mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-05-07 19:16:29 +00:00
Auto-Update: 2024-06-20T20:00:18.945689+00:00
This commit is contained in:
parent
54793c3d66
commit
d80106294b
@ -2,12 +2,12 @@
|
||||
"id": "CVE-2023-38313",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-11-17T06:15:33.427",
|
||||
"lastModified": "2023-11-23T03:37:09.847",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2024-06-20T18:15:10.417",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "An issue was discovered in OpenNDS Captive Portal before 10.1.2. it has a do_binauth NULL pointer dereference that can be triggered with a crafted GET HTTP request with a missing client redirect query string parameter. Triggering this issue results in crashing openNDS (a Denial-of-Service condition). The issue occurs when the client is about to be authenticated, and can be triggered only when the BinAuth option is set."
|
||||
"value": "An issue was discovered in OpenNDS Captive Portal before 10.1.2. it has a do_binauth NULL pointer dereference that can be triggered with a crafted GET HTTP request with a missing client redirect query string parameter. Triggering this issue results in crashing openNDS (a Denial-of-Service condition). The issue occurs when the client is about to be authenticated, and can be triggered only when the BinAuth option is set. Affected OpenNDS Captive Portal before version 10.1.2 fixed infixed in OpenWrt master, OpenWrt 23.05 and OpenWrt 22.03 on28. August 2023 by updating OpenNDS to version 10.1.3."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
@ -76,6 +76,14 @@
|
||||
"Release Notes",
|
||||
"Vendor Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/openwrt/routing/commit/0b19771fb2dd81e7c428759610aed583171eed80",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://source.sierrawireless.com/resources/security-bulletins/sierra-wireless-technical-bulletin---swi-psa-2023-006-v4/#sthash.2vJg3d85.rwx82g1C.dpbs",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,12 +2,12 @@
|
||||
"id": "CVE-2023-38314",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-11-17T06:15:33.530",
|
||||
"lastModified": "2023-11-23T03:37:21.490",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2024-06-20T18:15:10.557",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "An issue was discovered in OpenNDS Captive Portal before version 10.1.2. It has a NULL pointer dereference in preauthenticated() that can be triggered with a crafted GET HTTP request with a missing redirect query string parameter. Triggering this issue results in crashing OpenNDS (a Denial-of-Service condition)."
|
||||
"value": "An issue was discovered in OpenNDS Captive Portal before version 10.1.2. It has a NULL pointer dereference in preauthenticated() that can be triggered with a crafted GET HTTP request with a missing redirect query string parameter. Triggering this issue results in crashing OpenNDS (a Denial-of-Service condition). Affected OpenNDS Captive Portal before version 10.1.2 fixed infixed in OpenWrt master, OpenWrt 23.05 and OpenWrt 22.03 on28. August 2023 by updating OpenNDS to version 10.1.3."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
@ -76,6 +76,14 @@
|
||||
"Release Notes",
|
||||
"Vendor Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/openwrt/routing/commit/0b19771fb2dd81e7c428759610aed583171eed80",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://source.sierrawireless.com/resources/security-bulletins/sierra-wireless-technical-bulletin---swi-psa-2023-006-v4/#sthash.2vJg3d85.rwx82g1C.dpbs",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,12 +2,12 @@
|
||||
"id": "CVE-2023-38315",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-11-17T06:15:33.577",
|
||||
"lastModified": "2023-11-23T03:34:50.727",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2024-06-20T18:15:10.663",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "An issue was discovered in OpenNDS Captive Portal before version 10.1.2. It has a try_to_authenticate NULL pointer dereference that can be triggered with a crafted GET HTTP with a missing client token query string parameter. Triggering this issue results in crashing OpenNDS (a Denial-of-Service condition)."
|
||||
"value": "An issue was discovered in OpenNDS Captive Portal before version 10.1.2. It has a try_to_authenticate NULL pointer dereference that can be triggered with a crafted GET HTTP with a missing client token query string parameter. Triggering this issue results in crashing OpenNDS (a Denial-of-Service condition). Affected OpenNDS Captive Portal before version 10.1.2 fixed in OpenWrt master, OpenWrt 23.05 and OpenWrt 22.03 on 28. August 2023 by updating OpenNDS to version 10.1.3."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
@ -76,6 +76,14 @@
|
||||
"Release Notes",
|
||||
"Vendor Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/openwrt/routing/commit/0b19771fb2dd81e7c428759610aed583171eed80",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://source.sierrawireless.com/resources/security-bulletins/sierra-wireless-technical-bulletin---swi-psa-2023-006-v4/#sthash.2vJg3d85.rwx82g1C.dpbs",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,12 +2,12 @@
|
||||
"id": "CVE-2023-38316",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-11-17T06:15:33.617",
|
||||
"lastModified": "2023-11-23T03:35:41.227",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2024-06-20T18:15:10.767",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "An issue was discovered in OpenNDS Captive Portal before version 10.1.2. When the custom unescape callback is enabled, attackers can execute arbitrary OS commands by inserting them into the URL portion of HTTP GET requests."
|
||||
"value": "An issue was discovered in OpenNDS Captive Portal before version 10.1.2. When the custom unescape callback is enabled, attackers can execute arbitrary OS commands by inserting them into the URL portion of HTTP GET requests. Affected OpenNDS Captive Portal before version 10.1.2 fixed in OpenWrt master, OpenWrt 23.05 and OpenWrt 22.03 on 28. August 2023 by updating OpenNDS to version 10.1.3."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
@ -76,6 +76,14 @@
|
||||
"Release Notes",
|
||||
"Vendor Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/openwrt/routing/commit/0b19771fb2dd81e7c428759610aed583171eed80",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://source.sierrawireless.com/resources/security-bulletins/sierra-wireless-technical-bulletin---swi-psa-2023-006-v4/#sthash.2vJg3d85.rwx82g1C.dpbs",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,12 +2,12 @@
|
||||
"id": "CVE-2023-38320",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-11-17T06:15:33.667",
|
||||
"lastModified": "2023-11-23T03:35:49.027",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2024-06-20T18:15:10.873",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "An issue was discovered in OpenNDS Captive Portal before version 10.1.2. It has a show_preauthpage NULL pointer dereference that can be triggered with a crafted GET HTTP with a missing User-Agent header. Triggering this issue results in crashing OpenNDS (a Denial-of-Service condition)."
|
||||
"value": "An issue was discovered in OpenNDS Captive Portal before version 10.1.2. It has a show_preauthpage NULL pointer dereference that can be triggered with a crafted GET HTTP with a missing User-Agent header. Triggering this issue results in crashing OpenNDS (a Denial-of-Service condition). This problem was fixed in OpenWrt master, OpenWrt 23.05 and OpenWrt 22.03 on 28. August 2023 by updating OpenNDS to version 10.1.3."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
@ -76,6 +76,14 @@
|
||||
"Release Notes",
|
||||
"Vendor Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/openwrt/routing/commit/0b19771fb2dd81e7c428759610aed583171eed80",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://source.sierrawireless.com/resources/security-bulletins/sierra-wireless-technical-bulletin---swi-psa-2023-006/#sthash.2vJg3d85.dpbs",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,12 +2,12 @@
|
||||
"id": "CVE-2023-38322",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-11-17T06:15:33.720",
|
||||
"lastModified": "2023-11-23T03:43:20.190",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2024-06-20T18:15:10.980",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "An issue was discovered in OpenNDS Captive Portal before version 10.1.2. It has a do_binauth NULL pointer dereference that be triggered with a crafted GET HTTP request with a missing User-Agent HTTP header. Triggering this issue results in crashing OpenNDS (a Denial-of-Service condition). The issue occurs when the client is about to be authenticated, and can be triggered only when the BinAuth option is set."
|
||||
"value": "An issue was discovered in OpenNDS Captive Portal before version 10.1.2. It has a do_binauth NULL pointer dereference that be triggered with a crafted GET HTTP request with a missing User-Agent HTTP header. Triggering this issue results in crashing OpenNDS (a Denial-of-Service condition). The issue occurs when the client is about to be authenticated, and can be triggered only when the BinAuth option is set. Affected OpenNDS Captive Portal before version 10.1.2 fixed in OpenWrt master, OpenWrt 23.05 and OpenWrt 22.03 on 28. August 2023 by updating OpenNDS to version 10.1.3."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
@ -76,6 +76,14 @@
|
||||
"Release Notes",
|
||||
"Vendor Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/openwrt/routing/commit/0b19771fb2dd81e7c428759610aed583171eed80",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://source.sierrawireless.com/resources/security-bulletins/sierra-wireless-technical-bulletin---swi-psa-2023-006-v4/#sthash.2vJg3d85.rwx82g1C.dpbs",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,12 +2,12 @@
|
||||
"id": "CVE-2023-38324",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-11-17T06:15:33.760",
|
||||
"lastModified": "2024-01-26T05:15:12.203",
|
||||
"lastModified": "2024-06-20T18:15:11.083",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "An issue was discovered in OpenNDS before 10.1.2. It allows users to skip the splash page sequence (and directly authenticate) when it is using the default FAS key and OpenNDS is configured as FAS."
|
||||
"value": "An issue was discovered in OpenNDS before 10.1.2. It allows users to skip the splash page sequence (and directly authenticate) when it is using the default FAS key and OpenNDS is configured as FAS. Affected OpenNDS Captive Portal before version 10.1.2 fixed in OpenWrt master, OpenWrt 23.05 and OpenWrt 22.03 on 28. August 2023 by updating OpenNDS to version 10.1.3."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
@ -85,10 +85,18 @@
|
||||
"Vendor Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/openwrt/routing/commit/0b19771fb2dd81e7c428759610aed583171eed80",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://openwrt.org/docs/guide-user/services/captive-portal/opennds",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://source.sierrawireless.com/resources/security-bulletins/sierra-wireless-technical-bulletin---swi-psa-2023-006-v4/#sthash.2vJg3d85.rwx82g1C.dpbs",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://www.forescout.com/resources/sierra21-vulnerabilities",
|
||||
"source": "cve@mitre.org"
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2023-41101",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-11-17T06:15:34.137",
|
||||
"lastModified": "2024-06-20T16:15:12.713",
|
||||
"lastModified": "2024-06-20T18:15:11.237",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -87,6 +87,10 @@
|
||||
{
|
||||
"url": "https://github.com/openwrt/routing/commit/88c98c910acccab694b3afb6d36d70ca429118a6",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://source.sierrawireless.com/resources/security-bulletins/sierra-wireless-technical-bulletin---swi-psa-2023-006-v4/#sthash.2vJg3d85.rwx82g1C.dpbs",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,12 +2,12 @@
|
||||
"id": "CVE-2023-41102",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-11-17T06:15:34.180",
|
||||
"lastModified": "2023-11-25T02:15:05.617",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2024-06-20T18:15:11.333",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "An issue was discovered in the captive portal in OpenNDS before version 10.1.3. It has multiple memory leaks due to not freeing up allocated memory. This may lead to a Denial-of-Service condition due to the consumption of all available memory."
|
||||
"value": "An issue was discovered in the captive portal in OpenNDS before version 10.1.3. It has multiple memory leaks due to not freeing up allocated memory. This may lead to a Denial-of-Service condition due to the consumption of all available memory. Affected OpenNDS before version 10.1.3 fixed in OpenWrt master and OpenWrt 23.05 on 23. November by updating OpenNDS to version 10.2.0."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
@ -82,6 +82,14 @@
|
||||
"tags": [
|
||||
"Release Notes"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/openwrt/routing/commit/ad787a920ccb9dacf5b01d52bce36ac14a5ecd89",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://source.sierrawireless.com/resources/security-bulletins/sierra-wireless-technical-bulletin---swi-psa-2023-006-v4/#sthash.2vJg3d85.rwx82g1C.dpbs",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-30089",
|
||||
"sourceIdentifier": "secure@microsoft.com",
|
||||
"published": "2024-06-11T17:15:57.023",
|
||||
"lastModified": "2024-06-13T18:36:45.417",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-06-20T18:29:16.590",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -39,6 +39,16 @@
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-416"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "secure@microsoft.com",
|
||||
"type": "Secondary",
|
||||
@ -50,10 +60,80 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "10.0.17763.5936",
|
||||
"matchCriteriaId": "9B52F95E-6080-46C6-B4B6-E2B3F3E78456"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "10.0.19044.4529",
|
||||
"matchCriteriaId": "1CEAF689-E8DB-4D3C-BC2E-B386BC077BC5"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "10.0.19045.4529",
|
||||
"matchCriteriaId": "970F54FC-F4ED-49B9-BE94-96B7212FD149"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_11_21h2:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "10.0.22000.3019",
|
||||
"matchCriteriaId": "84ECD6C0-8C47-4D2F-82B5-4F8C0BBC5FEE"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "10.0.22621.3737",
|
||||
"matchCriteriaId": "4E80DF17-1F27-474E-B147-9F5B6C494300"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_11_23h2:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "10.0.22631.3737",
|
||||
"matchCriteriaId": "4258468C-56CC-45C0-B510-FC833E942876"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "10.0.17763.5936",
|
||||
"matchCriteriaId": "12F9D974-A968-4CBB-81D8-C73B76DD284A"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_server_2022:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "10.0.20348.2522",
|
||||
"matchCriteriaId": "498A643B-0180-4AD3-BD7C-5E3CEB0FD112"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_server_2022_23h2:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "10.0.25398.950",
|
||||
"matchCriteriaId": "0EA59E2D-57B2-4E8B-937A-3EB51A3AD285"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-30089",
|
||||
"source": "secure@microsoft.com"
|
||||
"source": "secure@microsoft.com",
|
||||
"tags": [
|
||||
"Patch",
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-30090",
|
||||
"sourceIdentifier": "secure@microsoft.com",
|
||||
"published": "2024-06-11T17:15:57.240",
|
||||
"lastModified": "2024-06-13T18:36:45.417",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-06-20T18:29:05.917",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -39,6 +39,16 @@
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-119"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "secure@microsoft.com",
|
||||
"type": "Secondary",
|
||||
@ -50,10 +60,123 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "10.0.10240.20680",
|
||||
"matchCriteriaId": "CF7733FD-F870-4578-A567-9900AD6C78E3"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "10.0.14393.7070",
|
||||
"matchCriteriaId": "D96DA51E-404E-49AE-B852-56FF8A1CEEA6"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "10.0.17763.5936",
|
||||
"matchCriteriaId": "9B52F95E-6080-46C6-B4B6-E2B3F3E78456"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "10.0.19044.4529",
|
||||
"matchCriteriaId": "1CEAF689-E8DB-4D3C-BC2E-B386BC077BC5"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "10.0.19045.4529",
|
||||
"matchCriteriaId": "970F54FC-F4ED-49B9-BE94-96B7212FD149"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_11_21h2:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "10.0.22000.3019",
|
||||
"matchCriteriaId": "84ECD6C0-8C47-4D2F-82B5-4F8C0BBC5FEE"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "10.0.22621.3737",
|
||||
"matchCriteriaId": "4E80DF17-1F27-474E-B147-9F5B6C494300"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_11_23h2:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "10.0.22631.3737",
|
||||
"matchCriteriaId": "4258468C-56CC-45C0-B510-FC833E942876"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:x64:*",
|
||||
"matchCriteriaId": "2127D10C-B6F3-4C1D-B9AA-5D78513CC996"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:x86:*",
|
||||
"matchCriteriaId": "AB425562-C0A0-452E-AABE-F70522F15E1A"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "2ACA9287-B475-4AF7-A4DA-A7143CEF9E57"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "A7DF96F8-BA6A-4780-9CA3-F719B3F81074"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "DB18C4CE-5917-401E-ACF7-2747084FD36E"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "10.0.14393.7070",
|
||||
"matchCriteriaId": "FA61AAF0-D769-4287-AA5C-EFDAD067E9F1"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "10.0.17763.5936",
|
||||
"matchCriteriaId": "12F9D974-A968-4CBB-81D8-C73B76DD284A"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_server_2022:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "10.0.20348.2522",
|
||||
"matchCriteriaId": "498A643B-0180-4AD3-BD7C-5E3CEB0FD112"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_server_2022_23h2:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "10.0.25398.950",
|
||||
"matchCriteriaId": "0EA59E2D-57B2-4E8B-937A-3EB51A3AD285"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-30090",
|
||||
"source": "secure@microsoft.com"
|
||||
"source": "secure@microsoft.com",
|
||||
"tags": [
|
||||
"Patch",
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-30093",
|
||||
"sourceIdentifier": "secure@microsoft.com",
|
||||
"published": "2024-06-11T17:15:57.680",
|
||||
"lastModified": "2024-06-13T18:36:45.417",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-06-20T18:28:55.697",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -39,6 +39,16 @@
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-59"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "secure@microsoft.com",
|
||||
"type": "Secondary",
|
||||
@ -50,10 +60,123 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "10.0.10240.20680",
|
||||
"matchCriteriaId": "CF7733FD-F870-4578-A567-9900AD6C78E3"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "10.0.14393.7070",
|
||||
"matchCriteriaId": "D96DA51E-404E-49AE-B852-56FF8A1CEEA6"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "10.0.17763.5936",
|
||||
"matchCriteriaId": "9B52F95E-6080-46C6-B4B6-E2B3F3E78456"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "10.0.19044.4529",
|
||||
"matchCriteriaId": "1CEAF689-E8DB-4D3C-BC2E-B386BC077BC5"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "10.0.19045.4529",
|
||||
"matchCriteriaId": "970F54FC-F4ED-49B9-BE94-96B7212FD149"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_11_21h2:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "10.0.22000.3019",
|
||||
"matchCriteriaId": "84ECD6C0-8C47-4D2F-82B5-4F8C0BBC5FEE"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "10.0.22621.3737",
|
||||
"matchCriteriaId": "4E80DF17-1F27-474E-B147-9F5B6C494300"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_11_23h2:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "10.0.22631.3737",
|
||||
"matchCriteriaId": "4258468C-56CC-45C0-B510-FC833E942876"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:x64:*",
|
||||
"matchCriteriaId": "2127D10C-B6F3-4C1D-B9AA-5D78513CC996"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:x86:*",
|
||||
"matchCriteriaId": "AB425562-C0A0-452E-AABE-F70522F15E1A"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "2ACA9287-B475-4AF7-A4DA-A7143CEF9E57"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "A7DF96F8-BA6A-4780-9CA3-F719B3F81074"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "DB18C4CE-5917-401E-ACF7-2747084FD36E"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "10.0.14393.7070",
|
||||
"matchCriteriaId": "FA61AAF0-D769-4287-AA5C-EFDAD067E9F1"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "10.0.17763.5936",
|
||||
"matchCriteriaId": "12F9D974-A968-4CBB-81D8-C73B76DD284A"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_server_2022:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "10.0.20348.2522",
|
||||
"matchCriteriaId": "498A643B-0180-4AD3-BD7C-5E3CEB0FD112"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_server_2022_23h2:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "10.0.25398.950",
|
||||
"matchCriteriaId": "0EA59E2D-57B2-4E8B-937A-3EB51A3AD285"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-30093",
|
||||
"source": "secure@microsoft.com"
|
||||
"source": "secure@microsoft.com",
|
||||
"tags": [
|
||||
"Patch",
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-30095",
|
||||
"sourceIdentifier": "secure@microsoft.com",
|
||||
"published": "2024-06-11T17:15:58.150",
|
||||
"lastModified": "2024-06-13T18:36:45.417",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-06-20T18:07:39.000",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -39,6 +39,16 @@
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-787"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "secure@microsoft.com",
|
||||
"type": "Secondary",
|
||||
@ -50,10 +60,123 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "10.0.10240.20680",
|
||||
"matchCriteriaId": "CF7733FD-F870-4578-A567-9900AD6C78E3"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "10.0.14393.7070",
|
||||
"matchCriteriaId": "D96DA51E-404E-49AE-B852-56FF8A1CEEA6"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "10.0.17763.5936",
|
||||
"matchCriteriaId": "9B52F95E-6080-46C6-B4B6-E2B3F3E78456"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "10.0.19044.4529",
|
||||
"matchCriteriaId": "1CEAF689-E8DB-4D3C-BC2E-B386BC077BC5"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "10.0.19045.4529",
|
||||
"matchCriteriaId": "970F54FC-F4ED-49B9-BE94-96B7212FD149"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_11_21h2:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "10.0.22000.3019",
|
||||
"matchCriteriaId": "84ECD6C0-8C47-4D2F-82B5-4F8C0BBC5FEE"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "10.0.22621.3737",
|
||||
"matchCriteriaId": "4E80DF17-1F27-474E-B147-9F5B6C494300"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_11_23h2:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "10.0.22631.3737",
|
||||
"matchCriteriaId": "4258468C-56CC-45C0-B510-FC833E942876"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:x64:*",
|
||||
"matchCriteriaId": "2127D10C-B6F3-4C1D-B9AA-5D78513CC996"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:x86:*",
|
||||
"matchCriteriaId": "AB425562-C0A0-452E-AABE-F70522F15E1A"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "2ACA9287-B475-4AF7-A4DA-A7143CEF9E57"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "A7DF96F8-BA6A-4780-9CA3-F719B3F81074"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "DB18C4CE-5917-401E-ACF7-2747084FD36E"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "10.0.14393.7070",
|
||||
"matchCriteriaId": "FA61AAF0-D769-4287-AA5C-EFDAD067E9F1"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "10.0.17763.5936",
|
||||
"matchCriteriaId": "12F9D974-A968-4CBB-81D8-C73B76DD284A"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_server_2022:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "10.0.20348.2522",
|
||||
"matchCriteriaId": "498A643B-0180-4AD3-BD7C-5E3CEB0FD112"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_server_2022_23h2:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "10.0.25398.950",
|
||||
"matchCriteriaId": "0EA59E2D-57B2-4E8B-937A-3EB51A3AD285"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-30095",
|
||||
"source": "secure@microsoft.com"
|
||||
"source": "secure@microsoft.com",
|
||||
"tags": [
|
||||
"Patch",
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-30096",
|
||||
"sourceIdentifier": "secure@microsoft.com",
|
||||
"published": "2024-06-11T17:15:58.497",
|
||||
"lastModified": "2024-06-13T18:36:45.417",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-06-20T18:07:54.607",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -39,6 +39,16 @@
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "NVD-CWE-noinfo"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "secure@microsoft.com",
|
||||
"type": "Secondary",
|
||||
@ -50,10 +60,80 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "10.0.17763.5936",
|
||||
"matchCriteriaId": "9B52F95E-6080-46C6-B4B6-E2B3F3E78456"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "10.0.19044.4529",
|
||||
"matchCriteriaId": "1CEAF689-E8DB-4D3C-BC2E-B386BC077BC5"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "10.0.19045.4529",
|
||||
"matchCriteriaId": "970F54FC-F4ED-49B9-BE94-96B7212FD149"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_11_21h2:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "10.0.22000.3019",
|
||||
"matchCriteriaId": "84ECD6C0-8C47-4D2F-82B5-4F8C0BBC5FEE"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "10.0.22621.3737",
|
||||
"matchCriteriaId": "4E80DF17-1F27-474E-B147-9F5B6C494300"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_11_23h2:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "10.0.22631.3737",
|
||||
"matchCriteriaId": "4258468C-56CC-45C0-B510-FC833E942876"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "10.0.17763.5936",
|
||||
"matchCriteriaId": "12F9D974-A968-4CBB-81D8-C73B76DD284A"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_server_2022:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "10.0.20348.2522",
|
||||
"matchCriteriaId": "498A643B-0180-4AD3-BD7C-5E3CEB0FD112"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_server_2022_23h2:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "10.0.25398.950",
|
||||
"matchCriteriaId": "0EA59E2D-57B2-4E8B-937A-3EB51A3AD285"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-30096",
|
||||
"source": "secure@microsoft.com"
|
||||
"source": "secure@microsoft.com",
|
||||
"tags": [
|
||||
"Patch",
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-31497",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-04-15T20:15:11.077",
|
||||
"lastModified": "2024-05-10T14:33:55.323",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2024-06-20T19:15:49.960",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -217,6 +217,10 @@
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00014.html",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/IZS3B37GNGWOOV7QU7B7JFK76U4TOP4V/",
|
||||
"source": "cve@mitre.org",
|
||||
|
55
CVE-2024/CVE-2024-373xx/CVE-2024-37349.json
Normal file
55
CVE-2024/CVE-2024-373xx/CVE-2024-37349.json
Normal file
@ -0,0 +1,55 @@
|
||||
{
|
||||
"id": "CVE-2024-37349",
|
||||
"sourceIdentifier": "SecurityResponse@netmotionsoftware.com",
|
||||
"published": "2024-06-20T18:15:11.850",
|
||||
"lastModified": "2024-06-20T18:15:11.850",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "There is a cross-site scripting vulnerability in the\nmanagement UI of Absolute Secure Access prior to version 13.06. Attackers with\nsystem administrator permissions can interfere with other system\nadministrator\u2019s use of the management UI when the victim administrator edits\nthe same management object. This vulnerability is distinct from CVE-2024-37348 and\nCVE-2024-37351. The scope is unchanged, there is no loss of confidentiality. Impact\nto system integrity is high, impact to system availability is none."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "SecurityResponse@netmotionsoftware.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:N/I:H/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "HIGH",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 4.5,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 0.9,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "SecurityResponse@netmotionsoftware.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.absolute.com/platform/security-information/vulnerability-archive/secure-access-1306/cve-2024-37349/",
|
||||
"source": "SecurityResponse@netmotionsoftware.com"
|
||||
}
|
||||
]
|
||||
}
|
55
CVE-2024/CVE-2024-373xx/CVE-2024-37350.json
Normal file
55
CVE-2024/CVE-2024-373xx/CVE-2024-37350.json
Normal file
@ -0,0 +1,55 @@
|
||||
{
|
||||
"id": "CVE-2024-37350",
|
||||
"sourceIdentifier": "SecurityResponse@netmotionsoftware.com",
|
||||
"published": "2024-06-20T18:15:12.103",
|
||||
"lastModified": "2024-06-20T18:15:12.103",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "There is a cross-site scripting vulnerability in the policy\nmanagement UI of Absolute Secure Access prior to version 13.06. Attackers can\ninterfere with a system administrator\u2019s use of the policy management UI when\nthe attacker convinces the victim administrator to follow a crafted link to the\nvulnerable component while the attacking administrator is authenticated to the\nconsole. The scope is unchanged, there is no loss of confidentiality. Impact to\nsystem integrity is high, impact to system availability is none."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "SecurityResponse@netmotionsoftware.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 6.5,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "SecurityResponse@netmotionsoftware.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.absolute.com/platform/security-information/vulnerability-archive/secure-access-1306/cve-2024-37350/",
|
||||
"source": "SecurityResponse@netmotionsoftware.com"
|
||||
}
|
||||
]
|
||||
}
|
55
CVE-2024/CVE-2024-373xx/CVE-2024-37351.json
Normal file
55
CVE-2024/CVE-2024-373xx/CVE-2024-37351.json
Normal file
@ -0,0 +1,55 @@
|
||||
{
|
||||
"id": "CVE-2024-37351",
|
||||
"sourceIdentifier": "SecurityResponse@netmotionsoftware.com",
|
||||
"published": "2024-06-20T18:15:12.347",
|
||||
"lastModified": "2024-06-20T18:15:12.347",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "There is a cross-site scripting vulnerability in the\nmanagement UI of Absolute Secure Access prior to version 13.06. Attackers with\nsystem administrator permissions can interfere with other system\nadministrator\u2019s use of the management UI when the second administrator later\nedits the same management object. This vulnerability is distinct from CVE-2024-37348 and\nCVE-2024-37349. The scope is unchanged, there is no loss of confidentiality. Impact\nto system integrity is high, impact to system availability is none."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "SecurityResponse@netmotionsoftware.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:N/I:H/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "HIGH",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 4.5,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 0.9,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "SecurityResponse@netmotionsoftware.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.absolute.com/platform/security-information/vulnerability-archive/secure-access-1306/cve-2024-37351/",
|
||||
"source": "SecurityResponse@netmotionsoftware.com"
|
||||
}
|
||||
]
|
||||
}
|
55
CVE-2024/CVE-2024-373xx/CVE-2024-37352.json
Normal file
55
CVE-2024/CVE-2024-373xx/CVE-2024-37352.json
Normal file
@ -0,0 +1,55 @@
|
||||
{
|
||||
"id": "CVE-2024-37352",
|
||||
"sourceIdentifier": "SecurityResponse@netmotionsoftware.com",
|
||||
"published": "2024-06-20T18:15:12.590",
|
||||
"lastModified": "2024-06-20T18:15:12.590",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "There is a cross-site scripting vulnerability in the\nmanagement UI of Absolute Secure Access prior to version 13.06 that allows\nattackers with system administrator permissions to interfere with other system\nadministrators\u2019 use of the management UI when the second administrator accesses\nthe vulnerable page. The scope is unchanged, there is no loss of\nconfidentiality. Impact to system integrity is high, impact to system\navailability is none."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "SecurityResponse@netmotionsoftware.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:N/I:H/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "HIGH",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 4.5,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 0.9,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "SecurityResponse@netmotionsoftware.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.absolute.com/platform/security-information/vulnerability-archive/secure-access-1306/cve-2024-37352/",
|
||||
"source": "SecurityResponse@netmotionsoftware.com"
|
||||
}
|
||||
]
|
||||
}
|
24
CVE-2024/CVE-2024-376xx/CVE-2024-37674.json
Normal file
24
CVE-2024/CVE-2024-376xx/CVE-2024-37674.json
Normal file
@ -0,0 +1,24 @@
|
||||
{
|
||||
"id": "CVE-2024-37674",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-06-20T18:15:12.833",
|
||||
"lastModified": "2024-06-20T18:15:12.833",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Cross Site Scripting vulnerability in Moodle CMS v3.10 allows a remote attacker to execute arbitrary code via the Field Name (name parameter) of a new activity."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "http://moodle.com",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/MohamedAzizMSALLEMI/Moodle_Security/blob/main/CVE-2024-37674.md",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
28
CVE-2024/CVE-2024-376xx/CVE-2024-37699.json
Normal file
28
CVE-2024/CVE-2024-376xx/CVE-2024-37699.json
Normal file
@ -0,0 +1,28 @@
|
||||
{
|
||||
"id": "CVE-2024-37699",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-06-20T18:15:12.920",
|
||||
"lastModified": "2024-06-20T18:15:12.920",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "An issue in DataLife Engine v.17.1 and before is vulnerable to SQL Injection in dboption."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://dle-news.ru/pressrelease/1909-datalife-engine-v172-press-release.html",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://exploit.az/threads/datalife-engine-dle-sql-inyeksiyasi-17-0.19/",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://exploit.az/threads/datalife-engine-dle-sql-inyeksiyasi-sql-injection-sql-inekcija-17-1.19/",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
24
CVE-2024/CVE-2024-378xx/CVE-2024-37818.json
Normal file
24
CVE-2024/CVE-2024-378xx/CVE-2024-37818.json
Normal file
@ -0,0 +1,24 @@
|
||||
{
|
||||
"id": "CVE-2024-37818",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-06-20T19:15:50.260",
|
||||
"lastModified": "2024-06-20T19:15:50.260",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Strapi v4.24.4 was discovered to contain a Server-Side Request Forgery (SSRF) via the component /strapi.io/_next/image. This vulnerability allows attackers to scan for open ports or access sensitive information via a crafted GET request."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://medium.com/%40barkadevaibhav491/server-side-request-forgery-in-strapi-e02d5fe218ab",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://strapi.io/",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
59
CVE-2024/CVE-2024-378xx/CVE-2024-37897.json
Normal file
59
CVE-2024/CVE-2024-378xx/CVE-2024-37897.json
Normal file
@ -0,0 +1,59 @@
|
||||
{
|
||||
"id": "CVE-2024-37897",
|
||||
"sourceIdentifier": "security-advisories@github.com",
|
||||
"published": "2024-06-20T18:15:13.023",
|
||||
"lastModified": "2024-06-20T18:15:13.023",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "SFTPGo is a full-featured and highly configurable SFTP, HTTP/S, FTP/S and WebDAV server - S3, Google Cloud Storage, Azure Blob. SFTPGo WebAdmin and WebClient support password reset. This feature is disabled in the default configuration.\nIn SFTPGo versions prior to v2.6.1, if the feature is enabled, even users with access restrictions (e.g. expired) can reset their password and log in. Users are advised to upgrade to version 2.6.1. Users unable to upgrade may keep the password reset feature disabled or set a blank email address for users and admins with access restrictions so they cannot receive the email with the reset code and exploit the vulnerability."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 5.4,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 2.5
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-287"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/drakkan/sftpgo/commit/1f8ac8bfe16100b0484d6c91e1e8361687324423",
|
||||
"source": "security-advisories@github.com"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/drakkan/sftpgo/security/advisories/GHSA-hw5f-6wvv-xcrh",
|
||||
"source": "security-advisories@github.com"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-6082",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2024-06-17T23:15:51.920",
|
||||
"lastModified": "2024-06-20T12:44:01.637",
|
||||
"lastModified": "2024-06-20T19:15:50.437",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-6187",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2024-06-20T13:15:50.320",
|
||||
"lastModified": "2024-06-20T16:07:50.417",
|
||||
"lastModified": "2024-06-20T19:15:50.553",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-6192",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2024-06-20T15:15:51.517",
|
||||
"lastModified": "2024-06-20T16:07:50.417",
|
||||
"lastModified": "2024-06-20T18:15:13.337",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
|
77
README.md
77
README.md
@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours.
|
||||
### Last Repository Update
|
||||
|
||||
```plain
|
||||
2024-06-20T18:00:18.335649+00:00
|
||||
2024-06-20T20:00:18.945689+00:00
|
||||
```
|
||||
|
||||
### Most recent CVE Modification Timestamp synchronized with NVD
|
||||
|
||||
```plain
|
||||
2024-06-20T17:51:00.143000+00:00
|
||||
2024-06-20T19:15:50.553000+00:00
|
||||
```
|
||||
|
||||
### Last Data Feed Release
|
||||
@ -33,60 +33,45 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
|
||||
### Total Number of included CVEs
|
||||
|
||||
```plain
|
||||
254756
|
||||
254764
|
||||
```
|
||||
|
||||
### CVEs added in the last Commit
|
||||
|
||||
Recently added CVEs: `16`
|
||||
Recently added CVEs: `8`
|
||||
|
||||
- [CVE-2022-41324](CVE-2022/CVE-2022-413xx/CVE-2022-41324.json) (`2024-06-20T17:15:50.020`)
|
||||
- [CVE-2022-45929](CVE-2022/CVE-2022-459xx/CVE-2022-45929.json) (`2024-06-20T17:15:50.127`)
|
||||
- [CVE-2024-28397](CVE-2024/CVE-2024-283xx/CVE-2024-28397.json) (`2024-06-20T17:15:50.527`)
|
||||
- [CVE-2024-33335](CVE-2024/CVE-2024-333xx/CVE-2024-33335.json) (`2024-06-20T17:15:50.820`)
|
||||
- [CVE-2024-37343](CVE-2024/CVE-2024-373xx/CVE-2024-37343.json) (`2024-06-20T17:15:50.910`)
|
||||
- [CVE-2024-37344](CVE-2024/CVE-2024-373xx/CVE-2024-37344.json) (`2024-06-20T17:15:51.153`)
|
||||
- [CVE-2024-37345](CVE-2024/CVE-2024-373xx/CVE-2024-37345.json) (`2024-06-20T17:15:51.397`)
|
||||
- [CVE-2024-37346](CVE-2024/CVE-2024-373xx/CVE-2024-37346.json) (`2024-06-20T17:15:51.623`)
|
||||
- [CVE-2024-37347](CVE-2024/CVE-2024-373xx/CVE-2024-37347.json) (`2024-06-20T17:15:51.853`)
|
||||
- [CVE-2024-37348](CVE-2024/CVE-2024-373xx/CVE-2024-37348.json) (`2024-06-20T17:15:52.080`)
|
||||
- [CVE-2024-37626](CVE-2024/CVE-2024-376xx/CVE-2024-37626.json) (`2024-06-20T17:15:52.353`)
|
||||
- [CVE-2024-37676](CVE-2024/CVE-2024-376xx/CVE-2024-37676.json) (`2024-06-20T16:15:13.917`)
|
||||
- [CVE-2024-6193](CVE-2024/CVE-2024-61xx/CVE-2024-6193.json) (`2024-06-20T16:15:15.110`)
|
||||
- [CVE-2024-6194](CVE-2024/CVE-2024-61xx/CVE-2024-6194.json) (`2024-06-20T16:15:15.393`)
|
||||
- [CVE-2024-6195](CVE-2024/CVE-2024-61xx/CVE-2024-6195.json) (`2024-06-20T16:15:15.680`)
|
||||
- [CVE-2024-6196](CVE-2024/CVE-2024-61xx/CVE-2024-6196.json) (`2024-06-20T16:15:15.967`)
|
||||
- [CVE-2024-37349](CVE-2024/CVE-2024-373xx/CVE-2024-37349.json) (`2024-06-20T18:15:11.850`)
|
||||
- [CVE-2024-37350](CVE-2024/CVE-2024-373xx/CVE-2024-37350.json) (`2024-06-20T18:15:12.103`)
|
||||
- [CVE-2024-37351](CVE-2024/CVE-2024-373xx/CVE-2024-37351.json) (`2024-06-20T18:15:12.347`)
|
||||
- [CVE-2024-37352](CVE-2024/CVE-2024-373xx/CVE-2024-37352.json) (`2024-06-20T18:15:12.590`)
|
||||
- [CVE-2024-37674](CVE-2024/CVE-2024-376xx/CVE-2024-37674.json) (`2024-06-20T18:15:12.833`)
|
||||
- [CVE-2024-37699](CVE-2024/CVE-2024-376xx/CVE-2024-37699.json) (`2024-06-20T18:15:12.920`)
|
||||
- [CVE-2024-37818](CVE-2024/CVE-2024-378xx/CVE-2024-37818.json) (`2024-06-20T19:15:50.260`)
|
||||
- [CVE-2024-37897](CVE-2024/CVE-2024-378xx/CVE-2024-37897.json) (`2024-06-20T18:15:13.023`)
|
||||
|
||||
|
||||
### CVEs modified in the last Commit
|
||||
|
||||
Recently modified CVEs: `43`
|
||||
Recently modified CVEs: `18`
|
||||
|
||||
- [CVE-2024-35250](CVE-2024/CVE-2024-352xx/CVE-2024-35250.json) (`2024-06-20T17:10:13.720`)
|
||||
- [CVE-2024-35252](CVE-2024/CVE-2024-352xx/CVE-2024-35252.json) (`2024-06-20T17:12:13.843`)
|
||||
- [CVE-2024-35253](CVE-2024/CVE-2024-352xx/CVE-2024-35253.json) (`2024-06-20T17:13:17.437`)
|
||||
- [CVE-2024-35254](CVE-2024/CVE-2024-352xx/CVE-2024-35254.json) (`2024-06-20T16:16:47.070`)
|
||||
- [CVE-2024-35255](CVE-2024/CVE-2024-352xx/CVE-2024-35255.json) (`2024-06-20T16:31:46.127`)
|
||||
- [CVE-2024-35263](CVE-2024/CVE-2024-352xx/CVE-2024-35263.json) (`2024-06-20T16:32:31.287`)
|
||||
- [CVE-2024-35265](CVE-2024/CVE-2024-352xx/CVE-2024-35265.json) (`2024-06-20T16:33:28.080`)
|
||||
- [CVE-2024-36226](CVE-2024/CVE-2024-362xx/CVE-2024-36226.json) (`2024-06-20T16:02:34.930`)
|
||||
- [CVE-2024-37222](CVE-2024/CVE-2024-372xx/CVE-2024-37222.json) (`2024-06-20T16:07:50.417`)
|
||||
- [CVE-2024-37532](CVE-2024/CVE-2024-375xx/CVE-2024-37532.json) (`2024-06-20T16:07:50.417`)
|
||||
- [CVE-2024-3766](CVE-2024/CVE-2024-37xx/CVE-2024-3766.json) (`2024-06-20T16:15:14.380`)
|
||||
- [CVE-2024-4073](CVE-2024/CVE-2024-40xx/CVE-2024-4073.json) (`2024-06-20T16:15:14.530`)
|
||||
- [CVE-2024-5156](CVE-2024/CVE-2024-51xx/CVE-2024-5156.json) (`2024-06-20T16:07:50.417`)
|
||||
- [CVE-2024-5830](CVE-2024/CVE-2024-58xx/CVE-2024-5830.json) (`2024-06-20T16:06:51.777`)
|
||||
- [CVE-2024-5831](CVE-2024/CVE-2024-58xx/CVE-2024-5831.json) (`2024-06-20T16:07:02.127`)
|
||||
- [CVE-2024-6162](CVE-2024/CVE-2024-61xx/CVE-2024-6162.json) (`2024-06-20T16:07:50.417`)
|
||||
- [CVE-2024-6182](CVE-2024/CVE-2024-61xx/CVE-2024-6182.json) (`2024-06-20T16:15:14.807`)
|
||||
- [CVE-2024-6183](CVE-2024/CVE-2024-61xx/CVE-2024-6183.json) (`2024-06-20T16:15:14.903`)
|
||||
- [CVE-2024-6186](CVE-2024/CVE-2024-61xx/CVE-2024-6186.json) (`2024-06-20T16:07:50.417`)
|
||||
- [CVE-2024-6187](CVE-2024/CVE-2024-61xx/CVE-2024-6187.json) (`2024-06-20T16:07:50.417`)
|
||||
- [CVE-2024-6188](CVE-2024/CVE-2024-61xx/CVE-2024-6188.json) (`2024-06-20T16:15:15.003`)
|
||||
- [CVE-2024-6189](CVE-2024/CVE-2024-61xx/CVE-2024-6189.json) (`2024-06-20T16:07:50.417`)
|
||||
- [CVE-2024-6190](CVE-2024/CVE-2024-61xx/CVE-2024-6190.json) (`2024-06-20T16:07:50.417`)
|
||||
- [CVE-2024-6191](CVE-2024/CVE-2024-61xx/CVE-2024-6191.json) (`2024-06-20T16:07:50.417`)
|
||||
- [CVE-2024-6192](CVE-2024/CVE-2024-61xx/CVE-2024-6192.json) (`2024-06-20T16:07:50.417`)
|
||||
- [CVE-2023-38313](CVE-2023/CVE-2023-383xx/CVE-2023-38313.json) (`2024-06-20T18:15:10.417`)
|
||||
- [CVE-2023-38314](CVE-2023/CVE-2023-383xx/CVE-2023-38314.json) (`2024-06-20T18:15:10.557`)
|
||||
- [CVE-2023-38315](CVE-2023/CVE-2023-383xx/CVE-2023-38315.json) (`2024-06-20T18:15:10.663`)
|
||||
- [CVE-2023-38316](CVE-2023/CVE-2023-383xx/CVE-2023-38316.json) (`2024-06-20T18:15:10.767`)
|
||||
- [CVE-2023-38320](CVE-2023/CVE-2023-383xx/CVE-2023-38320.json) (`2024-06-20T18:15:10.873`)
|
||||
- [CVE-2023-38322](CVE-2023/CVE-2023-383xx/CVE-2023-38322.json) (`2024-06-20T18:15:10.980`)
|
||||
- [CVE-2023-38324](CVE-2023/CVE-2023-383xx/CVE-2023-38324.json) (`2024-06-20T18:15:11.083`)
|
||||
- [CVE-2023-41101](CVE-2023/CVE-2023-411xx/CVE-2023-41101.json) (`2024-06-20T18:15:11.237`)
|
||||
- [CVE-2023-41102](CVE-2023/CVE-2023-411xx/CVE-2023-41102.json) (`2024-06-20T18:15:11.333`)
|
||||
- [CVE-2024-30089](CVE-2024/CVE-2024-300xx/CVE-2024-30089.json) (`2024-06-20T18:29:16.590`)
|
||||
- [CVE-2024-30090](CVE-2024/CVE-2024-300xx/CVE-2024-30090.json) (`2024-06-20T18:29:05.917`)
|
||||
- [CVE-2024-30093](CVE-2024/CVE-2024-300xx/CVE-2024-30093.json) (`2024-06-20T18:28:55.697`)
|
||||
- [CVE-2024-30095](CVE-2024/CVE-2024-300xx/CVE-2024-30095.json) (`2024-06-20T18:07:39.000`)
|
||||
- [CVE-2024-30096](CVE-2024/CVE-2024-300xx/CVE-2024-30096.json) (`2024-06-20T18:07:54.607`)
|
||||
- [CVE-2024-31497](CVE-2024/CVE-2024-314xx/CVE-2024-31497.json) (`2024-06-20T19:15:49.960`)
|
||||
- [CVE-2024-6082](CVE-2024/CVE-2024-60xx/CVE-2024-6082.json) (`2024-06-20T19:15:50.437`)
|
||||
- [CVE-2024-6187](CVE-2024/CVE-2024-61xx/CVE-2024-6187.json) (`2024-06-20T19:15:50.553`)
|
||||
- [CVE-2024-6192](CVE-2024/CVE-2024-61xx/CVE-2024-6192.json) (`2024-06-20T18:15:13.337`)
|
||||
|
||||
|
||||
## Download and Usage
|
||||
|
156
_state.csv
156
_state.csv
@ -206867,7 +206867,7 @@ CVE-2022-4132,0,0,39bb27b8bcfa5217be40ca9c8319793eb5451cd6546e16d6355a878e29e8f7
|
||||
CVE-2022-41320,0,0,4af0082ee3251c36c201ebf06ac6d97abcf09a492a827e8f0584c68605fb9690,2022-09-26T16:12:32.250000
|
||||
CVE-2022-41322,0,0,7ebdfc14fca3194069183ac5976535f469c2e6ccdcfdfcaf667042538e2a6ff7,2023-11-07T03:52:46.567000
|
||||
CVE-2022-41323,0,0,faab8688d7cbe32258e85dda0240b8a7df2d0ee4db0fc4a2415fde8a747088ba,2023-11-07T03:52:46.637000
|
||||
CVE-2022-41324,1,1,b02a369649a1b048d80a1dc0ecd3cb266c27b69c552b2eed535019e30b633220,2024-06-20T17:15:50.020000
|
||||
CVE-2022-41324,0,0,b02a369649a1b048d80a1dc0ecd3cb266c27b69c552b2eed535019e30b633220,2024-06-20T17:15:50.020000
|
||||
CVE-2022-41325,0,0,076a23b6db4a8e9db26f3abe6a388c0d781ed95e952859c309eb34683ef6c4e3,2022-12-08T16:44:11.917000
|
||||
CVE-2022-41326,0,0,abebff8816a3746c070f005ea5cc276c465f50d753463f79292b529430e95a1c,2023-08-08T14:21:49.707000
|
||||
CVE-2022-41327,0,0,5550822a25edb1ef8f904091df8ce2ea514b508621c1976b3beb29e58288d9fd,2023-11-07T03:52:46.720000
|
||||
@ -210220,7 +210220,7 @@ CVE-2022-45925,0,0,fd7051a696b3f22bdc4f0c838abc5ef791297ad80cd0b8eb63f31599526d2
|
||||
CVE-2022-45926,0,0,fb2fe7a1bc006fa7fb3e239d1549e4c27173c2380f9e46c34dfa5d44f19fa717,2023-01-26T19:16:48.833000
|
||||
CVE-2022-45927,0,0,2d8121245e6a894c11dd14ab6a2621d053f515cadd318bd586217b7c82d2c519,2023-01-30T15:28:54.280000
|
||||
CVE-2022-45928,0,0,c9fcbf662fac772bbbe3bf0a462241c586620e0d0c3e7572d8191497c6265236,2023-01-25T21:28:22.397000
|
||||
CVE-2022-45929,1,1,804eff6a9e813ba908c66b0caed1d89f08039fee365acb7e14fa733fb9c38028,2024-06-20T17:15:50.127000
|
||||
CVE-2022-45929,0,0,804eff6a9e813ba908c66b0caed1d89f08039fee365acb7e14fa733fb9c38028,2024-06-20T17:15:50.127000
|
||||
CVE-2022-4593,0,0,eb6ffb8de64998ea2127551b2c0e8bff71c720033be3ec04cd9cfc44b019f521,2023-11-07T03:58:16.583000
|
||||
CVE-2022-45930,0,0,c421a42777d5939834ae83348afde1ca99d648269378cede4f668e29a1de4f22,2022-11-30T20:47:36.310000
|
||||
CVE-2022-45931,0,0,4503725956684c17f88fe293de22602f713acbe0d22ac8ff3064c40a2f3edd38,2022-11-30T20:46:53.243000
|
||||
@ -228427,19 +228427,19 @@ CVE-2023-3831,0,0,d5b2398abfadc093490d321387115328630e45b3e269abc4fbcad0082e3cfa
|
||||
CVE-2023-38310,0,0,b2b62da79dc4cd0829d985b78e2a8f71d06cc6085dde75696e6166b006207c20,2023-08-04T12:56:01.327000
|
||||
CVE-2023-38311,0,0,c00bb2a25d54c6a1ef035344e8ae7cf77bdb6ee39cd119963c6ce89aca75ea60,2023-08-04T12:55:45.233000
|
||||
CVE-2023-38312,0,0,7844bff0bd9c10a74a4e63d3f1fd3e6cb9d7927b54f3b1dc44629fceac02b7d4,2023-10-19T14:18:26.410000
|
||||
CVE-2023-38313,0,0,eedd8754e2321b559f0a99b86fac17a33ba14a223c3dbec375d2adcabd8e30ec,2023-11-23T03:37:09.847000
|
||||
CVE-2023-38314,0,0,c81d755ac83d699881e7ae2953843fbc8d26342441425026c339e53ec4cd8e74,2023-11-23T03:37:21.490000
|
||||
CVE-2023-38315,0,0,856dec9e73a19ab6c730eb4063dd939684552f3a376a2032d3c2fb51f825b517,2023-11-23T03:34:50.727000
|
||||
CVE-2023-38316,0,0,98a7499f15521e90612d170b295d65d85cd3f6c4c8c5b0079f3c38bf27e9000d,2023-11-23T03:35:41.227000
|
||||
CVE-2023-38313,0,1,be27fb457fb737dfca279e09ac2188fb832b982bbb0bb08bc6b5a80e5a212e71,2024-06-20T18:15:10.417000
|
||||
CVE-2023-38314,0,1,406124ab0a1537d85c3cf4f68f1c58e8bd186465d4ce8b37a0f1b6e6e32f25fd,2024-06-20T18:15:10.557000
|
||||
CVE-2023-38315,0,1,6bd5b5d343cff8f9e944a5876fa4aca0414a64e91d37ce40553031a7841b7ce9,2024-06-20T18:15:10.663000
|
||||
CVE-2023-38316,0,1,7514922018cda249414c54af2d69b50c21d2dbd09f36457e7cbb739fc9d18918,2024-06-20T18:15:10.767000
|
||||
CVE-2023-38317,0,0,3844ec9ba11dc6247243efaf0af9851e8c79728fbe3d2fa3c4b759cbe2daf6a2,2024-02-02T15:54:24.127000
|
||||
CVE-2023-38318,0,0,40d57e70262f40afcc03b5c855425d6bbdf421521c56264784d1c48b649360f0,2024-02-02T15:54:16.743000
|
||||
CVE-2023-38319,0,0,638be33943571bd2642eff75a9a4e9af928154555c59b75acf9259e230bfe489,2024-02-02T15:54:04.640000
|
||||
CVE-2023-3832,0,0,679745d30a373bf30ce3044a1d573767ae6357f576fe034ad2c6c17c4e32274e,2024-05-17T02:27:51.623000
|
||||
CVE-2023-38320,0,0,e4b0f6ce1ad149ab1f01f3d45a989857094732c11e4f58a2a2dcf281ed71e52d,2023-11-23T03:35:49.027000
|
||||
CVE-2023-38320,0,1,7ac8b0b1082dda3863738f8ec587595c99f254594ba4c471c7eed4b31938cadb,2024-06-20T18:15:10.873000
|
||||
CVE-2023-38321,0,0,f5973cfb4c0a06a7be41a46d8689f386803a63b4be6a767cf3778d933f7357d7,2024-01-03T22:30:12.113000
|
||||
CVE-2023-38322,0,0,6e88e30f3e3d759aed84ad8ff9983317e1047656bd563fd12d1c445311625c24,2023-11-23T03:43:20.190000
|
||||
CVE-2023-38322,0,1,f806597befac9dcf83066904f3ecadffaacee3d81621c7a3e77fa8e907842bde,2024-06-20T18:15:10.980000
|
||||
CVE-2023-38323,0,0,b8a4755771c158b0d0921b467af467eb29522a60f4c9d4c8f604325777ec5543,2024-02-02T15:53:56.563000
|
||||
CVE-2023-38324,0,0,6aef7acd03b3c245dbb2e1d940a7c39ddb2c92369160effe9942a91e37bc0bd7,2024-01-26T05:15:12.203000
|
||||
CVE-2023-38324,0,1,af82b1dd6ac86e7e5204be843f63377bebca607032fe9354f5127bf935efcbd4,2024-06-20T18:15:11.083000
|
||||
CVE-2023-38325,0,0,ebd76f247d920ff1243b3d36c8c1fed7e3ca47c4a920d461819a099d81595ee1,2023-11-07T04:17:14.413000
|
||||
CVE-2023-38326,0,0,6d358f414d0c067b73c03bb6d565fc633e17a4dafa860cc79e195b8e0ea24bbc,2023-11-07T04:17:15.360000
|
||||
CVE-2023-38328,0,0,84e7054eba86c35725b0e0132f81c8695d265c78e52b01ad0f614a9b6c850667,2023-11-07T17:08:51.110000
|
||||
@ -230613,8 +230613,8 @@ CVE-2023-41098,0,0,c025f5147acb201a7a82e7ddc766f7a187ed0115626c21d1340a938147fcc
|
||||
CVE-2023-41099,0,0,2f7ed1bfc6b2d8415ebb005a1061cb50a8cd1311e2e59d23dabc0bfb121dbe69,2024-03-22T15:34:43.663000
|
||||
CVE-2023-4110,0,0,62dc5e9bf46cc8e619ee56bc7a76f82e9b230f23cc72d0f40c8f22bea091920a,2024-05-17T02:31:19.523000
|
||||
CVE-2023-41100,0,0,0e98c62233ad8fdc1a0dc794cad2a13de21da53ef316b7fa45391b4c29fb335f,2023-08-28T21:27:36.420000
|
||||
CVE-2023-41101,0,1,d0585c28bbcdecdc7b3e944f579c3cf2347e368485bfe2cbff69baa9fe655c7b,2024-06-20T16:15:12.713000
|
||||
CVE-2023-41102,0,0,24e14cf7269a879c0a2e29cb8e7a47a17744976538052a2c5d874ba10e23051c,2023-11-25T02:15:05.617000
|
||||
CVE-2023-41101,0,1,f0e4fcdc25d45660d87e851fa7c8989fc4a8763942368859f18e9d739c0bb2b3,2024-06-20T18:15:11.237000
|
||||
CVE-2023-41102,0,1,162f5ecbf4d0ad70d2d3c4f76fa68891315f90a8db2489b9b9b61ba6407c2a5f,2024-06-20T18:15:11.333000
|
||||
CVE-2023-41103,0,0,2e9c5658d8e085314a307e9b4407246c0a83e99822f5631f35e29f67c6ba9aa3,2023-09-15T14:56:53.237000
|
||||
CVE-2023-41104,0,0,26b88ec397bfc19eae05a7a32b350924bbd51b39b465df386506014eb416e50f,2023-08-28T21:41:07.790000
|
||||
CVE-2023-41105,0,0,59eff7f6b797aeb7d9435c5dc53e0dfd19084f7897d66a0f230216b00ed68118,2023-11-07T04:20:53.350000
|
||||
@ -236154,10 +236154,10 @@ CVE-2023-49107,0,0,0e9af909d621a9c4570185530fdb9aef197de445657f00c33192f11bd7858
|
||||
CVE-2023-49108,0,0,8b448f813b7f2ff64556bb633e06c1db82194a485a83298972e379416108c845,2023-12-07T17:52:39.950000
|
||||
CVE-2023-49109,0,0,3bb373d6db941540f9b57f78839d3b030348e834d02ede0d650edc70819635fb,2024-02-20T19:50:53.960000
|
||||
CVE-2023-4911,0,0,0380760292e65955859c1ea2fd6467a51435ec5fc89240e3b7268906c4542c20,2024-02-22T20:18:58.020000
|
||||
CVE-2023-49110,0,1,14afbb403bdce5c399c02b1cf9852e203569cee95df8db4bfbab19a13aa207b9,2024-06-20T16:07:50.417000
|
||||
CVE-2023-49111,0,1,2c29a293b5909ba7498950e26a27ccdc46c68887eb71993c10ceea2f9becaf4b,2024-06-20T16:07:50.417000
|
||||
CVE-2023-49112,0,1,7b86cdca77612affdb612f88bc8d1c9f0429198621de182bf9de5e5b34b4974a,2024-06-20T16:07:50.417000
|
||||
CVE-2023-49113,0,1,e0612c46f0857174266622cad8ce046d6e8bc08302342468c7715a276002bc30,2024-06-20T16:07:50.417000
|
||||
CVE-2023-49110,0,0,14afbb403bdce5c399c02b1cf9852e203569cee95df8db4bfbab19a13aa207b9,2024-06-20T16:07:50.417000
|
||||
CVE-2023-49111,0,0,2c29a293b5909ba7498950e26a27ccdc46c68887eb71993c10ceea2f9becaf4b,2024-06-20T16:07:50.417000
|
||||
CVE-2023-49112,0,0,7b86cdca77612affdb612f88bc8d1c9f0429198621de182bf9de5e5b34b4974a,2024-06-20T16:07:50.417000
|
||||
CVE-2023-49113,0,0,e0612c46f0857174266622cad8ce046d6e8bc08302342468c7715a276002bc30,2024-06-20T16:07:50.417000
|
||||
CVE-2023-49114,0,0,1149e9644a812fe979090b00a81f87220fd6ab37816f13bf4a0117849686b510,2024-03-03T03:15:07.170000
|
||||
CVE-2023-49115,0,0,d4487cb956fe9cb8f01ce6d3732e2ed47fd143cb71a5d17fa9999fc2467e49a2,2024-05-17T02:30:59.670000
|
||||
CVE-2023-49117,0,0,532b60b363b961206673339ea571d1dbd7872affd35f7cb4f7e7a5be2e8191ec,2024-01-04T02:42:06.503000
|
||||
@ -245882,7 +245882,7 @@ CVE-2024-26023,0,0,03df4473c85ab0c8247169f36cdaabb6d0ade251a86d2a476e4dede57424f
|
||||
CVE-2024-26024,0,0,446166e750142f30b836c26c29324a3e66b74c06f52673e398585fd034e50e1e,2024-05-29T13:02:09.280000
|
||||
CVE-2024-26026,0,0,a3caa671cadcbee0b7a7647f8dff9c68f25411a54544c0183999cc9da232fc84,2024-05-08T17:05:24.083000
|
||||
CVE-2024-26028,0,0,f0eeab6f00388b393e9761660fb13451fd75e54f8248c45c23f5d18cc79809b2,2024-03-18T19:40:00.173000
|
||||
CVE-2024-26029,0,1,73b1b2a7a164f2d1b52c68fceca6c2cc8b7181b78e4f3a2dcaf477ebe79168d6,2024-06-20T16:03:36.843000
|
||||
CVE-2024-26029,0,0,73b1b2a7a164f2d1b52c68fceca6c2cc8b7181b78e4f3a2dcaf477ebe79168d6,2024-06-20T16:03:36.843000
|
||||
CVE-2024-2603,0,0,4c37ef52a7f3919b1ed75f79e6f53895a8c8809eb0619c9287c9e5b10ed97fd0,2024-04-26T12:58:17.720000
|
||||
CVE-2024-26030,0,0,6e3023416b037dd092fe7b5e942072e3533649d1b2cfd157142cc39338fedbad,2024-03-18T19:40:00.173000
|
||||
CVE-2024-26031,0,0,ed002faaad586ba4ca84a6198e87a403fdacf5cc79e96297a7527ff0ace203b7,2024-03-18T19:40:00.173000
|
||||
@ -245983,8 +245983,8 @@ CVE-2024-26122,0,0,ebd0b44b5bc15532d34026512ae127f0930d62b2b57bf3dbe4bee69b04bdb
|
||||
CVE-2024-26123,0,0,978063f86345e9aabd1ad8bb003ba506cde83ac2c4827bf02945e5b3d4d7ea82,2024-06-14T19:56:46.423000
|
||||
CVE-2024-26124,0,0,ab8f2017ef0c3d450afff0e4d68ea6b589bbb2fecbbaa8ab6de815da1a5b12bc,2024-03-18T19:40:00.173000
|
||||
CVE-2024-26125,0,0,0e1aa1a870111e13cba190593df732023dd1a768da77b87d37882fcb57fe6b32,2024-03-18T19:40:00.173000
|
||||
CVE-2024-26126,0,1,69ef2a9b0be7586f7d0597712d0d37ba22eecee8606909b040fe99e2830cc6f1,2024-06-20T16:02:57.067000
|
||||
CVE-2024-26127,0,1,d0e762c07655a0d114858a70e842b28c0aa661b36e06ad0fb0f1e56a7272a16e,2024-06-20T16:02:47.140000
|
||||
CVE-2024-26126,0,0,69ef2a9b0be7586f7d0597712d0d37ba22eecee8606909b040fe99e2830cc6f1,2024-06-20T16:02:57.067000
|
||||
CVE-2024-26127,0,0,d0e762c07655a0d114858a70e842b28c0aa661b36e06ad0fb0f1e56a7272a16e,2024-06-20T16:02:47.140000
|
||||
CVE-2024-26128,0,0,c70d7cf32a5694fc3f84894b4fd56cc1fe56399910a443c60418b95af56a6cc6,2024-02-23T02:42:54.547000
|
||||
CVE-2024-26129,0,0,968e60f64e57be6f8f2df784210f5788e81353ced4a4f4353953a10484d71d0a,2024-02-20T19:50:53.960000
|
||||
CVE-2024-2613,0,0,d494d0eac9a22f11a08cd41300021a195d2876150771d2f4db832e39cdda2af3,2024-03-19T13:26:46
|
||||
@ -246706,7 +246706,7 @@ CVE-2024-26996,0,0,cea553e0454def5a96fbfdf9d710c263c431f278cf804a7efd8ec8ff0107b
|
||||
CVE-2024-26997,0,0,bdfca562d47f9e5d3fc1098c4dacc21d61a7ba014b51a9e792d5f847f7afb48b,2024-05-03T06:15:11.950000
|
||||
CVE-2024-26998,0,0,822a5cfb35cd9e5868bbf4bda50d2331021edf4824c2d8385d4feca7d97a1dd2,2024-05-13T08:15:11.390000
|
||||
CVE-2024-26999,0,0,9ac4807c2521e1d8db890c0527b001317552b4ac44ce0b01702365258c787f45,2024-05-03T06:15:12.137000
|
||||
CVE-2024-2700,0,1,8a91fa87f2e863b341eb07ce9755b5a44b31a2c626fc69e01187b114c8b0f143,2024-06-20T17:15:50.623000
|
||||
CVE-2024-2700,0,0,8a91fa87f2e863b341eb07ce9755b5a44b31a2c626fc69e01187b114c8b0f143,2024-06-20T17:15:50.623000
|
||||
CVE-2024-27000,0,0,ad2ef5bdd7c2f9d77d1b6346a92f926b0e0114b79caa616e96d2bb2c427a8aac,2024-05-03T06:15:12.350000
|
||||
CVE-2024-27001,0,0,f4defde5af84e6133600f9028ad4a44c6061db86e7d3ca3705bde065e8cf1441,2024-05-03T06:15:12.590000
|
||||
CVE-2024-27002,0,0,6190ad6afa26f7583c9a538caad37267ed161406911969a163db177bf76cd4a6,2024-05-13T08:15:11.473000
|
||||
@ -247686,7 +247686,7 @@ CVE-2024-28393,0,0,e0c4576a591386616a5436e610cf9896298fbb6cfafc568aeae2cf64152b1
|
||||
CVE-2024-28394,0,0,f0eb5c2a2e992661c86d431672af612fba506c8020260929356a00254130fb99,2024-03-20T13:00:16.367000
|
||||
CVE-2024-28395,0,0,82b3598bd12d6612d167521c1ee69fbab81f725a57a13c49e97ed83bf01459b1,2024-03-20T17:18:26.603000
|
||||
CVE-2024-28396,0,0,08c911aadb83e5362b5d631a35d91514cb49b70b595ec0db66bff1b061c3d497,2024-03-20T17:18:26.603000
|
||||
CVE-2024-28397,1,1,2b9f4e0a22672315fe044b1ec86ad26ae4877e2653c58b1795e7cd538c077bca,2024-06-20T17:15:50.527000
|
||||
CVE-2024-28397,0,0,2b9f4e0a22672315fe044b1ec86ad26ae4877e2653c58b1795e7cd538c077bca,2024-06-20T17:15:50.527000
|
||||
CVE-2024-2840,0,0,0b9b9cf54907fdf1823442cc4c2107a1ff7330df6580a85d873db983a404ff6f,2024-05-02T18:00:37.360000
|
||||
CVE-2024-28401,0,0,83d95f41ea79f5a899455bbe843f9dc43cbd29f0392a9dd964c37347d6306d48,2024-03-17T22:38:29.433000
|
||||
CVE-2024-28402,0,0,61ea1531e9fa41a150bc3854f6b2d96efe4af71d76e3f9c52520b041294710ef,2024-04-11T12:47:44.137000
|
||||
@ -248673,22 +248673,22 @@ CVE-2024-30085,0,0,9e82e66b216cdd366057fdc6f35f1e8f0cf99233e1d8b95971d7041e1eb3a
|
||||
CVE-2024-30086,0,0,0207882338fd67a29921c4ce278cc49eaa3741765bf3d0737be3bb4d2c47d2b9,2024-06-13T18:36:45.417000
|
||||
CVE-2024-30087,0,0,1b67bb3eef76d86ffbb10a38ce83762303c8ce546d44fec6cb2ed10776a6daef,2024-06-13T18:36:45.417000
|
||||
CVE-2024-30088,0,0,7fa57a4d52f44464a8574defcc41d066ac9007484a913ebf598b44883158779d,2024-06-13T18:36:45.417000
|
||||
CVE-2024-30089,0,0,93512962ce974d553a614b8d2720dde8f878ae27feef9e3a59e1a3ad1c80c595,2024-06-13T18:36:45.417000
|
||||
CVE-2024-30089,0,1,f43123d3427892d91ebd43ae3925fa106717bafbf8a904c948f1cb809185c0a9,2024-06-20T18:29:16.590000
|
||||
CVE-2024-3009,0,0,45cbb233e1060c020b98cbac0489f2f2b66b5aca9f357b84710ff55551dcc79e,2024-05-17T02:39:40.367000
|
||||
CVE-2024-30090,0,0,1d5941ee3964343daabee0cc87d347508df6c11e27e01aaf69cddee19b4cf97d,2024-06-13T18:36:45.417000
|
||||
CVE-2024-30090,0,1,51bbb126d4a58e13c6e42a2b2d0e6b16c26ba4505c63e3c7254e6d3be084530d,2024-06-20T18:29:05.917000
|
||||
CVE-2024-30091,0,0,fb37a9e3923f2da0276541c00dae519fa07fe96fe4fc29d88a2b5512a726ce9a,2024-06-13T18:36:45.417000
|
||||
CVE-2024-30093,0,0,e00ebe23c08938fbee7b4bb0b7b0f9cebfca41e9970b18f769f35e789b17f52f,2024-06-13T18:36:45.417000
|
||||
CVE-2024-30093,0,1,fd6b58bfd5e83f94674e32c15b0dea388c489b7479e21a48502f960549116cdf,2024-06-20T18:28:55.697000
|
||||
CVE-2024-30094,0,0,66beadf29cd1ec0d0785fb70ec2a19bc0c2a5cd9d595fbeb0d5d251ca226f6ff,2024-06-13T18:36:45.417000
|
||||
CVE-2024-30095,0,0,cd7e4d192d304540e26b9fa8e7420439252e9a9d5d2f45744ff6c36447bde441,2024-06-13T18:36:45.417000
|
||||
CVE-2024-30096,0,0,714efdc0622f75f490795f4f7bf9bcb15940021c88c924fd5b9c8cf5732fa4db,2024-06-13T18:36:45.417000
|
||||
CVE-2024-30097,0,1,25944033c29661f17e1de2ec1abf0192df5977f8e4787bbd3e39721d628dd07c,2024-06-20T17:51:00.143000
|
||||
CVE-2024-30099,0,1,dc33acf12182e6454e1a3ecdc588bc9137c14d73f94ad2ded610bb6667a6bd3b,2024-06-20T17:48:07.827000
|
||||
CVE-2024-30095,0,1,048f96f3e5623a3029a75354689ecb95e74b9de2d640d31eb83d020ed961bdf6,2024-06-20T18:07:39
|
||||
CVE-2024-30096,0,1,b16928df459df0a0a9efa516a53e9d2dcbaed528ad71c923de834e957208e151,2024-06-20T18:07:54.607000
|
||||
CVE-2024-30097,0,0,25944033c29661f17e1de2ec1abf0192df5977f8e4787bbd3e39721d628dd07c,2024-06-20T17:51:00.143000
|
||||
CVE-2024-30099,0,0,dc33acf12182e6454e1a3ecdc588bc9137c14d73f94ad2ded610bb6667a6bd3b,2024-06-20T17:48:07.827000
|
||||
CVE-2024-3010,0,0,27666e8ead6e529570139216617bb06d1f8e2b7e342f568fb8736cb62dcd604b,2024-05-17T02:39:40.450000
|
||||
CVE-2024-30100,0,1,36cd7c5f393fb236e239b3f39b42c20bf7d831c3fa7a8ef645f75fac62acdc05,2024-06-20T17:31:07.867000
|
||||
CVE-2024-30101,0,1,0bec38d6d8ac185906d862c1965fa271c3a269e10cd1eca1349be7fa7804ea2e,2024-06-20T17:24:26.207000
|
||||
CVE-2024-30102,0,1,fdb60017518c4e4447c4f87ac5e20b8bd141f8c977ea7ed95409f58601a5e359,2024-06-20T17:24:52.287000
|
||||
CVE-2024-30103,0,1,e9b11315180cc2be70516f393013c4d68dd205d4a54691a3e15d1cbe00247ba4,2024-06-20T17:26:40.603000
|
||||
CVE-2024-30104,0,1,5a9d1985e988cec27229a284222c230de4fd29fc24d0330a38548721a0729d9d,2024-06-20T17:27:01.447000
|
||||
CVE-2024-30100,0,0,36cd7c5f393fb236e239b3f39b42c20bf7d831c3fa7a8ef645f75fac62acdc05,2024-06-20T17:31:07.867000
|
||||
CVE-2024-30101,0,0,0bec38d6d8ac185906d862c1965fa271c3a269e10cd1eca1349be7fa7804ea2e,2024-06-20T17:24:26.207000
|
||||
CVE-2024-30102,0,0,fdb60017518c4e4447c4f87ac5e20b8bd141f8c977ea7ed95409f58601a5e359,2024-06-20T17:24:52.287000
|
||||
CVE-2024-30103,0,0,e9b11315180cc2be70516f393013c4d68dd205d4a54691a3e15d1cbe00247ba4,2024-06-20T17:26:40.603000
|
||||
CVE-2024-30104,0,0,5a9d1985e988cec27229a284222c230de4fd29fc24d0330a38548721a0729d9d,2024-06-20T17:27:01.447000
|
||||
CVE-2024-30107,0,0,7e9f39013645f69ffc09f932047c5fded8481e31de256075b8ab56490f9048bd,2024-04-19T13:10:25.637000
|
||||
CVE-2024-3011,0,0,1567706f33ba4a3729190a5acfa17d903c76e23445fbf38d371926fb70a5af71,2024-05-17T02:39:40.533000
|
||||
CVE-2024-30119,0,0,faff61cb55bb1e1c818b9460a2a056f4c8970e03380dd9d518774564c9b27a5c,2024-06-17T12:42:04.623000
|
||||
@ -249675,7 +249675,7 @@ CVE-2024-31491,0,0,5f002356f8390a8ec883fdc05cbd199fbc913871302dee308e6ee0aa04c7a
|
||||
CVE-2024-31492,0,0,a251126d380ad734bdcae40155276c0c8cd0f78c057d6c232814179759c90bf9,2024-04-10T19:49:51.183000
|
||||
CVE-2024-31493,0,0,eb75479adef565517a6f58901095a4369c3b19ffe56c2adb7b05f607202960e9,2024-06-03T14:46:24.250000
|
||||
CVE-2024-31495,0,0,42fff448b4240874d456e917ec48e364b4b70752d9d1a1fb76f06c9d7e15c3ee,2024-06-13T18:36:45.417000
|
||||
CVE-2024-31497,0,0,4e1eafb2dcb4144981ef085a5b8158282c3a0977a083d73fc04d3f981acbd1e7,2024-05-10T14:33:55.323000
|
||||
CVE-2024-31497,0,1,c39b897f04ef688f063ebceae74c1e66c102d61b4026ee0939893e9ccb564409,2024-06-20T19:15:49.960000
|
||||
CVE-2024-31498,0,0,db3c4e2337e3fccc66e084ef6016d8532925f451bef4124b0c2782f0c54d90b6,2024-04-08T00:15:08
|
||||
CVE-2024-3150,0,0,04068d35bd188e4cc82c8fa2f28c620f46e70084f017d1c4b8736ac9a757cf54,2024-06-07T14:56:05.647000
|
||||
CVE-2024-31502,0,0,52fc3984aab146fd5296bbc2584fa31ec06529d852df83c020a3abdb54510354,2024-04-29T12:42:03.667000
|
||||
@ -250749,7 +250749,7 @@ CVE-2024-33309,0,0,0ca9c109e2576b4aca347e95c0818278979b0a538a6e9aff426b0e613a867
|
||||
CVE-2024-3333,0,0,8caee5b26018a8a7a4f06ec5d64d35dd731cf8d2f43a25885f4e67db044a1bff,2024-04-17T12:48:07.510000
|
||||
CVE-2024-33331,0,0,d376453cc8c649ab7a3cb33fa711c6bde798d37e4f57b1f2e9caeddda1eec751,2024-04-28T23:15:07.120000
|
||||
CVE-2024-33332,0,0,5b09c1082da77b8d3e91442a2c29c8546356fbe25aeb87e6d3bdb2141a4c33bc,2024-05-01T13:02:20.750000
|
||||
CVE-2024-33335,1,1,58ae2846fe2874c0adc2490bb8e35d7ccd89db3d503d1af1f83a73dd0dc3ef32,2024-06-20T17:15:50.820000
|
||||
CVE-2024-33335,0,0,58ae2846fe2874c0adc2490bb8e35d7ccd89db3d503d1af1f83a73dd0dc3ef32,2024-06-20T17:15:50.820000
|
||||
CVE-2024-33338,0,0,9b8c84dbfacc6e8a05751db225811f66c7a44395ffe03492a33884b37ad228c7,2024-04-30T13:11:16.690000
|
||||
CVE-2024-33339,0,0,1af2e0249bed8750531b95be13d2086bbc874a9cb43e2918f6202dbfdd9b1a67,2024-04-29T05:15:06.340000
|
||||
CVE-2024-33342,0,0,0c57431ffa337ca72451a692e966ba73858cd4216e3ebbd13920eb933bab73c3,2024-04-26T19:59:19.793000
|
||||
@ -251796,17 +251796,17 @@ CVE-2024-3524,0,0,3956193ca7114f5710505c19e3a759f29fdc99e35e3e85d2dfaab62815660b
|
||||
CVE-2024-35240,0,0,acfeed6c530b591057353f6a14e986e7e3beca50f19145cd1d7655529729bf12,2024-05-29T13:02:09.280000
|
||||
CVE-2024-35241,0,0,4a6b31c14cd4bc5f7501900c1f56590acd344b1e5ce5ecc61874cf3d14d82318,2024-06-20T09:15:11.993000
|
||||
CVE-2024-35242,0,0,2e207f0b714427aca575cae65f49ba50d1e8e36b82c7f71cef6b3cbfa7cbc65d,2024-06-20T09:15:12.140000
|
||||
CVE-2024-35248,0,1,f7c53bc850d23eb0500967bc3fdae9c98dc6938d20a4c4a2eae9a2af005467eb,2024-06-20T16:38:22.977000
|
||||
CVE-2024-35249,0,1,1a1dd41a82635c8ddd298674d6ef7ab50751606bf1ad25c08d730ac7cfcbceba,2024-06-20T16:39:19.630000
|
||||
CVE-2024-35248,0,0,f7c53bc850d23eb0500967bc3fdae9c98dc6938d20a4c4a2eae9a2af005467eb,2024-06-20T16:38:22.977000
|
||||
CVE-2024-35249,0,0,1a1dd41a82635c8ddd298674d6ef7ab50751606bf1ad25c08d730ac7cfcbceba,2024-06-20T16:39:19.630000
|
||||
CVE-2024-3525,0,0,d160b9aacf64da3afa7deea3824b335adab6f10a287b9b570340cfda8c91ffed,2024-05-17T02:39:58.983000
|
||||
CVE-2024-35250,0,1,9613cc662bcd468958ab1d264340ab5970d57c7d51a0a393df6626093fc74ea8,2024-06-20T17:10:13.720000
|
||||
CVE-2024-35252,0,1,758f2260a560b6c02096318d9e5edde43e70f9b910f09bc0f0910e28a06fa731,2024-06-20T17:12:13.843000
|
||||
CVE-2024-35253,0,1,7f3cc01c59f69efba5c97cba42113678e0d740b7944571f1b3655b792d644968,2024-06-20T17:13:17.437000
|
||||
CVE-2024-35254,0,1,0c738596f4374792f0d4315cc158b4782661a82b949045579afd98f6532c04a8,2024-06-20T16:16:47.070000
|
||||
CVE-2024-35255,0,1,9bff5ed53913f2846bd2f5d5a3fe64503b901621ba9a1cf70d44fee71319dada,2024-06-20T16:31:46.127000
|
||||
CVE-2024-35250,0,0,9613cc662bcd468958ab1d264340ab5970d57c7d51a0a393df6626093fc74ea8,2024-06-20T17:10:13.720000
|
||||
CVE-2024-35252,0,0,758f2260a560b6c02096318d9e5edde43e70f9b910f09bc0f0910e28a06fa731,2024-06-20T17:12:13.843000
|
||||
CVE-2024-35253,0,0,7f3cc01c59f69efba5c97cba42113678e0d740b7944571f1b3655b792d644968,2024-06-20T17:13:17.437000
|
||||
CVE-2024-35254,0,0,0c738596f4374792f0d4315cc158b4782661a82b949045579afd98f6532c04a8,2024-06-20T16:16:47.070000
|
||||
CVE-2024-35255,0,0,9bff5ed53913f2846bd2f5d5a3fe64503b901621ba9a1cf70d44fee71319dada,2024-06-20T16:31:46.127000
|
||||
CVE-2024-3526,0,0,7aa053534daa29503e740ad77b77cb47be1c8cd5e2a6b1d98f33dcb689c14e4e,2024-05-17T02:39:59.067000
|
||||
CVE-2024-35263,0,1,1694ba7e5ce9d31723d43812241a6c815afc20ae5a287a58c23b0184e83d765c,2024-06-20T16:32:31.287000
|
||||
CVE-2024-35265,0,1,2963d76a456cba4a49f25860d2cc93fc7331d28365d372cc188b58c478b68d21,2024-06-20T16:33:28.080000
|
||||
CVE-2024-35263,0,0,1694ba7e5ce9d31723d43812241a6c815afc20ae5a287a58c23b0184e83d765c,2024-06-20T16:32:31.287000
|
||||
CVE-2024-35265,0,0,2963d76a456cba4a49f25860d2cc93fc7331d28365d372cc188b58c478b68d21,2024-06-20T16:33:28.080000
|
||||
CVE-2024-3528,0,0,12c1cd3d931c23013d321f77d84374875132cb3a519f997e82936b57d5eb40c0,2024-05-17T02:39:59.157000
|
||||
CVE-2024-35283,0,0,80c087b52accf20db1ec4ad086b8699369207093a56ca1d349d7c5f6028bda2d,2024-05-29T19:50:25.303000
|
||||
CVE-2024-35284,0,0,ee24a2e7de9810383b7ae424a9dbbfe06080409833dff0969376cd49b76d4dd0,2024-05-29T19:50:25.303000
|
||||
@ -252500,7 +252500,7 @@ CVE-2024-36221,0,0,2c46cdd47e910a4fc18e0dd65366030bdc1eb4d14ec50fb4c46fb03d63f12
|
||||
CVE-2024-36222,0,0,a8ee0e561dcb5bfbba224cb0539031d96c298ae7a136bc37d3ec9a0970e67bf5,2024-06-17T19:45:39.257000
|
||||
CVE-2024-36224,0,0,5c74dec5f032580ca9e70dab38c4d47b808d869c78d9a9688f6eb49fd80615a0,2024-06-17T19:45:13.547000
|
||||
CVE-2024-36225,0,0,fd495a92f56159f6c10cf6177a32831d7edff99b61db5bcc3c4fb3be2c44c3a1,2024-06-17T19:37:58.810000
|
||||
CVE-2024-36226,0,1,319a9843d092e3dc1191a515bf406060f528082f8d0bf97942cd2caf088d3b95,2024-06-20T16:02:34.930000
|
||||
CVE-2024-36226,0,0,319a9843d092e3dc1191a515bf406060f528082f8d0bf97942cd2caf088d3b95,2024-06-20T16:02:34.930000
|
||||
CVE-2024-36227,0,0,0727e710473b979985d78ae6dfdcf5bbfe49764851873d8fa20d40ec22a1b513,2024-06-17T20:12:46.843000
|
||||
CVE-2024-36228,0,0,65510ba3cdacba606cb5a9fef50b70f0ee46d90d949d966d3d92c163b9b3873c,2024-06-17T20:12:35.727000
|
||||
CVE-2024-36229,0,0,a39557b42f1caf4ea230e4d2a203d0da66fd7040dc63c4022fbe68826330238b,2024-06-17T20:12:20.760000
|
||||
@ -252915,7 +252915,7 @@ CVE-2024-3719,0,0,d2320674d04cefde56a0b36b463f74328d6f18494803030bdfe9b0b1b4374a
|
||||
CVE-2024-3720,0,0,f4e69514093cc630aeda39d0a41fe705e0d9916a1077cef429b7dcf05a404308,2024-06-04T19:20:23.660000
|
||||
CVE-2024-3721,0,0,ec8dc4b0ad5d1d9ba11acb18015142f7d1715fd653f7ca2987e266e9c9e8ef01,2024-05-17T02:40:05.290000
|
||||
CVE-2024-3722,0,0,7c1b4fae7e86bf4c1bc76a0d39819ffc592a7b598c7675ac0628daa278671c4c,2024-05-14T16:11:39.510000
|
||||
CVE-2024-37222,0,1,e3854190ae5f204130ec2bf60ebf4545f7f4ab46bc8f721b8932179fa98e8ec4,2024-06-20T16:07:50.417000
|
||||
CVE-2024-37222,0,0,e3854190ae5f204130ec2bf60ebf4545f7f4ab46bc8f721b8932179fa98e8ec4,2024-06-20T16:07:50.417000
|
||||
CVE-2024-3723,0,0,21c397ab5e875f2652ba15d9001cdd8ef5c5941ff996881e18084aebeaee892e,2024-06-11T13:54:12.057000
|
||||
CVE-2024-3724,0,0,a2f08bb0a2e36a5c374b862fb3e4beff315b3d6672953c5eeabe10290b435e2c,2024-05-02T18:00:37.360000
|
||||
CVE-2024-3725,0,0,dd194c190207038aca40dcc17eaac7bd7c6f9f34e04d00c016e0de6cd9837da0,2024-05-02T18:00:37.360000
|
||||
@ -252952,13 +252952,17 @@ CVE-2024-3732,0,0,47b10b9e83ea0bac70990c3295c25b56cc73657af82bc6f5c1f4fd37930f5e
|
||||
CVE-2024-37325,0,0,4bdf16d6dc352d9a71b64c0e4ef24afec0a8a1802309c44aecb9b675414655d5,2024-06-13T18:36:09.013000
|
||||
CVE-2024-3733,0,0,a4296992076c9e80c22dc80bc25acdd9a6af961376871659e0386f3449f48613,2024-04-25T13:18:13.537000
|
||||
CVE-2024-3734,0,0,b86ed30811a3326be0f0dac4d727bf041d17d1a4d696b5825133800b3e1e6da3,2024-05-02T18:00:37.360000
|
||||
CVE-2024-37343,1,1,b307ad5b34e53e444d552876c1852802ea3c78a8d0c588f184aa1acde616f148,2024-06-20T17:15:50.910000
|
||||
CVE-2024-37344,1,1,efed33a33f8007937a8bcd201239f66784f62520cc66858380a11d4e88c3e9a0,2024-06-20T17:15:51.153000
|
||||
CVE-2024-37345,1,1,38aff5b498d434a10dae67158b1c5ff6d04a0f462ab71dc8f42f63dfc74a8365,2024-06-20T17:15:51.397000
|
||||
CVE-2024-37346,1,1,fcd6b63a7ef26227baad04b31c0860e8d816805251ec8b9ab287d7b0e0738222,2024-06-20T17:15:51.623000
|
||||
CVE-2024-37347,1,1,18c3a5f4064b6e5eb61b8dc4e72a4af3c4ee8b4903742a933262f840fffa3ee8,2024-06-20T17:15:51.853000
|
||||
CVE-2024-37348,1,1,b9285d499a868c307de4618d31f093339fcc6bc9dd3d1b0204527317cb1f4b4d,2024-06-20T17:15:52.080000
|
||||
CVE-2024-37343,0,0,b307ad5b34e53e444d552876c1852802ea3c78a8d0c588f184aa1acde616f148,2024-06-20T17:15:50.910000
|
||||
CVE-2024-37344,0,0,efed33a33f8007937a8bcd201239f66784f62520cc66858380a11d4e88c3e9a0,2024-06-20T17:15:51.153000
|
||||
CVE-2024-37345,0,0,38aff5b498d434a10dae67158b1c5ff6d04a0f462ab71dc8f42f63dfc74a8365,2024-06-20T17:15:51.397000
|
||||
CVE-2024-37346,0,0,fcd6b63a7ef26227baad04b31c0860e8d816805251ec8b9ab287d7b0e0738222,2024-06-20T17:15:51.623000
|
||||
CVE-2024-37347,0,0,18c3a5f4064b6e5eb61b8dc4e72a4af3c4ee8b4903742a933262f840fffa3ee8,2024-06-20T17:15:51.853000
|
||||
CVE-2024-37348,0,0,b9285d499a868c307de4618d31f093339fcc6bc9dd3d1b0204527317cb1f4b4d,2024-06-20T17:15:52.080000
|
||||
CVE-2024-37349,1,1,e96bf6f7b240c65dedda0bdf5387b1908dd5094c3aae19051bc041df07ea392f,2024-06-20T18:15:11.850000
|
||||
CVE-2024-3735,0,0,5ddf2e7f4a48d9adc915c53e5374d23792eebb62d6ec39c5c6eab645f0c5ac5e,2024-05-17T02:40:05.693000
|
||||
CVE-2024-37350,1,1,e77108b3959438be6ac3a3fdd5c1ff6cf30bfc778ae6d3029adb673cb69e4989,2024-06-20T18:15:12.103000
|
||||
CVE-2024-37351,1,1,dd12bdf4f42fc309abd00492884bd5f1292ed0501d3e5990fda1c0b8c4412efd,2024-06-20T18:15:12.347000
|
||||
CVE-2024-37352,1,1,a247ec4e04c16dc21d18896eebf02a233f7c6c2e883c5692f35053293234d6c9,2024-06-20T18:15:12.590000
|
||||
CVE-2024-3736,0,0,8212a13db4363d6279d1d8c19924659c1f0cf224cf46584ea7e82cad3d6da340,2024-06-04T19:20:23.987000
|
||||
CVE-2024-37364,0,0,070f30cc4e6616b0f0ef3a023c4cee97eb2b6bdbb7bd742359fc5c6826335718,2024-06-07T14:56:05.647000
|
||||
CVE-2024-37367,0,0,aac603db5bb919680e2cd819ce6cb6ca25ea592fb28f92a3759e9a2fd18ea95d,2024-06-17T12:42:04.623000
|
||||
@ -252987,7 +252991,7 @@ CVE-2024-3748,0,0,b0e27aec04ee07a8ce410bb6d8c3b0277cb63dc4584c172af60f83cc3e59cf
|
||||
CVE-2024-3749,0,0,e5012183af13abb8287d9f7e2369a778a614f06e1c5ed11cd73c4e040e4a12f2,2024-05-15T16:40:19.330000
|
||||
CVE-2024-3750,0,0,803f7e301e80982b4e00371ccc1f410724a29d03fdd424fb4c54aeb0b034ff94,2024-05-16T13:03:05.353000
|
||||
CVE-2024-3752,0,0,06a3522f543993aef42f352f0c011207c560c2e5a1d63c9d8ccc34a87adab0ce,2024-05-06T12:44:56.377000
|
||||
CVE-2024-37532,0,1,a5ac3835be74cd12988df6c2a541d22b1ccfee745808b8a54c22b593fc4b3bed,2024-06-20T16:07:50.417000
|
||||
CVE-2024-37532,0,0,a5ac3835be74cd12988df6c2a541d22b1ccfee745808b8a54c22b593fc4b3bed,2024-06-20T16:07:50.417000
|
||||
CVE-2024-37535,0,0,07f7d930de9d2427116ed26f9657c7962aa8122c29cd0ba965c2b1ee75b9b36e,2024-06-10T17:16:32.753000
|
||||
CVE-2024-3754,0,0,01f193c84b52f462bda07bbe4a51fb49e63cd8bf2361f6b49c817e3a59b81e5a,2024-06-17T12:42:04.623000
|
||||
CVE-2024-3755,0,0,255cc63bdc34aca663119fb8f6757a7da5a9acef7ecda034d88dc05babf4b05b,2024-05-06T12:44:56.377000
|
||||
@ -253007,7 +253011,7 @@ CVE-2024-37622,0,0,c5ce5e55072739c990e174478f39d68c083974ab6129554da5a4e33caf326
|
||||
CVE-2024-37623,0,0,d8395bc9979b8438bd8a5fcda64469a56ed1c7b2c754f62d69464aad225f7a8d,2024-06-20T12:44:22.977000
|
||||
CVE-2024-37624,0,0,c67dc5f200fd7bd4558aaa3dba0b70e30788e7a5243808acd6e7683dc3c78ae7,2024-06-20T12:44:22.977000
|
||||
CVE-2024-37625,0,0,a02e4bb7abe01fe5f5451064a7b8497a50e5fc7fa5bd1988eae82c585b3c68a7,2024-06-20T12:44:22.977000
|
||||
CVE-2024-37626,1,1,8cddba759506552c7a4687a12e9dd5b7e6c609c6ccd3a239c2734e2db82c4f8e,2024-06-20T17:15:52.353000
|
||||
CVE-2024-37626,0,0,8cddba759506552c7a4687a12e9dd5b7e6c609c6ccd3a239c2734e2db82c4f8e,2024-06-20T17:15:52.353000
|
||||
CVE-2024-37629,0,0,1d00756a2a17c559759065d32584e34ded12669fdde5bf74562dbb03b1828152,2024-06-13T18:36:09.010000
|
||||
CVE-2024-3763,0,0,d4a43b988d4f5ccf2146c95730aa308ab303229339c58dc3a72b2fdabbe91a36,2024-06-05T20:15:13.530000
|
||||
CVE-2024-37630,0,0,bf66b2030be40d35050885498117395fd763796c76fee3b35b96849113224fa0,2024-06-13T18:35:19.777000
|
||||
@ -253026,16 +253030,18 @@ CVE-2024-37643,0,0,dd4dd1cf62f3e08f00b2f338cadf964b79fd48d825ed68a41a2bd5d2e825e
|
||||
CVE-2024-37644,0,0,5f7f97e28e218e3fb348230aa8347ee3b0354d72853f4d6c2591e151f0231333,2024-06-17T12:42:04.623000
|
||||
CVE-2024-37645,0,0,1f2d6a8f87fac13d3d11d6cbec3b695ad44ed6f32f14768d5b077122546347a3,2024-06-17T12:42:04.623000
|
||||
CVE-2024-3765,0,0,4fdba2eb80818b350bc57cc64ca06a70a8e5d2cec5cc9e99a6b5fff1df632742,2024-05-17T02:40:06.923000
|
||||
CVE-2024-3766,0,1,332312c4ae938e5b9f3b0590f4ebc42c71b180341fc998112e3b0be5e6d60da1,2024-06-20T16:15:14.380000
|
||||
CVE-2024-3766,0,0,332312c4ae938e5b9f3b0590f4ebc42c71b180341fc998112e3b0be5e6d60da1,2024-06-20T16:15:14.380000
|
||||
CVE-2024-37661,0,0,81e23698cd648834aff1e39e66ffecdc62f564b919dc4643e362915df5fa1b2a,2024-06-20T12:44:22.977000
|
||||
CVE-2024-37662,0,0,2581d16ac0c1e64ed9489a4956fd58fc745c5ab4cf8c43694c38d8d5ee60569c,2024-06-20T12:44:22.977000
|
||||
CVE-2024-37663,0,0,461ef2b627ebaf037724a15235d82a1820114435949dedc6f8dbf4f5fc8f77a4,2024-06-20T12:44:22.977000
|
||||
CVE-2024-37664,0,0,d12e16fb3db0b4b5d59f6bea6df277ad2fce6c983f4f02a9c54b534ba9c1963c,2024-06-20T12:44:22.977000
|
||||
CVE-2024-37665,0,0,65120387c81349907f7a4a053373f743b497b218da3e8528d2288dae639dbb17,2024-06-13T18:36:09.010000
|
||||
CVE-2024-3767,0,0,8ba3fcd8961d67ee2d120eabc736772a73aa38bca02250a44c8bb4877d64b7d4,2024-06-05T20:15:13.643000
|
||||
CVE-2024-37676,1,1,5f14878ec51739144d790dc3ec11a7d25457c3021c3eb2b333dc82f418450ff4,2024-06-20T16:15:13.917000
|
||||
CVE-2024-37674,1,1,590937f8dc578c8c680333bd613f67e674944bfe412420c95f17ddc377841de1,2024-06-20T18:15:12.833000
|
||||
CVE-2024-37676,0,0,5f14878ec51739144d790dc3ec11a7d25457c3021c3eb2b333dc82f418450ff4,2024-06-20T16:15:13.917000
|
||||
CVE-2024-3768,0,0,778d3eea8bf87c1f80239f04628ed71cfd577dabb0ce88459344c4cd4d61bb16,2024-05-17T02:40:07.203000
|
||||
CVE-2024-3769,0,0,a35a1a6580261497cd040b87c6b68395a49a236a06454712c9a126123641e120,2024-05-17T02:40:07.297000
|
||||
CVE-2024-37699,1,1,21a99b1deadf1d50b3e3e97ea6b90cefefbc3256be6b30b11bd623fa65d58cc5,2024-06-20T18:15:12.920000
|
||||
CVE-2024-3770,0,0,8954a3ad0db5fc9b48d9243a1de01e444d03084d0f8b5d5da9ebc562e8f0e6a6,2024-05-17T02:40:07.387000
|
||||
CVE-2024-3771,0,0,1bf22922ed0657906343b6368a2362d22a78a1ff9d5272db064e582b3b0855d4,2024-05-17T02:40:07.477000
|
||||
CVE-2024-3772,0,0,184d29c2faf230c27e7c42ad45c478e7862cbffdde795ec4220824e36861b510,2024-04-26T02:15:06.983000
|
||||
@ -253054,6 +253060,7 @@ CVE-2024-37800,0,0,36eed506d2f5ce9d6b2834586124ecf9a503dd8108d250049c63e00ddb716
|
||||
CVE-2024-37802,0,0,81dd912a99a788ace360667b22054f8192c4e36f358a19747d18c874d2ebd289,2024-06-20T12:44:01.637000
|
||||
CVE-2024-37803,0,0,4f3db0375a36967be1dadee84c3c9799655c3891ffc2301c21194d9aedc22218,2024-06-20T12:44:01.637000
|
||||
CVE-2024-3781,0,0,bf710215509c2fb5fefd67fb85930537c2ce3a67160738297841ece3c75d6fc6,2024-04-15T19:12:25.887000
|
||||
CVE-2024-37818,1,1,dd478c68b7907d157c592898fc93858e1510e4d7ae904127f7f08bb190772ee6,2024-06-20T19:15:50.260000
|
||||
CVE-2024-3782,0,0,c95ea596dccb3636dd3691321b5a7a48aa3ee2b08cd07f6f17f6b9ebb6c70325,2024-04-15T19:12:25.887000
|
||||
CVE-2024-37821,0,0,69c8b0f219772ac85c00d152695d2a6db130f2920e14ec06f202587157691baf,2024-06-20T12:44:01.637000
|
||||
CVE-2024-37828,0,0,1aec682223533f9f2174345c4486cdc5644002780b6ea2a3830079cc11688c3e,2024-06-20T12:44:22.977000
|
||||
@ -253085,6 +253092,7 @@ CVE-2024-37891,0,0,7f699fe1f8c4a3ec8703a81c424d14c0900900ca3b4179e40a6b3b715e3f3
|
||||
CVE-2024-37893,0,0,41d25d093dc6fff20a6eda85ded9c0383f2159fafb609c8080b75906fa502b74,2024-06-20T12:44:22.977000
|
||||
CVE-2024-37895,0,0,5a205f11ced3309e1f825afc55d41c5d514e9d7238b82fe13249e658f1877f11,2024-06-20T12:44:22.977000
|
||||
CVE-2024-37896,0,0,85ccee04f37e2b1a04ceeddd19a029b9400fb1a43ccfa07a1fe5a65adbb32b4e,2024-06-20T12:44:22.977000
|
||||
CVE-2024-37897,1,1,e6ae1c8e34d7f51863033715f42f9cb7cd177e4b9a1bb2319f5f32d401b82d61,2024-06-20T18:15:13.023000
|
||||
CVE-2024-3790,0,0,ea62135e66a6e7a74daddc8d443b8b9750f000d596c0e5f30e202f53e21ec40b,2024-05-14T16:11:39.510000
|
||||
CVE-2024-37902,0,0,64cca10e7e3ace20e9d59c9293b434dbb2c9acda55554e640303530aeeaef0aa,2024-06-20T12:44:22.977000
|
||||
CVE-2024-37904,0,0,7359ae18b288eca288056e2ff119b59a0b9c9bbf3f0e5a23aea1f27fd550dd3f,2024-06-20T12:44:01.637000
|
||||
@ -253439,7 +253447,7 @@ CVE-2024-4069,0,0,f8d2f2628e60be749b9734b09218105a0396eae1a8a4c94b50114640615c82
|
||||
CVE-2024-4070,0,0,611b2353a344eebf4d3d821b72a7661978c51598fabebbafad7cb3b8eb92ba73,2024-06-04T19:20:29.567000
|
||||
CVE-2024-4071,0,0,1e5173381da62898dd2d89e779aa47e534c3be7a31fd5b5ef289e0ef19550704,2024-05-17T02:40:14.747000
|
||||
CVE-2024-4072,0,0,784007d6b97ec8386adb736eb517146413a15dc1e1dcfd437022813999836276,2024-05-17T02:40:14.847000
|
||||
CVE-2024-4073,0,1,5460f6bdc865d431bd727de7949389de11def3a1309fd53b91c80f09825c0c03,2024-06-20T16:15:14.530000
|
||||
CVE-2024-4073,0,0,5460f6bdc865d431bd727de7949389de11def3a1309fd53b91c80f09825c0c03,2024-06-20T16:15:14.530000
|
||||
CVE-2024-4074,0,0,0eb3d84ea134f52e33abc34cb068e49511715452b56aeac28482d1d153123edb,2024-05-17T02:40:15.077000
|
||||
CVE-2024-4075,0,0,61cfb92eb2dc2fb6e0ff8370e47bd10bfd7f8ca1c4517b0742f92f6865b710f5,2024-05-17T02:40:15.170000
|
||||
CVE-2024-4077,0,0,88c9fb35aec8dbee15c3169eb34c083d7cc8d7a290cdea9208a3041187ada836,2024-04-25T13:18:02.660000
|
||||
@ -254246,7 +254254,7 @@ CVE-2024-5152,0,0,897a950e1a56cf66b3762a0b7d02348f108b131c1556072d1a2c46cab20012
|
||||
CVE-2024-5153,0,0,828bf0d922f71aaeb9a620d2a28fca02e54e4a39590cf3792a194a4a5970d881,2024-06-06T14:17:35.017000
|
||||
CVE-2024-5154,0,0,82d1e95029eac2df4860f47fd1c212761a30dff3def51a0032e4827082a89098,2024-06-18T10:15:10.640000
|
||||
CVE-2024-5155,0,0,2a20a869c58a8b80fd2bd862f76df12b43c40fbeec518ecb9ca464561a78cd98,2024-06-17T12:42:04.623000
|
||||
CVE-2024-5156,0,1,10b6cd4a2fc89623c9fe2066200310b80c5b328e573b3bfef24549039f38ac0c,2024-06-20T16:07:50.417000
|
||||
CVE-2024-5156,0,0,10b6cd4a2fc89623c9fe2066200310b80c5b328e573b3bfef24549039f38ac0c,2024-06-20T16:07:50.417000
|
||||
CVE-2024-5157,0,0,968c06835e3febdba747d4dd49e60507daf1a01e5377b117ee6e566931506abf,2024-06-10T18:15:37.893000
|
||||
CVE-2024-5158,0,0,76369e6e46f6c34bbc5a354a762f99c1a790d22381b6a166821eb73e4f6cf9b3,2024-06-10T18:15:37.953000
|
||||
CVE-2024-5159,0,0,21e48f9c116346beacd1ff1b36dcd3eeb5d22159bc679bcf4bc325526369218a,2024-06-10T18:15:38.010000
|
||||
@ -254615,8 +254623,8 @@ CVE-2024-5812,0,0,b231b6b4b2edc3b100956cc90803ec880aa99de51e5a0f50bc4b9e381c5722
|
||||
CVE-2024-5813,0,0,d695683c807a1777a11ef158e495934f31ab7056ebdb25d58f5f11112f2d1965,2024-06-13T18:36:45.417000
|
||||
CVE-2024-5825,0,0,800930249192b4fb36871d2a50a6622621c6dfa5eae6376e2c2995741b4630b2,2024-06-11T10:15:13.960000
|
||||
CVE-2024-5829,0,0,ece2333b3f7675cb0340d51c6d538163a9e25ac5d3d71e718ed0157d499370ee,2024-06-11T14:15:13.150000
|
||||
CVE-2024-5830,0,1,5f4bf808197d5a7b772747b643a0383fdea3711f7dd7ea33605632692edfb8a3,2024-06-20T16:06:51.777000
|
||||
CVE-2024-5831,0,1,c35637e034efcc83b783b4655f443c13f97dc7117fc74da74daea6635b01f1bf,2024-06-20T16:07:02.127000
|
||||
CVE-2024-5830,0,0,5f4bf808197d5a7b772747b643a0383fdea3711f7dd7ea33605632692edfb8a3,2024-06-20T16:06:51.777000
|
||||
CVE-2024-5831,0,0,c35637e034efcc83b783b4655f443c13f97dc7117fc74da74daea6635b01f1bf,2024-06-20T16:07:02.127000
|
||||
CVE-2024-5832,0,0,f6f7614a6d74b1d3bbc420f9681758a802e78db48e4c0857fdd0315a9c96e2df,2024-06-20T15:09:08.407000
|
||||
CVE-2024-5833,0,0,5b40c0a16c7d2ef5b3ac59bff5edeb1c79ffbdbe857cc12dfe0a4e6ae3c21dc4,2024-06-20T15:09:20.810000
|
||||
CVE-2024-5834,0,0,25c6dd26bcb2ab9bba361f180488ba9093d88a3197cd87967df7b7dddbf91a3b,2024-06-20T15:07:28.820000
|
||||
@ -254709,7 +254717,7 @@ CVE-2024-6065,0,0,8dd99f4d37f301246412681f45228fac07d3ea15c1391b550b52738ce1d9d0
|
||||
CVE-2024-6066,0,0,bdecbe263c05a4772a78f07626fc1e3f9d1817cac413c3ff735f168ece871a97,2024-06-20T12:44:01.637000
|
||||
CVE-2024-6067,0,0,6728784af54ae6b64b1bb52b7887afb1ba68c7ac0e5f2ef2339910430d39d127,2024-06-20T12:44:01.637000
|
||||
CVE-2024-6080,0,0,adb3e70f170e91cc2a703b54ba2915021bd3bf11cdec3f426a1169556de7cdf0,2024-06-20T12:44:01.637000
|
||||
CVE-2024-6082,0,0,1d236589845be46c55129b507b1dd3b80bd97a229aa963846065aaa4c28f158d,2024-06-20T12:44:01.637000
|
||||
CVE-2024-6082,0,1,fb01e1189e5a394e265b664904a3543325f650fe09e01ea1f771a4558bb8508b,2024-06-20T19:15:50.437000
|
||||
CVE-2024-6083,0,0,7e7a5636ed7255d0fcfcd2ad673b2a41cb1a824617e25b4cc387230a5aebb333,2024-06-20T12:44:01.637000
|
||||
CVE-2024-6084,0,0,7af730199a10f594b6ce1f1e9ecc3a7779c7858f9e2bf364f776ef80922995a6,2024-06-20T12:44:01.637000
|
||||
CVE-2024-6100,0,0,a135aa8fa888be5c77b5c9488d452903ca9c300de047fac5a738e14f389e97d1,2024-06-20T15:18:01.470000
|
||||
@ -254734,24 +254742,24 @@ CVE-2024-6143,0,0,8ecb1606cf08b70c452136729986c382308670f8f5aa74c9caba844228d971
|
||||
CVE-2024-6144,0,0,282f248ec161eadd8599a33b6d11a75bd4ed1ccd1aa15e9b959a4a72d41d30ce,2024-06-20T12:44:01.637000
|
||||
CVE-2024-6145,0,0,74f99a0157ef2eb5160bc64159bab3cd3614efb0f0cae9420b13288ce6d516ff,2024-06-20T12:44:01.637000
|
||||
CVE-2024-6146,0,0,835232b778d7e80b1c73cad2f19f1275692bff270d5e664fd4c7fc64973110ef,2024-06-20T12:44:01.637000
|
||||
CVE-2024-6162,0,1,f8253a5ab864fdd368c99fd2623344b80f67593d3636e1d988c09de988f4984c,2024-06-20T16:07:50.417000
|
||||
CVE-2024-6162,0,0,f8253a5ab864fdd368c99fd2623344b80f67593d3636e1d988c09de988f4984c,2024-06-20T16:07:50.417000
|
||||
CVE-2024-6176,0,0,855875508d6019a3b7cc5455db83c0ed155c5813092b253896702a30576b2ecb,2024-06-20T12:43:25.663000
|
||||
CVE-2024-6177,0,0,a0175799dd5324c2ac4fd3e8bb126589ce94cff0760703c070fdf39975a6cb07,2024-06-20T15:17:06.493000
|
||||
CVE-2024-6178,0,0,00ba2b35f2bf326cfb9273c7e4ce551fc75b5ea6ed8191a2797d46901c2c36b7,2024-06-20T15:16:58.507000
|
||||
CVE-2024-6179,0,0,e8ab8321b5bc66435edd1d020000d62a9dfc389aa4976b99e9d8c89f0a352015,2024-06-20T15:16:47.133000
|
||||
CVE-2024-6181,0,0,0da974dd3023ed556a9ed161f83e3c1684d21611899e57e27a1b7870d01089d3,2024-06-20T14:15:11.837000
|
||||
CVE-2024-6182,0,1,55f26575758ff8ae57363c186f0de2f9404668e8c393b1bfe0761bb40f1950ac,2024-06-20T16:15:14.807000
|
||||
CVE-2024-6183,0,1,e97bba1e0824305876e4e9b2d4b538d4d68a3fe9088c52f1a208b0b80681da31,2024-06-20T16:15:14.903000
|
||||
CVE-2024-6182,0,0,55f26575758ff8ae57363c186f0de2f9404668e8c393b1bfe0761bb40f1950ac,2024-06-20T16:15:14.807000
|
||||
CVE-2024-6183,0,0,e97bba1e0824305876e4e9b2d4b538d4d68a3fe9088c52f1a208b0b80681da31,2024-06-20T16:15:14.903000
|
||||
CVE-2024-6184,0,0,1b6140592460770db25ed40598b0fdd49cbe87bc7bdeb18f2d5b5a4a924539ba,2024-06-20T14:15:11.953000
|
||||
CVE-2024-6185,0,0,1dc0b9263b85bb33ca9310e6b4c081d0f0e1e123ba9f93581c17c7bd1d1c72e2,2024-06-20T12:43:25.663000
|
||||
CVE-2024-6186,0,1,3dac30a7cdc544a2490dcbbc6d37aaada7b4b015a652be43196a5ba4893d22f0,2024-06-20T16:07:50.417000
|
||||
CVE-2024-6187,0,1,955ad4d5d4c708764babb55ab3f5b4b80280257ca9576e0c2e2c31f96fc1762a,2024-06-20T16:07:50.417000
|
||||
CVE-2024-6188,0,1,c44a65f859c0ca942b8145efa29b96b03c9966a4e0603a5557add090652ddd8e,2024-06-20T16:15:15.003000
|
||||
CVE-2024-6189,0,1,9bdf8ff8889c2c479b8223f49300048123af83d854975208bf8a89581f438494,2024-06-20T16:07:50.417000
|
||||
CVE-2024-6190,0,1,98f90bb016bf16a99aac893601d28675398bcae3e6f50635a05d9d824f92a990,2024-06-20T16:07:50.417000
|
||||
CVE-2024-6191,0,1,ffe5fba5ce973c97fc731563285b4e878415b4feed7678ba315acdcd925defa0,2024-06-20T16:07:50.417000
|
||||
CVE-2024-6192,0,1,1aeeababd594a0c0d5dd72dc64fe73201f913d0d34d8e0c49ca22c4ddb951d30,2024-06-20T16:07:50.417000
|
||||
CVE-2024-6193,1,1,f93bc858786493f731d76dbd605a4a98441b0bccd34706f81165487a2090291d,2024-06-20T16:15:15.110000
|
||||
CVE-2024-6194,1,1,af569fd39235f04aafa2db90bc19151f8ff27beee9d18fcd6d54b63d95390395,2024-06-20T16:15:15.393000
|
||||
CVE-2024-6195,1,1,d5c01b01fd38d8982369170a21c862bc57e358df573913b87fdad7130218214b,2024-06-20T16:15:15.680000
|
||||
CVE-2024-6196,1,1,feb3a9ca99fc92865b5eafb3c719dfb44b6369656c30eb62f5bf1cd1c3ac2817,2024-06-20T16:15:15.967000
|
||||
CVE-2024-6186,0,0,3dac30a7cdc544a2490dcbbc6d37aaada7b4b015a652be43196a5ba4893d22f0,2024-06-20T16:07:50.417000
|
||||
CVE-2024-6187,0,1,c6d6f0601c7a6184ad1b4d3e413c26bdab6fae0e4608a0ccda80898a203af1ba,2024-06-20T19:15:50.553000
|
||||
CVE-2024-6188,0,0,c44a65f859c0ca942b8145efa29b96b03c9966a4e0603a5557add090652ddd8e,2024-06-20T16:15:15.003000
|
||||
CVE-2024-6189,0,0,9bdf8ff8889c2c479b8223f49300048123af83d854975208bf8a89581f438494,2024-06-20T16:07:50.417000
|
||||
CVE-2024-6190,0,0,98f90bb016bf16a99aac893601d28675398bcae3e6f50635a05d9d824f92a990,2024-06-20T16:07:50.417000
|
||||
CVE-2024-6191,0,0,ffe5fba5ce973c97fc731563285b4e878415b4feed7678ba315acdcd925defa0,2024-06-20T16:07:50.417000
|
||||
CVE-2024-6192,0,1,28332507ece6baa0667f638af15d4c4cdb774188d32b84f5c47ffa2d494a27ad,2024-06-20T18:15:13.337000
|
||||
CVE-2024-6193,0,0,f93bc858786493f731d76dbd605a4a98441b0bccd34706f81165487a2090291d,2024-06-20T16:15:15.110000
|
||||
CVE-2024-6194,0,0,af569fd39235f04aafa2db90bc19151f8ff27beee9d18fcd6d54b63d95390395,2024-06-20T16:15:15.393000
|
||||
CVE-2024-6195,0,0,d5c01b01fd38d8982369170a21c862bc57e358df573913b87fdad7130218214b,2024-06-20T16:15:15.680000
|
||||
CVE-2024-6196,0,0,feb3a9ca99fc92865b5eafb3c719dfb44b6369656c30eb62f5bf1cd1c3ac2817,2024-06-20T16:15:15.967000
|
||||
|
Can't render this file because it is too large.
|
Loading…
x
Reference in New Issue
Block a user