mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-07-09 16:05:11 +00:00
Auto-Update: 2024-06-17T18:00:19.054255+00:00
This commit is contained in:
parent
60d6442c75
commit
dbcbdd24a1
@ -2,79 +2,14 @@
|
||||
"id": "CVE-2021-47472",
|
||||
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"published": "2024-05-22T07:15:11.927",
|
||||
"lastModified": "2024-05-22T12:46:53.887",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-06-17T17:15:51.050",
|
||||
"vulnStatus": "Rejected",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet: mdiobus: Fix memory leak in __mdiobus_register\n\nOnce device_register() failed, we should call put_device() to\ndecrement reference count for cleanup. Or it will cause memory\nleak.\n\nBUG: memory leak\nunreferenced object 0xffff888114032e00 (size 256):\n comm \"kworker/1:3\", pid 2960, jiffies 4294943572 (age 15.920s)\n hex dump (first 32 bytes):\n 00 00 00 00 00 00 00 00 08 2e 03 14 81 88 ff ff ................\n 08 2e 03 14 81 88 ff ff 90 76 65 82 ff ff ff ff .........ve.....\n backtrace:\n [<ffffffff8265cfab>] kmalloc include/linux/slab.h:591 [inline]\n [<ffffffff8265cfab>] kzalloc include/linux/slab.h:721 [inline]\n [<ffffffff8265cfab>] device_private_init drivers/base/core.c:3203 [inline]\n [<ffffffff8265cfab>] device_add+0x89b/0xdf0 drivers/base/core.c:3253\n [<ffffffff828dd643>] __mdiobus_register+0xc3/0x450 drivers/net/phy/mdio_bus.c:537\n [<ffffffff828cb835>] __devm_mdiobus_register+0x75/0xf0 drivers/net/phy/mdio_devres.c:87\n [<ffffffff82b92a00>] ax88772_init_mdio drivers/net/usb/asix_devices.c:676 [inline]\n [<ffffffff82b92a00>] ax88772_bind+0x330/0x480 drivers/net/usb/asix_devices.c:786\n [<ffffffff82baa33f>] usbnet_probe+0x3ff/0xdf0 drivers/net/usb/usbnet.c:1745\n [<ffffffff82c36e17>] usb_probe_interface+0x177/0x370 drivers/usb/core/driver.c:396\n [<ffffffff82661d17>] call_driver_probe drivers/base/dd.c:517 [inline]\n [<ffffffff82661d17>] really_probe.part.0+0xe7/0x380 drivers/base/dd.c:596\n [<ffffffff826620bc>] really_probe drivers/base/dd.c:558 [inline]\n [<ffffffff826620bc>] __driver_probe_device+0x10c/0x1e0 drivers/base/dd.c:751\n [<ffffffff826621ba>] driver_probe_device+0x2a/0x120 drivers/base/dd.c:781\n [<ffffffff82662a26>] __device_attach_driver+0xf6/0x140 drivers/base/dd.c:898\n [<ffffffff8265eca7>] bus_for_each_drv+0xb7/0x100 drivers/base/bus.c:427\n [<ffffffff826625a2>] __device_attach+0x122/0x260 drivers/base/dd.c:969\n [<ffffffff82660916>] bus_probe_device+0xc6/0xe0 drivers/base/bus.c:487\n [<ffffffff8265cd0b>] device_add+0x5fb/0xdf0 drivers/base/core.c:3359\n [<ffffffff82c343b9>] usb_set_configuration+0x9d9/0xb90 drivers/usb/core/message.c:2170\n [<ffffffff82c4473c>] usb_generic_driver_probe+0x8c/0xc0 drivers/usb/core/generic.c:238\n\nBUG: memory leak\nunreferenced object 0xffff888116f06900 (size 32):\n comm \"kworker/0:2\", pid 2670, jiffies 4294944448 (age 7.160s)\n hex dump (first 32 bytes):\n 75 73 62 2d 30 30 31 3a 30 30 33 00 00 00 00 00 usb-001:003.....\n 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................\n backtrace:\n [<ffffffff81484516>] kstrdup+0x36/0x70 mm/util.c:60\n [<ffffffff814845a3>] kstrdup_const+0x53/0x80 mm/util.c:83\n [<ffffffff82296ba2>] kvasprintf_const+0xc2/0x110 lib/kasprintf.c:48\n [<ffffffff82358d4b>] kobject_set_name_vargs+0x3b/0xe0 lib/kobject.c:289\n [<ffffffff826575f3>] dev_set_name+0x63/0x90 drivers/base/core.c:3147\n [<ffffffff828dd63b>] __mdiobus_register+0xbb/0x450 drivers/net/phy/mdio_bus.c:535\n [<ffffffff828cb835>] __devm_mdiobus_register+0x75/0xf0 drivers/net/phy/mdio_devres.c:87\n [<ffffffff82b92a00>] ax88772_init_mdio drivers/net/usb/asix_devices.c:676 [inline]\n [<ffffffff82b92a00>] ax88772_bind+0x330/0x480 drivers/net/usb/asix_devices.c:786\n [<ffffffff82baa33f>] usbnet_probe+0x3ff/0xdf0 drivers/net/usb/usbnet.c:1745\n [<ffffffff82c36e17>] usb_probe_interface+0x177/0x370 drivers/usb/core/driver.c:396\n [<ffffffff82661d17>] call_driver_probe drivers/base/dd.c:517 [inline]\n [<ffffffff82661d17>] really_probe.part.0+0xe7/0x380 drivers/base/dd.c:596\n [<ffffffff826620bc>] really_probe drivers/base/dd.c:558 [inline]\n [<ffffffff826620bc>] __driver_probe_device+0x10c/0x1e0 drivers/base/dd.c:751\n [<ffffffff826621ba>] driver_probe_device+0x2a/0x120 drivers/base/dd.c:781\n [<ffffffff82662a26>] __device_attach_driver+0xf6/0x140 drivers/base/dd.c:898\n [<ffffffff8265eca7>] bus_for_each\n---truncated---"
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "En el kernel de Linux, se resolvi\u00f3 la siguiente vulnerabilidad: net: mdiobus: corrige la p\u00e9rdida de memoria en __mdiobus_register Una vez que fall\u00f3 device_register(), debemos llamar a put_device() para disminuir el recuento de referencias para la sanitizaci\u00f3n. O provocar\u00e1 una p\u00e9rdida de memoria. Error: fuga de memoria objeto no referenciado 0xffff888114032e00 (tama\u00f1o 256): Comm \"KWorker/1: 3\", PID 2960, Jiffies 4294943572 (Edad 15.920) Volcado Hex (Primer 32 bytes): 00 00 00 00 00 00 00 08 2E 03333 14 81 88 y ff ................ 08 2e 03 14 81 88 y ff 90 76 65 82 y ff ff ff .........ve... .. backtrace: [] kmalloc include/linux/slab.h:591 [en l\u00ednea] [] kzalloc include/linux/slab.h:721 [en l\u00ednea] [] device_private_init drivers/base/ core.c:3203 [en l\u00ednea] [] device_add+0x89b/0xdf0 drivers/base/core.c:3253 [] __mdiobus_register+0xc3/0x450 drivers/net/phy/mdio_bus.c:537 [< ffffffff828cb835>] __devm_mdiobus_register+0x75/0xf0 drivers/net/phy/mdio_devres.c:87 [] ax88772_init_mdio drivers/net/usb/asix_devices.c:676 [en l\u00ednea] [] 88772_bind+controladores 0x330/0x480 /net/usb/asix_devices.c:786 [] usbnet_probe+0x3ff/0xdf0 drivers/net/usb/usbnet.c:1745 [] usb_probe_interface+0x177/0x370 drivers/usb/core/driver.c :396 [] call_driver_probe controladores/base/dd.c:517 [en l\u00ednea] [] reality_probe.part.0+0xe7/0x380 controladores/base/dd.c:596 [] controladores very_probe /base/dd.c:558 [en l\u00ednea] [] __driver_probe_device+0x10c/0x1e0 drivers/base/dd.c:751 [] driver_probe_device+0x2a/0x120 drivers/base/dd.c:781 [ ] __device_attach_driver+0xf6/0x140 drivers/base/dd.c:898 [] bus_for_each_drv+0xb7/0x100 drivers/base/bus.c:427 [] __device_attach+0x122/0 controladores x260/base /dd.c:969 [] bus_probe_device+0xc6/0xe0 drivers/base/bus.c:487 [] device_add+0x5fb/0xdf0 drivers/base/core.c:3359 [] usb_set_configuration +0x9d9/0xb90 drivers/usb/core/message.c:2170 [] usb_generic_driver_probe+0x8c/0xc0 drivers/usb/core/generic.c:238 ERROR: p\u00e9rdida de memoria objeto sin referencia 0xffff888116f06900 (tama\u00f1o 32): comm \" kworker/0:2\", pid 2670, jiffies 4294944448 (edad 7,160 s) volcado hexadecimal (primeros 32 bytes): 75 73 62 2d 30 30 31 3a 30 30 33 00 00 00 00 00 usb-001:003.... 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ rastreo inverso: [] kstrdup+0x36/0x70 mm/util.c :60 [] kstrdup_const+0x53/0x80 mm/util.c:83 [] kvasprintf_const+0xc2/0x110 lib/kasprintf.c:48 [] kobject_set_name_vargs+0x3b/0 xe0 lib/kobject. c:289 [] dev_set_name+0x63/0x90 drivers/base/core.c:3147 [] __mdiobus_register+0xbb/0x450 drivers/net/phy/mdio_bus.c:535 [] __devm_mdiobus_ registrarse+ 0x75/0xf0 controladores/net/phy/mdio_devres.c:87 [] ax88772_init_mdio drivers/net/usb/asix_devices.c:676 [en l\u00ednea] [] ax88772_bind+0x330/0x480 controladores/net/usb / asix_devices.c:786 [] usbnet_probe+0x3ff/0xdf0 drivers/net/usb/usbnet.c:1745 [] usb_probe_interface+0x177/0x370 drivers/usb/core/driver.c:396 [] call_driver_probe drivers/base/dd.c:517 [en l\u00ednea] []realmente_probe.part.0+0xe7/0x380 drivers/base/dd.c:596 []realmente_probe drivers/base/dd. c:558 [en l\u00ednea] [] __driver_probe_device+0x10c/0x1e0 drivers/base/dd.c:751 [] driver_probe_device+0x2a/0x120 drivers/base/dd.c:781 [] tac\u00f3metro +0xf6/0x140 drivers/base/dd.c:898 [] bus_for_each ---truncado---"
|
||||
"value": "Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/0c4e87ba11eb331dca2315d484d08441b8c13193",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/2bc10dca9432fadb09e45127e258fc7127fd346d",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/3a0dc2e35a5d6546b1db87fe985582dadc64fe7b",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/4ec0f9abc512cc02fb04daa89ccf6697e80ab417",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/6a18d155d5b35ad50c8fac2be091212487ae58ec",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/8121d0d4fd108280f5cd7b7fe8c6592adaa37be9",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/8ba94a7f7b9fc2a2b808ccceb99b77135deae21a",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/a9831afa2dc8a18205403907c41aa4e0950ac611",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/ab609f25d19858513919369ff3d9a63c02cd9e2e",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/b0feaa8376f52357bf2fd020d0c471713a859728",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/b89f4537d7fdbd0bafb6d8a66a484e0bc99871a4",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/bc5f2f3431ced08300e4cb3aff35f1da14c26433",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/c828115a14eacbf42042770fd68543f134e89efa",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/fd2400dd4f1b8bd7a309b1b424d9e0d188151b01",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/fdbffd95c4ce94d2197c504008eaac46b16bc5a4",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
}
|
||||
]
|
||||
"references": []
|
||||
}
|
52
CVE-2024/CVE-2024-03xx/CVE-2024-0397.json
Normal file
52
CVE-2024/CVE-2024-03xx/CVE-2024-0397.json
Normal file
@ -0,0 +1,52 @@
|
||||
{
|
||||
"id": "CVE-2024-0397",
|
||||
"sourceIdentifier": "cna@python.org",
|
||||
"published": "2024-06-17T16:15:10.217",
|
||||
"lastModified": "2024-06-17T16:15:10.217",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A defect was discovered in the Python \u201cssl\u201d module where there is a memory\nrace condition with the ssl.SSLContext methods \u201ccert_store_stats()\u201d and\n\u201cget_ca_certs()\u201d. The race condition can be triggered if the methods are\ncalled at the same time as certificates are loaded into the SSLContext,\nsuch as during the TLS handshake with a certificate directory configured.\nThis issue is fixed in CPython 3.10.14, 3.11.9, 3.12.3, and 3.13.0a5."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/python/cpython/commit/01c37f1d0714f5822d34063ca7180b595abf589d",
|
||||
"source": "cna@python.org"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/python/cpython/commit/29c97287d205bf2f410f4895ebce3f43b5160524",
|
||||
"source": "cna@python.org"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/python/cpython/commit/37324b421b72b7bc9934e27aba85d48d4773002e",
|
||||
"source": "cna@python.org"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/python/cpython/commit/542f3272f56f31ed04e74c40635a913fbc12d286",
|
||||
"source": "cna@python.org"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/python/cpython/commit/b228655c227b2ca298a8ffac44d14ce3d22f6faa",
|
||||
"source": "cna@python.org"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/python/cpython/commit/bce693111bff906ccf9281c22371331aaff766ab",
|
||||
"source": "cna@python.org"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/python/cpython/issues/114572",
|
||||
"source": "cna@python.org"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/python/cpython/pull/114573",
|
||||
"source": "cna@python.org"
|
||||
},
|
||||
{
|
||||
"url": "https://mail.python.org/archives/list/security-announce@python.org/thread/BMAK5BCGKYWNJOACVUSLUF6SFGBIM4VP/",
|
||||
"source": "cna@python.org"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,12 +2,12 @@
|
||||
"id": "CVE-2024-23134",
|
||||
"sourceIdentifier": "psirt@autodesk.com",
|
||||
"published": "2024-02-22T05:15:09.187",
|
||||
"lastModified": "2024-06-15T00:15:09.510",
|
||||
"lastModified": "2024-06-17T17:15:51.443",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A maliciously crafted IGS or IGES file in tbb.dll when parsed through Autodesk AutoCAD can be used in user-after-free vulnerability. This vulnerability, along with other vulnerabilities, could lead to code execution in the current process."
|
||||
"value": "A maliciously crafted IGS file in tbb.dll when parsed through Autodesk AutoCAD can be used in user-after-free vulnerability. This vulnerability, along with other vulnerabilities, could lead to code execution in the current process."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-36168",
|
||||
"sourceIdentifier": "psirt@adobe.com",
|
||||
"published": "2024-06-13T08:16:07.167",
|
||||
"lastModified": "2024-06-13T18:35:19.777",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2024-06-17T17:08:50.037",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -39,6 +39,16 @@
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "psirt@adobe.com",
|
||||
"type": "Secondary",
|
||||
@ -50,10 +60,37 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:adobe:experience_manager:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "6.5.21",
|
||||
"matchCriteriaId": "33F20D83-E0D3-4504-B15F-C3240F8CFB90"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:adobe:experience_manager:*:*:*:*:aem_cloud_service:*:*:*",
|
||||
"versionEndExcluding": "2024.5",
|
||||
"matchCriteriaId": "8A667B96-AB3F-48AB-9980-11AB79AA7BD7"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://helpx.adobe.com/security/products/experience-manager/apsb24-28.html",
|
||||
"source": "psirt@adobe.com"
|
||||
"source": "psirt@adobe.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-36169",
|
||||
"sourceIdentifier": "psirt@adobe.com",
|
||||
"published": "2024-06-13T08:16:07.393",
|
||||
"lastModified": "2024-06-13T18:35:19.777",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2024-06-17T17:04:09.503",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -50,10 +50,37 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:adobe:experience_manager:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "6.5.21",
|
||||
"matchCriteriaId": "33F20D83-E0D3-4504-B15F-C3240F8CFB90"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:adobe:experience_manager:*:*:*:*:aem_cloud_service:*:*:*",
|
||||
"versionEndExcluding": "2024.5",
|
||||
"matchCriteriaId": "8A667B96-AB3F-48AB-9980-11AB79AA7BD7"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://helpx.adobe.com/security/products/experience-manager/apsb24-28.html",
|
||||
"source": "psirt@adobe.com"
|
||||
"source": "psirt@adobe.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-36170",
|
||||
"sourceIdentifier": "psirt@adobe.com",
|
||||
"published": "2024-06-13T08:16:07.623",
|
||||
"lastModified": "2024-06-13T18:35:19.777",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2024-06-17T17:03:56.473",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -50,10 +50,37 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:adobe:experience_manager:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "6.5.21",
|
||||
"matchCriteriaId": "33F20D83-E0D3-4504-B15F-C3240F8CFB90"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:adobe:experience_manager:*:*:*:*:aem_cloud_service:*:*:*",
|
||||
"versionEndExcluding": "2024.5",
|
||||
"matchCriteriaId": "8A667B96-AB3F-48AB-9980-11AB79AA7BD7"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://helpx.adobe.com/security/products/experience-manager/apsb24-28.html",
|
||||
"source": "psirt@adobe.com"
|
||||
"source": "psirt@adobe.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-36171",
|
||||
"sourceIdentifier": "psirt@adobe.com",
|
||||
"published": "2024-06-13T08:16:07.860",
|
||||
"lastModified": "2024-06-13T18:35:19.777",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2024-06-17T16:47:24.110",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -50,10 +50,37 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:adobe:experience_manager:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "6.5.21",
|
||||
"matchCriteriaId": "33F20D83-E0D3-4504-B15F-C3240F8CFB90"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:adobe:experience_manager:*:*:*:*:aem_cloud_service:*:*:*",
|
||||
"versionEndExcluding": "2024.5",
|
||||
"matchCriteriaId": "8A667B96-AB3F-48AB-9980-11AB79AA7BD7"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://helpx.adobe.com/security/products/experience-manager/apsb24-28.html",
|
||||
"source": "psirt@adobe.com"
|
||||
"source": "psirt@adobe.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-36172",
|
||||
"sourceIdentifier": "psirt@adobe.com",
|
||||
"published": "2024-06-13T08:16:08.123",
|
||||
"lastModified": "2024-06-13T18:35:19.777",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2024-06-17T16:42:45.833",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -50,10 +50,37 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:adobe:experience_manager:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "6.5.21",
|
||||
"matchCriteriaId": "33F20D83-E0D3-4504-B15F-C3240F8CFB90"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:adobe:experience_manager:*:*:*:*:aem_cloud_service:*:*:*",
|
||||
"versionEndExcluding": "2024.5",
|
||||
"matchCriteriaId": "8A667B96-AB3F-48AB-9980-11AB79AA7BD7"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://helpx.adobe.com/security/products/experience-manager/apsb24-28.html",
|
||||
"source": "psirt@adobe.com"
|
||||
"source": "psirt@adobe.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-36173",
|
||||
"sourceIdentifier": "psirt@adobe.com",
|
||||
"published": "2024-06-13T08:16:08.347",
|
||||
"lastModified": "2024-06-13T18:35:19.777",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2024-06-17T16:39:09.777",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -16,6 +16,26 @@
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 5.4,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.3,
|
||||
"impactScore": 2.7
|
||||
},
|
||||
{
|
||||
"source": "psirt@adobe.com",
|
||||
"type": "Secondary",
|
||||
@ -50,10 +70,37 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:adobe:experience_manager:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "6.5.21",
|
||||
"matchCriteriaId": "33F20D83-E0D3-4504-B15F-C3240F8CFB90"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:adobe:experience_manager:*:*:*:*:aem_cloud_service:*:*:*",
|
||||
"versionEndExcluding": "2024.5",
|
||||
"matchCriteriaId": "8A667B96-AB3F-48AB-9980-11AB79AA7BD7"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://helpx.adobe.com/security/products/experience-manager/apsb24-28.html",
|
||||
"source": "psirt@adobe.com"
|
||||
"source": "psirt@adobe.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-36174",
|
||||
"sourceIdentifier": "psirt@adobe.com",
|
||||
"published": "2024-06-13T08:16:08.570",
|
||||
"lastModified": "2024-06-13T18:35:19.777",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2024-06-17T16:38:56.820",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -50,10 +50,37 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:adobe:experience_manager:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "6.5.21",
|
||||
"matchCriteriaId": "33F20D83-E0D3-4504-B15F-C3240F8CFB90"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:adobe:experience_manager:*:*:*:*:aem_cloud_service:*:*:*",
|
||||
"versionEndExcluding": "2024.5",
|
||||
"matchCriteriaId": "8A667B96-AB3F-48AB-9980-11AB79AA7BD7"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://helpx.adobe.com/security/products/experience-manager/apsb24-28.html",
|
||||
"source": "psirt@adobe.com"
|
||||
"source": "psirt@adobe.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-36175",
|
||||
"sourceIdentifier": "psirt@adobe.com",
|
||||
"published": "2024-06-13T08:16:08.800",
|
||||
"lastModified": "2024-06-13T18:35:19.777",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2024-06-17T16:30:11.217",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -50,10 +50,37 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:adobe:experience_manager:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "6.5.21",
|
||||
"matchCriteriaId": "33F20D83-E0D3-4504-B15F-C3240F8CFB90"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:adobe:experience_manager:*:*:*:*:aem_cloud_service:*:*:*",
|
||||
"versionEndExcluding": "2024.5",
|
||||
"matchCriteriaId": "8A667B96-AB3F-48AB-9980-11AB79AA7BD7"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://helpx.adobe.com/security/products/experience-manager/apsb24-28.html",
|
||||
"source": "psirt@adobe.com"
|
||||
"source": "psirt@adobe.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-36176",
|
||||
"sourceIdentifier": "psirt@adobe.com",
|
||||
"published": "2024-06-13T08:16:09.023",
|
||||
"lastModified": "2024-06-13T18:35:19.777",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2024-06-17T16:27:16.317",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -50,10 +50,37 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:adobe:experience_manager:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "6.5.21",
|
||||
"matchCriteriaId": "33F20D83-E0D3-4504-B15F-C3240F8CFB90"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:adobe:experience_manager:*:*:*:*:aem_cloud_service:*:*:*",
|
||||
"versionEndExcluding": "2024.5",
|
||||
"matchCriteriaId": "8A667B96-AB3F-48AB-9980-11AB79AA7BD7"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://helpx.adobe.com/security/products/experience-manager/apsb24-28.html",
|
||||
"source": "psirt@adobe.com"
|
||||
"source": "psirt@adobe.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-36177",
|
||||
"sourceIdentifier": "psirt@adobe.com",
|
||||
"published": "2024-06-13T08:16:09.243",
|
||||
"lastModified": "2024-06-13T18:35:19.777",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2024-06-17T16:25:21.467",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -16,6 +16,26 @@
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 5.4,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.3,
|
||||
"impactScore": 2.7
|
||||
},
|
||||
{
|
||||
"source": "psirt@adobe.com",
|
||||
"type": "Secondary",
|
||||
@ -50,10 +70,37 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:adobe:experience_manager:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "6.5.21",
|
||||
"matchCriteriaId": "33F20D83-E0D3-4504-B15F-C3240F8CFB90"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:adobe:experience_manager:*:*:*:*:aem_cloud_service:*:*:*",
|
||||
"versionEndExcluding": "2024.5",
|
||||
"matchCriteriaId": "8A667B96-AB3F-48AB-9980-11AB79AA7BD7"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://helpx.adobe.com/security/products/experience-manager/apsb24-28.html",
|
||||
"source": "psirt@adobe.com"
|
||||
"source": "psirt@adobe.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-36178",
|
||||
"sourceIdentifier": "psirt@adobe.com",
|
||||
"published": "2024-06-13T08:16:09.463",
|
||||
"lastModified": "2024-06-13T18:35:19.777",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2024-06-17T16:25:07.473",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -50,10 +50,37 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:adobe:experience_manager:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "6.5.21",
|
||||
"matchCriteriaId": "33F20D83-E0D3-4504-B15F-C3240F8CFB90"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:adobe:experience_manager:*:*:*:*:aem_cloud_service:*:*:*",
|
||||
"versionEndExcluding": "2024.5",
|
||||
"matchCriteriaId": "8A667B96-AB3F-48AB-9980-11AB79AA7BD7"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://helpx.adobe.com/security/products/experience-manager/apsb24-28.html",
|
||||
"source": "psirt@adobe.com"
|
||||
"source": "psirt@adobe.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-36179",
|
||||
"sourceIdentifier": "psirt@adobe.com",
|
||||
"published": "2024-06-13T08:16:09.693",
|
||||
"lastModified": "2024-06-13T18:35:19.777",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2024-06-17T16:24:58.080",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -50,10 +50,37 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:adobe:experience_manager:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "6.5.21",
|
||||
"matchCriteriaId": "33F20D83-E0D3-4504-B15F-C3240F8CFB90"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:adobe:experience_manager:*:*:*:*:aem_cloud_service:*:*:*",
|
||||
"versionEndExcluding": "2024.5",
|
||||
"matchCriteriaId": "8A667B96-AB3F-48AB-9980-11AB79AA7BD7"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://helpx.adobe.com/security/products/experience-manager/apsb24-28.html",
|
||||
"source": "psirt@adobe.com"
|
||||
"source": "psirt@adobe.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-36180",
|
||||
"sourceIdentifier": "psirt@adobe.com",
|
||||
"published": "2024-06-13T08:16:09.920",
|
||||
"lastModified": "2024-06-13T18:35:19.777",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2024-06-17T16:24:39.483",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -50,10 +50,37 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:adobe:experience_manager:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "6.5.21",
|
||||
"matchCriteriaId": "33F20D83-E0D3-4504-B15F-C3240F8CFB90"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:adobe:experience_manager:*:*:*:*:aem_cloud_service:*:*:*",
|
||||
"versionEndExcluding": "2024.5",
|
||||
"matchCriteriaId": "8A667B96-AB3F-48AB-9980-11AB79AA7BD7"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://helpx.adobe.com/security/products/experience-manager/apsb24-28.html",
|
||||
"source": "psirt@adobe.com"
|
||||
"source": "psirt@adobe.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-36185",
|
||||
"sourceIdentifier": "psirt@adobe.com",
|
||||
"published": "2024-06-13T08:16:11.070",
|
||||
"lastModified": "2024-06-13T18:35:19.777",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2024-06-17T17:45:26.877",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -39,6 +39,16 @@
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "psirt@adobe.com",
|
||||
"type": "Secondary",
|
||||
@ -50,10 +60,37 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:adobe:experience_manager:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "6.5.21",
|
||||
"matchCriteriaId": "33F20D83-E0D3-4504-B15F-C3240F8CFB90"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:adobe:experience_manager:*:*:*:*:aem_cloud_service:*:*:*",
|
||||
"versionEndExcluding": "2024.5",
|
||||
"matchCriteriaId": "8A667B96-AB3F-48AB-9980-11AB79AA7BD7"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://helpx.adobe.com/security/products/experience-manager/apsb24-28.html",
|
||||
"source": "psirt@adobe.com"
|
||||
"source": "psirt@adobe.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-36186",
|
||||
"sourceIdentifier": "psirt@adobe.com",
|
||||
"published": "2024-06-13T08:16:11.287",
|
||||
"lastModified": "2024-06-13T18:35:19.777",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2024-06-17T17:44:46.093",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -50,10 +50,37 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:adobe:experience_manager:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "6.5.21",
|
||||
"matchCriteriaId": "33F20D83-E0D3-4504-B15F-C3240F8CFB90"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:adobe:experience_manager:*:*:*:*:aem_cloud_service:*:*:*",
|
||||
"versionEndExcluding": "2024.5",
|
||||
"matchCriteriaId": "8A667B96-AB3F-48AB-9980-11AB79AA7BD7"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://helpx.adobe.com/security/products/experience-manager/apsb24-28.html",
|
||||
"source": "psirt@adobe.com"
|
||||
"source": "psirt@adobe.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-36187",
|
||||
"sourceIdentifier": "psirt@adobe.com",
|
||||
"published": "2024-06-13T08:16:11.513",
|
||||
"lastModified": "2024-06-13T18:35:19.777",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2024-06-17T17:40:33.583",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -39,6 +39,16 @@
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "psirt@adobe.com",
|
||||
"type": "Secondary",
|
||||
@ -50,10 +60,37 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:adobe:experience_manager:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "6.5.21",
|
||||
"matchCriteriaId": "33F20D83-E0D3-4504-B15F-C3240F8CFB90"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:adobe:experience_manager:*:*:*:*:aem_cloud_service:*:*:*",
|
||||
"versionEndExcluding": "2024.5",
|
||||
"matchCriteriaId": "8A667B96-AB3F-48AB-9980-11AB79AA7BD7"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://helpx.adobe.com/security/products/experience-manager/apsb24-28.html",
|
||||
"source": "psirt@adobe.com"
|
||||
"source": "psirt@adobe.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-36188",
|
||||
"sourceIdentifier": "psirt@adobe.com",
|
||||
"published": "2024-06-13T08:16:11.793",
|
||||
"lastModified": "2024-06-13T18:35:19.777",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2024-06-17T17:34:55.847",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -16,6 +16,26 @@
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 5.4,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.3,
|
||||
"impactScore": 2.7
|
||||
},
|
||||
{
|
||||
"source": "psirt@adobe.com",
|
||||
"type": "Secondary",
|
||||
@ -50,10 +70,37 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:adobe:experience_manager:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "6.5.21",
|
||||
"matchCriteriaId": "33F20D83-E0D3-4504-B15F-C3240F8CFB90"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:adobe:experience_manager:*:*:*:*:aem_cloud_service:*:*:*",
|
||||
"versionEndExcluding": "2024.5",
|
||||
"matchCriteriaId": "8A667B96-AB3F-48AB-9980-11AB79AA7BD7"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://helpx.adobe.com/security/products/experience-manager/apsb24-28.html",
|
||||
"source": "psirt@adobe.com"
|
||||
"source": "psirt@adobe.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-36189",
|
||||
"sourceIdentifier": "psirt@adobe.com",
|
||||
"published": "2024-06-13T08:16:12.017",
|
||||
"lastModified": "2024-06-13T18:35:19.777",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2024-06-17T17:09:25.477",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -50,10 +50,37 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:adobe:experience_manager:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "6.5.21",
|
||||
"matchCriteriaId": "33F20D83-E0D3-4504-B15F-C3240F8CFB90"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:adobe:experience_manager:*:*:*:*:aem_cloud_service:*:*:*",
|
||||
"versionEndExcluding": "2024.5",
|
||||
"matchCriteriaId": "8A667B96-AB3F-48AB-9980-11AB79AA7BD7"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://helpx.adobe.com/security/products/experience-manager/apsb24-28.html",
|
||||
"source": "psirt@adobe.com"
|
||||
"source": "psirt@adobe.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
20
CVE-2024/CVE-2024-365xx/CVE-2024-36573.json
Normal file
20
CVE-2024/CVE-2024-365xx/CVE-2024-36573.json
Normal file
@ -0,0 +1,20 @@
|
||||
{
|
||||
"id": "CVE-2024-36573",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-06-17T16:15:14.947",
|
||||
"lastModified": "2024-06-17T16:15:14.947",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "almela obx before v.0.0.4 has a Prototype Pollution issue which allows arbitrary code execution via the obx/build/index.js:656), reduce (@almela/obx/build/index.js:470), Object.set (obx/build/index.js:269) component."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://gist.github.com/mestrtee/fd8181bbc180d775f8367a2b9e0ffcd1",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
20
CVE-2024/CVE-2024-365xx/CVE-2024-36574.json
Normal file
20
CVE-2024/CVE-2024-365xx/CVE-2024-36574.json
Normal file
@ -0,0 +1,20 @@
|
||||
{
|
||||
"id": "CVE-2024-36574",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-06-17T16:15:15.040",
|
||||
"lastModified": "2024-06-17T16:15:15.040",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A Prototype Pollution issue in flatten-json 1.0.1 allows an attacker to execute arbitrary code via module.exports.unflattenJSON (flatten-json/index.js:42)"
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://gist.github.com/mestrtee/d5a0c93459599f77557b5bbe78b57325",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
20
CVE-2024/CVE-2024-365xx/CVE-2024-36575.json
Normal file
20
CVE-2024/CVE-2024-365xx/CVE-2024-36575.json
Normal file
@ -0,0 +1,20 @@
|
||||
{
|
||||
"id": "CVE-2024-36575",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-06-17T16:15:15.140",
|
||||
"lastModified": "2024-06-17T16:15:15.140",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A Prototype Pollution issue in getsetprop 1.1.0 allows an attacker to execute arbitrary code via global.accessor."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://gist.github.com/mestrtee/0d830798f20839d634278d7af0155f9e",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
20
CVE-2024/CVE-2024-365xx/CVE-2024-36577.json
Normal file
20
CVE-2024/CVE-2024-365xx/CVE-2024-36577.json
Normal file
@ -0,0 +1,20 @@
|
||||
{
|
||||
"id": "CVE-2024-36577",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-06-17T16:15:15.233",
|
||||
"lastModified": "2024-06-17T16:15:15.233",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "apphp js-object-resolver < 3.1.1 is vulnerable to Prototype Pollution via Module.setNestedProperty."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://gist.github.com/mestrtee/c90189f3d8480a5f267395ec40701373",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
20
CVE-2024/CVE-2024-365xx/CVE-2024-36578.json
Normal file
20
CVE-2024/CVE-2024-365xx/CVE-2024-36578.json
Normal file
@ -0,0 +1,20 @@
|
||||
{
|
||||
"id": "CVE-2024-36578",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-06-17T16:15:15.333",
|
||||
"lastModified": "2024-06-17T16:15:15.333",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "akbr update 1.0.0 is vulnerable to Prototype Pollution via update/index.js."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://gist.github.com/mestrtee/8bc749ec2b5453d887b2f4a362a65897",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-38394",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-06-16T00:15:49.380",
|
||||
"lastModified": "2024-06-17T12:42:04.623",
|
||||
"lastModified": "2024-06-17T16:15:15.823",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-4032",
|
||||
"sourceIdentifier": "cna@python.org",
|
||||
"published": "2024-06-17T15:15:52.517",
|
||||
"lastModified": "2024-06-17T15:15:52.517",
|
||||
"lastModified": "2024-06-17T16:15:15.923",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -12,6 +12,30 @@
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/python/cpython/commit/22adf29da8d99933ffed8647d3e0726edd16f7f8",
|
||||
"source": "cna@python.org"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/python/cpython/commit/40d75c2b7f5c67e254d0a025e0f2e2c7ada7f69f",
|
||||
"source": "cna@python.org"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/python/cpython/commit/895f7e2ac23eff4743143beef0f0c5ac71ea27d3",
|
||||
"source": "cna@python.org"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/python/cpython/commit/ba431579efdcbaed7a96f2ac4ea0775879a332fb",
|
||||
"source": "cna@python.org"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/python/cpython/commit/c62c9e518b784fe44432a3f4fc265fb95b651906",
|
||||
"source": "cna@python.org"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/python/cpython/commit/f86b17ac511e68192ba71f27e752321a3252cee3",
|
||||
"source": "cna@python.org"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/python/cpython/issues/113171",
|
||||
"source": "cna@python.org"
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-5685",
|
||||
"sourceIdentifier": "596c5446-0ce5-4ba2-aa66-48b3b757a647",
|
||||
"published": "2024-06-14T10:15:10.817",
|
||||
"lastModified": "2024-06-17T12:42:04.623",
|
||||
"lastModified": "2024-06-17T17:15:51.953",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -14,7 +14,30 @@
|
||||
"value": "Los usuarios con permisos \"Usuario: editar\" y \"Self: api\" pueden promocionarse o degradarse a s\u00ed mismos o a otros usuarios realizando cambios en las membres\u00edas del grupo a trav\u00e9s de una llamada API. Este problema afecta a snipe-it: desde v4.6.17 hasta v6.4.1."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "596c5446-0ce5-4ba2-aa66-48b3b757a647",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:L",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "LOW",
|
||||
"baseScore": 7.6,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.1,
|
||||
"impactScore": 5.5
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "596c5446-0ce5-4ba2-aa66-48b3b757a647",
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-6003",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2024-06-14T22:15:10.837",
|
||||
"lastModified": "2024-06-17T12:42:04.623",
|
||||
"lastModified": "2024-06-17T16:15:16.027",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-6008",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2024-06-15T15:15:51.033",
|
||||
"lastModified": "2024-06-17T12:42:04.623",
|
||||
"lastModified": "2024-06-17T16:15:16.140",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
|
72
README.md
72
README.md
@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours.
|
||||
### Last Repository Update
|
||||
|
||||
```plain
|
||||
2024-06-17T16:00:31.403271+00:00
|
||||
2024-06-17T18:00:19.054255+00:00
|
||||
```
|
||||
|
||||
### Most recent CVE Modification Timestamp synchronized with NVD
|
||||
|
||||
```plain
|
||||
2024-06-17T15:15:52.830000+00:00
|
||||
2024-06-17T17:45:26.877000+00:00
|
||||
```
|
||||
|
||||
### Last Data Feed Release
|
||||
@ -33,50 +33,50 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
|
||||
### Total Number of included CVEs
|
||||
|
||||
```plain
|
||||
254280
|
||||
254286
|
||||
```
|
||||
|
||||
### CVEs added in the last Commit
|
||||
|
||||
Recently added CVEs: `18`
|
||||
Recently added CVEs: `6`
|
||||
|
||||
- [CVE-2024-1469](CVE-2024/CVE-2024-14xx/CVE-2024-1469.json) (`2024-06-17T15:15:50.463`)
|
||||
- [CVE-2024-36580](CVE-2024/CVE-2024-365xx/CVE-2024-36580.json) (`2024-06-17T14:15:10.227`)
|
||||
- [CVE-2024-36581](CVE-2024/CVE-2024-365xx/CVE-2024-36581.json) (`2024-06-17T15:15:51.130`)
|
||||
- [CVE-2024-36582](CVE-2024/CVE-2024-365xx/CVE-2024-36582.json) (`2024-06-17T15:15:51.243`)
|
||||
- [CVE-2024-36583](CVE-2024/CVE-2024-365xx/CVE-2024-36583.json) (`2024-06-17T14:15:10.330`)
|
||||
- [CVE-2024-37158](CVE-2024/CVE-2024-371xx/CVE-2024-37158.json) (`2024-06-17T14:15:10.430`)
|
||||
- [CVE-2024-37159](CVE-2024/CVE-2024-371xx/CVE-2024-37159.json) (`2024-06-17T14:15:10.693`)
|
||||
- [CVE-2024-37619](CVE-2024/CVE-2024-376xx/CVE-2024-37619.json) (`2024-06-17T14:15:10.943`)
|
||||
- [CVE-2024-37620](CVE-2024/CVE-2024-376xx/CVE-2024-37620.json) (`2024-06-17T14:15:11.047`)
|
||||
- [CVE-2024-37621](CVE-2024/CVE-2024-376xx/CVE-2024-37621.json) (`2024-06-17T14:15:11.153`)
|
||||
- [CVE-2024-37622](CVE-2024/CVE-2024-376xx/CVE-2024-37622.json) (`2024-06-17T14:15:11.480`)
|
||||
- [CVE-2024-37623](CVE-2024/CVE-2024-376xx/CVE-2024-37623.json) (`2024-06-17T14:15:11.580`)
|
||||
- [CVE-2024-37624](CVE-2024/CVE-2024-376xx/CVE-2024-37624.json) (`2024-06-17T14:15:11.680`)
|
||||
- [CVE-2024-37625](CVE-2024/CVE-2024-376xx/CVE-2024-37625.json) (`2024-06-17T14:15:11.790`)
|
||||
- [CVE-2024-37848](CVE-2024/CVE-2024-378xx/CVE-2024-37848.json) (`2024-06-17T14:15:11.890`)
|
||||
- [CVE-2024-38469](CVE-2024/CVE-2024-384xx/CVE-2024-38469.json) (`2024-06-17T14:15:12.070`)
|
||||
- [CVE-2024-38470](CVE-2024/CVE-2024-384xx/CVE-2024-38470.json) (`2024-06-17T14:15:12.183`)
|
||||
- [CVE-2024-4032](CVE-2024/CVE-2024-40xx/CVE-2024-4032.json) (`2024-06-17T15:15:52.517`)
|
||||
- [CVE-2024-0397](CVE-2024/CVE-2024-03xx/CVE-2024-0397.json) (`2024-06-17T16:15:10.217`)
|
||||
- [CVE-2024-36573](CVE-2024/CVE-2024-365xx/CVE-2024-36573.json) (`2024-06-17T16:15:14.947`)
|
||||
- [CVE-2024-36574](CVE-2024/CVE-2024-365xx/CVE-2024-36574.json) (`2024-06-17T16:15:15.040`)
|
||||
- [CVE-2024-36575](CVE-2024/CVE-2024-365xx/CVE-2024-36575.json) (`2024-06-17T16:15:15.140`)
|
||||
- [CVE-2024-36577](CVE-2024/CVE-2024-365xx/CVE-2024-36577.json) (`2024-06-17T16:15:15.233`)
|
||||
- [CVE-2024-36578](CVE-2024/CVE-2024-365xx/CVE-2024-36578.json) (`2024-06-17T16:15:15.333`)
|
||||
|
||||
|
||||
### CVEs modified in the last Commit
|
||||
|
||||
Recently modified CVEs: `13`
|
||||
Recently modified CVEs: `25`
|
||||
|
||||
- [CVE-2022-45063](CVE-2022/CVE-2022-450xx/CVE-2022-45063.json) (`2024-06-17T15:15:50.030`)
|
||||
- [CVE-2024-34997](CVE-2024/CVE-2024-349xx/CVE-2024-34997.json) (`2024-06-17T14:15:09.950`)
|
||||
- [CVE-2024-37383](CVE-2024/CVE-2024-373xx/CVE-2024-37383.json) (`2024-06-17T15:15:51.517`)
|
||||
- [CVE-2024-37384](CVE-2024/CVE-2024-373xx/CVE-2024-37384.json) (`2024-06-17T15:15:51.640`)
|
||||
- [CVE-2024-38395](CVE-2024/CVE-2024-383xx/CVE-2024-38395.json) (`2024-06-17T15:15:51.900`)
|
||||
- [CVE-2024-38396](CVE-2024/CVE-2024-383xx/CVE-2024-38396.json) (`2024-06-17T15:15:52.007`)
|
||||
- [CVE-2024-6006](CVE-2024/CVE-2024-60xx/CVE-2024-6006.json) (`2024-06-17T15:15:52.693`)
|
||||
- [CVE-2024-6015](CVE-2024/CVE-2024-60xx/CVE-2024-6015.json) (`2024-06-17T15:15:52.830`)
|
||||
- [CVE-2024-6016](CVE-2024/CVE-2024-60xx/CVE-2024-6016.json) (`2024-06-17T14:15:12.487`)
|
||||
- [CVE-2024-6039](CVE-2024/CVE-2024-60xx/CVE-2024-6039.json) (`2024-06-17T14:15:12.620`)
|
||||
- [CVE-2024-6041](CVE-2024/CVE-2024-60xx/CVE-2024-6041.json) (`2024-06-17T14:15:12.733`)
|
||||
- [CVE-2024-6043](CVE-2024/CVE-2024-60xx/CVE-2024-6043.json) (`2024-06-17T14:15:12.833`)
|
||||
- [CVE-2024-6047](CVE-2024/CVE-2024-60xx/CVE-2024-6047.json) (`2024-06-17T14:15:13.040`)
|
||||
- [CVE-2021-47472](CVE-2021/CVE-2021-474xx/CVE-2021-47472.json) (`2024-06-17T17:15:51.050`)
|
||||
- [CVE-2024-23134](CVE-2024/CVE-2024-231xx/CVE-2024-23134.json) (`2024-06-17T17:15:51.443`)
|
||||
- [CVE-2024-36168](CVE-2024/CVE-2024-361xx/CVE-2024-36168.json) (`2024-06-17T17:08:50.037`)
|
||||
- [CVE-2024-36169](CVE-2024/CVE-2024-361xx/CVE-2024-36169.json) (`2024-06-17T17:04:09.503`)
|
||||
- [CVE-2024-36170](CVE-2024/CVE-2024-361xx/CVE-2024-36170.json) (`2024-06-17T17:03:56.473`)
|
||||
- [CVE-2024-36171](CVE-2024/CVE-2024-361xx/CVE-2024-36171.json) (`2024-06-17T16:47:24.110`)
|
||||
- [CVE-2024-36172](CVE-2024/CVE-2024-361xx/CVE-2024-36172.json) (`2024-06-17T16:42:45.833`)
|
||||
- [CVE-2024-36173](CVE-2024/CVE-2024-361xx/CVE-2024-36173.json) (`2024-06-17T16:39:09.777`)
|
||||
- [CVE-2024-36174](CVE-2024/CVE-2024-361xx/CVE-2024-36174.json) (`2024-06-17T16:38:56.820`)
|
||||
- [CVE-2024-36175](CVE-2024/CVE-2024-361xx/CVE-2024-36175.json) (`2024-06-17T16:30:11.217`)
|
||||
- [CVE-2024-36176](CVE-2024/CVE-2024-361xx/CVE-2024-36176.json) (`2024-06-17T16:27:16.317`)
|
||||
- [CVE-2024-36177](CVE-2024/CVE-2024-361xx/CVE-2024-36177.json) (`2024-06-17T16:25:21.467`)
|
||||
- [CVE-2024-36178](CVE-2024/CVE-2024-361xx/CVE-2024-36178.json) (`2024-06-17T16:25:07.473`)
|
||||
- [CVE-2024-36179](CVE-2024/CVE-2024-361xx/CVE-2024-36179.json) (`2024-06-17T16:24:58.080`)
|
||||
- [CVE-2024-36180](CVE-2024/CVE-2024-361xx/CVE-2024-36180.json) (`2024-06-17T16:24:39.483`)
|
||||
- [CVE-2024-36185](CVE-2024/CVE-2024-361xx/CVE-2024-36185.json) (`2024-06-17T17:45:26.877`)
|
||||
- [CVE-2024-36186](CVE-2024/CVE-2024-361xx/CVE-2024-36186.json) (`2024-06-17T17:44:46.093`)
|
||||
- [CVE-2024-36187](CVE-2024/CVE-2024-361xx/CVE-2024-36187.json) (`2024-06-17T17:40:33.583`)
|
||||
- [CVE-2024-36188](CVE-2024/CVE-2024-361xx/CVE-2024-36188.json) (`2024-06-17T17:34:55.847`)
|
||||
- [CVE-2024-36189](CVE-2024/CVE-2024-361xx/CVE-2024-36189.json) (`2024-06-17T17:09:25.477`)
|
||||
- [CVE-2024-38394](CVE-2024/CVE-2024-383xx/CVE-2024-38394.json) (`2024-06-17T16:15:15.823`)
|
||||
- [CVE-2024-4032](CVE-2024/CVE-2024-40xx/CVE-2024-4032.json) (`2024-06-17T16:15:15.923`)
|
||||
- [CVE-2024-5685](CVE-2024/CVE-2024-56xx/CVE-2024-5685.json) (`2024-06-17T17:15:51.953`)
|
||||
- [CVE-2024-6003](CVE-2024/CVE-2024-60xx/CVE-2024-6003.json) (`2024-06-17T16:15:16.027`)
|
||||
- [CVE-2024-6008](CVE-2024/CVE-2024-60xx/CVE-2024-6008.json) (`2024-06-17T16:15:16.140`)
|
||||
|
||||
|
||||
## Download and Usage
|
||||
|
116
_state.csv
116
_state.csv
@ -187269,7 +187269,7 @@ CVE-2021-47468,0,0,b58fcad515b90a658d1f8eb09772b6deadbab142893484848bfd4f0e6a5e8
|
||||
CVE-2021-47469,0,0,27ed4ca714e333af908656c7f0d26dbc4e54e957cf91be05caddcc4168e639c1,2024-05-22T12:46:53.887000
|
||||
CVE-2021-47470,0,0,c7a6cba2bc0b5c738140227ec594b9a0a83cbeace54488d607923103cad0f3cf,2024-05-22T12:46:53.887000
|
||||
CVE-2021-47471,0,0,279140f208b843b6f923cb9d7379164abe2a6902c16231ebaa829337929258b5,2024-05-22T12:46:53.887000
|
||||
CVE-2021-47472,0,0,57cb5e3222527955d33e3d4cf89cd6fe35f48b9895280b8dc83163a8f0ebe296,2024-05-22T12:46:53.887000
|
||||
CVE-2021-47472,0,1,d7ffb60c1efa6aeedbeb6f5a045eedbe61f352602a4eba01f18d081b1113df22,2024-06-17T17:15:51.050000
|
||||
CVE-2021-47473,0,0,a06d0b2b3fb2a56155409742cc763e481118233c333bae60fb67e17923573646,2024-05-22T12:46:53.887000
|
||||
CVE-2021-47474,0,0,5aa7ee22ccceebf8afc658dcaeb529c380fd6398ba5a5b4aacbae80a3d788859,2024-05-22T12:46:53.887000
|
||||
CVE-2021-47475,0,0,bda5bd6370629486bc328ef4919cd6bc566c5d10fcc12f7f374913a6b12c2f04,2024-05-22T12:46:53.887000
|
||||
@ -209550,7 +209550,7 @@ CVE-2022-4506,0,0,388cac1f1c301dc7cff057939031103872db1f3f3a75fd21698e08bbe0563d
|
||||
CVE-2022-45060,0,0,5b47bc5f08e58e38ac2add6434b07d72fa9f0a84c5e77644e299fa3325654c5b,2023-11-07T03:54:30.160000
|
||||
CVE-2022-45061,0,0,8c2028061c96c377e19e79d63bb87a3753e42cec6699e8695a116f5a3eb0edaf,2023-11-07T03:54:30.370000
|
||||
CVE-2022-45062,0,0,7978b2bd09950ada8a5c7c58e675d73856f9a6371fcf1ebcbdcebe9ed2b309e9,2023-11-07T03:54:30.667000
|
||||
CVE-2022-45063,0,1,90246b55dc9eaa0cf3cbc063c0697a76c67c76a24fe906ee03a23ae249ac9bae,2024-06-17T15:15:50.030000
|
||||
CVE-2022-45063,0,0,90246b55dc9eaa0cf3cbc063c0697a76c67c76a24fe906ee03a23ae249ac9bae,2024-06-17T15:15:50.030000
|
||||
CVE-2022-45064,0,0,8ab0377c48bd22cbb9b664ef6c8d7cc3ac3e6daa8f62054c33a8f4eb65bce348,2023-05-01T15:19:22.327000
|
||||
CVE-2022-45065,0,0,894b0e5a345fc2b6d90601b8dd296c2fdf42825b93f971c4ca75e6698905fcd0,2023-06-07T02:42:37.610000
|
||||
CVE-2022-45066,0,0,c0ca48be00d9356f9e9bf21ec0ddcd94d1e992aa7412c16ede9969f595d5ceb5,2023-07-07T19:06:57.727000
|
||||
@ -240663,6 +240663,7 @@ CVE-2024-0393,0,0,8881de5088bee2f43467b73941f684354c9bcdccfa7386a7827d4a78a7e8f3
|
||||
CVE-2024-0394,0,0,132997f5a0f39575e52ab364803d29384d542a557e73a32dea0a249b2357dfb2,2024-04-03T17:24:18.150000
|
||||
CVE-2024-0395,0,0,9697a8ac3bbf759d0c2ea19b7ab0aa903676619b1d5a607c85b8d090a4e44ee7,2024-01-10T14:15:44.970000
|
||||
CVE-2024-0396,0,0,106628bcb832aae2e274e4e91fdb5add809827efe4c459066d3102ffe0249334,2024-01-29T15:22:40.317000
|
||||
CVE-2024-0397,1,1,4ce7ed96e8724eda679ad0a7861920e41577ccf8436b1e71272a906b64dd14cf,2024-06-17T16:15:10.217000
|
||||
CVE-2024-0399,0,0,f9efd00d0c28d2f5fd7844014ccf20e6de83c83ab3d0467105e159f94efa805f,2024-04-15T13:15:31.997000
|
||||
CVE-2024-0400,0,0,18035b4484267a537c15645ebee53285fc55ae5559f980b5f9795ec2795f24dd,2024-03-27T12:29:30.307000
|
||||
CVE-2024-0401,0,0,eb06da8d7bba1b4b23b9513633128fc89991a02e4c0b59d538b76f5796878a05,2024-05-20T19:34:58.277000
|
||||
@ -241655,7 +241656,7 @@ CVE-2024-1465,0,0,50640d1b9b662f6b9595f667c6dea5a3109040974a7a6904d50f64c468dbca
|
||||
CVE-2024-1466,0,0,5d578968ae7705cd3a7f52ecf71135f312a30236a60a176e5837a6a9be923e7c,2024-04-10T13:24:00.070000
|
||||
CVE-2024-1467,0,0,794b2e34fc29a7ca46314dc4e89d3bd1a17e862451f6eea4c4860a47298fd0fc,2024-05-14T16:13:02.773000
|
||||
CVE-2024-1468,0,0,4517d5dd5472fccb03db943dd2b07b64e505f3a6f8deb2585efb6085b2bb0ecf,2024-02-29T13:49:29.390000
|
||||
CVE-2024-1469,1,1,80c99dc24984d50a25fa4cb7d8ca5eb0841093652956a3c1cf0784b3c4304276,2024-06-17T15:15:50.463000
|
||||
CVE-2024-1469,0,0,80c99dc24984d50a25fa4cb7d8ca5eb0841093652956a3c1cf0784b3c4304276,2024-06-17T15:15:50.463000
|
||||
CVE-2024-1470,0,0,a319bf52254e8a113f9bd2ad26de6ffc3c195db928a3c5fc6503676eeb57300e,2024-02-29T13:49:29.390000
|
||||
CVE-2024-1471,0,0,10089aa571f1fe9be8fa521af5eb8689bcde31feb298e1e8773050de96f09f74,2024-02-15T06:23:39.303000
|
||||
CVE-2024-1472,0,0,b8b37bbb78d2bcf57581579502511285c9e84a3386a04504777433272deb3c69,2024-02-29T13:49:29.390000
|
||||
@ -243919,7 +243920,7 @@ CVE-2024-23130,0,0,1e3e1092d31e482531a23d074c00b2201eef463d384cdf1e1935233d4885d
|
||||
CVE-2024-23131,0,0,c427ee94f7c61adaf0716529d63f7a538f863e445e4db249885a3e64e551be88,2024-03-18T00:15:07.247000
|
||||
CVE-2024-23132,0,0,f22a2bdc1f997a36d13f6c22afab4983451c9373205a8ec6621cdd27061b8266,2024-03-18T00:15:07.297000
|
||||
CVE-2024-23133,0,0,e86482bc439e59c6d3cf72bc6bb19d1a229eba94c9abdd88aed6d4ca00d35e18,2024-03-18T00:15:07.340000
|
||||
CVE-2024-23134,0,0,9c14f351d7c27726a231552e0ccb040ecd6b6423de601a2a581efa4b1d3b8836,2024-06-15T00:15:09.510000
|
||||
CVE-2024-23134,0,1,7bcfdd789809a85dcb3d8c1b9ffa0666d172be0747695b354e86aa69e00d8a04,2024-06-17T17:15:51.443000
|
||||
CVE-2024-23135,0,0,4ba3ef7d8b86192f3be9f608d250b59255f9c0272b793b5a67accf11746a7c49,2024-03-18T00:15:07.437000
|
||||
CVE-2024-23136,0,0,2b90dcbe6397ed8c7559581d051fafe64c4814ea200ea96c2ab2b35870ef1cba,2024-03-18T00:15:07.490000
|
||||
CVE-2024-23137,0,0,b73ac1a3962b6dd849e09860e5fbdd306ad601f2f1d6396ea6c594ab1cd8349c,2024-03-18T00:15:07.537000
|
||||
@ -251485,7 +251486,7 @@ CVE-2024-34982,0,0,ef460a32eb987949d8c2a373dc7919974bee9f6e2b2a3c53ead2e4138396c
|
||||
CVE-2024-34987,0,0,edad55abf7d40946048d2203f95e4c0f43a6b9878eca0140c291bcc01e48c704,2024-06-04T16:57:41.057000
|
||||
CVE-2024-3499,0,0,38e1f3a6ce5aff826b19a73a4f796b980cc1161eaf58f8fada2f6f87e54573a4,2024-05-02T18:00:37.360000
|
||||
CVE-2024-34995,0,0,ff7295f94bdc66d877986c97deb7981eb83c3e840f72ac7a8ee7543b9685ad7b,2024-05-24T18:09:20.027000
|
||||
CVE-2024-34997,0,1,cee044c4ccffe504e44bd95724dd0befc01681debe6525e4c247f664c7f74ef5,2024-06-17T14:15:09.950000
|
||||
CVE-2024-34997,0,0,cee044c4ccffe504e44bd95724dd0befc01681debe6525e4c247f664c7f74ef5,2024-06-17T14:15:09.950000
|
||||
CVE-2024-3500,0,0,bd83544d3c8c82359104dcd5b032a6095cbae3178ec9c9c56ddfe242d28462ee,2024-05-02T18:00:37.360000
|
||||
CVE-2024-35009,0,0,3a464f11376d0472939f04e02c9cdd08c5fb1d5981603d76946fb2eb9747024a,2024-05-14T19:17:55.627000
|
||||
CVE-2024-35010,0,0,6784a947df2e9deefe9757ceafde92b1b4ea5ac58202274413dd6808bde18093,2024-05-14T19:17:55.627000
|
||||
@ -252226,30 +252227,30 @@ CVE-2024-36164,0,0,f24c589d857b5e5a2b9d4256791e32b4fa7cdbb2ce305a445e9a9ffe9d1fd
|
||||
CVE-2024-36165,0,0,d2403d5a5d1a283e2c86dcc0bb4def26b48cf9a71e084367444d01607e25f0a0,2024-06-13T18:35:19.777000
|
||||
CVE-2024-36166,0,0,ead3dc226ae554bb2dfcf3482b8d6f93ea8911d937aa6f7b332fce59816e80d2,2024-06-13T18:35:19.777000
|
||||
CVE-2024-36167,0,0,91e0d72536b27941c64682cccce3b4e2e7dfd5a75b1fd0ca62da6225d7a73ac0,2024-06-13T18:35:19.777000
|
||||
CVE-2024-36168,0,0,6f98221691398eab45dd123099f2d058d86c920b0318dd443ccee432dd47ddb7,2024-06-13T18:35:19.777000
|
||||
CVE-2024-36169,0,0,0da8151d02420d075605ca9df1c263b0e78da4c1a38f0db92874ced4497f95c8,2024-06-13T18:35:19.777000
|
||||
CVE-2024-36168,0,1,d9e1fe51c8fbe7a0c171ea17ef6138e97ecfb927ae9efba2a521f5e73a1c2fa9,2024-06-17T17:08:50.037000
|
||||
CVE-2024-36169,0,1,a58aca443e054709df42bac621b16e63f601fbd9af04f2e770fa783666f8bbc2,2024-06-17T17:04:09.503000
|
||||
CVE-2024-3617,0,0,f567fe2d001aaca41d03c0a0366ef1e99b32bc6e27d43d00554123f9bc28d775,2024-06-04T19:20:22.087000
|
||||
CVE-2024-36170,0,0,22d5ef95de3ce9ed601256473ac91d4ab8ebd6b6565005499536be8e6ed1c54e,2024-06-13T18:35:19.777000
|
||||
CVE-2024-36171,0,0,29d46bd791183cb831f662631eb5f9cf5311c5852f5db905f0a0ec0812c8b5b7,2024-06-13T18:35:19.777000
|
||||
CVE-2024-36172,0,0,51025294f4d7acfa0659811afd8b4cdee9b616a0898b8c3dcee9d38634c054c0,2024-06-13T18:35:19.777000
|
||||
CVE-2024-36173,0,0,9d0706ab2db61ab6c5bd4b4720e69a84801995685530ea981cc7bc34bba3d71a,2024-06-13T18:35:19.777000
|
||||
CVE-2024-36174,0,0,6465966f88cdc4854aec346eff145eb4792854f3013a7b82455383e630e6c788,2024-06-13T18:35:19.777000
|
||||
CVE-2024-36175,0,0,dcb1764a7f9b839ce2be26515c6058898f5e3ec9afc1e8f1bf8d40cf89e841e3,2024-06-13T18:35:19.777000
|
||||
CVE-2024-36176,0,0,88febb481e273284ef5e6da8b357839e5f2e13c402b66551f1ed87db49dd8792,2024-06-13T18:35:19.777000
|
||||
CVE-2024-36177,0,0,78262882571779909f0bca3e7f768f8594dd9429c58cb8a6889efcc354e4590a,2024-06-13T18:35:19.777000
|
||||
CVE-2024-36178,0,0,38fa5233f394a4dedc9e0e2fb97e4b0267e5dd19f61a43f0ddf69bc3c2b6b33d,2024-06-13T18:35:19.777000
|
||||
CVE-2024-36179,0,0,bb43a35b916d2096207d5709b89155ce8736c5a72808929f44708f1680448928,2024-06-13T18:35:19.777000
|
||||
CVE-2024-36170,0,1,55c054c5ccd0ed1b79e149145fad6587bca625b70e6e1677142d0e74aba34eaa,2024-06-17T17:03:56.473000
|
||||
CVE-2024-36171,0,1,5ae32dcb256374ac8c471fd7950e1045f67ef9da0229b2bfb53e944968cec7a7,2024-06-17T16:47:24.110000
|
||||
CVE-2024-36172,0,1,65f98fe2d8d2975bca5a731d70e2afdd2b77874c7d99a778c5b9756d40a87dfd,2024-06-17T16:42:45.833000
|
||||
CVE-2024-36173,0,1,609613d6da423f3481b043da61f09ece7535e3749189db36cdbd6d1dedb2ed2c,2024-06-17T16:39:09.777000
|
||||
CVE-2024-36174,0,1,612b3524e3bcbc509f8b54b48031e925b18ed3387c24a7c4349a785c129fa3d8,2024-06-17T16:38:56.820000
|
||||
CVE-2024-36175,0,1,cbedfbe0ad3671af78a976f49a40be29e1aed21e3115f629482d4401868e075e,2024-06-17T16:30:11.217000
|
||||
CVE-2024-36176,0,1,e8217e2419f6e849a46aa90642dc7b1ce15412be354328c878868bea9e40e9b8,2024-06-17T16:27:16.317000
|
||||
CVE-2024-36177,0,1,ff5febe8c09df3a91e398dffd50ff9388941b5445febd1c679119be209fb89c2,2024-06-17T16:25:21.467000
|
||||
CVE-2024-36178,0,1,8dcb946dfee7b963619ba7ba0e6a46a3dd96080f30f83f4807f7834e38fd2792,2024-06-17T16:25:07.473000
|
||||
CVE-2024-36179,0,1,118021cd24c6285797e8cd3829754e899301c1729807e50ed7aafcb1d134d848,2024-06-17T16:24:58.080000
|
||||
CVE-2024-3618,0,0,49acf1181a6848a16665fb73aec3d174ce097deba0c0b38747c9b85c5bffb2db,2024-06-04T19:20:22.213000
|
||||
CVE-2024-36180,0,0,fe57516b1c2203b6a262edef68ba3ed50796187752786a7b59226a47e7640935,2024-06-13T18:35:19.777000
|
||||
CVE-2024-36180,0,1,33f0fbd8ed8da11dcc141ccb70d1a4c1ffe93db624930c800eda80f920d5effc,2024-06-17T16:24:39.483000
|
||||
CVE-2024-36181,0,0,b9c60fc14f35f74dc6621071407b577fa01522dbbba32652fc2bdaa9527d16f5,2024-06-13T18:35:19.777000
|
||||
CVE-2024-36182,0,0,52e41f6547ccf305a197ce4a3755e9e266aac6e3da17db97f98a19e1efbbe24a,2024-06-13T18:35:19.777000
|
||||
CVE-2024-36183,0,0,c551d8e4091d1bc3878639d8613802cc5fc92bee52d39bce0a1f0f7ba962ccb3,2024-06-13T18:35:19.777000
|
||||
CVE-2024-36184,0,0,8e30f8df2c1254b0af6aea9e9eeb32121c0b3da7ec5b7850d6e06bd8d0e2342b,2024-06-13T18:35:19.777000
|
||||
CVE-2024-36185,0,0,8388accfc292233740060116f3714ed04b773fc3a38fd2e397012a2073b5f788,2024-06-13T18:35:19.777000
|
||||
CVE-2024-36186,0,0,61af846b3711ea225505ff419ac8e275a158c704140b0982b14aaec887a8ec77,2024-06-13T18:35:19.777000
|
||||
CVE-2024-36187,0,0,143348d7c118b5f0f005790c1e6c3f29c06b6acb5c08f89a89b6cd2e12435166,2024-06-13T18:35:19.777000
|
||||
CVE-2024-36188,0,0,ac1d0175c7c967ab18ac92850204df939dd4f53663b8e9f64093b07a6c4134fb,2024-06-13T18:35:19.777000
|
||||
CVE-2024-36189,0,0,90cb1e73a453a81e027bccf1b901257cf1d5f9362990f720c80279c7c7dffccd,2024-06-13T18:35:19.777000
|
||||
CVE-2024-36185,0,1,49b47a11e53b4dee718dabc2e1f0a06114ce49b2284b50acf0c2178814eef42c,2024-06-17T17:45:26.877000
|
||||
CVE-2024-36186,0,1,ff6dc51cf8bbb78a7249b14b3bf1da4bf203942ab188537cb35bc3d5d1088959,2024-06-17T17:44:46.093000
|
||||
CVE-2024-36187,0,1,22ece855690dce9348d2203aa872cc428d44e30d9de97df4eca43d487706dbdc,2024-06-17T17:40:33.583000
|
||||
CVE-2024-36188,0,1,0bec449cf01af5399cea99298ffcfc02e2e48310698ba7c78ddb8491b430eab0,2024-06-17T17:34:55.847000
|
||||
CVE-2024-36189,0,1,05b4c9026773415c49a51c07f2f0c992c1049b3f3d114f94fdda2f499829580e,2024-06-17T17:09:25.477000
|
||||
CVE-2024-3619,0,0,165314f79e4f722f622203e47502b9381ecf302926cb9ad2cdc2988542678367,2024-05-17T02:40:02.103000
|
||||
CVE-2024-36190,0,0,7a560eaa6ce211d28e10c0c6befeae5dc18f5e8729ba3bdb3d5f735f9fd50003,2024-06-13T18:35:19.777000
|
||||
CVE-2024-36191,0,0,268ffaf8e90fc90ff53ab226e8efac8444105ea810fb7215f5f7cc4b037b6ef9,2024-06-13T18:35:19.777000
|
||||
@ -252417,11 +252418,16 @@ CVE-2024-36550,0,0,affd201d52525b08fe9dc0ac43cf536ec50f780fc23bf861db62d86c798cf
|
||||
CVE-2024-36568,0,0,f6757785c01c43727d227a9340ded7869db334138c1e07644080e388c657d4de,2024-06-03T14:46:24.250000
|
||||
CVE-2024-36569,0,0,cc62a3b4fb5fe5cf7891883c6e12ba14de517f9765eb42867751af3c3e50f0ad,2024-06-03T14:46:24.250000
|
||||
CVE-2024-3657,0,0,e0e9aa98b4bfe8d4d80395efd4c4293865e72a7d88d35e61376b8312bdae8c3e,2024-06-12T10:15:31.447000
|
||||
CVE-2024-36573,1,1,750ebe45272a4f2bbd917f456a069d3e63271e35a219c08d85bf8093c0a0b6e5,2024-06-17T16:15:14.947000
|
||||
CVE-2024-36574,1,1,64bd9cd44e2422837b446ec1e39651bbbef09e30ab3a39b8f1b8b0361052792b,2024-06-17T16:15:15.040000
|
||||
CVE-2024-36575,1,1,ed36a3dda7699a6151615dd0f4a8ba608593c659559e706aa039085e6ab6425e,2024-06-17T16:15:15.140000
|
||||
CVE-2024-36577,1,1,701237de0aa421f725f50cae5349a1b7b236344f940da970bc8c4371b26d1374,2024-06-17T16:15:15.233000
|
||||
CVE-2024-36578,1,1,54d498d91b0b299bd1280e0e84877cbb031dddd415152caf68b05edc849f7e06,2024-06-17T16:15:15.333000
|
||||
CVE-2024-3658,0,0,788a6c57a5cc1d17a8f73184ec3f2bfe6dae89c54b4197447e7e87a36bebe3cf,2024-05-28T15:15:09.703000
|
||||
CVE-2024-36580,1,1,982f3c6e1a409feccad1e6cb4897a8a8d95dbec5c8d00651e139725a763f9359,2024-06-17T14:15:10.227000
|
||||
CVE-2024-36581,1,1,b0b55ea5afa036e7fb18c148b1b9ee7a2c8d7dd817cbe56e30c27abf908e433f,2024-06-17T15:15:51.130000
|
||||
CVE-2024-36582,1,1,cd975f5489e3afb4887de7292d56befb6ee6fe1867e756ee11a14f65cfd00746,2024-06-17T15:15:51.243000
|
||||
CVE-2024-36583,1,1,df878686601707220f20331c39cf545bdf859668e3801b689232bee9d5ed1b83,2024-06-17T14:15:10.330000
|
||||
CVE-2024-36580,0,0,982f3c6e1a409feccad1e6cb4897a8a8d95dbec5c8d00651e139725a763f9359,2024-06-17T14:15:10.227000
|
||||
CVE-2024-36581,0,0,b0b55ea5afa036e7fb18c148b1b9ee7a2c8d7dd817cbe56e30c27abf908e433f,2024-06-17T15:15:51.130000
|
||||
CVE-2024-36582,0,0,cd975f5489e3afb4887de7292d56befb6ee6fe1867e756ee11a14f65cfd00746,2024-06-17T15:15:51.243000
|
||||
CVE-2024-36583,0,0,df878686601707220f20331c39cf545bdf859668e3801b689232bee9d5ed1b83,2024-06-17T14:15:10.330000
|
||||
CVE-2024-36586,0,0,302fd67d5bf11292556b5a817ae025f56479dee1787f148e919beea3947496ec,2024-06-17T12:43:31.090000
|
||||
CVE-2024-36587,0,0,906aafdc070e7118cc2f1e5d5e49e8746361ad3b3c3a10318730a2cccba4b3ea,2024-06-17T12:43:31.090000
|
||||
CVE-2024-36588,0,0,041c855a0e5ca096dd16030ca52f4146f7b727baaf22aa52e219f4870ac0578a,2024-06-17T12:43:31.090000
|
||||
@ -252657,8 +252663,8 @@ CVE-2024-37152,0,0,d5beb8b2bc90de99efc40fac5a89948f3b2a0d50610a65220e35a91d41ce9
|
||||
CVE-2024-37153,0,0,61a2831c55890f9a410cc075d806b38e60c3b9609259f6ca16f7a060d646905b,2024-06-07T14:56:05.647000
|
||||
CVE-2024-37154,0,0,58669c60bd370ee58122b9f7af67de36a61a42702559484c7a8e000321217599,2024-06-07T14:56:05.647000
|
||||
CVE-2024-37156,0,0,7e333f2d85e8aebcd8a0c3a0c10b32f6169582c9ae7ef770c4979e919256c1f4,2024-06-07T14:56:05.647000
|
||||
CVE-2024-37158,1,1,5348c4c38275397f3520772b12ec38e3c593ac69b019bca4b488d2a1b249386c,2024-06-17T14:15:10.430000
|
||||
CVE-2024-37159,1,1,d344d7501c8b30ba12ac270cde5ae0c0a3bba069f84ba8f18f004f87a5111c3f,2024-06-17T14:15:10.693000
|
||||
CVE-2024-37158,0,0,5348c4c38275397f3520772b12ec38e3c593ac69b019bca4b488d2a1b249386c,2024-06-17T14:15:10.430000
|
||||
CVE-2024-37159,0,0,d344d7501c8b30ba12ac270cde5ae0c0a3bba069f84ba8f18f004f87a5111c3f,2024-06-17T14:15:10.693000
|
||||
CVE-2024-3716,0,0,af5955d3cd1b32e274172fb5b13bf929bfcbd5385e8a0e6b7e0b4e589767e1c9,2024-06-06T14:17:35.017000
|
||||
CVE-2024-37160,0,0,76b6b47acfcb84ecfe47e9095986f2ff3f5ea200ba6d7cfb795a680bd69b22ef,2024-06-11T18:22:50.097000
|
||||
CVE-2024-37161,0,0,9c5192d6b3269f1f004ac7a8938b555cac9b29a8a4452c22b7bb7bb22e8cfd15,2024-06-13T18:36:45.417000
|
||||
@ -252721,8 +252727,8 @@ CVE-2024-37368,0,0,956c028a8638d3a3e19949beb7545c84f68f21d91e6b291904004a55453a0
|
||||
CVE-2024-37369,0,0,7108a286445619350057461b39fedff0137563337148ca5c14290fc641ad2c5e,2024-06-17T12:42:04.623000
|
||||
CVE-2024-3737,0,0,e288f29127240d626de190f33aa5cc85cc615dc26f102a0c00221aa9708716e3,2024-05-17T02:40:05.887000
|
||||
CVE-2024-3738,0,0,0968d9618a10c036b25eaa390531466819e491a5c992bcf4c715af4b591b9121,2024-05-17T02:40:05.977000
|
||||
CVE-2024-37383,0,1,c0362d3d95fe11bdc30f3c36377b27485de734d675fe1b90f60703cfe5051656,2024-06-17T15:15:51.517000
|
||||
CVE-2024-37384,0,1,2bdb7db18773042dbfcf7b4442179738e059134c1a70f1a6d09b92e8cfe2872e,2024-06-17T15:15:51.640000
|
||||
CVE-2024-37383,0,0,c0362d3d95fe11bdc30f3c36377b27485de734d675fe1b90f60703cfe5051656,2024-06-17T15:15:51.517000
|
||||
CVE-2024-37384,0,0,2bdb7db18773042dbfcf7b4442179738e059134c1a70f1a6d09b92e8cfe2872e,2024-06-17T15:15:51.640000
|
||||
CVE-2024-37385,0,0,ab67b8a0f073ce7f5c28ca11584627dbf70b59e11b1337a1068ce1887aeb0943,2024-06-07T14:56:05.647000
|
||||
CVE-2024-37388,0,0,78091082c96da1cca6d1b3a881a45160af8428a4ada3a4ba554597b78ade9a76,2024-06-07T19:24:09.243000
|
||||
CVE-2024-3739,0,0,18ca969c974b63c6d16494fbcc2d63756747cacc5947332fefb20d9c592537e4,2024-05-17T02:40:06.067000
|
||||
@ -252752,14 +252758,14 @@ CVE-2024-37570,0,0,a374041c2622c9ba66d2048315fc9e015af6a8717cce4f8beb5b598003986
|
||||
CVE-2024-3758,0,0,3ea9ecbea279ca1eb1159e542db09b1cab2d2435be79c6a6a563dc4d73ca4285,2024-05-07T13:39:32.710000
|
||||
CVE-2024-3759,0,0,20211226ea875c33805e71e9c0afa18c7ce1ad112702c8859afd48ee84347f62,2024-05-07T13:39:32.710000
|
||||
CVE-2024-3761,0,0,c0af44e486388b5bef077e784125f415f33c54c3c3a8677d0ab80af1f3e8df6c,2024-05-20T13:00:04.957000
|
||||
CVE-2024-37619,1,1,aff15bb57076d686e36cfc0cbea640138a4be0bdf788157c911222ef6978e0ee,2024-06-17T14:15:10.943000
|
||||
CVE-2024-37619,0,0,aff15bb57076d686e36cfc0cbea640138a4be0bdf788157c911222ef6978e0ee,2024-06-17T14:15:10.943000
|
||||
CVE-2024-3762,0,0,3a4d7121b46153c733feea020bbdc2b15c8dd6dac7706d18d5d6cc6fdd5731da,2024-05-17T02:40:06.647000
|
||||
CVE-2024-37620,1,1,65c8cbdb666c9b6e45cbb7ae81638f154dcd51e35de72d38e7d6f00aa2f65ae2,2024-06-17T14:15:11.047000
|
||||
CVE-2024-37621,1,1,c1bdf46db7eb64b6e9a6e3de8cd799d018a10d4ff1e8435f986b6d06b3cd47a0,2024-06-17T14:15:11.153000
|
||||
CVE-2024-37622,1,1,78aeca349bc14588eda44bd7a4c78d1fbcbed8a48b4d83a986c688922d0df66c,2024-06-17T14:15:11.480000
|
||||
CVE-2024-37623,1,1,944d49b0a57aeaa4709234137d8a429fd4f7fb0faadea303b4a9712cde94e38b,2024-06-17T14:15:11.580000
|
||||
CVE-2024-37624,1,1,0ea6fd2180eb9e22efaefdbb14b9e7e8f8ad410e2d99091c575d83f933d07fd4,2024-06-17T14:15:11.680000
|
||||
CVE-2024-37625,1,1,4fa37387021ef2e30a5489f0ba675157dbc50507f786d9f4806574acc51cbd40,2024-06-17T14:15:11.790000
|
||||
CVE-2024-37620,0,0,65c8cbdb666c9b6e45cbb7ae81638f154dcd51e35de72d38e7d6f00aa2f65ae2,2024-06-17T14:15:11.047000
|
||||
CVE-2024-37621,0,0,c1bdf46db7eb64b6e9a6e3de8cd799d018a10d4ff1e8435f986b6d06b3cd47a0,2024-06-17T14:15:11.153000
|
||||
CVE-2024-37622,0,0,78aeca349bc14588eda44bd7a4c78d1fbcbed8a48b4d83a986c688922d0df66c,2024-06-17T14:15:11.480000
|
||||
CVE-2024-37623,0,0,944d49b0a57aeaa4709234137d8a429fd4f7fb0faadea303b4a9712cde94e38b,2024-06-17T14:15:11.580000
|
||||
CVE-2024-37624,0,0,0ea6fd2180eb9e22efaefdbb14b9e7e8f8ad410e2d99091c575d83f933d07fd4,2024-06-17T14:15:11.680000
|
||||
CVE-2024-37625,0,0,4fa37387021ef2e30a5489f0ba675157dbc50507f786d9f4806574acc51cbd40,2024-06-17T14:15:11.790000
|
||||
CVE-2024-37629,0,0,1d00756a2a17c559759065d32584e34ded12669fdde5bf74562dbb03b1828152,2024-06-13T18:36:09.010000
|
||||
CVE-2024-3763,0,0,d4a43b988d4f5ccf2146c95730aa308ab303229339c58dc3a72b2fdabbe91a36,2024-06-05T20:15:13.530000
|
||||
CVE-2024-37630,0,0,bf66b2030be40d35050885498117395fd763796c76fee3b35b96849113224fa0,2024-06-13T18:35:19.777000
|
||||
@ -252797,7 +252803,7 @@ CVE-2024-3782,0,0,c95ea596dccb3636dd3691321b5a7a48aa3ee2b08cd07f6f17f6b9ebb6c703
|
||||
CVE-2024-3783,0,0,f916980cd1e532a7d588efc898e3b89c6684234f9d5fc7d911dee2ee73ce3295,2024-04-15T19:12:25.887000
|
||||
CVE-2024-37831,0,0,5e7eb1d81cbc03e5a6cb7a0c776550184a7e580655a65f67804199e93112edb2,2024-06-17T12:42:04.623000
|
||||
CVE-2024-3784,0,0,c3548262a5dd94ab612636409a3bf8cd74017da9deb24debb2f77536fe274623,2024-04-15T19:12:25.887000
|
||||
CVE-2024-37848,1,1,88fe14869b9db882d345d58a87ca35c6cced9fdb08d49352f54bce8a27f6744a,2024-06-17T14:15:11.890000
|
||||
CVE-2024-37848,0,0,88fe14869b9db882d345d58a87ca35c6cced9fdb08d49352f54bce8a27f6744a,2024-06-17T14:15:11.890000
|
||||
CVE-2024-37849,0,0,1c3bd85b42f72006ddc00210dee95fa2aec60a18f1d79fbfdd90f35c19fff4ef,2024-06-13T18:35:19.777000
|
||||
CVE-2024-3785,0,0,fc93f2e321d044bf7a0ccc45f351722880d9f0bf94368b28b702ab59c5cb3144,2024-04-15T19:12:25.887000
|
||||
CVE-2024-3786,0,0,e7dff42d10ea5f51aefb5b7728f1b7d65e7bf6f944a436f82b5cbbe6bdc82c9e,2024-04-15T19:12:25.887000
|
||||
@ -252867,9 +252873,9 @@ CVE-2024-3834,0,0,a6e69ceb5a64ba9dfba23cdfa4c02e2549bf746772815229f9a627159689f7
|
||||
CVE-2024-3837,0,0,5046b04f6fff161407832d91f839d6c01f3dcf30bcf75f620bfd7221b5de1c27,2024-05-03T03:16:29.010000
|
||||
CVE-2024-3838,0,0,bd55ca068ebe4472845bce1f3d037932d27279da54b129864c942318cbf6c399,2024-04-23T18:15:15.410000
|
||||
CVE-2024-3839,0,0,5078cfd1c7c68c41b30fd8b0c9c6a095120ec81bc8166ccecb75ba3c8be530b5,2024-05-03T04:15:09.127000
|
||||
CVE-2024-38394,0,0,3333251b2d7fe27eed4a9c2b87c1ad28ec69d38b7f770d426a3553cb078973b2,2024-06-17T12:42:04.623000
|
||||
CVE-2024-38395,0,1,d27ba93e3eeea55e9457aaa415d612188b65281d83702a0692924b8f50b6f403,2024-06-17T15:15:51.900000
|
||||
CVE-2024-38396,0,1,bffab7577ddd6f3e534c9843cfe717401724eb3ef56d29d3dd43a2efef3ab79d,2024-06-17T15:15:52.007000
|
||||
CVE-2024-38394,0,1,e137788f2ebaaff770e93d05b803eb38e4472ac7dca49b0dd757c03a760061e9,2024-06-17T16:15:15.823000
|
||||
CVE-2024-38395,0,0,d27ba93e3eeea55e9457aaa415d612188b65281d83702a0692924b8f50b6f403,2024-06-17T15:15:51.900000
|
||||
CVE-2024-38396,0,0,bffab7577ddd6f3e534c9843cfe717401724eb3ef56d29d3dd43a2efef3ab79d,2024-06-17T15:15:52.007000
|
||||
CVE-2024-3840,0,0,403182a28ab5f4c1d5b284d35c53f5335d4c6aac194c57fd7d723522380d6b0f,2024-05-03T03:16:29.067000
|
||||
CVE-2024-3841,0,0,115f766a88fd32831299505e83a1207ec4bfedfbb7b32163caf9b2dcda142051,2024-05-03T04:15:09.563000
|
||||
CVE-2024-38427,0,0,732204cceeb6abe7907342f21e7efa4f2a18a21658ab4ca99d4398a365d436c7,2024-06-17T12:42:04.623000
|
||||
@ -252894,9 +252900,9 @@ CVE-2024-38465,0,0,ce0d9866ad6b3f19ec6c77095c1dbcaa6c5f45b9afb927f8abe6499d7e02e
|
||||
CVE-2024-38466,0,0,5d1c6c536bd1417b5b67342ab1c487e0c966acabfa2718a6effebf26cfa8c7cc,2024-06-17T12:42:04.623000
|
||||
CVE-2024-38467,0,0,b57435625cbeac6544b6507d14e1fc98d3d5fa7f2ffbeb94aa6418d1e331de50,2024-06-17T12:42:04.623000
|
||||
CVE-2024-38468,0,0,d4c6d48d530a65ce7d90662f3fd07d6f0801b061b80f57001958e3c05da71f26,2024-06-17T12:42:04.623000
|
||||
CVE-2024-38469,1,1,140a77be01186206a15069da16c61bcef6024a72a74fbb4c0ff60bdd71d5b1f6,2024-06-17T14:15:12.070000
|
||||
CVE-2024-38469,0,0,140a77be01186206a15069da16c61bcef6024a72a74fbb4c0ff60bdd71d5b1f6,2024-06-17T14:15:12.070000
|
||||
CVE-2024-3847,0,0,a2146e655749d60cf9631f855db42a3d44cf07cd9a542fd1035e46bb9a6304c5,2024-05-03T03:16:29.293000
|
||||
CVE-2024-38470,1,1,72fd619cad47e9609a3b66bd344e6e0cff51bf41c439520887f75ce5743ccfa9,2024-06-17T14:15:12.183000
|
||||
CVE-2024-38470,0,0,72fd619cad47e9609a3b66bd344e6e0cff51bf41c439520887f75ce5743ccfa9,2024-06-17T14:15:12.183000
|
||||
CVE-2024-3848,0,0,cff2d1cd97f0b1f2183f9bb4edcf4fc45d9e2b8ab251b9953f6af6105249c0ec,2024-05-16T13:03:05.353000
|
||||
CVE-2024-3849,0,0,d4181d6192aab2f4a2b324451fbda7660fbd9621eb95f5f54a642a6a3d1e7d46,2024-05-02T18:00:37.360000
|
||||
CVE-2024-3850,0,0,bbe49076d39470df53cdf5186eea91a2b4a40256492f588a1ab86bd1ba5244b0,2024-06-12T18:12:56.413000
|
||||
@ -253031,7 +253037,7 @@ CVE-2024-4026,0,0,9eff728af4fb17cd0b046ae2444303f230bc7685cadbda3feb2bd1007c7666
|
||||
CVE-2024-4029,0,0,afc8def3dff015c790bb6f1fba36f8919ca09d0c14ec4f09004e6bb6d31f1058,2024-05-02T18:00:37.360000
|
||||
CVE-2024-4030,0,0,c7e71f4aa9c8e1fed63372a5ecebe14dddf19d5400caf27393d092efafbf0f25,2024-06-13T20:15:15.570000
|
||||
CVE-2024-4031,0,0,4baeaad68cf3411bf45d41e53c64aca0aa19dc8cf620cd2c5028b0d61a50ba2c,2024-04-23T12:52:09.397000
|
||||
CVE-2024-4032,1,1,21f11eb975177e8fb321e100662bbe142a07ff884954db57dd559b6560ff7f45,2024-06-17T15:15:52.517000
|
||||
CVE-2024-4032,0,1,d0d257207889b4eecfe2d9b86254c88f2507af7db1ab54d252a04dd631276d78,2024-06-17T16:15:15.923000
|
||||
CVE-2024-4033,0,0,9c08f15b4d3308634dd41e6afc3001fb3d24483554aaa58982323fa330ce651a,2024-05-02T18:00:37.360000
|
||||
CVE-2024-4034,0,0,fbbc9986eba42f39f504e14d62a8f5aac7c2749ef90d02af8ad89eb5ef4d1cca,2024-05-02T18:00:37.360000
|
||||
CVE-2024-4035,0,0,02906ca1b496a2e42ac8610e4dfcaad284409da5fa1faeb0fe6ebb26c1e7ae4c,2024-04-25T13:18:02.660000
|
||||
@ -254151,7 +254157,7 @@ CVE-2024-5673,0,0,f6db27a8b7c99bb0a58922425d96edcb461eeb527f78adfd8d9aed9c993301
|
||||
CVE-2024-5674,0,0,69b0f5cdcc6414c1b3093ac76e322fc42e17eb869b8f1b328084f458395232cf,2024-06-13T18:36:09.010000
|
||||
CVE-2024-5675,0,0,c04fc1bf8ef6e3f232c30ddf0bd6a524958c9eab63fe205331e1fedef14ccf13,2024-06-11T18:14:02.017000
|
||||
CVE-2024-5684,0,0,e183f6f3c944efddc1281bf86b4d20b3677f4c3ab127fc0c8f4bc522f6d9ba19,2024-06-11T18:13:30.163000
|
||||
CVE-2024-5685,0,0,4b65f48647dcaf5f5a341404879a6a581c1ba06222336d36581fb6767fb79c15,2024-06-17T12:42:04.623000
|
||||
CVE-2024-5685,0,1,257471c489e6c7ec6ff319f90eba7250ec0d4d2012a928dee23a25d060b8207a,2024-06-17T17:15:51.953000
|
||||
CVE-2024-5687,0,0,b3163ba80d711118288940f35942362f888184d516eedb8a121f43c8b6e99d13,2024-06-11T13:54:12.057000
|
||||
CVE-2024-5688,0,0,69d8cc15e435db53520a0b374c51ddee2a4c9131e86d6c869cac04768cb98c0c,2024-06-13T23:15:50.490000
|
||||
CVE-2024-5689,0,0,43d9e6c4643e481c8669e8de5c0cdbeeb708721474986d0f913b6c90e34aa5bd,2024-06-11T13:54:12.057000
|
||||
@ -254258,24 +254264,24 @@ CVE-2024-5994,0,0,4500c2f9d4ec1d929f4458a662d4e7cd25de0141c193b0c70f561f594ccb4e
|
||||
CVE-2024-5995,0,0,67a672f2d3fe90ec8a165b5b2ee31107e504c6b0bf47d01a6d89c94b17eb466b,2024-06-17T12:42:04.623000
|
||||
CVE-2024-5996,0,0,ba461b354a3c080322d9eafe20058e5b8ad775b3a576a51cb3132f1460376b12,2024-06-17T12:42:04.623000
|
||||
CVE-2024-6000,0,0,0ff462c0caa473d2d22369f17245008287579ea4d11142b6bd58096cee0f0a24,2024-06-17T12:42:04.623000
|
||||
CVE-2024-6003,0,0,b556bcb64c85a47f2dba839bc41b648a525d20c0fa5f1cd84bc50cbffb909b89,2024-06-17T12:42:04.623000
|
||||
CVE-2024-6003,0,1,b131c1a3ce53221548e1c2dcb514a1b9de3ce76a63a09d413211db357f68afbb,2024-06-17T16:15:16.027000
|
||||
CVE-2024-6005,0,0,a7bc5c4f4cd88e8249073eafda5ed4e6ca28a19996b852f459661e5530c10396,2024-06-17T12:42:04.623000
|
||||
CVE-2024-6006,0,1,9edb8ca4c0dd0d4558b143fb832fc42b328bff9f4b383b9f92efc4408ae0b0ca,2024-06-17T15:15:52.693000
|
||||
CVE-2024-6006,0,0,9edb8ca4c0dd0d4558b143fb832fc42b328bff9f4b383b9f92efc4408ae0b0ca,2024-06-17T15:15:52.693000
|
||||
CVE-2024-6007,0,0,10a5bf7c2814f8c45b29a7830a1e182f887cf45831b7092d81e48bb44ca9bf15,2024-06-17T12:42:04.623000
|
||||
CVE-2024-6008,0,0,55100afe1f5f0a7eb2cbb26d08641b266b9af540470a8f01d4f2282402abdea0,2024-06-17T12:42:04.623000
|
||||
CVE-2024-6008,0,1,c91774daf5e01f51e3ed230da10d811f428be9da4023af41a23643597eb98c00,2024-06-17T16:15:16.140000
|
||||
CVE-2024-6009,0,0,468577c4db742932e2254bcba365ac1e04c74b564538fb241a46994d66ec19d6,2024-06-17T12:42:04.623000
|
||||
CVE-2024-6013,0,0,44159fdbcbcac2a689071de339f13c4fefa84302df10ce908aefe802918d324e,2024-06-17T12:42:04.623000
|
||||
CVE-2024-6014,0,0,6f42b027c41cbc2bef7f3eccd4ed3d2b0646bd4a1028da377690698f14644291,2024-06-17T12:42:04.623000
|
||||
CVE-2024-6015,0,1,b5dd732698ac918c4f9a100a042e5587c72b21ba3272e6fc136fa01311e31fdc,2024-06-17T15:15:52.830000
|
||||
CVE-2024-6016,0,1,c54c9dea249da6152524c81283c2e2c500a502b8999814b114c6434b99c2c3ed,2024-06-17T14:15:12.487000
|
||||
CVE-2024-6039,0,1,266923799676f8be01eee28d4a84714045ee9a927bc992eaf897cc5b748105d7,2024-06-17T14:15:12.620000
|
||||
CVE-2024-6041,0,1,a295768a83c71f46593370532a5a859cd3d130f4e3527299fc42bdf02397e4d4,2024-06-17T14:15:12.733000
|
||||
CVE-2024-6015,0,0,b5dd732698ac918c4f9a100a042e5587c72b21ba3272e6fc136fa01311e31fdc,2024-06-17T15:15:52.830000
|
||||
CVE-2024-6016,0,0,c54c9dea249da6152524c81283c2e2c500a502b8999814b114c6434b99c2c3ed,2024-06-17T14:15:12.487000
|
||||
CVE-2024-6039,0,0,266923799676f8be01eee28d4a84714045ee9a927bc992eaf897cc5b748105d7,2024-06-17T14:15:12.620000
|
||||
CVE-2024-6041,0,0,a295768a83c71f46593370532a5a859cd3d130f4e3527299fc42bdf02397e4d4,2024-06-17T14:15:12.733000
|
||||
CVE-2024-6042,0,0,6d196e9da9a08d79a22225e118daa7f0e4c238306b694dbe66ba5d1dac9a15e7,2024-06-17T12:42:04.623000
|
||||
CVE-2024-6043,0,1,2b8824b7583f59608b507bc98e72cef1625bf75f2d50538bd13acbdb5303fcd4,2024-06-17T14:15:12.833000
|
||||
CVE-2024-6043,0,0,2b8824b7583f59608b507bc98e72cef1625bf75f2d50538bd13acbdb5303fcd4,2024-06-17T14:15:12.833000
|
||||
CVE-2024-6044,0,0,37b6b4fa1580189a7337f6bfb06fe7d410ca0d1be60eeed3fa0619de7f50b5bc,2024-06-17T12:42:04.623000
|
||||
CVE-2024-6045,0,0,2dcda6a0cbff8cd9e195f4d3ab65f0210762794017ec56ef72ed3655d46b17a0,2024-06-17T12:42:04.623000
|
||||
CVE-2024-6046,0,0,a5ace0bbdf0f368d76efea99e17761b90d722a7f8fb2cd5b11d6c7027f5ee450,2024-06-17T12:42:04.623000
|
||||
CVE-2024-6047,0,1,4cdf0f1acff12373f8f857c8d442b9de2221d44745323cc3f60bf66bccd7a239,2024-06-17T14:15:13.040000
|
||||
CVE-2024-6047,0,0,4cdf0f1acff12373f8f857c8d442b9de2221d44745323cc3f60bf66bccd7a239,2024-06-17T14:15:13.040000
|
||||
CVE-2024-6048,0,0,03e9485ef23720c113f11fed6c539200d9a1624e025ca24798cddf9d0c1a9e3b,2024-06-17T12:42:04.623000
|
||||
CVE-2024-6055,0,0,93ffb465c6acddf15e4142ae2e8b4bcae95c7241e5f24a2dedc05f862f5d2e79,2024-06-17T13:15:53.697000
|
||||
CVE-2024-6057,0,0,cfabce49b9db224e3720b6479e81ee1edcd2fcbaabb39bed0063a52236765ccd,2024-06-17T13:15:53.800000
|
||||
|
Can't render this file because it is too large.
|
Loading…
x
Reference in New Issue
Block a user