mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-07-09 16:05:11 +00:00
Auto-Update: 2024-07-29T10:00:17.674964+00:00
This commit is contained in:
parent
5d8ef76242
commit
bd2e1f5811
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-26621",
|
||||
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"published": "2024-03-02T22:15:50.340",
|
||||
"lastModified": "2024-07-16T02:15:12.500",
|
||||
"lastModified": "2024-07-29T09:15:02.400",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -97,6 +97,10 @@
|
||||
"url": "http://www.openwall.com/lists/oss-security/2024/07/16/2",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
},
|
||||
{
|
||||
"url": "http://www.openwall.com/lists/oss-security/2024/07/29/2",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/4ef9ad19e17676b9ef071309bc62020e2373705d",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
|
25
CVE-2024/CVE-2024-411xx/CVE-2024-41139.json
Normal file
25
CVE-2024/CVE-2024-411xx/CVE-2024-41139.json
Normal file
@ -0,0 +1,25 @@
|
||||
{
|
||||
"id": "CVE-2024-41139",
|
||||
"sourceIdentifier": "vultures@jpcert.or.jp",
|
||||
"published": "2024-07-29T09:15:02.563",
|
||||
"lastModified": "2024-07-29T09:15:02.563",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Incorrect privilege assignment vulnerability exists in SKYSEA Client View Ver.6.010.06 to Ver.19.210.04e. If a user who can log in to the PC where the product's Windows client is installed places a specially crafted DLL file in a specific folder, arbitrary code may be executed with SYSTEM privilege."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://jvn.jp/en/jp/JVN84326763/",
|
||||
"source": "vultures@jpcert.or.jp"
|
||||
},
|
||||
{
|
||||
"url": "https://www.skyseaclientview.net/news/240729_02/",
|
||||
"source": "vultures@jpcert.or.jp"
|
||||
}
|
||||
]
|
||||
}
|
25
CVE-2024/CVE-2024-411xx/CVE-2024-41143.json
Normal file
25
CVE-2024/CVE-2024-411xx/CVE-2024-41143.json
Normal file
@ -0,0 +1,25 @@
|
||||
{
|
||||
"id": "CVE-2024-41143",
|
||||
"sourceIdentifier": "vultures@jpcert.or.jp",
|
||||
"published": "2024-07-29T09:15:02.640",
|
||||
"lastModified": "2024-07-29T09:15:02.640",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Origin validation error vulnerability exists in SKYSEA Client View Ver.3.013.00 to Ver.19.210.04e. If this vulnerability is exploited, an arbitrary process may be executed with SYSTEM privilege by a user who can log in to the PC where the product's Windows client is installed."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://jvn.jp/en/jp/JVN84326763/",
|
||||
"source": "vultures@jpcert.or.jp"
|
||||
},
|
||||
{
|
||||
"url": "https://www.skyseaclientview.net/news/240729_02/",
|
||||
"source": "vultures@jpcert.or.jp"
|
||||
}
|
||||
]
|
||||
}
|
25
CVE-2024/CVE-2024-417xx/CVE-2024-41726.json
Normal file
25
CVE-2024/CVE-2024-417xx/CVE-2024-41726.json
Normal file
@ -0,0 +1,25 @@
|
||||
{
|
||||
"id": "CVE-2024-41726",
|
||||
"sourceIdentifier": "vultures@jpcert.or.jp",
|
||||
"published": "2024-07-29T09:15:02.703",
|
||||
"lastModified": "2024-07-29T09:15:02.703",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Path traversal vulnerability exists in SKYSEA Client View Ver.3.013.00 to Ver.19.210.04e. If this vulnerability is exploited, an arbitrary executable file may be executed by a user who can log in to the PC where the product's Windows client is installed."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://jvn.jp/en/jp/JVN84326763/",
|
||||
"source": "vultures@jpcert.or.jp"
|
||||
},
|
||||
{
|
||||
"url": "https://www.skyseaclientview.net/news/240729_02/",
|
||||
"source": "vultures@jpcert.or.jp"
|
||||
}
|
||||
]
|
||||
}
|
29
CVE-2024/CVE-2024-418xx/CVE-2024-41881.json
Normal file
29
CVE-2024/CVE-2024-418xx/CVE-2024-41881.json
Normal file
@ -0,0 +1,29 @@
|
||||
{
|
||||
"id": "CVE-2024-41881",
|
||||
"sourceIdentifier": "vultures@jpcert.or.jp",
|
||||
"published": "2024-07-29T09:15:02.773",
|
||||
"lastModified": "2024-07-29T09:15:02.773",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "SDoP versions prior to 1.11 fails to handle appropriately some parameters inside the input data, resulting in a stack-based buffer overflow vulnerability. When a user of the affected product is tricked to process a specially crafted XML file, arbitrary code may be executed on the user's environment."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/PhilipHazel/SDoP",
|
||||
"source": "vultures@jpcert.or.jp"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/PhilipHazel/SDoP/commit/ff83d851b4b39ff2fd37ab2ab14365649515b023",
|
||||
"source": "vultures@jpcert.or.jp"
|
||||
},
|
||||
{
|
||||
"url": "https://jvn.jp/en/jp/JVN16420523/",
|
||||
"source": "vultures@jpcert.or.jp"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-6387",
|
||||
"sourceIdentifier": "secalert@redhat.com",
|
||||
"published": "2024-07-01T13:15:06.467",
|
||||
"lastModified": "2024-07-28T21:15:10.480",
|
||||
"lastModified": "2024-07-29T09:15:02.853",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -864,6 +864,10 @@
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://santandersecurityresearch.github.io/blog/sshing_the_masses.html",
|
||||
"source": "secalert@redhat.com"
|
||||
},
|
||||
{
|
||||
"url": "https://security-tracker.debian.org/tracker/CVE-2024-6387",
|
||||
"source": "secalert@redhat.com",
|
||||
|
137
CVE-2024/CVE-2024-71xx/CVE-2024-7189.json
Normal file
137
CVE-2024/CVE-2024-71xx/CVE-2024-7189.json
Normal file
@ -0,0 +1,137 @@
|
||||
{
|
||||
"id": "CVE-2024-7189",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2024-07-29T08:15:01.703",
|
||||
"lastModified": "2024-07-29T08:15:01.703",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A vulnerability classified as critical has been found in itsourcecode Online Food Ordering System 1.0. Affected is an unknown function of the file editproduct.php. The manipulation of the argument photo leads to unrestricted upload. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. VDB-272610 is the identifier assigned to this vulnerability."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV40": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "4.0",
|
||||
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"attackRequirements": "NONE",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"vulnerableSystemConfidentiality": "LOW",
|
||||
"vulnerableSystemIntegrity": "LOW",
|
||||
"vulnerableSystemAvailability": "LOW",
|
||||
"subsequentSystemConfidentiality": "NONE",
|
||||
"subsequentSystemIntegrity": "NONE",
|
||||
"subsequentSystemAvailability": "NONE",
|
||||
"exploitMaturity": "NOT_DEFINED",
|
||||
"confidentialityRequirements": "NOT_DEFINED",
|
||||
"integrityRequirements": "NOT_DEFINED",
|
||||
"availabilityRequirements": "NOT_DEFINED",
|
||||
"modifiedAttackVector": "NOT_DEFINED",
|
||||
"modifiedAttackComplexity": "NOT_DEFINED",
|
||||
"modifiedAttackRequirements": "NOT_DEFINED",
|
||||
"modifiedPrivilegesRequired": "NOT_DEFINED",
|
||||
"modifiedUserInteraction": "NOT_DEFINED",
|
||||
"modifiedVulnerableSystemConfidentiality": "NOT_DEFINED",
|
||||
"modifiedVulnerableSystemIntegrity": "NOT_DEFINED",
|
||||
"modifiedVulnerableSystemAvailability": "NOT_DEFINED",
|
||||
"modifiedSubsequentSystemConfidentiality": "NOT_DEFINED",
|
||||
"modifiedSubsequentSystemIntegrity": "NOT_DEFINED",
|
||||
"modifiedSubsequentSystemAvailability": "NOT_DEFINED",
|
||||
"safety": "NOT_DEFINED",
|
||||
"automatable": "NOT_DEFINED",
|
||||
"recovery": "NOT_DEFINED",
|
||||
"valueDensity": "NOT_DEFINED",
|
||||
"vulnerabilityResponseEffort": "NOT_DEFINED",
|
||||
"providerUrgency": "NOT_DEFINED",
|
||||
"baseScore": 5.3,
|
||||
"baseSeverity": "MEDIUM"
|
||||
}
|
||||
}
|
||||
],
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "LOW",
|
||||
"baseScore": 6.3,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 3.4
|
||||
}
|
||||
],
|
||||
"cvssMetricV2": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "2.0",
|
||||
"vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P",
|
||||
"accessVector": "NETWORK",
|
||||
"accessComplexity": "LOW",
|
||||
"authentication": "SINGLE",
|
||||
"confidentialityImpact": "PARTIAL",
|
||||
"integrityImpact": "PARTIAL",
|
||||
"availabilityImpact": "PARTIAL",
|
||||
"baseScore": 6.5
|
||||
},
|
||||
"baseSeverity": "MEDIUM",
|
||||
"exploitabilityScore": 8.0,
|
||||
"impactScore": 6.4,
|
||||
"acInsufInfo": false,
|
||||
"obtainAllPrivilege": false,
|
||||
"obtainUserPrivilege": false,
|
||||
"obtainOtherPrivilege": false,
|
||||
"userInteractionRequired": false
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-434"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/L1OudFd8cl09/CVE/blob/main/25_07_2024_a.md",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.272610",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.272610",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?submit.380209",
|
||||
"source": "cna@vuldb.com"
|
||||
}
|
||||
]
|
||||
}
|
137
CVE-2024/CVE-2024-71xx/CVE-2024-7190.json
Normal file
137
CVE-2024/CVE-2024-71xx/CVE-2024-7190.json
Normal file
@ -0,0 +1,137 @@
|
||||
{
|
||||
"id": "CVE-2024-7190",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2024-07-29T08:15:02.010",
|
||||
"lastModified": "2024-07-29T08:15:02.010",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A vulnerability classified as critical was found in itsourcecode Society Management System 1.0. Affected by this vulnerability is an unknown functionality of the file /admin/get_price.php. The manipulation of the argument expenses_id leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-272611."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV40": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "4.0",
|
||||
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"attackRequirements": "NONE",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"vulnerableSystemConfidentiality": "LOW",
|
||||
"vulnerableSystemIntegrity": "LOW",
|
||||
"vulnerableSystemAvailability": "LOW",
|
||||
"subsequentSystemConfidentiality": "NONE",
|
||||
"subsequentSystemIntegrity": "NONE",
|
||||
"subsequentSystemAvailability": "NONE",
|
||||
"exploitMaturity": "NOT_DEFINED",
|
||||
"confidentialityRequirements": "NOT_DEFINED",
|
||||
"integrityRequirements": "NOT_DEFINED",
|
||||
"availabilityRequirements": "NOT_DEFINED",
|
||||
"modifiedAttackVector": "NOT_DEFINED",
|
||||
"modifiedAttackComplexity": "NOT_DEFINED",
|
||||
"modifiedAttackRequirements": "NOT_DEFINED",
|
||||
"modifiedPrivilegesRequired": "NOT_DEFINED",
|
||||
"modifiedUserInteraction": "NOT_DEFINED",
|
||||
"modifiedVulnerableSystemConfidentiality": "NOT_DEFINED",
|
||||
"modifiedVulnerableSystemIntegrity": "NOT_DEFINED",
|
||||
"modifiedVulnerableSystemAvailability": "NOT_DEFINED",
|
||||
"modifiedSubsequentSystemConfidentiality": "NOT_DEFINED",
|
||||
"modifiedSubsequentSystemIntegrity": "NOT_DEFINED",
|
||||
"modifiedSubsequentSystemAvailability": "NOT_DEFINED",
|
||||
"safety": "NOT_DEFINED",
|
||||
"automatable": "NOT_DEFINED",
|
||||
"recovery": "NOT_DEFINED",
|
||||
"valueDensity": "NOT_DEFINED",
|
||||
"vulnerabilityResponseEffort": "NOT_DEFINED",
|
||||
"providerUrgency": "NOT_DEFINED",
|
||||
"baseScore": 5.3,
|
||||
"baseSeverity": "MEDIUM"
|
||||
}
|
||||
}
|
||||
],
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "LOW",
|
||||
"baseScore": 6.3,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 3.4
|
||||
}
|
||||
],
|
||||
"cvssMetricV2": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "2.0",
|
||||
"vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P",
|
||||
"accessVector": "NETWORK",
|
||||
"accessComplexity": "LOW",
|
||||
"authentication": "SINGLE",
|
||||
"confidentialityImpact": "PARTIAL",
|
||||
"integrityImpact": "PARTIAL",
|
||||
"availabilityImpact": "PARTIAL",
|
||||
"baseScore": 6.5
|
||||
},
|
||||
"baseSeverity": "MEDIUM",
|
||||
"exploitabilityScore": 8.0,
|
||||
"impactScore": 6.4,
|
||||
"acInsufInfo": false,
|
||||
"obtainAllPrivilege": false,
|
||||
"obtainUserPrivilege": false,
|
||||
"obtainOtherPrivilege": false,
|
||||
"userInteractionRequired": false
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-89"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/DeepMountains/Mirage/blob/main/CVE7-4.md",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.272611",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.272611",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?submit.380385",
|
||||
"source": "cna@vuldb.com"
|
||||
}
|
||||
]
|
||||
}
|
137
CVE-2024/CVE-2024-71xx/CVE-2024-7191.json
Normal file
137
CVE-2024/CVE-2024-71xx/CVE-2024-7191.json
Normal file
@ -0,0 +1,137 @@
|
||||
{
|
||||
"id": "CVE-2024-7191",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2024-07-29T09:15:03.410",
|
||||
"lastModified": "2024-07-29T09:15:03.410",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A vulnerability, which was classified as critical, has been found in itsourcecode Society Management System 1.0. Affected by this issue is some unknown functionality of the file /admin/get_balance.php. The manipulation of the argument student_id leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-272612."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV40": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "4.0",
|
||||
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"attackRequirements": "NONE",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"vulnerableSystemConfidentiality": "LOW",
|
||||
"vulnerableSystemIntegrity": "LOW",
|
||||
"vulnerableSystemAvailability": "LOW",
|
||||
"subsequentSystemConfidentiality": "NONE",
|
||||
"subsequentSystemIntegrity": "NONE",
|
||||
"subsequentSystemAvailability": "NONE",
|
||||
"exploitMaturity": "NOT_DEFINED",
|
||||
"confidentialityRequirements": "NOT_DEFINED",
|
||||
"integrityRequirements": "NOT_DEFINED",
|
||||
"availabilityRequirements": "NOT_DEFINED",
|
||||
"modifiedAttackVector": "NOT_DEFINED",
|
||||
"modifiedAttackComplexity": "NOT_DEFINED",
|
||||
"modifiedAttackRequirements": "NOT_DEFINED",
|
||||
"modifiedPrivilegesRequired": "NOT_DEFINED",
|
||||
"modifiedUserInteraction": "NOT_DEFINED",
|
||||
"modifiedVulnerableSystemConfidentiality": "NOT_DEFINED",
|
||||
"modifiedVulnerableSystemIntegrity": "NOT_DEFINED",
|
||||
"modifiedVulnerableSystemAvailability": "NOT_DEFINED",
|
||||
"modifiedSubsequentSystemConfidentiality": "NOT_DEFINED",
|
||||
"modifiedSubsequentSystemIntegrity": "NOT_DEFINED",
|
||||
"modifiedSubsequentSystemAvailability": "NOT_DEFINED",
|
||||
"safety": "NOT_DEFINED",
|
||||
"automatable": "NOT_DEFINED",
|
||||
"recovery": "NOT_DEFINED",
|
||||
"valueDensity": "NOT_DEFINED",
|
||||
"vulnerabilityResponseEffort": "NOT_DEFINED",
|
||||
"providerUrgency": "NOT_DEFINED",
|
||||
"baseScore": 5.3,
|
||||
"baseSeverity": "MEDIUM"
|
||||
}
|
||||
}
|
||||
],
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "LOW",
|
||||
"baseScore": 6.3,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 3.4
|
||||
}
|
||||
],
|
||||
"cvssMetricV2": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "2.0",
|
||||
"vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P",
|
||||
"accessVector": "NETWORK",
|
||||
"accessComplexity": "LOW",
|
||||
"authentication": "SINGLE",
|
||||
"confidentialityImpact": "PARTIAL",
|
||||
"integrityImpact": "PARTIAL",
|
||||
"availabilityImpact": "PARTIAL",
|
||||
"baseScore": 6.5
|
||||
},
|
||||
"baseSeverity": "MEDIUM",
|
||||
"exploitabilityScore": 8.0,
|
||||
"impactScore": 6.4,
|
||||
"acInsufInfo": false,
|
||||
"obtainAllPrivilege": false,
|
||||
"obtainUserPrivilege": false,
|
||||
"obtainOtherPrivilege": false,
|
||||
"userInteractionRequired": false
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-89"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/DeepMountains/Mirage/blob/main/CVE7-5.md",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.272612",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.272612",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?submit.380386",
|
||||
"source": "cna@vuldb.com"
|
||||
}
|
||||
]
|
||||
}
|
137
CVE-2024/CVE-2024-71xx/CVE-2024-7192.json
Normal file
137
CVE-2024/CVE-2024-71xx/CVE-2024-7192.json
Normal file
@ -0,0 +1,137 @@
|
||||
{
|
||||
"id": "CVE-2024-7192",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2024-07-29T09:15:03.693",
|
||||
"lastModified": "2024-07-29T09:15:03.693",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A vulnerability, which was classified as critical, was found in itsourcecode Society Management System 1.0. This affects an unknown part of the file /admin/student.php. The manipulation of the argument image leads to unrestricted upload. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-272613 was assigned to this vulnerability."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV40": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "4.0",
|
||||
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"attackRequirements": "NONE",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"vulnerableSystemConfidentiality": "LOW",
|
||||
"vulnerableSystemIntegrity": "LOW",
|
||||
"vulnerableSystemAvailability": "LOW",
|
||||
"subsequentSystemConfidentiality": "NONE",
|
||||
"subsequentSystemIntegrity": "NONE",
|
||||
"subsequentSystemAvailability": "NONE",
|
||||
"exploitMaturity": "NOT_DEFINED",
|
||||
"confidentialityRequirements": "NOT_DEFINED",
|
||||
"integrityRequirements": "NOT_DEFINED",
|
||||
"availabilityRequirements": "NOT_DEFINED",
|
||||
"modifiedAttackVector": "NOT_DEFINED",
|
||||
"modifiedAttackComplexity": "NOT_DEFINED",
|
||||
"modifiedAttackRequirements": "NOT_DEFINED",
|
||||
"modifiedPrivilegesRequired": "NOT_DEFINED",
|
||||
"modifiedUserInteraction": "NOT_DEFINED",
|
||||
"modifiedVulnerableSystemConfidentiality": "NOT_DEFINED",
|
||||
"modifiedVulnerableSystemIntegrity": "NOT_DEFINED",
|
||||
"modifiedVulnerableSystemAvailability": "NOT_DEFINED",
|
||||
"modifiedSubsequentSystemConfidentiality": "NOT_DEFINED",
|
||||
"modifiedSubsequentSystemIntegrity": "NOT_DEFINED",
|
||||
"modifiedSubsequentSystemAvailability": "NOT_DEFINED",
|
||||
"safety": "NOT_DEFINED",
|
||||
"automatable": "NOT_DEFINED",
|
||||
"recovery": "NOT_DEFINED",
|
||||
"valueDensity": "NOT_DEFINED",
|
||||
"vulnerabilityResponseEffort": "NOT_DEFINED",
|
||||
"providerUrgency": "NOT_DEFINED",
|
||||
"baseScore": 5.3,
|
||||
"baseSeverity": "MEDIUM"
|
||||
}
|
||||
}
|
||||
],
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "LOW",
|
||||
"baseScore": 6.3,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 3.4
|
||||
}
|
||||
],
|
||||
"cvssMetricV2": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "2.0",
|
||||
"vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P",
|
||||
"accessVector": "NETWORK",
|
||||
"accessComplexity": "LOW",
|
||||
"authentication": "SINGLE",
|
||||
"confidentialityImpact": "PARTIAL",
|
||||
"integrityImpact": "PARTIAL",
|
||||
"availabilityImpact": "PARTIAL",
|
||||
"baseScore": 6.5
|
||||
},
|
||||
"baseSeverity": "MEDIUM",
|
||||
"exploitabilityScore": 8.0,
|
||||
"impactScore": 6.4,
|
||||
"acInsufInfo": false,
|
||||
"obtainAllPrivilege": false,
|
||||
"obtainUserPrivilege": false,
|
||||
"obtainOtherPrivilege": false,
|
||||
"userInteractionRequired": false
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-434"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/DeepMountains/Mirage/blob/main/CVE7-6.md",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.272613",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.272613",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?submit.380387",
|
||||
"source": "cna@vuldb.com"
|
||||
}
|
||||
]
|
||||
}
|
47
README.md
47
README.md
@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours.
|
||||
### Last Repository Update
|
||||
|
||||
```plain
|
||||
2024-07-29T08:00:17.958199+00:00
|
||||
2024-07-29T10:00:17.674964+00:00
|
||||
```
|
||||
|
||||
### Most recent CVE Modification Timestamp synchronized with NVD
|
||||
|
||||
```plain
|
||||
2024-07-29T07:15:08.713000+00:00
|
||||
2024-07-29T09:15:03.693000+00:00
|
||||
```
|
||||
|
||||
### Last Data Feed Release
|
||||
@ -33,46 +33,29 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
|
||||
### Total Number of included CVEs
|
||||
|
||||
```plain
|
||||
258151
|
||||
258159
|
||||
```
|
||||
|
||||
### CVEs added in the last Commit
|
||||
|
||||
Recently added CVEs: `22`
|
||||
Recently added CVEs: `8`
|
||||
|
||||
- [CVE-2024-37381](CVE-2024/CVE-2024-373xx/CVE-2024-37381.json) (`2024-07-29T06:15:01.827`)
|
||||
- [CVE-2024-41013](CVE-2024/CVE-2024-410xx/CVE-2024-41013.json) (`2024-07-29T07:15:05.430`)
|
||||
- [CVE-2024-41014](CVE-2024/CVE-2024-410xx/CVE-2024-41014.json) (`2024-07-29T07:15:05.810`)
|
||||
- [CVE-2024-41015](CVE-2024/CVE-2024-410xx/CVE-2024-41015.json) (`2024-07-29T07:15:06.033`)
|
||||
- [CVE-2024-41016](CVE-2024/CVE-2024-410xx/CVE-2024-41016.json) (`2024-07-29T07:15:06.293`)
|
||||
- [CVE-2024-41017](CVE-2024/CVE-2024-410xx/CVE-2024-41017.json) (`2024-07-29T07:15:06.523`)
|
||||
- [CVE-2024-41018](CVE-2024/CVE-2024-410xx/CVE-2024-41018.json) (`2024-07-29T07:15:06.790`)
|
||||
- [CVE-2024-41019](CVE-2024/CVE-2024-410xx/CVE-2024-41019.json) (`2024-07-29T07:15:07.023`)
|
||||
- [CVE-2024-41090](CVE-2024/CVE-2024-410xx/CVE-2024-41090.json) (`2024-07-29T07:15:07.287`)
|
||||
- [CVE-2024-41091](CVE-2024/CVE-2024-410xx/CVE-2024-41091.json) (`2024-07-29T07:15:07.553`)
|
||||
- [CVE-2024-41637](CVE-2024/CVE-2024-416xx/CVE-2024-41637.json) (`2024-07-29T06:15:02.267`)
|
||||
- [CVE-2024-4483](CVE-2024/CVE-2024-44xx/CVE-2024-4483.json) (`2024-07-29T06:15:02.357`)
|
||||
- [CVE-2024-5285](CVE-2024/CVE-2024-52xx/CVE-2024-5285.json) (`2024-07-29T06:15:02.463`)
|
||||
- [CVE-2024-5882](CVE-2024/CVE-2024-58xx/CVE-2024-5882.json) (`2024-07-29T06:15:02.547`)
|
||||
- [CVE-2024-5883](CVE-2024/CVE-2024-58xx/CVE-2024-5883.json) (`2024-07-29T06:15:02.627`)
|
||||
- [CVE-2024-6362](CVE-2024/CVE-2024-63xx/CVE-2024-6362.json) (`2024-07-29T06:15:02.700`)
|
||||
- [CVE-2024-6366](CVE-2024/CVE-2024-63xx/CVE-2024-6366.json) (`2024-07-29T06:15:02.790`)
|
||||
- [CVE-2024-6487](CVE-2024/CVE-2024-64xx/CVE-2024-6487.json) (`2024-07-29T06:15:02.873`)
|
||||
- [CVE-2024-7185](CVE-2024/CVE-2024-71xx/CVE-2024-7185.json) (`2024-07-29T06:15:02.980`)
|
||||
- [CVE-2024-7186](CVE-2024/CVE-2024-71xx/CVE-2024-7186.json) (`2024-07-29T06:15:03.420`)
|
||||
- [CVE-2024-7187](CVE-2024/CVE-2024-71xx/CVE-2024-7187.json) (`2024-07-29T07:15:07.830`)
|
||||
- [CVE-2024-7188](CVE-2024/CVE-2024-71xx/CVE-2024-7188.json) (`2024-07-29T07:15:08.713`)
|
||||
- [CVE-2024-41139](CVE-2024/CVE-2024-411xx/CVE-2024-41139.json) (`2024-07-29T09:15:02.563`)
|
||||
- [CVE-2024-41143](CVE-2024/CVE-2024-411xx/CVE-2024-41143.json) (`2024-07-29T09:15:02.640`)
|
||||
- [CVE-2024-41726](CVE-2024/CVE-2024-417xx/CVE-2024-41726.json) (`2024-07-29T09:15:02.703`)
|
||||
- [CVE-2024-41881](CVE-2024/CVE-2024-418xx/CVE-2024-41881.json) (`2024-07-29T09:15:02.773`)
|
||||
- [CVE-2024-7189](CVE-2024/CVE-2024-71xx/CVE-2024-7189.json) (`2024-07-29T08:15:01.703`)
|
||||
- [CVE-2024-7190](CVE-2024/CVE-2024-71xx/CVE-2024-7190.json) (`2024-07-29T08:15:02.010`)
|
||||
- [CVE-2024-7191](CVE-2024/CVE-2024-71xx/CVE-2024-7191.json) (`2024-07-29T09:15:03.410`)
|
||||
- [CVE-2024-7192](CVE-2024/CVE-2024-71xx/CVE-2024-7192.json) (`2024-07-29T09:15:03.693`)
|
||||
|
||||
|
||||
### CVEs modified in the last Commit
|
||||
|
||||
Recently modified CVEs: `5`
|
||||
Recently modified CVEs: `2`
|
||||
|
||||
- [CVE-2022-48666](CVE-2022/CVE-2022-486xx/CVE-2022-48666.json) (`2024-07-29T07:15:02.030`)
|
||||
- [CVE-2024-36484](CVE-2024/CVE-2024-364xx/CVE-2024-36484.json) (`2024-07-29T07:15:03.447`)
|
||||
- [CVE-2024-36938](CVE-2024/CVE-2024-369xx/CVE-2024-36938.json) (`2024-07-29T07:15:03.883`)
|
||||
- [CVE-2024-41009](CVE-2024/CVE-2024-410xx/CVE-2024-41009.json) (`2024-07-29T07:15:04.560`)
|
||||
- [CVE-2024-41012](CVE-2024/CVE-2024-410xx/CVE-2024-41012.json) (`2024-07-29T07:15:05.083`)
|
||||
- [CVE-2024-26621](CVE-2024/CVE-2024-266xx/CVE-2024-26621.json) (`2024-07-29T09:15:02.400`)
|
||||
- [CVE-2024-6387](CVE-2024/CVE-2024-63xx/CVE-2024-6387.json) (`2024-07-29T09:15:02.853`)
|
||||
|
||||
|
||||
## Download and Usage
|
||||
|
66
_state.csv
66
_state.csv
@ -212111,7 +212111,7 @@ CVE-2022-48662,0,0,107826e06defd05649e280a189037cc55d251feb868d97da90eaf9a041435
|
||||
CVE-2022-48663,0,0,faa35d27b468e0fe98ba3119f078a76fddc46319da6c037dd74eacad5fe5db95,2024-04-29T12:42:03.667000
|
||||
CVE-2022-48664,0,0,98f5b9aae9394a787d88883dde988c23ff88ed82e2585a6fbf2ab1feed010f18,2024-04-29T12:42:03.667000
|
||||
CVE-2022-48665,0,0,61f8dd0c53e94318dbff1c099a7764d159a4ff134c1b49d99d2540fba60ac74e,2024-04-29T12:42:03.667000
|
||||
CVE-2022-48666,0,1,a2bc98594445b6df1bd47c97ff822bb8a7beebd8a5e4e345cf76f70dcad5d756,2024-07-29T07:15:02.030000
|
||||
CVE-2022-48666,0,0,a2bc98594445b6df1bd47c97ff822bb8a7beebd8a5e4e345cf76f70dcad5d756,2024-07-29T07:15:02.030000
|
||||
CVE-2022-48667,0,0,5bbad8b7071d12ed897487a37454167ea6546dbc00672f8a744c08c8f65a23ab,2024-04-29T12:42:03.667000
|
||||
CVE-2022-48668,0,0,ffa47e0d1e12cf1e004440647944ea09831e32184ce4ba444d32b7e58f5b8e56,2024-04-29T12:42:03.667000
|
||||
CVE-2022-48669,0,0,b75e24834cb956f9b083af7948c6a93e9b0d3029023bb994e0c7901a89d4151e,2024-05-01T19:50:25.633000
|
||||
@ -246920,7 +246920,7 @@ CVE-2024-26618,0,0,60b49f9e86fa8f37acfeac63f8f4575f9654dbd2ab502c8b6c5996ed00c24
|
||||
CVE-2024-26619,0,0,3a172888bab0a927d52b4fdd413d891b072fc341af639a3741034834064d6310,2024-03-12T12:40:13.500000
|
||||
CVE-2024-2662,0,0,a2a94c73f74aa4424a4c3682e7ac78c6136565b797b4f728bf1a976cab864da5,2024-05-14T16:13:02.773000
|
||||
CVE-2024-26620,0,0,65e5941945418b21a4c03b7b48584bf25732d23092fb7ebb20991b07ac64fe5a,2024-03-12T12:40:13.500000
|
||||
CVE-2024-26621,0,0,62ddb14eaa79da39c16cb8648c9e4220c813aa1e1923a6f6fff34b8b90a8da4f,2024-07-16T02:15:12.500000
|
||||
CVE-2024-26621,0,1,86dd105998222d554e0d89a99385ede99614096aaab551dd47af98d6befbdb87,2024-07-29T09:15:02.400000
|
||||
CVE-2024-26622,0,0,4cd7d655a251310c444f077e2df4271fb89c449a25650c0bd38a0c088f0ade16,2024-06-25T22:15:19.240000
|
||||
CVE-2024-26623,0,0,072badb03b6dfd11f30eaa3dc91549de4bb838c1b1cb59508b9c081211145520,2024-03-06T15:18:08.093000
|
||||
CVE-2024-26624,0,0,dfec722c86cb19deabe85be0fdccacdcf71bc34ee8cead4ebe6ca2d88e75d73c,2024-03-27T14:15:10.163000
|
||||
@ -253673,7 +253673,7 @@ CVE-2024-36479,0,0,dee4352def0751c2293c7f9148494e529c22ac95426bcab70e58c8c955d6c
|
||||
CVE-2024-3648,0,0,8ea394456a868f5cb440700cb4f3d40035b05f4bd668cd1adcf2b942f06e8067,2024-05-24T01:15:30.977000
|
||||
CVE-2024-36480,0,0,467634cd317ccf32154f72ed3d837c9ab87c9927c3f4f2a0848f910fa3a76e62,2024-06-20T12:44:01.637000
|
||||
CVE-2024-36481,0,0,c20069fe9216cf7ae5e42e62fc886e320b7997d027cb5be79eafe3b725910b77,2024-06-24T18:35:33.157000
|
||||
CVE-2024-36484,0,1,d90e8addbe4310fb59424c1e2209c39c8eeed0a72f79133301d102644feba769,2024-07-29T07:15:03.447000
|
||||
CVE-2024-36484,0,0,d90e8addbe4310fb59424c1e2209c39c8eeed0a72f79133301d102644feba769,2024-07-29T07:15:03.447000
|
||||
CVE-2024-36489,0,0,dc2f7108dc3678f1fb36a70c7ba7637636e10430721a5dfcf0db7d3d728d6d70,2024-06-21T11:22:01.687000
|
||||
CVE-2024-3649,0,0,9d2e0b18ffe30ccf7cbc0e74a77daf1869af9483d0413cb80580942eae7d40a2,2024-05-02T18:00:37.360000
|
||||
CVE-2024-36491,0,0,c6dd1ef3c6745f768d62d62ea4add65925f5aec7ffd7e126f15c9ed745598bc0,2024-07-17T13:34:20.520000
|
||||
@ -253887,7 +253887,7 @@ CVE-2024-36934,0,0,69c3127eb80f1c3d27222b7e8d459b701638abf40b50f92ff99862699bda2
|
||||
CVE-2024-36935,0,0,c956a025e647b997e271ce533b3229e1031e8431a54472f528946dfc3671394a,2024-05-30T18:18:58.870000
|
||||
CVE-2024-36936,0,0,8f5cc1028b2d46957993a0bef95c544f5440f0e6544e5c2e7784aef732d9e93a,2024-05-30T18:18:58.870000
|
||||
CVE-2024-36937,0,0,587115a073ece738242335fb650146c6aa7d51a5138082890a3a8d657d2dddcf,2024-05-30T18:18:58.870000
|
||||
CVE-2024-36938,0,1,5f996360f7a179b962f4e24c798747a3d10ac7a5a7d3f7e6a769b5d2f7e677d4,2024-07-29T07:15:03.883000
|
||||
CVE-2024-36938,0,0,5f996360f7a179b962f4e24c798747a3d10ac7a5a7d3f7e6a769b5d2f7e677d4,2024-07-29T07:15:03.883000
|
||||
CVE-2024-36939,0,0,82d0833c24e3b117aa9c5869741c78835915247496909f88fa02d5cbb879e28d,2024-06-27T14:15:14.810000
|
||||
CVE-2024-36940,0,0,465e05b45828a5806578841110d5d3986173d3974a74d8f01326c22ee79f9a71,2024-06-27T14:15:14.890000
|
||||
CVE-2024-36941,0,0,086f19350d3c8fb67c945796850f1ec98ad9b8ccd8e484367cd329bc31c41ae2,2024-06-27T14:15:14.957000
|
||||
@ -254220,7 +254220,7 @@ CVE-2024-37370,0,0,8a7076b3e8e134b661d21db6f90c7a50b93b1e481cf692861b0a2c3450767
|
||||
CVE-2024-37371,0,0,70d55bf05c2eee0a9f3b94ddc604e302a9c39f7d842ab9266b20a4c2d600c9ba,2024-07-01T12:37:24.220000
|
||||
CVE-2024-3738,0,0,cebdf6c67207ccd8240919e9596b8485c51e6607a12a8dcdfff13f6ddbdbfe32,2024-05-17T02:40:05.977000
|
||||
CVE-2024-37380,0,0,4ce1330fb679655262ab3b818cd133f9eef1b7c4341268f445fa1434d34f9951,2024-07-24T12:55:13.223000
|
||||
CVE-2024-37381,1,1,01fcad08baf608c8c6c5a6aaff0e96954a2f5621890d5663fb47ead7c68f4646,2024-07-29T06:15:01.827000
|
||||
CVE-2024-37381,0,0,01fcad08baf608c8c6c5a6aaff0e96954a2f5621890d5663fb47ead7c68f4646,2024-07-29T06:15:01.827000
|
||||
CVE-2024-37383,0,0,3a9597c771ab199850aaeee94068cbc0182ff2bfcefd23d631ce0d7808f3745f,2024-07-03T02:04:16.250000
|
||||
CVE-2024-37384,0,0,4ede7c4b4e1e1de259445d49ca3b43a6d0a75b7dcaf1ea245b8f6306c1e67bb9,2024-07-03T02:04:17.060000
|
||||
CVE-2024-37385,0,0,1af5dbf4fe496116fcfe8797458a2e9292fd2ddec99a563e5137c9d207fb12bc,2024-06-07T14:56:05.647000
|
||||
@ -255845,25 +255845,25 @@ CVE-2024-41005,0,0,0581c40a7d6578257fb62f4f8b7b249bca4b3435363decba2015a514cb7ba
|
||||
CVE-2024-41006,0,0,78b02ce41a2812d6a9b9c45636d9257fa02b9d4a961be98a78ad8fd604a5b390,2024-07-12T16:34:58.687000
|
||||
CVE-2024-41007,0,0,557d3d79f36960ef2852244da6d9d8db811ba2a987274c1ebfaa71dd3034b15a,2024-07-19T18:24:59.197000
|
||||
CVE-2024-41008,0,0,86de6e2be092cac70f5596fb96d0253f26291855f34ae4ddc015775261181c4a,2024-07-16T13:43:58.773000
|
||||
CVE-2024-41009,0,1,c4729b5cb64b59a8130835040cce4fcac734ad6152593d4547aa0a45482d47fd,2024-07-29T07:15:04.560000
|
||||
CVE-2024-41009,0,0,c4729b5cb64b59a8130835040cce4fcac734ad6152593d4547aa0a45482d47fd,2024-07-29T07:15:04.560000
|
||||
CVE-2024-41010,0,0,ae8d1d1b3ebaab40dc6ac6afde49ce66895bb7f4e7ee92f295ff5ca1fa79b217,2024-07-19T15:24:59.137000
|
||||
CVE-2024-41011,0,0,4c2c460e7d99f33158a9c285f2b0882c56a6716b8d689bc4bd4c6463e3fba1ea,2024-07-18T12:28:43.707000
|
||||
CVE-2024-41012,0,1,d7bf6b58a6ff44e671cb5bc351efe42ddfb2e8e00009bebf997b623f0e3128b6,2024-07-29T07:15:05.083000
|
||||
CVE-2024-41013,1,1,f3863cba9f57107c61bbb62c34d31cc7b7073ce24e4fc50afa282d8598d930cf,2024-07-29T07:15:05.430000
|
||||
CVE-2024-41014,1,1,40b01b095b5a437e757d432f861f0375c7d9a90926b7cad990bad16e4fc2bca5,2024-07-29T07:15:05.810000
|
||||
CVE-2024-41015,1,1,e181f3351e8fa0d3d8700179ff37d31fed131f3030c0f5854dcdfa6f29297a39,2024-07-29T07:15:06.033000
|
||||
CVE-2024-41016,1,1,2835a7145cb074ced01d97e28966ee08492d39f023160eddaa9b14c66826bf1d,2024-07-29T07:15:06.293000
|
||||
CVE-2024-41017,1,1,9b09969ae04bcdba4ca8016986588d81c56641f1f8aabb06391a78ac2664c717,2024-07-29T07:15:06.523000
|
||||
CVE-2024-41018,1,1,3e1bf69eaade8b5fc410451e427f08b4caf311f828d669fc02a6bc54fe0027c7,2024-07-29T07:15:06.790000
|
||||
CVE-2024-41019,1,1,e372051a5e462f9aec40eb1ee32a809d67ae1cf52d5fb980f3035c6437f088c0,2024-07-29T07:15:07.023000
|
||||
CVE-2024-41012,0,0,d7bf6b58a6ff44e671cb5bc351efe42ddfb2e8e00009bebf997b623f0e3128b6,2024-07-29T07:15:05.083000
|
||||
CVE-2024-41013,0,0,f3863cba9f57107c61bbb62c34d31cc7b7073ce24e4fc50afa282d8598d930cf,2024-07-29T07:15:05.430000
|
||||
CVE-2024-41014,0,0,40b01b095b5a437e757d432f861f0375c7d9a90926b7cad990bad16e4fc2bca5,2024-07-29T07:15:05.810000
|
||||
CVE-2024-41015,0,0,e181f3351e8fa0d3d8700179ff37d31fed131f3030c0f5854dcdfa6f29297a39,2024-07-29T07:15:06.033000
|
||||
CVE-2024-41016,0,0,2835a7145cb074ced01d97e28966ee08492d39f023160eddaa9b14c66826bf1d,2024-07-29T07:15:06.293000
|
||||
CVE-2024-41017,0,0,9b09969ae04bcdba4ca8016986588d81c56641f1f8aabb06391a78ac2664c717,2024-07-29T07:15:06.523000
|
||||
CVE-2024-41018,0,0,3e1bf69eaade8b5fc410451e427f08b4caf311f828d669fc02a6bc54fe0027c7,2024-07-29T07:15:06.790000
|
||||
CVE-2024-41019,0,0,e372051a5e462f9aec40eb1ee32a809d67ae1cf52d5fb980f3035c6437f088c0,2024-07-29T07:15:07.023000
|
||||
CVE-2024-4102,0,0,1b0aaa7efbf772a3034d5138f2cde018af6a8f41a0229b0c5f36e4d66092a2a3,2024-07-09T18:19:14.047000
|
||||
CVE-2024-4103,0,0,ff27f3988e30e41f465bfc5b7800f7ae2f96b1e2cd71c1414de16617b75fe4fe,2024-05-14T16:11:39.510000
|
||||
CVE-2024-4104,0,0,069e7afb1610585640d00d566d3fc4756dff3571ed269cd2ef1d63c8e8ce45e5,2024-05-14T16:11:39.510000
|
||||
CVE-2024-4105,0,0,5dcbaf8d64f37f58816de0666875f99544dc68f0a9ee2a9bf8d53a5a9c60191e,2024-06-26T12:44:29.693000
|
||||
CVE-2024-4106,0,0,3fc11eee434aa540a2e37440bd2e3ba6e18faae117022d3f68496d405f62ba7f,2024-06-26T12:44:29.693000
|
||||
CVE-2024-4107,0,0,ce88498baf95f06d1267d29854f2a9888ac0ddfe7fc00ea3036ccad453e487fa,2024-05-14T16:11:39.510000
|
||||
CVE-2024-41090,1,1,78ed623a608e103e3c59c7523733e3ea072241a493ca7aed5554264c7ebaebeb,2024-07-29T07:15:07.287000
|
||||
CVE-2024-41091,1,1,39154eee21fc3590cb616807259967af83b8390e8856e93f9fa6e721122c9371,2024-07-29T07:15:07.553000
|
||||
CVE-2024-41090,0,0,78ed623a608e103e3c59c7523733e3ea072241a493ca7aed5554264c7ebaebeb,2024-07-29T07:15:07.287000
|
||||
CVE-2024-41091,0,0,39154eee21fc3590cb616807259967af83b8390e8856e93f9fa6e721122c9371,2024-07-29T07:15:07.553000
|
||||
CVE-2024-41107,0,0,8900de25677c2ad7075ce083b915bd87b6a95be071804b0852c57c05697761e4,2024-07-19T14:15:06.080000
|
||||
CVE-2024-4111,0,0,a3e4bcb39778569b3be84e8d38a6497dbc2fc6b5a3693d9cc21532b8df994ada,2024-06-04T19:20:29.827000
|
||||
CVE-2024-41110,0,0,6ff3558a253c7fb43657a983fdd8f716059d35d04d5c39b9395ecb33c679f6d6,2024-07-25T12:36:39.947000
|
||||
@ -255890,7 +255890,9 @@ CVE-2024-41133,0,0,a5a4a3159caddd26c0f915a077a27191a1bfb56c31d18d6814d32ccb9198e
|
||||
CVE-2024-41134,0,0,8fa2334156a39d1ebf7e99e45685034ae3d6b02c155d7c1f1ec7acc21744b79d,2024-07-25T12:36:39.947000
|
||||
CVE-2024-41135,0,0,66c622d4a15bea76906fc51ad68d43d1d4fd2725282204f137e1bed500fb2fb7,2024-07-25T12:36:39.947000
|
||||
CVE-2024-41136,0,0,020b11b93feff063252b1869b912101e066c5fabc26a5328aa1d1ff14a3e25e0,2024-07-26T13:22:02.033000
|
||||
CVE-2024-41139,1,1,64f5dee7b2554e7c4591201cd1f90856f38818ef633fdc0df3197e870bc65ffc,2024-07-29T09:15:02.563000
|
||||
CVE-2024-4114,0,0,387f9ca6df27ba000d0f44d990ccd6bb074258bb946c87938379db9652dc0a14,2024-05-17T02:40:15.917000
|
||||
CVE-2024-41143,1,1,90b6b330637709750a9782da2f64b8e9e33bddb28d06be1bfcc042cebbc98779,2024-07-29T09:15:02.640000
|
||||
CVE-2024-4115,0,0,89bc89df66a101d446d6568b359dec67345256fa579984420e2e2fe7ea4994ac,2024-06-04T19:20:29.937000
|
||||
CVE-2024-4116,0,0,6ee64e85b69f8f11f599040da371bf02d3a94742e1ecd0f467d9a48f26243458,2024-05-17T02:40:16.110000
|
||||
CVE-2024-4117,0,0,439d2da59fd01a25f254df6698027149837f261eb1a16ba5752d7e62667d1bfc,2024-06-04T19:20:30.043000
|
||||
@ -255972,7 +255974,7 @@ CVE-2024-4161,0,0,818606f25cf93cd94814d58a9247fa25de635b9142e537f83382fb857b8b71
|
||||
CVE-2024-4162,0,0,1a4f39929c1df6d420ff35b2d8de51a57c5e5378a57b6e7a1a35abc1b5a3dc57,2024-05-08T13:15:00.690000
|
||||
CVE-2024-41628,0,0,31020953ef6de7e0104a79a9286098322fc7dbbf28fce9b1e3c1bc0ec9fa77cd,2024-07-26T21:15:14.303000
|
||||
CVE-2024-4163,0,0,69022c7df60536fa7bdfb20d2705efebe8d2d6c2c39bf59b2dcb5940921dba2c,2024-07-03T02:07:10.047000
|
||||
CVE-2024-41637,1,1,1463da8ce55cf61bc6c37e2dc6f41aafefa1bfbe0f3a3a16be513ffc0c497586,2024-07-29T06:15:02.267000
|
||||
CVE-2024-41637,0,0,1463da8ce55cf61bc6c37e2dc6f41aafefa1bfbe0f3a3a16be513ffc0c497586,2024-07-29T06:15:02.267000
|
||||
CVE-2024-4164,0,0,5c582c5408e712b207393008a4bc438580820bad61af8c831d6d320440184b2c,2024-05-17T02:40:17.710000
|
||||
CVE-2024-4165,0,0,1335796556da8c6a778d77814a8f1d84d8c2dc18b70d9de88815783ed1aa0d77,2024-06-04T19:20:31.500000
|
||||
CVE-2024-41655,0,0,ef3400d9e58c2cde6c539334829c8042d5ee995783a74a46bd16638786b0b6db,2024-07-24T12:55:13.223000
|
||||
@ -256009,6 +256011,7 @@ CVE-2024-41707,0,0,3c5ea333b2404f7e0d9195aa6339fef455f6fa8292255904be4c6dce5c96f
|
||||
CVE-2024-41709,0,0,6713bfc73e81c65bc7923627db30413fcbe413ec587fff89449c3abd86e7e93b,2024-07-25T15:22:06.140000
|
||||
CVE-2024-4171,0,0,87597e8caa4479ab69c883527c35fc22af72d614757313d16953f50dcfa107c2,2024-06-04T19:20:31.980000
|
||||
CVE-2024-4172,0,0,ae5cefdd41ee745a5f3463347f20f3f77110439c81ed1ad285dedf4b40da1c57,2024-06-04T19:20:32.077000
|
||||
CVE-2024-41726,1,1,88f414969bd3200f6ad1a06603de912af8c9a5c4b5de27c4b2891456308d4dd9,2024-07-29T09:15:02.703000
|
||||
CVE-2024-4173,0,0,47f39f3e8e603eac743ed4815cd724decf015716a2f0d9c17daf4d8fa3affc2d,2024-04-25T23:15:47.240000
|
||||
CVE-2024-4174,0,0,e168dfb28a2573f66b3120de326c0954bda564c12e3831aed75de7f1338d3089,2024-04-25T13:18:02.660000
|
||||
CVE-2024-4175,0,0,2f40401bb337bcc37138495e1928fb4d762f69fc829f768d707a278e8a423e1a,2024-04-25T13:18:02.660000
|
||||
@ -256039,6 +256042,7 @@ CVE-2024-41839,0,0,5fe8ccf2e82b1dbd1e8f5be23a4b35f149d0ed119de3feeae98a945913864
|
||||
CVE-2024-4185,0,0,2ebb1e96affd30f65338d1aa453a686ffeaefddcc6c26d6c3c25de17e937fc18,2024-04-30T13:11:16.690000
|
||||
CVE-2024-4186,0,0,c07cd0df6ca0a9d2dc3c3ba29e1f05004c0a2ac49601b699a13f07e112f9c5ca,2024-05-07T13:39:32.710000
|
||||
CVE-2024-41880,0,0,2045bc24fb104b692bbe32c5951eb01a25f3639f665062ea76ff47318e893861,2024-07-24T12:55:13.223000
|
||||
CVE-2024-41881,1,1,b5402f88b0c46cef5e334380d91d9e96c28f6965e9ee0d73c905b76c007d1742,2024-07-29T09:15:02.773000
|
||||
CVE-2024-4190,0,0,937461468fcd73b26e47070e7d0620ac3009210ef2f47e2156f0b87dd1c21bc4,2024-06-13T18:36:09.013000
|
||||
CVE-2024-41914,0,0,3890dc2e9dfadd1c89a9c37c2efa6249276e0e28c3236b40dae7af311b3a8be5,2024-07-25T17:47:35.247000
|
||||
CVE-2024-4192,0,0,0768e429bccaed861e82d220deefd437e5feb26a94e95c7a121626318970662c,2024-05-01T13:02:20.750000
|
||||
@ -256302,7 +256306,7 @@ CVE-2024-4479,0,0,19a5d52fe32f562c79c648f88a021706b773334e3193aa8af739d9d0094fe3
|
||||
CVE-2024-4480,0,0,f67562e05d6ec09870268aa7f7fb2c1f10d5ffdcd82e1a66baa51eee0cc1551d,2024-06-17T12:42:04.623000
|
||||
CVE-2024-4481,0,0,c2852db732c7c65c13524ea22e5406663429c55dff3bfe0d5bbffa299f48bbd3,2024-05-14T16:11:39.510000
|
||||
CVE-2024-4482,0,0,30c719bdf44110f5d77595f668147507c21a010645f412257434e159bd101a38,2024-07-03T18:24:41.627000
|
||||
CVE-2024-4483,1,1,89bcd0c34166fcf7585b7b1701f7f1795de252a314df689bf888a86fccb000a3,2024-07-29T06:15:02.357000
|
||||
CVE-2024-4483,0,0,89bcd0c34166fcf7585b7b1701f7f1795de252a314df689bf888a86fccb000a3,2024-07-29T06:15:02.357000
|
||||
CVE-2024-4484,0,0,f8c7c7a90ad9fb2504d28a2d6c05b973f8e6ce86f54104c89b314d37b71fcc46,2024-05-24T13:03:05.093000
|
||||
CVE-2024-4485,0,0,a27e77eb6786137f1ff33a4e5e44b17657a4b120ca60b51b6c6a25a52d6e7411,2024-05-24T13:03:05.093000
|
||||
CVE-2024-4486,0,0,ae6967e9ce7769ae98c2cf87c0bc0fbb14e19b3005ed8a961bec51e7089d074a,2024-05-24T01:15:30.977000
|
||||
@ -256999,7 +257003,7 @@ CVE-2024-5281,0,0,060b06867a1a1c8ae3c49fd1bf435135d5f31c9df63d2fac2402a303dd1dca
|
||||
CVE-2024-5282,0,0,0e38a64d94c307cdd25aa8c70504121a3cc6e789cf8bf74fef94d0d9b37394df,2024-07-15T13:00:34.853000
|
||||
CVE-2024-5283,0,0,158766c6fc63e1521af07a024c96b4a9ea5b7a8f36231f7ef52200c9bb9d7eae,2024-07-15T13:00:34.853000
|
||||
CVE-2024-5284,0,0,4bfe0f5610c04cde5b0cb2c3dc3ab239b1848149dd6bfd8b564acd2ee160cb2a,2024-07-15T13:00:34.853000
|
||||
CVE-2024-5285,1,1,e8f7ea28a01e13485f45d0964d75631c339dee1d815a9e6a26a9c1034538e679,2024-07-29T06:15:02.463000
|
||||
CVE-2024-5285,0,0,e8f7ea28a01e13485f45d0964d75631c339dee1d815a9e6a26a9c1034538e679,2024-07-29T06:15:02.463000
|
||||
CVE-2024-5286,0,0,fc7b78be4389acfb6eeeebdbd1c2b2010558b9a0f60282696859e3db27abfc46,2024-07-15T13:00:34.853000
|
||||
CVE-2024-5287,0,0,d91964abcbe9a10e4df96379d6411e36555098088be8c568765ee25103481fbe,2024-07-15T13:00:34.853000
|
||||
CVE-2024-5289,0,0,a02da373ddf627c39a88f09ba37230dcf191b29c84a32613f97fcb834cd9c524,2024-06-28T13:13:36.980000
|
||||
@ -257455,8 +257459,8 @@ CVE-2024-5868,0,0,9a8536b47a27c25b7062405f8aad2263147d3121835e9d2d4eb9b37e61c344
|
||||
CVE-2024-5871,0,0,bfc23a1063e8c2c3d98988ddd8df8ea7002d8802bf04bd4c0c941cb9250f6a3f,2024-06-17T12:42:04.623000
|
||||
CVE-2024-5873,0,0,5735eb2853c46a5b255fc10b814ec1b6c4f29d136a3521fa8f4d7be256150249,2024-06-12T08:15:51.550000
|
||||
CVE-2024-5881,0,0,3ae006c5e782ce634c6c6fd24fda313894dca095797874331692050dc97499bf,2024-07-09T18:19:14.047000
|
||||
CVE-2024-5882,1,1,54cf41d45cd79d3b39e08bd47f590a63a708c434380f522deb018251c45f47b3,2024-07-29T06:15:02.547000
|
||||
CVE-2024-5883,1,1,b845f7dcc53012e04f19c21e4b3c7e7574b7636c513928ad8052b0676664d5e0,2024-07-29T06:15:02.627000
|
||||
CVE-2024-5882,0,0,54cf41d45cd79d3b39e08bd47f590a63a708c434380f522deb018251c45f47b3,2024-07-29T06:15:02.547000
|
||||
CVE-2024-5883,0,0,b845f7dcc53012e04f19c21e4b3c7e7574b7636c513928ad8052b0676664d5e0,2024-07-29T06:15:02.627000
|
||||
CVE-2024-5885,0,0,4946e96abf9096ba44688feaf0b247be9bc7227d3f0040d31298fc7792a9ccc3,2024-06-27T19:25:12.067000
|
||||
CVE-2024-5886,0,0,c6e7cb024adb68ffe24a326928e4d7c782b39c0023921bf84bad462101dad3b7,2024-06-20T11:15:56.580000
|
||||
CVE-2024-5887,0,0,9566859cf83ab696aed1d992c858295b1ee73a5dd4c0fa67df0787b71b1dba0d,2024-07-17T12:15:02.013000
|
||||
@ -257777,10 +257781,10 @@ CVE-2024-6349,0,0,427eeb1c49748085f9d6a97a6add4281bc215342d4df9759ae2f609f0d24cf
|
||||
CVE-2024-6353,0,0,3e7ee1ed054bc0661b7c1f2f3de9fe2ed8be61a7a777eee50734c66af6748302,2024-07-12T12:49:07.030000
|
||||
CVE-2024-6354,0,0,c9410e2fdcd521ee7fa5aea0abe57bbff6ce1153eea9fc9c27ad647524c61c5c,2024-07-03T02:09:53.917000
|
||||
CVE-2024-6355,0,0,7f4c7fb5a41a7b4cf241f6b370777bf2a8cf0ede73cf75d47093e841c71a69f9,2024-06-27T14:15:16.753000
|
||||
CVE-2024-6362,1,1,4dee41b47b73d10d4eba22354921879c4feaf29e561c3dd84888b855b83cd1cc,2024-07-29T06:15:02.700000
|
||||
CVE-2024-6362,0,0,4dee41b47b73d10d4eba22354921879c4feaf29e561c3dd84888b855b83cd1cc,2024-07-29T06:15:02.700000
|
||||
CVE-2024-6363,0,0,994b1c51b9c796771fbc515a7c8c263a84417d1a8472c73bc862555e8a8b6fdf,2024-07-01T12:37:24.220000
|
||||
CVE-2024-6365,0,0,4363950e80c53434fcfd5afd5a384a9df5c49d102c20d1b50eb31e33005d9f26,2024-07-09T18:19:14.047000
|
||||
CVE-2024-6366,1,1,ec28110fa3f09bba4b114119146ff2b4a3d72063f14c44994ece3d869cf72b37,2024-07-29T06:15:02.790000
|
||||
CVE-2024-6366,0,0,ec28110fa3f09bba4b114119146ff2b4a3d72063f14c44994ece3d869cf72b37,2024-07-29T06:15:02.790000
|
||||
CVE-2024-6367,0,0,0657e75ca91976d2d4beca477f8339cebb9a03d943acbd557f57c4bf89b57702,2024-06-27T12:47:19.847000
|
||||
CVE-2024-6368,0,0,e298d701aa6c568232c2a1685979818386124e299e97d71dced43164a82e13ff,2024-06-27T18:15:21.083000
|
||||
CVE-2024-6369,0,0,8b09ff85e5acb66c2b30feef0f9adfffd0c06196dfcccda2083a0a13ec885594,2024-06-27T12:47:19.847000
|
||||
@ -257795,7 +257799,7 @@ CVE-2024-6381,0,0,2822fb12d769fe1cca32125b45cae52ba3e5807419213b6087c6db8de8d2b3
|
||||
CVE-2024-6382,0,0,9f140af24f460b4413fa844f95383cc153754360a136939b8743c2d8327ebf99,2024-07-03T12:53:24.977000
|
||||
CVE-2024-6383,0,0,4622f4fc90fbde51d6570a14e2ee494e3e71659c68201475e4e4eb659c036ac0,2024-07-05T12:55:51.367000
|
||||
CVE-2024-6385,0,0,13d2095bcd11ed43b6c47262c7b96c8a9e162b20cb975895bc98c3af67d39ff6,2024-07-12T16:49:14.047000
|
||||
CVE-2024-6387,0,0,173e264102785aff2d2221497f9b6a60ed7728b5324e3a48ddf25856405ee116,2024-07-28T21:15:10.480000
|
||||
CVE-2024-6387,0,1,18a0eee254c378cec8300ccfc21cb8052a8dc8829e64291b38d5c6284633aacb,2024-07-29T09:15:02.853000
|
||||
CVE-2024-6388,0,0,0ce37f83493b5d79bb3fdc963327390bc09266ac17f5f1de660cf43d4cdce70d,2024-06-27T17:11:52.390000
|
||||
CVE-2024-6391,0,0,f39301e9680e09028795caddd1f0219ac421e8fbe3773aa2e024531728c8f9e1,2024-07-09T18:19:14.047000
|
||||
CVE-2024-6392,0,0,59a0778055c9ae4fa55c964a2a449c5eba0adacd372cf3ba0a728f148d4da23a,2024-07-12T12:49:07.030000
|
||||
@ -257849,7 +257853,7 @@ CVE-2024-6470,0,0,c9a33c23ec7370c50b4df58ad71ec5e181cf8d29947a984c43804e0a58dc77
|
||||
CVE-2024-6471,0,0,f732e100289c893532526b33b46541a39ba52ce518f7e90d2f97ec4bb67cf877,2024-07-05T12:55:51.367000
|
||||
CVE-2024-6484,0,0,bc633abd6bfb9da06585afdfb273066dfbc508847026385eb612d46f7c70ed29,2024-07-11T18:09:58.777000
|
||||
CVE-2024-6485,0,0,b143d2f5de1cad2c57f83d18fe64abfe0ba2da69210341aec4863f07cdd850cb,2024-07-11T18:09:58.777000
|
||||
CVE-2024-6487,1,1,5f5355443347e274d682cedd60565bdf2ebb5b8ce4f4b4a0557d897fd36ca492,2024-07-29T06:15:02.873000
|
||||
CVE-2024-6487,0,0,5f5355443347e274d682cedd60565bdf2ebb5b8ce4f4b4a0557d897fd36ca492,2024-07-29T06:15:02.873000
|
||||
CVE-2024-6488,0,0,0c5ecb49d7296b409f5d61bd70a5d017ad6f69068345855a00f0bd7c78566faa,2024-07-04T21:15:10.403000
|
||||
CVE-2024-6489,0,0,9e9ca0d507c7dd8804b1fd0a0aa043e3fe6638bfc4af4b9ea109d44e00b0a114,2024-07-22T13:00:53.287000
|
||||
CVE-2024-6490,0,0,8a5877d317a0eed7b1ae7b123dbc62aa28ad8c8fd8f1b2bd14476905cfed0a05,2024-07-26T12:38:41.683000
|
||||
@ -258144,9 +258148,13 @@ CVE-2024-7181,0,0,ec774c75c90b4c019fd6836b41d886ae8fdad52692ded8b3101bdf0e9965b3
|
||||
CVE-2024-7182,0,0,a840bbbf4c86cb7b1060f7dfdeedcec84fdc7e091c2fc826cf697d52f91a8d86,2024-07-29T04:15:02.473000
|
||||
CVE-2024-7183,0,0,7b2532f176b2f24dd5232f9e391254061f920c7e382fc99d4788606a854dce29,2024-07-29T05:15:01.820000
|
||||
CVE-2024-7184,0,0,6417003ca7661607867b29229dc79991a8c0f5c529ccf8e7ff86605e25673ced,2024-07-29T05:15:02.203000
|
||||
CVE-2024-7185,1,1,c52e16bf9f9f42a8927241cae4302277dea92592a051435fb99b8b22f06fb122,2024-07-29T06:15:02.980000
|
||||
CVE-2024-7186,1,1,1fca5bf3b4e197b63e258046d7ceffac9bb5f4226bedafb5e3b93fcdf29c8281,2024-07-29T06:15:03.420000
|
||||
CVE-2024-7187,1,1,f35654ac501888a0f278af49d6fb4bcb3ef738af2e2b97cc401df743772848a7,2024-07-29T07:15:07.830000
|
||||
CVE-2024-7188,1,1,becd39a6aa7990584748f5287876db63518ab0ae9f2005c4ef08178e66949aa8,2024-07-29T07:15:08.713000
|
||||
CVE-2024-7185,0,0,c52e16bf9f9f42a8927241cae4302277dea92592a051435fb99b8b22f06fb122,2024-07-29T06:15:02.980000
|
||||
CVE-2024-7186,0,0,1fca5bf3b4e197b63e258046d7ceffac9bb5f4226bedafb5e3b93fcdf29c8281,2024-07-29T06:15:03.420000
|
||||
CVE-2024-7187,0,0,f35654ac501888a0f278af49d6fb4bcb3ef738af2e2b97cc401df743772848a7,2024-07-29T07:15:07.830000
|
||||
CVE-2024-7188,0,0,becd39a6aa7990584748f5287876db63518ab0ae9f2005c4ef08178e66949aa8,2024-07-29T07:15:08.713000
|
||||
CVE-2024-7189,1,1,35eeb18c886375b73bd239786d0dd9e06eb28ad1148bfdbab13be9366afd5de7,2024-07-29T08:15:01.703000
|
||||
CVE-2024-7190,1,1,ca1374ebbe0d80aa77b5e602ff3d9a9186474bf4da7cd883864d55234de117dc,2024-07-29T08:15:02.010000
|
||||
CVE-2024-7191,1,1,03be4729ed5cdd408154ea492efb83ab303676d2b1c6438848697eed77545b91,2024-07-29T09:15:03.410000
|
||||
CVE-2024-7192,1,1,56eab8502537289b54abe11e07f961272986215cef710818328b47882c39c7d0,2024-07-29T09:15:03.693000
|
||||
CVE-2024-7201,0,0,7be4dae6a4185f4cd25c1f8f884039dbbeadd8a2aceec8d6c898f20222370dfb,2024-07-29T03:15:03.267000
|
||||
CVE-2024-7202,0,0,65ac55258284a64f4b9d6679d59d4464aa901cdf53880e6ffdc4430ae23e65ac,2024-07-29T04:15:02.807000
|
||||
|
Can't render this file because it is too large.
|
Loading…
x
Reference in New Issue
Block a user