mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-07-09 16:05:11 +00:00
Auto-Update: 2024-06-14T10:00:19.166132+00:00
This commit is contained in:
parent
bbfed69f3e
commit
c4d1c0d493
36
CVE-2024/CVE-2024-251xx/CVE-2024-25142.json
Normal file
36
CVE-2024/CVE-2024-251xx/CVE-2024-25142.json
Normal file
@ -0,0 +1,36 @@
|
||||
{
|
||||
"id": "CVE-2024-25142",
|
||||
"sourceIdentifier": "security@apache.org",
|
||||
"published": "2024-06-14T09:15:09.103",
|
||||
"lastModified": "2024-06-14T09:15:09.103",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Use of Web Browser Cache Containing Sensitive Information vulnerability in Apache Airflow.\u00a0\n\nAirflow did not return \"Cache-Control\" header for dynamic content, which in case of some browsers could result in potentially storing sensitive data in local cache of the browser.\n\nThis issue affects Apache Airflow: before 2.9.2.\n\nUsers are recommended to upgrade to version 2.9.2, which fixes the issue.\n\n"
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security@apache.org",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-525"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/apache/airflow/pull/39550",
|
||||
"source": "security@apache.org"
|
||||
},
|
||||
{
|
||||
"url": "https://lists.apache.org/thread/cg1j28lk0fhzthk0of1g7vy7p2n1j7nr",
|
||||
"source": "security@apache.org"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-32989",
|
||||
"sourceIdentifier": "psirt@huawei.com",
|
||||
"published": "2024-05-14T15:37:21.000",
|
||||
"lastModified": "2024-05-14T16:12:23.490",
|
||||
"lastModified": "2024-06-14T08:15:40.147",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -55,6 +55,10 @@
|
||||
"url": "https://consumer.huawei.com/en/support/bulletin/2024/5/",
|
||||
"source": "psirt@huawei.com"
|
||||
},
|
||||
{
|
||||
"url": "https://consumer.huawei.com/en/support/bulletin/2024/6/",
|
||||
"source": "psirt@huawei.com"
|
||||
},
|
||||
{
|
||||
"url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-phones-202405-0000001902628049",
|
||||
"source": "psirt@huawei.com"
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-32990",
|
||||
"sourceIdentifier": "psirt@huawei.com",
|
||||
"published": "2024-05-14T15:37:21.587",
|
||||
"lastModified": "2024-05-14T16:12:23.490",
|
||||
"lastModified": "2024-06-14T08:15:40.410",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -55,6 +55,10 @@
|
||||
"url": "https://consumer.huawei.com/en/support/bulletin/2024/5/",
|
||||
"source": "psirt@huawei.com"
|
||||
},
|
||||
{
|
||||
"url": "https://consumer.huawei.com/en/support/bulletin/2024/6/",
|
||||
"source": "psirt@huawei.com"
|
||||
},
|
||||
{
|
||||
"url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-phones-202405-0000001902628049",
|
||||
"source": "psirt@huawei.com"
|
||||
|
55
CVE-2024/CVE-2024-362xx/CVE-2024-36287.json
Normal file
55
CVE-2024/CVE-2024-362xx/CVE-2024-36287.json
Normal file
@ -0,0 +1,55 @@
|
||||
{
|
||||
"id": "CVE-2024-36287",
|
||||
"sourceIdentifier": "responsibledisclosure@mattermost.com",
|
||||
"published": "2024-06-14T09:15:09.450",
|
||||
"lastModified": "2024-06-14T09:15:09.450",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Mattermost Desktop App versions <=5.7.0 fail to disable certain Electron debug flags which allows for bypassing\u00a0TCC restrictions on macOS."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "responsibledisclosure@mattermost.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 3.8,
|
||||
"baseSeverity": "LOW"
|
||||
},
|
||||
"exploitabilityScore": 2.0,
|
||||
"impactScore": 1.4
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "responsibledisclosure@mattermost.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-693"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://mattermost.com/security-updates",
|
||||
"source": "responsibledisclosure@mattermost.com"
|
||||
}
|
||||
]
|
||||
}
|
55
CVE-2024/CVE-2024-364xx/CVE-2024-36499.json
Normal file
55
CVE-2024/CVE-2024-364xx/CVE-2024-36499.json
Normal file
@ -0,0 +1,55 @@
|
||||
{
|
||||
"id": "CVE-2024-36499",
|
||||
"sourceIdentifier": "psirt@huawei.com",
|
||||
"published": "2024-06-14T08:15:40.523",
|
||||
"lastModified": "2024-06-14T08:15:40.523",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Vulnerability of unauthorized screenshot capturing in the WMS module\nImpact: Successful exploitation of this vulnerability may affect service confidentiality."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "psirt@huawei.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:L",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "LOW",
|
||||
"baseScore": 6.8,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.5,
|
||||
"impactScore": 4.2
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "psirt@huawei.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-269"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://consumer.huawei.com/en/support/bulletin/2024/6/",
|
||||
"source": "psirt@huawei.com"
|
||||
}
|
||||
]
|
||||
}
|
55
CVE-2024/CVE-2024-365xx/CVE-2024-36500.json
Normal file
55
CVE-2024/CVE-2024-365xx/CVE-2024-36500.json
Normal file
@ -0,0 +1,55 @@
|
||||
{
|
||||
"id": "CVE-2024-36500",
|
||||
"sourceIdentifier": "psirt@huawei.com",
|
||||
"published": "2024-06-14T08:15:40.783",
|
||||
"lastModified": "2024-06-14T08:15:40.783",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Privilege escalation vulnerability in the AMS module\nImpact: Successful exploitation of this vulnerability may affect service confidentiality."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "psirt@huawei.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 7.8,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "psirt@huawei.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-269"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://consumer.huawei.com/en/support/bulletin/2024/6/",
|
||||
"source": "psirt@huawei.com"
|
||||
}
|
||||
]
|
||||
}
|
55
CVE-2024/CVE-2024-365xx/CVE-2024-36501.json
Normal file
55
CVE-2024/CVE-2024-365xx/CVE-2024-36501.json
Normal file
@ -0,0 +1,55 @@
|
||||
{
|
||||
"id": "CVE-2024-36501",
|
||||
"sourceIdentifier": "psirt@huawei.com",
|
||||
"published": "2024-06-14T08:15:41.007",
|
||||
"lastModified": "2024-06-14T08:15:41.007",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Memory management vulnerability in the boottime module\nImpact: Successful exploitation of this vulnerability can affect integrity."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "psirt@huawei.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:H",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "HIGH",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 5.6,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 0.8,
|
||||
"impactScore": 4.7
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "psirt@huawei.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-787"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://consumer.huawei.com/en/support/bulletin/2024/6/",
|
||||
"source": "psirt@huawei.com"
|
||||
}
|
||||
]
|
||||
}
|
55
CVE-2024/CVE-2024-365xx/CVE-2024-36502.json
Normal file
55
CVE-2024/CVE-2024-365xx/CVE-2024-36502.json
Normal file
@ -0,0 +1,55 @@
|
||||
{
|
||||
"id": "CVE-2024-36502",
|
||||
"sourceIdentifier": "psirt@huawei.com",
|
||||
"published": "2024-06-14T08:15:41.240",
|
||||
"lastModified": "2024-06-14T08:15:41.240",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Out-of-bounds read vulnerability in the audio module\nImpact: Successful exploitation of this vulnerability will affect availability."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "psirt@huawei.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:H",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "HIGH",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 7.9,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 1.5,
|
||||
"impactScore": 5.8
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "psirt@huawei.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-125"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://consumer.huawei.com/en/support/bulletin/2024/6/",
|
||||
"source": "psirt@huawei.com"
|
||||
}
|
||||
]
|
||||
}
|
55
CVE-2024/CVE-2024-365xx/CVE-2024-36503.json
Normal file
55
CVE-2024/CVE-2024-365xx/CVE-2024-36503.json
Normal file
@ -0,0 +1,55 @@
|
||||
{
|
||||
"id": "CVE-2024-36503",
|
||||
"sourceIdentifier": "psirt@huawei.com",
|
||||
"published": "2024-06-14T08:15:41.463",
|
||||
"lastModified": "2024-06-14T08:15:41.463",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Memory management vulnerability in the Gralloc module\nImpact: Successful exploitation of this vulnerability will affect availability."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "psirt@huawei.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 7.3,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.5,
|
||||
"impactScore": 4.7
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "psirt@huawei.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-908"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://consumer.huawei.com/en/support/bulletin/2024/6/",
|
||||
"source": "psirt@huawei.com"
|
||||
}
|
||||
]
|
||||
}
|
55
CVE-2024/CVE-2024-371xx/CVE-2024-37182.json
Normal file
55
CVE-2024/CVE-2024-371xx/CVE-2024-37182.json
Normal file
@ -0,0 +1,55 @@
|
||||
{
|
||||
"id": "CVE-2024-37182",
|
||||
"sourceIdentifier": "responsibledisclosure@mattermost.com",
|
||||
"published": "2024-06-14T09:15:10.013",
|
||||
"lastModified": "2024-06-14T09:15:10.013",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Mattermost Desktop App versions <=5.7.0 fail to correctly prompt for permission when opening external URLs which allows\u00a0a remote attacker to force a victim over the Internet to run arbitrary programs on the victim's system\u00a0via custom URI schemes."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "responsibledisclosure@mattermost.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "HIGH",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 4.7,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 1.6,
|
||||
"impactScore": 2.7
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "responsibledisclosure@mattermost.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-693"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://mattermost.com/security-updates",
|
||||
"source": "responsibledisclosure@mattermost.com"
|
||||
}
|
||||
]
|
||||
}
|
51
CVE-2024/CVE-2024-48xx/CVE-2024-4863.json
Normal file
51
CVE-2024/CVE-2024-48xx/CVE-2024-4863.json
Normal file
@ -0,0 +1,51 @@
|
||||
{
|
||||
"id": "CVE-2024-4863",
|
||||
"sourceIdentifier": "security@wordfence.com",
|
||||
"published": "2024-06-14T09:15:10.613",
|
||||
"lastModified": "2024-06-14T09:15:10.613",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "The Gutenberg Blocks with AI by Kadence WP \u2013 Page Builder Features plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the \u2018titleFont\u2019 parameter in all versions up to, and including, 3.2.38 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security@wordfence.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 6.4,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 3.1,
|
||||
"impactScore": 2.7
|
||||
}
|
||||
]
|
||||
},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/browser/kadence-blocks/trunk/includes/blocks/class-kadence-blocks-testimonial-block.php#L276",
|
||||
"source": "security@wordfence.com"
|
||||
},
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/changeset/3091170/kadence-blocks/trunk/includes/blocks/class-kadence-blocks-testimonial-block.php",
|
||||
"source": "security@wordfence.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/2e0cde65-f75c-4602-bffe-97b391a428b4?source=cve",
|
||||
"source": "security@wordfence.com"
|
||||
}
|
||||
]
|
||||
}
|
55
CVE-2024/CVE-2024-54xx/CVE-2024-5464.json
Normal file
55
CVE-2024/CVE-2024-54xx/CVE-2024-5464.json
Normal file
@ -0,0 +1,55 @@
|
||||
{
|
||||
"id": "CVE-2024-5464",
|
||||
"sourceIdentifier": "psirt@huawei.com",
|
||||
"published": "2024-06-14T08:15:41.710",
|
||||
"lastModified": "2024-06-14T08:15:41.710",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Vulnerability of insufficient permission verification in the NearLink module\nImpact: Successful exploitation of this vulnerability may affect service confidentiality."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "psirt@huawei.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 4.0,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.5,
|
||||
"impactScore": 1.4
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "psirt@huawei.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-200"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://consumer.huawei.com/en/support/bulletin/2024/6/",
|
||||
"source": "psirt@huawei.com"
|
||||
}
|
||||
]
|
||||
}
|
55
CVE-2024/CVE-2024-54xx/CVE-2024-5465.json
Normal file
55
CVE-2024/CVE-2024-54xx/CVE-2024-5465.json
Normal file
@ -0,0 +1,55 @@
|
||||
{
|
||||
"id": "CVE-2024-5465",
|
||||
"sourceIdentifier": "psirt@huawei.com",
|
||||
"published": "2024-06-14T08:15:41.930",
|
||||
"lastModified": "2024-06-14T08:15:41.930",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Function vulnerabilities in the Calendar module\nImpact: Successful exploitation of this vulnerability will affect availability."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "psirt@huawei.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "LOW",
|
||||
"baseScore": 5.9,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.5,
|
||||
"impactScore": 3.4
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "psirt@huawei.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-264"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://consumer.huawei.com/en/support/bulletin/2024/6/",
|
||||
"source": "psirt@huawei.com"
|
||||
}
|
||||
]
|
||||
}
|
47
CVE-2024/CVE-2024-55xx/CVE-2024-5577.json
Normal file
47
CVE-2024/CVE-2024-55xx/CVE-2024-5577.json
Normal file
@ -0,0 +1,47 @@
|
||||
{
|
||||
"id": "CVE-2024-5577",
|
||||
"sourceIdentifier": "security@wordfence.com",
|
||||
"published": "2024-06-14T08:15:42.157",
|
||||
"lastModified": "2024-06-14T08:15:42.157",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "The Where I Was, Where I Will Be plugin for WordPress is vulnerable to Remote File Inclusion in version <= 1.1.1 via the WIW_HEADER parameter of the /system/include/include_user.php file. This makes it possible for unauthenticated attackers to include and execute arbitrary files hosted on external servers, allowing the execution of any PHP code in those files. This can be used to bypass access controls, obtain sensitive data, or achieve code execution. This requires allow_url_include to be set to true in order to exploit, which is not commonly enabled."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security@wordfence.com",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/browser/where-i-was-where-i-will-be/trunk/system/include/include_user.php",
|
||||
"source": "security@wordfence.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/68e0f54d-08ec-4e41-ac9b-d72cdde5a724?source=cve",
|
||||
"source": "security@wordfence.com"
|
||||
}
|
||||
]
|
||||
}
|
40
CVE-2024/CVE-2024-59xx/CVE-2024-5961.json
Normal file
40
CVE-2024/CVE-2024-59xx/CVE-2024-5961.json
Normal file
@ -0,0 +1,40 @@
|
||||
{
|
||||
"id": "CVE-2024-5961",
|
||||
"sourceIdentifier": "cvd@cert.pl",
|
||||
"published": "2024-06-14T08:15:42.377",
|
||||
"lastModified": "2024-06-14T08:15:42.377",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Improper neutralization of input during web page generation vulnerability in 2ClickPortal software allows reflected cross-site scripting\u00a0(XSS).\u00a0An attacker might trick somebody into using a crafted URL, which will cause a script to be run in user's browser.\u00a0This issue affects 2ClickPortal software versions from 7.2.31 through 7.6.4."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "cvd@cert.pl",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://2clickportal.pl/",
|
||||
"source": "cvd@cert.pl"
|
||||
},
|
||||
{
|
||||
"url": "https://cert.pl/en/posts/2024/06/CVE-2024-5961/",
|
||||
"source": "cvd@cert.pl"
|
||||
},
|
||||
{
|
||||
"url": "https://cert.pl/posts/2024/06/CVE-2024-5961/",
|
||||
"source": "cvd@cert.pl"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-5983",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2024-06-14T02:15:10.173",
|
||||
"lastModified": "2024-06-14T02:15:10.173",
|
||||
"lastModified": "2024-06-14T08:15:42.550",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -17,19 +17,19 @@
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "LOW",
|
||||
"baseScore": 6.3,
|
||||
"baseSeverity": "MEDIUM"
|
||||
"baseScore": 7.3,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 3.4
|
||||
}
|
||||
],
|
||||
@ -39,17 +39,17 @@
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "2.0",
|
||||
"vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P",
|
||||
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
|
||||
"accessVector": "NETWORK",
|
||||
"accessComplexity": "LOW",
|
||||
"authentication": "SINGLE",
|
||||
"authentication": "NONE",
|
||||
"confidentialityImpact": "PARTIAL",
|
||||
"integrityImpact": "PARTIAL",
|
||||
"availabilityImpact": "PARTIAL",
|
||||
"baseScore": 6.5
|
||||
"baseScore": 7.5
|
||||
},
|
||||
"baseSeverity": "MEDIUM",
|
||||
"exploitabilityScore": 8.0,
|
||||
"baseSeverity": "HIGH",
|
||||
"exploitabilityScore": 10.0,
|
||||
"impactScore": 6.4,
|
||||
"acInsufInfo": false,
|
||||
"obtainAllPrivilege": false,
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-5984",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2024-06-14T02:15:10.443",
|
||||
"lastModified": "2024-06-14T02:15:10.443",
|
||||
"lastModified": "2024-06-14T08:15:42.843",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -17,19 +17,19 @@
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "LOW",
|
||||
"baseScore": 6.3,
|
||||
"baseSeverity": "MEDIUM"
|
||||
"baseScore": 7.3,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 3.4
|
||||
}
|
||||
],
|
||||
@ -39,17 +39,17 @@
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "2.0",
|
||||
"vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P",
|
||||
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
|
||||
"accessVector": "NETWORK",
|
||||
"accessComplexity": "LOW",
|
||||
"authentication": "SINGLE",
|
||||
"authentication": "NONE",
|
||||
"confidentialityImpact": "PARTIAL",
|
||||
"integrityImpact": "PARTIAL",
|
||||
"availabilityImpact": "PARTIAL",
|
||||
"baseScore": 6.5
|
||||
"baseScore": 7.5
|
||||
},
|
||||
"baseSeverity": "MEDIUM",
|
||||
"exploitabilityScore": 8.0,
|
||||
"baseSeverity": "HIGH",
|
||||
"exploitabilityScore": 10.0,
|
||||
"impactScore": 6.4,
|
||||
"acInsufInfo": false,
|
||||
"obtainAllPrivilege": false,
|
||||
|
@ -8,6 +8,10 @@
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "The WP Go Maps (formerly WP Google Maps) plugin for WordPress is vulnerable to Stored Cross-Site Scripting via Custom JS option in versions up to, and including, 9.0.38. This makes it possible for authenticated attackers that have been explicitly granted permissions by an administrator, with contributor-level permissions and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. Version 9.0.39 adds a caution to make administrators aware of the possibility for abuse if permissions are granted to lower-level users."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "El complemento WP Go Maps (anteriormente WP Google Maps) para WordPress es vulnerable a Cross-Site Scripting Almacenado a trav\u00e9s de la opci\u00f3n Custom JS en versiones hasta la 9.0.38 incluida. Esto hace posible que los atacantes autenticados a los que un administrador les ha otorgado permisos expl\u00edcitamente, con permisos de nivel de colaborador y superiores, inyecten scripts web arbitrarios en p\u00e1ginas que se ejecutar\u00e1n cada vez que un usuario acceda a una p\u00e1gina inyectada. La versi\u00f3n 9.0.39 agrega una advertencia para que los administradores sean conscientes de la posibilidad de abuso si se otorgan permisos a usuarios de nivel inferior."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
|
59
CVE-2024/CVE-2024-59xx/CVE-2024-5995.json
Normal file
59
CVE-2024/CVE-2024-59xx/CVE-2024-5995.json
Normal file
@ -0,0 +1,59 @@
|
||||
{
|
||||
"id": "CVE-2024-5995",
|
||||
"sourceIdentifier": "twcert@cert.org.tw",
|
||||
"published": "2024-06-14T08:15:43.097",
|
||||
"lastModified": "2024-06-14T08:15:43.097",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "The notification emails sent by Soar Cloud HR Portal contain a link with a embedded session. The expiration of the session is not properly configured, remaining valid for more than 7 days and can be reused."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "twcert@cert.org.tw",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 8.8,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "twcert@cert.org.tw",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-613"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.twcert.org.tw/en/cp-139-7872-1c8b4-2.html",
|
||||
"source": "twcert@cert.org.tw"
|
||||
},
|
||||
{
|
||||
"url": "https://www.twcert.org.tw/tw/cp-132-7871-fecf1-1.html",
|
||||
"source": "twcert@cert.org.tw"
|
||||
}
|
||||
]
|
||||
}
|
59
CVE-2024/CVE-2024-59xx/CVE-2024-5996.json
Normal file
59
CVE-2024/CVE-2024-59xx/CVE-2024-5996.json
Normal file
@ -0,0 +1,59 @@
|
||||
{
|
||||
"id": "CVE-2024-5996",
|
||||
"sourceIdentifier": "twcert@cert.org.tw",
|
||||
"published": "2024-06-14T09:15:11.010",
|
||||
"lastModified": "2024-06-14T09:15:11.010",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "The notification emails sent by Soar Cloud HR Portal contain a link with a embedded session. These emails are sent without using an encrypted transmission protocol. If an attacker intercepts the packets, they can obtain the plaintext session information and use it to log into the system."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "twcert@cert.org.tw",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 8.8,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "twcert@cert.org.tw",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-319"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.twcert.org.tw/en/cp-139-7874-b6727-2.html",
|
||||
"source": "twcert@cert.org.tw"
|
||||
},
|
||||
{
|
||||
"url": "https://www.twcert.org.tw/tw/cp-132-7873-5ba4c-1.html",
|
||||
"source": "twcert@cert.org.tw"
|
||||
}
|
||||
]
|
||||
}
|
74
README.md
74
README.md
@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours.
|
||||
### Last Repository Update
|
||||
|
||||
```plain
|
||||
2024-06-14T08:00:19.274263+00:00
|
||||
2024-06-14T10:00:19.166132+00:00
|
||||
```
|
||||
|
||||
### Most recent CVE Modification Timestamp synchronized with NVD
|
||||
|
||||
```plain
|
||||
2024-06-14T07:15:51.130000+00:00
|
||||
2024-06-14T09:15:11.010000+00:00
|
||||
```
|
||||
|
||||
### Last Data Feed Release
|
||||
@ -33,63 +33,39 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
|
||||
### Total Number of included CVEs
|
||||
|
||||
```plain
|
||||
254119
|
||||
254134
|
||||
```
|
||||
|
||||
### CVEs added in the last Commit
|
||||
|
||||
Recently added CVEs: `28`
|
||||
Recently added CVEs: `15`
|
||||
|
||||
- [CVE-2023-51497](CVE-2023/CVE-2023-514xx/CVE-2023-51497.json) (`2024-06-14T06:15:10.673`)
|
||||
- [CVE-2024-1295](CVE-2024/CVE-2024-12xx/CVE-2024-1295.json) (`2024-06-14T06:15:10.937`)
|
||||
- [CVE-2024-2122](CVE-2024/CVE-2024-21xx/CVE-2024-2122.json) (`2024-06-14T06:15:11.320`)
|
||||
- [CVE-2024-2218](CVE-2024/CVE-2024-22xx/CVE-2024-2218.json) (`2024-06-14T06:15:11.570`)
|
||||
- [CVE-2024-23504](CVE-2024/CVE-2024-235xx/CVE-2024-23504.json) (`2024-06-14T06:15:11.023`)
|
||||
- [CVE-2024-31162](CVE-2024/CVE-2024-311xx/CVE-2024-31162.json) (`2024-06-14T07:15:50.153`)
|
||||
- [CVE-2024-31163](CVE-2024/CVE-2024-311xx/CVE-2024-31163.json) (`2024-06-14T07:15:50.713`)
|
||||
- [CVE-2024-3754](CVE-2024/CVE-2024-37xx/CVE-2024-3754.json) (`2024-06-14T06:15:11.950`)
|
||||
- [CVE-2024-3965](CVE-2024/CVE-2024-39xx/CVE-2024-3965.json) (`2024-06-14T06:15:12.060`)
|
||||
- [CVE-2024-3966](CVE-2024/CVE-2024-39xx/CVE-2024-3966.json) (`2024-06-14T06:15:12.170`)
|
||||
- [CVE-2024-3971](CVE-2024/CVE-2024-39xx/CVE-2024-3971.json) (`2024-06-14T06:15:12.250`)
|
||||
- [CVE-2024-3972](CVE-2024/CVE-2024-39xx/CVE-2024-3972.json) (`2024-06-14T06:15:12.330`)
|
||||
- [CVE-2024-3977](CVE-2024/CVE-2024-39xx/CVE-2024-3977.json) (`2024-06-14T06:15:12.427`)
|
||||
- [CVE-2024-3978](CVE-2024/CVE-2024-39xx/CVE-2024-3978.json) (`2024-06-14T06:15:12.520`)
|
||||
- [CVE-2024-3992](CVE-2024/CVE-2024-39xx/CVE-2024-3992.json) (`2024-06-14T06:15:12.607`)
|
||||
- [CVE-2024-3993](CVE-2024/CVE-2024-39xx/CVE-2024-3993.json) (`2024-06-14T06:15:12.680`)
|
||||
- [CVE-2024-4005](CVE-2024/CVE-2024-40xx/CVE-2024-4005.json) (`2024-06-14T06:15:12.753`)
|
||||
- [CVE-2024-4270](CVE-2024/CVE-2024-42xx/CVE-2024-4270.json) (`2024-06-14T06:15:12.827`)
|
||||
- [CVE-2024-4271](CVE-2024/CVE-2024-42xx/CVE-2024-4271.json) (`2024-06-14T06:15:12.907`)
|
||||
- [CVE-2024-4404](CVE-2024/CVE-2024-44xx/CVE-2024-4404.json) (`2024-06-14T06:15:12.987`)
|
||||
- [CVE-2024-4480](CVE-2024/CVE-2024-44xx/CVE-2024-4480.json) (`2024-06-14T06:15:13.220`)
|
||||
- [CVE-2024-4751](CVE-2024/CVE-2024-47xx/CVE-2024-4751.json) (`2024-06-14T06:15:13.297`)
|
||||
- [CVE-2024-5155](CVE-2024/CVE-2024-51xx/CVE-2024-5155.json) (`2024-06-14T06:15:13.373`)
|
||||
- [CVE-2024-5551](CVE-2024/CVE-2024-55xx/CVE-2024-5551.json) (`2024-06-14T06:15:13.443`)
|
||||
- [CVE-2024-5994](CVE-2024/CVE-2024-59xx/CVE-2024-5994.json) (`2024-06-14T07:15:51.130`)
|
||||
- [CVE-2024-25142](CVE-2024/CVE-2024-251xx/CVE-2024-25142.json) (`2024-06-14T09:15:09.103`)
|
||||
- [CVE-2024-36287](CVE-2024/CVE-2024-362xx/CVE-2024-36287.json) (`2024-06-14T09:15:09.450`)
|
||||
- [CVE-2024-36499](CVE-2024/CVE-2024-364xx/CVE-2024-36499.json) (`2024-06-14T08:15:40.523`)
|
||||
- [CVE-2024-36500](CVE-2024/CVE-2024-365xx/CVE-2024-36500.json) (`2024-06-14T08:15:40.783`)
|
||||
- [CVE-2024-36501](CVE-2024/CVE-2024-365xx/CVE-2024-36501.json) (`2024-06-14T08:15:41.007`)
|
||||
- [CVE-2024-36502](CVE-2024/CVE-2024-365xx/CVE-2024-36502.json) (`2024-06-14T08:15:41.240`)
|
||||
- [CVE-2024-36503](CVE-2024/CVE-2024-365xx/CVE-2024-36503.json) (`2024-06-14T08:15:41.463`)
|
||||
- [CVE-2024-37182](CVE-2024/CVE-2024-371xx/CVE-2024-37182.json) (`2024-06-14T09:15:10.013`)
|
||||
- [CVE-2024-4863](CVE-2024/CVE-2024-48xx/CVE-2024-4863.json) (`2024-06-14T09:15:10.613`)
|
||||
- [CVE-2024-5464](CVE-2024/CVE-2024-54xx/CVE-2024-5464.json) (`2024-06-14T08:15:41.710`)
|
||||
- [CVE-2024-5465](CVE-2024/CVE-2024-54xx/CVE-2024-5465.json) (`2024-06-14T08:15:41.930`)
|
||||
- [CVE-2024-5577](CVE-2024/CVE-2024-55xx/CVE-2024-5577.json) (`2024-06-14T08:15:42.157`)
|
||||
- [CVE-2024-5961](CVE-2024/CVE-2024-59xx/CVE-2024-5961.json) (`2024-06-14T08:15:42.377`)
|
||||
- [CVE-2024-5995](CVE-2024/CVE-2024-59xx/CVE-2024-5995.json) (`2024-06-14T08:15:43.097`)
|
||||
- [CVE-2024-5996](CVE-2024/CVE-2024-59xx/CVE-2024-5996.json) (`2024-06-14T09:15:11.010`)
|
||||
|
||||
|
||||
### CVEs modified in the last Commit
|
||||
|
||||
Recently modified CVEs: `19`
|
||||
Recently modified CVEs: `5`
|
||||
|
||||
- [CVE-2024-34055](CVE-2024/CVE-2024-340xx/CVE-2024-34055.json) (`2024-06-14T06:15:11.650`)
|
||||
- [CVE-2024-5830](CVE-2024/CVE-2024-58xx/CVE-2024-5830.json) (`2024-06-14T06:15:13.690`)
|
||||
- [CVE-2024-5831](CVE-2024/CVE-2024-58xx/CVE-2024-5831.json) (`2024-06-14T06:15:14.000`)
|
||||
- [CVE-2024-5832](CVE-2024/CVE-2024-58xx/CVE-2024-5832.json) (`2024-06-14T06:15:14.293`)
|
||||
- [CVE-2024-5833](CVE-2024/CVE-2024-58xx/CVE-2024-5833.json) (`2024-06-14T06:15:14.547`)
|
||||
- [CVE-2024-5834](CVE-2024/CVE-2024-58xx/CVE-2024-5834.json) (`2024-06-14T06:15:14.953`)
|
||||
- [CVE-2024-5835](CVE-2024/CVE-2024-58xx/CVE-2024-5835.json) (`2024-06-14T06:15:15.090`)
|
||||
- [CVE-2024-5836](CVE-2024/CVE-2024-58xx/CVE-2024-5836.json) (`2024-06-14T06:15:15.463`)
|
||||
- [CVE-2024-5837](CVE-2024/CVE-2024-58xx/CVE-2024-5837.json) (`2024-06-14T06:15:15.683`)
|
||||
- [CVE-2024-5838](CVE-2024/CVE-2024-58xx/CVE-2024-5838.json) (`2024-06-14T06:15:15.887`)
|
||||
- [CVE-2024-5839](CVE-2024/CVE-2024-58xx/CVE-2024-5839.json) (`2024-06-14T06:15:16.180`)
|
||||
- [CVE-2024-5840](CVE-2024/CVE-2024-58xx/CVE-2024-5840.json) (`2024-06-14T06:15:16.280`)
|
||||
- [CVE-2024-5841](CVE-2024/CVE-2024-58xx/CVE-2024-5841.json) (`2024-06-14T06:15:16.640`)
|
||||
- [CVE-2024-5842](CVE-2024/CVE-2024-58xx/CVE-2024-5842.json) (`2024-06-14T06:15:16.913`)
|
||||
- [CVE-2024-5843](CVE-2024/CVE-2024-58xx/CVE-2024-5843.json) (`2024-06-14T06:15:17.170`)
|
||||
- [CVE-2024-5844](CVE-2024/CVE-2024-58xx/CVE-2024-5844.json) (`2024-06-14T06:15:17.517`)
|
||||
- [CVE-2024-5845](CVE-2024/CVE-2024-58xx/CVE-2024-5845.json) (`2024-06-14T06:15:17.790`)
|
||||
- [CVE-2024-5846](CVE-2024/CVE-2024-58xx/CVE-2024-5846.json) (`2024-06-14T06:15:18.070`)
|
||||
- [CVE-2024-5847](CVE-2024/CVE-2024-58xx/CVE-2024-5847.json) (`2024-06-14T06:15:18.340`)
|
||||
- [CVE-2024-32989](CVE-2024/CVE-2024-329xx/CVE-2024-32989.json) (`2024-06-14T08:15:40.147`)
|
||||
- [CVE-2024-32990](CVE-2024/CVE-2024-329xx/CVE-2024-32990.json) (`2024-06-14T08:15:40.410`)
|
||||
- [CVE-2024-5983](CVE-2024/CVE-2024-59xx/CVE-2024-5983.json) (`2024-06-14T08:15:42.550`)
|
||||
- [CVE-2024-5984](CVE-2024/CVE-2024-59xx/CVE-2024-5984.json) (`2024-06-14T08:15:42.843`)
|
||||
- [CVE-2024-5994](CVE-2024/CVE-2024-59xx/CVE-2024-5994.json) (`2024-06-14T07:15:51.130`)
|
||||
|
||||
|
||||
## Download and Usage
|
||||
|
117
_state.csv
117
_state.csv
@ -237315,7 +237315,7 @@ CVE-2023-51371,0,0,3aedbdd2ebcefdee1d4ecc7e34ad4946769243f5b6156bf507da0f1e10c7a
|
||||
CVE-2023-51372,0,0,faf10f39d38879b1877c2b4b79fccfffa8ba55d0f2c230b96325f105b3943945,2024-01-05T04:53:29.053000
|
||||
CVE-2023-51373,0,0,ec933750877dd764c811f2f21965ce53a21d0bcaec72c86a5800d7678bae3291,2024-01-05T04:53:36.090000
|
||||
CVE-2023-51374,0,0,5cfd079eb630f7378776bd71d950f89ec6bc9672899c475804bfa5be25959bf1,2024-01-05T04:53:45.327000
|
||||
CVE-2023-51377,1,1,6736aa5d948f3cfcc9a13df1cf3d75a26277f1f33f8d0318acabe066b930f8ee,2024-06-14T06:15:09.687000
|
||||
CVE-2023-51377,0,0,6736aa5d948f3cfcc9a13df1cf3d75a26277f1f33f8d0318acabe066b930f8ee,2024-06-14T06:15:09.687000
|
||||
CVE-2023-51378,0,0,cfb34f8c0413f5c8c80707e698b878e1dfc35501d7b8ccfdcfa56ee80ec9005e,2024-01-05T16:20:35.933000
|
||||
CVE-2023-51379,0,0,16f24987d2353ca790b085f58095f212ea8af481563ccadbbfff7530ad2081cc,2023-12-29T15:30:21.787000
|
||||
CVE-2023-5138,0,0,c9d3f5e8397e5d65043919751a1cd49595d1a257d57175d1bac5336e75f36521,2024-01-10T16:37:55.867000
|
||||
@ -237440,9 +237440,9 @@ CVE-2023-51491,0,0,9a630e61b90ae68231ccba63898cc12e25e82adc34d74019316f737ba08d8
|
||||
CVE-2023-51492,0,0,0d58b27a14611c109e89a3494fa756a640689ff79517444f7259a888456dbe6f,2024-02-15T06:26:42.423000
|
||||
CVE-2023-51493,0,0,f83cd3e9ef3ea1708a4f0f0755e074e9ad1d27d8d5ae20aecf4ecfd903ab0733,2024-02-15T06:26:48.450000
|
||||
CVE-2023-51494,0,0,cdbe694111a067a670940f1f6937175f6a61a9c39ae4f116bd5e17bad447b32c,2024-06-10T02:52:08.267000
|
||||
CVE-2023-51495,1,1,16cb2cf6bd8adcc04924ca948a6a322c0a89bca458aad1dc5c7aa3715ad97a1d,2024-06-14T06:15:10.103000
|
||||
CVE-2023-51496,1,1,6e2c7ba18f5724f1a9f7dae7f52ccb642f0aeac4a1517a159272a83dd3994abf,2024-06-14T06:15:10.407000
|
||||
CVE-2023-51497,1,1,06332a05fd4ac3a075738e64fa946ef6f28695940ce2a827137f627290b76c0a,2024-06-14T06:15:10.673000
|
||||
CVE-2023-51495,0,0,16cb2cf6bd8adcc04924ca948a6a322c0a89bca458aad1dc5c7aa3715ad97a1d,2024-06-14T06:15:10.103000
|
||||
CVE-2023-51496,0,0,6e2c7ba18f5724f1a9f7dae7f52ccb642f0aeac4a1517a159272a83dd3994abf,2024-06-14T06:15:10.407000
|
||||
CVE-2023-51497,0,0,06332a05fd4ac3a075738e64fa946ef6f28695940ce2a827137f627290b76c0a,2024-06-14T06:15:10.673000
|
||||
CVE-2023-51498,0,0,ab8c2beb319a6c51ec29052d217c30e93f2503597d7d0b7932e01b0c25bc46aa,2024-06-13T18:36:45.417000
|
||||
CVE-2023-51499,0,0,b9b7f0cb79987f6473d87d127fe53323a00f8ae64e5778981713c6a91fb94ca1,2024-04-15T13:15:51.577000
|
||||
CVE-2023-5150,0,0,2f5e1e90547bd29c8e7cd2b67cb1157d0145916e107fb086f39413bd0ac1897a,2024-05-17T02:32:51.870000
|
||||
@ -241487,7 +241487,7 @@ CVE-2024-1291,0,0,fe166acb5d95f395c2c2fc690290a718609fcb00811b1e4c9c8ca50b4e3f8d
|
||||
CVE-2024-1292,0,0,907fd2224f3cc98f6ddba430073b9fe125cb0f29dd99769274d8a3062533485a,2024-04-08T18:48:40.217000
|
||||
CVE-2024-1293,0,0,51959b2d10b4ca1210a0917015b6e0ba4809214d01553289260d6a92beabc64d,2024-03-13T18:16:18.563000
|
||||
CVE-2024-1294,0,0,1a6fde55ee17952393d258a28e1938bfe41cafec05fa305cc82057814b7c2b7d,2024-02-29T13:49:29.390000
|
||||
CVE-2024-1295,1,1,419aabd6237846c43090fedd4dce57ae3cb2efcc987065738ea727076fd19f81,2024-06-14T06:15:10.937000
|
||||
CVE-2024-1295,0,0,419aabd6237846c43090fedd4dce57ae3cb2efcc987065738ea727076fd19f81,2024-06-14T06:15:10.937000
|
||||
CVE-2024-1296,0,0,ab648d9dba58ca530bb990b50d92c4f5ce9f591faa8fbeeb49385095b8425c33,2024-03-13T18:16:18.563000
|
||||
CVE-2024-1297,0,0,1fc219bb038ab422185a999365115aff94759fe3e5ff94e3dc4180f1d6bc82d0,2024-02-20T19:50:53.960000
|
||||
CVE-2024-1298,0,0,b14e73b9f89ef2bb5f90efe91191494dc122a0d6eae045ea12354e4504b4ff5a,2024-06-11T04:15:12.513000
|
||||
@ -242808,7 +242808,7 @@ CVE-2024-2118,0,0,cc7239e1911b2fedd7efefc2bcf43293737a1c458586fdac470d8d5bcdb87f
|
||||
CVE-2024-2119,0,0,fddfb28891aa483f76592c7c27b82101a08176e818c0033898539a16e1ac7da1,2024-05-22T12:46:53.887000
|
||||
CVE-2024-2120,0,0,d869e2d6a05f40fd099ef5d11b57f9e00d7f0b266e38148b71c8a447ce60ab1d,2024-03-27T12:29:30.307000
|
||||
CVE-2024-2121,0,0,4e86b6ec3433d288b50b9e9c9587d6707962f4c2d7ff92215a6366c5fd16dc6b,2024-03-27T12:29:30.307000
|
||||
CVE-2024-2122,1,1,52d18fec0f04835d210ed85787b4868efd0165fb881bb53971d6814f1744b58f,2024-06-14T06:15:11.320000
|
||||
CVE-2024-2122,0,0,52d18fec0f04835d210ed85787b4868efd0165fb881bb53971d6814f1744b58f,2024-06-14T06:15:11.320000
|
||||
CVE-2024-2123,0,0,50093ae27aa67e742757e304ff2f215cc4cf255fadb869543328103242423601,2024-03-13T12:33:51.697000
|
||||
CVE-2024-2124,0,0,6c05438396435f5a71d022df467bc26ef0c83811ea38fc903b63d8ae9658d2c8,2024-03-20T13:00:16.367000
|
||||
CVE-2024-2125,0,0,21907277d02e81dabf0303aac375ec9a544529904f2ff625079487b0f36ac4ce,2024-04-10T13:23:38.787000
|
||||
@ -243396,7 +243396,7 @@ CVE-2024-2217,0,0,07b67ca85e13a2c6962db1475a9d0f8a931b674f51497121f9a33c8078bd4b
|
||||
CVE-2024-22177,0,0,1ff2297e612a95969b8693bc6a53ecafa7223eba267b1cfe298d3bc1fedfbe99,2024-04-02T12:50:42.233000
|
||||
CVE-2024-22178,0,0,894383da751aaa1046c611146ada59662a01e512644efee9e31c744bf34674c7,2024-04-03T17:24:18.150000
|
||||
CVE-2024-22179,0,0,077a89cd90d357917ee36a8e199f939ad2a69cb604b53e3f5f34bba5fb27b47b,2024-05-28T17:15:09.547000
|
||||
CVE-2024-2218,1,1,9f3d01c1fbe6399526a0d4f69d8959ee16170a7f2d67fa62f7126d66bae09824,2024-06-14T06:15:11.570000
|
||||
CVE-2024-2218,0,0,9f3d01c1fbe6399526a0d4f69d8959ee16170a7f2d67fa62f7126d66bae09824,2024-06-14T06:15:11.570000
|
||||
CVE-2024-22180,0,0,19e9318ece70bb0e88968bad696b07798db0b84c54153f426e33acb6b2d89f93,2024-04-02T12:50:42.233000
|
||||
CVE-2024-22181,0,0,aa4f7fc8e8236ce5a2a5625d560e720bca0124d088633712af3a8c63643e6bd8,2024-06-10T17:16:18.890000
|
||||
CVE-2024-22182,0,0,33412ce4ff69d7e4ec2fcd049c27451f4c9a424792b679659080bdcd047dcd32,2024-05-17T02:36:15.670000
|
||||
@ -244146,7 +244146,7 @@ CVE-2024-23500,0,0,b6642b73aef2e4cdba157839c8fde9771818b399a7f64cf89ea1ee42a68c8
|
||||
CVE-2024-23501,0,0,b3e85809586c989dd0a69f1f88e280acf334973e6408d57bc052ae66513752bd,2024-02-29T13:49:29.390000
|
||||
CVE-2024-23502,0,0,8f894ed7c8e8f8359294a01d255055a873ed16e9a79e2948ed3ac6f5d8f8da9f,2024-02-09T14:46:17.743000
|
||||
CVE-2024-23503,0,0,31f4279f0042279b1e83884b504dbd77ff571f8da819058d434170bb0112db1f,2024-06-13T18:36:45.417000
|
||||
CVE-2024-23504,1,1,e2f1708a0f0629eafb5c37fbc341131c55215c47e54a596367257ea2808f745f,2024-06-14T06:15:11.023000
|
||||
CVE-2024-23504,0,0,e2f1708a0f0629eafb5c37fbc341131c55215c47e54a596367257ea2808f745f,2024-06-14T06:15:11.023000
|
||||
CVE-2024-23505,0,0,1c1e95102de07fb5891297ba209ce274fdd1b187d013f9d2d61a7cdf81f20a18,2024-02-05T20:27:44.793000
|
||||
CVE-2024-23506,0,0,1374ac637ee795ef76e472829586ea10162cf799e7f8facdf1ae775daa957ca7,2024-02-01T04:14:07.073000
|
||||
CVE-2024-23507,0,0,5e40ce7b11a8b26bc0a529a8393436247da9b21902b7ceeec2a950c934f8cd05,2024-02-05T20:42:09.590000
|
||||
@ -245142,6 +245142,7 @@ CVE-2024-25139,0,0,74a1a5b7a626d7e1a0de61a1ac7f86e47d772626c4f0df2c72c44f9b9fe45
|
||||
CVE-2024-2514,0,0,40bdac6fedbbfa3e45ec5e41e61e2794b1635576a9ed9aa904ae5ed7facdbc24,2024-05-17T02:38:16.170000
|
||||
CVE-2024-25140,0,0,531f7b5bf7af89134534b93bfbbb303a3e40e0ca6401d81bdacee6ed36c47e67,2024-05-17T02:36:54.770000
|
||||
CVE-2024-25141,0,0,48f7b04af2e96f1eec8716e65032c2fb66196d4c47edca9d45198681efaeed74,2024-02-20T22:15:08.670000
|
||||
CVE-2024-25142,1,1,bb1a72d1814cdd545fe6ac941ec4e08d84573e61642ffeefd16be919783437e5,2024-06-14T09:15:09.103000
|
||||
CVE-2024-25143,0,0,1e8c832f1a9dadf4942cad4aead6d2b651b3644cad4a347f966955fac6cc114d,2024-02-07T17:04:54.407000
|
||||
CVE-2024-25144,0,0,a6c13ad7167848c49a5d40b01da68d21d9e0c28e7dcf9021386119f5261fbaa8,2024-02-15T04:36:24.350000
|
||||
CVE-2024-25145,0,0,4d151fe37dc24069dd8110580bdd4f039d66d4f3402218ddef43cec9606e51ad,2024-02-15T15:10:35.503000
|
||||
@ -249204,8 +249205,8 @@ CVE-2024-31159,0,0,2a53ec66414fdd93c519f60e7c23e0f68e7f66b7565c7e21e39cbd5903166
|
||||
CVE-2024-3116,0,0,398207d2760952c7d30e8a692022e3a890986df7c49b38076f15d6ef6a9e4edb,2024-04-23T02:15:48.310000
|
||||
CVE-2024-31160,0,0,d32a6d0d2c234144b1d8fb8d66e1ff1ce69ab40a7c1a5b84e40b1964a63bfaab,2024-06-14T04:15:42.083000
|
||||
CVE-2024-31161,0,0,421418feb6f0ed4c933a9ddfd416c9ca3be473d9866b6501ff145e0ba88fb5a3,2024-06-14T04:15:42.323000
|
||||
CVE-2024-31162,1,1,c0044cb909f773cafb533a3f0d8a0edf3110fff813af552f2592b97d8fd26513,2024-06-14T07:15:50.153000
|
||||
CVE-2024-31163,1,1,0346351befc7fffc5039a693faec68928a266b9975796b750e7252f0df71991e,2024-06-14T07:15:50.713000
|
||||
CVE-2024-31162,0,0,c0044cb909f773cafb533a3f0d8a0edf3110fff813af552f2592b97d8fd26513,2024-06-14T07:15:50.153000
|
||||
CVE-2024-31163,0,0,0346351befc7fffc5039a693faec68928a266b9975796b750e7252f0df71991e,2024-06-14T07:15:50.713000
|
||||
CVE-2024-3117,0,0,36e4fb078204cafbff3c0bf42c3651ee711cc6ce8c13ce5342e84f5d6a7e20c5,2024-05-17T02:39:43.503000
|
||||
CVE-2024-3118,0,0,15f27d451e8e705fa26218ddfa2c270e5eeb49ba056f64a8eb948a9d6ebbfc1c,2024-05-17T02:39:43.597000
|
||||
CVE-2024-3119,0,0,c9ebed2773ddbf745c504aabd30f479f39fcc6099045c2c447aecf409439659a,2024-04-10T13:23:38.787000
|
||||
@ -250429,9 +250430,9 @@ CVE-2024-32984,0,0,c1781ab02b497f7ad9edbf8a8951c53661ebdb78ecb66c7cf14dd96168971
|
||||
CVE-2024-32985,0,0,551603a9d573917dc6e8180e1c86e20de47d20027e99828156dce46dac42a764,2024-05-14T16:12:23.490000
|
||||
CVE-2024-32986,0,0,e1deb5dce0a20a0acf4a8da9213d1a6d597cdffb3cc6f869414020bdcaf43631,2024-05-03T12:48:41.067000
|
||||
CVE-2024-32988,0,0,bc48c608e9b42d070b551acc6687d58b1535377e62e996f0e4be09d902452e5d,2024-05-22T12:46:53.887000
|
||||
CVE-2024-32989,0,0,506acdc6a7a5fbf0f74597c19aaae856579758431c921ae0bd29de5689f13f54,2024-05-14T16:12:23.490000
|
||||
CVE-2024-32989,0,1,87c157b1e3d25527b7d1928b44314ff5515bc68d28ca4b835a710f703915d021,2024-06-14T08:15:40.147000
|
||||
CVE-2024-3299,0,0,f60f2a80accdd6f345a6a9cd66637eda180121596f90c2e7d75707c9fce20eb6,2024-04-04T16:33:06.610000
|
||||
CVE-2024-32990,0,0,c28c0547bf1581c48cf9bb50b0cf7281764b07f259abad0cc919458ee7c1bf3e,2024-05-14T16:12:23.490000
|
||||
CVE-2024-32990,0,1,f517fd83eeb745717387dc59840882f5435aeb995e5118d634e1729423fc341a,2024-06-14T08:15:40.410000
|
||||
CVE-2024-32991,0,0,c30900c9c6007d9bd3f64bac9e942540cb2d3d2cd2e3fe2c3033e1ff0fa6a2e9,2024-05-14T16:12:23.490000
|
||||
CVE-2024-32992,0,0,b43328c2e6b8e0aa396ab88fa7084326904c6a88cce5a778fe9e2c03ce7fc50f,2024-05-14T16:12:23.490000
|
||||
CVE-2024-32993,0,0,d47ae0a7d792b622ff9b78d95f872069c2c525b6c7d9e748b8613faefcfe18f2,2024-05-14T16:12:23.490000
|
||||
@ -250948,7 +250949,7 @@ CVE-2024-34049,0,0,659b6c20c375fc6a98cdfe826f7b991bd781b69ca08f703cc4572e5c76f88
|
||||
CVE-2024-3405,0,0,168ec7f9b410ce208cd59ad1ea840c83def6fd83f8512f3bb62051f5ec3a0bc0,2024-05-15T16:40:19.330000
|
||||
CVE-2024-34050,0,0,12266ec53b888a39d080cf759ea4efcf86e297f4b6422a5e48e41cdfdabd201f,2024-04-30T13:11:16.690000
|
||||
CVE-2024-34051,0,0,ac84f2fd7dd43d4574139c8cf26e6f74ad2fa41e2254272b15b5513f0e198e55,2024-06-04T16:57:41.057000
|
||||
CVE-2024-34055,0,1,748778fa7056cb22d8c756b4b872bd19417a23dfc74d45fea46f818df71b0835,2024-06-14T06:15:11.650000
|
||||
CVE-2024-34055,0,0,748778fa7056cb22d8c756b4b872bd19417a23dfc74d45fea46f818df71b0835,2024-06-14T06:15:11.650000
|
||||
CVE-2024-34058,0,0,859a5867c3261cbc3116f378e08c5280a9474e2ad72a0c908fe3c9d61944df2b,2024-06-10T17:16:28.297000
|
||||
CVE-2024-3406,0,0,b05755db76fca4314b8e99a4179a31010371036c16427145226d1ec275309899,2024-05-15T16:40:19.330000
|
||||
CVE-2024-34060,0,0,3a924f7009b7e35c5ed89c1ddd4a1ea338a526dc659a3f0f832e02177cf8d5cd,2024-05-24T01:15:30.977000
|
||||
@ -252286,6 +252287,7 @@ CVE-2024-36265,0,0,00a9e362e8a489eb7027d68fd71b14b08824e37d9652a79a38b01c7bc61ba
|
||||
CVE-2024-36266,0,0,83df454a9d264cabc9c075046ae12e249cd453c24f6de612ee1d9f73df0ef774,2024-06-11T13:54:12.057000
|
||||
CVE-2024-36267,0,0,5b402628b4c430b8eab614a5b3330f6f2d186537f83ff9a60bb1a91e4b3c3cac,2024-05-30T13:15:41.297000
|
||||
CVE-2024-3628,0,0,ad2a38a3d431944b5239dd67ace3bcd2603e3057c8d0a04d847db45516b0c9ea,2024-05-07T13:39:32.710000
|
||||
CVE-2024-36287,1,1,d92323da669a2d07e04781562897424b811ea0fdb934c66465fa9ff2dd2acccb,2024-06-14T09:15:09.450000
|
||||
CVE-2024-3629,0,0,ed67d1a2dc82a6f7d8e47e5534a14b4493dd33c5e11e4c564b2ef763c111a4ba,2024-05-15T16:40:19.330000
|
||||
CVE-2024-3630,0,0,1b4d82e848787accdc20ad3d430430e1a1fa399ad678a3e5fbc87f1ba9867411,2024-05-15T16:40:19.330000
|
||||
CVE-2024-36302,0,0,e1f4931beacda377102258578e84cb72b47284751be4a5dc324f70f76b3c6500,2024-06-11T13:54:12.057000
|
||||
@ -252364,7 +252366,12 @@ CVE-2024-36472,0,0,9bfd7afc4b2e800059c7e7a1cc84b36bb079950920b1605d92cfb4dcf501f
|
||||
CVE-2024-36473,0,0,fdab9cfd1652fb2a67390d3a8e49efbc4911425ddf31224888be2ea2f102443c,2024-06-11T13:54:12.057000
|
||||
CVE-2024-3648,0,0,347cd63bf86e6b194279224a49f79f49cff1705e1f9b364650443227c716e8b1,2024-05-24T01:15:30.977000
|
||||
CVE-2024-3649,0,0,969867829e20da4acc88ade671a27808c021dddbe3e27e051d2004e683670e61,2024-05-02T18:00:37.360000
|
||||
CVE-2024-36499,1,1,ebf262fa149ccfe4c71c1e515426092516fc43c35d2cd3763e261e9ea3d4e384,2024-06-14T08:15:40.523000
|
||||
CVE-2024-3650,0,0,e078ac649d7d0d133fe9598e10336739bc9d365236ed72d408805e3868c3d439,2024-05-02T18:00:37.360000
|
||||
CVE-2024-36500,1,1,8c7a876ea9e5ea40d0848f4ca260a73783408bb9b02b946dcda4cbb7a9c588f7,2024-06-14T08:15:40.783000
|
||||
CVE-2024-36501,1,1,0ea4783c50477771b13cccbcde2481d7e81c490d8359529a55d560561ca46edc,2024-06-14T08:15:41.007000
|
||||
CVE-2024-36502,1,1,f31221a8addecfaa33b2b4eaf8279a5f28bfeb9176075985d7208179bef5f639,2024-06-14T08:15:41.240000
|
||||
CVE-2024-36503,1,1,959f6cc7fb5920822b2bd7c48ceb489ab01422592afbd92039308e89ffc64c99,2024-06-14T08:15:41.463000
|
||||
CVE-2024-3652,0,0,455dabb71414a7592172807b25da69c5818ecc78456d9f87c63904d4c0988a33,2024-05-01T17:15:37.793000
|
||||
CVE-2024-36523,0,0,779ff20f3e54c54b68fa38cf8a73a6874fca821f18024ef38fb974b398395dd0,2024-06-13T18:36:09.010000
|
||||
CVE-2024-36528,0,0,1afcf266a14ff33b672f0cab5c8ebdb326a94f75a49ab0339cbb24c3b53942e4,2024-06-10T18:06:22.600000
|
||||
@ -252622,6 +252629,7 @@ CVE-2024-37176,0,0,d1a35fccbf9345cac8b07991c8d6b2cc7ed3bc253ab49e3211031359d59ab
|
||||
CVE-2024-37177,0,0,0421ff7903314276b7c17b8917958f0d79116e678cb0fb3c4c323480013ea020,2024-06-11T13:54:12.057000
|
||||
CVE-2024-37178,0,0,09d4f25c1f8a3d05343115dea3f64d1198524e716da67f7a6714a382347c3c9a,2024-06-11T13:54:12.057000
|
||||
CVE-2024-3718,0,0,a740a1633905d284711162c33f52150d8f35c5a9e41e141a82d07851d64c55d1,2024-05-24T13:03:05.093000
|
||||
CVE-2024-37182,1,1,23465e2a3b7c742194a4e503dd941502be69262a5ed711ae5f2aa306fa3cdc57,2024-06-14T09:15:10.013000
|
||||
CVE-2024-3719,0,0,d2320674d04cefde56a0b36b463f74328d6f18494803030bdfe9b0b1b4374afd,2024-06-04T19:20:23.553000
|
||||
CVE-2024-3720,0,0,f4e69514093cc630aeda39d0a41fe705e0d9916a1077cef429b7dcf05a404308,2024-06-04T19:20:23.660000
|
||||
CVE-2024-3721,0,0,ec8dc4b0ad5d1d9ba11acb18015142f7d1715fd653f7ca2987e266e9c9e8ef01,2024-05-17T02:40:05.290000
|
||||
@ -252681,7 +252689,7 @@ CVE-2024-3749,0,0,e5012183af13abb8287d9f7e2369a778a614f06e1c5ed11cd73c4e040e4a12
|
||||
CVE-2024-3750,0,0,803f7e301e80982b4e00371ccc1f410724a29d03fdd424fb4c54aeb0b034ff94,2024-05-16T13:03:05.353000
|
||||
CVE-2024-3752,0,0,06a3522f543993aef42f352f0c011207c560c2e5a1d63c9d8ccc34a87adab0ce,2024-05-06T12:44:56.377000
|
||||
CVE-2024-37535,0,0,07f7d930de9d2427116ed26f9657c7962aa8122c29cd0ba965c2b1ee75b9b36e,2024-06-10T17:16:32.753000
|
||||
CVE-2024-3754,1,1,5faeb6509ed30be92f241bea3d91c29cdb6175d667e84326f2240d59e13cd592,2024-06-14T06:15:11.950000
|
||||
CVE-2024-3754,0,0,5faeb6509ed30be92f241bea3d91c29cdb6175d667e84326f2240d59e13cd592,2024-06-14T06:15:11.950000
|
||||
CVE-2024-3755,0,0,255cc63bdc34aca663119fb8f6757a7da5a9acef7ecda034d88dc05babf4b05b,2024-05-06T12:44:56.377000
|
||||
CVE-2024-3756,0,0,978b8204ea279199334a4c8c549150dc6420f24480b5effb717e8509749d66aa,2024-05-06T12:44:56.377000
|
||||
CVE-2024-37568,0,0,c31dda2ce4e2cf1c14da8896dd1ff7847e88710326c3ff8a35f20f8d9a2e2a98,2024-06-12T13:29:13.877000
|
||||
@ -252875,17 +252883,17 @@ CVE-2024-3955,0,0,bba90f25cff74c274e08a67a3936bf55505a38180fc074269167b54bd09035
|
||||
CVE-2024-3956,0,0,84c84e343f731479baad188521c68e2e10d428da5ee4bd61443cf640ccedc17a,2024-05-14T16:11:39.510000
|
||||
CVE-2024-3957,0,0,6e4e327328ad5c18e880466a103b162c10591051d90490bf0a67f6889d728425,2024-05-02T18:00:37.360000
|
||||
CVE-2024-3962,0,0,9de964d29f43823164300439a0e71453bbca4a5c1f5767eca51db600267798cd,2024-04-26T12:58:17.720000
|
||||
CVE-2024-3965,1,1,d3cc73c01ab764bf8b8a8a1089e415cce11f6be3e746514f9b3266f70cb7922b,2024-06-14T06:15:12.060000
|
||||
CVE-2024-3966,1,1,acdc21ce162ac9bf599365d9657ca1e26c0b9e574eccdcf8c4b567b9d8b6efcf,2024-06-14T06:15:12.170000
|
||||
CVE-2024-3965,0,0,d3cc73c01ab764bf8b8a8a1089e415cce11f6be3e746514f9b3266f70cb7922b,2024-06-14T06:15:12.060000
|
||||
CVE-2024-3966,0,0,acdc21ce162ac9bf599365d9657ca1e26c0b9e574eccdcf8c4b567b9d8b6efcf,2024-06-14T06:15:12.170000
|
||||
CVE-2024-3967,0,0,b2af76e65b0ac2fff588b8ab332f0978e5b083cdcdd41f3fd643403fe236fa29,2024-05-15T18:35:11.453000
|
||||
CVE-2024-3968,0,0,cdd73cfcec56ac4302e4eb4a932f862086b9a3ed46ed5ff92d17197e11553e8f,2024-05-15T18:35:11.453000
|
||||
CVE-2024-3969,0,0,793622b6641cb8c2dc34802adf1ab9ece645cce7d321b9faf1a6b76d5e28ec78,2024-05-28T17:11:55.903000
|
||||
CVE-2024-3970,0,0,a6d2ad116e736372d8ee0cd28cd0cbfef25f3ce953ea92bdb2b1ac922e65eedf,2024-05-15T18:35:11.453000
|
||||
CVE-2024-3971,1,1,137aa1e674b21ade99d6733c2104b04ff84ac40c79412060bbfc1a9928b2c0ad,2024-06-14T06:15:12.250000
|
||||
CVE-2024-3972,1,1,98031c6637d18ba8ee682a8ce3a7afef41b4c6087b87a09e33631b6451b470fe,2024-06-14T06:15:12.330000
|
||||
CVE-2024-3971,0,0,137aa1e674b21ade99d6733c2104b04ff84ac40c79412060bbfc1a9928b2c0ad,2024-06-14T06:15:12.250000
|
||||
CVE-2024-3972,0,0,98031c6637d18ba8ee682a8ce3a7afef41b4c6087b87a09e33631b6451b470fe,2024-06-14T06:15:12.330000
|
||||
CVE-2024-3974,0,0,30b94b89b01dd2c6057362330f67dc78937f3f3edffa0c5a57e7602f711f919a,2024-05-14T16:11:39.510000
|
||||
CVE-2024-3977,1,1,d72bf2865564ac51ed035648bdffeda91801e455c00b7fc6aa36d6f895c70e76,2024-06-14T06:15:12.427000
|
||||
CVE-2024-3978,1,1,7a090226b8ac6815aa754092194a22dc6edd4ea87964f6d9d3fbbdabbbb10d81,2024-06-14T06:15:12.520000
|
||||
CVE-2024-3977,0,0,d72bf2865564ac51ed035648bdffeda91801e455c00b7fc6aa36d6f895c70e76,2024-06-14T06:15:12.427000
|
||||
CVE-2024-3978,0,0,7a090226b8ac6815aa754092194a22dc6edd4ea87964f6d9d3fbbdabbbb10d81,2024-06-14T06:15:12.520000
|
||||
CVE-2024-3979,0,0,4ac2126fe63098861061c1ed3772b0712449f42e64a5481492de94fd61a5b947,2024-06-06T20:15:14.127000
|
||||
CVE-2024-3985,0,0,73586f1cedc99952324792e19f078c055584e6e606f6222ac3907090ad395ced,2024-05-02T18:00:37.360000
|
||||
CVE-2024-3987,0,0,05499205f937534ee026fd5a41dcafd44deae059117eea743b5e3e3c53eaee01,2024-06-07T14:56:05.647000
|
||||
@ -252893,14 +252901,14 @@ CVE-2024-3988,0,0,ed49ad0e503298ba2fe40c90a665a86dcb918b5087ac61c1edfd746c2ca95d
|
||||
CVE-2024-3989,0,0,41a6b1dcae0354fb8cba40366dc7ed1eeb84d6a6a33689c35123198fe63c8f01,2024-05-14T16:11:39.510000
|
||||
CVE-2024-3990,0,0,7879115af68e1891db08bd2dafc44fb55db15680f59885de2ed87fd5c16d9492,2024-05-14T16:11:39.510000
|
||||
CVE-2024-3991,0,0,f4b27e31b2ebe06401478accd9d85264142bf207d27ef139c240399354705c4f,2024-05-02T18:00:37.360000
|
||||
CVE-2024-3992,1,1,9f6f9ed6b9f2419611b40da6c6729d5a683e31642eae913cbd1604058245c143,2024-06-14T06:15:12.607000
|
||||
CVE-2024-3993,1,1,c7c2575cefdc9f7b915324e0a619f9bbd6e44eec78cadaafe315061601b735dc,2024-06-14T06:15:12.680000
|
||||
CVE-2024-3992,0,0,9f6f9ed6b9f2419611b40da6c6729d5a683e31642eae913cbd1604058245c143,2024-06-14T06:15:12.607000
|
||||
CVE-2024-3993,0,0,c7c2575cefdc9f7b915324e0a619f9bbd6e44eec78cadaafe315061601b735dc,2024-06-14T06:15:12.680000
|
||||
CVE-2024-3994,0,0,292539249e741e7003c555a5d4fa2182b15a01b393fb04fa15e675750c01906e,2024-04-25T13:18:02.660000
|
||||
CVE-2024-3997,0,0,507ae8762d75f9d68eda75aa3a6fbbaf1b3579404dfa0ecd9f2978d2aa87a55f,2024-05-24T01:15:30.977000
|
||||
CVE-2024-4000,0,0,63e68b686bb1abbdcd2ddeab613f2e83d1883c904c164f21a1076ada49583fc9,2024-05-02T18:00:37.360000
|
||||
CVE-2024-4001,0,0,01ff67c0d3df1be38408b913fb09a0fa8e839c64a815c3de41b48a61aa2ae8cb,2024-06-11T17:27:53.637000
|
||||
CVE-2024-4003,0,0,9b9be828f15a04db891b79e7c6ebf75d000360176e249e61f2acbb014741196d,2024-05-02T18:00:37.360000
|
||||
CVE-2024-4005,1,1,2f2292ddc9d91b15e0e334df7230c36516581b7812eb752ae8ed46619154cba1,2024-06-14T06:15:12.753000
|
||||
CVE-2024-4005,0,0,2f2292ddc9d91b15e0e334df7230c36516581b7812eb752ae8ed46619154cba1,2024-06-14T06:15:12.753000
|
||||
CVE-2024-4006,0,0,cea97555ee62217aaca46943155964ba917aa17a210befae3806ab46c6606005,2024-04-25T17:25:05.903000
|
||||
CVE-2024-4008,0,0,ab88da5f03295a5c82b2b02d767da89d9d5f6b64be017927f79b2a477f07ce81,2024-06-06T14:17:35.017000
|
||||
CVE-2024-4009,0,0,1efc6fffaaf5a87d264faa44168af33f94d0754350a147286e05077495885670,2024-06-06T14:17:35.017000
|
||||
@ -253094,8 +253102,8 @@ CVE-2024-4264,0,0,fb86e94ce42096b29068bc1af12f8df8e421d67d4a541250a03ae9bd98f162
|
||||
CVE-2024-4265,0,0,91d38fbd7b9c4ea0cd26c0f2028b5e1f8ee8c7d7e1c2c632d6b17cd2b7b69603,2024-05-02T18:00:37.360000
|
||||
CVE-2024-4266,0,0,116b52a29fd0a6039b308734c72b0d2ae8aa871f2547c292da7232e2003a6f6b,2024-06-11T13:54:12.057000
|
||||
CVE-2024-4267,0,0,ce2653255d43ae5f4599b240b7efe5c0da7fc5b70a5363cdc03dcce3fe58b4ed,2024-05-24T01:15:30.977000
|
||||
CVE-2024-4270,1,1,37cc37c1193f3880eaeb558cbb01c0dd570faa0689ff6012af6124e657242867,2024-06-14T06:15:12.827000
|
||||
CVE-2024-4271,1,1,58cd7d287d8fb8afde6f1b9fa45bc15975e70876b5571e9b3ac04d71b9bf945d,2024-06-14T06:15:12.907000
|
||||
CVE-2024-4270,0,0,37cc37c1193f3880eaeb558cbb01c0dd570faa0689ff6012af6124e657242867,2024-06-14T06:15:12.827000
|
||||
CVE-2024-4271,0,0,58cd7d287d8fb8afde6f1b9fa45bc15975e70876b5571e9b3ac04d71b9bf945d,2024-06-14T06:15:12.907000
|
||||
CVE-2024-4273,0,0,136233599d68a0536ba99c3313767218f535edf424c12fad350903aa42bf81fa,2024-06-04T16:57:41.053000
|
||||
CVE-2024-4274,0,0,f007ffa253f631296ec9b2caed7d1faf5b31c76fe42ca7e92fd5b40ffb00a28e,2024-06-04T16:57:41.053000
|
||||
CVE-2024-4275,0,0,70e1a00c60419d92634d3a56b566530d560ae59bb86d2c5a8041fd963d9db39d,2024-05-14T16:11:39.510000
|
||||
@ -253199,7 +253207,7 @@ CVE-2024-4398,0,0,4b7d20498f56e38cff1d1c0b655156a2b3f15862c52a314f7c4c607a40427b
|
||||
CVE-2024-4399,0,0,3d19e4ab740018443fd6f7e134fb90cb1dbd4ba6681853dbea09ee003df9e238,2024-05-24T01:15:30.977000
|
||||
CVE-2024-4400,0,0,620572dcee5d436c42b3994ee0aa67743b2a3990e6a672a60de9f72d6796092e,2024-05-16T13:03:05.353000
|
||||
CVE-2024-4403,0,0,3581c625bf880c956b4215171ed64bae0b186e6c05d44521b4c86bf430fcf85e,2024-06-10T18:06:22.600000
|
||||
CVE-2024-4404,1,1,d285ed2c4c0d400743afd71328b120554c420ec459916094a4a847b34772eba9,2024-06-14T06:15:12.987000
|
||||
CVE-2024-4404,0,0,d285ed2c4c0d400743afd71328b120554c420ec459916094a4a847b34772eba9,2024-06-14T06:15:12.987000
|
||||
CVE-2024-4405,0,0,c1f36263ba5841514dcf823ce87455ea826983b04201750caf275a7578687d86,2024-05-02T18:00:37.360000
|
||||
CVE-2024-4406,0,0,24efbd07edfc7f89a7b1e694cb4faff02b108244486a9e17a0ab6aa554d1cf0e,2024-05-02T18:00:37.360000
|
||||
CVE-2024-4409,0,0,7dd623ac9467a0484d209647a6b8fb064b225334d3e5c23c1ee095e63ba20831,2024-05-24T13:03:11.993000
|
||||
@ -253253,7 +253261,7 @@ CVE-2024-4470,0,0,a1486a2c35813e6b458e62c6cab3ba58a94b094bc9cbcdae130972a477a7e8
|
||||
CVE-2024-4471,0,0,9792233119a62c3ea240ba8e0af602c011f72a48705fdc1ef6f6e423f04dac09,2024-05-24T01:15:30.977000
|
||||
CVE-2024-4473,0,0,be8deb42c9d1905b301c3bfbae608b1551ce9395ac2fbbb337038c3a7eb347fa,2024-05-14T19:17:55.627000
|
||||
CVE-2024-4478,0,0,31a4a4c48861c0c170c939e3aa0b10661ec97e9653465707919926dbd3595183,2024-05-16T13:03:05.353000
|
||||
CVE-2024-4480,1,1,7ba9472d0ba78ec30048cdbee9f7035ee304e104c01056d42a23ef04c9c59a93,2024-06-14T06:15:13.220000
|
||||
CVE-2024-4480,0,0,7ba9472d0ba78ec30048cdbee9f7035ee304e104c01056d42a23ef04c9c59a93,2024-06-14T06:15:13.220000
|
||||
CVE-2024-4481,0,0,7ecf88f2a22a659849266bdc0bd40c464d195e3dafdf490c58869a301c87572b,2024-05-14T16:11:39.510000
|
||||
CVE-2024-4484,0,0,72c4859b8727b60eeb9f8012483883c0571b4cb8b1cb2ce9a8b1f5e495641e3c,2024-05-24T13:03:05.093000
|
||||
CVE-2024-4485,0,0,856a7368e5f121163f839e4b6c92a8e77de213c5eccf98592455e970e028d37d,2024-05-24T13:03:05.093000
|
||||
@ -253466,7 +253474,7 @@ CVE-2024-4746,0,0,f4f2ac85907c7b5b329cbda786b397a3fc954bb6f671df10eda8148346b3a1
|
||||
CVE-2024-4747,0,0,99152f6494a1192f3bae59b436abcc51d11f811ed1e0a72c2e65c8381fda6054,2024-05-14T16:11:39.510000
|
||||
CVE-2024-4749,0,0,676e331864bc41907c4c80c44886e7dac480ef6dea2c29bc22838d992753d4da,2024-06-04T16:57:41.053000
|
||||
CVE-2024-4750,0,0,423585a3e250903ac62d761ecb0e0e6dc6b4649ccd4411b90275a4e6d2f87495,2024-06-04T16:57:41.053000
|
||||
CVE-2024-4751,1,1,c2897383d6378078de4b0f176845caa6860afdf70554ca836e449365df477d65,2024-06-14T06:15:13.297000
|
||||
CVE-2024-4751,0,0,c2897383d6378078de4b0f176845caa6860afdf70554ca836e449365df477d65,2024-06-14T06:15:13.297000
|
||||
CVE-2024-4756,0,0,b303493fc627eee25a3b39c986ea25472e7aab1866612b83c9a7c14522d2c360,2024-06-07T14:56:05.647000
|
||||
CVE-2024-4760,0,0,8b9593f0d88cbd24a061db082c8cd5c20f19b8a61431542d1ce576639ef3bdc0,2024-05-16T15:44:44.683000
|
||||
CVE-2024-4761,0,0,1a5c101148c08794fbcc9293bdcf48ea45ef131413b853bd53bee7bfdc7d1522,2024-06-10T18:15:36.997000
|
||||
@ -253544,6 +253552,7 @@ CVE-2024-4857,0,0,23edc16ac7d8115e8f5dde6cd82a4022bcfda577b01ff7d148fca6e240fbd4
|
||||
CVE-2024-4858,0,0,7e6f62031377207832745d7baec775cb8f5592ecc9e1490c12da872c1b62dd11,2024-05-28T12:39:42.673000
|
||||
CVE-2024-4859,0,0,3de5434b35db9344c6a8c9ff1c0891dd93d801d8510e1a23be87da56d66078a2,2024-05-14T19:17:55.627000
|
||||
CVE-2024-4860,0,0,078ece1acb5f59d15050f08de42942705925d025d9ef9dfb969c99e0b62152d4,2024-05-14T19:17:55.627000
|
||||
CVE-2024-4863,1,1,47adbc3719234f8d683d2303089ae82681accdb995ea43b1edcb178646950414,2024-06-14T09:15:10.613000
|
||||
CVE-2024-4865,0,0,034a7c12f3d6f4bd5ac54ee1f34abd70a559c5b9a18ae852351f79db6d61b9c9,2024-05-20T13:00:34.807000
|
||||
CVE-2024-4870,0,0,789ccad79b53f3162faaa4d0c14e00ab550e7e413c46a4332529e5d35d1d0423,2024-06-04T16:57:41.053000
|
||||
CVE-2024-4871,0,0,089a89f3309c27433f20e3be4ef9a00379f9f19601c1c8029649846113aed43a,2024-05-14T19:17:55.627000
|
||||
@ -253733,7 +253742,7 @@ CVE-2024-5150,0,0,b6666c6d6ac9830dd3015f5fc02fd79f0a3b63d41ee2e14f8cd76da933186c
|
||||
CVE-2024-5152,0,0,897a950e1a56cf66b3762a0b7d02348f108b131c1556072d1a2c46cab20012e4,2024-06-06T14:17:35.017000
|
||||
CVE-2024-5153,0,0,828bf0d922f71aaeb9a620d2a28fca02e54e4a39590cf3792a194a4a5970d881,2024-06-06T14:17:35.017000
|
||||
CVE-2024-5154,0,0,1ba58da557e7753fe147db1d89f118e44764c86c1e3799ad99b07e3033b5f30f,2024-06-13T18:36:09.010000
|
||||
CVE-2024-5155,1,1,ba5a62125168808d608462e382a769fb49330a759db720b9808830628a850442,2024-06-14T06:15:13.373000
|
||||
CVE-2024-5155,0,0,ba5a62125168808d608462e382a769fb49330a759db720b9808830628a850442,2024-06-14T06:15:13.373000
|
||||
CVE-2024-5157,0,0,968c06835e3febdba747d4dd49e60507daf1a01e5377b117ee6e566931506abf,2024-06-10T18:15:37.893000
|
||||
CVE-2024-5158,0,0,76369e6e46f6c34bbc5a354a762f99c1a790d22381b6a166821eb73e4f6cf9b3,2024-06-10T18:15:37.953000
|
||||
CVE-2024-5159,0,0,21e48f9c116346beacd1ff1b36dcd3eeb5d22159bc679bcf4bc325526369218a,2024-06-10T18:15:38.010000
|
||||
@ -253936,6 +253945,8 @@ CVE-2024-5453,0,0,f53a0f7c14e91f56fc73f4b75f7a3c7cc751f83b7f0078edb3a1d42587e454
|
||||
CVE-2024-5458,0,0,280c02138e919e94dbbf1601703ec46acfb6deb4d1cb320c03863f40e695d8a3,2024-06-13T04:15:17.220000
|
||||
CVE-2024-5459,0,0,81bd5d1a4ebf239ba65f5777fb4bfb17f71fa270ff31c5f59fd635927a6c453f,2024-06-13T19:35:55.083000
|
||||
CVE-2024-5463,0,0,a83ead02d534db419d64d9a246adc999062f3a690f2d2cbba14bffeb9debf0f5,2024-06-04T16:57:41.053000
|
||||
CVE-2024-5464,1,1,8058c4737be1e926d32509cb2e10b7a4562f56d527275616126536a3a8ae00b3,2024-06-14T08:15:41.710000
|
||||
CVE-2024-5465,1,1,73f4626242a1d0966ebfc2cf1625d18e8d4f0535b49484a9cd09227629f4936d,2024-06-14T08:15:41.930000
|
||||
CVE-2024-5468,0,0,2bc9c38a1a2994a4c4ceddf0376e8b3ff5412f95fe840378ab4577710a81e066,2024-06-13T18:36:09.010000
|
||||
CVE-2024-5469,0,0,fb182133b6a592c90497a67ce9f1bf7105e8da3781285628adb3e682051474e6,2024-06-14T04:15:43.120000
|
||||
CVE-2024-5478,0,0,cbce39d40f4102e26dfaf35e6a6b20bf349245ad3d94d864b4543f6f43a9d245,2024-06-07T14:56:05.647000
|
||||
@ -253979,7 +253990,7 @@ CVE-2024-5538,0,0,183cea799fa9410e329e72f326a10b8369aedcea9a5b7583a44bf33ecc3050
|
||||
CVE-2024-5542,0,0,77ae3f3a7c4ffc662d4e5625f82b1efcc56a12c39abbd3546ebc6e9e7e619033,2024-06-11T18:25:51.200000
|
||||
CVE-2024-5543,0,0,8e93e3d42337fd51f8d8d19b50b3f68377ba39e905a95b2594b9c3824c59b9ee,2024-06-13T18:36:09.013000
|
||||
CVE-2024-5550,0,0,e4fc13aea5b719d7c555043aa9a8be47a59e2f4d5eac2e9fa0d5ff8a8edb892f,2024-06-07T14:56:05.647000
|
||||
CVE-2024-5551,1,1,7fd2c74ca03d76faa8444afc79e362b5f954f3fe72c0353b145fced7fb4c3dd7,2024-06-14T06:15:13.443000
|
||||
CVE-2024-5551,0,0,7fd2c74ca03d76faa8444afc79e362b5f954f3fe72c0353b145fced7fb4c3dd7,2024-06-14T06:15:13.443000
|
||||
CVE-2024-5552,0,0,12abaaddd513e722275738643d6cd32f6bb9e257da98294dd5bedf4ad4cbf55d,2024-06-07T14:56:05.647000
|
||||
CVE-2024-5553,0,0,c64ee567a06c549ac68fcb5d897f8979386bb1ca79793b5b6b7b17be3abbece0,2024-06-13T18:36:09.013000
|
||||
CVE-2024-5557,0,0,d46453be6b66f76046381e0db014eed7a6e7aed2ef0e3daec4893bcd8fb5d27d,2024-06-13T18:36:09.010000
|
||||
@ -253989,6 +254000,7 @@ CVE-2024-5560,0,0,f1a6e79f857dcb0da00298e85540b2901c155f3f4e8e842ef291f9f993b61e
|
||||
CVE-2024-5564,0,0,cd961630c6982ea90916e9cc290067a2c4a02a79292d87af6b0ec76760478ca9,2024-06-03T14:46:24.250000
|
||||
CVE-2024-5565,0,0,830316f5c713618fdad4a0eda5b7296c22d5d93c87a8813197db3ff9cf28c4ee,2024-05-31T19:14:47.793000
|
||||
CVE-2024-5571,0,0,105c4e644019eeccf72c6e63813cdc36601b1b9a7e3cba5bc172df86631261e6,2024-06-11T17:29:03.277000
|
||||
CVE-2024-5577,1,1,58d8d7b8d912382b89611f62f9a6dc49044796f134783d6f97a0a142f7209241,2024-06-14T08:15:42.157000
|
||||
CVE-2024-5584,0,0,612eacfcf6c3fd3d6fdd0ff2c66e496cc817b02568ea9f69c40277bbc0300578,2024-06-11T13:54:12.057000
|
||||
CVE-2024-5585,0,0,7ca8acd7f48a83dc2f9c7f2dbf799bd4542c4abbbf9453c8a4fa401160a3a849,2024-06-13T04:15:17.407000
|
||||
CVE-2024-5587,0,0,9180b0762a5a5a7a17ce70cd861bdf25e955d88caf903bee442f7c48a0a2a218,2024-06-03T14:46:24.250000
|
||||
@ -254071,24 +254083,24 @@ CVE-2024-5812,0,0,b231b6b4b2edc3b100956cc90803ec880aa99de51e5a0f50bc4b9e381c5722
|
||||
CVE-2024-5813,0,0,d695683c807a1777a11ef158e495934f31ab7056ebdb25d58f5f11112f2d1965,2024-06-13T18:36:45.417000
|
||||
CVE-2024-5825,0,0,800930249192b4fb36871d2a50a6622621c6dfa5eae6376e2c2995741b4630b2,2024-06-11T10:15:13.960000
|
||||
CVE-2024-5829,0,0,ece2333b3f7675cb0340d51c6d538163a9e25ac5d3d71e718ed0157d499370ee,2024-06-11T14:15:13.150000
|
||||
CVE-2024-5830,0,1,25b30fd6a57f8dadfda81ce3fb510d579f1e215006a2c351624b51e1f8f5cb63,2024-06-14T06:15:13.690000
|
||||
CVE-2024-5831,0,1,bab2c3dec91029a2d8f120c0ea657c710c868b8acc11906580db2573b29ce25a,2024-06-14T06:15:14
|
||||
CVE-2024-5832,0,1,0a4578bcc0208791e029236e4a087666b73ecc267c8469678218068ccaf06f86,2024-06-14T06:15:14.293000
|
||||
CVE-2024-5833,0,1,35ed52785f12cb93d4a2f93f598a29d22779685fb371c11cb9ebd648b1b3f2e1,2024-06-14T06:15:14.547000
|
||||
CVE-2024-5834,0,1,2a6e308224634c23f806d9b1045e368f2b7b1ef5ecb688147237d305e2607289,2024-06-14T06:15:14.953000
|
||||
CVE-2024-5835,0,1,0f73e9e934e8bbe8893daf9e3f67daf1afd0978e3d150ceeec57a2e80aa8382c,2024-06-14T06:15:15.090000
|
||||
CVE-2024-5836,0,1,3a5558248327549226b6cc6135824e0344e9cec92ee964b1f734cfa18f5aeab5,2024-06-14T06:15:15.463000
|
||||
CVE-2024-5837,0,1,2e89ce3964ce151afe063dca1e64c5ae6e4d4381ef9c873cb8b30e7dc3f2830d,2024-06-14T06:15:15.683000
|
||||
CVE-2024-5838,0,1,ed59e1a65bb4129da9b71e3f50927c18e71724dbe6fa5f13c07ad14372b0fac0,2024-06-14T06:15:15.887000
|
||||
CVE-2024-5839,0,1,8f034c510a7fd0e0745bd30b404393daf7037ac09470f44def1786be54068041,2024-06-14T06:15:16.180000
|
||||
CVE-2024-5840,0,1,c526d5256b038fff7afa444b028c33817d0c13b5b161b9652cb13c250696c2a7,2024-06-14T06:15:16.280000
|
||||
CVE-2024-5841,0,1,a7a170eb2414a99bd9910abfc7f708acbc3c4b92192ba0f04dadd7b46dac3399,2024-06-14T06:15:16.640000
|
||||
CVE-2024-5842,0,1,4eb87bac0c50e1f717e5710274414381670e8c18a9c6f1b04f400ac18981dd9a,2024-06-14T06:15:16.913000
|
||||
CVE-2024-5843,0,1,2be4b00ab957673a25b135ebb64fcc6e3b51903ce8774e77938fc9dc297acd9c,2024-06-14T06:15:17.170000
|
||||
CVE-2024-5844,0,1,bdfdfc1f02e824433f5edcf6ca843d62bd4b218e96cc2df29214d0c6275327db,2024-06-14T06:15:17.517000
|
||||
CVE-2024-5845,0,1,109c5cd760bc6bcfea448de275120469251e47b6c5f10dfa49429d52e7e14565,2024-06-14T06:15:17.790000
|
||||
CVE-2024-5846,0,1,74cdfbc72d0ccccfb4960f8d9f050011c9367ff3a9087fe2085d5d3a9a567ba2,2024-06-14T06:15:18.070000
|
||||
CVE-2024-5847,0,1,fb0db0442787e77827fbf12115b06f51612cc2a1c9a9d0bc9a8c9faefc3d9705,2024-06-14T06:15:18.340000
|
||||
CVE-2024-5830,0,0,25b30fd6a57f8dadfda81ce3fb510d579f1e215006a2c351624b51e1f8f5cb63,2024-06-14T06:15:13.690000
|
||||
CVE-2024-5831,0,0,bab2c3dec91029a2d8f120c0ea657c710c868b8acc11906580db2573b29ce25a,2024-06-14T06:15:14
|
||||
CVE-2024-5832,0,0,0a4578bcc0208791e029236e4a087666b73ecc267c8469678218068ccaf06f86,2024-06-14T06:15:14.293000
|
||||
CVE-2024-5833,0,0,35ed52785f12cb93d4a2f93f598a29d22779685fb371c11cb9ebd648b1b3f2e1,2024-06-14T06:15:14.547000
|
||||
CVE-2024-5834,0,0,2a6e308224634c23f806d9b1045e368f2b7b1ef5ecb688147237d305e2607289,2024-06-14T06:15:14.953000
|
||||
CVE-2024-5835,0,0,0f73e9e934e8bbe8893daf9e3f67daf1afd0978e3d150ceeec57a2e80aa8382c,2024-06-14T06:15:15.090000
|
||||
CVE-2024-5836,0,0,3a5558248327549226b6cc6135824e0344e9cec92ee964b1f734cfa18f5aeab5,2024-06-14T06:15:15.463000
|
||||
CVE-2024-5837,0,0,2e89ce3964ce151afe063dca1e64c5ae6e4d4381ef9c873cb8b30e7dc3f2830d,2024-06-14T06:15:15.683000
|
||||
CVE-2024-5838,0,0,ed59e1a65bb4129da9b71e3f50927c18e71724dbe6fa5f13c07ad14372b0fac0,2024-06-14T06:15:15.887000
|
||||
CVE-2024-5839,0,0,8f034c510a7fd0e0745bd30b404393daf7037ac09470f44def1786be54068041,2024-06-14T06:15:16.180000
|
||||
CVE-2024-5840,0,0,c526d5256b038fff7afa444b028c33817d0c13b5b161b9652cb13c250696c2a7,2024-06-14T06:15:16.280000
|
||||
CVE-2024-5841,0,0,a7a170eb2414a99bd9910abfc7f708acbc3c4b92192ba0f04dadd7b46dac3399,2024-06-14T06:15:16.640000
|
||||
CVE-2024-5842,0,0,4eb87bac0c50e1f717e5710274414381670e8c18a9c6f1b04f400ac18981dd9a,2024-06-14T06:15:16.913000
|
||||
CVE-2024-5843,0,0,2be4b00ab957673a25b135ebb64fcc6e3b51903ce8774e77938fc9dc297acd9c,2024-06-14T06:15:17.170000
|
||||
CVE-2024-5844,0,0,bdfdfc1f02e824433f5edcf6ca843d62bd4b218e96cc2df29214d0c6275327db,2024-06-14T06:15:17.517000
|
||||
CVE-2024-5845,0,0,109c5cd760bc6bcfea448de275120469251e47b6c5f10dfa49429d52e7e14565,2024-06-14T06:15:17.790000
|
||||
CVE-2024-5846,0,0,74cdfbc72d0ccccfb4960f8d9f050011c9367ff3a9087fe2085d5d3a9a567ba2,2024-06-14T06:15:18.070000
|
||||
CVE-2024-5847,0,0,fb0db0442787e77827fbf12115b06f51612cc2a1c9a9d0bc9a8c9faefc3d9705,2024-06-14T06:15:18.340000
|
||||
CVE-2024-5851,0,0,1ff86bf427427298fe5dc39bbfedb897b9870fd2315cf065507e70165fb41d41,2024-06-13T18:36:09.013000
|
||||
CVE-2024-5873,0,0,4affe4b1f71505ca05298a33c7e23c3ae147869580237755bed2d180fbea1b8e,2024-06-12T08:15:51.550000
|
||||
CVE-2024-5891,0,0,da4ba5748ecb097f5befd86d4787f2c76143132bf594110b21f16b774e08e15d,2024-06-13T18:36:09.010000
|
||||
@ -254112,9 +254124,12 @@ CVE-2024-5949,0,0,b3986a8edb1512233064a5da51557c0fa4f711ec9b142a106f76745321d3ce
|
||||
CVE-2024-5950,0,0,1f86aa27bca5269525cdd401ce251fe2cb91fad6e36bea2e480bcbcdf6032a6e,2024-06-13T20:15:16.923000
|
||||
CVE-2024-5951,0,0,fff68899d3009d75df7027ceba73ebc8730458ee33bb67011fd27dc83f85a1f2,2024-06-13T20:15:17.140000
|
||||
CVE-2024-5952,0,0,417f3877151c0966e5133a5fd225fe602bd3ee4917b6bc769756fb14d3a30c86,2024-06-13T20:15:17.350000
|
||||
CVE-2024-5961,1,1,b440137329b976f0b8c78f9e98dd35a3c37762ea79a4b3f62bdc8ead42b28d8b,2024-06-14T08:15:42.377000
|
||||
CVE-2024-5976,0,0,8ad4fe84c9006c6743ccdbedb7ac649699be956a4b5f416470a5b939bc8dbac3,2024-06-14T03:15:15.327000
|
||||
CVE-2024-5981,0,0,c021f0e87e8a9bc67184ae54917b7538b0a7383b265f005413cc498575c90f46,2024-06-14T02:15:09.897000
|
||||
CVE-2024-5983,0,0,d45671faa415b160e1a63cc5e7f78ea7860e778a55f924cf86d97430e4149871,2024-06-14T02:15:10.173000
|
||||
CVE-2024-5984,0,0,03fca76e26072017e4ea4f49f9638244fcc95d14d8a7905b4ba1013839a62ab1,2024-06-14T02:15:10.443000
|
||||
CVE-2024-5983,0,1,6b0960283f56bbd0c8fee7719d1537cd30e374b70cf4ff8a30b52cbdba8f3f5c,2024-06-14T08:15:42.550000
|
||||
CVE-2024-5984,0,1,0f63f0c126f74e56b7604626b4132713a42849cc9023a033be10da98fdb3d993,2024-06-14T08:15:42.843000
|
||||
CVE-2024-5985,0,0,49a38267a9ce797f1b9e3a5a1b0820a2bd8e915256f564f2f744e9be24bef4de,2024-06-14T02:15:10.713000
|
||||
CVE-2024-5994,1,1,4b417b2409adf1cfb062272ddf9dab639d715406e66503c860b838a6da714a73,2024-06-14T07:15:51.130000
|
||||
CVE-2024-5994,0,1,b678ba7844dbb9440c0118c55fb917843e6316e30468d41dd4d372cdc7eeb766,2024-06-14T07:15:51.130000
|
||||
CVE-2024-5995,1,1,ede0470f9d86fed4f618bc468676b26641d05d4bd4a249ad161aea8b2cec90ce,2024-06-14T08:15:43.097000
|
||||
CVE-2024-5996,1,1,39e608463feedd3b2c4692002beac62fb7b065fa02bb74368f2c8f4d20db9740,2024-06-14T09:15:11.010000
|
||||
|
Can't render this file because it is too large.
|
Loading…
x
Reference in New Issue
Block a user