Auto-Update: 2024-06-13T23:55:17.979785+00:00

This commit is contained in:
cad-safe-bot 2024-06-13 23:58:10 +00:00
parent b621285e78
commit a65cab13d3
27 changed files with 880 additions and 138 deletions

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-4039",
"sourceIdentifier": "arm-security@arm.com",
"published": "2023-09-13T09:15:15.690",
"lastModified": "2024-02-19T23:15:07.680",
"lastModified": "2024-06-13T23:15:50.137",
"vulnStatus": "Modified",
"descriptions": [
{

View File

@ -0,0 +1,55 @@
{
"id": "CVE-2024-0084",
"sourceIdentifier": "psirt@nvidia.com",
"published": "2024-06-13T22:15:11.220",
"lastModified": "2024-06-13T22:15:11.220",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "NVIDIA vGPU software for Linux contains a vulnerability in the Virtual GPU Manager, where the guest OS could execute privileged operations. A successful exploit of this vulnerability might lead to information disclosure, data tampering, escalation of privileges, and denial of service."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "psirt@nvidia.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "psirt@nvidia.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-250"
}
]
}
],
"references": [
{
"url": "https://nvidia.custhelp.com/app/answers/detail/a_id/5551",
"source": "psirt@nvidia.com"
}
]
}

View File

@ -0,0 +1,55 @@
{
"id": "CVE-2024-0085",
"sourceIdentifier": "psirt@nvidia.com",
"published": "2024-06-13T22:15:11.483",
"lastModified": "2024-06-13T22:15:11.483",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "NVIDIA vGPU software for Windows and Linux contains a vulnerability where unprivileged users could execute privileged operations on the host. A successful exploit of this vulnerability might lead to data tampering, escalation of privileges, and denial of service."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "psirt@nvidia.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H",
"attackVector": "LOCAL",
"attackComplexity": "HIGH",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 6.3,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.0,
"impactScore": 5.2
}
]
},
"weaknesses": [
{
"source": "psirt@nvidia.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-266"
}
]
}
],
"references": [
{
"url": "https://nvidia.custhelp.com/app/answers/detail/a_id/5551",
"source": "psirt@nvidia.com"
}
]
}

View File

@ -0,0 +1,55 @@
{
"id": "CVE-2024-0086",
"sourceIdentifier": "psirt@nvidia.com",
"published": "2024-06-13T22:15:11.717",
"lastModified": "2024-06-13T22:15:11.717",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "NVIDIA vGPU software for Linux contains a vulnerability where the software can dereference a NULL pointer. A successful exploit of this vulnerability might lead to denial of service and undefined behavior in the vGPU plugin."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "psirt@nvidia.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "psirt@nvidia.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-476"
}
]
}
],
"references": [
{
"url": "https://nvidia.custhelp.com/app/answers/detail/a_id/5551",
"source": "psirt@nvidia.com"
}
]
}

View File

@ -0,0 +1,55 @@
{
"id": "CVE-2024-0089",
"sourceIdentifier": "psirt@nvidia.com",
"published": "2024-06-13T22:15:11.940",
"lastModified": "2024-06-13T22:15:11.940",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "NVIDIA GPU Display Driver for Windows contains a vulnerability where the information from a previous client or another process could be disclosed. A successful exploit of this vulnerability might lead to code execution, information disclosure, or data tampering."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "psirt@nvidia.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "psirt@nvidia.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-665"
}
]
}
],
"references": [
{
"url": "https://nvidia.custhelp.com/app/answers/detail/a_id/5551",
"source": "psirt@nvidia.com"
}
]
}

View File

@ -0,0 +1,55 @@
{
"id": "CVE-2024-0090",
"sourceIdentifier": "psirt@nvidia.com",
"published": "2024-06-13T22:15:12.170",
"lastModified": "2024-06-13T22:15:12.170",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "NVIDIA GPU driver for Windows and Linux contains a vulnerability where a user can cause an out-of-bounds write. A successful exploit of this vulnerability might lead to code execution, denial of service, escalation of privileges, information disclosure, and data tampering."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "psirt@nvidia.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "psirt@nvidia.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-787"
}
]
}
],
"references": [
{
"url": "https://nvidia.custhelp.com/app/answers/detail/a_id/5551",
"source": "psirt@nvidia.com"
}
]
}

View File

@ -0,0 +1,55 @@
{
"id": "CVE-2024-0091",
"sourceIdentifier": "psirt@nvidia.com",
"published": "2024-06-13T22:15:12.430",
"lastModified": "2024-06-13T22:15:12.430",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "NVIDIA GPU Display Driver for Windows and Linux contains a vulnerability where a user can cause an untrusted pointer dereference by executing a driver API. A successful exploit of this vulnerability might lead to denial of service, information disclosure, and data tampering."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "psirt@nvidia.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "psirt@nvidia.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-822"
}
]
}
],
"references": [
{
"url": "https://nvidia.custhelp.com/app/answers/detail/a_id/5551",
"source": "psirt@nvidia.com"
}
]
}

View File

@ -0,0 +1,55 @@
{
"id": "CVE-2024-0092",
"sourceIdentifier": "psirt@nvidia.com",
"published": "2024-06-13T22:15:12.647",
"lastModified": "2024-06-13T22:15:12.647",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "NVIDIA GPU Driver for Windows and Linux contains a vulnerability where an improper check or improper handling of exception conditions might lead to denial of service."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "psirt@nvidia.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "psirt@nvidia.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-703"
}
]
}
],
"references": [
{
"url": "https://nvidia.custhelp.com/app/answers/detail/a_id/5551",
"source": "psirt@nvidia.com"
}
]
}

View File

@ -0,0 +1,55 @@
{
"id": "CVE-2024-0093",
"sourceIdentifier": "psirt@nvidia.com",
"published": "2024-06-13T22:15:12.863",
"lastModified": "2024-06-13T22:15:12.863",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "NVIDIA GPU software for Linux contains a vulnerability where it can expose sensitive information to an actor that is not explicitly authorized to have access to that information. A successful exploit of this vulnerability might lead to information disclosure."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "psirt@nvidia.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "CHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.0,
"impactScore": 4.0
}
]
},
"weaknesses": [
{
"source": "psirt@nvidia.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-200"
}
]
}
],
"references": [
{
"url": "https://nvidia.custhelp.com/app/answers/detail/a_id/5551",
"source": "psirt@nvidia.com"
}
]
}

View File

@ -0,0 +1,55 @@
{
"id": "CVE-2024-0094",
"sourceIdentifier": "psirt@nvidia.com",
"published": "2024-06-13T22:15:13.080",
"lastModified": "2024-06-13T22:15:13.080",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "NVIDIA vGPU software for Linux contains a vulnerability in the Virtual GPU Manager, where an untrusted guest VM can cause improper control of the interaction frequency in the host. A successful exploit of this vulnerability might lead to denial of service."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "psirt@nvidia.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "psirt@nvidia.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-799"
}
]
}
],
"references": [
{
"url": "https://nvidia.custhelp.com/app/answers/detail/a_id/5551",
"source": "psirt@nvidia.com"
}
]
}

View File

@ -0,0 +1,55 @@
{
"id": "CVE-2024-0095",
"sourceIdentifier": "psirt@nvidia.com",
"published": "2024-06-13T22:15:13.347",
"lastModified": "2024-06-13T22:15:13.347",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "NVIDIA Triton Inference Server for Linux and Windows contains a vulnerability where a user can inject forged logs and executable commands by injecting arbitrary data as a new log entry. A successful exploit of this vulnerability might lead to code execution, denial of service, escalation of privileges, information disclosure, and data tampering."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "psirt@nvidia.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:L/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "NONE",
"scope": "CHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "LOW",
"availabilityImpact": "HIGH",
"baseScore": 9.0,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 2.3,
"impactScore": 6.0
}
]
},
"weaknesses": [
{
"source": "psirt@nvidia.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-117"
}
]
}
],
"references": [
{
"url": "https://nvidia.custhelp.com/app/answers/detail/a_id/5546",
"source": "psirt@nvidia.com"
}
]
}

View File

@ -0,0 +1,55 @@
{
"id": "CVE-2024-0099",
"sourceIdentifier": "psirt@nvidia.com",
"published": "2024-06-13T22:15:13.573",
"lastModified": "2024-06-13T22:15:13.573",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "NVIDIA vGPU software for Linux contains a vulnerability in the Virtual GPU Manager, where the guest OS could cause buffer overrun in the host. A successful exploit of this vulnerability might lead to information disclosure, data tampering, escalation of privileges, and denial of service."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "psirt@nvidia.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "psirt@nvidia.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-120"
}
]
}
],
"references": [
{
"url": "https://nvidia.custhelp.com/app/answers/detail/a_id/5551",
"source": "psirt@nvidia.com"
}
]
}

View File

@ -0,0 +1,43 @@
{
"id": "CVE-2024-0103",
"sourceIdentifier": "psirt@nvidia.com",
"published": "2024-06-13T22:15:13.787",
"lastModified": "2024-06-13T22:15:13.787",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "NVIDIA Triton Inference Server for Linux contains a vulnerability where a user may cause an incorrect Initialization of resource by network issue. A successful exploit of this vulnerability may lead to information disclosure."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "psirt@nvidia.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 5.4,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 2.5
}
]
},
"references": [
{
"url": "https://nvidia.custhelp.com/app/answers/detail/a_id/5546",
"source": "psirt@nvidia.com"
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-30037",
"sourceIdentifier": "secure@microsoft.com",
"published": "2024-05-14T17:17:09.230",
"lastModified": "2024-05-14T19:17:55.627",
"lastModified": "2024-06-13T22:15:15.457",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
@ -21,19 +21,19 @@
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"attackVector": "NETWORK",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH"
"baseScore": 5.5,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 3.9,
"exploitabilityScore": 1.8,
"impactScore": 3.6
}
]

View File

@ -0,0 +1,20 @@
{
"id": "CVE-2024-31777",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-06-13T23:15:50.293",
"lastModified": "2024-06-13T23:15:50.293",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "File Upload vulnerability in openeclass v.3.15 and before allows an attacker to execute arbitrary code via a crafted file to the certbadge.php endpoint."
}
],
"metrics": {},
"references": [
{
"url": "https://github.com/FreySolarEye/Exploit-CVE-2024-31777",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,20 @@
{
"id": "CVE-2024-33253",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-06-13T23:15:50.403",
"lastModified": "2024-06-13T23:15:50.403",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "Cross-site scripting (XSS) vulnerability in GUnet OpenEclass E-learning Platform version 3.15 and before allows a authenticated privileged attacker to execute arbitrary code via the title and description fields of the badge template editing function."
}
],
"metrics": {},
"references": [
{
"url": "https://github.com/FreySolarEye/CVE/blob/master/GUnet%20OpenEclass%20E-learning%20platform%203.15%20-%20%27certbadge.php%27%20Stored%20Cross%20Site%20Scripting",
"source": "cve@mitre.org"
}
]
}

View File

@ -2,16 +2,24 @@
"id": "CVE-2024-37408",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-06-08T14:15:11.307",
"lastModified": "2024-06-10T02:52:08.267",
"lastModified": "2024-06-13T22:15:16.383",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "fprintd through 1.94.3 lacks a security attention mechanism, and thus unexpected actions might be authorized by \"auth sufficient pam_fprintd.so\" for Sudo."
"value": "fprintd through 1.94.3 lacks a security attention mechanism, and thus unexpected actions might be authorized by \"auth sufficient pam_fprintd.so\" for Sudo. NOTE: the supplier disputes this because they believe issue resolution would involve modifying the PAM configuration to restrict pam_fprintd.so to front-ends that implement a proper attention mechanism, not modifying pam_fprintd.so or fprintd."
},
{
"lang": "es",
"value": "fprintd hasta 1.94.3 carece de un mecanismo de atenci\u00f3n de seguridad y, por lo tanto, es posible que se autoricen acciones inesperadas mediante \"auth suficiente pam_fprintd.so\" para Sudo."
}
],
"metrics": {},
"references": [
{
"url": "http://www.openwall.com/lists/oss-security/2024/06/13/3",
"source": "cve@mitre.org"
},
{
"url": "https://gitlab.freedesktop.org/libfprint/fprintd/-/releases",
"source": "cve@mitre.org"
@ -23,6 +31,10 @@
{
"url": "https://www.openwall.com/lists/oss-security/2024/05/30/3",
"source": "cve@mitre.org"
},
{
"url": "https://www.openwall.com/lists/oss-security/2024/06/13/2",
"source": "cve@mitre.org"
}
]
}

View File

@ -2,12 +2,12 @@
"id": "CVE-2024-5688",
"sourceIdentifier": "security@mozilla.org",
"published": "2024-06-11T13:15:50.347",
"lastModified": "2024-06-13T12:15:12.277",
"lastModified": "2024-06-13T23:15:50.490",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "If a garbage collection was triggered at the right time, a use-after-free could have occurred during object transplant. This vulnerability affects Firefox < 127 and Firefox ESR < 115.12."
"value": "If a garbage collection was triggered at the right time, a use-after-free could have occurred during object transplant. This vulnerability affects Firefox < 127, Firefox ESR < 115.12, and Thunderbird < 115.12."
},
{
"lang": "es",
@ -31,6 +31,10 @@
{
"url": "https://www.mozilla.org/security/advisories/mfsa2024-26/",
"source": "security@mozilla.org"
},
{
"url": "https://www.mozilla.org/security/advisories/mfsa2024-28/",
"source": "security@mozilla.org"
}
]
}

View File

@ -2,12 +2,12 @@
"id": "CVE-2024-5690",
"sourceIdentifier": "security@mozilla.org",
"published": "2024-06-11T13:15:50.553",
"lastModified": "2024-06-13T12:15:12.427",
"lastModified": "2024-06-13T23:15:50.570",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "By monitoring the time certain operations take, an attacker could have guessed which external protocol handlers were functional on a user's system. This vulnerability affects Firefox < 127 and Firefox ESR < 115.12."
"value": "By monitoring the time certain operations take, an attacker could have guessed which external protocol handlers were functional on a user's system. This vulnerability affects Firefox < 127, Firefox ESR < 115.12, and Thunderbird < 115.12."
},
{
"lang": "es",
@ -31,6 +31,10 @@
{
"url": "https://www.mozilla.org/security/advisories/mfsa2024-26/",
"source": "security@mozilla.org"
},
{
"url": "https://www.mozilla.org/security/advisories/mfsa2024-28/",
"source": "security@mozilla.org"
}
]
}

View File

@ -2,12 +2,12 @@
"id": "CVE-2024-5691",
"sourceIdentifier": "security@mozilla.org",
"published": "2024-06-11T13:15:50.690",
"lastModified": "2024-06-13T12:15:12.500",
"lastModified": "2024-06-13T23:15:50.640",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "By tricking the browser with a `X-Frame-Options` header, a sandboxed iframe could have presented a button that, if clicked by a user, would bypass restrictions to open a new window. This vulnerability affects Firefox < 127 and Firefox ESR < 115.12."
"value": "By tricking the browser with a `X-Frame-Options` header, a sandboxed iframe could have presented a button that, if clicked by a user, would bypass restrictions to open a new window. This vulnerability affects Firefox < 127, Firefox ESR < 115.12, and Thunderbird < 115.12."
},
{
"lang": "es",
@ -31,6 +31,10 @@
{
"url": "https://www.mozilla.org/security/advisories/mfsa2024-26/",
"source": "security@mozilla.org"
},
{
"url": "https://www.mozilla.org/security/advisories/mfsa2024-28/",
"source": "security@mozilla.org"
}
]
}

View File

@ -2,20 +2,20 @@
"id": "CVE-2024-5692",
"sourceIdentifier": "security@mozilla.org",
"published": "2024-06-11T13:15:50.770",
"lastModified": "2024-06-11T13:54:12.057",
"lastModified": "2024-06-13T23:15:50.707",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "On Windows, when using the 'Save As' functionality, an attacker could have tricked the browser into saving the file with a disallowed extension such as `.url` by including an invalid character in the extension. *Note:* This issue only affected Windows operating systems. Other operating systems are unaffected. This vulnerability affects Firefox < 127 and Firefox ESR < 115.12."
"value": "On Windows 10, when using the 'Save As' functionality, an attacker could have tricked the browser into saving the file with a disallowed extension such as `.url` by including an invalid character in the extension. *Note:* This issue only affected Windows operating systems. Other operating systems are unaffected. This vulnerability affects Firefox < 127, Firefox ESR < 115.12, and Thunderbird < 115.12."
},
{
"lang": "es",
"value": "En Windows, al utilizar la funci\u00f3n \"Guardar como\", un atacante podr\u00eda haber enga\u00f1ado al navegador para que guardara el archivo con una extensi\u00f3n no permitida como \".url\" al incluir un car\u00e1cter no v\u00e1lido en la extensi\u00f3n. *Nota:* Este problema solo afectaba a los sistemas operativos Windows. Otros sistemas operativos no se ven afectados. Esta vulnerabilidad afecta a Firefox &lt; 127 y Firefox ESR &lt; 115.12."
}
],
"metrics": {},
"references": [
{
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1837514",
"source": "security@mozilla.org"
},
{
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1891234",
"source": "security@mozilla.org"
@ -27,6 +27,10 @@
{
"url": "https://www.mozilla.org/security/advisories/mfsa2024-26/",
"source": "security@mozilla.org"
},
{
"url": "https://www.mozilla.org/security/advisories/mfsa2024-28/",
"source": "security@mozilla.org"
}
]
}

View File

@ -2,12 +2,12 @@
"id": "CVE-2024-5693",
"sourceIdentifier": "security@mozilla.org",
"published": "2024-06-11T13:15:50.850",
"lastModified": "2024-06-13T12:15:12.563",
"lastModified": "2024-06-13T23:15:50.787",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "Offscreen Canvas did not properly track cross-origin tainting, which could be used to access image data from another site in violation of same-origin policy. This vulnerability affects Firefox < 127 and Firefox ESR < 115.12."
"value": "Offscreen Canvas did not properly track cross-origin tainting, which could be used to access image data from another site in violation of same-origin policy. This vulnerability affects Firefox < 127, Firefox ESR < 115.12, and Thunderbird < 115.12."
},
{
"lang": "es",
@ -31,6 +31,10 @@
{
"url": "https://www.mozilla.org/security/advisories/mfsa2024-26/",
"source": "security@mozilla.org"
},
{
"url": "https://www.mozilla.org/security/advisories/mfsa2024-28/",
"source": "security@mozilla.org"
}
]
}

View File

@ -2,12 +2,12 @@
"id": "CVE-2024-5696",
"sourceIdentifier": "security@mozilla.org",
"published": "2024-06-11T13:15:51.100",
"lastModified": "2024-06-13T12:15:12.630",
"lastModified": "2024-06-13T23:15:50.863",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "By manipulating the text in an `&lt;input&gt;` tag, an attacker could have caused corrupt memory leading to a potentially exploitable crash. This vulnerability affects Firefox < 127 and Firefox ESR < 115.12."
"value": "By manipulating the text in an `&lt;input&gt;` tag, an attacker could have caused corrupt memory leading to a potentially exploitable crash. This vulnerability affects Firefox < 127, Firefox ESR < 115.12, and Thunderbird < 115.12."
},
{
"lang": "es",
@ -31,6 +31,10 @@
{
"url": "https://www.mozilla.org/security/advisories/mfsa2024-26/",
"source": "security@mozilla.org"
},
{
"url": "https://www.mozilla.org/security/advisories/mfsa2024-28/",
"source": "security@mozilla.org"
}
]
}

View File

@ -2,12 +2,12 @@
"id": "CVE-2024-5700",
"sourceIdentifier": "security@mozilla.org",
"published": "2024-06-11T13:15:51.417",
"lastModified": "2024-06-13T12:15:12.687",
"lastModified": "2024-06-13T23:15:50.943",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "Memory safety bugs present in Firefox 126, Firefox ESR 115.11, and Thunderbird 115.11. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox < 127 and Firefox ESR < 115.12."
"value": "Memory safety bugs present in Firefox 126, Firefox ESR 115.11, and Thunderbird 115.11. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox < 127, Firefox ESR < 115.12, and Thunderbird < 115.12."
},
{
"lang": "es",
@ -31,6 +31,10 @@
{
"url": "https://www.mozilla.org/security/advisories/mfsa2024-26/",
"source": "security@mozilla.org"
},
{
"url": "https://www.mozilla.org/security/advisories/mfsa2024-28/",
"source": "security@mozilla.org"
}
]
}

View File

@ -2,12 +2,12 @@
"id": "CVE-2024-5702",
"sourceIdentifier": "security@mozilla.org",
"published": "2024-06-11T13:15:51.573",
"lastModified": "2024-06-13T12:15:12.750",
"lastModified": "2024-06-13T23:15:51.020",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "Memory corruption in the networking stack could have led to a potentially exploitable crash. This vulnerability affects Firefox < 125 and Firefox ESR < 115.12."
"value": "Memory corruption in the networking stack could have led to a potentially exploitable crash. This vulnerability affects Firefox < 125, Firefox ESR < 115.12, and Thunderbird < 115.12."
},
{
"lang": "es",
@ -31,6 +31,10 @@
{
"url": "https://www.mozilla.org/security/advisories/mfsa2024-26/",
"source": "security@mozilla.org"
},
{
"url": "https://www.mozilla.org/security/advisories/mfsa2024-28/",
"source": "security@mozilla.org"
}
]
}

View File

@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours.
### Last Repository Update
```plain
2024-06-13T22:00:18.562370+00:00
2024-06-13T23:55:17.979785+00:00
```
### Most recent CVE Modification Timestamp synchronized with NVD
```plain
2024-06-13T21:15:57.683000+00:00
2024-06-13T23:15:51.020000+00:00
```
### Last Data Feed Release
@ -33,48 +33,44 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
### Total Number of included CVEs
```plain
254010
254024
```
### CVEs added in the last Commit
Recently added CVEs: `59`
Recently added CVEs: `14`
- [CVE-2024-32916](CVE-2024/CVE-2024-329xx/CVE-2024-32916.json) (`2024-06-13T21:15:55.533`)
- [CVE-2024-32917](CVE-2024/CVE-2024-329xx/CVE-2024-32917.json) (`2024-06-13T21:15:55.603`)
- [CVE-2024-32918](CVE-2024/CVE-2024-329xx/CVE-2024-32918.json) (`2024-06-13T21:15:55.683`)
- [CVE-2024-32919](CVE-2024/CVE-2024-329xx/CVE-2024-32919.json) (`2024-06-13T21:15:55.757`)
- [CVE-2024-32920](CVE-2024/CVE-2024-329xx/CVE-2024-32920.json) (`2024-06-13T21:15:55.830`)
- [CVE-2024-32921](CVE-2024/CVE-2024-329xx/CVE-2024-32921.json) (`2024-06-13T21:15:55.900`)
- [CVE-2024-32922](CVE-2024/CVE-2024-329xx/CVE-2024-32922.json) (`2024-06-13T21:15:55.970`)
- [CVE-2024-32923](CVE-2024/CVE-2024-329xx/CVE-2024-32923.json) (`2024-06-13T21:15:56.040`)
- [CVE-2024-32924](CVE-2024/CVE-2024-329xx/CVE-2024-32924.json) (`2024-06-13T21:15:56.113`)
- [CVE-2024-32925](CVE-2024/CVE-2024-329xx/CVE-2024-32925.json) (`2024-06-13T21:15:56.187`)
- [CVE-2024-32926](CVE-2024/CVE-2024-329xx/CVE-2024-32926.json) (`2024-06-13T21:15:56.253`)
- [CVE-2024-32929](CVE-2024/CVE-2024-329xx/CVE-2024-32929.json) (`2024-06-13T21:15:56.320`)
- [CVE-2024-32930](CVE-2024/CVE-2024-329xx/CVE-2024-32930.json) (`2024-06-13T21:15:56.390`)
- [CVE-2024-38083](CVE-2024/CVE-2024-380xx/CVE-2024-38083.json) (`2024-06-13T20:15:15.157`)
- [CVE-2024-38312](CVE-2024/CVE-2024-383xx/CVE-2024-38312.json) (`2024-06-13T20:15:15.370`)
- [CVE-2024-38313](CVE-2024/CVE-2024-383xx/CVE-2024-38313.json) (`2024-06-13T20:15:15.450`)
- [CVE-2024-4696](CVE-2024/CVE-2024-46xx/CVE-2024-4696.json) (`2024-06-13T20:15:15.697`)
- [CVE-2024-5924](CVE-2024/CVE-2024-59xx/CVE-2024-5924.json) (`2024-06-13T20:15:16.000`)
- [CVE-2024-5947](CVE-2024/CVE-2024-59xx/CVE-2024-5947.json) (`2024-06-13T20:15:16.277`)
- [CVE-2024-5948](CVE-2024/CVE-2024-59xx/CVE-2024-5948.json) (`2024-06-13T20:15:16.497`)
- [CVE-2024-5949](CVE-2024/CVE-2024-59xx/CVE-2024-5949.json) (`2024-06-13T20:15:16.710`)
- [CVE-2024-5950](CVE-2024/CVE-2024-59xx/CVE-2024-5950.json) (`2024-06-13T20:15:16.923`)
- [CVE-2024-5951](CVE-2024/CVE-2024-59xx/CVE-2024-5951.json) (`2024-06-13T20:15:17.140`)
- [CVE-2024-5952](CVE-2024/CVE-2024-59xx/CVE-2024-5952.json) (`2024-06-13T20:15:17.350`)
- [CVE-2024-5976](CVE-2024/CVE-2024-59xx/CVE-2024-5976.json) (`2024-06-13T21:15:57.683`)
- [CVE-2024-0084](CVE-2024/CVE-2024-00xx/CVE-2024-0084.json) (`2024-06-13T22:15:11.220`)
- [CVE-2024-0085](CVE-2024/CVE-2024-00xx/CVE-2024-0085.json) (`2024-06-13T22:15:11.483`)
- [CVE-2024-0086](CVE-2024/CVE-2024-00xx/CVE-2024-0086.json) (`2024-06-13T22:15:11.717`)
- [CVE-2024-0089](CVE-2024/CVE-2024-00xx/CVE-2024-0089.json) (`2024-06-13T22:15:11.940`)
- [CVE-2024-0090](CVE-2024/CVE-2024-00xx/CVE-2024-0090.json) (`2024-06-13T22:15:12.170`)
- [CVE-2024-0091](CVE-2024/CVE-2024-00xx/CVE-2024-0091.json) (`2024-06-13T22:15:12.430`)
- [CVE-2024-0092](CVE-2024/CVE-2024-00xx/CVE-2024-0092.json) (`2024-06-13T22:15:12.647`)
- [CVE-2024-0093](CVE-2024/CVE-2024-00xx/CVE-2024-0093.json) (`2024-06-13T22:15:12.863`)
- [CVE-2024-0094](CVE-2024/CVE-2024-00xx/CVE-2024-0094.json) (`2024-06-13T22:15:13.080`)
- [CVE-2024-0095](CVE-2024/CVE-2024-00xx/CVE-2024-0095.json) (`2024-06-13T22:15:13.347`)
- [CVE-2024-0099](CVE-2024/CVE-2024-00xx/CVE-2024-0099.json) (`2024-06-13T22:15:13.573`)
- [CVE-2024-0103](CVE-2024/CVE-2024-01xx/CVE-2024-0103.json) (`2024-06-13T22:15:13.787`)
- [CVE-2024-31777](CVE-2024/CVE-2024-317xx/CVE-2024-31777.json) (`2024-06-13T23:15:50.293`)
- [CVE-2024-33253](CVE-2024/CVE-2024-332xx/CVE-2024-33253.json) (`2024-06-13T23:15:50.403`)
### CVEs modified in the last Commit
Recently modified CVEs: `4`
Recently modified CVEs: `11`
- [CVE-2024-20404](CVE-2024/CVE-2024-204xx/CVE-2024-20404.json) (`2024-06-13T20:25:46.837`)
- [CVE-2024-36265](CVE-2024/CVE-2024-362xx/CVE-2024-36265.json) (`2024-06-13T21:15:57.170`)
- [CVE-2024-4030](CVE-2024/CVE-2024-40xx/CVE-2024-4030.json) (`2024-06-13T20:15:15.570`)
- [CVE-2024-5758](CVE-2024/CVE-2024-57xx/CVE-2024-5758.json) (`2024-06-13T21:15:57.543`)
- [CVE-2023-4039](CVE-2023/CVE-2023-40xx/CVE-2023-4039.json) (`2024-06-13T23:15:50.137`)
- [CVE-2024-30037](CVE-2024/CVE-2024-300xx/CVE-2024-30037.json) (`2024-06-13T22:15:15.457`)
- [CVE-2024-37408](CVE-2024/CVE-2024-374xx/CVE-2024-37408.json) (`2024-06-13T22:15:16.383`)
- [CVE-2024-5688](CVE-2024/CVE-2024-56xx/CVE-2024-5688.json) (`2024-06-13T23:15:50.490`)
- [CVE-2024-5690](CVE-2024/CVE-2024-56xx/CVE-2024-5690.json) (`2024-06-13T23:15:50.570`)
- [CVE-2024-5691](CVE-2024/CVE-2024-56xx/CVE-2024-5691.json) (`2024-06-13T23:15:50.640`)
- [CVE-2024-5692](CVE-2024/CVE-2024-56xx/CVE-2024-5692.json) (`2024-06-13T23:15:50.707`)
- [CVE-2024-5693](CVE-2024/CVE-2024-56xx/CVE-2024-5693.json) (`2024-06-13T23:15:50.787`)
- [CVE-2024-5696](CVE-2024/CVE-2024-56xx/CVE-2024-5696.json) (`2024-06-13T23:15:50.863`)
- [CVE-2024-5700](CVE-2024/CVE-2024-57xx/CVE-2024-5700.json) (`2024-06-13T23:15:50.943`)
- [CVE-2024-5702](CVE-2024/CVE-2024-57xx/CVE-2024-5702.json) (`2024-06-13T23:15:51.020`)
## Download and Usage

View File

@ -229899,7 +229899,7 @@ CVE-2023-40385,0,0,d87186e65fbe11c963d9f2ac49a37bea6de8f4a87feb525e072522d577fee
CVE-2023-40386,0,0,98b5b9164e51a67fec2b119151c92fd2d9bb1d8d51de82443b681e79ce2c9a34,2023-10-12T01:59:56.563000
CVE-2023-40388,0,0,0669c38434b1494ed261fd2860ebba321deabd42233fd11611759d0565888e20,2023-10-12T01:59:05.793000
CVE-2023-40389,0,0,b193787b70f32e4c09ae93f27d418d82b25a00d1d832a208e6e4bfa799ec5d30,2024-06-12T18:05:20.887000
CVE-2023-4039,0,0,0accd3adc8756cc7a927b7c908e91237d32e08c68f471a1067012290c829eea2,2024-02-19T23:15:07.680000
CVE-2023-4039,0,1,8a91b063ac38fd90ed7bed4b3e92c53ba9e066c93e42a3299a924abadc9f3537,2024-06-13T23:15:50.137000
CVE-2023-40390,0,0,dcc08f1579a2804bdfa75d3a1e4b64bbe4a6a3affb5757b1219cc9eb8124a134,2024-04-08T22:42:58.650000
CVE-2023-40391,0,0,674710606efc5e20f3b4d034fd6151d2f994f0410f8a773be4faafb0e10f357d,2023-11-07T04:20:12.943000
CVE-2023-40392,0,0,84bd7104c6189c2c6e9b4ab3e6ad9d972f95c392c1e5bd1a44d7d7f201861784,2023-12-22T15:18:01.370000
@ -240413,12 +240413,24 @@ CVE-2024-0080,0,0,6c0d206dd91620b9eed7dc804b37cabf92e6b94b99ac768289c8d5abe0e718
CVE-2024-0081,0,0,7224cfd553042ae01e2abfd02f661fee4ab9e15edf612773f3a2b6523001079f,2024-04-08T18:49:25.863000
CVE-2024-0082,0,0,2f8bf036b6ccf9a376740e76b27024fe830e6e0ae585ea5b083515d36ff830e7,2024-04-09T12:48:04.090000
CVE-2024-0083,0,0,ab832b2e89667613797d661d736b6cac31cc3f4854c5fe470b78e46bd7a9f856,2024-04-09T12:48:04.090000
CVE-2024-0084,1,1,cddea74d28673a42c18fb8eb053052c28a8ea2c6607c73a307e73eb37219f680,2024-06-13T22:15:11.220000
CVE-2024-0085,1,1,e6cc6b3c38c7ae8b941a130c98b75e6116f675295bcf978498eb5001aef1da82,2024-06-13T22:15:11.483000
CVE-2024-0086,1,1,bc10c5aaf4c689b85426f7ca796e829e2e5b9eb1e0a42b3098fb4577943e3908,2024-06-13T22:15:11.717000
CVE-2024-0087,0,0,25406cc87c9f090863257773a589a6b71e65ad8d1a37691c9902bbbbb218b668,2024-05-14T16:13:02.773000
CVE-2024-0088,0,0,2bbc671241d85e5f91b28bf53a37285169148e904d0098d3839e6b13627a109f,2024-05-14T16:13:02.773000
CVE-2024-0089,1,1,b978dd92d85bb7adda9e352f196d83a9fc71b62bedf725b09170694ff4d03a06,2024-06-13T22:15:11.940000
CVE-2024-0090,1,1,dd3c726d8d2e08d823624fe2323a674a39110cc04b2cbd20d41e3ab6c24bb344,2024-06-13T22:15:12.170000
CVE-2024-0091,1,1,abc5c30185bed4c257270ecc558db148cc3c475fbc215c8a2a77167cedf7a724,2024-06-13T22:15:12.430000
CVE-2024-0092,1,1,5715c15c31bed55fbc69626a155df4d8ad4965761f22eb93ea1f4a1967e95320,2024-06-13T22:15:12.647000
CVE-2024-0093,1,1,c6baf0498fabbfae66796f92183d09a667efcf96e05a1de81b52177d6f484d0d,2024-06-13T22:15:12.863000
CVE-2024-0094,1,1,e9cb9b2e3122fbc36ead63fa66c995f4b78ce52ff7624939121215ebd4ee7120,2024-06-13T22:15:13.080000
CVE-2024-0095,1,1,22fd4fc84caaaf43a44a21fec1846fdbca9fab0f7c70d56e53e76c3837e2e26c,2024-06-13T22:15:13.347000
CVE-2024-0096,0,0,b12c0b431c02ab9c95cbcff726f23352217766123b79fde967af76821617a93b,2024-05-14T16:13:02.773000
CVE-2024-0097,0,0,c6a65b776deeff11a3f5e884cbd77bfe0346e61623b4473c291407c9481a4930,2024-05-14T16:13:02.773000
CVE-2024-0098,0,0,b4cace3870399ecb99979eca71b219c7793c8ef31a1671c9ccd0779d01666e9a,2024-05-14T16:13:02.773000
CVE-2024-0099,1,1,4aad329fa39aa534c071c489bf2ca8685022bc50bbcafffbc8fa35f8ac9f8084,2024-06-13T22:15:13.573000
CVE-2024-0100,0,0,bbf51d2ce3c3a951e3f6f4fb5d57dd8d1c73fdd75ab0ade8734c57fcf29d357b,2024-05-14T16:13:02.773000
CVE-2024-0103,1,1,3be51ec9527a25e98d1a6ce953f8391d318794be6f19847c24d3744a59bdab90,2024-06-13T22:15:13.787000
CVE-2024-0151,0,0,aafc841cfb528b9ef4d150e11c8565679b9331c9ad5bf3569e38f74d72962c86,2024-04-25T08:15:07.420000
CVE-2024-0154,0,0,fee6d0edd38400fe9a2f331d67a355be9bc81701717352554939ef10dafbbf73,2024-03-13T18:15:58.530000
CVE-2024-0155,0,0,56d3003aea28bbff1e776f33de697fc847d720d7a8270931f6c22f264f5611eb,2024-03-04T13:58:23.447000
@ -242279,7 +242291,7 @@ CVE-2024-2039,0,0,4f1e5a8a814f51edc0234cc5670da2107cc2a93a2ef1eadc628898e3eec44b
CVE-2024-20391,0,0,f91eada0700f8cd9f2eaea2b871ba7d3969d87e51919a0eb478edbaaab6f3a9d,2024-05-15T18:35:11.453000
CVE-2024-20392,0,0,ace66ba4c79c3f433832bd6cfa0988701f79a2b5d6c0fbe5016f71bba33a0a9b,2024-05-15T18:35:11.453000
CVE-2024-20394,0,0,d0e5fc3a79dfeb923dc3f02320ce7649899cba8340301b836f168cfe3139baa9,2024-05-15T18:35:11.453000
CVE-2024-20404,0,1,679bbd668c3128b9d2c298395d952eaf5fd76470dbc9bd0e765678566e0d175f,2024-06-13T20:25:46.837000
CVE-2024-20404,0,0,679bbd668c3128b9d2c298395d952eaf5fd76470dbc9bd0e765678566e0d175f,2024-06-13T20:25:46.837000
CVE-2024-20405,0,0,149a9c8a606eeeb959182d0091d0a52736f4f99f39d68f4aa5b3e1cc0e82374e,2024-06-06T14:17:35.017000
CVE-2024-2041,0,0,f285d116ebee20fb02fc2c7de4f69fe8567e76fe9eda446fb7969801431b3d7d,2024-05-06T14:15:07.747000
CVE-2024-2042,0,0,67e98a9ddaa62c913ab5a6b6d5de4b0b93571e9b9955fcfed7d86ddfd42889ed,2024-03-17T22:38:29.433000
@ -248094,16 +248106,16 @@ CVE-2024-29774,0,0,b6d746daf0a9f89389e69183d03895d6675922cbbb66d6ef5358d6a524251
CVE-2024-29775,0,0,4a09499ff17702a2e8ef2c1074beadb2ac9279eca85d85bf4c2322207b72a707,2024-03-27T15:49:41.437000
CVE-2024-29776,0,0,67fe7261841358aada487500133b48b2c1e7affe235fb97f4d75fa453ac843e5,2024-03-27T15:49:41.437000
CVE-2024-29777,0,0,54aa494ecd6d70eaf7fdbabe1fe6006b3d5e55e70d9a8bd4bbd26e15abfe4f5c,2024-03-27T15:49:41.437000
CVE-2024-29778,1,1,8a718641436ca470f3420eb13edf31309b5ebcfc6400e0e0ddc424075c92115f,2024-06-13T21:15:51.857000
CVE-2024-29778,0,0,8a718641436ca470f3420eb13edf31309b5ebcfc6400e0e0ddc424075c92115f,2024-06-13T21:15:51.857000
CVE-2024-2978,0,0,10402db073fcc83eb9c3960e5a0172007bd5a71eeec44391bbdfbccc34dc921e,2024-05-17T02:38:40.007000
CVE-2024-29780,1,1,7802345143c1619102c67c551a62c310bd5fc69bd720130093ed8c9bb372aa59,2024-06-13T21:15:51.950000
CVE-2024-29781,1,1,bed393c098e2681374eac2c9288454d19f596a9774c7555c8eebfe834ab95203,2024-06-13T21:15:52.027000
CVE-2024-29780,0,0,7802345143c1619102c67c551a62c310bd5fc69bd720130093ed8c9bb372aa59,2024-06-13T21:15:51.950000
CVE-2024-29781,0,0,bed393c098e2681374eac2c9288454d19f596a9774c7555c8eebfe834ab95203,2024-06-13T21:15:52.027000
CVE-2024-29782,0,0,b3ef752bb36677cb2cb857b2f5c52a9011917aac03b1bfb7c687eea310dd8059,2024-04-08T18:49:25.863000
CVE-2024-29783,0,0,cd9af9ff3159d1cd0b45408995f42f2ac24497312e47148a7866abe02669b66b,2024-04-08T18:49:25.863000
CVE-2024-29784,1,1,fc0d729986474cadde2d53e992ff7f51485e2d06c64fd9547c226d773e334fdb,2024-06-13T21:15:52.110000
CVE-2024-29785,1,1,95648056c6a9eb834d3af9ec1f16ee22c4b651a39fd284e8b0edeb47168bf276,2024-06-13T21:15:52.180000
CVE-2024-29786,1,1,b6192be3fe5733eace50426231d6f96b4d98a023f430826742b8d3127e2d60a3,2024-06-13T21:15:52.257000
CVE-2024-29787,1,1,2a6d0688478393ca28f01d5ffb5ff8d7c3ff8300a1fc0d86ee9f71072e4e1726,2024-06-13T21:15:52.340000
CVE-2024-29784,0,0,fc0d729986474cadde2d53e992ff7f51485e2d06c64fd9547c226d773e334fdb,2024-06-13T21:15:52.110000
CVE-2024-29785,0,0,95648056c6a9eb834d3af9ec1f16ee22c4b651a39fd284e8b0edeb47168bf276,2024-06-13T21:15:52.180000
CVE-2024-29786,0,0,b6192be3fe5733eace50426231d6f96b4d98a023f430826742b8d3127e2d60a3,2024-06-13T21:15:52.257000
CVE-2024-29787,0,0,2a6d0688478393ca28f01d5ffb5ff8d7c3ff8300a1fc0d86ee9f71072e4e1726,2024-06-13T21:15:52.340000
CVE-2024-29788,0,0,8cc2af0c2b669256f5779a8a4a350af2b3525bc2e92357d3051a10e492c80e6c,2024-03-27T15:49:41.437000
CVE-2024-29789,0,0,28405d77cf9c690089caf44c730ea92c38ee335fb6ea974e0cc4c214ee7b123f,2024-03-27T15:49:41.437000
CVE-2024-2979,0,0,a292112e5c65c94cb7e5874aae33d26b8dd263e3daabe71788a5100e1cf8c075,2024-05-17T02:38:40.103000
@ -248348,7 +248360,7 @@ CVE-2024-30033,0,0,b411a2278af43a886a8aa482d52ba3ed702c53132871079531ef850272463
CVE-2024-30034,0,0,69b281fa5aee5765aa125d534a8a079fce8123d2977fb1d95f599f58514bf564,2024-05-14T19:17:55.627000
CVE-2024-30035,0,0,947badd97d18e7f340082ceed97b210357a7664e632f5b5ee2005d39c0016518,2024-05-14T19:17:55.627000
CVE-2024-30036,0,0,b1782da56fbc83d6b8fbafbfc28caaaa78d453820e3c6685ec2688cfdeb8dcc6,2024-05-14T19:17:55.627000
CVE-2024-30037,0,0,aee6371facd2d1d803a16e5888d4299f4b0dd2a517d910232d799943cc75ec90,2024-05-14T19:17:55.627000
CVE-2024-30037,0,1,20048f18f5498b2c7feb887e7277573261a025ffd35c0bc921d6f1dee70daeb0,2024-06-13T22:15:15.457000
CVE-2024-30038,0,0,3b876f89e14b9888fa5b54633c0f997357340a4ca7f76cc36956a7e9d05bf185,2024-05-14T19:17:55.627000
CVE-2024-30039,0,0,f566a6095a4d4ae13391f05ffd28cab0d3652edc21e2084c844f84ab5713ba0d,2024-05-14T19:17:55.627000
CVE-2024-3004,0,0,71915e722368909e423f6605c1a39e80314174f154a05fc792029d08b4718587,2024-05-17T02:39:40.003000
@ -248370,8 +248382,8 @@ CVE-2024-30053,0,0,de0d3887ecd8088140dfe95e3f9311cc6a39bee41667e1f60a9fd1f03b4a7
CVE-2024-30054,0,0,4bef1769b874d4ff9047765ac17cb428233424000152b0497aba8ed1ea3cade9,2024-05-14T19:17:55.627000
CVE-2024-30055,0,0,3c1bf54fd3fe6c5ab3703162f359c88c3cd7915d8f1fdb651cdd28bec89280a6,2024-05-15T20:15:11.047000
CVE-2024-30056,0,0,9eabc96ede995114869bb3aef4380d7f915e132e425ada2ef8ddea79edd8b89e,2024-05-28T12:39:42.673000
CVE-2024-30057,1,1,d5e3adb37d1f3ad2da847fb50797f1b6f031b08de200c44b22c90d35d987b71d,2024-06-13T20:15:12.457000
CVE-2024-30058,1,1,7766eefaf7fc95d86cd9d3256ef1da696e5213ada40115dc1e9b307bb0b64114,2024-06-13T20:15:12.670000
CVE-2024-30057,0,0,d5e3adb37d1f3ad2da847fb50797f1b6f031b08de200c44b22c90d35d987b71d,2024-06-13T20:15:12.457000
CVE-2024-30058,0,0,7766eefaf7fc95d86cd9d3256ef1da696e5213ada40115dc1e9b307bb0b64114,2024-06-13T20:15:12.670000
CVE-2024-30059,0,0,0e87263445f5c97fb9a9f1ad7d5045c3390ca52e934287a08ee2b0f2dd5a42eb,2024-05-14T19:17:55.627000
CVE-2024-3006,0,0,a3349f2fae283580197c9d70e5010e27f73c2425a5df8de3e4af5a848c49e4b6,2024-05-17T02:39:40.117000
CVE-2024-30060,0,0,2d2a2a35846e7a2325ed3d83fd6e93b127058a9b2ed174c7bcd985716e44cfaf,2024-05-17T18:36:05.263000
@ -249480,6 +249492,7 @@ CVE-2024-31759,0,0,7081cd22df5b9e4148ecc914176fc1f6cc04366073f8b1e4eccd8dfe4f2b7
CVE-2024-31760,0,0,7b1e0b53a94a63e7f108110799c5f85524efc23136fc5608e680b8482e690959,2024-04-17T12:48:07.510000
CVE-2024-3177,0,0,2008ffebb66b0a61152f0f24ed9f05ce25f1281b7375beddcc0948be7704366a,2024-05-01T19:15:27.480000
CVE-2024-31771,0,0,ff8520be95214caa53c179db5203622a3ac8aab5fb79285b7e95c6c65d540f74,2024-05-14T16:12:23.490000
CVE-2024-31777,1,1,224f0da87d959a08e36c1e4bce58e8f5e23291a0edcaaccc1c5b86a921d61a27,2024-06-13T23:15:50.293000
CVE-2024-3178,0,0,e1b2edc538f836ffb506a17d476e0f961db2588242ddd1b2358ad3487cd818bf,2024-04-04T12:48:41.700000
CVE-2024-31783,0,0,39c4df7f07fa9e66dc5d42dd16bc0981c0d6511a0c96852796a6de0ccb03c2ac,2024-04-16T13:24:07.103000
CVE-2024-31784,0,0,0055eda0e2e2e3cebbac3d895c086f3674073feab99e847bee4ca99f9495a801,2024-04-16T13:24:07.103000
@ -250265,48 +250278,48 @@ CVE-2024-32887,0,0,9a0b5c279911d37e81f985d5cbe7f0510b3ecf67815d6d232314f8cb4e8f9
CVE-2024-32888,0,0,7a68ca18ce854868222b80336c9ae247321c1bc54ae858519ceac6d797dd7bd4,2024-05-15T16:40:19.330000
CVE-2024-3289,0,0,0a89519093f9cc15ad64192809f4f71759d5d5d9d17d2eddf005a9c4c6b81228,2024-05-17T18:35:35.070000
CVE-2024-32890,0,0,80b53d257dbc47827b967a6ec22fc70e9bb39dae5de4579c97bb47ad58884e95,2024-05-01T13:01:51.263000
CVE-2024-32891,1,1,85b564811297ebec4f8663a58fa9364ac403718e5bf238a246f9d11fb3faf0d0,2024-06-13T21:15:53.690000
CVE-2024-32892,1,1,e73b8a4820f61bd178e8629b09756f338bd616344ecd2856f97969dffc0f679b,2024-06-13T21:15:53.770000
CVE-2024-32893,1,1,339c538e4788c458fdfb7aba0edb59af876f00fd3b910d1dd2b3d36ebf1fe5c2,2024-06-13T21:15:53.847000
CVE-2024-32894,1,1,f91cedc5de6cd6d870da9ff0ae7296610b084efc3648b4238c32c359970437dd,2024-06-13T21:15:53.923000
CVE-2024-32895,1,1,a0a4fee8c3aec54bb4ec7888ee8f1af92e0d465fb72b3299ecb14b1d2f20e2bb,2024-06-13T21:15:53.997000
CVE-2024-32896,1,1,de529b91864e2fe98f3df7a3bb5319783bdcb2c0402eb656f4bcff344e51f0df,2024-06-13T21:15:54.080000
CVE-2024-32897,1,1,28804992e3942abd3cefccf3bd29be764363b156432b85fbc5d5b2a87bf4b1b8,2024-06-13T21:15:54.150000
CVE-2024-32898,1,1,25086db624d94ec865dc32501d0c7098aac9c8edc3828da3895f3f904fba3faa,2024-06-13T21:15:54.223000
CVE-2024-32899,1,1,755df3b1fe5c9c27a6b24bcd95b015e0049ed15bb0e6ff4b663b012b4e0fe5db,2024-06-13T21:15:54.287000
CVE-2024-32891,0,0,85b564811297ebec4f8663a58fa9364ac403718e5bf238a246f9d11fb3faf0d0,2024-06-13T21:15:53.690000
CVE-2024-32892,0,0,e73b8a4820f61bd178e8629b09756f338bd616344ecd2856f97969dffc0f679b,2024-06-13T21:15:53.770000
CVE-2024-32893,0,0,339c538e4788c458fdfb7aba0edb59af876f00fd3b910d1dd2b3d36ebf1fe5c2,2024-06-13T21:15:53.847000
CVE-2024-32894,0,0,f91cedc5de6cd6d870da9ff0ae7296610b084efc3648b4238c32c359970437dd,2024-06-13T21:15:53.923000
CVE-2024-32895,0,0,a0a4fee8c3aec54bb4ec7888ee8f1af92e0d465fb72b3299ecb14b1d2f20e2bb,2024-06-13T21:15:53.997000
CVE-2024-32896,0,0,de529b91864e2fe98f3df7a3bb5319783bdcb2c0402eb656f4bcff344e51f0df,2024-06-13T21:15:54.080000
CVE-2024-32897,0,0,28804992e3942abd3cefccf3bd29be764363b156432b85fbc5d5b2a87bf4b1b8,2024-06-13T21:15:54.150000
CVE-2024-32898,0,0,25086db624d94ec865dc32501d0c7098aac9c8edc3828da3895f3f904fba3faa,2024-06-13T21:15:54.223000
CVE-2024-32899,0,0,755df3b1fe5c9c27a6b24bcd95b015e0049ed15bb0e6ff4b663b012b4e0fe5db,2024-06-13T21:15:54.287000
CVE-2024-3290,0,0,0ad1b84ced42c9f8a7789dc01b4a01dc3eea4ac518ae7e87d453cc71fd0f450a,2024-05-17T18:35:35.070000
CVE-2024-32900,1,1,277b4f982dcfacfa482a4d75978e486293edd2b447d1ac7b573afc1e47d52e59,2024-06-13T21:15:54.357000
CVE-2024-32901,1,1,b0f4d8b3bcdd91b0f5134bb8e64609b9ecb7aabc85e6f1be896d71b89f6773bc,2024-06-13T21:15:54.430000
CVE-2024-32902,1,1,eb30f23ccbbf2cf04e66ff15216f5746bd650f99b19ae2d32bb3d62c2d645ff4,2024-06-13T21:15:54.503000
CVE-2024-32903,1,1,25987070399c9242a9ac4ebfb37a4b23fa32e69d6ae2807cbeadf6c5d235733b,2024-06-13T21:15:54.583000
CVE-2024-32904,1,1,de2fa0318c46fc79646e6c8f708753cbe6aa522354a94e0381989e53c52c3ecb,2024-06-13T21:15:54.657000
CVE-2024-32905,1,1,b17e9363d0117717c19a91f391a4b55cac4d51cb3c377c18afd82a5921c9cac1,2024-06-13T21:15:54.730000
CVE-2024-32906,1,1,f52365aab62a8ed59d394f7d4d4407d57c818701629734daaaa2c835eac70fd4,2024-06-13T21:15:54.810000
CVE-2024-32907,1,1,38db2bd69bab006cea8dc7366c264ebac8ece7afe445dd9f9acbee3714756e3e,2024-06-13T21:15:54.877000
CVE-2024-32908,1,1,9a993047e6a504e808699944f01196b4054511324e77afe16101f58bfc40444a,2024-06-13T21:15:54.957000
CVE-2024-32909,1,1,131b0130e81a1757e7fbd3318e5071bc192edda314835e7e2ab0ee23f2195e70,2024-06-13T21:15:55.027000
CVE-2024-32900,0,0,277b4f982dcfacfa482a4d75978e486293edd2b447d1ac7b573afc1e47d52e59,2024-06-13T21:15:54.357000
CVE-2024-32901,0,0,b0f4d8b3bcdd91b0f5134bb8e64609b9ecb7aabc85e6f1be896d71b89f6773bc,2024-06-13T21:15:54.430000
CVE-2024-32902,0,0,eb30f23ccbbf2cf04e66ff15216f5746bd650f99b19ae2d32bb3d62c2d645ff4,2024-06-13T21:15:54.503000
CVE-2024-32903,0,0,25987070399c9242a9ac4ebfb37a4b23fa32e69d6ae2807cbeadf6c5d235733b,2024-06-13T21:15:54.583000
CVE-2024-32904,0,0,de2fa0318c46fc79646e6c8f708753cbe6aa522354a94e0381989e53c52c3ecb,2024-06-13T21:15:54.657000
CVE-2024-32905,0,0,b17e9363d0117717c19a91f391a4b55cac4d51cb3c377c18afd82a5921c9cac1,2024-06-13T21:15:54.730000
CVE-2024-32906,0,0,f52365aab62a8ed59d394f7d4d4407d57c818701629734daaaa2c835eac70fd4,2024-06-13T21:15:54.810000
CVE-2024-32907,0,0,38db2bd69bab006cea8dc7366c264ebac8ece7afe445dd9f9acbee3714756e3e,2024-06-13T21:15:54.877000
CVE-2024-32908,0,0,9a993047e6a504e808699944f01196b4054511324e77afe16101f58bfc40444a,2024-06-13T21:15:54.957000
CVE-2024-32909,0,0,131b0130e81a1757e7fbd3318e5071bc192edda314835e7e2ab0ee23f2195e70,2024-06-13T21:15:55.027000
CVE-2024-3291,0,0,d6a19598f7e10a631d5bbcd1a2f750e23f4c80cd3459568e72df6ee3f204db32,2024-05-17T18:35:35.070000
CVE-2024-32910,1,1,c6af37bd024580e75685c21d7f4e8f3907f49b5b02cae143cbcaad999157d92b,2024-06-13T21:15:55.103000
CVE-2024-32911,1,1,b5fb20bb3c40facf053563c01555f6a64079b16a77de849095ad13c97aa8e29a,2024-06-13T21:15:55.173000
CVE-2024-32912,1,1,634135885a509e4a36f045a3a779195f5688657db04a4f1d25901d799fea109d,2024-06-13T21:15:55.250000
CVE-2024-32913,1,1,3a92d4db03d0e1c47d50821e644dd0568afc633181faaac212bfeb54e3fe52a0,2024-06-13T21:15:55.327000
CVE-2024-32914,1,1,09469046ba0919481434190bd20c4494739c17132285ad72a41cac93a026a08b,2024-06-13T21:15:55.393000
CVE-2024-32915,1,1,79a72f225ed03e5ed840c3187e9c5bd2f6e55904bdbe8be321127bf9f662f181,2024-06-13T21:15:55.467000
CVE-2024-32916,1,1,c6d38e31c2d7ba0ea2ec2173b989a7a4fb42083089fbbf95bc4d07149201742d,2024-06-13T21:15:55.533000
CVE-2024-32917,1,1,06d09fcd9d5781bb2443e5b7dd5e8b1d4dacee8be51c939ee27bccfe350d9570,2024-06-13T21:15:55.603000
CVE-2024-32918,1,1,0c0d5094b3f81675ef9244e32cc3ddc21eaf6e4786d7655f08fbff5a341ead45,2024-06-13T21:15:55.683000
CVE-2024-32919,1,1,c634cc79d645f0b257a982cfcb864d6dc70931fd2bcd1ce4f8207b26fdebf775,2024-06-13T21:15:55.757000
CVE-2024-32910,0,0,c6af37bd024580e75685c21d7f4e8f3907f49b5b02cae143cbcaad999157d92b,2024-06-13T21:15:55.103000
CVE-2024-32911,0,0,b5fb20bb3c40facf053563c01555f6a64079b16a77de849095ad13c97aa8e29a,2024-06-13T21:15:55.173000
CVE-2024-32912,0,0,634135885a509e4a36f045a3a779195f5688657db04a4f1d25901d799fea109d,2024-06-13T21:15:55.250000
CVE-2024-32913,0,0,3a92d4db03d0e1c47d50821e644dd0568afc633181faaac212bfeb54e3fe52a0,2024-06-13T21:15:55.327000
CVE-2024-32914,0,0,09469046ba0919481434190bd20c4494739c17132285ad72a41cac93a026a08b,2024-06-13T21:15:55.393000
CVE-2024-32915,0,0,79a72f225ed03e5ed840c3187e9c5bd2f6e55904bdbe8be321127bf9f662f181,2024-06-13T21:15:55.467000
CVE-2024-32916,0,0,c6d38e31c2d7ba0ea2ec2173b989a7a4fb42083089fbbf95bc4d07149201742d,2024-06-13T21:15:55.533000
CVE-2024-32917,0,0,06d09fcd9d5781bb2443e5b7dd5e8b1d4dacee8be51c939ee27bccfe350d9570,2024-06-13T21:15:55.603000
CVE-2024-32918,0,0,0c0d5094b3f81675ef9244e32cc3ddc21eaf6e4786d7655f08fbff5a341ead45,2024-06-13T21:15:55.683000
CVE-2024-32919,0,0,c634cc79d645f0b257a982cfcb864d6dc70931fd2bcd1ce4f8207b26fdebf775,2024-06-13T21:15:55.757000
CVE-2024-3292,0,0,43f6739e46180efa62ee88963aa9d9ac054bdf0e1bbbe57f2f9425d637d500e8,2024-05-17T18:35:35.070000
CVE-2024-32920,1,1,c8432389271b281b5ccf18e0edf706b40f78e2f4e49aaffa2637063886c57c21,2024-06-13T21:15:55.830000
CVE-2024-32921,1,1,6434ebe4ee194dd02b17a4784db476e1feaa8cfd811a09f572fbc7b48f12d32f,2024-06-13T21:15:55.900000
CVE-2024-32922,1,1,430650bbbbc75aa89e2dd6c5dd9d974e8e40b0b9e2ad7e5e1d7962fb032a370a,2024-06-13T21:15:55.970000
CVE-2024-32923,1,1,16a7432f1899ad0a70547087ee74d4317b8d33055e4a7b4bfbfb16f1a2d46e34,2024-06-13T21:15:56.040000
CVE-2024-32924,1,1,f382d398018cffe1276d711482924dfd801192ea874e54c25f5233aa58c4823e,2024-06-13T21:15:56.113000
CVE-2024-32925,1,1,57d6752b420e64440ab146f56d2f39ba5082666edac7e33470336ce01a179ed7,2024-06-13T21:15:56.187000
CVE-2024-32926,1,1,b759c87f12d42f71c65baaeccec7bd569f331f9b7c69c54e01d7b328e7252ab8,2024-06-13T21:15:56.253000
CVE-2024-32929,1,1,a76b7508102acd004ab9a23f5346aa9994deb585f17bb0d53ee2f8cf847fa475,2024-06-13T21:15:56.320000
CVE-2024-32920,0,0,c8432389271b281b5ccf18e0edf706b40f78e2f4e49aaffa2637063886c57c21,2024-06-13T21:15:55.830000
CVE-2024-32921,0,0,6434ebe4ee194dd02b17a4784db476e1feaa8cfd811a09f572fbc7b48f12d32f,2024-06-13T21:15:55.900000
CVE-2024-32922,0,0,430650bbbbc75aa89e2dd6c5dd9d974e8e40b0b9e2ad7e5e1d7962fb032a370a,2024-06-13T21:15:55.970000
CVE-2024-32923,0,0,16a7432f1899ad0a70547087ee74d4317b8d33055e4a7b4bfbfb16f1a2d46e34,2024-06-13T21:15:56.040000
CVE-2024-32924,0,0,f382d398018cffe1276d711482924dfd801192ea874e54c25f5233aa58c4823e,2024-06-13T21:15:56.113000
CVE-2024-32925,0,0,57d6752b420e64440ab146f56d2f39ba5082666edac7e33470336ce01a179ed7,2024-06-13T21:15:56.187000
CVE-2024-32926,0,0,b759c87f12d42f71c65baaeccec7bd569f331f9b7c69c54e01d7b328e7252ab8,2024-06-13T21:15:56.253000
CVE-2024-32929,0,0,a76b7508102acd004ab9a23f5346aa9994deb585f17bb0d53ee2f8cf847fa475,2024-06-13T21:15:56.320000
CVE-2024-3293,0,0,3552485a27a6b6c8b2cadd17fbdb3e630238722099a3e2d8d97b0f239cd2dc1a,2024-04-23T12:52:26.253000
CVE-2024-32930,1,1,c9a3dad6bacf07a79351e96d07f8f4de90b7c4d08a67481c973c36f158c5884c,2024-06-13T21:15:56.390000
CVE-2024-32930,0,0,c9a3dad6bacf07a79351e96d07f8f4de90b7c4d08a67481c973c36f158c5884c,2024-06-13T21:15:56.390000
CVE-2024-32944,0,0,357727703d6a86b0d608eb9af0488af030fe8a85e9a27818f7be4cd525bf7172,2024-05-28T12:39:28.377000
CVE-2024-32947,0,0,35287e8f28304ee9599f9712f94ac6e419772e1d66820555100faf85f8aeebf3,2024-04-24T17:16:50.397000
CVE-2024-32948,0,0,b7a98470b717d7f23ae7cba102d8685641e5b820f696ab6effba04fa32abb77f,2024-04-24T13:39:42.883000
@ -250429,6 +250442,7 @@ CVE-2024-33228,0,0,f3448597a287250f65febdc50573b1814b9e5e5281e20e4e28a9c439a03cb
CVE-2024-3323,0,0,5322a19626f9d41fbc85f0f073b4efac313efc9902bda6b2387f115ed4ea09c7,2024-04-17T20:08:21.887000
CVE-2024-33247,0,0,66af889d7e6ada10bf314bd53454c582a1455dd661c7cb5b07f6d9cd6d1d400f,2024-04-25T13:18:02.660000
CVE-2024-33250,0,0,80f5075a1ccdf0bbe31bc42b408e98f86c2ee0faa43a99a4e3de76f2fa1f2732,2024-05-14T16:12:23.490000
CVE-2024-33253,1,1,8dbedfd6e95946805a7cb4e3afdd8986042b4f8223267a8c40771a7120245aa0,2024-06-13T23:15:50.403000
CVE-2024-33255,0,0,4441e8c613117278c3bbaacb9c21a29fddafcd2bd1cac93b64de97baf3c9b0be,2024-04-26T15:32:22.523000
CVE-2024-33258,0,0,41d7b4e3d9e09b0d296b620041fceccfb75290061ed11a54c972d58a06b97783,2024-04-26T15:32:22.523000
CVE-2024-33259,0,0,80423b2f2a5ed9315f035176a4b15dcc22cbb638669092343148bea0fa9d0be1,2024-04-26T15:32:22.523000
@ -252197,7 +252211,7 @@ CVE-2024-36255,0,0,22b21684452ad4563618ad5cee66dc719af723b04c8a1647fe9cf6d970347
CVE-2024-3626,0,0,668faec6d18ac8a7c33197af94901aaf7ddac1dec4c77c1d646fba224d5f8541,2024-05-24T01:15:30.977000
CVE-2024-36263,0,0,8fc77ae12c809e003508687bca8ef69500efdb9e489f26efe8ffb68dd267fd3b,2024-06-13T18:36:09.010000
CVE-2024-36264,0,0,3852f3a1f0d8a2d4f62090f3b6254d16b37a584c2a4799814e318aea1f24146e,2024-06-13T18:36:09.010000
CVE-2024-36265,0,1,00a9e362e8a489eb7027d68fd71b14b08824e37d9652a79a38b01c7bc61baef1,2024-06-13T21:15:57.170000
CVE-2024-36265,0,0,00a9e362e8a489eb7027d68fd71b14b08824e37d9652a79a38b01c7bc61baef1,2024-06-13T21:15:57.170000
CVE-2024-36266,0,0,83df454a9d264cabc9c075046ae12e249cd453c24f6de612ee1d9f73df0ef774,2024-06-11T13:54:12.057000
CVE-2024-36267,0,0,5b402628b4c430b8eab614a5b3330f6f2d186537f83ff9a60bb1a91e4b3c3cac,2024-05-30T13:15:41.297000
CVE-2024-3628,0,0,ad2a38a3d431944b5239dd67ace3bcd2603e3057c8d0a04d847db45516b0c9ea,2024-05-07T13:39:32.710000
@ -252583,7 +252597,7 @@ CVE-2024-3739,0,0,18ca969c974b63c6d16494fbcc2d63756747cacc5947332fefb20d9c592537
CVE-2024-37393,0,0,adb4710ef8d4e8e5b898aa80bff6a41a92b599e232f1db44a8b62c91938837ef,2024-06-12T17:56:23.390000
CVE-2024-3740,0,0,1025f598f3437296a5a18526d2723c88eb3b5b46ea06c50b765dc694c6a0bd1a,2024-05-17T02:40:06.170000
CVE-2024-37407,0,0,aec5c198a3463e3996afdb2b87dcd156119620da199d8e9853297e329cd2e74b,2024-06-10T02:52:08.267000
CVE-2024-37408,0,0,43de84338ac833cd78092ec836ae8beffbac830f1aa1a52e6c8ca816bfb77c27,2024-06-10T02:52:08.267000
CVE-2024-37408,0,1,0d464a9182b8796127fe76e81543c3cd0ff4f74d6140915de1bb8aefdfd33a67,2024-06-13T22:15:16.383000
CVE-2024-3741,0,0,a12bddc029cd8ca7f24831417695630babe629dc15b981c15e3d0a9ffa405fdc,2024-05-28T17:15:11.327000
CVE-2024-3742,0,0,78c61e704f37a9137f7f9be10f02b0ed07c0bef31d61c3d6452a359112382921,2024-05-28T17:15:11.450000
CVE-2024-3743,0,0,a066d49023268d129172d910e0990b3a457ebf914ca5a08a9f020fc0da48a3af,2024-05-02T18:00:37.360000
@ -252657,7 +252671,7 @@ CVE-2024-3804,0,0,6cbbef68e2216a1b6714fc89ff2a16fd432ad36dd1cabadaff597df2e56ce6
CVE-2024-3806,0,0,de873f8585a077f47d9a3aa2ddc3d8a1a22e9124cbb6f60c98787e1f14a35570,2024-05-14T16:11:39.510000
CVE-2024-3807,0,0,0018248fbe5cd3ad3d19de6c834f7e1f73352b7bbd9c92aa03f6a65e0b3f3d96,2024-05-14T16:11:39.510000
CVE-2024-3808,0,0,39d88812c006142e5fcd1316bc5358a96100b3e812a4968772ff781eaaa6617c,2024-05-14T16:11:39.510000
CVE-2024-38083,1,1,90c00a7e126d0ca34cbb6d6ad2c3a0aca252abe0bc479951447196a92586f216,2024-06-13T20:15:15.157000
CVE-2024-38083,0,0,90c00a7e126d0ca34cbb6d6ad2c3a0aca252abe0bc479951447196a92586f216,2024-06-13T20:15:15.157000
CVE-2024-3809,0,0,a034925aa5fbdeb8d8f213935fba76e152f9c290a4a5d18c12398fefebad7ce4,2024-05-14T16:11:39.510000
CVE-2024-3810,0,0,915db751860884c5792da450ac833c5ebf7363681c09a171e26d38502a8840c3,2024-05-20T13:00:34.807000
CVE-2024-3811,0,0,06c7e681130e5c23fc15839cbcd4895e2d61ac5545ff467d39f3bf28a1e3b8cd,2024-05-20T13:00:34.807000
@ -252684,8 +252698,8 @@ CVE-2024-38293,0,0,a9b1fe23a5b7aceb305df22b9e5e69d11cc40f1bf66bedc9fa76d7158e801
CVE-2024-38294,0,0,5ead4befff2b61ceb0efdd186e7234e4e666514924ffa35ab4e04f3aea639e9b,2024-06-13T18:36:09.010000
CVE-2024-38295,0,0,c0872c7c53c37c26d78f688a94fd2e7f57965fc18ec3a253d1cbc168692f708b,2024-06-13T18:36:09.010000
CVE-2024-3831,0,0,28fa4e2fb2524144138a610966fa5501c7b19e1083bb04e4062bd6679bbd2a31,2024-05-14T16:11:39.510000
CVE-2024-38312,1,1,81465ae5bdee0fc9336a542d9a86c0bbc552d86e5cf73dddb2bfb97008d1e27a,2024-06-13T20:15:15.370000
CVE-2024-38313,1,1,627d40d28ae10d38e3b284ae2e4544be4d3fd31da53264defcd3ebc8d60f359a,2024-06-13T20:15:15.450000
CVE-2024-38312,0,0,81465ae5bdee0fc9336a542d9a86c0bbc552d86e5cf73dddb2bfb97008d1e27a,2024-06-13T20:15:15.370000
CVE-2024-38313,0,0,627d40d28ae10d38e3b284ae2e4544be4d3fd31da53264defcd3ebc8d60f359a,2024-06-13T20:15:15.450000
CVE-2024-3832,0,0,1075b96952121645fbb81b228e0c3813e39db7e21c4c9aa1fc24c30b61618c13,2024-04-23T18:15:15.187000
CVE-2024-3833,0,0,ba630503495cf2aaf1fce7ce704a30930ed35eb1665a53e19102e8c18f607a36,2024-05-03T03:16:28.940000
CVE-2024-3834,0,0,a6e69ceb5a64ba9dfba23cdfa4c02e2549bf746772815229f9a627159689f77e,2024-05-03T04:15:09.043000
@ -252821,7 +252835,7 @@ CVE-2024-4022,0,0,862692e09b9131698fdf2d078f1715a141df0663671065e383928a8148e4ca
CVE-2024-4024,0,0,ef64ae76a72fe30f0382303f22cba197d841a5535eb50d7c4ad40f3e475d662a,2024-04-25T17:25:05.903000
CVE-2024-4026,0,0,9eff728af4fb17cd0b046ae2444303f230bc7685cadbda3feb2bd1007c766627,2024-04-22T13:28:34.007000
CVE-2024-4029,0,0,afc8def3dff015c790bb6f1fba36f8919ca09d0c14ec4f09004e6bb6d31f1058,2024-05-02T18:00:37.360000
CVE-2024-4030,0,1,c7e71f4aa9c8e1fed63372a5ecebe14dddf19d5400caf27393d092efafbf0f25,2024-06-13T20:15:15.570000
CVE-2024-4030,0,0,c7e71f4aa9c8e1fed63372a5ecebe14dddf19d5400caf27393d092efafbf0f25,2024-06-13T20:15:15.570000
CVE-2024-4031,0,0,4baeaad68cf3411bf45d41e53c64aca0aa19dc8cf620cd2c5028b0d61a50ba2c,2024-04-23T12:52:09.397000
CVE-2024-4033,0,0,9c08f15b4d3308634dd41e6afc3001fb3d24483554aaa58982323fa330ce651a,2024-05-02T18:00:37.360000
CVE-2024-4034,0,0,fbbc9986eba42f39f504e14d62a8f5aac7c2749ef90d02af8ad89eb5ef4d1cca,2024-05-02T18:00:37.360000
@ -253319,7 +253333,7 @@ CVE-2024-4688,0,0,5209c8e598df4232c95422a32cff4b63e70cf2beafa2b8b363e44607e8b05d
CVE-2024-4689,0,0,919eb1a71c5b4e5442293f605f96c1f22f0a9c83e181a6bfcbc236f37312a073,2024-05-14T16:11:39.510000
CVE-2024-4693,0,0,ae34b03d329f3bae3c71df865f5758cc1e5a9a82168c01009bca2e974c902cf9,2024-05-14T16:11:39.510000
CVE-2024-4695,0,0,bd371315886ce25f9ceb7120c3bda7e4abd083c2b0897636d7648a840eeb16f9,2024-05-21T12:37:59.687000
CVE-2024-4696,1,1,c05c407b8c6d1f7e35233e01717b00a62ac3b16ce5963db71cc5207a001d8b5f,2024-06-13T20:15:15.697000
CVE-2024-4696,0,0,c05c407b8c6d1f7e35233e01717b00a62ac3b16ce5963db71cc5207a001d8b5f,2024-06-13T20:15:15.697000
CVE-2024-4697,0,0,8891ab9488132612016991587a4c415cc1459909a9846fa15d7484f4bad4aa37,2024-06-04T16:57:41.053000
CVE-2024-4698,0,0,d639d98ee1104ee74d5714ee622c1edbac6965c7ee7b0c944d45cd1653d552a0,2024-05-20T13:00:34.807000
CVE-2024-4699,0,0,21634a770b960d22aa24dc1f0ea343763012f9507287610a68f5378061204954,2024-05-17T02:40:33.683000
@ -253919,21 +253933,21 @@ CVE-2024-5674,0,0,69b0f5cdcc6414c1b3093ac76e322fc42e17eb869b8f1b328084f458395232
CVE-2024-5675,0,0,c04fc1bf8ef6e3f232c30ddf0bd6a524958c9eab63fe205331e1fedef14ccf13,2024-06-11T18:14:02.017000
CVE-2024-5684,0,0,e183f6f3c944efddc1281bf86b4d20b3677f4c3ab127fc0c8f4bc522f6d9ba19,2024-06-11T18:13:30.163000
CVE-2024-5687,0,0,462616a340299eb021f948595697457aa449bd723bf07de403e8f8269f269fde,2024-06-11T13:54:12.057000
CVE-2024-5688,0,0,7f1fe1d84ca624d192d2fb724198baaca7302a86c4913eab68abedb621f4cb87,2024-06-13T12:15:12.277000
CVE-2024-5688,0,1,69d8cc15e435db53520a0b374c51ddee2a4c9131e86d6c869cac04768cb98c0c,2024-06-13T23:15:50.490000
CVE-2024-5689,0,0,4f410d9266634bd986e744eb8559ec451615a52b8eea36ea4f8bf68fc3b850d4,2024-06-11T13:54:12.057000
CVE-2024-5690,0,0,ac861dce12b31044b05f6f6fe6f0fe83eb571bd4ec888afac298fea3bac76a5d,2024-06-13T12:15:12.427000
CVE-2024-5691,0,0,08bd0230eb38412c4b5db4facbdf003320f50cba032a39e29f9a6d609e371660,2024-06-13T12:15:12.500000
CVE-2024-5692,0,0,e48bb3812c504721cd34d802f67ffdadf0dd6b742d5e6c0ed90ff8e5318d7f9d,2024-06-11T13:54:12.057000
CVE-2024-5693,0,0,8a411418234ce7a07e19962e240c671d08a5b17209382e508d2d24c743f226ce,2024-06-13T12:15:12.563000
CVE-2024-5690,0,1,36c0ae2d8383b751a0972d323a5b065578074989df953548b2f72b78625203a7,2024-06-13T23:15:50.570000
CVE-2024-5691,0,1,f368f92ed51a77af03643c7b05c776066c8f4fe35b7e068f2ff38afba48c0c02,2024-06-13T23:15:50.640000
CVE-2024-5692,0,1,f00746d9dda797bb603caee0812b8c6f417c037755c16115b1d8dd4aa72145d7,2024-06-13T23:15:50.707000
CVE-2024-5693,0,1,a6c16354638b0f59d50987020fcaf72d228a4aa1603cb7727ea9f435429751b5,2024-06-13T23:15:50.787000
CVE-2024-5694,0,0,aa2834dbf06e3957cd7e5b06ce48b632b0b1bea9e8a5d243274c30e4d133705f,2024-06-11T13:54:12.057000
CVE-2024-5695,0,0,aa5f03052a11170426e7a0ce58f6d9ec709b2a215a696c67577cfc53bb4ece2b,2024-06-11T13:54:12.057000
CVE-2024-5696,0,0,d46f89edff0dd38b34dcdfc7398c221fd567a487b158d0c53ae9d4ce347b9383,2024-06-13T12:15:12.630000
CVE-2024-5696,0,1,65f4f3eef74782e757c951843cc9fa6c029eded1af443563efe5ecddc04c5eda,2024-06-13T23:15:50.863000
CVE-2024-5697,0,0,d6ef87bb44484c2fd3d787945424253f6517461558939753340cc9af175a3a63,2024-06-11T13:54:12.057000
CVE-2024-5698,0,0,c16a79fbd4c4b219827962a844d6045999c01de67ef2d1c4cdaafa604a433c0d,2024-06-11T13:54:12.057000
CVE-2024-5699,0,0,b949f850e4c4079b463e32e2cd58b076e8b8024713a9727b47244a67dc641bb3,2024-06-11T13:54:12.057000
CVE-2024-5700,0,0,581d0ffaf02660f0d610d579ef5069c434090bd2b21e65b9fa319c5db313e1f8,2024-06-13T12:15:12.687000
CVE-2024-5700,0,1,92d851a28dc6a0cf1e89dda1698a94af0728730fac9009e8ae23bc0d1685cbe9,2024-06-13T23:15:50.943000
CVE-2024-5701,0,0,d4e32e5841fb5c694dbc3b06ee89abb2a6307fcc124dd00bcd8ff23789ef2aca,2024-06-11T13:54:12.057000
CVE-2024-5702,0,0,1f7a26a9a71e2b21845b213939501edb95629a21d46b5b00b90e42d7f9fd68ad,2024-06-13T12:15:12.750000
CVE-2024-5702,0,1,132133584f2c8a8af63186716eb284a7e155bef1da08058dd33dd36afa50e8f2,2024-06-13T23:15:51.020000
CVE-2024-5732,0,0,2b69cb5542c2f91e3e2021ac007049b3634a9137bdf0c325241236594abc7cc6,2024-06-11T17:57:13.767000
CVE-2024-5733,0,0,78152e13cdabf162486c62849d39e4c95e26727ad5623fb603c3826108c4ab9b,2024-06-11T18:30:50.690000
CVE-2024-5734,0,0,42e64867c1cdebe5031caec9548ec6393cd9bc290658f317ad4788de56fd156c,2024-06-11T18:30:16.727000
@ -253941,7 +253955,7 @@ CVE-2024-5739,0,0,4e4cf687173db1796e93002e6527d7eafacb6ad9e3e1f9441d82638a10b1e4
CVE-2024-5742,0,0,9a235010bf640cd00db18ec82f470058ad537b7f91954f8c3bb8d7def4b6bd02,2024-06-13T18:36:09.010000
CVE-2024-5745,0,0,8788b99580d43fd9eb900afb700ee157c954d289b603d58451eabd57873852f0,2024-06-08T04:15:10.027000
CVE-2024-5757,0,0,724eb4698fe887b377a8685a53f97d3ccede96ff2077bff16bf350d6fdc9c2ea,2024-06-13T18:36:09.010000
CVE-2024-5758,0,1,250b274bfcefb72defbd26103c82d5c8ed585b7571d3785565c3013fdb6e4a03,2024-06-13T21:15:57.543000
CVE-2024-5758,0,0,250b274bfcefb72defbd26103c82d5c8ed585b7571d3785565c3013fdb6e4a03,2024-06-13T21:15:57.543000
CVE-2024-5759,0,0,a8b20ed9df5a502bc1dbe4283a67eed19771ffb4a4f02a90724215ed5101a898,2024-06-13T18:36:09.010000
CVE-2024-5761,0,0,e0022a8d80317cd3941058bae14b514f68707790a5051038049a1d552ba8de69,2024-06-07T19:15:24.467000
CVE-2024-5766,0,0,86ed0bd8ec5f973a61dc526186a645f1ec84961008a0f608efabd599d39dbfeb,2024-06-10T02:52:08.267000
@ -254000,12 +254014,12 @@ CVE-2024-5906,0,0,b7fc466b9931ce265a1ef81017e39098b5ad31bf494bc22103ede7f6c2cace
CVE-2024-5907,0,0,17327a712757852c4b43c811f24252c9a6d5917388dc8b093882f86e14b7ae5b,2024-06-13T18:36:09.010000
CVE-2024-5908,0,0,626d4ee0c59c97ce53ee1de5871da8e08f754ec4c69aaf4477321803dc309ac6,2024-06-13T18:36:09.010000
CVE-2024-5909,0,0,135cc10869213a459dd71b8b5da7a5af9b37ed5f304a5a3bf425c78b00034c69,2024-06-13T18:36:09.010000
CVE-2024-5924,1,1,438088c749c41e8a857bb4f65ff1d6cd1a3b8d6ce928b5f77def0d7840d9ba6b,2024-06-13T20:15:16
CVE-2024-5924,0,0,438088c749c41e8a857bb4f65ff1d6cd1a3b8d6ce928b5f77def0d7840d9ba6b,2024-06-13T20:15:16
CVE-2024-5927,0,0,19c3cc8f6784d442d3026759cebf43551fd4d736175a291c91056bccb3b59092,2024-06-13T11:15:48.917000
CVE-2024-5947,1,1,3c58f721b6b3c4fe37b30e11263f49bf54ef5cfb5080003f8ed6c78c3edecc35,2024-06-13T20:15:16.277000
CVE-2024-5948,1,1,a41798016fce7632d913db1f1eefce6a935342934919a20855dd0790fd7ec26a,2024-06-13T20:15:16.497000
CVE-2024-5949,1,1,b3986a8edb1512233064a5da51557c0fa4f711ec9b142a106f76745321d3cef5,2024-06-13T20:15:16.710000
CVE-2024-5950,1,1,1f86aa27bca5269525cdd401ce251fe2cb91fad6e36bea2e480bcbcdf6032a6e,2024-06-13T20:15:16.923000
CVE-2024-5951,1,1,fff68899d3009d75df7027ceba73ebc8730458ee33bb67011fd27dc83f85a1f2,2024-06-13T20:15:17.140000
CVE-2024-5952,1,1,417f3877151c0966e5133a5fd225fe602bd3ee4917b6bc769756fb14d3a30c86,2024-06-13T20:15:17.350000
CVE-2024-5976,1,1,ecb618f3a85b9ff189742506500564176d6ec763f555c7863213d109651f3a72,2024-06-13T21:15:57.683000
CVE-2024-5947,0,0,3c58f721b6b3c4fe37b30e11263f49bf54ef5cfb5080003f8ed6c78c3edecc35,2024-06-13T20:15:16.277000
CVE-2024-5948,0,0,a41798016fce7632d913db1f1eefce6a935342934919a20855dd0790fd7ec26a,2024-06-13T20:15:16.497000
CVE-2024-5949,0,0,b3986a8edb1512233064a5da51557c0fa4f711ec9b142a106f76745321d3cef5,2024-06-13T20:15:16.710000
CVE-2024-5950,0,0,1f86aa27bca5269525cdd401ce251fe2cb91fad6e36bea2e480bcbcdf6032a6e,2024-06-13T20:15:16.923000
CVE-2024-5951,0,0,fff68899d3009d75df7027ceba73ebc8730458ee33bb67011fd27dc83f85a1f2,2024-06-13T20:15:17.140000
CVE-2024-5952,0,0,417f3877151c0966e5133a5fd225fe602bd3ee4917b6bc769756fb14d3a30c86,2024-06-13T20:15:17.350000
CVE-2024-5976,0,0,ecb618f3a85b9ff189742506500564176d6ec763f555c7863213d109651f3a72,2024-06-13T21:15:57.683000

Can't render this file because it is too large.