mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-05-08 19:47:09 +00:00
Auto-Update: 2024-06-10T14:00:49.285568+00:00
This commit is contained in:
parent
a3472994e7
commit
e4779598a0
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2021-37147",
|
||||
"sourceIdentifier": "security@apache.org",
|
||||
"published": "2021-11-03T16:15:07.987",
|
||||
"lastModified": "2024-02-09T02:28:42.050",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2024-06-10T13:15:49.490",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -65,7 +65,7 @@
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"source": "security@apache.org",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
@ -79,12 +79,16 @@
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "security@apache.org",
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-20"
|
||||
},
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-444"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-0596",
|
||||
"sourceIdentifier": "security@wordfence.com",
|
||||
"published": "2024-02-10T07:15:08.700",
|
||||
"lastModified": "2024-02-16T21:34:53.293",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2024-06-10T13:15:49.863",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -17,7 +17,7 @@
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"source": "security@wordfence.com",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
@ -37,18 +37,18 @@
|
||||
"impactScore": 1.4
|
||||
},
|
||||
{
|
||||
"source": "security@wordfence.com",
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "LOW",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 5.3,
|
||||
"baseSeverity": "MEDIUM"
|
||||
|
44
CVE-2024/CVE-2024-12xx/CVE-2024-1228.json
Normal file
44
CVE-2024/CVE-2024-12xx/CVE-2024-1228.json
Normal file
@ -0,0 +1,44 @@
|
||||
{
|
||||
"id": "CVE-2024-1228",
|
||||
"sourceIdentifier": "cvd@cert.pl",
|
||||
"published": "2024-06-10T12:15:09.430",
|
||||
"lastModified": "2024-06-10T12:40:41.360",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Use of hard-coded password to the patients' database allows an attacker to retrieve sensitive data stored in the database. The password is the same among all Eurosoft Przychodnia installations.\n\nThis issue affects Eurosoft Przychodnia software before\u00a0version\u00a020240417.001 (from that version vulnerability is fixed)."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "El uso de una contrase\u00f1a codificada para la base de datos de los pacientes permite a un atacante recuperar datos confidenciales almacenados en la base de datos. La contrase\u00f1a es la misma en todas las instalaciones de Eurosoft Przychodnia. Este problema afecta al software Eurosoft Przychodnia antes de la versi\u00f3n 20240417.001 (a partir de esa versi\u00f3n se soluciona la vulnerabilidad)."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "cvd@cert.pl",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-798"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://cert.pl/en/posts/2024/06/CVE-2024-1228/",
|
||||
"source": "cvd@cert.pl"
|
||||
},
|
||||
{
|
||||
"url": "https://cert.pl/posts/2024/06/CVE-2024-1228/",
|
||||
"source": "cvd@cert.pl"
|
||||
},
|
||||
{
|
||||
"url": "https://www.eurosoft.com.pl/eurosoft-przychodnia",
|
||||
"source": "cvd@cert.pl"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,12 +2,16 @@
|
||||
"id": "CVE-2024-21751",
|
||||
"sourceIdentifier": "audit@patchstack.com",
|
||||
"published": "2024-06-10T08:15:47.603",
|
||||
"lastModified": "2024-06-10T08:15:47.603",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-06-10T12:40:41.360",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Missing Authorization vulnerability in RabbitLoader.This issue affects RabbitLoader: from n/a through 2.19.13."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Vulnerabilidad de autorizaci\u00f3n faltante en RabbitLoader. Este problema afecta a RabbitLoader: desde n/a hasta 2.19.13."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
|
@ -2,12 +2,16 @@
|
||||
"id": "CVE-2024-22296",
|
||||
"sourceIdentifier": "audit@patchstack.com",
|
||||
"published": "2024-06-10T08:15:48.017",
|
||||
"lastModified": "2024-06-10T08:15:48.017",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-06-10T12:40:41.360",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Missing Authorization vulnerability in Code for Recovery 12 Step Meeting List.This issue affects 12 Step Meeting List: from n/a through 3.14.28."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Vulnerabilidad de autorizaci\u00f3n faltante en Code for Recovery 12 Step Meeting List. Este problema afecta a la lista de reuniones de 12 pasos: desde n/a hasta 3.14.28."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
|
@ -2,12 +2,16 @@
|
||||
"id": "CVE-2024-22298",
|
||||
"sourceIdentifier": "audit@patchstack.com",
|
||||
"published": "2024-06-10T08:15:48.253",
|
||||
"lastModified": "2024-06-10T08:15:48.253",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-06-10T12:40:41.360",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Missing Authorization vulnerability in TMS Amelia ameliabooking.This issue affects Amelia: from n/a through 1.0.98."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Vulnerabilidad de falta de autorizaci\u00f3n en TMS Amelia ameliabooking. Este problema afecta a Amelia: desde n/a hasta 1.0.98."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
|
@ -2,12 +2,16 @@
|
||||
"id": "CVE-2024-23524",
|
||||
"sourceIdentifier": "audit@patchstack.com",
|
||||
"published": "2024-06-10T08:15:48.483",
|
||||
"lastModified": "2024-06-10T08:15:48.483",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-06-10T12:40:41.360",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Missing Authorization vulnerability in ONTRAPORT Inc. PilotPress.This issue affects PilotPress: from n/a through 2.0.30."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Vulnerabilidad de autorizaci\u00f3n faltante en ONTRAPORT Inc. PilotPress. Este problema afecta a PilotPress: desde n/a hasta 2.0.30."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
|
@ -2,12 +2,12 @@
|
||||
"id": "CVE-2024-27936",
|
||||
"sourceIdentifier": "security-advisories@github.com",
|
||||
"published": "2024-03-21T02:52:22.813",
|
||||
"lastModified": "2024-03-21T12:58:51.093",
|
||||
"lastModified": "2024-06-10T13:15:50.197",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Deno is a JavaScript, TypeScript, and WebAssembly runtime with secure defaults. Starting in version 1.32.1 and prior to version 1.41 of the deno_runtime library, maliciously crafted permission request can show the spoofed permission prompt by inserting a broken ANSI escape sequence into the request contents. Deno is stripping any ANSI escape sequences from the permission prompt, but permissions given to the program are based on the contents that contain the ANSI escape sequences. Any Deno program can spoof the content of the interactive permission prompt by inserting a broken ANSI code, which allows a malicious Deno program to display the wrong file path or program name to the user. Version 1.41 of the deno_runtime library contains a patch for the issue."
|
||||
"value": "Deno is a JavaScript, TypeScript, and WebAssembly runtime with secure defaults. Starting in version 1.32.1 and prior to version 1.41.0 of the deno library, maliciously crafted permission request can show the spoofed permission prompt by inserting a broken ANSI escape sequence into the request contents. Deno is stripping any ANSI escape sequences from the permission prompt, but permissions given to the program are based on the contents that contain the ANSI escape sequences. Any Deno program can spoof the content of the interactive permission prompt by inserting a broken ANSI code, which allows a malicious Deno program to display the wrong file path or program name to the user. Version 1.41.0 of the deno library contains a patch for the issue."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
|
59
CVE-2024/CVE-2024-288xx/CVE-2024-28833.json
Normal file
59
CVE-2024/CVE-2024-288xx/CVE-2024-28833.json
Normal file
@ -0,0 +1,59 @@
|
||||
{
|
||||
"id": "CVE-2024-28833",
|
||||
"sourceIdentifier": "security@checkmk.com",
|
||||
"published": "2024-06-10T12:15:09.927",
|
||||
"lastModified": "2024-06-10T12:40:41.360",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Improper restriction of excessive authentication attempts with two factor authentication methods in Checkmk 2.3 before 2.3.0p6 facilitates brute-forcing of second factor mechanisms."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "La restricci\u00f3n inadecuada de intentos de autenticaci\u00f3n excesivos con m\u00e9todos de autenticaci\u00f3n de dos factores en Checkmk 2.3 anterior a 2.3.0p6 facilita la fuerza bruta de los mecanismos de segundo factor."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security@checkmk.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "HIGH",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 5.9,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.2,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security@checkmk.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-307"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://checkmk.com/werk/16830",
|
||||
"source": "security@checkmk.com"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,12 +2,16 @@
|
||||
"id": "CVE-2024-35717",
|
||||
"sourceIdentifier": "audit@patchstack.com",
|
||||
"published": "2024-06-10T08:15:48.723",
|
||||
"lastModified": "2024-06-10T08:15:48.723",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-06-10T12:40:41.360",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Missing Authorization vulnerability in A WP Life Media Slider \u2013 Photo Sleder, Video Slider, Link Slider, Carousal Slideshow.This issue affects Media Slider \u2013 Photo Sleder, Video Slider, Link Slider, Carousal Slideshow: from n/a through 1.3.9."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Vulnerabilidad de autorizaci\u00f3n faltante en A WP Life Media Slider: Photo Sleder, Video Slider, Link Slider, Carousal Slideshow. Este problema afecta a Media Slider: Photo Sleder, Video Slider, Link Slider, Carousal Slideshow: desde n/a hasta 1.3.9."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
|
@ -2,12 +2,16 @@
|
||||
"id": "CVE-2024-35720",
|
||||
"sourceIdentifier": "audit@patchstack.com",
|
||||
"published": "2024-06-10T08:15:48.950",
|
||||
"lastModified": "2024-06-10T08:15:48.950",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-06-10T12:40:41.360",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Missing Authorization vulnerability in A WP Life Album Gallery \u2013 WordPress Gallery.This issue affects Album Gallery \u2013 WordPress Gallery: from n/a through 1.5.7."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Vulnerabilidad de autorizaci\u00f3n faltante en A WP Life Album Gallery \u2013 WordPress Gallery. Este problema afecta a la Galer\u00eda de \u00e1lbumes \u2013 Galer\u00eda de WordPress: desde n/a hasta 1.5.7."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
|
@ -2,12 +2,16 @@
|
||||
"id": "CVE-2024-35721",
|
||||
"sourceIdentifier": "audit@patchstack.com",
|
||||
"published": "2024-06-10T08:15:49.180",
|
||||
"lastModified": "2024-06-10T08:15:49.180",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-06-10T12:40:41.360",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Missing Authorization vulnerability in A WP Life Image Gallery \u2013 Lightbox Gallery, Responsive Photo Gallery, Masonry Gallery.This issue affects Image Gallery \u2013 Lightbox Gallery, Responsive Photo Gallery, Masonry Gallery: from n/a through 1.4.5."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Vulnerabilidad de autorizaci\u00f3n faltante en A WP Life Image Gallery: Lightbox Gallery, Responsive Photo Gallery, Masonry Gallery. Este problema afecta a la Galer\u00eda de im\u00e1genes: Lightbox Gallery, Responsive Photo Gallery, Masonry Gallery: desde n/a hasta 1.4.5."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
|
@ -2,12 +2,16 @@
|
||||
"id": "CVE-2024-35722",
|
||||
"sourceIdentifier": "audit@patchstack.com",
|
||||
"published": "2024-06-10T08:15:49.400",
|
||||
"lastModified": "2024-06-10T08:15:49.400",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-06-10T12:40:41.360",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Missing Authorization vulnerability in A WP Life Slider Responsive Slideshow \u2013 Image slider, Gallery slideshow.This issue affects Slider Responsive Slideshow \u2013 Image slider, Gallery slideshow: from n/a through 1.4.0."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Vulnerabilidad de falta de autorizaci\u00f3n en A WP Life Slider Responsive Slideshow \u2013 Image slider, Gallery slideshow. Este problema afecta a una presentaci\u00f3n de diapositivas adaptable al control deslizante: control deslizante de im\u00e1genes, presentaci\u00f3n de diapositivas de la galer\u00eda: desde n/a hasta 1.4.0."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
|
@ -2,12 +2,16 @@
|
||||
"id": "CVE-2024-35723",
|
||||
"sourceIdentifier": "audit@patchstack.com",
|
||||
"published": "2024-06-10T08:15:49.627",
|
||||
"lastModified": "2024-06-10T08:15:49.627",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-06-10T12:40:41.360",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Missing Authorization vulnerability in Andrew Rapps Dashboard To-Do List.This issue affects Dashboard To-Do List: from n/a through 1.2.0."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Vulnerabilidad de autorizaci\u00f3n faltante en Andrew Rapps Dashboard To-Do List. Este problema afecta la lista de tareas pendientes del panel: desde n/a hasta 1.2.0."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
|
@ -2,12 +2,16 @@
|
||||
"id": "CVE-2024-35724",
|
||||
"sourceIdentifier": "audit@patchstack.com",
|
||||
"published": "2024-06-10T08:15:49.853",
|
||||
"lastModified": "2024-06-10T08:15:49.853",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-06-10T12:40:41.360",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Missing Authorization vulnerability in Bosa Themes Bosa Elementor Addons and Templates for WooCommerce.This issue affects Bosa Elementor Addons and Templates for WooCommerce: from n/a through 1.0.12."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Vulnerabilidad de autorizaci\u00f3n faltante en Bosa Themes Bosa Elementor Addons and Templates for WooCommerce. Este problema afecta a los complementos y plantillas de Bosa Elementor para WooCommerce: desde n/a hasta 1.0.12."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
|
@ -2,12 +2,16 @@
|
||||
"id": "CVE-2024-35725",
|
||||
"sourceIdentifier": "audit@patchstack.com",
|
||||
"published": "2024-06-10T08:15:50.130",
|
||||
"lastModified": "2024-06-10T08:15:50.130",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-06-10T12:40:41.360",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Missing Authorization vulnerability in LA-Studio LA-Studio Element Kit for Elementor.This issue affects LA-Studio Element Kit for Elementor: from n/a through 1.3.6."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Vulnerabilidad de autorizaci\u00f3n faltante en LA-Studio LA-Studio Element Kit para Elementor. Este problema afecta a LA-Studio Element Kit para Elementor: desde n/a hasta 1.3.6."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
|
@ -2,12 +2,16 @@
|
||||
"id": "CVE-2024-35726",
|
||||
"sourceIdentifier": "audit@patchstack.com",
|
||||
"published": "2024-06-10T08:15:50.370",
|
||||
"lastModified": "2024-06-10T08:15:50.370",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-06-10T12:40:41.360",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Missing Authorization vulnerability in ThemeKraft WooBuddy.This issue affects WooBuddy: from n/a through 3.4.19."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Vulnerabilidad de autorizaci\u00f3n faltante en ThemeKraft WooBuddy. Este problema afecta a WooBuddy: desde n/a hasta 3.4.19."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
|
@ -2,12 +2,16 @@
|
||||
"id": "CVE-2024-35727",
|
||||
"sourceIdentifier": "audit@patchstack.com",
|
||||
"published": "2024-06-10T08:15:50.600",
|
||||
"lastModified": "2024-06-10T08:15:50.600",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-06-10T12:40:41.360",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Missing Authorization vulnerability in actpro Extra Product Options for WooCommerce.This issue affects Extra Product Options for WooCommerce: from n/a through 3.0.6."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Vulnerabilidad de autorizaci\u00f3n faltante en actpro Extra Product Options for WooCommerce. Este problema afecta a las opciones de productos adicionales para WooCommerce: desde n/a hasta 3.0.6."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
|
@ -2,12 +2,16 @@
|
||||
"id": "CVE-2024-35729",
|
||||
"sourceIdentifier": "audit@patchstack.com",
|
||||
"published": "2024-06-10T08:15:50.820",
|
||||
"lastModified": "2024-06-10T08:15:50.820",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-06-10T12:40:41.360",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Missing Authorization vulnerability in Tickera.This issue affects Tickera: from n/a through 3.5.2.6."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Vulnerabilidad de autorizaci\u00f3n faltante en Tickera. Este problema afecta a Tickera: desde n/a hasta 3.5.2.6."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
|
@ -2,12 +2,16 @@
|
||||
"id": "CVE-2024-35735",
|
||||
"sourceIdentifier": "audit@patchstack.com",
|
||||
"published": "2024-06-10T08:15:51.053",
|
||||
"lastModified": "2024-06-10T08:15:51.053",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-06-10T12:40:41.360",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Missing Authorization vulnerability in CodePeople WP Time Slots Booking Form.This issue affects WP Time Slots Booking Form: from n/a through 1.2.11."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Vulnerabilidad de autorizaci\u00f3n faltante en CodePeople WP Time Slots Booking Form. Este problema afecta al formulario de reserva de franjas horarias de WP: desde n/a hasta 1.2.11."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
|
@ -2,12 +2,16 @@
|
||||
"id": "CVE-2024-35741",
|
||||
"sourceIdentifier": "audit@patchstack.com",
|
||||
"published": "2024-06-10T08:15:51.277",
|
||||
"lastModified": "2024-06-10T08:15:51.277",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-06-10T12:40:41.360",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Missing Authorization vulnerability in Awesome Support Team Awesome Support.This issue affects Awesome Support: from n/a through 6.1.7."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Vulnerabilidad de autorizaci\u00f3n faltante en Awesome Support Team Awesome Support. Este problema afecta a Awesome Support: desde n/a hasta 6.1.7."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
|
@ -2,12 +2,16 @@
|
||||
"id": "CVE-2024-35742",
|
||||
"sourceIdentifier": "audit@patchstack.com",
|
||||
"published": "2024-06-10T08:15:51.507",
|
||||
"lastModified": "2024-06-10T08:15:51.507",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-06-10T12:40:41.360",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Missing Authorization vulnerability in Code Parrots Easy Forms for Mailchimp.This issue affects Easy Forms for Mailchimp: from n/a through 6.9.0."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Vulnerabilidad de autorizaci\u00f3n faltante en Code Parrots Easy Forms para Mailchimp. Este problema afecta a Easy Forms para Mailchimp: desde n/a hasta 6.9.0."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
|
71
CVE-2024/CVE-2024-364xx/CVE-2024-36405.json
Normal file
71
CVE-2024/CVE-2024-364xx/CVE-2024-36405.json
Normal file
@ -0,0 +1,71 @@
|
||||
{
|
||||
"id": "CVE-2024-36405",
|
||||
"sourceIdentifier": "security-advisories@github.com",
|
||||
"published": "2024-06-10T13:15:50.700",
|
||||
"lastModified": "2024-06-10T13:15:50.700",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "liboqs is a C-language cryptographic library that provides implementations of post-quantum cryptography algorithms. A control-flow timing lean has been identified in the reference implementation of the Kyber key encapsulation mechanism when it is compiled with Clang 15-18 for `-Os`, `-O1`, and other compilation options. A proof-of-concept local attack on the reference implementation leaks the entire ML-KEM 512 secret key in ~10 minutes using end-to-end decapsulation timing measurements. The issue has been fixed in version 0.10.1. As a possible workaround, some compiler options may produce vectorized code that does not leak secret information, however relying on these compiler options as a workaround may not be reliable."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "HIGH",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 5.9,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.2,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-208"
|
||||
},
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-385"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/open-quantum-safe/liboqs/blob/7eecda6095c003ddded7175a1ffdf35a2ce63ed5/src/kem/kyber/pqcrystals-kyber_kyber512_ref/poly.c#L166",
|
||||
"source": "security-advisories@github.com"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/open-quantum-safe/liboqs/commit/982c762c242ef549c914891b47bf6e0ed6321f91",
|
||||
"source": "security-advisories@github.com"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/open-quantum-safe/liboqs/security/advisories/GHSA-f2v9-5498-2vpp",
|
||||
"source": "security-advisories@github.com"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/pq-crystals/kyber/commit/9b8d30698a3e7449aeb34e62339d4176f11e3c6c",
|
||||
"source": "security-advisories@github.com"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,12 +2,16 @@
|
||||
"id": "CVE-2024-36971",
|
||||
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"published": "2024-06-10T09:15:09.127",
|
||||
"lastModified": "2024-06-10T09:15:09.127",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-06-10T12:40:41.360",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet: fix __dst_negative_advice() race\n\n__dst_negative_advice() does not enforce proper RCU rules when\nsk->dst_cache must be cleared, leading to possible UAF.\n\nRCU rules are that we must first clear sk->sk_dst_cache,\nthen call dst_release(old_dst).\n\nNote that sk_dst_reset(sk) is implementing this protocol correctly,\nwhile __dst_negative_advice() uses the wrong order.\n\nGiven that ip6_negative_advice() has special logic\nagainst RTF_CACHE, this means each of the three ->negative_advice()\nexisting methods must perform the sk_dst_reset() themselves.\n\nNote the check against NULL dst is centralized in\n__dst_negative_advice(), there is no need to duplicate\nit in various callbacks.\n\nMany thanks to Clement Lecigne for tracking this issue.\n\nThis old bug became visible after the blamed commit, using UDP sockets."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "En el kernel de Linux, se resolvi\u00f3 la siguiente vulnerabilidad: net: fix __dst_negative_advice() race __dst_negative_advice() no aplica las reglas adecuadas de RCU cuando se debe borrar sk->dst_cache, lo que genera una posible UAF. Las reglas de RCU son que primero debemos borrar sk->sk_dst_cache y luego llamar a dst_release(old_dst). Tenga en cuenta que sk_dst_reset(sk) implementa este protocolo correctamente, mientras que __dst_negative_advice() utiliza el orden incorrecto. Dado que ip6_negative_advice() tiene una l\u00f3gica especial contra RTF_CACHE, esto significa que cada uno de los tres ->negative_advice() m\u00e9todos existentes debe realizar sk_dst_reset() ellos mismos. Tenga en cuenta que la verificaci\u00f3n de NULL dst est\u00e1 centralizada en __dst_negative_advice(), no es necesario duplicarla en varias devoluciones de llamada. Muchas gracias a Clement Lecigne por dar seguimiento a este problema. Este antiguo error se hizo visible despu\u00e9s de la confirmaci\u00f3n culpada, utilizando sockets UDP."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
|
44
CVE-2024/CVE-2024-36xx/CVE-2024-3699.json
Normal file
44
CVE-2024/CVE-2024-36xx/CVE-2024-3699.json
Normal file
@ -0,0 +1,44 @@
|
||||
{
|
||||
"id": "CVE-2024-3699",
|
||||
"sourceIdentifier": "cvd@cert.pl",
|
||||
"published": "2024-06-10T12:15:10.243",
|
||||
"lastModified": "2024-06-10T12:40:41.360",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Use of hard-coded password to the patients' database allows an attacker to retrieve sensitive data stored in the database. The password is the same among all\u00a0drEryk Gabinet installations.This issue affects drEryk Gabinet software versions from 7.0.0.0 through 9.17.0.0."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "El uso de una contrase\u00f1a codificada para la base de datos de los pacientes permite a un atacante recuperar datos confidenciales almacenados en la base de datos. La contrase\u00f1a es la misma en todas las instalaciones de drEryk Gabinet. Este problema afecta a las versiones del software drEryk Gabinet desde la 7.0.0.0 hasta la 9.17.0.0."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "cvd@cert.pl",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-798"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://cert.pl/en/posts/2024/06/CVE-2024-1228/",
|
||||
"source": "cvd@cert.pl"
|
||||
},
|
||||
{
|
||||
"url": "https://cert.pl/posts/2024/06/CVE-2024-1228/",
|
||||
"source": "cvd@cert.pl"
|
||||
},
|
||||
{
|
||||
"url": "https://dreryk.pl/produkty/gabinet/",
|
||||
"source": "cvd@cert.pl"
|
||||
}
|
||||
]
|
||||
}
|
40
CVE-2024/CVE-2024-37xx/CVE-2024-3700.json
Normal file
40
CVE-2024/CVE-2024-37xx/CVE-2024-3700.json
Normal file
@ -0,0 +1,40 @@
|
||||
{
|
||||
"id": "CVE-2024-3700",
|
||||
"sourceIdentifier": "cvd@cert.pl",
|
||||
"published": "2024-06-10T12:15:10.370",
|
||||
"lastModified": "2024-06-10T12:40:41.360",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Use of hard-coded password to the patients' database allows an attacker to retrieve sensitive data stored in the database. The password is the same among all Simple Care software installations.\n\nThis issue affects\u00a0Estomed Sp. z o.o. Simple Care software in all versions. The software is no longer supported."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "El uso de una contrase\u00f1a codificada para la base de datos de los pacientes permite a un atacante recuperar datos confidenciales almacenados en la base de datos. La contrase\u00f1a es la misma en todas las instalaciones del software Simple Care. Este problema afecta a Estomed Sp. z o.o. Software z oo Simple Care en todas las versiones. El software ya no es compatible."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "cvd@cert.pl",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-798"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://cert.pl/en/posts/2024/06/CVE-2024-1228/",
|
||||
"source": "cvd@cert.pl"
|
||||
},
|
||||
{
|
||||
"url": "https://cert.pl/posts/2024/06/CVE-2024-1228/",
|
||||
"source": "cvd@cert.pl"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,12 +2,16 @@
|
||||
"id": "CVE-2024-4328",
|
||||
"sourceIdentifier": "security@huntr.dev",
|
||||
"published": "2024-06-10T08:15:51.730",
|
||||
"lastModified": "2024-06-10T08:15:51.730",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-06-10T12:40:41.360",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A Cross-Site Request Forgery (CSRF) vulnerability exists in the clear_personality_files_list function of the parisneo/lollms-webui v9.6. The vulnerability arises from the use of a GET request to clear personality files list, which lacks proper CSRF protection. This flaw allows attackers to trick users into performing actions without their consent, such as deleting important files on the system. The issue is present in the application's handling of requests, making it susceptible to CSRF attacks that could lead to unauthorized actions being performed on behalf of the user."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Existe una vulnerabilidad de Cross-Site Request Forgery (CSRF) en la funci\u00f3n clear_personality_files_list de parisneo/lollms-webui v9.6. La vulnerabilidad surge del uso de una solicitud GET para borrar la lista de archivos de personalidad, que carece de la protecci\u00f3n CSRF adecuada. Esta falla permite a los atacantes enga\u00f1ar a los usuarios para que realicen acciones sin su consentimiento, como eliminar archivos importantes del sistema. El problema est\u00e1 presente en el manejo de solicitudes por parte de la aplicaci\u00f3n, lo que la hace susceptible a ataques CSRF que podr\u00edan llevar a la realizaci\u00f3n de acciones no autorizadas en nombre del usuario."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
|
@ -2,16 +2,40 @@
|
||||
"id": "CVE-2024-4577",
|
||||
"sourceIdentifier": "security@php.net",
|
||||
"published": "2024-06-09T20:15:09.550",
|
||||
"lastModified": "2024-06-10T03:15:09.057",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-06-10T12:50:06.250",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "In PHP versions\u00a08.1.* before 8.1.29, 8.2.* before 8.2.20, 8.3.* before 8.3.8, when using Apache and PHP-CGI on Windows, if the system is set up to use certain code pages, Windows may use \"Best-Fit\" behavior to replace characters in command line given to\u00a0Win32 API functions. PHP CGI module may misinterpret those characters as PHP options, which may allow a malicious user to pass options to PHP binary being run, and thus reveal the source code of scripts, run arbitrary PHP code on the server, etc."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "En las versiones de PHP 8.1.* anteriores a 8.1.29, 8.2.* anteriores a 8.2.20, 8.3.* anteriores a 8.3.8, cuando se usa Apache y PHP-CGI en Windows, si el sistema est\u00e1 configurado para usar ciertas p\u00e1ginas de c\u00f3digos, Windows puede utilizar el comportamiento \"Mejor ajuste\" para reemplazar caracteres en la l\u00ednea de comando proporcionada a las funciones de la API de Win32. El m\u00f3dulo PHP CGI puede malinterpretar esos caracteres como opciones de PHP, lo que puede permitir a un usuario malintencionado pasar opciones al binario PHP que se est\u00e1 ejecutando y, por lo tanto, revelar el c\u00f3digo fuente de los scripts, ejecutar c\u00f3digo PHP arbitrario en el servidor, etc."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
},
|
||||
{
|
||||
"source": "security@php.net",
|
||||
"type": "Secondary",
|
||||
@ -35,6 +59,16 @@
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-78"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "security@php.net",
|
||||
"type": "Secondary",
|
||||
@ -46,58 +80,150 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:php:php:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "5.0.0",
|
||||
"versionEndExcluding": "8.1.29",
|
||||
"matchCriteriaId": "A8DF5D29-9ADB-4CE9-9DCE-9FFECA97800C"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:php:php:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "8.2.0",
|
||||
"versionEndExcluding": "8.2.20",
|
||||
"matchCriteriaId": "A39988FF-D854-4277-9D66-6911AF371DD3"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:php:php:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "8.3.0",
|
||||
"versionEndExcluding": "8.3.8",
|
||||
"matchCriteriaId": "F579FFC1-4F81-4755-B14B-3AA73AC9FF7A"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://arstechnica.com/security/2024/06/php-vulnerability-allows-attackers-to-run-malicious-code-on-windows-servers/",
|
||||
"source": "security@php.net"
|
||||
"source": "security@php.net",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://blog.orange.tw/2024/06/cve-2024-4577-yet-another-php-rce.html",
|
||||
"source": "security@php.net"
|
||||
"source": "security@php.net",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://cert.be/en/advisory/warning-php-remote-code-execution-patch-immediately",
|
||||
"source": "security@php.net",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://devco.re/blog/2024/06/06/security-alert-cve-2024-4577-php-cgi-argument-injection-vulnerability-en/",
|
||||
"source": "security@php.net"
|
||||
"source": "security@php.net",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/11whoami99/CVE-2024-4577",
|
||||
"source": "security@php.net"
|
||||
"source": "security@php.net",
|
||||
"tags": [
|
||||
"Exploit"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/php/php-src/security/advisories/GHSA-3qgc-jrrr-25jv",
|
||||
"source": "security@php.net"
|
||||
"source": "security@php.net",
|
||||
"tags": [
|
||||
"Broken Link"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/rapid7/metasploit-framework/pull/19247",
|
||||
"source": "security@php.net"
|
||||
"source": "security@php.net",
|
||||
"tags": [
|
||||
"Exploit"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/watchtowrlabs/CVE-2024-4577",
|
||||
"source": "security@php.net"
|
||||
"source": "security@php.net",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/xcanwin/CVE-2024-4577-PHP-RCE",
|
||||
"source": "security@php.net"
|
||||
"source": "security@php.net",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://isc.sans.edu/diary/30994",
|
||||
"source": "security@php.net",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://labs.watchtowr.com/no-way-php-strikes-again-cve-2024-4577/",
|
||||
"source": "security@php.net"
|
||||
"source": "security@php.net",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://www.imperva.com/blog/imperva-protects-against-critical-php-vulnerability-cve-2024-4577/",
|
||||
"source": "security@php.net"
|
||||
"source": "security@php.net",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://www.php.net/ChangeLog-8.php#8.1.29",
|
||||
"source": "security@php.net"
|
||||
"source": "security@php.net",
|
||||
"tags": [
|
||||
"Release Notes"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://www.php.net/ChangeLog-8.php#8.2.20",
|
||||
"source": "security@php.net"
|
||||
"source": "security@php.net",
|
||||
"tags": [
|
||||
"Release Notes"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://www.php.net/ChangeLog-8.php#8.3.8",
|
||||
"source": "security@php.net"
|
||||
"source": "security@php.net",
|
||||
"tags": [
|
||||
"Release Notes"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,12 +2,16 @@
|
||||
"id": "CVE-2024-4744",
|
||||
"sourceIdentifier": "audit@patchstack.com",
|
||||
"published": "2024-06-10T08:15:51.970",
|
||||
"lastModified": "2024-06-10T08:15:51.970",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-06-10T12:40:41.360",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Missing Authorization vulnerability in Avirtum iPages Flipbook.This issue affects iPages Flipbook: from n/a through 1.5.1."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Vulnerabilidad de autorizaci\u00f3n faltante en Avirtum iPages Flipbook. Este problema afecta a iPages Flipbook: desde n/a hasta 1.5.1."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
|
@ -2,12 +2,16 @@
|
||||
"id": "CVE-2024-4745",
|
||||
"sourceIdentifier": "audit@patchstack.com",
|
||||
"published": "2024-06-10T08:15:52.210",
|
||||
"lastModified": "2024-06-10T08:15:52.210",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-06-10T12:40:41.360",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Missing Authorization vulnerability in RafflePress Giveaways and Contests by RafflePress.This issue affects Giveaways and Contests by RafflePress: from n/a through 1.12.4."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Vulnerabilidad de autorizaci\u00f3n faltante en RafflePress Giveaways and Contests by RafflePress. Este problema afecta a los sorteos y concursos de RafflePress: desde n/a hasta 1.12.4."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
|
@ -2,12 +2,16 @@
|
||||
"id": "CVE-2024-4746",
|
||||
"sourceIdentifier": "audit@patchstack.com",
|
||||
"published": "2024-06-10T08:15:52.430",
|
||||
"lastModified": "2024-06-10T08:15:52.430",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-06-10T12:40:41.360",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Missing Authorization vulnerability in Netgsm.This issue affects Netgsm: from n/a through 2.9.16."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Vulnerabilidad de autorizaci\u00f3n faltante en Netgsm. Este problema afecta a Netgsm: desde n/a hasta 2.9.16."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
|
@ -2,12 +2,16 @@
|
||||
"id": "CVE-2024-5774",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2024-06-09T06:15:07.410",
|
||||
"lastModified": "2024-06-10T02:52:08.267",
|
||||
"lastModified": "2024-06-10T13:15:51.190",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A vulnerability has been found in SourceCodester Stock Management System 1.0 and classified as critical. Affected by this vulnerability is an unknown functionality of the file index.php of the component Login. The manipulation of the argument username/password leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-267457 was assigned to this vulnerability."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Una vulnerabilidad fue encontrada en SourceCodester Stock Management System 1.0 y clasificada como cr\u00edtica. Una funci\u00f3n desconocida del archivo index.php del componente Login es afectada por esta vulnerabilidad. La manipulaci\u00f3n del argumento nombre de usuario/contrase\u00f1a conduce a la inyecci\u00f3n de SQL. El ataque se puede lanzar de forma remota. El exploit ha sido divulgado al p\u00fablico y puede utilizarse. A esta vulnerabilidad se le asign\u00f3 el identificador VDB-267457."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
|
55
CVE-2024/CVE-2024-57xx/CVE-2024-5785.json
Normal file
55
CVE-2024/CVE-2024-57xx/CVE-2024-5785.json
Normal file
@ -0,0 +1,55 @@
|
||||
{
|
||||
"id": "CVE-2024-5785",
|
||||
"sourceIdentifier": "cve-coordination@incibe.es",
|
||||
"published": "2024-06-10T13:15:51.323",
|
||||
"lastModified": "2024-06-10T13:15:51.323",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Command injection vulnerability in Comtrend router WLD71-T1_v2.0.201820, affecting the GRG-4280us version. This vulnerability could allow an authenticated user to execute commands inside the router by making a POST request to the URL \u201c/boaform/admin/formUserTracert\u201d."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "cve-coordination@incibe.es",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "ADJACENT_NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 8.0,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.1,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "cve-coordination@incibe.es",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-78"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.incibe.es/en/incibe-cert/notices/aviso/multiple-vulnerabilities-comtrend-router",
|
||||
"source": "cve-coordination@incibe.es"
|
||||
}
|
||||
]
|
||||
}
|
55
CVE-2024/CVE-2024-57xx/CVE-2024-5786.json
Normal file
55
CVE-2024/CVE-2024-57xx/CVE-2024-5786.json
Normal file
@ -0,0 +1,55 @@
|
||||
{
|
||||
"id": "CVE-2024-5786",
|
||||
"sourceIdentifier": "cve-coordination@incibe.es",
|
||||
"published": "2024-06-10T13:15:51.560",
|
||||
"lastModified": "2024-06-10T13:15:51.560",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Cross-Site Request Forgery vulnerability in Comtrend router WLD71-T1_v2.0.201820, affecting the GRG-4280us version. This vulnerability allows an attacker to force an end user to execute unwanted actions in a web application to which he is authenticated."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "cve-coordination@incibe.es",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 6.5,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "cve-coordination@incibe.es",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-352"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.incibe.es/en/incibe-cert/notices/aviso/multiple-vulnerabilities-comtrend-router",
|
||||
"source": "cve-coordination@incibe.es"
|
||||
}
|
||||
]
|
||||
}
|
43
README.md
43
README.md
@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours.
|
||||
### Last Repository Update
|
||||
|
||||
```plain
|
||||
2024-06-10T12:00:18.174782+00:00
|
||||
2024-06-10T14:00:49.285568+00:00
|
||||
```
|
||||
|
||||
### Most recent CVE Modification Timestamp synchronized with NVD
|
||||
|
||||
```plain
|
||||
2024-06-10T11:15:49.933000+00:00
|
||||
2024-06-10T13:15:51.560000+00:00
|
||||
```
|
||||
|
||||
### Last Data Feed Release
|
||||
@ -33,20 +33,51 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
|
||||
### Total Number of included CVEs
|
||||
|
||||
```plain
|
||||
253228
|
||||
253235
|
||||
```
|
||||
|
||||
### CVEs added in the last Commit
|
||||
|
||||
Recently added CVEs: `0`
|
||||
Recently added CVEs: `7`
|
||||
|
||||
- [CVE-2024-1228](CVE-2024/CVE-2024-12xx/CVE-2024-1228.json) (`2024-06-10T12:15:09.430`)
|
||||
- [CVE-2024-28833](CVE-2024/CVE-2024-288xx/CVE-2024-28833.json) (`2024-06-10T12:15:09.927`)
|
||||
- [CVE-2024-36405](CVE-2024/CVE-2024-364xx/CVE-2024-36405.json) (`2024-06-10T13:15:50.700`)
|
||||
- [CVE-2024-3699](CVE-2024/CVE-2024-36xx/CVE-2024-3699.json) (`2024-06-10T12:15:10.243`)
|
||||
- [CVE-2024-3700](CVE-2024/CVE-2024-37xx/CVE-2024-3700.json) (`2024-06-10T12:15:10.370`)
|
||||
- [CVE-2024-5785](CVE-2024/CVE-2024-57xx/CVE-2024-5785.json) (`2024-06-10T13:15:51.323`)
|
||||
- [CVE-2024-5786](CVE-2024/CVE-2024-57xx/CVE-2024-5786.json) (`2024-06-10T13:15:51.560`)
|
||||
|
||||
|
||||
### CVEs modified in the last Commit
|
||||
|
||||
Recently modified CVEs: `1`
|
||||
Recently modified CVEs: `27`
|
||||
|
||||
- [CVE-2024-5775](CVE-2024/CVE-2024-57xx/CVE-2024-5775.json) (`2024-06-10T11:15:49.933`)
|
||||
- [CVE-2024-21751](CVE-2024/CVE-2024-217xx/CVE-2024-21751.json) (`2024-06-10T12:40:41.360`)
|
||||
- [CVE-2024-22296](CVE-2024/CVE-2024-222xx/CVE-2024-22296.json) (`2024-06-10T12:40:41.360`)
|
||||
- [CVE-2024-22298](CVE-2024/CVE-2024-222xx/CVE-2024-22298.json) (`2024-06-10T12:40:41.360`)
|
||||
- [CVE-2024-23524](CVE-2024/CVE-2024-235xx/CVE-2024-23524.json) (`2024-06-10T12:40:41.360`)
|
||||
- [CVE-2024-27936](CVE-2024/CVE-2024-279xx/CVE-2024-27936.json) (`2024-06-10T13:15:50.197`)
|
||||
- [CVE-2024-35717](CVE-2024/CVE-2024-357xx/CVE-2024-35717.json) (`2024-06-10T12:40:41.360`)
|
||||
- [CVE-2024-35720](CVE-2024/CVE-2024-357xx/CVE-2024-35720.json) (`2024-06-10T12:40:41.360`)
|
||||
- [CVE-2024-35721](CVE-2024/CVE-2024-357xx/CVE-2024-35721.json) (`2024-06-10T12:40:41.360`)
|
||||
- [CVE-2024-35722](CVE-2024/CVE-2024-357xx/CVE-2024-35722.json) (`2024-06-10T12:40:41.360`)
|
||||
- [CVE-2024-35723](CVE-2024/CVE-2024-357xx/CVE-2024-35723.json) (`2024-06-10T12:40:41.360`)
|
||||
- [CVE-2024-35724](CVE-2024/CVE-2024-357xx/CVE-2024-35724.json) (`2024-06-10T12:40:41.360`)
|
||||
- [CVE-2024-35725](CVE-2024/CVE-2024-357xx/CVE-2024-35725.json) (`2024-06-10T12:40:41.360`)
|
||||
- [CVE-2024-35726](CVE-2024/CVE-2024-357xx/CVE-2024-35726.json) (`2024-06-10T12:40:41.360`)
|
||||
- [CVE-2024-35727](CVE-2024/CVE-2024-357xx/CVE-2024-35727.json) (`2024-06-10T12:40:41.360`)
|
||||
- [CVE-2024-35729](CVE-2024/CVE-2024-357xx/CVE-2024-35729.json) (`2024-06-10T12:40:41.360`)
|
||||
- [CVE-2024-35735](CVE-2024/CVE-2024-357xx/CVE-2024-35735.json) (`2024-06-10T12:40:41.360`)
|
||||
- [CVE-2024-35741](CVE-2024/CVE-2024-357xx/CVE-2024-35741.json) (`2024-06-10T12:40:41.360`)
|
||||
- [CVE-2024-35742](CVE-2024/CVE-2024-357xx/CVE-2024-35742.json) (`2024-06-10T12:40:41.360`)
|
||||
- [CVE-2024-36971](CVE-2024/CVE-2024-369xx/CVE-2024-36971.json) (`2024-06-10T12:40:41.360`)
|
||||
- [CVE-2024-4328](CVE-2024/CVE-2024-43xx/CVE-2024-4328.json) (`2024-06-10T12:40:41.360`)
|
||||
- [CVE-2024-4577](CVE-2024/CVE-2024-45xx/CVE-2024-4577.json) (`2024-06-10T12:50:06.250`)
|
||||
- [CVE-2024-4744](CVE-2024/CVE-2024-47xx/CVE-2024-4744.json) (`2024-06-10T12:40:41.360`)
|
||||
- [CVE-2024-4745](CVE-2024/CVE-2024-47xx/CVE-2024-4745.json) (`2024-06-10T12:40:41.360`)
|
||||
- [CVE-2024-4746](CVE-2024/CVE-2024-47xx/CVE-2024-4746.json) (`2024-06-10T12:40:41.360`)
|
||||
- [CVE-2024-5774](CVE-2024/CVE-2024-57xx/CVE-2024-5774.json) (`2024-06-10T13:15:51.190`)
|
||||
|
||||
|
||||
## Download and Usage
|
||||
|
63
_state.csv
63
_state.csv
@ -179578,7 +179578,7 @@ CVE-2021-3714,0,0,5c6e5f6a329d110bcfba73c685299d744bba4a1bd7515c4bab58ae7821f0cb
|
||||
CVE-2021-37144,0,0,d619e79d3924f2a62af0fd35cf074d468226de7525c91ec3198a864146759a1b,2021-08-09T13:38:47.223000
|
||||
CVE-2021-37145,0,0,aab3cdaa1746410e06ef1709540a0cb14ea37ca425ea7118027adb30d4660601,2024-05-17T01:59:07.990000
|
||||
CVE-2021-37146,0,0,8c509316ffa5a72af7d4b47c98a2b9d285a4e8362382835d7956dfb73d2acfb8,2021-10-06T19:37:36.300000
|
||||
CVE-2021-37147,0,0,0f777661a00a66d2bf8d2fc97f2d7fbd0453691c19c1934be2efd19bc5c8379a,2024-02-09T02:28:42.050000
|
||||
CVE-2021-37147,0,1,e085b7ff8ded26c4b192fb33ff5081f6c21aec3ed4dd48b558be1a02cd3fd564,2024-06-10T13:15:49.490000
|
||||
CVE-2021-37148,0,0,531207e3cc5098d67aa6cc598a7c2aa27aef781d2582956e3e1fee942b9da5de,2022-10-14T11:54:11.530000
|
||||
CVE-2021-37149,0,0,06665dcf8ac57932acce720544508b3787ecb37e8163b3630591a8c6b7e9046f,2022-10-14T11:51:37.010000
|
||||
CVE-2021-3715,0,0,56184918d3bba2bc5c90a5358ec32e52f8dc457949f0bf8d6b7933213bcb0179,2023-01-24T15:07:31.143000
|
||||
@ -240763,7 +240763,7 @@ CVE-2024-0592,0,0,241b59d1ddeb9a423798f9c7a6f561a77ced54e58402df14a4ade24dc0352d
|
||||
CVE-2024-0593,0,0,89e7bfb235791aea777eb080b5993143b44f503194888c19b9c73b88eae869f6,2024-02-22T19:07:27.197000
|
||||
CVE-2024-0594,0,0,60077e504dbbc890300ba3e96330ae555ec39c3816d3dd082cc5d28cf0cd6393,2024-02-15T18:40:20.453000
|
||||
CVE-2024-0595,0,0,af15af2ea25dae8e87d2cb0077ff60ffffba24a68e71adf6bfae2d8b34b81c14,2024-02-16T21:34:39.327000
|
||||
CVE-2024-0596,0,0,0b265c937c4478a403b4fd3af4ba464d6f3e32204d68b008dcd08a509673f056,2024-02-16T21:34:53.293000
|
||||
CVE-2024-0596,0,1,9f5b4456a9d487477c9dc7744c8ed50bc8416ee6f22640edeebd91bffeea3832,2024-06-10T13:15:49.863000
|
||||
CVE-2024-0597,0,0,3a1e17fd48d4d13e1e3eeb0b7af292f08f1669c0f9ba176e3313fb24210e6aa1,2024-02-13T14:05:27.427000
|
||||
CVE-2024-0598,0,0,905d7443f5fe0cd440f5b3fed3dfd6b7335390ae802c46bc574bdf1908ea4874,2024-04-10T13:24:00.070000
|
||||
CVE-2024-0599,0,0,b9a7a17605f0cb4a92980b4d56609fff23f10bb4163b407de7c5e45dcced7a8d,2024-05-17T02:34:48.770000
|
||||
@ -241335,6 +241335,7 @@ CVE-2024-1224,0,0,6671b720f58aa0150d14676a615208ff783ead72a8a766227d501b4f2f840d
|
||||
CVE-2024-1225,0,0,0b68eae0ee984524ebb2df359b44e58b9ba84a615ada907a65e017a24d65ff7a,2024-05-17T02:35:19.560000
|
||||
CVE-2024-1226,0,0,14a580d4b3eab4674d6ae40acd0cb53f118cafa2e8004e611e071913cd041fe6,2024-03-12T16:02:33.900000
|
||||
CVE-2024-1227,0,0,94dce1bd607b6903e23d54a7d6b05a85e9dc37b645ba64935d33bd38f11890aa,2024-03-12T16:02:33.900000
|
||||
CVE-2024-1228,1,1,9ed4be4b64f071a926435d781e56cc24beb311b621e58ce6e504c6303075b0fa,2024-06-10T12:40:41.360000
|
||||
CVE-2024-1229,0,0,2de2ced35127929201da3cc9dd41aa7d4097d2d61f9931ef1592526b3e0b7dfa,2024-05-14T16:13:02.773000
|
||||
CVE-2024-1230,0,0,8bd1dd7f8fd55f9189a6ea53392185485a1a6386a5bf97397fc7d3598cb5fb14,2024-05-14T16:13:02.773000
|
||||
CVE-2024-1231,0,0,3fff2a2694f3a2890eda32488c438fe0ab80785883b0aefb67199c2eabc0d967,2024-03-25T13:47:14.087000
|
||||
@ -243020,7 +243021,7 @@ CVE-2024-21747,0,0,35403744e7ef40fd68d659ac75e691394b3bec12407204459bb0ee7326018
|
||||
CVE-2024-21748,0,0,f06326b22781b534e1620f1c7af1d9c1c617e182315508b6b870d91983d6f382,2024-06-10T02:52:08.267000
|
||||
CVE-2024-21749,0,0,977e78c03c745b3f2715cc5017eb627860eddebef9d26895b59c2bc8df042370,2024-02-29T13:49:47.277000
|
||||
CVE-2024-21750,0,0,3e8fbe0cb62c8e56d68418bdaca88bd6a5a9359bd561d57e9822bcdabaea5468,2024-02-03T00:41:15.460000
|
||||
CVE-2024-21751,0,0,2d116c2e07457bc07d45f2893f63db0c67c62afe80dbafadddaba4bca0219336,2024-06-10T08:15:47.603000
|
||||
CVE-2024-21751,0,1,b64fb613f54cec3fdbdc63d0d3501a7b32b5e5f92890894205961027ed2c4f96,2024-06-10T12:40:41.360000
|
||||
CVE-2024-21752,0,0,80a5a3aff28e680d194d956f222c96b3f36d11392adc2ff7fd485136323ef565,2024-02-29T13:49:29.390000
|
||||
CVE-2024-21755,0,0,3649ad429f456b06338c76a7773a7effa9162638dba6b0cd829505e767eab517,2024-04-10T13:24:22.187000
|
||||
CVE-2024-21756,0,0,7e40cab71c47f1a51d786a1ac8dd4278e504d9e4172c58909f1d2b21a6d9e3a6,2024-04-10T13:24:22.187000
|
||||
@ -243379,9 +243380,9 @@ CVE-2024-22292,0,0,0dcb649675eee45183d7a3a52a52d50012978e3ffd9ed19e44e63a0c90ba5
|
||||
CVE-2024-22293,0,0,66b18b2ec523327037fe7697def25b6fe810892caaa2642efef338fa7d6fa3b5,2024-02-06T15:44:56.407000
|
||||
CVE-2024-22294,0,0,2d6088f59e8b9087805c2c637ab58edad520cd7f6a5cd091778e4377e15ff718,2024-01-30T17:44:30.747000
|
||||
CVE-2024-22295,0,0,79eba3745b8ee4d5ff9d56f3066d8459c9cee5eb8c12175ae43be27752ace43e,2024-02-06T15:49:30.457000
|
||||
CVE-2024-22296,0,0,4ff18ac3a7d573b5182174c089424da2b7812b1330e06235990a5a83640cc28f,2024-06-10T08:15:48.017000
|
||||
CVE-2024-22296,0,1,26497821bdd6523c6ffa82c8932df21c7375a0b75c6b4829fe7611d85fa934c8,2024-06-10T12:40:41.360000
|
||||
CVE-2024-22297,0,0,577fc11ad5b0d749376591ad16a375dfa540e32ffa2e1012a2392bbaefc0287d,2024-02-06T15:38:07.050000
|
||||
CVE-2024-22298,0,0,d352620fdc1c4eb6e0318dfb01a369e3454bdb875c4e460aaa1e3d22419e0c68,2024-06-10T08:15:48.253000
|
||||
CVE-2024-22298,0,1,eb4e5161d1233abda8028026a5fd3bc810ac81a8912963670187ebce3b0787a2,2024-06-10T12:40:41.360000
|
||||
CVE-2024-22299,0,0,80a4882f4c9ab5eec2fd5d8b16ede08da3f188bafea457394bae184bfdc470b7,2024-03-27T12:29:30.307000
|
||||
CVE-2024-22300,0,0,6a2ac22ff64061be14a64819ed6b0717dea7f94ee6239bf636e871d8862b7a4e,2024-03-27T12:29:30.307000
|
||||
CVE-2024-22301,0,0,5c83b0c07edb476e78cc7de384bddf72fcd86e319684689177ab1f8ee28c611d,2024-01-30T17:44:59.847000
|
||||
@ -244031,7 +244032,7 @@ CVE-2024-2352,0,0,57630273c197eaed8b3c3f6d93ff32d48d806b15015e610cf5486ce4687523
|
||||
CVE-2024-23520,0,0,6231203085a20b2d4cba5048549458f88829476b5e6533d86ed85baf0d8a6576,2024-03-26T12:55:05.010000
|
||||
CVE-2024-23522,0,0,7c088d2b09cc2e5e477c07b1d4ef807535495454f574963a9dafd17ab8e9681b,2024-05-17T18:36:05.263000
|
||||
CVE-2024-23523,0,0,13316361d7846e6bf749bdea54d907de9d96954e12edb4899346015be33f686c,2024-03-17T22:38:29.433000
|
||||
CVE-2024-23524,0,0,990cb9ba2fb01857d3774a9dd65571427ddb7a5e2db80021b3733c70ac4c92db,2024-06-10T08:15:48.483000
|
||||
CVE-2024-23524,0,1,b4e07bfebc676f16e7c9cc5e0a5f2262c8872797e5d06800ed4ab67d5fef487e,2024-06-10T12:40:41.360000
|
||||
CVE-2024-23525,0,0,c9ea3f9f05986326992f0c2128558f249961ba75cda273f72dbac98591a6932d,2024-05-05T15:15:49.067000
|
||||
CVE-2024-23526,0,0,30d606f0eba5761919592b8a5008d0e69ca508d137995732983dadd8b2152fdd,2024-04-19T13:10:25.637000
|
||||
CVE-2024-23527,0,0,024d167c32106440ba360cc7e1648a7e6b4c387298a495a5c7cfd6bef1ff05a9,2024-04-25T13:18:20.370000
|
||||
@ -246904,7 +246905,7 @@ CVE-2024-27932,0,0,96dca8ba166ad184bdfd834c2d09938f89d6bc1a68e74d43ba7e517b0ae48
|
||||
CVE-2024-27933,0,0,4480a72dbf32252e9b44864ee2c113f2abeb66952f26768028a79d60ccb8bbe7,2024-03-21T12:58:51.093000
|
||||
CVE-2024-27934,0,0,20475100d0910e6ac5fdd76f44fb424378dc3c2edea111d4b4aeecbcc6113bdb,2024-03-21T12:58:51.093000
|
||||
CVE-2024-27935,0,0,3ea732fedf9ecfa469373a90c7812bcb4177b239c9d15bd1f045a28162056c12,2024-03-21T12:58:51.093000
|
||||
CVE-2024-27936,0,0,2dea05b9efff660bdba50baa9ba1cac8ed70bfb330ce05f74502724e6145fa39,2024-03-21T12:58:51.093000
|
||||
CVE-2024-27936,0,1,c3c6658dd1470f9f054c21ec630ba4bba68ce0f6b63d1c0a78c6ef4463a2a484,2024-06-10T13:15:50.197000
|
||||
CVE-2024-27937,0,0,c29e9e81cf89e90d9d7bb535671e9560a32722c6ec82c8942840dfd15c536b7e,2024-04-24T15:15:46.487000
|
||||
CVE-2024-27938,0,0,992243c7c9e4bac66f51bd7113f98af62b9886d66d4d9e32776474fa2dcd307d,2024-03-12T12:40:13.500000
|
||||
CVE-2024-27939,0,0,f088f82516bd2d0d0d374f8f7786163b91935bb614cba21a4781729e8256a07c,2024-05-14T19:18:31.490000
|
||||
@ -247387,6 +247388,7 @@ CVE-2024-28824,0,0,5a9476ae0fdb0520e3a986c832f5f9e27a50da5cb3aa11e06910544296f0e
|
||||
CVE-2024-28825,0,0,9e6f2228e06896e59bb560ffc81c60a9a09c25eeaded2122eaaaf9d670949d13,2024-04-24T13:39:42.883000
|
||||
CVE-2024-28826,0,0,af714d67b245e2002324726263b60e676423e9fa16954adb4190fa57b660a93f,2024-05-29T13:02:09.280000
|
||||
CVE-2024-2883,0,0,e66be81816608580e2e81ffcb02cca4ae9a2aa5cbea60907cc2e1d80cffbaf4a,2024-03-29T04:15:08.743000
|
||||
CVE-2024-28833,1,1,842c9aabaad5fddecf13dbff5608f1a3d0d32dbf619f87e495fbcb304105ee07,2024-06-10T12:40:41.360000
|
||||
CVE-2024-28834,0,0,f1164ae55a22a20606ed637fe19ba62574feb7486eb620ef30a13c9c57d3819e,2024-05-16T23:15:47.753000
|
||||
CVE-2024-28835,0,0,7ffb3867ffb469cae5c61eed57191c292b3344e17f215833454f077170fed24a,2024-05-16T23:15:47.883000
|
||||
CVE-2024-28836,0,0,ef9665bb9a0895616f82c07b3b8f93ecbb9dcd318a88906096e3fd29af01d6df,2024-04-03T12:38:04.840000
|
||||
@ -251289,34 +251291,34 @@ CVE-2024-35711,0,0,abde08774d127ad0db34965655a4de5b5dad73c102e868a4d0f8c3582ef01
|
||||
CVE-2024-35713,0,0,67f12030ef9ae03f21eeefc61a2db714e1cd54b5976a2138aaa81f95299ca1f4,2024-06-10T02:52:08.267000
|
||||
CVE-2024-35714,0,0,fda77c484f1be31559583b8ce420a09ac05ec40a4cbe01b6366029636befebbf,2024-06-10T02:52:08.267000
|
||||
CVE-2024-35715,0,0,a8feb3a0e36b1ed746ea7b8db0d283a4e527ecef045188b4e311eb2de1d8e60b,2024-06-10T02:52:08.267000
|
||||
CVE-2024-35717,0,0,3acf80776355d97c3f345c7f1d059e67f78fe0202250266de2fe58460fdd9e14,2024-06-10T08:15:48.723000
|
||||
CVE-2024-35717,0,1,c99412e466e11a8d92b617aa1a8b2899f2520b1a26ed56db486809b7fb3e916d,2024-06-10T12:40:41.360000
|
||||
CVE-2024-35718,0,0,88ba8367c19f7a9dbc9e6ec292607ddba06c8c0ffe199e953febc26814251166,2024-06-10T02:52:08.267000
|
||||
CVE-2024-35719,0,0,dd1d7bca8ae8cde9f9e3f2600aa39b26178c0f1f411f5a0803d6eedab9a3d37c,2024-06-10T02:52:08.267000
|
||||
CVE-2024-3572,0,0,fac7085e464e1d98d017bfc9635e53b969d9f55d28ae04030a557f0ab1b04301,2024-04-16T13:24:07.103000
|
||||
CVE-2024-35720,0,0,62009cf6bafd275afca2bd0c75d012e7856b47eb01e6ae66bc4eedc0ba028b04,2024-06-10T08:15:48.950000
|
||||
CVE-2024-35721,0,0,66b00d200045b3a9d59110d4b864f3910e3e6e1010cad0bfd2eb47894af5b2fb,2024-06-10T08:15:49.180000
|
||||
CVE-2024-35722,0,0,53e8b47763560860d095a32eb4bfb99e85b5d7cd4d573594a3a88737c3d5aeec,2024-06-10T08:15:49.400000
|
||||
CVE-2024-35723,0,0,ac0374cd75a598555b57c351a5afd9e820e56ef7b3ef3749c71d0d8321305475,2024-06-10T08:15:49.627000
|
||||
CVE-2024-35724,0,0,40d2cda6524dd1fd39859943bcdd7d7912ce924506e715e219ce975d57270685,2024-06-10T08:15:49.853000
|
||||
CVE-2024-35725,0,0,88451f8ade3abffe04cf9ab3b37c334370f2bf473dbc141df6571ee0f5b3341e,2024-06-10T08:15:50.130000
|
||||
CVE-2024-35726,0,0,12be0874f188f1e2375da364c9e49e84be8ebff6d62b0a2fc6516431ac7c8bed,2024-06-10T08:15:50.370000
|
||||
CVE-2024-35727,0,0,677991ceb9bfee9427bec725f6256918c9a664adf353b328575600dcf024e7fd,2024-06-10T08:15:50.600000
|
||||
CVE-2024-35729,0,0,4fbe387fd6737d9ddef2374c47d656bf33e5dcb924716b8f4e934b0420876684,2024-06-10T08:15:50.820000
|
||||
CVE-2024-35720,0,1,0f164f8f9b670114152a0f88625e47d291e06bcc76a25b980fca9f1df0718e97,2024-06-10T12:40:41.360000
|
||||
CVE-2024-35721,0,1,47fa83a2c06aeb873011a7d9e72984af4163e18b6a4f8557e11aab266c20f0b4,2024-06-10T12:40:41.360000
|
||||
CVE-2024-35722,0,1,fe1b2ecadfc6fa65c80ce7f0dd7231a203031927df17e4b70112a6a2a6775c60,2024-06-10T12:40:41.360000
|
||||
CVE-2024-35723,0,1,0c8aec2c87d6958c9ad6bcd8848a1c193563820b9352824d84714622c28f59f6,2024-06-10T12:40:41.360000
|
||||
CVE-2024-35724,0,1,e48b3a00c2b00635aee81c29e3ca82632c54edc0f72b88507c61ca124823f068,2024-06-10T12:40:41.360000
|
||||
CVE-2024-35725,0,1,6387fa62c9303a450388588acd1b532583602036be1cf579cac326cfca4117f0,2024-06-10T12:40:41.360000
|
||||
CVE-2024-35726,0,1,5883eebf37d5a82afde62efd9b451f2cc474bd63c2ff9ae6e7e67c955ac5df05,2024-06-10T12:40:41.360000
|
||||
CVE-2024-35727,0,1,fa60ef12791ac41cbac7ca7ddae65aef20b84d89ffc1e42657dd68e45415ddb1,2024-06-10T12:40:41.360000
|
||||
CVE-2024-35729,0,1,704c66cc889ab065c72f8d4d1ff2c74d179c18006d46b0f8f7d363da1f47ae5d,2024-06-10T12:40:41.360000
|
||||
CVE-2024-3573,0,0,f978306925f93ca64332932b6f5a09fb648fa8e8ad9d4b00bd427fd81ec82478,2024-04-16T13:24:07.103000
|
||||
CVE-2024-35730,0,0,49335cae17539a2ff75d573d2c355a9e96d242f541f9939e3a5e291d5780cbb8,2024-06-10T02:52:08.267000
|
||||
CVE-2024-35731,0,0,143fbc50e8cef612366366b66d67424075ebe4c9c1a8d543f78a4729c1a58e2a,2024-06-10T02:52:08.267000
|
||||
CVE-2024-35732,0,0,7fdcba0fd7fddef85feb7e6673a8f96d3154b7974fa22b232cf3fd801d3f54de,2024-06-10T02:52:08.267000
|
||||
CVE-2024-35733,0,0,a1ae2286f7bc76a6978fa6bf1b5fce5a756320de3c88f0e64dedfe42b522a5d8,2024-06-10T02:52:08.267000
|
||||
CVE-2024-35734,0,0,4db4068d084716e23e2c716612575cf1c31577ae6452883821d760d3b2973e48,2024-06-10T02:52:08.267000
|
||||
CVE-2024-35735,0,0,df426341c838a65a5c3f591d43c4b4543b27fa021439ce0aaeb828b2ac30914c,2024-06-10T08:15:51.053000
|
||||
CVE-2024-35735,0,1,b0449a6fba46649e5663f9a33b4825977c92b11ac690bf46af299295386d8cd6,2024-06-10T12:40:41.360000
|
||||
CVE-2024-35736,0,0,ce53c5603569b56b066418efe2441dcc3ec4daf52569cea931f378aa336fd127,2024-06-10T02:52:08.267000
|
||||
CVE-2024-35737,0,0,68b854bcf8f4224101727c49f7d231c73d532ff04fc75a01e1d9fe383907d041,2024-06-10T02:52:08.267000
|
||||
CVE-2024-35738,0,0,b35b0370c2dd956489606373203db0f27e1293b12d9ab83c9b53ee18df600402,2024-06-10T02:52:08.267000
|
||||
CVE-2024-35739,0,0,b4f70001f5f669ef8233f6bfef832af600079b2d34c768ea99133be9875bdb3d,2024-06-10T02:52:08.267000
|
||||
CVE-2024-3574,0,0,a6cc99c8a389ea7db1c37fe05b40106752b73810cdac85caab18aeb26d6bc576,2024-04-16T13:24:07.103000
|
||||
CVE-2024-35740,0,0,cd3c4df653c403e3da38132e6a2e32e99932f9e5ed5f1383de768204108321b2,2024-06-10T02:52:08.267000
|
||||
CVE-2024-35741,0,0,5be5c4d19aa69e47c86ab8d9a0ead9d9f4a06dcdbcff472e9d42b0f6ee06aa95,2024-06-10T08:15:51.277000
|
||||
CVE-2024-35742,0,0,aa907a68ee549a22af6d2438b132957824de2f34257a292bf5e8b34073735a43,2024-06-10T08:15:51.507000
|
||||
CVE-2024-35741,0,1,707acb0728ba27890892df794126a1bdbb77c7090bf509b5331eaa5cd7510864,2024-06-10T12:40:41.360000
|
||||
CVE-2024-35742,0,1,fe154a3e8fa530687ef00116cc4be8a04e7fc1ca3143f50ff0ea0f84f7dba929,2024-06-10T12:40:41.360000
|
||||
CVE-2024-35748,0,0,26718cfab6c6b64e4a8ad5e34b137f07628443ae048b910e352acc4d93ca2719,2024-06-10T02:52:08.267000
|
||||
CVE-2024-3575,0,0,59be73eca5c53cbbcf99414bd65c6b74b4dff22ff5983c2d091439c46f610b22,2024-04-16T13:24:07.103000
|
||||
CVE-2024-35750,0,0,a560006c880afd12dcbd61cea07fe78f3a899ebabbef8546711e97bace611fe5,2024-06-10T02:52:08.267000
|
||||
@ -251692,6 +251694,7 @@ CVE-2024-36394,0,0,ccd18b82bd5a08a305c1555f5cc47e2752966fbf6a2087d2a218509e3ed38
|
||||
CVE-2024-36399,0,0,32a084399fffaab7b007a4925030bc8dfc9c8bbd3d7f25f567b275cd72694397,2024-06-07T14:56:05.647000
|
||||
CVE-2024-3640,0,0,abbf5a33cbca708fe19710dda7a796491ae1d1614e9cd03f43d6cddef8b09500,2024-05-17T18:36:31.297000
|
||||
CVE-2024-36400,0,0,2e27d3127622312110bd9540756e657c362e96a670a644b60c484e80c9a8ab0c,2024-06-04T16:57:41.053000
|
||||
CVE-2024-36405,1,1,94a506fce5d8cb43651d564e193184b3ef961b3067cefe6af02645e661678c1a,2024-06-10T13:15:50.700000
|
||||
CVE-2024-3641,0,0,c281de95cce057acff2793609e8f843aad579a2f0257c0c2e0b6442733e87b14,2024-05-16T13:03:05.353000
|
||||
CVE-2024-3642,0,0,bbed1ee941355da6f32a6eba37e95a843dd7913c7dd227d8da7f65dcb683674b,2024-05-16T13:03:05.353000
|
||||
CVE-2024-36426,0,0,b4e77ad9e3c809414d8917ef0e48e37b5fd9f4bf9093f3155502aee0ee6063a0,2024-05-28T12:39:28.377000
|
||||
@ -251883,8 +251886,10 @@ CVE-2024-36968,0,0,d504c55f4e0b8ff008f589e6761ce389b0f28ee67435189253aa32703b7ff
|
||||
CVE-2024-36969,0,0,59e2acee532b11c3e63b43cffe867838c5cd47d8ce39b95770454986faf7fb4c,2024-06-10T02:52:08.267000
|
||||
CVE-2024-3697,0,0,600d9314ffac8217c56b5ddb9a6dd8f383edc3a52ae15aefe26cd04d9d92b65a,2024-06-04T19:20:23.323000
|
||||
CVE-2024-36970,0,0,50083cf534f5df621aa7bead6ce71043c6360c6ed1cf8d6bd9cf7a1a7b652265,2024-06-10T02:52:08.267000
|
||||
CVE-2024-36971,0,0,071483d04dafb049c9c72786f47ef09a5f40ef93520e8d077e246b0fb3d41573,2024-06-10T09:15:09.127000
|
||||
CVE-2024-36971,0,1,5b84bc967b9a68653f2fedca0357e1a579aa48010ea3ba37ff19ab6c851086f5,2024-06-10T12:40:41.360000
|
||||
CVE-2024-3698,0,0,13b4029eb6179dbe788598788e16556a1995d850ddfc4af1ee0c4e86961a3a21,2024-05-17T02:40:04.800000
|
||||
CVE-2024-3699,1,1,dd2e1591c868057b2d17bebcabb2164fe4c7f17553e4a5b77bcfe050bfd1e081,2024-06-10T12:40:41.360000
|
||||
CVE-2024-3700,1,1,6dc3558d4ce4d0b98bd682199438a088f246b3a4a6bfc13ee9740e66c795b093,2024-06-10T12:40:41.360000
|
||||
CVE-2024-3701,0,0,d78f52a76181001272debccb095fb5971bb478ebc111313d9ff2994f4ec0598f,2024-04-15T13:15:31.997000
|
||||
CVE-2024-37017,0,0,fd4284c5a2195342d9622b5d20527d4d58db85192e227730c5a741287dc835e4,2024-05-31T13:01:46.727000
|
||||
CVE-2024-37018,0,0,92b8b0fbc5eb3b3ff9e996cdb38184b7cd381c3e78fdf37e960ede7860319106,2024-05-31T13:01:46.727000
|
||||
@ -252379,7 +252384,7 @@ CVE-2024-4324,0,0,7ffaeab065d0c9a1857569b7bf1dcf908cb9c5c673c6c887858b7e3bb59f5d
|
||||
CVE-2024-4325,0,0,9bdbfeadfcfe04a30cd4b788d23f4d3e0d4d7ac5ca53497b4f8e137c6cc841b9,2024-06-07T14:56:05.647000
|
||||
CVE-2024-4326,0,0,8dbb64b51f21b806e292a7e05ea5c1051e35374391354831c3514fc08d15ec8e,2024-05-16T13:03:05.353000
|
||||
CVE-2024-4327,0,0,4d82dd4709e731be065c0bf0ae9ef6780542dd816512537c908eaf4d566d4272,2024-05-17T02:40:22.673000
|
||||
CVE-2024-4328,0,0,113b0b3c323f8f5318a7690bcd04ae3baf88ed61a420f92fee0917df839a5120,2024-06-10T08:15:51.730000
|
||||
CVE-2024-4328,0,1,5c54a81eaca7a66f4f49f745eade926cbd2e59d834d210577cf1a36d3512686b,2024-06-10T12:40:41.360000
|
||||
CVE-2024-4329,0,0,b4ac7e4961d4eb2bf8d3a768969ba81a7ecc8f8fe7d1f63dcc17b43bdf703463,2024-05-14T16:11:39.510000
|
||||
CVE-2024-4330,0,0,27ed586df5d07858fa3cac91f5c86ff400dd30bbc2cec38947cbe22382636599,2024-05-30T18:19:11.743000
|
||||
CVE-2024-4331,0,0,bfd934b1b2f76cc8bd478cc4e561b67ba50f4f419d76b2999ea5119ff2a84bcd,2024-05-04T02:15:06.800000
|
||||
@ -252563,7 +252568,7 @@ CVE-2024-4571,0,0,b379f15291a8a65b330c223bc6a31fd0a21b183a906c0a4077ca3cf5d38b8a
|
||||
CVE-2024-4572,0,0,f5ca5c1acec751c453949e3111f6be45773ff402d3c1d2b8e88127a059aa7b1b,2024-05-14T15:44:06.153000
|
||||
CVE-2024-4574,0,0,313ec0d117ac92e67c29da349740abe9395db1d3208f8156cb88d417271721b1,2024-05-14T16:11:39.510000
|
||||
CVE-2024-4575,0,0,6bded3a6c54fd2b7daead76b33ebe13f0b01e085cf3109c110abbf745910c26e,2024-05-24T01:15:30.977000
|
||||
CVE-2024-4577,0,0,2765d7d0c388ef9dc6ef2ef9bed31c860ca5d8bbc26a0599368dae406dd0ad81,2024-06-10T03:15:09.057000
|
||||
CVE-2024-4577,0,1,fc858a3c36fcf26d51f469fedea3544a8ecc89a52f8d9f17af26266e580cb7d6,2024-06-10T12:50:06.250000
|
||||
CVE-2024-4579,0,0,92215db7ae90e73ed5f9ed593ac042a14c345d9cfa9b9e96b650abf914d87abf,2024-05-14T15:44:07.607000
|
||||
CVE-2024-4580,0,0,8eea2c6efcadf197a7eb186820cafc4d96f736bb0925ed6e0f257f524d44d971,2024-05-16T13:03:05.353000
|
||||
CVE-2024-4581,0,0,76d80edc646ff1ece35896e94283319c4ca53356d1c75c256f7ea9adb85effeb,2024-06-04T16:57:41.053000
|
||||
@ -252686,9 +252691,9 @@ CVE-2024-4736,0,0,35e0fe51ccd6e16c666173722ffd72f471827cead112caeaf869dd95515427
|
||||
CVE-2024-4737,0,0,0d605ad76fcca9d9a8748ea1570213b2a20be8e7af59e1490aa0de37640ee426,2024-06-04T19:20:48.597000
|
||||
CVE-2024-4738,0,0,703597dd680fa7def2747a141a4237503bd7e8917e070a49546a7e715e951f69,2024-06-04T19:20:48.783000
|
||||
CVE-2024-4743,0,0,ca5ac146013ec9c5ade9488d4cfcf6d89cbed0fe780989436eef36b2f305727d,2024-06-05T12:53:50.240000
|
||||
CVE-2024-4744,0,0,f6a7b3f4302057d0f74ba18abfb48f92b879ea04be8176ebed10ccfa7a070aaf,2024-06-10T08:15:51.970000
|
||||
CVE-2024-4745,0,0,222bad08e62df62d9c1b08d4c0fa92c6b74036871b8f7b894785bc1f321cfeab,2024-06-10T08:15:52.210000
|
||||
CVE-2024-4746,0,0,60c5e18b8520de148b8541b9f93951bbe308b484e97d6da5d744b06a33169fbe,2024-06-10T08:15:52.430000
|
||||
CVE-2024-4744,0,1,58a292f0991440815bda1982c64fa673d2647379e91b7d563512a421e417b184,2024-06-10T12:40:41.360000
|
||||
CVE-2024-4745,0,1,f9dc606a5e4c521176fdcdd05c5bf69502f1d4e2e04b134cfd3bcdd72aba1b32,2024-06-10T12:40:41.360000
|
||||
CVE-2024-4746,0,1,106a7251b4a60a86c21027852f1ca8deee3cf7597b635fb1229b8aa4a30a0153,2024-06-10T12:40:41.360000
|
||||
CVE-2024-4747,0,0,99152f6494a1192f3bae59b436abcc51d11f811ed1e0a72c2e65c8381fda6054,2024-05-14T16:11:39.510000
|
||||
CVE-2024-4749,0,0,676e331864bc41907c4c80c44886e7dac480ef6dea2c29bc22838d992753d4da,2024-06-04T16:57:41.053000
|
||||
CVE-2024-4750,0,0,423585a3e250903ac62d761ecb0e0e6dc6b4649ccd4411b90275a4e6d2f87495,2024-06-04T16:57:41.053000
|
||||
@ -253225,5 +253230,7 @@ CVE-2024-5770,0,0,2161bc3bb7995521a02976cf67b0f5030935d13dcc8500f4bdfe07ad52c43c
|
||||
CVE-2024-5771,0,0,42afac5e4b11f20018414cb0686852afbc1b273387ada89a8c858207e480e4e5,2024-06-10T02:52:08.267000
|
||||
CVE-2024-5772,0,0,2ea0dc836e17f6b8c90bfa97968632c629d144db6df4d1e0d18c1b13863f5cae,2024-06-10T02:52:08.267000
|
||||
CVE-2024-5773,0,0,e657da99547b87a184cb53f02a3a372624b24210e930d32850b363e51fd23ca7,2024-06-10T02:52:08.267000
|
||||
CVE-2024-5774,0,0,faeb86109ed61f271933814b451958866f45c61fc0685d3d651d3b58604453a5,2024-06-10T02:52:08.267000
|
||||
CVE-2024-5775,0,1,b9b29144baa0c961ebc0dbd2fb84e489ca3d89ccfbfe0ff78eaf8a4e3245c00b,2024-06-10T11:15:49.933000
|
||||
CVE-2024-5774,0,1,e971b384347a7cc0930e1395d23c05a358789e404b21920ddd898b3d929affd6,2024-06-10T13:15:51.190000
|
||||
CVE-2024-5775,0,0,b9b29144baa0c961ebc0dbd2fb84e489ca3d89ccfbfe0ff78eaf8a4e3245c00b,2024-06-10T11:15:49.933000
|
||||
CVE-2024-5785,1,1,da08d6a27d156da6da2a993e94a3a9affe76f8b1f21cd961c46de225730ea57a,2024-06-10T13:15:51.323000
|
||||
CVE-2024-5786,1,1,f655b6c5771818cb3e0fb260ae5f510fb8cd9d0fbef16f0d02b7c9f89dd648d4,2024-06-10T13:15:51.560000
|
||||
|
Can't render this file because it is too large.
|
Loading…
x
Reference in New Issue
Block a user