mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-06-19 17:31:42 +00:00
Auto-Update: 2024-07-02T22:01:30.378301+00:00
This commit is contained in:
parent
ad480e6c8b
commit
c60b9af2a0
@ -2,8 +2,16 @@
|
||||
"id": "CVE-2021-42860",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2022-05-26T12:15:07.693",
|
||||
"lastModified": "2024-05-17T02:01:40.627",
|
||||
"lastModified": "2024-07-02T21:15:10.270",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [
|
||||
{
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"tags": [
|
||||
"disputed"
|
||||
]
|
||||
}
|
||||
],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,51 +2,15 @@
|
||||
"id": "CVE-2021-47285",
|
||||
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"published": "2024-05-21T15:15:16.653",
|
||||
"lastModified": "2024-05-21T16:54:26.047",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-07-02T20:15:04.637",
|
||||
"vulnStatus": "Rejected",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet/nfc/rawsock.c: fix a permission check bug\n\nThe function rawsock_create() calls a privileged function sk_alloc(), which requires a ns-aware check to check net->user_ns, i.e., ns_capable(). However, the original code checks the init_user_ns using capable(). So we replace the capable() with ns_capable()."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": " En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: net/nfc/rawsock.c: corrige un error de verificaci\u00f3n de permisos. La funci\u00f3n rawsock_create() llama a una funci\u00f3n privilegiada sk_alloc(), que requiere una verificaci\u00f3n ns-aware para verificar net-> user_ns, es decir, ns_capable(). Sin embargo, el c\u00f3digo original verifica init_user_ns usando able(). Entonces reemplazamos el capaz() con ns_capable()."
|
||||
"value": "Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/1e5cab50208c8fb7351b798cb1d569debfeb994a",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/38cb2e23188af29c43966acee9dbb18b62e26cfe",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/8ab78863e9eff11910e1ac8bcf478060c29b379e",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/90d0a3c76965d7a10fc87c07be3e9714e2130d5c",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/c08e0be44759d0b5affc5888be4aa5e536873335",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/d6a21a3fb03300fbaa9fc3ed99f8b0962ce28362",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/ec72482564ff99c6832d33610d9f8ab7ecc81b6d",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/f3ed12af6bbbaf79eddb0ae14656b8ecacea74f0",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
}
|
||||
]
|
||||
"references": []
|
||||
}
|
@ -2,8 +2,16 @@
|
||||
"id": "CVE-2022-29072",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2022-04-15T20:15:12.313",
|
||||
"lastModified": "2024-05-17T02:08:03.793",
|
||||
"lastModified": "2024-07-02T20:15:05.033",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [
|
||||
{
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"tags": [
|
||||
"disputed"
|
||||
]
|
||||
}
|
||||
],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,16 @@
|
||||
"id": "CVE-2022-29622",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2022-05-16T14:15:08.027",
|
||||
"lastModified": "2024-05-17T02:08:19.550",
|
||||
"lastModified": "2024-07-02T21:15:10.390",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [
|
||||
{
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"tags": [
|
||||
"disputed"
|
||||
]
|
||||
}
|
||||
],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
29
CVE-2022/CVE-2022-306xx/CVE-2022-30636.json
Normal file
29
CVE-2022/CVE-2022-306xx/CVE-2022-30636.json
Normal file
@ -0,0 +1,29 @@
|
||||
{
|
||||
"id": "CVE-2022-30636",
|
||||
"sourceIdentifier": "security@golang.org",
|
||||
"published": "2024-07-02T20:15:05.173",
|
||||
"lastModified": "2024-07-02T20:15:05.173",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "httpTokenCacheKey uses path.Base to extract the expected HTTP-01 token value to lookup in the DirCache implementation. On Windows, path.Base acts differently to filepath.Base, since Windows uses a different path separator (\\ vs. /), allowing a user to provide a relative path, i.e. .well-known/acme-challenge/..\\..\\asd becomes ..\\..\\asd. The extracted path is then suffixed with +http-01, joined with the cache directory, and opened. Since the controlled path is suffixed with +http-01 before opening, the impact of this is significantly limited, since it only allows reading arbitrary files on the system if and only if they have this suffix."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://go.dev/cl/408694",
|
||||
"source": "security@golang.org"
|
||||
},
|
||||
{
|
||||
"url": "https://go.dev/issue/53082",
|
||||
"source": "security@golang.org"
|
||||
},
|
||||
{
|
||||
"url": "https://pkg.go.dev/vuln/GO-2024-2961",
|
||||
"source": "security@golang.org"
|
||||
}
|
||||
]
|
||||
}
|
37
CVE-2023/CVE-2023-245xx/CVE-2023-24531.json
Normal file
37
CVE-2023/CVE-2023-245xx/CVE-2023-24531.json
Normal file
@ -0,0 +1,37 @@
|
||||
{
|
||||
"id": "CVE-2023-24531",
|
||||
"sourceIdentifier": "security@golang.org",
|
||||
"published": "2024-07-02T20:15:05.270",
|
||||
"lastModified": "2024-07-02T20:15:05.270",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Command go env is documented as outputting a shell script containing the Go environment. However, go env doesn't sanitize values, so executing its output as a shell script can cause various bad bahaviors, including executing arbitrary commands or inserting new environment variables. This issue is relatively minor because, in general, if an attacker can set arbitrary environment variables on a system, they have better attack vectors than making \"go env\" print them out."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://go.dev/cl/488375",
|
||||
"source": "security@golang.org"
|
||||
},
|
||||
{
|
||||
"url": "https://go.dev/cl/493535",
|
||||
"source": "security@golang.org"
|
||||
},
|
||||
{
|
||||
"url": "https://go.dev/issue/58508",
|
||||
"source": "security@golang.org"
|
||||
},
|
||||
{
|
||||
"url": "https://groups.google.com/g/golang-dev/c/ixHOFpSbajE/m/8EjlbKVWAwAJ",
|
||||
"source": "security@golang.org"
|
||||
},
|
||||
{
|
||||
"url": "https://pkg.go.dev/vuln/GO-2024-2962",
|
||||
"source": "security@golang.org"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,27 +2,15 @@
|
||||
"id": "CVE-2024-38391",
|
||||
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"published": "2024-06-21T11:15:11.030",
|
||||
"lastModified": "2024-06-21T11:22:01.687",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-07-02T20:15:05.730",
|
||||
"vulnStatus": "Rejected",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\ncxl/region: Fix cxlr_pmem leaks\n\nBefore this error path, cxlr_pmem pointed to a kzalloc() memory, free\nit to avoid this memory leaking."
|
||||
"value": "Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/1c987cf22d6b65ade46145c03eef13f0e3e81d83",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/24b9362c9fa57f9291b380a3cc77b8b5c9fa27da",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/eef8d414b07a1e85c1367324fb6c6a46b79269bd",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
}
|
||||
]
|
||||
"references": []
|
||||
}
|
72
CVE-2024/CVE-2024-385xx/CVE-2024-38537.json
Normal file
72
CVE-2024/CVE-2024-385xx/CVE-2024-38537.json
Normal file
@ -0,0 +1,72 @@
|
||||
{
|
||||
"id": "CVE-2024-38537",
|
||||
"sourceIdentifier": "security-advisories@github.com",
|
||||
"published": "2024-07-02T20:15:05.860",
|
||||
"lastModified": "2024-07-02T20:15:05.860",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Fides is an open-source privacy engineering platform. `fides.js`, a client-side script used to interact with the consent management features of Fides, used the `polyfill.io` domain in a very limited edge case, when it detected a legacy browser such as IE11 that did not support the fetch standard. Therefore it was possible for users of legacy, pre-2017 browsers who navigate to a page serving `fides.js` to download and execute malicious scripts from the `polyfill.io` domain when the domain was compromised and serving malware. No exploitation of `fides.js` via `polyfill.io` has been identified as of time of publication.\n\nThe vulnerability has been patched in Fides version `2.39.1`. Users are advised to upgrade to this version or later to secure their systems against this threat. On Thursday, June 27, 2024, Cloudflare and Namecheap intervened at a domain level to ensure `polyfill.io` and its subdomains could not resolve to the compromised service, rendering this vulnerability unexploitable. Prior to the domain level intervention, there were no server-side workarounds and the confidentiality, integrity, and availability impacts of this vulnerability were high. Clients could ensure they were not affected by using a modern browser that supported the fetch standard."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 0.0,
|
||||
"baseSeverity": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 0.0
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-829"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://fetch.spec.whatwg.org",
|
||||
"source": "security-advisories@github.com"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/ethyca/fides/commit/868c4d629760572192bd61db34f5a4458ed12005",
|
||||
"source": "security-advisories@github.com"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/ethyca/fides/pull/5026",
|
||||
"source": "security-advisories@github.com"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/ethyca/fides/security/advisories/GHSA-cvw4-c69g-7v7m",
|
||||
"source": "security-advisories@github.com"
|
||||
},
|
||||
{
|
||||
"url": "https://sansec.io/research/polyfill-supply-chain-attack",
|
||||
"source": "security-advisories@github.com"
|
||||
}
|
||||
]
|
||||
}
|
60
CVE-2024/CVE-2024-393xx/CVE-2024-39315.json
Normal file
60
CVE-2024/CVE-2024-393xx/CVE-2024-39315.json
Normal file
@ -0,0 +1,60 @@
|
||||
{
|
||||
"id": "CVE-2024-39315",
|
||||
"sourceIdentifier": "security-advisories@github.com",
|
||||
"published": "2024-07-02T20:15:06.110",
|
||||
"lastModified": "2024-07-02T20:15:06.110",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Pomerium is an identity and context-aware access proxy. Prior to version 0.26.1, the Pomerium user info page (at `/.pomerium`) unintentionally included serialized OAuth2 access and ID tokens from the logged-in user's session. These tokens are not intended to be exposed to end users. This issue may be more severe in the presence of a cross-site scripting vulnerability in an upstream application proxied through Pomerium. If an attacker could insert a malicious script onto a web page proxied through Pomerium, that script could access these tokens by making a request to the `/.pomerium` endpoint. Upstream applications that authenticate only the ID token may be vulnerable to user impersonation using a token obtained in this manner. Note that an OAuth2 access token or ID token by itself is not sufficient to hijack a user's Pomerium session. Upstream applications should not be vulnerable to user impersonation via these tokens provided the application verifies the Pomerium JWT for each request, the connection between Pomerium and the application is secured by mTLS, or the connection between Pomerium and the application is otherwise secured at the network layer. The issue is patched in Pomerium v0.26.1. No known workarounds are available."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 5.7,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.1,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-201"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/pomerium/pomerium/commit/4c7c4320afb2ced70ba19b46de1ac4383f3daa48",
|
||||
"source": "security-advisories@github.com"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/pomerium/pomerium/security/advisories/GHSA-rrqr-7w59-637v",
|
||||
"source": "security-advisories@github.com"
|
||||
}
|
||||
]
|
||||
}
|
76
CVE-2024/CVE-2024-393xx/CVE-2024-39322.json
Normal file
76
CVE-2024/CVE-2024-393xx/CVE-2024-39322.json
Normal file
@ -0,0 +1,76 @@
|
||||
{
|
||||
"id": "CVE-2024-39322",
|
||||
"sourceIdentifier": "security-advisories@github.com",
|
||||
"published": "2024-07-02T21:15:10.997",
|
||||
"lastModified": "2024-07-02T21:15:10.997",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "aimeos/ai-admin-jsonadm is the Aimeos e-commerce JSON API for administrative tasks. In versions prior to 2020.10.13, 2021.10.6, 2022.10.3, 2023.10.4, and 2024.4.2, improper access control allows editors to remove admin group and locale configuration in the Aimeos backend. Versions 2020.10.13, 2021.10.6, 2022.10.3, 2023.10.4, and 2024.4.2 contain a fix for the issue.\n"
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "HIGH",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 5.5,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 1.2,
|
||||
"impactScore": 4.2
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-863"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/aimeos/ai-admin-jsonadm/commit/02a063fbd616d4e0a5aaf89f1642a856aa5ac5a5",
|
||||
"source": "security-advisories@github.com"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/aimeos/ai-admin-jsonadm/commit/16d013d0e28cecd19781f434d83fabebcc78cdc2",
|
||||
"source": "security-advisories@github.com"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/aimeos/ai-admin-jsonadm/commit/4c966e02bd52589c3c9382777cfe170eddf17b00",
|
||||
"source": "security-advisories@github.com"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/aimeos/ai-admin-jsonadm/commit/640954243ce85c2c303a00dd6481ed39b3d218fb",
|
||||
"source": "security-advisories@github.com"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/aimeos/ai-admin-jsonadm/commit/7d1c05e8368b0a6419820fe402deac9960500026",
|
||||
"source": "security-advisories@github.com"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/aimeos/ai-admin-jsonadm/security/advisories/GHSA-8fj2-587w-5whr",
|
||||
"source": "security-advisories@github.com"
|
||||
}
|
||||
]
|
||||
}
|
76
CVE-2024/CVE-2024-393xx/CVE-2024-39324.json
Normal file
76
CVE-2024/CVE-2024-393xx/CVE-2024-39324.json
Normal file
@ -0,0 +1,76 @@
|
||||
{
|
||||
"id": "CVE-2024-39324",
|
||||
"sourceIdentifier": "security-advisories@github.com",
|
||||
"published": "2024-07-02T21:15:11.213",
|
||||
"lastModified": "2024-07-02T21:15:11.213",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "aimeos/ai-admin-graphql is the Aimeos GraphQL API admin interface. Starting in version 2022.04.1 and prior to versions 2022.10.10, 2023.10.6, and 2024.4.2, improper access control allows a editors to manage own services via GraphQL API which isn't allowed in the JQAdm front end. Versions 2022.10.10, 2023.10.6, and 2024.4.2 contain a patch for the issue.\n"
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:L",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "HIGH",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "LOW",
|
||||
"baseScore": 3.8,
|
||||
"baseSeverity": "LOW"
|
||||
},
|
||||
"exploitabilityScore": 1.2,
|
||||
"impactScore": 2.5
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-1220"
|
||||
},
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-863"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/aimeos/ai-admin-graphql/commit/4eabc2b973509ffa5924e7f88c8f87ee96e93b38",
|
||||
"source": "security-advisories@github.com"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/aimeos/ai-admin-graphql/commit/687059d7eb2e1d55a09ed72dad3814f35edad038",
|
||||
"source": "security-advisories@github.com"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/aimeos/ai-admin-graphql/commit/a839a5adf16fee4221d444b7d2f5140d8cabf0ac",
|
||||
"source": "security-advisories@github.com"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/aimeos/ai-admin-graphql/commit/acbb044620f4ff8e8d78a775cd205ec47cf119b3",
|
||||
"source": "security-advisories@github.com"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/aimeos/ai-admin-graphql/security/advisories/GHSA-jj68-cp4v-98qf",
|
||||
"source": "security-advisories@github.com"
|
||||
}
|
||||
]
|
||||
}
|
76
CVE-2024/CVE-2024-393xx/CVE-2024-39325.json
Normal file
76
CVE-2024/CVE-2024-393xx/CVE-2024-39325.json
Normal file
@ -0,0 +1,76 @@
|
||||
{
|
||||
"id": "CVE-2024-39325",
|
||||
"sourceIdentifier": "security-advisories@github.com",
|
||||
"published": "2024-07-02T21:15:11.433",
|
||||
"lastModified": "2024-07-02T21:15:11.433",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "aimeos/ai-controller-frontend is the Aimeos frontend controller. Prior to versions 2024.04.2, 2023.10.9, 2022.10.8, 2021.10.8, and 2020.10.15, aimeos/ai-controller-frontend doesn't reset the payment status of a user's basket after the user completes a purchase. Versions 2024.04.2, 2023.10.9, 2022.10.8, 2021.10.8, and 2020.10.15 fix this issue.\n"
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 5.3,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 1.4
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-841"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/aimeos/ai-controller-frontend/commit/16b8837d2466e3665b3c826ce87934b01a847268",
|
||||
"source": "security-advisories@github.com"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/aimeos/ai-controller-frontend/commit/24a57001e56759d1582d2a0080fc1ca3ba328630",
|
||||
"source": "security-advisories@github.com"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/aimeos/ai-controller-frontend/commit/28549808e0f6432a34cd3fb95556deeb86ca276d",
|
||||
"source": "security-advisories@github.com"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/aimeos/ai-controller-frontend/commit/b1960c0b6e5ee93111a5360c9ce949b3e7528cf7",
|
||||
"source": "security-advisories@github.com"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/aimeos/ai-controller-frontend/commit/dafa072783bb692f111ed092d9d2932c113eb855",
|
||||
"source": "security-advisories@github.com"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/aimeos/ai-controller-frontend/security/advisories/GHSA-m9gv-6p22-qgmj",
|
||||
"source": "security-advisories@github.com"
|
||||
}
|
||||
]
|
||||
}
|
64
CVE-2024/CVE-2024-393xx/CVE-2024-39326.json
Normal file
64
CVE-2024/CVE-2024-393xx/CVE-2024-39326.json
Normal file
@ -0,0 +1,64 @@
|
||||
{
|
||||
"id": "CVE-2024-39326",
|
||||
"sourceIdentifier": "security-advisories@github.com",
|
||||
"published": "2024-07-02T21:15:11.657",
|
||||
"lastModified": "2024-07-02T21:15:11.657",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "SkillTree is a micro-learning gamification platform. Prior to version 2.12.6, the endpoint \n`/admin/projects/{projectname}/skills/{skillname}/video` (and probably others) is open to a cross-site request forgery (CSRF) vulnerability. Due to the endpoint being CSRFable e.g POST request, supports a content type that can be exploited (multipart file upload), makes a state change and has no CSRF mitigations in place (samesite flag, CSRF token). It is possible to perform a CSRF attack against a logged in admin account, allowing an attacker that can target a logged in admin of Skills Service to modify the videos, captions, and text of the skill. Version 2.12.6 contains a patch for this issue.\n"
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:H/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "HIGH",
|
||||
"privilegesRequired": "HIGH",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 4.4,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 0.7,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-352"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/NationalSecurityAgency/skills-service/blob/24dd22f43306fc616e4580fb8bb88f66b5d9b41d/service/src/main/java/skills/controller/AdminController.groovy#L574",
|
||||
"source": "security-advisories@github.com"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/NationalSecurityAgency/skills-service/commit/68d4235ddcb16e4f33fc7f19d14ff917817a366c",
|
||||
"source": "security-advisories@github.com"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/NationalSecurityAgency/skills-service/security/advisories/GHSA-9624-qwxr-jr4j",
|
||||
"source": "security-advisories@github.com"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,31 +2,15 @@
|
||||
"id": "CVE-2024-39362",
|
||||
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"published": "2024-06-25T15:15:14.327",
|
||||
"lastModified": "2024-06-25T18:50:42.040",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-07-02T20:15:06.353",
|
||||
"vulnStatus": "Rejected",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\ni2c: acpi: Unbind mux adapters before delete\n\nThere is an issue with ACPI overlay table removal specifically related\nto I2C multiplexers.\n\nConsider an ACPI SSDT Overlay that defines a PCA9548 I2C mux on an\nexisting I2C bus. When this table is loaded we see the creation of a\ndevice for the overall PCA9548 chip and 8 further devices - one\ni2c_adapter each for the mux channels. These are all bound to their\nACPI equivalents via an eventual invocation of acpi_bind_one().\n\nWhen we unload the SSDT overlay we run into the problem. The ACPI\ndevices are deleted as normal via acpi_device_del_work_fn() and the\nacpi_device_del_list.\n\nHowever, the following warning and stack trace is output as the\ndeletion does not go smoothly:\n------------[ cut here ]------------\nkernfs: can not remove 'physical_node', no directory\nWARNING: CPU: 1 PID: 11 at fs/kernfs/dir.c:1674 kernfs_remove_by_name_ns+0xb9/0xc0\nModules linked in:\nCPU: 1 PID: 11 Comm: kworker/u128:0 Not tainted 6.8.0-rc6+ #1\nHardware name: congatec AG conga-B7E3/conga-B7E3, BIOS 5.13 05/16/2023\nWorkqueue: kacpi_hotplug acpi_device_del_work_fn\nRIP: 0010:kernfs_remove_by_name_ns+0xb9/0xc0\nCode: e4 00 48 89 ef e8 07 71 db ff 5b b8 fe ff ff ff 5d 41 5c 41 5d e9 a7 55 e4 00 0f 0b eb a6 48 c7 c7 f0 38 0d 9d e8 97 0a d5 ff <0f> 0b eb dc 0f 1f 00 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90\nRSP: 0018:ffff9f864008fb28 EFLAGS: 00010286\nRAX: 0000000000000000 RBX: ffff8ef90a8d4940 RCX: 0000000000000000\nRDX: ffff8f000e267d10 RSI: ffff8f000e25c780 RDI: ffff8f000e25c780\nRBP: ffff8ef9186f9870 R08: 0000000000013ffb R09: 00000000ffffbfff\nR10: 00000000ffffbfff R11: ffff8f000e0a0000 R12: ffff9f864008fb50\nR13: ffff8ef90c93dd60 R14: ffff8ef9010d0958 R15: ffff8ef9186f98c8\nFS: 0000000000000000(0000) GS:ffff8f000e240000(0000) knlGS:0000000000000000\nCS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033\nCR2: 00007f48f5253a08 CR3: 00000003cb82e000 CR4: 00000000003506f0\nCall Trace:\n <TASK>\n ? kernfs_remove_by_name_ns+0xb9/0xc0\n ? __warn+0x7c/0x130\n ? kernfs_remove_by_name_ns+0xb9/0xc0\n ? report_bug+0x171/0x1a0\n ? handle_bug+0x3c/0x70\n ? exc_invalid_op+0x17/0x70\n ? asm_exc_invalid_op+0x1a/0x20\n ? kernfs_remove_by_name_ns+0xb9/0xc0\n ? kernfs_remove_by_name_ns+0xb9/0xc0\n acpi_unbind_one+0x108/0x180\n device_del+0x18b/0x490\n ? srso_return_thunk+0x5/0x5f\n ? srso_return_thunk+0x5/0x5f\n device_unregister+0xd/0x30\n i2c_del_adapter.part.0+0x1bf/0x250\n i2c_mux_del_adapters+0xa1/0xe0\n i2c_device_remove+0x1e/0x80\n device_release_driver_internal+0x19a/0x200\n bus_remove_device+0xbf/0x100\n device_del+0x157/0x490\n ? __pfx_device_match_fwnode+0x10/0x10\n ? srso_return_thunk+0x5/0x5f\n device_unregister+0xd/0x30\n i2c_acpi_notify+0x10f/0x140\n notifier_call_chain+0x58/0xd0\n blocking_notifier_call_chain+0x3a/0x60\n acpi_device_del_work_fn+0x85/0x1d0\n process_one_work+0x134/0x2f0\n worker_thread+0x2f0/0x410\n ? __pfx_worker_thread+0x10/0x10\n kthread+0xe3/0x110\n ? __pfx_kthread+0x10/0x10\n ret_from_fork+0x2f/0x50\n ? __pfx_kthread+0x10/0x10\n ret_from_fork_asm+0x1b/0x30\n </TASK>\n---[ end trace 0000000000000000 ]---\n...\nrepeated 7 more times, 1 for each channel of the mux\n...\n\nThe issue is that the binding of the ACPI devices to their peer I2C\nadapters is not correctly cleaned up. Digging deeper into the issue we\nsee that the deletion order is such that the ACPI devices matching the\nmux channel i2c adapters are deleted first during the SSDT overlay\nremoval. For each of the channels we see a call to i2c_acpi_notify()\nwith ACPI_RECONFIG_DEVICE_REMOVE but, because these devices are not\nactually i2c_clients, nothing is done for them.\n\nLater on, after each of the mux channels has been dealt with, we come\nto delete the i2c_client representing the PCA9548 device. This is the\ncall stack we see above, whereby the kernel cleans up the i2c_client\nincluding destruction of the mux and its channel adapters. At this\npoint we do attempt to unbind from the ACPI peers but those peers \n---truncated---"
|
||||
"value": "Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/3f858bbf04dbac934ac279aaee05d49eb9910051",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/4f08050a47a59d199e214d711b989bb4f5150373",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/90dd0592b3b005d6f15c4e23e1364d3ae95e588d",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/b1574c8c0a80bd587a7651bf64f00be1f5391d27",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
}
|
||||
]
|
||||
"references": []
|
||||
}
|
137
CVE-2024/CVE-2024-64xx/CVE-2024-6452.json
Normal file
137
CVE-2024/CVE-2024-64xx/CVE-2024-6452.json
Normal file
@ -0,0 +1,137 @@
|
||||
{
|
||||
"id": "CVE-2024-6452",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2024-07-02T20:15:06.860",
|
||||
"lastModified": "2024-07-02T20:15:06.860",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A vulnerability classified as critical was found in linlinjava litemall up to 1.8.0. Affected by this vulnerability is an unknown functionality of the file AdminGoodscontroller.java. The manipulation of the argument goodsId/goodsSn/name leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-270235."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV40": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "4.0",
|
||||
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"attackRequirements": "NONE",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"vulnerableSystemConfidentiality": "LOW",
|
||||
"vulnerableSystemIntegrity": "LOW",
|
||||
"vulnerableSystemAvailability": "LOW",
|
||||
"subsequentSystemConfidentiality": "NONE",
|
||||
"subsequentSystemIntegrity": "NONE",
|
||||
"subsequentSystemAvailability": "NONE",
|
||||
"exploitMaturity": "NOT_DEFINED",
|
||||
"confidentialityRequirements": "NOT_DEFINED",
|
||||
"integrityRequirements": "NOT_DEFINED",
|
||||
"availabilityRequirements": "NOT_DEFINED",
|
||||
"modifiedAttackVector": "NOT_DEFINED",
|
||||
"modifiedAttackComplexity": "NOT_DEFINED",
|
||||
"modifiedAttackRequirements": "NOT_DEFINED",
|
||||
"modifiedPrivilegesRequired": "NOT_DEFINED",
|
||||
"modifiedUserInteraction": "NOT_DEFINED",
|
||||
"modifiedVulnerableSystemConfidentiality": "NOT_DEFINED",
|
||||
"modifiedVulnerableSystemIntegrity": "NOT_DEFINED",
|
||||
"modifiedVulnerableSystemAvailability": "NOT_DEFINED",
|
||||
"modifiedSubsequentSystemConfidentiality": "NOT_DEFINED",
|
||||
"modifiedSubsequentSystemIntegrity": "NOT_DEFINED",
|
||||
"modifiedSubsequentSystemAvailability": "NOT_DEFINED",
|
||||
"safety": "NOT_DEFINED",
|
||||
"automatable": "NOT_DEFINED",
|
||||
"recovery": "NOT_DEFINED",
|
||||
"valueDensity": "NOT_DEFINED",
|
||||
"vulnerabilityResponseEffort": "NOT_DEFINED",
|
||||
"providerUrgency": "NOT_DEFINED",
|
||||
"baseScore": 5.3,
|
||||
"baseSeverity": "MEDIUM"
|
||||
}
|
||||
}
|
||||
],
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "LOW",
|
||||
"baseScore": 6.3,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 3.4
|
||||
}
|
||||
],
|
||||
"cvssMetricV2": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "2.0",
|
||||
"vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P",
|
||||
"accessVector": "NETWORK",
|
||||
"accessComplexity": "LOW",
|
||||
"authentication": "SINGLE",
|
||||
"confidentialityImpact": "PARTIAL",
|
||||
"integrityImpact": "PARTIAL",
|
||||
"availabilityImpact": "PARTIAL",
|
||||
"baseScore": 6.5
|
||||
},
|
||||
"baseSeverity": "MEDIUM",
|
||||
"exploitabilityScore": 8.0,
|
||||
"impactScore": 6.4,
|
||||
"acInsufInfo": false,
|
||||
"obtainAllPrivilege": false,
|
||||
"obtainUserPrivilege": false,
|
||||
"obtainOtherPrivilege": false,
|
||||
"userInteractionRequired": false
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-89"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/linlinjava/litemall/issues/548",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.270235",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.270235",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?submit.367635",
|
||||
"source": "cna@vuldb.com"
|
||||
}
|
||||
]
|
||||
}
|
54
README.md
54
README.md
@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours.
|
||||
### Last Repository Update
|
||||
|
||||
```plain
|
||||
2024-07-02T20:00:31.367819+00:00
|
||||
2024-07-02T22:01:30.378301+00:00
|
||||
```
|
||||
|
||||
### Most recent CVE Modification Timestamp synchronized with NVD
|
||||
|
||||
```plain
|
||||
2024-07-02T19:15:12.773000+00:00
|
||||
2024-07-02T21:15:11.657000+00:00
|
||||
```
|
||||
|
||||
### Last Data Feed Release
|
||||
@ -33,48 +33,34 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
|
||||
### Total Number of included CVEs
|
||||
|
||||
```plain
|
||||
255774
|
||||
255783
|
||||
```
|
||||
|
||||
### CVEs added in the last Commit
|
||||
|
||||
Recently added CVEs: `10`
|
||||
Recently added CVEs: `9`
|
||||
|
||||
- [CVE-2022-25477](CVE-2022/CVE-2022-254xx/CVE-2022-25477.json) (`2024-07-02T19:15:11.757`)
|
||||
- [CVE-2022-25478](CVE-2022/CVE-2022-254xx/CVE-2022-25478.json) (`2024-07-02T19:15:11.870`)
|
||||
- [CVE-2022-25479](CVE-2022/CVE-2022-254xx/CVE-2022-25479.json) (`2024-07-02T19:15:11.957`)
|
||||
- [CVE-2022-25480](CVE-2022/CVE-2022-254xx/CVE-2022-25480.json) (`2024-07-02T19:15:12.037`)
|
||||
- [CVE-2024-39206](CVE-2024/CVE-2024-392xx/CVE-2024-39206.json) (`2024-07-02T18:15:03.290`)
|
||||
- [CVE-2024-39891](CVE-2024/CVE-2024-398xx/CVE-2024-39891.json) (`2024-07-02T18:15:03.447`)
|
||||
- [CVE-2024-39894](CVE-2024/CVE-2024-398xx/CVE-2024-39894.json) (`2024-07-02T18:15:03.710`)
|
||||
- [CVE-2024-6341](CVE-2024/CVE-2024-63xx/CVE-2024-6341.json) (`2024-07-02T18:15:03.900`)
|
||||
- [CVE-2024-6381](CVE-2024/CVE-2024-63xx/CVE-2024-6381.json) (`2024-07-02T18:15:03.963`)
|
||||
- [CVE-2024-6382](CVE-2024/CVE-2024-63xx/CVE-2024-6382.json) (`2024-07-02T18:15:04.337`)
|
||||
- [CVE-2022-30636](CVE-2022/CVE-2022-306xx/CVE-2022-30636.json) (`2024-07-02T20:15:05.173`)
|
||||
- [CVE-2023-24531](CVE-2023/CVE-2023-245xx/CVE-2023-24531.json) (`2024-07-02T20:15:05.270`)
|
||||
- [CVE-2024-38537](CVE-2024/CVE-2024-385xx/CVE-2024-38537.json) (`2024-07-02T20:15:05.860`)
|
||||
- [CVE-2024-39315](CVE-2024/CVE-2024-393xx/CVE-2024-39315.json) (`2024-07-02T20:15:06.110`)
|
||||
- [CVE-2024-39322](CVE-2024/CVE-2024-393xx/CVE-2024-39322.json) (`2024-07-02T21:15:10.997`)
|
||||
- [CVE-2024-39324](CVE-2024/CVE-2024-393xx/CVE-2024-39324.json) (`2024-07-02T21:15:11.213`)
|
||||
- [CVE-2024-39325](CVE-2024/CVE-2024-393xx/CVE-2024-39325.json) (`2024-07-02T21:15:11.433`)
|
||||
- [CVE-2024-39326](CVE-2024/CVE-2024-393xx/CVE-2024-39326.json) (`2024-07-02T21:15:11.657`)
|
||||
- [CVE-2024-6452](CVE-2024/CVE-2024-64xx/CVE-2024-6452.json) (`2024-07-02T20:15:06.860`)
|
||||
|
||||
|
||||
### CVEs modified in the last Commit
|
||||
|
||||
Recently modified CVEs: `19`
|
||||
Recently modified CVEs: `6`
|
||||
|
||||
- [CVE-2017-20012](CVE-2017/CVE-2017-200xx/CVE-2017-20012.json) (`2024-07-02T19:15:10.913`)
|
||||
- [CVE-2021-40978](CVE-2021/CVE-2021-409xx/CVE-2021-40978.json) (`2024-07-02T18:15:03.000`)
|
||||
- [CVE-2021-43574](CVE-2021/CVE-2021-435xx/CVE-2021-43574.json) (`2024-07-02T19:15:11.297`)
|
||||
- [CVE-2021-45364](CVE-2021/CVE-2021-453xx/CVE-2021-45364.json) (`2024-07-02T19:15:11.420`)
|
||||
- [CVE-2021-45952](CVE-2021/CVE-2021-459xx/CVE-2021-45952.json) (`2024-07-02T19:15:11.557`)
|
||||
- [CVE-2022-25514](CVE-2022/CVE-2022-255xx/CVE-2022-25514.json) (`2024-07-02T19:15:12.117`)
|
||||
- [CVE-2022-25517](CVE-2022/CVE-2022-255xx/CVE-2022-25517.json) (`2024-07-02T19:15:12.233`)
|
||||
- [CVE-2023-5038](CVE-2023/CVE-2023-50xx/CVE-2023-5038.json) (`2024-07-02T18:09:41.080`)
|
||||
- [CVE-2024-34596](CVE-2024/CVE-2024-345xx/CVE-2024-34596.json) (`2024-07-02T18:04:25.130`)
|
||||
- [CVE-2024-34597](CVE-2024/CVE-2024-345xx/CVE-2024-34597.json) (`2024-07-02T18:04:57.147`)
|
||||
- [CVE-2024-34599](CVE-2024/CVE-2024-345xx/CVE-2024-34599.json) (`2024-07-02T18:05:26.327`)
|
||||
- [CVE-2024-34600](CVE-2024/CVE-2024-346xx/CVE-2024-34600.json) (`2024-07-02T18:05:54.487`)
|
||||
- [CVE-2024-34601](CVE-2024/CVE-2024-346xx/CVE-2024-34601.json) (`2024-07-02T18:07:05.737`)
|
||||
- [CVE-2024-4268](CVE-2024/CVE-2024-42xx/CVE-2024-4268.json) (`2024-07-02T18:08:17.817`)
|
||||
- [CVE-2024-6011](CVE-2024/CVE-2024-60xx/CVE-2024-6011.json) (`2024-07-02T18:07:31.577`)
|
||||
- [CVE-2024-6012](CVE-2024/CVE-2024-60xx/CVE-2024-6012.json) (`2024-07-02T18:07:54.430`)
|
||||
- [CVE-2024-6088](CVE-2024/CVE-2024-60xx/CVE-2024-6088.json) (`2024-07-02T18:08:38.550`)
|
||||
- [CVE-2024-6099](CVE-2024/CVE-2024-60xx/CVE-2024-6099.json) (`2024-07-02T18:08:53.233`)
|
||||
- [CVE-2024-6387](CVE-2024/CVE-2024-63xx/CVE-2024-6387.json) (`2024-07-02T19:15:12.773`)
|
||||
- [CVE-2021-42860](CVE-2021/CVE-2021-428xx/CVE-2021-42860.json) (`2024-07-02T21:15:10.270`)
|
||||
- [CVE-2021-47285](CVE-2021/CVE-2021-472xx/CVE-2021-47285.json) (`2024-07-02T20:15:04.637`)
|
||||
- [CVE-2022-29072](CVE-2022/CVE-2022-290xx/CVE-2022-29072.json) (`2024-07-02T20:15:05.033`)
|
||||
- [CVE-2022-29622](CVE-2022/CVE-2022-296xx/CVE-2022-29622.json) (`2024-07-02T21:15:10.390`)
|
||||
- [CVE-2024-38391](CVE-2024/CVE-2024-383xx/CVE-2024-38391.json) (`2024-07-02T20:15:05.730`)
|
||||
- [CVE-2024-39362](CVE-2024/CVE-2024-393xx/CVE-2024-39362.json) (`2024-07-02T20:15:06.353`)
|
||||
|
||||
|
||||
## Download and Usage
|
||||
|
79
_state.csv
79
_state.csv
@ -102325,7 +102325,7 @@ CVE-2017-20007,0,0,1ef2d7c0fb54f5a141b1f6731bc589cb69df6baf5e7320d99c31d3f3ea4ac
|
||||
CVE-2017-20008,0,0,88f84d0f419302bafac197fc514089eea45eaa5cd48d23d163fb1663bbd4e1ee,2021-11-29T19:29:06.613000
|
||||
CVE-2017-2001,0,0,312a92e77c3ddf8cb9ab8d8feabaa1fcb4cfba105f2e50663b3a5c78da15ef11,2023-11-07T02:43:26.440000
|
||||
CVE-2017-20011,0,0,e3df82239d4cb8be8a96b66406f511a287f7d90f2e2c52c8a54e86ffccd2b3bf,2024-05-17T01:17:17.850000
|
||||
CVE-2017-20012,0,1,637e2f46326ae880f717725b687e4c18ac5948369e41c6c17aff8d1a5f20a7c2,2024-07-02T19:15:10.913000
|
||||
CVE-2017-20012,0,0,637e2f46326ae880f717725b687e4c18ac5948369e41c6c17aff8d1a5f20a7c2,2024-07-02T19:15:10.913000
|
||||
CVE-2017-20013,0,0,0bf0b14bc1cc2fd50dcb605df434cc792523e7553968d30f83316b5b34b67926,2024-06-06T17:15:49.113000
|
||||
CVE-2017-20014,0,0,053fcf47daf469f634007239b24248182464fa12d850d4afabc39368dee59ca8,2024-05-17T01:17:18.230000
|
||||
CVE-2017-20015,0,0,6553b6770018959593405cf9a98bb61f61d76597d96c3fb4084ef993db17840e,2024-05-17T01:17:18.420000
|
||||
@ -182580,7 +182580,7 @@ CVE-2021-40971,0,0,62e8cd79ac0d2c99f092d1dd3e1a2071d09df91eca6efb1fd7c5dbebf041c
|
||||
CVE-2021-40972,0,0,e2d887ff9f27740bfd2a2cc80eebbd80933d3565a6b0acbed8044b548dd49e7d,2021-10-04T17:15:49.503000
|
||||
CVE-2021-40973,0,0,f81499affd2c45bd4c194146d61aa100e856705701a5f8334d093c18dc177698,2021-10-04T17:15:20.627000
|
||||
CVE-2021-40975,0,0,d3067b5333ad341ead9b157fdbbd9db337a9fe5fe8efd49372ec536ea04bddac,2021-10-04T17:10:37.283000
|
||||
CVE-2021-40978,0,1,426761cc8ac574b3c8476a90a0500155bc865266ca70c7b7fd8c0b1cd9299dac,2024-07-02T18:15:03
|
||||
CVE-2021-40978,0,0,426761cc8ac574b3c8476a90a0500155bc865266ca70c7b7fd8c0b1cd9299dac,2024-07-02T18:15:03
|
||||
CVE-2021-4098,0,0,f94d1e6f44ce27c564a3a928b05d68cd29ffb09c94fdfa8f66d65e99aca5cb69,2023-08-08T14:22:24.967000
|
||||
CVE-2021-40981,0,0,bb492111b8395251c1dd28ac707dccb7128fc51e6219c4d7f92d92227b94a7d8,2021-10-01T20:08:58.547000
|
||||
CVE-2021-40985,0,0,17e39f07aa4a962e7b20459eb612fa50e926f0b0a631f78f9e8f54c0d205fe8a,2023-08-08T14:21:49.707000
|
||||
@ -183965,7 +183965,7 @@ CVE-2021-42856,0,0,04fc02433af4523c021972b760a933efcaf1ab6117df3da8a0dab8fc85658
|
||||
CVE-2021-42857,0,0,25aacf5389053a3c60fd0479c2afb182ccedfad768fb9c1c03a0bfc2335a254c,2022-03-15T14:38:05.977000
|
||||
CVE-2021-42859,0,0,989d3a91f9be5405b01a5719a7bc39eab0bf12c7a115a0066fb318285c133485,2024-05-17T02:01:40.523000
|
||||
CVE-2021-4286,0,0,d6cd1237c5ad166dd2b6d5551ef17d7396a81bb899129d8eae0d044a05021927,2024-05-17T02:03:32.010000
|
||||
CVE-2021-42860,0,0,ee4d9160e4c5ec7c7da7660f755186be02c532e92d0bfe3e42b662d15f00a40c,2024-05-17T02:01:40.627000
|
||||
CVE-2021-42860,0,1,657242089e71454a2352e2ad77cf846e060929047ba50eaf4665200a325957e5,2024-07-02T21:15:10.270000
|
||||
CVE-2021-42863,0,0,cddb02c59b2e2f748ed6602df3e3a01f6961ee6f1aa769f5820950a5ae9b5fcb,2022-05-23T14:23:34.097000
|
||||
CVE-2021-42866,0,0,02799d479d491fb486032d5e0024081b0dd03781585808008d6feaa6f6f08a55,2022-04-07T19:42:04.227000
|
||||
CVE-2021-42867,0,0,29332b352d00dd44c6a9ab8b5eadc64c1352478e1c82cc9760ecabaae52ba7fc,2022-04-07T13:17:52.230000
|
||||
@ -184490,7 +184490,7 @@ CVE-2021-43570,0,0,86562232d4d28034cd7f523730ac34fee09b0bebf728ed039c3366ea75fff
|
||||
CVE-2021-43571,0,0,d8720870d7e0c23c53a21bd1379428f4c9f8af146d374a4b9b479010164a6b4b,2021-11-12T19:59:21.110000
|
||||
CVE-2021-43572,0,0,0f626dfba2f80232f110f034867a79ae37cb647d640c39cd81a1a4eed5ad4c7c,2022-03-24T15:57:18.287000
|
||||
CVE-2021-43573,0,0,c7326ecf40c2812d6f14c276e1010ea255db02789102bcc053f2dd8e665324ab,2021-12-21T19:59:03.880000
|
||||
CVE-2021-43574,0,1,f8bdcc7cfe5e84cc5d1d67b34bf98eceec44e1ffe0fcbb5345dbb7811c5ea41a,2024-07-02T19:15:11.297000
|
||||
CVE-2021-43574,0,0,f8bdcc7cfe5e84cc5d1d67b34bf98eceec44e1ffe0fcbb5345dbb7811c5ea41a,2024-07-02T19:15:11.297000
|
||||
CVE-2021-43575,0,0,c60bd71c607cb82c2be73d14dc1f6741bd1145ad4b9086d11b259af3165e339d,2024-05-17T02:01:57.027000
|
||||
CVE-2021-43576,0,0,91dd1f5f8e047b82ac3a97aeae835e391bb96f704d9dc1783322fe2642c5e708,2023-11-22T21:33:01.017000
|
||||
CVE-2021-43577,0,0,7ca2e1fc9c23eb260ccdd63a004754cc53228a40b983112be8a584b13fbfe84a,2023-11-22T21:32:53.473000
|
||||
@ -185628,7 +185628,7 @@ CVE-2021-45346,0,0,8a987db60d153f4f502120e5f7a66bf565ee828d5b7274c140b4b5afab909
|
||||
CVE-2021-45347,0,0,6ddfed6efb5e7c057d03cd791f12db98220bdba3eeaa93766586a7df4bcca45b,2022-02-23T14:16:16.767000
|
||||
CVE-2021-45348,0,0,752ad5782aecfcd4011e294ccf97b7101a9364e3a0173061405bc311500f325e,2022-02-23T16:07:23.697000
|
||||
CVE-2021-45357,0,0,6af78fec96b7d1ebe952d2ff58c9c03d0bdfb317f46128f191e1f4ba91ef67a3,2022-02-15T18:51:39.097000
|
||||
CVE-2021-45364,0,1,263089291d39a63e3473877bd284426a11c28abc90a420782ca0937106a8d2d6,2024-07-02T19:15:11.420000
|
||||
CVE-2021-45364,0,0,263089291d39a63e3473877bd284426a11c28abc90a420782ca0937106a8d2d6,2024-07-02T19:15:11.420000
|
||||
CVE-2021-45379,0,0,476dd86af7d4237d1b55e97e8005a863a4e51e43e24433ac9d5430509de31c48,2022-07-12T17:42:04.277000
|
||||
CVE-2021-45380,0,0,6f108cd93c5c99f00a666585efe72c850e843619505ae8d69b745ddf3307a9c5,2022-01-27T16:09:05.753000
|
||||
CVE-2021-45382,0,0,791195509994558b2fe50ccff9fe2eee931a6f2a59e8c4e9076783a755c3b606,2023-08-08T14:21:49.707000
|
||||
@ -186093,7 +186093,7 @@ CVE-2021-45948,0,0,aa333e5d4ef741615dc91397f23746c51354909ba25f677e4792b49d1dd33
|
||||
CVE-2021-45949,0,0,482388125623aa6279df429f2dc9cc60889d7ac914cf406e02d98f6a7c096758,2023-11-07T03:39:56.663000
|
||||
CVE-2021-45950,0,0,e6f588831fe33ed379954793cc97502c21d90aa30c977e9511339cca5d278860,2022-01-11T16:00:25.127000
|
||||
CVE-2021-45951,0,0,8ad0edf2f740aca93c1c42b357fb6d1fa1849c9ba550d6bd195565cdf057038b,2024-05-17T02:02:52.427000
|
||||
CVE-2021-45952,0,1,f1e579c49bb95a7f9bfbb0f5ae28465611d6f1140361974fc65b2f0f49dc424c,2024-07-02T19:15:11.557000
|
||||
CVE-2021-45952,0,0,f1e579c49bb95a7f9bfbb0f5ae28465611d6f1140361974fc65b2f0f49dc424c,2024-07-02T19:15:11.557000
|
||||
CVE-2021-45953,0,0,1b95c9ece70fbfe4bdcc319bf8f26e71d575de2f9d9237efaec7f4f2ceb02bd2,2024-05-17T02:02:52.617000
|
||||
CVE-2021-45954,0,0,42bf16816a22914661974a1ddfef604acc4d319ec833dae86e66a79af326cd3b,2024-05-17T02:02:52.697000
|
||||
CVE-2021-45955,0,0,f7dd2eecfd1949ab9909f8157e5116f1df7dca0fb9b6479ed1ea09b210d066be,2024-06-11T16:15:16.080000
|
||||
@ -187101,7 +187101,7 @@ CVE-2021-47281,0,0,593aea6f832a6c532eeb85f4c4c58c4c07715365e7ef8e62c7d3ce5ea69f7
|
||||
CVE-2021-47282,0,0,62215ebff03dbff1784bc17c7de1c05aee2b7455f65ee32fbef82e14b765e992,2024-05-21T16:54:26.047000
|
||||
CVE-2021-47283,0,0,0ff0fec851130d9f4c124e66410697fa89f2725fd5fbd9a87a792eabb7ae2619,2024-05-21T16:54:26.047000
|
||||
CVE-2021-47284,0,0,6803845eb42c6e2028dde34255810396c0f218a68b17abd67007b27796d3dcd1,2024-05-21T16:54:26.047000
|
||||
CVE-2021-47285,0,0,348ae77348ef8ba5d7542350bc86f60db73d51ce7707c5c6aa7fc5eb8051c70e,2024-05-21T16:54:26.047000
|
||||
CVE-2021-47285,0,1,996ea18361ebd04fd45b1694fe1d9404484a2740395fd8ca2c06e472a7098e5f,2024-07-02T20:15:04.637000
|
||||
CVE-2021-47286,0,0,b15e11781385fad96e49b76e139430d572cbbf1b8011cb250a6bdc2187552ec2,2024-05-21T16:54:26.047000
|
||||
CVE-2021-47287,0,0,4414a4e5dfd31932f41a2b5e5bf416a5a7bb5ecb095d728c8b74b53d52aa09c1,2024-05-21T16:54:26.047000
|
||||
CVE-2021-47288,0,0,f9616c139c2b4d34b236abb9a5482235ead43886427819bff5198662ac4e4ac0,2024-05-21T16:54:26.047000
|
||||
@ -194354,10 +194354,10 @@ CVE-2022-25464,0,0,231fd3080576b3684ae82435ee901df2499bdd2b12996f22985cb04f4c481
|
||||
CVE-2022-25465,0,0,83ff884fffb03f7448bef58e02010e947d986d6c2e472bc0f3add87f72a5660c,2022-03-11T15:55:36.710000
|
||||
CVE-2022-2547,0,0,73d14d5654e374eff01adccf9a7a8251705f6da64d59cea565fd779629f3f010,2022-08-19T01:43:28.157000
|
||||
CVE-2022-25471,0,0,3a109f099cb1061a853e5b50f13b9d0fc3efb3654456f758cc15cdf5ad1cc75d,2022-03-09T19:47:15.070000
|
||||
CVE-2022-25477,1,1,d20a27df31d38af0afc20c681228c4a914eabe55303b966622f4ed5bb1b1ce37,2024-07-02T19:15:11.757000
|
||||
CVE-2022-25478,1,1,70e7c014b7b7f01e5419065792c5e0879950224514b5eee9a13a25f85d4890c3,2024-07-02T19:15:11.870000
|
||||
CVE-2022-25479,1,1,bbcbe3ce2d31a511def7cbae6b0c5276bdbdd0c47a66e512186e701cee1954bd,2024-07-02T19:15:11.957000
|
||||
CVE-2022-25480,1,1,b85c1709cb146bb1b0393a679e804a8c10249abb28f64a7e7994dfbec0265b6b,2024-07-02T19:15:12.037000
|
||||
CVE-2022-25477,0,0,d20a27df31d38af0afc20c681228c4a914eabe55303b966622f4ed5bb1b1ce37,2024-07-02T19:15:11.757000
|
||||
CVE-2022-25478,0,0,70e7c014b7b7f01e5419065792c5e0879950224514b5eee9a13a25f85d4890c3,2024-07-02T19:15:11.870000
|
||||
CVE-2022-25479,0,0,bbcbe3ce2d31a511def7cbae6b0c5276bdbdd0c47a66e512186e701cee1954bd,2024-07-02T19:15:11.957000
|
||||
CVE-2022-25480,0,0,b85c1709cb146bb1b0393a679e804a8c10249abb28f64a7e7994dfbec0265b6b,2024-07-02T19:15:12.037000
|
||||
CVE-2022-25481,0,0,421b401b20e9e22f5ad772dff507a3a1e2483021fab730987885599f766afa84,2024-06-04T19:17:14.633000
|
||||
CVE-2022-25484,0,0,99a222d35a5c2f1b2db0f90a8390321c73db93867e67f18b2c213513a13e5439,2022-03-28T20:53:05.180000
|
||||
CVE-2022-25485,0,0,f943c508b3e38959fea36ca9f014627ff6eee45f93d348f17a276f89be77fc1e,2022-03-23T18:18:46.160000
|
||||
@ -194383,10 +194383,10 @@ CVE-2022-2551,0,0,eadba0841a48cf0a4cb48730644089435cc911dc05c8092013570e61fb503e
|
||||
CVE-2022-25510,0,0,6c9234ed5c243f504bf1470963aa31e79d875caf1de309bd283d6748b56e19a8,2022-03-22T12:48:27.790000
|
||||
CVE-2022-25511,0,0,4fc08a55d1ff09caaefda592dcf03e3e1b5ae70380d09725c3f26b5d168bae51,2022-03-22T13:00:15.057000
|
||||
CVE-2022-25512,0,0,b1c52ac21af7250e857ad7d3985d7bc7f57879f1a24979d1fb5e09eddb0eb7d3,2022-03-22T12:47:36.107000
|
||||
CVE-2022-25514,0,1,c0738e9082d55248ec0ed222e7cc5a9e33f95ed6f786abf32761ade60fb9ffee,2024-07-02T19:15:12.117000
|
||||
CVE-2022-25514,0,0,c0738e9082d55248ec0ed222e7cc5a9e33f95ed6f786abf32761ade60fb9ffee,2024-07-02T19:15:12.117000
|
||||
CVE-2022-25515,0,0,53c5e558fae01f40b3a5aadbb97b5bbeb06bac138ba14390673b326e64384a6b,2024-05-17T02:06:40.303000
|
||||
CVE-2022-25516,0,0,f89599fa7cc5c9923e78c56260802b7890855a896d1ef50fd2ac3a9e4c658b62,2024-05-17T02:06:40.397000
|
||||
CVE-2022-25517,0,1,6faf1dbce2bef1c30d4cea2e300b41ca13d0cfd1f02308ff89bb96129a33692e,2024-07-02T19:15:12.233000
|
||||
CVE-2022-25517,0,0,6faf1dbce2bef1c30d4cea2e300b41ca13d0cfd1f02308ff89bb96129a33692e,2024-07-02T19:15:12.233000
|
||||
CVE-2022-25518,0,0,d1a9366eab4bd91c59f6bf12692e59eb1c69dbadcaea3ad3132182cbffcfd280,2022-03-28T20:08:30.037000
|
||||
CVE-2022-2552,0,0,125fa71079048e18e7435d117a5f8b319e30f8387bf3eb810bcd3b5b3c73dabb,2023-11-07T03:46:39.677000
|
||||
CVE-2022-25521,0,0,369c8b3e5327b316aa0ef07431129995f3d0b64c4960eae6c42480cc301fc961,2023-11-07T03:44:47.390000
|
||||
@ -197227,7 +197227,7 @@ CVE-2022-29062,0,0,c41b4432fc4d695bbbd23b6b405ec97ee785697e1378c543208360edce67f
|
||||
CVE-2022-29063,0,0,ce51654fad4b422bf44095e792066b47319cdf2b2cf4b5e709c5e639728f39ad,2022-09-08T12:17:45.683000
|
||||
CVE-2022-2907,0,0,293ede5ffcd58ca6a13533a64b99af5d2845f0339227cc289db402e7c57b7b2d,2023-01-25T03:26:18.393000
|
||||
CVE-2022-29071,0,0,e6baea940619b2319d3c760552864cf30d765258ba5a8787026981ddcab64b43,2023-07-21T16:44:30.400000
|
||||
CVE-2022-29072,0,0,7d449a769fe58615e26f5f50d40c37e8d99e201bb165e4a524a0da0e6b98c684,2024-05-17T02:08:03.793000
|
||||
CVE-2022-29072,0,1,95dfdfca036dbefce3f7ce3479dd06344f2f52df9c51b31f00398239cd258f9a,2024-07-02T20:15:05.033000
|
||||
CVE-2022-29077,0,0,544545211c1510f2f2df31bedf1abcd89d6acf9851e111a0c2ee69c4412bc1c3,2022-05-04T15:41:05.170000
|
||||
CVE-2022-29078,0,0,953ce71eb690d5ba25ee94af6fb6eb2a7f1d4bc790a314bd5cb757098506953c,2023-08-08T14:22:24.967000
|
||||
CVE-2022-2908,0,0,0d8fdace1ffb499f9d4408487913e3b2317dd008f5796eb7cce343a36073a92e,2023-08-08T14:22:24.967000
|
||||
@ -197706,7 +197706,7 @@ CVE-2022-29618,0,0,85bffd581df774a112669f14df0da784f907f0d8fc33949d0c933465cb570
|
||||
CVE-2022-29619,0,0,04616838172ccb6373be77762d8edb1438492c280de84e75a450a31e0392055d,2023-07-21T16:55:28.250000
|
||||
CVE-2022-2962,0,0,4bda1dc88413f0ce73dd3eed5ecc11ffeb5485f1edef4bdb55c675f17727b4b3,2023-06-28T20:40:49.643000
|
||||
CVE-2022-29620,0,0,2438a942554d3d3f0ef1f68ae9510bb3e56de95da9b83f6dc48791d3160004bc,2024-05-17T02:08:19.453000
|
||||
CVE-2022-29622,0,0,2358f0cab35f083c6ea218cc4e4c3b367c8b6eca287defb6c9c38e8408685ce3,2024-05-17T02:08:19.550000
|
||||
CVE-2022-29622,0,1,b1bd4620d2d3da889a4fd5b663a04ee4dd49925e9851e6f2812bdb5412cd599b,2024-07-02T21:15:10.390000
|
||||
CVE-2022-29623,0,0,f0f61383da3ef16de1f798f3a42e8485b6f0f77293ab82345f867acd3120c559,2022-05-24T20:14:43.230000
|
||||
CVE-2022-29624,0,0,63022d472eefe17122d555ac15c6ed08f13e85324e3dd023fb705b3fcea0bc9a,2022-06-11T02:26:12.640000
|
||||
CVE-2022-29627,0,0,abbdad8a7497f46959f3de961ed1f67cc3075f02885458d7de87213e93cbc0f3,2022-06-12T02:12:18.457000
|
||||
@ -198507,6 +198507,7 @@ CVE-2022-30632,0,0,f214153a7d78a1f18ea22ef856e8035d77e066ffe05cf4d3cd2d155a8fe2b
|
||||
CVE-2022-30633,0,0,b54ca08085af5e8cef18a74cec122d184dc8b4373d642fc24f7ba9cd5e61484d,2023-11-07T03:47:16.833000
|
||||
CVE-2022-30634,0,0,6756594dd3720ca90dbd7390befd3951adf8b8ddf821e4fa717ae67733da7843,2023-11-07T03:47:16.960000
|
||||
CVE-2022-30635,0,0,05b714781f3ac4496fa9fd2fec8e57abb3bdf107549dd52f7a6ca2248a8a28fe,2023-11-07T03:47:17.070000
|
||||
CVE-2022-30636,1,1,df65df6d00162ec5c51e728ac283a8b64cdff82eb9fad9e1d7038e5344dcc46f,2024-07-02T20:15:05.173000
|
||||
CVE-2022-30637,0,0,59aa98121a73381f879297e9c17146b4bb1b6e52c9c1e7f3e0a2be631b87e64a,2023-09-09T03:42:43.520000
|
||||
CVE-2022-30638,0,0,d268c0135ae5f7942a9397265321619b85cbe35450007798147fa4b1fe86d34d,2023-09-09T03:42:36.757000
|
||||
CVE-2022-30639,0,0,63e210ad5e4743756ed81cab634881e23db9b06e79d4bdff1a84f2aca5e5afc2,2023-09-09T03:42:18.143000
|
||||
@ -217971,6 +217972,7 @@ CVE-2023-24528,0,0,899533432d6d75cedea57fd4563bb59a08ab30d04e09c55b0e4759297d9a5
|
||||
CVE-2023-24529,0,0,d5ec6c7946d019b7d7e407212b00e6ee585f0c40c199c1d7212c76e02ba691c9,2023-04-11T22:15:08.633000
|
||||
CVE-2023-2453,0,0,35571d748e261a04ce5c1ada40f40e506192da5c60ca32152a9fefe31414f468,2023-09-08T17:27:41.190000
|
||||
CVE-2023-24530,0,0,819456e45a97d34c0861fc0ddba145d10cfdb134d103842d97b3038412001184,2023-04-11T22:15:08.690000
|
||||
CVE-2023-24531,1,1,fc3a256028dc5784865c8ad03aaa11c5d539b8376a35686eafced66686e50439,2024-07-02T20:15:05.270000
|
||||
CVE-2023-24532,0,0,933a884c817efe4414cd72b8f640229cca761b1f2eba3a0e93cdae834fbffd9a,2023-11-07T04:08:30.867000
|
||||
CVE-2023-24533,0,0,d66d114c302bdadf5cd961e00ee83c5556439c2ddedc40b37fc6e0dbe36b75d9,2023-11-07T04:08:31.050000
|
||||
CVE-2023-24534,0,0,32da01c00ffd6bfd831b88c5dab9cd458b775383e6192afc2c330a9197e1873e,2023-11-25T11:15:14.030000
|
||||
@ -237084,7 +237086,7 @@ CVE-2023-50376,0,0,c951f73eaa1568ec16d7bbf28755aacf2580409c4a177851a557b18edbeae
|
||||
CVE-2023-50377,0,0,3acd97ab69c2403c419288f2e19070989327aa6f1425e1a9c076820c259b93c2,2023-12-27T21:34:56.883000
|
||||
CVE-2023-50378,0,0,0f4c193757a21745622df68ec0aa88b8a213c4603a70a54e94c4c05a8dadb60b,2024-05-01T18:15:11.097000
|
||||
CVE-2023-50379,0,0,2ba768024158d3957bf97073914ab21cf6e76e13687c6569b9647fa3455e4c0b,2024-02-27T14:20:06.637000
|
||||
CVE-2023-5038,0,1,9789d7fc270f8e24fcc77f799772d0318c958da77096b1da9df8aa6a81266b91,2024-07-02T18:09:41.080000
|
||||
CVE-2023-5038,0,0,9789d7fc270f8e24fcc77f799772d0318c958da77096b1da9df8aa6a81266b91,2024-07-02T18:09:41.080000
|
||||
CVE-2023-50380,0,0,b5737d428cd7d3280b11a55da8c282450fdebb25171b34cbfbfc4de989e3a9f5,2024-02-28T14:06:45.783000
|
||||
CVE-2023-50386,0,0,eb9175c624998374fffbb8bbdcfbc3fcd759c84a0c5cafd0e6294c2d31318a7f,2024-02-15T18:40:48.837000
|
||||
CVE-2023-50387,0,0,86a696af4d06d31d7c5b6089ba1f856732aed20b18c54efa9645210962ecc2d6,2024-06-10T17:16:15.963000
|
||||
@ -251832,12 +251834,12 @@ CVE-2024-34592,0,0,1ee566894c302fe71c1461f3cb79ed1769518d89d3dacecde74d15f8e8648
|
||||
CVE-2024-34593,0,0,d0d46e6c2e8354b7e8a937f69d30c13f185f05d9ae10963fe18b687300e08e91,2024-07-02T18:00:59.957000
|
||||
CVE-2024-34594,0,0,3de419a0d5e895f0825619bb1589a252bf8b02077e22739a191c778c10e81ca5,2024-07-02T18:01:18.317000
|
||||
CVE-2024-34595,0,0,dd0586c7cfd65915e93146d51ca5ff123e3b81570ba9d26c8a9115ce97611928,2024-07-02T18:01:45.897000
|
||||
CVE-2024-34596,0,1,fcdc3c4cd7f2ddccc5baab24c45bb080a012db69a4c4fd9d1e2199232a02d063,2024-07-02T18:04:25.130000
|
||||
CVE-2024-34597,0,1,13b9d58520354a07fd602b21daf74a4b55131c9cdff7953a8f333c22c9abc246,2024-07-02T18:04:57.147000
|
||||
CVE-2024-34599,0,1,a6a02ad306f0c667d9b45f855de943b1e86d6818ea503b59522cbea821b71615,2024-07-02T18:05:26.327000
|
||||
CVE-2024-34596,0,0,fcdc3c4cd7f2ddccc5baab24c45bb080a012db69a4c4fd9d1e2199232a02d063,2024-07-02T18:04:25.130000
|
||||
CVE-2024-34597,0,0,13b9d58520354a07fd602b21daf74a4b55131c9cdff7953a8f333c22c9abc246,2024-07-02T18:04:57.147000
|
||||
CVE-2024-34599,0,0,a6a02ad306f0c667d9b45f855de943b1e86d6818ea503b59522cbea821b71615,2024-07-02T18:05:26.327000
|
||||
CVE-2024-3460,0,0,5d753d09cd0688d7cf59cbd53a149eb7d45b8f22859b402f63de2cfaab817466,2024-05-14T16:11:39.510000
|
||||
CVE-2024-34600,0,1,35051d817085423dbdeb6ae129690762237334bf5ea735f991f5984e5199c534,2024-07-02T18:05:54.487000
|
||||
CVE-2024-34601,0,1,ba64108f851deae844e8486d0d241f7b45e96c9b76d20a149cd00653a5152768,2024-07-02T18:07:05.737000
|
||||
CVE-2024-34600,0,0,35051d817085423dbdeb6ae129690762237334bf5ea735f991f5984e5199c534,2024-07-02T18:05:54.487000
|
||||
CVE-2024-34601,0,0,ba64108f851deae844e8486d0d241f7b45e96c9b76d20a149cd00653a5152768,2024-07-02T18:07:05.737000
|
||||
CVE-2024-3461,0,0,2a4b7c0e1a8d6b06d86abf0c486b3a9f2d1fa6266081d4aec9284221b4574ee3,2024-05-14T16:11:39.510000
|
||||
CVE-2024-3462,0,0,42d76b75905cddaca7c4512a98c3e5490f6eba6d1a37db8a52d4bde8c84e9ded,2024-05-14T16:11:39.510000
|
||||
CVE-2024-3463,0,0,ec14f43c3b7b14f535006ee59b80bf351769520d95be8808071caf75bd274960,2024-05-17T02:39:57.447000
|
||||
@ -253702,7 +253704,7 @@ CVE-2024-38385,0,0,6ede95b10b5fd3bf97325d6d6e002e23e38a0e008a909e36d40ae711b1be8
|
||||
CVE-2024-38388,0,0,7c0bb01f9b9fb79d83dbd6e2c27fd6e239bc8d3e90d248b1b279840e35bf7176,2024-06-21T11:22:01.687000
|
||||
CVE-2024-3839,0,0,5078cfd1c7c68c41b30fd8b0c9c6a095120ec81bc8166ccecb75ba3c8be530b5,2024-05-03T04:15:09.127000
|
||||
CVE-2024-38390,0,0,d3cec8cf37055d7984956bdcdf2d47c2af6b037bed7779bdf5635c68af266a42,2024-06-21T11:22:01.687000
|
||||
CVE-2024-38391,0,0,206598253aa7ecd2c57a2dfa2300253bd76dfb89400b4ffe2d9c269e1efae83b,2024-06-21T11:22:01.687000
|
||||
CVE-2024-38391,0,1,20b04656bf618f5c1be614d3d82a6f2592410c65ddd3dee3dc7474add7c8b054,2024-07-02T20:15:05.730000
|
||||
CVE-2024-38394,0,0,e137788f2ebaaff770e93d05b803eb38e4472ac7dca49b0dd757c03a760061e9,2024-06-17T16:15:15.823000
|
||||
CVE-2024-38395,0,0,d27ba93e3eeea55e9457aaa415d612188b65281d83702a0692924b8f50b6f403,2024-06-17T15:15:51.900000
|
||||
CVE-2024-38396,0,0,bffab7577ddd6f3e534c9843cfe717401724eb3ef56d29d3dd43a2efef3ab79d,2024-06-17T15:15:52.007000
|
||||
@ -253768,6 +253770,7 @@ CVE-2024-3853,0,0,da9bcb4a065926b49732a0dd79b2f07a12fd9777c9341906bc363e07df8725
|
||||
CVE-2024-38531,0,0,b56de69adb9e29b508ff804eef5c2919280b3646aaf65838ea0969fdce8b1636,2024-07-01T12:37:24.220000
|
||||
CVE-2024-38532,0,0,3a3b54122bd6780d32b0357101fa3b70c56bf5cfbd9b29132bcf407b07a6cf4a,2024-07-01T12:37:24.220000
|
||||
CVE-2024-38533,0,0,bc3eb3ef979bf5295d109db19e6d12afcecc2e011ea06aeec96e0b38c48ef42a,2024-07-01T12:37:24.220000
|
||||
CVE-2024-38537,1,1,b13261faf80ca2cfe6630aff4816c714858af9e7bce4a6263f68e63ffd658697,2024-07-02T20:15:05.860000
|
||||
CVE-2024-38538,0,0,fd8d0c414421b9d83404be9e58919f8d1c04c080d100c149e46c3a374cade8e2,2024-06-20T12:44:01.637000
|
||||
CVE-2024-38539,0,0,bb07b10cb8e27f63a4ad4d8d9f4efc546da28e9a77992ff13895f8e8066ae4a7,2024-06-20T12:44:01.637000
|
||||
CVE-2024-3854,0,0,1fc25728bc86cd277ba270d144040c69a89e438f315d3ebf85291cac5fb28ebb,2024-04-22T10:15:07.470000
|
||||
@ -253980,7 +253983,7 @@ CVE-2024-3916,0,0,67c028ed5cffa81651cfdb7590d8583ba32a4964953feede869ed8c9f6426e
|
||||
CVE-2024-3917,0,0,55f83f03b9292263c532dbe29e254e7b9925f1a39645bd6835596489dfabe52b,2024-05-24T01:15:30.977000
|
||||
CVE-2024-3918,0,0,f0312710b8f2207cc4daf3e960aa8906c7e8839f8babda55f2853fd4763a97f9,2024-05-24T01:15:30.977000
|
||||
CVE-2024-3920,0,0,5dbee28fbacc5f4bbc65481ff7f645499d60469b501d304207882ca441f74491,2024-05-24T01:15:30.977000
|
||||
CVE-2024-39206,1,1,8cab33503027debb462a815aaa1f3da3d0625928338f1e658c10a9f2aa642bef,2024-07-02T18:15:03.290000
|
||||
CVE-2024-39206,0,0,8cab33503027debb462a815aaa1f3da3d0625928338f1e658c10a9f2aa642bef,2024-07-02T18:15:03.290000
|
||||
CVE-2024-39207,0,0,d8e667b43b76095c528f5867a8617c4177e3d9ac8aefab820b7b82f9e44a4991,2024-06-28T10:27:00.920000
|
||||
CVE-2024-39208,0,0,299e5852229d2647ff0440f276fa367c28bfc141139d729c8061f6806a3c58e2,2024-06-28T10:27:00.920000
|
||||
CVE-2024-39209,0,0,846eb9e93730bd8a4e0e342a01db126b493a0877c61de0d40de722388e34129c,2024-06-28T10:27:00.920000
|
||||
@ -254016,9 +254019,14 @@ CVE-2024-3931,0,0,ff26b5a8728d6a7f3e1f8095f9d431d98f0c624577950ceaf4dc1cf9ad6880
|
||||
CVE-2024-39310,0,0,187be4dc945171a7657d1459e6c80fed53aa1f7d448ef02205a5dc997f08bebc,2024-07-02T12:09:16.907000
|
||||
CVE-2024-39313,0,0,9e833554bfb77c34493fd31ffb1eaf0ef9773e2886372005ffb0d80f9a99cb5e,2024-07-02T12:09:16.907000
|
||||
CVE-2024-39314,0,0,f08a68c1585aac53ed3340b30b7ca1fee7f99b287e34df66dd62620bc6eee2c4,2024-07-02T12:09:16.907000
|
||||
CVE-2024-39315,1,1,c5bbf81bf069b4fb24aabf28416dacd9ae348b783f7fe91b0c98e926aeb81fe0,2024-07-02T20:15:06.110000
|
||||
CVE-2024-39316,0,0,d47aca3c5197170fc8f05033ffa682fd40e1aa1436fadb43bcca23faeaecd5c8,2024-07-02T17:44:45.700000
|
||||
CVE-2024-3932,0,0,371291a71f9c99e371f96e7d7b61e3e11967567047c07fae80310c4772d1c0c7,2024-06-06T20:15:14.030000
|
||||
CVE-2024-39322,1,1,171a1e59b227f6655441aecfe36fb284632d041071b03b3a000a2ccc0feb4a76,2024-07-02T21:15:10.997000
|
||||
CVE-2024-39323,0,0,8b592e233643a568789a282215e3d651e9257e7274946ce7dfcbad9339346353,2024-07-02T17:44:45.700000
|
||||
CVE-2024-39324,1,1,04ab9c8763685159f533c7d96d83ab8247d560d949d6ea5428fce08afab5bc1d,2024-07-02T21:15:11.213000
|
||||
CVE-2024-39325,1,1,fb628c0a6246b721ccdcf88743ebf44736eda766d0e7d7c4b84f8d1662576544,2024-07-02T21:15:11.433000
|
||||
CVE-2024-39326,1,1,a16c463704800186fd98549c3f5764f8d0de863d0b43b19aa8b0f49702f6b013,2024-07-02T21:15:11.657000
|
||||
CVE-2024-3933,0,0,1d08d4e317596700be65ef5300f76b449794bb2d8b1542a98c34b9cd74fea015,2024-05-28T12:39:28.377000
|
||||
CVE-2024-39331,0,0,c5bb3e665b31aacdbf907c7032da4f6d49d6bc82a59a96e6be39b1d4f66a92fd,2024-06-29T07:15:02.060000
|
||||
CVE-2024-39334,0,0,7a242c73a28ed17874e43348a26da2104869d7ef8d91c48fe0d8d7e00f57c31d,2024-06-24T12:57:36.513000
|
||||
@ -254030,7 +254038,7 @@ CVE-2024-39350,0,0,2818f75b3d24495902c39d5dd3d46a13088a057469d774fcd7dea3e2c6f7b
|
||||
CVE-2024-39351,0,0,73835562ac8c8f624018ac3f57736429a15ab60f19fdda354656ce6bebf2a36c,2024-06-28T10:27:00.920000
|
||||
CVE-2024-39352,0,0,a6ac4cc6df4e978ab98d2526b0d0ca42ad6af92292b36fb34063680949363975,2024-06-28T10:27:00.920000
|
||||
CVE-2024-3936,0,0,1a9ebdb5653b792bdb8abb0138184d539d6d0e0c9af8da519de630a92cc0aee0,2024-05-02T18:00:37.360000
|
||||
CVE-2024-39362,0,0,bcce186b51714eacaaf90ea1482046e3d6827a91536ea638843d27b3ed4e9904,2024-06-25T18:50:42.040000
|
||||
CVE-2024-39362,0,1,a4e72d457ad79497d234146ef4f9a3e9f07fed3f9039766cdc9d7026e27b2016,2024-07-02T20:15:06.353000
|
||||
CVE-2024-3937,0,0,47b49a69bcae07617978c4de23b5bd0d4eef565a4a3d61421481625d7a4abea5,2024-05-29T13:02:09.280000
|
||||
CVE-2024-39371,0,0,8c1a1238e769d76e82e2c2cc608bc61bb27789621e5380cf2965b3d5a5e744e4,2024-06-25T18:50:42.040000
|
||||
CVE-2024-39373,0,0,e8547465f255c8b2bfa815c6c69701860e17426665d7ce1342eed3a8c2dce8f2,2024-06-27T17:11:52.390000
|
||||
@ -254102,8 +254110,8 @@ CVE-2024-39878,0,0,038c252a5df59aef0ff494dd466e8c23160164cb5ac894aeb1a33e06001b7
|
||||
CVE-2024-39879,0,0,1b030ce3798bca0bad33a3937cca95b776786d7918bf02f25bff668e667acaa0,2024-07-02T12:09:16.907000
|
||||
CVE-2024-3988,0,0,ed49ad0e503298ba2fe40c90a665a86dcb918b5087ac61c1edfd746c2ca95d24,2024-04-25T13:18:13.537000
|
||||
CVE-2024-3989,0,0,41a6b1dcae0354fb8cba40366dc7ed1eeb84d6a6a33689c35123198fe63c8f01,2024-05-14T16:11:39.510000
|
||||
CVE-2024-39891,1,1,3d4b41a13a0ab5478a6ca83e6f5ba1427c7171d941e8b0954e51acc85bbc9f29,2024-07-02T18:15:03.447000
|
||||
CVE-2024-39894,1,1,c968489b60e34628f9bade5d12d3eb7cbc6bf7492988d91234687e1aa6697daf,2024-07-02T18:15:03.710000
|
||||
CVE-2024-39891,0,0,3d4b41a13a0ab5478a6ca83e6f5ba1427c7171d941e8b0954e51acc85bbc9f29,2024-07-02T18:15:03.447000
|
||||
CVE-2024-39894,0,0,c968489b60e34628f9bade5d12d3eb7cbc6bf7492988d91234687e1aa6697daf,2024-07-02T18:15:03.710000
|
||||
CVE-2024-3990,0,0,7879115af68e1891db08bd2dafc44fb55db15680f59885de2ed87fd5c16d9492,2024-05-14T16:11:39.510000
|
||||
CVE-2024-3991,0,0,f4b27e31b2ebe06401478accd9d85264142bf207d27ef139c240399354705c4f,2024-05-02T18:00:37.360000
|
||||
CVE-2024-3992,0,0,ff644523dcb07d662c2bf53b9e125872cf5c9b9df16e03b5f8dec25363b303ae,2024-06-17T12:42:04.623000
|
||||
@ -254321,7 +254329,7 @@ CVE-2024-4264,0,0,fb86e94ce42096b29068bc1af12f8df8e421d67d4a541250a03ae9bd98f162
|
||||
CVE-2024-4265,0,0,91d38fbd7b9c4ea0cd26c0f2028b5e1f8ee8c7d7e1c2c632d6b17cd2b7b69603,2024-05-02T18:00:37.360000
|
||||
CVE-2024-4266,0,0,116b52a29fd0a6039b308734c72b0d2ae8aa871f2547c292da7232e2003a6f6b,2024-06-11T13:54:12.057000
|
||||
CVE-2024-4267,0,0,ce2653255d43ae5f4599b240b7efe5c0da7fc5b70a5363cdc03dcce3fe58b4ed,2024-05-24T01:15:30.977000
|
||||
CVE-2024-4268,0,1,4f824af91b8247c9f369d98ed14c3e2969490987896e9e03e4f753eb7f103f3a,2024-07-02T18:08:17.817000
|
||||
CVE-2024-4268,0,0,4f824af91b8247c9f369d98ed14c3e2969490987896e9e03e4f753eb7f103f3a,2024-07-02T18:08:17.817000
|
||||
CVE-2024-4270,0,0,dae68ba24abb4217ea4781a91ce52781cf47607cfd48397395ee3a58fe8e32d1,2024-06-17T12:42:04.623000
|
||||
CVE-2024-4271,0,0,b387f99302f91201ccece9e8c147bcdfc30a6615cd2543471e3490cd41180d93,2024-06-17T12:42:04.623000
|
||||
CVE-2024-4273,0,0,136233599d68a0536ba99c3313767218f535edf424c12fad350903aa42bf81fa,2024-06-04T16:57:41.053000
|
||||
@ -255587,8 +255595,8 @@ CVE-2024-6006,0,0,9edb8ca4c0dd0d4558b143fb832fc42b328bff9f4b383b9f92efc4408ae0b0
|
||||
CVE-2024-6007,0,0,10a5bf7c2814f8c45b29a7830a1e182f887cf45831b7092d81e48bb44ca9bf15,2024-06-17T12:42:04.623000
|
||||
CVE-2024-6008,0,0,c91774daf5e01f51e3ed230da10d811f428be9da4023af41a23643597eb98c00,2024-06-17T16:15:16.140000
|
||||
CVE-2024-6009,0,0,468577c4db742932e2254bcba365ac1e04c74b564538fb241a46994d66ec19d6,2024-06-17T12:42:04.623000
|
||||
CVE-2024-6011,0,1,dbfe34d08d913fed3fe65c2dbee56080431baf13326e1312e38a9909dc7ace99,2024-07-02T18:07:31.577000
|
||||
CVE-2024-6012,0,1,1211f74927850d1cfa08a87570ca9d2ab2f4417a41bad983e72a2d4354dee21b,2024-07-02T18:07:54.430000
|
||||
CVE-2024-6011,0,0,dbfe34d08d913fed3fe65c2dbee56080431baf13326e1312e38a9909dc7ace99,2024-07-02T18:07:31.577000
|
||||
CVE-2024-6012,0,0,1211f74927850d1cfa08a87570ca9d2ab2f4417a41bad983e72a2d4354dee21b,2024-07-02T18:07:54.430000
|
||||
CVE-2024-6013,0,0,44159fdbcbcac2a689071de339f13c4fefa84302df10ce908aefe802918d324e,2024-06-17T12:42:04.623000
|
||||
CVE-2024-6014,0,0,6f42b027c41cbc2bef7f3eccd4ed3d2b0646bd4a1028da377690698f14644291,2024-06-17T12:42:04.623000
|
||||
CVE-2024-6015,0,0,b5dd732698ac918c4f9a100a042e5587c72b21ba3272e6fc136fa01311e31fdc,2024-06-17T15:15:52.830000
|
||||
@ -255627,9 +255635,9 @@ CVE-2024-6083,0,0,7e7a5636ed7255d0fcfcd2ad673b2a41cb1a824617e25b4cc387230a5aebb3
|
||||
CVE-2024-6084,0,0,7af730199a10f594b6ce1f1e9ecc3a7779c7858f9e2bf364f776ef80922995a6,2024-06-20T12:44:01.637000
|
||||
CVE-2024-6085,0,0,9ec0c5a378f12acda708e36f1fd937b6a37e47da0cf78939f5184a1970e8c26d,2024-06-27T19:25:12.067000
|
||||
CVE-2024-6086,0,0,14860ec6fbd88099fa44eea5d54e4e6e3888339b61c575153074e11ddcd05154,2024-06-27T19:25:12.067000
|
||||
CVE-2024-6088,0,1,a9d7c0ac6c95b2bd9561bfed56970b72620e229b5cd314eccacff68acf7494cb,2024-07-02T18:08:38.550000
|
||||
CVE-2024-6088,0,0,a9d7c0ac6c95b2bd9561bfed56970b72620e229b5cd314eccacff68acf7494cb,2024-07-02T18:08:38.550000
|
||||
CVE-2024-6090,0,0,bdfb03b5dff367089b0030453781624b3aa54f3ea84f8c38b9ecc3c69b89e51c,2024-06-27T19:25:12.067000
|
||||
CVE-2024-6099,0,1,08d6fd232c5f13b0914a67a7bc8e701fe1f9a81567c563142a725dcdef9d6a6d,2024-07-02T18:08:53.233000
|
||||
CVE-2024-6099,0,0,08d6fd232c5f13b0914a67a7bc8e701fe1f9a81567c563142a725dcdef9d6a6d,2024-07-02T18:08:53.233000
|
||||
CVE-2024-6100,0,0,2b903b3a6c63696aea9a10797071b5fd7d0b6547a8f1416ee7dc4ff992de4ff5,2024-06-21T13:15:13.077000
|
||||
CVE-2024-6101,0,0,3b6bc52ab046ce2a9a29c26d80fa3342c59ba956272c0888c64da753b102c8a5,2024-06-21T13:15:13.187000
|
||||
CVE-2024-6102,0,0,229621a473a3fa4bd90193f7d8f9e1a06a3142a4c3e1de71a8a1ff5fb584365f,2024-06-21T13:15:13.277000
|
||||
@ -255738,7 +255746,7 @@ CVE-2024-6306,0,0,711bff153bb36aca97259b9a58665f79686710d592de1aed3b99962d3c3067
|
||||
CVE-2024-6307,0,0,a6037df0fa8617c9aaeffdc703000fa7423e885d439338f30eb38eb0279e87b9,2024-06-28T13:15:03.453000
|
||||
CVE-2024-6308,0,0,483bab7c0040f40965fba497a0be9e45fef6974a263c54d39149185a218f4b43,2024-06-25T21:16:02.087000
|
||||
CVE-2024-6323,0,0,16f93962f537d8478d96317e8b0d9cad0e3aee225ed0ebdb8d6f6bf214bb804e,2024-06-28T13:15:19.317000
|
||||
CVE-2024-6341,1,1,528f4fdde1526d72477e90a767b2f2316b168f65b64effeddb9446d8a5cdcaf5,2024-07-02T18:15:03.900000
|
||||
CVE-2024-6341,0,0,528f4fdde1526d72477e90a767b2f2316b168f65b64effeddb9446d8a5cdcaf5,2024-07-02T18:15:03.900000
|
||||
CVE-2024-6344,0,0,f8fe072181ab91a453822e0b523eb31f74817bc4efb68c7d2134a2d41a8e3557,2024-06-27T00:15:13.360000
|
||||
CVE-2024-6349,0,0,f01d61e3475192c945ec3639c2eda3b231a23d2f279c2f15b4719385fb2bd065,2024-06-26T15:15:20.690000
|
||||
CVE-2024-6354,0,0,b70a2915a44ee7e7e6c00925c9a92ab9e6b070beaff28ea6d89d1a4dcb2a10e6,2024-06-27T12:47:19.847000
|
||||
@ -255754,9 +255762,9 @@ CVE-2024-6373,0,0,ffc7549884eeecbe338ce0f17f670d62abf2209962cbc27b0291f9ddbed7c1
|
||||
CVE-2024-6374,0,0,951e3f10ed1a8de2c137bcf7721b529de76cab1c6430f8094753092eaf9ecd40,2024-06-27T17:11:52.390000
|
||||
CVE-2024-6375,0,0,63966b93eb46e16d023260fad8c0d7013b7249b4716b3dc1473565015805b694,2024-07-01T16:37:39.040000
|
||||
CVE-2024-6376,0,0,5b1144f575b26ee71024cb47efd50b0c100b6444589a68c6e121da4ff25018c3,2024-07-01T16:37:39.040000
|
||||
CVE-2024-6381,1,1,a09652e91088f2db66780ef34f86f48ba3a9585a4235bac448c9de5b7fb0f71a,2024-07-02T18:15:03.963000
|
||||
CVE-2024-6382,1,1,7e5cb9f8ced547c25e3e6457ed9c604091d0375fe07946f8cc94b1c315e5b165,2024-07-02T18:15:04.337000
|
||||
CVE-2024-6387,0,1,a0c29745cdbaa40491ee5b9f8fafb66b569aff5358e60e1fa7646d0d233aa9d4,2024-07-02T19:15:12.773000
|
||||
CVE-2024-6381,0,0,a09652e91088f2db66780ef34f86f48ba3a9585a4235bac448c9de5b7fb0f71a,2024-07-02T18:15:03.963000
|
||||
CVE-2024-6382,0,0,7e5cb9f8ced547c25e3e6457ed9c604091d0375fe07946f8cc94b1c315e5b165,2024-07-02T18:15:04.337000
|
||||
CVE-2024-6387,0,0,a0c29745cdbaa40491ee5b9f8fafb66b569aff5358e60e1fa7646d0d233aa9d4,2024-07-02T19:15:12.773000
|
||||
CVE-2024-6388,0,0,e641c9d869769d4291da87145b48d15b4f200c046d6b100142bc686375a84738,2024-06-27T17:11:52.390000
|
||||
CVE-2024-6402,0,0,795485c4534407e246daec51c1daaa33b95f6651688fed743a8fb9054cdaedba,2024-07-01T12:37:24.220000
|
||||
CVE-2024-6403,0,0,e44b9cfa8d9ae367e624a8cdf179ef52ea1e98c2115d7a956299d17747a6a56b,2024-07-01T12:37:24.220000
|
||||
@ -255773,3 +255781,4 @@ CVE-2024-6438,0,0,c89c4e3ccf031fb42672508ffc0236a74fd652409f3f814c1aa7277296a221
|
||||
CVE-2024-6439,0,0,1bd5e2a149e15b87b2ec1d9e23e870c4f5a97c502c5089c3f0a60fbd028209c7,2024-07-02T17:58:39.773000
|
||||
CVE-2024-6440,0,0,4db20ef0878ff896f7a92a0fb63819a7fd586b5cd61940caee4cf26cda6cf8f9,2024-07-02T17:58:15.410000
|
||||
CVE-2024-6441,0,0,fadd9560f894739af460dd107a14c73f394f82b357796461abb110045106f46c,2024-07-02T17:44:45.700000
|
||||
CVE-2024-6452,1,1,c5351dc5e4a17b0c64a0b82d5ad2914d7d7c7e83140585c70101988d17ac33d5,2024-07-02T20:15:06.860000
|
||||
|
Can't render this file because it is too large.
|
Loading…
x
Reference in New Issue
Block a user