mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-05-08 19:47:09 +00:00
Auto-Update: 2024-06-12T20:00:18.835817+00:00
This commit is contained in:
parent
1df53dfc1e
commit
74ab3a091b
@ -2,19 +2,80 @@
|
||||
"id": "CVE-2022-32897",
|
||||
"sourceIdentifier": "product-security@apple.com",
|
||||
"published": "2024-06-10T20:15:12.440",
|
||||
"lastModified": "2024-06-10T20:54:18.443",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-06-12T18:08:05.860",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A memory corruption issue was addressed with improved validation. This issue is fixed in macOS Monterey 12.5. Processing a maliciously crafted tiff file may lead to arbitrary code execution."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Se solucion\u00f3 un problema de corrupci\u00f3n de memoria con una validaci\u00f3n mejorada. Este problema se solucion\u00f3 en macOS Monterey 12.5. El procesamiento de un archivo tiff creado con fines malintencionados puede provocar la ejecuci\u00f3n de c\u00f3digo arbitrario."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 7.8,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-787"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "12.5",
|
||||
"matchCriteriaId": "F8EE7558-B3A3-40EC-AB95-70FDD5C4E1CB"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/HT213345",
|
||||
"source": "product-security@apple.com"
|
||||
"source": "product-security@apple.com",
|
||||
"tags": [
|
||||
"Release Notes",
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,19 +2,79 @@
|
||||
"id": "CVE-2022-32933",
|
||||
"sourceIdentifier": "product-security@apple.com",
|
||||
"published": "2024-06-10T20:15:12.533",
|
||||
"lastModified": "2024-06-10T20:54:18.443",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-06-12T18:07:08.790",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "An information disclosure issue was addressed by removing the vulnerable code. This issue is fixed in macOS Monterey 12.5. A website may be able to track the websites a user visited in Safari private browsing mode."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Se solucion\u00f3 un problema de divulgaci\u00f3n de informaci\u00f3n eliminando el c\u00f3digo vulnerable. Este problema se solucion\u00f3 en macOS Monterey 12.5. Un sitio web puede rastrear los sitios web que visit\u00f3 un usuario en el modo de navegaci\u00f3n privada de Safari."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 5.3,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 1.4
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "NVD-CWE-noinfo"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "12.5",
|
||||
"matchCriteriaId": "F8EE7558-B3A3-40EC-AB95-70FDD5C4E1CB"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/HT213345",
|
||||
"source": "product-security@apple.com"
|
||||
"source": "product-security@apple.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,19 +2,79 @@
|
||||
"id": "CVE-2022-48578",
|
||||
"sourceIdentifier": "product-security@apple.com",
|
||||
"published": "2024-06-10T20:15:12.600",
|
||||
"lastModified": "2024-06-10T20:54:18.443",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-06-12T18:07:41.117",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "An out-of-bounds read was addressed with improved bounds checking. This issue is fixed in macOS Monterey 12.5. Processing an AppleScript may result in unexpected termination or disclosure of process memory."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Se solucion\u00f3 una lectura fuera de los l\u00edmites con una verificaci\u00f3n de los l\u00edmites mejorada. Este problema se solucion\u00f3 en macOS Monterey 12.5. El procesamiento de un AppleScript puede provocar una terminaci\u00f3n inesperada o la divulgaci\u00f3n de la memoria del proceso."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 7.1,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 5.2
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-125"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "12.5",
|
||||
"matchCriteriaId": "F8EE7558-B3A3-40EC-AB95-70FDD5C4E1CB"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/HT213345",
|
||||
"source": "product-security@apple.com"
|
||||
"source": "product-security@apple.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,19 +2,79 @@
|
||||
"id": "CVE-2022-48683",
|
||||
"sourceIdentifier": "product-security@apple.com",
|
||||
"published": "2024-06-10T20:15:12.677",
|
||||
"lastModified": "2024-06-10T20:54:18.443",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-06-12T18:05:40.943",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "An access issue was addressed with additional sandbox restrictions. This issue is fixed in macOS Ventura 13. An app may be able to break out of its sandbox."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Se solucion\u00f3 un problema de acceso con restricciones adicionales de la zona de pruebas. Este problema se solucion\u00f3 en macOS Ventura 13. Es posible que una aplicaci\u00f3n pueda salir de su zona de pruebas."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 7.8,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "NVD-CWE-noinfo"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "13.0",
|
||||
"matchCriteriaId": "71E032AD-F827-4944-9699-BB1E6D4233FC"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/HT213488",
|
||||
"source": "product-security@apple.com"
|
||||
"source": "product-security@apple.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
59
CVE-2023/CVE-2023-292xx/CVE-2023-29267.json
Normal file
59
CVE-2023/CVE-2023-292xx/CVE-2023-29267.json
Normal file
@ -0,0 +1,59 @@
|
||||
{
|
||||
"id": "CVE-2023-29267",
|
||||
"sourceIdentifier": "psirt@us.ibm.com",
|
||||
"published": "2024-06-12T19:15:50.020",
|
||||
"lastModified": "2024-06-12T19:15:50.020",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "IBM Db2 for Linux, UNIX and Windows (includes Db2 Connect Server) 10.5, 11.1, and 11.5is vulnerable to a denial of service, under specific configurations, as the server may crash when using a specially crafted SQL statement by an authenticated user. IBM X-Force ID: 287612."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "psirt@us.ibm.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "HIGH",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 5.3,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 1.6,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "psirt@us.ibm.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-399"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/287612",
|
||||
"source": "psirt@us.ibm.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.ibm.com/support/pages/node/7156851",
|
||||
"source": "psirt@us.ibm.com"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,23 +2,93 @@
|
||||
"id": "CVE-2023-40389",
|
||||
"sourceIdentifier": "product-security@apple.com",
|
||||
"published": "2024-06-10T20:15:12.753",
|
||||
"lastModified": "2024-06-10T20:54:18.443",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-06-12T18:05:20.887",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "The issue was addressed with improved restriction of data container access. This issue is fixed in macOS Ventura 13.6.5, macOS Monterey 12.7.4. An app may be able to access sensitive user data."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "El problema se solucion\u00f3 mejorando la restricci\u00f3n del acceso a los contenedores de datos. Este problema se solucion\u00f3 en macOS Ventura 13.6.5, macOS Monterey 12.7.4. Es posible que una aplicaci\u00f3n pueda acceder a datos confidenciales del usuario."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 5.5,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "NVD-CWE-noinfo"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "12.7.4",
|
||||
"matchCriteriaId": "80A8C181-92A9-459F-8DF5-466763A8FF1A"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "13.0",
|
||||
"versionEndExcluding": "13.6.5",
|
||||
"matchCriteriaId": "69C4F06A-061F-46B3-8BB7-5C9B47C00956"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/HT214083",
|
||||
"source": "product-security@apple.com"
|
||||
"source": "product-security@apple.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/HT214085",
|
||||
"source": "product-security@apple.com"
|
||||
"source": "product-security@apple.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
55
CVE-2024/CVE-2024-08xx/CVE-2024-0865.json
Normal file
55
CVE-2024/CVE-2024-08xx/CVE-2024-0865.json
Normal file
@ -0,0 +1,55 @@
|
||||
{
|
||||
"id": "CVE-2024-0865",
|
||||
"sourceIdentifier": "cybersecurity@se.com",
|
||||
"published": "2024-06-12T18:15:10.620",
|
||||
"lastModified": "2024-06-12T18:15:10.620",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-798: Use of hard-coded credentials vulnerability exists that could cause local privilege\nescalation when logged in as a non-administrative user."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "cybersecurity@se.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 7.8,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "cybersecurity@se.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-798"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://download.schneider-electric.com/files?p_Doc_Ref=SEVD-2024-044-03&p_enDocType=Security+and+Safety+Notice&p_File_Name=SEVD-2024-044-03.pdf",
|
||||
"source": "cybersecurity@se.com"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,16 +2,40 @@
|
||||
"id": "CVE-2024-22279",
|
||||
"sourceIdentifier": "security@vmware.com",
|
||||
"published": "2024-06-10T20:15:12.880",
|
||||
"lastModified": "2024-06-10T20:54:18.443",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-06-12T18:04:20.147",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Improper handling of requests in Routing Release > v0.273.0 and <= v0.297.0 allows an unauthenticated attacker to degrade\n the service availability of the Cloud Foundry deployment if performed at scale."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "El manejo inadecuado de las solicitudes en Routing Release > v0.273.0 y <= v0.297.0 permite que un atacante no autenticado degrade la disponibilidad del servicio de la implementaci\u00f3n de Cloud Foundry si se realiza a escala."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 7.5,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 3.6
|
||||
},
|
||||
{
|
||||
"source": "security@vmware.com",
|
||||
"type": "Secondary",
|
||||
@ -35,6 +59,16 @@
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-444"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "security@vmware.com",
|
||||
"type": "Secondary",
|
||||
@ -46,10 +80,39 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:cloudfoundry:cf-deployment:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "30.9.0",
|
||||
"versionEndIncluding": "40.13.0",
|
||||
"matchCriteriaId": "3640FEAC-74E5-4F8B-A9DA-E223EC46407D"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:cloudfoundry:routing_release:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "0.273.0",
|
||||
"versionEndIncluding": "0.297.0",
|
||||
"matchCriteriaId": "D6C45B8F-FE7E-4FE7-9F42-644548DC7DC1"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.cloudfoundry.org/blog/cve-2024-22279-gorouter-denial-of-service-attack/",
|
||||
"source": "security@vmware.com"
|
||||
"source": "security@vmware.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,54 +2,14 @@
|
||||
"id": "CVE-2024-2230",
|
||||
"sourceIdentifier": "cybersecurity@se.com",
|
||||
"published": "2024-06-12T17:15:50.140",
|
||||
"lastModified": "2024-06-12T17:15:50.140",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-06-12T18:15:11.593",
|
||||
"vulnStatus": "Rejected",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-798: Use of hard-coded credentials vulnerability exists that could cause local privilege\nescalation when logged in as a non-administrative user."
|
||||
"value": "Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "cybersecurity@se.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 7.8,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "cybersecurity@se.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-798"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://download.schneider-electric.com/files?p_Doc_Ref=SEVD-2024-044-03&p_enDocType=Security+and+Safety+Notice&p_File_Name=SEVD-2024-044-03.pdf",
|
||||
"source": "cybersecurity@se.com"
|
||||
}
|
||||
]
|
||||
"metrics": {},
|
||||
"references": []
|
||||
}
|
@ -2,27 +2,107 @@
|
||||
"id": "CVE-2024-23299",
|
||||
"sourceIdentifier": "product-security@apple.com",
|
||||
"published": "2024-06-10T20:15:13.107",
|
||||
"lastModified": "2024-06-10T20:54:18.443",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-06-12T18:03:36.960",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "The issue was addressed with improved checks. This issue is fixed in macOS Sonoma 14.4, macOS Ventura 13.6.5, macOS Monterey 12.7.4. An app may be able to break out of its sandbox."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "El problema se solucion\u00f3 con controles mejorados. Este problema se solucion\u00f3 en macOS Sonoma 14.4, macOS Ventura 13.6.5, macOS Monterey 12.7.4. Es posible que una aplicaci\u00f3n pueda salir de su zona de pruebas."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 8.6,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 6.0
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "NVD-CWE-noinfo"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "12.7.4",
|
||||
"matchCriteriaId": "80A8C181-92A9-459F-8DF5-466763A8FF1A"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "13.0",
|
||||
"versionEndExcluding": "13.6.5",
|
||||
"matchCriteriaId": "69C4F06A-061F-46B3-8BB7-5C9B47C00956"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "14.0",
|
||||
"versionEndExcluding": "14.4",
|
||||
"matchCriteriaId": "73160D1F-755B-46D2-969F-DF8E43BB1099"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/HT214083",
|
||||
"source": "product-security@apple.com"
|
||||
"source": "product-security@apple.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/HT214084",
|
||||
"source": "product-security@apple.com"
|
||||
"source": "product-security@apple.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/HT214085",
|
||||
"source": "product-security@apple.com"
|
||||
"source": "product-security@apple.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
20
CVE-2024/CVE-2024-240xx/CVE-2024-24051.json
Normal file
20
CVE-2024/CVE-2024-240xx/CVE-2024-24051.json
Normal file
@ -0,0 +1,20 @@
|
||||
{
|
||||
"id": "CVE-2024-24051",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-06-12T18:15:10.920",
|
||||
"lastModified": "2024-06-12T18:15:10.920",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Improper input validation of printing files in Monoprice Select Mini V2 V37.115.32 allows attackers to instruct the device's movable parts to destinations that exceed the devices' maximum coordinates via the printing of a malicious .gcode file."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/tkruppert/Reported_Vulnerabilities/blob/main/CVE-2024-24051.md",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,19 +2,79 @@
|
||||
"id": "CVE-2024-27792",
|
||||
"sourceIdentifier": "product-security@apple.com",
|
||||
"published": "2024-06-10T20:15:13.210",
|
||||
"lastModified": "2024-06-10T20:54:18.443",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-06-12T18:02:45.480",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "This issue was addressed by adding an additional prompt for user consent. This issue is fixed in macOS Sonoma 14.4. An app may be able to access user-sensitive data."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Este problema se solucion\u00f3 agregando una solicitud adicional de consentimiento del usuario. Este problema se solucion\u00f3 en macOS Sonoma 14.4. Es posible que una aplicaci\u00f3n pueda acceder a datos confidenciales del usuario."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 5.5,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "NVD-CWE-noinfo"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "14.4",
|
||||
"matchCriteriaId": "58227FD1-0619-45F6-AD19-25831899376A"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/HT214084",
|
||||
"source": "product-security@apple.com"
|
||||
"source": "product-security@apple.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
55
CVE-2024/CVE-2024-27xx/CVE-2024-2747.json
Normal file
55
CVE-2024/CVE-2024-27xx/CVE-2024-2747.json
Normal file
@ -0,0 +1,55 @@
|
||||
{
|
||||
"id": "CVE-2024-2747",
|
||||
"sourceIdentifier": "cybersecurity@se.com",
|
||||
"published": "2024-06-12T18:15:11.680",
|
||||
"lastModified": "2024-06-12T18:15:11.680",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-428: Unquoted search path or element vulnerability exists in Easergy Studio, which could\ncause privilege escalation when a valid user replaces a trusted file name on the system and\nreboots the machine."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "cybersecurity@se.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 7.8,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "cybersecurity@se.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-428"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://download.schneider-electric.com/files?p_Doc_Ref=SEVD-2024-100-01&p_enDocType=Security+and+Safety+Notice&p_File_Name=SEVD-2024-100-01.pdf",
|
||||
"source": "cybersecurity@se.com"
|
||||
}
|
||||
]
|
||||
}
|
59
CVE-2024/CVE-2024-287xx/CVE-2024-28762.json
Normal file
59
CVE-2024/CVE-2024-287xx/CVE-2024-28762.json
Normal file
@ -0,0 +1,59 @@
|
||||
{
|
||||
"id": "CVE-2024-28762",
|
||||
"sourceIdentifier": "psirt@us.ibm.com",
|
||||
"published": "2024-06-12T18:15:11.267",
|
||||
"lastModified": "2024-06-12T18:15:11.267",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "IBM Db2 for Linux, UNIX and Windows (includes DB2 Connect Server) 10.5, 11.1, and 11.5 is vulnerable to denial of service with a specially crafted query under certain conditions. IBM X-Force ID: 285246."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "psirt@us.ibm.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "HIGH",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 5.3,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 1.6,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "psirt@us.ibm.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-770"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/285246",
|
||||
"source": "psirt@us.ibm.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.ibm.com/support/pages/node/7156847",
|
||||
"source": "psirt@us.ibm.com"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,19 +2,79 @@
|
||||
"id": "CVE-2024-31612",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-06-10T18:15:31.513",
|
||||
"lastModified": "2024-06-10T20:54:18.443",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-06-12T18:10:30.587",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Emlog pro2.3 is vulnerable to Cross Site Request Forgery (CSRF) via twitter.php which can be used with a XSS vulnerability to access administrator information."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Emlog pro2.3 es vulnerable a Cross-Site Request Forgery (CSRF) a trav\u00e9s de twitter.php, que puede usarse con una vulnerabilidad XSS para acceder a la informaci\u00f3n del administrador."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 6.5,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-352"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:emlog:emlog:2.3.0:*:*:*:pro:*:*:*",
|
||||
"matchCriteriaId": "D51AF99B-7574-4222-A2A2-C1ECC9BE8E51"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/ss122-0ss/cms/blob/main/emlog-csrf.md",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
59
CVE-2024/CVE-2024-318xx/CVE-2024-31881.json
Normal file
59
CVE-2024/CVE-2024-318xx/CVE-2024-31881.json
Normal file
@ -0,0 +1,59 @@
|
||||
{
|
||||
"id": "CVE-2024-31881",
|
||||
"sourceIdentifier": "psirt@us.ibm.com",
|
||||
"published": "2024-06-12T19:15:50.710",
|
||||
"lastModified": "2024-06-12T19:15:50.710",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "IBM Db2 for Linux, UNIX and Windows (includes Db2 Connect Server) 10.5, 11.1, and 11.5 is vulnerable to a denial of service as the server may crash when using a specially crafted query on certain columnar tables by an authenticated user. IBM X-Force ID: 287613."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "psirt@us.ibm.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 6.5,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "psirt@us.ibm.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-770"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/287613",
|
||||
"source": "psirt@us.ibm.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.ibm.com/support/pages/node/7156852",
|
||||
"source": "psirt@us.ibm.com"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,19 +2,79 @@
|
||||
"id": "CVE-2024-32167",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-06-10T20:15:13.367",
|
||||
"lastModified": "2024-06-10T20:54:18.443",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-06-12T18:00:30.120",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Sourcecodester Online Medicine Ordering System 1.0 is vulnerable to Arbitrary file deletion vulnerability as the backend settings have the function of deleting pictures to delete any files."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Sourcecodester Online Medicine Ordering System 1.0 es afectado por una vulnerabilidad de eliminaci\u00f3n arbitraria de archivos ya que la configuraci\u00f3n del backend tiene la funci\u00f3n de eliminar im\u00e1genes para eliminar cualquier archivo."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 9.1,
|
||||
"baseSeverity": "CRITICAL"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.2
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "NVD-CWE-noinfo"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:oretnom23:online_medicine_ordering_system:1.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "5BA8DED5-CD2F-4667-A647-F56E5E0E5FC7"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/ss122-0ss/cms/blob/main/omos.md",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-35742",
|
||||
"sourceIdentifier": "audit@patchstack.com",
|
||||
"published": "2024-06-10T08:15:51.507",
|
||||
"lastModified": "2024-06-10T12:40:41.360",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-06-12T19:32:19.827",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -16,6 +16,26 @@
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "LOW",
|
||||
"baseScore": 7.3,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 3.4
|
||||
},
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Secondary",
|
||||
@ -50,10 +70,31 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:codeparrots:easy_forms_for_mailchimp:*:*:*:*:*:wordpress:*:*",
|
||||
"versionEndIncluding": "6.9.0",
|
||||
"matchCriteriaId": "0D22135E-A1C8-4889-94E5-63749B16560A"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://patchstack.com/database/vulnerability/yikes-inc-easy-mailchimp-extender/wordpress-easy-forms-for-mailchimp-plugin-6-9-0-broken-access-control-vulnerability?_s_id=cve",
|
||||
"source": "audit@patchstack.com"
|
||||
"source": "audit@patchstack.com",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,16 +2,40 @@
|
||||
"id": "CVE-2024-35749",
|
||||
"sourceIdentifier": "audit@patchstack.com",
|
||||
"published": "2024-06-10T17:16:31.187",
|
||||
"lastModified": "2024-06-10T18:06:22.600",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-06-12T18:19:55.050",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Authentication Bypass by Spoofing vulnerability in Acurax Under Construction / Maintenance Mode from Acurax allows Authentication Bypass.This issue affects Under Construction / Maintenance Mode from Acurax: from n/a through 2.6."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "La vulnerabilidad de omisi\u00f3n de autenticaci\u00f3n mediante suplantaci\u00f3n de identidad en Acurax Under Construction / Maintenance Mode from Acurax permite la omisi\u00f3n de autenticaci\u00f3n. Este problema afecta a Under Construction / Maintenance Mode from Acurax: desde n/a hasta 2.6."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 5.3,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 1.4
|
||||
},
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Secondary",
|
||||
@ -46,10 +70,31 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:acurax:under_construction_\\/_maintenance_mode:*:*:*:*:*:wordpress:*:*",
|
||||
"versionEndIncluding": "2.6",
|
||||
"matchCriteriaId": "6C7D3084-18DA-4ABD-A2EB-2D0CC7B79A77"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://patchstack.com/database/vulnerability/coming-soon-maintenance-mode-from-acurax/wordpress-under-construction-maintenance-mode-from-acurax-plugin-2-6-ip-bypass-vulnerability?_s_id=cve",
|
||||
"source": "audit@patchstack.com"
|
||||
"source": "audit@patchstack.com",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,16 +2,40 @@
|
||||
"id": "CVE-2024-35754",
|
||||
"sourceIdentifier": "audit@patchstack.com",
|
||||
"published": "2024-06-10T17:16:31.430",
|
||||
"lastModified": "2024-06-10T18:06:22.600",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-06-12T18:19:06.043",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability in Ovic Team Ovic Importer allows Path Traversal.This issue affects Ovic Importer: from n/a through 1.6.3."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Limitaci\u00f3n inadecuada de una vulnerabilidad de nombre de ruta a un directorio restringido (\"Path Traversal\") en Ovic Team Ovic Importer permite el Path Traversal. Este problema afecta a Ovic Importer: desde n/a hasta 1.6.3."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 6.5,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 3.6
|
||||
},
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Secondary",
|
||||
@ -46,10 +70,31 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:ovic_importer_project:ovic_importer:*:*:*:*:*:wordpress:*:*",
|
||||
"versionEndIncluding": "1.6.3",
|
||||
"matchCriteriaId": "603DA4B5-A29F-4AE4-A0D5-C30C1C754580"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://patchstack.com/database/vulnerability/ovic-import-demo/wordpress-ovic-importer-plugin-1-6-3-arbitrary-file-download-vulnerability?_s_id=cve",
|
||||
"source": "audit@patchstack.com"
|
||||
"source": "audit@patchstack.com",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,16 +2,40 @@
|
||||
"id": "CVE-2024-36407",
|
||||
"sourceIdentifier": "security-advisories@github.com",
|
||||
"published": "2024-06-10T17:16:32.253",
|
||||
"lastModified": "2024-06-10T18:06:22.600",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-06-12T18:17:38.777",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "SuiteCRM is an open-source Customer Relationship Management (CRM) software application. In versions prior to 7.14.4 and 8.6.1, a user password can be reset from an unauthenticated attacker. The attacker does not get access to the new password. But this can be annoying for the user. This attack is also dependent on some password reset functionalities being enabled. It also requires the system using php 7, which is not an officially supported version. Versions 7.14.4 and 8.6.1 contain a fix for this issue."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "SuiteCRM es una aplicaci\u00f3n de software de gesti\u00f3n de relaciones con el cliente (CRM) de c\u00f3digo abierto. En versiones anteriores a la 7.14.4 y 8.6.1, un atacante no autenticado puede restablecer la contrase\u00f1a de un usuario. El atacante no obtiene acceso a la nueva contrase\u00f1a. Pero esto puede resultar molesto para el usuario. Este ataque tambi\u00e9n depende de que se habiliten algunas funciones de restablecimiento de contrase\u00f1a. Tambi\u00e9n requiere que el sistema utilice php 7, que no es una versi\u00f3n oficialmente compatible. Las versiones 7.14.4 y 8.6.1 contienen una soluci\u00f3n para este problema."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "LOW",
|
||||
"baseScore": 6.5,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 2.5
|
||||
},
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Secondary",
|
||||
@ -35,6 +59,16 @@
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-640"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Secondary",
|
||||
@ -46,10 +80,38 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:salesagility:suitecrm:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "7.14.4",
|
||||
"matchCriteriaId": "176C4E20-B96D-4391-986F-3314663983AC"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:salesagility:suitecrm:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "8.0.0",
|
||||
"versionEndExcluding": "8.6.1",
|
||||
"matchCriteriaId": "5249169E-5516-4705-A2C8-DE1BA56497D0"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/salesagility/SuiteCRM/security/advisories/GHSA-6p2f-wwx9-952r",
|
||||
"source": "security-advisories@github.com"
|
||||
"source": "security-advisories@github.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,16 +2,40 @@
|
||||
"id": "CVE-2024-36408",
|
||||
"sourceIdentifier": "security-advisories@github.com",
|
||||
"published": "2024-06-10T17:16:32.503",
|
||||
"lastModified": "2024-06-10T18:06:22.600",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-06-12T18:13:58.627",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "SuiteCRM is an open-source Customer Relationship Management (CRM) software application. In versions prior to 7.14.4 and 8.6.1, poor input validation allows for SQL Injection in the `Alerts` controller. Versions 7.14.4 and 8.6.1 contain a fix for this issue."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "SuiteCRM es una aplicaci\u00f3n de software de gesti\u00f3n de relaciones con el cliente (CRM) de c\u00f3digo abierto. En versiones anteriores a 7.14.4 y 8.6.1, una validaci\u00f3n de entrada deficiente permite la inyecci\u00f3n de SQL en el controlador \"Alertas\". Las versiones 7.14.4 y 8.6.1 contienen una soluci\u00f3n para este problema."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 8.8,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 5.9
|
||||
},
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Secondary",
|
||||
@ -35,6 +59,16 @@
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-89"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Secondary",
|
||||
@ -46,10 +80,38 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:salesagility:suitecrm:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "7.14.4",
|
||||
"matchCriteriaId": "176C4E20-B96D-4391-986F-3314663983AC"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:salesagility:suitecrm:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "8.0.0",
|
||||
"versionEndExcluding": "8.6.1",
|
||||
"matchCriteriaId": "5249169E-5516-4705-A2C8-DE1BA56497D0"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/salesagility/SuiteCRM/security/advisories/GHSA-2g8f-gjrr-x5cg",
|
||||
"source": "security-advisories@github.com"
|
||||
"source": "security-advisories@github.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,16 +2,40 @@
|
||||
"id": "CVE-2024-36409",
|
||||
"sourceIdentifier": "security-advisories@github.com",
|
||||
"published": "2024-06-10T18:15:35.620",
|
||||
"lastModified": "2024-06-10T20:54:18.443",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-06-12T18:09:19.450",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "SuiteCRM is an open-source Customer Relationship Management (CRM) software application. In versions prior to 7.14.4 and 8.6.1, poor input validation allows for SQL Injection in Tree data entry point. Versions 7.14.4 and 8.6.1 contain a fix for this issue."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "SuiteCRM es una aplicaci\u00f3n de software de gesti\u00f3n de relaciones con el cliente (CRM) de c\u00f3digo abierto. En versiones anteriores a 7.14.4 y 8.6.1, una validaci\u00f3n de entrada deficiente permite la inyecci\u00f3n SQL en el punto de entrada de datos del Tree. Las versiones 7.14.4 y 8.6.1 contienen una soluci\u00f3n para este problema."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 8.8,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 5.9
|
||||
},
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Secondary",
|
||||
@ -35,6 +59,16 @@
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-89"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Secondary",
|
||||
@ -46,10 +80,38 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:salesagility:suitecrm:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "7.14.4",
|
||||
"matchCriteriaId": "176C4E20-B96D-4391-986F-3314663983AC"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:salesagility:suitecrm:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "8.0.0",
|
||||
"versionEndExcluding": "8.6.1",
|
||||
"matchCriteriaId": "5249169E-5516-4705-A2C8-DE1BA56497D0"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/salesagility/SuiteCRM/security/advisories/GHSA-pxq4-vw23-v73f",
|
||||
"source": "security-advisories@github.com"
|
||||
"source": "security-advisories@github.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,16 +2,40 @@
|
||||
"id": "CVE-2024-36410",
|
||||
"sourceIdentifier": "security-advisories@github.com",
|
||||
"published": "2024-06-10T18:15:35.830",
|
||||
"lastModified": "2024-06-10T20:54:18.443",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-06-12T18:09:04.930",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "SuiteCRM is an open-source Customer Relationship Management (CRM) software application. In versions prior to 7.14.4 and 8.6.1, poor input validation allows for SQL Injection in EmailUIAjax messages count controller. Versions 7.14.4 and 8.6.1 contain a fix for this issue."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "SuiteCRM es una aplicaci\u00f3n de software de gesti\u00f3n de relaciones con el cliente (CRM) de c\u00f3digo abierto. En versiones anteriores a 7.14.4 y 8.6.1, una validaci\u00f3n de entrada deficiente permite la inyecci\u00f3n de SQL en el controlador de recuento de mensajes EmailUIAjax. Las versiones 7.14.4 y 8.6.1 contienen una soluci\u00f3n para este problema."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 8.8,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 5.9
|
||||
},
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Secondary",
|
||||
@ -35,6 +59,16 @@
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-89"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Secondary",
|
||||
@ -46,10 +80,38 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:salesagility:suitecrm:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "7.14.4",
|
||||
"matchCriteriaId": "176C4E20-B96D-4391-986F-3314663983AC"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:salesagility:suitecrm:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "8.0.0",
|
||||
"versionEndExcluding": "8.6.1",
|
||||
"matchCriteriaId": "5249169E-5516-4705-A2C8-DE1BA56497D0"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/salesagility/SuiteCRM/security/advisories/GHSA-7jj8-m2wj-m6xq",
|
||||
"source": "security-advisories@github.com"
|
||||
"source": "security-advisories@github.com",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,16 +2,40 @@
|
||||
"id": "CVE-2024-36411",
|
||||
"sourceIdentifier": "security-advisories@github.com",
|
||||
"published": "2024-06-10T20:15:13.593",
|
||||
"lastModified": "2024-06-10T20:54:18.443",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-06-12T18:00:13.937",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "SuiteCRM is an open-source Customer Relationship Management (CRM) software application. In versions prior to 7.14.4 and 8.6.1, poor input validation allows for SQL Injection in EmailUIAjax displayView controller. Versions 7.14.4 and 8.6.1 contain a fix for this issue."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "SuiteCRM es una aplicaci\u00f3n de software de gesti\u00f3n de relaciones con el cliente (CRM) de c\u00f3digo abierto. En versiones anteriores a 7.14.4 y 8.6.1, una validaci\u00f3n de entrada deficiente permite la inyecci\u00f3n de SQL en el controlador DisplayView de EmailUIAjax. Las versiones 7.14.4 y 8.6.1 contienen una soluci\u00f3n para este problema."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 8.8,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 5.9
|
||||
},
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Secondary",
|
||||
@ -35,6 +59,16 @@
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-89"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Secondary",
|
||||
@ -46,10 +80,38 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:salesagility:suitecrm:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "7.14.4",
|
||||
"matchCriteriaId": "176C4E20-B96D-4391-986F-3314663983AC"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:salesagility:suitecrm:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "8.0.0",
|
||||
"versionEndExcluding": "8.6.1",
|
||||
"matchCriteriaId": "5249169E-5516-4705-A2C8-DE1BA56497D0"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/salesagility/SuiteCRM/security/advisories/GHSA-9rvr-mcrf-p4p7",
|
||||
"source": "security-advisories@github.com"
|
||||
"source": "security-advisories@github.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
24
CVE-2024/CVE-2024-376xx/CVE-2024-37629.json
Normal file
24
CVE-2024/CVE-2024-376xx/CVE-2024-37629.json
Normal file
@ -0,0 +1,24 @@
|
||||
{
|
||||
"id": "CVE-2024-37629",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-06-12T18:15:12.293",
|
||||
"lastModified": "2024-06-12T18:15:12.293",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "SummerNote 0.8.18 is vulnerable to Cross Site Scripting (XSS) via the Code View Function."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/summernote/summernote/issues/4642",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://grumpz.net/cve-2024-37629-simple-xss-payload-exploits-0day-vulnerability-in-10000-web-apps",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,16 +2,40 @@
|
||||
"id": "CVE-2024-3850",
|
||||
"sourceIdentifier": "ics-cert@hq.dhs.gov",
|
||||
"published": "2024-06-10T17:16:33.080",
|
||||
"lastModified": "2024-06-10T18:06:22.600",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-06-12T18:12:56.413",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Uniview NVR301-04S2-P4 is vulnerable to reflected cross-site scripting attack (XSS). An attacker could send a user a URL that if clicked on could execute malicious JavaScript in their browser. This vulnerability also requires authentication before it can be exploited, so the scope and severity is limited. Also, even if JavaScript is executed, no additional benefits are obtained."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Uniview NVR301-04S2-P4 es vulnerable al ataque de Cross-Site Scripting (XSS) reflejado. Un atacante podr\u00eda enviar a un usuario una URL que, si se hace clic en ella, podr\u00eda ejecutar JavaScript malicioso en su navegador. Esta vulnerabilidad tambi\u00e9n requiere autenticaci\u00f3n antes de poder explotarse, por lo que el alcance y la gravedad son limitados. Adem\u00e1s, aunque se ejecute JavaScript no se obtienen beneficios adicionales."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 5.4,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.3,
|
||||
"impactScore": 2.7
|
||||
},
|
||||
{
|
||||
"source": "ics-cert@hq.dhs.gov",
|
||||
"type": "Secondary",
|
||||
@ -46,10 +70,44 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:uniview:nvr301-04s2-p4_firmware:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "nvr-b3801.20.17.240507",
|
||||
"matchCriteriaId": "087BD43C-9237-4C7D-923E-0CFAA2A5E976"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:uniview:nvr301-04s2-p4:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "5CD63D99-65D2-4E52-BFD4-10D317D941D9"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.cisa.gov/news-events/ics-advisories/icsa-24-156-01",
|
||||
"source": "ics-cert@hq.dhs.gov"
|
||||
"source": "ics-cert@hq.dhs.gov",
|
||||
"tags": [
|
||||
"Third Party Advisory",
|
||||
"US Government Resource"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-4328",
|
||||
"sourceIdentifier": "security@huntr.dev",
|
||||
"published": "2024-06-10T08:15:51.730",
|
||||
"lastModified": "2024-06-10T12:40:41.360",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-06-12T19:33:00.527",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -15,6 +15,28 @@
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 8.1,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 5.2
|
||||
}
|
||||
],
|
||||
"cvssMetricV30": [
|
||||
{
|
||||
"source": "security@huntr.dev",
|
||||
@ -50,10 +72,30 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:parisneo:lollms_web_ui:9.6:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "525C477F-F133-44B9-A0BC-43C1080D35F1"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://huntr.com/bounties/0f4faadf-ebca-4ef8-9d8a-66dbd849c0f8",
|
||||
"source": "security@huntr.dev"
|
||||
"source": "security@huntr.dev",
|
||||
"tags": [
|
||||
"Exploit"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,16 +2,53 @@
|
||||
"id": "CVE-2024-5102",
|
||||
"sourceIdentifier": "security@nortonlifelock.com",
|
||||
"published": "2024-06-10T17:16:34.133",
|
||||
"lastModified": "2024-06-10T18:06:22.600",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-06-12T18:12:01.453",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A sym-linked file accessed via the repair function in Avast Antivirus <24.2 on Windows may allow user to elevate privilege to delete arbitrary files or run processes as NT AUTHORITY\\SYSTEM.\u00a0The vulnerability exists within the \"Repair\" (settings -> troubleshooting -> repair) feature, which attempts to delete a file in the current user's AppData directory as NT AUTHORITY\\SYSTEM. A\u00a0low-privileged user can make a pseudo-symlink and a junction folder and point to a file on the system. This can provide a low-privileged user an Elevation of Privilege to win a race-condition which will re-create the system files and make Windows callback to a specially-crafted file which could be used to launch a privileged shell instance.\n\nThis issue affects Avast Antivirus prior to 24.2."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Un archivo con enlace simb\u00f3lico al que se accede a trav\u00e9s de la funci\u00f3n de reparaci\u00f3n en Avast Antivirus <24.2 en Windows puede permitir al usuario elevar privilegios para eliminar archivos arbitrarios o ejecutar procesos como NT AUTHORITY\\SYSTEM. La vulnerabilidad existe dentro de la funci\u00f3n \"Reparaci\u00f3n\" (configuraci\u00f3n -> soluci\u00f3n de problemas -> reparaci\u00f3n), que intenta eliminar un archivo en el directorio AppData del usuario actual como NT AUTHORITY\\SYSTEM. Un usuario con pocos privilegios puede crear un pseudoenlace simb\u00f3lico y una carpeta de uni\u00f3n y apuntar a un archivo en el sistema. Esto puede proporcionar a un usuario con pocos privilegios una elevaci\u00f3n de permisos para ganar una condici\u00f3n de ejecuci\u00f3n que recrear\u00e1 los archivos del sistema y realizar\u00e1 una devoluci\u00f3n de llamada de Windows a un archivo especialmente manipulado que podr\u00eda usarse para iniciar una instancia de shell privilegiada. Este problema afecta a Avast Antivirus antes de la versi\u00f3n 24.2."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "HIGH",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 7.0,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 1.0,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-59"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "security@nortonlifelock.com",
|
||||
"type": "Secondary",
|
||||
@ -23,10 +60,43 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:avast:antivirus:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "24.2",
|
||||
"matchCriteriaId": "E14E4791-47A8-4E8C-96E1-1E4A7F2D2F43"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "A2572D17-1DE6-457B-99CC-64AFD54487EA"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://support.norton.com/sp/static/external/tools/security-advisories.html",
|
||||
"source": "security@nortonlifelock.com"
|
||||
"source": "security@nortonlifelock.com",
|
||||
"tags": [
|
||||
"Not Applicable"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
55
CVE-2024/CVE-2024-55xx/CVE-2024-5559.json
Normal file
55
CVE-2024/CVE-2024-55xx/CVE-2024-5559.json
Normal file
@ -0,0 +1,55 @@
|
||||
{
|
||||
"id": "CVE-2024-5559",
|
||||
"sourceIdentifier": "cybersecurity@se.com",
|
||||
"published": "2024-06-12T18:15:12.493",
|
||||
"lastModified": "2024-06-12T18:15:12.493",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-327: Use of a Broken or Risky Cryptographic Algorithm vulnerability exists that could\ncause denial of service, device reboot, or an attacker gaining full control of the relay when a\nspecially crafted reset token is entered into the front panel of the device."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "cybersecurity@se.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H",
|
||||
"attackVector": "PHYSICAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 6.1,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 0.9,
|
||||
"impactScore": 5.2
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "cybersecurity@se.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-327"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://download.schneider-electric.com/files?p_Doc_Ref=SEVD-2024-163-02&p_enDocType=Security+and+Safety+Notice&p_File_Name=SEVD-2024-163-02.pdf",
|
||||
"source": "cybersecurity@se.com"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,16 +2,40 @@
|
||||
"id": "CVE-2024-5597",
|
||||
"sourceIdentifier": "ics-cert@hq.dhs.gov",
|
||||
"published": "2024-06-10T17:16:35.180",
|
||||
"lastModified": "2024-06-10T18:06:22.600",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-06-12T18:10:47.080",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Fuji Electric Monitouch V-SFT\u00a0is vulnerable to a type confusion, which could cause a crash or code execution."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Fuji Electric Monitouch V-SFT es vulnerable a una confusi\u00f3n de tipos, lo que podr\u00eda provocar un bloqueo o la ejecuci\u00f3n del c\u00f3digo."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
},
|
||||
{
|
||||
"source": "ics-cert@hq.dhs.gov",
|
||||
"type": "Secondary",
|
||||
@ -46,10 +70,32 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:fujielectric:monitouch_v-sft:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "6.2.3.0",
|
||||
"matchCriteriaId": "0EBA0347-109B-4079-998F-1B3A5C3E8D9E"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.cisa.gov/news-events/ics-advisories/icsa-24-151-02",
|
||||
"source": "ics-cert@hq.dhs.gov"
|
||||
"source": "ics-cert@hq.dhs.gov",
|
||||
"tags": [
|
||||
"Third Party Advisory",
|
||||
"US Government Resource"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
55
CVE-2024/CVE-2024-57xx/CVE-2024-5798.json
Normal file
55
CVE-2024/CVE-2024-57xx/CVE-2024-5798.json
Normal file
@ -0,0 +1,55 @@
|
||||
{
|
||||
"id": "CVE-2024-5798",
|
||||
"sourceIdentifier": "security@hashicorp.com",
|
||||
"published": "2024-06-12T19:15:51.413",
|
||||
"lastModified": "2024-06-12T19:15:51.413",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Vault and Vault Enterprise did not properly validate the JSON Web Token (JWT) role-bound audience claim when using the Vault JWT auth method. This may have resulted in Vault validating a JWT the audience and role-bound claims do not match, allowing an invalid login to succeed when it should have been rejected.\n\nThis vulnerability, CVE-2024-5798, was fixed in Vault and Vault Enterprise 1.17.0, 1.16.3, and 1.15.9"
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security@hashicorp.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:R/S:C/C:L/I:N/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "HIGH",
|
||||
"privilegesRequired": "HIGH",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 2.6,
|
||||
"baseSeverity": "LOW"
|
||||
},
|
||||
"exploitabilityScore": 1.0,
|
||||
"impactScore": 1.4
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security@hashicorp.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-285"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://discuss.hashicorp.com/t/hcsec-2024-11-vault-incorrectly-validated-json-web-tokens-jwt-audience-claims/67770",
|
||||
"source": "security@hashicorp.com"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-5893",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2024-06-12T15:15:53.393",
|
||||
"lastModified": "2024-06-12T15:15:53.393",
|
||||
"lastModified": "2024-06-12T19:15:51.630",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-5894",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2024-06-12T15:15:53.693",
|
||||
"lastModified": "2024-06-12T15:15:53.693",
|
||||
"lastModified": "2024-06-12T19:15:51.733",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-5895",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2024-06-12T15:15:53.970",
|
||||
"lastModified": "2024-06-12T15:15:53.970",
|
||||
"lastModified": "2024-06-12T18:15:12.850",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-5896",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2024-06-12T16:15:12.813",
|
||||
"lastModified": "2024-06-12T16:15:12.813",
|
||||
"lastModified": "2024-06-12T19:15:51.847",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
|
92
README.md
92
README.md
@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours.
|
||||
### Last Repository Update
|
||||
|
||||
```plain
|
||||
2024-06-12T18:00:19.039330+00:00
|
||||
2024-06-12T20:00:18.835817+00:00
|
||||
```
|
||||
|
||||
### Most recent CVE Modification Timestamp synchronized with NVD
|
||||
|
||||
```plain
|
||||
2024-06-12T18:00:00.317000+00:00
|
||||
2024-06-12T19:33:00.527000+00:00
|
||||
```
|
||||
|
||||
### Last Data Feed Release
|
||||
@ -33,67 +33,53 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
|
||||
### Total Number of included CVEs
|
||||
|
||||
```plain
|
||||
253688
|
||||
253697
|
||||
```
|
||||
|
||||
### CVEs added in the last Commit
|
||||
|
||||
Recently added CVEs: `23`
|
||||
Recently added CVEs: `9`
|
||||
|
||||
- [CVE-2024-1891](CVE-2024/CVE-2024-18xx/CVE-2024-1891.json) (`2024-06-12T16:15:10.887`)
|
||||
- [CVE-2024-2230](CVE-2024/CVE-2024-22xx/CVE-2024-2230.json) (`2024-06-12T17:15:50.140`)
|
||||
- [CVE-2024-22855](CVE-2024/CVE-2024-228xx/CVE-2024-22855.json) (`2024-06-12T17:15:49.913`)
|
||||
- [CVE-2024-36761](CVE-2024/CVE-2024-367xx/CVE-2024-36761.json) (`2024-06-12T16:15:11.983`)
|
||||
- [CVE-2024-37036](CVE-2024/CVE-2024-370xx/CVE-2024-37036.json) (`2024-06-12T17:15:50.637`)
|
||||
- [CVE-2024-37037](CVE-2024/CVE-2024-370xx/CVE-2024-37037.json) (`2024-06-12T17:15:50.853`)
|
||||
- [CVE-2024-37038](CVE-2024/CVE-2024-370xx/CVE-2024-37038.json) (`2024-06-12T17:15:51.080`)
|
||||
- [CVE-2024-37039](CVE-2024/CVE-2024-370xx/CVE-2024-37039.json) (`2024-06-12T17:15:51.313`)
|
||||
- [CVE-2024-37040](CVE-2024/CVE-2024-370xx/CVE-2024-37040.json) (`2024-06-12T17:15:51.540`)
|
||||
- [CVE-2024-37300](CVE-2024/CVE-2024-373xx/CVE-2024-37300.json) (`2024-06-12T16:15:12.097`)
|
||||
- [CVE-2024-37878](CVE-2024/CVE-2024-378xx/CVE-2024-37878.json) (`2024-06-12T17:15:51.803`)
|
||||
- [CVE-2024-5557](CVE-2024/CVE-2024-55xx/CVE-2024-5557.json) (`2024-06-12T17:15:51.943`)
|
||||
- [CVE-2024-5558](CVE-2024/CVE-2024-55xx/CVE-2024-5558.json) (`2024-06-12T17:15:52.160`)
|
||||
- [CVE-2024-5560](CVE-2024/CVE-2024-55xx/CVE-2024-5560.json) (`2024-06-12T17:15:52.357`)
|
||||
- [CVE-2024-5759](CVE-2024/CVE-2024-57xx/CVE-2024-5759.json) (`2024-06-12T16:15:12.550`)
|
||||
- [CVE-2024-5896](CVE-2024/CVE-2024-58xx/CVE-2024-5896.json) (`2024-06-12T16:15:12.813`)
|
||||
- [CVE-2024-5897](CVE-2024/CVE-2024-58xx/CVE-2024-5897.json) (`2024-06-12T16:15:13.100`)
|
||||
- [CVE-2024-5898](CVE-2024/CVE-2024-58xx/CVE-2024-5898.json) (`2024-06-12T17:15:52.577`)
|
||||
- [CVE-2024-5905](CVE-2024/CVE-2024-59xx/CVE-2024-5905.json) (`2024-06-12T17:15:52.847`)
|
||||
- [CVE-2024-5906](CVE-2024/CVE-2024-59xx/CVE-2024-5906.json) (`2024-06-12T17:15:53.000`)
|
||||
- [CVE-2024-5907](CVE-2024/CVE-2024-59xx/CVE-2024-5907.json) (`2024-06-12T17:15:53.127`)
|
||||
- [CVE-2024-5908](CVE-2024/CVE-2024-59xx/CVE-2024-5908.json) (`2024-06-12T17:15:53.253`)
|
||||
- [CVE-2024-5909](CVE-2024/CVE-2024-59xx/CVE-2024-5909.json) (`2024-06-12T17:15:53.370`)
|
||||
- [CVE-2023-29267](CVE-2023/CVE-2023-292xx/CVE-2023-29267.json) (`2024-06-12T19:15:50.020`)
|
||||
- [CVE-2024-0865](CVE-2024/CVE-2024-08xx/CVE-2024-0865.json) (`2024-06-12T18:15:10.620`)
|
||||
- [CVE-2024-24051](CVE-2024/CVE-2024-240xx/CVE-2024-24051.json) (`2024-06-12T18:15:10.920`)
|
||||
- [CVE-2024-2747](CVE-2024/CVE-2024-27xx/CVE-2024-2747.json) (`2024-06-12T18:15:11.680`)
|
||||
- [CVE-2024-28762](CVE-2024/CVE-2024-287xx/CVE-2024-28762.json) (`2024-06-12T18:15:11.267`)
|
||||
- [CVE-2024-31881](CVE-2024/CVE-2024-318xx/CVE-2024-31881.json) (`2024-06-12T19:15:50.710`)
|
||||
- [CVE-2024-37629](CVE-2024/CVE-2024-376xx/CVE-2024-37629.json) (`2024-06-12T18:15:12.293`)
|
||||
- [CVE-2024-5559](CVE-2024/CVE-2024-55xx/CVE-2024-5559.json) (`2024-06-12T18:15:12.493`)
|
||||
- [CVE-2024-5798](CVE-2024/CVE-2024-57xx/CVE-2024-5798.json) (`2024-06-12T19:15:51.413`)
|
||||
|
||||
|
||||
### CVEs modified in the last Commit
|
||||
|
||||
Recently modified CVEs: `48`
|
||||
Recently modified CVEs: `27`
|
||||
|
||||
- [CVE-2024-35745](CVE-2024/CVE-2024-357xx/CVE-2024-35745.json) (`2024-06-12T17:36:32.763`)
|
||||
- [CVE-2024-35746](CVE-2024/CVE-2024-357xx/CVE-2024-35746.json) (`2024-06-12T17:36:02.087`)
|
||||
- [CVE-2024-35747](CVE-2024/CVE-2024-357xx/CVE-2024-35747.json) (`2024-06-12T17:32:52.343`)
|
||||
- [CVE-2024-36263](CVE-2024/CVE-2024-362xx/CVE-2024-36263.json) (`2024-06-12T17:15:50.363`)
|
||||
- [CVE-2024-36264](CVE-2024/CVE-2024-362xx/CVE-2024-36264.json) (`2024-06-12T17:15:50.447`)
|
||||
- [CVE-2024-36265](CVE-2024/CVE-2024-362xx/CVE-2024-36265.json) (`2024-06-12T17:15:50.520`)
|
||||
- [CVE-2024-36412](CVE-2024/CVE-2024-364xx/CVE-2024-36412.json) (`2024-06-12T18:00:00.317`)
|
||||
- [CVE-2024-36413](CVE-2024/CVE-2024-364xx/CVE-2024-36413.json) (`2024-06-12T17:59:44.673`)
|
||||
- [CVE-2024-36414](CVE-2024/CVE-2024-364xx/CVE-2024-36414.json) (`2024-06-12T17:59:14.353`)
|
||||
- [CVE-2024-36415](CVE-2024/CVE-2024-364xx/CVE-2024-36415.json) (`2024-06-12T17:58:53.497`)
|
||||
- [CVE-2024-36416](CVE-2024/CVE-2024-364xx/CVE-2024-36416.json) (`2024-06-12T17:58:19.570`)
|
||||
- [CVE-2024-36417](CVE-2024/CVE-2024-364xx/CVE-2024-36417.json) (`2024-06-12T17:58:04.477`)
|
||||
- [CVE-2024-3699](CVE-2024/CVE-2024-36xx/CVE-2024-3699.json) (`2024-06-12T17:53:09.130`)
|
||||
- [CVE-2024-3700](CVE-2024/CVE-2024-37xx/CVE-2024-3700.json) (`2024-06-12T17:51:52.710`)
|
||||
- [CVE-2024-37014](CVE-2024/CVE-2024-370xx/CVE-2024-37014.json) (`2024-06-12T17:57:01.660`)
|
||||
- [CVE-2024-37051](CVE-2024/CVE-2024-370xx/CVE-2024-37051.json) (`2024-06-12T17:49:04.017`)
|
||||
- [CVE-2024-37393](CVE-2024/CVE-2024-373xx/CVE-2024-37393.json) (`2024-06-12T17:56:23.390`)
|
||||
- [CVE-2024-37569](CVE-2024/CVE-2024-375xx/CVE-2024-37569.json) (`2024-06-12T16:32:56.203`)
|
||||
- [CVE-2024-37570](CVE-2024/CVE-2024-375xx/CVE-2024-37570.json) (`2024-06-12T16:32:34.513`)
|
||||
- [CVE-2024-37880](CVE-2024/CVE-2024-378xx/CVE-2024-37880.json) (`2024-06-12T16:30:15.053`)
|
||||
- [CVE-2024-4744](CVE-2024/CVE-2024-47xx/CVE-2024-4744.json) (`2024-06-12T16:44:12.157`)
|
||||
- [CVE-2024-4745](CVE-2024/CVE-2024-47xx/CVE-2024-4745.json) (`2024-06-12T16:23:34.197`)
|
||||
- [CVE-2024-4746](CVE-2024/CVE-2024-47xx/CVE-2024-4746.json) (`2024-06-12T16:17:42.223`)
|
||||
- [CVE-2024-5389](CVE-2024/CVE-2024-53xx/CVE-2024-5389.json) (`2024-06-12T16:31:30.577`)
|
||||
- [CVE-2024-5585](CVE-2024/CVE-2024-55xx/CVE-2024-5585.json) (`2024-06-12T17:15:04.083`)
|
||||
- [CVE-2022-48578](CVE-2022/CVE-2022-485xx/CVE-2022-48578.json) (`2024-06-12T18:07:41.117`)
|
||||
- [CVE-2022-48683](CVE-2022/CVE-2022-486xx/CVE-2022-48683.json) (`2024-06-12T18:05:40.943`)
|
||||
- [CVE-2023-40389](CVE-2023/CVE-2023-403xx/CVE-2023-40389.json) (`2024-06-12T18:05:20.887`)
|
||||
- [CVE-2024-22279](CVE-2024/CVE-2024-222xx/CVE-2024-22279.json) (`2024-06-12T18:04:20.147`)
|
||||
- [CVE-2024-2230](CVE-2024/CVE-2024-22xx/CVE-2024-2230.json) (`2024-06-12T18:15:11.593`)
|
||||
- [CVE-2024-23299](CVE-2024/CVE-2024-232xx/CVE-2024-23299.json) (`2024-06-12T18:03:36.960`)
|
||||
- [CVE-2024-27792](CVE-2024/CVE-2024-277xx/CVE-2024-27792.json) (`2024-06-12T18:02:45.480`)
|
||||
- [CVE-2024-31612](CVE-2024/CVE-2024-316xx/CVE-2024-31612.json) (`2024-06-12T18:10:30.587`)
|
||||
- [CVE-2024-32167](CVE-2024/CVE-2024-321xx/CVE-2024-32167.json) (`2024-06-12T18:00:30.120`)
|
||||
- [CVE-2024-35742](CVE-2024/CVE-2024-357xx/CVE-2024-35742.json) (`2024-06-12T19:32:19.827`)
|
||||
- [CVE-2024-35749](CVE-2024/CVE-2024-357xx/CVE-2024-35749.json) (`2024-06-12T18:19:55.050`)
|
||||
- [CVE-2024-35754](CVE-2024/CVE-2024-357xx/CVE-2024-35754.json) (`2024-06-12T18:19:06.043`)
|
||||
- [CVE-2024-36407](CVE-2024/CVE-2024-364xx/CVE-2024-36407.json) (`2024-06-12T18:17:38.777`)
|
||||
- [CVE-2024-36408](CVE-2024/CVE-2024-364xx/CVE-2024-36408.json) (`2024-06-12T18:13:58.627`)
|
||||
- [CVE-2024-36409](CVE-2024/CVE-2024-364xx/CVE-2024-36409.json) (`2024-06-12T18:09:19.450`)
|
||||
- [CVE-2024-36410](CVE-2024/CVE-2024-364xx/CVE-2024-36410.json) (`2024-06-12T18:09:04.930`)
|
||||
- [CVE-2024-36411](CVE-2024/CVE-2024-364xx/CVE-2024-36411.json) (`2024-06-12T18:00:13.937`)
|
||||
- [CVE-2024-3850](CVE-2024/CVE-2024-38xx/CVE-2024-3850.json) (`2024-06-12T18:12:56.413`)
|
||||
- [CVE-2024-4328](CVE-2024/CVE-2024-43xx/CVE-2024-4328.json) (`2024-06-12T19:33:00.527`)
|
||||
- [CVE-2024-5102](CVE-2024/CVE-2024-51xx/CVE-2024-5102.json) (`2024-06-12T18:12:01.453`)
|
||||
- [CVE-2024-5597](CVE-2024/CVE-2024-55xx/CVE-2024-5597.json) (`2024-06-12T18:10:47.080`)
|
||||
- [CVE-2024-5893](CVE-2024/CVE-2024-58xx/CVE-2024-5893.json) (`2024-06-12T19:15:51.630`)
|
||||
- [CVE-2024-5894](CVE-2024/CVE-2024-58xx/CVE-2024-5894.json) (`2024-06-12T19:15:51.733`)
|
||||
- [CVE-2024-5895](CVE-2024/CVE-2024-58xx/CVE-2024-5895.json) (`2024-06-12T18:15:12.850`)
|
||||
- [CVE-2024-5896](CVE-2024/CVE-2024-58xx/CVE-2024-5896.json) (`2024-06-12T19:15:51.847`)
|
||||
|
||||
|
||||
## Download and Usage
|
||||
|
201
_state.csv
201
_state.csv
@ -200379,7 +200379,7 @@ CVE-2022-32893,0,0,161d6fd84dbdb4a87bb5e4ac023d648e449b6c5e4d831863311dfb7b40ce9
|
||||
CVE-2022-32894,0,0,258579e09971ddea3b4815a13f4b228f09b463853438998782e99d4d4a74b2e8,2022-12-07T03:02:55.287000
|
||||
CVE-2022-32895,0,0,a866a4ecd54090d59826e47060c2fe31da4fd60afa522dd3d88fdd6339a97c2f,2022-11-03T14:38:33.867000
|
||||
CVE-2022-32896,0,0,17fd28355dac713cc35d13c78c58dc3e1c8b430c0015f022b283eda11acef2f1,2023-08-08T14:22:24.967000
|
||||
CVE-2022-32897,0,0,48db8f055f8661448f1c41e1ab91769e27b9ae62f41e7cf89869272a1f89eec2,2024-06-10T20:54:18.443000
|
||||
CVE-2022-32897,0,1,ad1349fe5eaed63ccba0146dc0974a0d84416447755751e4c227e8c842cc303f,2024-06-12T18:08:05.860000
|
||||
CVE-2022-32898,0,0,dc4c5dc9a5f3f10252df3b48ee72cd91d41244a4d9e1d63ef2e7b84b757e902a,2023-01-09T16:41:59.350000
|
||||
CVE-2022-32899,0,0,afe99f73cfd08bcbacadec410d0fe2bcc62f7d2c73f75e55f14d8746d172f152,2023-01-09T16:41:59.350000
|
||||
CVE-2022-3290,0,0,2598192fd9d11269a3309ca73acf9adcc0a3e7182df9deebc35808ec4cc8523b,2022-09-28T13:54:11.263000
|
||||
@ -200419,7 +200419,7 @@ CVE-2022-3293,0,0,208cfce2b7ac354931f31ba8ea1e649c7f7a231f08e040e01e241d29aeb0fd
|
||||
CVE-2022-32930,0,0,6501f43eaef797598ee4ea282914eb15c1d9750dfe72ba94881d039525715665,2023-11-07T03:48:16.257000
|
||||
CVE-2022-32931,0,0,b2251f5ad956fc927b536b3edee597d7793373efa2a8dd080f2c08cca5dc1379,2024-01-17T18:10:19.543000
|
||||
CVE-2022-32932,0,0,1102c22e0851c3c424b28e7faaf3ff8745362f1417acc4f535a4ba257afb88f6,2023-01-09T16:44:23.987000
|
||||
CVE-2022-32933,0,0,ba6b70c60e891771d5d7c3b6512527b24ded69541010144e676f4b6f6804ccf6,2024-06-10T20:54:18.443000
|
||||
CVE-2022-32933,0,1,daa9b33dae16c49c1712cbaa019d4a1c6803394a17d9727f584a4c99692fb414,2024-06-12T18:07:08.790000
|
||||
CVE-2022-32934,0,0,ae7a364db30ef26af0d462dba138265a2bbe9c4ff428ec3d06f101a71957f722,2022-11-02T17:22:05.340000
|
||||
CVE-2022-32935,0,0,fcbe24cdd5e1de76f7985c93ff5640c642de4bc9cd70af024775d480ee0ec42e,2023-01-09T16:44:23.987000
|
||||
CVE-2022-32936,0,0,827192a61577f10a55507a90c27c1195c504d60d2f40870f66ce48b9e1468487,2022-11-02T17:21:19.290000
|
||||
@ -211906,7 +211906,7 @@ CVE-2022-4857,0,0,0e5a9df166a6eb7599c22f7c627a657c342565b8697f901467ea9955281c8d
|
||||
CVE-2022-48570,0,0,a91d2cb19cd784e6a11ff6550eb2743f29999f59e85a364a5102b2983792442e,2023-08-26T02:21:54.680000
|
||||
CVE-2022-48571,0,0,ae3b3af5bbcfecab9b669dd32fc253aeba667281f87e0ebbda13e170727190e2,2023-09-08T01:15:07.393000
|
||||
CVE-2022-48577,0,0,77e1543c35f1ee06c24e8e2e11a8c7c83f489e8b77e54c3bff4963e766ab9a70,2024-01-17T17:59:46.343000
|
||||
CVE-2022-48578,0,0,c45dcd91ec674b8483c6ae373271fa1f7aaf30516772a0aef2bfceebdcb6e376,2024-06-10T20:54:18.443000
|
||||
CVE-2022-48578,0,1,399afee58cb1e4b9287588770d7eae8c93875e19f24711d9d13327076529da38,2024-06-12T18:07:41.117000
|
||||
CVE-2022-48579,0,0,3f957510457b8c9d6b8e34337fb22ab5e2a1209fd6d659c23c825189fcc68a6f,2023-08-17T19:15:09.937000
|
||||
CVE-2022-4858,0,0,7cbd4a78421d8f6168ed44172d43a8ab3e262629f6948b0a13b370cce3410e79,2023-01-06T20:37:55.853000
|
||||
CVE-2022-48580,0,0,261d9c5a3bcaba84f16de37444029b1303b556b114bd7507c2e162886d8b9278,2023-08-11T17:39:26.760000
|
||||
@ -212012,7 +212012,7 @@ CVE-2022-48675,0,0,ffdc7ff07043ff8d904f74a8a1b71fad7bff2a559dea9c5bb178531131fc3
|
||||
CVE-2022-4868,0,0,49bc3762269009af54870f2860cabd5c2f0372571503d002526079fe993a74bc,2023-01-06T21:20:41.477000
|
||||
CVE-2022-48681,0,0,87ea3536a125ead12bc84931d58f6cdc8b01f80a07f5daca9e8b795750274574,2024-05-28T12:39:28.377000
|
||||
CVE-2022-48682,0,0,a9e8566df4d423615eab0842eba8f88c67d4de5de15c1876586d34ed294d4bbf,2024-04-26T12:58:17.720000
|
||||
CVE-2022-48683,0,0,336a3d9bbc084f5aa551c45c5ba0fbe2c70ee2785073a11630635b5b6ccc9518,2024-06-10T20:54:18.443000
|
||||
CVE-2022-48683,0,1,231318f64008f2f3695ffe0b49c56b82eb9076a10e27c878281bb8e00293e71f,2024-06-12T18:05:40.943000
|
||||
CVE-2022-48684,0,0,183793e4ba2f09101fce115e434fee8cb8ff9c6a4ec46d5771edf2b59c69d11d,2024-04-29T12:42:03.667000
|
||||
CVE-2022-48685,0,0,ffa3e1d85b1e2d4bd3c19f046cb04890a395016777f2401ecc051ad5f33c92b4,2024-04-29T12:42:03.667000
|
||||
CVE-2022-48686,0,0,ee162749a361db1a0b6a353b0eb61f9a34a852517c7d84ecd41264480ae7864b,2024-05-23T20:33:45.640000
|
||||
@ -221678,6 +221678,7 @@ CVE-2023-29259,0,0,b86e126bd91cd2fc20c170d4f39f31827fd202b01354ff37791ad5ad49481
|
||||
CVE-2023-2926,0,0,10860d33149a75b831927a885d3ab775fd881867d8c964f302679da502e6d89c,2024-05-17T02:23:22.407000
|
||||
CVE-2023-29260,0,0,5a5f942789887b0f00e6d89e31eb06b1ed453ac44ac5fb54eed356da6e5c5bd8,2023-07-28T15:59:39.313000
|
||||
CVE-2023-29261,0,0,4d3b9821bc373c399912471c4b813ae9ccb7003d9bd9e446133385ea0c68b84f,2023-09-08T17:10:21.577000
|
||||
CVE-2023-29267,1,1,b34415562c5d4a4d3c2254caa52c76bdde1ef499dd6288e35af142d321098d81,2024-06-12T19:15:50.020000
|
||||
CVE-2023-29268,0,0,5fe2469b2003acd64e34ff0465d8f32ca97075c18139a460519bfe903d98eaba,2023-05-09T01:31:28.760000
|
||||
CVE-2023-2927,0,0,1ef4bcc434ab7cd7f2eb4bc31df3dba4427c9caeaa1a3b69dd65ea29252b330a,2024-05-17T02:23:22.513000
|
||||
CVE-2023-29273,0,0,62ec26a776677e38edd34e5cfa86acb0290941f7f08123c59bbfd0438413920e,2023-05-17T12:50:17.923000
|
||||
@ -229893,7 +229894,7 @@ CVE-2023-40384,0,0,b43d991ba538e8f493daab5fb3410f6f256194586a5e5378eafe23521539b
|
||||
CVE-2023-40385,0,0,d87186e65fbe11c963d9f2ac49a37bea6de8f4a87feb525e072522d577fee61f,2024-01-18T14:32:30.730000
|
||||
CVE-2023-40386,0,0,98b5b9164e51a67fec2b119151c92fd2d9bb1d8d51de82443b681e79ce2c9a34,2023-10-12T01:59:56.563000
|
||||
CVE-2023-40388,0,0,0669c38434b1494ed261fd2860ebba321deabd42233fd11611759d0565888e20,2023-10-12T01:59:05.793000
|
||||
CVE-2023-40389,0,0,0e5d597fd284ef871235fda779b9f0d46c10ac1ec6ce6f60f41ff8dad9aef6c3,2024-06-10T20:54:18.443000
|
||||
CVE-2023-40389,0,1,b193787b70f32e4c09ae93f27d418d82b25a00d1d832a208e6e4bfa799ec5d30,2024-06-12T18:05:20.887000
|
||||
CVE-2023-4039,0,0,0accd3adc8756cc7a927b7c908e91237d32e08c68f471a1067012290c829eea2,2024-02-19T23:15:07.680000
|
||||
CVE-2023-40390,0,0,dcc08f1579a2804bdfa75d3a1e4b64bbe4a6a3affb5757b1219cc9eb8124a134,2024-04-08T22:42:58.650000
|
||||
CVE-2023-40391,0,0,674710606efc5e20f3b4d034fd6151d2f994f0410f8a773be4faafb0e10f357d,2023-11-07T04:20:12.943000
|
||||
@ -241062,6 +241063,7 @@ CVE-2024-0860,0,0,084e48b2c8a82b5fc9ff07cd8cf26129d61baf73b83c11537e5ca2016cdef4
|
||||
CVE-2024-0861,0,0,896e71725cbfb614341352655e0b66e7def84c2617b58556401d4278cc8b74b9,2024-03-04T20:26:41.663000
|
||||
CVE-2024-0862,0,0,8d5bc8312d1d93cf3fbc9bc4464ee1ea50ba5434e84839c1491be95817a91a77,2024-05-14T19:17:55.627000
|
||||
CVE-2024-0864,0,0,d89dcae43b5200797b81bcd0ad7b3b6e3cba6f54866805aee9a386996fe0fcfc,2024-02-29T13:49:29.390000
|
||||
CVE-2024-0865,1,1,370365c7ed475e058b0d9ad0f5915d4aa0796c5015b2d90186d4112b32287694,2024-06-12T18:15:10.620000
|
||||
CVE-2024-0866,0,0,2315ea7233a9f152b45c2f2db1db04866f3fbf8a4d5b6e4bad65f402d240f082,2024-03-26T12:55:05.010000
|
||||
CVE-2024-0867,0,0,bff6dce5de81ae7891647493682c1a4a2fb7bb408cce62ce65d5462da59ac834,2024-05-24T13:03:11.993000
|
||||
CVE-2024-0868,0,0,50dc470faec27f67202fe3c6b32f6e0e6b35686ae887e56f6aa6e0525b6a38ff,2024-04-17T12:48:07.510000
|
||||
@ -241392,7 +241394,7 @@ CVE-2024-1224,0,0,6671b720f58aa0150d14676a615208ff783ead72a8a766227d501b4f2f840d
|
||||
CVE-2024-1225,0,0,0b68eae0ee984524ebb2df359b44e58b9ba84a615ada907a65e017a24d65ff7a,2024-05-17T02:35:19.560000
|
||||
CVE-2024-1226,0,0,14a580d4b3eab4674d6ae40acd0cb53f118cafa2e8004e611e071913cd041fe6,2024-03-12T16:02:33.900000
|
||||
CVE-2024-1227,0,0,94dce1bd607b6903e23d54a7d6b05a85e9dc37b645ba64935d33bd38f11890aa,2024-03-12T16:02:33.900000
|
||||
CVE-2024-1228,0,1,32605b1907163ad08b6f7354355ad82a69536fce794750addc55c0f4867cda18,2024-06-12T17:54:10.157000
|
||||
CVE-2024-1228,0,0,32605b1907163ad08b6f7354355ad82a69536fce794750addc55c0f4867cda18,2024-06-12T17:54:10.157000
|
||||
CVE-2024-1229,0,0,2de2ced35127929201da3cc9dd41aa7d4097d2d61f9931ef1592526b3e0b7dfa,2024-05-14T16:13:02.773000
|
||||
CVE-2024-1230,0,0,8bd1dd7f8fd55f9189a6ea53392185485a1a6386a5bf97397fc7d3598cb5fb14,2024-05-14T16:13:02.773000
|
||||
CVE-2024-1231,0,0,3fff2a2694f3a2890eda32488c438fe0ab80785883b0aefb67199c2eabc0d967,2024-03-25T13:47:14.087000
|
||||
@ -241972,7 +241974,7 @@ CVE-2024-1887,0,0,c4ea1f30b4ee64401ec471c46007c0919b3d087c3cc77ec486ec75f252891a
|
||||
CVE-2024-1888,0,0,5c48c7ef8072bebc640799142c34dfeb37124cccb7d60f3f8c8d95bce0e2f85b,2024-02-29T13:49:29.390000
|
||||
CVE-2024-1889,0,0,34f0990ceccd75a569863a77fd268eb539c7d5ec488f2446cd3288ee4234f41c,2024-05-17T02:35:40.333000
|
||||
CVE-2024-1890,0,0,7900533f7cd4681e9cd51c85aaf38899f8710ddf980029322947b07f23ce149a,2024-05-17T02:35:40.430000
|
||||
CVE-2024-1891,1,1,9802320e49bf94f684ebc24df2bdd7287205d192242bfac06185b4199b96884b,2024-06-12T16:15:10.887000
|
||||
CVE-2024-1891,0,0,9802320e49bf94f684ebc24df2bdd7287205d192242bfac06185b4199b96884b,2024-06-12T16:15:10.887000
|
||||
CVE-2024-1892,0,0,496f86c779f360256e1e190fecff75b396ebefe831fecdca264ec166e984ab7e,2024-04-16T12:15:10.050000
|
||||
CVE-2024-1893,0,0,678e936c89e4c4b6fa8874f1c864b24cc93a2715a395ba59ed61dfe9d57d4f11,2024-04-10T13:23:38.787000
|
||||
CVE-2024-1894,0,0,9ac2447d78b1be48d8de07fcf9beac6b1c3a9f0af4ea5741b3b2d6e9b7f97eab,2024-03-13T18:15:58.530000
|
||||
@ -243433,7 +243435,7 @@ CVE-2024-22270,0,0,6ddec6950380375d517eada92585a48899328ef96a9cd5eb66f2637f566ac
|
||||
CVE-2024-22273,0,0,16868e6e004c6ea2c682b722d1af123cd0ac6fcfe5ea535614be88cbaef5ca1b,2024-05-22T12:46:53.887000
|
||||
CVE-2024-22274,0,0,da89bea76d6b538861a6666c1640acb76ac100e4dc1f77b4f4f466724f6cc406,2024-05-22T12:46:53.887000
|
||||
CVE-2024-22275,0,0,d091ffc8d821e68d75dc2e136f38c753791a1420e1604ca18001c3ee3e374585,2024-05-22T12:46:53.887000
|
||||
CVE-2024-22279,0,0,bac65a965c7743587c4ba47458bb580df11725b735e8b42e4c63142bb5a95e31,2024-06-10T20:54:18.443000
|
||||
CVE-2024-22279,0,1,ff0edd9c060816dc238726f665fb413b790bba614b84113a6241bd5b06ac695f,2024-06-12T18:04:20.147000
|
||||
CVE-2024-2228,0,0,9da409d4c88fb5c41c04e34c5096b8810f55668a8720e19e0dcad976dea69ce5,2024-03-22T19:02:10.300000
|
||||
CVE-2024-22282,0,0,53d62e993d25bddde67f64a9b7b05dfd45a21e7eb7c9bf0be8fb90ec2911d888,2024-02-06T16:55:19.983000
|
||||
CVE-2024-22283,0,0,f9f0bb31955cdc5efe0fe68bd93a1968461b937d4826bd6ada9de29ff0f15691,2024-02-01T04:13:41.033000
|
||||
@ -243454,7 +243456,7 @@ CVE-2024-22296,0,0,26497821bdd6523c6ffa82c8932df21c7375a0b75c6b4829fe7611d85fa93
|
||||
CVE-2024-22297,0,0,577fc11ad5b0d749376591ad16a375dfa540e32ffa2e1012a2392bbaefc0287d,2024-02-06T15:38:07.050000
|
||||
CVE-2024-22298,0,0,eb4e5161d1233abda8028026a5fd3bc810ac81a8912963670187ebce3b0787a2,2024-06-10T12:40:41.360000
|
||||
CVE-2024-22299,0,0,80a4882f4c9ab5eec2fd5d8b16ede08da3f188bafea457394bae184bfdc470b7,2024-03-27T12:29:30.307000
|
||||
CVE-2024-2230,1,1,e82ed198b5ea9197ae8c82fa57588e9a9ab058667665b30035da7ff4601497f5,2024-06-12T17:15:50.140000
|
||||
CVE-2024-2230,0,1,e699fdb43b6adb8abf534c5ade2071cb0bd60e369ba4e4e395321daf7afb33f9,2024-06-12T18:15:11.593000
|
||||
CVE-2024-22300,0,0,6a2ac22ff64061be14a64819ed6b0717dea7f94ee6239bf636e871d8862b7a4e,2024-03-27T12:29:30.307000
|
||||
CVE-2024-22301,0,0,5c83b0c07edb476e78cc7de384bddf72fcd86e319684689177ab1f8ee28c611d,2024-01-30T17:44:59.847000
|
||||
CVE-2024-22302,0,0,18ed1122bd0976f0a4301ea9eae7070b9d3278277ba02d3b706dc015d0fd056d,2024-02-06T15:03:44.550000
|
||||
@ -243736,7 +243738,7 @@ CVE-2024-22851,0,0,e3b3a4173f66bde18bcde8b4d6e07ed058612b81ace293aa36efd8837ff83
|
||||
CVE-2024-22852,0,0,fba9226bfac500a19dd8b91a9788eed1682675a652e0b6dd1f0ee08e7df876f5,2024-02-13T18:16:51.790000
|
||||
CVE-2024-22853,0,0,ec6a06bd931391a16658f5323e2bffe5ddc884df4aacc34598a685bd3979b258,2024-02-12T17:50:31.950000
|
||||
CVE-2024-22854,0,0,8b8b90cd6c1c9786e2fb5396ca19284ddab9c4ff42eae4bf034495afa4860075,2024-02-16T13:37:51.433000
|
||||
CVE-2024-22855,1,1,cfcf005f31b5547d2fa8c00cc5f7f6b8e097a82610a7ccea6c31a0a094af8224,2024-06-12T17:15:49.913000
|
||||
CVE-2024-22855,0,0,cfcf005f31b5547d2fa8c00cc5f7f6b8e097a82610a7ccea6c31a0a094af8224,2024-06-12T17:15:49.913000
|
||||
CVE-2024-22856,0,0,1db436dd1cb2a23310320ff23e9771e20af5e9762fcab5bed6358a83124247e2,2024-04-22T13:28:34.007000
|
||||
CVE-2024-22857,0,0,dc8c498662e053f2e9a39f301d349f3ad8950912cf2843180c278fecc58efab5,2024-04-19T01:15:06.297000
|
||||
CVE-2024-22859,0,0,b948ee8fe798cbf01c18cac852f304ecb9e81e6d367124ad19db38465396c137,2024-05-17T02:36:25.953000
|
||||
@ -243993,7 +243995,7 @@ CVE-2024-23295,0,0,743f5eabb2b6d4f98b7103afe617defce53a2964c31cc5fb435d1e716a86d
|
||||
CVE-2024-23296,0,0,f2d241411bbf170ca53882111e52dbdb186cee03e035f81f8ca923817c8ecb80,2024-06-10T18:15:26.090000
|
||||
CVE-2024-23297,0,0,11090791f72ea9d35b8fb354b91b4b823c54cb3e7511d3c9883ee2b46d74ae89,2024-03-13T22:15:11.520000
|
||||
CVE-2024-23298,0,0,0db74819ed2b222cfa97f4a2ff3293f59c3a4c8235378608525d7e46421fc5d7,2024-03-17T22:38:29.433000
|
||||
CVE-2024-23299,0,0,1c88330fb8522b94766109d1dd2397174dba448896d7bc71434e322a1473fa49,2024-06-10T20:54:18.443000
|
||||
CVE-2024-23299,0,1,9cbedc1b6c106d21c23b83013b85bcc3f46b28eda4f03d0872450db614ec5b11,2024-06-12T18:03:36.960000
|
||||
CVE-2024-2330,0,0,89039a53a73072e3c8dbbafcac630d622765f67693433d6946597b6c23ca98bb,2024-05-17T02:38:10.540000
|
||||
CVE-2024-23300,0,0,9e732c262847100dbcf579b4c37b4c875c53e2f23045a19a85b558ff38956aa4,2024-03-13T22:15:11.643000
|
||||
CVE-2024-23301,0,0,95f1c4c0d3c3f56beb5ca2f43c481bd416943d89ac106cdf8ea6bddea7fc220a,2024-02-21T03:15:08.950000
|
||||
@ -244490,12 +244492,13 @@ CVE-2024-24042,0,0,4a4e7ea160d5d0244b906cb4642841160ba9374fd30aaa87521360ed2e8ec
|
||||
CVE-2024-24043,0,0,8fe33813863354c4eead332dc6243b19fd5b77f5e3a94ddd813814cf68659374,2024-03-19T13:26:46
|
||||
CVE-2024-2405,0,0,6fadbb3a08e48e4daaf715605940677b2a23272062986f3b1cf2a8081644718f,2024-05-02T13:27:25.103000
|
||||
CVE-2024-24050,0,0,ccdf8a4463bf6582ad99a29c76e6e3640436eaa4075881cd577d9e7450feacb8,2024-03-21T12:58:51.093000
|
||||
CVE-2024-24051,1,1,346a02fadb0538e24f23dd10c7092da8c40a788203ea517636d36f00d4f890d5,2024-06-12T18:15:10.920000
|
||||
CVE-2024-24059,0,0,3da8cffbcfd869f14b04835347f156c5cf1a6025fa9627a3ec1ec79a41a9d0be,2024-02-03T00:40:43.793000
|
||||
CVE-2024-2406,0,0,bce1950aa0ba3247257e0f9798cc049e12ff07a8e21e9064eb763cce3e8229ea,2024-05-17T02:38:12.963000
|
||||
CVE-2024-24060,0,0,3a6250076b98d97024da5e52a26f1f0c29807ef38de327e60f431783e4f1deaa,2024-02-03T00:40:48.600000
|
||||
CVE-2024-24061,0,0,3ae0e78c2ecb0941fa62f48d1dc7792d4436b76ec841f1dbf3bf2317943894c3,2024-02-03T00:40:50.623000
|
||||
CVE-2024-24062,0,0,ce51fb5fa7f08b3262a47fca149a06dc25ea5ca7c584b3ae7210563fa9fd54c1,2024-02-03T00:40:52.877000
|
||||
CVE-2024-2408,0,1,79608ac2b73485aa622d02d7fd2cdce295f0e378608808ccee920b0119f98fdd,2024-06-12T17:07:00.770000
|
||||
CVE-2024-2408,0,0,79608ac2b73485aa622d02d7fd2cdce295f0e378608808ccee920b0119f98fdd,2024-06-12T17:07:00.770000
|
||||
CVE-2024-2409,0,0,ba586e1c6181b06c3ede339eac17164a8a25d5149e65ad7809000b9e6c808051,2024-03-29T12:45:02.937000
|
||||
CVE-2024-24091,0,0,6258a73a312c8c072d234b916137958d60ec77d8bc24aab7428a6677fc85f73a,2024-02-08T13:44:21.670000
|
||||
CVE-2024-24092,0,0,d4ab4cc918de723ea385c13013f3b5223c8222e6f58b4c0135bd83322e27d646,2024-03-13T12:33:51.697000
|
||||
@ -246393,7 +246396,7 @@ CVE-2024-26975,0,0,8f19cd721adbc3dd7c661f9a8d550ab97e4f94e7a1b3b7e5ff34954db774d
|
||||
CVE-2024-26976,0,0,7f3160fd993055d2d086205203ac721ed6cf29a59d28518fd22c6db2c5d69b1f,2024-05-01T13:02:20.750000
|
||||
CVE-2024-26977,0,0,7f4303ba7265fe68f47a9d9801d011f3d78c2b9c80b2b80c869116171921f0d6,2024-05-01T13:02:20.750000
|
||||
CVE-2024-26978,0,0,8d561a460191ee18f3c0a08c6e5356905628e7e52b101255033d5d975d400ae1,2024-05-23T19:14:12.637000
|
||||
CVE-2024-26979,0,1,54694270d008c20297a5341208d33ae44a9e8eec55dc5d4e396d03aaba5d47ac,2024-06-12T16:15:11.147000
|
||||
CVE-2024-26979,0,0,54694270d008c20297a5341208d33ae44a9e8eec55dc5d4e396d03aaba5d47ac,2024-06-12T16:15:11.147000
|
||||
CVE-2024-2698,0,0,a1683e28c7d60c58b4273f4c288780d16aef9c7ec236a8f1e9da79ec4d3513a9,2024-06-12T08:15:50.250000
|
||||
CVE-2024-26980,0,0,ec5b812a8dbedf3c6e27cceb9a929403fd6e62291ad747f9f2a67748a6189d95,2024-05-17T11:15:08.357000
|
||||
CVE-2024-26981,0,0,3038c3174fa5069e42a0db4274374d74c2b5066ad475e921f47c4589915379cd,2024-05-03T06:15:10.663000
|
||||
@ -246793,6 +246796,7 @@ CVE-2024-27456,0,0,3292722b93148b4ab52923fa8e4498babe5b306f79794afb1b6b9f9d803c4
|
||||
CVE-2024-2746,0,0,1b5368899c557a576ffe86c7e7b79d4b6baeb106e8e490e5cd11b765b982c384,2024-05-08T13:15:00.690000
|
||||
CVE-2024-27460,0,0,df535e4d58c862090dbd04ef172ea8290b582d97a5936fdd9d6a3f9c58e5f496,2024-05-14T16:13:02.773000
|
||||
CVE-2024-27462,0,0,ffc1613a8162349f9e85ee9ce86cbdc5073a2092a76bc9fd14c2d891290e403c,2024-04-14T23:15:45.830000
|
||||
CVE-2024-2747,1,1,d231d87af296adb45ba5b75984d43826bc5440ff69aaeceb9a13932d550f539a,2024-06-12T18:15:11.680000
|
||||
CVE-2024-27474,0,0,eedd7f52a8e754286d0994212e940bbab5a78ce0f631ba173f8be2320f55c67f,2024-04-10T19:49:51.183000
|
||||
CVE-2024-27476,0,0,8cccfbd88a289b73ae2a82f1969e7e11b3256be620bf6a323e970ad5fee54963,2024-04-10T19:49:51.183000
|
||||
CVE-2024-27477,0,0,475b0780b17016d259d91214e57785f69e50a4f85e3c7b3b34cb0c00dc852aa4,2024-04-10T19:49:51.183000
|
||||
@ -246920,7 +246924,7 @@ CVE-2024-27789,0,0,e8af3b8395ebfe2a50ae6a05a1719125fcf49e2fa7ab9962ec195038f09bf
|
||||
CVE-2024-2779,0,0,7d93945d439dc1c56122930b3da6852f346b5a9c5c7e988befb1c7629d43acd9,2024-05-17T02:38:30.057000
|
||||
CVE-2024-27790,0,0,bcfd5001fb1cf915dabaeb0b530ecc91785155cc1894eb908f37345e8fae816d,2024-05-14T16:13:02.773000
|
||||
CVE-2024-27791,0,0,44e295d56ae82c935e7837aa163b1c182c6b8efd5ceb84b892de3324ac96937b,2024-04-24T17:16:50.397000
|
||||
CVE-2024-27792,0,0,f4c93ffbcf0fa2b69a394e4f8043e5a055ca57351625146acb468cc524a0cb16,2024-06-10T20:54:18.443000
|
||||
CVE-2024-27792,0,1,b95a839f6d92f70e579e6fb1f69e78add1d64a83552f4a2c177f2ea0f9d25269,2024-06-12T18:02:45.480000
|
||||
CVE-2024-27793,0,0,353572505ffd41c49c8a655c8653c3aeaf93e2259f3ba926c49eca056984adca,2024-06-10T18:15:28.523000
|
||||
CVE-2024-27794,0,0,f83311c8ff012592a70730809fe5cac1d0e670b37674538bd8092c8ae8d69027,2024-04-16T13:24:07.103000
|
||||
CVE-2024-27796,0,0,0f6294260561edcbf030914cbfc2e2f9112190409fca9765281ce7a127290cce,2024-06-11T08:15:48.723000
|
||||
@ -247501,6 +247505,7 @@ CVE-2024-28759,0,0,9f826e767eccb501c83d9e0b4aea57892e4b6d1fc39ae786236211b2b03c1
|
||||
CVE-2024-2876,0,0,ca929cd772004ee45ba4bf2b2f3e651133fec067e1337478e97408d02da509b9,2024-05-02T18:00:37.360000
|
||||
CVE-2024-28760,0,0,f13dfa1f12a43504927ac2719a8e853cfb1151dffa495fbc407992956485e6d1,2024-05-14T16:13:02.773000
|
||||
CVE-2024-28761,0,0,7d0ebbc762dcfe4cf5ec12d421c004fe6c0994634dae34cb15afa5ced3227b1e,2024-05-14T16:13:02.773000
|
||||
CVE-2024-28762,1,1,58b7c410be5d6b16aaff58116b8227723446494cec6adb1809ab2e56d458285d,2024-06-12T18:15:11.267000
|
||||
CVE-2024-28764,0,0,1ff18eb0d7a0a34d2666a7ea9874b7a9f6fab70460b6927de1a30c6bfac1d347,2024-05-01T19:50:25.633000
|
||||
CVE-2024-2877,0,0,4ebb9fffce04288aa8e0eb4ee39122211107975df336085ff4049d2ca6b5d666,2024-04-30T17:52:35.057000
|
||||
CVE-2024-28775,0,0,d8ae5eae8edfcef0453722d74b23437224b101c661ce9b595bcef1d2255b4529,2024-05-01T19:50:25.633000
|
||||
@ -247518,7 +247523,7 @@ CVE-2024-28824,0,0,5a9476ae0fdb0520e3a986c832f5f9e27a50da5cb3aa11e06910544296f0e
|
||||
CVE-2024-28825,0,0,9e6f2228e06896e59bb560ffc81c60a9a09c25eeaded2122eaaaf9d670949d13,2024-04-24T13:39:42.883000
|
||||
CVE-2024-28826,0,0,af714d67b245e2002324726263b60e676423e9fa16954adb4190fa57b660a93f,2024-05-29T13:02:09.280000
|
||||
CVE-2024-2883,0,0,e66be81816608580e2e81ffcb02cca4ae9a2aa5cbea60907cc2e1d80cffbaf4a,2024-03-29T04:15:08.743000
|
||||
CVE-2024-28833,0,1,c28d0621123671b94853f5763fc92ce8098ea4f6621d0443f950677dd9d3b57a,2024-06-12T17:53:57.103000
|
||||
CVE-2024-28833,0,0,c28d0621123671b94853f5763fc92ce8098ea4f6621d0443f950677dd9d3b57a,2024-06-12T17:53:57.103000
|
||||
CVE-2024-28834,0,0,af4d9c1dfe16b4591e02664fd7ad00b6706b6af449eca3208820bfc8e9b376f7,2024-06-10T17:16:24.560000
|
||||
CVE-2024-28835,0,0,7ffb3867ffb469cae5c61eed57191c292b3344e17f215833454f077170fed24a,2024-05-16T23:15:47.883000
|
||||
CVE-2024-28836,0,0,ef9665bb9a0895616f82c07b3b8f93ecbb9dcd318a88906096e3fd29af01d6df,2024-04-03T12:38:04.840000
|
||||
@ -249340,8 +249345,8 @@ CVE-2024-31601,0,0,77cac7e969e7044d11a270a83972e4e2e2dc079687b9a26234b27560790da
|
||||
CVE-2024-31609,0,0,a5493714821f0e0bdf3fb4b62cbe59dc9498aefc0ac9439c259bc304a5043f24,2024-04-26T12:58:17.720000
|
||||
CVE-2024-3161,0,0,fb0275ae00c4597a14b8da67383742a33ef20f00a5c359deab992b83c03fa869,2024-05-02T18:00:37.360000
|
||||
CVE-2024-31610,0,0,25f0fe7dce01b290d07505f210ca0196ceaddb3229e43445c402c10f0654acf3,2024-04-26T12:58:17.720000
|
||||
CVE-2024-31611,0,1,5f9e3922a5a892423d1bcf4416bca54c649670eb4a86ab19022e098b2dd1541f,2024-06-12T17:44:20.730000
|
||||
CVE-2024-31612,0,0,49b396f89a743014e777c696cbe0e8a08f9d50db5428a29b14912920ed331742,2024-06-10T20:54:18.443000
|
||||
CVE-2024-31611,0,0,5f9e3922a5a892423d1bcf4416bca54c649670eb4a86ab19022e098b2dd1541f,2024-06-12T17:44:20.730000
|
||||
CVE-2024-31612,0,1,113b62286ae368abe151f1276422ede5a17bbddf3e1084cf1b1f49c898ddb8c7,2024-06-12T18:10:30.587000
|
||||
CVE-2024-31613,0,0,b22e0ead922262609ccd5adc643348b5359bd4a3d7fad40a103e18586e9e197b,2024-06-10T18:06:22.600000
|
||||
CVE-2024-31615,0,0,fec656de044fff01992f2ac4c2d789e80286f56b4ff6f28fca891fbe026d80d2,2024-04-26T12:58:17.720000
|
||||
CVE-2024-31616,0,0,0d01710e8c157f0d32189692d849b27951e2db80c68fce9b88dd89c45379117e,2024-04-24T13:39:42.883000
|
||||
@ -249455,6 +249460,7 @@ CVE-2024-31874,0,0,1770e58d0ae5591eb931a8cdfdb054fb4d854f81849d14af250c71db6caf5
|
||||
CVE-2024-31878,0,0,7b937c0e504c94aa96f40006d95fdcb5515eaac5bd841ea5891290c2bc5b3971,2024-06-11T18:23:27.153000
|
||||
CVE-2024-31879,0,0,9e400de08d7e3b57ea9b7110f44ae1b22a7e387f9dc2f33f777f519f045dfc82,2024-05-20T13:00:34.807000
|
||||
CVE-2024-3188,0,0,5d70d4884e37e1862c5503e8662fdd8be316d1df7ecad77f44114699c1426b8a,2024-04-26T12:58:17.720000
|
||||
CVE-2024-31881,1,1,e82b7acd09518d9c4f6495f1056ca401dd472b764741964d8e891eecafa9c574,2024-06-12T19:15:50.710000
|
||||
CVE-2024-31887,0,0,e951c215b0e12b882bcc7244c98d7631ee4f4b7a3271b5f24e369f1a635cd3e5,2024-04-17T12:48:07.510000
|
||||
CVE-2024-31889,0,0,ed866bc797e966623ecbd3af70c76d899ae08cc5d44be77f88a15f5367e891f4,2024-05-31T19:14:47.793000
|
||||
CVE-2024-3189,0,0,1214acc8d4ffdbc5da1a7913ab352a27b53d04d94b5a178d0c09d285be9bf460,2024-05-15T16:40:19.330000
|
||||
@ -249659,7 +249665,7 @@ CVE-2024-32161,0,0,60a9978d35673eb48d5015a016115c1964e22e158d92ca4de7447769c2bc7
|
||||
CVE-2024-32162,0,0,118ad76854c7f44c6eff111c13a9015a5b3feb6620bf58d40eff2d6cbdaa766c,2024-04-17T20:08:21.887000
|
||||
CVE-2024-32163,0,0,2a0e3e31a356cd8bdaedc62aa40103c9838a070e53ea091fe0aa567b9d0934a1,2024-04-17T20:08:21.887000
|
||||
CVE-2024-32166,0,0,8c8680ec923ae3bed8a58326054c7f7280f0a44a3f507a43055bc183eecf3164,2024-04-19T16:19:49.043000
|
||||
CVE-2024-32167,0,0,05e1cbd308ff706078b16b665b5965a1c0bcfad89648107c18560821495d1800,2024-06-10T20:54:18.443000
|
||||
CVE-2024-32167,0,1,e1b908973391122461e7829a2d79d03ca6868b1699a22ea149cc482b5749c2dc,2024-06-12T18:00:30.120000
|
||||
CVE-2024-3217,0,0,3ac42247ba2d685c0a6f4de738ef771d2778cce367312f144d0326551965dbb5,2024-04-05T12:40:52.763000
|
||||
CVE-2024-3218,0,0,15d13fdbdfb7c920bd4937754941efbbf6a0874233b44e802f3c54e2e1e5f44b,2024-05-17T02:39:47.357000
|
||||
CVE-2024-32205,0,0,3b6122f4454c6189a285ee435770c5e0b5d0cb175cbe04dd262a3757da1f87c2,2024-04-22T20:15:07.210000
|
||||
@ -251494,14 +251500,14 @@ CVE-2024-35646,0,0,0e09ad267a508b8a536900d74395f7d6fd0b87a4648f067a40bf0167f0c61
|
||||
CVE-2024-35647,0,0,dd07a9e9a3804b0b3fdbbe9e6cdd58e439fe4bcd9c7b53cb07e789eae1ef1bd7,2024-06-03T14:46:24.250000
|
||||
CVE-2024-35649,0,0,d2b425bcfde98a2966defe9ae6862e0c80d81675a5706c35a1abbc9f35d7c710,2024-06-06T13:26:46.537000
|
||||
CVE-2024-3565,0,0,a4b6a30a1c15667775d02efa34a8d23be7f17c664853400b6c8d4dfd523ae02d,2024-06-03T14:46:24.250000
|
||||
CVE-2024-35650,0,1,88f71076c8da2d896db64a869bec9bd7a99a8aa038f8111659743d5eada46f6e,2024-06-12T17:51:20.710000
|
||||
CVE-2024-35650,0,0,88f71076c8da2d896db64a869bec9bd7a99a8aa038f8111659743d5eada46f6e,2024-06-12T17:51:20.710000
|
||||
CVE-2024-35651,0,0,c7cb64a650c120e950c2ebdd125d00702e2f5a45bd11dc5dcd4c353649900947,2024-06-06T13:31:03.307000
|
||||
CVE-2024-35652,0,0,9510ec3ad0224331e475c18e35d7d417da7a9c92aa8f4cfe1b6338dfa113c106,2024-06-06T13:36:05.853000
|
||||
CVE-2024-35653,0,0,4b4970e5c1ab1eb20df6ebb598ecfea858a4722a1a783fe88469bdbb9ecad5dd,2024-06-06T13:37:21.420000
|
||||
CVE-2024-35654,0,0,403af0bf2fa4d57830f12a96c5ed9dd1e0545db0132e87e50cac0f148d9af859,2024-06-10T20:24:17.467000
|
||||
CVE-2024-35655,0,0,1a8db850dc208775392ef9c5c3a34b4b09a3268c6e51da6a685217112000f91b,2024-06-12T10:15:30.750000
|
||||
CVE-2024-35657,0,0,ec3d4a59ee1d38b4a1682b94b858ea40acc94a4e2de21f7ce8d2cd2eed427722,2024-06-10T02:52:08.267000
|
||||
CVE-2024-35658,0,1,3cb3bd435b1fac14fe5eaac53d9db5d29070b97d8c6a9cdf7abd4efbfc625cc2,2024-06-12T17:50:55.227000
|
||||
CVE-2024-35658,0,0,3cb3bd435b1fac14fe5eaac53d9db5d29070b97d8c6a9cdf7abd4efbfc625cc2,2024-06-12T17:50:55.227000
|
||||
CVE-2024-35659,0,0,f212e44ec6c22c0baf538b4517ba7b487235e2fde0f9df0b7a9af518af224687,2024-06-10T02:52:08.267000
|
||||
CVE-2024-3566,0,0,e417ef1ceca67d3a9a8ba800520d4a9974bcf4eba2e3e6325dafdfbfe6af8d6b,2024-04-10T19:49:51.183000
|
||||
CVE-2024-35660,0,0,2144517a38c7b64dced7262d27a94b4362008ce987204b48e77a7c0e29f52214,2024-06-10T02:52:08.267000
|
||||
@ -251522,11 +251528,11 @@ CVE-2024-35673,0,0,b2fbe24f0db2be82a21d56e6af9fa939a75372c8c56128cfd1a449a3505ad
|
||||
CVE-2024-35674,0,0,61cb77c7b559c0aea326b97e0a24dca407c217fd649698447cd12a1a2e660866,2024-06-06T14:17:35.017000
|
||||
CVE-2024-35675,0,0,d7aba91d6e03b6f23f94998b1bbf8b95344e8e8bd8d66158e67ae8b5f0f9b824,2024-06-10T02:52:08.267000
|
||||
CVE-2024-35676,0,0,166eba80edb14795a5db8d246b6f75a63e949d50aa6c3420d82832ddae687bce,2024-06-10T02:52:08.267000
|
||||
CVE-2024-35677,0,1,a3d618a3c7c44c9a2d5f73466c7858c8d9d95222181b688c0b22353d99594014,2024-06-12T17:50:33.367000
|
||||
CVE-2024-35677,0,0,a3d618a3c7c44c9a2d5f73466c7858c8d9d95222181b688c0b22353d99594014,2024-06-12T17:50:33.367000
|
||||
CVE-2024-35678,0,0,6bc2c5c60f113bbad24188332113cc6602fdbe13d58e8cdb7dadac89ed3cab7f,2024-06-10T02:52:08.267000
|
||||
CVE-2024-35679,0,0,dc8fe3cbba8d2dc64f92808386423d05749489681fc72acff538a223b0a0ce77,2024-06-10T02:52:08.267000
|
||||
CVE-2024-3568,0,0,573133d2a7191a46b0975280ef7162f7787321191e0ad33f2c4c70c7e8d9c3f5,2024-04-10T19:49:51.183000
|
||||
CVE-2024-35680,0,1,abcc5f0eeb10e717c7a703c1bfe0ea4283e28aa8c32eb264f3894dee0391af2a,2024-06-12T17:49:56.670000
|
||||
CVE-2024-35680,0,0,abcc5f0eeb10e717c7a703c1bfe0ea4283e28aa8c32eb264f3894dee0391af2a,2024-06-12T17:49:56.670000
|
||||
CVE-2024-35681,0,0,525bdaafae75f5bf5cf51a1834d939c20d16bf8cdef623f1824a094f964d2f1e,2024-06-10T02:52:08.267000
|
||||
CVE-2024-35682,0,0,d5d2707642803696da8586799f5705a4682d89a42a48773cd9ba1156a6a65a23,2024-06-10T02:52:08.267000
|
||||
CVE-2024-35683,0,0,543ee45c55cfe4df71023cbc2ca445f0891a26383910f017400d4b92d415a6a8,2024-06-11T14:15:12.453000
|
||||
@ -251559,7 +251565,7 @@ CVE-2024-35709,0,0,6e0a619a531b0e86e830f3c2f5f94e3f83db0d1d14cf3f0af71428a6ad96e
|
||||
CVE-2024-3571,0,0,69cf6aaba9ed550ce2e1f492d0ecd149e8d5cd4d3ef343f36ac06a714698dced,2024-04-16T13:24:07.103000
|
||||
CVE-2024-35710,0,0,2821683de41fa3eeb51b9282bc176211774b4c3042581edf1e5d173ac55f1b1a,2024-06-10T02:52:08.267000
|
||||
CVE-2024-35711,0,0,abde08774d127ad0db34965655a4de5b5dad73c102e868a4d0f8c3582ef01c98,2024-06-10T02:52:08.267000
|
||||
CVE-2024-35712,0,1,8f4bb9399a50a51194e79d6df3895aca303c8f418f373df47beb5d65f20c7133,2024-06-12T17:49:29.547000
|
||||
CVE-2024-35712,0,0,8f4bb9399a50a51194e79d6df3895aca303c8f418f373df47beb5d65f20c7133,2024-06-12T17:49:29.547000
|
||||
CVE-2024-35713,0,0,67f12030ef9ae03f21eeefc61a2db714e1cd54b5976a2138aaa81f95299ca1f4,2024-06-10T02:52:08.267000
|
||||
CVE-2024-35714,0,0,fda77c484f1be31559583b8ce420a09ac05ec40a4cbe01b6366029636befebbf,2024-06-10T02:52:08.267000
|
||||
CVE-2024-35715,0,0,a8feb3a0e36b1ed746ea7b8db0d283a4e527ecef045188b4e311eb2de1d8e60b,2024-06-10T02:52:08.267000
|
||||
@ -251569,43 +251575,43 @@ CVE-2024-35718,0,0,88ba8367c19f7a9dbc9e6ec292607ddba06c8c0ffe199e953febc26814251
|
||||
CVE-2024-35719,0,0,dd1d7bca8ae8cde9f9e3f2600aa39b26178c0f1f411f5a0803d6eedab9a3d37c,2024-06-10T02:52:08.267000
|
||||
CVE-2024-3572,0,0,fac7085e464e1d98d017bfc9635e53b969d9f55d28ae04030a557f0ab1b04301,2024-04-16T13:24:07.103000
|
||||
CVE-2024-35720,0,0,0f164f8f9b670114152a0f88625e47d291e06bcc76a25b980fca9f1df0718e97,2024-06-10T12:40:41.360000
|
||||
CVE-2024-35721,0,1,1807f30f29f0ac6b48d19063b461698322580402ce67e1233fa1480e571b35ca,2024-06-12T16:29:34.530000
|
||||
CVE-2024-35722,0,1,2e6d40e808b87f9cc3afd3fe92f67b7f9b679f9fc483d9a2a452a3933a833b76,2024-06-12T16:29:22.497000
|
||||
CVE-2024-35723,0,1,d21aa2ceb958c34983036417b55927b69725a1c80082efddfb006619febf87fb,2024-06-12T16:28:51.920000
|
||||
CVE-2024-35724,0,1,3dcf56a5238fff86e0902a51c35aa1bbf1d6e4243c4c748bcdbe9328ad3cb3d6,2024-06-12T16:28:10.463000
|
||||
CVE-2024-35725,0,1,276f09c680172cbb9c625bbd562e9e55d8cb15c0ae19e5da74ceb507e318f9d8,2024-06-12T16:27:55.390000
|
||||
CVE-2024-35726,0,1,923fc98f297ebc14a7cd4aa382f37d2dbb48b57a67365e8f6804065b2625ca49,2024-06-12T16:27:05.920000
|
||||
CVE-2024-35727,0,1,cd1bc1c7642d589d608eb5fbc76d5f9982b1e35e7746c63331eae50d9790b9bc,2024-06-12T16:26:55.247000
|
||||
CVE-2024-35728,0,1,306fd0fcb80558a8a58d3e182d1bc6fcb13b5e686d98a23fefefa9b2415e6d65,2024-06-12T17:43:24.173000
|
||||
CVE-2024-35729,0,1,0ea27869f1ce9b6503e333de597369ca39c33950492540d653a43ac76950edcb,2024-06-12T16:26:45.633000
|
||||
CVE-2024-35721,0,0,1807f30f29f0ac6b48d19063b461698322580402ce67e1233fa1480e571b35ca,2024-06-12T16:29:34.530000
|
||||
CVE-2024-35722,0,0,2e6d40e808b87f9cc3afd3fe92f67b7f9b679f9fc483d9a2a452a3933a833b76,2024-06-12T16:29:22.497000
|
||||
CVE-2024-35723,0,0,d21aa2ceb958c34983036417b55927b69725a1c80082efddfb006619febf87fb,2024-06-12T16:28:51.920000
|
||||
CVE-2024-35724,0,0,3dcf56a5238fff86e0902a51c35aa1bbf1d6e4243c4c748bcdbe9328ad3cb3d6,2024-06-12T16:28:10.463000
|
||||
CVE-2024-35725,0,0,276f09c680172cbb9c625bbd562e9e55d8cb15c0ae19e5da74ceb507e318f9d8,2024-06-12T16:27:55.390000
|
||||
CVE-2024-35726,0,0,923fc98f297ebc14a7cd4aa382f37d2dbb48b57a67365e8f6804065b2625ca49,2024-06-12T16:27:05.920000
|
||||
CVE-2024-35727,0,0,cd1bc1c7642d589d608eb5fbc76d5f9982b1e35e7746c63331eae50d9790b9bc,2024-06-12T16:26:55.247000
|
||||
CVE-2024-35728,0,0,306fd0fcb80558a8a58d3e182d1bc6fcb13b5e686d98a23fefefa9b2415e6d65,2024-06-12T17:43:24.173000
|
||||
CVE-2024-35729,0,0,0ea27869f1ce9b6503e333de597369ca39c33950492540d653a43ac76950edcb,2024-06-12T16:26:45.633000
|
||||
CVE-2024-3573,0,0,f978306925f93ca64332932b6f5a09fb648fa8e8ad9d4b00bd427fd81ec82478,2024-04-16T13:24:07.103000
|
||||
CVE-2024-35730,0,0,49335cae17539a2ff75d573d2c355a9e96d242f541f9939e3a5e291d5780cbb8,2024-06-10T02:52:08.267000
|
||||
CVE-2024-35731,0,0,143fbc50e8cef612366366b66d67424075ebe4c9c1a8d543f78a4729c1a58e2a,2024-06-10T02:52:08.267000
|
||||
CVE-2024-35732,0,0,7fdcba0fd7fddef85feb7e6673a8f96d3154b7974fa22b232cf3fd801d3f54de,2024-06-10T02:52:08.267000
|
||||
CVE-2024-35733,0,0,a1ae2286f7bc76a6978fa6bf1b5fce5a756320de3c88f0e64dedfe42b522a5d8,2024-06-10T02:52:08.267000
|
||||
CVE-2024-35734,0,0,4db4068d084716e23e2c716612575cf1c31577ae6452883821d760d3b2973e48,2024-06-10T02:52:08.267000
|
||||
CVE-2024-35735,0,1,255e899388da84f45c210958c5d8702fbaa1352b1af6a25a9e4c37e262562a2e,2024-06-12T16:26:08.450000
|
||||
CVE-2024-35735,0,0,255e899388da84f45c210958c5d8702fbaa1352b1af6a25a9e4c37e262562a2e,2024-06-12T16:26:08.450000
|
||||
CVE-2024-35736,0,0,ce53c5603569b56b066418efe2441dcc3ec4daf52569cea931f378aa336fd127,2024-06-10T02:52:08.267000
|
||||
CVE-2024-35737,0,0,68b854bcf8f4224101727c49f7d231c73d532ff04fc75a01e1d9fe383907d041,2024-06-10T02:52:08.267000
|
||||
CVE-2024-35738,0,0,b35b0370c2dd956489606373203db0f27e1293b12d9ab83c9b53ee18df600402,2024-06-10T02:52:08.267000
|
||||
CVE-2024-35739,0,0,b4f70001f5f669ef8233f6bfef832af600079b2d34c768ea99133be9875bdb3d,2024-06-10T02:52:08.267000
|
||||
CVE-2024-3574,0,0,a6cc99c8a389ea7db1c37fe05b40106752b73810cdac85caab18aeb26d6bc576,2024-04-16T13:24:07.103000
|
||||
CVE-2024-35740,0,0,cd3c4df653c403e3da38132e6a2e32e99932f9e5ed5f1383de768204108321b2,2024-06-10T02:52:08.267000
|
||||
CVE-2024-35741,0,1,2398aa682188cccc3380c9f03f79a94b0e61bedb784ddc6bf6525e6c832a8362,2024-06-12T17:54:46.150000
|
||||
CVE-2024-35742,0,0,fe154a3e8fa530687ef00116cc4be8a04e7fc1ca3143f50ff0ea0f84f7dba929,2024-06-10T12:40:41.360000
|
||||
CVE-2024-35743,0,1,cdf57129513ee1ed4c8cf3c1eadcafc386204e60f908e5a57b98299bfc433ed5,2024-06-12T17:42:56.900000
|
||||
CVE-2024-35744,0,1,9e54541e70135d5f75d1822350da3a752ee91afb0b56b1661f0c8acd6c0af81b,2024-06-12T17:42:12.707000
|
||||
CVE-2024-35745,0,1,07997091a8cd648631b3f4b65df28a3ac2b2bc0c62bc29345dc307bf6450bbbe,2024-06-12T17:36:32.763000
|
||||
CVE-2024-35746,0,1,6bfd0656dae71d387fa12929060a524c27e2e27454d60b936c90b1042e33379d,2024-06-12T17:36:02.087000
|
||||
CVE-2024-35747,0,1,ccfdca49cb01bd94b0d2ef1d42ed69046774e7d23d14b1ca7e95e0cc185aa883,2024-06-12T17:32:52.343000
|
||||
CVE-2024-35741,0,0,2398aa682188cccc3380c9f03f79a94b0e61bedb784ddc6bf6525e6c832a8362,2024-06-12T17:54:46.150000
|
||||
CVE-2024-35742,0,1,109cb5c630ede3bd19739135ead54896a05f10954ba59141c5c759e7d1be0f38,2024-06-12T19:32:19.827000
|
||||
CVE-2024-35743,0,0,cdf57129513ee1ed4c8cf3c1eadcafc386204e60f908e5a57b98299bfc433ed5,2024-06-12T17:42:56.900000
|
||||
CVE-2024-35744,0,0,9e54541e70135d5f75d1822350da3a752ee91afb0b56b1661f0c8acd6c0af81b,2024-06-12T17:42:12.707000
|
||||
CVE-2024-35745,0,0,07997091a8cd648631b3f4b65df28a3ac2b2bc0c62bc29345dc307bf6450bbbe,2024-06-12T17:36:32.763000
|
||||
CVE-2024-35746,0,0,6bfd0656dae71d387fa12929060a524c27e2e27454d60b936c90b1042e33379d,2024-06-12T17:36:02.087000
|
||||
CVE-2024-35747,0,0,ccfdca49cb01bd94b0d2ef1d42ed69046774e7d23d14b1ca7e95e0cc185aa883,2024-06-12T17:32:52.343000
|
||||
CVE-2024-35748,0,0,ab07387e8cbceeb936ade78e834c5c15ec3b5a2cc852cd848f3fc4076b8b7a4e,2024-06-12T13:30:18.963000
|
||||
CVE-2024-35749,0,0,1d4109865cdef92c2876bf85af6a2839448c5bccd0ef1b4a023a36e807df8057,2024-06-10T18:06:22.600000
|
||||
CVE-2024-35749,0,1,b90dff04274c0424523c1c1e2079a645a94a67dc6ef398d3ad98a0d07ae5ab2d,2024-06-12T18:19:55.050000
|
||||
CVE-2024-3575,0,0,59be73eca5c53cbbcf99414bd65c6b74b4dff22ff5983c2d091439c46f610b22,2024-04-16T13:24:07.103000
|
||||
CVE-2024-35750,0,0,a560006c880afd12dcbd61cea07fe78f3a899ebabbef8546711e97bace611fe5,2024-06-10T02:52:08.267000
|
||||
CVE-2024-35751,0,0,ae55742e6cee89fc362370a5e03b369783af57035c3e4ca39074ba46844c49ff,2024-06-10T02:52:08.267000
|
||||
CVE-2024-35752,0,0,667b82b619d6af887c0f82748c01ea49704108d98bd8dc42d16eeda994071a5d,2024-06-10T02:52:08.267000
|
||||
CVE-2024-35753,0,0,e87a673ccbe7b6c1f7094568180d993726bbfee58647b46671132ae9e6160269,2024-06-10T02:52:08.267000
|
||||
CVE-2024-35754,0,0,80aafb73d69d6f935233e8c3d3cbc1c30cfff9933d76149cad332b8773d950d1,2024-06-10T18:06:22.600000
|
||||
CVE-2024-35754,0,1,aa65be108fb30993f3885ae8163c97598c773dba7e2b2fc6fa84875158e744b3,2024-06-12T18:19:06.043000
|
||||
CVE-2024-35755,0,0,7d42522fcd02f3fe60a2c6974d4d632d3f98569d74d8e6608400a19743cd1c98,2024-06-10T02:52:08.267000
|
||||
CVE-2024-35756,0,0,f38d018d09d60bf027caad7794c192ca3356d81e050aa30cf2a44d5b7e716fda,2024-06-10T02:52:08.267000
|
||||
CVE-2024-3576,0,0,da3479f65547a923ac9b6fc5d4e01aab352d357f2ab0f89f14bd434e8562f642,2024-05-07T09:15:38.747000
|
||||
@ -251939,9 +251945,9 @@ CVE-2024-36246,0,0,50338f85842e71924c1397e2b0a309f647146226696bf59a5411ba0e6e468
|
||||
CVE-2024-3625,0,0,bb7fa72c43d725aef9f66641f31c3359a614ed8ba414acf9f05b8e44148cef81,2024-04-26T12:58:17.720000
|
||||
CVE-2024-36255,0,0,22b21684452ad4563618ad5cee66dc719af723b04c8a1647fe9cf6d970347f9a,2024-05-28T12:39:28.377000
|
||||
CVE-2024-3626,0,0,668faec6d18ac8a7c33197af94901aaf7ddac1dec4c77c1d646fba224d5f8541,2024-05-24T01:15:30.977000
|
||||
CVE-2024-36263,0,1,04ea6f141e5e9883d4c0410a515e19097ad4d5fc98cc6380d6fe8513b8b1aa09,2024-06-12T17:15:50.363000
|
||||
CVE-2024-36264,0,1,9ef31114da021eb9789083f1ed78ae2fc93afdf41a8bb695140a634b5b37f930,2024-06-12T17:15:50.447000
|
||||
CVE-2024-36265,0,1,0079a3aa5b78f3732cbbe3adb7417ca40923c1032ca8fa54976ab501576b0297,2024-06-12T17:15:50.520000
|
||||
CVE-2024-36263,0,0,04ea6f141e5e9883d4c0410a515e19097ad4d5fc98cc6380d6fe8513b8b1aa09,2024-06-12T17:15:50.363000
|
||||
CVE-2024-36264,0,0,9ef31114da021eb9789083f1ed78ae2fc93afdf41a8bb695140a634b5b37f930,2024-06-12T17:15:50.447000
|
||||
CVE-2024-36265,0,0,0079a3aa5b78f3732cbbe3adb7417ca40923c1032ca8fa54976ab501576b0297,2024-06-12T17:15:50.520000
|
||||
CVE-2024-36266,0,0,83df454a9d264cabc9c075046ae12e249cd453c24f6de612ee1d9f73df0ef774,2024-06-11T13:54:12.057000
|
||||
CVE-2024-36267,0,0,5b402628b4c430b8eab614a5b3330f6f2d186537f83ff9a60bb1a91e4b3c3cac,2024-05-30T13:15:41.297000
|
||||
CVE-2024-3628,0,0,ad2a38a3d431944b5239dd67ace3bcd2603e3057c8d0a04d847db45516b0c9ea,2024-05-07T13:39:32.710000
|
||||
@ -251991,18 +251997,18 @@ CVE-2024-3640,0,0,abbf5a33cbca708fe19710dda7a796491ae1d1614e9cd03f43d6cddef8b095
|
||||
CVE-2024-36400,0,0,6b10ab1f058055da0b7f6513936a46e66d6922b94171c5e956b85881f675cf7c,2024-06-10T19:39:21.660000
|
||||
CVE-2024-36405,0,0,4b4347959a84cfd87daa4c611c67a41c72e3e0c399bcb3b81e58f7587d8de794,2024-06-10T18:06:22.600000
|
||||
CVE-2024-36406,0,0,ae1e0beb0e761fd5661143be47855f0b61a65c6cc86fd6099339034686f4a643,2024-06-10T18:06:22.600000
|
||||
CVE-2024-36407,0,0,741ad29a7cdcbf05bfc2cd2a875d09c28750ff4396926bb53d2fe2a5df4158bd,2024-06-10T18:06:22.600000
|
||||
CVE-2024-36408,0,0,5cd8a75ba24079c1009c3729ba7de6130c049fa9b19c282e27fad279a2949b25,2024-06-10T18:06:22.600000
|
||||
CVE-2024-36409,0,0,9cd16a7e24bd8394d1f0c2721003efcbffc242645298d2d4538f59e84a64ede5,2024-06-10T20:54:18.443000
|
||||
CVE-2024-36407,0,1,3fa9b8688b87bb89923ff6af2953ac9e3c3d75823a9915954eac5e78dc625b42,2024-06-12T18:17:38.777000
|
||||
CVE-2024-36408,0,1,11f21869c76c432e26407d306c96488f7ba971b6993fdb685c1f024c80c342a3,2024-06-12T18:13:58.627000
|
||||
CVE-2024-36409,0,1,2c3b215af6bbe6fa84592adf67b9957ea251df2e6964e1fe5d6f74050de42541,2024-06-12T18:09:19.450000
|
||||
CVE-2024-3641,0,0,c281de95cce057acff2793609e8f843aad579a2f0257c0c2e0b6442733e87b14,2024-05-16T13:03:05.353000
|
||||
CVE-2024-36410,0,0,fac35f9377acbd5e62bae482d6b26ac497ea92f83ead8605ae0a4d55fc9e3cbf,2024-06-10T20:54:18.443000
|
||||
CVE-2024-36411,0,0,aa7544310bc332364ee37edb0f84d400824d961008ffebd8db7c1ce2dc3e5b05,2024-06-10T20:54:18.443000
|
||||
CVE-2024-36412,0,1,548544c4ffb106ae4459efe54787516f7a8b91038e9bd99db46c682309c7b7b1,2024-06-12T18:00:00.317000
|
||||
CVE-2024-36413,0,1,4069f61c28f83942cd6f32b01d400d2c9b955950d9c25442379f797d94d57edc,2024-06-12T17:59:44.673000
|
||||
CVE-2024-36414,0,1,0b668116227fd5781118170b1cdfe9c95e50c019e2f7cf5a2f38009ed0ae2db9,2024-06-12T17:59:14.353000
|
||||
CVE-2024-36415,0,1,97f30d08c26bffa9b2c4d6a7a9001234ed7c9da30e93e3ea400c7ad232ab473d,2024-06-12T17:58:53.497000
|
||||
CVE-2024-36416,0,1,9328a3d2121fa2da1a29b5be1b12cf7cf7ba857605f6afc42d167fd6f6079815,2024-06-12T17:58:19.570000
|
||||
CVE-2024-36417,0,1,7f72be2da88bd03f2618a97d909b76dab66b1196af11257e6aa2fac632513220,2024-06-12T17:58:04.477000
|
||||
CVE-2024-36410,0,1,8d9a5395f64acdec4b478c9c3580ee593a1a452bf5e57093379f25fe695ba0ad,2024-06-12T18:09:04.930000
|
||||
CVE-2024-36411,0,1,dfdbb970f60ea0bdf492b35e05557ba185c5648db47b8910ef4842a663e7c71b,2024-06-12T18:00:13.937000
|
||||
CVE-2024-36412,0,0,548544c4ffb106ae4459efe54787516f7a8b91038e9bd99db46c682309c7b7b1,2024-06-12T18:00:00.317000
|
||||
CVE-2024-36413,0,0,4069f61c28f83942cd6f32b01d400d2c9b955950d9c25442379f797d94d57edc,2024-06-12T17:59:44.673000
|
||||
CVE-2024-36414,0,0,0b668116227fd5781118170b1cdfe9c95e50c019e2f7cf5a2f38009ed0ae2db9,2024-06-12T17:59:14.353000
|
||||
CVE-2024-36415,0,0,97f30d08c26bffa9b2c4d6a7a9001234ed7c9da30e93e3ea400c7ad232ab473d,2024-06-12T17:58:53.497000
|
||||
CVE-2024-36416,0,0,9328a3d2121fa2da1a29b5be1b12cf7cf7ba857605f6afc42d167fd6f6079815,2024-06-12T17:58:19.570000
|
||||
CVE-2024-36417,0,0,7f72be2da88bd03f2618a97d909b76dab66b1196af11257e6aa2fac632513220,2024-06-12T17:58:04.477000
|
||||
CVE-2024-36418,0,0,52272dc570f5081df6975298e5712cf123b760ef720bb4951287c4366378282e,2024-06-11T13:54:12.057000
|
||||
CVE-2024-36419,0,0,e561cf6fec966fa1d9dbaeadf6c1b7f0c1186aebf1fa6c9a3ce263fb312ad74d,2024-06-11T13:54:12.057000
|
||||
CVE-2024-3642,0,0,bbed1ee941355da6f32a6eba37e95a843dd7913c7dd227d8da7f65dcb683674b,2024-05-16T13:03:05.353000
|
||||
@ -252073,7 +252079,7 @@ CVE-2024-36743,0,0,947029ef079964db2f975300f543b502c98bef02b4c5f9f3d5de943b90d77
|
||||
CVE-2024-36745,0,0,c21f6d498139c367702b2a5b310b830e45905feb661fd13e2ada12120c92ab59,2024-06-07T14:56:05.647000
|
||||
CVE-2024-3675,0,0,00d1234baac079cf413c516618dd0fc3e7ad5eadaec0ab200df9e28f23d3ebe2,2024-05-02T18:00:37.360000
|
||||
CVE-2024-3676,0,0,afffaa433a0219105ab8db2fc3cac72e262ac997e8b5329e1239c5388df90382,2024-05-14T19:17:55.627000
|
||||
CVE-2024-36761,1,1,45e68de3caa2edbd8ec7e3d9314dfa2a85dcb79f20010465ff7c3f4953532c02,2024-06-12T16:15:11.983000
|
||||
CVE-2024-36761,0,0,45e68de3caa2edbd8ec7e3d9314dfa2a85dcb79f20010465ff7c3f4953532c02,2024-06-12T16:15:11.983000
|
||||
CVE-2024-3677,0,0,822256c91d31044a13b27ee319c8c0a4bbd148e7653d3ef44cb1c97299aa9fe7,2024-05-02T18:00:37.360000
|
||||
CVE-2024-36773,0,0,be07270490997748ed5042323acf595cf65a4ec0fdf18429a47f38918783b6b9,2024-06-07T19:24:09.243000
|
||||
CVE-2024-36774,0,0,2df072beaff79bc30583e2884ff43f38048f215ce893570cbe619b2c4b3ea848,2024-06-07T14:56:05.647000
|
||||
@ -252211,24 +252217,24 @@ CVE-2024-36970,0,0,50083cf534f5df621aa7bead6ce71043c6360c6ed1cf8d6bd9cf7a1a7b652
|
||||
CVE-2024-36971,0,0,82b8b9fbabc6d1a263f871b2e3cf77e6c0d2c9b2290e695c225e46a96ddc8130,2024-06-12T15:43:28.280000
|
||||
CVE-2024-36972,0,0,639469afbfc3c8e61ad1446aeb28d8bbb041cd80eb7cb8c17f6c32ebdf799618,2024-06-12T10:15:31.347000
|
||||
CVE-2024-3698,0,0,13b4029eb6179dbe788598788e16556a1995d850ddfc4af1ee0c4e86961a3a21,2024-05-17T02:40:04.800000
|
||||
CVE-2024-3699,0,1,6e64dedcb1ec83e842b9c3ed18b374381a62ef4f7982a43d9405eeb95e55d0fc,2024-06-12T17:53:09.130000
|
||||
CVE-2024-3700,0,1,f1913b84964a9a87ca4f78bbad55a262819a35385e2c066c91eaa7c4a1891262,2024-06-12T17:51:52.710000
|
||||
CVE-2024-3699,0,0,6e64dedcb1ec83e842b9c3ed18b374381a62ef4f7982a43d9405eeb95e55d0fc,2024-06-12T17:53:09.130000
|
||||
CVE-2024-3700,0,0,f1913b84964a9a87ca4f78bbad55a262819a35385e2c066c91eaa7c4a1891262,2024-06-12T17:51:52.710000
|
||||
CVE-2024-3701,0,0,d78f52a76181001272debccb095fb5971bb478ebc111313d9ff2994f4ec0598f,2024-04-15T13:15:31.997000
|
||||
CVE-2024-37014,0,1,c47c2b09802b94267a83a7981860e8f6f71032b8440b3dd55d1a2f768ec7199d,2024-06-12T17:57:01.660000
|
||||
CVE-2024-37014,0,0,c47c2b09802b94267a83a7981860e8f6f71032b8440b3dd55d1a2f768ec7199d,2024-06-12T17:57:01.660000
|
||||
CVE-2024-37017,0,0,fd4284c5a2195342d9622b5d20527d4d58db85192e227730c5a741287dc835e4,2024-05-31T13:01:46.727000
|
||||
CVE-2024-37018,0,0,92b8b0fbc5eb3b3ff9e996cdb38184b7cd381c3e78fdf37e960ede7860319106,2024-05-31T13:01:46.727000
|
||||
CVE-2024-37019,0,0,c7b7779ae7837bd324c73dde7cb1a43454b31469d3554588beff0fd2aed9bc3d,2024-06-03T19:23:17.807000
|
||||
CVE-2024-3703,0,0,46d289814974ee20b6160fe56cc828277066d832a1c60ccf5d9c1a62d06c47e2,2024-05-03T12:48:41.067000
|
||||
CVE-2024-37031,0,0,967b2a62510a1f35de5969f18efe9a7e1918d9bc4c74d0011148e6a904de3800,2024-06-03T14:46:24.250000
|
||||
CVE-2024-37032,0,0,2fd16d835b1a2cd56c97d409a29d6a495e6793f4206084713a4efe57de2f2107,2024-05-31T13:01:46.727000
|
||||
CVE-2024-37036,1,1,419b32893b7c15b1ad5886eee490ad49f9f76afce4dc71f5feadde311f406369,2024-06-12T17:15:50.637000
|
||||
CVE-2024-37037,1,1,9717fa38c618eabcfe1f3f2a1df3fd72894a992126d0ee2e1290f2219868f934,2024-06-12T17:15:50.853000
|
||||
CVE-2024-37038,1,1,2adaf850c80e6bddd36fbdba564518a6090262b1b15eac3d2f8554f70811ee8b,2024-06-12T17:15:51.080000
|
||||
CVE-2024-37039,1,1,871fbad7e4cd60608e22285ba1036c660d58782590c4808c122d51a46c8029de,2024-06-12T17:15:51.313000
|
||||
CVE-2024-37036,0,0,419b32893b7c15b1ad5886eee490ad49f9f76afce4dc71f5feadde311f406369,2024-06-12T17:15:50.637000
|
||||
CVE-2024-37037,0,0,9717fa38c618eabcfe1f3f2a1df3fd72894a992126d0ee2e1290f2219868f934,2024-06-12T17:15:50.853000
|
||||
CVE-2024-37038,0,0,2adaf850c80e6bddd36fbdba564518a6090262b1b15eac3d2f8554f70811ee8b,2024-06-12T17:15:51.080000
|
||||
CVE-2024-37039,0,0,871fbad7e4cd60608e22285ba1036c660d58782590c4808c122d51a46c8029de,2024-06-12T17:15:51.313000
|
||||
CVE-2024-3704,0,0,ad7f205e31bc442943bbd584692b194a3485d815654eeb83e4eefef6a6eff393,2024-04-15T13:15:51.577000
|
||||
CVE-2024-37040,1,1,2e4e3e051164ccd059ed47f35e3875e946b2ab9f4ffaa3045c5f164c197e72b8,2024-06-12T17:15:51.540000
|
||||
CVE-2024-37040,0,0,2e4e3e051164ccd059ed47f35e3875e946b2ab9f4ffaa3045c5f164c197e72b8,2024-06-12T17:15:51.540000
|
||||
CVE-2024-3705,0,0,44f1c76d2f6cd8dab882ddfdbdbe908a4e3a8f22d6a90f31f0279b7faf87a669,2024-04-15T13:15:51.577000
|
||||
CVE-2024-37051,0,1,0d2e5970f87c8d9c22ba6507f170a3b81c5f970d2e6b258a94c4dded4fd0590b,2024-06-12T17:49:04.017000
|
||||
CVE-2024-37051,0,0,0d2e5970f87c8d9c22ba6507f170a3b81c5f970d2e6b258a94c4dded4fd0590b,2024-06-12T17:49:04.017000
|
||||
CVE-2024-37052,0,0,b5eb259457f95c1e8621c6844ccb575aa5920121a474c1c74037900643b492aa,2024-06-04T16:57:41.053000
|
||||
CVE-2024-37053,0,0,1081c2339448dc4a976b760458c506e7c94aa413116003d5e0e73d2124757682,2024-06-04T16:57:41.053000
|
||||
CVE-2024-37054,0,0,dd5e5c1cbe28a100cc6cbec6281d65acc5f0b582cd904acdbac1ca15040981ec,2024-06-04T16:57:41.053000
|
||||
@ -252287,7 +252293,7 @@ CVE-2024-37295,0,0,489b7cf64c9161735dcc4e60b77f6320915669d39993b442952b536afb71d
|
||||
CVE-2024-37296,0,0,2aaf9d94ef056cce09e0b5724aee7c4e629647a09dbe0d79a994991f97a3ce49,2024-06-11T15:16:09.963000
|
||||
CVE-2024-37297,0,0,577a76783d232067279e3b65b1d0e5486f1ee5085aad4d7376d7ace51c240070,2024-06-12T15:15:52.677000
|
||||
CVE-2024-3730,0,0,a30960de1676c855ee35b61976bc4581959cd1a98a7ba3127a461fb7fc955146,2024-04-25T13:18:02.660000
|
||||
CVE-2024-37300,1,1,e695bf813c4b2c9ac897c60297973f24cdf1699ac80492d5b5ef8d3561eea312,2024-06-12T16:15:12.097000
|
||||
CVE-2024-37300,0,0,e695bf813c4b2c9ac897c60297973f24cdf1699ac80492d5b5ef8d3561eea312,2024-06-12T16:15:12.097000
|
||||
CVE-2024-37301,0,0,1426a850b241ee3963e992e98f12d9875eb125b26184e9013bd9eaf89532808e,2024-06-11T19:16:07.890000
|
||||
CVE-2024-37304,0,0,a0d53a238603c7b00022def6bac211f79e2e4865ec26e30c72b3c7b78c9449ba,2024-06-12T15:15:52.910000
|
||||
CVE-2024-3731,0,0,bdcc8f677627b7b108ec8e839a01e7cc6ba34354d6004394dff79046d7838f40,2024-04-19T13:10:25.637000
|
||||
@ -252305,7 +252311,7 @@ CVE-2024-37384,0,0,60b664762f9333df5975c65ab9b722a03bcb9e931609f92fdae7cd1cf2f9f
|
||||
CVE-2024-37385,0,0,ab67b8a0f073ce7f5c28ca11584627dbf70b59e11b1337a1068ce1887aeb0943,2024-06-07T14:56:05.647000
|
||||
CVE-2024-37388,0,0,4bb786bca42a11ef8edd07a6799bb4caedfa95038e4371ae55f637f2792eab26,2024-06-07T19:24:09.243000
|
||||
CVE-2024-3739,0,0,18ca969c974b63c6d16494fbcc2d63756747cacc5947332fefb20d9c592537e4,2024-05-17T02:40:06.067000
|
||||
CVE-2024-37393,0,1,adb4710ef8d4e8e5b898aa80bff6a41a92b599e232f1db44a8b62c91938837ef,2024-06-12T17:56:23.390000
|
||||
CVE-2024-37393,0,0,adb4710ef8d4e8e5b898aa80bff6a41a92b599e232f1db44a8b62c91938837ef,2024-06-12T17:56:23.390000
|
||||
CVE-2024-3740,0,0,1025f598f3437296a5a18526d2723c88eb3b5b46ea06c50b765dc694c6a0bd1a,2024-05-17T02:40:06.170000
|
||||
CVE-2024-37407,0,0,aec5c198a3463e3996afdb2b87dcd156119620da199d8e9853297e329cd2e74b,2024-06-10T02:52:08.267000
|
||||
CVE-2024-37408,0,0,43de84338ac833cd78092ec836ae8beffbac830f1aa1a52e6c8ca816bfb77c27,2024-06-10T02:52:08.267000
|
||||
@ -252324,13 +252330,14 @@ CVE-2024-37535,0,0,07f7d930de9d2427116ed26f9657c7962aa8122c29cd0ba965c2b1ee75b9b
|
||||
CVE-2024-3755,0,0,255cc63bdc34aca663119fb8f6757a7da5a9acef7ecda034d88dc05babf4b05b,2024-05-06T12:44:56.377000
|
||||
CVE-2024-3756,0,0,978b8204ea279199334a4c8c549150dc6420f24480b5effb717e8509749d66aa,2024-05-06T12:44:56.377000
|
||||
CVE-2024-37568,0,0,c31dda2ce4e2cf1c14da8896dd1ff7847e88710326c3ff8a35f20f8d9a2e2a98,2024-06-12T13:29:13.877000
|
||||
CVE-2024-37569,0,1,748406cd7b0e731a2b9037b16c6d1dde7e8c81aa1003e1ce6c82275ceb288683,2024-06-12T16:32:56.203000
|
||||
CVE-2024-37569,0,0,748406cd7b0e731a2b9037b16c6d1dde7e8c81aa1003e1ce6c82275ceb288683,2024-06-12T16:32:56.203000
|
||||
CVE-2024-3757,0,0,62301a2775fcbfb9e8b5b1aa90b79aa074cd639699f2863765d338333af4b798,2024-05-07T13:39:32.710000
|
||||
CVE-2024-37570,0,1,a374041c2622c9ba66d2048315fc9e015af6a8717cce4f8beb5b59800398626a,2024-06-12T16:32:34.513000
|
||||
CVE-2024-37570,0,0,a374041c2622c9ba66d2048315fc9e015af6a8717cce4f8beb5b59800398626a,2024-06-12T16:32:34.513000
|
||||
CVE-2024-3758,0,0,3ea9ecbea279ca1eb1159e542db09b1cab2d2435be79c6a6a563dc4d73ca4285,2024-05-07T13:39:32.710000
|
||||
CVE-2024-3759,0,0,20211226ea875c33805e71e9c0afa18c7ce1ad112702c8859afd48ee84347f62,2024-05-07T13:39:32.710000
|
||||
CVE-2024-3761,0,0,c0af44e486388b5bef077e784125f415f33c54c3c3a8677d0ab80af1f3e8df6c,2024-05-20T13:00:04.957000
|
||||
CVE-2024-3762,0,0,3a4d7121b46153c733feea020bbdc2b15c8dd6dac7706d18d5d6cc6fdd5731da,2024-05-17T02:40:06.647000
|
||||
CVE-2024-37629,1,1,3a410850af244f6f643a3d12a3e26aa1669009a9d1cb133440ab8e99ef0c8d27,2024-06-12T18:15:12.293000
|
||||
CVE-2024-3763,0,0,d4a43b988d4f5ccf2146c95730aa308ab303229339c58dc3a72b2fdabbe91a36,2024-06-05T20:15:13.530000
|
||||
CVE-2024-3764,0,0,33410633d9dadf088a16c40fe902a036322ce93eb40b27ebad26eee187e78727,2024-05-17T02:40:06.823000
|
||||
CVE-2024-3765,0,0,4fdba2eb80818b350bc57cc64ca06a70a8e5d2cec5cc9e99a6b5fff1df632742,2024-05-17T02:40:06.923000
|
||||
@ -252354,9 +252361,9 @@ CVE-2024-3784,0,0,c3548262a5dd94ab612636409a3bf8cd74017da9deb24debb2f77536fe2746
|
||||
CVE-2024-3785,0,0,fc93f2e321d044bf7a0ccc45f351722880d9f0bf94368b28b702ab59c5cb3144,2024-04-15T19:12:25.887000
|
||||
CVE-2024-3786,0,0,e7dff42d10ea5f51aefb5b7728f1b7d65e7bf6f944a436f82b5cbbe6bdc82c9e,2024-04-15T19:12:25.887000
|
||||
CVE-2024-3787,0,0,570870b6338590c353431fe2587b532b039679da85c30ab8bb196a257bca2d47,2024-05-14T16:11:39.510000
|
||||
CVE-2024-37878,1,1,8f7712233494afef3eb7225c90d712354063c6005f7fa9f8e86929491655b1bd,2024-06-12T17:15:51.803000
|
||||
CVE-2024-37878,0,0,8f7712233494afef3eb7225c90d712354063c6005f7fa9f8e86929491655b1bd,2024-06-12T17:15:51.803000
|
||||
CVE-2024-3788,0,0,746d07fda684df68d3fb292ada95a2bfbbf82c49ef53e13b55d1c7f158f32ee7,2024-05-14T16:11:39.510000
|
||||
CVE-2024-37880,0,1,8fc2a7037c003cd05c8204143fd08c5c781310cbac1dbb1e80c2c17a0b28d4e3,2024-06-12T16:30:15.053000
|
||||
CVE-2024-37880,0,0,8fc2a7037c003cd05c8204143fd08c5c781310cbac1dbb1e80c2c17a0b28d4e3,2024-06-12T16:30:15.053000
|
||||
CVE-2024-3789,0,0,63d455d46acf2815a86f3b9bf286e732f6c1d2d557d093772c64f0c37d315365,2024-05-14T16:11:39.510000
|
||||
CVE-2024-3790,0,0,ea62135e66a6e7a74daddc8d443b8b9750f000d596c0e5f30e202f53e21ec40b,2024-05-14T16:11:39.510000
|
||||
CVE-2024-3791,0,0,9bc6cec70e672f5f7f9ccdb1c0603c19b269c41965293930113b85d0de980142,2024-05-14T16:11:39.510000
|
||||
@ -252403,7 +252410,7 @@ CVE-2024-3846,0,0,c48e0a8a684c17ee6ebfa3dd6ef492735a7e1f61d2741ebafccef32d97787c
|
||||
CVE-2024-3847,0,0,a2146e655749d60cf9631f855db42a3d44cf07cd9a542fd1035e46bb9a6304c5,2024-05-03T03:16:29.293000
|
||||
CVE-2024-3848,0,0,cff2d1cd97f0b1f2183f9bb4edcf4fc45d9e2b8ab251b9953f6af6105249c0ec,2024-05-16T13:03:05.353000
|
||||
CVE-2024-3849,0,0,d4181d6192aab2f4a2b324451fbda7660fbd9621eb95f5f54a642a6a3d1e7d46,2024-05-02T18:00:37.360000
|
||||
CVE-2024-3850,0,0,6ff7a91bef5f9d4e3f286db4debdf969a93090e3db07661b7aac4ed36b3fcbe3,2024-06-10T18:06:22.600000
|
||||
CVE-2024-3850,0,1,bbe49076d39470df53cdf5186eea91a2b4a40256492f588a1ab86bd1ba5244b0,2024-06-12T18:12:56.413000
|
||||
CVE-2024-3851,0,0,16bcb9f87255ebcf1aad2856af6894b1b0c36049b98621e173e693ad3a900330,2024-05-16T13:03:05.353000
|
||||
CVE-2024-3852,0,0,3038e46972183e994310b2b410f139aaace8bd74e7e7e979d336a57b5feba459,2024-04-22T10:15:07.430000
|
||||
CVE-2024-3853,0,0,da9bcb4a065926b49732a0dd79b2f07a12fd9777c9341906bc363e07df8725cf,2024-04-17T12:48:31.863000
|
||||
@ -252743,7 +252750,7 @@ CVE-2024-4324,0,0,7ffaeab065d0c9a1857569b7bf1dcf908cb9c5c673c6c887858b7e3bb59f5d
|
||||
CVE-2024-4325,0,0,9bdbfeadfcfe04a30cd4b788d23f4d3e0d4d7ac5ca53497b4f8e137c6cc841b9,2024-06-07T14:56:05.647000
|
||||
CVE-2024-4326,0,0,8dbb64b51f21b806e292a7e05ea5c1051e35374391354831c3514fc08d15ec8e,2024-05-16T13:03:05.353000
|
||||
CVE-2024-4327,0,0,4d82dd4709e731be065c0bf0ae9ef6780542dd816512537c908eaf4d566d4272,2024-05-17T02:40:22.673000
|
||||
CVE-2024-4328,0,0,5c54a81eaca7a66f4f49f745eade926cbd2e59d834d210577cf1a36d3512686b,2024-06-10T12:40:41.360000
|
||||
CVE-2024-4328,0,1,5c6dddabdbc801031ee77029aa4b0ff4de38533976485f2a04e98fdc9688c2d2,2024-06-12T19:33:00.527000
|
||||
CVE-2024-4329,0,0,b4ac7e4961d4eb2bf8d3a768969ba81a7ecc8f8fe7d1f63dcc17b43bdf703463,2024-05-14T16:11:39.510000
|
||||
CVE-2024-4330,0,0,27ed586df5d07858fa3cac91f5c86ff400dd30bbc2cec38947cbe22382636599,2024-05-30T18:19:11.743000
|
||||
CVE-2024-4331,0,0,31d80071d9217fb084a6ad175ae7c8879003862f66041883ec06dc2da18f1116,2024-06-10T18:15:36.607000
|
||||
@ -253054,9 +253061,9 @@ CVE-2024-4736,0,0,35e0fe51ccd6e16c666173722ffd72f471827cead112caeaf869dd95515427
|
||||
CVE-2024-4737,0,0,0d605ad76fcca9d9a8748ea1570213b2a20be8e7af59e1490aa0de37640ee426,2024-06-04T19:20:48.597000
|
||||
CVE-2024-4738,0,0,703597dd680fa7def2747a141a4237503bd7e8917e070a49546a7e715e951f69,2024-06-04T19:20:48.783000
|
||||
CVE-2024-4743,0,0,e42c9380fd03fa2e7e8dd1d108eb6ee48e234f06ee604011f8e8a51de81bb3cb,2024-06-11T17:32:50.367000
|
||||
CVE-2024-4744,0,1,00389d0f632a53abd6687abe1695ed0d94106b42a5446a5e1de91a20dcdffac8,2024-06-12T16:44:12.157000
|
||||
CVE-2024-4745,0,1,52090afb58a281a3371ee6c6ad54ec80b0aac7a7ded5dbbe0e95b57b1a9dc746,2024-06-12T16:23:34.197000
|
||||
CVE-2024-4746,0,1,f4f2ac85907c7b5b329cbda786b397a3fc954bb6f671df10eda8148346b3a114,2024-06-12T16:17:42.223000
|
||||
CVE-2024-4744,0,0,00389d0f632a53abd6687abe1695ed0d94106b42a5446a5e1de91a20dcdffac8,2024-06-12T16:44:12.157000
|
||||
CVE-2024-4745,0,0,52090afb58a281a3371ee6c6ad54ec80b0aac7a7ded5dbbe0e95b57b1a9dc746,2024-06-12T16:23:34.197000
|
||||
CVE-2024-4746,0,0,f4f2ac85907c7b5b329cbda786b397a3fc954bb6f671df10eda8148346b3a114,2024-06-12T16:17:42.223000
|
||||
CVE-2024-4747,0,0,99152f6494a1192f3bae59b436abcc51d11f811ed1e0a72c2e65c8381fda6054,2024-05-14T16:11:39.510000
|
||||
CVE-2024-4749,0,0,676e331864bc41907c4c80c44886e7dac480ef6dea2c29bc22838d992753d4da,2024-06-04T16:57:41.053000
|
||||
CVE-2024-4750,0,0,423585a3e250903ac62d761ecb0e0e6dc6b4649ccd4411b90275a4e6d2f87495,2024-06-04T16:57:41.053000
|
||||
@ -253278,7 +253285,7 @@ CVE-2024-5098,0,0,4732d7cd15b56a86eb717df9a9d94eac42f29eaa5aa89b4d41ed392b988c2e
|
||||
CVE-2024-5099,0,0,0aeca64f34b67ee8973c6e2be6cc11249d255bf1165c776c1356aec8eda36b33,2024-06-04T19:20:58.993000
|
||||
CVE-2024-5100,0,0,66e888ccf61e6da617c762c0d029f3eaeb85bf9704e37410d6b9e52a0787c1e4,2024-06-04T19:20:59.100000
|
||||
CVE-2024-5101,0,0,0e72680ac39859889a062f1df5b7c7337ebf9e0746a308ddcc1931ba6bc62983,2024-06-04T19:20:59.200000
|
||||
CVE-2024-5102,0,0,76ad0693887b29a2fe187f5872893d8165cd04c179217103d68341726b466323,2024-06-10T18:06:22.600000
|
||||
CVE-2024-5102,0,1,b70c6853e4988b98f71737835d02eb41cd98846f25e1a8a4c171c276cc5efa87,2024-06-12T18:12:01.453000
|
||||
CVE-2024-5103,0,0,f3c12fc9604fe811051dfda71a50d275beaf07af4d2a570d8bf6b2fcd28eddc5,2024-06-04T19:20:59.297000
|
||||
CVE-2024-5104,0,0,0e7a76518082b571f50c4371ee49632a85481d60762022d051097d3bc69f00d0,2024-06-04T19:20:59.397000
|
||||
CVE-2024-5105,0,0,9239348abf3201edf5ca18df8022d8d9a87e261704a9d80f6c607a666b08c4e2,2024-06-04T19:20:59.500000
|
||||
@ -253482,7 +253489,7 @@ CVE-2024-5384,0,0,fc8a760c5f8c6533d32783fcf44bb063e589b4e165b4e3e16391c3aeb9ec5e
|
||||
CVE-2024-5385,0,0,bc3c0d01b2051e708e659a5c3590b7dd8cb9dd588e93f64ca3944fc804f9c929,2024-05-28T12:39:28.377000
|
||||
CVE-2024-5387,0,0,857b2af9507e1fb781392f9f45599eb9ea380f1e8b91dd3c69ea7be187de1f2a,2024-06-03T19:15:09.500000
|
||||
CVE-2024-5388,0,0,0c90149987e278137050d2b65080c43dd31aa72e74992bde244a30e0d49fbf46,2024-06-03T19:15:09.557000
|
||||
CVE-2024-5389,0,1,b03364a2f4d6f0b56bedc45ec6b964cb0ed203a7d91090b995d6798f5653a980,2024-06-12T16:31:30.577000
|
||||
CVE-2024-5389,0,0,b03364a2f4d6f0b56bedc45ec6b964cb0ed203a7d91090b995d6798f5653a980,2024-06-12T16:31:30.577000
|
||||
CVE-2024-5390,0,0,7bbbc0fbbf0080c37ea508796076f5055d10a83119ccd7fea3223bbf180b1d73,2024-06-04T19:21:08.020000
|
||||
CVE-2024-5391,0,0,00f61420375c40b8d29b33273a9abb170480b355b8f71230d76cd6238a9db4ff,2024-06-07T20:15:12.687000
|
||||
CVE-2024-5392,0,0,f7219b2013d34cef28a688dbd5b89c3b8013dcb24b8103dca8d259a586db6696,2024-06-04T19:21:08.117000
|
||||
@ -253570,19 +253577,20 @@ CVE-2024-5543,0,0,1f8dadf7ddfb1e1c1a8006df6622727e1de688b7f483cab717adee12c7f279
|
||||
CVE-2024-5550,0,0,e4fc13aea5b719d7c555043aa9a8be47a59e2f4d5eac2e9fa0d5ff8a8edb892f,2024-06-07T14:56:05.647000
|
||||
CVE-2024-5552,0,0,12abaaddd513e722275738643d6cd32f6bb9e257da98294dd5bedf4ad4cbf55d,2024-06-07T14:56:05.647000
|
||||
CVE-2024-5553,0,0,3f2e6115738134af7d285604a77d6396ef9f781ed1953efa7c72f957ec883035,2024-06-12T04:15:13.127000
|
||||
CVE-2024-5557,1,1,846a1b5724880eee14b60af63bb003aea0869123c1e447b716eab3576476cae9,2024-06-12T17:15:51.943000
|
||||
CVE-2024-5558,1,1,8a2a6beaaea21cb5c7551abc76b759f246695b8ddd48af468f7d6b90b9bf0565,2024-06-12T17:15:52.160000
|
||||
CVE-2024-5560,1,1,ef0761cc09cb2a3b612bdc0fa8d549dbc116ec36d61e23df3cadcf2b2b11eaf9,2024-06-12T17:15:52.357000
|
||||
CVE-2024-5557,0,0,846a1b5724880eee14b60af63bb003aea0869123c1e447b716eab3576476cae9,2024-06-12T17:15:51.943000
|
||||
CVE-2024-5558,0,0,8a2a6beaaea21cb5c7551abc76b759f246695b8ddd48af468f7d6b90b9bf0565,2024-06-12T17:15:52.160000
|
||||
CVE-2024-5559,1,1,a64afea2412e0e18d1851d5510167a9f07c9d7e45028758f9ded45183719d465,2024-06-12T18:15:12.493000
|
||||
CVE-2024-5560,0,0,ef0761cc09cb2a3b612bdc0fa8d549dbc116ec36d61e23df3cadcf2b2b11eaf9,2024-06-12T17:15:52.357000
|
||||
CVE-2024-5564,0,0,cd961630c6982ea90916e9cc290067a2c4a02a79292d87af6b0ec76760478ca9,2024-06-03T14:46:24.250000
|
||||
CVE-2024-5565,0,0,830316f5c713618fdad4a0eda5b7296c22d5d93c87a8813197db3ff9cf28c4ee,2024-05-31T19:14:47.793000
|
||||
CVE-2024-5571,0,0,105c4e644019eeccf72c6e63813cdc36601b1b9a7e3cba5bc172df86631261e6,2024-06-11T17:29:03.277000
|
||||
CVE-2024-5584,0,0,612eacfcf6c3fd3d6fdd0ff2c66e496cc817b02568ea9f69c40277bbc0300578,2024-06-11T13:54:12.057000
|
||||
CVE-2024-5585,0,1,23f2e7b2ee30c2e56251fdffeaabd2833482d3483754dca28b1f5ab4921ddb38,2024-06-12T17:15:04.083000
|
||||
CVE-2024-5585,0,0,23f2e7b2ee30c2e56251fdffeaabd2833482d3483754dca28b1f5ab4921ddb38,2024-06-12T17:15:04.083000
|
||||
CVE-2024-5587,0,0,9180b0762a5a5a7a17ce70cd861bdf25e955d88caf903bee442f7c48a0a2a218,2024-06-03T14:46:24.250000
|
||||
CVE-2024-5588,0,0,21589c4423d1fee081cb695dd8009f3bd5a36bd74dae1713c28449f0da1cd8d1,2024-06-04T19:21:10.267000
|
||||
CVE-2024-5589,0,0,dc63c38434ce5bb089af0d0f8aa09f6a46f1fae34dd45c15f4542741dea047b7,2024-06-03T14:46:24.250000
|
||||
CVE-2024-5590,0,0,ca60332ff9933405c7b9b37e93d2404b53274b9ec741b4065c0c1eadbd60da94,2024-06-03T14:46:24.250000
|
||||
CVE-2024-5597,0,0,1a4662a4bad753ddfaeb71415fd7d7bbee7f1ef3c250c245871db0dcb1335584,2024-06-10T18:06:22.600000
|
||||
CVE-2024-5597,0,1,652827ff26b80eabae5b3eddf519a61b0da7de181ce61fd257911ec48c45cdb0,2024-06-12T18:10:47.080000
|
||||
CVE-2024-5599,0,0,e4d8d3217ca804a33354b51b54e1f3f41ce0e1fc1f554dedfe90ad1a46a87370,2024-06-11T18:24:39.057000
|
||||
CVE-2024-5607,0,0,9601597658129a089207c1a0e7e7267aceda952302ad39754d738e7307549543,2024-06-07T14:56:05.647000
|
||||
CVE-2024-5609,0,0,f28c83e3e9d04345913d36de3bfdbd0d644d73b3d20045d9399b3368319c8d47,2024-06-06T19:16:09.920000
|
||||
@ -253631,7 +253639,7 @@ CVE-2024-5739,0,0,5773cc5124d6a6a0e954a481f5ce31fb721ea51c10912a509188eda9635d70
|
||||
CVE-2024-5742,0,0,d09d1105fb5596a722b05fe43f0b05eb11b548e04093f54406c8e99009264b31,2024-06-12T09:15:23.037000
|
||||
CVE-2024-5745,0,0,8788b99580d43fd9eb900afb700ee157c954d289b603d58451eabd57873852f0,2024-06-08T04:15:10.027000
|
||||
CVE-2024-5758,0,0,60f3603833ce9f04e269788c1d2a3370191ec81ac34b615f7c4c140d7286ef3a,2024-06-10T02:52:08.267000
|
||||
CVE-2024-5759,1,1,826729e04d02664132e22a6c7cc2d0756738f94f6ebbdeb3f8b7aba1ab3ed272,2024-06-12T16:15:12.550000
|
||||
CVE-2024-5759,0,0,826729e04d02664132e22a6c7cc2d0756738f94f6ebbdeb3f8b7aba1ab3ed272,2024-06-12T16:15:12.550000
|
||||
CVE-2024-5761,0,0,e0022a8d80317cd3941058bae14b514f68707790a5051038049a1d552ba8de69,2024-06-07T19:15:24.467000
|
||||
CVE-2024-5766,0,0,86ed0bd8ec5f973a61dc526186a645f1ec84961008a0f608efabd599d39dbfeb,2024-06-10T02:52:08.267000
|
||||
CVE-2024-5770,0,0,2161bc3bb7995521a02976cf67b0f5030935d13dcc8500f4bdfe07ad52c43c37,2024-06-10T02:52:08.267000
|
||||
@ -253650,6 +253658,7 @@ CVE-2024-5782,0,0,1a8a2620a565d05a1a6c2c4c72d75648296e70bf5f89433612bbf40ebc42c7
|
||||
CVE-2024-5783,0,0,e65b469aba92209e135f01d801ec2e7ebd41770aa11624b30224f43d98aec806,2024-06-12T08:15:51.480000
|
||||
CVE-2024-5785,0,0,9826b5aaa33b29bbb943547624c099322eebf243c8fefca7bc1b316af4cf2a62,2024-06-10T18:06:22.600000
|
||||
CVE-2024-5786,0,0,1f75ee06acd19f83f11a6972076ed1b01909c541516fb3c8be9392bde53f67b2,2024-06-10T18:06:22.600000
|
||||
CVE-2024-5798,1,1,aa1945340d1a2bd8574699df8c7cfa4e55fa00a53bbb80a12adfe9c942c62599,2024-06-12T19:15:51.413000
|
||||
CVE-2024-5812,0,0,d575f250532152186ae1730a95904983d1eeca8cedc4e48cf08c6f7cb36548d3,2024-06-11T16:15:29.207000
|
||||
CVE-2024-5813,0,0,ce4a3354f5a4e16f73ac84191b89ae8910ac4de1cfa4c74cc4624e1e37872032,2024-06-11T16:15:29.480000
|
||||
CVE-2024-5825,0,0,800930249192b4fb36871d2a50a6622621c6dfa5eae6376e2c2995741b4630b2,2024-06-11T10:15:13.960000
|
||||
@ -253676,14 +253685,14 @@ CVE-2024-5851,0,0,812870dd68f694f8cb7317d5a8b0b798b4c33892ccc0a6c22c4a632bb6af25
|
||||
CVE-2024-5873,0,0,4affe4b1f71505ca05298a33c7e23c3ae147869580237755bed2d180fbea1b8e,2024-06-12T08:15:51.550000
|
||||
CVE-2024-5891,0,0,81d9f8b71bacc11f5dc360efb1b0d50499697611b49f365c1b4a23895b7163be,2024-06-12T14:15:12.460000
|
||||
CVE-2024-5892,0,0,aedbf3b6ff4f72315e0710a5e0053eef0159f2cd6280fed23810bd46e4afaad4,2024-06-12T06:15:09.473000
|
||||
CVE-2024-5893,0,0,75a17ab9c78de4e86da4ff51cb3473e6f5cc4487a936043b29cff71664107009,2024-06-12T15:15:53.393000
|
||||
CVE-2024-5894,0,0,7a3b9e35f82b06ba3832b29b7a4adfea2b9b21ad7b996e37db3c45efd09e4655,2024-06-12T15:15:53.693000
|
||||
CVE-2024-5895,0,0,ef4becbdaae8731d4c9d3f6a2de4c570b3a9c61f102e39b10564fa421edd1d54,2024-06-12T15:15:53.970000
|
||||
CVE-2024-5896,1,1,fcf5296c2788d50a4e3e3f6e2cb1498459d444e2a307e12bcb8876663fa70daa,2024-06-12T16:15:12.813000
|
||||
CVE-2024-5897,1,1,f9281e8cf1c734c32c576230787d605b9edc06b2bbd66417230ea66875c948d1,2024-06-12T16:15:13.100000
|
||||
CVE-2024-5898,1,1,a383de97f183d5da1095b93fb673284ec976562346d25b45514d64e83363d39b,2024-06-12T17:15:52.577000
|
||||
CVE-2024-5905,1,1,77997da49aa614d8a0b29e43ca0c737b0ef385d8943e3b4311ac9b2cbaa7e5d7,2024-06-12T17:15:52.847000
|
||||
CVE-2024-5906,1,1,8cc560f93bbe808a9ea853048fdaa00c673f479a1d2ddb7b71a9502e5a18ef3d,2024-06-12T17:15:53
|
||||
CVE-2024-5907,1,1,b53d98cdcb442fa876a10088ac4c90e01e6ec348ba1c48bed7649b88fa30b261,2024-06-12T17:15:53.127000
|
||||
CVE-2024-5908,1,1,d9b80954d4874d7eb96578d91cf708f9b239ec2d165443b371c1c3a363fdeeeb,2024-06-12T17:15:53.253000
|
||||
CVE-2024-5909,1,1,44931b98792dc6a4c493e85b21256417760100cc9456bc7c70bd1873ae28f015,2024-06-12T17:15:53.370000
|
||||
CVE-2024-5893,0,1,cd1f2f9d3efdbd0714e6b0dba5c49856728a754e5fed4715d568602a6cc603d6,2024-06-12T19:15:51.630000
|
||||
CVE-2024-5894,0,1,8f7ec1489337d411e2e28ce8b660f7843f4993f287b7fda9e6988c83d775a8d1,2024-06-12T19:15:51.733000
|
||||
CVE-2024-5895,0,1,c8c8d0a698456f581dc50ddcae3df40710f596b434923fc8cb2c1d15b642163e,2024-06-12T18:15:12.850000
|
||||
CVE-2024-5896,0,1,3ba518c4cbe886b53bc075aeb08f6187c1ef789e75ed11113a3676380d8f2841,2024-06-12T19:15:51.847000
|
||||
CVE-2024-5897,0,0,f9281e8cf1c734c32c576230787d605b9edc06b2bbd66417230ea66875c948d1,2024-06-12T16:15:13.100000
|
||||
CVE-2024-5898,0,0,a383de97f183d5da1095b93fb673284ec976562346d25b45514d64e83363d39b,2024-06-12T17:15:52.577000
|
||||
CVE-2024-5905,0,0,77997da49aa614d8a0b29e43ca0c737b0ef385d8943e3b4311ac9b2cbaa7e5d7,2024-06-12T17:15:52.847000
|
||||
CVE-2024-5906,0,0,8cc560f93bbe808a9ea853048fdaa00c673f479a1d2ddb7b71a9502e5a18ef3d,2024-06-12T17:15:53
|
||||
CVE-2024-5907,0,0,b53d98cdcb442fa876a10088ac4c90e01e6ec348ba1c48bed7649b88fa30b261,2024-06-12T17:15:53.127000
|
||||
CVE-2024-5908,0,0,d9b80954d4874d7eb96578d91cf708f9b239ec2d165443b371c1c3a363fdeeeb,2024-06-12T17:15:53.253000
|
||||
CVE-2024-5909,0,0,44931b98792dc6a4c493e85b21256417760100cc9456bc7c70bd1873ae28f015,2024-06-12T17:15:53.370000
|
||||
|
Can't render this file because it is too large.
|
Loading…
x
Reference in New Issue
Block a user