Auto-Update: 2024-07-19T20:00:18.321575+00:00

This commit is contained in:
cad-safe-bot 2024-07-19 20:03:15 +00:00
parent ffdbb37dd2
commit 70e7b8e70f
39 changed files with 2064 additions and 317 deletions

View File

@ -2,7 +2,7 @@
"id": "CVE-2021-3163",
"sourceIdentifier": "cve@mitre.org",
"published": "2021-04-12T21:15:14.340",
"lastModified": "2024-05-17T02:00:18.753",
"lastModified": "2024-07-19T19:15:06.277",
"vulnStatus": "Modified",
"cveTags": [
{

View File

@ -2,7 +2,7 @@
"id": "CVE-2021-33026",
"sourceIdentifier": "cve@mitre.org",
"published": "2021-05-13T23:15:07.367",
"lastModified": "2024-05-17T01:57:47.060",
"lastModified": "2024-07-19T19:15:05.890",
"vulnStatus": "Modified",
"cveTags": [
{

View File

@ -2,7 +2,7 @@
"id": "CVE-2021-35196",
"sourceIdentifier": "cve@mitre.org",
"published": "2021-06-21T23:15:10.723",
"lastModified": "2024-05-17T01:58:33.717",
"lastModified": "2024-07-19T19:15:06.043",
"vulnStatus": "Modified",
"cveTags": [
{

View File

@ -2,7 +2,7 @@
"id": "CVE-2021-38614",
"sourceIdentifier": "cve@mitre.org",
"published": "2021-08-12T23:15:09.143",
"lastModified": "2024-05-17T01:59:41.637",
"lastModified": "2024-07-19T18:15:04.450",
"vulnStatus": "Modified",
"cveTags": [
{

View File

@ -2,7 +2,7 @@
"id": "CVE-2021-41503",
"sourceIdentifier": "cve@mitre.org",
"published": "2021-09-24T20:15:07.373",
"lastModified": "2024-05-17T02:01:13.137",
"lastModified": "2024-07-19T18:15:04.580",
"vulnStatus": "Modified",
"cveTags": [
{

View File

@ -2,36 +2,116 @@
"id": "CVE-2022-48834",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2024-07-16T13:15:10.983",
"lastModified": "2024-07-16T13:43:58.773",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-07-19T18:00:51.173",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\nusb: usbtmc: Fix bug in pipe direction for control transfers\n\nThe syzbot fuzzer reported a minor bug in the usbtmc driver:\n\nusb 5-1: BOGUS control dir, pipe 80001e80 doesn't match bRequestType 0\nWARNING: CPU: 0 PID: 3813 at drivers/usb/core/urb.c:412\nusb_submit_urb+0x13a5/0x1970 drivers/usb/core/urb.c:410\nModules linked in:\nCPU: 0 PID: 3813 Comm: syz-executor122 Not tainted\n5.17.0-rc5-syzkaller-00306-g2293be58d6a1 #0\n...\nCall Trace:\n <TASK>\n usb_start_wait_urb+0x113/0x530 drivers/usb/core/message.c:58\n usb_internal_control_msg drivers/usb/core/message.c:102 [inline]\n usb_control_msg+0x2a5/0x4b0 drivers/usb/core/message.c:153\n usbtmc_ioctl_request drivers/usb/class/usbtmc.c:1947 [inline]\n\nThe problem is that usbtmc_ioctl_request() uses usb_rcvctrlpipe() for\nall of its transfers, whether they are in or out. It's easy to fix."
},
{
"lang": "es",
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: usb: usbtmc: corrige un error en la direcci\u00f3n de la tuber\u00eda para las transferencias de control. El syzbot fuzzer inform\u00f3 un error menor en el controlador usbtmc: usb 5-1: directorio de control BOGUS, la tuber\u00eda 80001e80 no coincide con bRequestType 0 ADVERTENCIA: CPU: 0 PID: 3813 en drivers/usb/core/urb.c:412 usb_submit_urb+0x13a5/0x1970 drivers/usb/core/urb.c:410 M\u00f3dulos vinculados en: CPU: 0 PID: 3813 Comm : syz-executor122 No contaminado 5.17.0-rc5-syzkaller-00306-g2293be58d6a1 #0 ... Seguimiento de llamadas: usb_start_wait_urb+0x113/0x530 drivers/usb/core/message.c:58 usb_internal_control_msg drivers/usb/core /message.c:102 [en l\u00ednea] usb_control_msg+0x2a5/0x4b0 drivers/usb/core/message.c:153 usbtmc_ioctl_request drivers/usb/class/usbtmc.c:1947 [en l\u00ednea] El problema es que usbtmc_ioctl_request() usa usb_rcvctrlpipe( ) para todas sus transferencias, ya sean de entrada o de salida. Es f\u00e1cil de arreglar."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.4.187",
"versionEndExcluding": "5.10.108",
"matchCriteriaId": "5F01618E-D6DB-46C8-B08C-503F1C05D234"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.11",
"versionEndExcluding": "5.15.31",
"matchCriteriaId": "F25C317E-A673-47D1-844E-171C9BFDF352"
}
]
}
]
}
],
"metrics": {},
"references": [
{
"url": "https://git.kernel.org/stable/c/10a805334a11acd547602d6c4cf540a0f6ab5c6e",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/5f6a2d63c68c12cf61259df7c3527a0e05dce952",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/700a0715854c1e79a73341724ce4f5bb01abc016",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/c69aef9db878ab277068a8cc1b4bf0cf309dc2b7",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/e9b667a82cdcfe21d590344447d65daed52b353b",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
}
]
}

View File

@ -2,92 +2,15 @@
"id": "CVE-2024-22682",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-01-30T01:16:00.020",
"lastModified": "2024-07-19T17:15:02.603",
"vulnStatus": "Modified",
"cveTags": [
{
"sourceIdentifier": "cve@mitre.org",
"tags": [
"disputed"
]
}
],
"lastModified": "2024-07-19T19:15:08.093",
"vulnStatus": "Rejected",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "DuckDB <=0.9.2 and DuckDB extension-template <=0.9.2 are vulnerable to malicious extension injection via the custom extension feature. NOTE: this is disputed by the vendor because the report only demonstrates that an attacker with access to a victim's privileges can replace any file with any other file."
},
{
"lang": "es",
"value": "DuckDB &lt;=0.9.2 y DuckDB extension-template &lt;=0.9.2 son vulnerables a la inyecci\u00f3n de extensiones maliciosas a trav\u00e9s de la funci\u00f3n de extensi\u00f3n personalizada."
"value": "Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that it was not a security issue. Notes: none."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-89"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:duckdb:duckdb:*:*:*:*:*:*:*:*",
"versionEndIncluding": "0.9.2",
"matchCriteriaId": "B85FB41B-1FBC-427C-AC66-7FC42EB7EB9A"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/Tu0Laj1/database_test",
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
]
},
{
"url": "https://github.com/duckdb/duckdb/discussions/12893",
"source": "cve@mitre.org"
}
]
"metrics": {},
"references": []
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-26278",
"sourceIdentifier": "security@joomla.org",
"published": "2024-07-09T17:15:14.970",
"lastModified": "2024-07-09T18:18:38.713",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-07-19T18:53:12.727",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -15,8 +15,41 @@
"value": "El componente Custom Fields no filtra correctamente las entradas, lo que genera un vector XSS."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 6.1,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 2.7
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
},
{
"source": "security@joomla.org",
"type": "Secondary",
@ -28,10 +61,46 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:joomla:joomla\\!:*:*:*:*:*:*:*:*",
"versionStartIncluding": "3.7.0",
"versionEndExcluding": "3.10.16",
"matchCriteriaId": "45B2F66C-96AF-453F-8C06-B17A15595924"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:joomla:joomla\\!:*:*:*:*:*:*:*:*",
"versionStartIncluding": "4.0.0",
"versionEndExcluding": "4.4.6",
"matchCriteriaId": "039D1E9C-9564-41C8-8D02-77A9B9677540"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:joomla:joomla\\!:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.0.0",
"versionEndExcluding": "5.1.2",
"matchCriteriaId": "797E36B6-6CB9-4D30-8B13-33333BDBC71F"
}
]
}
]
}
],
"references": [
{
"url": "https://developer.joomla.org/security-centre/939-20240705-core-xss-in-com-fields-default-field-value.html",
"source": "security@joomla.org"
"source": "security@joomla.org",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-26279",
"sourceIdentifier": "security@joomla.org",
"published": "2024-07-09T17:15:15.047",
"lastModified": "2024-07-10T09:15:02.400",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-07-19T18:53:34.103",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -15,8 +15,41 @@
"value": "El filtrado de contenido inadecuado genera vulnerabilidades XSS en varios componentes."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 6.1,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 2.7
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
},
{
"source": "security@joomla.org",
"type": "Secondary",
@ -28,10 +61,46 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:joomla:joomla\\!:*:*:*:*:*:*:*:*",
"versionStartIncluding": "3.0.0",
"versionEndExcluding": "3.10.16",
"matchCriteriaId": "7800ED00-61B2-45F7-929F-3464D2E83CDD"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:joomla:joomla\\!:*:*:*:*:*:*:*:*",
"versionStartIncluding": "4.0.0",
"versionEndExcluding": "4.4.6",
"matchCriteriaId": "039D1E9C-9564-41C8-8D02-77A9B9677540"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:joomla:joomla\\!:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.0.0",
"versionEndExcluding": "5.1.2",
"matchCriteriaId": "797E36B6-6CB9-4D30-8B13-33333BDBC71F"
}
]
}
]
}
],
"references": [
{
"url": "https://developer.joomla.org/security-centre/938-20240704-core-xss-in-wrapper-extensions.html",
"source": "security@joomla.org"
"source": "security@joomla.org",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-30105",
"sourceIdentifier": "secure@microsoft.com",
"published": "2024-07-09T17:15:17.200",
"lastModified": "2024-07-09T18:18:38.713",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-07-19T18:59:11.433",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -40,6 +40,16 @@
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
},
{
"source": "secure@microsoft.com",
"type": "Secondary",
@ -51,10 +61,61 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:microsoft:.net:*:*:*:*:*:*:*:*",
"versionStartIncluding": "8.0.0",
"versionEndIncluding": "8.0.7",
"matchCriteriaId": "2260CD28-E80F-4FFC-B8DA-44CC726FBD83"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:microsoft:visual_studio_2022:*:*:*:*:*:*:*:*",
"versionStartIncluding": "17.4.0",
"versionEndExcluding": "17.4.21",
"matchCriteriaId": "9079F629-6958-469E-AF83-8030B145E354"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:microsoft:visual_studio_2022:*:*:*:*:*:*:*:*",
"versionStartIncluding": "17.6.0",
"versionEndExcluding": "17.6.17",
"matchCriteriaId": "B1C74913-B238-4B3C-8F2D-37FFCCAB5E9E"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:microsoft:visual_studio_2022:*:*:*:*:*:*:*:*",
"versionStartIncluding": "17.8.0",
"versionEndIncluding": "17.8.12",
"matchCriteriaId": "C4D4B43A-9B2F-4FCC-8A24-11F102A42BCB"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:microsoft:visual_studio_2022:*:*:*:*:*:*:*:*",
"versionStartIncluding": "17.10.0",
"versionEndIncluding": "17.10.4",
"matchCriteriaId": "A4CAA048-BCAA-4CBA-81DA-E8748C441017"
}
]
}
]
}
],
"references": [
{
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-30105",
"source": "secure@microsoft.com"
"source": "secure@microsoft.com",
"tags": [
"Patch",
"Vendor Advisory"
]
}
]
}

View File

@ -2,20 +2,91 @@
"id": "CVE-2024-33180",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-07-16T16:15:04.767",
"lastModified": "2024-07-16T18:00:02.110",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-07-19T18:56:27.127",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Tenda AC18 V15.03.3.10_EN was discovered to contain a stack-based buffer overflow vulnerability via the deviceId parameter at ip/goform/saveParentControlInfo."
},
{
"lang": "es",
"value": "Se descubri\u00f3 que Tenda AC18 V15.03.3.10_EN contiene una vulnerabilidad de desbordamiento del b\u00fafer basada en pila a trav\u00e9s del par\u00e1metro deviceId en ip/goform/saveParentControlInfo."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-787"
}
]
}
],
"configurations": [
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:tendacn:ac18_firmware:15.03.3.10:*:*:*:*:*:*:*",
"matchCriteriaId": "330A6DE5-8F04-492C-B167-0071ACDBF7AC"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:tendacn:ac18:-:*:*:*:*:*:*:*",
"matchCriteriaId": "FCF0F551-6E6C-48D6-9C2A-740B84AF0349"
}
]
}
]
}
],
"metrics": {},
"references": [
{
"url": "https://palm-vertebra-fe9.notion.site/saveParentControlInfo_1-7c9695d0251945ae8006db705b9b80ac",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Exploit"
]
}
]
}

View File

@ -2,20 +2,91 @@
"id": "CVE-2024-33182",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-07-16T16:15:04.850",
"lastModified": "2024-07-16T18:00:02.110",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-07-19T18:56:50.050",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Tenda AC18 V15.03.3.10_EN was discovered to contain a stack-based buffer overflow vulnerability via the deviceId parameter at ip/goform/addWifiMacFilter."
},
{
"lang": "es",
"value": "Se descubri\u00f3 que Tenda AC18 V15.03.3.10_EN contiene una vulnerabilidad de desbordamiento del b\u00fafer basada en pila a trav\u00e9s del par\u00e1metro deviceId en ip/goform/addWifiMacFilter."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-787"
}
]
}
],
"configurations": [
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:tendacn:ac18_firmware:15.03.3.10:*:*:*:*:*:*:*",
"matchCriteriaId": "330A6DE5-8F04-492C-B167-0071ACDBF7AC"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:tendacn:ac18:-:*:*:*:*:*:*:*",
"matchCriteriaId": "FCF0F551-6E6C-48D6-9C2A-740B84AF0349"
}
]
}
]
}
],
"metrics": {},
"references": [
{
"url": "https://palm-vertebra-fe9.notion.site/addWifiMacFilter_1-067fa6984f0d4933b88c63efd7486479",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Exploit"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-34113",
"sourceIdentifier": "psirt@adobe.com",
"published": "2024-06-13T12:15:11.110",
"lastModified": "2024-06-13T18:35:19.777",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2024-07-19T18:36:42.237",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -17,6 +17,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5.5,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6
},
{
"source": "psirt@adobe.com",
"type": "Secondary",
@ -41,8 +61,18 @@
},
"weaknesses": [
{
"source": "psirt@adobe.com",
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-326"
}
]
},
{
"source": "psirt@adobe.com",
"type": "Secondary",
"description": [
{
"lang": "en",
@ -51,10 +81,126 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:coldfusion:2021:update1:*:*:*:*:*:*",
"matchCriteriaId": "AFD05E3A-10F9-4C75-9710-BA46B66FF6E6"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:coldfusion:2021:update10:*:*:*:*:*:*",
"matchCriteriaId": "F1FC7D1D-6DD2-48B2-980F-B001B0F24473"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:coldfusion:2021:update11:*:*:*:*:*:*",
"matchCriteriaId": "1FA19E1D-61C2-4640-AF06-4BCFE750BDF3"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:coldfusion:2021:update12:*:*:*:*:*:*",
"matchCriteriaId": "3F331DEA-F3D0-4B13-AB1E-6FE39B2BB55D"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:coldfusion:2021:update13:*:*:*:*:*:*",
"matchCriteriaId": "63D5CF84-4B0D-48AE-95D6-262AEA2FFDE8"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:coldfusion:2021:update2:*:*:*:*:*:*",
"matchCriteriaId": "D57C8681-AC68-47DF-A61E-B5C4B4A47663"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:coldfusion:2021:update3:*:*:*:*:*:*",
"matchCriteriaId": "75608383-B727-48D6-8FFA-D552A338A562"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:coldfusion:2021:update4:*:*:*:*:*:*",
"matchCriteriaId": "7773DB68-414A-4BA9-960F-52471A784379"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:coldfusion:2021:update5:*:*:*:*:*:*",
"matchCriteriaId": "B38B9E86-BCD5-4BCA-8FB7-EC55905184E6"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:coldfusion:2021:update6:*:*:*:*:*:*",
"matchCriteriaId": "5E7BAB80-8455-4570-A2A2-8F40469EE9CC"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:coldfusion:2021:update7:*:*:*:*:*:*",
"matchCriteriaId": "F9D645A2-E02D-4E82-A2BD-0A7DE5B8FBCC"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:coldfusion:2021:update8:*:*:*:*:*:*",
"matchCriteriaId": "6E22D701-B038-4795-AA32-A18BC93C2B6F"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:coldfusion:2021:update9:*:*:*:*:*:*",
"matchCriteriaId": "CAC4A0EC-C3FC-47D8-86CE-0E6A87A7F0B0"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:coldfusion:2023:update1:*:*:*:*:*:*",
"matchCriteriaId": "0AA3D302-CFEE-4DFD-AB92-F53C87721BFF"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:coldfusion:2023:update2:*:*:*:*:*:*",
"matchCriteriaId": "EB88D4FE-5496-4639-BAF2-9F29F24ABF29"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:coldfusion:2023:update3:*:*:*:*:*:*",
"matchCriteriaId": "43E0ED98-2C1F-40B8-AF60-FEB1D85619C0"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:coldfusion:2023:update4:*:*:*:*:*:*",
"matchCriteriaId": "76204873-C6E0-4202-8A03-0773270F1802"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:coldfusion:2023:update5:*:*:*:*:*:*",
"matchCriteriaId": "C1A22BE9-0D47-4BA8-8BDB-9B12D7A0F7C7"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:coldfusion:2023:update6:*:*:*:*:*:*",
"matchCriteriaId": "E3A83642-BF14-4C37-BD94-FA76AABE8ADC"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:coldfusion:2023:update7:*:*:*:*:*:*",
"matchCriteriaId": "A892E1DC-F2C8-4F53-8580-A2D1BEED5A25"
}
]
}
]
}
],
"references": [
{
"url": "https://helpx.adobe.com/security/products/coldfusion/apsb24-41.html",
"source": "psirt@adobe.com"
"source": "psirt@adobe.com",
"tags": [
"Patch",
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-34115",
"sourceIdentifier": "psirt@adobe.com",
"published": "2024-06-13T12:15:11.360",
"lastModified": "2024-06-13T18:35:19.777",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2024-07-19T18:02:32.427",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -51,10 +51,32 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:substance_3d_stager:*:*:*:*:*:*:*:*",
"versionEndIncluding": "3.0.2",
"matchCriteriaId": "C38C603E-F1D7-422F-89B9-0A84B1D9BE4F"
}
]
}
]
}
],
"references": [
{
"url": "https://helpx.adobe.com/security/products/substance3d_stager/apsb24-43.html",
"source": "psirt@adobe.com"
"source": "psirt@adobe.com",
"tags": [
"Patch",
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-35264",
"sourceIdentifier": "secure@microsoft.com",
"published": "2024-07-09T17:15:18.213",
"lastModified": "2024-07-09T18:18:38.713",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-07-19T18:59:28.370",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -40,6 +40,16 @@
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
},
{
"source": "secure@microsoft.com",
"type": "Secondary",
@ -51,10 +61,61 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:microsoft:.net:*:*:*:*:*:*:*:*",
"versionStartIncluding": "8.0.0",
"versionEndExcluding": "8.0.7",
"matchCriteriaId": "223CB8C9-39B9-44E2-83AA-79F7C2B45D67"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:microsoft:visual_studio_2022:*:*:*:*:*:*:*:*",
"versionStartIncluding": "17.4.0",
"versionEndExcluding": "17.4.21",
"matchCriteriaId": "9079F629-6958-469E-AF83-8030B145E354"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:microsoft:visual_studio_2022:*:*:*:*:*:*:*:*",
"versionStartIncluding": "17.6.0",
"versionEndExcluding": "17.6.17",
"matchCriteriaId": "B1C74913-B238-4B3C-8F2D-37FFCCAB5E9E"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:microsoft:visual_studio_2022:*:*:*:*:*:*:*:*",
"versionStartIncluding": "17.8.0",
"versionEndExcluding": "17.8.12",
"matchCriteriaId": "547E0354-EE7E-43BA-B3C7-E4A59C414312"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:microsoft:visual_studio_2022:*:*:*:*:*:*:*:*",
"versionStartIncluding": "17.10.0",
"versionEndExcluding": "17.10.4",
"matchCriteriaId": "BA8A2DA8-D24E-4AB5-8685-A42EB33E1D6D"
}
]
}
]
}
],
"references": [
{
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-35264",
"source": "secure@microsoft.com"
"source": "secure@microsoft.com",
"tags": [
"Patch",
"Vendor Advisory"
]
}
]
}

View File

@ -2,20 +2,92 @@
"id": "CVE-2024-35338",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-07-16T16:15:04.933",
"lastModified": "2024-07-16T18:00:02.110",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-07-19T18:58:08.977",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Tenda i29V1.0 V1.0.0.5 was discovered to contain a hardcoded password for root."
},
{
"lang": "es",
"value": "Se descubri\u00f3 que Tenda i29V1.0 V1.0.0.5 conten\u00eda una contrase\u00f1a codificada para root."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-798"
}
]
}
],
"configurations": [
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:tendacn:i29_firmware:1.0.0.5:*:*:*:*:*:*:*",
"matchCriteriaId": "6C1D8B10-FF4D-4FCD-8A93-901F4407B9F6"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:tendacn:i29:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "1BD6AAAA-C953-4BD9-AD42-D5C883F39728"
}
]
}
]
}
],
"metrics": {},
"references": [
{
"url": "https://palm-vertebra-fe9.notion.site/hardcode_i29-e1ed38dde00145d9a6be1ad2b4581259",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-35753",
"sourceIdentifier": "audit@patchstack.com",
"published": "2024-06-08T11:15:49.193",
"lastModified": "2024-06-10T02:52:08.267",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-07-19T18:31:44.157",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -17,6 +17,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 5.4,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.3,
"impactScore": 2.7
},
{
"source": "audit@patchstack.com",
"type": "Secondary",
@ -40,6 +60,16 @@
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
},
{
"source": "audit@patchstack.com",
"type": "Secondary",
@ -51,10 +81,31 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:templatesnext:templatesnext_onepager:*:*:*:*:*:*:*:*",
"versionEndIncluding": "1.3.3",
"matchCriteriaId": "7E584626-F9B4-43C2-BAC0-2BBDC3FE079C"
}
]
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/vulnerability/templatesnext-onepager/wordpress-templatesnext-onepager-plugin-1-3-3-cross-site-scripting-xss-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
"source": "audit@patchstack.com",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-35756",
"sourceIdentifier": "audit@patchstack.com",
"published": "2024-06-08T11:15:50.007",
"lastModified": "2024-06-10T02:52:08.267",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-07-19T18:45:25.210",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -17,6 +17,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 4.8,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.7,
"impactScore": 2.7
},
{
"source": "audit@patchstack.com",
"type": "Secondary",
@ -51,10 +71,31 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ceikay:tooltip_ck:*:*:*:*:*:*:*:*",
"versionEndIncluding": "2.2.15",
"matchCriteriaId": "6F4B9440-0E08-4235-BEDC-32A3C70A1FDC"
}
]
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/vulnerability/tooltip-ck/wordpress-tooltip-ck-plugin-2-2-15-cross-site-scripting-xss-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
"source": "audit@patchstack.com",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-36395",
"sourceIdentifier": "cna@cyber.gov.il",
"published": "2024-06-13T13:15:49.793",
"lastModified": "2024-06-13T18:35:19.777",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-07-19T18:34:58.837",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -17,6 +17,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 6.1,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 2.7
},
{
"source": "cna@cyber.gov.il",
"type": "Secondary",
@ -51,10 +71,30 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:verint:workforce_optimization:15.2.918.262:*:*:*:*:*:*:*",
"matchCriteriaId": "3276E28F-7F40-4743-A9AE-262F62E170D6"
}
]
}
]
}
],
"references": [
{
"url": "https://www.gov.il/en/Departments/faq/cve_advisories",
"source": "cna@cyber.gov.il"
"source": "cna@cyber.gov.il",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-37843",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-06-25T21:15:59.770",
"lastModified": "2024-06-26T12:44:29.693",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-07-19T18:37:07.720",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -15,11 +15,67 @@
"value": "Se descubri\u00f3 que Craft CMS hasta v3.7.31 conten\u00eda una vulnerabilidad de inyecci\u00f3n SQL a trav\u00e9s del endpoint de la API GraphQL."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-89"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:craftcms:craft_cms:*:*:*:*:*:*:*:*",
"versionEndExcluding": "3.7.31",
"matchCriteriaId": "C8AAE5DF-2812-42E9-B484-A194A4DD3C99"
}
]
}
]
}
],
"references": [
{
"url": "https://blog.smithsecurity.biz/craft-cms-unauthenticated-sqli-via-graphql",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Broken Link"
]
}
]
}

View File

@ -0,0 +1,21 @@
{
"id": "CVE-2024-40400",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-07-19T19:15:09.147",
"lastModified": "2024-07-19T19:15:09.147",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "An arbitrary file upload vulnerability in the image upload function of Automad v2.0.0 allows attackers to execute arbitrary code via a crafted file."
}
],
"metrics": {},
"references": [
{
"url": "https://github.com/marcantondahmen/automad/issues/106",
"source": "cve@mitre.org"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-41007",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2024-07-15T09:15:02.803",
"lastModified": "2024-07-18T12:15:03.357",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2024-07-19T18:24:59.197",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -15,39 +15,152 @@
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: tcp: evitar demasiados paquetes de retransmisi\u00f3n Si un socket TCP est\u00e1 usando TCP_USER_TIMEOUT y el otro par retrajo su ventana a cero, tcp_retransmit_timer() puede retransmitir un paquete cada dos santiam\u00e9n (2 ms). para HZ=1000), durante aproximadamente 4 minutos despu\u00e9s de que TCP_USER_TIMEOUT haya 'expirado'. La soluci\u00f3n es asegurarse de que tcp_rtx_probe0_timed_out() tenga en cuenta icsk-&gt;icsk_user_timeout. Antes de el commit culpable, el socket no expiraba despu\u00e9s de icsk-&gt;icsk_user_timeout, sino que usaba un retroceso exponencial est\u00e1ndar para las retransmisiones. Tambi\u00e9n vale la pena se\u00f1alar que antes de commit e89688e3e978 (\"net: tcp: fix unexcepted socket die cuando snd_wnd es 0\"), el problema durar\u00eda 2 minutos en lugar de 4."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "LOW",
"baseScore": 3.3,
"baseSeverity": "LOW"
},
"exploitabilityScore": 1.8,
"impactScore": 1.4
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "4.19",
"versionEndExcluding": "5.4.280",
"matchCriteriaId": "EDB3F5FC-7B58-42A1-96EF-E53AF464227C"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.5",
"versionEndExcluding": "5.10.222",
"matchCriteriaId": "00696AC5-EE29-437F-97F9-C4D66608B327"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.11",
"versionEndExcluding": "5.15.163",
"matchCriteriaId": "A97DEB09-4927-40F8-B5C6-F5BD5EAE0CFD"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.16",
"versionEndExcluding": "6.1.100",
"matchCriteriaId": "100CDF74-4DB5-4FC6-A54B-BDBDB0C27137"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "6.2",
"versionEndExcluding": "6.6.41",
"matchCriteriaId": "96AC42B8-D66D-4AC5-B466-E9BA7910FA29"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "6.7",
"versionEndExcluding": "6.9.10",
"matchCriteriaId": "AB2E8DEC-CFD5-4C2B-981D-E7E45A36C352"
}
]
}
]
}
],
"references": [
{
"url": "https://git.kernel.org/stable/c/04317a2471c2f637b4c49cbd0e9c0d04a519f570",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/5d7e64d70a11d988553a08239c810a658e841982",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/66cb64a1d2239cd0309f9b5038b05462570a5be1",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/7bb7670f92bfbd05fc41a8f9a8f358b7ffed65f4",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/97a9063518f198ec0adb2ecb89789de342bb8283",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/d2346fca5bed130dc712f276ac63450201d52969",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/dfcdd7f89e401d2c6616be90c76c2fac3fa98fde",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/e113cddefa27bbf5a79f72387b8fbd432a61a466",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
}
]
}

View File

@ -0,0 +1,21 @@
{
"id": "CVE-2024-41600",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-07-19T18:15:05.727",
"lastModified": "2024-07-19T18:15:05.727",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Insecure Permissions vulnerability in lin-CMS Springboot v.0.2.1 and before allows a remote attacker to obtain sensitive information via the login method in the UserController.java component."
}
],
"metrics": {},
"references": [
{
"url": "https://github.com/topsky979/Security-Collections/tree/main/CVE-2024-41600",
"source": "cve@mitre.org"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-4146",
"sourceIdentifier": "security@huntr.dev",
"published": "2024-06-08T20:15:52.117",
"lastModified": "2024-06-10T02:52:08.267",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-07-19T19:03:00.867",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -16,6 +16,28 @@
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
],
"cvssMetricV30": [
{
"source": "security@huntr.dev",
@ -41,8 +63,18 @@
},
"weaknesses": [
{
"source": "security@huntr.dev",
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-863"
}
]
},
{
"source": "security@huntr.dev",
"type": "Secondary",
"description": [
{
"lang": "en",
@ -51,14 +83,38 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:lunary:lunary:1.2.13:*:*:*:*:*:*:*",
"matchCriteriaId": "7223CE59-4E84-4008-9E35-D2B9D25ADD1E"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/lunary-ai/lunary/commit/c43b6c62035f32ca455f66d5fd22ba661648cde7",
"source": "security@huntr.dev"
"source": "security@huntr.dev",
"tags": [
"Patch"
]
},
{
"url": "https://huntr.com/bounties/a749e696-b398-4260-b2d0-b0054b9fffa7",
"source": "security@huntr.dev"
"source": "security@huntr.dev",
"tags": [
"Exploit",
"Issue Tracking"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-4680",
"sourceIdentifier": "security@huntr.dev",
"published": "2024-06-08T20:15:52.347",
"lastModified": "2024-06-10T02:52:08.267",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-07-19T18:51:53.003",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -16,6 +16,28 @@
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
}
],
"cvssMetricV30": [
{
"source": "security@huntr.dev",
@ -51,10 +73,31 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:zenml:zenml:0.56.3:*:*:*:*:*:*:*",
"matchCriteriaId": "50342A08-B715-4C14-BB9E-F6C8D2C6A683"
}
]
}
]
}
],
"references": [
{
"url": "https://huntr.com/bounties/c88f6bd2-490d-4930-98dd-03651b20230a",
"source": "security@huntr.dev"
"source": "security@huntr.dev",
"tags": [
"Exploit",
"Issue Tracking"
]
}
]
}

View File

@ -2,13 +2,17 @@
"id": "CVE-2024-5402",
"sourceIdentifier": "cybersecurity@ch.abb.com",
"published": "2024-07-15T12:15:02.340",
"lastModified": "2024-07-15T13:00:34.853",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-07-19T18:03:55.583",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Unquoted Search Path or Element vulnerability in ABB Mint Workbench.\n\n\n\nA local attacker who successfully exploited this vulnerability could gain elevated privileges by inserting an executable file in the path of the affected service.\n\n\nThis issue affects Mint Workbench I versions: from 5866 before 5868."
},
{
"lang": "es",
"value": "Vulnerabilidad de elemento o ruta de b\u00fasqueda sin comillas en ABB Mint Workbench. Un atacante local que aprovechara con \u00e9xito esta vulnerabilidad podr\u00eda obtener privilegios elevados insertando un archivo ejecutable en la ruta del servicio afectado. Este problema afecta a las versiones de Mint Workbench I: desde 5866 antes de 5868."
}
],
"metrics": {
@ -57,6 +61,26 @@
}
],
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
},
{
"source": "cybersecurity@ch.abb.com",
"type": "Secondary",
@ -91,10 +115,32 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:abb:mint_workbench:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5866",
"versionEndIncluding": "5868",
"matchCriteriaId": "2D3943DF-0CD6-4CB6-A713-3C8308A03F52"
}
]
}
]
}
],
"references": [
{
"url": "https://search.abb.com/library/Download.aspx?DocumentID=9AKK108469A7912&LanguageCode=en&DocumentPartId=1&Action=Launch",
"source": "cybersecurity@ch.abb.com"
"source": "cybersecurity@ch.abb.com",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-5478",
"sourceIdentifier": "security@huntr.dev",
"published": "2024-06-06T19:16:08.933",
"lastModified": "2024-06-07T14:56:05.647",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-07-19T18:29:50.137",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -16,6 +16,28 @@
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 6.1,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 2.7
}
],
"cvssMetricV30": [
{
"source": "security@huntr.dev",
@ -51,10 +73,31 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:lunary:lunary:1.2.7:*:*:*:*:*:*:*",
"matchCriteriaId": "2C7BA1F3-A202-4EB0-A119-9DD2B776A50F"
}
]
}
]
}
],
"references": [
{
"url": "https://huntr.com/bounties/e899f496-d493-4c06-b596-cb0a88ad451b",
"source": "security@huntr.dev"
"source": "security@huntr.dev",
"tags": [
"Exploit",
"Issue Tracking"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-5759",
"sourceIdentifier": "vulnreport@tenable.com",
"published": "2024-06-12T16:15:12.550",
"lastModified": "2024-06-13T18:36:09.010",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-07-19T18:40:53.863",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -17,6 +17,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW",
"baseScore": 6.3,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 3.4
},
{
"source": "vulnreport@tenable.com",
"type": "Secondary",
@ -40,6 +60,16 @@
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-269"
}
]
},
{
"source": "vulnreport@tenable.com",
"type": "Secondary",
@ -51,10 +81,31 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:tenable:security_center:*:*:*:*:*:*:*:*",
"versionEndIncluding": "6.3.0",
"matchCriteriaId": "B72B29DA-43D5-45D0-9413-320FDD421BB7"
}
]
}
]
}
],
"references": [
{
"url": "https://www.tenable.com/security/tns-2024-10",
"source": "vulnreport@tenable.com"
"source": "vulnreport@tenable.com",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-5977",
"sourceIdentifier": "security@wordfence.com",
"published": "2024-07-19T11:15:03.873",
"lastModified": "2024-07-19T13:01:44.567",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-07-19T18:27:34.967",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -13,6 +13,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"availabilityImpact": "LOW",
"baseScore": 5.4,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 2.5
},
{
"source": "security@wordfence.com",
"type": "Secondary",
@ -36,6 +56,16 @@
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-639"
}
]
},
{
"source": "security@wordfence.com",
"type": "Secondary",
@ -47,18 +77,45 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:givewp:givewp:*:*:*:*:*:wordpress:*:*",
"versionEndExcluding": "3.14.0",
"matchCriteriaId": "2FC88AD4-201C-4434-A52B-5B295F79E6E9"
}
]
}
]
}
],
"references": [
{
"url": "https://plugins.trac.wordpress.org/browser/give/trunk/src/DonationForms/V2/Endpoints/FormActions.php#L96",
"source": "security@wordfence.com"
"source": "security@wordfence.com",
"tags": [
"Patch"
]
},
{
"url": "https://plugins.trac.wordpress.org/changeset/3120745/",
"source": "security@wordfence.com"
"source": "security@wordfence.com",
"tags": [
"Patch"
]
},
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/2dca6c29-9f05-4d82-90e3-834f1dd8005a?source=cve",
"source": "security@wordfence.com"
"source": "security@wordfence.com",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,17 +2,41 @@
"id": "CVE-2024-6398",
"sourceIdentifier": "trellixpsirt@trellix.com",
"published": "2024-07-15T09:15:02.870",
"lastModified": "2024-07-15T13:00:34.853",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-07-19T18:25:44.247",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "An information disclosure vulnerability in SWG in versions 12.x prior to 12.2.10 and 11.x prior to 11.2.24 allows information stored in a customizable block page to be disclosed to third-party websites due to Same Origin Policy Bypass of browsers in certain scenarios. The risk is low, because other recommended default security policies such as URL categorization and GTI are in place in most policies to block access to uncategorized/high risk websites. Any information disclosed depends on how the customers have customized the block pages."
},
{
"lang": "es",
"value": "Una vulnerabilidad de divulgaci\u00f3n de informaci\u00f3n en SWG en las versiones 12.x anteriores a 12.2.10 y 11.x anteriores a 11.2.24 permite que la informaci\u00f3n almacenada en una p\u00e1gina de bloqueo personalizable se divulgue a sitios web de terceros debido a la omisi\u00f3n de la pol\u00edtica del mismo origen de los navegadores en ciertos escenarios. El riesgo es bajo, porque otras pol\u00edticas de seguridad predeterminadas recomendadas, como la categorizaci\u00f3n de URL y GTI, est\u00e1n implementadas en la mayor\u00eda de las pol\u00edticas para bloquear el acceso a sitios web sin categorizar o de alto riesgo. Cualquier informaci\u00f3n divulgada depende de c\u00f3mo los clientes hayan personalizado las p\u00e1ginas de bloqueo."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5.3,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 3.9,
"impactScore": 1.4
},
{
"source": "trellixpsirt@trellix.com",
"type": "Secondary",
@ -37,8 +61,18 @@
},
"weaknesses": [
{
"source": "trellixpsirt@trellix.com",
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
},
{
"source": "trellixpsirt@trellix.com",
"type": "Secondary",
"description": [
{
"lang": "en",
@ -47,10 +81,39 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:skyhighsecurity:secure_web_gateway:*:*:*:*:*:*:*:*",
"versionStartIncluding": "11.0.0",
"versionEndExcluding": "11.2.24",
"matchCriteriaId": "043B932C-C0D9-4BEB-96E6-BD21ED869724"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:skyhighsecurity:secure_web_gateway:*:*:*:*:*:*:*:*",
"versionStartIncluding": "12.0.0",
"versionEndExcluding": "12.2.10",
"matchCriteriaId": "ED7160EF-0984-47EE-94EB-A22A4D4452C0"
}
]
}
]
}
],
"references": [
{
"url": "https://thrive.trellix.com/s/article/000013694",
"source": "trellixpsirt@trellix.com"
"source": "trellixpsirt@trellix.com",
"tags": [
"Permissions Required"
]
}
]
}

View File

@ -2,20 +2,44 @@
"id": "CVE-2024-6741",
"sourceIdentifier": "twcert@cert.org.tw",
"published": "2024-07-15T09:15:03.117",
"lastModified": "2024-07-15T13:00:34.853",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-07-19T18:23:40.233",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Openfind's Mail2000 has a vulnerability that allows the HttpOnly flag to be bypassed. Unauthenticated remote attackers can exploit this vulnerability using specific JavaScript code to obtain the session cookie with the HttpOnly flag enabled."
},
{
"lang": "es",
"value": "Mail2000 de Openfind tiene una vulnerabilidad que permite omitir el indicador HttpOnly. Los atacantes remotos no autenticados pueden aprovechar esta vulnerabilidad utilizando c\u00f3digo JavaScript espec\u00edfico para obtener la cookie de sesi\u00f3n con el indicador HttpOnly habilitado."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "twcert@cert.org.tw",
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5.3,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 3.9,
"impactScore": 1.4
},
{
"source": "twcert@cert.org.tw",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N",
@ -37,8 +61,18 @@
},
"weaknesses": [
{
"source": "twcert@cert.org.tw",
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
},
{
"source": "twcert@cert.org.tw",
"type": "Secondary",
"description": [
{
"lang": "en",
@ -47,18 +81,49 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:openfind:mail2000:7.0:*:*:*:*:*:*:*",
"matchCriteriaId": "1762976A-2372-49D5-BD94-77F8C0C86DC2"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:openfind:mail2000:8.0:*:*:*:*:*:*:*",
"matchCriteriaId": "DC17A2D8-B006-4738-A6CB-F6B277460B6B"
}
]
}
]
}
],
"references": [
{
"url": "https://www.openfind.com.tw/taiwan/download/Openfind_OF-ISAC-24-007.pdf",
"source": "twcert@cert.org.tw"
"source": "twcert@cert.org.tw",
"tags": [
"Exploit"
]
},
{
"url": "https://www.twcert.org.tw/en/cp-139-7941-b66e7-2.html",
"source": "twcert@cert.org.tw"
"source": "twcert@cert.org.tw",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://www.twcert.org.tw/tw/cp-132-7940-0177a-1.html",
"source": "twcert@cert.org.tw"
"source": "twcert@cert.org.tw",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,13 +2,17 @@
"id": "CVE-2024-6745",
"sourceIdentifier": "cna@vuldb.com",
"published": "2024-07-15T11:15:02.450",
"lastModified": "2024-07-15T13:00:34.853",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-07-19T18:04:47.363",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability classified as critical has been found in code-projects Simple Ticket Booking 1.0. Affected is an unknown function of the file adminauthenticate.php of the component Login. The manipulation of the argument email/password leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-271476."
},
{
"lang": "es",
"value": "Una vulnerabilidad clasificada como cr\u00edtica ha sido encontrada en code-projects Simple Ticket Booking 1.0. Una funci\u00f3n desconocida del archivo adminauthenticate.php del componente Login es afectada por esta vulnerabilidad. La manipulaci\u00f3n del argumento correo electr\u00f3nico/contrase\u00f1a conduce a la inyecci\u00f3n de SQL. Es posible lanzar el ataque de forma remota. El exploit ha sido divulgado al p\u00fablico y puede utilizarse. El identificador de esta vulnerabilidad es VDB-271476."
}
],
"metrics": {
@ -57,6 +61,26 @@
}
],
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
},
{
"source": "cna@vuldb.com",
"type": "Secondary",
@ -116,22 +140,54 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:code-projects:simple_ticket_booking:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "D14B5958-44A0-40EB-A3EC-02065AFD7652"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/xzyxiaohaha/cve/issues/2",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Issue Tracking"
]
},
{
"url": "https://vuldb.com/?ctiid.271476",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Permissions Required"
]
},
{
"url": "https://vuldb.com/?id.271476",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "https://vuldb.com/?submit.374770",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
}
]
}

View File

@ -2,13 +2,17 @@
"id": "CVE-2024-6746",
"sourceIdentifier": "cna@vuldb.com",
"published": "2024-07-15T12:15:02.707",
"lastModified": "2024-07-15T13:00:34.853",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-07-19T18:02:29.417",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability classified as problematic was found in NaiboWang EasySpider 0.6.2 on Windows. Affected by this vulnerability is an unknown functionality of the file \\EasySpider\\resources\\app\\server.js of the component HTTP GET Request Handler. The manipulation with the input /../../../../../../../../../Windows/win.ini leads to path traversal: '../filedir'. The attack needs to be done within the local network. The exploit has been disclosed to the public and may be used. The identifier VDB-271477 was assigned to this vulnerability. NOTE: The code maintainer explains, that this is not a big issue \"because the default is that the software runs locally without going through the Internet\"."
},
{
"lang": "es",
"value": "Una vulnerabilidad fue encontrada en NaiboWang EasySpider 0.6.2 en Windows y clasificada como problem\u00e1tica. Una funci\u00f3n desconocida del archivo \\EasySpider\\resources\\app\\server.js del componente HTTP GET Request Handler es afectada por esta vulnerabilidad. La manipulaci\u00f3n con la entrada /../../../../../../../../../Windows/win.ini conduce al path traversal: '../filedir'. El ataque debe realizarse dentro de la red local. El exploit ha sido divulgado al p\u00fablico y puede utilizarse. A esta vulnerabilidad se le asign\u00f3 el identificador VDB-271477. NOTA: El encargado del c\u00f3digo explica que esto no es un gran problema \"porque el valor predeterminado es que el software se ejecuta localmente sin pasar por Internet\"."
}
],
"metrics": {
@ -57,6 +61,26 @@
}
],
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "ADJACENT_NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
},
{
"source": "cna@vuldb.com",
"type": "Secondary",
@ -105,6 +129,16 @@
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-22"
}
]
},
{
"source": "cna@vuldb.com",
"type": "Secondary",
@ -116,22 +150,66 @@
]
}
],
"configurations": [
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:easyspider:easyspider:0.6.2:*:*:*:*:*:*:*",
"matchCriteriaId": "99029D7E-D899-4908-819E-BCE6EA9944DE"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A2572D17-1DE6-457B-99CC-64AFD54487EA"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/NaiboWang/EasySpider/issues/466",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Issue Tracking"
]
},
{
"url": "https://vuldb.com/?ctiid.271477",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Permissions Required"
]
},
{
"url": "https://vuldb.com/?id.271477",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "https://vuldb.com/?submit.371998",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-6900",
"sourceIdentifier": "cna@vuldb.com",
"published": "2024-07-19T07:15:02.083",
"lastModified": "2024-07-19T13:01:44.567",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-07-19T19:54:20.537",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -57,6 +57,26 @@
}
],
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
},
{
"source": "cna@vuldb.com",
"type": "Secondary",
@ -116,22 +136,52 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:jkev:record_managment_system:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "8A1D0389-96B4-43AE-B089-19085B91C0E9"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/netmanzhang/VUL/blob/main/Record-Management-System-03.md",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Third Party Advisory"
]
},
{
"url": "https://vuldb.com/?ctiid.271925",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Permissions Required"
]
},
{
"url": "https://vuldb.com/?id.271925",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://vuldb.com/?submit.375193",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-6901",
"sourceIdentifier": "cna@vuldb.com",
"published": "2024-07-19T07:15:02.757",
"lastModified": "2024-07-19T13:01:44.567",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-07-19T19:55:00.210",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -57,6 +57,26 @@
}
],
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
},
{
"source": "cna@vuldb.com",
"type": "Secondary",
@ -116,22 +136,52 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:jkev:record_managment_system:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "8A1D0389-96B4-43AE-B089-19085B91C0E9"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/netmanzhang/VUL/blob/main/Record-Management-System-04.md",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Third Party Advisory"
]
},
{
"url": "https://vuldb.com/?ctiid.271926",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Permissions Required"
]
},
{
"url": "https://vuldb.com/?id.271926",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://vuldb.com/?submit.375194",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-6902",
"sourceIdentifier": "cna@vuldb.com",
"published": "2024-07-19T08:15:03.853",
"lastModified": "2024-07-19T13:01:44.567",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-07-19T19:10:24.903",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -57,6 +57,26 @@
}
],
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
},
{
"source": "cna@vuldb.com",
"type": "Secondary",
@ -116,22 +136,52 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:jkev:record_managment_system:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "8A1D0389-96B4-43AE-B089-19085B91C0E9"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/netmanzhang/VUL/blob/main/Record-Management-System-05.md",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Third Party Advisory"
]
},
{
"url": "https://vuldb.com/?ctiid.271927",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Permissions Required"
]
},
{
"url": "https://vuldb.com/?id.271927",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://vuldb.com/?submit.375195",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-6903",
"sourceIdentifier": "cna@vuldb.com",
"published": "2024-07-19T08:15:04.683",
"lastModified": "2024-07-19T13:01:44.567",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-07-19T19:51:55.617",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -57,6 +57,26 @@
}
],
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
},
{
"source": "cna@vuldb.com",
"type": "Secondary",
@ -116,22 +136,52 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:jkev:record_managment_system:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "8A1D0389-96B4-43AE-B089-19085B91C0E9"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/netmanzhang/VUL/blob/main/Record-Management-System-06.md",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Third Party Advisory"
]
},
{
"url": "https://vuldb.com/?ctiid.271928",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Permissions Required"
]
},
{
"url": "https://vuldb.com/?id.271928",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://vuldb.com/?submit.375206",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours.
### Last Repository Update
```plain
2024-07-19T18:00:18.771575+00:00
2024-07-19T20:00:18.321575+00:00
```
### Most recent CVE Modification Timestamp synchronized with NVD
```plain
2024-07-19T17:59:52.237000+00:00
2024-07-19T19:55:00.210000+00:00
```
### Last Data Feed Release
@ -33,47 +33,46 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
### Total Number of included CVEs
```plain
257512
257514
```
### CVEs added in the last Commit
Recently added CVEs: `7`
Recently added CVEs: `2`
- [CVE-2024-24970](CVE-2024/CVE-2024-249xx/CVE-2024-24970.json) (`2024-07-19T17:15:02.983`)
- [CVE-2024-29080](CVE-2024/CVE-2024-290xx/CVE-2024-29080.json) (`2024-07-19T17:15:03.107`)
- [CVE-2024-41281](CVE-2024/CVE-2024-412xx/CVE-2024-41281.json) (`2024-07-19T17:15:03.330`)
- [CVE-2024-41492](CVE-2024/CVE-2024-414xx/CVE-2024-41492.json) (`2024-07-19T17:15:03.410`)
- [CVE-2024-41601](CVE-2024/CVE-2024-416xx/CVE-2024-41601.json) (`2024-07-19T17:15:03.490`)
- [CVE-2024-41602](CVE-2024/CVE-2024-416xx/CVE-2024-41602.json) (`2024-07-19T17:15:03.570`)
- [CVE-2024-41603](CVE-2024/CVE-2024-416xx/CVE-2024-41603.json) (`2024-07-19T17:15:03.640`)
- [CVE-2024-40400](CVE-2024/CVE-2024-404xx/CVE-2024-40400.json) (`2024-07-19T19:15:09.147`)
- [CVE-2024-41600](CVE-2024/CVE-2024-416xx/CVE-2024-41600.json) (`2024-07-19T18:15:05.727`)
### CVEs modified in the last Commit
Recently modified CVEs: `21`
Recently modified CVEs: `35`
- [CVE-2023-51524](CVE-2023/CVE-2023-515xx/CVE-2023-51524.json) (`2024-07-19T17:34:12.537`)
- [CVE-2023-52291](CVE-2023/CVE-2023-522xx/CVE-2023-52291.json) (`2024-07-19T16:10:22.473`)
- [CVE-2024-22682](CVE-2024/CVE-2024-226xx/CVE-2024-22682.json) (`2024-07-19T17:15:02.603`)
- [CVE-2024-29737](CVE-2024/CVE-2024-297xx/CVE-2024-29737.json) (`2024-07-19T16:11:25.013`)
- [CVE-2024-3242](CVE-2024/CVE-2024-32xx/CVE-2024-3242.json) (`2024-07-19T16:24:02.483`)
- [CVE-2024-34116](CVE-2024/CVE-2024-341xx/CVE-2024-34116.json) (`2024-07-19T17:40:23.473`)
- [CVE-2024-34129](CVE-2024/CVE-2024-341xx/CVE-2024-34129.json) (`2024-07-19T17:30:15.177`)
- [CVE-2024-34130](CVE-2024/CVE-2024-341xx/CVE-2024-34130.json) (`2024-07-19T17:28:29.150`)
- [CVE-2024-35682](CVE-2024/CVE-2024-356xx/CVE-2024-35682.json) (`2024-07-19T17:36:29.837`)
- [CVE-2024-37224](CVE-2024/CVE-2024-372xx/CVE-2024-37224.json) (`2024-07-19T17:59:52.237`)
- [CVE-2024-37471](CVE-2024/CVE-2024-374xx/CVE-2024-37471.json) (`2024-07-19T17:02:31.163`)
- [CVE-2024-37472](CVE-2024/CVE-2024-374xx/CVE-2024-37472.json) (`2024-07-19T17:04:42.343`)
- [CVE-2024-37476](CVE-2024/CVE-2024-374xx/CVE-2024-37476.json) (`2024-07-19T16:52:39.713`)
- [CVE-2024-37629](CVE-2024/CVE-2024-376xx/CVE-2024-37629.json) (`2024-07-19T16:13:17.120`)
- [CVE-2024-39863](CVE-2024/CVE-2024-398xx/CVE-2024-39863.json) (`2024-07-19T16:01:24.143`)
- [CVE-2024-39877](CVE-2024/CVE-2024-398xx/CVE-2024-39877.json) (`2024-07-19T16:04:04.003`)
- [CVE-2024-5457](CVE-2024/CVE-2024-54xx/CVE-2024-5457.json) (`2024-07-19T17:55:55.343`)
- [CVE-2024-5564](CVE-2024/CVE-2024-55xx/CVE-2024-5564.json) (`2024-07-19T16:15:03.193`)
- [CVE-2024-5582](CVE-2024/CVE-2024-55xx/CVE-2024-5582.json) (`2024-07-19T16:05:10.290`)
- [CVE-2024-5703](CVE-2024/CVE-2024-57xx/CVE-2024-5703.json) (`2024-07-19T16:05:42.090`)
- [CVE-2024-6220](CVE-2024/CVE-2024-62xx/CVE-2024-6220.json) (`2024-07-19T16:07:05.057`)
- [CVE-2024-33180](CVE-2024/CVE-2024-331xx/CVE-2024-33180.json) (`2024-07-19T18:56:27.127`)
- [CVE-2024-33182](CVE-2024/CVE-2024-331xx/CVE-2024-33182.json) (`2024-07-19T18:56:50.050`)
- [CVE-2024-34113](CVE-2024/CVE-2024-341xx/CVE-2024-34113.json) (`2024-07-19T18:36:42.237`)
- [CVE-2024-34115](CVE-2024/CVE-2024-341xx/CVE-2024-34115.json) (`2024-07-19T18:02:32.427`)
- [CVE-2024-35264](CVE-2024/CVE-2024-352xx/CVE-2024-35264.json) (`2024-07-19T18:59:28.370`)
- [CVE-2024-35338](CVE-2024/CVE-2024-353xx/CVE-2024-35338.json) (`2024-07-19T18:58:08.977`)
- [CVE-2024-35753](CVE-2024/CVE-2024-357xx/CVE-2024-35753.json) (`2024-07-19T18:31:44.157`)
- [CVE-2024-35756](CVE-2024/CVE-2024-357xx/CVE-2024-35756.json) (`2024-07-19T18:45:25.210`)
- [CVE-2024-36395](CVE-2024/CVE-2024-363xx/CVE-2024-36395.json) (`2024-07-19T18:34:58.837`)
- [CVE-2024-37843](CVE-2024/CVE-2024-378xx/CVE-2024-37843.json) (`2024-07-19T18:37:07.720`)
- [CVE-2024-41007](CVE-2024/CVE-2024-410xx/CVE-2024-41007.json) (`2024-07-19T18:24:59.197`)
- [CVE-2024-4146](CVE-2024/CVE-2024-41xx/CVE-2024-4146.json) (`2024-07-19T19:03:00.867`)
- [CVE-2024-4680](CVE-2024/CVE-2024-46xx/CVE-2024-4680.json) (`2024-07-19T18:51:53.003`)
- [CVE-2024-5402](CVE-2024/CVE-2024-54xx/CVE-2024-5402.json) (`2024-07-19T18:03:55.583`)
- [CVE-2024-5478](CVE-2024/CVE-2024-54xx/CVE-2024-5478.json) (`2024-07-19T18:29:50.137`)
- [CVE-2024-5759](CVE-2024/CVE-2024-57xx/CVE-2024-5759.json) (`2024-07-19T18:40:53.863`)
- [CVE-2024-5977](CVE-2024/CVE-2024-59xx/CVE-2024-5977.json) (`2024-07-19T18:27:34.967`)
- [CVE-2024-6398](CVE-2024/CVE-2024-63xx/CVE-2024-6398.json) (`2024-07-19T18:25:44.247`)
- [CVE-2024-6741](CVE-2024/CVE-2024-67xx/CVE-2024-6741.json) (`2024-07-19T18:23:40.233`)
- [CVE-2024-6745](CVE-2024/CVE-2024-67xx/CVE-2024-6745.json) (`2024-07-19T18:04:47.363`)
- [CVE-2024-6746](CVE-2024/CVE-2024-67xx/CVE-2024-6746.json) (`2024-07-19T18:02:29.417`)
- [CVE-2024-6900](CVE-2024/CVE-2024-69xx/CVE-2024-6900.json) (`2024-07-19T19:54:20.537`)
- [CVE-2024-6901](CVE-2024/CVE-2024-69xx/CVE-2024-6901.json) (`2024-07-19T19:55:00.210`)
- [CVE-2024-6902](CVE-2024/CVE-2024-69xx/CVE-2024-6902.json) (`2024-07-19T19:10:24.903`)
- [CVE-2024-6903](CVE-2024/CVE-2024-69xx/CVE-2024-6903.json) (`2024-07-19T19:51:55.617`)
## Download and Usage

View File

@ -175566,7 +175566,7 @@ CVE-2021-31618,0,0,73d7e89ab608128df4530a3e31dcc9f38d0019ebbcf13ed27a6c07f673284
CVE-2021-3162,0,0,91aa628f46c6f1edfcf47e9c1ae768fe2f228cb6afcaa514d0af2f66f854a3b4,2022-07-12T17:42:04.277000
CVE-2021-31624,0,0,f9bb064f6b75a55ae23dbaab9b493874f3477bdd756e005d28e0ddd202fa3dd8,2021-11-02T17:11:52.207000
CVE-2021-31627,0,0,b983abe15279ebeb536ac81adde0c0b9689c9f760389f7ac3b66ec14c701ab45,2021-11-03T12:18:22.917000
CVE-2021-3163,0,0,b6e43415005d1b8648a7ef37f87deff33254beacfa8f7905f3338ea032829c29,2024-05-17T02:00:18.753000
CVE-2021-3163,0,1,bda245d6ab28018888afc4fec64d1bb8208ace93861f535e2d61010555932c29,2024-07-19T19:15:06.277000
CVE-2021-31630,0,0,93c7a1da8d5d487512cf8a33c3ec73387c3509a9a3dc3421321cfea5271501d6,2022-05-03T16:04:40.443000
CVE-2021-31631,0,0,e4685f84a5797c763b0e66c36a5ba70eed0e1714a692dde8526e51ca26b8ff7d,2021-12-07T14:02:09.200000
CVE-2021-31632,0,0,e692188d243a7872a36e5424d25a260426040a6c83172902699779720b13cc77,2021-12-07T14:03:06.170000
@ -176597,7 +176597,7 @@ CVE-2021-33022,0,0,12387620eb30ab39a033a98a69d8adf5e0c7f3aa2f0730cdba76bdbda3df0
CVE-2021-33023,0,0,84957ca62689d40114d714b0c9d1a223287a39086e70ca61881201e2684877ed,2021-10-20T22:16:01.683000
CVE-2021-33024,0,0,b6524dbe4a1cd7bf93fdbf13b8840b0b97d76ac7145f02c41a784cf3ed6c1b59,2022-04-08T20:44:38.887000
CVE-2021-33025,0,0,21fd0dace77928df316063f32312d1acf81d9ac5df72b0121053b1830e1c6991,2022-05-25T14:42:57.127000
CVE-2021-33026,0,0,50be2db47f839656204543c9c117d45f021ff3e9aa6d17c591353f32cf918ac2,2024-05-17T01:57:47.060000
CVE-2021-33026,0,1,e1c89680bcc6e7153f0139150f21f658e25d33aa5318f35ddeb9f649599b096c,2024-07-19T19:15:05.890000
CVE-2021-33027,0,0,0801bc34fc460d7a6d4506776bdc66ae449fd654eec6748996397180c19cdd01,2021-07-28T19:39:16.430000
CVE-2021-33031,0,0,510b4ee13ad9642728234f837e85ce4e18a9e35b7795bd363872b93ef9b01a8e,2021-06-22T18:29:56.030000
CVE-2021-33032,0,0,3d7de3fb5f01a40c864db1d961772ba77a2ef2eb768b56aa55c2492a69cdfeee,2021-09-21T16:18:17.080000
@ -178281,7 +178281,7 @@ CVE-2021-3517,0,0,a1d962dfb005b2e5b98c5af02df290ef64262857839ca532498beca7ccdbdd
CVE-2021-3518,0,0,a76e97de17ac8f24c61961e5a7d8254226f8468d4aec699c6b57a015dd8e1e0a,2023-11-07T03:38:04.050000
CVE-2021-3519,0,0,10977120fb7b4b66273cf50940e4d6bd76a1a997aa363c6e358c8486afb107c4,2021-11-19T22:04:31.987000
CVE-2021-35193,0,0,a162afbc7a5171c627141e195f850061f3e08439984b46f73143e95bd5312c58,2021-08-11T15:25:11.357000
CVE-2021-35196,0,0,251ce9d2b2ff85ca316b30d87455bf9fa9202dba59245295da222f08023368e2,2024-05-17T01:58:33.717000
CVE-2021-35196,0,1,51115fe02c24dd9aa5f1b59d96aabf0d1c32122a5416e1f669f2347c49a27313,2024-07-19T19:15:06.043000
CVE-2021-35197,0,0,22e8eda6d6da7bd81b1e3317fa4ee52603241e7efeefe5b25be85876bc1a8b43,2023-11-07T03:36:30.150000
CVE-2021-35198,0,0,cc19841f95cab4d85eab6ca777ade77a70d4e0471df59e5b70b5b81f5d971646,2021-10-04T17:33:36.207000
CVE-2021-35199,0,0,8e943a274ef674f856afd4581cd12225bc3ccb44bd8eaac54942c11c734cb67b,2021-10-04T17:34:23.810000
@ -180725,7 +180725,7 @@ CVE-2021-3861,0,0,d96c927b4ce8a2c2584938d898f7247493a7a11b1c9168a50ee73528787262
CVE-2021-38611,0,0,facd38ca235b5190c149ab951e02227e8e39012fb5f93c6ec8be351d9b2836f4,2021-08-31T11:30:40.837000
CVE-2021-38612,0,0,291d09919a2d4e076f51c41552434ace4e345360004390eba05af900524cf7d3,2021-08-31T11:31:18.017000
CVE-2021-38613,0,0,15f7f15d144dc659400000a596d12b65d4001066898169998efb6fa4be89003e,2021-10-05T15:38:00.637000
CVE-2021-38614,0,0,9f4951a337de4c6fe13cfc65bdf2752c5d069df0ae5396000d0c8b738daa89b9,2024-05-17T01:59:41.637000
CVE-2021-38614,0,1,3c6cdc8aaf419aa0dd08384359d72862e67f3a9da2f1567cbda6404d54ccd61b,2024-07-19T18:15:04.450000
CVE-2021-38615,0,0,05c8f60751f80d9360d4c188fdf5dcc5bc0216124ec7f5af113d9d463264c0eb,2022-07-12T17:42:04.277000
CVE-2021-38616,0,0,cdd69265ff2e527ac9e39b2cad636e30599eb5d07c5ec90c1463a359fc40ab09,2022-07-12T17:42:04.277000
CVE-2021-38617,0,0,505127447e69a7d6e20623bf518d01e3a284c60816be7323a42675dd8361e6fe,2022-07-12T17:42:04.277000
@ -183064,7 +183064,7 @@ CVE-2021-41499,0,0,4533365444b601534321d4d5de70f1946f80a8336beda80700193c685d9cf
CVE-2021-4150,0,0,0d0b7965b219bc0ddf1a71b047245b29307a4594165e78413979a713c60d4cbf,2022-06-22T15:55:44.063000
CVE-2021-41500,0,0,eaef38d53f541677aa204a9ebc1602de2c37f11789109a34722a5d88a6dcfe34,2023-11-07T03:38:57.167000
CVE-2021-41502,0,0,b724d6ba66b92ba8c6b97cade3706ad4a07572464937ce6bfbf2977f2e864a29,2022-06-17T17:31:33.673000
CVE-2021-41503,0,0,3e2728b4840773067a21c2bfcfefe506bc05ff32e54e1a8ca7d06c2069777cf6,2024-05-17T02:01:13.137000
CVE-2021-41503,0,1,507044a732cba75567c9200de5f96b200fca3f8bf0bec202815e9a93f937e02a,2024-07-19T18:15:04.580000
CVE-2021-41504,0,0,fb1adfb7674ffa96cc983b72eff36e98681ffceec30954458e632d5d81177850,2024-05-17T02:01:13.233000
CVE-2021-41506,0,0,01d8b9a3a83b6e4dd58b7f9cb9f746d4b0cc6e281fbbd19de359fa7a4a03956e,2023-08-08T14:22:24.967000
CVE-2021-41511,0,0,6299aae48910aa774784abd64e72607fa5e292e1f043623428d5d9d2ecdb4eb6,2021-11-30T22:39:04.107000
@ -212287,7 +212287,7 @@ CVE-2022-48830,0,0,e22e2e0887b0b86eb4cf324cb4a9f7a83e6b7926d3beca11ffca268260854
CVE-2022-48831,0,0,351602b86da3ea07115bf6f723f7380003eff65b8aede2b909ab31a6e1b9ff33,2024-07-16T13:43:58.773000
CVE-2022-48832,0,0,0a5e163c028cd3d25fc5acb6c8965020bb8461631f62ab5431623b874d61e765,2024-07-16T13:43:58.773000
CVE-2022-48833,0,0,d3249b6f1f8afc394f753bdd0cb4f946023d7de7e66839f5269338ef343a4377,2024-07-16T13:43:58.773000
CVE-2022-48834,0,0,eb0b0b412a992033cc1ccff0c2fe442c6d58b137207c30c834c3ef3f7db02dae,2024-07-16T13:43:58.773000
CVE-2022-48834,0,1,3fb7de4eb75ae6cee58aac6782b7ecb504ead7c703df9b113b93be65a47f5989,2024-07-19T18:00:51.173000
CVE-2022-48835,0,0,2479254d1fbe0dc2b5306c0fd9d9d0164d10c20462ce8b7a8e261d762dd9b069,2024-07-16T13:43:58.773000
CVE-2022-48836,0,0,fc888f24293335e1fd6f0258311ddaf2aaf3aa4461faee55b6cb3f00722e9478,2024-07-16T13:43:58.773000
CVE-2022-48837,0,0,6ba0c2c49c8b0fc22b8aa3e7bd58e22713beeb87b8a880fecfa58840737e2898,2024-07-18T16:07:46.433000
@ -237899,7 +237899,7 @@ CVE-2023-51520,0,0,fa83905e551c0f1871442257a4349a3f47d49f0c9a9a63d95c309c60b1ea7
CVE-2023-51521,0,0,a06ff29eb3f01599f1af5c5654640aba0c00f73ab1f91907aa68cf552ac1d8be,2024-03-17T22:38:29.433000
CVE-2023-51522,0,0,c9f487ed15b8fe1544b64035598e9977ad6f2bc9c247bbeccf09ca8a090b58f3,2024-03-15T16:26:49.320000
CVE-2023-51523,0,0,8f7539940b5487a4df93510946d4f5efc99f8581b96de29f580f4e789b594e16,2024-06-17T12:43:31.090000
CVE-2023-51524,0,1,d800c5821592dba1b3c1879095154e138bc54e57bc330b0d05f7b049703f21f2,2024-07-19T17:34:12.537000
CVE-2023-51524,0,0,d800c5821592dba1b3c1879095154e138bc54e57bc330b0d05f7b049703f21f2,2024-07-19T17:34:12.537000
CVE-2023-51525,0,0,872b78291c393b7b0f809b690427095d99e4b9d587b6ad9e5c335d85a728a1c9,2024-03-15T16:26:49.320000
CVE-2023-51526,0,0,7401816abf99d4a162f81c4a64497409f17996ee97dfb971aaac55bd5051b4b0,2024-06-13T18:36:09.010000
CVE-2023-51527,0,0,ddfd9dc2bd6a5bcc26be050c33905dbd44ba492da91baba9f7e606359932d93a,2024-01-05T18:13:46.270000
@ -238461,7 +238461,7 @@ CVE-2023-52288,0,0,297c3e93d2578fa4354d42073bbfcc9c84a93418874a891bfd157ba56fb9c
CVE-2023-52289,0,0,b0b62bf64cde12eff577800bdca9d7c0c719bc9a23d6c24a235e18254584af67,2024-01-24T18:48:24.283000
CVE-2023-5229,0,0,96ae4a14c7f75bcf2b6cbe69f7946f8795ec64211a57e06d1e0d2d6ff05a7656,2023-11-08T18:35:10.590000
CVE-2023-52290,0,0,b027d3a77e3918cc6823c1648721e9d0ca22799d7375d42fe7f068b3c1f18fba,2024-07-16T13:43:58.773000
CVE-2023-52291,0,1,7772cf09da97597a918a9150daed1859a98d6c45b4018d585ba5a188af883777,2024-07-19T16:10:22.473000
CVE-2023-52291,0,0,7772cf09da97597a918a9150daed1859a98d6c45b4018d585ba5a188af883777,2024-07-19T16:10:22.473000
CVE-2023-52296,0,0,85a5b959f2db874145dc7271afa4c982911881063ce8b8741fd891792d7a0806,2024-06-10T17:16:16.537000
CVE-2023-5230,0,0,a536f5ec0e596e59d6ed211c038722ef9594f65abf67a435dc22663a31135f5f,2023-11-07T04:23:38.493000
CVE-2023-52302,0,0,22ea8ee42f1d0c97611b1d0c11616324d4f2cec9c11a2c69cd863452202dca24,2024-01-05T12:14:39.403000
@ -244409,7 +244409,7 @@ CVE-2024-22663,0,0,1df834bd60409bcfdc952b1d16a72a2b79aa4833b641f5c26890355046fa7
CVE-2024-22667,0,0,7f56d340505b9c3137def4c421a855d45fd7bbe83810d24f76e0d49e0f8614f2,2024-02-23T16:15:48.487000
CVE-2024-2267,0,0,2beab3e4260cef721297cd0e9cb16cbb758be6b3109196be8212a33811ea4f06,2024-05-17T02:38:07.740000
CVE-2024-2268,0,0,e2a7dcfd73ad41fec77d11c0ea586fcbb84dfae867d0aa7884e9bac53d173362,2024-05-17T02:38:07.847000
CVE-2024-22682,0,1,c1404a1205884a361a894ae22aa1c3d2c5d53e44fb2248c4bfc089a944299c07,2024-07-19T17:15:02.603000
CVE-2024-22682,0,1,5a340c1b31b6e259c63ff9afdb9ddfaa7ba2e6d870ae0776db25aa39ef718055,2024-07-19T19:15:08.093000
CVE-2024-2269,0,0,716bb232865d4622770d80e3ad9b9f6636d31addbbd5842da0c4461f410c04dd,2024-05-17T02:38:07.940000
CVE-2024-22699,0,0,a5781608ff1e46696ffacdee768d3d0c988970ac4c163d777ce0ccca4285198e,2024-01-23T14:22:44.407000
CVE-2024-2270,0,0,4e7a65f130d23c4c767220472a54f1e1a694a674ca4896ba97c8a2bb99f01cc1,2024-05-17T02:38:08.043000
@ -245800,7 +245800,7 @@ CVE-2024-24963,0,0,5d6e1af856b22054c356418d49796e2363906ed1aaaf2259e78ef057612da
CVE-2024-24964,0,0,453b708cc71a26e1c2e6a095353d8c5371dcecf82b39d783f4d95f24daf1a4b0,2024-03-12T12:40:13.500000
CVE-2024-24966,0,0,596d9f70ed531a9ce913b647600f9cfc649827cf292b66c3b67d74e0809d7525,2024-02-14T18:04:45.380000
CVE-2024-2497,0,0,0abba4a60a0501980b979aaaf4b97236170cb15ea02aea63aa677f7cf3690b8f,2024-05-17T02:38:15.830000
CVE-2024-24970,1,1,893ae421113022b9f5e6e7aad009917f97446326454722cb23f7783cc9a9e949,2024-07-19T17:15:02.983000
CVE-2024-24970,0,0,893ae421113022b9f5e6e7aad009917f97446326454722cb23f7783cc9a9e949,2024-07-19T17:15:02.983000
CVE-2024-24974,0,0,58746381295b34b611cdb4edd106ea5da27c78c578480d54a0db25ca5467d003,2024-07-11T14:47:54.920000
CVE-2024-24975,0,0,e45e77656a6eb7775bbf17ad859bf5d3a4697e166584b896665ee19b46725872,2024-03-15T12:53:06.423000
CVE-2024-24976,0,0,7e14392294efbbf37c55b7bae98233e6ba32f6560de82ec908c819c3c8f743ff,2024-04-03T17:24:18.150000
@ -246718,8 +246718,8 @@ CVE-2024-26270,0,0,2370bdb7a99956787a3745aa3f3e8554faf5c6062fbc90c3c2a2f302e3ff3
CVE-2024-26275,0,0,21e67c06e24d408ad1a549f766b54f5dfd1b4842df576d827b739e2a28d49505,2024-06-11T12:15:14.017000
CVE-2024-26276,0,0,7406f6551c3634363606a828a01f36a4203616ca4676532db244783183501388,2024-06-11T12:15:14.153000
CVE-2024-26277,0,0,53da675804208a63e801a731a45b8146add8b1e603e83f9c176483f042fa922f,2024-06-11T12:15:14.273000
CVE-2024-26278,0,0,5986564f5c39d94f87f9494805b5faa83d3851b974cedd3e7f1a4eaf4df96ffe,2024-07-09T18:18:38.713000
CVE-2024-26279,0,0,5bb6c47fa83d2cfe0b536ce92f13c6139ec1adf5e91efd22c3f866b53c3e15df,2024-07-10T09:15:02.400000
CVE-2024-26278,0,1,a4bf5f7d4f5a8cc66cc891c37bd6872984880cd4b8b9e994fb28df36f06ab446,2024-07-19T18:53:12.727000
CVE-2024-26279,0,1,495c848487ea7b68d426f27b99de0402b60520a7c129465843fde2c78b15bbc3,2024-07-19T18:53:34.103000
CVE-2024-2628,0,0,3eb383942c41e553b12d37d763a3ecf0b59954bbb778306cb6907ca273bdbf0e,2024-04-01T15:23:07.793000
CVE-2024-26280,0,0,1f3fc8cd8b6e3eb3dd36bd8ce4d8f8a9e24e131da3be579fb8d9bdda224678f9,2024-05-01T18:15:15.537000
CVE-2024-26281,0,0,79880eb9ab547a64badb9469ec54aaf28b8e0e224b4897c69af19cf6a4aea84d,2024-02-22T19:07:27.197000
@ -248709,7 +248709,7 @@ CVE-2024-29072,0,0,50e2db556663c43fd665c3ae801a5bd36f73f0e7479a230bf4ff9553f9fcd
CVE-2024-29074,0,0,dae045c5f696de776b77da3987f8405651ce1bf4fa99e4d5313acc43e5165076,2024-04-02T12:50:42.233000
CVE-2024-29078,0,0,a4fab3b35091f8fd08881f2bf49d899dc5478faeb8df15472b3560684c1a5420,2024-05-28T12:39:28.377000
CVE-2024-2908,0,0,3845fc124bc9f710736d5363f9b086190df4e2925cb4e5b4a7eb9455fd55b3c6,2024-07-03T01:53:38.703000
CVE-2024-29080,1,1,8a46f3e344c1eaf92b123fc0843d07f3e2398685a54e541c242233bbbbfee34c,2024-07-19T17:15:03.107000
CVE-2024-29080,0,0,8a46f3e344c1eaf92b123fc0843d07f3e2398685a54e541c242233bbbbfee34c,2024-07-19T17:15:03.107000
CVE-2024-29086,0,0,a506e441c3bf25764a8b903d5765d986b768db67b23cfb3ff53fe13b9a27e4ba,2024-04-02T12:50:42.233000
CVE-2024-29089,0,0,0e8f97a635f9f0c1a64450754b2a18a9e0c4596034f0fadf2dfda26a23dacbbd,2024-03-20T13:00:16.367000
CVE-2024-2909,0,0,0e3061bf6a0e2ec3e09b8019aa64a03564628e11a8822cb14e5d6cf0553832b0,2024-05-17T02:38:36.843000
@ -249008,7 +249008,7 @@ CVE-2024-29733,0,0,0811972ef853088b726fd2b07316244d1d628e55e310910ac8174bd65d097
CVE-2024-29734,0,0,65bb1ba04f673142d3081922c5e4533cd4af140db3cdfbbce09ab73848e3b6c3,2024-04-03T12:38:04.840000
CVE-2024-29735,0,0,1c27e1fe9dbb50907062f908fab6fbb55a16239f685d6be40b04c11200e2a361,2024-05-01T19:15:23.573000
CVE-2024-29736,0,0,a7b73099f01cfc61426635b9d2fd7a10ea2008e8a44cb47bcf89de564b7f1392,2024-07-19T13:01:44.567000
CVE-2024-29737,0,1,a77df9c668115e88f32080717a7a08c909bf33e8a8b6486eca536ea661fccb1f,2024-07-19T16:11:25.013000
CVE-2024-29737,0,0,a77df9c668115e88f32080717a7a08c909bf33e8a8b6486eca536ea661fccb1f,2024-07-19T16:11:25.013000
CVE-2024-29738,0,0,1c3e1564461702d87cd213d777f3523814ac3c73b5cc61bff5ae595e06e0fbeb,2024-04-08T18:49:25.863000
CVE-2024-29739,0,0,ff7d8db191ec3bc24b9fd0a0e51d4426e2f32708f8ba1a8e8a840affcd32aeb7,2024-04-08T18:49:25.863000
CVE-2024-2974,0,0,f10703d4490e9d3ed63c6b4abd6c9bf87d6d9b2c11e56d030e360944602d03aa,2024-04-10T13:23:38.787000
@ -249385,7 +249385,7 @@ CVE-2024-30101,0,0,7930ed1d01b5b02ebc919bac3d4e56f05b80c135c47d9aae654fe173e1327
CVE-2024-30102,0,0,319135154fd92fe7d8106fde2ca3c4802e21706ca62151c235c5521e4367379c,2024-06-20T17:24:52.287000
CVE-2024-30103,0,0,cbcd73720f86b02c166360f547f14e75567d871ea6a9bb35fd8a94c030f28d7b,2024-06-20T17:26:40.603000
CVE-2024-30104,0,0,0d6554d17808fae404c18fd87f0cb343eeacec3983f90ccf7acd89f92adcb133,2024-06-20T17:27:01.447000
CVE-2024-30105,0,0,078b2e18b0eeac9c8390325264d70460d1239a379abb18d69f8a888c569adbbc,2024-07-09T18:18:38.713000
CVE-2024-30105,0,1,177f59806b90f7454e05eec5de7f6b4d6c52d371716d38a2a5174f4a99a6d6ad,2024-07-19T18:59:11.433000
CVE-2024-30107,0,0,d3b5ab85a30627420755b961fce34a4b2d10a642f6dfcc200d0ec65e71213655,2024-07-03T01:53:50.107000
CVE-2024-30109,0,0,04881debc711277dac69677e9ba1bd3a604eac95048cd8a9d9b601fb19907fcf,2024-06-28T10:27:00.920000
CVE-2024-3011,0,0,c4846fd2702ef9f4bfa13037695154c3570856acd954e92705194ddf5482466d,2024-05-17T02:39:40.533000
@ -250922,7 +250922,7 @@ CVE-2024-32407,0,0,fbfaf7068ca597095592e38589ff8309655659ac5408bc5050ead219b55bb
CVE-2024-32409,0,0,cdbdcb7de47ba32c82cee0bb38b83e5519f96f658f96608562f1e326a9e11332,2024-07-03T01:56:34.063000
CVE-2024-3241,0,0,30b752b6ef5f38382b5d572e3de76b73f3f6fe3c9ee69699b564850e70a0c6b3,2024-05-14T19:17:55.627000
CVE-2024-32418,0,0,8172cdb05b747b2afd259a179cd5212ac2debbeaf77726c784f5b816cfdb0abc,2024-07-03T01:56:34.817000
CVE-2024-3242,0,1,0753c592a4141511b7b3f4c81254cd267743cc6b5e9ea8c66b642642aec73f3f,2024-07-19T16:24:02.483000
CVE-2024-3242,0,0,0753c592a4141511b7b3f4c81254cd267743cc6b5e9ea8c66b642642aec73f3f,2024-07-19T16:24:02.483000
CVE-2024-32428,0,0,e92a586d0042e2a50a8472dedb0e8a402fc021118b6e178b0be2f35b18ed1a72,2024-04-15T13:15:31.997000
CVE-2024-32429,0,0,08bf59fbf8ca8215ee905eedbc96639cdf782abe560db5472396d2a8508a1db9,2024-04-15T13:15:31.997000
CVE-2024-3243,0,0,b3be2b5736d16e5fdb86721d9ee927a8c62b47b675a9c47320a4673743e48844,2024-04-16T13:24:07.103000
@ -251501,9 +251501,9 @@ CVE-2024-33161,0,0,7c862270cd8db5129099f6546f3d477eb1434dd611bb5f19fdd029c5b8f8a
CVE-2024-33164,0,0,c1a8c6145de610892a7bb74e83180ec7a64a9f7db7bc45d4e35a23e8ebd4b541,2024-07-03T01:57:35.293000
CVE-2024-3317,0,0,15025142ba0ff8fc3f744db50ac9158b6bcb9b6d5a57142218ea92afecce54a1,2024-05-15T16:40:19.330000
CVE-2024-3318,0,0,71502ae7f4475eb417a0f66428af131ecf9e20dfbae9cc78fb40285e74c55810,2024-05-15T16:40:19.330000
CVE-2024-33180,0,0,6562ac8d4986d8f67087ecd4402a9c0cccda3a7addddbdcd0de9052ac369e373,2024-07-16T18:00:02.110000
CVE-2024-33180,0,1,be009f10bcebf1e98910a8635d0e84bddf7114d6da1db43077d57e11c3875055,2024-07-19T18:56:27.127000
CVE-2024-33181,0,0,77250253d08a3feb8fbbde7865e83c75f042d3ca6fd20c862b5cca96419dc488,2024-07-17T13:34:20.520000
CVE-2024-33182,0,0,5a56c714f351b63cd170f43a4b8811af0dd95f7067666d5d531a9d0912fb541d,2024-07-16T18:00:02.110000
CVE-2024-33182,0,1,5c7ef37a480fd030990cd949b2c37482b68e7bad26bc93f18c84eca3078bea91,2024-07-19T18:56:50.050000
CVE-2024-3319,0,0,3b63602fbf088f6ff76602ae3f5143e8ab646a9d9d32adce3daded5265d3ba0c,2024-05-15T16:40:19.330000
CVE-2024-3320,0,0,00dd140c669ed55b9724819953be5e5ab674983ce3dcac0f7cca51e60d13bb6e,2024-05-17T02:39:50.797000
CVE-2024-3321,0,0,c2a87eddc88d30331563f9d17a640b75164460d2c5dacd42388be73c643c2230,2024-05-17T02:39:50.900000
@ -252061,17 +252061,17 @@ CVE-2024-3411,0,0,c5534494d0c0f328f6dd6a29b2c75cf0917384aed2d3044a8f39c15c542a25
CVE-2024-34110,0,0,c15838464fcaf085b2c09e471beb2e732398e46cad7f992477efffffb5459007,2024-07-09T15:09:42.910000
CVE-2024-34111,0,0,4a9af478fa0b194ac18b28c5d5f631624ab8b5f4cddcd67eee0080f90cb10414,2024-07-09T15:24:38.657000
CVE-2024-34112,0,0,e62a170073c335d4b2fa523b231a2040753ea6d61925540b759aae879b0a33d7,2024-06-13T18:35:19.777000
CVE-2024-34113,0,0,7b6843edfcd14fb8a7629765448f30a61e7beb403d308d90890d18f8360ddf9e,2024-06-13T18:35:19.777000
CVE-2024-34115,0,0,1b054e2e34ac02d99381d8e9ef3dc5dff53c1ced25c5dcc74c0f1f19d8805b38,2024-06-13T18:35:19.777000
CVE-2024-34116,0,1,09fbac3718cdfc715ab3de1929ed1cef43d5ef1bea636640bb6faeb5c824040f,2024-07-19T17:40:23.473000
CVE-2024-34113,0,1,0f7d0a8eb1af93d43a3d745444146bc9527531bee6c987cddc2959cabac9896d,2024-07-19T18:36:42.237000
CVE-2024-34115,0,1,cc8b9b55a33ad4e137b074effd11699dd96f8494f93e6413f33a6c251661c876,2024-07-19T18:02:32.427000
CVE-2024-34116,0,0,09fbac3718cdfc715ab3de1929ed1cef43d5ef1bea636640bb6faeb5c824040f,2024-07-19T17:40:23.473000
CVE-2024-34119,0,0,b18bee7f46141710c36322baeea2f2f79cc2cfb9042e189f93a16a755c8d108c,2024-06-14T20:03:08.293000
CVE-2024-3412,0,0,e50c7e3ae6f10b261f3da66fd6437a79038925b3952464be81ac0e7b8712c198,2024-05-29T13:02:09.280000
CVE-2024-34120,0,0,59b2d9c769f5e7837181f42b948f1f4d6a71599cbcd1b502e5c0f6b22b12ebe5,2024-06-14T20:02:45.567000
CVE-2024-34122,0,0,1f1afdb8bcd7920872d40bc049791e258094ad813a8f738f73973f16e8f185df,2024-07-02T17:44:45.700000
CVE-2024-34123,0,0,60f48b7c1a1214b049b9220d35589296122b7174f3f0274e4f9438886e7fb319,2024-07-11T13:06:13.187000
CVE-2024-34129,0,1,4b371bd2ce78a755ab5bce8486ffc40418a5eef964d8e637f4bd806924a46c43,2024-07-19T17:30:15.177000
CVE-2024-34129,0,0,4b371bd2ce78a755ab5bce8486ffc40418a5eef964d8e637f4bd806924a46c43,2024-07-19T17:30:15.177000
CVE-2024-3413,0,0,393490437f33ce616f0a6848540c1c0d3eed8ed2038327f28efd50e305f3828b,2024-05-17T02:39:54.073000
CVE-2024-34130,0,1,39c33a1c2e45222da36d81ad20fcf2f2dae4088c0999d560d63f2526f4c81a40,2024-07-19T17:28:29.150000
CVE-2024-34130,0,0,39c33a1c2e45222da36d81ad20fcf2f2dae4088c0999d560d63f2526f4c81a40,2024-07-19T17:28:29.150000
CVE-2024-34139,0,0,31d5c4a8a58cc938349a57ec1f1fa8db5c0718d4f925f1121432b335f8c9c667,2024-07-11T13:06:13.187000
CVE-2024-3414,0,0,85e73a02de53c5bccb3cd76452d1972fd78b5413987e018bf8d64db8ededd514,2024-05-17T02:39:54.160000
CVE-2024-34140,0,0,d42a485cda9b4c14ee3827526c2ca3f4dbd317f45889049c0298065354f30d82,2024-07-11T13:06:13.187000
@ -252716,7 +252716,7 @@ CVE-2024-3526,0,0,3b86e48cdd64c94b1957dd961f1ea8a5609328c0a5fd236d499daf2f49d2a8
CVE-2024-35260,0,0,bae5987a3d9c4653f4a8ff7faa6c237ff82527372850961d3f63629ac612e217,2024-06-28T23:15:11.457000
CVE-2024-35261,0,0,9d9063b6e7979be3a79ef13bd9cc70b3fb0340950dd44d60d9d3d687415ebbe0,2024-07-17T15:48:39.097000
CVE-2024-35263,0,0,f00bc0132870d05293845d05b9562badae38c6c7b9bb0d9a00ba1c99b84818b6,2024-06-20T16:32:31.287000
CVE-2024-35264,0,0,93e7c701e1ef80d310b24809194d2644700ad22a6619971e5ca319f8f5a7b423,2024-07-09T18:18:38.713000
CVE-2024-35264,0,1,40d724389414ca4fabf1feae652fc23d2bbd2b3015de995d803ac6656e74295d,2024-07-19T18:59:28.370000
CVE-2024-35265,0,0,66f306784b0cec4cac480e0b04ab07434b85a607c811d4eded9bc25afd0a65fe,2024-06-20T16:33:28.080000
CVE-2024-35266,0,0,72f85b66607ed3ec09a2f90bfb8b5421fbcbe1083bf3c8d31d5232091779c5c4,2024-07-17T15:03:10.610000
CVE-2024-35267,0,0,8d2f4a11b808fec8563f241fc658cf43f5e54d7aaadc09b793c2bc37e252ec9d,2024-07-17T15:02:22.937000
@ -252753,7 +252753,7 @@ CVE-2024-35328,0,0,fb4ef24959ef3b86e1d1e2a626668146540c0ab6d259d48f6d635a7a92dd5
CVE-2024-35329,0,0,4292102d3fac0226e3e155445f438715ce7df9eb09ed90a898e6b306574b942f,2024-06-12T22:15:18.400000
CVE-2024-3533,0,0,488bd266f4041c85454e2052fe9f29a33b96935dc189b43a270de9d8362e90d3,2024-05-17T02:39:59.617000
CVE-2024-35333,0,0,a56b2cbb1d825bab243b29d0e8302efa743a6d64a0ad5ee6a14e21ffdd4302cd,2024-05-29T19:50:25.303000
CVE-2024-35338,0,0,4f89874487ceb85f057c56000ca48a188a2db440489d06ff770502776eda00c8,2024-07-16T18:00:02.110000
CVE-2024-35338,0,1,41104e352664b04e28e033aa02c5869f3a89a42461e39bce966f727fb8f2d51d,2024-07-19T18:58:08.977000
CVE-2024-35339,0,0,bda26dbfd7448a5a1d77a8cc49c3bca16a6f7dd67b8f4622c92179451c9d0982,2024-05-24T18:09:20.027000
CVE-2024-3534,0,0,a24b539c4ddbcbbbcd76a0a70e496243d7203c000aa2dbf195c274be99bd3f1c,2024-05-17T02:39:59.703000
CVE-2024-35340,0,0,208fd1528799a390da0274829910466a1b7fd43365d7d44eef3241578a979281,2024-05-24T18:09:20.027000
@ -252927,7 +252927,7 @@ CVE-2024-35679,0,0,e3874d05dedaa5997bd52774985048fece90019c44680ab2e261aaece615d
CVE-2024-3568,0,0,2f548317b29c37ed58ca4217ab349f9e591fac213b693fb6a25d52bf2ee21f1c,2024-04-10T19:49:51.183000
CVE-2024-35680,0,0,30b3a69a697953774910476dc31463038ad8b473ba7596113f1d83c92dbcc601,2024-06-12T17:49:56.670000
CVE-2024-35681,0,0,5816248594069c5b872a449cf953d1983d148a3e6df5e63b1c0a9449611baf05,2024-07-18T19:16:42.277000
CVE-2024-35682,0,1,e3065bea188f47617d60d5ec78ff5563173441e56553fbc4305bfb9f6b8b0f5f,2024-07-19T17:36:29.837000
CVE-2024-35682,0,0,e3065bea188f47617d60d5ec78ff5563173441e56553fbc4305bfb9f6b8b0f5f,2024-07-19T17:36:29.837000
CVE-2024-35683,0,0,35d7e7c403c9e1a0af5b15ee529f21dfe95dd77d68bca956781c650575c54c30,2024-06-13T18:36:45.417000
CVE-2024-35684,0,0,73ceea3685cab6d12bcc00b1be64bf260bc52647423fb13caa461de77b765285,2024-07-18T19:15:49.853000
CVE-2024-35685,0,0,139851b07c410dda78a8d072ad9e34deae44fbd00bd025834cea54049b4e0532,2024-06-11T13:54:12.057000
@ -253003,10 +253003,10 @@ CVE-2024-3575,0,0,7b73b64d176ee42e3f815efb129e0a4e8daabc141e22843995ce1432261811
CVE-2024-35750,0,0,337904e02d48eff7e7f71ff4e0b4d15f230905a46ebf33e9ed3f06ed45b6365c,2024-06-10T02:52:08.267000
CVE-2024-35751,0,0,2f4b51636ece37d50579e65fb58d2700611ff65fd14c4b21be633ae796fa0057,2024-06-10T02:52:08.267000
CVE-2024-35752,0,0,062777696b3e277bdd4663be2181ce3994f39fef6908c28ebd787d505d32576b,2024-06-10T02:52:08.267000
CVE-2024-35753,0,0,4bb4696f328f0e4e7859efe7b659bb97bc3f928fa53d27e62e615360845e3fbd,2024-06-10T02:52:08.267000
CVE-2024-35753,0,1,4ad7364fde338b1172d3912b082d48ff9c7e6bb90d9788eb462ee65f933adbdc,2024-07-19T18:31:44.157000
CVE-2024-35754,0,0,6542d4ccfbee23f434dbe55310367fe2a58769f4413cd83c76145804203a6991,2024-06-12T18:19:06.043000
CVE-2024-35755,0,0,a8c10fddaac41070d5fe50fd470da1315522de64d4a44961b0b2aff5b7478232,2024-06-10T02:52:08.267000
CVE-2024-35756,0,0,bd881757a8569f9b1783d5914550f75d4f6836125b5d758f1013fcd5113dc831,2024-06-10T02:52:08.267000
CVE-2024-35756,0,1,544619c9ecc5325b30fd6bce5cf3678837c7f45621d4b9369a6b2ab863337f02,2024-07-19T18:45:25.210000
CVE-2024-35757,0,0,1783dc94b696b52627bcb10bcd86c9195ecb7dd5f909ee1c78c7f825973d91cd,2024-06-24T19:19:01.097000
CVE-2024-35758,0,0,c003876eab7b54fdade1783d14653406500e6822c823598d393dc5d8fd37a00a,2024-06-24T19:19:51.957000
CVE-2024-35759,0,0,e957a3d510ea6fb897a8dc7146e8bb7eefa5cb0f601b99033133995f35de7948,2024-06-24T19:20:39.243000
@ -253548,7 +253548,7 @@ CVE-2024-36391,0,0,77310a97703465811c5ddd3ebe2104670dbc28c3dea8fc35d729dda239044
CVE-2024-36392,0,0,f8ffad51e43f014822bc8d56227eafc027d77ce4af9f8ddb281e1dd26642b42e,2024-06-03T14:46:24.250000
CVE-2024-36393,0,0,66cc85a4816620185dd811312e53841307ae83d95e0a80e5417b0f2e7ce598f0,2024-06-11T17:46:59.160000
CVE-2024-36394,0,0,ce487e69c50908b259342c996fd749aeec003c1cc9ebc8d7c04cb76587e4b2a6,2024-06-11T17:46:38.227000
CVE-2024-36395,0,0,c6034266d05648a78d5a6c28cb5264c7e8bba765bd3ba32ef65dbbdf3138f011,2024-06-13T18:35:19.777000
CVE-2024-36395,0,1,f89c2edf8412c7a856779bf7bdcd2dc639ea5537dbb90aaf5a59ca64c625227c,2024-07-19T18:34:58.837000
CVE-2024-36396,0,0,0e6924514e3a92d628b298cd68bd36948dbb22e9cbe90a69cf64659cd177b86d,2024-06-13T18:35:19.777000
CVE-2024-36397,0,0,188c11e4d152fc37a7853e376b1b43fe1b9cf304441640b2de09cf263ffc914e,2024-06-17T12:42:04.623000
CVE-2024-36399,0,0,343a0b337c47a08f8ef5da762844b89fa9f0783d7ae2cdee4dacb27b86b494cf,2024-06-07T14:56:05.647000
@ -254014,7 +254014,7 @@ CVE-2024-37212,0,0,1da1545884710cf41d492815f0c054f5d2977dca844bcd810f9fc3aadcdd7
CVE-2024-37213,0,0,21a78712c2c218b3b0b384a5d4240b3e62e3d159fc9e12c6e7a55a9b4833902f,2024-07-12T16:34:58.687000
CVE-2024-3722,0,0,9dc3cd0859a6ddeaf0632839a465d86a9a29445f6ee77561de6f569ccc572620,2024-05-14T16:11:39.510000
CVE-2024-37222,0,0,635e8498a543c26c1589880d4834a9aa974ef1739df3bbdce179ff0012928442,2024-06-20T16:07:50.417000
CVE-2024-37224,0,1,2df65ebcbcc9902f80631b03b15abc6d30e5ffeaacc8e5755dc9efbfd99df9cf,2024-07-19T17:59:52.237000
CVE-2024-37224,0,0,2df65ebcbcc9902f80631b03b15abc6d30e5ffeaacc8e5755dc9efbfd99df9cf,2024-07-19T17:59:52.237000
CVE-2024-37225,0,0,179ee80c42794d6e0c60673ab266af3489a613462005d715fc62812821eb180b,2024-07-09T18:19:14.047000
CVE-2024-37227,0,0,8976611308ba369d49147eef8d8ea5d2a5131539396f1b2753e8184974920298,2024-06-24T18:55:44.513000
CVE-2024-37228,0,0,50dbfc0262e032fcd024e283ea4d2f5dc7a22bd356a2985f5a28238a3bd731e1,2024-06-24T19:26:47.037000
@ -254142,10 +254142,10 @@ CVE-2024-3746,0,0,b404a3f5af28975fb4e5d0eb577c67fe9710274ad0c55beaeeb6ef81bbf0e3
CVE-2024-37462,0,0,44cdd4da08aa3278c309c9b230a9ebcb29a8195fe20831e74a9775071dc13635,2024-07-09T18:19:14.047000
CVE-2024-37464,0,0,d5dd0cd8721de83e6db957b2a4c4526c848f707b5f4204dfeac1e6b719416e1f,2024-07-09T18:19:14.047000
CVE-2024-3747,0,0,3219ce820822d72e46103b803901087d25784fb8e92da6509df83502f94f1ce3,2024-05-02T18:00:37.360000
CVE-2024-37471,0,1,d465bdcae3c1ad0d7280b371addcc2292b7e76a7a90d8614a04cd4784c1cba62,2024-07-19T17:02:31.163000
CVE-2024-37472,0,1,0212378c488764d33b1d17de1bc88a5356a23ba19a78046e8c133cfbba541862,2024-07-19T17:04:42.343000
CVE-2024-37471,0,0,d465bdcae3c1ad0d7280b371addcc2292b7e76a7a90d8614a04cd4784c1cba62,2024-07-19T17:02:31.163000
CVE-2024-37472,0,0,0212378c488764d33b1d17de1bc88a5356a23ba19a78046e8c133cfbba541862,2024-07-19T17:04:42.343000
CVE-2024-37474,0,0,e29b3ccf1312f58f8b90ea5bf768b9e4ab78293e46701b43859d8d72f1b6ca41,2024-07-19T15:34:49.460000
CVE-2024-37476,0,1,beaa8c83ba0e39b20623f48990395c389b87f4d82490a453165560bffd5535b0,2024-07-19T16:52:39.713000
CVE-2024-37476,0,0,beaa8c83ba0e39b20623f48990395c389b87f4d82490a453165560bffd5535b0,2024-07-19T16:52:39.713000
CVE-2024-37479,0,0,b47f15244b7d8bdc435b7b058e1a43515a90d9355fb7c5cb51f1025055601a89,2024-07-02T12:09:16.907000
CVE-2024-3748,0,0,130f91484f33c46b6a8a1b827c41c8bedf887e9f91a42beeaa1df38ecf15e978,2024-07-03T02:06:31.737000
CVE-2024-37484,0,0,5aa19fbeade225427f8be4047b53cf5aa423ef4d4466f797804f490d4e5cd642,2024-07-09T18:19:14.047000
@ -254198,7 +254198,7 @@ CVE-2024-37623,0,0,b515ba49cdad646a6e4424a0af8caad03b3eeb5dcc7461835b4fa847ff81d
CVE-2024-37624,0,0,c8b41555fa1b5545381823af8d22868fb77fdcda0648f938a956fe7589aa93b7,2024-07-18T20:58:16.307000
CVE-2024-37625,0,0,edc6c7ada3ab39a077d81e5fed77b0c921f58ec6eccf265b1a8392c99d85829c,2024-07-18T20:57:39.087000
CVE-2024-37626,0,0,67f0e21678f6260b33b002fa2f7c441578e8bb71c1b35d831202b3d9d14d22d7,2024-07-03T02:04:23.230000
CVE-2024-37629,0,1,c452ca69266bafb149b8a8c25dc755c132605c57e188dcb250482aa14f3f8d70,2024-07-19T16:13:17.120000
CVE-2024-37629,0,0,c452ca69266bafb149b8a8c25dc755c132605c57e188dcb250482aa14f3f8d70,2024-07-19T16:13:17.120000
CVE-2024-3763,0,0,cd55c084ec54d3c0946f7ee5493c1963824aa0176b48aa87ed4ff8f27854003d,2024-06-05T20:15:13.530000
CVE-2024-37630,0,0,dee490b16555575e984fef6b53d7765fc875bc84b7dc261110f314722879b3fc,2024-06-13T18:35:19.777000
CVE-2024-37631,0,0,a5cd8ddcd7ce699acdac9f3f2fda8f6d11cc509e6dadfd80153c488cb1c74926,2024-07-03T02:04:24.127000
@ -254285,7 +254285,7 @@ CVE-2024-37830,0,0,e0109fbeb8288904c31bfa3039a4919b2d322bf3da95ef389b8c5d886122a
CVE-2024-37831,0,0,dd81b6f858235d5d174850c3a09cd3119f2c9ef6775cb735f933a9db7d0b2fca,2024-06-17T12:42:04.623000
CVE-2024-3784,0,0,f0c80c77a0788aa17bf80578f54749ae490fe23c5161f7f9c165d9871caa60a2,2024-04-15T19:12:25.887000
CVE-2024-37840,0,0,1ea05f0cae39cea91919dabf259bc43d4d53a339aa6352e9633c1155c24e02e9,2024-07-03T02:04:49.190000
CVE-2024-37843,0,0,e001b9d240edef8099e10a7171d942636ce9089616c2693526efb6abefecb980,2024-06-26T12:44:29.693000
CVE-2024-37843,0,1,50fea0e4f3bac899fad47ec99906b1fa57df0775a56839eb833074fee5a84870,2024-07-19T18:37:07.720000
CVE-2024-37848,0,0,b9654691620e5501baad2d1771338ac2aedaf89f42fcedfa6b269a2de242ad76,2024-07-03T02:04:49.977000
CVE-2024-37849,0,0,4ee4d4574c1172cb3abdf8336968f4a7fdf4de3cfa287b589ecffd9b4f74d6e9,2024-06-13T18:35:19.777000
CVE-2024-3785,0,0,e84209989b24c941d7c6f3eae4d5a1283a6975747744d670fcd7c761c7276a68,2024-04-15T19:12:25.887000
@ -255158,7 +255158,7 @@ CVE-2024-39846,0,0,cc3d14fb15e20c985bb7fdeb359e7a12ea1918f79b7c4c3ac03373ad528c6
CVE-2024-39848,0,0,8178bbb2814e5fa60c3351f00827b86e4d6b7b334f71560f5ea323ec84986fcf,2024-07-03T02:05:53.147000
CVE-2024-3985,0,0,ceb8b898ec23867d1efcc4d7f7a630f584432f67007c6b07d5fd8199e1841622,2024-05-02T18:00:37.360000
CVE-2024-39853,0,0,0a0a7ef09f69a0d0504c74e5034409e9f17837e69e722a4f1f3c2adcfb998667,2024-07-03T02:05:53.353000
CVE-2024-39863,0,1,0f3b8fe12602984e778937df2bc3cf3bc21c3e0630f0f0f2248c583f86f727f0,2024-07-19T16:01:24.143000
CVE-2024-39863,0,0,0f3b8fe12602984e778937df2bc3cf3bc21c3e0630f0f0f2248c583f86f727f0,2024-07-19T16:01:24.143000
CVE-2024-39864,0,0,d53cf864986adcf58f762cd7c857169d0cf77d7c01b84f977b101e751257847c,2024-07-08T15:47:10.990000
CVE-2024-39865,0,0,1431947f48c63c3f2f289bcb05288d0cda08dff5370e915fbcca9f419224f5d7,2024-07-09T18:19:14.047000
CVE-2024-39866,0,0,4ed5613c5836c63f5d6549bcb87208902b3beb2ec94b1529e5dacfcf651468b3,2024-07-09T18:19:14.047000
@ -255173,7 +255173,7 @@ CVE-2024-39873,0,0,1a658b8037abfbe3e91b7510442ac4e5e9ef0d1495c2ad87b92c1ad50704c
CVE-2024-39874,0,0,14f6ca6c361900eb9cffe6fab1a9a6cec695e772018ab46292846bfaeafee4e4,2024-07-09T18:19:14.047000
CVE-2024-39875,0,0,7360bfd27b057e62564bd92359532fb7ec6b0e60daa411b44b0868522210c380,2024-07-09T18:19:14.047000
CVE-2024-39876,0,0,b618a8de6e7bfd8c90ec2968f20d226ce35ab815fa49f40d9bc6faad3fe37973,2024-07-09T18:19:14.047000
CVE-2024-39877,0,1,6700bf0d65ab8e68f72101ebd7eced49b767ebe26614d7171c2aa65b5fa09310,2024-07-19T16:04:04.003000
CVE-2024-39877,0,0,6700bf0d65ab8e68f72101ebd7eced49b767ebe26614d7171c2aa65b5fa09310,2024-07-19T16:04:04.003000
CVE-2024-39878,0,0,038c252a5df59aef0ff494dd466e8c23160164cb5ac894aeb1a33e06001b79d4,2024-07-02T12:09:16.907000
CVE-2024-39879,0,0,1b030ce3798bca0bad33a3937cca95b776786d7918bf02f25bff668e667acaa0,2024-07-02T12:09:16.907000
CVE-2024-3988,0,0,517f8158b252993c28722d017d1da97b60c9d30d3cb2f421d187823784125569,2024-04-25T13:18:13.537000
@ -255283,6 +255283,7 @@ CVE-2024-40392,0,0,24aff9cfa4b3c4d20ed420b107a0e9e4a1c46fd98a294b11a12a988b54b03
CVE-2024-40393,0,0,9a9cff313cd70f992ba5494f376cc0670f6ad08ca64711bf1142f1c34830e20a,2024-07-17T13:34:20.520000
CVE-2024-40394,0,0,17c458164baf1b329619113e6ff542879ba6819d1fa6a5d27ed04ca607ebcdcf,2024-07-17T13:34:20.520000
CVE-2024-4040,0,0,4c2ad1f11d479d0071ddbaeb3523edde6a0cd9c4e74c065c69d4bb5c9b1ac029,2024-04-26T15:25:47.270000
CVE-2024-40400,1,1,9eb6c2f93d706174f27bfc0dd5f74962384212a4ac44f32aa31dbee34f0af251,2024-07-19T19:15:09.147000
CVE-2024-40402,0,0,ea107e33c479f886c634a214935ebe7cdf707506e77c26fcea709812bfb0a8f8,2024-07-18T12:28:43.707000
CVE-2024-4041,0,0,bd71d95aba274d30d448ad146bc23c848b8a3b9576dc252f709372f143cb7780,2024-05-14T16:11:39.510000
CVE-2024-40412,0,0,ee1648a619ace402a2695f357644480cca061a0b71a8c8619f0a343e150121f2,2024-07-15T17:15:02.723000
@ -255529,7 +255530,7 @@ CVE-2024-41003,0,0,169fbc8d8f219b490cf3dfcf7244032fd260a4649a745984b83708bf36e0d
CVE-2024-41004,0,0,0147872dc41ee82345f1b96b142030c80a622f5d5ebc79db0dff57faab054509,2024-07-12T16:34:58.687000
CVE-2024-41005,0,0,95f568882fd1e16260f486a6121f76b4a7b47a9225c03cbcf7d46d652c71fb30,2024-07-12T16:34:58.687000
CVE-2024-41006,0,0,58bd6c502a79651b26621eacf2c0dc46dab924e02809c912fba2631a5541c0df,2024-07-12T16:34:58.687000
CVE-2024-41007,0,0,3a5f8217b27f31f94659ee14ad4d3eb5769831e9479c2468b28332be75d954c4,2024-07-18T12:15:03.357000
CVE-2024-41007,0,1,557d3d79f36960ef2852244da6d9d8db811ba2a987274c1ebfaa71dd3034b15a,2024-07-19T18:24:59.197000
CVE-2024-41008,0,0,44accff6edd09848f65c4ea30c272c9f4e4cafd7e8013f5ed231ff575ad7b53e,2024-07-16T13:43:58.773000
CVE-2024-41009,0,0,b973764a3f5390614759bf6dad52e86dad86b20c98263f759698c0703f8fb179,2024-07-19T15:06:23.827000
CVE-2024-41010,0,0,ae8d1d1b3ebaab40dc6ac6afde49ce66895bb7f4e7ee92f295ff5ca1fa79b217,2024-07-19T15:24:59.137000
@ -255562,7 +255563,7 @@ CVE-2024-4125,0,0,16553edd1211e1aa2542535f3455b94ede37886029935c5af09bcd7638eded
CVE-2024-4126,0,0,eeea001e03fa6fec03fbd996718e983ff172445a96f3b74ca8247477394c3911,2024-06-04T19:20:30.860000
CVE-2024-4127,0,0,13aabefe1ea17c857d1bb509e28f374ee8245c3658c3b51912d597c1f898ece0,2024-06-04T19:20:30.957000
CVE-2024-4128,0,0,68bc0506eec8fccf6c4228f6f90915fa5b089633c8bc20338b2c6bd4b4236a0b,2024-05-02T18:00:37.360000
CVE-2024-41281,1,1,b01d929d8f131ac1ed987e9f46da5818bc6a76b21067c1fd92736952a44e81a2,2024-07-19T17:15:03.330000
CVE-2024-41281,0,0,b01d929d8f131ac1ed987e9f46da5818bc6a76b21067c1fd92736952a44e81a2,2024-07-19T17:15:03.330000
CVE-2024-4129,0,0,f2fba94e29dd925b8a56a23f2711717731ea628ca4457222b442fc21c3f8c80a,2024-05-14T16:11:39.510000
CVE-2024-4133,0,0,809a3aebbf4e63405fb2f0740c9908f3dfcf1d711b93379e5d465ea9e56d3cba,2024-05-02T18:00:37.360000
CVE-2024-4135,0,0,3adddfced77f8fc8630aec5e175734a40783e3f6b247cb0614a312485a8097a3,2024-05-08T13:15:00.690000
@ -255574,10 +255575,10 @@ CVE-2024-4142,0,0,15f953d52654601c03ad89c9ea21867b549a2aa12635e109fbf9627466e8a2
CVE-2024-4143,0,0,e6d56e099b9443f818cba12ec6584b2ae78b4e2e6fa1554ff08fbd2e8dc736a0,2024-07-16T13:43:58.773000
CVE-2024-4144,0,0,f950a1b03316faa802a71776ce4e62cc15162cc9cec7d4c30c76255605b1c1fc,2024-05-14T19:17:55.627000
CVE-2024-4145,0,0,704254773246494130c81e0600984df247a970411736d475449e315ca595ee9b,2024-07-03T02:07:08.133000
CVE-2024-4146,0,0,7a45e9aef6cf9c090b751fcb577cc1c9faf666f2c92f3640bfe899e75605148e,2024-06-10T02:52:08.267000
CVE-2024-4146,0,1,5bcf92f96755106fd9c198be9e70039e9dbd3f86c15b09e938b03dc5a47e5822,2024-07-19T19:03:00.867000
CVE-2024-4148,0,0,71d4cc4cd9749254e9c2938609496cfae5673c1a094b971881b54b705d48028f,2024-06-03T14:46:24.250000
CVE-2024-4149,0,0,28fd6853c4bd2a7bfb26cdd043f9abfc9e17f0ae1c9764bac61fec52fa0d04ad,2024-07-02T14:44:29.993000
CVE-2024-41492,1,1,df5dc6152d8b7f9016d691345ca41000789321f2336459b6d5b196f16f0ba6eb,2024-07-19T17:15:03.410000
CVE-2024-41492,0,0,df5dc6152d8b7f9016d691345ca41000789321f2336459b6d5b196f16f0ba6eb,2024-07-19T17:15:03.410000
CVE-2024-4150,0,0,6620986a45cd70dd6d417a583c6a5ddd7d1307e119d46c0f4cd76fea931ab7e8,2024-05-14T16:11:39.510000
CVE-2024-4151,0,0,184358b81eb9acee20577f584c8b5e1a6db85454c76256d1b84c36d7ab6c85e5,2024-05-20T15:17:54.513000
CVE-2024-4152,0,0,36a0d7cfd7ae4093c14018eeecb901f1be03f5ffbcf2f6180fccbe34da83a1ec,2024-06-07T17:15:51.580000
@ -255589,9 +255590,10 @@ CVE-2024-4157,0,0,ac5ec2e690c76b81403cfa49bc63d1a8caa2fb9d97d28a1055398849720db7
CVE-2024-4158,0,0,9bd0a38e47c5b6d26f1e587737a0ffeb7c251278f38061995fc29ba309646aa6,2024-05-14T16:11:39.510000
CVE-2024-4159,0,0,72a4ec46db1a22f62474bfa22a14f37a28a6ceba3042de92b905fca6cc58c082,2024-04-25T23:15:47.087000
CVE-2024-4160,0,0,02cbb5178621697de395e5bf97f83709ae910ce21eba24af27e6bc1b3971ae89,2024-05-31T13:01:46.727000
CVE-2024-41601,1,1,346a350f43cc75f6197ce50f796f5c3c3054d176e1b80e37e03376e5e3d38a33,2024-07-19T17:15:03.490000
CVE-2024-41602,1,1,321201a0937930bf35589a600482c1b1af97360b03457a5a65e6829dc457eac2,2024-07-19T17:15:03.570000
CVE-2024-41603,1,1,6a7507291c8b57ee5956dc2f44ac7781896d1044f85ac59aec3e0a282217d111,2024-07-19T17:15:03.640000
CVE-2024-41600,1,1,f2b932f624dfd0458e745bcd1483aa62906a0984e1310058a8424a219fa01fef,2024-07-19T18:15:05.727000
CVE-2024-41601,0,0,346a350f43cc75f6197ce50f796f5c3c3054d176e1b80e37e03376e5e3d38a33,2024-07-19T17:15:03.490000
CVE-2024-41602,0,0,321201a0937930bf35589a600482c1b1af97360b03457a5a65e6829dc457eac2,2024-07-19T17:15:03.570000
CVE-2024-41603,0,0,6a7507291c8b57ee5956dc2f44ac7781896d1044f85ac59aec3e0a282217d111,2024-07-19T17:15:03.640000
CVE-2024-4161,0,0,818606f25cf93cd94814d58a9247fa25de635b9142e537f83382fb857b8b71ef,2024-04-25T13:18:13.537000
CVE-2024-4162,0,0,1a4f39929c1df6d420ff35b2d8de51a57c5e5378a57b6e7a1a35abc1b5a3dc57,2024-05-08T13:15:00.690000
CVE-2024-4163,0,0,69022c7df60536fa7bdfb20d2705efebe8d2d6c2c39bf59b2dcb5940921dba2c,2024-07-03T02:07:10.047000
@ -256042,7 +256044,7 @@ CVE-2024-4676,0,0,36c2a5f720119d264342d4d9b8586d4aebc357e75b49de4b862f0e7d867ff3
CVE-2024-4677,0,0,06b789b4e22353188f4fa1dbcfc045ef487187889647b738ddd6f1b3dabcd887,2024-06-04T19:20:45.830000
CVE-2024-4678,0,0,be695eaab1f72a88b10d5b9b54afd539ecd5dccc02b3dde1eca881aeeba1ff59,2024-06-04T19:20:45.930000
CVE-2024-4679,0,0,9bfb1104bd992ff014fab2b1166f6f818504f2232183224a6a702e4c44b2119a,2024-07-02T12:09:16.907000
CVE-2024-4680,0,0,99fffd1c928dc99074fe8bf01e4d5a3f58492e3c404d5bbd6910f8eacee3490c,2024-06-10T02:52:08.267000
CVE-2024-4680,0,1,0c8976c1b63cea89edb43ad9d9b81fc90d65237e24435549d62994fa7d6af35d,2024-07-19T18:51:53.003000
CVE-2024-4681,0,0,fe9d790ee9979c1aca5fe28a3e8115d4c327b815a1753595a7df398a95b1856e,2024-06-04T19:20:46.033000
CVE-2024-4682,0,0,b188d20fdb53d2324882bc38bcdbd4c51d4b6beb562fc8362c2866e7563895e8,2024-06-04T19:20:46.140000
CVE-2024-4683,0,0,f97d6282ccf029728c8ab8e65ca2b64efa101897ef8ccdc22b5456d11d66a8f8,2024-06-04T19:20:46.247000
@ -256658,7 +256660,7 @@ CVE-2024-5397,0,0,79c82f6af34f5d76edc0fe512c9b3e616bf4c7ca15c122380ba9806c73a591
CVE-2024-5398,0,0,1fca9edd99ff7753e0d36d6f4d73a5a23ccf8ab9dd992541f79488471e393289,2024-06-11T10:15:13.690000
CVE-2024-5399,0,0,6f591a4ee360dfdb4118262029ef6ec2f3647ffdfa160e81ed9cdadb88ac0f1d,2024-05-28T12:39:28.377000
CVE-2024-5400,0,0,094967d50b5003fa8a1a95a7cd40ccdb2300c03695bb818acf6e11d6054c6ffe,2024-05-28T12:39:28.377000
CVE-2024-5402,0,0,f9eeaef9d858d50b0dc8b7830c1c6e37f908d2aebea96748bdfca508ff29c76a,2024-07-15T13:00:34.853000
CVE-2024-5402,0,1,a5e55a0c84701c59a5f5d7ada1c30ecac8bd71919dc47c454e4a5ba90cd9220e,2024-07-19T18:03:55.583000
CVE-2024-5403,0,0,2e916307137919215633d6a47f3e654241b49fba1a899d76e9efd2abd496b6ad,2024-05-28T12:39:28.377000
CVE-2024-5404,0,0,9555ba3a9174cf37744b3f17110afa21577889d292df132a8c1f8da3c56bf2a0,2024-06-03T14:46:24.250000
CVE-2024-5405,0,0,c7e95a2942d42700f7e78ab698eaffdd8aeff4f1adde3aec6c39fd8479ab2700,2024-05-28T12:39:28.377000
@ -256703,7 +256705,7 @@ CVE-2024-5452,0,0,78c116a6a9dc3570ee7c04955c3fdb947d6a087a3e839a7cc2b81e0409d936
CVE-2024-5453,0,0,b20a0834ca5689b452f6b7173de63ab33385cf72d5d8c59a0cf15e703dd6a33b,2024-06-11T17:34:52.263000
CVE-2024-5455,0,0,504a2312040d893e95d789f867e1d4122509ea9da589bac420b384edcb7af3cf,2024-07-17T13:46:09.660000
CVE-2024-5456,0,0,4fbbd7e22723b0ac292a15510bd5e2f1843cb88c35dba173a43ab7680f62380a,2024-07-09T18:19:14.047000
CVE-2024-5457,0,1,4bd3534e5c8e3846c6373878cbe704c78d4a9804975dea52f238f183cca2c68c,2024-07-19T17:55:55.343000
CVE-2024-5457,0,0,4bd3534e5c8e3846c6373878cbe704c78d4a9804975dea52f238f183cca2c68c,2024-07-19T17:55:55.343000
CVE-2024-5458,0,0,ecce33b383e3250d0d6482d44440ec6cfd4fced73f96f924c4a6b853790d20fc,2024-06-18T10:15:10.870000
CVE-2024-5459,0,0,c2af4e92b1764c27a294b8b9210b2518bf4b2703cdeb9e4502885231e13d99a3,2024-06-13T19:35:55.083000
CVE-2024-5460,0,0,4e099435e4545094901bd58b61fc926119ab5684f745a9d9aa540744798c104f,2024-06-26T12:44:29.693000
@ -256717,7 +256719,7 @@ CVE-2024-5471,0,0,b5058f52e9634b68f4d4000cb97858db03cd2fac3d75cd140cb047a19da1c6
CVE-2024-5472,0,0,5266d0242327561f219784f0c46dd50d182936ab4a103ea249459b5dcb746156,2024-07-15T13:00:34.853000
CVE-2024-5473,0,0,7a9289264d1a834c0b8e9151c353ddcb7a22a22f6b7d360897c02053aaaeb88c,2024-07-03T02:08:57.860000
CVE-2024-5475,0,0,e09a66bd4d026df38a62a9d0642b82f2a5b9bf49c6a2d9e0e1e141414790fdd3,2024-07-03T02:08:58.050000
CVE-2024-5478,0,0,f98bb962ebdc689e4533f9bc6000e2923314fc7e209e4220035a196848b232b3,2024-06-07T14:56:05.647000
CVE-2024-5478,0,1,c601a39452cb705e9035daa72131a8a960693dee4deccdae668f9ad5d8466d4f,2024-07-19T18:29:50.137000
CVE-2024-5479,0,0,7bf7a94732a4ce28b83209c9d21f799503dcb5933696ba21b8f4bc98737c6d69,2024-07-09T18:19:14.047000
CVE-2024-5480,0,0,e3b751f5e1aae9a001af5fbca0b04d0edc5a2fa5a73d6ec1b3a09941cad9078b,2024-06-07T14:56:05.647000
CVE-2024-5481,0,0,32222ebb3f7a972393fb918a0cdb6b7e38cf91a107006665f6c1b1bad41a3e4f,2024-06-11T18:00:09.740000
@ -256783,7 +256785,7 @@ CVE-2024-5557,0,0,e58f4a9974ae6a6ad512e69202e5dee259550c69c446c060784da606557be5
CVE-2024-5558,0,0,f5606f757a3846688e526f8e8c7b353ed841a6a8222c822314196faac2c09cd1,2024-06-13T18:36:09.010000
CVE-2024-5559,0,0,0c59604cbf219c2ba1c247f52c304752b12dd0f3c92c8b3c96e21ad233f99b0a,2024-06-13T18:36:09.010000
CVE-2024-5560,0,0,3f42aec8823e745767fb091b3297e1872303ba832aca849be344540d1aa59c5f,2024-06-13T18:36:09.010000
CVE-2024-5564,0,1,582ae8d6e013444879054c957a9f974e1fbdab4bea18417275b8c53698226d12,2024-07-19T16:15:03.193000
CVE-2024-5564,0,0,582ae8d6e013444879054c957a9f974e1fbdab4bea18417275b8c53698226d12,2024-07-19T16:15:03.193000
CVE-2024-5565,0,0,e1d36fa68b4a73d6b78bd8eb39c3f27f14d8d32dc884b4fdfa0f8545d690e8d1,2024-07-03T02:09:05.567000
CVE-2024-5566,0,0,a945a0a6dfd60ba4f2475074f739c9c903faf3b04e2fc6dbcbd43f919a80fa3c,2024-07-17T13:34:20.520000
CVE-2024-5569,0,0,b9fd3bed59b5f668c54b0264622201b8600e789b08e0f56eae05ce6b6e8c76ce,2024-07-09T18:19:14.047000
@ -256793,7 +256795,7 @@ CVE-2024-5573,0,0,250942dd398584b07af081969c90c51eb870e472776aa0a5f143054241cd8a
CVE-2024-5574,0,0,e718295307eca06b04fb56f70dfb8daf0ce4b10163936e86fc3b21a6f71a4423,2024-06-20T12:44:01.637000
CVE-2024-5575,0,0,0d0faeec0f613a9625ccc8cb2724627ce688cebf183de5add4fa7e9fd84a3054,2024-07-15T13:00:34.853000
CVE-2024-5577,0,0,5dd16baf94f18e7abae39f40d89c75af3dba9492f2b1af50e3d8516c5413b1e4,2024-06-17T12:42:04.623000
CVE-2024-5582,0,1,3868d6c914880d2428453bd960a7aeb89cb5bb99f0fc09b9de444e14a34c6012,2024-07-19T16:05:10.290000
CVE-2024-5582,0,0,3868d6c914880d2428453bd960a7aeb89cb5bb99f0fc09b9de444e14a34c6012,2024-07-19T16:05:10.290000
CVE-2024-5584,0,0,7705ff7ae1b4fd1342d12756cedf379ac85bb5a3b8398b6b986f5e220e43afde,2024-06-11T13:54:12.057000
CVE-2024-5585,0,0,9e089b029f69ddc50638e027531ef06d5e8acf986dd2efdfe6f9d39673e035c3,2024-06-13T04:15:17.407000
CVE-2024-5587,0,0,6b9958828217f46ad00f93a8982028b537e303232ee58bb83f00389806575abd,2024-06-03T14:46:24.250000
@ -256887,7 +256889,7 @@ CVE-2024-5699,0,0,c6a42ec507c58416dc30ca6ed956f1ded247800b2c9b3cf1e9a175eb88ff9b
CVE-2024-5700,0,0,75281b3d92ab48138fa84376c62cf06e3b235ecbf0492685b83c4b5de8ec6545,2024-07-03T02:09:12.470000
CVE-2024-5701,0,0,50132399b0866a3a39154eec031eecee61c5e1b87964f02e5d6e5dcb69b1128f,2024-06-11T13:54:12.057000
CVE-2024-5702,0,0,38c1097fef455f8c14a4a11698b056f16759fa186a63b78823c287fecdc7ce07,2024-06-19T10:15:11.583000
CVE-2024-5703,0,1,5ca9c34d8a3be3710e16eaa453823ef22cf36c499d35ca66a69839485dd178a3,2024-07-19T16:05:42.090000
CVE-2024-5703,0,0,5ca9c34d8a3be3710e16eaa453823ef22cf36c499d35ca66a69839485dd178a3,2024-07-19T16:05:42.090000
CVE-2024-5704,0,0,be55689131fc57547da71e8726572a7a1a86cf57932558d33666ec0b15eef9b9,2024-07-09T18:19:14.047000
CVE-2024-5710,0,0,bbba5caf4cb4f465fb2a1f44424b7af778bd56d5f1b17eb3b38248b8a0397322,2024-07-01T10:15:30.183000
CVE-2024-5711,0,0,463604f6d6d272196433a5bb7494f0542e749e8811ac98ab1c08049581f8b425,2024-07-11T21:15:12.787000
@ -256921,7 +256923,7 @@ CVE-2024-5755,0,0,18288403f67281063c09c8ff29d182967f82bf6bbbadea2fe8a94bcd12e5aa
CVE-2024-5756,0,0,8f9e9c6b47319f2e6056e0eeab0b95c7967e08ebf1f00846244d8a548a26a9af,2024-07-17T13:52:08.350000
CVE-2024-5757,0,0,5cb8c18a619114307d2634441346064118b79a7aeac4723897e195eaa5132dad,2024-07-02T14:42:05.977000
CVE-2024-5758,0,0,c078716fbf80b259c8ceac06415d3d039d4ef773f8ae701649c6b0b1483ee99e,2024-06-13T21:15:57.543000
CVE-2024-5759,0,0,73a17b75680273fdfd9d017a3a63edc01419b26c432a0c56c3db7da8682d5fb2,2024-06-13T18:36:09.010000
CVE-2024-5759,0,1,63cf4f5f11600a3e2abf833e3aff1a738015e39c1ce27037c94f84f83452efea,2024-07-19T18:40:53.863000
CVE-2024-5761,0,0,1fdad964c86313b412878f67fac5999c9a1ea015b844614bc58b000414661a53,2024-06-07T19:15:24.467000
CVE-2024-5766,0,0,1263d0917882c36f131e194bb6b44630da06ab1a17b9faa93d76c1b934e8029c,2024-06-10T02:52:08.267000
CVE-2024-5767,0,0,946a7a6edb6231f843cc8c36568eec07c01ffe4bb17f732fe05d02ccf6a0e4bc,2024-07-09T16:23:07.280000
@ -257060,7 +257062,7 @@ CVE-2024-5971,0,0,357987ac7415afbcb31d94ddf79e1610c1e4bcbc7b687b78aa636fbb9a4c84
CVE-2024-5972,0,0,3700c5b3eb4bcd1d3bafe18b568e7aab0a0471128c3ce92a2f73ba8aa9a9cb4f,2024-06-28T19:15:07.500000
CVE-2024-5974,0,0,fd52c68141e6ff6d700f6466616845a44fbd39c5ab415ece01ca8d456d4e8b30,2024-07-09T18:19:14.047000
CVE-2024-5976,0,0,0d4a23e2583616de98536e1ad4d7b2a882021b32cad502d23a934bbf343ef666,2024-06-17T12:43:31.090000
CVE-2024-5977,0,0,727b1e5bc9a2fdbbe2a201a80b666337239515f573706de037d068dde3bc3f8c,2024-07-19T13:01:44.567000
CVE-2024-5977,0,1,7de0cc63740102074a24c1686c7837a6d04da6c097ad8d0ab882790d8002a494,2024-07-19T18:27:34.967000
CVE-2024-5979,0,0,2890db7bdc2045eea751460532af007391576d7da8d9f838bf14583c0290ae73,2024-06-27T19:25:12.067000
CVE-2024-5980,0,0,915920a5c8bdff0e9b559c6fdf1db06079562e1ee1f1333b9d9e824a78939fce,2024-06-27T19:25:12.067000
CVE-2024-5981,0,0,6efd4ce65d0be4286973240a22b49938ee7da116677222eebd9958d92f31bba4,2024-06-17T12:43:31.090000
@ -257227,7 +257229,7 @@ CVE-2024-6215,0,0,720f1739703095287552164316882a6b926c156c15e89c7dc7084a2a8b1f11
CVE-2024-6216,0,0,99a638bb9b091862ee1125e5c2af18142e9f2a446dc1f5e54add6d69d774b8bc,2024-06-24T20:15:11.177000
CVE-2024-6217,0,0,caeef107ec037a20535b69bf461e75c9da91ce4fd887edb01336f60c235444b1,2024-06-21T11:22:01.687000
CVE-2024-6218,0,0,3cb8a30d4ddfe61bdea61d401bfb5f7d243e9ab40309c0377a9f4fcd89ff6826,2024-06-21T15:15:16.547000
CVE-2024-6220,0,1,b8f7be72e11caf0a6de2963374978a31527ab96f2e76d2ac8d3bbf41bd4c9d7f,2024-07-19T16:07:05.057000
CVE-2024-6220,0,0,b8f7be72e11caf0a6de2963374978a31527ab96f2e76d2ac8d3bbf41bd4c9d7f,2024-07-19T16:07:05.057000
CVE-2024-6222,0,0,7da69ce6fbc5989cf8dc00c0967cc47c0670f03447330ea36d4de40ed4ce08ae,2024-07-12T17:05:39.070000
CVE-2024-6225,0,0,510a69cec2d5d6c6d036e0951030f27f3f34bcc77e3448a2bbf2dbc18120fe93,2024-06-24T19:21:28.450000
CVE-2024-6227,0,0,6448b237469b4af8add5bea6ce3efd3ec79e9126dca5090705d4ceeb86be54e2,2024-07-09T18:19:14.047000
@ -257334,7 +257336,7 @@ CVE-2024-6392,0,0,f361942df6276a0c96574512bc05717f2075a1be2cafe6840357bf3e68ede9
CVE-2024-6395,0,0,2a18837f9b52736b65326c96554b2a3dce564d78893cb5d5644f7daa6a7748b8,2024-07-17T13:34:20.520000
CVE-2024-6396,0,0,9e4b547b4d90c33704c90a7cfe67a136b4a49a6d0168d4ba570b6960a74fd1cc,2024-07-12T12:49:07.030000
CVE-2024-6397,0,0,69c6adc6e74f8320b438655fc21122936f7ec03e924b3cf51bf011308451b2af,2024-07-12T17:02:56.110000
CVE-2024-6398,0,0,46dda7a5b4fe3cfc91f44f053e8ea205ce4ce2d1760fdb643ea6bf53ab588331,2024-07-15T13:00:34.853000
CVE-2024-6398,0,1,5e78ff46f697643e5cc753102552fe7954080f3b71babda50e4591659f0fb988,2024-07-19T18:25:44.247000
CVE-2024-6402,0,0,795485c4534407e246daec51c1daaa33b95f6651688fed743a8fb9054cdaedba,2024-07-01T12:37:24.220000
CVE-2024-6403,0,0,e44b9cfa8d9ae367e624a8cdf179ef52ea1e98c2115d7a956299d17747a6a56b,2024-07-01T12:37:24.220000
CVE-2024-6405,0,0,fdb62e3d2213e21f6cf3d269e158ee31cc07c01f1a5a460b466ccce5203f82ee,2024-07-01T12:37:24.220000
@ -257473,12 +257475,12 @@ CVE-2024-6737,0,0,8702e57b452a150308d6299787708abc780fef0e416c70970908b3d0d87bc7
CVE-2024-6738,0,0,3a61a9d0dff57bd9a24abf3ccb065f63726018d20fe8e9197bc7bc11863de922,2024-07-16T14:06:27.810000
CVE-2024-6739,0,0,ff130f606a3e8a51263eb79c0c10405a59fd6ec00a9a26fc959f88e93b41ffd0,2024-07-16T18:02:40.327000
CVE-2024-6740,0,0,d308678365582cc0cd3506da47feaac1bc28b638b68ea34f78ba187ccd8f0bc0,2024-07-16T18:04:27.443000
CVE-2024-6741,0,0,b79b37b238cd50da835ed0a026304117c198db84ec9f205daded4f74e448a08b,2024-07-15T13:00:34.853000
CVE-2024-6741,0,1,9b56d0b03e3ffc096ead1a054aba81fcde4d9f0941a6e35a1c411f336b0f48e5,2024-07-19T18:23:40.233000
CVE-2024-6742,0,0,68316e77653ac592b1c728d700048d14f2f4d999c5b5bc0e6fa5293bbd87d387,2024-07-16T18:07:58.773000
CVE-2024-6743,0,0,d20423ae34ef7edd843a6cb67ab6563bdeae21fb73206254415d2c0219c744cd,2024-07-16T18:07:47.567000
CVE-2024-6744,0,0,db4e7b937d3d03ea3e3b2b15edbfe780a0b875b3fdcc47905faa685f3164112e,2024-07-16T18:06:51.390000
CVE-2024-6745,0,0,707134dd0252b920cb08895baec52c5557bd805c744814b8ecb19c1d5a8e997c,2024-07-15T13:00:34.853000
CVE-2024-6746,0,0,5be3956d6b4bf01a386e4ceaf78307e768b453c5db30b63143d293a79513dc46,2024-07-15T13:00:34.853000
CVE-2024-6745,0,1,1617c1b62a6985e7cfd1493a4e6106081b5b226c76f4caaa1064224772ef702b,2024-07-19T18:04:47.363000
CVE-2024-6746,0,1,a07904c7ab441e8aefcdf67187efe0701752648d282a9adf495048d9805d0f66,2024-07-19T18:02:29.417000
CVE-2024-6765,0,0,582116fb1612a7c43e0b570dc3dd773f185a6bed827d147d00793764d2f2774e,2024-07-17T14:15:04.327000
CVE-2024-6772,0,0,7a4dce423c8b75d7fc80a06f5d75b304a1c3cb61b88f44b30dd94156af9ab8e1,2024-07-17T13:34:20.520000
CVE-2024-6773,0,0,654a62798e16ce714df475111f6e31ff6e77aaddc1afe3d8197169aa0cc75c10,2024-07-17T13:34:20.520000
@ -257501,10 +257503,10 @@ CVE-2024-6834,0,0,9b06026f568f95c4c2a4be9208340b1bc5ab27fea601ce9296ee0a0b671ec6
CVE-2024-6895,0,0,0c486e88c5dc57ed2713d59c6e5f599844da09fd6e820a24b10235451464145d,2024-07-19T15:15:10.547000
CVE-2024-6898,0,0,98dae2dc951da0c9f1ac4e695a7ad38573b2abb15f5508f51642ed9635c194c6,2024-07-19T13:01:44.567000
CVE-2024-6899,0,0,862a9d8e40eab426823cca194fdd307dafe70d2837c62b14a818c2e38cfb311c,2024-07-19T13:01:44.567000
CVE-2024-6900,0,0,f9a0db97abb2b7a030f206724ca09833acdf6dd97e33de095d4cd3f3b37ccb05,2024-07-19T13:01:44.567000
CVE-2024-6901,0,0,e54159de50db3a8be34eb97b9e3f649430e41359e21d071d1c89b458210a168d,2024-07-19T13:01:44.567000
CVE-2024-6902,0,0,495ce6a6d90db5ffc5fcf4c35200d986c6bd9aea37bed0cdf107762f60a152ec,2024-07-19T13:01:44.567000
CVE-2024-6903,0,0,458cf84eca0cf9431d58c9dde569871b33a0e0cb2c0e1a1544d8b15458d5e52b,2024-07-19T13:01:44.567000
CVE-2024-6900,0,1,fbb8aa8415260c9b1e26455be1910b1083e8bf94841d4f12f5417011c57ac42e,2024-07-19T19:54:20.537000
CVE-2024-6901,0,1,c28b23edd1f3046de2a52da537dee85028a9b3d9f213ffb3130989af23e1c1c1,2024-07-19T19:55:00.210000
CVE-2024-6902,0,1,f926fb22c680b61739989f51b7f1eaf6c4ea518a5e1bc277f5ef3101be83da21,2024-07-19T19:10:24.903000
CVE-2024-6903,0,1,adc23f247bb0a7d879884222f6215ed295391e32456516ddcf4324ccbf8de103,2024-07-19T19:51:55.617000
CVE-2024-6904,0,0,7a4b54dc15a07a62a46eb4054278ab061629c71b06171b5dc53981c366a15e59,2024-07-19T13:01:44.567000
CVE-2024-6905,0,0,93733b32b43103d2e6f495524d768f1986f9f809f44d345a79d9a3c82c1dfb61,2024-07-19T13:01:44.567000
CVE-2024-6906,0,0,bd3edaa779f3d24c608497477495531b8c58c3f636652b3dd6d229b39e74ed48,2024-07-19T13:01:44.567000

Can't render this file because it is too large.