mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-05-08 03:27:17 +00:00
Auto-Update: 2024-07-19T22:00:18.109004+00:00
This commit is contained in:
parent
70e7b8e70f
commit
b3fb42b8ca
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-0865",
|
||||
"sourceIdentifier": "cybersecurity@se.com",
|
||||
"published": "2024-06-12T18:15:10.620",
|
||||
"lastModified": "2024-06-13T18:36:09.010",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-07-19T20:43:36.043",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -17,6 +17,26 @@
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 7.8,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 5.9
|
||||
},
|
||||
{
|
||||
"source": "cybersecurity@se.com",
|
||||
"type": "Secondary",
|
||||
@ -51,10 +71,31 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:schneider-electric:ecostruxure_it_gateway:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "1.21.0",
|
||||
"matchCriteriaId": "2DEDCABF-3AD9-4627-BA56-019AAF0D0062"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://download.schneider-electric.com/files?p_Doc_Ref=SEVD-2024-044-03&p_enDocType=Security+and+Safety+Notice&p_File_Name=SEVD-2024-044-03.pdf",
|
||||
"source": "cybersecurity@se.com"
|
||||
"source": "cybersecurity@se.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-20652",
|
||||
"sourceIdentifier": "secure@microsoft.com",
|
||||
"published": "2024-01-09T18:15:47.733",
|
||||
"lastModified": "2024-05-29T00:15:11.280",
|
||||
"lastModified": "2024-07-19T21:15:17.483",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -18,7 +18,7 @@
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"source": "secure@microsoft.com",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
@ -38,23 +38,23 @@
|
||||
"impactScore": 5.9
|
||||
},
|
||||
{
|
||||
"source": "secure@microsoft.com",
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "HIGH",
|
||||
"privilegesRequired": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 7.5,
|
||||
"baseScore": 8.1,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 1.6,
|
||||
"exploitabilityScore": 2.2,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-21377",
|
||||
"sourceIdentifier": "secure@microsoft.com",
|
||||
"published": "2024-02-13T18:15:55.663",
|
||||
"lastModified": "2024-05-29T00:15:30.917",
|
||||
"lastModified": "2024-07-19T20:15:06.523",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -18,7 +18,7 @@
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"source": "secure@microsoft.com",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
@ -38,11 +38,11 @@
|
||||
"impactScore": 3.6
|
||||
},
|
||||
{
|
||||
"source": "secure@microsoft.com",
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
@ -50,12 +50,12 @@
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 7.1,
|
||||
"baseSeverity": "HIGH"
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 5.5,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 5.2
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-32007",
|
||||
"sourceIdentifier": "security@apache.org",
|
||||
"published": "2024-07-19T09:15:04.713",
|
||||
"lastModified": "2024-07-19T13:01:44.567",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-07-19T20:22:53.447",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -11,11 +11,44 @@
|
||||
"value": "An improper input validation of the\u00a0p2c parameter in the Apache CXF JOSE code before 4.0.5, 3.6.4 and 3.5.9\u00a0allows an attacker to perform a denial of service attack by specifying a large value for this parameter in a token.\u00a0\n"
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 7.5,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security@apache.org",
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "NVD-CWE-noinfo"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "security@apache.org",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -28,10 +61,46 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:apache:cxf:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "3.5.9",
|
||||
"matchCriteriaId": "BF0BA29F-721E-4599-A7AC-32DAC5AB44D5"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:apache:cxf:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "3.6.0",
|
||||
"versionEndExcluding": "3.6.4",
|
||||
"matchCriteriaId": "7D6F6603-DD23-4DD5-8B90-0BAB0EB7E1D1"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:apache:cxf:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "4.0.0",
|
||||
"versionEndExcluding": "4.0.5",
|
||||
"matchCriteriaId": "ACAFECF5-75A5-4397-A588-F51D09717335"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://lists.apache.org/thread/stwrgsr1llb73nkl16klv9vjqgmmx633",
|
||||
"source": "security@apache.org"
|
||||
"source": "security@apache.org",
|
||||
"tags": [
|
||||
"Mailing List",
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
21
CVE-2024/CVE-2024-391xx/CVE-2024-39123.json
Normal file
21
CVE-2024/CVE-2024-391xx/CVE-2024-39123.json
Normal file
@ -0,0 +1,21 @@
|
||||
{
|
||||
"id": "CVE-2024-39123",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-07-19T20:15:07.797",
|
||||
"lastModified": "2024-07-19T20:15:07.797",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "In janeczku Calibre-Web 0.6.0 to 0.6.21, the edit_book_comments function is vulnerable to Cross Site Scripting (XSS) due to improper sanitization performed by the clean_string function. The vulnerability arises from the way the clean_string function handles HTML sanitization."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/pentesttoolscom/vulnerability-research/tree/master/CVE-2024-39123",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
60
CVE-2024/CVE-2024-399xx/CVE-2024-39906.json
Normal file
60
CVE-2024/CVE-2024-399xx/CVE-2024-39906.json
Normal file
@ -0,0 +1,60 @@
|
||||
{
|
||||
"id": "CVE-2024-39906",
|
||||
"sourceIdentifier": "security-advisories@github.com",
|
||||
"published": "2024-07-19T20:15:07.887",
|
||||
"lastModified": "2024-07-19T20:15:07.887",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A command injection vulnerability was found in the IndieAuth functionality of the Ruby on Rails based Haven blog web application. The affected functionality requires authentication, but an attacker can craft a link that they can pass to a logged in administrator of the blog software. This leads to the immediate execution of the provided commands when the link is accessed by the authenticated administrator. This issue may lead to Remote Code Execution (RCE) and has been addressed by commit `c52f07c`. Users are advised to upgrade. There are no known workarounds for this vulnerability.\n"
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "HIGH",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 8.3,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 1.6,
|
||||
"impactScore": 6.0
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-74"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/havenweb/haven/commit/c52f07c",
|
||||
"source": "security-advisories@github.com"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/havenweb/haven/security/advisories/GHSA-65cm-7g24-hm9f",
|
||||
"source": "security-advisories@github.com"
|
||||
}
|
||||
]
|
||||
}
|
76
CVE-2024/CVE-2024-411xx/CVE-2024-41121.json
Normal file
76
CVE-2024/CVE-2024-411xx/CVE-2024-41121.json
Normal file
@ -0,0 +1,76 @@
|
||||
{
|
||||
"id": "CVE-2024-41121",
|
||||
"sourceIdentifier": "security-advisories@github.com",
|
||||
"published": "2024-07-19T20:15:08.180",
|
||||
"lastModified": "2024-07-19T20:15:08.180",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Woodpecker is a simple yet powerful CI/CD engine with great extensibility. The server allow to create any user who can trigger a pipeline run malicious workflows: 1. Those workflows can either lead to a host takeover that runs the agent executing the workflow. 2. Or allow to extract the secrets who would be normally provided to the plugins who's entrypoint are overwritten. This issue has been addressed in release version 2.7.0. Users are advised to upgrade. There are no known workarounds for this vulnerability."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 8.8,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-74"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/woodpecker-ci/woodpecker-security/issues/8",
|
||||
"source": "security-advisories@github.com"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/woodpecker-ci/woodpecker-security/issues/9",
|
||||
"source": "security-advisories@github.com"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/woodpecker-ci/woodpecker-security/pull/11",
|
||||
"source": "security-advisories@github.com"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/woodpecker-ci/woodpecker/issues/3924",
|
||||
"source": "security-advisories@github.com"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/woodpecker-ci/woodpecker/pull/3933",
|
||||
"source": "security-advisories@github.com"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/woodpecker-ci/woodpecker/security/advisories/GHSA-xw35-rrcp-g7xm",
|
||||
"source": "security-advisories@github.com"
|
||||
}
|
||||
]
|
||||
}
|
72
CVE-2024/CVE-2024-411xx/CVE-2024-41122.json
Normal file
72
CVE-2024/CVE-2024-411xx/CVE-2024-41122.json
Normal file
@ -0,0 +1,72 @@
|
||||
{
|
||||
"id": "CVE-2024-41122",
|
||||
"sourceIdentifier": "security-advisories@github.com",
|
||||
"published": "2024-07-19T20:15:08.430",
|
||||
"lastModified": "2024-07-19T20:15:08.430",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Woodpecker is a simple yet powerful CI/CD engine with great extensibility. The server allow to create any user who can trigger a pipeline run malicious workflows: 1. Those workflows can either lead to a host takeover that runs the agent executing the workflow. 2. Or allow to extract the secrets who would be normally provided to the plugins who's entrypoint are overwritten. This issue has been addressed in release version 2.7.0. Users are advised to upgrade. There are no known workarounds for this vulnerability."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "HIGH",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 7.5,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 1.6,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-74"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/woodpecker-ci/woodpecker-security/issues/10",
|
||||
"source": "security-advisories@github.com"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/woodpecker-ci/woodpecker/issues/3929",
|
||||
"source": "security-advisories@github.com"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/woodpecker-ci/woodpecker/pull/3909",
|
||||
"source": "security-advisories@github.com"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/woodpecker-ci/woodpecker/pull/3934",
|
||||
"source": "security-advisories@github.com"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/woodpecker-ci/woodpecker/security/advisories/GHSA-3wf2-2pq4-4rvc",
|
||||
"source": "security-advisories@github.com"
|
||||
}
|
||||
]
|
||||
}
|
68
CVE-2024/CVE-2024-411xx/CVE-2024-41124.json
Normal file
68
CVE-2024/CVE-2024-411xx/CVE-2024-41124.json
Normal file
@ -0,0 +1,68 @@
|
||||
{
|
||||
"id": "CVE-2024-41124",
|
||||
"sourceIdentifier": "security-advisories@github.com",
|
||||
"published": "2024-07-19T20:15:08.673",
|
||||
"lastModified": "2024-07-19T20:15:08.673",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Puncia is the Official CLI utility for Subdomain Center & Exploit Observer. `API_URLS` is utilizing HTTP instead of HTTPS for communication that can lead to issues like Eavesdropping, Data Tampering, Unauthorized Data Access & MITM Attacks. This issue has been addressed in release version 0.21 by using https rather than http connections. All users are advised to upgrade. There is no known workarounds for this vulnerability.\n"
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:A/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "ADJACENT_NETWORK",
|
||||
"attackComplexity": "HIGH",
|
||||
"privilegesRequired": "HIGH",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 6.3,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 0.4,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-311"
|
||||
},
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-319"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/ARPSyndicate/puncia/commit/033f3b68126eabbb2040ce16e2c3a2ce17437fbd#diff-3ec6c2de51e702726b23c452e3f4a899f6f4253af9fbf5be7254a5c1407ab526",
|
||||
"source": "security-advisories@github.com"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/ARPSyndicate/puncia/issues/8",
|
||||
"source": "security-advisories@github.com"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/ARPSyndicate/puncia/security/advisories/GHSA-rwcj-7jjp-4w38",
|
||||
"source": "security-advisories@github.com"
|
||||
}
|
||||
]
|
||||
}
|
21
CVE-2024/CVE-2024-415xx/CVE-2024-41597.json
Normal file
21
CVE-2024/CVE-2024-415xx/CVE-2024-41597.json
Normal file
@ -0,0 +1,21 @@
|
||||
{
|
||||
"id": "CVE-2024-41597",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-07-19T20:15:08.993",
|
||||
"lastModified": "2024-07-19T20:15:08.993",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Cross Site Request Forgery vulnerability in ProcessWire v.3.0.229 allows a remote attacker to execute arbitrary code via a crafted HTML file to the comments functionality."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://gist.github.com/DefensiumDevelopers/608be4d10b016dce0566925368a8b08c#file-cve-2024-41597-md",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
21
CVE-2024/CVE-2024-415xx/CVE-2024-41599.json
Normal file
21
CVE-2024/CVE-2024-415xx/CVE-2024-41599.json
Normal file
@ -0,0 +1,21 @@
|
||||
{
|
||||
"id": "CVE-2024-41599",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-07-19T20:15:09.063",
|
||||
"lastModified": "2024-07-19T20:15:09.063",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Cross Site Scripting vulnerability in RuoYi v.4.7.9 and before allows a remote attacker to execute arbitrary code via the file upload method"
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/topsky979/Security-Collections/tree/main/CVE-2024-41599",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-6205",
|
||||
"sourceIdentifier": "contact@wpscan.com",
|
||||
"published": "2024-07-19T06:15:03.817",
|
||||
"lastModified": "2024-07-19T13:01:44.567",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-07-19T20:23:18.960",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -15,11 +15,68 @@
|
||||
"value": "El complemento PayPlus Payment Gateway de WordPress anterior a 6.6.9 no sanitiza ni escapa adecuadamente un par\u00e1metro antes de usarlo en una declaraci\u00f3n SQL a trav\u00e9s de una ruta API de WooCommerce disponible para usuarios no autenticados, lo que genera una vulnerabilidad de inyecci\u00f3n SQL."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-89"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:payplus:payplus_payment_gateway:*:*:*:*:*:wordpress:*:*",
|
||||
"versionEndExcluding": "6.6.9",
|
||||
"matchCriteriaId": "274F7840-EDC5-4B89-A6FE-1A6E390CFCBA"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://wpscan.com/vulnerability/7e2c5032-2917-418c-aee3-092bdb78a087/",
|
||||
"source": "contact@wpscan.com"
|
||||
"source": "contact@wpscan.com",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-6338",
|
||||
"sourceIdentifier": "security@wordfence.com",
|
||||
"published": "2024-07-19T08:15:02.347",
|
||||
"lastModified": "2024-07-19T13:01:44.567",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-07-19T20:24:40.397",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -36,6 +36,16 @@
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-89"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "security@wordfence.com",
|
||||
"type": "Secondary",
|
||||
@ -47,22 +57,53 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:foliovision:fv_flowplayer_video_player:*:*:*:*:*:wordpress:*:*",
|
||||
"versionEndExcluding": "7.5.47.7212",
|
||||
"matchCriteriaId": "AACA1EFE-464F-4184-A26B-4C1A65BAEBF7"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/browser/fv-wordpress-flowplayer/trunk/models/video-encoder/class.fv-player-encoder-list-table.php#L308",
|
||||
"source": "security@wordfence.com"
|
||||
"source": "security@wordfence.com",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/changeset/3121532/",
|
||||
"source": "security@wordfence.com"
|
||||
"source": "security@wordfence.com",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://wordpress.org/plugins/fv-wordpress-flowplayer/#developers",
|
||||
"source": "security@wordfence.com"
|
||||
"source": "security@wordfence.com",
|
||||
"tags": [
|
||||
"Product",
|
||||
"Release Notes"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/d4185a0e-d944-408f-8a43-8f9c6bc3964d?source=cve",
|
||||
"source": "security@wordfence.com"
|
||||
"source": "security@wordfence.com",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -3,7 +3,7 @@
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2024-07-19T07:15:02.757",
|
||||
"lastModified": "2024-07-19T19:55:00.210",
|
||||
"vulnStatus": "Analyzed",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
|
49
README.md
49
README.md
@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours.
|
||||
### Last Repository Update
|
||||
|
||||
```plain
|
||||
2024-07-19T20:00:18.321575+00:00
|
||||
2024-07-19T22:00:18.109004+00:00
|
||||
```
|
||||
|
||||
### Most recent CVE Modification Timestamp synchronized with NVD
|
||||
|
||||
```plain
|
||||
2024-07-19T19:55:00.210000+00:00
|
||||
2024-07-19T21:15:17.483000+00:00
|
||||
```
|
||||
|
||||
### Last Data Feed Release
|
||||
@ -33,46 +33,33 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
|
||||
### Total Number of included CVEs
|
||||
|
||||
```plain
|
||||
257514
|
||||
257521
|
||||
```
|
||||
|
||||
### CVEs added in the last Commit
|
||||
|
||||
Recently added CVEs: `2`
|
||||
Recently added CVEs: `7`
|
||||
|
||||
- [CVE-2024-40400](CVE-2024/CVE-2024-404xx/CVE-2024-40400.json) (`2024-07-19T19:15:09.147`)
|
||||
- [CVE-2024-41600](CVE-2024/CVE-2024-416xx/CVE-2024-41600.json) (`2024-07-19T18:15:05.727`)
|
||||
- [CVE-2024-39123](CVE-2024/CVE-2024-391xx/CVE-2024-39123.json) (`2024-07-19T20:15:07.797`)
|
||||
- [CVE-2024-39906](CVE-2024/CVE-2024-399xx/CVE-2024-39906.json) (`2024-07-19T20:15:07.887`)
|
||||
- [CVE-2024-41121](CVE-2024/CVE-2024-411xx/CVE-2024-41121.json) (`2024-07-19T20:15:08.180`)
|
||||
- [CVE-2024-41122](CVE-2024/CVE-2024-411xx/CVE-2024-41122.json) (`2024-07-19T20:15:08.430`)
|
||||
- [CVE-2024-41124](CVE-2024/CVE-2024-411xx/CVE-2024-41124.json) (`2024-07-19T20:15:08.673`)
|
||||
- [CVE-2024-41597](CVE-2024/CVE-2024-415xx/CVE-2024-41597.json) (`2024-07-19T20:15:08.993`)
|
||||
- [CVE-2024-41599](CVE-2024/CVE-2024-415xx/CVE-2024-41599.json) (`2024-07-19T20:15:09.063`)
|
||||
|
||||
|
||||
### CVEs modified in the last Commit
|
||||
|
||||
Recently modified CVEs: `35`
|
||||
Recently modified CVEs: `7`
|
||||
|
||||
- [CVE-2024-33180](CVE-2024/CVE-2024-331xx/CVE-2024-33180.json) (`2024-07-19T18:56:27.127`)
|
||||
- [CVE-2024-33182](CVE-2024/CVE-2024-331xx/CVE-2024-33182.json) (`2024-07-19T18:56:50.050`)
|
||||
- [CVE-2024-34113](CVE-2024/CVE-2024-341xx/CVE-2024-34113.json) (`2024-07-19T18:36:42.237`)
|
||||
- [CVE-2024-34115](CVE-2024/CVE-2024-341xx/CVE-2024-34115.json) (`2024-07-19T18:02:32.427`)
|
||||
- [CVE-2024-35264](CVE-2024/CVE-2024-352xx/CVE-2024-35264.json) (`2024-07-19T18:59:28.370`)
|
||||
- [CVE-2024-35338](CVE-2024/CVE-2024-353xx/CVE-2024-35338.json) (`2024-07-19T18:58:08.977`)
|
||||
- [CVE-2024-35753](CVE-2024/CVE-2024-357xx/CVE-2024-35753.json) (`2024-07-19T18:31:44.157`)
|
||||
- [CVE-2024-35756](CVE-2024/CVE-2024-357xx/CVE-2024-35756.json) (`2024-07-19T18:45:25.210`)
|
||||
- [CVE-2024-36395](CVE-2024/CVE-2024-363xx/CVE-2024-36395.json) (`2024-07-19T18:34:58.837`)
|
||||
- [CVE-2024-37843](CVE-2024/CVE-2024-378xx/CVE-2024-37843.json) (`2024-07-19T18:37:07.720`)
|
||||
- [CVE-2024-41007](CVE-2024/CVE-2024-410xx/CVE-2024-41007.json) (`2024-07-19T18:24:59.197`)
|
||||
- [CVE-2024-4146](CVE-2024/CVE-2024-41xx/CVE-2024-4146.json) (`2024-07-19T19:03:00.867`)
|
||||
- [CVE-2024-4680](CVE-2024/CVE-2024-46xx/CVE-2024-4680.json) (`2024-07-19T18:51:53.003`)
|
||||
- [CVE-2024-5402](CVE-2024/CVE-2024-54xx/CVE-2024-5402.json) (`2024-07-19T18:03:55.583`)
|
||||
- [CVE-2024-5478](CVE-2024/CVE-2024-54xx/CVE-2024-5478.json) (`2024-07-19T18:29:50.137`)
|
||||
- [CVE-2024-5759](CVE-2024/CVE-2024-57xx/CVE-2024-5759.json) (`2024-07-19T18:40:53.863`)
|
||||
- [CVE-2024-5977](CVE-2024/CVE-2024-59xx/CVE-2024-5977.json) (`2024-07-19T18:27:34.967`)
|
||||
- [CVE-2024-6398](CVE-2024/CVE-2024-63xx/CVE-2024-6398.json) (`2024-07-19T18:25:44.247`)
|
||||
- [CVE-2024-6741](CVE-2024/CVE-2024-67xx/CVE-2024-6741.json) (`2024-07-19T18:23:40.233`)
|
||||
- [CVE-2024-6745](CVE-2024/CVE-2024-67xx/CVE-2024-6745.json) (`2024-07-19T18:04:47.363`)
|
||||
- [CVE-2024-6746](CVE-2024/CVE-2024-67xx/CVE-2024-6746.json) (`2024-07-19T18:02:29.417`)
|
||||
- [CVE-2024-6900](CVE-2024/CVE-2024-69xx/CVE-2024-6900.json) (`2024-07-19T19:54:20.537`)
|
||||
- [CVE-2024-0865](CVE-2024/CVE-2024-08xx/CVE-2024-0865.json) (`2024-07-19T20:43:36.043`)
|
||||
- [CVE-2024-20652](CVE-2024/CVE-2024-206xx/CVE-2024-20652.json) (`2024-07-19T21:15:17.483`)
|
||||
- [CVE-2024-21377](CVE-2024/CVE-2024-213xx/CVE-2024-21377.json) (`2024-07-19T20:15:06.523`)
|
||||
- [CVE-2024-32007](CVE-2024/CVE-2024-320xx/CVE-2024-32007.json) (`2024-07-19T20:22:53.447`)
|
||||
- [CVE-2024-6205](CVE-2024/CVE-2024-62xx/CVE-2024-6205.json) (`2024-07-19T20:23:18.960`)
|
||||
- [CVE-2024-6338](CVE-2024/CVE-2024-63xx/CVE-2024-6338.json) (`2024-07-19T20:24:40.397`)
|
||||
- [CVE-2024-6901](CVE-2024/CVE-2024-69xx/CVE-2024-6901.json) (`2024-07-19T19:55:00.210`)
|
||||
- [CVE-2024-6902](CVE-2024/CVE-2024-69xx/CVE-2024-6902.json) (`2024-07-19T19:10:24.903`)
|
||||
- [CVE-2024-6903](CVE-2024/CVE-2024-69xx/CVE-2024-6903.json) (`2024-07-19T19:51:55.617`)
|
||||
|
||||
|
||||
## Download and Usage
|
||||
|
93
_state.csv
93
_state.csv
@ -175566,7 +175566,7 @@ CVE-2021-31618,0,0,73d7e89ab608128df4530a3e31dcc9f38d0019ebbcf13ed27a6c07f673284
|
||||
CVE-2021-3162,0,0,91aa628f46c6f1edfcf47e9c1ae768fe2f228cb6afcaa514d0af2f66f854a3b4,2022-07-12T17:42:04.277000
|
||||
CVE-2021-31624,0,0,f9bb064f6b75a55ae23dbaab9b493874f3477bdd756e005d28e0ddd202fa3dd8,2021-11-02T17:11:52.207000
|
||||
CVE-2021-31627,0,0,b983abe15279ebeb536ac81adde0c0b9689c9f760389f7ac3b66ec14c701ab45,2021-11-03T12:18:22.917000
|
||||
CVE-2021-3163,0,1,bda245d6ab28018888afc4fec64d1bb8208ace93861f535e2d61010555932c29,2024-07-19T19:15:06.277000
|
||||
CVE-2021-3163,0,0,bda245d6ab28018888afc4fec64d1bb8208ace93861f535e2d61010555932c29,2024-07-19T19:15:06.277000
|
||||
CVE-2021-31630,0,0,93c7a1da8d5d487512cf8a33c3ec73387c3509a9a3dc3421321cfea5271501d6,2022-05-03T16:04:40.443000
|
||||
CVE-2021-31631,0,0,e4685f84a5797c763b0e66c36a5ba70eed0e1714a692dde8526e51ca26b8ff7d,2021-12-07T14:02:09.200000
|
||||
CVE-2021-31632,0,0,e692188d243a7872a36e5424d25a260426040a6c83172902699779720b13cc77,2021-12-07T14:03:06.170000
|
||||
@ -176597,7 +176597,7 @@ CVE-2021-33022,0,0,12387620eb30ab39a033a98a69d8adf5e0c7f3aa2f0730cdba76bdbda3df0
|
||||
CVE-2021-33023,0,0,84957ca62689d40114d714b0c9d1a223287a39086e70ca61881201e2684877ed,2021-10-20T22:16:01.683000
|
||||
CVE-2021-33024,0,0,b6524dbe4a1cd7bf93fdbf13b8840b0b97d76ac7145f02c41a784cf3ed6c1b59,2022-04-08T20:44:38.887000
|
||||
CVE-2021-33025,0,0,21fd0dace77928df316063f32312d1acf81d9ac5df72b0121053b1830e1c6991,2022-05-25T14:42:57.127000
|
||||
CVE-2021-33026,0,1,e1c89680bcc6e7153f0139150f21f658e25d33aa5318f35ddeb9f649599b096c,2024-07-19T19:15:05.890000
|
||||
CVE-2021-33026,0,0,e1c89680bcc6e7153f0139150f21f658e25d33aa5318f35ddeb9f649599b096c,2024-07-19T19:15:05.890000
|
||||
CVE-2021-33027,0,0,0801bc34fc460d7a6d4506776bdc66ae449fd654eec6748996397180c19cdd01,2021-07-28T19:39:16.430000
|
||||
CVE-2021-33031,0,0,510b4ee13ad9642728234f837e85ce4e18a9e35b7795bd363872b93ef9b01a8e,2021-06-22T18:29:56.030000
|
||||
CVE-2021-33032,0,0,3d7de3fb5f01a40c864db1d961772ba77a2ef2eb768b56aa55c2492a69cdfeee,2021-09-21T16:18:17.080000
|
||||
@ -178281,7 +178281,7 @@ CVE-2021-3517,0,0,a1d962dfb005b2e5b98c5af02df290ef64262857839ca532498beca7ccdbdd
|
||||
CVE-2021-3518,0,0,a76e97de17ac8f24c61961e5a7d8254226f8468d4aec699c6b57a015dd8e1e0a,2023-11-07T03:38:04.050000
|
||||
CVE-2021-3519,0,0,10977120fb7b4b66273cf50940e4d6bd76a1a997aa363c6e358c8486afb107c4,2021-11-19T22:04:31.987000
|
||||
CVE-2021-35193,0,0,a162afbc7a5171c627141e195f850061f3e08439984b46f73143e95bd5312c58,2021-08-11T15:25:11.357000
|
||||
CVE-2021-35196,0,1,51115fe02c24dd9aa5f1b59d96aabf0d1c32122a5416e1f669f2347c49a27313,2024-07-19T19:15:06.043000
|
||||
CVE-2021-35196,0,0,51115fe02c24dd9aa5f1b59d96aabf0d1c32122a5416e1f669f2347c49a27313,2024-07-19T19:15:06.043000
|
||||
CVE-2021-35197,0,0,22e8eda6d6da7bd81b1e3317fa4ee52603241e7efeefe5b25be85876bc1a8b43,2023-11-07T03:36:30.150000
|
||||
CVE-2021-35198,0,0,cc19841f95cab4d85eab6ca777ade77a70d4e0471df59e5b70b5b81f5d971646,2021-10-04T17:33:36.207000
|
||||
CVE-2021-35199,0,0,8e943a274ef674f856afd4581cd12225bc3ccb44bd8eaac54942c11c734cb67b,2021-10-04T17:34:23.810000
|
||||
@ -180725,7 +180725,7 @@ CVE-2021-3861,0,0,d96c927b4ce8a2c2584938d898f7247493a7a11b1c9168a50ee73528787262
|
||||
CVE-2021-38611,0,0,facd38ca235b5190c149ab951e02227e8e39012fb5f93c6ec8be351d9b2836f4,2021-08-31T11:30:40.837000
|
||||
CVE-2021-38612,0,0,291d09919a2d4e076f51c41552434ace4e345360004390eba05af900524cf7d3,2021-08-31T11:31:18.017000
|
||||
CVE-2021-38613,0,0,15f7f15d144dc659400000a596d12b65d4001066898169998efb6fa4be89003e,2021-10-05T15:38:00.637000
|
||||
CVE-2021-38614,0,1,3c6cdc8aaf419aa0dd08384359d72862e67f3a9da2f1567cbda6404d54ccd61b,2024-07-19T18:15:04.450000
|
||||
CVE-2021-38614,0,0,3c6cdc8aaf419aa0dd08384359d72862e67f3a9da2f1567cbda6404d54ccd61b,2024-07-19T18:15:04.450000
|
||||
CVE-2021-38615,0,0,05c8f60751f80d9360d4c188fdf5dcc5bc0216124ec7f5af113d9d463264c0eb,2022-07-12T17:42:04.277000
|
||||
CVE-2021-38616,0,0,cdd69265ff2e527ac9e39b2cad636e30599eb5d07c5ec90c1463a359fc40ab09,2022-07-12T17:42:04.277000
|
||||
CVE-2021-38617,0,0,505127447e69a7d6e20623bf518d01e3a284c60816be7323a42675dd8361e6fe,2022-07-12T17:42:04.277000
|
||||
@ -183064,7 +183064,7 @@ CVE-2021-41499,0,0,4533365444b601534321d4d5de70f1946f80a8336beda80700193c685d9cf
|
||||
CVE-2021-4150,0,0,0d0b7965b219bc0ddf1a71b047245b29307a4594165e78413979a713c60d4cbf,2022-06-22T15:55:44.063000
|
||||
CVE-2021-41500,0,0,eaef38d53f541677aa204a9ebc1602de2c37f11789109a34722a5d88a6dcfe34,2023-11-07T03:38:57.167000
|
||||
CVE-2021-41502,0,0,b724d6ba66b92ba8c6b97cade3706ad4a07572464937ce6bfbf2977f2e864a29,2022-06-17T17:31:33.673000
|
||||
CVE-2021-41503,0,1,507044a732cba75567c9200de5f96b200fca3f8bf0bec202815e9a93f937e02a,2024-07-19T18:15:04.580000
|
||||
CVE-2021-41503,0,0,507044a732cba75567c9200de5f96b200fca3f8bf0bec202815e9a93f937e02a,2024-07-19T18:15:04.580000
|
||||
CVE-2021-41504,0,0,fb1adfb7674ffa96cc983b72eff36e98681ffceec30954458e632d5d81177850,2024-05-17T02:01:13.233000
|
||||
CVE-2021-41506,0,0,01d8b9a3a83b6e4dd58b7f9cb9f746d4b0cc6e281fbbd19de359fa7a4a03956e,2023-08-08T14:22:24.967000
|
||||
CVE-2021-41511,0,0,6299aae48910aa774784abd64e72607fa5e292e1f043623428d5d9d2ecdb4eb6,2021-11-30T22:39:04.107000
|
||||
@ -212287,7 +212287,7 @@ CVE-2022-48830,0,0,e22e2e0887b0b86eb4cf324cb4a9f7a83e6b7926d3beca11ffca268260854
|
||||
CVE-2022-48831,0,0,351602b86da3ea07115bf6f723f7380003eff65b8aede2b909ab31a6e1b9ff33,2024-07-16T13:43:58.773000
|
||||
CVE-2022-48832,0,0,0a5e163c028cd3d25fc5acb6c8965020bb8461631f62ab5431623b874d61e765,2024-07-16T13:43:58.773000
|
||||
CVE-2022-48833,0,0,d3249b6f1f8afc394f753bdd0cb4f946023d7de7e66839f5269338ef343a4377,2024-07-16T13:43:58.773000
|
||||
CVE-2022-48834,0,1,3fb7de4eb75ae6cee58aac6782b7ecb504ead7c703df9b113b93be65a47f5989,2024-07-19T18:00:51.173000
|
||||
CVE-2022-48834,0,0,3fb7de4eb75ae6cee58aac6782b7ecb504ead7c703df9b113b93be65a47f5989,2024-07-19T18:00:51.173000
|
||||
CVE-2022-48835,0,0,2479254d1fbe0dc2b5306c0fd9d9d0164d10c20462ce8b7a8e261d762dd9b069,2024-07-16T13:43:58.773000
|
||||
CVE-2022-48836,0,0,fc888f24293335e1fd6f0258311ddaf2aaf3aa4461faee55b6cb3f00722e9478,2024-07-16T13:43:58.773000
|
||||
CVE-2022-48837,0,0,6ba0c2c49c8b0fc22b8aa3e7bd58e22713beeb87b8a880fecfa58840737e2898,2024-07-18T16:07:46.433000
|
||||
@ -241568,7 +241568,7 @@ CVE-2024-0860,0,0,831bd3ec539e95c34edc12f0e20bfc01b276aabb943cb43f0dff12e2351108
|
||||
CVE-2024-0861,0,0,1dd0a19315846d024e7b8ae57a7239c79008bf517ee450637fa734c1a49dea72,2024-03-04T20:26:41.663000
|
||||
CVE-2024-0862,0,0,cd566c8abfba0ca515f734ef4070df65c5856e9bf9b981d35c91f199e6054347,2024-05-14T19:17:55.627000
|
||||
CVE-2024-0864,0,0,4838bb1442b32a0dd852875155909912393803b01af722b0708fdc53c8c88a0c,2024-02-29T13:49:29.390000
|
||||
CVE-2024-0865,0,0,b536ddfc193fe5584b3615db32f5cfa428bd0ca1a7248212aefd952fdbe95db7,2024-06-13T18:36:09.010000
|
||||
CVE-2024-0865,0,1,92ed612466d8a4d7183523d7500a321a95aa9e27cc826fa3fd89f2bb9954809a,2024-07-19T20:43:36.043000
|
||||
CVE-2024-0866,0,0,fc759d49c9e441a8b12ab4ad1a997904eb8eb9894ecca01f95e8cb0572eecb6c,2024-03-26T12:55:05.010000
|
||||
CVE-2024-0867,0,0,e359b89be2d490f4a35e658519a1716eaafc027d44d059518f42f8274899e25d,2024-05-24T13:03:11.993000
|
||||
CVE-2024-0868,0,0,064ae3bec4353cd7c6b09e358ce5b3e7beeeb81aabaa1df29dac1b0ed40584ed,2024-04-17T12:48:07.510000
|
||||
@ -242853,7 +242853,7 @@ CVE-2024-2062,0,0,2406ddea9c7a9e191fe080a0778d845672dd3ce664bc0299c5f17d8721e281
|
||||
CVE-2024-2063,0,0,38f16464ff4a2a17db2f4f089a4cce8eb87785c5a21af523c38f6d7fd48abe15,2024-05-17T02:38:01.107000
|
||||
CVE-2024-2064,0,0,b40bbd186075bedd4c79c4485dbbc7afaf64f91d13e7e8a10b45ee9e3a1ea0cf,2024-05-17T02:38:01.207000
|
||||
CVE-2024-2065,0,0,478728edb18d5fa6cf289433d809b0cd0d7b18859b3cb85a64f528d9a8820696,2024-05-17T02:38:01.300000
|
||||
CVE-2024-20652,0,0,7a12c2bc96b4852e007f22d4ec3c14012abd3e18e05e74601f0c6cc70ba1a5da,2024-05-29T00:15:11.280000
|
||||
CVE-2024-20652,0,1,d1d84a7c21dde5cb48e51a116124372fa200490f5105bb0df895c2c81940013b,2024-07-19T21:15:17.483000
|
||||
CVE-2024-20653,0,0,252db722a24c08309012588b241ea0d06852ae66638b4f2bd3c877e9490c43a8,2024-05-29T00:15:11.417000
|
||||
CVE-2024-20654,0,0,b6dbf3bc603514e7551788a914aa88815f325c60c499cd101e0a85c2d5b95ef0,2024-05-29T00:15:11.597000
|
||||
CVE-2024-20655,0,0,cae1d357f29bef6d233c9c76ce924ccc959225ca2ce420e7af9529ffd06ba063,2024-05-29T00:15:11.797000
|
||||
@ -243497,7 +243497,7 @@ CVE-2024-21373,0,0,7de731645493de81ef67a1d3ccf92454e66cdabea61c40e547f5407246c0b
|
||||
CVE-2024-21374,0,0,3571587478d0c95194c3763a86c8989f80736365da23f05f6a7b7a1c3f330163,2024-05-29T00:15:30.363000
|
||||
CVE-2024-21375,0,0,7869503945aa76378caf346931136aaac5af63e3706963ea21782ff802e47367,2024-05-29T00:15:30.550000
|
||||
CVE-2024-21376,0,0,a3ac67b4b0b20d67fd94b2e9c7cd672076b742bb02934fbeec928c6692785c50,2024-05-29T00:15:30.677000
|
||||
CVE-2024-21377,0,0,73219d17a728537527cb6284a0647ed87b9b745bbe74c004a800a46f8bfdb3e1,2024-05-29T00:15:30.917000
|
||||
CVE-2024-21377,0,1,7f2efa75baef54880aa04ac6c9ad8c1c9d76eb21858a745e81036ab800b13678,2024-07-19T20:15:06.523000
|
||||
CVE-2024-21378,0,0,699847306d02e6e390f98f48d1859a6647c073a983f52eeb11f6b816d49b7b43,2024-05-29T00:15:31.037000
|
||||
CVE-2024-21379,0,0,918b6c6ede563698bc3de7f361df452c78e5b01de613962ec2f1c3e11a4bf572,2024-05-29T00:15:31.270000
|
||||
CVE-2024-2138,0,0,1b65a115008fb08c51a9a5d9988e20e2252f90f92a6e454e4a2b81dd0e4e8db2,2024-04-10T13:23:38.787000
|
||||
@ -244409,7 +244409,7 @@ CVE-2024-22663,0,0,1df834bd60409bcfdc952b1d16a72a2b79aa4833b641f5c26890355046fa7
|
||||
CVE-2024-22667,0,0,7f56d340505b9c3137def4c421a855d45fd7bbe83810d24f76e0d49e0f8614f2,2024-02-23T16:15:48.487000
|
||||
CVE-2024-2267,0,0,2beab3e4260cef721297cd0e9cb16cbb758be6b3109196be8212a33811ea4f06,2024-05-17T02:38:07.740000
|
||||
CVE-2024-2268,0,0,e2a7dcfd73ad41fec77d11c0ea586fcbb84dfae867d0aa7884e9bac53d173362,2024-05-17T02:38:07.847000
|
||||
CVE-2024-22682,0,1,5a340c1b31b6e259c63ff9afdb9ddfaa7ba2e6d870ae0776db25aa39ef718055,2024-07-19T19:15:08.093000
|
||||
CVE-2024-22682,0,0,5a340c1b31b6e259c63ff9afdb9ddfaa7ba2e6d870ae0776db25aa39ef718055,2024-07-19T19:15:08.093000
|
||||
CVE-2024-2269,0,0,716bb232865d4622770d80e3ad9b9f6636d31addbbd5842da0c4461f410c04dd,2024-05-17T02:38:07.940000
|
||||
CVE-2024-22699,0,0,a5781608ff1e46696ffacdee768d3d0c988970ac4c163d777ce0ccca4285198e,2024-01-23T14:22:44.407000
|
||||
CVE-2024-2270,0,0,4e7a65f130d23c4c767220472a54f1e1a694a674ca4896ba97c8a2bb99f01cc1,2024-05-17T02:38:08.043000
|
||||
@ -246718,8 +246718,8 @@ CVE-2024-26270,0,0,2370bdb7a99956787a3745aa3f3e8554faf5c6062fbc90c3c2a2f302e3ff3
|
||||
CVE-2024-26275,0,0,21e67c06e24d408ad1a549f766b54f5dfd1b4842df576d827b739e2a28d49505,2024-06-11T12:15:14.017000
|
||||
CVE-2024-26276,0,0,7406f6551c3634363606a828a01f36a4203616ca4676532db244783183501388,2024-06-11T12:15:14.153000
|
||||
CVE-2024-26277,0,0,53da675804208a63e801a731a45b8146add8b1e603e83f9c176483f042fa922f,2024-06-11T12:15:14.273000
|
||||
CVE-2024-26278,0,1,a4bf5f7d4f5a8cc66cc891c37bd6872984880cd4b8b9e994fb28df36f06ab446,2024-07-19T18:53:12.727000
|
||||
CVE-2024-26279,0,1,495c848487ea7b68d426f27b99de0402b60520a7c129465843fde2c78b15bbc3,2024-07-19T18:53:34.103000
|
||||
CVE-2024-26278,0,0,a4bf5f7d4f5a8cc66cc891c37bd6872984880cd4b8b9e994fb28df36f06ab446,2024-07-19T18:53:12.727000
|
||||
CVE-2024-26279,0,0,495c848487ea7b68d426f27b99de0402b60520a7c129465843fde2c78b15bbc3,2024-07-19T18:53:34.103000
|
||||
CVE-2024-2628,0,0,3eb383942c41e553b12d37d763a3ecf0b59954bbb778306cb6907ca273bdbf0e,2024-04-01T15:23:07.793000
|
||||
CVE-2024-26280,0,0,1f3fc8cd8b6e3eb3dd36bd8ce4d8f8a9e24e131da3be579fb8d9bdda224678f9,2024-05-01T18:15:15.537000
|
||||
CVE-2024-26281,0,0,79880eb9ab547a64badb9469ec54aaf28b8e0e224b4897c69af19cf6a4aea84d,2024-02-22T19:07:27.197000
|
||||
@ -249385,7 +249385,7 @@ CVE-2024-30101,0,0,7930ed1d01b5b02ebc919bac3d4e56f05b80c135c47d9aae654fe173e1327
|
||||
CVE-2024-30102,0,0,319135154fd92fe7d8106fde2ca3c4802e21706ca62151c235c5521e4367379c,2024-06-20T17:24:52.287000
|
||||
CVE-2024-30103,0,0,cbcd73720f86b02c166360f547f14e75567d871ea6a9bb35fd8a94c030f28d7b,2024-06-20T17:26:40.603000
|
||||
CVE-2024-30104,0,0,0d6554d17808fae404c18fd87f0cb343eeacec3983f90ccf7acd89f92adcb133,2024-06-20T17:27:01.447000
|
||||
CVE-2024-30105,0,1,177f59806b90f7454e05eec5de7f6b4d6c52d371716d38a2a5174f4a99a6d6ad,2024-07-19T18:59:11.433000
|
||||
CVE-2024-30105,0,0,177f59806b90f7454e05eec5de7f6b4d6c52d371716d38a2a5174f4a99a6d6ad,2024-07-19T18:59:11.433000
|
||||
CVE-2024-30107,0,0,d3b5ab85a30627420755b961fce34a4b2d10a642f6dfcc200d0ec65e71213655,2024-07-03T01:53:50.107000
|
||||
CVE-2024-30109,0,0,04881debc711277dac69677e9ba1bd3a604eac95048cd8a9d9b601fb19907fcf,2024-06-28T10:27:00.920000
|
||||
CVE-2024-3011,0,0,c4846fd2702ef9f4bfa13037695154c3570856acd954e92705194ddf5482466d,2024-05-17T02:39:40.533000
|
||||
@ -250694,7 +250694,7 @@ CVE-2024-32002,0,0,8b152fa71cb7888d307cedcb6036ff42410fe299ac886c8397e8f14b70468
|
||||
CVE-2024-32003,0,0,31311e12a1795761553a56c6af2bf7b204ba79f18fac5a0250a8b13fef254e1b,2024-04-15T13:15:31.997000
|
||||
CVE-2024-32004,0,0,46c6e95c184179de4512a1da85cf6fbcce6fe2ac4189ff7da433e0234267bb88,2024-06-26T10:15:12.050000
|
||||
CVE-2024-32005,0,0,d156f3f94a9502713f64771d89d9d58b72987fd70cae51625e32aa2c9e6ee96e,2024-04-15T13:15:31.997000
|
||||
CVE-2024-32007,0,0,7725cbb0a212ec163393c6649d2fedd94f312a7ff02ad6f3a9117280b4fa47fd,2024-07-19T13:01:44.567000
|
||||
CVE-2024-32007,0,1,5849b6cd1748efef89351dfc9c32948445691350c1601a28d03360dd542aa6e6,2024-07-19T20:22:53.447000
|
||||
CVE-2024-3201,0,0,9d746fb1c422de83f85c51388b2057631f70f2332b71bf082d5fbeff58a4ab1e,2024-05-24T01:15:30.977000
|
||||
CVE-2024-32017,0,0,4171151be280ba186c662a4712cd0108f86c659cb0491f443a14bc31a4f95a77,2024-06-10T18:15:31.880000
|
||||
CVE-2024-32018,0,0,a57cd84bbc4228dbc73979371818ba4496491d8c8d7ae0852269ca74ca3485fd,2024-06-10T18:15:31.980000
|
||||
@ -251501,9 +251501,9 @@ CVE-2024-33161,0,0,7c862270cd8db5129099f6546f3d477eb1434dd611bb5f19fdd029c5b8f8a
|
||||
CVE-2024-33164,0,0,c1a8c6145de610892a7bb74e83180ec7a64a9f7db7bc45d4e35a23e8ebd4b541,2024-07-03T01:57:35.293000
|
||||
CVE-2024-3317,0,0,15025142ba0ff8fc3f744db50ac9158b6bcb9b6d5a57142218ea92afecce54a1,2024-05-15T16:40:19.330000
|
||||
CVE-2024-3318,0,0,71502ae7f4475eb417a0f66428af131ecf9e20dfbae9cc78fb40285e74c55810,2024-05-15T16:40:19.330000
|
||||
CVE-2024-33180,0,1,be009f10bcebf1e98910a8635d0e84bddf7114d6da1db43077d57e11c3875055,2024-07-19T18:56:27.127000
|
||||
CVE-2024-33180,0,0,be009f10bcebf1e98910a8635d0e84bddf7114d6da1db43077d57e11c3875055,2024-07-19T18:56:27.127000
|
||||
CVE-2024-33181,0,0,77250253d08a3feb8fbbde7865e83c75f042d3ca6fd20c862b5cca96419dc488,2024-07-17T13:34:20.520000
|
||||
CVE-2024-33182,0,1,5c7ef37a480fd030990cd949b2c37482b68e7bad26bc93f18c84eca3078bea91,2024-07-19T18:56:50.050000
|
||||
CVE-2024-33182,0,0,5c7ef37a480fd030990cd949b2c37482b68e7bad26bc93f18c84eca3078bea91,2024-07-19T18:56:50.050000
|
||||
CVE-2024-3319,0,0,3b63602fbf088f6ff76602ae3f5143e8ab646a9d9d32adce3daded5265d3ba0c,2024-05-15T16:40:19.330000
|
||||
CVE-2024-3320,0,0,00dd140c669ed55b9724819953be5e5ab674983ce3dcac0f7cca51e60d13bb6e,2024-05-17T02:39:50.797000
|
||||
CVE-2024-3321,0,0,c2a87eddc88d30331563f9d17a640b75164460d2c5dacd42388be73c643c2230,2024-05-17T02:39:50.900000
|
||||
@ -252061,8 +252061,8 @@ CVE-2024-3411,0,0,c5534494d0c0f328f6dd6a29b2c75cf0917384aed2d3044a8f39c15c542a25
|
||||
CVE-2024-34110,0,0,c15838464fcaf085b2c09e471beb2e732398e46cad7f992477efffffb5459007,2024-07-09T15:09:42.910000
|
||||
CVE-2024-34111,0,0,4a9af478fa0b194ac18b28c5d5f631624ab8b5f4cddcd67eee0080f90cb10414,2024-07-09T15:24:38.657000
|
||||
CVE-2024-34112,0,0,e62a170073c335d4b2fa523b231a2040753ea6d61925540b759aae879b0a33d7,2024-06-13T18:35:19.777000
|
||||
CVE-2024-34113,0,1,0f7d0a8eb1af93d43a3d745444146bc9527531bee6c987cddc2959cabac9896d,2024-07-19T18:36:42.237000
|
||||
CVE-2024-34115,0,1,cc8b9b55a33ad4e137b074effd11699dd96f8494f93e6413f33a6c251661c876,2024-07-19T18:02:32.427000
|
||||
CVE-2024-34113,0,0,0f7d0a8eb1af93d43a3d745444146bc9527531bee6c987cddc2959cabac9896d,2024-07-19T18:36:42.237000
|
||||
CVE-2024-34115,0,0,cc8b9b55a33ad4e137b074effd11699dd96f8494f93e6413f33a6c251661c876,2024-07-19T18:02:32.427000
|
||||
CVE-2024-34116,0,0,09fbac3718cdfc715ab3de1929ed1cef43d5ef1bea636640bb6faeb5c824040f,2024-07-19T17:40:23.473000
|
||||
CVE-2024-34119,0,0,b18bee7f46141710c36322baeea2f2f79cc2cfb9042e189f93a16a755c8d108c,2024-06-14T20:03:08.293000
|
||||
CVE-2024-3412,0,0,e50c7e3ae6f10b261f3da66fd6437a79038925b3952464be81ac0e7b8712c198,2024-05-29T13:02:09.280000
|
||||
@ -252716,7 +252716,7 @@ CVE-2024-3526,0,0,3b86e48cdd64c94b1957dd961f1ea8a5609328c0a5fd236d499daf2f49d2a8
|
||||
CVE-2024-35260,0,0,bae5987a3d9c4653f4a8ff7faa6c237ff82527372850961d3f63629ac612e217,2024-06-28T23:15:11.457000
|
||||
CVE-2024-35261,0,0,9d9063b6e7979be3a79ef13bd9cc70b3fb0340950dd44d60d9d3d687415ebbe0,2024-07-17T15:48:39.097000
|
||||
CVE-2024-35263,0,0,f00bc0132870d05293845d05b9562badae38c6c7b9bb0d9a00ba1c99b84818b6,2024-06-20T16:32:31.287000
|
||||
CVE-2024-35264,0,1,40d724389414ca4fabf1feae652fc23d2bbd2b3015de995d803ac6656e74295d,2024-07-19T18:59:28.370000
|
||||
CVE-2024-35264,0,0,40d724389414ca4fabf1feae652fc23d2bbd2b3015de995d803ac6656e74295d,2024-07-19T18:59:28.370000
|
||||
CVE-2024-35265,0,0,66f306784b0cec4cac480e0b04ab07434b85a607c811d4eded9bc25afd0a65fe,2024-06-20T16:33:28.080000
|
||||
CVE-2024-35266,0,0,72f85b66607ed3ec09a2f90bfb8b5421fbcbe1083bf3c8d31d5232091779c5c4,2024-07-17T15:03:10.610000
|
||||
CVE-2024-35267,0,0,8d2f4a11b808fec8563f241fc658cf43f5e54d7aaadc09b793c2bc37e252ec9d,2024-07-17T15:02:22.937000
|
||||
@ -252753,7 +252753,7 @@ CVE-2024-35328,0,0,fb4ef24959ef3b86e1d1e2a626668146540c0ab6d259d48f6d635a7a92dd5
|
||||
CVE-2024-35329,0,0,4292102d3fac0226e3e155445f438715ce7df9eb09ed90a898e6b306574b942f,2024-06-12T22:15:18.400000
|
||||
CVE-2024-3533,0,0,488bd266f4041c85454e2052fe9f29a33b96935dc189b43a270de9d8362e90d3,2024-05-17T02:39:59.617000
|
||||
CVE-2024-35333,0,0,a56b2cbb1d825bab243b29d0e8302efa743a6d64a0ad5ee6a14e21ffdd4302cd,2024-05-29T19:50:25.303000
|
||||
CVE-2024-35338,0,1,41104e352664b04e28e033aa02c5869f3a89a42461e39bce966f727fb8f2d51d,2024-07-19T18:58:08.977000
|
||||
CVE-2024-35338,0,0,41104e352664b04e28e033aa02c5869f3a89a42461e39bce966f727fb8f2d51d,2024-07-19T18:58:08.977000
|
||||
CVE-2024-35339,0,0,bda26dbfd7448a5a1d77a8cc49c3bca16a6f7dd67b8f4622c92179451c9d0982,2024-05-24T18:09:20.027000
|
||||
CVE-2024-3534,0,0,a24b539c4ddbcbbbcd76a0a70e496243d7203c000aa2dbf195c274be99bd3f1c,2024-05-17T02:39:59.703000
|
||||
CVE-2024-35340,0,0,208fd1528799a390da0274829910466a1b7fd43365d7d44eef3241578a979281,2024-05-24T18:09:20.027000
|
||||
@ -253003,10 +253003,10 @@ CVE-2024-3575,0,0,7b73b64d176ee42e3f815efb129e0a4e8daabc141e22843995ce1432261811
|
||||
CVE-2024-35750,0,0,337904e02d48eff7e7f71ff4e0b4d15f230905a46ebf33e9ed3f06ed45b6365c,2024-06-10T02:52:08.267000
|
||||
CVE-2024-35751,0,0,2f4b51636ece37d50579e65fb58d2700611ff65fd14c4b21be633ae796fa0057,2024-06-10T02:52:08.267000
|
||||
CVE-2024-35752,0,0,062777696b3e277bdd4663be2181ce3994f39fef6908c28ebd787d505d32576b,2024-06-10T02:52:08.267000
|
||||
CVE-2024-35753,0,1,4ad7364fde338b1172d3912b082d48ff9c7e6bb90d9788eb462ee65f933adbdc,2024-07-19T18:31:44.157000
|
||||
CVE-2024-35753,0,0,4ad7364fde338b1172d3912b082d48ff9c7e6bb90d9788eb462ee65f933adbdc,2024-07-19T18:31:44.157000
|
||||
CVE-2024-35754,0,0,6542d4ccfbee23f434dbe55310367fe2a58769f4413cd83c76145804203a6991,2024-06-12T18:19:06.043000
|
||||
CVE-2024-35755,0,0,a8c10fddaac41070d5fe50fd470da1315522de64d4a44961b0b2aff5b7478232,2024-06-10T02:52:08.267000
|
||||
CVE-2024-35756,0,1,544619c9ecc5325b30fd6bce5cf3678837c7f45621d4b9369a6b2ab863337f02,2024-07-19T18:45:25.210000
|
||||
CVE-2024-35756,0,0,544619c9ecc5325b30fd6bce5cf3678837c7f45621d4b9369a6b2ab863337f02,2024-07-19T18:45:25.210000
|
||||
CVE-2024-35757,0,0,1783dc94b696b52627bcb10bcd86c9195ecb7dd5f909ee1c78c7f825973d91cd,2024-06-24T19:19:01.097000
|
||||
CVE-2024-35758,0,0,c003876eab7b54fdade1783d14653406500e6822c823598d393dc5d8fd37a00a,2024-06-24T19:19:51.957000
|
||||
CVE-2024-35759,0,0,e957a3d510ea6fb897a8dc7146e8bb7eefa5cb0f601b99033133995f35de7948,2024-06-24T19:20:39.243000
|
||||
@ -253548,7 +253548,7 @@ CVE-2024-36391,0,0,77310a97703465811c5ddd3ebe2104670dbc28c3dea8fc35d729dda239044
|
||||
CVE-2024-36392,0,0,f8ffad51e43f014822bc8d56227eafc027d77ce4af9f8ddb281e1dd26642b42e,2024-06-03T14:46:24.250000
|
||||
CVE-2024-36393,0,0,66cc85a4816620185dd811312e53841307ae83d95e0a80e5417b0f2e7ce598f0,2024-06-11T17:46:59.160000
|
||||
CVE-2024-36394,0,0,ce487e69c50908b259342c996fd749aeec003c1cc9ebc8d7c04cb76587e4b2a6,2024-06-11T17:46:38.227000
|
||||
CVE-2024-36395,0,1,f89c2edf8412c7a856779bf7bdcd2dc639ea5537dbb90aaf5a59ca64c625227c,2024-07-19T18:34:58.837000
|
||||
CVE-2024-36395,0,0,f89c2edf8412c7a856779bf7bdcd2dc639ea5537dbb90aaf5a59ca64c625227c,2024-07-19T18:34:58.837000
|
||||
CVE-2024-36396,0,0,0e6924514e3a92d628b298cd68bd36948dbb22e9cbe90a69cf64659cd177b86d,2024-06-13T18:35:19.777000
|
||||
CVE-2024-36397,0,0,188c11e4d152fc37a7853e376b1b43fe1b9cf304441640b2de09cf263ffc914e,2024-06-17T12:42:04.623000
|
||||
CVE-2024-36399,0,0,343a0b337c47a08f8ef5da762844b89fa9f0783d7ae2cdee4dacb27b86b494cf,2024-06-07T14:56:05.647000
|
||||
@ -254285,7 +254285,7 @@ CVE-2024-37830,0,0,e0109fbeb8288904c31bfa3039a4919b2d322bf3da95ef389b8c5d886122a
|
||||
CVE-2024-37831,0,0,dd81b6f858235d5d174850c3a09cd3119f2c9ef6775cb735f933a9db7d0b2fca,2024-06-17T12:42:04.623000
|
||||
CVE-2024-3784,0,0,f0c80c77a0788aa17bf80578f54749ae490fe23c5161f7f9c165d9871caa60a2,2024-04-15T19:12:25.887000
|
||||
CVE-2024-37840,0,0,1ea05f0cae39cea91919dabf259bc43d4d53a339aa6352e9633c1155c24e02e9,2024-07-03T02:04:49.190000
|
||||
CVE-2024-37843,0,1,50fea0e4f3bac899fad47ec99906b1fa57df0775a56839eb833074fee5a84870,2024-07-19T18:37:07.720000
|
||||
CVE-2024-37843,0,0,50fea0e4f3bac899fad47ec99906b1fa57df0775a56839eb833074fee5a84870,2024-07-19T18:37:07.720000
|
||||
CVE-2024-37848,0,0,b9654691620e5501baad2d1771338ac2aedaf89f42fcedfa6b269a2de242ad76,2024-07-03T02:04:49.977000
|
||||
CVE-2024-37849,0,0,4ee4d4574c1172cb3abdf8336968f4a7fdf4de3cfa287b589ecffd9b4f74d6e9,2024-06-13T18:35:19.777000
|
||||
CVE-2024-3785,0,0,e84209989b24c941d7c6f3eae4d5a1283a6975747744d670fcd7c761c7276a68,2024-04-15T19:12:25.887000
|
||||
@ -254843,6 +254843,7 @@ CVE-2024-3911,0,0,554ab1929819d1eb25e95db5b6b72b7d88b66260392eaf976b13306fbbfd7f
|
||||
CVE-2024-39118,0,0,c73221ddf1d7aabf1cde04e3cc8495d2b93ac9b8498b2f760ce56c4f1b9d2289,2024-07-11T18:30:13.010000
|
||||
CVE-2024-39119,0,0,335f0358240af17c362e55e8a97871d20387542a8ff60c6e91f13df6b4480ed8,2024-07-11T15:06:08.390000
|
||||
CVE-2024-3912,0,0,039ece273f1483faaa0f8be913ee60b27e57016f6ef1d8ef33b60eb0f1f7f14a,2024-06-17T12:42:04.623000
|
||||
CVE-2024-39123,1,1,753898ff0701184c297467ef8a894312ee3249ca59808cc8ff38f968c8cec895,2024-07-19T20:15:07.797000
|
||||
CVE-2024-39124,0,0,4fe7663d40d1aae481128589ee998bc5addb6da2a2af45eb47dfa2373a8cc8dd,2024-07-18T12:28:43.707000
|
||||
CVE-2024-39125,0,0,d2abdd9bdf1fea6bf3cd5c2afccfb8d0920421dca4e9ac0511f833b335509c47,2024-07-18T12:28:43.707000
|
||||
CVE-2024-39126,0,0,ccf6b2b0c164879c88c5e1df59c0021a7e319f49656a465e9a6faf26d4c496b4,2024-07-18T12:28:43.707000
|
||||
@ -255198,6 +255199,7 @@ CVE-2024-39901,0,0,2e70a8f9f46cc19984c51f63370a0f8333bfb1ff58b809a78b0486415e619
|
||||
CVE-2024-39903,0,0,138b301be2353a9e3b0b27c4af1a1a55145a503c57863f4b07d601b2ac0aca9c,2024-07-12T16:34:58.687000
|
||||
CVE-2024-39904,0,0,12dfcb7489fbbc04166f8899b5558b4641d719eb33eca1dcad68903cd7888843,2024-07-11T18:09:58.777000
|
||||
CVE-2024-39905,0,0,80f913a61cef6f1c2b28da4a228824e63a50833144469e0ed56e623dda317247,2024-07-11T18:09:58.777000
|
||||
CVE-2024-39906,1,1,6a3387c4cdeee6e759911c4ba2e042848e87536a41688e3c13e4d2719e5ff87f,2024-07-19T20:15:07.887000
|
||||
CVE-2024-39907,0,0,bd1711309f44a56ff6fd5c90a3d3730e0655f011ed3baab78935be3a78a05112,2024-07-19T13:01:44.567000
|
||||
CVE-2024-39908,0,0,08d14bdaf18f2ed74e9b6ee71dfe514c41d48f98781bfe1f038503cd39467df4,2024-07-17T13:34:20.520000
|
||||
CVE-2024-39909,0,0,84d207bd7916a7aa0c749989b5f6df126cc82f60739ec52f44f8de2604f130ed,2024-07-12T16:34:58.687000
|
||||
@ -255283,7 +255285,7 @@ CVE-2024-40392,0,0,24aff9cfa4b3c4d20ed420b107a0e9e4a1c46fd98a294b11a12a988b54b03
|
||||
CVE-2024-40393,0,0,9a9cff313cd70f992ba5494f376cc0670f6ad08ca64711bf1142f1c34830e20a,2024-07-17T13:34:20.520000
|
||||
CVE-2024-40394,0,0,17c458164baf1b329619113e6ff542879ba6819d1fa6a5d27ed04ca607ebcdcf,2024-07-17T13:34:20.520000
|
||||
CVE-2024-4040,0,0,4c2ad1f11d479d0071ddbaeb3523edde6a0cd9c4e74c065c69d4bb5c9b1ac029,2024-04-26T15:25:47.270000
|
||||
CVE-2024-40400,1,1,9eb6c2f93d706174f27bfc0dd5f74962384212a4ac44f32aa31dbee34f0af251,2024-07-19T19:15:09.147000
|
||||
CVE-2024-40400,0,0,9eb6c2f93d706174f27bfc0dd5f74962384212a4ac44f32aa31dbee34f0af251,2024-07-19T19:15:09.147000
|
||||
CVE-2024-40402,0,0,ea107e33c479f886c634a214935ebe7cdf707506e77c26fcea709812bfb0a8f8,2024-07-18T12:28:43.707000
|
||||
CVE-2024-4041,0,0,bd71d95aba274d30d448ad146bc23c848b8a3b9576dc252f709372f143cb7780,2024-05-14T16:11:39.510000
|
||||
CVE-2024-40412,0,0,ee1648a619ace402a2695f357644480cca061a0b71a8c8619f0a343e150121f2,2024-07-15T17:15:02.723000
|
||||
@ -255530,7 +255532,7 @@ CVE-2024-41003,0,0,169fbc8d8f219b490cf3dfcf7244032fd260a4649a745984b83708bf36e0d
|
||||
CVE-2024-41004,0,0,0147872dc41ee82345f1b96b142030c80a622f5d5ebc79db0dff57faab054509,2024-07-12T16:34:58.687000
|
||||
CVE-2024-41005,0,0,95f568882fd1e16260f486a6121f76b4a7b47a9225c03cbcf7d46d652c71fb30,2024-07-12T16:34:58.687000
|
||||
CVE-2024-41006,0,0,58bd6c502a79651b26621eacf2c0dc46dab924e02809c912fba2631a5541c0df,2024-07-12T16:34:58.687000
|
||||
CVE-2024-41007,0,1,557d3d79f36960ef2852244da6d9d8db811ba2a987274c1ebfaa71dd3034b15a,2024-07-19T18:24:59.197000
|
||||
CVE-2024-41007,0,0,557d3d79f36960ef2852244da6d9d8db811ba2a987274c1ebfaa71dd3034b15a,2024-07-19T18:24:59.197000
|
||||
CVE-2024-41008,0,0,44accff6edd09848f65c4ea30c272c9f4e4cafd7e8013f5ed231ff575ad7b53e,2024-07-16T13:43:58.773000
|
||||
CVE-2024-41009,0,0,b973764a3f5390614759bf6dad52e86dad86b20c98263f759698c0703f8fb179,2024-07-19T15:06:23.827000
|
||||
CVE-2024-41010,0,0,ae8d1d1b3ebaab40dc6ac6afde49ce66895bb7f4e7ee92f295ff5ca1fa79b217,2024-07-19T15:24:59.137000
|
||||
@ -255545,6 +255547,9 @@ CVE-2024-41107,0,0,652a52b6606e110f3534fe4630dd6711a03cc8b36414513968170cc7d6016
|
||||
CVE-2024-4111,0,0,a3e4bcb39778569b3be84e8d38a6497dbc2fc6b5a3693d9cc21532b8df994ada,2024-06-04T19:20:29.827000
|
||||
CVE-2024-41111,0,0,52a25c3214b943235db4ca14cf3f4d1ccd955b2141e1d6abf224fc5c4732905d,2024-07-19T13:01:44.567000
|
||||
CVE-2024-4112,0,0,66f333e775e64b1480506fa97b6a827bfd5dac62e9e10520346f3a867cac6cdd,2024-05-17T02:40:15.740000
|
||||
CVE-2024-41121,1,1,4603f5db0f30aca5487dd56574e59e95982b631a6ce15c66c8aa40b614947573,2024-07-19T20:15:08.180000
|
||||
CVE-2024-41122,1,1,d8f0afd7ba858271842880c056328067d3dcf2ec2ccb1986dd0dab4f6fefaba8,2024-07-19T20:15:08.430000
|
||||
CVE-2024-41124,1,1,b8613e8ded74bdb6d69671344684c32e49d3a293491ad886cb638253f61deed5,2024-07-19T20:15:08.673000
|
||||
CVE-2024-4113,0,0,e0d06b1b449a5e3093ad238184a1fc3bb7c021d3199342ed4f77b54476531329,2024-05-17T02:40:15.830000
|
||||
CVE-2024-4114,0,0,387f9ca6df27ba000d0f44d990ccd6bb074258bb946c87938379db9652dc0a14,2024-05-17T02:40:15.917000
|
||||
CVE-2024-4115,0,0,89bc89df66a101d446d6568b359dec67345256fa579984420e2e2fe7ea4994ac,2024-06-04T19:20:29.937000
|
||||
@ -255575,7 +255580,7 @@ CVE-2024-4142,0,0,15f953d52654601c03ad89c9ea21867b549a2aa12635e109fbf9627466e8a2
|
||||
CVE-2024-4143,0,0,e6d56e099b9443f818cba12ec6584b2ae78b4e2e6fa1554ff08fbd2e8dc736a0,2024-07-16T13:43:58.773000
|
||||
CVE-2024-4144,0,0,f950a1b03316faa802a71776ce4e62cc15162cc9cec7d4c30c76255605b1c1fc,2024-05-14T19:17:55.627000
|
||||
CVE-2024-4145,0,0,704254773246494130c81e0600984df247a970411736d475449e315ca595ee9b,2024-07-03T02:07:08.133000
|
||||
CVE-2024-4146,0,1,5bcf92f96755106fd9c198be9e70039e9dbd3f86c15b09e938b03dc5a47e5822,2024-07-19T19:03:00.867000
|
||||
CVE-2024-4146,0,0,5bcf92f96755106fd9c198be9e70039e9dbd3f86c15b09e938b03dc5a47e5822,2024-07-19T19:03:00.867000
|
||||
CVE-2024-4148,0,0,71d4cc4cd9749254e9c2938609496cfae5673c1a094b971881b54b705d48028f,2024-06-03T14:46:24.250000
|
||||
CVE-2024-4149,0,0,28fd6853c4bd2a7bfb26cdd043f9abfc9e17f0ae1c9764bac61fec52fa0d04ad,2024-07-02T14:44:29.993000
|
||||
CVE-2024-41492,0,0,df5dc6152d8b7f9016d691345ca41000789321f2336459b6d5b196f16f0ba6eb,2024-07-19T17:15:03.410000
|
||||
@ -255589,8 +255594,10 @@ CVE-2024-4156,0,0,31cc9500838d0dc99d5959700d84ebbac93048893a2eb67f37ed77d1309355
|
||||
CVE-2024-4157,0,0,ac5ec2e690c76b81403cfa49bc63d1a8caa2fb9d97d28a1055398849720db727,2024-05-22T12:46:53.887000
|
||||
CVE-2024-4158,0,0,9bd0a38e47c5b6d26f1e587737a0ffeb7c251278f38061995fc29ba309646aa6,2024-05-14T16:11:39.510000
|
||||
CVE-2024-4159,0,0,72a4ec46db1a22f62474bfa22a14f37a28a6ceba3042de92b905fca6cc58c082,2024-04-25T23:15:47.087000
|
||||
CVE-2024-41597,1,1,791afaae473c8ed12901e3cdde3bfb1029938a17a9ff3d8b550801fbaeae5b36,2024-07-19T20:15:08.993000
|
||||
CVE-2024-41599,1,1,50d4e050c1ec27b29c4641284dc8b8f1481dec31e67c77d42731c3ed95a00660,2024-07-19T20:15:09.063000
|
||||
CVE-2024-4160,0,0,02cbb5178621697de395e5bf97f83709ae910ce21eba24af27e6bc1b3971ae89,2024-05-31T13:01:46.727000
|
||||
CVE-2024-41600,1,1,f2b932f624dfd0458e745bcd1483aa62906a0984e1310058a8424a219fa01fef,2024-07-19T18:15:05.727000
|
||||
CVE-2024-41600,0,0,f2b932f624dfd0458e745bcd1483aa62906a0984e1310058a8424a219fa01fef,2024-07-19T18:15:05.727000
|
||||
CVE-2024-41601,0,0,346a350f43cc75f6197ce50f796f5c3c3054d176e1b80e37e03376e5e3d38a33,2024-07-19T17:15:03.490000
|
||||
CVE-2024-41602,0,0,321201a0937930bf35589a600482c1b1af97360b03457a5a65e6829dc457eac2,2024-07-19T17:15:03.570000
|
||||
CVE-2024-41603,0,0,6a7507291c8b57ee5956dc2f44ac7781896d1044f85ac59aec3e0a282217d111,2024-07-19T17:15:03.640000
|
||||
@ -256044,7 +256051,7 @@ CVE-2024-4676,0,0,36c2a5f720119d264342d4d9b8586d4aebc357e75b49de4b862f0e7d867ff3
|
||||
CVE-2024-4677,0,0,06b789b4e22353188f4fa1dbcfc045ef487187889647b738ddd6f1b3dabcd887,2024-06-04T19:20:45.830000
|
||||
CVE-2024-4678,0,0,be695eaab1f72a88b10d5b9b54afd539ecd5dccc02b3dde1eca881aeeba1ff59,2024-06-04T19:20:45.930000
|
||||
CVE-2024-4679,0,0,9bfb1104bd992ff014fab2b1166f6f818504f2232183224a6a702e4c44b2119a,2024-07-02T12:09:16.907000
|
||||
CVE-2024-4680,0,1,0c8976c1b63cea89edb43ad9d9b81fc90d65237e24435549d62994fa7d6af35d,2024-07-19T18:51:53.003000
|
||||
CVE-2024-4680,0,0,0c8976c1b63cea89edb43ad9d9b81fc90d65237e24435549d62994fa7d6af35d,2024-07-19T18:51:53.003000
|
||||
CVE-2024-4681,0,0,fe9d790ee9979c1aca5fe28a3e8115d4c327b815a1753595a7df398a95b1856e,2024-06-04T19:20:46.033000
|
||||
CVE-2024-4682,0,0,b188d20fdb53d2324882bc38bcdbd4c51d4b6beb562fc8362c2866e7563895e8,2024-06-04T19:20:46.140000
|
||||
CVE-2024-4683,0,0,f97d6282ccf029728c8ab8e65ca2b64efa101897ef8ccdc22b5456d11d66a8f8,2024-06-04T19:20:46.247000
|
||||
@ -256660,7 +256667,7 @@ CVE-2024-5397,0,0,79c82f6af34f5d76edc0fe512c9b3e616bf4c7ca15c122380ba9806c73a591
|
||||
CVE-2024-5398,0,0,1fca9edd99ff7753e0d36d6f4d73a5a23ccf8ab9dd992541f79488471e393289,2024-06-11T10:15:13.690000
|
||||
CVE-2024-5399,0,0,6f591a4ee360dfdb4118262029ef6ec2f3647ffdfa160e81ed9cdadb88ac0f1d,2024-05-28T12:39:28.377000
|
||||
CVE-2024-5400,0,0,094967d50b5003fa8a1a95a7cd40ccdb2300c03695bb818acf6e11d6054c6ffe,2024-05-28T12:39:28.377000
|
||||
CVE-2024-5402,0,1,a5e55a0c84701c59a5f5d7ada1c30ecac8bd71919dc47c454e4a5ba90cd9220e,2024-07-19T18:03:55.583000
|
||||
CVE-2024-5402,0,0,a5e55a0c84701c59a5f5d7ada1c30ecac8bd71919dc47c454e4a5ba90cd9220e,2024-07-19T18:03:55.583000
|
||||
CVE-2024-5403,0,0,2e916307137919215633d6a47f3e654241b49fba1a899d76e9efd2abd496b6ad,2024-05-28T12:39:28.377000
|
||||
CVE-2024-5404,0,0,9555ba3a9174cf37744b3f17110afa21577889d292df132a8c1f8da3c56bf2a0,2024-06-03T14:46:24.250000
|
||||
CVE-2024-5405,0,0,c7e95a2942d42700f7e78ab698eaffdd8aeff4f1adde3aec6c39fd8479ab2700,2024-05-28T12:39:28.377000
|
||||
@ -256719,7 +256726,7 @@ CVE-2024-5471,0,0,b5058f52e9634b68f4d4000cb97858db03cd2fac3d75cd140cb047a19da1c6
|
||||
CVE-2024-5472,0,0,5266d0242327561f219784f0c46dd50d182936ab4a103ea249459b5dcb746156,2024-07-15T13:00:34.853000
|
||||
CVE-2024-5473,0,0,7a9289264d1a834c0b8e9151c353ddcb7a22a22f6b7d360897c02053aaaeb88c,2024-07-03T02:08:57.860000
|
||||
CVE-2024-5475,0,0,e09a66bd4d026df38a62a9d0642b82f2a5b9bf49c6a2d9e0e1e141414790fdd3,2024-07-03T02:08:58.050000
|
||||
CVE-2024-5478,0,1,c601a39452cb705e9035daa72131a8a960693dee4deccdae668f9ad5d8466d4f,2024-07-19T18:29:50.137000
|
||||
CVE-2024-5478,0,0,c601a39452cb705e9035daa72131a8a960693dee4deccdae668f9ad5d8466d4f,2024-07-19T18:29:50.137000
|
||||
CVE-2024-5479,0,0,7bf7a94732a4ce28b83209c9d21f799503dcb5933696ba21b8f4bc98737c6d69,2024-07-09T18:19:14.047000
|
||||
CVE-2024-5480,0,0,e3b751f5e1aae9a001af5fbca0b04d0edc5a2fa5a73d6ec1b3a09941cad9078b,2024-06-07T14:56:05.647000
|
||||
CVE-2024-5481,0,0,32222ebb3f7a972393fb918a0cdb6b7e38cf91a107006665f6c1b1bad41a3e4f,2024-06-11T18:00:09.740000
|
||||
@ -256923,7 +256930,7 @@ CVE-2024-5755,0,0,18288403f67281063c09c8ff29d182967f82bf6bbbadea2fe8a94bcd12e5aa
|
||||
CVE-2024-5756,0,0,8f9e9c6b47319f2e6056e0eeab0b95c7967e08ebf1f00846244d8a548a26a9af,2024-07-17T13:52:08.350000
|
||||
CVE-2024-5757,0,0,5cb8c18a619114307d2634441346064118b79a7aeac4723897e195eaa5132dad,2024-07-02T14:42:05.977000
|
||||
CVE-2024-5758,0,0,c078716fbf80b259c8ceac06415d3d039d4ef773f8ae701649c6b0b1483ee99e,2024-06-13T21:15:57.543000
|
||||
CVE-2024-5759,0,1,63cf4f5f11600a3e2abf833e3aff1a738015e39c1ce27037c94f84f83452efea,2024-07-19T18:40:53.863000
|
||||
CVE-2024-5759,0,0,63cf4f5f11600a3e2abf833e3aff1a738015e39c1ce27037c94f84f83452efea,2024-07-19T18:40:53.863000
|
||||
CVE-2024-5761,0,0,1fdad964c86313b412878f67fac5999c9a1ea015b844614bc58b000414661a53,2024-06-07T19:15:24.467000
|
||||
CVE-2024-5766,0,0,1263d0917882c36f131e194bb6b44630da06ab1a17b9faa93d76c1b934e8029c,2024-06-10T02:52:08.267000
|
||||
CVE-2024-5767,0,0,946a7a6edb6231f843cc8c36568eec07c01ffe4bb17f732fe05d02ccf6a0e4bc,2024-07-09T16:23:07.280000
|
||||
@ -257062,7 +257069,7 @@ CVE-2024-5971,0,0,357987ac7415afbcb31d94ddf79e1610c1e4bcbc7b687b78aa636fbb9a4c84
|
||||
CVE-2024-5972,0,0,3700c5b3eb4bcd1d3bafe18b568e7aab0a0471128c3ce92a2f73ba8aa9a9cb4f,2024-06-28T19:15:07.500000
|
||||
CVE-2024-5974,0,0,fd52c68141e6ff6d700f6466616845a44fbd39c5ab415ece01ca8d456d4e8b30,2024-07-09T18:19:14.047000
|
||||
CVE-2024-5976,0,0,0d4a23e2583616de98536e1ad4d7b2a882021b32cad502d23a934bbf343ef666,2024-06-17T12:43:31.090000
|
||||
CVE-2024-5977,0,1,7de0cc63740102074a24c1686c7837a6d04da6c097ad8d0ab882790d8002a494,2024-07-19T18:27:34.967000
|
||||
CVE-2024-5977,0,0,7de0cc63740102074a24c1686c7837a6d04da6c097ad8d0ab882790d8002a494,2024-07-19T18:27:34.967000
|
||||
CVE-2024-5979,0,0,2890db7bdc2045eea751460532af007391576d7da8d9f838bf14583c0290ae73,2024-06-27T19:25:12.067000
|
||||
CVE-2024-5980,0,0,915920a5c8bdff0e9b559c6fdf1db06079562e1ee1f1333b9d9e824a78939fce,2024-06-27T19:25:12.067000
|
||||
CVE-2024-5981,0,0,6efd4ce65d0be4286973240a22b49938ee7da116677222eebd9958d92f31bba4,2024-06-17T12:43:31.090000
|
||||
@ -257218,7 +257225,7 @@ CVE-2024-6193,0,0,00fd76685b00c66c75878efc81598a588f58971e8df576cbee2d630c4caeff
|
||||
CVE-2024-6194,0,0,2fd14db6633e624a38e90bae695b4c4d57fa0e3aaeb642623d447d03f1402676,2024-06-21T11:22:01.687000
|
||||
CVE-2024-6195,0,0,6a062efe55296f0b78677192fb0a748b37d8f49a4a61cffdf8e5d965a387b28b,2024-06-21T11:22:01.687000
|
||||
CVE-2024-6196,0,0,ee53490a34820f9c77a5a8ca54b2af4db4b9298e709dd53453d8c4a657cc2768,2024-06-21T17:15:11.350000
|
||||
CVE-2024-6205,0,0,8522b9cc1b5d1a5df21e355f77848148672ea3ccc036a48aa36b3c3473c36fd7,2024-07-19T13:01:44.567000
|
||||
CVE-2024-6205,0,1,113d559849ca9c5bf761a83fad7d31b96491373e555c09e3fa45e37c92251187,2024-07-19T20:23:18.960000
|
||||
CVE-2024-6206,0,0,7ae31b087265fa68705a3f153945ecef18a4fdd89eba1b0f5f6a9be630fb6cf5,2024-06-26T12:44:29.693000
|
||||
CVE-2024-6209,0,0,dde817e69ddab612402867a39af366fc36713e43c4758f0a34432256fd885f93,2024-07-08T15:35:25.837000
|
||||
CVE-2024-6210,0,0,d08d160d43811c5bb8dcf64fef0c280a0a7b1e98d094babc485e09ce9fa86125,2024-07-11T13:05:54.930000
|
||||
@ -257304,7 +257311,7 @@ CVE-2024-6326,0,0,7f3dd075f877db7303a493f59304e094cd076f4bffd073b2a606c370e31f6e
|
||||
CVE-2024-6328,0,0,1dc9c3c4a448080717651ebabfb2fc281b4a1c036cabba31a96124b6cb4e8cbc,2024-07-12T12:49:07.030000
|
||||
CVE-2024-6334,0,0,3daf0dfe09252e7765ca30c739cfcc033a43a657c17c0275e173ac670504522a,2024-07-09T18:19:14.047000
|
||||
CVE-2024-6336,0,0,cbe18bd9d2fe447b7a1ae02266749a6e6d80ba22cbea894f6c946ded39640177,2024-07-17T13:34:20.520000
|
||||
CVE-2024-6338,0,0,f9fea8203b4948d06aca89926bdbc4e8a3831bef5e51673b6dc46c826f518e10,2024-07-19T13:01:44.567000
|
||||
CVE-2024-6338,0,1,4a0dfeac53196de5914d58e6f2865df2ecf754da1d5c9c06a21500f0c7cd9624,2024-07-19T20:24:40.397000
|
||||
CVE-2024-6340,0,0,fd12f25a45d92fefbb8c0ec47428250f4f56bb9c686a12a52e54d86e24fec10a,2024-07-03T18:27:40.903000
|
||||
CVE-2024-6341,0,0,528f4fdde1526d72477e90a767b2f2316b168f65b64effeddb9446d8a5cdcaf5,2024-07-02T18:15:03.900000
|
||||
CVE-2024-6344,0,0,ddc89c494afe0b7b80a518e0bed96070c096d29b8a0f403bdd242f60ce193de2,2024-06-27T00:15:13.360000
|
||||
@ -257336,7 +257343,7 @@ CVE-2024-6392,0,0,f361942df6276a0c96574512bc05717f2075a1be2cafe6840357bf3e68ede9
|
||||
CVE-2024-6395,0,0,2a18837f9b52736b65326c96554b2a3dce564d78893cb5d5644f7daa6a7748b8,2024-07-17T13:34:20.520000
|
||||
CVE-2024-6396,0,0,9e4b547b4d90c33704c90a7cfe67a136b4a49a6d0168d4ba570b6960a74fd1cc,2024-07-12T12:49:07.030000
|
||||
CVE-2024-6397,0,0,69c6adc6e74f8320b438655fc21122936f7ec03e924b3cf51bf011308451b2af,2024-07-12T17:02:56.110000
|
||||
CVE-2024-6398,0,1,5e78ff46f697643e5cc753102552fe7954080f3b71babda50e4591659f0fb988,2024-07-19T18:25:44.247000
|
||||
CVE-2024-6398,0,0,5e78ff46f697643e5cc753102552fe7954080f3b71babda50e4591659f0fb988,2024-07-19T18:25:44.247000
|
||||
CVE-2024-6402,0,0,795485c4534407e246daec51c1daaa33b95f6651688fed743a8fb9054cdaedba,2024-07-01T12:37:24.220000
|
||||
CVE-2024-6403,0,0,e44b9cfa8d9ae367e624a8cdf179ef52ea1e98c2115d7a956299d17747a6a56b,2024-07-01T12:37:24.220000
|
||||
CVE-2024-6405,0,0,fdb62e3d2213e21f6cf3d269e158ee31cc07c01f1a5a460b466ccce5203f82ee,2024-07-01T12:37:24.220000
|
||||
@ -257475,12 +257482,12 @@ CVE-2024-6737,0,0,8702e57b452a150308d6299787708abc780fef0e416c70970908b3d0d87bc7
|
||||
CVE-2024-6738,0,0,3a61a9d0dff57bd9a24abf3ccb065f63726018d20fe8e9197bc7bc11863de922,2024-07-16T14:06:27.810000
|
||||
CVE-2024-6739,0,0,ff130f606a3e8a51263eb79c0c10405a59fd6ec00a9a26fc959f88e93b41ffd0,2024-07-16T18:02:40.327000
|
||||
CVE-2024-6740,0,0,d308678365582cc0cd3506da47feaac1bc28b638b68ea34f78ba187ccd8f0bc0,2024-07-16T18:04:27.443000
|
||||
CVE-2024-6741,0,1,9b56d0b03e3ffc096ead1a054aba81fcde4d9f0941a6e35a1c411f336b0f48e5,2024-07-19T18:23:40.233000
|
||||
CVE-2024-6741,0,0,9b56d0b03e3ffc096ead1a054aba81fcde4d9f0941a6e35a1c411f336b0f48e5,2024-07-19T18:23:40.233000
|
||||
CVE-2024-6742,0,0,68316e77653ac592b1c728d700048d14f2f4d999c5b5bc0e6fa5293bbd87d387,2024-07-16T18:07:58.773000
|
||||
CVE-2024-6743,0,0,d20423ae34ef7edd843a6cb67ab6563bdeae21fb73206254415d2c0219c744cd,2024-07-16T18:07:47.567000
|
||||
CVE-2024-6744,0,0,db4e7b937d3d03ea3e3b2b15edbfe780a0b875b3fdcc47905faa685f3164112e,2024-07-16T18:06:51.390000
|
||||
CVE-2024-6745,0,1,1617c1b62a6985e7cfd1493a4e6106081b5b226c76f4caaa1064224772ef702b,2024-07-19T18:04:47.363000
|
||||
CVE-2024-6746,0,1,a07904c7ab441e8aefcdf67187efe0701752648d282a9adf495048d9805d0f66,2024-07-19T18:02:29.417000
|
||||
CVE-2024-6745,0,0,1617c1b62a6985e7cfd1493a4e6106081b5b226c76f4caaa1064224772ef702b,2024-07-19T18:04:47.363000
|
||||
CVE-2024-6746,0,0,a07904c7ab441e8aefcdf67187efe0701752648d282a9adf495048d9805d0f66,2024-07-19T18:02:29.417000
|
||||
CVE-2024-6765,0,0,582116fb1612a7c43e0b570dc3dd773f185a6bed827d147d00793764d2f2774e,2024-07-17T14:15:04.327000
|
||||
CVE-2024-6772,0,0,7a4dce423c8b75d7fc80a06f5d75b304a1c3cb61b88f44b30dd94156af9ab8e1,2024-07-17T13:34:20.520000
|
||||
CVE-2024-6773,0,0,654a62798e16ce714df475111f6e31ff6e77aaddc1afe3d8197169aa0cc75c10,2024-07-17T13:34:20.520000
|
||||
@ -257503,10 +257510,10 @@ CVE-2024-6834,0,0,9b06026f568f95c4c2a4be9208340b1bc5ab27fea601ce9296ee0a0b671ec6
|
||||
CVE-2024-6895,0,0,0c486e88c5dc57ed2713d59c6e5f599844da09fd6e820a24b10235451464145d,2024-07-19T15:15:10.547000
|
||||
CVE-2024-6898,0,0,98dae2dc951da0c9f1ac4e695a7ad38573b2abb15f5508f51642ed9635c194c6,2024-07-19T13:01:44.567000
|
||||
CVE-2024-6899,0,0,862a9d8e40eab426823cca194fdd307dafe70d2837c62b14a818c2e38cfb311c,2024-07-19T13:01:44.567000
|
||||
CVE-2024-6900,0,1,fbb8aa8415260c9b1e26455be1910b1083e8bf94841d4f12f5417011c57ac42e,2024-07-19T19:54:20.537000
|
||||
CVE-2024-6901,0,1,c28b23edd1f3046de2a52da537dee85028a9b3d9f213ffb3130989af23e1c1c1,2024-07-19T19:55:00.210000
|
||||
CVE-2024-6902,0,1,f926fb22c680b61739989f51b7f1eaf6c4ea518a5e1bc277f5ef3101be83da21,2024-07-19T19:10:24.903000
|
||||
CVE-2024-6903,0,1,adc23f247bb0a7d879884222f6215ed295391e32456516ddcf4324ccbf8de103,2024-07-19T19:51:55.617000
|
||||
CVE-2024-6900,0,0,fbb8aa8415260c9b1e26455be1910b1083e8bf94841d4f12f5417011c57ac42e,2024-07-19T19:54:20.537000
|
||||
CVE-2024-6901,0,1,5101a9d9958d6832788ed4ccac8dfee8b3ba129221e3dbf845e1c080d9b6cff4,2024-07-19T19:55:00.210000
|
||||
CVE-2024-6902,0,0,f926fb22c680b61739989f51b7f1eaf6c4ea518a5e1bc277f5ef3101be83da21,2024-07-19T19:10:24.903000
|
||||
CVE-2024-6903,0,0,adc23f247bb0a7d879884222f6215ed295391e32456516ddcf4324ccbf8de103,2024-07-19T19:51:55.617000
|
||||
CVE-2024-6904,0,0,7a4b54dc15a07a62a46eb4054278ab061629c71b06171b5dc53981c366a15e59,2024-07-19T13:01:44.567000
|
||||
CVE-2024-6905,0,0,93733b32b43103d2e6f495524d768f1986f9f809f44d345a79d9a3c82c1dfb61,2024-07-19T13:01:44.567000
|
||||
CVE-2024-6906,0,0,bd3edaa779f3d24c608497477495531b8c58c3f636652b3dd6d229b39e74ed48,2024-07-19T13:01:44.567000
|
||||
|
Can't render this file because it is too large.
|
Loading…
x
Reference in New Issue
Block a user