mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-07-09 16:05:11 +00:00
Auto-Update: 2024-06-13T23:55:17.979785+00:00
This commit is contained in:
parent
b621285e78
commit
a65cab13d3
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2023-4039",
|
||||
"sourceIdentifier": "arm-security@arm.com",
|
||||
"published": "2023-09-13T09:15:15.690",
|
||||
"lastModified": "2024-02-19T23:15:07.680",
|
||||
"lastModified": "2024-06-13T23:15:50.137",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
|
55
CVE-2024/CVE-2024-00xx/CVE-2024-0084.json
Normal file
55
CVE-2024/CVE-2024-00xx/CVE-2024-0084.json
Normal file
@ -0,0 +1,55 @@
|
||||
{
|
||||
"id": "CVE-2024-0084",
|
||||
"sourceIdentifier": "psirt@nvidia.com",
|
||||
"published": "2024-06-13T22:15:11.220",
|
||||
"lastModified": "2024-06-13T22:15:11.220",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "NVIDIA vGPU software for Linux contains a vulnerability in the Virtual GPU Manager, where the guest OS could execute privileged operations. A successful exploit of this vulnerability might lead to information disclosure, data tampering, escalation of privileges, and denial of service."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "psirt@nvidia.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 7.8,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "psirt@nvidia.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-250"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://nvidia.custhelp.com/app/answers/detail/a_id/5551",
|
||||
"source": "psirt@nvidia.com"
|
||||
}
|
||||
]
|
||||
}
|
55
CVE-2024/CVE-2024-00xx/CVE-2024-0085.json
Normal file
55
CVE-2024/CVE-2024-00xx/CVE-2024-0085.json
Normal file
@ -0,0 +1,55 @@
|
||||
{
|
||||
"id": "CVE-2024-0085",
|
||||
"sourceIdentifier": "psirt@nvidia.com",
|
||||
"published": "2024-06-13T22:15:11.483",
|
||||
"lastModified": "2024-06-13T22:15:11.483",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "NVIDIA vGPU software for Windows and Linux contains a vulnerability where unprivileged users could execute privileged operations on the host. A successful exploit of this vulnerability might lead to data tampering, escalation of privileges, and denial of service."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "psirt@nvidia.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "HIGH",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 6.3,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 1.0,
|
||||
"impactScore": 5.2
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "psirt@nvidia.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-266"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://nvidia.custhelp.com/app/answers/detail/a_id/5551",
|
||||
"source": "psirt@nvidia.com"
|
||||
}
|
||||
]
|
||||
}
|
55
CVE-2024/CVE-2024-00xx/CVE-2024-0086.json
Normal file
55
CVE-2024/CVE-2024-00xx/CVE-2024-0086.json
Normal file
@ -0,0 +1,55 @@
|
||||
{
|
||||
"id": "CVE-2024-0086",
|
||||
"sourceIdentifier": "psirt@nvidia.com",
|
||||
"published": "2024-06-13T22:15:11.717",
|
||||
"lastModified": "2024-06-13T22:15:11.717",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "NVIDIA vGPU software for Linux contains a vulnerability where the software can dereference a NULL pointer. A successful exploit of this vulnerability might lead to denial of service and undefined behavior in the vGPU plugin."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "psirt@nvidia.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 5.5,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "psirt@nvidia.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-476"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://nvidia.custhelp.com/app/answers/detail/a_id/5551",
|
||||
"source": "psirt@nvidia.com"
|
||||
}
|
||||
]
|
||||
}
|
55
CVE-2024/CVE-2024-00xx/CVE-2024-0089.json
Normal file
55
CVE-2024/CVE-2024-00xx/CVE-2024-0089.json
Normal file
@ -0,0 +1,55 @@
|
||||
{
|
||||
"id": "CVE-2024-0089",
|
||||
"sourceIdentifier": "psirt@nvidia.com",
|
||||
"published": "2024-06-13T22:15:11.940",
|
||||
"lastModified": "2024-06-13T22:15:11.940",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "NVIDIA GPU Display Driver for Windows contains a vulnerability where the information from a previous client or another process could be disclosed. A successful exploit of this vulnerability might lead to code execution, information disclosure, or data tampering."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "psirt@nvidia.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 7.8,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "psirt@nvidia.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-665"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://nvidia.custhelp.com/app/answers/detail/a_id/5551",
|
||||
"source": "psirt@nvidia.com"
|
||||
}
|
||||
]
|
||||
}
|
55
CVE-2024/CVE-2024-00xx/CVE-2024-0090.json
Normal file
55
CVE-2024/CVE-2024-00xx/CVE-2024-0090.json
Normal file
@ -0,0 +1,55 @@
|
||||
{
|
||||
"id": "CVE-2024-0090",
|
||||
"sourceIdentifier": "psirt@nvidia.com",
|
||||
"published": "2024-06-13T22:15:12.170",
|
||||
"lastModified": "2024-06-13T22:15:12.170",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "NVIDIA GPU driver for Windows and Linux contains a vulnerability where a user can cause an out-of-bounds write. A successful exploit of this vulnerability might lead to code execution, denial of service, escalation of privileges, information disclosure, and data tampering."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "psirt@nvidia.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 7.8,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "psirt@nvidia.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-787"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://nvidia.custhelp.com/app/answers/detail/a_id/5551",
|
||||
"source": "psirt@nvidia.com"
|
||||
}
|
||||
]
|
||||
}
|
55
CVE-2024/CVE-2024-00xx/CVE-2024-0091.json
Normal file
55
CVE-2024/CVE-2024-00xx/CVE-2024-0091.json
Normal file
@ -0,0 +1,55 @@
|
||||
{
|
||||
"id": "CVE-2024-0091",
|
||||
"sourceIdentifier": "psirt@nvidia.com",
|
||||
"published": "2024-06-13T22:15:12.430",
|
||||
"lastModified": "2024-06-13T22:15:12.430",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "NVIDIA GPU Display Driver for Windows and Linux contains a vulnerability where a user can cause an untrusted pointer dereference by executing a driver API. A successful exploit of this vulnerability might lead to denial of service, information disclosure, and data tampering."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "psirt@nvidia.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 7.8,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "psirt@nvidia.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-822"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://nvidia.custhelp.com/app/answers/detail/a_id/5551",
|
||||
"source": "psirt@nvidia.com"
|
||||
}
|
||||
]
|
||||
}
|
55
CVE-2024/CVE-2024-00xx/CVE-2024-0092.json
Normal file
55
CVE-2024/CVE-2024-00xx/CVE-2024-0092.json
Normal file
@ -0,0 +1,55 @@
|
||||
{
|
||||
"id": "CVE-2024-0092",
|
||||
"sourceIdentifier": "psirt@nvidia.com",
|
||||
"published": "2024-06-13T22:15:12.647",
|
||||
"lastModified": "2024-06-13T22:15:12.647",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "NVIDIA GPU Driver for Windows and Linux contains a vulnerability where an improper check or improper handling of exception conditions might lead to denial of service."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "psirt@nvidia.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 5.5,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "psirt@nvidia.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-703"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://nvidia.custhelp.com/app/answers/detail/a_id/5551",
|
||||
"source": "psirt@nvidia.com"
|
||||
}
|
||||
]
|
||||
}
|
55
CVE-2024/CVE-2024-00xx/CVE-2024-0093.json
Normal file
55
CVE-2024/CVE-2024-00xx/CVE-2024-0093.json
Normal file
@ -0,0 +1,55 @@
|
||||
{
|
||||
"id": "CVE-2024-0093",
|
||||
"sourceIdentifier": "psirt@nvidia.com",
|
||||
"published": "2024-06-13T22:15:12.863",
|
||||
"lastModified": "2024-06-13T22:15:12.863",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "NVIDIA GPU software for Linux contains a vulnerability where it can expose sensitive information to an actor that is not explicitly authorized to have access to that information. A successful exploit of this vulnerability might lead to information disclosure."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "psirt@nvidia.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 6.5,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.0,
|
||||
"impactScore": 4.0
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "psirt@nvidia.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-200"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://nvidia.custhelp.com/app/answers/detail/a_id/5551",
|
||||
"source": "psirt@nvidia.com"
|
||||
}
|
||||
]
|
||||
}
|
55
CVE-2024/CVE-2024-00xx/CVE-2024-0094.json
Normal file
55
CVE-2024/CVE-2024-00xx/CVE-2024-0094.json
Normal file
@ -0,0 +1,55 @@
|
||||
{
|
||||
"id": "CVE-2024-0094",
|
||||
"sourceIdentifier": "psirt@nvidia.com",
|
||||
"published": "2024-06-13T22:15:13.080",
|
||||
"lastModified": "2024-06-13T22:15:13.080",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "NVIDIA vGPU software for Linux contains a vulnerability in the Virtual GPU Manager, where an untrusted guest VM can cause improper control of the interaction frequency in the host. A successful exploit of this vulnerability might lead to denial of service."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "psirt@nvidia.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 5.5,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "psirt@nvidia.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-799"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://nvidia.custhelp.com/app/answers/detail/a_id/5551",
|
||||
"source": "psirt@nvidia.com"
|
||||
}
|
||||
]
|
||||
}
|
55
CVE-2024/CVE-2024-00xx/CVE-2024-0095.json
Normal file
55
CVE-2024/CVE-2024-00xx/CVE-2024-0095.json
Normal file
@ -0,0 +1,55 @@
|
||||
{
|
||||
"id": "CVE-2024-0095",
|
||||
"sourceIdentifier": "psirt@nvidia.com",
|
||||
"published": "2024-06-13T22:15:13.347",
|
||||
"lastModified": "2024-06-13T22:15:13.347",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "NVIDIA Triton Inference Server for Linux and Windows contains a vulnerability where a user can inject forged logs and executable commands by injecting arbitrary data as a new log entry. A successful exploit of this vulnerability might lead to code execution, denial of service, escalation of privileges, information disclosure, and data tampering."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "psirt@nvidia.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:L/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "HIGH",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 9.0,
|
||||
"baseSeverity": "CRITICAL"
|
||||
},
|
||||
"exploitabilityScore": 2.3,
|
||||
"impactScore": 6.0
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "psirt@nvidia.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-117"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://nvidia.custhelp.com/app/answers/detail/a_id/5546",
|
||||
"source": "psirt@nvidia.com"
|
||||
}
|
||||
]
|
||||
}
|
55
CVE-2024/CVE-2024-00xx/CVE-2024-0099.json
Normal file
55
CVE-2024/CVE-2024-00xx/CVE-2024-0099.json
Normal file
@ -0,0 +1,55 @@
|
||||
{
|
||||
"id": "CVE-2024-0099",
|
||||
"sourceIdentifier": "psirt@nvidia.com",
|
||||
"published": "2024-06-13T22:15:13.573",
|
||||
"lastModified": "2024-06-13T22:15:13.573",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "NVIDIA vGPU software for Linux contains a vulnerability in the Virtual GPU Manager, where the guest OS could cause buffer overrun in the host. A successful exploit of this vulnerability might lead to information disclosure, data tampering, escalation of privileges, and denial of service."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "psirt@nvidia.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 7.8,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "psirt@nvidia.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-120"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://nvidia.custhelp.com/app/answers/detail/a_id/5551",
|
||||
"source": "psirt@nvidia.com"
|
||||
}
|
||||
]
|
||||
}
|
43
CVE-2024/CVE-2024-01xx/CVE-2024-0103.json
Normal file
43
CVE-2024/CVE-2024-01xx/CVE-2024-0103.json
Normal file
@ -0,0 +1,43 @@
|
||||
{
|
||||
"id": "CVE-2024-0103",
|
||||
"sourceIdentifier": "psirt@nvidia.com",
|
||||
"published": "2024-06-13T22:15:13.787",
|
||||
"lastModified": "2024-06-13T22:15:13.787",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "NVIDIA Triton Inference Server for Linux contains a vulnerability where a user may cause an incorrect Initialization of resource by network issue. A successful exploit of this vulnerability may lead to information disclosure."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "psirt@nvidia.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 5.4,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 2.5
|
||||
}
|
||||
]
|
||||
},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://nvidia.custhelp.com/app/answers/detail/a_id/5546",
|
||||
"source": "psirt@nvidia.com"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-30037",
|
||||
"sourceIdentifier": "secure@microsoft.com",
|
||||
"published": "2024-05-14T17:17:09.230",
|
||||
"lastModified": "2024-05-14T19:17:55.627",
|
||||
"lastModified": "2024-06-13T22:15:15.457",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -21,19 +21,19 @@
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 7.5,
|
||||
"baseSeverity": "HIGH"
|
||||
"baseScore": 5.5,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
|
20
CVE-2024/CVE-2024-317xx/CVE-2024-31777.json
Normal file
20
CVE-2024/CVE-2024-317xx/CVE-2024-31777.json
Normal file
@ -0,0 +1,20 @@
|
||||
{
|
||||
"id": "CVE-2024-31777",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-06-13T23:15:50.293",
|
||||
"lastModified": "2024-06-13T23:15:50.293",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "File Upload vulnerability in openeclass v.3.15 and before allows an attacker to execute arbitrary code via a crafted file to the certbadge.php endpoint."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/FreySolarEye/Exploit-CVE-2024-31777",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
20
CVE-2024/CVE-2024-332xx/CVE-2024-33253.json
Normal file
20
CVE-2024/CVE-2024-332xx/CVE-2024-33253.json
Normal file
@ -0,0 +1,20 @@
|
||||
{
|
||||
"id": "CVE-2024-33253",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-06-13T23:15:50.403",
|
||||
"lastModified": "2024-06-13T23:15:50.403",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Cross-site scripting (XSS) vulnerability in GUnet OpenEclass E-learning Platform version 3.15 and before allows a authenticated privileged attacker to execute arbitrary code via the title and description fields of the badge template editing function."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/FreySolarEye/CVE/blob/master/GUnet%20OpenEclass%20E-learning%20platform%203.15%20-%20%27certbadge.php%27%20Stored%20Cross%20Site%20Scripting",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,16 +2,24 @@
|
||||
"id": "CVE-2024-37408",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-06-08T14:15:11.307",
|
||||
"lastModified": "2024-06-10T02:52:08.267",
|
||||
"lastModified": "2024-06-13T22:15:16.383",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "fprintd through 1.94.3 lacks a security attention mechanism, and thus unexpected actions might be authorized by \"auth sufficient pam_fprintd.so\" for Sudo."
|
||||
"value": "fprintd through 1.94.3 lacks a security attention mechanism, and thus unexpected actions might be authorized by \"auth sufficient pam_fprintd.so\" for Sudo. NOTE: the supplier disputes this because they believe issue resolution would involve modifying the PAM configuration to restrict pam_fprintd.so to front-ends that implement a proper attention mechanism, not modifying pam_fprintd.so or fprintd."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "fprintd hasta 1.94.3 carece de un mecanismo de atenci\u00f3n de seguridad y, por lo tanto, es posible que se autoricen acciones inesperadas mediante \"auth suficiente pam_fprintd.so\" para Sudo."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "http://www.openwall.com/lists/oss-security/2024/06/13/3",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://gitlab.freedesktop.org/libfprint/fprintd/-/releases",
|
||||
"source": "cve@mitre.org"
|
||||
@ -23,6 +31,10 @@
|
||||
{
|
||||
"url": "https://www.openwall.com/lists/oss-security/2024/05/30/3",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://www.openwall.com/lists/oss-security/2024/06/13/2",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,12 +2,12 @@
|
||||
"id": "CVE-2024-5688",
|
||||
"sourceIdentifier": "security@mozilla.org",
|
||||
"published": "2024-06-11T13:15:50.347",
|
||||
"lastModified": "2024-06-13T12:15:12.277",
|
||||
"lastModified": "2024-06-13T23:15:50.490",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "If a garbage collection was triggered at the right time, a use-after-free could have occurred during object transplant. This vulnerability affects Firefox < 127 and Firefox ESR < 115.12."
|
||||
"value": "If a garbage collection was triggered at the right time, a use-after-free could have occurred during object transplant. This vulnerability affects Firefox < 127, Firefox ESR < 115.12, and Thunderbird < 115.12."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
@ -31,6 +31,10 @@
|
||||
{
|
||||
"url": "https://www.mozilla.org/security/advisories/mfsa2024-26/",
|
||||
"source": "security@mozilla.org"
|
||||
},
|
||||
{
|
||||
"url": "https://www.mozilla.org/security/advisories/mfsa2024-28/",
|
||||
"source": "security@mozilla.org"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,12 +2,12 @@
|
||||
"id": "CVE-2024-5690",
|
||||
"sourceIdentifier": "security@mozilla.org",
|
||||
"published": "2024-06-11T13:15:50.553",
|
||||
"lastModified": "2024-06-13T12:15:12.427",
|
||||
"lastModified": "2024-06-13T23:15:50.570",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "By monitoring the time certain operations take, an attacker could have guessed which external protocol handlers were functional on a user's system. This vulnerability affects Firefox < 127 and Firefox ESR < 115.12."
|
||||
"value": "By monitoring the time certain operations take, an attacker could have guessed which external protocol handlers were functional on a user's system. This vulnerability affects Firefox < 127, Firefox ESR < 115.12, and Thunderbird < 115.12."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
@ -31,6 +31,10 @@
|
||||
{
|
||||
"url": "https://www.mozilla.org/security/advisories/mfsa2024-26/",
|
||||
"source": "security@mozilla.org"
|
||||
},
|
||||
{
|
||||
"url": "https://www.mozilla.org/security/advisories/mfsa2024-28/",
|
||||
"source": "security@mozilla.org"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,12 +2,12 @@
|
||||
"id": "CVE-2024-5691",
|
||||
"sourceIdentifier": "security@mozilla.org",
|
||||
"published": "2024-06-11T13:15:50.690",
|
||||
"lastModified": "2024-06-13T12:15:12.500",
|
||||
"lastModified": "2024-06-13T23:15:50.640",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "By tricking the browser with a `X-Frame-Options` header, a sandboxed iframe could have presented a button that, if clicked by a user, would bypass restrictions to open a new window. This vulnerability affects Firefox < 127 and Firefox ESR < 115.12."
|
||||
"value": "By tricking the browser with a `X-Frame-Options` header, a sandboxed iframe could have presented a button that, if clicked by a user, would bypass restrictions to open a new window. This vulnerability affects Firefox < 127, Firefox ESR < 115.12, and Thunderbird < 115.12."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
@ -31,6 +31,10 @@
|
||||
{
|
||||
"url": "https://www.mozilla.org/security/advisories/mfsa2024-26/",
|
||||
"source": "security@mozilla.org"
|
||||
},
|
||||
{
|
||||
"url": "https://www.mozilla.org/security/advisories/mfsa2024-28/",
|
||||
"source": "security@mozilla.org"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,20 +2,20 @@
|
||||
"id": "CVE-2024-5692",
|
||||
"sourceIdentifier": "security@mozilla.org",
|
||||
"published": "2024-06-11T13:15:50.770",
|
||||
"lastModified": "2024-06-11T13:54:12.057",
|
||||
"lastModified": "2024-06-13T23:15:50.707",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "On Windows, when using the 'Save As' functionality, an attacker could have tricked the browser into saving the file with a disallowed extension such as `.url` by including an invalid character in the extension. *Note:* This issue only affected Windows operating systems. Other operating systems are unaffected. This vulnerability affects Firefox < 127 and Firefox ESR < 115.12."
|
||||
"value": "On Windows 10, when using the 'Save As' functionality, an attacker could have tricked the browser into saving the file with a disallowed extension such as `.url` by including an invalid character in the extension. *Note:* This issue only affected Windows operating systems. Other operating systems are unaffected. This vulnerability affects Firefox < 127, Firefox ESR < 115.12, and Thunderbird < 115.12."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "En Windows, al utilizar la funci\u00f3n \"Guardar como\", un atacante podr\u00eda haber enga\u00f1ado al navegador para que guardara el archivo con una extensi\u00f3n no permitida como \".url\" al incluir un car\u00e1cter no v\u00e1lido en la extensi\u00f3n. *Nota:* Este problema solo afectaba a los sistemas operativos Windows. Otros sistemas operativos no se ven afectados. Esta vulnerabilidad afecta a Firefox < 127 y Firefox ESR < 115.12."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1837514",
|
||||
"source": "security@mozilla.org"
|
||||
},
|
||||
{
|
||||
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1891234",
|
||||
"source": "security@mozilla.org"
|
||||
@ -27,6 +27,10 @@
|
||||
{
|
||||
"url": "https://www.mozilla.org/security/advisories/mfsa2024-26/",
|
||||
"source": "security@mozilla.org"
|
||||
},
|
||||
{
|
||||
"url": "https://www.mozilla.org/security/advisories/mfsa2024-28/",
|
||||
"source": "security@mozilla.org"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,12 +2,12 @@
|
||||
"id": "CVE-2024-5693",
|
||||
"sourceIdentifier": "security@mozilla.org",
|
||||
"published": "2024-06-11T13:15:50.850",
|
||||
"lastModified": "2024-06-13T12:15:12.563",
|
||||
"lastModified": "2024-06-13T23:15:50.787",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Offscreen Canvas did not properly track cross-origin tainting, which could be used to access image data from another site in violation of same-origin policy. This vulnerability affects Firefox < 127 and Firefox ESR < 115.12."
|
||||
"value": "Offscreen Canvas did not properly track cross-origin tainting, which could be used to access image data from another site in violation of same-origin policy. This vulnerability affects Firefox < 127, Firefox ESR < 115.12, and Thunderbird < 115.12."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
@ -31,6 +31,10 @@
|
||||
{
|
||||
"url": "https://www.mozilla.org/security/advisories/mfsa2024-26/",
|
||||
"source": "security@mozilla.org"
|
||||
},
|
||||
{
|
||||
"url": "https://www.mozilla.org/security/advisories/mfsa2024-28/",
|
||||
"source": "security@mozilla.org"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,12 +2,12 @@
|
||||
"id": "CVE-2024-5696",
|
||||
"sourceIdentifier": "security@mozilla.org",
|
||||
"published": "2024-06-11T13:15:51.100",
|
||||
"lastModified": "2024-06-13T12:15:12.630",
|
||||
"lastModified": "2024-06-13T23:15:50.863",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "By manipulating the text in an `<input>` tag, an attacker could have caused corrupt memory leading to a potentially exploitable crash. This vulnerability affects Firefox < 127 and Firefox ESR < 115.12."
|
||||
"value": "By manipulating the text in an `<input>` tag, an attacker could have caused corrupt memory leading to a potentially exploitable crash. This vulnerability affects Firefox < 127, Firefox ESR < 115.12, and Thunderbird < 115.12."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
@ -31,6 +31,10 @@
|
||||
{
|
||||
"url": "https://www.mozilla.org/security/advisories/mfsa2024-26/",
|
||||
"source": "security@mozilla.org"
|
||||
},
|
||||
{
|
||||
"url": "https://www.mozilla.org/security/advisories/mfsa2024-28/",
|
||||
"source": "security@mozilla.org"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,12 +2,12 @@
|
||||
"id": "CVE-2024-5700",
|
||||
"sourceIdentifier": "security@mozilla.org",
|
||||
"published": "2024-06-11T13:15:51.417",
|
||||
"lastModified": "2024-06-13T12:15:12.687",
|
||||
"lastModified": "2024-06-13T23:15:50.943",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Memory safety bugs present in Firefox 126, Firefox ESR 115.11, and Thunderbird 115.11. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox < 127 and Firefox ESR < 115.12."
|
||||
"value": "Memory safety bugs present in Firefox 126, Firefox ESR 115.11, and Thunderbird 115.11. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox < 127, Firefox ESR < 115.12, and Thunderbird < 115.12."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
@ -31,6 +31,10 @@
|
||||
{
|
||||
"url": "https://www.mozilla.org/security/advisories/mfsa2024-26/",
|
||||
"source": "security@mozilla.org"
|
||||
},
|
||||
{
|
||||
"url": "https://www.mozilla.org/security/advisories/mfsa2024-28/",
|
||||
"source": "security@mozilla.org"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,12 +2,12 @@
|
||||
"id": "CVE-2024-5702",
|
||||
"sourceIdentifier": "security@mozilla.org",
|
||||
"published": "2024-06-11T13:15:51.573",
|
||||
"lastModified": "2024-06-13T12:15:12.750",
|
||||
"lastModified": "2024-06-13T23:15:51.020",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Memory corruption in the networking stack could have led to a potentially exploitable crash. This vulnerability affects Firefox < 125 and Firefox ESR < 115.12."
|
||||
"value": "Memory corruption in the networking stack could have led to a potentially exploitable crash. This vulnerability affects Firefox < 125, Firefox ESR < 115.12, and Thunderbird < 115.12."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
@ -31,6 +31,10 @@
|
||||
{
|
||||
"url": "https://www.mozilla.org/security/advisories/mfsa2024-26/",
|
||||
"source": "security@mozilla.org"
|
||||
},
|
||||
{
|
||||
"url": "https://www.mozilla.org/security/advisories/mfsa2024-28/",
|
||||
"source": "security@mozilla.org"
|
||||
}
|
||||
]
|
||||
}
|
64
README.md
64
README.md
@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours.
|
||||
### Last Repository Update
|
||||
|
||||
```plain
|
||||
2024-06-13T22:00:18.562370+00:00
|
||||
2024-06-13T23:55:17.979785+00:00
|
||||
```
|
||||
|
||||
### Most recent CVE Modification Timestamp synchronized with NVD
|
||||
|
||||
```plain
|
||||
2024-06-13T21:15:57.683000+00:00
|
||||
2024-06-13T23:15:51.020000+00:00
|
||||
```
|
||||
|
||||
### Last Data Feed Release
|
||||
@ -33,48 +33,44 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
|
||||
### Total Number of included CVEs
|
||||
|
||||
```plain
|
||||
254010
|
||||
254024
|
||||
```
|
||||
|
||||
### CVEs added in the last Commit
|
||||
|
||||
Recently added CVEs: `59`
|
||||
Recently added CVEs: `14`
|
||||
|
||||
- [CVE-2024-32916](CVE-2024/CVE-2024-329xx/CVE-2024-32916.json) (`2024-06-13T21:15:55.533`)
|
||||
- [CVE-2024-32917](CVE-2024/CVE-2024-329xx/CVE-2024-32917.json) (`2024-06-13T21:15:55.603`)
|
||||
- [CVE-2024-32918](CVE-2024/CVE-2024-329xx/CVE-2024-32918.json) (`2024-06-13T21:15:55.683`)
|
||||
- [CVE-2024-32919](CVE-2024/CVE-2024-329xx/CVE-2024-32919.json) (`2024-06-13T21:15:55.757`)
|
||||
- [CVE-2024-32920](CVE-2024/CVE-2024-329xx/CVE-2024-32920.json) (`2024-06-13T21:15:55.830`)
|
||||
- [CVE-2024-32921](CVE-2024/CVE-2024-329xx/CVE-2024-32921.json) (`2024-06-13T21:15:55.900`)
|
||||
- [CVE-2024-32922](CVE-2024/CVE-2024-329xx/CVE-2024-32922.json) (`2024-06-13T21:15:55.970`)
|
||||
- [CVE-2024-32923](CVE-2024/CVE-2024-329xx/CVE-2024-32923.json) (`2024-06-13T21:15:56.040`)
|
||||
- [CVE-2024-32924](CVE-2024/CVE-2024-329xx/CVE-2024-32924.json) (`2024-06-13T21:15:56.113`)
|
||||
- [CVE-2024-32925](CVE-2024/CVE-2024-329xx/CVE-2024-32925.json) (`2024-06-13T21:15:56.187`)
|
||||
- [CVE-2024-32926](CVE-2024/CVE-2024-329xx/CVE-2024-32926.json) (`2024-06-13T21:15:56.253`)
|
||||
- [CVE-2024-32929](CVE-2024/CVE-2024-329xx/CVE-2024-32929.json) (`2024-06-13T21:15:56.320`)
|
||||
- [CVE-2024-32930](CVE-2024/CVE-2024-329xx/CVE-2024-32930.json) (`2024-06-13T21:15:56.390`)
|
||||
- [CVE-2024-38083](CVE-2024/CVE-2024-380xx/CVE-2024-38083.json) (`2024-06-13T20:15:15.157`)
|
||||
- [CVE-2024-38312](CVE-2024/CVE-2024-383xx/CVE-2024-38312.json) (`2024-06-13T20:15:15.370`)
|
||||
- [CVE-2024-38313](CVE-2024/CVE-2024-383xx/CVE-2024-38313.json) (`2024-06-13T20:15:15.450`)
|
||||
- [CVE-2024-4696](CVE-2024/CVE-2024-46xx/CVE-2024-4696.json) (`2024-06-13T20:15:15.697`)
|
||||
- [CVE-2024-5924](CVE-2024/CVE-2024-59xx/CVE-2024-5924.json) (`2024-06-13T20:15:16.000`)
|
||||
- [CVE-2024-5947](CVE-2024/CVE-2024-59xx/CVE-2024-5947.json) (`2024-06-13T20:15:16.277`)
|
||||
- [CVE-2024-5948](CVE-2024/CVE-2024-59xx/CVE-2024-5948.json) (`2024-06-13T20:15:16.497`)
|
||||
- [CVE-2024-5949](CVE-2024/CVE-2024-59xx/CVE-2024-5949.json) (`2024-06-13T20:15:16.710`)
|
||||
- [CVE-2024-5950](CVE-2024/CVE-2024-59xx/CVE-2024-5950.json) (`2024-06-13T20:15:16.923`)
|
||||
- [CVE-2024-5951](CVE-2024/CVE-2024-59xx/CVE-2024-5951.json) (`2024-06-13T20:15:17.140`)
|
||||
- [CVE-2024-5952](CVE-2024/CVE-2024-59xx/CVE-2024-5952.json) (`2024-06-13T20:15:17.350`)
|
||||
- [CVE-2024-5976](CVE-2024/CVE-2024-59xx/CVE-2024-5976.json) (`2024-06-13T21:15:57.683`)
|
||||
- [CVE-2024-0084](CVE-2024/CVE-2024-00xx/CVE-2024-0084.json) (`2024-06-13T22:15:11.220`)
|
||||
- [CVE-2024-0085](CVE-2024/CVE-2024-00xx/CVE-2024-0085.json) (`2024-06-13T22:15:11.483`)
|
||||
- [CVE-2024-0086](CVE-2024/CVE-2024-00xx/CVE-2024-0086.json) (`2024-06-13T22:15:11.717`)
|
||||
- [CVE-2024-0089](CVE-2024/CVE-2024-00xx/CVE-2024-0089.json) (`2024-06-13T22:15:11.940`)
|
||||
- [CVE-2024-0090](CVE-2024/CVE-2024-00xx/CVE-2024-0090.json) (`2024-06-13T22:15:12.170`)
|
||||
- [CVE-2024-0091](CVE-2024/CVE-2024-00xx/CVE-2024-0091.json) (`2024-06-13T22:15:12.430`)
|
||||
- [CVE-2024-0092](CVE-2024/CVE-2024-00xx/CVE-2024-0092.json) (`2024-06-13T22:15:12.647`)
|
||||
- [CVE-2024-0093](CVE-2024/CVE-2024-00xx/CVE-2024-0093.json) (`2024-06-13T22:15:12.863`)
|
||||
- [CVE-2024-0094](CVE-2024/CVE-2024-00xx/CVE-2024-0094.json) (`2024-06-13T22:15:13.080`)
|
||||
- [CVE-2024-0095](CVE-2024/CVE-2024-00xx/CVE-2024-0095.json) (`2024-06-13T22:15:13.347`)
|
||||
- [CVE-2024-0099](CVE-2024/CVE-2024-00xx/CVE-2024-0099.json) (`2024-06-13T22:15:13.573`)
|
||||
- [CVE-2024-0103](CVE-2024/CVE-2024-01xx/CVE-2024-0103.json) (`2024-06-13T22:15:13.787`)
|
||||
- [CVE-2024-31777](CVE-2024/CVE-2024-317xx/CVE-2024-31777.json) (`2024-06-13T23:15:50.293`)
|
||||
- [CVE-2024-33253](CVE-2024/CVE-2024-332xx/CVE-2024-33253.json) (`2024-06-13T23:15:50.403`)
|
||||
|
||||
|
||||
### CVEs modified in the last Commit
|
||||
|
||||
Recently modified CVEs: `4`
|
||||
Recently modified CVEs: `11`
|
||||
|
||||
- [CVE-2024-20404](CVE-2024/CVE-2024-204xx/CVE-2024-20404.json) (`2024-06-13T20:25:46.837`)
|
||||
- [CVE-2024-36265](CVE-2024/CVE-2024-362xx/CVE-2024-36265.json) (`2024-06-13T21:15:57.170`)
|
||||
- [CVE-2024-4030](CVE-2024/CVE-2024-40xx/CVE-2024-4030.json) (`2024-06-13T20:15:15.570`)
|
||||
- [CVE-2024-5758](CVE-2024/CVE-2024-57xx/CVE-2024-5758.json) (`2024-06-13T21:15:57.543`)
|
||||
- [CVE-2023-4039](CVE-2023/CVE-2023-40xx/CVE-2023-4039.json) (`2024-06-13T23:15:50.137`)
|
||||
- [CVE-2024-30037](CVE-2024/CVE-2024-300xx/CVE-2024-30037.json) (`2024-06-13T22:15:15.457`)
|
||||
- [CVE-2024-37408](CVE-2024/CVE-2024-374xx/CVE-2024-37408.json) (`2024-06-13T22:15:16.383`)
|
||||
- [CVE-2024-5688](CVE-2024/CVE-2024-56xx/CVE-2024-5688.json) (`2024-06-13T23:15:50.490`)
|
||||
- [CVE-2024-5690](CVE-2024/CVE-2024-56xx/CVE-2024-5690.json) (`2024-06-13T23:15:50.570`)
|
||||
- [CVE-2024-5691](CVE-2024/CVE-2024-56xx/CVE-2024-5691.json) (`2024-06-13T23:15:50.640`)
|
||||
- [CVE-2024-5692](CVE-2024/CVE-2024-56xx/CVE-2024-5692.json) (`2024-06-13T23:15:50.707`)
|
||||
- [CVE-2024-5693](CVE-2024/CVE-2024-56xx/CVE-2024-5693.json) (`2024-06-13T23:15:50.787`)
|
||||
- [CVE-2024-5696](CVE-2024/CVE-2024-56xx/CVE-2024-5696.json) (`2024-06-13T23:15:50.863`)
|
||||
- [CVE-2024-5700](CVE-2024/CVE-2024-57xx/CVE-2024-5700.json) (`2024-06-13T23:15:50.943`)
|
||||
- [CVE-2024-5702](CVE-2024/CVE-2024-57xx/CVE-2024-5702.json) (`2024-06-13T23:15:51.020`)
|
||||
|
||||
|
||||
## Download and Usage
|
||||
|
162
_state.csv
162
_state.csv
@ -229899,7 +229899,7 @@ CVE-2023-40385,0,0,d87186e65fbe11c963d9f2ac49a37bea6de8f4a87feb525e072522d577fee
|
||||
CVE-2023-40386,0,0,98b5b9164e51a67fec2b119151c92fd2d9bb1d8d51de82443b681e79ce2c9a34,2023-10-12T01:59:56.563000
|
||||
CVE-2023-40388,0,0,0669c38434b1494ed261fd2860ebba321deabd42233fd11611759d0565888e20,2023-10-12T01:59:05.793000
|
||||
CVE-2023-40389,0,0,b193787b70f32e4c09ae93f27d418d82b25a00d1d832a208e6e4bfa799ec5d30,2024-06-12T18:05:20.887000
|
||||
CVE-2023-4039,0,0,0accd3adc8756cc7a927b7c908e91237d32e08c68f471a1067012290c829eea2,2024-02-19T23:15:07.680000
|
||||
CVE-2023-4039,0,1,8a91b063ac38fd90ed7bed4b3e92c53ba9e066c93e42a3299a924abadc9f3537,2024-06-13T23:15:50.137000
|
||||
CVE-2023-40390,0,0,dcc08f1579a2804bdfa75d3a1e4b64bbe4a6a3affb5757b1219cc9eb8124a134,2024-04-08T22:42:58.650000
|
||||
CVE-2023-40391,0,0,674710606efc5e20f3b4d034fd6151d2f994f0410f8a773be4faafb0e10f357d,2023-11-07T04:20:12.943000
|
||||
CVE-2023-40392,0,0,84bd7104c6189c2c6e9b4ab3e6ad9d972f95c392c1e5bd1a44d7d7f201861784,2023-12-22T15:18:01.370000
|
||||
@ -240413,12 +240413,24 @@ CVE-2024-0080,0,0,6c0d206dd91620b9eed7dc804b37cabf92e6b94b99ac768289c8d5abe0e718
|
||||
CVE-2024-0081,0,0,7224cfd553042ae01e2abfd02f661fee4ab9e15edf612773f3a2b6523001079f,2024-04-08T18:49:25.863000
|
||||
CVE-2024-0082,0,0,2f8bf036b6ccf9a376740e76b27024fe830e6e0ae585ea5b083515d36ff830e7,2024-04-09T12:48:04.090000
|
||||
CVE-2024-0083,0,0,ab832b2e89667613797d661d736b6cac31cc3f4854c5fe470b78e46bd7a9f856,2024-04-09T12:48:04.090000
|
||||
CVE-2024-0084,1,1,cddea74d28673a42c18fb8eb053052c28a8ea2c6607c73a307e73eb37219f680,2024-06-13T22:15:11.220000
|
||||
CVE-2024-0085,1,1,e6cc6b3c38c7ae8b941a130c98b75e6116f675295bcf978498eb5001aef1da82,2024-06-13T22:15:11.483000
|
||||
CVE-2024-0086,1,1,bc10c5aaf4c689b85426f7ca796e829e2e5b9eb1e0a42b3098fb4577943e3908,2024-06-13T22:15:11.717000
|
||||
CVE-2024-0087,0,0,25406cc87c9f090863257773a589a6b71e65ad8d1a37691c9902bbbbb218b668,2024-05-14T16:13:02.773000
|
||||
CVE-2024-0088,0,0,2bbc671241d85e5f91b28bf53a37285169148e904d0098d3839e6b13627a109f,2024-05-14T16:13:02.773000
|
||||
CVE-2024-0089,1,1,b978dd92d85bb7adda9e352f196d83a9fc71b62bedf725b09170694ff4d03a06,2024-06-13T22:15:11.940000
|
||||
CVE-2024-0090,1,1,dd3c726d8d2e08d823624fe2323a674a39110cc04b2cbd20d41e3ab6c24bb344,2024-06-13T22:15:12.170000
|
||||
CVE-2024-0091,1,1,abc5c30185bed4c257270ecc558db148cc3c475fbc215c8a2a77167cedf7a724,2024-06-13T22:15:12.430000
|
||||
CVE-2024-0092,1,1,5715c15c31bed55fbc69626a155df4d8ad4965761f22eb93ea1f4a1967e95320,2024-06-13T22:15:12.647000
|
||||
CVE-2024-0093,1,1,c6baf0498fabbfae66796f92183d09a667efcf96e05a1de81b52177d6f484d0d,2024-06-13T22:15:12.863000
|
||||
CVE-2024-0094,1,1,e9cb9b2e3122fbc36ead63fa66c995f4b78ce52ff7624939121215ebd4ee7120,2024-06-13T22:15:13.080000
|
||||
CVE-2024-0095,1,1,22fd4fc84caaaf43a44a21fec1846fdbca9fab0f7c70d56e53e76c3837e2e26c,2024-06-13T22:15:13.347000
|
||||
CVE-2024-0096,0,0,b12c0b431c02ab9c95cbcff726f23352217766123b79fde967af76821617a93b,2024-05-14T16:13:02.773000
|
||||
CVE-2024-0097,0,0,c6a65b776deeff11a3f5e884cbd77bfe0346e61623b4473c291407c9481a4930,2024-05-14T16:13:02.773000
|
||||
CVE-2024-0098,0,0,b4cace3870399ecb99979eca71b219c7793c8ef31a1671c9ccd0779d01666e9a,2024-05-14T16:13:02.773000
|
||||
CVE-2024-0099,1,1,4aad329fa39aa534c071c489bf2ca8685022bc50bbcafffbc8fa35f8ac9f8084,2024-06-13T22:15:13.573000
|
||||
CVE-2024-0100,0,0,bbf51d2ce3c3a951e3f6f4fb5d57dd8d1c73fdd75ab0ade8734c57fcf29d357b,2024-05-14T16:13:02.773000
|
||||
CVE-2024-0103,1,1,3be51ec9527a25e98d1a6ce953f8391d318794be6f19847c24d3744a59bdab90,2024-06-13T22:15:13.787000
|
||||
CVE-2024-0151,0,0,aafc841cfb528b9ef4d150e11c8565679b9331c9ad5bf3569e38f74d72962c86,2024-04-25T08:15:07.420000
|
||||
CVE-2024-0154,0,0,fee6d0edd38400fe9a2f331d67a355be9bc81701717352554939ef10dafbbf73,2024-03-13T18:15:58.530000
|
||||
CVE-2024-0155,0,0,56d3003aea28bbff1e776f33de697fc847d720d7a8270931f6c22f264f5611eb,2024-03-04T13:58:23.447000
|
||||
@ -242279,7 +242291,7 @@ CVE-2024-2039,0,0,4f1e5a8a814f51edc0234cc5670da2107cc2a93a2ef1eadc628898e3eec44b
|
||||
CVE-2024-20391,0,0,f91eada0700f8cd9f2eaea2b871ba7d3969d87e51919a0eb478edbaaab6f3a9d,2024-05-15T18:35:11.453000
|
||||
CVE-2024-20392,0,0,ace66ba4c79c3f433832bd6cfa0988701f79a2b5d6c0fbe5016f71bba33a0a9b,2024-05-15T18:35:11.453000
|
||||
CVE-2024-20394,0,0,d0e5fc3a79dfeb923dc3f02320ce7649899cba8340301b836f168cfe3139baa9,2024-05-15T18:35:11.453000
|
||||
CVE-2024-20404,0,1,679bbd668c3128b9d2c298395d952eaf5fd76470dbc9bd0e765678566e0d175f,2024-06-13T20:25:46.837000
|
||||
CVE-2024-20404,0,0,679bbd668c3128b9d2c298395d952eaf5fd76470dbc9bd0e765678566e0d175f,2024-06-13T20:25:46.837000
|
||||
CVE-2024-20405,0,0,149a9c8a606eeeb959182d0091d0a52736f4f99f39d68f4aa5b3e1cc0e82374e,2024-06-06T14:17:35.017000
|
||||
CVE-2024-2041,0,0,f285d116ebee20fb02fc2c7de4f69fe8567e76fe9eda446fb7969801431b3d7d,2024-05-06T14:15:07.747000
|
||||
CVE-2024-2042,0,0,67e98a9ddaa62c913ab5a6b6d5de4b0b93571e9b9955fcfed7d86ddfd42889ed,2024-03-17T22:38:29.433000
|
||||
@ -248094,16 +248106,16 @@ CVE-2024-29774,0,0,b6d746daf0a9f89389e69183d03895d6675922cbbb66d6ef5358d6a524251
|
||||
CVE-2024-29775,0,0,4a09499ff17702a2e8ef2c1074beadb2ac9279eca85d85bf4c2322207b72a707,2024-03-27T15:49:41.437000
|
||||
CVE-2024-29776,0,0,67fe7261841358aada487500133b48b2c1e7affe235fb97f4d75fa453ac843e5,2024-03-27T15:49:41.437000
|
||||
CVE-2024-29777,0,0,54aa494ecd6d70eaf7fdbabe1fe6006b3d5e55e70d9a8bd4bbd26e15abfe4f5c,2024-03-27T15:49:41.437000
|
||||
CVE-2024-29778,1,1,8a718641436ca470f3420eb13edf31309b5ebcfc6400e0e0ddc424075c92115f,2024-06-13T21:15:51.857000
|
||||
CVE-2024-29778,0,0,8a718641436ca470f3420eb13edf31309b5ebcfc6400e0e0ddc424075c92115f,2024-06-13T21:15:51.857000
|
||||
CVE-2024-2978,0,0,10402db073fcc83eb9c3960e5a0172007bd5a71eeec44391bbdfbccc34dc921e,2024-05-17T02:38:40.007000
|
||||
CVE-2024-29780,1,1,7802345143c1619102c67c551a62c310bd5fc69bd720130093ed8c9bb372aa59,2024-06-13T21:15:51.950000
|
||||
CVE-2024-29781,1,1,bed393c098e2681374eac2c9288454d19f596a9774c7555c8eebfe834ab95203,2024-06-13T21:15:52.027000
|
||||
CVE-2024-29780,0,0,7802345143c1619102c67c551a62c310bd5fc69bd720130093ed8c9bb372aa59,2024-06-13T21:15:51.950000
|
||||
CVE-2024-29781,0,0,bed393c098e2681374eac2c9288454d19f596a9774c7555c8eebfe834ab95203,2024-06-13T21:15:52.027000
|
||||
CVE-2024-29782,0,0,b3ef752bb36677cb2cb857b2f5c52a9011917aac03b1bfb7c687eea310dd8059,2024-04-08T18:49:25.863000
|
||||
CVE-2024-29783,0,0,cd9af9ff3159d1cd0b45408995f42f2ac24497312e47148a7866abe02669b66b,2024-04-08T18:49:25.863000
|
||||
CVE-2024-29784,1,1,fc0d729986474cadde2d53e992ff7f51485e2d06c64fd9547c226d773e334fdb,2024-06-13T21:15:52.110000
|
||||
CVE-2024-29785,1,1,95648056c6a9eb834d3af9ec1f16ee22c4b651a39fd284e8b0edeb47168bf276,2024-06-13T21:15:52.180000
|
||||
CVE-2024-29786,1,1,b6192be3fe5733eace50426231d6f96b4d98a023f430826742b8d3127e2d60a3,2024-06-13T21:15:52.257000
|
||||
CVE-2024-29787,1,1,2a6d0688478393ca28f01d5ffb5ff8d7c3ff8300a1fc0d86ee9f71072e4e1726,2024-06-13T21:15:52.340000
|
||||
CVE-2024-29784,0,0,fc0d729986474cadde2d53e992ff7f51485e2d06c64fd9547c226d773e334fdb,2024-06-13T21:15:52.110000
|
||||
CVE-2024-29785,0,0,95648056c6a9eb834d3af9ec1f16ee22c4b651a39fd284e8b0edeb47168bf276,2024-06-13T21:15:52.180000
|
||||
CVE-2024-29786,0,0,b6192be3fe5733eace50426231d6f96b4d98a023f430826742b8d3127e2d60a3,2024-06-13T21:15:52.257000
|
||||
CVE-2024-29787,0,0,2a6d0688478393ca28f01d5ffb5ff8d7c3ff8300a1fc0d86ee9f71072e4e1726,2024-06-13T21:15:52.340000
|
||||
CVE-2024-29788,0,0,8cc2af0c2b669256f5779a8a4a350af2b3525bc2e92357d3051a10e492c80e6c,2024-03-27T15:49:41.437000
|
||||
CVE-2024-29789,0,0,28405d77cf9c690089caf44c730ea92c38ee335fb6ea974e0cc4c214ee7b123f,2024-03-27T15:49:41.437000
|
||||
CVE-2024-2979,0,0,a292112e5c65c94cb7e5874aae33d26b8dd263e3daabe71788a5100e1cf8c075,2024-05-17T02:38:40.103000
|
||||
@ -248348,7 +248360,7 @@ CVE-2024-30033,0,0,b411a2278af43a886a8aa482d52ba3ed702c53132871079531ef850272463
|
||||
CVE-2024-30034,0,0,69b281fa5aee5765aa125d534a8a079fce8123d2977fb1d95f599f58514bf564,2024-05-14T19:17:55.627000
|
||||
CVE-2024-30035,0,0,947badd97d18e7f340082ceed97b210357a7664e632f5b5ee2005d39c0016518,2024-05-14T19:17:55.627000
|
||||
CVE-2024-30036,0,0,b1782da56fbc83d6b8fbafbfc28caaaa78d453820e3c6685ec2688cfdeb8dcc6,2024-05-14T19:17:55.627000
|
||||
CVE-2024-30037,0,0,aee6371facd2d1d803a16e5888d4299f4b0dd2a517d910232d799943cc75ec90,2024-05-14T19:17:55.627000
|
||||
CVE-2024-30037,0,1,20048f18f5498b2c7feb887e7277573261a025ffd35c0bc921d6f1dee70daeb0,2024-06-13T22:15:15.457000
|
||||
CVE-2024-30038,0,0,3b876f89e14b9888fa5b54633c0f997357340a4ca7f76cc36956a7e9d05bf185,2024-05-14T19:17:55.627000
|
||||
CVE-2024-30039,0,0,f566a6095a4d4ae13391f05ffd28cab0d3652edc21e2084c844f84ab5713ba0d,2024-05-14T19:17:55.627000
|
||||
CVE-2024-3004,0,0,71915e722368909e423f6605c1a39e80314174f154a05fc792029d08b4718587,2024-05-17T02:39:40.003000
|
||||
@ -248370,8 +248382,8 @@ CVE-2024-30053,0,0,de0d3887ecd8088140dfe95e3f9311cc6a39bee41667e1f60a9fd1f03b4a7
|
||||
CVE-2024-30054,0,0,4bef1769b874d4ff9047765ac17cb428233424000152b0497aba8ed1ea3cade9,2024-05-14T19:17:55.627000
|
||||
CVE-2024-30055,0,0,3c1bf54fd3fe6c5ab3703162f359c88c3cd7915d8f1fdb651cdd28bec89280a6,2024-05-15T20:15:11.047000
|
||||
CVE-2024-30056,0,0,9eabc96ede995114869bb3aef4380d7f915e132e425ada2ef8ddea79edd8b89e,2024-05-28T12:39:42.673000
|
||||
CVE-2024-30057,1,1,d5e3adb37d1f3ad2da847fb50797f1b6f031b08de200c44b22c90d35d987b71d,2024-06-13T20:15:12.457000
|
||||
CVE-2024-30058,1,1,7766eefaf7fc95d86cd9d3256ef1da696e5213ada40115dc1e9b307bb0b64114,2024-06-13T20:15:12.670000
|
||||
CVE-2024-30057,0,0,d5e3adb37d1f3ad2da847fb50797f1b6f031b08de200c44b22c90d35d987b71d,2024-06-13T20:15:12.457000
|
||||
CVE-2024-30058,0,0,7766eefaf7fc95d86cd9d3256ef1da696e5213ada40115dc1e9b307bb0b64114,2024-06-13T20:15:12.670000
|
||||
CVE-2024-30059,0,0,0e87263445f5c97fb9a9f1ad7d5045c3390ca52e934287a08ee2b0f2dd5a42eb,2024-05-14T19:17:55.627000
|
||||
CVE-2024-3006,0,0,a3349f2fae283580197c9d70e5010e27f73c2425a5df8de3e4af5a848c49e4b6,2024-05-17T02:39:40.117000
|
||||
CVE-2024-30060,0,0,2d2a2a35846e7a2325ed3d83fd6e93b127058a9b2ed174c7bcd985716e44cfaf,2024-05-17T18:36:05.263000
|
||||
@ -249480,6 +249492,7 @@ CVE-2024-31759,0,0,7081cd22df5b9e4148ecc914176fc1f6cc04366073f8b1e4eccd8dfe4f2b7
|
||||
CVE-2024-31760,0,0,7b1e0b53a94a63e7f108110799c5f85524efc23136fc5608e680b8482e690959,2024-04-17T12:48:07.510000
|
||||
CVE-2024-3177,0,0,2008ffebb66b0a61152f0f24ed9f05ce25f1281b7375beddcc0948be7704366a,2024-05-01T19:15:27.480000
|
||||
CVE-2024-31771,0,0,ff8520be95214caa53c179db5203622a3ac8aab5fb79285b7e95c6c65d540f74,2024-05-14T16:12:23.490000
|
||||
CVE-2024-31777,1,1,224f0da87d959a08e36c1e4bce58e8f5e23291a0edcaaccc1c5b86a921d61a27,2024-06-13T23:15:50.293000
|
||||
CVE-2024-3178,0,0,e1b2edc538f836ffb506a17d476e0f961db2588242ddd1b2358ad3487cd818bf,2024-04-04T12:48:41.700000
|
||||
CVE-2024-31783,0,0,39c4df7f07fa9e66dc5d42dd16bc0981c0d6511a0c96852796a6de0ccb03c2ac,2024-04-16T13:24:07.103000
|
||||
CVE-2024-31784,0,0,0055eda0e2e2e3cebbac3d895c086f3674073feab99e847bee4ca99f9495a801,2024-04-16T13:24:07.103000
|
||||
@ -250265,48 +250278,48 @@ CVE-2024-32887,0,0,9a0b5c279911d37e81f985d5cbe7f0510b3ecf67815d6d232314f8cb4e8f9
|
||||
CVE-2024-32888,0,0,7a68ca18ce854868222b80336c9ae247321c1bc54ae858519ceac6d797dd7bd4,2024-05-15T16:40:19.330000
|
||||
CVE-2024-3289,0,0,0a89519093f9cc15ad64192809f4f71759d5d5d9d17d2eddf005a9c4c6b81228,2024-05-17T18:35:35.070000
|
||||
CVE-2024-32890,0,0,80b53d257dbc47827b967a6ec22fc70e9bb39dae5de4579c97bb47ad58884e95,2024-05-01T13:01:51.263000
|
||||
CVE-2024-32891,1,1,85b564811297ebec4f8663a58fa9364ac403718e5bf238a246f9d11fb3faf0d0,2024-06-13T21:15:53.690000
|
||||
CVE-2024-32892,1,1,e73b8a4820f61bd178e8629b09756f338bd616344ecd2856f97969dffc0f679b,2024-06-13T21:15:53.770000
|
||||
CVE-2024-32893,1,1,339c538e4788c458fdfb7aba0edb59af876f00fd3b910d1dd2b3d36ebf1fe5c2,2024-06-13T21:15:53.847000
|
||||
CVE-2024-32894,1,1,f91cedc5de6cd6d870da9ff0ae7296610b084efc3648b4238c32c359970437dd,2024-06-13T21:15:53.923000
|
||||
CVE-2024-32895,1,1,a0a4fee8c3aec54bb4ec7888ee8f1af92e0d465fb72b3299ecb14b1d2f20e2bb,2024-06-13T21:15:53.997000
|
||||
CVE-2024-32896,1,1,de529b91864e2fe98f3df7a3bb5319783bdcb2c0402eb656f4bcff344e51f0df,2024-06-13T21:15:54.080000
|
||||
CVE-2024-32897,1,1,28804992e3942abd3cefccf3bd29be764363b156432b85fbc5d5b2a87bf4b1b8,2024-06-13T21:15:54.150000
|
||||
CVE-2024-32898,1,1,25086db624d94ec865dc32501d0c7098aac9c8edc3828da3895f3f904fba3faa,2024-06-13T21:15:54.223000
|
||||
CVE-2024-32899,1,1,755df3b1fe5c9c27a6b24bcd95b015e0049ed15bb0e6ff4b663b012b4e0fe5db,2024-06-13T21:15:54.287000
|
||||
CVE-2024-32891,0,0,85b564811297ebec4f8663a58fa9364ac403718e5bf238a246f9d11fb3faf0d0,2024-06-13T21:15:53.690000
|
||||
CVE-2024-32892,0,0,e73b8a4820f61bd178e8629b09756f338bd616344ecd2856f97969dffc0f679b,2024-06-13T21:15:53.770000
|
||||
CVE-2024-32893,0,0,339c538e4788c458fdfb7aba0edb59af876f00fd3b910d1dd2b3d36ebf1fe5c2,2024-06-13T21:15:53.847000
|
||||
CVE-2024-32894,0,0,f91cedc5de6cd6d870da9ff0ae7296610b084efc3648b4238c32c359970437dd,2024-06-13T21:15:53.923000
|
||||
CVE-2024-32895,0,0,a0a4fee8c3aec54bb4ec7888ee8f1af92e0d465fb72b3299ecb14b1d2f20e2bb,2024-06-13T21:15:53.997000
|
||||
CVE-2024-32896,0,0,de529b91864e2fe98f3df7a3bb5319783bdcb2c0402eb656f4bcff344e51f0df,2024-06-13T21:15:54.080000
|
||||
CVE-2024-32897,0,0,28804992e3942abd3cefccf3bd29be764363b156432b85fbc5d5b2a87bf4b1b8,2024-06-13T21:15:54.150000
|
||||
CVE-2024-32898,0,0,25086db624d94ec865dc32501d0c7098aac9c8edc3828da3895f3f904fba3faa,2024-06-13T21:15:54.223000
|
||||
CVE-2024-32899,0,0,755df3b1fe5c9c27a6b24bcd95b015e0049ed15bb0e6ff4b663b012b4e0fe5db,2024-06-13T21:15:54.287000
|
||||
CVE-2024-3290,0,0,0ad1b84ced42c9f8a7789dc01b4a01dc3eea4ac518ae7e87d453cc71fd0f450a,2024-05-17T18:35:35.070000
|
||||
CVE-2024-32900,1,1,277b4f982dcfacfa482a4d75978e486293edd2b447d1ac7b573afc1e47d52e59,2024-06-13T21:15:54.357000
|
||||
CVE-2024-32901,1,1,b0f4d8b3bcdd91b0f5134bb8e64609b9ecb7aabc85e6f1be896d71b89f6773bc,2024-06-13T21:15:54.430000
|
||||
CVE-2024-32902,1,1,eb30f23ccbbf2cf04e66ff15216f5746bd650f99b19ae2d32bb3d62c2d645ff4,2024-06-13T21:15:54.503000
|
||||
CVE-2024-32903,1,1,25987070399c9242a9ac4ebfb37a4b23fa32e69d6ae2807cbeadf6c5d235733b,2024-06-13T21:15:54.583000
|
||||
CVE-2024-32904,1,1,de2fa0318c46fc79646e6c8f708753cbe6aa522354a94e0381989e53c52c3ecb,2024-06-13T21:15:54.657000
|
||||
CVE-2024-32905,1,1,b17e9363d0117717c19a91f391a4b55cac4d51cb3c377c18afd82a5921c9cac1,2024-06-13T21:15:54.730000
|
||||
CVE-2024-32906,1,1,f52365aab62a8ed59d394f7d4d4407d57c818701629734daaaa2c835eac70fd4,2024-06-13T21:15:54.810000
|
||||
CVE-2024-32907,1,1,38db2bd69bab006cea8dc7366c264ebac8ece7afe445dd9f9acbee3714756e3e,2024-06-13T21:15:54.877000
|
||||
CVE-2024-32908,1,1,9a993047e6a504e808699944f01196b4054511324e77afe16101f58bfc40444a,2024-06-13T21:15:54.957000
|
||||
CVE-2024-32909,1,1,131b0130e81a1757e7fbd3318e5071bc192edda314835e7e2ab0ee23f2195e70,2024-06-13T21:15:55.027000
|
||||
CVE-2024-32900,0,0,277b4f982dcfacfa482a4d75978e486293edd2b447d1ac7b573afc1e47d52e59,2024-06-13T21:15:54.357000
|
||||
CVE-2024-32901,0,0,b0f4d8b3bcdd91b0f5134bb8e64609b9ecb7aabc85e6f1be896d71b89f6773bc,2024-06-13T21:15:54.430000
|
||||
CVE-2024-32902,0,0,eb30f23ccbbf2cf04e66ff15216f5746bd650f99b19ae2d32bb3d62c2d645ff4,2024-06-13T21:15:54.503000
|
||||
CVE-2024-32903,0,0,25987070399c9242a9ac4ebfb37a4b23fa32e69d6ae2807cbeadf6c5d235733b,2024-06-13T21:15:54.583000
|
||||
CVE-2024-32904,0,0,de2fa0318c46fc79646e6c8f708753cbe6aa522354a94e0381989e53c52c3ecb,2024-06-13T21:15:54.657000
|
||||
CVE-2024-32905,0,0,b17e9363d0117717c19a91f391a4b55cac4d51cb3c377c18afd82a5921c9cac1,2024-06-13T21:15:54.730000
|
||||
CVE-2024-32906,0,0,f52365aab62a8ed59d394f7d4d4407d57c818701629734daaaa2c835eac70fd4,2024-06-13T21:15:54.810000
|
||||
CVE-2024-32907,0,0,38db2bd69bab006cea8dc7366c264ebac8ece7afe445dd9f9acbee3714756e3e,2024-06-13T21:15:54.877000
|
||||
CVE-2024-32908,0,0,9a993047e6a504e808699944f01196b4054511324e77afe16101f58bfc40444a,2024-06-13T21:15:54.957000
|
||||
CVE-2024-32909,0,0,131b0130e81a1757e7fbd3318e5071bc192edda314835e7e2ab0ee23f2195e70,2024-06-13T21:15:55.027000
|
||||
CVE-2024-3291,0,0,d6a19598f7e10a631d5bbcd1a2f750e23f4c80cd3459568e72df6ee3f204db32,2024-05-17T18:35:35.070000
|
||||
CVE-2024-32910,1,1,c6af37bd024580e75685c21d7f4e8f3907f49b5b02cae143cbcaad999157d92b,2024-06-13T21:15:55.103000
|
||||
CVE-2024-32911,1,1,b5fb20bb3c40facf053563c01555f6a64079b16a77de849095ad13c97aa8e29a,2024-06-13T21:15:55.173000
|
||||
CVE-2024-32912,1,1,634135885a509e4a36f045a3a779195f5688657db04a4f1d25901d799fea109d,2024-06-13T21:15:55.250000
|
||||
CVE-2024-32913,1,1,3a92d4db03d0e1c47d50821e644dd0568afc633181faaac212bfeb54e3fe52a0,2024-06-13T21:15:55.327000
|
||||
CVE-2024-32914,1,1,09469046ba0919481434190bd20c4494739c17132285ad72a41cac93a026a08b,2024-06-13T21:15:55.393000
|
||||
CVE-2024-32915,1,1,79a72f225ed03e5ed840c3187e9c5bd2f6e55904bdbe8be321127bf9f662f181,2024-06-13T21:15:55.467000
|
||||
CVE-2024-32916,1,1,c6d38e31c2d7ba0ea2ec2173b989a7a4fb42083089fbbf95bc4d07149201742d,2024-06-13T21:15:55.533000
|
||||
CVE-2024-32917,1,1,06d09fcd9d5781bb2443e5b7dd5e8b1d4dacee8be51c939ee27bccfe350d9570,2024-06-13T21:15:55.603000
|
||||
CVE-2024-32918,1,1,0c0d5094b3f81675ef9244e32cc3ddc21eaf6e4786d7655f08fbff5a341ead45,2024-06-13T21:15:55.683000
|
||||
CVE-2024-32919,1,1,c634cc79d645f0b257a982cfcb864d6dc70931fd2bcd1ce4f8207b26fdebf775,2024-06-13T21:15:55.757000
|
||||
CVE-2024-32910,0,0,c6af37bd024580e75685c21d7f4e8f3907f49b5b02cae143cbcaad999157d92b,2024-06-13T21:15:55.103000
|
||||
CVE-2024-32911,0,0,b5fb20bb3c40facf053563c01555f6a64079b16a77de849095ad13c97aa8e29a,2024-06-13T21:15:55.173000
|
||||
CVE-2024-32912,0,0,634135885a509e4a36f045a3a779195f5688657db04a4f1d25901d799fea109d,2024-06-13T21:15:55.250000
|
||||
CVE-2024-32913,0,0,3a92d4db03d0e1c47d50821e644dd0568afc633181faaac212bfeb54e3fe52a0,2024-06-13T21:15:55.327000
|
||||
CVE-2024-32914,0,0,09469046ba0919481434190bd20c4494739c17132285ad72a41cac93a026a08b,2024-06-13T21:15:55.393000
|
||||
CVE-2024-32915,0,0,79a72f225ed03e5ed840c3187e9c5bd2f6e55904bdbe8be321127bf9f662f181,2024-06-13T21:15:55.467000
|
||||
CVE-2024-32916,0,0,c6d38e31c2d7ba0ea2ec2173b989a7a4fb42083089fbbf95bc4d07149201742d,2024-06-13T21:15:55.533000
|
||||
CVE-2024-32917,0,0,06d09fcd9d5781bb2443e5b7dd5e8b1d4dacee8be51c939ee27bccfe350d9570,2024-06-13T21:15:55.603000
|
||||
CVE-2024-32918,0,0,0c0d5094b3f81675ef9244e32cc3ddc21eaf6e4786d7655f08fbff5a341ead45,2024-06-13T21:15:55.683000
|
||||
CVE-2024-32919,0,0,c634cc79d645f0b257a982cfcb864d6dc70931fd2bcd1ce4f8207b26fdebf775,2024-06-13T21:15:55.757000
|
||||
CVE-2024-3292,0,0,43f6739e46180efa62ee88963aa9d9ac054bdf0e1bbbe57f2f9425d637d500e8,2024-05-17T18:35:35.070000
|
||||
CVE-2024-32920,1,1,c8432389271b281b5ccf18e0edf706b40f78e2f4e49aaffa2637063886c57c21,2024-06-13T21:15:55.830000
|
||||
CVE-2024-32921,1,1,6434ebe4ee194dd02b17a4784db476e1feaa8cfd811a09f572fbc7b48f12d32f,2024-06-13T21:15:55.900000
|
||||
CVE-2024-32922,1,1,430650bbbbc75aa89e2dd6c5dd9d974e8e40b0b9e2ad7e5e1d7962fb032a370a,2024-06-13T21:15:55.970000
|
||||
CVE-2024-32923,1,1,16a7432f1899ad0a70547087ee74d4317b8d33055e4a7b4bfbfb16f1a2d46e34,2024-06-13T21:15:56.040000
|
||||
CVE-2024-32924,1,1,f382d398018cffe1276d711482924dfd801192ea874e54c25f5233aa58c4823e,2024-06-13T21:15:56.113000
|
||||
CVE-2024-32925,1,1,57d6752b420e64440ab146f56d2f39ba5082666edac7e33470336ce01a179ed7,2024-06-13T21:15:56.187000
|
||||
CVE-2024-32926,1,1,b759c87f12d42f71c65baaeccec7bd569f331f9b7c69c54e01d7b328e7252ab8,2024-06-13T21:15:56.253000
|
||||
CVE-2024-32929,1,1,a76b7508102acd004ab9a23f5346aa9994deb585f17bb0d53ee2f8cf847fa475,2024-06-13T21:15:56.320000
|
||||
CVE-2024-32920,0,0,c8432389271b281b5ccf18e0edf706b40f78e2f4e49aaffa2637063886c57c21,2024-06-13T21:15:55.830000
|
||||
CVE-2024-32921,0,0,6434ebe4ee194dd02b17a4784db476e1feaa8cfd811a09f572fbc7b48f12d32f,2024-06-13T21:15:55.900000
|
||||
CVE-2024-32922,0,0,430650bbbbc75aa89e2dd6c5dd9d974e8e40b0b9e2ad7e5e1d7962fb032a370a,2024-06-13T21:15:55.970000
|
||||
CVE-2024-32923,0,0,16a7432f1899ad0a70547087ee74d4317b8d33055e4a7b4bfbfb16f1a2d46e34,2024-06-13T21:15:56.040000
|
||||
CVE-2024-32924,0,0,f382d398018cffe1276d711482924dfd801192ea874e54c25f5233aa58c4823e,2024-06-13T21:15:56.113000
|
||||
CVE-2024-32925,0,0,57d6752b420e64440ab146f56d2f39ba5082666edac7e33470336ce01a179ed7,2024-06-13T21:15:56.187000
|
||||
CVE-2024-32926,0,0,b759c87f12d42f71c65baaeccec7bd569f331f9b7c69c54e01d7b328e7252ab8,2024-06-13T21:15:56.253000
|
||||
CVE-2024-32929,0,0,a76b7508102acd004ab9a23f5346aa9994deb585f17bb0d53ee2f8cf847fa475,2024-06-13T21:15:56.320000
|
||||
CVE-2024-3293,0,0,3552485a27a6b6c8b2cadd17fbdb3e630238722099a3e2d8d97b0f239cd2dc1a,2024-04-23T12:52:26.253000
|
||||
CVE-2024-32930,1,1,c9a3dad6bacf07a79351e96d07f8f4de90b7c4d08a67481c973c36f158c5884c,2024-06-13T21:15:56.390000
|
||||
CVE-2024-32930,0,0,c9a3dad6bacf07a79351e96d07f8f4de90b7c4d08a67481c973c36f158c5884c,2024-06-13T21:15:56.390000
|
||||
CVE-2024-32944,0,0,357727703d6a86b0d608eb9af0488af030fe8a85e9a27818f7be4cd525bf7172,2024-05-28T12:39:28.377000
|
||||
CVE-2024-32947,0,0,35287e8f28304ee9599f9712f94ac6e419772e1d66820555100faf85f8aeebf3,2024-04-24T17:16:50.397000
|
||||
CVE-2024-32948,0,0,b7a98470b717d7f23ae7cba102d8685641e5b820f696ab6effba04fa32abb77f,2024-04-24T13:39:42.883000
|
||||
@ -250429,6 +250442,7 @@ CVE-2024-33228,0,0,f3448597a287250f65febdc50573b1814b9e5e5281e20e4e28a9c439a03cb
|
||||
CVE-2024-3323,0,0,5322a19626f9d41fbc85f0f073b4efac313efc9902bda6b2387f115ed4ea09c7,2024-04-17T20:08:21.887000
|
||||
CVE-2024-33247,0,0,66af889d7e6ada10bf314bd53454c582a1455dd661c7cb5b07f6d9cd6d1d400f,2024-04-25T13:18:02.660000
|
||||
CVE-2024-33250,0,0,80f5075a1ccdf0bbe31bc42b408e98f86c2ee0faa43a99a4e3de76f2fa1f2732,2024-05-14T16:12:23.490000
|
||||
CVE-2024-33253,1,1,8dbedfd6e95946805a7cb4e3afdd8986042b4f8223267a8c40771a7120245aa0,2024-06-13T23:15:50.403000
|
||||
CVE-2024-33255,0,0,4441e8c613117278c3bbaacb9c21a29fddafcd2bd1cac93b64de97baf3c9b0be,2024-04-26T15:32:22.523000
|
||||
CVE-2024-33258,0,0,41d7b4e3d9e09b0d296b620041fceccfb75290061ed11a54c972d58a06b97783,2024-04-26T15:32:22.523000
|
||||
CVE-2024-33259,0,0,80423b2f2a5ed9315f035176a4b15dcc22cbb638669092343148bea0fa9d0be1,2024-04-26T15:32:22.523000
|
||||
@ -252197,7 +252211,7 @@ CVE-2024-36255,0,0,22b21684452ad4563618ad5cee66dc719af723b04c8a1647fe9cf6d970347
|
||||
CVE-2024-3626,0,0,668faec6d18ac8a7c33197af94901aaf7ddac1dec4c77c1d646fba224d5f8541,2024-05-24T01:15:30.977000
|
||||
CVE-2024-36263,0,0,8fc77ae12c809e003508687bca8ef69500efdb9e489f26efe8ffb68dd267fd3b,2024-06-13T18:36:09.010000
|
||||
CVE-2024-36264,0,0,3852f3a1f0d8a2d4f62090f3b6254d16b37a584c2a4799814e318aea1f24146e,2024-06-13T18:36:09.010000
|
||||
CVE-2024-36265,0,1,00a9e362e8a489eb7027d68fd71b14b08824e37d9652a79a38b01c7bc61baef1,2024-06-13T21:15:57.170000
|
||||
CVE-2024-36265,0,0,00a9e362e8a489eb7027d68fd71b14b08824e37d9652a79a38b01c7bc61baef1,2024-06-13T21:15:57.170000
|
||||
CVE-2024-36266,0,0,83df454a9d264cabc9c075046ae12e249cd453c24f6de612ee1d9f73df0ef774,2024-06-11T13:54:12.057000
|
||||
CVE-2024-36267,0,0,5b402628b4c430b8eab614a5b3330f6f2d186537f83ff9a60bb1a91e4b3c3cac,2024-05-30T13:15:41.297000
|
||||
CVE-2024-3628,0,0,ad2a38a3d431944b5239dd67ace3bcd2603e3057c8d0a04d847db45516b0c9ea,2024-05-07T13:39:32.710000
|
||||
@ -252583,7 +252597,7 @@ CVE-2024-3739,0,0,18ca969c974b63c6d16494fbcc2d63756747cacc5947332fefb20d9c592537
|
||||
CVE-2024-37393,0,0,adb4710ef8d4e8e5b898aa80bff6a41a92b599e232f1db44a8b62c91938837ef,2024-06-12T17:56:23.390000
|
||||
CVE-2024-3740,0,0,1025f598f3437296a5a18526d2723c88eb3b5b46ea06c50b765dc694c6a0bd1a,2024-05-17T02:40:06.170000
|
||||
CVE-2024-37407,0,0,aec5c198a3463e3996afdb2b87dcd156119620da199d8e9853297e329cd2e74b,2024-06-10T02:52:08.267000
|
||||
CVE-2024-37408,0,0,43de84338ac833cd78092ec836ae8beffbac830f1aa1a52e6c8ca816bfb77c27,2024-06-10T02:52:08.267000
|
||||
CVE-2024-37408,0,1,0d464a9182b8796127fe76e81543c3cd0ff4f74d6140915de1bb8aefdfd33a67,2024-06-13T22:15:16.383000
|
||||
CVE-2024-3741,0,0,a12bddc029cd8ca7f24831417695630babe629dc15b981c15e3d0a9ffa405fdc,2024-05-28T17:15:11.327000
|
||||
CVE-2024-3742,0,0,78c61e704f37a9137f7f9be10f02b0ed07c0bef31d61c3d6452a359112382921,2024-05-28T17:15:11.450000
|
||||
CVE-2024-3743,0,0,a066d49023268d129172d910e0990b3a457ebf914ca5a08a9f020fc0da48a3af,2024-05-02T18:00:37.360000
|
||||
@ -252657,7 +252671,7 @@ CVE-2024-3804,0,0,6cbbef68e2216a1b6714fc89ff2a16fd432ad36dd1cabadaff597df2e56ce6
|
||||
CVE-2024-3806,0,0,de873f8585a077f47d9a3aa2ddc3d8a1a22e9124cbb6f60c98787e1f14a35570,2024-05-14T16:11:39.510000
|
||||
CVE-2024-3807,0,0,0018248fbe5cd3ad3d19de6c834f7e1f73352b7bbd9c92aa03f6a65e0b3f3d96,2024-05-14T16:11:39.510000
|
||||
CVE-2024-3808,0,0,39d88812c006142e5fcd1316bc5358a96100b3e812a4968772ff781eaaa6617c,2024-05-14T16:11:39.510000
|
||||
CVE-2024-38083,1,1,90c00a7e126d0ca34cbb6d6ad2c3a0aca252abe0bc479951447196a92586f216,2024-06-13T20:15:15.157000
|
||||
CVE-2024-38083,0,0,90c00a7e126d0ca34cbb6d6ad2c3a0aca252abe0bc479951447196a92586f216,2024-06-13T20:15:15.157000
|
||||
CVE-2024-3809,0,0,a034925aa5fbdeb8d8f213935fba76e152f9c290a4a5d18c12398fefebad7ce4,2024-05-14T16:11:39.510000
|
||||
CVE-2024-3810,0,0,915db751860884c5792da450ac833c5ebf7363681c09a171e26d38502a8840c3,2024-05-20T13:00:34.807000
|
||||
CVE-2024-3811,0,0,06c7e681130e5c23fc15839cbcd4895e2d61ac5545ff467d39f3bf28a1e3b8cd,2024-05-20T13:00:34.807000
|
||||
@ -252684,8 +252698,8 @@ CVE-2024-38293,0,0,a9b1fe23a5b7aceb305df22b9e5e69d11cc40f1bf66bedc9fa76d7158e801
|
||||
CVE-2024-38294,0,0,5ead4befff2b61ceb0efdd186e7234e4e666514924ffa35ab4e04f3aea639e9b,2024-06-13T18:36:09.010000
|
||||
CVE-2024-38295,0,0,c0872c7c53c37c26d78f688a94fd2e7f57965fc18ec3a253d1cbc168692f708b,2024-06-13T18:36:09.010000
|
||||
CVE-2024-3831,0,0,28fa4e2fb2524144138a610966fa5501c7b19e1083bb04e4062bd6679bbd2a31,2024-05-14T16:11:39.510000
|
||||
CVE-2024-38312,1,1,81465ae5bdee0fc9336a542d9a86c0bbc552d86e5cf73dddb2bfb97008d1e27a,2024-06-13T20:15:15.370000
|
||||
CVE-2024-38313,1,1,627d40d28ae10d38e3b284ae2e4544be4d3fd31da53264defcd3ebc8d60f359a,2024-06-13T20:15:15.450000
|
||||
CVE-2024-38312,0,0,81465ae5bdee0fc9336a542d9a86c0bbc552d86e5cf73dddb2bfb97008d1e27a,2024-06-13T20:15:15.370000
|
||||
CVE-2024-38313,0,0,627d40d28ae10d38e3b284ae2e4544be4d3fd31da53264defcd3ebc8d60f359a,2024-06-13T20:15:15.450000
|
||||
CVE-2024-3832,0,0,1075b96952121645fbb81b228e0c3813e39db7e21c4c9aa1fc24c30b61618c13,2024-04-23T18:15:15.187000
|
||||
CVE-2024-3833,0,0,ba630503495cf2aaf1fce7ce704a30930ed35eb1665a53e19102e8c18f607a36,2024-05-03T03:16:28.940000
|
||||
CVE-2024-3834,0,0,a6e69ceb5a64ba9dfba23cdfa4c02e2549bf746772815229f9a627159689f77e,2024-05-03T04:15:09.043000
|
||||
@ -252821,7 +252835,7 @@ CVE-2024-4022,0,0,862692e09b9131698fdf2d078f1715a141df0663671065e383928a8148e4ca
|
||||
CVE-2024-4024,0,0,ef64ae76a72fe30f0382303f22cba197d841a5535eb50d7c4ad40f3e475d662a,2024-04-25T17:25:05.903000
|
||||
CVE-2024-4026,0,0,9eff728af4fb17cd0b046ae2444303f230bc7685cadbda3feb2bd1007c766627,2024-04-22T13:28:34.007000
|
||||
CVE-2024-4029,0,0,afc8def3dff015c790bb6f1fba36f8919ca09d0c14ec4f09004e6bb6d31f1058,2024-05-02T18:00:37.360000
|
||||
CVE-2024-4030,0,1,c7e71f4aa9c8e1fed63372a5ecebe14dddf19d5400caf27393d092efafbf0f25,2024-06-13T20:15:15.570000
|
||||
CVE-2024-4030,0,0,c7e71f4aa9c8e1fed63372a5ecebe14dddf19d5400caf27393d092efafbf0f25,2024-06-13T20:15:15.570000
|
||||
CVE-2024-4031,0,0,4baeaad68cf3411bf45d41e53c64aca0aa19dc8cf620cd2c5028b0d61a50ba2c,2024-04-23T12:52:09.397000
|
||||
CVE-2024-4033,0,0,9c08f15b4d3308634dd41e6afc3001fb3d24483554aaa58982323fa330ce651a,2024-05-02T18:00:37.360000
|
||||
CVE-2024-4034,0,0,fbbc9986eba42f39f504e14d62a8f5aac7c2749ef90d02af8ad89eb5ef4d1cca,2024-05-02T18:00:37.360000
|
||||
@ -253319,7 +253333,7 @@ CVE-2024-4688,0,0,5209c8e598df4232c95422a32cff4b63e70cf2beafa2b8b363e44607e8b05d
|
||||
CVE-2024-4689,0,0,919eb1a71c5b4e5442293f605f96c1f22f0a9c83e181a6bfcbc236f37312a073,2024-05-14T16:11:39.510000
|
||||
CVE-2024-4693,0,0,ae34b03d329f3bae3c71df865f5758cc1e5a9a82168c01009bca2e974c902cf9,2024-05-14T16:11:39.510000
|
||||
CVE-2024-4695,0,0,bd371315886ce25f9ceb7120c3bda7e4abd083c2b0897636d7648a840eeb16f9,2024-05-21T12:37:59.687000
|
||||
CVE-2024-4696,1,1,c05c407b8c6d1f7e35233e01717b00a62ac3b16ce5963db71cc5207a001d8b5f,2024-06-13T20:15:15.697000
|
||||
CVE-2024-4696,0,0,c05c407b8c6d1f7e35233e01717b00a62ac3b16ce5963db71cc5207a001d8b5f,2024-06-13T20:15:15.697000
|
||||
CVE-2024-4697,0,0,8891ab9488132612016991587a4c415cc1459909a9846fa15d7484f4bad4aa37,2024-06-04T16:57:41.053000
|
||||
CVE-2024-4698,0,0,d639d98ee1104ee74d5714ee622c1edbac6965c7ee7b0c944d45cd1653d552a0,2024-05-20T13:00:34.807000
|
||||
CVE-2024-4699,0,0,21634a770b960d22aa24dc1f0ea343763012f9507287610a68f5378061204954,2024-05-17T02:40:33.683000
|
||||
@ -253919,21 +253933,21 @@ CVE-2024-5674,0,0,69b0f5cdcc6414c1b3093ac76e322fc42e17eb869b8f1b328084f458395232
|
||||
CVE-2024-5675,0,0,c04fc1bf8ef6e3f232c30ddf0bd6a524958c9eab63fe205331e1fedef14ccf13,2024-06-11T18:14:02.017000
|
||||
CVE-2024-5684,0,0,e183f6f3c944efddc1281bf86b4d20b3677f4c3ab127fc0c8f4bc522f6d9ba19,2024-06-11T18:13:30.163000
|
||||
CVE-2024-5687,0,0,462616a340299eb021f948595697457aa449bd723bf07de403e8f8269f269fde,2024-06-11T13:54:12.057000
|
||||
CVE-2024-5688,0,0,7f1fe1d84ca624d192d2fb724198baaca7302a86c4913eab68abedb621f4cb87,2024-06-13T12:15:12.277000
|
||||
CVE-2024-5688,0,1,69d8cc15e435db53520a0b374c51ddee2a4c9131e86d6c869cac04768cb98c0c,2024-06-13T23:15:50.490000
|
||||
CVE-2024-5689,0,0,4f410d9266634bd986e744eb8559ec451615a52b8eea36ea4f8bf68fc3b850d4,2024-06-11T13:54:12.057000
|
||||
CVE-2024-5690,0,0,ac861dce12b31044b05f6f6fe6f0fe83eb571bd4ec888afac298fea3bac76a5d,2024-06-13T12:15:12.427000
|
||||
CVE-2024-5691,0,0,08bd0230eb38412c4b5db4facbdf003320f50cba032a39e29f9a6d609e371660,2024-06-13T12:15:12.500000
|
||||
CVE-2024-5692,0,0,e48bb3812c504721cd34d802f67ffdadf0dd6b742d5e6c0ed90ff8e5318d7f9d,2024-06-11T13:54:12.057000
|
||||
CVE-2024-5693,0,0,8a411418234ce7a07e19962e240c671d08a5b17209382e508d2d24c743f226ce,2024-06-13T12:15:12.563000
|
||||
CVE-2024-5690,0,1,36c0ae2d8383b751a0972d323a5b065578074989df953548b2f72b78625203a7,2024-06-13T23:15:50.570000
|
||||
CVE-2024-5691,0,1,f368f92ed51a77af03643c7b05c776066c8f4fe35b7e068f2ff38afba48c0c02,2024-06-13T23:15:50.640000
|
||||
CVE-2024-5692,0,1,f00746d9dda797bb603caee0812b8c6f417c037755c16115b1d8dd4aa72145d7,2024-06-13T23:15:50.707000
|
||||
CVE-2024-5693,0,1,a6c16354638b0f59d50987020fcaf72d228a4aa1603cb7727ea9f435429751b5,2024-06-13T23:15:50.787000
|
||||
CVE-2024-5694,0,0,aa2834dbf06e3957cd7e5b06ce48b632b0b1bea9e8a5d243274c30e4d133705f,2024-06-11T13:54:12.057000
|
||||
CVE-2024-5695,0,0,aa5f03052a11170426e7a0ce58f6d9ec709b2a215a696c67577cfc53bb4ece2b,2024-06-11T13:54:12.057000
|
||||
CVE-2024-5696,0,0,d46f89edff0dd38b34dcdfc7398c221fd567a487b158d0c53ae9d4ce347b9383,2024-06-13T12:15:12.630000
|
||||
CVE-2024-5696,0,1,65f4f3eef74782e757c951843cc9fa6c029eded1af443563efe5ecddc04c5eda,2024-06-13T23:15:50.863000
|
||||
CVE-2024-5697,0,0,d6ef87bb44484c2fd3d787945424253f6517461558939753340cc9af175a3a63,2024-06-11T13:54:12.057000
|
||||
CVE-2024-5698,0,0,c16a79fbd4c4b219827962a844d6045999c01de67ef2d1c4cdaafa604a433c0d,2024-06-11T13:54:12.057000
|
||||
CVE-2024-5699,0,0,b949f850e4c4079b463e32e2cd58b076e8b8024713a9727b47244a67dc641bb3,2024-06-11T13:54:12.057000
|
||||
CVE-2024-5700,0,0,581d0ffaf02660f0d610d579ef5069c434090bd2b21e65b9fa319c5db313e1f8,2024-06-13T12:15:12.687000
|
||||
CVE-2024-5700,0,1,92d851a28dc6a0cf1e89dda1698a94af0728730fac9009e8ae23bc0d1685cbe9,2024-06-13T23:15:50.943000
|
||||
CVE-2024-5701,0,0,d4e32e5841fb5c694dbc3b06ee89abb2a6307fcc124dd00bcd8ff23789ef2aca,2024-06-11T13:54:12.057000
|
||||
CVE-2024-5702,0,0,1f7a26a9a71e2b21845b213939501edb95629a21d46b5b00b90e42d7f9fd68ad,2024-06-13T12:15:12.750000
|
||||
CVE-2024-5702,0,1,132133584f2c8a8af63186716eb284a7e155bef1da08058dd33dd36afa50e8f2,2024-06-13T23:15:51.020000
|
||||
CVE-2024-5732,0,0,2b69cb5542c2f91e3e2021ac007049b3634a9137bdf0c325241236594abc7cc6,2024-06-11T17:57:13.767000
|
||||
CVE-2024-5733,0,0,78152e13cdabf162486c62849d39e4c95e26727ad5623fb603c3826108c4ab9b,2024-06-11T18:30:50.690000
|
||||
CVE-2024-5734,0,0,42e64867c1cdebe5031caec9548ec6393cd9bc290658f317ad4788de56fd156c,2024-06-11T18:30:16.727000
|
||||
@ -253941,7 +253955,7 @@ CVE-2024-5739,0,0,4e4cf687173db1796e93002e6527d7eafacb6ad9e3e1f9441d82638a10b1e4
|
||||
CVE-2024-5742,0,0,9a235010bf640cd00db18ec82f470058ad537b7f91954f8c3bb8d7def4b6bd02,2024-06-13T18:36:09.010000
|
||||
CVE-2024-5745,0,0,8788b99580d43fd9eb900afb700ee157c954d289b603d58451eabd57873852f0,2024-06-08T04:15:10.027000
|
||||
CVE-2024-5757,0,0,724eb4698fe887b377a8685a53f97d3ccede96ff2077bff16bf350d6fdc9c2ea,2024-06-13T18:36:09.010000
|
||||
CVE-2024-5758,0,1,250b274bfcefb72defbd26103c82d5c8ed585b7571d3785565c3013fdb6e4a03,2024-06-13T21:15:57.543000
|
||||
CVE-2024-5758,0,0,250b274bfcefb72defbd26103c82d5c8ed585b7571d3785565c3013fdb6e4a03,2024-06-13T21:15:57.543000
|
||||
CVE-2024-5759,0,0,a8b20ed9df5a502bc1dbe4283a67eed19771ffb4a4f02a90724215ed5101a898,2024-06-13T18:36:09.010000
|
||||
CVE-2024-5761,0,0,e0022a8d80317cd3941058bae14b514f68707790a5051038049a1d552ba8de69,2024-06-07T19:15:24.467000
|
||||
CVE-2024-5766,0,0,86ed0bd8ec5f973a61dc526186a645f1ec84961008a0f608efabd599d39dbfeb,2024-06-10T02:52:08.267000
|
||||
@ -254000,12 +254014,12 @@ CVE-2024-5906,0,0,b7fc466b9931ce265a1ef81017e39098b5ad31bf494bc22103ede7f6c2cace
|
||||
CVE-2024-5907,0,0,17327a712757852c4b43c811f24252c9a6d5917388dc8b093882f86e14b7ae5b,2024-06-13T18:36:09.010000
|
||||
CVE-2024-5908,0,0,626d4ee0c59c97ce53ee1de5871da8e08f754ec4c69aaf4477321803dc309ac6,2024-06-13T18:36:09.010000
|
||||
CVE-2024-5909,0,0,135cc10869213a459dd71b8b5da7a5af9b37ed5f304a5a3bf425c78b00034c69,2024-06-13T18:36:09.010000
|
||||
CVE-2024-5924,1,1,438088c749c41e8a857bb4f65ff1d6cd1a3b8d6ce928b5f77def0d7840d9ba6b,2024-06-13T20:15:16
|
||||
CVE-2024-5924,0,0,438088c749c41e8a857bb4f65ff1d6cd1a3b8d6ce928b5f77def0d7840d9ba6b,2024-06-13T20:15:16
|
||||
CVE-2024-5927,0,0,19c3cc8f6784d442d3026759cebf43551fd4d736175a291c91056bccb3b59092,2024-06-13T11:15:48.917000
|
||||
CVE-2024-5947,1,1,3c58f721b6b3c4fe37b30e11263f49bf54ef5cfb5080003f8ed6c78c3edecc35,2024-06-13T20:15:16.277000
|
||||
CVE-2024-5948,1,1,a41798016fce7632d913db1f1eefce6a935342934919a20855dd0790fd7ec26a,2024-06-13T20:15:16.497000
|
||||
CVE-2024-5949,1,1,b3986a8edb1512233064a5da51557c0fa4f711ec9b142a106f76745321d3cef5,2024-06-13T20:15:16.710000
|
||||
CVE-2024-5950,1,1,1f86aa27bca5269525cdd401ce251fe2cb91fad6e36bea2e480bcbcdf6032a6e,2024-06-13T20:15:16.923000
|
||||
CVE-2024-5951,1,1,fff68899d3009d75df7027ceba73ebc8730458ee33bb67011fd27dc83f85a1f2,2024-06-13T20:15:17.140000
|
||||
CVE-2024-5952,1,1,417f3877151c0966e5133a5fd225fe602bd3ee4917b6bc769756fb14d3a30c86,2024-06-13T20:15:17.350000
|
||||
CVE-2024-5976,1,1,ecb618f3a85b9ff189742506500564176d6ec763f555c7863213d109651f3a72,2024-06-13T21:15:57.683000
|
||||
CVE-2024-5947,0,0,3c58f721b6b3c4fe37b30e11263f49bf54ef5cfb5080003f8ed6c78c3edecc35,2024-06-13T20:15:16.277000
|
||||
CVE-2024-5948,0,0,a41798016fce7632d913db1f1eefce6a935342934919a20855dd0790fd7ec26a,2024-06-13T20:15:16.497000
|
||||
CVE-2024-5949,0,0,b3986a8edb1512233064a5da51557c0fa4f711ec9b142a106f76745321d3cef5,2024-06-13T20:15:16.710000
|
||||
CVE-2024-5950,0,0,1f86aa27bca5269525cdd401ce251fe2cb91fad6e36bea2e480bcbcdf6032a6e,2024-06-13T20:15:16.923000
|
||||
CVE-2024-5951,0,0,fff68899d3009d75df7027ceba73ebc8730458ee33bb67011fd27dc83f85a1f2,2024-06-13T20:15:17.140000
|
||||
CVE-2024-5952,0,0,417f3877151c0966e5133a5fd225fe602bd3ee4917b6bc769756fb14d3a30c86,2024-06-13T20:15:17.350000
|
||||
CVE-2024-5976,0,0,ecb618f3a85b9ff189742506500564176d6ec763f555c7863213d109651f3a72,2024-06-13T21:15:57.683000
|
||||
|
Can't render this file because it is too large.
|
Loading…
x
Reference in New Issue
Block a user