Auto-Update: 2024-06-20T20:00:18.945689+00:00

This commit is contained in:
cad-safe-bot 2024-06-20 20:03:11 +00:00
parent 54793c3d66
commit d80106294b
28 changed files with 1113 additions and 164 deletions

View File

@ -2,12 +2,12 @@
"id": "CVE-2023-38313",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-11-17T06:15:33.427",
"lastModified": "2023-11-23T03:37:09.847",
"vulnStatus": "Analyzed",
"lastModified": "2024-06-20T18:15:10.417",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "An issue was discovered in OpenNDS Captive Portal before 10.1.2. it has a do_binauth NULL pointer dereference that can be triggered with a crafted GET HTTP request with a missing client redirect query string parameter. Triggering this issue results in crashing openNDS (a Denial-of-Service condition). The issue occurs when the client is about to be authenticated, and can be triggered only when the BinAuth option is set."
"value": "An issue was discovered in OpenNDS Captive Portal before 10.1.2. it has a do_binauth NULL pointer dereference that can be triggered with a crafted GET HTTP request with a missing client redirect query string parameter. Triggering this issue results in crashing openNDS (a Denial-of-Service condition). The issue occurs when the client is about to be authenticated, and can be triggered only when the BinAuth option is set. Affected OpenNDS Captive Portal before version 10.1.2 fixed infixed in OpenWrt master, OpenWrt 23.05 and OpenWrt 22.03 on28. August 2023 by updating OpenNDS to version 10.1.3."
},
{
"lang": "es",
@ -76,6 +76,14 @@
"Release Notes",
"Vendor Advisory"
]
},
{
"url": "https://github.com/openwrt/routing/commit/0b19771fb2dd81e7c428759610aed583171eed80",
"source": "cve@mitre.org"
},
{
"url": "https://source.sierrawireless.com/resources/security-bulletins/sierra-wireless-technical-bulletin---swi-psa-2023-006-v4/#sthash.2vJg3d85.rwx82g1C.dpbs",
"source": "cve@mitre.org"
}
]
}

View File

@ -2,12 +2,12 @@
"id": "CVE-2023-38314",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-11-17T06:15:33.530",
"lastModified": "2023-11-23T03:37:21.490",
"vulnStatus": "Analyzed",
"lastModified": "2024-06-20T18:15:10.557",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "An issue was discovered in OpenNDS Captive Portal before version 10.1.2. It has a NULL pointer dereference in preauthenticated() that can be triggered with a crafted GET HTTP request with a missing redirect query string parameter. Triggering this issue results in crashing OpenNDS (a Denial-of-Service condition)."
"value": "An issue was discovered in OpenNDS Captive Portal before version 10.1.2. It has a NULL pointer dereference in preauthenticated() that can be triggered with a crafted GET HTTP request with a missing redirect query string parameter. Triggering this issue results in crashing OpenNDS (a Denial-of-Service condition). Affected OpenNDS Captive Portal before version 10.1.2 fixed infixed in OpenWrt master, OpenWrt 23.05 and OpenWrt 22.03 on28. August 2023 by updating OpenNDS to version 10.1.3."
},
{
"lang": "es",
@ -76,6 +76,14 @@
"Release Notes",
"Vendor Advisory"
]
},
{
"url": "https://github.com/openwrt/routing/commit/0b19771fb2dd81e7c428759610aed583171eed80",
"source": "cve@mitre.org"
},
{
"url": "https://source.sierrawireless.com/resources/security-bulletins/sierra-wireless-technical-bulletin---swi-psa-2023-006-v4/#sthash.2vJg3d85.rwx82g1C.dpbs",
"source": "cve@mitre.org"
}
]
}

View File

@ -2,12 +2,12 @@
"id": "CVE-2023-38315",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-11-17T06:15:33.577",
"lastModified": "2023-11-23T03:34:50.727",
"vulnStatus": "Analyzed",
"lastModified": "2024-06-20T18:15:10.663",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "An issue was discovered in OpenNDS Captive Portal before version 10.1.2. It has a try_to_authenticate NULL pointer dereference that can be triggered with a crafted GET HTTP with a missing client token query string parameter. Triggering this issue results in crashing OpenNDS (a Denial-of-Service condition)."
"value": "An issue was discovered in OpenNDS Captive Portal before version 10.1.2. It has a try_to_authenticate NULL pointer dereference that can be triggered with a crafted GET HTTP with a missing client token query string parameter. Triggering this issue results in crashing OpenNDS (a Denial-of-Service condition). Affected OpenNDS Captive Portal before version 10.1.2 fixed in OpenWrt master, OpenWrt 23.05 and OpenWrt 22.03 on 28. August 2023 by updating OpenNDS to version 10.1.3."
},
{
"lang": "es",
@ -76,6 +76,14 @@
"Release Notes",
"Vendor Advisory"
]
},
{
"url": "https://github.com/openwrt/routing/commit/0b19771fb2dd81e7c428759610aed583171eed80",
"source": "cve@mitre.org"
},
{
"url": "https://source.sierrawireless.com/resources/security-bulletins/sierra-wireless-technical-bulletin---swi-psa-2023-006-v4/#sthash.2vJg3d85.rwx82g1C.dpbs",
"source": "cve@mitre.org"
}
]
}

View File

@ -2,12 +2,12 @@
"id": "CVE-2023-38316",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-11-17T06:15:33.617",
"lastModified": "2023-11-23T03:35:41.227",
"vulnStatus": "Analyzed",
"lastModified": "2024-06-20T18:15:10.767",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "An issue was discovered in OpenNDS Captive Portal before version 10.1.2. When the custom unescape callback is enabled, attackers can execute arbitrary OS commands by inserting them into the URL portion of HTTP GET requests."
"value": "An issue was discovered in OpenNDS Captive Portal before version 10.1.2. When the custom unescape callback is enabled, attackers can execute arbitrary OS commands by inserting them into the URL portion of HTTP GET requests. Affected OpenNDS Captive Portal before version 10.1.2 fixed in OpenWrt master, OpenWrt 23.05 and OpenWrt 22.03 on 28. August 2023 by updating OpenNDS to version 10.1.3."
},
{
"lang": "es",
@ -76,6 +76,14 @@
"Release Notes",
"Vendor Advisory"
]
},
{
"url": "https://github.com/openwrt/routing/commit/0b19771fb2dd81e7c428759610aed583171eed80",
"source": "cve@mitre.org"
},
{
"url": "https://source.sierrawireless.com/resources/security-bulletins/sierra-wireless-technical-bulletin---swi-psa-2023-006-v4/#sthash.2vJg3d85.rwx82g1C.dpbs",
"source": "cve@mitre.org"
}
]
}

View File

@ -2,12 +2,12 @@
"id": "CVE-2023-38320",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-11-17T06:15:33.667",
"lastModified": "2023-11-23T03:35:49.027",
"vulnStatus": "Analyzed",
"lastModified": "2024-06-20T18:15:10.873",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "An issue was discovered in OpenNDS Captive Portal before version 10.1.2. It has a show_preauthpage NULL pointer dereference that can be triggered with a crafted GET HTTP with a missing User-Agent header. Triggering this issue results in crashing OpenNDS (a Denial-of-Service condition)."
"value": "An issue was discovered in OpenNDS Captive Portal before version 10.1.2. It has a show_preauthpage NULL pointer dereference that can be triggered with a crafted GET HTTP with a missing User-Agent header. Triggering this issue results in crashing OpenNDS (a Denial-of-Service condition). This problem was fixed in OpenWrt master, OpenWrt 23.05 and OpenWrt 22.03 on 28. August 2023 by updating OpenNDS to version 10.1.3."
},
{
"lang": "es",
@ -76,6 +76,14 @@
"Release Notes",
"Vendor Advisory"
]
},
{
"url": "https://github.com/openwrt/routing/commit/0b19771fb2dd81e7c428759610aed583171eed80",
"source": "cve@mitre.org"
},
{
"url": "https://source.sierrawireless.com/resources/security-bulletins/sierra-wireless-technical-bulletin---swi-psa-2023-006/#sthash.2vJg3d85.dpbs",
"source": "cve@mitre.org"
}
]
}

View File

@ -2,12 +2,12 @@
"id": "CVE-2023-38322",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-11-17T06:15:33.720",
"lastModified": "2023-11-23T03:43:20.190",
"vulnStatus": "Analyzed",
"lastModified": "2024-06-20T18:15:10.980",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "An issue was discovered in OpenNDS Captive Portal before version 10.1.2. It has a do_binauth NULL pointer dereference that be triggered with a crafted GET HTTP request with a missing User-Agent HTTP header. Triggering this issue results in crashing OpenNDS (a Denial-of-Service condition). The issue occurs when the client is about to be authenticated, and can be triggered only when the BinAuth option is set."
"value": "An issue was discovered in OpenNDS Captive Portal before version 10.1.2. It has a do_binauth NULL pointer dereference that be triggered with a crafted GET HTTP request with a missing User-Agent HTTP header. Triggering this issue results in crashing OpenNDS (a Denial-of-Service condition). The issue occurs when the client is about to be authenticated, and can be triggered only when the BinAuth option is set. Affected OpenNDS Captive Portal before version 10.1.2 fixed in OpenWrt master, OpenWrt 23.05 and OpenWrt 22.03 on 28. August 2023 by updating OpenNDS to version 10.1.3."
},
{
"lang": "es",
@ -76,6 +76,14 @@
"Release Notes",
"Vendor Advisory"
]
},
{
"url": "https://github.com/openwrt/routing/commit/0b19771fb2dd81e7c428759610aed583171eed80",
"source": "cve@mitre.org"
},
{
"url": "https://source.sierrawireless.com/resources/security-bulletins/sierra-wireless-technical-bulletin---swi-psa-2023-006-v4/#sthash.2vJg3d85.rwx82g1C.dpbs",
"source": "cve@mitre.org"
}
]
}

View File

@ -2,12 +2,12 @@
"id": "CVE-2023-38324",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-11-17T06:15:33.760",
"lastModified": "2024-01-26T05:15:12.203",
"lastModified": "2024-06-20T18:15:11.083",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "An issue was discovered in OpenNDS before 10.1.2. It allows users to skip the splash page sequence (and directly authenticate) when it is using the default FAS key and OpenNDS is configured as FAS."
"value": "An issue was discovered in OpenNDS before 10.1.2. It allows users to skip the splash page sequence (and directly authenticate) when it is using the default FAS key and OpenNDS is configured as FAS. Affected OpenNDS Captive Portal before version 10.1.2 fixed in OpenWrt master, OpenWrt 23.05 and OpenWrt 22.03 on 28. August 2023 by updating OpenNDS to version 10.1.3."
},
{
"lang": "es",
@ -85,10 +85,18 @@
"Vendor Advisory"
]
},
{
"url": "https://github.com/openwrt/routing/commit/0b19771fb2dd81e7c428759610aed583171eed80",
"source": "cve@mitre.org"
},
{
"url": "https://openwrt.org/docs/guide-user/services/captive-portal/opennds",
"source": "cve@mitre.org"
},
{
"url": "https://source.sierrawireless.com/resources/security-bulletins/sierra-wireless-technical-bulletin---swi-psa-2023-006-v4/#sthash.2vJg3d85.rwx82g1C.dpbs",
"source": "cve@mitre.org"
},
{
"url": "https://www.forescout.com/resources/sierra21-vulnerabilities",
"source": "cve@mitre.org"

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-41101",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-11-17T06:15:34.137",
"lastModified": "2024-06-20T16:15:12.713",
"lastModified": "2024-06-20T18:15:11.237",
"vulnStatus": "Modified",
"descriptions": [
{
@ -87,6 +87,10 @@
{
"url": "https://github.com/openwrt/routing/commit/88c98c910acccab694b3afb6d36d70ca429118a6",
"source": "cve@mitre.org"
},
{
"url": "https://source.sierrawireless.com/resources/security-bulletins/sierra-wireless-technical-bulletin---swi-psa-2023-006-v4/#sthash.2vJg3d85.rwx82g1C.dpbs",
"source": "cve@mitre.org"
}
]
}

View File

@ -2,12 +2,12 @@
"id": "CVE-2023-41102",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-11-17T06:15:34.180",
"lastModified": "2023-11-25T02:15:05.617",
"vulnStatus": "Analyzed",
"lastModified": "2024-06-20T18:15:11.333",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "An issue was discovered in the captive portal in OpenNDS before version 10.1.3. It has multiple memory leaks due to not freeing up allocated memory. This may lead to a Denial-of-Service condition due to the consumption of all available memory."
"value": "An issue was discovered in the captive portal in OpenNDS before version 10.1.3. It has multiple memory leaks due to not freeing up allocated memory. This may lead to a Denial-of-Service condition due to the consumption of all available memory. Affected OpenNDS before version 10.1.3 fixed in OpenWrt master and OpenWrt 23.05 on 23. November by updating OpenNDS to version 10.2.0."
},
{
"lang": "es",
@ -82,6 +82,14 @@
"tags": [
"Release Notes"
]
},
{
"url": "https://github.com/openwrt/routing/commit/ad787a920ccb9dacf5b01d52bce36ac14a5ecd89",
"source": "cve@mitre.org"
},
{
"url": "https://source.sierrawireless.com/resources/security-bulletins/sierra-wireless-technical-bulletin---swi-psa-2023-006-v4/#sthash.2vJg3d85.rwx82g1C.dpbs",
"source": "cve@mitre.org"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-30089",
"sourceIdentifier": "secure@microsoft.com",
"published": "2024-06-11T17:15:57.023",
"lastModified": "2024-06-13T18:36:45.417",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-06-20T18:29:16.590",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -39,6 +39,16 @@
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-416"
}
]
},
{
"source": "secure@microsoft.com",
"type": "Secondary",
@ -50,10 +60,80 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:*:*",
"versionEndExcluding": "10.0.17763.5936",
"matchCriteriaId": "9B52F95E-6080-46C6-B4B6-E2B3F3E78456"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:*:*",
"versionEndExcluding": "10.0.19044.4529",
"matchCriteriaId": "1CEAF689-E8DB-4D3C-BC2E-B386BC077BC5"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:*:*",
"versionEndExcluding": "10.0.19045.4529",
"matchCriteriaId": "970F54FC-F4ED-49B9-BE94-96B7212FD149"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_11_21h2:*:*:*:*:*:*:*:*",
"versionEndExcluding": "10.0.22000.3019",
"matchCriteriaId": "84ECD6C0-8C47-4D2F-82B5-4F8C0BBC5FEE"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*:*:*",
"versionEndExcluding": "10.0.22621.3737",
"matchCriteriaId": "4E80DF17-1F27-474E-B147-9F5B6C494300"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_11_23h2:*:*:*:*:*:*:*:*",
"versionEndExcluding": "10.0.22631.3737",
"matchCriteriaId": "4258468C-56CC-45C0-B510-FC833E942876"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*",
"versionEndExcluding": "10.0.17763.5936",
"matchCriteriaId": "12F9D974-A968-4CBB-81D8-C73B76DD284A"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_server_2022:*:*:*:*:*:*:*:*",
"versionEndExcluding": "10.0.20348.2522",
"matchCriteriaId": "498A643B-0180-4AD3-BD7C-5E3CEB0FD112"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_server_2022_23h2:*:*:*:*:*:*:*:*",
"versionEndExcluding": "10.0.25398.950",
"matchCriteriaId": "0EA59E2D-57B2-4E8B-937A-3EB51A3AD285"
}
]
}
]
}
],
"references": [
{
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-30089",
"source": "secure@microsoft.com"
"source": "secure@microsoft.com",
"tags": [
"Patch",
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-30090",
"sourceIdentifier": "secure@microsoft.com",
"published": "2024-06-11T17:15:57.240",
"lastModified": "2024-06-13T18:36:45.417",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-06-20T18:29:05.917",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -39,6 +39,16 @@
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-119"
}
]
},
{
"source": "secure@microsoft.com",
"type": "Secondary",
@ -50,10 +60,123 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:*:*",
"versionEndExcluding": "10.0.10240.20680",
"matchCriteriaId": "CF7733FD-F870-4578-A567-9900AD6C78E3"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:*:*",
"versionEndExcluding": "10.0.14393.7070",
"matchCriteriaId": "D96DA51E-404E-49AE-B852-56FF8A1CEEA6"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:*:*",
"versionEndExcluding": "10.0.17763.5936",
"matchCriteriaId": "9B52F95E-6080-46C6-B4B6-E2B3F3E78456"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:*:*",
"versionEndExcluding": "10.0.19044.4529",
"matchCriteriaId": "1CEAF689-E8DB-4D3C-BC2E-B386BC077BC5"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:*:*",
"versionEndExcluding": "10.0.19045.4529",
"matchCriteriaId": "970F54FC-F4ED-49B9-BE94-96B7212FD149"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_11_21h2:*:*:*:*:*:*:*:*",
"versionEndExcluding": "10.0.22000.3019",
"matchCriteriaId": "84ECD6C0-8C47-4D2F-82B5-4F8C0BBC5FEE"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*:*:*",
"versionEndExcluding": "10.0.22621.3737",
"matchCriteriaId": "4E80DF17-1F27-474E-B147-9F5B6C494300"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_11_23h2:*:*:*:*:*:*:*:*",
"versionEndExcluding": "10.0.22631.3737",
"matchCriteriaId": "4258468C-56CC-45C0-B510-FC833E942876"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:x64:*",
"matchCriteriaId": "2127D10C-B6F3-4C1D-B9AA-5D78513CC996"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:x86:*",
"matchCriteriaId": "AB425562-C0A0-452E-AABE-F70522F15E1A"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:*:*",
"matchCriteriaId": "2ACA9287-B475-4AF7-A4DA-A7143CEF9E57"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A7DF96F8-BA6A-4780-9CA3-F719B3F81074"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*",
"matchCriteriaId": "DB18C4CE-5917-401E-ACF7-2747084FD36E"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:*",
"versionEndExcluding": "10.0.14393.7070",
"matchCriteriaId": "FA61AAF0-D769-4287-AA5C-EFDAD067E9F1"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*",
"versionEndExcluding": "10.0.17763.5936",
"matchCriteriaId": "12F9D974-A968-4CBB-81D8-C73B76DD284A"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_server_2022:*:*:*:*:*:*:*:*",
"versionEndExcluding": "10.0.20348.2522",
"matchCriteriaId": "498A643B-0180-4AD3-BD7C-5E3CEB0FD112"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_server_2022_23h2:*:*:*:*:*:*:*:*",
"versionEndExcluding": "10.0.25398.950",
"matchCriteriaId": "0EA59E2D-57B2-4E8B-937A-3EB51A3AD285"
}
]
}
]
}
],
"references": [
{
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-30090",
"source": "secure@microsoft.com"
"source": "secure@microsoft.com",
"tags": [
"Patch",
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-30093",
"sourceIdentifier": "secure@microsoft.com",
"published": "2024-06-11T17:15:57.680",
"lastModified": "2024-06-13T18:36:45.417",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-06-20T18:28:55.697",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -39,6 +39,16 @@
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-59"
}
]
},
{
"source": "secure@microsoft.com",
"type": "Secondary",
@ -50,10 +60,123 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:*:*",
"versionEndExcluding": "10.0.10240.20680",
"matchCriteriaId": "CF7733FD-F870-4578-A567-9900AD6C78E3"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:*:*",
"versionEndExcluding": "10.0.14393.7070",
"matchCriteriaId": "D96DA51E-404E-49AE-B852-56FF8A1CEEA6"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:*:*",
"versionEndExcluding": "10.0.17763.5936",
"matchCriteriaId": "9B52F95E-6080-46C6-B4B6-E2B3F3E78456"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:*:*",
"versionEndExcluding": "10.0.19044.4529",
"matchCriteriaId": "1CEAF689-E8DB-4D3C-BC2E-B386BC077BC5"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:*:*",
"versionEndExcluding": "10.0.19045.4529",
"matchCriteriaId": "970F54FC-F4ED-49B9-BE94-96B7212FD149"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_11_21h2:*:*:*:*:*:*:*:*",
"versionEndExcluding": "10.0.22000.3019",
"matchCriteriaId": "84ECD6C0-8C47-4D2F-82B5-4F8C0BBC5FEE"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*:*:*",
"versionEndExcluding": "10.0.22621.3737",
"matchCriteriaId": "4E80DF17-1F27-474E-B147-9F5B6C494300"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_11_23h2:*:*:*:*:*:*:*:*",
"versionEndExcluding": "10.0.22631.3737",
"matchCriteriaId": "4258468C-56CC-45C0-B510-FC833E942876"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:x64:*",
"matchCriteriaId": "2127D10C-B6F3-4C1D-B9AA-5D78513CC996"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:x86:*",
"matchCriteriaId": "AB425562-C0A0-452E-AABE-F70522F15E1A"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:*:*",
"matchCriteriaId": "2ACA9287-B475-4AF7-A4DA-A7143CEF9E57"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A7DF96F8-BA6A-4780-9CA3-F719B3F81074"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*",
"matchCriteriaId": "DB18C4CE-5917-401E-ACF7-2747084FD36E"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:*",
"versionEndExcluding": "10.0.14393.7070",
"matchCriteriaId": "FA61AAF0-D769-4287-AA5C-EFDAD067E9F1"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*",
"versionEndExcluding": "10.0.17763.5936",
"matchCriteriaId": "12F9D974-A968-4CBB-81D8-C73B76DD284A"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_server_2022:*:*:*:*:*:*:*:*",
"versionEndExcluding": "10.0.20348.2522",
"matchCriteriaId": "498A643B-0180-4AD3-BD7C-5E3CEB0FD112"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_server_2022_23h2:*:*:*:*:*:*:*:*",
"versionEndExcluding": "10.0.25398.950",
"matchCriteriaId": "0EA59E2D-57B2-4E8B-937A-3EB51A3AD285"
}
]
}
]
}
],
"references": [
{
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-30093",
"source": "secure@microsoft.com"
"source": "secure@microsoft.com",
"tags": [
"Patch",
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-30095",
"sourceIdentifier": "secure@microsoft.com",
"published": "2024-06-11T17:15:58.150",
"lastModified": "2024-06-13T18:36:45.417",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-06-20T18:07:39.000",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -39,6 +39,16 @@
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-787"
}
]
},
{
"source": "secure@microsoft.com",
"type": "Secondary",
@ -50,10 +60,123 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:*:*",
"versionEndExcluding": "10.0.10240.20680",
"matchCriteriaId": "CF7733FD-F870-4578-A567-9900AD6C78E3"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:*:*",
"versionEndExcluding": "10.0.14393.7070",
"matchCriteriaId": "D96DA51E-404E-49AE-B852-56FF8A1CEEA6"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:*:*",
"versionEndExcluding": "10.0.17763.5936",
"matchCriteriaId": "9B52F95E-6080-46C6-B4B6-E2B3F3E78456"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:*:*",
"versionEndExcluding": "10.0.19044.4529",
"matchCriteriaId": "1CEAF689-E8DB-4D3C-BC2E-B386BC077BC5"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:*:*",
"versionEndExcluding": "10.0.19045.4529",
"matchCriteriaId": "970F54FC-F4ED-49B9-BE94-96B7212FD149"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_11_21h2:*:*:*:*:*:*:*:*",
"versionEndExcluding": "10.0.22000.3019",
"matchCriteriaId": "84ECD6C0-8C47-4D2F-82B5-4F8C0BBC5FEE"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*:*:*",
"versionEndExcluding": "10.0.22621.3737",
"matchCriteriaId": "4E80DF17-1F27-474E-B147-9F5B6C494300"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_11_23h2:*:*:*:*:*:*:*:*",
"versionEndExcluding": "10.0.22631.3737",
"matchCriteriaId": "4258468C-56CC-45C0-B510-FC833E942876"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:x64:*",
"matchCriteriaId": "2127D10C-B6F3-4C1D-B9AA-5D78513CC996"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:x86:*",
"matchCriteriaId": "AB425562-C0A0-452E-AABE-F70522F15E1A"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:*:*",
"matchCriteriaId": "2ACA9287-B475-4AF7-A4DA-A7143CEF9E57"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A7DF96F8-BA6A-4780-9CA3-F719B3F81074"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*",
"matchCriteriaId": "DB18C4CE-5917-401E-ACF7-2747084FD36E"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:*",
"versionEndExcluding": "10.0.14393.7070",
"matchCriteriaId": "FA61AAF0-D769-4287-AA5C-EFDAD067E9F1"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*",
"versionEndExcluding": "10.0.17763.5936",
"matchCriteriaId": "12F9D974-A968-4CBB-81D8-C73B76DD284A"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_server_2022:*:*:*:*:*:*:*:*",
"versionEndExcluding": "10.0.20348.2522",
"matchCriteriaId": "498A643B-0180-4AD3-BD7C-5E3CEB0FD112"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_server_2022_23h2:*:*:*:*:*:*:*:*",
"versionEndExcluding": "10.0.25398.950",
"matchCriteriaId": "0EA59E2D-57B2-4E8B-937A-3EB51A3AD285"
}
]
}
]
}
],
"references": [
{
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-30095",
"source": "secure@microsoft.com"
"source": "secure@microsoft.com",
"tags": [
"Patch",
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-30096",
"sourceIdentifier": "secure@microsoft.com",
"published": "2024-06-11T17:15:58.497",
"lastModified": "2024-06-13T18:36:45.417",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-06-20T18:07:54.607",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -39,6 +39,16 @@
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
},
{
"source": "secure@microsoft.com",
"type": "Secondary",
@ -50,10 +60,80 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:*:*",
"versionEndExcluding": "10.0.17763.5936",
"matchCriteriaId": "9B52F95E-6080-46C6-B4B6-E2B3F3E78456"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:*:*",
"versionEndExcluding": "10.0.19044.4529",
"matchCriteriaId": "1CEAF689-E8DB-4D3C-BC2E-B386BC077BC5"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:*:*",
"versionEndExcluding": "10.0.19045.4529",
"matchCriteriaId": "970F54FC-F4ED-49B9-BE94-96B7212FD149"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_11_21h2:*:*:*:*:*:*:*:*",
"versionEndExcluding": "10.0.22000.3019",
"matchCriteriaId": "84ECD6C0-8C47-4D2F-82B5-4F8C0BBC5FEE"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*:*:*",
"versionEndExcluding": "10.0.22621.3737",
"matchCriteriaId": "4E80DF17-1F27-474E-B147-9F5B6C494300"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_11_23h2:*:*:*:*:*:*:*:*",
"versionEndExcluding": "10.0.22631.3737",
"matchCriteriaId": "4258468C-56CC-45C0-B510-FC833E942876"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*",
"versionEndExcluding": "10.0.17763.5936",
"matchCriteriaId": "12F9D974-A968-4CBB-81D8-C73B76DD284A"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_server_2022:*:*:*:*:*:*:*:*",
"versionEndExcluding": "10.0.20348.2522",
"matchCriteriaId": "498A643B-0180-4AD3-BD7C-5E3CEB0FD112"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_server_2022_23h2:*:*:*:*:*:*:*:*",
"versionEndExcluding": "10.0.25398.950",
"matchCriteriaId": "0EA59E2D-57B2-4E8B-937A-3EB51A3AD285"
}
]
}
]
}
],
"references": [
{
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-30096",
"source": "secure@microsoft.com"
"source": "secure@microsoft.com",
"tags": [
"Patch",
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-31497",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-04-15T20:15:11.077",
"lastModified": "2024-05-10T14:33:55.323",
"vulnStatus": "Analyzed",
"lastModified": "2024-06-20T19:15:49.960",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@ -217,6 +217,10 @@
"Third Party Advisory"
]
},
{
"url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00014.html",
"source": "cve@mitre.org"
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/IZS3B37GNGWOOV7QU7B7JFK76U4TOP4V/",
"source": "cve@mitre.org",

View File

@ -0,0 +1,55 @@
{
"id": "CVE-2024-37349",
"sourceIdentifier": "SecurityResponse@netmotionsoftware.com",
"published": "2024-06-20T18:15:11.850",
"lastModified": "2024-06-20T18:15:11.850",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "There is a cross-site scripting vulnerability in the\nmanagement UI of Absolute Secure Access prior to version 13.06. Attackers with\nsystem administrator permissions can interfere with other system\nadministrator\u2019s use of the management UI when the victim administrator edits\nthe same management object. This vulnerability is distinct from CVE-2024-37348 and\nCVE-2024-37351. The scope is unchanged, there is no loss of confidentiality. Impact\nto system integrity is high, impact to system availability is none."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "SecurityResponse@netmotionsoftware.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:N/I:H/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"availabilityImpact": "NONE",
"baseScore": 4.5,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 0.9,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "SecurityResponse@netmotionsoftware.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"references": [
{
"url": "https://www.absolute.com/platform/security-information/vulnerability-archive/secure-access-1306/cve-2024-37349/",
"source": "SecurityResponse@netmotionsoftware.com"
}
]
}

View File

@ -0,0 +1,55 @@
{
"id": "CVE-2024-37350",
"sourceIdentifier": "SecurityResponse@netmotionsoftware.com",
"published": "2024-06-20T18:15:12.103",
"lastModified": "2024-06-20T18:15:12.103",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "There is a cross-site scripting vulnerability in the policy\nmanagement UI of Absolute Secure Access prior to version 13.06. Attackers can\ninterfere with a system administrator\u2019s use of the policy management UI when\nthe attacker convinces the victim administrator to follow a crafted link to the\nvulnerable component while the attacking administrator is authenticated to the\nconsole. The scope is unchanged, there is no loss of confidentiality. Impact to\nsystem integrity is high, impact to system availability is none."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "SecurityResponse@netmotionsoftware.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "SecurityResponse@netmotionsoftware.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"references": [
{
"url": "https://www.absolute.com/platform/security-information/vulnerability-archive/secure-access-1306/cve-2024-37350/",
"source": "SecurityResponse@netmotionsoftware.com"
}
]
}

View File

@ -0,0 +1,55 @@
{
"id": "CVE-2024-37351",
"sourceIdentifier": "SecurityResponse@netmotionsoftware.com",
"published": "2024-06-20T18:15:12.347",
"lastModified": "2024-06-20T18:15:12.347",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "There is a cross-site scripting vulnerability in the\nmanagement UI of Absolute Secure Access prior to version 13.06. Attackers with\nsystem administrator permissions can interfere with other system\nadministrator\u2019s use of the management UI when the second administrator later\nedits the same management object. This vulnerability is distinct from CVE-2024-37348 and\nCVE-2024-37349. The scope is unchanged, there is no loss of confidentiality. Impact\nto system integrity is high, impact to system availability is none."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "SecurityResponse@netmotionsoftware.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:N/I:H/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"availabilityImpact": "NONE",
"baseScore": 4.5,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 0.9,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "SecurityResponse@netmotionsoftware.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"references": [
{
"url": "https://www.absolute.com/platform/security-information/vulnerability-archive/secure-access-1306/cve-2024-37351/",
"source": "SecurityResponse@netmotionsoftware.com"
}
]
}

View File

@ -0,0 +1,55 @@
{
"id": "CVE-2024-37352",
"sourceIdentifier": "SecurityResponse@netmotionsoftware.com",
"published": "2024-06-20T18:15:12.590",
"lastModified": "2024-06-20T18:15:12.590",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "There is a cross-site scripting vulnerability in the\nmanagement UI of Absolute Secure Access prior to version 13.06 that allows\nattackers with system administrator permissions to interfere with other system\nadministrators\u2019 use of the management UI when the second administrator accesses\nthe vulnerable page. The scope is unchanged, there is no loss of\nconfidentiality. Impact to system integrity is high, impact to system\navailability is none."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "SecurityResponse@netmotionsoftware.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:N/I:H/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"availabilityImpact": "NONE",
"baseScore": 4.5,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 0.9,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "SecurityResponse@netmotionsoftware.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"references": [
{
"url": "https://www.absolute.com/platform/security-information/vulnerability-archive/secure-access-1306/cve-2024-37352/",
"source": "SecurityResponse@netmotionsoftware.com"
}
]
}

View File

@ -0,0 +1,24 @@
{
"id": "CVE-2024-37674",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-06-20T18:15:12.833",
"lastModified": "2024-06-20T18:15:12.833",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "Cross Site Scripting vulnerability in Moodle CMS v3.10 allows a remote attacker to execute arbitrary code via the Field Name (name parameter) of a new activity."
}
],
"metrics": {},
"references": [
{
"url": "http://moodle.com",
"source": "cve@mitre.org"
},
{
"url": "https://github.com/MohamedAzizMSALLEMI/Moodle_Security/blob/main/CVE-2024-37674.md",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,28 @@
{
"id": "CVE-2024-37699",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-06-20T18:15:12.920",
"lastModified": "2024-06-20T18:15:12.920",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "An issue in DataLife Engine v.17.1 and before is vulnerable to SQL Injection in dboption."
}
],
"metrics": {},
"references": [
{
"url": "https://dle-news.ru/pressrelease/1909-datalife-engine-v172-press-release.html",
"source": "cve@mitre.org"
},
{
"url": "https://exploit.az/threads/datalife-engine-dle-sql-inyeksiyasi-17-0.19/",
"source": "cve@mitre.org"
},
{
"url": "https://exploit.az/threads/datalife-engine-dle-sql-inyeksiyasi-sql-injection-sql-inekcija-17-1.19/",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,24 @@
{
"id": "CVE-2024-37818",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-06-20T19:15:50.260",
"lastModified": "2024-06-20T19:15:50.260",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "Strapi v4.24.4 was discovered to contain a Server-Side Request Forgery (SSRF) via the component /strapi.io/_next/image. This vulnerability allows attackers to scan for open ports or access sensitive information via a crafted GET request."
}
],
"metrics": {},
"references": [
{
"url": "https://medium.com/%40barkadevaibhav491/server-side-request-forgery-in-strapi-e02d5fe218ab",
"source": "cve@mitre.org"
},
{
"url": "https://strapi.io/",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,59 @@
{
"id": "CVE-2024-37897",
"sourceIdentifier": "security-advisories@github.com",
"published": "2024-06-20T18:15:13.023",
"lastModified": "2024-06-20T18:15:13.023",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "SFTPGo is a full-featured and highly configurable SFTP, HTTP/S, FTP/S and WebDAV server - S3, Google Cloud Storage, Azure Blob. SFTPGo WebAdmin and WebClient support password reset. This feature is disabled in the default configuration.\nIn SFTPGo versions prior to v2.6.1, if the feature is enabled, even users with access restrictions (e.g. expired) can reset their password and log in. Users are advised to upgrade to version 2.6.1. Users unable to upgrade may keep the password reset feature disabled or set a blank email address for users and admins with access restrictions so they cannot receive the email with the reset code and exploit the vulnerability."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security-advisories@github.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 5.4,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 2.5
}
]
},
"weaknesses": [
{
"source": "security-advisories@github.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-287"
}
]
}
],
"references": [
{
"url": "https://github.com/drakkan/sftpgo/commit/1f8ac8bfe16100b0484d6c91e1e8361687324423",
"source": "security-advisories@github.com"
},
{
"url": "https://github.com/drakkan/sftpgo/security/advisories/GHSA-hw5f-6wvv-xcrh",
"source": "security-advisories@github.com"
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-6082",
"sourceIdentifier": "cna@vuldb.com",
"published": "2024-06-17T23:15:51.920",
"lastModified": "2024-06-20T12:44:01.637",
"lastModified": "2024-06-20T19:15:50.437",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-6187",
"sourceIdentifier": "cna@vuldb.com",
"published": "2024-06-20T13:15:50.320",
"lastModified": "2024-06-20T16:07:50.417",
"lastModified": "2024-06-20T19:15:50.553",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-6192",
"sourceIdentifier": "cna@vuldb.com",
"published": "2024-06-20T15:15:51.517",
"lastModified": "2024-06-20T16:07:50.417",
"lastModified": "2024-06-20T18:15:13.337",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{

View File

@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours.
### Last Repository Update
```plain
2024-06-20T18:00:18.335649+00:00
2024-06-20T20:00:18.945689+00:00
```
### Most recent CVE Modification Timestamp synchronized with NVD
```plain
2024-06-20T17:51:00.143000+00:00
2024-06-20T19:15:50.553000+00:00
```
### Last Data Feed Release
@ -33,60 +33,45 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
### Total Number of included CVEs
```plain
254756
254764
```
### CVEs added in the last Commit
Recently added CVEs: `16`
Recently added CVEs: `8`
- [CVE-2022-41324](CVE-2022/CVE-2022-413xx/CVE-2022-41324.json) (`2024-06-20T17:15:50.020`)
- [CVE-2022-45929](CVE-2022/CVE-2022-459xx/CVE-2022-45929.json) (`2024-06-20T17:15:50.127`)
- [CVE-2024-28397](CVE-2024/CVE-2024-283xx/CVE-2024-28397.json) (`2024-06-20T17:15:50.527`)
- [CVE-2024-33335](CVE-2024/CVE-2024-333xx/CVE-2024-33335.json) (`2024-06-20T17:15:50.820`)
- [CVE-2024-37343](CVE-2024/CVE-2024-373xx/CVE-2024-37343.json) (`2024-06-20T17:15:50.910`)
- [CVE-2024-37344](CVE-2024/CVE-2024-373xx/CVE-2024-37344.json) (`2024-06-20T17:15:51.153`)
- [CVE-2024-37345](CVE-2024/CVE-2024-373xx/CVE-2024-37345.json) (`2024-06-20T17:15:51.397`)
- [CVE-2024-37346](CVE-2024/CVE-2024-373xx/CVE-2024-37346.json) (`2024-06-20T17:15:51.623`)
- [CVE-2024-37347](CVE-2024/CVE-2024-373xx/CVE-2024-37347.json) (`2024-06-20T17:15:51.853`)
- [CVE-2024-37348](CVE-2024/CVE-2024-373xx/CVE-2024-37348.json) (`2024-06-20T17:15:52.080`)
- [CVE-2024-37626](CVE-2024/CVE-2024-376xx/CVE-2024-37626.json) (`2024-06-20T17:15:52.353`)
- [CVE-2024-37676](CVE-2024/CVE-2024-376xx/CVE-2024-37676.json) (`2024-06-20T16:15:13.917`)
- [CVE-2024-6193](CVE-2024/CVE-2024-61xx/CVE-2024-6193.json) (`2024-06-20T16:15:15.110`)
- [CVE-2024-6194](CVE-2024/CVE-2024-61xx/CVE-2024-6194.json) (`2024-06-20T16:15:15.393`)
- [CVE-2024-6195](CVE-2024/CVE-2024-61xx/CVE-2024-6195.json) (`2024-06-20T16:15:15.680`)
- [CVE-2024-6196](CVE-2024/CVE-2024-61xx/CVE-2024-6196.json) (`2024-06-20T16:15:15.967`)
- [CVE-2024-37349](CVE-2024/CVE-2024-373xx/CVE-2024-37349.json) (`2024-06-20T18:15:11.850`)
- [CVE-2024-37350](CVE-2024/CVE-2024-373xx/CVE-2024-37350.json) (`2024-06-20T18:15:12.103`)
- [CVE-2024-37351](CVE-2024/CVE-2024-373xx/CVE-2024-37351.json) (`2024-06-20T18:15:12.347`)
- [CVE-2024-37352](CVE-2024/CVE-2024-373xx/CVE-2024-37352.json) (`2024-06-20T18:15:12.590`)
- [CVE-2024-37674](CVE-2024/CVE-2024-376xx/CVE-2024-37674.json) (`2024-06-20T18:15:12.833`)
- [CVE-2024-37699](CVE-2024/CVE-2024-376xx/CVE-2024-37699.json) (`2024-06-20T18:15:12.920`)
- [CVE-2024-37818](CVE-2024/CVE-2024-378xx/CVE-2024-37818.json) (`2024-06-20T19:15:50.260`)
- [CVE-2024-37897](CVE-2024/CVE-2024-378xx/CVE-2024-37897.json) (`2024-06-20T18:15:13.023`)
### CVEs modified in the last Commit
Recently modified CVEs: `43`
Recently modified CVEs: `18`
- [CVE-2024-35250](CVE-2024/CVE-2024-352xx/CVE-2024-35250.json) (`2024-06-20T17:10:13.720`)
- [CVE-2024-35252](CVE-2024/CVE-2024-352xx/CVE-2024-35252.json) (`2024-06-20T17:12:13.843`)
- [CVE-2024-35253](CVE-2024/CVE-2024-352xx/CVE-2024-35253.json) (`2024-06-20T17:13:17.437`)
- [CVE-2024-35254](CVE-2024/CVE-2024-352xx/CVE-2024-35254.json) (`2024-06-20T16:16:47.070`)
- [CVE-2024-35255](CVE-2024/CVE-2024-352xx/CVE-2024-35255.json) (`2024-06-20T16:31:46.127`)
- [CVE-2024-35263](CVE-2024/CVE-2024-352xx/CVE-2024-35263.json) (`2024-06-20T16:32:31.287`)
- [CVE-2024-35265](CVE-2024/CVE-2024-352xx/CVE-2024-35265.json) (`2024-06-20T16:33:28.080`)
- [CVE-2024-36226](CVE-2024/CVE-2024-362xx/CVE-2024-36226.json) (`2024-06-20T16:02:34.930`)
- [CVE-2024-37222](CVE-2024/CVE-2024-372xx/CVE-2024-37222.json) (`2024-06-20T16:07:50.417`)
- [CVE-2024-37532](CVE-2024/CVE-2024-375xx/CVE-2024-37532.json) (`2024-06-20T16:07:50.417`)
- [CVE-2024-3766](CVE-2024/CVE-2024-37xx/CVE-2024-3766.json) (`2024-06-20T16:15:14.380`)
- [CVE-2024-4073](CVE-2024/CVE-2024-40xx/CVE-2024-4073.json) (`2024-06-20T16:15:14.530`)
- [CVE-2024-5156](CVE-2024/CVE-2024-51xx/CVE-2024-5156.json) (`2024-06-20T16:07:50.417`)
- [CVE-2024-5830](CVE-2024/CVE-2024-58xx/CVE-2024-5830.json) (`2024-06-20T16:06:51.777`)
- [CVE-2024-5831](CVE-2024/CVE-2024-58xx/CVE-2024-5831.json) (`2024-06-20T16:07:02.127`)
- [CVE-2024-6162](CVE-2024/CVE-2024-61xx/CVE-2024-6162.json) (`2024-06-20T16:07:50.417`)
- [CVE-2024-6182](CVE-2024/CVE-2024-61xx/CVE-2024-6182.json) (`2024-06-20T16:15:14.807`)
- [CVE-2024-6183](CVE-2024/CVE-2024-61xx/CVE-2024-6183.json) (`2024-06-20T16:15:14.903`)
- [CVE-2024-6186](CVE-2024/CVE-2024-61xx/CVE-2024-6186.json) (`2024-06-20T16:07:50.417`)
- [CVE-2024-6187](CVE-2024/CVE-2024-61xx/CVE-2024-6187.json) (`2024-06-20T16:07:50.417`)
- [CVE-2024-6188](CVE-2024/CVE-2024-61xx/CVE-2024-6188.json) (`2024-06-20T16:15:15.003`)
- [CVE-2024-6189](CVE-2024/CVE-2024-61xx/CVE-2024-6189.json) (`2024-06-20T16:07:50.417`)
- [CVE-2024-6190](CVE-2024/CVE-2024-61xx/CVE-2024-6190.json) (`2024-06-20T16:07:50.417`)
- [CVE-2024-6191](CVE-2024/CVE-2024-61xx/CVE-2024-6191.json) (`2024-06-20T16:07:50.417`)
- [CVE-2024-6192](CVE-2024/CVE-2024-61xx/CVE-2024-6192.json) (`2024-06-20T16:07:50.417`)
- [CVE-2023-38313](CVE-2023/CVE-2023-383xx/CVE-2023-38313.json) (`2024-06-20T18:15:10.417`)
- [CVE-2023-38314](CVE-2023/CVE-2023-383xx/CVE-2023-38314.json) (`2024-06-20T18:15:10.557`)
- [CVE-2023-38315](CVE-2023/CVE-2023-383xx/CVE-2023-38315.json) (`2024-06-20T18:15:10.663`)
- [CVE-2023-38316](CVE-2023/CVE-2023-383xx/CVE-2023-38316.json) (`2024-06-20T18:15:10.767`)
- [CVE-2023-38320](CVE-2023/CVE-2023-383xx/CVE-2023-38320.json) (`2024-06-20T18:15:10.873`)
- [CVE-2023-38322](CVE-2023/CVE-2023-383xx/CVE-2023-38322.json) (`2024-06-20T18:15:10.980`)
- [CVE-2023-38324](CVE-2023/CVE-2023-383xx/CVE-2023-38324.json) (`2024-06-20T18:15:11.083`)
- [CVE-2023-41101](CVE-2023/CVE-2023-411xx/CVE-2023-41101.json) (`2024-06-20T18:15:11.237`)
- [CVE-2023-41102](CVE-2023/CVE-2023-411xx/CVE-2023-41102.json) (`2024-06-20T18:15:11.333`)
- [CVE-2024-30089](CVE-2024/CVE-2024-300xx/CVE-2024-30089.json) (`2024-06-20T18:29:16.590`)
- [CVE-2024-30090](CVE-2024/CVE-2024-300xx/CVE-2024-30090.json) (`2024-06-20T18:29:05.917`)
- [CVE-2024-30093](CVE-2024/CVE-2024-300xx/CVE-2024-30093.json) (`2024-06-20T18:28:55.697`)
- [CVE-2024-30095](CVE-2024/CVE-2024-300xx/CVE-2024-30095.json) (`2024-06-20T18:07:39.000`)
- [CVE-2024-30096](CVE-2024/CVE-2024-300xx/CVE-2024-30096.json) (`2024-06-20T18:07:54.607`)
- [CVE-2024-31497](CVE-2024/CVE-2024-314xx/CVE-2024-31497.json) (`2024-06-20T19:15:49.960`)
- [CVE-2024-6082](CVE-2024/CVE-2024-60xx/CVE-2024-6082.json) (`2024-06-20T19:15:50.437`)
- [CVE-2024-6187](CVE-2024/CVE-2024-61xx/CVE-2024-6187.json) (`2024-06-20T19:15:50.553`)
- [CVE-2024-6192](CVE-2024/CVE-2024-61xx/CVE-2024-6192.json) (`2024-06-20T18:15:13.337`)
## Download and Usage

View File

@ -206867,7 +206867,7 @@ CVE-2022-4132,0,0,39bb27b8bcfa5217be40ca9c8319793eb5451cd6546e16d6355a878e29e8f7
CVE-2022-41320,0,0,4af0082ee3251c36c201ebf06ac6d97abcf09a492a827e8f0584c68605fb9690,2022-09-26T16:12:32.250000
CVE-2022-41322,0,0,7ebdfc14fca3194069183ac5976535f469c2e6ccdcfdfcaf667042538e2a6ff7,2023-11-07T03:52:46.567000
CVE-2022-41323,0,0,faab8688d7cbe32258e85dda0240b8a7df2d0ee4db0fc4a2415fde8a747088ba,2023-11-07T03:52:46.637000
CVE-2022-41324,1,1,b02a369649a1b048d80a1dc0ecd3cb266c27b69c552b2eed535019e30b633220,2024-06-20T17:15:50.020000
CVE-2022-41324,0,0,b02a369649a1b048d80a1dc0ecd3cb266c27b69c552b2eed535019e30b633220,2024-06-20T17:15:50.020000
CVE-2022-41325,0,0,076a23b6db4a8e9db26f3abe6a388c0d781ed95e952859c309eb34683ef6c4e3,2022-12-08T16:44:11.917000
CVE-2022-41326,0,0,abebff8816a3746c070f005ea5cc276c465f50d753463f79292b529430e95a1c,2023-08-08T14:21:49.707000
CVE-2022-41327,0,0,5550822a25edb1ef8f904091df8ce2ea514b508621c1976b3beb29e58288d9fd,2023-11-07T03:52:46.720000
@ -210220,7 +210220,7 @@ CVE-2022-45925,0,0,fd7051a696b3f22bdc4f0c838abc5ef791297ad80cd0b8eb63f31599526d2
CVE-2022-45926,0,0,fb2fe7a1bc006fa7fb3e239d1549e4c27173c2380f9e46c34dfa5d44f19fa717,2023-01-26T19:16:48.833000
CVE-2022-45927,0,0,2d8121245e6a894c11dd14ab6a2621d053f515cadd318bd586217b7c82d2c519,2023-01-30T15:28:54.280000
CVE-2022-45928,0,0,c9fcbf662fac772bbbe3bf0a462241c586620e0d0c3e7572d8191497c6265236,2023-01-25T21:28:22.397000
CVE-2022-45929,1,1,804eff6a9e813ba908c66b0caed1d89f08039fee365acb7e14fa733fb9c38028,2024-06-20T17:15:50.127000
CVE-2022-45929,0,0,804eff6a9e813ba908c66b0caed1d89f08039fee365acb7e14fa733fb9c38028,2024-06-20T17:15:50.127000
CVE-2022-4593,0,0,eb6ffb8de64998ea2127551b2c0e8bff71c720033be3ec04cd9cfc44b019f521,2023-11-07T03:58:16.583000
CVE-2022-45930,0,0,c421a42777d5939834ae83348afde1ca99d648269378cede4f668e29a1de4f22,2022-11-30T20:47:36.310000
CVE-2022-45931,0,0,4503725956684c17f88fe293de22602f713acbe0d22ac8ff3064c40a2f3edd38,2022-11-30T20:46:53.243000
@ -228427,19 +228427,19 @@ CVE-2023-3831,0,0,d5b2398abfadc093490d321387115328630e45b3e269abc4fbcad0082e3cfa
CVE-2023-38310,0,0,b2b62da79dc4cd0829d985b78e2a8f71d06cc6085dde75696e6166b006207c20,2023-08-04T12:56:01.327000
CVE-2023-38311,0,0,c00bb2a25d54c6a1ef035344e8ae7cf77bdb6ee39cd119963c6ce89aca75ea60,2023-08-04T12:55:45.233000
CVE-2023-38312,0,0,7844bff0bd9c10a74a4e63d3f1fd3e6cb9d7927b54f3b1dc44629fceac02b7d4,2023-10-19T14:18:26.410000
CVE-2023-38313,0,0,eedd8754e2321b559f0a99b86fac17a33ba14a223c3dbec375d2adcabd8e30ec,2023-11-23T03:37:09.847000
CVE-2023-38314,0,0,c81d755ac83d699881e7ae2953843fbc8d26342441425026c339e53ec4cd8e74,2023-11-23T03:37:21.490000
CVE-2023-38315,0,0,856dec9e73a19ab6c730eb4063dd939684552f3a376a2032d3c2fb51f825b517,2023-11-23T03:34:50.727000
CVE-2023-38316,0,0,98a7499f15521e90612d170b295d65d85cd3f6c4c8c5b0079f3c38bf27e9000d,2023-11-23T03:35:41.227000
CVE-2023-38313,0,1,be27fb457fb737dfca279e09ac2188fb832b982bbb0bb08bc6b5a80e5a212e71,2024-06-20T18:15:10.417000
CVE-2023-38314,0,1,406124ab0a1537d85c3cf4f68f1c58e8bd186465d4ce8b37a0f1b6e6e32f25fd,2024-06-20T18:15:10.557000
CVE-2023-38315,0,1,6bd5b5d343cff8f9e944a5876fa4aca0414a64e91d37ce40553031a7841b7ce9,2024-06-20T18:15:10.663000
CVE-2023-38316,0,1,7514922018cda249414c54af2d69b50c21d2dbd09f36457e7cbb739fc9d18918,2024-06-20T18:15:10.767000
CVE-2023-38317,0,0,3844ec9ba11dc6247243efaf0af9851e8c79728fbe3d2fa3c4b759cbe2daf6a2,2024-02-02T15:54:24.127000
CVE-2023-38318,0,0,40d57e70262f40afcc03b5c855425d6bbdf421521c56264784d1c48b649360f0,2024-02-02T15:54:16.743000
CVE-2023-38319,0,0,638be33943571bd2642eff75a9a4e9af928154555c59b75acf9259e230bfe489,2024-02-02T15:54:04.640000
CVE-2023-3832,0,0,679745d30a373bf30ce3044a1d573767ae6357f576fe034ad2c6c17c4e32274e,2024-05-17T02:27:51.623000
CVE-2023-38320,0,0,e4b0f6ce1ad149ab1f01f3d45a989857094732c11e4f58a2a2dcf281ed71e52d,2023-11-23T03:35:49.027000
CVE-2023-38320,0,1,7ac8b0b1082dda3863738f8ec587595c99f254594ba4c471c7eed4b31938cadb,2024-06-20T18:15:10.873000
CVE-2023-38321,0,0,f5973cfb4c0a06a7be41a46d8689f386803a63b4be6a767cf3778d933f7357d7,2024-01-03T22:30:12.113000
CVE-2023-38322,0,0,6e88e30f3e3d759aed84ad8ff9983317e1047656bd563fd12d1c445311625c24,2023-11-23T03:43:20.190000
CVE-2023-38322,0,1,f806597befac9dcf83066904f3ecadffaacee3d81621c7a3e77fa8e907842bde,2024-06-20T18:15:10.980000
CVE-2023-38323,0,0,b8a4755771c158b0d0921b467af467eb29522a60f4c9d4c8f604325777ec5543,2024-02-02T15:53:56.563000
CVE-2023-38324,0,0,6aef7acd03b3c245dbb2e1d940a7c39ddb2c92369160effe9942a91e37bc0bd7,2024-01-26T05:15:12.203000
CVE-2023-38324,0,1,af82b1dd6ac86e7e5204be843f63377bebca607032fe9354f5127bf935efcbd4,2024-06-20T18:15:11.083000
CVE-2023-38325,0,0,ebd76f247d920ff1243b3d36c8c1fed7e3ca47c4a920d461819a099d81595ee1,2023-11-07T04:17:14.413000
CVE-2023-38326,0,0,6d358f414d0c067b73c03bb6d565fc633e17a4dafa860cc79e195b8e0ea24bbc,2023-11-07T04:17:15.360000
CVE-2023-38328,0,0,84e7054eba86c35725b0e0132f81c8695d265c78e52b01ad0f614a9b6c850667,2023-11-07T17:08:51.110000
@ -230613,8 +230613,8 @@ CVE-2023-41098,0,0,c025f5147acb201a7a82e7ddc766f7a187ed0115626c21d1340a938147fcc
CVE-2023-41099,0,0,2f7ed1bfc6b2d8415ebb005a1061cb50a8cd1311e2e59d23dabc0bfb121dbe69,2024-03-22T15:34:43.663000
CVE-2023-4110,0,0,62dc5e9bf46cc8e619ee56bc7a76f82e9b230f23cc72d0f40c8f22bea091920a,2024-05-17T02:31:19.523000
CVE-2023-41100,0,0,0e98c62233ad8fdc1a0dc794cad2a13de21da53ef316b7fa45391b4c29fb335f,2023-08-28T21:27:36.420000
CVE-2023-41101,0,1,d0585c28bbcdecdc7b3e944f579c3cf2347e368485bfe2cbff69baa9fe655c7b,2024-06-20T16:15:12.713000
CVE-2023-41102,0,0,24e14cf7269a879c0a2e29cb8e7a47a17744976538052a2c5d874ba10e23051c,2023-11-25T02:15:05.617000
CVE-2023-41101,0,1,f0e4fcdc25d45660d87e851fa7c8989fc4a8763942368859f18e9d739c0bb2b3,2024-06-20T18:15:11.237000
CVE-2023-41102,0,1,162f5ecbf4d0ad70d2d3c4f76fa68891315f90a8db2489b9b9b61ba6407c2a5f,2024-06-20T18:15:11.333000
CVE-2023-41103,0,0,2e9c5658d8e085314a307e9b4407246c0a83e99822f5631f35e29f67c6ba9aa3,2023-09-15T14:56:53.237000
CVE-2023-41104,0,0,26b88ec397bfc19eae05a7a32b350924bbd51b39b465df386506014eb416e50f,2023-08-28T21:41:07.790000
CVE-2023-41105,0,0,59eff7f6b797aeb7d9435c5dc53e0dfd19084f7897d66a0f230216b00ed68118,2023-11-07T04:20:53.350000
@ -236154,10 +236154,10 @@ CVE-2023-49107,0,0,0e9af909d621a9c4570185530fdb9aef197de445657f00c33192f11bd7858
CVE-2023-49108,0,0,8b448f813b7f2ff64556bb633e06c1db82194a485a83298972e379416108c845,2023-12-07T17:52:39.950000
CVE-2023-49109,0,0,3bb373d6db941540f9b57f78839d3b030348e834d02ede0d650edc70819635fb,2024-02-20T19:50:53.960000
CVE-2023-4911,0,0,0380760292e65955859c1ea2fd6467a51435ec5fc89240e3b7268906c4542c20,2024-02-22T20:18:58.020000
CVE-2023-49110,0,1,14afbb403bdce5c399c02b1cf9852e203569cee95df8db4bfbab19a13aa207b9,2024-06-20T16:07:50.417000
CVE-2023-49111,0,1,2c29a293b5909ba7498950e26a27ccdc46c68887eb71993c10ceea2f9becaf4b,2024-06-20T16:07:50.417000
CVE-2023-49112,0,1,7b86cdca77612affdb612f88bc8d1c9f0429198621de182bf9de5e5b34b4974a,2024-06-20T16:07:50.417000
CVE-2023-49113,0,1,e0612c46f0857174266622cad8ce046d6e8bc08302342468c7715a276002bc30,2024-06-20T16:07:50.417000
CVE-2023-49110,0,0,14afbb403bdce5c399c02b1cf9852e203569cee95df8db4bfbab19a13aa207b9,2024-06-20T16:07:50.417000
CVE-2023-49111,0,0,2c29a293b5909ba7498950e26a27ccdc46c68887eb71993c10ceea2f9becaf4b,2024-06-20T16:07:50.417000
CVE-2023-49112,0,0,7b86cdca77612affdb612f88bc8d1c9f0429198621de182bf9de5e5b34b4974a,2024-06-20T16:07:50.417000
CVE-2023-49113,0,0,e0612c46f0857174266622cad8ce046d6e8bc08302342468c7715a276002bc30,2024-06-20T16:07:50.417000
CVE-2023-49114,0,0,1149e9644a812fe979090b00a81f87220fd6ab37816f13bf4a0117849686b510,2024-03-03T03:15:07.170000
CVE-2023-49115,0,0,d4487cb956fe9cb8f01ce6d3732e2ed47fd143cb71a5d17fa9999fc2467e49a2,2024-05-17T02:30:59.670000
CVE-2023-49117,0,0,532b60b363b961206673339ea571d1dbd7872affd35f7cb4f7e7a5be2e8191ec,2024-01-04T02:42:06.503000
@ -245882,7 +245882,7 @@ CVE-2024-26023,0,0,03df4473c85ab0c8247169f36cdaabb6d0ade251a86d2a476e4dede57424f
CVE-2024-26024,0,0,446166e750142f30b836c26c29324a3e66b74c06f52673e398585fd034e50e1e,2024-05-29T13:02:09.280000
CVE-2024-26026,0,0,a3caa671cadcbee0b7a7647f8dff9c68f25411a54544c0183999cc9da232fc84,2024-05-08T17:05:24.083000
CVE-2024-26028,0,0,f0eeab6f00388b393e9761660fb13451fd75e54f8248c45c23f5d18cc79809b2,2024-03-18T19:40:00.173000
CVE-2024-26029,0,1,73b1b2a7a164f2d1b52c68fceca6c2cc8b7181b78e4f3a2dcaf477ebe79168d6,2024-06-20T16:03:36.843000
CVE-2024-26029,0,0,73b1b2a7a164f2d1b52c68fceca6c2cc8b7181b78e4f3a2dcaf477ebe79168d6,2024-06-20T16:03:36.843000
CVE-2024-2603,0,0,4c37ef52a7f3919b1ed75f79e6f53895a8c8809eb0619c9287c9e5b10ed97fd0,2024-04-26T12:58:17.720000
CVE-2024-26030,0,0,6e3023416b037dd092fe7b5e942072e3533649d1b2cfd157142cc39338fedbad,2024-03-18T19:40:00.173000
CVE-2024-26031,0,0,ed002faaad586ba4ca84a6198e87a403fdacf5cc79e96297a7527ff0ace203b7,2024-03-18T19:40:00.173000
@ -245983,8 +245983,8 @@ CVE-2024-26122,0,0,ebd0b44b5bc15532d34026512ae127f0930d62b2b57bf3dbe4bee69b04bdb
CVE-2024-26123,0,0,978063f86345e9aabd1ad8bb003ba506cde83ac2c4827bf02945e5b3d4d7ea82,2024-06-14T19:56:46.423000
CVE-2024-26124,0,0,ab8f2017ef0c3d450afff0e4d68ea6b589bbb2fecbbaa8ab6de815da1a5b12bc,2024-03-18T19:40:00.173000
CVE-2024-26125,0,0,0e1aa1a870111e13cba190593df732023dd1a768da77b87d37882fcb57fe6b32,2024-03-18T19:40:00.173000
CVE-2024-26126,0,1,69ef2a9b0be7586f7d0597712d0d37ba22eecee8606909b040fe99e2830cc6f1,2024-06-20T16:02:57.067000
CVE-2024-26127,0,1,d0e762c07655a0d114858a70e842b28c0aa661b36e06ad0fb0f1e56a7272a16e,2024-06-20T16:02:47.140000
CVE-2024-26126,0,0,69ef2a9b0be7586f7d0597712d0d37ba22eecee8606909b040fe99e2830cc6f1,2024-06-20T16:02:57.067000
CVE-2024-26127,0,0,d0e762c07655a0d114858a70e842b28c0aa661b36e06ad0fb0f1e56a7272a16e,2024-06-20T16:02:47.140000
CVE-2024-26128,0,0,c70d7cf32a5694fc3f84894b4fd56cc1fe56399910a443c60418b95af56a6cc6,2024-02-23T02:42:54.547000
CVE-2024-26129,0,0,968e60f64e57be6f8f2df784210f5788e81353ced4a4f4353953a10484d71d0a,2024-02-20T19:50:53.960000
CVE-2024-2613,0,0,d494d0eac9a22f11a08cd41300021a195d2876150771d2f4db832e39cdda2af3,2024-03-19T13:26:46
@ -246706,7 +246706,7 @@ CVE-2024-26996,0,0,cea553e0454def5a96fbfdf9d710c263c431f278cf804a7efd8ec8ff0107b
CVE-2024-26997,0,0,bdfca562d47f9e5d3fc1098c4dacc21d61a7ba014b51a9e792d5f847f7afb48b,2024-05-03T06:15:11.950000
CVE-2024-26998,0,0,822a5cfb35cd9e5868bbf4bda50d2331021edf4824c2d8385d4feca7d97a1dd2,2024-05-13T08:15:11.390000
CVE-2024-26999,0,0,9ac4807c2521e1d8db890c0527b001317552b4ac44ce0b01702365258c787f45,2024-05-03T06:15:12.137000
CVE-2024-2700,0,1,8a91fa87f2e863b341eb07ce9755b5a44b31a2c626fc69e01187b114c8b0f143,2024-06-20T17:15:50.623000
CVE-2024-2700,0,0,8a91fa87f2e863b341eb07ce9755b5a44b31a2c626fc69e01187b114c8b0f143,2024-06-20T17:15:50.623000
CVE-2024-27000,0,0,ad2ef5bdd7c2f9d77d1b6346a92f926b0e0114b79caa616e96d2bb2c427a8aac,2024-05-03T06:15:12.350000
CVE-2024-27001,0,0,f4defde5af84e6133600f9028ad4a44c6061db86e7d3ca3705bde065e8cf1441,2024-05-03T06:15:12.590000
CVE-2024-27002,0,0,6190ad6afa26f7583c9a538caad37267ed161406911969a163db177bf76cd4a6,2024-05-13T08:15:11.473000
@ -247686,7 +247686,7 @@ CVE-2024-28393,0,0,e0c4576a591386616a5436e610cf9896298fbb6cfafc568aeae2cf64152b1
CVE-2024-28394,0,0,f0eb5c2a2e992661c86d431672af612fba506c8020260929356a00254130fb99,2024-03-20T13:00:16.367000
CVE-2024-28395,0,0,82b3598bd12d6612d167521c1ee69fbab81f725a57a13c49e97ed83bf01459b1,2024-03-20T17:18:26.603000
CVE-2024-28396,0,0,08c911aadb83e5362b5d631a35d91514cb49b70b595ec0db66bff1b061c3d497,2024-03-20T17:18:26.603000
CVE-2024-28397,1,1,2b9f4e0a22672315fe044b1ec86ad26ae4877e2653c58b1795e7cd538c077bca,2024-06-20T17:15:50.527000
CVE-2024-28397,0,0,2b9f4e0a22672315fe044b1ec86ad26ae4877e2653c58b1795e7cd538c077bca,2024-06-20T17:15:50.527000
CVE-2024-2840,0,0,0b9b9cf54907fdf1823442cc4c2107a1ff7330df6580a85d873db983a404ff6f,2024-05-02T18:00:37.360000
CVE-2024-28401,0,0,83d95f41ea79f5a899455bbe843f9dc43cbd29f0392a9dd964c37347d6306d48,2024-03-17T22:38:29.433000
CVE-2024-28402,0,0,61ea1531e9fa41a150bc3854f6b2d96efe4af71d76e3f9c52520b041294710ef,2024-04-11T12:47:44.137000
@ -248673,22 +248673,22 @@ CVE-2024-30085,0,0,9e82e66b216cdd366057fdc6f35f1e8f0cf99233e1d8b95971d7041e1eb3a
CVE-2024-30086,0,0,0207882338fd67a29921c4ce278cc49eaa3741765bf3d0737be3bb4d2c47d2b9,2024-06-13T18:36:45.417000
CVE-2024-30087,0,0,1b67bb3eef76d86ffbb10a38ce83762303c8ce546d44fec6cb2ed10776a6daef,2024-06-13T18:36:45.417000
CVE-2024-30088,0,0,7fa57a4d52f44464a8574defcc41d066ac9007484a913ebf598b44883158779d,2024-06-13T18:36:45.417000
CVE-2024-30089,0,0,93512962ce974d553a614b8d2720dde8f878ae27feef9e3a59e1a3ad1c80c595,2024-06-13T18:36:45.417000
CVE-2024-30089,0,1,f43123d3427892d91ebd43ae3925fa106717bafbf8a904c948f1cb809185c0a9,2024-06-20T18:29:16.590000
CVE-2024-3009,0,0,45cbb233e1060c020b98cbac0489f2f2b66b5aca9f357b84710ff55551dcc79e,2024-05-17T02:39:40.367000
CVE-2024-30090,0,0,1d5941ee3964343daabee0cc87d347508df6c11e27e01aaf69cddee19b4cf97d,2024-06-13T18:36:45.417000
CVE-2024-30090,0,1,51bbb126d4a58e13c6e42a2b2d0e6b16c26ba4505c63e3c7254e6d3be084530d,2024-06-20T18:29:05.917000
CVE-2024-30091,0,0,fb37a9e3923f2da0276541c00dae519fa07fe96fe4fc29d88a2b5512a726ce9a,2024-06-13T18:36:45.417000
CVE-2024-30093,0,0,e00ebe23c08938fbee7b4bb0b7b0f9cebfca41e9970b18f769f35e789b17f52f,2024-06-13T18:36:45.417000
CVE-2024-30093,0,1,fd6b58bfd5e83f94674e32c15b0dea388c489b7479e21a48502f960549116cdf,2024-06-20T18:28:55.697000
CVE-2024-30094,0,0,66beadf29cd1ec0d0785fb70ec2a19bc0c2a5cd9d595fbeb0d5d251ca226f6ff,2024-06-13T18:36:45.417000
CVE-2024-30095,0,0,cd7e4d192d304540e26b9fa8e7420439252e9a9d5d2f45744ff6c36447bde441,2024-06-13T18:36:45.417000
CVE-2024-30096,0,0,714efdc0622f75f490795f4f7bf9bcb15940021c88c924fd5b9c8cf5732fa4db,2024-06-13T18:36:45.417000
CVE-2024-30097,0,1,25944033c29661f17e1de2ec1abf0192df5977f8e4787bbd3e39721d628dd07c,2024-06-20T17:51:00.143000
CVE-2024-30099,0,1,dc33acf12182e6454e1a3ecdc588bc9137c14d73f94ad2ded610bb6667a6bd3b,2024-06-20T17:48:07.827000
CVE-2024-30095,0,1,048f96f3e5623a3029a75354689ecb95e74b9de2d640d31eb83d020ed961bdf6,2024-06-20T18:07:39
CVE-2024-30096,0,1,b16928df459df0a0a9efa516a53e9d2dcbaed528ad71c923de834e957208e151,2024-06-20T18:07:54.607000
CVE-2024-30097,0,0,25944033c29661f17e1de2ec1abf0192df5977f8e4787bbd3e39721d628dd07c,2024-06-20T17:51:00.143000
CVE-2024-30099,0,0,dc33acf12182e6454e1a3ecdc588bc9137c14d73f94ad2ded610bb6667a6bd3b,2024-06-20T17:48:07.827000
CVE-2024-3010,0,0,27666e8ead6e529570139216617bb06d1f8e2b7e342f568fb8736cb62dcd604b,2024-05-17T02:39:40.450000
CVE-2024-30100,0,1,36cd7c5f393fb236e239b3f39b42c20bf7d831c3fa7a8ef645f75fac62acdc05,2024-06-20T17:31:07.867000
CVE-2024-30101,0,1,0bec38d6d8ac185906d862c1965fa271c3a269e10cd1eca1349be7fa7804ea2e,2024-06-20T17:24:26.207000
CVE-2024-30102,0,1,fdb60017518c4e4447c4f87ac5e20b8bd141f8c977ea7ed95409f58601a5e359,2024-06-20T17:24:52.287000
CVE-2024-30103,0,1,e9b11315180cc2be70516f393013c4d68dd205d4a54691a3e15d1cbe00247ba4,2024-06-20T17:26:40.603000
CVE-2024-30104,0,1,5a9d1985e988cec27229a284222c230de4fd29fc24d0330a38548721a0729d9d,2024-06-20T17:27:01.447000
CVE-2024-30100,0,0,36cd7c5f393fb236e239b3f39b42c20bf7d831c3fa7a8ef645f75fac62acdc05,2024-06-20T17:31:07.867000
CVE-2024-30101,0,0,0bec38d6d8ac185906d862c1965fa271c3a269e10cd1eca1349be7fa7804ea2e,2024-06-20T17:24:26.207000
CVE-2024-30102,0,0,fdb60017518c4e4447c4f87ac5e20b8bd141f8c977ea7ed95409f58601a5e359,2024-06-20T17:24:52.287000
CVE-2024-30103,0,0,e9b11315180cc2be70516f393013c4d68dd205d4a54691a3e15d1cbe00247ba4,2024-06-20T17:26:40.603000
CVE-2024-30104,0,0,5a9d1985e988cec27229a284222c230de4fd29fc24d0330a38548721a0729d9d,2024-06-20T17:27:01.447000
CVE-2024-30107,0,0,7e9f39013645f69ffc09f932047c5fded8481e31de256075b8ab56490f9048bd,2024-04-19T13:10:25.637000
CVE-2024-3011,0,0,1567706f33ba4a3729190a5acfa17d903c76e23445fbf38d371926fb70a5af71,2024-05-17T02:39:40.533000
CVE-2024-30119,0,0,faff61cb55bb1e1c818b9460a2a056f4c8970e03380dd9d518774564c9b27a5c,2024-06-17T12:42:04.623000
@ -249675,7 +249675,7 @@ CVE-2024-31491,0,0,5f002356f8390a8ec883fdc05cbd199fbc913871302dee308e6ee0aa04c7a
CVE-2024-31492,0,0,a251126d380ad734bdcae40155276c0c8cd0f78c057d6c232814179759c90bf9,2024-04-10T19:49:51.183000
CVE-2024-31493,0,0,eb75479adef565517a6f58901095a4369c3b19ffe56c2adb7b05f607202960e9,2024-06-03T14:46:24.250000
CVE-2024-31495,0,0,42fff448b4240874d456e917ec48e364b4b70752d9d1a1fb76f06c9d7e15c3ee,2024-06-13T18:36:45.417000
CVE-2024-31497,0,0,4e1eafb2dcb4144981ef085a5b8158282c3a0977a083d73fc04d3f981acbd1e7,2024-05-10T14:33:55.323000
CVE-2024-31497,0,1,c39b897f04ef688f063ebceae74c1e66c102d61b4026ee0939893e9ccb564409,2024-06-20T19:15:49.960000
CVE-2024-31498,0,0,db3c4e2337e3fccc66e084ef6016d8532925f451bef4124b0c2782f0c54d90b6,2024-04-08T00:15:08
CVE-2024-3150,0,0,04068d35bd188e4cc82c8fa2f28c620f46e70084f017d1c4b8736ac9a757cf54,2024-06-07T14:56:05.647000
CVE-2024-31502,0,0,52fc3984aab146fd5296bbc2584fa31ec06529d852df83c020a3abdb54510354,2024-04-29T12:42:03.667000
@ -250749,7 +250749,7 @@ CVE-2024-33309,0,0,0ca9c109e2576b4aca347e95c0818278979b0a538a6e9aff426b0e613a867
CVE-2024-3333,0,0,8caee5b26018a8a7a4f06ec5d64d35dd731cf8d2f43a25885f4e67db044a1bff,2024-04-17T12:48:07.510000
CVE-2024-33331,0,0,d376453cc8c649ab7a3cb33fa711c6bde798d37e4f57b1f2e9caeddda1eec751,2024-04-28T23:15:07.120000
CVE-2024-33332,0,0,5b09c1082da77b8d3e91442a2c29c8546356fbe25aeb87e6d3bdb2141a4c33bc,2024-05-01T13:02:20.750000
CVE-2024-33335,1,1,58ae2846fe2874c0adc2490bb8e35d7ccd89db3d503d1af1f83a73dd0dc3ef32,2024-06-20T17:15:50.820000
CVE-2024-33335,0,0,58ae2846fe2874c0adc2490bb8e35d7ccd89db3d503d1af1f83a73dd0dc3ef32,2024-06-20T17:15:50.820000
CVE-2024-33338,0,0,9b8c84dbfacc6e8a05751db225811f66c7a44395ffe03492a33884b37ad228c7,2024-04-30T13:11:16.690000
CVE-2024-33339,0,0,1af2e0249bed8750531b95be13d2086bbc874a9cb43e2918f6202dbfdd9b1a67,2024-04-29T05:15:06.340000
CVE-2024-33342,0,0,0c57431ffa337ca72451a692e966ba73858cd4216e3ebbd13920eb933bab73c3,2024-04-26T19:59:19.793000
@ -251796,17 +251796,17 @@ CVE-2024-3524,0,0,3956193ca7114f5710505c19e3a759f29fdc99e35e3e85d2dfaab62815660b
CVE-2024-35240,0,0,acfeed6c530b591057353f6a14e986e7e3beca50f19145cd1d7655529729bf12,2024-05-29T13:02:09.280000
CVE-2024-35241,0,0,4a6b31c14cd4bc5f7501900c1f56590acd344b1e5ce5ecc61874cf3d14d82318,2024-06-20T09:15:11.993000
CVE-2024-35242,0,0,2e207f0b714427aca575cae65f49ba50d1e8e36b82c7f71cef6b3cbfa7cbc65d,2024-06-20T09:15:12.140000
CVE-2024-35248,0,1,f7c53bc850d23eb0500967bc3fdae9c98dc6938d20a4c4a2eae9a2af005467eb,2024-06-20T16:38:22.977000
CVE-2024-35249,0,1,1a1dd41a82635c8ddd298674d6ef7ab50751606bf1ad25c08d730ac7cfcbceba,2024-06-20T16:39:19.630000
CVE-2024-35248,0,0,f7c53bc850d23eb0500967bc3fdae9c98dc6938d20a4c4a2eae9a2af005467eb,2024-06-20T16:38:22.977000
CVE-2024-35249,0,0,1a1dd41a82635c8ddd298674d6ef7ab50751606bf1ad25c08d730ac7cfcbceba,2024-06-20T16:39:19.630000
CVE-2024-3525,0,0,d160b9aacf64da3afa7deea3824b335adab6f10a287b9b570340cfda8c91ffed,2024-05-17T02:39:58.983000
CVE-2024-35250,0,1,9613cc662bcd468958ab1d264340ab5970d57c7d51a0a393df6626093fc74ea8,2024-06-20T17:10:13.720000
CVE-2024-35252,0,1,758f2260a560b6c02096318d9e5edde43e70f9b910f09bc0f0910e28a06fa731,2024-06-20T17:12:13.843000
CVE-2024-35253,0,1,7f3cc01c59f69efba5c97cba42113678e0d740b7944571f1b3655b792d644968,2024-06-20T17:13:17.437000
CVE-2024-35254,0,1,0c738596f4374792f0d4315cc158b4782661a82b949045579afd98f6532c04a8,2024-06-20T16:16:47.070000
CVE-2024-35255,0,1,9bff5ed53913f2846bd2f5d5a3fe64503b901621ba9a1cf70d44fee71319dada,2024-06-20T16:31:46.127000
CVE-2024-35250,0,0,9613cc662bcd468958ab1d264340ab5970d57c7d51a0a393df6626093fc74ea8,2024-06-20T17:10:13.720000
CVE-2024-35252,0,0,758f2260a560b6c02096318d9e5edde43e70f9b910f09bc0f0910e28a06fa731,2024-06-20T17:12:13.843000
CVE-2024-35253,0,0,7f3cc01c59f69efba5c97cba42113678e0d740b7944571f1b3655b792d644968,2024-06-20T17:13:17.437000
CVE-2024-35254,0,0,0c738596f4374792f0d4315cc158b4782661a82b949045579afd98f6532c04a8,2024-06-20T16:16:47.070000
CVE-2024-35255,0,0,9bff5ed53913f2846bd2f5d5a3fe64503b901621ba9a1cf70d44fee71319dada,2024-06-20T16:31:46.127000
CVE-2024-3526,0,0,7aa053534daa29503e740ad77b77cb47be1c8cd5e2a6b1d98f33dcb689c14e4e,2024-05-17T02:39:59.067000
CVE-2024-35263,0,1,1694ba7e5ce9d31723d43812241a6c815afc20ae5a287a58c23b0184e83d765c,2024-06-20T16:32:31.287000
CVE-2024-35265,0,1,2963d76a456cba4a49f25860d2cc93fc7331d28365d372cc188b58c478b68d21,2024-06-20T16:33:28.080000
CVE-2024-35263,0,0,1694ba7e5ce9d31723d43812241a6c815afc20ae5a287a58c23b0184e83d765c,2024-06-20T16:32:31.287000
CVE-2024-35265,0,0,2963d76a456cba4a49f25860d2cc93fc7331d28365d372cc188b58c478b68d21,2024-06-20T16:33:28.080000
CVE-2024-3528,0,0,12c1cd3d931c23013d321f77d84374875132cb3a519f997e82936b57d5eb40c0,2024-05-17T02:39:59.157000
CVE-2024-35283,0,0,80c087b52accf20db1ec4ad086b8699369207093a56ca1d349d7c5f6028bda2d,2024-05-29T19:50:25.303000
CVE-2024-35284,0,0,ee24a2e7de9810383b7ae424a9dbbfe06080409833dff0969376cd49b76d4dd0,2024-05-29T19:50:25.303000
@ -252500,7 +252500,7 @@ CVE-2024-36221,0,0,2c46cdd47e910a4fc18e0dd65366030bdc1eb4d14ec50fb4c46fb03d63f12
CVE-2024-36222,0,0,a8ee0e561dcb5bfbba224cb0539031d96c298ae7a136bc37d3ec9a0970e67bf5,2024-06-17T19:45:39.257000
CVE-2024-36224,0,0,5c74dec5f032580ca9e70dab38c4d47b808d869c78d9a9688f6eb49fd80615a0,2024-06-17T19:45:13.547000
CVE-2024-36225,0,0,fd495a92f56159f6c10cf6177a32831d7edff99b61db5bcc3c4fb3be2c44c3a1,2024-06-17T19:37:58.810000
CVE-2024-36226,0,1,319a9843d092e3dc1191a515bf406060f528082f8d0bf97942cd2caf088d3b95,2024-06-20T16:02:34.930000
CVE-2024-36226,0,0,319a9843d092e3dc1191a515bf406060f528082f8d0bf97942cd2caf088d3b95,2024-06-20T16:02:34.930000
CVE-2024-36227,0,0,0727e710473b979985d78ae6dfdcf5bbfe49764851873d8fa20d40ec22a1b513,2024-06-17T20:12:46.843000
CVE-2024-36228,0,0,65510ba3cdacba606cb5a9fef50b70f0ee46d90d949d966d3d92c163b9b3873c,2024-06-17T20:12:35.727000
CVE-2024-36229,0,0,a39557b42f1caf4ea230e4d2a203d0da66fd7040dc63c4022fbe68826330238b,2024-06-17T20:12:20.760000
@ -252915,7 +252915,7 @@ CVE-2024-3719,0,0,d2320674d04cefde56a0b36b463f74328d6f18494803030bdfe9b0b1b4374a
CVE-2024-3720,0,0,f4e69514093cc630aeda39d0a41fe705e0d9916a1077cef429b7dcf05a404308,2024-06-04T19:20:23.660000
CVE-2024-3721,0,0,ec8dc4b0ad5d1d9ba11acb18015142f7d1715fd653f7ca2987e266e9c9e8ef01,2024-05-17T02:40:05.290000
CVE-2024-3722,0,0,7c1b4fae7e86bf4c1bc76a0d39819ffc592a7b598c7675ac0628daa278671c4c,2024-05-14T16:11:39.510000
CVE-2024-37222,0,1,e3854190ae5f204130ec2bf60ebf4545f7f4ab46bc8f721b8932179fa98e8ec4,2024-06-20T16:07:50.417000
CVE-2024-37222,0,0,e3854190ae5f204130ec2bf60ebf4545f7f4ab46bc8f721b8932179fa98e8ec4,2024-06-20T16:07:50.417000
CVE-2024-3723,0,0,21c397ab5e875f2652ba15d9001cdd8ef5c5941ff996881e18084aebeaee892e,2024-06-11T13:54:12.057000
CVE-2024-3724,0,0,a2f08bb0a2e36a5c374b862fb3e4beff315b3d6672953c5eeabe10290b435e2c,2024-05-02T18:00:37.360000
CVE-2024-3725,0,0,dd194c190207038aca40dcc17eaac7bd7c6f9f34e04d00c016e0de6cd9837da0,2024-05-02T18:00:37.360000
@ -252952,13 +252952,17 @@ CVE-2024-3732,0,0,47b10b9e83ea0bac70990c3295c25b56cc73657af82bc6f5c1f4fd37930f5e
CVE-2024-37325,0,0,4bdf16d6dc352d9a71b64c0e4ef24afec0a8a1802309c44aecb9b675414655d5,2024-06-13T18:36:09.013000
CVE-2024-3733,0,0,a4296992076c9e80c22dc80bc25acdd9a6af961376871659e0386f3449f48613,2024-04-25T13:18:13.537000
CVE-2024-3734,0,0,b86ed30811a3326be0f0dac4d727bf041d17d1a4d696b5825133800b3e1e6da3,2024-05-02T18:00:37.360000
CVE-2024-37343,1,1,b307ad5b34e53e444d552876c1852802ea3c78a8d0c588f184aa1acde616f148,2024-06-20T17:15:50.910000
CVE-2024-37344,1,1,efed33a33f8007937a8bcd201239f66784f62520cc66858380a11d4e88c3e9a0,2024-06-20T17:15:51.153000
CVE-2024-37345,1,1,38aff5b498d434a10dae67158b1c5ff6d04a0f462ab71dc8f42f63dfc74a8365,2024-06-20T17:15:51.397000
CVE-2024-37346,1,1,fcd6b63a7ef26227baad04b31c0860e8d816805251ec8b9ab287d7b0e0738222,2024-06-20T17:15:51.623000
CVE-2024-37347,1,1,18c3a5f4064b6e5eb61b8dc4e72a4af3c4ee8b4903742a933262f840fffa3ee8,2024-06-20T17:15:51.853000
CVE-2024-37348,1,1,b9285d499a868c307de4618d31f093339fcc6bc9dd3d1b0204527317cb1f4b4d,2024-06-20T17:15:52.080000
CVE-2024-37343,0,0,b307ad5b34e53e444d552876c1852802ea3c78a8d0c588f184aa1acde616f148,2024-06-20T17:15:50.910000
CVE-2024-37344,0,0,efed33a33f8007937a8bcd201239f66784f62520cc66858380a11d4e88c3e9a0,2024-06-20T17:15:51.153000
CVE-2024-37345,0,0,38aff5b498d434a10dae67158b1c5ff6d04a0f462ab71dc8f42f63dfc74a8365,2024-06-20T17:15:51.397000
CVE-2024-37346,0,0,fcd6b63a7ef26227baad04b31c0860e8d816805251ec8b9ab287d7b0e0738222,2024-06-20T17:15:51.623000
CVE-2024-37347,0,0,18c3a5f4064b6e5eb61b8dc4e72a4af3c4ee8b4903742a933262f840fffa3ee8,2024-06-20T17:15:51.853000
CVE-2024-37348,0,0,b9285d499a868c307de4618d31f093339fcc6bc9dd3d1b0204527317cb1f4b4d,2024-06-20T17:15:52.080000
CVE-2024-37349,1,1,e96bf6f7b240c65dedda0bdf5387b1908dd5094c3aae19051bc041df07ea392f,2024-06-20T18:15:11.850000
CVE-2024-3735,0,0,5ddf2e7f4a48d9adc915c53e5374d23792eebb62d6ec39c5c6eab645f0c5ac5e,2024-05-17T02:40:05.693000
CVE-2024-37350,1,1,e77108b3959438be6ac3a3fdd5c1ff6cf30bfc778ae6d3029adb673cb69e4989,2024-06-20T18:15:12.103000
CVE-2024-37351,1,1,dd12bdf4f42fc309abd00492884bd5f1292ed0501d3e5990fda1c0b8c4412efd,2024-06-20T18:15:12.347000
CVE-2024-37352,1,1,a247ec4e04c16dc21d18896eebf02a233f7c6c2e883c5692f35053293234d6c9,2024-06-20T18:15:12.590000
CVE-2024-3736,0,0,8212a13db4363d6279d1d8c19924659c1f0cf224cf46584ea7e82cad3d6da340,2024-06-04T19:20:23.987000
CVE-2024-37364,0,0,070f30cc4e6616b0f0ef3a023c4cee97eb2b6bdbb7bd742359fc5c6826335718,2024-06-07T14:56:05.647000
CVE-2024-37367,0,0,aac603db5bb919680e2cd819ce6cb6ca25ea592fb28f92a3759e9a2fd18ea95d,2024-06-17T12:42:04.623000
@ -252987,7 +252991,7 @@ CVE-2024-3748,0,0,b0e27aec04ee07a8ce410bb6d8c3b0277cb63dc4584c172af60f83cc3e59cf
CVE-2024-3749,0,0,e5012183af13abb8287d9f7e2369a778a614f06e1c5ed11cd73c4e040e4a12f2,2024-05-15T16:40:19.330000
CVE-2024-3750,0,0,803f7e301e80982b4e00371ccc1f410724a29d03fdd424fb4c54aeb0b034ff94,2024-05-16T13:03:05.353000
CVE-2024-3752,0,0,06a3522f543993aef42f352f0c011207c560c2e5a1d63c9d8ccc34a87adab0ce,2024-05-06T12:44:56.377000
CVE-2024-37532,0,1,a5ac3835be74cd12988df6c2a541d22b1ccfee745808b8a54c22b593fc4b3bed,2024-06-20T16:07:50.417000
CVE-2024-37532,0,0,a5ac3835be74cd12988df6c2a541d22b1ccfee745808b8a54c22b593fc4b3bed,2024-06-20T16:07:50.417000
CVE-2024-37535,0,0,07f7d930de9d2427116ed26f9657c7962aa8122c29cd0ba965c2b1ee75b9b36e,2024-06-10T17:16:32.753000
CVE-2024-3754,0,0,01f193c84b52f462bda07bbe4a51fb49e63cd8bf2361f6b49c817e3a59b81e5a,2024-06-17T12:42:04.623000
CVE-2024-3755,0,0,255cc63bdc34aca663119fb8f6757a7da5a9acef7ecda034d88dc05babf4b05b,2024-05-06T12:44:56.377000
@ -253007,7 +253011,7 @@ CVE-2024-37622,0,0,c5ce5e55072739c990e174478f39d68c083974ab6129554da5a4e33caf326
CVE-2024-37623,0,0,d8395bc9979b8438bd8a5fcda64469a56ed1c7b2c754f62d69464aad225f7a8d,2024-06-20T12:44:22.977000
CVE-2024-37624,0,0,c67dc5f200fd7bd4558aaa3dba0b70e30788e7a5243808acd6e7683dc3c78ae7,2024-06-20T12:44:22.977000
CVE-2024-37625,0,0,a02e4bb7abe01fe5f5451064a7b8497a50e5fc7fa5bd1988eae82c585b3c68a7,2024-06-20T12:44:22.977000
CVE-2024-37626,1,1,8cddba759506552c7a4687a12e9dd5b7e6c609c6ccd3a239c2734e2db82c4f8e,2024-06-20T17:15:52.353000
CVE-2024-37626,0,0,8cddba759506552c7a4687a12e9dd5b7e6c609c6ccd3a239c2734e2db82c4f8e,2024-06-20T17:15:52.353000
CVE-2024-37629,0,0,1d00756a2a17c559759065d32584e34ded12669fdde5bf74562dbb03b1828152,2024-06-13T18:36:09.010000
CVE-2024-3763,0,0,d4a43b988d4f5ccf2146c95730aa308ab303229339c58dc3a72b2fdabbe91a36,2024-06-05T20:15:13.530000
CVE-2024-37630,0,0,bf66b2030be40d35050885498117395fd763796c76fee3b35b96849113224fa0,2024-06-13T18:35:19.777000
@ -253026,16 +253030,18 @@ CVE-2024-37643,0,0,dd4dd1cf62f3e08f00b2f338cadf964b79fd48d825ed68a41a2bd5d2e825e
CVE-2024-37644,0,0,5f7f97e28e218e3fb348230aa8347ee3b0354d72853f4d6c2591e151f0231333,2024-06-17T12:42:04.623000
CVE-2024-37645,0,0,1f2d6a8f87fac13d3d11d6cbec3b695ad44ed6f32f14768d5b077122546347a3,2024-06-17T12:42:04.623000
CVE-2024-3765,0,0,4fdba2eb80818b350bc57cc64ca06a70a8e5d2cec5cc9e99a6b5fff1df632742,2024-05-17T02:40:06.923000
CVE-2024-3766,0,1,332312c4ae938e5b9f3b0590f4ebc42c71b180341fc998112e3b0be5e6d60da1,2024-06-20T16:15:14.380000
CVE-2024-3766,0,0,332312c4ae938e5b9f3b0590f4ebc42c71b180341fc998112e3b0be5e6d60da1,2024-06-20T16:15:14.380000
CVE-2024-37661,0,0,81e23698cd648834aff1e39e66ffecdc62f564b919dc4643e362915df5fa1b2a,2024-06-20T12:44:22.977000
CVE-2024-37662,0,0,2581d16ac0c1e64ed9489a4956fd58fc745c5ab4cf8c43694c38d8d5ee60569c,2024-06-20T12:44:22.977000
CVE-2024-37663,0,0,461ef2b627ebaf037724a15235d82a1820114435949dedc6f8dbf4f5fc8f77a4,2024-06-20T12:44:22.977000
CVE-2024-37664,0,0,d12e16fb3db0b4b5d59f6bea6df277ad2fce6c983f4f02a9c54b534ba9c1963c,2024-06-20T12:44:22.977000
CVE-2024-37665,0,0,65120387c81349907f7a4a053373f743b497b218da3e8528d2288dae639dbb17,2024-06-13T18:36:09.010000
CVE-2024-3767,0,0,8ba3fcd8961d67ee2d120eabc736772a73aa38bca02250a44c8bb4877d64b7d4,2024-06-05T20:15:13.643000
CVE-2024-37676,1,1,5f14878ec51739144d790dc3ec11a7d25457c3021c3eb2b333dc82f418450ff4,2024-06-20T16:15:13.917000
CVE-2024-37674,1,1,590937f8dc578c8c680333bd613f67e674944bfe412420c95f17ddc377841de1,2024-06-20T18:15:12.833000
CVE-2024-37676,0,0,5f14878ec51739144d790dc3ec11a7d25457c3021c3eb2b333dc82f418450ff4,2024-06-20T16:15:13.917000
CVE-2024-3768,0,0,778d3eea8bf87c1f80239f04628ed71cfd577dabb0ce88459344c4cd4d61bb16,2024-05-17T02:40:07.203000
CVE-2024-3769,0,0,a35a1a6580261497cd040b87c6b68395a49a236a06454712c9a126123641e120,2024-05-17T02:40:07.297000
CVE-2024-37699,1,1,21a99b1deadf1d50b3e3e97ea6b90cefefbc3256be6b30b11bd623fa65d58cc5,2024-06-20T18:15:12.920000
CVE-2024-3770,0,0,8954a3ad0db5fc9b48d9243a1de01e444d03084d0f8b5d5da9ebc562e8f0e6a6,2024-05-17T02:40:07.387000
CVE-2024-3771,0,0,1bf22922ed0657906343b6368a2362d22a78a1ff9d5272db064e582b3b0855d4,2024-05-17T02:40:07.477000
CVE-2024-3772,0,0,184d29c2faf230c27e7c42ad45c478e7862cbffdde795ec4220824e36861b510,2024-04-26T02:15:06.983000
@ -253054,6 +253060,7 @@ CVE-2024-37800,0,0,36eed506d2f5ce9d6b2834586124ecf9a503dd8108d250049c63e00ddb716
CVE-2024-37802,0,0,81dd912a99a788ace360667b22054f8192c4e36f358a19747d18c874d2ebd289,2024-06-20T12:44:01.637000
CVE-2024-37803,0,0,4f3db0375a36967be1dadee84c3c9799655c3891ffc2301c21194d9aedc22218,2024-06-20T12:44:01.637000
CVE-2024-3781,0,0,bf710215509c2fb5fefd67fb85930537c2ce3a67160738297841ece3c75d6fc6,2024-04-15T19:12:25.887000
CVE-2024-37818,1,1,dd478c68b7907d157c592898fc93858e1510e4d7ae904127f7f08bb190772ee6,2024-06-20T19:15:50.260000
CVE-2024-3782,0,0,c95ea596dccb3636dd3691321b5a7a48aa3ee2b08cd07f6f17f6b9ebb6c70325,2024-04-15T19:12:25.887000
CVE-2024-37821,0,0,69c8b0f219772ac85c00d152695d2a6db130f2920e14ec06f202587157691baf,2024-06-20T12:44:01.637000
CVE-2024-37828,0,0,1aec682223533f9f2174345c4486cdc5644002780b6ea2a3830079cc11688c3e,2024-06-20T12:44:22.977000
@ -253085,6 +253092,7 @@ CVE-2024-37891,0,0,7f699fe1f8c4a3ec8703a81c424d14c0900900ca3b4179e40a6b3b715e3f3
CVE-2024-37893,0,0,41d25d093dc6fff20a6eda85ded9c0383f2159fafb609c8080b75906fa502b74,2024-06-20T12:44:22.977000
CVE-2024-37895,0,0,5a205f11ced3309e1f825afc55d41c5d514e9d7238b82fe13249e658f1877f11,2024-06-20T12:44:22.977000
CVE-2024-37896,0,0,85ccee04f37e2b1a04ceeddd19a029b9400fb1a43ccfa07a1fe5a65adbb32b4e,2024-06-20T12:44:22.977000
CVE-2024-37897,1,1,e6ae1c8e34d7f51863033715f42f9cb7cd177e4b9a1bb2319f5f32d401b82d61,2024-06-20T18:15:13.023000
CVE-2024-3790,0,0,ea62135e66a6e7a74daddc8d443b8b9750f000d596c0e5f30e202f53e21ec40b,2024-05-14T16:11:39.510000
CVE-2024-37902,0,0,64cca10e7e3ace20e9d59c9293b434dbb2c9acda55554e640303530aeeaef0aa,2024-06-20T12:44:22.977000
CVE-2024-37904,0,0,7359ae18b288eca288056e2ff119b59a0b9c9bbf3f0e5a23aea1f27fd550dd3f,2024-06-20T12:44:01.637000
@ -253439,7 +253447,7 @@ CVE-2024-4069,0,0,f8d2f2628e60be749b9734b09218105a0396eae1a8a4c94b50114640615c82
CVE-2024-4070,0,0,611b2353a344eebf4d3d821b72a7661978c51598fabebbafad7cb3b8eb92ba73,2024-06-04T19:20:29.567000
CVE-2024-4071,0,0,1e5173381da62898dd2d89e779aa47e534c3be7a31fd5b5ef289e0ef19550704,2024-05-17T02:40:14.747000
CVE-2024-4072,0,0,784007d6b97ec8386adb736eb517146413a15dc1e1dcfd437022813999836276,2024-05-17T02:40:14.847000
CVE-2024-4073,0,1,5460f6bdc865d431bd727de7949389de11def3a1309fd53b91c80f09825c0c03,2024-06-20T16:15:14.530000
CVE-2024-4073,0,0,5460f6bdc865d431bd727de7949389de11def3a1309fd53b91c80f09825c0c03,2024-06-20T16:15:14.530000
CVE-2024-4074,0,0,0eb3d84ea134f52e33abc34cb068e49511715452b56aeac28482d1d153123edb,2024-05-17T02:40:15.077000
CVE-2024-4075,0,0,61cfb92eb2dc2fb6e0ff8370e47bd10bfd7f8ca1c4517b0742f92f6865b710f5,2024-05-17T02:40:15.170000
CVE-2024-4077,0,0,88c9fb35aec8dbee15c3169eb34c083d7cc8d7a290cdea9208a3041187ada836,2024-04-25T13:18:02.660000
@ -254246,7 +254254,7 @@ CVE-2024-5152,0,0,897a950e1a56cf66b3762a0b7d02348f108b131c1556072d1a2c46cab20012
CVE-2024-5153,0,0,828bf0d922f71aaeb9a620d2a28fca02e54e4a39590cf3792a194a4a5970d881,2024-06-06T14:17:35.017000
CVE-2024-5154,0,0,82d1e95029eac2df4860f47fd1c212761a30dff3def51a0032e4827082a89098,2024-06-18T10:15:10.640000
CVE-2024-5155,0,0,2a20a869c58a8b80fd2bd862f76df12b43c40fbeec518ecb9ca464561a78cd98,2024-06-17T12:42:04.623000
CVE-2024-5156,0,1,10b6cd4a2fc89623c9fe2066200310b80c5b328e573b3bfef24549039f38ac0c,2024-06-20T16:07:50.417000
CVE-2024-5156,0,0,10b6cd4a2fc89623c9fe2066200310b80c5b328e573b3bfef24549039f38ac0c,2024-06-20T16:07:50.417000
CVE-2024-5157,0,0,968c06835e3febdba747d4dd49e60507daf1a01e5377b117ee6e566931506abf,2024-06-10T18:15:37.893000
CVE-2024-5158,0,0,76369e6e46f6c34bbc5a354a762f99c1a790d22381b6a166821eb73e4f6cf9b3,2024-06-10T18:15:37.953000
CVE-2024-5159,0,0,21e48f9c116346beacd1ff1b36dcd3eeb5d22159bc679bcf4bc325526369218a,2024-06-10T18:15:38.010000
@ -254615,8 +254623,8 @@ CVE-2024-5812,0,0,b231b6b4b2edc3b100956cc90803ec880aa99de51e5a0f50bc4b9e381c5722
CVE-2024-5813,0,0,d695683c807a1777a11ef158e495934f31ab7056ebdb25d58f5f11112f2d1965,2024-06-13T18:36:45.417000
CVE-2024-5825,0,0,800930249192b4fb36871d2a50a6622621c6dfa5eae6376e2c2995741b4630b2,2024-06-11T10:15:13.960000
CVE-2024-5829,0,0,ece2333b3f7675cb0340d51c6d538163a9e25ac5d3d71e718ed0157d499370ee,2024-06-11T14:15:13.150000
CVE-2024-5830,0,1,5f4bf808197d5a7b772747b643a0383fdea3711f7dd7ea33605632692edfb8a3,2024-06-20T16:06:51.777000
CVE-2024-5831,0,1,c35637e034efcc83b783b4655f443c13f97dc7117fc74da74daea6635b01f1bf,2024-06-20T16:07:02.127000
CVE-2024-5830,0,0,5f4bf808197d5a7b772747b643a0383fdea3711f7dd7ea33605632692edfb8a3,2024-06-20T16:06:51.777000
CVE-2024-5831,0,0,c35637e034efcc83b783b4655f443c13f97dc7117fc74da74daea6635b01f1bf,2024-06-20T16:07:02.127000
CVE-2024-5832,0,0,f6f7614a6d74b1d3bbc420f9681758a802e78db48e4c0857fdd0315a9c96e2df,2024-06-20T15:09:08.407000
CVE-2024-5833,0,0,5b40c0a16c7d2ef5b3ac59bff5edeb1c79ffbdbe857cc12dfe0a4e6ae3c21dc4,2024-06-20T15:09:20.810000
CVE-2024-5834,0,0,25c6dd26bcb2ab9bba361f180488ba9093d88a3197cd87967df7b7dddbf91a3b,2024-06-20T15:07:28.820000
@ -254709,7 +254717,7 @@ CVE-2024-6065,0,0,8dd99f4d37f301246412681f45228fac07d3ea15c1391b550b52738ce1d9d0
CVE-2024-6066,0,0,bdecbe263c05a4772a78f07626fc1e3f9d1817cac413c3ff735f168ece871a97,2024-06-20T12:44:01.637000
CVE-2024-6067,0,0,6728784af54ae6b64b1bb52b7887afb1ba68c7ac0e5f2ef2339910430d39d127,2024-06-20T12:44:01.637000
CVE-2024-6080,0,0,adb3e70f170e91cc2a703b54ba2915021bd3bf11cdec3f426a1169556de7cdf0,2024-06-20T12:44:01.637000
CVE-2024-6082,0,0,1d236589845be46c55129b507b1dd3b80bd97a229aa963846065aaa4c28f158d,2024-06-20T12:44:01.637000
CVE-2024-6082,0,1,fb01e1189e5a394e265b664904a3543325f650fe09e01ea1f771a4558bb8508b,2024-06-20T19:15:50.437000
CVE-2024-6083,0,0,7e7a5636ed7255d0fcfcd2ad673b2a41cb1a824617e25b4cc387230a5aebb333,2024-06-20T12:44:01.637000
CVE-2024-6084,0,0,7af730199a10f594b6ce1f1e9ecc3a7779c7858f9e2bf364f776ef80922995a6,2024-06-20T12:44:01.637000
CVE-2024-6100,0,0,a135aa8fa888be5c77b5c9488d452903ca9c300de047fac5a738e14f389e97d1,2024-06-20T15:18:01.470000
@ -254734,24 +254742,24 @@ CVE-2024-6143,0,0,8ecb1606cf08b70c452136729986c382308670f8f5aa74c9caba844228d971
CVE-2024-6144,0,0,282f248ec161eadd8599a33b6d11a75bd4ed1ccd1aa15e9b959a4a72d41d30ce,2024-06-20T12:44:01.637000
CVE-2024-6145,0,0,74f99a0157ef2eb5160bc64159bab3cd3614efb0f0cae9420b13288ce6d516ff,2024-06-20T12:44:01.637000
CVE-2024-6146,0,0,835232b778d7e80b1c73cad2f19f1275692bff270d5e664fd4c7fc64973110ef,2024-06-20T12:44:01.637000
CVE-2024-6162,0,1,f8253a5ab864fdd368c99fd2623344b80f67593d3636e1d988c09de988f4984c,2024-06-20T16:07:50.417000
CVE-2024-6162,0,0,f8253a5ab864fdd368c99fd2623344b80f67593d3636e1d988c09de988f4984c,2024-06-20T16:07:50.417000
CVE-2024-6176,0,0,855875508d6019a3b7cc5455db83c0ed155c5813092b253896702a30576b2ecb,2024-06-20T12:43:25.663000
CVE-2024-6177,0,0,a0175799dd5324c2ac4fd3e8bb126589ce94cff0760703c070fdf39975a6cb07,2024-06-20T15:17:06.493000
CVE-2024-6178,0,0,00ba2b35f2bf326cfb9273c7e4ce551fc75b5ea6ed8191a2797d46901c2c36b7,2024-06-20T15:16:58.507000
CVE-2024-6179,0,0,e8ab8321b5bc66435edd1d020000d62a9dfc389aa4976b99e9d8c89f0a352015,2024-06-20T15:16:47.133000
CVE-2024-6181,0,0,0da974dd3023ed556a9ed161f83e3c1684d21611899e57e27a1b7870d01089d3,2024-06-20T14:15:11.837000
CVE-2024-6182,0,1,55f26575758ff8ae57363c186f0de2f9404668e8c393b1bfe0761bb40f1950ac,2024-06-20T16:15:14.807000
CVE-2024-6183,0,1,e97bba1e0824305876e4e9b2d4b538d4d68a3fe9088c52f1a208b0b80681da31,2024-06-20T16:15:14.903000
CVE-2024-6182,0,0,55f26575758ff8ae57363c186f0de2f9404668e8c393b1bfe0761bb40f1950ac,2024-06-20T16:15:14.807000
CVE-2024-6183,0,0,e97bba1e0824305876e4e9b2d4b538d4d68a3fe9088c52f1a208b0b80681da31,2024-06-20T16:15:14.903000
CVE-2024-6184,0,0,1b6140592460770db25ed40598b0fdd49cbe87bc7bdeb18f2d5b5a4a924539ba,2024-06-20T14:15:11.953000
CVE-2024-6185,0,0,1dc0b9263b85bb33ca9310e6b4c081d0f0e1e123ba9f93581c17c7bd1d1c72e2,2024-06-20T12:43:25.663000
CVE-2024-6186,0,1,3dac30a7cdc544a2490dcbbc6d37aaada7b4b015a652be43196a5ba4893d22f0,2024-06-20T16:07:50.417000
CVE-2024-6187,0,1,955ad4d5d4c708764babb55ab3f5b4b80280257ca9576e0c2e2c31f96fc1762a,2024-06-20T16:07:50.417000
CVE-2024-6188,0,1,c44a65f859c0ca942b8145efa29b96b03c9966a4e0603a5557add090652ddd8e,2024-06-20T16:15:15.003000
CVE-2024-6189,0,1,9bdf8ff8889c2c479b8223f49300048123af83d854975208bf8a89581f438494,2024-06-20T16:07:50.417000
CVE-2024-6190,0,1,98f90bb016bf16a99aac893601d28675398bcae3e6f50635a05d9d824f92a990,2024-06-20T16:07:50.417000
CVE-2024-6191,0,1,ffe5fba5ce973c97fc731563285b4e878415b4feed7678ba315acdcd925defa0,2024-06-20T16:07:50.417000
CVE-2024-6192,0,1,1aeeababd594a0c0d5dd72dc64fe73201f913d0d34d8e0c49ca22c4ddb951d30,2024-06-20T16:07:50.417000
CVE-2024-6193,1,1,f93bc858786493f731d76dbd605a4a98441b0bccd34706f81165487a2090291d,2024-06-20T16:15:15.110000
CVE-2024-6194,1,1,af569fd39235f04aafa2db90bc19151f8ff27beee9d18fcd6d54b63d95390395,2024-06-20T16:15:15.393000
CVE-2024-6195,1,1,d5c01b01fd38d8982369170a21c862bc57e358df573913b87fdad7130218214b,2024-06-20T16:15:15.680000
CVE-2024-6196,1,1,feb3a9ca99fc92865b5eafb3c719dfb44b6369656c30eb62f5bf1cd1c3ac2817,2024-06-20T16:15:15.967000
CVE-2024-6186,0,0,3dac30a7cdc544a2490dcbbc6d37aaada7b4b015a652be43196a5ba4893d22f0,2024-06-20T16:07:50.417000
CVE-2024-6187,0,1,c6d6f0601c7a6184ad1b4d3e413c26bdab6fae0e4608a0ccda80898a203af1ba,2024-06-20T19:15:50.553000
CVE-2024-6188,0,0,c44a65f859c0ca942b8145efa29b96b03c9966a4e0603a5557add090652ddd8e,2024-06-20T16:15:15.003000
CVE-2024-6189,0,0,9bdf8ff8889c2c479b8223f49300048123af83d854975208bf8a89581f438494,2024-06-20T16:07:50.417000
CVE-2024-6190,0,0,98f90bb016bf16a99aac893601d28675398bcae3e6f50635a05d9d824f92a990,2024-06-20T16:07:50.417000
CVE-2024-6191,0,0,ffe5fba5ce973c97fc731563285b4e878415b4feed7678ba315acdcd925defa0,2024-06-20T16:07:50.417000
CVE-2024-6192,0,1,28332507ece6baa0667f638af15d4c4cdb774188d32b84f5c47ffa2d494a27ad,2024-06-20T18:15:13.337000
CVE-2024-6193,0,0,f93bc858786493f731d76dbd605a4a98441b0bccd34706f81165487a2090291d,2024-06-20T16:15:15.110000
CVE-2024-6194,0,0,af569fd39235f04aafa2db90bc19151f8ff27beee9d18fcd6d54b63d95390395,2024-06-20T16:15:15.393000
CVE-2024-6195,0,0,d5c01b01fd38d8982369170a21c862bc57e358df573913b87fdad7130218214b,2024-06-20T16:15:15.680000
CVE-2024-6196,0,0,feb3a9ca99fc92865b5eafb3c719dfb44b6369656c30eb62f5bf1cd1c3ac2817,2024-06-20T16:15:15.967000

Can't render this file because it is too large.