Auto-Update: 2024-07-04T12:02:45.505838+00:00

This commit is contained in:
cad-safe-bot 2024-07-04 12:05:39 +00:00
parent df12d1e2c0
commit ce8f6c3b31
6 changed files with 162 additions and 101 deletions

View File

@ -2,12 +2,13 @@
"id": "CVE-2022-33324",
"sourceIdentifier": "Mitsubishielectric.Psirt@yd.MitsubishiElectric.co.jp",
"published": "2022-12-23T03:15:08.723",
"lastModified": "2024-05-30T10:15:08.703",
"lastModified": "2024-07-04T10:15:02.407",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Improper Resource Shutdown or Release vulnerability in Mitsubishi Electric Corporation MELSEC iQ-R Series R00/01/02CPU Firmware versions \"32\" and prior, Mitsubishi Electric Corporation MELSEC iQ-R Series R04/08/16/32/120(EN)CPU Firmware versions \"65\" and prior, Mitsubishi Electric Corporation MELSEC iQ-R Series R08/16/32/120SFCPU Firmware versions \"29\" and prior, Mitsubishi Electric Corporation MELSEC iQ-R Series R12CCPU-V Firmware versions \"17\" and prior, Mitsubishi Electric Corporation MELSEC iQ-L Series L04/08/16/32HCPU all versions and Mitsubishi Electric Corporation MELIPC Series MI5122-VW Firmware versions \"07\" and prior allows a remote unauthenticated attacker to cause a Denial of Service condition in Ethernet communication on the module by sending specially crafted packets. A system reset of the module is required for recovery."
"value": "Improper Resource Shutdown or Release vulnerability in Mitsubishi Electric Corporation MELSEC iQ-R Series R00/01/02CPU Firmware versions \"32\" and prior, Mitsubishi Electric Corporation MELSEC iQ-R Series R04/08/16/32/120(EN)CPU Firmware versions \"65\" and prior, Mitsubishi Electric Corporation MELSEC iQ-R Series R08/16/32/120SFCPU Firmware versions \"29\" and prior, Mitsubishi Electric Corporation MELSEC iQ-R Series R12CCPU-V Firmware versions \"17\" and prior, Mitsubishi Electric Corporation MELSEC iQ-L Series L04/08/16/32HCPU Firmware versions \"05\" and prior and Mitsubishi Electric Corporation MELIPC Series MI5122-VW Firmware versions \"07\" and prior allows a remote unauthenticated attacker to cause a Denial of Service condition in Ethernet communication on the module by sending specially crafted packets. A system reset of the module is required for recovery."
},
{
"lang": "es",
@ -89,9 +90,10 @@
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:mitsubishi:melsec_iq-r_r00_cpu:-:*:*:*:*:*:*:*",
"matchCriteriaId": "FC6B7E9C-C56C-4452-9A8A-3E8BF51ED354"
"vulnerable": true,
"criteria": "cpe:2.3:o:mitsubishi:melsec_iq-r_r00_cpu_firmware:*:*:*:*:*:*:*:*",
"versionEndExcluding": "33.0",
"matchCriteriaId": "EFC979CD-10C3-400C-A7EA-9E9B3637E1D7"
}
]
},
@ -100,10 +102,9 @@
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:mitsubishi:melsec_iq-r_r00_cpu_firmware:*:*:*:*:*:*:*:*",
"versionEndExcluding": "33.0",
"matchCriteriaId": "EFC979CD-10C3-400C-A7EA-9E9B3637E1D7"
"vulnerable": false,
"criteria": "cpe:2.3:h:mitsubishi:melsec_iq-r_r00_cpu:-:*:*:*:*:*:*:*",
"matchCriteriaId": "FC6B7E9C-C56C-4452-9A8A-3E8BF51ED354"
}
]
}
@ -112,17 +113,6 @@
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:mitsubishi:melsec_iq-r_r01_cpu:-:*:*:*:*:*:*:*",
"matchCriteriaId": "560D6AFE-4CDC-40D0-8C35-6749375B9B3C"
}
]
},
{
"operator": "OR",
"negate": false,
@ -134,23 +124,23 @@
"matchCriteriaId": "7E13BF4F-3D5A-4FAD-BCD8-7261920AE06F"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:mitsubishi:melsec_iq-r_r02_cpu:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E4D5746A-B9BC-4A4C-AF09-D2B16D54BF4D"
"criteria": "cpe:2.3:h:mitsubishi:melsec_iq-r_r01_cpu:-:*:*:*:*:*:*:*",
"matchCriteriaId": "560D6AFE-4CDC-40D0-8C35-6749375B9B3C"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
@ -162,23 +152,23 @@
"matchCriteriaId": "60BEF351-E337-4302-8D82-E90B2834370F"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:mitsubishi:melsec_iq-r_r04_cpu:-:*:*:*:*:*:*:*",
"matchCriteriaId": "DA6B52DA-0EF4-46BF-A36D-92F717F70987"
"criteria": "cpe:2.3:h:mitsubishi:melsec_iq-r_r02_cpu:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E4D5746A-B9BC-4A4C-AF09-D2B16D54BF4D"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
@ -190,23 +180,23 @@
"matchCriteriaId": "0B733AD2-E857-47F4-89D5-A8F8B45F4A52"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:mitsubishi:melsec_iq-r_r08_cpu:-:*:*:*:*:*:*:*",
"matchCriteriaId": "CF4496AD-1EFC-4B1D-8122-799FA34B40CB"
"criteria": "cpe:2.3:h:mitsubishi:melsec_iq-r_r04_cpu:-:*:*:*:*:*:*:*",
"matchCriteriaId": "DA6B52DA-0EF4-46BF-A36D-92F717F70987"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
@ -218,23 +208,23 @@
"matchCriteriaId": "94D88549-B35E-4E27-84D1-3A828604BAED"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:mitsubishi:melsec_iq-r_r16_cpu:-:*:*:*:*:*:*:*",
"matchCriteriaId": "CA42D2F8-7856-4983-8FA9-0421E039AE8C"
"criteria": "cpe:2.3:h:mitsubishi:melsec_iq-r_r08_cpu:-:*:*:*:*:*:*:*",
"matchCriteriaId": "CF4496AD-1EFC-4B1D-8122-799FA34B40CB"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
@ -246,23 +236,23 @@
"matchCriteriaId": "64A9C5A6-401D-4E28-A0DB-0BCD84B4E62B"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:mitsubishi:melsec_iq-r_r32_cpu:-:*:*:*:*:*:*:*",
"matchCriteriaId": "46D73C1A-3B81-4E81-A56D-0A75CEA4F92C"
"criteria": "cpe:2.3:h:mitsubishi:melsec_iq-r_r16_cpu:-:*:*:*:*:*:*:*",
"matchCriteriaId": "CA42D2F8-7856-4983-8FA9-0421E039AE8C"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
@ -274,6 +264,17 @@
"matchCriteriaId": "3F397671-FF15-45B0-8CEE-BC807B402019"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:mitsubishi:melsec_iq-r_r32_cpu:-:*:*:*:*:*:*:*",
"matchCriteriaId": "46D73C1A-3B81-4E81-A56D-0A75CEA4F92C"
}
]
}
]
},
@ -285,9 +286,10 @@
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:mitsubishi:melsec_iq-r_r120_cpu:-:*:*:*:*:*:*:*",
"matchCriteriaId": "3EB4326B-B4F4-40DD-8220-204D490FFB38"
"vulnerable": true,
"criteria": "cpe:2.3:o:mitsubishi:melsec_iq-r_r120_cpu_firmware:*:*:*:*:*:*:*:*",
"versionEndExcluding": "66.0",
"matchCriteriaId": "4F2250E2-BDB4-4D12-BE4A-9BFBE83736D6"
}
]
},
@ -296,10 +298,9 @@
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:mitsubishi:melsec_iq-r_r120_cpu_firmware:*:*:*:*:*:*:*:*",
"versionEndExcluding": "66.0",
"matchCriteriaId": "4F2250E2-BDB4-4D12-BE4A-9BFBE83736D6"
"vulnerable": false,
"criteria": "cpe:2.3:h:mitsubishi:melsec_iq-r_r120_cpu:-:*:*:*:*:*:*:*",
"matchCriteriaId": "3EB4326B-B4F4-40DD-8220-204D490FFB38"
}
]
}

View File

@ -2,12 +2,13 @@
"id": "CVE-2023-4088",
"sourceIdentifier": "Mitsubishielectric.Psirt@yd.MitsubishiElectric.co.jp",
"published": "2023-09-20T03:15:13.687",
"lastModified": "2023-09-28T00:15:09.553",
"lastModified": "2024-07-04T10:15:03.133",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Incorrect Default Permissions vulnerability due to incomplete fix to address CVE-2020-14496 in Mitsubishi Electric Corporation FA engineering software products allows a malicious local attacker to execute a malicious code, which could result in information disclosure, tampering with and deletion, or a denial-of-service (DoS) condition. However, if the mitigated version described in the advisory for CVE-2020-14496 is used and installed in the default installation folder, this vulnerability does not affect the products."
"value": "Incorrect Default Permissions vulnerability in Mitsubishi Electric Corporation multiple FA engineering software products allows a malicious local attacker to execute a malicious code, resulting in information disclosure, tampering with and deletion, or a denial-of-service (DoS) condition, if the product is installed in a folder other than the default installation folder."
},
{
"lang": "es",

View File

@ -0,0 +1,60 @@
{
"id": "CVE-2024-32754",
"sourceIdentifier": "productsecurity@jci.com",
"published": "2024-07-04T11:15:10.400",
"lastModified": "2024-07-04T11:15:10.400",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Under certain circumstances, when the controller is in factory reset mode waiting for initial setup, it will broadcast its MAC address, serial number, and firmware version. Once configured, the controller will no longer broadcast this information."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "productsecurity@jci.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N",
"attackVector": "ADJACENT_NETWORK",
"attackComplexity": "HIGH",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 3.1,
"baseSeverity": "LOW"
},
"exploitabilityScore": 1.6,
"impactScore": 1.4
}
]
},
"weaknesses": [
{
"source": "productsecurity@jci.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-200"
}
]
}
],
"references": [
{
"url": "https://www.cisa.gov/news-events/ics-advisories/icsa-24-184-01",
"source": "productsecurity@jci.com"
},
{
"url": "https://www.johnsoncontrols.com/trust-center/cybersecurity/security-advisories",
"source": "productsecurity@jci.com"
}
]
}

View File

@ -9,6 +9,10 @@
{
"lang": "en",
"value": "The Premium Addons for Elementor plugin for WordPress is vulnerable to Regular Expression Denial of Service (ReDoS) in all versions up to, and including, 4.10.35. This is due to processing user-supplied input as a regular expression. This makes it possible for authenticated attackers, with Author-level access and above, to create and query a malicious post title, resulting in slowing server resources."
},
{
"lang": "es",
"value": "El complemento Premium Addons for Elementor para WordPress es vulnerable a la denegaci\u00f3n de servicio de expresi\u00f3n regular (ReDoS) en todas las versiones hasta la 4.10.35 incluida. Esto se debe al procesamiento de la entrada proporcionada por el usuario como una expresi\u00f3n regular. Esto hace posible que atacantes autenticados, con acceso de nivel de autor y superior, creen y consulten un t\u00edtulo de publicaci\u00f3n malicioso, lo que ralentiza los recursos del servidor."
}
],
"metrics": {

View File

@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours.
### Last Repository Update
```plain
2024-07-04T10:03:38.103043+00:00
2024-07-04T12:02:45.505838+00:00
```
### Most recent CVE Modification Timestamp synchronized with NVD
```plain
2024-07-04T09:15:05.410000+00:00
2024-07-04T11:15:10.400000+00:00
```
### Last Data Feed Release
@ -33,29 +33,23 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
### Total Number of included CVEs
```plain
255865
255866
```
### CVEs added in the last Commit
Recently added CVEs: `9`
Recently added CVEs: `1`
- [CVE-2024-1182](CVE-2024/CVE-2024-11xx/CVE-2024-1182.json) (`2024-07-04T09:15:02.743`)
- [CVE-2024-1573](CVE-2024/CVE-2024-15xx/CVE-2024-1573.json) (`2024-07-04T09:15:03.260`)
- [CVE-2024-1574](CVE-2024/CVE-2024-15xx/CVE-2024-1574.json) (`2024-07-04T09:15:03.720`)
- [CVE-2024-3904](CVE-2024/CVE-2024-39xx/CVE-2024-3904.json) (`2024-07-04T09:15:04.317`)
- [CVE-2024-39884](CVE-2024/CVE-2024-398xx/CVE-2024-39884.json) (`2024-07-04T09:15:04.237`)
- [CVE-2024-5641](CVE-2024/CVE-2024-56xx/CVE-2024-5641.json) (`2024-07-04T08:15:01.980`)
- [CVE-2024-6318](CVE-2024/CVE-2024-63xx/CVE-2024-6318.json) (`2024-07-04T09:15:04.653`)
- [CVE-2024-6319](CVE-2024/CVE-2024-63xx/CVE-2024-6319.json) (`2024-07-04T09:15:05.087`)
- [CVE-2024-6434](CVE-2024/CVE-2024-64xx/CVE-2024-6434.json) (`2024-07-04T09:15:05.410`)
- [CVE-2024-32754](CVE-2024/CVE-2024-327xx/CVE-2024-32754.json) (`2024-07-04T11:15:10.400`)
### CVEs modified in the last Commit
Recently modified CVEs: `1`
Recently modified CVEs: `3`
- [CVE-2024-34584](CVE-2024/CVE-2024-345xx/CVE-2024-34584.json) (`2024-07-04T09:15:04.093`)
- [CVE-2022-33324](CVE-2022/CVE-2022-333xx/CVE-2022-33324.json) (`2024-07-04T10:15:02.407`)
- [CVE-2023-4088](CVE-2023/CVE-2023-40xx/CVE-2023-4088.json) (`2024-07-04T10:15:03.133`)
- [CVE-2024-6434](CVE-2024/CVE-2024-64xx/CVE-2024-6434.json) (`2024-07-04T09:15:05.410`)
## Download and Usage

View File

@ -200824,7 +200824,7 @@ CVE-2022-33320,0,0,499d71c29fcbb1dac93bce0266b9a510f343ff995df72ef6f04466f578337
CVE-2022-33321,0,0,28ded79bb837eabe6c9c9ff3c9367147e43b5edcf3e8d006a45278113ad8d9ea,2023-10-26T06:15:07.963000
CVE-2022-33322,0,0,1ffe7c5a4e541fb2cab5481ebf644de030cb88e02a602fb18674a12630d749e2,2023-10-26T06:15:09.297000
CVE-2022-33323,0,0,111449fd702099ac464ad28ad331b874fb3fd63b6b2fb7c864fdcc6f51ca1b11,2023-07-21T19:22:23.673000
CVE-2022-33324,0,0,19a203fa2ea8850bb0c46cc638382e638f2609764a6d808a58bb1eda26e86f7d,2024-05-30T10:15:08.703000
CVE-2022-33324,0,1,229a9a46e95cce1e0611b9294927c5b4cf127aa722479fe7b49057dad2349f3c,2024-07-04T10:15:02.407000
CVE-2022-33325,0,0,254a6e510adf83bba23c99082d51ab17324c91f3b818947bff593316a6a19c04,2022-07-12T20:01:30.937000
CVE-2022-33326,0,0,ae4f390450a32f40e28e2996d0e5c3dd06238a1acc63627e6fca82012f548b75,2022-07-12T20:02:29.537000
CVE-2022-33327,0,0,2c7981e88e6bfda8de92bead49c92762ed970ac6c2474c1c957188173d84e437,2022-07-12T20:03:25.853000
@ -230519,7 +230519,7 @@ CVE-2023-40874,0,0,d36162bc1d56e86f45744c6f94678ef58d4f44c06f9cc103e6cee13b948a3
CVE-2023-40875,0,0,819a436fc7b8257cb92f787cf2e0e7a5afedef27f192d55644d6103c57cf9ec7,2023-08-25T13:20:02.233000
CVE-2023-40876,0,0,b1700cd4ec87ebbd2b76bccbb563df93a231c4da2c77e1bd6ad9cef62184a017,2023-08-25T13:20:10.643000
CVE-2023-40877,0,0,59e069a010224f7d41abc8ac514330f39e9d77eac92d20d7e2a325667698ee9d,2023-08-25T13:20:20.920000
CVE-2023-4088,0,0,ca0fb236dab3e4f51b841e30b62920542d8f9c5bd9ab06059f9d2eff97ac6969,2023-09-28T00:15:09.553000
CVE-2023-4088,0,1,b26aa5c5427a43a70b61f38f3cc1a8948b95d07b0aad1fe9263c1dd9430a5879,2024-07-04T10:15:03.133000
CVE-2023-40889,0,0,21bcc2e2796095bf3c9cbdf5f1cea833bd8684b82d0df6f03e0a8ba9a934352d,2024-01-18T03:15:56.877000
CVE-2023-4089,0,0,bf57bc917d60ea200749e2d8f9236ceb8aedfc36b7b295ecc468bede17ef36c5,2023-10-24T18:00:38.507000
CVE-2023-40890,0,0,49944e09355494c56c970b2d89cdba085322f6c1ab0e17d3680165031c0c5532,2024-01-18T03:15:56.987000
@ -241662,7 +241662,7 @@ CVE-2024-1178,0,0,1d79d2baf0c52babf00a18f14ce6291cb7fba70afba005e5722ced55b2d8af
CVE-2024-1179,0,0,021c629d3779737b7d82b050f297fa166d2dce17da45eec990d84ef3164da439,2024-04-02T12:50:42.233000
CVE-2024-1180,0,0,67cc918e7b225376383a234e7a182443eae07c7dc034d299d9771cc94c55c9b6,2024-04-03T17:24:18.150000
CVE-2024-1181,0,0,3878a855f0577e7ef140d59905a2ce6431a946183d23ae64dcb6feffc50f80bc,2024-03-20T13:00:16.367000
CVE-2024-1182,1,1,97dd760accba3f9619b5db747b46c1d99d415aa78de66c6e87be5742637c5d6c,2024-07-04T09:15:02.743000
CVE-2024-1182,0,0,97dd760accba3f9619b5db747b46c1d99d415aa78de66c6e87be5742637c5d6c,2024-07-04T09:15:02.743000
CVE-2024-1183,0,0,ad3d5dd53b834e77fe27d619baf926c439310129c1f2f0d669e6120516ae79a3,2024-04-16T13:24:07.103000
CVE-2024-1184,0,0,023de5aadf78be1bb550c307602914123c4a319819f238db99009f5ee03b6925,2024-05-17T02:35:16.900000
CVE-2024-1185,0,0,0bdb213dbdb0433604bf4f6f8c159144762d1971d8fe18244dfa60142ddf3fc4,2024-06-26T15:15:19.220000
@ -242024,8 +242024,8 @@ CVE-2024-1569,0,0,4b71bedec4a1528fa42ec60009db4665ea96567ec249e5864edd831fa0bb98
CVE-2024-1570,0,0,1629a1493afa93044df9f22af1e83d093e3e06db82a23b409138b92d94c2f5f4,2024-02-29T13:49:29.390000
CVE-2024-1571,0,0,b1806e0b2d46f5d2ef86ed95b11ec13eeefb63bf2736347df987f91692e6e418,2024-04-10T13:24:00.070000
CVE-2024-1572,0,0,4deddd16a8e62290b13f0cdb450608c505fd6cdf76365f1d944ed8337c4c95f6,2024-05-02T18:00:37.360000
CVE-2024-1573,1,1,525026c1a1d2dc269cdc0824f8b93c4407a053b0a85eff2fec0031cccd4f9e9d,2024-07-04T09:15:03.260000
CVE-2024-1574,1,1,56d863daf3f49f005e1f6b5e3bd1cc334888364aca430a39a69808f44d9b50a1,2024-07-04T09:15:03.720000
CVE-2024-1573,0,0,525026c1a1d2dc269cdc0824f8b93c4407a053b0a85eff2fec0031cccd4f9e9d,2024-07-04T09:15:03.260000
CVE-2024-1574,0,0,56d863daf3f49f005e1f6b5e3bd1cc334888364aca430a39a69808f44d9b50a1,2024-07-04T09:15:03.720000
CVE-2024-1576,0,0,6db392527516528e14eb0ea0191722707d0a406a5c4d32feed7275ee783f8c4b,2024-06-13T18:36:09.010000
CVE-2024-1577,0,0,ba33ce0c17d7a340b987ce63ee030c6e2edbd0f04d791d826fcf4cc55f2d4eae,2024-06-18T13:15:51.627000
CVE-2024-1579,0,0,b19774dd42578330a3da1ea9eac4803944dc51b8f7e2cc4d4d08fb40df600dc0,2024-04-30T13:11:16.690000
@ -250747,6 +250747,7 @@ CVE-2024-32745,0,0,d87072ecdb1e4f8a0773ba4e4f91279addf64348f8d708e8345ba18186060
CVE-2024-32746,0,0,bf3d346f8591a3b2bf316b9b8132a2dfea1babc4dfa2642c153510eaf27fbfda,2024-07-03T01:57:04.453000
CVE-2024-3275,0,0,911ea91aef7f88befc82f4227a09867c3c1d7c5e1f1eaf9e7dcf15d1eb26a443,2024-05-02T18:00:37.360000
CVE-2024-32752,0,0,6d13d08f37a2ca402822db1d06cec7dff10a8c26a5cf1f44d193d0e9a10e4087,2024-07-03T01:57:05.223000
CVE-2024-32754,1,1,1ffadc47324147174069de59da93c07acb13900a5982ce6a6fa8bd6a29967e5d,2024-07-04T11:15:10.400000
CVE-2024-32755,0,0,b3528b194ab6699a4c0497b49f6b23d52c2b5f75510289aa8a21b02eac9ad3f2,2024-07-02T17:44:45.700000
CVE-2024-32756,0,0,7fa05cf39c6d3a5e903ec1a0f9f35b8a778ea0981647bd11b5e6e512e0af0b8a,2024-07-02T17:44:45.700000
CVE-2024-32757,0,0,324c62945352fac9f5590a80aa452fac7e1848c97df1fe1af0c1554b075a0f46,2024-07-02T17:44:45.700000
@ -251849,7 +251850,7 @@ CVE-2024-34580,0,0,19940bb2c544766cd6c53ffdca8fb9e214f270c8b9158a8629c2ecdb51324
CVE-2024-34581,0,0,0413ed27e2fcdfc3f06c8169658e624099f91a9321af4014b7ce969f11436f7e,2024-07-03T02:00:40.357000
CVE-2024-34582,0,0,589200e4299098a43f17589b3359a4252ec2c8c3c5fc845d002a18066ab71c11,2024-07-03T02:00:41.190000
CVE-2024-34583,0,0,d92099cb2aacb9940a376e2e0c9537aa23ff3e9bc91c630cc7027a285ebda73d,2024-07-02T12:09:16.907000
CVE-2024-34584,0,1,8e6f74275c7d42c51cc63abbe20a1a32c65348536b87a8575709018bb0cfcfc2,2024-07-04T09:15:04.093000
CVE-2024-34584,0,0,8e6f74275c7d42c51cc63abbe20a1a32c65348536b87a8575709018bb0cfcfc2,2024-07-04T09:15:04.093000
CVE-2024-34585,0,0,ee8a251702fee14d8824e610a55296979d395fc30ca6242ef0d771950dd8a16c,2024-07-02T12:09:16.907000
CVE-2024-34586,0,0,85ea0e1776d595c70d1b77b7c2a6e5386b5196b05d554fbb5d36eb03a3aca46d,2024-07-02T12:09:16.907000
CVE-2024-34587,0,0,12a6bb49f8fa1d3da9fa63d0f36b9f078a4757ebe15d04c02460d0cd53601e2b,2024-07-02T12:09:16.907000
@ -253999,7 +254000,7 @@ CVE-2024-39016,0,0,44b10b31c2dcb3d5902acc74499e6688219a0202af7dbd3ffd5adca56db39
CVE-2024-39017,0,0,cad5c73885b78ec41e9e1236a7a0070e7449eef74b63e32b190c59476e544a2f,2024-07-03T02:05:37.560000
CVE-2024-39018,0,0,16dc342eb9c9ddff4509558cd4678a205ae33f272029e49d96df9e8a311347f8,2024-07-01T16:37:39.040000
CVE-2024-3903,0,0,b17bb4ec6e0e391a38b8cd510c422de68900922cf0bf4c2e4e48aa68680d6339,2024-05-14T16:11:39.510000
CVE-2024-3904,1,1,c5765cf5b9d9395a166e5f9497abbc0c75afd17eef49668e50ad189eeca3d838,2024-07-04T09:15:04.317000
CVE-2024-3904,0,0,c5765cf5b9d9395a166e5f9497abbc0c75afd17eef49668e50ad189eeca3d838,2024-07-04T09:15:04.317000
CVE-2024-3905,0,0,a951c486be8869bf12976255205bd7b845c8a04b7efadd3f2b0fe1349880c5bb,2024-06-04T19:20:26.357000
CVE-2024-3906,0,0,2118bc9913869ee4f34c8416c221c77b744d5529f8376fd726e306c6d571b72a,2024-06-04T19:20:26.463000
CVE-2024-3907,0,0,d80cb7d26fcc43e0af9a1a179a5017f98da402633ba2a83ba5df778a0fb65662,2024-06-04T19:20:26.563000
@ -254162,7 +254163,7 @@ CVE-2024-3987,0,0,05499205f937534ee026fd5a41dcafd44deae059117eea743b5e3e3c53eaee
CVE-2024-39878,0,0,038c252a5df59aef0ff494dd466e8c23160164cb5ac894aeb1a33e06001b79d4,2024-07-02T12:09:16.907000
CVE-2024-39879,0,0,1b030ce3798bca0bad33a3937cca95b776786d7918bf02f25bff668e667acaa0,2024-07-02T12:09:16.907000
CVE-2024-3988,0,0,ed49ad0e503298ba2fe40c90a665a86dcb918b5087ac61c1edfd746c2ca95d24,2024-04-25T13:18:13.537000
CVE-2024-39884,1,1,91cbd8ded2e4683c39dfef6707444bdb9aba0a44a7e9eae96339027dc4b99d07,2024-07-04T09:15:04.237000
CVE-2024-39884,0,0,91cbd8ded2e4683c39dfef6707444bdb9aba0a44a7e9eae96339027dc4b99d07,2024-07-04T09:15:04.237000
CVE-2024-3989,0,0,41a6b1dcae0354fb8cba40366dc7ed1eeb84d6a6a33689c35123198fe63c8f01,2024-05-14T16:11:39.510000
CVE-2024-39891,0,0,f05a058a4cf741da51f47b19ea162b25ce262cdb61fb36618eb53dc7411c00e3,2024-07-03T22:15:02.923000
CVE-2024-39894,0,0,c61bb2661100853548279e349e76a635cba102e2f9a2c3076410b71ec944a6f0,2024-07-03T13:15:02.890000
@ -255453,7 +255454,7 @@ CVE-2024-5637,0,0,96c491286509bbcdcc2ade7ab7cd058d8e2fb8f26719ef46502e504a5a75b3
CVE-2024-5638,0,0,ecd29107ace2c39372f8ad7d26b6d92a031cf986dc4e07d96162e8140ebd097d,2024-06-10T02:52:08.267000
CVE-2024-5639,0,0,2322b8156dee01dfdab7b2069be6e0698e3a8613a841329b71822c874a14aeb7,2024-06-24T19:24:23.883000
CVE-2024-5640,0,0,86163b3d741cee0a4e50ef8553f0c82f1f0c15bd48d022d2d250ef0f55c23f10,2024-06-07T14:56:05.647000
CVE-2024-5641,1,1,302257d539c3a4fe0e3331a2a68b0052238d89c20df69a4f9616726a8c28637c,2024-07-04T08:15:01.980000
CVE-2024-5641,0,0,302257d539c3a4fe0e3331a2a68b0052238d89c20df69a4f9616726a8c28637c,2024-07-04T08:15:01.980000
CVE-2024-5642,0,0,473e29d44a01c1bd9d78a11628480be9d88df99635e7b451adc74e5ff8ecb62e,2024-07-01T14:15:05.807000
CVE-2024-5645,0,0,1faba0fd6e05694e3fff7011c206b3ecee3c45fddb7e6c575993af231224a181,2024-06-11T17:57:47.197000
CVE-2024-5646,0,0,23240aeec5f40e46e6951e19eff4b72273567c29932f06ca0851d3144bb5ebaa,2024-06-13T18:36:09.013000
@ -255811,8 +255812,8 @@ CVE-2024-6305,0,0,f99f0e2fe8305a118a77228b9078f8dc9ee1845d0c6e4aa828aaf18dadf372
CVE-2024-6306,0,0,711bff153bb36aca97259b9a58665f79686710d592de1aed3b99962d3c3067a2,2024-06-25T17:15:11.107000
CVE-2024-6307,0,0,a6037df0fa8617c9aaeffdc703000fa7423e885d439338f30eb38eb0279e87b9,2024-06-28T13:15:03.453000
CVE-2024-6308,0,0,483bab7c0040f40965fba497a0be9e45fef6974a263c54d39149185a218f4b43,2024-06-25T21:16:02.087000
CVE-2024-6318,1,1,e033378ac4544687400474837a8b9fb1fb7ef6cbc1b4ab7f07f0cd63fde00254,2024-07-04T09:15:04.653000
CVE-2024-6319,1,1,1c94f040c5cd0de82491b8e7d77e2e4bd7efa09bf92ae831fabe7dcf4f48e7be,2024-07-04T09:15:05.087000
CVE-2024-6318,0,0,e033378ac4544687400474837a8b9fb1fb7ef6cbc1b4ab7f07f0cd63fde00254,2024-07-04T09:15:04.653000
CVE-2024-6319,0,0,1c94f040c5cd0de82491b8e7d77e2e4bd7efa09bf92ae831fabe7dcf4f48e7be,2024-07-04T09:15:05.087000
CVE-2024-6323,0,0,16f93962f537d8478d96317e8b0d9cad0e3aee225ed0ebdb8d6f6bf214bb804e,2024-06-28T13:15:19.317000
CVE-2024-6340,0,0,fd12f25a45d92fefbb8c0ec47428250f4f56bb9c686a12a52e54d86e24fec10a,2024-07-03T18:27:40.903000
CVE-2024-6341,0,0,528f4fdde1526d72477e90a767b2f2316b168f65b64effeddb9446d8a5cdcaf5,2024-07-02T18:15:03.900000
@ -255850,7 +255851,7 @@ CVE-2024-6425,0,0,adbfecb8c3cc947ec785870957655621e37e6a4ecfa332482b1b765f471fc8
CVE-2024-6426,0,0,743cead7bfbb6d52b9a38edd8f28e270cc396ea75af77fc494cdf15f853aedb8,2024-07-03T12:53:24.977000
CVE-2024-6427,0,0,57065ff923a64c20753385de741e3156cf426d3558cd727998195d1e669fe19f,2024-07-03T12:53:24.977000
CVE-2024-6428,0,0,31d69642490b0b5c14fae0235cb6cc8aea9d2d4868dab2c3323c281656122a48,2024-07-03T12:53:24.977000
CVE-2024-6434,1,1,159c06c28af995898176b2d52f1d50311b3051bc0d4d4281e9110d212e9abad5,2024-07-04T09:15:05.410000
CVE-2024-6434,0,1,d14275f75a0fe927b52fc71c63796f773d90555ba13b7d1eee800825aa65d4b4,2024-07-04T09:15:05.410000
CVE-2024-6438,0,0,c89c4e3ccf031fb42672508ffc0236a74fd652409f3f814c1aa7277296a22143,2024-07-02T17:54:02.370000
CVE-2024-6439,0,0,1bd5e2a149e15b87b2ec1d9e23e870c4f5a97c502c5089c3f0a60fbd028209c7,2024-07-02T17:58:39.773000
CVE-2024-6440,0,0,4db20ef0878ff896f7a92a0fb63819a7fd586b5cd61940caee4cf26cda6cf8f9,2024-07-02T17:58:15.410000

Can't render this file because it is too large.