Auto-Update: 2024-06-17T22:00:18.732771+00:00

This commit is contained in:
cad-safe-bot 2024-06-17 22:03:13 +00:00
parent df8a9c1304
commit 82fe6eef26
42 changed files with 1979 additions and 207 deletions

View File

@ -0,0 +1,32 @@
{
"id": "CVE-2023-37057",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-06-17T21:15:50.380",
"lastModified": "2024-06-17T21:15:50.380",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "An issue in JLINK Unionman Technology Co. Ltd Jlink AX1800 v.1.0 allows a remote attacker to execute arbitrary code via the router's authentication mechanism."
}
],
"metrics": {},
"references": [
{
"url": "http://jlink.com",
"source": "cve@mitre.org"
},
{
"url": "http://www.unionman.com.cn/en/contact.html",
"source": "cve@mitre.org"
},
{
"url": "https://github.com/ri5c/Jlink-Router-RCE",
"source": "cve@mitre.org"
},
{
"url": "https://jlink-global.com/",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,24 @@
{
"id": "CVE-2023-37058",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-06-17T21:15:50.503",
"lastModified": "2024-06-17T21:15:50.503",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "Insecure Permissions vulnerability in JLINK Unionman Technology Co. Ltd Jlink AX1800 v.1.0 allows a remote attacker to escalate privileges via a crafted command."
}
],
"metrics": {},
"references": [
{
"url": "http://jlink.com",
"source": "cve@mitre.org"
},
{
"url": "https://github.com/ri5c/Jlink-Router-RCE",
"source": "cve@mitre.org"
}
]
}

View File

@ -2,12 +2,12 @@
"id": "CVE-2024-25400",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-02-27T16:15:46.517",
"lastModified": "2024-02-28T14:07:00.563",
"lastModified": "2024-06-17T20:15:12.000",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "Subrion CMS 4.2.1 is vulnerable to SQL Injection via ia.core.mysqli.php."
"value": "Subrion CMS 4.2.1 is vulnerable to SQL Injection via ia.core.mysqli.php. NOTE: this is disputed by multiple third parties because it refers to an HTTP request to a PHP file that only contains a class, without any mechanism for accepting external input, and the reportedly vulnerable method is not present in the file."
},
{
"lang": "es",
@ -16,17 +16,9 @@
],
"metrics": {},
"references": [
{
"url": "https://cwe.mitre.org/data/definitions/89.html",
"source": "cve@mitre.org"
},
{
"url": "https://github.com/intelliants/subrion/issues/910",
"source": "cve@mitre.org"
},
{
"url": "https://subrion.org/",
"source": "cve@mitre.org"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-26086",
"sourceIdentifier": "psirt@adobe.com",
"published": "2024-06-13T08:15:56.017",
"lastModified": "2024-06-13T18:35:19.777",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2024-06-17T20:31:51.467",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -16,6 +16,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 5.4,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.3,
"impactScore": 2.7
},
{
"source": "psirt@adobe.com",
"type": "Secondary",
@ -50,10 +70,37 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:experience_manager:*:*:*:*:*:*:*:*",
"versionEndExcluding": "6.5.21",
"matchCriteriaId": "33F20D83-E0D3-4504-B15F-C3240F8CFB90"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:experience_manager:*:*:*:*:aem_cloud_service:*:*:*",
"versionEndExcluding": "2024.5",
"matchCriteriaId": "8A667B96-AB3F-48AB-9980-11AB79AA7BD7"
}
]
}
]
}
],
"references": [
{
"url": "https://helpx.adobe.com/security/products/experience-manager/apsb24-28.html",
"source": "psirt@adobe.com"
"source": "psirt@adobe.com",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-26089",
"sourceIdentifier": "psirt@adobe.com",
"published": "2024-06-13T08:15:56.483",
"lastModified": "2024-06-13T18:35:19.777",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2024-06-17T20:32:03.657",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -50,10 +50,37 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:experience_manager:*:*:*:*:*:*:*:*",
"versionEndExcluding": "6.5.21",
"matchCriteriaId": "33F20D83-E0D3-4504-B15F-C3240F8CFB90"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:experience_manager:*:*:*:*:aem_cloud_service:*:*:*",
"versionEndExcluding": "2024.5",
"matchCriteriaId": "8A667B96-AB3F-48AB-9980-11AB79AA7BD7"
}
]
}
]
}
],
"references": [
{
"url": "https://helpx.adobe.com/security/products/experience-manager/apsb24-28.html",
"source": "psirt@adobe.com"
"source": "psirt@adobe.com",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-26090",
"sourceIdentifier": "psirt@adobe.com",
"published": "2024-06-13T08:15:56.710",
"lastModified": "2024-06-13T18:35:19.777",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2024-06-17T20:32:18.073",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -50,10 +50,37 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:experience_manager:*:*:*:*:*:*:*:*",
"versionEndExcluding": "6.5.21",
"matchCriteriaId": "33F20D83-E0D3-4504-B15F-C3240F8CFB90"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:experience_manager:*:*:*:*:aem_cloud_service:*:*:*",
"versionEndExcluding": "2024.5",
"matchCriteriaId": "8A667B96-AB3F-48AB-9980-11AB79AA7BD7"
}
]
}
]
}
],
"references": [
{
"url": "https://helpx.adobe.com/security/products/experience-manager/apsb24-28.html",
"source": "psirt@adobe.com"
"source": "psirt@adobe.com",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-26091",
"sourceIdentifier": "psirt@adobe.com",
"published": "2024-06-13T08:15:56.943",
"lastModified": "2024-06-13T18:35:19.777",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2024-06-17T20:32:37.817",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -50,10 +50,37 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:experience_manager:*:*:*:*:*:*:*:*",
"versionEndExcluding": "6.5.21",
"matchCriteriaId": "33F20D83-E0D3-4504-B15F-C3240F8CFB90"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:experience_manager:*:*:*:*:aem_cloud_service:*:*:*",
"versionEndExcluding": "2024.5",
"matchCriteriaId": "8A667B96-AB3F-48AB-9980-11AB79AA7BD7"
}
]
}
]
}
],
"references": [
{
"url": "https://helpx.adobe.com/security/products/experience-manager/apsb24-28.html",
"source": "psirt@adobe.com"
"source": "psirt@adobe.com",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-26117",
"sourceIdentifier": "psirt@adobe.com",
"published": "2024-06-13T08:15:59.240",
"lastModified": "2024-06-13T18:35:19.777",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2024-06-17T20:31:38.117",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -50,10 +50,37 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:experience_manager:*:*:*:*:*:*:*:*",
"versionEndExcluding": "6.5.21",
"matchCriteriaId": "33F20D83-E0D3-4504-B15F-C3240F8CFB90"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:experience_manager:*:*:*:*:aem_cloud_service:*:*:*",
"versionEndExcluding": "2024.5",
"matchCriteriaId": "8A667B96-AB3F-48AB-9980-11AB79AA7BD7"
}
]
}
]
}
],
"references": [
{
"url": "https://helpx.adobe.com/security/products/experience-manager/apsb24-28.html",
"source": "psirt@adobe.com"
"source": "psirt@adobe.com",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -0,0 +1,24 @@
{
"id": "CVE-2024-34833",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-06-17T21:15:50.783",
"lastModified": "2024-06-17T21:15:50.783",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "Sourcecodester Payroll Management System v1.0 is vulnerable to File Upload. Users can upload images via the \"save_settings\" page. An unauthenticated attacker can leverage this functionality to upload a malicious PHP file instead. Successful exploitation of this vulnerability results in the ability to execute arbitrary code as the user running the web server."
}
],
"metrics": {},
"references": [
{
"url": "https://github.com/ShellUnease/payroll-management-system-rce",
"source": "cve@mitre.org"
},
{
"url": "https://packetstormsecurity.com/files/179106/Payroll-Management-System-1.0-Remote-Code-Execution.html",
"source": "cve@mitre.org"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-36151",
"sourceIdentifier": "psirt@adobe.com",
"published": "2024-06-13T08:16:03.090",
"lastModified": "2024-06-13T18:35:19.777",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2024-06-17T20:33:37.130",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -39,6 +39,16 @@
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
},
{
"source": "psirt@adobe.com",
"type": "Secondary",
@ -50,10 +60,37 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:experience_manager:*:*:*:*:*:*:*:*",
"versionEndExcluding": "6.5.21",
"matchCriteriaId": "33F20D83-E0D3-4504-B15F-C3240F8CFB90"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:experience_manager:*:*:*:*:aem_cloud_service:*:*:*",
"versionEndExcluding": "2024.5",
"matchCriteriaId": "8A667B96-AB3F-48AB-9980-11AB79AA7BD7"
}
]
}
]
}
],
"references": [
{
"url": "https://helpx.adobe.com/security/products/experience-manager/apsb24-28.html",
"source": "psirt@adobe.com"
"source": "psirt@adobe.com",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-36157",
"sourceIdentifier": "psirt@adobe.com",
"published": "2024-06-13T08:16:04.540",
"lastModified": "2024-06-13T18:35:19.777",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2024-06-17T20:33:10.487",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -50,10 +50,37 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:experience_manager:*:*:*:*:*:*:*:*",
"versionEndExcluding": "6.5.21",
"matchCriteriaId": "33F20D83-E0D3-4504-B15F-C3240F8CFB90"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:experience_manager:*:*:*:*:aem_cloud_service:*:*:*",
"versionEndExcluding": "2024.5",
"matchCriteriaId": "8A667B96-AB3F-48AB-9980-11AB79AA7BD7"
}
]
}
]
}
],
"references": [
{
"url": "https://helpx.adobe.com/security/products/experience-manager/apsb24-28.html",
"source": "psirt@adobe.com"
"source": "psirt@adobe.com",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-36163",
"sourceIdentifier": "psirt@adobe.com",
"published": "2024-06-13T08:16:06.063",
"lastModified": "2024-06-13T18:35:19.777",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2024-06-17T20:33:01.803",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -50,10 +50,37 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:experience_manager:*:*:*:*:*:*:*:*",
"versionEndExcluding": "6.5.21",
"matchCriteriaId": "33F20D83-E0D3-4504-B15F-C3240F8CFB90"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:experience_manager:*:*:*:*:aem_cloud_service:*:*:*",
"versionEndExcluding": "2024.5",
"matchCriteriaId": "8A667B96-AB3F-48AB-9980-11AB79AA7BD7"
}
]
}
]
}
],
"references": [
{
"url": "https://helpx.adobe.com/security/products/experience-manager/apsb24-28.html",
"source": "psirt@adobe.com"
"source": "psirt@adobe.com",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-36164",
"sourceIdentifier": "psirt@adobe.com",
"published": "2024-06-13T08:16:06.287",
"lastModified": "2024-06-13T18:35:19.777",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2024-06-17T20:32:51.417",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -50,10 +50,37 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:experience_manager:*:*:*:*:*:*:*:*",
"versionEndExcluding": "6.5.21",
"matchCriteriaId": "33F20D83-E0D3-4504-B15F-C3240F8CFB90"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:experience_manager:*:*:*:*:aem_cloud_service:*:*:*",
"versionEndExcluding": "2024.5",
"matchCriteriaId": "8A667B96-AB3F-48AB-9980-11AB79AA7BD7"
}
]
}
]
}
],
"references": [
{
"url": "https://helpx.adobe.com/security/products/experience-manager/apsb24-28.html",
"source": "psirt@adobe.com"
"source": "psirt@adobe.com",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-36227",
"sourceIdentifier": "psirt@adobe.com",
"published": "2024-06-13T08:16:20.683",
"lastModified": "2024-06-13T18:35:19.777",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2024-06-17T20:12:46.843",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -50,10 +50,37 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:experience_manager:*:*:*:*:*:*:*:*",
"versionEndExcluding": "6.5.21",
"matchCriteriaId": "33F20D83-E0D3-4504-B15F-C3240F8CFB90"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:experience_manager:*:*:*:*:aem_cloud_service:*:*:*",
"versionEndExcluding": "2024.5",
"matchCriteriaId": "8A667B96-AB3F-48AB-9980-11AB79AA7BD7"
}
]
}
]
}
],
"references": [
{
"url": "https://helpx.adobe.com/security/products/experience-manager/apsb24-28.html",
"source": "psirt@adobe.com"
"source": "psirt@adobe.com",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-36228",
"sourceIdentifier": "psirt@adobe.com",
"published": "2024-06-13T08:16:20.913",
"lastModified": "2024-06-13T18:35:19.777",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2024-06-17T20:12:35.727",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -16,6 +16,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 5.4,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.3,
"impactScore": 2.7
},
{
"source": "psirt@adobe.com",
"type": "Secondary",
@ -50,10 +70,37 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:experience_manager:*:*:*:*:*:*:*:*",
"versionEndExcluding": "6.5.21",
"matchCriteriaId": "33F20D83-E0D3-4504-B15F-C3240F8CFB90"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:experience_manager:*:*:*:*:aem_cloud_service:*:*:*",
"versionEndExcluding": "2024.5",
"matchCriteriaId": "8A667B96-AB3F-48AB-9980-11AB79AA7BD7"
}
]
}
]
}
],
"references": [
{
"url": "https://helpx.adobe.com/security/products/experience-manager/apsb24-28.html",
"source": "psirt@adobe.com"
"source": "psirt@adobe.com",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-36229",
"sourceIdentifier": "psirt@adobe.com",
"published": "2024-06-13T08:16:21.143",
"lastModified": "2024-06-13T18:35:19.777",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2024-06-17T20:12:20.760",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -50,10 +50,37 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:experience_manager:*:*:*:*:*:*:*:*",
"versionEndExcluding": "6.5.21",
"matchCriteriaId": "33F20D83-E0D3-4504-B15F-C3240F8CFB90"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:experience_manager:*:*:*:*:aem_cloud_service:*:*:*",
"versionEndExcluding": "2024.5",
"matchCriteriaId": "8A667B96-AB3F-48AB-9980-11AB79AA7BD7"
}
]
}
]
}
],
"references": [
{
"url": "https://helpx.adobe.com/security/products/experience-manager/apsb24-28.html",
"source": "psirt@adobe.com"
"source": "psirt@adobe.com",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-36230",
"sourceIdentifier": "psirt@adobe.com",
"published": "2024-06-13T08:16:21.360",
"lastModified": "2024-06-13T18:35:19.777",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2024-06-17T20:10:31.787",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -50,10 +50,37 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:experience_manager:*:*:*:*:*:*:*:*",
"versionEndExcluding": "6.5.21",
"matchCriteriaId": "33F20D83-E0D3-4504-B15F-C3240F8CFB90"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:experience_manager:*:*:*:*:aem_cloud_service:*:*:*",
"versionEndExcluding": "2024.5",
"matchCriteriaId": "8A667B96-AB3F-48AB-9980-11AB79AA7BD7"
}
]
}
]
}
],
"references": [
{
"url": "https://helpx.adobe.com/security/products/experience-manager/apsb24-28.html",
"source": "psirt@adobe.com"
"source": "psirt@adobe.com",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-36233",
"sourceIdentifier": "psirt@adobe.com",
"published": "2024-06-13T08:16:22.107",
"lastModified": "2024-06-13T18:35:19.777",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2024-06-17T20:22:07.620",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -50,10 +50,37 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:experience_manager:*:*:*:*:*:*:*:*",
"versionEndExcluding": "6.5.21",
"matchCriteriaId": "33F20D83-E0D3-4504-B15F-C3240F8CFB90"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:experience_manager:*:*:*:*:aem_cloud_service:*:*:*",
"versionEndExcluding": "2024.5",
"matchCriteriaId": "8A667B96-AB3F-48AB-9980-11AB79AA7BD7"
}
]
}
]
}
],
"references": [
{
"url": "https://helpx.adobe.com/security/products/experience-manager/apsb24-28.html",
"source": "psirt@adobe.com"
"source": "psirt@adobe.com",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-36234",
"sourceIdentifier": "psirt@adobe.com",
"published": "2024-06-13T08:16:22.343",
"lastModified": "2024-06-13T18:35:19.777",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2024-06-17T20:21:54.507",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -50,10 +50,37 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:experience_manager:*:*:*:*:*:*:*:*",
"versionEndExcluding": "6.5.21",
"matchCriteriaId": "33F20D83-E0D3-4504-B15F-C3240F8CFB90"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:experience_manager:*:*:*:*:aem_cloud_service:*:*:*",
"versionEndExcluding": "2024.5",
"matchCriteriaId": "8A667B96-AB3F-48AB-9980-11AB79AA7BD7"
}
]
}
]
}
],
"references": [
{
"url": "https://helpx.adobe.com/security/products/experience-manager/apsb24-28.html",
"source": "psirt@adobe.com"
"source": "psirt@adobe.com",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-36235",
"sourceIdentifier": "psirt@adobe.com",
"published": "2024-06-13T08:16:22.577",
"lastModified": "2024-06-13T18:35:19.777",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2024-06-17T20:21:30.017",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -39,6 +39,16 @@
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
},
{
"source": "psirt@adobe.com",
"type": "Secondary",
@ -50,10 +60,37 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:experience_manager:*:*:*:*:*:*:*:*",
"versionEndExcluding": "6.5.21",
"matchCriteriaId": "33F20D83-E0D3-4504-B15F-C3240F8CFB90"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:experience_manager:*:*:*:*:aem_cloud_service:*:*:*",
"versionEndExcluding": "2024.5",
"matchCriteriaId": "8A667B96-AB3F-48AB-9980-11AB79AA7BD7"
}
]
}
]
}
],
"references": [
{
"url": "https://helpx.adobe.com/security/products/experience-manager/apsb24-28.html",
"source": "psirt@adobe.com"
"source": "psirt@adobe.com",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-36236",
"sourceIdentifier": "psirt@adobe.com",
"published": "2024-06-13T08:16:22.817",
"lastModified": "2024-06-13T18:35:19.777",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2024-06-17T20:21:20.523",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -16,6 +16,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 5.4,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.3,
"impactScore": 2.7
},
{
"source": "psirt@adobe.com",
"type": "Secondary",
@ -50,10 +70,37 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:experience_manager:*:*:*:*:*:*:*:*",
"versionEndExcluding": "6.5.21",
"matchCriteriaId": "33F20D83-E0D3-4504-B15F-C3240F8CFB90"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:experience_manager:*:*:*:*:aem_cloud_service:*:*:*",
"versionEndExcluding": "2024.5",
"matchCriteriaId": "8A667B96-AB3F-48AB-9980-11AB79AA7BD7"
}
]
}
]
}
],
"references": [
{
"url": "https://helpx.adobe.com/security/products/experience-manager/apsb24-28.html",
"source": "psirt@adobe.com"
"source": "psirt@adobe.com",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-36238",
"sourceIdentifier": "psirt@adobe.com",
"published": "2024-06-13T08:16:23.057",
"lastModified": "2024-06-13T18:35:19.777",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2024-06-17T20:20:28.453",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -50,10 +50,37 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:experience_manager:*:*:*:*:*:*:*:*",
"versionEndExcluding": "6.5.21",
"matchCriteriaId": "33F20D83-E0D3-4504-B15F-C3240F8CFB90"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:experience_manager:*:*:*:*:aem_cloud_service:*:*:*",
"versionEndExcluding": "2024.5",
"matchCriteriaId": "8A667B96-AB3F-48AB-9980-11AB79AA7BD7"
}
]
}
]
}
],
"references": [
{
"url": "https://helpx.adobe.com/security/products/experience-manager/apsb24-28.html",
"source": "psirt@adobe.com"
"source": "psirt@adobe.com",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-36239",
"sourceIdentifier": "psirt@adobe.com",
"published": "2024-06-13T08:16:23.323",
"lastModified": "2024-06-13T18:35:19.777",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2024-06-17T20:20:18.633",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -50,10 +50,37 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:experience_manager:*:*:*:*:*:*:*:*",
"versionEndExcluding": "6.5.21",
"matchCriteriaId": "33F20D83-E0D3-4504-B15F-C3240F8CFB90"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:experience_manager:*:*:*:*:aem_cloud_service:*:*:*",
"versionEndExcluding": "2024.5",
"matchCriteriaId": "8A667B96-AB3F-48AB-9980-11AB79AA7BD7"
}
]
}
]
}
],
"references": [
{
"url": "https://helpx.adobe.com/security/products/experience-manager/apsb24-28.html",
"source": "psirt@adobe.com"
"source": "psirt@adobe.com",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,12 +2,12 @@
"id": "CVE-2024-36821",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-06-11T18:15:13.927",
"lastModified": "2024-06-13T18:36:09.013",
"lastModified": "2024-06-17T21:15:50.960",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "Insecure permissions in Linksys Velop WiFi 5 (WHW01v1) 1.1.13.202617 allows attackers to escalate privileges from Guest to root via a directory traversal."
"value": "Insecure permissions in Linksys Velop WiFi 5 (WHW01v1) 1.1.13.202617 allows attackers to escalate privileges from Guest to root."
},
{
"lang": "es",

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-36837",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-06-05T15:15:11.803",
"lastModified": "2024-06-06T14:17:35.017",
"lastModified": "2024-06-17T21:15:51.050",
"vulnStatus": "Undergoing Analysis",
"descriptions": [
{
@ -17,7 +17,7 @@
"metrics": {},
"references": [
{
"url": "https://7nkdkj-my.sharepoint.com/:w:/g/personal/krypt0n_7nkdkj_onmicrosoft_com/Ea8dW8YuldRMqgCy7KHjnxABTJCVPLShHIJfqQk684mD3A?e=0qmN7t",
"url": "https://github.com/phtcloud-dev/CVE-2024-36837",
"source": "cve@mitre.org"
}
]

View File

@ -0,0 +1,75 @@
{
"id": "CVE-2024-37305",
"sourceIdentifier": "security-advisories@github.com",
"published": "2024-06-17T20:15:12.880",
"lastModified": "2024-06-17T20:15:12.880",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "oqs-provider is a provider for the OpenSSL 3 cryptography library that adds support for post-quantum cryptography in TLS, X.509, and S/MIME using post-quantum algorithms from liboqs. Flaws have been identified in the way oqs-provider handles lengths decoded with DECODE_UINT32 at the start of serialized hybrid (traditional + post-quantum) keys and signatures. Unchecked length values are later used for memory reads and writes; malformed input can lead to crashes or information leakage. Handling of plain/non-hybrid PQ key operation is not affected. This issue has been patched in in v0.6.1. All users are advised to upgrade. There are no workarounds for this issue."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security-advisories@github.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH",
"baseScore": 8.2,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 4.2
}
]
},
"weaknesses": [
{
"source": "security-advisories@github.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-120"
},
{
"lang": "en",
"value": "CWE-130"
},
{
"lang": "en",
"value": "CWE-190"
},
{
"lang": "en",
"value": "CWE-680"
},
{
"lang": "en",
"value": "CWE-805"
}
]
}
],
"references": [
{
"url": "https://github.com/open-quantum-safe/oqs-provider/pull/416",
"source": "security-advisories@github.com"
},
{
"url": "https://github.com/open-quantum-safe/oqs-provider/security/advisories/GHSA-pqvr-5cr8-v6fx",
"source": "security-advisories@github.com"
}
]
}

View File

@ -0,0 +1,24 @@
{
"id": "CVE-2024-37798",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-06-17T21:15:51.180",
"lastModified": "2024-06-17T21:15:51.180",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "Cross-site scripting (XSS) vulnerability in search-appointment.php in the Admin Panel in Phpgurukul Beauty Parlour Management System 1.0 allows remote attackers to inject arbitrary web script or HTML via the search input field."
}
],
"metrics": {},
"references": [
{
"url": "https://cyberxtron.com/blog/cve-2024-37798---cross-site-scripting-xss-in-beauty-parlour-management-system--5187",
"source": "cve@mitre.org"
},
{
"url": "https://owasp.org/www-community/attacks/xss/",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,24 @@
{
"id": "CVE-2024-37828",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-06-17T21:15:51.280",
"lastModified": "2024-06-17T21:15:51.280",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "A stored cross-site scripting (XSS) in Vermeg Agile Reporter v23.2.1 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the Message field under the Set Broadcast Message module."
}
],
"metrics": {},
"references": [
{
"url": "https://crashpark.weebly.com/blog/2-stored-xss-in-agilereporter-213-by-vermeg",
"source": "cve@mitre.org"
},
{
"url": "https://www.vermeg.com/agile-reporter/",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,83 @@
{
"id": "CVE-2024-37890",
"sourceIdentifier": "security-advisories@github.com",
"published": "2024-06-17T20:15:13.203",
"lastModified": "2024-06-17T20:15:13.203",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "ws is an open source WebSocket client and server for Node.js. A request with a number of headers exceeding theserver.maxHeadersCount threshold could be used to crash a ws server. The vulnerability was fixed in ws@8.17.1 (e55e510) and backported to ws@7.5.10 (22c2876), ws@6.2.3 (eeb76d3), and ws@5.2.4 (4abd8f6). In vulnerable versions of ws, the issue can be mitigated in the following ways: 1. Reduce the maximum allowed length of the request headers using the --max-http-header-size=size and/or the maxHeaderSize options so that no more headers than the server.maxHeadersCount limit can be sent. 2. Set server.maxHeadersCount to 0 so that no limit is applied."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security-advisories@github.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "security-advisories@github.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-476"
}
]
}
],
"references": [
{
"url": "https://github.com/websockets/ws/commit/22c28763234aa75a7e1b76f5c01c181260d7917f",
"source": "security-advisories@github.com"
},
{
"url": "https://github.com/websockets/ws/commit/4abd8f6de4b0b65ef80b3ff081989479ed93377e",
"source": "security-advisories@github.com"
},
{
"url": "https://github.com/websockets/ws/commit/e55e5106f10fcbaac37cfa89759e4cc0d073a52c",
"source": "security-advisories@github.com"
},
{
"url": "https://github.com/websockets/ws/commit/eeb76d313e2a00dd5247ca3597bba7877d064a63",
"source": "security-advisories@github.com"
},
{
"url": "https://github.com/websockets/ws/issues/2230",
"source": "security-advisories@github.com"
},
{
"url": "https://github.com/websockets/ws/pull/2231",
"source": "security-advisories@github.com"
},
{
"url": "https://github.com/websockets/ws/security/advisories/GHSA-3h5v-q93c-6h6q",
"source": "security-advisories@github.com"
},
{
"url": "https://nodejs.org/api/http.html#servermaxheaderscount",
"source": "security-advisories@github.com"
}
]
}

View File

@ -0,0 +1,59 @@
{
"id": "CVE-2024-37891",
"sourceIdentifier": "security-advisories@github.com",
"published": "2024-06-17T20:15:13.450",
"lastModified": "2024-06-17T20:15:13.450",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": " urllib3 is a user-friendly HTTP client library for Python. When using urllib3's proxy support with `ProxyManager`, the `Proxy-Authorization` header is only sent to the configured proxy, as expected. However, when sending HTTP requests *without* using urllib3's proxy support, it's possible to accidentally configure the `Proxy-Authorization` header even though it won't have any effect as the request is not using a forwarding proxy or a tunneling proxy. In those cases, urllib3 doesn't treat the `Proxy-Authorization` HTTP header as one carrying authentication material and thus doesn't strip the header on cross-origin redirects. Because this is a highly unlikely scenario, we believe the severity of this vulnerability is low for almost all users. Out of an abundance of caution urllib3 will automatically strip the `Proxy-Authorization` header during cross-origin redirects to avoid the small chance that users are doing this on accident. Users should use urllib3's proxy support or disable automatic redirects to achieve safe processing of the `Proxy-Authorization` header, but we still decided to strip the header by default in order to further protect users who aren't using the correct approach. We believe the number of usages affected by this advisory is low. It requires all of the following to be true to be exploited: 1. Setting the `Proxy-Authorization` header without using urllib3's built-in proxy support. 2. Not disabling HTTP redirects. 3. Either not using an HTTPS origin server or for the proxy or target origin to redirect to a malicious origin. Users are advised to update to either version 1.26.19 or version 2.2.2. Users unable to upgrade may use the `Proxy-Authorization` header with urllib3's `ProxyManager`, disable HTTP redirects using `redirects=False` when sending requests, or not user the `Proxy-Authorization` header as mitigations."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security-advisories@github.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:N",
"attackVector": "NETWORK",
"attackComplexity": "HIGH",
"privilegesRequired": "HIGH",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.4,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 0.7,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "security-advisories@github.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-669"
}
]
}
],
"references": [
{
"url": "https://github.com/urllib3/urllib3/commit/accff72ecc2f6cf5a76d9570198a93ac7c90270e",
"source": "security-advisories@github.com"
},
{
"url": "https://github.com/urllib3/urllib3/security/advisories/GHSA-34jh-p97f-mpxf",
"source": "security-advisories@github.com"
}
]
}

View File

@ -0,0 +1,67 @@
{
"id": "CVE-2024-37893",
"sourceIdentifier": "security-advisories@github.com",
"published": "2024-06-17T20:15:13.700",
"lastModified": "2024-06-17T20:15:13.700",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "Firefly III is a free and open source personal finance manager. In affected versions an MFA bypass in the Firefly III OAuth flow may allow malicious users to bypass the MFA-check. This allows malicious users to use password spraying to gain access to Firefly III data using passwords stolen from other sources. As OAuth applications are easily enumerable using an incrementing id, an attacker could try sign an OAuth application up to a users profile quite easily if they have created one. The attacker would also need to know the victims username and password. This problem has been patched in Firefly III v6.1.17 and up. Users are advised to upgrade. Users unable to upgrade should Use a unique password for their Firefly III instance and store their password securely, i.e. in a password manager."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security-advisories@github.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N",
"attackVector": "NETWORK",
"attackComplexity": "HIGH",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5.9,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.2,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "security-advisories@github.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-287"
},
{
"lang": "en",
"value": "CWE-288"
}
]
}
],
"references": [
{
"url": "https://github.com/firefly-iii/firefly-iii/security/advisories/GHSA-4gm4-c4mh-4p7w",
"source": "security-advisories@github.com"
},
{
"url": "https://owasp.org/www-community/attacks/Password_Spraying_Attack",
"source": "security-advisories@github.com"
},
{
"url": "https://www.menlosecurity.com/what-is/highly-evasive-adaptive-threats-heat/mfa-bypass",
"source": "security-advisories@github.com"
}
]
}

View File

@ -0,0 +1,55 @@
{
"id": "CVE-2024-37895",
"sourceIdentifier": "security-advisories@github.com",
"published": "2024-06-17T20:15:13.970",
"lastModified": "2024-06-17T20:15:13.970",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "Lobe Chat is an open-source LLMs/AI chat framework. In affected versions if an attacker can successfully authenticate through SSO/Access Code, they can obtain the real backend API Key by modifying the base URL to their own attack URL on the frontend and setting up a server-side request. This issue has been addressed in version 0.162.25. Users are advised to upgrade. There are no known workarounds for this vulnerability."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security-advisories@github.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5.7,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.1,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "security-advisories@github.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-200"
}
]
}
],
"references": [
{
"url": "https://github.com/lobehub/lobe-chat/security/advisories/GHSA-p36r-qxgx-jq2v",
"source": "security-advisories@github.com"
}
]
}

View File

@ -0,0 +1,59 @@
{
"id": "CVE-2024-37896",
"sourceIdentifier": "security-advisories@github.com",
"published": "2024-06-17T20:15:14.213",
"lastModified": "2024-06-17T20:15:14.213",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "Gin-vue-admin is a backstage management system based on vue and gin. Gin-vue-admin <= v2.6.5 has SQL injection vulnerability. The SQL injection vulnerabilities occur when a web application allows users to input data into SQL queries without sufficiently validating or sanitizing the input. Failing to properly enforce restrictions on user input could mean that even a basic form input field can be used to inject arbitrary and potentially dangerous SQL commands. This could lead to unauthorized access to the database, data leakage, data manipulation, or even complete compromise of the database server. This vulnerability has been addressed in commit `53d033821` which has been included in release version 2.6.6. Users are advised to upgrade. There are no known workarounds for this vulnerability."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security-advisories@github.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "security-advisories@github.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-89"
}
]
}
],
"references": [
{
"url": "https://github.com/flipped-aurora/gin-vue-admin/commit/53d03382188868464ade489ab0713b54392d227f",
"source": "security-advisories@github.com"
},
{
"url": "https://github.com/flipped-aurora/gin-vue-admin/security/advisories/GHSA-gf3r-h744-mqgp",
"source": "security-advisories@github.com"
}
]
}

View File

@ -0,0 +1,59 @@
{
"id": "CVE-2024-37902",
"sourceIdentifier": "security-advisories@github.com",
"published": "2024-06-17T20:15:14.463",
"lastModified": "2024-06-17T20:15:14.463",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "DeepJavaLibrary(DJL) is an Engine-Agnostic Deep Learning Framework in Java. DJL versions 0.1.0 through 0.27.0 do not prevent absolute path archived artifacts from inserting archived files directly into the system, overwriting system files. This is fixed in DJL 0.28.0 and patched in DJL Large Model Inference containers version 0.27.0. Users are advised to upgrade."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security-advisories@github.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "CHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 10.0,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.9,
"impactScore": 6.0
}
]
},
"weaknesses": [
{
"source": "security-advisories@github.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-22"
}
]
}
],
"references": [
{
"url": "https://github.com/deepjavalibrary/djl/releases/tag/v0.28.0",
"source": "security-advisories@github.com"
},
{
"url": "https://github.com/deepjavalibrary/djl/security/advisories/GHSA-w877-jfw7-46rj",
"source": "security-advisories@github.com"
}
]
}

View File

@ -0,0 +1,100 @@
{
"id": "CVE-2024-6061",
"sourceIdentifier": "cna@vuldb.com",
"published": "2024-06-17T20:15:14.850",
"lastModified": "2024-06-17T20:15:14.850",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "A vulnerability has been found in GPAC 2.5-DEV-rev228-g11067ea92-master and classified as problematic. Affected by this vulnerability is the function isoffin_process of the file src/filters/isoffin_read.c of the component MP4Box. The manipulation leads to infinite loop. It is possible to launch the attack on the local host. The exploit has been disclosed to the public and may be used. The identifier of the patch is 20c0f29139a82779b86453ce7f68d0681ec7624c. It is recommended to apply a patch to fix this issue. The identifier VDB-268789 was assigned to this vulnerability."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "LOW",
"baseScore": 3.3,
"baseSeverity": "LOW"
},
"exploitabilityScore": 1.8,
"impactScore": 1.4
}
],
"cvssMetricV2": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:L/AC:L/Au:S/C:N/I:N/A:P",
"accessVector": "LOCAL",
"accessComplexity": "LOW",
"authentication": "SINGLE",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 1.7
},
"baseSeverity": "LOW",
"exploitabilityScore": 3.1,
"impactScore": 2.9,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-835"
}
]
}
],
"references": [
{
"url": "https://github.com/gpac/gpac/commit/20c0f29139a82779b86453ce7f68d0681ec7624c",
"source": "cna@vuldb.com"
},
{
"url": "https://github.com/gpac/gpac/issues/2871",
"source": "cna@vuldb.com"
},
{
"url": "https://github.com/user-attachments/files/15801058/poc1.zip",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?ctiid.268789",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?id.268789",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?submit.356308",
"source": "cna@vuldb.com"
}
]
}

View File

@ -0,0 +1,100 @@
{
"id": "CVE-2024-6062",
"sourceIdentifier": "cna@vuldb.com",
"published": "2024-06-17T20:15:15.170",
"lastModified": "2024-06-17T20:15:15.170",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "A vulnerability was found in GPAC 2.5-DEV-rev228-g11067ea92-master and classified as problematic. Affected by this issue is the function swf_svg_add_iso_sample of the file src/filters/load_text.c of the component MP4Box. The manipulation leads to null pointer dereference. The attack needs to be approached locally. The exploit has been disclosed to the public and may be used. The patch is identified as 31e499d310a48bd17c8b055a0bfe0fe35887a7cd. It is recommended to apply a patch to fix this issue. VDB-268790 is the identifier assigned to this vulnerability."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "LOW",
"baseScore": 3.3,
"baseSeverity": "LOW"
},
"exploitabilityScore": 1.8,
"impactScore": 1.4
}
],
"cvssMetricV2": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:L/AC:L/Au:S/C:N/I:N/A:P",
"accessVector": "LOCAL",
"accessComplexity": "LOW",
"authentication": "SINGLE",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 1.7
},
"baseSeverity": "LOW",
"exploitabilityScore": 3.1,
"impactScore": 2.9,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-476"
}
]
}
],
"references": [
{
"url": "https://github.com/gpac/gpac/commit/31e499d310a48bd17c8b055a0bfe0fe35887a7cd",
"source": "cna@vuldb.com"
},
{
"url": "https://github.com/gpac/gpac/issues/2872",
"source": "cna@vuldb.com"
},
{
"url": "https://github.com/user-attachments/files/15801126/poc2.zip",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?ctiid.268790",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?id.268790",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?submit.356314",
"source": "cna@vuldb.com"
}
]
}

View File

@ -0,0 +1,100 @@
{
"id": "CVE-2024-6063",
"sourceIdentifier": "cna@vuldb.com",
"published": "2024-06-17T21:15:51.443",
"lastModified": "2024-06-17T21:15:51.443",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "A vulnerability was found in GPAC 2.5-DEV-rev228-g11067ea92-master. It has been classified as problematic. This affects the function m2tsdmx_on_event of the file src/filters/dmx_m2ts.c of the component MP4Box. The manipulation leads to null pointer dereference. An attack has to be approached locally. The exploit has been disclosed to the public and may be used. The patch is named 8767ed0a77c4b02287db3723e92c2169f67c85d5. It is recommended to apply a patch to fix this issue. The associated identifier of this vulnerability is VDB-268791."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "LOW",
"baseScore": 3.3,
"baseSeverity": "LOW"
},
"exploitabilityScore": 1.8,
"impactScore": 1.4
}
],
"cvssMetricV2": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:L/AC:L/Au:S/C:N/I:N/A:P",
"accessVector": "LOCAL",
"accessComplexity": "LOW",
"authentication": "SINGLE",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 1.7
},
"baseSeverity": "LOW",
"exploitabilityScore": 3.1,
"impactScore": 2.9,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-476"
}
]
}
],
"references": [
{
"url": "https://github.com/gpac/gpac/commit/8767ed0a77c4b02287db3723e92c2169f67c85d5",
"source": "cna@vuldb.com"
},
{
"url": "https://github.com/gpac/gpac/issues/2873",
"source": "cna@vuldb.com"
},
{
"url": "https://github.com/user-attachments/files/15801157/poc.zip",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?ctiid.268791",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?id.268791",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?submit.356315",
"source": "cna@vuldb.com"
}
]
}

View File

@ -0,0 +1,100 @@
{
"id": "CVE-2024-6064",
"sourceIdentifier": "cna@vuldb.com",
"published": "2024-06-17T21:15:51.727",
"lastModified": "2024-06-17T21:15:51.727",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "A vulnerability was found in GPAC 2.5-DEV-rev228-g11067ea92-master. It has been declared as problematic. This vulnerability affects the function xmt_node_end of the file src/scene_manager/loader_xmt.c of the component MP4Box. The manipulation leads to use after free. Local access is required to approach this attack. The exploit has been disclosed to the public and may be used. The name of the patch is f4b3e4d2f91bc1749e7a924a8ab171af03a355a8/c1b9c794bad8f262c56f3cf690567980d96662f5. It is recommended to apply a patch to fix this issue. The identifier of this vulnerability is VDB-268792."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW",
"baseScore": 5.3,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.8,
"impactScore": 3.4
}
],
"cvssMetricV2": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:L/AC:L/Au:S/C:P/I:P/A:P",
"accessVector": "LOCAL",
"accessComplexity": "LOW",
"authentication": "SINGLE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"availabilityImpact": "PARTIAL",
"baseScore": 4.3
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 3.1,
"impactScore": 6.4,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-416"
}
]
}
],
"references": [
{
"url": "https://github.com/gpac/gpac/commit/c1b9c794bad8f262c56f3cf690567980d96662f5",
"source": "cna@vuldb.com"
},
{
"url": "https://github.com/gpac/gpac/issues/2874",
"source": "cna@vuldb.com"
},
{
"url": "https://github.com/user-attachments/files/15801189/poc.zip",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?ctiid.268792",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?id.268792",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?submit.356316",
"source": "cna@vuldb.com"
}
]
}

View File

@ -0,0 +1,92 @@
{
"id": "CVE-2024-6065",
"sourceIdentifier": "cna@vuldb.com",
"published": "2024-06-17T21:15:52.007",
"lastModified": "2024-06-17T21:15:52.007",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "A vulnerability was found in itsourcecode Bakery Online Ordering System 1.0. It has been rated as critical. This issue affects some unknown processing of the file index.php. The manipulation of the argument user_email leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-268793 was assigned to this vulnerability."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW",
"baseScore": 7.3,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 3.4
}
],
"cvssMetricV2": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "NONE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5
},
"baseSeverity": "HIGH",
"exploitabilityScore": 10.0,
"impactScore": 6.4,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-89"
}
]
}
],
"references": [
{
"url": "https://github.com/ppp-src/CVE/issues/4",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?ctiid.268793",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?id.268793",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?submit.358386",
"source": "cna@vuldb.com"
}
]
}

View File

@ -0,0 +1,92 @@
{
"id": "CVE-2024-6066",
"sourceIdentifier": "cna@vuldb.com",
"published": "2024-06-17T21:15:52.283",
"lastModified": "2024-06-17T21:15:52.283",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "A vulnerability classified as critical has been found in SourceCodester Best House Rental Management System 1.0. Affected is an unknown function of the file payment_report.php. The manipulation of the argument month_of leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. VDB-268794 is the identifier assigned to this vulnerability."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW",
"baseScore": 6.3,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 3.4
}
],
"cvssMetricV2": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P",
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "SINGLE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"availabilityImpact": "PARTIAL",
"baseScore": 6.5
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 8.0,
"impactScore": 6.4,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-89"
}
]
}
],
"references": [
{
"url": "https://github.com/jadu101/CVE/blob/main/SourceCodester_House_Rental_Management_System_Sqli.md",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?ctiid.268794",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?id.268794",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?submit.358439",
"source": "cna@vuldb.com"
}
]
}

View File

@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours.
### Last Repository Update
```plain
2024-06-17T20:00:19.113866+00:00
2024-06-17T22:00:18.732771+00:00
```
### Most recent CVE Modification Timestamp synchronized with NVD
```plain
2024-06-17T19:52:06.717000+00:00
2024-06-17T21:15:52.283000+00:00
```
### Last Data Feed Release
@ -33,59 +33,59 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
### Total Number of included CVEs
```plain
254301
254319
```
### CVEs added in the last Commit
Recently added CVEs: `15`
Recently added CVEs: `18`
- [CVE-2018-25103](CVE-2018/CVE-2018-251xx/CVE-2018-25103.json) (`2024-06-17T18:15:12.650`)
- [CVE-2024-36527](CVE-2024/CVE-2024-365xx/CVE-2024-36527.json) (`2024-06-17T18:15:16.767`)
- [CVE-2024-36543](CVE-2024/CVE-2024-365xx/CVE-2024-36543.json) (`2024-06-17T19:15:58.353`)
- [CVE-2024-36973](CVE-2024/CVE-2024-369xx/CVE-2024-36973.json) (`2024-06-17T18:15:17.043`)
- [CVE-2024-37661](CVE-2024/CVE-2024-376xx/CVE-2024-37661.json) (`2024-06-17T18:15:17.463`)
- [CVE-2024-37662](CVE-2024/CVE-2024-376xx/CVE-2024-37662.json) (`2024-06-17T18:15:17.560`)
- [CVE-2024-37663](CVE-2024/CVE-2024-376xx/CVE-2024-37663.json) (`2024-06-17T18:15:17.653`)
- [CVE-2024-37664](CVE-2024/CVE-2024-376xx/CVE-2024-37664.json) (`2024-06-17T18:15:17.743`)
- [CVE-2024-37794](CVE-2024/CVE-2024-377xx/CVE-2024-37794.json) (`2024-06-17T18:15:17.853`)
- [CVE-2024-37795](CVE-2024/CVE-2024-377xx/CVE-2024-37795.json) (`2024-06-17T18:15:17.953`)
- [CVE-2024-37840](CVE-2024/CVE-2024-378xx/CVE-2024-37840.json) (`2024-06-17T19:15:58.470`)
- [CVE-2024-38449](CVE-2024/CVE-2024-384xx/CVE-2024-38449.json) (`2024-06-17T19:15:58.567`)
- [CVE-2024-6056](CVE-2024/CVE-2024-60xx/CVE-2024-6056.json) (`2024-06-17T18:15:18.143`)
- [CVE-2024-6058](CVE-2024/CVE-2024-60xx/CVE-2024-6058.json) (`2024-06-17T18:15:18.520`)
- [CVE-2024-6059](CVE-2024/CVE-2024-60xx/CVE-2024-6059.json) (`2024-06-17T19:15:59.467`)
- [CVE-2023-37057](CVE-2023/CVE-2023-370xx/CVE-2023-37057.json) (`2024-06-17T21:15:50.380`)
- [CVE-2023-37058](CVE-2023/CVE-2023-370xx/CVE-2023-37058.json) (`2024-06-17T21:15:50.503`)
- [CVE-2024-34833](CVE-2024/CVE-2024-348xx/CVE-2024-34833.json) (`2024-06-17T21:15:50.783`)
- [CVE-2024-37305](CVE-2024/CVE-2024-373xx/CVE-2024-37305.json) (`2024-06-17T20:15:12.880`)
- [CVE-2024-37798](CVE-2024/CVE-2024-377xx/CVE-2024-37798.json) (`2024-06-17T21:15:51.180`)
- [CVE-2024-37828](CVE-2024/CVE-2024-378xx/CVE-2024-37828.json) (`2024-06-17T21:15:51.280`)
- [CVE-2024-37890](CVE-2024/CVE-2024-378xx/CVE-2024-37890.json) (`2024-06-17T20:15:13.203`)
- [CVE-2024-37891](CVE-2024/CVE-2024-378xx/CVE-2024-37891.json) (`2024-06-17T20:15:13.450`)
- [CVE-2024-37893](CVE-2024/CVE-2024-378xx/CVE-2024-37893.json) (`2024-06-17T20:15:13.700`)
- [CVE-2024-37895](CVE-2024/CVE-2024-378xx/CVE-2024-37895.json) (`2024-06-17T20:15:13.970`)
- [CVE-2024-37896](CVE-2024/CVE-2024-378xx/CVE-2024-37896.json) (`2024-06-17T20:15:14.213`)
- [CVE-2024-37902](CVE-2024/CVE-2024-379xx/CVE-2024-37902.json) (`2024-06-17T20:15:14.463`)
- [CVE-2024-6061](CVE-2024/CVE-2024-60xx/CVE-2024-6061.json) (`2024-06-17T20:15:14.850`)
- [CVE-2024-6062](CVE-2024/CVE-2024-60xx/CVE-2024-6062.json) (`2024-06-17T20:15:15.170`)
- [CVE-2024-6063](CVE-2024/CVE-2024-60xx/CVE-2024-6063.json) (`2024-06-17T21:15:51.443`)
- [CVE-2024-6064](CVE-2024/CVE-2024-60xx/CVE-2024-6064.json) (`2024-06-17T21:15:51.727`)
- [CVE-2024-6065](CVE-2024/CVE-2024-60xx/CVE-2024-6065.json) (`2024-06-17T21:15:52.007`)
- [CVE-2024-6066](CVE-2024/CVE-2024-60xx/CVE-2024-6066.json) (`2024-06-17T21:15:52.283`)
### CVEs modified in the last Commit
Recently modified CVEs: `54`
Recently modified CVEs: `22`
- [CVE-2024-36207](CVE-2024/CVE-2024-362xx/CVE-2024-36207.json) (`2024-06-17T19:22:41.023`)
- [CVE-2024-36208](CVE-2024/CVE-2024-362xx/CVE-2024-36208.json) (`2024-06-17T19:22:29.990`)
- [CVE-2024-36209](CVE-2024/CVE-2024-362xx/CVE-2024-36209.json) (`2024-06-17T19:22:21.057`)
- [CVE-2024-36210](CVE-2024/CVE-2024-362xx/CVE-2024-36210.json) (`2024-06-17T19:22:07.157`)
- [CVE-2024-36211](CVE-2024/CVE-2024-362xx/CVE-2024-36211.json) (`2024-06-17T19:21:53.777`)
- [CVE-2024-36212](CVE-2024/CVE-2024-362xx/CVE-2024-36212.json) (`2024-06-17T19:21:43.703`)
- [CVE-2024-36213](CVE-2024/CVE-2024-362xx/CVE-2024-36213.json) (`2024-06-17T19:09:24.977`)
- [CVE-2024-36214](CVE-2024/CVE-2024-362xx/CVE-2024-36214.json) (`2024-06-17T19:35:49.083`)
- [CVE-2024-36215](CVE-2024/CVE-2024-362xx/CVE-2024-36215.json) (`2024-06-17T19:33:11.697`)
- [CVE-2024-36216](CVE-2024/CVE-2024-362xx/CVE-2024-36216.json) (`2024-06-17T19:42:09.377`)
- [CVE-2024-36217](CVE-2024/CVE-2024-362xx/CVE-2024-36217.json) (`2024-06-17T19:33:01.643`)
- [CVE-2024-36218](CVE-2024/CVE-2024-362xx/CVE-2024-36218.json) (`2024-06-17T19:32:51.723`)
- [CVE-2024-36219](CVE-2024/CVE-2024-362xx/CVE-2024-36219.json) (`2024-06-17T19:32:42.640`)
- [CVE-2024-36220](CVE-2024/CVE-2024-362xx/CVE-2024-36220.json) (`2024-06-17T19:48:35.573`)
- [CVE-2024-36221](CVE-2024/CVE-2024-362xx/CVE-2024-36221.json) (`2024-06-17T19:48:20.473`)
- [CVE-2024-36222](CVE-2024/CVE-2024-362xx/CVE-2024-36222.json) (`2024-06-17T19:45:39.257`)
- [CVE-2024-36224](CVE-2024/CVE-2024-362xx/CVE-2024-36224.json) (`2024-06-17T19:45:13.547`)
- [CVE-2024-36225](CVE-2024/CVE-2024-362xx/CVE-2024-36225.json) (`2024-06-17T19:37:58.810`)
- [CVE-2024-36231](CVE-2024/CVE-2024-362xx/CVE-2024-36231.json) (`2024-06-17T19:52:06.717`)
- [CVE-2024-36232](CVE-2024/CVE-2024-362xx/CVE-2024-36232.json) (`2024-06-17T19:51:25.503`)
- [CVE-2024-3876](CVE-2024/CVE-2024-38xx/CVE-2024-3876.json) (`2024-06-17T19:15:58.763`)
- [CVE-2024-4032](CVE-2024/CVE-2024-40xx/CVE-2024-4032.json) (`2024-06-17T18:15:18.047`)
- [CVE-2024-4584](CVE-2024/CVE-2024-45xx/CVE-2024-4584.json) (`2024-06-17T19:15:58.903`)
- [CVE-2024-4595](CVE-2024/CVE-2024-45xx/CVE-2024-4595.json) (`2024-06-17T19:15:59.063`)
- [CVE-2024-5206](CVE-2024/CVE-2024-52xx/CVE-2024-5206.json) (`2024-06-17T19:15:59.190`)
- [CVE-2024-25400](CVE-2024/CVE-2024-254xx/CVE-2024-25400.json) (`2024-06-17T20:15:12.000`)
- [CVE-2024-26086](CVE-2024/CVE-2024-260xx/CVE-2024-26086.json) (`2024-06-17T20:31:51.467`)
- [CVE-2024-26089](CVE-2024/CVE-2024-260xx/CVE-2024-26089.json) (`2024-06-17T20:32:03.657`)
- [CVE-2024-26090](CVE-2024/CVE-2024-260xx/CVE-2024-26090.json) (`2024-06-17T20:32:18.073`)
- [CVE-2024-26091](CVE-2024/CVE-2024-260xx/CVE-2024-26091.json) (`2024-06-17T20:32:37.817`)
- [CVE-2024-26117](CVE-2024/CVE-2024-261xx/CVE-2024-26117.json) (`2024-06-17T20:31:38.117`)
- [CVE-2024-36151](CVE-2024/CVE-2024-361xx/CVE-2024-36151.json) (`2024-06-17T20:33:37.130`)
- [CVE-2024-36157](CVE-2024/CVE-2024-361xx/CVE-2024-36157.json) (`2024-06-17T20:33:10.487`)
- [CVE-2024-36163](CVE-2024/CVE-2024-361xx/CVE-2024-36163.json) (`2024-06-17T20:33:01.803`)
- [CVE-2024-36164](CVE-2024/CVE-2024-361xx/CVE-2024-36164.json) (`2024-06-17T20:32:51.417`)
- [CVE-2024-36227](CVE-2024/CVE-2024-362xx/CVE-2024-36227.json) (`2024-06-17T20:12:46.843`)
- [CVE-2024-36228](CVE-2024/CVE-2024-362xx/CVE-2024-36228.json) (`2024-06-17T20:12:35.727`)
- [CVE-2024-36229](CVE-2024/CVE-2024-362xx/CVE-2024-36229.json) (`2024-06-17T20:12:20.760`)
- [CVE-2024-36230](CVE-2024/CVE-2024-362xx/CVE-2024-36230.json) (`2024-06-17T20:10:31.787`)
- [CVE-2024-36233](CVE-2024/CVE-2024-362xx/CVE-2024-36233.json) (`2024-06-17T20:22:07.620`)
- [CVE-2024-36234](CVE-2024/CVE-2024-362xx/CVE-2024-36234.json) (`2024-06-17T20:21:54.507`)
- [CVE-2024-36235](CVE-2024/CVE-2024-362xx/CVE-2024-36235.json) (`2024-06-17T20:21:30.017`)
- [CVE-2024-36236](CVE-2024/CVE-2024-362xx/CVE-2024-36236.json) (`2024-06-17T20:21:20.523`)
- [CVE-2024-36238](CVE-2024/CVE-2024-362xx/CVE-2024-36238.json) (`2024-06-17T20:20:28.453`)
- [CVE-2024-36239](CVE-2024/CVE-2024-362xx/CVE-2024-36239.json) (`2024-06-17T20:20:18.633`)
- [CVE-2024-36821](CVE-2024/CVE-2024-368xx/CVE-2024-36821.json) (`2024-06-17T21:15:50.960`)
- [CVE-2024-36837](CVE-2024/CVE-2024-368xx/CVE-2024-36837.json) (`2024-06-17T21:15:51.050`)
## Download and Usage

View File

@ -121379,7 +121379,7 @@ CVE-2018-25098,0,0,fcae82fd425e45c0b5170e1d16175026afcc4282c8c2d036ab7934ed74d6d
CVE-2018-25099,0,0,4477c16cb5a3503e957873dbddbd3b50ffb7092ffd27acf2a352c93f686dfb7f,2024-03-18T12:38:25.490000
CVE-2018-25100,0,0,26375a09020100e722ed36e37b25c669512cdaa2d61a780ec73480ee78db5d6b,2024-03-25T01:51:01.223000
CVE-2018-25101,0,0,b04dde640afba29853f504e83596fe419f66817bb46aeb488be7718ce77d287c,2024-06-04T19:16:57.060000
CVE-2018-25103,1,1,122206d0dffed87e661f65dbda0c75ede3d4cb0caf0ebcb77979d91738119961,2024-06-17T18:15:12.650000
CVE-2018-25103,0,0,122206d0dffed87e661f65dbda0c75ede3d4cb0caf0ebcb77979d91738119961,2024-06-17T18:15:12.650000
CVE-2018-2515,0,0,158f882e4275a7485a2b9ce17e7e57c4ea22cf74c55a78a9900c73a4caa327c0,2023-11-07T02:57:57.887000
CVE-2018-2560,0,0,0bb1a26d6c05fddeb488697adb0bbe667a3dd77c1a5bc7af495c8721df5b1197,2020-08-24T17:37:01.140000
CVE-2018-2561,0,0,b76feaa260e2f54fc8eeb8d50d578ffdd22b603f486ac4f8f5b3bc42df22fa45,2018-01-25T13:53:15.120000
@ -227294,6 +227294,8 @@ CVE-2023-3703,0,0,76f02181cf5d80b7f612caff5073f455db91d34ac29ea7817245c12bf8efc7
CVE-2023-3704,0,0,0b7c69bc28e7afdd5dcf10d8a79e926f269c85852f7d6befc01c8a1d3a76f806,2023-09-01T17:12:08.027000
CVE-2023-37049,0,0,4a710d2494270e65f82c9c7a56bded47f634b44df6e778149a2d19ec0778c27d,2023-07-31T18:12:44.960000
CVE-2023-3705,0,0,8c79d499f4e32027bc4150fd363eda1f383550d9e90e93d841777af54adc58f7,2023-08-31T00:37:27.440000
CVE-2023-37057,1,1,58de6d15bbd15b1584a74442f183982523f5d7e7982a5eba81571241c832f712,2024-06-17T21:15:50.380000
CVE-2023-37058,1,1,cefa1996e1157324212d1dd6d54dbf4556fbe37ae2ff2cba33a7cf48cdc49924,2024-06-17T21:15:50.503000
CVE-2023-3706,0,0,d1d24339f524babb3c5d468291861ac849afd345e41ad883606273b20a797f16,2023-11-07T04:19:25.570000
CVE-2023-37061,0,0,7caa8b5c6907e4b61cbed31197e8664c90d669fbc2f478d5af9b346f52feb24b,2023-07-12T20:58:22.373000
CVE-2023-37062,0,0,915c2f5b9c7526d6273035bd201fe818387382f5f9119c439e8c7256d48d5151,2023-07-12T20:50:55.603000
@ -240664,7 +240666,7 @@ CVE-2024-0393,0,0,8881de5088bee2f43467b73941f684354c9bcdccfa7386a7827d4a78a7e8f3
CVE-2024-0394,0,0,132997f5a0f39575e52ab364803d29384d542a557e73a32dea0a249b2357dfb2,2024-04-03T17:24:18.150000
CVE-2024-0395,0,0,9697a8ac3bbf759d0c2ea19b7ab0aa903676619b1d5a607c85b8d090a4e44ee7,2024-01-10T14:15:44.970000
CVE-2024-0396,0,0,106628bcb832aae2e274e4e91fdb5add809827efe4c459066d3102ffe0249334,2024-01-29T15:22:40.317000
CVE-2024-0397,0,1,fb8a60d96b18ded5a4df325ab5f16c2a3f8bca756e992bf0a8b459da554ad30b,2024-06-17T18:15:14.767000
CVE-2024-0397,0,0,fb8a60d96b18ded5a4df325ab5f16c2a3f8bca756e992bf0a8b459da554ad30b,2024-06-17T18:15:14.767000
CVE-2024-0399,0,0,f9efd00d0c28d2f5fd7844014ccf20e6de83c83ab3d0467105e159f94efa805f,2024-04-15T13:15:31.997000
CVE-2024-0400,0,0,18035b4484267a537c15645ebee53285fc55ae5559f980b5f9795ec2795f24dd,2024-03-27T12:29:30.307000
CVE-2024-0401,0,0,eb06da8d7bba1b4b23b9513633128fc89991a02e4c0b59d538b76f5796878a05,2024-05-20T19:34:58.277000
@ -245300,7 +245302,7 @@ CVE-2024-25394,0,0,3d8e140eae2925b4367910ee589422aa82a5201da8cb9454d7cfeab54750f
CVE-2024-25395,0,0,abd266324aba51820023e28c1ec1d426492f4e0244d7fc1826505354fc747bcb,2024-05-01T18:15:15.483000
CVE-2024-25398,0,0,5f9177c45e78128f47bee33d155348e7281adb4722b60ad3313c147682b88eac,2024-02-28T14:07:00.563000
CVE-2024-25399,0,0,b681bbee2f606a57716a8b8a1ed6ef4fd1407c61ce2bf8ffff233f88dd45b3ba,2024-02-28T14:07:00.563000
CVE-2024-25400,0,0,3912ffcf040787a24c42c021604642fe62f1b3305c74e7110cea5a03e5d1c065,2024-02-28T14:07:00.563000
CVE-2024-25400,0,1,dd915a440ac73df2132a6cf61c1461d16e0e6c674a077089d357fa7024e90617,2024-06-17T20:15:12
CVE-2024-25407,0,0,b3301e47b280c10676203095ecea4066c4ca125fec7f3e126e0b91f8374bce88,2024-02-13T14:01:40.577000
CVE-2024-25410,0,0,c90ad082186d86feb4dd161bc930ce23ffd673a1aa6eb35fdd0d75b53b27288a,2024-04-03T21:15:31.220000
CVE-2024-25413,0,0,e13a361b61a6f20d27483f2d386e7add2771e4fa0c0e81fa5650d69b02349d4a,2024-02-16T13:37:51.433000
@ -245766,13 +245768,13 @@ CVE-2024-26082,0,0,56a13f29a2e8ddbfc7e70df0673c54a7fca13e31cd226d69d2cc85615a83a
CVE-2024-26083,0,0,1bd674ac9b372ed93858554b2e85f58f49ff091cf77650071f4941430327c5c5,2024-06-14T19:34:23.237000
CVE-2024-26084,0,0,4198569d9b83e7c17fa91f0baf1eeab883647801d84066753aca49311c01beec,2024-04-10T13:23:38.787000
CVE-2024-26085,0,0,acb849915f0cd6a4046956aa4d0a20fa53b8eb943427411e7238410d15281796,2024-06-14T19:34:04.773000
CVE-2024-26086,0,0,1a45b37efa4b3f0a1b1d09ebcf97fb637310b102ff5b39ad3d994f7e48ec8b22,2024-06-13T18:35:19.777000
CVE-2024-26086,0,1,4506671ec24e337f8f026e3c8afb5c904f473f768d3154bc2293d3c5743cbb9e,2024-06-17T20:31:51.467000
CVE-2024-26087,0,0,79a90816bd0d6064ff1c3bd6bcc349fec6b5af43993ed0a4b50116beb1f7cb07,2024-04-10T13:23:38.787000
CVE-2024-26088,0,0,16eab6fedf03bbf76db694067aeae8f1ff92cc4bdc3ee7f21d6ef8388f350dec,2024-06-14T20:10:01.653000
CVE-2024-26089,0,0,451057bea8d658a3f388d96df1b627f2d3746cd393a623d7266b7212c250df2a,2024-06-13T18:35:19.777000
CVE-2024-26089,0,1,f215c629db8ddabb7c989433a5c1b38d71f84f0cbe1b0e72f14c01a6cb7ca226,2024-06-17T20:32:03.657000
CVE-2024-2609,0,0,83064762a74f6161c1cfeba80ebf0a1f3d5b6f495cab56554bc8ddee3a9a5e31,2024-04-22T10:15:06.997000
CVE-2024-26090,0,0,0ffd5713a0f7f8a358dceb53810ca18f53c6a8ee433febe7c6921f84ef29fc98,2024-06-13T18:35:19.777000
CVE-2024-26091,0,0,82ce18444ded676e85be4db2cd34226de419be10593c04ac88da7b48d13b9c9f,2024-06-13T18:35:19.777000
CVE-2024-26090,0,1,c9dd4b13556fdb98f9a15122f735ff43b547110aebf1555cadc2132b44f86b76,2024-06-17T20:32:18.073000
CVE-2024-26091,0,1,d8dbce6867ebe1e482c41c04feb72e1f0fb8ac84a1de4a395bd842dbc8cdff22,2024-06-17T20:32:37.817000
CVE-2024-26092,0,0,5343667c96ab5c8fff98f48b5b1cad487977e5552584d3d352dbdadc8a2f0b62,2024-06-14T19:55:31.347000
CVE-2024-26093,0,0,816ca69a7e41828e970605d303c4d504f87519fc35238c2f77827af891150069,2024-06-14T19:50:01.977000
CVE-2024-26094,0,0,115591706a1991dd063241a84e1b5d445de4b8fd9fdb36186da6ec8b646a848b,2024-03-18T19:40:00.173000
@ -245795,7 +245797,7 @@ CVE-2024-26113,0,0,0e42e48fc441160bc37078bac7a3c17509f87f4fb36e635052288a01673bf
CVE-2024-26114,0,0,2b9079fd63e5cf0ae8740026aacea96385cf52307db72e28c4bfd116fb11f249,2024-06-14T19:51:52.757000
CVE-2024-26115,0,0,e580fcfb448d43ba09a8689c7f6669cad64bcfa4733780d2a578f45b835c6e71,2024-06-14T19:51:30.393000
CVE-2024-26116,0,0,b702a5192de74e29af331f379296cd88760488564a9e32c1891f953cec269036,2024-06-14T19:51:03.750000
CVE-2024-26117,0,0,98f6dbd092ec40fab68bd64fed6a55ef5643e222cf4c5c9f7af3131483366a8a,2024-06-13T18:35:19.777000
CVE-2024-26117,0,1,99d808f6f40d817c60d64c0bd194f45af674ac4a2edbd306c2b455444fbe6250,2024-06-17T20:31:38.117000
CVE-2024-26118,0,0,963ae62af66a2ea966470a317245a015b7cd01b5e05579f193a4ff306d3927ab,2024-03-18T19:40:00.173000
CVE-2024-26119,0,0,923abcc576a87c27af1ca6d3c3002e8f022c78a64cc1bd3e44c7feebac90f9a3,2024-03-18T19:40:00.173000
CVE-2024-2612,0,0,563748cada404dea46a8a1098e6e9010359bb31f9781cebd62e08951dacf5761,2024-03-25T17:15:51.923000
@ -250573,10 +250575,10 @@ CVE-2024-33345,0,0,7e89e81b2d7685c6c34b1a9a15e1d945044ecd27f7013fb1d01c673b4d1ae
CVE-2024-33350,0,0,144e795866532d4010724292bbdbe74a18701be22392e8071c46c27a5004fd5c,2024-04-30T13:11:16.690000
CVE-2024-3337,0,0,0e96a0de2c5ffbe4a9f2804ffa8c1140c4bee3e6e00979a6ee0758b1212b2f3c,2024-05-02T18:00:37.360000
CVE-2024-33371,0,0,ec7a79f056a06763ccfa7dcfdf94bdae70f29613e0b1d07abafaf338bff1ecb9,2024-05-01T13:02:20.750000
CVE-2024-33373,0,1,99b7497bb078bdf83fb304129b21aa2798c901fd9ac60f4753875e9aeb70b3dc,2024-06-17T18:15:15.920000
CVE-2024-33374,0,1,f31f8e198d692129975bcaf7b94a4f3569071cac52d0ba48bf94e9c4b2d859cb,2024-06-17T18:15:16.017000
CVE-2024-33375,0,1,e0eba6392fdb7999a39fee885f67bacc2f50594b53677377ca106c2be6c0baba,2024-06-17T19:15:58.107000
CVE-2024-33377,0,1,678ecca4c46ab739843520542d6cffa2a387a8e6dc22686e1f86a739b43e0ba3,2024-06-17T18:15:16.107000
CVE-2024-33373,0,0,99b7497bb078bdf83fb304129b21aa2798c901fd9ac60f4753875e9aeb70b3dc,2024-06-17T18:15:15.920000
CVE-2024-33374,0,0,f31f8e198d692129975bcaf7b94a4f3569071cac52d0ba48bf94e9c4b2d859cb,2024-06-17T18:15:16.017000
CVE-2024-33375,0,0,e0eba6392fdb7999a39fee885f67bacc2f50594b53677377ca106c2be6c0baba,2024-06-17T19:15:58.107000
CVE-2024-33377,0,0,678ecca4c46ab739843520542d6cffa2a387a8e6dc22686e1f86a739b43e0ba3,2024-06-17T18:15:16.107000
CVE-2024-3338,0,0,9454a656764280ba43f4b4a832049a80a0f45e8c0d37939e326776fd301ff609,2024-05-02T18:00:37.360000
CVE-2024-33382,0,0,fdefbc91dd758eee79622e13a87ace7fd97404c7ba92ae8195304a5c3b9d8c61,2024-05-09T13:05:45.620000
CVE-2024-33383,0,0,70f21187cd92beebcc08c0b97ec4ff0e6f501ff7515be84dc12b959842f9d519,2024-05-01T13:02:20.750000
@ -251430,6 +251432,7 @@ CVE-2024-34827,0,0,967f2d32afb0b2dfaa20d1f45e0df3e21389d96466bc0e3abad227fc206b4
CVE-2024-34828,0,0,7605aa3bedb5fc5d707a6b481c1cc91c79f17545427a53b88cbe66a14822c076,2024-05-14T16:12:23.490000
CVE-2024-3483,0,0,f497cc0f9f7ed97ac693fa9f9e6ee9a3d8c1c00c57913a6c4140ae3ca9834d87,2024-05-15T18:35:11.453000
CVE-2024-34832,0,0,5450d25a8a2a2c18ec1f13cea90692cbdaa88c98ad37b2d242e0d647addbb9b2,2024-06-07T14:56:05.647000
CVE-2024-34833,1,1,72fbe58e3e01f562fee66fe89dd0dd0ae6fe5f1a36770a101e92430749016e59,2024-06-17T21:15:50.783000
CVE-2024-3484,0,0,77b96fc6faa401f39469e2fe8fb49203604ce091be4caf53c785afcea370dbf3,2024-05-15T18:35:11.453000
CVE-2024-3485,0,0,e8641b5678d7bfcdabd6408cac9c77af492485e4b29f63fc9dc56af18234e19a,2024-05-15T18:35:11.453000
CVE-2024-34852,0,0,a2b46166918037a96ec96511b7428ab937c28a5b7c34beca90d286eb089cfe06,2024-05-29T13:02:09.280000
@ -252210,24 +252213,24 @@ CVE-2024-36148,0,0,965455dab0802400d69a13ddf9d52043c48c7bf6ab105bb67d42e4043380c
CVE-2024-36149,0,0,657b4c354b691e145a820436fbc6e5c14dedc54a042c5caad66d77bbcc05d5bc,2024-06-14T20:06:42.110000
CVE-2024-3615,0,0,64005ae223a0e1b13c6b7f52d8fc0c9c88326db37e9d2598154be43e0038ff8a,2024-04-19T13:10:25.637000
CVE-2024-36150,0,0,cc0104d38e03ca19362ac0c0a25b70254506316033533e108025c4fb844079d4,2024-06-14T20:04:18.170000
CVE-2024-36151,0,0,9c522b04472e159d1c0410e50ba9be22bd0835e5ace5c432aa2ba4540c790245,2024-06-13T18:35:19.777000
CVE-2024-36151,0,1,6460b151ce925200c0583ec9ab7106b1f22c965ddd0b0830d79bd34d91e28220,2024-06-17T20:33:37.130000
CVE-2024-36152,0,0,ef14f17d1d442c1117fea1c7b00c9a540bb19c5761e9b6d604a41a8f04e63587,2024-06-14T20:24:11.583000
CVE-2024-36153,0,0,be018d6c55dd07a0c43269a2cd46026242dcb7f5c1f371b18607147d4266e45f,2024-06-14T20:23:55.123000
CVE-2024-36154,0,0,ecc92acc0364991bb27201e6b6880894b441f3b1d4b105a2d13f15a459d12a88,2024-06-14T20:22:51.417000
CVE-2024-36155,0,0,aa363b6977ad1da890fd3f620abba0d8bd43c1b9d45aa68d97f6170e3c605e53,2024-06-14T20:22:10.083000
CVE-2024-36156,0,0,418159e782db44464a7fa9c666c47e0bff1a8a909556a087a33d214fc3a82e0c,2024-06-14T20:16:45.100000
CVE-2024-36157,0,0,f08d5d738bbe04c53a0c08d150e28f18914b4d6805699aba87879c6ec4901930,2024-06-13T18:35:19.777000
CVE-2024-36157,0,1,5ee34270f170da999250ee3c74fa69534e6f9a649c8786c52d8d7c8ab2073905,2024-06-17T20:33:10.487000
CVE-2024-36158,0,0,d1230588f87be144a5bf73c1168707ed47e28d0702d38be75433c9ce98fa63ca,2024-06-14T20:34:20.073000
CVE-2024-36159,0,0,6f61c8adccf8d03cd89027237f3e67a9d358e7c582e9e814c760237db36746f1,2024-06-14T20:34:06.343000
CVE-2024-3616,0,0,fa923bb782491bedace8c69025507521f5c59d484dc600b1701535fa0da7acd3,2024-05-17T02:40:01.827000
CVE-2024-36160,0,0,17fd8d63e97b207e5aff7e3e668d6bcef5834f457a97078316ae8bb9bf1d4575,2024-06-14T20:33:57.040000
CVE-2024-36161,0,0,9884a64367104c734adb0953b296c8404da830f2c5510c8e40dcd82fcaa841df,2024-06-14T20:33:46.227000
CVE-2024-36162,0,0,392e6d9c603b43b1c9eb59c0f484a66be936b68eb22bc1b540f11ffbd3063af3,2024-06-14T20:33:18.287000
CVE-2024-36163,0,0,5e46503b5d8f1b7c32c59130646e3f9d66f5fa0e435b048cce3490f0141e6e8d,2024-06-13T18:35:19.777000
CVE-2024-36164,0,0,f24c589d857b5e5a2b9d4256791e32b4fa7cdbb2ce305a445e9a9ffe9d1fd80a,2024-06-13T18:35:19.777000
CVE-2024-36165,0,1,eed1ba919ba899785005f5312eff29d764f2585157603e023819a2df39c2ec7e,2024-06-17T19:38:08.973000
CVE-2024-36166,0,1,060ccda354064e2490c0e77e3b3c596578f9ffa6d5181a1e60537e699f9643e4,2024-06-17T19:38:19.783000
CVE-2024-36167,0,1,e005f8263e9f112763d854142f00274e989ddef0f13ef360174ce64e69ba5e59,2024-06-17T19:38:29.453000
CVE-2024-36163,0,1,020e330c88d24831e1e53ab7b01466c2ab94e854ff9db94baebe838ee4531238,2024-06-17T20:33:01.803000
CVE-2024-36164,0,1,0aaf6d17f2a069f647fdae436085041cce74f0e7d8a176f91fbf85f477575770,2024-06-17T20:32:51.417000
CVE-2024-36165,0,0,eed1ba919ba899785005f5312eff29d764f2585157603e023819a2df39c2ec7e,2024-06-17T19:38:08.973000
CVE-2024-36166,0,0,060ccda354064e2490c0e77e3b3c596578f9ffa6d5181a1e60537e699f9643e4,2024-06-17T19:38:19.783000
CVE-2024-36167,0,0,e005f8263e9f112763d854142f00274e989ddef0f13ef360174ce64e69ba5e59,2024-06-17T19:38:29.453000
CVE-2024-36168,0,0,d9e1fe51c8fbe7a0c171ea17ef6138e97ecfb927ae9efba2a521f5e73a1c2fa9,2024-06-17T17:08:50.037000
CVE-2024-36169,0,0,a58aca443e054709df42bac621b16e63f601fbd9af04f2e770fa783666f8bbc2,2024-06-17T17:04:09.503000
CVE-2024-3617,0,0,f567fe2d001aaca41d03c0a0366ef1e99b32bc6e27d43d00554123f9bc28d775,2024-06-04T19:20:22.087000
@ -252243,68 +252246,68 @@ CVE-2024-36178,0,0,8dcb946dfee7b963619ba7ba0e6a46a3dd96080f30f83f4807f7834e38fd2
CVE-2024-36179,0,0,118021cd24c6285797e8cd3829754e899301c1729807e50ed7aafcb1d134d848,2024-06-17T16:24:58.080000
CVE-2024-3618,0,0,49acf1181a6848a16665fb73aec3d174ce097deba0c0b38747c9b85c5bffb2db,2024-06-04T19:20:22.213000
CVE-2024-36180,0,0,33f0fbd8ed8da11dcc141ccb70d1a4c1ffe93db624930c800eda80f920d5effc,2024-06-17T16:24:39.483000
CVE-2024-36181,0,1,b25adc5fb8428c04946dc735dd26138aa798b914d2f6d21938070300dcd79553,2024-06-17T19:50:13.523000
CVE-2024-36182,0,1,30104f16b7d8be6088012e5fe7b96486f044fe242cb0407c6c5c9c8799a3f0fd,2024-06-17T19:36:00.387000
CVE-2024-36183,0,1,28363d66843c750b13d124e7278cb70f3b5989728785a6ec3cca95f972e56c82,2024-06-17T19:49:53.943000
CVE-2024-36184,0,1,e50341690a3e7998dbe8821bd2ca41fda077846bc55664a7af784dd1e91b6bae,2024-06-17T19:49:42.257000
CVE-2024-36181,0,0,b25adc5fb8428c04946dc735dd26138aa798b914d2f6d21938070300dcd79553,2024-06-17T19:50:13.523000
CVE-2024-36182,0,0,30104f16b7d8be6088012e5fe7b96486f044fe242cb0407c6c5c9c8799a3f0fd,2024-06-17T19:36:00.387000
CVE-2024-36183,0,0,28363d66843c750b13d124e7278cb70f3b5989728785a6ec3cca95f972e56c82,2024-06-17T19:49:53.943000
CVE-2024-36184,0,0,e50341690a3e7998dbe8821bd2ca41fda077846bc55664a7af784dd1e91b6bae,2024-06-17T19:49:42.257000
CVE-2024-36185,0,0,49b47a11e53b4dee718dabc2e1f0a06114ce49b2284b50acf0c2178814eef42c,2024-06-17T17:45:26.877000
CVE-2024-36186,0,0,ff6dc51cf8bbb78a7249b14b3bf1da4bf203942ab188537cb35bc3d5d1088959,2024-06-17T17:44:46.093000
CVE-2024-36187,0,0,22ece855690dce9348d2203aa872cc428d44e30d9de97df4eca43d487706dbdc,2024-06-17T17:40:33.583000
CVE-2024-36188,0,0,0bec449cf01af5399cea99298ffcfc02e2e48310698ba7c78ddb8491b430eab0,2024-06-17T17:34:55.847000
CVE-2024-36189,0,0,05b4c9026773415c49a51c07f2f0c992c1049b3f3d114f94fdda2f499829580e,2024-06-17T17:09:25.477000
CVE-2024-3619,0,0,165314f79e4f722f622203e47502b9381ecf302926cb9ad2cdc2988542678367,2024-05-17T02:40:02.103000
CVE-2024-36190,0,1,f102d3248dea23ff17c2f1af127d93c77fab80b1a59af4dc7864259b2cfd12f4,2024-06-17T19:49:13.337000
CVE-2024-36191,0,1,fe85c58b74cc97ce1e65b01374bb18e75a855e09e5b666b0ba4b35767b44f447,2024-06-17T19:06:28.207000
CVE-2024-36192,0,1,45378a68a4d9289d7ad56c121aee6e8dcf0e78cf5ec1ba10c5f18d8bb70e5b6f,2024-06-17T19:01:16.820000
CVE-2024-36193,0,1,e8bca4f25cc69c70749d579f0d7b91522abf8ce96c88ed7539372a4f8d0fc3fe,2024-06-17T18:57:12.537000
CVE-2024-36194,0,1,746e7ad33fdcd7716caf7b1566199913629281052465454c19567c0420565f36,2024-06-17T18:56:57.933000
CVE-2024-36195,0,1,8b82a04f66d75c39da71f704b3c4dc9196ab6e487165fc9dd951f356d9cd01e3,2024-06-17T18:56:48.090000
CVE-2024-36196,0,1,f0d9cccd8dd511c63bd40a41d40c052123a1f7d18ff036da12edeecd5e16686c,2024-06-17T18:56:33.480000
CVE-2024-36197,0,1,c50c78c6e8e5d6d63c9c4281068fbab3d5c028be55a3c1849ff121b49e8189ae,2024-06-17T19:48:57.047000
CVE-2024-36198,0,1,0d9c29bc137953462a5eb222099f437d69e24443e59705a9d753655f95a921a6,2024-06-17T18:56:20.607000
CVE-2024-36199,0,1,1b859104c5816ed1e6e90edef1833f0ee83575bbcd8a6c5f81d0159954f181ed,2024-06-17T18:56:07.053000
CVE-2024-36190,0,0,f102d3248dea23ff17c2f1af127d93c77fab80b1a59af4dc7864259b2cfd12f4,2024-06-17T19:49:13.337000
CVE-2024-36191,0,0,fe85c58b74cc97ce1e65b01374bb18e75a855e09e5b666b0ba4b35767b44f447,2024-06-17T19:06:28.207000
CVE-2024-36192,0,0,45378a68a4d9289d7ad56c121aee6e8dcf0e78cf5ec1ba10c5f18d8bb70e5b6f,2024-06-17T19:01:16.820000
CVE-2024-36193,0,0,e8bca4f25cc69c70749d579f0d7b91522abf8ce96c88ed7539372a4f8d0fc3fe,2024-06-17T18:57:12.537000
CVE-2024-36194,0,0,746e7ad33fdcd7716caf7b1566199913629281052465454c19567c0420565f36,2024-06-17T18:56:57.933000
CVE-2024-36195,0,0,8b82a04f66d75c39da71f704b3c4dc9196ab6e487165fc9dd951f356d9cd01e3,2024-06-17T18:56:48.090000
CVE-2024-36196,0,0,f0d9cccd8dd511c63bd40a41d40c052123a1f7d18ff036da12edeecd5e16686c,2024-06-17T18:56:33.480000
CVE-2024-36197,0,0,c50c78c6e8e5d6d63c9c4281068fbab3d5c028be55a3c1849ff121b49e8189ae,2024-06-17T19:48:57.047000
CVE-2024-36198,0,0,0d9c29bc137953462a5eb222099f437d69e24443e59705a9d753655f95a921a6,2024-06-17T18:56:20.607000
CVE-2024-36199,0,0,1b859104c5816ed1e6e90edef1833f0ee83575bbcd8a6c5f81d0159954f181ed,2024-06-17T18:56:07.053000
CVE-2024-3620,0,0,1df23a75dfa243d45dccfaf93a6d2abcd8205c1c1c6930bdb57d4f40b6f4c71f,2024-06-04T19:20:22.317000
CVE-2024-36200,0,1,ba51adf20b4158c68b5efdcb4267da858e066a19fd243ce67c4bb1a89b50150e,2024-06-17T18:55:53.703000
CVE-2024-36201,0,1,4b10353c471272c3c9b752b5eda1fe2e8b3cac69d46f7babdbf7f5cf0a7de83d,2024-06-17T18:55:34.580000
CVE-2024-36202,0,1,1ec8aa1cd75c69b6f68702c72cd5e0f86360ef843210f88dc82f3163650efd5c,2024-06-17T18:55:21.577000
CVE-2024-36203,0,1,1cd86fd0b6e4aab3ff6325c4b1653c1ba7ed49d0b1d7e7f58c66e5fb5000af55,2024-06-17T19:23:59.480000
CVE-2024-36204,0,1,9cc70bae1dd03ac6434c29c2277c27007d99686a8c8cc70166765b61748e966a,2024-06-17T19:23:45.870000
CVE-2024-36205,0,1,7c0cda3b04bbafcc01234b2bb01ab1ceb07fa3909a0e0c4ab23a3419a8a29cbe,2024-06-17T19:23:22.583000
CVE-2024-36206,0,1,3cea8e74002f9a30a97fe0c76f64fd66fbbe7a9ae97308068e460c74d0ec5ccc,2024-06-17T19:23:04.890000
CVE-2024-36207,0,1,ed22eccaa0cf7c8241053e2bb61f588fecfc05bd5b5b383f300d716e384ebabf,2024-06-17T19:22:41.023000
CVE-2024-36208,0,1,252425d2e22cb2dcb6d497267af45df418409b9dbb97b0a7027795208858d323,2024-06-17T19:22:29.990000
CVE-2024-36209,0,1,94840f37d7c7dd27d7c8849dd943c251dd21254fc62356ad09274d8d1e7c25c8,2024-06-17T19:22:21.057000
CVE-2024-36200,0,0,ba51adf20b4158c68b5efdcb4267da858e066a19fd243ce67c4bb1a89b50150e,2024-06-17T18:55:53.703000
CVE-2024-36201,0,0,4b10353c471272c3c9b752b5eda1fe2e8b3cac69d46f7babdbf7f5cf0a7de83d,2024-06-17T18:55:34.580000
CVE-2024-36202,0,0,1ec8aa1cd75c69b6f68702c72cd5e0f86360ef843210f88dc82f3163650efd5c,2024-06-17T18:55:21.577000
CVE-2024-36203,0,0,1cd86fd0b6e4aab3ff6325c4b1653c1ba7ed49d0b1d7e7f58c66e5fb5000af55,2024-06-17T19:23:59.480000
CVE-2024-36204,0,0,9cc70bae1dd03ac6434c29c2277c27007d99686a8c8cc70166765b61748e966a,2024-06-17T19:23:45.870000
CVE-2024-36205,0,0,7c0cda3b04bbafcc01234b2bb01ab1ceb07fa3909a0e0c4ab23a3419a8a29cbe,2024-06-17T19:23:22.583000
CVE-2024-36206,0,0,3cea8e74002f9a30a97fe0c76f64fd66fbbe7a9ae97308068e460c74d0ec5ccc,2024-06-17T19:23:04.890000
CVE-2024-36207,0,0,ed22eccaa0cf7c8241053e2bb61f588fecfc05bd5b5b383f300d716e384ebabf,2024-06-17T19:22:41.023000
CVE-2024-36208,0,0,252425d2e22cb2dcb6d497267af45df418409b9dbb97b0a7027795208858d323,2024-06-17T19:22:29.990000
CVE-2024-36209,0,0,94840f37d7c7dd27d7c8849dd943c251dd21254fc62356ad09274d8d1e7c25c8,2024-06-17T19:22:21.057000
CVE-2024-3621,0,0,3204ec8fd9c2678ba71c374fd9b3e44813b4dc6ba5c30c2d3c2f5f44c3098c61,2024-05-17T02:40:02.290000
CVE-2024-36210,0,1,17040d4d7950d9e36a83a5eb4c4e5c4bcb16cbf33e9de87fa3efabca07710cdd,2024-06-17T19:22:07.157000
CVE-2024-36211,0,1,f922a627e23eb178e020fe41f9139a21eff9ca37a7f987126f1365e053257b67,2024-06-17T19:21:53.777000
CVE-2024-36212,0,1,c75b3e5da223f38dd425e911d368fa69a7a47f2a07eb6db31accb3e0c8cfeeba,2024-06-17T19:21:43.703000
CVE-2024-36213,0,1,59e16fb535d46710ac714874d7837c453b885e7c6e33483485e717e774d8fda2,2024-06-17T19:09:24.977000
CVE-2024-36214,0,1,36f36a8528ad94584591b17fbeb9eab1b715b27066a5620f5304158fd1a9c25d,2024-06-17T19:35:49.083000
CVE-2024-36215,0,1,de4859556ceb90bfc1859050c4dfb29e68a8ee5977c192482751432f8b122841,2024-06-17T19:33:11.697000
CVE-2024-36216,0,1,a0032a650a0d532fc6a4de76ae7cf7172dfeb639074d0b6884203d5f27c5df50,2024-06-17T19:42:09.377000
CVE-2024-36217,0,1,9c4bf583e2236f456d5fa634c4a935863bb71d6b4d7336d1c28afc52f096d2f4,2024-06-17T19:33:01.643000
CVE-2024-36218,0,1,fae8eda30a3c40d9dbf03cc0c0067ca0c999dc54662a4af35d391a8bd51adae6,2024-06-17T19:32:51.723000
CVE-2024-36219,0,1,42f49034b08f79f884ad088fe3528181533a38f85304259f704167900c9527c3,2024-06-17T19:32:42.640000
CVE-2024-36210,0,0,17040d4d7950d9e36a83a5eb4c4e5c4bcb16cbf33e9de87fa3efabca07710cdd,2024-06-17T19:22:07.157000
CVE-2024-36211,0,0,f922a627e23eb178e020fe41f9139a21eff9ca37a7f987126f1365e053257b67,2024-06-17T19:21:53.777000
CVE-2024-36212,0,0,c75b3e5da223f38dd425e911d368fa69a7a47f2a07eb6db31accb3e0c8cfeeba,2024-06-17T19:21:43.703000
CVE-2024-36213,0,0,59e16fb535d46710ac714874d7837c453b885e7c6e33483485e717e774d8fda2,2024-06-17T19:09:24.977000
CVE-2024-36214,0,0,36f36a8528ad94584591b17fbeb9eab1b715b27066a5620f5304158fd1a9c25d,2024-06-17T19:35:49.083000
CVE-2024-36215,0,0,de4859556ceb90bfc1859050c4dfb29e68a8ee5977c192482751432f8b122841,2024-06-17T19:33:11.697000
CVE-2024-36216,0,0,a0032a650a0d532fc6a4de76ae7cf7172dfeb639074d0b6884203d5f27c5df50,2024-06-17T19:42:09.377000
CVE-2024-36217,0,0,9c4bf583e2236f456d5fa634c4a935863bb71d6b4d7336d1c28afc52f096d2f4,2024-06-17T19:33:01.643000
CVE-2024-36218,0,0,fae8eda30a3c40d9dbf03cc0c0067ca0c999dc54662a4af35d391a8bd51adae6,2024-06-17T19:32:51.723000
CVE-2024-36219,0,0,42f49034b08f79f884ad088fe3528181533a38f85304259f704167900c9527c3,2024-06-17T19:32:42.640000
CVE-2024-3622,0,0,8a36012169667d948c0b90aa74b5439b232e5ac011c2df4d1ba7f1e8b3410d38,2024-04-26T12:58:17.720000
CVE-2024-36220,0,1,24c655ce3f0526042bfd67880dc41106cdfb5f98dde6971f64873ae1cdc82ba8,2024-06-17T19:48:35.573000
CVE-2024-36221,0,1,2c46cdd47e910a4fc18e0dd65366030bdc1eb4d14ec50fb4c46fb03d63f1288e,2024-06-17T19:48:20.473000
CVE-2024-36222,0,1,a8ee0e561dcb5bfbba224cb0539031d96c298ae7a136bc37d3ec9a0970e67bf5,2024-06-17T19:45:39.257000
CVE-2024-36224,0,1,5c74dec5f032580ca9e70dab38c4d47b808d869c78d9a9688f6eb49fd80615a0,2024-06-17T19:45:13.547000
CVE-2024-36225,0,1,fd495a92f56159f6c10cf6177a32831d7edff99b61db5bcc3c4fb3be2c44c3a1,2024-06-17T19:37:58.810000
CVE-2024-36220,0,0,24c655ce3f0526042bfd67880dc41106cdfb5f98dde6971f64873ae1cdc82ba8,2024-06-17T19:48:35.573000
CVE-2024-36221,0,0,2c46cdd47e910a4fc18e0dd65366030bdc1eb4d14ec50fb4c46fb03d63f1288e,2024-06-17T19:48:20.473000
CVE-2024-36222,0,0,a8ee0e561dcb5bfbba224cb0539031d96c298ae7a136bc37d3ec9a0970e67bf5,2024-06-17T19:45:39.257000
CVE-2024-36224,0,0,5c74dec5f032580ca9e70dab38c4d47b808d869c78d9a9688f6eb49fd80615a0,2024-06-17T19:45:13.547000
CVE-2024-36225,0,0,fd495a92f56159f6c10cf6177a32831d7edff99b61db5bcc3c4fb3be2c44c3a1,2024-06-17T19:37:58.810000
CVE-2024-36226,0,0,63c695833cfbf502974ddfcb1fc7381dd367553339b0d43ddd7cfc9350f4fc2c,2024-06-13T18:35:19.777000
CVE-2024-36227,0,0,4f9708c3e190c903e17a59c6a290567f989ac01fce90e87a2c00ee28ec01c013,2024-06-13T18:35:19.777000
CVE-2024-36228,0,0,b27204a0ec7d2e55ed95db2e3835454fae2ce9d3fe4668e0d18cc12694c7d39c,2024-06-13T18:35:19.777000
CVE-2024-36229,0,0,7ba720ab8600cdae47ab2dee552d75b23243a9a50066b699a976ff9b1225b75f,2024-06-13T18:35:19.777000
CVE-2024-36227,0,1,0727e710473b979985d78ae6dfdcf5bbfe49764851873d8fa20d40ec22a1b513,2024-06-17T20:12:46.843000
CVE-2024-36228,0,1,65510ba3cdacba606cb5a9fef50b70f0ee46d90d949d966d3d92c163b9b3873c,2024-06-17T20:12:35.727000
CVE-2024-36229,0,1,a39557b42f1caf4ea230e4d2a203d0da66fd7040dc63c4022fbe68826330238b,2024-06-17T20:12:20.760000
CVE-2024-3623,0,0,9044a03f32811b426f24d5347da98fbfdb67f97317f2e90baed487a2da0b464c,2024-04-26T12:58:17.720000
CVE-2024-36230,0,0,5c02798fd006be44a457f690229bdebc32d9d963ab482182bed6b100663fd10a,2024-06-13T18:35:19.777000
CVE-2024-36231,0,1,b5045756b30dee287424d6013535cd996cf26bd55406c0e6e1bfd4736b6abb98,2024-06-17T19:52:06.717000
CVE-2024-36232,0,1,a9c5138f5604d517108f300a12cde735a99ec64851c8a5b1080310f3d5b9ab49,2024-06-17T19:51:25.503000
CVE-2024-36233,0,0,627bd0904e137fe695666d197191485332a263290dfe45603e50f25003653152,2024-06-13T18:35:19.777000
CVE-2024-36234,0,0,645070bd989f5473e299da1272d252c4395fa62de0b3b9e3c6caa9b2dc88738e,2024-06-13T18:35:19.777000
CVE-2024-36235,0,0,2f797f9105c486e0a04f74b29529501e36b59dfee3beab0a343db507b136826b,2024-06-13T18:35:19.777000
CVE-2024-36236,0,0,3a002e74ef508cb5555965a013309d3b98e493c0d5fae1e32bac535ec6e14d37,2024-06-13T18:35:19.777000
CVE-2024-36238,0,0,70b496607c219882334a508a7bd158262b78c989b07b14baa0147122f00639a9,2024-06-13T18:35:19.777000
CVE-2024-36239,0,0,0b86a08b70b01be8f14e01cf93e7b03dd68a3098f4c75d265dea229f09747af8,2024-06-13T18:35:19.777000
CVE-2024-36230,0,1,aa414f1426a9d820e35ae320027a2fc4011d04e607813471f3b83e4c9ebd3504,2024-06-17T20:10:31.787000
CVE-2024-36231,0,0,b5045756b30dee287424d6013535cd996cf26bd55406c0e6e1bfd4736b6abb98,2024-06-17T19:52:06.717000
CVE-2024-36232,0,0,a9c5138f5604d517108f300a12cde735a99ec64851c8a5b1080310f3d5b9ab49,2024-06-17T19:51:25.503000
CVE-2024-36233,0,1,732c88b6cee847e47e26b6b99980d7c1d5a1a43a5aa16642cba41b400eced29c,2024-06-17T20:22:07.620000
CVE-2024-36234,0,1,ae2cb1680cf3fb386acb30838df8f1b2e0c131e828b22265fd58920068d21e3a,2024-06-17T20:21:54.507000
CVE-2024-36235,0,1,c6e86c364f13c6bee1702edf1300165ba53b50b8332d218012547aa96229aa1f,2024-06-17T20:21:30.017000
CVE-2024-36236,0,1,e20b7adefa1c6431e2ddfad6dfc0a2212483136677373d3d809c1b5610837d84,2024-06-17T20:21:20.523000
CVE-2024-36238,0,1,ffa224703ea5d14f14feaac4631f2136ef89cf6e78b5508e4db40614bf827e92,2024-06-17T20:20:28.453000
CVE-2024-36239,0,1,f9d1b173110a422fa1162cdcd582db2bdb2808a4f7edf9f4c130505223b94463,2024-06-17T20:20:18.633000
CVE-2024-3624,0,0,e0ac19607b4c8d1214127703973418b820b7283270ffca198194137ef8f4191a,2024-04-26T12:58:17.720000
CVE-2024-36241,0,0,ec13df73bdae0daae51b14875ab9159491333aae8ecd7b32e3b3849163ae270e,2024-05-28T12:39:28.377000
CVE-2024-36246,0,0,50338f85842e71924c1397e2b0a309f647146226696bf59a5411ba0e6e468e33,2024-05-31T13:01:46.727000
@ -252409,11 +252412,11 @@ CVE-2024-36502,0,0,af0ea55ba6dbd08cf23c5f8732d2aeb0cf79fdfab13bdf5e07cadc4434254
CVE-2024-36503,0,0,3aef981902bcd0cfa43896ed1ada7c9ec64d59690838f1ba35c268bf26e5218a,2024-06-17T12:42:04.623000
CVE-2024-3652,0,0,455dabb71414a7592172807b25da69c5818ecc78456d9f87c63904d4c0988a33,2024-05-01T17:15:37.793000
CVE-2024-36523,0,0,779ff20f3e54c54b68fa38cf8a73a6874fca821f18024ef38fb974b398395dd0,2024-06-13T18:36:09.010000
CVE-2024-36527,1,1,2b0ce26462ddf4094a9f42ea54b908cbb2586dcbcfee6531e1c43b55113e0148,2024-06-17T18:15:16.767000
CVE-2024-36527,0,0,2b0ce26462ddf4094a9f42ea54b908cbb2586dcbcfee6531e1c43b55113e0148,2024-06-17T18:15:16.767000
CVE-2024-36528,0,0,f25edd031c479e2eb08ab34031d71804f3bb9f2a7bd4f1a1d0b25d391d002135,2024-06-10T18:06:22.600000
CVE-2024-36531,0,0,991b1a5a568679e84b92f85516ddb5ed86f9e4a97046e45c71aa818ce6df4847,2024-06-10T18:06:22.600000
CVE-2024-3654,0,0,954800a828ed246c147def14a6599156bd18a3e2cc72072dd62b0ab02b4bbf53,2024-04-19T16:19:49.043000
CVE-2024-36543,1,1,d296ac07647444738f564112c0fbd0f6cdc70c839f2aad61af43a607bcbd5052,2024-06-17T19:15:58.353000
CVE-2024-36543,0,0,d296ac07647444738f564112c0fbd0f6cdc70c839f2aad61af43a607bcbd5052,2024-06-17T19:15:58.353000
CVE-2024-36547,0,0,6660ddee6e567c7988e43d4b24008e0896770307b9894b7b829c762e8a195005,2024-06-06T15:16:11.897000
CVE-2024-36548,0,0,9d28d8e8972db5bd27a8a65faaafcca56f3bdf2175ddc670e3a757d6c577d105,2024-06-06T15:24:02.577000
CVE-2024-36549,0,0,ede738893685493385854bf4f5b6680c7d976cf01bd2e0f64b85833020e8a996,2024-06-06T15:24:35.210000
@ -252502,10 +252505,10 @@ CVE-2024-36801,0,0,848abb34bc225b988b494ddeb65181be8a5b6f82df4ba5b51418160f74bd0
CVE-2024-3681,0,0,4cc6e1e77320458af0f4beee59a38c9a663fe20b962b28f234c099bc7c23ab32,2024-05-02T18:00:37.360000
CVE-2024-36811,0,0,6e0af3c6c3cf0f68333eeeac219e850c0e24dcad6b3b12a43292843727697674,2024-06-07T19:24:09.243000
CVE-2024-3682,0,0,a140f5eb71acf183c1e80e0d2f5a14a5c7d8a92c7cf9dd3ea5250a20e3cb490f,2024-04-26T12:58:17.720000
CVE-2024-36821,0,0,0898d269a518e18a8dcb290f19d3c39b2b845cc3408e89c8516b0661547161a8,2024-06-13T18:36:09.013000
CVE-2024-36821,0,1,592e31c2ea7119b4c103b5ca67eefeb91773768141e1fc0daf62c86176d3afa7,2024-06-17T21:15:50.960000
CVE-2024-36823,0,0,aad699347c3b05ee3cd9abd97cd2dd91acd777507ac0def145495f15e3829674,2024-06-07T14:56:05.647000
CVE-2024-36827,0,0,122a045e95fe548424707b69a5d81cb1d2970259814d1c03f8e1b4b2c344d0e6,2024-06-07T19:24:09.243000
CVE-2024-36837,0,0,972fcfe447bcc1dac89631cb411f52c2cea2adda8f01d3d7987f0c2ce62998db,2024-06-06T14:17:35.017000
CVE-2024-36837,0,1,e9493bedfd0182d3768ff4bc8ddf5689156e492e348ca68464dbbef9dbf375ce,2024-06-17T21:15:51.050000
CVE-2024-3684,0,0,e7edf7d6bce31b480b46d692afd4304c988268ba4618e87da8566dc118f2be92,2024-04-19T16:19:49.043000
CVE-2024-36840,0,0,4a6f09cefc62787a0fbedba2a44163b90d3503531e692316cb82598d8c83950c,2024-06-13T18:36:09.010000
CVE-2024-36843,0,0,dffd8a9db459cea7141db065370811228354e9ed0a00ef7accb6e04cac03982c,2024-06-03T14:46:24.250000
@ -252618,7 +252621,7 @@ CVE-2024-3697,0,0,600d9314ffac8217c56b5ddb9a6dd8f383edc3a52ae15aefe26cd04d9d92b6
CVE-2024-36970,0,0,7821872f33932cd23581e3f08933e1120512f95b8bffb9a221042f6e182c4c03,2024-06-10T02:52:08.267000
CVE-2024-36971,0,0,7baf68ba8d6177e5c800107eb44bfd99f2323f2978ed8bf3a29a9bc948d8cb2e,2024-06-16T13:15:52.820000
CVE-2024-36972,0,0,c8949e99c51cdd06e16d761976785fb3e8ba887f5070dbd12308139f2998e944,2024-06-16T13:15:52.947000
CVE-2024-36973,1,1,aaf9d958c8593ac07f0f724040e3aeb13ad0df1753e4f68e9b0d677119862905,2024-06-17T18:15:17.043000
CVE-2024-36973,0,0,aaf9d958c8593ac07f0f724040e3aeb13ad0df1753e4f68e9b0d677119862905,2024-06-17T18:15:17.043000
CVE-2024-3698,0,0,13b4029eb6179dbe788598788e16556a1995d850ddfc4af1ee0c4e86961a3a21,2024-05-17T02:40:04.800000
CVE-2024-3699,0,0,6e64dedcb1ec83e842b9c3ed18b374381a62ef4f7982a43d9405eeb95e55d0fc,2024-06-12T17:53:09.130000
CVE-2024-3700,0,0,f1913b84964a9a87ca4f78bbad55a262819a35385e2c066c91eaa7c4a1891262,2024-06-12T17:51:52.710000
@ -252708,6 +252711,7 @@ CVE-2024-3730,0,0,a30960de1676c855ee35b61976bc4581959cd1a98a7ba3127a461fb7fc9551
CVE-2024-37300,0,0,7a8b0144b5518f42a2503b23de88b2ac1dd643d024476f6cf726712d7722e352,2024-06-13T18:36:09.010000
CVE-2024-37301,0,0,450b2bcc32537519af2d171a1a4f4dec398481df24494eefa7c4bfacafd1cdd4,2024-06-13T18:36:09.013000
CVE-2024-37304,0,0,58f0056f03946090c8e002d0e9ba0984fa448eb3acaa7f846a712c694162376b,2024-06-13T18:36:09.010000
CVE-2024-37305,1,1,756a91f02283d9df256d9a54b14b0910f6d0e8069b80da21c581159e3dda387e,2024-06-17T20:15:12.880000
CVE-2024-37306,0,0,c42be228ed7af3d19c55f98cc69863314df6372a103fb19662ff1ada5ea07223,2024-06-13T18:35:19.777000
CVE-2024-37307,0,0,307a9077f465a844bb3929ae05a1dcebcb701d8b2ae344b6539171566dfccac0,2024-06-13T18:35:19.777000
CVE-2024-37308,0,0,789ac1ee79bf50a380c8842b793e1f03cbcea96755a8db8c09ad817d1922f353,2024-06-13T18:35:19.777000
@ -252789,10 +252793,10 @@ CVE-2024-37644,0,0,5f7f97e28e218e3fb348230aa8347ee3b0354d72853f4d6c2591e151f0231
CVE-2024-37645,0,0,1f2d6a8f87fac13d3d11d6cbec3b695ad44ed6f32f14768d5b077122546347a3,2024-06-17T12:42:04.623000
CVE-2024-3765,0,0,4fdba2eb80818b350bc57cc64ca06a70a8e5d2cec5cc9e99a6b5fff1df632742,2024-05-17T02:40:06.923000
CVE-2024-3766,0,0,539824cbdfccc4276f1fd794b326f898c89140cb76877e5ae113fb2f5031330d,2024-05-17T02:40:07.027000
CVE-2024-37661,1,1,8bc6987d1055de55d8b7876bf221b6ce9ec043a5b4bf1c22473fe955a3ac5ac2,2024-06-17T18:15:17.463000
CVE-2024-37662,1,1,4ba16f654108e1192bd8fb8e8e02e50d6a91573173d812e9064b0a305d10e19b,2024-06-17T18:15:17.560000
CVE-2024-37663,1,1,c85121604649b2156315c207a5ca6621b999521337716b02c686139e1ebe6456,2024-06-17T18:15:17.653000
CVE-2024-37664,1,1,b106b1d8d5f840cb17425c36d7f75fda90045b9146be03e27cd1d2e215bc155f,2024-06-17T18:15:17.743000
CVE-2024-37661,0,0,8bc6987d1055de55d8b7876bf221b6ce9ec043a5b4bf1c22473fe955a3ac5ac2,2024-06-17T18:15:17.463000
CVE-2024-37662,0,0,4ba16f654108e1192bd8fb8e8e02e50d6a91573173d812e9064b0a305d10e19b,2024-06-17T18:15:17.560000
CVE-2024-37663,0,0,c85121604649b2156315c207a5ca6621b999521337716b02c686139e1ebe6456,2024-06-17T18:15:17.653000
CVE-2024-37664,0,0,b106b1d8d5f840cb17425c36d7f75fda90045b9146be03e27cd1d2e215bc155f,2024-06-17T18:15:17.743000
CVE-2024-37665,0,0,65120387c81349907f7a4a053373f743b497b218da3e8528d2288dae639dbb17,2024-06-13T18:36:09.010000
CVE-2024-3767,0,0,8ba3fcd8961d67ee2d120eabc736772a73aa38bca02250a44c8bb4877d64b7d4,2024-06-05T20:15:13.643000
CVE-2024-3768,0,0,778d3eea8bf87c1f80239f04628ed71cfd577dabb0ce88459344c4cd4d61bb16,2024-05-17T02:40:07.203000
@ -252805,15 +252809,17 @@ CVE-2024-3775,0,0,a79253f4f0c7633f40fa5e33903553d0137ff03b4a2d8425a028bb5ddf1c6b
CVE-2024-3776,0,0,55056178a3d988ca6f5c349416a81e65818f1f748e962aa89ca62657bc61cdbb,2024-04-15T13:15:31.997000
CVE-2024-3777,0,0,2d62b43478a2af7b370a2abe8fef4e62ecbb9b40c3be97e2e0fc1ef910b6e9d4,2024-04-15T13:15:31.997000
CVE-2024-3778,0,0,c2c38fcb38179fdb87f4043dc10c922f64da16bb588bfaf10dd1fb23e229fcc9,2024-04-15T13:15:31.997000
CVE-2024-37794,1,1,b0474f9a1e34d4ce4f5843135972ccb449b5684509f30c70025ad198d2cbac13,2024-06-17T18:15:17.853000
CVE-2024-37795,1,1,b55a1de597f46e87ebb5846214283b41513b4351794622c586104759dffc0de0,2024-06-17T18:15:17.953000
CVE-2024-37794,0,0,b0474f9a1e34d4ce4f5843135972ccb449b5684509f30c70025ad198d2cbac13,2024-06-17T18:15:17.853000
CVE-2024-37795,0,0,b55a1de597f46e87ebb5846214283b41513b4351794622c586104759dffc0de0,2024-06-17T18:15:17.953000
CVE-2024-37798,1,1,d647646e0be03e8cb80db3b744ccd6eb5c597c1119aa65d17a2032b22c4f2175,2024-06-17T21:15:51.180000
CVE-2024-3780,0,0,d5287c65230cff026fcb8162b9ad15d2c7a6ec9085a2f226aaf7f4b5c5cee424,2024-04-15T13:15:31.997000
CVE-2024-3781,0,0,bf710215509c2fb5fefd67fb85930537c2ce3a67160738297841ece3c75d6fc6,2024-04-15T19:12:25.887000
CVE-2024-3782,0,0,c95ea596dccb3636dd3691321b5a7a48aa3ee2b08cd07f6f17f6b9ebb6c70325,2024-04-15T19:12:25.887000
CVE-2024-37828,1,1,088eef7d3d9d5b4384684055d9dd088b2ead6321f489994eca7630f1ebe32ff9,2024-06-17T21:15:51.280000
CVE-2024-3783,0,0,f916980cd1e532a7d588efc898e3b89c6684234f9d5fc7d911dee2ee73ce3295,2024-04-15T19:12:25.887000
CVE-2024-37831,0,0,5e7eb1d81cbc03e5a6cb7a0c776550184a7e580655a65f67804199e93112edb2,2024-06-17T12:42:04.623000
CVE-2024-3784,0,0,c3548262a5dd94ab612636409a3bf8cd74017da9deb24debb2f77536fe274623,2024-04-15T19:12:25.887000
CVE-2024-37840,1,1,8453d99efeccde0568a082a5c426e56d812bc51b13eebf910ea641df056335c3,2024-06-17T19:15:58.470000
CVE-2024-37840,0,0,8453d99efeccde0568a082a5c426e56d812bc51b13eebf910ea641df056335c3,2024-06-17T19:15:58.470000
CVE-2024-37848,0,0,88fe14869b9db882d345d58a87ca35c6cced9fdb08d49352f54bce8a27f6744a,2024-06-17T14:15:11.890000
CVE-2024-37849,0,0,1c3bd85b42f72006ddc00210dee95fa2aec60a18f1d79fbfdd90f35c19fff4ef,2024-06-13T18:35:19.777000
CVE-2024-3785,0,0,fc93f2e321d044bf7a0ccc45f351722880d9f0bf94368b28b702ab59c5cb3144,2024-04-15T19:12:25.887000
@ -252832,7 +252838,13 @@ CVE-2024-37887,0,0,0467ece977566b214676eb0db2203ccad3333f72a527f3986a8c1fbfb2fc1
CVE-2024-37888,0,0,a9672782b19886e33249fc75bc18c4a8c4010f9132fe10364f8659932ef364bf,2024-06-17T12:42:04.623000
CVE-2024-37889,0,0,daa8873bf696328586ad7ac5c8ae18378b96ec85219f7a263344af70c2ad0bbd,2024-06-17T12:42:04.623000
CVE-2024-3789,0,0,63d455d46acf2815a86f3b9bf286e732f6c1d2d557d093772c64f0c37d315365,2024-05-14T16:11:39.510000
CVE-2024-37890,1,1,5a51aaf9ddba68dcc4fb851d8d8c2104191ec0f76492414a4202b6704653dbaa,2024-06-17T20:15:13.203000
CVE-2024-37891,1,1,1596db18091d20a666dec5f247a44722389e3ddb81693324abbe091c2732aef3,2024-06-17T20:15:13.450000
CVE-2024-37893,1,1,1776a40c4bb7f6b3a47eef65f2923177a81d35e324abf140661a4de06104507d,2024-06-17T20:15:13.700000
CVE-2024-37895,1,1,f41259f66b42700e5e06aae6e334284d38fc67ec67f409e007cedbe6b28f32e4,2024-06-17T20:15:13.970000
CVE-2024-37896,1,1,5112ee551bccf3f0184159c2912eb6d43ad52672ea31b9947c140c0e6a0ee36f,2024-06-17T20:15:14.213000
CVE-2024-3790,0,0,ea62135e66a6e7a74daddc8d443b8b9750f000d596c0e5f30e202f53e21ec40b,2024-05-14T16:11:39.510000
CVE-2024-37902,1,1,ac13ed252f83085121ab0ea73c36602edd534bb1985c378bf0890d4d70316b15,2024-06-17T20:15:14.463000
CVE-2024-3791,0,0,9bc6cec70e672f5f7f9ccdb1c0603c19b269c41965293930113b85d0de980142,2024-05-14T16:11:39.510000
CVE-2024-3792,0,0,cf023b5179bed164faad65630e21cc1d1811b19d16667a2b08c63260eab0a5be,2024-05-14T16:11:39.510000
CVE-2024-3793,0,0,ee3137e362c58246aa5051457614bdcb92cca84e4e50c79d141ea28f09937fab,2024-05-14T16:11:39.510000
@ -252898,7 +252910,7 @@ CVE-2024-38440,0,0,b919acbc92e9c9392e26fbdaceae56c4317599ffd0627bbda82f22f6097b7
CVE-2024-38441,0,0,bac1eab90c37fda11684866d06a4f57eec334e75a348551333a4b5d69541732d,2024-06-17T12:42:04.623000
CVE-2024-38443,0,0,1d75cfa177cf692b67a12f7bd5c673225dc4008379121d75b6d5d0686ab9a220,2024-06-17T12:42:04.623000
CVE-2024-38448,0,0,66ae408cb06bbe5b04615772f5468e0f5bb5c8f2d46df318fd238e60dfb550e8,2024-06-17T12:42:04.623000
CVE-2024-38449,1,1,bfe3d44cc91ccbcb53fd85e23fea8d11b89236c24e32b2201e2a397ac6ed1755,2024-06-17T19:15:58.567000
CVE-2024-38449,0,0,bfe3d44cc91ccbcb53fd85e23fea8d11b89236c24e32b2201e2a397ac6ed1755,2024-06-17T19:15:58.567000
CVE-2024-3845,0,0,0eb4004f99da1c2122444a8d1de5d3db39129e713bf386d7b60bb455af744c00,2024-05-03T03:16:29.210000
CVE-2024-38454,0,0,9e16cbeba5810d367094a131b56862641aa42d77b0ed4c90d4e4d7e92bb854dc,2024-06-17T12:42:04.623000
CVE-2024-38457,0,0,c77550a7e2a9252924a4646a20696a029639d1882dc30abb38808d48a175ba0c,2024-06-17T12:42:04.623000
@ -252942,7 +252954,7 @@ CVE-2024-3872,0,0,1b0df76ddcb9ce5edde75b1c572a6253db6bd37bbe91d1899bdf2bd4ba86a6
CVE-2024-3873,0,0,6d513ad90fbcf7cf9dc14bccfe49c3692f3f8e6afa6f4dd6471e0cb11781355f,2024-05-17T02:40:09.627000
CVE-2024-3874,0,0,0b044f7635c5f6b9eeb150631f42de7f29fc07a4ea0b0fc3596a05b97253f25a,2024-06-04T19:20:25.697000
CVE-2024-3875,0,0,d86045281a0b2a48da23b56cded5d23c73cf1b0cfc400db0bc7b27c6cb21977e,2024-06-04T19:20:25.807000
CVE-2024-3876,0,1,776837fb0cf9eeaf7d3ba120d8dcf4cad0f43e38d62b6ec13c079af103a4cf3c,2024-06-17T19:15:58.763000
CVE-2024-3876,0,0,776837fb0cf9eeaf7d3ba120d8dcf4cad0f43e38d62b6ec13c079af103a4cf3c,2024-06-17T19:15:58.763000
CVE-2024-3877,0,0,f24faee79076d9955b33c716cc38fff1084b5ee3b430064cdc16beb5bbd9e5c2,2024-06-04T19:20:25.903000
CVE-2024-3878,0,0,fb95502da03faec460d17c9b1242297f4e8658270dcfc3f37876da58c73c1ed8,2024-05-17T02:40:10.087000
CVE-2024-3879,0,0,92774dc7ea0cffc72f06608ad0c5ab32112431972595f4ffa950315fc44f5141,2024-05-17T02:40:10.177000
@ -253049,7 +253061,7 @@ CVE-2024-4026,0,0,9eff728af4fb17cd0b046ae2444303f230bc7685cadbda3feb2bd1007c7666
CVE-2024-4029,0,0,afc8def3dff015c790bb6f1fba36f8919ca09d0c14ec4f09004e6bb6d31f1058,2024-05-02T18:00:37.360000
CVE-2024-4030,0,0,c7e71f4aa9c8e1fed63372a5ecebe14dddf19d5400caf27393d092efafbf0f25,2024-06-13T20:15:15.570000
CVE-2024-4031,0,0,4baeaad68cf3411bf45d41e53c64aca0aa19dc8cf620cd2c5028b0d61a50ba2c,2024-04-23T12:52:09.397000
CVE-2024-4032,0,1,03894ea0efe4adf33eae6b6c4a5d257a2cf4187fd23c9230c41cf9b02106eb41,2024-06-17T18:15:18.047000
CVE-2024-4032,0,0,03894ea0efe4adf33eae6b6c4a5d257a2cf4187fd23c9230c41cf9b02106eb41,2024-06-17T18:15:18.047000
CVE-2024-4033,0,0,9c08f15b4d3308634dd41e6afc3001fb3d24483554aaa58982323fa330ce651a,2024-05-02T18:00:37.360000
CVE-2024-4034,0,0,fbbc9986eba42f39f504e14d62a8f5aac7c2749ef90d02af8ad89eb5ef4d1cca,2024-05-02T18:00:37.360000
CVE-2024-4035,0,0,02906ca1b496a2e42ac8610e4dfcaad284409da5fa1faeb0fe6ebb26c1e7ae4c,2024-04-25T13:18:02.660000
@ -253477,7 +253489,7 @@ CVE-2024-4580,0,0,8eea2c6efcadf197a7eb186820cafc4d96f736bb0925ed6e0f257f524d44d9
CVE-2024-4581,0,0,76d80edc646ff1ece35896e94283319c4ca53356d1c75c256f7ea9adb85effeb,2024-06-04T16:57:41.053000
CVE-2024-4582,0,0,57ac27f8923e8821e7b5fca55d7f50b9c8dfb5b34f58112cdd2a2c6b3dee9eda,2024-06-04T19:20:42.750000
CVE-2024-4583,0,0,af5c6d7dbc7d13aa7121157e641c0ae3611565803aa3301ac8e05cd3822a0f3f,2024-06-04T19:20:42.857000
CVE-2024-4584,0,1,2c31e3bc8c7d2e9efeb129c1e82a2bc8338879f33d908a6721a12b1a62670c07,2024-06-17T19:15:58.903000
CVE-2024-4584,0,0,2c31e3bc8c7d2e9efeb129c1e82a2bc8338879f33d908a6721a12b1a62670c07,2024-06-17T19:15:58.903000
CVE-2024-4585,0,0,c1224862b2da0bb957015fb054dced4793091e8e3aa3caac8ee5575edd00f689,2024-05-17T02:40:28.993000
CVE-2024-4586,0,0,38a9d7726156e11be76063fc1f3a10ac00b9f19e5c3bba2254b1b06e6ca2fe78,2024-06-04T19:20:42.953000
CVE-2024-4587,0,0,fa4f2e1af7adbbcc9d9c59a2f010e851c5b64f5ba18ad37f1ca2351cf22dc751,2024-06-04T19:20:43.057000
@ -253488,7 +253500,7 @@ CVE-2024-4591,0,0,5c6d761a32eee493d547c5d2d22181949ad1190c4454a55e9aa89efeef0df5
CVE-2024-4592,0,0,d8ebb8994c326e045a4e9c2becb1e92e01af61dca4ec82dd53c50e1797fca86a,2024-06-04T19:20:43.560000
CVE-2024-4593,0,0,6e92f7e409d392375aadb61ac84c9d714f33b7bdac01d896f8d5f1cdac91a9de,2024-05-17T02:40:29.730000
CVE-2024-4594,0,0,bcffb9fcfeaac22cc37f5dc48e830b7d71c5ce449d6ef0e481ff78f48d7fa487,2024-06-04T19:20:43.657000
CVE-2024-4595,0,1,5d35ea8ef48c2a80f961b57f311ad01654ad75218ac9d7f0e09b8afbb41ffd76,2024-06-17T19:15:59.063000
CVE-2024-4595,0,0,5d35ea8ef48c2a80f961b57f311ad01654ad75218ac9d7f0e09b8afbb41ffd76,2024-06-17T19:15:59.063000
CVE-2024-4596,0,0,2294c5641ac537fa71a7ad1878bc97e3f6060d0b2f74841053ecc03b64d14796,2024-06-04T19:20:43.750000
CVE-2024-4597,0,0,49317a4ff12c60e573c38172dad46b390f6c4e67b3d1cb7027306fe91fd78a96,2024-05-14T16:11:39.510000
CVE-2024-4599,0,0,7a2dd9d366beb25d47b0c05043c7c832d7abfddbca078d457eae393ffc0c13b9,2024-05-07T13:39:32.710000
@ -253903,7 +253915,7 @@ CVE-2024-5202,0,0,b978a5507939d8449bc120b0c8b4b839304f46efdad98898b1b0c13e65a259
CVE-2024-5203,0,0,c1cbddceebcc79a6f3361ec6d421c84f7c0d786eefdc42d89301f7f288b04ff8,2024-06-13T18:36:09.010000
CVE-2024-5204,0,0,f5f46d30f5f5fcefc4a351787eb0bfde8706d10be20e1d771d5abcd1008399a0,2024-05-29T13:02:09.280000
CVE-2024-5205,0,0,cb36ec671fed104039900e6835467ad487e54c052bb39844cd3bc6979a6fc551,2024-05-24T13:03:11.993000
CVE-2024-5206,0,1,dfdbb2d2210fa9604e6469b5345cbda30a0f0ae57d39e7dfc070825e6f931647,2024-06-17T19:15:59.190000
CVE-2024-5206,0,0,dfdbb2d2210fa9604e6469b5345cbda30a0f0ae57d39e7dfc070825e6f931647,2024-06-17T19:15:59.190000
CVE-2024-5207,0,0,837facf8fac5843bbf7aea1ce36fa00287f1ba077f8fbca1302b0ab4087ec522,2024-05-30T13:15:41.297000
CVE-2024-5211,0,0,a4277f26aaa565cc417eac86a473b48ddc12386cf29490b9b3d30644e664c347,2024-06-13T18:36:09.010000
CVE-2024-5214,0,0,77a86526714522a20940695733fe46b4562089752d3c663cf289b583b7c6bbda,2024-06-03T19:15:09.360000
@ -254296,7 +254308,13 @@ CVE-2024-6046,0,0,a5ace0bbdf0f368d76efea99e17761b90d722a7f8fb2cd5b11d6c7027f5ee4
CVE-2024-6047,0,0,4cdf0f1acff12373f8f857c8d442b9de2221d44745323cc3f60bf66bccd7a239,2024-06-17T14:15:13.040000
CVE-2024-6048,0,0,03e9485ef23720c113f11fed6c539200d9a1624e025ca24798cddf9d0c1a9e3b,2024-06-17T12:42:04.623000
CVE-2024-6055,0,0,93ffb465c6acddf15e4142ae2e8b4bcae95c7241e5f24a2dedc05f862f5d2e79,2024-06-17T13:15:53.697000
CVE-2024-6056,1,1,636228dd1a2c8f5c63676f25cc803d23af23082b986789068b58dd9fd2a57ea9,2024-06-17T18:15:18.143000
CVE-2024-6056,0,0,636228dd1a2c8f5c63676f25cc803d23af23082b986789068b58dd9fd2a57ea9,2024-06-17T18:15:18.143000
CVE-2024-6057,0,0,cfabce49b9db224e3720b6479e81ee1edcd2fcbaabb39bed0063a52236765ccd,2024-06-17T13:15:53.800000
CVE-2024-6058,1,1,3ee08d4ad26cf88da329a5e1271ed474432fcbd63bb5792a008ded1da8686681,2024-06-17T18:15:18.520000
CVE-2024-6059,1,1,8dc3785d03b4bbf495bb7b9e0db50afd358453b35356b7519dfcb40c8d9c6a71,2024-06-17T19:15:59.467000
CVE-2024-6058,0,0,3ee08d4ad26cf88da329a5e1271ed474432fcbd63bb5792a008ded1da8686681,2024-06-17T18:15:18.520000
CVE-2024-6059,0,0,8dc3785d03b4bbf495bb7b9e0db50afd358453b35356b7519dfcb40c8d9c6a71,2024-06-17T19:15:59.467000
CVE-2024-6061,1,1,e3994abe87d8171c8e3b6a2bfacb5133544b1c463e71028fb8ff174c440a1265,2024-06-17T20:15:14.850000
CVE-2024-6062,1,1,47cd221b4b8aabce9ad30cff9ce6a2ec0e7cd03e3e3078c16a8749b69ae8d8eb,2024-06-17T20:15:15.170000
CVE-2024-6063,1,1,b67d10210bed54ecb8364f0d64a24e8a9bb67fda8d7cdbfbf01d23eb1fcb1bb1,2024-06-17T21:15:51.443000
CVE-2024-6064,1,1,dfa0698ee8caf241b62eef71e2d604b23eb45d719d7bfffd9edd5b3eea92dc02,2024-06-17T21:15:51.727000
CVE-2024-6065,1,1,ec7d6c92bf7a949498dd9805836d3dc45c84184ec068d4330849b9f7c74e24ca,2024-06-17T21:15:52.007000
CVE-2024-6066,1,1,4be16afb26a67eeaa99325b278e1eb15007f8629556d5972406c66487d6fe7ae,2024-06-17T21:15:52.283000

Can't render this file because it is too large.