mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-07-09 16:05:11 +00:00
Auto-Update: 2024-06-13T16:00:19.166411+00:00
This commit is contained in:
parent
b2f82fb792
commit
ce1aeaac71
15
CVE-2021/CVE-2021-42xx/CVE-2021-4237.json
Normal file
15
CVE-2021/CVE-2021-42xx/CVE-2021-4237.json
Normal file
@ -0,0 +1,15 @@
|
||||
{
|
||||
"id": "CVE-2021-4237",
|
||||
"sourceIdentifier": "security@golang.org",
|
||||
"published": "2024-06-13T15:15:50.347",
|
||||
"lastModified": "2024-06-13T15:15:50.347",
|
||||
"vulnStatus": "Rejected",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Rejected reason: reserved but not needed"
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": []
|
||||
}
|
@ -2,114 +2,14 @@
|
||||
"id": "CVE-2021-47543",
|
||||
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"published": "2024-05-24T15:15:18.777",
|
||||
"lastModified": "2024-06-10T18:31:52.387",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2024-06-13T14:15:10.547",
|
||||
"vulnStatus": "Rejected",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\nperf report: Fix memory leaks around perf_tip()\n\nperf_tip() may allocate memory or use a literal, this means memory\nwasn't freed if allocated. Change the API so that literals aren't used.\n\nAt the same time add missing frees for system_path. These issues were\nspotted using leak sanitizer."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "En el kernel de Linux, se resolvi\u00f3 la siguiente vulnerabilidad: informe de rendimiento: corrige p\u00e9rdidas de memoria en torno a perf_tip() perf_tip() puede asignar memoria o usar un literal, esto significa que la memoria no se liber\u00f3 si se asign\u00f3. Cambie la API para que no se utilicen literales. Al mismo tiempo, agregue los espacios libres que faltan para system_path. Estos problemas se detectaron utilizando un sanitizante para fugas."
|
||||
"value": "Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 5.5,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-401"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "5.4.164",
|
||||
"matchCriteriaId": "D9D4A7FF-D4E4-4E2E-AB03-A61A4AB3A757"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "5.5",
|
||||
"versionEndExcluding": "5.10.84",
|
||||
"matchCriteriaId": "AE5B4333-2C46-40C3-8B42-0168AD91DDE1"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "5.11",
|
||||
"versionEndExcluding": "5.15.7",
|
||||
"matchCriteriaId": "A696A60B-2782-4119-83DD-1EFFBC903F02"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/71e284dcebecb9fd204ff11097469cc547723ad1",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/d9fc706108c15f8bc2d4ccccf8e50f74830fabd9",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/df5990db088d4c7fea9a2f9b8195a7859e1768c4",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/ff061b5bda73c4f785b4703eeb0848fd99e5608a",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
}
|
||||
]
|
||||
"metrics": {},
|
||||
"references": []
|
||||
}
|
@ -2,142 +2,14 @@
|
||||
"id": "CVE-2021-47545",
|
||||
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"published": "2024-05-24T15:15:19.200",
|
||||
"lastModified": "2024-06-10T18:31:09.543",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2024-06-13T14:15:10.783",
|
||||
"vulnStatus": "Rejected",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\nperf hist: Fix memory leak of a perf_hpp_fmt\n\nperf_hpp__column_unregister() removes an entry from a list but doesn't\nfree the memory causing a memory leak spotted by leak sanitizer.\n\nAdd the free while at the same time reducing the scope of the function\nto static."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "En el kernel de Linux, se resolvi\u00f3 la siguiente vulnerabilidad: perf hist: corrige la p\u00e9rdida de memoria de un perf_hpp_fmt perf_hpp__column_unregister() elimina una entrada de una lista pero no libera la memoria, lo que provoca una p\u00e9rdida de memoria detectada por el sanitizante de fugas. Agregue free y al mismo tiempo reduzca el alcance de la funci\u00f3n a est\u00e1tico."
|
||||
"value": "Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 5.5,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-401"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "4.14.257",
|
||||
"matchCriteriaId": "AC83C406-105B-497E-BD04-BC75618864B4"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "4.15",
|
||||
"versionEndExcluding": "4.19.220",
|
||||
"matchCriteriaId": "FFE5D9F3-CF1C-4DE8-9116-2EBE7BDEF7FD"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "4.20",
|
||||
"versionEndExcluding": "5.4.164",
|
||||
"matchCriteriaId": "D2D8DC10-1823-4334-BD0F-C1B620602FF9"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "5.5",
|
||||
"versionEndExcluding": "5.10.84",
|
||||
"matchCriteriaId": "AE5B4333-2C46-40C3-8B42-0168AD91DDE1"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "5.11",
|
||||
"versionEndExcluding": "5.15.7",
|
||||
"matchCriteriaId": "A696A60B-2782-4119-83DD-1EFFBC903F02"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/0ca1f534a776cc7d42f2c33da4732b74ec2790cd",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/24a139c105fa0f7f99888cf328bf6a02fc841675",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/5b5c6f57a1f81499db4c8ea597898cb1b87de0b6",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/a4c17ebdd6249cb4e061358d3693383f6628e069",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/b380d09e44e8479e71e3ae8446b515a5b3166244",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/c5c8a26c0dc69a400553245e92d741fe55f91095",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
}
|
||||
]
|
||||
"metrics": {},
|
||||
"references": []
|
||||
}
|
67
CVE-2024/CVE-2024-223xx/CVE-2024-22333.json
Normal file
67
CVE-2024/CVE-2024-223xx/CVE-2024-22333.json
Normal file
@ -0,0 +1,67 @@
|
||||
{
|
||||
"id": "CVE-2024-22333",
|
||||
"sourceIdentifier": "psirt@us.ibm.com",
|
||||
"published": "2024-06-13T14:15:11.110",
|
||||
"lastModified": "2024-06-13T14:15:11.110",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "IBM Maximo Asset Management 7.6.1.3 and IBM Maximo Application Suite 8.10 and 8.11 allows web pages to be stored locally which can be read by another user on the system. IBM X-Force ID: 279973."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "IBM Maximo Asset Management 7.6.1.3 e IBM Maximo Application Suite 8.10 y 8.11 permiten almacenar p\u00e1ginas web localmente que pueden ser le\u00eddas por otro usuario en el sistema. ID de IBM X-Force: 279973."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "psirt@us.ibm.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 4.0,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.5,
|
||||
"impactScore": 1.4
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "psirt@us.ibm.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-525"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/279973",
|
||||
"source": "psirt@us.ibm.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.ibm.com/support/pages/node/7157256",
|
||||
"source": "psirt@us.ibm.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.ibm.com/support/pages/node/7157257",
|
||||
"source": "psirt@us.ibm.com"
|
||||
}
|
||||
]
|
||||
}
|
63
CVE-2024/CVE-2024-250xx/CVE-2024-25052.json
Normal file
63
CVE-2024/CVE-2024-250xx/CVE-2024-25052.json
Normal file
@ -0,0 +1,63 @@
|
||||
{
|
||||
"id": "CVE-2024-25052",
|
||||
"sourceIdentifier": "psirt@us.ibm.com",
|
||||
"published": "2024-06-13T14:15:11.370",
|
||||
"lastModified": "2024-06-13T14:15:11.370",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "IBM Jazz Reporting Service 7.0.3 stores user credentials in plain clear text which can be read by an admin user. IBM X-Force ID: 283363."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "IBM Jazz Reporting Service 7.0.3 almacena las credenciales de usuario en texto plano que puede ser le\u00eddo por un usuario administrador. ID de IBM X-Force: 283363."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "psirt@us.ibm.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "HIGH",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 4.4,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 0.8,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "psirt@us.ibm.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-256"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/283363",
|
||||
"source": "psirt@us.ibm.com"
|
||||
},
|
||||
{
|
||||
"url": "https://https://www.ibm.com/support/pages/node/7157232",
|
||||
"source": "psirt@us.ibm.com"
|
||||
}
|
||||
]
|
||||
}
|
55
CVE-2024/CVE-2024-289xx/CVE-2024-28965.json
Normal file
55
CVE-2024/CVE-2024-289xx/CVE-2024-28965.json
Normal file
@ -0,0 +1,55 @@
|
||||
{
|
||||
"id": "CVE-2024-28965",
|
||||
"sourceIdentifier": "security_alert@emc.com",
|
||||
"published": "2024-06-13T15:15:51.033",
|
||||
"lastModified": "2024-06-13T15:15:51.033",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Dell SCG, versions prior to 5.24.00.00, contain an Improper Access Control vulnerability in the SCG exposed for an internal enable REST API (if enabled by Admin user from UI). A remote low privileged attacker could potentially exploit this vulnerability, leading to the execution of certain Internal APIs applicable only for Admin Users on the application's backend database that could potentially allow an unauthorized user access to restricted resources and change of state."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security_alert@emc.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 5.4,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 2.5
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security_alert@emc.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-284"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.dell.com/support/kbdoc/en-us/000225910/dsa-2024-181-security-update-for-dell-secure-connect-gateway-application-and-appliance-vulnerabilities",
|
||||
"source": "security_alert@emc.com"
|
||||
}
|
||||
]
|
||||
}
|
55
CVE-2024/CVE-2024-289xx/CVE-2024-28966.json
Normal file
55
CVE-2024/CVE-2024-289xx/CVE-2024-28966.json
Normal file
@ -0,0 +1,55 @@
|
||||
{
|
||||
"id": "CVE-2024-28966",
|
||||
"sourceIdentifier": "security_alert@emc.com",
|
||||
"published": "2024-06-13T15:15:51.423",
|
||||
"lastModified": "2024-06-13T15:15:51.423",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Dell SCG, versions prior to 5.24.00.00, contain an Improper Access Control vulnerability in the SCG exposed for an internal update REST API (if enabled by Admin user from UI). A remote low privileged attacker could potentially exploit this vulnerability, leading to the execution of certain APIs applicable only for Admin Users on the application's backend database that could potentially allow an unauthorized user access to restricted resources and change of state."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security_alert@emc.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 5.4,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 2.5
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security_alert@emc.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-284"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.dell.com/support/kbdoc/en-us/000225910/dsa-2024-181-security-update-for-dell-secure-connect-gateway-application-and-appliance-vulnerabilities",
|
||||
"source": "security_alert@emc.com"
|
||||
}
|
||||
]
|
||||
}
|
55
CVE-2024/CVE-2024-289xx/CVE-2024-28967.json
Normal file
55
CVE-2024/CVE-2024-289xx/CVE-2024-28967.json
Normal file
@ -0,0 +1,55 @@
|
||||
{
|
||||
"id": "CVE-2024-28967",
|
||||
"sourceIdentifier": "security_alert@emc.com",
|
||||
"published": "2024-06-13T15:15:51.660",
|
||||
"lastModified": "2024-06-13T15:15:51.660",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Dell SCG, versions prior to 5.24.00.00, contain an Improper Access Control vulnerability in the SCG exposed for an internal maintenance REST API (if enabled by Admin user from UI). A remote low privileged attacker could potentially exploit this vulnerability, leading to the execution of certain APIs applicable only for Admin Users on the application's backend database that could potentially allow an unauthorized user access to restricted resources and change of state."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security_alert@emc.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 5.4,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 2.5
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security_alert@emc.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-284"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.dell.com/support/kbdoc/en-us/000225910/dsa-2024-181-security-update-for-dell-secure-connect-gateway-application-and-appliance-vulnerabilities",
|
||||
"source": "security_alert@emc.com"
|
||||
}
|
||||
]
|
||||
}
|
55
CVE-2024/CVE-2024-289xx/CVE-2024-28968.json
Normal file
55
CVE-2024/CVE-2024-289xx/CVE-2024-28968.json
Normal file
@ -0,0 +1,55 @@
|
||||
{
|
||||
"id": "CVE-2024-28968",
|
||||
"sourceIdentifier": "security_alert@emc.com",
|
||||
"published": "2024-06-13T15:15:51.890",
|
||||
"lastModified": "2024-06-13T15:15:51.890",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Dell SCG, versions prior to 5.24.00.00, contain an Improper Access Control vulnerability in the SCG exposed for internal email and collection settings REST APIs (if enabled by Admin user from UI). A remote low privileged attacker could potentially exploit this vulnerability, leading to the execution of certain APIs applicable only for Admin Users on the application's backend database that could potentially allow an unauthorized user access to restricted resources and change of state."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security_alert@emc.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 5.4,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 2.5
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security_alert@emc.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-284"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.dell.com/support/kbdoc/en-us/000225910/dsa-2024-181-security-update-for-dell-secure-connect-gateway-application-and-appliance-vulnerabilities",
|
||||
"source": "security_alert@emc.com"
|
||||
}
|
||||
]
|
||||
}
|
55
CVE-2024/CVE-2024-289xx/CVE-2024-28969.json
Normal file
55
CVE-2024/CVE-2024-289xx/CVE-2024-28969.json
Normal file
@ -0,0 +1,55 @@
|
||||
{
|
||||
"id": "CVE-2024-28969",
|
||||
"sourceIdentifier": "security_alert@emc.com",
|
||||
"published": "2024-06-13T15:15:52.183",
|
||||
"lastModified": "2024-06-13T15:15:52.183",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Dell SCG, versions prior to 5.24.00.00, contain an Improper Access Control vulnerability in the SCG exposed for an internal update REST API (if enabled by Admin user from UI). A remote low privileged attacker could potentially exploit this vulnerability, leading to the execution of certain APIs applicable only for Admin Users on the application's backend database that could potentially allow an unauthorized user access to restricted resources."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security_alert@emc.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 4.3,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 1.4
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security_alert@emc.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-284"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.dell.com/support/kbdoc/en-us/000225910/dsa-2024-181-security-update-for-dell-secure-connect-gateway-application-and-appliance-vulnerabilities",
|
||||
"source": "security_alert@emc.com"
|
||||
}
|
||||
]
|
||||
}
|
55
CVE-2024/CVE-2024-291xx/CVE-2024-29168.json
Normal file
55
CVE-2024/CVE-2024-291xx/CVE-2024-29168.json
Normal file
@ -0,0 +1,55 @@
|
||||
{
|
||||
"id": "CVE-2024-29168",
|
||||
"sourceIdentifier": "security_alert@emc.com",
|
||||
"published": "2024-06-13T15:15:52.433",
|
||||
"lastModified": "2024-06-13T15:15:52.433",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Dell SCG, versions prior to 5.22.00.00, contain a SQL Injection Vulnerability in the SCG UI for an internal assets REST API. A remote authenticated attacker could potentially exploit this vulnerability, leading to the execution of certain SQL commands on the application's backend database causing potential unauthorized access and modification of application data."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security_alert@emc.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 5.4,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 2.5
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security_alert@emc.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-89"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.dell.com/support/kbdoc/en-us/000225910/dsa-2024-181-security-update-for-dell-secure-connect-gateway-application-and-appliance-vulnerabilities",
|
||||
"source": "security_alert@emc.com"
|
||||
}
|
||||
]
|
||||
}
|
@ -8,6 +8,10 @@
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Verint - CWE-434: Unrestricted Upload of File with Dangerous Type"
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Verint - CWE-434: Carga sin restricciones de archivos con tipos peligrosos"
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
|
24
CVE-2024/CVE-2024-366xx/CVE-2024-36647.json
Normal file
24
CVE-2024/CVE-2024-366xx/CVE-2024-36647.json
Normal file
@ -0,0 +1,24 @@
|
||||
{
|
||||
"id": "CVE-2024-36647",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-06-13T14:15:12.590",
|
||||
"lastModified": "2024-06-13T14:15:12.590",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A stored cross-site scripting (XSS) vulnerability in Church CRM v5.8.0 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the Family Name parameter under the Register a New Family page."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Una vulnerabilidad de cross-site scripting (XSS) almacenado en Church CRM v5.8.0 permite a los atacantes ejecutar scripts web o HTML arbitrario a trav\u00e9s de un payload manipulado inyectado en el par\u00e1metro Nombre de familia en la p\u00e1gina Registrar una nueva familia."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/ChurchCRM/CRM/issues/7029",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
55
CVE-2024/CVE-2024-371xx/CVE-2024-37131.json
Normal file
55
CVE-2024/CVE-2024-371xx/CVE-2024-37131.json
Normal file
@ -0,0 +1,55 @@
|
||||
{
|
||||
"id": "CVE-2024-37131",
|
||||
"sourceIdentifier": "security_alert@emc.com",
|
||||
"published": "2024-06-13T15:15:52.740",
|
||||
"lastModified": "2024-06-13T15:15:52.740",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "SCG Policy Manager, all versions, contains an overly permissive Cross-Origin Resource Policy (CORP) vulnerability. A remote unauthenticated attacker could potentially exploit this vulnerability, leading to the execution of malicious actions on the application in the context of the authenticated user."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security_alert@emc.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "HIGH",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 7.5,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 1.6,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security_alert@emc.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-942"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.dell.com/support/kbdoc/en-us/000225956/dsa-2024-254-security-update-for-dell-secure-connect-gateway-policy-manager-vulnerabilities",
|
||||
"source": "security_alert@emc.com"
|
||||
}
|
||||
]
|
||||
}
|
59
CVE-2024/CVE-2024-371xx/CVE-2024-37164.json
Normal file
59
CVE-2024/CVE-2024-371xx/CVE-2024-37164.json
Normal file
@ -0,0 +1,59 @@
|
||||
{
|
||||
"id": "CVE-2024-37164",
|
||||
"sourceIdentifier": "security-advisories@github.com",
|
||||
"published": "2024-06-13T15:15:52.990",
|
||||
"lastModified": "2024-06-13T15:15:52.990",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Computer Vision Annotation Tool (CVAT) is an interactive video and image annotation tool for computer vision. CVAT allows users to supply custom endpoint URLs for cloud storages based on Amazon S3 and Azure Blob Storage. Starting in version 2.1.0 and prior to version 2.14.3, an attacker with a CVAT account can exploit this feature by specifying URLs whose host part is an intranet IP address or an internal domain name. By doing this, the attacker may be able to probe the network that the CVAT backend runs in for HTTP(S) servers. In addition, if there is a web server on this network that is sufficiently API-compatible with an Amazon S3 or Azure Blob Storage endpoint, and either allows anonymous access, or allows authentication with credentials that are known by the attacker, then the attacker may be able to create a cloud storage linked to this server. They may then be able to list files on the server; extract files from the server, if these files are of a type that CVAT supports reading from cloud storage (media data (such as images/videos/archives), importable annotations or datasets, task/project backups); and/or overwrite files on this server with exported annotations/datasets/backups. The exact capabilities of the attacker will depend on how the internal server is configured. Users should upgrade to CVAT 2.14.3 to receive a patch. In this release, the existing SSRF mitigation measures are applied to requests to cloud providers, with access to intranet IP addresses prohibited by default. Some workarounds are also available. One may use network security solutions such as virtual networks or firewalls to prohibit network access from the CVAT backend to unrelated servers on your internal network and/or require authentication for access to internal servers."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:L/I:H/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "HIGH",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 7.1,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 4.7
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-918"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/cvat-ai/cvat/commit/f2346934c80bd91740f55c2788ef7d535a291d4c",
|
||||
"source": "security-advisories@github.com"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/cvat-ai/cvat/security/advisories/GHSA-q684-4jjh-83g6",
|
||||
"source": "security-advisories@github.com"
|
||||
}
|
||||
]
|
||||
}
|
59
CVE-2024/CVE-2024-373xx/CVE-2024-37306.json
Normal file
59
CVE-2024/CVE-2024-373xx/CVE-2024-37306.json
Normal file
@ -0,0 +1,59 @@
|
||||
{
|
||||
"id": "CVE-2024-37306",
|
||||
"sourceIdentifier": "security-advisories@github.com",
|
||||
"published": "2024-06-13T15:15:53.333",
|
||||
"lastModified": "2024-06-13T15:15:53.333",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Computer Vision Annotation Tool (CVAT) is an interactive video and image annotation tool for computer vision. Starting in version 2.2.0 and prior to version 2.14.3, if an attacker can trick a logged-in CVAT user into visiting a malicious URL, they can initiate a dataset export or a backup from a project, task or job that the victim user has permission to export into a cloud storage that the victim user has access to. The name of the resulting file can be chosen by the attacker. This implies that the attacker can overwrite arbitrary files in any cloud storage that the victim can access and, if the attacker has read access to the cloud storage used in the attack, they can obtain media files, annotations, settings and other information from any projects, tasks or jobs that the victim has permission to export. Version 2.14.3 contains a fix for the issue. No known workarounds are available."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 7.1,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 4.2
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-352"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/cvat-ai/cvat/commit/5d36d10e493d92e893d7eae595544bcbe9cce1ce",
|
||||
"source": "security-advisories@github.com"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/cvat-ai/cvat/security/advisories/GHSA-jpf9-646h-4px7",
|
||||
"source": "security-advisories@github.com"
|
||||
}
|
||||
]
|
||||
}
|
63
CVE-2024/CVE-2024-373xx/CVE-2024-37308.json
Normal file
63
CVE-2024/CVE-2024-373xx/CVE-2024-37308.json
Normal file
@ -0,0 +1,63 @@
|
||||
{
|
||||
"id": "CVE-2024-37308",
|
||||
"sourceIdentifier": "security-advisories@github.com",
|
||||
"published": "2024-06-13T14:15:12.807",
|
||||
"lastModified": "2024-06-13T14:15:12.807",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "The Cooked Pro recipe plugin for WordPress is vulnerable to Persistent Cross-Site Scripting (XSS) via the `_recipe_settings[post_title]` parameter in versions up to, and including, 1.7.15.4 due to insufficient input sanitization and output escaping. This vulnerability allows authenticated attackers with contributor-level access and above to inject arbitrary web scripts in pages that will execute whenever a user accesses a compromised page. A patch is available at commit 8cf88f334ccbf11134080bbb655c66f1cfe77026 and will be part of version 1.8.0."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "El complemento Cooked Pro recipe para WordPress es vulnerable a Cross-Site Scripting (XSS) persistente a trav\u00e9s del par\u00e1metro `_recipe_settings[post_title]` en versiones hasta la 1.7.15.4 incluida debido a una sanitizaci\u00f3n de entrada y un escape de salida insuficientes. Esta vulnerabilidad permite a atacantes autenticados con acceso de nivel de colaborador y superior inyectar scripts web arbitrarios en p\u00e1ginas que se ejecutar\u00e1n cada vez que un usuario acceda a una p\u00e1gina comprometida. Hay un parche disponible en el commit 8cf88f334ccbf11134080bbb655c66f1cfe77026 y ser\u00e1 parte de la versi\u00f3n 1.8.0."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 5.4,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.3,
|
||||
"impactScore": 2.7
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/XjSv/Cooked/commit/8cf88f334ccbf11134080bbb655c66f1cfe77026",
|
||||
"source": "security-advisories@github.com"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/XjSv/Cooked/security/advisories/GHSA-9vfv-c966-jwrv",
|
||||
"source": "security-advisories@github.com"
|
||||
}
|
||||
]
|
||||
}
|
67
CVE-2024/CVE-2024-373xx/CVE-2024-37309.json
Normal file
67
CVE-2024/CVE-2024-373xx/CVE-2024-37309.json
Normal file
@ -0,0 +1,67 @@
|
||||
{
|
||||
"id": "CVE-2024-37309",
|
||||
"sourceIdentifier": "security-advisories@github.com",
|
||||
"published": "2024-06-13T14:15:13.060",
|
||||
"lastModified": "2024-06-13T14:15:13.060",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CrateDB is a distributed SQL database. A high-risk vulnerability has been identified in versions prior to 5.7.2 where the TLS endpoint (port 4200) permits client-initiated renegotiation. In this scenario, an attacker can exploit this feature to repeatedly request renegotiation of security parameters during an ongoing TLS session. This flaw could lead to excessive consumption of CPU resources, resulting in potential server overload and service disruption. The vulnerability was confirmed using an openssl client where the command `R` initiates renegotiation, followed by the server confirming with `RENEGOTIATING`. This vulnerability allows an attacker to perform a denial of service attack by exhausting server CPU resources through repeated TLS renegotiations. This impacts the availability of services running on the affected server, posing a significant risk to operational stability and security. TLS 1.3 explicitly forbids renegotiation, since it closes a window of opportunity for an attack. Version 5.7.2 of CrateDB contains the fix for the issue.\n"
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "CrateDB es una base de datos SQL distribuida. Se identific\u00f3 una vulnerabilidad de alto riesgo en versiones anteriores a la 5.7.2 donde el endpoint TLS (puerto 4200) permite la renegociaci\u00f3n iniciada por el cliente. En este escenario, un atacante puede aprovechar esta caracter\u00edstica para solicitar repetidamente la renegociaci\u00f3n de los par\u00e1metros de seguridad durante una sesi\u00f3n TLS en curso. Esta falla podr\u00eda provocar un consumo excesivo de recursos de la CPU, lo que provocar\u00eda una posible sobrecarga del servidor e interrupci\u00f3n del servicio. La vulnerabilidad se confirm\u00f3 utilizando un cliente openssl donde el comando \"R\" inicia la renegociaci\u00f3n, seguido por el servidor que confirma con \"RENEGOTIATING\". Esta vulnerabilidad permite a un atacante realizar un ataque de denegaci\u00f3n de servicio agotando los recursos de la CPU del servidor mediante repetidas renegociaciones de TLS. Esto afecta la disponibilidad de los servicios que se ejecutan en el servidor afectado, lo que representa un riesgo significativo para la estabilidad operativa y la seguridad. TLS 1.3 proh\u00edbe expl\u00edcitamente la renegociaci\u00f3n, ya que cierra una ventana de oportunidad para un ataque. La versi\u00f3n 5.7.2 de CrateDB contiene la soluci\u00f3n al problema."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "LOW",
|
||||
"baseScore": 5.3,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 1.4
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-770"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://cratedb.com/docs/crate/reference/en/latest/appendices/release-notes/5.7.2.html",
|
||||
"source": "security-advisories@github.com"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/crate/crate/commit/1dde03bdf031a20886065195527e368e4a3218b3",
|
||||
"source": "security-advisories@github.com"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/crate/crate/security/advisories/GHSA-x268-qpg6-w9g2",
|
||||
"source": "security-advisories@github.com"
|
||||
}
|
||||
]
|
||||
}
|
24
CVE-2024/CVE-2024-378xx/CVE-2024-37849.json
Normal file
24
CVE-2024/CVE-2024-378xx/CVE-2024-37849.json
Normal file
@ -0,0 +1,24 @@
|
||||
{
|
||||
"id": "CVE-2024-37849",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-06-13T14:15:13.300",
|
||||
"lastModified": "2024-06-13T14:15:13.300",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A SQL Injection vulnerability in itsourcecode Billing System 1.0 allows a local attacker to execute arbitrary code in process.php via the username parameter."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Una vulnerabilidad de inyecci\u00f3n SQL en itsourcecode Billing System 1.0 permite a un atacante local ejecutar c\u00f3digo arbitrario en Process.php a trav\u00e9s del par\u00e1metro de nombre de usuario."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/ganzhi-qcy/cve/issues/3",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,106 +2,14 @@
|
||||
"id": "CVE-2024-5656",
|
||||
"sourceIdentifier": "security@wordfence.com",
|
||||
"published": "2024-06-06T05:15:49.377",
|
||||
"lastModified": "2024-06-11T17:54:54.870",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2024-06-13T14:15:13.397",
|
||||
"vulnStatus": "Rejected",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "The Google CSE plugin for WordPress is vulnerable to Stored Cross-Site Scripting via admin settings in all versions up to, and including, 1.0.7 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with administrator-level permissions and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. This only affects multi-site installations and installations where unfiltered_html has been disabled."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "El complemento Google CSE para WordPress es vulnerable a Cross-Site Scripting Almacenado a trav\u00e9s de la configuraci\u00f3n de administrador en todas las versiones hasta la 1.0.7 incluida debido a una sanitizaci\u00f3n de entrada y un escape de salida insuficientes. Esto hace posible que atacantes autenticados, con permisos de nivel de administrador y superiores, inyecten scripts web arbitrarios en p\u00e1ginas que se ejecutar\u00e1n cada vez que un usuario acceda a una p\u00e1gina inyectada. Esto solo afecta a las instalaciones multisitio y a las instalaciones en las que se ha deshabilitado unfiltered_html."
|
||||
"value": "Rejected reason: ** REJECT ** Accidental duplicate assignment of CVE-2024-4755. Please use CVE-2024-4755."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "HIGH",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 4.8,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 1.7,
|
||||
"impactScore": 2.7
|
||||
},
|
||||
{
|
||||
"source": "security@wordfence.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:C/C:L/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "HIGH",
|
||||
"privilegesRequired": "HIGH",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 4.4,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 1.3,
|
||||
"impactScore": 2.7
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:erikeng:google_cse:*:*:*:*:*:wordpress:*:*",
|
||||
"versionEndIncluding": "1.0.7",
|
||||
"matchCriteriaId": "FFDB6E6C-5D13-47A8-9A87-EF3094CA1671"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://wpscan.com/vulnerability/adc6ea6d-29d8-4ad0-b0db-2540e8b3f9a9/",
|
||||
"source": "security@wordfence.com",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/37cf63e3-9301-441d-9852-b2de83078b51?source=cve",
|
||||
"source": "security@wordfence.com",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
"metrics": {},
|
||||
"references": []
|
||||
}
|
51
README.md
51
README.md
@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours.
|
||||
### Last Repository Update
|
||||
|
||||
```plain
|
||||
2024-06-13T14:00:18.345706+00:00
|
||||
2024-06-13T16:00:19.166411+00:00
|
||||
```
|
||||
|
||||
### Most recent CVE Modification Timestamp synchronized with NVD
|
||||
|
||||
```plain
|
||||
2024-06-13T13:15:50.030000+00:00
|
||||
2024-06-13T15:15:53.333000+00:00
|
||||
```
|
||||
|
||||
### Last Data Feed Release
|
||||
@ -33,42 +33,39 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
|
||||
### Total Number of included CVEs
|
||||
|
||||
```plain
|
||||
253901
|
||||
253917
|
||||
```
|
||||
|
||||
### CVEs added in the last Commit
|
||||
|
||||
Recently added CVEs: `16`
|
||||
|
||||
- [CVE-2024-20753](CVE-2024/CVE-2024-207xx/CVE-2024-20753.json) (`2024-06-13T12:15:09.690`)
|
||||
- [CVE-2024-30299](CVE-2024/CVE-2024-302xx/CVE-2024-30299.json) (`2024-06-13T12:15:09.930`)
|
||||
- [CVE-2024-30300](CVE-2024/CVE-2024-303xx/CVE-2024-30300.json) (`2024-06-13T12:15:10.170`)
|
||||
- [CVE-2024-30472](CVE-2024/CVE-2024-304xx/CVE-2024-30472.json) (`2024-06-13T12:15:10.410`)
|
||||
- [CVE-2024-32856](CVE-2024/CVE-2024-328xx/CVE-2024-32856.json) (`2024-06-13T12:15:10.647`)
|
||||
- [CVE-2024-32858](CVE-2024/CVE-2024-328xx/CVE-2024-32858.json) (`2024-06-13T13:15:48.833`)
|
||||
- [CVE-2024-32859](CVE-2024/CVE-2024-328xx/CVE-2024-32859.json) (`2024-06-13T13:15:49.210`)
|
||||
- [CVE-2024-32860](CVE-2024/CVE-2024-328xx/CVE-2024-32860.json) (`2024-06-13T13:15:49.517`)
|
||||
- [CVE-2024-34112](CVE-2024/CVE-2024-341xx/CVE-2024-34112.json) (`2024-06-13T12:15:10.870`)
|
||||
- [CVE-2024-34113](CVE-2024/CVE-2024-341xx/CVE-2024-34113.json) (`2024-06-13T12:15:11.110`)
|
||||
- [CVE-2024-34115](CVE-2024/CVE-2024-341xx/CVE-2024-34115.json) (`2024-06-13T12:15:11.360`)
|
||||
- [CVE-2024-34116](CVE-2024/CVE-2024-341xx/CVE-2024-34116.json) (`2024-06-13T12:15:11.583`)
|
||||
- [CVE-2024-34129](CVE-2024/CVE-2024-341xx/CVE-2024-34129.json) (`2024-06-13T12:15:11.810`)
|
||||
- [CVE-2024-34130](CVE-2024/CVE-2024-341xx/CVE-2024-34130.json) (`2024-06-13T12:15:12.030`)
|
||||
- [CVE-2024-36395](CVE-2024/CVE-2024-363xx/CVE-2024-36395.json) (`2024-06-13T13:15:49.793`)
|
||||
- [CVE-2024-36396](CVE-2024/CVE-2024-363xx/CVE-2024-36396.json) (`2024-06-13T13:15:50.030`)
|
||||
- [CVE-2021-4237](CVE-2021/CVE-2021-42xx/CVE-2021-4237.json) (`2024-06-13T15:15:50.347`)
|
||||
- [CVE-2024-22333](CVE-2024/CVE-2024-223xx/CVE-2024-22333.json) (`2024-06-13T14:15:11.110`)
|
||||
- [CVE-2024-25052](CVE-2024/CVE-2024-250xx/CVE-2024-25052.json) (`2024-06-13T14:15:11.370`)
|
||||
- [CVE-2024-28965](CVE-2024/CVE-2024-289xx/CVE-2024-28965.json) (`2024-06-13T15:15:51.033`)
|
||||
- [CVE-2024-28966](CVE-2024/CVE-2024-289xx/CVE-2024-28966.json) (`2024-06-13T15:15:51.423`)
|
||||
- [CVE-2024-28967](CVE-2024/CVE-2024-289xx/CVE-2024-28967.json) (`2024-06-13T15:15:51.660`)
|
||||
- [CVE-2024-28968](CVE-2024/CVE-2024-289xx/CVE-2024-28968.json) (`2024-06-13T15:15:51.890`)
|
||||
- [CVE-2024-28969](CVE-2024/CVE-2024-289xx/CVE-2024-28969.json) (`2024-06-13T15:15:52.183`)
|
||||
- [CVE-2024-29168](CVE-2024/CVE-2024-291xx/CVE-2024-29168.json) (`2024-06-13T15:15:52.433`)
|
||||
- [CVE-2024-36647](CVE-2024/CVE-2024-366xx/CVE-2024-36647.json) (`2024-06-13T14:15:12.590`)
|
||||
- [CVE-2024-37131](CVE-2024/CVE-2024-371xx/CVE-2024-37131.json) (`2024-06-13T15:15:52.740`)
|
||||
- [CVE-2024-37164](CVE-2024/CVE-2024-371xx/CVE-2024-37164.json) (`2024-06-13T15:15:52.990`)
|
||||
- [CVE-2024-37306](CVE-2024/CVE-2024-373xx/CVE-2024-37306.json) (`2024-06-13T15:15:53.333`)
|
||||
- [CVE-2024-37308](CVE-2024/CVE-2024-373xx/CVE-2024-37308.json) (`2024-06-13T14:15:12.807`)
|
||||
- [CVE-2024-37309](CVE-2024/CVE-2024-373xx/CVE-2024-37309.json) (`2024-06-13T14:15:13.060`)
|
||||
- [CVE-2024-37849](CVE-2024/CVE-2024-378xx/CVE-2024-37849.json) (`2024-06-13T14:15:13.300`)
|
||||
|
||||
|
||||
### CVEs modified in the last Commit
|
||||
|
||||
Recently modified CVEs: `7`
|
||||
Recently modified CVEs: `4`
|
||||
|
||||
- [CVE-2024-5688](CVE-2024/CVE-2024-56xx/CVE-2024-5688.json) (`2024-06-13T12:15:12.277`)
|
||||
- [CVE-2024-5690](CVE-2024/CVE-2024-56xx/CVE-2024-5690.json) (`2024-06-13T12:15:12.427`)
|
||||
- [CVE-2024-5691](CVE-2024/CVE-2024-56xx/CVE-2024-5691.json) (`2024-06-13T12:15:12.500`)
|
||||
- [CVE-2024-5693](CVE-2024/CVE-2024-56xx/CVE-2024-5693.json) (`2024-06-13T12:15:12.563`)
|
||||
- [CVE-2024-5696](CVE-2024/CVE-2024-56xx/CVE-2024-5696.json) (`2024-06-13T12:15:12.630`)
|
||||
- [CVE-2024-5700](CVE-2024/CVE-2024-57xx/CVE-2024-5700.json) (`2024-06-13T12:15:12.687`)
|
||||
- [CVE-2024-5702](CVE-2024/CVE-2024-57xx/CVE-2024-5702.json) (`2024-06-13T12:15:12.750`)
|
||||
- [CVE-2021-47543](CVE-2021/CVE-2021-475xx/CVE-2021-47543.json) (`2024-06-13T14:15:10.547`)
|
||||
- [CVE-2021-47545](CVE-2021/CVE-2021-475xx/CVE-2021-47545.json) (`2024-06-13T14:15:10.783`)
|
||||
- [CVE-2024-36396](CVE-2024/CVE-2024-363xx/CVE-2024-36396.json) (`2024-06-13T13:15:50.030`)
|
||||
- [CVE-2024-5656](CVE-2024/CVE-2024-56xx/CVE-2024-5656.json) (`2024-06-13T14:15:13.397`)
|
||||
|
||||
|
||||
## Download and Usage
|
||||
|
68
_state.csv
68
_state.csv
@ -183664,6 +183664,7 @@ CVE-2021-42364,0,0,fff889eaedd8f4fa10d486bf07d4393ecae9dfddb45076b1bcc1a1b8ba017
|
||||
CVE-2021-42365,0,0,a4c7b89d7168c47ab0612f19beeb65b9878c6b79843ce176500f0cf6bf3c9c86,2021-12-01T16:17:20.457000
|
||||
CVE-2021-42367,0,0,cf3198f64211486d5b9749c1babf865fd44727fd7afb44ae0a25d693969da289,2022-08-09T13:19:57.843000
|
||||
CVE-2021-42369,0,0,bbfe047d9ef04643fe9be62f1979abaa5a4e0a5310d8119b88532c8807f83f97,2023-09-28T14:15:13.777000
|
||||
CVE-2021-4237,1,1,a58f78288e52e6bc23d13c85b0f43c31cf42fda6aec910673386e889631b2b3c,2024-06-13T15:15:50.347000
|
||||
CVE-2021-42370,0,0,2f26c4ef5338180d2e2c3e053a8bb8b24475c1ec212cd7651292e7ea3f1fc3f4,2022-07-29T12:46:02.910000
|
||||
CVE-2021-42371,0,0,7bb0d1fc44db5451dfce560e413f5690b11a610ae5b2fc3f89927c39c141d69c,2022-09-03T03:39:30.803000
|
||||
CVE-2021-42372,0,0,3ddd903dd219192481fd09f140837d7e99e9d46109b32003cf2defcc5b0e4ee8,2022-09-03T03:39:51.120000
|
||||
@ -187339,9 +187340,9 @@ CVE-2021-47539,0,0,fd7ca3e0c6b8203a0bc2909d1d1b3d2195cf4f3d68b9cdcb36669e8a23e02
|
||||
CVE-2021-47540,0,0,ef8616dd58a7fcd42486b0eac1f46e92a1911e4d6683545b3fddf14a07974e74,2024-06-10T18:35:23.710000
|
||||
CVE-2021-47541,0,0,b842a1222014026c80ef7f2550209ddf0dc2c839a9ce0701f583b8e2a59f3c74,2024-06-10T18:34:51.683000
|
||||
CVE-2021-47542,0,0,697ce59bbad7d183f84b56b16a93ce13dff4dee77eb3554718bc03522a28f38e,2024-06-10T18:34:33.073000
|
||||
CVE-2021-47543,0,0,95131dfe32ec2953947c518d98c138361f44dab521c6324d96127b4706e16932,2024-06-10T18:31:52.387000
|
||||
CVE-2021-47543,0,1,71377ac308bc77359beb4305f00d421668a0d134fbf996cc53ea8ad75f3015fb,2024-06-13T14:15:10.547000
|
||||
CVE-2021-47544,0,0,f79795d45ec86024adc669e638f18860bcf298c02a6d3b83525f67512e199ac1,2024-05-24T18:09:20.027000
|
||||
CVE-2021-47545,0,0,2a479ef1e624f36df57c3fffb0467891df8cb6bb0c28e040171c803766c0f07c,2024-06-10T18:31:09.543000
|
||||
CVE-2021-47545,0,1,7a729950c7b53801bcb4ccb943c7fd94366f722c2f1058fe3d0c7e067590cdcf,2024-06-13T14:15:10.783000
|
||||
CVE-2021-47546,0,0,3af84ddd9fcd49edabe8726c0dd363f371de5b18d210c52c0f4f7bffa0beee4b,2024-06-10T18:30:20.320000
|
||||
CVE-2021-47547,0,0,3055a8c1ecdaf1bebf0a74bb41eaf039135dbbab3ff1f7d004351f8f6b5ee172,2024-05-24T18:09:20.027000
|
||||
CVE-2021-47548,0,0,f004a4a5bb0b50ea0d94ce57835ee44a7c431c9414f5744d4b17252bb1d4cd2c,2024-05-24T18:09:20.027000
|
||||
@ -242400,7 +242401,7 @@ CVE-2024-20749,0,0,1c6c15ad74c79cafbee02506ba2970a72c2b9d04e5d996c0bbf0bff86aeca
|
||||
CVE-2024-2075,0,0,d06356a6150870948150afa8b012fca160e81b8bea0d5d64e3ced8b06daa42cf,2024-05-17T02:38:02.263000
|
||||
CVE-2024-20750,0,0,c28d5c7e745850786c84ebaecba6c2afc8424cd8519c878a9215bbc42660f31c,2024-02-15T14:28:20.067000
|
||||
CVE-2024-20752,0,0,2fca99c7c46b63c1e8c723416518741e5ba84f3c0a12058eba3b52ab87d3a41f,2024-03-18T19:40:00.173000
|
||||
CVE-2024-20753,1,1,bb9ee43b390b1b6c9b64f9433692fbbd5d82d8462029e4a4b982d1a7bbf1a98e,2024-06-13T12:15:09.690000
|
||||
CVE-2024-20753,0,0,bb9ee43b390b1b6c9b64f9433692fbbd5d82d8462029e4a4b982d1a7bbf1a98e,2024-06-13T12:15:09.690000
|
||||
CVE-2024-20754,0,0,81e060e70421921d47c9b5f39a0b588de5cbe53f3728eba912e2e038b4e0204b,2024-03-18T19:40:00.173000
|
||||
CVE-2024-20755,0,0,fba4e17137418712248ac6e19aab4c7a4a836f7a43b6a373583de953e0de81e7,2024-03-18T19:40:00.173000
|
||||
CVE-2024-20756,0,0,1d30dbdf41055263ead5435751d3a80ea211c2e82d513df846150a11bc88bcee,2024-03-18T19:40:00.173000
|
||||
@ -243490,6 +243491,7 @@ CVE-2024-22328,0,0,1d3eba54d3dcb9850fbd9a86e1475d83621830be3d74777232b85acf89e88
|
||||
CVE-2024-22329,0,0,6b484ef8d82a649c0162bc9be85600528b13c1a759ed8ec79e69e3b10b67e2d3,2024-04-17T12:48:07.510000
|
||||
CVE-2024-22331,0,0,79325856c8baa9082651d9383783f7a4198ba299d30e2c67010ba88c7f1776a4,2024-02-13T20:26:23.780000
|
||||
CVE-2024-22332,0,0,a27f7ab666232b70f986037d449131d6bde483413718019674022f07be0d9b9e,2024-04-03T02:15:07.973000
|
||||
CVE-2024-22333,1,1,b278637c758c524360a32bd74d15133af5eba6e34b352e53e618428bbe3aeb8d,2024-06-13T14:15:11.110000
|
||||
CVE-2024-22334,0,0,a38b89fac619e220b3f32a5ed9cb762bdaa0f4626e986bbf119b83360e4c10ee,2024-04-15T13:15:51.577000
|
||||
CVE-2024-22335,0,0,94b1135a0842e43602bc9fceeeec6f6d8338d5d9b6e931e6a3e1f0f5ed52affb,2024-02-20T19:50:53.960000
|
||||
CVE-2024-22336,0,0,92b17f3ddf77b7c8a53a41f903603d0d36207de06fae8bd71fc2469777bc3663,2024-02-20T19:50:53.960000
|
||||
@ -245041,6 +245043,7 @@ CVE-2024-25047,0,0,13db085f684d79ef9745d34b45d7fc06de8a1d4ab15f35cf7f17ac2900698
|
||||
CVE-2024-25048,0,0,610a65aa068817d20a042aeecc25c887034723f165ecc379125f80c2bf8a57aa,2024-04-29T12:42:03.667000
|
||||
CVE-2024-2505,0,0,f9efd81999a67e571786699340d45ecbc4af4577ba4f92360cdbb165e79506a4,2024-04-29T12:42:03.667000
|
||||
CVE-2024-25050,0,0,2895a503880459770c96f9ab5f8cf4bc71edd50703fee0b5f0e32007918ee69d,2024-04-29T12:42:03.667000
|
||||
CVE-2024-25052,1,1,d02fa1e7ad887aafb311e9086719108b34394aa4dd5c45e9307317e1e2783b8b,2024-06-13T14:15:11.370000
|
||||
CVE-2024-2506,0,0,e15f8d6bb21612e515765b00c070f0acb363bd444917e661aa5401c0b47082de,2024-06-03T14:46:24.250000
|
||||
CVE-2024-25062,0,0,9596ed5cf07a8bc8469d4afc28fc727a431af7cff3b6b8e84435c301d9955756,2024-02-13T00:40:40.503000
|
||||
CVE-2024-25063,0,0,ada8a3e76748f7f6ba8d6378c081423ac8f962f095964d00e876ad6b7009736e,2024-03-04T22:45:02.117000
|
||||
@ -247681,6 +247684,11 @@ CVE-2024-28960,0,0,e8dbeb1ca04aba553db6ad0a923d45f708fa651bef11fd340f54cf32195f3
|
||||
CVE-2024-28961,0,0,0ddc41642ad07ac3588b209701b64adc26c13e6c39a5545ce50919c420215bae,2024-04-29T12:42:03.667000
|
||||
CVE-2024-28963,0,0,c5c3b185efea606aed4d9595c8d313f3f2c0068b841b7e1d435fe02dbde99f32,2024-04-24T13:39:42.883000
|
||||
CVE-2024-28964,0,0,fb329d1e04afee3f4c132c0e99318c03fd4dffad35869d987d70b69e5a024ccc,2024-06-12T15:15:50.647000
|
||||
CVE-2024-28965,1,1,5cd21faec993f565de4ed20899b3b5b0d650381ef91127c18a1d2ce37f0f01e9,2024-06-13T15:15:51.033000
|
||||
CVE-2024-28966,1,1,c4c5caab3abc5ba5f6ba3c36a4ff4c01f985870dbe274a8372bf4ba3c15526fc,2024-06-13T15:15:51.423000
|
||||
CVE-2024-28967,1,1,b721a2e8c42f4c2f7380910bda22c99a4c38ccc7c2b8c413ffcaaa3abcafd572,2024-06-13T15:15:51.660000
|
||||
CVE-2024-28968,1,1,cd22d73114e0aec5954d835b01f93c9d5add5c14cbda2c9445b3c0369823d7af,2024-06-13T15:15:51.890000
|
||||
CVE-2024-28969,1,1,4b661599d0783997d55073299328a89a0196b34b270d56fb2ee6af36cd8c590f,2024-06-13T15:15:52.183000
|
||||
CVE-2024-2897,0,0,0e1e1d677ec9e72b6995e546603f98ab77935f85885a6483b68b217559eb34fe,2024-06-04T19:19:19.267000
|
||||
CVE-2024-28970,0,0,a070c839d5653c6b9137332b6bb0245cc7bff1791d48e4f8bfab9e344eddc7e0,2024-06-12T07:15:51.347000
|
||||
CVE-2024-28971,0,0,5cc2a2bfd21b51036452ce03834ca76b5f458ae1e1ea0b2042ea0e7434d790f7,2024-05-08T17:05:24.083000
|
||||
@ -247838,6 +247846,7 @@ CVE-2024-29164,0,0,c849bd0e0c082f681120f651dd7c1e8b36dd5605fe47c0e08d8750da3cca8
|
||||
CVE-2024-29165,0,0,56d636407e1bb4b0ac449c45605f98b67e37c82a870441216999fc8912fdfab5,2024-05-14T16:13:02.773000
|
||||
CVE-2024-29166,0,0,b13dfaf0c8e4ea3bbd358bd8614d1947c156835fe22c5095fd83f7cd95ae4bba,2024-05-14T16:13:02.773000
|
||||
CVE-2024-29167,0,0,bf34fde11ddaf885eca651982ced409116d0263648d1d196b5990bfa9a0517fe,2024-05-17T02:37:49.993000
|
||||
CVE-2024-29168,1,1,32628e0524afa239234a0304fddb0c03bcb909dd3d298dd1dad3bdc1b8933d91,2024-06-13T15:15:52.433000
|
||||
CVE-2024-2917,0,0,738b9419e321262581cbcbc36e60bc25c85f82bd40a8ab12d5b727ad6cc0972c,2024-05-17T02:38:37.297000
|
||||
CVE-2024-29170,0,0,3a6ff2257b9f972ea2c611b834271a3e0fac88ad6ff708b8c384b495ffa37bbe,2024-06-04T16:57:41.053000
|
||||
CVE-2024-29179,0,0,f19d4d0a9f8b6dc85e6e021ab22950c73dd30b1b16e940f3cfc8d8b6deab42d4,2024-03-26T12:55:05.010000
|
||||
@ -248538,9 +248547,9 @@ CVE-2024-30295,0,0,a88181db062ed482266f5ce5ad82ec889d5ade290954436d9fbe03393ebb0
|
||||
CVE-2024-30296,0,0,87a509062e2352e34c30432a8081e5dbeeb79743dc41024ed33539c241483d4e,2024-05-16T13:03:05.353000
|
||||
CVE-2024-30297,0,0,e6b13016cac12082ed7be4ed198a4df564383ab39f445c6a93f8d1afc0e87645,2024-05-16T13:03:05.353000
|
||||
CVE-2024-30298,0,0,9df1fa6a01ce64ceb75f4234ba08b1b39922e960158b57b3d399c7b03186b1c5,2024-05-16T13:03:05.353000
|
||||
CVE-2024-30299,1,1,5d31ca66281af9529a863a8a16bdc73b212cb026501c01162fe6b598d259dbd5,2024-06-13T12:15:09.930000
|
||||
CVE-2024-30299,0,0,5d31ca66281af9529a863a8a16bdc73b212cb026501c01162fe6b598d259dbd5,2024-06-13T12:15:09.930000
|
||||
CVE-2024-3030,0,0,88c29228ef56d61e184f00d5d8d99ea5dd9800435eeb42a07f389309c9f00688,2024-04-04T12:48:41.700000
|
||||
CVE-2024-30300,1,1,67b3321dc283eec58f38ded3ecef2b8d53c1f0caa12aa7564558a051187f48b3,2024-06-13T12:15:10.170000
|
||||
CVE-2024-30300,0,0,67b3321dc283eec58f38ded3ecef2b8d53c1f0caa12aa7564558a051187f48b3,2024-06-13T12:15:10.170000
|
||||
CVE-2024-30301,0,0,34b23729cd9edf28be4c2d988192584b2980a0ec70b16064c51311fdd3e3b57c,2024-05-03T12:50:34.250000
|
||||
CVE-2024-30302,0,0,6456cd77762c99d131718f53b35582a1960091e5036976e625fc5fc658a078e0,2024-05-03T12:50:34.250000
|
||||
CVE-2024-30303,0,0,6f33b81c4af944bbf96dcd2699ecddcaedfa18b6645e1843afc4e3d8d61b04a2,2024-05-03T12:50:34.250000
|
||||
@ -248700,7 +248709,7 @@ CVE-2024-30468,0,0,97a9b2808fcc8915cd24bfaf7f54deaceab99abf59bf935a157c8b40f4b70
|
||||
CVE-2024-30469,0,0,27281734a967c544466176225d5b748c65afaa34ac64dbc81f344b0ba4360d31,2024-04-01T01:12:59.077000
|
||||
CVE-2024-3047,0,0,7a704b46e98cc1708bf08d4299ad99a8dad9a0911b940d1f5fbcb78bdd933ce2,2024-05-02T18:00:37.360000
|
||||
CVE-2024-30470,0,0,9eaf77a17367a08f18dd200c9eb723804329beddb1dfb7f8efc73b70c1068fa6,2024-06-10T02:52:08.267000
|
||||
CVE-2024-30472,1,1,397013ef93300b4eca0bb1271e5021b01fb998e54af6f6b542cf66928eaccca3,2024-06-13T12:15:10.410000
|
||||
CVE-2024-30472,0,0,397013ef93300b4eca0bb1271e5021b01fb998e54af6f6b542cf66928eaccca3,2024-06-13T12:15:10.410000
|
||||
CVE-2024-30477,0,0,e57a5e6fa510ec9057ebfdd86316546dd94e1dabae4fad5cc81ff907e6cfb50c,2024-04-01T01:12:59.077000
|
||||
CVE-2024-30478,0,0,7d7533c1a9dedc51f4ca6100785aae3de1530d7d091146af0639adfb42b6a065,2024-04-01T01:12:59.077000
|
||||
CVE-2024-30479,0,0,a84e054427a55edb242ff76a50a396831a168adb0d297fc79083a59916639018,2024-05-17T18:36:05.263000
|
||||
@ -250210,11 +250219,11 @@ CVE-2024-32836,0,0,b79abde0b1fb00c320171e12e4361e475bc7a0910a68d24b478ff673cfed4
|
||||
CVE-2024-32849,0,0,911a7e29746f175fb19c3c12d66bd3772f826858bf332bb5f36bdbd074fef2ea,2024-06-11T13:54:12.057000
|
||||
CVE-2024-3285,0,0,ea17e16acaa3172cbcc052cf9bfb1b3e7ee2b004434b062b8e67c1c1ed8bff14,2024-04-11T12:47:44.137000
|
||||
CVE-2024-32850,0,0,e2d3ad4052fd34b4d59fd5011cddd317b3140c292d5e36efda816fa3450f0d6b,2024-05-31T13:01:46.727000
|
||||
CVE-2024-32856,1,1,06323766ea4aa71be1245b972e5acbf80fa657abc1c7e76b7613b9ee9fb921a6,2024-06-13T12:15:10.647000
|
||||
CVE-2024-32858,1,1,fd9780dc3afe0f7594c60fad6d3300cefeb686cb418ddcd5dcdfcc91634352e3,2024-06-13T13:15:48.833000
|
||||
CVE-2024-32859,1,1,a27c805c37c62a67832bf29ede4b5e449a6ab6b8cf631a481b1bf913f981db98,2024-06-13T13:15:49.210000
|
||||
CVE-2024-32856,0,0,06323766ea4aa71be1245b972e5acbf80fa657abc1c7e76b7613b9ee9fb921a6,2024-06-13T12:15:10.647000
|
||||
CVE-2024-32858,0,0,fd9780dc3afe0f7594c60fad6d3300cefeb686cb418ddcd5dcdfcc91634352e3,2024-06-13T13:15:48.833000
|
||||
CVE-2024-32859,0,0,a27c805c37c62a67832bf29ede4b5e449a6ab6b8cf631a481b1bf913f981db98,2024-06-13T13:15:49.210000
|
||||
CVE-2024-3286,0,0,2b72849c89237e28c3d3a120424f9748393454aee8e724834e4cfefbfa74f3f9,2024-05-17T18:36:31.297000
|
||||
CVE-2024-32860,1,1,27991c79ddf10af62653d2f2b03fd0072b02102d7574cc32c48a0b5b049eb063,2024-06-13T13:15:49.517000
|
||||
CVE-2024-32860,0,0,27991c79ddf10af62653d2f2b03fd0072b02102d7574cc32c48a0b5b049eb063,2024-06-13T13:15:49.517000
|
||||
CVE-2024-32866,0,0,20522d9aebf09a5d43cbab0aa4b3dc9ed937958cfd0ea9d3803e03cb59093366,2024-04-24T13:39:42.883000
|
||||
CVE-2024-32867,0,0,8b49049697f6722e345366f8694914765116c8554c5893cf239e1c1a736d6057,2024-05-07T20:07:58.737000
|
||||
CVE-2024-32868,0,0,ed4beb9301bd2682ab27b10353d7158266a640938b5fd2758f3ebb745eea4605,2024-04-26T12:58:17.720000
|
||||
@ -250859,16 +250868,16 @@ CVE-2024-34109,0,0,30b5f32632cf6c8eacf84550afef493e0e11ffae21186b790d30500bd4db9
|
||||
CVE-2024-3411,0,0,1527ccef7805d20e12db1e61173246b27470986be341d9b24d7b20f806f94433,2024-04-30T19:35:36.960000
|
||||
CVE-2024-34110,0,0,e856e342da69936f28676152db3527889c06be01d8e87b87edb009bfb955dde8,2024-06-13T09:15:13.137000
|
||||
CVE-2024-34111,0,0,e75fc1103c72d6b4c7e5554b2ddc777d908f4b634d223443620c7a9d744d1e25,2024-06-13T09:15:13.537000
|
||||
CVE-2024-34112,1,1,8a09d9dc9a826c99e8244e57bb5191cd3e5dd26e0455b457758ee29bf9bd6c0a,2024-06-13T12:15:10.870000
|
||||
CVE-2024-34113,1,1,c03ae964168f673b667c977c902e7f4a8ffde464169ed0b43741c1ca6bc4086b,2024-06-13T12:15:11.110000
|
||||
CVE-2024-34115,1,1,da2d43bbef552696606a2504fc5917a6fcdb39301fff88eafedb9dba7022997e,2024-06-13T12:15:11.360000
|
||||
CVE-2024-34116,1,1,31cdb524eaa5803b5d6a82631936bbb45615d4204206c05fe8df5a7df639382e,2024-06-13T12:15:11.583000
|
||||
CVE-2024-34112,0,0,8a09d9dc9a826c99e8244e57bb5191cd3e5dd26e0455b457758ee29bf9bd6c0a,2024-06-13T12:15:10.870000
|
||||
CVE-2024-34113,0,0,c03ae964168f673b667c977c902e7f4a8ffde464169ed0b43741c1ca6bc4086b,2024-06-13T12:15:11.110000
|
||||
CVE-2024-34115,0,0,da2d43bbef552696606a2504fc5917a6fcdb39301fff88eafedb9dba7022997e,2024-06-13T12:15:11.360000
|
||||
CVE-2024-34116,0,0,31cdb524eaa5803b5d6a82631936bbb45615d4204206c05fe8df5a7df639382e,2024-06-13T12:15:11.583000
|
||||
CVE-2024-34119,0,0,43eb8ea4ae57a25792a0e36f119fd3ccd929192fdd73a983948dde5656527f33,2024-06-13T08:16:00.367000
|
||||
CVE-2024-3412,0,0,eba0eb1a658dd1d7813104d95660e0a431a5e786fc8e6854f237ea1b5879eab4,2024-05-29T13:02:09.280000
|
||||
CVE-2024-34120,0,0,1b3ecb5647d6186f3f22c3b0cd28c284d582ad6c0ee1feff8514a6f8ca2982ff,2024-06-13T08:16:00.590000
|
||||
CVE-2024-34129,1,1,5b0c0cfb91900667e472a2e1c939b6150fb73b62e1d7d096f3c7703d3fde229a,2024-06-13T12:15:11.810000
|
||||
CVE-2024-34129,0,0,5b0c0cfb91900667e472a2e1c939b6150fb73b62e1d7d096f3c7703d3fde229a,2024-06-13T12:15:11.810000
|
||||
CVE-2024-3413,0,0,8bf7e231eaef8a1fb270998ee982f12463c5a7d17ff17eb8735dbc8fc584bd57,2024-05-17T02:39:54.073000
|
||||
CVE-2024-34130,1,1,ad730fd6d9ae44842728858a5fe03c4858957e1fd4c325756dd2b96376ae217b,2024-06-13T12:15:12.030000
|
||||
CVE-2024-34130,0,0,ad730fd6d9ae44842728858a5fe03c4858957e1fd4c325756dd2b96376ae217b,2024-06-13T12:15:12.030000
|
||||
CVE-2024-3414,0,0,69231815197d8c759df4a79a39950c8d4f6258471ea32f1c29be1a7038b6ec47,2024-05-17T02:39:54.160000
|
||||
CVE-2024-34144,0,0,161e418bd2efea8731bcf0c84ef4939748aabfddbc9f310a20f204f2b5cb4158,2024-05-02T18:00:37.360000
|
||||
CVE-2024-34145,0,0,8976018515653d9edfc24ef743cee1c2f455c68450e5a16824609e8151c9f246,2024-05-02T18:00:37.360000
|
||||
@ -252176,8 +252185,8 @@ CVE-2024-36391,0,0,912b7ffb7dfb6dfb15f70d7bea2f2a5105573bbf43d36923ced033abcc265
|
||||
CVE-2024-36392,0,0,7b41af317d30bf0386ed81503024aa5664470441af94b00ab8ae6362055ee697,2024-06-03T14:46:24.250000
|
||||
CVE-2024-36393,0,0,8111ed2281966f4170aff551bd133080ffc760cf03f5f0b24324e3c88d4a777d,2024-06-11T17:46:59.160000
|
||||
CVE-2024-36394,0,0,b5c8d1d810533bb5d434ed5dfd8bd001259ea24041137e185276724fa51e1258,2024-06-11T17:46:38.227000
|
||||
CVE-2024-36395,1,1,bfa72cc9ff3a1faf1e3b5c21993b50607a881cb8c2c8b6ed99c8deaaefa2f171,2024-06-13T13:15:49.793000
|
||||
CVE-2024-36396,1,1,34970b18b6a6f5073d7a589fcc11d6b7bd6dcbefaf9221b7531d04f895c36dc2,2024-06-13T13:15:50.030000
|
||||
CVE-2024-36395,0,0,bfa72cc9ff3a1faf1e3b5c21993b50607a881cb8c2c8b6ed99c8deaaefa2f171,2024-06-13T13:15:49.793000
|
||||
CVE-2024-36396,0,1,7ed94273e7e8130d87779da3fea0314a3e5b6b3d0a72a4027e21afc6d5f5d474,2024-06-13T13:15:50.030000
|
||||
CVE-2024-36399,0,0,32a084399fffaab7b007a4925030bc8dfc9c8bbd3d7f25f567b275cd72694397,2024-06-07T14:56:05.647000
|
||||
CVE-2024-3640,0,0,abbf5a33cbca708fe19710dda7a796491ae1d1614e9cd03f43d6cddef8b09500,2024-05-17T18:36:31.297000
|
||||
CVE-2024-36400,0,0,6b10ab1f058055da0b7f6513936a46e66d6922b94171c5e956b85881f675cf7c,2024-06-10T19:39:21.660000
|
||||
@ -252233,6 +252242,7 @@ CVE-2024-3661,0,0,b665f3ebe2f700b6f4e02ebfa9bd2f64cd39c43e37b9374c2fdfbf4a8d2083
|
||||
CVE-2024-3662,0,0,aac492e0cb08799a7f888c46af5bedb595fa2e9ad6dc15c21be50e9dae70066e,2024-04-15T13:15:31.997000
|
||||
CVE-2024-3663,0,0,d70e03397b7b1ab439d27e0f0ba070e0cb9801b42863e8c396c4da4f0822fd7c,2024-05-22T12:46:53.887000
|
||||
CVE-2024-3664,0,0,afb9452532a9b46276f3e123567931f2d9b14afd62c66b887c9d751f65c725bc,2024-04-23T12:52:09.397000
|
||||
CVE-2024-36647,1,1,aaeee8e48418f1360252482a1c39d35cd655c6a8d90318bb986f2101efecc61b,2024-06-13T14:15:12.590000
|
||||
CVE-2024-3665,0,0,22dbbd6c0bec2b9f433688ae97b549cd541e7f2d387c3796dd32246c851476cf,2024-04-23T12:52:09.397000
|
||||
CVE-2024-36650,0,0,905a1c23c206dd1b966b1776e5b4ad56249bf6f36f1e62ba9435846589fd9c7f,2024-06-11T16:15:29.043000
|
||||
CVE-2024-3666,0,0,07796934f1ac3c83f9027f055a741df04ffd0473d9b06f5fc0b3f20da9ef9091,2024-05-22T12:46:53.887000
|
||||
@ -252441,6 +252451,7 @@ CVE-2024-3707,0,0,cb892298714e8d1628bf09ece0bc00ef0a1a1429034ce83bb3286f4d822c16
|
||||
CVE-2024-3708,0,0,09132fb1644ebf0c808002aa8ac15b19f13ae71d0beb378f7a9664a5ae685f9a,2024-05-24T01:15:30.977000
|
||||
CVE-2024-3711,0,0,00ee502ae0ae8bdc802cd38eb1ec1e1356c10e1c18d766a4effd20297a066f55,2024-05-24T01:15:30.977000
|
||||
CVE-2024-37130,0,0,e0f79c9f14be5102570781fc06be35c79666eecf04eb579171e468c9a760aecc,2024-06-11T13:54:12.057000
|
||||
CVE-2024-37131,1,1,32ec62f0b17221311401c270e134b4377fb9043f15358baeecad650039e34915,2024-06-13T15:15:52.740000
|
||||
CVE-2024-3714,0,0,29d3de80cc1f6e0ff07b09e17d8d58f6e17e5f0164ed94da7b2235ed17131c18,2024-05-20T13:00:34.807000
|
||||
CVE-2024-3715,0,0,902861be5261e2c029ed83a5c6920fde180817c53e05bb93208dc31c820658c5,2024-05-02T18:00:37.360000
|
||||
CVE-2024-37150,0,0,97cf533630a2e81b430f11fe12ccc7be397791e2299035e9f7d7a243e494791c,2024-06-07T14:56:05.647000
|
||||
@ -252453,6 +252464,7 @@ CVE-2024-37160,0,0,76b6b47acfcb84ecfe47e9095986f2ff3f5ea200ba6d7cfb795a680bd69b2
|
||||
CVE-2024-37161,0,0,d7e37c245dc6ecd190b54dcfd004b6792adbedf293162bb01ff86c1f200b4eb5,2024-06-11T15:16:09.153000
|
||||
CVE-2024-37162,0,0,20f04eed2509be4edd020dc29545cba95e046369c759b4274ae948e43afa70f4,2024-06-07T19:24:09.243000
|
||||
CVE-2024-37163,0,0,4e1e81ba9ae53508c75950c330feaa4e8374728a41f93d075890eaf8b687bb29,2024-06-07T19:24:09.243000
|
||||
CVE-2024-37164,1,1,5751f9986e6fe39f9a18ae477851b55d2de1e3b48b45e20470b28539827c3c4f,2024-06-13T15:15:52.990000
|
||||
CVE-2024-37166,0,0,1196d2402680f5c0ea35c25969f98c6e42a601c8b7f166b15d39fc6d2b783ecf,2024-06-11T13:54:12.057000
|
||||
CVE-2024-37168,0,0,30a5bfe372ab5dc3b67016944b26b77b656c73122e285b83c454024b12c1f789,2024-06-11T13:54:12.057000
|
||||
CVE-2024-37169,0,0,fdaa52111ac9b7853a3eb23a839ff4b8133f3da9944b0a746205935031e65f63,2024-06-11T13:54:12.057000
|
||||
@ -252483,6 +252495,9 @@ CVE-2024-3730,0,0,a30960de1676c855ee35b61976bc4581959cd1a98a7ba3127a461fb7fc9551
|
||||
CVE-2024-37300,0,0,e695bf813c4b2c9ac897c60297973f24cdf1699ac80492d5b5ef8d3561eea312,2024-06-12T16:15:12.097000
|
||||
CVE-2024-37301,0,0,99f358c56d89c33795aa0f88becd856ad5feae4adb418c8b09713696dbe6bbf2,2024-06-12T20:15:12.697000
|
||||
CVE-2024-37304,0,0,a0d53a238603c7b00022def6bac211f79e2e4865ec26e30c72b3c7b78c9449ba,2024-06-12T15:15:52.910000
|
||||
CVE-2024-37306,1,1,145e741bb088cbaf1134e3139b483885fc44036e6c3c1be98d5b7ade44f41793,2024-06-13T15:15:53.333000
|
||||
CVE-2024-37308,1,1,b000b6cb919b5408a9d4a32c4890c77f128e26fa2640ac2160472f5a57364f44,2024-06-13T14:15:12.807000
|
||||
CVE-2024-37309,1,1,ee9fcd4f6b19077e73ca54aed7cc9df2dd1d5a48e82093bcbe842fcbcb4c96eb,2024-06-13T14:15:13.060000
|
||||
CVE-2024-3731,0,0,bdcc8f677627b7b108ec8e839a01e7cc6ba34354d6004394dff79046d7838f40,2024-04-19T13:10:25.637000
|
||||
CVE-2024-3732,0,0,47b10b9e83ea0bac70990c3295c25b56cc73657af82bc6f5c1f4fd37930f5edb,2024-04-23T12:52:09.397000
|
||||
CVE-2024-37325,0,0,7aad069d9af71aa89b0a02f611badaa27cd28b4488184423f704e55afa4d20d1,2024-06-11T17:16:04.477000
|
||||
@ -252546,6 +252561,7 @@ CVE-2024-3781,0,0,bf710215509c2fb5fefd67fb85930537c2ce3a67160738297841ece3c75d6f
|
||||
CVE-2024-3782,0,0,c95ea596dccb3636dd3691321b5a7a48aa3ee2b08cd07f6f17f6b9ebb6c70325,2024-04-15T19:12:25.887000
|
||||
CVE-2024-3783,0,0,f916980cd1e532a7d588efc898e3b89c6684234f9d5fc7d911dee2ee73ce3295,2024-04-15T19:12:25.887000
|
||||
CVE-2024-3784,0,0,c3548262a5dd94ab612636409a3bf8cd74017da9deb24debb2f77536fe274623,2024-04-15T19:12:25.887000
|
||||
CVE-2024-37849,1,1,7920714b389a16667479b36c3c96fe05ceaa4e094a4442432d6489cfe66d033f,2024-06-13T14:15:13.300000
|
||||
CVE-2024-3785,0,0,fc93f2e321d044bf7a0ccc45f351722880d9f0bf94368b28b702ab59c5cb3144,2024-04-15T19:12:25.887000
|
||||
CVE-2024-3786,0,0,e7dff42d10ea5f51aefb5b7728f1b7d65e7bf6f944a436f82b5cbbe6bdc82c9e,2024-04-15T19:12:25.887000
|
||||
CVE-2024-3787,0,0,570870b6338590c353431fe2587b532b039679da85c30ab8bb196a257bca2d47,2024-05-14T16:11:39.510000
|
||||
@ -253807,7 +253823,7 @@ CVE-2024-5645,0,0,1faba0fd6e05694e3fff7011c206b3ecee3c45fddb7e6c575993af231224a1
|
||||
CVE-2024-5646,0,0,29bc62c774e41c691cd7424045a508a5d5e81e750715ffd46ff60a9286369e74,2024-06-11T21:15:54.003000
|
||||
CVE-2024-5653,0,0,283076b6ccce08ae3d1ddf9d7f5983a839d66c80929543a8a527d0bfdf86a2f9,2024-06-06T14:17:35.017000
|
||||
CVE-2024-5654,0,0,07028f57aa6f824ef41630c48d024ed50edc65108f484063deba6656af8c1bd9,2024-06-10T02:52:08.267000
|
||||
CVE-2024-5656,0,0,e083352e0dae5ffd1e0b85e17866af8879714e6bce96a19b052b700442d7f3a1,2024-06-11T17:54:54.870000
|
||||
CVE-2024-5656,0,1,40c34e526e2032c59043b8834b1648291001d5e69a19326cbf74d918e6c8fbc1,2024-06-13T14:15:13.397000
|
||||
CVE-2024-5657,0,0,223911cca93e713dc15810800584c4abe481e0e2143d3e3f3795c2d130280eb3,2024-06-11T17:40:47.823000
|
||||
CVE-2024-5658,0,0,e420aa15660fefecd013eab0de4dee690ff0f155b141d8b1d4392a16606c7ad5,2024-06-11T18:21:52.377000
|
||||
CVE-2024-5661,0,0,6a2dd45e8fc7d5b14b278fbcc8ec1a3085392970a87a1948492f23392f86b031,2024-06-13T06:15:12.487000
|
||||
@ -253818,21 +253834,21 @@ CVE-2024-5674,0,0,11afaaac802b1d6e8d4b42e1720e01fd3b2015c65f88e67991e20cd209a30f
|
||||
CVE-2024-5675,0,0,c04fc1bf8ef6e3f232c30ddf0bd6a524958c9eab63fe205331e1fedef14ccf13,2024-06-11T18:14:02.017000
|
||||
CVE-2024-5684,0,0,e183f6f3c944efddc1281bf86b4d20b3677f4c3ab127fc0c8f4bc522f6d9ba19,2024-06-11T18:13:30.163000
|
||||
CVE-2024-5687,0,0,462616a340299eb021f948595697457aa449bd723bf07de403e8f8269f269fde,2024-06-11T13:54:12.057000
|
||||
CVE-2024-5688,0,1,7f1fe1d84ca624d192d2fb724198baaca7302a86c4913eab68abedb621f4cb87,2024-06-13T12:15:12.277000
|
||||
CVE-2024-5688,0,0,7f1fe1d84ca624d192d2fb724198baaca7302a86c4913eab68abedb621f4cb87,2024-06-13T12:15:12.277000
|
||||
CVE-2024-5689,0,0,4f410d9266634bd986e744eb8559ec451615a52b8eea36ea4f8bf68fc3b850d4,2024-06-11T13:54:12.057000
|
||||
CVE-2024-5690,0,1,ac861dce12b31044b05f6f6fe6f0fe83eb571bd4ec888afac298fea3bac76a5d,2024-06-13T12:15:12.427000
|
||||
CVE-2024-5691,0,1,08bd0230eb38412c4b5db4facbdf003320f50cba032a39e29f9a6d609e371660,2024-06-13T12:15:12.500000
|
||||
CVE-2024-5690,0,0,ac861dce12b31044b05f6f6fe6f0fe83eb571bd4ec888afac298fea3bac76a5d,2024-06-13T12:15:12.427000
|
||||
CVE-2024-5691,0,0,08bd0230eb38412c4b5db4facbdf003320f50cba032a39e29f9a6d609e371660,2024-06-13T12:15:12.500000
|
||||
CVE-2024-5692,0,0,e48bb3812c504721cd34d802f67ffdadf0dd6b742d5e6c0ed90ff8e5318d7f9d,2024-06-11T13:54:12.057000
|
||||
CVE-2024-5693,0,1,8a411418234ce7a07e19962e240c671d08a5b17209382e508d2d24c743f226ce,2024-06-13T12:15:12.563000
|
||||
CVE-2024-5693,0,0,8a411418234ce7a07e19962e240c671d08a5b17209382e508d2d24c743f226ce,2024-06-13T12:15:12.563000
|
||||
CVE-2024-5694,0,0,aa2834dbf06e3957cd7e5b06ce48b632b0b1bea9e8a5d243274c30e4d133705f,2024-06-11T13:54:12.057000
|
||||
CVE-2024-5695,0,0,aa5f03052a11170426e7a0ce58f6d9ec709b2a215a696c67577cfc53bb4ece2b,2024-06-11T13:54:12.057000
|
||||
CVE-2024-5696,0,1,d46f89edff0dd38b34dcdfc7398c221fd567a487b158d0c53ae9d4ce347b9383,2024-06-13T12:15:12.630000
|
||||
CVE-2024-5696,0,0,d46f89edff0dd38b34dcdfc7398c221fd567a487b158d0c53ae9d4ce347b9383,2024-06-13T12:15:12.630000
|
||||
CVE-2024-5697,0,0,d6ef87bb44484c2fd3d787945424253f6517461558939753340cc9af175a3a63,2024-06-11T13:54:12.057000
|
||||
CVE-2024-5698,0,0,c16a79fbd4c4b219827962a844d6045999c01de67ef2d1c4cdaafa604a433c0d,2024-06-11T13:54:12.057000
|
||||
CVE-2024-5699,0,0,b949f850e4c4079b463e32e2cd58b076e8b8024713a9727b47244a67dc641bb3,2024-06-11T13:54:12.057000
|
||||
CVE-2024-5700,0,1,581d0ffaf02660f0d610d579ef5069c434090bd2b21e65b9fa319c5db313e1f8,2024-06-13T12:15:12.687000
|
||||
CVE-2024-5700,0,0,581d0ffaf02660f0d610d579ef5069c434090bd2b21e65b9fa319c5db313e1f8,2024-06-13T12:15:12.687000
|
||||
CVE-2024-5701,0,0,d4e32e5841fb5c694dbc3b06ee89abb2a6307fcc124dd00bcd8ff23789ef2aca,2024-06-11T13:54:12.057000
|
||||
CVE-2024-5702,0,1,1f7a26a9a71e2b21845b213939501edb95629a21d46b5b00b90e42d7f9fd68ad,2024-06-13T12:15:12.750000
|
||||
CVE-2024-5702,0,0,1f7a26a9a71e2b21845b213939501edb95629a21d46b5b00b90e42d7f9fd68ad,2024-06-13T12:15:12.750000
|
||||
CVE-2024-5732,0,0,2b69cb5542c2f91e3e2021ac007049b3634a9137bdf0c325241236594abc7cc6,2024-06-11T17:57:13.767000
|
||||
CVE-2024-5733,0,0,78152e13cdabf162486c62849d39e4c95e26727ad5623fb603c3826108c4ab9b,2024-06-11T18:30:50.690000
|
||||
CVE-2024-5734,0,0,42e64867c1cdebe5031caec9548ec6393cd9bc290658f317ad4788de56fd156c,2024-06-11T18:30:16.727000
|
||||
|
Can't render this file because it is too large.
|
Loading…
x
Reference in New Issue
Block a user