Auto-Update: 2024-06-10T14:00:49.285568+00:00

This commit is contained in:
cad-safe-bot 2024-06-10 14:03:42 +00:00
parent a3472994e7
commit e4779598a0
36 changed files with 735 additions and 107 deletions

View File

@ -2,8 +2,8 @@
"id": "CVE-2021-37147",
"sourceIdentifier": "security@apache.org",
"published": "2021-11-03T16:15:07.987",
"lastModified": "2024-02-09T02:28:42.050",
"vulnStatus": "Analyzed",
"lastModified": "2024-06-10T13:15:49.490",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@ -65,7 +65,7 @@
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"source": "security@apache.org",
"type": "Primary",
"description": [
{
@ -79,12 +79,16 @@
]
},
{
"source": "security@apache.org",
"source": "nvd@nist.gov",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-20"
},
{
"lang": "en",
"value": "CWE-444"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-0596",
"sourceIdentifier": "security@wordfence.com",
"published": "2024-02-10T07:15:08.700",
"lastModified": "2024-02-16T21:34:53.293",
"vulnStatus": "Analyzed",
"lastModified": "2024-06-10T13:15:49.863",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@ -17,7 +17,7 @@
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"source": "security@wordfence.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
@ -37,18 +37,18 @@
"impactScore": 1.4
},
{
"source": "security@wordfence.com",
"source": "nvd@nist.gov",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5.3,
"baseSeverity": "MEDIUM"

View File

@ -0,0 +1,44 @@
{
"id": "CVE-2024-1228",
"sourceIdentifier": "cvd@cert.pl",
"published": "2024-06-10T12:15:09.430",
"lastModified": "2024-06-10T12:40:41.360",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "Use of hard-coded password to the patients' database allows an attacker to retrieve sensitive data stored in the database. The password is the same among all Eurosoft Przychodnia installations.\n\nThis issue affects Eurosoft Przychodnia software before\u00a0version\u00a020240417.001 (from that version vulnerability is fixed)."
},
{
"lang": "es",
"value": "El uso de una contrase\u00f1a codificada para la base de datos de los pacientes permite a un atacante recuperar datos confidenciales almacenados en la base de datos. La contrase\u00f1a es la misma en todas las instalaciones de Eurosoft Przychodnia. Este problema afecta al software Eurosoft Przychodnia antes de la versi\u00f3n 20240417.001 (a partir de esa versi\u00f3n se soluciona la vulnerabilidad)."
}
],
"metrics": {},
"weaknesses": [
{
"source": "cvd@cert.pl",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-798"
}
]
}
],
"references": [
{
"url": "https://cert.pl/en/posts/2024/06/CVE-2024-1228/",
"source": "cvd@cert.pl"
},
{
"url": "https://cert.pl/posts/2024/06/CVE-2024-1228/",
"source": "cvd@cert.pl"
},
{
"url": "https://www.eurosoft.com.pl/eurosoft-przychodnia",
"source": "cvd@cert.pl"
}
]
}

View File

@ -2,12 +2,16 @@
"id": "CVE-2024-21751",
"sourceIdentifier": "audit@patchstack.com",
"published": "2024-06-10T08:15:47.603",
"lastModified": "2024-06-10T08:15:47.603",
"vulnStatus": "Received",
"lastModified": "2024-06-10T12:40:41.360",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "Missing Authorization vulnerability in RabbitLoader.This issue affects RabbitLoader: from n/a through 2.19.13."
},
{
"lang": "es",
"value": "Vulnerabilidad de autorizaci\u00f3n faltante en RabbitLoader. Este problema afecta a RabbitLoader: desde n/a hasta 2.19.13."
}
],
"metrics": {

View File

@ -2,12 +2,16 @@
"id": "CVE-2024-22296",
"sourceIdentifier": "audit@patchstack.com",
"published": "2024-06-10T08:15:48.017",
"lastModified": "2024-06-10T08:15:48.017",
"vulnStatus": "Received",
"lastModified": "2024-06-10T12:40:41.360",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "Missing Authorization vulnerability in Code for Recovery 12 Step Meeting List.This issue affects 12 Step Meeting List: from n/a through 3.14.28."
},
{
"lang": "es",
"value": "Vulnerabilidad de autorizaci\u00f3n faltante en Code for Recovery 12 Step Meeting List. Este problema afecta a la lista de reuniones de 12 pasos: desde n/a hasta 3.14.28."
}
],
"metrics": {

View File

@ -2,12 +2,16 @@
"id": "CVE-2024-22298",
"sourceIdentifier": "audit@patchstack.com",
"published": "2024-06-10T08:15:48.253",
"lastModified": "2024-06-10T08:15:48.253",
"vulnStatus": "Received",
"lastModified": "2024-06-10T12:40:41.360",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "Missing Authorization vulnerability in TMS Amelia ameliabooking.This issue affects Amelia: from n/a through 1.0.98."
},
{
"lang": "es",
"value": "Vulnerabilidad de falta de autorizaci\u00f3n en TMS Amelia ameliabooking. Este problema afecta a Amelia: desde n/a hasta 1.0.98."
}
],
"metrics": {

View File

@ -2,12 +2,16 @@
"id": "CVE-2024-23524",
"sourceIdentifier": "audit@patchstack.com",
"published": "2024-06-10T08:15:48.483",
"lastModified": "2024-06-10T08:15:48.483",
"vulnStatus": "Received",
"lastModified": "2024-06-10T12:40:41.360",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "Missing Authorization vulnerability in ONTRAPORT Inc. PilotPress.This issue affects PilotPress: from n/a through 2.0.30."
},
{
"lang": "es",
"value": "Vulnerabilidad de autorizaci\u00f3n faltante en ONTRAPORT Inc. PilotPress. Este problema afecta a PilotPress: desde n/a hasta 2.0.30."
}
],
"metrics": {

View File

@ -2,12 +2,12 @@
"id": "CVE-2024-27936",
"sourceIdentifier": "security-advisories@github.com",
"published": "2024-03-21T02:52:22.813",
"lastModified": "2024-03-21T12:58:51.093",
"lastModified": "2024-06-10T13:15:50.197",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "Deno is a JavaScript, TypeScript, and WebAssembly runtime with secure defaults. Starting in version 1.32.1 and prior to version 1.41 of the deno_runtime library, maliciously crafted permission request can show the spoofed permission prompt by inserting a broken ANSI escape sequence into the request contents. Deno is stripping any ANSI escape sequences from the permission prompt, but permissions given to the program are based on the contents that contain the ANSI escape sequences. Any Deno program can spoof the content of the interactive permission prompt by inserting a broken ANSI code, which allows a malicious Deno program to display the wrong file path or program name to the user. Version 1.41 of the deno_runtime library contains a patch for the issue."
"value": "Deno is a JavaScript, TypeScript, and WebAssembly runtime with secure defaults. Starting in version 1.32.1 and prior to version 1.41.0 of the deno library, maliciously crafted permission request can show the spoofed permission prompt by inserting a broken ANSI escape sequence into the request contents. Deno is stripping any ANSI escape sequences from the permission prompt, but permissions given to the program are based on the contents that contain the ANSI escape sequences. Any Deno program can spoof the content of the interactive permission prompt by inserting a broken ANSI code, which allows a malicious Deno program to display the wrong file path or program name to the user. Version 1.41.0 of the deno library contains a patch for the issue."
},
{
"lang": "es",

View File

@ -0,0 +1,59 @@
{
"id": "CVE-2024-28833",
"sourceIdentifier": "security@checkmk.com",
"published": "2024-06-10T12:15:09.927",
"lastModified": "2024-06-10T12:40:41.360",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "Improper restriction of excessive authentication attempts with two factor authentication methods in Checkmk 2.3 before 2.3.0p6 facilitates brute-forcing of second factor mechanisms."
},
{
"lang": "es",
"value": "La restricci\u00f3n inadecuada de intentos de autenticaci\u00f3n excesivos con m\u00e9todos de autenticaci\u00f3n de dos factores en Checkmk 2.3 anterior a 2.3.0p6 facilita la fuerza bruta de los mecanismos de segundo factor."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security@checkmk.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N",
"attackVector": "NETWORK",
"attackComplexity": "HIGH",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5.9,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.2,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "security@checkmk.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-307"
}
]
}
],
"references": [
{
"url": "https://checkmk.com/werk/16830",
"source": "security@checkmk.com"
}
]
}

View File

@ -2,12 +2,16 @@
"id": "CVE-2024-35717",
"sourceIdentifier": "audit@patchstack.com",
"published": "2024-06-10T08:15:48.723",
"lastModified": "2024-06-10T08:15:48.723",
"vulnStatus": "Received",
"lastModified": "2024-06-10T12:40:41.360",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "Missing Authorization vulnerability in A WP Life Media Slider \u2013 Photo Sleder, Video Slider, Link Slider, Carousal Slideshow.This issue affects Media Slider \u2013 Photo Sleder, Video Slider, Link Slider, Carousal Slideshow: from n/a through 1.3.9."
},
{
"lang": "es",
"value": "Vulnerabilidad de autorizaci\u00f3n faltante en A WP Life Media Slider: Photo Sleder, Video Slider, Link Slider, Carousal Slideshow. Este problema afecta a Media Slider: Photo Sleder, Video Slider, Link Slider, Carousal Slideshow: desde n/a hasta 1.3.9."
}
],
"metrics": {

View File

@ -2,12 +2,16 @@
"id": "CVE-2024-35720",
"sourceIdentifier": "audit@patchstack.com",
"published": "2024-06-10T08:15:48.950",
"lastModified": "2024-06-10T08:15:48.950",
"vulnStatus": "Received",
"lastModified": "2024-06-10T12:40:41.360",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "Missing Authorization vulnerability in A WP Life Album Gallery \u2013 WordPress Gallery.This issue affects Album Gallery \u2013 WordPress Gallery: from n/a through 1.5.7."
},
{
"lang": "es",
"value": "Vulnerabilidad de autorizaci\u00f3n faltante en A WP Life Album Gallery \u2013 WordPress Gallery. Este problema afecta a la Galer\u00eda de \u00e1lbumes \u2013 Galer\u00eda de WordPress: desde n/a hasta 1.5.7."
}
],
"metrics": {

View File

@ -2,12 +2,16 @@
"id": "CVE-2024-35721",
"sourceIdentifier": "audit@patchstack.com",
"published": "2024-06-10T08:15:49.180",
"lastModified": "2024-06-10T08:15:49.180",
"vulnStatus": "Received",
"lastModified": "2024-06-10T12:40:41.360",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "Missing Authorization vulnerability in A WP Life Image Gallery \u2013 Lightbox Gallery, Responsive Photo Gallery, Masonry Gallery.This issue affects Image Gallery \u2013 Lightbox Gallery, Responsive Photo Gallery, Masonry Gallery: from n/a through 1.4.5."
},
{
"lang": "es",
"value": "Vulnerabilidad de autorizaci\u00f3n faltante en A WP Life Image Gallery: Lightbox Gallery, Responsive Photo Gallery, Masonry Gallery. Este problema afecta a la Galer\u00eda de im\u00e1genes: Lightbox Gallery, Responsive Photo Gallery, Masonry Gallery: desde n/a hasta 1.4.5."
}
],
"metrics": {

View File

@ -2,12 +2,16 @@
"id": "CVE-2024-35722",
"sourceIdentifier": "audit@patchstack.com",
"published": "2024-06-10T08:15:49.400",
"lastModified": "2024-06-10T08:15:49.400",
"vulnStatus": "Received",
"lastModified": "2024-06-10T12:40:41.360",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "Missing Authorization vulnerability in A WP Life Slider Responsive Slideshow \u2013 Image slider, Gallery slideshow.This issue affects Slider Responsive Slideshow \u2013 Image slider, Gallery slideshow: from n/a through 1.4.0."
},
{
"lang": "es",
"value": "Vulnerabilidad de falta de autorizaci\u00f3n en A WP Life Slider Responsive Slideshow \u2013 Image slider, Gallery slideshow. Este problema afecta a una presentaci\u00f3n de diapositivas adaptable al control deslizante: control deslizante de im\u00e1genes, presentaci\u00f3n de diapositivas de la galer\u00eda: desde n/a hasta 1.4.0."
}
],
"metrics": {

View File

@ -2,12 +2,16 @@
"id": "CVE-2024-35723",
"sourceIdentifier": "audit@patchstack.com",
"published": "2024-06-10T08:15:49.627",
"lastModified": "2024-06-10T08:15:49.627",
"vulnStatus": "Received",
"lastModified": "2024-06-10T12:40:41.360",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "Missing Authorization vulnerability in Andrew Rapps Dashboard To-Do List.This issue affects Dashboard To-Do List: from n/a through 1.2.0."
},
{
"lang": "es",
"value": "Vulnerabilidad de autorizaci\u00f3n faltante en Andrew Rapps Dashboard To-Do List. Este problema afecta la lista de tareas pendientes del panel: desde n/a hasta 1.2.0."
}
],
"metrics": {

View File

@ -2,12 +2,16 @@
"id": "CVE-2024-35724",
"sourceIdentifier": "audit@patchstack.com",
"published": "2024-06-10T08:15:49.853",
"lastModified": "2024-06-10T08:15:49.853",
"vulnStatus": "Received",
"lastModified": "2024-06-10T12:40:41.360",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "Missing Authorization vulnerability in Bosa Themes Bosa Elementor Addons and Templates for WooCommerce.This issue affects Bosa Elementor Addons and Templates for WooCommerce: from n/a through 1.0.12."
},
{
"lang": "es",
"value": "Vulnerabilidad de autorizaci\u00f3n faltante en Bosa Themes Bosa Elementor Addons and Templates for WooCommerce. Este problema afecta a los complementos y plantillas de Bosa Elementor para WooCommerce: desde n/a hasta 1.0.12."
}
],
"metrics": {

View File

@ -2,12 +2,16 @@
"id": "CVE-2024-35725",
"sourceIdentifier": "audit@patchstack.com",
"published": "2024-06-10T08:15:50.130",
"lastModified": "2024-06-10T08:15:50.130",
"vulnStatus": "Received",
"lastModified": "2024-06-10T12:40:41.360",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "Missing Authorization vulnerability in LA-Studio LA-Studio Element Kit for Elementor.This issue affects LA-Studio Element Kit for Elementor: from n/a through 1.3.6."
},
{
"lang": "es",
"value": "Vulnerabilidad de autorizaci\u00f3n faltante en LA-Studio LA-Studio Element Kit para Elementor. Este problema afecta a LA-Studio Element Kit para Elementor: desde n/a hasta 1.3.6."
}
],
"metrics": {

View File

@ -2,12 +2,16 @@
"id": "CVE-2024-35726",
"sourceIdentifier": "audit@patchstack.com",
"published": "2024-06-10T08:15:50.370",
"lastModified": "2024-06-10T08:15:50.370",
"vulnStatus": "Received",
"lastModified": "2024-06-10T12:40:41.360",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "Missing Authorization vulnerability in ThemeKraft WooBuddy.This issue affects WooBuddy: from n/a through 3.4.19."
},
{
"lang": "es",
"value": "Vulnerabilidad de autorizaci\u00f3n faltante en ThemeKraft WooBuddy. Este problema afecta a WooBuddy: desde n/a hasta 3.4.19."
}
],
"metrics": {

View File

@ -2,12 +2,16 @@
"id": "CVE-2024-35727",
"sourceIdentifier": "audit@patchstack.com",
"published": "2024-06-10T08:15:50.600",
"lastModified": "2024-06-10T08:15:50.600",
"vulnStatus": "Received",
"lastModified": "2024-06-10T12:40:41.360",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "Missing Authorization vulnerability in actpro Extra Product Options for WooCommerce.This issue affects Extra Product Options for WooCommerce: from n/a through 3.0.6."
},
{
"lang": "es",
"value": "Vulnerabilidad de autorizaci\u00f3n faltante en actpro Extra Product Options for WooCommerce. Este problema afecta a las opciones de productos adicionales para WooCommerce: desde n/a hasta 3.0.6."
}
],
"metrics": {

View File

@ -2,12 +2,16 @@
"id": "CVE-2024-35729",
"sourceIdentifier": "audit@patchstack.com",
"published": "2024-06-10T08:15:50.820",
"lastModified": "2024-06-10T08:15:50.820",
"vulnStatus": "Received",
"lastModified": "2024-06-10T12:40:41.360",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "Missing Authorization vulnerability in Tickera.This issue affects Tickera: from n/a through 3.5.2.6."
},
{
"lang": "es",
"value": "Vulnerabilidad de autorizaci\u00f3n faltante en Tickera. Este problema afecta a Tickera: desde n/a hasta 3.5.2.6."
}
],
"metrics": {

View File

@ -2,12 +2,16 @@
"id": "CVE-2024-35735",
"sourceIdentifier": "audit@patchstack.com",
"published": "2024-06-10T08:15:51.053",
"lastModified": "2024-06-10T08:15:51.053",
"vulnStatus": "Received",
"lastModified": "2024-06-10T12:40:41.360",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "Missing Authorization vulnerability in CodePeople WP Time Slots Booking Form.This issue affects WP Time Slots Booking Form: from n/a through 1.2.11."
},
{
"lang": "es",
"value": "Vulnerabilidad de autorizaci\u00f3n faltante en CodePeople WP Time Slots Booking Form. Este problema afecta al formulario de reserva de franjas horarias de WP: desde n/a hasta 1.2.11."
}
],
"metrics": {

View File

@ -2,12 +2,16 @@
"id": "CVE-2024-35741",
"sourceIdentifier": "audit@patchstack.com",
"published": "2024-06-10T08:15:51.277",
"lastModified": "2024-06-10T08:15:51.277",
"vulnStatus": "Received",
"lastModified": "2024-06-10T12:40:41.360",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "Missing Authorization vulnerability in Awesome Support Team Awesome Support.This issue affects Awesome Support: from n/a through 6.1.7."
},
{
"lang": "es",
"value": "Vulnerabilidad de autorizaci\u00f3n faltante en Awesome Support Team Awesome Support. Este problema afecta a Awesome Support: desde n/a hasta 6.1.7."
}
],
"metrics": {

View File

@ -2,12 +2,16 @@
"id": "CVE-2024-35742",
"sourceIdentifier": "audit@patchstack.com",
"published": "2024-06-10T08:15:51.507",
"lastModified": "2024-06-10T08:15:51.507",
"vulnStatus": "Received",
"lastModified": "2024-06-10T12:40:41.360",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "Missing Authorization vulnerability in Code Parrots Easy Forms for Mailchimp.This issue affects Easy Forms for Mailchimp: from n/a through 6.9.0."
},
{
"lang": "es",
"value": "Vulnerabilidad de autorizaci\u00f3n faltante en Code Parrots Easy Forms para Mailchimp. Este problema afecta a Easy Forms para Mailchimp: desde n/a hasta 6.9.0."
}
],
"metrics": {

View File

@ -0,0 +1,71 @@
{
"id": "CVE-2024-36405",
"sourceIdentifier": "security-advisories@github.com",
"published": "2024-06-10T13:15:50.700",
"lastModified": "2024-06-10T13:15:50.700",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "liboqs is a C-language cryptographic library that provides implementations of post-quantum cryptography algorithms. A control-flow timing lean has been identified in the reference implementation of the Kyber key encapsulation mechanism when it is compiled with Clang 15-18 for `-Os`, `-O1`, and other compilation options. A proof-of-concept local attack on the reference implementation leaks the entire ML-KEM 512 secret key in ~10 minutes using end-to-end decapsulation timing measurements. The issue has been fixed in version 0.10.1. As a possible workaround, some compiler options may produce vectorized code that does not leak secret information, however relying on these compiler options as a workaround may not be reliable."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security-advisories@github.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N",
"attackVector": "NETWORK",
"attackComplexity": "HIGH",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5.9,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.2,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "security-advisories@github.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-208"
},
{
"lang": "en",
"value": "CWE-385"
}
]
}
],
"references": [
{
"url": "https://github.com/open-quantum-safe/liboqs/blob/7eecda6095c003ddded7175a1ffdf35a2ce63ed5/src/kem/kyber/pqcrystals-kyber_kyber512_ref/poly.c#L166",
"source": "security-advisories@github.com"
},
{
"url": "https://github.com/open-quantum-safe/liboqs/commit/982c762c242ef549c914891b47bf6e0ed6321f91",
"source": "security-advisories@github.com"
},
{
"url": "https://github.com/open-quantum-safe/liboqs/security/advisories/GHSA-f2v9-5498-2vpp",
"source": "security-advisories@github.com"
},
{
"url": "https://github.com/pq-crystals/kyber/commit/9b8d30698a3e7449aeb34e62339d4176f11e3c6c",
"source": "security-advisories@github.com"
}
]
}

View File

@ -2,12 +2,16 @@
"id": "CVE-2024-36971",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2024-06-10T09:15:09.127",
"lastModified": "2024-06-10T09:15:09.127",
"vulnStatus": "Received",
"lastModified": "2024-06-10T12:40:41.360",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet: fix __dst_negative_advice() race\n\n__dst_negative_advice() does not enforce proper RCU rules when\nsk->dst_cache must be cleared, leading to possible UAF.\n\nRCU rules are that we must first clear sk->sk_dst_cache,\nthen call dst_release(old_dst).\n\nNote that sk_dst_reset(sk) is implementing this protocol correctly,\nwhile __dst_negative_advice() uses the wrong order.\n\nGiven that ip6_negative_advice() has special logic\nagainst RTF_CACHE, this means each of the three ->negative_advice()\nexisting methods must perform the sk_dst_reset() themselves.\n\nNote the check against NULL dst is centralized in\n__dst_negative_advice(), there is no need to duplicate\nit in various callbacks.\n\nMany thanks to Clement Lecigne for tracking this issue.\n\nThis old bug became visible after the blamed commit, using UDP sockets."
},
{
"lang": "es",
"value": "En el kernel de Linux, se resolvi\u00f3 la siguiente vulnerabilidad: net: fix __dst_negative_advice() race __dst_negative_advice() no aplica las reglas adecuadas de RCU cuando se debe borrar sk->dst_cache, lo que genera una posible UAF. Las reglas de RCU son que primero debemos borrar sk->sk_dst_cache y luego llamar a dst_release(old_dst). Tenga en cuenta que sk_dst_reset(sk) implementa este protocolo correctamente, mientras que __dst_negative_advice() utiliza el orden incorrecto. Dado que ip6_negative_advice() tiene una l\u00f3gica especial contra RTF_CACHE, esto significa que cada uno de los tres ->negative_advice() m\u00e9todos existentes debe realizar sk_dst_reset() ellos mismos. Tenga en cuenta que la verificaci\u00f3n de NULL dst est\u00e1 centralizada en __dst_negative_advice(), no es necesario duplicarla en varias devoluciones de llamada. Muchas gracias a Clement Lecigne por dar seguimiento a este problema. Este antiguo error se hizo visible despu\u00e9s de la confirmaci\u00f3n culpada, utilizando sockets UDP."
}
],
"metrics": {},

View File

@ -0,0 +1,44 @@
{
"id": "CVE-2024-3699",
"sourceIdentifier": "cvd@cert.pl",
"published": "2024-06-10T12:15:10.243",
"lastModified": "2024-06-10T12:40:41.360",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "Use of hard-coded password to the patients' database allows an attacker to retrieve sensitive data stored in the database. The password is the same among all\u00a0drEryk Gabinet installations.This issue affects drEryk Gabinet software versions from 7.0.0.0 through 9.17.0.0."
},
{
"lang": "es",
"value": "El uso de una contrase\u00f1a codificada para la base de datos de los pacientes permite a un atacante recuperar datos confidenciales almacenados en la base de datos. La contrase\u00f1a es la misma en todas las instalaciones de drEryk Gabinet. Este problema afecta a las versiones del software drEryk Gabinet desde la 7.0.0.0 hasta la 9.17.0.0."
}
],
"metrics": {},
"weaknesses": [
{
"source": "cvd@cert.pl",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-798"
}
]
}
],
"references": [
{
"url": "https://cert.pl/en/posts/2024/06/CVE-2024-1228/",
"source": "cvd@cert.pl"
},
{
"url": "https://cert.pl/posts/2024/06/CVE-2024-1228/",
"source": "cvd@cert.pl"
},
{
"url": "https://dreryk.pl/produkty/gabinet/",
"source": "cvd@cert.pl"
}
]
}

View File

@ -0,0 +1,40 @@
{
"id": "CVE-2024-3700",
"sourceIdentifier": "cvd@cert.pl",
"published": "2024-06-10T12:15:10.370",
"lastModified": "2024-06-10T12:40:41.360",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "Use of hard-coded password to the patients' database allows an attacker to retrieve sensitive data stored in the database. The password is the same among all Simple Care software installations.\n\nThis issue affects\u00a0Estomed Sp. z o.o. Simple Care software in all versions. The software is no longer supported."
},
{
"lang": "es",
"value": "El uso de una contrase\u00f1a codificada para la base de datos de los pacientes permite a un atacante recuperar datos confidenciales almacenados en la base de datos. La contrase\u00f1a es la misma en todas las instalaciones del software Simple Care. Este problema afecta a Estomed Sp. z o.o. Software z oo Simple Care en todas las versiones. El software ya no es compatible."
}
],
"metrics": {},
"weaknesses": [
{
"source": "cvd@cert.pl",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-798"
}
]
}
],
"references": [
{
"url": "https://cert.pl/en/posts/2024/06/CVE-2024-1228/",
"source": "cvd@cert.pl"
},
{
"url": "https://cert.pl/posts/2024/06/CVE-2024-1228/",
"source": "cvd@cert.pl"
}
]
}

View File

@ -2,12 +2,16 @@
"id": "CVE-2024-4328",
"sourceIdentifier": "security@huntr.dev",
"published": "2024-06-10T08:15:51.730",
"lastModified": "2024-06-10T08:15:51.730",
"vulnStatus": "Received",
"lastModified": "2024-06-10T12:40:41.360",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "A Cross-Site Request Forgery (CSRF) vulnerability exists in the clear_personality_files_list function of the parisneo/lollms-webui v9.6. The vulnerability arises from the use of a GET request to clear personality files list, which lacks proper CSRF protection. This flaw allows attackers to trick users into performing actions without their consent, such as deleting important files on the system. The issue is present in the application's handling of requests, making it susceptible to CSRF attacks that could lead to unauthorized actions being performed on behalf of the user."
},
{
"lang": "es",
"value": "Existe una vulnerabilidad de Cross-Site Request Forgery (CSRF) en la funci\u00f3n clear_personality_files_list de parisneo/lollms-webui v9.6. La vulnerabilidad surge del uso de una solicitud GET para borrar la lista de archivos de personalidad, que carece de la protecci\u00f3n CSRF adecuada. Esta falla permite a los atacantes enga\u00f1ar a los usuarios para que realicen acciones sin su consentimiento, como eliminar archivos importantes del sistema. El problema est\u00e1 presente en el manejo de solicitudes por parte de la aplicaci\u00f3n, lo que la hace susceptible a ataques CSRF que podr\u00edan llevar a la realizaci\u00f3n de acciones no autorizadas en nombre del usuario."
}
],
"metrics": {

View File

@ -2,16 +2,40 @@
"id": "CVE-2024-4577",
"sourceIdentifier": "security@php.net",
"published": "2024-06-09T20:15:09.550",
"lastModified": "2024-06-10T03:15:09.057",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-06-10T12:50:06.250",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "In PHP versions\u00a08.1.* before 8.1.29, 8.2.* before 8.2.20, 8.3.* before 8.3.8, when using Apache and PHP-CGI on Windows, if the system is set up to use certain code pages, Windows may use \"Best-Fit\" behavior to replace characters in command line given to\u00a0Win32 API functions. PHP CGI module may misinterpret those characters as PHP options, which may allow a malicious user to pass options to PHP binary being run, and thus reveal the source code of scripts, run arbitrary PHP code on the server, etc."
},
{
"lang": "es",
"value": "En las versiones de PHP 8.1.* anteriores a 8.1.29, 8.2.* anteriores a 8.2.20, 8.3.* anteriores a 8.3.8, cuando se usa Apache y PHP-CGI en Windows, si el sistema est\u00e1 configurado para usar ciertas p\u00e1ginas de c\u00f3digos, Windows puede utilizar el comportamiento \"Mejor ajuste\" para reemplazar caracteres en la l\u00ednea de comando proporcionada a las funciones de la API de Win32. El m\u00f3dulo PHP CGI puede malinterpretar esos caracteres como opciones de PHP, lo que puede permitir a un usuario malintencionado pasar opciones al binario PHP que se est\u00e1 ejecutando y, por lo tanto, revelar el c\u00f3digo fuente de los scripts, ejecutar c\u00f3digo PHP arbitrario en el servidor, etc."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
},
{
"source": "security@php.net",
"type": "Secondary",
@ -35,6 +59,16 @@
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-78"
}
]
},
{
"source": "security@php.net",
"type": "Secondary",
@ -46,58 +80,150 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:php:php:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.0.0",
"versionEndExcluding": "8.1.29",
"matchCriteriaId": "A8DF5D29-9ADB-4CE9-9DCE-9FFECA97800C"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:php:php:*:*:*:*:*:*:*:*",
"versionStartIncluding": "8.2.0",
"versionEndExcluding": "8.2.20",
"matchCriteriaId": "A39988FF-D854-4277-9D66-6911AF371DD3"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:php:php:*:*:*:*:*:*:*:*",
"versionStartIncluding": "8.3.0",
"versionEndExcluding": "8.3.8",
"matchCriteriaId": "F579FFC1-4F81-4755-B14B-3AA73AC9FF7A"
}
]
}
]
}
],
"references": [
{
"url": "https://arstechnica.com/security/2024/06/php-vulnerability-allows-attackers-to-run-malicious-code-on-windows-servers/",
"source": "security@php.net"
"source": "security@php.net",
"tags": [
"Exploit",
"Third Party Advisory"
]
},
{
"url": "https://blog.orange.tw/2024/06/cve-2024-4577-yet-another-php-rce.html",
"source": "security@php.net"
"source": "security@php.net",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://cert.be/en/advisory/warning-php-remote-code-execution-patch-immediately",
"source": "security@php.net",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://devco.re/blog/2024/06/06/security-alert-cve-2024-4577-php-cgi-argument-injection-vulnerability-en/",
"source": "security@php.net"
"source": "security@php.net",
"tags": [
"Exploit",
"Third Party Advisory"
]
},
{
"url": "https://github.com/11whoami99/CVE-2024-4577",
"source": "security@php.net"
"source": "security@php.net",
"tags": [
"Exploit"
]
},
{
"url": "https://github.com/php/php-src/security/advisories/GHSA-3qgc-jrrr-25jv",
"source": "security@php.net"
"source": "security@php.net",
"tags": [
"Broken Link"
]
},
{
"url": "https://github.com/rapid7/metasploit-framework/pull/19247",
"source": "security@php.net"
"source": "security@php.net",
"tags": [
"Exploit"
]
},
{
"url": "https://github.com/watchtowrlabs/CVE-2024-4577",
"source": "security@php.net"
"source": "security@php.net",
"tags": [
"Exploit",
"Third Party Advisory"
]
},
{
"url": "https://github.com/xcanwin/CVE-2024-4577-PHP-RCE",
"source": "security@php.net"
"source": "security@php.net",
"tags": [
"Exploit",
"Third Party Advisory"
]
},
{
"url": "https://isc.sans.edu/diary/30994",
"source": "security@php.net",
"tags": [
"Exploit",
"Third Party Advisory"
]
},
{
"url": "https://labs.watchtowr.com/no-way-php-strikes-again-cve-2024-4577/",
"source": "security@php.net"
"source": "security@php.net",
"tags": [
"Exploit",
"Third Party Advisory"
]
},
{
"url": "https://www.imperva.com/blog/imperva-protects-against-critical-php-vulnerability-cve-2024-4577/",
"source": "security@php.net"
"source": "security@php.net",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://www.php.net/ChangeLog-8.php#8.1.29",
"source": "security@php.net"
"source": "security@php.net",
"tags": [
"Release Notes"
]
},
{
"url": "https://www.php.net/ChangeLog-8.php#8.2.20",
"source": "security@php.net"
"source": "security@php.net",
"tags": [
"Release Notes"
]
},
{
"url": "https://www.php.net/ChangeLog-8.php#8.3.8",
"source": "security@php.net"
"source": "security@php.net",
"tags": [
"Release Notes"
]
}
]
}

View File

@ -2,12 +2,16 @@
"id": "CVE-2024-4744",
"sourceIdentifier": "audit@patchstack.com",
"published": "2024-06-10T08:15:51.970",
"lastModified": "2024-06-10T08:15:51.970",
"vulnStatus": "Received",
"lastModified": "2024-06-10T12:40:41.360",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "Missing Authorization vulnerability in Avirtum iPages Flipbook.This issue affects iPages Flipbook: from n/a through 1.5.1."
},
{
"lang": "es",
"value": "Vulnerabilidad de autorizaci\u00f3n faltante en Avirtum iPages Flipbook. Este problema afecta a iPages Flipbook: desde n/a hasta 1.5.1."
}
],
"metrics": {

View File

@ -2,12 +2,16 @@
"id": "CVE-2024-4745",
"sourceIdentifier": "audit@patchstack.com",
"published": "2024-06-10T08:15:52.210",
"lastModified": "2024-06-10T08:15:52.210",
"vulnStatus": "Received",
"lastModified": "2024-06-10T12:40:41.360",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "Missing Authorization vulnerability in RafflePress Giveaways and Contests by RafflePress.This issue affects Giveaways and Contests by RafflePress: from n/a through 1.12.4."
},
{
"lang": "es",
"value": "Vulnerabilidad de autorizaci\u00f3n faltante en RafflePress Giveaways and Contests by RafflePress. Este problema afecta a los sorteos y concursos de RafflePress: desde n/a hasta 1.12.4."
}
],
"metrics": {

View File

@ -2,12 +2,16 @@
"id": "CVE-2024-4746",
"sourceIdentifier": "audit@patchstack.com",
"published": "2024-06-10T08:15:52.430",
"lastModified": "2024-06-10T08:15:52.430",
"vulnStatus": "Received",
"lastModified": "2024-06-10T12:40:41.360",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "Missing Authorization vulnerability in Netgsm.This issue affects Netgsm: from n/a through 2.9.16."
},
{
"lang": "es",
"value": "Vulnerabilidad de autorizaci\u00f3n faltante en Netgsm. Este problema afecta a Netgsm: desde n/a hasta 2.9.16."
}
],
"metrics": {

View File

@ -2,12 +2,16 @@
"id": "CVE-2024-5774",
"sourceIdentifier": "cna@vuldb.com",
"published": "2024-06-09T06:15:07.410",
"lastModified": "2024-06-10T02:52:08.267",
"lastModified": "2024-06-10T13:15:51.190",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "A vulnerability has been found in SourceCodester Stock Management System 1.0 and classified as critical. Affected by this vulnerability is an unknown functionality of the file index.php of the component Login. The manipulation of the argument username/password leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-267457 was assigned to this vulnerability."
},
{
"lang": "es",
"value": "Una vulnerabilidad fue encontrada en SourceCodester Stock Management System 1.0 y clasificada como cr\u00edtica. Una funci\u00f3n desconocida del archivo index.php del componente Login es afectada por esta vulnerabilidad. La manipulaci\u00f3n del argumento nombre de usuario/contrase\u00f1a conduce a la inyecci\u00f3n de SQL. El ataque se puede lanzar de forma remota. El exploit ha sido divulgado al p\u00fablico y puede utilizarse. A esta vulnerabilidad se le asign\u00f3 el identificador VDB-267457."
}
],
"metrics": {

View File

@ -0,0 +1,55 @@
{
"id": "CVE-2024-5785",
"sourceIdentifier": "cve-coordination@incibe.es",
"published": "2024-06-10T13:15:51.323",
"lastModified": "2024-06-10T13:15:51.323",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "Command injection vulnerability in Comtrend router WLD71-T1_v2.0.201820, affecting the GRG-4280us version. This vulnerability could allow an authenticated user to execute commands inside the router by making a POST request to the URL \u201c/boaform/admin/formUserTracert\u201d."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "cve-coordination@incibe.es",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "ADJACENT_NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.0,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.1,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "cve-coordination@incibe.es",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-78"
}
]
}
],
"references": [
{
"url": "https://www.incibe.es/en/incibe-cert/notices/aviso/multiple-vulnerabilities-comtrend-router",
"source": "cve-coordination@incibe.es"
}
]
}

View File

@ -0,0 +1,55 @@
{
"id": "CVE-2024-5786",
"sourceIdentifier": "cve-coordination@incibe.es",
"published": "2024-06-10T13:15:51.560",
"lastModified": "2024-06-10T13:15:51.560",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "Cross-Site Request Forgery vulnerability in Comtrend router WLD71-T1_v2.0.201820, affecting the GRG-4280us version. This vulnerability allows an attacker to force an end user to execute unwanted actions in a web application to which he is authenticated."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "cve-coordination@incibe.es",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "cve-coordination@incibe.es",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-352"
}
]
}
],
"references": [
{
"url": "https://www.incibe.es/en/incibe-cert/notices/aviso/multiple-vulnerabilities-comtrend-router",
"source": "cve-coordination@incibe.es"
}
]
}

View File

@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours.
### Last Repository Update
```plain
2024-06-10T12:00:18.174782+00:00
2024-06-10T14:00:49.285568+00:00
```
### Most recent CVE Modification Timestamp synchronized with NVD
```plain
2024-06-10T11:15:49.933000+00:00
2024-06-10T13:15:51.560000+00:00
```
### Last Data Feed Release
@ -33,20 +33,51 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
### Total Number of included CVEs
```plain
253228
253235
```
### CVEs added in the last Commit
Recently added CVEs: `0`
Recently added CVEs: `7`
- [CVE-2024-1228](CVE-2024/CVE-2024-12xx/CVE-2024-1228.json) (`2024-06-10T12:15:09.430`)
- [CVE-2024-28833](CVE-2024/CVE-2024-288xx/CVE-2024-28833.json) (`2024-06-10T12:15:09.927`)
- [CVE-2024-36405](CVE-2024/CVE-2024-364xx/CVE-2024-36405.json) (`2024-06-10T13:15:50.700`)
- [CVE-2024-3699](CVE-2024/CVE-2024-36xx/CVE-2024-3699.json) (`2024-06-10T12:15:10.243`)
- [CVE-2024-3700](CVE-2024/CVE-2024-37xx/CVE-2024-3700.json) (`2024-06-10T12:15:10.370`)
- [CVE-2024-5785](CVE-2024/CVE-2024-57xx/CVE-2024-5785.json) (`2024-06-10T13:15:51.323`)
- [CVE-2024-5786](CVE-2024/CVE-2024-57xx/CVE-2024-5786.json) (`2024-06-10T13:15:51.560`)
### CVEs modified in the last Commit
Recently modified CVEs: `1`
Recently modified CVEs: `27`
- [CVE-2024-5775](CVE-2024/CVE-2024-57xx/CVE-2024-5775.json) (`2024-06-10T11:15:49.933`)
- [CVE-2024-21751](CVE-2024/CVE-2024-217xx/CVE-2024-21751.json) (`2024-06-10T12:40:41.360`)
- [CVE-2024-22296](CVE-2024/CVE-2024-222xx/CVE-2024-22296.json) (`2024-06-10T12:40:41.360`)
- [CVE-2024-22298](CVE-2024/CVE-2024-222xx/CVE-2024-22298.json) (`2024-06-10T12:40:41.360`)
- [CVE-2024-23524](CVE-2024/CVE-2024-235xx/CVE-2024-23524.json) (`2024-06-10T12:40:41.360`)
- [CVE-2024-27936](CVE-2024/CVE-2024-279xx/CVE-2024-27936.json) (`2024-06-10T13:15:50.197`)
- [CVE-2024-35717](CVE-2024/CVE-2024-357xx/CVE-2024-35717.json) (`2024-06-10T12:40:41.360`)
- [CVE-2024-35720](CVE-2024/CVE-2024-357xx/CVE-2024-35720.json) (`2024-06-10T12:40:41.360`)
- [CVE-2024-35721](CVE-2024/CVE-2024-357xx/CVE-2024-35721.json) (`2024-06-10T12:40:41.360`)
- [CVE-2024-35722](CVE-2024/CVE-2024-357xx/CVE-2024-35722.json) (`2024-06-10T12:40:41.360`)
- [CVE-2024-35723](CVE-2024/CVE-2024-357xx/CVE-2024-35723.json) (`2024-06-10T12:40:41.360`)
- [CVE-2024-35724](CVE-2024/CVE-2024-357xx/CVE-2024-35724.json) (`2024-06-10T12:40:41.360`)
- [CVE-2024-35725](CVE-2024/CVE-2024-357xx/CVE-2024-35725.json) (`2024-06-10T12:40:41.360`)
- [CVE-2024-35726](CVE-2024/CVE-2024-357xx/CVE-2024-35726.json) (`2024-06-10T12:40:41.360`)
- [CVE-2024-35727](CVE-2024/CVE-2024-357xx/CVE-2024-35727.json) (`2024-06-10T12:40:41.360`)
- [CVE-2024-35729](CVE-2024/CVE-2024-357xx/CVE-2024-35729.json) (`2024-06-10T12:40:41.360`)
- [CVE-2024-35735](CVE-2024/CVE-2024-357xx/CVE-2024-35735.json) (`2024-06-10T12:40:41.360`)
- [CVE-2024-35741](CVE-2024/CVE-2024-357xx/CVE-2024-35741.json) (`2024-06-10T12:40:41.360`)
- [CVE-2024-35742](CVE-2024/CVE-2024-357xx/CVE-2024-35742.json) (`2024-06-10T12:40:41.360`)
- [CVE-2024-36971](CVE-2024/CVE-2024-369xx/CVE-2024-36971.json) (`2024-06-10T12:40:41.360`)
- [CVE-2024-4328](CVE-2024/CVE-2024-43xx/CVE-2024-4328.json) (`2024-06-10T12:40:41.360`)
- [CVE-2024-4577](CVE-2024/CVE-2024-45xx/CVE-2024-4577.json) (`2024-06-10T12:50:06.250`)
- [CVE-2024-4744](CVE-2024/CVE-2024-47xx/CVE-2024-4744.json) (`2024-06-10T12:40:41.360`)
- [CVE-2024-4745](CVE-2024/CVE-2024-47xx/CVE-2024-4745.json) (`2024-06-10T12:40:41.360`)
- [CVE-2024-4746](CVE-2024/CVE-2024-47xx/CVE-2024-4746.json) (`2024-06-10T12:40:41.360`)
- [CVE-2024-5774](CVE-2024/CVE-2024-57xx/CVE-2024-5774.json) (`2024-06-10T13:15:51.190`)
## Download and Usage

View File

@ -179578,7 +179578,7 @@ CVE-2021-3714,0,0,5c6e5f6a329d110bcfba73c685299d744bba4a1bd7515c4bab58ae7821f0cb
CVE-2021-37144,0,0,d619e79d3924f2a62af0fd35cf074d468226de7525c91ec3198a864146759a1b,2021-08-09T13:38:47.223000
CVE-2021-37145,0,0,aab3cdaa1746410e06ef1709540a0cb14ea37ca425ea7118027adb30d4660601,2024-05-17T01:59:07.990000
CVE-2021-37146,0,0,8c509316ffa5a72af7d4b47c98a2b9d285a4e8362382835d7956dfb73d2acfb8,2021-10-06T19:37:36.300000
CVE-2021-37147,0,0,0f777661a00a66d2bf8d2fc97f2d7fbd0453691c19c1934be2efd19bc5c8379a,2024-02-09T02:28:42.050000
CVE-2021-37147,0,1,e085b7ff8ded26c4b192fb33ff5081f6c21aec3ed4dd48b558be1a02cd3fd564,2024-06-10T13:15:49.490000
CVE-2021-37148,0,0,531207e3cc5098d67aa6cc598a7c2aa27aef781d2582956e3e1fee942b9da5de,2022-10-14T11:54:11.530000
CVE-2021-37149,0,0,06665dcf8ac57932acce720544508b3787ecb37e8163b3630591a8c6b7e9046f,2022-10-14T11:51:37.010000
CVE-2021-3715,0,0,56184918d3bba2bc5c90a5358ec32e52f8dc457949f0bf8d6b7933213bcb0179,2023-01-24T15:07:31.143000
@ -240763,7 +240763,7 @@ CVE-2024-0592,0,0,241b59d1ddeb9a423798f9c7a6f561a77ced54e58402df14a4ade24dc0352d
CVE-2024-0593,0,0,89e7bfb235791aea777eb080b5993143b44f503194888c19b9c73b88eae869f6,2024-02-22T19:07:27.197000
CVE-2024-0594,0,0,60077e504dbbc890300ba3e96330ae555ec39c3816d3dd082cc5d28cf0cd6393,2024-02-15T18:40:20.453000
CVE-2024-0595,0,0,af15af2ea25dae8e87d2cb0077ff60ffffba24a68e71adf6bfae2d8b34b81c14,2024-02-16T21:34:39.327000
CVE-2024-0596,0,0,0b265c937c4478a403b4fd3af4ba464d6f3e32204d68b008dcd08a509673f056,2024-02-16T21:34:53.293000
CVE-2024-0596,0,1,9f5b4456a9d487477c9dc7744c8ed50bc8416ee6f22640edeebd91bffeea3832,2024-06-10T13:15:49.863000
CVE-2024-0597,0,0,3a1e17fd48d4d13e1e3eeb0b7af292f08f1669c0f9ba176e3313fb24210e6aa1,2024-02-13T14:05:27.427000
CVE-2024-0598,0,0,905d7443f5fe0cd440f5b3fed3dfd6b7335390ae802c46bc574bdf1908ea4874,2024-04-10T13:24:00.070000
CVE-2024-0599,0,0,b9a7a17605f0cb4a92980b4d56609fff23f10bb4163b407de7c5e45dcced7a8d,2024-05-17T02:34:48.770000
@ -241335,6 +241335,7 @@ CVE-2024-1224,0,0,6671b720f58aa0150d14676a615208ff783ead72a8a766227d501b4f2f840d
CVE-2024-1225,0,0,0b68eae0ee984524ebb2df359b44e58b9ba84a615ada907a65e017a24d65ff7a,2024-05-17T02:35:19.560000
CVE-2024-1226,0,0,14a580d4b3eab4674d6ae40acd0cb53f118cafa2e8004e611e071913cd041fe6,2024-03-12T16:02:33.900000
CVE-2024-1227,0,0,94dce1bd607b6903e23d54a7d6b05a85e9dc37b645ba64935d33bd38f11890aa,2024-03-12T16:02:33.900000
CVE-2024-1228,1,1,9ed4be4b64f071a926435d781e56cc24beb311b621e58ce6e504c6303075b0fa,2024-06-10T12:40:41.360000
CVE-2024-1229,0,0,2de2ced35127929201da3cc9dd41aa7d4097d2d61f9931ef1592526b3e0b7dfa,2024-05-14T16:13:02.773000
CVE-2024-1230,0,0,8bd1dd7f8fd55f9189a6ea53392185485a1a6386a5bf97397fc7d3598cb5fb14,2024-05-14T16:13:02.773000
CVE-2024-1231,0,0,3fff2a2694f3a2890eda32488c438fe0ab80785883b0aefb67199c2eabc0d967,2024-03-25T13:47:14.087000
@ -243020,7 +243021,7 @@ CVE-2024-21747,0,0,35403744e7ef40fd68d659ac75e691394b3bec12407204459bb0ee7326018
CVE-2024-21748,0,0,f06326b22781b534e1620f1c7af1d9c1c617e182315508b6b870d91983d6f382,2024-06-10T02:52:08.267000
CVE-2024-21749,0,0,977e78c03c745b3f2715cc5017eb627860eddebef9d26895b59c2bc8df042370,2024-02-29T13:49:47.277000
CVE-2024-21750,0,0,3e8fbe0cb62c8e56d68418bdaca88bd6a5a9359bd561d57e9822bcdabaea5468,2024-02-03T00:41:15.460000
CVE-2024-21751,0,0,2d116c2e07457bc07d45f2893f63db0c67c62afe80dbafadddaba4bca0219336,2024-06-10T08:15:47.603000
CVE-2024-21751,0,1,b64fb613f54cec3fdbdc63d0d3501a7b32b5e5f92890894205961027ed2c4f96,2024-06-10T12:40:41.360000
CVE-2024-21752,0,0,80a5a3aff28e680d194d956f222c96b3f36d11392adc2ff7fd485136323ef565,2024-02-29T13:49:29.390000
CVE-2024-21755,0,0,3649ad429f456b06338c76a7773a7effa9162638dba6b0cd829505e767eab517,2024-04-10T13:24:22.187000
CVE-2024-21756,0,0,7e40cab71c47f1a51d786a1ac8dd4278e504d9e4172c58909f1d2b21a6d9e3a6,2024-04-10T13:24:22.187000
@ -243379,9 +243380,9 @@ CVE-2024-22292,0,0,0dcb649675eee45183d7a3a52a52d50012978e3ffd9ed19e44e63a0c90ba5
CVE-2024-22293,0,0,66b18b2ec523327037fe7697def25b6fe810892caaa2642efef338fa7d6fa3b5,2024-02-06T15:44:56.407000
CVE-2024-22294,0,0,2d6088f59e8b9087805c2c637ab58edad520cd7f6a5cd091778e4377e15ff718,2024-01-30T17:44:30.747000
CVE-2024-22295,0,0,79eba3745b8ee4d5ff9d56f3066d8459c9cee5eb8c12175ae43be27752ace43e,2024-02-06T15:49:30.457000
CVE-2024-22296,0,0,4ff18ac3a7d573b5182174c089424da2b7812b1330e06235990a5a83640cc28f,2024-06-10T08:15:48.017000
CVE-2024-22296,0,1,26497821bdd6523c6ffa82c8932df21c7375a0b75c6b4829fe7611d85fa934c8,2024-06-10T12:40:41.360000
CVE-2024-22297,0,0,577fc11ad5b0d749376591ad16a375dfa540e32ffa2e1012a2392bbaefc0287d,2024-02-06T15:38:07.050000
CVE-2024-22298,0,0,d352620fdc1c4eb6e0318dfb01a369e3454bdb875c4e460aaa1e3d22419e0c68,2024-06-10T08:15:48.253000
CVE-2024-22298,0,1,eb4e5161d1233abda8028026a5fd3bc810ac81a8912963670187ebce3b0787a2,2024-06-10T12:40:41.360000
CVE-2024-22299,0,0,80a4882f4c9ab5eec2fd5d8b16ede08da3f188bafea457394bae184bfdc470b7,2024-03-27T12:29:30.307000
CVE-2024-22300,0,0,6a2ac22ff64061be14a64819ed6b0717dea7f94ee6239bf636e871d8862b7a4e,2024-03-27T12:29:30.307000
CVE-2024-22301,0,0,5c83b0c07edb476e78cc7de384bddf72fcd86e319684689177ab1f8ee28c611d,2024-01-30T17:44:59.847000
@ -244031,7 +244032,7 @@ CVE-2024-2352,0,0,57630273c197eaed8b3c3f6d93ff32d48d806b15015e610cf5486ce4687523
CVE-2024-23520,0,0,6231203085a20b2d4cba5048549458f88829476b5e6533d86ed85baf0d8a6576,2024-03-26T12:55:05.010000
CVE-2024-23522,0,0,7c088d2b09cc2e5e477c07b1d4ef807535495454f574963a9dafd17ab8e9681b,2024-05-17T18:36:05.263000
CVE-2024-23523,0,0,13316361d7846e6bf749bdea54d907de9d96954e12edb4899346015be33f686c,2024-03-17T22:38:29.433000
CVE-2024-23524,0,0,990cb9ba2fb01857d3774a9dd65571427ddb7a5e2db80021b3733c70ac4c92db,2024-06-10T08:15:48.483000
CVE-2024-23524,0,1,b4e07bfebc676f16e7c9cc5e0a5f2262c8872797e5d06800ed4ab67d5fef487e,2024-06-10T12:40:41.360000
CVE-2024-23525,0,0,c9ea3f9f05986326992f0c2128558f249961ba75cda273f72dbac98591a6932d,2024-05-05T15:15:49.067000
CVE-2024-23526,0,0,30d606f0eba5761919592b8a5008d0e69ca508d137995732983dadd8b2152fdd,2024-04-19T13:10:25.637000
CVE-2024-23527,0,0,024d167c32106440ba360cc7e1648a7e6b4c387298a495a5c7cfd6bef1ff05a9,2024-04-25T13:18:20.370000
@ -246904,7 +246905,7 @@ CVE-2024-27932,0,0,96dca8ba166ad184bdfd834c2d09938f89d6bc1a68e74d43ba7e517b0ae48
CVE-2024-27933,0,0,4480a72dbf32252e9b44864ee2c113f2abeb66952f26768028a79d60ccb8bbe7,2024-03-21T12:58:51.093000
CVE-2024-27934,0,0,20475100d0910e6ac5fdd76f44fb424378dc3c2edea111d4b4aeecbcc6113bdb,2024-03-21T12:58:51.093000
CVE-2024-27935,0,0,3ea732fedf9ecfa469373a90c7812bcb4177b239c9d15bd1f045a28162056c12,2024-03-21T12:58:51.093000
CVE-2024-27936,0,0,2dea05b9efff660bdba50baa9ba1cac8ed70bfb330ce05f74502724e6145fa39,2024-03-21T12:58:51.093000
CVE-2024-27936,0,1,c3c6658dd1470f9f054c21ec630ba4bba68ce0f6b63d1c0a78c6ef4463a2a484,2024-06-10T13:15:50.197000
CVE-2024-27937,0,0,c29e9e81cf89e90d9d7bb535671e9560a32722c6ec82c8942840dfd15c536b7e,2024-04-24T15:15:46.487000
CVE-2024-27938,0,0,992243c7c9e4bac66f51bd7113f98af62b9886d66d4d9e32776474fa2dcd307d,2024-03-12T12:40:13.500000
CVE-2024-27939,0,0,f088f82516bd2d0d0d374f8f7786163b91935bb614cba21a4781729e8256a07c,2024-05-14T19:18:31.490000
@ -247387,6 +247388,7 @@ CVE-2024-28824,0,0,5a9476ae0fdb0520e3a986c832f5f9e27a50da5cb3aa11e06910544296f0e
CVE-2024-28825,0,0,9e6f2228e06896e59bb560ffc81c60a9a09c25eeaded2122eaaaf9d670949d13,2024-04-24T13:39:42.883000
CVE-2024-28826,0,0,af714d67b245e2002324726263b60e676423e9fa16954adb4190fa57b660a93f,2024-05-29T13:02:09.280000
CVE-2024-2883,0,0,e66be81816608580e2e81ffcb02cca4ae9a2aa5cbea60907cc2e1d80cffbaf4a,2024-03-29T04:15:08.743000
CVE-2024-28833,1,1,842c9aabaad5fddecf13dbff5608f1a3d0d32dbf619f87e495fbcb304105ee07,2024-06-10T12:40:41.360000
CVE-2024-28834,0,0,f1164ae55a22a20606ed637fe19ba62574feb7486eb620ef30a13c9c57d3819e,2024-05-16T23:15:47.753000
CVE-2024-28835,0,0,7ffb3867ffb469cae5c61eed57191c292b3344e17f215833454f077170fed24a,2024-05-16T23:15:47.883000
CVE-2024-28836,0,0,ef9665bb9a0895616f82c07b3b8f93ecbb9dcd318a88906096e3fd29af01d6df,2024-04-03T12:38:04.840000
@ -251289,34 +251291,34 @@ CVE-2024-35711,0,0,abde08774d127ad0db34965655a4de5b5dad73c102e868a4d0f8c3582ef01
CVE-2024-35713,0,0,67f12030ef9ae03f21eeefc61a2db714e1cd54b5976a2138aaa81f95299ca1f4,2024-06-10T02:52:08.267000
CVE-2024-35714,0,0,fda77c484f1be31559583b8ce420a09ac05ec40a4cbe01b6366029636befebbf,2024-06-10T02:52:08.267000
CVE-2024-35715,0,0,a8feb3a0e36b1ed746ea7b8db0d283a4e527ecef045188b4e311eb2de1d8e60b,2024-06-10T02:52:08.267000
CVE-2024-35717,0,0,3acf80776355d97c3f345c7f1d059e67f78fe0202250266de2fe58460fdd9e14,2024-06-10T08:15:48.723000
CVE-2024-35717,0,1,c99412e466e11a8d92b617aa1a8b2899f2520b1a26ed56db486809b7fb3e916d,2024-06-10T12:40:41.360000
CVE-2024-35718,0,0,88ba8367c19f7a9dbc9e6ec292607ddba06c8c0ffe199e953febc26814251166,2024-06-10T02:52:08.267000
CVE-2024-35719,0,0,dd1d7bca8ae8cde9f9e3f2600aa39b26178c0f1f411f5a0803d6eedab9a3d37c,2024-06-10T02:52:08.267000
CVE-2024-3572,0,0,fac7085e464e1d98d017bfc9635e53b969d9f55d28ae04030a557f0ab1b04301,2024-04-16T13:24:07.103000
CVE-2024-35720,0,0,62009cf6bafd275afca2bd0c75d012e7856b47eb01e6ae66bc4eedc0ba028b04,2024-06-10T08:15:48.950000
CVE-2024-35721,0,0,66b00d200045b3a9d59110d4b864f3910e3e6e1010cad0bfd2eb47894af5b2fb,2024-06-10T08:15:49.180000
CVE-2024-35722,0,0,53e8b47763560860d095a32eb4bfb99e85b5d7cd4d573594a3a88737c3d5aeec,2024-06-10T08:15:49.400000
CVE-2024-35723,0,0,ac0374cd75a598555b57c351a5afd9e820e56ef7b3ef3749c71d0d8321305475,2024-06-10T08:15:49.627000
CVE-2024-35724,0,0,40d2cda6524dd1fd39859943bcdd7d7912ce924506e715e219ce975d57270685,2024-06-10T08:15:49.853000
CVE-2024-35725,0,0,88451f8ade3abffe04cf9ab3b37c334370f2bf473dbc141df6571ee0f5b3341e,2024-06-10T08:15:50.130000
CVE-2024-35726,0,0,12be0874f188f1e2375da364c9e49e84be8ebff6d62b0a2fc6516431ac7c8bed,2024-06-10T08:15:50.370000
CVE-2024-35727,0,0,677991ceb9bfee9427bec725f6256918c9a664adf353b328575600dcf024e7fd,2024-06-10T08:15:50.600000
CVE-2024-35729,0,0,4fbe387fd6737d9ddef2374c47d656bf33e5dcb924716b8f4e934b0420876684,2024-06-10T08:15:50.820000
CVE-2024-35720,0,1,0f164f8f9b670114152a0f88625e47d291e06bcc76a25b980fca9f1df0718e97,2024-06-10T12:40:41.360000
CVE-2024-35721,0,1,47fa83a2c06aeb873011a7d9e72984af4163e18b6a4f8557e11aab266c20f0b4,2024-06-10T12:40:41.360000
CVE-2024-35722,0,1,fe1b2ecadfc6fa65c80ce7f0dd7231a203031927df17e4b70112a6a2a6775c60,2024-06-10T12:40:41.360000
CVE-2024-35723,0,1,0c8aec2c87d6958c9ad6bcd8848a1c193563820b9352824d84714622c28f59f6,2024-06-10T12:40:41.360000
CVE-2024-35724,0,1,e48b3a00c2b00635aee81c29e3ca82632c54edc0f72b88507c61ca124823f068,2024-06-10T12:40:41.360000
CVE-2024-35725,0,1,6387fa62c9303a450388588acd1b532583602036be1cf579cac326cfca4117f0,2024-06-10T12:40:41.360000
CVE-2024-35726,0,1,5883eebf37d5a82afde62efd9b451f2cc474bd63c2ff9ae6e7e67c955ac5df05,2024-06-10T12:40:41.360000
CVE-2024-35727,0,1,fa60ef12791ac41cbac7ca7ddae65aef20b84d89ffc1e42657dd68e45415ddb1,2024-06-10T12:40:41.360000
CVE-2024-35729,0,1,704c66cc889ab065c72f8d4d1ff2c74d179c18006d46b0f8f7d363da1f47ae5d,2024-06-10T12:40:41.360000
CVE-2024-3573,0,0,f978306925f93ca64332932b6f5a09fb648fa8e8ad9d4b00bd427fd81ec82478,2024-04-16T13:24:07.103000
CVE-2024-35730,0,0,49335cae17539a2ff75d573d2c355a9e96d242f541f9939e3a5e291d5780cbb8,2024-06-10T02:52:08.267000
CVE-2024-35731,0,0,143fbc50e8cef612366366b66d67424075ebe4c9c1a8d543f78a4729c1a58e2a,2024-06-10T02:52:08.267000
CVE-2024-35732,0,0,7fdcba0fd7fddef85feb7e6673a8f96d3154b7974fa22b232cf3fd801d3f54de,2024-06-10T02:52:08.267000
CVE-2024-35733,0,0,a1ae2286f7bc76a6978fa6bf1b5fce5a756320de3c88f0e64dedfe42b522a5d8,2024-06-10T02:52:08.267000
CVE-2024-35734,0,0,4db4068d084716e23e2c716612575cf1c31577ae6452883821d760d3b2973e48,2024-06-10T02:52:08.267000
CVE-2024-35735,0,0,df426341c838a65a5c3f591d43c4b4543b27fa021439ce0aaeb828b2ac30914c,2024-06-10T08:15:51.053000
CVE-2024-35735,0,1,b0449a6fba46649e5663f9a33b4825977c92b11ac690bf46af299295386d8cd6,2024-06-10T12:40:41.360000
CVE-2024-35736,0,0,ce53c5603569b56b066418efe2441dcc3ec4daf52569cea931f378aa336fd127,2024-06-10T02:52:08.267000
CVE-2024-35737,0,0,68b854bcf8f4224101727c49f7d231c73d532ff04fc75a01e1d9fe383907d041,2024-06-10T02:52:08.267000
CVE-2024-35738,0,0,b35b0370c2dd956489606373203db0f27e1293b12d9ab83c9b53ee18df600402,2024-06-10T02:52:08.267000
CVE-2024-35739,0,0,b4f70001f5f669ef8233f6bfef832af600079b2d34c768ea99133be9875bdb3d,2024-06-10T02:52:08.267000
CVE-2024-3574,0,0,a6cc99c8a389ea7db1c37fe05b40106752b73810cdac85caab18aeb26d6bc576,2024-04-16T13:24:07.103000
CVE-2024-35740,0,0,cd3c4df653c403e3da38132e6a2e32e99932f9e5ed5f1383de768204108321b2,2024-06-10T02:52:08.267000
CVE-2024-35741,0,0,5be5c4d19aa69e47c86ab8d9a0ead9d9f4a06dcdbcff472e9d42b0f6ee06aa95,2024-06-10T08:15:51.277000
CVE-2024-35742,0,0,aa907a68ee549a22af6d2438b132957824de2f34257a292bf5e8b34073735a43,2024-06-10T08:15:51.507000
CVE-2024-35741,0,1,707acb0728ba27890892df794126a1bdbb77c7090bf509b5331eaa5cd7510864,2024-06-10T12:40:41.360000
CVE-2024-35742,0,1,fe154a3e8fa530687ef00116cc4be8a04e7fc1ca3143f50ff0ea0f84f7dba929,2024-06-10T12:40:41.360000
CVE-2024-35748,0,0,26718cfab6c6b64e4a8ad5e34b137f07628443ae048b910e352acc4d93ca2719,2024-06-10T02:52:08.267000
CVE-2024-3575,0,0,59be73eca5c53cbbcf99414bd65c6b74b4dff22ff5983c2d091439c46f610b22,2024-04-16T13:24:07.103000
CVE-2024-35750,0,0,a560006c880afd12dcbd61cea07fe78f3a899ebabbef8546711e97bace611fe5,2024-06-10T02:52:08.267000
@ -251692,6 +251694,7 @@ CVE-2024-36394,0,0,ccd18b82bd5a08a305c1555f5cc47e2752966fbf6a2087d2a218509e3ed38
CVE-2024-36399,0,0,32a084399fffaab7b007a4925030bc8dfc9c8bbd3d7f25f567b275cd72694397,2024-06-07T14:56:05.647000
CVE-2024-3640,0,0,abbf5a33cbca708fe19710dda7a796491ae1d1614e9cd03f43d6cddef8b09500,2024-05-17T18:36:31.297000
CVE-2024-36400,0,0,2e27d3127622312110bd9540756e657c362e96a670a644b60c484e80c9a8ab0c,2024-06-04T16:57:41.053000
CVE-2024-36405,1,1,94a506fce5d8cb43651d564e193184b3ef961b3067cefe6af02645e661678c1a,2024-06-10T13:15:50.700000
CVE-2024-3641,0,0,c281de95cce057acff2793609e8f843aad579a2f0257c0c2e0b6442733e87b14,2024-05-16T13:03:05.353000
CVE-2024-3642,0,0,bbed1ee941355da6f32a6eba37e95a843dd7913c7dd227d8da7f65dcb683674b,2024-05-16T13:03:05.353000
CVE-2024-36426,0,0,b4e77ad9e3c809414d8917ef0e48e37b5fd9f4bf9093f3155502aee0ee6063a0,2024-05-28T12:39:28.377000
@ -251883,8 +251886,10 @@ CVE-2024-36968,0,0,d504c55f4e0b8ff008f589e6761ce389b0f28ee67435189253aa32703b7ff
CVE-2024-36969,0,0,59e2acee532b11c3e63b43cffe867838c5cd47d8ce39b95770454986faf7fb4c,2024-06-10T02:52:08.267000
CVE-2024-3697,0,0,600d9314ffac8217c56b5ddb9a6dd8f383edc3a52ae15aefe26cd04d9d92b65a,2024-06-04T19:20:23.323000
CVE-2024-36970,0,0,50083cf534f5df621aa7bead6ce71043c6360c6ed1cf8d6bd9cf7a1a7b652265,2024-06-10T02:52:08.267000
CVE-2024-36971,0,0,071483d04dafb049c9c72786f47ef09a5f40ef93520e8d077e246b0fb3d41573,2024-06-10T09:15:09.127000
CVE-2024-36971,0,1,5b84bc967b9a68653f2fedca0357e1a579aa48010ea3ba37ff19ab6c851086f5,2024-06-10T12:40:41.360000
CVE-2024-3698,0,0,13b4029eb6179dbe788598788e16556a1995d850ddfc4af1ee0c4e86961a3a21,2024-05-17T02:40:04.800000
CVE-2024-3699,1,1,dd2e1591c868057b2d17bebcabb2164fe4c7f17553e4a5b77bcfe050bfd1e081,2024-06-10T12:40:41.360000
CVE-2024-3700,1,1,6dc3558d4ce4d0b98bd682199438a088f246b3a4a6bfc13ee9740e66c795b093,2024-06-10T12:40:41.360000
CVE-2024-3701,0,0,d78f52a76181001272debccb095fb5971bb478ebc111313d9ff2994f4ec0598f,2024-04-15T13:15:31.997000
CVE-2024-37017,0,0,fd4284c5a2195342d9622b5d20527d4d58db85192e227730c5a741287dc835e4,2024-05-31T13:01:46.727000
CVE-2024-37018,0,0,92b8b0fbc5eb3b3ff9e996cdb38184b7cd381c3e78fdf37e960ede7860319106,2024-05-31T13:01:46.727000
@ -252379,7 +252384,7 @@ CVE-2024-4324,0,0,7ffaeab065d0c9a1857569b7bf1dcf908cb9c5c673c6c887858b7e3bb59f5d
CVE-2024-4325,0,0,9bdbfeadfcfe04a30cd4b788d23f4d3e0d4d7ac5ca53497b4f8e137c6cc841b9,2024-06-07T14:56:05.647000
CVE-2024-4326,0,0,8dbb64b51f21b806e292a7e05ea5c1051e35374391354831c3514fc08d15ec8e,2024-05-16T13:03:05.353000
CVE-2024-4327,0,0,4d82dd4709e731be065c0bf0ae9ef6780542dd816512537c908eaf4d566d4272,2024-05-17T02:40:22.673000
CVE-2024-4328,0,0,113b0b3c323f8f5318a7690bcd04ae3baf88ed61a420f92fee0917df839a5120,2024-06-10T08:15:51.730000
CVE-2024-4328,0,1,5c54a81eaca7a66f4f49f745eade926cbd2e59d834d210577cf1a36d3512686b,2024-06-10T12:40:41.360000
CVE-2024-4329,0,0,b4ac7e4961d4eb2bf8d3a768969ba81a7ecc8f8fe7d1f63dcc17b43bdf703463,2024-05-14T16:11:39.510000
CVE-2024-4330,0,0,27ed586df5d07858fa3cac91f5c86ff400dd30bbc2cec38947cbe22382636599,2024-05-30T18:19:11.743000
CVE-2024-4331,0,0,bfd934b1b2f76cc8bd478cc4e561b67ba50f4f419d76b2999ea5119ff2a84bcd,2024-05-04T02:15:06.800000
@ -252563,7 +252568,7 @@ CVE-2024-4571,0,0,b379f15291a8a65b330c223bc6a31fd0a21b183a906c0a4077ca3cf5d38b8a
CVE-2024-4572,0,0,f5ca5c1acec751c453949e3111f6be45773ff402d3c1d2b8e88127a059aa7b1b,2024-05-14T15:44:06.153000
CVE-2024-4574,0,0,313ec0d117ac92e67c29da349740abe9395db1d3208f8156cb88d417271721b1,2024-05-14T16:11:39.510000
CVE-2024-4575,0,0,6bded3a6c54fd2b7daead76b33ebe13f0b01e085cf3109c110abbf745910c26e,2024-05-24T01:15:30.977000
CVE-2024-4577,0,0,2765d7d0c388ef9dc6ef2ef9bed31c860ca5d8bbc26a0599368dae406dd0ad81,2024-06-10T03:15:09.057000
CVE-2024-4577,0,1,fc858a3c36fcf26d51f469fedea3544a8ecc89a52f8d9f17af26266e580cb7d6,2024-06-10T12:50:06.250000
CVE-2024-4579,0,0,92215db7ae90e73ed5f9ed593ac042a14c345d9cfa9b9e96b650abf914d87abf,2024-05-14T15:44:07.607000
CVE-2024-4580,0,0,8eea2c6efcadf197a7eb186820cafc4d96f736bb0925ed6e0f257f524d44d971,2024-05-16T13:03:05.353000
CVE-2024-4581,0,0,76d80edc646ff1ece35896e94283319c4ca53356d1c75c256f7ea9adb85effeb,2024-06-04T16:57:41.053000
@ -252686,9 +252691,9 @@ CVE-2024-4736,0,0,35e0fe51ccd6e16c666173722ffd72f471827cead112caeaf869dd95515427
CVE-2024-4737,0,0,0d605ad76fcca9d9a8748ea1570213b2a20be8e7af59e1490aa0de37640ee426,2024-06-04T19:20:48.597000
CVE-2024-4738,0,0,703597dd680fa7def2747a141a4237503bd7e8917e070a49546a7e715e951f69,2024-06-04T19:20:48.783000
CVE-2024-4743,0,0,ca5ac146013ec9c5ade9488d4cfcf6d89cbed0fe780989436eef36b2f305727d,2024-06-05T12:53:50.240000
CVE-2024-4744,0,0,f6a7b3f4302057d0f74ba18abfb48f92b879ea04be8176ebed10ccfa7a070aaf,2024-06-10T08:15:51.970000
CVE-2024-4745,0,0,222bad08e62df62d9c1b08d4c0fa92c6b74036871b8f7b894785bc1f321cfeab,2024-06-10T08:15:52.210000
CVE-2024-4746,0,0,60c5e18b8520de148b8541b9f93951bbe308b484e97d6da5d744b06a33169fbe,2024-06-10T08:15:52.430000
CVE-2024-4744,0,1,58a292f0991440815bda1982c64fa673d2647379e91b7d563512a421e417b184,2024-06-10T12:40:41.360000
CVE-2024-4745,0,1,f9dc606a5e4c521176fdcdd05c5bf69502f1d4e2e04b134cfd3bcdd72aba1b32,2024-06-10T12:40:41.360000
CVE-2024-4746,0,1,106a7251b4a60a86c21027852f1ca8deee3cf7597b635fb1229b8aa4a30a0153,2024-06-10T12:40:41.360000
CVE-2024-4747,0,0,99152f6494a1192f3bae59b436abcc51d11f811ed1e0a72c2e65c8381fda6054,2024-05-14T16:11:39.510000
CVE-2024-4749,0,0,676e331864bc41907c4c80c44886e7dac480ef6dea2c29bc22838d992753d4da,2024-06-04T16:57:41.053000
CVE-2024-4750,0,0,423585a3e250903ac62d761ecb0e0e6dc6b4649ccd4411b90275a4e6d2f87495,2024-06-04T16:57:41.053000
@ -253225,5 +253230,7 @@ CVE-2024-5770,0,0,2161bc3bb7995521a02976cf67b0f5030935d13dcc8500f4bdfe07ad52c43c
CVE-2024-5771,0,0,42afac5e4b11f20018414cb0686852afbc1b273387ada89a8c858207e480e4e5,2024-06-10T02:52:08.267000
CVE-2024-5772,0,0,2ea0dc836e17f6b8c90bfa97968632c629d144db6df4d1e0d18c1b13863f5cae,2024-06-10T02:52:08.267000
CVE-2024-5773,0,0,e657da99547b87a184cb53f02a3a372624b24210e930d32850b363e51fd23ca7,2024-06-10T02:52:08.267000
CVE-2024-5774,0,0,faeb86109ed61f271933814b451958866f45c61fc0685d3d651d3b58604453a5,2024-06-10T02:52:08.267000
CVE-2024-5775,0,1,b9b29144baa0c961ebc0dbd2fb84e489ca3d89ccfbfe0ff78eaf8a4e3245c00b,2024-06-10T11:15:49.933000
CVE-2024-5774,0,1,e971b384347a7cc0930e1395d23c05a358789e404b21920ddd898b3d929affd6,2024-06-10T13:15:51.190000
CVE-2024-5775,0,0,b9b29144baa0c961ebc0dbd2fb84e489ca3d89ccfbfe0ff78eaf8a4e3245c00b,2024-06-10T11:15:49.933000
CVE-2024-5785,1,1,da08d6a27d156da6da2a993e94a3a9affe76f8b1f21cd961c46de225730ea57a,2024-06-10T13:15:51.323000
CVE-2024-5786,1,1,f655b6c5771818cb3e0fb260ae5f510fb8cd9d0fbef16f0d02b7c9f89dd648d4,2024-06-10T13:15:51.560000

Can't render this file because it is too large.