart. Continued receipt and processing of this traffic will create a sustained DoS condition.\n\nThis issue affects Junos OS on SRX Series:\n\n * 21.4 versions before 21.4R3-S7.9,\n * 22.1 versions before 22.1R3-S5.3,\n * 22.2 versions before 22.2R3-S4.11,\n * 22.3 versions before 22.3R3,\n * 22.4 versions before 22.4R3.\n\n\n\n\nJunos OS versions prior to 21.4R1 are not affected by this issue."
}
],
"metrics": {
"cvssMetricV40": [
{
"source": "sirt@juniper.net",
"type": "Secondary",
"cvssData": {
"version": "4.0",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:L/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:Y/R:A/V:X/RE:M/U:Red",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"vulnerableSystemConfidentiality": "NONE",
"vulnerableSystemIntegrity": "NONE",
"vulnerableSystemAvailability": "HIGH",
"subsequentSystemConfidentiality": "NONE",
"subsequentSystemIntegrity": "NONE",
"subsequentSystemAvailability": "LOW",
"exploitMaturity": "NOT_DEFINED",
"confidentialityRequirements": "NOT_DEFINED",
"integrityRequirements": "NOT_DEFINED",
"availabilityRequirements": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnerableSystemConfidentiality": "NOT_DEFINED",
"modifiedVulnerableSystemIntegrity": "NOT_DEFINED",
"modifiedVulnerableSystemAvailability": "NOT_DEFINED",
"modifiedSubsequentSystemConfidentiality": "NOT_DEFINED",
"modifiedSubsequentSystemIntegrity": "NOT_DEFINED",
"modifiedSubsequentSystemAvailability": "NOT_DEFINED",
"safety": "NOT_DEFINED",
"automatable": "YES",
"recovery": "AUTOMATIC",
"valueDensity": "NOT_DEFINED",
"vulnerabilityResponseEffort": "MODERATE",
"providerUrgency": "RED",
"baseScore": 8.7,
"baseSeverity": "HIGH"
}
}
],
"cvssMetricV31": [
{
"source": "sirt@juniper.net",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "sirt@juniper.net",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-754"
}
]
}
],
"references": [
{
"url": "https://supportportal.juniper.net/JSA83195",
"source": "sirt@juniper.net"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2024-23368",
"sourceIdentifier": "product-security@qualcomm.com",
"published": "2024-07-01T15:15:15.730",
"lastModified": "2024-07-01T16:37:39.040",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Memory corruption when allocating and accessing an entry in an SMEM partition."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "product-security@qualcomm.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "product-security@qualcomm.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-120"
}
]
}
],
"references": [
{
"url": "https://docs.qualcomm.com/product/publicresources/securitybulletin/july-2024-bulletin.html",
"source": "product-security@qualcomm.com"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2024-23372",
"sourceIdentifier": "product-security@qualcomm.com",
"published": "2024-07-01T15:15:16.000",
"lastModified": "2024-07-01T16:37:39.040",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Memory corruption while invoking IOCTL call for GPU memory allocation and size param is greater than expected size."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "product-security@qualcomm.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.4,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.5,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "product-security@qualcomm.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-190"
}
]
}
],
"references": [
{
"url": "https://docs.qualcomm.com/product/publicresources/securitybulletin/july-2024-bulletin.html",
"source": "product-security@qualcomm.com"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2024-23373",
"sourceIdentifier": "product-security@qualcomm.com",
"published": "2024-07-01T15:15:16.290",
"lastModified": "2024-07-01T16:37:39.040",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Memory corruption when IOMMU unmap operation fails, the DMA and anon buffers are getting released."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "product-security@qualcomm.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.4,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.5,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "product-security@qualcomm.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-416"
}
]
}
],
"references": [
{
"url": "https://docs.qualcomm.com/product/publicresources/securitybulletin/july-2024-bulletin.html",
"source": "product-security@qualcomm.com"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2024-23380",
"sourceIdentifier": "product-security@qualcomm.com",
"published": "2024-07-01T15:15:16.547",
"lastModified": "2024-07-01T16:37:39.040",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Memory corruption while handling user packets during VBO bind operation."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "product-security@qualcomm.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.4,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.5,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "product-security@qualcomm.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-416"
}
]
}
],
"references": [
{
"url": "https://docs.qualcomm.com/product/publicresources/securitybulletin/july-2024-bulletin.html",
"source": "product-security@qualcomm.com"
}
]
}

View File

@ -0,0 +1,64 @@
{
"id": "CVE-2024-24749",
"sourceIdentifier": "security-advisories@github.com",
"published": "2024-07-01T14:15:05.350",
"lastModified": "2024-07-01T16:37:39.040",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "GeoServer is an open source server that allows users to share and edit geospatial data. Prior to versions 2.23.5 and 2.24.3, if GeoServer is deployed in the Windows operating system using an Apache Tomcat web application server, it is possible to bypass existing input validation in the GeoWebCache ByteStreamController class and read arbitrary classpath resources with specific file name extensions. If GeoServer is also deployed as a web archive using the data directory embedded in the `geoserver.war` file (rather than an external data directory), it will likely be possible to read specific resources to gain administrator privileges. However, it is very unlikely that production environments will be using the embedded data directory since, depending on how GeoServer is deployed, it will be erased and re-installed (which would also reset to the default password) either every time the server restarts or every time a new GeoServer WAR is installed and is therefore difficult to maintain. An external data directory will always be used if GeoServer is running in standalone mode (via an installer or a binary). Versions 2.23.5 and 2.24.3 contain a patch for the issue. Some workarounds are available. One may change from a Windows environment to a Linux environment; or change from Apache Tomcat to Jetty application server. One may also disable anonymous access to the embeded GeoWebCache administration and status pages."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security-advisories@github.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 7.5,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "security-advisories@github.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-22"
}
]
}
],
"references": [
{
"url": "https://github.com/GeoWebCache/geowebcache/commit/c7f76bd8a1d67c3b986146e7a5e0b14dd64a8fef",
"source": "security-advisories@github.com"
},
{
"url": "https://github.com/GeoWebCache/geowebcache/pull/1211",
"source": "security-advisories@github.com"
},
{
"url": "https://github.com/geoserver/geoserver/security/advisories/GHSA-jhqx-5v5g-mpf3",
"source": "security-advisories@github.com"
}
]
}

View File

@ -2,12 +2,13 @@
"id": "CVE-2024-2796",
"sourceIdentifier": "security@puppet.com",
"published": "2024-04-18T15:15:29.857",
"lastModified": "2024-04-18T18:25:55.267",
"lastModified": "2024-07-01T15:15:16.793",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A server-side request forgery (SSRF) was discovered in the Akana Community Manager Developer Portal in versions prior to and including 2022.1.3. Reported by Jakob Antonsson.\n\n"
"value": "A server-side request forgery (SSRF) was discovered in the Akana Community Manager Developer Portal in versions prior to and including 2022.1.3. Reported by Jakob Antonsson."
},
{
"lang": "es",

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2024-34696",
"sourceIdentifier": "security-advisories@github.com",
"published": "2024-07-01T15:15:16.907",
"lastModified": "2024-07-01T16:37:39.040",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "GeoServer is an open source server that allows users to share and edit geospatial data. Starting in version 2.10.0 and prior to versions 2.24.4 and 2.25.1, GeoServer's Server Status page and REST API lists all environment variables and Java properties to any GeoServer user with administrative rights as part of those modules' status message. These variables/properties can also contain sensitive information, such as database passwords or API keys/tokens. Additionally, many community-developed GeoServer container images `export` other credentials from their start-up scripts as environment variables to the GeoServer (`java`) process. The precise scope of the issue depends on which container image is used and how it is configured.\n\nThe `about status` API endpoint which powers the Server Status page is only available to administrators.Depending on the operating environment, administrators might have legitimate access to credentials in other ways, but this issue defeats more sophisticated controls (like break-glass access to secrets or role accounts).By default, GeoServer only allows same-origin authenticated API access. This limits the scope for a third-party attacker to use an administrator\u2019s credentials to gain access to credentials. The researchers who found the vulnerability were unable to determine any other conditions under which the GeoServer REST API may be available more broadly.\n\nUsers should update container images to use GeoServer 2.24.4 or 2.25.1 to get the bug fix. As a workaround, leave environment variables and Java system properties hidden by default. Those who provide the option to re-enable it should communicate the impact and risks so that users can make an informed choice."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security-advisories@github.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:H/I:N/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.5,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 0.9,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "security-advisories@github.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-200"
}
]
}
],
"references": [
{
"url": "https://github.com/geoserver/geoserver/security/advisories/GHSA-j59v-vgcr-hxvf",
"source": "security-advisories@github.com"
}
]
}

View File

@ -0,0 +1,33 @@
{
"id": "CVE-2024-36387",
"sourceIdentifier": "security@apache.org",
"published": "2024-07-01T19:15:03.497",
"lastModified": "2024-07-01T19:15:03.497",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Serving WebSocket protocol upgrades over a HTTP/2 connection could result in a Null Pointer dereference, leading to a crash of the server process, degrading performance."
}
],
"metrics": {},
"weaknesses": [
{
"source": "security@apache.org",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-476"
}
]
}
],
"references": [
{
"url": "https://httpd.apache.org/security/vulnerabilities_24.html",
"source": "security@apache.org"
}
]
}

View File

@ -0,0 +1,72 @@
{
"id": "CVE-2024-36401",
"sourceIdentifier": "security-advisories@github.com",
"published": "2024-07-01T16:15:04.120",
"lastModified": "2024-07-01T16:37:39.040",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "GeoServer is an open source server that allows users to share and edit geospatial data. Prior to versions 2.23.6, 2.24.4, and 2.25.2, multiple OGC request parameters allow Remote Code Execution (RCE) by unauthenticated users through specially crafted input against a default GeoServer installation due to unsafely evaluating property names as XPath expressions.\n\nThe GeoTools library API that GeoServer calls evaluates property/attribute names for feature types in a way that unsafely passes them to the commons-jxpath library which can execute arbitrary code when evaluating XPath expressions. This XPath evaluation is intended to be used only by complex feature types (i.e., Application Schema data stores) but is incorrectly being applied to simple feature types as well which makes this vulnerability apply to **ALL** GeoServer instances. No public PoC is provided but this vulnerability has been confirmed to be exploitable through WFS GetFeature, WFS GetPropertyValue, WMS GetMap, WMS GetFeatureInfo, WMS GetLegendGraphic and WPS Execute requests. This vulnerability can lead to executing arbitrary code.\n\nVersions 2.23.6, 2.24.4, and 2.25.2 contain a patch for the issue. A workaround exists by removing the `gt-complex-x.y.jar` file from the GeoServer where `x.y` is the GeoTools version (e.g., `gt-complex-31.1.jar` if running GeoServer 2.25.1). This will remove the vulnerable code from GeoServer but may break some GeoServer functionality or prevent GeoServer from deploying if the gt-complex module is needed."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security-advisories@github.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "security-advisories@github.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-95"
}
]
}
],
"references": [
{
"url": "https://github.com/Warxim/CVE-2022-41852?tab=readme-ov-file#workaround-for-cve-2022-41852",
"source": "security-advisories@github.com"
},
{
"url": "https://github.com/geoserver/geoserver/security/advisories/GHSA-6jj6-gm7p-fcvv",
"source": "security-advisories@github.com"
},
{
"url": "https://github.com/geotools/geotools/pull/4797",
"source": "security-advisories@github.com"
},
{
"url": "https://github.com/geotools/geotools/security/advisories/GHSA-w3pj-wh35-fq8w",
"source": "security-advisories@github.com"
},
{
"url": "https://osgeo-org.atlassian.net/browse/GEOT-7587",
"source": "security-advisories@github.com"
}
]
}

View File

@ -0,0 +1,60 @@
{
"id": "CVE-2024-36420",
"sourceIdentifier": "security-advisories@github.com",
"published": "2024-07-01T16:15:04.377",
"lastModified": "2024-07-01T16:37:39.040",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Flowise is a drag & drop user interface to build a customized large language model flow. In version 1.4.3 of Flowise, the `/api/v1/openai-assistants-file` endpoint in `index.ts` is vulnerable to arbitrary file read due to lack of sanitization of the `fileName` body parameter. No known patches for this issue are available."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security-advisories@github.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 7.5,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "security-advisories@github.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-74"
}
]
}
],
"references": [
{
"url": "https://github.com/FlowiseAI/Flowise/blob/e93ce07851cdc0fcde12374f301b8070f2043687/packages/server/src/index.ts#L982",
"source": "security-advisories@github.com"
},
{
"url": "https://securitylab.github.com/advisories/GHSL-2023-232_GHSL-2023-234_Flowise/",
"source": "security-advisories@github.com"
}
]
}

View File

@ -0,0 +1,60 @@
{
"id": "CVE-2024-36421",
"sourceIdentifier": "security-advisories@github.com",
"published": "2024-07-01T16:15:04.623",
"lastModified": "2024-07-01T16:37:39.040",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Flowise is a drag & drop user interface to build a customized large language model flow. In version 1.4.3 of Flowise, A CORS misconfiguration sets the Access-Control-Allow-Origin header to all, allowing arbitrary origins to connect to the website. In the default configuration (unauthenticated), arbitrary origins may be able to make requests to Flowise, stealing information from the user. This CORS misconfiguration may be chained with the path injection to allow an attacker attackers without access to Flowise to read arbitrary files from the Flowise server. As of time of publication, no known patches are available."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security-advisories@github.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 7.5,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "security-advisories@github.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-346"
}
]
}
],
"references": [
{
"url": "https://github.com/FlowiseAI/Flowise/blob/e93ce07851cdc0fcde12374f301b8070f2043687/packages/server/src/index.ts#L122",
"source": "security-advisories@github.com"
},
{
"url": "https://securitylab.github.com/advisories/GHSL-2023-232_GHSL-2023-234_Flowise/",
"source": "security-advisories@github.com"
}
]
}

View File

@ -0,0 +1,60 @@
{
"id": "CVE-2024-36422",
"sourceIdentifier": "security-advisories@github.com",
"published": "2024-07-01T16:15:04.860",
"lastModified": "2024-07-01T16:37:39.040",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Flowise is a drag & drop user interface to build a customized large language model flow. In version 1.4.3 of Flowise, a reflected cross-site scripting vulnerability occurs in the `api/v1/chatflows/id` endpoint. If the default configuration is used (unauthenticated), an attacker may be able to craft a specially crafted URL that injects Javascript into the user sessions, allowing the attacker to steal information, create false popups, or even redirect the user to other websites without interaction. If the chatflow ID is not found, its value is reflected in the 404 page, which has type text/html. This allows an attacker to attach arbitrary scripts to the page, allowing an attacker to steal sensitive information. This XSS may be chained with the path injection to allow an attacker without direct access to Flowise to read arbitrary files from the Flowise server. As of time of publication, no known patches are available."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security-advisories@github.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 6.1,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 2.7
}
]
},
"weaknesses": [
{
"source": "security-advisories@github.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"references": [
{
"url": "https://github.com/FlowiseAI/Flowise/blob/flowise-ui%401.4.0/packages/server/src/index.ts#L312-L312",
"source": "security-advisories@github.com"
},
{
"url": "https://securitylab.github.com/advisories/GHSL-2023-232_GHSL-2023-234_Flowise/",
"source": "security-advisories@github.com"
}
]
}

View File

@ -0,0 +1,60 @@
{
"id": "CVE-2024-36423",
"sourceIdentifier": "security-advisories@github.com",
"published": "2024-07-01T19:15:03.627",
"lastModified": "2024-07-01T19:15:03.627",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Flowise is a drag & drop user interface to build a customized large language model flow. In version 1.4.3 of Flowise, a reflected cross-site scripting vulnerability occurs in the `/api/v1/public-chatflows/id` endpoint. If the default configuration is used (unauthenticated), an attacker may be able to craft a specially crafted URL that injects Javascript into the user sessions, allowing the attacker to steal information, create false popups, or even redirect the user to other websites without interaction. If the chatflow ID is not found, its value is reflected in the 404 page, which has type text/html. This allows an attacker to attach arbitrary scripts to the page, allowing an attacker to steal sensitive information. This XSS may be chained with the path injection to allow an attacker without direct access to Flowise to read arbitrary files from the Flowise server. As of time of publication, no known patches are available."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security-advisories@github.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 6.1,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 2.7
}
]
},
"weaknesses": [
{
"source": "security-advisories@github.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"references": [
{
"url": "https://github.com/FlowiseAI/Flowise/blob/flowise-ui%401.4.0/packages/server/src/index.ts#L322-L322",
"source": "security-advisories@github.com"
},
{
"url": "https://securitylab.github.com/advisories/GHSL-2023-232_GHSL-2023-234_Flowise/",
"source": "security-advisories@github.com"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2024-36982",
"sourceIdentifier": "prodsec@splunk.com",
"published": "2024-07-01T17:15:06.030",
"lastModified": "2024-07-01T17:15:06.030",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "In Splunk Enterprise versions below 9.2.2, 9.1.5, and 9.0.10 and Splunk Cloud Platform versions below 9.1.2312.109 and 9.1.2308.207, an attacker could trigger a null pointer reference on the cluster/config REST endpoint, which could result in a crash of the Splunk daemon."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "prodsec@splunk.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "prodsec@splunk.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-476"
}
]
}
],
"references": [
{
"url": "https://advisory.splunk.com/advisories/SVD-2024-0702",
"source": "prodsec@splunk.com"
}
]
}

View File

@ -0,0 +1,60 @@
{
"id": "CVE-2024-36983",
"sourceIdentifier": "prodsec@splunk.com",
"published": "2024-07-01T17:15:06.257",
"lastModified": "2024-07-01T17:15:06.257",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "In Splunk Enterprise versions below 9.2.2, 9.1.5, and 9.0.10 and Splunk Cloud Platform versions below 9.1.2312.109 and 9.1.2308.207, an authenticated user could create an external lookup that calls a legacy internal function. The authenticated user could use this internal function to insert code into the Splunk platform installation directory. From there, the user could execute arbitrary code on the Splunk platform Instance."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "prodsec@splunk.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.0,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.1,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "prodsec@splunk.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-77"
}
]
}
],
"references": [
{
"url": "https://advisory.splunk.com/advisories/SVD-2024-0703",
"source": "prodsec@splunk.com"
},
{
"url": "https://research.splunk.com/application/1cf58ae1-9177-40b8-a26c-8966040f11ae/",
"source": "prodsec@splunk.com"
}
]
}

View File

@ -0,0 +1,60 @@
{
"id": "CVE-2024-36984",
"sourceIdentifier": "prodsec@splunk.com",
"published": "2024-07-01T17:15:06.480",
"lastModified": "2024-07-01T17:15:06.480",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "In Splunk Enterprise versions below 9.2.2, 9.1.5, and 9.0.10 on Windows, an authenticated user could execute a specially crafted query that they could then use to serialize untrusted data. The attacker could use the query to execute arbitrary code."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "prodsec@splunk.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "prodsec@splunk.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-502"
}
]
}
],
"references": [
{
"url": "https://advisory.splunk.com/advisories/SVD-2024-0704",
"source": "prodsec@splunk.com"
},
{
"url": "https://research.splunk.com/application/1cf58ae1-9177-40b8-a26c-8966040f11ae/",
"source": "prodsec@splunk.com"
}
]
}

View File

@ -0,0 +1,60 @@
{
"id": "CVE-2024-36985",
"sourceIdentifier": "prodsec@splunk.com",
"published": "2024-07-01T17:15:06.703",
"lastModified": "2024-07-01T17:15:06.703",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "In Splunk Enterprise versions below 9.2.2, 9.1.5, and 9.0.10, a low-privileged user that does not hold the admin or power Splunk roles could cause a Remote Code Execution through an external lookup that references the \u201csplunk_archiver\u201c application."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "prodsec@splunk.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "prodsec@splunk.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-687"
}
]
}
],
"references": [
{
"url": "https://advisory.splunk.com/advisories/SVD-2024-0705",
"source": "prodsec@splunk.com"
},
{
"url": "https://research.splunk.com/application/8598f9de-bba8-42a4-8ef0-12e1adda4131",
"source": "prodsec@splunk.com"
}
]
}

View File

@ -0,0 +1,60 @@
{
"id": "CVE-2024-36986",
"sourceIdentifier": "prodsec@splunk.com",
"published": "2024-07-01T17:15:06.910",
"lastModified": "2024-07-01T17:15:06.910",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "In Splunk Enterprise versions below 9.2.2, 9.1.5, and 9.0.10 and Splunk Cloud Platform versions below 9.1.2312.200 and 9.1.2308.207, an authenticated user could run risky commands using the permissions of a higher-privileged user to bypass SPL safeguards for risky commands in the Analytics Workspace. The vulnerability requires the authenticated user to phish the victim by tricking them into initiating a request within their browser. The authenticated user should not be able to exploit the vulnerability at will."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "prodsec@splunk.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 6.3,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.1,
"impactScore": 4.2
}
]
},
"weaknesses": [
{
"source": "prodsec@splunk.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-200"
}
]
}
],
"references": [
{
"url": "https://advisory.splunk.com/advisories/SVD-2024-0706",
"source": "prodsec@splunk.com"
},
{
"url": "https://research.splunk.com/application/1cf58ae1-9177-40b8-a26c-8966040f11ae/",
"source": "prodsec@splunk.com"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2024-36987",
"sourceIdentifier": "prodsec@splunk.com",
"published": "2024-07-01T17:15:07.120",
"lastModified": "2024-07-01T17:15:07.120",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "In Splunk Enterprise versions below 9.2.2, 9.1.5, and 9.0.10 and Splunk Cloud Platform versions below 9.1.2312.200, an authenticated, low-privileged user who does not hold the admin or power Splunk roles could upload a file with an arbitrary extension using the indexing/preview REST endpoint."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "prodsec@splunk.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 1.4
}
]
},
"weaknesses": [
{
"source": "prodsec@splunk.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-434"
}
]
}
],
"references": [
{
"url": "https://advisory.splunk.com/advisories/SVD-2024-0707",
"source": "prodsec@splunk.com"
}
]
}

View File

@ -0,0 +1,60 @@
{
"id": "CVE-2024-36989",
"sourceIdentifier": "prodsec@splunk.com",
"published": "2024-07-01T17:15:07.380",
"lastModified": "2024-07-01T17:15:07.380",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "In Splunk Enterprise versions below 9.2.2, 9.1.5, and 9.0.10 and Splunk Cloud Platform versions below 9.1.2312.200, a low-privileged user that does not hold the admin or power Splunk roles could create notifications in Splunk Web Bulletin Messages that all users on the instance receive."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "prodsec@splunk.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "HIGH",
"availabilityImpact": "NONE",
"baseScore": 7.1,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 4.2
}
]
},
"weaknesses": [
{
"source": "prodsec@splunk.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-284"
}
]
}
],
"references": [
{
"url": "https://advisory.splunk.com/advisories/SVD-2024-0709",
"source": "prodsec@splunk.com"
},
{
"url": "https://research.splunk.com/application/4b7f368f-4322-47f8-8363-2c466f0b7030",
"source": "prodsec@splunk.com"
}
]
}

View File

@ -0,0 +1,60 @@
{
"id": "CVE-2024-36990",
"sourceIdentifier": "prodsec@splunk.com",
"published": "2024-07-01T17:15:07.600",
"lastModified": "2024-07-01T17:15:07.600",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "In Splunk Enterprise versions below 9.2.2, 9.1.5, and 9.0.10 and Splunk Cloud Platform versions below 9.2.2403.100, an authenticated, low-privileged user that does not hold the admin or power Splunk roles could send a specially crafted HTTP POST request to the datamodel/web REST endpoint in Splunk Enterprise, potentially causing a denial of service."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "prodsec@splunk.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH",
"baseScore": 6.5,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "prodsec@splunk.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-835"
}
]
}
],
"references": [
{
"url": "https://advisory.splunk.com/advisories/SVD-2024-0710",
"source": "prodsec@splunk.com"
},
{
"url": "https://research.splunk.com/application/45766810-dbb2-44d4-b889-b4ba3ee0d1f5",
"source": "prodsec@splunk.com"
}
]
}

View File

@ -0,0 +1,60 @@
{
"id": "CVE-2024-36991",
"sourceIdentifier": "prodsec@splunk.com",
"published": "2024-07-01T17:15:07.860",
"lastModified": "2024-07-01T17:15:07.860",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "In Splunk Enterprise on Windows versions below 9.2.2, 9.1.5, and 9.0.10, an attacker could perform a path traversal on the /modules/messaging/ endpoint in Splunk Enterprise on Windows. This vulnerability should only affect Splunk Enterprise on Windows."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "prodsec@splunk.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 7.5,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "prodsec@splunk.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-35"
}
]
}
],
"references": [
{
"url": "https://advisory.splunk.com/advisories/SVD-2024-0711",
"source": "prodsec@splunk.com"
},
{
"url": "https://research.splunk.com/application/e7c2b064-524e-4d65-8002-efce808567aa",
"source": "prodsec@splunk.com"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2024-36992",
"sourceIdentifier": "prodsec@splunk.com",
"published": "2024-07-01T17:15:08.077",
"lastModified": "2024-07-01T17:15:08.077",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "In Splunk Enterprise versions below 9.2.2, 9.1.5, and 9.0.10 and Splunk Cloud Platform versions below 9.1.2312.200 and 9.1.2308.207, a low-privileged user that does not hold the admin or power Splunk roles could craft a malicious payload through a View that could result in execution of unauthorized JavaScript code in the browser of a user. The \u201curl\u201d parameter of the Dashboard element does not have proper input validation to reject invalid URLs, which could lead to a Persistent Cross-site Scripting (XSS) exploit."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "prodsec@splunk.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 5.4,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.3,
"impactScore": 2.7
}
]
},
"weaknesses": [
{
"source": "prodsec@splunk.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"references": [
{
"url": "https://advisory.splunk.com/advisories/SVD-2024-0712",
"source": "prodsec@splunk.com"
}
]
}

View File

@ -0,0 +1,60 @@
{
"id": "CVE-2024-36993",
"sourceIdentifier": "prodsec@splunk.com",
"published": "2024-07-01T17:15:08.290",
"lastModified": "2024-07-01T17:15:08.290",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "In Splunk Enterprise versions below 9.2.2, 9.1.5, and 9.0.10 and Splunk Cloud Platform versions below 9.1.2312.200 and 9.1.2308.207, a low-privileged user that does not hold the admin or power Splunk roles could craft a malicious payload through a Splunk Web Bulletin Messages that could result in execution of unauthorized JavaScript code in the browser of a user."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "prodsec@splunk.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 5.4,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.3,
"impactScore": 2.7
}
]
},
"weaknesses": [
{
"source": "prodsec@splunk.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"references": [
{
"url": "https://advisory.splunk.com/advisories/SVD-2024-0713",
"source": "prodsec@splunk.com"
},
{
"url": "https://research.splunk.com/application/fd852b27-1882-4505-9f2c-64dfb96f4fc1",
"source": "prodsec@splunk.com"
}
]
}

View File

@ -0,0 +1,60 @@
{
"id": "CVE-2024-36994",
"sourceIdentifier": "prodsec@splunk.com",
"published": "2024-07-01T17:15:08.500",
"lastModified": "2024-07-01T17:15:08.500",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "In Splunk Enterprise versions below 9.2.2, 9.1.5, and 9.0.10 and Splunk Cloud Platform versions below 9.1.2312.200 and 9.1.2308.207, a low-privileged user that does not hold the admin or power Splunk roles could craft a malicious payload through a View and Splunk Web Bulletin Messages that could result in execution of unauthorized JavaScript code in the browser of a user."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "prodsec@splunk.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 5.4,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.3,
"impactScore": 2.7
}
]
},
"weaknesses": [
{
"source": "prodsec@splunk.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"references": [
{
"url": "https://advisory.splunk.com/advisories/SVD-2024-0714",
"source": "prodsec@splunk.com"
},
{
"url": "https://research.splunk.com/application/b0a67520-ae82-4cf6-b04e-9f6cce56830d",
"source": "prodsec@splunk.com"
}
]
}

View File

@ -0,0 +1,60 @@
{
"id": "CVE-2024-36995",
"sourceIdentifier": "prodsec@splunk.com",
"published": "2024-07-01T17:15:08.707",
"lastModified": "2024-07-01T17:15:08.707",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "In Splunk Enterprise versions below 9.2.2, 9.1.5, and 9.0.10 and Splunk Cloud Platform versions below 9.1.2312.200 and 9.1.2308.207, a low-privileged user that does not hold the admin or power Splunk roles could create experimental items."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "prodsec@splunk.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 5.4,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.3,
"impactScore": 2.7
}
]
},
"weaknesses": [
{
"source": "prodsec@splunk.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-862"
}
]
}
],
"references": [
{
"url": "https://advisory.splunk.com/advisories/SVD-2024-0715",
"source": "prodsec@splunk.com"
},
{
"url": "https://research.splunk.com/application/84afda04-0cd6-466b-869e-70d6407d0a34",
"source": "prodsec@splunk.com"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2024-36996",
"sourceIdentifier": "prodsec@splunk.com",
"published": "2024-07-01T17:15:08.917",
"lastModified": "2024-07-01T17:15:08.917",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "In Splunk Enterprise versions below 9.2.2, 9.1.5, and 9.0.10 and Splunk Cloud Platform versions below 9.1.2312.109, an attacker could determine whether or not another user exists on the instance by deciphering the error response that they would likely receive from the instance when they attempt to log in. This disclosure could then lead to additional brute-force password-guessing attacks. This vulnerability would require that the Splunk platform instance uses the Security Assertion Markup Language (SAML) authentication scheme."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "prodsec@splunk.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5.3,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 3.9,
"impactScore": 1.4
}
]
},
"weaknesses": [
{
"source": "prodsec@splunk.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-204"
}
]
}
],
"references": [
{
"url": "https://advisory.splunk.com/advisories/SVD-2024-0716",
"source": "prodsec@splunk.com"
}
]
}

View File

@ -0,0 +1,60 @@
{
"id": "CVE-2024-36997",
"sourceIdentifier": "prodsec@splunk.com",
"published": "2024-07-01T17:15:09.143",
"lastModified": "2024-07-01T17:15:09.143",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "In Splunk Enterprise versions below 9.2.2, 9.1.5, and 9.0.10 and Splunk Cloud Platform versions below 9.1.2312, an admin user could store and execute arbitrary JavaScript code in the browser context of another Splunk user through the conf-web/settings REST endpoint. This could potentially cause a persistent cross-site scripting (XSS) exploit."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "prodsec@splunk.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:H/I:H/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "NONE",
"baseScore": 8.1,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 1.7,
"impactScore": 5.8
}
]
},
"weaknesses": [
{
"source": "prodsec@splunk.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"references": [
{
"url": "https://advisory.splunk.com/advisories/SVD-2024-0717",
"source": "prodsec@splunk.com"
},
{
"url": "https://research.splunk.com/application/ed1209ef-228d-4dab-9856-be9369925a5c",
"source": "prodsec@splunk.com"
}
]
}

View File

@ -2,8 +2,9 @@
"id": "CVE-2024-3661",
"sourceIdentifier": "9119a7d8-5eab-497f-8521-727c672e3725",
"published": "2024-05-06T19:15:11.027",
"lastModified": "2024-05-08T22:15:49.103",
"lastModified": "2024-07-01T15:15:17.187",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
@ -59,6 +60,10 @@
"url": "https://arstechnica.com/security/2024/05/novel-attack-against-virtually-all-vpn-apps-neuters-their-entire-purpose/",
"source": "9119a7d8-5eab-497f-8521-727c672e3725"
},
{
"url": "https://bst.cisco.com/quickview/bug/CSCwk05814",
"source": "9119a7d8-5eab-497f-8521-727c672e3725"
},
{
"url": "https://datatracker.ietf.org/doc/html/rfc2131#section-7",
"source": "9119a7d8-5eab-497f-8521-727c672e3725"
@ -67,6 +72,10 @@
"url": "https://datatracker.ietf.org/doc/html/rfc3442#section-7",
"source": "9119a7d8-5eab-497f-8521-727c672e3725"
},
{
"url": "https://fortiguard.fortinet.com/psirt/FG-IR-24-170",
"source": "9119a7d8-5eab-497f-8521-727c672e3725"
},
{
"url": "https://issuetracker.google.com/issues/263721377",
"source": "9119a7d8-5eab-497f-8521-727c672e3725"
@ -83,6 +92,10 @@
"url": "https://mullvad.net/en/blog/evaluating-the-impact-of-tunnelvision",
"source": "9119a7d8-5eab-497f-8521-727c672e3725"
},
{
"url": "https://my.f5.com/manage/s/article/K000139553",
"source": "9119a7d8-5eab-497f-8521-727c672e3725"
},
{
"url": "https://news.ycombinator.com/item?id=40279632",
"source": "9119a7d8-5eab-497f-8521-727c672e3725"
@ -91,6 +104,14 @@
"url": "https://news.ycombinator.com/item?id=40284111",
"source": "9119a7d8-5eab-497f-8521-727c672e3725"
},
{
"url": "https://security.paloaltonetworks.com/CVE-2024-3661",
"source": "9119a7d8-5eab-497f-8521-727c672e3725"
},
{
"url": "https://support.citrix.com/article/CTX677069/cloud-software-group-security-advisory-for-cve20243661",
"source": "9119a7d8-5eab-497f-8521-727c672e3725"
},
{
"url": "https://tunnelvisionbug.com/",
"source": "9119a7d8-5eab-497f-8521-727c672e3725"
@ -107,6 +128,10 @@
"url": "https://www.theregister.com/2024/05/07/vpn_tunnelvision_dhcp/",
"source": "9119a7d8-5eab-497f-8521-727c672e3725"
},
{
"url": "https://www.watchguard.com/wgrd-psirt/advisory/wgsa-2024-00009",
"source": "9119a7d8-5eab-497f-8521-727c672e3725"
},
{
"url": "https://www.zscaler.com/blogs/security-research/cve-2024-3661-k-tunnelvision-exposes-vpn-bypass-vulnerability",
"source": "9119a7d8-5eab-497f-8521-727c672e3725"

View File

@ -0,0 +1,60 @@
{
"id": "CVE-2024-37145",
"sourceIdentifier": "security-advisories@github.com",
"published": "2024-07-01T19:15:03.853",
"lastModified": "2024-07-01T19:15:03.853",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Flowise is a drag & drop user interface to build a customized large language model flow. In version 1.4.3 of Flowise, a reflected cross-site scripting vulnerability occurs in the `/api/v1/chatflows-streaming/id` endpoint. If the default configuration is used (unauthenticated), an attacker may be able to craft a specially crafted URL that injects Javascript into the user sessions, allowing the attacker to steal information, create false popups, or even redirect the user to other websites without interaction. If the chatflow ID is not found, its value is reflected in the 404 page, which has type text/html. This allows an attacker to attach arbitrary scripts to the page, allowing an attacker to steal sensitive information. This XSS may be chained with the path injection to allow an attacker without direct access to Flowise to read arbitrary files from the Flowise server. As of time of publication, no known patches are available."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security-advisories@github.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 6.1,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 2.7
}
]
},
"weaknesses": [
{
"source": "security-advisories@github.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"references": [
{
"url": "https://github.com/FlowiseAI/Flowise/blob/flowise-ui%401.4.0/packages/server/src/index.ts#L375-L375",
"source": "security-advisories@github.com"
},
{
"url": "https://securitylab.github.com/advisories/GHSL-2023-232_GHSL-2023-234_Flowise/",
"source": "security-advisories@github.com"
}
]
}

View File

@ -0,0 +1,60 @@
{
"id": "CVE-2024-37146",
"sourceIdentifier": "security-advisories@github.com",
"published": "2024-07-01T19:15:04.070",
"lastModified": "2024-07-01T19:15:04.070",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Flowise is a drag & drop user interface to build a customized large language model flow. In version 1.4.3 of Flowise, a reflected cross-site scripting vulnerability occurs in the `/api/v1/credentials/id` endpoint. If the default configuration is used (unauthenticated), an attacker may be able to craft a specially crafted URL that injects Javascript into the user sessions, allowing the attacker to steal information, create false popups, or even redirect the user to other websites without interaction. If the chatflow ID is not found, its value is reflected in the 404 page, which has type text/html. This allows an attacker to attach arbitrary scripts to the page, allowing an attacker to steal sensitive information. This XSS may be chained with the path injection to allow an attacker without direct access to Flowise to read arbitrary files from the Flowise server. As of time of publication, no known patches are available."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security-advisories@github.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 6.1,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 2.7
}
]
},
"weaknesses": [
{
"source": "security-advisories@github.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"references": [
{
"url": "https://github.com/FlowiseAI/Flowise/blob/flowise-ui%401.4.0/packages/server/src/index.ts#L545-L545",
"source": "security-advisories@github.com"
},
{
"url": "https://securitylab.github.com/advisories/GHSL-2023-232_GHSL-2023-234_Flowise/",
"source": "security-advisories@github.com"
}
]
}

View File

@ -0,0 +1,64 @@
{
"id": "CVE-2024-37298",
"sourceIdentifier": "security-advisories@github.com",
"published": "2024-07-01T19:15:04.283",
"lastModified": "2024-07-01T19:15:04.283",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "gorilla/schema converts structs to and from form values. Prior to version 1.4.1 Running `schema.Decoder.Decode()` on a struct that has a field of type `[]struct{...}` opens it up to malicious attacks regarding memory allocations, taking advantage of the sparse slice functionality. Any use of `schema.Decoder.Decode()` on a struct with arrays of other structs could be vulnerable to this memory exhaustion vulnerability. Version 1.4.1 contains a patch for the issue."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security-advisories@github.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "security-advisories@github.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-770"
}
]
}
],
"references": [
{
"url": "https://github.com/gorilla/schema/blob/main/decoder.go#L223",
"source": "security-advisories@github.com"
},
{
"url": "https://github.com/gorilla/schema/commit/cd59f2f12cbdfa9c06aa63e425d1fe4a806967ff",
"source": "security-advisories@github.com"
},
{
"url": "https://github.com/gorilla/schema/security/advisories/GHSA-3669-72x9-r9p3",
"source": "security-advisories@github.com"
}
]
}

View File

@ -0,0 +1,33 @@
{
"id": "CVE-2024-38472",
"sourceIdentifier": "security@apache.org",
"published": "2024-07-01T19:15:04.563",
"lastModified": "2024-07-01T19:15:04.563",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "SSRF in Apache HTTP Server on Windows allows to potentially leak NTML hashes to a malicious server via SSRF and\u00a0malicious requests or content \nUsers are recommended to upgrade to version 2.4.60 which fixes this issue.\u00a0 Note: Existing configurations that access UNC paths will have to configure new directive \"UNCList\" to allow access during request processing."
}
],
"metrics": {},
"weaknesses": [
{
"source": "security@apache.org",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-918"
}
]
}
],
"references": [
{
"url": "https://httpd.apache.org/security/vulnerabilities_24.html",
"source": "security@apache.org"
}
]
}

View File

@ -0,0 +1,33 @@
{
"id": "CVE-2024-38473",
"sourceIdentifier": "security@apache.org",
"published": "2024-07-01T19:15:04.657",
"lastModified": "2024-07-01T19:15:04.657",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Encoding problem in mod_proxy in Apache HTTP Server 2.4.59 and earlier allows request URLs with incorrect encoding to be sent to backend services, potentially bypassing authentication via crafted requests.\nUsers are recommended to upgrade to version 2.4.60, which fixes this issue."
}
],
"metrics": {},
"weaknesses": [
{
"source": "security@apache.org",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-116"
}
]
}
],
"references": [
{
"url": "https://httpd.apache.org/security/vulnerabilities_24.html",
"source": "security@apache.org"
}
]
}

View File

@ -0,0 +1,33 @@
{
"id": "CVE-2024-38474",
"sourceIdentifier": "security@apache.org",
"published": "2024-07-01T19:15:04.760",
"lastModified": "2024-07-01T19:15:04.760",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Substitution encoding issue in mod_rewrite in Apache HTTP Server 2.4.59 and earlier allows attacker to execute scripts in\ndirectories permitted by the configuration but not directly reachable by any\u00a0URL or source disclosure of scripts meant to only to be executed as CGI.\n\nUsers are recommended to upgrade to version 2.4.60, which fixes this issue.\n\nSome RewriteRules that capture and substitute unsafely will now fail unless rewrite flag \"UnsafeAllow3F\" is specified."
}
],
"metrics": {},
"weaknesses": [
{
"source": "security@apache.org",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-116"
}
]
}
],
"references": [
{
"url": "https://httpd.apache.org/security/vulnerabilities_24.html",
"source": "security@apache.org"
}
]
}

View File

@ -0,0 +1,33 @@
{
"id": "CVE-2024-38475",
"sourceIdentifier": "security@apache.org",
"published": "2024-07-01T19:15:04.883",
"lastModified": "2024-07-01T19:15:04.883",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Improper escaping of output in mod_rewrite in Apache HTTP Server 2.4.59 and earlier allows an attacker to map URLs to filesystem locations that are\u00a0permitted to be served by the server but are not intentionally/directly reachable by any URL, resulting in code execution or source code disclosure. \n\nSubstitutions in\u00a0server context that use a backreferences or variables as the first segment of the substitution are affected.\u00a0 Some unsafe RewiteRules will be broken by this change and the rewrite flag \"UnsafePrefixStat\" can be used to opt back in once ensuring the substitution is appropriately constrained."
}
],
"metrics": {},
"weaknesses": [
{
"source": "security@apache.org",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-116"
}
]
}
],
"references": [
{
"url": "https://httpd.apache.org/security/vulnerabilities_24.html",
"source": "security@apache.org"
}
]
}

View File

@ -0,0 +1,33 @@
{
"id": "CVE-2024-38476",
"sourceIdentifier": "security@apache.org",
"published": "2024-07-01T19:15:04.977",
"lastModified": "2024-07-01T19:15:04.977",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Vulnerability in core of Apache HTTP Server 2.4.59 and earlier are vulnerably to information disclosure, SSRF or local script execution via\u00a0backend applications whose response headers are malicious or exploitable.\n\nUsers are recommended to upgrade to version 2.4.60, which fixes this issue."
}
],
"metrics": {},
"weaknesses": [
{
"source": "security@apache.org",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-829"
}
]
}
],
"references": [
{
"url": "https://httpd.apache.org/security/vulnerabilities_24.html",
"source": "security@apache.org"
}
]
}

View File

@ -0,0 +1,33 @@
{
"id": "CVE-2024-38477",
"sourceIdentifier": "security@apache.org",
"published": "2024-07-01T19:15:05.083",
"lastModified": "2024-07-01T19:15:05.083",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "null pointer dereference in mod_proxy in Apache HTTP Server 2.4.59 and earlier allows an attacker to crash the server via a malicious request.\nUsers are recommended to upgrade to version 2.4.60, which fixes this issue."
}
],
"metrics": {},
"weaknesses": [
{
"source": "security@apache.org",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-476"
}
]
}
],
"references": [
{
"url": "https://httpd.apache.org/security/vulnerabilities_24.html",
"source": "security@apache.org"
}
]
}

View File

@ -0,0 +1,60 @@
{
"id": "CVE-2024-38513",
"sourceIdentifier": "security-advisories@github.com",
"published": "2024-07-01T19:15:05.173",
"lastModified": "2024-07-01T19:15:05.173",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Fiber is an Express-inspired web framework written in Go A vulnerability present in versions prior to 2.52.5 is a session middleware issue in GoFiber versions 2 and above. This vulnerability allows users to supply their own session_id value, resulting in the creation of a session with that key. If a website relies on the mere presence of a session for security purposes, this can lead to significant security risks, including unauthorized access and session fixation attacks. All users utilizing GoFiber's session middleware in the affected versions are impacted. The issue has been addressed in version 2.52.5. Users are strongly encouraged to upgrade to version 2.52.5 or higher to mitigate this vulnerability. Users who are unable to upgrade immediately can apply the following workarounds to reduce the risk: Either implement additional validation to ensure session IDs are not supplied by the user and are securely generated by the server, or regularly rotate session IDs and enforce strict session expiration policies."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security-advisories@github.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "CHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 10.0,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.9,
"impactScore": 6.0
}
]
},
"weaknesses": [
{
"source": "security-advisories@github.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-384"
}
]
}
],
"references": [
{
"url": "https://github.com/gofiber/fiber/commit/66a881441b27322a331f1b526cf1eb6b3358a4d8",
"source": "security-advisories@github.com"
},
{
"url": "https://github.com/gofiber/fiber/security/advisories/GHSA-98j2-3j3p-fw2v",
"source": "security-advisories@github.com"
}
]
}

View File

@ -0,0 +1,21 @@
{
"id": "CVE-2024-38953",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-07-01T14:15:05.600",
"lastModified": "2024-07-01T16:37:39.040",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "phpok 6.4.003 contains a Cross Site Scripting (XSS) vulnerability in the ok_f() method under the framework/api/upload_control.php file."
}
],
"metrics": {},
"references": [
{
"url": "https://github.com/qinggan/phpok/issues/17",
"source": "cve@mitre.org"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-38987",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-07-01T13:15:04.717",
"lastModified": "2024-07-01T13:15:04.717",
"vulnStatus": "Received",
"lastModified": "2024-07-01T16:37:39.040",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-38990",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-07-01T13:15:04.807",
"lastModified": "2024-07-01T13:15:04.807",
"vulnStatus": "Received",
"lastModified": "2024-07-01T16:37:39.040",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-38991",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-07-01T13:15:04.863",
"lastModified": "2024-07-01T13:15:04.863",
"vulnStatus": "Received",
"lastModified": "2024-07-01T16:37:39.040",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-38992",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-07-01T13:15:04.930",
"lastModified": "2024-07-01T13:15:04.930",
"vulnStatus": "Received",
"lastModified": "2024-07-01T16:37:39.040",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-38993",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-07-01T13:15:04.987",
"lastModified": "2024-07-01T13:15:04.987",
"vulnStatus": "Received",
"lastModified": "2024-07-01T16:37:39.040",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-38994",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-07-01T13:15:05.047",
"lastModified": "2024-07-01T13:15:05.047",
"vulnStatus": "Received",
"lastModified": "2024-07-01T16:37:39.040",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-38996",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-07-01T13:15:05.103",
"lastModified": "2024-07-01T13:15:05.103",
"vulnStatus": "Received",
"lastModified": "2024-07-01T16:37:39.040",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-38997",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-07-01T13:15:05.160",
"lastModified": "2024-07-01T13:15:05.160",
"vulnStatus": "Received",
"lastModified": "2024-07-01T16:37:39.040",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-38998",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-07-01T13:15:05.223",
"lastModified": "2024-07-01T13:15:05.223",
"vulnStatus": "Received",
"lastModified": "2024-07-01T16:37:39.040",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-38999",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-07-01T13:15:05.280",
"lastModified": "2024-07-01T13:15:05.280",
"vulnStatus": "Received",
"lastModified": "2024-07-01T16:37:39.040",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-39000",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-07-01T13:15:05.340",
"lastModified": "2024-07-01T13:15:05.340",
"vulnStatus": "Received",
"lastModified": "2024-07-01T16:37:39.040",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-39001",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-07-01T13:15:05.397",
"lastModified": "2024-07-01T13:15:05.397",
"vulnStatus": "Received",
"lastModified": "2024-07-01T16:37:39.040",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-39002",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-07-01T13:15:05.450",
"lastModified": "2024-07-01T13:15:05.450",
"vulnStatus": "Received",
"lastModified": "2024-07-01T16:37:39.040",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-39003",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-07-01T13:15:05.513",
"lastModified": "2024-07-01T13:15:05.513",
"vulnStatus": "Received",
"lastModified": "2024-07-01T16:37:39.040",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-39008",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-07-01T13:15:05.590",
"lastModified": "2024-07-01T13:15:05.590",
"vulnStatus": "Received",
"lastModified": "2024-07-01T16:37:39.040",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-39013",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-07-01T13:15:05.650",
"lastModified": "2024-07-01T13:15:05.650",
"vulnStatus": "Received",
"lastModified": "2024-07-01T16:37:39.040",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-39014",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-07-01T13:15:05.703",
"lastModified": "2024-07-01T13:15:05.703",
"vulnStatus": "Received",
"lastModified": "2024-07-01T16:37:39.040",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-39015",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-07-01T13:15:05.767",
"lastModified": "2024-07-01T13:15:05.767",
"vulnStatus": "Received",
"lastModified": "2024-07-01T16:37:39.040",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-39016",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-07-01T13:15:05.823",
"lastModified": "2024-07-01T13:15:05.823",
"vulnStatus": "Received",
"lastModified": "2024-07-01T16:37:39.040",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-39017",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-07-01T13:15:05.893",
"lastModified": "2024-07-01T13:15:05.893",
"vulnStatus": "Received",
"lastModified": "2024-07-01T16:37:39.040",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-39018",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-07-01T13:15:05.950",
"lastModified": "2024-07-01T13:15:05.950",
"vulnStatus": "Received",
"lastModified": "2024-07-01T16:37:39.040",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{

View File

@ -0,0 +1,21 @@
{
"id": "CVE-2024-39236",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-07-01T19:15:05.420",
"lastModified": "2024-07-01T19:15:05.420",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Gradio v4.36.1 was discovered to contain a code injection vulnerability via the component /gradio/component_meta.py. This vulnerability is triggered via a crafted input."
}
],
"metrics": {},
"references": [
{
"url": "https://github.com/Aaron911/PoC/blob/main/Gradio.md",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,21 @@
{
"id": "CVE-2024-39251",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-07-01T19:15:05.480",
"lastModified": "2024-07-01T19:15:05.480",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "An issue in the component ControlCenter.sys/ControlCenter64.sys of ThundeRobot Control Center v2.0.0.10 allows attackers to access sensitive information, execute arbitrary code, or escalate privileges via sending crafted IOCTL requests."
}
],
"metrics": {},
"references": [
{
"url": "https://github.com/Souhardya/Exploit-PoCs/tree/main/ThundeRobot_Control_center",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,60 @@
{
"id": "CVE-2024-39303",
"sourceIdentifier": "security-advisories@github.com",
"published": "2024-07-01T19:15:05.540",
"lastModified": "2024-07-01T19:15:05.540",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Weblate is a web based localization tool. Prior to version 5.6.2, Weblate didn't correctly validate filenames when restoring project backup. It may be possible to gain unauthorized access to files on the server using a crafted ZIP file. This issue has been addressed in Weblate 5.6.2. As a workaround, do not allow untrusted users to create projects."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security-advisories@github.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:C/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "HIGH",
"privilegesRequired": "HIGH",
"userInteraction": "NONE",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 4.4,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.3,
"impactScore": 2.7
}
]
},
"weaknesses": [
{
"source": "security-advisories@github.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-73"
}
]
}
],
"references": [
{
"url": "https://github.com/WeblateOrg/weblate/commit/b6a7eace155fa0feaf01b4ac36165a9c5e63bfdd",
"source": "security-advisories@github.com"
},
{
"url": "https://github.com/WeblateOrg/weblate/security/advisories/GHSA-jfgp-674x-6q4p",
"source": "security-advisories@github.com"
}
]
}

View File

@ -0,0 +1,33 @@
{
"id": "CVE-2024-39573",
"sourceIdentifier": "security@apache.org",
"published": "2024-07-01T19:15:05.760",
"lastModified": "2024-07-01T19:15:05.760",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Potential SSRF in mod_rewrite in Apache HTTP Server 2.4.59 and earlier allows an attacker to cause unsafe RewriteRules to unexpectedly setup URL's to be handled by mod_proxy.\nUsers are recommended to upgrade to version 2.4.60, which fixes this issue."
}
],
"metrics": {},
"weaknesses": [
{
"source": "security@apache.org",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-20"
}
]
}
],
"references": [
{
"url": "https://httpd.apache.org/security/vulnerabilities_24.html",
"source": "security@apache.org"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-39853",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-07-01T13:15:06.013",
"lastModified": "2024-07-01T13:15:06.013",
"vulnStatus": "Received",
"lastModified": "2024-07-01T16:37:39.040",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2024-39878",
"sourceIdentifier": "cve@jetbrains.com",
"published": "2024-07-01T17:15:09.350",
"lastModified": "2024-07-01T17:15:09.350",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "In JetBrains TeamCity before 2024.03.3 private key could be exposed via testing GitHub App Connection"
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "cve@jetbrains.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:N/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.1,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.3,
"impactScore": 1.4
}
]
},
"weaknesses": [
{
"source": "cve@jetbrains.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-522"
}
]
}
],
"references": [
{
"url": "https://www.jetbrains.com/privacy-security/issues-fixed/",
"source": "cve@jetbrains.com"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2024-39879",
"sourceIdentifier": "cve@jetbrains.com",
"published": "2024-07-01T17:15:09.573",
"lastModified": "2024-07-01T17:15:09.573",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "In JetBrains TeamCity before 2024.03.3 application token could be exposed in EC2 Cloud Profile settings"
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "cve@jetbrains.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5.0,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 3.1,
"impactScore": 1.4
}
]
},
"weaknesses": [
{
"source": "cve@jetbrains.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-522"
}
]
}
],
"references": [
{
"url": "https://www.jetbrains.com/privacy-security/issues-fixed/",
"source": "cve@jetbrains.com"
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-3995",
"sourceIdentifier": "security@puppet.com",
"published": "2024-06-28T20:15:02.820",
"lastModified": "2024-07-01T12:37:24.220",
"lastModified": "2024-07-01T14:15:05.680",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
@ -61,6 +61,18 @@
}
]
},
"weaknesses": [
{
"source": "security@puppet.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-94"
}
]
}
],
"references": [
{
"url": "https://portal.perforce.com/s/detail/a91PA000001SU5pYAG",

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-4007",
"sourceIdentifier": "cybersecurity@ch.abb.com",
"published": "2024-07-01T13:15:06.077",
"lastModified": "2024-07-01T13:15:06.077",
"vulnStatus": "Received",
"lastModified": "2024-07-01T16:37:39.040",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-5642",
"sourceIdentifier": "cna@python.org",
"published": "2024-06-27T21:15:16.070",
"lastModified": "2024-06-28T19:15:07.357",
"lastModified": "2024-07-01T14:15:05.807",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
@ -25,6 +25,10 @@
"url": "https://github.com/python/cpython/commit/39258d3595300bc7b952854c915f63ae2d4b9c3e",
"source": "cna@python.org"
},
{
"url": "https://github.com/python/cpython/issues/121227",
"source": "cna@python.org"
},
{
"url": "https://github.com/python/cpython/pull/23014",
"source": "cna@python.org"

View File

@ -0,0 +1,82 @@
{
"id": "CVE-2024-6050",
"sourceIdentifier": "cvd@cert.pl",
"published": "2024-07-01T14:15:05.893",
"lastModified": "2024-07-01T16:37:39.040",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Improper Neutralization of Input During Web Page Generation vulnerability in SOKRATES-software SOWA OPAC allows a Reflected Cross-Site Scripting (XSS).\u00a0An attacker might trick somebody into using a crafted URL, which will cause a script to be run in user's browser.\u00a0This issue affects SOWA OPAC software in versions from 4.0 before 4.9.10, from 5.0 before 6.2.12."
}
],
"metrics": {
"cvssMetricV40": [
{
"source": "cvd@cert.pl",
"type": "Secondary",
"cvssData": {
"version": "4.0",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:L/VI:L/VA:L/SC:L/SI:L/SA:L/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:Y/R:A/V:X/RE:X/U:Green",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"privilegesRequired": "NONE",
"userInteraction": "PASSIVE",
"vulnerableSystemConfidentiality": "LOW",
"vulnerableSystemIntegrity": "LOW",
"vulnerableSystemAvailability": "LOW",
"subsequentSystemConfidentiality": "LOW",
"subsequentSystemIntegrity": "LOW",
"subsequentSystemAvailability": "LOW",
"exploitMaturity": "NOT_DEFINED",
"confidentialityRequirements": "NOT_DEFINED",
"integrityRequirements": "NOT_DEFINED",
"availabilityRequirements": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnerableSystemConfidentiality": "NOT_DEFINED",
"modifiedVulnerableSystemIntegrity": "NOT_DEFINED",
"modifiedVulnerableSystemAvailability": "NOT_DEFINED",
"modifiedSubsequentSystemConfidentiality": "NOT_DEFINED",
"modifiedSubsequentSystemIntegrity": "NOT_DEFINED",
"modifiedSubsequentSystemAvailability": "NOT_DEFINED",
"safety": "NOT_DEFINED",
"automatable": "YES",
"recovery": "AUTOMATIC",
"valueDensity": "NOT_DEFINED",
"vulnerabilityResponseEffort": "NOT_DEFINED",
"providerUrgency": "GREEN",
"baseScore": 5.3,
"baseSeverity": "MEDIUM"
}
}
]
},
"weaknesses": [
{
"source": "cvd@cert.pl",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"references": [
{
"url": "https://cert.pl/en/posts/2024/07/CVE-2024-6050/",
"source": "cvd@cert.pl"
},
{
"url": "https://cert.pl/posts/2024/07/CVE-2024-6050/",
"source": "cvd@cert.pl"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2024-6375",
"sourceIdentifier": "cna@mongodb.com",
"published": "2024-07-01T15:15:17.430",
"lastModified": "2024-07-01T16:37:39.040",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A command for refining a collection shard key is missing an authorization check. This may cause the command to run directly on a shard, leading to either degradation of query performance, or to revealing chunk boundaries through timing side channels. This affects MongoDB Server v5.0 versions, prior to 5.0.22, MongoDB Server v6.0 versions, prior to 6.0.11 and MongoDB Server v7.0 versions prior to 7.0.3."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "cna@mongodb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"availabilityImpact": "LOW",
"baseScore": 5.4,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 2.5
}
]
},
"weaknesses": [
{
"source": "cna@mongodb.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-285"
}
]
}
],
"references": [
{
"url": "https://jira.mongodb.org/browse/SERVER-79327",
"source": "cna@mongodb.com"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2024-6376",
"sourceIdentifier": "cna@mongodb.com",
"published": "2024-07-01T15:15:17.673",
"lastModified": "2024-07-01T16:37:39.040",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "MongoDB Compass may be susceptible to code injection due to insufficient sandbox protection settings with the usage of ejson shell parser in Compass' connection handling. This issue affects MongoDB Compass versions prior to version 1.42.2"
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "cna@mongodb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H",
"attackVector": "LOCAL",
"attackComplexity": "HIGH",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 7.0,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 1.0,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "cna@mongodb.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-20"
}
]
}
],
"references": [
{
"url": "https://jira.mongodb.org/browse/COMPASS-7496",
"source": "cna@mongodb.com"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-6387",
"sourceIdentifier": "secalert@redhat.com",
"published": "2024-07-01T13:15:06.467",
"lastModified": "2024-07-01T13:15:06.467",
"vulnStatus": "Received",
"lastModified": "2024-07-01T19:15:06.037",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
@ -48,17 +48,89 @@
}
],
"references": [
{
"url": "http://www.openwall.com/lists/oss-security/2024/07/01/12",
"source": "secalert@redhat.com"
},
{
"url": "https://access.redhat.com/security/cve/CVE-2024-6387",
"source": "secalert@redhat.com"
},
{
"url": "https://archlinux.org/news/the-sshd-service-needs-to-be-restarted-after-upgrading-to-openssh-98p1/",
"source": "secalert@redhat.com"
},
{
"url": "https://blog.qualys.com/vulnerabilities-threat-research/2024/07/01/regresshion-remote-unauthenticated-code-execution-vulnerability-in-openssh-server",
"source": "secalert@redhat.com"
},
{
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2294604",
"source": "secalert@redhat.com"
},
{
"url": "https://explore.alas.aws.amazon.com/CVE-2024-6387.html",
"source": "secalert@redhat.com"
},
{
"url": "https://github.com/oracle/oracle-linux/issues/149",
"source": "secalert@redhat.com"
},
{
"url": "https://github.com/rapier1/hpn-ssh/issues/87",
"source": "secalert@redhat.com"
},
{
"url": "https://github.com/zgzhang/cve-2024-6387-poc",
"source": "secalert@redhat.com"
},
{
"url": "https://lists.mindrot.org/pipermail/openssh-unix-announce/2024-July/000158.html",
"source": "secalert@redhat.com"
},
{
"url": "https://lists.mindrot.org/pipermail/openssh-unix-dev/2024-July/041431.html",
"source": "secalert@redhat.com"
},
{
"url": "https://news.ycombinator.com/item?id=40843778",
"source": "secalert@redhat.com"
},
{
"url": "https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2024-0010",
"source": "secalert@redhat.com"
},
{
"url": "https://security-tracker.debian.org/tracker/CVE-2024-6387",
"source": "secalert@redhat.com"
},
{
"url": "https://stackdiary.com/openssh-race-condition-in-sshd-allows-remote-code-execution/",
"source": "secalert@redhat.com"
},
{
"url": "https://ubuntu.com/security/CVE-2024-6387",
"source": "secalert@redhat.com"
},
{
"url": "https://ubuntu.com/security/notices/USN-6859-1",
"source": "secalert@redhat.com"
},
{
"url": "https://www.openssh.com/txt/release-9.8",
"source": "secalert@redhat.com"
},
{
"url": "https://www.qualys.com/2024/07/01/cve-2024-6387/regresshion.txt",
"source": "secalert@redhat.com"
},
{
"url": "https://www.suse.com/security/cve/CVE-2024-6387.html",
"source": "secalert@redhat.com"
},
{
"url": "https://www.theregister.com/2024/07/01/regresshion_openssh/",
"source": "secalert@redhat.com"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-6424",
"sourceIdentifier": "cve-coordination@incibe.es",
"published": "2024-07-01T13:15:06.690",
"lastModified": "2024-07-01T13:15:06.690",
"vulnStatus": "Received",
"lastModified": "2024-07-01T16:37:39.040",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-6425",
"sourceIdentifier": "cve-coordination@incibe.es",
"published": "2024-07-01T13:15:06.927",
"lastModified": "2024-07-01T13:15:06.927",
"vulnStatus": "Received",
"lastModified": "2024-07-01T16:37:39.040",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{

110
README.md
View File

@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours.
### Last Repository Update
```plain
2024-07-01T14:02:32.990499+00:00
2024-07-01T20:01:26.920930+00:00
```
### Most recent CVE Modification Timestamp synchronized with NVD
```plain
2024-07-01T13:15:06.927000+00:00
2024-07-01T19:15:06.037000+00:00
```
### Last Data Feed Release
@ -33,69 +33,69 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
### Total Number of included CVEs
```plain
255560
255620
```
### CVEs added in the last Commit
Recently added CVEs: `26`
Recently added CVEs: `60`
- [CVE-2024-38990](CVE-2024/CVE-2024-389xx/CVE-2024-38990.json) (`2024-07-01T13:15:04.807`)
- [CVE-2024-38991](CVE-2024/CVE-2024-389xx/CVE-2024-38991.json) (`2024-07-01T13:15:04.863`)
- [CVE-2024-38992](CVE-2024/CVE-2024-389xx/CVE-2024-38992.json) (`2024-07-01T13:15:04.930`)
- [CVE-2024-38993](CVE-2024/CVE-2024-389xx/CVE-2024-38993.json) (`2024-07-01T13:15:04.987`)
- [CVE-2024-38994](CVE-2024/CVE-2024-389xx/CVE-2024-38994.json) (`2024-07-01T13:15:05.047`)
- [CVE-2024-38996](CVE-2024/CVE-2024-389xx/CVE-2024-38996.json) (`2024-07-01T13:15:05.103`)
- [CVE-2024-38997](CVE-2024/CVE-2024-389xx/CVE-2024-38997.json) (`2024-07-01T13:15:05.160`)
- [CVE-2024-38998](CVE-2024/CVE-2024-389xx/CVE-2024-38998.json) (`2024-07-01T13:15:05.223`)
- [CVE-2024-38999](CVE-2024/CVE-2024-389xx/CVE-2024-38999.json) (`2024-07-01T13:15:05.280`)
- [CVE-2024-39000](CVE-2024/CVE-2024-390xx/CVE-2024-39000.json) (`2024-07-01T13:15:05.340`)
- [CVE-2024-39001](CVE-2024/CVE-2024-390xx/CVE-2024-39001.json) (`2024-07-01T13:15:05.397`)
- [CVE-2024-39002](CVE-2024/CVE-2024-390xx/CVE-2024-39002.json) (`2024-07-01T13:15:05.450`)
- [CVE-2024-39003](CVE-2024/CVE-2024-390xx/CVE-2024-39003.json) (`2024-07-01T13:15:05.513`)
- [CVE-2024-39008](CVE-2024/CVE-2024-390xx/CVE-2024-39008.json) (`2024-07-01T13:15:05.590`)
- [CVE-2024-39013](CVE-2024/CVE-2024-390xx/CVE-2024-39013.json) (`2024-07-01T13:15:05.650`)
- [CVE-2024-39014](CVE-2024/CVE-2024-390xx/CVE-2024-39014.json) (`2024-07-01T13:15:05.703`)
- [CVE-2024-39015](CVE-2024/CVE-2024-390xx/CVE-2024-39015.json) (`2024-07-01T13:15:05.767`)
- [CVE-2024-39016](CVE-2024/CVE-2024-390xx/CVE-2024-39016.json) (`2024-07-01T13:15:05.823`)
- [CVE-2024-39017](CVE-2024/CVE-2024-390xx/CVE-2024-39017.json) (`2024-07-01T13:15:05.893`)
- [CVE-2024-39018](CVE-2024/CVE-2024-390xx/CVE-2024-39018.json) (`2024-07-01T13:15:05.950`)
- [CVE-2024-39853](CVE-2024/CVE-2024-398xx/CVE-2024-39853.json) (`2024-07-01T13:15:06.013`)
- [CVE-2024-4007](CVE-2024/CVE-2024-40xx/CVE-2024-4007.json) (`2024-07-01T13:15:06.077`)
- [CVE-2024-6387](CVE-2024/CVE-2024-63xx/CVE-2024-6387.json) (`2024-07-01T13:15:06.467`)
- [CVE-2024-6424](CVE-2024/CVE-2024-64xx/CVE-2024-6424.json) (`2024-07-01T13:15:06.690`)
- [CVE-2024-6425](CVE-2024/CVE-2024-64xx/CVE-2024-6425.json) (`2024-07-01T13:15:06.927`)
- [CVE-2024-36993](CVE-2024/CVE-2024-369xx/CVE-2024-36993.json) (`2024-07-01T17:15:08.290`)
- [CVE-2024-36994](CVE-2024/CVE-2024-369xx/CVE-2024-36994.json) (`2024-07-01T17:15:08.500`)
- [CVE-2024-36995](CVE-2024/CVE-2024-369xx/CVE-2024-36995.json) (`2024-07-01T17:15:08.707`)
- [CVE-2024-36996](CVE-2024/CVE-2024-369xx/CVE-2024-36996.json) (`2024-07-01T17:15:08.917`)
- [CVE-2024-36997](CVE-2024/CVE-2024-369xx/CVE-2024-36997.json) (`2024-07-01T17:15:09.143`)
- [CVE-2024-37145](CVE-2024/CVE-2024-371xx/CVE-2024-37145.json) (`2024-07-01T19:15:03.853`)
- [CVE-2024-37146](CVE-2024/CVE-2024-371xx/CVE-2024-37146.json) (`2024-07-01T19:15:04.070`)
- [CVE-2024-37298](CVE-2024/CVE-2024-372xx/CVE-2024-37298.json) (`2024-07-01T19:15:04.283`)
- [CVE-2024-38472](CVE-2024/CVE-2024-384xx/CVE-2024-38472.json) (`2024-07-01T19:15:04.563`)
- [CVE-2024-38473](CVE-2024/CVE-2024-384xx/CVE-2024-38473.json) (`2024-07-01T19:15:04.657`)
- [CVE-2024-38474](CVE-2024/CVE-2024-384xx/CVE-2024-38474.json) (`2024-07-01T19:15:04.760`)
- [CVE-2024-38475](CVE-2024/CVE-2024-384xx/CVE-2024-38475.json) (`2024-07-01T19:15:04.883`)
- [CVE-2024-38476](CVE-2024/CVE-2024-384xx/CVE-2024-38476.json) (`2024-07-01T19:15:04.977`)
- [CVE-2024-38477](CVE-2024/CVE-2024-384xx/CVE-2024-38477.json) (`2024-07-01T19:15:05.083`)
- [CVE-2024-38513](CVE-2024/CVE-2024-385xx/CVE-2024-38513.json) (`2024-07-01T19:15:05.173`)
- [CVE-2024-38953](CVE-2024/CVE-2024-389xx/CVE-2024-38953.json) (`2024-07-01T14:15:05.600`)
- [CVE-2024-39236](CVE-2024/CVE-2024-392xx/CVE-2024-39236.json) (`2024-07-01T19:15:05.420`)
- [CVE-2024-39251](CVE-2024/CVE-2024-392xx/CVE-2024-39251.json) (`2024-07-01T19:15:05.480`)
- [CVE-2024-39303](CVE-2024/CVE-2024-393xx/CVE-2024-39303.json) (`2024-07-01T19:15:05.540`)
- [CVE-2024-39573](CVE-2024/CVE-2024-395xx/CVE-2024-39573.json) (`2024-07-01T19:15:05.760`)
- [CVE-2024-39878](CVE-2024/CVE-2024-398xx/CVE-2024-39878.json) (`2024-07-01T17:15:09.350`)
- [CVE-2024-39879](CVE-2024/CVE-2024-398xx/CVE-2024-39879.json) (`2024-07-01T17:15:09.573`)
- [CVE-2024-6050](CVE-2024/CVE-2024-60xx/CVE-2024-6050.json) (`2024-07-01T14:15:05.893`)
- [CVE-2024-6375](CVE-2024/CVE-2024-63xx/CVE-2024-6375.json) (`2024-07-01T15:15:17.430`)
- [CVE-2024-6376](CVE-2024/CVE-2024-63xx/CVE-2024-6376.json) (`2024-07-01T15:15:17.673`)
### CVEs modified in the last Commit
Recently modified CVEs: `94`
Recently modified CVEs: `33`
- [CVE-2024-3995](CVE-2024/CVE-2024-39xx/CVE-2024-3995.json) (`2024-07-01T12:37:24.220`)
- [CVE-2024-4934](CVE-2024/CVE-2024-49xx/CVE-2024-4934.json) (`2024-07-01T12:37:24.220`)
- [CVE-2024-5062](CVE-2024/CVE-2024-50xx/CVE-2024-5062.json) (`2024-07-01T12:37:24.220`)
- [CVE-2024-5192](CVE-2024/CVE-2024-51xx/CVE-2024-5192.json) (`2024-07-01T12:37:24.220`)
- [CVE-2024-5598](CVE-2024/CVE-2024-55xx/CVE-2024-5598.json) (`2024-07-01T12:37:24.220`)
- [CVE-2024-5666](CVE-2024/CVE-2024-56xx/CVE-2024-5666.json) (`2024-07-01T12:37:24.220`)
- [CVE-2024-5712](CVE-2024/CVE-2024-57xx/CVE-2024-5712.json) (`2024-07-01T12:37:24.220`)
- [CVE-2024-5790](CVE-2024/CVE-2024-57xx/CVE-2024-5790.json) (`2024-07-01T12:37:24.220`)
- [CVE-2024-5819](CVE-2024/CVE-2024-58xx/CVE-2024-5819.json) (`2024-07-01T12:37:24.220`)
- [CVE-2024-5827](CVE-2024/CVE-2024-58xx/CVE-2024-5827.json) (`2024-07-01T12:37:24.220`)
- [CVE-2024-5889](CVE-2024/CVE-2024-58xx/CVE-2024-5889.json) (`2024-07-01T12:37:24.220`)
- [CVE-2024-5926](CVE-2024/CVE-2024-59xx/CVE-2024-5926.json) (`2024-07-01T12:37:24.220`)
- [CVE-2024-5942](CVE-2024/CVE-2024-59xx/CVE-2024-5942.json) (`2024-07-01T12:37:24.220`)
- [CVE-2024-6130](CVE-2024/CVE-2024-61xx/CVE-2024-6130.json) (`2024-07-01T12:37:24.220`)
- [CVE-2024-6265](CVE-2024/CVE-2024-62xx/CVE-2024-6265.json) (`2024-07-01T12:37:24.220`)
- [CVE-2024-6363](CVE-2024/CVE-2024-63xx/CVE-2024-6363.json) (`2024-07-01T12:37:24.220`)
- [CVE-2024-6402](CVE-2024/CVE-2024-64xx/CVE-2024-6402.json) (`2024-07-01T12:37:24.220`)
- [CVE-2024-6403](CVE-2024/CVE-2024-64xx/CVE-2024-6403.json) (`2024-07-01T12:37:24.220`)
- [CVE-2024-6405](CVE-2024/CVE-2024-64xx/CVE-2024-6405.json) (`2024-07-01T12:37:24.220`)
- [CVE-2024-6414](CVE-2024/CVE-2024-64xx/CVE-2024-6414.json) (`2024-07-01T12:37:24.220`)
- [CVE-2024-6415](CVE-2024/CVE-2024-64xx/CVE-2024-6415.json) (`2024-07-01T12:37:24.220`)
- [CVE-2024-6416](CVE-2024/CVE-2024-64xx/CVE-2024-6416.json) (`2024-07-01T12:37:24.220`)
- [CVE-2024-6417](CVE-2024/CVE-2024-64xx/CVE-2024-6417.json) (`2024-07-01T12:37:24.220`)
- [CVE-2024-6418](CVE-2024/CVE-2024-64xx/CVE-2024-6418.json) (`2024-07-01T12:37:24.220`)
- [CVE-2024-6419](CVE-2024/CVE-2024-64xx/CVE-2024-6419.json) (`2024-07-01T12:37:24.220`)
- [CVE-2024-38992](CVE-2024/CVE-2024-389xx/CVE-2024-38992.json) (`2024-07-01T16:37:39.040`)
- [CVE-2024-38993](CVE-2024/CVE-2024-389xx/CVE-2024-38993.json) (`2024-07-01T16:37:39.040`)
- [CVE-2024-38994](CVE-2024/CVE-2024-389xx/CVE-2024-38994.json) (`2024-07-01T16:37:39.040`)
- [CVE-2024-38996](CVE-2024/CVE-2024-389xx/CVE-2024-38996.json) (`2024-07-01T16:37:39.040`)
- [CVE-2024-38997](CVE-2024/CVE-2024-389xx/CVE-2024-38997.json) (`2024-07-01T16:37:39.040`)
- [CVE-2024-38998](CVE-2024/CVE-2024-389xx/CVE-2024-38998.json) (`2024-07-01T16:37:39.040`)
- [CVE-2024-38999](CVE-2024/CVE-2024-389xx/CVE-2024-38999.json) (`2024-07-01T16:37:39.040`)
- [CVE-2024-39000](CVE-2024/CVE-2024-390xx/CVE-2024-39000.json) (`2024-07-01T16:37:39.040`)
- [CVE-2024-39001](CVE-2024/CVE-2024-390xx/CVE-2024-39001.json) (`2024-07-01T16:37:39.040`)
- [CVE-2024-39002](CVE-2024/CVE-2024-390xx/CVE-2024-39002.json) (`2024-07-01T16:37:39.040`)
- [CVE-2024-39003](CVE-2024/CVE-2024-390xx/CVE-2024-39003.json) (`2024-07-01T16:37:39.040`)
- [CVE-2024-39008](CVE-2024/CVE-2024-390xx/CVE-2024-39008.json) (`2024-07-01T16:37:39.040`)
- [CVE-2024-39013](CVE-2024/CVE-2024-390xx/CVE-2024-39013.json) (`2024-07-01T16:37:39.040`)
- [CVE-2024-39014](CVE-2024/CVE-2024-390xx/CVE-2024-39014.json) (`2024-07-01T16:37:39.040`)
- [CVE-2024-39015](CVE-2024/CVE-2024-390xx/CVE-2024-39015.json) (`2024-07-01T16:37:39.040`)
- [CVE-2024-39016](CVE-2024/CVE-2024-390xx/CVE-2024-39016.json) (`2024-07-01T16:37:39.040`)
- [CVE-2024-39017](CVE-2024/CVE-2024-390xx/CVE-2024-39017.json) (`2024-07-01T16:37:39.040`)
- [CVE-2024-39018](CVE-2024/CVE-2024-390xx/CVE-2024-39018.json) (`2024-07-01T16:37:39.040`)
- [CVE-2024-39853](CVE-2024/CVE-2024-398xx/CVE-2024-39853.json) (`2024-07-01T16:37:39.040`)
- [CVE-2024-3995](CVE-2024/CVE-2024-39xx/CVE-2024-3995.json) (`2024-07-01T14:15:05.680`)
- [CVE-2024-4007](CVE-2024/CVE-2024-40xx/CVE-2024-4007.json) (`2024-07-01T16:37:39.040`)
- [CVE-2024-5642](CVE-2024/CVE-2024-56xx/CVE-2024-5642.json) (`2024-07-01T14:15:05.807`)
- [CVE-2024-6387](CVE-2024/CVE-2024-63xx/CVE-2024-6387.json) (`2024-07-01T19:15:06.037`)
- [CVE-2024-6424](CVE-2024/CVE-2024-64xx/CVE-2024-6424.json) (`2024-07-01T16:37:39.040`)
- [CVE-2024-6425](CVE-2024/CVE-2024-64xx/CVE-2024-6425.json) (`2024-07-01T16:37:39.040`)
## Download and Usage

View File

@ -79100,7 +79100,7 @@ CVE-2015-6171,0,0,edaa0ed49eca25902af9123467fb349de5a3628e49d9db465cafb7d871a69b
CVE-2015-6172,0,0,f07991e2e2a19a9696a20f9d21527bf782f4878a6f3159baba024f3f1fa5ca45,2018-10-12T22:10:40.283000
CVE-2015-6173,0,0,3b678b405fdde2a6942f6a5fe6b2d0f8c2b3bd0bc0ea5369ae7ddce0883941b8,2019-05-15T15:09:51.853000
CVE-2015-6174,0,0,45d401e5ec610322b600846d114338dc0709df0e55cc6235d2cdecf333787927,2019-05-15T15:31:23.057000
CVE-2015-6175,0,0,3c68ccec2e939247edb7c19533148ee76eeca9cfb00d5db0201b827601b6b0fb,2018-10-30T16:27:22.263000
CVE-2015-6175,0,1,8cc2ab1bd5520efca87bf70b3d2d73fb6837ee65c5e493214e80e7bf7cf4ef68,2024-07-01T17:41:27.987000
CVE-2015-6176,0,0,6d8bd7888fa0d0322cc3d5ddfca235cc209c56f28f600a60442f2fd7bf289e01,2018-10-12T22:10:41.080000
CVE-2015-6177,0,0,817a059e7eabaf9152ee399566436d2eb9366c4156e06b3107a910cd0b5d919d,2018-10-12T22:10:41.267000
CVE-2015-6178,0,0,cfadc4407bff85becaba2bda32527557741b9668d971689a13799664949ea3a0,2023-11-07T02:26:33.597000
@ -81344,7 +81344,7 @@ CVE-2015-8647,0,0,6bd1e93fd9c440093adb3f75e284e3039fceab9b562b29df5d7a0a948d21cb
CVE-2015-8648,0,0,0e68ef771430dc1642eeac4ca8ed2a0ec2340c9186d02671af8289608f746fe8,2017-02-17T02:59:09.717000
CVE-2015-8649,0,0,c5bbf84b53ab71ce493c99028298aa30a152ee69b3792ee635e7ebd49759a90f,2017-02-17T02:59:09.797000
CVE-2015-8650,0,0,7313ec26c0bbca452e9027f7b678d9e0eae52f5a76737ec7613dde5479506263,2017-02-17T02:59:09.873000
CVE-2015-8651,0,0,d8b585f8d262016e6d1463802bd883b2acd8f65c091e25b83cf7297b3e113228,2017-02-17T02:59:09.950000
CVE-2015-8651,0,1,9c458cff21fd44ccf4ffde6e0e4949804a2e98f660a2185bcc191f79c5445aa1,2024-07-01T17:43:25.627000
CVE-2015-8652,0,0,b2ca14a444449a068c11ca0f0da7429e9ad53c507807090b1d96f065aef796b2,2023-05-08T13:29:02.290000
CVE-2015-8653,0,0,58097a744976f0b04795b575f15364d646ca455745f56da178c19bc4a5f3144d,2023-05-08T13:29:02.290000
CVE-2015-8654,0,0,7577e473c463e0d5795feddd633678c0de32502b275ee301ea217382e6c4665d,2023-05-08T13:29:02.290000
@ -82244,7 +82244,7 @@ CVE-2016-0030,0,0,0d6a6f7954e7bbacc49dd91a704045f331fede4724267227eb2b1245590e7d
CVE-2016-0031,0,0,98ee828fee94e5dc83b6fe8e51f81bcb09c5056b3ba3a0d2727015e5251dbd84,2020-04-09T13:26:49.583000
CVE-2016-0032,0,0,d77fc2129a6a5999c4c3d333c15e470f73b735d87df820cf4c33ad5a963e7232,2020-04-09T13:27:09.990000
CVE-2016-0033,0,0,8055d018419f7ee3fd3955c30f70de3cec7d3ea15248f357dddb82015785143f,2018-10-12T22:10:48.533000
CVE-2016-0034,0,0,ba6774f15fce06de9e553627358c4df616febe5e0e69860d95905c308a272531,2018-10-12T22:10:48.720000
CVE-2016-0034,0,1,505890c79c9a5175156a63bf808b20ea73ff07966a5a408d3f042e30562d28e5,2024-07-01T17:56:03.857000
CVE-2016-0035,0,0,ac98614e5103a805c0dae754293b57b3feaad6204b1e972305c570eaa47d017c,2018-10-12T22:10:48.923000
CVE-2016-0036,0,0,9646286a909a5c863f95c0bb389ed37dcfdee12c3dbcf06c9b35f35ac69fe8ec,2019-05-15T18:42:49.827000
CVE-2016-0037,0,0,4ea6ef1490c7d221c4878fe1468fc1b891018106e8b15f1d9f9b99ba400dccf6,2019-05-08T22:03:15.720000
@ -138378,7 +138378,7 @@ CVE-2019-2519,0,0,80cb8a26de2a58d99b181963daed12ecd759858d5d5f05a1d765a0af10d1fc
CVE-2019-2520,0,0,ae5d364f342d6d6e11cbfa1103b72fc4c48c965eceb925e0681dc4c71b896617,2020-08-24T17:37:01.140000
CVE-2019-2521,0,0,895d3d1e42e6880cb82a0d4fefb4c7b7e8f06c7c8e9ae8e0a5e83fb55980297e,2020-08-24T17:37:01.140000
CVE-2019-25210,0,0,07b454351a500643bf67356f1cc70d93fb3da2fec2ffde208a9e57da5b4a69e4,2024-05-17T01:36:44.030000
CVE-2019-25211,0,1,3551f053251482d7c4eea3a2f2f95512b0513afe16a4257463cbed7289ad3bb9,2024-07-01T12:37:24.220000
CVE-2019-25211,0,0,3551f053251482d7c4eea3a2f2f95512b0513afe16a4257463cbed7289ad3bb9,2024-07-01T12:37:24.220000
CVE-2019-2522,0,0,ae55dddc2cf216d0836c321fa3f09f9eb54cf6815873c5427c0842a495c7f153,2020-08-24T17:37:01.140000
CVE-2019-2523,0,0,2420d5fa367bd9afc8efca036c098c95836d2845178df0523b9e6ef463059e04,2020-08-24T17:37:01.140000
CVE-2019-2524,0,0,23ed838788d5538a8e4757f53d25252723d39ac2a7a29dd85ea00493a946f02f,2020-08-24T17:37:01.140000
@ -195990,7 +195990,7 @@ CVE-2022-27537,0,0,921b0370a064e6c66676a61cfdeff07d6c6d04bc3ca7b839174740829af03
CVE-2022-27538,0,0,249f5be3e9b39d633c92919b84d02015816e4423af4cf975b765430fb91f4716,2023-02-16T21:59:04.027000
CVE-2022-27539,0,0,89576ebdaff45cf10436f65488ea1060d8fb4295ef4f82967a948869364f6de5,2023-06-28T20:09:40.707000
CVE-2022-2754,0,0,0e0f4008598b3866746bf3e5aee56da4f49a23b3179bb6bece9688299f3820ba,2022-09-21T06:28:06.090000
CVE-2022-27540,0,1,c7a2e01f21c744aaf1fad5f226c4a727dc6c9cfe76c05321ee737be76079a8ba,2024-07-01T12:37:24.220000
CVE-2022-27540,0,0,c7a2e01f21c744aaf1fad5f226c4a727dc6c9cfe76c05321ee737be76079a8ba,2024-07-01T12:37:24.220000
CVE-2022-27541,0,0,3d6efa17e2a474be5e41adb6775036d0f158523f32ce57cf62154797f223ac18,2023-06-28T20:09:53.083000
CVE-2022-27544,0,0,d75315ba5cd3d9cb8adf29633c1c9b54c0678137a0441bdb7e80df2b22b24cc2,2022-07-27T22:40:03.920000
CVE-2022-27545,0,0,5d57f98791760f09bf7d908f75eebe296b09ecdad39ee494394f84d6a8533530,2022-07-27T22:36:45.790000
@ -204687,7 +204687,7 @@ CVE-2022-38379,0,0,428787175c578693384b489df4a2b8cdcc2b9e56c491740ff8a1b7056571e
CVE-2022-3838,0,0,2b3493d4948c4c37348af61a59172e3d9b6c97f426da6305df38912f30462d5d,2023-11-07T03:51:51.887000
CVE-2022-38380,0,0,06ba2fa35bb59291f3e6426e3c13f4d3c429bc0f04be5a9a0642274f0b5c8f9f,2022-11-04T14:56:46.817000
CVE-2022-38381,0,0,1d071d4638d13bbbb0953ae145422e2ec1a438ce32282da9c0c76f050bcf608e,2022-11-04T15:03:40.800000
CVE-2022-38383,0,1,66c59fde59945d36ff421371770e95940efed64b5627cf4175fea8d83ae78894,2024-07-01T12:37:24.220000
CVE-2022-38383,0,0,66c59fde59945d36ff421371770e95940efed64b5627cf4175fea8d83ae78894,2024-07-01T12:37:24.220000
CVE-2022-38385,0,0,02825fa13fca67fac2aa42ed4b88196b1389bea3a91c3e48d00af87ff80503ba,2023-11-07T03:50:07.243000
CVE-2022-38386,0,0,fd45c5dc183497347e3c318f666af4cbc914b98867e985d61a2eca4d45bb15b8,2024-05-01T19:50:25.633000
CVE-2022-38387,0,0,f1f9aa2a7c26b06061e2968005bc33433dbf65c68010969746df05d3f98275ee,2023-11-07T03:50:07.340000
@ -226041,7 +226041,7 @@ CVE-2023-35018,0,0,0740e92751ade7cc18b1f554af4cf823e2aafc087f99c1bc0b052d47163f3
CVE-2023-35019,0,0,7a1aebfa7c1d8452ead17bc55aa79dfd7cccc82a067d10ba856bbab6cefd4f37,2023-08-04T17:23:56.413000
CVE-2023-3502,0,0,302fb1d5bd5743d734a07b72e0538f873a2636c89266e46579bdeab79529bbc5,2024-05-17T02:27:32.370000
CVE-2023-35020,0,0,a56e5414c215dac3cc405b9d4361a2fe76232d53870262091227d01b8aabefa2,2024-01-24T21:38:11.280000
CVE-2023-35022,0,1,ac694e9c8ffd8fb7368eea470158e18ea431a24bfa5487ba39c286c0c02b290c,2024-07-01T12:37:24.220000
CVE-2023-35022,0,0,ac694e9c8ffd8fb7368eea470158e18ea431a24bfa5487ba39c286c0c02b290c,2024-07-01T12:37:24.220000
CVE-2023-35024,0,0,1ecf47a0b86bc02884af00b7eabcb558d32c4df794f8d7331a088e35c2b97fda,2023-10-18T21:04:02.917000
CVE-2023-35029,0,0,65adbe0e4dac0fa608e92fc04d22ecaf7d4b82b325012924bbebcbbc80cbf1c0,2023-06-22T16:51:23.137000
CVE-2023-3503,0,0,c6abbd30c8521c47d1ae7cf0398b364788b08345eeb291320098a60d82c9fd2c,2024-05-17T02:27:32.480000
@ -229917,7 +229917,7 @@ CVE-2023-40165,0,0,ab4e5756d11c5c99a14c74b5f2435b3a7ec37a8508fd8d1103ed13f8c2d14
CVE-2023-40166,0,0,e65129dbfd3b7538a0e791950fa4e4949f5750f316e418a4f293a1ace762d2e1,2023-08-31T16:33:53.880000
CVE-2023-40167,0,0,844221061890a9ee782732b03205b8ad71f2deb86a58157baa3044abcbbc84e9,2023-10-13T01:59:32.977000
CVE-2023-40168,0,0,70a509d5b6e44ab39f20bb6f74d7222f2250c3522969cca155350fac49518d8d,2023-08-24T15:04:49.430000
CVE-2023-4017,0,1,4e6059facf3e43de1d91594e07e57878b93838ccce97903c7d9e34ea7c8c89f8,2024-07-01T12:37:24.220000
CVE-2023-4017,0,0,4e6059facf3e43de1d91594e07e57878b93838ccce97903c7d9e34ea7c8c89f8,2024-07-01T12:37:24.220000
CVE-2023-40170,0,0,67e9723fa3a370c77f30ddb3e0da340f391c6067a62d196310c2bd52b2255239,2023-09-15T22:15:14.333000
CVE-2023-40171,0,0,71a7846ed38ba22c187618c817ebcfbd338daee7a019f556400a1c9e3f3a5897,2023-08-24T15:11:33.620000
CVE-2023-40172,0,0,faffa6093066f944ecdc507879750b0d605e40ed8b67b25cd587316c3781dacc,2023-08-23T19:55:36.697000
@ -232348,6 +232348,7 @@ CVE-2023-43550,0,0,1355e44b0bdef7fc02eec66c7d8c4c8822fa31e3406d0ce44b05faf4ddcb0
CVE-2023-43551,0,0,fff50831b0879e65c4c79b3ec6220cb3ef5a1341ddd3576588de2d2e2a3f6323,2024-06-03T14:46:24.250000
CVE-2023-43552,0,0,219a820f0d74d0eccbb21dd32fa4737b1fbff83065edd3c67c682afa52aaf7a9,2024-04-12T15:15:22.210000
CVE-2023-43553,0,0,3824e0ea8ed5ad8dde20da11270e38123e4d2d966d89aa1a0e668fc6b193a630,2024-04-12T15:15:22.310000
CVE-2023-43554,1,1,b6a60997b150f3491b2134d50416e22685e3e5095284417e88c69faf15a086a8,2024-07-01T16:37:39.040000
CVE-2023-43555,0,0,d0dcf6aa41c197eb1bd37623e2dce49869d747b1acfd889a96ea73711cf86a6d,2024-06-03T14:46:24.250000
CVE-2023-43556,0,0,b8b06ca2bf8ae30c51c8b9a1e28dc1200a038cf79690defb7e3d4b14354cdbbb,2024-06-03T14:46:24.250000
CVE-2023-4356,0,0,51f331be3605818c8ee40c6a87e55b57af1424a9aa9525f64ed6c38dd6cd0ef5,2024-01-31T17:15:14.917000
@ -237352,9 +237353,9 @@ CVE-2023-50948,0,0,3c02519a72037dff711d5ee48432aa7f2b5638da69466874289b5ec8a9701
CVE-2023-50949,0,0,05099c94caa797bc55ec09b8ff46351e2b7dda33262efba30ca113b16d3acf90,2024-04-12T12:44:04.930000
CVE-2023-50950,0,0,dfea2c60bf930725232ee8dec76ee1dc7db647db5a23e4d3c95d00ce14c241f2,2024-01-24T19:42:29.450000
CVE-2023-50951,0,0,ac9a2ba6b69cc6219b314f88f75f8d16d80977a7838c8861bc4cc4a5a90b32d2,2024-02-20T19:50:53.960000
CVE-2023-50952,0,1,6fb8a6f06e6ea79274476d98fa8b7f4c7c8fe5f78cbf74526726a3c4f21b950e,2024-07-01T12:37:24.220000
CVE-2023-50953,0,1,6a7df3afd53a32e2774a66668eb39cee23e7c8d11420bbc120edbae979b6e96a,2024-07-01T12:37:24.220000
CVE-2023-50954,0,1,03e5c9c632759f06d0045591a0608fa87031762cf88a1b42fbb995d9ab529ae8,2024-07-01T12:37:24.220000
CVE-2023-50952,0,0,6fb8a6f06e6ea79274476d98fa8b7f4c7c8fe5f78cbf74526726a3c4f21b950e,2024-07-01T12:37:24.220000
CVE-2023-50953,0,0,6a7df3afd53a32e2774a66668eb39cee23e7c8d11420bbc120edbae979b6e96a,2024-07-01T12:37:24.220000
CVE-2023-50954,0,0,03e5c9c632759f06d0045591a0608fa87031762cf88a1b42fbb995d9ab529ae8,2024-07-01T12:37:24.220000
CVE-2023-50955,0,0,2dac25424bb634048955c93e845cd595a5737c34f7a73119031e8a018fd0e20a,2024-02-22T19:07:27.197000
CVE-2023-50957,0,0,a38d290def706a6975d8b2902c3d1f58a6074172158e1685b40a6a512f9caf13,2024-02-15T04:37:53.297000
CVE-2023-50959,0,0,568717d1c5e9b7aee1be9083e54c56d344f91074f581c8ef3e925eba18620c0a,2024-04-02T17:56:18.897000
@ -237362,7 +237363,7 @@ CVE-2023-5096,0,0,1b0896fcd5a16a2bfc5ce288684748ddee835572b804e4af539b42517b79d3
CVE-2023-50961,0,0,d711d4a9d8ad627716324633a649c2a8b70ff648c86857e4b94f3b50216da091,2024-03-27T15:49:51.300000
CVE-2023-50962,0,0,365daa63183eee3bc8e35da897e2163d0fc458ef66adb39b8eb249f4c8a968ff,2024-02-12T14:31:36.920000
CVE-2023-50963,0,0,f8ab53d3916fdeb747721dbad810b91a4d8cca1f3447b9dedd0b7a0a236caf08,2024-01-24T21:22:22.293000
CVE-2023-50964,0,1,05618bc7480072746dd363727665cfce41d13577a3279532051009bea9dc475a,2024-07-01T12:37:24.220000
CVE-2023-50964,0,0,05618bc7480072746dd363727665cfce41d13577a3279532051009bea9dc475a,2024-07-01T12:37:24.220000
CVE-2023-50965,0,0,7d1de52a11bce456c4c16ef773b97b5e53898c75617739b3525f486b2a63242b,2023-12-20T20:02:23.497000
CVE-2023-50966,0,0,a6b32088d0a5d6ef9a7d587370f326ae2061a7a42b121ce18c85e023136aaec3,2024-03-19T16:33:58.680000
CVE-2023-50967,0,0,bb1533384c54817eac919409a9c4a4f7b98f5730662b59bf4ce17ad616d7daee,2024-04-19T23:15:09.330000
@ -240680,7 +240681,7 @@ CVE-2024-0099,0,0,922026d11edb09689a5419f4b6981b91f643282898008757d63b84ab582e71
CVE-2024-0100,0,0,bbf51d2ce3c3a951e3f6f4fb5d57dd8d1c73fdd75ab0ade8734c57fcf29d357b,2024-05-14T16:13:02.773000
CVE-2024-0103,0,0,c0f8f807fdf8426bc2106e7af79b6cd7b7308e8ea4f1780be6db3fdc6d1d8cf2,2024-06-17T12:43:31.090000
CVE-2024-0151,0,0,aafc841cfb528b9ef4d150e11c8565679b9331c9ad5bf3569e38f74d72962c86,2024-04-25T08:15:07.420000
CVE-2024-0153,0,1,687da5d226530ac38f394cd9b952906c5e53ebec74b3ccf6df4062258fc2674f,2024-07-01T12:37:24.220000
CVE-2024-0153,0,0,687da5d226530ac38f394cd9b952906c5e53ebec74b3ccf6df4062258fc2674f,2024-07-01T12:37:24.220000
CVE-2024-0154,0,0,fee6d0edd38400fe9a2f331d67a355be9bc81701717352554939ef10dafbbf73,2024-03-13T18:15:58.530000
CVE-2024-0155,0,0,56d3003aea28bbff1e776f33de697fc847d720d7a8270931f6c22f264f5611eb,2024-03-04T13:58:23.447000
CVE-2024-0156,0,0,47a5ee4f12284e0f109441891942aa0eb589b2387e172b6366b6741bcabc51b4,2024-03-04T13:58:23.447000
@ -242445,13 +242446,13 @@ CVE-2024-20072,0,0,c200ff4baf6255d64deb0271583c6f0f747c9ccdf27a663d7a798dfcb83f3
CVE-2024-20073,0,0,a0b25eb428467d36e6c8d6b6d33dfc4191a095e61c25b5d42e8224294b10245c,2024-06-03T14:46:24.250000
CVE-2024-20074,0,0,ae8ea4f1aeb95c2db6d96bbffc4725f4aeeca344255405cba91589fc79862e12,2024-06-03T14:46:24.250000
CVE-2024-20075,0,0,c25b515a91dbc89ebe595fac548aad128c5354b0efe2add6f43a7dd87e7c74de,2024-06-03T14:46:24.250000
CVE-2024-20076,0,1,7a7cdd6b11d797bc1065c2a69cb9c58eccd1fe55a553f474fcbfe7ead824177f,2024-07-01T12:37:24.220000
CVE-2024-20077,0,1,078df06cdcdb9fbee70d10a06d71a0c738e3f06468faa637c9b71b99bd9250ed,2024-07-01T12:37:24.220000
CVE-2024-20078,0,1,f7d8ca3412c1bf1826924b855782cd80652b405b3608aec4d57b9c0cf2c70fb9,2024-07-01T12:37:24.220000
CVE-2024-20079,0,1,2b8a0e5983dc5248cc97f95dd3191ef3fe114b43595192c541ca56a9b4ab2524,2024-07-01T12:37:24.220000
CVE-2024-20076,0,0,7a7cdd6b11d797bc1065c2a69cb9c58eccd1fe55a553f474fcbfe7ead824177f,2024-07-01T12:37:24.220000
CVE-2024-20077,0,0,078df06cdcdb9fbee70d10a06d71a0c738e3f06468faa637c9b71b99bd9250ed,2024-07-01T12:37:24.220000
CVE-2024-20078,0,0,f7d8ca3412c1bf1826924b855782cd80652b405b3608aec4d57b9c0cf2c70fb9,2024-07-01T12:37:24.220000
CVE-2024-20079,0,0,2b8a0e5983dc5248cc97f95dd3191ef3fe114b43595192c541ca56a9b4ab2524,2024-07-01T12:37:24.220000
CVE-2024-2008,0,0,89351e3b3909d90b71f2b464baa5c1531110f0fc183853e9b068b202a6597011,2024-04-04T12:48:41.700000
CVE-2024-20080,0,1,9f77e554af3bbd3c0972041ad77ad07151acaabcf84a676d09d66327102a89a6,2024-07-01T12:37:24.220000
CVE-2024-20081,0,1,c71489cf0f2bedca59bdc5569ddfc23bc345fff8731fd4100ad31f358075b686,2024-07-01T12:37:24.220000
CVE-2024-20080,0,0,9f77e554af3bbd3c0972041ad77ad07151acaabcf84a676d09d66327102a89a6,2024-07-01T12:37:24.220000
CVE-2024-20081,0,0,c71489cf0f2bedca59bdc5569ddfc23bc345fff8731fd4100ad31f358075b686,2024-07-01T12:37:24.220000
CVE-2024-2009,0,0,71459ca320e3ba6a6c331932225f22d43a50dc1f7bd5a77e40fa738dd949aeca,2024-05-17T02:37:59.337000
CVE-2024-2011,0,0,845fb303b632df2a82ac2c4f8385a50b893aa8c309406d3fe328481c0cd09158,2024-06-13T18:36:45.417000
CVE-2024-2012,0,0,878efb3776c708b50cfb853377bc9e21e4d99f3747b5a678478141addae0900a,2024-06-13T18:36:45.417000
@ -242572,6 +242573,7 @@ CVE-2024-2039,0,0,4f1e5a8a814f51edc0234cc5670da2107cc2a93a2ef1eadc628898e3eec44b
CVE-2024-20391,0,0,f91eada0700f8cd9f2eaea2b871ba7d3969d87e51919a0eb478edbaaab6f3a9d,2024-05-15T18:35:11.453000
CVE-2024-20392,0,0,ace66ba4c79c3f433832bd6cfa0988701f79a2b5d6c0fbe5016f71bba33a0a9b,2024-05-15T18:35:11.453000
CVE-2024-20394,0,0,d0e5fc3a79dfeb923dc3f02320ce7649899cba8340301b836f168cfe3139baa9,2024-05-15T18:35:11.453000
CVE-2024-20399,1,1,bb75c3d6009e5feccf8a9ba090bb7f5d7a196209d110ab7ff4cb6997adaadb6b,2024-07-01T17:15:04.383000
CVE-2024-20404,0,0,679bbd668c3128b9d2c298395d952eaf5fd76470dbc9bd0e765678566e0d175f,2024-06-13T20:25:46.837000
CVE-2024-20405,0,0,e5acdd821474e29805e089211fec2d1d30a76e0d4d4635efbeb215040858791b,2024-06-18T18:04:04.497000
CVE-2024-2041,0,0,f285d116ebee20fb02fc2c7de4f69fe8567e76fe9eda446fb7969801431b3d7d,2024-05-06T14:15:07.747000
@ -243229,9 +243231,18 @@ CVE-2024-21451,0,0,3a68c9cb135fb79bfe9a5852a24c7fd1f5875fcd798816d60af8d6fb9ada6
CVE-2024-21452,0,0,02d31b115a697c05db35da661c22664c85e8181268bd7542a64483c043b4b7b5,2024-04-12T09:15:09.877000
CVE-2024-21453,0,0,8dc35af31e64bd045ded864e7fcc07424ae51270f4588b919a1a9152eb1b9be2,2024-04-12T09:15:09.977000
CVE-2024-21454,0,0,b257edb5552eb473b4503004e3fc64a602a43324cbc07ac68d19d0a9bcb868c5,2024-04-12T09:15:10.083000
CVE-2024-21456,1,1,07dcd071bffa0c44180e19b48a0ffe105b7eb0f50ab8d8ce853bf480a4beba79,2024-07-01T16:37:39.040000
CVE-2024-21457,1,1,c51a832eee10458dc0aeca1412a2479ea404399a1c81e24c09e674525c076ae9,2024-07-01T16:37:39.040000
CVE-2024-21458,1,1,14c2fad17d35a8a4f6efb9de30e88872b7b8cc29e70f5a85ef675e3349179df6,2024-07-01T16:37:39.040000
CVE-2024-2146,0,0,18e858010f752fe48eba92f669210f471df0d7d5120f3dce1efba4919f090b2b,2024-05-17T02:38:04.200000
CVE-2024-21460,1,1,0e9df1da73e8e89d3208da73d1fe52ccb4cae7458b59e2c4118f61fa4495704a,2024-07-01T16:37:39.040000
CVE-2024-21461,1,1,9adf06ea3a2d17b0595d893a4b01e010e5ec314285ba3819f863f42f1203f4c7,2024-07-01T16:37:39.040000
CVE-2024-21462,1,1,7f4f62b93923e70e6f0061c6a6a972af20bd3d80676b9a4d7adc24c73365f1bf,2024-07-01T16:37:39.040000
CVE-2024-21463,0,0,8f929d15ea58ffe4c907e382121f59ff2b72bea6ff85918078d89258f2adb890,2024-04-12T09:15:10.193000
CVE-2024-21465,1,1,3e1dac5abf4816a2f1def9ac836d078377b5f3e3e4971c3ea83b094120784cb7,2024-07-01T16:37:39.040000
CVE-2024-21466,1,1,214b2fa5c6140f13f2d523313417fd06b636cd4166c5763ecef1308a2f4969d7,2024-07-01T16:37:39.040000
CVE-2024-21468,0,0,f2b93df747dc8ffb1a67bf6170c8b74d59ead8db487ef5519f8ed51313b18879,2024-04-12T09:15:10.303000
CVE-2024-21469,1,1,5a0e43ca387de69963299e78ff42a35d9e2739b9a6e5573dabcf69b8593c9905,2024-07-01T16:37:39.040000
CVE-2024-2147,0,0,3efc249503b7d31cf02f2428bf4511d025fa9f2f838acc89eb93938f9981992f,2024-05-17T02:38:04.293000
CVE-2024-21470,0,0,acd6c1381826abd35aa0c5fc63da2cad3d21675cd9907feb7858c393a543a7f4,2024-04-12T09:15:10.433000
CVE-2024-21471,0,0,e1abb0c50539103876297a632f25378f1444ddda8faad24e49920b56b9ea4a01,2024-05-06T16:00:59.253000
@ -243244,6 +243255,7 @@ CVE-2024-21477,0,0,2dfc1d466e14269455d623dbe436a1e6d9dccf3c01b4aaeec3bd9b9f104b4
CVE-2024-21478,0,0,36dfa412cb137cba65151bfea20c0e66b2ab35d0e6033873c7da5a111874076d,2024-06-03T14:46:24.250000
CVE-2024-2148,0,0,f9ad2f00527f5c10697ce47ba63c57e584aab0240fc88e91a15c3572a9aa5790,2024-05-17T02:38:04.387000
CVE-2024-21480,0,0,8440778e45413c0e24db83877880d3ede6fda18ff0fea3fa59c66be00cec51d0,2024-05-06T16:00:59.253000
CVE-2024-21482,1,1,7561b73ed526473db4d45c97eb162833eab13e81a0d452b67db4bb6caf2e0cd7,2024-07-01T16:37:39.040000
CVE-2024-21483,0,0,9151aea81f4a61f57a2b42ef8dafe022eeea7af379bf181ee6a30f8665567492,2024-03-12T12:40:13.500000
CVE-2024-21484,0,0,5f19ab0f68120a92041bdc33d9c29463ccd0d23c1b4da1c7441e6cd0612506af,2024-03-06T14:15:47.533000
CVE-2024-21485,0,0,0775bbbb470f3ac41cc07f785a9ceabee9d1e54c43c7bfd148d7325914f9c235,2024-03-06T14:15:47.760000
@ -243287,6 +243299,7 @@ CVE-2024-2155,0,0,c86c3d15a9193973ee1ceda0debbe4aef69c0b1f1d6389239087d9ae654393
CVE-2024-2156,0,0,9875f97b16d433dcae1d17513bfc06f6a88167c3f9be8e020b7e41eaf5e1716f,2024-05-17T02:38:05.157000
CVE-2024-21584,0,0,d66fedfad76e69bf70f964d573fe608d89f94eedd1312d57b206120486115729,2024-03-12T12:40:13.500000
CVE-2024-21585,0,0,6e8206f1fdf94b37b9dcf7444e5790dcbe04c3a87e39f8bb6c4b0625dfa3058a,2024-01-31T00:15:45.920000
CVE-2024-21586,1,1,6a86b1ca4b4eed666a2e26212ecf2f9640988011f74f79cf972450ee5d5b4381,2024-07-01T17:15:05.193000
CVE-2024-21587,0,0,8f0f5dff561533a0791e40b4445b496c614678c7a31b89022336200c858df596,2024-01-19T17:44:35.830000
CVE-2024-21589,0,0,68b0ee433e5dc2a6e0c5986e659a2299beb8087cc670f80d46b90c5ac3b4a35f,2024-01-19T17:41:50.160000
CVE-2024-2159,0,0,f3be63a7663ddf3b31bfd92d9a748c732237b19d0097a5faff5e36011f65cbaf,2024-04-26T12:58:17.720000
@ -244402,7 +244415,11 @@ CVE-2024-23354,0,0,524905b4df533efbcae0403dea5cdcdf4f507ec96e09f870f5c27c0b03f65
CVE-2024-2336,0,0,858071e914ebaea9fbe161c5ef8e540e29b84f9d635c439141db287421da0568,2024-04-10T13:23:38.787000
CVE-2024-23360,0,0,a0e02beef64771c409bba62a59974a7242efe2beed7ec1a0338b8289be7e2051,2024-06-03T14:46:24.250000
CVE-2024-23363,0,0,0707bd01da1cb508f4a1ec84537ade1624792b9e876ac1f60a112ad96d849177,2024-06-03T14:46:24.250000
CVE-2024-23368,1,1,8180b4639ea83220498176de7e78708b88091a6f2a71b2bf5cf84238bff611ae,2024-07-01T16:37:39.040000
CVE-2024-23372,1,1,7519fb06aa0ed092bf1c99fb8933d24ae7c3408390ebe7fd86f7c68a2dbc9495,2024-07-01T16:37:39.040000
CVE-2024-23373,1,1,39fe96bb830b1086d3b0178680b5afc566021eecde10c0bf0afbcf30bd08a1c3,2024-07-01T16:37:39.040000
CVE-2024-2338,0,0,2d543a556e65d2c959c15e10c3e9a74031d18693370229ae5e1770e5ef380b4c,2024-03-08T21:19:43.127000
CVE-2024-23380,1,1,377f8c128db77fa02e9a86f529bfed45986a96dff61429f9c0df47dea4c61b15,2024-07-01T16:37:39.040000
CVE-2024-23387,0,0,651b9110a70ec6d8150b78d412ab0c449da5b24d5059a74c85bc0d06b6759568,2024-01-25T02:00:29.210000
CVE-2024-23388,0,0,d9ef291f69bac73e9b23ebc37df19469f57319d5ff49c901cd1cd709d40899ff,2024-02-05T15:18:21.920000
CVE-2024-2339,0,0,fdf2e9587a4f32c10532c2236faf6d2db35a7825d1bc11064100d013b4c7d19f,2024-03-08T21:19:43.127000
@ -244742,7 +244759,7 @@ CVE-2024-23856,0,0,7a070de7fdd5d74cea0874cc007ef2bf0f323d01fd662c9716c69691cbccd
CVE-2024-23857,0,0,7eaf19807291540ffb4ed0aaeba2203c48dbce97eb1c38b6829b99f69bea7f4d,2024-02-15T10:15:09.737000
CVE-2024-23858,0,0,179fd096cc74dd5cbbf876bea6a8488b0885e1edc4fe71fbcee8079358c39150,2024-02-15T10:15:09.977000
CVE-2024-23859,0,0,63d22f89061de591ebb6f50f4326d532f8fce7994f1fbe1f5617c0b66052cbc5,2024-02-15T10:15:10.320000
CVE-2024-2386,0,1,e910438a3934865bd71dc7371b084d92c8554eaa6c70bbb2ec087830c15b9721,2024-07-01T12:37:24.220000
CVE-2024-2386,0,0,e910438a3934865bd71dc7371b084d92c8554eaa6c70bbb2ec087830c15b9721,2024-07-01T12:37:24.220000
CVE-2024-23860,0,0,6632cbbf88be694b99a54a9686f448c6c76767ee921ebba92af7b1d8dcf41923,2024-02-15T10:15:10.567000
CVE-2024-23861,0,0,1e0a03b0e05ef6048d2c622678e2eb6612c0b797636e9b5ad09792d3e7721feb,2024-02-15T10:15:10.917000
CVE-2024-23862,0,0,857cda3f242d87fabecd43e75af37484c6e5f8b7cb4875ca14d61eda019d5ca8,2024-02-15T10:15:11.193000
@ -245156,6 +245173,7 @@ CVE-2024-24743,0,0,0f9fe8c46f95fe6a826ca3990c6a9cc5f65190a01cad4e6f6e9f271c18043
CVE-2024-24746,0,0,f413651119509d8bbe183d33262f3389272a068e9c6e43f6cac823758e402119,2024-05-01T18:15:14.767000
CVE-2024-24747,0,0,f1a9181559802764d3abc2532f673fd70e99148bf526b7e772b90a95095b418a,2024-02-09T15:18:00.510000
CVE-2024-24748,0,0,ecaeb1145f78c27b3263c7d08a914384649823870ed552d13ac62854d31ce79b,2024-03-17T22:38:29.433000
CVE-2024-24749,1,1,5f93ca0c37091f830e6dbaaf0bd4100f1018f43580b01385381ea1404a5024a9,2024-07-01T16:37:39.040000
CVE-2024-2475,0,0,217b3852eba1552a23ac999c983aecc21d18a764f179fbfb3a08ea63fa4dac64,2024-03-29T12:45:02.937000
CVE-2024-24750,0,0,5d454a471477096dcce9165932bd9f7dbfe957ed7386b0aaadc1aef0b1c490d7,2024-04-19T07:15:09.330000
CVE-2024-24751,0,0,d7cdd447dea44769ed0f4c8f1ccd48a28b546d2b3034d970475d4af6ca53e646,2024-02-13T19:45:42.327000
@ -245397,16 +245415,16 @@ CVE-2024-25027,0,0,506fa0f038304c2bb065c6aafbb038363984a8c8037945872a1b74013246a
CVE-2024-25029,0,0,d48a17c1d5ef1bfa6fbe7d5b73144f127d39825001bfd50aa27289e6a7875699,2024-04-08T18:48:40.217000
CVE-2024-2503,0,0,5456a0b13b40102166dfd1cda8940dfe9ff4664673bbe7b6a7953c477d674561,2024-05-02T18:00:37.360000
CVE-2024-25030,0,0,6e16b2526be8abef4237aa975d66d5ed678d7c0d907efb0dcc09108160949092,2024-06-10T18:15:27.247000
CVE-2024-25031,0,1,469453639d4aa429d76da5acfd1e1972c3ace1bf2c3c85b252deeb41e11b70a1,2024-07-01T12:37:24.220000
CVE-2024-25031,0,0,469453639d4aa429d76da5acfd1e1972c3ace1bf2c3c85b252deeb41e11b70a1,2024-07-01T12:37:24.220000
CVE-2024-2504,0,0,b952b345d554f248180cfc37dd33de3d29aef92bb40f82f2454b4ee2e2c1523d,2024-04-10T13:23:38.787000
CVE-2024-25041,0,1,7928ae57a8bc2dc3a8c04d59e5aa30b1327837d78f88e428ea9c9bbae0acf7f7,2024-07-01T12:37:24.220000
CVE-2024-25041,0,0,7928ae57a8bc2dc3a8c04d59e5aa30b1327837d78f88e428ea9c9bbae0acf7f7,2024-07-01T12:37:24.220000
CVE-2024-25046,0,0,4397b23573a65e79c16052f58f281291388123ce903b9df7b4059c81aac5ce1a,2024-06-10T18:15:27.350000
CVE-2024-25047,0,0,64419cf1d56aa51442fec48f489740b8b22b015f011042cff3e462c703444ca0,2024-06-21T19:15:30.053000
CVE-2024-25048,0,0,610a65aa068817d20a042aeecc25c887034723f165ecc379125f80c2bf8a57aa,2024-04-29T12:42:03.667000
CVE-2024-2505,0,0,f9efd81999a67e571786699340d45ecbc4af4577ba4f92360cdbb165e79506a4,2024-04-29T12:42:03.667000
CVE-2024-25050,0,0,2895a503880459770c96f9ab5f8cf4bc71edd50703fee0b5f0e32007918ee69d,2024-04-29T12:42:03.667000
CVE-2024-25052,0,0,a1c8165788344cec6c26b0ce1cd1c907b8a407a30045684a7d709a32eba309a1,2024-06-13T18:35:19.777000
CVE-2024-25053,0,1,a7c1d494e85c793a8b85597c57f93ed8af694871477cfb34ba8468c39dbbe4ad,2024-07-01T12:37:24.220000
CVE-2024-25053,0,0,a7c1d494e85c793a8b85597c57f93ed8af694871477cfb34ba8468c39dbbe4ad,2024-07-01T12:37:24.220000
CVE-2024-2506,0,0,e15f8d6bb21612e515765b00c070f0acb363bd444917e661aa5401c0b47082de,2024-06-03T14:46:24.250000
CVE-2024-25062,0,0,9596ed5cf07a8bc8469d4afc28fc727a431af7cff3b6b8e84435c301d9955756,2024-02-13T00:40:40.503000
CVE-2024-25063,0,0,ada8a3e76748f7f6ba8d6378c081423ac8f962f095964d00e876ad6b7009736e,2024-03-04T22:45:02.117000
@ -245946,7 +245964,7 @@ CVE-2024-2594,0,0,bde31fdaab09a079b8da0d26da3ff2fd7469b156a031f2e67457f19c614e87
CVE-2024-25940,0,0,0f284eb6797ffd015c122aeeb19f68755aac0aac9d9f404601b2b09d1a1b9b82,2024-04-19T07:15:09.657000
CVE-2024-25941,0,0,0620596476a272ab01a4a766ab6af38a519cd30d123423fbbdbdd109f3a89b18,2024-06-10T19:15:53.077000
CVE-2024-25942,0,0,f61fbc9a4d226989af6c7dbccbce6eac1bf08e9ecba7753f027f3c66eedf16fc,2024-03-19T13:26:46
CVE-2024-25943,0,1,d506e8c730696f4b2f3434da5ff1d66664f3a0f52ba266f85b5b04d36f260146,2024-07-01T12:37:24.220000
CVE-2024-25943,0,0,d506e8c730696f4b2f3434da5ff1d66664f3a0f52ba266f85b5b04d36f260146,2024-07-01T12:37:24.220000
CVE-2024-25944,0,0,0c942868260e254f0ec88d12c198d84ea5267c121ead95446b5b00550e047e17,2024-04-01T01:12:59.077000
CVE-2024-25946,0,0,6f496894c0996dd20db51bddadbb7b8f4613518a0a22790fcd21a192873f3411,2024-03-28T20:53:20.813000
CVE-2024-25949,0,0,28dd1d310f71410ca26db9f24ad82830e2205559dd220b22f64be17580b64f1f,2024-06-13T18:36:09.010000
@ -247322,8 +247340,8 @@ CVE-2024-27623,0,0,2fddee8e74e15c6e7895f22777fd9ac33928389d1ff6851e7ceeb0e05ed9e
CVE-2024-27625,0,0,d6b6da55ca3f292d09b4a714bcb504e227f68a5bde518c62e1054c68c65c7b4c,2024-03-05T14:27:46.090000
CVE-2024-27626,0,0,03b059cdacd9bd4fdf434fcdc21be78daba5dd8b1b09db34c5aaed65f0885289,2024-03-21T12:58:51.093000
CVE-2024-27627,0,0,6b314556f3fa2e7fb50707266f0d07d8792d06426c2d3b5f17382297ce1180be,2024-03-05T14:27:46.090000
CVE-2024-27628,0,1,faa71788c87c317049fdc79ef56c77e632eee6d27397d0a91223336e9c422e45,2024-07-01T12:37:24.220000
CVE-2024-27629,0,1,2c51e5cbb6b2fd63f16d57c9e8c157423f6e13b1cbb9ef7712517b8bec763776,2024-07-01T12:37:24.220000
CVE-2024-27628,0,0,faa71788c87c317049fdc79ef56c77e632eee6d27397d0a91223336e9c422e45,2024-07-01T12:37:24.220000
CVE-2024-27629,0,0,2c51e5cbb6b2fd63f16d57c9e8c157423f6e13b1cbb9ef7712517b8bec763776,2024-07-01T12:37:24.220000
CVE-2024-2763,0,0,915a4db607b8067b26a412109e7e5ccfc1290182e3b3b563c2eda7d6ee1f9e77,2024-05-17T02:38:28.787000
CVE-2024-27630,0,0,c166a75eb868b94e3d44b8631307a3b16a1a3175bacac14103c1a38615b66cc2,2024-04-11T06:15:06.270000
CVE-2024-27631,0,0,d8dcd2de2ab076578039d2fc8d07b397b3cb994ac2e3f6cf562a97f0cf407dc3,2024-04-11T06:15:06.560000
@ -247530,7 +247548,7 @@ CVE-2024-27956,0,0,194fe594f0f82199e60d61684a1f7c8db8c04bdf57c93a45e71af1bb25f78
CVE-2024-27957,0,0,3bb51417dd78fa81cd8d3e079ab9ae6ed1b9709468847cb623b9c9568eef40f4,2024-03-17T22:38:29.433000
CVE-2024-27958,0,0,3c69427bef710d3f7bb781ce81b405984dd58d08367be619f590c223ad730fd4,2024-03-17T22:38:29.433000
CVE-2024-27959,0,0,b6158d09fbe57e466eaa147e639a460dd447ef6efe99a61800919c1426ccc29c,2024-03-17T22:38:29.433000
CVE-2024-2796,0,0,40f83fb33f4fa292a363b62c84df176246a04da8a7040a6965ddecb98d4131ac,2024-04-18T18:25:55.267000
CVE-2024-2796,0,1,3d44c6201a2a3363380fbacee1a38246c05a7907f941963241152ffdb7a21198,2024-07-01T15:15:16.793000
CVE-2024-27960,0,0,f24cb349f10cfa74e91704c4186cd8ad2d36e2e6ec0ef021d33bdec9575a5822,2024-03-17T22:38:29.433000
CVE-2024-27961,0,0,f8aa7d138d3bc8c32b44cd00e2345672372b1720c63bb0bc0998e3ab4b908ae3,2024-03-17T22:38:29.433000
CVE-2024-27962,0,0,17f6594cb4e48407b3b28a4d52db42d5a531934fbaefcd58b5c585ffd5201450,2024-03-21T19:47:03.943000
@ -247990,10 +248008,10 @@ CVE-2024-28784,0,0,c979b0334a0081e1847a4bc955e67dbbc0397aed136c4d3aa1b489c4f3f26
CVE-2024-28787,0,0,466884053e2fb97771b0b18e87658d91d7f6894823937327962bdc9b1ecfdc33,2024-04-04T19:24:50.670000
CVE-2024-2879,0,0,b3cb63a21efa9503ae3e8fbd2c3fbecce8466a6f50871d6397f8e38479a77e62,2024-04-08T22:49:41.533000
CVE-2024-28793,0,0,0971b91b249c500bf4e72fc37951e1fea5132a60c7834326b93f07f92baebfb6,2024-06-10T18:15:29.983000
CVE-2024-28794,0,1,5c23b350c07f05077487199b0f30cf4c260d9bb180f15dcf8074d12405596155,2024-07-01T12:37:24.220000
CVE-2024-28795,0,1,85ca001fb3cb03d4dd36866bdc97c8f8215d3ca21adf9037272467b426417389,2024-07-01T12:37:24.220000
CVE-2024-28797,0,1,547032bd87708ea3c38ed72ff1608579c72d8cb562887365c52f23dade3c5df7,2024-07-01T12:37:24.220000
CVE-2024-28798,0,1,7079cdbb6247bdbcdcfdd1fc5533ad2b96e5540fb8c26b99397b46bd1e921d4c,2024-07-01T12:37:24.220000
CVE-2024-28794,0,0,5c23b350c07f05077487199b0f30cf4c260d9bb180f15dcf8074d12405596155,2024-07-01T12:37:24.220000
CVE-2024-28795,0,0,85ca001fb3cb03d4dd36866bdc97c8f8215d3ca21adf9037272467b426417389,2024-07-01T12:37:24.220000
CVE-2024-28797,0,0,547032bd87708ea3c38ed72ff1608579c72d8cb562887365c52f23dade3c5df7,2024-07-01T12:37:24.220000
CVE-2024-28798,0,0,7079cdbb6247bdbcdcfdd1fc5533ad2b96e5540fb8c26b99397b46bd1e921d4c,2024-07-01T12:37:24.220000
CVE-2024-28815,0,0,e7bdcd0ac6977f9c059dbb312ad54d9a388fdc8f6a137aa4ed5f32fc20fa20fd,2024-04-30T07:15:48.897000
CVE-2024-28816,0,0,4b9f923b99f4095b32672af0003c81bae1f3b3136774827600fae7accfedcfe3,2024-03-11T12:47:42.653000
CVE-2024-28818,0,0,d36b119687f46041625483716221e120ac5cbacfed027a7a801d492a6a4c86c8,2024-06-27T16:43:48.633000
@ -248168,10 +248186,10 @@ CVE-2024-29034,0,0,abbcb2dba15b8f4921d05a8db211631f1cd87e65f2de49321a196077424f0
CVE-2024-29035,0,0,21701c3dd0407a32f3860c33eba458ab5265ec3a8caf169794b15ed3942b0b5e,2024-04-17T15:31:50.160000
CVE-2024-29036,0,0,f20370765a1c49d0a0bad775fe00268f4f8d50d24ef66d07a4f7dc0500570ad3,2024-03-21T12:58:51.093000
CVE-2024-29037,0,0,d14590394517ae3abb6cee2c5008c5f9a159ea7cb5e3f1665632e06ebb11aadc,2024-03-21T12:58:51.093000
CVE-2024-29038,0,1,05c9a5e0e88713c6ed7f7b51747c9e0457a8b16cb11c423d76ebba30109cceaf,2024-07-01T12:37:24.220000
CVE-2024-29039,0,1,ddb2af3d6258726aacc9170d1bb5e873b3c8db301d5b1bc2db262d122d79ce98,2024-07-01T12:37:24.220000
CVE-2024-29038,0,0,05c9a5e0e88713c6ed7f7b51747c9e0457a8b16cb11c423d76ebba30109cceaf,2024-07-01T12:37:24.220000
CVE-2024-29039,0,0,ddb2af3d6258726aacc9170d1bb5e873b3c8db301d5b1bc2db262d122d79ce98,2024-07-01T12:37:24.220000
CVE-2024-2904,0,0,ad94cde058aa186716aa9a9e0abda85712b8f6121542c812afe32aed48147ca1,2024-03-26T12:55:05.010000
CVE-2024-29040,0,1,6dc4c74085741fe48e095b8ec200d71224a358b6b607ecd146b4e9609c29a4ab,2024-07-01T12:37:24.220000
CVE-2024-29040,0,0,6dc4c74085741fe48e095b8ec200d71224a358b6b607ecd146b4e9609c29a4ab,2024-07-01T12:37:24.220000
CVE-2024-29041,0,0,062cd423858e5d93d3fcaca6dd38a28eee29d2cae2776de71c0c9845b66bbfc2,2024-03-26T12:55:05.010000
CVE-2024-29042,0,0,1acd40f3f2614341c5d235ab7d1243ecc16ed46461e3f61d34bea944cf83e729,2024-03-22T19:02:10.300000
CVE-2024-29043,0,0,a6b5a5b270ee9b198f94a0f09e59dfb944c5cad6bfa0e71af6c157ac0edbbe91,2024-04-10T13:24:00.070000
@ -249612,14 +249630,14 @@ CVE-2024-31216,0,0,d81eedaba41c66ff5403344865ad7320029e4218bc907b5fcd390407a8729
CVE-2024-31217,0,0,5f9cfb0e61249f70dadebe14e4e4386911d46ac33fe3ecd5dce212e07cce5f8c,2024-06-13T18:36:09.010000
CVE-2024-31218,0,0,7bde3095db5888b85ce9669e8bb2502e2c0767a6efc1fdc83c6973eaeb264970,2024-04-08T18:49:25.863000
CVE-2024-31219,0,0,d2d2811e70f71b6e8f1f63a3f7bda6856d7eb5bcd23ce2727f866e79d3b49966,2024-04-15T19:12:25.887000
CVE-2024-3122,0,1,f499bd3334132166b1136e99d883b62905d0bf4a53683e18fa1a73b357bee121,2024-07-01T12:37:24.220000
CVE-2024-3122,0,0,f499bd3334132166b1136e99d883b62905d0bf4a53683e18fa1a73b357bee121,2024-07-01T12:37:24.220000
CVE-2024-31220,0,0,5364fec01a2c522837b9bb1f12dd2e109f09573a57ee59445d858fa07dd681f7,2024-04-08T18:49:25.863000
CVE-2024-31221,0,0,093d7a2a638171e5d3f8cc3b06e5a6b3ca8a7674a42c7ed40ef62927f76d1926,2024-04-08T18:48:40.217000
CVE-2024-31224,0,0,2f84ceb3d774709c2492171042eddaeb6b6b98a31b06a1f67434414d962c7206,2024-04-08T18:48:40.217000
CVE-2024-31225,0,0,775bf5be18a8afccd8a3d22e12b068c166a2b602aedd7e1dec0c49e92715b97b,2024-06-10T18:15:31.123000
CVE-2024-31226,0,0,c551125ecb7e722e7d385d0ba4ae8e898eaf339efee9a69cd1ef9cc05b64e374,2024-05-17T18:36:31.297000
CVE-2024-31229,0,0,7de33a876b6efca66be6426e83eb27e50104659e2ffe406707b9d46bf22d8ac4,2024-04-18T13:04:28.900000
CVE-2024-3123,0,1,7969034960d8468f2e42c9820543aa0d78630ff8823b9e15099413e2773c7cfb,2024-07-01T12:37:24.220000
CVE-2024-3123,0,0,7969034960d8468f2e42c9820543aa0d78630ff8823b9e15099413e2773c7cfb,2024-07-01T12:37:24.220000
CVE-2024-31230,0,0,52cfa4cc0c105e0f4a014468a390d1fae46fb176c8f9a3fd8a419c5888fe92a6,2024-04-10T19:49:51.183000
CVE-2024-31231,0,0,7a90a67619902f8027cbac8e85a666345818bb13d73948331e7d74a3cfb3017b,2024-05-17T18:36:05.263000
CVE-2024-31232,0,0,cad67a9aeb5c3124c1be880038f56dec45c67ef781e0ef4774805dcd0727d613,2024-05-17T18:36:05.263000
@ -250027,16 +250045,16 @@ CVE-2024-31890,0,0,eda850bb7869648d895763435641ab97f0cfe4aeba8f677c829b9f47f4e39
CVE-2024-31893,0,0,12d01c628fd750c0cbf441575efefbf394d1654280d687a3cb134821594970b6,2024-05-24T01:15:30.977000
CVE-2024-31894,0,0,5d58af989adc88e1f21decb4e4b73370061e14ed54479d7579f2f2b5b7332e1e,2024-05-24T01:15:30.977000
CVE-2024-31895,0,0,38db7df97417d61bcac3e1b48b52fd0d409c4088497b5231955dcf460bac575b,2024-05-24T01:15:30.977000
CVE-2024-31898,0,1,fe11d56c38d536e9464d27f478b4e4ead8cc2f4ae21f96cd1641416bd47ac1cc,2024-07-01T12:37:24.220000
CVE-2024-31898,0,0,fe11d56c38d536e9464d27f478b4e4ead8cc2f4ae21f96cd1641416bd47ac1cc,2024-07-01T12:37:24.220000
CVE-2024-3190,0,0,c17e9142af04bd9f9561cc561aacffdced5eb94e572636fb91c22838cccaf428,2024-05-30T13:15:41.297000
CVE-2024-31902,0,1,691e6ecfd39ef5647a37266bd43ffa72513315c6d9b9212e3f86fe6033112d46,2024-07-01T12:37:24.220000
CVE-2024-31902,0,0,691e6ecfd39ef5647a37266bd43ffa72513315c6d9b9212e3f86fe6033112d46,2024-07-01T12:37:24.220000
CVE-2024-31904,0,0,f581f8d898f5db4b0367557c06fa4b666380cc23610e816c03e35138e889ca3c,2024-05-24T01:15:30.977000
CVE-2024-31907,0,0,74fc5f408c523c3e380d6171f8d45977925714d441f8877405f43a83b33e5a79,2024-05-31T19:14:47.793000
CVE-2024-31908,0,0,4b6f6f2b5b77469838acbfd64e3ebfdfd371146b18e2852e2c5d6403c944f986,2024-05-31T19:14:47.793000
CVE-2024-3191,0,0,8cf962bd9b56831bd79ade84a34de9b023bb925809cd58e4b9fc80c44fe6835a,2024-05-17T02:39:45.973000
CVE-2024-31912,0,1,aa5d92155d9377e0899275b7b0915f442f67adec5eede7394462364595dad2c3,2024-07-01T12:37:24.220000
CVE-2024-31912,0,0,aa5d92155d9377e0899275b7b0915f442f67adec5eede7394462364595dad2c3,2024-07-01T12:37:24.220000
CVE-2024-31916,0,0,94e61806cd426947094e5a291fb007ed965faafbc808f6c8a1747542f47fbfa2,2024-06-27T19:25:12.067000
CVE-2024-31919,0,1,e1a4bcababa8183e9c4ef14f216a1b44c4b8ca5fab574febb55bdd32f858ecdc,2024-07-01T12:37:24.220000
CVE-2024-31919,0,0,e1a4bcababa8183e9c4ef14f216a1b44c4b8ca5fab574febb55bdd32f858ecdc,2024-07-01T12:37:24.220000
CVE-2024-3192,0,0,4debefdd9bd6bc1b3acbeb91a28d7567aa83fcce418dfeae513fcc01b4da6f91,2024-06-04T19:20:17.017000
CVE-2024-31920,0,0,3c0045dbbecad7d78d5b9eb044589c2fc290e421e2d5accb9391890092efc90f,2024-04-15T13:15:31.997000
CVE-2024-31921,0,0,732b3dfcff7f3c38928ece374bd7708cd93eb00a4dc0a7d5ac8e2f115b9d7217,2024-04-15T13:15:31.997000
@ -251754,12 +251772,13 @@ CVE-2024-34691,0,0,827395ff4b0bf99f2642a5cd3134d1fe0effa60012a62490a349f26f4db25
CVE-2024-34693,0,0,6da431cb088539cdedaef048562e52acae68c24a7fe449888c5724e281a42b04,2024-06-20T12:43:25.663000
CVE-2024-34694,0,0,c52b0ddd7913e7b99d778e62e2419069bd9d8eb90d9108e75c7e8088bb5608e8,2024-06-17T12:42:04.623000
CVE-2024-34695,0,0,d5ed5d99c8f0d08b73ea3cb249327295e787f14594542dd2f27279ab9312830c,2024-05-14T16:12:23.490000
CVE-2024-34696,1,1,1697446274bb3cd395c26226b01c7397470c20a75a90bbad0605ce462858be0c,2024-07-01T16:37:39.040000
CVE-2024-34697,0,0,95295a45851b4a50f600527e364638272a5d24a08a1ec02edb19abea712755b2,2024-05-14T16:12:23.490000
CVE-2024-34698,0,0,10e59d69dc4df1155204551f8483405755bab4be109bdea52b3a75e369d53b1b,2024-05-14T16:12:23.490000
CVE-2024-34699,0,0,25f405235bcdebbbdbdc15ae858e3622caf3e07dac211b82cab5ea59f42ec719,2024-05-14T16:12:23.490000
CVE-2024-3470,0,0,736c8b21abac392de8987478bb4430873353b2c43829321b68bed57cd49a65ed,2024-04-19T16:19:49.043000
CVE-2024-34701,0,0,5a8c02ffa2fcadb317d10fc6ec8b451b4dcf3f6eab6c63ebf616f401a02dac46,2024-05-14T16:12:23.490000
CVE-2024-34703,0,1,50ae767dd64caa4e000da1f40c8cdbe5042bb6b22c8a9fc5a9800ebff102bcb2,2024-07-01T12:37:24.220000
CVE-2024-34703,0,0,50ae767dd64caa4e000da1f40c8cdbe5042bb6b22c8a9fc5a9800ebff102bcb2,2024-07-01T12:37:24.220000
CVE-2024-34704,0,0,48d6359679289248ce803dfb7b75c17011aaace7b08a8c9d1fc68e47f081bf3e,2024-05-14T16:12:23.490000
CVE-2024-34706,0,0,4726580e4aef314a5fbec04fe3b48a640bc06fa468e915ceb8e4adce9150430f,2024-05-14T16:12:23.490000
CVE-2024-34707,0,0,4ed4d85a391d834d7fb079efda0834353a1979685e57868a3cb454f56a7390b7,2024-05-14T16:12:23.490000
@ -251950,18 +251969,18 @@ CVE-2024-35102,0,0,781492c1bcdcbb91cc24f5b5ff3eacf4542faa6544199a3dcb435c0e7da31
CVE-2024-35108,0,0,3d160490977cee5bde1d3bbae750736ca9206a5392ad0c8f4f20b1d705d7e1b9,2024-05-15T16:40:19.330000
CVE-2024-35109,0,0,1723de5edad4801c113dd0d41cbe0df6c36d556c862ef08d4faf7caa71ed9098,2024-05-15T16:40:19.330000
CVE-2024-35110,0,0,07f2b4eefabbfedf17e2731cca374c4a367989ecaeb945f63f5af7217d209b46,2024-05-17T18:36:05.263000
CVE-2024-35116,0,1,91a0109df1140cd09bc7ea5c08abbe7ae8c48f4ffa4198fd96c193164e9e1703,2024-07-01T12:37:24.220000
CVE-2024-35119,0,1,f8609143b8a4a7a1f03935eb12f8fbcc6d72c76259e212fc26bb3132c6f940ad,2024-07-01T12:37:24.220000
CVE-2024-35116,0,0,91a0109df1140cd09bc7ea5c08abbe7ae8c48f4ffa4198fd96c193164e9e1703,2024-07-01T12:37:24.220000
CVE-2024-35119,0,0,f8609143b8a4a7a1f03935eb12f8fbcc6d72c76259e212fc26bb3132c6f940ad,2024-07-01T12:37:24.220000
CVE-2024-3512,0,0,7186c9ec3829c2082fd68b5fc8e23caed587fdf0f4e68c2974db5f41b90fb514,2024-04-25T13:15:51.663000
CVE-2024-35137,0,1,cfa826c0337668659733864f64c3760d46d614c0438a7a4db6c05f7406c4eeb5,2024-07-01T12:37:24.220000
CVE-2024-35139,0,1,703f975506f06b114406c8e7efad895fe907f2ada95557d6f69e2711957e3dfc,2024-07-01T12:37:24.220000
CVE-2024-35137,0,0,cfa826c0337668659733864f64c3760d46d614c0438a7a4db6c05f7406c4eeb5,2024-07-01T12:37:24.220000
CVE-2024-35139,0,0,703f975506f06b114406c8e7efad895fe907f2ada95557d6f69e2711957e3dfc,2024-07-01T12:37:24.220000
CVE-2024-3514,0,0,fd39bbcd0f0890f4d85c4ccfb46694b71dc6efa7f8c56852e1f4fd99d58e20d2,2024-04-24T17:15:47.423000
CVE-2024-35140,0,0,45c3bb60ea04b1120d4f838be7226beea8411238e0d1eeb8dfdc4424ca0b5ad7,2024-05-31T19:14:47.793000
CVE-2024-35142,0,0,2e771ea16b161d7fa34214dfdb10478412ee26ce44f8ad533bb2991294386c64,2024-05-31T19:14:47.793000
CVE-2024-3515,0,0,5591c01553945d08e143bb397e7b7011721b53594a14b5bacff6fedc69b36f26,2024-04-19T23:15:11.963000
CVE-2024-35153,0,0,86727db419cb843920e5cd4c7a87cf5b7fde13fc70ca82a13eb4d069ddb821d5,2024-06-27T19:25:12.067000
CVE-2024-35155,0,1,c326cd4166d9cbfa34efa54fd988e1d407d8925369f9983f14750e709112308a,2024-07-01T12:37:24.220000
CVE-2024-35156,0,1,e6fb36f1f810f4a246d710cbf82055f27ccde015fb0476ace50a7457c7ac5ea7,2024-07-01T12:37:24.220000
CVE-2024-35155,0,0,c326cd4166d9cbfa34efa54fd988e1d407d8925369f9983f14750e709112308a,2024-07-01T12:37:24.220000
CVE-2024-35156,0,0,e6fb36f1f810f4a246d710cbf82055f27ccde015fb0476ace50a7457c7ac5ea7,2024-07-01T12:37:24.220000
CVE-2024-3516,0,0,c67f1b1a12bf3a4087d8b779d182fd3cd73d7fc172668a9a1561ab7e0601a8e1,2024-04-19T23:15:12.003000
CVE-2024-35162,0,0,096de883de595ba1679c139890301da91a94c85a87a466687ddcd8baf8fe1502,2024-05-22T12:46:53.887000
CVE-2024-35165,0,0,caf63944f08ce101dd14e275b41e5ef9dcf2b386ad9b4bb6b8d83ed28c45d5eb,2024-05-14T16:11:39.510000
@ -252846,6 +252865,7 @@ CVE-2024-36377,0,0,5b3a74790b8404bb50e8903b0a58fbf2f5e8fe3533f993e13f46a55b82f39
CVE-2024-36378,0,0,9a645ab04ee516fa09b03bc4e8214d07cbca3e9e91fbad3f5da1fbc4f30ef72c,2024-05-29T15:18:26.427000
CVE-2024-36383,0,0,024d8f4d1ca5f23e8a0ddc855e927c6f952336db279cffee80e19f08304118ee,2024-05-28T12:39:28.377000
CVE-2024-36384,0,0,2ec0cce63a143f80e95d7d72dd49a2947294c5f3ef9bfcaa5dd3f4682e62278f,2024-05-28T12:39:28.377000
CVE-2024-36387,1,1,55d6bb5f5f4caca9fea17645776897ad58d0c8c8ca4dd78c53dd7fe8b227214d,2024-07-01T19:15:03.497000
CVE-2024-36388,0,0,c862c36965d96dd7dbce4ad8e507845635d584cc35880dbb4a1f42f921fb4889,2024-06-03T14:46:24.250000
CVE-2024-36389,0,0,b7f3ae9ec80f48852fb2df638815a295e32fee22ddec84c26d88db15c966ccd5,2024-06-03T14:46:24.250000
CVE-2024-36390,0,0,b28e05065e61bd7a9bb35d69c3db1c5b9fc640899f1d11e151111ef78e00d787,2024-06-03T14:46:24.250000
@ -252859,6 +252879,7 @@ CVE-2024-36397,0,0,b682d6f470c0dada217073740a5ad29ca1b1f9032f70f4edd7bab7bdfb1f6
CVE-2024-36399,0,0,32a084399fffaab7b007a4925030bc8dfc9c8bbd3d7f25f567b275cd72694397,2024-06-07T14:56:05.647000
CVE-2024-3640,0,0,abbf5a33cbca708fe19710dda7a796491ae1d1614e9cd03f43d6cddef8b09500,2024-05-17T18:36:31.297000
CVE-2024-36400,0,0,6b10ab1f058055da0b7f6513936a46e66d6922b94171c5e956b85881f675cf7c,2024-06-10T19:39:21.660000
CVE-2024-36401,1,1,87e986c6abcb99589eb18d897c1eae35aa261f64a143786484b486b18d465a85,2024-07-01T16:37:39.040000
CVE-2024-36405,0,0,342cb049567ebebbbb5ec2f471f348f7e69a152097c662b875d4729bb76af752,2024-06-10T18:06:22.600000
CVE-2024-36406,0,0,4c4f64b7223e45baf0f4fcf71db77f8f804dae22bb20bd965ed8f0d422b0ddc0,2024-06-10T18:06:22.600000
CVE-2024-36407,0,0,3fa9b8688b87bb89923ff6af2953ac9e3c3d75823a9915954eac5e78dc625b42,2024-06-12T18:17:38.777000
@ -252876,6 +252897,10 @@ CVE-2024-36417,0,0,7f72be2da88bd03f2618a97d909b76dab66b1196af11257e6aa2fac632513
CVE-2024-36418,0,0,52272dc570f5081df6975298e5712cf123b760ef720bb4951287c4366378282e,2024-06-11T13:54:12.057000
CVE-2024-36419,0,0,e561cf6fec966fa1d9dbaeadf6c1b7f0c1186aebf1fa6c9a3ce263fb312ad74d,2024-06-11T13:54:12.057000
CVE-2024-3642,0,0,bbed1ee941355da6f32a6eba37e95a843dd7913c7dd227d8da7f65dcb683674b,2024-05-16T13:03:05.353000
CVE-2024-36420,1,1,e58b727e60b33d8076352d7d95342e64e8bdeb9a8c852f7906107955156df602,2024-07-01T16:37:39.040000
CVE-2024-36421,1,1,2db1f42564f0eaf58b885bc52aa44daebec6dc523b1d77558c17c8fa19b2495f,2024-07-01T16:37:39.040000
CVE-2024-36422,1,1,8982caabe6eb3eda8c34b1bc1a267af26cb5987e2c96eeefaf11d8ef2ed30e14,2024-07-01T16:37:39.040000
CVE-2024-36423,1,1,5808d21430c442b51dfdaf4a352327f95bb4f4fbb5dcea8ace51ffa5a292fa95,2024-07-01T19:15:03.627000
CVE-2024-36426,0,0,b4e77ad9e3c809414d8917ef0e48e37b5fd9f4bf9093f3155502aee0ee6063a0,2024-05-28T12:39:28.377000
CVE-2024-36427,0,0,293226c6bcd994263dc2fdfe762b698685b7c5a39208c64b5ce6ccf8d2a3d9bc,2024-05-29T19:50:25.303000
CVE-2024-36428,0,0,34ee364c5a9075f639864e5b9724315f875ffecaf1e3b09c0e9021977a7b8d2a,2024-05-28T12:39:28.377000
@ -252943,7 +252968,7 @@ CVE-2024-36599,0,0,9a15a33c7489ab37c6a5fa2897d627b0bcd61f22458c24f2c9412064d5ed8
CVE-2024-3660,0,0,27de83d41a96740d974951cfc0f4ab32e626a768053ae4e7908802eefe823936,2024-04-17T12:48:31.863000
CVE-2024-36600,0,0,528d617ba99d44422001ec52e277c8720af143b7d8228ce2c53d51a37cabe886,2024-06-17T12:42:04.623000
CVE-2024-36604,0,0,38f77f753935bc42c015eb31deee2068198d6e188158d2d88cd9ce30dd28f28e,2024-06-11T14:24:17.413000
CVE-2024-3661,0,0,b665f3ebe2f700b6f4e02ebfa9bd2f64cd39c43e37b9374c2fdfbf4a8d208373,2024-05-08T22:15:49.103000
CVE-2024-3661,0,1,c42cca3fa75d9e1e2e62908451948484a5d5cca5f29f392158a6d0b59eb829bd,2024-07-01T15:15:17.187000
CVE-2024-3662,0,0,aac492e0cb08799a7f888c46af5bedb595fa2e9ad6dc15c21be50e9dae70066e,2024-04-15T13:15:31.997000
CVE-2024-3663,0,0,d70e03397b7b1ab439d27e0f0ba070e0cb9801b42863e8c396c4da4f0822fd7c,2024-05-22T12:46:53.887000
CVE-2024-3664,0,0,afb9452532a9b46276f3e123567931f2d9b14afd62c66b887c9d751f65c725bc,2024-04-23T12:52:09.397000
@ -253140,7 +253165,22 @@ CVE-2024-36977,0,0,211593e58fc9135f9893829a9f2e1a8571662349bd4f1f6e872c0294a0b0d
CVE-2024-36978,0,0,880aef92604c27e5578b53720d6ee7e213e82be3de9f91ee8b3173e75f4b8a26,2024-06-21T14:15:12.407000
CVE-2024-36979,0,0,b5c86fe1e151f03cc7911f2db726f75e908559d8b3402d6614d6fdbd11ceb079,2024-06-20T12:44:01.637000
CVE-2024-3698,0,0,13b4029eb6179dbe788598788e16556a1995d850ddfc4af1ee0c4e86961a3a21,2024-05-17T02:40:04.800000
CVE-2024-36982,1,1,720a5b29c19528b08c004e2599ee7e91f40c5a0e49d020171bd060cc0e38fbf9,2024-07-01T17:15:06.030000
CVE-2024-36983,1,1,e43bfd769871b02d44243c832ff88bf98d414065a6e43d02d2fa773cd4498ed9,2024-07-01T17:15:06.257000
CVE-2024-36984,1,1,59f38e31051cbae9a7f72e47830f76d1f4d0d40626a1f73f85b280c4707511d1,2024-07-01T17:15:06.480000
CVE-2024-36985,1,1,625d81328994a9375519a36f109304e783aacae4b24bf73ca8ba1b84aea43e2a,2024-07-01T17:15:06.703000
CVE-2024-36986,1,1,588be6516e79175f5538e55c5f2c40835c0537cc41649b2736379bd3359cc6eb,2024-07-01T17:15:06.910000
CVE-2024-36987,1,1,97397ca055e5b25c254e8a51a2ad1e55181ea6cd07c7693d048edec5ce41d8da,2024-07-01T17:15:07.120000
CVE-2024-36989,1,1,f348477479b7e2ca8e81aeca2e93931bbe6cf16a5a693b9192caeb1e3e4ee99e,2024-07-01T17:15:07.380000
CVE-2024-3699,0,0,6e64dedcb1ec83e842b9c3ed18b374381a62ef4f7982a43d9405eeb95e55d0fc,2024-06-12T17:53:09.130000
CVE-2024-36990,1,1,feccf877e17235ceb014ab433e830d2444660c43dbe5a714bb8737061fda8da7,2024-07-01T17:15:07.600000
CVE-2024-36991,1,1,b38b5fd71eaba6416504e65ad0df2874f4caab08652393639de506ac8184b334,2024-07-01T17:15:07.860000
CVE-2024-36992,1,1,c7e2cb783ce677910c6c02e042570745035c219cb8fac10c9c2a2b5376e5fc79,2024-07-01T17:15:08.077000
CVE-2024-36993,1,1,15b97f35a4d9fbdb2278cca4b7f372a5f592a51db873c4e61e4e019c28fa7e93,2024-07-01T17:15:08.290000
CVE-2024-36994,1,1,d0d04d362d3212c5b95bb7ce9ec6ce25c55edfa0be721b31dce546aea166d122,2024-07-01T17:15:08.500000
CVE-2024-36995,1,1,93a08d8e2d5b8511aa21eb125b70d14197a6298e2bd37af958d3c76aa037351c,2024-07-01T17:15:08.707000
CVE-2024-36996,1,1,6919ea94da08dc971161b98fc08f1f24bc4def3bdaaba05b42502a26d5766ae2,2024-07-01T17:15:08.917000
CVE-2024-36997,1,1,838e31730e1b08e055d05fdb50ee396471d474145e4b628a303f7c706c036c5e,2024-07-01T17:15:09.143000
CVE-2024-36999,0,0,e623ac69d78c1d872fd9d23ebed97cd66e8b6293086bcd7909366177ce71d4fe,2024-06-25T12:24:17.873000
CVE-2024-3700,0,0,f1913b84964a9a87ca4f78bbad55a262819a35385e2c066c91eaa7c4a1891262,2024-06-12T17:51:52.710000
CVE-2024-37000,0,0,a7ce938c2375111dcdf9fa56d08df7bf8307bd849e0b0ce2b6f89977fd5cc422,2024-06-25T12:24:17.873000
@ -253213,6 +253253,8 @@ CVE-2024-37139,0,0,4be213816842328a788d9a10ebbbecaea533491c62f7e03adf240d5d001bd
CVE-2024-3714,0,0,29d3de80cc1f6e0ff07b09e17d8d58f6e17e5f0164ed94da7b2235ed17131c18,2024-05-20T13:00:34.807000
CVE-2024-37140,0,0,681b63037246d6321b6224834e07a5ad4187e2f092d956b5d7b807798dd34579,2024-06-26T12:44:29.693000
CVE-2024-37141,0,0,b03df6d0d6f897b221dc842eaee3003cdd6e5a584378ab9df9bc91aaf0755cad,2024-06-26T12:44:29.693000
CVE-2024-37145,1,1,5e7043b940d4d81444d5ca800a839309a64d040e40da1c7e8a1f81a2e86d239a,2024-07-01T19:15:03.853000
CVE-2024-37146,1,1,28416a03fc0d822a32d3396dc39ac2a0ceb9489e176ce09612e8d31a9fd4a714,2024-07-01T19:15:04.070000
CVE-2024-3715,0,0,902861be5261e2c029ed83a5c6920fde180817c53e05bb93208dc31c820658c5,2024-05-02T18:00:37.360000
CVE-2024-37150,0,0,97cf533630a2e81b430f11fe12ccc7be397791e2299035e9f7d7a243e494791c,2024-06-07T14:56:05.647000
CVE-2024-37152,0,0,d5beb8b2bc90de99efc40fac5a89948f3b2a0d50610a65220e35a91d41ce9369,2024-06-07T14:56:05.647000
@ -253270,6 +253312,7 @@ CVE-2024-37294,0,0,dba61618bee02ef566742444e7eb5067ca185e0e0eae11447db5592bae3ee
CVE-2024-37295,0,0,662d929824214c7fff6239fd0cadb69f087cb8fadd0e20b8c2ce1e7a7f7cea9a,2024-06-13T18:36:45.417000
CVE-2024-37296,0,0,826a4550d8e9d39613007103b9df8380921c5398e5d4340e9a94d8f4d4fd6545,2024-06-13T18:36:45.417000
CVE-2024-37297,0,0,844fdaf34ac899555229d4e1974e5dea6d78c5be5b55398949dab756934b53d6,2024-06-13T18:36:09.010000
CVE-2024-37298,1,1,d90789612b8869d5579049898d1c3f374ebfb9b769fecef892daa5a24164f456,2024-07-01T19:15:04.283000
CVE-2024-3730,0,0,a30960de1676c855ee35b61976bc4581959cd1a98a7ba3127a461fb7fc955146,2024-04-25T13:18:02.660000
CVE-2024-37300,0,0,7a8b0144b5518f42a2503b23de88b2ac1dd643d024476f6cf726712d7722e352,2024-06-13T18:36:09.010000
CVE-2024-37301,0,0,450b2bcc32537519af2d171a1a4f4dec398481df24494eefa7c4bfacafd1cdd4,2024-06-13T18:36:09.013000
@ -253310,8 +253353,8 @@ CVE-2024-37367,0,0,aac603db5bb919680e2cd819ce6cb6ca25ea592fb28f92a3759e9a2fd18ea
CVE-2024-37368,0,0,956c028a8638d3a3e19949beb7545c84f68f21d91e6b291904004a55453a08ce,2024-06-17T12:42:04.623000
CVE-2024-37369,0,0,7108a286445619350057461b39fedff0137563337148ca5c14290fc641ad2c5e,2024-06-17T12:42:04.623000
CVE-2024-3737,0,0,e288f29127240d626de190f33aa5cc85cc615dc26f102a0c00221aa9708716e3,2024-05-17T02:40:05.887000
CVE-2024-37370,0,1,8a7076b3e8e134b661d21db6f90c7a50b93b1e481cf692861b0a2c3450767bad,2024-07-01T12:37:24.220000
CVE-2024-37371,0,1,70d55bf05c2eee0a9f3b94ddc604e302a9c39f7d842ab9266b20a4c2d600c9ba,2024-07-01T12:37:24.220000
CVE-2024-37370,0,0,8a7076b3e8e134b661d21db6f90c7a50b93b1e481cf692861b0a2c3450767bad,2024-07-01T12:37:24.220000
CVE-2024-37371,0,0,70d55bf05c2eee0a9f3b94ddc604e302a9c39f7d842ab9266b20a4c2d600c9ba,2024-07-01T12:37:24.220000
CVE-2024-3738,0,0,0968d9618a10c036b25eaa390531466819e491a5c992bcf4c715af4b591b9121,2024-05-17T02:40:05.977000
CVE-2024-37383,0,0,c0362d3d95fe11bdc30f3c36377b27485de734d675fe1b90f60703cfe5051656,2024-06-17T15:15:51.517000
CVE-2024-37384,0,0,2bdb7db18773042dbfcf7b4442179738e059134c1a70f1a6d09b92e8cfe2872e,2024-06-17T15:15:51.640000
@ -253463,7 +253506,7 @@ CVE-2024-37899,0,0,d1ca9681182b91f088e5f797405e7825c7152f645c96ca832bd3fa971ed68
CVE-2024-3790,0,0,ea62135e66a6e7a74daddc8d443b8b9750f000d596c0e5f30e202f53e21ec40b,2024-05-14T16:11:39.510000
CVE-2024-37902,0,0,64cca10e7e3ace20e9d59c9293b434dbb2c9acda55554e640303530aeeaef0aa,2024-06-20T12:44:22.977000
CVE-2024-37904,0,0,7359ae18b288eca288056e2ff119b59a0b9c9bbf3f0e5a23aea1f27fd550dd3f,2024-06-20T12:44:01.637000
CVE-2024-37905,0,1,76667799c8b41a4c84b1440977b5297bf4074f7f71d64c5e6ed0abc93aad04a6,2024-07-01T12:37:24.220000
CVE-2024-37905,0,0,76667799c8b41a4c84b1440977b5297bf4074f7f71d64c5e6ed0abc93aad04a6,2024-07-01T12:37:24.220000
CVE-2024-3791,0,0,9bc6cec70e672f5f7f9ccdb1c0603c19b269c41965293930113b85d0de980142,2024-05-14T16:11:39.510000
CVE-2024-3792,0,0,cf023b5179bed164faad65630e21cc1d1811b19d16667a2b08c63260eab0a5be,2024-05-14T16:11:39.510000
CVE-2024-3793,0,0,ee3137e362c58246aa5051457614bdcb92cca84e4e50c79d141ea28f09937fab,2024-05-14T16:11:39.510000
@ -253524,7 +253567,7 @@ CVE-2024-38312,0,0,a025bc282a0932c71cb95ccc5342a2a383a8f77cb388790ae2ac3d82d89cf
CVE-2024-38313,0,0,1c234fe7a87659718d48f2a88e14944f64c41ea923fa0d6325e8d4b1e192fda1,2024-06-17T12:43:31.090000
CVE-2024-38319,0,0,b424d3c1ce5233c9ed183de13fbb6b30d800a84b86175662e040e79a80011cf5,2024-06-24T12:57:36.513000
CVE-2024-3832,0,0,1075b96952121645fbb81b228e0c3813e39db7e21c4c9aa1fc24c30b61618c13,2024-04-23T18:15:15.187000
CVE-2024-38322,0,1,2ad94da74065acba3b226c62072e2f5047b092e831ca2ac4223b96f7198e87ca,2024-07-01T12:37:24.220000
CVE-2024-38322,0,0,2ad94da74065acba3b226c62072e2f5047b092e831ca2ac4223b96f7198e87ca,2024-07-01T12:37:24.220000
CVE-2024-38329,0,0,6a4543a55a7780ada6e17c79a82dd0a8355d271b676150df85f00b992a580a6b,2024-06-20T12:44:01.637000
CVE-2024-3833,0,0,ba630503495cf2aaf1fce7ce704a30930ed35eb1665a53e19102e8c18f607a36,2024-05-03T03:16:28.940000
CVE-2024-3834,0,0,a6e69ceb5a64ba9dfba23cdfa4c02e2549bf746772815229f9a627159689f77e,2024-05-03T04:15:09.043000
@ -253541,9 +253584,9 @@ CVE-2024-38361,0,0,a76df29cb5f27115adee4ca4e20976361dfcfc6eae95b97031ba2314a1f45
CVE-2024-38364,0,0,af41b56a7f2f7758c06f324097079d559fb0340d3186315d52e465f177fe03d2,2024-06-26T12:44:29.693000
CVE-2024-38369,0,0,fdff0768878da5d618998a51bbfecfa3dac560d76fa8e5e20682482a3b336371,2024-06-26T14:47:05.077000
CVE-2024-3837,0,0,5046b04f6fff161407832d91f839d6c01f3dcf30bcf75f620bfd7221b5de1c27,2024-05-03T03:16:29.010000
CVE-2024-38371,0,1,89525bd0cac36f8169b7c7660aac33ce1fe77dbe859f180f5d0a019c34cd3913,2024-07-01T12:37:24.220000
CVE-2024-38371,0,0,89525bd0cac36f8169b7c7660aac33ce1fe77dbe859f180f5d0a019c34cd3913,2024-07-01T12:37:24.220000
CVE-2024-38373,0,0,44bd01362bd05dfdecb2d241c2e4e4fe52c2264760c405bf6f3f48fb0d969aff,2024-06-26T15:02:05.100000
CVE-2024-38374,0,1,b039c6889e3b25105130cda3cb4d6252830c58349362eac54e70e39939e4b1b2,2024-07-01T12:37:24.220000
CVE-2024-38374,0,0,b039c6889e3b25105130cda3cb4d6252830c58349362eac54e70e39939e4b1b2,2024-07-01T12:37:24.220000
CVE-2024-38375,0,0,ded65bab8580f207fa6313539998812618b08a20bbdd5d51ce7200bdf863d856,2024-06-27T12:47:19.847000
CVE-2024-38379,0,0,d0af2d7e81a6285c1c7099c958a4a50ce3d2f639bd068091599f2b1327853e0b,2024-06-24T12:57:36.513000
CVE-2024-3838,0,0,bd55ca068ebe4472845bce1f3d037932d27279da54b129864c942318cbf6c399,2024-04-23T18:15:15.410000
@ -253585,8 +253628,14 @@ CVE-2024-38468,0,0,d4c6d48d530a65ce7d90662f3fd07d6f0801b061b80f57001958e3c05da71
CVE-2024-38469,0,0,61f8d4e00b8eb0d7cc440bb61aa54e448e7d0cf937bc39055bad05a42163dd83,2024-06-20T12:44:22.977000
CVE-2024-3847,0,0,a2146e655749d60cf9631f855db42a3d44cf07cd9a542fd1035e46bb9a6304c5,2024-05-03T03:16:29.293000
CVE-2024-38470,0,0,4c268a4f5b43704204ee0794f0d14b8ed1a9214a7b71a5011526bcfa496d0f17,2024-06-20T12:44:22.977000
CVE-2024-38472,1,1,8ffb46c12bd8d431e0c0c987e97a25e214579f1730a18340b552e6eb55cf6eea,2024-07-01T19:15:04.563000
CVE-2024-38473,1,1,d21e0856d8185b878740b4ebbb1476c02411ae9b8efdbaaf23c78a0caa733c1b,2024-07-01T19:15:04.657000
CVE-2024-38474,1,1,b5c48db99dbb237478cf4ffcd8bb4477b835688d62f83221ddb3623f160b4b3d,2024-07-01T19:15:04.760000
CVE-2024-38475,1,1,562efb50429591c25efbc74f1f37c8bec5dcbe875539786fa9dbbf3dfbf556df,2024-07-01T19:15:04.883000
CVE-2024-38476,1,1,0021e1bbd87c9469815c8c2032faa10839ab1262bc0298cabcbb2112e3d12dc5,2024-07-01T19:15:04.977000
CVE-2024-38477,1,1,4594f8a978440be2aaa74df16a3605c0d784eb6c001f169de2cc265b8bb10e9c,2024-07-01T19:15:05.083000
CVE-2024-3848,0,0,cff2d1cd97f0b1f2183f9bb4edcf4fc45d9e2b8ab251b9953f6af6105249c0ec,2024-05-16T13:03:05.353000
CVE-2024-38480,0,1,04c4f9e75ecb94da8a57533882d0899c4c9616c45f6d4f0fa40fb0af2c036f64,2024-07-01T12:37:24.220000
CVE-2024-38480,0,0,04c4f9e75ecb94da8a57533882d0899c4c9616c45f6d4f0fa40fb0af2c036f64,2024-07-01T12:37:24.220000
CVE-2024-3849,0,0,d4181d6192aab2f4a2b324451fbda7660fbd9621eb95f5f54a642a6a3d1e7d46,2024-05-02T18:00:37.360000
CVE-2024-3850,0,0,bbe49076d39470df53cdf5186eea91a2b4a40256492f588a1ab86bd1ba5244b0,2024-06-12T18:12:56.413000
CVE-2024-38504,0,0,1e5426a2fc921f282b30067463f89deeb7f3dcc78ec818fa823270612233ac4d,2024-06-20T12:44:01.637000
@ -253594,23 +253643,24 @@ CVE-2024-38505,0,0,be5aaa1dcdfd8c2aa334d5f57235bcc4cc51742ebd9414669481e2364aff4
CVE-2024-38506,0,0,f0cad7be1bf66b2843860132c4a1c6f7d61e84c638e965683ddee0cfb22e3838,2024-06-20T12:44:01.637000
CVE-2024-38507,0,0,a0f746b2efdaa14b7b3a19b053b62c389c989bd3db7005a96c00e53930c09585,2024-06-20T12:44:01.637000
CVE-2024-3851,0,0,16bcb9f87255ebcf1aad2856af6894b1b0c36049b98621e173e693ad3a900330,2024-05-16T13:03:05.353000
CVE-2024-38514,0,1,20901c301d0b800903255c5b44f5dc35cf1b46988f760c885c8c2631fef64104,2024-07-01T12:37:24.220000
CVE-2024-38513,1,1,d86dcd99d4ef7cfcee7d6e0d74f36baa99978f9f8448376941eae63fcd21152a,2024-07-01T19:15:05.173000
CVE-2024-38514,0,0,20901c301d0b800903255c5b44f5dc35cf1b46988f760c885c8c2631fef64104,2024-07-01T12:37:24.220000
CVE-2024-38515,0,0,a4e93bf008d994404518fb6f8f4cb2097325f0beeca2a32bbb087976322bd094,2024-06-27T13:16:00.717000
CVE-2024-38516,0,0,1e8a930f3bd7a4d706b02f40cc5af32d0943db58e97c615d4b2fd82bf154a7f3,2024-06-26T12:44:29.693000
CVE-2024-38518,0,1,aa2f02f8ed86bcfd7fc6b425ddf1679e310303c5dfcfa85d7522473c60b19adb,2024-07-01T12:37:24.220000
CVE-2024-38518,0,0,aa2f02f8ed86bcfd7fc6b425ddf1679e310303c5dfcfa85d7522473c60b19adb,2024-07-01T12:37:24.220000
CVE-2024-3852,0,0,3038e46972183e994310b2b410f139aaace8bd74e7e7e979d336a57b5feba459,2024-04-22T10:15:07.430000
CVE-2024-38520,0,0,41960473f376d2053670358f1b74b11612e5d6f0cfeae75c4ae0b80f5904ac0a,2024-06-27T12:47:19.847000
CVE-2024-38521,0,1,2311d8af284d8ecd997452bb188fd1cef58d4fe05ff15f59ded69f45525ae8c7,2024-07-01T12:37:24.220000
CVE-2024-38522,0,1,ab564dc444a369fc5518b1b865033967f292e4b44f2517e37c5c794af744484c,2024-07-01T12:37:24.220000
CVE-2024-38521,0,0,2311d8af284d8ecd997452bb188fd1cef58d4fe05ff15f59ded69f45525ae8c7,2024-07-01T12:37:24.220000
CVE-2024-38522,0,0,ab564dc444a369fc5518b1b865033967f292e4b44f2517e37c5c794af744484c,2024-07-01T12:37:24.220000
CVE-2024-38523,0,0,ac61dc2188539e4a5eb60d89d7d71145cb5cdc9b9c189d4c888f2c0f8ba6ad05,2024-06-28T10:27:00.920000
CVE-2024-38525,0,1,c6d09ec2ec4a195ad79165c044ef499ca4961803c76ab9f8203674d54bb83420,2024-07-01T12:37:24.220000
CVE-2024-38525,0,0,c6d09ec2ec4a195ad79165c044ef499ca4961803c76ab9f8203674d54bb83420,2024-07-01T12:37:24.220000
CVE-2024-38526,0,0,e120e388df8ce9f77a5f20e08030a40910a306bc162600677388d663f60ddcef,2024-06-26T12:44:29.693000
CVE-2024-38527,0,0,9d30e9caf22ebe74cba027d0e20fbdb3b1d3bd82d6438824209935ed0cb0babb,2024-06-27T12:47:19.847000
CVE-2024-38528,0,1,abe62c0b36f96b72c42ae3a20756e7dee4cdc68dd98be36932d675c96e479202,2024-07-01T12:37:24.220000
CVE-2024-38528,0,0,abe62c0b36f96b72c42ae3a20756e7dee4cdc68dd98be36932d675c96e479202,2024-07-01T12:37:24.220000
CVE-2024-3853,0,0,da9bcb4a065926b49732a0dd79b2f07a12fd9777c9341906bc363e07df8725cf,2024-04-17T12:48:31.863000
CVE-2024-38531,0,1,b56de69adb9e29b508ff804eef5c2919280b3646aaf65838ea0969fdce8b1636,2024-07-01T12:37:24.220000
CVE-2024-38532,0,1,3a3b54122bd6780d32b0357101fa3b70c56bf5cfbd9b29132bcf407b07a6cf4a,2024-07-01T12:37:24.220000
CVE-2024-38533,0,1,bc3eb3ef979bf5295d109db19e6d12afcecc2e011ea06aeec96e0b38c48ef42a,2024-07-01T12:37:24.220000
CVE-2024-38531,0,0,b56de69adb9e29b508ff804eef5c2919280b3646aaf65838ea0969fdce8b1636,2024-07-01T12:37:24.220000
CVE-2024-38532,0,0,3a3b54122bd6780d32b0357101fa3b70c56bf5cfbd9b29132bcf407b07a6cf4a,2024-07-01T12:37:24.220000
CVE-2024-38533,0,0,bc3eb3ef979bf5295d109db19e6d12afcecc2e011ea06aeec96e0b38c48ef42a,2024-07-01T12:37:24.220000
CVE-2024-38538,0,0,fd8d0c414421b9d83404be9e58919f8d1c04c080d100c149e46c3a374cade8e2,2024-06-20T12:44:01.637000
CVE-2024-38539,0,0,bb07b10cb8e27f63a4ad4d8d9f4efc546da28e9a77992ff13895f8e8066ae4a7,2024-06-20T12:44:01.637000
CVE-2024-3854,0,0,1fc25728bc86cd277ba270d144040c69a89e438f315d3ebf85291cac5fb28ebb,2024-04-22T10:15:07.470000
@ -253770,29 +253820,30 @@ CVE-2024-3895,0,0,e17d122bfb4ca0c486d0790093f87ef90da21ea7556181e7099c23bc52ef24
CVE-2024-38950,0,0,fa51116204c8dd85f77aaa29c376757e8a69dd65423c416717d298ef0c99923c,2024-06-27T12:47:19.847000
CVE-2024-38951,0,0,2fe865287281e18bfc8391e5fdd7f9b2e7ca4d1df39a0017b43b5090b5aae2cc,2024-06-25T18:50:42.040000
CVE-2024-38952,0,0,7a7903cf5c57a02ae11664bc1f5ff958307bfbaee7b207c7b69a2ab43d958a10,2024-06-25T18:50:42.040000
CVE-2024-38953,1,1,14ff5a9bfe221f516876a8c4af423fbe5b0080aa7f8d53caea4e126c078e6038,2024-07-01T16:37:39.040000
CVE-2024-3897,0,0,2e6547d98bffe49274878683fd846b0dea4d063f5cc123163d759ecec392b068,2024-05-02T18:00:37.360000
CVE-2024-38987,1,1,ed58d31c516be72d666726b08edbac80706bab687fc25a13e50121a9ae969b73,2024-07-01T13:15:04.717000
CVE-2024-38990,1,1,f23de5039421dfb7ce2bb09ac68360cc581a98701f750121cff63fa52613d8d2,2024-07-01T13:15:04.807000
CVE-2024-38991,1,1,a94a96142e09f3725c5f33e89e688fe6584ed030410b6ecf0d70d1e8c4518c2e,2024-07-01T13:15:04.863000
CVE-2024-38992,1,1,e35d94cefd99f2cf0fcdc61c724f05a8623da7edcb9abb1e81769daa2818cfe8,2024-07-01T13:15:04.930000
CVE-2024-38993,1,1,71a4d0af421ed5a829d6616d580d813af4c9db0671d1f92861bdabac78700dfc,2024-07-01T13:15:04.987000
CVE-2024-38994,1,1,fc4ead1b214157ecf2fc185633c9fea55f43dc8acf0ead5fb3b0505cfa18364f,2024-07-01T13:15:05.047000
CVE-2024-38996,1,1,9a18ced6674a21c6041303b26bfad9b9471a01ea23907adedc220f78a054f0e2,2024-07-01T13:15:05.103000
CVE-2024-38997,1,1,75d30105ccc08685530318a2915f6bf79cfc35d01fb4e3b7e46279e5a10429b9,2024-07-01T13:15:05.160000
CVE-2024-38998,1,1,348e2d3a2591692bdd188f4d13094f55e5530c1224de259338b9d8cd8f3e8039,2024-07-01T13:15:05.223000
CVE-2024-38999,1,1,d13a04f1e9c136983594f08878c950c7e826267a802a2baa0a7f916ec9d8f52c,2024-07-01T13:15:05.280000
CVE-2024-38987,0,1,8e5543bc013d5021cfb12250ec622bf33ff663f5974b5e9efe103d174baf7a3b,2024-07-01T16:37:39.040000
CVE-2024-38990,0,1,c74cd76d2342a02a975f887b4d58b34e2c6967f32f55f6fd8b807d2643621113,2024-07-01T16:37:39.040000
CVE-2024-38991,0,1,5c180588e2b6a01b28db3752bc9cc96858ae39a00587154860cda4368a7ff8f6,2024-07-01T16:37:39.040000
CVE-2024-38992,0,1,2e570cd2eed251f271f85b2df9a7002fa24ca413722447a3a914590d4b8bf475,2024-07-01T16:37:39.040000
CVE-2024-38993,0,1,73faa3d497e0a33b4def022c7b84272bb8e78951f2326d7a1ad62b5574b382c0,2024-07-01T16:37:39.040000
CVE-2024-38994,0,1,623ae3fa8a384c5debb1199bb0204554766de971953ebe0c7f7023a769b62c61,2024-07-01T16:37:39.040000
CVE-2024-38996,0,1,db790449014448ae87f3425d74a96423d4f25d3eefecfad29430c49fe7e6d233,2024-07-01T16:37:39.040000
CVE-2024-38997,0,1,c7d47980841a9b0ae67023e8210b95e8881571b72e18f736bd58e90bcdf41491,2024-07-01T16:37:39.040000
CVE-2024-38998,0,1,edfa0696537e6dc5d0b8e23e28f2391be4352521b0c7fab8f861b804209c04e8,2024-07-01T16:37:39.040000
CVE-2024-38999,0,1,b189bad1ee2babac6b8006a78d8cc7a5bb62af267315bd0a3288f0e149de22ab,2024-07-01T16:37:39.040000
CVE-2024-3900,0,0,5bafaa90d65e26f460054cb65a089d31ecb0030e0f85c3f0ee595a0cce123691,2024-04-17T20:08:21.887000
CVE-2024-39000,1,1,9915c57c9b03ed36f96252e6eabf3df389c3ccbe49eb69c8b76b58648064ef25,2024-07-01T13:15:05.340000
CVE-2024-39001,1,1,63a3f5fdb9fc7d9bb0fef035bfad14164d6c65d69e570075e68f892948c30689,2024-07-01T13:15:05.397000
CVE-2024-39002,1,1,9a8a8f91eca87b13d5cefd59a79f4a4ccfcb549905f50055a483eff1c802d9ff,2024-07-01T13:15:05.450000
CVE-2024-39003,1,1,4ffe2c187b3f6a781815d031b24637c7b3efd680fac3f07a9c03441ea87485ad,2024-07-01T13:15:05.513000
CVE-2024-39008,1,1,23e22db6f3a0de2eae82efcc8d107b63fee2fff89cda5088f26043a3438068a9,2024-07-01T13:15:05.590000
CVE-2024-39013,1,1,0cb2f9055742ad2f49ec66b379ee9a7e82cb7d0c30cf91f544e495584be1927d,2024-07-01T13:15:05.650000
CVE-2024-39014,1,1,1d174bb9bc614bea9ce88f1a35d678a4532ab18fce9fa04ca8199c6774603c02,2024-07-01T13:15:05.703000
CVE-2024-39015,1,1,42b52c28ed72916c8ecf40f6f0649bde0c6f2421728d4ea7e3cee2106f090d4e,2024-07-01T13:15:05.767000
CVE-2024-39016,1,1,f10ea2eefb6c18f61cd0372309413105fee75790d1ea27b0942e6cd3bff062bc,2024-07-01T13:15:05.823000
CVE-2024-39017,1,1,6c025a442e9cecaae66309088c1ab8ad1dbef1c26cffe152b4ad64cda04740b8,2024-07-01T13:15:05.893000
CVE-2024-39018,1,1,0467f48d8b8fd53dc6e05a8419b68bed85b12c5dce888b6c5a06d932f0debf8b,2024-07-01T13:15:05.950000
CVE-2024-39000,0,1,865535b7d65e1d3e0f5a4a2042012fe524a4722997fb77655f1e5a1e941f9c7a,2024-07-01T16:37:39.040000
CVE-2024-39001,0,1,82f6001aa2dce6119be50984c18101b4a6aacb440c096b445d257d239da9aac4,2024-07-01T16:37:39.040000
CVE-2024-39002,0,1,f730aa8ef147d70b2879c78c6f1f0ff1f81c5a139e4c9775f359b7cb8ab78f63,2024-07-01T16:37:39.040000
CVE-2024-39003,0,1,e5716538bdbd78a5bfa5a9af017cbf026b973b733106e9129e879a9709c8ab3f,2024-07-01T16:37:39.040000
CVE-2024-39008,0,1,cb7f345a6d5a41be6d2526fac2444be15490818f118d2679ea4e85f1012f9719,2024-07-01T16:37:39.040000
CVE-2024-39013,0,1,7f8924a5f1b67cca0d5ab6af0e7a96c4ff89036dd75053e53c271e93cc4cf209,2024-07-01T16:37:39.040000
CVE-2024-39014,0,1,85f2582cc6d7f5ddbf77aca86106a65d54d3111a3f65f930f3405599f2535e10,2024-07-01T16:37:39.040000
CVE-2024-39015,0,1,8f692a337ec522916ee5f18e47a1f67b243e32141d1032ce0a36774d8ca787f7,2024-07-01T16:37:39.040000
CVE-2024-39016,0,1,3bc798c511e27939051e75e20febf350d59572d35beeee3b4abe958c2f9ddd4d,2024-07-01T16:37:39.040000
CVE-2024-39017,0,1,10be03ac062a097d6757c937b88f1e992120572b4e181895f1486ee51c2d3d2d,2024-07-01T16:37:39.040000
CVE-2024-39018,0,1,16dc342eb9c9ddff4509558cd4678a205ae33f272029e49d96df9e8a311347f8,2024-07-01T16:37:39.040000
CVE-2024-3903,0,0,b17bb4ec6e0e391a38b8cd510c422de68900922cf0bf4c2e4e48aa68680d6339,2024-05-14T16:11:39.510000
CVE-2024-3905,0,0,a951c486be8869bf12976255205bd7b845c8a04b7efadd3f2b0fe1349880c5bb,2024-06-04T19:20:26.357000
CVE-2024-3906,0,0,2118bc9913869ee4f34c8416c221c77b744d5529f8376fd726e306c6d571b72a,2024-06-04T19:20:26.463000
@ -253825,11 +253876,13 @@ CVE-2024-39209,0,0,846eb9e93730bd8a4e0e342a01db126b493a0877c61de0d40de722388e341
CVE-2024-3921,0,0,dc44586c5c7e1c74f5850e7b4d244cf53da902f950a29ac6c4f232f966454542,2024-05-29T13:02:09.280000
CVE-2024-3922,0,0,9c35bb7d9bca4b5559bb1a4dfea91676bf1d098f4dc5952b2a109bcc30a68d2c,2024-06-13T18:36:09.010000
CVE-2024-3923,0,0,dcd7a979944a34edd9f4dd960691916feb4f3b194c37e215c41a761a1e13cac2,2024-05-14T16:11:39.510000
CVE-2024-39236,1,1,017b4d12d9ef0c2f7e4104a47f66ab75591267ab350fff91c91f2d4d1e0967a4,2024-07-01T19:15:05.420000
CVE-2024-3924,0,0,396cfe762c72fbd5a1960b1ddaed612b95d18abd602e0e4dd151e2967ca06c2d,2024-05-30T18:19:11.743000
CVE-2024-39241,0,0,afa83ae007b8cddb769c7423e9b1caee4c0fe8b440470f4e2aca6500f4f35cee,2024-06-27T12:47:19.847000
CVE-2024-39242,0,0,e6a42d26f8742e08c6e87c2f9736f6a5d1c92d4e99728f3f16ba7aaa3565d9e9,2024-06-27T12:47:19.847000
CVE-2024-39243,0,0,b8130c621cb0dfb964c1992defd80d667f6acc85382d7b6cd314c7c97d98e637,2024-06-27T12:47:19.847000
CVE-2024-3925,0,0,fcd3c5c763e8e19f599e796d0209af93ac6baa71961ded5ca72feb787efdbcae,2024-06-13T18:36:09.010000
CVE-2024-39251,1,1,83aa84a253642014d74820cef4da4b5f960d62ee567a8bb1c69173eeea049f29,2024-07-01T19:15:05.480000
CVE-2024-3926,0,0,95647e23a8e9831b3425be75c3a5409a951b8ebef070821e4342ccb8d8ffe085,2024-05-22T18:59:20.240000
CVE-2024-3927,0,0,b62a8fbb5cbf577eaf3c7a81b1c47c6d426f2a5dda5ebe7d2d0cc2ac17b12044,2024-05-22T12:46:53.887000
CVE-2024-39276,0,0,9d8b391f90466ab92d8bd0be64a929bc81937a2a7adc7e28ba18e29f385bdac0,2024-06-25T18:50:42.040000
@ -253842,8 +253895,9 @@ CVE-2024-39293,0,0,ba4d7546a3208d93eda31b60f338bfefc59f223d8a82bb5367fc84df5351b
CVE-2024-39296,0,0,e260e24d75f61f9e507cbecbe3ae9f7cc9539275110e5bb8afeebe70ced8da66,2024-06-25T18:50:42.040000
CVE-2024-39298,0,0,62f081e1204433b72614003aee17d6ba0c526eacd01605580713226a64a6e578,2024-06-25T18:50:42.040000
CVE-2024-39301,0,0,557c328019f730a5c8c669db41be6ae8d457cdc115700b93300b3651fff5aa25,2024-06-25T18:50:42.040000
CVE-2024-39302,0,1,946c3f23cfe199dda1010c0ea47b1d5e32454ef20b5307dfd8e2dc92485c1baa,2024-07-01T12:37:24.220000
CVE-2024-39307,0,1,c6ba32c8ba3cfcd15570f781df2bcad3fc5cb61b722485741dcbdce4f9e733a2,2024-07-01T12:37:24.220000
CVE-2024-39302,0,0,946c3f23cfe199dda1010c0ea47b1d5e32454ef20b5307dfd8e2dc92485c1baa,2024-07-01T12:37:24.220000
CVE-2024-39303,1,1,570da85f74a800db45595a310d300ec8d2937d6a9616181c043d1959403ae091,2024-07-01T19:15:05.540000
CVE-2024-39307,0,0,c6ba32c8ba3cfcd15570f781df2bcad3fc5cb61b722485741dcbdce4f9e733a2,2024-07-01T12:37:24.220000
CVE-2024-3931,0,0,ff26b5a8728d6a7f3e1f8095f9d431d98f0c624577950ceaf4dc1cf9ad688034,2024-06-06T20:15:13.933000
CVE-2024-3932,0,0,371291a71f9c99e371f96e7d7b61e3e11967567047c07fae80310c4772d1c0c7,2024-06-06T20:15:14.030000
CVE-2024-3933,0,0,1d08d4e317596700be65ef5300f76b449794bb2d8b1542a98c34b9cd74fea015,2024-05-28T12:39:28.377000
@ -253868,11 +253922,11 @@ CVE-2024-3939,0,0,8db4cbfcc78e197894431199cdad6af4ac1ac13ee2f1028e231ba1f9079317
CVE-2024-3940,0,0,52f7bf6d70193ddf6b45db8d32585f84af1f44b7487d20897766e34b437b8581,2024-05-14T16:11:39.510000
CVE-2024-3941,0,0,3315566f834adaa65bc779c72609390662785ebcc4aac50a6cb30731cb96d90c,2024-05-14T16:11:39.510000
CVE-2024-3942,0,0,e822d69f7c80cdc7914f6c6d228f749a2878411b19bb34f624a4ef0b72687edf,2024-05-02T18:00:37.360000
CVE-2024-39427,0,1,78160e98483fcc3aec226f5c047b3b1c0e863dcf72104b16f54bef5ce01d8702,2024-07-01T12:37:24.220000
CVE-2024-39428,0,1,c278d22063c70f7bf9c06407a2b45919d470d1d910aa9da6476a8683a3973a23,2024-07-01T12:37:24.220000
CVE-2024-39429,0,1,c0f0ea0961d667a14523724c8241b9d1f206aa304e922487a3184313c2bdef41,2024-07-01T12:37:24.220000
CVE-2024-39427,0,0,78160e98483fcc3aec226f5c047b3b1c0e863dcf72104b16f54bef5ce01d8702,2024-07-01T12:37:24.220000
CVE-2024-39428,0,0,c278d22063c70f7bf9c06407a2b45919d470d1d910aa9da6476a8683a3973a23,2024-07-01T12:37:24.220000
CVE-2024-39429,0,0,c0f0ea0961d667a14523724c8241b9d1f206aa304e922487a3184313c2bdef41,2024-07-01T12:37:24.220000
CVE-2024-3943,0,0,e07ef944084da93a178b1d893c19c63f640132688c11e19da99f30e04e5e47e2,2024-05-30T13:15:41.297000
CVE-2024-39430,0,1,64e823bdb7084987f6e4f2dcc4ad0f20791cdd196a0003b3469db98557837678,2024-07-01T12:37:24.220000
CVE-2024-39430,0,0,64e823bdb7084987f6e4f2dcc4ad0f20791cdd196a0003b3469db98557837678,2024-07-01T12:37:24.220000
CVE-2024-3945,0,0,87d1ab8fe16ba408f307c5379ed22b3c751c5d4b07b1a3f5bec08826673ff46f,2024-05-30T13:15:41.297000
CVE-2024-39458,0,0,fddd464380a09267e09b57b66272561b89c59455a10d641fa61f771d4f530d41,2024-06-27T12:47:19.847000
CVE-2024-39459,0,0,d1d8498393c450e178fa7bc147e75f870b75d424b183c32cba625d84c2757e63,2024-06-27T12:47:19.847000
@ -253897,6 +253951,7 @@ CVE-2024-3954,0,0,45f1b348fcace6f84e3157e2d0f8a54fc4228bb396d26e03c9556cd235947f
CVE-2024-3955,0,0,bba90f25cff74c274e08a67a3936bf55505a38180fc074269167b54bd0903537,2024-05-02T13:27:25.103000
CVE-2024-3956,0,0,84c84e343f731479baad188521c68e2e10d428da5ee4bd61443cf640ccedc17a,2024-05-14T16:11:39.510000
CVE-2024-3957,0,0,6e4e327328ad5c18e880466a103b162c10591051d90490bf0a67f6889d728425,2024-05-02T18:00:37.360000
CVE-2024-39573,1,1,167c4a1505a6562e31649ba24c74fba60e3ed0212b2b4d7b2e0b94be92a8f873,2024-07-01T19:15:05.760000
CVE-2024-3959,0,0,1ce1302f5c536ae0ba1596a30e53c3274b88d91eb780326b1103788329e8cf86,2024-06-28T13:21:52.223000
CVE-2024-3961,0,0,6646adb167e87c94860ebd5d8d983b1f971f6dc9fb8c86a5eaff8de194f86033,2024-06-21T11:22:01.687000
CVE-2024-3962,0,0,9de964d29f43823164300439a0e71453bbca4a5c1f5767eca51db600267798cd,2024-04-26T12:58:17.720000
@ -253916,14 +253971,16 @@ CVE-2024-3974,0,0,30b94b89b01dd2c6057362330f67dc78937f3f3edffa0c5a57e7602f711f91
CVE-2024-3977,0,0,e9f44416847592725fc2cd47ffed9c743bca75989a5c2d940c73903d22d68b79,2024-06-17T12:42:04.623000
CVE-2024-3978,0,0,338ec55d360d0ecf1dfe595690a2d37e24aa4129fa5a75aae324bfa31cd2fe9a,2024-06-17T12:42:04.623000
CVE-2024-3979,0,0,4ac2126fe63098861061c1ed3772b0712449f42e64a5481492de94fd61a5b947,2024-06-06T20:15:14.127000
CVE-2024-39828,0,1,a076e079a0d15f60c3c4a55d02ae6ed731ea38682b9215046585ce79ae4cfb80,2024-07-01T12:37:24.220000
CVE-2024-39828,0,0,a076e079a0d15f60c3c4a55d02ae6ed731ea38682b9215046585ce79ae4cfb80,2024-07-01T12:37:24.220000
CVE-2024-3984,0,0,bee410e9bf0342c5ecf3886d76050e2314329db97e17f53f9285ff32a0d9ee8f,2024-06-20T12:44:01.637000
CVE-2024-39840,0,1,cf0cef2e05329a1216f74981ebbc4dbc7d10ee8168b70073e5c435ffc0748588,2024-07-01T12:37:24.220000
CVE-2024-39846,0,1,cc3d14fb15e20c985bb7fdeb359e7a12ea1918f79b7c4c3ac03373ad528c69cf,2024-07-01T12:37:24.220000
CVE-2024-39848,0,1,a406e2b5eebf34f795b980d155db1a7147865fe617aee30717a15aea5ad0bfcf,2024-07-01T12:37:24.220000
CVE-2024-39840,0,0,cf0cef2e05329a1216f74981ebbc4dbc7d10ee8168b70073e5c435ffc0748588,2024-07-01T12:37:24.220000
CVE-2024-39846,0,0,cc3d14fb15e20c985bb7fdeb359e7a12ea1918f79b7c4c3ac03373ad528c69cf,2024-07-01T12:37:24.220000
CVE-2024-39848,0,0,a406e2b5eebf34f795b980d155db1a7147865fe617aee30717a15aea5ad0bfcf,2024-07-01T12:37:24.220000
CVE-2024-3985,0,0,73586f1cedc99952324792e19f078c055584e6e606f6222ac3907090ad395ced,2024-05-02T18:00:37.360000
CVE-2024-39853,1,1,614ce4e6b1998c31f6250e746f1f7b62bc498fd80a6e4b9b7e2f8f5f2605f133,2024-07-01T13:15:06.013000
CVE-2024-39853,0,1,2169eba1d28bdc589b024da57c04aeaf5c002fb75bec5b315c751dfe63b8af60,2024-07-01T16:37:39.040000
CVE-2024-3987,0,0,05499205f937534ee026fd5a41dcafd44deae059117eea743b5e3e3c53eaee01,2024-06-07T14:56:05.647000
CVE-2024-39878,1,1,42bd5d378e20b9d91b9be0886685939196ff3f97b01ad8896764241ffb3201b5,2024-07-01T17:15:09.350000
CVE-2024-39879,1,1,43fc0280d82b5c301f40c640c2fb20503de08e49e91c00c8c3342ccd75375f20,2024-07-01T17:15:09.573000
CVE-2024-3988,0,0,ed49ad0e503298ba2fe40c90a665a86dcb918b5087ac61c1edfd746c2ca95d24,2024-04-25T13:18:13.537000
CVE-2024-3989,0,0,41a6b1dcae0354fb8cba40366dc7ed1eeb84d6a6a33689c35123198fe63c8f01,2024-05-14T16:11:39.510000
CVE-2024-3990,0,0,7879115af68e1891db08bd2dafc44fb55db15680f59885de2ed87fd5c16d9492,2024-05-14T16:11:39.510000
@ -253931,14 +253988,14 @@ CVE-2024-3991,0,0,f4b27e31b2ebe06401478accd9d85264142bf207d27ef139c240399354705c
CVE-2024-3992,0,0,ff644523dcb07d662c2bf53b9e125872cf5c9b9df16e03b5f8dec25363b303ae,2024-06-17T12:42:04.623000
CVE-2024-3993,0,0,60132f24d182886d3025f810ce7decb14e0293094944605569519b576c903995,2024-06-17T12:42:04.623000
CVE-2024-3994,0,0,292539249e741e7003c555a5d4fa2182b15a01b393fb04fa15e675750c01906e,2024-04-25T13:18:02.660000
CVE-2024-3995,0,1,6d3e6f6cd4c72294e5e7c28c1ac75c89fb114da3e88fc3375d7179257e92fe77,2024-07-01T12:37:24.220000
CVE-2024-3995,0,1,a7fe690817691037765b680c602849c2a36e767bb2849159693fe5a7864f46cb,2024-07-01T14:15:05.680000
CVE-2024-3997,0,0,507ae8762d75f9d68eda75aa3a6fbbaf1b3579404dfa0ecd9f2978d2aa87a55f,2024-05-24T01:15:30.977000
CVE-2024-4000,0,0,63e68b686bb1abbdcd2ddeab613f2e83d1883c904c164f21a1076ada49583fc9,2024-05-02T18:00:37.360000
CVE-2024-4001,0,0,01ff67c0d3df1be38408b913fb09a0fa8e839c64a815c3de41b48a61aa2ae8cb,2024-06-11T17:27:53.637000
CVE-2024-4003,0,0,9b9be828f15a04db891b79e7c6ebf75d000360176e249e61f2acbb014741196d,2024-05-02T18:00:37.360000
CVE-2024-4005,0,0,db2b7e4cfe0f4bbe30f1cbadd95b4d8d4dea02eb8785d8f487b316678c44068d,2024-06-17T12:42:04.623000
CVE-2024-4006,0,0,cea97555ee62217aaca46943155964ba917aa17a210befae3806ab46c6606005,2024-04-25T17:25:05.903000
CVE-2024-4007,1,1,ea11516500722210b6c05a007ec9e1eaa6b7db62a0d30554fbe50b2ecd3bc5b7,2024-07-01T13:15:06.077000
CVE-2024-4007,0,1,f23e193a2ac303efeb52b231cdfb7f68a21ff7ce4ccf120b52f049303bd3ddaa,2024-07-01T16:37:39.040000
CVE-2024-4008,0,0,d029b79ac31ad712a3b682c30b4ebfe0bc85fbedb677b90d81d7c6af81a5600e,2024-06-18T17:00:01.570000
CVE-2024-4009,0,0,82f6778b19e61d18cb6bad03fb43730c90019cd4ed3dad3648b480d1adbe3427,2024-06-18T17:01:19.897000
CVE-2024-4010,0,0,b0efc140530d7080bd135b9c9b54b60a51a2a7dd68cfd5652cea86eef30822c4,2024-05-15T16:40:19.330000
@ -254699,7 +254756,7 @@ CVE-2024-4930,0,0,6ff76d7aaffb879ad1ba04c82aee4d6862810bf82c41e96981364c74ee8131
CVE-2024-4931,0,0,83efd803f055d34e0373b998807732a66d1be28ff93405fe1ae45ba9ee6af2a3,2024-06-04T19:20:54.543000
CVE-2024-4932,0,0,2da4bffdf4d6e38ae009aae9065c7b2f8049c53fc8beaf73dfbb4354175c5b68,2024-05-17T02:40:43.357000
CVE-2024-4933,0,0,9fe90c4f8856bf6bdad48e78d639ea10366bef215c1d0d507cc52649860ab1b1,2024-06-04T19:20:54.643000
CVE-2024-4934,0,1,f52144af553eb515dced795070f99e99d77931d910da0436f916f26c1830041a,2024-07-01T12:37:24.220000
CVE-2024-4934,0,0,f52144af553eb515dced795070f99e99d77931d910da0436f916f26c1830041a,2024-07-01T12:37:24.220000
CVE-2024-4936,0,0,a731ea39a2abdd8ed5ffb7274944b4c3b5578233bd6509536eab3c4454adaafe,2024-06-17T12:42:04.623000
CVE-2024-4939,0,0,6859feec38f69c636602db339fa7ab03b302bd67a24dc957bb8f045d97aede0c,2024-06-11T17:08:33.350000
CVE-2024-4940,0,0,cb78cb49a43bd348a99dcd2f7e1d39ee831dc08e65c1988e89651f8662313063,2024-06-24T12:57:36.513000
@ -254789,7 +254846,7 @@ CVE-2024-5056,0,0,5222bc315bf81dabb7f1134f85e7a3f8505dd3db79a8b19065f69d6579b775
CVE-2024-5058,0,0,637bd6f1f70bb3cfae7399c322e9c60e1da8c71180964fd405021291b54a0ed9,2024-06-24T19:18:35.517000
CVE-2024-5059,0,0,76adb31a0d874845cc73a32032185732178d0aa5e8e38a32237d0afd9c50a472,2024-06-24T18:49:29.467000
CVE-2024-5060,0,0,908e82bd4ef2431179c104b39273fb8e5e968812815f848a9881f7577e0ff35b,2024-05-24T13:03:05.093000
CVE-2024-5062,0,1,c4bfd24b428765fb9ddf19e7205629f5a96898980bd431291729b4911f485626,2024-07-01T12:37:24.220000
CVE-2024-5062,0,0,c4bfd24b428765fb9ddf19e7205629f5a96898980bd431291729b4911f485626,2024-07-01T12:37:24.220000
CVE-2024-5063,0,0,4f3b2bf7eda673978295341e9126ac2adcd5414f29702cc0cdbc012db466ad60,2024-06-04T19:20:57.760000
CVE-2024-5064,0,0,8095cec9a36e031c818592c3e6e560630244970853fe1a2d62ef41815d0461b5,2024-06-04T19:20:57.870000
CVE-2024-5065,0,0,854da1df0c358fed714b464bc000dc33fba39a0799286dd037bd479cf98e0180,2024-06-04T19:20:57.977000
@ -254892,7 +254949,7 @@ CVE-2024-5188,0,0,f341cd733a67fef7a36812a8f7aa63c3db307a7b91bf1e7665add6435f1983
CVE-2024-5189,0,0,cd3bb13050c91870eb5838446a9e82835db405d95874bd44f6318a59b19e235d,2024-06-13T18:36:45.417000
CVE-2024-5190,0,0,e11755e15485ad7d65ed59ac9abe5cac7f4b4c3e2591d1a6c69b4386ed9dea65,2024-05-22T03:15:08.273000
CVE-2024-5191,0,0,db26f7ce160c714e95bc5c218e0073766ff2ed099b5e6969334cbfc827ce4bc3,2024-06-24T19:25:23.943000
CVE-2024-5192,0,1,94ac7fbc597a0df9997971e94cdeab1dfd0f73279acaa9016d8372a4009213da,2024-07-01T12:37:24.220000
CVE-2024-5192,0,0,94ac7fbc597a0df9997971e94cdeab1dfd0f73279acaa9016d8372a4009213da,2024-07-01T12:37:24.220000
CVE-2024-5193,0,0,4619a3332fd1de828c7e949279cabe4a2b063d71a4e227126d8bf6d303fb6eb4,2024-06-04T19:21:01.867000
CVE-2024-5194,0,0,2277a7390d0159b3dc2e5dfd100175220ffc5f5725f8c88a7a9344e62a79d516,2024-06-04T19:21:01.977000
CVE-2024-5195,0,0,f6d192ea152622e2514b6c95ac0c9e8770ec516eb328b6bc7a2579d1133e54f5,2024-06-04T19:21:02.077000
@ -255176,7 +255233,7 @@ CVE-2024-5589,0,0,dc63c38434ce5bb089af0d0f8aa09f6a46f1fae34dd45c15f4542741dea047
CVE-2024-5590,0,0,ca60332ff9933405c7b9b37e93d2404b53274b9ec741b4065c0c1eadbd60da94,2024-06-03T14:46:24.250000
CVE-2024-5596,0,0,c69cbcadf0a7f1e5940d842c2c9e90907cbda728581a745e7acd494576e03c9c,2024-06-24T12:57:36.513000
CVE-2024-5597,0,0,652827ff26b80eabae5b3eddf519a61b0da7de181ce61fd257911ec48c45cdb0,2024-06-12T18:10:47.080000
CVE-2024-5598,0,1,dea97cf43130ffc7ec8c1e0439cc4a1d595d430c970e2a6bb452f71273924c1c,2024-07-01T12:37:24.220000
CVE-2024-5598,0,0,dea97cf43130ffc7ec8c1e0439cc4a1d595d430c970e2a6bb452f71273924c1c,2024-07-01T12:37:24.220000
CVE-2024-5599,0,0,e4d8d3217ca804a33354b51b54e1f3f41ce0e1fc1f554dedfe90ad1a46a87370,2024-06-11T18:24:39.057000
CVE-2024-5601,0,0,e22064ef868b7763ab6a035a66dc94fbf47f776f059b7b471d5873c49e582f7a,2024-06-28T13:25:40.677000
CVE-2024-5605,0,0,4bb70fac398eb5e1fc6a3b8761dcfee9993510711b196c5d9f90dc1e34c785a3,2024-06-20T12:43:25.663000
@ -255193,7 +255250,7 @@ CVE-2024-5637,0,0,96c491286509bbcdcc2ade7ab7cd058d8e2fb8f26719ef46502e504a5a75b3
CVE-2024-5638,0,0,ecd29107ace2c39372f8ad7d26b6d92a031cf986dc4e07d96162e8140ebd097d,2024-06-10T02:52:08.267000
CVE-2024-5639,0,0,2322b8156dee01dfdab7b2069be6e0698e3a8613a841329b71822c874a14aeb7,2024-06-24T19:24:23.883000
CVE-2024-5640,0,0,86163b3d741cee0a4e50ef8553f0c82f1f0c15bd48d022d2d250ef0f55c23f10,2024-06-07T14:56:05.647000
CVE-2024-5642,0,0,7b25f43c33c92189aa58dfe27c3529e76b5c1727a65112b54b10daf8f290647f,2024-06-28T19:15:07.357000
CVE-2024-5642,0,1,473e29d44a01c1bd9d78a11628480be9d88df99635e7b451adc74e5ff8ecb62e,2024-07-01T14:15:05.807000
CVE-2024-5645,0,0,1faba0fd6e05694e3fff7011c206b3ecee3c45fddb7e6c575993af231224a181,2024-06-11T17:57:47.197000
CVE-2024-5646,0,0,23240aeec5f40e46e6951e19eff4b72273567c29932f06ca0851d3144bb5ebaa,2024-06-13T18:36:09.013000
CVE-2024-5649,0,0,dc95f59c6efdf5cedf3d7e0f6c5bd262dc96a14a6be79337241ad862a0888246,2024-06-20T12:44:01.637000
@ -255209,7 +255266,7 @@ CVE-2024-5661,0,0,e5f9f024a347e2b9638122ecde70323a03d416b3bde93f8e4f604cfeef08f4
CVE-2024-5662,0,0,c30bff5b2d503274ccfb42c77a6a2f90af33779b4134c5919fad644e092eec26,2024-06-28T10:27:00.920000
CVE-2024-5663,0,0,e65ed9bd668d6456ce5b39954ddd0ae3860f1cde2bd069c4d43e4b5601627808,2024-06-10T02:52:08.267000
CVE-2024-5665,0,0,cf98b8118d31a45b868938fcf4b0239a4be77d7cb3995f06e552251067a9cecd,2024-06-11T17:47:45.033000
CVE-2024-5666,0,1,c2cb648af5be31cc7b97e094a0871dd39fea80d2d3a0f373e615f5ae502553a5,2024-07-01T12:37:24.220000
CVE-2024-5666,0,0,c2cb648af5be31cc7b97e094a0871dd39fea80d2d3a0f373e615f5ae502553a5,2024-07-01T12:37:24.220000
CVE-2024-5671,0,0,b302da9933b51baa02aebe638443397fc8a4c366af898c1301a8da6525832546,2024-06-17T12:42:04.623000
CVE-2024-5673,0,0,f6db27a8b7c99bb0a58922425d96edcb461eeb527f78adfd8d9aed9c99330140,2024-06-11T18:17:10.037000
CVE-2024-5674,0,0,69b0f5cdcc6414c1b3093ac76e322fc42e17eb869b8f1b328084f458395232cf,2024-06-13T18:36:09.010000
@ -255236,7 +255293,7 @@ CVE-2024-5700,0,0,bf41828814d49bd1ca21d234dd56d9b9baae6eae1faa482eef0b223ac08cde
CVE-2024-5701,0,0,c0b77ae9f34889006ada566ff239d80e91c1e1e51e6239a509f45a6d387ce8ce,2024-06-11T13:54:12.057000
CVE-2024-5702,0,0,050114b692a9d22e1a3779ff238583d9efc9d6e8072ff7c077a659f94eb85b8c,2024-06-19T10:15:11.583000
CVE-2024-5710,0,0,bbba5caf4cb4f465fb2a1f44424b7af778bd56d5f1b17eb3b38248b8a0397322,2024-07-01T10:15:30.183000
CVE-2024-5712,0,1,782e6f09ec4801a2090922da0634157b6b0760d6d2ff619b99db06cdc44198b4,2024-07-01T12:37:24.220000
CVE-2024-5712,0,0,782e6f09ec4801a2090922da0634157b6b0760d6d2ff619b99db06cdc44198b4,2024-07-01T12:37:24.220000
CVE-2024-5714,0,0,d09606fe85d7a014a058870c51f9ff79e6af54534c316b686a2562e2d0e92e3e,2024-06-27T19:25:12.067000
CVE-2024-5724,0,0,03384c71395c84af225b0ffa60ba9818c028df2b73c4ae064cd0a263a53e8317,2024-06-20T12:44:01.637000
CVE-2024-5727,0,0,1fbc88a30e9a1b5b66ae83f1b3e85e2a5fb8114d9d41f9dac322c2902c1d92bd,2024-06-28T10:27:00.920000
@ -255283,7 +255340,7 @@ CVE-2024-5785,0,0,b8e4d96c063df13aad53416cef79463db3c390621a0b569b6ab0f4db2568be
CVE-2024-5786,0,0,ed5396800d42f59a8cc5d452fd1faa0265b1965bb10ec68fd437a404a4a909e1,2024-06-10T18:06:22.600000
CVE-2024-5787,0,0,a3d405a0f4e66faab3a863affeada58e47a227c5d73cf2b53ea525af4385d342,2024-06-13T18:36:09.010000
CVE-2024-5788,0,0,b8c011e09345f8c438c15d748dc7ecb5f2eb62164ea0c1da7169d985a2f9f593,2024-06-28T10:27:00.920000
CVE-2024-5790,0,1,f8b87ca5470f9146716524e5e38538dc26468d2ae797b52818768e7113cbca8a,2024-07-01T12:37:24.220000
CVE-2024-5790,0,0,f8b87ca5470f9146716524e5e38538dc26468d2ae797b52818768e7113cbca8a,2024-07-01T12:37:24.220000
CVE-2024-5791,0,0,424014ca254e257c8c57009775e061d0dd2abf87fc81691a50ea6d1a360bb310,2024-06-24T20:00:46.390000
CVE-2024-5796,0,0,ee9ea77d6816c67e871ce0ce39c4d235af8efb4db7bec50166a494d6f8b7e47e,2024-06-28T10:27:00.920000
CVE-2024-5798,0,0,f6c60b5ac812e7711b355fdc9c4ea7ca1c381d5fa9189e95b5ac079c15b31d9c,2024-06-13T18:36:09.010000
@ -255291,13 +255348,13 @@ CVE-2024-5805,0,0,d5f814a63108fa76cde55a23a7ee4c9d4c1228e8f74ac6f24226e1e9997c15
CVE-2024-5806,0,0,05eca3ac8c1d3a60beb467559e1d11b02293b85393edfc15424ba5e922097af5,2024-06-26T00:15:11.293000
CVE-2024-5812,0,0,b231b6b4b2edc3b100956cc90803ec880aa99de51e5a0f50bc4b9e381c5722ed,2024-06-13T18:36:45.417000
CVE-2024-5813,0,0,d695683c807a1777a11ef158e495934f31ab7056ebdb25d58f5f11112f2d1965,2024-06-13T18:36:45.417000
CVE-2024-5819,0,1,ff5f9599a99761c75338a6f351d5018b6b4257daf87dc238a533c6ea2133dd27,2024-07-01T12:37:24.220000
CVE-2024-5819,0,0,ff5f9599a99761c75338a6f351d5018b6b4257daf87dc238a533c6ea2133dd27,2024-07-01T12:37:24.220000
CVE-2024-5820,0,0,40e5523c17b003adbda0efbab055fe88c8ffe6387f321010b47ba3ba7dc113ac,2024-06-27T19:25:12.067000
CVE-2024-5822,0,0,56a6bfde1d559870c5646a0b76a29e939be7faac2a950947fe32abc1f4907e47,2024-06-27T19:25:12.067000
CVE-2024-5824,0,0,71b3b99a3563d3bd6941378b1fc516ea3658f7355f6e899285275a2e97c693cb,2024-06-27T19:25:12.067000
CVE-2024-5825,0,0,800930249192b4fb36871d2a50a6622621c6dfa5eae6376e2c2995741b4630b2,2024-06-11T10:15:13.960000
CVE-2024-5826,0,0,e0d3dade8a07433249d59b1aea8b4c0765b07d04d2f9cc584b2c1dc787708da4,2024-06-27T19:25:12.067000
CVE-2024-5827,0,1,2115c4e97523e0aa0a8beec64c71961c8ec1201ab92e9e9dd09f28cef85192d3,2024-07-01T12:37:24.220000
CVE-2024-5827,0,0,2115c4e97523e0aa0a8beec64c71961c8ec1201ab92e9e9dd09f28cef85192d3,2024-07-01T12:37:24.220000
CVE-2024-5829,0,0,ece2333b3f7675cb0340d51c6d538163a9e25ac5d3d71e718ed0157d499370ee,2024-06-11T14:15:13.150000
CVE-2024-5830,0,0,5f4bf808197d5a7b772747b643a0383fdea3711f7dd7ea33605632692edfb8a3,2024-06-20T16:06:51.777000
CVE-2024-5831,0,0,c35637e034efcc83b783b4655f443c13f97dc7117fc74da74daea6635b01f1bf,2024-06-20T16:07:02.127000
@ -255330,7 +255387,7 @@ CVE-2024-5871,0,0,83e6d3ea3d7363cdcbcb485d9161ada2b3d6bba887290fa58ab89820983d40
CVE-2024-5873,0,0,4affe4b1f71505ca05298a33c7e23c3ae147869580237755bed2d180fbea1b8e,2024-06-12T08:15:51.550000
CVE-2024-5885,0,0,3a664b64c018213b23c270dac1c0f4e2c55b9d60dc4c41c7b81af3f039474644,2024-06-27T19:25:12.067000
CVE-2024-5886,0,0,0c13c4ee009af0d9946120b2238809bd0a7459b4e90701a2a72b91121b1d711b,2024-06-20T11:15:56.580000
CVE-2024-5889,0,1,ebd4b75d771d00f2396bbc91f1ca197e49e2f67600230e37c6f00ba36324b089,2024-07-01T12:37:24.220000
CVE-2024-5889,0,0,ebd4b75d771d00f2396bbc91f1ca197e49e2f67600230e37c6f00ba36324b089,2024-07-01T12:37:24.220000
CVE-2024-5891,0,0,da4ba5748ecb097f5befd86d4787f2c76143132bf594110b21f16b774e08e15d,2024-06-13T18:36:09.010000
CVE-2024-5892,0,0,890747e3858b777381fac245c58cda030faeadae1530ec4012d9670fde261a4e,2024-06-13T18:36:09.013000
CVE-2024-5893,0,0,8bbdd4fceee6f55f46acaf4e2e772cd5b071a8548251271838818c6acd356beb,2024-06-13T18:36:09.010000
@ -255348,13 +255405,13 @@ CVE-2024-5909,0,0,135cc10869213a459dd71b8b5da7a5af9b37ed5f304a5a3bf425c78b00034c
CVE-2024-5922,0,0,e29cc1185c6dbfaaa56af47c566fc115571f883f702dae9a40d1739b93329831,2024-06-28T10:27:00.920000
CVE-2024-5924,0,0,c5c85908e1bc3136c78f0f5690507eea3ba6b330ba27c618aeeb0cde0122c6a0,2024-06-17T12:43:31.090000
CVE-2024-5925,0,0,9927dea575613975cb1f3595ae91835696c41f49e37b56a7c3c9724b111ba81c,2024-06-28T10:27:00.920000
CVE-2024-5926,0,1,5989118d1e74694dc8d29d11155e46063f80693ec0514642081f5dd4d07f562d,2024-07-01T12:37:24.220000
CVE-2024-5926,0,0,5989118d1e74694dc8d29d11155e46063f80693ec0514642081f5dd4d07f562d,2024-07-01T12:37:24.220000
CVE-2024-5927,0,0,19c3cc8f6784d442d3026759cebf43551fd4d736175a291c91056bccb3b59092,2024-06-13T11:15:48.917000
CVE-2024-5933,0,0,43c62c8c7b78a3986e6c8a8e384c2c83973a07919e7ff71c58e74be82b63ae22,2024-06-27T19:25:12.067000
CVE-2024-5934,0,0,688a30e1a6237b69634d3ab7eb078a5b0fdbb09f93730eb6244fa568165f0ccc,2024-06-14T16:15:14.647000
CVE-2024-5935,0,0,21662e5830e79e4b40d11ee8d4ca61a28a55ce393198f32f5a0fb22a492448a1,2024-06-27T19:25:12.067000
CVE-2024-5936,0,0,dab5c088e03544c88b5524610f0cab10458f16230a50e10902868220b9e1d9db,2024-06-27T19:25:12.067000
CVE-2024-5942,0,1,91637ecc81e7589bc0eaad02ef323d1d25bb9ad71b90d21943c07b937e076993,2024-07-01T12:37:24.220000
CVE-2024-5942,0,0,91637ecc81e7589bc0eaad02ef323d1d25bb9ad71b90d21943c07b937e076993,2024-07-01T12:37:24.220000
CVE-2024-5945,0,0,16d17edcf79dde7bc004547e40419569c5bdcb3c9d1fafd4da124c600699d701,2024-06-24T19:24:00.433000
CVE-2024-5947,0,0,7906fe5496c2633ac624599b4fcbe00d50eb988a8b518b82e602f8ca90719dc3,2024-06-17T12:43:31.090000
CVE-2024-5948,0,0,b50c023e3e038877d6c3f637d61b3c39fec4c81c008590663dc7a0096fec685c,2024-06-17T12:43:31.090000
@ -255405,6 +255462,7 @@ CVE-2024-6045,0,0,2dcda6a0cbff8cd9e195f4d3ab65f0210762794017ec56ef72ed3655d46b17
CVE-2024-6046,0,0,91371f2b9afd0a654dc4dc6a88ac5fb04a186cb82713804dda3cac2d7733c344,2024-06-18T11:15:52.513000
CVE-2024-6047,0,0,4cdf0f1acff12373f8f857c8d442b9de2221d44745323cc3f60bf66bccd7a239,2024-06-17T14:15:13.040000
CVE-2024-6048,0,0,03e9485ef23720c113f11fed6c539200d9a1624e025ca24798cddf9d0c1a9e3b,2024-06-17T12:42:04.623000
CVE-2024-6050,1,1,304778e708041d822ddb3dbacfa423baa973c842b9b5dea1cb2a29aed7ec7b6d,2024-07-01T16:37:39.040000
CVE-2024-6054,0,0,dbd3e49036b5938301871d5a6c67ee17ba89370e3288082b00ca89a51a1f06ed,2024-06-28T13:11:58.810000
CVE-2024-6055,0,0,7490ef4c1367b62a13fc44ec964fb12263f9fa479e5bd4bbc3820296c19002e0,2024-06-20T12:44:22.977000
CVE-2024-6056,0,0,9210a6d5e69cda44c36495fe4964320c8f6a47f4e723a559827fc7a6d2ee595f,2024-06-20T12:44:22.977000
@ -255446,7 +255504,7 @@ CVE-2024-6125,0,0,85b92914638eb24a081146fd823c584c2333b183768ef26d618955e8364631
CVE-2024-6127,0,0,8f3f3591469382ebb006087ec5b5be799ca274948ebd71b090f997c1ae2c89a9,2024-06-28T10:27:00.920000
CVE-2024-6128,0,0,cd2531d89b3a76f4be34b5ead44f5b65458326ae9dfb5c97dcd0243e237eb5b3,2024-06-21T16:15:12.570000
CVE-2024-6129,0,0,dfa20fd20a0a3099fcdc2f66c56de27040819ee45bd7efe66cb95f894b77d645,2024-06-20T12:44:01.637000
CVE-2024-6130,0,1,f4b647f0047f578fe057faac21db7670b7977afa1d31bb2fa4fd50dc12004c54,2024-07-01T12:37:24.220000
CVE-2024-6130,0,0,f4b647f0047f578fe057faac21db7670b7977afa1d31bb2fa4fd50dc12004c54,2024-07-01T12:37:24.220000
CVE-2024-6132,0,0,c816ab5ddbf096dbfac6131f33b5d3d3e264dd5fbb695e6c347719e5920b43ca,2024-06-20T12:44:01.637000
CVE-2024-6139,0,0,5267393f199f3e6d04675c179e30c182dfe9af96089cf21d4ca0eef7a0895473,2024-06-27T19:25:12.067000
CVE-2024-6142,0,0,23f480e47c156f1dad9ad13e0d7590969d38d5491fbe00b3021017412ace7767,2024-06-20T12:44:01.637000
@ -255498,7 +255556,7 @@ CVE-2024-6252,0,0,468e259f2025efbae92579ad89a45c9f2c8b2e33c6f209272de57a1e66debc
CVE-2024-6253,0,0,a6e4514e5a27665a5cb6260b36ae56e5c2da14fd9a2d1da643a44ff2f3f2cb21,2024-06-25T18:15:12
CVE-2024-6257,0,0,2981da6c17c705bcf0d80e44b1fa14b0c6655b2077fb275b971c6bc5c7c2b720,2024-06-25T18:50:42.040000
CVE-2024-6262,0,0,f703f7a7fbd3e1fe9efa1e5946752e209a081bf36124182aca731e3f05a363a4,2024-06-27T12:47:19.847000
CVE-2024-6265,0,1,dd53419ac5d71f3843314be14fea17b7338fd9f39ae5539064d4c12df7d66cd7,2024-07-01T12:37:24.220000
CVE-2024-6265,0,0,dd53419ac5d71f3843314be14fea17b7338fd9f39ae5539064d4c12df7d66cd7,2024-07-01T12:37:24.220000
CVE-2024-6266,0,0,f14331da5cd861226d53e015f2a1f08c9e1d5e7f7b1b843a3feb7cb151cc145a,2024-06-24T12:57:36.513000
CVE-2024-6267,0,0,d0d81696a0fe56042eb20b9f0c7d606c3ec4ab44f43adaf7633e08749cae8d6a,2024-06-24T15:15:12.093000
CVE-2024-6268,0,0,f6b5ab227c5a0cba5e0d9764b3a65d1dea83e5d9d7e49ede9770a3daceae2872,2024-06-26T20:15:16.893000
@ -255537,7 +255595,7 @@ CVE-2024-6344,0,0,f8fe072181ab91a453822e0b523eb31f74817bc4efb68c7d2134a2d41a8e35
CVE-2024-6349,0,0,f01d61e3475192c945ec3639c2eda3b231a23d2f279c2f15b4719385fb2bd065,2024-06-26T15:15:20.690000
CVE-2024-6354,0,0,b70a2915a44ee7e7e6c00925c9a92ab9e6b070beaff28ea6d89d1a4dcb2a10e6,2024-06-27T12:47:19.847000
CVE-2024-6355,0,0,ae01fd3dff3a0136dc0dcda0f0c62bd72a4c84afe63740fbe5ae0aaceef04f3e,2024-06-27T14:15:16.753000
CVE-2024-6363,0,1,821afe251d4d71225fc87e03c6904bf5a4c1b246a1e7e806532ba337c88c686a,2024-07-01T12:37:24.220000
CVE-2024-6363,0,0,821afe251d4d71225fc87e03c6904bf5a4c1b246a1e7e806532ba337c88c686a,2024-07-01T12:37:24.220000
CVE-2024-6367,0,0,7207995286cd77894417e443ceec13186f4617a3d835dc70f545e6022e4f6dc9,2024-06-27T12:47:19.847000
CVE-2024-6368,0,0,15233ad7ff1f989e7bdf86db89d9527b042f90cc8844e61c0b9d2d12d522b414,2024-06-27T18:15:21.083000
CVE-2024-6369,0,0,c793378edfea0b2a8c32a50d08899943167a983433e0948af5044c43e0a7ad33,2024-06-27T12:47:19.847000
@ -255546,16 +255604,18 @@ CVE-2024-6371,0,0,4c649bc248258025ed325d77948a1f8525c46141bb22c90a65b416ad94095e
CVE-2024-6372,0,0,ec8243842e1fb3e0d20056a877723ac3e2b0533a4741cd15fbbcbf6a553aa1c3,2024-06-27T17:11:52.390000
CVE-2024-6373,0,0,ffc7549884eeecbe338ce0f17f670d62abf2209962cbc27b0291f9ddbed7c163,2024-06-27T18:15:22.280000
CVE-2024-6374,0,0,951e3f10ed1a8de2c137bcf7721b529de76cab1c6430f8094753092eaf9ecd40,2024-06-27T17:11:52.390000
CVE-2024-6387,1,1,def0cd53bff2180f22c8386406858a074b5d800b54f09a90a201f896b646bc47,2024-07-01T13:15:06.467000
CVE-2024-6375,1,1,63966b93eb46e16d023260fad8c0d7013b7249b4716b3dc1473565015805b694,2024-07-01T16:37:39.040000
CVE-2024-6376,1,1,5b1144f575b26ee71024cb47efd50b0c100b6444589a68c6e121da4ff25018c3,2024-07-01T16:37:39.040000
CVE-2024-6387,0,1,bbe5287c80348c6c5eb476ea80c57557c69d7b3a93ee33f1331d87bccd4ebc3f,2024-07-01T19:15:06.037000
CVE-2024-6388,0,0,e641c9d869769d4291da87145b48d15b4f200c046d6b100142bc686375a84738,2024-06-27T17:11:52.390000
CVE-2024-6402,0,1,795485c4534407e246daec51c1daaa33b95f6651688fed743a8fb9054cdaedba,2024-07-01T12:37:24.220000
CVE-2024-6403,0,1,e44b9cfa8d9ae367e624a8cdf179ef52ea1e98c2115d7a956299d17747a6a56b,2024-07-01T12:37:24.220000
CVE-2024-6405,0,1,fdb62e3d2213e21f6cf3d269e158ee31cc07c01f1a5a460b466ccce5203f82ee,2024-07-01T12:37:24.220000
CVE-2024-6414,0,1,ae0d661be5f3239fdfe6f0d08030fef27c03212dc1e12675bcf532fd90369002,2024-07-01T12:37:24.220000
CVE-2024-6415,0,1,2d930efbf55d72578aa6f6117194938fd91dbe48efc49659be82131c011d6129,2024-07-01T12:37:24.220000
CVE-2024-6416,0,1,1d3038bca30e2041aec4c6f6e9ac2c7cb38b0b032dbc11dcdc7f3d31ad18d01f,2024-07-01T12:37:24.220000
CVE-2024-6417,0,1,29f9a4ce41522fa0140910babecf0fc99e85f4d49ac0eb1b6a99dc830b0f22e3,2024-07-01T12:37:24.220000
CVE-2024-6418,0,1,b63bb78bc20fc7c9074df0590cf44ede2aa2ea9145f7e2ea976342cbbc9ede3c,2024-07-01T12:37:24.220000
CVE-2024-6419,0,1,e1f22570d75c49fa5726171947ce4e56ea60b543707fecfaebe18f84b2ff48d5,2024-07-01T12:37:24.220000
CVE-2024-6424,1,1,2322218d8ccd442e034bc04efb06decf5dba85d2673806f1b6db6fb6b6b4910d,2024-07-01T13:15:06.690000
CVE-2024-6425,1,1,df671561299025e9d439ba96a2d660e26f555163397ba92a938dc0f695e82466,2024-07-01T13:15:06.927000
CVE-2024-6402,0,0,795485c4534407e246daec51c1daaa33b95f6651688fed743a8fb9054cdaedba,2024-07-01T12:37:24.220000
CVE-2024-6403,0,0,e44b9cfa8d9ae367e624a8cdf179ef52ea1e98c2115d7a956299d17747a6a56b,2024-07-01T12:37:24.220000
CVE-2024-6405,0,0,fdb62e3d2213e21f6cf3d269e158ee31cc07c01f1a5a460b466ccce5203f82ee,2024-07-01T12:37:24.220000
CVE-2024-6414,0,0,ae0d661be5f3239fdfe6f0d08030fef27c03212dc1e12675bcf532fd90369002,2024-07-01T12:37:24.220000
CVE-2024-6415,0,0,2d930efbf55d72578aa6f6117194938fd91dbe48efc49659be82131c011d6129,2024-07-01T12:37:24.220000
CVE-2024-6416,0,0,1d3038bca30e2041aec4c6f6e9ac2c7cb38b0b032dbc11dcdc7f3d31ad18d01f,2024-07-01T12:37:24.220000
CVE-2024-6417,0,0,29f9a4ce41522fa0140910babecf0fc99e85f4d49ac0eb1b6a99dc830b0f22e3,2024-07-01T12:37:24.220000
CVE-2024-6418,0,0,b63bb78bc20fc7c9074df0590cf44ede2aa2ea9145f7e2ea976342cbbc9ede3c,2024-07-01T12:37:24.220000
CVE-2024-6419,0,0,e1f22570d75c49fa5726171947ce4e56ea60b543707fecfaebe18f84b2ff48d5,2024-07-01T12:37:24.220000
CVE-2024-6424,0,1,8d5a2fd0dee2ac07d57032a1c81c2c412cad276a027b89c1b7d3574f7c28481d,2024-07-01T16:37:39.040000
CVE-2024-6425,0,1,adbfecb8c3cc947ec785870957655621e37e6a4ecfa332482b1b765f471fc897,2024-07-01T16:37:39.040000

Can't render this file because it is too large.