mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-07-09 16:05:11 +00:00
Auto-Update: 2024-06-17T22:00:18.732771+00:00
This commit is contained in:
parent
df8a9c1304
commit
82fe6eef26
32
CVE-2023/CVE-2023-370xx/CVE-2023-37057.json
Normal file
32
CVE-2023/CVE-2023-370xx/CVE-2023-37057.json
Normal file
@ -0,0 +1,32 @@
|
||||
{
|
||||
"id": "CVE-2023-37057",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-06-17T21:15:50.380",
|
||||
"lastModified": "2024-06-17T21:15:50.380",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "An issue in JLINK Unionman Technology Co. Ltd Jlink AX1800 v.1.0 allows a remote attacker to execute arbitrary code via the router's authentication mechanism."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "http://jlink.com",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "http://www.unionman.com.cn/en/contact.html",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/ri5c/Jlink-Router-RCE",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://jlink-global.com/",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
24
CVE-2023/CVE-2023-370xx/CVE-2023-37058.json
Normal file
24
CVE-2023/CVE-2023-370xx/CVE-2023-37058.json
Normal file
@ -0,0 +1,24 @@
|
||||
{
|
||||
"id": "CVE-2023-37058",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-06-17T21:15:50.503",
|
||||
"lastModified": "2024-06-17T21:15:50.503",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Insecure Permissions vulnerability in JLINK Unionman Technology Co. Ltd Jlink AX1800 v.1.0 allows a remote attacker to escalate privileges via a crafted command."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "http://jlink.com",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/ri5c/Jlink-Router-RCE",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,12 +2,12 @@
|
||||
"id": "CVE-2024-25400",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-02-27T16:15:46.517",
|
||||
"lastModified": "2024-02-28T14:07:00.563",
|
||||
"lastModified": "2024-06-17T20:15:12.000",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Subrion CMS 4.2.1 is vulnerable to SQL Injection via ia.core.mysqli.php."
|
||||
"value": "Subrion CMS 4.2.1 is vulnerable to SQL Injection via ia.core.mysqli.php. NOTE: this is disputed by multiple third parties because it refers to an HTTP request to a PHP file that only contains a class, without any mechanism for accepting external input, and the reportedly vulnerable method is not present in the file."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
@ -16,17 +16,9 @@
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://cwe.mitre.org/data/definitions/89.html",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/intelliants/subrion/issues/910",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://subrion.org/",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-26086",
|
||||
"sourceIdentifier": "psirt@adobe.com",
|
||||
"published": "2024-06-13T08:15:56.017",
|
||||
"lastModified": "2024-06-13T18:35:19.777",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2024-06-17T20:31:51.467",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -16,6 +16,26 @@
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 5.4,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.3,
|
||||
"impactScore": 2.7
|
||||
},
|
||||
{
|
||||
"source": "psirt@adobe.com",
|
||||
"type": "Secondary",
|
||||
@ -50,10 +70,37 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:adobe:experience_manager:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "6.5.21",
|
||||
"matchCriteriaId": "33F20D83-E0D3-4504-B15F-C3240F8CFB90"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:adobe:experience_manager:*:*:*:*:aem_cloud_service:*:*:*",
|
||||
"versionEndExcluding": "2024.5",
|
||||
"matchCriteriaId": "8A667B96-AB3F-48AB-9980-11AB79AA7BD7"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://helpx.adobe.com/security/products/experience-manager/apsb24-28.html",
|
||||
"source": "psirt@adobe.com"
|
||||
"source": "psirt@adobe.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-26089",
|
||||
"sourceIdentifier": "psirt@adobe.com",
|
||||
"published": "2024-06-13T08:15:56.483",
|
||||
"lastModified": "2024-06-13T18:35:19.777",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2024-06-17T20:32:03.657",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -50,10 +50,37 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:adobe:experience_manager:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "6.5.21",
|
||||
"matchCriteriaId": "33F20D83-E0D3-4504-B15F-C3240F8CFB90"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:adobe:experience_manager:*:*:*:*:aem_cloud_service:*:*:*",
|
||||
"versionEndExcluding": "2024.5",
|
||||
"matchCriteriaId": "8A667B96-AB3F-48AB-9980-11AB79AA7BD7"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://helpx.adobe.com/security/products/experience-manager/apsb24-28.html",
|
||||
"source": "psirt@adobe.com"
|
||||
"source": "psirt@adobe.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-26090",
|
||||
"sourceIdentifier": "psirt@adobe.com",
|
||||
"published": "2024-06-13T08:15:56.710",
|
||||
"lastModified": "2024-06-13T18:35:19.777",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2024-06-17T20:32:18.073",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -50,10 +50,37 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:adobe:experience_manager:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "6.5.21",
|
||||
"matchCriteriaId": "33F20D83-E0D3-4504-B15F-C3240F8CFB90"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:adobe:experience_manager:*:*:*:*:aem_cloud_service:*:*:*",
|
||||
"versionEndExcluding": "2024.5",
|
||||
"matchCriteriaId": "8A667B96-AB3F-48AB-9980-11AB79AA7BD7"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://helpx.adobe.com/security/products/experience-manager/apsb24-28.html",
|
||||
"source": "psirt@adobe.com"
|
||||
"source": "psirt@adobe.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-26091",
|
||||
"sourceIdentifier": "psirt@adobe.com",
|
||||
"published": "2024-06-13T08:15:56.943",
|
||||
"lastModified": "2024-06-13T18:35:19.777",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2024-06-17T20:32:37.817",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -50,10 +50,37 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:adobe:experience_manager:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "6.5.21",
|
||||
"matchCriteriaId": "33F20D83-E0D3-4504-B15F-C3240F8CFB90"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:adobe:experience_manager:*:*:*:*:aem_cloud_service:*:*:*",
|
||||
"versionEndExcluding": "2024.5",
|
||||
"matchCriteriaId": "8A667B96-AB3F-48AB-9980-11AB79AA7BD7"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://helpx.adobe.com/security/products/experience-manager/apsb24-28.html",
|
||||
"source": "psirt@adobe.com"
|
||||
"source": "psirt@adobe.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-26117",
|
||||
"sourceIdentifier": "psirt@adobe.com",
|
||||
"published": "2024-06-13T08:15:59.240",
|
||||
"lastModified": "2024-06-13T18:35:19.777",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2024-06-17T20:31:38.117",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -50,10 +50,37 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:adobe:experience_manager:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "6.5.21",
|
||||
"matchCriteriaId": "33F20D83-E0D3-4504-B15F-C3240F8CFB90"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:adobe:experience_manager:*:*:*:*:aem_cloud_service:*:*:*",
|
||||
"versionEndExcluding": "2024.5",
|
||||
"matchCriteriaId": "8A667B96-AB3F-48AB-9980-11AB79AA7BD7"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://helpx.adobe.com/security/products/experience-manager/apsb24-28.html",
|
||||
"source": "psirt@adobe.com"
|
||||
"source": "psirt@adobe.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
24
CVE-2024/CVE-2024-348xx/CVE-2024-34833.json
Normal file
24
CVE-2024/CVE-2024-348xx/CVE-2024-34833.json
Normal file
@ -0,0 +1,24 @@
|
||||
{
|
||||
"id": "CVE-2024-34833",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-06-17T21:15:50.783",
|
||||
"lastModified": "2024-06-17T21:15:50.783",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Sourcecodester Payroll Management System v1.0 is vulnerable to File Upload. Users can upload images via the \"save_settings\" page. An unauthenticated attacker can leverage this functionality to upload a malicious PHP file instead. Successful exploitation of this vulnerability results in the ability to execute arbitrary code as the user running the web server."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/ShellUnease/payroll-management-system-rce",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://packetstormsecurity.com/files/179106/Payroll-Management-System-1.0-Remote-Code-Execution.html",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-36151",
|
||||
"sourceIdentifier": "psirt@adobe.com",
|
||||
"published": "2024-06-13T08:16:03.090",
|
||||
"lastModified": "2024-06-13T18:35:19.777",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2024-06-17T20:33:37.130",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -39,6 +39,16 @@
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "psirt@adobe.com",
|
||||
"type": "Secondary",
|
||||
@ -50,10 +60,37 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:adobe:experience_manager:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "6.5.21",
|
||||
"matchCriteriaId": "33F20D83-E0D3-4504-B15F-C3240F8CFB90"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:adobe:experience_manager:*:*:*:*:aem_cloud_service:*:*:*",
|
||||
"versionEndExcluding": "2024.5",
|
||||
"matchCriteriaId": "8A667B96-AB3F-48AB-9980-11AB79AA7BD7"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://helpx.adobe.com/security/products/experience-manager/apsb24-28.html",
|
||||
"source": "psirt@adobe.com"
|
||||
"source": "psirt@adobe.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-36157",
|
||||
"sourceIdentifier": "psirt@adobe.com",
|
||||
"published": "2024-06-13T08:16:04.540",
|
||||
"lastModified": "2024-06-13T18:35:19.777",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2024-06-17T20:33:10.487",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -50,10 +50,37 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:adobe:experience_manager:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "6.5.21",
|
||||
"matchCriteriaId": "33F20D83-E0D3-4504-B15F-C3240F8CFB90"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:adobe:experience_manager:*:*:*:*:aem_cloud_service:*:*:*",
|
||||
"versionEndExcluding": "2024.5",
|
||||
"matchCriteriaId": "8A667B96-AB3F-48AB-9980-11AB79AA7BD7"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://helpx.adobe.com/security/products/experience-manager/apsb24-28.html",
|
||||
"source": "psirt@adobe.com"
|
||||
"source": "psirt@adobe.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-36163",
|
||||
"sourceIdentifier": "psirt@adobe.com",
|
||||
"published": "2024-06-13T08:16:06.063",
|
||||
"lastModified": "2024-06-13T18:35:19.777",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2024-06-17T20:33:01.803",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -50,10 +50,37 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:adobe:experience_manager:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "6.5.21",
|
||||
"matchCriteriaId": "33F20D83-E0D3-4504-B15F-C3240F8CFB90"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:adobe:experience_manager:*:*:*:*:aem_cloud_service:*:*:*",
|
||||
"versionEndExcluding": "2024.5",
|
||||
"matchCriteriaId": "8A667B96-AB3F-48AB-9980-11AB79AA7BD7"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://helpx.adobe.com/security/products/experience-manager/apsb24-28.html",
|
||||
"source": "psirt@adobe.com"
|
||||
"source": "psirt@adobe.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-36164",
|
||||
"sourceIdentifier": "psirt@adobe.com",
|
||||
"published": "2024-06-13T08:16:06.287",
|
||||
"lastModified": "2024-06-13T18:35:19.777",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2024-06-17T20:32:51.417",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -50,10 +50,37 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:adobe:experience_manager:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "6.5.21",
|
||||
"matchCriteriaId": "33F20D83-E0D3-4504-B15F-C3240F8CFB90"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:adobe:experience_manager:*:*:*:*:aem_cloud_service:*:*:*",
|
||||
"versionEndExcluding": "2024.5",
|
||||
"matchCriteriaId": "8A667B96-AB3F-48AB-9980-11AB79AA7BD7"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://helpx.adobe.com/security/products/experience-manager/apsb24-28.html",
|
||||
"source": "psirt@adobe.com"
|
||||
"source": "psirt@adobe.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-36227",
|
||||
"sourceIdentifier": "psirt@adobe.com",
|
||||
"published": "2024-06-13T08:16:20.683",
|
||||
"lastModified": "2024-06-13T18:35:19.777",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2024-06-17T20:12:46.843",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -50,10 +50,37 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:adobe:experience_manager:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "6.5.21",
|
||||
"matchCriteriaId": "33F20D83-E0D3-4504-B15F-C3240F8CFB90"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:adobe:experience_manager:*:*:*:*:aem_cloud_service:*:*:*",
|
||||
"versionEndExcluding": "2024.5",
|
||||
"matchCriteriaId": "8A667B96-AB3F-48AB-9980-11AB79AA7BD7"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://helpx.adobe.com/security/products/experience-manager/apsb24-28.html",
|
||||
"source": "psirt@adobe.com"
|
||||
"source": "psirt@adobe.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-36228",
|
||||
"sourceIdentifier": "psirt@adobe.com",
|
||||
"published": "2024-06-13T08:16:20.913",
|
||||
"lastModified": "2024-06-13T18:35:19.777",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2024-06-17T20:12:35.727",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -16,6 +16,26 @@
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 5.4,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.3,
|
||||
"impactScore": 2.7
|
||||
},
|
||||
{
|
||||
"source": "psirt@adobe.com",
|
||||
"type": "Secondary",
|
||||
@ -50,10 +70,37 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:adobe:experience_manager:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "6.5.21",
|
||||
"matchCriteriaId": "33F20D83-E0D3-4504-B15F-C3240F8CFB90"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:adobe:experience_manager:*:*:*:*:aem_cloud_service:*:*:*",
|
||||
"versionEndExcluding": "2024.5",
|
||||
"matchCriteriaId": "8A667B96-AB3F-48AB-9980-11AB79AA7BD7"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://helpx.adobe.com/security/products/experience-manager/apsb24-28.html",
|
||||
"source": "psirt@adobe.com"
|
||||
"source": "psirt@adobe.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-36229",
|
||||
"sourceIdentifier": "psirt@adobe.com",
|
||||
"published": "2024-06-13T08:16:21.143",
|
||||
"lastModified": "2024-06-13T18:35:19.777",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2024-06-17T20:12:20.760",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -50,10 +50,37 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:adobe:experience_manager:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "6.5.21",
|
||||
"matchCriteriaId": "33F20D83-E0D3-4504-B15F-C3240F8CFB90"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:adobe:experience_manager:*:*:*:*:aem_cloud_service:*:*:*",
|
||||
"versionEndExcluding": "2024.5",
|
||||
"matchCriteriaId": "8A667B96-AB3F-48AB-9980-11AB79AA7BD7"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://helpx.adobe.com/security/products/experience-manager/apsb24-28.html",
|
||||
"source": "psirt@adobe.com"
|
||||
"source": "psirt@adobe.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-36230",
|
||||
"sourceIdentifier": "psirt@adobe.com",
|
||||
"published": "2024-06-13T08:16:21.360",
|
||||
"lastModified": "2024-06-13T18:35:19.777",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2024-06-17T20:10:31.787",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -50,10 +50,37 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:adobe:experience_manager:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "6.5.21",
|
||||
"matchCriteriaId": "33F20D83-E0D3-4504-B15F-C3240F8CFB90"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:adobe:experience_manager:*:*:*:*:aem_cloud_service:*:*:*",
|
||||
"versionEndExcluding": "2024.5",
|
||||
"matchCriteriaId": "8A667B96-AB3F-48AB-9980-11AB79AA7BD7"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://helpx.adobe.com/security/products/experience-manager/apsb24-28.html",
|
||||
"source": "psirt@adobe.com"
|
||||
"source": "psirt@adobe.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-36233",
|
||||
"sourceIdentifier": "psirt@adobe.com",
|
||||
"published": "2024-06-13T08:16:22.107",
|
||||
"lastModified": "2024-06-13T18:35:19.777",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2024-06-17T20:22:07.620",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -50,10 +50,37 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:adobe:experience_manager:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "6.5.21",
|
||||
"matchCriteriaId": "33F20D83-E0D3-4504-B15F-C3240F8CFB90"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:adobe:experience_manager:*:*:*:*:aem_cloud_service:*:*:*",
|
||||
"versionEndExcluding": "2024.5",
|
||||
"matchCriteriaId": "8A667B96-AB3F-48AB-9980-11AB79AA7BD7"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://helpx.adobe.com/security/products/experience-manager/apsb24-28.html",
|
||||
"source": "psirt@adobe.com"
|
||||
"source": "psirt@adobe.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-36234",
|
||||
"sourceIdentifier": "psirt@adobe.com",
|
||||
"published": "2024-06-13T08:16:22.343",
|
||||
"lastModified": "2024-06-13T18:35:19.777",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2024-06-17T20:21:54.507",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -50,10 +50,37 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:adobe:experience_manager:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "6.5.21",
|
||||
"matchCriteriaId": "33F20D83-E0D3-4504-B15F-C3240F8CFB90"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:adobe:experience_manager:*:*:*:*:aem_cloud_service:*:*:*",
|
||||
"versionEndExcluding": "2024.5",
|
||||
"matchCriteriaId": "8A667B96-AB3F-48AB-9980-11AB79AA7BD7"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://helpx.adobe.com/security/products/experience-manager/apsb24-28.html",
|
||||
"source": "psirt@adobe.com"
|
||||
"source": "psirt@adobe.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-36235",
|
||||
"sourceIdentifier": "psirt@adobe.com",
|
||||
"published": "2024-06-13T08:16:22.577",
|
||||
"lastModified": "2024-06-13T18:35:19.777",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2024-06-17T20:21:30.017",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -39,6 +39,16 @@
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "psirt@adobe.com",
|
||||
"type": "Secondary",
|
||||
@ -50,10 +60,37 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:adobe:experience_manager:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "6.5.21",
|
||||
"matchCriteriaId": "33F20D83-E0D3-4504-B15F-C3240F8CFB90"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:adobe:experience_manager:*:*:*:*:aem_cloud_service:*:*:*",
|
||||
"versionEndExcluding": "2024.5",
|
||||
"matchCriteriaId": "8A667B96-AB3F-48AB-9980-11AB79AA7BD7"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://helpx.adobe.com/security/products/experience-manager/apsb24-28.html",
|
||||
"source": "psirt@adobe.com"
|
||||
"source": "psirt@adobe.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-36236",
|
||||
"sourceIdentifier": "psirt@adobe.com",
|
||||
"published": "2024-06-13T08:16:22.817",
|
||||
"lastModified": "2024-06-13T18:35:19.777",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2024-06-17T20:21:20.523",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -16,6 +16,26 @@
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 5.4,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.3,
|
||||
"impactScore": 2.7
|
||||
},
|
||||
{
|
||||
"source": "psirt@adobe.com",
|
||||
"type": "Secondary",
|
||||
@ -50,10 +70,37 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:adobe:experience_manager:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "6.5.21",
|
||||
"matchCriteriaId": "33F20D83-E0D3-4504-B15F-C3240F8CFB90"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:adobe:experience_manager:*:*:*:*:aem_cloud_service:*:*:*",
|
||||
"versionEndExcluding": "2024.5",
|
||||
"matchCriteriaId": "8A667B96-AB3F-48AB-9980-11AB79AA7BD7"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://helpx.adobe.com/security/products/experience-manager/apsb24-28.html",
|
||||
"source": "psirt@adobe.com"
|
||||
"source": "psirt@adobe.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-36238",
|
||||
"sourceIdentifier": "psirt@adobe.com",
|
||||
"published": "2024-06-13T08:16:23.057",
|
||||
"lastModified": "2024-06-13T18:35:19.777",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2024-06-17T20:20:28.453",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -50,10 +50,37 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:adobe:experience_manager:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "6.5.21",
|
||||
"matchCriteriaId": "33F20D83-E0D3-4504-B15F-C3240F8CFB90"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:adobe:experience_manager:*:*:*:*:aem_cloud_service:*:*:*",
|
||||
"versionEndExcluding": "2024.5",
|
||||
"matchCriteriaId": "8A667B96-AB3F-48AB-9980-11AB79AA7BD7"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://helpx.adobe.com/security/products/experience-manager/apsb24-28.html",
|
||||
"source": "psirt@adobe.com"
|
||||
"source": "psirt@adobe.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-36239",
|
||||
"sourceIdentifier": "psirt@adobe.com",
|
||||
"published": "2024-06-13T08:16:23.323",
|
||||
"lastModified": "2024-06-13T18:35:19.777",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2024-06-17T20:20:18.633",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -50,10 +50,37 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:adobe:experience_manager:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "6.5.21",
|
||||
"matchCriteriaId": "33F20D83-E0D3-4504-B15F-C3240F8CFB90"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:adobe:experience_manager:*:*:*:*:aem_cloud_service:*:*:*",
|
||||
"versionEndExcluding": "2024.5",
|
||||
"matchCriteriaId": "8A667B96-AB3F-48AB-9980-11AB79AA7BD7"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://helpx.adobe.com/security/products/experience-manager/apsb24-28.html",
|
||||
"source": "psirt@adobe.com"
|
||||
"source": "psirt@adobe.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,12 +2,12 @@
|
||||
"id": "CVE-2024-36821",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-06-11T18:15:13.927",
|
||||
"lastModified": "2024-06-13T18:36:09.013",
|
||||
"lastModified": "2024-06-17T21:15:50.960",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Insecure permissions in Linksys Velop WiFi 5 (WHW01v1) 1.1.13.202617 allows attackers to escalate privileges from Guest to root via a directory traversal."
|
||||
"value": "Insecure permissions in Linksys Velop WiFi 5 (WHW01v1) 1.1.13.202617 allows attackers to escalate privileges from Guest to root."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-36837",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-06-05T15:15:11.803",
|
||||
"lastModified": "2024-06-06T14:17:35.017",
|
||||
"lastModified": "2024-06-17T21:15:51.050",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -17,7 +17,7 @@
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://7nkdkj-my.sharepoint.com/:w:/g/personal/krypt0n_7nkdkj_onmicrosoft_com/Ea8dW8YuldRMqgCy7KHjnxABTJCVPLShHIJfqQk684mD3A?e=0qmN7t",
|
||||
"url": "https://github.com/phtcloud-dev/CVE-2024-36837",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
|
75
CVE-2024/CVE-2024-373xx/CVE-2024-37305.json
Normal file
75
CVE-2024/CVE-2024-373xx/CVE-2024-37305.json
Normal file
@ -0,0 +1,75 @@
|
||||
{
|
||||
"id": "CVE-2024-37305",
|
||||
"sourceIdentifier": "security-advisories@github.com",
|
||||
"published": "2024-06-17T20:15:12.880",
|
||||
"lastModified": "2024-06-17T20:15:12.880",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "oqs-provider is a provider for the OpenSSL 3 cryptography library that adds support for post-quantum cryptography in TLS, X.509, and S/MIME using post-quantum algorithms from liboqs. Flaws have been identified in the way oqs-provider handles lengths decoded with DECODE_UINT32 at the start of serialized hybrid (traditional + post-quantum) keys and signatures. Unchecked length values are later used for memory reads and writes; malformed input can lead to crashes or information leakage. Handling of plain/non-hybrid PQ key operation is not affected. This issue has been patched in in v0.6.1. All users are advised to upgrade. There are no workarounds for this issue."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 8.2,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 4.2
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-120"
|
||||
},
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-130"
|
||||
},
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-190"
|
||||
},
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-680"
|
||||
},
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-805"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/open-quantum-safe/oqs-provider/pull/416",
|
||||
"source": "security-advisories@github.com"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/open-quantum-safe/oqs-provider/security/advisories/GHSA-pqvr-5cr8-v6fx",
|
||||
"source": "security-advisories@github.com"
|
||||
}
|
||||
]
|
||||
}
|
24
CVE-2024/CVE-2024-377xx/CVE-2024-37798.json
Normal file
24
CVE-2024/CVE-2024-377xx/CVE-2024-37798.json
Normal file
@ -0,0 +1,24 @@
|
||||
{
|
||||
"id": "CVE-2024-37798",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-06-17T21:15:51.180",
|
||||
"lastModified": "2024-06-17T21:15:51.180",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Cross-site scripting (XSS) vulnerability in search-appointment.php in the Admin Panel in Phpgurukul Beauty Parlour Management System 1.0 allows remote attackers to inject arbitrary web script or HTML via the search input field."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://cyberxtron.com/blog/cve-2024-37798---cross-site-scripting-xss-in-beauty-parlour-management-system--5187",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://owasp.org/www-community/attacks/xss/",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
24
CVE-2024/CVE-2024-378xx/CVE-2024-37828.json
Normal file
24
CVE-2024/CVE-2024-378xx/CVE-2024-37828.json
Normal file
@ -0,0 +1,24 @@
|
||||
{
|
||||
"id": "CVE-2024-37828",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-06-17T21:15:51.280",
|
||||
"lastModified": "2024-06-17T21:15:51.280",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A stored cross-site scripting (XSS) in Vermeg Agile Reporter v23.2.1 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the Message field under the Set Broadcast Message module."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://crashpark.weebly.com/blog/2-stored-xss-in-agilereporter-213-by-vermeg",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://www.vermeg.com/agile-reporter/",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
83
CVE-2024/CVE-2024-378xx/CVE-2024-37890.json
Normal file
83
CVE-2024/CVE-2024-378xx/CVE-2024-37890.json
Normal file
@ -0,0 +1,83 @@
|
||||
{
|
||||
"id": "CVE-2024-37890",
|
||||
"sourceIdentifier": "security-advisories@github.com",
|
||||
"published": "2024-06-17T20:15:13.203",
|
||||
"lastModified": "2024-06-17T20:15:13.203",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "ws is an open source WebSocket client and server for Node.js. A request with a number of headers exceeding theserver.maxHeadersCount threshold could be used to crash a ws server. The vulnerability was fixed in ws@8.17.1 (e55e510) and backported to ws@7.5.10 (22c2876), ws@6.2.3 (eeb76d3), and ws@5.2.4 (4abd8f6). In vulnerable versions of ws, the issue can be mitigated in the following ways: 1. Reduce the maximum allowed length of the request headers using the --max-http-header-size=size and/or the maxHeaderSize options so that no more headers than the server.maxHeadersCount limit can be sent. 2. Set server.maxHeadersCount to 0 so that no limit is applied."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 7.5,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-476"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/websockets/ws/commit/22c28763234aa75a7e1b76f5c01c181260d7917f",
|
||||
"source": "security-advisories@github.com"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/websockets/ws/commit/4abd8f6de4b0b65ef80b3ff081989479ed93377e",
|
||||
"source": "security-advisories@github.com"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/websockets/ws/commit/e55e5106f10fcbaac37cfa89759e4cc0d073a52c",
|
||||
"source": "security-advisories@github.com"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/websockets/ws/commit/eeb76d313e2a00dd5247ca3597bba7877d064a63",
|
||||
"source": "security-advisories@github.com"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/websockets/ws/issues/2230",
|
||||
"source": "security-advisories@github.com"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/websockets/ws/pull/2231",
|
||||
"source": "security-advisories@github.com"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/websockets/ws/security/advisories/GHSA-3h5v-q93c-6h6q",
|
||||
"source": "security-advisories@github.com"
|
||||
},
|
||||
{
|
||||
"url": "https://nodejs.org/api/http.html#servermaxheaderscount",
|
||||
"source": "security-advisories@github.com"
|
||||
}
|
||||
]
|
||||
}
|
59
CVE-2024/CVE-2024-378xx/CVE-2024-37891.json
Normal file
59
CVE-2024/CVE-2024-378xx/CVE-2024-37891.json
Normal file
@ -0,0 +1,59 @@
|
||||
{
|
||||
"id": "CVE-2024-37891",
|
||||
"sourceIdentifier": "security-advisories@github.com",
|
||||
"published": "2024-06-17T20:15:13.450",
|
||||
"lastModified": "2024-06-17T20:15:13.450",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": " urllib3 is a user-friendly HTTP client library for Python. When using urllib3's proxy support with `ProxyManager`, the `Proxy-Authorization` header is only sent to the configured proxy, as expected. However, when sending HTTP requests *without* using urllib3's proxy support, it's possible to accidentally configure the `Proxy-Authorization` header even though it won't have any effect as the request is not using a forwarding proxy or a tunneling proxy. In those cases, urllib3 doesn't treat the `Proxy-Authorization` HTTP header as one carrying authentication material and thus doesn't strip the header on cross-origin redirects. Because this is a highly unlikely scenario, we believe the severity of this vulnerability is low for almost all users. Out of an abundance of caution urllib3 will automatically strip the `Proxy-Authorization` header during cross-origin redirects to avoid the small chance that users are doing this on accident. Users should use urllib3's proxy support or disable automatic redirects to achieve safe processing of the `Proxy-Authorization` header, but we still decided to strip the header by default in order to further protect users who aren't using the correct approach. We believe the number of usages affected by this advisory is low. It requires all of the following to be true to be exploited: 1. Setting the `Proxy-Authorization` header without using urllib3's built-in proxy support. 2. Not disabling HTTP redirects. 3. Either not using an HTTPS origin server or for the proxy or target origin to redirect to a malicious origin. Users are advised to update to either version 1.26.19 or version 2.2.2. Users unable to upgrade may use the `Proxy-Authorization` header with urllib3's `ProxyManager`, disable HTTP redirects using `redirects=False` when sending requests, or not user the `Proxy-Authorization` header as mitigations."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "HIGH",
|
||||
"privilegesRequired": "HIGH",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 4.4,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 0.7,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-669"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/urllib3/urllib3/commit/accff72ecc2f6cf5a76d9570198a93ac7c90270e",
|
||||
"source": "security-advisories@github.com"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/urllib3/urllib3/security/advisories/GHSA-34jh-p97f-mpxf",
|
||||
"source": "security-advisories@github.com"
|
||||
}
|
||||
]
|
||||
}
|
67
CVE-2024/CVE-2024-378xx/CVE-2024-37893.json
Normal file
67
CVE-2024/CVE-2024-378xx/CVE-2024-37893.json
Normal file
@ -0,0 +1,67 @@
|
||||
{
|
||||
"id": "CVE-2024-37893",
|
||||
"sourceIdentifier": "security-advisories@github.com",
|
||||
"published": "2024-06-17T20:15:13.700",
|
||||
"lastModified": "2024-06-17T20:15:13.700",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Firefly III is a free and open source personal finance manager. In affected versions an MFA bypass in the Firefly III OAuth flow may allow malicious users to bypass the MFA-check. This allows malicious users to use password spraying to gain access to Firefly III data using passwords stolen from other sources. As OAuth applications are easily enumerable using an incrementing id, an attacker could try sign an OAuth application up to a users profile quite easily if they have created one. The attacker would also need to know the victims username and password. This problem has been patched in Firefly III v6.1.17 and up. Users are advised to upgrade. Users unable to upgrade should Use a unique password for their Firefly III instance and store their password securely, i.e. in a password manager."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "HIGH",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 5.9,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.2,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-287"
|
||||
},
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-288"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/firefly-iii/firefly-iii/security/advisories/GHSA-4gm4-c4mh-4p7w",
|
||||
"source": "security-advisories@github.com"
|
||||
},
|
||||
{
|
||||
"url": "https://owasp.org/www-community/attacks/Password_Spraying_Attack",
|
||||
"source": "security-advisories@github.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.menlosecurity.com/what-is/highly-evasive-adaptive-threats-heat/mfa-bypass",
|
||||
"source": "security-advisories@github.com"
|
||||
}
|
||||
]
|
||||
}
|
55
CVE-2024/CVE-2024-378xx/CVE-2024-37895.json
Normal file
55
CVE-2024/CVE-2024-378xx/CVE-2024-37895.json
Normal file
@ -0,0 +1,55 @@
|
||||
{
|
||||
"id": "CVE-2024-37895",
|
||||
"sourceIdentifier": "security-advisories@github.com",
|
||||
"published": "2024-06-17T20:15:13.970",
|
||||
"lastModified": "2024-06-17T20:15:13.970",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Lobe Chat is an open-source LLMs/AI chat framework. In affected versions if an attacker can successfully authenticate through SSO/Access Code, they can obtain the real backend API Key by modifying the base URL to their own attack URL on the frontend and setting up a server-side request. This issue has been addressed in version 0.162.25. Users are advised to upgrade. There are no known workarounds for this vulnerability."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 5.7,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.1,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-200"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/lobehub/lobe-chat/security/advisories/GHSA-p36r-qxgx-jq2v",
|
||||
"source": "security-advisories@github.com"
|
||||
}
|
||||
]
|
||||
}
|
59
CVE-2024/CVE-2024-378xx/CVE-2024-37896.json
Normal file
59
CVE-2024/CVE-2024-378xx/CVE-2024-37896.json
Normal file
@ -0,0 +1,59 @@
|
||||
{
|
||||
"id": "CVE-2024-37896",
|
||||
"sourceIdentifier": "security-advisories@github.com",
|
||||
"published": "2024-06-17T20:15:14.213",
|
||||
"lastModified": "2024-06-17T20:15:14.213",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Gin-vue-admin is a backstage management system based on vue and gin. Gin-vue-admin <= v2.6.5 has SQL injection vulnerability. The SQL injection vulnerabilities occur when a web application allows users to input data into SQL queries without sufficiently validating or sanitizing the input. Failing to properly enforce restrictions on user input could mean that even a basic form input field can be used to inject arbitrary and potentially dangerous SQL commands. This could lead to unauthorized access to the database, data leakage, data manipulation, or even complete compromise of the database server. This vulnerability has been addressed in commit `53d033821` which has been included in release version 2.6.6. Users are advised to upgrade. There are no known workarounds for this vulnerability."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 8.8,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-89"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/flipped-aurora/gin-vue-admin/commit/53d03382188868464ade489ab0713b54392d227f",
|
||||
"source": "security-advisories@github.com"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/flipped-aurora/gin-vue-admin/security/advisories/GHSA-gf3r-h744-mqgp",
|
||||
"source": "security-advisories@github.com"
|
||||
}
|
||||
]
|
||||
}
|
59
CVE-2024/CVE-2024-379xx/CVE-2024-37902.json
Normal file
59
CVE-2024/CVE-2024-379xx/CVE-2024-37902.json
Normal file
@ -0,0 +1,59 @@
|
||||
{
|
||||
"id": "CVE-2024-37902",
|
||||
"sourceIdentifier": "security-advisories@github.com",
|
||||
"published": "2024-06-17T20:15:14.463",
|
||||
"lastModified": "2024-06-17T20:15:14.463",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "DeepJavaLibrary(DJL) is an Engine-Agnostic Deep Learning Framework in Java. DJL versions 0.1.0 through 0.27.0 do not prevent absolute path archived artifacts from inserting archived files directly into the system, overwriting system files. This is fixed in DJL 0.28.0 and patched in DJL Large Model Inference containers version 0.27.0. Users are advised to upgrade."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 10.0,
|
||||
"baseSeverity": "CRITICAL"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 6.0
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-22"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/deepjavalibrary/djl/releases/tag/v0.28.0",
|
||||
"source": "security-advisories@github.com"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/deepjavalibrary/djl/security/advisories/GHSA-w877-jfw7-46rj",
|
||||
"source": "security-advisories@github.com"
|
||||
}
|
||||
]
|
||||
}
|
100
CVE-2024/CVE-2024-60xx/CVE-2024-6061.json
Normal file
100
CVE-2024/CVE-2024-60xx/CVE-2024-6061.json
Normal file
@ -0,0 +1,100 @@
|
||||
{
|
||||
"id": "CVE-2024-6061",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2024-06-17T20:15:14.850",
|
||||
"lastModified": "2024-06-17T20:15:14.850",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A vulnerability has been found in GPAC 2.5-DEV-rev228-g11067ea92-master and classified as problematic. Affected by this vulnerability is the function isoffin_process of the file src/filters/isoffin_read.c of the component MP4Box. The manipulation leads to infinite loop. It is possible to launch the attack on the local host. The exploit has been disclosed to the public and may be used. The identifier of the patch is 20c0f29139a82779b86453ce7f68d0681ec7624c. It is recommended to apply a patch to fix this issue. The identifier VDB-268789 was assigned to this vulnerability."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "LOW",
|
||||
"baseScore": 3.3,
|
||||
"baseSeverity": "LOW"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 1.4
|
||||
}
|
||||
],
|
||||
"cvssMetricV2": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "2.0",
|
||||
"vectorString": "AV:L/AC:L/Au:S/C:N/I:N/A:P",
|
||||
"accessVector": "LOCAL",
|
||||
"accessComplexity": "LOW",
|
||||
"authentication": "SINGLE",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "PARTIAL",
|
||||
"baseScore": 1.7
|
||||
},
|
||||
"baseSeverity": "LOW",
|
||||
"exploitabilityScore": 3.1,
|
||||
"impactScore": 2.9,
|
||||
"acInsufInfo": false,
|
||||
"obtainAllPrivilege": false,
|
||||
"obtainUserPrivilege": false,
|
||||
"obtainOtherPrivilege": false,
|
||||
"userInteractionRequired": false
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-835"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/gpac/gpac/commit/20c0f29139a82779b86453ce7f68d0681ec7624c",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/gpac/gpac/issues/2871",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/user-attachments/files/15801058/poc1.zip",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.268789",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.268789",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?submit.356308",
|
||||
"source": "cna@vuldb.com"
|
||||
}
|
||||
]
|
||||
}
|
100
CVE-2024/CVE-2024-60xx/CVE-2024-6062.json
Normal file
100
CVE-2024/CVE-2024-60xx/CVE-2024-6062.json
Normal file
@ -0,0 +1,100 @@
|
||||
{
|
||||
"id": "CVE-2024-6062",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2024-06-17T20:15:15.170",
|
||||
"lastModified": "2024-06-17T20:15:15.170",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A vulnerability was found in GPAC 2.5-DEV-rev228-g11067ea92-master and classified as problematic. Affected by this issue is the function swf_svg_add_iso_sample of the file src/filters/load_text.c of the component MP4Box. The manipulation leads to null pointer dereference. The attack needs to be approached locally. The exploit has been disclosed to the public and may be used. The patch is identified as 31e499d310a48bd17c8b055a0bfe0fe35887a7cd. It is recommended to apply a patch to fix this issue. VDB-268790 is the identifier assigned to this vulnerability."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "LOW",
|
||||
"baseScore": 3.3,
|
||||
"baseSeverity": "LOW"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 1.4
|
||||
}
|
||||
],
|
||||
"cvssMetricV2": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "2.0",
|
||||
"vectorString": "AV:L/AC:L/Au:S/C:N/I:N/A:P",
|
||||
"accessVector": "LOCAL",
|
||||
"accessComplexity": "LOW",
|
||||
"authentication": "SINGLE",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "PARTIAL",
|
||||
"baseScore": 1.7
|
||||
},
|
||||
"baseSeverity": "LOW",
|
||||
"exploitabilityScore": 3.1,
|
||||
"impactScore": 2.9,
|
||||
"acInsufInfo": false,
|
||||
"obtainAllPrivilege": false,
|
||||
"obtainUserPrivilege": false,
|
||||
"obtainOtherPrivilege": false,
|
||||
"userInteractionRequired": false
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-476"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/gpac/gpac/commit/31e499d310a48bd17c8b055a0bfe0fe35887a7cd",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/gpac/gpac/issues/2872",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/user-attachments/files/15801126/poc2.zip",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.268790",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.268790",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?submit.356314",
|
||||
"source": "cna@vuldb.com"
|
||||
}
|
||||
]
|
||||
}
|
100
CVE-2024/CVE-2024-60xx/CVE-2024-6063.json
Normal file
100
CVE-2024/CVE-2024-60xx/CVE-2024-6063.json
Normal file
@ -0,0 +1,100 @@
|
||||
{
|
||||
"id": "CVE-2024-6063",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2024-06-17T21:15:51.443",
|
||||
"lastModified": "2024-06-17T21:15:51.443",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A vulnerability was found in GPAC 2.5-DEV-rev228-g11067ea92-master. It has been classified as problematic. This affects the function m2tsdmx_on_event of the file src/filters/dmx_m2ts.c of the component MP4Box. The manipulation leads to null pointer dereference. An attack has to be approached locally. The exploit has been disclosed to the public and may be used. The patch is named 8767ed0a77c4b02287db3723e92c2169f67c85d5. It is recommended to apply a patch to fix this issue. The associated identifier of this vulnerability is VDB-268791."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "LOW",
|
||||
"baseScore": 3.3,
|
||||
"baseSeverity": "LOW"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 1.4
|
||||
}
|
||||
],
|
||||
"cvssMetricV2": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "2.0",
|
||||
"vectorString": "AV:L/AC:L/Au:S/C:N/I:N/A:P",
|
||||
"accessVector": "LOCAL",
|
||||
"accessComplexity": "LOW",
|
||||
"authentication": "SINGLE",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "PARTIAL",
|
||||
"baseScore": 1.7
|
||||
},
|
||||
"baseSeverity": "LOW",
|
||||
"exploitabilityScore": 3.1,
|
||||
"impactScore": 2.9,
|
||||
"acInsufInfo": false,
|
||||
"obtainAllPrivilege": false,
|
||||
"obtainUserPrivilege": false,
|
||||
"obtainOtherPrivilege": false,
|
||||
"userInteractionRequired": false
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-476"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/gpac/gpac/commit/8767ed0a77c4b02287db3723e92c2169f67c85d5",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/gpac/gpac/issues/2873",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/user-attachments/files/15801157/poc.zip",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.268791",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.268791",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?submit.356315",
|
||||
"source": "cna@vuldb.com"
|
||||
}
|
||||
]
|
||||
}
|
100
CVE-2024/CVE-2024-60xx/CVE-2024-6064.json
Normal file
100
CVE-2024/CVE-2024-60xx/CVE-2024-6064.json
Normal file
@ -0,0 +1,100 @@
|
||||
{
|
||||
"id": "CVE-2024-6064",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2024-06-17T21:15:51.727",
|
||||
"lastModified": "2024-06-17T21:15:51.727",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A vulnerability was found in GPAC 2.5-DEV-rev228-g11067ea92-master. It has been declared as problematic. This vulnerability affects the function xmt_node_end of the file src/scene_manager/loader_xmt.c of the component MP4Box. The manipulation leads to use after free. Local access is required to approach this attack. The exploit has been disclosed to the public and may be used. The name of the patch is f4b3e4d2f91bc1749e7a924a8ab171af03a355a8/c1b9c794bad8f262c56f3cf690567980d96662f5. It is recommended to apply a patch to fix this issue. The identifier of this vulnerability is VDB-268792."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "LOW",
|
||||
"baseScore": 5.3,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 3.4
|
||||
}
|
||||
],
|
||||
"cvssMetricV2": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "2.0",
|
||||
"vectorString": "AV:L/AC:L/Au:S/C:P/I:P/A:P",
|
||||
"accessVector": "LOCAL",
|
||||
"accessComplexity": "LOW",
|
||||
"authentication": "SINGLE",
|
||||
"confidentialityImpact": "PARTIAL",
|
||||
"integrityImpact": "PARTIAL",
|
||||
"availabilityImpact": "PARTIAL",
|
||||
"baseScore": 4.3
|
||||
},
|
||||
"baseSeverity": "MEDIUM",
|
||||
"exploitabilityScore": 3.1,
|
||||
"impactScore": 6.4,
|
||||
"acInsufInfo": false,
|
||||
"obtainAllPrivilege": false,
|
||||
"obtainUserPrivilege": false,
|
||||
"obtainOtherPrivilege": false,
|
||||
"userInteractionRequired": false
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-416"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/gpac/gpac/commit/c1b9c794bad8f262c56f3cf690567980d96662f5",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/gpac/gpac/issues/2874",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/user-attachments/files/15801189/poc.zip",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.268792",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.268792",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?submit.356316",
|
||||
"source": "cna@vuldb.com"
|
||||
}
|
||||
]
|
||||
}
|
92
CVE-2024/CVE-2024-60xx/CVE-2024-6065.json
Normal file
92
CVE-2024/CVE-2024-60xx/CVE-2024-6065.json
Normal file
@ -0,0 +1,92 @@
|
||||
{
|
||||
"id": "CVE-2024-6065",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2024-06-17T21:15:52.007",
|
||||
"lastModified": "2024-06-17T21:15:52.007",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A vulnerability was found in itsourcecode Bakery Online Ordering System 1.0. It has been rated as critical. This issue affects some unknown processing of the file index.php. The manipulation of the argument user_email leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-268793 was assigned to this vulnerability."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "LOW",
|
||||
"baseScore": 7.3,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 3.4
|
||||
}
|
||||
],
|
||||
"cvssMetricV2": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "2.0",
|
||||
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
|
||||
"accessVector": "NETWORK",
|
||||
"accessComplexity": "LOW",
|
||||
"authentication": "NONE",
|
||||
"confidentialityImpact": "PARTIAL",
|
||||
"integrityImpact": "PARTIAL",
|
||||
"availabilityImpact": "PARTIAL",
|
||||
"baseScore": 7.5
|
||||
},
|
||||
"baseSeverity": "HIGH",
|
||||
"exploitabilityScore": 10.0,
|
||||
"impactScore": 6.4,
|
||||
"acInsufInfo": false,
|
||||
"obtainAllPrivilege": false,
|
||||
"obtainUserPrivilege": false,
|
||||
"obtainOtherPrivilege": false,
|
||||
"userInteractionRequired": false
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-89"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/ppp-src/CVE/issues/4",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.268793",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.268793",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?submit.358386",
|
||||
"source": "cna@vuldb.com"
|
||||
}
|
||||
]
|
||||
}
|
92
CVE-2024/CVE-2024-60xx/CVE-2024-6066.json
Normal file
92
CVE-2024/CVE-2024-60xx/CVE-2024-6066.json
Normal file
@ -0,0 +1,92 @@
|
||||
{
|
||||
"id": "CVE-2024-6066",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2024-06-17T21:15:52.283",
|
||||
"lastModified": "2024-06-17T21:15:52.283",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A vulnerability classified as critical has been found in SourceCodester Best House Rental Management System 1.0. Affected is an unknown function of the file payment_report.php. The manipulation of the argument month_of leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. VDB-268794 is the identifier assigned to this vulnerability."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "LOW",
|
||||
"baseScore": 6.3,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 3.4
|
||||
}
|
||||
],
|
||||
"cvssMetricV2": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "2.0",
|
||||
"vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P",
|
||||
"accessVector": "NETWORK",
|
||||
"accessComplexity": "LOW",
|
||||
"authentication": "SINGLE",
|
||||
"confidentialityImpact": "PARTIAL",
|
||||
"integrityImpact": "PARTIAL",
|
||||
"availabilityImpact": "PARTIAL",
|
||||
"baseScore": 6.5
|
||||
},
|
||||
"baseSeverity": "MEDIUM",
|
||||
"exploitabilityScore": 8.0,
|
||||
"impactScore": 6.4,
|
||||
"acInsufInfo": false,
|
||||
"obtainAllPrivilege": false,
|
||||
"obtainUserPrivilege": false,
|
||||
"obtainOtherPrivilege": false,
|
||||
"userInteractionRequired": false
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-89"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/jadu101/CVE/blob/main/SourceCodester_House_Rental_Management_System_Sqli.md",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.268794",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.268794",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?submit.358439",
|
||||
"source": "cna@vuldb.com"
|
||||
}
|
||||
]
|
||||
}
|
90
README.md
90
README.md
@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours.
|
||||
### Last Repository Update
|
||||
|
||||
```plain
|
||||
2024-06-17T20:00:19.113866+00:00
|
||||
2024-06-17T22:00:18.732771+00:00
|
||||
```
|
||||
|
||||
### Most recent CVE Modification Timestamp synchronized with NVD
|
||||
|
||||
```plain
|
||||
2024-06-17T19:52:06.717000+00:00
|
||||
2024-06-17T21:15:52.283000+00:00
|
||||
```
|
||||
|
||||
### Last Data Feed Release
|
||||
@ -33,59 +33,59 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
|
||||
### Total Number of included CVEs
|
||||
|
||||
```plain
|
||||
254301
|
||||
254319
|
||||
```
|
||||
|
||||
### CVEs added in the last Commit
|
||||
|
||||
Recently added CVEs: `15`
|
||||
Recently added CVEs: `18`
|
||||
|
||||
- [CVE-2018-25103](CVE-2018/CVE-2018-251xx/CVE-2018-25103.json) (`2024-06-17T18:15:12.650`)
|
||||
- [CVE-2024-36527](CVE-2024/CVE-2024-365xx/CVE-2024-36527.json) (`2024-06-17T18:15:16.767`)
|
||||
- [CVE-2024-36543](CVE-2024/CVE-2024-365xx/CVE-2024-36543.json) (`2024-06-17T19:15:58.353`)
|
||||
- [CVE-2024-36973](CVE-2024/CVE-2024-369xx/CVE-2024-36973.json) (`2024-06-17T18:15:17.043`)
|
||||
- [CVE-2024-37661](CVE-2024/CVE-2024-376xx/CVE-2024-37661.json) (`2024-06-17T18:15:17.463`)
|
||||
- [CVE-2024-37662](CVE-2024/CVE-2024-376xx/CVE-2024-37662.json) (`2024-06-17T18:15:17.560`)
|
||||
- [CVE-2024-37663](CVE-2024/CVE-2024-376xx/CVE-2024-37663.json) (`2024-06-17T18:15:17.653`)
|
||||
- [CVE-2024-37664](CVE-2024/CVE-2024-376xx/CVE-2024-37664.json) (`2024-06-17T18:15:17.743`)
|
||||
- [CVE-2024-37794](CVE-2024/CVE-2024-377xx/CVE-2024-37794.json) (`2024-06-17T18:15:17.853`)
|
||||
- [CVE-2024-37795](CVE-2024/CVE-2024-377xx/CVE-2024-37795.json) (`2024-06-17T18:15:17.953`)
|
||||
- [CVE-2024-37840](CVE-2024/CVE-2024-378xx/CVE-2024-37840.json) (`2024-06-17T19:15:58.470`)
|
||||
- [CVE-2024-38449](CVE-2024/CVE-2024-384xx/CVE-2024-38449.json) (`2024-06-17T19:15:58.567`)
|
||||
- [CVE-2024-6056](CVE-2024/CVE-2024-60xx/CVE-2024-6056.json) (`2024-06-17T18:15:18.143`)
|
||||
- [CVE-2024-6058](CVE-2024/CVE-2024-60xx/CVE-2024-6058.json) (`2024-06-17T18:15:18.520`)
|
||||
- [CVE-2024-6059](CVE-2024/CVE-2024-60xx/CVE-2024-6059.json) (`2024-06-17T19:15:59.467`)
|
||||
- [CVE-2023-37057](CVE-2023/CVE-2023-370xx/CVE-2023-37057.json) (`2024-06-17T21:15:50.380`)
|
||||
- [CVE-2023-37058](CVE-2023/CVE-2023-370xx/CVE-2023-37058.json) (`2024-06-17T21:15:50.503`)
|
||||
- [CVE-2024-34833](CVE-2024/CVE-2024-348xx/CVE-2024-34833.json) (`2024-06-17T21:15:50.783`)
|
||||
- [CVE-2024-37305](CVE-2024/CVE-2024-373xx/CVE-2024-37305.json) (`2024-06-17T20:15:12.880`)
|
||||
- [CVE-2024-37798](CVE-2024/CVE-2024-377xx/CVE-2024-37798.json) (`2024-06-17T21:15:51.180`)
|
||||
- [CVE-2024-37828](CVE-2024/CVE-2024-378xx/CVE-2024-37828.json) (`2024-06-17T21:15:51.280`)
|
||||
- [CVE-2024-37890](CVE-2024/CVE-2024-378xx/CVE-2024-37890.json) (`2024-06-17T20:15:13.203`)
|
||||
- [CVE-2024-37891](CVE-2024/CVE-2024-378xx/CVE-2024-37891.json) (`2024-06-17T20:15:13.450`)
|
||||
- [CVE-2024-37893](CVE-2024/CVE-2024-378xx/CVE-2024-37893.json) (`2024-06-17T20:15:13.700`)
|
||||
- [CVE-2024-37895](CVE-2024/CVE-2024-378xx/CVE-2024-37895.json) (`2024-06-17T20:15:13.970`)
|
||||
- [CVE-2024-37896](CVE-2024/CVE-2024-378xx/CVE-2024-37896.json) (`2024-06-17T20:15:14.213`)
|
||||
- [CVE-2024-37902](CVE-2024/CVE-2024-379xx/CVE-2024-37902.json) (`2024-06-17T20:15:14.463`)
|
||||
- [CVE-2024-6061](CVE-2024/CVE-2024-60xx/CVE-2024-6061.json) (`2024-06-17T20:15:14.850`)
|
||||
- [CVE-2024-6062](CVE-2024/CVE-2024-60xx/CVE-2024-6062.json) (`2024-06-17T20:15:15.170`)
|
||||
- [CVE-2024-6063](CVE-2024/CVE-2024-60xx/CVE-2024-6063.json) (`2024-06-17T21:15:51.443`)
|
||||
- [CVE-2024-6064](CVE-2024/CVE-2024-60xx/CVE-2024-6064.json) (`2024-06-17T21:15:51.727`)
|
||||
- [CVE-2024-6065](CVE-2024/CVE-2024-60xx/CVE-2024-6065.json) (`2024-06-17T21:15:52.007`)
|
||||
- [CVE-2024-6066](CVE-2024/CVE-2024-60xx/CVE-2024-6066.json) (`2024-06-17T21:15:52.283`)
|
||||
|
||||
|
||||
### CVEs modified in the last Commit
|
||||
|
||||
Recently modified CVEs: `54`
|
||||
Recently modified CVEs: `22`
|
||||
|
||||
- [CVE-2024-36207](CVE-2024/CVE-2024-362xx/CVE-2024-36207.json) (`2024-06-17T19:22:41.023`)
|
||||
- [CVE-2024-36208](CVE-2024/CVE-2024-362xx/CVE-2024-36208.json) (`2024-06-17T19:22:29.990`)
|
||||
- [CVE-2024-36209](CVE-2024/CVE-2024-362xx/CVE-2024-36209.json) (`2024-06-17T19:22:21.057`)
|
||||
- [CVE-2024-36210](CVE-2024/CVE-2024-362xx/CVE-2024-36210.json) (`2024-06-17T19:22:07.157`)
|
||||
- [CVE-2024-36211](CVE-2024/CVE-2024-362xx/CVE-2024-36211.json) (`2024-06-17T19:21:53.777`)
|
||||
- [CVE-2024-36212](CVE-2024/CVE-2024-362xx/CVE-2024-36212.json) (`2024-06-17T19:21:43.703`)
|
||||
- [CVE-2024-36213](CVE-2024/CVE-2024-362xx/CVE-2024-36213.json) (`2024-06-17T19:09:24.977`)
|
||||
- [CVE-2024-36214](CVE-2024/CVE-2024-362xx/CVE-2024-36214.json) (`2024-06-17T19:35:49.083`)
|
||||
- [CVE-2024-36215](CVE-2024/CVE-2024-362xx/CVE-2024-36215.json) (`2024-06-17T19:33:11.697`)
|
||||
- [CVE-2024-36216](CVE-2024/CVE-2024-362xx/CVE-2024-36216.json) (`2024-06-17T19:42:09.377`)
|
||||
- [CVE-2024-36217](CVE-2024/CVE-2024-362xx/CVE-2024-36217.json) (`2024-06-17T19:33:01.643`)
|
||||
- [CVE-2024-36218](CVE-2024/CVE-2024-362xx/CVE-2024-36218.json) (`2024-06-17T19:32:51.723`)
|
||||
- [CVE-2024-36219](CVE-2024/CVE-2024-362xx/CVE-2024-36219.json) (`2024-06-17T19:32:42.640`)
|
||||
- [CVE-2024-36220](CVE-2024/CVE-2024-362xx/CVE-2024-36220.json) (`2024-06-17T19:48:35.573`)
|
||||
- [CVE-2024-36221](CVE-2024/CVE-2024-362xx/CVE-2024-36221.json) (`2024-06-17T19:48:20.473`)
|
||||
- [CVE-2024-36222](CVE-2024/CVE-2024-362xx/CVE-2024-36222.json) (`2024-06-17T19:45:39.257`)
|
||||
- [CVE-2024-36224](CVE-2024/CVE-2024-362xx/CVE-2024-36224.json) (`2024-06-17T19:45:13.547`)
|
||||
- [CVE-2024-36225](CVE-2024/CVE-2024-362xx/CVE-2024-36225.json) (`2024-06-17T19:37:58.810`)
|
||||
- [CVE-2024-36231](CVE-2024/CVE-2024-362xx/CVE-2024-36231.json) (`2024-06-17T19:52:06.717`)
|
||||
- [CVE-2024-36232](CVE-2024/CVE-2024-362xx/CVE-2024-36232.json) (`2024-06-17T19:51:25.503`)
|
||||
- [CVE-2024-3876](CVE-2024/CVE-2024-38xx/CVE-2024-3876.json) (`2024-06-17T19:15:58.763`)
|
||||
- [CVE-2024-4032](CVE-2024/CVE-2024-40xx/CVE-2024-4032.json) (`2024-06-17T18:15:18.047`)
|
||||
- [CVE-2024-4584](CVE-2024/CVE-2024-45xx/CVE-2024-4584.json) (`2024-06-17T19:15:58.903`)
|
||||
- [CVE-2024-4595](CVE-2024/CVE-2024-45xx/CVE-2024-4595.json) (`2024-06-17T19:15:59.063`)
|
||||
- [CVE-2024-5206](CVE-2024/CVE-2024-52xx/CVE-2024-5206.json) (`2024-06-17T19:15:59.190`)
|
||||
- [CVE-2024-25400](CVE-2024/CVE-2024-254xx/CVE-2024-25400.json) (`2024-06-17T20:15:12.000`)
|
||||
- [CVE-2024-26086](CVE-2024/CVE-2024-260xx/CVE-2024-26086.json) (`2024-06-17T20:31:51.467`)
|
||||
- [CVE-2024-26089](CVE-2024/CVE-2024-260xx/CVE-2024-26089.json) (`2024-06-17T20:32:03.657`)
|
||||
- [CVE-2024-26090](CVE-2024/CVE-2024-260xx/CVE-2024-26090.json) (`2024-06-17T20:32:18.073`)
|
||||
- [CVE-2024-26091](CVE-2024/CVE-2024-260xx/CVE-2024-26091.json) (`2024-06-17T20:32:37.817`)
|
||||
- [CVE-2024-26117](CVE-2024/CVE-2024-261xx/CVE-2024-26117.json) (`2024-06-17T20:31:38.117`)
|
||||
- [CVE-2024-36151](CVE-2024/CVE-2024-361xx/CVE-2024-36151.json) (`2024-06-17T20:33:37.130`)
|
||||
- [CVE-2024-36157](CVE-2024/CVE-2024-361xx/CVE-2024-36157.json) (`2024-06-17T20:33:10.487`)
|
||||
- [CVE-2024-36163](CVE-2024/CVE-2024-361xx/CVE-2024-36163.json) (`2024-06-17T20:33:01.803`)
|
||||
- [CVE-2024-36164](CVE-2024/CVE-2024-361xx/CVE-2024-36164.json) (`2024-06-17T20:32:51.417`)
|
||||
- [CVE-2024-36227](CVE-2024/CVE-2024-362xx/CVE-2024-36227.json) (`2024-06-17T20:12:46.843`)
|
||||
- [CVE-2024-36228](CVE-2024/CVE-2024-362xx/CVE-2024-36228.json) (`2024-06-17T20:12:35.727`)
|
||||
- [CVE-2024-36229](CVE-2024/CVE-2024-362xx/CVE-2024-36229.json) (`2024-06-17T20:12:20.760`)
|
||||
- [CVE-2024-36230](CVE-2024/CVE-2024-362xx/CVE-2024-36230.json) (`2024-06-17T20:10:31.787`)
|
||||
- [CVE-2024-36233](CVE-2024/CVE-2024-362xx/CVE-2024-36233.json) (`2024-06-17T20:22:07.620`)
|
||||
- [CVE-2024-36234](CVE-2024/CVE-2024-362xx/CVE-2024-36234.json) (`2024-06-17T20:21:54.507`)
|
||||
- [CVE-2024-36235](CVE-2024/CVE-2024-362xx/CVE-2024-36235.json) (`2024-06-17T20:21:30.017`)
|
||||
- [CVE-2024-36236](CVE-2024/CVE-2024-362xx/CVE-2024-36236.json) (`2024-06-17T20:21:20.523`)
|
||||
- [CVE-2024-36238](CVE-2024/CVE-2024-362xx/CVE-2024-36238.json) (`2024-06-17T20:20:28.453`)
|
||||
- [CVE-2024-36239](CVE-2024/CVE-2024-362xx/CVE-2024-36239.json) (`2024-06-17T20:20:18.633`)
|
||||
- [CVE-2024-36821](CVE-2024/CVE-2024-368xx/CVE-2024-36821.json) (`2024-06-17T21:15:50.960`)
|
||||
- [CVE-2024-36837](CVE-2024/CVE-2024-368xx/CVE-2024-36837.json) (`2024-06-17T21:15:51.050`)
|
||||
|
||||
|
||||
## Download and Usage
|
||||
|
200
_state.csv
200
_state.csv
@ -121379,7 +121379,7 @@ CVE-2018-25098,0,0,fcae82fd425e45c0b5170e1d16175026afcc4282c8c2d036ab7934ed74d6d
|
||||
CVE-2018-25099,0,0,4477c16cb5a3503e957873dbddbd3b50ffb7092ffd27acf2a352c93f686dfb7f,2024-03-18T12:38:25.490000
|
||||
CVE-2018-25100,0,0,26375a09020100e722ed36e37b25c669512cdaa2d61a780ec73480ee78db5d6b,2024-03-25T01:51:01.223000
|
||||
CVE-2018-25101,0,0,b04dde640afba29853f504e83596fe419f66817bb46aeb488be7718ce77d287c,2024-06-04T19:16:57.060000
|
||||
CVE-2018-25103,1,1,122206d0dffed87e661f65dbda0c75ede3d4cb0caf0ebcb77979d91738119961,2024-06-17T18:15:12.650000
|
||||
CVE-2018-25103,0,0,122206d0dffed87e661f65dbda0c75ede3d4cb0caf0ebcb77979d91738119961,2024-06-17T18:15:12.650000
|
||||
CVE-2018-2515,0,0,158f882e4275a7485a2b9ce17e7e57c4ea22cf74c55a78a9900c73a4caa327c0,2023-11-07T02:57:57.887000
|
||||
CVE-2018-2560,0,0,0bb1a26d6c05fddeb488697adb0bbe667a3dd77c1a5bc7af495c8721df5b1197,2020-08-24T17:37:01.140000
|
||||
CVE-2018-2561,0,0,b76feaa260e2f54fc8eeb8d50d578ffdd22b603f486ac4f8f5b3bc42df22fa45,2018-01-25T13:53:15.120000
|
||||
@ -227294,6 +227294,8 @@ CVE-2023-3703,0,0,76f02181cf5d80b7f612caff5073f455db91d34ac29ea7817245c12bf8efc7
|
||||
CVE-2023-3704,0,0,0b7c69bc28e7afdd5dcf10d8a79e926f269c85852f7d6befc01c8a1d3a76f806,2023-09-01T17:12:08.027000
|
||||
CVE-2023-37049,0,0,4a710d2494270e65f82c9c7a56bded47f634b44df6e778149a2d19ec0778c27d,2023-07-31T18:12:44.960000
|
||||
CVE-2023-3705,0,0,8c79d499f4e32027bc4150fd363eda1f383550d9e90e93d841777af54adc58f7,2023-08-31T00:37:27.440000
|
||||
CVE-2023-37057,1,1,58de6d15bbd15b1584a74442f183982523f5d7e7982a5eba81571241c832f712,2024-06-17T21:15:50.380000
|
||||
CVE-2023-37058,1,1,cefa1996e1157324212d1dd6d54dbf4556fbe37ae2ff2cba33a7cf48cdc49924,2024-06-17T21:15:50.503000
|
||||
CVE-2023-3706,0,0,d1d24339f524babb3c5d468291861ac849afd345e41ad883606273b20a797f16,2023-11-07T04:19:25.570000
|
||||
CVE-2023-37061,0,0,7caa8b5c6907e4b61cbed31197e8664c90d669fbc2f478d5af9b346f52feb24b,2023-07-12T20:58:22.373000
|
||||
CVE-2023-37062,0,0,915c2f5b9c7526d6273035bd201fe818387382f5f9119c439e8c7256d48d5151,2023-07-12T20:50:55.603000
|
||||
@ -240664,7 +240666,7 @@ CVE-2024-0393,0,0,8881de5088bee2f43467b73941f684354c9bcdccfa7386a7827d4a78a7e8f3
|
||||
CVE-2024-0394,0,0,132997f5a0f39575e52ab364803d29384d542a557e73a32dea0a249b2357dfb2,2024-04-03T17:24:18.150000
|
||||
CVE-2024-0395,0,0,9697a8ac3bbf759d0c2ea19b7ab0aa903676619b1d5a607c85b8d090a4e44ee7,2024-01-10T14:15:44.970000
|
||||
CVE-2024-0396,0,0,106628bcb832aae2e274e4e91fdb5add809827efe4c459066d3102ffe0249334,2024-01-29T15:22:40.317000
|
||||
CVE-2024-0397,0,1,fb8a60d96b18ded5a4df325ab5f16c2a3f8bca756e992bf0a8b459da554ad30b,2024-06-17T18:15:14.767000
|
||||
CVE-2024-0397,0,0,fb8a60d96b18ded5a4df325ab5f16c2a3f8bca756e992bf0a8b459da554ad30b,2024-06-17T18:15:14.767000
|
||||
CVE-2024-0399,0,0,f9efd00d0c28d2f5fd7844014ccf20e6de83c83ab3d0467105e159f94efa805f,2024-04-15T13:15:31.997000
|
||||
CVE-2024-0400,0,0,18035b4484267a537c15645ebee53285fc55ae5559f980b5f9795ec2795f24dd,2024-03-27T12:29:30.307000
|
||||
CVE-2024-0401,0,0,eb06da8d7bba1b4b23b9513633128fc89991a02e4c0b59d538b76f5796878a05,2024-05-20T19:34:58.277000
|
||||
@ -245300,7 +245302,7 @@ CVE-2024-25394,0,0,3d8e140eae2925b4367910ee589422aa82a5201da8cb9454d7cfeab54750f
|
||||
CVE-2024-25395,0,0,abd266324aba51820023e28c1ec1d426492f4e0244d7fc1826505354fc747bcb,2024-05-01T18:15:15.483000
|
||||
CVE-2024-25398,0,0,5f9177c45e78128f47bee33d155348e7281adb4722b60ad3313c147682b88eac,2024-02-28T14:07:00.563000
|
||||
CVE-2024-25399,0,0,b681bbee2f606a57716a8b8a1ed6ef4fd1407c61ce2bf8ffff233f88dd45b3ba,2024-02-28T14:07:00.563000
|
||||
CVE-2024-25400,0,0,3912ffcf040787a24c42c021604642fe62f1b3305c74e7110cea5a03e5d1c065,2024-02-28T14:07:00.563000
|
||||
CVE-2024-25400,0,1,dd915a440ac73df2132a6cf61c1461d16e0e6c674a077089d357fa7024e90617,2024-06-17T20:15:12
|
||||
CVE-2024-25407,0,0,b3301e47b280c10676203095ecea4066c4ca125fec7f3e126e0b91f8374bce88,2024-02-13T14:01:40.577000
|
||||
CVE-2024-25410,0,0,c90ad082186d86feb4dd161bc930ce23ffd673a1aa6eb35fdd0d75b53b27288a,2024-04-03T21:15:31.220000
|
||||
CVE-2024-25413,0,0,e13a361b61a6f20d27483f2d386e7add2771e4fa0c0e81fa5650d69b02349d4a,2024-02-16T13:37:51.433000
|
||||
@ -245766,13 +245768,13 @@ CVE-2024-26082,0,0,56a13f29a2e8ddbfc7e70df0673c54a7fca13e31cd226d69d2cc85615a83a
|
||||
CVE-2024-26083,0,0,1bd674ac9b372ed93858554b2e85f58f49ff091cf77650071f4941430327c5c5,2024-06-14T19:34:23.237000
|
||||
CVE-2024-26084,0,0,4198569d9b83e7c17fa91f0baf1eeab883647801d84066753aca49311c01beec,2024-04-10T13:23:38.787000
|
||||
CVE-2024-26085,0,0,acb849915f0cd6a4046956aa4d0a20fa53b8eb943427411e7238410d15281796,2024-06-14T19:34:04.773000
|
||||
CVE-2024-26086,0,0,1a45b37efa4b3f0a1b1d09ebcf97fb637310b102ff5b39ad3d994f7e48ec8b22,2024-06-13T18:35:19.777000
|
||||
CVE-2024-26086,0,1,4506671ec24e337f8f026e3c8afb5c904f473f768d3154bc2293d3c5743cbb9e,2024-06-17T20:31:51.467000
|
||||
CVE-2024-26087,0,0,79a90816bd0d6064ff1c3bd6bcc349fec6b5af43993ed0a4b50116beb1f7cb07,2024-04-10T13:23:38.787000
|
||||
CVE-2024-26088,0,0,16eab6fedf03bbf76db694067aeae8f1ff92cc4bdc3ee7f21d6ef8388f350dec,2024-06-14T20:10:01.653000
|
||||
CVE-2024-26089,0,0,451057bea8d658a3f388d96df1b627f2d3746cd393a623d7266b7212c250df2a,2024-06-13T18:35:19.777000
|
||||
CVE-2024-26089,0,1,f215c629db8ddabb7c989433a5c1b38d71f84f0cbe1b0e72f14c01a6cb7ca226,2024-06-17T20:32:03.657000
|
||||
CVE-2024-2609,0,0,83064762a74f6161c1cfeba80ebf0a1f3d5b6f495cab56554bc8ddee3a9a5e31,2024-04-22T10:15:06.997000
|
||||
CVE-2024-26090,0,0,0ffd5713a0f7f8a358dceb53810ca18f53c6a8ee433febe7c6921f84ef29fc98,2024-06-13T18:35:19.777000
|
||||
CVE-2024-26091,0,0,82ce18444ded676e85be4db2cd34226de419be10593c04ac88da7b48d13b9c9f,2024-06-13T18:35:19.777000
|
||||
CVE-2024-26090,0,1,c9dd4b13556fdb98f9a15122f735ff43b547110aebf1555cadc2132b44f86b76,2024-06-17T20:32:18.073000
|
||||
CVE-2024-26091,0,1,d8dbce6867ebe1e482c41c04feb72e1f0fb8ac84a1de4a395bd842dbc8cdff22,2024-06-17T20:32:37.817000
|
||||
CVE-2024-26092,0,0,5343667c96ab5c8fff98f48b5b1cad487977e5552584d3d352dbdadc8a2f0b62,2024-06-14T19:55:31.347000
|
||||
CVE-2024-26093,0,0,816ca69a7e41828e970605d303c4d504f87519fc35238c2f77827af891150069,2024-06-14T19:50:01.977000
|
||||
CVE-2024-26094,0,0,115591706a1991dd063241a84e1b5d445de4b8fd9fdb36186da6ec8b646a848b,2024-03-18T19:40:00.173000
|
||||
@ -245795,7 +245797,7 @@ CVE-2024-26113,0,0,0e42e48fc441160bc37078bac7a3c17509f87f4fb36e635052288a01673bf
|
||||
CVE-2024-26114,0,0,2b9079fd63e5cf0ae8740026aacea96385cf52307db72e28c4bfd116fb11f249,2024-06-14T19:51:52.757000
|
||||
CVE-2024-26115,0,0,e580fcfb448d43ba09a8689c7f6669cad64bcfa4733780d2a578f45b835c6e71,2024-06-14T19:51:30.393000
|
||||
CVE-2024-26116,0,0,b702a5192de74e29af331f379296cd88760488564a9e32c1891f953cec269036,2024-06-14T19:51:03.750000
|
||||
CVE-2024-26117,0,0,98f6dbd092ec40fab68bd64fed6a55ef5643e222cf4c5c9f7af3131483366a8a,2024-06-13T18:35:19.777000
|
||||
CVE-2024-26117,0,1,99d808f6f40d817c60d64c0bd194f45af674ac4a2edbd306c2b455444fbe6250,2024-06-17T20:31:38.117000
|
||||
CVE-2024-26118,0,0,963ae62af66a2ea966470a317245a015b7cd01b5e05579f193a4ff306d3927ab,2024-03-18T19:40:00.173000
|
||||
CVE-2024-26119,0,0,923abcc576a87c27af1ca6d3c3002e8f022c78a64cc1bd3e44c7feebac90f9a3,2024-03-18T19:40:00.173000
|
||||
CVE-2024-2612,0,0,563748cada404dea46a8a1098e6e9010359bb31f9781cebd62e08951dacf5761,2024-03-25T17:15:51.923000
|
||||
@ -250573,10 +250575,10 @@ CVE-2024-33345,0,0,7e89e81b2d7685c6c34b1a9a15e1d945044ecd27f7013fb1d01c673b4d1ae
|
||||
CVE-2024-33350,0,0,144e795866532d4010724292bbdbe74a18701be22392e8071c46c27a5004fd5c,2024-04-30T13:11:16.690000
|
||||
CVE-2024-3337,0,0,0e96a0de2c5ffbe4a9f2804ffa8c1140c4bee3e6e00979a6ee0758b1212b2f3c,2024-05-02T18:00:37.360000
|
||||
CVE-2024-33371,0,0,ec7a79f056a06763ccfa7dcfdf94bdae70f29613e0b1d07abafaf338bff1ecb9,2024-05-01T13:02:20.750000
|
||||
CVE-2024-33373,0,1,99b7497bb078bdf83fb304129b21aa2798c901fd9ac60f4753875e9aeb70b3dc,2024-06-17T18:15:15.920000
|
||||
CVE-2024-33374,0,1,f31f8e198d692129975bcaf7b94a4f3569071cac52d0ba48bf94e9c4b2d859cb,2024-06-17T18:15:16.017000
|
||||
CVE-2024-33375,0,1,e0eba6392fdb7999a39fee885f67bacc2f50594b53677377ca106c2be6c0baba,2024-06-17T19:15:58.107000
|
||||
CVE-2024-33377,0,1,678ecca4c46ab739843520542d6cffa2a387a8e6dc22686e1f86a739b43e0ba3,2024-06-17T18:15:16.107000
|
||||
CVE-2024-33373,0,0,99b7497bb078bdf83fb304129b21aa2798c901fd9ac60f4753875e9aeb70b3dc,2024-06-17T18:15:15.920000
|
||||
CVE-2024-33374,0,0,f31f8e198d692129975bcaf7b94a4f3569071cac52d0ba48bf94e9c4b2d859cb,2024-06-17T18:15:16.017000
|
||||
CVE-2024-33375,0,0,e0eba6392fdb7999a39fee885f67bacc2f50594b53677377ca106c2be6c0baba,2024-06-17T19:15:58.107000
|
||||
CVE-2024-33377,0,0,678ecca4c46ab739843520542d6cffa2a387a8e6dc22686e1f86a739b43e0ba3,2024-06-17T18:15:16.107000
|
||||
CVE-2024-3338,0,0,9454a656764280ba43f4b4a832049a80a0f45e8c0d37939e326776fd301ff609,2024-05-02T18:00:37.360000
|
||||
CVE-2024-33382,0,0,fdefbc91dd758eee79622e13a87ace7fd97404c7ba92ae8195304a5c3b9d8c61,2024-05-09T13:05:45.620000
|
||||
CVE-2024-33383,0,0,70f21187cd92beebcc08c0b97ec4ff0e6f501ff7515be84dc12b959842f9d519,2024-05-01T13:02:20.750000
|
||||
@ -251430,6 +251432,7 @@ CVE-2024-34827,0,0,967f2d32afb0b2dfaa20d1f45e0df3e21389d96466bc0e3abad227fc206b4
|
||||
CVE-2024-34828,0,0,7605aa3bedb5fc5d707a6b481c1cc91c79f17545427a53b88cbe66a14822c076,2024-05-14T16:12:23.490000
|
||||
CVE-2024-3483,0,0,f497cc0f9f7ed97ac693fa9f9e6ee9a3d8c1c00c57913a6c4140ae3ca9834d87,2024-05-15T18:35:11.453000
|
||||
CVE-2024-34832,0,0,5450d25a8a2a2c18ec1f13cea90692cbdaa88c98ad37b2d242e0d647addbb9b2,2024-06-07T14:56:05.647000
|
||||
CVE-2024-34833,1,1,72fbe58e3e01f562fee66fe89dd0dd0ae6fe5f1a36770a101e92430749016e59,2024-06-17T21:15:50.783000
|
||||
CVE-2024-3484,0,0,77b96fc6faa401f39469e2fe8fb49203604ce091be4caf53c785afcea370dbf3,2024-05-15T18:35:11.453000
|
||||
CVE-2024-3485,0,0,e8641b5678d7bfcdabd6408cac9c77af492485e4b29f63fc9dc56af18234e19a,2024-05-15T18:35:11.453000
|
||||
CVE-2024-34852,0,0,a2b46166918037a96ec96511b7428ab937c28a5b7c34beca90d286eb089cfe06,2024-05-29T13:02:09.280000
|
||||
@ -252210,24 +252213,24 @@ CVE-2024-36148,0,0,965455dab0802400d69a13ddf9d52043c48c7bf6ab105bb67d42e4043380c
|
||||
CVE-2024-36149,0,0,657b4c354b691e145a820436fbc6e5c14dedc54a042c5caad66d77bbcc05d5bc,2024-06-14T20:06:42.110000
|
||||
CVE-2024-3615,0,0,64005ae223a0e1b13c6b7f52d8fc0c9c88326db37e9d2598154be43e0038ff8a,2024-04-19T13:10:25.637000
|
||||
CVE-2024-36150,0,0,cc0104d38e03ca19362ac0c0a25b70254506316033533e108025c4fb844079d4,2024-06-14T20:04:18.170000
|
||||
CVE-2024-36151,0,0,9c522b04472e159d1c0410e50ba9be22bd0835e5ace5c432aa2ba4540c790245,2024-06-13T18:35:19.777000
|
||||
CVE-2024-36151,0,1,6460b151ce925200c0583ec9ab7106b1f22c965ddd0b0830d79bd34d91e28220,2024-06-17T20:33:37.130000
|
||||
CVE-2024-36152,0,0,ef14f17d1d442c1117fea1c7b00c9a540bb19c5761e9b6d604a41a8f04e63587,2024-06-14T20:24:11.583000
|
||||
CVE-2024-36153,0,0,be018d6c55dd07a0c43269a2cd46026242dcb7f5c1f371b18607147d4266e45f,2024-06-14T20:23:55.123000
|
||||
CVE-2024-36154,0,0,ecc92acc0364991bb27201e6b6880894b441f3b1d4b105a2d13f15a459d12a88,2024-06-14T20:22:51.417000
|
||||
CVE-2024-36155,0,0,aa363b6977ad1da890fd3f620abba0d8bd43c1b9d45aa68d97f6170e3c605e53,2024-06-14T20:22:10.083000
|
||||
CVE-2024-36156,0,0,418159e782db44464a7fa9c666c47e0bff1a8a909556a087a33d214fc3a82e0c,2024-06-14T20:16:45.100000
|
||||
CVE-2024-36157,0,0,f08d5d738bbe04c53a0c08d150e28f18914b4d6805699aba87879c6ec4901930,2024-06-13T18:35:19.777000
|
||||
CVE-2024-36157,0,1,5ee34270f170da999250ee3c74fa69534e6f9a649c8786c52d8d7c8ab2073905,2024-06-17T20:33:10.487000
|
||||
CVE-2024-36158,0,0,d1230588f87be144a5bf73c1168707ed47e28d0702d38be75433c9ce98fa63ca,2024-06-14T20:34:20.073000
|
||||
CVE-2024-36159,0,0,6f61c8adccf8d03cd89027237f3e67a9d358e7c582e9e814c760237db36746f1,2024-06-14T20:34:06.343000
|
||||
CVE-2024-3616,0,0,fa923bb782491bedace8c69025507521f5c59d484dc600b1701535fa0da7acd3,2024-05-17T02:40:01.827000
|
||||
CVE-2024-36160,0,0,17fd8d63e97b207e5aff7e3e668d6bcef5834f457a97078316ae8bb9bf1d4575,2024-06-14T20:33:57.040000
|
||||
CVE-2024-36161,0,0,9884a64367104c734adb0953b296c8404da830f2c5510c8e40dcd82fcaa841df,2024-06-14T20:33:46.227000
|
||||
CVE-2024-36162,0,0,392e6d9c603b43b1c9eb59c0f484a66be936b68eb22bc1b540f11ffbd3063af3,2024-06-14T20:33:18.287000
|
||||
CVE-2024-36163,0,0,5e46503b5d8f1b7c32c59130646e3f9d66f5fa0e435b048cce3490f0141e6e8d,2024-06-13T18:35:19.777000
|
||||
CVE-2024-36164,0,0,f24c589d857b5e5a2b9d4256791e32b4fa7cdbb2ce305a445e9a9ffe9d1fd80a,2024-06-13T18:35:19.777000
|
||||
CVE-2024-36165,0,1,eed1ba919ba899785005f5312eff29d764f2585157603e023819a2df39c2ec7e,2024-06-17T19:38:08.973000
|
||||
CVE-2024-36166,0,1,060ccda354064e2490c0e77e3b3c596578f9ffa6d5181a1e60537e699f9643e4,2024-06-17T19:38:19.783000
|
||||
CVE-2024-36167,0,1,e005f8263e9f112763d854142f00274e989ddef0f13ef360174ce64e69ba5e59,2024-06-17T19:38:29.453000
|
||||
CVE-2024-36163,0,1,020e330c88d24831e1e53ab7b01466c2ab94e854ff9db94baebe838ee4531238,2024-06-17T20:33:01.803000
|
||||
CVE-2024-36164,0,1,0aaf6d17f2a069f647fdae436085041cce74f0e7d8a176f91fbf85f477575770,2024-06-17T20:32:51.417000
|
||||
CVE-2024-36165,0,0,eed1ba919ba899785005f5312eff29d764f2585157603e023819a2df39c2ec7e,2024-06-17T19:38:08.973000
|
||||
CVE-2024-36166,0,0,060ccda354064e2490c0e77e3b3c596578f9ffa6d5181a1e60537e699f9643e4,2024-06-17T19:38:19.783000
|
||||
CVE-2024-36167,0,0,e005f8263e9f112763d854142f00274e989ddef0f13ef360174ce64e69ba5e59,2024-06-17T19:38:29.453000
|
||||
CVE-2024-36168,0,0,d9e1fe51c8fbe7a0c171ea17ef6138e97ecfb927ae9efba2a521f5e73a1c2fa9,2024-06-17T17:08:50.037000
|
||||
CVE-2024-36169,0,0,a58aca443e054709df42bac621b16e63f601fbd9af04f2e770fa783666f8bbc2,2024-06-17T17:04:09.503000
|
||||
CVE-2024-3617,0,0,f567fe2d001aaca41d03c0a0366ef1e99b32bc6e27d43d00554123f9bc28d775,2024-06-04T19:20:22.087000
|
||||
@ -252243,68 +252246,68 @@ CVE-2024-36178,0,0,8dcb946dfee7b963619ba7ba0e6a46a3dd96080f30f83f4807f7834e38fd2
|
||||
CVE-2024-36179,0,0,118021cd24c6285797e8cd3829754e899301c1729807e50ed7aafcb1d134d848,2024-06-17T16:24:58.080000
|
||||
CVE-2024-3618,0,0,49acf1181a6848a16665fb73aec3d174ce097deba0c0b38747c9b85c5bffb2db,2024-06-04T19:20:22.213000
|
||||
CVE-2024-36180,0,0,33f0fbd8ed8da11dcc141ccb70d1a4c1ffe93db624930c800eda80f920d5effc,2024-06-17T16:24:39.483000
|
||||
CVE-2024-36181,0,1,b25adc5fb8428c04946dc735dd26138aa798b914d2f6d21938070300dcd79553,2024-06-17T19:50:13.523000
|
||||
CVE-2024-36182,0,1,30104f16b7d8be6088012e5fe7b96486f044fe242cb0407c6c5c9c8799a3f0fd,2024-06-17T19:36:00.387000
|
||||
CVE-2024-36183,0,1,28363d66843c750b13d124e7278cb70f3b5989728785a6ec3cca95f972e56c82,2024-06-17T19:49:53.943000
|
||||
CVE-2024-36184,0,1,e50341690a3e7998dbe8821bd2ca41fda077846bc55664a7af784dd1e91b6bae,2024-06-17T19:49:42.257000
|
||||
CVE-2024-36181,0,0,b25adc5fb8428c04946dc735dd26138aa798b914d2f6d21938070300dcd79553,2024-06-17T19:50:13.523000
|
||||
CVE-2024-36182,0,0,30104f16b7d8be6088012e5fe7b96486f044fe242cb0407c6c5c9c8799a3f0fd,2024-06-17T19:36:00.387000
|
||||
CVE-2024-36183,0,0,28363d66843c750b13d124e7278cb70f3b5989728785a6ec3cca95f972e56c82,2024-06-17T19:49:53.943000
|
||||
CVE-2024-36184,0,0,e50341690a3e7998dbe8821bd2ca41fda077846bc55664a7af784dd1e91b6bae,2024-06-17T19:49:42.257000
|
||||
CVE-2024-36185,0,0,49b47a11e53b4dee718dabc2e1f0a06114ce49b2284b50acf0c2178814eef42c,2024-06-17T17:45:26.877000
|
||||
CVE-2024-36186,0,0,ff6dc51cf8bbb78a7249b14b3bf1da4bf203942ab188537cb35bc3d5d1088959,2024-06-17T17:44:46.093000
|
||||
CVE-2024-36187,0,0,22ece855690dce9348d2203aa872cc428d44e30d9de97df4eca43d487706dbdc,2024-06-17T17:40:33.583000
|
||||
CVE-2024-36188,0,0,0bec449cf01af5399cea99298ffcfc02e2e48310698ba7c78ddb8491b430eab0,2024-06-17T17:34:55.847000
|
||||
CVE-2024-36189,0,0,05b4c9026773415c49a51c07f2f0c992c1049b3f3d114f94fdda2f499829580e,2024-06-17T17:09:25.477000
|
||||
CVE-2024-3619,0,0,165314f79e4f722f622203e47502b9381ecf302926cb9ad2cdc2988542678367,2024-05-17T02:40:02.103000
|
||||
CVE-2024-36190,0,1,f102d3248dea23ff17c2f1af127d93c77fab80b1a59af4dc7864259b2cfd12f4,2024-06-17T19:49:13.337000
|
||||
CVE-2024-36191,0,1,fe85c58b74cc97ce1e65b01374bb18e75a855e09e5b666b0ba4b35767b44f447,2024-06-17T19:06:28.207000
|
||||
CVE-2024-36192,0,1,45378a68a4d9289d7ad56c121aee6e8dcf0e78cf5ec1ba10c5f18d8bb70e5b6f,2024-06-17T19:01:16.820000
|
||||
CVE-2024-36193,0,1,e8bca4f25cc69c70749d579f0d7b91522abf8ce96c88ed7539372a4f8d0fc3fe,2024-06-17T18:57:12.537000
|
||||
CVE-2024-36194,0,1,746e7ad33fdcd7716caf7b1566199913629281052465454c19567c0420565f36,2024-06-17T18:56:57.933000
|
||||
CVE-2024-36195,0,1,8b82a04f66d75c39da71f704b3c4dc9196ab6e487165fc9dd951f356d9cd01e3,2024-06-17T18:56:48.090000
|
||||
CVE-2024-36196,0,1,f0d9cccd8dd511c63bd40a41d40c052123a1f7d18ff036da12edeecd5e16686c,2024-06-17T18:56:33.480000
|
||||
CVE-2024-36197,0,1,c50c78c6e8e5d6d63c9c4281068fbab3d5c028be55a3c1849ff121b49e8189ae,2024-06-17T19:48:57.047000
|
||||
CVE-2024-36198,0,1,0d9c29bc137953462a5eb222099f437d69e24443e59705a9d753655f95a921a6,2024-06-17T18:56:20.607000
|
||||
CVE-2024-36199,0,1,1b859104c5816ed1e6e90edef1833f0ee83575bbcd8a6c5f81d0159954f181ed,2024-06-17T18:56:07.053000
|
||||
CVE-2024-36190,0,0,f102d3248dea23ff17c2f1af127d93c77fab80b1a59af4dc7864259b2cfd12f4,2024-06-17T19:49:13.337000
|
||||
CVE-2024-36191,0,0,fe85c58b74cc97ce1e65b01374bb18e75a855e09e5b666b0ba4b35767b44f447,2024-06-17T19:06:28.207000
|
||||
CVE-2024-36192,0,0,45378a68a4d9289d7ad56c121aee6e8dcf0e78cf5ec1ba10c5f18d8bb70e5b6f,2024-06-17T19:01:16.820000
|
||||
CVE-2024-36193,0,0,e8bca4f25cc69c70749d579f0d7b91522abf8ce96c88ed7539372a4f8d0fc3fe,2024-06-17T18:57:12.537000
|
||||
CVE-2024-36194,0,0,746e7ad33fdcd7716caf7b1566199913629281052465454c19567c0420565f36,2024-06-17T18:56:57.933000
|
||||
CVE-2024-36195,0,0,8b82a04f66d75c39da71f704b3c4dc9196ab6e487165fc9dd951f356d9cd01e3,2024-06-17T18:56:48.090000
|
||||
CVE-2024-36196,0,0,f0d9cccd8dd511c63bd40a41d40c052123a1f7d18ff036da12edeecd5e16686c,2024-06-17T18:56:33.480000
|
||||
CVE-2024-36197,0,0,c50c78c6e8e5d6d63c9c4281068fbab3d5c028be55a3c1849ff121b49e8189ae,2024-06-17T19:48:57.047000
|
||||
CVE-2024-36198,0,0,0d9c29bc137953462a5eb222099f437d69e24443e59705a9d753655f95a921a6,2024-06-17T18:56:20.607000
|
||||
CVE-2024-36199,0,0,1b859104c5816ed1e6e90edef1833f0ee83575bbcd8a6c5f81d0159954f181ed,2024-06-17T18:56:07.053000
|
||||
CVE-2024-3620,0,0,1df23a75dfa243d45dccfaf93a6d2abcd8205c1c1c6930bdb57d4f40b6f4c71f,2024-06-04T19:20:22.317000
|
||||
CVE-2024-36200,0,1,ba51adf20b4158c68b5efdcb4267da858e066a19fd243ce67c4bb1a89b50150e,2024-06-17T18:55:53.703000
|
||||
CVE-2024-36201,0,1,4b10353c471272c3c9b752b5eda1fe2e8b3cac69d46f7babdbf7f5cf0a7de83d,2024-06-17T18:55:34.580000
|
||||
CVE-2024-36202,0,1,1ec8aa1cd75c69b6f68702c72cd5e0f86360ef843210f88dc82f3163650efd5c,2024-06-17T18:55:21.577000
|
||||
CVE-2024-36203,0,1,1cd86fd0b6e4aab3ff6325c4b1653c1ba7ed49d0b1d7e7f58c66e5fb5000af55,2024-06-17T19:23:59.480000
|
||||
CVE-2024-36204,0,1,9cc70bae1dd03ac6434c29c2277c27007d99686a8c8cc70166765b61748e966a,2024-06-17T19:23:45.870000
|
||||
CVE-2024-36205,0,1,7c0cda3b04bbafcc01234b2bb01ab1ceb07fa3909a0e0c4ab23a3419a8a29cbe,2024-06-17T19:23:22.583000
|
||||
CVE-2024-36206,0,1,3cea8e74002f9a30a97fe0c76f64fd66fbbe7a9ae97308068e460c74d0ec5ccc,2024-06-17T19:23:04.890000
|
||||
CVE-2024-36207,0,1,ed22eccaa0cf7c8241053e2bb61f588fecfc05bd5b5b383f300d716e384ebabf,2024-06-17T19:22:41.023000
|
||||
CVE-2024-36208,0,1,252425d2e22cb2dcb6d497267af45df418409b9dbb97b0a7027795208858d323,2024-06-17T19:22:29.990000
|
||||
CVE-2024-36209,0,1,94840f37d7c7dd27d7c8849dd943c251dd21254fc62356ad09274d8d1e7c25c8,2024-06-17T19:22:21.057000
|
||||
CVE-2024-36200,0,0,ba51adf20b4158c68b5efdcb4267da858e066a19fd243ce67c4bb1a89b50150e,2024-06-17T18:55:53.703000
|
||||
CVE-2024-36201,0,0,4b10353c471272c3c9b752b5eda1fe2e8b3cac69d46f7babdbf7f5cf0a7de83d,2024-06-17T18:55:34.580000
|
||||
CVE-2024-36202,0,0,1ec8aa1cd75c69b6f68702c72cd5e0f86360ef843210f88dc82f3163650efd5c,2024-06-17T18:55:21.577000
|
||||
CVE-2024-36203,0,0,1cd86fd0b6e4aab3ff6325c4b1653c1ba7ed49d0b1d7e7f58c66e5fb5000af55,2024-06-17T19:23:59.480000
|
||||
CVE-2024-36204,0,0,9cc70bae1dd03ac6434c29c2277c27007d99686a8c8cc70166765b61748e966a,2024-06-17T19:23:45.870000
|
||||
CVE-2024-36205,0,0,7c0cda3b04bbafcc01234b2bb01ab1ceb07fa3909a0e0c4ab23a3419a8a29cbe,2024-06-17T19:23:22.583000
|
||||
CVE-2024-36206,0,0,3cea8e74002f9a30a97fe0c76f64fd66fbbe7a9ae97308068e460c74d0ec5ccc,2024-06-17T19:23:04.890000
|
||||
CVE-2024-36207,0,0,ed22eccaa0cf7c8241053e2bb61f588fecfc05bd5b5b383f300d716e384ebabf,2024-06-17T19:22:41.023000
|
||||
CVE-2024-36208,0,0,252425d2e22cb2dcb6d497267af45df418409b9dbb97b0a7027795208858d323,2024-06-17T19:22:29.990000
|
||||
CVE-2024-36209,0,0,94840f37d7c7dd27d7c8849dd943c251dd21254fc62356ad09274d8d1e7c25c8,2024-06-17T19:22:21.057000
|
||||
CVE-2024-3621,0,0,3204ec8fd9c2678ba71c374fd9b3e44813b4dc6ba5c30c2d3c2f5f44c3098c61,2024-05-17T02:40:02.290000
|
||||
CVE-2024-36210,0,1,17040d4d7950d9e36a83a5eb4c4e5c4bcb16cbf33e9de87fa3efabca07710cdd,2024-06-17T19:22:07.157000
|
||||
CVE-2024-36211,0,1,f922a627e23eb178e020fe41f9139a21eff9ca37a7f987126f1365e053257b67,2024-06-17T19:21:53.777000
|
||||
CVE-2024-36212,0,1,c75b3e5da223f38dd425e911d368fa69a7a47f2a07eb6db31accb3e0c8cfeeba,2024-06-17T19:21:43.703000
|
||||
CVE-2024-36213,0,1,59e16fb535d46710ac714874d7837c453b885e7c6e33483485e717e774d8fda2,2024-06-17T19:09:24.977000
|
||||
CVE-2024-36214,0,1,36f36a8528ad94584591b17fbeb9eab1b715b27066a5620f5304158fd1a9c25d,2024-06-17T19:35:49.083000
|
||||
CVE-2024-36215,0,1,de4859556ceb90bfc1859050c4dfb29e68a8ee5977c192482751432f8b122841,2024-06-17T19:33:11.697000
|
||||
CVE-2024-36216,0,1,a0032a650a0d532fc6a4de76ae7cf7172dfeb639074d0b6884203d5f27c5df50,2024-06-17T19:42:09.377000
|
||||
CVE-2024-36217,0,1,9c4bf583e2236f456d5fa634c4a935863bb71d6b4d7336d1c28afc52f096d2f4,2024-06-17T19:33:01.643000
|
||||
CVE-2024-36218,0,1,fae8eda30a3c40d9dbf03cc0c0067ca0c999dc54662a4af35d391a8bd51adae6,2024-06-17T19:32:51.723000
|
||||
CVE-2024-36219,0,1,42f49034b08f79f884ad088fe3528181533a38f85304259f704167900c9527c3,2024-06-17T19:32:42.640000
|
||||
CVE-2024-36210,0,0,17040d4d7950d9e36a83a5eb4c4e5c4bcb16cbf33e9de87fa3efabca07710cdd,2024-06-17T19:22:07.157000
|
||||
CVE-2024-36211,0,0,f922a627e23eb178e020fe41f9139a21eff9ca37a7f987126f1365e053257b67,2024-06-17T19:21:53.777000
|
||||
CVE-2024-36212,0,0,c75b3e5da223f38dd425e911d368fa69a7a47f2a07eb6db31accb3e0c8cfeeba,2024-06-17T19:21:43.703000
|
||||
CVE-2024-36213,0,0,59e16fb535d46710ac714874d7837c453b885e7c6e33483485e717e774d8fda2,2024-06-17T19:09:24.977000
|
||||
CVE-2024-36214,0,0,36f36a8528ad94584591b17fbeb9eab1b715b27066a5620f5304158fd1a9c25d,2024-06-17T19:35:49.083000
|
||||
CVE-2024-36215,0,0,de4859556ceb90bfc1859050c4dfb29e68a8ee5977c192482751432f8b122841,2024-06-17T19:33:11.697000
|
||||
CVE-2024-36216,0,0,a0032a650a0d532fc6a4de76ae7cf7172dfeb639074d0b6884203d5f27c5df50,2024-06-17T19:42:09.377000
|
||||
CVE-2024-36217,0,0,9c4bf583e2236f456d5fa634c4a935863bb71d6b4d7336d1c28afc52f096d2f4,2024-06-17T19:33:01.643000
|
||||
CVE-2024-36218,0,0,fae8eda30a3c40d9dbf03cc0c0067ca0c999dc54662a4af35d391a8bd51adae6,2024-06-17T19:32:51.723000
|
||||
CVE-2024-36219,0,0,42f49034b08f79f884ad088fe3528181533a38f85304259f704167900c9527c3,2024-06-17T19:32:42.640000
|
||||
CVE-2024-3622,0,0,8a36012169667d948c0b90aa74b5439b232e5ac011c2df4d1ba7f1e8b3410d38,2024-04-26T12:58:17.720000
|
||||
CVE-2024-36220,0,1,24c655ce3f0526042bfd67880dc41106cdfb5f98dde6971f64873ae1cdc82ba8,2024-06-17T19:48:35.573000
|
||||
CVE-2024-36221,0,1,2c46cdd47e910a4fc18e0dd65366030bdc1eb4d14ec50fb4c46fb03d63f1288e,2024-06-17T19:48:20.473000
|
||||
CVE-2024-36222,0,1,a8ee0e561dcb5bfbba224cb0539031d96c298ae7a136bc37d3ec9a0970e67bf5,2024-06-17T19:45:39.257000
|
||||
CVE-2024-36224,0,1,5c74dec5f032580ca9e70dab38c4d47b808d869c78d9a9688f6eb49fd80615a0,2024-06-17T19:45:13.547000
|
||||
CVE-2024-36225,0,1,fd495a92f56159f6c10cf6177a32831d7edff99b61db5bcc3c4fb3be2c44c3a1,2024-06-17T19:37:58.810000
|
||||
CVE-2024-36220,0,0,24c655ce3f0526042bfd67880dc41106cdfb5f98dde6971f64873ae1cdc82ba8,2024-06-17T19:48:35.573000
|
||||
CVE-2024-36221,0,0,2c46cdd47e910a4fc18e0dd65366030bdc1eb4d14ec50fb4c46fb03d63f1288e,2024-06-17T19:48:20.473000
|
||||
CVE-2024-36222,0,0,a8ee0e561dcb5bfbba224cb0539031d96c298ae7a136bc37d3ec9a0970e67bf5,2024-06-17T19:45:39.257000
|
||||
CVE-2024-36224,0,0,5c74dec5f032580ca9e70dab38c4d47b808d869c78d9a9688f6eb49fd80615a0,2024-06-17T19:45:13.547000
|
||||
CVE-2024-36225,0,0,fd495a92f56159f6c10cf6177a32831d7edff99b61db5bcc3c4fb3be2c44c3a1,2024-06-17T19:37:58.810000
|
||||
CVE-2024-36226,0,0,63c695833cfbf502974ddfcb1fc7381dd367553339b0d43ddd7cfc9350f4fc2c,2024-06-13T18:35:19.777000
|
||||
CVE-2024-36227,0,0,4f9708c3e190c903e17a59c6a290567f989ac01fce90e87a2c00ee28ec01c013,2024-06-13T18:35:19.777000
|
||||
CVE-2024-36228,0,0,b27204a0ec7d2e55ed95db2e3835454fae2ce9d3fe4668e0d18cc12694c7d39c,2024-06-13T18:35:19.777000
|
||||
CVE-2024-36229,0,0,7ba720ab8600cdae47ab2dee552d75b23243a9a50066b699a976ff9b1225b75f,2024-06-13T18:35:19.777000
|
||||
CVE-2024-36227,0,1,0727e710473b979985d78ae6dfdcf5bbfe49764851873d8fa20d40ec22a1b513,2024-06-17T20:12:46.843000
|
||||
CVE-2024-36228,0,1,65510ba3cdacba606cb5a9fef50b70f0ee46d90d949d966d3d92c163b9b3873c,2024-06-17T20:12:35.727000
|
||||
CVE-2024-36229,0,1,a39557b42f1caf4ea230e4d2a203d0da66fd7040dc63c4022fbe68826330238b,2024-06-17T20:12:20.760000
|
||||
CVE-2024-3623,0,0,9044a03f32811b426f24d5347da98fbfdb67f97317f2e90baed487a2da0b464c,2024-04-26T12:58:17.720000
|
||||
CVE-2024-36230,0,0,5c02798fd006be44a457f690229bdebc32d9d963ab482182bed6b100663fd10a,2024-06-13T18:35:19.777000
|
||||
CVE-2024-36231,0,1,b5045756b30dee287424d6013535cd996cf26bd55406c0e6e1bfd4736b6abb98,2024-06-17T19:52:06.717000
|
||||
CVE-2024-36232,0,1,a9c5138f5604d517108f300a12cde735a99ec64851c8a5b1080310f3d5b9ab49,2024-06-17T19:51:25.503000
|
||||
CVE-2024-36233,0,0,627bd0904e137fe695666d197191485332a263290dfe45603e50f25003653152,2024-06-13T18:35:19.777000
|
||||
CVE-2024-36234,0,0,645070bd989f5473e299da1272d252c4395fa62de0b3b9e3c6caa9b2dc88738e,2024-06-13T18:35:19.777000
|
||||
CVE-2024-36235,0,0,2f797f9105c486e0a04f74b29529501e36b59dfee3beab0a343db507b136826b,2024-06-13T18:35:19.777000
|
||||
CVE-2024-36236,0,0,3a002e74ef508cb5555965a013309d3b98e493c0d5fae1e32bac535ec6e14d37,2024-06-13T18:35:19.777000
|
||||
CVE-2024-36238,0,0,70b496607c219882334a508a7bd158262b78c989b07b14baa0147122f00639a9,2024-06-13T18:35:19.777000
|
||||
CVE-2024-36239,0,0,0b86a08b70b01be8f14e01cf93e7b03dd68a3098f4c75d265dea229f09747af8,2024-06-13T18:35:19.777000
|
||||
CVE-2024-36230,0,1,aa414f1426a9d820e35ae320027a2fc4011d04e607813471f3b83e4c9ebd3504,2024-06-17T20:10:31.787000
|
||||
CVE-2024-36231,0,0,b5045756b30dee287424d6013535cd996cf26bd55406c0e6e1bfd4736b6abb98,2024-06-17T19:52:06.717000
|
||||
CVE-2024-36232,0,0,a9c5138f5604d517108f300a12cde735a99ec64851c8a5b1080310f3d5b9ab49,2024-06-17T19:51:25.503000
|
||||
CVE-2024-36233,0,1,732c88b6cee847e47e26b6b99980d7c1d5a1a43a5aa16642cba41b400eced29c,2024-06-17T20:22:07.620000
|
||||
CVE-2024-36234,0,1,ae2cb1680cf3fb386acb30838df8f1b2e0c131e828b22265fd58920068d21e3a,2024-06-17T20:21:54.507000
|
||||
CVE-2024-36235,0,1,c6e86c364f13c6bee1702edf1300165ba53b50b8332d218012547aa96229aa1f,2024-06-17T20:21:30.017000
|
||||
CVE-2024-36236,0,1,e20b7adefa1c6431e2ddfad6dfc0a2212483136677373d3d809c1b5610837d84,2024-06-17T20:21:20.523000
|
||||
CVE-2024-36238,0,1,ffa224703ea5d14f14feaac4631f2136ef89cf6e78b5508e4db40614bf827e92,2024-06-17T20:20:28.453000
|
||||
CVE-2024-36239,0,1,f9d1b173110a422fa1162cdcd582db2bdb2808a4f7edf9f4c130505223b94463,2024-06-17T20:20:18.633000
|
||||
CVE-2024-3624,0,0,e0ac19607b4c8d1214127703973418b820b7283270ffca198194137ef8f4191a,2024-04-26T12:58:17.720000
|
||||
CVE-2024-36241,0,0,ec13df73bdae0daae51b14875ab9159491333aae8ecd7b32e3b3849163ae270e,2024-05-28T12:39:28.377000
|
||||
CVE-2024-36246,0,0,50338f85842e71924c1397e2b0a309f647146226696bf59a5411ba0e6e468e33,2024-05-31T13:01:46.727000
|
||||
@ -252409,11 +252412,11 @@ CVE-2024-36502,0,0,af0ea55ba6dbd08cf23c5f8732d2aeb0cf79fdfab13bdf5e07cadc4434254
|
||||
CVE-2024-36503,0,0,3aef981902bcd0cfa43896ed1ada7c9ec64d59690838f1ba35c268bf26e5218a,2024-06-17T12:42:04.623000
|
||||
CVE-2024-3652,0,0,455dabb71414a7592172807b25da69c5818ecc78456d9f87c63904d4c0988a33,2024-05-01T17:15:37.793000
|
||||
CVE-2024-36523,0,0,779ff20f3e54c54b68fa38cf8a73a6874fca821f18024ef38fb974b398395dd0,2024-06-13T18:36:09.010000
|
||||
CVE-2024-36527,1,1,2b0ce26462ddf4094a9f42ea54b908cbb2586dcbcfee6531e1c43b55113e0148,2024-06-17T18:15:16.767000
|
||||
CVE-2024-36527,0,0,2b0ce26462ddf4094a9f42ea54b908cbb2586dcbcfee6531e1c43b55113e0148,2024-06-17T18:15:16.767000
|
||||
CVE-2024-36528,0,0,f25edd031c479e2eb08ab34031d71804f3bb9f2a7bd4f1a1d0b25d391d002135,2024-06-10T18:06:22.600000
|
||||
CVE-2024-36531,0,0,991b1a5a568679e84b92f85516ddb5ed86f9e4a97046e45c71aa818ce6df4847,2024-06-10T18:06:22.600000
|
||||
CVE-2024-3654,0,0,954800a828ed246c147def14a6599156bd18a3e2cc72072dd62b0ab02b4bbf53,2024-04-19T16:19:49.043000
|
||||
CVE-2024-36543,1,1,d296ac07647444738f564112c0fbd0f6cdc70c839f2aad61af43a607bcbd5052,2024-06-17T19:15:58.353000
|
||||
CVE-2024-36543,0,0,d296ac07647444738f564112c0fbd0f6cdc70c839f2aad61af43a607bcbd5052,2024-06-17T19:15:58.353000
|
||||
CVE-2024-36547,0,0,6660ddee6e567c7988e43d4b24008e0896770307b9894b7b829c762e8a195005,2024-06-06T15:16:11.897000
|
||||
CVE-2024-36548,0,0,9d28d8e8972db5bd27a8a65faaafcca56f3bdf2175ddc670e3a757d6c577d105,2024-06-06T15:24:02.577000
|
||||
CVE-2024-36549,0,0,ede738893685493385854bf4f5b6680c7d976cf01bd2e0f64b85833020e8a996,2024-06-06T15:24:35.210000
|
||||
@ -252502,10 +252505,10 @@ CVE-2024-36801,0,0,848abb34bc225b988b494ddeb65181be8a5b6f82df4ba5b51418160f74bd0
|
||||
CVE-2024-3681,0,0,4cc6e1e77320458af0f4beee59a38c9a663fe20b962b28f234c099bc7c23ab32,2024-05-02T18:00:37.360000
|
||||
CVE-2024-36811,0,0,6e0af3c6c3cf0f68333eeeac219e850c0e24dcad6b3b12a43292843727697674,2024-06-07T19:24:09.243000
|
||||
CVE-2024-3682,0,0,a140f5eb71acf183c1e80e0d2f5a14a5c7d8a92c7cf9dd3ea5250a20e3cb490f,2024-04-26T12:58:17.720000
|
||||
CVE-2024-36821,0,0,0898d269a518e18a8dcb290f19d3c39b2b845cc3408e89c8516b0661547161a8,2024-06-13T18:36:09.013000
|
||||
CVE-2024-36821,0,1,592e31c2ea7119b4c103b5ca67eefeb91773768141e1fc0daf62c86176d3afa7,2024-06-17T21:15:50.960000
|
||||
CVE-2024-36823,0,0,aad699347c3b05ee3cd9abd97cd2dd91acd777507ac0def145495f15e3829674,2024-06-07T14:56:05.647000
|
||||
CVE-2024-36827,0,0,122a045e95fe548424707b69a5d81cb1d2970259814d1c03f8e1b4b2c344d0e6,2024-06-07T19:24:09.243000
|
||||
CVE-2024-36837,0,0,972fcfe447bcc1dac89631cb411f52c2cea2adda8f01d3d7987f0c2ce62998db,2024-06-06T14:17:35.017000
|
||||
CVE-2024-36837,0,1,e9493bedfd0182d3768ff4bc8ddf5689156e492e348ca68464dbbef9dbf375ce,2024-06-17T21:15:51.050000
|
||||
CVE-2024-3684,0,0,e7edf7d6bce31b480b46d692afd4304c988268ba4618e87da8566dc118f2be92,2024-04-19T16:19:49.043000
|
||||
CVE-2024-36840,0,0,4a6f09cefc62787a0fbedba2a44163b90d3503531e692316cb82598d8c83950c,2024-06-13T18:36:09.010000
|
||||
CVE-2024-36843,0,0,dffd8a9db459cea7141db065370811228354e9ed0a00ef7accb6e04cac03982c,2024-06-03T14:46:24.250000
|
||||
@ -252618,7 +252621,7 @@ CVE-2024-3697,0,0,600d9314ffac8217c56b5ddb9a6dd8f383edc3a52ae15aefe26cd04d9d92b6
|
||||
CVE-2024-36970,0,0,7821872f33932cd23581e3f08933e1120512f95b8bffb9a221042f6e182c4c03,2024-06-10T02:52:08.267000
|
||||
CVE-2024-36971,0,0,7baf68ba8d6177e5c800107eb44bfd99f2323f2978ed8bf3a29a9bc948d8cb2e,2024-06-16T13:15:52.820000
|
||||
CVE-2024-36972,0,0,c8949e99c51cdd06e16d761976785fb3e8ba887f5070dbd12308139f2998e944,2024-06-16T13:15:52.947000
|
||||
CVE-2024-36973,1,1,aaf9d958c8593ac07f0f724040e3aeb13ad0df1753e4f68e9b0d677119862905,2024-06-17T18:15:17.043000
|
||||
CVE-2024-36973,0,0,aaf9d958c8593ac07f0f724040e3aeb13ad0df1753e4f68e9b0d677119862905,2024-06-17T18:15:17.043000
|
||||
CVE-2024-3698,0,0,13b4029eb6179dbe788598788e16556a1995d850ddfc4af1ee0c4e86961a3a21,2024-05-17T02:40:04.800000
|
||||
CVE-2024-3699,0,0,6e64dedcb1ec83e842b9c3ed18b374381a62ef4f7982a43d9405eeb95e55d0fc,2024-06-12T17:53:09.130000
|
||||
CVE-2024-3700,0,0,f1913b84964a9a87ca4f78bbad55a262819a35385e2c066c91eaa7c4a1891262,2024-06-12T17:51:52.710000
|
||||
@ -252708,6 +252711,7 @@ CVE-2024-3730,0,0,a30960de1676c855ee35b61976bc4581959cd1a98a7ba3127a461fb7fc9551
|
||||
CVE-2024-37300,0,0,7a8b0144b5518f42a2503b23de88b2ac1dd643d024476f6cf726712d7722e352,2024-06-13T18:36:09.010000
|
||||
CVE-2024-37301,0,0,450b2bcc32537519af2d171a1a4f4dec398481df24494eefa7c4bfacafd1cdd4,2024-06-13T18:36:09.013000
|
||||
CVE-2024-37304,0,0,58f0056f03946090c8e002d0e9ba0984fa448eb3acaa7f846a712c694162376b,2024-06-13T18:36:09.010000
|
||||
CVE-2024-37305,1,1,756a91f02283d9df256d9a54b14b0910f6d0e8069b80da21c581159e3dda387e,2024-06-17T20:15:12.880000
|
||||
CVE-2024-37306,0,0,c42be228ed7af3d19c55f98cc69863314df6372a103fb19662ff1ada5ea07223,2024-06-13T18:35:19.777000
|
||||
CVE-2024-37307,0,0,307a9077f465a844bb3929ae05a1dcebcb701d8b2ae344b6539171566dfccac0,2024-06-13T18:35:19.777000
|
||||
CVE-2024-37308,0,0,789ac1ee79bf50a380c8842b793e1f03cbcea96755a8db8c09ad817d1922f353,2024-06-13T18:35:19.777000
|
||||
@ -252789,10 +252793,10 @@ CVE-2024-37644,0,0,5f7f97e28e218e3fb348230aa8347ee3b0354d72853f4d6c2591e151f0231
|
||||
CVE-2024-37645,0,0,1f2d6a8f87fac13d3d11d6cbec3b695ad44ed6f32f14768d5b077122546347a3,2024-06-17T12:42:04.623000
|
||||
CVE-2024-3765,0,0,4fdba2eb80818b350bc57cc64ca06a70a8e5d2cec5cc9e99a6b5fff1df632742,2024-05-17T02:40:06.923000
|
||||
CVE-2024-3766,0,0,539824cbdfccc4276f1fd794b326f898c89140cb76877e5ae113fb2f5031330d,2024-05-17T02:40:07.027000
|
||||
CVE-2024-37661,1,1,8bc6987d1055de55d8b7876bf221b6ce9ec043a5b4bf1c22473fe955a3ac5ac2,2024-06-17T18:15:17.463000
|
||||
CVE-2024-37662,1,1,4ba16f654108e1192bd8fb8e8e02e50d6a91573173d812e9064b0a305d10e19b,2024-06-17T18:15:17.560000
|
||||
CVE-2024-37663,1,1,c85121604649b2156315c207a5ca6621b999521337716b02c686139e1ebe6456,2024-06-17T18:15:17.653000
|
||||
CVE-2024-37664,1,1,b106b1d8d5f840cb17425c36d7f75fda90045b9146be03e27cd1d2e215bc155f,2024-06-17T18:15:17.743000
|
||||
CVE-2024-37661,0,0,8bc6987d1055de55d8b7876bf221b6ce9ec043a5b4bf1c22473fe955a3ac5ac2,2024-06-17T18:15:17.463000
|
||||
CVE-2024-37662,0,0,4ba16f654108e1192bd8fb8e8e02e50d6a91573173d812e9064b0a305d10e19b,2024-06-17T18:15:17.560000
|
||||
CVE-2024-37663,0,0,c85121604649b2156315c207a5ca6621b999521337716b02c686139e1ebe6456,2024-06-17T18:15:17.653000
|
||||
CVE-2024-37664,0,0,b106b1d8d5f840cb17425c36d7f75fda90045b9146be03e27cd1d2e215bc155f,2024-06-17T18:15:17.743000
|
||||
CVE-2024-37665,0,0,65120387c81349907f7a4a053373f743b497b218da3e8528d2288dae639dbb17,2024-06-13T18:36:09.010000
|
||||
CVE-2024-3767,0,0,8ba3fcd8961d67ee2d120eabc736772a73aa38bca02250a44c8bb4877d64b7d4,2024-06-05T20:15:13.643000
|
||||
CVE-2024-3768,0,0,778d3eea8bf87c1f80239f04628ed71cfd577dabb0ce88459344c4cd4d61bb16,2024-05-17T02:40:07.203000
|
||||
@ -252805,15 +252809,17 @@ CVE-2024-3775,0,0,a79253f4f0c7633f40fa5e33903553d0137ff03b4a2d8425a028bb5ddf1c6b
|
||||
CVE-2024-3776,0,0,55056178a3d988ca6f5c349416a81e65818f1f748e962aa89ca62657bc61cdbb,2024-04-15T13:15:31.997000
|
||||
CVE-2024-3777,0,0,2d62b43478a2af7b370a2abe8fef4e62ecbb9b40c3be97e2e0fc1ef910b6e9d4,2024-04-15T13:15:31.997000
|
||||
CVE-2024-3778,0,0,c2c38fcb38179fdb87f4043dc10c922f64da16bb588bfaf10dd1fb23e229fcc9,2024-04-15T13:15:31.997000
|
||||
CVE-2024-37794,1,1,b0474f9a1e34d4ce4f5843135972ccb449b5684509f30c70025ad198d2cbac13,2024-06-17T18:15:17.853000
|
||||
CVE-2024-37795,1,1,b55a1de597f46e87ebb5846214283b41513b4351794622c586104759dffc0de0,2024-06-17T18:15:17.953000
|
||||
CVE-2024-37794,0,0,b0474f9a1e34d4ce4f5843135972ccb449b5684509f30c70025ad198d2cbac13,2024-06-17T18:15:17.853000
|
||||
CVE-2024-37795,0,0,b55a1de597f46e87ebb5846214283b41513b4351794622c586104759dffc0de0,2024-06-17T18:15:17.953000
|
||||
CVE-2024-37798,1,1,d647646e0be03e8cb80db3b744ccd6eb5c597c1119aa65d17a2032b22c4f2175,2024-06-17T21:15:51.180000
|
||||
CVE-2024-3780,0,0,d5287c65230cff026fcb8162b9ad15d2c7a6ec9085a2f226aaf7f4b5c5cee424,2024-04-15T13:15:31.997000
|
||||
CVE-2024-3781,0,0,bf710215509c2fb5fefd67fb85930537c2ce3a67160738297841ece3c75d6fc6,2024-04-15T19:12:25.887000
|
||||
CVE-2024-3782,0,0,c95ea596dccb3636dd3691321b5a7a48aa3ee2b08cd07f6f17f6b9ebb6c70325,2024-04-15T19:12:25.887000
|
||||
CVE-2024-37828,1,1,088eef7d3d9d5b4384684055d9dd088b2ead6321f489994eca7630f1ebe32ff9,2024-06-17T21:15:51.280000
|
||||
CVE-2024-3783,0,0,f916980cd1e532a7d588efc898e3b89c6684234f9d5fc7d911dee2ee73ce3295,2024-04-15T19:12:25.887000
|
||||
CVE-2024-37831,0,0,5e7eb1d81cbc03e5a6cb7a0c776550184a7e580655a65f67804199e93112edb2,2024-06-17T12:42:04.623000
|
||||
CVE-2024-3784,0,0,c3548262a5dd94ab612636409a3bf8cd74017da9deb24debb2f77536fe274623,2024-04-15T19:12:25.887000
|
||||
CVE-2024-37840,1,1,8453d99efeccde0568a082a5c426e56d812bc51b13eebf910ea641df056335c3,2024-06-17T19:15:58.470000
|
||||
CVE-2024-37840,0,0,8453d99efeccde0568a082a5c426e56d812bc51b13eebf910ea641df056335c3,2024-06-17T19:15:58.470000
|
||||
CVE-2024-37848,0,0,88fe14869b9db882d345d58a87ca35c6cced9fdb08d49352f54bce8a27f6744a,2024-06-17T14:15:11.890000
|
||||
CVE-2024-37849,0,0,1c3bd85b42f72006ddc00210dee95fa2aec60a18f1d79fbfdd90f35c19fff4ef,2024-06-13T18:35:19.777000
|
||||
CVE-2024-3785,0,0,fc93f2e321d044bf7a0ccc45f351722880d9f0bf94368b28b702ab59c5cb3144,2024-04-15T19:12:25.887000
|
||||
@ -252832,7 +252838,13 @@ CVE-2024-37887,0,0,0467ece977566b214676eb0db2203ccad3333f72a527f3986a8c1fbfb2fc1
|
||||
CVE-2024-37888,0,0,a9672782b19886e33249fc75bc18c4a8c4010f9132fe10364f8659932ef364bf,2024-06-17T12:42:04.623000
|
||||
CVE-2024-37889,0,0,daa8873bf696328586ad7ac5c8ae18378b96ec85219f7a263344af70c2ad0bbd,2024-06-17T12:42:04.623000
|
||||
CVE-2024-3789,0,0,63d455d46acf2815a86f3b9bf286e732f6c1d2d557d093772c64f0c37d315365,2024-05-14T16:11:39.510000
|
||||
CVE-2024-37890,1,1,5a51aaf9ddba68dcc4fb851d8d8c2104191ec0f76492414a4202b6704653dbaa,2024-06-17T20:15:13.203000
|
||||
CVE-2024-37891,1,1,1596db18091d20a666dec5f247a44722389e3ddb81693324abbe091c2732aef3,2024-06-17T20:15:13.450000
|
||||
CVE-2024-37893,1,1,1776a40c4bb7f6b3a47eef65f2923177a81d35e324abf140661a4de06104507d,2024-06-17T20:15:13.700000
|
||||
CVE-2024-37895,1,1,f41259f66b42700e5e06aae6e334284d38fc67ec67f409e007cedbe6b28f32e4,2024-06-17T20:15:13.970000
|
||||
CVE-2024-37896,1,1,5112ee551bccf3f0184159c2912eb6d43ad52672ea31b9947c140c0e6a0ee36f,2024-06-17T20:15:14.213000
|
||||
CVE-2024-3790,0,0,ea62135e66a6e7a74daddc8d443b8b9750f000d596c0e5f30e202f53e21ec40b,2024-05-14T16:11:39.510000
|
||||
CVE-2024-37902,1,1,ac13ed252f83085121ab0ea73c36602edd534bb1985c378bf0890d4d70316b15,2024-06-17T20:15:14.463000
|
||||
CVE-2024-3791,0,0,9bc6cec70e672f5f7f9ccdb1c0603c19b269c41965293930113b85d0de980142,2024-05-14T16:11:39.510000
|
||||
CVE-2024-3792,0,0,cf023b5179bed164faad65630e21cc1d1811b19d16667a2b08c63260eab0a5be,2024-05-14T16:11:39.510000
|
||||
CVE-2024-3793,0,0,ee3137e362c58246aa5051457614bdcb92cca84e4e50c79d141ea28f09937fab,2024-05-14T16:11:39.510000
|
||||
@ -252898,7 +252910,7 @@ CVE-2024-38440,0,0,b919acbc92e9c9392e26fbdaceae56c4317599ffd0627bbda82f22f6097b7
|
||||
CVE-2024-38441,0,0,bac1eab90c37fda11684866d06a4f57eec334e75a348551333a4b5d69541732d,2024-06-17T12:42:04.623000
|
||||
CVE-2024-38443,0,0,1d75cfa177cf692b67a12f7bd5c673225dc4008379121d75b6d5d0686ab9a220,2024-06-17T12:42:04.623000
|
||||
CVE-2024-38448,0,0,66ae408cb06bbe5b04615772f5468e0f5bb5c8f2d46df318fd238e60dfb550e8,2024-06-17T12:42:04.623000
|
||||
CVE-2024-38449,1,1,bfe3d44cc91ccbcb53fd85e23fea8d11b89236c24e32b2201e2a397ac6ed1755,2024-06-17T19:15:58.567000
|
||||
CVE-2024-38449,0,0,bfe3d44cc91ccbcb53fd85e23fea8d11b89236c24e32b2201e2a397ac6ed1755,2024-06-17T19:15:58.567000
|
||||
CVE-2024-3845,0,0,0eb4004f99da1c2122444a8d1de5d3db39129e713bf386d7b60bb455af744c00,2024-05-03T03:16:29.210000
|
||||
CVE-2024-38454,0,0,9e16cbeba5810d367094a131b56862641aa42d77b0ed4c90d4e4d7e92bb854dc,2024-06-17T12:42:04.623000
|
||||
CVE-2024-38457,0,0,c77550a7e2a9252924a4646a20696a029639d1882dc30abb38808d48a175ba0c,2024-06-17T12:42:04.623000
|
||||
@ -252942,7 +252954,7 @@ CVE-2024-3872,0,0,1b0df76ddcb9ce5edde75b1c572a6253db6bd37bbe91d1899bdf2bd4ba86a6
|
||||
CVE-2024-3873,0,0,6d513ad90fbcf7cf9dc14bccfe49c3692f3f8e6afa6f4dd6471e0cb11781355f,2024-05-17T02:40:09.627000
|
||||
CVE-2024-3874,0,0,0b044f7635c5f6b9eeb150631f42de7f29fc07a4ea0b0fc3596a05b97253f25a,2024-06-04T19:20:25.697000
|
||||
CVE-2024-3875,0,0,d86045281a0b2a48da23b56cded5d23c73cf1b0cfc400db0bc7b27c6cb21977e,2024-06-04T19:20:25.807000
|
||||
CVE-2024-3876,0,1,776837fb0cf9eeaf7d3ba120d8dcf4cad0f43e38d62b6ec13c079af103a4cf3c,2024-06-17T19:15:58.763000
|
||||
CVE-2024-3876,0,0,776837fb0cf9eeaf7d3ba120d8dcf4cad0f43e38d62b6ec13c079af103a4cf3c,2024-06-17T19:15:58.763000
|
||||
CVE-2024-3877,0,0,f24faee79076d9955b33c716cc38fff1084b5ee3b430064cdc16beb5bbd9e5c2,2024-06-04T19:20:25.903000
|
||||
CVE-2024-3878,0,0,fb95502da03faec460d17c9b1242297f4e8658270dcfc3f37876da58c73c1ed8,2024-05-17T02:40:10.087000
|
||||
CVE-2024-3879,0,0,92774dc7ea0cffc72f06608ad0c5ab32112431972595f4ffa950315fc44f5141,2024-05-17T02:40:10.177000
|
||||
@ -253049,7 +253061,7 @@ CVE-2024-4026,0,0,9eff728af4fb17cd0b046ae2444303f230bc7685cadbda3feb2bd1007c7666
|
||||
CVE-2024-4029,0,0,afc8def3dff015c790bb6f1fba36f8919ca09d0c14ec4f09004e6bb6d31f1058,2024-05-02T18:00:37.360000
|
||||
CVE-2024-4030,0,0,c7e71f4aa9c8e1fed63372a5ecebe14dddf19d5400caf27393d092efafbf0f25,2024-06-13T20:15:15.570000
|
||||
CVE-2024-4031,0,0,4baeaad68cf3411bf45d41e53c64aca0aa19dc8cf620cd2c5028b0d61a50ba2c,2024-04-23T12:52:09.397000
|
||||
CVE-2024-4032,0,1,03894ea0efe4adf33eae6b6c4a5d257a2cf4187fd23c9230c41cf9b02106eb41,2024-06-17T18:15:18.047000
|
||||
CVE-2024-4032,0,0,03894ea0efe4adf33eae6b6c4a5d257a2cf4187fd23c9230c41cf9b02106eb41,2024-06-17T18:15:18.047000
|
||||
CVE-2024-4033,0,0,9c08f15b4d3308634dd41e6afc3001fb3d24483554aaa58982323fa330ce651a,2024-05-02T18:00:37.360000
|
||||
CVE-2024-4034,0,0,fbbc9986eba42f39f504e14d62a8f5aac7c2749ef90d02af8ad89eb5ef4d1cca,2024-05-02T18:00:37.360000
|
||||
CVE-2024-4035,0,0,02906ca1b496a2e42ac8610e4dfcaad284409da5fa1faeb0fe6ebb26c1e7ae4c,2024-04-25T13:18:02.660000
|
||||
@ -253477,7 +253489,7 @@ CVE-2024-4580,0,0,8eea2c6efcadf197a7eb186820cafc4d96f736bb0925ed6e0f257f524d44d9
|
||||
CVE-2024-4581,0,0,76d80edc646ff1ece35896e94283319c4ca53356d1c75c256f7ea9adb85effeb,2024-06-04T16:57:41.053000
|
||||
CVE-2024-4582,0,0,57ac27f8923e8821e7b5fca55d7f50b9c8dfb5b34f58112cdd2a2c6b3dee9eda,2024-06-04T19:20:42.750000
|
||||
CVE-2024-4583,0,0,af5c6d7dbc7d13aa7121157e641c0ae3611565803aa3301ac8e05cd3822a0f3f,2024-06-04T19:20:42.857000
|
||||
CVE-2024-4584,0,1,2c31e3bc8c7d2e9efeb129c1e82a2bc8338879f33d908a6721a12b1a62670c07,2024-06-17T19:15:58.903000
|
||||
CVE-2024-4584,0,0,2c31e3bc8c7d2e9efeb129c1e82a2bc8338879f33d908a6721a12b1a62670c07,2024-06-17T19:15:58.903000
|
||||
CVE-2024-4585,0,0,c1224862b2da0bb957015fb054dced4793091e8e3aa3caac8ee5575edd00f689,2024-05-17T02:40:28.993000
|
||||
CVE-2024-4586,0,0,38a9d7726156e11be76063fc1f3a10ac00b9f19e5c3bba2254b1b06e6ca2fe78,2024-06-04T19:20:42.953000
|
||||
CVE-2024-4587,0,0,fa4f2e1af7adbbcc9d9c59a2f010e851c5b64f5ba18ad37f1ca2351cf22dc751,2024-06-04T19:20:43.057000
|
||||
@ -253488,7 +253500,7 @@ CVE-2024-4591,0,0,5c6d761a32eee493d547c5d2d22181949ad1190c4454a55e9aa89efeef0df5
|
||||
CVE-2024-4592,0,0,d8ebb8994c326e045a4e9c2becb1e92e01af61dca4ec82dd53c50e1797fca86a,2024-06-04T19:20:43.560000
|
||||
CVE-2024-4593,0,0,6e92f7e409d392375aadb61ac84c9d714f33b7bdac01d896f8d5f1cdac91a9de,2024-05-17T02:40:29.730000
|
||||
CVE-2024-4594,0,0,bcffb9fcfeaac22cc37f5dc48e830b7d71c5ce449d6ef0e481ff78f48d7fa487,2024-06-04T19:20:43.657000
|
||||
CVE-2024-4595,0,1,5d35ea8ef48c2a80f961b57f311ad01654ad75218ac9d7f0e09b8afbb41ffd76,2024-06-17T19:15:59.063000
|
||||
CVE-2024-4595,0,0,5d35ea8ef48c2a80f961b57f311ad01654ad75218ac9d7f0e09b8afbb41ffd76,2024-06-17T19:15:59.063000
|
||||
CVE-2024-4596,0,0,2294c5641ac537fa71a7ad1878bc97e3f6060d0b2f74841053ecc03b64d14796,2024-06-04T19:20:43.750000
|
||||
CVE-2024-4597,0,0,49317a4ff12c60e573c38172dad46b390f6c4e67b3d1cb7027306fe91fd78a96,2024-05-14T16:11:39.510000
|
||||
CVE-2024-4599,0,0,7a2dd9d366beb25d47b0c05043c7c832d7abfddbca078d457eae393ffc0c13b9,2024-05-07T13:39:32.710000
|
||||
@ -253903,7 +253915,7 @@ CVE-2024-5202,0,0,b978a5507939d8449bc120b0c8b4b839304f46efdad98898b1b0c13e65a259
|
||||
CVE-2024-5203,0,0,c1cbddceebcc79a6f3361ec6d421c84f7c0d786eefdc42d89301f7f288b04ff8,2024-06-13T18:36:09.010000
|
||||
CVE-2024-5204,0,0,f5f46d30f5f5fcefc4a351787eb0bfde8706d10be20e1d771d5abcd1008399a0,2024-05-29T13:02:09.280000
|
||||
CVE-2024-5205,0,0,cb36ec671fed104039900e6835467ad487e54c052bb39844cd3bc6979a6fc551,2024-05-24T13:03:11.993000
|
||||
CVE-2024-5206,0,1,dfdbb2d2210fa9604e6469b5345cbda30a0f0ae57d39e7dfc070825e6f931647,2024-06-17T19:15:59.190000
|
||||
CVE-2024-5206,0,0,dfdbb2d2210fa9604e6469b5345cbda30a0f0ae57d39e7dfc070825e6f931647,2024-06-17T19:15:59.190000
|
||||
CVE-2024-5207,0,0,837facf8fac5843bbf7aea1ce36fa00287f1ba077f8fbca1302b0ab4087ec522,2024-05-30T13:15:41.297000
|
||||
CVE-2024-5211,0,0,a4277f26aaa565cc417eac86a473b48ddc12386cf29490b9b3d30644e664c347,2024-06-13T18:36:09.010000
|
||||
CVE-2024-5214,0,0,77a86526714522a20940695733fe46b4562089752d3c663cf289b583b7c6bbda,2024-06-03T19:15:09.360000
|
||||
@ -254296,7 +254308,13 @@ CVE-2024-6046,0,0,a5ace0bbdf0f368d76efea99e17761b90d722a7f8fb2cd5b11d6c7027f5ee4
|
||||
CVE-2024-6047,0,0,4cdf0f1acff12373f8f857c8d442b9de2221d44745323cc3f60bf66bccd7a239,2024-06-17T14:15:13.040000
|
||||
CVE-2024-6048,0,0,03e9485ef23720c113f11fed6c539200d9a1624e025ca24798cddf9d0c1a9e3b,2024-06-17T12:42:04.623000
|
||||
CVE-2024-6055,0,0,93ffb465c6acddf15e4142ae2e8b4bcae95c7241e5f24a2dedc05f862f5d2e79,2024-06-17T13:15:53.697000
|
||||
CVE-2024-6056,1,1,636228dd1a2c8f5c63676f25cc803d23af23082b986789068b58dd9fd2a57ea9,2024-06-17T18:15:18.143000
|
||||
CVE-2024-6056,0,0,636228dd1a2c8f5c63676f25cc803d23af23082b986789068b58dd9fd2a57ea9,2024-06-17T18:15:18.143000
|
||||
CVE-2024-6057,0,0,cfabce49b9db224e3720b6479e81ee1edcd2fcbaabb39bed0063a52236765ccd,2024-06-17T13:15:53.800000
|
||||
CVE-2024-6058,1,1,3ee08d4ad26cf88da329a5e1271ed474432fcbd63bb5792a008ded1da8686681,2024-06-17T18:15:18.520000
|
||||
CVE-2024-6059,1,1,8dc3785d03b4bbf495bb7b9e0db50afd358453b35356b7519dfcb40c8d9c6a71,2024-06-17T19:15:59.467000
|
||||
CVE-2024-6058,0,0,3ee08d4ad26cf88da329a5e1271ed474432fcbd63bb5792a008ded1da8686681,2024-06-17T18:15:18.520000
|
||||
CVE-2024-6059,0,0,8dc3785d03b4bbf495bb7b9e0db50afd358453b35356b7519dfcb40c8d9c6a71,2024-06-17T19:15:59.467000
|
||||
CVE-2024-6061,1,1,e3994abe87d8171c8e3b6a2bfacb5133544b1c463e71028fb8ff174c440a1265,2024-06-17T20:15:14.850000
|
||||
CVE-2024-6062,1,1,47cd221b4b8aabce9ad30cff9ce6a2ec0e7cd03e3e3078c16a8749b69ae8d8eb,2024-06-17T20:15:15.170000
|
||||
CVE-2024-6063,1,1,b67d10210bed54ecb8364f0d64a24e8a9bb67fda8d7cdbfbf01d23eb1fcb1bb1,2024-06-17T21:15:51.443000
|
||||
CVE-2024-6064,1,1,dfa0698ee8caf241b62eef71e2d604b23eb45d719d7bfffd9edd5b3eea92dc02,2024-06-17T21:15:51.727000
|
||||
CVE-2024-6065,1,1,ec7d6c92bf7a949498dd9805836d3dc45c84184ec068d4330849b9f7c74e24ca,2024-06-17T21:15:52.007000
|
||||
CVE-2024-6066,1,1,4be16afb26a67eeaa99325b278e1eb15007f8629556d5972406c66487d6fe7ae,2024-06-17T21:15:52.283000
|
||||
|
Can't render this file because it is too large.
|
Loading…
x
Reference in New Issue
Block a user