mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-07-09 16:05:11 +00:00
Auto-Update: 2024-08-01T10:00:16.930093+00:00
This commit is contained in:
parent
af42add1e2
commit
d3dab1faa8
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2022-24975",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2022-02-11T20:15:07.507",
|
||||
"lastModified": "2024-07-02T14:15:12.013",
|
||||
"lastModified": "2024-08-01T09:15:02.447",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [
|
||||
{
|
||||
@ -110,6 +110,10 @@
|
||||
"Vendor Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://lore.kernel.org/git/xmqq4k14qe9g.fsf%40gitster.g/",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://www.aquasec.com/blog/undetected-hard-code-secrets-expose-corporations/",
|
||||
"source": "cve@mitre.org"
|
||||
|
60
CVE-2024/CVE-2024-259xx/CVE-2024-25948.json
Normal file
60
CVE-2024/CVE-2024-259xx/CVE-2024-25948.json
Normal file
@ -0,0 +1,60 @@
|
||||
{
|
||||
"id": "CVE-2024-25948",
|
||||
"sourceIdentifier": "security_alert@emc.com",
|
||||
"published": "2024-08-01T08:15:02.203",
|
||||
"lastModified": "2024-08-01T08:15:02.203",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Dell iDRAC Service Module version 5.3.0.0 and prior, contain a Out of bound Write Vulnerability. A privileged local attacker could execute arbitrary code potentially resulting in a denial of service event."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "El m\u00f3dulo de servicio Dell iDRAC versi\u00f3n 5.3.0.0 y anteriores contiene una vulnerabilidad de escritura fuera de los l\u00edmites. Un atacante local privilegiado podr\u00eda ejecutar c\u00f3digo arbitrario, lo que podr\u00eda provocar un evento de denegaci\u00f3n de servicio."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security_alert@emc.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:N/I:L/A:H",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "HIGH",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 4.8,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 0.6,
|
||||
"impactScore": 4.2
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security_alert@emc.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-787"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.dell.com/support/kbdoc/en-us/000227444/dsa-2024-086-security-update-for-dell-idrac-service-module-for-memory-corruption-vulnerabilities",
|
||||
"source": "security_alert@emc.com"
|
||||
}
|
||||
]
|
||||
}
|
60
CVE-2024/CVE-2024-289xx/CVE-2024-28972.json
Normal file
60
CVE-2024/CVE-2024-289xx/CVE-2024-28972.json
Normal file
@ -0,0 +1,60 @@
|
||||
{
|
||||
"id": "CVE-2024-28972",
|
||||
"sourceIdentifier": "security_alert@emc.com",
|
||||
"published": "2024-08-01T08:15:02.520",
|
||||
"lastModified": "2024-08-01T08:15:02.520",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Dell InsightIQ, Verion 5.0.0, contains a use of a broken or risky cryptographic algorithm vulnerability. An unauthenticated remote attacker could potentially exploit this vulnerability, leading to information disclosure."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Dell InsightIQ, versi\u00f3n 5.0.0, contiene una vulnerabilidad relacionada con el uso de un algoritmo criptogr\u00e1fico da\u00f1ado o riesgoso. Un atacante remoto no autenticado podr\u00eda aprovechar esta vulnerabilidad y provocar la divulgaci\u00f3n de informaci\u00f3n."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security_alert@emc.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "HIGH",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 5.9,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.2,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security_alert@emc.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-327"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.dell.com/support/kbdoc/en-us/000226567/dsa-2024-211-security-update-for-a-dell-insightiq-broken-or-risky-cryptographic-algorithm-vulnerability",
|
||||
"source": "security_alert@emc.com"
|
||||
}
|
||||
]
|
||||
}
|
60
CVE-2024/CVE-2024-384xx/CVE-2024-38481.json
Normal file
60
CVE-2024/CVE-2024-384xx/CVE-2024-38481.json
Normal file
@ -0,0 +1,60 @@
|
||||
{
|
||||
"id": "CVE-2024-38481",
|
||||
"sourceIdentifier": "security_alert@emc.com",
|
||||
"published": "2024-08-01T08:15:02.767",
|
||||
"lastModified": "2024-08-01T08:15:02.767",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Dell iDRAC Service Module version 5.3.0.0 and prior, contain a Out of bound Read Vulnerability. A privileged local attacker could execute arbitrary code potentially resulting in a denial of service event."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "El m\u00f3dulo de servicio Dell iDRAC versi\u00f3n 5.3.0.0 y anteriores contiene una vulnerabilidad de lectura fuera de los l\u00edmites. Un atacante local privilegiado podr\u00eda ejecutar c\u00f3digo arbitrario, lo que podr\u00eda provocar un evento de denegaci\u00f3n de servicio."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security_alert@emc.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:N/I:L/A:H",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "HIGH",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 4.8,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 0.6,
|
||||
"impactScore": 4.2
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security_alert@emc.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-125"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.dell.com/support/kbdoc/en-us/000227444/dsa-2024-086-security-update-for-dell-idrac-service-module-for-memory-corruption-vulnerabilities",
|
||||
"source": "security_alert@emc.com"
|
||||
}
|
||||
]
|
||||
}
|
60
CVE-2024/CVE-2024-384xx/CVE-2024-38489.json
Normal file
60
CVE-2024/CVE-2024-384xx/CVE-2024-38489.json
Normal file
@ -0,0 +1,60 @@
|
||||
{
|
||||
"id": "CVE-2024-38489",
|
||||
"sourceIdentifier": "security_alert@emc.com",
|
||||
"published": "2024-08-01T08:15:02.980",
|
||||
"lastModified": "2024-08-01T08:15:02.980",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Dell iDRAC Service Module version 5.3.0.0 and prior contains Out of bound write Vulnerability. A privileged local attacker could execute arbitrary code potentially resulting in a denial of service (partial) event."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "El m\u00f3dulo de servicio Dell iDRAC versi\u00f3n 5.3.0.0 y anteriores contiene una vulnerabilidad de escritura fuera de los l\u00edmites. Un atacante local privilegiado podr\u00eda ejecutar c\u00f3digo arbitrario, lo que podr\u00eda provocar un evento de denegaci\u00f3n de servicio (parcial)."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security_alert@emc.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:N/I:L/A:L",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "HIGH",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "LOW",
|
||||
"baseScore": 3.1,
|
||||
"baseSeverity": "LOW"
|
||||
},
|
||||
"exploitabilityScore": 0.6,
|
||||
"impactScore": 2.5
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security_alert@emc.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-787"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.dell.com/support/kbdoc/en-us/000227444/dsa-2024-086-security-update-for-dell-idrac-service-module-for-memory-corruption-vulnerabilities",
|
||||
"source": "security_alert@emc.com"
|
||||
}
|
||||
]
|
||||
}
|
60
CVE-2024/CVE-2024-384xx/CVE-2024-38490.json
Normal file
60
CVE-2024/CVE-2024-384xx/CVE-2024-38490.json
Normal file
@ -0,0 +1,60 @@
|
||||
{
|
||||
"id": "CVE-2024-38490",
|
||||
"sourceIdentifier": "security_alert@emc.com",
|
||||
"published": "2024-08-01T08:15:03.187",
|
||||
"lastModified": "2024-08-01T08:15:03.187",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Dell iDRAC Service Module version 5.3.0.0 and prior, contain a Out of bound Write Vulnerability. A privileged local attacker could execute arbitrary code potentially resulting in a denial of service event."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "El m\u00f3dulo de servicio Dell iDRAC versi\u00f3n 5.3.0.0 y anteriores contiene una vulnerabilidad de escritura fuera de los l\u00edmites. Un atacante local privilegiado podr\u00eda ejecutar c\u00f3digo arbitrario, lo que podr\u00eda provocar un evento de denegaci\u00f3n de servicio."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security_alert@emc.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:N/I:H/A:H",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "HIGH",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 5.8,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 0.6,
|
||||
"impactScore": 5.2
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security_alert@emc.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-787"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.dell.com/support/kbdoc/en-us/000227444/dsa-2024-086-security-update-for-dell-idrac-service-module-for-memory-corruption-vulnerabilities",
|
||||
"source": "security_alert@emc.com"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-41684",
|
||||
"sourceIdentifier": "vdisclose@cert-in.org.in",
|
||||
"published": "2024-07-26T12:15:02.763",
|
||||
"lastModified": "2024-07-26T12:38:41.683",
|
||||
"lastModified": "2024-08-01T08:15:03.390",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -75,7 +75,7 @@
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://cert-in.org.in/s2cMainServlet?pageid=PUBVLNOTES01&VLCODE=CIVN-2024-0225",
|
||||
"url": "https://www.cert-in.org.in/s2cMainServlet?pageid=PUBVLNOTES01&VLCODE=CIVN-2024-0225",
|
||||
"source": "vdisclose@cert-in.org.in"
|
||||
}
|
||||
]
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-41685",
|
||||
"sourceIdentifier": "vdisclose@cert-in.org.in",
|
||||
"published": "2024-07-26T12:15:02.977",
|
||||
"lastModified": "2024-07-26T12:38:41.683",
|
||||
"lastModified": "2024-08-01T08:15:03.547",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -75,7 +75,7 @@
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://cert-in.org.in/s2cMainServlet?pageid=PUBVLNOTES01&VLCODE=CIVN-2024-0225",
|
||||
"url": "https://www.cert-in.org.in/s2cMainServlet?pageid=PUBVLNOTES01&VLCODE=CIVN-2024-0225",
|
||||
"source": "vdisclose@cert-in.org.in"
|
||||
}
|
||||
]
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-41686",
|
||||
"sourceIdentifier": "vdisclose@cert-in.org.in",
|
||||
"published": "2024-07-26T12:15:03.113",
|
||||
"lastModified": "2024-07-26T12:38:41.683",
|
||||
"lastModified": "2024-08-01T08:15:03.640",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -75,7 +75,7 @@
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://cert-in.org.in/s2cMainServlet?pageid=PUBVLNOTES01&VLCODE=CIVN-2024-0225",
|
||||
"url": "https://www.cert-in.org.in/s2cMainServlet?pageid=PUBVLNOTES01&VLCODE=CIVN-2024-0225",
|
||||
"source": "vdisclose@cert-in.org.in"
|
||||
}
|
||||
]
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-41687",
|
||||
"sourceIdentifier": "vdisclose@cert-in.org.in",
|
||||
"published": "2024-07-26T12:15:03.250",
|
||||
"lastModified": "2024-07-26T12:38:41.683",
|
||||
"lastModified": "2024-08-01T08:15:03.730",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -75,7 +75,7 @@
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://cert-in.org.in/s2cMainServlet?pageid=PUBVLNOTES01&VLCODE=CIVN-2024-0225",
|
||||
"url": "https://www.cert-in.org.in/s2cMainServlet?pageid=PUBVLNOTES01&VLCODE=CIVN-2024-0225",
|
||||
"source": "vdisclose@cert-in.org.in"
|
||||
}
|
||||
]
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-41688",
|
||||
"sourceIdentifier": "vdisclose@cert-in.org.in",
|
||||
"published": "2024-07-26T12:15:03.370",
|
||||
"lastModified": "2024-07-26T12:38:41.683",
|
||||
"lastModified": "2024-08-01T08:15:03.817",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -75,7 +75,7 @@
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://cert-in.org.in/s2cMainServlet?pageid=PUBVLNOTES01&VLCODE=CIVN-2024-0225",
|
||||
"url": "https://www.cert-in.org.in/s2cMainServlet?pageid=PUBVLNOTES01&VLCODE=CIVN-2024-0225",
|
||||
"source": "vdisclose@cert-in.org.in"
|
||||
}
|
||||
]
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-41689",
|
||||
"sourceIdentifier": "vdisclose@cert-in.org.in",
|
||||
"published": "2024-07-26T12:15:03.490",
|
||||
"lastModified": "2024-07-26T12:38:41.683",
|
||||
"lastModified": "2024-08-01T08:15:03.907",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -75,7 +75,7 @@
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://cert-in.org.in/s2cMainServlet?pageid=PUBVLNOTES01&VLCODE=CIVN-2024-0225",
|
||||
"url": "https://www.cert-in.org.in/s2cMainServlet?pageid=PUBVLNOTES01&VLCODE=CIVN-2024-0225",
|
||||
"source": "vdisclose@cert-in.org.in"
|
||||
}
|
||||
]
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-41690",
|
||||
"sourceIdentifier": "vdisclose@cert-in.org.in",
|
||||
"published": "2024-07-26T12:15:03.623",
|
||||
"lastModified": "2024-07-26T12:38:41.683",
|
||||
"lastModified": "2024-08-01T08:15:03.990",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -75,7 +75,7 @@
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://cert-in.org.in/s2cMainServlet?pageid=PUBVLNOTES01&VLCODE=CIVN-2024-0225",
|
||||
"url": "https://www.cert-in.org.in/s2cMainServlet?pageid=PUBVLNOTES01&VLCODE=CIVN-2024-0225",
|
||||
"source": "vdisclose@cert-in.org.in"
|
||||
}
|
||||
]
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-41691",
|
||||
"sourceIdentifier": "vdisclose@cert-in.org.in",
|
||||
"published": "2024-07-26T12:15:03.753",
|
||||
"lastModified": "2024-07-26T12:38:41.683",
|
||||
"lastModified": "2024-08-01T08:15:04.083",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -75,7 +75,7 @@
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://cert-in.org.in/s2cMainServlet?pageid=PUBVLNOTES01&VLCODE=CIVN-2024-0225",
|
||||
"url": "https://www.cert-in.org.in/s2cMainServlet?pageid=PUBVLNOTES01&VLCODE=CIVN-2024-0225",
|
||||
"source": "vdisclose@cert-in.org.in"
|
||||
}
|
||||
]
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-41692",
|
||||
"sourceIdentifier": "vdisclose@cert-in.org.in",
|
||||
"published": "2024-07-26T13:15:09.947",
|
||||
"lastModified": "2024-07-29T14:12:08.783",
|
||||
"lastModified": "2024-08-01T08:15:04.173",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -75,7 +75,7 @@
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://cert-in.org.in/s2cMainServlet?pageid=PUBVLNOTES01&VLCODE=CIVN-2024-0225",
|
||||
"url": "https://www.cert-in.org.in/s2cMainServlet?pageid=PUBVLNOTES01&VLCODE=CIVN-2024-0225",
|
||||
"source": "vdisclose@cert-in.org.in"
|
||||
}
|
||||
]
|
||||
|
@ -2,13 +2,17 @@
|
||||
"id": "CVE-2024-6975",
|
||||
"sourceIdentifier": "2505284f-8ffb-486c-bf60-e19c1097a90b",
|
||||
"published": "2024-07-31T17:15:11.640",
|
||||
"lastModified": "2024-07-31T20:15:07.613",
|
||||
"lastModified": "2024-08-01T09:15:03.097",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Cato Networks Windows SDP Client Local Privilege Escalation via openssl configuration fileThis issue affects SDP Client before 5.10.34."
|
||||
"value": "Cato Networks Windows SDP Client Local Privilege Escalation via openssl configuration file.\nThis issue affects SDP Client before 5.10.34."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": " Escalada de privilegios locales del cliente SDP de Cato Networks Windows SDP a trav\u00e9s del archivo de configuraci\u00f3n openssl. Este problema afecta a SDP Client anterior a la versi\u00f3n 5.10.34."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
|
@ -9,6 +9,10 @@
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "The Blog2Social: Social Media Auto Post & Scheduler plugin for WordPress is vulnerable to Stored Cross-Site Scripting via 3gp2 file uploads in all versions up to, and including, 7.5.4 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with author-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses the 3gp2 file."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "El complemento Blog2Social: Social Media Auto Post & Scheduler para WordPress es vulnerable a Cross Site Scripting almacenado a trav\u00e9s de cargas de archivos 3gp2 en todas las versiones hasta la 7.5.4 incluida debido a una sanitizaci\u00f3n de entrada y un escape de salida insuficientes. Esto hace posible que atacantes autenticados, con acceso de nivel de autor y superior, inyecten scripts web arbitrarios en p\u00e1ginas que se ejecutar\u00e1n cada vez que un usuario acceda al archivo 3gp2."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
|
39
README.md
39
README.md
@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours.
|
||||
### Last Repository Update
|
||||
|
||||
```plain
|
||||
2024-08-01T08:00:17.086040+00:00
|
||||
2024-08-01T10:00:16.930093+00:00
|
||||
```
|
||||
|
||||
### Most recent CVE Modification Timestamp synchronized with NVD
|
||||
|
||||
```plain
|
||||
2024-08-01T07:15:03.300000+00:00
|
||||
2024-08-01T09:15:03.097000+00:00
|
||||
```
|
||||
|
||||
### Last Data Feed Release
|
||||
@ -33,31 +33,36 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
|
||||
### Total Number of included CVEs
|
||||
|
||||
```plain
|
||||
258722
|
||||
258727
|
||||
```
|
||||
|
||||
### CVEs added in the last Commit
|
||||
|
||||
Recently added CVEs: `12`
|
||||
Recently added CVEs: `5`
|
||||
|
||||
- [CVE-2024-1747](CVE-2024/CVE-2024-17xx/CVE-2024-1747.json) (`2024-08-01T06:15:01.980`)
|
||||
- [CVE-2024-25947](CVE-2024/CVE-2024-259xx/CVE-2024-25947.json) (`2024-08-01T07:15:02.140`)
|
||||
- [CVE-2024-2843](CVE-2024/CVE-2024-28xx/CVE-2024-2843.json) (`2024-08-01T06:15:02.367`)
|
||||
- [CVE-2024-2872](CVE-2024/CVE-2024-28xx/CVE-2024-2872.json) (`2024-08-01T06:15:02.443`)
|
||||
- [CVE-2024-3983](CVE-2024/CVE-2024-39xx/CVE-2024-3983.json) (`2024-08-01T06:15:02.517`)
|
||||
- [CVE-2024-4090](CVE-2024/CVE-2024-40xx/CVE-2024-4090.json) (`2024-08-01T06:15:02.587`)
|
||||
- [CVE-2024-5330](CVE-2024/CVE-2024-53xx/CVE-2024-5330.json) (`2024-08-01T07:15:02.520`)
|
||||
- [CVE-2024-5331](CVE-2024/CVE-2024-53xx/CVE-2024-5331.json) (`2024-08-01T07:15:02.783`)
|
||||
- [CVE-2024-5678](CVE-2024/CVE-2024-56xx/CVE-2024-5678.json) (`2024-08-01T07:15:03.053`)
|
||||
- [CVE-2024-6496](CVE-2024/CVE-2024-64xx/CVE-2024-6496.json) (`2024-08-01T06:15:02.660`)
|
||||
- [CVE-2024-6529](CVE-2024/CVE-2024-65xx/CVE-2024-6529.json) (`2024-08-01T06:15:02.737`)
|
||||
- [CVE-2024-7302](CVE-2024/CVE-2024-73xx/CVE-2024-7302.json) (`2024-08-01T07:15:03.300`)
|
||||
- [CVE-2024-25948](CVE-2024/CVE-2024-259xx/CVE-2024-25948.json) (`2024-08-01T08:15:02.203`)
|
||||
- [CVE-2024-28972](CVE-2024/CVE-2024-289xx/CVE-2024-28972.json) (`2024-08-01T08:15:02.520`)
|
||||
- [CVE-2024-38481](CVE-2024/CVE-2024-384xx/CVE-2024-38481.json) (`2024-08-01T08:15:02.767`)
|
||||
- [CVE-2024-38489](CVE-2024/CVE-2024-384xx/CVE-2024-38489.json) (`2024-08-01T08:15:02.980`)
|
||||
- [CVE-2024-38490](CVE-2024/CVE-2024-384xx/CVE-2024-38490.json) (`2024-08-01T08:15:03.187`)
|
||||
|
||||
|
||||
### CVEs modified in the last Commit
|
||||
|
||||
Recently modified CVEs: `0`
|
||||
Recently modified CVEs: `12`
|
||||
|
||||
- [CVE-2022-24975](CVE-2022/CVE-2022-249xx/CVE-2022-24975.json) (`2024-08-01T09:15:02.447`)
|
||||
- [CVE-2024-41684](CVE-2024/CVE-2024-416xx/CVE-2024-41684.json) (`2024-08-01T08:15:03.390`)
|
||||
- [CVE-2024-41685](CVE-2024/CVE-2024-416xx/CVE-2024-41685.json) (`2024-08-01T08:15:03.547`)
|
||||
- [CVE-2024-41686](CVE-2024/CVE-2024-416xx/CVE-2024-41686.json) (`2024-08-01T08:15:03.640`)
|
||||
- [CVE-2024-41687](CVE-2024/CVE-2024-416xx/CVE-2024-41687.json) (`2024-08-01T08:15:03.730`)
|
||||
- [CVE-2024-41688](CVE-2024/CVE-2024-416xx/CVE-2024-41688.json) (`2024-08-01T08:15:03.817`)
|
||||
- [CVE-2024-41689](CVE-2024/CVE-2024-416xx/CVE-2024-41689.json) (`2024-08-01T08:15:03.907`)
|
||||
- [CVE-2024-41690](CVE-2024/CVE-2024-416xx/CVE-2024-41690.json) (`2024-08-01T08:15:03.990`)
|
||||
- [CVE-2024-41691](CVE-2024/CVE-2024-416xx/CVE-2024-41691.json) (`2024-08-01T08:15:04.083`)
|
||||
- [CVE-2024-41692](CVE-2024/CVE-2024-416xx/CVE-2024-41692.json) (`2024-08-01T08:15:04.173`)
|
||||
- [CVE-2024-6975](CVE-2024/CVE-2024-69xx/CVE-2024-6975.json) (`2024-08-01T09:15:03.097`)
|
||||
- [CVE-2024-7302](CVE-2024/CVE-2024-73xx/CVE-2024-7302.json) (`2024-08-01T07:15:03.300`)
|
||||
|
||||
|
||||
## Download and Usage
|
||||
|
51
_state.csv
51
_state.csv
@ -193982,7 +193982,7 @@ CVE-2022-24971,0,0,b0ec64ce85d02676128b2391e83c3a0904b022f7f222dffc5466868a30d12
|
||||
CVE-2022-24972,0,0,8ca286053ef211cb717e8d7ba05404f77cb656fa6c149573f4f398c341507249,2023-04-05T03:34:41.627000
|
||||
CVE-2022-24973,0,0,6650a12e7f7242fbdbdddfd89df53b30a62a61449f0bbf1e3070c5cf8806ef6a,2023-04-05T03:35:31.440000
|
||||
CVE-2022-24974,0,0,fba3a9c12ff147ef841443e5fe2e4f3e297e031a813c3be9c249e2f40a5ba227,2022-05-11T00:21:33.083000
|
||||
CVE-2022-24975,0,0,090928d5f9d7c099d5773345efee0557e0185c91541eaf0adff9eb64b31ff24e,2024-07-02T14:15:12.013000
|
||||
CVE-2022-24975,0,1,60a38241a1999df0b051f185d939ee92807ebaf4a33cfc59a64a863ae2e75245,2024-08-01T09:15:02.447000
|
||||
CVE-2022-24976,0,0,9d164c5ffac11b9a353375464b382d1507e31d1dcd0776c643e98607a371d3ac,2022-02-23T15:51:09.573000
|
||||
CVE-2022-24977,0,0,991181fb0f347b7660a40d47a98a2df1472959b4e57cf91f9ea277e9ff907058,2022-02-24T15:12:00.587000
|
||||
CVE-2022-24978,0,0,50d845b969b7e012c0869852e6f86b59f8ebbb78f2d6ace97d66ac19b3bf3cde,2023-08-08T14:22:24.967000
|
||||
@ -242434,7 +242434,7 @@ CVE-2024-1742,0,0,ef8e2131c95185fddee2b27fa43b85956207ef471d56b7605b9d2e6a1c53a4
|
||||
CVE-2024-1743,0,0,483e7e67b70ea440915c26337d00527748cea35503b453ed4beec805a523f208,2024-07-03T01:45:31.390000
|
||||
CVE-2024-1745,0,0,2df7fa4c4fa47f53e57d7b3e9d1babc8c2b1750e2bc785796313c72e8ffb6593,2024-03-26T12:55:05.010000
|
||||
CVE-2024-1746,0,0,8022383f443dbbb627f1c414153375fa50b320afeba598d9c8de3dc5c8a81f57,2024-04-15T13:15:31.997000
|
||||
CVE-2024-1747,1,1,bba88062968e921ca1473ab61d2b6b3e36b1f4c0248a27106c749c99d98abf88,2024-08-01T06:15:01.980000
|
||||
CVE-2024-1747,0,0,bba88062968e921ca1473ab61d2b6b3e36b1f4c0248a27106c749c99d98abf88,2024-08-01T06:15:01.980000
|
||||
CVE-2024-1748,0,0,225d9c0ba3d2388d2e1d2564afa842c8e38abf8b0b7cfc5e0b1ec6fc81b6c96c,2024-05-17T02:35:34.880000
|
||||
CVE-2024-1749,0,0,f620be6c4367805be5c83719352e695698d105470ce084642dece004f1c7c3f4,2024-05-17T02:35:35.020000
|
||||
CVE-2024-1750,0,0,7f9ce3864064263c9a72249a090e6a4b7033b154fc6d744d107ff4cdf65d126b,2024-05-17T02:35:35.177000
|
||||
@ -246477,7 +246477,8 @@ CVE-2024-25942,0,0,ed9972b2a67908fa134e82ba51db8b6dda164f88a17fdef5830f031dbe673
|
||||
CVE-2024-25943,0,0,d506e8c730696f4b2f3434da5ff1d66664f3a0f52ba266f85b5b04d36f260146,2024-07-01T12:37:24.220000
|
||||
CVE-2024-25944,0,0,ab1a6f9559c2c17591ef013078bdc7d1074a6939146b74afdf8354c958a2a210,2024-04-01T01:12:59.077000
|
||||
CVE-2024-25946,0,0,a113fddf4e672678a1d14cda275154cb9972765501ae2bed1e5e6a531e4a4550,2024-03-28T20:53:20.813000
|
||||
CVE-2024-25947,1,1,485470e617d7bd91b0ac4d1200f519b4198e68df5c5f6a749aa66b3078909a80,2024-08-01T07:15:02.140000
|
||||
CVE-2024-25947,0,0,485470e617d7bd91b0ac4d1200f519b4198e68df5c5f6a749aa66b3078909a80,2024-08-01T07:15:02.140000
|
||||
CVE-2024-25948,1,1,b1a8daba18f532e18688c786c199b0f61a9f31e5acabf8fcf1766745102f2aa8,2024-08-01T08:15:02.203000
|
||||
CVE-2024-25949,0,0,cf19f3ab0bbae3d1ff74313cc0fe0f90bdd6c260c977bc35c843079a46627a59,2024-06-13T18:36:09.010000
|
||||
CVE-2024-2595,0,0,e521c63ef6b03578b7bb7372b5bef2fecd2a3eebcba151ea7fc07a4fe787ff2a,2024-03-18T19:40:00.173000
|
||||
CVE-2024-25951,0,0,3b1032e7dee2277c1cd9087f14c93f6b15f85f0de6dddc7df9693edc271d4b00,2024-03-11T01:32:39.697000
|
||||
@ -248437,7 +248438,7 @@ CVE-2024-28423,0,0,58a1ef7d35f092e50b1e07fd4013c2973ded6a4e76c11332d68829fd34d7c
|
||||
CVE-2024-28424,0,0,ecd6a99ae0759c71ad1c7af9ca074920e1fe2279be45e00b413aeaea6bf2f2f8,2024-03-14T20:11:36.180000
|
||||
CVE-2024-28425,0,0,a141e56038f4e753e81d857ec1e84aae2f8aa855ba4e2973635a5dc63a3d9ae9,2024-03-14T20:11:36.180000
|
||||
CVE-2024-28429,0,0,d1463630e21be77443b70427954efe3756b4a41822fd121d66c94f7528f881a0,2024-03-13T14:28:45.217000
|
||||
CVE-2024-2843,1,1,4895415438190c94406cd89e69182d21ea05ffa00577f1f67fedd6f982ec7a8b,2024-08-01T06:15:02.367000
|
||||
CVE-2024-2843,0,0,4895415438190c94406cd89e69182d21ea05ffa00577f1f67fedd6f982ec7a8b,2024-08-01T06:15:02.367000
|
||||
CVE-2024-28430,0,0,e694b5aca86262438d0540e9c897e671f295f2b82cd8f6ab688d6e70320d9a61,2024-03-13T14:28:45.217000
|
||||
CVE-2024-28431,0,0,8fa73f38068ed582ca772506eb7716c8cb270f1afc451299119c169e18fc0496,2024-03-13T14:28:45.217000
|
||||
CVE-2024-28432,0,0,d4feae1a91594686399f8946ac7d18a6f1fe8ae89dec56cc02626608077bbfd0,2024-03-13T14:28:45.217000
|
||||
@ -248553,7 +248554,7 @@ CVE-2024-28715,0,0,af77246106a78842a7b294f3e28f52ff784cab47ce869925f80951f17109d
|
||||
CVE-2024-28716,0,0,3f63cfc047c308b332d22713c97a67a2241b00455960cf73e7cb5d9cde33a8f2,2024-07-03T01:51:46.153000
|
||||
CVE-2024-28717,0,0,68c50e0969fa42fdfa87f41ced9aa5bc718acbfde537527889081e6d8b905cbf,2024-07-03T01:51:46.980000
|
||||
CVE-2024-28718,0,0,17b78e31f850547b3e404b5336a5f452e3a516e939f6e425ec310b4ed9273277,2024-04-15T13:15:51.577000
|
||||
CVE-2024-2872,1,1,7d2c48b0ecdc472ddefeeaae58852037401c96bffa31f58efc16c68407506857,2024-08-01T06:15:02.443000
|
||||
CVE-2024-2872,0,0,7d2c48b0ecdc472ddefeeaae58852037401c96bffa31f58efc16c68407506857,2024-08-01T06:15:02.443000
|
||||
CVE-2024-28722,0,0,4d114a5bb3de475df05c084fbb00bf1fb6503998847c685d4d1672b2617054ce,2024-07-03T01:51:47.757000
|
||||
CVE-2024-28725,0,0,759d7ace03ce49bd50f051acc14ff68a184bc288c90f7002afe9cdf646d255bc,2024-05-07T13:39:32.710000
|
||||
CVE-2024-2873,0,0,ed9040959ed5f40d916defffcff03f64da72505082c3b91fe33a6506c19636e1,2024-03-26T12:55:05.010000
|
||||
@ -248733,6 +248734,7 @@ CVE-2024-28969,0,0,9aaf419f4a0f5578c1d360d21c88466bed088175329d02d5a4c08af5237b8
|
||||
CVE-2024-2897,0,0,cedfc20da5ed85e9f84ef73f96b224aba1a7761f3b26b18165ca182e0276563a,2024-06-04T19:19:19.267000
|
||||
CVE-2024-28970,0,0,e8f11977500005486cf7671144dacf7215de23ccf91b6c8eb182a0c1c61d7f56,2024-06-13T18:36:09.013000
|
||||
CVE-2024-28971,0,0,977b1e796a504922885da69c0f7540513ab16cea6a678ad4098d22f0ec570269,2024-05-08T17:05:24.083000
|
||||
CVE-2024-28972,1,1,d756f6addda93a7c284b986668a27e56ee364102435016902868a5e7a7d25511,2024-08-01T08:15:02.520000
|
||||
CVE-2024-28973,0,0,c5833936687fc47280c5de84f71bab0362ecad8e5c2b89ba9d836c1b9ea2e1df,2024-06-26T12:44:29.693000
|
||||
CVE-2024-28974,0,0,9abba18f604ec1e999d11794eb149d52c94c8b05cbfba16cb362e87c9a7f33fd,2024-05-29T19:50:25.303000
|
||||
CVE-2024-28976,0,0,c0cfcb815492d56170eba26ed04c4ed5dc48c34f8cfcf09f6c5238d2d54ddae0,2024-04-24T13:39:42.883000
|
||||
@ -254885,7 +254887,10 @@ CVE-2024-38476,0,0,b3d9539bc16644d562156587edde82f59f7e5b8caca519713a03097d766f3
|
||||
CVE-2024-38477,0,0,4e865b7fff5c5346863d587e484df8d5b457292ae17a1b95a338aa934a1871cd,2024-07-12T14:15:15.430000
|
||||
CVE-2024-3848,0,0,3a1e7dbb50cc54ecdbcc89881c429869965f00f9d2e1eb9f088acc297fe8920f,2024-05-16T13:03:05.353000
|
||||
CVE-2024-38480,0,0,04c4f9e75ecb94da8a57533882d0899c4c9616c45f6d4f0fa40fb0af2c036f64,2024-07-01T12:37:24.220000
|
||||
CVE-2024-38481,1,1,bb72467f4e9afb2c4aa8a39e9674a8464de905722f00f950bfbff293f40ed790,2024-08-01T08:15:02.767000
|
||||
CVE-2024-38489,1,1,69ac789f31c4f03380ba303a395be773598cc5e427669db419e4462c13ad5bde,2024-08-01T08:15:02.980000
|
||||
CVE-2024-3849,0,0,5306fee696144db88733a07d80a07ecf85ac2a8ec15f60e756615ae8c2f2566c,2024-05-02T18:00:37.360000
|
||||
CVE-2024-38490,1,1,da01ec7368c210ec9846fa69a0c396245ebbd3f153dbc63b210c9af31363abbc,2024-08-01T08:15:03.187000
|
||||
CVE-2024-38491,0,0,45eb77a065b351e283c19fca52dbc0c415810a9854c6f93524e9a875f4b79ec5,2024-07-16T13:43:58.773000
|
||||
CVE-2024-38492,0,0,2fff266f3514c7b21683e88c34d78fd98dc9ab17c356d1ffe5e976b9d4dacf92,2024-07-16T13:43:58.773000
|
||||
CVE-2024-38493,0,0,7dab0c3b3c94bc494d9811e28eb01ed63c0107f6df03b64859d1b0c9c94817ec,2024-07-16T13:43:58.773000
|
||||
@ -255555,7 +255560,7 @@ CVE-2024-39821,0,0,3d8221c440f8b1dbd5c98d43cf97f16f597a43c5d93725a475fc98495ffe9
|
||||
CVE-2024-39826,0,0,afc70f78da14ad22cac1b695b7ec211098e49242f19223081d17abce3c71095c,2024-07-16T13:43:58.773000
|
||||
CVE-2024-39827,0,0,caf86200bd002a6aa70c894d1a6cc5e050d2263ea7091a801896c357b955cd82,2024-07-16T13:43:58.773000
|
||||
CVE-2024-39828,0,0,37815ac0cb1d59603d10017e1de409a6a7cef6f58ba5d0ea15f1cc9c3c9f34b5,2024-07-11T15:06:13.953000
|
||||
CVE-2024-3983,1,1,1f8df5f31240f1196d1c9d779c3b56a448b2e17cf205ce30df1742c82acb0ded,2024-08-01T06:15:02.517000
|
||||
CVE-2024-3983,0,0,1f8df5f31240f1196d1c9d779c3b56a448b2e17cf205ce30df1742c82acb0ded,2024-08-01T06:15:02.517000
|
||||
CVE-2024-39830,0,0,fa16449dc31377b10db0f6c8fa3cd2e73175dcab5134adbfb18592dc79a4a80c,2024-07-05T17:08:50.197000
|
||||
CVE-2024-3984,0,0,9fd51fca8e9cb62e411ab69c310516342152a8240e3126272f1618181a2d89aa,2024-06-20T12:44:01.637000
|
||||
CVE-2024-39840,0,0,5d7e4142131887a411bdbeea93ed887c2e0abb0654faa364c29fef4ac994d185,2024-07-03T02:05:52.307000
|
||||
@ -255915,7 +255920,7 @@ CVE-2024-40895,0,0,28ffbfad907ecd6e6665d2dbecd78214d48d230f78fe3bf5c93e6b599c909
|
||||
CVE-2024-40897,0,0,6abf47f4a62ea89c178f137de2c06b0ad3aa344f78325532ce36c2ccb3219895,2024-07-28T14:15:10.533000
|
||||
CVE-2024-40898,0,0,6d797ebcdf9c53e0eade3a2c00a2f7d68b1d101b3405603dd30cc2157b772084,2024-07-18T12:28:43.707000
|
||||
CVE-2024-40899,0,0,e950acc969e56b6fc4b2198a92989ebcef19e4b4c9a9c8ad08fee90da2bba031,2024-07-12T16:34:58.687000
|
||||
CVE-2024-4090,1,1,855074d3c79710ef5f4103aa21317adbfbba962b40309ff8b9c00edd41ef92e8,2024-08-01T06:15:02.587000
|
||||
CVE-2024-4090,0,0,855074d3c79710ef5f4103aa21317adbfbba962b40309ff8b9c00edd41ef92e8,2024-08-01T06:15:02.587000
|
||||
CVE-2024-40900,0,0,d5b683c8350615b20febf47a29bbffae93edd0a350147e3cd873aa7a5a37926c,2024-07-12T16:34:58.687000
|
||||
CVE-2024-40901,0,0,e26097fb6f292c0ef621a3948768a962501ab86f3daa859d54d1945bd865aa16,2024-07-12T16:34:58.687000
|
||||
CVE-2024-40902,0,0,2f7d4ca94747f48550a0025dcb58bda474d1a7adef8eacd89e2d7ec7535468d0,2024-07-24T18:52:23.540000
|
||||
@ -256282,16 +256287,16 @@ CVE-2024-41671,0,0,c3887e08a19f6a4662d206364ee646486b6ffd74972535a505600e6869433
|
||||
CVE-2024-41672,0,0,22d9ca4e03b108f26bbb384eff42397f3ecb90b1b86b629c7d5509df37cbcfd2,2024-07-25T12:36:39.947000
|
||||
CVE-2024-41676,0,0,4edd6c50f14612f7776f922c6baad3f4ffc072867d1278ee28662409b50e6afc,2024-07-29T16:21:52.517000
|
||||
CVE-2024-4168,0,0,7f4f833c88738c683a47d814a058bf8a730868170937a9aca799097bc79bf22f,2024-06-04T19:20:31.690000
|
||||
CVE-2024-41684,0,0,15187a16e3d50aa920a17db9f9940d7239fa5ed873cbc7a8cfd9738753dd0bc2,2024-07-26T12:38:41.683000
|
||||
CVE-2024-41685,0,0,4f956c9758e7eb71f9f90f7b5468f25ce9be3aedf0fb0f5c33d2639621a5dd4a,2024-07-26T12:38:41.683000
|
||||
CVE-2024-41686,0,0,71bdf1de9830b023fadf6e6ed824e54f05b37f8d80deb626edf937d98e875b35,2024-07-26T12:38:41.683000
|
||||
CVE-2024-41687,0,0,09e07e888289ae16012859b2d10e80b35264957162a494e901402da12edd251c,2024-07-26T12:38:41.683000
|
||||
CVE-2024-41688,0,0,b58e28e21aa6b4430d721f31f39e8d6756c267436991282570a3fe510078f9e5,2024-07-26T12:38:41.683000
|
||||
CVE-2024-41689,0,0,e25a894d3c83cbce543b44e8d652d5dc0ac5545adea56f8ed329b98800a6ee33,2024-07-26T12:38:41.683000
|
||||
CVE-2024-41684,0,1,c04c7a72cb63ae7eeb8584b102c76882304d9bf5cb81d153e75d8ddb331bc6dc,2024-08-01T08:15:03.390000
|
||||
CVE-2024-41685,0,1,93eaff307f4f8791a8e8ff304ad0c9cc6b3c2580cc14efd1e8266bfdcba69042,2024-08-01T08:15:03.547000
|
||||
CVE-2024-41686,0,1,0d750b3e1e6c898024728468d3ecdbea6b50cb803a8aba6286daab29ba27ba2d,2024-08-01T08:15:03.640000
|
||||
CVE-2024-41687,0,1,236ced32c22135d66076b15c4bc6f24fb950953a526ecc4c5b2d92335e257049,2024-08-01T08:15:03.730000
|
||||
CVE-2024-41688,0,1,746c3c2890722cb9f7b8ea8d96eb0b8363f7ff857349b769b2e6b8f58085985d,2024-08-01T08:15:03.817000
|
||||
CVE-2024-41689,0,1,9be2d562482cfc3d064e5ab5fb8d77d4697f05af7dc97a600649153ea522a427,2024-08-01T08:15:03.907000
|
||||
CVE-2024-4169,0,0,c62ff626929882f5d2c6f5c5b02ad92c379b5b400e34f72b774f8d063efba0f1,2024-06-04T19:20:31.780000
|
||||
CVE-2024-41690,0,0,b18dad298671eb03eedc4db03bead7013ec614b16f648a4382d81a719b2d2fc8,2024-07-26T12:38:41.683000
|
||||
CVE-2024-41691,0,0,8445b625b8d8bbb501668875ad0019a23a5b4798b2ca9bb16e1f7ec443c79eb0,2024-07-26T12:38:41.683000
|
||||
CVE-2024-41692,0,0,0194fb9931aafdb4d2f1b1685143b7b5f004cffb9bb337e8efb40ab4dc65d8ec,2024-07-29T14:12:08.783000
|
||||
CVE-2024-41690,0,1,35be90cc2bd7acfab9e39dbfe92412aec5993182e9d5569f04dfd886d5d74ef0,2024-08-01T08:15:03.990000
|
||||
CVE-2024-41691,0,1,76c5ab4f047190ae82bc420dbc882ff72fa817dfca623de9877d2ccfc2eb5ed1,2024-08-01T08:15:04.083000
|
||||
CVE-2024-41692,0,1,76fce59975fea7d60513f610577bf9eb48ded8abd0f97ff5d106b232ba29c3fb,2024-08-01T08:15:04.173000
|
||||
CVE-2024-41693,0,0,1ab2b4b7ed8f921d2bbd47d1a0a36dd7d080353c42c5a60fc142ad6c40def5b1,2024-07-30T13:32:45.943000
|
||||
CVE-2024-41694,0,0,2beb2cafa0b59f0afe42f2c196fff55bc2e400d880d35147a1b32c39271b6739,2024-07-30T13:32:45.943000
|
||||
CVE-2024-41695,0,0,cfeced4f0e3fb4495c4233c92c745e7bccce82ccc90ae4a6ab56dbb48fdfcc87,2024-07-30T13:32:45.943000
|
||||
@ -257471,8 +257476,8 @@ CVE-2024-5326,0,0,2be4cbe8832da29a051a88af0386c312f2db765fd88a5b2a911937a61354bc
|
||||
CVE-2024-5327,0,0,4827791dbb34368c55d6cd06e5ae60d7938f5b7d8da35d37ecd04c9478388419,2024-05-30T13:15:41.297000
|
||||
CVE-2024-5328,0,0,389f7ef980e9d16941bc44acc7d327871d53fb707d54ba8870eb280f34f36d8b,2024-07-23T19:41:49.540000
|
||||
CVE-2024-5329,0,0,de038a5f353969046987a50080542fc21e5e9831f920643fcbf4110d57688954,2024-06-11T17:42:26.677000
|
||||
CVE-2024-5330,1,1,aa8b20eb4eca56a764c854b8fd469cf90539949cd0655af41122a9ffc25771b9,2024-08-01T07:15:02.520000
|
||||
CVE-2024-5331,1,1,59e680925298e50577f0d849de545a2b68ff077838b33f095a86e2637a604947,2024-08-01T07:15:02.783000
|
||||
CVE-2024-5330,0,0,aa8b20eb4eca56a764c854b8fd469cf90539949cd0655af41122a9ffc25771b9,2024-08-01T07:15:02.520000
|
||||
CVE-2024-5331,0,0,59e680925298e50577f0d849de545a2b68ff077838b33f095a86e2637a604947,2024-08-01T07:15:02.783000
|
||||
CVE-2024-5332,0,0,b929b6d33cd728a86a1419cab1a953f1c1e8520fdf1d886c7808fd1a5444df6e,2024-06-26T12:44:29.693000
|
||||
CVE-2024-5334,0,0,24408ed0ac6ef1e7a34f70a35a6cc670103055f984541012ab7ae541f1637158,2024-07-12T08:15:11.130000
|
||||
CVE-2024-5336,0,0,2f884d9a8acdce925dfd5f3bbb7e4d857b44070abc5058c1ed58328cd4186515,2024-06-04T19:21:04.947000
|
||||
@ -257750,7 +257755,7 @@ CVE-2024-5674,0,0,19a588e59b6b0a5cd86582f1d6ecebdb5fae3e091de3e9e5a8f682eaf8708c
|
||||
CVE-2024-5675,0,0,c94a13a2a4b4b541f4d9019f3017bff689f5579f32759b7a87deb8cdfe0fb73d,2024-06-11T18:14:02.017000
|
||||
CVE-2024-5676,0,0,ac70690e5e5a82915ea8b21175c3316ecbf6493d45f7e6ea6d37cbb46bb6c2ce,2024-06-24T05:15:09.600000
|
||||
CVE-2024-5677,0,0,e2511915c83441842f7c8a6e8aecd9d8b3c471bd0e1157bcb520b0c0755a9041,2024-07-11T13:05:54.930000
|
||||
CVE-2024-5678,1,1,ec0eebbcae34fc7e7afbf6baa7acc0bf570b67cb5cd152170a8fdac0025f5fbe,2024-08-01T07:15:03.053000
|
||||
CVE-2024-5678,0,0,ec0eebbcae34fc7e7afbf6baa7acc0bf570b67cb5cd152170a8fdac0025f5fbe,2024-08-01T07:15:03.053000
|
||||
CVE-2024-5679,0,0,0839965cde25fea3aa350fa717eb81302bb5423efd743b60fd44dbd620732a01,2024-07-12T16:38:44.027000
|
||||
CVE-2024-5680,0,0,4b89f5f26e3b07478091cc4705b6bf03eb5b6d7ef8a454176f219f6262119e02,2024-07-12T16:38:49.670000
|
||||
CVE-2024-5681,0,0,ba69ac569d7576d195fd1b6967a53d4cc4e5811e9ef97dab1bfc2916a4020575,2024-07-12T16:37:40.303000
|
||||
@ -258314,7 +258319,7 @@ CVE-2024-6490,0,0,8a5877d317a0eed7b1ae7b123dbc62aa28ad8c8fd8f1b2bd14476905cfed0a
|
||||
CVE-2024-6491,0,0,777eb845cac0fc56ad6345347b6b7dff4d99542463073dd5b5752a23e8a26dec,2024-07-22T13:00:53.287000
|
||||
CVE-2024-6492,0,0,82f79625038ad5debf137137104e45e1e353947b9c4b14df742baece7a047a71,2024-07-17T13:34:20.520000
|
||||
CVE-2024-6495,0,0,b5144ce6ead337054723bddaa938cbde5875226dc2ad6f1282d875ef6548d915,2024-07-12T16:34:58.687000
|
||||
CVE-2024-6496,1,1,43f5bc899f7b576e992b610d27fb07beccb54a6935873953b6f84243b1c8c315,2024-08-01T06:15:02.660000
|
||||
CVE-2024-6496,0,0,43f5bc899f7b576e992b610d27fb07beccb54a6935873953b6f84243b1c8c315,2024-08-01T06:15:02.660000
|
||||
CVE-2024-6497,0,0,b980a8afca3367d307f1b8ae084c1de1478e48fcb0a6d42a16be67c3823c34b0,2024-07-22T13:00:31.330000
|
||||
CVE-2024-6501,0,0,45d58d6fcd90c3b83531e796541078a549af17f7a81eb1fbfe7d6944aa2bc8ac,2024-07-11T13:06:13.187000
|
||||
CVE-2024-6504,0,0,8b12236aeea36b8f50ca52878af23b200b8eec2ab40fe418832b1f4c4c6b95f9,2024-07-18T12:28:43.707000
|
||||
@ -258332,7 +258337,7 @@ CVE-2024-6525,0,0,2f0f70f02d7062f0146f492a65f00de0208bb8c01fafafd0c2d5a6e3d243b9
|
||||
CVE-2024-6526,0,0,0395771cb83da3c31d3258df800a7adc493a41c6b23cd6248bbb973fb8ab4b56,2024-07-08T15:39:08.840000
|
||||
CVE-2024-6527,0,0,4cbacb620d5954abb73dae2b3bfdb2a8824258a4de25ce8e7c75649e12d818a5,2024-07-09T18:19:14.047000
|
||||
CVE-2024-6528,0,0,568c43fb32d79fc097335d9307aebc42d71a690423942e01ce8dbade6b5bedb0,2024-07-12T16:37:20.283000
|
||||
CVE-2024-6529,1,1,7d9ecbacb802f6a5ce3e4ab0c48539ed1c07a408b68bf91ec20a6b99341e19f6,2024-08-01T06:15:02.737000
|
||||
CVE-2024-6529,0,0,7d9ecbacb802f6a5ce3e4ab0c48539ed1c07a408b68bf91ec20a6b99341e19f6,2024-08-01T06:15:02.737000
|
||||
CVE-2024-6531,0,0,1125a21608be8cb0502ea86867294670584ed16918c5bd752fdbbd37969404b8,2024-07-12T12:49:11.340000
|
||||
CVE-2024-6535,0,0,d515bd0c9a2788945f1c070eede854437b7a1c58e6a79916f8d2b46233d5b6de,2024-07-25T16:15:04.583000
|
||||
CVE-2024-6536,0,0,db3a8f54349ce01fbebd842277117fe6b2369b9af6752930ef3e5c8ea43f79f4,2024-07-30T13:32:45.943000
|
||||
@ -258559,7 +258564,7 @@ CVE-2024-6970,0,0,4194a84f3c5724b9bace97395e0f8e6456cd70a8d0cf3d46afccc165b27983
|
||||
CVE-2024-6972,0,0,136930c91bb85ebbdb27bc99dae627302f90363fa18ab987405ebabe27d12e99,2024-07-25T12:36:39.947000
|
||||
CVE-2024-6973,0,0,76295ec3ebe0bf6ab46ddfd52badda08304b88e18a3d20fac7cbdb819136f0e1,2024-07-31T20:15:07.293000
|
||||
CVE-2024-6974,0,0,7ef6b4f17e4d77510d507310e8365d24dcc0e8cace8ef658dfe2a033fdd6390d,2024-07-31T20:15:07.513000
|
||||
CVE-2024-6975,0,0,ca22a0195c509fab1d61f45e1ebeb84f6b19100e4b5911ad1431e1cb83d20538,2024-07-31T20:15:07.613000
|
||||
CVE-2024-6975,0,1,1b3bb18e08f814d7b2cc57908ec6de8ca6a8253cf52b1302675be3c13edfb1b5,2024-08-01T09:15:03.097000
|
||||
CVE-2024-6977,0,0,3121777bd0a52ccf3540d69bf9a48fe1c1b7f86ef36c5a72b5a200933b1d9fe6,2024-07-31T17:15:11.860000
|
||||
CVE-2024-6978,0,0,e2bc736f85bea0c52e162540a00648045c9f82e172db71c285eab8cf5b35db1f,2024-07-31T20:15:07.717000
|
||||
CVE-2024-6980,0,0,f6625eb84b24e1b38c56cc3bb53a8be195d62bb4e9db2a7b8e6feb6123dc7610,2024-07-31T12:57:02.300000
|
||||
@ -258692,7 +258697,7 @@ CVE-2024-7290,0,0,e8c96d989cb70bd87ad54653beaf9542c2c74968268c5634e080d16dd0ba2b
|
||||
CVE-2024-7297,0,0,cb4ca8684118dc46d1f9724d628f899c3458badae695854f058e1eba8efe7ce6,2024-07-31T12:57:02.300000
|
||||
CVE-2024-7299,0,0,18b86413af481c73d022a0c4ed8ac3628863652a0dcfb13bf199bbb5e4db4366,2024-07-31T16:15:05.217000
|
||||
CVE-2024-7300,0,0,a2e066ea38ffd4d283558ac9c550384947d588019ed19b0e0b6c2becc0799ae9,2024-07-31T14:15:08.080000
|
||||
CVE-2024-7302,1,1,184ecf12b0245488f943fa0b7b48e96aeeaaa0427a8485fba3f7509b022125fb,2024-08-01T07:15:03.300000
|
||||
CVE-2024-7302,0,1,eb848575f59647066e1f15d90b3f2f1e5ea9438ae4b28a66c4f233e32054cb49,2024-08-01T07:15:03.300000
|
||||
CVE-2024-7303,0,0,d7f72dd61499e6619ce7f5b3ddfad21cf84d8b933f5b61aad0d5acbabf0695d7,2024-07-31T12:57:02.300000
|
||||
CVE-2024-7306,0,0,41d2dc73352be3adbe3da1c5ddee86e5aba159cd2a5da8e89aabb430dec59115,2024-07-31T12:57:02.300000
|
||||
CVE-2024-7307,0,0,880aa0ea5c84e56fdc3b5eb36854e1998bc80835f78667a7a6ad57104577d4f7,2024-07-31T12:57:02.300000
|
||||
|
Can't render this file because it is too large.
|
Loading…
x
Reference in New Issue
Block a user