mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-05-06 18:52:58 +00:00
Auto-Update: 2024-07-12T16:00:17.941069+00:00
This commit is contained in:
parent
0d4c5c6ecc
commit
7fca3af5f3
@ -2,8 +2,9 @@
|
||||
"id": "CVE-2021-41037",
|
||||
"sourceIdentifier": "emo@eclipse.org",
|
||||
"published": "2022-07-08T04:15:13.833",
|
||||
"lastModified": "2022-07-15T22:38:02.777",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2024-07-12T14:15:10.960",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -41,20 +42,20 @@
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:L",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "LOW",
|
||||
"baseScore": 5.5,
|
||||
"baseSeverity": "MEDIUM"
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 10.0,
|
||||
"baseSeverity": "CRITICAL"
|
||||
},
|
||||
"exploitabilityScore": 2.1,
|
||||
"impactScore": 3.4
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 6.0
|
||||
}
|
||||
],
|
||||
"cvssMetricV2": [
|
||||
@ -131,6 +132,10 @@
|
||||
"Mailing List",
|
||||
"Vendor Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/eclipse-equinox/p2/issues/235",
|
||||
"source": "emo@eclipse.org"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,9 @@
|
||||
"id": "CVE-2023-3568",
|
||||
"sourceIdentifier": "security@huntr.dev",
|
||||
"published": "2023-07-10T16:15:56.450",
|
||||
"lastModified": "2023-08-02T09:15:14.110",
|
||||
"vulnStatus": "Modified",
|
||||
"lastModified": "2024-07-12T14:17:46.530",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -97,11 +98,17 @@
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/alextselegidis/easyappointments/commit/b37b46019553089db4f22eb2fe998bca84b2cb64",
|
||||
"source": "security@huntr.dev"
|
||||
"source": "security@huntr.dev",
|
||||
"tags": [
|
||||
"Not Applicable"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://huntr.dev/bounties/e8d530db-a6a7-4f79-a95d-b77654cc04f8",
|
||||
"source": "security@huntr.dev"
|
||||
"source": "security@huntr.dev",
|
||||
"tags": [
|
||||
"Not Applicable"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,16 @@
|
||||
"id": "CVE-2023-36091",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-07-31T14:15:10.583",
|
||||
"lastModified": "2024-05-17T02:25:36.197",
|
||||
"lastModified": "2024-07-12T15:15:10.333",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [
|
||||
{
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"tags": [
|
||||
"unsupported-when-assigned"
|
||||
]
|
||||
}
|
||||
],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,17 +2,41 @@
|
||||
"id": "CVE-2024-27360",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-07-09T18:15:09.370",
|
||||
"lastModified": "2024-07-09T18:18:38.713",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-07-12T14:57:53.930",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A vulnerability was discovered in Samsung Mobile Processors Exynos 850, Exynos 1080, Exynos 2100, Exynos 2200, Exynos 1280, Exynos 1380, Exynos 1330, and Exynos W930 where they do not properly check length of the data, which can lead to a Denial of Service."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Se descubri\u00f3 una vulnerabilidad en los procesadores m\u00f3viles Samsung Exynos 850, Exynos 1080, Exynos 2100, Exynos 2200, Exynos 1280, Exynos 1380, Exynos 1330 y Exynos W930 donde no verifican adecuadamente la longitud de los datos, lo que puede provocar una denegaci\u00f3n de Servicio."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 7.5,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 3.6
|
||||
},
|
||||
{
|
||||
"source": "cve@mitre.org",
|
||||
"type": "Secondary",
|
||||
@ -35,14 +59,250 @@
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-1284"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:samsung:exynos_850_firmware:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "1928760C-4FC4-45B0-84FF-C1105CD1DD2A"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:samsung:exynos_850:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "BB410A6D-642B-49AE-8B1C-EADA953A84DA"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:samsung:exynos_1080_firmware:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "43DE4D6F-D662-46F2-93BC-9AE950320BDE"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:samsung:exynos_1080:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "EE06CD56-8BFD-4208-843A-179E3E6F5C10"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:samsung:exynos_2100_firmware:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "89B88BFE-3C82-498C-8EC1-5784836DB1A1"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:samsung:exynos_2100:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "9385885D-654A-496E-8029-7C6D9B077193"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:samsung:exynos_2200_firmware:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "63C0D9AC-BD23-48C9-83E7-301DEC06E583"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:samsung:exynos_2200:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "A72ADEBB-ED72-4A5B-BB27-95EDE43F8116"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:samsung:exynos_1280_firmware:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "BD1A7B09-9031-4E54-A24F-3237C054166B"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:samsung:exynos_1280:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "DFC68046-2F08-40D1-B158-89D8D9263541"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:samsung:exynos_1380_firmware:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "D381478B-C638-4663-BD71-144BE4B02E46"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:samsung:exynos_1380:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "61E72146-72FE-4B54-AB79-3C665E7F016C"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:samsung:exynos_1330_firmware:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "C2635646-DD6A-4735-8E01-F45445584832"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:samsung:exynos_1330:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "AA0F8A58-71B7-4503-A03A-6FB4282D75BD"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:samsung:exynos_w930_firmware:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "801E188F-C71B-4933-9099-151A4A1B1BC5"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:samsung:exynos_w930:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "8D8FC82D-57C5-4F00-BDF4-4261A32C4246"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://semiconductor.samsung.com/support/quality-support/product-security-updates/",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://semiconductor.samsung.com/support/quality-support/product-security-updates/cve-2024-27360/",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,17 +2,41 @@
|
||||
"id": "CVE-2024-27362",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-07-09T18:15:09.573",
|
||||
"lastModified": "2024-07-09T18:18:38.713",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-07-12T14:58:02.413",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A vulnerability was discovered in Samsung Mobile Processors Exynos 1280, Exynos 2200, Exynos 1330, Exynos 1380, and Exynos 2400 where they do not properly check the length of the data, which can lead to a Information disclosure."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Se descubri\u00f3 una vulnerabilidad en los procesadores m\u00f3viles Samsung Exynos 1280, Exynos 2200, Exynos 1330, Exynos 1380 y Exynos 2400 donde no verifican adecuadamente la longitud de los datos, lo que puede llevar a una divulgaci\u00f3n de informaci\u00f3n."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 7.5,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 3.6
|
||||
},
|
||||
{
|
||||
"source": "cve@mitre.org",
|
||||
"type": "Secondary",
|
||||
@ -35,14 +59,169 @@
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-1284"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:samsung:exynos_1280_firmware:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "BD1A7B09-9031-4E54-A24F-3237C054166B"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:samsung:exynos_1280:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "DFC68046-2F08-40D1-B158-89D8D9263541"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:samsung:exynos_2200_firmware:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "63C0D9AC-BD23-48C9-83E7-301DEC06E583"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:samsung:exynos_2200:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "A72ADEBB-ED72-4A5B-BB27-95EDE43F8116"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:samsung:exynos_1330_firmware:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "C2635646-DD6A-4735-8E01-F45445584832"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:samsung:exynos_1330:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "AA0F8A58-71B7-4503-A03A-6FB4282D75BD"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:samsung:exynos_1380_firmware:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "D381478B-C638-4663-BD71-144BE4B02E46"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:samsung:exynos_1380:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "61E72146-72FE-4B54-AB79-3C665E7F016C"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:samsung:exynos_2400_firmware:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "16D9272E-1794-48FF-B6A4-8F48395BA38E"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:samsung:exynos_2400:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "932F5FB3-5527-44D7-9DD9-EF03963E3CA3"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://semiconductor.samsung.com/support/quality-support/product-security-updates/",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://semiconductor.samsung.com/support/quality-support/product-security-updates/cve-2024-27362/",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,17 +2,41 @@
|
||||
"id": "CVE-2024-28067",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-07-09T18:15:09.790",
|
||||
"lastModified": "2024-07-09T18:18:38.713",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-07-12T14:57:36.897",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A vulnerability in Samsung Exynos Modem 5300 allows a Man-in-the-Middle (MITM) attacker to downgrade the security mode of packets going to the victim, enabling the attacker to send messages to the victim in plaintext."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Una vulnerabilidad en Samsung Exynos Modem 5300 permite a un atacante Man-in-the-Middle (MITM) degradar el modo de seguridad de los paquetes que van a la v\u00edctima, lo que le permite enviar mensajes a la v\u00edctima en texto plano."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "HIGH",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 3.7,
|
||||
"baseSeverity": "LOW"
|
||||
},
|
||||
"exploitabilityScore": 2.2,
|
||||
"impactScore": 1.4
|
||||
},
|
||||
{
|
||||
"source": "cve@mitre.org",
|
||||
"type": "Secondary",
|
||||
@ -35,14 +59,61 @@
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "NVD-CWE-noinfo"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:samsung:exynos_modem_5300_firmware:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "4F66A096-7BA3-47D6-98F4-879C3A4C1FFC"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:samsung:exynos_modem_5300:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "CE202894-D48A-4B9E-B3BD-28529967A0B3"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://semiconductor.samsung.com/support/quality-support/product-security-updates/",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://semiconductor.samsung.com/support/quality-support/product-security-updates/cve-2024-28067/",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,17 +2,41 @@
|
||||
"id": "CVE-2024-31957",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-07-09T18:15:10.013",
|
||||
"lastModified": "2024-07-09T18:18:38.713",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-07-12T14:53:30.260",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A vulnerability was discovered in Samsung Mobile Processors Exynos 2200 and Exynos 2400 where they lack a check for the validation of native handles, which can result in a DoS(Denial of Service) attack by unmapping an invalid length."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Se descubri\u00f3 una vulnerabilidad en los procesadores m\u00f3viles Samsung Exynos 2200 y Exynos 2400 donde carecen de una verificaci\u00f3n para la validaci\u00f3n de identificadores nativos, lo que puede resultar en un ataque DoS (denegaci\u00f3n de servicio) al desasignar una longitud no v\u00e1lida."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 7.5,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 3.6
|
||||
},
|
||||
{
|
||||
"source": "cve@mitre.org",
|
||||
"type": "Secondary",
|
||||
@ -35,14 +59,88 @@
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-1284"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:samsung:exynos_2200_firmware:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "63C0D9AC-BD23-48C9-83E7-301DEC06E583"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:samsung:exynos_2200:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "A72ADEBB-ED72-4A5B-BB27-95EDE43F8116"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:samsung:exynos_2400_firmware:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "16D9272E-1794-48FF-B6A4-8F48395BA38E"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:samsung:exynos_2400:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "932F5FB3-5527-44D7-9DD9-EF03963E3CA3"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://semiconductor.samsung.com/support/quality-support/product-security-updates/",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://semiconductor.samsung.com/support/quality-support/product-security-updates/cve-2024-31957/",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
56
CVE-2024/CVE-2024-357xx/CVE-2024-35773.json
Normal file
56
CVE-2024/CVE-2024-357xx/CVE-2024-35773.json
Normal file
@ -0,0 +1,56 @@
|
||||
{
|
||||
"id": "CVE-2024-35773",
|
||||
"sourceIdentifier": "audit@patchstack.com",
|
||||
"published": "2024-07-12T14:15:11.437",
|
||||
"lastModified": "2024-07-12T14:15:11.437",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Cross-Site Request Forgery (CSRF) vulnerability in WPJohnny, zerOneIT Comment Reply Email allows Cross-Site Scripting (XSS).This issue affects Comment Reply Email: from n/a through 1.3."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "LOW",
|
||||
"baseScore": 7.1,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 3.7
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-352"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://patchstack.com/database/vulnerability/comment-reply-email/wordpress-comment-reply-email-plugin-1-3-csrf-to-stored-xss-vulnerability?_s_id=cve",
|
||||
"source": "audit@patchstack.com"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-36387",
|
||||
"sourceIdentifier": "security@apache.org",
|
||||
"published": "2024-07-01T19:15:03.497",
|
||||
"lastModified": "2024-07-02T12:09:16.907",
|
||||
"lastModified": "2024-07-12T14:15:11.670",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -32,6 +32,10 @@
|
||||
{
|
||||
"url": "https://httpd.apache.org/security/vulnerabilities_24.html",
|
||||
"source": "security@apache.org"
|
||||
},
|
||||
{
|
||||
"url": "https://security.netapp.com/advisory/ntap-20240712-0001/",
|
||||
"source": "security@apache.org"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-36522",
|
||||
"sourceIdentifier": "security@apache.org",
|
||||
"published": "2024-07-12T13:15:11.867",
|
||||
"lastModified": "2024-07-12T13:15:11.867",
|
||||
"lastModified": "2024-07-12T14:15:11.987",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -25,6 +25,10 @@
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "http://www.openwall.com/lists/oss-security/2024/07/12/2",
|
||||
"source": "security@apache.org"
|
||||
},
|
||||
{
|
||||
"url": "https://lists.apache.org/thread/w613qh7yors840pbx00l1pq6wkl9jzkc",
|
||||
"source": "security@apache.org"
|
||||
|
56
CVE-2024/CVE-2024-372xx/CVE-2024-37202.json
Normal file
56
CVE-2024/CVE-2024-372xx/CVE-2024-37202.json
Normal file
@ -0,0 +1,56 @@
|
||||
{
|
||||
"id": "CVE-2024-37202",
|
||||
"sourceIdentifier": "audit@patchstack.com",
|
||||
"published": "2024-07-12T14:15:12.063",
|
||||
"lastModified": "2024-07-12T14:15:12.063",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Missing Authorization vulnerability in BinaryCarpenter Ultimate Custom Add To Cart Button (Ajax) For WooCommerce by Binary Carpenter allows Cross-Site Scripting (XSS).This issue affects Ultimate Custom Add To Cart Button (Ajax) For WooCommerce by Binary Carpenter: from n/a through 1.222.16."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "LOW",
|
||||
"baseScore": 6.5,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.3,
|
||||
"impactScore": 3.7
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-862"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://patchstack.com/database/vulnerability/custom-add-to-cart-button-for-woocommerce/wordpress-ultimate-custom-add-to-cart-button-ajax-for-woocommerce-by-binary-carpenter-plugin-1-222-16-broken-access-control-to-xss-vulnerability?_s_id=cve",
|
||||
"source": "audit@patchstack.com"
|
||||
}
|
||||
]
|
||||
}
|
56
CVE-2024/CVE-2024-372xx/CVE-2024-37213.json
Normal file
56
CVE-2024/CVE-2024-372xx/CVE-2024-37213.json
Normal file
@ -0,0 +1,56 @@
|
||||
{
|
||||
"id": "CVE-2024-37213",
|
||||
"sourceIdentifier": "audit@patchstack.com",
|
||||
"published": "2024-07-12T14:15:12.293",
|
||||
"lastModified": "2024-07-12T14:15:12.293",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Cross-Site Request Forgery (CSRF) vulnerability in Ali2Woo Team Ali2Woo Lite allows Cross-Site Scripting (XSS).This issue affects Ali2Woo Lite: from n/a through 3.3.9."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "LOW",
|
||||
"baseScore": 7.1,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 3.7
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-352"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://patchstack.com/database/vulnerability/ali2woo-lite/wordpress-aliexpress-dropshipping-with-alinext-lite-plugin-3-3-5-csrf-to-xss-vulnerability?_s_id=cve",
|
||||
"source": "audit@patchstack.com"
|
||||
}
|
||||
]
|
||||
}
|
56
CVE-2024/CVE-2024-375xx/CVE-2024-37544.json
Normal file
56
CVE-2024/CVE-2024-375xx/CVE-2024-37544.json
Normal file
@ -0,0 +1,56 @@
|
||||
{
|
||||
"id": "CVE-2024-37544",
|
||||
"sourceIdentifier": "audit@patchstack.com",
|
||||
"published": "2024-07-12T14:15:12.540",
|
||||
"lastModified": "2024-07-12T14:15:12.540",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Missing Authorization vulnerability in Tobias Conrad Get Better Reviews for WooCommerce.This issue affects Get Better Reviews for WooCommerce: from n/a through 4.0.6."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 4.3,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 1.4
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-862"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://patchstack.com/database/vulnerability/more-better-reviews-for-woocommerce/wordpress-get-better-reviews-for-woocommerce-plugin-4-0-6-broken-access-control-vulnerability?_s_id=cve",
|
||||
"source": "audit@patchstack.com"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-37547",
|
||||
"sourceIdentifier": "audit@patchstack.com",
|
||||
"published": "2024-07-06T15:15:10.500",
|
||||
"lastModified": "2024-07-08T15:49:22.437",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-07-12T15:29:59.473",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -17,6 +17,26 @@
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 7.5,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 3.6
|
||||
},
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Secondary",
|
||||
@ -51,10 +71,31 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:livemesh:elementor_addons:*:*:*:*:*:wordpress:*:*",
|
||||
"versionEndExcluding": "8.4.1",
|
||||
"matchCriteriaId": "89A9C790-94DB-4AFD-84F7-B6829A83C9D2"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://patchstack.com/database/vulnerability/addons-for-elementor/wordpress-elementor-addons-by-livemesh-plugin-8-3-7-local-file-inclusion-vulnerability?_s_id=cve",
|
||||
"source": "audit@patchstack.com"
|
||||
"source": "audit@patchstack.com",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-37553",
|
||||
"sourceIdentifier": "audit@patchstack.com",
|
||||
"published": "2024-07-06T16:15:02.023",
|
||||
"lastModified": "2024-07-08T15:49:22.437",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-07-12T15:24:47.953",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -17,6 +17,26 @@
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 5.4,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.3,
|
||||
"impactScore": 2.7
|
||||
},
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Secondary",
|
||||
@ -51,10 +71,31 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:axelerant:testimonials_widget:*:*:*:*:*:wordpress:*:*",
|
||||
"versionEndIncluding": "4.0.4",
|
||||
"matchCriteriaId": "82036303-703C-4012-8F23-D3EDED119C41"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://patchstack.com/database/vulnerability/testimonials-widget/wordpress-testimonials-widget-plugin-4-0-4-cross-site-scripting-xss-vulnerability?_s_id=cve",
|
||||
"source": "audit@patchstack.com"
|
||||
"source": "audit@patchstack.com",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-37554",
|
||||
"sourceIdentifier": "audit@patchstack.com",
|
||||
"published": "2024-07-06T17:15:09.890",
|
||||
"lastModified": "2024-07-08T15:49:22.437",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-07-12T15:34:57.437",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -17,6 +17,26 @@
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 5.4,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.3,
|
||||
"impactScore": 2.7
|
||||
},
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Secondary",
|
||||
@ -51,10 +71,31 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:codeastrology:ultraaddons:*:*:*:*:*:*:*:*",
|
||||
"versionEndIncluding": "1.1.6",
|
||||
"matchCriteriaId": "B920BDC0-CED3-42C2-BBC7-77C2123596AB"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://patchstack.com/database/vulnerability/ultraaddons-elementor-lite/wordpress-ultraaddons-elementor-addons-header-footer-builder-custom-font-custom-css-woo-widget-menu-builder-anywhere-elementor-shortcode-plugin-1-1-6-cross-site-scripting-xss-vulnerability?_s_id=cve",
|
||||
"source": "audit@patchstack.com"
|
||||
"source": "audit@patchstack.com",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
56
CVE-2024/CVE-2024-375xx/CVE-2024-37560.json
Normal file
56
CVE-2024/CVE-2024-375xx/CVE-2024-37560.json
Normal file
@ -0,0 +1,56 @@
|
||||
{
|
||||
"id": "CVE-2024-37560",
|
||||
"sourceIdentifier": "audit@patchstack.com",
|
||||
"published": "2024-07-12T14:15:12.770",
|
||||
"lastModified": "2024-07-12T14:15:12.770",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Improper Privilege Management vulnerability in IqbalRony WP User Switch allows Privilege Escalation.This issue affects WP User Switch: from n/a through 1.1.0."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 8.0,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.1,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-269"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://patchstack.com/database/vulnerability/wp-user-switch/wordpress-wp-user-switch-plugin-1-0-5-privilege-escalation-vulnerability?_s_id=cve",
|
||||
"source": "audit@patchstack.com"
|
||||
}
|
||||
]
|
||||
}
|
56
CVE-2024/CVE-2024-375xx/CVE-2024-37564.json
Normal file
56
CVE-2024/CVE-2024-375xx/CVE-2024-37564.json
Normal file
@ -0,0 +1,56 @@
|
||||
{
|
||||
"id": "CVE-2024-37564",
|
||||
"sourceIdentifier": "audit@patchstack.com",
|
||||
"published": "2024-07-12T14:15:13.000",
|
||||
"lastModified": "2024-07-12T14:15:13.000",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in PayPlus LTD PayPlus Payment Gateway.This issue affects PayPlus Payment Gateway: from n/a through 7.0.7."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:L",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "LOW",
|
||||
"baseScore": 8.5,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.1,
|
||||
"impactScore": 4.7
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-89"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://patchstack.com/database/vulnerability/payplus-payment-gateway/wordpress-payplus-payment-gateway-plugin-7-0-7-sql-injection-vulnerability?_s_id=cve",
|
||||
"source": "audit@patchstack.com"
|
||||
}
|
||||
]
|
||||
}
|
56
CVE-2024/CVE-2024-379xx/CVE-2024-37927.json
Normal file
56
CVE-2024/CVE-2024-379xx/CVE-2024-37927.json
Normal file
@ -0,0 +1,56 @@
|
||||
{
|
||||
"id": "CVE-2024-37927",
|
||||
"sourceIdentifier": "audit@patchstack.com",
|
||||
"published": "2024-07-12T14:15:13.237",
|
||||
"lastModified": "2024-07-12T14:15:13.237",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Improper Privilege Management vulnerability in NooTheme Jobmonster allows Privilege Escalation.This issue affects Jobmonster: from n/a through 4.7.0."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-269"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://patchstack.com/database/vulnerability/noo-jobmonster/wordpress-jobmonster-theme-4-7-0-unauthenticated-privilege-escalation-vulnerability?_s_id=cve",
|
||||
"source": "audit@patchstack.com"
|
||||
}
|
||||
]
|
||||
}
|
56
CVE-2024/CVE-2024-379xx/CVE-2024-37928.json
Normal file
56
CVE-2024/CVE-2024-379xx/CVE-2024-37928.json
Normal file
@ -0,0 +1,56 @@
|
||||
{
|
||||
"id": "CVE-2024-37928",
|
||||
"sourceIdentifier": "audit@patchstack.com",
|
||||
"published": "2024-07-12T14:15:13.463",
|
||||
"lastModified": "2024-07-12T14:15:13.463",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability in NooTheme Jobmonster allows File Manipulation.This issue affects Jobmonster: from n/a through 4.7.0."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 8.6,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 4.0
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-22"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://patchstack.com/database/vulnerability/noo-jobmonster/wordpress-jobmonster-theme-4-7-0-unauthenticated-arbitrary-file-deletion-vulnerability?_s_id=cve",
|
||||
"source": "audit@patchstack.com"
|
||||
}
|
||||
]
|
||||
}
|
56
CVE-2024/CVE-2024-379xx/CVE-2024-37932.json
Normal file
56
CVE-2024/CVE-2024-379xx/CVE-2024-37932.json
Normal file
@ -0,0 +1,56 @@
|
||||
{
|
||||
"id": "CVE-2024-37932",
|
||||
"sourceIdentifier": "audit@patchstack.com",
|
||||
"published": "2024-07-12T14:15:13.717",
|
||||
"lastModified": "2024-07-12T14:15:13.717",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability in anhvnit Woocommerce OpenPos allows File Manipulation.This issue affects Woocommerce OpenPos: from n/a through 6.4.4."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 8.6,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 4.0
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-22"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://patchstack.com/database/vulnerability/woocommerce-openpos/wordpress-woocommerce-openpos-plugin-6-4-4-unauthenticated-arbitrary-file-deletion-vulnerability?_s_id=cve",
|
||||
"source": "audit@patchstack.com"
|
||||
}
|
||||
]
|
||||
}
|
56
CVE-2024/CVE-2024-379xx/CVE-2024-37933.json
Normal file
56
CVE-2024/CVE-2024-379xx/CVE-2024-37933.json
Normal file
@ -0,0 +1,56 @@
|
||||
{
|
||||
"id": "CVE-2024-37933",
|
||||
"sourceIdentifier": "audit@patchstack.com",
|
||||
"published": "2024-07-12T14:15:13.943",
|
||||
"lastModified": "2024-07-12T14:15:13.943",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in anhvnit Woocommerce OpenPos.This issue affects Woocommerce OpenPos: from n/a through 6.4.4."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:L",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "LOW",
|
||||
"baseScore": 9.3,
|
||||
"baseSeverity": "CRITICAL"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 4.7
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-89"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://patchstack.com/database/vulnerability/woocommerce-openpos/wordpress-woocommerce-openpos-plugin-6-4-4-unauthenticated-sql-injection-vulnerability?_s_id=cve",
|
||||
"source": "audit@patchstack.com"
|
||||
}
|
||||
]
|
||||
}
|
56
CVE-2024/CVE-2024-379xx/CVE-2024-37938.json
Normal file
56
CVE-2024/CVE-2024-379xx/CVE-2024-37938.json
Normal file
@ -0,0 +1,56 @@
|
||||
{
|
||||
"id": "CVE-2024-37938",
|
||||
"sourceIdentifier": "audit@patchstack.com",
|
||||
"published": "2024-07-12T14:15:14.167",
|
||||
"lastModified": "2024-07-12T14:15:14.167",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Cross-Site Request Forgery (CSRF) vulnerability in MyThemeShop SociallyViral.This issue affects SociallyViral: from n/a through 1.0.10."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 4.3,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 1.4
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-352"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://patchstack.com/database/vulnerability/sociallyviral/wordpress-sociallyviral-theme-1-0-10-cross-site-request-forgery-csrf-vulnerability?_s_id=cve",
|
||||
"source": "audit@patchstack.com"
|
||||
}
|
||||
]
|
||||
}
|
56
CVE-2024/CVE-2024-379xx/CVE-2024-37939.json
Normal file
56
CVE-2024/CVE-2024-379xx/CVE-2024-37939.json
Normal file
@ -0,0 +1,56 @@
|
||||
{
|
||||
"id": "CVE-2024-37939",
|
||||
"sourceIdentifier": "audit@patchstack.com",
|
||||
"published": "2024-07-12T14:15:14.380",
|
||||
"lastModified": "2024-07-12T14:15:14.380",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Cross-Site Request Forgery (CSRF) vulnerability in VolThemes Patricia Lite.This issue affects Patricia Lite: from n/a through 1.2.3."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 4.3,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 1.4
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-352"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://patchstack.com/database/vulnerability/patricia-lite/wordpress-patricia-lite-theme-1-2-3-cross-site-request-forgery-csrf-vulnerability?_s_id=cve",
|
||||
"source": "audit@patchstack.com"
|
||||
}
|
||||
]
|
||||
}
|
56
CVE-2024/CVE-2024-379xx/CVE-2024-37940.json
Normal file
56
CVE-2024/CVE-2024-379xx/CVE-2024-37940.json
Normal file
@ -0,0 +1,56 @@
|
||||
{
|
||||
"id": "CVE-2024-37940",
|
||||
"sourceIdentifier": "audit@patchstack.com",
|
||||
"published": "2024-07-12T14:15:14.600",
|
||||
"lastModified": "2024-07-12T14:15:14.600",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Cross-Site Request Forgery (CSRF) vulnerability in Seraphinite Solutions Seraphinite Accelerator (Full, premium).This issue affects Seraphinite Accelerator (Full, premium): from n/a through 2.21.13."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:N/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 7.4,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 4.0
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-352"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://patchstack.com/database/vulnerability/seraphinite-accelerator-ext/wordpress-seraphinite-accelerator-full-premium-plugin-2-21-13-csrf-leading-to-arbitrary-file-deletion-vulnerability?_s_id=cve",
|
||||
"source": "audit@patchstack.com"
|
||||
}
|
||||
]
|
||||
}
|
56
CVE-2024/CVE-2024-379xx/CVE-2024-37941.json
Normal file
56
CVE-2024/CVE-2024-379xx/CVE-2024-37941.json
Normal file
@ -0,0 +1,56 @@
|
||||
{
|
||||
"id": "CVE-2024-37941",
|
||||
"sourceIdentifier": "audit@patchstack.com",
|
||||
"published": "2024-07-12T14:15:14.817",
|
||||
"lastModified": "2024-07-12T14:15:14.817",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Cross-Site Request Forgery (CSRF) vulnerability in Internal Link Juicer Internal Link Juicer: SEO Auto Linker for WordPress.This issue affects Internal Link Juicer: SEO Auto Linker for WordPress: from n/a through 2.24.3."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 4.3,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 1.4
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-352"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://patchstack.com/database/vulnerability/internal-links/wordpress-internal-link-juicer-seo-auto-linker-for-wordpress-plugin-2-24-3-cross-site-request-forgery-csrf-vulnerability?_s_id=cve",
|
||||
"source": "audit@patchstack.com"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,13 +2,17 @@
|
||||
"id": "CVE-2024-38085",
|
||||
"sourceIdentifier": "secure@microsoft.com",
|
||||
"published": "2024-07-09T17:15:44.080",
|
||||
"lastModified": "2024-07-09T18:18:38.713",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-07-12T15:46:00.290",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Windows Graphics Component Elevation of Privilege Vulnerability"
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Vulnerabilidad de elevaci\u00f3n de privilegios de Windows Graphics Component"
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
@ -36,6 +40,16 @@
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "NVD-CWE-noinfo"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "secure@microsoft.com",
|
||||
"type": "Secondary",
|
||||
@ -47,10 +61,123 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "10.0.10240.20710",
|
||||
"matchCriteriaId": "B7482622-F4B1-4086-8484-136592BAACCE"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "10.0.14393.7159",
|
||||
"matchCriteriaId": "BEEE46C5-718B-43C5-8B06-A4CB2E0DEF7A"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "10.0.17763.6054",
|
||||
"matchCriteriaId": "3EE3B092-248B-4F68-AA13-DF4FB2E0DA3F"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "10.0.19044.4651",
|
||||
"matchCriteriaId": "905A0D97-FCF2-4999-A3F3-C79D88511D52"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "10.0.19045.4651",
|
||||
"matchCriteriaId": "2DEB25D6-2E73-4DF4-9D7D-2C9780101B1B"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_11_21h2:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "10.0.22000.3079",
|
||||
"matchCriteriaId": "1F4C0A5A-B376-4DE8-A02A-5E341825AAAB"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "10.0.22621.3880",
|
||||
"matchCriteriaId": "A2B9B3F1-347C-4935-BFA9-6B4191831D28"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_11_23h2:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "10.0.22621.3880",
|
||||
"matchCriteriaId": "29AB4D70-37A2-4A7E-9326-79E2EF762B02"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:x64:*",
|
||||
"matchCriteriaId": "2127D10C-B6F3-4C1D-B9AA-5D78513CC996"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:x86:*",
|
||||
"matchCriteriaId": "AB425562-C0A0-452E-AABE-F70522F15E1A"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "2ACA9287-B475-4AF7-A4DA-A7143CEF9E57"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "A7DF96F8-BA6A-4780-9CA3-F719B3F81074"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "DB18C4CE-5917-401E-ACF7-2747084FD36E"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "10.0.14393.7159",
|
||||
"matchCriteriaId": "59C9A2A5-AE44-4583-A7B1-B8D62B0E83BB"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "10.0.17763.6054",
|
||||
"matchCriteriaId": "3401E6F7-2430-4247-8A22-0B733A03501A"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_server_2022:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "10.0.20348.2582",
|
||||
"matchCriteriaId": "4E433A09-F730-4EBE-8050-8789755B0D35"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_server_2022_23h2:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "10.0.25398.1009",
|
||||
"matchCriteriaId": "EDA01A4A-9AED-484A-8B10-3282FA13F635"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38085",
|
||||
"source": "secure@microsoft.com"
|
||||
"source": "secure@microsoft.com",
|
||||
"tags": [
|
||||
"Patch",
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,13 +2,17 @@
|
||||
"id": "CVE-2024-38086",
|
||||
"sourceIdentifier": "secure@microsoft.com",
|
||||
"published": "2024-07-09T17:15:44.373",
|
||||
"lastModified": "2024-07-09T18:18:38.713",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-07-12T15:45:05.137",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Azure Kinect SDK Remote Code Execution Vulnerability"
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Vulnerabilidad de ejecuci\u00f3n remota de c\u00f3digo de Azure Kinect SDK"
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
@ -36,6 +40,16 @@
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "NVD-CWE-noinfo"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "secure@microsoft.com",
|
||||
"type": "Secondary",
|
||||
@ -47,10 +61,32 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:microsoft:azure_kinect_software_development_kit:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "1.4.2",
|
||||
"matchCriteriaId": "E611CA1D-86D0-4CB9-9689-270982E28E0E"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38086",
|
||||
"source": "secure@microsoft.com"
|
||||
"source": "secure@microsoft.com",
|
||||
"tags": [
|
||||
"Patch",
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,20 +2,44 @@
|
||||
"id": "CVE-2024-38089",
|
||||
"sourceIdentifier": "secure@microsoft.com",
|
||||
"published": "2024-07-09T17:15:45.170",
|
||||
"lastModified": "2024-07-09T18:18:38.713",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-07-12T15:42:39.127",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Microsoft Defender for IoT Elevation of Privilege Vulnerability"
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Vulnerabilidad de elevaci\u00f3n de privilegios de Microsoft Defender para IoT"
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "secure@microsoft.com",
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 9.9,
|
||||
"baseSeverity": "CRITICAL"
|
||||
},
|
||||
"exploitabilityScore": 3.1,
|
||||
"impactScore": 6.0
|
||||
},
|
||||
{
|
||||
"source": "secure@microsoft.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H",
|
||||
@ -36,6 +60,16 @@
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "NVD-CWE-noinfo"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "secure@microsoft.com",
|
||||
"type": "Secondary",
|
||||
@ -47,10 +81,32 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:microsoft:defender_for_iot:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "24.1.4",
|
||||
"matchCriteriaId": "75FA11DF-5B26-4E5D-800D-B7C6917CC9DF"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38089",
|
||||
"source": "secure@microsoft.com"
|
||||
"source": "secure@microsoft.com",
|
||||
"tags": [
|
||||
"Patch",
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,13 +2,17 @@
|
||||
"id": "CVE-2024-38091",
|
||||
"sourceIdentifier": "secure@microsoft.com",
|
||||
"published": "2024-07-09T17:15:45.380",
|
||||
"lastModified": "2024-07-09T18:18:38.713",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-07-12T15:35:41.100",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Microsoft WS-Discovery Denial of Service Vulnerability"
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Vulnerabilidad de denegaci\u00f3n de servicio de Microsoft WS-Discovery"
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
@ -36,6 +40,16 @@
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "NVD-CWE-noinfo"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "secure@microsoft.com",
|
||||
"type": "Secondary",
|
||||
@ -47,10 +61,123 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "10.0.10240.20710",
|
||||
"matchCriteriaId": "B7482622-F4B1-4086-8484-136592BAACCE"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "10.0.14393.7159",
|
||||
"matchCriteriaId": "BEEE46C5-718B-43C5-8B06-A4CB2E0DEF7A"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "10.0.17763.6054",
|
||||
"matchCriteriaId": "3EE3B092-248B-4F68-AA13-DF4FB2E0DA3F"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "10.0.19044.4651",
|
||||
"matchCriteriaId": "905A0D97-FCF2-4999-A3F3-C79D88511D52"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "10.0.19045.4651",
|
||||
"matchCriteriaId": "2DEB25D6-2E73-4DF4-9D7D-2C9780101B1B"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_11_21h2:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "10.0.22000.3079",
|
||||
"matchCriteriaId": "1F4C0A5A-B376-4DE8-A02A-5E341825AAAB"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "10.0.22621.3880",
|
||||
"matchCriteriaId": "A2B9B3F1-347C-4935-BFA9-6B4191831D28"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_11_23h2:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "10.0.22631.3880",
|
||||
"matchCriteriaId": "E199129F-7F75-42C8-ABA0-7439FE50676B"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:x64:*",
|
||||
"matchCriteriaId": "2127D10C-B6F3-4C1D-B9AA-5D78513CC996"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:x86:*",
|
||||
"matchCriteriaId": "AB425562-C0A0-452E-AABE-F70522F15E1A"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*",
|
||||
"matchCriteriaId": "AF07A81D-12E5-4B1D-BFF9-C8D08C32FF4F"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "A7DF96F8-BA6A-4780-9CA3-F719B3F81074"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "DB18C4CE-5917-401E-ACF7-2747084FD36E"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "10.0.14393.7159",
|
||||
"matchCriteriaId": "59C9A2A5-AE44-4583-A7B1-B8D62B0E83BB"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "10.0.17763.6054",
|
||||
"matchCriteriaId": "3401E6F7-2430-4247-8A22-0B733A03501A"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_server_2022:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "10.0.20348.2582",
|
||||
"matchCriteriaId": "4E433A09-F730-4EBE-8050-8789755B0D35"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_server_2022_23h2:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "10.0.25398.1009",
|
||||
"matchCriteriaId": "EDA01A4A-9AED-484A-8B10-3282FA13F635"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38091",
|
||||
"source": "secure@microsoft.com"
|
||||
"source": "secure@microsoft.com",
|
||||
"tags": [
|
||||
"Patch",
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,13 +2,17 @@
|
||||
"id": "CVE-2024-38092",
|
||||
"sourceIdentifier": "secure@microsoft.com",
|
||||
"published": "2024-07-09T17:15:45.633",
|
||||
"lastModified": "2024-07-09T18:18:38.713",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-07-12T15:05:16.757",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Azure CycleCloud Elevation of Privilege Vulnerability"
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Vulnerabilidad de elevaci\u00f3n de privilegios de Azure CycleCloud"
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
@ -36,6 +40,16 @@
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "NVD-CWE-noinfo"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "secure@microsoft.com",
|
||||
"type": "Secondary",
|
||||
@ -47,10 +61,40 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:microsoft:azure_cyclecloud:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "7.9.0",
|
||||
"versionEndIncluding": "7.9.11",
|
||||
"matchCriteriaId": "65E4F243-662E-4940-A852-C14D104E1890"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:microsoft:azure_cyclecloud:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "8.0.0",
|
||||
"versionEndIncluding": "8.6.0",
|
||||
"matchCriteriaId": "6EBFFFA9-3B63-4219-A7DC-0602ED0D3C41"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38092",
|
||||
"source": "secure@microsoft.com"
|
||||
"source": "secure@microsoft.com",
|
||||
"tags": [
|
||||
"Patch",
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-38472",
|
||||
"sourceIdentifier": "security@apache.org",
|
||||
"published": "2024-07-01T19:15:04.563",
|
||||
"lastModified": "2024-07-09T16:22:46.000",
|
||||
"lastModified": "2024-07-12T14:15:15.043",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -55,6 +55,10 @@
|
||||
{
|
||||
"url": "https://httpd.apache.org/security/vulnerabilities_24.html",
|
||||
"source": "security@apache.org"
|
||||
},
|
||||
{
|
||||
"url": "https://security.netapp.com/advisory/ntap-20240712-0001/",
|
||||
"source": "security@apache.org"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-38473",
|
||||
"sourceIdentifier": "security@apache.org",
|
||||
"published": "2024-07-01T19:15:04.657",
|
||||
"lastModified": "2024-07-02T12:09:16.907",
|
||||
"lastModified": "2024-07-12T14:15:15.133",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -32,6 +32,10 @@
|
||||
{
|
||||
"url": "https://httpd.apache.org/security/vulnerabilities_24.html",
|
||||
"source": "security@apache.org"
|
||||
},
|
||||
{
|
||||
"url": "https://security.netapp.com/advisory/ntap-20240712-0001/",
|
||||
"source": "security@apache.org"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-38474",
|
||||
"sourceIdentifier": "security@apache.org",
|
||||
"published": "2024-07-01T19:15:04.760",
|
||||
"lastModified": "2024-07-02T12:09:16.907",
|
||||
"lastModified": "2024-07-12T14:15:15.203",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -32,6 +32,10 @@
|
||||
{
|
||||
"url": "https://httpd.apache.org/security/vulnerabilities_24.html",
|
||||
"source": "security@apache.org"
|
||||
},
|
||||
{
|
||||
"url": "https://security.netapp.com/advisory/ntap-20240712-0001/",
|
||||
"source": "security@apache.org"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-38475",
|
||||
"sourceIdentifier": "security@apache.org",
|
||||
"published": "2024-07-01T19:15:04.883",
|
||||
"lastModified": "2024-07-08T14:18:45.973",
|
||||
"lastModified": "2024-07-12T14:15:15.277",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -55,6 +55,10 @@
|
||||
{
|
||||
"url": "https://httpd.apache.org/security/vulnerabilities_24.html",
|
||||
"source": "security@apache.org"
|
||||
},
|
||||
{
|
||||
"url": "https://security.netapp.com/advisory/ntap-20240712-0001/",
|
||||
"source": "security@apache.org"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-38476",
|
||||
"sourceIdentifier": "security@apache.org",
|
||||
"published": "2024-07-01T19:15:04.977",
|
||||
"lastModified": "2024-07-02T12:09:16.907",
|
||||
"lastModified": "2024-07-12T14:15:15.360",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -32,6 +32,10 @@
|
||||
{
|
||||
"url": "https://httpd.apache.org/security/vulnerabilities_24.html",
|
||||
"source": "security@apache.org"
|
||||
},
|
||||
{
|
||||
"url": "https://security.netapp.com/advisory/ntap-20240712-0001/",
|
||||
"source": "security@apache.org"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-38477",
|
||||
"sourceIdentifier": "security@apache.org",
|
||||
"published": "2024-07-01T19:15:05.083",
|
||||
"lastModified": "2024-07-02T12:09:16.907",
|
||||
"lastModified": "2024-07-12T14:15:15.430",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -32,6 +32,10 @@
|
||||
{
|
||||
"url": "https://httpd.apache.org/security/vulnerabilities_24.html",
|
||||
"source": "security@apache.org"
|
||||
},
|
||||
{
|
||||
"url": "https://security.netapp.com/advisory/ntap-20240712-0001/",
|
||||
"source": "security@apache.org"
|
||||
}
|
||||
]
|
||||
}
|
56
CVE-2024/CVE-2024-387xx/CVE-2024-38700.json
Normal file
56
CVE-2024/CVE-2024-387xx/CVE-2024-38700.json
Normal file
@ -0,0 +1,56 @@
|
||||
{
|
||||
"id": "CVE-2024-38700",
|
||||
"sourceIdentifier": "audit@patchstack.com",
|
||||
"published": "2024-07-12T14:15:15.503",
|
||||
"lastModified": "2024-07-12T14:15:15.503",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Improper Neutralization of Special Elements in Output Used by a Downstream Component ('Injection') vulnerability in realmag777 WPCS allows Code Injection.This issue affects WPCS: from n/a through 1.2.0.3."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 6.5,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 2.5
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-74"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://patchstack.com/database/vulnerability/currency-switcher/wordpress-wpcs-wordpress-currency-switcher-professional-plugin-1-2-0-3-arbitrary-shortcode-execution-vulnerability?_s_id=cve",
|
||||
"source": "audit@patchstack.com"
|
||||
}
|
||||
]
|
||||
}
|
56
CVE-2024/CVE-2024-387xx/CVE-2024-38704.json
Normal file
56
CVE-2024/CVE-2024-387xx/CVE-2024-38704.json
Normal file
@ -0,0 +1,56 @@
|
||||
{
|
||||
"id": "CVE-2024-38704",
|
||||
"sourceIdentifier": "audit@patchstack.com",
|
||||
"published": "2024-07-12T14:15:15.710",
|
||||
"lastModified": "2024-07-12T14:15:15.710",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability in DynamicWebLab WordPress Team Manager allows PHP Local File Inclusion.This issue affects WordPress Team Manager: from n/a through 2.1.12."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 6.5,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-22"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://patchstack.com/database/vulnerability/wp-team-manager/wordpress-team-manager-plugin-2-1-12-local-file-inclusion-vulnerability?_s_id=cve",
|
||||
"source": "audit@patchstack.com"
|
||||
}
|
||||
]
|
||||
}
|
56
CVE-2024/CVE-2024-387xx/CVE-2024-38706.json
Normal file
56
CVE-2024/CVE-2024-387xx/CVE-2024-38706.json
Normal file
@ -0,0 +1,56 @@
|
||||
{
|
||||
"id": "CVE-2024-38706",
|
||||
"sourceIdentifier": "audit@patchstack.com",
|
||||
"published": "2024-07-12T14:15:15.957",
|
||||
"lastModified": "2024-07-12T14:15:15.957",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability in HasThemes HT Mega allows Path Traversal.This issue affects HT Mega: from n/a through 2.5.7."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 6.5,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-22"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://patchstack.com/database/vulnerability/ht-mega-for-elementor/wordpress-ht-mega-plugin-2-5-7-json-path-traversal-vulnerability?_s_id=cve",
|
||||
"source": "audit@patchstack.com"
|
||||
}
|
||||
]
|
||||
}
|
56
CVE-2024/CVE-2024-387xx/CVE-2024-38709.json
Normal file
56
CVE-2024/CVE-2024-387xx/CVE-2024-38709.json
Normal file
@ -0,0 +1,56 @@
|
||||
{
|
||||
"id": "CVE-2024-38709",
|
||||
"sourceIdentifier": "audit@patchstack.com",
|
||||
"published": "2024-07-12T14:15:16.183",
|
||||
"lastModified": "2024-07-12T14:15:16.183",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability in Milan Petrovic GD Rating System allows PHP Local File Inclusion.This issue affects GD Rating System: from n/a through 3.6."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "HIGH",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 5.3,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 1.6,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-22"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://patchstack.com/database/vulnerability/gd-rating-system/wordpress-gd-rating-system-plugin-3-6-local-file-inclusion-vulnerability?_s_id=cve",
|
||||
"source": "audit@patchstack.com"
|
||||
}
|
||||
]
|
||||
}
|
56
CVE-2024/CVE-2024-387xx/CVE-2024-38715.json
Normal file
56
CVE-2024/CVE-2024-387xx/CVE-2024-38715.json
Normal file
@ -0,0 +1,56 @@
|
||||
{
|
||||
"id": "CVE-2024-38715",
|
||||
"sourceIdentifier": "audit@patchstack.com",
|
||||
"published": "2024-07-12T15:15:10.830",
|
||||
"lastModified": "2024-07-12T15:15:10.830",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability in ExS ExS Widgets allows PHP Local File Inclusion.This issue affects ExS Widgets: from n/a through 0.3.1."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 6.5,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-22"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://patchstack.com/database/vulnerability/exs-widgets/wordpress-exs-widgets-plugin-0-3-1-local-file-inclusion-vulnerability?_s_id=cve",
|
||||
"source": "audit@patchstack.com"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,24 +2,86 @@
|
||||
"id": "CVE-2024-38970",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-07-09T18:15:10.517",
|
||||
"lastModified": "2024-07-09T18:18:38.713",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-07-12T14:51:48.070",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "vaeThink 1.0.2 is vulnerable to Information Disclosure via the system backend,access management administrator function."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "vaeThink 1.0.2 es vulnerable a la divulgaci\u00f3n de informaci\u00f3n a trav\u00e9s del backend del sistema y la funci\u00f3n de administrador de gesti\u00f3n de acceso."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "HIGH",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 4.9,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 1.2,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "NVD-CWE-noinfo"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:vaethink:vaethink:1.0.2:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "9E8C99B3-EFB9-4672-9F48-48DF35A995BE"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://gist.github.com/fltys/b2c430bca85c97211010bdc602437978",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/tingyuu/vaeThink",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Product"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,24 +2,86 @@
|
||||
"id": "CVE-2024-38971",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-07-09T18:15:10.610",
|
||||
"lastModified": "2024-07-09T18:18:38.713",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-07-12T14:50:45.817",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "vaeThink 1.0.2 is vulnerable to stored Cross Site Scripting (XSS) in the system backend."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "vaeThink 1.0.2 es vulnerable a Cross Site Scripting (XSS) almacenado en el backend del sistema."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 5.4,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.3,
|
||||
"impactScore": 2.7
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:vaethink:vaethink:1.0.2:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "9E8C99B3-EFB9-4672-9F48-48DF35A995BE"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://gist.github.com/fltys/998d96272545d2cf7cd6b182adbfd672",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/tingyuu/vaeThink",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Product"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,13 +2,17 @@
|
||||
"id": "CVE-2024-39536",
|
||||
"sourceIdentifier": "sirt@juniper.net",
|
||||
"published": "2024-07-11T17:15:11.190",
|
||||
"lastModified": "2024-07-11T18:09:58.777",
|
||||
"lastModified": "2024-07-12T15:15:11.040",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A Missing Release of Memory after Effective Lifetime vulnerability in the Periodic Packet Management Daemon (ppmd) of Juniper Networks Junos OS and Junos OS Evolved allows an unauthenticated adjacent attacker to cause a \n\nDenial-of-Service (DoS).\n\n\nWhen a\u00a0BFD session configured with authentication flaps,\u00a0ppmd memory can leak. Whether the leak happens depends on a\u00a0race condition which is outside the attackers control. This issue only affects BFD operating in distributed aka delegated (which is the default behavior) or inline mode.\n\n\n\nWhether the leak occurs can be monitored with the following CLI command:\n\n> show ppm request-queue\n\n\nFPC \u00a0 \u00a0 Pending-request\nfpc0\u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a02\nrequest-total-pending: 2\n\n\nwhere a continuously increasing number of pending requests is indicative of the leak.\u00a0\n\n\n\n\nThis issue affects:\n\nJunos OS:\n\n\n * All versions before 21.2R3-S8,\n * 21.4 versions before 21.4R3-S7,\n * 22.1 versions before 22.1R3-S4,\n * 22.2 versions before 22.2R3-S4,\u00a0\n * 22.3 versions before 22.3R3,\n * 22.4 versions before 22.4R2-S2, 22.4R3,\n * 23.1 versions before 23.1R2.\n\n\n\nJunos OS Evolved:\n * All versions before 21.2R3-S8-EVO,\n * 21.4-EVO versions before 21.4R3-S7-EVO,\n * 22.2-EVO versions before 22.2R3-S4-EVO,\n * 22.3-EVO versions before 22.3R3-EVO,\n * 22.4-EVO versions before 22.4R3-EVO,\n * 23.2-EVO versions before 23.2R1-EVO."
|
||||
"value": "A Missing Release of Memory after Effective Lifetime vulnerability in the Periodic Packet Management Daemon (ppmd) of Juniper Networks Junos OS and Junos OS Evolved allows an unauthenticated adjacent attacker to cause a \n\nDenial-of-Service (DoS).\n\n\nWhen a\u00a0BFD session configured with authentication flaps,\u00a0ppmd memory can leak. Whether the leak happens depends on a\u00a0race condition which is outside the attackers control. This issue only affects BFD operating in distributed aka delegated (which is the default behavior) or inline mode.\n\n\n\nWhether the leak occurs can be monitored with the following CLI command:\n\n> show ppm request-queue\n\n\nFPC \u00a0 \u00a0 Pending-request\nfpc0\u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a02\nrequest-total-pending: 2\n\n\nwhere a continuously increasing number of pending requests is indicative of the leak.\u00a0\n\n\n\n\n\n\n\n\nThis issue affects:\n\nJunos OS:\n\n\n * All versions before 21.2R3-S8,\n * 21.4 versions before 21.4R3-S7,\n * 22.1 versions before 22.1R3-S4,\n * 22.2 versions before 22.2R3-S4, \n * 22.3 versions before 22.3R3,\n * 22.4 versions before 22.4R2-S2, 22.4R3.\n\n\n\nJunos OS Evolved:\n * All versions before 21.2R3-S8-EVO,\n * 21.4-EVO versions before 21.4R3-S7-EVO,\n * 22.2-EVO versions before 22.2R3-S4-EVO,\n * 22.3-EVO versions before 22.3R3-EVO,\n * 22.4-EVO versions before 22.4R3-EVO."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Una vulnerabilidad de liberaci\u00f3n de memoria faltante despu\u00e9s de la vida \u00fatil efectiva en Periodic Packet Management Daemon (ppmd) de Juniper Networks Junos OS y Junos OS Evolved permite que un atacante adyacente no autenticado provoque una denegaci\u00f3n de servicio (DoS). Cuando una sesi\u00f3n BFD se configura con solapas de autenticaci\u00f3n, la memoria ppmd puede perderse. Que se produzca la fuga depende de una condici\u00f3n de ejecuci\u00f3n que est\u00e1 fuera del control de los atacantes. Este problema solo afecta a BFD que opera en modo distribuido, tambi\u00e9n conocido como delegado (que es el comportamiento predeterminado) o en l\u00ednea. Si se produce la fuga se puede monitorear con el siguiente comando CLI: > show ppm request-queue FPC Pending-request fpc0 2 request-total-pending: 2 donde un n\u00famero continuamente creciente de solicitudes pendientes es indicativo de la fuga. Este problema afecta a: Junos OS: * Todas las versiones anteriores a 21.2R3-S8, * Versiones 21.4 anteriores a 21.4R3-S7, * Versiones 22.1 anteriores a 22.1R3-S4, * Versiones 22.2 anteriores a 22.2R3-S4, * Versiones 22.3 anteriores a 22.3R3, * Versiones 22.4 anteriores a 22.4R2-S2, 22.4R3, * Versiones 23.1 anteriores a 23.1R2. Junos OS Evolved: * Todas las versiones anteriores a 21.2R3-S8-EVO, * Versiones 21.4-EVO anteriores a 21.4R3-S7-EVO, * Versiones 22.2-EVO anteriores a 22.2R3-S4-EVO, * Versiones 22.3-EVO anteriores a 22.3R3- EVO, *versiones 22.4-EVO anteriores a 22.4R3-EVO, *versiones 23.2-EVO anteriores a 23.2R1-EVO."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-39573",
|
||||
"sourceIdentifier": "security@apache.org",
|
||||
"published": "2024-07-01T19:15:05.760",
|
||||
"lastModified": "2024-07-03T02:05:50.170",
|
||||
"lastModified": "2024-07-12T14:15:16.400",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -55,6 +55,10 @@
|
||||
{
|
||||
"url": "https://httpd.apache.org/security/vulnerabilities_24.html",
|
||||
"source": "security@apache.org"
|
||||
},
|
||||
{
|
||||
"url": "https://security.netapp.com/advisory/ntap-20240712-0001/",
|
||||
"source": "security@apache.org"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,13 +2,17 @@
|
||||
"id": "CVE-2024-39743",
|
||||
"sourceIdentifier": "psirt@us.ibm.com",
|
||||
"published": "2024-07-08T14:15:02.823",
|
||||
"lastModified": "2024-07-08T15:49:22.437",
|
||||
"lastModified": "2024-07-12T14:15:16.487",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "IBM MQ Operator 3.2.2 and IBM MQ Operator 2.0.24 could allow a user to cause a denial of service under certain configurations due to a partial string comparison vulnerability. IBM X-Force ID: 297172."
|
||||
"value": "IBM MQ Operator 3.2.2 and IBM MQ Operator 2.0.24 IBM MQ Container Developer Edition is vulnerable to denial of service caused by incorrect memory de-allocation. A remote attacker could exploit this vulnerability to cause the server to consume memory resources. IBM X-Force ID: 297172."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "IBM MQ Operador 3.2.2 e IBM MQ Operador 2.0.24 podr\u00edan permitir a un usuario provocar una denegaci\u00f3n de servicio en determinadas configuraciones debido a una vulnerabilidad de comparaci\u00f3n de cadenas parciales. ID de IBM X-Force: 297172."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
@ -42,7 +46,7 @@
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-187"
|
||||
"value": "CWE-405"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-39884",
|
||||
"sourceIdentifier": "security@apache.org",
|
||||
"published": "2024-07-04T09:15:04.237",
|
||||
"lastModified": "2024-07-05T12:55:51.367",
|
||||
"lastModified": "2024-07-12T14:15:16.640",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -20,6 +20,10 @@
|
||||
{
|
||||
"url": "https://httpd.apache.org/security/vulnerabilities_24.html",
|
||||
"source": "security@apache.org"
|
||||
},
|
||||
{
|
||||
"url": "https://security.netapp.com/advisory/ntap-20240712-0002/",
|
||||
"source": "security@apache.org"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-39894",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-07-02T18:15:03.710",
|
||||
"lastModified": "2024-07-08T14:18:56.393",
|
||||
"lastModified": "2024-07-12T14:15:16.703",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -60,6 +60,10 @@
|
||||
"url": "https://lists.mindrot.org/pipermail/openssh-unix-announce/2024-July/000158.html",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://security.netapp.com/advisory/ntap-20240712-0004/",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://www.openssh.com/txt/release-9.8",
|
||||
"source": "cve@mitre.org"
|
||||
|
60
CVE-2024/CVE-2024-399xx/CVE-2024-39903.json
Normal file
60
CVE-2024/CVE-2024-399xx/CVE-2024-39903.json
Normal file
@ -0,0 +1,60 @@
|
||||
{
|
||||
"id": "CVE-2024-39903",
|
||||
"sourceIdentifier": "security-advisories@github.com",
|
||||
"published": "2024-07-12T15:15:11.177",
|
||||
"lastModified": "2024-07-12T15:15:11.177",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Solara is a pure Python, React-style framework for scaling Jupyter and web apps. A Local File Inclusion (LFI) vulnerability was identified in widgetti/solara, in version <1.35.1, which was fixed in version 1.35.1. This vulnerability arises from the application's failure to properly validate URI fragments for directory traversal sequences such as '../' when serving static files. An attacker can exploit this flaw by manipulating the fragment part of the URI to read arbitrary files on the local file system."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:L",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "LOW",
|
||||
"baseScore": 8.6,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 4.7
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-22"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/widgetti/solara/commit/df2fd66a7f4e8ffd36e8678697a8a4f76760dc54",
|
||||
"source": "security-advisories@github.com"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/widgetti/solara/security/advisories/GHSA-9794-pc4r-438w",
|
||||
"source": "security-advisories@github.com"
|
||||
}
|
||||
]
|
||||
}
|
64
CVE-2024/CVE-2024-399xx/CVE-2024-39909.json
Normal file
64
CVE-2024/CVE-2024-399xx/CVE-2024-39909.json
Normal file
@ -0,0 +1,64 @@
|
||||
{
|
||||
"id": "CVE-2024-39909",
|
||||
"sourceIdentifier": "security-advisories@github.com",
|
||||
"published": "2024-07-12T15:15:11.393",
|
||||
"lastModified": "2024-07-12T15:15:11.393",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "KubeClarity is a tool for detection and management of Software Bill Of Materials (SBOM) and vulnerabilities of container images and filesystems. A time/boolean SQL Injection is present in the following resource `/api/applicationResources` via the following parameter `packageID`. As it can be seen in backend/pkg/database/id_view.go, while building the SQL Query the `fmt.Sprintf` function is used to build the query string without the input having first been subjected to any validation. This vulnerability is fixed in 2.23.1."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 6.5,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-89"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/openclarity/kubeclarity/blob/main/backend/pkg/database/id_view.go#L79",
|
||||
"source": "security-advisories@github.com"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/openclarity/kubeclarity/commit/1d1178840703a72d9082b7fc4aea0a3326c5d294",
|
||||
"source": "security-advisories@github.com"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/openclarity/kubeclarity/security/advisories/GHSA-5248-h45p-9pgw",
|
||||
"source": "security-advisories@github.com"
|
||||
}
|
||||
]
|
||||
}
|
60
CVE-2024/CVE-2024-399xx/CVE-2024-39914.json
Normal file
60
CVE-2024/CVE-2024-399xx/CVE-2024-39914.json
Normal file
@ -0,0 +1,60 @@
|
||||
{
|
||||
"id": "CVE-2024-39914",
|
||||
"sourceIdentifier": "security-advisories@github.com",
|
||||
"published": "2024-07-12T15:15:11.607",
|
||||
"lastModified": "2024-07-12T15:15:11.607",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "FOG is a cloning/imaging/rescue suite/inventory management system. Prior to 1.5.10.34, packages/web/lib/fog/reportmaker.class.php in FOG was affected by a command injection via the filename parameter to /fog/management/export.php. This vulnerability is fixed in 1.5.10.34."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-77"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/FOGProject/fogproject/commit/2413bc034753c32799785e9bf08164ccd0a2759f",
|
||||
"source": "security-advisories@github.com"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/FOGProject/fogproject/security/advisories/GHSA-7h44-6vq6-cq8j",
|
||||
"source": "security-advisories@github.com"
|
||||
}
|
||||
]
|
||||
}
|
60
CVE-2024/CVE-2024-399xx/CVE-2024-39916.json
Normal file
60
CVE-2024/CVE-2024-399xx/CVE-2024-39916.json
Normal file
@ -0,0 +1,60 @@
|
||||
{
|
||||
"id": "CVE-2024-39916",
|
||||
"sourceIdentifier": "security-advisories@github.com",
|
||||
"published": "2024-07-12T15:15:11.813",
|
||||
"lastModified": "2024-07-12T15:15:11.813",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "FOG is a free open-source cloning/imaging/rescue suite/inventory management system. There is a security issue with the NFS configuration in /etc/exports generated by the installer that allows an attacker to modify files outside the export in the default installation. The exports have the no_subtree_check option. The no_subtree_check option means that if a client performs a file operation, the server will only check if the requested file is on the correct filesystem, not if it is in the correct directory. This enables modifying files in /images, accessing other files on the same filesystem, and accessing files on other filesystems. This vulnerability is fixed in 1.5.10.30."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 6.4,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 3.1,
|
||||
"impactScore": 2.7
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-453"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/FOGProject/fogproject/commit/2de209bc57a177a052b4a877f000c591740b2f88",
|
||||
"source": "security-advisories@github.com"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/FOGProject/fogproject/security/advisories/GHSA-3xjr-xf9v-hwjh",
|
||||
"source": "security-advisories@github.com"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-4667",
|
||||
"sourceIdentifier": "security@wordfence.com",
|
||||
"published": "2024-07-09T05:15:13.353",
|
||||
"lastModified": "2024-07-09T18:19:14.047",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-07-12T14:25:13.923",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -18,8 +18,28 @@
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security@wordfence.com",
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 5.4,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.3,
|
||||
"impactScore": 2.7
|
||||
},
|
||||
{
|
||||
"source": "security@wordfence.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N",
|
||||
@ -39,18 +59,57 @@
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:plugin-devs:blog\\,_posts_and_category_filter_for_elementor:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "2.0.0",
|
||||
"matchCriteriaId": "EF7E116F-AEC0-4206-B028-83EDF9B05511"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/browser/blog-posts-and-category-for-elementor/trunk/widgets/post-category-filter.php#L885",
|
||||
"source": "security@wordfence.com"
|
||||
"source": "security@wordfence.com",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://wordpress.org/plugins/blog-posts-and-category-for-elementor/#developers",
|
||||
"source": "security@wordfence.com"
|
||||
"source": "security@wordfence.com",
|
||||
"tags": [
|
||||
"Release Notes"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/a24c2d7d-8df8-4a3a-a538-09e11ebc6dd5?source=cve",
|
||||
"source": "security@wordfence.com"
|
||||
"source": "security@wordfence.com",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-5535",
|
||||
"sourceIdentifier": "openssl-security@openssl.org",
|
||||
"published": "2024-06-27T11:15:24.447",
|
||||
"lastModified": "2024-07-03T02:09:04.140",
|
||||
"lastModified": "2024-07-12T14:15:16.790",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -84,6 +84,10 @@
|
||||
"url": "https://github.openssl.org/openssl/extended-releases/commit/b78ec0824da857223486660177d3b1f255c65d87",
|
||||
"source": "openssl-security@openssl.org"
|
||||
},
|
||||
{
|
||||
"url": "https://security.netapp.com/advisory/ntap-20240712-0005/",
|
||||
"source": "openssl-security@openssl.org"
|
||||
},
|
||||
{
|
||||
"url": "https://www.openssl.org/news/secadv/20240627.txt",
|
||||
"source": "openssl-security@openssl.org"
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-5802",
|
||||
"sourceIdentifier": "contact@wpscan.com",
|
||||
"published": "2024-07-09T06:15:03.117",
|
||||
"lastModified": "2024-07-09T18:19:14.047",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-07-12T15:20:14.610",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -15,11 +15,68 @@
|
||||
"value": "El complemento URL Shortener de Myhop WordPress hasta la versi\u00f3n 1.0.17 no sanitiza ni escapa a algunas de sus configuraciones, lo que podr\u00eda permitir a usuarios con altos privilegios, como el administrador, realizar ataques de Cross Site Scripting incluso cuando unfiltered_html no est\u00e1 permitido."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "HIGH",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 4.8,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 1.7,
|
||||
"impactScore": 2.7
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:mythemeshop:url_shortener:*:*:*:*:*:wordpress:*:*",
|
||||
"versionEndIncluding": "1.0.17",
|
||||
"matchCriteriaId": "0B13384D-613F-4B1F-8F26-0A5D3870274D"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://wpscan.com/vulnerability/cd37f702-9144-4c98-9b08-c63e510cd97f/",
|
||||
"source": "contact@wpscan.com"
|
||||
"source": "contact@wpscan.com",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-6166",
|
||||
"sourceIdentifier": "security@wordfence.com",
|
||||
"published": "2024-07-09T05:15:13.543",
|
||||
"lastModified": "2024-07-09T18:19:14.047",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-07-12T14:23:53.600",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -39,18 +39,57 @@
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-89"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:unlimited-elements:unlimited_elements_for_elementor_\\(free_widgets\\,_addons\\,_templates\\):*:*:*:*:*:wordpress:*:*",
|
||||
"versionEndExcluding": "1.5.113",
|
||||
"matchCriteriaId": "3E9EAD0C-BB2F-415C-A40D-8A42B7095AC1"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/browser/unlimited-elements-for-elementor/trunk/inc_php/unitecreator_addons.class.php#L79",
|
||||
"source": "security@wordfence.com"
|
||||
"source": "security@wordfence.com",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/changeset/3112307/",
|
||||
"source": "security@wordfence.com"
|
||||
"source": "security@wordfence.com",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/9826c91c-0f6e-4d3b-bc14-4af6b60ef246?source=cve",
|
||||
"source": "security@wordfence.com"
|
||||
"source": "security@wordfence.com",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-6169",
|
||||
"sourceIdentifier": "security@wordfence.com",
|
||||
"published": "2024-07-09T05:15:13.737",
|
||||
"lastModified": "2024-07-09T18:19:14.047",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-07-12T14:30:07.300",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -17,6 +17,26 @@
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 5.4,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.3,
|
||||
"impactScore": 2.7
|
||||
},
|
||||
{
|
||||
"source": "security@wordfence.com",
|
||||
"type": "Secondary",
|
||||
@ -39,30 +59,78 @@
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:unlimited-elements:unlimited_elements_for_elementor_\\(free_widgets\\,_addons\\,_templates\\):*:*:*:*:*:wordpress:*:*",
|
||||
"versionEndExcluding": "1.5.113",
|
||||
"matchCriteriaId": "3E9EAD0C-BB2F-415C-A40D-8A42B7095AC1"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/hakluke/weaponised-XSS-payloads/blob/master/wordpress_create_admin_user.js",
|
||||
"source": "security@wordfence.com"
|
||||
"source": "security@wordfence.com",
|
||||
"tags": [
|
||||
"Exploit"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/browser/unlimited-elements-for-elementor/trunk/inc_php/framework/instagram/helper.class.php#L168",
|
||||
"source": "security@wordfence.com"
|
||||
"source": "security@wordfence.com",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/browser/unlimited-elements-for-elementor/trunk/inc_php/framework/instagram/helper.class.php#L178",
|
||||
"source": "security@wordfence.com"
|
||||
"source": "security@wordfence.com",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/browser/unlimited-elements-for-elementor/trunk/inc_php/framework/instagram/helper.class.php#L182",
|
||||
"source": "security@wordfence.com"
|
||||
"source": "security@wordfence.com",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/changeset/3112307/",
|
||||
"source": "security@wordfence.com"
|
||||
"source": "security@wordfence.com",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/f2f11c32-d58e-4ac8-83c7-30927a626e10?source=cve",
|
||||
"source": "security@wordfence.com"
|
||||
"source": "security@wordfence.com",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-6170",
|
||||
"sourceIdentifier": "security@wordfence.com",
|
||||
"published": "2024-07-09T05:15:13.947",
|
||||
"lastModified": "2024-07-09T18:19:14.047",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-07-12T14:20:01.013",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -18,8 +18,28 @@
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security@wordfence.com",
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 5.4,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.3,
|
||||
"impactScore": 2.7
|
||||
},
|
||||
{
|
||||
"source": "security@wordfence.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N",
|
||||
@ -39,22 +59,64 @@
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:unlimited-elements:unlimited_elements_for_elementor_\\(free_widgets\\,_addons\\,_templates\\):*:*:*:*:*:wordpress:*:*",
|
||||
"versionEndExcluding": "1.5.113",
|
||||
"matchCriteriaId": "3E9EAD0C-BB2F-415C-A40D-8A42B7095AC1"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/hakluke/weaponised-XSS-payloads/blob/master/wordpress_create_admin_user.js",
|
||||
"source": "security@wordfence.com"
|
||||
"source": "security@wordfence.com",
|
||||
"tags": [
|
||||
"Exploit"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/browser/unlimited-elements-for-elementor/trunk/inc_php/unitecreator_settings_output.class.php#L398",
|
||||
"source": "security@wordfence.com"
|
||||
"source": "security@wordfence.com",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/changeset/3112307/",
|
||||
"source": "security@wordfence.com"
|
||||
"source": "security@wordfence.com",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/db14b141-521b-464d-a638-2228b1a86c2b?source=cve",
|
||||
"source": "security@wordfence.com"
|
||||
"source": "security@wordfence.com",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-6171",
|
||||
"sourceIdentifier": "security@wordfence.com",
|
||||
"published": "2024-07-09T05:15:14.140",
|
||||
"lastModified": "2024-07-09T18:19:14.047",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-07-12T14:40:02.843",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -39,22 +39,64 @@
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "NVD-CWE-noinfo"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:unlimited-elements:unlimited_elements_for_elementor_\\(free_widgets\\,_addons\\,_templates\\):*:*:*:*:*:wordpress:*:*",
|
||||
"versionEndExcluding": "1.5.113",
|
||||
"matchCriteriaId": "3E9EAD0C-BB2F-415C-A40D-8A42B7095AC1"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/browser/unlimited-elements-for-elementor/trunk/inc_php/framework/functions.class.php#L3407",
|
||||
"source": "security@wordfence.com"
|
||||
"source": "security@wordfence.com",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/browser/unlimited-elements-for-elementor/trunk/inc_php/unitecreator_form.class.php#L742",
|
||||
"source": "security@wordfence.com"
|
||||
"source": "security@wordfence.com",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/changeset/3112307/",
|
||||
"source": "security@wordfence.com"
|
||||
"source": "security@wordfence.com",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/714acd7d-6d19-4087-bb27-b9a4ccbb678b?source=cve",
|
||||
"source": "security@wordfence.com"
|
||||
"source": "security@wordfence.com",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-6409",
|
||||
"sourceIdentifier": "secalert@redhat.com",
|
||||
"published": "2024-07-08T18:15:09.487",
|
||||
"lastModified": "2024-07-10T20:15:04.853",
|
||||
"lastModified": "2024-07-12T14:15:16.917",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -100,6 +100,10 @@
|
||||
"url": "https://security-tracker.debian.org/tracker/CVE-2024-6409",
|
||||
"source": "secalert@redhat.com"
|
||||
},
|
||||
{
|
||||
"url": "https://security.netapp.com/advisory/ntap-20240712-0003/",
|
||||
"source": "secalert@redhat.com"
|
||||
},
|
||||
{
|
||||
"url": "https://sig-security.rocky.page/issues/CVE-2024-6409/",
|
||||
"source": "secalert@redhat.com"
|
||||
|
108
README.md
108
README.md
@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours.
|
||||
### Last Repository Update
|
||||
|
||||
```plain
|
||||
2024-07-12T14:00:19.302606+00:00
|
||||
2024-07-12T16:00:17.941069+00:00
|
||||
```
|
||||
|
||||
### Most recent CVE Modification Timestamp synchronized with NVD
|
||||
|
||||
```plain
|
||||
2024-07-12T13:15:21.770000+00:00
|
||||
2024-07-12T15:46:00.290000+00:00
|
||||
```
|
||||
|
||||
### Last Data Feed Release
|
||||
@ -33,69 +33,67 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
|
||||
### Total Number of included CVEs
|
||||
|
||||
```plain
|
||||
256872
|
||||
256895
|
||||
```
|
||||
|
||||
### CVEs added in the last Commit
|
||||
|
||||
Recently added CVEs: `129`
|
||||
Recently added CVEs: `23`
|
||||
|
||||
- [CVE-2024-40984](CVE-2024/CVE-2024-409xx/CVE-2024-40984.json) (`2024-07-12T13:15:19.977`)
|
||||
- [CVE-2024-40985](CVE-2024/CVE-2024-409xx/CVE-2024-40985.json) (`2024-07-12T13:15:20.050`)
|
||||
- [CVE-2024-40986](CVE-2024/CVE-2024-409xx/CVE-2024-40986.json) (`2024-07-12T13:15:20.113`)
|
||||
- [CVE-2024-40987](CVE-2024/CVE-2024-409xx/CVE-2024-40987.json) (`2024-07-12T13:15:20.180`)
|
||||
- [CVE-2024-40988](CVE-2024/CVE-2024-409xx/CVE-2024-40988.json) (`2024-07-12T13:15:20.250`)
|
||||
- [CVE-2024-40989](CVE-2024/CVE-2024-409xx/CVE-2024-40989.json) (`2024-07-12T13:15:20.310`)
|
||||
- [CVE-2024-40990](CVE-2024/CVE-2024-409xx/CVE-2024-40990.json) (`2024-07-12T13:15:20.370`)
|
||||
- [CVE-2024-40991](CVE-2024/CVE-2024-409xx/CVE-2024-40991.json) (`2024-07-12T13:15:20.430`)
|
||||
- [CVE-2024-40992](CVE-2024/CVE-2024-409xx/CVE-2024-40992.json) (`2024-07-12T13:15:20.497`)
|
||||
- [CVE-2024-40993](CVE-2024/CVE-2024-409xx/CVE-2024-40993.json) (`2024-07-12T13:15:20.553`)
|
||||
- [CVE-2024-40994](CVE-2024/CVE-2024-409xx/CVE-2024-40994.json) (`2024-07-12T13:15:20.620`)
|
||||
- [CVE-2024-40995](CVE-2024/CVE-2024-409xx/CVE-2024-40995.json) (`2024-07-12T13:15:20.680`)
|
||||
- [CVE-2024-40996](CVE-2024/CVE-2024-409xx/CVE-2024-40996.json) (`2024-07-12T13:15:20.740`)
|
||||
- [CVE-2024-40997](CVE-2024/CVE-2024-409xx/CVE-2024-40997.json) (`2024-07-12T13:15:20.800`)
|
||||
- [CVE-2024-40998](CVE-2024/CVE-2024-409xx/CVE-2024-40998.json) (`2024-07-12T13:15:20.857`)
|
||||
- [CVE-2024-40999](CVE-2024/CVE-2024-409xx/CVE-2024-40999.json) (`2024-07-12T13:15:20.920`)
|
||||
- [CVE-2024-41000](CVE-2024/CVE-2024-410xx/CVE-2024-41000.json) (`2024-07-12T13:15:20.987`)
|
||||
- [CVE-2024-41001](CVE-2024/CVE-2024-410xx/CVE-2024-41001.json) (`2024-07-12T13:15:21.053`)
|
||||
- [CVE-2024-41002](CVE-2024/CVE-2024-410xx/CVE-2024-41002.json) (`2024-07-12T13:15:21.120`)
|
||||
- [CVE-2024-41003](CVE-2024/CVE-2024-410xx/CVE-2024-41003.json) (`2024-07-12T13:15:21.180`)
|
||||
- [CVE-2024-41004](CVE-2024/CVE-2024-410xx/CVE-2024-41004.json) (`2024-07-12T13:15:21.240`)
|
||||
- [CVE-2024-41005](CVE-2024/CVE-2024-410xx/CVE-2024-41005.json) (`2024-07-12T13:15:21.310`)
|
||||
- [CVE-2024-41006](CVE-2024/CVE-2024-410xx/CVE-2024-41006.json) (`2024-07-12T13:15:21.370`)
|
||||
- [CVE-2024-5325](CVE-2024/CVE-2024-53xx/CVE-2024-5325.json) (`2024-07-12T13:15:21.470`)
|
||||
- [CVE-2024-6495](CVE-2024/CVE-2024-64xx/CVE-2024-6495.json) (`2024-07-12T13:15:21.770`)
|
||||
- [CVE-2024-35773](CVE-2024/CVE-2024-357xx/CVE-2024-35773.json) (`2024-07-12T14:15:11.437`)
|
||||
- [CVE-2024-37202](CVE-2024/CVE-2024-372xx/CVE-2024-37202.json) (`2024-07-12T14:15:12.063`)
|
||||
- [CVE-2024-37213](CVE-2024/CVE-2024-372xx/CVE-2024-37213.json) (`2024-07-12T14:15:12.293`)
|
||||
- [CVE-2024-37544](CVE-2024/CVE-2024-375xx/CVE-2024-37544.json) (`2024-07-12T14:15:12.540`)
|
||||
- [CVE-2024-37560](CVE-2024/CVE-2024-375xx/CVE-2024-37560.json) (`2024-07-12T14:15:12.770`)
|
||||
- [CVE-2024-37564](CVE-2024/CVE-2024-375xx/CVE-2024-37564.json) (`2024-07-12T14:15:13.000`)
|
||||
- [CVE-2024-37927](CVE-2024/CVE-2024-379xx/CVE-2024-37927.json) (`2024-07-12T14:15:13.237`)
|
||||
- [CVE-2024-37928](CVE-2024/CVE-2024-379xx/CVE-2024-37928.json) (`2024-07-12T14:15:13.463`)
|
||||
- [CVE-2024-37932](CVE-2024/CVE-2024-379xx/CVE-2024-37932.json) (`2024-07-12T14:15:13.717`)
|
||||
- [CVE-2024-37933](CVE-2024/CVE-2024-379xx/CVE-2024-37933.json) (`2024-07-12T14:15:13.943`)
|
||||
- [CVE-2024-37938](CVE-2024/CVE-2024-379xx/CVE-2024-37938.json) (`2024-07-12T14:15:14.167`)
|
||||
- [CVE-2024-37939](CVE-2024/CVE-2024-379xx/CVE-2024-37939.json) (`2024-07-12T14:15:14.380`)
|
||||
- [CVE-2024-37940](CVE-2024/CVE-2024-379xx/CVE-2024-37940.json) (`2024-07-12T14:15:14.600`)
|
||||
- [CVE-2024-37941](CVE-2024/CVE-2024-379xx/CVE-2024-37941.json) (`2024-07-12T14:15:14.817`)
|
||||
- [CVE-2024-38700](CVE-2024/CVE-2024-387xx/CVE-2024-38700.json) (`2024-07-12T14:15:15.503`)
|
||||
- [CVE-2024-38704](CVE-2024/CVE-2024-387xx/CVE-2024-38704.json) (`2024-07-12T14:15:15.710`)
|
||||
- [CVE-2024-38706](CVE-2024/CVE-2024-387xx/CVE-2024-38706.json) (`2024-07-12T14:15:15.957`)
|
||||
- [CVE-2024-38709](CVE-2024/CVE-2024-387xx/CVE-2024-38709.json) (`2024-07-12T14:15:16.183`)
|
||||
- [CVE-2024-38715](CVE-2024/CVE-2024-387xx/CVE-2024-38715.json) (`2024-07-12T15:15:10.830`)
|
||||
- [CVE-2024-39903](CVE-2024/CVE-2024-399xx/CVE-2024-39903.json) (`2024-07-12T15:15:11.177`)
|
||||
- [CVE-2024-39909](CVE-2024/CVE-2024-399xx/CVE-2024-39909.json) (`2024-07-12T15:15:11.393`)
|
||||
- [CVE-2024-39914](CVE-2024/CVE-2024-399xx/CVE-2024-39914.json) (`2024-07-12T15:15:11.607`)
|
||||
- [CVE-2024-39916](CVE-2024/CVE-2024-399xx/CVE-2024-39916.json) (`2024-07-12T15:15:11.813`)
|
||||
|
||||
|
||||
### CVEs modified in the last Commit
|
||||
|
||||
Recently modified CVEs: `32`
|
||||
Recently modified CVEs: `38`
|
||||
|
||||
- [CVE-2023-51107](CVE-2023/CVE-2023-511xx/CVE-2023-51107.json) (`2024-07-12T13:15:11.750`)
|
||||
- [CVE-2024-0974](CVE-2024/CVE-2024-09xx/CVE-2024-0974.json) (`2024-07-12T12:49:07.030`)
|
||||
- [CVE-2024-1375](CVE-2024/CVE-2024-13xx/CVE-2024-1375.json) (`2024-07-12T12:49:07.030`)
|
||||
- [CVE-2024-2430](CVE-2024/CVE-2024-24xx/CVE-2024-2430.json) (`2024-07-12T12:49:07.030`)
|
||||
- [CVE-2024-2640](CVE-2024/CVE-2024-26xx/CVE-2024-2640.json) (`2024-07-12T12:49:07.030`)
|
||||
- [CVE-2024-2696](CVE-2024/CVE-2024-26xx/CVE-2024-2696.json) (`2024-07-12T12:49:07.030`)
|
||||
- [CVE-2024-3112](CVE-2024/CVE-2024-31xx/CVE-2024-3112.json) (`2024-07-12T12:49:07.030`)
|
||||
- [CVE-2024-36435](CVE-2024/CVE-2024-364xx/CVE-2024-36435.json) (`2024-07-12T12:49:11.340`)
|
||||
- [CVE-2024-4753](CVE-2024/CVE-2024-47xx/CVE-2024-4753.json) (`2024-07-12T12:49:07.030`)
|
||||
- [CVE-2024-5626](CVE-2024/CVE-2024-56xx/CVE-2024-5626.json) (`2024-07-12T12:49:07.030`)
|
||||
- [CVE-2024-5811](CVE-2024/CVE-2024-58xx/CVE-2024-5811.json) (`2024-07-12T12:49:07.030`)
|
||||
- [CVE-2024-6022](CVE-2024/CVE-2024-60xx/CVE-2024-6022.json) (`2024-07-12T12:49:07.030`)
|
||||
- [CVE-2024-6023](CVE-2024/CVE-2024-60xx/CVE-2024-6023.json) (`2024-07-12T12:49:07.030`)
|
||||
- [CVE-2024-6024](CVE-2024/CVE-2024-60xx/CVE-2024-6024.json) (`2024-07-12T12:49:07.030`)
|
||||
- [CVE-2024-6052](CVE-2024/CVE-2024-60xx/CVE-2024-6052.json) (`2024-07-12T13:15:21.680`)
|
||||
- [CVE-2024-6328](CVE-2024/CVE-2024-63xx/CVE-2024-6328.json) (`2024-07-12T12:49:07.030`)
|
||||
- [CVE-2024-6353](CVE-2024/CVE-2024-63xx/CVE-2024-6353.json) (`2024-07-12T12:49:07.030`)
|
||||
- [CVE-2024-6392](CVE-2024/CVE-2024-63xx/CVE-2024-6392.json) (`2024-07-12T12:49:07.030`)
|
||||
- [CVE-2024-6396](CVE-2024/CVE-2024-63xx/CVE-2024-6396.json) (`2024-07-12T12:49:07.030`)
|
||||
- [CVE-2024-6468](CVE-2024/CVE-2024-64xx/CVE-2024-6468.json) (`2024-07-12T12:49:11.340`)
|
||||
- [CVE-2024-6531](CVE-2024/CVE-2024-65xx/CVE-2024-6531.json) (`2024-07-12T12:49:11.340`)
|
||||
- [CVE-2024-6555](CVE-2024/CVE-2024-65xx/CVE-2024-6555.json) (`2024-07-12T12:49:07.030`)
|
||||
- [CVE-2024-6588](CVE-2024/CVE-2024-65xx/CVE-2024-6588.json) (`2024-07-12T12:49:07.030`)
|
||||
- [CVE-2024-6625](CVE-2024/CVE-2024-66xx/CVE-2024-6625.json) (`2024-07-12T12:49:07.030`)
|
||||
- [CVE-2024-6677](CVE-2024/CVE-2024-66xx/CVE-2024-6677.json) (`2024-07-12T12:49:07.030`)
|
||||
- [CVE-2024-38086](CVE-2024/CVE-2024-380xx/CVE-2024-38086.json) (`2024-07-12T15:45:05.137`)
|
||||
- [CVE-2024-38089](CVE-2024/CVE-2024-380xx/CVE-2024-38089.json) (`2024-07-12T15:42:39.127`)
|
||||
- [CVE-2024-38091](CVE-2024/CVE-2024-380xx/CVE-2024-38091.json) (`2024-07-12T15:35:41.100`)
|
||||
- [CVE-2024-38092](CVE-2024/CVE-2024-380xx/CVE-2024-38092.json) (`2024-07-12T15:05:16.757`)
|
||||
- [CVE-2024-38472](CVE-2024/CVE-2024-384xx/CVE-2024-38472.json) (`2024-07-12T14:15:15.043`)
|
||||
- [CVE-2024-38473](CVE-2024/CVE-2024-384xx/CVE-2024-38473.json) (`2024-07-12T14:15:15.133`)
|
||||
- [CVE-2024-38474](CVE-2024/CVE-2024-384xx/CVE-2024-38474.json) (`2024-07-12T14:15:15.203`)
|
||||
- [CVE-2024-38475](CVE-2024/CVE-2024-384xx/CVE-2024-38475.json) (`2024-07-12T14:15:15.277`)
|
||||
- [CVE-2024-38476](CVE-2024/CVE-2024-384xx/CVE-2024-38476.json) (`2024-07-12T14:15:15.360`)
|
||||
- [CVE-2024-38477](CVE-2024/CVE-2024-384xx/CVE-2024-38477.json) (`2024-07-12T14:15:15.430`)
|
||||
- [CVE-2024-38970](CVE-2024/CVE-2024-389xx/CVE-2024-38970.json) (`2024-07-12T14:51:48.070`)
|
||||
- [CVE-2024-38971](CVE-2024/CVE-2024-389xx/CVE-2024-38971.json) (`2024-07-12T14:50:45.817`)
|
||||
- [CVE-2024-39536](CVE-2024/CVE-2024-395xx/CVE-2024-39536.json) (`2024-07-12T15:15:11.040`)
|
||||
- [CVE-2024-39573](CVE-2024/CVE-2024-395xx/CVE-2024-39573.json) (`2024-07-12T14:15:16.400`)
|
||||
- [CVE-2024-39743](CVE-2024/CVE-2024-397xx/CVE-2024-39743.json) (`2024-07-12T14:15:16.487`)
|
||||
- [CVE-2024-39884](CVE-2024/CVE-2024-398xx/CVE-2024-39884.json) (`2024-07-12T14:15:16.640`)
|
||||
- [CVE-2024-39894](CVE-2024/CVE-2024-398xx/CVE-2024-39894.json) (`2024-07-12T14:15:16.703`)
|
||||
- [CVE-2024-4667](CVE-2024/CVE-2024-46xx/CVE-2024-4667.json) (`2024-07-12T14:25:13.923`)
|
||||
- [CVE-2024-5535](CVE-2024/CVE-2024-55xx/CVE-2024-5535.json) (`2024-07-12T14:15:16.790`)
|
||||
- [CVE-2024-5802](CVE-2024/CVE-2024-58xx/CVE-2024-5802.json) (`2024-07-12T15:20:14.610`)
|
||||
- [CVE-2024-6166](CVE-2024/CVE-2024-61xx/CVE-2024-6166.json) (`2024-07-12T14:23:53.600`)
|
||||
- [CVE-2024-6169](CVE-2024/CVE-2024-61xx/CVE-2024-6169.json) (`2024-07-12T14:30:07.300`)
|
||||
- [CVE-2024-6170](CVE-2024/CVE-2024-61xx/CVE-2024-6170.json) (`2024-07-12T14:20:01.013`)
|
||||
- [CVE-2024-6171](CVE-2024/CVE-2024-61xx/CVE-2024-6171.json) (`2024-07-12T14:40:02.843`)
|
||||
- [CVE-2024-6409](CVE-2024/CVE-2024-64xx/CVE-2024-6409.json) (`2024-07-12T14:15:16.917`)
|
||||
|
||||
|
||||
## Download and Usage
|
||||
|
419
_state.csv
419
_state.csv
@ -107267,7 +107267,7 @@ CVE-2017-7259,0,0,69b026e123fdf946188259e9d5a9f10d1ce65e924d16b7b366af094d52ef79
|
||||
CVE-2017-7261,0,0,4812f249d0b978bca26ec4cf413997f80548fc682770a140a54aa8b2c2325d58,2017-03-29T01:59:02.890000
|
||||
CVE-2017-7262,0,0,1b76aca7a563bfb0ed2d7a647a45be766a9f36a4ff41086e1d5e89813e8e3da7,2017-03-29T13:57:42.320000
|
||||
CVE-2017-7263,0,0,39399228455e6c8c01a8785cc5008bf2faebce69a84ccf7bab1fb94312c127b0,2017-03-29T01:59:03
|
||||
CVE-2017-7264,0,1,a59a4af1a12ac2c3e2a0b34f1a072b1dabed1defa716369bf3881478f6b0ffd6,2024-07-12T13:15:11.073000
|
||||
CVE-2017-7264,0,0,a59a4af1a12ac2c3e2a0b34f1a072b1dabed1defa716369bf3881478f6b0ffd6,2024-07-12T13:15:11.073000
|
||||
CVE-2017-7266,0,0,617798729988dfd0aea75162535d304b535d075d4d4d7d3ee6863de6b51ec39d,2017-03-29T01:59:03.110000
|
||||
CVE-2017-7269,0,0,fa7619d180271c6222bb9c66b4f38376efd4e64e7658573ca80ffd922d752545,2023-11-07T02:50:02.587000
|
||||
CVE-2017-7271,0,0,3edfad032ac3ceaafa26c67c18b49ba963bdc2183e6f8676f05dc26ecc2bf4a1,2017-05-08T01:29:00.267000
|
||||
@ -110716,11 +110716,11 @@ CVE-2018-1000032,0,0,0acd2b876ee74fa3ec480d14eb921082ce2645391c28d7cb684c288d1a1
|
||||
CVE-2018-1000033,0,0,758af4b82feeb000d0cb08c033fbe7afa7163497954922da4f5cdecf8c45bf00,2018-02-26T18:41:29.290000
|
||||
CVE-2018-1000034,0,0,9523274213dbf80db86764d560867e28c13808d19f2cacfaa4cc405190f79233,2018-02-26T19:11:58.640000
|
||||
CVE-2018-1000035,0,0,3415092cee916f5c4c971fb656506255e65a20783554e5b2aa928722c1502ef1,2020-08-24T17:37:01.140000
|
||||
CVE-2018-1000036,0,1,cf5accb052a6cf965bcee24601f9631ee1d4bf5b1178c4b3b4411e318b15e9ea,2024-07-12T13:15:11.203000
|
||||
CVE-2018-1000037,0,1,d2c2eec4bda81b9a494fc38e14e6c4c163411d355fce6ffd40e3522f66fa4f6a,2024-07-12T13:15:11.360000
|
||||
CVE-2018-1000038,0,1,c593b7bd3b0d503716b938dbe9474845021720ef3257b24fd05b05b8b36eea2a,2024-07-12T13:15:11.443000
|
||||
CVE-2018-1000039,0,1,3ff198d185b1e84f49d2b54ee9bf3954ad21c9eb3e5bef8e702827a693f7d90e,2024-07-12T13:15:11.523000
|
||||
CVE-2018-1000040,0,1,1e04906576224825e0838d21b3355840fa843a3c62bb9a6a186b1f066b8907e4,2024-07-12T13:15:11.603000
|
||||
CVE-2018-1000036,0,0,cf5accb052a6cf965bcee24601f9631ee1d4bf5b1178c4b3b4411e318b15e9ea,2024-07-12T13:15:11.203000
|
||||
CVE-2018-1000037,0,0,d2c2eec4bda81b9a494fc38e14e6c4c163411d355fce6ffd40e3522f66fa4f6a,2024-07-12T13:15:11.360000
|
||||
CVE-2018-1000038,0,0,c593b7bd3b0d503716b938dbe9474845021720ef3257b24fd05b05b8b36eea2a,2024-07-12T13:15:11.443000
|
||||
CVE-2018-1000039,0,0,3ff198d185b1e84f49d2b54ee9bf3954ad21c9eb3e5bef8e702827a693f7d90e,2024-07-12T13:15:11.523000
|
||||
CVE-2018-1000040,0,0,1e04906576224825e0838d21b3355840fa843a3c62bb9a6a186b1f066b8907e4,2024-07-12T13:15:11.603000
|
||||
CVE-2018-1000041,0,0,1c7b8a1367ade58ab048708aa3cafe3fccf08335df32cd4f8e84f35506794233,2019-10-03T00:03:26.223000
|
||||
CVE-2018-1000042,0,0,f14be813ddab075254d5991098380200ccd025b3f50ac0160084d3059c59fb01,2018-03-01T15:31:27.683000
|
||||
CVE-2018-1000043,0,0,233dd7c8c3a5eba4237057cc5b91308d5a18f2a40a5f5f04c0b0302794900f78,2018-03-01T15:31:49.637000
|
||||
@ -182640,7 +182640,7 @@ CVE-2021-41033,0,0,24bd0fcce23287825d9bc13c90734a454ce763b0fd48ee666433398ee521c
|
||||
CVE-2021-41034,0,0,a0bce4130e9b172a8c134fb300611067f49454495913ed0012b494c6358cd1cf,2021-10-07T20:35:06.457000
|
||||
CVE-2021-41035,0,0,55ac0e948ca3894b37f35a2a515e1eb7b0ce1ca1e4f1ecb07b65c883b62862d6,2024-06-21T19:15:20.613000
|
||||
CVE-2021-41036,0,0,719e0533c9ed84d4c2c527b699d39b5462e4628e46ebe98e9a35515dcd343063,2021-11-04T18:52:35.630000
|
||||
CVE-2021-41037,0,0,37841b8f97c767755698068c40097eb78a837e2eabb7b25a6644d3e67e6685a1,2022-07-15T22:38:02.777000
|
||||
CVE-2021-41037,0,1,9cf00facd282e47ce4934d4665516c4800f4294584d2d74947a8b9f4a6e069f9,2024-07-12T14:15:10.960000
|
||||
CVE-2021-41038,0,0,9eee158ed510ae924dabc62f6adbd1bcceb0960aeab59346131261a8114cb4f3,2021-11-13T03:57:06.957000
|
||||
CVE-2021-41039,0,0,ee820bb0de6ade7525a950e1a5a0a2a55c750150b3d8285367c995ea37123f84,2023-10-02T12:15:09.793000
|
||||
CVE-2021-4104,0,0,e0b3ea29b7e4f7728a602d08c283d0b0250a56468e5e5a7251fbfe53ee71a0c8,2023-12-22T09:15:36.510000
|
||||
@ -197973,7 +197973,7 @@ CVE-2022-29942,0,0,661d7b53b3e4faae469b541bab8f7bb1ef49e85bbde98e3af74e257a20e39
|
||||
CVE-2022-29943,0,0,433def69a7c009f3ebd39bf21f1aa84ac2cfa7806ad3720df19ed492b3d20ec1,2022-05-13T17:23:57.113000
|
||||
CVE-2022-29944,0,0,cf3afc94cfcad942eceefb12c790879af69b2dbc44c55bb9999d49beb0903757,2023-05-03T17:27:22.773000
|
||||
CVE-2022-29945,0,0,68b2d3cfe71207c28c25d66eac2f0eb8c1c3c1858380e0cfd315018919ec3989,2023-08-08T14:22:24.967000
|
||||
CVE-2022-29946,0,1,35b98985e5959bf121ee889866ada3c50315477891d70bf66d8c217b0e2e59b8,2024-07-12T12:49:11.340000
|
||||
CVE-2022-29946,0,0,35b98985e5959bf121ee889866ada3c50315477891d70bf66d8c217b0e2e59b8,2024-07-12T12:49:11.340000
|
||||
CVE-2022-29947,0,0,25f2e84f2fed42f45ce3a64d965cbf21e6b3b6627b019f75c5ee29011befeb70,2022-05-11T13:56:37.537000
|
||||
CVE-2022-29948,0,0,f6a129c560c6578711433f773fb299062d73607738c33178019b52ca028b1ba0,2022-10-29T02:46:43.147000
|
||||
CVE-2022-2995,0,0,f92eb44e10925fbf4e4c8f4c80f70b9aa8afd50b91f45434d6648c8bb4ff832b,2022-09-21T18:05:11.537000
|
||||
@ -226409,7 +226409,7 @@ CVE-2023-35675,0,0,322f35d8f234392eaad24055a30439a2488507eca52e03766c5a55c9f458e
|
||||
CVE-2023-35676,0,0,35f8ac23549e5de4a664a00239bc3a68fd2c010a469559f32665c4bd41c03957,2023-09-13T17:40:15.690000
|
||||
CVE-2023-35677,0,0,23fc11675d9ba86843901bb4faf7a602ba1fd7820a122008ea932f97a10101e5,2023-09-13T17:39:58.473000
|
||||
CVE-2023-35679,0,0,e1489c82741c8d349ff54e21d81eb8c2e7bd79ddc6302af16ecbe9289d13f5de,2023-09-13T17:39:43.833000
|
||||
CVE-2023-3568,0,0,1da679aba2926270ce6e4e16f84dd57123216b04a688effc4b364e5d296c8c49,2023-08-02T09:15:14.110000
|
||||
CVE-2023-3568,0,1,16fc4b2c4899ec32532ab1977d49aa0a92cf21f20ade7158957493db49fc0558,2024-07-12T14:17:46.530000
|
||||
CVE-2023-35680,0,0,9c68d6177e945e6e10c7bfc32d62c7e9ab573ff707c78ee40e3b166bc08a0226,2023-09-13T17:39:23.453000
|
||||
CVE-2023-35681,0,0,16a3dfe5b52f659d007448c63742257b9c673752d2e068aad56677f46d9e3abd,2023-09-13T14:39:48.377000
|
||||
CVE-2023-35682,0,0,1220da7a0232745d1d76c07435c1d58ba451e6724dea1cab9127ef6ca7e7ef4e,2023-09-13T14:39:22.120000
|
||||
@ -226773,7 +226773,7 @@ CVE-2023-36088,0,0,adeb7542a0b36ad0e677bb083548bd690615cee49bea4f9900061d485d1c6
|
||||
CVE-2023-36089,0,0,2771bc5c879e1de8820012ecba52a4787073b4c27227789fd419ed645c8e8004,2024-05-17T02:25:36.023000
|
||||
CVE-2023-3609,0,0,c29430198f2d9fc261960f6718c27a668ec89142737d4fdfa398d9c0186ebd48,2024-01-11T19:15:10.430000
|
||||
CVE-2023-36090,0,0,1888bbe923878ea10fe27029247bdca9c55422ea92c62c35db81fe9d187b808e,2024-06-05T21:15:11.203000
|
||||
CVE-2023-36091,0,0,b0b65bcb652e9494e978dec75be2d3f10629392cd61662398cf09cc7ddbcc3f2,2024-05-17T02:25:36.197000
|
||||
CVE-2023-36091,0,1,f54a3f9f64402a144ccb837ea663b986ed5be34b441f62589c80930dc87fa349,2024-07-12T15:15:10.333000
|
||||
CVE-2023-36092,0,0,5ac46a73cbf9c10e5e9aec3b989e3b303f0326c1702ab98bacf82cfe4c9b7ab0,2024-05-17T02:25:36.277000
|
||||
CVE-2023-36093,0,0,6ed7b9ec110aa8a1938d3abb701d1b06f356b2415773d1be816930b91e78072b,2023-06-28T07:22:21.237000
|
||||
CVE-2023-36095,0,0,5979811f6260c02f6160e9c5a8e6c1acc6ac56a969fd2ce4ee9d695a02c55f5e,2023-08-14T18:15:10.927000
|
||||
@ -237546,7 +237546,7 @@ CVE-2023-51103,0,0,b330d390b448ec6c689497e8d924b0ca338c3534faa25e07b0a7ac42997f9
|
||||
CVE-2023-51104,0,0,b83b78fa695252b9bc562b66774da5aa3c3d13492f6b25b379db3d99c45899c7,2024-07-11T18:15:05.497000
|
||||
CVE-2023-51105,0,0,0dbc1485003c4c6257746ac53f11aaeaf8f3a7101c7e00fa09d1e95f1fe0ac66,2024-07-11T18:15:05.590000
|
||||
CVE-2023-51106,0,0,2ad42e3fc60bf937fccd789a94702f6663bceff82ffdd09e8001ab565c4bd666,2024-03-18T04:15:08.790000
|
||||
CVE-2023-51107,0,1,a979188fdd0904c359f4e4355843150c502e7c3e5e0671eba4aeda916898987f,2024-07-12T13:15:11.750000
|
||||
CVE-2023-51107,0,0,a979188fdd0904c359f4e4355843150c502e7c3e5e0671eba4aeda916898987f,2024-07-12T13:15:11.750000
|
||||
CVE-2023-5111,0,0,9aa75e6a8b2cdd2372d791a9a0def8ce9e9d4923ff9c71c4dfed5da5d92d1561,2023-10-06T17:58:29.377000
|
||||
CVE-2023-5112,0,0,d81fb9dddba12fffd3f0f7638c38afa8e9a05dbf23a9ba002cb4caee7a6d6442,2023-10-19T20:31:22.843000
|
||||
CVE-2023-51123,0,0,e782f5906a61f8c3aa5a1e21fdf6b1aef6e06b6b56dc48490245583d92e67251,2024-01-22T16:15:08.230000
|
||||
@ -241531,7 +241531,7 @@ CVE-2024-0969,0,0,b70a3e678841d5c3e905a1a4d78ee61bc51fd818aa668b1889827f06c39355
|
||||
CVE-2024-0971,0,0,10711fc5fd019982dab0af4d04cad68f7d925a8d90883facb336aae2462a64e3,2024-03-04T22:58:00.967000
|
||||
CVE-2024-0972,0,0,2a8d3a85f6223a6c38540c13150a8805bcc289466ff43a37dc35cbb6bde1ee58,2024-06-06T14:17:35.017000
|
||||
CVE-2024-0973,0,0,87a64eeb8545d2aed4850999f1a0515438bc623727357d945a5399ed140bee41,2024-03-18T19:40:00.173000
|
||||
CVE-2024-0974,0,1,1ecd9c08c9b1a1cd3e32d8b2ce7d7389423f3770b3d01388be03cdfb85e113fd,2024-07-12T12:49:07.030000
|
||||
CVE-2024-0974,0,0,1ecd9c08c9b1a1cd3e32d8b2ce7d7389423f3770b3d01388be03cdfb85e113fd,2024-07-12T12:49:07.030000
|
||||
CVE-2024-0975,0,0,727e762e9bf21cc79d41b3d973240a06501d145479fa8fca0d0cfdc6efc382cc,2024-02-28T14:06:45.783000
|
||||
CVE-2024-0976,0,0,961ca83ff90147b357fdad21a4ce2284407f8f5fed2f5570590409615417a9e7,2024-03-13T18:16:18.563000
|
||||
CVE-2024-0977,0,0,265a9a088dbf9179612f3eba4d6866f7160bf19014cca832dc6a54c521c233b7,2024-02-14T18:46:52.707000
|
||||
@ -241909,7 +241909,7 @@ CVE-2024-1371,0,0,93706cb3903d44813efe65388227c96437c2154d1873db13a512d53a3d1e58
|
||||
CVE-2024-1372,0,0,fd6a0b0bdbecc63f56aef495458a3c5dd8f2e76f436e6cb5f113766b10bba4a3,2024-03-05T17:12:04.487000
|
||||
CVE-2024-1373,0,0,6182eba24b857bc2b56524dd4b982074bd00b00d58fe9873ed20ec6b67a1b251,2024-03-11T10:15:49.383000
|
||||
CVE-2024-1374,0,0,7fe6e2944b2df04d1912da5645567f3da2009d2f734eda817ead1dbb0beca205,2024-03-06T15:26:34.817000
|
||||
CVE-2024-1375,0,1,b0fbcc81f699e0e89def136608395253cb6f1e83310923c94526748697e14b41,2024-07-12T12:49:07.030000
|
||||
CVE-2024-1375,0,0,b0fbcc81f699e0e89def136608395253cb6f1e83310923c94526748697e14b41,2024-07-12T12:49:07.030000
|
||||
CVE-2024-1376,0,0,3f5093aebba17bcc569f7c0a532d073178955aeebf7468859be137b5aa030a60,2024-05-24T13:03:05.093000
|
||||
CVE-2024-1377,0,0,89ec0d3cfd7c9e3eb401e7d154a45976b7a536cce1245cff377347594bc84e11,2024-03-07T13:52:27.110000
|
||||
CVE-2024-1378,0,0,861a3323ec8efaeb758681460069e84c3f0f238c20d369cc8b41f972b8f59fb9,2024-03-01T23:02:21.513000
|
||||
@ -245159,7 +245159,7 @@ CVE-2024-2429,0,0,6f82bfe12677abd0ded60841d7ddd794d901d8b55be20f02cefabe3e057f84
|
||||
CVE-2024-24291,0,0,ed81ca1f7d07ab5682e5dc3e12510be85bd8028a8e8a8fb1a80b96c7b9ae97e4,2024-02-13T20:13:26.593000
|
||||
CVE-2024-24293,0,0,eb622a35637583d584ad609649d42dcf62a63a936bf3a82b7c98c7b05f54a6ab,2024-05-20T19:34:58.277000
|
||||
CVE-2024-24294,0,0,fb53dd3f3a0181debfcca619f6a3363f362852d8c93652ea4617fd4b0661a31c,2024-07-03T01:48:14.450000
|
||||
CVE-2024-2430,0,1,eb0e5935be33446c712bf3868a6e1b8dfa4465f5af752c0d711629f0c3b13154,2024-07-12T12:49:07.030000
|
||||
CVE-2024-2430,0,0,eb0e5935be33446c712bf3868a6e1b8dfa4465f5af752c0d711629f0c3b13154,2024-07-12T12:49:07.030000
|
||||
CVE-2024-24300,0,0,a8dc475a562e17ac269ab87541d5cc3de5e8b25ad6f69c16a9e202ce4fe0a524,2024-02-15T06:23:39.303000
|
||||
CVE-2024-24301,0,0,eea9ef656f8457ca391649537e978f0d3e4722722df26eae84433b0c4b119a98,2024-02-15T06:23:39.303000
|
||||
CVE-2024-24302,0,0,772bc3946fe7698710ee11197feaab740359b0c096b2ee136ddb7f1dcb856d06,2024-07-03T01:48:15.277000
|
||||
@ -246551,7 +246551,7 @@ CVE-2024-26367,0,0,ceb2808d00aec1724941312eb31317fb9ca784802bb2ae58f80e28e9667ec
|
||||
CVE-2024-26369,0,0,b0322db94f9b89a2da31dd1ffa70ef568f3b1c4901ca044ba9c0ea1e2eb29c09,2024-03-19T13:26:46
|
||||
CVE-2024-2637,0,0,41c22874cb88b645bccc5162f78b9b5c7f466bc74b1b50f3d7f10bda614ec047,2024-05-27T08:15:09.360000
|
||||
CVE-2024-2639,0,0,0a379ca73fbb79fdbd8f18fc8cd7d5818278eb25b07ecfab9db46031f52aaa19,2024-05-17T02:38:22.540000
|
||||
CVE-2024-2640,0,1,da0ff9ba9c7741bdd8eac7278a68a4d2f067fde4d5d893dc82ef3e3b39f7c685,2024-07-12T12:49:07.030000
|
||||
CVE-2024-2640,0,0,da0ff9ba9c7741bdd8eac7278a68a4d2f067fde4d5d893dc82ef3e3b39f7c685,2024-07-12T12:49:07.030000
|
||||
CVE-2024-2641,0,0,f8817d39db046b0703540421bdc7defa8773388c970d95d9af56a10acaf6505b,2024-05-17T02:38:22.647000
|
||||
CVE-2024-2642,0,0,8e9139118e526637636dbb75ee7b325451ccf936f521c86702bbdd8ba223ba4d,2024-05-17T02:38:22.743000
|
||||
CVE-2024-2644,0,0,10576652d4b00db27dae15790aec2d4421a3f554442aef5d73285e025d9ff0d8,2024-06-05T20:15:12.680000
|
||||
@ -247026,7 +247026,7 @@ CVE-2024-26956,0,0,03b8b6d93122c87e1d6edb9acf0c32232fac7a1bfa20c866ade9468ab42e2
|
||||
CVE-2024-26957,0,0,871ec22ed701e6c25fde35c12b49fcc960cd21538002ff829aa32c4c117b7686,2024-07-03T01:50:07.493000
|
||||
CVE-2024-26958,0,0,14cf34198e5226cd9903fa4b7cd1b1356a627031f18c7d5956b5b6c2e6094b25,2024-06-25T22:15:26.937000
|
||||
CVE-2024-26959,0,0,b20b713d07b74cf4ab31aefa115749077979ac722940c0353f278e6b20f8cce7,2024-05-01T13:02:20.750000
|
||||
CVE-2024-2696,0,1,f6d219b24bfcecbacf93f2b1140b3364055c0500efd4e7a7da00be9561ddcf69,2024-07-12T12:49:07.030000
|
||||
CVE-2024-2696,0,0,f6d219b24bfcecbacf93f2b1140b3364055c0500efd4e7a7da00be9561ddcf69,2024-07-12T12:49:07.030000
|
||||
CVE-2024-26960,0,0,59e6b3e033a957b45cd72dd6675eb95ba7e94918875e89eeb9cba1fa4639541c,2024-07-03T01:50:08.270000
|
||||
CVE-2024-26961,0,0,05af2764d15ac446009c797cc05088526f3e6471c70181e566519fae53a37419,2024-06-25T22:15:27.007000
|
||||
CVE-2024-26962,0,0,21615a88704d38867dbd9993e5fd2c885d58669c1484f879178b0965705ef667,2024-05-01T13:02:20.750000
|
||||
@ -247408,9 +247408,9 @@ CVE-2024-27355,0,0,f69927749d318ce3d471850deb21bc77767a9c94b5f501be3a1713c1109a5
|
||||
CVE-2024-27356,0,0,2464f4bdc7cd759969915038df7055199f0bd02c6d9b1a8ceb85c7588507e9ba,2024-02-27T14:20:06.637000
|
||||
CVE-2024-27359,0,0,d9efe9852d793e4ebe4144d07c8562893d90ae6614ba783353ad624a692629dc,2024-02-26T16:32:25.577000
|
||||
CVE-2024-2736,0,0,96df463215442710ad6542ed46ad6ce78bf41dcfbe1139413a93d5accfaff739,2024-04-10T13:23:38.787000
|
||||
CVE-2024-27360,0,0,ef90b211e38e26de7cd6ad266f9667b57752920efeb0c78d69800f0173df48ef,2024-07-09T18:18:38.713000
|
||||
CVE-2024-27360,0,1,33246297884723d4ff8bb58853158d18ca6235582cb6c304b20ea59c674486c8,2024-07-12T14:57:53.930000
|
||||
CVE-2024-27361,0,0,e36b02dee6138d8db49ead5ecd9bf32ca156e68e27cc50daa8adffe6cb1ea663,2024-07-11T13:06:13.187000
|
||||
CVE-2024-27362,0,0,f6cf094287aa89a818448bb40454e447472a3a4a0dff2e33d58ba4042270372a,2024-07-09T18:18:38.713000
|
||||
CVE-2024-27362,0,1,9d431a1116edfb20ae4c799537e5e9f5d11ebb0847e9e8bdd27f35d143873f1d,2024-07-12T14:58:02.413000
|
||||
CVE-2024-27363,0,0,f6352d5e26499e6478b31ffa535bfa444a95ad102dd84d5e4c2e7b2372cfbda9,2024-07-11T13:06:13.187000
|
||||
CVE-2024-27370,0,0,5b56b4aec0b74e65c542ad5e11bbce934e8a13a6890d7d5fbee25660d9ce6439,2024-06-27T16:42:33.073000
|
||||
CVE-2024-27371,0,0,9a5ee3ff6f4187d583cb003bf2bfa499e427c66f27dff5bb486ff8a2172d0862,2024-06-27T16:40:45.063000
|
||||
@ -247865,7 +247865,7 @@ CVE-2024-28063,0,0,8b4daa0dfe18458d1d4f0e0079b8409dd79607264a48fce0d64909485ac7a
|
||||
CVE-2024-28064,0,0,d4ef909cb17c3cdb1e2d0bc0d383e367ea00ec2cddba9dbb7063988318bb0a6f,2024-05-20T13:00:04.957000
|
||||
CVE-2024-28065,0,0,9c3c0973cec8416a73aebaf79d96b27bfde387bdfffa9e02e29e42d0c5bd8070,2024-04-08T18:49:25.863000
|
||||
CVE-2024-28066,0,0,8d264de635ae9c8dc6d41b6ed16f7f85828f585eea298ce9fb065b16c33683e3,2024-04-08T18:48:40.217000
|
||||
CVE-2024-28067,0,0,0af34335bd5c50d512b8c109c02a349e9b931cbcda3258c91f6a4aa62f373bc1,2024-07-09T18:18:38.713000
|
||||
CVE-2024-28067,0,1,87f8f4904932894fbb80fce767ebf619e7e55e28806f6fe43c6dfd5af113cbe6,2024-07-12T14:57:36.897000
|
||||
CVE-2024-28068,0,0,bc3074d56d7203ab69c965398848e97ee8558e2f286e7ec5251e1ecf155f732a,2024-07-11T13:06:13.187000
|
||||
CVE-2024-28069,0,0,99a57a9955c5ed5463e7c560b95e0a17dfa2789ec3c024f2825003d476d4b80d,2024-03-17T22:38:29.433000
|
||||
CVE-2024-2807,0,0,ceddd5b2cd81d31fee5f18b8bacde7f821c00daf332201952118e19cfa7a07c3,2024-05-17T02:38:31.100000
|
||||
@ -249855,7 +249855,7 @@ CVE-2024-31114,0,0,2db2f19bbb762fd0846a2fd0f4c21316984760b44cf0e285d2fa1b7eb4e97
|
||||
CVE-2024-31115,0,0,f67bb2935cdc482183cf83d729450e227d4215d9791e6eef39eb5dd63dc4ee92,2024-05-08T13:15:07.937000
|
||||
CVE-2024-31116,0,0,3e5261af5d77a4c950ede646e6aaa3b3de701ce47018fc260e62e0781699fc7b,2024-04-01T01:12:59.077000
|
||||
CVE-2024-31117,0,0,f06fda643bf8c516426ab572b27573cbf6214c3aa5f8b1df27ac2265745b81dc,2024-04-01T01:12:59.077000
|
||||
CVE-2024-3112,0,1,fc2fc771752261fabb4adaadd46991f5bf2193940a3823231630b345a52a575d,2024-07-12T12:49:07.030000
|
||||
CVE-2024-3112,0,0,fc2fc771752261fabb4adaadd46991f5bf2193940a3823231630b345a52a575d,2024-07-12T12:49:07.030000
|
||||
CVE-2024-31120,0,0,7340f0aa8567a325d352b7087d6dd0d44e3a1e7ab597204dd16dbc0e323747bc,2024-04-01T01:12:59.077000
|
||||
CVE-2024-31121,0,0,4fe9a2eff5a4d2ff266e2e268b50578938b85c71b50b3bd948fd3ec69947d849,2024-04-01T01:12:59.077000
|
||||
CVE-2024-31122,0,0,745a899ec0013d7867b6d15accca135c5ce3d8a09d809883e11eb140dbea32b8,2024-04-01T01:12:59.077000
|
||||
@ -250384,7 +250384,7 @@ CVE-2024-31952,0,0,5f29e6541e024f9b1bd72bdf8ee8e438dfaedf18a9a002e17369656e46ca5
|
||||
CVE-2024-31953,0,0,473e2dd03665c41fd12eb732a6a8b796dd851974540019960eeeb8c84154b002,2024-07-03T01:55:35.270000
|
||||
CVE-2024-31954,0,0,75cb48abade3eb19dfa6628441b7fbf62791ae48f745250b97879749047eeee3,2024-07-03T01:55:35.973000
|
||||
CVE-2024-31956,0,0,56222bae986fe87c83c759cf706c4f2021e893534f083e7f4ddb4dffa4c53b2c,2024-06-13T18:35:19.777000
|
||||
CVE-2024-31957,0,0,43703613c7bea46803b3bce5e3c9db2f1fdcbd1e957e3164e13b43bb337eeb57,2024-07-09T18:18:38.713000
|
||||
CVE-2024-31957,0,1,52e3fc3f2f752e45a27580270575f061b25dbef0b821774e0c078c02042898e2,2024-07-12T14:53:30.260000
|
||||
CVE-2024-31958,0,0,92a0a8c4e3002c821a3c846306658e74a9964a41bffea58fc59bb9ff3c43087c,2024-06-07T19:24:09.243000
|
||||
CVE-2024-31959,0,0,881dd9c88eb573b82854e8881ea0e763e3c9111ab6dfe4157e823bc664d8a323,2024-06-07T19:24:09.243000
|
||||
CVE-2024-3196,0,0,d5a1cb2b9527bda623e9f193c03f796a5c33bdfc24e5ed9d8b0d65fcf6304b33,2024-06-04T19:20:17.433000
|
||||
@ -252742,6 +252742,7 @@ CVE-2024-35769,0,0,b840b07385ae432507ae45cb438b4a0cd2aaa5bf7ff52d81e4150e6dc2a38
|
||||
CVE-2024-35770,0,0,09521b64c1f9557fd8a7d05a96098640c8e563f4348469cb1598a3e17b6eb673,2024-06-24T19:25:21.117000
|
||||
CVE-2024-35771,0,0,528377e8b245533dbff20e4b0dd7328468397780793d88ed8bf6cc52e2f75614,2024-06-24T19:25:46.967000
|
||||
CVE-2024-35772,0,0,2d0d9c98f803d200fae5d0e084d548bff2c25e4891c370629239ed163d3750c6,2024-06-24T19:26:14.460000
|
||||
CVE-2024-35773,1,1,54d31c67424d3953eb3eb72aba1d79c640f1b895e73708478cc2eed5ebe870f2,2024-07-12T14:15:11.437000
|
||||
CVE-2024-35774,0,0,b04163e5e3aed962a8bb022fff4f15fd9953a3840984351341e879118df53ab8,2024-06-24T18:43:57.633000
|
||||
CVE-2024-35776,0,0,843520135517b374d77f0b73e5d208e8aee82b3db16cc26ae6b37a47d0e96e08,2024-06-24T18:49:09.500000
|
||||
CVE-2024-35777,0,0,7515dddc5351fc16fba23045723f9d79e6a247348fcb082c517c87296afa7e23,2024-07-09T18:19:14.047000
|
||||
@ -253254,7 +253255,7 @@ CVE-2024-36378,0,0,9a645ab04ee516fa09b03bc4e8214d07cbca3e9e91fbad3f5da1fbc4f30ef
|
||||
CVE-2024-3638,0,0,620fdccfcdbef1110695fe5f4df8efef5a2f6320fb9175c618899b2ed73206f0,2024-07-05T17:14:22.140000
|
||||
CVE-2024-36383,0,0,024d8f4d1ca5f23e8a0ddc855e927c6f952336db279cffee80e19f08304118ee,2024-05-28T12:39:28.377000
|
||||
CVE-2024-36384,0,0,2ec0cce63a143f80e95d7d72dd49a2947294c5f3ef9bfcaa5dd3f4682e62278f,2024-05-28T12:39:28.377000
|
||||
CVE-2024-36387,0,0,30cd4e98c76c613d6d4e2d23b843effa10bf0587b56149c70ae98f3cd5a874a4,2024-07-02T12:09:16.907000
|
||||
CVE-2024-36387,0,1,a2bf37a0e64575b7db49c720ef2f1af1931a4f978873dbf393d59870fa3eb3f3,2024-07-12T14:15:11.670000
|
||||
CVE-2024-36388,0,0,c862c36965d96dd7dbce4ad8e507845635d584cc35880dbb4a1f42f921fb4889,2024-06-03T14:46:24.250000
|
||||
CVE-2024-36389,0,0,b7f3ae9ec80f48852fb2df638815a295e32fee22ddec84c26d88db15c966ccd5,2024-06-03T14:46:24.250000
|
||||
CVE-2024-3639,0,0,3825ec646e59832bb04bcf2ca3ea29324db47c6b5904b78d5f1a541ade617b5c,2024-07-05T17:14:37.093000
|
||||
@ -253296,7 +253297,7 @@ CVE-2024-36426,0,0,081cbabfe1f165d2e60c6bf5434c4cea5a1c1465246b1d9713d429b0a41c1
|
||||
CVE-2024-36427,0,0,10c5dade9c11af5e52239a7a8c18438909a8ea6a201617061be6b7626f49e18c,2024-07-03T02:03:12.033000
|
||||
CVE-2024-36428,0,0,34ee364c5a9075f639864e5b9724315f875ffecaf1e3b09c0e9021977a7b8d2a,2024-05-28T12:39:28.377000
|
||||
CVE-2024-3643,0,0,52bab63bfc91b1f0b9d75e6e14dccb142e0861ecbf55c57479143676f8644d3b,2024-05-16T13:03:05.353000
|
||||
CVE-2024-36435,0,1,d5db9c80751c95bdb9d7c8677b360e81635e7c29402d5e581205685bb84d0c00,2024-07-12T12:49:11.340000
|
||||
CVE-2024-36435,0,0,d5db9c80751c95bdb9d7c8677b360e81635e7c29402d5e581205685bb84d0c00,2024-07-12T12:49:11.340000
|
||||
CVE-2024-3644,0,0,4e49052df3e8a0f31e3394cce710c4ef728e2bd6bf109b57603d53a5d48d8bab,2024-05-16T13:03:05.353000
|
||||
CVE-2024-3645,0,0,9bfaa42192c6fa49951fba1d7645fb7975d3a2b4cd9bcc55a7dd9ceef33e077c,2024-04-22T19:24:12.920000
|
||||
CVE-2024-36450,0,0,32d48285c32086a3f09c628c1971379077a46741ecaad7df002b03827ae59ffc,2024-07-11T13:05:54.930000
|
||||
@ -253331,7 +253332,7 @@ CVE-2024-36502,0,0,af0ea55ba6dbd08cf23c5f8732d2aeb0cf79fdfab13bdf5e07cadc4434254
|
||||
CVE-2024-36503,0,0,3aef981902bcd0cfa43896ed1ada7c9ec64d59690838f1ba35c268bf26e5218a,2024-06-17T12:42:04.623000
|
||||
CVE-2024-3651,0,0,3337eb59719c2f9e59e57f7ed588f3375e47160773d149a8aeb60c1398d8674e,2024-07-11T14:58:01.803000
|
||||
CVE-2024-3652,0,0,455dabb71414a7592172807b25da69c5818ecc78456d9f87c63904d4c0988a33,2024-05-01T17:15:37.793000
|
||||
CVE-2024-36522,1,1,3395c83dcac3d99535db7023fa2db1fe9767a840c6a6a7d51d7ea523625135df,2024-07-12T13:15:11.867000
|
||||
CVE-2024-36522,0,1,b1dc04c67f987c4bfa23870d3f43f935e40cd1fe2c0c927b9ff9a9dea93b4987,2024-07-12T14:15:11.987000
|
||||
CVE-2024-36523,0,0,779ff20f3e54c54b68fa38cf8a73a6874fca821f18024ef38fb974b398395dd0,2024-06-13T18:36:09.010000
|
||||
CVE-2024-36526,0,0,1ef54497acba69e484a273933341aeb22209d47656c43c34648a5bf39e748b3e,2024-07-09T18:18:38.713000
|
||||
CVE-2024-36527,0,0,5a4da781a91464af6910d804126691f30125cf5f5ae9e52379cc70e43ae0f627,2024-07-03T02:03:14.827000
|
||||
@ -253708,10 +253709,12 @@ CVE-2024-37185,0,0,ce3a2eeaa366e0078438541c31768228f57c06809ab185bd78a5053ce3cc0
|
||||
CVE-2024-3719,0,0,d2320674d04cefde56a0b36b463f74328d6f18494803030bdfe9b0b1b4374afd,2024-06-04T19:20:23.553000
|
||||
CVE-2024-37198,0,0,8919c8b8db43ac2a9639793fec092e2666b55422ab58e48ee04c39b0bd19361a,2024-06-24T18:55:25.417000
|
||||
CVE-2024-3720,0,0,f4e69514093cc630aeda39d0a41fe705e0d9916a1077cef429b7dcf05a404308,2024-06-04T19:20:23.660000
|
||||
CVE-2024-37202,1,1,0d4818ce41c16c32549398108254917f171368dee0decdc62d4f66939f71e34c,2024-07-12T14:15:12.063000
|
||||
CVE-2024-37205,0,0,536e384912a3e40e30cd6e5099a5bb49f28b5542a5391ea994ed78796c432e37,2024-07-11T13:05:54.930000
|
||||
CVE-2024-37208,0,0,88780676ffe1ae9fd897090b91bc042de66f491603ea11b382a3765c84e6e5c8,2024-07-08T15:49:22.437000
|
||||
CVE-2024-3721,0,0,ec8dc4b0ad5d1d9ba11acb18015142f7d1715fd653f7ca2987e266e9c9e8ef01,2024-05-17T02:40:05.290000
|
||||
CVE-2024-37212,0,0,cb0e3003beb0d778b1e3e4d8f1145799c285874f36dc8f863bd0c5bf6222df34,2024-06-24T18:55:34.983000
|
||||
CVE-2024-37213,1,1,ea25614cc72bba8c4368ba5e9a46848a5b08468cbfd84aaaeeae33591b13abf7,2024-07-12T14:15:12.293000
|
||||
CVE-2024-3722,0,0,7c1b4fae7e86bf4c1bc76a0d39819ffc592a7b598c7675ac0628daa278671c4c,2024-05-14T16:11:39.510000
|
||||
CVE-2024-37222,0,0,65c65c234c553e022a88bb4c0528d9ed3832ed1be7f7805c03100111f1d159f6,2024-06-20T16:07:50.417000
|
||||
CVE-2024-37224,0,0,fc40d5b6b74fc1782a65f4f7c695d8fcd21ddc977f3f6d2f46d2a7ce527e9818,2024-07-09T18:19:14.047000
|
||||
@ -253867,13 +253870,16 @@ CVE-2024-37539,0,0,c1651edacf32c123789feecb68380de8605a889305b418dd39079ef654272
|
||||
CVE-2024-3754,0,0,01f193c84b52f462bda07bbe4a51fb49e63cd8bf2361f6b49c817e3a59b81e5a,2024-06-17T12:42:04.623000
|
||||
CVE-2024-37541,0,0,1f46bbe98bcc26e8385382a14ef7dedf6c0e9f6a09394a6b26798763f5000b58,2024-07-11T13:13:15.977000
|
||||
CVE-2024-37542,0,0,6d89e302c059e61e6dee79263ba1d9b292db94b7349a74f25580291f658a0ce4,2024-07-08T15:49:22.437000
|
||||
CVE-2024-37544,1,1,49f523eb357aaee6cc179938d5ff139b7d48a4d89488a2cafe1b9f0927f29953,2024-07-12T14:15:12.540000
|
||||
CVE-2024-37546,0,0,95bca18091533d24779b9d9541af789d17a54cddb8f47507626120eab0314784,2024-07-08T15:49:22.437000
|
||||
CVE-2024-37547,0,0,da07cdaafbcdf5f6f48dcc010bdacf6feb2c6627ede1b87455a66a3564df588f,2024-07-08T15:49:22.437000
|
||||
CVE-2024-37547,0,1,ec68c48564a9a0fe784f3360220a1f143b8b28bd4fa06f56554dd338a3515c03,2024-07-12T15:29:59.473000
|
||||
CVE-2024-3755,0,0,255cc63bdc34aca663119fb8f6757a7da5a9acef7ecda034d88dc05babf4b05b,2024-05-06T12:44:56.377000
|
||||
CVE-2024-37553,0,0,2c2a00ab257e5ea7ff19599b29cc2a5e0646dd67b7caab870443507e76e52a3e,2024-07-08T15:49:22.437000
|
||||
CVE-2024-37554,0,0,e1a6b47d51956c437547356dbc2d3d6d948b498c5d648044ffbed144c9e5226c,2024-07-08T15:49:22.437000
|
||||
CVE-2024-37553,0,1,5fb366736775031e7f51d377e259cd5fd849d825ec5c66cfcefe7a5c9ef4717b,2024-07-12T15:24:47.953000
|
||||
CVE-2024-37554,0,1,f21873c8cc723d73a5be37e43f70a0cc0c9c1c460efddd02b4e8ae7999da0e5e,2024-07-12T15:34:57.437000
|
||||
CVE-2024-37555,0,0,c8f3e7cd770b30d6604350e19dd27d9ae30c1b920108aed729ba94cc31ccb66a,2024-07-09T18:19:14.047000
|
||||
CVE-2024-3756,0,0,9f6325e6bf8bb208b4e2ee6674c7d5cde657d33007cb72c8f23cf7232b49431b,2024-07-03T02:06:32.530000
|
||||
CVE-2024-37560,1,1,e2f9d7b3c87db1cbbca48a3a282f569dc2d2112cd5901e96bbfe6fb9dca5d6a9,2024-07-12T14:15:12.770000
|
||||
CVE-2024-37564,1,1,25c6db9120ae07ddc27ceffbf3923d2034cee6f450555f27b1019e347f4909fa,2024-07-12T14:15:13
|
||||
CVE-2024-37568,0,0,e54134c743ff1c9089094584276cdc79416cb675a0fc4a7177e49bc6dbf3bbc8,2024-06-20T09:15:12.253000
|
||||
CVE-2024-37569,0,0,d72ceb83b037eeec35f3e81abfdf503a49618e4aba004fb3f45e6970df347f2e,2024-07-03T02:04:20.517000
|
||||
CVE-2024-3757,0,0,62301a2775fcbfb9e8b5b1aa90b79aa074cd639699f2863765d338333af4b798,2024-05-07T13:39:32.710000
|
||||
@ -254019,9 +254025,17 @@ CVE-2024-37905,0,0,76667799c8b41a4c84b1440977b5297bf4074f7f71d64c5e6ed0abc93aad0
|
||||
CVE-2024-3791,0,0,9bc6cec70e672f5f7f9ccdb1c0603c19b269c41965293930113b85d0de980142,2024-05-14T16:11:39.510000
|
||||
CVE-2024-3792,0,0,cf023b5179bed164faad65630e21cc1d1811b19d16667a2b08c63260eab0a5be,2024-05-14T16:11:39.510000
|
||||
CVE-2024-37923,0,0,0f277f016f5fbeb4c94053f1c3c5921e348aa14bf063918224f804db2fff94d1,2024-07-09T18:19:14.047000
|
||||
CVE-2024-37927,1,1,02aad720e8084055f0b8eac1715ec086aaf27e91e6fd6c4766cba18cb9faef29,2024-07-12T14:15:13.237000
|
||||
CVE-2024-37928,1,1,6c8fc236be1bff03a6a604b8e6f1da8a8dc8d6cde87c5441fb2c29230a1dc3d7,2024-07-12T14:15:13.463000
|
||||
CVE-2024-3793,0,0,ee3137e362c58246aa5051457614bdcb92cca84e4e50c79d141ea28f09937fab,2024-05-14T16:11:39.510000
|
||||
CVE-2024-37932,1,1,942ec78ee4e7934a823831623390f5e9368f0a77429d2d86ad8610663f3c911e,2024-07-12T14:15:13.717000
|
||||
CVE-2024-37933,1,1,bdb18c55a3292180d660f75df726598cacbec2253334aab0788499e49f7aea37,2024-07-12T14:15:13.943000
|
||||
CVE-2024-37934,0,0,73bc3188674b33b5b84aa3c0e565fb6ff6ad526723a0d151d8961f661c3ae3de,2024-07-09T18:19:14.047000
|
||||
CVE-2024-37938,1,1,2c8485cef48b2d8ac978d18d74d8a078d1a037a861b0989098b08b76a4eaab87,2024-07-12T14:15:14.167000
|
||||
CVE-2024-37939,1,1,31a537236948b357421d24171343a9a41c84f9549e6fbc3ecf17231af7bd0834,2024-07-12T14:15:14.380000
|
||||
CVE-2024-3794,0,0,153385e096cd7f2ece15b2458b2e9fc3a616d4e8c794288f506409f055c02738,2024-05-14T16:11:39.510000
|
||||
CVE-2024-37940,1,1,213f6da03408208eed295b8c0b8b6c6599a9d63f39ea70c711e8d368ccb75bdc,2024-07-12T14:15:14.600000
|
||||
CVE-2024-37941,1,1,e499acbefe749ddbd08c2de7035d77f5619a1e05b8aafaae8ab33bf4483d4c00,2024-07-12T14:15:14.817000
|
||||
CVE-2024-3795,0,0,394c789f966243db6d7a4bfee356db0989703de57fa4252b7833b38d6036f026,2024-05-14T16:11:39.510000
|
||||
CVE-2024-37952,0,0,efacc21e38d6706da70765419ba1aaf970dc02db0084584d635a45f192b58b3c,2024-07-09T18:19:14.047000
|
||||
CVE-2024-3796,0,0,8b56f1ae3498f70c780deb392dd70e4b0e2eb55d8dc491cebdead02f06bb596a,2024-05-14T16:11:39.510000
|
||||
@ -254111,14 +254125,14 @@ CVE-2024-38080,0,0,0b30162da9e985ccc862a1722fa27f1aee2c43036f0821b6ab829416dc832
|
||||
CVE-2024-38081,0,0,b9330c7e774e060916883ddd31b48db87a543a1fe7cb381f2e7435e21c1c1d1a,2024-07-09T18:18:38.713000
|
||||
CVE-2024-38082,0,0,bc9f32f06527a9ce5c1b3af2dd4bee3be5b0ec1019ac580769fc66f0b9304f74,2024-06-26T18:15:15.067000
|
||||
CVE-2024-38083,0,0,b61c1ffe6c2964ef8e02b76eac914876419214d04e7ace88d2f1669ac6f4c07b,2024-06-26T18:15:15.170000
|
||||
CVE-2024-38085,0,0,613bc41729e2540d50034b533de8a1465918e0bb243683fac4dfd7af0e36fb7d,2024-07-09T18:18:38.713000
|
||||
CVE-2024-38086,0,0,a08a596ab0ac96c771cfd054fe636f26f6ec1f15d1f3ff7eda542e3d7f7f5f63,2024-07-09T18:18:38.713000
|
||||
CVE-2024-38085,0,1,9b225805c27fe0d0f49cd4b33e0b85b6db3f312de1c827973638cc83fbf3b27e,2024-07-12T15:46:00.290000
|
||||
CVE-2024-38086,0,1,4f4a5b4f26b1b47848469ccfcb494665e77622145d878e8bcca629184e833a43,2024-07-12T15:45:05.137000
|
||||
CVE-2024-38087,0,0,d1c57445a6a2750d20b80d47fd627cd7c3d206795fd15419f3582a4d2db4d11b,2024-07-09T18:18:38.713000
|
||||
CVE-2024-38088,0,0,7b12d5c05529a5ffc5848aeb30dba14e784661b2c7fa8f10731623c1526840b1,2024-07-09T18:18:38.713000
|
||||
CVE-2024-38089,0,0,d5c64193d1f389710f9abd25f1585b8a713804000b2c0dcf9d6625d282b511c8,2024-07-09T18:18:38.713000
|
||||
CVE-2024-38089,0,1,f43516e20a67775fdb300c6589bec8c27ea499a370a6240ad0d19a7cb49660e2,2024-07-12T15:42:39.127000
|
||||
CVE-2024-3809,0,0,a034925aa5fbdeb8d8f213935fba76e152f9c290a4a5d18c12398fefebad7ce4,2024-05-14T16:11:39.510000
|
||||
CVE-2024-38091,0,0,18cbe1a51c984015b31aedde540c43ff8f7157768403dbb39c90de586b3e0884,2024-07-09T18:18:38.713000
|
||||
CVE-2024-38092,0,0,efd36a5afbece92529811b85942dfa3801f16bfc9dc04072d0a1d6de9d601119,2024-07-09T18:18:38.713000
|
||||
CVE-2024-38091,0,1,a9751e3868c0a113eedbccdcd34b91f06a8adaf90dbd1405bbcc8c2a2900f94c,2024-07-12T15:35:41.100000
|
||||
CVE-2024-38092,0,1,fa52aaacdeeea4f553a80268533abc67279c4becb10c86c23506d5aee3ea5aea,2024-07-12T15:05:16.757000
|
||||
CVE-2024-38093,0,0,7a6528d9ef9e37de49cc37136719775ad4ca6736203f4bafcb828a0b50954922,2024-06-26T18:15:15.260000
|
||||
CVE-2024-38094,0,0,acf9b14cc18bf684a3807e3f8aab28f09790dad10479460ab41f157199bfc8c8,2024-07-11T18:27:53.843000
|
||||
CVE-2024-38095,0,0,b0c4146c3c5698cffee7ab10e0a7873691f618c4c7b8c0ade94c4f51d88f93cd,2024-07-11T18:27:00.083000
|
||||
@ -254248,12 +254262,12 @@ CVE-2024-38469,0,0,511cfa020ce0415f6c58505919037fce87bd20a70c430acbe541f3249cbfb
|
||||
CVE-2024-3847,0,0,95f9ad8fbf5c3c80550e0a325ff7f48c02be2f78865a75992b282f70c630bcf1,2024-07-03T02:06:43.977000
|
||||
CVE-2024-38470,0,0,e532fc2610ce0ba05d395b2565b3921da00db5c8c8ee1a62b50a319ed8de746e,2024-07-03T02:05:07.477000
|
||||
CVE-2024-38471,0,0,3da065067273e795c22a9430ea2650425c29da7d06ad6ab18b550114c797a95a,2024-07-08T14:18:45.747000
|
||||
CVE-2024-38472,0,0,58c9cf519f027bb399c29f941525d51dfd3472bcdf6b51d4d38d0e3dfc4a8b3c,2024-07-09T16:22:46
|
||||
CVE-2024-38473,0,0,4a52332d99fe848743528bbabba861df2f74ad2accfcf888abc7220000504fe8,2024-07-02T12:09:16.907000
|
||||
CVE-2024-38474,0,0,d9563f48d3829949fd43481a10c11343a9dd1b93362516af40fb11af0189d44b,2024-07-02T12:09:16.907000
|
||||
CVE-2024-38475,0,0,a35882af8549de31719dfb044d0026ec782ef0f7c68b1f3c7e2c6bf51a72fff7,2024-07-08T14:18:45.973000
|
||||
CVE-2024-38476,0,0,46bc53cfddf3e233ea77062d07dd41304e3870288ed097ef039059d82cf67ddd,2024-07-02T12:09:16.907000
|
||||
CVE-2024-38477,0,0,eb0332a2b53c3e5586dd1247a7159fcc1f059464374911861a40723e97a36d4c,2024-07-02T12:09:16.907000
|
||||
CVE-2024-38472,0,1,0483e32b4907ebc7f547fb87caf5b24bef6a9183e30ea4e30b4ad6dc0faa92cd,2024-07-12T14:15:15.043000
|
||||
CVE-2024-38473,0,1,245312e7d7d612318428b6f6fd5684a8209079166a2fe62e2b2041929b5a3f74,2024-07-12T14:15:15.133000
|
||||
CVE-2024-38474,0,1,8beb2e175a9bc559fef9a6900cd3fa063a7ab70cfb348bc0537e77ddd5eeb3f1,2024-07-12T14:15:15.203000
|
||||
CVE-2024-38475,0,1,4434bbc9e26235e103b2ea8722d70e74e682dd306d9d4b03d295c12ec512ff31,2024-07-12T14:15:15.277000
|
||||
CVE-2024-38476,0,1,b3d9539bc16644d562156587edde82f59f7e5b8caca519713a03097d766f34a6,2024-07-12T14:15:15.360000
|
||||
CVE-2024-38477,0,1,4e865b7fff5c5346863d587e484df8d5b457292ae17a1b95a338aa934a1871cd,2024-07-12T14:15:15.430000
|
||||
CVE-2024-3848,0,0,cff2d1cd97f0b1f2183f9bb4edcf4fc45d9e2b8ab251b9953f6af6105249c0ec,2024-05-16T13:03:05.353000
|
||||
CVE-2024-38480,0,0,04c4f9e75ecb94da8a57533882d0899c4c9616c45f6d4f0fa40fb0af2c036f64,2024-07-01T12:37:24.220000
|
||||
CVE-2024-3849,0,0,d4181d6192aab2f4a2b324451fbda7660fbd9621eb95f5f54a642a6a3d1e7d46,2024-05-02T18:00:37.360000
|
||||
@ -254409,7 +254423,12 @@ CVE-2024-3867,0,0,1b62d18c2024e05920e3c0687ff0e24e4f942ae67e75e66374d57866a82141
|
||||
CVE-2024-3868,0,0,fa696e39218c1556f1f2ca1f996b19eb0035252ea0508a442b035effd05169ef,2024-05-06T12:44:56.377000
|
||||
CVE-2024-3869,0,0,5fe681dc14d2de5e9dd5b2f66bac58fa145bb31944427d754a663b3ce277c72c,2024-04-16T13:24:07.103000
|
||||
CVE-2024-3870,0,0,44d83767f5c52c0f17c52eb36fb2fa9bb07435948302a8148c6bc8c0c6888d67,2024-05-02T18:00:37.360000
|
||||
CVE-2024-38700,1,1,673301cf8317d986baab6dffe91ed3cfe47f1e87949addbb590da15df8553326,2024-07-12T14:15:15.503000
|
||||
CVE-2024-38704,1,1,bb26fa9f4e8c8ecb70c958d65a82f9d14d973506e02da24ea59f9fe14620fe92,2024-07-12T14:15:15.710000
|
||||
CVE-2024-38706,1,1,2c05e9557ea300dcf3e8241a6c4ae2991ccb21cfe6101870f42e05706452617e,2024-07-12T14:15:15.957000
|
||||
CVE-2024-38709,1,1,a53259d440e9803f2fada61a8d2cddc502f84aa97eee7bb0664228f2ab4d5a42,2024-07-12T14:15:16.183000
|
||||
CVE-2024-3871,0,0,9131680dba8c26c19b55533e86d2d270f65815944bae2f8fbcd8e63884ab3cf1,2024-04-17T11:15:11.403000
|
||||
CVE-2024-38715,1,1,31ad930eb6fc7ce111afe530364c6c8276f6719d63bf772611fc460eeac552c3,2024-07-12T15:15:10.830000
|
||||
CVE-2024-3872,0,0,1b0df76ddcb9ce5edde75b1c572a6253db6bd37bbe91d1899bdf2bd4ba86a63a,2024-04-16T13:24:07.103000
|
||||
CVE-2024-3873,0,0,6d513ad90fbcf7cf9dc14bccfe49c3692f3f8e6afa6f4dd6471e0cb11781355f,2024-05-17T02:40:09.627000
|
||||
CVE-2024-3874,0,0,0b044f7635c5f6b9eeb150631f42de7f29fc07a4ea0b0fc3596a05b97253f25a,2024-06-04T19:20:25.697000
|
||||
@ -254453,8 +254472,8 @@ CVE-2024-38953,0,0,14ff5a9bfe221f516876a8c4af423fbe5b0080aa7f8d53caea4e126c078e6
|
||||
CVE-2024-38959,0,0,cfec0ef25838165e6aeb5c8d3c664ec76927671369d600966c63c52c96a40800,2024-07-11T15:06:03.203000
|
||||
CVE-2024-38963,0,0,d6810e29d19f952e1613d829958cfc344b3c3660b4b5f6561b4ad90c435b0dfd,2024-07-11T13:05:54.930000
|
||||
CVE-2024-3897,0,0,2e6547d98bffe49274878683fd846b0dea4d063f5cc123163d759ecec392b068,2024-05-02T18:00:37.360000
|
||||
CVE-2024-38970,0,0,91e8208e5384541de7bb386d755fd4eb6bf4f61a3ae0e0940aabeee93bae88f6,2024-07-09T18:18:38.713000
|
||||
CVE-2024-38971,0,0,dbcb37d6e160e35ce881158758f6ae2e24bc77c4d53fd897245319338a4ba293,2024-07-09T18:18:38.713000
|
||||
CVE-2024-38970,0,1,eb04e06c9fbc74e88c4fcf5d6eeffbd442cec39d7eaf1361f68ecba935eabe9c,2024-07-12T14:51:48.070000
|
||||
CVE-2024-38971,0,1,46979c6cce7787051e40b62dba0207d3f5f20f29a3ce299a21265249d3eebf4c,2024-07-12T14:50:45.817000
|
||||
CVE-2024-38972,0,0,266b969944e47c34c5065969d4aa9af417e70cd96f058167cecf53341667f408,2024-07-11T15:06:04.187000
|
||||
CVE-2024-38987,0,0,0c71f898711274c7ac1489fe714f2d31dbe2fc7f130139d062fe917d9ea47c74,2024-07-11T15:06:05.027000
|
||||
CVE-2024-38990,0,0,501931c40b72ca4a3b10df5757210e9290217859750e859ab66984c960fc5bf4,2024-07-03T02:05:27.837000
|
||||
@ -254588,7 +254607,7 @@ CVE-2024-39330,0,0,df282f57bb00a86772e9e77e51a445a51be95fedbc3011c51977bbb06b0f3
|
||||
CVE-2024-39331,0,0,e27921e016dec51173f86ad420de9e9174de4baa540da3f53e6e1157ef72adc9,2024-07-03T02:05:47.260000
|
||||
CVE-2024-39334,0,0,7a242c73a28ed17874e43348a26da2104869d7ef8d91c48fe0d8d7e00f57c31d,2024-06-24T12:57:36.513000
|
||||
CVE-2024-39337,0,0,7c96f97902de4594057b22d7507f3218093cc9f703d055990179db138387110a,2024-06-24T12:57:36.513000
|
||||
CVE-2024-39340,1,1,2e650af67550d0765320a12870128d71733679d2917a81636a5621a2bb6ebd67,2024-07-12T13:15:12.057000
|
||||
CVE-2024-39340,0,0,2e650af67550d0765320a12870128d71733679d2917a81636a5621a2bb6ebd67,2024-07-12T13:15:12.057000
|
||||
CVE-2024-39347,0,0,f5c35927ca6bc6b01c0289886e48e1c26a8232470e7aa98c1613809c151fa9f4,2024-06-28T10:27:00.920000
|
||||
CVE-2024-39348,0,0,2a1296fcec22eeebebee71405ce5a2bc1d4e2308cef94a30f20c08930acb2eae,2024-06-28T10:27:00.920000
|
||||
CVE-2024-39349,0,0,e2c0ea0897db587383c2ec6939a8e8f30324733a4c2be5e6f6d88b1c64f32222,2024-06-28T10:27:00.920000
|
||||
@ -254654,24 +254673,24 @@ CVE-2024-39490,0,0,a8cddc58398343c24172558bf85f4c7a72ad4cfe7677faf71fbe027877601
|
||||
CVE-2024-39491,0,0,af25979e19919d2c32f2a4545b8f16aa1b2a079fea20c3993dde8a730fddf96f,2024-07-11T13:05:54.930000
|
||||
CVE-2024-39492,0,0,625213f757b099ac014e1ec8aa2bfb66b87e041fe2911867f1bfe6984535b4b6,2024-07-11T13:05:54.930000
|
||||
CVE-2024-39493,0,0,edb61e2bdcc22b19fdda7456b1765ba09bdac53634d9f36b25d7f9ffc79b9375,2024-07-11T13:05:54.930000
|
||||
CVE-2024-39494,1,1,2a4dbe30e4912b7fe925128344fc1138e7252df2957447adcb1a7761d10a95f3,2024-07-12T13:15:12.113000
|
||||
CVE-2024-39495,1,1,af9aa3bba5f9fb4cc57530b2118ab9498881adbee5c510d82d2c079f027c848e,2024-07-12T13:15:12.183000
|
||||
CVE-2024-39496,1,1,347102101189bc5438bb6abc85d2c08db2c81257649d6e496a5447422c370af7,2024-07-12T13:15:12.253000
|
||||
CVE-2024-39497,1,1,8404c517df726a39bee7c81d6607391a60ac7e4ca03a6541edda6c7ee5195237,2024-07-12T13:15:12.320000
|
||||
CVE-2024-39498,1,1,f70900d71bdd204f92374fab28c2b54a9fb468e0a5f4e912c595a06a5ce5a515,2024-07-12T13:15:12.387000
|
||||
CVE-2024-39499,1,1,e8b880ab5c7d9afad01784818f836c39ab863c33d066de4ab84c1dc3d80be7e6,2024-07-12T13:15:12.450000
|
||||
CVE-2024-39500,1,1,131b6c4e2c4272cd9d0d398dc3b241f84178d11dbf50b53fc032f4b64b1bedd7,2024-07-12T13:15:12.537000
|
||||
CVE-2024-39501,1,1,42d068ace67bfe1968100ac66d5d1148642082150f857f232b9cfb53d0990723,2024-07-12T13:15:12.600000
|
||||
CVE-2024-39502,1,1,6adeebeff107981b812c767ac03278bb6342100f1cf3dea4133d897fc243b653,2024-07-12T13:15:12.680000
|
||||
CVE-2024-39503,1,1,f8bafa99e254908b3f4c5a85f070c05b244e665a763ba41b7f7f04335286146f,2024-07-12T13:15:12.757000
|
||||
CVE-2024-39504,1,1,3f881ea9875a46e48840c4d2c1d17e9631f00499bce2c7c2cbfe2691c197bf52,2024-07-12T13:15:12.830000
|
||||
CVE-2024-39505,1,1,f5bf4141c4245c7ba154ff57050bb4a8e11930c8954e69947c7a74145b3e5584,2024-07-12T13:15:12.887000
|
||||
CVE-2024-39506,1,1,cceb607d02e9db80289f8439fdffb3960db5dc755fc2ad3e12938e5ebe7a0c89,2024-07-12T13:15:12.957000
|
||||
CVE-2024-39507,1,1,adb2d4d2663d4b2ff2dee7ae85ae2e9d5d26e910bc9e21d32bb193b099d92ba7,2024-07-12T13:15:13.050000
|
||||
CVE-2024-39508,1,1,c4912f81ff9ab0865da4bab7618d87ca7f25b2f75094f89b1b9576ca3c4aae45,2024-07-12T13:15:13.130000
|
||||
CVE-2024-39509,1,1,d4d1a67211087aa2f1b7687c0919d7034b7a6dc9068ccbec5978508fa2e4c925,2024-07-12T13:15:13.197000
|
||||
CVE-2024-39494,0,0,2a4dbe30e4912b7fe925128344fc1138e7252df2957447adcb1a7761d10a95f3,2024-07-12T13:15:12.113000
|
||||
CVE-2024-39495,0,0,af9aa3bba5f9fb4cc57530b2118ab9498881adbee5c510d82d2c079f027c848e,2024-07-12T13:15:12.183000
|
||||
CVE-2024-39496,0,0,347102101189bc5438bb6abc85d2c08db2c81257649d6e496a5447422c370af7,2024-07-12T13:15:12.253000
|
||||
CVE-2024-39497,0,0,8404c517df726a39bee7c81d6607391a60ac7e4ca03a6541edda6c7ee5195237,2024-07-12T13:15:12.320000
|
||||
CVE-2024-39498,0,0,f70900d71bdd204f92374fab28c2b54a9fb468e0a5f4e912c595a06a5ce5a515,2024-07-12T13:15:12.387000
|
||||
CVE-2024-39499,0,0,e8b880ab5c7d9afad01784818f836c39ab863c33d066de4ab84c1dc3d80be7e6,2024-07-12T13:15:12.450000
|
||||
CVE-2024-39500,0,0,131b6c4e2c4272cd9d0d398dc3b241f84178d11dbf50b53fc032f4b64b1bedd7,2024-07-12T13:15:12.537000
|
||||
CVE-2024-39501,0,0,42d068ace67bfe1968100ac66d5d1148642082150f857f232b9cfb53d0990723,2024-07-12T13:15:12.600000
|
||||
CVE-2024-39502,0,0,6adeebeff107981b812c767ac03278bb6342100f1cf3dea4133d897fc243b653,2024-07-12T13:15:12.680000
|
||||
CVE-2024-39503,0,0,f8bafa99e254908b3f4c5a85f070c05b244e665a763ba41b7f7f04335286146f,2024-07-12T13:15:12.757000
|
||||
CVE-2024-39504,0,0,3f881ea9875a46e48840c4d2c1d17e9631f00499bce2c7c2cbfe2691c197bf52,2024-07-12T13:15:12.830000
|
||||
CVE-2024-39505,0,0,f5bf4141c4245c7ba154ff57050bb4a8e11930c8954e69947c7a74145b3e5584,2024-07-12T13:15:12.887000
|
||||
CVE-2024-39506,0,0,cceb607d02e9db80289f8439fdffb3960db5dc755fc2ad3e12938e5ebe7a0c89,2024-07-12T13:15:12.957000
|
||||
CVE-2024-39507,0,0,adb2d4d2663d4b2ff2dee7ae85ae2e9d5d26e910bc9e21d32bb193b099d92ba7,2024-07-12T13:15:13.050000
|
||||
CVE-2024-39508,0,0,c4912f81ff9ab0865da4bab7618d87ca7f25b2f75094f89b1b9576ca3c4aae45,2024-07-12T13:15:13.130000
|
||||
CVE-2024-39509,0,0,d4d1a67211087aa2f1b7687c0919d7034b7a6dc9068ccbec5978508fa2e4c925,2024-07-12T13:15:13.197000
|
||||
CVE-2024-3951,0,0,d1eb572088193a792816003caae4c8900ea1808fb70b3f34eb162771a0d73b1e,2024-05-08T17:05:24.083000
|
||||
CVE-2024-39510,1,1,ee3d7dbb52acee10ebc5955a06e28cd46843c49e61b2b1303fcc8d94f8c098f1,2024-07-12T13:15:13.283000
|
||||
CVE-2024-39510,0,0,ee3d7dbb52acee10ebc5955a06e28cd46843c49e61b2b1303fcc8d94f8c098f1,2024-07-12T13:15:13.283000
|
||||
CVE-2024-39511,0,0,8ff64d2b76cac616818d233531010fca566a954b6d7754e7506b08d9563d0619,2024-07-11T13:05:54.930000
|
||||
CVE-2024-39512,0,0,8dc06e3a41bd79c2b8acee90011e9252ad90bde4c1d3ea0321002de14ee56805,2024-07-11T13:05:54.930000
|
||||
CVE-2024-39513,0,0,c9005dbac22de69512a9faa58a7ede6f14f1995b0d447d6210a9f7d9af401e1d,2024-07-11T13:05:54.930000
|
||||
@ -254692,7 +254711,7 @@ CVE-2024-39531,0,0,f370afcfaf62c5e6e55c0e31561074b7f17b55e8f6ce4e332b10716003dba
|
||||
CVE-2024-39532,0,0,f8e07628687210418a222e0302ce153c70d823c892781803e885745752287a90,2024-07-11T18:09:58.777000
|
||||
CVE-2024-39533,0,0,01d77ace4c7ab0cd901e673a2719a01f6a523738792965ccf627ed5c89b6abf8,2024-07-11T18:09:58.777000
|
||||
CVE-2024-39535,0,0,b919e7eae65d6a215b0bbd4586dd0e80990b95772df44807e84ec7d12bcaf016,2024-07-11T18:09:58.777000
|
||||
CVE-2024-39536,0,0,6a35f852b9d0b651aa2f7ebf313d014d535d8b35f01a9879fc36f4b5497e1e14,2024-07-11T18:09:58.777000
|
||||
CVE-2024-39536,0,1,fcedd5a4fda577505833805e7e4997c8473247086d79366725456756ee1a42c8,2024-07-12T15:15:11.040000
|
||||
CVE-2024-39537,0,0,c286bf86f2988b2661f05a0a3568bd7d2d587a4ae48f2e40b1d4a749c248998d,2024-07-11T18:09:58.777000
|
||||
CVE-2024-39538,0,0,b86d94fafc7259d5ee7e5bd793a9ee089100e1868f16a60e064402cc10cb5cd9,2024-07-11T18:09:58.777000
|
||||
CVE-2024-39539,0,0,c37436050a6426434a864ad49935af6b938eb7b3346f1f723a793fad839da4c2,2024-07-11T18:09:58.777000
|
||||
@ -254727,7 +254746,7 @@ CVE-2024-39569,0,0,52889f68709bb42505429361fd8cbaa37b3cfa3fede130db2e5e3c1d1167c
|
||||
CVE-2024-3957,0,0,6e4e327328ad5c18e880466a103b162c10591051d90490bf0a67f6889d728425,2024-05-02T18:00:37.360000
|
||||
CVE-2024-39570,0,0,1917d857fe98ef195235e7e1e6720880090abde68067fcfc8071e8488d94c340,2024-07-09T18:19:14.047000
|
||||
CVE-2024-39571,0,0,1f2dd2c50923d8589a1a349d2f4f9d2d7f8320b7a0892bf8fc808614b2b423eb,2024-07-09T18:19:14.047000
|
||||
CVE-2024-39573,0,0,7e7eebc8f7807e5a5d00f82c0d28f5abe2d79239ae34bea5f004fd03abc17ccd,2024-07-03T02:05:50.170000
|
||||
CVE-2024-39573,0,1,66fc7feceb0e35a8b2e536fb0fe145ff47c70fa679791c05a2dafe67c9ad9e6e,2024-07-12T14:15:16.400000
|
||||
CVE-2024-3959,0,0,1ce1302f5c536ae0ba1596a30e53c3274b88d91eb780326b1103788329e8cf86,2024-06-28T13:21:52.223000
|
||||
CVE-2024-39592,0,0,45145fa21a81f93b79f5eb8802a9b54a7c92975d0d128545a55a405ca0c46034,2024-07-09T18:19:14.047000
|
||||
CVE-2024-39593,0,0,eab98f85c605da78ed2569c0241a9cd0360d98504df861c66a4071b8f33df100,2024-07-09T18:19:14.047000
|
||||
@ -254770,7 +254789,7 @@ CVE-2024-3972,0,0,336c66699a431faa29a5282b5eb6832d488e7d167b3d03dca5d4b3950fce0b
|
||||
CVE-2024-39723,0,0,003097d794792a3e1194202f71608927b35e402887d5f5ddf07d35b5dd183916,2024-07-11T14:54:10.243000
|
||||
CVE-2024-3974,0,0,30b94b89b01dd2c6057362330f67dc78937f3f3edffa0c5a57e7602f711f919a,2024-05-14T16:11:39.510000
|
||||
CVE-2024-39742,0,0,96ea1b8cccc8beabe35a1ae1bd29920440299002d9bdd07983b0f871a337ec60,2024-07-08T15:49:22.437000
|
||||
CVE-2024-39743,0,0,20ff608aae9e81ed05e5df9fc95082741cc897036de0c408e1e444e17ba2e42f,2024-07-08T15:49:22.437000
|
||||
CVE-2024-39743,0,1,56ba3c78f140f47d5ebd80a82e98c5cbfee01c52fb9fdf85fab2837f5a9797dd,2024-07-12T14:15:16.487000
|
||||
CVE-2024-3977,0,0,e9f44416847592725fc2cd47ffed9c743bca75989a5c2d940c73903d22d68b79,2024-06-17T12:42:04.623000
|
||||
CVE-2024-3978,0,0,338ec55d360d0ecf1dfe595690a2d37e24aa4129fa5a75aae324bfa31cd2fe9a,2024-06-17T12:42:04.623000
|
||||
CVE-2024-3979,0,0,4ac2126fe63098861061c1ed3772b0712449f42e64a5481492de94fd61a5b947,2024-06-06T20:15:14.127000
|
||||
@ -254805,12 +254824,12 @@ CVE-2024-39880,0,0,36b0f01990c70662f6a76f5465d867d453cd73de89d829ef36b42a6741e6a
|
||||
CVE-2024-39881,0,0,adf0b4fcb696b07b94720317071702eedcd1fdaba37c9e2a964066676ba014b9,2024-07-11T13:05:54.930000
|
||||
CVE-2024-39882,0,0,e74451f1f7696dcf4f6c0a8b25bc99b29b39e5965867fdeded2910a86a4bceaf,2024-07-11T13:05:54.930000
|
||||
CVE-2024-39883,0,0,4125ead3dab96c17b3201223bdf7a64af624f714119f6cbaa67f57f3faea3add,2024-07-11T13:05:54.930000
|
||||
CVE-2024-39884,0,0,0d647612824271b037e4243e01d89c11015b35b838940d0c376081ca2e2ed0c1,2024-07-05T12:55:51.367000
|
||||
CVE-2024-39884,0,1,820d6f61ede8e42a2beabc4b322a42eecc24064bf6142891f1909848431996b5,2024-07-12T14:15:16.640000
|
||||
CVE-2024-39886,0,0,c211eb7fd7b7d4a2dcf17c01e99303dbbe9f112b3010b65271b5f2c7acb830e8,2024-07-11T15:06:15.210000
|
||||
CVE-2024-39888,0,0,f7637ae0feee5d9d70653d284f2ffea6d3641a46c662eba72b67bcab442feb69,2024-07-09T18:19:14.047000
|
||||
CVE-2024-3989,0,0,41a6b1dcae0354fb8cba40366dc7ed1eeb84d6a6a33689c35123198fe63c8f01,2024-05-14T16:11:39.510000
|
||||
CVE-2024-39891,0,0,f05a058a4cf741da51f47b19ea162b25ce262cdb61fb36618eb53dc7411c00e3,2024-07-03T22:15:02.923000
|
||||
CVE-2024-39894,0,0,374900c11a12dc50ea15b6655eaae44b2fde3969c29fbbba5a961315eede48a8,2024-07-08T14:18:56.393000
|
||||
CVE-2024-39894,0,1,b22bc69930da344106597d47d41e0cec9fb3e5fb9b845814de170e9e12a28a04,2024-07-12T14:15:16.703000
|
||||
CVE-2024-39895,0,0,81e277926f04a447fa0edae3630d7dab6d337a392b69cef51e67fcc762844274,2024-07-09T18:19:14.047000
|
||||
CVE-2024-39896,0,0,aac3b3aa468382be89710a9d4924b439b2a50e399515ea32a798074da07af274,2024-07-09T18:19:14.047000
|
||||
CVE-2024-39897,0,0,38f11367ba3345f659ee85a48448fecd8dec6f5b40a44a93fa8c3972047a7c01,2024-07-11T13:06:13.187000
|
||||
@ -254818,9 +254837,13 @@ CVE-2024-39899,0,0,b9c786cfcd500686022cf562103fb3c46b8e02e37e407feef62bff9a568df
|
||||
CVE-2024-3990,0,0,7879115af68e1891db08bd2dafc44fb55db15680f59885de2ed87fd5c16d9492,2024-05-14T16:11:39.510000
|
||||
CVE-2024-39900,0,0,e5fa3498f347fb7ae36ea3c567d86ef714b8b4ea1b9fce0392081ed142cad041,2024-07-11T13:05:54.930000
|
||||
CVE-2024-39901,0,0,1d3e3b80615ba41835c485f10254821d67a955b0119b59f5c90d08afdfefd99d,2024-07-11T13:05:54.930000
|
||||
CVE-2024-39903,1,1,025e303f169eeafe258d4de554b3447559a2c5452e19436807aca83c0ea44271,2024-07-12T15:15:11.177000
|
||||
CVE-2024-39904,0,0,6252272080592d8722441f7410f72ce84604438cae8de682fc3002585f202d55,2024-07-11T18:09:58.777000
|
||||
CVE-2024-39905,0,0,e41d6c222e9c5106200bd355ef2fa3929e0e128bad694497a72d448cc622f670,2024-07-11T18:09:58.777000
|
||||
CVE-2024-39909,1,1,0b180e9989132ad6faee165e943e062fb223c5cc33e79c7bf88320201c161dff,2024-07-12T15:15:11.393000
|
||||
CVE-2024-3991,0,0,f4b27e31b2ebe06401478accd9d85264142bf207d27ef139c240399354705c4f,2024-05-02T18:00:37.360000
|
||||
CVE-2024-39914,1,1,c3c38025e95deba86f295fc11f6ecb7db79575de5c42a006489acdeb994d4763,2024-07-12T15:15:11.607000
|
||||
CVE-2024-39916,1,1,8524af375ca41ee282bc79d8a997c2e7032d6f862dd55263c89801b920abb97b,2024-07-12T15:15:11.813000
|
||||
CVE-2024-3992,0,0,ff644523dcb07d662c2bf53b9e125872cf5c9b9df16e03b5f8dec25363b303ae,2024-06-17T12:42:04.623000
|
||||
CVE-2024-39920,0,0,8281f1288058876e172a78a04b7e10123b671826d2c29ba249d059d614d38347,2024-07-03T12:53:24.977000
|
||||
CVE-2024-39927,0,0,98e497d093ac214e1059a0be9e6a17e44ab8fd11c901f329cf8cd36c5ebfff18,2024-07-11T13:05:54.930000
|
||||
@ -254952,121 +254975,121 @@ CVE-2024-4085,0,0,18b49aedef154a5f78284d7ff3699691fe3b4904260085a931cc6d08f4fb7c
|
||||
CVE-2024-4086,0,0,c06eb3f0c2fbe1c42ce58a59441202866280214c07091170b4fb53c94814c994,2024-05-02T18:00:37.360000
|
||||
CVE-2024-4087,0,0,c042d2a1de26e6b1fe0621a6edcac1fb8cab9f866d13a8bc2e77c06eafe2f2ff,2024-06-03T14:46:24.250000
|
||||
CVE-2024-4088,0,0,c8ca3e8553223ece7fd626b7957017d2d8aae2ed445db80654c73542bf17135f,2024-06-11T17:11:30.193000
|
||||
CVE-2024-40899,1,1,a1537c0419c5b46a401a756392015f297b7ae861fe8dd029e421098041453a2b,2024-07-12T13:15:13.357000
|
||||
CVE-2024-40900,1,1,26e284bac4dc49c500298d8e9aa2c2d24b8001067aad7a9cf9dadd91b2e8696d,2024-07-12T13:15:13.433000
|
||||
CVE-2024-40901,1,1,0e66e2417588399d9f7cce97de9bacb496616c2f1059ca5af3002975c6cd8ec7,2024-07-12T13:15:13.500000
|
||||
CVE-2024-40902,1,1,7e2e4860b63634c5faf109eafb75c4e979be147f9929e48aea4d1525d676804a,2024-07-12T13:15:13.583000
|
||||
CVE-2024-40903,1,1,3d40110fd540be56236e668d74bce14d0c3f29e03d1e6482abed58c76bc47aa4,2024-07-12T13:15:13.660000
|
||||
CVE-2024-40904,1,1,98373162fc0cde786ba882d928801a2159ce68a309634ba36f6c568933811833,2024-07-12T13:15:13.770000
|
||||
CVE-2024-40905,1,1,c5ffa5663db6f055947603e5952a69586cfeef4ed80b04aaeac861d239e54a7d,2024-07-12T13:15:13.847000
|
||||
CVE-2024-40906,1,1,1e33834b00bf9499d2b017b86d3f3941919e1aa294c63466ef984d903dbba94b,2024-07-12T13:15:13.920000
|
||||
CVE-2024-40907,1,1,027d27a84d558271986afd67315e617f98834f4d044550c1ed40d07067d53c8d,2024-07-12T13:15:13.987000
|
||||
CVE-2024-40908,1,1,dfa7d00024424eac99ccf75026940c6143d9120d6d44ba6052d81fd1d225f5ff,2024-07-12T13:15:14.060000
|
||||
CVE-2024-40909,1,1,63c21bb18584e9155ea0af75496a580a2d20c1724577d85c7b30b0e069cc3bea,2024-07-12T13:15:14.137000
|
||||
CVE-2024-40910,1,1,2f443877ddf3606f765db963472695f51ce2af2ae21bba27c7946bb0b98d5def,2024-07-12T13:15:14.213000
|
||||
CVE-2024-40911,1,1,ba06a7353669e2bfd2efb87a92e2911dcd8f909880f9a543ad4ab70d4aeab704,2024-07-12T13:15:14.283000
|
||||
CVE-2024-40912,1,1,f648da75c1ec3e37d7799dc8d7510f36844b1dc258eaa83cb331515e606aab0c,2024-07-12T13:15:14.363000
|
||||
CVE-2024-40913,1,1,0ea6dccecde00d8edcca27930eaeb0c3e0c289d26a4f5ccaba80c9b7ae727347,2024-07-12T13:15:14.457000
|
||||
CVE-2024-40914,1,1,c51a612c1d4e6ccadc60914e96023265876cdc793cf8fc86e21b5221c9d71d42,2024-07-12T13:15:14.567000
|
||||
CVE-2024-40915,1,1,cd2dad19bdb27067bdd9fbd2adaa7760651673fb0d234d8fbbc201520ae8a642,2024-07-12T13:15:14.660000
|
||||
CVE-2024-40916,1,1,63ff073b81bf97757cafec8a9f25bc76e0c2e171d883192c855d02d1f8adf959,2024-07-12T13:15:14.730000
|
||||
CVE-2024-40917,1,1,ce270c2c06befb2e566db67febaba22ae13d48ed9f675b719a6dbb8b242e51c2,2024-07-12T13:15:14.797000
|
||||
CVE-2024-40918,1,1,134f7ef03edab031ae56afab15730abaee485b29599fe95aef62e6507c56aa8c,2024-07-12T13:15:14.863000
|
||||
CVE-2024-40919,1,1,760a593110baefe355b9420d011693aa372dbb15923190f8213f1877623d0b75,2024-07-12T13:15:14.937000
|
||||
CVE-2024-40899,0,0,a1537c0419c5b46a401a756392015f297b7ae861fe8dd029e421098041453a2b,2024-07-12T13:15:13.357000
|
||||
CVE-2024-40900,0,0,26e284bac4dc49c500298d8e9aa2c2d24b8001067aad7a9cf9dadd91b2e8696d,2024-07-12T13:15:13.433000
|
||||
CVE-2024-40901,0,0,0e66e2417588399d9f7cce97de9bacb496616c2f1059ca5af3002975c6cd8ec7,2024-07-12T13:15:13.500000
|
||||
CVE-2024-40902,0,0,7e2e4860b63634c5faf109eafb75c4e979be147f9929e48aea4d1525d676804a,2024-07-12T13:15:13.583000
|
||||
CVE-2024-40903,0,0,3d40110fd540be56236e668d74bce14d0c3f29e03d1e6482abed58c76bc47aa4,2024-07-12T13:15:13.660000
|
||||
CVE-2024-40904,0,0,98373162fc0cde786ba882d928801a2159ce68a309634ba36f6c568933811833,2024-07-12T13:15:13.770000
|
||||
CVE-2024-40905,0,0,c5ffa5663db6f055947603e5952a69586cfeef4ed80b04aaeac861d239e54a7d,2024-07-12T13:15:13.847000
|
||||
CVE-2024-40906,0,0,1e33834b00bf9499d2b017b86d3f3941919e1aa294c63466ef984d903dbba94b,2024-07-12T13:15:13.920000
|
||||
CVE-2024-40907,0,0,027d27a84d558271986afd67315e617f98834f4d044550c1ed40d07067d53c8d,2024-07-12T13:15:13.987000
|
||||
CVE-2024-40908,0,0,dfa7d00024424eac99ccf75026940c6143d9120d6d44ba6052d81fd1d225f5ff,2024-07-12T13:15:14.060000
|
||||
CVE-2024-40909,0,0,63c21bb18584e9155ea0af75496a580a2d20c1724577d85c7b30b0e069cc3bea,2024-07-12T13:15:14.137000
|
||||
CVE-2024-40910,0,0,2f443877ddf3606f765db963472695f51ce2af2ae21bba27c7946bb0b98d5def,2024-07-12T13:15:14.213000
|
||||
CVE-2024-40911,0,0,ba06a7353669e2bfd2efb87a92e2911dcd8f909880f9a543ad4ab70d4aeab704,2024-07-12T13:15:14.283000
|
||||
CVE-2024-40912,0,0,f648da75c1ec3e37d7799dc8d7510f36844b1dc258eaa83cb331515e606aab0c,2024-07-12T13:15:14.363000
|
||||
CVE-2024-40913,0,0,0ea6dccecde00d8edcca27930eaeb0c3e0c289d26a4f5ccaba80c9b7ae727347,2024-07-12T13:15:14.457000
|
||||
CVE-2024-40914,0,0,c51a612c1d4e6ccadc60914e96023265876cdc793cf8fc86e21b5221c9d71d42,2024-07-12T13:15:14.567000
|
||||
CVE-2024-40915,0,0,cd2dad19bdb27067bdd9fbd2adaa7760651673fb0d234d8fbbc201520ae8a642,2024-07-12T13:15:14.660000
|
||||
CVE-2024-40916,0,0,63ff073b81bf97757cafec8a9f25bc76e0c2e171d883192c855d02d1f8adf959,2024-07-12T13:15:14.730000
|
||||
CVE-2024-40917,0,0,ce270c2c06befb2e566db67febaba22ae13d48ed9f675b719a6dbb8b242e51c2,2024-07-12T13:15:14.797000
|
||||
CVE-2024-40918,0,0,134f7ef03edab031ae56afab15730abaee485b29599fe95aef62e6507c56aa8c,2024-07-12T13:15:14.863000
|
||||
CVE-2024-40919,0,0,760a593110baefe355b9420d011693aa372dbb15923190f8213f1877623d0b75,2024-07-12T13:15:14.937000
|
||||
CVE-2024-4092,0,0,4be02f9c67d30932bc0929e64c1c04dde83d92e769e6b30b60cbc598e8e37f4c,2024-05-02T18:00:37.360000
|
||||
CVE-2024-40920,1,1,52f935ac68d844332d7074a44fd4c5a672a204f45236ac19f62c1615fe6ae1fb,2024-07-12T13:15:15.003000
|
||||
CVE-2024-40921,1,1,7d9fa7a372975e6a782289f91d738ffa49de1593897f34e53842a823a19e9246,2024-07-12T13:15:15.060000
|
||||
CVE-2024-40922,1,1,ae4ab2b399ba81fb1a1d4d1aa49980bb3f94590c0ded43f8812fc0259079c43a,2024-07-12T13:15:15.120000
|
||||
CVE-2024-40923,1,1,b017da2e98d0f79f8e3f041ea74187be13d543ade905a5eadd94841cefc57468,2024-07-12T13:15:15.200000
|
||||
CVE-2024-40924,1,1,671fb83635dd5d9a82a879889ec881ff97cb6ad422ba286ee409ccd7166360ac,2024-07-12T13:15:15.277000
|
||||
CVE-2024-40925,1,1,956f7e5220b6de0de68833dfd8f06e7f7bbbbdcba5c52115ac9b4739f37c41f6,2024-07-12T13:15:15.343000
|
||||
CVE-2024-40926,1,1,929cbd7258153956eba4f6157bbcce359577cf0d86a993f49dd6b0fddbcf2bdf,2024-07-12T13:15:15.403000
|
||||
CVE-2024-40927,1,1,b07261720e590dd4b6023207a1bada76cb00a52429b315c97a8e92e7583a5090,2024-07-12T13:15:15.477000
|
||||
CVE-2024-40928,1,1,03fb51d4f28dcefd0b6f88e37da621fe209d52f9cc41db1f941a0a7c10e29727,2024-07-12T13:15:15.550000
|
||||
CVE-2024-40929,1,1,40d0a8d35f864b07d9b03ee1425b958319e20b19b1b29957a56e98e80fd108dd,2024-07-12T13:15:15.610000
|
||||
CVE-2024-40920,0,0,52f935ac68d844332d7074a44fd4c5a672a204f45236ac19f62c1615fe6ae1fb,2024-07-12T13:15:15.003000
|
||||
CVE-2024-40921,0,0,7d9fa7a372975e6a782289f91d738ffa49de1593897f34e53842a823a19e9246,2024-07-12T13:15:15.060000
|
||||
CVE-2024-40922,0,0,ae4ab2b399ba81fb1a1d4d1aa49980bb3f94590c0ded43f8812fc0259079c43a,2024-07-12T13:15:15.120000
|
||||
CVE-2024-40923,0,0,b017da2e98d0f79f8e3f041ea74187be13d543ade905a5eadd94841cefc57468,2024-07-12T13:15:15.200000
|
||||
CVE-2024-40924,0,0,671fb83635dd5d9a82a879889ec881ff97cb6ad422ba286ee409ccd7166360ac,2024-07-12T13:15:15.277000
|
||||
CVE-2024-40925,0,0,956f7e5220b6de0de68833dfd8f06e7f7bbbbdcba5c52115ac9b4739f37c41f6,2024-07-12T13:15:15.343000
|
||||
CVE-2024-40926,0,0,929cbd7258153956eba4f6157bbcce359577cf0d86a993f49dd6b0fddbcf2bdf,2024-07-12T13:15:15.403000
|
||||
CVE-2024-40927,0,0,b07261720e590dd4b6023207a1bada76cb00a52429b315c97a8e92e7583a5090,2024-07-12T13:15:15.477000
|
||||
CVE-2024-40928,0,0,03fb51d4f28dcefd0b6f88e37da621fe209d52f9cc41db1f941a0a7c10e29727,2024-07-12T13:15:15.550000
|
||||
CVE-2024-40929,0,0,40d0a8d35f864b07d9b03ee1425b958319e20b19b1b29957a56e98e80fd108dd,2024-07-12T13:15:15.610000
|
||||
CVE-2024-4093,0,0,5d27408cc41c323f4b0e69479d9f46468fbd0106e510632bee156499f1d6b2eb,2024-05-17T02:40:15.433000
|
||||
CVE-2024-40930,1,1,b17383e20ad6a93054a6d62eb89db32a547edaa0e619014da8fa60baf148ad56,2024-07-12T13:15:15.690000
|
||||
CVE-2024-40931,1,1,45a61c9c21a7636a822b8c492e9dc5b8ed606f003caeae5835e14a751f2bed1b,2024-07-12T13:15:15.750000
|
||||
CVE-2024-40932,1,1,4e9a2343ab2c4cc1154de5c0c468b12bc14abbfb0b4e2d8bf11331a884eb2da6,2024-07-12T13:15:15.820000
|
||||
CVE-2024-40933,1,1,018a435d6addf3af72596e6413cfb9d150d6a4cf5aace3c094a686f336c67737,2024-07-12T13:15:15.913000
|
||||
CVE-2024-40934,1,1,ed802f69fe756965528d8eb599a41a8c900fc93400f24ff7bd5fd276303eaf88,2024-07-12T13:15:15.977000
|
||||
CVE-2024-40935,1,1,c17e449cefa0cd7d7572aeeec605ca933d6ec073948f7696faec0575b33f8036,2024-07-12T13:15:16.053000
|
||||
CVE-2024-40936,1,1,dd52a9ef9a44b708ea851a09ca2973287abc7b2a8e1eecdb2142805f721604ed,2024-07-12T13:15:16.123000
|
||||
CVE-2024-40937,1,1,93e844de56b6d36200decf62fe730a79438fc762b1c5a10a749c14db58f9d891,2024-07-12T13:15:16.187000
|
||||
CVE-2024-40938,1,1,498bd1a007123eb92a98ec101d4b23237317c1f4fc8b7ffe7c00eedeb41f0ced,2024-07-12T13:15:16.247000
|
||||
CVE-2024-40939,1,1,df0d109acb011cc2411427c28096cf42ff50a2f009bf4b8b597259477b2d148b,2024-07-12T13:15:16.320000
|
||||
CVE-2024-40930,0,0,b17383e20ad6a93054a6d62eb89db32a547edaa0e619014da8fa60baf148ad56,2024-07-12T13:15:15.690000
|
||||
CVE-2024-40931,0,0,45a61c9c21a7636a822b8c492e9dc5b8ed606f003caeae5835e14a751f2bed1b,2024-07-12T13:15:15.750000
|
||||
CVE-2024-40932,0,0,4e9a2343ab2c4cc1154de5c0c468b12bc14abbfb0b4e2d8bf11331a884eb2da6,2024-07-12T13:15:15.820000
|
||||
CVE-2024-40933,0,0,018a435d6addf3af72596e6413cfb9d150d6a4cf5aace3c094a686f336c67737,2024-07-12T13:15:15.913000
|
||||
CVE-2024-40934,0,0,ed802f69fe756965528d8eb599a41a8c900fc93400f24ff7bd5fd276303eaf88,2024-07-12T13:15:15.977000
|
||||
CVE-2024-40935,0,0,c17e449cefa0cd7d7572aeeec605ca933d6ec073948f7696faec0575b33f8036,2024-07-12T13:15:16.053000
|
||||
CVE-2024-40936,0,0,dd52a9ef9a44b708ea851a09ca2973287abc7b2a8e1eecdb2142805f721604ed,2024-07-12T13:15:16.123000
|
||||
CVE-2024-40937,0,0,93e844de56b6d36200decf62fe730a79438fc762b1c5a10a749c14db58f9d891,2024-07-12T13:15:16.187000
|
||||
CVE-2024-40938,0,0,498bd1a007123eb92a98ec101d4b23237317c1f4fc8b7ffe7c00eedeb41f0ced,2024-07-12T13:15:16.247000
|
||||
CVE-2024-40939,0,0,df0d109acb011cc2411427c28096cf42ff50a2f009bf4b8b597259477b2d148b,2024-07-12T13:15:16.320000
|
||||
CVE-2024-4094,0,0,b33ee059f8f8bd075d69b27868bc400620c6f43b00a28de902f166c8066c8ee9,2024-07-05T13:41:05.103000
|
||||
CVE-2024-40940,1,1,22e603db042a0ceaa0c8457e625a5a1dacd31d9b6c0c75bf070f25073d0d9df2,2024-07-12T13:15:16.380000
|
||||
CVE-2024-40941,1,1,eaa530f835f240490f873153814327ae1b533b7847bfd89d5abf5a27b32bee52,2024-07-12T13:15:16.440000
|
||||
CVE-2024-40942,1,1,8a02b97576c8b465420d4d1f495d35d4fa258589999d573dd6247c22dcefb3ad,2024-07-12T13:15:16.520000
|
||||
CVE-2024-40943,1,1,967d388057613ee278fb420056b0b43382d39452ff6c0fed8e41ffedd29c7cfa,2024-07-12T13:15:16.670000
|
||||
CVE-2024-40944,1,1,3f405a88cad1f8ba33136c5d874d8577f1795976620486f33be66e34c87c8e40,2024-07-12T13:15:16.753000
|
||||
CVE-2024-40945,1,1,27a2c12a82a920902c2d4f1448af8629791a1ffc2f8949e349a7bba334c1f070,2024-07-12T13:15:16.853000
|
||||
CVE-2024-40946,1,1,aa22dd4c35beb48c8e79647f2b2ab04d5b07114e4710b8b619d9ffc07a6484fc,2024-07-12T13:15:16.963000
|
||||
CVE-2024-40947,1,1,267bb6f1f49f5f9cf2bba04a5a16a6544da7fb47feb0918a8c882fea22e22537,2024-07-12T13:15:17.073000
|
||||
CVE-2024-40948,1,1,e72cb1483215380d29b83479038967f6e2e52232db5d0582b36a6c56da2adf07,2024-07-12T13:15:17.187000
|
||||
CVE-2024-40949,1,1,1188630e42048867a24811901d02433f570e739a3e0eaf53bbe44abffa91b3be,2024-07-12T13:15:17.290000
|
||||
CVE-2024-40940,0,0,22e603db042a0ceaa0c8457e625a5a1dacd31d9b6c0c75bf070f25073d0d9df2,2024-07-12T13:15:16.380000
|
||||
CVE-2024-40941,0,0,eaa530f835f240490f873153814327ae1b533b7847bfd89d5abf5a27b32bee52,2024-07-12T13:15:16.440000
|
||||
CVE-2024-40942,0,0,8a02b97576c8b465420d4d1f495d35d4fa258589999d573dd6247c22dcefb3ad,2024-07-12T13:15:16.520000
|
||||
CVE-2024-40943,0,0,967d388057613ee278fb420056b0b43382d39452ff6c0fed8e41ffedd29c7cfa,2024-07-12T13:15:16.670000
|
||||
CVE-2024-40944,0,0,3f405a88cad1f8ba33136c5d874d8577f1795976620486f33be66e34c87c8e40,2024-07-12T13:15:16.753000
|
||||
CVE-2024-40945,0,0,27a2c12a82a920902c2d4f1448af8629791a1ffc2f8949e349a7bba334c1f070,2024-07-12T13:15:16.853000
|
||||
CVE-2024-40946,0,0,aa22dd4c35beb48c8e79647f2b2ab04d5b07114e4710b8b619d9ffc07a6484fc,2024-07-12T13:15:16.963000
|
||||
CVE-2024-40947,0,0,267bb6f1f49f5f9cf2bba04a5a16a6544da7fb47feb0918a8c882fea22e22537,2024-07-12T13:15:17.073000
|
||||
CVE-2024-40948,0,0,e72cb1483215380d29b83479038967f6e2e52232db5d0582b36a6c56da2adf07,2024-07-12T13:15:17.187000
|
||||
CVE-2024-40949,0,0,1188630e42048867a24811901d02433f570e739a3e0eaf53bbe44abffa91b3be,2024-07-12T13:15:17.290000
|
||||
CVE-2024-4095,0,0,31c469f286897b03d948d4fae3cbc92250d27af63fa8e1eb75ef9d0aeba13389,2024-06-17T12:42:04.623000
|
||||
CVE-2024-40950,1,1,e8f113cf4dbb8ef1f2d9f2c6d436f6bd5468ecefc793fd19f71529a5eb5c63c5,2024-07-12T13:15:17.353000
|
||||
CVE-2024-40951,1,1,9fbb1eef5cdbc5a0bf99feb1b9d0a0e8469bcf491d913bf0e3470bc7193e08b0,2024-07-12T13:15:17.420000
|
||||
CVE-2024-40952,1,1,5cf80d42b55980986593e9b89ddc686d9a94e5be4670f9fce0afe22bc8a1744e,2024-07-12T13:15:17.477000
|
||||
CVE-2024-40953,1,1,1f7f2ffc4accbcf158787d4d3534352bdfba9556010a761fbd5adff4d2ff0ee5,2024-07-12T13:15:17.560000
|
||||
CVE-2024-40954,1,1,aa3c10d4809640acff3ad3f0772f58b56f5167d61a276d22704870103e4bf5d4,2024-07-12T13:15:17.627000
|
||||
CVE-2024-40955,1,1,ebfa75e852f47c4584a0a7eab986f8c9156c58a6429ed76ef63a6db365a43e5e,2024-07-12T13:15:17.697000
|
||||
CVE-2024-40956,1,1,3143dcddc7dd7a1670687f18338bd63cb2aa5b11eab8c67600878bd19c826cf2,2024-07-12T13:15:17.760000
|
||||
CVE-2024-40957,1,1,cb4944198c00ccd07de1b9f60bd8768db58ad0fc127b20313c4fa89c66130a96,2024-07-12T13:15:17.823000
|
||||
CVE-2024-40958,1,1,438021c1a6d6ad83d4e8a3f1c527ac4b480720224ed3047f5d3071073c753cf9,2024-07-12T13:15:17.883000
|
||||
CVE-2024-40959,1,1,a6f3fe51584e47b6c51e1af85c6f8e2881023c67be04ada19b2bdf9f24ead2f6,2024-07-12T13:15:17.947000
|
||||
CVE-2024-40960,1,1,7f9ab575ac1bdf28305e2140ed3f19b0bf16e48731b79227c5a5c072e5ac7326,2024-07-12T13:15:18.040000
|
||||
CVE-2024-40961,1,1,e354dadd471f05b8e1e20f13104d9ebf79202ae7ab8893ad8d01b08dc4875788,2024-07-12T13:15:18.110000
|
||||
CVE-2024-40962,1,1,76e40dcf5874c8f84e56cebb65a6534e0fc5daec7c2a6d49289949f223904ed6,2024-07-12T13:15:18.180000
|
||||
CVE-2024-40963,1,1,62bae4ab6170aa8f3787e93841b2e7d52e8f97e5632836f5017ee4ca81172908,2024-07-12T13:15:18.243000
|
||||
CVE-2024-40964,1,1,547caf6ae49a01333a909acd257066192640f9f18664dc94beddff07826e4b5c,2024-07-12T13:15:18.310000
|
||||
CVE-2024-40965,1,1,657815050d31bb10c3fb544883dafd6f98a4bd19074cbbbfc0e5b399d493209d,2024-07-12T13:15:18.370000
|
||||
CVE-2024-40966,1,1,39490e01bf60e273921b952e6297c30e387d7d48ae7ffeb777ff652e8de0a5f1,2024-07-12T13:15:18.420000
|
||||
CVE-2024-40967,1,1,24f690c8d7cdaffe373cfd6706c38c2b743da125fbc7aaa4febe9d8df98a30f9,2024-07-12T13:15:18.480000
|
||||
CVE-2024-40968,1,1,25f4c573c3a6951be76abc4f2d21ecb040cec2fe6b66d155ab949921551cb750,2024-07-12T13:15:18.553000
|
||||
CVE-2024-40969,1,1,f60a541e6d2ef3bba2195b1682fd87d2d7d2b882f765e72380757e494d509739,2024-07-12T13:15:18.627000
|
||||
CVE-2024-40950,0,0,e8f113cf4dbb8ef1f2d9f2c6d436f6bd5468ecefc793fd19f71529a5eb5c63c5,2024-07-12T13:15:17.353000
|
||||
CVE-2024-40951,0,0,9fbb1eef5cdbc5a0bf99feb1b9d0a0e8469bcf491d913bf0e3470bc7193e08b0,2024-07-12T13:15:17.420000
|
||||
CVE-2024-40952,0,0,5cf80d42b55980986593e9b89ddc686d9a94e5be4670f9fce0afe22bc8a1744e,2024-07-12T13:15:17.477000
|
||||
CVE-2024-40953,0,0,1f7f2ffc4accbcf158787d4d3534352bdfba9556010a761fbd5adff4d2ff0ee5,2024-07-12T13:15:17.560000
|
||||
CVE-2024-40954,0,0,aa3c10d4809640acff3ad3f0772f58b56f5167d61a276d22704870103e4bf5d4,2024-07-12T13:15:17.627000
|
||||
CVE-2024-40955,0,0,ebfa75e852f47c4584a0a7eab986f8c9156c58a6429ed76ef63a6db365a43e5e,2024-07-12T13:15:17.697000
|
||||
CVE-2024-40956,0,0,3143dcddc7dd7a1670687f18338bd63cb2aa5b11eab8c67600878bd19c826cf2,2024-07-12T13:15:17.760000
|
||||
CVE-2024-40957,0,0,cb4944198c00ccd07de1b9f60bd8768db58ad0fc127b20313c4fa89c66130a96,2024-07-12T13:15:17.823000
|
||||
CVE-2024-40958,0,0,438021c1a6d6ad83d4e8a3f1c527ac4b480720224ed3047f5d3071073c753cf9,2024-07-12T13:15:17.883000
|
||||
CVE-2024-40959,0,0,a6f3fe51584e47b6c51e1af85c6f8e2881023c67be04ada19b2bdf9f24ead2f6,2024-07-12T13:15:17.947000
|
||||
CVE-2024-40960,0,0,7f9ab575ac1bdf28305e2140ed3f19b0bf16e48731b79227c5a5c072e5ac7326,2024-07-12T13:15:18.040000
|
||||
CVE-2024-40961,0,0,e354dadd471f05b8e1e20f13104d9ebf79202ae7ab8893ad8d01b08dc4875788,2024-07-12T13:15:18.110000
|
||||
CVE-2024-40962,0,0,76e40dcf5874c8f84e56cebb65a6534e0fc5daec7c2a6d49289949f223904ed6,2024-07-12T13:15:18.180000
|
||||
CVE-2024-40963,0,0,62bae4ab6170aa8f3787e93841b2e7d52e8f97e5632836f5017ee4ca81172908,2024-07-12T13:15:18.243000
|
||||
CVE-2024-40964,0,0,547caf6ae49a01333a909acd257066192640f9f18664dc94beddff07826e4b5c,2024-07-12T13:15:18.310000
|
||||
CVE-2024-40965,0,0,657815050d31bb10c3fb544883dafd6f98a4bd19074cbbbfc0e5b399d493209d,2024-07-12T13:15:18.370000
|
||||
CVE-2024-40966,0,0,39490e01bf60e273921b952e6297c30e387d7d48ae7ffeb777ff652e8de0a5f1,2024-07-12T13:15:18.420000
|
||||
CVE-2024-40967,0,0,24f690c8d7cdaffe373cfd6706c38c2b743da125fbc7aaa4febe9d8df98a30f9,2024-07-12T13:15:18.480000
|
||||
CVE-2024-40968,0,0,25f4c573c3a6951be76abc4f2d21ecb040cec2fe6b66d155ab949921551cb750,2024-07-12T13:15:18.553000
|
||||
CVE-2024-40969,0,0,f60a541e6d2ef3bba2195b1682fd87d2d7d2b882f765e72380757e494d509739,2024-07-12T13:15:18.627000
|
||||
CVE-2024-4097,0,0,6a60177672bc62dbe43e4e7ccd78e74b9159babed54b0d3a303c5a9a6fcd009a,2024-05-02T18:00:37.360000
|
||||
CVE-2024-40970,1,1,f0e9e639a5011659988b1c77f9005f0257eb6d14ea247d5dfd0e2aae055c9a6c,2024-07-12T13:15:18.687000
|
||||
CVE-2024-40971,1,1,394d7fca8380fcdd87fe58713f141afe1bc139afba4ab6c7de52ad49258e5c94,2024-07-12T13:15:18.750000
|
||||
CVE-2024-40972,1,1,2522b74e703a57f4a49acde166e839271bf4a76ad5b45723c2714cdf0efbe6d9,2024-07-12T13:15:18.820000
|
||||
CVE-2024-40973,1,1,3294f7eaa94a22503966e400188feffc1e6655e3b6182a37af7983e98b230623,2024-07-12T13:15:18.890000
|
||||
CVE-2024-40974,1,1,31ec3612aa1cd9bc65050df695bb7292d736c4a033fe6d1b03d1cdc28390da81,2024-07-12T13:15:18.943000
|
||||
CVE-2024-40975,1,1,04d2e3f8d1a71278b45b96b497fcab25a15f3148042a4809628fa41fd010ca71,2024-07-12T13:15:19.007000
|
||||
CVE-2024-40976,1,1,000563ca0a32b46e215edf7b9464d350000a6c1f01e39cebb27138c4938d2e25,2024-07-12T13:15:19.073000
|
||||
CVE-2024-40977,1,1,700552395e82caa0f778a3504eeee29b1e056aff50032a9f6eeb3b4481213b5b,2024-07-12T13:15:19.143000
|
||||
CVE-2024-40978,1,1,98fd62fc332f424746eb927a03216ab43929f25675694ef64bdfd0740d1477c9,2024-07-12T13:15:19.410000
|
||||
CVE-2024-40979,1,1,48c067d4411a656348aff14146086a3df22cbfb2f2065deb366244a09ec3eb62,2024-07-12T13:15:19.477000
|
||||
CVE-2024-40970,0,0,f0e9e639a5011659988b1c77f9005f0257eb6d14ea247d5dfd0e2aae055c9a6c,2024-07-12T13:15:18.687000
|
||||
CVE-2024-40971,0,0,394d7fca8380fcdd87fe58713f141afe1bc139afba4ab6c7de52ad49258e5c94,2024-07-12T13:15:18.750000
|
||||
CVE-2024-40972,0,0,2522b74e703a57f4a49acde166e839271bf4a76ad5b45723c2714cdf0efbe6d9,2024-07-12T13:15:18.820000
|
||||
CVE-2024-40973,0,0,3294f7eaa94a22503966e400188feffc1e6655e3b6182a37af7983e98b230623,2024-07-12T13:15:18.890000
|
||||
CVE-2024-40974,0,0,31ec3612aa1cd9bc65050df695bb7292d736c4a033fe6d1b03d1cdc28390da81,2024-07-12T13:15:18.943000
|
||||
CVE-2024-40975,0,0,04d2e3f8d1a71278b45b96b497fcab25a15f3148042a4809628fa41fd010ca71,2024-07-12T13:15:19.007000
|
||||
CVE-2024-40976,0,0,000563ca0a32b46e215edf7b9464d350000a6c1f01e39cebb27138c4938d2e25,2024-07-12T13:15:19.073000
|
||||
CVE-2024-40977,0,0,700552395e82caa0f778a3504eeee29b1e056aff50032a9f6eeb3b4481213b5b,2024-07-12T13:15:19.143000
|
||||
CVE-2024-40978,0,0,98fd62fc332f424746eb927a03216ab43929f25675694ef64bdfd0740d1477c9,2024-07-12T13:15:19.410000
|
||||
CVE-2024-40979,0,0,48c067d4411a656348aff14146086a3df22cbfb2f2065deb366244a09ec3eb62,2024-07-12T13:15:19.477000
|
||||
CVE-2024-4098,0,0,a3e4777d420e1b3bcafda1cf3d039c925611c1ff1c0ae02e65a01fb1638060ec,2024-06-20T12:43:25.663000
|
||||
CVE-2024-40980,1,1,fc7ec6e0fcc3908b1d98d3114dc9ce34e63c35bbac21b4650d5b718b9577a8c5,2024-07-12T13:15:19.550000
|
||||
CVE-2024-40981,1,1,974f37e875734bbb1b1e0c7e3d1e90efa357336b1137c511f4b0c0498cd80180,2024-07-12T13:15:19.627000
|
||||
CVE-2024-40982,1,1,8a7a1062bd03052d5f85cee5f0fbf641631af5ccb45722151e7f032eb6f8b2be,2024-07-12T13:15:19.800000
|
||||
CVE-2024-40983,1,1,6b55ed7954dd7aca70d8d6ed477968d990d87482b3c543660ab273abbd74ad73,2024-07-12T13:15:19.893000
|
||||
CVE-2024-40984,1,1,e466437f6b3fa8104d2eaa56fa3ee06e3d11df6e3012387795122ee82d2adfcc,2024-07-12T13:15:19.977000
|
||||
CVE-2024-40985,1,1,5a91740d86a77ed66b3471044c9cd2ed92596d6b8374bce8bbe9d290b444717e,2024-07-12T13:15:20.050000
|
||||
CVE-2024-40986,1,1,edceeac53119c6b924c598fc85a55d217974d56b23004fbed1cf54300e3a93da,2024-07-12T13:15:20.113000
|
||||
CVE-2024-40987,1,1,f81f3bb5d1d8aff777d50596fcf1f782e0c95116acfddce6367fa73f68ef84ef,2024-07-12T13:15:20.180000
|
||||
CVE-2024-40988,1,1,b6efcd3ce32d8bbf8c0e1e9a82a7f046a2e6301bd90b41045c059f4eaf4a9f11,2024-07-12T13:15:20.250000
|
||||
CVE-2024-40989,1,1,87293d32126db3d8fb670365d8f7ec2499e95eb92cef42ff6eb0201ec2e4a267,2024-07-12T13:15:20.310000
|
||||
CVE-2024-40990,1,1,ee4644c954fd816a7eb6fcade63ca2eccb7fe7ba7450ab748d595e17624085a6,2024-07-12T13:15:20.370000
|
||||
CVE-2024-40991,1,1,a3e9c84592523eeb42e7964e4c53e327a42ac510ea137d95bedae7ef02306aaf,2024-07-12T13:15:20.430000
|
||||
CVE-2024-40992,1,1,6340b6169a73d2480ff797ac1e4ecaa9ddee77574d3978bf3764a7aad7cbe602,2024-07-12T13:15:20.497000
|
||||
CVE-2024-40993,1,1,12df2ce3705ef7c11fbf126a3fda4f01a8ef1725461aa34e8440fb2f2efbc2f9,2024-07-12T13:15:20.553000
|
||||
CVE-2024-40994,1,1,e892b71f3a9b21624dd6e82ea39618990c300ec702be9c9e16eb678b462575bc,2024-07-12T13:15:20.620000
|
||||
CVE-2024-40995,1,1,0f93f19a33785f421b58780599c4d266628ebafbc509ea508430969ac630bf8e,2024-07-12T13:15:20.680000
|
||||
CVE-2024-40996,1,1,2288c4394367f03c3e0dc4493d7880bee0fa0922236e1a699d966a84c20ffe10,2024-07-12T13:15:20.740000
|
||||
CVE-2024-40997,1,1,a775d860d08a23f3f6e481483b7f64f171760702dc7f04583cd218bdada76f9a,2024-07-12T13:15:20.800000
|
||||
CVE-2024-40998,1,1,25b2813e822a479f68d33dae3db5418bec7429258e423b599a4fafb93cdb8f2c,2024-07-12T13:15:20.857000
|
||||
CVE-2024-40999,1,1,3d56eaed6fdc4d9d41e09db17c3dcb9b79218436134a65f5c9d3b4f3c020851b,2024-07-12T13:15:20.920000
|
||||
CVE-2024-40980,0,0,fc7ec6e0fcc3908b1d98d3114dc9ce34e63c35bbac21b4650d5b718b9577a8c5,2024-07-12T13:15:19.550000
|
||||
CVE-2024-40981,0,0,974f37e875734bbb1b1e0c7e3d1e90efa357336b1137c511f4b0c0498cd80180,2024-07-12T13:15:19.627000
|
||||
CVE-2024-40982,0,0,8a7a1062bd03052d5f85cee5f0fbf641631af5ccb45722151e7f032eb6f8b2be,2024-07-12T13:15:19.800000
|
||||
CVE-2024-40983,0,0,6b55ed7954dd7aca70d8d6ed477968d990d87482b3c543660ab273abbd74ad73,2024-07-12T13:15:19.893000
|
||||
CVE-2024-40984,0,0,e466437f6b3fa8104d2eaa56fa3ee06e3d11df6e3012387795122ee82d2adfcc,2024-07-12T13:15:19.977000
|
||||
CVE-2024-40985,0,0,5a91740d86a77ed66b3471044c9cd2ed92596d6b8374bce8bbe9d290b444717e,2024-07-12T13:15:20.050000
|
||||
CVE-2024-40986,0,0,edceeac53119c6b924c598fc85a55d217974d56b23004fbed1cf54300e3a93da,2024-07-12T13:15:20.113000
|
||||
CVE-2024-40987,0,0,f81f3bb5d1d8aff777d50596fcf1f782e0c95116acfddce6367fa73f68ef84ef,2024-07-12T13:15:20.180000
|
||||
CVE-2024-40988,0,0,b6efcd3ce32d8bbf8c0e1e9a82a7f046a2e6301bd90b41045c059f4eaf4a9f11,2024-07-12T13:15:20.250000
|
||||
CVE-2024-40989,0,0,87293d32126db3d8fb670365d8f7ec2499e95eb92cef42ff6eb0201ec2e4a267,2024-07-12T13:15:20.310000
|
||||
CVE-2024-40990,0,0,ee4644c954fd816a7eb6fcade63ca2eccb7fe7ba7450ab748d595e17624085a6,2024-07-12T13:15:20.370000
|
||||
CVE-2024-40991,0,0,a3e9c84592523eeb42e7964e4c53e327a42ac510ea137d95bedae7ef02306aaf,2024-07-12T13:15:20.430000
|
||||
CVE-2024-40992,0,0,6340b6169a73d2480ff797ac1e4ecaa9ddee77574d3978bf3764a7aad7cbe602,2024-07-12T13:15:20.497000
|
||||
CVE-2024-40993,0,0,12df2ce3705ef7c11fbf126a3fda4f01a8ef1725461aa34e8440fb2f2efbc2f9,2024-07-12T13:15:20.553000
|
||||
CVE-2024-40994,0,0,e892b71f3a9b21624dd6e82ea39618990c300ec702be9c9e16eb678b462575bc,2024-07-12T13:15:20.620000
|
||||
CVE-2024-40995,0,0,0f93f19a33785f421b58780599c4d266628ebafbc509ea508430969ac630bf8e,2024-07-12T13:15:20.680000
|
||||
CVE-2024-40996,0,0,2288c4394367f03c3e0dc4493d7880bee0fa0922236e1a699d966a84c20ffe10,2024-07-12T13:15:20.740000
|
||||
CVE-2024-40997,0,0,a775d860d08a23f3f6e481483b7f64f171760702dc7f04583cd218bdada76f9a,2024-07-12T13:15:20.800000
|
||||
CVE-2024-40998,0,0,25b2813e822a479f68d33dae3db5418bec7429258e423b599a4fafb93cdb8f2c,2024-07-12T13:15:20.857000
|
||||
CVE-2024-40999,0,0,3d56eaed6fdc4d9d41e09db17c3dcb9b79218436134a65f5c9d3b4f3c020851b,2024-07-12T13:15:20.920000
|
||||
CVE-2024-4100,0,0,7f59e9bc55c06404ac377b1145b413dcdbe8a5d2f3074db367eedbc1e2d39377,2024-07-09T18:19:14.047000
|
||||
CVE-2024-41000,1,1,890521abebceae7bbc146183bb5a86bd6a1bec07c6683f812c9d08726bfbdea1,2024-07-12T13:15:20.987000
|
||||
CVE-2024-41001,1,1,f543e8f26e32c3731ba427f3e5acc8df26049ebd46408faeb1367fa632fd484a,2024-07-12T13:15:21.053000
|
||||
CVE-2024-41002,1,1,a428cc607bb2767561082915ff9776f0ef63cd618f91f900d560d277ec5e9ad0,2024-07-12T13:15:21.120000
|
||||
CVE-2024-41003,1,1,80f65f540961f6cee3934f5be6c07489e609e4432017c2bdaf988430415fa7d6,2024-07-12T13:15:21.180000
|
||||
CVE-2024-41004,1,1,1866e065db455da8c4a12f121632a7bd2e6a0d5b0b2004c33b4b6b42bb7366a2,2024-07-12T13:15:21.240000
|
||||
CVE-2024-41005,1,1,c54dff57c39348a495c0203a5216c1689c03682303107b2576e53e394cae9036,2024-07-12T13:15:21.310000
|
||||
CVE-2024-41006,1,1,819cc42e78f4fc52df5e0b544be823a6c609bc0f34707c229236fef7dc1a930b,2024-07-12T13:15:21.370000
|
||||
CVE-2024-41000,0,0,890521abebceae7bbc146183bb5a86bd6a1bec07c6683f812c9d08726bfbdea1,2024-07-12T13:15:20.987000
|
||||
CVE-2024-41001,0,0,f543e8f26e32c3731ba427f3e5acc8df26049ebd46408faeb1367fa632fd484a,2024-07-12T13:15:21.053000
|
||||
CVE-2024-41002,0,0,a428cc607bb2767561082915ff9776f0ef63cd618f91f900d560d277ec5e9ad0,2024-07-12T13:15:21.120000
|
||||
CVE-2024-41003,0,0,80f65f540961f6cee3934f5be6c07489e609e4432017c2bdaf988430415fa7d6,2024-07-12T13:15:21.180000
|
||||
CVE-2024-41004,0,0,1866e065db455da8c4a12f121632a7bd2e6a0d5b0b2004c33b4b6b42bb7366a2,2024-07-12T13:15:21.240000
|
||||
CVE-2024-41005,0,0,c54dff57c39348a495c0203a5216c1689c03682303107b2576e53e394cae9036,2024-07-12T13:15:21.310000
|
||||
CVE-2024-41006,0,0,819cc42e78f4fc52df5e0b544be823a6c609bc0f34707c229236fef7dc1a930b,2024-07-12T13:15:21.370000
|
||||
CVE-2024-4102,0,0,1b0aaa7efbf772a3034d5138f2cde018af6a8f41a0229b0c5f36e4d66092a2a3,2024-07-09T18:19:14.047000
|
||||
CVE-2024-4103,0,0,db40310890aaaffd4decfd17ebe6978d2575902ae5387a15070f6cb8b96b8e99,2024-05-14T16:11:39.510000
|
||||
CVE-2024-4104,0,0,8fd82744b8bcdbccac2be79cc70a35ed94046651bf70570898ef2c659d60f12d,2024-05-14T16:11:39.510000
|
||||
@ -255547,7 +255570,7 @@ CVE-2024-4662,0,0,271820e0248036cdcfeea2da470b958f93caba3600263b2df375c674d93150
|
||||
CVE-2024-4663,0,0,ac32c04a2cae0071224eeefc80f9a000b8618e2f1af1abc8eb33d3a9321c7d70,2024-06-20T12:44:01.637000
|
||||
CVE-2024-4664,0,0,4d4aeec2b9d4ae73905aa066e928be5011f1ff91cc6ef5979d75af441c67cdbb,2024-06-28T13:28:06.347000
|
||||
CVE-2024-4666,0,0,dde8d66c76bdf850b898b9f95df0d92f0ac3da730c1f32826d61843a6ef06bf5,2024-05-15T16:40:19.330000
|
||||
CVE-2024-4667,0,0,7322872ce67d0516daa1879b5081888f034f8da24e8d2497370a4d9a15117afe,2024-07-09T18:19:14.047000
|
||||
CVE-2024-4667,0,1,5f6a087811f370dc89d31ef88ad63586b7ea4db405d3be18d05609409a87488f,2024-07-12T14:25:13.923000
|
||||
CVE-2024-4668,0,0,3c2f34d91ee8c9aacf0f125fe94ffbbe9a611b8f1a54ab65e0473cea71baad6f,2024-05-30T13:15:41.297000
|
||||
CVE-2024-4669,0,0,cb3ea770e599714f2de5e50bc4195c130850e813b58882b88bfe234ded1dcd7f,2024-06-13T18:36:09.013000
|
||||
CVE-2024-4670,0,0,438b57b9006ea70a278767dc5849ca5e16eeaf7f43c9f1acf2c1dcf72f3e2983,2024-05-15T16:40:19.330000
|
||||
@ -255625,7 +255648,7 @@ CVE-2024-4748,0,0,0c715b5c19ebf413f66e32e0e846756d2092313152b17f8c4e7cf0a62355ae
|
||||
CVE-2024-4749,0,0,676e331864bc41907c4c80c44886e7dac480ef6dea2c29bc22838d992753d4da,2024-06-04T16:57:41.053000
|
||||
CVE-2024-4750,0,0,423585a3e250903ac62d761ecb0e0e6dc6b4649ccd4411b90275a4e6d2f87495,2024-06-04T16:57:41.053000
|
||||
CVE-2024-4751,0,0,980cee331660133759599aaa98eeae384de48fe7bcc98af4a2333b20d054b0b6,2024-06-17T12:42:04.623000
|
||||
CVE-2024-4753,0,1,9f6ae95232954e10d46dcad409a1281e3c3ba7b0c7197bb1d94d6337d29a472b,2024-07-12T12:49:07.030000
|
||||
CVE-2024-4753,0,0,9f6ae95232954e10d46dcad409a1281e3c3ba7b0c7197bb1d94d6337d29a472b,2024-07-12T12:49:07.030000
|
||||
CVE-2024-4754,0,0,65f7d30a77e8c92b9ac1114b7ed7f43c32a5bfb34fe46cea0e558e1fff1e464e,2024-06-24T12:57:36.513000
|
||||
CVE-2024-4755,0,0,ca5306e45de4985a027d64d4740785092288eb6abbd1ab6d1fda3377d88d4e7e,2024-07-03T02:08:01.477000
|
||||
CVE-2024-4756,0,0,b303493fc627eee25a3b39c986ea25472e7aab1866612b83c9a7c14522d2c360,2024-06-07T14:56:05.647000
|
||||
@ -256076,7 +256099,7 @@ CVE-2024-5317,0,0,f1a52a6a9c8c0e0ec33c800078b387ceb900e9c5541b8549c2aff9d1fff220
|
||||
CVE-2024-5318,0,0,812431b83287688611dc496217ea25ba5560744235da04dca7a35239cac1fe9a,2024-05-24T18:09:20.027000
|
||||
CVE-2024-5322,0,0,34d5429047e5a1854ac8faff5145e41fb19a8e0b0a19efc95aa08c4b8fb570df,2024-07-02T12:09:16.907000
|
||||
CVE-2024-5324,0,0,239b526476b291cf58ac1a7ce87454c70f83a8964e6e304d358d59b9fc037786,2024-06-06T14:17:35.017000
|
||||
CVE-2024-5325,1,1,f352c923bf69a8bb5b39fbb3ad2e82228c3d6f075e58548807c0dc729f2df5cf,2024-07-12T13:15:21.470000
|
||||
CVE-2024-5325,0,0,f352c923bf69a8bb5b39fbb3ad2e82228c3d6f075e58548807c0dc729f2df5cf,2024-07-12T13:15:21.470000
|
||||
CVE-2024-5326,0,0,9beaa1147d54b3ae536a6eb0023672ae377946ef8aec317bd58c5324df5850c7,2024-05-30T13:15:41.297000
|
||||
CVE-2024-5327,0,0,84b1605ed9f8fbbcd152a70275bed021ec8172a393ec025e57c9733c6898763a,2024-05-30T13:15:41.297000
|
||||
CVE-2024-5328,0,0,eccd57558969f598d341de2d66a168d40aa825b298603b31d124c5c65bd99501,2024-06-07T14:56:05.647000
|
||||
@ -256244,7 +256267,7 @@ CVE-2024-5526,0,0,e88e82e62b5e4c5aebe68213504a5aa190a1c186279f7068714569f91c3de7
|
||||
CVE-2024-5530,0,0,a1a0702e27e4a4e3934db43cd9ea561e00ac905016f120852abcc67a37fa7a55,2024-06-11T13:54:12.057000
|
||||
CVE-2024-5531,0,0,aff596c4345d9e9649e4107c993c40fc7416a56fa205089ee8692b6e8ba6cecf,2024-06-11T13:54:12.057000
|
||||
CVE-2024-5533,0,0,9bad1fab6a90d68c007069d0bfcbdd7a7d72da6f38ffeb11140e803bac3bba45,2024-07-05T14:01:37.470000
|
||||
CVE-2024-5535,0,0,823cd883eb780b4873573ca4453aa397c94e10a1d6c3b53a4ae748e110b914b8,2024-07-03T02:09:04.140000
|
||||
CVE-2024-5535,0,1,a4c9a52c5762644097b9202aaddafb08e0f65ed76c571265ed2ff38052925bcd,2024-07-12T14:15:16.790000
|
||||
CVE-2024-5536,0,0,d892d63cd79e6d462fe4485ce154b4e3b14e14d416b8b4d67114661d27280a01,2024-06-11T17:28:37.343000
|
||||
CVE-2024-5537,0,0,071475eb8c0f92cc8ea9522d658283ad0e8213ba6740ff46ee05e5b24c18c3d8,2024-05-30T17:15:34.583000
|
||||
CVE-2024-5538,0,0,183cea799fa9410e329e72f326a10b8369aedcea9a5b7583a44bf33ecc305070,2024-05-31T11:15:09.923000
|
||||
@ -256293,7 +256316,7 @@ CVE-2024-5612,0,0,24bfbb6efa391db3014703335fcf10e8f670f2b2b154031d8b7a312f92d367
|
||||
CVE-2024-5613,0,0,7e758f60ff4a249ae3d985d91b4f3417dc42ff70d8507f5e072b9cf0ad6144fd,2024-06-10T02:52:08.267000
|
||||
CVE-2024-5615,0,0,d715351de069ee256cfd127ce22346136f76094dbd1f6f173b336f3c2cdc9c0f,2024-06-11T17:55:16.103000
|
||||
CVE-2024-5616,0,0,5078c1aa917db98652cc6ffd2b310b244194da0fcbabfd9d4ed8ccf7b99de509,2024-07-08T15:49:22.437000
|
||||
CVE-2024-5626,0,1,7932ffd73aaf78514b606728bf1a761d189d38c2a5a283b9b4110e01ed2b4d16,2024-07-12T12:49:07.030000
|
||||
CVE-2024-5626,0,0,7932ffd73aaf78514b606728bf1a761d189d38c2a5a283b9b4110e01ed2b4d16,2024-07-12T12:49:07.030000
|
||||
CVE-2024-5629,0,0,20478b62dd0cd666624f11f2e5a11c22a9915feb481805651583fe7db0518c7b,2024-06-18T18:31:05.663000
|
||||
CVE-2024-5631,0,0,25836c7f267b9208b846f73ed3ce84976cc46a5e11e6627f730b2265da803c8d,2024-07-09T21:15:15.520000
|
||||
CVE-2024-5632,0,0,18c64f64f8d77f06a181388a24f5be7d454b8919234aa93ebe8fa802fed4ac14,2024-07-10T17:15:12.517000
|
||||
@ -256415,11 +256438,11 @@ CVE-2024-5792,0,0,9094b7486c3fc344423def250d1a80e78a3bf07108bd316adddc44339dabcd
|
||||
CVE-2024-5793,0,0,4f7c09f8feed484d3c3bfde7191aecbd9210e86e918c2f39cfc1ec374b1fc06e,2024-07-09T18:19:14.047000
|
||||
CVE-2024-5796,0,0,ee9ea77d6816c67e871ce0ce39c4d235af8efb4db7bec50166a494d6f8b7e47e,2024-06-28T10:27:00.920000
|
||||
CVE-2024-5798,0,0,f6c60b5ac812e7711b355fdc9c4ea7ca1c381d5fa9189e95b5ac079c15b31d9c,2024-06-13T18:36:09.010000
|
||||
CVE-2024-5802,0,0,d43f6c3699f8442d9285759c2e90cb7a4ef138460339054d721f73295a23e6c9,2024-07-09T18:19:14.047000
|
||||
CVE-2024-5802,0,1,71daebe4bec626c1d71de5756a51cb35bdbb0ec81769b121e428d7e1cc0f8395,2024-07-12T15:20:14.610000
|
||||
CVE-2024-5805,0,0,d5f814a63108fa76cde55a23a7ee4c9d4c1228e8f74ac6f24226e1e9997c1554,2024-06-25T18:50:42.040000
|
||||
CVE-2024-5806,0,0,05eca3ac8c1d3a60beb467559e1d11b02293b85393edfc15424ba5e922097af5,2024-06-26T00:15:11.293000
|
||||
CVE-2024-5810,0,0,246ea4a74a1b10a6c799aa82916b249e6dd3093a23af41d24ba222ed5e8773fa,2024-07-09T18:19:14.047000
|
||||
CVE-2024-5811,0,1,d3e3c10745e2c3778d30791400c68b545b10596257ee108655514d6181571546,2024-07-12T12:49:07.030000
|
||||
CVE-2024-5811,0,0,d3e3c10745e2c3778d30791400c68b545b10596257ee108655514d6181571546,2024-07-12T12:49:07.030000
|
||||
CVE-2024-5812,0,0,b231b6b4b2edc3b100956cc90803ec880aa99de51e5a0f50bc4b9e381c5722ed,2024-06-13T18:36:45.417000
|
||||
CVE-2024-5813,0,0,d695683c807a1777a11ef158e495934f31ab7056ebdb25d58f5f11112f2d1965,2024-06-13T18:36:45.417000
|
||||
CVE-2024-5819,0,0,ff5f9599a99761c75338a6f351d5018b6b4257daf87dc238a533c6ea2133dd27,2024-07-01T12:37:24.220000
|
||||
@ -256545,9 +256568,9 @@ CVE-2024-6013,0,0,44159fdbcbcac2a689071de339f13c4fefa84302df10ce908aefe802918d32
|
||||
CVE-2024-6014,0,0,6f42b027c41cbc2bef7f3eccd4ed3d2b0646bd4a1028da377690698f14644291,2024-06-17T12:42:04.623000
|
||||
CVE-2024-6015,0,0,b5dd732698ac918c4f9a100a042e5587c72b21ba3272e6fc136fa01311e31fdc,2024-06-17T15:15:52.830000
|
||||
CVE-2024-6016,0,0,c54c9dea249da6152524c81283c2e2c500a502b8999814b114c6434b99c2c3ed,2024-06-17T14:15:12.487000
|
||||
CVE-2024-6022,0,1,24cd03c9fcf6723524309e986cc2addb57b0569071dd40fa02ef59a2355b1c5a,2024-07-12T12:49:07.030000
|
||||
CVE-2024-6023,0,1,0fbe5d2ca782056f31cb55e3e7e649afa27f8639de55449b0e6b5b1b24eaf884,2024-07-12T12:49:07.030000
|
||||
CVE-2024-6024,0,1,b88e2f0df9a28a99795fd220e6ca891a022de9c2584d56b975e41d6c946c7cef,2024-07-12T12:49:07.030000
|
||||
CVE-2024-6022,0,0,24cd03c9fcf6723524309e986cc2addb57b0569071dd40fa02ef59a2355b1c5a,2024-07-12T12:49:07.030000
|
||||
CVE-2024-6023,0,0,0fbe5d2ca782056f31cb55e3e7e649afa27f8639de55449b0e6b5b1b24eaf884,2024-07-12T12:49:07.030000
|
||||
CVE-2024-6024,0,0,b88e2f0df9a28a99795fd220e6ca891a022de9c2584d56b975e41d6c946c7cef,2024-07-12T12:49:07.030000
|
||||
CVE-2024-6025,0,0,6a6f4c641ef7953aa26f54a1379cb5f6723776eec5081b3ea27a64b050e352aa,2024-07-11T13:05:54.930000
|
||||
CVE-2024-6026,0,0,60fff2a5646ac325d6aad31c739bf38b093d56b857eaa43edb3f4353a1b4128b,2024-07-11T15:06:33
|
||||
CVE-2024-6027,0,0,b2fd57616c7b740fff1978bda2368fdc3959192a2c78f320629b1920784145fa,2024-06-24T19:17:50.240000
|
||||
@ -256566,7 +256589,7 @@ CVE-2024-6046,0,0,91371f2b9afd0a654dc4dc6a88ac5fb04a186cb82713804dda3cac2d7733c3
|
||||
CVE-2024-6047,0,0,4cdf0f1acff12373f8f857c8d442b9de2221d44745323cc3f60bf66bccd7a239,2024-06-17T14:15:13.040000
|
||||
CVE-2024-6048,0,0,03e9485ef23720c113f11fed6c539200d9a1624e025ca24798cddf9d0c1a9e3b,2024-06-17T12:42:04.623000
|
||||
CVE-2024-6050,0,0,304778e708041d822ddb3dbacfa423baa973c842b9b5dea1cb2a29aed7ec7b6d,2024-07-01T16:37:39.040000
|
||||
CVE-2024-6052,0,1,9d100b5523a4d1cbcdb510a0143b4a10e19adddd8504e766934ce961d6d1c643,2024-07-12T13:15:21.680000
|
||||
CVE-2024-6052,0,0,9d100b5523a4d1cbcdb510a0143b4a10e19adddd8504e766934ce961d6d1c643,2024-07-12T13:15:21.680000
|
||||
CVE-2024-6054,0,0,dbd3e49036b5938301871d5a6c67ee17ba89370e3288082b00ca89a51a1f06ed,2024-06-28T13:11:58.810000
|
||||
CVE-2024-6055,0,0,7490ef4c1367b62a13fc44ec964fb12263f9fa479e5bd4bbc3820296c19002e0,2024-06-20T12:44:22.977000
|
||||
CVE-2024-6056,0,0,9210a6d5e69cda44c36495fe4964320c8f6a47f4e723a559827fc7a6d2ee595f,2024-06-20T12:44:22.977000
|
||||
@ -256634,12 +256657,12 @@ CVE-2024-6160,0,0,e0e9df11502e0f78d6d764c03981bde61fa7fdce13ce5e8e72c2edbfe56729
|
||||
CVE-2024-6161,0,0,4874ef369326f57ebaead3e865a12df6057ceb7ec30e698c3deb9b52e2b10028,2024-07-09T18:19:14.047000
|
||||
CVE-2024-6162,0,0,bd502c2e3c0167c78ca1c8188e0261103b8f8aa5eaa8e4a394c72d49dddda11b,2024-06-20T16:07:50.417000
|
||||
CVE-2024-6163,0,0,fd093a646484e49cdcba7f0d5c73f035da9d8dc2d3299e73ed2192cb6789df3d,2024-07-08T15:49:22.437000
|
||||
CVE-2024-6166,0,0,45a9bbf8d1e7aed01b7d229a0578b3d797a9f526a4ad693fe7c08afc0cc9c119,2024-07-09T18:19:14.047000
|
||||
CVE-2024-6166,0,1,c93093bf8454afe95675994fb929c06931906789a59088dfba4992e2491ed4c6,2024-07-12T14:23:53.600000
|
||||
CVE-2024-6167,0,0,53411719c1d4f7c7e0b31dcbc40822727b85ab3cd28b45158c4db6b81cb57664,2024-07-09T18:19:14.047000
|
||||
CVE-2024-6168,0,0,a9d8b124b0d612b4817eae957707544bf3f1e74cb49f5394cfd698c29b52bb54,2024-07-09T18:19:14.047000
|
||||
CVE-2024-6169,0,0,fa61ef550b8c27ad32247abf7d2a9bb2ed4e7d05d7bad1322541319dba19c447,2024-07-09T18:19:14.047000
|
||||
CVE-2024-6170,0,0,e709769450a06d799568a3a51520c34e49767de0108f463b7a39095cd5afa73d,2024-07-09T18:19:14.047000
|
||||
CVE-2024-6171,0,0,bedb42afd0eac565fbcb26ecbc69ac87a73d246280d47b85fb72f8d3efe478fb,2024-07-09T18:19:14.047000
|
||||
CVE-2024-6169,0,1,5e3e4a526f2a4d49baf3eef5dd269238928a43ddd3f433b5eb67cd5467788817,2024-07-12T14:30:07.300000
|
||||
CVE-2024-6170,0,1,ac5157d2a01994f30113ebfad64201af3c260777b3c9d326a82653d700efeb69,2024-07-12T14:20:01.013000
|
||||
CVE-2024-6171,0,1,cc3c7e2efac98c0e3bae2d0863061f06de152fc95e444a2b0790f9bcdb93cdc1,2024-07-12T14:40:02.843000
|
||||
CVE-2024-6172,0,0,772bb913ed7f683b9ada9dc0ecd54a374149383f55e758d624c0fb5be0b0bf4c,2024-07-03T18:00:01.770000
|
||||
CVE-2024-6176,0,0,855875508d6019a3b7cc5455db83c0ed155c5813092b253896702a30576b2ecb,2024-06-20T12:43:25.663000
|
||||
CVE-2024-6177,0,0,a0175799dd5324c2ac4fd3e8bb126589ce94cff0760703c070fdf39975a6cb07,2024-06-20T15:17:06.493000
|
||||
@ -256740,13 +256763,13 @@ CVE-2024-6319,0,0,a7e6ba0611df1872f885f28b22290254a0a0617427fbf4cb3644f1333e4d6a
|
||||
CVE-2024-6320,0,0,283f9bb36ccc5b92b087cc9c4a1fe708efc80654f72e1f9e7ff8264ce58552c9,2024-07-09T18:19:14.047000
|
||||
CVE-2024-6321,0,0,23af826e4693bc2738f8ec7dcb0f933eeef79b645dd2f2305f1f94359ced507d,2024-07-09T18:19:14.047000
|
||||
CVE-2024-6323,0,0,16f93962f537d8478d96317e8b0d9cad0e3aee225ed0ebdb8d6f6bf214bb804e,2024-06-28T13:15:19.317000
|
||||
CVE-2024-6328,0,1,1dc9c3c4a448080717651ebabfb2fc281b4a1c036cabba31a96124b6cb4e8cbc,2024-07-12T12:49:07.030000
|
||||
CVE-2024-6328,0,0,1dc9c3c4a448080717651ebabfb2fc281b4a1c036cabba31a96124b6cb4e8cbc,2024-07-12T12:49:07.030000
|
||||
CVE-2024-6334,0,0,3daf0dfe09252e7765ca30c739cfcc033a43a657c17c0275e173ac670504522a,2024-07-09T18:19:14.047000
|
||||
CVE-2024-6340,0,0,fd12f25a45d92fefbb8c0ec47428250f4f56bb9c686a12a52e54d86e24fec10a,2024-07-03T18:27:40.903000
|
||||
CVE-2024-6341,0,0,528f4fdde1526d72477e90a767b2f2316b168f65b64effeddb9446d8a5cdcaf5,2024-07-02T18:15:03.900000
|
||||
CVE-2024-6344,0,0,f8fe072181ab91a453822e0b523eb31f74817bc4efb68c7d2134a2d41a8e3557,2024-06-27T00:15:13.360000
|
||||
CVE-2024-6349,0,0,f01d61e3475192c945ec3639c2eda3b231a23d2f279c2f15b4719385fb2bd065,2024-06-26T15:15:20.690000
|
||||
CVE-2024-6353,0,1,3e7ee1ed054bc0661b7c1f2f3de9fe2ed8be61a7a777eee50734c66af6748302,2024-07-12T12:49:07.030000
|
||||
CVE-2024-6353,0,0,3e7ee1ed054bc0661b7c1f2f3de9fe2ed8be61a7a777eee50734c66af6748302,2024-07-12T12:49:07.030000
|
||||
CVE-2024-6354,0,0,c9410e2fdcd521ee7fa5aea0abe57bbff6ce1153eea9fc9c27ad647524c61c5c,2024-07-03T02:09:53.917000
|
||||
CVE-2024-6355,0,0,ae01fd3dff3a0136dc0dcda0f0c62bd72a4c84afe63740fbe5ae0aaceef04f3e,2024-06-27T14:15:16.753000
|
||||
CVE-2024-6363,0,0,821afe251d4d71225fc87e03c6904bf5a4c1b246a1e7e806532ba337c88c686a,2024-07-01T12:37:24.220000
|
||||
@ -256768,14 +256791,14 @@ CVE-2024-6385,0,0,5cd1b1d2bb2619e597fdfbc12061290bedb1abf1843381c16b40d3e31cd024
|
||||
CVE-2024-6387,0,0,395c005beff8f885469a6af0c5f20c1084f41c03d3787849b420e64606fd490d,2024-07-11T20:15:04.793000
|
||||
CVE-2024-6388,0,0,e641c9d869769d4291da87145b48d15b4f200c046d6b100142bc686375a84738,2024-06-27T17:11:52.390000
|
||||
CVE-2024-6391,0,0,7ce7aeffa0d0436a5dc8c66236e9fdb421bf2fd0e842089663d3cb7d1491a998,2024-07-09T18:19:14.047000
|
||||
CVE-2024-6392,0,1,f361942df6276a0c96574512bc05717f2075a1be2cafe6840357bf3e68ede92f,2024-07-12T12:49:07.030000
|
||||
CVE-2024-6396,0,1,9e4b547b4d90c33704c90a7cfe67a136b4a49a6d0168d4ba570b6960a74fd1cc,2024-07-12T12:49:07.030000
|
||||
CVE-2024-6392,0,0,f361942df6276a0c96574512bc05717f2075a1be2cafe6840357bf3e68ede92f,2024-07-12T12:49:07.030000
|
||||
CVE-2024-6396,0,0,9e4b547b4d90c33704c90a7cfe67a136b4a49a6d0168d4ba570b6960a74fd1cc,2024-07-12T12:49:07.030000
|
||||
CVE-2024-6397,0,0,ae61fbef645b31e464dc1df09257d51012f2887b082513f831eae87c43d6004d,2024-07-11T13:05:54.930000
|
||||
CVE-2024-6402,0,0,795485c4534407e246daec51c1daaa33b95f6651688fed743a8fb9054cdaedba,2024-07-01T12:37:24.220000
|
||||
CVE-2024-6403,0,0,e44b9cfa8d9ae367e624a8cdf179ef52ea1e98c2115d7a956299d17747a6a56b,2024-07-01T12:37:24.220000
|
||||
CVE-2024-6405,0,0,fdb62e3d2213e21f6cf3d269e158ee31cc07c01f1a5a460b466ccce5203f82ee,2024-07-01T12:37:24.220000
|
||||
CVE-2024-6407,0,0,ec5dc8c03230b8fa5cd2a16eef82cbc157d078945319bc360474d77e784aeadf,2024-07-11T13:05:54.930000
|
||||
CVE-2024-6409,0,0,9bc68adee8126d980e539ed0340617319811b9c1ec91d5c6d49c8bedd8ee2b95,2024-07-10T20:15:04.853000
|
||||
CVE-2024-6409,0,1,fab7fae4fd82ab978d909560d846bfc072083f4a63c41c80f20dc651384a00de,2024-07-12T14:15:16.917000
|
||||
CVE-2024-6410,0,0,9db961a9e1824a35ea4ea0ac1b25800d120aafac2e5d4caf32d46e6051ad19d3,2024-07-11T13:05:54.930000
|
||||
CVE-2024-6411,0,0,47c8df8c850420fccb0a9ac1089e4a10bdc49d8ecc38cd5ac33a449b2082a491,2024-07-11T13:05:54.930000
|
||||
CVE-2024-6414,0,0,ae0d661be5f3239fdfe6f0d08030fef27c03212dc1e12675bcf532fd90369002,2024-07-01T12:37:24.220000
|
||||
@ -256803,14 +256826,14 @@ CVE-2024-6453,0,0,f8f94ef1371b1813320fb500c8f5a2a5c78562059f37a370c24f1cfd03cdaa
|
||||
CVE-2024-6461,0,0,86a214d0c7bd3f57cea37cd567b01f1a0e55f8d4342f6c7c46fd15b8942c8d90,2024-07-03T21:15:04.580000
|
||||
CVE-2024-6463,0,0,f8d7d80ca565804c0caafdbc8214fe1eca7dc83d43861affc813af07365c0cc0,2024-07-03T21:15:04.640000
|
||||
CVE-2024-6464,0,0,8fab89d1b3aef32a257cf0d7fb909cce6ac18d5ef8dc898bb9f0cc6c52356cbf,2024-07-03T21:15:04.697000
|
||||
CVE-2024-6468,0,1,35510ca663346ec39c4261a703db141288708f1a8a294ff4bff13dfd2b2ac57d,2024-07-12T12:49:11.340000
|
||||
CVE-2024-6468,0,0,35510ca663346ec39c4261a703db141288708f1a8a294ff4bff13dfd2b2ac57d,2024-07-12T12:49:11.340000
|
||||
CVE-2024-6469,0,0,8a9cc14cdc15687cebe1f067587bd279bfc289daac6283040462018576c0d534,2024-07-05T17:09:54.870000
|
||||
CVE-2024-6470,0,0,c9a33c23ec7370c50b4df58ad71ec5e181cf8d29947a984c43804e0a58dc7723,2024-07-05T12:55:51.367000
|
||||
CVE-2024-6471,0,0,f732e100289c893532526b33b46541a39ba52ce518f7e90d2f97ec4bb67cf877,2024-07-05T12:55:51.367000
|
||||
CVE-2024-6484,0,0,cba9240284ced5de74c21cc40946944876e4dc7df9d2e95304ac35d4888612df,2024-07-11T18:09:58.777000
|
||||
CVE-2024-6485,0,0,09d622a0c981ab86c7d4270d8e13e5e5860abdf7e8113c369ff0eae7e7c8ae78,2024-07-11T18:09:58.777000
|
||||
CVE-2024-6488,0,0,0c5ecb49d7296b409f5d61bd70a5d017ad6f69068345855a00f0bd7c78566faa,2024-07-04T21:15:10.403000
|
||||
CVE-2024-6495,1,1,ce08d868d93fff5fade78fbc5efcd1cdbc7e1995b89e2a10591d0130a562c1c1,2024-07-12T13:15:21.770000
|
||||
CVE-2024-6495,0,0,ce08d868d93fff5fade78fbc5efcd1cdbc7e1995b89e2a10591d0130a562c1c1,2024-07-12T13:15:21.770000
|
||||
CVE-2024-6501,0,0,45d58d6fcd90c3b83531e796541078a549af17f7a81eb1fbfe7d6944aa2bc8ac,2024-07-11T13:06:13.187000
|
||||
CVE-2024-6505,0,0,b8708084cd092b6ca88acb18ad5e80f748f8e2829ec040b8958bfe3c1fee2cd6,2024-07-08T15:41:17.883000
|
||||
CVE-2024-6506,0,0,58310ca3e68e3dacb16dafd9b32db187bdf111a88d3da008267c8c84bbec48d6,2024-07-05T12:55:51.367000
|
||||
@ -256823,16 +256846,16 @@ CVE-2024-6525,0,0,2f0f70f02d7062f0146f492a65f00de0208bb8c01fafafd0c2d5a6e3d243b9
|
||||
CVE-2024-6526,0,0,0395771cb83da3c31d3258df800a7adc493a41c6b23cd6248bbb973fb8ab4b56,2024-07-08T15:39:08.840000
|
||||
CVE-2024-6527,0,0,2c04959f5b432bf9c2410a6022a228031cfde40b22a03fde53771eb44766b4c1,2024-07-09T18:19:14.047000
|
||||
CVE-2024-6528,0,0,eadd6f4f4be8f81226626302b00f66ebfbebf71ded08e8d23278bcc971f84701,2024-07-11T13:05:54.930000
|
||||
CVE-2024-6531,0,1,1125a21608be8cb0502ea86867294670584ed16918c5bd752fdbbd37969404b8,2024-07-12T12:49:11.340000
|
||||
CVE-2024-6531,0,0,1125a21608be8cb0502ea86867294670584ed16918c5bd752fdbbd37969404b8,2024-07-12T12:49:11.340000
|
||||
CVE-2024-6539,0,0,81a7a773476044a536e1904849aff55df114add8144e8265b917f8120b92d867,2024-07-11T14:56:20.733000
|
||||
CVE-2024-6550,0,0,6c4bb046e65a00df1f67c81af4edc0fc3847fdca60c1beea606bf943b5851318,2024-07-11T13:05:54.930000
|
||||
CVE-2024-6554,0,0,53d6bb38e6051e6443dd433cc7e20c95847a1e5fb1ebe77ae646383c547abeb7,2024-07-11T13:05:54.930000
|
||||
CVE-2024-6555,0,1,bf68ef8f1bd3876021fc33b504457daba53832080530806ef27f797ea5536a0b,2024-07-12T12:49:07.030000
|
||||
CVE-2024-6555,0,0,bf68ef8f1bd3876021fc33b504457daba53832080530806ef27f797ea5536a0b,2024-07-12T12:49:07.030000
|
||||
CVE-2024-6556,0,0,246920c1b32eb0a0369982110178f9a30464427865e75d42710950bf8d6bff6c,2024-07-11T13:05:54.930000
|
||||
CVE-2024-6563,0,0,1b4d88909a8afd884220e1df693026407578c717bcca7ba5cdd4e0bbbf29fb3c,2024-07-09T14:19:19.300000
|
||||
CVE-2024-6564,0,0,b381c943e4dc87d72df0560a8008d835d4542fba3e8b6a3b21a1beca0e3a3fa5,2024-07-09T14:19:14.760000
|
||||
CVE-2024-6580,0,0,d43dfa58651574c4447e8f323f3cb1f6a00d6bdef0613d5834aefccecf968c5d,2024-07-09T18:19:14.047000
|
||||
CVE-2024-6588,0,1,67672e854c20766f2e15151fa1e111ec8310b7083a57f535c99159d2ce6e5af7,2024-07-12T12:49:07.030000
|
||||
CVE-2024-6588,0,0,67672e854c20766f2e15151fa1e111ec8310b7083a57f535c99159d2ce6e5af7,2024-07-12T12:49:07.030000
|
||||
CVE-2024-6598,0,0,2f02553b1031751a689c5bf3f9b99ef5078ca790db273edd82a84af9b7d8dd36,2024-07-09T18:19:14.047000
|
||||
CVE-2024-6600,0,0,ec760b3dcbbd1d45d7d375ec69590e9486042d86ace386dac9df16cb2b0ef0ec,2024-07-09T18:19:14.047000
|
||||
CVE-2024-6601,0,0,c2d93bb90c2cb6274c0c6af67f4e9d274133dcf51e2d79042eff7154f333742d,2024-07-09T18:19:14.047000
|
||||
@ -256851,7 +256874,7 @@ CVE-2024-6613,0,0,1044faeab37e5e6a281bf238170e48cbf6d6c882aa1c2ca89983ecc271027c
|
||||
CVE-2024-6614,0,0,4bab9d3e1891f10867b2f4d5e4a2817e40eb603b99a7dab59e27fb07817b5d0c,2024-07-09T18:18:38.713000
|
||||
CVE-2024-6615,0,0,51ee5ed3b9bac56f9be4d0a991ad4a60e35d63343d0ef008dc875e1c3fdef69f,2024-07-09T18:18:38.713000
|
||||
CVE-2024-6624,0,0,c2de4aca43896e5a4f3fa2eb32cc5d95854c9fbc5a7dd63da39148664088c2b9,2024-07-11T13:05:54.930000
|
||||
CVE-2024-6625,0,1,b913737eefce9f28c47dc537f0edd398b1eeb297cd2eb30c69b59c3401317130,2024-07-12T12:49:07.030000
|
||||
CVE-2024-6625,0,0,b913737eefce9f28c47dc537f0edd398b1eeb297cd2eb30c69b59c3401317130,2024-07-12T12:49:07.030000
|
||||
CVE-2024-6630,0,0,7742b604143993a9d769b9ab9c3e5aab85337a51e6772bb186961af80d29fee2,2024-07-10T18:15:05.407000
|
||||
CVE-2024-6642,0,0,8d96c1180af1047f7b667e53dd25106a95583c9fef6033b783f527ef0b9e4e6b,2024-07-10T13:15:11.140000
|
||||
CVE-2024-6643,0,0,c4eab211147138bb5613809a885f81bacb4eb0fc3c1e7955b1f331b632c0ef4a,2024-07-11T10:15:02.650000
|
||||
@ -256867,7 +256890,7 @@ CVE-2024-6663,0,0,7facb2637e12709d4a455340194f194dba2537cb44d31c2262ed1aa6b9ebcf
|
||||
CVE-2024-6664,0,0,7dcdbd9efac1143da422ef778b0a605b2e75ff3874c65ca5b8e519e1d8523278,2024-07-10T21:15:11.520000
|
||||
CVE-2024-6666,0,0,6ba5e83c4c8007c7f2945dcbaee49cd53299747e7c829220281020263e99c21e,2024-07-11T13:05:54.930000
|
||||
CVE-2024-6676,0,0,b617e99f4ff839e117300b1a5f3c494dc1ceb13864a576e2b1519c7ec5960d34,2024-07-11T13:05:54.930000
|
||||
CVE-2024-6677,0,1,d8004a1441e952f05633a34727a4f9223ac5077c2123fd1507a1955287de18f3,2024-07-12T12:49:07.030000
|
||||
CVE-2024-6677,0,0,d8004a1441e952f05633a34727a4f9223ac5077c2123fd1507a1955287de18f3,2024-07-12T12:49:07.030000
|
||||
CVE-2024-6679,0,0,54c74b205d1f37c5305b3fb942833238d29bd46163160c5a253ae1986ffc1b20,2024-07-11T18:09:58.777000
|
||||
CVE-2024-6680,0,0,5df9c8bd2f5ef07e0f9498e4d782d800510118ccdb6a5e8bbb9184a28075c46e,2024-07-11T18:09:58.777000
|
||||
CVE-2024-6681,0,0,574eb73a3342a616fc23bf7f4801361965b6fb573fef8b2ccb7116fa0a08c814,2024-07-11T18:09:58.777000
|
||||
|
Can't render this file because it is too large.
|
Loading…
x
Reference in New Issue
Block a user