mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-07-09 16:05:11 +00:00
Auto-Update: 2024-07-16T12:00:17.806834+00:00
This commit is contained in:
parent
1983c29b4c
commit
7e9baab0b5
41
CVE-2023/CVE-2023-528xx/CVE-2023-52886.json
Normal file
41
CVE-2023/CVE-2023-528xx/CVE-2023-52886.json
Normal file
@ -0,0 +1,41 @@
|
||||
{
|
||||
"id": "CVE-2023-52886",
|
||||
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"published": "2024-07-16T10:15:02.493",
|
||||
"lastModified": "2024-07-16T10:15:02.493",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\nUSB: core: Fix race by not overwriting udev->descriptor in hub_port_init()\n\nSyzbot reported an out-of-bounds read in sysfs.c:read_descriptors():\n\nBUG: KASAN: slab-out-of-bounds in read_descriptors+0x263/0x280 drivers/usb/core/sysfs.c:883\nRead of size 8 at addr ffff88801e78b8c8 by task udevd/5011\n\nCPU: 0 PID: 5011 Comm: udevd Not tainted 6.4.0-rc6-syzkaller-00195-g40f71e7cd3c6 #0\nHardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/27/2023\nCall Trace:\n <TASK>\n __dump_stack lib/dump_stack.c:88 [inline]\n dump_stack_lvl+0xd9/0x150 lib/dump_stack.c:106\n print_address_description.constprop.0+0x2c/0x3c0 mm/kasan/report.c:351\n print_report mm/kasan/report.c:462 [inline]\n kasan_report+0x11c/0x130 mm/kasan/report.c:572\n read_descriptors+0x263/0x280 drivers/usb/core/sysfs.c:883\n...\nAllocated by task 758:\n...\n __do_kmalloc_node mm/slab_common.c:966 [inline]\n __kmalloc+0x5e/0x190 mm/slab_common.c:979\n kmalloc include/linux/slab.h:563 [inline]\n kzalloc include/linux/slab.h:680 [inline]\n usb_get_configuration+0x1f7/0x5170 drivers/usb/core/config.c:887\n usb_enumerate_device drivers/usb/core/hub.c:2407 [inline]\n usb_new_device+0x12b0/0x19d0 drivers/usb/core/hub.c:2545\n\nAs analyzed by Khazhy Kumykov, the cause of this bug is a race between\nread_descriptors() and hub_port_init(): The first routine uses a field\nin udev->descriptor, not expecting it to change, while the second\noverwrites it.\n\nPrior to commit 45bf39f8df7f (\"USB: core: Don't hold device lock while\nreading the \"descriptors\" sysfs file\") this race couldn't occur,\nbecause the routines were mutually exclusive thanks to the device\nlocking. Removing that locking from read_descriptors() exposed it to\nthe race.\n\nThe best way to fix the bug is to keep hub_port_init() from changing\nudev->descriptor once udev has been initialized and registered.\nDrivers expect the descriptors stored in the kernel to be immutable;\nwe should not undermine this expectation. In fact, this change should\nhave been made long ago.\n\nSo now hub_port_init() will take an additional argument, specifying a\nbuffer in which to store the device descriptor it reads. (If udev has\nnot yet been initialized, the buffer pointer will be NULL and then\nhub_port_init() will store the device descriptor in udev as before.)\nThis eliminates the data race responsible for the out-of-bounds read.\n\nThe changes to hub_port_init() appear more extensive than they really\nare, because of indentation changes resulting from an attempt to avoid\nwriting to other parts of the usb_device structure after it has been\ninitialized. Similar changes should be made to the code that reads\nthe BOS descriptor, but that can be handled in a separate patch later\non. This patch is sufficient to fix the bug found by syzbot."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/7fe9d87996062f5eb0ca476ad0257f79bf43aaf5",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/8186596a663506b1124bede9fde6f243ef9f37ee",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/9d241c5d9a9b7ad95c90c6520272fe404d5ac88f",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/b4a074b1fb222164ed7d5c0b8c922dc4a0840848",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/b9fbfb349eacc0820f91c797d7f0a3ac7a4935b5",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/ff33299ec8bb80cdcc073ad9c506bd79bb2ed20b",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
}
|
||||
]
|
||||
}
|
56
CVE-2024/CVE-2024-398xx/CVE-2024-39887.json
Normal file
56
CVE-2024/CVE-2024-398xx/CVE-2024-39887.json
Normal file
@ -0,0 +1,56 @@
|
||||
{
|
||||
"id": "CVE-2024-39887",
|
||||
"sourceIdentifier": "security@apache.org",
|
||||
"published": "2024-07-16T10:15:03.380",
|
||||
"lastModified": "2024-07-16T10:15:03.380",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "An SQL Injection vulnerability in Apache Superset exists due to improper neutralization of special elements used in SQL commands. Specifically, certain engine-specific functions are not checked, which allows attackers to bypass Apache Superset's SQL authorization. To mitigate this, a new configuration key named DISALLOWED_SQL_FUNCTIONS has been introduced. This key disallows the use of the following PostgreSQL functions: version, query_to_xml, inet_server_addr, and inet_client_addr. Additional functions can be added to this list for increased protection.\n\nThis issue affects Apache Superset: before 4.0.2.\n\nUsers are recommended to upgrade to version 4.0.2, which fixes the issue.\n\n"
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security@apache.org",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 4.3,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 1.4
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security@apache.org",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-89"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://lists.apache.org/thread/j55vm41jg3l0x6w49zrmvbf3k0ts5fqz",
|
||||
"source": "security@apache.org"
|
||||
}
|
||||
]
|
||||
}
|
52
CVE-2024/CVE-2024-64xx/CVE-2024-6457.json
Normal file
52
CVE-2024/CVE-2024-64xx/CVE-2024-6457.json
Normal file
@ -0,0 +1,52 @@
|
||||
{
|
||||
"id": "CVE-2024-6457",
|
||||
"sourceIdentifier": "security@wordfence.com",
|
||||
"published": "2024-07-16T11:15:10.097",
|
||||
"lastModified": "2024-07-16T11:15:10.097",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "The HUSKY \u2013 Products Filter Professional for WooCommerce plugin for WordPress is vulnerable to time-based SQL Injection via the \u2018woof_author\u2019 parameter in all versions up to, and including, 1.3.6 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for unauthenticated attackers to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security@wordfence.com",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/browser/woocommerce-products-filter/trunk/ext/by_author/index.php#L102",
|
||||
"source": "security@wordfence.com"
|
||||
},
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/changeset/3116888/",
|
||||
"source": "security@wordfence.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/ecfdf7b1-9bb8-4c1d-a00a-ca1e44440cab?source=cve",
|
||||
"source": "security@wordfence.com"
|
||||
}
|
||||
]
|
||||
}
|
56
CVE-2024/CVE-2024-65xx/CVE-2024-6579.json
Normal file
56
CVE-2024/CVE-2024-65xx/CVE-2024-6579.json
Normal file
@ -0,0 +1,56 @@
|
||||
{
|
||||
"id": "CVE-2024-6579",
|
||||
"sourceIdentifier": "security@wordfence.com",
|
||||
"published": "2024-07-16T10:15:03.797",
|
||||
"lastModified": "2024-07-16T10:15:03.797",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "The Web and WooCommerce Addons for WPBakery Builder plugin for WordPress is vulnerable to unauthorized plugin settings modification due to a missing capability check on several plugin functions in all versions up to, and including, 1.4.5. This makes it possible for authenticated attackers, with Subscriber-level access and above, to change some of the plugin settings."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security@wordfence.com",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 4.3,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 1.4
|
||||
}
|
||||
]
|
||||
},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/browser/vc-addons-by-bit14/tags/1.4.5/bit14-vc-addons.php#L102",
|
||||
"source": "security@wordfence.com"
|
||||
},
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/browser/vc-addons-by-bit14/tags/1.4.5/bit14-vc-addons.php#L114",
|
||||
"source": "security@wordfence.com"
|
||||
},
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/browser/vc-addons-by-bit14/tags/1.4.5/bit14-vc-addons.php#L125",
|
||||
"source": "security@wordfence.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/746b77c9-64f8-43e8-9c2a-ce6bc35fd24c?source=cve",
|
||||
"source": "security@wordfence.com"
|
||||
}
|
||||
]
|
||||
}
|
56
CVE-2024/CVE-2024-66xx/CVE-2024-6621.json
Normal file
56
CVE-2024/CVE-2024-66xx/CVE-2024-6621.json
Normal file
@ -0,0 +1,56 @@
|
||||
{
|
||||
"id": "CVE-2024-6621",
|
||||
"sourceIdentifier": "security@wordfence.com",
|
||||
"published": "2024-07-16T11:15:10.357",
|
||||
"lastModified": "2024-07-16T11:15:10.357",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "The RSS Aggregator \u2013 RSS Import, News Feeds, Feed to Post, and Autoblogging plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the 'wprss_activate_feed_source' and 'wprss_pause_feed_source' functions in all versions up to, and including, 4.23.11. This makes it possible for authenticated attackers, with Subscriber-level access and above, to activate or pause existing RSS feeds."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security@wordfence.com",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 4.3,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 1.4
|
||||
}
|
||||
]
|
||||
},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/browser/wp-rss-aggregator/trunk/includes/feed-states.php#L12",
|
||||
"source": "security@wordfence.com"
|
||||
},
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/browser/wp-rss-aggregator/trunk/includes/feed-states.php#L28",
|
||||
"source": "security@wordfence.com"
|
||||
},
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/browser/wp-rss-aggregator/trunk/includes/feed-states.php?rev=3118231",
|
||||
"source": "security@wordfence.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/8e37331b-0b75-41ee-b390-532efd674cc1?source=cve",
|
||||
"source": "security@wordfence.com"
|
||||
}
|
||||
]
|
||||
}
|
25
README.md
25
README.md
@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours.
|
||||
### Last Repository Update
|
||||
|
||||
```plain
|
||||
2024-07-16T10:00:18.244546+00:00
|
||||
2024-07-16T12:00:17.806834+00:00
|
||||
```
|
||||
|
||||
### Most recent CVE Modification Timestamp synchronized with NVD
|
||||
|
||||
```plain
|
||||
2024-07-16T09:15:03.460000+00:00
|
||||
2024-07-16T11:15:10.357000+00:00
|
||||
```
|
||||
|
||||
### Last Data Feed Release
|
||||
@ -33,29 +33,24 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
|
||||
### Total Number of included CVEs
|
||||
|
||||
```plain
|
||||
257088
|
||||
257093
|
||||
```
|
||||
|
||||
### CVEs added in the last Commit
|
||||
|
||||
Recently added CVEs: `9`
|
||||
Recently added CVEs: `5`
|
||||
|
||||
- [CVE-2023-52290](CVE-2023/CVE-2023-522xx/CVE-2023-52290.json) (`2024-07-16T08:15:02.050`)
|
||||
- [CVE-2024-1937](CVE-2024/CVE-2024-19xx/CVE-2024-1937.json) (`2024-07-16T09:15:02.257`)
|
||||
- [CVE-2024-2691](CVE-2024/CVE-2024-26xx/CVE-2024-2691.json) (`2024-07-16T09:15:02.497`)
|
||||
- [CVE-2024-3587](CVE-2024/CVE-2024-35xx/CVE-2024-3587.json) (`2024-07-16T09:15:02.693`)
|
||||
- [CVE-2024-3779](CVE-2024/CVE-2024-37xx/CVE-2024-3779.json) (`2024-07-16T09:15:02.877`)
|
||||
- [CVE-2024-41008](CVE-2024/CVE-2024-410xx/CVE-2024-41008.json) (`2024-07-16T08:15:02.240`)
|
||||
- [CVE-2024-5852](CVE-2024/CVE-2024-58xx/CVE-2024-5852.json) (`2024-07-16T09:15:03.093`)
|
||||
- [CVE-2024-6565](CVE-2024/CVE-2024-65xx/CVE-2024-6565.json) (`2024-07-16T09:15:03.280`)
|
||||
- [CVE-2024-6570](CVE-2024/CVE-2024-65xx/CVE-2024-6570.json) (`2024-07-16T09:15:03.460`)
|
||||
- [CVE-2023-52886](CVE-2023/CVE-2023-528xx/CVE-2023-52886.json) (`2024-07-16T10:15:02.493`)
|
||||
- [CVE-2024-39887](CVE-2024/CVE-2024-398xx/CVE-2024-39887.json) (`2024-07-16T10:15:03.380`)
|
||||
- [CVE-2024-6457](CVE-2024/CVE-2024-64xx/CVE-2024-6457.json) (`2024-07-16T11:15:10.097`)
|
||||
- [CVE-2024-6579](CVE-2024/CVE-2024-65xx/CVE-2024-6579.json) (`2024-07-16T10:15:03.797`)
|
||||
- [CVE-2024-6621](CVE-2024/CVE-2024-66xx/CVE-2024-6621.json) (`2024-07-16T11:15:10.357`)
|
||||
|
||||
|
||||
### CVEs modified in the last Commit
|
||||
|
||||
Recently modified CVEs: `1`
|
||||
Recently modified CVEs: `0`
|
||||
|
||||
- [CVE-2024-6559](CVE-2024/CVE-2024-65xx/CVE-2024-6559.json) (`2024-07-16T07:15:02.373`)
|
||||
|
||||
|
||||
## Download and Usage
|
||||
|
25
_state.csv
25
_state.csv
@ -238344,7 +238344,7 @@ CVE-2023-52286,0,0,d57c75df7d4ddd4390fb4bc0cb787c8d5ccb33cbef5a941d5aa3217832550
|
||||
CVE-2023-52288,0,0,297c3e93d2578fa4354d42073bbfcc9c84a93418874a891bfd157ba56fb9cdc0,2024-01-24T18:40:15.637000
|
||||
CVE-2023-52289,0,0,b0b62bf64cde12eff577800bdca9d7c0c719bc9a23d6c24a235e18254584af67,2024-01-24T18:48:24.283000
|
||||
CVE-2023-5229,0,0,96ae4a14c7f75bcf2b6cbe69f7946f8795ec64211a57e06d1e0d2d6ff05a7656,2023-11-08T18:35:10.590000
|
||||
CVE-2023-52290,1,1,399464231e49f20d23c72354bf5bf48a11eea79c84ca0e19d03bd235db0575a9,2024-07-16T08:15:02.050000
|
||||
CVE-2023-52290,0,0,399464231e49f20d23c72354bf5bf48a11eea79c84ca0e19d03bd235db0575a9,2024-07-16T08:15:02.050000
|
||||
CVE-2023-52296,0,0,85a5b959f2db874145dc7271afa4c982911881063ce8b8741fd891792d7a0806,2024-06-10T17:16:16.537000
|
||||
CVE-2023-5230,0,0,a536f5ec0e596e59d6ed211c038722ef9594f65abf67a435dc22663a31135f5f,2023-11-07T04:23:38.493000
|
||||
CVE-2023-52302,0,0,22ea8ee42f1d0c97611b1d0c11616324d4f2cec9c11a2c69cd863452202dca24,2024-01-05T12:14:39.403000
|
||||
@ -238944,6 +238944,7 @@ CVE-2023-52882,0,0,e51efc18668383cabb6a1a97b2fa54b9809b5bd71d28b08d72a7fdf9caf29
|
||||
CVE-2023-52883,0,0,97759c00758e41d95ed1ae62b92bf41e3188ce0db01c0040d74fe100684b74d7,2024-07-03T01:44:10.627000
|
||||
CVE-2023-52884,0,0,bbf325b5c1ed57a9d1f4ab6303e0df9c8a8b60b96f00c7266f34fe596a2f1382,2024-06-21T11:22:01.687000
|
||||
CVE-2023-52885,0,0,e5c658cfc56d45f1e026b5e9d3b2354382c669c4a8a58f5c853288778028aada,2024-07-15T13:00:34.853000
|
||||
CVE-2023-52886,1,1,95f860132fb440ef5db5a693cde04172b145869bb82e837d027d0e58b83d8654,2024-07-16T10:15:02.493000
|
||||
CVE-2023-5289,0,0,85a0656428a156af531ef9ce48391ff960ba4c2a8af32298a7386854e98b6d86,2023-10-02T18:13:04.227000
|
||||
CVE-2023-52890,0,0,98d004bfa32a49234fd94c1d29c092368def9b12c09abef3185e148025b433c1,2024-06-13T18:36:09.010000
|
||||
CVE-2023-52891,0,0,5e151a4d8c6f84e3d9dd04a36315448ea54aacacf0306d24e88a33c5bc6a9764,2024-07-09T18:19:14.047000
|
||||
@ -242424,7 +242425,7 @@ CVE-2024-1933,0,0,7fbc0f24622f50a410caa37f8d4d0022d31f3ba694aaa208855480ee88f0fa
|
||||
CVE-2024-1934,0,0,df6bc0820efaa227ff0593f2f377a2941dbe3870867c525b59689743a10c0b3a,2024-04-10T13:23:38.787000
|
||||
CVE-2024-1935,0,0,ca5903a177c0640c0e970926382a56ffbeaa4621c2c3291cf867a2ac2d3da56b,2024-03-13T18:15:58.530000
|
||||
CVE-2024-1936,0,0,b663fea20770354eab8754ae6925549962e39174687f5155b204d5fec65f6ae3,2024-03-23T12:15:08.453000
|
||||
CVE-2024-1937,1,1,e4267aecc6d36cf0089bfd3a7de2bf38a789e042581a5e82e29812af34d12152,2024-07-16T09:15:02.257000
|
||||
CVE-2024-1937,0,0,e4267aecc6d36cf0089bfd3a7de2bf38a789e042581a5e82e29812af34d12152,2024-07-16T09:15:02.257000
|
||||
CVE-2024-1938,0,0,c00952c8fb5bee70009fa8cb4edae0ee23e0cf49f38d1396820ee571c21d4610,2024-03-07T23:15:07.177000
|
||||
CVE-2024-1939,0,0,bb8e8d14c3c98da37e63f3c0963deaed3de9feadfccc15528efb01aca2c53754,2024-03-07T23:15:07.250000
|
||||
CVE-2024-1940,0,0,4f9f4862eb1e6b7652f757b60ccb034b4f77619e6171d9f3805603ac6e0c779f,2024-06-06T13:59:09.023000
|
||||
@ -246984,7 +246985,7 @@ CVE-2024-26906,0,0,42532862975f8bdf6c218bb08e8c76f0bdeb5f292a8c20c2de1b8755512c9
|
||||
CVE-2024-26907,0,0,00d718a412070a4297719ea0fb3f7b55969fac373e166e4b352e4dbc743daf28,2024-06-25T22:15:25.960000
|
||||
CVE-2024-26908,0,0,5ecc683879bcc08f4a65e6b0675afebd2da7cfed4f9fada740f88a540c7f8b1e,2024-04-30T08:15:17.140000
|
||||
CVE-2024-26909,0,0,e3d7941f07403bc0745f4894278d17e22a07c87692715dac5395fbc71a84fef3,2024-04-29T19:45:21.680000
|
||||
CVE-2024-2691,1,1,c8155cf95104d3314cc19d2c5bb788d687f54a9effa3d22a2941545abbd34823,2024-07-16T09:15:02.497000
|
||||
CVE-2024-2691,0,0,c8155cf95104d3314cc19d2c5bb788d687f54a9effa3d22a2941545abbd34823,2024-07-16T09:15:02.497000
|
||||
CVE-2024-26910,0,0,954b55e4bd1d42e5ff1449b1b11f06a07bc8c27711bedf28e87052fdaee0aafd,2024-06-25T22:15:26.080000
|
||||
CVE-2024-26911,0,0,8ea2c917a6f00806416f32a6fbb36b2b35e7e18ca96874650f1bec8c514fcc80,2024-04-29T19:17:11.627000
|
||||
CVE-2024-26912,0,0,7c8d0e30edc101bfc2f9acae1bf1398abcf215c4aec3726d727c7375cc839a46,2024-04-29T19:20:57.410000
|
||||
@ -252865,7 +252866,7 @@ CVE-2024-35866,0,0,d0cc46812d56583865578aa7a7be2bec064126c2ec11cb3bbce2698115126
|
||||
CVE-2024-35867,0,0,68386f3591f3f188a7476fa5855f8ac1dc116de9bd02ee457a082f6580699d33,2024-06-10T18:15:35.320000
|
||||
CVE-2024-35868,0,0,631a0c47c7e0f65d439b8d71d6b3955aaa25bc09ab742cc924c15db6f46c8b06,2024-05-20T13:00:04.957000
|
||||
CVE-2024-35869,0,0,630ed395e8d0f836b200232a6be2974e06759cee7a4d75dd11d6f714bebe5b1a,2024-07-03T02:02:21.027000
|
||||
CVE-2024-3587,1,1,88b9b543afe49e9f934075704f8082a980511b2f85cc799b5dd54b8dae7b2bb8,2024-07-16T09:15:02.693000
|
||||
CVE-2024-3587,0,0,88b9b543afe49e9f934075704f8082a980511b2f85cc799b5dd54b8dae7b2bb8,2024-07-16T09:15:02.693000
|
||||
CVE-2024-35870,0,0,5a4167864efc3408c5c38cf8552b084d6c8e10c92910519cd2e6cedd908441ad,2024-05-20T13:00:04.957000
|
||||
CVE-2024-35871,0,0,56b9e1c7cf8cc227a53238857c6c657b9eb9a1a650e2c064780cac494ab192c4,2024-06-25T22:15:31.897000
|
||||
CVE-2024-35872,0,0,a0f59ba2a5d815fbc998062ea3a953e4acbf876ea21309bca7a7ecb80bc6c92e,2024-05-20T13:00:04.957000
|
||||
@ -253997,7 +253998,7 @@ CVE-2024-37769,0,0,0dd3289504de1965084308bd25d0eda77c1cd774bf0e49f4dc5febf221f8f
|
||||
CVE-2024-3777,0,0,0856ef763b1edbec0747809f2f5f1e269fdce9f6160541c599d8c16e527540d3,2024-04-15T13:15:31.997000
|
||||
CVE-2024-37770,0,0,4e93402ad3ed64140e35d7a96007b07c29c5c8b6e92be0f25f51076d1a6ceeef,2024-07-11T15:05:53.090000
|
||||
CVE-2024-3778,0,0,2b5fc9c77ae2f993ef971da35cf3870af6c405ab91c786afef1cf6cf11c368d8,2024-04-15T13:15:31.997000
|
||||
CVE-2024-3779,1,1,91cee144c8c80dcf7bc1667f9cc8611fac537eb0e56447cc423f1b595ce894d9,2024-07-16T09:15:02.877000
|
||||
CVE-2024-3779,0,0,91cee144c8c80dcf7bc1667f9cc8611fac537eb0e56447cc423f1b595ce894d9,2024-07-16T09:15:02.877000
|
||||
CVE-2024-37790,0,0,f03d38fcd39f9fc913c999134089e43d5d97a0d5c9124acb1959f0950b818b81,2024-06-21T16:15:12.440000
|
||||
CVE-2024-37791,0,0,5b4a77640e01b5f5901f77da4cf3e217016c11878e7475119bb550241e2deb0e,2024-06-20T12:44:01.637000
|
||||
CVE-2024-37794,0,0,0173114c4850547998c4a3719d0197d2f797f34c9e250dbc5cfe23ea2cc8953b,2024-07-03T02:04:43.130000
|
||||
@ -254897,6 +254898,7 @@ CVE-2024-39882,0,0,e74451f1f7696dcf4f6c0a8b25bc99b29b39e5965867fdeded2910a86a4bc
|
||||
CVE-2024-39883,0,0,4125ead3dab96c17b3201223bdf7a64af624f714119f6cbaa67f57f3faea3add,2024-07-11T13:05:54.930000
|
||||
CVE-2024-39884,0,0,820d6f61ede8e42a2beabc4b322a42eecc24064bf6142891f1909848431996b5,2024-07-12T14:15:16.640000
|
||||
CVE-2024-39886,0,0,c211eb7fd7b7d4a2dcf17c01e99303dbbe9f112b3010b65271b5f2c7acb830e8,2024-07-11T15:06:15.210000
|
||||
CVE-2024-39887,1,1,fa7d2a734a057d0930b288c8c3ecef13f855e852c225bf49ff576829c5d9a630,2024-07-16T10:15:03.380000
|
||||
CVE-2024-39888,0,0,12ac4fc0e9c84bce2da7114954ff2c2a0c7f51f26f043191b5bde403ad5b0bce,2024-07-09T18:19:14.047000
|
||||
CVE-2024-3989,0,0,05ae590a507d36950ff969d05988ddbd0846a5630f6cd12721f077e7e440e592,2024-05-14T16:11:39.510000
|
||||
CVE-2024-39891,0,0,f05a058a4cf741da51f47b19ea162b25ce262cdb61fb36618eb53dc7411c00e3,2024-07-03T22:15:02.923000
|
||||
@ -255201,7 +255203,7 @@ CVE-2024-41004,0,0,0147872dc41ee82345f1b96b142030c80a622f5d5ebc79db0dff57faab054
|
||||
CVE-2024-41005,0,0,95f568882fd1e16260f486a6121f76b4a7b47a9225c03cbcf7d46d652c71fb30,2024-07-12T16:34:58.687000
|
||||
CVE-2024-41006,0,0,58bd6c502a79651b26621eacf2c0dc46dab924e02809c912fba2631a5541c0df,2024-07-12T16:34:58.687000
|
||||
CVE-2024-41007,0,0,0f7451f1f6e903e68c19bb8e4507bcc8b91d7d8b575b739ec33e4181b2fd01a7,2024-07-15T13:00:34.853000
|
||||
CVE-2024-41008,1,1,661ecdbcb3ca98cbdd2da931d1a244c9e6ccdaf7950933bf8c08cc771f962839,2024-07-16T08:15:02.240000
|
||||
CVE-2024-41008,0,0,661ecdbcb3ca98cbdd2da931d1a244c9e6ccdaf7950933bf8c08cc771f962839,2024-07-16T08:15:02.240000
|
||||
CVE-2024-4102,0,0,1b0aaa7efbf772a3034d5138f2cde018af6a8f41a0229b0c5f36e4d66092a2a3,2024-07-09T18:19:14.047000
|
||||
CVE-2024-4103,0,0,ff27f3988e30e41f465bfc5b7800f7ae2f96b1e2cd71c1414de16617b75fe4fe,2024-05-14T16:11:39.510000
|
||||
CVE-2024-4104,0,0,069e7afb1610585640d00d566d3fc4756dff3571ed269cd2ef1d63c8e8ce45e5,2024-05-14T16:11:39.510000
|
||||
@ -256625,7 +256627,7 @@ CVE-2024-5845,0,0,23de9b938edaad5f473a2b639120a3c8d86f1b1045f6e52453cfa63e2bd47f
|
||||
CVE-2024-5846,0,0,0b2d8f18d514785edc16bc8a9875d408ec093858a0edbb60b84e2acabc32d1b0,2024-07-03T02:09:30.583000
|
||||
CVE-2024-5847,0,0,af863962a64ba64b748fc267021bdca1358cb53ef73ef1a0e2073c98890c9fa1,2024-07-03T02:09:31.730000
|
||||
CVE-2024-5851,0,0,d34c335450811da4c8dbeb823a49b4fedf64cc8a5affcfcc32e2d9d5897f0dc8,2024-06-13T18:36:09.013000
|
||||
CVE-2024-5852,1,1,86ceec61c837be95a959741a38099dee81d338c029d4fc32b9bec0e93f1eb706,2024-07-16T09:15:03.093000
|
||||
CVE-2024-5852,0,0,86ceec61c837be95a959741a38099dee81d338c029d4fc32b9bec0e93f1eb706,2024-07-16T09:15:03.093000
|
||||
CVE-2024-5853,0,0,fce39775d007fbc741a3f2bc4fb52875073a382bd362c86e3cd6e44d0a9e6207,2024-06-20T12:44:01.637000
|
||||
CVE-2024-5855,0,0,470fd388735694b7759ccf5036e6a18639fe074b164bc2d2da9695a799e80c03,2024-07-09T18:19:14.047000
|
||||
CVE-2024-5856,0,0,6c7682487972a7913d7724c221dec1f8cbbbfbf7a2635cc868862316d948dc72,2024-07-09T18:19:14.047000
|
||||
@ -256986,6 +256988,7 @@ CVE-2024-6441,0,0,15383e1684ea64dc1d374e71fe60467b8bfc18bde94b0e73415ebe68688c21
|
||||
CVE-2024-6447,0,0,45fe1e3b45bb9052a54143ac6931092e1b37ff897cd56aa11e3df59780bc06cb,2024-07-11T13:05:54.930000
|
||||
CVE-2024-6452,0,0,c694c1bdf54902e69172121aae2a54d0747cfc16750499c01d3cf3c9c6ef3263,2024-07-03T12:53:24.977000
|
||||
CVE-2024-6453,0,0,f8f94ef1371b1813320fb500c8f5a2a5c78562059f37a370c24f1cfd03cdaa59,2024-07-03T12:53:24.977000
|
||||
CVE-2024-6457,1,1,7987e557c2c95095adc4ad17acf4ed1e2acc7eba81f89223deeca3346bc09dcb,2024-07-16T11:15:10.097000
|
||||
CVE-2024-6461,0,0,86a214d0c7bd3f57cea37cd567b01f1a0e55f8d4342f6c7c46fd15b8942c8d90,2024-07-03T21:15:04.580000
|
||||
CVE-2024-6463,0,0,f8d7d80ca565804c0caafdbc8214fe1eca7dc83d43861affc813af07365c0cc0,2024-07-03T21:15:04.640000
|
||||
CVE-2024-6464,0,0,8fab89d1b3aef32a257cf0d7fb909cce6ac18d5ef8dc898bb9f0cc6c52356cbf,2024-07-03T21:15:04.697000
|
||||
@ -257018,12 +257021,13 @@ CVE-2024-6554,0,0,c39b715167392909a130cc6479af2acca1cb23375ca0bdab5b0fb951f0bce6
|
||||
CVE-2024-6555,0,0,bf68ef8f1bd3876021fc33b504457daba53832080530806ef27f797ea5536a0b,2024-07-12T12:49:07.030000
|
||||
CVE-2024-6556,0,0,246920c1b32eb0a0369982110178f9a30464427865e75d42710950bf8d6bff6c,2024-07-11T13:05:54.930000
|
||||
CVE-2024-6557,0,0,e9ee209561e99679c20203ca6d94da1a0bb55042ea3baa698cb80a889557bbdd,2024-07-16T05:15:15.073000
|
||||
CVE-2024-6559,0,1,16d00b9dee0dd009d20e82307398dc314aff9f5ca223c39785f9792cbd3709f1,2024-07-16T07:15:02.373000
|
||||
CVE-2024-6559,0,0,16d00b9dee0dd009d20e82307398dc314aff9f5ca223c39785f9792cbd3709f1,2024-07-16T07:15:02.373000
|
||||
CVE-2024-6563,0,0,1b4d88909a8afd884220e1df693026407578c717bcca7ba5cdd4e0bbbf29fb3c,2024-07-09T14:19:19.300000
|
||||
CVE-2024-6564,0,0,b381c943e4dc87d72df0560a8008d835d4542fba3e8b6a3b21a1beca0e3a3fa5,2024-07-09T14:19:14.760000
|
||||
CVE-2024-6565,1,1,e7bb9ab08c108dc5070f2ca7ce46012474968cec63ff45f286f24d7239498860,2024-07-16T09:15:03.280000
|
||||
CVE-2024-6570,1,1,ccdbc86ad4745a63c6205119102457147a7c895153aa9ebe1080a60ef714da42,2024-07-16T09:15:03.460000
|
||||
CVE-2024-6565,0,0,e7bb9ab08c108dc5070f2ca7ce46012474968cec63ff45f286f24d7239498860,2024-07-16T09:15:03.280000
|
||||
CVE-2024-6570,0,0,ccdbc86ad4745a63c6205119102457147a7c895153aa9ebe1080a60ef714da42,2024-07-16T09:15:03.460000
|
||||
CVE-2024-6574,0,0,63009fc3946aa6aa37035c823fc25710c373929512d42b52b922f4cc721537b8,2024-07-15T13:00:34.853000
|
||||
CVE-2024-6579,1,1,a0d916f5ee4dd254726798359f0bc3afc6dffb6f97426f2dcd8f47cc4f912602,2024-07-16T10:15:03.797000
|
||||
CVE-2024-6580,0,0,d43dfa58651574c4447e8f323f3cb1f6a00d6bdef0613d5834aefccecf968c5d,2024-07-09T18:19:14.047000
|
||||
CVE-2024-6588,0,0,67672e854c20766f2e15151fa1e111ec8310b7083a57f535c99159d2ce6e5af7,2024-07-12T12:49:07.030000
|
||||
CVE-2024-6598,0,0,fb802128b1cfc176540749693b684b4374936099ab1c7948c1ec819266291908,2024-07-09T18:19:14.047000
|
||||
@ -257043,6 +257047,7 @@ CVE-2024-6612,0,0,ec773de601f2439d4a30794cb33ecbe4d766cb102d1b031aeb7c612ae57eb7
|
||||
CVE-2024-6613,0,0,972e81253130c3ea1fca72705a438fd241a2b5ffe08560847fb64da88d1289db,2024-07-09T18:18:38.713000
|
||||
CVE-2024-6614,0,0,1be1fa04167dbe1739c8748fecedef47a7bd73d4360fbc6878e091dbbe1de7b2,2024-07-09T18:18:38.713000
|
||||
CVE-2024-6615,0,0,7bf7f5fde3708291832ebfaaca065d46b502caca4507586f81d1026c39461379,2024-07-09T18:18:38.713000
|
||||
CVE-2024-6621,1,1,0120997ff260c74340cb1d016c95dd3114a00638d7a855e82645f855d0462929,2024-07-16T11:15:10.357000
|
||||
CVE-2024-6624,0,0,d641d0598d5f0d62f69b2f0bb30153f1263b9aa17a64dd7567b42517a1bc6027,2024-07-12T16:51:31.487000
|
||||
CVE-2024-6625,0,0,b913737eefce9f28c47dc537f0edd398b1eeb297cd2eb30c69b59c3401317130,2024-07-12T12:49:07.030000
|
||||
CVE-2024-6630,0,0,7742b604143993a9d769b9ab9c3e5aab85337a51e6772bb186961af80d29fee2,2024-07-10T18:15:05.407000
|
||||
|
Can't render this file because it is too large.
|
Loading…
x
Reference in New Issue
Block a user