mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-07-09 16:05:11 +00:00
Auto-Update: 2024-06-17T20:00:19.113866+00:00
This commit is contained in:
parent
dbcbdd24a1
commit
df8a9c1304
36
CVE-2018/CVE-2018-251xx/CVE-2018-25103.json
Normal file
36
CVE-2018/CVE-2018-251xx/CVE-2018-25103.json
Normal file
@ -0,0 +1,36 @@
|
||||
{
|
||||
"id": "CVE-2018-25103",
|
||||
"sourceIdentifier": "cret@cert.org",
|
||||
"published": "2024-06-17T18:15:12.650",
|
||||
"lastModified": "2024-06-17T18:15:12.650",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "There exists a use-after-free-vulnerability in lighttpd <= 1.4.50 that can allow access to do a case-insensitive comparison against the reused pointer."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://9443417.fs1.hubspotusercontent-na1.net/hubfs/9443417/Security%20Advisories/2024/AMI-SA-2024002.pdf",
|
||||
"source": "cret@cert.org"
|
||||
},
|
||||
{
|
||||
"url": "https://blogvdoo.wordpress.com/2018/11/06/giving-back-securing-open-source-iot-projects/#more-736",
|
||||
"source": "cret@cert.org"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/lighttpd/lighttpd1.4/commit/df8e4f95614e476276a55e34da2aa8b00b1148e9",
|
||||
"source": "cret@cert.org"
|
||||
},
|
||||
{
|
||||
"url": "https://www.binarly.io/blog/lighttpd-gains-new-life",
|
||||
"source": "cret@cert.org"
|
||||
},
|
||||
{
|
||||
"url": "https://www.runzero.com/blog/lighttpd/",
|
||||
"source": "cret@cert.org"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-0397",
|
||||
"sourceIdentifier": "cna@python.org",
|
||||
"published": "2024-06-17T16:15:10.217",
|
||||
"lastModified": "2024-06-17T16:15:10.217",
|
||||
"lastModified": "2024-06-17T18:15:14.767",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -12,6 +12,10 @@
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "http://www.openwall.com/lists/oss-security/2024/06/17/2",
|
||||
"source": "cna@python.org"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/python/cpython/commit/01c37f1d0714f5822d34063ca7180b595abf589d",
|
||||
"source": "cna@python.org"
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-33373",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-06-14T16:15:11.223",
|
||||
"lastModified": "2024-06-17T12:42:04.623",
|
||||
"lastModified": "2024-06-17T18:15:15.920",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -16,6 +16,10 @@
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/ShravanSinghRathore/Security-Advisory-Multiple-Vulnerabilities-in-LB-link-BL-W1210M-Router/wiki/Password-Policy-Bypass--%7C--Inconsistent-Password-Policy-%28CVE%E2%80%902024%E2%80%9033373%29",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://redfoxsec.com/blog/security-advisory-multiple-vulnerabilities-in-lb-link-bl-w1210m-router/",
|
||||
"source": "cve@mitre.org"
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-33374",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-06-14T15:15:50.073",
|
||||
"lastModified": "2024-06-17T12:42:04.623",
|
||||
"lastModified": "2024-06-17T18:15:16.017",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -16,6 +16,10 @@
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/ShravanSinghRathore/Security-Advisory-Multiple-Vulnerabilities-in-LB-link-BL-W1210M-Router/wiki/Incorrect-Access-Control-%28CVE%E2%80%902024%E2%80%9033374%29",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://redfoxsec.com/blog/security-advisory-multiple-vulnerabilities-in-lb-link-bl-w1210m-router/",
|
||||
"source": "cve@mitre.org"
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-33375",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-06-14T15:15:50.170",
|
||||
"lastModified": "2024-06-17T12:42:04.623",
|
||||
"lastModified": "2024-06-17T19:15:58.107",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -16,6 +16,10 @@
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/ShravanSinghRathore/Security-Advisory-Multiple-Vulnerabilities-in-LB-link-BL-W1210M-Router/wiki/Credentials-Stored-in-Cleartext--%7C--Unencrypted-Credentials-%28CVE%E2%80%902024%E2%80%9033375%29",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://redfoxsec.com/blog/security-advisory-multiple-vulnerabilities-in-lb-link-bl-w1210m-router/",
|
||||
"source": "cve@mitre.org"
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-33377",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-06-14T15:15:50.270",
|
||||
"lastModified": "2024-06-17T12:42:04.623",
|
||||
"lastModified": "2024-06-17T18:15:16.107",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -16,6 +16,10 @@
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/ShravanSinghRathore/Security-Advisory-Multiple-Vulnerabilities-in-LB-link-BL-W1210M-Router/wiki/Clickjacking-%28CVE%E2%80%902024%E2%80%9033377%29",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://redfoxsec.com/blog/security-advisory-multiple-vulnerabilities-in-lb-link-bl-w1210m-router/",
|
||||
"source": "cve@mitre.org"
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-36165",
|
||||
"sourceIdentifier": "psirt@adobe.com",
|
||||
"published": "2024-06-13T08:16:06.513",
|
||||
"lastModified": "2024-06-13T18:35:19.777",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2024-06-17T19:38:08.973",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -50,10 +50,37 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:adobe:experience_manager:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "6.5.21",
|
||||
"matchCriteriaId": "33F20D83-E0D3-4504-B15F-C3240F8CFB90"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:adobe:experience_manager:*:*:*:*:aem_cloud_service:*:*:*",
|
||||
"versionEndExcluding": "2024.5",
|
||||
"matchCriteriaId": "8A667B96-AB3F-48AB-9980-11AB79AA7BD7"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://helpx.adobe.com/security/products/experience-manager/apsb24-28.html",
|
||||
"source": "psirt@adobe.com"
|
||||
"source": "psirt@adobe.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-36166",
|
||||
"sourceIdentifier": "psirt@adobe.com",
|
||||
"published": "2024-06-13T08:16:06.737",
|
||||
"lastModified": "2024-06-13T18:35:19.777",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2024-06-17T19:38:19.783",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -39,6 +39,16 @@
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "psirt@adobe.com",
|
||||
"type": "Secondary",
|
||||
@ -50,10 +60,37 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:adobe:experience_manager:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "6.5.21",
|
||||
"matchCriteriaId": "33F20D83-E0D3-4504-B15F-C3240F8CFB90"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:adobe:experience_manager:*:*:*:*:aem_cloud_service:*:*:*",
|
||||
"versionEndExcluding": "2024.5",
|
||||
"matchCriteriaId": "8A667B96-AB3F-48AB-9980-11AB79AA7BD7"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://helpx.adobe.com/security/products/experience-manager/apsb24-28.html",
|
||||
"source": "psirt@adobe.com"
|
||||
"source": "psirt@adobe.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-36167",
|
||||
"sourceIdentifier": "psirt@adobe.com",
|
||||
"published": "2024-06-13T08:16:06.953",
|
||||
"lastModified": "2024-06-13T18:35:19.777",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2024-06-17T19:38:29.453",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -50,10 +50,37 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:adobe:experience_manager:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "6.5.21",
|
||||
"matchCriteriaId": "33F20D83-E0D3-4504-B15F-C3240F8CFB90"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:adobe:experience_manager:*:*:*:*:aem_cloud_service:*:*:*",
|
||||
"versionEndExcluding": "2024.5",
|
||||
"matchCriteriaId": "8A667B96-AB3F-48AB-9980-11AB79AA7BD7"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://helpx.adobe.com/security/products/experience-manager/apsb24-28.html",
|
||||
"source": "psirt@adobe.com"
|
||||
"source": "psirt@adobe.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-36181",
|
||||
"sourceIdentifier": "psirt@adobe.com",
|
||||
"published": "2024-06-13T08:16:10.143",
|
||||
"lastModified": "2024-06-13T18:35:19.777",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2024-06-17T19:50:13.523",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -50,10 +50,37 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:adobe:experience_manager:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "6.5.21",
|
||||
"matchCriteriaId": "33F20D83-E0D3-4504-B15F-C3240F8CFB90"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:adobe:experience_manager:*:*:*:*:aem_cloud_service:*:*:*",
|
||||
"versionEndExcluding": "2024.5",
|
||||
"matchCriteriaId": "8A667B96-AB3F-48AB-9980-11AB79AA7BD7"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://helpx.adobe.com/security/products/experience-manager/apsb24-28.html",
|
||||
"source": "psirt@adobe.com"
|
||||
"source": "psirt@adobe.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-36182",
|
||||
"sourceIdentifier": "psirt@adobe.com",
|
||||
"published": "2024-06-13T08:16:10.387",
|
||||
"lastModified": "2024-06-13T18:35:19.777",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2024-06-17T19:36:00.387",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -50,10 +50,37 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:adobe:experience_manager:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "6.5.21",
|
||||
"matchCriteriaId": "33F20D83-E0D3-4504-B15F-C3240F8CFB90"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:adobe:experience_manager:*:*:*:*:aem_cloud_service:*:*:*",
|
||||
"versionEndExcluding": "2024.5",
|
||||
"matchCriteriaId": "8A667B96-AB3F-48AB-9980-11AB79AA7BD7"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://helpx.adobe.com/security/products/experience-manager/apsb24-28.html",
|
||||
"source": "psirt@adobe.com"
|
||||
"source": "psirt@adobe.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-36183",
|
||||
"sourceIdentifier": "psirt@adobe.com",
|
||||
"published": "2024-06-13T08:16:10.613",
|
||||
"lastModified": "2024-06-13T18:35:19.777",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2024-06-17T19:49:53.943",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -50,10 +50,37 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:adobe:experience_manager:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "6.5.21",
|
||||
"matchCriteriaId": "33F20D83-E0D3-4504-B15F-C3240F8CFB90"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:adobe:experience_manager:*:*:*:*:aem_cloud_service:*:*:*",
|
||||
"versionEndExcluding": "2024.5",
|
||||
"matchCriteriaId": "8A667B96-AB3F-48AB-9980-11AB79AA7BD7"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://helpx.adobe.com/security/products/experience-manager/apsb24-28.html",
|
||||
"source": "psirt@adobe.com"
|
||||
"source": "psirt@adobe.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-36184",
|
||||
"sourceIdentifier": "psirt@adobe.com",
|
||||
"published": "2024-06-13T08:16:10.843",
|
||||
"lastModified": "2024-06-13T18:35:19.777",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2024-06-17T19:49:42.257",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -50,10 +50,37 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:adobe:experience_manager:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "6.5.21",
|
||||
"matchCriteriaId": "33F20D83-E0D3-4504-B15F-C3240F8CFB90"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:adobe:experience_manager:*:*:*:*:aem_cloud_service:*:*:*",
|
||||
"versionEndExcluding": "2024.5",
|
||||
"matchCriteriaId": "8A667B96-AB3F-48AB-9980-11AB79AA7BD7"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://helpx.adobe.com/security/products/experience-manager/apsb24-28.html",
|
||||
"source": "psirt@adobe.com"
|
||||
"source": "psirt@adobe.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-36190",
|
||||
"sourceIdentifier": "psirt@adobe.com",
|
||||
"published": "2024-06-13T08:16:12.257",
|
||||
"lastModified": "2024-06-13T18:35:19.777",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2024-06-17T19:49:13.337",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -50,10 +50,37 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:adobe:experience_manager:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "6.5.21",
|
||||
"matchCriteriaId": "33F20D83-E0D3-4504-B15F-C3240F8CFB90"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:adobe:experience_manager:*:*:*:*:aem_cloud_service:*:*:*",
|
||||
"versionEndExcluding": "2024.5",
|
||||
"matchCriteriaId": "8A667B96-AB3F-48AB-9980-11AB79AA7BD7"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://helpx.adobe.com/security/products/experience-manager/apsb24-28.html",
|
||||
"source": "psirt@adobe.com"
|
||||
"source": "psirt@adobe.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-36191",
|
||||
"sourceIdentifier": "psirt@adobe.com",
|
||||
"published": "2024-06-13T08:16:12.480",
|
||||
"lastModified": "2024-06-13T18:35:19.777",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2024-06-17T19:06:28.207",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -50,10 +50,37 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:adobe:experience_manager:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "6.5.21",
|
||||
"matchCriteriaId": "33F20D83-E0D3-4504-B15F-C3240F8CFB90"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:adobe:experience_manager:*:*:*:*:aem_cloud_service:*:*:*",
|
||||
"versionEndExcluding": "2024.5",
|
||||
"matchCriteriaId": "8A667B96-AB3F-48AB-9980-11AB79AA7BD7"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://helpx.adobe.com/security/products/experience-manager/apsb24-28.html",
|
||||
"source": "psirt@adobe.com"
|
||||
"source": "psirt@adobe.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-36192",
|
||||
"sourceIdentifier": "psirt@adobe.com",
|
||||
"published": "2024-06-13T08:16:12.703",
|
||||
"lastModified": "2024-06-13T18:35:19.777",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2024-06-17T19:01:16.820",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -50,10 +50,37 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:adobe:experience_manager:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "6.5.21",
|
||||
"matchCriteriaId": "33F20D83-E0D3-4504-B15F-C3240F8CFB90"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:adobe:experience_manager:*:*:*:*:aem_cloud_service:*:*:*",
|
||||
"versionEndExcluding": "2024.5",
|
||||
"matchCriteriaId": "8A667B96-AB3F-48AB-9980-11AB79AA7BD7"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://helpx.adobe.com/security/products/experience-manager/apsb24-28.html",
|
||||
"source": "psirt@adobe.com"
|
||||
"source": "psirt@adobe.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-36193",
|
||||
"sourceIdentifier": "psirt@adobe.com",
|
||||
"published": "2024-06-13T08:16:12.930",
|
||||
"lastModified": "2024-06-13T18:35:19.777",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2024-06-17T18:57:12.537",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -50,10 +50,37 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:adobe:experience_manager:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "6.5.21",
|
||||
"matchCriteriaId": "33F20D83-E0D3-4504-B15F-C3240F8CFB90"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:adobe:experience_manager:*:*:*:*:aem_cloud_service:*:*:*",
|
||||
"versionEndExcluding": "2024.5",
|
||||
"matchCriteriaId": "8A667B96-AB3F-48AB-9980-11AB79AA7BD7"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://helpx.adobe.com/security/products/experience-manager/apsb24-28.html",
|
||||
"source": "psirt@adobe.com"
|
||||
"source": "psirt@adobe.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-36194",
|
||||
"sourceIdentifier": "psirt@adobe.com",
|
||||
"published": "2024-06-13T08:16:13.210",
|
||||
"lastModified": "2024-06-13T18:35:19.777",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2024-06-17T18:56:57.933",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -50,10 +50,37 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:adobe:experience_manager:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "6.5.21",
|
||||
"matchCriteriaId": "33F20D83-E0D3-4504-B15F-C3240F8CFB90"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:adobe:experience_manager:*:*:*:*:aem_cloud_service:*:*:*",
|
||||
"versionEndExcluding": "2024.5",
|
||||
"matchCriteriaId": "8A667B96-AB3F-48AB-9980-11AB79AA7BD7"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://helpx.adobe.com/security/products/experience-manager/apsb24-28.html",
|
||||
"source": "psirt@adobe.com"
|
||||
"source": "psirt@adobe.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-36195",
|
||||
"sourceIdentifier": "psirt@adobe.com",
|
||||
"published": "2024-06-13T08:16:13.443",
|
||||
"lastModified": "2024-06-13T18:35:19.777",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2024-06-17T18:56:48.090",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -50,10 +50,37 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:adobe:experience_manager:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "6.5.21",
|
||||
"matchCriteriaId": "33F20D83-E0D3-4504-B15F-C3240F8CFB90"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:adobe:experience_manager:*:*:*:*:aem_cloud_service:*:*:*",
|
||||
"versionEndExcluding": "2024.5",
|
||||
"matchCriteriaId": "8A667B96-AB3F-48AB-9980-11AB79AA7BD7"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://helpx.adobe.com/security/products/experience-manager/apsb24-28.html",
|
||||
"source": "psirt@adobe.com"
|
||||
"source": "psirt@adobe.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-36196",
|
||||
"sourceIdentifier": "psirt@adobe.com",
|
||||
"published": "2024-06-13T08:16:13.680",
|
||||
"lastModified": "2024-06-13T18:35:19.777",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2024-06-17T18:56:33.480",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -50,10 +50,37 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:adobe:experience_manager:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "6.5.21",
|
||||
"matchCriteriaId": "33F20D83-E0D3-4504-B15F-C3240F8CFB90"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:adobe:experience_manager:*:*:*:*:aem_cloud_service:*:*:*",
|
||||
"versionEndExcluding": "2024.5",
|
||||
"matchCriteriaId": "8A667B96-AB3F-48AB-9980-11AB79AA7BD7"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://helpx.adobe.com/security/products/experience-manager/apsb24-28.html",
|
||||
"source": "psirt@adobe.com"
|
||||
"source": "psirt@adobe.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-36197",
|
||||
"sourceIdentifier": "psirt@adobe.com",
|
||||
"published": "2024-06-13T08:16:13.920",
|
||||
"lastModified": "2024-06-13T18:35:19.777",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2024-06-17T19:48:57.047",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -39,6 +39,16 @@
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "psirt@adobe.com",
|
||||
"type": "Secondary",
|
||||
@ -50,10 +60,37 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:adobe:experience_manager:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "6.5.21",
|
||||
"matchCriteriaId": "33F20D83-E0D3-4504-B15F-C3240F8CFB90"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:adobe:experience_manager:*:*:*:*:aem_cloud_service:*:*:*",
|
||||
"versionEndExcluding": "2024.5",
|
||||
"matchCriteriaId": "8A667B96-AB3F-48AB-9980-11AB79AA7BD7"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://helpx.adobe.com/security/products/experience-manager/apsb24-28.html",
|
||||
"source": "psirt@adobe.com"
|
||||
"source": "psirt@adobe.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-36198",
|
||||
"sourceIdentifier": "psirt@adobe.com",
|
||||
"published": "2024-06-13T08:16:14.147",
|
||||
"lastModified": "2024-06-13T18:35:19.777",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2024-06-17T18:56:20.607",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -50,10 +50,37 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:adobe:experience_manager:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "6.5.21",
|
||||
"matchCriteriaId": "33F20D83-E0D3-4504-B15F-C3240F8CFB90"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:adobe:experience_manager:*:*:*:*:aem_cloud_service:*:*:*",
|
||||
"versionEndExcluding": "2024.5",
|
||||
"matchCriteriaId": "8A667B96-AB3F-48AB-9980-11AB79AA7BD7"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://helpx.adobe.com/security/products/experience-manager/apsb24-28.html",
|
||||
"source": "psirt@adobe.com"
|
||||
"source": "psirt@adobe.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-36199",
|
||||
"sourceIdentifier": "psirt@adobe.com",
|
||||
"published": "2024-06-13T08:16:14.367",
|
||||
"lastModified": "2024-06-13T18:35:19.777",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2024-06-17T18:56:07.053",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -50,10 +50,37 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:adobe:experience_manager:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "6.5.21",
|
||||
"matchCriteriaId": "33F20D83-E0D3-4504-B15F-C3240F8CFB90"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:adobe:experience_manager:*:*:*:*:aem_cloud_service:*:*:*",
|
||||
"versionEndExcluding": "2024.5",
|
||||
"matchCriteriaId": "8A667B96-AB3F-48AB-9980-11AB79AA7BD7"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://helpx.adobe.com/security/products/experience-manager/apsb24-28.html",
|
||||
"source": "psirt@adobe.com"
|
||||
"source": "psirt@adobe.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-36200",
|
||||
"sourceIdentifier": "psirt@adobe.com",
|
||||
"published": "2024-06-13T08:16:14.597",
|
||||
"lastModified": "2024-06-13T18:35:19.777",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2024-06-17T18:55:53.703",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -50,10 +50,37 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:adobe:experience_manager:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "6.5.21",
|
||||
"matchCriteriaId": "33F20D83-E0D3-4504-B15F-C3240F8CFB90"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:adobe:experience_manager:*:*:*:*:aem_cloud_service:*:*:*",
|
||||
"versionEndExcluding": "2024.5",
|
||||
"matchCriteriaId": "8A667B96-AB3F-48AB-9980-11AB79AA7BD7"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://helpx.adobe.com/security/products/experience-manager/apsb24-28.html",
|
||||
"source": "psirt@adobe.com"
|
||||
"source": "psirt@adobe.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-36201",
|
||||
"sourceIdentifier": "psirt@adobe.com",
|
||||
"published": "2024-06-13T08:16:14.817",
|
||||
"lastModified": "2024-06-13T18:35:19.777",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2024-06-17T18:55:34.580",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -50,10 +50,37 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:adobe:experience_manager:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "6.5.21",
|
||||
"matchCriteriaId": "33F20D83-E0D3-4504-B15F-C3240F8CFB90"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:adobe:experience_manager:*:*:*:*:aem_cloud_service:*:*:*",
|
||||
"versionEndExcluding": "2024.5",
|
||||
"matchCriteriaId": "8A667B96-AB3F-48AB-9980-11AB79AA7BD7"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://helpx.adobe.com/security/products/experience-manager/apsb24-28.html",
|
||||
"source": "psirt@adobe.com"
|
||||
"source": "psirt@adobe.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-36202",
|
||||
"sourceIdentifier": "psirt@adobe.com",
|
||||
"published": "2024-06-13T08:16:15.090",
|
||||
"lastModified": "2024-06-13T18:35:19.777",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2024-06-17T18:55:21.577",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -16,6 +16,26 @@
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 5.4,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.3,
|
||||
"impactScore": 2.7
|
||||
},
|
||||
{
|
||||
"source": "psirt@adobe.com",
|
||||
"type": "Secondary",
|
||||
@ -50,10 +70,37 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:adobe:experience_manager:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "6.5.21",
|
||||
"matchCriteriaId": "33F20D83-E0D3-4504-B15F-C3240F8CFB90"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:adobe:experience_manager:*:*:*:*:aem_cloud_service:*:*:*",
|
||||
"versionEndExcluding": "2024.5",
|
||||
"matchCriteriaId": "8A667B96-AB3F-48AB-9980-11AB79AA7BD7"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://helpx.adobe.com/security/products/experience-manager/apsb24-28.html",
|
||||
"source": "psirt@adobe.com"
|
||||
"source": "psirt@adobe.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-36203",
|
||||
"sourceIdentifier": "psirt@adobe.com",
|
||||
"published": "2024-06-13T08:16:15.337",
|
||||
"lastModified": "2024-06-13T18:35:19.777",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2024-06-17T19:23:59.480",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -50,10 +50,37 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:adobe:experience_manager:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "6.5.21",
|
||||
"matchCriteriaId": "33F20D83-E0D3-4504-B15F-C3240F8CFB90"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:adobe:experience_manager:*:*:*:*:aem_cloud_service:*:*:*",
|
||||
"versionEndExcluding": "2024.5",
|
||||
"matchCriteriaId": "8A667B96-AB3F-48AB-9980-11AB79AA7BD7"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://helpx.adobe.com/security/products/experience-manager/apsb24-28.html",
|
||||
"source": "psirt@adobe.com"
|
||||
"source": "psirt@adobe.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-36204",
|
||||
"sourceIdentifier": "psirt@adobe.com",
|
||||
"published": "2024-06-13T08:16:15.643",
|
||||
"lastModified": "2024-06-13T18:35:19.777",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2024-06-17T19:23:45.870",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -16,6 +16,26 @@
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 5.4,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.3,
|
||||
"impactScore": 2.7
|
||||
},
|
||||
{
|
||||
"source": "psirt@adobe.com",
|
||||
"type": "Secondary",
|
||||
@ -50,10 +70,37 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:adobe:experience_manager:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "6.5.21",
|
||||
"matchCriteriaId": "33F20D83-E0D3-4504-B15F-C3240F8CFB90"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:adobe:experience_manager:*:*:*:*:aem_cloud_service:*:*:*",
|
||||
"versionEndExcluding": "2024.5",
|
||||
"matchCriteriaId": "8A667B96-AB3F-48AB-9980-11AB79AA7BD7"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://helpx.adobe.com/security/products/experience-manager/apsb24-28.html",
|
||||
"source": "psirt@adobe.com"
|
||||
"source": "psirt@adobe.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-36205",
|
||||
"sourceIdentifier": "psirt@adobe.com",
|
||||
"published": "2024-06-13T08:16:15.890",
|
||||
"lastModified": "2024-06-13T18:35:19.777",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2024-06-17T19:23:22.583",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -50,10 +50,37 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:adobe:experience_manager:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "6.5.21",
|
||||
"matchCriteriaId": "33F20D83-E0D3-4504-B15F-C3240F8CFB90"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:adobe:experience_manager:*:*:*:*:aem_cloud_service:*:*:*",
|
||||
"versionEndExcluding": "2024.5",
|
||||
"matchCriteriaId": "8A667B96-AB3F-48AB-9980-11AB79AA7BD7"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://helpx.adobe.com/security/products/experience-manager/apsb24-28.html",
|
||||
"source": "psirt@adobe.com"
|
||||
"source": "psirt@adobe.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-36206",
|
||||
"sourceIdentifier": "psirt@adobe.com",
|
||||
"published": "2024-06-13T08:16:16.110",
|
||||
"lastModified": "2024-06-13T18:35:19.777",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2024-06-17T19:23:04.890",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -50,10 +50,37 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:adobe:experience_manager:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "6.5.21",
|
||||
"matchCriteriaId": "33F20D83-E0D3-4504-B15F-C3240F8CFB90"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:adobe:experience_manager:*:*:*:*:aem_cloud_service:*:*:*",
|
||||
"versionEndExcluding": "2024.5",
|
||||
"matchCriteriaId": "8A667B96-AB3F-48AB-9980-11AB79AA7BD7"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://helpx.adobe.com/security/products/experience-manager/apsb24-28.html",
|
||||
"source": "psirt@adobe.com"
|
||||
"source": "psirt@adobe.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-36207",
|
||||
"sourceIdentifier": "psirt@adobe.com",
|
||||
"published": "2024-06-13T08:16:16.333",
|
||||
"lastModified": "2024-06-13T18:35:19.777",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2024-06-17T19:22:41.023",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -50,10 +50,37 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:adobe:experience_manager:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "6.5.21",
|
||||
"matchCriteriaId": "33F20D83-E0D3-4504-B15F-C3240F8CFB90"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:adobe:experience_manager:*:*:*:*:aem_cloud_service:*:*:*",
|
||||
"versionEndExcluding": "2024.5",
|
||||
"matchCriteriaId": "8A667B96-AB3F-48AB-9980-11AB79AA7BD7"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://helpx.adobe.com/security/products/experience-manager/apsb24-28.html",
|
||||
"source": "psirt@adobe.com"
|
||||
"source": "psirt@adobe.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-36208",
|
||||
"sourceIdentifier": "psirt@adobe.com",
|
||||
"published": "2024-06-13T08:16:16.560",
|
||||
"lastModified": "2024-06-13T18:35:19.777",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2024-06-17T19:22:29.990",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -50,10 +50,37 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:adobe:experience_manager:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "6.5.21",
|
||||
"matchCriteriaId": "33F20D83-E0D3-4504-B15F-C3240F8CFB90"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:adobe:experience_manager:*:*:*:*:aem_cloud_service:*:*:*",
|
||||
"versionEndExcluding": "2024.5",
|
||||
"matchCriteriaId": "8A667B96-AB3F-48AB-9980-11AB79AA7BD7"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://helpx.adobe.com/security/products/experience-manager/apsb24-28.html",
|
||||
"source": "psirt@adobe.com"
|
||||
"source": "psirt@adobe.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-36209",
|
||||
"sourceIdentifier": "psirt@adobe.com",
|
||||
"published": "2024-06-13T08:16:16.790",
|
||||
"lastModified": "2024-06-13T18:35:19.777",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2024-06-17T19:22:21.057",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -50,10 +50,37 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:adobe:experience_manager:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "6.5.21",
|
||||
"matchCriteriaId": "33F20D83-E0D3-4504-B15F-C3240F8CFB90"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:adobe:experience_manager:*:*:*:*:aem_cloud_service:*:*:*",
|
||||
"versionEndExcluding": "2024.5",
|
||||
"matchCriteriaId": "8A667B96-AB3F-48AB-9980-11AB79AA7BD7"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://helpx.adobe.com/security/products/experience-manager/apsb24-28.html",
|
||||
"source": "psirt@adobe.com"
|
||||
"source": "psirt@adobe.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-36210",
|
||||
"sourceIdentifier": "psirt@adobe.com",
|
||||
"published": "2024-06-13T08:16:17.027",
|
||||
"lastModified": "2024-06-13T18:35:19.777",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2024-06-17T19:22:07.157",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -39,6 +39,16 @@
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "psirt@adobe.com",
|
||||
"type": "Secondary",
|
||||
@ -50,10 +60,37 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:adobe:experience_manager:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "6.5.21",
|
||||
"matchCriteriaId": "33F20D83-E0D3-4504-B15F-C3240F8CFB90"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:adobe:experience_manager:*:*:*:*:aem_cloud_service:*:*:*",
|
||||
"versionEndExcluding": "2024.5",
|
||||
"matchCriteriaId": "8A667B96-AB3F-48AB-9980-11AB79AA7BD7"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://helpx.adobe.com/security/products/experience-manager/apsb24-28.html",
|
||||
"source": "psirt@adobe.com"
|
||||
"source": "psirt@adobe.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-36211",
|
||||
"sourceIdentifier": "psirt@adobe.com",
|
||||
"published": "2024-06-13T08:16:17.247",
|
||||
"lastModified": "2024-06-13T18:35:19.777",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2024-06-17T19:21:53.777",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -50,10 +50,37 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:adobe:experience_manager:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "6.5.21",
|
||||
"matchCriteriaId": "33F20D83-E0D3-4504-B15F-C3240F8CFB90"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:adobe:experience_manager:*:*:*:*:aem_cloud_service:*:*:*",
|
||||
"versionEndExcluding": "2024.5",
|
||||
"matchCriteriaId": "8A667B96-AB3F-48AB-9980-11AB79AA7BD7"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://helpx.adobe.com/security/products/experience-manager/apsb24-28.html",
|
||||
"source": "psirt@adobe.com"
|
||||
"source": "psirt@adobe.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-36212",
|
||||
"sourceIdentifier": "psirt@adobe.com",
|
||||
"published": "2024-06-13T08:16:17.470",
|
||||
"lastModified": "2024-06-13T18:35:19.777",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2024-06-17T19:21:43.703",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -50,10 +50,37 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:adobe:experience_manager:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "6.5.21",
|
||||
"matchCriteriaId": "33F20D83-E0D3-4504-B15F-C3240F8CFB90"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:adobe:experience_manager:*:*:*:*:aem_cloud_service:*:*:*",
|
||||
"versionEndExcluding": "2024.5",
|
||||
"matchCriteriaId": "8A667B96-AB3F-48AB-9980-11AB79AA7BD7"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://helpx.adobe.com/security/products/experience-manager/apsb24-28.html",
|
||||
"source": "psirt@adobe.com"
|
||||
"source": "psirt@adobe.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-36213",
|
||||
"sourceIdentifier": "psirt@adobe.com",
|
||||
"published": "2024-06-13T08:16:17.693",
|
||||
"lastModified": "2024-06-13T18:35:19.777",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2024-06-17T19:09:24.977",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -50,10 +50,37 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:adobe:experience_manager:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "6.5.21",
|
||||
"matchCriteriaId": "33F20D83-E0D3-4504-B15F-C3240F8CFB90"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:adobe:experience_manager:*:*:*:*:aem_cloud_service:*:*:*",
|
||||
"versionEndExcluding": "2024.5",
|
||||
"matchCriteriaId": "8A667B96-AB3F-48AB-9980-11AB79AA7BD7"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://helpx.adobe.com/security/products/experience-manager/apsb24-28.html",
|
||||
"source": "psirt@adobe.com"
|
||||
"source": "psirt@adobe.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-36214",
|
||||
"sourceIdentifier": "psirt@adobe.com",
|
||||
"published": "2024-06-13T08:16:17.917",
|
||||
"lastModified": "2024-06-13T18:35:19.777",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2024-06-17T19:35:49.083",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -50,10 +50,37 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:adobe:experience_manager:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "6.5.21",
|
||||
"matchCriteriaId": "33F20D83-E0D3-4504-B15F-C3240F8CFB90"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:adobe:experience_manager:*:*:*:*:aem_cloud_service:*:*:*",
|
||||
"versionEndExcluding": "2024.5",
|
||||
"matchCriteriaId": "8A667B96-AB3F-48AB-9980-11AB79AA7BD7"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://helpx.adobe.com/security/products/experience-manager/apsb24-28.html",
|
||||
"source": "psirt@adobe.com"
|
||||
"source": "psirt@adobe.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-36215",
|
||||
"sourceIdentifier": "psirt@adobe.com",
|
||||
"published": "2024-06-13T08:16:18.140",
|
||||
"lastModified": "2024-06-13T18:35:19.777",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2024-06-17T19:33:11.697",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -50,10 +50,37 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:adobe:experience_manager:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "6.5.21",
|
||||
"matchCriteriaId": "33F20D83-E0D3-4504-B15F-C3240F8CFB90"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:adobe:experience_manager:*:*:*:*:aem_cloud_service:*:*:*",
|
||||
"versionEndExcluding": "2024.5",
|
||||
"matchCriteriaId": "8A667B96-AB3F-48AB-9980-11AB79AA7BD7"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://helpx.adobe.com/security/products/experience-manager/apsb24-28.html",
|
||||
"source": "psirt@adobe.com"
|
||||
"source": "psirt@adobe.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-36216",
|
||||
"sourceIdentifier": "psirt@adobe.com",
|
||||
"published": "2024-06-13T08:16:18.387",
|
||||
"lastModified": "2024-06-13T18:35:19.777",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2024-06-17T19:42:09.377",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -17,8 +17,28 @@
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "psirt@adobe.com",
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 6.1,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 2.7
|
||||
},
|
||||
{
|
||||
"source": "psirt@adobe.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
|
||||
@ -50,10 +70,37 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:adobe:experience_manager:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "6.5.21",
|
||||
"matchCriteriaId": "33F20D83-E0D3-4504-B15F-C3240F8CFB90"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:adobe:experience_manager:*:*:*:*:aem_cloud_service:*:*:*",
|
||||
"versionEndExcluding": "2024.5",
|
||||
"matchCriteriaId": "8A667B96-AB3F-48AB-9980-11AB79AA7BD7"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://helpx.adobe.com/security/products/experience-manager/apsb24-28.html",
|
||||
"source": "psirt@adobe.com"
|
||||
"source": "psirt@adobe.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-36217",
|
||||
"sourceIdentifier": "psirt@adobe.com",
|
||||
"published": "2024-06-13T08:16:18.647",
|
||||
"lastModified": "2024-06-13T18:35:19.777",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2024-06-17T19:33:01.643",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -39,6 +39,16 @@
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "psirt@adobe.com",
|
||||
"type": "Secondary",
|
||||
@ -50,10 +60,37 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:adobe:experience_manager:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "6.5.21",
|
||||
"matchCriteriaId": "33F20D83-E0D3-4504-B15F-C3240F8CFB90"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:adobe:experience_manager:*:*:*:*:aem_cloud_service:*:*:*",
|
||||
"versionEndExcluding": "2024.5",
|
||||
"matchCriteriaId": "8A667B96-AB3F-48AB-9980-11AB79AA7BD7"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://helpx.adobe.com/security/products/experience-manager/apsb24-28.html",
|
||||
"source": "psirt@adobe.com"
|
||||
"source": "psirt@adobe.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-36218",
|
||||
"sourceIdentifier": "psirt@adobe.com",
|
||||
"published": "2024-06-13T08:16:18.880",
|
||||
"lastModified": "2024-06-13T18:35:19.777",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2024-06-17T19:32:51.723",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -50,10 +50,37 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:adobe:experience_manager:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "6.5.21",
|
||||
"matchCriteriaId": "33F20D83-E0D3-4504-B15F-C3240F8CFB90"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:adobe:experience_manager:*:*:*:*:aem_cloud_service:*:*:*",
|
||||
"versionEndExcluding": "2024.5",
|
||||
"matchCriteriaId": "8A667B96-AB3F-48AB-9980-11AB79AA7BD7"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://helpx.adobe.com/security/products/experience-manager/apsb24-28.html",
|
||||
"source": "psirt@adobe.com"
|
||||
"source": "psirt@adobe.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-36219",
|
||||
"sourceIdentifier": "psirt@adobe.com",
|
||||
"published": "2024-06-13T08:16:19.113",
|
||||
"lastModified": "2024-06-13T18:35:19.777",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2024-06-17T19:32:42.640",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -50,10 +50,37 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:adobe:experience_manager:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "6.5.21",
|
||||
"matchCriteriaId": "33F20D83-E0D3-4504-B15F-C3240F8CFB90"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:adobe:experience_manager:*:*:*:*:aem_cloud_service:*:*:*",
|
||||
"versionEndExcluding": "2024.5",
|
||||
"matchCriteriaId": "8A667B96-AB3F-48AB-9980-11AB79AA7BD7"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://helpx.adobe.com/security/products/experience-manager/apsb24-28.html",
|
||||
"source": "psirt@adobe.com"
|
||||
"source": "psirt@adobe.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-36220",
|
||||
"sourceIdentifier": "psirt@adobe.com",
|
||||
"published": "2024-06-13T08:16:19.350",
|
||||
"lastModified": "2024-06-13T18:35:19.777",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2024-06-17T19:48:35.573",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -50,10 +50,37 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:adobe:experience_manager:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "6.5.21",
|
||||
"matchCriteriaId": "33F20D83-E0D3-4504-B15F-C3240F8CFB90"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:adobe:experience_manager:*:*:*:*:aem_cloud_service:*:*:*",
|
||||
"versionEndExcluding": "2024.5",
|
||||
"matchCriteriaId": "8A667B96-AB3F-48AB-9980-11AB79AA7BD7"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://helpx.adobe.com/security/products/experience-manager/apsb24-28.html",
|
||||
"source": "psirt@adobe.com"
|
||||
"source": "psirt@adobe.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-36221",
|
||||
"sourceIdentifier": "psirt@adobe.com",
|
||||
"published": "2024-06-13T08:16:19.567",
|
||||
"lastModified": "2024-06-13T18:35:19.777",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2024-06-17T19:48:20.473",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -50,10 +50,37 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:adobe:experience_manager:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "6.5.21",
|
||||
"matchCriteriaId": "33F20D83-E0D3-4504-B15F-C3240F8CFB90"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:adobe:experience_manager:*:*:*:*:aem_cloud_service:*:*:*",
|
||||
"versionEndExcluding": "2024.5",
|
||||
"matchCriteriaId": "8A667B96-AB3F-48AB-9980-11AB79AA7BD7"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://helpx.adobe.com/security/products/experience-manager/apsb24-28.html",
|
||||
"source": "psirt@adobe.com"
|
||||
"source": "psirt@adobe.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-36222",
|
||||
"sourceIdentifier": "psirt@adobe.com",
|
||||
"published": "2024-06-13T08:16:19.790",
|
||||
"lastModified": "2024-06-13T18:35:19.777",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2024-06-17T19:45:39.257",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -16,6 +16,26 @@
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 5.4,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.3,
|
||||
"impactScore": 2.7
|
||||
},
|
||||
{
|
||||
"source": "psirt@adobe.com",
|
||||
"type": "Secondary",
|
||||
@ -50,10 +70,37 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:adobe:experience_manager:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "6.5.21",
|
||||
"matchCriteriaId": "33F20D83-E0D3-4504-B15F-C3240F8CFB90"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:adobe:experience_manager:*:*:*:*:aem_cloud_service:*:*:*",
|
||||
"versionEndExcluding": "2024.5",
|
||||
"matchCriteriaId": "8A667B96-AB3F-48AB-9980-11AB79AA7BD7"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://helpx.adobe.com/security/products/experience-manager/apsb24-28.html",
|
||||
"source": "psirt@adobe.com"
|
||||
"source": "psirt@adobe.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-36224",
|
||||
"sourceIdentifier": "psirt@adobe.com",
|
||||
"published": "2024-06-13T08:16:20.007",
|
||||
"lastModified": "2024-06-13T18:35:19.777",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2024-06-17T19:45:13.547",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -50,10 +50,37 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:adobe:experience_manager:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "6.5.21",
|
||||
"matchCriteriaId": "33F20D83-E0D3-4504-B15F-C3240F8CFB90"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:adobe:experience_manager:*:*:*:*:aem_cloud_service:*:*:*",
|
||||
"versionEndExcluding": "2024.5",
|
||||
"matchCriteriaId": "8A667B96-AB3F-48AB-9980-11AB79AA7BD7"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://helpx.adobe.com/security/products/experience-manager/apsb24-28.html",
|
||||
"source": "psirt@adobe.com"
|
||||
"source": "psirt@adobe.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-36225",
|
||||
"sourceIdentifier": "psirt@adobe.com",
|
||||
"published": "2024-06-13T08:16:20.233",
|
||||
"lastModified": "2024-06-13T18:35:19.777",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2024-06-17T19:37:58.810",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -50,10 +50,37 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:adobe:experience_manager:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "6.5.21",
|
||||
"matchCriteriaId": "33F20D83-E0D3-4504-B15F-C3240F8CFB90"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:adobe:experience_manager:*:*:*:*:aem_cloud_service:*:*:*",
|
||||
"versionEndExcluding": "2024.5",
|
||||
"matchCriteriaId": "8A667B96-AB3F-48AB-9980-11AB79AA7BD7"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://helpx.adobe.com/security/products/experience-manager/apsb24-28.html",
|
||||
"source": "psirt@adobe.com"
|
||||
"source": "psirt@adobe.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-36231",
|
||||
"sourceIdentifier": "psirt@adobe.com",
|
||||
"published": "2024-06-13T08:16:21.587",
|
||||
"lastModified": "2024-06-13T18:35:19.777",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2024-06-17T19:52:06.717",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -50,10 +50,37 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:adobe:experience_manager:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "6.5.21",
|
||||
"matchCriteriaId": "33F20D83-E0D3-4504-B15F-C3240F8CFB90"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:adobe:experience_manager:*:*:*:*:aem_cloud_service:*:*:*",
|
||||
"versionEndExcluding": "2024.5",
|
||||
"matchCriteriaId": "8A667B96-AB3F-48AB-9980-11AB79AA7BD7"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://helpx.adobe.com/security/products/experience-manager/apsb24-28.html",
|
||||
"source": "psirt@adobe.com"
|
||||
"source": "psirt@adobe.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-36232",
|
||||
"sourceIdentifier": "psirt@adobe.com",
|
||||
"published": "2024-06-13T08:16:21.850",
|
||||
"lastModified": "2024-06-13T18:35:19.777",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2024-06-17T19:51:25.503",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -50,10 +50,37 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:adobe:experience_manager:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "6.5.21",
|
||||
"matchCriteriaId": "33F20D83-E0D3-4504-B15F-C3240F8CFB90"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:adobe:experience_manager:*:*:*:*:aem_cloud_service:*:*:*",
|
||||
"versionEndExcluding": "2024.5",
|
||||
"matchCriteriaId": "8A667B96-AB3F-48AB-9980-11AB79AA7BD7"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://helpx.adobe.com/security/products/experience-manager/apsb24-28.html",
|
||||
"source": "psirt@adobe.com"
|
||||
"source": "psirt@adobe.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
20
CVE-2024/CVE-2024-365xx/CVE-2024-36527.json
Normal file
20
CVE-2024/CVE-2024-365xx/CVE-2024-36527.json
Normal file
@ -0,0 +1,20 @@
|
||||
{
|
||||
"id": "CVE-2024-36527",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-06-17T18:15:16.767",
|
||||
"lastModified": "2024-06-17T18:15:16.767",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "puppeteer-renderer v.3.2.0 and before is vulnerable to Directory Traversal. Attackers can exploit the URL parameter using the file protocol to read sensitive information from the server."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://gist.github.com/7a6163/25fef08f75eed219c8ca21e332d6e911",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
24
CVE-2024/CVE-2024-365xx/CVE-2024-36543.json
Normal file
24
CVE-2024/CVE-2024-365xx/CVE-2024-36543.json
Normal file
@ -0,0 +1,24 @@
|
||||
{
|
||||
"id": "CVE-2024-36543",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-06-17T19:15:58.353",
|
||||
"lastModified": "2024-06-17T19:15:58.353",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Incorrect access control in the Kafka Connect REST API in the STRIMZI Project 0.41.0 and earlier allows an attacker to deny the service for Kafka Mirroring, potentially mirror the topics' content to his Kafka cluster via a malicious connector (bypassing Kafka ACL if it exists), and potentially steal Kafka SASL credentials, by querying the MirrorMaker Kafka REST API."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "http://strimzi.com",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/almounah/vulnerability-research/tree/main/CVE-2024-36543",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
20
CVE-2024/CVE-2024-369xx/CVE-2024-36973.json
Normal file
20
CVE-2024/CVE-2024-369xx/CVE-2024-36973.json
Normal file
@ -0,0 +1,20 @@
|
||||
{
|
||||
"id": "CVE-2024-36973",
|
||||
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"published": "2024-06-17T18:15:17.043",
|
||||
"lastModified": "2024-06-17T18:15:17.043",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\nmisc: microchip: pci1xxxx: fix double free in the error handling of gp_aux_bus_probe()\n\nWhen auxiliary_device_add() returns error and then calls\nauxiliary_device_uninit(), callback function\ngp_auxiliary_device_release() calls ida_free() and\nkfree(aux_device_wrapper) to free memory. We should't\ncall them again in the error handling path.\n\nFix this by skipping the redundant cleanup functions."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/086c6cbcc563c81d55257f9b27e14faf1d0963d3",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
}
|
||||
]
|
||||
}
|
20
CVE-2024/CVE-2024-376xx/CVE-2024-37661.json
Normal file
20
CVE-2024/CVE-2024-376xx/CVE-2024-37661.json
Normal file
@ -0,0 +1,20 @@
|
||||
{
|
||||
"id": "CVE-2024-37661",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-06-17T18:15:17.463",
|
||||
"lastModified": "2024-06-17T18:15:17.463",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "TP-LINK TL-7DR5130 v1.0.23 is vulnerable to forged ICMP redirect message attacks. An attacker in the same WLAN as the victim can hijack the traffic between the victim and any remote server by sending out forged ICMP redirect messages."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/ouuan/router-vuln-report/blob/master/icmp-redirect/tl-7dr5130-redirect.md",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
20
CVE-2024/CVE-2024-376xx/CVE-2024-37662.json
Normal file
20
CVE-2024/CVE-2024-376xx/CVE-2024-37662.json
Normal file
@ -0,0 +1,20 @@
|
||||
{
|
||||
"id": "CVE-2024-37662",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-06-17T18:15:17.560",
|
||||
"lastModified": "2024-06-17T18:15:17.560",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "TP-LINK TL-7DR5130 v1.0.23 is vulnerable to TCP DoS or hijacking attacks. An attacker in the same WLAN as the victim can disconnect or hijack the traffic between the victim and any remote server by sending out forged TCP RST messages to evict NAT mappings in the router."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/ouuan/router-vuln-report/blob/master/nat-rst/tl-7dr5130-nat-rst.md",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
20
CVE-2024/CVE-2024-376xx/CVE-2024-37663.json
Normal file
20
CVE-2024/CVE-2024-376xx/CVE-2024-37663.json
Normal file
@ -0,0 +1,20 @@
|
||||
{
|
||||
"id": "CVE-2024-37663",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-06-17T18:15:17.653",
|
||||
"lastModified": "2024-06-17T18:15:17.653",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Redmi router RB03 v1.0.57 is vulnerable to forged ICMP redirect message attacks. An attacker in the same WLAN as the victim can hijack the traffic between the victim and any remote server by sending out forged ICMP redirect messages."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/ouuan/router-vuln-report/blob/master/icmp-redirect/redmi-rb03-redirect.md",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
20
CVE-2024/CVE-2024-376xx/CVE-2024-37664.json
Normal file
20
CVE-2024/CVE-2024-376xx/CVE-2024-37664.json
Normal file
@ -0,0 +1,20 @@
|
||||
{
|
||||
"id": "CVE-2024-37664",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-06-17T18:15:17.743",
|
||||
"lastModified": "2024-06-17T18:15:17.743",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Redmi router RB03 v1.0.57 is vulnerable to TCP DoS or hijacking attacks. An attacker in the same WLAN as the victim can disconnect or hijack the traffic between the victim and any remote server by sending out forged TCP RST messages to evict NAT mappings in the router."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/ouuan/router-vuln-report/blob/master/nat-rst/redmi-rb03-nat-rst.md",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
20
CVE-2024/CVE-2024-377xx/CVE-2024-37794.json
Normal file
20
CVE-2024/CVE-2024-377xx/CVE-2024-37794.json
Normal file
@ -0,0 +1,20 @@
|
||||
{
|
||||
"id": "CVE-2024-37794",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-06-17T18:15:17.853",
|
||||
"lastModified": "2024-06-17T18:15:17.853",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Improper input validation in CVC5 Solver v1.1.3 allows attackers to cause a Denial of Service (DoS) via a crafted SMT2 input file."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/cvc5/cvc5/issues/10813",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
20
CVE-2024/CVE-2024-377xx/CVE-2024-37795.json
Normal file
20
CVE-2024/CVE-2024-377xx/CVE-2024-37795.json
Normal file
@ -0,0 +1,20 @@
|
||||
{
|
||||
"id": "CVE-2024-37795",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-06-17T18:15:17.953",
|
||||
"lastModified": "2024-06-17T18:15:17.953",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A segmentation fault in CVC5 Solver v1.1.3 allows attackers to cause a Denial of Service (DoS) via a crafted SMT-LIB input file containing the `set-logic` command with specific formatting errors."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/cvc5/cvc5/issues/10813",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
20
CVE-2024/CVE-2024-378xx/CVE-2024-37840.json
Normal file
20
CVE-2024/CVE-2024-378xx/CVE-2024-37840.json
Normal file
@ -0,0 +1,20 @@
|
||||
{
|
||||
"id": "CVE-2024-37840",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-06-17T19:15:58.470",
|
||||
"lastModified": "2024-06-17T19:15:58.470",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "SQL injection vulnerability in processscore.php in Itsourcecode Learning Management System Project In PHP With Source Code v1.0 allows remote attackers to execute arbitrary SQL commands via the LessonID parameter."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/ganzhi-qcy/cve/issues/4",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
28
CVE-2024/CVE-2024-384xx/CVE-2024-38449.json
Normal file
28
CVE-2024/CVE-2024-384xx/CVE-2024-38449.json
Normal file
@ -0,0 +1,28 @@
|
||||
{
|
||||
"id": "CVE-2024-38449",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-06-17T19:15:58.567",
|
||||
"lastModified": "2024-06-17T19:15:58.567",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A Directory Traversal vulnerability in KasmVNC 1.3.1.230e50f7b89663316c70de7b0e3db6f6b9340489 and possibly earlier versions allows remote authenticated attackers to browse parent directories and read the content of files outside the scope of the application."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/kasmtech/KasmVNC/issues/254",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://kasmweb.atlassian.net/servicedesk/customer/portal/3/topic/30ffee7f-4b85-4783-b118-6ae4fd8b0c52",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://kasmweb.com/kasmvnc",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-3876",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2024-04-16T18:15:14.623",
|
||||
"lastModified": "2024-05-17T02:40:09.910",
|
||||
"lastModified": "2024-06-17T19:15:58.763",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-4032",
|
||||
"sourceIdentifier": "cna@python.org",
|
||||
"published": "2024-06-17T15:15:52.517",
|
||||
"lastModified": "2024-06-17T16:15:15.923",
|
||||
"lastModified": "2024-06-17T18:15:18.047",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -12,6 +12,10 @@
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "http://www.openwall.com/lists/oss-security/2024/06/17/3",
|
||||
"source": "cna@python.org"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/python/cpython/commit/22adf29da8d99933ffed8647d3e0726edd16f7f8",
|
||||
"source": "cna@python.org"
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-4584",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2024-05-07T12:15:10.223",
|
||||
"lastModified": "2024-05-17T02:40:28.903",
|
||||
"lastModified": "2024-06-17T19:15:58.903",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-4595",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2024-05-07T15:15:10.273",
|
||||
"lastModified": "2024-05-17T02:40:29.900",
|
||||
"lastModified": "2024-06-17T19:15:59.063",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-5206",
|
||||
"sourceIdentifier": "security@huntr.dev",
|
||||
"published": "2024-06-06T19:16:06.363",
|
||||
"lastModified": "2024-06-07T14:56:05.647",
|
||||
"lastModified": "2024-06-17T19:15:59.190",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -21,8 +21,8 @@
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.0",
|
||||
"vectorString": "CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "HIGH",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
@ -30,10 +30,10 @@
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 5.3,
|
||||
"baseScore": 4.7,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 1.6,
|
||||
"exploitabilityScore": 1.0,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
|
92
CVE-2024/CVE-2024-60xx/CVE-2024-6056.json
Normal file
92
CVE-2024/CVE-2024-60xx/CVE-2024-6056.json
Normal file
@ -0,0 +1,92 @@
|
||||
{
|
||||
"id": "CVE-2024-6056",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2024-06-17T18:15:18.143",
|
||||
"lastModified": "2024-06-17T18:15:18.143",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A vulnerability was found in nasirkhan Laravel Starter up to 11.8.0. It has been rated as problematic. Affected by this issue is some unknown functionality of the file /forgot-password of the component Password Reset Handler. The manipulation of the argument Email leads to observable response discrepancy. The attack may be launched remotely. The complexity of an attack is rather high. The exploitation is known to be difficult. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-268784. NOTE: The vendor was contacted early about this disclosure but did not respond in any way."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "HIGH",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 3.7,
|
||||
"baseSeverity": "LOW"
|
||||
},
|
||||
"exploitabilityScore": 2.2,
|
||||
"impactScore": 1.4
|
||||
}
|
||||
],
|
||||
"cvssMetricV2": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "2.0",
|
||||
"vectorString": "AV:N/AC:H/Au:N/C:P/I:N/A:N",
|
||||
"accessVector": "NETWORK",
|
||||
"accessComplexity": "HIGH",
|
||||
"authentication": "NONE",
|
||||
"confidentialityImpact": "PARTIAL",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 2.6
|
||||
},
|
||||
"baseSeverity": "LOW",
|
||||
"exploitabilityScore": 4.9,
|
||||
"impactScore": 2.9,
|
||||
"acInsufInfo": false,
|
||||
"obtainAllPrivilege": false,
|
||||
"obtainUserPrivilege": false,
|
||||
"obtainOtherPrivilege": false,
|
||||
"userInteractionRequired": false
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-204"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://powerful-bulb-c36.notion.site/idor-c6eb58e8fc40416ba53c7915ca0174c4?pvs=4",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.268784",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.268784",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?submit.352978",
|
||||
"source": "cna@vuldb.com"
|
||||
}
|
||||
]
|
||||
}
|
92
CVE-2024/CVE-2024-60xx/CVE-2024-6058.json
Normal file
92
CVE-2024/CVE-2024-60xx/CVE-2024-6058.json
Normal file
@ -0,0 +1,92 @@
|
||||
{
|
||||
"id": "CVE-2024-6058",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2024-06-17T18:15:18.520",
|
||||
"lastModified": "2024-06-17T18:15:18.520",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A vulnerability classified as problematic has been found in LabVantage LIMS 2017. This affects an unknown part of the file /labvantage/rc?command=page&page=SampleHistoricalList&_iframename=list&__crc=crc_1701669816260. The manipulation of the argument height/width leads to cross site scripting. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-268785 was assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 3.5,
|
||||
"baseSeverity": "LOW"
|
||||
},
|
||||
"exploitabilityScore": 2.1,
|
||||
"impactScore": 1.4
|
||||
}
|
||||
],
|
||||
"cvssMetricV2": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "2.0",
|
||||
"vectorString": "AV:N/AC:L/Au:S/C:N/I:P/A:N",
|
||||
"accessVector": "NETWORK",
|
||||
"accessComplexity": "LOW",
|
||||
"authentication": "SINGLE",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "PARTIAL",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 4.0
|
||||
},
|
||||
"baseSeverity": "MEDIUM",
|
||||
"exploitabilityScore": 8.0,
|
||||
"impactScore": 2.9,
|
||||
"acInsufInfo": false,
|
||||
"obtainAllPrivilege": false,
|
||||
"obtainUserPrivilege": false,
|
||||
"obtainOtherPrivilege": false,
|
||||
"userInteractionRequired": false
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://gentle-khaan-c53.notion.site/Reflected-XSS-in-Labvantage-LIMS-cc960e84650a4df58ecabe82338e0272",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.268785",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.268785",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?submit.353198",
|
||||
"source": "cna@vuldb.com"
|
||||
}
|
||||
]
|
||||
}
|
92
CVE-2024/CVE-2024-60xx/CVE-2024-6059.json
Normal file
92
CVE-2024/CVE-2024-60xx/CVE-2024-6059.json
Normal file
@ -0,0 +1,92 @@
|
||||
{
|
||||
"id": "CVE-2024-6059",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2024-06-17T19:15:59.467",
|
||||
"lastModified": "2024-06-17T19:15:59.467",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A vulnerability, which was classified as problematic, has been found in Ingenico Estate Manager 2023. This issue affects some unknown processing of the file /emgui/rest/ums/messages of the component News Feed. The manipulation of the argument message leads to cross site scripting. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-268787. NOTE: The vendor was contacted early about this disclosure but did not respond in any way."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:N/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "HIGH",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 2.4,
|
||||
"baseSeverity": "LOW"
|
||||
},
|
||||
"exploitabilityScore": 0.9,
|
||||
"impactScore": 1.4
|
||||
}
|
||||
],
|
||||
"cvssMetricV2": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "2.0",
|
||||
"vectorString": "AV:N/AC:L/Au:M/C:N/I:P/A:N",
|
||||
"accessVector": "NETWORK",
|
||||
"accessComplexity": "LOW",
|
||||
"authentication": "MULTIPLE",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "PARTIAL",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 3.3
|
||||
},
|
||||
"baseSeverity": "LOW",
|
||||
"exploitabilityScore": 6.4,
|
||||
"impactScore": 2.9,
|
||||
"acInsufInfo": false,
|
||||
"obtainAllPrivilege": false,
|
||||
"obtainUserPrivilege": false,
|
||||
"obtainOtherPrivilege": false,
|
||||
"userInteractionRequired": false
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://gentle-khaan-c53.notion.site/Stored-XSS-in-Ingenico-The-Estate-Manager-90089eaef5574b929fe019c3d0686b63",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.268787",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.268787",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?submit.353237",
|
||||
"source": "cna@vuldb.com"
|
||||
}
|
||||
]
|
||||
}
|
81
README.md
81
README.md
@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours.
|
||||
### Last Repository Update
|
||||
|
||||
```plain
|
||||
2024-06-17T18:00:19.054255+00:00
|
||||
2024-06-17T20:00:19.113866+00:00
|
||||
```
|
||||
|
||||
### Most recent CVE Modification Timestamp synchronized with NVD
|
||||
|
||||
```plain
|
||||
2024-06-17T17:45:26.877000+00:00
|
||||
2024-06-17T19:52:06.717000+00:00
|
||||
```
|
||||
|
||||
### Last Data Feed Release
|
||||
@ -33,50 +33,59 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
|
||||
### Total Number of included CVEs
|
||||
|
||||
```plain
|
||||
254286
|
||||
254301
|
||||
```
|
||||
|
||||
### CVEs added in the last Commit
|
||||
|
||||
Recently added CVEs: `6`
|
||||
Recently added CVEs: `15`
|
||||
|
||||
- [CVE-2024-0397](CVE-2024/CVE-2024-03xx/CVE-2024-0397.json) (`2024-06-17T16:15:10.217`)
|
||||
- [CVE-2024-36573](CVE-2024/CVE-2024-365xx/CVE-2024-36573.json) (`2024-06-17T16:15:14.947`)
|
||||
- [CVE-2024-36574](CVE-2024/CVE-2024-365xx/CVE-2024-36574.json) (`2024-06-17T16:15:15.040`)
|
||||
- [CVE-2024-36575](CVE-2024/CVE-2024-365xx/CVE-2024-36575.json) (`2024-06-17T16:15:15.140`)
|
||||
- [CVE-2024-36577](CVE-2024/CVE-2024-365xx/CVE-2024-36577.json) (`2024-06-17T16:15:15.233`)
|
||||
- [CVE-2024-36578](CVE-2024/CVE-2024-365xx/CVE-2024-36578.json) (`2024-06-17T16:15:15.333`)
|
||||
- [CVE-2018-25103](CVE-2018/CVE-2018-251xx/CVE-2018-25103.json) (`2024-06-17T18:15:12.650`)
|
||||
- [CVE-2024-36527](CVE-2024/CVE-2024-365xx/CVE-2024-36527.json) (`2024-06-17T18:15:16.767`)
|
||||
- [CVE-2024-36543](CVE-2024/CVE-2024-365xx/CVE-2024-36543.json) (`2024-06-17T19:15:58.353`)
|
||||
- [CVE-2024-36973](CVE-2024/CVE-2024-369xx/CVE-2024-36973.json) (`2024-06-17T18:15:17.043`)
|
||||
- [CVE-2024-37661](CVE-2024/CVE-2024-376xx/CVE-2024-37661.json) (`2024-06-17T18:15:17.463`)
|
||||
- [CVE-2024-37662](CVE-2024/CVE-2024-376xx/CVE-2024-37662.json) (`2024-06-17T18:15:17.560`)
|
||||
- [CVE-2024-37663](CVE-2024/CVE-2024-376xx/CVE-2024-37663.json) (`2024-06-17T18:15:17.653`)
|
||||
- [CVE-2024-37664](CVE-2024/CVE-2024-376xx/CVE-2024-37664.json) (`2024-06-17T18:15:17.743`)
|
||||
- [CVE-2024-37794](CVE-2024/CVE-2024-377xx/CVE-2024-37794.json) (`2024-06-17T18:15:17.853`)
|
||||
- [CVE-2024-37795](CVE-2024/CVE-2024-377xx/CVE-2024-37795.json) (`2024-06-17T18:15:17.953`)
|
||||
- [CVE-2024-37840](CVE-2024/CVE-2024-378xx/CVE-2024-37840.json) (`2024-06-17T19:15:58.470`)
|
||||
- [CVE-2024-38449](CVE-2024/CVE-2024-384xx/CVE-2024-38449.json) (`2024-06-17T19:15:58.567`)
|
||||
- [CVE-2024-6056](CVE-2024/CVE-2024-60xx/CVE-2024-6056.json) (`2024-06-17T18:15:18.143`)
|
||||
- [CVE-2024-6058](CVE-2024/CVE-2024-60xx/CVE-2024-6058.json) (`2024-06-17T18:15:18.520`)
|
||||
- [CVE-2024-6059](CVE-2024/CVE-2024-60xx/CVE-2024-6059.json) (`2024-06-17T19:15:59.467`)
|
||||
|
||||
|
||||
### CVEs modified in the last Commit
|
||||
|
||||
Recently modified CVEs: `25`
|
||||
Recently modified CVEs: `54`
|
||||
|
||||
- [CVE-2021-47472](CVE-2021/CVE-2021-474xx/CVE-2021-47472.json) (`2024-06-17T17:15:51.050`)
|
||||
- [CVE-2024-23134](CVE-2024/CVE-2024-231xx/CVE-2024-23134.json) (`2024-06-17T17:15:51.443`)
|
||||
- [CVE-2024-36168](CVE-2024/CVE-2024-361xx/CVE-2024-36168.json) (`2024-06-17T17:08:50.037`)
|
||||
- [CVE-2024-36169](CVE-2024/CVE-2024-361xx/CVE-2024-36169.json) (`2024-06-17T17:04:09.503`)
|
||||
- [CVE-2024-36170](CVE-2024/CVE-2024-361xx/CVE-2024-36170.json) (`2024-06-17T17:03:56.473`)
|
||||
- [CVE-2024-36171](CVE-2024/CVE-2024-361xx/CVE-2024-36171.json) (`2024-06-17T16:47:24.110`)
|
||||
- [CVE-2024-36172](CVE-2024/CVE-2024-361xx/CVE-2024-36172.json) (`2024-06-17T16:42:45.833`)
|
||||
- [CVE-2024-36173](CVE-2024/CVE-2024-361xx/CVE-2024-36173.json) (`2024-06-17T16:39:09.777`)
|
||||
- [CVE-2024-36174](CVE-2024/CVE-2024-361xx/CVE-2024-36174.json) (`2024-06-17T16:38:56.820`)
|
||||
- [CVE-2024-36175](CVE-2024/CVE-2024-361xx/CVE-2024-36175.json) (`2024-06-17T16:30:11.217`)
|
||||
- [CVE-2024-36176](CVE-2024/CVE-2024-361xx/CVE-2024-36176.json) (`2024-06-17T16:27:16.317`)
|
||||
- [CVE-2024-36177](CVE-2024/CVE-2024-361xx/CVE-2024-36177.json) (`2024-06-17T16:25:21.467`)
|
||||
- [CVE-2024-36178](CVE-2024/CVE-2024-361xx/CVE-2024-36178.json) (`2024-06-17T16:25:07.473`)
|
||||
- [CVE-2024-36179](CVE-2024/CVE-2024-361xx/CVE-2024-36179.json) (`2024-06-17T16:24:58.080`)
|
||||
- [CVE-2024-36180](CVE-2024/CVE-2024-361xx/CVE-2024-36180.json) (`2024-06-17T16:24:39.483`)
|
||||
- [CVE-2024-36185](CVE-2024/CVE-2024-361xx/CVE-2024-36185.json) (`2024-06-17T17:45:26.877`)
|
||||
- [CVE-2024-36186](CVE-2024/CVE-2024-361xx/CVE-2024-36186.json) (`2024-06-17T17:44:46.093`)
|
||||
- [CVE-2024-36187](CVE-2024/CVE-2024-361xx/CVE-2024-36187.json) (`2024-06-17T17:40:33.583`)
|
||||
- [CVE-2024-36188](CVE-2024/CVE-2024-361xx/CVE-2024-36188.json) (`2024-06-17T17:34:55.847`)
|
||||
- [CVE-2024-36189](CVE-2024/CVE-2024-361xx/CVE-2024-36189.json) (`2024-06-17T17:09:25.477`)
|
||||
- [CVE-2024-38394](CVE-2024/CVE-2024-383xx/CVE-2024-38394.json) (`2024-06-17T16:15:15.823`)
|
||||
- [CVE-2024-4032](CVE-2024/CVE-2024-40xx/CVE-2024-4032.json) (`2024-06-17T16:15:15.923`)
|
||||
- [CVE-2024-5685](CVE-2024/CVE-2024-56xx/CVE-2024-5685.json) (`2024-06-17T17:15:51.953`)
|
||||
- [CVE-2024-6003](CVE-2024/CVE-2024-60xx/CVE-2024-6003.json) (`2024-06-17T16:15:16.027`)
|
||||
- [CVE-2024-6008](CVE-2024/CVE-2024-60xx/CVE-2024-6008.json) (`2024-06-17T16:15:16.140`)
|
||||
- [CVE-2024-36207](CVE-2024/CVE-2024-362xx/CVE-2024-36207.json) (`2024-06-17T19:22:41.023`)
|
||||
- [CVE-2024-36208](CVE-2024/CVE-2024-362xx/CVE-2024-36208.json) (`2024-06-17T19:22:29.990`)
|
||||
- [CVE-2024-36209](CVE-2024/CVE-2024-362xx/CVE-2024-36209.json) (`2024-06-17T19:22:21.057`)
|
||||
- [CVE-2024-36210](CVE-2024/CVE-2024-362xx/CVE-2024-36210.json) (`2024-06-17T19:22:07.157`)
|
||||
- [CVE-2024-36211](CVE-2024/CVE-2024-362xx/CVE-2024-36211.json) (`2024-06-17T19:21:53.777`)
|
||||
- [CVE-2024-36212](CVE-2024/CVE-2024-362xx/CVE-2024-36212.json) (`2024-06-17T19:21:43.703`)
|
||||
- [CVE-2024-36213](CVE-2024/CVE-2024-362xx/CVE-2024-36213.json) (`2024-06-17T19:09:24.977`)
|
||||
- [CVE-2024-36214](CVE-2024/CVE-2024-362xx/CVE-2024-36214.json) (`2024-06-17T19:35:49.083`)
|
||||
- [CVE-2024-36215](CVE-2024/CVE-2024-362xx/CVE-2024-36215.json) (`2024-06-17T19:33:11.697`)
|
||||
- [CVE-2024-36216](CVE-2024/CVE-2024-362xx/CVE-2024-36216.json) (`2024-06-17T19:42:09.377`)
|
||||
- [CVE-2024-36217](CVE-2024/CVE-2024-362xx/CVE-2024-36217.json) (`2024-06-17T19:33:01.643`)
|
||||
- [CVE-2024-36218](CVE-2024/CVE-2024-362xx/CVE-2024-36218.json) (`2024-06-17T19:32:51.723`)
|
||||
- [CVE-2024-36219](CVE-2024/CVE-2024-362xx/CVE-2024-36219.json) (`2024-06-17T19:32:42.640`)
|
||||
- [CVE-2024-36220](CVE-2024/CVE-2024-362xx/CVE-2024-36220.json) (`2024-06-17T19:48:35.573`)
|
||||
- [CVE-2024-36221](CVE-2024/CVE-2024-362xx/CVE-2024-36221.json) (`2024-06-17T19:48:20.473`)
|
||||
- [CVE-2024-36222](CVE-2024/CVE-2024-362xx/CVE-2024-36222.json) (`2024-06-17T19:45:39.257`)
|
||||
- [CVE-2024-36224](CVE-2024/CVE-2024-362xx/CVE-2024-36224.json) (`2024-06-17T19:45:13.547`)
|
||||
- [CVE-2024-36225](CVE-2024/CVE-2024-362xx/CVE-2024-36225.json) (`2024-06-17T19:37:58.810`)
|
||||
- [CVE-2024-36231](CVE-2024/CVE-2024-362xx/CVE-2024-36231.json) (`2024-06-17T19:52:06.717`)
|
||||
- [CVE-2024-36232](CVE-2024/CVE-2024-362xx/CVE-2024-36232.json) (`2024-06-17T19:51:25.503`)
|
||||
- [CVE-2024-3876](CVE-2024/CVE-2024-38xx/CVE-2024-3876.json) (`2024-06-17T19:15:58.763`)
|
||||
- [CVE-2024-4032](CVE-2024/CVE-2024-40xx/CVE-2024-4032.json) (`2024-06-17T18:15:18.047`)
|
||||
- [CVE-2024-4584](CVE-2024/CVE-2024-45xx/CVE-2024-4584.json) (`2024-06-17T19:15:58.903`)
|
||||
- [CVE-2024-4595](CVE-2024/CVE-2024-45xx/CVE-2024-4595.json) (`2024-06-17T19:15:59.063`)
|
||||
- [CVE-2024-5206](CVE-2024/CVE-2024-52xx/CVE-2024-5206.json) (`2024-06-17T19:15:59.190`)
|
||||
|
||||
|
||||
## Download and Usage
|
||||
|
181
_state.csv
181
_state.csv
@ -121379,6 +121379,7 @@ CVE-2018-25098,0,0,fcae82fd425e45c0b5170e1d16175026afcc4282c8c2d036ab7934ed74d6d
|
||||
CVE-2018-25099,0,0,4477c16cb5a3503e957873dbddbd3b50ffb7092ffd27acf2a352c93f686dfb7f,2024-03-18T12:38:25.490000
|
||||
CVE-2018-25100,0,0,26375a09020100e722ed36e37b25c669512cdaa2d61a780ec73480ee78db5d6b,2024-03-25T01:51:01.223000
|
||||
CVE-2018-25101,0,0,b04dde640afba29853f504e83596fe419f66817bb46aeb488be7718ce77d287c,2024-06-04T19:16:57.060000
|
||||
CVE-2018-25103,1,1,122206d0dffed87e661f65dbda0c75ede3d4cb0caf0ebcb77979d91738119961,2024-06-17T18:15:12.650000
|
||||
CVE-2018-2515,0,0,158f882e4275a7485a2b9ce17e7e57c4ea22cf74c55a78a9900c73a4caa327c0,2023-11-07T02:57:57.887000
|
||||
CVE-2018-2560,0,0,0bb1a26d6c05fddeb488697adb0bbe667a3dd77c1a5bc7af495c8721df5b1197,2020-08-24T17:37:01.140000
|
||||
CVE-2018-2561,0,0,b76feaa260e2f54fc8eeb8d50d578ffdd22b603f486ac4f8f5b3bc42df22fa45,2018-01-25T13:53:15.120000
|
||||
@ -187269,7 +187270,7 @@ CVE-2021-47468,0,0,b58fcad515b90a658d1f8eb09772b6deadbab142893484848bfd4f0e6a5e8
|
||||
CVE-2021-47469,0,0,27ed4ca714e333af908656c7f0d26dbc4e54e957cf91be05caddcc4168e639c1,2024-05-22T12:46:53.887000
|
||||
CVE-2021-47470,0,0,c7a6cba2bc0b5c738140227ec594b9a0a83cbeace54488d607923103cad0f3cf,2024-05-22T12:46:53.887000
|
||||
CVE-2021-47471,0,0,279140f208b843b6f923cb9d7379164abe2a6902c16231ebaa829337929258b5,2024-05-22T12:46:53.887000
|
||||
CVE-2021-47472,0,1,d7ffb60c1efa6aeedbeb6f5a045eedbe61f352602a4eba01f18d081b1113df22,2024-06-17T17:15:51.050000
|
||||
CVE-2021-47472,0,0,d7ffb60c1efa6aeedbeb6f5a045eedbe61f352602a4eba01f18d081b1113df22,2024-06-17T17:15:51.050000
|
||||
CVE-2021-47473,0,0,a06d0b2b3fb2a56155409742cc763e481118233c333bae60fb67e17923573646,2024-05-22T12:46:53.887000
|
||||
CVE-2021-47474,0,0,5aa7ee22ccceebf8afc658dcaeb529c380fd6398ba5a5b4aacbae80a3d788859,2024-05-22T12:46:53.887000
|
||||
CVE-2021-47475,0,0,bda5bd6370629486bc328ef4919cd6bc566c5d10fcc12f7f374913a6b12c2f04,2024-05-22T12:46:53.887000
|
||||
@ -240663,7 +240664,7 @@ CVE-2024-0393,0,0,8881de5088bee2f43467b73941f684354c9bcdccfa7386a7827d4a78a7e8f3
|
||||
CVE-2024-0394,0,0,132997f5a0f39575e52ab364803d29384d542a557e73a32dea0a249b2357dfb2,2024-04-03T17:24:18.150000
|
||||
CVE-2024-0395,0,0,9697a8ac3bbf759d0c2ea19b7ab0aa903676619b1d5a607c85b8d090a4e44ee7,2024-01-10T14:15:44.970000
|
||||
CVE-2024-0396,0,0,106628bcb832aae2e274e4e91fdb5add809827efe4c459066d3102ffe0249334,2024-01-29T15:22:40.317000
|
||||
CVE-2024-0397,1,1,4ce7ed96e8724eda679ad0a7861920e41577ccf8436b1e71272a906b64dd14cf,2024-06-17T16:15:10.217000
|
||||
CVE-2024-0397,0,1,fb8a60d96b18ded5a4df325ab5f16c2a3f8bca756e992bf0a8b459da554ad30b,2024-06-17T18:15:14.767000
|
||||
CVE-2024-0399,0,0,f9efd00d0c28d2f5fd7844014ccf20e6de83c83ab3d0467105e159f94efa805f,2024-04-15T13:15:31.997000
|
||||
CVE-2024-0400,0,0,18035b4484267a537c15645ebee53285fc55ae5559f980b5f9795ec2795f24dd,2024-03-27T12:29:30.307000
|
||||
CVE-2024-0401,0,0,eb06da8d7bba1b4b23b9513633128fc89991a02e4c0b59d538b76f5796878a05,2024-05-20T19:34:58.277000
|
||||
@ -243920,7 +243921,7 @@ CVE-2024-23130,0,0,1e3e1092d31e482531a23d074c00b2201eef463d384cdf1e1935233d4885d
|
||||
CVE-2024-23131,0,0,c427ee94f7c61adaf0716529d63f7a538f863e445e4db249885a3e64e551be88,2024-03-18T00:15:07.247000
|
||||
CVE-2024-23132,0,0,f22a2bdc1f997a36d13f6c22afab4983451c9373205a8ec6621cdd27061b8266,2024-03-18T00:15:07.297000
|
||||
CVE-2024-23133,0,0,e86482bc439e59c6d3cf72bc6bb19d1a229eba94c9abdd88aed6d4ca00d35e18,2024-03-18T00:15:07.340000
|
||||
CVE-2024-23134,0,1,7bcfdd789809a85dcb3d8c1b9ffa0666d172be0747695b354e86aa69e00d8a04,2024-06-17T17:15:51.443000
|
||||
CVE-2024-23134,0,0,7bcfdd789809a85dcb3d8c1b9ffa0666d172be0747695b354e86aa69e00d8a04,2024-06-17T17:15:51.443000
|
||||
CVE-2024-23135,0,0,4ba3ef7d8b86192f3be9f608d250b59255f9c0272b793b5a67accf11746a7c49,2024-03-18T00:15:07.437000
|
||||
CVE-2024-23136,0,0,2b90dcbe6397ed8c7559581d051fafe64c4814ea200ea96c2ab2b35870ef1cba,2024-03-18T00:15:07.490000
|
||||
CVE-2024-23137,0,0,b73ac1a3962b6dd849e09860e5fbdd306ad601f2f1d6396ea6c594ab1cd8349c,2024-03-18T00:15:07.537000
|
||||
@ -250572,10 +250573,10 @@ CVE-2024-33345,0,0,7e89e81b2d7685c6c34b1a9a15e1d945044ecd27f7013fb1d01c673b4d1ae
|
||||
CVE-2024-33350,0,0,144e795866532d4010724292bbdbe74a18701be22392e8071c46c27a5004fd5c,2024-04-30T13:11:16.690000
|
||||
CVE-2024-3337,0,0,0e96a0de2c5ffbe4a9f2804ffa8c1140c4bee3e6e00979a6ee0758b1212b2f3c,2024-05-02T18:00:37.360000
|
||||
CVE-2024-33371,0,0,ec7a79f056a06763ccfa7dcfdf94bdae70f29613e0b1d07abafaf338bff1ecb9,2024-05-01T13:02:20.750000
|
||||
CVE-2024-33373,0,0,b7c15c73d24825415a7d81cda68e19668f66965e6357f4d729eabce1e026c719,2024-06-17T12:42:04.623000
|
||||
CVE-2024-33374,0,0,040b16231a2030aa2589471ed193e002a1dbeaa763feb6bfa27302cab3e4a3ea,2024-06-17T12:42:04.623000
|
||||
CVE-2024-33375,0,0,62da4be2bcf5ab07083478b46125bb21a9bb85fa5fd4408a26373c40053da4bc,2024-06-17T12:42:04.623000
|
||||
CVE-2024-33377,0,0,a8f7812885f06227f9d067cdee6974d8f79b9aa6c625159576fd7db4c1844cd5,2024-06-17T12:42:04.623000
|
||||
CVE-2024-33373,0,1,99b7497bb078bdf83fb304129b21aa2798c901fd9ac60f4753875e9aeb70b3dc,2024-06-17T18:15:15.920000
|
||||
CVE-2024-33374,0,1,f31f8e198d692129975bcaf7b94a4f3569071cac52d0ba48bf94e9c4b2d859cb,2024-06-17T18:15:16.017000
|
||||
CVE-2024-33375,0,1,e0eba6392fdb7999a39fee885f67bacc2f50594b53677377ca106c2be6c0baba,2024-06-17T19:15:58.107000
|
||||
CVE-2024-33377,0,1,678ecca4c46ab739843520542d6cffa2a387a8e6dc22686e1f86a739b43e0ba3,2024-06-17T18:15:16.107000
|
||||
CVE-2024-3338,0,0,9454a656764280ba43f4b4a832049a80a0f45e8c0d37939e326776fd301ff609,2024-05-02T18:00:37.360000
|
||||
CVE-2024-33382,0,0,fdefbc91dd758eee79622e13a87ace7fd97404c7ba92ae8195304a5c3b9d8c61,2024-05-09T13:05:45.620000
|
||||
CVE-2024-33383,0,0,70f21187cd92beebcc08c0b97ec4ff0e6f501ff7515be84dc12b959842f9d519,2024-05-01T13:02:20.750000
|
||||
@ -252224,80 +252225,80 @@ CVE-2024-36161,0,0,9884a64367104c734adb0953b296c8404da830f2c5510c8e40dcd82fcaa84
|
||||
CVE-2024-36162,0,0,392e6d9c603b43b1c9eb59c0f484a66be936b68eb22bc1b540f11ffbd3063af3,2024-06-14T20:33:18.287000
|
||||
CVE-2024-36163,0,0,5e46503b5d8f1b7c32c59130646e3f9d66f5fa0e435b048cce3490f0141e6e8d,2024-06-13T18:35:19.777000
|
||||
CVE-2024-36164,0,0,f24c589d857b5e5a2b9d4256791e32b4fa7cdbb2ce305a445e9a9ffe9d1fd80a,2024-06-13T18:35:19.777000
|
||||
CVE-2024-36165,0,0,d2403d5a5d1a283e2c86dcc0bb4def26b48cf9a71e084367444d01607e25f0a0,2024-06-13T18:35:19.777000
|
||||
CVE-2024-36166,0,0,ead3dc226ae554bb2dfcf3482b8d6f93ea8911d937aa6f7b332fce59816e80d2,2024-06-13T18:35:19.777000
|
||||
CVE-2024-36167,0,0,91e0d72536b27941c64682cccce3b4e2e7dfd5a75b1fd0ca62da6225d7a73ac0,2024-06-13T18:35:19.777000
|
||||
CVE-2024-36168,0,1,d9e1fe51c8fbe7a0c171ea17ef6138e97ecfb927ae9efba2a521f5e73a1c2fa9,2024-06-17T17:08:50.037000
|
||||
CVE-2024-36169,0,1,a58aca443e054709df42bac621b16e63f601fbd9af04f2e770fa783666f8bbc2,2024-06-17T17:04:09.503000
|
||||
CVE-2024-36165,0,1,eed1ba919ba899785005f5312eff29d764f2585157603e023819a2df39c2ec7e,2024-06-17T19:38:08.973000
|
||||
CVE-2024-36166,0,1,060ccda354064e2490c0e77e3b3c596578f9ffa6d5181a1e60537e699f9643e4,2024-06-17T19:38:19.783000
|
||||
CVE-2024-36167,0,1,e005f8263e9f112763d854142f00274e989ddef0f13ef360174ce64e69ba5e59,2024-06-17T19:38:29.453000
|
||||
CVE-2024-36168,0,0,d9e1fe51c8fbe7a0c171ea17ef6138e97ecfb927ae9efba2a521f5e73a1c2fa9,2024-06-17T17:08:50.037000
|
||||
CVE-2024-36169,0,0,a58aca443e054709df42bac621b16e63f601fbd9af04f2e770fa783666f8bbc2,2024-06-17T17:04:09.503000
|
||||
CVE-2024-3617,0,0,f567fe2d001aaca41d03c0a0366ef1e99b32bc6e27d43d00554123f9bc28d775,2024-06-04T19:20:22.087000
|
||||
CVE-2024-36170,0,1,55c054c5ccd0ed1b79e149145fad6587bca625b70e6e1677142d0e74aba34eaa,2024-06-17T17:03:56.473000
|
||||
CVE-2024-36171,0,1,5ae32dcb256374ac8c471fd7950e1045f67ef9da0229b2bfb53e944968cec7a7,2024-06-17T16:47:24.110000
|
||||
CVE-2024-36172,0,1,65f98fe2d8d2975bca5a731d70e2afdd2b77874c7d99a778c5b9756d40a87dfd,2024-06-17T16:42:45.833000
|
||||
CVE-2024-36173,0,1,609613d6da423f3481b043da61f09ece7535e3749189db36cdbd6d1dedb2ed2c,2024-06-17T16:39:09.777000
|
||||
CVE-2024-36174,0,1,612b3524e3bcbc509f8b54b48031e925b18ed3387c24a7c4349a785c129fa3d8,2024-06-17T16:38:56.820000
|
||||
CVE-2024-36175,0,1,cbedfbe0ad3671af78a976f49a40be29e1aed21e3115f629482d4401868e075e,2024-06-17T16:30:11.217000
|
||||
CVE-2024-36176,0,1,e8217e2419f6e849a46aa90642dc7b1ce15412be354328c878868bea9e40e9b8,2024-06-17T16:27:16.317000
|
||||
CVE-2024-36177,0,1,ff5febe8c09df3a91e398dffd50ff9388941b5445febd1c679119be209fb89c2,2024-06-17T16:25:21.467000
|
||||
CVE-2024-36178,0,1,8dcb946dfee7b963619ba7ba0e6a46a3dd96080f30f83f4807f7834e38fd2792,2024-06-17T16:25:07.473000
|
||||
CVE-2024-36179,0,1,118021cd24c6285797e8cd3829754e899301c1729807e50ed7aafcb1d134d848,2024-06-17T16:24:58.080000
|
||||
CVE-2024-36170,0,0,55c054c5ccd0ed1b79e149145fad6587bca625b70e6e1677142d0e74aba34eaa,2024-06-17T17:03:56.473000
|
||||
CVE-2024-36171,0,0,5ae32dcb256374ac8c471fd7950e1045f67ef9da0229b2bfb53e944968cec7a7,2024-06-17T16:47:24.110000
|
||||
CVE-2024-36172,0,0,65f98fe2d8d2975bca5a731d70e2afdd2b77874c7d99a778c5b9756d40a87dfd,2024-06-17T16:42:45.833000
|
||||
CVE-2024-36173,0,0,609613d6da423f3481b043da61f09ece7535e3749189db36cdbd6d1dedb2ed2c,2024-06-17T16:39:09.777000
|
||||
CVE-2024-36174,0,0,612b3524e3bcbc509f8b54b48031e925b18ed3387c24a7c4349a785c129fa3d8,2024-06-17T16:38:56.820000
|
||||
CVE-2024-36175,0,0,cbedfbe0ad3671af78a976f49a40be29e1aed21e3115f629482d4401868e075e,2024-06-17T16:30:11.217000
|
||||
CVE-2024-36176,0,0,e8217e2419f6e849a46aa90642dc7b1ce15412be354328c878868bea9e40e9b8,2024-06-17T16:27:16.317000
|
||||
CVE-2024-36177,0,0,ff5febe8c09df3a91e398dffd50ff9388941b5445febd1c679119be209fb89c2,2024-06-17T16:25:21.467000
|
||||
CVE-2024-36178,0,0,8dcb946dfee7b963619ba7ba0e6a46a3dd96080f30f83f4807f7834e38fd2792,2024-06-17T16:25:07.473000
|
||||
CVE-2024-36179,0,0,118021cd24c6285797e8cd3829754e899301c1729807e50ed7aafcb1d134d848,2024-06-17T16:24:58.080000
|
||||
CVE-2024-3618,0,0,49acf1181a6848a16665fb73aec3d174ce097deba0c0b38747c9b85c5bffb2db,2024-06-04T19:20:22.213000
|
||||
CVE-2024-36180,0,1,33f0fbd8ed8da11dcc141ccb70d1a4c1ffe93db624930c800eda80f920d5effc,2024-06-17T16:24:39.483000
|
||||
CVE-2024-36181,0,0,b9c60fc14f35f74dc6621071407b577fa01522dbbba32652fc2bdaa9527d16f5,2024-06-13T18:35:19.777000
|
||||
CVE-2024-36182,0,0,52e41f6547ccf305a197ce4a3755e9e266aac6e3da17db97f98a19e1efbbe24a,2024-06-13T18:35:19.777000
|
||||
CVE-2024-36183,0,0,c551d8e4091d1bc3878639d8613802cc5fc92bee52d39bce0a1f0f7ba962ccb3,2024-06-13T18:35:19.777000
|
||||
CVE-2024-36184,0,0,8e30f8df2c1254b0af6aea9e9eeb32121c0b3da7ec5b7850d6e06bd8d0e2342b,2024-06-13T18:35:19.777000
|
||||
CVE-2024-36185,0,1,49b47a11e53b4dee718dabc2e1f0a06114ce49b2284b50acf0c2178814eef42c,2024-06-17T17:45:26.877000
|
||||
CVE-2024-36186,0,1,ff6dc51cf8bbb78a7249b14b3bf1da4bf203942ab188537cb35bc3d5d1088959,2024-06-17T17:44:46.093000
|
||||
CVE-2024-36187,0,1,22ece855690dce9348d2203aa872cc428d44e30d9de97df4eca43d487706dbdc,2024-06-17T17:40:33.583000
|
||||
CVE-2024-36188,0,1,0bec449cf01af5399cea99298ffcfc02e2e48310698ba7c78ddb8491b430eab0,2024-06-17T17:34:55.847000
|
||||
CVE-2024-36189,0,1,05b4c9026773415c49a51c07f2f0c992c1049b3f3d114f94fdda2f499829580e,2024-06-17T17:09:25.477000
|
||||
CVE-2024-36180,0,0,33f0fbd8ed8da11dcc141ccb70d1a4c1ffe93db624930c800eda80f920d5effc,2024-06-17T16:24:39.483000
|
||||
CVE-2024-36181,0,1,b25adc5fb8428c04946dc735dd26138aa798b914d2f6d21938070300dcd79553,2024-06-17T19:50:13.523000
|
||||
CVE-2024-36182,0,1,30104f16b7d8be6088012e5fe7b96486f044fe242cb0407c6c5c9c8799a3f0fd,2024-06-17T19:36:00.387000
|
||||
CVE-2024-36183,0,1,28363d66843c750b13d124e7278cb70f3b5989728785a6ec3cca95f972e56c82,2024-06-17T19:49:53.943000
|
||||
CVE-2024-36184,0,1,e50341690a3e7998dbe8821bd2ca41fda077846bc55664a7af784dd1e91b6bae,2024-06-17T19:49:42.257000
|
||||
CVE-2024-36185,0,0,49b47a11e53b4dee718dabc2e1f0a06114ce49b2284b50acf0c2178814eef42c,2024-06-17T17:45:26.877000
|
||||
CVE-2024-36186,0,0,ff6dc51cf8bbb78a7249b14b3bf1da4bf203942ab188537cb35bc3d5d1088959,2024-06-17T17:44:46.093000
|
||||
CVE-2024-36187,0,0,22ece855690dce9348d2203aa872cc428d44e30d9de97df4eca43d487706dbdc,2024-06-17T17:40:33.583000
|
||||
CVE-2024-36188,0,0,0bec449cf01af5399cea99298ffcfc02e2e48310698ba7c78ddb8491b430eab0,2024-06-17T17:34:55.847000
|
||||
CVE-2024-36189,0,0,05b4c9026773415c49a51c07f2f0c992c1049b3f3d114f94fdda2f499829580e,2024-06-17T17:09:25.477000
|
||||
CVE-2024-3619,0,0,165314f79e4f722f622203e47502b9381ecf302926cb9ad2cdc2988542678367,2024-05-17T02:40:02.103000
|
||||
CVE-2024-36190,0,0,7a560eaa6ce211d28e10c0c6befeae5dc18f5e8729ba3bdb3d5f735f9fd50003,2024-06-13T18:35:19.777000
|
||||
CVE-2024-36191,0,0,268ffaf8e90fc90ff53ab226e8efac8444105ea810fb7215f5f7cc4b037b6ef9,2024-06-13T18:35:19.777000
|
||||
CVE-2024-36192,0,0,d29cab8d285a96c6360a95db41dbf11f4c245da9605b6015405a026cdcaa9d12,2024-06-13T18:35:19.777000
|
||||
CVE-2024-36193,0,0,85f1a5f176856d3d02baa4d23039f0575ed34f14366d375d269f8fe700f06154,2024-06-13T18:35:19.777000
|
||||
CVE-2024-36194,0,0,675f0a9e23051c96db02d496de718a783f246310901840d80b3f38a279719423,2024-06-13T18:35:19.777000
|
||||
CVE-2024-36195,0,0,279a90dbf7b356172083ad5df59e7420eddb6121e359f5d0c6ef515a00a4e4dd,2024-06-13T18:35:19.777000
|
||||
CVE-2024-36196,0,0,2218ecb4a7b9f1c330873b7bdc6f5497cb30ff18aa9f3e5935af025800915166,2024-06-13T18:35:19.777000
|
||||
CVE-2024-36197,0,0,1c714d97dd75e949030a87e356d277b5f52e49d26a0f21113bbc5ae08ddac962,2024-06-13T18:35:19.777000
|
||||
CVE-2024-36198,0,0,4158315c31674c0c800b8a22afda78c1584c90550e8a5299229c9687ac9fef10,2024-06-13T18:35:19.777000
|
||||
CVE-2024-36199,0,0,2ccbecfd88acf146da1e632d724c59df0ea43e7ad4a8cd0398b9b94644e2bf68,2024-06-13T18:35:19.777000
|
||||
CVE-2024-36190,0,1,f102d3248dea23ff17c2f1af127d93c77fab80b1a59af4dc7864259b2cfd12f4,2024-06-17T19:49:13.337000
|
||||
CVE-2024-36191,0,1,fe85c58b74cc97ce1e65b01374bb18e75a855e09e5b666b0ba4b35767b44f447,2024-06-17T19:06:28.207000
|
||||
CVE-2024-36192,0,1,45378a68a4d9289d7ad56c121aee6e8dcf0e78cf5ec1ba10c5f18d8bb70e5b6f,2024-06-17T19:01:16.820000
|
||||
CVE-2024-36193,0,1,e8bca4f25cc69c70749d579f0d7b91522abf8ce96c88ed7539372a4f8d0fc3fe,2024-06-17T18:57:12.537000
|
||||
CVE-2024-36194,0,1,746e7ad33fdcd7716caf7b1566199913629281052465454c19567c0420565f36,2024-06-17T18:56:57.933000
|
||||
CVE-2024-36195,0,1,8b82a04f66d75c39da71f704b3c4dc9196ab6e487165fc9dd951f356d9cd01e3,2024-06-17T18:56:48.090000
|
||||
CVE-2024-36196,0,1,f0d9cccd8dd511c63bd40a41d40c052123a1f7d18ff036da12edeecd5e16686c,2024-06-17T18:56:33.480000
|
||||
CVE-2024-36197,0,1,c50c78c6e8e5d6d63c9c4281068fbab3d5c028be55a3c1849ff121b49e8189ae,2024-06-17T19:48:57.047000
|
||||
CVE-2024-36198,0,1,0d9c29bc137953462a5eb222099f437d69e24443e59705a9d753655f95a921a6,2024-06-17T18:56:20.607000
|
||||
CVE-2024-36199,0,1,1b859104c5816ed1e6e90edef1833f0ee83575bbcd8a6c5f81d0159954f181ed,2024-06-17T18:56:07.053000
|
||||
CVE-2024-3620,0,0,1df23a75dfa243d45dccfaf93a6d2abcd8205c1c1c6930bdb57d4f40b6f4c71f,2024-06-04T19:20:22.317000
|
||||
CVE-2024-36200,0,0,20ff178a3ca633e8cd0f8c1fc8dd6193671e007ad31a13e350d3d9d37d0b14d6,2024-06-13T18:35:19.777000
|
||||
CVE-2024-36201,0,0,74ad4222062912fec02a01465b090abe996dfdbe4893fe6629c63d25f8531679,2024-06-13T18:35:19.777000
|
||||
CVE-2024-36202,0,0,4e8294e8677ebbfa91aa992df6d32132513e3079206e4b587a024049fd6d584a,2024-06-13T18:35:19.777000
|
||||
CVE-2024-36203,0,0,a9bd501139f807495e95c86a6a6119a593ee7832e57377ee957b0ef6dec91577,2024-06-13T18:35:19.777000
|
||||
CVE-2024-36204,0,0,6b4e59e1442af4c51333977d482454fef6c9e367b5bccef386435dd98ef7d0a4,2024-06-13T18:35:19.777000
|
||||
CVE-2024-36205,0,0,f19d527b032c5396bd90c74b0ac5309a95ca72adbcfcb781c1dba10599ea9c07,2024-06-13T18:35:19.777000
|
||||
CVE-2024-36206,0,0,f6bc8615c9e722023c0747a3382d6201eb46042a239c2df7baba5c5b1c2e938a,2024-06-13T18:35:19.777000
|
||||
CVE-2024-36207,0,0,c56bf789cdb514911c0a885e8d6458e21497f44360a33e2eb8f90b58ea94413f,2024-06-13T18:35:19.777000
|
||||
CVE-2024-36208,0,0,1ebf5bd412c71785f1691a7a4291213dfe4aa02d865a66f83ab0539b61ee8ef8,2024-06-13T18:35:19.777000
|
||||
CVE-2024-36209,0,0,dea37790995da3911568f66379c1f523b56e0cc81daa36c39688e288f57079de,2024-06-13T18:35:19.777000
|
||||
CVE-2024-36200,0,1,ba51adf20b4158c68b5efdcb4267da858e066a19fd243ce67c4bb1a89b50150e,2024-06-17T18:55:53.703000
|
||||
CVE-2024-36201,0,1,4b10353c471272c3c9b752b5eda1fe2e8b3cac69d46f7babdbf7f5cf0a7de83d,2024-06-17T18:55:34.580000
|
||||
CVE-2024-36202,0,1,1ec8aa1cd75c69b6f68702c72cd5e0f86360ef843210f88dc82f3163650efd5c,2024-06-17T18:55:21.577000
|
||||
CVE-2024-36203,0,1,1cd86fd0b6e4aab3ff6325c4b1653c1ba7ed49d0b1d7e7f58c66e5fb5000af55,2024-06-17T19:23:59.480000
|
||||
CVE-2024-36204,0,1,9cc70bae1dd03ac6434c29c2277c27007d99686a8c8cc70166765b61748e966a,2024-06-17T19:23:45.870000
|
||||
CVE-2024-36205,0,1,7c0cda3b04bbafcc01234b2bb01ab1ceb07fa3909a0e0c4ab23a3419a8a29cbe,2024-06-17T19:23:22.583000
|
||||
CVE-2024-36206,0,1,3cea8e74002f9a30a97fe0c76f64fd66fbbe7a9ae97308068e460c74d0ec5ccc,2024-06-17T19:23:04.890000
|
||||
CVE-2024-36207,0,1,ed22eccaa0cf7c8241053e2bb61f588fecfc05bd5b5b383f300d716e384ebabf,2024-06-17T19:22:41.023000
|
||||
CVE-2024-36208,0,1,252425d2e22cb2dcb6d497267af45df418409b9dbb97b0a7027795208858d323,2024-06-17T19:22:29.990000
|
||||
CVE-2024-36209,0,1,94840f37d7c7dd27d7c8849dd943c251dd21254fc62356ad09274d8d1e7c25c8,2024-06-17T19:22:21.057000
|
||||
CVE-2024-3621,0,0,3204ec8fd9c2678ba71c374fd9b3e44813b4dc6ba5c30c2d3c2f5f44c3098c61,2024-05-17T02:40:02.290000
|
||||
CVE-2024-36210,0,0,fdda925d088fe00a07c96ae703d0a6578b3f5e4994ba524e6025ef4020cdebc2,2024-06-13T18:35:19.777000
|
||||
CVE-2024-36211,0,0,cbfe6a48ebb1ca671e2019539bcc08a3e99c1646fee764e4973b5545fba35a07,2024-06-13T18:35:19.777000
|
||||
CVE-2024-36212,0,0,b1b81d9517eb80270d5f756b84865c45e7fdb052877e54362037df57295393b9,2024-06-13T18:35:19.777000
|
||||
CVE-2024-36213,0,0,da0a72bb1a43b582c4ad56e1bec8d2c0ad75fe144a737adcf90b1a482310c6cb,2024-06-13T18:35:19.777000
|
||||
CVE-2024-36214,0,0,e82a9a3b9d1c6e0ec25b16c803ee2210527a89dc49a5561b1eb5246ff01f8209,2024-06-13T18:35:19.777000
|
||||
CVE-2024-36215,0,0,8225ca42ec2f01e23bcbdc4c8c6ec4f98a0109257d3f6823ebf8f43d8bd0bc87,2024-06-13T18:35:19.777000
|
||||
CVE-2024-36216,0,0,dfeb6c24838871b642a3b7e1b63287c06e59f67ce70f42826fd7eb660abc39b1,2024-06-13T18:35:19.777000
|
||||
CVE-2024-36217,0,0,01353ce9fb6d0c91b46e64486d875590743c342ffc9e7a5764929a4c6463d1fc,2024-06-13T18:35:19.777000
|
||||
CVE-2024-36218,0,0,1785479d42ea5a20c4f7d3f0e1abfc75fc9bd30674b9b1d397ca568e2ec57b2e,2024-06-13T18:35:19.777000
|
||||
CVE-2024-36219,0,0,289096eb1d5e22b363c0fb6d9969b5875060b2166d123bb22a768da7968388f0,2024-06-13T18:35:19.777000
|
||||
CVE-2024-36210,0,1,17040d4d7950d9e36a83a5eb4c4e5c4bcb16cbf33e9de87fa3efabca07710cdd,2024-06-17T19:22:07.157000
|
||||
CVE-2024-36211,0,1,f922a627e23eb178e020fe41f9139a21eff9ca37a7f987126f1365e053257b67,2024-06-17T19:21:53.777000
|
||||
CVE-2024-36212,0,1,c75b3e5da223f38dd425e911d368fa69a7a47f2a07eb6db31accb3e0c8cfeeba,2024-06-17T19:21:43.703000
|
||||
CVE-2024-36213,0,1,59e16fb535d46710ac714874d7837c453b885e7c6e33483485e717e774d8fda2,2024-06-17T19:09:24.977000
|
||||
CVE-2024-36214,0,1,36f36a8528ad94584591b17fbeb9eab1b715b27066a5620f5304158fd1a9c25d,2024-06-17T19:35:49.083000
|
||||
CVE-2024-36215,0,1,de4859556ceb90bfc1859050c4dfb29e68a8ee5977c192482751432f8b122841,2024-06-17T19:33:11.697000
|
||||
CVE-2024-36216,0,1,a0032a650a0d532fc6a4de76ae7cf7172dfeb639074d0b6884203d5f27c5df50,2024-06-17T19:42:09.377000
|
||||
CVE-2024-36217,0,1,9c4bf583e2236f456d5fa634c4a935863bb71d6b4d7336d1c28afc52f096d2f4,2024-06-17T19:33:01.643000
|
||||
CVE-2024-36218,0,1,fae8eda30a3c40d9dbf03cc0c0067ca0c999dc54662a4af35d391a8bd51adae6,2024-06-17T19:32:51.723000
|
||||
CVE-2024-36219,0,1,42f49034b08f79f884ad088fe3528181533a38f85304259f704167900c9527c3,2024-06-17T19:32:42.640000
|
||||
CVE-2024-3622,0,0,8a36012169667d948c0b90aa74b5439b232e5ac011c2df4d1ba7f1e8b3410d38,2024-04-26T12:58:17.720000
|
||||
CVE-2024-36220,0,0,705e02c8598739c00b0d841e0c87ecb6b5b1fe4bc0ab2ede902c2f1f65b4aed1,2024-06-13T18:35:19.777000
|
||||
CVE-2024-36221,0,0,95f168134c75fb371bf3697253c53c2937b5150830794fa75cc2782ab3def335,2024-06-13T18:35:19.777000
|
||||
CVE-2024-36222,0,0,7847f25e12bc8ca0c641762403f3534ff8e2b4c1d35ee58590ef33008c829fd0,2024-06-13T18:35:19.777000
|
||||
CVE-2024-36224,0,0,751f63817e25efe2248387dfe30dfb4d25e455494937daae13e88033900c39d5,2024-06-13T18:35:19.777000
|
||||
CVE-2024-36225,0,0,350ebbe8a902cc5ab3a4a08823756d33ebfa2151b85012969081e8cd244c832f,2024-06-13T18:35:19.777000
|
||||
CVE-2024-36220,0,1,24c655ce3f0526042bfd67880dc41106cdfb5f98dde6971f64873ae1cdc82ba8,2024-06-17T19:48:35.573000
|
||||
CVE-2024-36221,0,1,2c46cdd47e910a4fc18e0dd65366030bdc1eb4d14ec50fb4c46fb03d63f1288e,2024-06-17T19:48:20.473000
|
||||
CVE-2024-36222,0,1,a8ee0e561dcb5bfbba224cb0539031d96c298ae7a136bc37d3ec9a0970e67bf5,2024-06-17T19:45:39.257000
|
||||
CVE-2024-36224,0,1,5c74dec5f032580ca9e70dab38c4d47b808d869c78d9a9688f6eb49fd80615a0,2024-06-17T19:45:13.547000
|
||||
CVE-2024-36225,0,1,fd495a92f56159f6c10cf6177a32831d7edff99b61db5bcc3c4fb3be2c44c3a1,2024-06-17T19:37:58.810000
|
||||
CVE-2024-36226,0,0,63c695833cfbf502974ddfcb1fc7381dd367553339b0d43ddd7cfc9350f4fc2c,2024-06-13T18:35:19.777000
|
||||
CVE-2024-36227,0,0,4f9708c3e190c903e17a59c6a290567f989ac01fce90e87a2c00ee28ec01c013,2024-06-13T18:35:19.777000
|
||||
CVE-2024-36228,0,0,b27204a0ec7d2e55ed95db2e3835454fae2ce9d3fe4668e0d18cc12694c7d39c,2024-06-13T18:35:19.777000
|
||||
CVE-2024-36229,0,0,7ba720ab8600cdae47ab2dee552d75b23243a9a50066b699a976ff9b1225b75f,2024-06-13T18:35:19.777000
|
||||
CVE-2024-3623,0,0,9044a03f32811b426f24d5347da98fbfdb67f97317f2e90baed487a2da0b464c,2024-04-26T12:58:17.720000
|
||||
CVE-2024-36230,0,0,5c02798fd006be44a457f690229bdebc32d9d963ab482182bed6b100663fd10a,2024-06-13T18:35:19.777000
|
||||
CVE-2024-36231,0,0,0e6fa683ba2d2ca356064a41aab2f10af1673646258af23b86dc98d376ae3df2,2024-06-13T18:35:19.777000
|
||||
CVE-2024-36232,0,0,bc8a5d6193a9ed70125a4f507acd21423921b3a8aa32b9991b206d4731cc2f19,2024-06-13T18:35:19.777000
|
||||
CVE-2024-36231,0,1,b5045756b30dee287424d6013535cd996cf26bd55406c0e6e1bfd4736b6abb98,2024-06-17T19:52:06.717000
|
||||
CVE-2024-36232,0,1,a9c5138f5604d517108f300a12cde735a99ec64851c8a5b1080310f3d5b9ab49,2024-06-17T19:51:25.503000
|
||||
CVE-2024-36233,0,0,627bd0904e137fe695666d197191485332a263290dfe45603e50f25003653152,2024-06-13T18:35:19.777000
|
||||
CVE-2024-36234,0,0,645070bd989f5473e299da1272d252c4395fa62de0b3b9e3c6caa9b2dc88738e,2024-06-13T18:35:19.777000
|
||||
CVE-2024-36235,0,0,2f797f9105c486e0a04f74b29529501e36b59dfee3beab0a343db507b136826b,2024-06-13T18:35:19.777000
|
||||
@ -252408,9 +252409,11 @@ CVE-2024-36502,0,0,af0ea55ba6dbd08cf23c5f8732d2aeb0cf79fdfab13bdf5e07cadc4434254
|
||||
CVE-2024-36503,0,0,3aef981902bcd0cfa43896ed1ada7c9ec64d59690838f1ba35c268bf26e5218a,2024-06-17T12:42:04.623000
|
||||
CVE-2024-3652,0,0,455dabb71414a7592172807b25da69c5818ecc78456d9f87c63904d4c0988a33,2024-05-01T17:15:37.793000
|
||||
CVE-2024-36523,0,0,779ff20f3e54c54b68fa38cf8a73a6874fca821f18024ef38fb974b398395dd0,2024-06-13T18:36:09.010000
|
||||
CVE-2024-36527,1,1,2b0ce26462ddf4094a9f42ea54b908cbb2586dcbcfee6531e1c43b55113e0148,2024-06-17T18:15:16.767000
|
||||
CVE-2024-36528,0,0,f25edd031c479e2eb08ab34031d71804f3bb9f2a7bd4f1a1d0b25d391d002135,2024-06-10T18:06:22.600000
|
||||
CVE-2024-36531,0,0,991b1a5a568679e84b92f85516ddb5ed86f9e4a97046e45c71aa818ce6df4847,2024-06-10T18:06:22.600000
|
||||
CVE-2024-3654,0,0,954800a828ed246c147def14a6599156bd18a3e2cc72072dd62b0ab02b4bbf53,2024-04-19T16:19:49.043000
|
||||
CVE-2024-36543,1,1,d296ac07647444738f564112c0fbd0f6cdc70c839f2aad61af43a607bcbd5052,2024-06-17T19:15:58.353000
|
||||
CVE-2024-36547,0,0,6660ddee6e567c7988e43d4b24008e0896770307b9894b7b829c762e8a195005,2024-06-06T15:16:11.897000
|
||||
CVE-2024-36548,0,0,9d28d8e8972db5bd27a8a65faaafcca56f3bdf2175ddc670e3a757d6c577d105,2024-06-06T15:24:02.577000
|
||||
CVE-2024-36549,0,0,ede738893685493385854bf4f5b6680c7d976cf01bd2e0f64b85833020e8a996,2024-06-06T15:24:35.210000
|
||||
@ -252418,11 +252421,11 @@ CVE-2024-36550,0,0,affd201d52525b08fe9dc0ac43cf536ec50f780fc23bf861db62d86c798cf
|
||||
CVE-2024-36568,0,0,f6757785c01c43727d227a9340ded7869db334138c1e07644080e388c657d4de,2024-06-03T14:46:24.250000
|
||||
CVE-2024-36569,0,0,cc62a3b4fb5fe5cf7891883c6e12ba14de517f9765eb42867751af3c3e50f0ad,2024-06-03T14:46:24.250000
|
||||
CVE-2024-3657,0,0,e0e9aa98b4bfe8d4d80395efd4c4293865e72a7d88d35e61376b8312bdae8c3e,2024-06-12T10:15:31.447000
|
||||
CVE-2024-36573,1,1,750ebe45272a4f2bbd917f456a069d3e63271e35a219c08d85bf8093c0a0b6e5,2024-06-17T16:15:14.947000
|
||||
CVE-2024-36574,1,1,64bd9cd44e2422837b446ec1e39651bbbef09e30ab3a39b8f1b8b0361052792b,2024-06-17T16:15:15.040000
|
||||
CVE-2024-36575,1,1,ed36a3dda7699a6151615dd0f4a8ba608593c659559e706aa039085e6ab6425e,2024-06-17T16:15:15.140000
|
||||
CVE-2024-36577,1,1,701237de0aa421f725f50cae5349a1b7b236344f940da970bc8c4371b26d1374,2024-06-17T16:15:15.233000
|
||||
CVE-2024-36578,1,1,54d498d91b0b299bd1280e0e84877cbb031dddd415152caf68b05edc849f7e06,2024-06-17T16:15:15.333000
|
||||
CVE-2024-36573,0,0,750ebe45272a4f2bbd917f456a069d3e63271e35a219c08d85bf8093c0a0b6e5,2024-06-17T16:15:14.947000
|
||||
CVE-2024-36574,0,0,64bd9cd44e2422837b446ec1e39651bbbef09e30ab3a39b8f1b8b0361052792b,2024-06-17T16:15:15.040000
|
||||
CVE-2024-36575,0,0,ed36a3dda7699a6151615dd0f4a8ba608593c659559e706aa039085e6ab6425e,2024-06-17T16:15:15.140000
|
||||
CVE-2024-36577,0,0,701237de0aa421f725f50cae5349a1b7b236344f940da970bc8c4371b26d1374,2024-06-17T16:15:15.233000
|
||||
CVE-2024-36578,0,0,54d498d91b0b299bd1280e0e84877cbb031dddd415152caf68b05edc849f7e06,2024-06-17T16:15:15.333000
|
||||
CVE-2024-3658,0,0,788a6c57a5cc1d17a8f73184ec3f2bfe6dae89c54b4197447e7e87a36bebe3cf,2024-05-28T15:15:09.703000
|
||||
CVE-2024-36580,0,0,982f3c6e1a409feccad1e6cb4897a8a8d95dbec5c8d00651e139725a763f9359,2024-06-17T14:15:10.227000
|
||||
CVE-2024-36581,0,0,b0b55ea5afa036e7fb18c148b1b9ee7a2c8d7dd817cbe56e30c27abf908e433f,2024-06-17T15:15:51.130000
|
||||
@ -252615,6 +252618,7 @@ CVE-2024-3697,0,0,600d9314ffac8217c56b5ddb9a6dd8f383edc3a52ae15aefe26cd04d9d92b6
|
||||
CVE-2024-36970,0,0,7821872f33932cd23581e3f08933e1120512f95b8bffb9a221042f6e182c4c03,2024-06-10T02:52:08.267000
|
||||
CVE-2024-36971,0,0,7baf68ba8d6177e5c800107eb44bfd99f2323f2978ed8bf3a29a9bc948d8cb2e,2024-06-16T13:15:52.820000
|
||||
CVE-2024-36972,0,0,c8949e99c51cdd06e16d761976785fb3e8ba887f5070dbd12308139f2998e944,2024-06-16T13:15:52.947000
|
||||
CVE-2024-36973,1,1,aaf9d958c8593ac07f0f724040e3aeb13ad0df1753e4f68e9b0d677119862905,2024-06-17T18:15:17.043000
|
||||
CVE-2024-3698,0,0,13b4029eb6179dbe788598788e16556a1995d850ddfc4af1ee0c4e86961a3a21,2024-05-17T02:40:04.800000
|
||||
CVE-2024-3699,0,0,6e64dedcb1ec83e842b9c3ed18b374381a62ef4f7982a43d9405eeb95e55d0fc,2024-06-12T17:53:09.130000
|
||||
CVE-2024-3700,0,0,f1913b84964a9a87ca4f78bbad55a262819a35385e2c066c91eaa7c4a1891262,2024-06-12T17:51:52.710000
|
||||
@ -252785,6 +252789,10 @@ CVE-2024-37644,0,0,5f7f97e28e218e3fb348230aa8347ee3b0354d72853f4d6c2591e151f0231
|
||||
CVE-2024-37645,0,0,1f2d6a8f87fac13d3d11d6cbec3b695ad44ed6f32f14768d5b077122546347a3,2024-06-17T12:42:04.623000
|
||||
CVE-2024-3765,0,0,4fdba2eb80818b350bc57cc64ca06a70a8e5d2cec5cc9e99a6b5fff1df632742,2024-05-17T02:40:06.923000
|
||||
CVE-2024-3766,0,0,539824cbdfccc4276f1fd794b326f898c89140cb76877e5ae113fb2f5031330d,2024-05-17T02:40:07.027000
|
||||
CVE-2024-37661,1,1,8bc6987d1055de55d8b7876bf221b6ce9ec043a5b4bf1c22473fe955a3ac5ac2,2024-06-17T18:15:17.463000
|
||||
CVE-2024-37662,1,1,4ba16f654108e1192bd8fb8e8e02e50d6a91573173d812e9064b0a305d10e19b,2024-06-17T18:15:17.560000
|
||||
CVE-2024-37663,1,1,c85121604649b2156315c207a5ca6621b999521337716b02c686139e1ebe6456,2024-06-17T18:15:17.653000
|
||||
CVE-2024-37664,1,1,b106b1d8d5f840cb17425c36d7f75fda90045b9146be03e27cd1d2e215bc155f,2024-06-17T18:15:17.743000
|
||||
CVE-2024-37665,0,0,65120387c81349907f7a4a053373f743b497b218da3e8528d2288dae639dbb17,2024-06-13T18:36:09.010000
|
||||
CVE-2024-3767,0,0,8ba3fcd8961d67ee2d120eabc736772a73aa38bca02250a44c8bb4877d64b7d4,2024-06-05T20:15:13.643000
|
||||
CVE-2024-3768,0,0,778d3eea8bf87c1f80239f04628ed71cfd577dabb0ce88459344c4cd4d61bb16,2024-05-17T02:40:07.203000
|
||||
@ -252797,12 +252805,15 @@ CVE-2024-3775,0,0,a79253f4f0c7633f40fa5e33903553d0137ff03b4a2d8425a028bb5ddf1c6b
|
||||
CVE-2024-3776,0,0,55056178a3d988ca6f5c349416a81e65818f1f748e962aa89ca62657bc61cdbb,2024-04-15T13:15:31.997000
|
||||
CVE-2024-3777,0,0,2d62b43478a2af7b370a2abe8fef4e62ecbb9b40c3be97e2e0fc1ef910b6e9d4,2024-04-15T13:15:31.997000
|
||||
CVE-2024-3778,0,0,c2c38fcb38179fdb87f4043dc10c922f64da16bb588bfaf10dd1fb23e229fcc9,2024-04-15T13:15:31.997000
|
||||
CVE-2024-37794,1,1,b0474f9a1e34d4ce4f5843135972ccb449b5684509f30c70025ad198d2cbac13,2024-06-17T18:15:17.853000
|
||||
CVE-2024-37795,1,1,b55a1de597f46e87ebb5846214283b41513b4351794622c586104759dffc0de0,2024-06-17T18:15:17.953000
|
||||
CVE-2024-3780,0,0,d5287c65230cff026fcb8162b9ad15d2c7a6ec9085a2f226aaf7f4b5c5cee424,2024-04-15T13:15:31.997000
|
||||
CVE-2024-3781,0,0,bf710215509c2fb5fefd67fb85930537c2ce3a67160738297841ece3c75d6fc6,2024-04-15T19:12:25.887000
|
||||
CVE-2024-3782,0,0,c95ea596dccb3636dd3691321b5a7a48aa3ee2b08cd07f6f17f6b9ebb6c70325,2024-04-15T19:12:25.887000
|
||||
CVE-2024-3783,0,0,f916980cd1e532a7d588efc898e3b89c6684234f9d5fc7d911dee2ee73ce3295,2024-04-15T19:12:25.887000
|
||||
CVE-2024-37831,0,0,5e7eb1d81cbc03e5a6cb7a0c776550184a7e580655a65f67804199e93112edb2,2024-06-17T12:42:04.623000
|
||||
CVE-2024-3784,0,0,c3548262a5dd94ab612636409a3bf8cd74017da9deb24debb2f77536fe274623,2024-04-15T19:12:25.887000
|
||||
CVE-2024-37840,1,1,8453d99efeccde0568a082a5c426e56d812bc51b13eebf910ea641df056335c3,2024-06-17T19:15:58.470000
|
||||
CVE-2024-37848,0,0,88fe14869b9db882d345d58a87ca35c6cced9fdb08d49352f54bce8a27f6744a,2024-06-17T14:15:11.890000
|
||||
CVE-2024-37849,0,0,1c3bd85b42f72006ddc00210dee95fa2aec60a18f1d79fbfdd90f35c19fff4ef,2024-06-13T18:35:19.777000
|
||||
CVE-2024-3785,0,0,fc93f2e321d044bf7a0ccc45f351722880d9f0bf94368b28b702ab59c5cb3144,2024-04-15T19:12:25.887000
|
||||
@ -252873,7 +252884,7 @@ CVE-2024-3834,0,0,a6e69ceb5a64ba9dfba23cdfa4c02e2549bf746772815229f9a627159689f7
|
||||
CVE-2024-3837,0,0,5046b04f6fff161407832d91f839d6c01f3dcf30bcf75f620bfd7221b5de1c27,2024-05-03T03:16:29.010000
|
||||
CVE-2024-3838,0,0,bd55ca068ebe4472845bce1f3d037932d27279da54b129864c942318cbf6c399,2024-04-23T18:15:15.410000
|
||||
CVE-2024-3839,0,0,5078cfd1c7c68c41b30fd8b0c9c6a095120ec81bc8166ccecb75ba3c8be530b5,2024-05-03T04:15:09.127000
|
||||
CVE-2024-38394,0,1,e137788f2ebaaff770e93d05b803eb38e4472ac7dca49b0dd757c03a760061e9,2024-06-17T16:15:15.823000
|
||||
CVE-2024-38394,0,0,e137788f2ebaaff770e93d05b803eb38e4472ac7dca49b0dd757c03a760061e9,2024-06-17T16:15:15.823000
|
||||
CVE-2024-38395,0,0,d27ba93e3eeea55e9457aaa415d612188b65281d83702a0692924b8f50b6f403,2024-06-17T15:15:51.900000
|
||||
CVE-2024-38396,0,0,bffab7577ddd6f3e534c9843cfe717401724eb3ef56d29d3dd43a2efef3ab79d,2024-06-17T15:15:52.007000
|
||||
CVE-2024-3840,0,0,403182a28ab5f4c1d5b284d35c53f5335d4c6aac194c57fd7d723522380d6b0f,2024-05-03T03:16:29.067000
|
||||
@ -252887,6 +252898,7 @@ CVE-2024-38440,0,0,b919acbc92e9c9392e26fbdaceae56c4317599ffd0627bbda82f22f6097b7
|
||||
CVE-2024-38441,0,0,bac1eab90c37fda11684866d06a4f57eec334e75a348551333a4b5d69541732d,2024-06-17T12:42:04.623000
|
||||
CVE-2024-38443,0,0,1d75cfa177cf692b67a12f7bd5c673225dc4008379121d75b6d5d0686ab9a220,2024-06-17T12:42:04.623000
|
||||
CVE-2024-38448,0,0,66ae408cb06bbe5b04615772f5468e0f5bb5c8f2d46df318fd238e60dfb550e8,2024-06-17T12:42:04.623000
|
||||
CVE-2024-38449,1,1,bfe3d44cc91ccbcb53fd85e23fea8d11b89236c24e32b2201e2a397ac6ed1755,2024-06-17T19:15:58.567000
|
||||
CVE-2024-3845,0,0,0eb4004f99da1c2122444a8d1de5d3db39129e713bf386d7b60bb455af744c00,2024-05-03T03:16:29.210000
|
||||
CVE-2024-38454,0,0,9e16cbeba5810d367094a131b56862641aa42d77b0ed4c90d4e4d7e92bb854dc,2024-06-17T12:42:04.623000
|
||||
CVE-2024-38457,0,0,c77550a7e2a9252924a4646a20696a029639d1882dc30abb38808d48a175ba0c,2024-06-17T12:42:04.623000
|
||||
@ -252930,7 +252942,7 @@ CVE-2024-3872,0,0,1b0df76ddcb9ce5edde75b1c572a6253db6bd37bbe91d1899bdf2bd4ba86a6
|
||||
CVE-2024-3873,0,0,6d513ad90fbcf7cf9dc14bccfe49c3692f3f8e6afa6f4dd6471e0cb11781355f,2024-05-17T02:40:09.627000
|
||||
CVE-2024-3874,0,0,0b044f7635c5f6b9eeb150631f42de7f29fc07a4ea0b0fc3596a05b97253f25a,2024-06-04T19:20:25.697000
|
||||
CVE-2024-3875,0,0,d86045281a0b2a48da23b56cded5d23c73cf1b0cfc400db0bc7b27c6cb21977e,2024-06-04T19:20:25.807000
|
||||
CVE-2024-3876,0,0,3ffb00498ec144bea36e257d072208e6ad89fa56264da7a2bc823c35d1e51c3e,2024-05-17T02:40:09.910000
|
||||
CVE-2024-3876,0,1,776837fb0cf9eeaf7d3ba120d8dcf4cad0f43e38d62b6ec13c079af103a4cf3c,2024-06-17T19:15:58.763000
|
||||
CVE-2024-3877,0,0,f24faee79076d9955b33c716cc38fff1084b5ee3b430064cdc16beb5bbd9e5c2,2024-06-04T19:20:25.903000
|
||||
CVE-2024-3878,0,0,fb95502da03faec460d17c9b1242297f4e8658270dcfc3f37876da58c73c1ed8,2024-05-17T02:40:10.087000
|
||||
CVE-2024-3879,0,0,92774dc7ea0cffc72f06608ad0c5ab32112431972595f4ffa950315fc44f5141,2024-05-17T02:40:10.177000
|
||||
@ -253037,7 +253049,7 @@ CVE-2024-4026,0,0,9eff728af4fb17cd0b046ae2444303f230bc7685cadbda3feb2bd1007c7666
|
||||
CVE-2024-4029,0,0,afc8def3dff015c790bb6f1fba36f8919ca09d0c14ec4f09004e6bb6d31f1058,2024-05-02T18:00:37.360000
|
||||
CVE-2024-4030,0,0,c7e71f4aa9c8e1fed63372a5ecebe14dddf19d5400caf27393d092efafbf0f25,2024-06-13T20:15:15.570000
|
||||
CVE-2024-4031,0,0,4baeaad68cf3411bf45d41e53c64aca0aa19dc8cf620cd2c5028b0d61a50ba2c,2024-04-23T12:52:09.397000
|
||||
CVE-2024-4032,0,1,d0d257207889b4eecfe2d9b86254c88f2507af7db1ab54d252a04dd631276d78,2024-06-17T16:15:15.923000
|
||||
CVE-2024-4032,0,1,03894ea0efe4adf33eae6b6c4a5d257a2cf4187fd23c9230c41cf9b02106eb41,2024-06-17T18:15:18.047000
|
||||
CVE-2024-4033,0,0,9c08f15b4d3308634dd41e6afc3001fb3d24483554aaa58982323fa330ce651a,2024-05-02T18:00:37.360000
|
||||
CVE-2024-4034,0,0,fbbc9986eba42f39f504e14d62a8f5aac7c2749ef90d02af8ad89eb5ef4d1cca,2024-05-02T18:00:37.360000
|
||||
CVE-2024-4035,0,0,02906ca1b496a2e42ac8610e4dfcaad284409da5fa1faeb0fe6ebb26c1e7ae4c,2024-04-25T13:18:02.660000
|
||||
@ -253465,7 +253477,7 @@ CVE-2024-4580,0,0,8eea2c6efcadf197a7eb186820cafc4d96f736bb0925ed6e0f257f524d44d9
|
||||
CVE-2024-4581,0,0,76d80edc646ff1ece35896e94283319c4ca53356d1c75c256f7ea9adb85effeb,2024-06-04T16:57:41.053000
|
||||
CVE-2024-4582,0,0,57ac27f8923e8821e7b5fca55d7f50b9c8dfb5b34f58112cdd2a2c6b3dee9eda,2024-06-04T19:20:42.750000
|
||||
CVE-2024-4583,0,0,af5c6d7dbc7d13aa7121157e641c0ae3611565803aa3301ac8e05cd3822a0f3f,2024-06-04T19:20:42.857000
|
||||
CVE-2024-4584,0,0,5cc4bd69de02a428a216cf477da396eed0ceee2068ee260705e0843596d3709b,2024-05-17T02:40:28.903000
|
||||
CVE-2024-4584,0,1,2c31e3bc8c7d2e9efeb129c1e82a2bc8338879f33d908a6721a12b1a62670c07,2024-06-17T19:15:58.903000
|
||||
CVE-2024-4585,0,0,c1224862b2da0bb957015fb054dced4793091e8e3aa3caac8ee5575edd00f689,2024-05-17T02:40:28.993000
|
||||
CVE-2024-4586,0,0,38a9d7726156e11be76063fc1f3a10ac00b9f19e5c3bba2254b1b06e6ca2fe78,2024-06-04T19:20:42.953000
|
||||
CVE-2024-4587,0,0,fa4f2e1af7adbbcc9d9c59a2f010e851c5b64f5ba18ad37f1ca2351cf22dc751,2024-06-04T19:20:43.057000
|
||||
@ -253476,7 +253488,7 @@ CVE-2024-4591,0,0,5c6d761a32eee493d547c5d2d22181949ad1190c4454a55e9aa89efeef0df5
|
||||
CVE-2024-4592,0,0,d8ebb8994c326e045a4e9c2becb1e92e01af61dca4ec82dd53c50e1797fca86a,2024-06-04T19:20:43.560000
|
||||
CVE-2024-4593,0,0,6e92f7e409d392375aadb61ac84c9d714f33b7bdac01d896f8d5f1cdac91a9de,2024-05-17T02:40:29.730000
|
||||
CVE-2024-4594,0,0,bcffb9fcfeaac22cc37f5dc48e830b7d71c5ce449d6ef0e481ff78f48d7fa487,2024-06-04T19:20:43.657000
|
||||
CVE-2024-4595,0,0,e1f0239e7c8c7d7f2d01d9453f16240c9ec1f7610773ad65617e8a00b9791f08,2024-05-17T02:40:29.900000
|
||||
CVE-2024-4595,0,1,5d35ea8ef48c2a80f961b57f311ad01654ad75218ac9d7f0e09b8afbb41ffd76,2024-06-17T19:15:59.063000
|
||||
CVE-2024-4596,0,0,2294c5641ac537fa71a7ad1878bc97e3f6060d0b2f74841053ecc03b64d14796,2024-06-04T19:20:43.750000
|
||||
CVE-2024-4597,0,0,49317a4ff12c60e573c38172dad46b390f6c4e67b3d1cb7027306fe91fd78a96,2024-05-14T16:11:39.510000
|
||||
CVE-2024-4599,0,0,7a2dd9d366beb25d47b0c05043c7c832d7abfddbca078d457eae393ffc0c13b9,2024-05-07T13:39:32.710000
|
||||
@ -253891,7 +253903,7 @@ CVE-2024-5202,0,0,b978a5507939d8449bc120b0c8b4b839304f46efdad98898b1b0c13e65a259
|
||||
CVE-2024-5203,0,0,c1cbddceebcc79a6f3361ec6d421c84f7c0d786eefdc42d89301f7f288b04ff8,2024-06-13T18:36:09.010000
|
||||
CVE-2024-5204,0,0,f5f46d30f5f5fcefc4a351787eb0bfde8706d10be20e1d771d5abcd1008399a0,2024-05-29T13:02:09.280000
|
||||
CVE-2024-5205,0,0,cb36ec671fed104039900e6835467ad487e54c052bb39844cd3bc6979a6fc551,2024-05-24T13:03:11.993000
|
||||
CVE-2024-5206,0,0,73dc1557678ce087f5c1e63776734ddb4d7a6705a0a233c56c02c986ee49a3f2,2024-06-07T14:56:05.647000
|
||||
CVE-2024-5206,0,1,dfdbb2d2210fa9604e6469b5345cbda30a0f0ae57d39e7dfc070825e6f931647,2024-06-17T19:15:59.190000
|
||||
CVE-2024-5207,0,0,837facf8fac5843bbf7aea1ce36fa00287f1ba077f8fbca1302b0ab4087ec522,2024-05-30T13:15:41.297000
|
||||
CVE-2024-5211,0,0,a4277f26aaa565cc417eac86a473b48ddc12386cf29490b9b3d30644e664c347,2024-06-13T18:36:09.010000
|
||||
CVE-2024-5214,0,0,77a86526714522a20940695733fe46b4562089752d3c663cf289b583b7c6bbda,2024-06-03T19:15:09.360000
|
||||
@ -254157,7 +254169,7 @@ CVE-2024-5673,0,0,f6db27a8b7c99bb0a58922425d96edcb461eeb527f78adfd8d9aed9c993301
|
||||
CVE-2024-5674,0,0,69b0f5cdcc6414c1b3093ac76e322fc42e17eb869b8f1b328084f458395232cf,2024-06-13T18:36:09.010000
|
||||
CVE-2024-5675,0,0,c04fc1bf8ef6e3f232c30ddf0bd6a524958c9eab63fe205331e1fedef14ccf13,2024-06-11T18:14:02.017000
|
||||
CVE-2024-5684,0,0,e183f6f3c944efddc1281bf86b4d20b3677f4c3ab127fc0c8f4bc522f6d9ba19,2024-06-11T18:13:30.163000
|
||||
CVE-2024-5685,0,1,257471c489e6c7ec6ff319f90eba7250ec0d4d2012a928dee23a25d060b8207a,2024-06-17T17:15:51.953000
|
||||
CVE-2024-5685,0,0,257471c489e6c7ec6ff319f90eba7250ec0d4d2012a928dee23a25d060b8207a,2024-06-17T17:15:51.953000
|
||||
CVE-2024-5687,0,0,b3163ba80d711118288940f35942362f888184d516eedb8a121f43c8b6e99d13,2024-06-11T13:54:12.057000
|
||||
CVE-2024-5688,0,0,69d8cc15e435db53520a0b374c51ddee2a4c9131e86d6c869cac04768cb98c0c,2024-06-13T23:15:50.490000
|
||||
CVE-2024-5689,0,0,43d9e6c4643e481c8669e8de5c0cdbeeb708721474986d0f913b6c90e34aa5bd,2024-06-11T13:54:12.057000
|
||||
@ -254264,11 +254276,11 @@ CVE-2024-5994,0,0,4500c2f9d4ec1d929f4458a662d4e7cd25de0141c193b0c70f561f594ccb4e
|
||||
CVE-2024-5995,0,0,67a672f2d3fe90ec8a165b5b2ee31107e504c6b0bf47d01a6d89c94b17eb466b,2024-06-17T12:42:04.623000
|
||||
CVE-2024-5996,0,0,ba461b354a3c080322d9eafe20058e5b8ad775b3a576a51cb3132f1460376b12,2024-06-17T12:42:04.623000
|
||||
CVE-2024-6000,0,0,0ff462c0caa473d2d22369f17245008287579ea4d11142b6bd58096cee0f0a24,2024-06-17T12:42:04.623000
|
||||
CVE-2024-6003,0,1,b131c1a3ce53221548e1c2dcb514a1b9de3ce76a63a09d413211db357f68afbb,2024-06-17T16:15:16.027000
|
||||
CVE-2024-6003,0,0,b131c1a3ce53221548e1c2dcb514a1b9de3ce76a63a09d413211db357f68afbb,2024-06-17T16:15:16.027000
|
||||
CVE-2024-6005,0,0,a7bc5c4f4cd88e8249073eafda5ed4e6ca28a19996b852f459661e5530c10396,2024-06-17T12:42:04.623000
|
||||
CVE-2024-6006,0,0,9edb8ca4c0dd0d4558b143fb832fc42b328bff9f4b383b9f92efc4408ae0b0ca,2024-06-17T15:15:52.693000
|
||||
CVE-2024-6007,0,0,10a5bf7c2814f8c45b29a7830a1e182f887cf45831b7092d81e48bb44ca9bf15,2024-06-17T12:42:04.623000
|
||||
CVE-2024-6008,0,1,c91774daf5e01f51e3ed230da10d811f428be9da4023af41a23643597eb98c00,2024-06-17T16:15:16.140000
|
||||
CVE-2024-6008,0,0,c91774daf5e01f51e3ed230da10d811f428be9da4023af41a23643597eb98c00,2024-06-17T16:15:16.140000
|
||||
CVE-2024-6009,0,0,468577c4db742932e2254bcba365ac1e04c74b564538fb241a46994d66ec19d6,2024-06-17T12:42:04.623000
|
||||
CVE-2024-6013,0,0,44159fdbcbcac2a689071de339f13c4fefa84302df10ce908aefe802918d324e,2024-06-17T12:42:04.623000
|
||||
CVE-2024-6014,0,0,6f42b027c41cbc2bef7f3eccd4ed3d2b0646bd4a1028da377690698f14644291,2024-06-17T12:42:04.623000
|
||||
@ -254284,4 +254296,7 @@ CVE-2024-6046,0,0,a5ace0bbdf0f368d76efea99e17761b90d722a7f8fb2cd5b11d6c7027f5ee4
|
||||
CVE-2024-6047,0,0,4cdf0f1acff12373f8f857c8d442b9de2221d44745323cc3f60bf66bccd7a239,2024-06-17T14:15:13.040000
|
||||
CVE-2024-6048,0,0,03e9485ef23720c113f11fed6c539200d9a1624e025ca24798cddf9d0c1a9e3b,2024-06-17T12:42:04.623000
|
||||
CVE-2024-6055,0,0,93ffb465c6acddf15e4142ae2e8b4bcae95c7241e5f24a2dedc05f862f5d2e79,2024-06-17T13:15:53.697000
|
||||
CVE-2024-6056,1,1,636228dd1a2c8f5c63676f25cc803d23af23082b986789068b58dd9fd2a57ea9,2024-06-17T18:15:18.143000
|
||||
CVE-2024-6057,0,0,cfabce49b9db224e3720b6479e81ee1edcd2fcbaabb39bed0063a52236765ccd,2024-06-17T13:15:53.800000
|
||||
CVE-2024-6058,1,1,3ee08d4ad26cf88da329a5e1271ed474432fcbd63bb5792a008ded1da8686681,2024-06-17T18:15:18.520000
|
||||
CVE-2024-6059,1,1,8dc3785d03b4bbf495bb7b9e0db50afd358453b35356b7519dfcb40c8d9c6a71,2024-06-17T19:15:59.467000
|
||||
|
Can't render this file because it is too large.
|
Loading…
x
Reference in New Issue
Block a user