Auto-Update: 2024-07-12T16:00:17.941069+00:00

This commit is contained in:
cad-safe-bot 2024-07-12 16:03:11 +00:00
parent 0d4c5c6ecc
commit 7fca3af5f3
63 changed files with 3357 additions and 376 deletions

View File

@ -2,8 +2,9 @@
"id": "CVE-2021-41037",
"sourceIdentifier": "emo@eclipse.org",
"published": "2022-07-08T04:15:13.833",
"lastModified": "2022-07-15T22:38:02.777",
"vulnStatus": "Analyzed",
"lastModified": "2024-07-12T14:15:10.960",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
"lang": "en",
@ -41,20 +42,20 @@
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:L",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW",
"baseScore": 5.5,
"baseSeverity": "MEDIUM"
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "CHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 10.0,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 2.1,
"impactScore": 3.4
"exploitabilityScore": 3.9,
"impactScore": 6.0
}
],
"cvssMetricV2": [
@ -131,6 +132,10 @@
"Mailing List",
"Vendor Advisory"
]
},
{
"url": "https://github.com/eclipse-equinox/p2/issues/235",
"source": "emo@eclipse.org"
}
]
}

View File

@ -2,8 +2,9 @@
"id": "CVE-2023-3568",
"sourceIdentifier": "security@huntr.dev",
"published": "2023-07-10T16:15:56.450",
"lastModified": "2023-08-02T09:15:14.110",
"vulnStatus": "Modified",
"lastModified": "2024-07-12T14:17:46.530",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
"lang": "en",
@ -97,11 +98,17 @@
"references": [
{
"url": "https://github.com/alextselegidis/easyappointments/commit/b37b46019553089db4f22eb2fe998bca84b2cb64",
"source": "security@huntr.dev"
"source": "security@huntr.dev",
"tags": [
"Not Applicable"
]
},
{
"url": "https://huntr.dev/bounties/e8d530db-a6a7-4f79-a95d-b77654cc04f8",
"source": "security@huntr.dev"
"source": "security@huntr.dev",
"tags": [
"Not Applicable"
]
}
]
}

View File

@ -2,8 +2,16 @@
"id": "CVE-2023-36091",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-07-31T14:15:10.583",
"lastModified": "2024-05-17T02:25:36.197",
"lastModified": "2024-07-12T15:15:10.333",
"vulnStatus": "Modified",
"cveTags": [
{
"sourceIdentifier": "cve@mitre.org",
"tags": [
"unsupported-when-assigned"
]
}
],
"descriptions": [
{
"lang": "en",

View File

@ -2,17 +2,41 @@
"id": "CVE-2024-27360",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-07-09T18:15:09.370",
"lastModified": "2024-07-09T18:18:38.713",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-07-12T14:57:53.930",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability was discovered in Samsung Mobile Processors Exynos 850, Exynos 1080, Exynos 2100, Exynos 2200, Exynos 1280, Exynos 1380, Exynos 1330, and Exynos W930 where they do not properly check length of the data, which can lead to a Denial of Service."
},
{
"lang": "es",
"value": "Se descubri\u00f3 una vulnerabilidad en los procesadores m\u00f3viles Samsung Exynos 850, Exynos 1080, Exynos 2100, Exynos 2200, Exynos 1280, Exynos 1380, Exynos 1330 y Exynos W930 donde no verifican adecuadamente la longitud de los datos, lo que puede provocar una denegaci\u00f3n de Servicio."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
},
{
"source": "cve@mitre.org",
"type": "Secondary",
@ -35,14 +59,250 @@
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-1284"
}
]
}
],
"configurations": [
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:samsung:exynos_850_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "1928760C-4FC4-45B0-84FF-C1105CD1DD2A"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:samsung:exynos_850:-:*:*:*:*:*:*:*",
"matchCriteriaId": "BB410A6D-642B-49AE-8B1C-EADA953A84DA"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:samsung:exynos_1080_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "43DE4D6F-D662-46F2-93BC-9AE950320BDE"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:samsung:exynos_1080:-:*:*:*:*:*:*:*",
"matchCriteriaId": "EE06CD56-8BFD-4208-843A-179E3E6F5C10"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:samsung:exynos_2100_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "89B88BFE-3C82-498C-8EC1-5784836DB1A1"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:samsung:exynos_2100:-:*:*:*:*:*:*:*",
"matchCriteriaId": "9385885D-654A-496E-8029-7C6D9B077193"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:samsung:exynos_2200_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "63C0D9AC-BD23-48C9-83E7-301DEC06E583"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:samsung:exynos_2200:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A72ADEBB-ED72-4A5B-BB27-95EDE43F8116"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:samsung:exynos_1280_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "BD1A7B09-9031-4E54-A24F-3237C054166B"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:samsung:exynos_1280:-:*:*:*:*:*:*:*",
"matchCriteriaId": "DFC68046-2F08-40D1-B158-89D8D9263541"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:samsung:exynos_1380_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D381478B-C638-4663-BD71-144BE4B02E46"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:samsung:exynos_1380:-:*:*:*:*:*:*:*",
"matchCriteriaId": "61E72146-72FE-4B54-AB79-3C665E7F016C"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:samsung:exynos_1330_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C2635646-DD6A-4735-8E01-F45445584832"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:samsung:exynos_1330:-:*:*:*:*:*:*:*",
"matchCriteriaId": "AA0F8A58-71B7-4503-A03A-6FB4282D75BD"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:samsung:exynos_w930_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "801E188F-C71B-4933-9099-151A4A1B1BC5"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:samsung:exynos_w930:-:*:*:*:*:*:*:*",
"matchCriteriaId": "8D8FC82D-57C5-4F00-BDF4-4261A32C4246"
}
]
}
]
}
],
"references": [
{
"url": "https://semiconductor.samsung.com/support/quality-support/product-security-updates/",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://semiconductor.samsung.com/support/quality-support/product-security-updates/cve-2024-27360/",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,17 +2,41 @@
"id": "CVE-2024-27362",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-07-09T18:15:09.573",
"lastModified": "2024-07-09T18:18:38.713",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-07-12T14:58:02.413",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability was discovered in Samsung Mobile Processors Exynos 1280, Exynos 2200, Exynos 1330, Exynos 1380, and Exynos 2400 where they do not properly check the length of the data, which can lead to a Information disclosure."
},
{
"lang": "es",
"value": "Se descubri\u00f3 una vulnerabilidad en los procesadores m\u00f3viles Samsung Exynos 1280, Exynos 2200, Exynos 1330, Exynos 1380 y Exynos 2400 donde no verifican adecuadamente la longitud de los datos, lo que puede llevar a una divulgaci\u00f3n de informaci\u00f3n."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 7.5,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
},
{
"source": "cve@mitre.org",
"type": "Secondary",
@ -35,14 +59,169 @@
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-1284"
}
]
}
],
"configurations": [
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:samsung:exynos_1280_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "BD1A7B09-9031-4E54-A24F-3237C054166B"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:samsung:exynos_1280:-:*:*:*:*:*:*:*",
"matchCriteriaId": "DFC68046-2F08-40D1-B158-89D8D9263541"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:samsung:exynos_2200_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "63C0D9AC-BD23-48C9-83E7-301DEC06E583"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:samsung:exynos_2200:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A72ADEBB-ED72-4A5B-BB27-95EDE43F8116"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:samsung:exynos_1330_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C2635646-DD6A-4735-8E01-F45445584832"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:samsung:exynos_1330:-:*:*:*:*:*:*:*",
"matchCriteriaId": "AA0F8A58-71B7-4503-A03A-6FB4282D75BD"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:samsung:exynos_1380_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D381478B-C638-4663-BD71-144BE4B02E46"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:samsung:exynos_1380:-:*:*:*:*:*:*:*",
"matchCriteriaId": "61E72146-72FE-4B54-AB79-3C665E7F016C"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:samsung:exynos_2400_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "16D9272E-1794-48FF-B6A4-8F48395BA38E"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:samsung:exynos_2400:-:*:*:*:*:*:*:*",
"matchCriteriaId": "932F5FB3-5527-44D7-9DD9-EF03963E3CA3"
}
]
}
]
}
],
"references": [
{
"url": "https://semiconductor.samsung.com/support/quality-support/product-security-updates/",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://semiconductor.samsung.com/support/quality-support/product-security-updates/cve-2024-27362/",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,17 +2,41 @@
"id": "CVE-2024-28067",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-07-09T18:15:09.790",
"lastModified": "2024-07-09T18:18:38.713",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-07-12T14:57:36.897",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability in Samsung Exynos Modem 5300 allows a Man-in-the-Middle (MITM) attacker to downgrade the security mode of packets going to the victim, enabling the attacker to send messages to the victim in plaintext."
},
{
"lang": "es",
"value": "Una vulnerabilidad en Samsung Exynos Modem 5300 permite a un atacante Man-in-the-Middle (MITM) degradar el modo de seguridad de los paquetes que van a la v\u00edctima, lo que le permite enviar mensajes a la v\u00edctima en texto plano."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "HIGH",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 3.7,
"baseSeverity": "LOW"
},
"exploitabilityScore": 2.2,
"impactScore": 1.4
},
{
"source": "cve@mitre.org",
"type": "Secondary",
@ -35,14 +59,61 @@
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
}
],
"configurations": [
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:samsung:exynos_modem_5300_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "4F66A096-7BA3-47D6-98F4-879C3A4C1FFC"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:samsung:exynos_modem_5300:-:*:*:*:*:*:*:*",
"matchCriteriaId": "CE202894-D48A-4B9E-B3BD-28529967A0B3"
}
]
}
]
}
],
"references": [
{
"url": "https://semiconductor.samsung.com/support/quality-support/product-security-updates/",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://semiconductor.samsung.com/support/quality-support/product-security-updates/cve-2024-28067/",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,17 +2,41 @@
"id": "CVE-2024-31957",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-07-09T18:15:10.013",
"lastModified": "2024-07-09T18:18:38.713",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-07-12T14:53:30.260",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability was discovered in Samsung Mobile Processors Exynos 2200 and Exynos 2400 where they lack a check for the validation of native handles, which can result in a DoS(Denial of Service) attack by unmapping an invalid length."
},
{
"lang": "es",
"value": "Se descubri\u00f3 una vulnerabilidad en los procesadores m\u00f3viles Samsung Exynos 2200 y Exynos 2400 donde carecen de una verificaci\u00f3n para la validaci\u00f3n de identificadores nativos, lo que puede resultar en un ataque DoS (denegaci\u00f3n de servicio) al desasignar una longitud no v\u00e1lida."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
},
{
"source": "cve@mitre.org",
"type": "Secondary",
@ -35,14 +59,88 @@
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-1284"
}
]
}
],
"configurations": [
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:samsung:exynos_2200_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "63C0D9AC-BD23-48C9-83E7-301DEC06E583"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:samsung:exynos_2200:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A72ADEBB-ED72-4A5B-BB27-95EDE43F8116"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:samsung:exynos_2400_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "16D9272E-1794-48FF-B6A4-8F48395BA38E"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:samsung:exynos_2400:-:*:*:*:*:*:*:*",
"matchCriteriaId": "932F5FB3-5527-44D7-9DD9-EF03963E3CA3"
}
]
}
]
}
],
"references": [
{
"url": "https://semiconductor.samsung.com/support/quality-support/product-security-updates/",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://semiconductor.samsung.com/support/quality-support/product-security-updates/cve-2024-31957/",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2024-35773",
"sourceIdentifier": "audit@patchstack.com",
"published": "2024-07-12T14:15:11.437",
"lastModified": "2024-07-12T14:15:11.437",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Cross-Site Request Forgery (CSRF) vulnerability in WPJohnny, zerOneIT Comment Reply Email allows Cross-Site Scripting (XSS).This issue affects Comment Reply Email: from n/a through 1.3."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "audit@patchstack.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW",
"baseScore": 7.1,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 3.7
}
]
},
"weaknesses": [
{
"source": "audit@patchstack.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-352"
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/vulnerability/comment-reply-email/wordpress-comment-reply-email-plugin-1-3-csrf-to-stored-xss-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-36387",
"sourceIdentifier": "security@apache.org",
"published": "2024-07-01T19:15:03.497",
"lastModified": "2024-07-02T12:09:16.907",
"lastModified": "2024-07-12T14:15:11.670",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
@ -32,6 +32,10 @@
{
"url": "https://httpd.apache.org/security/vulnerabilities_24.html",
"source": "security@apache.org"
},
{
"url": "https://security.netapp.com/advisory/ntap-20240712-0001/",
"source": "security@apache.org"
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-36522",
"sourceIdentifier": "security@apache.org",
"published": "2024-07-12T13:15:11.867",
"lastModified": "2024-07-12T13:15:11.867",
"lastModified": "2024-07-12T14:15:11.987",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
@ -25,6 +25,10 @@
}
],
"references": [
{
"url": "http://www.openwall.com/lists/oss-security/2024/07/12/2",
"source": "security@apache.org"
},
{
"url": "https://lists.apache.org/thread/w613qh7yors840pbx00l1pq6wkl9jzkc",
"source": "security@apache.org"

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2024-37202",
"sourceIdentifier": "audit@patchstack.com",
"published": "2024-07-12T14:15:12.063",
"lastModified": "2024-07-12T14:15:12.063",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Missing Authorization vulnerability in BinaryCarpenter Ultimate Custom Add To Cart Button (Ajax) For WooCommerce by Binary Carpenter allows Cross-Site Scripting (XSS).This issue affects Ultimate Custom Add To Cart Button (Ajax) For WooCommerce by Binary Carpenter: from n/a through 1.222.16."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "audit@patchstack.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW",
"baseScore": 6.5,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.3,
"impactScore": 3.7
}
]
},
"weaknesses": [
{
"source": "audit@patchstack.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-862"
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/vulnerability/custom-add-to-cart-button-for-woocommerce/wordpress-ultimate-custom-add-to-cart-button-ajax-for-woocommerce-by-binary-carpenter-plugin-1-222-16-broken-access-control-to-xss-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2024-37213",
"sourceIdentifier": "audit@patchstack.com",
"published": "2024-07-12T14:15:12.293",
"lastModified": "2024-07-12T14:15:12.293",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Cross-Site Request Forgery (CSRF) vulnerability in Ali2Woo Team Ali2Woo Lite allows Cross-Site Scripting (XSS).This issue affects Ali2Woo Lite: from n/a through 3.3.9."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "audit@patchstack.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW",
"baseScore": 7.1,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 3.7
}
]
},
"weaknesses": [
{
"source": "audit@patchstack.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-352"
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/vulnerability/ali2woo-lite/wordpress-aliexpress-dropshipping-with-alinext-lite-plugin-3-3-5-csrf-to-xss-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2024-37544",
"sourceIdentifier": "audit@patchstack.com",
"published": "2024-07-12T14:15:12.540",
"lastModified": "2024-07-12T14:15:12.540",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Missing Authorization vulnerability in Tobias Conrad Get Better Reviews for WooCommerce.This issue affects Get Better Reviews for WooCommerce: from n/a through 4.0.6."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "audit@patchstack.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 1.4
}
]
},
"weaknesses": [
{
"source": "audit@patchstack.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-862"
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/vulnerability/more-better-reviews-for-woocommerce/wordpress-get-better-reviews-for-woocommerce-plugin-4-0-6-broken-access-control-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-37547",
"sourceIdentifier": "audit@patchstack.com",
"published": "2024-07-06T15:15:10.500",
"lastModified": "2024-07-08T15:49:22.437",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-07-12T15:29:59.473",
"vulnStatus": "Undergoing Analysis",
"cveTags": [],
"descriptions": [
{
@ -17,6 +17,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 7.5,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
},
{
"source": "audit@patchstack.com",
"type": "Secondary",
@ -51,10 +71,31 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:livemesh:elementor_addons:*:*:*:*:*:wordpress:*:*",
"versionEndExcluding": "8.4.1",
"matchCriteriaId": "89A9C790-94DB-4AFD-84F7-B6829A83C9D2"
}
]
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/vulnerability/addons-for-elementor/wordpress-elementor-addons-by-livemesh-plugin-8-3-7-local-file-inclusion-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
"source": "audit@patchstack.com",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-37553",
"sourceIdentifier": "audit@patchstack.com",
"published": "2024-07-06T16:15:02.023",
"lastModified": "2024-07-08T15:49:22.437",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-07-12T15:24:47.953",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -17,6 +17,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 5.4,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.3,
"impactScore": 2.7
},
{
"source": "audit@patchstack.com",
"type": "Secondary",
@ -51,10 +71,31 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:axelerant:testimonials_widget:*:*:*:*:*:wordpress:*:*",
"versionEndIncluding": "4.0.4",
"matchCriteriaId": "82036303-703C-4012-8F23-D3EDED119C41"
}
]
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/vulnerability/testimonials-widget/wordpress-testimonials-widget-plugin-4-0-4-cross-site-scripting-xss-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
"source": "audit@patchstack.com",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-37554",
"sourceIdentifier": "audit@patchstack.com",
"published": "2024-07-06T17:15:09.890",
"lastModified": "2024-07-08T15:49:22.437",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-07-12T15:34:57.437",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -17,6 +17,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 5.4,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.3,
"impactScore": 2.7
},
{
"source": "audit@patchstack.com",
"type": "Secondary",
@ -51,10 +71,31 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:codeastrology:ultraaddons:*:*:*:*:*:*:*:*",
"versionEndIncluding": "1.1.6",
"matchCriteriaId": "B920BDC0-CED3-42C2-BBC7-77C2123596AB"
}
]
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/vulnerability/ultraaddons-elementor-lite/wordpress-ultraaddons-elementor-addons-header-footer-builder-custom-font-custom-css-woo-widget-menu-builder-anywhere-elementor-shortcode-plugin-1-1-6-cross-site-scripting-xss-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
"source": "audit@patchstack.com",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2024-37560",
"sourceIdentifier": "audit@patchstack.com",
"published": "2024-07-12T14:15:12.770",
"lastModified": "2024-07-12T14:15:12.770",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Improper Privilege Management vulnerability in IqbalRony WP User Switch allows Privilege Escalation.This issue affects WP User Switch: from n/a through 1.1.0."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "audit@patchstack.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.0,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.1,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "audit@patchstack.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-269"
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/vulnerability/wp-user-switch/wordpress-wp-user-switch-plugin-1-0-5-privilege-escalation-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2024-37564",
"sourceIdentifier": "audit@patchstack.com",
"published": "2024-07-12T14:15:13.000",
"lastModified": "2024-07-12T14:15:13.000",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in PayPlus LTD PayPlus Payment Gateway.This issue affects PayPlus Payment Gateway: from n/a through 7.0.7."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "audit@patchstack.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:L",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "CHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "LOW",
"baseScore": 8.5,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 3.1,
"impactScore": 4.7
}
]
},
"weaknesses": [
{
"source": "audit@patchstack.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-89"
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/vulnerability/payplus-payment-gateway/wordpress-payplus-payment-gateway-plugin-7-0-7-sql-injection-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2024-37927",
"sourceIdentifier": "audit@patchstack.com",
"published": "2024-07-12T14:15:13.237",
"lastModified": "2024-07-12T14:15:13.237",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Improper Privilege Management vulnerability in NooTheme Jobmonster allows Privilege Escalation.This issue affects Jobmonster: from n/a through 4.7.0."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "audit@patchstack.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "audit@patchstack.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-269"
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/vulnerability/noo-jobmonster/wordpress-jobmonster-theme-4-7-0-unauthenticated-privilege-escalation-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2024-37928",
"sourceIdentifier": "audit@patchstack.com",
"published": "2024-07-12T14:15:13.463",
"lastModified": "2024-07-12T14:15:13.463",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability in NooTheme Jobmonster allows File Manipulation.This issue affects Jobmonster: from n/a through 4.7.0."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "audit@patchstack.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "CHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH",
"baseScore": 8.6,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 4.0
}
]
},
"weaknesses": [
{
"source": "audit@patchstack.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-22"
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/vulnerability/noo-jobmonster/wordpress-jobmonster-theme-4-7-0-unauthenticated-arbitrary-file-deletion-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2024-37932",
"sourceIdentifier": "audit@patchstack.com",
"published": "2024-07-12T14:15:13.717",
"lastModified": "2024-07-12T14:15:13.717",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability in anhvnit Woocommerce OpenPos allows File Manipulation.This issue affects Woocommerce OpenPos: from n/a through 6.4.4."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "audit@patchstack.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "CHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH",
"baseScore": 8.6,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 4.0
}
]
},
"weaknesses": [
{
"source": "audit@patchstack.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-22"
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/vulnerability/woocommerce-openpos/wordpress-woocommerce-openpos-plugin-6-4-4-unauthenticated-arbitrary-file-deletion-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2024-37933",
"sourceIdentifier": "audit@patchstack.com",
"published": "2024-07-12T14:15:13.943",
"lastModified": "2024-07-12T14:15:13.943",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in anhvnit Woocommerce OpenPos.This issue affects Woocommerce OpenPos: from n/a through 6.4.4."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "audit@patchstack.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:L",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "CHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "LOW",
"baseScore": 9.3,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.9,
"impactScore": 4.7
}
]
},
"weaknesses": [
{
"source": "audit@patchstack.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-89"
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/vulnerability/woocommerce-openpos/wordpress-woocommerce-openpos-plugin-6-4-4-unauthenticated-sql-injection-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2024-37938",
"sourceIdentifier": "audit@patchstack.com",
"published": "2024-07-12T14:15:14.167",
"lastModified": "2024-07-12T14:15:14.167",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Cross-Site Request Forgery (CSRF) vulnerability in MyThemeShop SociallyViral.This issue affects SociallyViral: from n/a through 1.0.10."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "audit@patchstack.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 1.4
}
]
},
"weaknesses": [
{
"source": "audit@patchstack.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-352"
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/vulnerability/sociallyviral/wordpress-sociallyviral-theme-1-0-10-cross-site-request-forgery-csrf-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2024-37939",
"sourceIdentifier": "audit@patchstack.com",
"published": "2024-07-12T14:15:14.380",
"lastModified": "2024-07-12T14:15:14.380",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Cross-Site Request Forgery (CSRF) vulnerability in VolThemes Patricia Lite.This issue affects Patricia Lite: from n/a through 1.2.3."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "audit@patchstack.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 1.4
}
]
},
"weaknesses": [
{
"source": "audit@patchstack.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-352"
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/vulnerability/patricia-lite/wordpress-patricia-lite-theme-1-2-3-cross-site-request-forgery-csrf-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2024-37940",
"sourceIdentifier": "audit@patchstack.com",
"published": "2024-07-12T14:15:14.600",
"lastModified": "2024-07-12T14:15:14.600",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Cross-Site Request Forgery (CSRF) vulnerability in Seraphinite Solutions Seraphinite Accelerator (Full, premium).This issue affects Seraphinite Accelerator (Full, premium): from n/a through 2.21.13."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "audit@patchstack.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:N/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH",
"baseScore": 7.4,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 4.0
}
]
},
"weaknesses": [
{
"source": "audit@patchstack.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-352"
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/vulnerability/seraphinite-accelerator-ext/wordpress-seraphinite-accelerator-full-premium-plugin-2-21-13-csrf-leading-to-arbitrary-file-deletion-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2024-37941",
"sourceIdentifier": "audit@patchstack.com",
"published": "2024-07-12T14:15:14.817",
"lastModified": "2024-07-12T14:15:14.817",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Cross-Site Request Forgery (CSRF) vulnerability in Internal Link Juicer Internal Link Juicer: SEO Auto Linker for WordPress.This issue affects Internal Link Juicer: SEO Auto Linker for WordPress: from n/a through 2.24.3."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "audit@patchstack.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 1.4
}
]
},
"weaknesses": [
{
"source": "audit@patchstack.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-352"
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/vulnerability/internal-links/wordpress-internal-link-juicer-seo-auto-linker-for-wordpress-plugin-2-24-3-cross-site-request-forgery-csrf-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
}
]
}

View File

@ -2,13 +2,17 @@
"id": "CVE-2024-38085",
"sourceIdentifier": "secure@microsoft.com",
"published": "2024-07-09T17:15:44.080",
"lastModified": "2024-07-09T18:18:38.713",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-07-12T15:46:00.290",
"vulnStatus": "Undergoing Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Windows Graphics Component Elevation of Privilege Vulnerability"
},
{
"lang": "es",
"value": "Vulnerabilidad de elevaci\u00f3n de privilegios de Windows Graphics Component"
}
],
"metrics": {
@ -36,6 +40,16 @@
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
},
{
"source": "secure@microsoft.com",
"type": "Secondary",
@ -47,10 +61,123 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:*:*",
"versionEndExcluding": "10.0.10240.20710",
"matchCriteriaId": "B7482622-F4B1-4086-8484-136592BAACCE"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:*:*",
"versionEndExcluding": "10.0.14393.7159",
"matchCriteriaId": "BEEE46C5-718B-43C5-8B06-A4CB2E0DEF7A"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:*:*",
"versionEndExcluding": "10.0.17763.6054",
"matchCriteriaId": "3EE3B092-248B-4F68-AA13-DF4FB2E0DA3F"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:*:*",
"versionEndExcluding": "10.0.19044.4651",
"matchCriteriaId": "905A0D97-FCF2-4999-A3F3-C79D88511D52"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:*:*",
"versionEndExcluding": "10.0.19045.4651",
"matchCriteriaId": "2DEB25D6-2E73-4DF4-9D7D-2C9780101B1B"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_11_21h2:*:*:*:*:*:*:*:*",
"versionEndExcluding": "10.0.22000.3079",
"matchCriteriaId": "1F4C0A5A-B376-4DE8-A02A-5E341825AAAB"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*:*:*",
"versionEndExcluding": "10.0.22621.3880",
"matchCriteriaId": "A2B9B3F1-347C-4935-BFA9-6B4191831D28"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_11_23h2:*:*:*:*:*:*:*:*",
"versionEndExcluding": "10.0.22621.3880",
"matchCriteriaId": "29AB4D70-37A2-4A7E-9326-79E2EF762B02"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:x64:*",
"matchCriteriaId": "2127D10C-B6F3-4C1D-B9AA-5D78513CC996"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:x86:*",
"matchCriteriaId": "AB425562-C0A0-452E-AABE-F70522F15E1A"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:*:*",
"matchCriteriaId": "2ACA9287-B475-4AF7-A4DA-A7143CEF9E57"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A7DF96F8-BA6A-4780-9CA3-F719B3F81074"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*",
"matchCriteriaId": "DB18C4CE-5917-401E-ACF7-2747084FD36E"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:*",
"versionEndExcluding": "10.0.14393.7159",
"matchCriteriaId": "59C9A2A5-AE44-4583-A7B1-B8D62B0E83BB"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*",
"versionEndExcluding": "10.0.17763.6054",
"matchCriteriaId": "3401E6F7-2430-4247-8A22-0B733A03501A"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_server_2022:*:*:*:*:*:*:*:*",
"versionEndExcluding": "10.0.20348.2582",
"matchCriteriaId": "4E433A09-F730-4EBE-8050-8789755B0D35"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_server_2022_23h2:*:*:*:*:*:*:*:*",
"versionEndExcluding": "10.0.25398.1009",
"matchCriteriaId": "EDA01A4A-9AED-484A-8B10-3282FA13F635"
}
]
}
]
}
],
"references": [
{
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38085",
"source": "secure@microsoft.com"
"source": "secure@microsoft.com",
"tags": [
"Patch",
"Vendor Advisory"
]
}
]
}

View File

@ -2,13 +2,17 @@
"id": "CVE-2024-38086",
"sourceIdentifier": "secure@microsoft.com",
"published": "2024-07-09T17:15:44.373",
"lastModified": "2024-07-09T18:18:38.713",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-07-12T15:45:05.137",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Azure Kinect SDK Remote Code Execution Vulnerability"
},
{
"lang": "es",
"value": "Vulnerabilidad de ejecuci\u00f3n remota de c\u00f3digo de Azure Kinect SDK"
}
],
"metrics": {
@ -36,6 +40,16 @@
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
},
{
"source": "secure@microsoft.com",
"type": "Secondary",
@ -47,10 +61,32 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:microsoft:azure_kinect_software_development_kit:*:*:*:*:*:*:*:*",
"versionEndExcluding": "1.4.2",
"matchCriteriaId": "E611CA1D-86D0-4CB9-9689-270982E28E0E"
}
]
}
]
}
],
"references": [
{
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38086",
"source": "secure@microsoft.com"
"source": "secure@microsoft.com",
"tags": [
"Patch",
"Vendor Advisory"
]
}
]
}

View File

@ -2,20 +2,44 @@
"id": "CVE-2024-38089",
"sourceIdentifier": "secure@microsoft.com",
"published": "2024-07-09T17:15:45.170",
"lastModified": "2024-07-09T18:18:38.713",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-07-12T15:42:39.127",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Microsoft Defender for IoT Elevation of Privilege Vulnerability"
},
{
"lang": "es",
"value": "Vulnerabilidad de elevaci\u00f3n de privilegios de Microsoft Defender para IoT"
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "secure@microsoft.com",
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "CHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.9,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.1,
"impactScore": 6.0
},
{
"source": "secure@microsoft.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H",
@ -36,6 +60,16 @@
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
},
{
"source": "secure@microsoft.com",
"type": "Secondary",
@ -47,10 +81,32 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:microsoft:defender_for_iot:*:*:*:*:*:*:*:*",
"versionEndExcluding": "24.1.4",
"matchCriteriaId": "75FA11DF-5B26-4E5D-800D-B7C6917CC9DF"
}
]
}
]
}
],
"references": [
{
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38089",
"source": "secure@microsoft.com"
"source": "secure@microsoft.com",
"tags": [
"Patch",
"Vendor Advisory"
]
}
]
}

View File

@ -2,13 +2,17 @@
"id": "CVE-2024-38091",
"sourceIdentifier": "secure@microsoft.com",
"published": "2024-07-09T17:15:45.380",
"lastModified": "2024-07-09T18:18:38.713",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-07-12T15:35:41.100",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Microsoft WS-Discovery Denial of Service Vulnerability"
},
{
"lang": "es",
"value": "Vulnerabilidad de denegaci\u00f3n de servicio de Microsoft WS-Discovery"
}
],
"metrics": {
@ -36,6 +40,16 @@
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
},
{
"source": "secure@microsoft.com",
"type": "Secondary",
@ -47,10 +61,123 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:*:*",
"versionEndExcluding": "10.0.10240.20710",
"matchCriteriaId": "B7482622-F4B1-4086-8484-136592BAACCE"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:*:*",
"versionEndExcluding": "10.0.14393.7159",
"matchCriteriaId": "BEEE46C5-718B-43C5-8B06-A4CB2E0DEF7A"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:*:*",
"versionEndExcluding": "10.0.17763.6054",
"matchCriteriaId": "3EE3B092-248B-4F68-AA13-DF4FB2E0DA3F"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:*:*",
"versionEndExcluding": "10.0.19044.4651",
"matchCriteriaId": "905A0D97-FCF2-4999-A3F3-C79D88511D52"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:*:*",
"versionEndExcluding": "10.0.19045.4651",
"matchCriteriaId": "2DEB25D6-2E73-4DF4-9D7D-2C9780101B1B"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_11_21h2:*:*:*:*:*:*:*:*",
"versionEndExcluding": "10.0.22000.3079",
"matchCriteriaId": "1F4C0A5A-B376-4DE8-A02A-5E341825AAAB"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*:*:*",
"versionEndExcluding": "10.0.22621.3880",
"matchCriteriaId": "A2B9B3F1-347C-4935-BFA9-6B4191831D28"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_11_23h2:*:*:*:*:*:*:*:*",
"versionEndExcluding": "10.0.22631.3880",
"matchCriteriaId": "E199129F-7F75-42C8-ABA0-7439FE50676B"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:x64:*",
"matchCriteriaId": "2127D10C-B6F3-4C1D-B9AA-5D78513CC996"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:x86:*",
"matchCriteriaId": "AB425562-C0A0-452E-AABE-F70522F15E1A"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*",
"matchCriteriaId": "AF07A81D-12E5-4B1D-BFF9-C8D08C32FF4F"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A7DF96F8-BA6A-4780-9CA3-F719B3F81074"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*",
"matchCriteriaId": "DB18C4CE-5917-401E-ACF7-2747084FD36E"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:*",
"versionEndExcluding": "10.0.14393.7159",
"matchCriteriaId": "59C9A2A5-AE44-4583-A7B1-B8D62B0E83BB"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*",
"versionEndExcluding": "10.0.17763.6054",
"matchCriteriaId": "3401E6F7-2430-4247-8A22-0B733A03501A"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_server_2022:*:*:*:*:*:*:*:*",
"versionEndExcluding": "10.0.20348.2582",
"matchCriteriaId": "4E433A09-F730-4EBE-8050-8789755B0D35"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_server_2022_23h2:*:*:*:*:*:*:*:*",
"versionEndExcluding": "10.0.25398.1009",
"matchCriteriaId": "EDA01A4A-9AED-484A-8B10-3282FA13F635"
}
]
}
]
}
],
"references": [
{
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38091",
"source": "secure@microsoft.com"
"source": "secure@microsoft.com",
"tags": [
"Patch",
"Vendor Advisory"
]
}
]
}

View File

@ -2,13 +2,17 @@
"id": "CVE-2024-38092",
"sourceIdentifier": "secure@microsoft.com",
"published": "2024-07-09T17:15:45.633",
"lastModified": "2024-07-09T18:18:38.713",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-07-12T15:05:16.757",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Azure CycleCloud Elevation of Privilege Vulnerability"
},
{
"lang": "es",
"value": "Vulnerabilidad de elevaci\u00f3n de privilegios de Azure CycleCloud"
}
],
"metrics": {
@ -36,6 +40,16 @@
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
},
{
"source": "secure@microsoft.com",
"type": "Secondary",
@ -47,10 +61,40 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:microsoft:azure_cyclecloud:*:*:*:*:*:*:*:*",
"versionStartIncluding": "7.9.0",
"versionEndIncluding": "7.9.11",
"matchCriteriaId": "65E4F243-662E-4940-A852-C14D104E1890"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:microsoft:azure_cyclecloud:*:*:*:*:*:*:*:*",
"versionStartIncluding": "8.0.0",
"versionEndIncluding": "8.6.0",
"matchCriteriaId": "6EBFFFA9-3B63-4219-A7DC-0602ED0D3C41"
}
]
}
]
}
],
"references": [
{
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38092",
"source": "secure@microsoft.com"
"source": "secure@microsoft.com",
"tags": [
"Patch",
"Vendor Advisory"
]
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-38472",
"sourceIdentifier": "security@apache.org",
"published": "2024-07-01T19:15:04.563",
"lastModified": "2024-07-09T16:22:46.000",
"lastModified": "2024-07-12T14:15:15.043",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
@ -55,6 +55,10 @@
{
"url": "https://httpd.apache.org/security/vulnerabilities_24.html",
"source": "security@apache.org"
},
{
"url": "https://security.netapp.com/advisory/ntap-20240712-0001/",
"source": "security@apache.org"
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-38473",
"sourceIdentifier": "security@apache.org",
"published": "2024-07-01T19:15:04.657",
"lastModified": "2024-07-02T12:09:16.907",
"lastModified": "2024-07-12T14:15:15.133",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
@ -32,6 +32,10 @@
{
"url": "https://httpd.apache.org/security/vulnerabilities_24.html",
"source": "security@apache.org"
},
{
"url": "https://security.netapp.com/advisory/ntap-20240712-0001/",
"source": "security@apache.org"
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-38474",
"sourceIdentifier": "security@apache.org",
"published": "2024-07-01T19:15:04.760",
"lastModified": "2024-07-02T12:09:16.907",
"lastModified": "2024-07-12T14:15:15.203",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
@ -32,6 +32,10 @@
{
"url": "https://httpd.apache.org/security/vulnerabilities_24.html",
"source": "security@apache.org"
},
{
"url": "https://security.netapp.com/advisory/ntap-20240712-0001/",
"source": "security@apache.org"
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-38475",
"sourceIdentifier": "security@apache.org",
"published": "2024-07-01T19:15:04.883",
"lastModified": "2024-07-08T14:18:45.973",
"lastModified": "2024-07-12T14:15:15.277",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
@ -55,6 +55,10 @@
{
"url": "https://httpd.apache.org/security/vulnerabilities_24.html",
"source": "security@apache.org"
},
{
"url": "https://security.netapp.com/advisory/ntap-20240712-0001/",
"source": "security@apache.org"
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-38476",
"sourceIdentifier": "security@apache.org",
"published": "2024-07-01T19:15:04.977",
"lastModified": "2024-07-02T12:09:16.907",
"lastModified": "2024-07-12T14:15:15.360",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
@ -32,6 +32,10 @@
{
"url": "https://httpd.apache.org/security/vulnerabilities_24.html",
"source": "security@apache.org"
},
{
"url": "https://security.netapp.com/advisory/ntap-20240712-0001/",
"source": "security@apache.org"
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-38477",
"sourceIdentifier": "security@apache.org",
"published": "2024-07-01T19:15:05.083",
"lastModified": "2024-07-02T12:09:16.907",
"lastModified": "2024-07-12T14:15:15.430",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
@ -32,6 +32,10 @@
{
"url": "https://httpd.apache.org/security/vulnerabilities_24.html",
"source": "security@apache.org"
},
{
"url": "https://security.netapp.com/advisory/ntap-20240712-0001/",
"source": "security@apache.org"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2024-38700",
"sourceIdentifier": "audit@patchstack.com",
"published": "2024-07-12T14:15:15.503",
"lastModified": "2024-07-12T14:15:15.503",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Improper Neutralization of Special Elements in Output Used by a Downstream Component ('Injection') vulnerability in realmag777 WPCS allows Code Injection.This issue affects WPCS: from n/a through 1.2.0.3."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "audit@patchstack.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 3.9,
"impactScore": 2.5
}
]
},
"weaknesses": [
{
"source": "audit@patchstack.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-74"
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/vulnerability/currency-switcher/wordpress-wpcs-wordpress-currency-switcher-professional-plugin-1-2-0-3-arbitrary-shortcode-execution-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2024-38704",
"sourceIdentifier": "audit@patchstack.com",
"published": "2024-07-12T14:15:15.710",
"lastModified": "2024-07-12T14:15:15.710",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability in DynamicWebLab WordPress Team Manager allows PHP Local File Inclusion.This issue affects WordPress Team Manager: from n/a through 2.1.12."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "audit@patchstack.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "audit@patchstack.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-22"
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/vulnerability/wp-team-manager/wordpress-team-manager-plugin-2-1-12-local-file-inclusion-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2024-38706",
"sourceIdentifier": "audit@patchstack.com",
"published": "2024-07-12T14:15:15.957",
"lastModified": "2024-07-12T14:15:15.957",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability in HasThemes HT Mega allows Path Traversal.This issue affects HT Mega: from n/a through 2.5.7."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "audit@patchstack.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "audit@patchstack.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-22"
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/vulnerability/ht-mega-for-elementor/wordpress-ht-mega-plugin-2-5-7-json-path-traversal-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2024-38709",
"sourceIdentifier": "audit@patchstack.com",
"published": "2024-07-12T14:15:16.183",
"lastModified": "2024-07-12T14:15:16.183",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability in Milan Petrovic GD Rating System allows PHP Local File Inclusion.This issue affects GD Rating System: from n/a through 3.6."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "audit@patchstack.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N",
"attackVector": "NETWORK",
"attackComplexity": "HIGH",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5.3,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.6,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "audit@patchstack.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-22"
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/vulnerability/gd-rating-system/wordpress-gd-rating-system-plugin-3-6-local-file-inclusion-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2024-38715",
"sourceIdentifier": "audit@patchstack.com",
"published": "2024-07-12T15:15:10.830",
"lastModified": "2024-07-12T15:15:10.830",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability in ExS ExS Widgets allows PHP Local File Inclusion.This issue affects ExS Widgets: from n/a through 0.3.1."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "audit@patchstack.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "audit@patchstack.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-22"
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/vulnerability/exs-widgets/wordpress-exs-widgets-plugin-0-3-1-local-file-inclusion-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
}
]
}

View File

@ -2,24 +2,86 @@
"id": "CVE-2024-38970",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-07-09T18:15:10.517",
"lastModified": "2024-07-09T18:18:38.713",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-07-12T14:51:48.070",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "vaeThink 1.0.2 is vulnerable to Information Disclosure via the system backend,access management administrator function."
},
{
"lang": "es",
"value": "vaeThink 1.0.2 es vulnerable a la divulgaci\u00f3n de informaci\u00f3n a trav\u00e9s del backend del sistema y la funci\u00f3n de administrador de gesti\u00f3n de acceso."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.9,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.2,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:vaethink:vaethink:1.0.2:*:*:*:*:*:*:*",
"matchCriteriaId": "9E8C99B3-EFB9-4672-9F48-48DF35A995BE"
}
]
}
]
}
],
"metrics": {},
"references": [
{
"url": "https://gist.github.com/fltys/b2c430bca85c97211010bdc602437978",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://github.com/tingyuu/vaeThink",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Product"
]
}
]
}

View File

@ -2,24 +2,86 @@
"id": "CVE-2024-38971",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-07-09T18:15:10.610",
"lastModified": "2024-07-09T18:18:38.713",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-07-12T14:50:45.817",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "vaeThink 1.0.2 is vulnerable to stored Cross Site Scripting (XSS) in the system backend."
},
{
"lang": "es",
"value": "vaeThink 1.0.2 es vulnerable a Cross Site Scripting (XSS) almacenado en el backend del sistema."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 5.4,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.3,
"impactScore": 2.7
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:vaethink:vaethink:1.0.2:*:*:*:*:*:*:*",
"matchCriteriaId": "9E8C99B3-EFB9-4672-9F48-48DF35A995BE"
}
]
}
]
}
],
"metrics": {},
"references": [
{
"url": "https://gist.github.com/fltys/998d96272545d2cf7cd6b182adbfd672",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://github.com/tingyuu/vaeThink",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Product"
]
}
]
}

View File

@ -2,13 +2,17 @@
"id": "CVE-2024-39536",
"sourceIdentifier": "sirt@juniper.net",
"published": "2024-07-11T17:15:11.190",
"lastModified": "2024-07-11T18:09:58.777",
"lastModified": "2024-07-12T15:15:11.040",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A Missing Release of Memory after Effective Lifetime vulnerability in the Periodic Packet Management Daemon (ppmd) of Juniper Networks Junos OS and Junos OS Evolved allows an unauthenticated adjacent attacker to cause a \n\nDenial-of-Service (DoS).\n\n\nWhen a\u00a0BFD session configured with authentication flaps,\u00a0ppmd memory can leak. Whether the leak happens depends on a\u00a0race condition which is outside the attackers control. This issue only affects BFD operating in distributed aka delegated (which is the default behavior) or inline mode.\n\n\n\nWhether the leak occurs can be monitored with the following CLI command:\n\n> show ppm request-queue\n\n\nFPC \u00a0 \u00a0 Pending-request\nfpc0\u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a02\nrequest-total-pending: 2\n\n\nwhere a continuously increasing number of pending requests is indicative of the leak.\u00a0\n\n\n\n\nThis issue affects:\n\nJunos OS:\n\n\n * All versions before 21.2R3-S8,\n * 21.4 versions before 21.4R3-S7,\n * 22.1 versions before 22.1R3-S4,\n * 22.2 versions before 22.2R3-S4,\u00a0\n * 22.3 versions before 22.3R3,\n * 22.4 versions before 22.4R2-S2, 22.4R3,\n * 23.1 versions before 23.1R2.\n\n\n\nJunos OS Evolved:\n * All versions before 21.2R3-S8-EVO,\n * 21.4-EVO versions before 21.4R3-S7-EVO,\n * 22.2-EVO versions before 22.2R3-S4-EVO,\n * 22.3-EVO versions before 22.3R3-EVO,\n * 22.4-EVO versions before 22.4R3-EVO,\n * 23.2-EVO versions before 23.2R1-EVO."
"value": "A Missing Release of Memory after Effective Lifetime vulnerability in the Periodic Packet Management Daemon (ppmd) of Juniper Networks Junos OS and Junos OS Evolved allows an unauthenticated adjacent attacker to cause a \n\nDenial-of-Service (DoS).\n\n\nWhen a\u00a0BFD session configured with authentication flaps,\u00a0ppmd memory can leak. Whether the leak happens depends on a\u00a0race condition which is outside the attackers control. This issue only affects BFD operating in distributed aka delegated (which is the default behavior) or inline mode.\n\n\n\nWhether the leak occurs can be monitored with the following CLI command:\n\n> show ppm request-queue\n\n\nFPC \u00a0 \u00a0 Pending-request\nfpc0\u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a02\nrequest-total-pending: 2\n\n\nwhere a continuously increasing number of pending requests is indicative of the leak.\u00a0\n\n\n\n\n\n\n\n\nThis issue affects:\n\nJunos OS:\n\n\n * All versions before 21.2R3-S8,\n * 21.4 versions before 21.4R3-S7,\n * 22.1 versions before 22.1R3-S4,\n * 22.2 versions before 22.2R3-S4, \n * 22.3 versions before 22.3R3,\n * 22.4 versions before 22.4R2-S2, 22.4R3.\n\n\n\nJunos OS Evolved:\n * All versions before 21.2R3-S8-EVO,\n * 21.4-EVO versions before 21.4R3-S7-EVO,\n * 22.2-EVO versions before 22.2R3-S4-EVO,\n * 22.3-EVO versions before 22.3R3-EVO,\n * 22.4-EVO versions before 22.4R3-EVO."
},
{
"lang": "es",
"value": "Una vulnerabilidad de liberaci\u00f3n de memoria faltante despu\u00e9s de la vida \u00fatil efectiva en Periodic Packet Management Daemon (ppmd) de Juniper Networks Junos OS y Junos OS Evolved permite que un atacante adyacente no autenticado provoque una denegaci\u00f3n de servicio (DoS). Cuando una sesi\u00f3n BFD se configura con solapas de autenticaci\u00f3n, la memoria ppmd puede perderse. Que se produzca la fuga depende de una condici\u00f3n de ejecuci\u00f3n que est\u00e1 fuera del control de los atacantes. Este problema solo afecta a BFD que opera en modo distribuido, tambi\u00e9n conocido como delegado (que es el comportamiento predeterminado) o en l\u00ednea. Si se produce la fuga se puede monitorear con el siguiente comando CLI: > show ppm request-queue FPC Pending-request fpc0 2 request-total-pending: 2 donde un n\u00famero continuamente creciente de solicitudes pendientes es indicativo de la fuga. Este problema afecta a: Junos OS: * Todas las versiones anteriores a 21.2R3-S8, * Versiones 21.4 anteriores a 21.4R3-S7, * Versiones 22.1 anteriores a 22.1R3-S4, * Versiones 22.2 anteriores a 22.2R3-S4, * Versiones 22.3 anteriores a 22.3R3, * Versiones 22.4 anteriores a 22.4R2-S2, 22.4R3, * Versiones 23.1 anteriores a 23.1R2. Junos OS Evolved: * Todas las versiones anteriores a 21.2R3-S8-EVO, * Versiones 21.4-EVO anteriores a 21.4R3-S7-EVO, * Versiones 22.2-EVO anteriores a 22.2R3-S4-EVO, * Versiones 22.3-EVO anteriores a 22.3R3- EVO, *versiones 22.4-EVO anteriores a 22.4R3-EVO, *versiones 23.2-EVO anteriores a 23.2R1-EVO."
}
],
"metrics": {

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-39573",
"sourceIdentifier": "security@apache.org",
"published": "2024-07-01T19:15:05.760",
"lastModified": "2024-07-03T02:05:50.170",
"lastModified": "2024-07-12T14:15:16.400",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
@ -55,6 +55,10 @@
{
"url": "https://httpd.apache.org/security/vulnerabilities_24.html",
"source": "security@apache.org"
},
{
"url": "https://security.netapp.com/advisory/ntap-20240712-0001/",
"source": "security@apache.org"
}
]
}

View File

@ -2,13 +2,17 @@
"id": "CVE-2024-39743",
"sourceIdentifier": "psirt@us.ibm.com",
"published": "2024-07-08T14:15:02.823",
"lastModified": "2024-07-08T15:49:22.437",
"lastModified": "2024-07-12T14:15:16.487",
"vulnStatus": "Undergoing Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "IBM MQ Operator 3.2.2 and IBM MQ Operator 2.0.24 could allow a user to cause a denial of service under certain configurations due to a partial string comparison vulnerability. IBM X-Force ID: 297172."
"value": "IBM MQ Operator 3.2.2 and IBM MQ Operator 2.0.24 IBM MQ Container Developer Edition is vulnerable to denial of service caused by incorrect memory de-allocation. A remote attacker could exploit this vulnerability to cause the server to consume memory resources. IBM X-Force ID: 297172."
},
{
"lang": "es",
"value": "IBM MQ Operador 3.2.2 e IBM MQ Operador 2.0.24 podr\u00edan permitir a un usuario provocar una denegaci\u00f3n de servicio en determinadas configuraciones debido a una vulnerabilidad de comparaci\u00f3n de cadenas parciales. ID de IBM X-Force: 297172."
}
],
"metrics": {
@ -42,7 +46,7 @@
"description": [
{
"lang": "en",
"value": "CWE-187"
"value": "CWE-405"
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-39884",
"sourceIdentifier": "security@apache.org",
"published": "2024-07-04T09:15:04.237",
"lastModified": "2024-07-05T12:55:51.367",
"lastModified": "2024-07-12T14:15:16.640",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
@ -20,6 +20,10 @@
{
"url": "https://httpd.apache.org/security/vulnerabilities_24.html",
"source": "security@apache.org"
},
{
"url": "https://security.netapp.com/advisory/ntap-20240712-0002/",
"source": "security@apache.org"
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-39894",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-07-02T18:15:03.710",
"lastModified": "2024-07-08T14:18:56.393",
"lastModified": "2024-07-12T14:15:16.703",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
@ -60,6 +60,10 @@
"url": "https://lists.mindrot.org/pipermail/openssh-unix-announce/2024-July/000158.html",
"source": "cve@mitre.org"
},
{
"url": "https://security.netapp.com/advisory/ntap-20240712-0004/",
"source": "cve@mitre.org"
},
{
"url": "https://www.openssh.com/txt/release-9.8",
"source": "cve@mitre.org"

View File

@ -0,0 +1,60 @@
{
"id": "CVE-2024-39903",
"sourceIdentifier": "security-advisories@github.com",
"published": "2024-07-12T15:15:11.177",
"lastModified": "2024-07-12T15:15:11.177",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Solara is a pure Python, React-style framework for scaling Jupyter and web apps. A Local File Inclusion (LFI) vulnerability was identified in widgetti/solara, in version <1.35.1, which was fixed in version 1.35.1. This vulnerability arises from the application's failure to properly validate URI fragments for directory traversal sequences such as '../' when serving static files. An attacker can exploit this flaw by manipulating the fragment part of the URI to read arbitrary files on the local file system."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security-advisories@github.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:L",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "LOW",
"availabilityImpact": "LOW",
"baseScore": 8.6,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 4.7
}
]
},
"weaknesses": [
{
"source": "security-advisories@github.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-22"
}
]
}
],
"references": [
{
"url": "https://github.com/widgetti/solara/commit/df2fd66a7f4e8ffd36e8678697a8a4f76760dc54",
"source": "security-advisories@github.com"
},
{
"url": "https://github.com/widgetti/solara/security/advisories/GHSA-9794-pc4r-438w",
"source": "security-advisories@github.com"
}
]
}

View File

@ -0,0 +1,64 @@
{
"id": "CVE-2024-39909",
"sourceIdentifier": "security-advisories@github.com",
"published": "2024-07-12T15:15:11.393",
"lastModified": "2024-07-12T15:15:11.393",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "KubeClarity is a tool for detection and management of Software Bill Of Materials (SBOM) and vulnerabilities of container images and filesystems. A time/boolean SQL Injection is present in the following resource `/api/applicationResources` via the following parameter `packageID`. As it can be seen in backend/pkg/database/id_view.go, while building the SQL Query the `fmt.Sprintf` function is used to build the query string without the input having first been subjected to any validation. This vulnerability is fixed in 2.23.1."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security-advisories@github.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "security-advisories@github.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-89"
}
]
}
],
"references": [
{
"url": "https://github.com/openclarity/kubeclarity/blob/main/backend/pkg/database/id_view.go#L79",
"source": "security-advisories@github.com"
},
{
"url": "https://github.com/openclarity/kubeclarity/commit/1d1178840703a72d9082b7fc4aea0a3326c5d294",
"source": "security-advisories@github.com"
},
{
"url": "https://github.com/openclarity/kubeclarity/security/advisories/GHSA-5248-h45p-9pgw",
"source": "security-advisories@github.com"
}
]
}

View File

@ -0,0 +1,60 @@
{
"id": "CVE-2024-39914",
"sourceIdentifier": "security-advisories@github.com",
"published": "2024-07-12T15:15:11.607",
"lastModified": "2024-07-12T15:15:11.607",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "FOG is a cloning/imaging/rescue suite/inventory management system. Prior to 1.5.10.34, packages/web/lib/fog/reportmaker.class.php in FOG was affected by a command injection via the filename parameter to /fog/management/export.php. This vulnerability is fixed in 1.5.10.34."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security-advisories@github.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "security-advisories@github.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-77"
}
]
}
],
"references": [
{
"url": "https://github.com/FOGProject/fogproject/commit/2413bc034753c32799785e9bf08164ccd0a2759f",
"source": "security-advisories@github.com"
},
{
"url": "https://github.com/FOGProject/fogproject/security/advisories/GHSA-7h44-6vq6-cq8j",
"source": "security-advisories@github.com"
}
]
}

View File

@ -0,0 +1,60 @@
{
"id": "CVE-2024-39916",
"sourceIdentifier": "security-advisories@github.com",
"published": "2024-07-12T15:15:11.813",
"lastModified": "2024-07-12T15:15:11.813",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "FOG is a free open-source cloning/imaging/rescue suite/inventory management system. There is a security issue with the NFS configuration in /etc/exports generated by the installer that allows an attacker to modify files outside the export in the default installation. The exports have the no_subtree_check option. The no_subtree_check option means that if a client performs a file operation, the server will only check if the requested file is on the correct filesystem, not if it is in the correct directory. This enables modifying files in /images, accessing other files on the same filesystem, and accessing files on other filesystems. This vulnerability is fixed in 1.5.10.30."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security-advisories@github.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 6.4,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 3.1,
"impactScore": 2.7
}
]
},
"weaknesses": [
{
"source": "security-advisories@github.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-453"
}
]
}
],
"references": [
{
"url": "https://github.com/FOGProject/fogproject/commit/2de209bc57a177a052b4a877f000c591740b2f88",
"source": "security-advisories@github.com"
},
{
"url": "https://github.com/FOGProject/fogproject/security/advisories/GHSA-3xjr-xf9v-hwjh",
"source": "security-advisories@github.com"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-4667",
"sourceIdentifier": "security@wordfence.com",
"published": "2024-07-09T05:15:13.353",
"lastModified": "2024-07-09T18:19:14.047",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-07-12T14:25:13.923",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -18,8 +18,28 @@
"metrics": {
"cvssMetricV31": [
{
"source": "security@wordfence.com",
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 5.4,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.3,
"impactScore": 2.7
},
{
"source": "security@wordfence.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N",
@ -39,18 +59,57 @@
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:plugin-devs:blog\\,_posts_and_category_filter_for_elementor:*:*:*:*:*:*:*:*",
"versionEndExcluding": "2.0.0",
"matchCriteriaId": "EF7E116F-AEC0-4206-B028-83EDF9B05511"
}
]
}
]
}
],
"references": [
{
"url": "https://plugins.trac.wordpress.org/browser/blog-posts-and-category-for-elementor/trunk/widgets/post-category-filter.php#L885",
"source": "security@wordfence.com"
"source": "security@wordfence.com",
"tags": [
"Patch"
]
},
{
"url": "https://wordpress.org/plugins/blog-posts-and-category-for-elementor/#developers",
"source": "security@wordfence.com"
"source": "security@wordfence.com",
"tags": [
"Release Notes"
]
},
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/a24c2d7d-8df8-4a3a-a538-09e11ebc6dd5?source=cve",
"source": "security@wordfence.com"
"source": "security@wordfence.com",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-5535",
"sourceIdentifier": "openssl-security@openssl.org",
"published": "2024-06-27T11:15:24.447",
"lastModified": "2024-07-03T02:09:04.140",
"lastModified": "2024-07-12T14:15:16.790",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
@ -84,6 +84,10 @@
"url": "https://github.openssl.org/openssl/extended-releases/commit/b78ec0824da857223486660177d3b1f255c65d87",
"source": "openssl-security@openssl.org"
},
{
"url": "https://security.netapp.com/advisory/ntap-20240712-0005/",
"source": "openssl-security@openssl.org"
},
{
"url": "https://www.openssl.org/news/secadv/20240627.txt",
"source": "openssl-security@openssl.org"

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-5802",
"sourceIdentifier": "contact@wpscan.com",
"published": "2024-07-09T06:15:03.117",
"lastModified": "2024-07-09T18:19:14.047",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-07-12T15:20:14.610",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -15,11 +15,68 @@
"value": "El complemento URL Shortener de Myhop WordPress hasta la versi\u00f3n 1.0.17 no sanitiza ni escapa a algunas de sus configuraciones, lo que podr\u00eda permitir a usuarios con altos privilegios, como el administrador, realizar ataques de Cross Site Scripting incluso cuando unfiltered_html no est\u00e1 permitido."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 4.8,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.7,
"impactScore": 2.7
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:mythemeshop:url_shortener:*:*:*:*:*:wordpress:*:*",
"versionEndIncluding": "1.0.17",
"matchCriteriaId": "0B13384D-613F-4B1F-8F26-0A5D3870274D"
}
]
}
]
}
],
"references": [
{
"url": "https://wpscan.com/vulnerability/cd37f702-9144-4c98-9b08-c63e510cd97f/",
"source": "contact@wpscan.com"
"source": "contact@wpscan.com",
"tags": [
"Exploit",
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-6166",
"sourceIdentifier": "security@wordfence.com",
"published": "2024-07-09T05:15:13.543",
"lastModified": "2024-07-09T18:19:14.047",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-07-12T14:23:53.600",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -39,18 +39,57 @@
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-89"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:unlimited-elements:unlimited_elements_for_elementor_\\(free_widgets\\,_addons\\,_templates\\):*:*:*:*:*:wordpress:*:*",
"versionEndExcluding": "1.5.113",
"matchCriteriaId": "3E9EAD0C-BB2F-415C-A40D-8A42B7095AC1"
}
]
}
]
}
],
"references": [
{
"url": "https://plugins.trac.wordpress.org/browser/unlimited-elements-for-elementor/trunk/inc_php/unitecreator_addons.class.php#L79",
"source": "security@wordfence.com"
"source": "security@wordfence.com",
"tags": [
"Patch"
]
},
{
"url": "https://plugins.trac.wordpress.org/changeset/3112307/",
"source": "security@wordfence.com"
"source": "security@wordfence.com",
"tags": [
"Patch"
]
},
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/9826c91c-0f6e-4d3b-bc14-4af6b60ef246?source=cve",
"source": "security@wordfence.com"
"source": "security@wordfence.com",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-6169",
"sourceIdentifier": "security@wordfence.com",
"published": "2024-07-09T05:15:13.737",
"lastModified": "2024-07-09T18:19:14.047",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-07-12T14:30:07.300",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -17,6 +17,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 5.4,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.3,
"impactScore": 2.7
},
{
"source": "security@wordfence.com",
"type": "Secondary",
@ -39,30 +59,78 @@
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:unlimited-elements:unlimited_elements_for_elementor_\\(free_widgets\\,_addons\\,_templates\\):*:*:*:*:*:wordpress:*:*",
"versionEndExcluding": "1.5.113",
"matchCriteriaId": "3E9EAD0C-BB2F-415C-A40D-8A42B7095AC1"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/hakluke/weaponised-XSS-payloads/blob/master/wordpress_create_admin_user.js",
"source": "security@wordfence.com"
"source": "security@wordfence.com",
"tags": [
"Exploit"
]
},
{
"url": "https://plugins.trac.wordpress.org/browser/unlimited-elements-for-elementor/trunk/inc_php/framework/instagram/helper.class.php#L168",
"source": "security@wordfence.com"
"source": "security@wordfence.com",
"tags": [
"Patch"
]
},
{
"url": "https://plugins.trac.wordpress.org/browser/unlimited-elements-for-elementor/trunk/inc_php/framework/instagram/helper.class.php#L178",
"source": "security@wordfence.com"
"source": "security@wordfence.com",
"tags": [
"Patch"
]
},
{
"url": "https://plugins.trac.wordpress.org/browser/unlimited-elements-for-elementor/trunk/inc_php/framework/instagram/helper.class.php#L182",
"source": "security@wordfence.com"
"source": "security@wordfence.com",
"tags": [
"Patch"
]
},
{
"url": "https://plugins.trac.wordpress.org/changeset/3112307/",
"source": "security@wordfence.com"
"source": "security@wordfence.com",
"tags": [
"Patch"
]
},
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/f2f11c32-d58e-4ac8-83c7-30927a626e10?source=cve",
"source": "security@wordfence.com"
"source": "security@wordfence.com",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-6170",
"sourceIdentifier": "security@wordfence.com",
"published": "2024-07-09T05:15:13.947",
"lastModified": "2024-07-09T18:19:14.047",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-07-12T14:20:01.013",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -18,8 +18,28 @@
"metrics": {
"cvssMetricV31": [
{
"source": "security@wordfence.com",
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 5.4,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.3,
"impactScore": 2.7
},
{
"source": "security@wordfence.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N",
@ -39,22 +59,64 @@
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:unlimited-elements:unlimited_elements_for_elementor_\\(free_widgets\\,_addons\\,_templates\\):*:*:*:*:*:wordpress:*:*",
"versionEndExcluding": "1.5.113",
"matchCriteriaId": "3E9EAD0C-BB2F-415C-A40D-8A42B7095AC1"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/hakluke/weaponised-XSS-payloads/blob/master/wordpress_create_admin_user.js",
"source": "security@wordfence.com"
"source": "security@wordfence.com",
"tags": [
"Exploit"
]
},
{
"url": "https://plugins.trac.wordpress.org/browser/unlimited-elements-for-elementor/trunk/inc_php/unitecreator_settings_output.class.php#L398",
"source": "security@wordfence.com"
"source": "security@wordfence.com",
"tags": [
"Patch"
]
},
{
"url": "https://plugins.trac.wordpress.org/changeset/3112307/",
"source": "security@wordfence.com"
"source": "security@wordfence.com",
"tags": [
"Patch"
]
},
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/db14b141-521b-464d-a638-2228b1a86c2b?source=cve",
"source": "security@wordfence.com"
"source": "security@wordfence.com",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-6171",
"sourceIdentifier": "security@wordfence.com",
"published": "2024-07-09T05:15:14.140",
"lastModified": "2024-07-09T18:19:14.047",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-07-12T14:40:02.843",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -39,22 +39,64 @@
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:unlimited-elements:unlimited_elements_for_elementor_\\(free_widgets\\,_addons\\,_templates\\):*:*:*:*:*:wordpress:*:*",
"versionEndExcluding": "1.5.113",
"matchCriteriaId": "3E9EAD0C-BB2F-415C-A40D-8A42B7095AC1"
}
]
}
]
}
],
"references": [
{
"url": "https://plugins.trac.wordpress.org/browser/unlimited-elements-for-elementor/trunk/inc_php/framework/functions.class.php#L3407",
"source": "security@wordfence.com"
"source": "security@wordfence.com",
"tags": [
"Patch"
]
},
{
"url": "https://plugins.trac.wordpress.org/browser/unlimited-elements-for-elementor/trunk/inc_php/unitecreator_form.class.php#L742",
"source": "security@wordfence.com"
"source": "security@wordfence.com",
"tags": [
"Patch"
]
},
{
"url": "https://plugins.trac.wordpress.org/changeset/3112307/",
"source": "security@wordfence.com"
"source": "security@wordfence.com",
"tags": [
"Patch"
]
},
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/714acd7d-6d19-4087-bb27-b9a4ccbb678b?source=cve",
"source": "security@wordfence.com"
"source": "security@wordfence.com",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-6409",
"sourceIdentifier": "secalert@redhat.com",
"published": "2024-07-08T18:15:09.487",
"lastModified": "2024-07-10T20:15:04.853",
"lastModified": "2024-07-12T14:15:16.917",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
@ -100,6 +100,10 @@
"url": "https://security-tracker.debian.org/tracker/CVE-2024-6409",
"source": "secalert@redhat.com"
},
{
"url": "https://security.netapp.com/advisory/ntap-20240712-0003/",
"source": "secalert@redhat.com"
},
{
"url": "https://sig-security.rocky.page/issues/CVE-2024-6409/",
"source": "secalert@redhat.com"

108
README.md
View File

@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours.
### Last Repository Update
```plain
2024-07-12T14:00:19.302606+00:00
2024-07-12T16:00:17.941069+00:00
```
### Most recent CVE Modification Timestamp synchronized with NVD
```plain
2024-07-12T13:15:21.770000+00:00
2024-07-12T15:46:00.290000+00:00
```
### Last Data Feed Release
@ -33,69 +33,67 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
### Total Number of included CVEs
```plain
256872
256895
```
### CVEs added in the last Commit
Recently added CVEs: `129`
Recently added CVEs: `23`
- [CVE-2024-40984](CVE-2024/CVE-2024-409xx/CVE-2024-40984.json) (`2024-07-12T13:15:19.977`)
- [CVE-2024-40985](CVE-2024/CVE-2024-409xx/CVE-2024-40985.json) (`2024-07-12T13:15:20.050`)
- [CVE-2024-40986](CVE-2024/CVE-2024-409xx/CVE-2024-40986.json) (`2024-07-12T13:15:20.113`)
- [CVE-2024-40987](CVE-2024/CVE-2024-409xx/CVE-2024-40987.json) (`2024-07-12T13:15:20.180`)
- [CVE-2024-40988](CVE-2024/CVE-2024-409xx/CVE-2024-40988.json) (`2024-07-12T13:15:20.250`)
- [CVE-2024-40989](CVE-2024/CVE-2024-409xx/CVE-2024-40989.json) (`2024-07-12T13:15:20.310`)
- [CVE-2024-40990](CVE-2024/CVE-2024-409xx/CVE-2024-40990.json) (`2024-07-12T13:15:20.370`)
- [CVE-2024-40991](CVE-2024/CVE-2024-409xx/CVE-2024-40991.json) (`2024-07-12T13:15:20.430`)
- [CVE-2024-40992](CVE-2024/CVE-2024-409xx/CVE-2024-40992.json) (`2024-07-12T13:15:20.497`)
- [CVE-2024-40993](CVE-2024/CVE-2024-409xx/CVE-2024-40993.json) (`2024-07-12T13:15:20.553`)
- [CVE-2024-40994](CVE-2024/CVE-2024-409xx/CVE-2024-40994.json) (`2024-07-12T13:15:20.620`)
- [CVE-2024-40995](CVE-2024/CVE-2024-409xx/CVE-2024-40995.json) (`2024-07-12T13:15:20.680`)
- [CVE-2024-40996](CVE-2024/CVE-2024-409xx/CVE-2024-40996.json) (`2024-07-12T13:15:20.740`)
- [CVE-2024-40997](CVE-2024/CVE-2024-409xx/CVE-2024-40997.json) (`2024-07-12T13:15:20.800`)
- [CVE-2024-40998](CVE-2024/CVE-2024-409xx/CVE-2024-40998.json) (`2024-07-12T13:15:20.857`)
- [CVE-2024-40999](CVE-2024/CVE-2024-409xx/CVE-2024-40999.json) (`2024-07-12T13:15:20.920`)
- [CVE-2024-41000](CVE-2024/CVE-2024-410xx/CVE-2024-41000.json) (`2024-07-12T13:15:20.987`)
- [CVE-2024-41001](CVE-2024/CVE-2024-410xx/CVE-2024-41001.json) (`2024-07-12T13:15:21.053`)
- [CVE-2024-41002](CVE-2024/CVE-2024-410xx/CVE-2024-41002.json) (`2024-07-12T13:15:21.120`)
- [CVE-2024-41003](CVE-2024/CVE-2024-410xx/CVE-2024-41003.json) (`2024-07-12T13:15:21.180`)
- [CVE-2024-41004](CVE-2024/CVE-2024-410xx/CVE-2024-41004.json) (`2024-07-12T13:15:21.240`)
- [CVE-2024-41005](CVE-2024/CVE-2024-410xx/CVE-2024-41005.json) (`2024-07-12T13:15:21.310`)
- [CVE-2024-41006](CVE-2024/CVE-2024-410xx/CVE-2024-41006.json) (`2024-07-12T13:15:21.370`)
- [CVE-2024-5325](CVE-2024/CVE-2024-53xx/CVE-2024-5325.json) (`2024-07-12T13:15:21.470`)
- [CVE-2024-6495](CVE-2024/CVE-2024-64xx/CVE-2024-6495.json) (`2024-07-12T13:15:21.770`)
- [CVE-2024-35773](CVE-2024/CVE-2024-357xx/CVE-2024-35773.json) (`2024-07-12T14:15:11.437`)
- [CVE-2024-37202](CVE-2024/CVE-2024-372xx/CVE-2024-37202.json) (`2024-07-12T14:15:12.063`)
- [CVE-2024-37213](CVE-2024/CVE-2024-372xx/CVE-2024-37213.json) (`2024-07-12T14:15:12.293`)
- [CVE-2024-37544](CVE-2024/CVE-2024-375xx/CVE-2024-37544.json) (`2024-07-12T14:15:12.540`)
- [CVE-2024-37560](CVE-2024/CVE-2024-375xx/CVE-2024-37560.json) (`2024-07-12T14:15:12.770`)
- [CVE-2024-37564](CVE-2024/CVE-2024-375xx/CVE-2024-37564.json) (`2024-07-12T14:15:13.000`)
- [CVE-2024-37927](CVE-2024/CVE-2024-379xx/CVE-2024-37927.json) (`2024-07-12T14:15:13.237`)
- [CVE-2024-37928](CVE-2024/CVE-2024-379xx/CVE-2024-37928.json) (`2024-07-12T14:15:13.463`)
- [CVE-2024-37932](CVE-2024/CVE-2024-379xx/CVE-2024-37932.json) (`2024-07-12T14:15:13.717`)
- [CVE-2024-37933](CVE-2024/CVE-2024-379xx/CVE-2024-37933.json) (`2024-07-12T14:15:13.943`)
- [CVE-2024-37938](CVE-2024/CVE-2024-379xx/CVE-2024-37938.json) (`2024-07-12T14:15:14.167`)
- [CVE-2024-37939](CVE-2024/CVE-2024-379xx/CVE-2024-37939.json) (`2024-07-12T14:15:14.380`)
- [CVE-2024-37940](CVE-2024/CVE-2024-379xx/CVE-2024-37940.json) (`2024-07-12T14:15:14.600`)
- [CVE-2024-37941](CVE-2024/CVE-2024-379xx/CVE-2024-37941.json) (`2024-07-12T14:15:14.817`)
- [CVE-2024-38700](CVE-2024/CVE-2024-387xx/CVE-2024-38700.json) (`2024-07-12T14:15:15.503`)
- [CVE-2024-38704](CVE-2024/CVE-2024-387xx/CVE-2024-38704.json) (`2024-07-12T14:15:15.710`)
- [CVE-2024-38706](CVE-2024/CVE-2024-387xx/CVE-2024-38706.json) (`2024-07-12T14:15:15.957`)
- [CVE-2024-38709](CVE-2024/CVE-2024-387xx/CVE-2024-38709.json) (`2024-07-12T14:15:16.183`)
- [CVE-2024-38715](CVE-2024/CVE-2024-387xx/CVE-2024-38715.json) (`2024-07-12T15:15:10.830`)
- [CVE-2024-39903](CVE-2024/CVE-2024-399xx/CVE-2024-39903.json) (`2024-07-12T15:15:11.177`)
- [CVE-2024-39909](CVE-2024/CVE-2024-399xx/CVE-2024-39909.json) (`2024-07-12T15:15:11.393`)
- [CVE-2024-39914](CVE-2024/CVE-2024-399xx/CVE-2024-39914.json) (`2024-07-12T15:15:11.607`)
- [CVE-2024-39916](CVE-2024/CVE-2024-399xx/CVE-2024-39916.json) (`2024-07-12T15:15:11.813`)
### CVEs modified in the last Commit
Recently modified CVEs: `32`
Recently modified CVEs: `38`
- [CVE-2023-51107](CVE-2023/CVE-2023-511xx/CVE-2023-51107.json) (`2024-07-12T13:15:11.750`)
- [CVE-2024-0974](CVE-2024/CVE-2024-09xx/CVE-2024-0974.json) (`2024-07-12T12:49:07.030`)
- [CVE-2024-1375](CVE-2024/CVE-2024-13xx/CVE-2024-1375.json) (`2024-07-12T12:49:07.030`)
- [CVE-2024-2430](CVE-2024/CVE-2024-24xx/CVE-2024-2430.json) (`2024-07-12T12:49:07.030`)
- [CVE-2024-2640](CVE-2024/CVE-2024-26xx/CVE-2024-2640.json) (`2024-07-12T12:49:07.030`)
- [CVE-2024-2696](CVE-2024/CVE-2024-26xx/CVE-2024-2696.json) (`2024-07-12T12:49:07.030`)
- [CVE-2024-3112](CVE-2024/CVE-2024-31xx/CVE-2024-3112.json) (`2024-07-12T12:49:07.030`)
- [CVE-2024-36435](CVE-2024/CVE-2024-364xx/CVE-2024-36435.json) (`2024-07-12T12:49:11.340`)
- [CVE-2024-4753](CVE-2024/CVE-2024-47xx/CVE-2024-4753.json) (`2024-07-12T12:49:07.030`)
- [CVE-2024-5626](CVE-2024/CVE-2024-56xx/CVE-2024-5626.json) (`2024-07-12T12:49:07.030`)
- [CVE-2024-5811](CVE-2024/CVE-2024-58xx/CVE-2024-5811.json) (`2024-07-12T12:49:07.030`)
- [CVE-2024-6022](CVE-2024/CVE-2024-60xx/CVE-2024-6022.json) (`2024-07-12T12:49:07.030`)
- [CVE-2024-6023](CVE-2024/CVE-2024-60xx/CVE-2024-6023.json) (`2024-07-12T12:49:07.030`)
- [CVE-2024-6024](CVE-2024/CVE-2024-60xx/CVE-2024-6024.json) (`2024-07-12T12:49:07.030`)
- [CVE-2024-6052](CVE-2024/CVE-2024-60xx/CVE-2024-6052.json) (`2024-07-12T13:15:21.680`)
- [CVE-2024-6328](CVE-2024/CVE-2024-63xx/CVE-2024-6328.json) (`2024-07-12T12:49:07.030`)
- [CVE-2024-6353](CVE-2024/CVE-2024-63xx/CVE-2024-6353.json) (`2024-07-12T12:49:07.030`)
- [CVE-2024-6392](CVE-2024/CVE-2024-63xx/CVE-2024-6392.json) (`2024-07-12T12:49:07.030`)
- [CVE-2024-6396](CVE-2024/CVE-2024-63xx/CVE-2024-6396.json) (`2024-07-12T12:49:07.030`)
- [CVE-2024-6468](CVE-2024/CVE-2024-64xx/CVE-2024-6468.json) (`2024-07-12T12:49:11.340`)
- [CVE-2024-6531](CVE-2024/CVE-2024-65xx/CVE-2024-6531.json) (`2024-07-12T12:49:11.340`)
- [CVE-2024-6555](CVE-2024/CVE-2024-65xx/CVE-2024-6555.json) (`2024-07-12T12:49:07.030`)
- [CVE-2024-6588](CVE-2024/CVE-2024-65xx/CVE-2024-6588.json) (`2024-07-12T12:49:07.030`)
- [CVE-2024-6625](CVE-2024/CVE-2024-66xx/CVE-2024-6625.json) (`2024-07-12T12:49:07.030`)
- [CVE-2024-6677](CVE-2024/CVE-2024-66xx/CVE-2024-6677.json) (`2024-07-12T12:49:07.030`)
- [CVE-2024-38086](CVE-2024/CVE-2024-380xx/CVE-2024-38086.json) (`2024-07-12T15:45:05.137`)
- [CVE-2024-38089](CVE-2024/CVE-2024-380xx/CVE-2024-38089.json) (`2024-07-12T15:42:39.127`)
- [CVE-2024-38091](CVE-2024/CVE-2024-380xx/CVE-2024-38091.json) (`2024-07-12T15:35:41.100`)
- [CVE-2024-38092](CVE-2024/CVE-2024-380xx/CVE-2024-38092.json) (`2024-07-12T15:05:16.757`)
- [CVE-2024-38472](CVE-2024/CVE-2024-384xx/CVE-2024-38472.json) (`2024-07-12T14:15:15.043`)
- [CVE-2024-38473](CVE-2024/CVE-2024-384xx/CVE-2024-38473.json) (`2024-07-12T14:15:15.133`)
- [CVE-2024-38474](CVE-2024/CVE-2024-384xx/CVE-2024-38474.json) (`2024-07-12T14:15:15.203`)
- [CVE-2024-38475](CVE-2024/CVE-2024-384xx/CVE-2024-38475.json) (`2024-07-12T14:15:15.277`)
- [CVE-2024-38476](CVE-2024/CVE-2024-384xx/CVE-2024-38476.json) (`2024-07-12T14:15:15.360`)
- [CVE-2024-38477](CVE-2024/CVE-2024-384xx/CVE-2024-38477.json) (`2024-07-12T14:15:15.430`)
- [CVE-2024-38970](CVE-2024/CVE-2024-389xx/CVE-2024-38970.json) (`2024-07-12T14:51:48.070`)
- [CVE-2024-38971](CVE-2024/CVE-2024-389xx/CVE-2024-38971.json) (`2024-07-12T14:50:45.817`)
- [CVE-2024-39536](CVE-2024/CVE-2024-395xx/CVE-2024-39536.json) (`2024-07-12T15:15:11.040`)
- [CVE-2024-39573](CVE-2024/CVE-2024-395xx/CVE-2024-39573.json) (`2024-07-12T14:15:16.400`)
- [CVE-2024-39743](CVE-2024/CVE-2024-397xx/CVE-2024-39743.json) (`2024-07-12T14:15:16.487`)
- [CVE-2024-39884](CVE-2024/CVE-2024-398xx/CVE-2024-39884.json) (`2024-07-12T14:15:16.640`)
- [CVE-2024-39894](CVE-2024/CVE-2024-398xx/CVE-2024-39894.json) (`2024-07-12T14:15:16.703`)
- [CVE-2024-4667](CVE-2024/CVE-2024-46xx/CVE-2024-4667.json) (`2024-07-12T14:25:13.923`)
- [CVE-2024-5535](CVE-2024/CVE-2024-55xx/CVE-2024-5535.json) (`2024-07-12T14:15:16.790`)
- [CVE-2024-5802](CVE-2024/CVE-2024-58xx/CVE-2024-5802.json) (`2024-07-12T15:20:14.610`)
- [CVE-2024-6166](CVE-2024/CVE-2024-61xx/CVE-2024-6166.json) (`2024-07-12T14:23:53.600`)
- [CVE-2024-6169](CVE-2024/CVE-2024-61xx/CVE-2024-6169.json) (`2024-07-12T14:30:07.300`)
- [CVE-2024-6170](CVE-2024/CVE-2024-61xx/CVE-2024-6170.json) (`2024-07-12T14:20:01.013`)
- [CVE-2024-6171](CVE-2024/CVE-2024-61xx/CVE-2024-6171.json) (`2024-07-12T14:40:02.843`)
- [CVE-2024-6409](CVE-2024/CVE-2024-64xx/CVE-2024-6409.json) (`2024-07-12T14:15:16.917`)
## Download and Usage

View File

@ -107267,7 +107267,7 @@ CVE-2017-7259,0,0,69b026e123fdf946188259e9d5a9f10d1ce65e924d16b7b366af094d52ef79
CVE-2017-7261,0,0,4812f249d0b978bca26ec4cf413997f80548fc682770a140a54aa8b2c2325d58,2017-03-29T01:59:02.890000
CVE-2017-7262,0,0,1b76aca7a563bfb0ed2d7a647a45be766a9f36a4ff41086e1d5e89813e8e3da7,2017-03-29T13:57:42.320000
CVE-2017-7263,0,0,39399228455e6c8c01a8785cc5008bf2faebce69a84ccf7bab1fb94312c127b0,2017-03-29T01:59:03
CVE-2017-7264,0,1,a59a4af1a12ac2c3e2a0b34f1a072b1dabed1defa716369bf3881478f6b0ffd6,2024-07-12T13:15:11.073000
CVE-2017-7264,0,0,a59a4af1a12ac2c3e2a0b34f1a072b1dabed1defa716369bf3881478f6b0ffd6,2024-07-12T13:15:11.073000
CVE-2017-7266,0,0,617798729988dfd0aea75162535d304b535d075d4d4d7d3ee6863de6b51ec39d,2017-03-29T01:59:03.110000
CVE-2017-7269,0,0,fa7619d180271c6222bb9c66b4f38376efd4e64e7658573ca80ffd922d752545,2023-11-07T02:50:02.587000
CVE-2017-7271,0,0,3edfad032ac3ceaafa26c67c18b49ba963bdc2183e6f8676f05dc26ecc2bf4a1,2017-05-08T01:29:00.267000
@ -110716,11 +110716,11 @@ CVE-2018-1000032,0,0,0acd2b876ee74fa3ec480d14eb921082ce2645391c28d7cb684c288d1a1
CVE-2018-1000033,0,0,758af4b82feeb000d0cb08c033fbe7afa7163497954922da4f5cdecf8c45bf00,2018-02-26T18:41:29.290000
CVE-2018-1000034,0,0,9523274213dbf80db86764d560867e28c13808d19f2cacfaa4cc405190f79233,2018-02-26T19:11:58.640000
CVE-2018-1000035,0,0,3415092cee916f5c4c971fb656506255e65a20783554e5b2aa928722c1502ef1,2020-08-24T17:37:01.140000
CVE-2018-1000036,0,1,cf5accb052a6cf965bcee24601f9631ee1d4bf5b1178c4b3b4411e318b15e9ea,2024-07-12T13:15:11.203000
CVE-2018-1000037,0,1,d2c2eec4bda81b9a494fc38e14e6c4c163411d355fce6ffd40e3522f66fa4f6a,2024-07-12T13:15:11.360000
CVE-2018-1000038,0,1,c593b7bd3b0d503716b938dbe9474845021720ef3257b24fd05b05b8b36eea2a,2024-07-12T13:15:11.443000
CVE-2018-1000039,0,1,3ff198d185b1e84f49d2b54ee9bf3954ad21c9eb3e5bef8e702827a693f7d90e,2024-07-12T13:15:11.523000
CVE-2018-1000040,0,1,1e04906576224825e0838d21b3355840fa843a3c62bb9a6a186b1f066b8907e4,2024-07-12T13:15:11.603000
CVE-2018-1000036,0,0,cf5accb052a6cf965bcee24601f9631ee1d4bf5b1178c4b3b4411e318b15e9ea,2024-07-12T13:15:11.203000
CVE-2018-1000037,0,0,d2c2eec4bda81b9a494fc38e14e6c4c163411d355fce6ffd40e3522f66fa4f6a,2024-07-12T13:15:11.360000
CVE-2018-1000038,0,0,c593b7bd3b0d503716b938dbe9474845021720ef3257b24fd05b05b8b36eea2a,2024-07-12T13:15:11.443000
CVE-2018-1000039,0,0,3ff198d185b1e84f49d2b54ee9bf3954ad21c9eb3e5bef8e702827a693f7d90e,2024-07-12T13:15:11.523000
CVE-2018-1000040,0,0,1e04906576224825e0838d21b3355840fa843a3c62bb9a6a186b1f066b8907e4,2024-07-12T13:15:11.603000
CVE-2018-1000041,0,0,1c7b8a1367ade58ab048708aa3cafe3fccf08335df32cd4f8e84f35506794233,2019-10-03T00:03:26.223000
CVE-2018-1000042,0,0,f14be813ddab075254d5991098380200ccd025b3f50ac0160084d3059c59fb01,2018-03-01T15:31:27.683000
CVE-2018-1000043,0,0,233dd7c8c3a5eba4237057cc5b91308d5a18f2a40a5f5f04c0b0302794900f78,2018-03-01T15:31:49.637000
@ -182640,7 +182640,7 @@ CVE-2021-41033,0,0,24bd0fcce23287825d9bc13c90734a454ce763b0fd48ee666433398ee521c
CVE-2021-41034,0,0,a0bce4130e9b172a8c134fb300611067f49454495913ed0012b494c6358cd1cf,2021-10-07T20:35:06.457000
CVE-2021-41035,0,0,55ac0e948ca3894b37f35a2a515e1eb7b0ce1ca1e4f1ecb07b65c883b62862d6,2024-06-21T19:15:20.613000
CVE-2021-41036,0,0,719e0533c9ed84d4c2c527b699d39b5462e4628e46ebe98e9a35515dcd343063,2021-11-04T18:52:35.630000
CVE-2021-41037,0,0,37841b8f97c767755698068c40097eb78a837e2eabb7b25a6644d3e67e6685a1,2022-07-15T22:38:02.777000
CVE-2021-41037,0,1,9cf00facd282e47ce4934d4665516c4800f4294584d2d74947a8b9f4a6e069f9,2024-07-12T14:15:10.960000
CVE-2021-41038,0,0,9eee158ed510ae924dabc62f6adbd1bcceb0960aeab59346131261a8114cb4f3,2021-11-13T03:57:06.957000
CVE-2021-41039,0,0,ee820bb0de6ade7525a950e1a5a0a2a55c750150b3d8285367c995ea37123f84,2023-10-02T12:15:09.793000
CVE-2021-4104,0,0,e0b3ea29b7e4f7728a602d08c283d0b0250a56468e5e5a7251fbfe53ee71a0c8,2023-12-22T09:15:36.510000
@ -197973,7 +197973,7 @@ CVE-2022-29942,0,0,661d7b53b3e4faae469b541bab8f7bb1ef49e85bbde98e3af74e257a20e39
CVE-2022-29943,0,0,433def69a7c009f3ebd39bf21f1aa84ac2cfa7806ad3720df19ed492b3d20ec1,2022-05-13T17:23:57.113000
CVE-2022-29944,0,0,cf3afc94cfcad942eceefb12c790879af69b2dbc44c55bb9999d49beb0903757,2023-05-03T17:27:22.773000
CVE-2022-29945,0,0,68b2d3cfe71207c28c25d66eac2f0eb8c1c3c1858380e0cfd315018919ec3989,2023-08-08T14:22:24.967000
CVE-2022-29946,0,1,35b98985e5959bf121ee889866ada3c50315477891d70bf66d8c217b0e2e59b8,2024-07-12T12:49:11.340000
CVE-2022-29946,0,0,35b98985e5959bf121ee889866ada3c50315477891d70bf66d8c217b0e2e59b8,2024-07-12T12:49:11.340000
CVE-2022-29947,0,0,25f2e84f2fed42f45ce3a64d965cbf21e6b3b6627b019f75c5ee29011befeb70,2022-05-11T13:56:37.537000
CVE-2022-29948,0,0,f6a129c560c6578711433f773fb299062d73607738c33178019b52ca028b1ba0,2022-10-29T02:46:43.147000
CVE-2022-2995,0,0,f92eb44e10925fbf4e4c8f4c80f70b9aa8afd50b91f45434d6648c8bb4ff832b,2022-09-21T18:05:11.537000
@ -226409,7 +226409,7 @@ CVE-2023-35675,0,0,322f35d8f234392eaad24055a30439a2488507eca52e03766c5a55c9f458e
CVE-2023-35676,0,0,35f8ac23549e5de4a664a00239bc3a68fd2c010a469559f32665c4bd41c03957,2023-09-13T17:40:15.690000
CVE-2023-35677,0,0,23fc11675d9ba86843901bb4faf7a602ba1fd7820a122008ea932f97a10101e5,2023-09-13T17:39:58.473000
CVE-2023-35679,0,0,e1489c82741c8d349ff54e21d81eb8c2e7bd79ddc6302af16ecbe9289d13f5de,2023-09-13T17:39:43.833000
CVE-2023-3568,0,0,1da679aba2926270ce6e4e16f84dd57123216b04a688effc4b364e5d296c8c49,2023-08-02T09:15:14.110000
CVE-2023-3568,0,1,16fc4b2c4899ec32532ab1977d49aa0a92cf21f20ade7158957493db49fc0558,2024-07-12T14:17:46.530000
CVE-2023-35680,0,0,9c68d6177e945e6e10c7bfc32d62c7e9ab573ff707c78ee40e3b166bc08a0226,2023-09-13T17:39:23.453000
CVE-2023-35681,0,0,16a3dfe5b52f659d007448c63742257b9c673752d2e068aad56677f46d9e3abd,2023-09-13T14:39:48.377000
CVE-2023-35682,0,0,1220da7a0232745d1d76c07435c1d58ba451e6724dea1cab9127ef6ca7e7ef4e,2023-09-13T14:39:22.120000
@ -226773,7 +226773,7 @@ CVE-2023-36088,0,0,adeb7542a0b36ad0e677bb083548bd690615cee49bea4f9900061d485d1c6
CVE-2023-36089,0,0,2771bc5c879e1de8820012ecba52a4787073b4c27227789fd419ed645c8e8004,2024-05-17T02:25:36.023000
CVE-2023-3609,0,0,c29430198f2d9fc261960f6718c27a668ec89142737d4fdfa398d9c0186ebd48,2024-01-11T19:15:10.430000
CVE-2023-36090,0,0,1888bbe923878ea10fe27029247bdca9c55422ea92c62c35db81fe9d187b808e,2024-06-05T21:15:11.203000
CVE-2023-36091,0,0,b0b65bcb652e9494e978dec75be2d3f10629392cd61662398cf09cc7ddbcc3f2,2024-05-17T02:25:36.197000
CVE-2023-36091,0,1,f54a3f9f64402a144ccb837ea663b986ed5be34b441f62589c80930dc87fa349,2024-07-12T15:15:10.333000
CVE-2023-36092,0,0,5ac46a73cbf9c10e5e9aec3b989e3b303f0326c1702ab98bacf82cfe4c9b7ab0,2024-05-17T02:25:36.277000
CVE-2023-36093,0,0,6ed7b9ec110aa8a1938d3abb701d1b06f356b2415773d1be816930b91e78072b,2023-06-28T07:22:21.237000
CVE-2023-36095,0,0,5979811f6260c02f6160e9c5a8e6c1acc6ac56a969fd2ce4ee9d695a02c55f5e,2023-08-14T18:15:10.927000
@ -237546,7 +237546,7 @@ CVE-2023-51103,0,0,b330d390b448ec6c689497e8d924b0ca338c3534faa25e07b0a7ac42997f9
CVE-2023-51104,0,0,b83b78fa695252b9bc562b66774da5aa3c3d13492f6b25b379db3d99c45899c7,2024-07-11T18:15:05.497000
CVE-2023-51105,0,0,0dbc1485003c4c6257746ac53f11aaeaf8f3a7101c7e00fa09d1e95f1fe0ac66,2024-07-11T18:15:05.590000
CVE-2023-51106,0,0,2ad42e3fc60bf937fccd789a94702f6663bceff82ffdd09e8001ab565c4bd666,2024-03-18T04:15:08.790000
CVE-2023-51107,0,1,a979188fdd0904c359f4e4355843150c502e7c3e5e0671eba4aeda916898987f,2024-07-12T13:15:11.750000
CVE-2023-51107,0,0,a979188fdd0904c359f4e4355843150c502e7c3e5e0671eba4aeda916898987f,2024-07-12T13:15:11.750000
CVE-2023-5111,0,0,9aa75e6a8b2cdd2372d791a9a0def8ce9e9d4923ff9c71c4dfed5da5d92d1561,2023-10-06T17:58:29.377000
CVE-2023-5112,0,0,d81fb9dddba12fffd3f0f7638c38afa8e9a05dbf23a9ba002cb4caee7a6d6442,2023-10-19T20:31:22.843000
CVE-2023-51123,0,0,e782f5906a61f8c3aa5a1e21fdf6b1aef6e06b6b56dc48490245583d92e67251,2024-01-22T16:15:08.230000
@ -241531,7 +241531,7 @@ CVE-2024-0969,0,0,b70a3e678841d5c3e905a1a4d78ee61bc51fd818aa668b1889827f06c39355
CVE-2024-0971,0,0,10711fc5fd019982dab0af4d04cad68f7d925a8d90883facb336aae2462a64e3,2024-03-04T22:58:00.967000
CVE-2024-0972,0,0,2a8d3a85f6223a6c38540c13150a8805bcc289466ff43a37dc35cbb6bde1ee58,2024-06-06T14:17:35.017000
CVE-2024-0973,0,0,87a64eeb8545d2aed4850999f1a0515438bc623727357d945a5399ed140bee41,2024-03-18T19:40:00.173000
CVE-2024-0974,0,1,1ecd9c08c9b1a1cd3e32d8b2ce7d7389423f3770b3d01388be03cdfb85e113fd,2024-07-12T12:49:07.030000
CVE-2024-0974,0,0,1ecd9c08c9b1a1cd3e32d8b2ce7d7389423f3770b3d01388be03cdfb85e113fd,2024-07-12T12:49:07.030000
CVE-2024-0975,0,0,727e762e9bf21cc79d41b3d973240a06501d145479fa8fca0d0cfdc6efc382cc,2024-02-28T14:06:45.783000
CVE-2024-0976,0,0,961ca83ff90147b357fdad21a4ce2284407f8f5fed2f5570590409615417a9e7,2024-03-13T18:16:18.563000
CVE-2024-0977,0,0,265a9a088dbf9179612f3eba4d6866f7160bf19014cca832dc6a54c521c233b7,2024-02-14T18:46:52.707000
@ -241909,7 +241909,7 @@ CVE-2024-1371,0,0,93706cb3903d44813efe65388227c96437c2154d1873db13a512d53a3d1e58
CVE-2024-1372,0,0,fd6a0b0bdbecc63f56aef495458a3c5dd8f2e76f436e6cb5f113766b10bba4a3,2024-03-05T17:12:04.487000
CVE-2024-1373,0,0,6182eba24b857bc2b56524dd4b982074bd00b00d58fe9873ed20ec6b67a1b251,2024-03-11T10:15:49.383000
CVE-2024-1374,0,0,7fe6e2944b2df04d1912da5645567f3da2009d2f734eda817ead1dbb0beca205,2024-03-06T15:26:34.817000
CVE-2024-1375,0,1,b0fbcc81f699e0e89def136608395253cb6f1e83310923c94526748697e14b41,2024-07-12T12:49:07.030000
CVE-2024-1375,0,0,b0fbcc81f699e0e89def136608395253cb6f1e83310923c94526748697e14b41,2024-07-12T12:49:07.030000
CVE-2024-1376,0,0,3f5093aebba17bcc569f7c0a532d073178955aeebf7468859be137b5aa030a60,2024-05-24T13:03:05.093000
CVE-2024-1377,0,0,89ec0d3cfd7c9e3eb401e7d154a45976b7a536cce1245cff377347594bc84e11,2024-03-07T13:52:27.110000
CVE-2024-1378,0,0,861a3323ec8efaeb758681460069e84c3f0f238c20d369cc8b41f972b8f59fb9,2024-03-01T23:02:21.513000
@ -245159,7 +245159,7 @@ CVE-2024-2429,0,0,6f82bfe12677abd0ded60841d7ddd794d901d8b55be20f02cefabe3e057f84
CVE-2024-24291,0,0,ed81ca1f7d07ab5682e5dc3e12510be85bd8028a8e8a8fb1a80b96c7b9ae97e4,2024-02-13T20:13:26.593000
CVE-2024-24293,0,0,eb622a35637583d584ad609649d42dcf62a63a936bf3a82b7c98c7b05f54a6ab,2024-05-20T19:34:58.277000
CVE-2024-24294,0,0,fb53dd3f3a0181debfcca619f6a3363f362852d8c93652ea4617fd4b0661a31c,2024-07-03T01:48:14.450000
CVE-2024-2430,0,1,eb0e5935be33446c712bf3868a6e1b8dfa4465f5af752c0d711629f0c3b13154,2024-07-12T12:49:07.030000
CVE-2024-2430,0,0,eb0e5935be33446c712bf3868a6e1b8dfa4465f5af752c0d711629f0c3b13154,2024-07-12T12:49:07.030000
CVE-2024-24300,0,0,a8dc475a562e17ac269ab87541d5cc3de5e8b25ad6f69c16a9e202ce4fe0a524,2024-02-15T06:23:39.303000
CVE-2024-24301,0,0,eea9ef656f8457ca391649537e978f0d3e4722722df26eae84433b0c4b119a98,2024-02-15T06:23:39.303000
CVE-2024-24302,0,0,772bc3946fe7698710ee11197feaab740359b0c096b2ee136ddb7f1dcb856d06,2024-07-03T01:48:15.277000
@ -246551,7 +246551,7 @@ CVE-2024-26367,0,0,ceb2808d00aec1724941312eb31317fb9ca784802bb2ae58f80e28e9667ec
CVE-2024-26369,0,0,b0322db94f9b89a2da31dd1ffa70ef568f3b1c4901ca044ba9c0ea1e2eb29c09,2024-03-19T13:26:46
CVE-2024-2637,0,0,41c22874cb88b645bccc5162f78b9b5c7f466bc74b1b50f3d7f10bda614ec047,2024-05-27T08:15:09.360000
CVE-2024-2639,0,0,0a379ca73fbb79fdbd8f18fc8cd7d5818278eb25b07ecfab9db46031f52aaa19,2024-05-17T02:38:22.540000
CVE-2024-2640,0,1,da0ff9ba9c7741bdd8eac7278a68a4d2f067fde4d5d893dc82ef3e3b39f7c685,2024-07-12T12:49:07.030000
CVE-2024-2640,0,0,da0ff9ba9c7741bdd8eac7278a68a4d2f067fde4d5d893dc82ef3e3b39f7c685,2024-07-12T12:49:07.030000
CVE-2024-2641,0,0,f8817d39db046b0703540421bdc7defa8773388c970d95d9af56a10acaf6505b,2024-05-17T02:38:22.647000
CVE-2024-2642,0,0,8e9139118e526637636dbb75ee7b325451ccf936f521c86702bbdd8ba223ba4d,2024-05-17T02:38:22.743000
CVE-2024-2644,0,0,10576652d4b00db27dae15790aec2d4421a3f554442aef5d73285e025d9ff0d8,2024-06-05T20:15:12.680000
@ -247026,7 +247026,7 @@ CVE-2024-26956,0,0,03b8b6d93122c87e1d6edb9acf0c32232fac7a1bfa20c866ade9468ab42e2
CVE-2024-26957,0,0,871ec22ed701e6c25fde35c12b49fcc960cd21538002ff829aa32c4c117b7686,2024-07-03T01:50:07.493000
CVE-2024-26958,0,0,14cf34198e5226cd9903fa4b7cd1b1356a627031f18c7d5956b5b6c2e6094b25,2024-06-25T22:15:26.937000
CVE-2024-26959,0,0,b20b713d07b74cf4ab31aefa115749077979ac722940c0353f278e6b20f8cce7,2024-05-01T13:02:20.750000
CVE-2024-2696,0,1,f6d219b24bfcecbacf93f2b1140b3364055c0500efd4e7a7da00be9561ddcf69,2024-07-12T12:49:07.030000
CVE-2024-2696,0,0,f6d219b24bfcecbacf93f2b1140b3364055c0500efd4e7a7da00be9561ddcf69,2024-07-12T12:49:07.030000
CVE-2024-26960,0,0,59e6b3e033a957b45cd72dd6675eb95ba7e94918875e89eeb9cba1fa4639541c,2024-07-03T01:50:08.270000
CVE-2024-26961,0,0,05af2764d15ac446009c797cc05088526f3e6471c70181e566519fae53a37419,2024-06-25T22:15:27.007000
CVE-2024-26962,0,0,21615a88704d38867dbd9993e5fd2c885d58669c1484f879178b0965705ef667,2024-05-01T13:02:20.750000
@ -247408,9 +247408,9 @@ CVE-2024-27355,0,0,f69927749d318ce3d471850deb21bc77767a9c94b5f501be3a1713c1109a5
CVE-2024-27356,0,0,2464f4bdc7cd759969915038df7055199f0bd02c6d9b1a8ceb85c7588507e9ba,2024-02-27T14:20:06.637000
CVE-2024-27359,0,0,d9efe9852d793e4ebe4144d07c8562893d90ae6614ba783353ad624a692629dc,2024-02-26T16:32:25.577000
CVE-2024-2736,0,0,96df463215442710ad6542ed46ad6ce78bf41dcfbe1139413a93d5accfaff739,2024-04-10T13:23:38.787000
CVE-2024-27360,0,0,ef90b211e38e26de7cd6ad266f9667b57752920efeb0c78d69800f0173df48ef,2024-07-09T18:18:38.713000
CVE-2024-27360,0,1,33246297884723d4ff8bb58853158d18ca6235582cb6c304b20ea59c674486c8,2024-07-12T14:57:53.930000
CVE-2024-27361,0,0,e36b02dee6138d8db49ead5ecd9bf32ca156e68e27cc50daa8adffe6cb1ea663,2024-07-11T13:06:13.187000
CVE-2024-27362,0,0,f6cf094287aa89a818448bb40454e447472a3a4a0dff2e33d58ba4042270372a,2024-07-09T18:18:38.713000
CVE-2024-27362,0,1,9d431a1116edfb20ae4c799537e5e9f5d11ebb0847e9e8bdd27f35d143873f1d,2024-07-12T14:58:02.413000
CVE-2024-27363,0,0,f6352d5e26499e6478b31ffa535bfa444a95ad102dd84d5e4c2e7b2372cfbda9,2024-07-11T13:06:13.187000
CVE-2024-27370,0,0,5b56b4aec0b74e65c542ad5e11bbce934e8a13a6890d7d5fbee25660d9ce6439,2024-06-27T16:42:33.073000
CVE-2024-27371,0,0,9a5ee3ff6f4187d583cb003bf2bfa499e427c66f27dff5bb486ff8a2172d0862,2024-06-27T16:40:45.063000
@ -247865,7 +247865,7 @@ CVE-2024-28063,0,0,8b4daa0dfe18458d1d4f0e0079b8409dd79607264a48fce0d64909485ac7a
CVE-2024-28064,0,0,d4ef909cb17c3cdb1e2d0bc0d383e367ea00ec2cddba9dbb7063988318bb0a6f,2024-05-20T13:00:04.957000
CVE-2024-28065,0,0,9c3c0973cec8416a73aebaf79d96b27bfde387bdfffa9e02e29e42d0c5bd8070,2024-04-08T18:49:25.863000
CVE-2024-28066,0,0,8d264de635ae9c8dc6d41b6ed16f7f85828f585eea298ce9fb065b16c33683e3,2024-04-08T18:48:40.217000
CVE-2024-28067,0,0,0af34335bd5c50d512b8c109c02a349e9b931cbcda3258c91f6a4aa62f373bc1,2024-07-09T18:18:38.713000
CVE-2024-28067,0,1,87f8f4904932894fbb80fce767ebf619e7e55e28806f6fe43c6dfd5af113cbe6,2024-07-12T14:57:36.897000
CVE-2024-28068,0,0,bc3074d56d7203ab69c965398848e97ee8558e2f286e7ec5251e1ecf155f732a,2024-07-11T13:06:13.187000
CVE-2024-28069,0,0,99a57a9955c5ed5463e7c560b95e0a17dfa2789ec3c024f2825003d476d4b80d,2024-03-17T22:38:29.433000
CVE-2024-2807,0,0,ceddd5b2cd81d31fee5f18b8bacde7f821c00daf332201952118e19cfa7a07c3,2024-05-17T02:38:31.100000
@ -249855,7 +249855,7 @@ CVE-2024-31114,0,0,2db2f19bbb762fd0846a2fd0f4c21316984760b44cf0e285d2fa1b7eb4e97
CVE-2024-31115,0,0,f67bb2935cdc482183cf83d729450e227d4215d9791e6eef39eb5dd63dc4ee92,2024-05-08T13:15:07.937000
CVE-2024-31116,0,0,3e5261af5d77a4c950ede646e6aaa3b3de701ce47018fc260e62e0781699fc7b,2024-04-01T01:12:59.077000
CVE-2024-31117,0,0,f06fda643bf8c516426ab572b27573cbf6214c3aa5f8b1df27ac2265745b81dc,2024-04-01T01:12:59.077000
CVE-2024-3112,0,1,fc2fc771752261fabb4adaadd46991f5bf2193940a3823231630b345a52a575d,2024-07-12T12:49:07.030000
CVE-2024-3112,0,0,fc2fc771752261fabb4adaadd46991f5bf2193940a3823231630b345a52a575d,2024-07-12T12:49:07.030000
CVE-2024-31120,0,0,7340f0aa8567a325d352b7087d6dd0d44e3a1e7ab597204dd16dbc0e323747bc,2024-04-01T01:12:59.077000
CVE-2024-31121,0,0,4fe9a2eff5a4d2ff266e2e268b50578938b85c71b50b3bd948fd3ec69947d849,2024-04-01T01:12:59.077000
CVE-2024-31122,0,0,745a899ec0013d7867b6d15accca135c5ce3d8a09d809883e11eb140dbea32b8,2024-04-01T01:12:59.077000
@ -250384,7 +250384,7 @@ CVE-2024-31952,0,0,5f29e6541e024f9b1bd72bdf8ee8e438dfaedf18a9a002e17369656e46ca5
CVE-2024-31953,0,0,473e2dd03665c41fd12eb732a6a8b796dd851974540019960eeeb8c84154b002,2024-07-03T01:55:35.270000
CVE-2024-31954,0,0,75cb48abade3eb19dfa6628441b7fbf62791ae48f745250b97879749047eeee3,2024-07-03T01:55:35.973000
CVE-2024-31956,0,0,56222bae986fe87c83c759cf706c4f2021e893534f083e7f4ddb4dffa4c53b2c,2024-06-13T18:35:19.777000
CVE-2024-31957,0,0,43703613c7bea46803b3bce5e3c9db2f1fdcbd1e957e3164e13b43bb337eeb57,2024-07-09T18:18:38.713000
CVE-2024-31957,0,1,52e3fc3f2f752e45a27580270575f061b25dbef0b821774e0c078c02042898e2,2024-07-12T14:53:30.260000
CVE-2024-31958,0,0,92a0a8c4e3002c821a3c846306658e74a9964a41bffea58fc59bb9ff3c43087c,2024-06-07T19:24:09.243000
CVE-2024-31959,0,0,881dd9c88eb573b82854e8881ea0e763e3c9111ab6dfe4157e823bc664d8a323,2024-06-07T19:24:09.243000
CVE-2024-3196,0,0,d5a1cb2b9527bda623e9f193c03f796a5c33bdfc24e5ed9d8b0d65fcf6304b33,2024-06-04T19:20:17.433000
@ -252742,6 +252742,7 @@ CVE-2024-35769,0,0,b840b07385ae432507ae45cb438b4a0cd2aaa5bf7ff52d81e4150e6dc2a38
CVE-2024-35770,0,0,09521b64c1f9557fd8a7d05a96098640c8e563f4348469cb1598a3e17b6eb673,2024-06-24T19:25:21.117000
CVE-2024-35771,0,0,528377e8b245533dbff20e4b0dd7328468397780793d88ed8bf6cc52e2f75614,2024-06-24T19:25:46.967000
CVE-2024-35772,0,0,2d0d9c98f803d200fae5d0e084d548bff2c25e4891c370629239ed163d3750c6,2024-06-24T19:26:14.460000
CVE-2024-35773,1,1,54d31c67424d3953eb3eb72aba1d79c640f1b895e73708478cc2eed5ebe870f2,2024-07-12T14:15:11.437000
CVE-2024-35774,0,0,b04163e5e3aed962a8bb022fff4f15fd9953a3840984351341e879118df53ab8,2024-06-24T18:43:57.633000
CVE-2024-35776,0,0,843520135517b374d77f0b73e5d208e8aee82b3db16cc26ae6b37a47d0e96e08,2024-06-24T18:49:09.500000
CVE-2024-35777,0,0,7515dddc5351fc16fba23045723f9d79e6a247348fcb082c517c87296afa7e23,2024-07-09T18:19:14.047000
@ -253254,7 +253255,7 @@ CVE-2024-36378,0,0,9a645ab04ee516fa09b03bc4e8214d07cbca3e9e91fbad3f5da1fbc4f30ef
CVE-2024-3638,0,0,620fdccfcdbef1110695fe5f4df8efef5a2f6320fb9175c618899b2ed73206f0,2024-07-05T17:14:22.140000
CVE-2024-36383,0,0,024d8f4d1ca5f23e8a0ddc855e927c6f952336db279cffee80e19f08304118ee,2024-05-28T12:39:28.377000
CVE-2024-36384,0,0,2ec0cce63a143f80e95d7d72dd49a2947294c5f3ef9bfcaa5dd3f4682e62278f,2024-05-28T12:39:28.377000
CVE-2024-36387,0,0,30cd4e98c76c613d6d4e2d23b843effa10bf0587b56149c70ae98f3cd5a874a4,2024-07-02T12:09:16.907000
CVE-2024-36387,0,1,a2bf37a0e64575b7db49c720ef2f1af1931a4f978873dbf393d59870fa3eb3f3,2024-07-12T14:15:11.670000
CVE-2024-36388,0,0,c862c36965d96dd7dbce4ad8e507845635d584cc35880dbb4a1f42f921fb4889,2024-06-03T14:46:24.250000
CVE-2024-36389,0,0,b7f3ae9ec80f48852fb2df638815a295e32fee22ddec84c26d88db15c966ccd5,2024-06-03T14:46:24.250000
CVE-2024-3639,0,0,3825ec646e59832bb04bcf2ca3ea29324db47c6b5904b78d5f1a541ade617b5c,2024-07-05T17:14:37.093000
@ -253296,7 +253297,7 @@ CVE-2024-36426,0,0,081cbabfe1f165d2e60c6bf5434c4cea5a1c1465246b1d9713d429b0a41c1
CVE-2024-36427,0,0,10c5dade9c11af5e52239a7a8c18438909a8ea6a201617061be6b7626f49e18c,2024-07-03T02:03:12.033000
CVE-2024-36428,0,0,34ee364c5a9075f639864e5b9724315f875ffecaf1e3b09c0e9021977a7b8d2a,2024-05-28T12:39:28.377000
CVE-2024-3643,0,0,52bab63bfc91b1f0b9d75e6e14dccb142e0861ecbf55c57479143676f8644d3b,2024-05-16T13:03:05.353000
CVE-2024-36435,0,1,d5db9c80751c95bdb9d7c8677b360e81635e7c29402d5e581205685bb84d0c00,2024-07-12T12:49:11.340000
CVE-2024-36435,0,0,d5db9c80751c95bdb9d7c8677b360e81635e7c29402d5e581205685bb84d0c00,2024-07-12T12:49:11.340000
CVE-2024-3644,0,0,4e49052df3e8a0f31e3394cce710c4ef728e2bd6bf109b57603d53a5d48d8bab,2024-05-16T13:03:05.353000
CVE-2024-3645,0,0,9bfaa42192c6fa49951fba1d7645fb7975d3a2b4cd9bcc55a7dd9ceef33e077c,2024-04-22T19:24:12.920000
CVE-2024-36450,0,0,32d48285c32086a3f09c628c1971379077a46741ecaad7df002b03827ae59ffc,2024-07-11T13:05:54.930000
@ -253331,7 +253332,7 @@ CVE-2024-36502,0,0,af0ea55ba6dbd08cf23c5f8732d2aeb0cf79fdfab13bdf5e07cadc4434254
CVE-2024-36503,0,0,3aef981902bcd0cfa43896ed1ada7c9ec64d59690838f1ba35c268bf26e5218a,2024-06-17T12:42:04.623000
CVE-2024-3651,0,0,3337eb59719c2f9e59e57f7ed588f3375e47160773d149a8aeb60c1398d8674e,2024-07-11T14:58:01.803000
CVE-2024-3652,0,0,455dabb71414a7592172807b25da69c5818ecc78456d9f87c63904d4c0988a33,2024-05-01T17:15:37.793000
CVE-2024-36522,1,1,3395c83dcac3d99535db7023fa2db1fe9767a840c6a6a7d51d7ea523625135df,2024-07-12T13:15:11.867000
CVE-2024-36522,0,1,b1dc04c67f987c4bfa23870d3f43f935e40cd1fe2c0c927b9ff9a9dea93b4987,2024-07-12T14:15:11.987000
CVE-2024-36523,0,0,779ff20f3e54c54b68fa38cf8a73a6874fca821f18024ef38fb974b398395dd0,2024-06-13T18:36:09.010000
CVE-2024-36526,0,0,1ef54497acba69e484a273933341aeb22209d47656c43c34648a5bf39e748b3e,2024-07-09T18:18:38.713000
CVE-2024-36527,0,0,5a4da781a91464af6910d804126691f30125cf5f5ae9e52379cc70e43ae0f627,2024-07-03T02:03:14.827000
@ -253708,10 +253709,12 @@ CVE-2024-37185,0,0,ce3a2eeaa366e0078438541c31768228f57c06809ab185bd78a5053ce3cc0
CVE-2024-3719,0,0,d2320674d04cefde56a0b36b463f74328d6f18494803030bdfe9b0b1b4374afd,2024-06-04T19:20:23.553000
CVE-2024-37198,0,0,8919c8b8db43ac2a9639793fec092e2666b55422ab58e48ee04c39b0bd19361a,2024-06-24T18:55:25.417000
CVE-2024-3720,0,0,f4e69514093cc630aeda39d0a41fe705e0d9916a1077cef429b7dcf05a404308,2024-06-04T19:20:23.660000
CVE-2024-37202,1,1,0d4818ce41c16c32549398108254917f171368dee0decdc62d4f66939f71e34c,2024-07-12T14:15:12.063000
CVE-2024-37205,0,0,536e384912a3e40e30cd6e5099a5bb49f28b5542a5391ea994ed78796c432e37,2024-07-11T13:05:54.930000
CVE-2024-37208,0,0,88780676ffe1ae9fd897090b91bc042de66f491603ea11b382a3765c84e6e5c8,2024-07-08T15:49:22.437000
CVE-2024-3721,0,0,ec8dc4b0ad5d1d9ba11acb18015142f7d1715fd653f7ca2987e266e9c9e8ef01,2024-05-17T02:40:05.290000
CVE-2024-37212,0,0,cb0e3003beb0d778b1e3e4d8f1145799c285874f36dc8f863bd0c5bf6222df34,2024-06-24T18:55:34.983000
CVE-2024-37213,1,1,ea25614cc72bba8c4368ba5e9a46848a5b08468cbfd84aaaeeae33591b13abf7,2024-07-12T14:15:12.293000
CVE-2024-3722,0,0,7c1b4fae7e86bf4c1bc76a0d39819ffc592a7b598c7675ac0628daa278671c4c,2024-05-14T16:11:39.510000
CVE-2024-37222,0,0,65c65c234c553e022a88bb4c0528d9ed3832ed1be7f7805c03100111f1d159f6,2024-06-20T16:07:50.417000
CVE-2024-37224,0,0,fc40d5b6b74fc1782a65f4f7c695d8fcd21ddc977f3f6d2f46d2a7ce527e9818,2024-07-09T18:19:14.047000
@ -253867,13 +253870,16 @@ CVE-2024-37539,0,0,c1651edacf32c123789feecb68380de8605a889305b418dd39079ef654272
CVE-2024-3754,0,0,01f193c84b52f462bda07bbe4a51fb49e63cd8bf2361f6b49c817e3a59b81e5a,2024-06-17T12:42:04.623000
CVE-2024-37541,0,0,1f46bbe98bcc26e8385382a14ef7dedf6c0e9f6a09394a6b26798763f5000b58,2024-07-11T13:13:15.977000
CVE-2024-37542,0,0,6d89e302c059e61e6dee79263ba1d9b292db94b7349a74f25580291f658a0ce4,2024-07-08T15:49:22.437000
CVE-2024-37544,1,1,49f523eb357aaee6cc179938d5ff139b7d48a4d89488a2cafe1b9f0927f29953,2024-07-12T14:15:12.540000
CVE-2024-37546,0,0,95bca18091533d24779b9d9541af789d17a54cddb8f47507626120eab0314784,2024-07-08T15:49:22.437000
CVE-2024-37547,0,0,da07cdaafbcdf5f6f48dcc010bdacf6feb2c6627ede1b87455a66a3564df588f,2024-07-08T15:49:22.437000
CVE-2024-37547,0,1,ec68c48564a9a0fe784f3360220a1f143b8b28bd4fa06f56554dd338a3515c03,2024-07-12T15:29:59.473000
CVE-2024-3755,0,0,255cc63bdc34aca663119fb8f6757a7da5a9acef7ecda034d88dc05babf4b05b,2024-05-06T12:44:56.377000
CVE-2024-37553,0,0,2c2a00ab257e5ea7ff19599b29cc2a5e0646dd67b7caab870443507e76e52a3e,2024-07-08T15:49:22.437000
CVE-2024-37554,0,0,e1a6b47d51956c437547356dbc2d3d6d948b498c5d648044ffbed144c9e5226c,2024-07-08T15:49:22.437000
CVE-2024-37553,0,1,5fb366736775031e7f51d377e259cd5fd849d825ec5c66cfcefe7a5c9ef4717b,2024-07-12T15:24:47.953000
CVE-2024-37554,0,1,f21873c8cc723d73a5be37e43f70a0cc0c9c1c460efddd02b4e8ae7999da0e5e,2024-07-12T15:34:57.437000
CVE-2024-37555,0,0,c8f3e7cd770b30d6604350e19dd27d9ae30c1b920108aed729ba94cc31ccb66a,2024-07-09T18:19:14.047000
CVE-2024-3756,0,0,9f6325e6bf8bb208b4e2ee6674c7d5cde657d33007cb72c8f23cf7232b49431b,2024-07-03T02:06:32.530000
CVE-2024-37560,1,1,e2f9d7b3c87db1cbbca48a3a282f569dc2d2112cd5901e96bbfe6fb9dca5d6a9,2024-07-12T14:15:12.770000
CVE-2024-37564,1,1,25c6db9120ae07ddc27ceffbf3923d2034cee6f450555f27b1019e347f4909fa,2024-07-12T14:15:13
CVE-2024-37568,0,0,e54134c743ff1c9089094584276cdc79416cb675a0fc4a7177e49bc6dbf3bbc8,2024-06-20T09:15:12.253000
CVE-2024-37569,0,0,d72ceb83b037eeec35f3e81abfdf503a49618e4aba004fb3f45e6970df347f2e,2024-07-03T02:04:20.517000
CVE-2024-3757,0,0,62301a2775fcbfb9e8b5b1aa90b79aa074cd639699f2863765d338333af4b798,2024-05-07T13:39:32.710000
@ -254019,9 +254025,17 @@ CVE-2024-37905,0,0,76667799c8b41a4c84b1440977b5297bf4074f7f71d64c5e6ed0abc93aad0
CVE-2024-3791,0,0,9bc6cec70e672f5f7f9ccdb1c0603c19b269c41965293930113b85d0de980142,2024-05-14T16:11:39.510000
CVE-2024-3792,0,0,cf023b5179bed164faad65630e21cc1d1811b19d16667a2b08c63260eab0a5be,2024-05-14T16:11:39.510000
CVE-2024-37923,0,0,0f277f016f5fbeb4c94053f1c3c5921e348aa14bf063918224f804db2fff94d1,2024-07-09T18:19:14.047000
CVE-2024-37927,1,1,02aad720e8084055f0b8eac1715ec086aaf27e91e6fd6c4766cba18cb9faef29,2024-07-12T14:15:13.237000
CVE-2024-37928,1,1,6c8fc236be1bff03a6a604b8e6f1da8a8dc8d6cde87c5441fb2c29230a1dc3d7,2024-07-12T14:15:13.463000
CVE-2024-3793,0,0,ee3137e362c58246aa5051457614bdcb92cca84e4e50c79d141ea28f09937fab,2024-05-14T16:11:39.510000
CVE-2024-37932,1,1,942ec78ee4e7934a823831623390f5e9368f0a77429d2d86ad8610663f3c911e,2024-07-12T14:15:13.717000
CVE-2024-37933,1,1,bdb18c55a3292180d660f75df726598cacbec2253334aab0788499e49f7aea37,2024-07-12T14:15:13.943000
CVE-2024-37934,0,0,73bc3188674b33b5b84aa3c0e565fb6ff6ad526723a0d151d8961f661c3ae3de,2024-07-09T18:19:14.047000
CVE-2024-37938,1,1,2c8485cef48b2d8ac978d18d74d8a078d1a037a861b0989098b08b76a4eaab87,2024-07-12T14:15:14.167000
CVE-2024-37939,1,1,31a537236948b357421d24171343a9a41c84f9549e6fbc3ecf17231af7bd0834,2024-07-12T14:15:14.380000
CVE-2024-3794,0,0,153385e096cd7f2ece15b2458b2e9fc3a616d4e8c794288f506409f055c02738,2024-05-14T16:11:39.510000
CVE-2024-37940,1,1,213f6da03408208eed295b8c0b8b6c6599a9d63f39ea70c711e8d368ccb75bdc,2024-07-12T14:15:14.600000
CVE-2024-37941,1,1,e499acbefe749ddbd08c2de7035d77f5619a1e05b8aafaae8ab33bf4483d4c00,2024-07-12T14:15:14.817000
CVE-2024-3795,0,0,394c789f966243db6d7a4bfee356db0989703de57fa4252b7833b38d6036f026,2024-05-14T16:11:39.510000
CVE-2024-37952,0,0,efacc21e38d6706da70765419ba1aaf970dc02db0084584d635a45f192b58b3c,2024-07-09T18:19:14.047000
CVE-2024-3796,0,0,8b56f1ae3498f70c780deb392dd70e4b0e2eb55d8dc491cebdead02f06bb596a,2024-05-14T16:11:39.510000
@ -254111,14 +254125,14 @@ CVE-2024-38080,0,0,0b30162da9e985ccc862a1722fa27f1aee2c43036f0821b6ab829416dc832
CVE-2024-38081,0,0,b9330c7e774e060916883ddd31b48db87a543a1fe7cb381f2e7435e21c1c1d1a,2024-07-09T18:18:38.713000
CVE-2024-38082,0,0,bc9f32f06527a9ce5c1b3af2dd4bee3be5b0ec1019ac580769fc66f0b9304f74,2024-06-26T18:15:15.067000
CVE-2024-38083,0,0,b61c1ffe6c2964ef8e02b76eac914876419214d04e7ace88d2f1669ac6f4c07b,2024-06-26T18:15:15.170000
CVE-2024-38085,0,0,613bc41729e2540d50034b533de8a1465918e0bb243683fac4dfd7af0e36fb7d,2024-07-09T18:18:38.713000
CVE-2024-38086,0,0,a08a596ab0ac96c771cfd054fe636f26f6ec1f15d1f3ff7eda542e3d7f7f5f63,2024-07-09T18:18:38.713000
CVE-2024-38085,0,1,9b225805c27fe0d0f49cd4b33e0b85b6db3f312de1c827973638cc83fbf3b27e,2024-07-12T15:46:00.290000
CVE-2024-38086,0,1,4f4a5b4f26b1b47848469ccfcb494665e77622145d878e8bcca629184e833a43,2024-07-12T15:45:05.137000
CVE-2024-38087,0,0,d1c57445a6a2750d20b80d47fd627cd7c3d206795fd15419f3582a4d2db4d11b,2024-07-09T18:18:38.713000
CVE-2024-38088,0,0,7b12d5c05529a5ffc5848aeb30dba14e784661b2c7fa8f10731623c1526840b1,2024-07-09T18:18:38.713000
CVE-2024-38089,0,0,d5c64193d1f389710f9abd25f1585b8a713804000b2c0dcf9d6625d282b511c8,2024-07-09T18:18:38.713000
CVE-2024-38089,0,1,f43516e20a67775fdb300c6589bec8c27ea499a370a6240ad0d19a7cb49660e2,2024-07-12T15:42:39.127000
CVE-2024-3809,0,0,a034925aa5fbdeb8d8f213935fba76e152f9c290a4a5d18c12398fefebad7ce4,2024-05-14T16:11:39.510000
CVE-2024-38091,0,0,18cbe1a51c984015b31aedde540c43ff8f7157768403dbb39c90de586b3e0884,2024-07-09T18:18:38.713000
CVE-2024-38092,0,0,efd36a5afbece92529811b85942dfa3801f16bfc9dc04072d0a1d6de9d601119,2024-07-09T18:18:38.713000
CVE-2024-38091,0,1,a9751e3868c0a113eedbccdcd34b91f06a8adaf90dbd1405bbcc8c2a2900f94c,2024-07-12T15:35:41.100000
CVE-2024-38092,0,1,fa52aaacdeeea4f553a80268533abc67279c4becb10c86c23506d5aee3ea5aea,2024-07-12T15:05:16.757000
CVE-2024-38093,0,0,7a6528d9ef9e37de49cc37136719775ad4ca6736203f4bafcb828a0b50954922,2024-06-26T18:15:15.260000
CVE-2024-38094,0,0,acf9b14cc18bf684a3807e3f8aab28f09790dad10479460ab41f157199bfc8c8,2024-07-11T18:27:53.843000
CVE-2024-38095,0,0,b0c4146c3c5698cffee7ab10e0a7873691f618c4c7b8c0ade94c4f51d88f93cd,2024-07-11T18:27:00.083000
@ -254248,12 +254262,12 @@ CVE-2024-38469,0,0,511cfa020ce0415f6c58505919037fce87bd20a70c430acbe541f3249cbfb
CVE-2024-3847,0,0,95f9ad8fbf5c3c80550e0a325ff7f48c02be2f78865a75992b282f70c630bcf1,2024-07-03T02:06:43.977000
CVE-2024-38470,0,0,e532fc2610ce0ba05d395b2565b3921da00db5c8c8ee1a62b50a319ed8de746e,2024-07-03T02:05:07.477000
CVE-2024-38471,0,0,3da065067273e795c22a9430ea2650425c29da7d06ad6ab18b550114c797a95a,2024-07-08T14:18:45.747000
CVE-2024-38472,0,0,58c9cf519f027bb399c29f941525d51dfd3472bcdf6b51d4d38d0e3dfc4a8b3c,2024-07-09T16:22:46
CVE-2024-38473,0,0,4a52332d99fe848743528bbabba861df2f74ad2accfcf888abc7220000504fe8,2024-07-02T12:09:16.907000
CVE-2024-38474,0,0,d9563f48d3829949fd43481a10c11343a9dd1b93362516af40fb11af0189d44b,2024-07-02T12:09:16.907000
CVE-2024-38475,0,0,a35882af8549de31719dfb044d0026ec782ef0f7c68b1f3c7e2c6bf51a72fff7,2024-07-08T14:18:45.973000
CVE-2024-38476,0,0,46bc53cfddf3e233ea77062d07dd41304e3870288ed097ef039059d82cf67ddd,2024-07-02T12:09:16.907000
CVE-2024-38477,0,0,eb0332a2b53c3e5586dd1247a7159fcc1f059464374911861a40723e97a36d4c,2024-07-02T12:09:16.907000
CVE-2024-38472,0,1,0483e32b4907ebc7f547fb87caf5b24bef6a9183e30ea4e30b4ad6dc0faa92cd,2024-07-12T14:15:15.043000
CVE-2024-38473,0,1,245312e7d7d612318428b6f6fd5684a8209079166a2fe62e2b2041929b5a3f74,2024-07-12T14:15:15.133000
CVE-2024-38474,0,1,8beb2e175a9bc559fef9a6900cd3fa063a7ab70cfb348bc0537e77ddd5eeb3f1,2024-07-12T14:15:15.203000
CVE-2024-38475,0,1,4434bbc9e26235e103b2ea8722d70e74e682dd306d9d4b03d295c12ec512ff31,2024-07-12T14:15:15.277000
CVE-2024-38476,0,1,b3d9539bc16644d562156587edde82f59f7e5b8caca519713a03097d766f34a6,2024-07-12T14:15:15.360000
CVE-2024-38477,0,1,4e865b7fff5c5346863d587e484df8d5b457292ae17a1b95a338aa934a1871cd,2024-07-12T14:15:15.430000
CVE-2024-3848,0,0,cff2d1cd97f0b1f2183f9bb4edcf4fc45d9e2b8ab251b9953f6af6105249c0ec,2024-05-16T13:03:05.353000
CVE-2024-38480,0,0,04c4f9e75ecb94da8a57533882d0899c4c9616c45f6d4f0fa40fb0af2c036f64,2024-07-01T12:37:24.220000
CVE-2024-3849,0,0,d4181d6192aab2f4a2b324451fbda7660fbd9621eb95f5f54a642a6a3d1e7d46,2024-05-02T18:00:37.360000
@ -254409,7 +254423,12 @@ CVE-2024-3867,0,0,1b62d18c2024e05920e3c0687ff0e24e4f942ae67e75e66374d57866a82141
CVE-2024-3868,0,0,fa696e39218c1556f1f2ca1f996b19eb0035252ea0508a442b035effd05169ef,2024-05-06T12:44:56.377000
CVE-2024-3869,0,0,5fe681dc14d2de5e9dd5b2f66bac58fa145bb31944427d754a663b3ce277c72c,2024-04-16T13:24:07.103000
CVE-2024-3870,0,0,44d83767f5c52c0f17c52eb36fb2fa9bb07435948302a8148c6bc8c0c6888d67,2024-05-02T18:00:37.360000
CVE-2024-38700,1,1,673301cf8317d986baab6dffe91ed3cfe47f1e87949addbb590da15df8553326,2024-07-12T14:15:15.503000
CVE-2024-38704,1,1,bb26fa9f4e8c8ecb70c958d65a82f9d14d973506e02da24ea59f9fe14620fe92,2024-07-12T14:15:15.710000
CVE-2024-38706,1,1,2c05e9557ea300dcf3e8241a6c4ae2991ccb21cfe6101870f42e05706452617e,2024-07-12T14:15:15.957000
CVE-2024-38709,1,1,a53259d440e9803f2fada61a8d2cddc502f84aa97eee7bb0664228f2ab4d5a42,2024-07-12T14:15:16.183000
CVE-2024-3871,0,0,9131680dba8c26c19b55533e86d2d270f65815944bae2f8fbcd8e63884ab3cf1,2024-04-17T11:15:11.403000
CVE-2024-38715,1,1,31ad930eb6fc7ce111afe530364c6c8276f6719d63bf772611fc460eeac552c3,2024-07-12T15:15:10.830000
CVE-2024-3872,0,0,1b0df76ddcb9ce5edde75b1c572a6253db6bd37bbe91d1899bdf2bd4ba86a63a,2024-04-16T13:24:07.103000
CVE-2024-3873,0,0,6d513ad90fbcf7cf9dc14bccfe49c3692f3f8e6afa6f4dd6471e0cb11781355f,2024-05-17T02:40:09.627000
CVE-2024-3874,0,0,0b044f7635c5f6b9eeb150631f42de7f29fc07a4ea0b0fc3596a05b97253f25a,2024-06-04T19:20:25.697000
@ -254453,8 +254472,8 @@ CVE-2024-38953,0,0,14ff5a9bfe221f516876a8c4af423fbe5b0080aa7f8d53caea4e126c078e6
CVE-2024-38959,0,0,cfec0ef25838165e6aeb5c8d3c664ec76927671369d600966c63c52c96a40800,2024-07-11T15:06:03.203000
CVE-2024-38963,0,0,d6810e29d19f952e1613d829958cfc344b3c3660b4b5f6561b4ad90c435b0dfd,2024-07-11T13:05:54.930000
CVE-2024-3897,0,0,2e6547d98bffe49274878683fd846b0dea4d063f5cc123163d759ecec392b068,2024-05-02T18:00:37.360000
CVE-2024-38970,0,0,91e8208e5384541de7bb386d755fd4eb6bf4f61a3ae0e0940aabeee93bae88f6,2024-07-09T18:18:38.713000
CVE-2024-38971,0,0,dbcb37d6e160e35ce881158758f6ae2e24bc77c4d53fd897245319338a4ba293,2024-07-09T18:18:38.713000
CVE-2024-38970,0,1,eb04e06c9fbc74e88c4fcf5d6eeffbd442cec39d7eaf1361f68ecba935eabe9c,2024-07-12T14:51:48.070000
CVE-2024-38971,0,1,46979c6cce7787051e40b62dba0207d3f5f20f29a3ce299a21265249d3eebf4c,2024-07-12T14:50:45.817000
CVE-2024-38972,0,0,266b969944e47c34c5065969d4aa9af417e70cd96f058167cecf53341667f408,2024-07-11T15:06:04.187000
CVE-2024-38987,0,0,0c71f898711274c7ac1489fe714f2d31dbe2fc7f130139d062fe917d9ea47c74,2024-07-11T15:06:05.027000
CVE-2024-38990,0,0,501931c40b72ca4a3b10df5757210e9290217859750e859ab66984c960fc5bf4,2024-07-03T02:05:27.837000
@ -254588,7 +254607,7 @@ CVE-2024-39330,0,0,df282f57bb00a86772e9e77e51a445a51be95fedbc3011c51977bbb06b0f3
CVE-2024-39331,0,0,e27921e016dec51173f86ad420de9e9174de4baa540da3f53e6e1157ef72adc9,2024-07-03T02:05:47.260000
CVE-2024-39334,0,0,7a242c73a28ed17874e43348a26da2104869d7ef8d91c48fe0d8d7e00f57c31d,2024-06-24T12:57:36.513000
CVE-2024-39337,0,0,7c96f97902de4594057b22d7507f3218093cc9f703d055990179db138387110a,2024-06-24T12:57:36.513000
CVE-2024-39340,1,1,2e650af67550d0765320a12870128d71733679d2917a81636a5621a2bb6ebd67,2024-07-12T13:15:12.057000
CVE-2024-39340,0,0,2e650af67550d0765320a12870128d71733679d2917a81636a5621a2bb6ebd67,2024-07-12T13:15:12.057000
CVE-2024-39347,0,0,f5c35927ca6bc6b01c0289886e48e1c26a8232470e7aa98c1613809c151fa9f4,2024-06-28T10:27:00.920000
CVE-2024-39348,0,0,2a1296fcec22eeebebee71405ce5a2bc1d4e2308cef94a30f20c08930acb2eae,2024-06-28T10:27:00.920000
CVE-2024-39349,0,0,e2c0ea0897db587383c2ec6939a8e8f30324733a4c2be5e6f6d88b1c64f32222,2024-06-28T10:27:00.920000
@ -254654,24 +254673,24 @@ CVE-2024-39490,0,0,a8cddc58398343c24172558bf85f4c7a72ad4cfe7677faf71fbe027877601
CVE-2024-39491,0,0,af25979e19919d2c32f2a4545b8f16aa1b2a079fea20c3993dde8a730fddf96f,2024-07-11T13:05:54.930000
CVE-2024-39492,0,0,625213f757b099ac014e1ec8aa2bfb66b87e041fe2911867f1bfe6984535b4b6,2024-07-11T13:05:54.930000
CVE-2024-39493,0,0,edb61e2bdcc22b19fdda7456b1765ba09bdac53634d9f36b25d7f9ffc79b9375,2024-07-11T13:05:54.930000
CVE-2024-39494,1,1,2a4dbe30e4912b7fe925128344fc1138e7252df2957447adcb1a7761d10a95f3,2024-07-12T13:15:12.113000
CVE-2024-39495,1,1,af9aa3bba5f9fb4cc57530b2118ab9498881adbee5c510d82d2c079f027c848e,2024-07-12T13:15:12.183000
CVE-2024-39496,1,1,347102101189bc5438bb6abc85d2c08db2c81257649d6e496a5447422c370af7,2024-07-12T13:15:12.253000
CVE-2024-39497,1,1,8404c517df726a39bee7c81d6607391a60ac7e4ca03a6541edda6c7ee5195237,2024-07-12T13:15:12.320000
CVE-2024-39498,1,1,f70900d71bdd204f92374fab28c2b54a9fb468e0a5f4e912c595a06a5ce5a515,2024-07-12T13:15:12.387000
CVE-2024-39499,1,1,e8b880ab5c7d9afad01784818f836c39ab863c33d066de4ab84c1dc3d80be7e6,2024-07-12T13:15:12.450000
CVE-2024-39500,1,1,131b6c4e2c4272cd9d0d398dc3b241f84178d11dbf50b53fc032f4b64b1bedd7,2024-07-12T13:15:12.537000
CVE-2024-39501,1,1,42d068ace67bfe1968100ac66d5d1148642082150f857f232b9cfb53d0990723,2024-07-12T13:15:12.600000
CVE-2024-39502,1,1,6adeebeff107981b812c767ac03278bb6342100f1cf3dea4133d897fc243b653,2024-07-12T13:15:12.680000
CVE-2024-39503,1,1,f8bafa99e254908b3f4c5a85f070c05b244e665a763ba41b7f7f04335286146f,2024-07-12T13:15:12.757000
CVE-2024-39504,1,1,3f881ea9875a46e48840c4d2c1d17e9631f00499bce2c7c2cbfe2691c197bf52,2024-07-12T13:15:12.830000
CVE-2024-39505,1,1,f5bf4141c4245c7ba154ff57050bb4a8e11930c8954e69947c7a74145b3e5584,2024-07-12T13:15:12.887000
CVE-2024-39506,1,1,cceb607d02e9db80289f8439fdffb3960db5dc755fc2ad3e12938e5ebe7a0c89,2024-07-12T13:15:12.957000
CVE-2024-39507,1,1,adb2d4d2663d4b2ff2dee7ae85ae2e9d5d26e910bc9e21d32bb193b099d92ba7,2024-07-12T13:15:13.050000
CVE-2024-39508,1,1,c4912f81ff9ab0865da4bab7618d87ca7f25b2f75094f89b1b9576ca3c4aae45,2024-07-12T13:15:13.130000
CVE-2024-39509,1,1,d4d1a67211087aa2f1b7687c0919d7034b7a6dc9068ccbec5978508fa2e4c925,2024-07-12T13:15:13.197000
CVE-2024-39494,0,0,2a4dbe30e4912b7fe925128344fc1138e7252df2957447adcb1a7761d10a95f3,2024-07-12T13:15:12.113000
CVE-2024-39495,0,0,af9aa3bba5f9fb4cc57530b2118ab9498881adbee5c510d82d2c079f027c848e,2024-07-12T13:15:12.183000
CVE-2024-39496,0,0,347102101189bc5438bb6abc85d2c08db2c81257649d6e496a5447422c370af7,2024-07-12T13:15:12.253000
CVE-2024-39497,0,0,8404c517df726a39bee7c81d6607391a60ac7e4ca03a6541edda6c7ee5195237,2024-07-12T13:15:12.320000
CVE-2024-39498,0,0,f70900d71bdd204f92374fab28c2b54a9fb468e0a5f4e912c595a06a5ce5a515,2024-07-12T13:15:12.387000
CVE-2024-39499,0,0,e8b880ab5c7d9afad01784818f836c39ab863c33d066de4ab84c1dc3d80be7e6,2024-07-12T13:15:12.450000
CVE-2024-39500,0,0,131b6c4e2c4272cd9d0d398dc3b241f84178d11dbf50b53fc032f4b64b1bedd7,2024-07-12T13:15:12.537000
CVE-2024-39501,0,0,42d068ace67bfe1968100ac66d5d1148642082150f857f232b9cfb53d0990723,2024-07-12T13:15:12.600000
CVE-2024-39502,0,0,6adeebeff107981b812c767ac03278bb6342100f1cf3dea4133d897fc243b653,2024-07-12T13:15:12.680000
CVE-2024-39503,0,0,f8bafa99e254908b3f4c5a85f070c05b244e665a763ba41b7f7f04335286146f,2024-07-12T13:15:12.757000
CVE-2024-39504,0,0,3f881ea9875a46e48840c4d2c1d17e9631f00499bce2c7c2cbfe2691c197bf52,2024-07-12T13:15:12.830000
CVE-2024-39505,0,0,f5bf4141c4245c7ba154ff57050bb4a8e11930c8954e69947c7a74145b3e5584,2024-07-12T13:15:12.887000
CVE-2024-39506,0,0,cceb607d02e9db80289f8439fdffb3960db5dc755fc2ad3e12938e5ebe7a0c89,2024-07-12T13:15:12.957000
CVE-2024-39507,0,0,adb2d4d2663d4b2ff2dee7ae85ae2e9d5d26e910bc9e21d32bb193b099d92ba7,2024-07-12T13:15:13.050000
CVE-2024-39508,0,0,c4912f81ff9ab0865da4bab7618d87ca7f25b2f75094f89b1b9576ca3c4aae45,2024-07-12T13:15:13.130000
CVE-2024-39509,0,0,d4d1a67211087aa2f1b7687c0919d7034b7a6dc9068ccbec5978508fa2e4c925,2024-07-12T13:15:13.197000
CVE-2024-3951,0,0,d1eb572088193a792816003caae4c8900ea1808fb70b3f34eb162771a0d73b1e,2024-05-08T17:05:24.083000
CVE-2024-39510,1,1,ee3d7dbb52acee10ebc5955a06e28cd46843c49e61b2b1303fcc8d94f8c098f1,2024-07-12T13:15:13.283000
CVE-2024-39510,0,0,ee3d7dbb52acee10ebc5955a06e28cd46843c49e61b2b1303fcc8d94f8c098f1,2024-07-12T13:15:13.283000
CVE-2024-39511,0,0,8ff64d2b76cac616818d233531010fca566a954b6d7754e7506b08d9563d0619,2024-07-11T13:05:54.930000
CVE-2024-39512,0,0,8dc06e3a41bd79c2b8acee90011e9252ad90bde4c1d3ea0321002de14ee56805,2024-07-11T13:05:54.930000
CVE-2024-39513,0,0,c9005dbac22de69512a9faa58a7ede6f14f1995b0d447d6210a9f7d9af401e1d,2024-07-11T13:05:54.930000
@ -254692,7 +254711,7 @@ CVE-2024-39531,0,0,f370afcfaf62c5e6e55c0e31561074b7f17b55e8f6ce4e332b10716003dba
CVE-2024-39532,0,0,f8e07628687210418a222e0302ce153c70d823c892781803e885745752287a90,2024-07-11T18:09:58.777000
CVE-2024-39533,0,0,01d77ace4c7ab0cd901e673a2719a01f6a523738792965ccf627ed5c89b6abf8,2024-07-11T18:09:58.777000
CVE-2024-39535,0,0,b919e7eae65d6a215b0bbd4586dd0e80990b95772df44807e84ec7d12bcaf016,2024-07-11T18:09:58.777000
CVE-2024-39536,0,0,6a35f852b9d0b651aa2f7ebf313d014d535d8b35f01a9879fc36f4b5497e1e14,2024-07-11T18:09:58.777000
CVE-2024-39536,0,1,fcedd5a4fda577505833805e7e4997c8473247086d79366725456756ee1a42c8,2024-07-12T15:15:11.040000
CVE-2024-39537,0,0,c286bf86f2988b2661f05a0a3568bd7d2d587a4ae48f2e40b1d4a749c248998d,2024-07-11T18:09:58.777000
CVE-2024-39538,0,0,b86d94fafc7259d5ee7e5bd793a9ee089100e1868f16a60e064402cc10cb5cd9,2024-07-11T18:09:58.777000
CVE-2024-39539,0,0,c37436050a6426434a864ad49935af6b938eb7b3346f1f723a793fad839da4c2,2024-07-11T18:09:58.777000
@ -254727,7 +254746,7 @@ CVE-2024-39569,0,0,52889f68709bb42505429361fd8cbaa37b3cfa3fede130db2e5e3c1d1167c
CVE-2024-3957,0,0,6e4e327328ad5c18e880466a103b162c10591051d90490bf0a67f6889d728425,2024-05-02T18:00:37.360000
CVE-2024-39570,0,0,1917d857fe98ef195235e7e1e6720880090abde68067fcfc8071e8488d94c340,2024-07-09T18:19:14.047000
CVE-2024-39571,0,0,1f2dd2c50923d8589a1a349d2f4f9d2d7f8320b7a0892bf8fc808614b2b423eb,2024-07-09T18:19:14.047000
CVE-2024-39573,0,0,7e7eebc8f7807e5a5d00f82c0d28f5abe2d79239ae34bea5f004fd03abc17ccd,2024-07-03T02:05:50.170000
CVE-2024-39573,0,1,66fc7feceb0e35a8b2e536fb0fe145ff47c70fa679791c05a2dafe67c9ad9e6e,2024-07-12T14:15:16.400000
CVE-2024-3959,0,0,1ce1302f5c536ae0ba1596a30e53c3274b88d91eb780326b1103788329e8cf86,2024-06-28T13:21:52.223000
CVE-2024-39592,0,0,45145fa21a81f93b79f5eb8802a9b54a7c92975d0d128545a55a405ca0c46034,2024-07-09T18:19:14.047000
CVE-2024-39593,0,0,eab98f85c605da78ed2569c0241a9cd0360d98504df861c66a4071b8f33df100,2024-07-09T18:19:14.047000
@ -254770,7 +254789,7 @@ CVE-2024-3972,0,0,336c66699a431faa29a5282b5eb6832d488e7d167b3d03dca5d4b3950fce0b
CVE-2024-39723,0,0,003097d794792a3e1194202f71608927b35e402887d5f5ddf07d35b5dd183916,2024-07-11T14:54:10.243000
CVE-2024-3974,0,0,30b94b89b01dd2c6057362330f67dc78937f3f3edffa0c5a57e7602f711f919a,2024-05-14T16:11:39.510000
CVE-2024-39742,0,0,96ea1b8cccc8beabe35a1ae1bd29920440299002d9bdd07983b0f871a337ec60,2024-07-08T15:49:22.437000
CVE-2024-39743,0,0,20ff608aae9e81ed05e5df9fc95082741cc897036de0c408e1e444e17ba2e42f,2024-07-08T15:49:22.437000
CVE-2024-39743,0,1,56ba3c78f140f47d5ebd80a82e98c5cbfee01c52fb9fdf85fab2837f5a9797dd,2024-07-12T14:15:16.487000
CVE-2024-3977,0,0,e9f44416847592725fc2cd47ffed9c743bca75989a5c2d940c73903d22d68b79,2024-06-17T12:42:04.623000
CVE-2024-3978,0,0,338ec55d360d0ecf1dfe595690a2d37e24aa4129fa5a75aae324bfa31cd2fe9a,2024-06-17T12:42:04.623000
CVE-2024-3979,0,0,4ac2126fe63098861061c1ed3772b0712449f42e64a5481492de94fd61a5b947,2024-06-06T20:15:14.127000
@ -254805,12 +254824,12 @@ CVE-2024-39880,0,0,36b0f01990c70662f6a76f5465d867d453cd73de89d829ef36b42a6741e6a
CVE-2024-39881,0,0,adf0b4fcb696b07b94720317071702eedcd1fdaba37c9e2a964066676ba014b9,2024-07-11T13:05:54.930000
CVE-2024-39882,0,0,e74451f1f7696dcf4f6c0a8b25bc99b29b39e5965867fdeded2910a86a4bceaf,2024-07-11T13:05:54.930000
CVE-2024-39883,0,0,4125ead3dab96c17b3201223bdf7a64af624f714119f6cbaa67f57f3faea3add,2024-07-11T13:05:54.930000
CVE-2024-39884,0,0,0d647612824271b037e4243e01d89c11015b35b838940d0c376081ca2e2ed0c1,2024-07-05T12:55:51.367000
CVE-2024-39884,0,1,820d6f61ede8e42a2beabc4b322a42eecc24064bf6142891f1909848431996b5,2024-07-12T14:15:16.640000
CVE-2024-39886,0,0,c211eb7fd7b7d4a2dcf17c01e99303dbbe9f112b3010b65271b5f2c7acb830e8,2024-07-11T15:06:15.210000
CVE-2024-39888,0,0,f7637ae0feee5d9d70653d284f2ffea6d3641a46c662eba72b67bcab442feb69,2024-07-09T18:19:14.047000
CVE-2024-3989,0,0,41a6b1dcae0354fb8cba40366dc7ed1eeb84d6a6a33689c35123198fe63c8f01,2024-05-14T16:11:39.510000
CVE-2024-39891,0,0,f05a058a4cf741da51f47b19ea162b25ce262cdb61fb36618eb53dc7411c00e3,2024-07-03T22:15:02.923000
CVE-2024-39894,0,0,374900c11a12dc50ea15b6655eaae44b2fde3969c29fbbba5a961315eede48a8,2024-07-08T14:18:56.393000
CVE-2024-39894,0,1,b22bc69930da344106597d47d41e0cec9fb3e5fb9b845814de170e9e12a28a04,2024-07-12T14:15:16.703000
CVE-2024-39895,0,0,81e277926f04a447fa0edae3630d7dab6d337a392b69cef51e67fcc762844274,2024-07-09T18:19:14.047000
CVE-2024-39896,0,0,aac3b3aa468382be89710a9d4924b439b2a50e399515ea32a798074da07af274,2024-07-09T18:19:14.047000
CVE-2024-39897,0,0,38f11367ba3345f659ee85a48448fecd8dec6f5b40a44a93fa8c3972047a7c01,2024-07-11T13:06:13.187000
@ -254818,9 +254837,13 @@ CVE-2024-39899,0,0,b9c786cfcd500686022cf562103fb3c46b8e02e37e407feef62bff9a568df
CVE-2024-3990,0,0,7879115af68e1891db08bd2dafc44fb55db15680f59885de2ed87fd5c16d9492,2024-05-14T16:11:39.510000
CVE-2024-39900,0,0,e5fa3498f347fb7ae36ea3c567d86ef714b8b4ea1b9fce0392081ed142cad041,2024-07-11T13:05:54.930000
CVE-2024-39901,0,0,1d3e3b80615ba41835c485f10254821d67a955b0119b59f5c90d08afdfefd99d,2024-07-11T13:05:54.930000
CVE-2024-39903,1,1,025e303f169eeafe258d4de554b3447559a2c5452e19436807aca83c0ea44271,2024-07-12T15:15:11.177000
CVE-2024-39904,0,0,6252272080592d8722441f7410f72ce84604438cae8de682fc3002585f202d55,2024-07-11T18:09:58.777000
CVE-2024-39905,0,0,e41d6c222e9c5106200bd355ef2fa3929e0e128bad694497a72d448cc622f670,2024-07-11T18:09:58.777000
CVE-2024-39909,1,1,0b180e9989132ad6faee165e943e062fb223c5cc33e79c7bf88320201c161dff,2024-07-12T15:15:11.393000
CVE-2024-3991,0,0,f4b27e31b2ebe06401478accd9d85264142bf207d27ef139c240399354705c4f,2024-05-02T18:00:37.360000
CVE-2024-39914,1,1,c3c38025e95deba86f295fc11f6ecb7db79575de5c42a006489acdeb994d4763,2024-07-12T15:15:11.607000
CVE-2024-39916,1,1,8524af375ca41ee282bc79d8a997c2e7032d6f862dd55263c89801b920abb97b,2024-07-12T15:15:11.813000
CVE-2024-3992,0,0,ff644523dcb07d662c2bf53b9e125872cf5c9b9df16e03b5f8dec25363b303ae,2024-06-17T12:42:04.623000
CVE-2024-39920,0,0,8281f1288058876e172a78a04b7e10123b671826d2c29ba249d059d614d38347,2024-07-03T12:53:24.977000
CVE-2024-39927,0,0,98e497d093ac214e1059a0be9e6a17e44ab8fd11c901f329cf8cd36c5ebfff18,2024-07-11T13:05:54.930000
@ -254952,121 +254975,121 @@ CVE-2024-4085,0,0,18b49aedef154a5f78284d7ff3699691fe3b4904260085a931cc6d08f4fb7c
CVE-2024-4086,0,0,c06eb3f0c2fbe1c42ce58a59441202866280214c07091170b4fb53c94814c994,2024-05-02T18:00:37.360000
CVE-2024-4087,0,0,c042d2a1de26e6b1fe0621a6edcac1fb8cab9f866d13a8bc2e77c06eafe2f2ff,2024-06-03T14:46:24.250000
CVE-2024-4088,0,0,c8ca3e8553223ece7fd626b7957017d2d8aae2ed445db80654c73542bf17135f,2024-06-11T17:11:30.193000
CVE-2024-40899,1,1,a1537c0419c5b46a401a756392015f297b7ae861fe8dd029e421098041453a2b,2024-07-12T13:15:13.357000
CVE-2024-40900,1,1,26e284bac4dc49c500298d8e9aa2c2d24b8001067aad7a9cf9dadd91b2e8696d,2024-07-12T13:15:13.433000
CVE-2024-40901,1,1,0e66e2417588399d9f7cce97de9bacb496616c2f1059ca5af3002975c6cd8ec7,2024-07-12T13:15:13.500000
CVE-2024-40902,1,1,7e2e4860b63634c5faf109eafb75c4e979be147f9929e48aea4d1525d676804a,2024-07-12T13:15:13.583000
CVE-2024-40903,1,1,3d40110fd540be56236e668d74bce14d0c3f29e03d1e6482abed58c76bc47aa4,2024-07-12T13:15:13.660000
CVE-2024-40904,1,1,98373162fc0cde786ba882d928801a2159ce68a309634ba36f6c568933811833,2024-07-12T13:15:13.770000
CVE-2024-40905,1,1,c5ffa5663db6f055947603e5952a69586cfeef4ed80b04aaeac861d239e54a7d,2024-07-12T13:15:13.847000
CVE-2024-40906,1,1,1e33834b00bf9499d2b017b86d3f3941919e1aa294c63466ef984d903dbba94b,2024-07-12T13:15:13.920000
CVE-2024-40907,1,1,027d27a84d558271986afd67315e617f98834f4d044550c1ed40d07067d53c8d,2024-07-12T13:15:13.987000
CVE-2024-40908,1,1,dfa7d00024424eac99ccf75026940c6143d9120d6d44ba6052d81fd1d225f5ff,2024-07-12T13:15:14.060000
CVE-2024-40909,1,1,63c21bb18584e9155ea0af75496a580a2d20c1724577d85c7b30b0e069cc3bea,2024-07-12T13:15:14.137000
CVE-2024-40910,1,1,2f443877ddf3606f765db963472695f51ce2af2ae21bba27c7946bb0b98d5def,2024-07-12T13:15:14.213000
CVE-2024-40911,1,1,ba06a7353669e2bfd2efb87a92e2911dcd8f909880f9a543ad4ab70d4aeab704,2024-07-12T13:15:14.283000
CVE-2024-40912,1,1,f648da75c1ec3e37d7799dc8d7510f36844b1dc258eaa83cb331515e606aab0c,2024-07-12T13:15:14.363000
CVE-2024-40913,1,1,0ea6dccecde00d8edcca27930eaeb0c3e0c289d26a4f5ccaba80c9b7ae727347,2024-07-12T13:15:14.457000
CVE-2024-40914,1,1,c51a612c1d4e6ccadc60914e96023265876cdc793cf8fc86e21b5221c9d71d42,2024-07-12T13:15:14.567000
CVE-2024-40915,1,1,cd2dad19bdb27067bdd9fbd2adaa7760651673fb0d234d8fbbc201520ae8a642,2024-07-12T13:15:14.660000
CVE-2024-40916,1,1,63ff073b81bf97757cafec8a9f25bc76e0c2e171d883192c855d02d1f8adf959,2024-07-12T13:15:14.730000
CVE-2024-40917,1,1,ce270c2c06befb2e566db67febaba22ae13d48ed9f675b719a6dbb8b242e51c2,2024-07-12T13:15:14.797000
CVE-2024-40918,1,1,134f7ef03edab031ae56afab15730abaee485b29599fe95aef62e6507c56aa8c,2024-07-12T13:15:14.863000
CVE-2024-40919,1,1,760a593110baefe355b9420d011693aa372dbb15923190f8213f1877623d0b75,2024-07-12T13:15:14.937000
CVE-2024-40899,0,0,a1537c0419c5b46a401a756392015f297b7ae861fe8dd029e421098041453a2b,2024-07-12T13:15:13.357000
CVE-2024-40900,0,0,26e284bac4dc49c500298d8e9aa2c2d24b8001067aad7a9cf9dadd91b2e8696d,2024-07-12T13:15:13.433000
CVE-2024-40901,0,0,0e66e2417588399d9f7cce97de9bacb496616c2f1059ca5af3002975c6cd8ec7,2024-07-12T13:15:13.500000
CVE-2024-40902,0,0,7e2e4860b63634c5faf109eafb75c4e979be147f9929e48aea4d1525d676804a,2024-07-12T13:15:13.583000
CVE-2024-40903,0,0,3d40110fd540be56236e668d74bce14d0c3f29e03d1e6482abed58c76bc47aa4,2024-07-12T13:15:13.660000
CVE-2024-40904,0,0,98373162fc0cde786ba882d928801a2159ce68a309634ba36f6c568933811833,2024-07-12T13:15:13.770000
CVE-2024-40905,0,0,c5ffa5663db6f055947603e5952a69586cfeef4ed80b04aaeac861d239e54a7d,2024-07-12T13:15:13.847000
CVE-2024-40906,0,0,1e33834b00bf9499d2b017b86d3f3941919e1aa294c63466ef984d903dbba94b,2024-07-12T13:15:13.920000
CVE-2024-40907,0,0,027d27a84d558271986afd67315e617f98834f4d044550c1ed40d07067d53c8d,2024-07-12T13:15:13.987000
CVE-2024-40908,0,0,dfa7d00024424eac99ccf75026940c6143d9120d6d44ba6052d81fd1d225f5ff,2024-07-12T13:15:14.060000
CVE-2024-40909,0,0,63c21bb18584e9155ea0af75496a580a2d20c1724577d85c7b30b0e069cc3bea,2024-07-12T13:15:14.137000
CVE-2024-40910,0,0,2f443877ddf3606f765db963472695f51ce2af2ae21bba27c7946bb0b98d5def,2024-07-12T13:15:14.213000
CVE-2024-40911,0,0,ba06a7353669e2bfd2efb87a92e2911dcd8f909880f9a543ad4ab70d4aeab704,2024-07-12T13:15:14.283000
CVE-2024-40912,0,0,f648da75c1ec3e37d7799dc8d7510f36844b1dc258eaa83cb331515e606aab0c,2024-07-12T13:15:14.363000
CVE-2024-40913,0,0,0ea6dccecde00d8edcca27930eaeb0c3e0c289d26a4f5ccaba80c9b7ae727347,2024-07-12T13:15:14.457000
CVE-2024-40914,0,0,c51a612c1d4e6ccadc60914e96023265876cdc793cf8fc86e21b5221c9d71d42,2024-07-12T13:15:14.567000
CVE-2024-40915,0,0,cd2dad19bdb27067bdd9fbd2adaa7760651673fb0d234d8fbbc201520ae8a642,2024-07-12T13:15:14.660000
CVE-2024-40916,0,0,63ff073b81bf97757cafec8a9f25bc76e0c2e171d883192c855d02d1f8adf959,2024-07-12T13:15:14.730000
CVE-2024-40917,0,0,ce270c2c06befb2e566db67febaba22ae13d48ed9f675b719a6dbb8b242e51c2,2024-07-12T13:15:14.797000
CVE-2024-40918,0,0,134f7ef03edab031ae56afab15730abaee485b29599fe95aef62e6507c56aa8c,2024-07-12T13:15:14.863000
CVE-2024-40919,0,0,760a593110baefe355b9420d011693aa372dbb15923190f8213f1877623d0b75,2024-07-12T13:15:14.937000
CVE-2024-4092,0,0,4be02f9c67d30932bc0929e64c1c04dde83d92e769e6b30b60cbc598e8e37f4c,2024-05-02T18:00:37.360000
CVE-2024-40920,1,1,52f935ac68d844332d7074a44fd4c5a672a204f45236ac19f62c1615fe6ae1fb,2024-07-12T13:15:15.003000
CVE-2024-40921,1,1,7d9fa7a372975e6a782289f91d738ffa49de1593897f34e53842a823a19e9246,2024-07-12T13:15:15.060000
CVE-2024-40922,1,1,ae4ab2b399ba81fb1a1d4d1aa49980bb3f94590c0ded43f8812fc0259079c43a,2024-07-12T13:15:15.120000
CVE-2024-40923,1,1,b017da2e98d0f79f8e3f041ea74187be13d543ade905a5eadd94841cefc57468,2024-07-12T13:15:15.200000
CVE-2024-40924,1,1,671fb83635dd5d9a82a879889ec881ff97cb6ad422ba286ee409ccd7166360ac,2024-07-12T13:15:15.277000
CVE-2024-40925,1,1,956f7e5220b6de0de68833dfd8f06e7f7bbbbdcba5c52115ac9b4739f37c41f6,2024-07-12T13:15:15.343000
CVE-2024-40926,1,1,929cbd7258153956eba4f6157bbcce359577cf0d86a993f49dd6b0fddbcf2bdf,2024-07-12T13:15:15.403000
CVE-2024-40927,1,1,b07261720e590dd4b6023207a1bada76cb00a52429b315c97a8e92e7583a5090,2024-07-12T13:15:15.477000
CVE-2024-40928,1,1,03fb51d4f28dcefd0b6f88e37da621fe209d52f9cc41db1f941a0a7c10e29727,2024-07-12T13:15:15.550000
CVE-2024-40929,1,1,40d0a8d35f864b07d9b03ee1425b958319e20b19b1b29957a56e98e80fd108dd,2024-07-12T13:15:15.610000
CVE-2024-40920,0,0,52f935ac68d844332d7074a44fd4c5a672a204f45236ac19f62c1615fe6ae1fb,2024-07-12T13:15:15.003000
CVE-2024-40921,0,0,7d9fa7a372975e6a782289f91d738ffa49de1593897f34e53842a823a19e9246,2024-07-12T13:15:15.060000
CVE-2024-40922,0,0,ae4ab2b399ba81fb1a1d4d1aa49980bb3f94590c0ded43f8812fc0259079c43a,2024-07-12T13:15:15.120000
CVE-2024-40923,0,0,b017da2e98d0f79f8e3f041ea74187be13d543ade905a5eadd94841cefc57468,2024-07-12T13:15:15.200000
CVE-2024-40924,0,0,671fb83635dd5d9a82a879889ec881ff97cb6ad422ba286ee409ccd7166360ac,2024-07-12T13:15:15.277000
CVE-2024-40925,0,0,956f7e5220b6de0de68833dfd8f06e7f7bbbbdcba5c52115ac9b4739f37c41f6,2024-07-12T13:15:15.343000
CVE-2024-40926,0,0,929cbd7258153956eba4f6157bbcce359577cf0d86a993f49dd6b0fddbcf2bdf,2024-07-12T13:15:15.403000
CVE-2024-40927,0,0,b07261720e590dd4b6023207a1bada76cb00a52429b315c97a8e92e7583a5090,2024-07-12T13:15:15.477000
CVE-2024-40928,0,0,03fb51d4f28dcefd0b6f88e37da621fe209d52f9cc41db1f941a0a7c10e29727,2024-07-12T13:15:15.550000
CVE-2024-40929,0,0,40d0a8d35f864b07d9b03ee1425b958319e20b19b1b29957a56e98e80fd108dd,2024-07-12T13:15:15.610000
CVE-2024-4093,0,0,5d27408cc41c323f4b0e69479d9f46468fbd0106e510632bee156499f1d6b2eb,2024-05-17T02:40:15.433000
CVE-2024-40930,1,1,b17383e20ad6a93054a6d62eb89db32a547edaa0e619014da8fa60baf148ad56,2024-07-12T13:15:15.690000
CVE-2024-40931,1,1,45a61c9c21a7636a822b8c492e9dc5b8ed606f003caeae5835e14a751f2bed1b,2024-07-12T13:15:15.750000
CVE-2024-40932,1,1,4e9a2343ab2c4cc1154de5c0c468b12bc14abbfb0b4e2d8bf11331a884eb2da6,2024-07-12T13:15:15.820000
CVE-2024-40933,1,1,018a435d6addf3af72596e6413cfb9d150d6a4cf5aace3c094a686f336c67737,2024-07-12T13:15:15.913000
CVE-2024-40934,1,1,ed802f69fe756965528d8eb599a41a8c900fc93400f24ff7bd5fd276303eaf88,2024-07-12T13:15:15.977000
CVE-2024-40935,1,1,c17e449cefa0cd7d7572aeeec605ca933d6ec073948f7696faec0575b33f8036,2024-07-12T13:15:16.053000
CVE-2024-40936,1,1,dd52a9ef9a44b708ea851a09ca2973287abc7b2a8e1eecdb2142805f721604ed,2024-07-12T13:15:16.123000
CVE-2024-40937,1,1,93e844de56b6d36200decf62fe730a79438fc762b1c5a10a749c14db58f9d891,2024-07-12T13:15:16.187000
CVE-2024-40938,1,1,498bd1a007123eb92a98ec101d4b23237317c1f4fc8b7ffe7c00eedeb41f0ced,2024-07-12T13:15:16.247000
CVE-2024-40939,1,1,df0d109acb011cc2411427c28096cf42ff50a2f009bf4b8b597259477b2d148b,2024-07-12T13:15:16.320000
CVE-2024-40930,0,0,b17383e20ad6a93054a6d62eb89db32a547edaa0e619014da8fa60baf148ad56,2024-07-12T13:15:15.690000
CVE-2024-40931,0,0,45a61c9c21a7636a822b8c492e9dc5b8ed606f003caeae5835e14a751f2bed1b,2024-07-12T13:15:15.750000
CVE-2024-40932,0,0,4e9a2343ab2c4cc1154de5c0c468b12bc14abbfb0b4e2d8bf11331a884eb2da6,2024-07-12T13:15:15.820000
CVE-2024-40933,0,0,018a435d6addf3af72596e6413cfb9d150d6a4cf5aace3c094a686f336c67737,2024-07-12T13:15:15.913000
CVE-2024-40934,0,0,ed802f69fe756965528d8eb599a41a8c900fc93400f24ff7bd5fd276303eaf88,2024-07-12T13:15:15.977000
CVE-2024-40935,0,0,c17e449cefa0cd7d7572aeeec605ca933d6ec073948f7696faec0575b33f8036,2024-07-12T13:15:16.053000
CVE-2024-40936,0,0,dd52a9ef9a44b708ea851a09ca2973287abc7b2a8e1eecdb2142805f721604ed,2024-07-12T13:15:16.123000
CVE-2024-40937,0,0,93e844de56b6d36200decf62fe730a79438fc762b1c5a10a749c14db58f9d891,2024-07-12T13:15:16.187000
CVE-2024-40938,0,0,498bd1a007123eb92a98ec101d4b23237317c1f4fc8b7ffe7c00eedeb41f0ced,2024-07-12T13:15:16.247000
CVE-2024-40939,0,0,df0d109acb011cc2411427c28096cf42ff50a2f009bf4b8b597259477b2d148b,2024-07-12T13:15:16.320000
CVE-2024-4094,0,0,b33ee059f8f8bd075d69b27868bc400620c6f43b00a28de902f166c8066c8ee9,2024-07-05T13:41:05.103000
CVE-2024-40940,1,1,22e603db042a0ceaa0c8457e625a5a1dacd31d9b6c0c75bf070f25073d0d9df2,2024-07-12T13:15:16.380000
CVE-2024-40941,1,1,eaa530f835f240490f873153814327ae1b533b7847bfd89d5abf5a27b32bee52,2024-07-12T13:15:16.440000
CVE-2024-40942,1,1,8a02b97576c8b465420d4d1f495d35d4fa258589999d573dd6247c22dcefb3ad,2024-07-12T13:15:16.520000
CVE-2024-40943,1,1,967d388057613ee278fb420056b0b43382d39452ff6c0fed8e41ffedd29c7cfa,2024-07-12T13:15:16.670000
CVE-2024-40944,1,1,3f405a88cad1f8ba33136c5d874d8577f1795976620486f33be66e34c87c8e40,2024-07-12T13:15:16.753000
CVE-2024-40945,1,1,27a2c12a82a920902c2d4f1448af8629791a1ffc2f8949e349a7bba334c1f070,2024-07-12T13:15:16.853000
CVE-2024-40946,1,1,aa22dd4c35beb48c8e79647f2b2ab04d5b07114e4710b8b619d9ffc07a6484fc,2024-07-12T13:15:16.963000
CVE-2024-40947,1,1,267bb6f1f49f5f9cf2bba04a5a16a6544da7fb47feb0918a8c882fea22e22537,2024-07-12T13:15:17.073000
CVE-2024-40948,1,1,e72cb1483215380d29b83479038967f6e2e52232db5d0582b36a6c56da2adf07,2024-07-12T13:15:17.187000
CVE-2024-40949,1,1,1188630e42048867a24811901d02433f570e739a3e0eaf53bbe44abffa91b3be,2024-07-12T13:15:17.290000
CVE-2024-40940,0,0,22e603db042a0ceaa0c8457e625a5a1dacd31d9b6c0c75bf070f25073d0d9df2,2024-07-12T13:15:16.380000
CVE-2024-40941,0,0,eaa530f835f240490f873153814327ae1b533b7847bfd89d5abf5a27b32bee52,2024-07-12T13:15:16.440000
CVE-2024-40942,0,0,8a02b97576c8b465420d4d1f495d35d4fa258589999d573dd6247c22dcefb3ad,2024-07-12T13:15:16.520000
CVE-2024-40943,0,0,967d388057613ee278fb420056b0b43382d39452ff6c0fed8e41ffedd29c7cfa,2024-07-12T13:15:16.670000
CVE-2024-40944,0,0,3f405a88cad1f8ba33136c5d874d8577f1795976620486f33be66e34c87c8e40,2024-07-12T13:15:16.753000
CVE-2024-40945,0,0,27a2c12a82a920902c2d4f1448af8629791a1ffc2f8949e349a7bba334c1f070,2024-07-12T13:15:16.853000
CVE-2024-40946,0,0,aa22dd4c35beb48c8e79647f2b2ab04d5b07114e4710b8b619d9ffc07a6484fc,2024-07-12T13:15:16.963000
CVE-2024-40947,0,0,267bb6f1f49f5f9cf2bba04a5a16a6544da7fb47feb0918a8c882fea22e22537,2024-07-12T13:15:17.073000
CVE-2024-40948,0,0,e72cb1483215380d29b83479038967f6e2e52232db5d0582b36a6c56da2adf07,2024-07-12T13:15:17.187000
CVE-2024-40949,0,0,1188630e42048867a24811901d02433f570e739a3e0eaf53bbe44abffa91b3be,2024-07-12T13:15:17.290000
CVE-2024-4095,0,0,31c469f286897b03d948d4fae3cbc92250d27af63fa8e1eb75ef9d0aeba13389,2024-06-17T12:42:04.623000
CVE-2024-40950,1,1,e8f113cf4dbb8ef1f2d9f2c6d436f6bd5468ecefc793fd19f71529a5eb5c63c5,2024-07-12T13:15:17.353000
CVE-2024-40951,1,1,9fbb1eef5cdbc5a0bf99feb1b9d0a0e8469bcf491d913bf0e3470bc7193e08b0,2024-07-12T13:15:17.420000
CVE-2024-40952,1,1,5cf80d42b55980986593e9b89ddc686d9a94e5be4670f9fce0afe22bc8a1744e,2024-07-12T13:15:17.477000
CVE-2024-40953,1,1,1f7f2ffc4accbcf158787d4d3534352bdfba9556010a761fbd5adff4d2ff0ee5,2024-07-12T13:15:17.560000
CVE-2024-40954,1,1,aa3c10d4809640acff3ad3f0772f58b56f5167d61a276d22704870103e4bf5d4,2024-07-12T13:15:17.627000
CVE-2024-40955,1,1,ebfa75e852f47c4584a0a7eab986f8c9156c58a6429ed76ef63a6db365a43e5e,2024-07-12T13:15:17.697000
CVE-2024-40956,1,1,3143dcddc7dd7a1670687f18338bd63cb2aa5b11eab8c67600878bd19c826cf2,2024-07-12T13:15:17.760000
CVE-2024-40957,1,1,cb4944198c00ccd07de1b9f60bd8768db58ad0fc127b20313c4fa89c66130a96,2024-07-12T13:15:17.823000
CVE-2024-40958,1,1,438021c1a6d6ad83d4e8a3f1c527ac4b480720224ed3047f5d3071073c753cf9,2024-07-12T13:15:17.883000
CVE-2024-40959,1,1,a6f3fe51584e47b6c51e1af85c6f8e2881023c67be04ada19b2bdf9f24ead2f6,2024-07-12T13:15:17.947000
CVE-2024-40960,1,1,7f9ab575ac1bdf28305e2140ed3f19b0bf16e48731b79227c5a5c072e5ac7326,2024-07-12T13:15:18.040000
CVE-2024-40961,1,1,e354dadd471f05b8e1e20f13104d9ebf79202ae7ab8893ad8d01b08dc4875788,2024-07-12T13:15:18.110000
CVE-2024-40962,1,1,76e40dcf5874c8f84e56cebb65a6534e0fc5daec7c2a6d49289949f223904ed6,2024-07-12T13:15:18.180000
CVE-2024-40963,1,1,62bae4ab6170aa8f3787e93841b2e7d52e8f97e5632836f5017ee4ca81172908,2024-07-12T13:15:18.243000
CVE-2024-40964,1,1,547caf6ae49a01333a909acd257066192640f9f18664dc94beddff07826e4b5c,2024-07-12T13:15:18.310000
CVE-2024-40965,1,1,657815050d31bb10c3fb544883dafd6f98a4bd19074cbbbfc0e5b399d493209d,2024-07-12T13:15:18.370000
CVE-2024-40966,1,1,39490e01bf60e273921b952e6297c30e387d7d48ae7ffeb777ff652e8de0a5f1,2024-07-12T13:15:18.420000
CVE-2024-40967,1,1,24f690c8d7cdaffe373cfd6706c38c2b743da125fbc7aaa4febe9d8df98a30f9,2024-07-12T13:15:18.480000
CVE-2024-40968,1,1,25f4c573c3a6951be76abc4f2d21ecb040cec2fe6b66d155ab949921551cb750,2024-07-12T13:15:18.553000
CVE-2024-40969,1,1,f60a541e6d2ef3bba2195b1682fd87d2d7d2b882f765e72380757e494d509739,2024-07-12T13:15:18.627000
CVE-2024-40950,0,0,e8f113cf4dbb8ef1f2d9f2c6d436f6bd5468ecefc793fd19f71529a5eb5c63c5,2024-07-12T13:15:17.353000
CVE-2024-40951,0,0,9fbb1eef5cdbc5a0bf99feb1b9d0a0e8469bcf491d913bf0e3470bc7193e08b0,2024-07-12T13:15:17.420000
CVE-2024-40952,0,0,5cf80d42b55980986593e9b89ddc686d9a94e5be4670f9fce0afe22bc8a1744e,2024-07-12T13:15:17.477000
CVE-2024-40953,0,0,1f7f2ffc4accbcf158787d4d3534352bdfba9556010a761fbd5adff4d2ff0ee5,2024-07-12T13:15:17.560000
CVE-2024-40954,0,0,aa3c10d4809640acff3ad3f0772f58b56f5167d61a276d22704870103e4bf5d4,2024-07-12T13:15:17.627000
CVE-2024-40955,0,0,ebfa75e852f47c4584a0a7eab986f8c9156c58a6429ed76ef63a6db365a43e5e,2024-07-12T13:15:17.697000
CVE-2024-40956,0,0,3143dcddc7dd7a1670687f18338bd63cb2aa5b11eab8c67600878bd19c826cf2,2024-07-12T13:15:17.760000
CVE-2024-40957,0,0,cb4944198c00ccd07de1b9f60bd8768db58ad0fc127b20313c4fa89c66130a96,2024-07-12T13:15:17.823000
CVE-2024-40958,0,0,438021c1a6d6ad83d4e8a3f1c527ac4b480720224ed3047f5d3071073c753cf9,2024-07-12T13:15:17.883000
CVE-2024-40959,0,0,a6f3fe51584e47b6c51e1af85c6f8e2881023c67be04ada19b2bdf9f24ead2f6,2024-07-12T13:15:17.947000
CVE-2024-40960,0,0,7f9ab575ac1bdf28305e2140ed3f19b0bf16e48731b79227c5a5c072e5ac7326,2024-07-12T13:15:18.040000
CVE-2024-40961,0,0,e354dadd471f05b8e1e20f13104d9ebf79202ae7ab8893ad8d01b08dc4875788,2024-07-12T13:15:18.110000
CVE-2024-40962,0,0,76e40dcf5874c8f84e56cebb65a6534e0fc5daec7c2a6d49289949f223904ed6,2024-07-12T13:15:18.180000
CVE-2024-40963,0,0,62bae4ab6170aa8f3787e93841b2e7d52e8f97e5632836f5017ee4ca81172908,2024-07-12T13:15:18.243000
CVE-2024-40964,0,0,547caf6ae49a01333a909acd257066192640f9f18664dc94beddff07826e4b5c,2024-07-12T13:15:18.310000
CVE-2024-40965,0,0,657815050d31bb10c3fb544883dafd6f98a4bd19074cbbbfc0e5b399d493209d,2024-07-12T13:15:18.370000
CVE-2024-40966,0,0,39490e01bf60e273921b952e6297c30e387d7d48ae7ffeb777ff652e8de0a5f1,2024-07-12T13:15:18.420000
CVE-2024-40967,0,0,24f690c8d7cdaffe373cfd6706c38c2b743da125fbc7aaa4febe9d8df98a30f9,2024-07-12T13:15:18.480000
CVE-2024-40968,0,0,25f4c573c3a6951be76abc4f2d21ecb040cec2fe6b66d155ab949921551cb750,2024-07-12T13:15:18.553000
CVE-2024-40969,0,0,f60a541e6d2ef3bba2195b1682fd87d2d7d2b882f765e72380757e494d509739,2024-07-12T13:15:18.627000
CVE-2024-4097,0,0,6a60177672bc62dbe43e4e7ccd78e74b9159babed54b0d3a303c5a9a6fcd009a,2024-05-02T18:00:37.360000
CVE-2024-40970,1,1,f0e9e639a5011659988b1c77f9005f0257eb6d14ea247d5dfd0e2aae055c9a6c,2024-07-12T13:15:18.687000
CVE-2024-40971,1,1,394d7fca8380fcdd87fe58713f141afe1bc139afba4ab6c7de52ad49258e5c94,2024-07-12T13:15:18.750000
CVE-2024-40972,1,1,2522b74e703a57f4a49acde166e839271bf4a76ad5b45723c2714cdf0efbe6d9,2024-07-12T13:15:18.820000
CVE-2024-40973,1,1,3294f7eaa94a22503966e400188feffc1e6655e3b6182a37af7983e98b230623,2024-07-12T13:15:18.890000
CVE-2024-40974,1,1,31ec3612aa1cd9bc65050df695bb7292d736c4a033fe6d1b03d1cdc28390da81,2024-07-12T13:15:18.943000
CVE-2024-40975,1,1,04d2e3f8d1a71278b45b96b497fcab25a15f3148042a4809628fa41fd010ca71,2024-07-12T13:15:19.007000
CVE-2024-40976,1,1,000563ca0a32b46e215edf7b9464d350000a6c1f01e39cebb27138c4938d2e25,2024-07-12T13:15:19.073000
CVE-2024-40977,1,1,700552395e82caa0f778a3504eeee29b1e056aff50032a9f6eeb3b4481213b5b,2024-07-12T13:15:19.143000
CVE-2024-40978,1,1,98fd62fc332f424746eb927a03216ab43929f25675694ef64bdfd0740d1477c9,2024-07-12T13:15:19.410000
CVE-2024-40979,1,1,48c067d4411a656348aff14146086a3df22cbfb2f2065deb366244a09ec3eb62,2024-07-12T13:15:19.477000
CVE-2024-40970,0,0,f0e9e639a5011659988b1c77f9005f0257eb6d14ea247d5dfd0e2aae055c9a6c,2024-07-12T13:15:18.687000
CVE-2024-40971,0,0,394d7fca8380fcdd87fe58713f141afe1bc139afba4ab6c7de52ad49258e5c94,2024-07-12T13:15:18.750000
CVE-2024-40972,0,0,2522b74e703a57f4a49acde166e839271bf4a76ad5b45723c2714cdf0efbe6d9,2024-07-12T13:15:18.820000
CVE-2024-40973,0,0,3294f7eaa94a22503966e400188feffc1e6655e3b6182a37af7983e98b230623,2024-07-12T13:15:18.890000
CVE-2024-40974,0,0,31ec3612aa1cd9bc65050df695bb7292d736c4a033fe6d1b03d1cdc28390da81,2024-07-12T13:15:18.943000
CVE-2024-40975,0,0,04d2e3f8d1a71278b45b96b497fcab25a15f3148042a4809628fa41fd010ca71,2024-07-12T13:15:19.007000
CVE-2024-40976,0,0,000563ca0a32b46e215edf7b9464d350000a6c1f01e39cebb27138c4938d2e25,2024-07-12T13:15:19.073000
CVE-2024-40977,0,0,700552395e82caa0f778a3504eeee29b1e056aff50032a9f6eeb3b4481213b5b,2024-07-12T13:15:19.143000
CVE-2024-40978,0,0,98fd62fc332f424746eb927a03216ab43929f25675694ef64bdfd0740d1477c9,2024-07-12T13:15:19.410000
CVE-2024-40979,0,0,48c067d4411a656348aff14146086a3df22cbfb2f2065deb366244a09ec3eb62,2024-07-12T13:15:19.477000
CVE-2024-4098,0,0,a3e4777d420e1b3bcafda1cf3d039c925611c1ff1c0ae02e65a01fb1638060ec,2024-06-20T12:43:25.663000
CVE-2024-40980,1,1,fc7ec6e0fcc3908b1d98d3114dc9ce34e63c35bbac21b4650d5b718b9577a8c5,2024-07-12T13:15:19.550000
CVE-2024-40981,1,1,974f37e875734bbb1b1e0c7e3d1e90efa357336b1137c511f4b0c0498cd80180,2024-07-12T13:15:19.627000
CVE-2024-40982,1,1,8a7a1062bd03052d5f85cee5f0fbf641631af5ccb45722151e7f032eb6f8b2be,2024-07-12T13:15:19.800000
CVE-2024-40983,1,1,6b55ed7954dd7aca70d8d6ed477968d990d87482b3c543660ab273abbd74ad73,2024-07-12T13:15:19.893000
CVE-2024-40984,1,1,e466437f6b3fa8104d2eaa56fa3ee06e3d11df6e3012387795122ee82d2adfcc,2024-07-12T13:15:19.977000
CVE-2024-40985,1,1,5a91740d86a77ed66b3471044c9cd2ed92596d6b8374bce8bbe9d290b444717e,2024-07-12T13:15:20.050000
CVE-2024-40986,1,1,edceeac53119c6b924c598fc85a55d217974d56b23004fbed1cf54300e3a93da,2024-07-12T13:15:20.113000
CVE-2024-40987,1,1,f81f3bb5d1d8aff777d50596fcf1f782e0c95116acfddce6367fa73f68ef84ef,2024-07-12T13:15:20.180000
CVE-2024-40988,1,1,b6efcd3ce32d8bbf8c0e1e9a82a7f046a2e6301bd90b41045c059f4eaf4a9f11,2024-07-12T13:15:20.250000
CVE-2024-40989,1,1,87293d32126db3d8fb670365d8f7ec2499e95eb92cef42ff6eb0201ec2e4a267,2024-07-12T13:15:20.310000
CVE-2024-40990,1,1,ee4644c954fd816a7eb6fcade63ca2eccb7fe7ba7450ab748d595e17624085a6,2024-07-12T13:15:20.370000
CVE-2024-40991,1,1,a3e9c84592523eeb42e7964e4c53e327a42ac510ea137d95bedae7ef02306aaf,2024-07-12T13:15:20.430000
CVE-2024-40992,1,1,6340b6169a73d2480ff797ac1e4ecaa9ddee77574d3978bf3764a7aad7cbe602,2024-07-12T13:15:20.497000
CVE-2024-40993,1,1,12df2ce3705ef7c11fbf126a3fda4f01a8ef1725461aa34e8440fb2f2efbc2f9,2024-07-12T13:15:20.553000
CVE-2024-40994,1,1,e892b71f3a9b21624dd6e82ea39618990c300ec702be9c9e16eb678b462575bc,2024-07-12T13:15:20.620000
CVE-2024-40995,1,1,0f93f19a33785f421b58780599c4d266628ebafbc509ea508430969ac630bf8e,2024-07-12T13:15:20.680000
CVE-2024-40996,1,1,2288c4394367f03c3e0dc4493d7880bee0fa0922236e1a699d966a84c20ffe10,2024-07-12T13:15:20.740000
CVE-2024-40997,1,1,a775d860d08a23f3f6e481483b7f64f171760702dc7f04583cd218bdada76f9a,2024-07-12T13:15:20.800000
CVE-2024-40998,1,1,25b2813e822a479f68d33dae3db5418bec7429258e423b599a4fafb93cdb8f2c,2024-07-12T13:15:20.857000
CVE-2024-40999,1,1,3d56eaed6fdc4d9d41e09db17c3dcb9b79218436134a65f5c9d3b4f3c020851b,2024-07-12T13:15:20.920000
CVE-2024-40980,0,0,fc7ec6e0fcc3908b1d98d3114dc9ce34e63c35bbac21b4650d5b718b9577a8c5,2024-07-12T13:15:19.550000
CVE-2024-40981,0,0,974f37e875734bbb1b1e0c7e3d1e90efa357336b1137c511f4b0c0498cd80180,2024-07-12T13:15:19.627000
CVE-2024-40982,0,0,8a7a1062bd03052d5f85cee5f0fbf641631af5ccb45722151e7f032eb6f8b2be,2024-07-12T13:15:19.800000
CVE-2024-40983,0,0,6b55ed7954dd7aca70d8d6ed477968d990d87482b3c543660ab273abbd74ad73,2024-07-12T13:15:19.893000
CVE-2024-40984,0,0,e466437f6b3fa8104d2eaa56fa3ee06e3d11df6e3012387795122ee82d2adfcc,2024-07-12T13:15:19.977000
CVE-2024-40985,0,0,5a91740d86a77ed66b3471044c9cd2ed92596d6b8374bce8bbe9d290b444717e,2024-07-12T13:15:20.050000
CVE-2024-40986,0,0,edceeac53119c6b924c598fc85a55d217974d56b23004fbed1cf54300e3a93da,2024-07-12T13:15:20.113000
CVE-2024-40987,0,0,f81f3bb5d1d8aff777d50596fcf1f782e0c95116acfddce6367fa73f68ef84ef,2024-07-12T13:15:20.180000
CVE-2024-40988,0,0,b6efcd3ce32d8bbf8c0e1e9a82a7f046a2e6301bd90b41045c059f4eaf4a9f11,2024-07-12T13:15:20.250000
CVE-2024-40989,0,0,87293d32126db3d8fb670365d8f7ec2499e95eb92cef42ff6eb0201ec2e4a267,2024-07-12T13:15:20.310000
CVE-2024-40990,0,0,ee4644c954fd816a7eb6fcade63ca2eccb7fe7ba7450ab748d595e17624085a6,2024-07-12T13:15:20.370000
CVE-2024-40991,0,0,a3e9c84592523eeb42e7964e4c53e327a42ac510ea137d95bedae7ef02306aaf,2024-07-12T13:15:20.430000
CVE-2024-40992,0,0,6340b6169a73d2480ff797ac1e4ecaa9ddee77574d3978bf3764a7aad7cbe602,2024-07-12T13:15:20.497000
CVE-2024-40993,0,0,12df2ce3705ef7c11fbf126a3fda4f01a8ef1725461aa34e8440fb2f2efbc2f9,2024-07-12T13:15:20.553000
CVE-2024-40994,0,0,e892b71f3a9b21624dd6e82ea39618990c300ec702be9c9e16eb678b462575bc,2024-07-12T13:15:20.620000
CVE-2024-40995,0,0,0f93f19a33785f421b58780599c4d266628ebafbc509ea508430969ac630bf8e,2024-07-12T13:15:20.680000
CVE-2024-40996,0,0,2288c4394367f03c3e0dc4493d7880bee0fa0922236e1a699d966a84c20ffe10,2024-07-12T13:15:20.740000
CVE-2024-40997,0,0,a775d860d08a23f3f6e481483b7f64f171760702dc7f04583cd218bdada76f9a,2024-07-12T13:15:20.800000
CVE-2024-40998,0,0,25b2813e822a479f68d33dae3db5418bec7429258e423b599a4fafb93cdb8f2c,2024-07-12T13:15:20.857000
CVE-2024-40999,0,0,3d56eaed6fdc4d9d41e09db17c3dcb9b79218436134a65f5c9d3b4f3c020851b,2024-07-12T13:15:20.920000
CVE-2024-4100,0,0,7f59e9bc55c06404ac377b1145b413dcdbe8a5d2f3074db367eedbc1e2d39377,2024-07-09T18:19:14.047000
CVE-2024-41000,1,1,890521abebceae7bbc146183bb5a86bd6a1bec07c6683f812c9d08726bfbdea1,2024-07-12T13:15:20.987000
CVE-2024-41001,1,1,f543e8f26e32c3731ba427f3e5acc8df26049ebd46408faeb1367fa632fd484a,2024-07-12T13:15:21.053000
CVE-2024-41002,1,1,a428cc607bb2767561082915ff9776f0ef63cd618f91f900d560d277ec5e9ad0,2024-07-12T13:15:21.120000
CVE-2024-41003,1,1,80f65f540961f6cee3934f5be6c07489e609e4432017c2bdaf988430415fa7d6,2024-07-12T13:15:21.180000
CVE-2024-41004,1,1,1866e065db455da8c4a12f121632a7bd2e6a0d5b0b2004c33b4b6b42bb7366a2,2024-07-12T13:15:21.240000
CVE-2024-41005,1,1,c54dff57c39348a495c0203a5216c1689c03682303107b2576e53e394cae9036,2024-07-12T13:15:21.310000
CVE-2024-41006,1,1,819cc42e78f4fc52df5e0b544be823a6c609bc0f34707c229236fef7dc1a930b,2024-07-12T13:15:21.370000
CVE-2024-41000,0,0,890521abebceae7bbc146183bb5a86bd6a1bec07c6683f812c9d08726bfbdea1,2024-07-12T13:15:20.987000
CVE-2024-41001,0,0,f543e8f26e32c3731ba427f3e5acc8df26049ebd46408faeb1367fa632fd484a,2024-07-12T13:15:21.053000
CVE-2024-41002,0,0,a428cc607bb2767561082915ff9776f0ef63cd618f91f900d560d277ec5e9ad0,2024-07-12T13:15:21.120000
CVE-2024-41003,0,0,80f65f540961f6cee3934f5be6c07489e609e4432017c2bdaf988430415fa7d6,2024-07-12T13:15:21.180000
CVE-2024-41004,0,0,1866e065db455da8c4a12f121632a7bd2e6a0d5b0b2004c33b4b6b42bb7366a2,2024-07-12T13:15:21.240000
CVE-2024-41005,0,0,c54dff57c39348a495c0203a5216c1689c03682303107b2576e53e394cae9036,2024-07-12T13:15:21.310000
CVE-2024-41006,0,0,819cc42e78f4fc52df5e0b544be823a6c609bc0f34707c229236fef7dc1a930b,2024-07-12T13:15:21.370000
CVE-2024-4102,0,0,1b0aaa7efbf772a3034d5138f2cde018af6a8f41a0229b0c5f36e4d66092a2a3,2024-07-09T18:19:14.047000
CVE-2024-4103,0,0,db40310890aaaffd4decfd17ebe6978d2575902ae5387a15070f6cb8b96b8e99,2024-05-14T16:11:39.510000
CVE-2024-4104,0,0,8fd82744b8bcdbccac2be79cc70a35ed94046651bf70570898ef2c659d60f12d,2024-05-14T16:11:39.510000
@ -255547,7 +255570,7 @@ CVE-2024-4662,0,0,271820e0248036cdcfeea2da470b958f93caba3600263b2df375c674d93150
CVE-2024-4663,0,0,ac32c04a2cae0071224eeefc80f9a000b8618e2f1af1abc8eb33d3a9321c7d70,2024-06-20T12:44:01.637000
CVE-2024-4664,0,0,4d4aeec2b9d4ae73905aa066e928be5011f1ff91cc6ef5979d75af441c67cdbb,2024-06-28T13:28:06.347000
CVE-2024-4666,0,0,dde8d66c76bdf850b898b9f95df0d92f0ac3da730c1f32826d61843a6ef06bf5,2024-05-15T16:40:19.330000
CVE-2024-4667,0,0,7322872ce67d0516daa1879b5081888f034f8da24e8d2497370a4d9a15117afe,2024-07-09T18:19:14.047000
CVE-2024-4667,0,1,5f6a087811f370dc89d31ef88ad63586b7ea4db405d3be18d05609409a87488f,2024-07-12T14:25:13.923000
CVE-2024-4668,0,0,3c2f34d91ee8c9aacf0f125fe94ffbbe9a611b8f1a54ab65e0473cea71baad6f,2024-05-30T13:15:41.297000
CVE-2024-4669,0,0,cb3ea770e599714f2de5e50bc4195c130850e813b58882b88bfe234ded1dcd7f,2024-06-13T18:36:09.013000
CVE-2024-4670,0,0,438b57b9006ea70a278767dc5849ca5e16eeaf7f43c9f1acf2c1dcf72f3e2983,2024-05-15T16:40:19.330000
@ -255625,7 +255648,7 @@ CVE-2024-4748,0,0,0c715b5c19ebf413f66e32e0e846756d2092313152b17f8c4e7cf0a62355ae
CVE-2024-4749,0,0,676e331864bc41907c4c80c44886e7dac480ef6dea2c29bc22838d992753d4da,2024-06-04T16:57:41.053000
CVE-2024-4750,0,0,423585a3e250903ac62d761ecb0e0e6dc6b4649ccd4411b90275a4e6d2f87495,2024-06-04T16:57:41.053000
CVE-2024-4751,0,0,980cee331660133759599aaa98eeae384de48fe7bcc98af4a2333b20d054b0b6,2024-06-17T12:42:04.623000
CVE-2024-4753,0,1,9f6ae95232954e10d46dcad409a1281e3c3ba7b0c7197bb1d94d6337d29a472b,2024-07-12T12:49:07.030000
CVE-2024-4753,0,0,9f6ae95232954e10d46dcad409a1281e3c3ba7b0c7197bb1d94d6337d29a472b,2024-07-12T12:49:07.030000
CVE-2024-4754,0,0,65f7d30a77e8c92b9ac1114b7ed7f43c32a5bfb34fe46cea0e558e1fff1e464e,2024-06-24T12:57:36.513000
CVE-2024-4755,0,0,ca5306e45de4985a027d64d4740785092288eb6abbd1ab6d1fda3377d88d4e7e,2024-07-03T02:08:01.477000
CVE-2024-4756,0,0,b303493fc627eee25a3b39c986ea25472e7aab1866612b83c9a7c14522d2c360,2024-06-07T14:56:05.647000
@ -256076,7 +256099,7 @@ CVE-2024-5317,0,0,f1a52a6a9c8c0e0ec33c800078b387ceb900e9c5541b8549c2aff9d1fff220
CVE-2024-5318,0,0,812431b83287688611dc496217ea25ba5560744235da04dca7a35239cac1fe9a,2024-05-24T18:09:20.027000
CVE-2024-5322,0,0,34d5429047e5a1854ac8faff5145e41fb19a8e0b0a19efc95aa08c4b8fb570df,2024-07-02T12:09:16.907000
CVE-2024-5324,0,0,239b526476b291cf58ac1a7ce87454c70f83a8964e6e304d358d59b9fc037786,2024-06-06T14:17:35.017000
CVE-2024-5325,1,1,f352c923bf69a8bb5b39fbb3ad2e82228c3d6f075e58548807c0dc729f2df5cf,2024-07-12T13:15:21.470000
CVE-2024-5325,0,0,f352c923bf69a8bb5b39fbb3ad2e82228c3d6f075e58548807c0dc729f2df5cf,2024-07-12T13:15:21.470000
CVE-2024-5326,0,0,9beaa1147d54b3ae536a6eb0023672ae377946ef8aec317bd58c5324df5850c7,2024-05-30T13:15:41.297000
CVE-2024-5327,0,0,84b1605ed9f8fbbcd152a70275bed021ec8172a393ec025e57c9733c6898763a,2024-05-30T13:15:41.297000
CVE-2024-5328,0,0,eccd57558969f598d341de2d66a168d40aa825b298603b31d124c5c65bd99501,2024-06-07T14:56:05.647000
@ -256244,7 +256267,7 @@ CVE-2024-5526,0,0,e88e82e62b5e4c5aebe68213504a5aa190a1c186279f7068714569f91c3de7
CVE-2024-5530,0,0,a1a0702e27e4a4e3934db43cd9ea561e00ac905016f120852abcc67a37fa7a55,2024-06-11T13:54:12.057000
CVE-2024-5531,0,0,aff596c4345d9e9649e4107c993c40fc7416a56fa205089ee8692b6e8ba6cecf,2024-06-11T13:54:12.057000
CVE-2024-5533,0,0,9bad1fab6a90d68c007069d0bfcbdd7a7d72da6f38ffeb11140e803bac3bba45,2024-07-05T14:01:37.470000
CVE-2024-5535,0,0,823cd883eb780b4873573ca4453aa397c94e10a1d6c3b53a4ae748e110b914b8,2024-07-03T02:09:04.140000
CVE-2024-5535,0,1,a4c9a52c5762644097b9202aaddafb08e0f65ed76c571265ed2ff38052925bcd,2024-07-12T14:15:16.790000
CVE-2024-5536,0,0,d892d63cd79e6d462fe4485ce154b4e3b14e14d416b8b4d67114661d27280a01,2024-06-11T17:28:37.343000
CVE-2024-5537,0,0,071475eb8c0f92cc8ea9522d658283ad0e8213ba6740ff46ee05e5b24c18c3d8,2024-05-30T17:15:34.583000
CVE-2024-5538,0,0,183cea799fa9410e329e72f326a10b8369aedcea9a5b7583a44bf33ecc305070,2024-05-31T11:15:09.923000
@ -256293,7 +256316,7 @@ CVE-2024-5612,0,0,24bfbb6efa391db3014703335fcf10e8f670f2b2b154031d8b7a312f92d367
CVE-2024-5613,0,0,7e758f60ff4a249ae3d985d91b4f3417dc42ff70d8507f5e072b9cf0ad6144fd,2024-06-10T02:52:08.267000
CVE-2024-5615,0,0,d715351de069ee256cfd127ce22346136f76094dbd1f6f173b336f3c2cdc9c0f,2024-06-11T17:55:16.103000
CVE-2024-5616,0,0,5078c1aa917db98652cc6ffd2b310b244194da0fcbabfd9d4ed8ccf7b99de509,2024-07-08T15:49:22.437000
CVE-2024-5626,0,1,7932ffd73aaf78514b606728bf1a761d189d38c2a5a283b9b4110e01ed2b4d16,2024-07-12T12:49:07.030000
CVE-2024-5626,0,0,7932ffd73aaf78514b606728bf1a761d189d38c2a5a283b9b4110e01ed2b4d16,2024-07-12T12:49:07.030000
CVE-2024-5629,0,0,20478b62dd0cd666624f11f2e5a11c22a9915feb481805651583fe7db0518c7b,2024-06-18T18:31:05.663000
CVE-2024-5631,0,0,25836c7f267b9208b846f73ed3ce84976cc46a5e11e6627f730b2265da803c8d,2024-07-09T21:15:15.520000
CVE-2024-5632,0,0,18c64f64f8d77f06a181388a24f5be7d454b8919234aa93ebe8fa802fed4ac14,2024-07-10T17:15:12.517000
@ -256415,11 +256438,11 @@ CVE-2024-5792,0,0,9094b7486c3fc344423def250d1a80e78a3bf07108bd316adddc44339dabcd
CVE-2024-5793,0,0,4f7c09f8feed484d3c3bfde7191aecbd9210e86e918c2f39cfc1ec374b1fc06e,2024-07-09T18:19:14.047000
CVE-2024-5796,0,0,ee9ea77d6816c67e871ce0ce39c4d235af8efb4db7bec50166a494d6f8b7e47e,2024-06-28T10:27:00.920000
CVE-2024-5798,0,0,f6c60b5ac812e7711b355fdc9c4ea7ca1c381d5fa9189e95b5ac079c15b31d9c,2024-06-13T18:36:09.010000
CVE-2024-5802,0,0,d43f6c3699f8442d9285759c2e90cb7a4ef138460339054d721f73295a23e6c9,2024-07-09T18:19:14.047000
CVE-2024-5802,0,1,71daebe4bec626c1d71de5756a51cb35bdbb0ec81769b121e428d7e1cc0f8395,2024-07-12T15:20:14.610000
CVE-2024-5805,0,0,d5f814a63108fa76cde55a23a7ee4c9d4c1228e8f74ac6f24226e1e9997c1554,2024-06-25T18:50:42.040000
CVE-2024-5806,0,0,05eca3ac8c1d3a60beb467559e1d11b02293b85393edfc15424ba5e922097af5,2024-06-26T00:15:11.293000
CVE-2024-5810,0,0,246ea4a74a1b10a6c799aa82916b249e6dd3093a23af41d24ba222ed5e8773fa,2024-07-09T18:19:14.047000
CVE-2024-5811,0,1,d3e3c10745e2c3778d30791400c68b545b10596257ee108655514d6181571546,2024-07-12T12:49:07.030000
CVE-2024-5811,0,0,d3e3c10745e2c3778d30791400c68b545b10596257ee108655514d6181571546,2024-07-12T12:49:07.030000
CVE-2024-5812,0,0,b231b6b4b2edc3b100956cc90803ec880aa99de51e5a0f50bc4b9e381c5722ed,2024-06-13T18:36:45.417000
CVE-2024-5813,0,0,d695683c807a1777a11ef158e495934f31ab7056ebdb25d58f5f11112f2d1965,2024-06-13T18:36:45.417000
CVE-2024-5819,0,0,ff5f9599a99761c75338a6f351d5018b6b4257daf87dc238a533c6ea2133dd27,2024-07-01T12:37:24.220000
@ -256545,9 +256568,9 @@ CVE-2024-6013,0,0,44159fdbcbcac2a689071de339f13c4fefa84302df10ce908aefe802918d32
CVE-2024-6014,0,0,6f42b027c41cbc2bef7f3eccd4ed3d2b0646bd4a1028da377690698f14644291,2024-06-17T12:42:04.623000
CVE-2024-6015,0,0,b5dd732698ac918c4f9a100a042e5587c72b21ba3272e6fc136fa01311e31fdc,2024-06-17T15:15:52.830000
CVE-2024-6016,0,0,c54c9dea249da6152524c81283c2e2c500a502b8999814b114c6434b99c2c3ed,2024-06-17T14:15:12.487000
CVE-2024-6022,0,1,24cd03c9fcf6723524309e986cc2addb57b0569071dd40fa02ef59a2355b1c5a,2024-07-12T12:49:07.030000
CVE-2024-6023,0,1,0fbe5d2ca782056f31cb55e3e7e649afa27f8639de55449b0e6b5b1b24eaf884,2024-07-12T12:49:07.030000
CVE-2024-6024,0,1,b88e2f0df9a28a99795fd220e6ca891a022de9c2584d56b975e41d6c946c7cef,2024-07-12T12:49:07.030000
CVE-2024-6022,0,0,24cd03c9fcf6723524309e986cc2addb57b0569071dd40fa02ef59a2355b1c5a,2024-07-12T12:49:07.030000
CVE-2024-6023,0,0,0fbe5d2ca782056f31cb55e3e7e649afa27f8639de55449b0e6b5b1b24eaf884,2024-07-12T12:49:07.030000
CVE-2024-6024,0,0,b88e2f0df9a28a99795fd220e6ca891a022de9c2584d56b975e41d6c946c7cef,2024-07-12T12:49:07.030000
CVE-2024-6025,0,0,6a6f4c641ef7953aa26f54a1379cb5f6723776eec5081b3ea27a64b050e352aa,2024-07-11T13:05:54.930000
CVE-2024-6026,0,0,60fff2a5646ac325d6aad31c739bf38b093d56b857eaa43edb3f4353a1b4128b,2024-07-11T15:06:33
CVE-2024-6027,0,0,b2fd57616c7b740fff1978bda2368fdc3959192a2c78f320629b1920784145fa,2024-06-24T19:17:50.240000
@ -256566,7 +256589,7 @@ CVE-2024-6046,0,0,91371f2b9afd0a654dc4dc6a88ac5fb04a186cb82713804dda3cac2d7733c3
CVE-2024-6047,0,0,4cdf0f1acff12373f8f857c8d442b9de2221d44745323cc3f60bf66bccd7a239,2024-06-17T14:15:13.040000
CVE-2024-6048,0,0,03e9485ef23720c113f11fed6c539200d9a1624e025ca24798cddf9d0c1a9e3b,2024-06-17T12:42:04.623000
CVE-2024-6050,0,0,304778e708041d822ddb3dbacfa423baa973c842b9b5dea1cb2a29aed7ec7b6d,2024-07-01T16:37:39.040000
CVE-2024-6052,0,1,9d100b5523a4d1cbcdb510a0143b4a10e19adddd8504e766934ce961d6d1c643,2024-07-12T13:15:21.680000
CVE-2024-6052,0,0,9d100b5523a4d1cbcdb510a0143b4a10e19adddd8504e766934ce961d6d1c643,2024-07-12T13:15:21.680000
CVE-2024-6054,0,0,dbd3e49036b5938301871d5a6c67ee17ba89370e3288082b00ca89a51a1f06ed,2024-06-28T13:11:58.810000
CVE-2024-6055,0,0,7490ef4c1367b62a13fc44ec964fb12263f9fa479e5bd4bbc3820296c19002e0,2024-06-20T12:44:22.977000
CVE-2024-6056,0,0,9210a6d5e69cda44c36495fe4964320c8f6a47f4e723a559827fc7a6d2ee595f,2024-06-20T12:44:22.977000
@ -256634,12 +256657,12 @@ CVE-2024-6160,0,0,e0e9df11502e0f78d6d764c03981bde61fa7fdce13ce5e8e72c2edbfe56729
CVE-2024-6161,0,0,4874ef369326f57ebaead3e865a12df6057ceb7ec30e698c3deb9b52e2b10028,2024-07-09T18:19:14.047000
CVE-2024-6162,0,0,bd502c2e3c0167c78ca1c8188e0261103b8f8aa5eaa8e4a394c72d49dddda11b,2024-06-20T16:07:50.417000
CVE-2024-6163,0,0,fd093a646484e49cdcba7f0d5c73f035da9d8dc2d3299e73ed2192cb6789df3d,2024-07-08T15:49:22.437000
CVE-2024-6166,0,0,45a9bbf8d1e7aed01b7d229a0578b3d797a9f526a4ad693fe7c08afc0cc9c119,2024-07-09T18:19:14.047000
CVE-2024-6166,0,1,c93093bf8454afe95675994fb929c06931906789a59088dfba4992e2491ed4c6,2024-07-12T14:23:53.600000
CVE-2024-6167,0,0,53411719c1d4f7c7e0b31dcbc40822727b85ab3cd28b45158c4db6b81cb57664,2024-07-09T18:19:14.047000
CVE-2024-6168,0,0,a9d8b124b0d612b4817eae957707544bf3f1e74cb49f5394cfd698c29b52bb54,2024-07-09T18:19:14.047000
CVE-2024-6169,0,0,fa61ef550b8c27ad32247abf7d2a9bb2ed4e7d05d7bad1322541319dba19c447,2024-07-09T18:19:14.047000
CVE-2024-6170,0,0,e709769450a06d799568a3a51520c34e49767de0108f463b7a39095cd5afa73d,2024-07-09T18:19:14.047000
CVE-2024-6171,0,0,bedb42afd0eac565fbcb26ecbc69ac87a73d246280d47b85fb72f8d3efe478fb,2024-07-09T18:19:14.047000
CVE-2024-6169,0,1,5e3e4a526f2a4d49baf3eef5dd269238928a43ddd3f433b5eb67cd5467788817,2024-07-12T14:30:07.300000
CVE-2024-6170,0,1,ac5157d2a01994f30113ebfad64201af3c260777b3c9d326a82653d700efeb69,2024-07-12T14:20:01.013000
CVE-2024-6171,0,1,cc3c7e2efac98c0e3bae2d0863061f06de152fc95e444a2b0790f9bcdb93cdc1,2024-07-12T14:40:02.843000
CVE-2024-6172,0,0,772bb913ed7f683b9ada9dc0ecd54a374149383f55e758d624c0fb5be0b0bf4c,2024-07-03T18:00:01.770000
CVE-2024-6176,0,0,855875508d6019a3b7cc5455db83c0ed155c5813092b253896702a30576b2ecb,2024-06-20T12:43:25.663000
CVE-2024-6177,0,0,a0175799dd5324c2ac4fd3e8bb126589ce94cff0760703c070fdf39975a6cb07,2024-06-20T15:17:06.493000
@ -256740,13 +256763,13 @@ CVE-2024-6319,0,0,a7e6ba0611df1872f885f28b22290254a0a0617427fbf4cb3644f1333e4d6a
CVE-2024-6320,0,0,283f9bb36ccc5b92b087cc9c4a1fe708efc80654f72e1f9e7ff8264ce58552c9,2024-07-09T18:19:14.047000
CVE-2024-6321,0,0,23af826e4693bc2738f8ec7dcb0f933eeef79b645dd2f2305f1f94359ced507d,2024-07-09T18:19:14.047000
CVE-2024-6323,0,0,16f93962f537d8478d96317e8b0d9cad0e3aee225ed0ebdb8d6f6bf214bb804e,2024-06-28T13:15:19.317000
CVE-2024-6328,0,1,1dc9c3c4a448080717651ebabfb2fc281b4a1c036cabba31a96124b6cb4e8cbc,2024-07-12T12:49:07.030000
CVE-2024-6328,0,0,1dc9c3c4a448080717651ebabfb2fc281b4a1c036cabba31a96124b6cb4e8cbc,2024-07-12T12:49:07.030000
CVE-2024-6334,0,0,3daf0dfe09252e7765ca30c739cfcc033a43a657c17c0275e173ac670504522a,2024-07-09T18:19:14.047000
CVE-2024-6340,0,0,fd12f25a45d92fefbb8c0ec47428250f4f56bb9c686a12a52e54d86e24fec10a,2024-07-03T18:27:40.903000
CVE-2024-6341,0,0,528f4fdde1526d72477e90a767b2f2316b168f65b64effeddb9446d8a5cdcaf5,2024-07-02T18:15:03.900000
CVE-2024-6344,0,0,f8fe072181ab91a453822e0b523eb31f74817bc4efb68c7d2134a2d41a8e3557,2024-06-27T00:15:13.360000
CVE-2024-6349,0,0,f01d61e3475192c945ec3639c2eda3b231a23d2f279c2f15b4719385fb2bd065,2024-06-26T15:15:20.690000
CVE-2024-6353,0,1,3e7ee1ed054bc0661b7c1f2f3de9fe2ed8be61a7a777eee50734c66af6748302,2024-07-12T12:49:07.030000
CVE-2024-6353,0,0,3e7ee1ed054bc0661b7c1f2f3de9fe2ed8be61a7a777eee50734c66af6748302,2024-07-12T12:49:07.030000
CVE-2024-6354,0,0,c9410e2fdcd521ee7fa5aea0abe57bbff6ce1153eea9fc9c27ad647524c61c5c,2024-07-03T02:09:53.917000
CVE-2024-6355,0,0,ae01fd3dff3a0136dc0dcda0f0c62bd72a4c84afe63740fbe5ae0aaceef04f3e,2024-06-27T14:15:16.753000
CVE-2024-6363,0,0,821afe251d4d71225fc87e03c6904bf5a4c1b246a1e7e806532ba337c88c686a,2024-07-01T12:37:24.220000
@ -256768,14 +256791,14 @@ CVE-2024-6385,0,0,5cd1b1d2bb2619e597fdfbc12061290bedb1abf1843381c16b40d3e31cd024
CVE-2024-6387,0,0,395c005beff8f885469a6af0c5f20c1084f41c03d3787849b420e64606fd490d,2024-07-11T20:15:04.793000
CVE-2024-6388,0,0,e641c9d869769d4291da87145b48d15b4f200c046d6b100142bc686375a84738,2024-06-27T17:11:52.390000
CVE-2024-6391,0,0,7ce7aeffa0d0436a5dc8c66236e9fdb421bf2fd0e842089663d3cb7d1491a998,2024-07-09T18:19:14.047000
CVE-2024-6392,0,1,f361942df6276a0c96574512bc05717f2075a1be2cafe6840357bf3e68ede92f,2024-07-12T12:49:07.030000
CVE-2024-6396,0,1,9e4b547b4d90c33704c90a7cfe67a136b4a49a6d0168d4ba570b6960a74fd1cc,2024-07-12T12:49:07.030000
CVE-2024-6392,0,0,f361942df6276a0c96574512bc05717f2075a1be2cafe6840357bf3e68ede92f,2024-07-12T12:49:07.030000
CVE-2024-6396,0,0,9e4b547b4d90c33704c90a7cfe67a136b4a49a6d0168d4ba570b6960a74fd1cc,2024-07-12T12:49:07.030000
CVE-2024-6397,0,0,ae61fbef645b31e464dc1df09257d51012f2887b082513f831eae87c43d6004d,2024-07-11T13:05:54.930000
CVE-2024-6402,0,0,795485c4534407e246daec51c1daaa33b95f6651688fed743a8fb9054cdaedba,2024-07-01T12:37:24.220000
CVE-2024-6403,0,0,e44b9cfa8d9ae367e624a8cdf179ef52ea1e98c2115d7a956299d17747a6a56b,2024-07-01T12:37:24.220000
CVE-2024-6405,0,0,fdb62e3d2213e21f6cf3d269e158ee31cc07c01f1a5a460b466ccce5203f82ee,2024-07-01T12:37:24.220000
CVE-2024-6407,0,0,ec5dc8c03230b8fa5cd2a16eef82cbc157d078945319bc360474d77e784aeadf,2024-07-11T13:05:54.930000
CVE-2024-6409,0,0,9bc68adee8126d980e539ed0340617319811b9c1ec91d5c6d49c8bedd8ee2b95,2024-07-10T20:15:04.853000
CVE-2024-6409,0,1,fab7fae4fd82ab978d909560d846bfc072083f4a63c41c80f20dc651384a00de,2024-07-12T14:15:16.917000
CVE-2024-6410,0,0,9db961a9e1824a35ea4ea0ac1b25800d120aafac2e5d4caf32d46e6051ad19d3,2024-07-11T13:05:54.930000
CVE-2024-6411,0,0,47c8df8c850420fccb0a9ac1089e4a10bdc49d8ecc38cd5ac33a449b2082a491,2024-07-11T13:05:54.930000
CVE-2024-6414,0,0,ae0d661be5f3239fdfe6f0d08030fef27c03212dc1e12675bcf532fd90369002,2024-07-01T12:37:24.220000
@ -256803,14 +256826,14 @@ CVE-2024-6453,0,0,f8f94ef1371b1813320fb500c8f5a2a5c78562059f37a370c24f1cfd03cdaa
CVE-2024-6461,0,0,86a214d0c7bd3f57cea37cd567b01f1a0e55f8d4342f6c7c46fd15b8942c8d90,2024-07-03T21:15:04.580000
CVE-2024-6463,0,0,f8d7d80ca565804c0caafdbc8214fe1eca7dc83d43861affc813af07365c0cc0,2024-07-03T21:15:04.640000
CVE-2024-6464,0,0,8fab89d1b3aef32a257cf0d7fb909cce6ac18d5ef8dc898bb9f0cc6c52356cbf,2024-07-03T21:15:04.697000
CVE-2024-6468,0,1,35510ca663346ec39c4261a703db141288708f1a8a294ff4bff13dfd2b2ac57d,2024-07-12T12:49:11.340000
CVE-2024-6468,0,0,35510ca663346ec39c4261a703db141288708f1a8a294ff4bff13dfd2b2ac57d,2024-07-12T12:49:11.340000
CVE-2024-6469,0,0,8a9cc14cdc15687cebe1f067587bd279bfc289daac6283040462018576c0d534,2024-07-05T17:09:54.870000
CVE-2024-6470,0,0,c9a33c23ec7370c50b4df58ad71ec5e181cf8d29947a984c43804e0a58dc7723,2024-07-05T12:55:51.367000
CVE-2024-6471,0,0,f732e100289c893532526b33b46541a39ba52ce518f7e90d2f97ec4bb67cf877,2024-07-05T12:55:51.367000
CVE-2024-6484,0,0,cba9240284ced5de74c21cc40946944876e4dc7df9d2e95304ac35d4888612df,2024-07-11T18:09:58.777000
CVE-2024-6485,0,0,09d622a0c981ab86c7d4270d8e13e5e5860abdf7e8113c369ff0eae7e7c8ae78,2024-07-11T18:09:58.777000
CVE-2024-6488,0,0,0c5ecb49d7296b409f5d61bd70a5d017ad6f69068345855a00f0bd7c78566faa,2024-07-04T21:15:10.403000
CVE-2024-6495,1,1,ce08d868d93fff5fade78fbc5efcd1cdbc7e1995b89e2a10591d0130a562c1c1,2024-07-12T13:15:21.770000
CVE-2024-6495,0,0,ce08d868d93fff5fade78fbc5efcd1cdbc7e1995b89e2a10591d0130a562c1c1,2024-07-12T13:15:21.770000
CVE-2024-6501,0,0,45d58d6fcd90c3b83531e796541078a549af17f7a81eb1fbfe7d6944aa2bc8ac,2024-07-11T13:06:13.187000
CVE-2024-6505,0,0,b8708084cd092b6ca88acb18ad5e80f748f8e2829ec040b8958bfe3c1fee2cd6,2024-07-08T15:41:17.883000
CVE-2024-6506,0,0,58310ca3e68e3dacb16dafd9b32db187bdf111a88d3da008267c8c84bbec48d6,2024-07-05T12:55:51.367000
@ -256823,16 +256846,16 @@ CVE-2024-6525,0,0,2f0f70f02d7062f0146f492a65f00de0208bb8c01fafafd0c2d5a6e3d243b9
CVE-2024-6526,0,0,0395771cb83da3c31d3258df800a7adc493a41c6b23cd6248bbb973fb8ab4b56,2024-07-08T15:39:08.840000
CVE-2024-6527,0,0,2c04959f5b432bf9c2410a6022a228031cfde40b22a03fde53771eb44766b4c1,2024-07-09T18:19:14.047000
CVE-2024-6528,0,0,eadd6f4f4be8f81226626302b00f66ebfbebf71ded08e8d23278bcc971f84701,2024-07-11T13:05:54.930000
CVE-2024-6531,0,1,1125a21608be8cb0502ea86867294670584ed16918c5bd752fdbbd37969404b8,2024-07-12T12:49:11.340000
CVE-2024-6531,0,0,1125a21608be8cb0502ea86867294670584ed16918c5bd752fdbbd37969404b8,2024-07-12T12:49:11.340000
CVE-2024-6539,0,0,81a7a773476044a536e1904849aff55df114add8144e8265b917f8120b92d867,2024-07-11T14:56:20.733000
CVE-2024-6550,0,0,6c4bb046e65a00df1f67c81af4edc0fc3847fdca60c1beea606bf943b5851318,2024-07-11T13:05:54.930000
CVE-2024-6554,0,0,53d6bb38e6051e6443dd433cc7e20c95847a1e5fb1ebe77ae646383c547abeb7,2024-07-11T13:05:54.930000
CVE-2024-6555,0,1,bf68ef8f1bd3876021fc33b504457daba53832080530806ef27f797ea5536a0b,2024-07-12T12:49:07.030000
CVE-2024-6555,0,0,bf68ef8f1bd3876021fc33b504457daba53832080530806ef27f797ea5536a0b,2024-07-12T12:49:07.030000
CVE-2024-6556,0,0,246920c1b32eb0a0369982110178f9a30464427865e75d42710950bf8d6bff6c,2024-07-11T13:05:54.930000
CVE-2024-6563,0,0,1b4d88909a8afd884220e1df693026407578c717bcca7ba5cdd4e0bbbf29fb3c,2024-07-09T14:19:19.300000
CVE-2024-6564,0,0,b381c943e4dc87d72df0560a8008d835d4542fba3e8b6a3b21a1beca0e3a3fa5,2024-07-09T14:19:14.760000
CVE-2024-6580,0,0,d43dfa58651574c4447e8f323f3cb1f6a00d6bdef0613d5834aefccecf968c5d,2024-07-09T18:19:14.047000
CVE-2024-6588,0,1,67672e854c20766f2e15151fa1e111ec8310b7083a57f535c99159d2ce6e5af7,2024-07-12T12:49:07.030000
CVE-2024-6588,0,0,67672e854c20766f2e15151fa1e111ec8310b7083a57f535c99159d2ce6e5af7,2024-07-12T12:49:07.030000
CVE-2024-6598,0,0,2f02553b1031751a689c5bf3f9b99ef5078ca790db273edd82a84af9b7d8dd36,2024-07-09T18:19:14.047000
CVE-2024-6600,0,0,ec760b3dcbbd1d45d7d375ec69590e9486042d86ace386dac9df16cb2b0ef0ec,2024-07-09T18:19:14.047000
CVE-2024-6601,0,0,c2d93bb90c2cb6274c0c6af67f4e9d274133dcf51e2d79042eff7154f333742d,2024-07-09T18:19:14.047000
@ -256851,7 +256874,7 @@ CVE-2024-6613,0,0,1044faeab37e5e6a281bf238170e48cbf6d6c882aa1c2ca89983ecc271027c
CVE-2024-6614,0,0,4bab9d3e1891f10867b2f4d5e4a2817e40eb603b99a7dab59e27fb07817b5d0c,2024-07-09T18:18:38.713000
CVE-2024-6615,0,0,51ee5ed3b9bac56f9be4d0a991ad4a60e35d63343d0ef008dc875e1c3fdef69f,2024-07-09T18:18:38.713000
CVE-2024-6624,0,0,c2de4aca43896e5a4f3fa2eb32cc5d95854c9fbc5a7dd63da39148664088c2b9,2024-07-11T13:05:54.930000
CVE-2024-6625,0,1,b913737eefce9f28c47dc537f0edd398b1eeb297cd2eb30c69b59c3401317130,2024-07-12T12:49:07.030000
CVE-2024-6625,0,0,b913737eefce9f28c47dc537f0edd398b1eeb297cd2eb30c69b59c3401317130,2024-07-12T12:49:07.030000
CVE-2024-6630,0,0,7742b604143993a9d769b9ab9c3e5aab85337a51e6772bb186961af80d29fee2,2024-07-10T18:15:05.407000
CVE-2024-6642,0,0,8d96c1180af1047f7b667e53dd25106a95583c9fef6033b783f527ef0b9e4e6b,2024-07-10T13:15:11.140000
CVE-2024-6643,0,0,c4eab211147138bb5613809a885f81bacb4eb0fc3c1e7955b1f331b632c0ef4a,2024-07-11T10:15:02.650000
@ -256867,7 +256890,7 @@ CVE-2024-6663,0,0,7facb2637e12709d4a455340194f194dba2537cb44d31c2262ed1aa6b9ebcf
CVE-2024-6664,0,0,7dcdbd9efac1143da422ef778b0a605b2e75ff3874c65ca5b8e519e1d8523278,2024-07-10T21:15:11.520000
CVE-2024-6666,0,0,6ba5e83c4c8007c7f2945dcbaee49cd53299747e7c829220281020263e99c21e,2024-07-11T13:05:54.930000
CVE-2024-6676,0,0,b617e99f4ff839e117300b1a5f3c494dc1ceb13864a576e2b1519c7ec5960d34,2024-07-11T13:05:54.930000
CVE-2024-6677,0,1,d8004a1441e952f05633a34727a4f9223ac5077c2123fd1507a1955287de18f3,2024-07-12T12:49:07.030000
CVE-2024-6677,0,0,d8004a1441e952f05633a34727a4f9223ac5077c2123fd1507a1955287de18f3,2024-07-12T12:49:07.030000
CVE-2024-6679,0,0,54c74b205d1f37c5305b3fb942833238d29bd46163160c5a253ae1986ffc1b20,2024-07-11T18:09:58.777000
CVE-2024-6680,0,0,5df9c8bd2f5ef07e0f9498e4d782d800510118ccdb6a5e8bbb9184a28075c46e,2024-07-11T18:09:58.777000
CVE-2024-6681,0,0,574eb73a3342a616fc23bf7f4801361965b6fb573fef8b2ccb7116fa0a08c814,2024-07-11T18:09:58.777000

Can't render this file because it is too large.