mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-06-21 17:41:05 +00:00
Auto-Update: 2024-07-30T22:00:17.356351+00:00
This commit is contained in:
parent
6d8a9940f5
commit
756c994af3
64
CVE-2023/CVE-2023-339xx/CVE-2023-33976.json
Normal file
64
CVE-2023/CVE-2023-339xx/CVE-2023-33976.json
Normal file
@ -0,0 +1,64 @@
|
||||
{
|
||||
"id": "CVE-2023-33976",
|
||||
"sourceIdentifier": "security-advisories@github.com",
|
||||
"published": "2024-07-30T20:15:03.023",
|
||||
"lastModified": "2024-07-30T20:15:03.023",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "TensorFlow is an end-to-end open source platform for machine learning. `array_ops.upper_bound` causes a segfault when not given a rank 2 tensor. The fix will be included in TensorFlow 2.13 and will also cherrypick this commit on TensorFlow 2.12."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 7.5,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-190"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/tensorflow/tensorflow/commit/6fa05df43b00038b048f4f0e51ef522da6532fec",
|
||||
"source": "security-advisories@github.com"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/tensorflow/tensorflow/commit/915884fdf5df34aaedd00fc6ace33a2cfdefa586",
|
||||
"source": "security-advisories@github.com"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/tensorflow/tensorflow/security/advisories/GHSA-gjh7-xx4r-x345",
|
||||
"source": "security-advisories@github.com"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-26621",
|
||||
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"published": "2024-03-02T22:15:50.340",
|
||||
"lastModified": "2024-07-29T09:15:02.400",
|
||||
"lastModified": "2024-07-30T20:15:03.410",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -101,6 +101,10 @@
|
||||
"url": "http://www.openwall.com/lists/oss-security/2024/07/29/2",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
},
|
||||
{
|
||||
"url": "http://www.openwall.com/lists/oss-security/2024/07/30/2",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/4ef9ad19e17676b9ef071309bc62020e2373705d",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
|
25
CVE-2024/CVE-2024-365xx/CVE-2024-36572.json
Normal file
25
CVE-2024/CVE-2024-365xx/CVE-2024-36572.json
Normal file
@ -0,0 +1,25 @@
|
||||
{
|
||||
"id": "CVE-2024-36572",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-07-30T20:15:03.630",
|
||||
"lastModified": "2024-07-30T20:15:03.630",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Prototype pollution in allpro form-manager 0.7.4 allows attackers to run arbitrary code and cause other impacts via the functions setDefaults, mergeBranch, and Object.setObjectValue."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://gist.github.com/mestrtee/1771ab4fba733ca898b6e2463dc6ed19",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/allpro/form-manager/issues/1",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
21
CVE-2024/CVE-2024-389xx/CVE-2024-38983.json
Normal file
21
CVE-2024/CVE-2024-389xx/CVE-2024-38983.json
Normal file
@ -0,0 +1,21 @@
|
||||
{
|
||||
"id": "CVE-2024-38983",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-07-30T21:15:09.700",
|
||||
"lastModified": "2024-07-30T21:15:09.700",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Prototype Pollution in alykoshin mini-deep-assign v0.0.8 allows an attacker to execute arbitrary code or cause a Denial of Service (DoS) and cause other impacts via the _assign() method at (/lib/index.js:91)"
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://gist.github.com/mestrtee/f82d0c3a8fe3a125f06425caef5d22ed",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
21
CVE-2024/CVE-2024-389xx/CVE-2024-38984.json
Normal file
21
CVE-2024/CVE-2024-389xx/CVE-2024-38984.json
Normal file
@ -0,0 +1,21 @@
|
||||
{
|
||||
"id": "CVE-2024-38984",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-07-30T20:15:03.873",
|
||||
"lastModified": "2024-07-30T20:15:03.873",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Prototype Pollution in lukebond json-override 0.2.0 allows attackers to to execute arbitrary code or cause a Denial of Service (DoS) via the __proto__ property."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://gist.github.com/mestrtee/97a9a7d73fc8b38fcf01322239dd5fb1",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
21
CVE-2024/CVE-2024-389xx/CVE-2024-38986.json
Normal file
21
CVE-2024/CVE-2024-389xx/CVE-2024-38986.json
Normal file
@ -0,0 +1,21 @@
|
||||
{
|
||||
"id": "CVE-2024-38986",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-07-30T20:15:03.990",
|
||||
"lastModified": "2024-07-30T20:15:03.990",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Prototype Pollution in 75lb deep-merge 1.1.1 allows attackers to execute arbitrary code or cause a Denial of Service (DoS) and cause other impacts via merge methods of lodash to merge objects."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://gist.github.com/mestrtee/b20c3aee8bea16e1863933778da6e4cb",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
21
CVE-2024/CVE-2024-390xx/CVE-2024-39010.json
Normal file
21
CVE-2024/CVE-2024-390xx/CVE-2024-39010.json
Normal file
@ -0,0 +1,21 @@
|
||||
{
|
||||
"id": "CVE-2024-39010",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-07-30T20:15:04.103",
|
||||
"lastModified": "2024-07-30T20:15:04.103",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "chase-moskal snapstate v0.0.9 was discovered to contain a prototype pollution via the function attemptNestedProperty. This vulnerability allows attackers to execute arbitrary code or cause a Denial of Service (DoS) via injecting arbitrary properties."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://gist.github.com/mestrtee/af7a746df91ab5e944bd7a186816c262",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
21
CVE-2024/CVE-2024-390xx/CVE-2024-39011.json
Normal file
21
CVE-2024/CVE-2024-390xx/CVE-2024-39011.json
Normal file
@ -0,0 +1,21 @@
|
||||
{
|
||||
"id": "CVE-2024-39011",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-07-30T20:15:04.203",
|
||||
"lastModified": "2024-07-30T20:15:04.203",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Prototype Pollution in chargeover redoc v2.0.9-rc.69 allows attackers to execute arbitrary code or cause a Denial of Service (DoS) and cause other impacts via the function mergeObjects."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://gist.github.com/mestrtee/693ef1c8b0a5ff1ae19f253381711f3e",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
21
CVE-2024/CVE-2024-390xx/CVE-2024-39012.json
Normal file
21
CVE-2024/CVE-2024-390xx/CVE-2024-39012.json
Normal file
@ -0,0 +1,21 @@
|
||||
{
|
||||
"id": "CVE-2024-39012",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-07-30T20:15:04.307",
|
||||
"lastModified": "2024-07-30T20:15:04.307",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "ais-ltd strategyen v0.4.0 was discovered to contain a prototype pollution via the function mergeObjects. This vulnerability allows attackers to execute arbitrary code or cause a Denial of Service (DoS) via injecting arbitrary properties."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://gist.github.com/mestrtee/acfbd724a4b73bfb5d030575b653453c",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,13 +2,13 @@
|
||||
"id": "CVE-2024-41110",
|
||||
"sourceIdentifier": "security-advisories@github.com",
|
||||
"published": "2024-07-24T17:15:11.053",
|
||||
"lastModified": "2024-07-25T12:36:39.947",
|
||||
"lastModified": "2024-07-30T20:15:04.567",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Moby is an open-source project created by Docker for software containerization. A security vulnerability has been detected in certain versions of Docker Engine, which could allow an attacker to bypass authorization plugins (AuthZ) under specific circumstances. The base likelihood of this being exploited is low.\n\nUsing a specially-crafted API request, an Engine API client could make the daemon forward the request or response to an authorization plugin without the body. In certain circumstances, the authorization plugin may allow a request which it would have otherwise denied if the body had been forwarded to it.\n\nA security issue was discovered In 2018, where an attacker could bypass AuthZ plugins using a specially crafted API request. This could lead to unauthorized actions, including privilege escalation. Although this issue was fixed in Docker Engine v18.09.1 in January 2019, the fix was not carried forward to later major versions, resulting in a regression. Anyone who depends on authorization plugins that introspect the request and/or response body to make access control decisions is potentially impacted.\n\nDocker EE v19.03.x and all versions of Mirantis Container Runtime are not vulnerable.\n\ndocker-ce v27.1.1 containes patches to fix the vulnerability. Patches have also been merged into the master, 19.0, 20.0, 23.0, 24.0, 25.0, 26.0, and 26.1 release branches. If one is unable to upgrade immediately, avoid using AuthZ plugins and/or restrict access to the Docker API to trusted parties, following the principle of least privilege."
|
||||
"value": "Moby is an open-source project created by Docker for software containerization. A security vulnerability has been detected in certain versions of Docker Engine, which could allow an attacker to bypass authorization plugins (AuthZ) under specific circumstances. The base likelihood of this being exploited is low.\n\nUsing a specially-crafted API request, an Engine API client could make the daemon forward the request or response to an authorization plugin without the body. In certain circumstances, the authorization plugin may allow a request which it would have otherwise denied if the body had been forwarded to it.\n\nA security issue was discovered In 2018, where an attacker could bypass AuthZ plugins using a specially crafted API request. This could lead to unauthorized actions, including privilege escalation. Although this issue was fixed in Docker Engine v18.09.1 in January 2019, the fix was not carried forward to later major versions, resulting in a regression. Anyone who depends on authorization plugins that introspect the request and/or response body to make access control decisions is potentially impacted.\n\nDocker EE v19.03.x and all versions of Mirantis Container Runtime are not vulnerable.\n\ndocker-ce v27.1.1 containes patches to fix the vulnerability. Patches have also been merged into the master, 19.03, 20.0, 23.0, 24.0, 25.0, 26.0, and 26.1 release branches. If one is unable to upgrade immediately, avoid using AuthZ plugins and/or restrict access to the Docker API to trusted parties, following the principle of least privilege."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
|
25
CVE-2024/CVE-2024-416xx/CVE-2024-41610.json
Normal file
25
CVE-2024/CVE-2024-416xx/CVE-2024-41610.json
Normal file
@ -0,0 +1,25 @@
|
||||
{
|
||||
"id": "CVE-2024-41610",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-07-30T20:15:04.713",
|
||||
"lastModified": "2024-07-30T20:15:04.713",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "D-Link DIR-820LW REVB FIRMWARE PATCH 2.03.B01_TC contains hardcoded credentials in the Telnet service, enabling attackers to log in remotely to the Telnet service and perform arbitrary commands."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/Nop3z/CVE/blob/main/dlink/dir-820/Dlink-820LW-hardcoded-vulnerability.md",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://www.dlink.com/en/security-bulletin/",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
25
CVE-2024/CVE-2024-416xx/CVE-2024-41611.json
Normal file
25
CVE-2024/CVE-2024-416xx/CVE-2024-41611.json
Normal file
@ -0,0 +1,25 @@
|
||||
{
|
||||
"id": "CVE-2024-41611",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-07-30T20:15:04.810",
|
||||
"lastModified": "2024-07-30T20:15:04.810",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "In D-Link DIR-860L REVA FIRMWARE PATCH 1.10..B04, the Telnet service contains hardcoded credentials, enabling attackers to log in remotely to the Telnet service and perform arbitrary commands."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/Nop3z/CVE/blob/main/dlink/dir-820/Dlink-860L-hardcoded-vulnerability.md",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://www.dlink.com/en/security-bulletin/",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-41705",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-07-25T08:15:02.467",
|
||||
"lastModified": "2024-07-25T12:36:39.947",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2024-07-30T20:33:08.920",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -17,6 +17,26 @@
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 5.4,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.3,
|
||||
"impactScore": 2.7
|
||||
},
|
||||
{
|
||||
"source": "cve@mitre.org",
|
||||
"type": "Secondary",
|
||||
@ -39,14 +59,64 @@
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:archerirm:archer:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "6.13.0.4",
|
||||
"matchCriteriaId": "B1A5E015-893F-4D88-BD9F-9594084CB070"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:archerirm:archer:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "6.14.0",
|
||||
"versionEndExcluding": "6.14.0.4",
|
||||
"matchCriteriaId": "B8CB20A1-1171-4B22-A874-F1B83F1FD92D"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:archerirm:archer:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "2024.03",
|
||||
"versionEndExcluding": "2024.06",
|
||||
"matchCriteriaId": "46F0DC44-40B8-44B4-BEE0-C731300E6603"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.archerirm.community/t5/platform-announcements/announcing-archer-platform-release-2024-06/ta-p/722094",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Release Notes"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://www.archerirm.community/t5/platform-announcements/archer-update-for-multiple-vulnerabilities/ta-p/739717",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-41706",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-07-25T08:15:02.783",
|
||||
"lastModified": "2024-07-25T12:36:39.947",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2024-07-30T20:32:18.270",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -17,6 +17,26 @@
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 5.4,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.3,
|
||||
"impactScore": 2.7
|
||||
},
|
||||
{
|
||||
"source": "cve@mitre.org",
|
||||
"type": "Secondary",
|
||||
@ -39,14 +59,57 @@
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:archerirm:archer:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "6.14.0.4",
|
||||
"matchCriteriaId": "41B53D34-0522-468F-B846-5EF03B16C3C7"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:archerirm:archer:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "2024.03",
|
||||
"versionEndExcluding": "2024.06",
|
||||
"matchCriteriaId": "46F0DC44-40B8-44B4-BEE0-C731300E6603"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.archerirm.community/t5/platform-announcements/announcing-archer-platform-release-2024-06/ta-p/722094",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Release Notes"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://www.archerirm.community/t5/platform-announcements/archer-update-for-multiple-vulnerabilities/ta-p/739717",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-41707",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-07-25T08:15:02.980",
|
||||
"lastModified": "2024-07-25T12:36:39.947",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2024-07-30T20:31:59.030",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -17,6 +17,26 @@
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 5.4,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.3,
|
||||
"impactScore": 2.7
|
||||
},
|
||||
{
|
||||
"source": "cve@mitre.org",
|
||||
"type": "Secondary",
|
||||
@ -39,14 +59,50 @@
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:archerirm:archer:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "2024.06",
|
||||
"matchCriteriaId": "5B7BD033-561E-4C90-AC02-5283F442E2B3"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.archerirm.community/t5/platform-announcements/announcing-archer-platform-release-2024-06/ta-p/722094",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Release Notes"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://www.archerirm.community/t5/platform-announcements/archer-update-for-multiple-vulnerabilities/ta-p/739717",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
56
CVE-2024/CVE-2024-419xx/CVE-2024-41945.json
Normal file
56
CVE-2024/CVE-2024-419xx/CVE-2024-41945.json
Normal file
@ -0,0 +1,56 @@
|
||||
{
|
||||
"id": "CVE-2024-41945",
|
||||
"sourceIdentifier": "security-advisories@github.com",
|
||||
"published": "2024-07-30T20:15:04.930",
|
||||
"lastModified": "2024-07-30T20:15:04.930",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "fuels-ts is a library for interacting with Fuel v2. The typescript SDK has no awareness of to-be-spent transactions causing some transactions to fail or silently get pruned as they are funded with already used UTXOs. The problem occurs, because the `fund` function in `fuels-ts/packages/account/src/account.ts` gets the needed ressources statelessly with the function `getResourcesToSpend` without taking into consideration already used UTXOs. This issue will lead to unexpected SDK behaviour, such as a transaction not getting included in the `txpool` / in a block or a previous transaction silently getting removed from the `txpool` and replaced with a new one."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "HIGH",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 3.1,
|
||||
"baseSeverity": "LOW"
|
||||
},
|
||||
"exploitabilityScore": 1.6,
|
||||
"impactScore": 1.4
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-20"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/FuelLabs/fuels-ts/security/advisories/GHSA-3jcg-vx7f-j6qf",
|
||||
"source": "security-advisories@github.com"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-42225",
|
||||
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"published": "2024-07-30T08:15:07.747",
|
||||
"lastModified": "2024-07-30T13:32:45.943",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-07-30T20:15:19.600",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -15,27 +15,116 @@
|
||||
"value": " En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: wifi: mt76: reemplace skb_put con skb_put_zero Evite potencialmente reutilizar datos no inicializados"
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "ADJACENT_NETWORK",
|
||||
"attackComplexity": "HIGH",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 7.5,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 1.6,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-908"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "5.15.163",
|
||||
"matchCriteriaId": "EC9441D7-E601-4251-998B-709AF20062BE"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "5.16",
|
||||
"versionEndExcluding": "6.1.98",
|
||||
"matchCriteriaId": "E09E92A5-27EF-40E4-926A-B1CDC8270551"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "6.2",
|
||||
"versionEndExcluding": "6.6.39",
|
||||
"matchCriteriaId": "29E894E4-668F-4DB0-81F7-4FB5F698E970"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "6.7",
|
||||
"versionEndExcluding": "6.9.9",
|
||||
"matchCriteriaId": "ADCC1407-0CB3-4C8F-B4C5-07F682CD7085"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/22ea2a7f0b64d323625950414a4496520fb33657",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/64f86337ccfe77fe3be5a9356b0dabde23fbb074",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/7f819a2f4fbc510e088b49c79addcf1734503578",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/dc7f14d00d0c4c21898f3504607f4a31079065a2",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/ff6b26be13032c5fbd6b6a0b24358f8eaac4f3af",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-42226",
|
||||
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"published": "2024-07-30T08:15:07.817",
|
||||
"lastModified": "2024-07-30T13:32:45.943",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-07-30T20:12:08.160",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -15,31 +15,116 @@
|
||||
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: usb: xhci: evita posibles fallos en handle_tx_event() para eventos de transferencia sin TRB Algunos eventos de transferencia no siempre apuntan a un TRB y, en consecuencia, no tienen un anillo de endpoint. En estos casos, la funci\u00f3n handle_tx_event() no debe continuar, porque si se establece 'ep->skip', se utiliza el puntero al anillo del endpoint. Para evitar una posible falla y hacer que el c\u00f3digo sea l\u00f3gico, regrese despu\u00e9s de verificar el c\u00f3digo de finalizaci\u00f3n para un evento de Transferencia sin TRB."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
|
||||
"attackVector": "PHYSICAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 4.6,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 0.9,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-476"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "6.1.98",
|
||||
"matchCriteriaId": "59AC0B46-8C0D-4C0B-9705-C8CFF0DCAD00"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "6.1.99",
|
||||
"versionEndExcluding": "6.6.39",
|
||||
"matchCriteriaId": "A6DFF463-7F88-4F38-B6E6-F218C9E3698A"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "6.6.40",
|
||||
"versionEndExcluding": "6.9.9",
|
||||
"matchCriteriaId": "03052A88-0586-4BB7-B47F-B626DBC304CA"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/1f4a10cb826fdec5cd442df010bcb3043bfd6464",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Not Applicable"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/66cb618bf0bb82859875b00eeffaf223557cb416",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/69bed24c82139bbad0a78a075e1834a2ea7bd064",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Not Applicable"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/948554f1bb16e15b90006c109c3a558c66d4c4ac",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/9a24eb8010c2dc6a2eba56e3eb9fc07d14ffe00a",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/c0ee01e8ba19ff7edc98f68a114d4789faa219b9",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-42227",
|
||||
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"published": "2024-07-30T08:15:07.890",
|
||||
"lastModified": "2024-07-30T13:32:45.943",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-07-30T20:15:03.963",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -15,15 +15,74 @@
|
||||
"value": " En el kernel de Linux, se resolvi\u00f3 la siguiente vulnerabilidad: drm/amd/display: corrigi\u00f3 la copia superpuesta dentro de dml_core_mode_programming [POR QU\u00c9] &mode_lib->mp.Watermark y &locals->Watermark tienen la misma direcci\u00f3n. memcpy puede provocar un comportamiento inesperado. [C\u00d3MO] se debe utilizar memmove."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "HIGH",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 4.7,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 1.0,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "NVD-CWE-Other"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "6.9.9",
|
||||
"matchCriteriaId": "EDD11F94-D8F3-477D-931C-7806D6E5D6D3"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/9342da15f2491d8600eca89c8e0da08876fb969b",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/f1fd8a0a54e6d23a6d16ee29159f247862460fd1",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-42228",
|
||||
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"published": "2024-07-30T08:15:07.960",
|
||||
"lastModified": "2024-07-30T13:32:45.943",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-07-30T20:12:16.913",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -15,19 +15,88 @@
|
||||
"value": " En el kernel de Linux, se resolvi\u00f3 la siguiente vulnerabilidad: drm/amdgpu: uso del valor no inicializado *size al llamar a amdgpu_vce_cs_reloc Inicialice el tama\u00f1o antes de llamar a amdgpu_vce_cs_reloc, como en el caso 0x03000001. V2: Para mejorar realmente el manejo, necesitar\u00edamos tener un valor separado de 0xffffffff. (Christian)"
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "HIGH",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 7.0,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 1.0,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-908"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "6.6.39",
|
||||
"matchCriteriaId": "AFFE1388-D45B-4287-88F7-BBA975D80E4C"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "6.7",
|
||||
"versionEndExcluding": "6.9.9",
|
||||
"matchCriteriaId": "ADCC1407-0CB3-4C8F-B4C5-07F682CD7085"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/855ae72c20310e5402b2317fc537d911e87537ef",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/88a9a467c548d0b3c7761b4fd54a68e70f9c0944",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/f8f120b3de48b8b6bdf8988a9b334c2d61c17440",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-5664",
|
||||
"sourceIdentifier": "security@wordfence.com",
|
||||
"published": "2024-07-10T08:15:11.507",
|
||||
"lastModified": "2024-07-11T13:05:54.930",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2024-07-30T21:00:44.357",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -17,6 +17,26 @@
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 5.4,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.3,
|
||||
"impactScore": 2.7
|
||||
},
|
||||
{
|
||||
"source": "security@wordfence.com",
|
||||
"type": "Secondary",
|
||||
@ -39,22 +59,64 @@
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:sonaar:mp3_audio_player_for_music\\,_radio_\\&_podcast:*:*:*:*:*:wordpress:*:*",
|
||||
"versionEndExcluding": "5.6",
|
||||
"matchCriteriaId": "0CC809F4-0904-4C87-AFDF-8C5C0C2657E0"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/browser/mp3-music-player-by-sonaar/tags/5.4.0.2/includes/class-sonaar-music-widget.php#L1853",
|
||||
"source": "security@wordfence.com"
|
||||
"source": "security@wordfence.com",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/changeset/3115110/mp3-music-player-by-sonaar/trunk/includes/class-sonaar-music-widget.php",
|
||||
"source": "security@wordfence.com"
|
||||
"source": "security@wordfence.com",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://wordpress.org/plugins/mp3-music-player-by-sonaar/#developers",
|
||||
"source": "security@wordfence.com"
|
||||
"source": "security@wordfence.com",
|
||||
"tags": [
|
||||
"Product"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/c14783d3-68de-49c6-9c54-eb7fc4a7bf94?source=cve",
|
||||
"source": "security@wordfence.com"
|
||||
"source": "security@wordfence.com",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
64
CVE-2024/CVE-2024-59xx/CVE-2024-5901.json
Normal file
64
CVE-2024/CVE-2024-59xx/CVE-2024-5901.json
Normal file
@ -0,0 +1,64 @@
|
||||
{
|
||||
"id": "CVE-2024-5901",
|
||||
"sourceIdentifier": "security@wordfence.com",
|
||||
"published": "2024-07-30T21:15:09.863",
|
||||
"lastModified": "2024-07-30T21:15:09.863",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "The SiteOrigin Widgets Bundle plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the Image Grid widget in all versions up to, and including, 1.62.2 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security@wordfence.com",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 6.4,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 3.1,
|
||||
"impactScore": 2.7
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security@wordfence.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/browser/so-widgets-bundle/tags/1.62.0/widgets/image-grid/image-grid.php#L282",
|
||||
"source": "security@wordfence.com"
|
||||
},
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/browser/so-widgets-bundle/tags/1.62.0/widgets/image-grid/tpl/default.php#L28",
|
||||
"source": "security@wordfence.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/0045c5a4-0807-4e89-8639-0802e54ce6ab?source=cve",
|
||||
"source": "security@wordfence.com"
|
||||
}
|
||||
]
|
||||
}
|
137
CVE-2024/CVE-2024-72xx/CVE-2024-7273.json
Normal file
137
CVE-2024/CVE-2024-72xx/CVE-2024-7273.json
Normal file
@ -0,0 +1,137 @@
|
||||
{
|
||||
"id": "CVE-2024-7273",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2024-07-30T21:15:10.110",
|
||||
"lastModified": "2024-07-30T21:15:10.110",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A vulnerability classified as critical was found in itsourcecode Alton Management System 1.0. This vulnerability affects unknown code of the file search.php. The manipulation of the argument rcode leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. VDB-273142 is the identifier assigned to this vulnerability."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV40": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "4.0",
|
||||
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"attackRequirements": "NONE",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"vulnerableSystemConfidentiality": "LOW",
|
||||
"vulnerableSystemIntegrity": "LOW",
|
||||
"vulnerableSystemAvailability": "LOW",
|
||||
"subsequentSystemConfidentiality": "NONE",
|
||||
"subsequentSystemIntegrity": "NONE",
|
||||
"subsequentSystemAvailability": "NONE",
|
||||
"exploitMaturity": "NOT_DEFINED",
|
||||
"confidentialityRequirements": "NOT_DEFINED",
|
||||
"integrityRequirements": "NOT_DEFINED",
|
||||
"availabilityRequirements": "NOT_DEFINED",
|
||||
"modifiedAttackVector": "NOT_DEFINED",
|
||||
"modifiedAttackComplexity": "NOT_DEFINED",
|
||||
"modifiedAttackRequirements": "NOT_DEFINED",
|
||||
"modifiedPrivilegesRequired": "NOT_DEFINED",
|
||||
"modifiedUserInteraction": "NOT_DEFINED",
|
||||
"modifiedVulnerableSystemConfidentiality": "NOT_DEFINED",
|
||||
"modifiedVulnerableSystemIntegrity": "NOT_DEFINED",
|
||||
"modifiedVulnerableSystemAvailability": "NOT_DEFINED",
|
||||
"modifiedSubsequentSystemConfidentiality": "NOT_DEFINED",
|
||||
"modifiedSubsequentSystemIntegrity": "NOT_DEFINED",
|
||||
"modifiedSubsequentSystemAvailability": "NOT_DEFINED",
|
||||
"safety": "NOT_DEFINED",
|
||||
"automatable": "NOT_DEFINED",
|
||||
"recovery": "NOT_DEFINED",
|
||||
"valueDensity": "NOT_DEFINED",
|
||||
"vulnerabilityResponseEffort": "NOT_DEFINED",
|
||||
"providerUrgency": "NOT_DEFINED",
|
||||
"baseScore": 5.3,
|
||||
"baseSeverity": "MEDIUM"
|
||||
}
|
||||
}
|
||||
],
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "LOW",
|
||||
"baseScore": 6.3,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 3.4
|
||||
}
|
||||
],
|
||||
"cvssMetricV2": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "2.0",
|
||||
"vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P",
|
||||
"accessVector": "NETWORK",
|
||||
"accessComplexity": "LOW",
|
||||
"authentication": "SINGLE",
|
||||
"confidentialityImpact": "PARTIAL",
|
||||
"integrityImpact": "PARTIAL",
|
||||
"availabilityImpact": "PARTIAL",
|
||||
"baseScore": 6.5
|
||||
},
|
||||
"baseSeverity": "MEDIUM",
|
||||
"exploitabilityScore": 8.0,
|
||||
"impactScore": 6.4,
|
||||
"acInsufInfo": false,
|
||||
"obtainAllPrivilege": false,
|
||||
"obtainUserPrivilege": false,
|
||||
"obtainOtherPrivilege": false,
|
||||
"userInteractionRequired": false
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-89"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/DeepMountains/Mirage/blob/main/CVE8-1.md",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.273142",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.273142",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?submit.381089",
|
||||
"source": "cna@vuldb.com"
|
||||
}
|
||||
]
|
||||
}
|
69
README.md
69
README.md
@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours.
|
||||
### Last Repository Update
|
||||
|
||||
```plain
|
||||
2024-07-30T20:00:17.489950+00:00
|
||||
2024-07-30T22:00:17.356351+00:00
|
||||
```
|
||||
|
||||
### Most recent CVE Modification Timestamp synchronized with NVD
|
||||
|
||||
```plain
|
||||
2024-07-30T19:46:56.943000+00:00
|
||||
2024-07-30T21:15:10.110000+00:00
|
||||
```
|
||||
|
||||
### Last Data Feed Release
|
||||
@ -33,55 +33,42 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
|
||||
### Total Number of included CVEs
|
||||
|
||||
```plain
|
||||
258566
|
||||
258579
|
||||
```
|
||||
|
||||
### CVEs added in the last Commit
|
||||
|
||||
Recently added CVEs: `11`
|
||||
Recently added CVEs: `13`
|
||||
|
||||
- [CVE-2024-3930](CVE-2024/CVE-2024-39xx/CVE-2024-3930.json) (`2024-07-30T19:15:10.573`)
|
||||
- [CVE-2024-41304](CVE-2024/CVE-2024-413xx/CVE-2024-41304.json) (`2024-07-30T18:15:05.817`)
|
||||
- [CVE-2024-41305](CVE-2024/CVE-2024-413xx/CVE-2024-41305.json) (`2024-07-30T18:15:05.910`)
|
||||
- [CVE-2024-41437](CVE-2024/CVE-2024-414xx/CVE-2024-41437.json) (`2024-07-30T19:15:10.933`)
|
||||
- [CVE-2024-41438](CVE-2024/CVE-2024-414xx/CVE-2024-41438.json) (`2024-07-30T19:15:11.027`)
|
||||
- [CVE-2024-41439](CVE-2024/CVE-2024-414xx/CVE-2024-41439.json) (`2024-07-30T19:15:11.123`)
|
||||
- [CVE-2024-41440](CVE-2024/CVE-2024-414xx/CVE-2024-41440.json) (`2024-07-30T19:15:11.210`)
|
||||
- [CVE-2024-41443](CVE-2024/CVE-2024-414xx/CVE-2024-41443.json) (`2024-07-30T19:15:11.300`)
|
||||
- [CVE-2024-41943](CVE-2024/CVE-2024-419xx/CVE-2024-41943.json) (`2024-07-30T18:15:06.037`)
|
||||
- [CVE-2024-5249](CVE-2024/CVE-2024-52xx/CVE-2024-5249.json) (`2024-07-30T19:15:11.400`)
|
||||
- [CVE-2024-5250](CVE-2024/CVE-2024-52xx/CVE-2024-5250.json) (`2024-07-30T19:15:11.613`)
|
||||
- [CVE-2023-33976](CVE-2023/CVE-2023-339xx/CVE-2023-33976.json) (`2024-07-30T20:15:03.023`)
|
||||
- [CVE-2024-36572](CVE-2024/CVE-2024-365xx/CVE-2024-36572.json) (`2024-07-30T20:15:03.630`)
|
||||
- [CVE-2024-38983](CVE-2024/CVE-2024-389xx/CVE-2024-38983.json) (`2024-07-30T21:15:09.700`)
|
||||
- [CVE-2024-38984](CVE-2024/CVE-2024-389xx/CVE-2024-38984.json) (`2024-07-30T20:15:03.873`)
|
||||
- [CVE-2024-38986](CVE-2024/CVE-2024-389xx/CVE-2024-38986.json) (`2024-07-30T20:15:03.990`)
|
||||
- [CVE-2024-39010](CVE-2024/CVE-2024-390xx/CVE-2024-39010.json) (`2024-07-30T20:15:04.103`)
|
||||
- [CVE-2024-39011](CVE-2024/CVE-2024-390xx/CVE-2024-39011.json) (`2024-07-30T20:15:04.203`)
|
||||
- [CVE-2024-39012](CVE-2024/CVE-2024-390xx/CVE-2024-39012.json) (`2024-07-30T20:15:04.307`)
|
||||
- [CVE-2024-41610](CVE-2024/CVE-2024-416xx/CVE-2024-41610.json) (`2024-07-30T20:15:04.713`)
|
||||
- [CVE-2024-41611](CVE-2024/CVE-2024-416xx/CVE-2024-41611.json) (`2024-07-30T20:15:04.810`)
|
||||
- [CVE-2024-41945](CVE-2024/CVE-2024-419xx/CVE-2024-41945.json) (`2024-07-30T20:15:04.930`)
|
||||
- [CVE-2024-5901](CVE-2024/CVE-2024-59xx/CVE-2024-5901.json) (`2024-07-30T21:15:09.863`)
|
||||
- [CVE-2024-7273](CVE-2024/CVE-2024-72xx/CVE-2024-7273.json) (`2024-07-30T21:15:10.110`)
|
||||
|
||||
|
||||
### CVEs modified in the last Commit
|
||||
|
||||
Recently modified CVEs: `25`
|
||||
Recently modified CVEs: `10`
|
||||
|
||||
- [CVE-2024-3246](CVE-2024/CVE-2024-32xx/CVE-2024-3246.json) (`2024-07-30T19:03:01.433`)
|
||||
- [CVE-2024-40767](CVE-2024/CVE-2024-407xx/CVE-2024-40767.json) (`2024-07-30T19:19:40.767`)
|
||||
- [CVE-2024-42064](CVE-2024/CVE-2024-420xx/CVE-2024-42064.json) (`2024-07-30T19:03:25.797`)
|
||||
- [CVE-2024-42065](CVE-2024/CVE-2024-420xx/CVE-2024-42065.json) (`2024-07-30T19:02:59.217`)
|
||||
- [CVE-2024-42066](CVE-2024/CVE-2024-420xx/CVE-2024-42066.json) (`2024-07-30T19:02:32.857`)
|
||||
- [CVE-2024-42067](CVE-2024/CVE-2024-420xx/CVE-2024-42067.json) (`2024-07-30T19:02:20.687`)
|
||||
- [CVE-2024-42068](CVE-2024/CVE-2024-420xx/CVE-2024-42068.json) (`2024-07-30T19:02:12.100`)
|
||||
- [CVE-2024-42069](CVE-2024/CVE-2024-420xx/CVE-2024-42069.json) (`2024-07-30T19:01:58.623`)
|
||||
- [CVE-2024-42070](CVE-2024/CVE-2024-420xx/CVE-2024-42070.json) (`2024-07-30T19:01:47.300`)
|
||||
- [CVE-2024-42071](CVE-2024/CVE-2024-420xx/CVE-2024-42071.json) (`2024-07-30T19:01:26.950`)
|
||||
- [CVE-2024-42072](CVE-2024/CVE-2024-420xx/CVE-2024-42072.json) (`2024-07-30T19:01:12.833`)
|
||||
- [CVE-2024-42073](CVE-2024/CVE-2024-420xx/CVE-2024-42073.json) (`2024-07-30T19:00:52.667`)
|
||||
- [CVE-2024-42074](CVE-2024/CVE-2024-420xx/CVE-2024-42074.json) (`2024-07-30T19:00:33.493`)
|
||||
- [CVE-2024-42075](CVE-2024/CVE-2024-420xx/CVE-2024-42075.json) (`2024-07-30T19:00:26.477`)
|
||||
- [CVE-2024-42076](CVE-2024/CVE-2024-420xx/CVE-2024-42076.json) (`2024-07-30T19:00:17.847`)
|
||||
- [CVE-2024-42077](CVE-2024/CVE-2024-420xx/CVE-2024-42077.json) (`2024-07-30T18:59:53.480`)
|
||||
- [CVE-2024-42078](CVE-2024/CVE-2024-420xx/CVE-2024-42078.json) (`2024-07-30T18:58:41.253`)
|
||||
- [CVE-2024-42079](CVE-2024/CVE-2024-420xx/CVE-2024-42079.json) (`2024-07-30T18:58:08.977`)
|
||||
- [CVE-2024-42080](CVE-2024/CVE-2024-420xx/CVE-2024-42080.json) (`2024-07-30T18:57:58.493`)
|
||||
- [CVE-2024-42081](CVE-2024/CVE-2024-420xx/CVE-2024-42081.json) (`2024-07-30T18:57:21.440`)
|
||||
- [CVE-2024-42082](CVE-2024/CVE-2024-420xx/CVE-2024-42082.json) (`2024-07-30T19:04:15.837`)
|
||||
- [CVE-2024-42083](CVE-2024/CVE-2024-420xx/CVE-2024-42083.json) (`2024-07-30T19:03:40.337`)
|
||||
- [CVE-2024-42229](CVE-2024/CVE-2024-422xx/CVE-2024-42229.json) (`2024-07-30T19:46:56.943`)
|
||||
- [CVE-2024-42230](CVE-2024/CVE-2024-422xx/CVE-2024-42230.json) (`2024-07-30T19:32:51.137`)
|
||||
- [CVE-2024-42231](CVE-2024/CVE-2024-422xx/CVE-2024-42231.json) (`2024-07-30T19:30:52.427`)
|
||||
- [CVE-2024-26621](CVE-2024/CVE-2024-266xx/CVE-2024-26621.json) (`2024-07-30T20:15:03.410`)
|
||||
- [CVE-2024-41110](CVE-2024/CVE-2024-411xx/CVE-2024-41110.json) (`2024-07-30T20:15:04.567`)
|
||||
- [CVE-2024-41705](CVE-2024/CVE-2024-417xx/CVE-2024-41705.json) (`2024-07-30T20:33:08.920`)
|
||||
- [CVE-2024-41706](CVE-2024/CVE-2024-417xx/CVE-2024-41706.json) (`2024-07-30T20:32:18.270`)
|
||||
- [CVE-2024-41707](CVE-2024/CVE-2024-417xx/CVE-2024-41707.json) (`2024-07-30T20:31:59.030`)
|
||||
- [CVE-2024-42225](CVE-2024/CVE-2024-422xx/CVE-2024-42225.json) (`2024-07-30T20:15:19.600`)
|
||||
- [CVE-2024-42226](CVE-2024/CVE-2024-422xx/CVE-2024-42226.json) (`2024-07-30T20:12:08.160`)
|
||||
- [CVE-2024-42227](CVE-2024/CVE-2024-422xx/CVE-2024-42227.json) (`2024-07-30T20:15:03.963`)
|
||||
- [CVE-2024-42228](CVE-2024/CVE-2024-422xx/CVE-2024-42228.json) (`2024-07-30T20:12:16.913`)
|
||||
- [CVE-2024-5664](CVE-2024/CVE-2024-56xx/CVE-2024-5664.json) (`2024-07-30T21:00:44.357`)
|
||||
|
||||
|
||||
## Download and Usage
|
||||
|
105
_state.csv
105
_state.csv
@ -225483,6 +225483,7 @@ CVE-2023-33972,0,0,6658f984811e387bddcf22029a50eb9a9e13a81749815c23242b688915779
|
||||
CVE-2023-33973,0,0,2162a3e64888e18aeea8c4550a40a4f3771d69a0e5c0dfc55abd6bb60c436d29,2023-06-06T16:35:11.990000
|
||||
CVE-2023-33974,0,0,b2abfab98d759e81889a365940a5ec69c0704df2dfcf5b244d3e2dcda8bf00ab,2023-06-06T14:57:41.787000
|
||||
CVE-2023-33975,0,0,db3531e208d924a4248560a175e2c14f14aed4ab6edfce257dc16a3219bb896f,2023-06-07T19:35:51.893000
|
||||
CVE-2023-33976,1,1,770b46642532f526a0f67d7b32166efd0f93bec51b73fa5a5a9249040e2db187,2024-07-30T20:15:03.023000
|
||||
CVE-2023-33977,0,0,1943b3e2aec5399b155edba0e070e007c31d781f63d29296475af25248b25001,2023-06-14T03:42:23.403000
|
||||
CVE-2023-33979,0,0,b3c71b05446611c3f6b5f418de7141047c9715f4d554da0a283a7a2047888dfa,2023-06-08T13:41:28.850000
|
||||
CVE-2023-3398,0,0,ec20545e113f7172d69075d3cf2dd66592a21d61773b55b9df3a468579d3156d,2023-06-30T13:01:21.363000
|
||||
@ -246953,7 +246954,7 @@ CVE-2024-26618,0,0,60b49f9e86fa8f37acfeac63f8f4575f9654dbd2ab502c8b6c5996ed00c24
|
||||
CVE-2024-26619,0,0,3a172888bab0a927d52b4fdd413d891b072fc341af639a3741034834064d6310,2024-03-12T12:40:13.500000
|
||||
CVE-2024-2662,0,0,a2a94c73f74aa4424a4c3682e7ac78c6136565b797b4f728bf1a976cab864da5,2024-05-14T16:13:02.773000
|
||||
CVE-2024-26620,0,0,65e5941945418b21a4c03b7b48584bf25732d23092fb7ebb20991b07ac64fe5a,2024-03-12T12:40:13.500000
|
||||
CVE-2024-26621,0,0,86dd105998222d554e0d89a99385ede99614096aaab551dd47af98d6befbdb87,2024-07-29T09:15:02.400000
|
||||
CVE-2024-26621,0,1,3feab2e92c3f74675f5ee2c5bc9c02f98529e15fee5ddc3ba84c0edeae9413c4,2024-07-30T20:15:03.410000
|
||||
CVE-2024-26622,0,0,4cd7d655a251310c444f077e2df4271fb89c449a25650c0bd38a0c088f0ade16,2024-06-25T22:15:19.240000
|
||||
CVE-2024-26623,0,0,072badb03b6dfd11f30eaa3dc91549de4bb838c1b1cb59508b9c081211145520,2024-03-06T15:18:08.093000
|
||||
CVE-2024-26624,0,0,dfec722c86cb19deabe85be0fdccacdcf71bc34ee8cead4ebe6ca2d88e75d73c,2024-03-27T14:15:10.163000
|
||||
@ -251061,7 +251062,7 @@ CVE-2024-32456,0,0,d14077b9c0d3fd624bb090c8902408112668af5dcd1ec1392b17398cab655
|
||||
CVE-2024-32457,0,0,e19d3294c5bd0f5932cb781ff1a6aaf0ad9675f665e5d230b25da52c6eb0ab24,2024-04-17T12:48:07.510000
|
||||
CVE-2024-32458,0,0,61e534ffc05a2fd1f0c764d7b2f3b2dc812bdfe09bd360efea2bba78b4568568,2024-06-10T18:15:32.790000
|
||||
CVE-2024-32459,0,0,565c2820f9f40b3ae7ac4380cb45711f29b0c6684b22418bec49fb00db4f3c9e,2024-06-10T18:15:32.940000
|
||||
CVE-2024-3246,0,1,5e51d525244a378c87fc93ad78d7e53820315c4e55f1a9812675c8988463f0b2,2024-07-30T19:03:01.433000
|
||||
CVE-2024-3246,0,0,5e51d525244a378c87fc93ad78d7e53820315c4e55f1a9812675c8988463f0b2,2024-07-30T19:03:01.433000
|
||||
CVE-2024-32460,0,0,791d6f5eece9c40a7a8e9bf5719f0d21a50aef5a23765ed0735f0298c727e1a8,2024-06-10T18:15:33.033000
|
||||
CVE-2024-32461,0,0,7a7784b51f232219ca425c17e34b523d7eced76a74e448dd98d2af59b52810da,2024-04-23T12:52:26.253000
|
||||
CVE-2024-32462,0,0,3d3d05bcc9e36c0ca38630e8f66ae4fc7d4ac5c6b704d1bc0d85811d4a35b050,2024-05-01T18:15:24.140000
|
||||
@ -253772,6 +253773,7 @@ CVE-2024-36550,0,0,91adae745b223f9735fdb21a15339bb26034752e595063e3f9b20141d647e
|
||||
CVE-2024-36568,0,0,c947aedd82bb9149f6d5ed733e385977abac9a86db57bbcbe31097874b0b1009,2024-07-03T02:03:17.227000
|
||||
CVE-2024-36569,0,0,360f77d552cdb048cab439a5bee7725cd5b340a5088e797dd6c6cd06c49b10f6,2024-07-03T02:03:18.013000
|
||||
CVE-2024-3657,0,0,ee35636c80343c35c9d7ec01515342fe2ebdf7b3a803cae60aab4ad80a6b3995,2024-07-18T16:15:07.693000
|
||||
CVE-2024-36572,1,1,a026aac6e0daf669259fcaa37cfe6941274fe69ce5a5c15013bbb910fac41095,2024-07-30T20:15:03.630000
|
||||
CVE-2024-36573,0,0,210f4a464aed5ca882857e08b7ab319b20ba6825802f28036ac835f0b3498a8d,2024-06-20T12:44:22.977000
|
||||
CVE-2024-36574,0,0,5919b4ca2d0f287d5f7cfcf83fdb2db228de9c4db571b73cd23f7f08bae7fb33,2024-07-03T02:03:18.790000
|
||||
CVE-2024-36575,0,0,b117fb4e52d0f8b4cc58a403a03ce56bde8486e8cc8deaf2edb246c707092c4a,2024-07-03T02:03:19.590000
|
||||
@ -255134,6 +255136,9 @@ CVE-2024-3897,0,0,5a8068a855e86bb89a1451de196d4bad1fbc355f1787f3259631c60aae1e07
|
||||
CVE-2024-38970,0,0,eb04e06c9fbc74e88c4fcf5d6eeffbd442cec39d7eaf1361f68ecba935eabe9c,2024-07-12T14:51:48.070000
|
||||
CVE-2024-38971,0,0,46979c6cce7787051e40b62dba0207d3f5f20f29a3ce299a21265249d3eebf4c,2024-07-12T14:50:45.817000
|
||||
CVE-2024-38972,0,0,266b969944e47c34c5065969d4aa9af417e70cd96f058167cecf53341667f408,2024-07-11T15:06:04.187000
|
||||
CVE-2024-38983,1,1,5a516ae66e7fd03f372675b2961e47e1cc2a26c072229ae2fa02fb5d92b6983c,2024-07-30T21:15:09.700000
|
||||
CVE-2024-38984,1,1,b31761b892ceba30c5b525a6baace91f8fac65d0e8946aeb434f2f336455a498,2024-07-30T20:15:03.873000
|
||||
CVE-2024-38986,1,1,d6c0552c0414e99c1ed9a101dcec2eeb261ce26899ec69e9262ab67ca948ea27,2024-07-30T20:15:03.990000
|
||||
CVE-2024-38987,0,0,0c71f898711274c7ac1489fe714f2d31dbe2fc7f130139d062fe917d9ea47c74,2024-07-11T15:06:05.027000
|
||||
CVE-2024-38990,0,0,501931c40b72ca4a3b10df5757210e9290217859750e859ab66984c960fc5bf4,2024-07-03T02:05:27.837000
|
||||
CVE-2024-38991,0,0,94e3c94b29575f02c48116cf5f4eea434bedd332518d74450337fdc7b51e049b,2024-07-03T02:05:28.670000
|
||||
@ -255150,6 +255155,9 @@ CVE-2024-39001,0,0,4a910b75869faff6116d62c4b16aa9d6512985c5f7163a2ecfe1d35727f84
|
||||
CVE-2024-39002,0,0,c3d97f4ddfdf5113f1cf208674920a9bfb5660b5a18aa674db16cd39625f22d8,2024-07-01T16:37:39.040000
|
||||
CVE-2024-39003,0,0,d490537b0b54e3dfe39c3bcd39a1799aa62df41a8d32db0a7f000717be4b18c5,2024-07-03T02:05:35.153000
|
||||
CVE-2024-39008,0,0,d8f19e5215777652d65d1787e2b99d3c75e4a232be174ccdef7b4b42d5758271,2024-07-09T16:22:47.440000
|
||||
CVE-2024-39010,1,1,946fe04029cd264826612548aa816a4dd20f0ac78eb41a3fc64e6276e74e3ad5,2024-07-30T20:15:04.103000
|
||||
CVE-2024-39011,1,1,afeb57ce4036a3c7c0446e6a587f7f9560ad91790e2dc1e4f9db4ebd77289b3e,2024-07-30T20:15:04.203000
|
||||
CVE-2024-39012,1,1,b4c7287722ba9764c59b838796c22fd05d19cec512e0b28cc8a0eb707ffc2db7,2024-07-30T20:15:04.307000
|
||||
CVE-2024-39013,0,0,a4c20ecb3bde21856044d9eb2da0ec8e02acc3f9684d1a5bf6185d1fb2e7bba0,2024-07-01T16:37:39.040000
|
||||
CVE-2024-39014,0,0,9a0097bf0bd9a3cc47cff0cc484a6f4c909bfad413f77f22d65f886eb0aa8457,2024-07-01T16:37:39.040000
|
||||
CVE-2024-39015,0,0,b9306c4366608a9bdba82a3b5fe9ddf19f9ad98b5ed41b597c0d6fd48fb1b83f,2024-07-03T02:05:35.967000
|
||||
@ -255248,7 +255256,7 @@ CVE-2024-39292,0,0,1e56ccb176115700ab782778ca3caad0c0ce72d927e8ec4deb0eae57f1b32
|
||||
CVE-2024-39293,0,0,1fec2940f1bd80b7fcd0ef6093774070c9cb79d5cc06d154bd66dc488c9431e4,2024-06-25T18:50:42.040000
|
||||
CVE-2024-39296,0,0,1505e8dd09a63330ec5436e9f86022e9b63137e3bb41d294e6c4ca091f2e08ed,2024-06-25T18:50:42.040000
|
||||
CVE-2024-39298,0,0,ebc8c1ac57b6c8432c32f877ad1093e868a3d2381cb98ee4d7cf51055258ad60,2024-06-25T18:50:42.040000
|
||||
CVE-2024-3930,1,1,99fba2b6ce5b9594a842ca8c98c795b49659c920913148827bd1c3d978f9c77f,2024-07-30T19:15:10.573000
|
||||
CVE-2024-3930,0,0,99fba2b6ce5b9594a842ca8c98c795b49659c920913148827bd1c3d978f9c77f,2024-07-30T19:15:10.573000
|
||||
CVE-2024-39301,0,0,72934b8f63bc52924fc16a3afe1a18dbebdfa8998d51203c594a2fbcffcac42e,2024-06-25T18:50:42.040000
|
||||
CVE-2024-39302,0,0,946c3f23cfe199dda1010c0ea47b1d5e32454ef20b5307dfd8e2dc92485c1baa,2024-07-01T12:37:24.220000
|
||||
CVE-2024-39303,0,0,a34ed591f51be43b3400c03523a5f8c55eb5097c5f908eacc0a16ec90a0e778f,2024-07-02T12:09:16.907000
|
||||
@ -255787,7 +255795,7 @@ CVE-2024-4075,0,0,29d19ea935c989efa2e770180ba61eb06fe49f0b181d6d812a7498d3145b98
|
||||
CVE-2024-40750,0,0,123c568c4a271c6bb023f9091df0f00fec1f937f3d0585148d7948581d7b9455,2024-07-11T13:06:13.187000
|
||||
CVE-2024-4076,0,0,e0e2b007c1440dbf9672681a5eff521aa004949693c7d660a7d1e4ee3ddd4740,2024-07-24T12:55:13.223000
|
||||
CVE-2024-40764,0,0,31190fa168623fbefe72005739844174b20afc4fdab83062110ac517be35c6d0,2024-07-18T12:28:43.707000
|
||||
CVE-2024-40767,0,1,0f0f227d49db4f76a18af060eeadd57ea0ca5da0ccc7bd26ef12905f9453740a,2024-07-30T19:19:40.767000
|
||||
CVE-2024-40767,0,0,0f0f227d49db4f76a18af060eeadd57ea0ca5da0ccc7bd26ef12905f9453740a,2024-07-30T19:19:40.767000
|
||||
CVE-2024-4077,0,0,d4f08c4fa42913c8d00f3fecbe96233f1448e9383bf97ebcbeca4cc0f2c8ae2b,2024-04-25T13:18:02.660000
|
||||
CVE-2024-40774,0,0,f362e44a6513e9a7ad670a01f69c050dc7028489484160824ab1f96f580e42a0,2024-07-30T13:32:45.943000
|
||||
CVE-2024-40775,0,0,1fdbbe2b554a0166a3b8a0cf31bf852c33e7d8e5242e045fa4d346d0613760b8,2024-07-30T13:32:45.943000
|
||||
@ -256072,7 +256080,7 @@ CVE-2024-41098,0,0,0e3bb06817924b091ecd502db6e8d6b8dfedc58f44996ff13dc833ea0ac51
|
||||
CVE-2024-41107,0,0,8900de25677c2ad7075ce083b915bd87b6a95be071804b0852c57c05697761e4,2024-07-19T14:15:06.080000
|
||||
CVE-2024-41109,0,0,8e2788b650464b65229bdb352d44a4f4987c669a37d937e54db42882c9a39d38,2024-07-30T15:15:12.890000
|
||||
CVE-2024-4111,0,0,a3e4bcb39778569b3be84e8d38a6497dbc2fc6b5a3693d9cc21532b8df994ada,2024-06-04T19:20:29.827000
|
||||
CVE-2024-41110,0,0,6ff3558a253c7fb43657a983fdd8f716059d35d04d5c39b9395ecb33c679f6d6,2024-07-25T12:36:39.947000
|
||||
CVE-2024-41110,0,1,73fe8c24dc51cc9ae0d0f228bfd2d081609568fbc3ab82eb1b26156020a860c9,2024-07-30T20:15:04.567000
|
||||
CVE-2024-41111,0,0,52a25c3214b943235db4ca14cf3f4d1ccd955b2141e1d6abf224fc5c4732905d,2024-07-19T13:01:44.567000
|
||||
CVE-2024-41112,0,0,c1e2935d5067b6b9e390edcde870b73985efea83b9c457e37019ce21e57e3326,2024-07-29T14:12:08.783000
|
||||
CVE-2024-41113,0,0,e72ec79e8d81313d3777b3a6a45fd3886cd1a93c2cd46e25a58ccadfa78f3067,2024-07-29T14:12:08.783000
|
||||
@ -256119,8 +256127,8 @@ CVE-2024-4127,0,0,13aabefe1ea17c857d1bb509e28f374ee8245c3658c3b51912d597c1f898ec
|
||||
CVE-2024-4128,0,0,68bc0506eec8fccf6c4228f6f90915fa5b089633c8bc20338b2c6bd4b4236a0b,2024-05-02T18:00:37.360000
|
||||
CVE-2024-41281,0,0,67d3a54ff6c69e817d1c4d3304511fe0d1b87ffa7ae182f6c630038b3326bf87,2024-07-22T13:00:53.287000
|
||||
CVE-2024-4129,0,0,f2fba94e29dd925b8a56a23f2711717731ea628ca4457222b442fc21c3f8c80a,2024-05-14T16:11:39.510000
|
||||
CVE-2024-41304,1,1,fc267a0abc75b30a6dc8d5a03a26c13cc3369d57b67b1467db56fe797a92ba88,2024-07-30T18:15:05.817000
|
||||
CVE-2024-41305,1,1,abfbbbf72d9386d5a8287d954777b040b4d86e2a1e7578dd383d0a4a2e8a1f50,2024-07-30T18:15:05.910000
|
||||
CVE-2024-41304,0,0,fc267a0abc75b30a6dc8d5a03a26c13cc3369d57b67b1467db56fe797a92ba88,2024-07-30T18:15:05.817000
|
||||
CVE-2024-41305,0,0,abfbbbf72d9386d5a8287d954777b040b4d86e2a1e7578dd383d0a4a2e8a1f50,2024-07-30T18:15:05.910000
|
||||
CVE-2024-41314,0,0,b51b0e3a4e5d4ef00805134d9c64392d4de8d2322e969183a3b6dc33816f9694,2024-07-24T12:55:13.223000
|
||||
CVE-2024-41315,0,0,a68e90aec55f0c153342e794139e84a95b20ef3a1a126ec70584092245e39d47,2024-07-24T12:55:13.223000
|
||||
CVE-2024-41316,0,0,c9274bb79d4ba765ad537ccc2706ac76777f5e15d362d310fbcad6af2fafb632,2024-07-24T12:55:13.223000
|
||||
@ -256144,12 +256152,12 @@ CVE-2024-4140,0,0,1a159a4a143aac5301b6b2c31977a1ba9c685fc606596154a85964b944248c
|
||||
CVE-2024-4141,0,0,6345d107b3806446cb477db17841c2bd741df862ff110a2cbbd3d3a9945eb29d,2024-04-24T19:58:40.710000
|
||||
CVE-2024-4142,0,0,15f953d52654601c03ad89c9ea21867b549a2aa12635e109fbf9627466e8a212,2024-05-02T13:27:25.103000
|
||||
CVE-2024-4143,0,0,e6d56e099b9443f818cba12ec6584b2ae78b4e2e6fa1554ff08fbd2e8dc736a0,2024-07-16T13:43:58.773000
|
||||
CVE-2024-41437,1,1,a480c7cafdea4f10f177c36c7d68e338075390fe39545b619acfe0e3760dfe90,2024-07-30T19:15:10.933000
|
||||
CVE-2024-41438,1,1,43c51501220b9280fbb2a619b5823f3bda1e19f0112e67053d52746177998068,2024-07-30T19:15:11.027000
|
||||
CVE-2024-41439,1,1,7ffa4e6c6f9f64706db3166377e99b171ca158a78a397ac8af977d0560520ab8,2024-07-30T19:15:11.123000
|
||||
CVE-2024-41437,0,0,a480c7cafdea4f10f177c36c7d68e338075390fe39545b619acfe0e3760dfe90,2024-07-30T19:15:10.933000
|
||||
CVE-2024-41438,0,0,43c51501220b9280fbb2a619b5823f3bda1e19f0112e67053d52746177998068,2024-07-30T19:15:11.027000
|
||||
CVE-2024-41439,0,0,7ffa4e6c6f9f64706db3166377e99b171ca158a78a397ac8af977d0560520ab8,2024-07-30T19:15:11.123000
|
||||
CVE-2024-4144,0,0,f950a1b03316faa802a71776ce4e62cc15162cc9cec7d4c30c76255605b1c1fc,2024-05-14T19:17:55.627000
|
||||
CVE-2024-41440,1,1,2786894dea1f01314595c88d1156e8c651a11df92fd4b99000a5278ef5b49e7a,2024-07-30T19:15:11.210000
|
||||
CVE-2024-41443,1,1,70cf21032fa6437b334dbab8fc23f567906f3652be13d825ed8738ccbca4ba57,2024-07-30T19:15:11.300000
|
||||
CVE-2024-41440,0,0,2786894dea1f01314595c88d1156e8c651a11df92fd4b99000a5278ef5b49e7a,2024-07-30T19:15:11.210000
|
||||
CVE-2024-41443,0,0,70cf21032fa6437b334dbab8fc23f567906f3652be13d825ed8738ccbca4ba57,2024-07-30T19:15:11.300000
|
||||
CVE-2024-4145,0,0,704254773246494130c81e0600984df247a970411736d475449e315ca595ee9b,2024-07-03T02:07:08.133000
|
||||
CVE-2024-41459,0,0,27333ea1f8bbfaac7382ac7849477df0d4e7f0cb54570d7d12028ddbda3304d0,2024-07-26T13:21:21.527000
|
||||
CVE-2024-4146,0,0,5bcf92f96755106fd9c198be9e70039e9dbd3f86c15b09e938b03dc5a47e5822,2024-07-19T19:03:00.867000
|
||||
@ -256185,6 +256193,8 @@ CVE-2024-41601,0,0,0a4c46a9e0b7ae10b4c49205927577ced484b2b5ff2c73162e53448b05b83
|
||||
CVE-2024-41602,0,0,1008bf55cc85541b699d3ce61768b1dcbe9f1fa0beeed1f78306ea877ed05853,2024-07-22T13:00:53.287000
|
||||
CVE-2024-41603,0,0,fea24b2a4f5edef8eed4f92099c55619421eb840f7c5615d183c1e7fc6737204,2024-07-22T13:00:53.287000
|
||||
CVE-2024-4161,0,0,818606f25cf93cd94814d58a9247fa25de635b9142e537f83382fb857b8b71ef,2024-04-25T13:18:13.537000
|
||||
CVE-2024-41610,1,1,1f18cc286e805cd53f4a5823ff3d9cbdf55ab7af93bc70acd8a7313eb9d465c0,2024-07-30T20:15:04.713000
|
||||
CVE-2024-41611,1,1,3e490d1b35caecf38e9d4db9bdc6bd3cae7d717d9735b092ed77796826a44416,2024-07-30T20:15:04.810000
|
||||
CVE-2024-4162,0,0,1a4f39929c1df6d420ff35b2d8de51a57c5e5378a57b6e7a1a35abc1b5a3dc57,2024-05-08T13:15:00.690000
|
||||
CVE-2024-41624,0,0,27591d721b6b93bb72ed8c8d8df31fac89dd525c92ee99de3b5ca8f07694b2d0,2024-07-29T16:21:52.517000
|
||||
CVE-2024-41628,0,0,5ec8768921bad03bab84b09fc8dfe73d891754e0ae7735ac3fc375a877076401,2024-07-29T14:12:08.783000
|
||||
@ -256230,9 +256240,9 @@ CVE-2024-41701,0,0,dd24aefcbab2e7aed118f6b42dbe2e651c1bc0fc56ceb2d95afa6932def1c
|
||||
CVE-2024-41702,0,0,cdaf376956d976cad8d3300425370c07ba735cd90e9544051b990f59715bdf4d,2024-07-30T13:32:45.943000
|
||||
CVE-2024-41703,0,0,a85362978996c7d236f30e97fa16c337a7f9d6be679ddc12fca950c1a606cca0,2024-07-25T16:55:48.747000
|
||||
CVE-2024-41704,0,0,da6c19dec91a04b61d02ede6a13562fab5099a10133c7133c2bc4c7b7733b093,2024-07-25T16:55:24.307000
|
||||
CVE-2024-41705,0,0,710a6e223a595b850fc1abe74813fc5dc553a977607000233e7b49f5d54f1184,2024-07-25T12:36:39.947000
|
||||
CVE-2024-41706,0,0,2e5520e401226f7d8ac6ccda5278f567d59301b638accffd565c50d862359658,2024-07-25T12:36:39.947000
|
||||
CVE-2024-41707,0,0,3c5ea333b2404f7e0d9195aa6339fef455f6fa8292255904be4c6dce5c96f3cc,2024-07-25T12:36:39.947000
|
||||
CVE-2024-41705,0,1,5b6b550b5a007db9c8980f79f04b711a2eae005d4e12fa7f45cc500b763dac47,2024-07-30T20:33:08.920000
|
||||
CVE-2024-41706,0,1,57cd8a1a8e4969563144dfc7d6c6c2ead751097b77dd114b3f95f143eff0b546,2024-07-30T20:32:18.270000
|
||||
CVE-2024-41707,0,1,46c44c2d7564627600555fe5a9d2b2412759a5e55f6187d39d18a309c54891ee,2024-07-30T20:31:59.030000
|
||||
CVE-2024-41709,0,0,6713bfc73e81c65bc7923627db30413fcbe413ec587fff89449c3abd86e7e93b,2024-07-25T15:22:06.140000
|
||||
CVE-2024-4171,0,0,87597e8caa4479ab69c883527c35fc22af72d614757313d16953f50dcfa107c2,2024-06-04T19:20:31.980000
|
||||
CVE-2024-4172,0,0,ae5cefdd41ee745a5f3463347f20f3f77110439c81ed1ad285dedf4b40da1c57,2024-06-04T19:20:32.077000
|
||||
@ -256285,8 +256295,9 @@ CVE-2024-4192,0,0,0768e429bccaed861e82d220deefd437e5feb26a94e95c7a12162631897066
|
||||
CVE-2024-41924,0,0,24158a49c3742b0541bdd3409c983b7d59bb552b3c444ac190659070a374a298,2024-07-30T13:32:45.943000
|
||||
CVE-2024-4193,0,0,4d4f4fcde78b01b33e30a077c434c1714d01a9ac9cd58d916bc86b963b6ddbd7,2024-05-14T16:11:39.510000
|
||||
CVE-2024-4194,0,0,cb2c64b568e3bd7c78c9d4f736651c66722818abe246f3bc5aedd70e3521cb96,2024-06-06T14:17:35.017000
|
||||
CVE-2024-41943,1,1,ea6a0b804baee78cda5149280c1542286d7d394f503361f987f54b2f96746108,2024-07-30T18:15:06.037000
|
||||
CVE-2024-41943,0,0,ea6a0b804baee78cda5149280c1542286d7d394f503361f987f54b2f96746108,2024-07-30T18:15:06.037000
|
||||
CVE-2024-41944,0,0,38ddc144465089a90f723a639a1365a358acd1ffefa771e73c1360e990bcf220,2024-07-30T17:15:13.853000
|
||||
CVE-2024-41945,1,1,2d4302a25c45b748a068caac6d8068fd64dc1f02a1e28a80597a8b7ced57a0bc,2024-07-30T20:15:04.930000
|
||||
CVE-2024-4195,0,0,1b874e811f63a88fe0e5040c0bc90d160eaa072aa139296a2fc692655a3d77a9,2024-04-26T12:58:17.720000
|
||||
CVE-2024-4196,0,0,2bee927395e72028cfccdf65300c6a2b8979e20b943a96185278ab936245f10e,2024-06-25T12:24:17.873000
|
||||
CVE-2024-4197,0,0,45da0b07f911473fe59b939894a184bd20b4010bb74cc514ccd6533e9d15c77b,2024-06-25T12:24:17.873000
|
||||
@ -256309,27 +256320,27 @@ CVE-2024-42054,0,0,7cefcb5df710c5d52c7b44743e7320cbb773b7864f3adff97191d41734299
|
||||
CVE-2024-42055,0,0,38832abf63aaabdc907feb9726d6725f630aba764b55549d89c565bd77d3378b,2024-07-29T14:12:08.783000
|
||||
CVE-2024-4206,0,0,094d5b07d12006961f56a1900b69d613595338528ec5cf7d408eb10d270cfa9f,2024-06-11T10:15:13.553000
|
||||
CVE-2024-42063,0,0,b79fa6aa08c846471acf77f3dfbf57119b631126c398ef36dda54a714ad37725,2024-07-29T16:21:52.517000
|
||||
CVE-2024-42064,0,1,aff9875e6448c473c643bff3b6337ebbd7539dcae5f98d4517c155e837f00f5d,2024-07-30T19:03:25.797000
|
||||
CVE-2024-42065,0,1,f0f03032a73aa86560acd839e088b479e13d13725614d9ef0b38fd19889bc64c,2024-07-30T19:02:59.217000
|
||||
CVE-2024-42066,0,1,13367e8042c7deb50de62c4bc97d68b98aeec4d6d8b79660880bbd2b9f9751ee,2024-07-30T19:02:32.857000
|
||||
CVE-2024-42067,0,1,76b8a48a5c9c39c834303c1ab49427d9ea91f3b40b52494de61b4b6e2c5fda5d,2024-07-30T19:02:20.687000
|
||||
CVE-2024-42068,0,1,1a160585aaee5b8057f9754dd933ab025ae98bb2f1265de1f07411334b3b7824,2024-07-30T19:02:12.100000
|
||||
CVE-2024-42069,0,1,60fa9d91087c81456e7c5fb921427aaf3b5afe0a67efd57dd11a894c17fbb41c,2024-07-30T19:01:58.623000
|
||||
CVE-2024-42070,0,1,e64f943ce3129e4d8ae036dffdbca01cf0dc26f8755575b087b493eb24d90087,2024-07-30T19:01:47.300000
|
||||
CVE-2024-42071,0,1,ff080b79e51ffa2c8ca921ced41476b4268b9bbb102ab5b0e74f4466a89e1962,2024-07-30T19:01:26.950000
|
||||
CVE-2024-42072,0,1,0b4090285289756aa6386870bfb03879aa1c74b07de9263b8ad88a48de945c2e,2024-07-30T19:01:12.833000
|
||||
CVE-2024-42073,0,1,f43077c064bf834b648ca031d8c7c90c16484619a635dcde5279f184eca4f504,2024-07-30T19:00:52.667000
|
||||
CVE-2024-42074,0,1,c1003ca1cd857d6901b3df9173f0a7927b093db043332c5d10100926e7521f32,2024-07-30T19:00:33.493000
|
||||
CVE-2024-42075,0,1,09886a603959c28eac08e3691cd5c50b20630f2b1656317a40eb926c920c8fc3,2024-07-30T19:00:26.477000
|
||||
CVE-2024-42076,0,1,c9acd2aee37ee2d39b2fd653fd4a679a2b01ab0266df65621ad96d984e85c7ec,2024-07-30T19:00:17.847000
|
||||
CVE-2024-42077,0,1,ae5445c1f3c93a0b71a56c4d4c519fd4c92ee7bc024435048d7b31da1476344b,2024-07-30T18:59:53.480000
|
||||
CVE-2024-42078,0,1,46aeb1640b69db3d766b123cb8661ee9c5b0244bf9cfe66df62dcc1f1bc485de,2024-07-30T18:58:41.253000
|
||||
CVE-2024-42079,0,1,615fba7ddb879610fe652b42080e11b3fd9ce7c703bdec8a6a4e9644c1bbd677,2024-07-30T18:58:08.977000
|
||||
CVE-2024-42064,0,0,aff9875e6448c473c643bff3b6337ebbd7539dcae5f98d4517c155e837f00f5d,2024-07-30T19:03:25.797000
|
||||
CVE-2024-42065,0,0,f0f03032a73aa86560acd839e088b479e13d13725614d9ef0b38fd19889bc64c,2024-07-30T19:02:59.217000
|
||||
CVE-2024-42066,0,0,13367e8042c7deb50de62c4bc97d68b98aeec4d6d8b79660880bbd2b9f9751ee,2024-07-30T19:02:32.857000
|
||||
CVE-2024-42067,0,0,76b8a48a5c9c39c834303c1ab49427d9ea91f3b40b52494de61b4b6e2c5fda5d,2024-07-30T19:02:20.687000
|
||||
CVE-2024-42068,0,0,1a160585aaee5b8057f9754dd933ab025ae98bb2f1265de1f07411334b3b7824,2024-07-30T19:02:12.100000
|
||||
CVE-2024-42069,0,0,60fa9d91087c81456e7c5fb921427aaf3b5afe0a67efd57dd11a894c17fbb41c,2024-07-30T19:01:58.623000
|
||||
CVE-2024-42070,0,0,e64f943ce3129e4d8ae036dffdbca01cf0dc26f8755575b087b493eb24d90087,2024-07-30T19:01:47.300000
|
||||
CVE-2024-42071,0,0,ff080b79e51ffa2c8ca921ced41476b4268b9bbb102ab5b0e74f4466a89e1962,2024-07-30T19:01:26.950000
|
||||
CVE-2024-42072,0,0,0b4090285289756aa6386870bfb03879aa1c74b07de9263b8ad88a48de945c2e,2024-07-30T19:01:12.833000
|
||||
CVE-2024-42073,0,0,f43077c064bf834b648ca031d8c7c90c16484619a635dcde5279f184eca4f504,2024-07-30T19:00:52.667000
|
||||
CVE-2024-42074,0,0,c1003ca1cd857d6901b3df9173f0a7927b093db043332c5d10100926e7521f32,2024-07-30T19:00:33.493000
|
||||
CVE-2024-42075,0,0,09886a603959c28eac08e3691cd5c50b20630f2b1656317a40eb926c920c8fc3,2024-07-30T19:00:26.477000
|
||||
CVE-2024-42076,0,0,c9acd2aee37ee2d39b2fd653fd4a679a2b01ab0266df65621ad96d984e85c7ec,2024-07-30T19:00:17.847000
|
||||
CVE-2024-42077,0,0,ae5445c1f3c93a0b71a56c4d4c519fd4c92ee7bc024435048d7b31da1476344b,2024-07-30T18:59:53.480000
|
||||
CVE-2024-42078,0,0,46aeb1640b69db3d766b123cb8661ee9c5b0244bf9cfe66df62dcc1f1bc485de,2024-07-30T18:58:41.253000
|
||||
CVE-2024-42079,0,0,615fba7ddb879610fe652b42080e11b3fd9ce7c703bdec8a6a4e9644c1bbd677,2024-07-30T18:58:08.977000
|
||||
CVE-2024-4208,0,0,32e5dd37fcb796c0866341642387d4cc76a1d3ae9362eee8c22ff2c138c94874,2024-05-15T16:40:19.330000
|
||||
CVE-2024-42080,0,1,7fbaaca0a6aeb5bdfda9d2ffcdb0eeebd9767469aa1e7a137d6a790bb0180339,2024-07-30T18:57:58.493000
|
||||
CVE-2024-42081,0,1,7952f0a0cb7322f4a55d2e3ed80f93080c6d5ba97bfc359475cbbdb5247053db,2024-07-30T18:57:21.440000
|
||||
CVE-2024-42082,0,1,eff775e1665f30ff881719df9a585aaa82084c989b937633b1a5625f819031d7,2024-07-30T19:04:15.837000
|
||||
CVE-2024-42083,0,1,89007ffa1723bb9616d5e97e8206878c7bc8d4d034d65ecc75c2333799bd1db9,2024-07-30T19:03:40.337000
|
||||
CVE-2024-42080,0,0,7fbaaca0a6aeb5bdfda9d2ffcdb0eeebd9767469aa1e7a137d6a790bb0180339,2024-07-30T18:57:58.493000
|
||||
CVE-2024-42081,0,0,7952f0a0cb7322f4a55d2e3ed80f93080c6d5ba97bfc359475cbbdb5247053db,2024-07-30T18:57:21.440000
|
||||
CVE-2024-42082,0,0,eff775e1665f30ff881719df9a585aaa82084c989b937633b1a5625f819031d7,2024-07-30T19:04:15.837000
|
||||
CVE-2024-42083,0,0,89007ffa1723bb9616d5e97e8206878c7bc8d4d034d65ecc75c2333799bd1db9,2024-07-30T19:03:40.337000
|
||||
CVE-2024-42084,0,0,2419bf7f9c0ff6d4ecd88d3174d0de0433fb1a33ae81692aac9b85c4d85c76f8,2024-07-30T13:33:30.653000
|
||||
CVE-2024-42085,0,0,42ad9d94684b357600f8069e6980c249dd991ef89c82a342c9436c234ae4419b,2024-07-30T13:33:30.653000
|
||||
CVE-2024-42086,0,0,0486c374fb7721de34d27071e7947be100dd7ee23784594c29172b09ce48c174,2024-07-30T13:33:30.653000
|
||||
@ -256422,14 +256433,14 @@ CVE-2024-4220,0,0,046e30c2acea51afb217826bab01d9bc8062f3ae27d0f03889e044f9dcbfad
|
||||
CVE-2024-4222,0,0,4d6355f51e627298e66c1522bbe3d0815b2694594ed1a3761ea4bb349286c8e6,2024-05-16T13:03:05.353000
|
||||
CVE-2024-42223,0,0,6f496051e17acd26c026d75fa988b6d6ff9e5447fbb1fb5ab39d7edf9d044b37,2024-07-30T13:32:45.943000
|
||||
CVE-2024-42224,0,0,9dea2dbc28ce3545486461134a19fb3b8aecf6e9048c73b521719de55d5e64ac,2024-07-30T13:32:45.943000
|
||||
CVE-2024-42225,0,0,fc91c22ede93264c5678296991dbb7b23b3f375088bbc4cec4e958e8b9234199,2024-07-30T13:32:45.943000
|
||||
CVE-2024-42226,0,0,80b29dabdc697490ec3fc6e3f90a9c09017d124bd922d25f924e7a6419400cb6,2024-07-30T13:32:45.943000
|
||||
CVE-2024-42227,0,0,a2c43cd8c9a5b737406bf04cfac9ab320ae2654e82850d4364101bbda03cea8a,2024-07-30T13:32:45.943000
|
||||
CVE-2024-42228,0,0,f24e3d39153e88d81adcb0b9c453368bdf820250a2141753e787d3f5659875a5,2024-07-30T13:32:45.943000
|
||||
CVE-2024-42229,0,1,36cc6538a49438424165de83459803117419e403bec726ebc7859e65ec89d3a6,2024-07-30T19:46:56.943000
|
||||
CVE-2024-42225,0,1,027ebcc5c2c6118571549793bb32b350e19f50787f15d2954fa76e31ccdae212,2024-07-30T20:15:19.600000
|
||||
CVE-2024-42226,0,1,85e1a1843ef6b9230ee103078e5f87f3a7bc00e8db591eb32209bc245bb0dcf1,2024-07-30T20:12:08.160000
|
||||
CVE-2024-42227,0,1,defe5641015aadc42156aed9e400c997682c21664defa4c542b824140e095fad,2024-07-30T20:15:03.963000
|
||||
CVE-2024-42228,0,1,bb35b5d07117a510d2c8f813597e1359d157744c6e3d74a8f3b969980ffe591b,2024-07-30T20:12:16.913000
|
||||
CVE-2024-42229,0,0,36cc6538a49438424165de83459803117419e403bec726ebc7859e65ec89d3a6,2024-07-30T19:46:56.943000
|
||||
CVE-2024-4223,0,0,a9cdfeab1a1d35d41a694125f4f4f3203fe0cd94da938f50193ff10f6450cc4d,2024-05-16T13:03:05.353000
|
||||
CVE-2024-42230,0,1,489de0c942b162ae04db8d65286f120a7fa8b9f22ca14fe8139d983112a4bb74,2024-07-30T19:32:51.137000
|
||||
CVE-2024-42231,0,1,10724278b1403d9010315b9b102a7133e512f19dc0258e17964781455ceff0fb,2024-07-30T19:30:52.427000
|
||||
CVE-2024-42230,0,0,489de0c942b162ae04db8d65286f120a7fa8b9f22ca14fe8139d983112a4bb74,2024-07-30T19:32:51.137000
|
||||
CVE-2024-42231,0,0,10724278b1403d9010315b9b102a7133e512f19dc0258e17964781455ceff0fb,2024-07-30T19:30:52.427000
|
||||
CVE-2024-4224,0,0,1072ade5e61d4673e4fde8d68c377ed60a4f449367391001c4ccc215a9b54b17,2024-07-16T13:43:58.773000
|
||||
CVE-2024-4225,0,0,91f68c0336340065fb4af26f099ffa4f82ba2dd159bb3bc13f7cb1abcd1de276,2024-04-30T13:11:16.690000
|
||||
CVE-2024-4226,0,0,5a1ca6b12b6f72b0f4206f29fce66dc2868959ed888bfbcbc74131b5725a94eb,2024-04-30T13:11:16.690000
|
||||
@ -257318,8 +257329,8 @@ CVE-2024-5245,0,0,8367cc316d7fd622697ed020483e2edc6264aea8aa776978b7228518baa317
|
||||
CVE-2024-5246,0,0,481ebf23b779dd3e32e9e0cda77aaee7d0bfc9eca82266cde6c77415f4c9c730,2024-07-03T02:08:44.767000
|
||||
CVE-2024-5247,0,0,fdfe6c1388c42f602cdcb0ffda38b56b5f1ed960e60bfada435f42d294b2956e,2024-05-24T01:15:30.977000
|
||||
CVE-2024-5248,0,0,2c3e52f7d10efa84a65c2d56e808c7c6b6e082b4d0e6c7b1b0a814f5918d2bf2,2024-06-07T14:56:05.647000
|
||||
CVE-2024-5249,1,1,232f47cfb2c69c6a8c9d02a3b0cfea12f31b0f5b2461136c3f6fb34f19fe55d0,2024-07-30T19:15:11.400000
|
||||
CVE-2024-5250,1,1,3670f2c0e7c70580f978e446568f5ac668b790748e31a5c3911ef088cda40359,2024-07-30T19:15:11.613000
|
||||
CVE-2024-5249,0,0,232f47cfb2c69c6a8c9d02a3b0cfea12f31b0f5b2461136c3f6fb34f19fe55d0,2024-07-30T19:15:11.400000
|
||||
CVE-2024-5250,0,0,3670f2c0e7c70580f978e446568f5ac668b790748e31a5c3911ef088cda40359,2024-07-30T19:15:11.613000
|
||||
CVE-2024-5251,0,0,7d84d2df7bf6674f7d634954defb2f38b0363c19ae19f78012df0aa633abf27a,2024-07-19T15:25:30.980000
|
||||
CVE-2024-5252,0,0,1b28d536afc88eae5088fe06ff49428bbad5ffcb2aa7139fe40c4c06d2601422,2024-07-19T15:29:35.447000
|
||||
CVE-2024-5253,0,0,73f9562f224a9a11b8b8279a7bf00d920003fa046cb7c88a3a55caf281adabe4,2024-07-19T15:30:34.717000
|
||||
@ -257655,7 +257666,7 @@ CVE-2024-5659,0,0,ffc77731bd38c72dba71b78652c4b9387b9df2ddb5b033ee614f797d944c1f
|
||||
CVE-2024-5661,0,0,64c610f4ac197974e4a9f4370e828aefe9bbaabb0bf444795d194a1356128a89,2024-07-02T14:43:40.460000
|
||||
CVE-2024-5662,0,0,8c3107c3250f17bf50f488951af6a806bf508fec6c0432bc071f0b8c3606d97e,2024-06-28T10:27:00.920000
|
||||
CVE-2024-5663,0,0,bb880da64d53311a8a310f135d9a5689f60a63ae397c005441eb1cf59738b610,2024-07-23T17:55:19.843000
|
||||
CVE-2024-5664,0,0,c8140580dc5fba46f6fa0e365bb691b18490e120c359f209bcf871e212ff855f,2024-07-11T13:05:54.930000
|
||||
CVE-2024-5664,0,1,15d6d3474356777a172880e6c9174f79c431df5a540b6c11d12c2ee9d4a776e5,2024-07-30T21:00:44.357000
|
||||
CVE-2024-5665,0,0,ee434c76bce552b377f6919bf1c15ee1f70c912b781038fb2d7ab59e3f11029d,2024-06-11T17:47:45.033000
|
||||
CVE-2024-5666,0,0,97b5f8516d6a83112ace9f54dd19c30ee8d354b5a2cceeea2e9bda093f34ca6c,2024-07-01T12:37:24.220000
|
||||
CVE-2024-5669,0,0,ddd7772a6277d903bcf1d89da44667af6e9a3df4fd3440e71ca75c5d1aad7a37,2024-07-09T18:19:14.047000
|
||||
@ -257830,6 +257841,7 @@ CVE-2024-5896,0,0,543a9739bb7994a5cf7a44d8a031ddac2c68327e324b7d90a0e38059960eb0
|
||||
CVE-2024-5897,0,0,7705294a726132fe76b260cca78d94d4cdc2b24feee8f8352eb858eb73b1c164,2024-06-13T18:36:09.010000
|
||||
CVE-2024-5898,0,0,0d43a32ea8127bc0ab1191832cee4a9d60038575841f8992bc0a9c66154d3c87,2024-06-13T18:36:09.010000
|
||||
CVE-2024-5899,0,0,9a50f1672a8f19c78e5991e440d5a0c2d46a5e3e821843d3d776673ac7766d57,2024-06-20T12:44:01.637000
|
||||
CVE-2024-5901,1,1,6394f4a6d32a8605ce5461c951c2de06cc2db4ef38c111f80d7732721a704543,2024-07-30T21:15:09.863000
|
||||
CVE-2024-5902,0,0,7888af9d367c2dddb4d6f8ca0d5bee140123446fdb703c2c12cdc94e6e9d8ba4,2024-07-15T13:00:34.853000
|
||||
CVE-2024-5905,0,0,be70c4e08f84c756b5f3c406b9f7243178ad87363f58f84ccd50cdaa5058fc06,2024-06-13T18:36:09.010000
|
||||
CVE-2024-5906,0,0,7122b72eae2ba5326022ae04558ccad9890de521e231b1730c040bf08879bb1f,2024-06-13T18:36:09.010000
|
||||
@ -258564,4 +258576,5 @@ CVE-2024-7249,0,0,b1c62b4f237d55dfb39f8f205e178006f9409a78ccfd426e79f2f98ca375d8
|
||||
CVE-2024-7250,0,0,2ad6dc357ed437eabcd60fe2775245fd2e54c1167d56f0a56470e33155a5fc4c,2024-07-30T13:32:45.943000
|
||||
CVE-2024-7251,0,0,56e37f41fcf38f76a5deb1629f8d7e708899009a1e9f2b615de298d4a45a835f,2024-07-30T13:32:45.943000
|
||||
CVE-2024-7252,0,0,b11855d09d58123416b1c452f42a306230094dfbea0e43cbf3d1a4ad2d82d89e,2024-07-30T13:32:45.943000
|
||||
CVE-2024-7273,1,1,96ac7cdc7b0d4132cb85ff0c2e5f52cf75d02b34301d6b8ef1b0ed79592b5528,2024-07-30T21:15:10.110000
|
||||
CVE-2024-7297,0,0,2e874bfba57ad5ec5745065eab38f5876ea9fcd7307b48661cf2daf7f9f6b574,2024-07-30T17:15:14.513000
|
||||
|
Can't render this file because it is too large.
|
Loading…
x
Reference in New Issue
Block a user