mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-05-08 11:37:26 +00:00
Auto-Update: 2024-08-06T08:00:17.745460+00:00
This commit is contained in:
parent
2bc39b9fea
commit
d9f1ad457a
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2015-2877",
|
||||
"sourceIdentifier": "cret@cert.org",
|
||||
"published": "2017-03-03T11:59:00.147",
|
||||
"lastModified": "2024-05-17T01:04:04.807",
|
||||
"lastModified": "2024-08-06T06:15:20.940",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [
|
||||
{
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2015-5215",
|
||||
"sourceIdentifier": "secalert@redhat.com",
|
||||
"published": "2020-02-17T19:15:11.617",
|
||||
"lastModified": "2024-05-17T01:05:03.100",
|
||||
"lastModified": "2024-08-06T07:15:35.900",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [
|
||||
{
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2015-5377",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2018-03-06T20:29:00.390",
|
||||
"lastModified": "2024-05-17T01:05:07.697",
|
||||
"lastModified": "2024-08-06T07:15:38.600",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [
|
||||
{
|
||||
|
29
CVE-2024/CVE-2024-419xx/CVE-2024-41995.json
Normal file
29
CVE-2024/CVE-2024-419xx/CVE-2024-41995.json
Normal file
@ -0,0 +1,29 @@
|
||||
{
|
||||
"id": "CVE-2024-41995",
|
||||
"sourceIdentifier": "vultures@jpcert.or.jp",
|
||||
"published": "2024-08-06T07:15:46.330",
|
||||
"lastModified": "2024-08-06T07:15:46.330",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Initialization of a resource with an insecure default vulnerability exists in JavaTM Platform Ver.12.89 and earlier. If this vulnerability is exploited, the product may be affected by some known TLS1.0 and TLS1.1 vulnerabilities. As for the specific products/models/versions of MFPs and printers that contain JavaTM Platform, see the information provided by the vendor."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://jp.ricoh.com/security/products/vulnerabilities/vul?id=ricoh-2024-000010",
|
||||
"source": "vultures@jpcert.or.jp"
|
||||
},
|
||||
{
|
||||
"url": "https://jvn.jp/en/jp/JVN78728294/",
|
||||
"source": "vultures@jpcert.or.jp"
|
||||
},
|
||||
{
|
||||
"url": "https://www.ricoh.com/products/security/vulnerabilities/vul?id=ricoh-2024-000010",
|
||||
"source": "vultures@jpcert.or.jp"
|
||||
}
|
||||
]
|
||||
}
|
60
CVE-2024/CVE-2024-57xx/CVE-2024-5708.json
Normal file
60
CVE-2024/CVE-2024-57xx/CVE-2024-5708.json
Normal file
@ -0,0 +1,60 @@
|
||||
{
|
||||
"id": "CVE-2024-5708",
|
||||
"sourceIdentifier": "security@wordfence.com",
|
||||
"published": "2024-08-06T06:15:34.460",
|
||||
"lastModified": "2024-08-06T06:15:34.460",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "The WPBakery Visual Composer plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the \u2018link\u2019 parameter in all versions up to, and including, 7.7 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Author-level access and above, and with post permissions granted by an Administrator, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security@wordfence.com",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 6.4,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 3.1,
|
||||
"impactScore": 2.7
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security@wordfence.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://wpbakery.com/",
|
||||
"source": "security@wordfence.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/23ff12f0-eb9d-4bb3-8db0-0e794c0f0594?source=cve",
|
||||
"source": "security@wordfence.com"
|
||||
}
|
||||
]
|
||||
}
|
60
CVE-2024/CVE-2024-57xx/CVE-2024-5709.json
Normal file
60
CVE-2024/CVE-2024-57xx/CVE-2024-5709.json
Normal file
@ -0,0 +1,60 @@
|
||||
{
|
||||
"id": "CVE-2024-5709",
|
||||
"sourceIdentifier": "security@wordfence.com",
|
||||
"published": "2024-08-06T06:15:34.793",
|
||||
"lastModified": "2024-08-06T06:15:34.793",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "The WPBakery Visual Composer plugin for WordPress is vulnerable to Local File Inclusion in all versions up to, and including, 7.7 via the 'layout_name' parameter. This makes it possible for authenticated attackers, with Author-level access and above, and with post permissions granted by an Administrator, to include and execute arbitrary files on the server, allowing the execution of any PHP code in those files. This can be used to bypass access controls, obtain sensitive data, or achieve code execution in cases where images and other \u201csafe\u201d file types can be uploaded and included."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security@wordfence.com",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 8.8,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security@wordfence.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-22"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://wpbakery.com/",
|
||||
"source": "security@wordfence.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/7fad30c8-fd8a-4cf2-a3aa-16a374231b87?source=cve",
|
||||
"source": "security@wordfence.com"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,13 +2,13 @@
|
||||
"id": "CVE-2024-6080",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2024-06-17T23:15:51.583",
|
||||
"lastModified": "2024-06-20T20:15:20.583",
|
||||
"lastModified": "2024-08-06T07:15:46.460",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A vulnerability classified as critical was found in Intelbras InControl 2.21.56. This vulnerability affects unknown code. The manipulation leads to unquoted search path. Local access is required to approach this attack. The exploit has been disclosed to the public and may be used. VDB-268822 is the identifier assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure and plans to provide a solution within the next few weeks."
|
||||
"value": "A vulnerability classified as critical was found in Intelbras InControl 2.21.56. This vulnerability affects unknown code of the component incontrolWebcam Service. The manipulation leads to unquoted search path. Local access is required to approach this attack. The exploit has been disclosed to the public and may be used. VDB-268822 is the identifier assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure and plans to provide a solution within the next few weeks."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
|
56
CVE-2024/CVE-2024-62xx/CVE-2024-6200.json
Normal file
56
CVE-2024/CVE-2024-62xx/CVE-2024-6200.json
Normal file
@ -0,0 +1,56 @@
|
||||
{
|
||||
"id": "CVE-2024-6200",
|
||||
"sourceIdentifier": "vulnerability@ncsc.ch",
|
||||
"published": "2024-08-06T06:15:35.030",
|
||||
"lastModified": "2024-08-06T06:15:35.030",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "HaloITSM versions up to 2.146.1 are affected by a Stored Cross-Site Scripting (XSS) vulnerability. The injected JavaScript code can execute arbitrary action on behalf of the user accessing a ticket. HaloITSM versions past 2.146.1 (and patches starting from 2.143.61 ) fix the mentioned vulnerability."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "vulnerability@ncsc.ch",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 8.0,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.1,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "vulnerability@ncsc.ch",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://haloitsm.com/guides/article/?kbid=2152",
|
||||
"source": "vulnerability@ncsc.ch"
|
||||
}
|
||||
]
|
||||
}
|
44
CVE-2024/CVE-2024-62xx/CVE-2024-6201.json
Normal file
44
CVE-2024/CVE-2024-62xx/CVE-2024-6201.json
Normal file
@ -0,0 +1,44 @@
|
||||
{
|
||||
"id": "CVE-2024-6201",
|
||||
"sourceIdentifier": "vulnerability@ncsc.ch",
|
||||
"published": "2024-08-06T06:15:35.283",
|
||||
"lastModified": "2024-08-06T06:15:35.283",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "HaloITSM versions up to 2.146.1 are affected by a Template Injection vulnerability within the engine used to generate emails. This can lead to the leakage of potentially sensitive information. HaloITSM versions past 2.146.1 (and patches starting from 2.143.61 ) fix the mentioned vulnerability."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "vulnerability@ncsc.ch",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 5.3,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 1.4
|
||||
}
|
||||
]
|
||||
},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://haloitsm.com/guides/article/?kbid=2153",
|
||||
"source": "vulnerability@ncsc.ch"
|
||||
}
|
||||
]
|
||||
}
|
56
CVE-2024/CVE-2024-62xx/CVE-2024-6202.json
Normal file
56
CVE-2024/CVE-2024-62xx/CVE-2024-6202.json
Normal file
@ -0,0 +1,56 @@
|
||||
{
|
||||
"id": "CVE-2024-6202",
|
||||
"sourceIdentifier": "vulnerability@ncsc.ch",
|
||||
"published": "2024-08-06T06:15:35.487",
|
||||
"lastModified": "2024-08-06T06:15:35.487",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "HaloITSM versions up to 2.146.1 are affected by a SAML XML Signature Wrapping (XSW) vulnerability. When having a SAML integration configured, anonymous actors could impersonate arbitrary HaloITSM users by just knowing their email address. HaloITSM versions past 2.146.1 (and patches starting from 2.143.61 ) fix the mentioned vulnerability."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "vulnerability@ncsc.ch",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "vulnerability@ncsc.ch",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-863"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://haloitsm.com/guides/article/?kbid=2154",
|
||||
"source": "vulnerability@ncsc.ch"
|
||||
}
|
||||
]
|
||||
}
|
56
CVE-2024/CVE-2024-62xx/CVE-2024-6203.json
Normal file
56
CVE-2024/CVE-2024-62xx/CVE-2024-6203.json
Normal file
@ -0,0 +1,56 @@
|
||||
{
|
||||
"id": "CVE-2024-6203",
|
||||
"sourceIdentifier": "vulnerability@ncsc.ch",
|
||||
"published": "2024-08-06T06:15:35.727",
|
||||
"lastModified": "2024-08-06T06:15:35.727",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "HaloITSM versions up to 2.146.1 are affected by a Password Reset Poisoning vulnerability. Poisoned password reset links can be sent to existing HaloITSM users (given their email address is known). When these poisoned links get accessed (e.g. manually by the victim or automatically by an email client software), the password reset token is leaked to the malicious actor, allowing them to set a new password for the victim's account.This potentially leads to account takeover attacks.HaloITSM versions past 2.146.1 (and patches starting from 2.143.61 ) fix the mentioned vulnerability."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "vulnerability@ncsc.ch",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:L",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "LOW",
|
||||
"baseScore": 8.3,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 5.5
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "vulnerability@ncsc.ch",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-640"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://haloitsm.com/guides/article/?kbid=2155",
|
||||
"source": "vulnerability@ncsc.ch"
|
||||
}
|
||||
]
|
||||
}
|
21
CVE-2024/CVE-2024-66xx/CVE-2024-6651.json
Normal file
21
CVE-2024/CVE-2024-66xx/CVE-2024-6651.json
Normal file
@ -0,0 +1,21 @@
|
||||
{
|
||||
"id": "CVE-2024-6651",
|
||||
"sourceIdentifier": "contact@wpscan.com",
|
||||
"published": "2024-08-06T06:15:35.973",
|
||||
"lastModified": "2024-08-06T06:15:35.973",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "The WordPress File Upload WordPress plugin before 4.24.8 does not sanitise and escape a parameter before outputting it back in the page, leading to a Reflected Cross-Site Scripting which could be used against high privilege users such as admin"
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://wpscan.com/vulnerability/65e2c77d-09bd-4a44-81d9-d7a5db0e0f84/",
|
||||
"source": "contact@wpscan.com"
|
||||
}
|
||||
]
|
||||
}
|
21
CVE-2024/CVE-2024-67xx/CVE-2024-6766.json
Normal file
21
CVE-2024/CVE-2024-67xx/CVE-2024-6766.json
Normal file
@ -0,0 +1,21 @@
|
||||
{
|
||||
"id": "CVE-2024-6766",
|
||||
"sourceIdentifier": "contact@wpscan.com",
|
||||
"published": "2024-08-06T06:15:36.047",
|
||||
"lastModified": "2024-08-06T06:15:36.047",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "The shortcodes-ultimate-pro WordPress plugin before 7.2.1 does not validate and escape some of its shortcode attributes before outputting them back in a page/post where the shortcode is embed, which could allow users with the contributor role and above to perform Stored Cross-Site Scripting attacks"
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://wpscan.com/vulnerability/77bb1dcf-4e84-497a-955e-f3c0b649ad1c/",
|
||||
"source": "contact@wpscan.com"
|
||||
}
|
||||
]
|
||||
}
|
145
CVE-2024/CVE-2024-70xx/CVE-2024-7055.json
Normal file
145
CVE-2024/CVE-2024-70xx/CVE-2024-7055.json
Normal file
@ -0,0 +1,145 @@
|
||||
{
|
||||
"id": "CVE-2024-7055",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2024-08-06T06:15:36.107",
|
||||
"lastModified": "2024-08-06T06:15:36.107",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A vulnerability was found in FFmpeg up to 7.0.1. It has been classified as critical. This affects the function pnm_decode_frame in the library /libavcodec/pnmdec.c. The manipulation leads to heap-based buffer overflow. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. Upgrading to version 7.0.2 is able to address this issue. It is recommended to upgrade the affected component. The associated identifier of this vulnerability is VDB-273651."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV40": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "4.0",
|
||||
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"attackRequirements": "NONE",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"vulnerableSystemConfidentiality": "LOW",
|
||||
"vulnerableSystemIntegrity": "LOW",
|
||||
"vulnerableSystemAvailability": "LOW",
|
||||
"subsequentSystemConfidentiality": "NONE",
|
||||
"subsequentSystemIntegrity": "NONE",
|
||||
"subsequentSystemAvailability": "NONE",
|
||||
"exploitMaturity": "NOT_DEFINED",
|
||||
"confidentialityRequirements": "NOT_DEFINED",
|
||||
"integrityRequirements": "NOT_DEFINED",
|
||||
"availabilityRequirements": "NOT_DEFINED",
|
||||
"modifiedAttackVector": "NOT_DEFINED",
|
||||
"modifiedAttackComplexity": "NOT_DEFINED",
|
||||
"modifiedAttackRequirements": "NOT_DEFINED",
|
||||
"modifiedPrivilegesRequired": "NOT_DEFINED",
|
||||
"modifiedUserInteraction": "NOT_DEFINED",
|
||||
"modifiedVulnerableSystemConfidentiality": "NOT_DEFINED",
|
||||
"modifiedVulnerableSystemIntegrity": "NOT_DEFINED",
|
||||
"modifiedVulnerableSystemAvailability": "NOT_DEFINED",
|
||||
"modifiedSubsequentSystemConfidentiality": "NOT_DEFINED",
|
||||
"modifiedSubsequentSystemIntegrity": "NOT_DEFINED",
|
||||
"modifiedSubsequentSystemAvailability": "NOT_DEFINED",
|
||||
"safety": "NOT_DEFINED",
|
||||
"automatable": "NOT_DEFINED",
|
||||
"recovery": "NOT_DEFINED",
|
||||
"valueDensity": "NOT_DEFINED",
|
||||
"vulnerabilityResponseEffort": "NOT_DEFINED",
|
||||
"providerUrgency": "NOT_DEFINED",
|
||||
"baseScore": 6.9,
|
||||
"baseSeverity": "MEDIUM"
|
||||
}
|
||||
}
|
||||
],
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "LOW",
|
||||
"baseScore": 6.3,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 3.4
|
||||
}
|
||||
],
|
||||
"cvssMetricV2": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "2.0",
|
||||
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
|
||||
"accessVector": "NETWORK",
|
||||
"accessComplexity": "LOW",
|
||||
"authentication": "NONE",
|
||||
"confidentialityImpact": "PARTIAL",
|
||||
"integrityImpact": "PARTIAL",
|
||||
"availabilityImpact": "PARTIAL",
|
||||
"baseScore": 7.5
|
||||
},
|
||||
"baseSeverity": "HIGH",
|
||||
"exploitabilityScore": 10.0,
|
||||
"impactScore": 6.4,
|
||||
"acInsufInfo": false,
|
||||
"obtainAllPrivilege": false,
|
||||
"obtainUserPrivilege": false,
|
||||
"obtainOtherPrivilege": false,
|
||||
"userInteractionRequired": false
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-122"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://ffmpeg.org/",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://ffmpeg.org/download.html",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/CookedMelon/ReportCVE/tree/main/FFmpeg/poc3",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.273651",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.273651",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?submit.376532",
|
||||
"source": "cna@vuldb.com"
|
||||
}
|
||||
]
|
||||
}
|
21
CVE-2024/CVE-2024-70xx/CVE-2024-7082.json
Normal file
21
CVE-2024/CVE-2024-70xx/CVE-2024-7082.json
Normal file
@ -0,0 +1,21 @@
|
||||
{
|
||||
"id": "CVE-2024-7082",
|
||||
"sourceIdentifier": "contact@wpscan.com",
|
||||
"published": "2024-08-06T06:15:36.420",
|
||||
"lastModified": "2024-08-06T06:15:36.420",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "The Easy Table of Contents WordPress plugin before 2.0.68 does not sanitise and escape some parameters, which could allow users with a role as low as Editor to perform Cross-Site Scripting attacks."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://wpscan.com/vulnerability/8f30e685-00fa-4dbb-b516-2d14e4b13697/",
|
||||
"source": "contact@wpscan.com"
|
||||
}
|
||||
]
|
||||
}
|
21
CVE-2024/CVE-2024-70xx/CVE-2024-7084.json
Normal file
21
CVE-2024/CVE-2024-70xx/CVE-2024-7084.json
Normal file
@ -0,0 +1,21 @@
|
||||
{
|
||||
"id": "CVE-2024-7084",
|
||||
"sourceIdentifier": "contact@wpscan.com",
|
||||
"published": "2024-08-06T06:15:36.480",
|
||||
"lastModified": "2024-08-06T06:15:36.480",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "The Ajax Search Lite WordPress plugin before 4.12.1 does not sanitise and escape some parameters, which could allow users with a role as low as Admin+ to perform Cross-Site Scripting attacks."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://wpscan.com/vulnerability/0d38bf4d-de6a-49f8-be69-fa483fa61bb7/",
|
||||
"source": "contact@wpscan.com"
|
||||
}
|
||||
]
|
||||
}
|
46
README.md
46
README.md
@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours.
|
||||
### Last Repository Update
|
||||
|
||||
```plain
|
||||
2024-08-06T06:00:18.204283+00:00
|
||||
2024-08-06T08:00:17.745460+00:00
|
||||
```
|
||||
|
||||
### Most recent CVE Modification Timestamp synchronized with NVD
|
||||
|
||||
```plain
|
||||
2024-08-06T05:15:41.413000+00:00
|
||||
2024-08-06T07:15:46.460000+00:00
|
||||
```
|
||||
|
||||
### Last Data Feed Release
|
||||
@ -33,39 +33,35 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
|
||||
### Total Number of included CVEs
|
||||
|
||||
```plain
|
||||
259047
|
||||
259059
|
||||
```
|
||||
|
||||
### CVEs added in the last Commit
|
||||
|
||||
Recently added CVEs: `10`
|
||||
Recently added CVEs: `12`
|
||||
|
||||
- [CVE-2024-28962](CVE-2024/CVE-2024-289xx/CVE-2024-28962.json) (`2024-08-06T04:16:45.810`)
|
||||
- [CVE-2024-39817](CVE-2024/CVE-2024-398xx/CVE-2024-39817.json) (`2024-08-06T05:15:41.087`)
|
||||
- [CVE-2024-6781](CVE-2024/CVE-2024-67xx/CVE-2024-6781.json) (`2024-08-06T04:16:46.233`)
|
||||
- [CVE-2024-6782](CVE-2024/CVE-2024-67xx/CVE-2024-6782.json) (`2024-08-06T04:16:46.450`)
|
||||
- [CVE-2024-6886](CVE-2024/CVE-2024-68xx/CVE-2024-6886.json) (`2024-08-06T04:16:46.653`)
|
||||
- [CVE-2024-7008](CVE-2024/CVE-2024-70xx/CVE-2024-7008.json) (`2024-08-06T04:16:46.807`)
|
||||
- [CVE-2024-7009](CVE-2024/CVE-2024-70xx/CVE-2024-7009.json) (`2024-08-06T04:16:47.040`)
|
||||
- [CVE-2024-7500](CVE-2024/CVE-2024-75xx/CVE-2024-7500.json) (`2024-08-06T04:16:47.290`)
|
||||
- [CVE-2024-7505](CVE-2024/CVE-2024-75xx/CVE-2024-7505.json) (`2024-08-06T04:16:47.857`)
|
||||
- [CVE-2024-7506](CVE-2024/CVE-2024-75xx/CVE-2024-7506.json) (`2024-08-06T05:15:41.413`)
|
||||
- [CVE-2024-41995](CVE-2024/CVE-2024-419xx/CVE-2024-41995.json) (`2024-08-06T07:15:46.330`)
|
||||
- [CVE-2024-5708](CVE-2024/CVE-2024-57xx/CVE-2024-5708.json) (`2024-08-06T06:15:34.460`)
|
||||
- [CVE-2024-5709](CVE-2024/CVE-2024-57xx/CVE-2024-5709.json) (`2024-08-06T06:15:34.793`)
|
||||
- [CVE-2024-6200](CVE-2024/CVE-2024-62xx/CVE-2024-6200.json) (`2024-08-06T06:15:35.030`)
|
||||
- [CVE-2024-6201](CVE-2024/CVE-2024-62xx/CVE-2024-6201.json) (`2024-08-06T06:15:35.283`)
|
||||
- [CVE-2024-6202](CVE-2024/CVE-2024-62xx/CVE-2024-6202.json) (`2024-08-06T06:15:35.487`)
|
||||
- [CVE-2024-6203](CVE-2024/CVE-2024-62xx/CVE-2024-6203.json) (`2024-08-06T06:15:35.727`)
|
||||
- [CVE-2024-6651](CVE-2024/CVE-2024-66xx/CVE-2024-6651.json) (`2024-08-06T06:15:35.973`)
|
||||
- [CVE-2024-6766](CVE-2024/CVE-2024-67xx/CVE-2024-6766.json) (`2024-08-06T06:15:36.047`)
|
||||
- [CVE-2024-7055](CVE-2024/CVE-2024-70xx/CVE-2024-7055.json) (`2024-08-06T06:15:36.107`)
|
||||
- [CVE-2024-7082](CVE-2024/CVE-2024-70xx/CVE-2024-7082.json) (`2024-08-06T06:15:36.420`)
|
||||
- [CVE-2024-7084](CVE-2024/CVE-2024-70xx/CVE-2024-7084.json) (`2024-08-06T06:15:36.480`)
|
||||
|
||||
|
||||
### CVEs modified in the last Commit
|
||||
|
||||
Recently modified CVEs: `10`
|
||||
Recently modified CVEs: `4`
|
||||
|
||||
- [CVE-2015-1571](CVE-2015/CVE-2015-15xx/CVE-2015-1571.json) (`2024-08-06T05:15:34.607`)
|
||||
- [CVE-2016-10723](CVE-2016/CVE-2016-107xx/CVE-2016-10723.json) (`2024-08-06T04:16:08.187`)
|
||||
- [CVE-2016-15010](CVE-2016/CVE-2016-150xx/CVE-2016-15010.json) (`2024-08-06T04:16:36.300`)
|
||||
- [CVE-2016-15012](CVE-2016/CVE-2016-150xx/CVE-2016-15012.json) (`2024-08-06T04:16:36.597`)
|
||||
- [CVE-2016-15032](CVE-2016/CVE-2016-150xx/CVE-2016-15032.json) (`2024-08-06T04:16:42.217`)
|
||||
- [CVE-2016-15036](CVE-2016/CVE-2016-150xx/CVE-2016-15036.json) (`2024-08-06T04:16:42.603`)
|
||||
- [CVE-2016-20009](CVE-2016/CVE-2016-200xx/CVE-2016-20009.json) (`2024-08-06T04:16:42.910`)
|
||||
- [CVE-2016-20012](CVE-2016/CVE-2016-200xx/CVE-2016-20012.json) (`2024-08-06T04:16:44.247`)
|
||||
- [CVE-2016-20022](CVE-2016/CVE-2016-200xx/CVE-2016-20022.json) (`2024-08-06T04:16:45.573`)
|
||||
- [CVE-2024-5913](CVE-2024/CVE-2024-59xx/CVE-2024-5913.json) (`2024-08-06T05:15:41.160`)
|
||||
- [CVE-2015-2877](CVE-2015/CVE-2015-28xx/CVE-2015-2877.json) (`2024-08-06T06:15:20.940`)
|
||||
- [CVE-2015-5215](CVE-2015/CVE-2015-52xx/CVE-2015-5215.json) (`2024-08-06T07:15:35.900`)
|
||||
- [CVE-2015-5377](CVE-2015/CVE-2015-53xx/CVE-2015-5377.json) (`2024-08-06T07:15:38.600`)
|
||||
- [CVE-2024-6080](CVE-2024/CVE-2024-60xx/CVE-2024-6080.json) (`2024-08-06T07:15:46.460`)
|
||||
|
||||
|
||||
## Download and Usage
|
||||
|
60
_state.csv
60
_state.csv
@ -75059,7 +75059,7 @@ CVE-2015-1567,0,0,3812bc0008e55f82d642c3335eff5281d997c44ba471397e3a6b596d9d25e7
|
||||
CVE-2015-1568,0,0,8641bba09c3453ce906e1dbfc6e7324b84b229456ae9c68ec0ecc41b0511e912,2017-09-08T01:29:49.967000
|
||||
CVE-2015-1569,0,0,830e1ec3d441f165a51e3e0ebbb01dc764d1e053f4f4de22706450f51bed4204,2015-02-11T19:44:15.410000
|
||||
CVE-2015-1570,0,0,b41ad3f65de40d3a32ac3bf79b3c7448f06e02013e5a4326bd0244ba86c64f29,2015-02-11T19:35:06.533000
|
||||
CVE-2015-1571,0,1,ba2bba8f637d23e11e5ca2d50b4afa95f3e934da85c7436aa4835a3867561616,2024-08-06T05:15:34.607000
|
||||
CVE-2015-1571,0,0,ba2bba8f637d23e11e5ca2d50b4afa95f3e934da85c7436aa4835a3867561616,2024-08-06T05:15:34.607000
|
||||
CVE-2015-1572,0,0,1f0839985237b84ec491126b2e4d437166caac53a36995be257e5aa6fcf47e92,2017-11-08T02:29:01.083000
|
||||
CVE-2015-1573,0,0,a1000ed07e280d6df41ea321fc6bdf162357ee3aef3443063ac3b58863ef1395,2018-01-05T02:30:00.210000
|
||||
CVE-2015-1574,0,0,b4960073e8d76b50950e4ce4c14fb5d916095585516e1debd82821105d8181ab,2018-10-09T19:55:57.700000
|
||||
@ -76279,7 +76279,7 @@ CVE-2015-2873,0,0,1a94bdd0065b2813d44717b42274e08a456f3b5df0d6b2aaa952fadf5cbdbc
|
||||
CVE-2015-2874,0,0,42354052f4fcf436dcf2eaf6f4efd1e9ca3ad6253981cce5cbfce05ef7e07095,2015-12-31T20:29:26.130000
|
||||
CVE-2015-2875,0,0,23db3aeafe3a4b8066501597ba30cc7bbf48569daef71906c6d463d586714da4,2015-12-31T20:29:55.210000
|
||||
CVE-2015-2876,0,0,69a7e8fd6d4fb246c4553ffbaec340d3f32dac667cdbbd760c98190d0566f08f,2015-12-31T15:46:12.273000
|
||||
CVE-2015-2877,0,0,61c2f5c47f1cf0756022b4f38d9f734fe77e092c4c7801cd68f5893c3b8d009a,2024-05-17T01:04:04.807000
|
||||
CVE-2015-2877,0,1,3dfccbedc121c6d6c9013f6dd58d8d2cd616aba8d359e26261b614602dd75f62,2024-08-06T06:15:20.940000
|
||||
CVE-2015-2878,0,0,8b19e85cb36974868fb94fe73875d326f354ca2e0d206e7ed7f0dcde63ebe6be,2018-10-09T19:56:33.233000
|
||||
CVE-2015-2880,0,0,1112bdb9471bfa16e3ab2d335c1aa7101d42aaed2ae8c33544cb6dfee239f399,2017-04-14T14:16:03.440000
|
||||
CVE-2015-2881,0,0,cce58edf5352812cb4f04c432a716a23322ac3dba2ba10214e1531490830dbcb,2017-04-13T17:06:29.830000
|
||||
@ -78182,7 +78182,7 @@ CVE-2015-5211,0,0,efa1c4747795898741c788bad9877029a1da448558714e12aca36beefeeaec
|
||||
CVE-2015-5212,0,0,9f85f0ae84ab3f6167d7cb15ba0e4080aaa671b29713ce762ee9c537d1a3b058,2022-02-07T16:29:45.487000
|
||||
CVE-2015-5213,0,0,081c37e5b8eb9fc8bd4b4e662d214bf9146c0f8603bb295bdaab2f7f02c9b449,2017-07-01T01:29:18.953000
|
||||
CVE-2015-5214,0,0,2a89e3e6aa3f9a6edc20d558e40337f83bc73b5c299c98e300655a7175a04f52,2017-07-01T01:29:19
|
||||
CVE-2015-5215,0,0,e9fa07d358be6b56a6c9abb877ee060cc6a7b236234434192d32668b7ee30f01,2024-05-17T01:05:03.100000
|
||||
CVE-2015-5215,0,1,73d619c961a1dc2ba38557491adf07266982fb16e66300dd662182013b35e240,2024-08-06T07:15:35.900000
|
||||
CVE-2015-5216,0,0,4a0a8e18219be8f671bbe44cd67ede07c8e242eea47f5f9d9d1fc0fd8b0910d9,2020-02-21T14:20:20.890000
|
||||
CVE-2015-5217,0,0,62ad00b3b957e0019268e10ca6db85f0985a15a00b9a9f3da594fe8239978bce,2015-11-18T17:31:06.303000
|
||||
CVE-2015-5218,0,0,d9beae0f3c1168718cef3dd7dd70f32c14fc1271491dba2b42a0f040277069e7,2018-10-30T16:27:37.467000
|
||||
@ -78343,7 +78343,7 @@ CVE-2015-5372,0,0,6c66ea37c52ac9eb008b34ab547d1e637201a60dca51e99b11d2017bee307e
|
||||
CVE-2015-5374,0,0,d2c7142916da610c33f6841ea7d4b2dd439a1325011c2240e7930f0f5560bc7d,2018-03-23T01:29:00.273000
|
||||
CVE-2015-5375,0,0,7f3622c1db2fed50141b4fcca3607d38e93066808f77cab2160e424cad937442,2018-10-09T19:57:32.533000
|
||||
CVE-2015-5376,0,0,731eb96b0d696aaaf8b9e4bcc4168626f543ddb70b4644f80823ee6d89fe6e5a,2017-11-06T18:26:58.213000
|
||||
CVE-2015-5377,0,0,92abb9fbfa5b2af829d74388d4f83dc97f1020554f968f0210778f12770ce222,2024-05-17T01:05:07.697000
|
||||
CVE-2015-5377,0,1,42c3ae0d6da3505240ac7b31556321f75bb89544d2f729e5ab97b07f3575005c,2024-08-06T07:15:38.600000
|
||||
CVE-2015-5378,0,0,d37ede363faa4bcee882677731294746d8baf5a04b8bb489b08d9eafc2c4d58c,2019-06-17T15:48:25.623000
|
||||
CVE-2015-5379,0,0,bb31d5bbd2bbe74c5e92335d523cea8bcadf32ad132f0b4c97ed3ef96bd63663,2018-10-09T19:57:33.440000
|
||||
CVE-2015-5380,0,0,3a39cc5adecb255cdf999b8a986533148854574d22d334b7ca1f02da69cc9cda,2023-11-07T02:26:10.480000
|
||||
@ -84082,7 +84082,7 @@ CVE-2016-10719,0,0,96cbc798bf3d74970371236c9766e10b1eec7566d1630f5b1b4dbc66b4fd9
|
||||
CVE-2016-1072,0,0,2a77d6919272ce7d84ae7d01b455ee8a8ed18f75155f4c363f27ffd4369129e5,2016-12-01T03:04:22.483000
|
||||
CVE-2016-10721,0,0,4d18c30fecc80547a0b0ed385047b3ab19f8de5fc19574c6876eacfa15c0b72b,2018-06-06T14:46:37.967000
|
||||
CVE-2016-10722,0,0,a0f33765e0898b5ea17d1391dcb495029c7423f2234691d263c0e5dddfe68a96,2019-10-04T16:24:35.217000
|
||||
CVE-2016-10723,0,1,56f85888775f3b073168883d269b467a736e09f43b6b5f8a91d629824a8d5e89,2024-08-06T04:16:08.187000
|
||||
CVE-2016-10723,0,0,56f85888775f3b073168883d269b467a736e09f43b6b5f8a91d629824a8d5e89,2024-08-06T04:16:08.187000
|
||||
CVE-2016-10724,0,0,c59fd9612eab48d18de186d280641edda6c70c98ef0290a3f8ea11aa8df857ee,2020-03-18T17:07:13.900000
|
||||
CVE-2016-10725,0,0,7bbff4806baa022989daf5a26a36a21ccbb160f0236e10a7ed6aac513d75096e,2020-03-18T17:07:13.900000
|
||||
CVE-2016-10726,0,0,e30892c41f0377f0a4eccbbbce18dca68e93db761c42630b4d6db6be3a23b233,2018-09-06T14:59:25.770000
|
||||
@ -84871,9 +84871,9 @@ CVE-2016-15007,0,0,4c189a3e166b006ef1569b01012745a897cb0a75c0ca592e0da961071258e
|
||||
CVE-2016-15008,0,0,80f9ada6d4d31a4d1b35f0d5337f5d21612798ce0c1c46530e194838ce5c90b4,2024-05-17T01:08:08.383000
|
||||
CVE-2016-15009,0,0,9e8cde43361dbf69cc2f6f31a56757c1ec2d9e9381ef4493fb99824448f15396,2024-05-17T01:08:08.490000
|
||||
CVE-2016-1501,0,0,21850ce3794d7f546999625f5c122ce21d724e89452e966294b282ba2ade5568,2016-01-12T02:48:42.430000
|
||||
CVE-2016-15010,0,1,28def0043f6524f4c17ad97dc9fce720354d46a8e72f7b834741d24b7aab0e19,2024-08-06T04:16:36.300000
|
||||
CVE-2016-15010,0,0,28def0043f6524f4c17ad97dc9fce720354d46a8e72f7b834741d24b7aab0e19,2024-08-06T04:16:36.300000
|
||||
CVE-2016-15011,0,0,f654bebb9d97dcc5588ba448ac17b3694b38790add2bc977e13adcdb37407b23,2024-05-17T01:08:08.707000
|
||||
CVE-2016-15012,0,1,3b80eca28df73037f1f771755df06cdbc1035ddac59e8895ae64e952e7b70451,2024-08-06T04:16:36.597000
|
||||
CVE-2016-15012,0,0,3b80eca28df73037f1f771755df06cdbc1035ddac59e8895ae64e952e7b70451,2024-08-06T04:16:36.597000
|
||||
CVE-2016-15013,0,0,889b56edef187d74aa8f1cc8ebcb1872dfc4b803bcf5ef76673730c368a1407d,2024-05-17T01:08:08.947000
|
||||
CVE-2016-15014,0,0,6c85097b1459c0b947fffc2f39ffc26627ca1d1769f2b187b2b38a7b3e376983,2024-05-17T01:08:09.060000
|
||||
CVE-2016-15015,0,0,aef76c3aba9766474cbee5c8719d4e3209641299e5417bd6263a030396442578,2024-05-17T01:08:09.173000
|
||||
@ -84895,11 +84895,11 @@ CVE-2016-15029,0,0,8066c98eb3904ffb71e819cde1a6b55c955363d52666b798b6283bdc56cfa
|
||||
CVE-2016-1503,0,0,9d60dad2353a367162d8e5352ec76ab8f9b8d4d3de5f5972c6bbfde347827ba1,2017-09-10T01:29:11.637000
|
||||
CVE-2016-15030,0,0,a4d03da27ba9509dc3b294b688cf2cd7069800f2f90fade8bd82c8d4edaff4ee,2024-05-17T01:08:10.883000
|
||||
CVE-2016-15031,0,0,5400ab5257783e5a9c05b3d5373f4bd5a20d1115b18378b451ae210242c96821,2024-05-17T01:08:11
|
||||
CVE-2016-15032,0,1,265f50c2d412062796cf589d64bab4247d0dd96cfc7933922bf35bfe7daf27a3,2024-08-06T04:16:42.217000
|
||||
CVE-2016-15032,0,0,265f50c2d412062796cf589d64bab4247d0dd96cfc7933922bf35bfe7daf27a3,2024-08-06T04:16:42.217000
|
||||
CVE-2016-15033,0,0,a995baa8d56966eb2caee6c22fcfd797c1734719761ca1397f25d8327d943b23,2023-11-07T02:29:49.960000
|
||||
CVE-2016-15034,0,0,252c66f3cd880c2b187a10eea5f4c4b6de05603bdf33cc1997ff39fa5c438aee,2024-05-17T01:08:11.320000
|
||||
CVE-2016-15035,0,0,7885f496b8dd617bc9d5d3b425e9772bef1da695215db7e49eb390dd5339f1a0,2024-05-17T01:08:11.430000
|
||||
CVE-2016-15036,0,1,21b75d95bec07246139231456e1cca814dee6cb6d4a4e929b7a5bd6362d2ec90,2024-08-06T04:16:42.603000
|
||||
CVE-2016-15036,0,0,21b75d95bec07246139231456e1cca814dee6cb6d4a4e929b7a5bd6362d2ec90,2024-08-06T04:16:42.603000
|
||||
CVE-2016-15037,0,0,a24c928d873db9adb04c4c2c7f23b1fdee0c14c814adb63b3935f236dd62254a,2024-05-17T01:08:11.653000
|
||||
CVE-2016-15038,0,0,ab9fe34bbf83cb3f6b12fd6674fbfd88d9bfe6f780bf258a0a29ef7f754a8620,2024-05-17T01:08:11.777000
|
||||
CVE-2016-15039,0,0,dca63ef7677d0bcc98685acf0fdce6ae1800f0ccf649b6f8a11c0d2609e41789,2024-07-11T13:05:54.930000
|
||||
@ -85363,11 +85363,11 @@ CVE-2016-20005,0,0,b64a06b51d63884e1ad568b18ba1bb237a96be3c1a8589f5adff84c89916b
|
||||
CVE-2016-20006,0,0,02c83742eb3fab57e2d5ab146f1b1cd840f05cf8f30eeaf78b0505c2a594874a,2021-01-07T16:21:39.823000
|
||||
CVE-2016-20007,0,0,f48de787d876e267bc8d56363301308107ff3f611a9b23a244f320286ad1ef44,2021-01-07T14:41:28.037000
|
||||
CVE-2016-20008,0,0,571cde26289a669d7e5db2ab9c17dfdcd4bc050582080407b1bd0ab57cea87cc,2021-01-07T14:50:32.877000
|
||||
CVE-2016-20009,0,1,6736779b86fe0f5c4776b285f122e67fb9b218a14b07e7f61563cc36340c69bf,2024-08-06T04:16:42.910000
|
||||
CVE-2016-20009,0,0,6736779b86fe0f5c4776b285f122e67fb9b218a14b07e7f61563cc36340c69bf,2024-08-06T04:16:42.910000
|
||||
CVE-2016-2001,0,0,86a26f8d42da590fb56f6ce4ef4436b2512598d662de8307f45a9378b39a26f9,2016-12-03T03:24:15.297000
|
||||
CVE-2016-20010,0,0,5875a1d81a459a15d8f8a768844705090d0d00c9cafd74ff4adfcc764b2b9868,2021-05-13T16:11:38.253000
|
||||
CVE-2016-20011,0,0,3677084d404a7522732f923fdd4014dd7d6b77634feda8da46daf3b2969f8dd7,2021-06-09T15:03:47.777000
|
||||
CVE-2016-20012,0,1,4f3e9be5aa966e0e904cd116300b777c6ff40e6debc6eeecdce7678df8645ed6,2024-08-06T04:16:44.247000
|
||||
CVE-2016-20012,0,0,4f3e9be5aa966e0e904cd116300b777c6ff40e6debc6eeecdce7678df8645ed6,2024-08-06T04:16:44.247000
|
||||
CVE-2016-20013,0,0,0275566c9e37f071760b1af1d2142dafa63309c9ba7985af7f9d184560514a19,2022-03-03T16:43:19.667000
|
||||
CVE-2016-20014,0,0,3d9ba391321a496549812db9a9b02f2d93e5a1d4fe7210dd77241fe8f6175c83,2022-05-02T18:16:02.077000
|
||||
CVE-2016-20015,0,0,092857df3fe281f5ceed880567ed7e54a0ed822ac94b32e92babf91d27bf7e7a,2022-09-22T00:19:34.010000
|
||||
@ -85376,7 +85376,7 @@ CVE-2016-20017,0,0,4df0ae2b835296cc1b90826d14dc0f8fd616e77582d0d146922716cb5ae98
|
||||
CVE-2016-20018,0,0,8e304d71235746a4dff13ef585a7f314f527d92bfa216fc7ea8494416774f5e9,2023-11-23T00:15:07.650000
|
||||
CVE-2016-2002,0,0,df891537939859925304fb7d393d6978e1cea1f355df3eb1ecf75c9d0fbc4bc7,2019-02-20T19:22:14.107000
|
||||
CVE-2016-20021,0,0,0c93aff8012f95e3d947d50dc11ffebc22a889af21a3776d4b0fae8dba0eec49,2024-01-22T16:27:08.217000
|
||||
CVE-2016-20022,0,1,5e764ea7bad2173d3d56d94982033d28014c1c9dcf863283eea4d7f644ce2808,2024-08-06T04:16:45.573000
|
||||
CVE-2016-20022,0,0,5e764ea7bad2173d3d56d94982033d28014c1c9dcf863283eea4d7f644ce2808,2024-08-06T04:16:45.573000
|
||||
CVE-2016-2003,0,0,9e1c08080960cd64af9fc247f4a2e3abe0bcc86de315471efa7d9fc48cea0637,2016-12-01T03:08:18.587000
|
||||
CVE-2016-2004,0,0,1757ff86a49a2d1d6005c730b8c4588ede28a057e8c53f6273a81439e257866c,2019-07-12T15:15:23.573000
|
||||
CVE-2016-2005,0,0,3fdfefcac30be26be6521e4cf5e31cc8c5931d834a99fb4574919716f4be4f62,2019-07-16T12:23:19.377000
|
||||
@ -248753,7 +248753,7 @@ CVE-2024-28957,0,0,0b6f09541cc545197668690ffbf9310f75a4b5c2876755b3d8d95cbf05284
|
||||
CVE-2024-2896,0,0,65ede353e34c386898ba2637cfb49ad4710dca05a79d3f20095106470af669ff,2024-06-26T20:15:15.187000
|
||||
CVE-2024-28960,0,0,52abb52a9d4e5bfc8a4202f8cac850702b2036add0599181377d1c9da970c376,2024-07-03T01:51:57.697000
|
||||
CVE-2024-28961,0,0,c8a249a7c99721db71986c46abf04003bb50c28611dbaf91b07993347a57a453,2024-04-29T12:42:03.667000
|
||||
CVE-2024-28962,1,1,31dcea761113ed3d2d5287bcac0ccde59721eab53808f539db6c678a026732b0,2024-08-06T04:16:45.810000
|
||||
CVE-2024-28962,0,0,31dcea761113ed3d2d5287bcac0ccde59721eab53808f539db6c678a026732b0,2024-08-06T04:16:45.810000
|
||||
CVE-2024-28963,0,0,46ff77abc65aaef52e66733c3c1ae0b4da0085f9d8df9e4bfbf89b9b93df3b64,2024-04-24T13:39:42.883000
|
||||
CVE-2024-28964,0,0,eacce0fb2e076889bc70a58cf7097d65229ee0f89cf37af65654afa31a5f76a3,2024-06-13T18:36:09.010000
|
||||
CVE-2024-28965,0,0,243304e77cbab7b4dbd33d38f2ed62543001dbffc348c59ebe507f143c414797,2024-06-13T18:35:19.777000
|
||||
@ -255686,7 +255686,7 @@ CVE-2024-39777,0,0,3965e84ff8fda80cbbd102769d78a8850769b610de13e16316e68861170da
|
||||
CVE-2024-3978,0,0,264c95fabf2474878692eedd3d0ccd0dbcfac72fb894e9f86052802e2ea09747,2024-08-01T13:56:48.040000
|
||||
CVE-2024-3979,0,0,e9e7991f3b86f818ec400b9ec60245e440b2d51744d0b7d3598ed5add4c2b631,2024-06-06T20:15:14.127000
|
||||
CVE-2024-39807,0,0,ba2c368fe4cdf413290b5bff8a949eddf35bb4de98ed47f43e524e6cb747e010,2024-07-05T17:07:47.090000
|
||||
CVE-2024-39817,1,1,0a0af06160c955d81a7f3ce27b51c3d2d9db081127baf17354ab62003583a3b4,2024-08-06T05:15:41.087000
|
||||
CVE-2024-39817,0,0,0a0af06160c955d81a7f3ce27b51c3d2d9db081127baf17354ab62003583a3b4,2024-08-06T05:15:41.087000
|
||||
CVE-2024-39819,0,0,c8db5421a3ae027faff5d4d06e3d8592e32e290e4092ae4f0fac52eb30d3f58b,2024-07-16T13:43:58.773000
|
||||
CVE-2024-39820,0,0,e80ca54bf5fea4b83e9254c90576692ea592c71bc167353b8799d70169ce0139,2024-07-16T13:43:58.773000
|
||||
CVE-2024-39821,0,0,3d8221c440f8b1dbd5c98d43cf97f16f597a43c5d93725a475fc98495ffe9f3b,2024-07-16T13:43:58.773000
|
||||
@ -256556,6 +256556,7 @@ CVE-2024-41965,0,0,744da138649373c91e2d5048d78adcc6a9461c3a3df3b2d3193826fb19936
|
||||
CVE-2024-4197,0,0,45da0b07f911473fe59b939894a184bd20b4010bb74cc514ccd6533e9d15c77b,2024-06-25T12:24:17.873000
|
||||
CVE-2024-4198,0,0,10694c0c68dfe4c7db6b33a26dfbe4eb44c2b4223bfed9be5285208f068f86b9,2024-04-26T12:58:17.720000
|
||||
CVE-2024-4199,0,0,fcf36265d6a610d83a178901804339aadd89406ac8a1349d6da6f71c3e13bfe9,2024-05-15T16:40:19.330000
|
||||
CVE-2024-41995,1,1,156b892398ee9eda29e3640460e8ccbfd7be9748436849e4e688199ff4695702,2024-08-06T07:15:46.330000
|
||||
CVE-2024-4200,0,0,4cd240b08c44457e11ab7d0e46f05e7d4edddbc268bf54e61982ff7b6b50f3a4,2024-05-15T18:35:11.453000
|
||||
CVE-2024-42007,0,0,e1546757cdc0e5c84d17bb4943631a838464f4ec8f81323b11df4d863b67b3f8,2024-08-01T13:59:16.630000
|
||||
CVE-2024-42008,0,0,7c36b5673366032826436a227180e4306bc4ec6ae9c95aa42e9426014727b43a,2024-08-05T19:15:38.153000
|
||||
@ -257977,6 +257978,8 @@ CVE-2024-5701,0,0,50132399b0866a3a39154eec031eecee61c5e1b87964f02e5d6e5dcb69b112
|
||||
CVE-2024-5702,0,0,38c1097fef455f8c14a4a11698b056f16759fa186a63b78823c287fecdc7ce07,2024-06-19T10:15:11.583000
|
||||
CVE-2024-5703,0,0,5ca9c34d8a3be3710e16eaa453823ef22cf36c499d35ca66a69839485dd178a3,2024-07-19T16:05:42.090000
|
||||
CVE-2024-5704,0,0,be55689131fc57547da71e8726572a7a1a86cf57932558d33666ec0b15eef9b9,2024-07-09T18:19:14.047000
|
||||
CVE-2024-5708,1,1,d6bf0b5821040e12ca3c0179813c52faaed84420db0b83b1e5c91a66c63e17e5,2024-08-06T06:15:34.460000
|
||||
CVE-2024-5709,1,1,2ceaa5103d6cd37b398eb08d909f8ae343bd0ca0ed1d288338dd2df6eb752884,2024-08-06T06:15:34.793000
|
||||
CVE-2024-5710,0,0,bbba5caf4cb4f465fb2a1f44424b7af778bd56d5f1b17eb3b38248b8a0397322,2024-07-01T10:15:30.183000
|
||||
CVE-2024-5711,0,0,463604f6d6d272196433a5bb7494f0542e749e8811ac98ab1c08049581f8b425,2024-07-11T21:15:12.787000
|
||||
CVE-2024-5712,0,0,6fe769ed08d1c07fa399695b2a73ebe92703dd256409ae365a8a0674e8c2dce4,2024-07-12T08:15:11.477000
|
||||
@ -258126,7 +258129,7 @@ CVE-2024-5909,0,0,be17c9091f18518453142635e2095bb0b422430c259d2d0689eac8e33dc2ea
|
||||
CVE-2024-5910,0,0,90cc21d0847234b3526638233dffb575bd78298c2136f3076c84a2e819ba4a1f,2024-07-11T13:05:54.930000
|
||||
CVE-2024-5911,0,0,73115e3f042806be5dcc4a831e78f32335b6192481bdcb3b8ad74d5cdbbf1e0e,2024-07-11T13:05:54.930000
|
||||
CVE-2024-5912,0,0,3efa6b60416ae7c89e8dc5a2081c5e6def286690a42a0087bed53b30b989bae2,2024-07-11T13:05:54.930000
|
||||
CVE-2024-5913,0,1,307a9260d70a9d37ef03fc90a18fce4dac6ad981979537b72159d2890aa10b6b,2024-08-06T05:15:41.160000
|
||||
CVE-2024-5913,0,0,307a9260d70a9d37ef03fc90a18fce4dac6ad981979537b72159d2890aa10b6b,2024-08-06T05:15:41.160000
|
||||
CVE-2024-5922,0,0,50960a94a5a484ee279a2b7dcacb2f2a0eb6eb2607889fe30657dd07f5206782,2024-06-28T10:27:00.920000
|
||||
CVE-2024-5924,0,0,5e3ff1a9d9518c557ed5168c87e0fdab65bac252833de925901af21dfaeaa6cd,2024-06-17T12:43:31.090000
|
||||
CVE-2024-5925,0,0,e946172587053e70c75c453600b6000de540319095aebb04cea6cd10cd2597bf,2024-06-28T10:27:00.920000
|
||||
@ -258239,7 +258242,7 @@ CVE-2024-6073,0,0,e03ebd767ac590d74109e38897ba792c96f7f9dfee79b1fa5bd262c10ac25e
|
||||
CVE-2024-6074,0,0,915dc1a478b1dc63b8eb0116a9c01d91f3bc138019e7c4a3ebc47481b04905bc,2024-08-01T14:00:10.323000
|
||||
CVE-2024-6075,0,0,1cd7e5569456a26c7768214306daa7e1d9ce1093889f04b8131e5ae79338cd6f,2024-08-01T14:00:10.553000
|
||||
CVE-2024-6076,0,0,f75c5e0cd2d3ad9cf3dc79d2ee6835febd9e3e1415fea3908528543dbed7f72e,2024-08-01T14:00:10.780000
|
||||
CVE-2024-6080,0,0,9ad80ebfe8b856e46a0a6652807c607b3ca5adc92bd23988173663f4819ac96b,2024-06-20T20:15:20.583000
|
||||
CVE-2024-6080,0,1,2ad08bb329dff2f5ca525640c8314d702413aec2eadc0af776454094a000e617,2024-08-06T07:15:46.460000
|
||||
CVE-2024-6082,0,0,276cd87669a06de72f4fd7da1f295faff84e8d70a51e1d99184ac4c2e8bf8b0f,2024-06-20T19:15:50.437000
|
||||
CVE-2024-6083,0,0,a8e42b758c673e09d4e24ea193e5640feaaf3b5eee44f78d141a0b2276184907,2024-06-20T12:44:01.637000
|
||||
CVE-2024-6084,0,0,06b281398f86ed81b091427e75b7100073dd1dfd003da38e7de1b912df60ef63,2024-06-20T12:44:01.637000
|
||||
@ -258331,6 +258334,10 @@ CVE-2024-6194,0,0,f00a226f70ff49a057b84fcaca304b983b6bd1564bd5a99084e1dc1658dc9a
|
||||
CVE-2024-6195,0,0,d35dc776097027653d4328476e596f9f167a82473590f04576da829da4609970,2024-08-01T13:51:26.273000
|
||||
CVE-2024-6196,0,0,347e5d0fbb342c4d3dd5d440e2946d6924b36395364c1557d43d309fd11da3db,2024-08-01T13:49:15.767000
|
||||
CVE-2024-6197,0,0,e67c038f7bda9a715325974d1357ae7cd3f8fe3c15c27331f56b2750bf76203e,2024-08-01T14:00:14.760000
|
||||
CVE-2024-6200,1,1,c91a739506013d2656698dbed636dc5ca5ac2ba0cadb7ce3359c71e19f72c591,2024-08-06T06:15:35.030000
|
||||
CVE-2024-6201,1,1,1dc12961042def62a318d459a3dad52cb166c4edfbe4f7dce09367fb70362ec3,2024-08-06T06:15:35.283000
|
||||
CVE-2024-6202,1,1,e5ea7056cdc2f7525fae58f73f1bba6ff722639ad51026138aea3dbacea4b502,2024-08-06T06:15:35.487000
|
||||
CVE-2024-6203,1,1,658afe651851c87c3176a6de2182b64a477b842dcb36f7f10734e9800bfcecb7,2024-08-06T06:15:35.727000
|
||||
CVE-2024-6205,0,0,f32ee6375b433f4c8b075d7f2127800e855cae97c6ef2c703b09eff01b808353,2024-08-01T14:00:15.120000
|
||||
CVE-2024-6206,0,0,7ae31b087265fa68705a3f153945ecef18a4fdd89eba1b0f5f6a9be630fb6cf5,2024-06-26T12:44:29.693000
|
||||
CVE-2024-6208,0,0,b702d385d6dc69624ae253d69a727703b76fa8f218fc0fa3e0a52d494810eb10,2024-08-01T12:42:36.933000
|
||||
@ -258625,6 +258632,7 @@ CVE-2024-6646,0,0,a88f9e9daa434a5107be71c0c1db1a6acb029566ba77a9e2207d6608da22b1
|
||||
CVE-2024-6647,0,0,09a83ea8e48b51cdfaabb2b40d44883a6e2661cca1813e6ce1c2298d3fc73eb9,2024-08-01T22:15:46.930000
|
||||
CVE-2024-6649,0,0,5cdb5b2e28b9bfeb7fd4f19389db074d98b3a7e19ad14500f164241f41fa57a0,2024-07-11T13:05:54.930000
|
||||
CVE-2024-6650,0,0,389479cac037eb791bf22f3727c10e60384d8e28492bfb0d0b7873c538245d43,2024-07-11T13:05:54.930000
|
||||
CVE-2024-6651,1,1,73d21a9d6fa7c667faf1e0f966ada3c7bf41fc1bd868e7395e05923f19cc233e,2024-08-06T06:15:35.973000
|
||||
CVE-2024-6652,0,0,0923244b6b76f442c47a88150f368b6b9dcb9b0e76b0d2676e50d3c093d67a8a,2024-07-11T13:05:54.930000
|
||||
CVE-2024-6653,0,0,d93d31cbf15b722e8213bd0a1f350049b73a325a73fea026c81bdae5013a3c4f,2024-07-11T13:15:10.147000
|
||||
CVE-2024-6655,0,0,485f585861c9543e180875e8c8a03aa176dd69bb5a21887c98c071d6ec8a6317,2024-07-16T18:00:02.110000
|
||||
@ -258687,6 +258695,7 @@ CVE-2024-6755,0,0,ab1b630d4d60f43a14793abf6a91e747f24cf32e85dd2f18d0c7fae990d484
|
||||
CVE-2024-6756,0,0,f587e50343ba8d4d9984018181e54a04ca58befeaa1fc8ceb12c6bae56622e09,2024-07-24T12:55:13.223000
|
||||
CVE-2024-6761,0,0,f38b3ccdc89aa0093bd659ba31741817a9ff74cb3bee1ce8404957bf0a35b578,2024-07-29T11:15:10.140000
|
||||
CVE-2024-6765,0,0,582116fb1612a7c43e0b570dc3dd773f185a6bed827d147d00793764d2f2774e,2024-07-17T14:15:04.327000
|
||||
CVE-2024-6766,1,1,4d09ca3b6a9b021ea2575dff9ce754df4830f23a5ddff67ef81a99f1b17fc908,2024-08-06T06:15:36.047000
|
||||
CVE-2024-6770,0,0,4e0dc06a2aaa55c8bf6c7adb0f484fa8776788d11a4220cb3908768a1c995eb7,2024-07-31T12:57:02.300000
|
||||
CVE-2024-6772,0,0,912a2e88fadcae9536686fa2edbaf67f780e09433e7c7b1a77cd2e7a853d1cc4,2024-08-01T14:00:38.260000
|
||||
CVE-2024-6773,0,0,1cc7ee73b86e05dc74bca684f8041d0b5ae20ee7d4c5d09a0a1f363d55d99edd,2024-08-01T14:00:38.483000
|
||||
@ -258697,8 +258706,8 @@ CVE-2024-6777,0,0,ca29db0995c8af0d3bc27804bd1f135839d6af869a949f56fbd75929b6968b
|
||||
CVE-2024-6778,0,0,84b088ec3020aa8ff5e55451d795a5507972d54955d86abc44832d806c764933,2024-08-01T14:00:42.093000
|
||||
CVE-2024-6779,0,0,fe5ad1222b3723da7c0ac78d266b4f175bcea5cc66ba78d4d443b9702520701b,2024-08-01T14:00:42.927000
|
||||
CVE-2024-6780,0,0,54fc3efeb973ca2f40f04f54d5a723685bcfaff31befba604fec0242bd088a83,2024-07-16T13:43:58.773000
|
||||
CVE-2024-6781,1,1,a3cfe77d31498eb43760f01a99ed263e73f46dc783939c6cb0a1af9155173920,2024-08-06T04:16:46.233000
|
||||
CVE-2024-6782,1,1,2ea4d50285ad17682148be599c7f1fcb1056e17f67164c1e995f60b769ade5dc,2024-08-06T04:16:46.450000
|
||||
CVE-2024-6781,0,0,a3cfe77d31498eb43760f01a99ed263e73f46dc783939c6cb0a1af9155173920,2024-08-06T04:16:46.233000
|
||||
CVE-2024-6782,0,0,2ea4d50285ad17682148be599c7f1fcb1056e17f67164c1e995f60b769ade5dc,2024-08-06T04:16:46.450000
|
||||
CVE-2024-6783,0,0,02ffa81303e2d0b2c8d5ada15cd1c5a0e17971825cf42319819acea737c80823,2024-07-24T12:55:13.223000
|
||||
CVE-2024-6791,0,0,530a9e011d938f884a817484b487117900f43c2f83e7c51084019bfb404fc80f,2024-07-24T12:55:13.223000
|
||||
CVE-2024-6793,0,0,d3b7076c1491770aa57006b0fda0ca29233a316fd768110e179dab36334b145c,2024-07-24T12:55:13.223000
|
||||
@ -258723,7 +258732,7 @@ CVE-2024-6873,0,0,8e5db8bfa0491746f29814d1d8249a1850325cbcdbd09b52dbf90709e95d21
|
||||
CVE-2024-6874,0,0,dbf80741a5dbaf69dfea3d6102d0d56a1052d5bac2fe6cc0bc24819c43cddd92,2024-08-01T14:00:45.683000
|
||||
CVE-2024-6881,0,0,c7a593beeaed093fd14dcd15598a09b93989985caddc31a572979478e4fff1ed,2024-07-29T14:12:08.783000
|
||||
CVE-2024-6885,0,0,820342a8aad3354940c223afe57157bbf13eee743fbe19265a63d35dde973086,2024-07-24T12:55:13.223000
|
||||
CVE-2024-6886,1,1,3ec719ef0968a2330f885b85f1945a1bb353512e5a00dfa1301fff2298977065,2024-08-06T04:16:46.653000
|
||||
CVE-2024-6886,0,0,3ec719ef0968a2330f885b85f1945a1bb353512e5a00dfa1301fff2298977065,2024-08-06T04:16:46.653000
|
||||
CVE-2024-6895,0,0,ba732cd0d0196677d9fba02b4344054d4844d09e5d174114e4dcf4446ecf9262,2024-07-22T13:00:53.287000
|
||||
CVE-2024-6896,0,0,801c74edfd9bf4c5786030707fac190d86b113e6627f16ad4c2e5810705558a7,2024-07-24T12:55:13.223000
|
||||
CVE-2024-6897,0,0,0bc0c3c85d38c464186c16b9bc40451a421eb7b428d66cf1c3a2509fdf188e66,2024-07-29T14:12:08.783000
|
||||
@ -258794,14 +258803,15 @@ CVE-2024-6980,0,0,f6625eb84b24e1b38c56cc3bb53a8be195d62bb4e9db2a7b8e6feb6123dc76
|
||||
CVE-2024-6984,0,0,70dfda1fc41774868bc9c54996b49ac58100ddec2443c12ad657af853bca03be,2024-07-29T16:21:52.517000
|
||||
CVE-2024-6990,0,0,af78978331551e601c74e65678c49159db8dbbe52afb220c54529e9bbfddee69,2024-08-03T18:35:02.320000
|
||||
CVE-2024-7007,0,0,443ea019503bb62163681477e591813d689cda148f7559da12362b93a0b77177,2024-07-26T12:38:41.683000
|
||||
CVE-2024-7008,1,1,c31a3b24efe8a9546c13454e26ba25f735dbeb7a9f826d6dcaa0531537f81781,2024-08-06T04:16:46.807000
|
||||
CVE-2024-7009,1,1,9110783bbe0d91beba88cc99800a2d427b7ac3ffbd65fa1c5ab81604e921f06b,2024-08-06T04:16:47.040000
|
||||
CVE-2024-7008,0,0,c31a3b24efe8a9546c13454e26ba25f735dbeb7a9f826d6dcaa0531537f81781,2024-08-06T04:16:46.807000
|
||||
CVE-2024-7009,0,0,9110783bbe0d91beba88cc99800a2d427b7ac3ffbd65fa1c5ab81604e921f06b,2024-08-06T04:16:47.040000
|
||||
CVE-2024-7014,0,0,bf4bcb57365a86d29a45ebd019245eec542daaec8aac5d2bd790565f954bcfee,2024-07-24T12:55:13.223000
|
||||
CVE-2024-7027,0,0,5a505a0256616ae7086bad971714674072a78d2b5b489c23bd05df293d4823ce,2024-07-24T12:55:13.223000
|
||||
CVE-2024-7029,0,0,53babce0d84fa7daad6c41ce401ba13c07793a5bed019fcf23c3c88f7322f0b5,2024-08-05T12:41:45.957000
|
||||
CVE-2024-7031,0,0,4808703a4cd0b97f67a773c5f222b01d69a2fff387801423358b3ea99670c83a,2024-08-05T12:41:45.957000
|
||||
CVE-2024-7047,0,0,c626b8092c8533dfe4198c51e8e35d5946df1ed097b6fb1d01ca755685dc1b0d,2024-07-25T12:36:39.947000
|
||||
CVE-2024-7050,0,0,f402c0a89ba2917236fe6639793bd54ee4751807250eba7a4dde84d4a362ffd7,2024-07-29T14:12:08.783000
|
||||
CVE-2024-7055,1,1,460fac5e061d7dc602c4e6c3312a2c17cbc07bca9bf605e1ef59acbd1ddce267,2024-08-06T06:15:36.107000
|
||||
CVE-2024-7057,0,0,e86292da776d8c2eee12db885a241ac453174252cdfea8e6058f6d373bd4dc19,2024-07-25T12:36:39.947000
|
||||
CVE-2024-7060,0,0,2e0c92013c1ddde1bca0ad9e62aa50d23e69e1a598796a2170f54fccf61e7f4b,2024-07-25T12:36:39.947000
|
||||
CVE-2024-7062,0,0,d6f409aeb13130ff6f4252d4a7aadcbcfc3eecb0d68f9e3338eff0add9df7d66,2024-07-26T12:38:41.683000
|
||||
@ -258813,6 +258823,8 @@ CVE-2024-7069,0,0,739e886131312a7d1c8ccd6a4f98d25c3687954f1471fb4fef37a66c2cb889
|
||||
CVE-2024-7079,0,0,432b6c38d04c17da8e2aeea6e5677915e33a84f70f04ebe0988a953bc8892b6d,2024-07-26T10:15:02.840000
|
||||
CVE-2024-7080,0,0,e8f51ead66f7469f7e63dc63102236554262bdfa2e68b9dc33e11c14a1ca04d2,2024-07-26T13:22:43.387000
|
||||
CVE-2024-7081,0,0,6a139e489a9ff084a663269dd9c842c08d77e29c45f0c2d71d596839a517bb01,2024-07-26T13:18:21.957000
|
||||
CVE-2024-7082,1,1,17534fe6dfb714d477357b1d152483c2f7665f2096d01a4a8ebc87110f9a0e42,2024-08-06T06:15:36.420000
|
||||
CVE-2024-7084,1,1,3aa9d0f90c3c96ae6ee9cfe6b3af45df3b49a921d13af5f0a36878b68c91c8b6,2024-08-06T06:15:36.480000
|
||||
CVE-2024-7091,0,0,ea018e26f872aadaa59f554aafa24269e38ad2d18885b5619000c0f610b93be1,2024-07-25T12:36:39.947000
|
||||
CVE-2024-7093,0,0,2af97c55d7ffe283d233de8149da5391663d6c7f2b6f21acff51e16815034b7f,2024-08-02T12:59:43.990000
|
||||
CVE-2024-7100,0,0,dcfec02e0ae4a6f64f97ae0297c66dfbc0aebe11e663bfc596e9b5b147ad741e,2024-07-30T13:32:45.943000
|
||||
@ -259032,9 +259044,9 @@ CVE-2024-7496,0,0,b98ace8c0457170fec0ba60c1277cad979e65e1cd78c0880b288a39f848929
|
||||
CVE-2024-7497,0,0,ada8b9ed12820a76b86d0d765e6d0469e42c9c911eddda8cf5ae635571333625,2024-08-06T02:15:36.233000
|
||||
CVE-2024-7498,0,0,3463b736f90f9ad8ca544a9e5828eeddb483519278649bedfd95de1a1f59b607,2024-08-06T03:15:30.507000
|
||||
CVE-2024-7499,0,0,fa466cc6c096c43b53afcea4eeed2aa00cfe03fa9d1fcaf27af1880791fed590,2024-08-06T03:15:30.760000
|
||||
CVE-2024-7500,1,1,5356987616ec53de8501f122a56ff58b8880556a3bec91f135a4cc8721caf5ce,2024-08-06T04:16:47.290000
|
||||
CVE-2024-7505,1,1,0fed448836399741239c60dad8ffe115725cd14b95fa297f3cc9afa862fb3171,2024-08-06T04:16:47.857000
|
||||
CVE-2024-7506,1,1,a716f33086cbe8664caa26445b5328b898f9ff087701d0ce048bc50b0e6ffeb8,2024-08-06T05:15:41.413000
|
||||
CVE-2024-7500,0,0,5356987616ec53de8501f122a56ff58b8880556a3bec91f135a4cc8721caf5ce,2024-08-06T04:16:47.290000
|
||||
CVE-2024-7505,0,0,0fed448836399741239c60dad8ffe115725cd14b95fa297f3cc9afa862fb3171,2024-08-06T04:16:47.857000
|
||||
CVE-2024-7506,0,0,a716f33086cbe8664caa26445b5328b898f9ff087701d0ce048bc50b0e6ffeb8,2024-08-06T05:15:41.413000
|
||||
CVE-2024-7537,0,0,2754597430b3398e50bf24aaa7d39e994c224c64952debab317f017a960bcb01,2024-08-06T00:15:34.653000
|
||||
CVE-2024-7538,0,0,de29220cb377045c0459deaf6b69adeedda6f13b07a14f613cf81f8acd6354c8,2024-08-06T00:15:34.860000
|
||||
CVE-2024-7539,0,0,eb9af53992225ab47d134bb6cf4c86798ffb792c4ea15fadf5eeb8e0c362f9fd,2024-08-06T00:15:35.053000
|
||||
|
Can't render this file because it is too large.
|
Loading…
x
Reference in New Issue
Block a user