mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-07-09 16:05:11 +00:00
Auto-Update: 2024-07-17T10:00:18.371008+00:00
This commit is contained in:
parent
79b9236b5b
commit
8ba8af2fd1
33
CVE-2023/CVE-2023-522xx/CVE-2023-52291.json
Normal file
33
CVE-2023/CVE-2023-522xx/CVE-2023-52291.json
Normal file
@ -0,0 +1,33 @@
|
||||
{
|
||||
"id": "CVE-2023-52291",
|
||||
"sourceIdentifier": "security@apache.org",
|
||||
"published": "2024-07-17T09:15:02.410",
|
||||
"lastModified": "2024-07-17T09:15:02.410",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "In streampark, the project module integrates Maven's compilation capabilities. The input parameter validation is not strict, allowing attackers to insert commands for remote command execution, The prerequisite for a successful attack is that the user needs to log in to the streampark system and have system-level permissions. Generally, only users of that system have the authorization to log in, and users would not manually input a dangerous operation command. Therefore, the risk level of this vulnerability is very low.\n\nBackground:\n\nIn the \"Project\" module, the maven build args\u00a0\u00a0\u201c<\u201d operator causes command injection. e.g : \u201c< (curl\u00a0 http://xxx.com )\u201d will be executed as a command injection,\n\nMitigation:\n\nall users should upgrade to 2.1.4,\u00a0 The \"<\" operator will blocked\u3002\n\n"
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security@apache.org",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-77"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://lists.apache.org/thread/pl6xgzoqrl4kcn0nt55zjbsx8dn80mkf",
|
||||
"source": "security@apache.org"
|
||||
}
|
||||
]
|
||||
}
|
33
CVE-2024/CVE-2024-297xx/CVE-2024-29737.json
Normal file
33
CVE-2024/CVE-2024-297xx/CVE-2024-29737.json
Normal file
@ -0,0 +1,33 @@
|
||||
{
|
||||
"id": "CVE-2024-29737",
|
||||
"sourceIdentifier": "security@apache.org",
|
||||
"published": "2024-07-17T09:15:02.527",
|
||||
"lastModified": "2024-07-17T09:15:02.527",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "In streampark, the project module integrates Maven's compilation capabilities. The input parameter validation is not strict, allowing attackers to insert commands for remote command execution, The prerequisite for a successful attack is that the user needs to log in to the streampark system and have system-level permissions. Generally, only users of that system have the authorization to log in, and users would not manually input a dangerous operation command. Therefore, the risk level of this vulnerability is very low.\n\nMitigation:\n\nall users should upgrade to 2.1.4\n\nBackground info:\n\nLog in to Streampark using the default username (e.g. test1, test2, test3) and the default password (streampark). Navigate to the Project module, then add a new project. Enter the git repository address of the project and input `touch /tmp/success_2.1.2` as the \"Build Argument\". Note that there is no verification and interception of the special character \"`\". As a result, you will find that this injection command will be successfully executed after executing the build.\n\nIn the latest version, the special symbol ` is intercepted.\n\n"
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security@apache.org",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-77"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://lists.apache.org/thread/xhx7jt1t24s6d7o435wxng8t0ojfbfh5",
|
||||
"source": "security@apache.org"
|
||||
}
|
||||
]
|
||||
}
|
33
CVE-2024/CVE-2024-304xx/CVE-2024-30471.json
Normal file
33
CVE-2024/CVE-2024-304xx/CVE-2024-30471.json
Normal file
@ -0,0 +1,33 @@
|
||||
{
|
||||
"id": "CVE-2024-30471",
|
||||
"sourceIdentifier": "security@apache.org",
|
||||
"published": "2024-07-17T09:15:02.640",
|
||||
"lastModified": "2024-07-17T09:15:02.640",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Time-of-check Time-of-use (TOCTOU) Race Condition vulnerability in Apache StreamPipes in user self-registration.\nThis allows an attacker to potentially request the creation of multiple accounts with the same email address until the email address is registered, creating many identical users and corrupting StreamPipe's user management.\nThis issue affects Apache StreamPipes: through 0.93.0.\n\nUsers are recommended to upgrade to version 0.95.0, which fixes the issue.\n\n"
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security@apache.org",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-367"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://lists.apache.org/thread/8yodrmohgcybq900or3d4hc1msl230fr",
|
||||
"source": "security@apache.org"
|
||||
}
|
||||
]
|
||||
}
|
29
CVE-2024/CVE-2024-310xx/CVE-2024-31070.json
Normal file
29
CVE-2024/CVE-2024-310xx/CVE-2024-31070.json
Normal file
@ -0,0 +1,29 @@
|
||||
{
|
||||
"id": "CVE-2024-31070",
|
||||
"sourceIdentifier": "vultures@jpcert.or.jp",
|
||||
"published": "2024-07-17T09:15:02.813",
|
||||
"lastModified": "2024-07-17T09:15:02.813",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Initialization of a resource with an insecure default vulnerability in FutureNet NXR series, VXR series and WXR series provided by Century Systems Co., Ltd. allows a remote unauthenticated attacker to access telnet service unlimitedly."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://jvn.jp/en/vu/JVNVU96424864/",
|
||||
"source": "vultures@jpcert.or.jp"
|
||||
},
|
||||
{
|
||||
"url": "https://www.centurysys.co.jp/backnumber/nxr_common/20240716-01.html",
|
||||
"source": "vultures@jpcert.or.jp"
|
||||
},
|
||||
{
|
||||
"url": "https://www.centurysys.co.jp/backnumber/nxr_common/20240716-03.html",
|
||||
"source": "vultures@jpcert.or.jp"
|
||||
}
|
||||
]
|
||||
}
|
33
CVE-2024/CVE-2024-319xx/CVE-2024-31979.json
Normal file
33
CVE-2024/CVE-2024-319xx/CVE-2024-31979.json
Normal file
@ -0,0 +1,33 @@
|
||||
{
|
||||
"id": "CVE-2024-31979",
|
||||
"sourceIdentifier": "security@apache.org",
|
||||
"published": "2024-07-17T09:15:02.907",
|
||||
"lastModified": "2024-07-17T09:15:02.907",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Server-Side Request Forgery (SSRF) vulnerability in Apache StreamPipes during installation process of pipeline elements.\nPreviously, StreamPipes allowed users to configure custom endpoints from which to install additional pipeline elements. \nThese endpoints were not properly validated, allowing an attacker to get StreamPipes to send an HTTP GET request to an arbitrary address.\nThis issue affects Apache StreamPipes: through 0.93.0.\n\nUsers are recommended to upgrade to version 0.95.0, which fixes the issue.\n\n"
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security@apache.org",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-918"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://lists.apache.org/thread/8lryp3bxnby9kmk13odkz2jbfdjfvf0y",
|
||||
"source": "security@apache.org"
|
||||
}
|
||||
]
|
||||
}
|
29
CVE-2024/CVE-2024-364xx/CVE-2024-36475.json
Normal file
29
CVE-2024/CVE-2024-364xx/CVE-2024-36475.json
Normal file
@ -0,0 +1,29 @@
|
||||
{
|
||||
"id": "CVE-2024-36475",
|
||||
"sourceIdentifier": "vultures@jpcert.or.jp",
|
||||
"published": "2024-07-17T09:15:03.013",
|
||||
"lastModified": "2024-07-17T09:15:03.013",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "FutureNet NXR series, VXR series and WXR series provided by Century Systems Co., Ltd. contain an active debug code vulnerability. If a user who knows how to use the debug function logs in to the product, the debug function may be used and an arbitrary OS command may be executed."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://jvn.jp/en/vu/JVNVU96424864/",
|
||||
"source": "vultures@jpcert.or.jp"
|
||||
},
|
||||
{
|
||||
"url": "https://www.centurysys.co.jp/backnumber/nxr_common/20240716-01.html",
|
||||
"source": "vultures@jpcert.or.jp"
|
||||
},
|
||||
{
|
||||
"url": "https://www.centurysys.co.jp/backnumber/nxr_common/20240716-03.html",
|
||||
"source": "vultures@jpcert.or.jp"
|
||||
}
|
||||
]
|
||||
}
|
29
CVE-2024/CVE-2024-364xx/CVE-2024-36491.json
Normal file
29
CVE-2024/CVE-2024-364xx/CVE-2024-36491.json
Normal file
@ -0,0 +1,29 @@
|
||||
{
|
||||
"id": "CVE-2024-36491",
|
||||
"sourceIdentifier": "vultures@jpcert.or.jp",
|
||||
"published": "2024-07-17T09:15:03.090",
|
||||
"lastModified": "2024-07-17T09:15:03.090",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "FutureNet NXR series, VXR series and WXR series provided by Century Systems Co., Ltd. allow a remote unauthenticated attacker to execute an arbitrary OS command, obtain and/or alter sensitive information, and be able to cause a denial of service (DoS) condition."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://jvn.jp/en/vu/JVNVU96424864/",
|
||||
"source": "vultures@jpcert.or.jp"
|
||||
},
|
||||
{
|
||||
"url": "https://www.centurysys.co.jp/backnumber/nxr_common/20240716-01.html",
|
||||
"source": "vultures@jpcert.or.jp"
|
||||
},
|
||||
{
|
||||
"url": "https://www.centurysys.co.jp/backnumber/nxr_common/20240716-03.html",
|
||||
"source": "vultures@jpcert.or.jp"
|
||||
}
|
||||
]
|
||||
}
|
37
CVE-2024/CVE-2024-398xx/CVE-2024-39863.json
Normal file
37
CVE-2024/CVE-2024-398xx/CVE-2024-39863.json
Normal file
@ -0,0 +1,37 @@
|
||||
{
|
||||
"id": "CVE-2024-39863",
|
||||
"sourceIdentifier": "security@apache.org",
|
||||
"published": "2024-07-17T08:15:01.933",
|
||||
"lastModified": "2024-07-17T08:15:01.933",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Apache Airflow versions before 2.9.3 have a vulnerability that allows an authenticated attacker to inject a malicious link when installing a provider. Users are recommended to upgrade to version 2.9.3, which fixes this issue.\n"
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security@apache.org",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-74"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/apache/airflow/pull/40475",
|
||||
"source": "security@apache.org"
|
||||
},
|
||||
{
|
||||
"url": "https://lists.apache.org/thread/gxkvs279f1mbvckv5q65worr6how20o3",
|
||||
"source": "security@apache.org"
|
||||
}
|
||||
]
|
||||
}
|
37
CVE-2024/CVE-2024-398xx/CVE-2024-39877.json
Normal file
37
CVE-2024/CVE-2024-398xx/CVE-2024-39877.json
Normal file
@ -0,0 +1,37 @@
|
||||
{
|
||||
"id": "CVE-2024-39877",
|
||||
"sourceIdentifier": "security@apache.org",
|
||||
"published": "2024-07-17T08:15:02.073",
|
||||
"lastModified": "2024-07-17T08:15:02.073",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Apache Airflow 2.4.0, and versions before 2.9.3, has a vulnerability that allows authenticated DAG authors to craft a doc_md parameter in a way that could execute arbitrary code in the scheduler context, which should be forbidden according to the Airflow Security model. Users should upgrade to version 2.9.3 or later which has removed the vulnerability."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security@apache.org",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-94"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/apache/airflow/pull/40522",
|
||||
"source": "security@apache.org"
|
||||
},
|
||||
{
|
||||
"url": "https://lists.apache.org/thread/1xhj9dkp37d6pzn24ll2mf94wbqnb2y1",
|
||||
"source": "security@apache.org"
|
||||
}
|
||||
]
|
||||
}
|
25
CVE-2024/CVE-2024-406xx/CVE-2024-40617.json
Normal file
25
CVE-2024/CVE-2024-406xx/CVE-2024-40617.json
Normal file
@ -0,0 +1,25 @@
|
||||
{
|
||||
"id": "CVE-2024-40617",
|
||||
"sourceIdentifier": "vultures@jpcert.or.jp",
|
||||
"published": "2024-07-17T09:15:03.163",
|
||||
"lastModified": "2024-07-17T09:15:03.163",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Path traversal vulnerability exists in FUJITSU Network Edgiot GW1500 (M2M-GW for FENICS). If a remote authenticated attacker with User Class privilege sends a specially crafted request to the affected product, access restricted files containing sensitive information may be accessed. As a result, Administrator Class privileges of the product may be hijacked."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://fenics.fujitsu.com/networkservice/m2m/download/update-m.html",
|
||||
"source": "vultures@jpcert.or.jp"
|
||||
},
|
||||
{
|
||||
"url": "https://jvn.jp/en/jp/JVN25583987/",
|
||||
"source": "vultures@jpcert.or.jp"
|
||||
}
|
||||
]
|
||||
}
|
56
CVE-2024/CVE-2024-55xx/CVE-2024-5582.json
Normal file
56
CVE-2024/CVE-2024-55xx/CVE-2024-5582.json
Normal file
@ -0,0 +1,56 @@
|
||||
{
|
||||
"id": "CVE-2024-5582",
|
||||
"sourceIdentifier": "security@wordfence.com",
|
||||
"published": "2024-07-17T08:15:02.180",
|
||||
"lastModified": "2024-07-17T08:15:02.180",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "The Schema & Structured Data for WP & AMP plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'url' attribute within the Q&A Block widget in all versions up to, and including, 1.33 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security@wordfence.com",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 6.4,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 3.1,
|
||||
"impactScore": 2.7
|
||||
}
|
||||
]
|
||||
},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/browser/schema-and-structured-data-for-wp/tags/1.31/modules/elementor/widgets/qanda-block.php#L355",
|
||||
"source": "security@wordfence.com"
|
||||
},
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/browser/schema-and-structured-data-for-wp/trunk/modules/elementor/widgets/class-qanda-block.php#L369",
|
||||
"source": "security@wordfence.com"
|
||||
},
|
||||
{
|
||||
"url": "https://wordpress.org/plugins/schema-and-structured-data-for-wp/#developers",
|
||||
"source": "security@wordfence.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/ab650b99-ab15-4ddc-a622-cb43ab554ba7?source=cve",
|
||||
"source": "security@wordfence.com"
|
||||
}
|
||||
]
|
||||
}
|
52
CVE-2024/CVE-2024-57xx/CVE-2024-5703.json
Normal file
52
CVE-2024/CVE-2024-57xx/CVE-2024-5703.json
Normal file
@ -0,0 +1,52 @@
|
||||
{
|
||||
"id": "CVE-2024-5703",
|
||||
"sourceIdentifier": "security@wordfence.com",
|
||||
"published": "2024-07-17T08:15:02.370",
|
||||
"lastModified": "2024-07-17T08:15:02.370",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "The Email Subscribers by Icegram Express \u2013 Email Marketing, Newsletters, Automation for WordPress & WooCommerce plugin for WordPress is vulnerable to unauthorized API access due to a missing capability check in all versions up to, and including, 5.7.26. This makes it possible for authenticated attackers, with Subscriber-level access and above, to access the API (provided it is enabled) and add, edit, and delete audience users."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security@wordfence.com",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 4.3,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 1.4
|
||||
}
|
||||
]
|
||||
},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/browser/email-subscribers/trunk/lite/admin/class-es-rest-api-admin.php#L25",
|
||||
"source": "security@wordfence.com"
|
||||
},
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/changeset/3118326/email-subscribers/trunk/lite/admin/class-es-rest-api-admin.php",
|
||||
"source": "security@wordfence.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/22283650-36bf-43e5-a57e-a91025fb2af7?source=cve",
|
||||
"source": "security@wordfence.com"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-6047",
|
||||
"sourceIdentifier": "twcert@cert.org.tw",
|
||||
"published": "2024-06-17T06:15:09.237",
|
||||
"lastModified": "2024-06-17T14:15:13.040",
|
||||
"lastModified": "2024-07-17T08:15:02.570",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [
|
||||
{
|
||||
|
48
CVE-2024/CVE-2024-62xx/CVE-2024-6220.json
Normal file
48
CVE-2024/CVE-2024-62xx/CVE-2024-6220.json
Normal file
@ -0,0 +1,48 @@
|
||||
{
|
||||
"id": "CVE-2024-6220",
|
||||
"sourceIdentifier": "security@wordfence.com",
|
||||
"published": "2024-07-17T08:15:02.730",
|
||||
"lastModified": "2024-07-17T08:15:02.730",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "The \u7b80\u6570\u91c7\u96c6\u5668 (Keydatas) plugin for WordPress is vulnerable to arbitrary file uploads due to missing file type validation in the keydatas_downloadImages function in all versions up to, and including, 2.5.2. This makes it possible for unauthenticated attackers to upload arbitrary files on the affected site's server which may make remote code execution possible."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security@wordfence.com",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/browser/keydatas/trunk/keydatas.php",
|
||||
"source": "security@wordfence.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/49ae7971-7bdf-4369-b04b-fb48ea5b9518?source=cve",
|
||||
"source": "security@wordfence.com"
|
||||
}
|
||||
]
|
||||
}
|
35
README.md
35
README.md
@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours.
|
||||
### Last Repository Update
|
||||
|
||||
```plain
|
||||
2024-07-17T08:00:18.775605+00:00
|
||||
2024-07-17T10:00:18.371008+00:00
|
||||
```
|
||||
|
||||
### Most recent CVE Modification Timestamp synchronized with NVD
|
||||
|
||||
```plain
|
||||
2024-07-17T07:15:03.873000+00:00
|
||||
2024-07-17T09:15:03.163000+00:00
|
||||
```
|
||||
|
||||
### Last Data Feed Release
|
||||
@ -33,30 +33,33 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
|
||||
### Total Number of included CVEs
|
||||
|
||||
```plain
|
||||
257347
|
||||
257360
|
||||
```
|
||||
|
||||
### CVEs added in the last Commit
|
||||
|
||||
Recently added CVEs: `11`
|
||||
Recently added CVEs: `13`
|
||||
|
||||
- [CVE-2024-41009](CVE-2024/CVE-2024-410xx/CVE-2024-41009.json) (`2024-07-17T07:15:01.973`)
|
||||
- [CVE-2024-41010](CVE-2024/CVE-2024-410xx/CVE-2024-41010.json) (`2024-07-17T07:15:02.183`)
|
||||
- [CVE-2024-5251](CVE-2024/CVE-2024-52xx/CVE-2024-5251.json) (`2024-07-17T07:15:02.260`)
|
||||
- [CVE-2024-5252](CVE-2024/CVE-2024-52xx/CVE-2024-5252.json) (`2024-07-17T07:15:02.483`)
|
||||
- [CVE-2024-5253](CVE-2024/CVE-2024-52xx/CVE-2024-5253.json) (`2024-07-17T07:15:02.690`)
|
||||
- [CVE-2024-5254](CVE-2024/CVE-2024-52xx/CVE-2024-5254.json) (`2024-07-17T07:15:02.883`)
|
||||
- [CVE-2024-5255](CVE-2024/CVE-2024-52xx/CVE-2024-5255.json) (`2024-07-17T07:15:03.073`)
|
||||
- [CVE-2024-6033](CVE-2024/CVE-2024-60xx/CVE-2024-6033.json) (`2024-07-17T07:15:03.263`)
|
||||
- [CVE-2024-6467](CVE-2024/CVE-2024-64xx/CVE-2024-6467.json) (`2024-07-17T07:15:03.493`)
|
||||
- [CVE-2024-6660](CVE-2024/CVE-2024-66xx/CVE-2024-6660.json) (`2024-07-17T07:15:03.683`)
|
||||
- [CVE-2024-6669](CVE-2024/CVE-2024-66xx/CVE-2024-6669.json) (`2024-07-17T07:15:03.873`)
|
||||
- [CVE-2023-52291](CVE-2023/CVE-2023-522xx/CVE-2023-52291.json) (`2024-07-17T09:15:02.410`)
|
||||
- [CVE-2024-29737](CVE-2024/CVE-2024-297xx/CVE-2024-29737.json) (`2024-07-17T09:15:02.527`)
|
||||
- [CVE-2024-30471](CVE-2024/CVE-2024-304xx/CVE-2024-30471.json) (`2024-07-17T09:15:02.640`)
|
||||
- [CVE-2024-31070](CVE-2024/CVE-2024-310xx/CVE-2024-31070.json) (`2024-07-17T09:15:02.813`)
|
||||
- [CVE-2024-31979](CVE-2024/CVE-2024-319xx/CVE-2024-31979.json) (`2024-07-17T09:15:02.907`)
|
||||
- [CVE-2024-36475](CVE-2024/CVE-2024-364xx/CVE-2024-36475.json) (`2024-07-17T09:15:03.013`)
|
||||
- [CVE-2024-36491](CVE-2024/CVE-2024-364xx/CVE-2024-36491.json) (`2024-07-17T09:15:03.090`)
|
||||
- [CVE-2024-39863](CVE-2024/CVE-2024-398xx/CVE-2024-39863.json) (`2024-07-17T08:15:01.933`)
|
||||
- [CVE-2024-39877](CVE-2024/CVE-2024-398xx/CVE-2024-39877.json) (`2024-07-17T08:15:02.073`)
|
||||
- [CVE-2024-40617](CVE-2024/CVE-2024-406xx/CVE-2024-40617.json) (`2024-07-17T09:15:03.163`)
|
||||
- [CVE-2024-5582](CVE-2024/CVE-2024-55xx/CVE-2024-5582.json) (`2024-07-17T08:15:02.180`)
|
||||
- [CVE-2024-5703](CVE-2024/CVE-2024-57xx/CVE-2024-5703.json) (`2024-07-17T08:15:02.370`)
|
||||
- [CVE-2024-6220](CVE-2024/CVE-2024-62xx/CVE-2024-6220.json) (`2024-07-17T08:15:02.730`)
|
||||
|
||||
|
||||
### CVEs modified in the last Commit
|
||||
|
||||
Recently modified CVEs: `0`
|
||||
Recently modified CVEs: `1`
|
||||
|
||||
- [CVE-2024-6047](CVE-2024/CVE-2024-60xx/CVE-2024-6047.json) (`2024-07-17T08:15:02.570`)
|
||||
|
||||
|
||||
## Download and Usage
|
||||
|
37
_state.csv
37
_state.csv
@ -238453,6 +238453,7 @@ CVE-2023-52288,0,0,297c3e93d2578fa4354d42073bbfcc9c84a93418874a891bfd157ba56fb9c
|
||||
CVE-2023-52289,0,0,b0b62bf64cde12eff577800bdca9d7c0c719bc9a23d6c24a235e18254584af67,2024-01-24T18:48:24.283000
|
||||
CVE-2023-5229,0,0,96ae4a14c7f75bcf2b6cbe69f7946f8795ec64211a57e06d1e0d2d6ff05a7656,2023-11-08T18:35:10.590000
|
||||
CVE-2023-52290,0,0,b027d3a77e3918cc6823c1648721e9d0ca22799d7375d42fe7f068b3c1f18fba,2024-07-16T13:43:58.773000
|
||||
CVE-2023-52291,1,1,62b19fa704ecae2c8dc0031950e39edea10a55b8751c9c99de83ab6a950ad510,2024-07-17T09:15:02.410000
|
||||
CVE-2023-52296,0,0,85a5b959f2db874145dc7271afa4c982911881063ce8b8741fd891792d7a0806,2024-06-10T17:16:16.537000
|
||||
CVE-2023-5230,0,0,a536f5ec0e596e59d6ed211c038722ef9594f65abf67a435dc22663a31135f5f,2023-11-07T04:23:38.493000
|
||||
CVE-2023-52302,0,0,22ea8ee42f1d0c97611b1d0c11616324d4f2cec9c11a2c69cd863452202dca24,2024-01-05T12:14:39.403000
|
||||
@ -248959,6 +248960,7 @@ CVE-2024-29732,0,0,e30fc06180575c1796869bb0b4fa02497c40c6d7939d34aba0362f12c2710
|
||||
CVE-2024-29733,0,0,0811972ef853088b726fd2b07316244d1d628e55e310910ac8174bd65d097612,2024-07-03T01:52:30.320000
|
||||
CVE-2024-29734,0,0,65bb1ba04f673142d3081922c5e4533cd4af140db3cdfbbce09ab73848e3b6c3,2024-04-03T12:38:04.840000
|
||||
CVE-2024-29735,0,0,1c27e1fe9dbb50907062f908fab6fbb55a16239f685d6be40b04c11200e2a361,2024-05-01T19:15:23.573000
|
||||
CVE-2024-29737,1,1,abee47fe398bb76f7f243555e81bf7a2f13c2526bbc00b1a6baf3ad1e78684ea,2024-07-17T09:15:02.527000
|
||||
CVE-2024-29738,0,0,1c3e1564461702d87cd213d777f3523814ac3c73b5cc61bff5ae595e06e0fbeb,2024-04-08T18:49:25.863000
|
||||
CVE-2024-29739,0,0,ff7d8db191ec3bc24b9fd0a0e51d4426e2f32708f8ba1a8e8a840affcd32aeb7,2024-04-08T18:49:25.863000
|
||||
CVE-2024-2974,0,0,f10703d4490e9d3ed63c6b4abd6c9bf87d6d9b2c11e56d030e360944602d03aa,2024-04-10T13:23:38.787000
|
||||
@ -249655,6 +249657,7 @@ CVE-2024-30468,0,0,657b19720c7a7f72ce29247c42940126c9b095c85b3af6afa14cec4927288
|
||||
CVE-2024-30469,0,0,5f60e05589c3ee2464f9657ee501b05ffdf6e5d6a13b3d79ce37326fbe7f6667,2024-04-01T01:12:59.077000
|
||||
CVE-2024-3047,0,0,b22e2b3bd3f2ea2e1a9b8967138f5d24af468217212d0308948532706a31b398,2024-05-02T18:00:37.360000
|
||||
CVE-2024-30470,0,0,48e5d66dc273af24da4e4b7519926c3e97f1d38856b041954b60e69533ae4645,2024-06-10T02:52:08.267000
|
||||
CVE-2024-30471,1,1,bab2c9efe7e710556c873bd56d11e5580a5090baf8adfd2fc81152a538f625d6,2024-07-17T09:15:02.640000
|
||||
CVE-2024-30472,0,0,00bb1b58fdab892a36ea40136ac2fa59e308dd9cc355f92e428b81257afaa77e,2024-06-13T18:35:19.777000
|
||||
CVE-2024-30477,0,0,2a9c94bd63166efd66be5d42497334130f49f4b0acff68b2e8385a53a877c218,2024-04-01T01:12:59.077000
|
||||
CVE-2024-30478,0,0,8648debe6405c1216a86c901736f7e8905eccc7e01f0ae6ab2126aef21a3be15,2024-04-01T01:12:59.077000
|
||||
@ -250007,6 +250010,7 @@ CVE-2024-31064,0,0,09fc7c8df13203efb1ca9057b678e29517d4a825c266b7d99eb7440ce2a3e
|
||||
CVE-2024-31065,0,0,7a59dbe54933bf84c1cc682e8d045b6969f111bdbc4c97f8279c44771dded5df,2024-03-28T20:53:20.813000
|
||||
CVE-2024-31069,0,0,36481f1718994048a20a15ed67941e1a51f806f748a1e21efe82cd82687004ae,2024-04-15T13:15:51.577000
|
||||
CVE-2024-3107,0,0,26336691309b77f9b9ed1d01af8da80f39f18aa81e7e280fa98e64adbe096bda,2024-05-02T18:00:37.360000
|
||||
CVE-2024-31070,1,1,0163dd520ae494ecf8899eea3488e5c2fc1bd852069703b4b9690ddd9000a756,2024-07-17T09:15:02.813000
|
||||
CVE-2024-31071,0,0,38e67c605bc28fae8948bdb29e4e1fea108746bc02f8e7ba298a38c41a90d442,2024-07-03T18:01:57.697000
|
||||
CVE-2024-31076,0,0,b516579659528296f384d5fc2847472b67a1e9cb8089efce1b81514ba7455edc,2024-07-15T07:15:03.810000
|
||||
CVE-2024-31077,0,0,2f0093d39cf5c7659611f858795c8621f6dfa183946b9e96395aae4eaaeca6eb,2024-04-23T12:52:09.397000
|
||||
@ -250606,6 +250610,7 @@ CVE-2024-31967,0,0,d11e85355b08311754a29e0c672ae95e7ac529a4f49e30497f6cb09093fb9
|
||||
CVE-2024-3197,0,0,324c7a8dc9ccea612ec0432519a90414016d01b55429c0b6dc09fc2cc5af230b,2024-05-02T18:00:37.360000
|
||||
CVE-2024-31974,0,0,eb64c7f63099840683d53752791541217d3c4d0792dfc9b0d9b46ea3d72b30e4,2024-07-03T01:55:41.323000
|
||||
CVE-2024-31978,0,0,e4cc4367e420e8dcd4ef937e3967f9710a2baec19b8785bc53e2d6ca59645c6f,2024-04-09T12:48:04.090000
|
||||
CVE-2024-31979,1,1,6b14c84ffc58edd58a41ecfbd5160fff2143fc78b2cb21639cdb3e6a54c014f1,2024-07-17T09:15:02.907000
|
||||
CVE-2024-3198,0,0,1f0d31c07f6270b253d2bb83c7332c7bc9f718736230fc6377e93749d92894d3,2024-05-22T12:46:53.887000
|
||||
CVE-2024-31980,0,0,8ab930dfc3ea6340441974ba1513ac76de68c0a2890d2d81a8d5be8805e25064,2024-05-14T19:18:31.490000
|
||||
CVE-2024-31981,0,0,f2d3a632894e526ffc79a652f25d3a7da1db8610794379510e264c8e37958abd,2024-04-11T12:47:44.137000
|
||||
@ -253538,6 +253543,7 @@ CVE-2024-36470,0,0,05049c8242b38f083734214f212efa24bf0b8e7684b3d943061a8cbb7c06a
|
||||
CVE-2024-36471,0,0,6e10c8a6f7211dd42a1163cc28818f3c443a2860a609ca58841954b595f68033,2024-07-03T02:03:13.647000
|
||||
CVE-2024-36472,0,0,2535bb51ccaa28f537e77e0ccd5fbdc4d19f82667f3e7465a3e9bc19e2a787a8,2024-05-28T17:11:47.007000
|
||||
CVE-2024-36473,0,0,aa04ebf30531a2d8b8fe44f55c5d2b24e6cb3b712da23e42c688962416c1c553,2024-06-11T13:54:12.057000
|
||||
CVE-2024-36475,1,1,7ed238432d05eb271990281df74f025e6cc8942b35a974274c6e54341354fecc,2024-07-17T09:15:03.013000
|
||||
CVE-2024-36477,0,0,1d17ae62300b2d07c5941459ecfc6e574f91510a7910b453c64417a36e5b6766,2024-06-24T18:38:40.737000
|
||||
CVE-2024-36478,0,0,3d7ccc3e5e506ff24ae4133973c4756e3313941d8345b88b77b0a392d064c726,2024-06-21T11:22:01.687000
|
||||
CVE-2024-36479,0,0,dee4352def0751c2293c7f9148494e529c22ac95426bcab70e58c8c955d6c7c4,2024-06-24T19:26:47.037000
|
||||
@ -253547,6 +253553,7 @@ CVE-2024-36481,0,0,c20069fe9216cf7ae5e42e62fc886e320b7997d027cb5be79eafe3b725910
|
||||
CVE-2024-36484,0,0,b7f6e9f2300585891eaa5f57928160b50fffe9b2c3ba452d5f6777346d3497a0,2024-06-21T11:22:01.687000
|
||||
CVE-2024-36489,0,0,dc2f7108dc3678f1fb36a70c7ba7637636e10430721a5dfcf0db7d3d728d6d70,2024-06-21T11:22:01.687000
|
||||
CVE-2024-3649,0,0,9d2e0b18ffe30ccf7cbc0e74a77daf1869af9483d0413cb80580942eae7d40a2,2024-05-02T18:00:37.360000
|
||||
CVE-2024-36491,1,1,bee8271f86d23d3c668c3502644384e1a0cb386889748b2f6837aaba8e75afd3,2024-07-17T09:15:03.090000
|
||||
CVE-2024-36495,0,0,10404a83be52d267985f87debff962346c26dcdc9e1b293bd8df22829bd96214,2024-07-08T14:18:38.843000
|
||||
CVE-2024-36496,0,0,9b0852e2079a2b8f81e66f1c652acdc8b58764ac010cd86aadd442eb8de70d88,2024-07-03T02:03:14.090000
|
||||
CVE-2024-36497,0,0,55716469f26311eaa7b551ebbfe7eab2676d8944c191b597609bbd8dff1f73b6,2024-07-03T02:03:14.280000
|
||||
@ -255071,6 +255078,7 @@ CVE-2024-39846,0,0,cc3d14fb15e20c985bb7fdeb359e7a12ea1918f79b7c4c3ac03373ad528c6
|
||||
CVE-2024-39848,0,0,8178bbb2814e5fa60c3351f00827b86e4d6b7b334f71560f5ea323ec84986fcf,2024-07-03T02:05:53.147000
|
||||
CVE-2024-3985,0,0,ceb8b898ec23867d1efcc4d7f7a630f584432f67007c6b07d5fd8199e1841622,2024-05-02T18:00:37.360000
|
||||
CVE-2024-39853,0,0,0a0a7ef09f69a0d0504c74e5034409e9f17837e69e722a4f1f3c2adcfb998667,2024-07-03T02:05:53.353000
|
||||
CVE-2024-39863,1,1,3ee723b3a0c5125399d16a11c9512cee9b9c778f3dc938dfafec6e536a9c710a,2024-07-17T08:15:01.933000
|
||||
CVE-2024-39864,0,0,d53cf864986adcf58f762cd7c857169d0cf77d7c01b84f977b101e751257847c,2024-07-08T15:47:10.990000
|
||||
CVE-2024-39865,0,0,1431947f48c63c3f2f289bcb05288d0cda08dff5370e915fbcca9f419224f5d7,2024-07-09T18:19:14.047000
|
||||
CVE-2024-39866,0,0,4ed5613c5836c63f5d6549bcb87208902b3beb2ec94b1529e5dacfcf651468b3,2024-07-09T18:19:14.047000
|
||||
@ -255085,6 +255093,7 @@ CVE-2024-39873,0,0,1a658b8037abfbe3e91b7510442ac4e5e9ef0d1495c2ad87b92c1ad50704c
|
||||
CVE-2024-39874,0,0,14f6ca6c361900eb9cffe6fab1a9a6cec695e772018ab46292846bfaeafee4e4,2024-07-09T18:19:14.047000
|
||||
CVE-2024-39875,0,0,7360bfd27b057e62564bd92359532fb7ec6b0e60daa411b44b0868522210c380,2024-07-09T18:19:14.047000
|
||||
CVE-2024-39876,0,0,b618a8de6e7bfd8c90ec2968f20d226ce35ab815fa49f40d9bc6faad3fe37973,2024-07-09T18:19:14.047000
|
||||
CVE-2024-39877,1,1,2dd18cb0b88e6a0324377a5b3b12d23db63fbeca30132a0cd8cd7be0689f19f6,2024-07-17T08:15:02.073000
|
||||
CVE-2024-39878,0,0,038c252a5df59aef0ff494dd466e8c23160164cb5ac894aeb1a33e06001b79d4,2024-07-02T12:09:16.907000
|
||||
CVE-2024-39879,0,0,1b030ce3798bca0bad33a3937cca95b776786d7918bf02f25bff668e667acaa0,2024-07-02T12:09:16.907000
|
||||
CVE-2024-3988,0,0,517f8158b252993c28722d017d1da97b60c9d30d3cb2f421d187823784125569,2024-04-25T13:18:13.537000
|
||||
@ -255251,6 +255260,7 @@ CVE-2024-40604,0,0,96707551e8fc94b334085d5bf2926e369955211afc96673efa337699ead3d
|
||||
CVE-2024-40605,0,0,3b7d08be38342ed975d3a802af7734eccce4b6fa70dd407ef7f8c6cca68429e4,2024-07-09T16:09:30.277000
|
||||
CVE-2024-4061,0,0,3d64526f6b4051e690acf87533a742bc5fa8b9683de463655fd6184fe7fa5bfb,2024-05-21T12:37:59.687000
|
||||
CVE-2024-40614,0,0,5a8c90c94f1b0dc56355424420ebae65c618d536c580acb4e248f7802de2136c,2024-07-10T13:15:10.833000
|
||||
CVE-2024-40617,1,1,656b360985193ec4b40c91a0040f362a6e595795c29738b7048f16eedba12e75,2024-07-17T09:15:03.163000
|
||||
CVE-2024-40618,0,0,339cc634a42e8a7db54f4bb39e56482affa65b57dfd2765250a61f2e694456da,2024-07-12T16:12:00.597000
|
||||
CVE-2024-4062,0,0,695b7b6d53140e91ee1c447f6f5acafad0b73fbbd2558cb89ae9d4c0c7616ec0,2024-06-04T19:20:29.007000
|
||||
CVE-2024-40624,0,0,4a20911ba5017c22f7067e7eea43b4f5d49d24af0046266156676a49862c806b,2024-07-16T13:43:58.773000
|
||||
@ -255418,8 +255428,8 @@ CVE-2024-41005,0,0,95f568882fd1e16260f486a6121f76b4a7b47a9225c03cbcf7d46d652c71f
|
||||
CVE-2024-41006,0,0,58bd6c502a79651b26621eacf2c0dc46dab924e02809c912fba2631a5541c0df,2024-07-12T16:34:58.687000
|
||||
CVE-2024-41007,0,0,0f7451f1f6e903e68c19bb8e4507bcc8b91d7d8b575b739ec33e4181b2fd01a7,2024-07-15T13:00:34.853000
|
||||
CVE-2024-41008,0,0,44accff6edd09848f65c4ea30c272c9f4e4cafd7e8013f5ed231ff575ad7b53e,2024-07-16T13:43:58.773000
|
||||
CVE-2024-41009,1,1,e5b81427b73a7a659ab3d92e9b0d7880f34e9bf363b4b23d516646ecfbf7861a,2024-07-17T07:15:01.973000
|
||||
CVE-2024-41010,1,1,b1691e45737b2b208a2830f3341ef6e6a5b6991a3b7c35dc85fb1a3a07095eb6,2024-07-17T07:15:02.183000
|
||||
CVE-2024-41009,0,0,e5b81427b73a7a659ab3d92e9b0d7880f34e9bf363b4b23d516646ecfbf7861a,2024-07-17T07:15:01.973000
|
||||
CVE-2024-41010,0,0,b1691e45737b2b208a2830f3341ef6e6a5b6991a3b7c35dc85fb1a3a07095eb6,2024-07-17T07:15:02.183000
|
||||
CVE-2024-4102,0,0,1b0aaa7efbf772a3034d5138f2cde018af6a8f41a0229b0c5f36e4d66092a2a3,2024-07-09T18:19:14.047000
|
||||
CVE-2024-4103,0,0,ff27f3988e30e41f465bfc5b7800f7ae2f96b1e2cd71c1414de16617b75fe4fe,2024-05-14T16:11:39.510000
|
||||
CVE-2024-4104,0,0,069e7afb1610585640d00d566d3fc4756dff3571ed269cd2ef1d63c8e8ce45e5,2024-05-14T16:11:39.510000
|
||||
@ -256400,11 +256410,11 @@ CVE-2024-5245,0,0,8367cc316d7fd622697ed020483e2edc6264aea8aa776978b7228518baa317
|
||||
CVE-2024-5246,0,0,481ebf23b779dd3e32e9e0cda77aaee7d0bfc9eca82266cde6c77415f4c9c730,2024-07-03T02:08:44.767000
|
||||
CVE-2024-5247,0,0,fdfe6c1388c42f602cdcb0ffda38b56b5f1ed960e60bfada435f42d294b2956e,2024-05-24T01:15:30.977000
|
||||
CVE-2024-5248,0,0,2c3e52f7d10efa84a65c2d56e808c7c6b6e082b4d0e6c7b1b0a814f5918d2bf2,2024-06-07T14:56:05.647000
|
||||
CVE-2024-5251,1,1,ba3d2c0f12a0aad18985c34197dfb5c6f863f2d1e893878b1f224a89df5cde00,2024-07-17T07:15:02.260000
|
||||
CVE-2024-5252,1,1,37756dffba5d6bea70d1c95fddbd7f3af71cbff02ac71c7267e8e00c27d1d747,2024-07-17T07:15:02.483000
|
||||
CVE-2024-5253,1,1,419a036fdbe28fd90488f2a8ac36952ccbed00272c62d9610ceb07cdd772123a,2024-07-17T07:15:02.690000
|
||||
CVE-2024-5254,1,1,3d10c9b130bb6e37beefe49df8fbb12e54bbf8fbc808a8d229669162c22546c6,2024-07-17T07:15:02.883000
|
||||
CVE-2024-5255,1,1,5ca464b4e7b83fa9891b4810da9d3130521e6735749a82e6d1faf0587e2a8362,2024-07-17T07:15:03.073000
|
||||
CVE-2024-5251,0,0,ba3d2c0f12a0aad18985c34197dfb5c6f863f2d1e893878b1f224a89df5cde00,2024-07-17T07:15:02.260000
|
||||
CVE-2024-5252,0,0,37756dffba5d6bea70d1c95fddbd7f3af71cbff02ac71c7267e8e00c27d1d747,2024-07-17T07:15:02.483000
|
||||
CVE-2024-5253,0,0,419a036fdbe28fd90488f2a8ac36952ccbed00272c62d9610ceb07cdd772123a,2024-07-17T07:15:02.690000
|
||||
CVE-2024-5254,0,0,3d10c9b130bb6e37beefe49df8fbb12e54bbf8fbc808a8d229669162c22546c6,2024-07-17T07:15:02.883000
|
||||
CVE-2024-5255,0,0,5ca464b4e7b83fa9891b4810da9d3130521e6735749a82e6d1faf0587e2a8362,2024-07-17T07:15:03.073000
|
||||
CVE-2024-5256,0,0,7546c1517da1882e18d942ab700b65cdd397cd67565c940d6efb24b85fa1c2bd,2024-06-07T14:56:05.647000
|
||||
CVE-2024-5257,0,0,e4fba0a5c9dc635ae9582dcee356a08c90165a6e8c8a0a01b6dfbef5e885cd24,2024-07-12T16:54:34.517000
|
||||
CVE-2024-5258,0,0,51134eb56f05332c584317818ff995de56b2de598a9752cb1990f31f73c535e3,2024-05-24T01:15:30.977000
|
||||
@ -256666,6 +256676,7 @@ CVE-2024-5573,0,0,250942dd398584b07af081969c90c51eb870e472776aa0a5f143054241cd8a
|
||||
CVE-2024-5574,0,0,e718295307eca06b04fb56f70dfb8daf0ce4b10163936e86fc3b21a6f71a4423,2024-06-20T12:44:01.637000
|
||||
CVE-2024-5575,0,0,0d0faeec0f613a9625ccc8cb2724627ce688cebf183de5add4fa7e9fd84a3054,2024-07-15T13:00:34.853000
|
||||
CVE-2024-5577,0,0,5dd16baf94f18e7abae39f40d89c75af3dba9492f2b1af50e3d8516c5413b1e4,2024-06-17T12:42:04.623000
|
||||
CVE-2024-5582,1,1,bda1b1adad5ca655f44a526dc76a413b3ed087946a37e2dd235f07db40a34651,2024-07-17T08:15:02.180000
|
||||
CVE-2024-5584,0,0,7705ff7ae1b4fd1342d12756cedf379ac85bb5a3b8398b6b986f5e220e43afde,2024-06-11T13:54:12.057000
|
||||
CVE-2024-5585,0,0,9e089b029f69ddc50638e027531ef06d5e8acf986dd2efdfe6f9d39673e035c3,2024-06-13T04:15:17.407000
|
||||
CVE-2024-5587,0,0,6b9958828217f46ad00f93a8982028b537e303232ee58bb83f00389806575abd,2024-06-03T14:46:24.250000
|
||||
@ -256754,6 +256765,7 @@ CVE-2024-5699,0,0,c6a42ec507c58416dc30ca6ed956f1ded247800b2c9b3cf1e9a175eb88ff9b
|
||||
CVE-2024-5700,0,0,75281b3d92ab48138fa84376c62cf06e3b235ecbf0492685b83c4b5de8ec6545,2024-07-03T02:09:12.470000
|
||||
CVE-2024-5701,0,0,50132399b0866a3a39154eec031eecee61c5e1b87964f02e5d6e5dcb69b1128f,2024-06-11T13:54:12.057000
|
||||
CVE-2024-5702,0,0,38c1097fef455f8c14a4a11698b056f16759fa186a63b78823c287fecdc7ce07,2024-06-19T10:15:11.583000
|
||||
CVE-2024-5703,1,1,9706e49d4615235ada62fb6d426611eb128f3510e8f9c0c65bd057b8fd0fc817,2024-07-17T08:15:02.370000
|
||||
CVE-2024-5704,0,0,be55689131fc57547da71e8726572a7a1a86cf57932558d33666ec0b15eef9b9,2024-07-09T18:19:14.047000
|
||||
CVE-2024-5710,0,0,bbba5caf4cb4f465fb2a1f44424b7af778bd56d5f1b17eb3b38248b8a0397322,2024-07-01T10:15:30.183000
|
||||
CVE-2024-5711,0,0,463604f6d6d272196433a5bb7494f0542e749e8811ac98ab1c08049581f8b425,2024-07-11T21:15:12.787000
|
||||
@ -256958,7 +256970,7 @@ CVE-2024-6025,0,0,2653befc93f455636e57cde83404a5ff884ae434fc80abd19f04944c84a702
|
||||
CVE-2024-6026,0,0,2970248e3866f379267d0cae7e3b9bb934f39b25cb3198f3dfbaa23423c08ff9,2024-07-12T16:55:44.240000
|
||||
CVE-2024-6027,0,0,d36139a3f6402ad17d96a83c3d61f6ce213e515812c77112f328495c0bcd9928,2024-06-24T19:17:50.240000
|
||||
CVE-2024-6028,0,0,a068f17d13f3176b06fe0181735235198b8a42900e26e5af12021baf09b50c20,2024-06-25T12:24:17.873000
|
||||
CVE-2024-6033,1,1,15c25de796ebfbab9e44a812131dc54f93a03e716bec334742145fa1535f6aae,2024-07-17T07:15:03.263000
|
||||
CVE-2024-6033,0,0,15c25de796ebfbab9e44a812131dc54f93a03e716bec334742145fa1535f6aae,2024-07-17T07:15:03.263000
|
||||
CVE-2024-6035,0,0,71705709079183c78c8ed383ff1dde0d9a61df1fcd0014b5485dcff6ce00c8bd,2024-07-15T18:15:05.840000
|
||||
CVE-2024-6036,0,0,ec75d3b088377f3e157bda1807d973db13644b79a58ce7816702ab31b3d039ce,2024-07-11T13:05:54.930000
|
||||
CVE-2024-6037,0,0,6693b31ec7c6312863697d20bd04a1bdff52b0f0104cd13eb0277621b822579c,2024-07-11T13:05:54.930000
|
||||
@ -256970,7 +256982,7 @@ CVE-2024-6043,0,0,9a8214fcd16bf01d325c97e688ae6245e010f64d01a5df33ef8c749a0d5352
|
||||
CVE-2024-6044,0,0,4f21043ce144607b18656c689e724820f609703d237d24dbe17227d3f52b49e9,2024-06-17T12:42:04.623000
|
||||
CVE-2024-6045,0,0,efe3be755dfb936847ff2e63b0d55993a7f058e00e5d0482b37d4da99ee94266,2024-06-17T12:42:04.623000
|
||||
CVE-2024-6046,0,0,7dad2a883b5a6da9c2e106a85fbceea037db3e317153d640ef723443f1cc0680,2024-06-18T11:15:52.513000
|
||||
CVE-2024-6047,0,0,64cbd7bb00dd96a251d35b437434b06509bf45d7928521d6c8dc9260967706f3,2024-06-17T14:15:13.040000
|
||||
CVE-2024-6047,0,1,3a90a77d82081ca792239f937c9e32a45aca8eadbd9fe3df9a38e907e2ab40c9,2024-07-17T08:15:02.570000
|
||||
CVE-2024-6048,0,0,c67416098261daba4fbb7cd933140c3939f890be764cfd8ea2022f29e8208654,2024-06-17T12:42:04.623000
|
||||
CVE-2024-6050,0,0,af0f9fc577c3e44fa6616ba0473858c6a88d9ea48cff0078f9cf415e610d9fc1,2024-07-01T16:37:39.040000
|
||||
CVE-2024-6052,0,0,9d100b5523a4d1cbcdb510a0143b4a10e19adddd8504e766934ce961d6d1c643,2024-07-12T13:15:21.680000
|
||||
@ -257086,6 +257098,7 @@ CVE-2024-6215,0,0,720f1739703095287552164316882a6b926c156c15e89c7dc7084a2a8b1f11
|
||||
CVE-2024-6216,0,0,99a638bb9b091862ee1125e5c2af18142e9f2a446dc1f5e54add6d69d774b8bc,2024-06-24T20:15:11.177000
|
||||
CVE-2024-6217,0,0,caeef107ec037a20535b69bf461e75c9da91ce4fd887edb01336f60c235444b1,2024-06-21T11:22:01.687000
|
||||
CVE-2024-6218,0,0,3cb8a30d4ddfe61bdea61d401bfb5f7d243e9ab40309c0377a9f4fcd89ff6826,2024-06-21T15:15:16.547000
|
||||
CVE-2024-6220,1,1,0f2fb7730cf82d192a68e0e93d4a2014d253ff648c0c5f39b2e26f9e11aa8ac6,2024-07-17T08:15:02.730000
|
||||
CVE-2024-6222,0,0,7da69ce6fbc5989cf8dc00c0967cc47c0670f03447330ea36d4de40ed4ce08ae,2024-07-12T17:05:39.070000
|
||||
CVE-2024-6225,0,0,510a69cec2d5d6c6d036e0951030f27f3f34bcc77e3448a2bbf2dbc18120fe93,2024-06-24T19:21:28.450000
|
||||
CVE-2024-6227,0,0,6448b237469b4af8add5bea6ce3efd3ec79e9126dca5090705d4ceeb86be54e2,2024-07-09T18:19:14.047000
|
||||
@ -257227,7 +257240,7 @@ CVE-2024-6461,0,0,86a214d0c7bd3f57cea37cd567b01f1a0e55f8d4342f6c7c46fd15b8942c8d
|
||||
CVE-2024-6463,0,0,f8d7d80ca565804c0caafdbc8214fe1eca7dc83d43861affc813af07365c0cc0,2024-07-03T21:15:04.640000
|
||||
CVE-2024-6464,0,0,8fab89d1b3aef32a257cf0d7fb909cce6ac18d5ef8dc898bb9f0cc6c52356cbf,2024-07-03T21:15:04.697000
|
||||
CVE-2024-6465,0,0,1a52d419caf12d1d223520a109b2aa019665792454012b51a06898ed38739a48,2024-07-15T13:00:34.853000
|
||||
CVE-2024-6467,1,1,83ea8485c4f51411157c8a01fb9be399a5fe9907669d9a8fad6b15129616725c,2024-07-17T07:15:03.493000
|
||||
CVE-2024-6467,0,0,83ea8485c4f51411157c8a01fb9be399a5fe9907669d9a8fad6b15129616725c,2024-07-17T07:15:03.493000
|
||||
CVE-2024-6468,0,0,35510ca663346ec39c4261a703db141288708f1a8a294ff4bff13dfd2b2ac57d,2024-07-12T12:49:11.340000
|
||||
CVE-2024-6469,0,0,8a9cc14cdc15687cebe1f067587bd279bfc289daac6283040462018576c0d534,2024-07-05T17:09:54.870000
|
||||
CVE-2024-6470,0,0,c9a33c23ec7370c50b4df58ad71ec5e181cf8d29947a984c43804e0a58dc7723,2024-07-05T12:55:51.367000
|
||||
@ -257300,11 +257313,11 @@ CVE-2024-6650,0,0,389479cac037eb791bf22f3727c10e60384d8e28492bfb0d0b7873c538245d
|
||||
CVE-2024-6652,0,0,32c4914a2885b2299fef5292f9b5b00052aaeaf4b92ba53d869ce14f17c7c595,2024-07-11T13:05:54.930000
|
||||
CVE-2024-6653,0,0,d93d31cbf15b722e8213bd0a1f350049b73a325a73fea026c81bdae5013a3c4f,2024-07-11T13:15:10.147000
|
||||
CVE-2024-6655,0,0,0485248ee98682a7d1526979650a74114bd662162c8fc1626488ee79436e31bf,2024-07-16T18:00:02.110000
|
||||
CVE-2024-6660,1,1,8420d82493fd4a45d30ce8c67e0a72efbb8840ded71fe90edd6bf51e51d65ad1,2024-07-17T07:15:03.683000
|
||||
CVE-2024-6660,0,0,8420d82493fd4a45d30ce8c67e0a72efbb8840ded71fe90edd6bf51e51d65ad1,2024-07-17T07:15:03.683000
|
||||
CVE-2024-6663,0,0,7facb2637e12709d4a455340194f194dba2537cb44d31c2262ed1aa6b9ebcf89,2024-07-10T21:15:11.463000
|
||||
CVE-2024-6664,0,0,7dcdbd9efac1143da422ef778b0a605b2e75ff3874c65ca5b8e519e1d8523278,2024-07-10T21:15:11.520000
|
||||
CVE-2024-6666,0,0,6ade2353732c66fc20367582756530c33ec26bf7f6989700bd337bd969227f22,2024-07-12T16:46:48.387000
|
||||
CVE-2024-6669,1,1,61a6470650ec4ecffd67c04da2ad00a814e79b0427dcfaa8a7c533cc93f27a07,2024-07-17T07:15:03.873000
|
||||
CVE-2024-6669,0,0,61a6470650ec4ecffd67c04da2ad00a814e79b0427dcfaa8a7c533cc93f27a07,2024-07-17T07:15:03.873000
|
||||
CVE-2024-6676,0,0,b617e99f4ff839e117300b1a5f3c494dc1ceb13864a576e2b1519c7ec5960d34,2024-07-11T13:05:54.930000
|
||||
CVE-2024-6677,0,0,d8004a1441e952f05633a34727a4f9223ac5077c2123fd1507a1955287de18f3,2024-07-12T12:49:07.030000
|
||||
CVE-2024-6679,0,0,193698b3a519c2de1af0fd23f7e404e2d54c730e4704d97d0092b63ef1c81272,2024-07-11T18:09:58.777000
|
||||
|
Can't render this file because it is too large.
|
Loading…
x
Reference in New Issue
Block a user