mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-06-19 17:31:42 +00:00
Auto-Update: 2024-07-01T23:55:47.518810+00:00
This commit is contained in:
parent
14970dd7dd
commit
ffc9827a1d
21
CVE-2024/CVE-2024-237xx/CVE-2024-23736.json
Normal file
21
CVE-2024/CVE-2024-237xx/CVE-2024-23736.json
Normal file
@ -0,0 +1,21 @@
|
|||||||
|
{
|
||||||
|
"id": "CVE-2024-23736",
|
||||||
|
"sourceIdentifier": "cve@mitre.org",
|
||||||
|
"published": "2024-07-01T22:15:02.767",
|
||||||
|
"lastModified": "2024-07-01T22:15:02.767",
|
||||||
|
"vulnStatus": "Received",
|
||||||
|
"cveTags": [],
|
||||||
|
"descriptions": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "Cross Site Request Forgery (CSRF) vulnerability in savignano S/Notify before 4.0.2 for Confluence allows attackers to manipulate a user's S/MIME certificate of PGP key via malicious link or email."
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"metrics": {},
|
||||||
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://help.savignano.net/snotify-email-encryption/sa-2023-11-28#SA-2023-11-28-CSRFbasedvulnerabilityinuserupload",
|
||||||
|
"source": "cve@mitre.org"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
21
CVE-2024/CVE-2024-237xx/CVE-2024-23737.json
Normal file
21
CVE-2024/CVE-2024-237xx/CVE-2024-23737.json
Normal file
@ -0,0 +1,21 @@
|
|||||||
|
{
|
||||||
|
"id": "CVE-2024-23737",
|
||||||
|
"sourceIdentifier": "cve@mitre.org",
|
||||||
|
"published": "2024-07-01T22:15:02.857",
|
||||||
|
"lastModified": "2024-07-01T22:15:02.857",
|
||||||
|
"vulnStatus": "Received",
|
||||||
|
"cveTags": [],
|
||||||
|
"descriptions": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "Cross Site Request Forgery (CSRF) vulnerability in savignano S/Notify before 4.0.2 for Jira allows attackers to allows attackers to manipulate a user's S/MIME certificate of PGP key via malicious link or email."
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"metrics": {},
|
||||||
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://help.savignano.net/snotify-email-encryption/sa-2023-11-28#SA-2023-11-28-CSRFbasedvulnerabilityinuserupload",
|
||||||
|
"source": "cve@mitre.org"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
21
CVE-2024/CVE-2024-377xx/CVE-2024-37762.json
Normal file
21
CVE-2024/CVE-2024-377xx/CVE-2024-37762.json
Normal file
@ -0,0 +1,21 @@
|
|||||||
|
{
|
||||||
|
"id": "CVE-2024-37762",
|
||||||
|
"sourceIdentifier": "cve@mitre.org",
|
||||||
|
"published": "2024-07-01T22:15:02.983",
|
||||||
|
"lastModified": "2024-07-01T22:15:02.983",
|
||||||
|
"vulnStatus": "Received",
|
||||||
|
"cveTags": [],
|
||||||
|
"descriptions": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "MachForm up to version 21 is affected by an authenticated unrestricted file upload which leads to a remote code execution."
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"metrics": {},
|
||||||
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://github.com/Atreb92/cve-2024-37762",
|
||||||
|
"source": "cve@mitre.org"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
21
CVE-2024/CVE-2024-377xx/CVE-2024-37763.json
Normal file
21
CVE-2024/CVE-2024-377xx/CVE-2024-37763.json
Normal file
@ -0,0 +1,21 @@
|
|||||||
|
{
|
||||||
|
"id": "CVE-2024-37763",
|
||||||
|
"sourceIdentifier": "cve@mitre.org",
|
||||||
|
"published": "2024-07-01T22:15:03.050",
|
||||||
|
"lastModified": "2024-07-01T22:15:03.050",
|
||||||
|
"vulnStatus": "Received",
|
||||||
|
"cveTags": [],
|
||||||
|
"descriptions": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "MachForm up to version 19 is affected by an unauthenticated stored cross-site scripting which affects users with valid sessions whom can view compiled forms results."
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"metrics": {},
|
||||||
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://github.com/Atreb92/cve-2024-37763",
|
||||||
|
"source": "cve@mitre.org"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
21
CVE-2024/CVE-2024-377xx/CVE-2024-37764.json
Normal file
21
CVE-2024/CVE-2024-377xx/CVE-2024-37764.json
Normal file
@ -0,0 +1,21 @@
|
|||||||
|
{
|
||||||
|
"id": "CVE-2024-37764",
|
||||||
|
"sourceIdentifier": "cve@mitre.org",
|
||||||
|
"published": "2024-07-01T22:15:03.113",
|
||||||
|
"lastModified": "2024-07-01T22:15:03.113",
|
||||||
|
"vulnStatus": "Received",
|
||||||
|
"cveTags": [],
|
||||||
|
"descriptions": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "MachForm up to version 19 is affected by an authenticated stored cross-site scripting."
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"metrics": {},
|
||||||
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://github.com/Atreb92/cve-2024-37764",
|
||||||
|
"source": "cve@mitre.org"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
21
CVE-2024/CVE-2024-377xx/CVE-2024-37765.json
Normal file
21
CVE-2024/CVE-2024-377xx/CVE-2024-37765.json
Normal file
@ -0,0 +1,21 @@
|
|||||||
|
{
|
||||||
|
"id": "CVE-2024-37765",
|
||||||
|
"sourceIdentifier": "cve@mitre.org",
|
||||||
|
"published": "2024-07-01T22:15:03.167",
|
||||||
|
"lastModified": "2024-07-01T22:15:03.167",
|
||||||
|
"vulnStatus": "Received",
|
||||||
|
"cveTags": [],
|
||||||
|
"descriptions": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "Machform up to version 19 is affected by an authenticated Blind SQL injection in the user account settings page."
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"metrics": {},
|
||||||
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://github.com/Atreb92/cve-2024-37765",
|
||||||
|
"source": "cve@mitre.org"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
76
CVE-2024/CVE-2024-393xx/CVE-2024-39309.json
Normal file
76
CVE-2024/CVE-2024-393xx/CVE-2024-39309.json
Normal file
@ -0,0 +1,76 @@
|
|||||||
|
{
|
||||||
|
"id": "CVE-2024-39309",
|
||||||
|
"sourceIdentifier": "security-advisories@github.com",
|
||||||
|
"published": "2024-07-01T22:15:03.253",
|
||||||
|
"lastModified": "2024-07-01T22:15:03.253",
|
||||||
|
"vulnStatus": "Received",
|
||||||
|
"cveTags": [],
|
||||||
|
"descriptions": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "Parse Server is an open source backend that can be deployed to any infrastructure that can run Node.js. A vulnerability in versions prior to 6.5.7 and 7.1.0 allows SQL injection when Parse Server is configured to use the PostgreSQL database. The algorithm to detect SQL injection has been improved in versions 6.5.7 and 7.1.0. No known workarounds are available."
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"metrics": {
|
||||||
|
"cvssMetricV31": [
|
||||||
|
{
|
||||||
|
"source": "security-advisories@github.com",
|
||||||
|
"type": "Secondary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||||
|
"attackVector": "NETWORK",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "NONE",
|
||||||
|
"userInteraction": "NONE",
|
||||||
|
"scope": "UNCHANGED",
|
||||||
|
"confidentialityImpact": "HIGH",
|
||||||
|
"integrityImpact": "HIGH",
|
||||||
|
"availabilityImpact": "HIGH",
|
||||||
|
"baseScore": 9.8,
|
||||||
|
"baseSeverity": "CRITICAL"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 3.9,
|
||||||
|
"impactScore": 5.9
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"weaknesses": [
|
||||||
|
{
|
||||||
|
"source": "security-advisories@github.com",
|
||||||
|
"type": "Secondary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-288"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-89"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://github.com/parse-community/parse-server/commit/2edf1e4c0363af01e97a7fbc97694f851b7d1ff3",
|
||||||
|
"source": "security-advisories@github.com"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://github.com/parse-community/parse-server/commit/f332d54577608c5ad927255e06d8c694e2e0ff5b",
|
||||||
|
"source": "security-advisories@github.com"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://github.com/parse-community/parse-server/pull/9167",
|
||||||
|
"source": "security-advisories@github.com"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://github.com/parse-community/parse-server/pull/9168",
|
||||||
|
"source": "security-advisories@github.com"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://github.com/parse-community/parse-server/security/advisories/GHSA-c2hr-cqg6-8j6r",
|
||||||
|
"source": "security-advisories@github.com"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
60
CVE-2024/CVE-2024-393xx/CVE-2024-39310.json
Normal file
60
CVE-2024/CVE-2024-393xx/CVE-2024-39310.json
Normal file
@ -0,0 +1,60 @@
|
|||||||
|
{
|
||||||
|
"id": "CVE-2024-39310",
|
||||||
|
"sourceIdentifier": "security-advisories@github.com",
|
||||||
|
"published": "2024-07-01T22:15:03.483",
|
||||||
|
"lastModified": "2024-07-01T22:15:03.483",
|
||||||
|
"vulnStatus": "Received",
|
||||||
|
"cveTags": [],
|
||||||
|
"descriptions": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "The Basil recipe theme for WordPress is vulnerable to Persistent Cross-Site Scripting (XSS) via the `post_title` parameter in versions up to, and including, 2.0.4 due to insufficient input sanitization and output escaping. This vulnerability allows authenticated attackers with contributor-level access and above to inject arbitrary web scripts in pages that will execute whenever a user accesses a compromised page. Because the of the default WordPress validation, it is not possible to insert the payload directly but if the Cooked plugin is installed, it is possible to create a recipe post type (cp_recipe) and inject the payload in the title field. Version 2.0.5 contains a patch for the issue."
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"metrics": {
|
||||||
|
"cvssMetricV31": [
|
||||||
|
{
|
||||||
|
"source": "security-advisories@github.com",
|
||||||
|
"type": "Secondary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
|
||||||
|
"attackVector": "NETWORK",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "LOW",
|
||||||
|
"userInteraction": "REQUIRED",
|
||||||
|
"scope": "CHANGED",
|
||||||
|
"confidentialityImpact": "LOW",
|
||||||
|
"integrityImpact": "LOW",
|
||||||
|
"availabilityImpact": "NONE",
|
||||||
|
"baseScore": 5.4,
|
||||||
|
"baseSeverity": "MEDIUM"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 2.3,
|
||||||
|
"impactScore": 2.7
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"weaknesses": [
|
||||||
|
{
|
||||||
|
"source": "security-advisories@github.com",
|
||||||
|
"type": "Secondary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-79"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://github.com/XjSv/Basil/commit/e2b1dbf1637d1ec2663f9aa1a563b02dc76a8146",
|
||||||
|
"source": "security-advisories@github.com"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://github.com/XjSv/Basil/security/advisories/GHSA-cr7v-8v2h-49vx",
|
||||||
|
"source": "security-advisories@github.com"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
60
CVE-2024/CVE-2024-393xx/CVE-2024-39313.json
Normal file
60
CVE-2024/CVE-2024-393xx/CVE-2024-39313.json
Normal file
@ -0,0 +1,60 @@
|
|||||||
|
{
|
||||||
|
"id": "CVE-2024-39313",
|
||||||
|
"sourceIdentifier": "security-advisories@github.com",
|
||||||
|
"published": "2024-07-01T22:15:03.690",
|
||||||
|
"lastModified": "2024-07-01T22:15:03.690",
|
||||||
|
"vulnStatus": "Received",
|
||||||
|
"cveTags": [],
|
||||||
|
"descriptions": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "toy-blog is a headless content management system implementation. Starting in version 0.5.4 and prior to version 0.6.1, articles with private visibility can be read if the reader does not set credentials for the request. Users should upgrade to 0.6.1 or later to receive a patch. No known workarounds are available."
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"metrics": {
|
||||||
|
"cvssMetricV31": [
|
||||||
|
{
|
||||||
|
"source": "security-advisories@github.com",
|
||||||
|
"type": "Secondary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
|
||||||
|
"attackVector": "NETWORK",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "LOW",
|
||||||
|
"userInteraction": "NONE",
|
||||||
|
"scope": "UNCHANGED",
|
||||||
|
"confidentialityImpact": "HIGH",
|
||||||
|
"integrityImpact": "NONE",
|
||||||
|
"availabilityImpact": "NONE",
|
||||||
|
"baseScore": 6.5,
|
||||||
|
"baseSeverity": "MEDIUM"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 2.8,
|
||||||
|
"impactScore": 3.6
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"weaknesses": [
|
||||||
|
{
|
||||||
|
"source": "security-advisories@github.com",
|
||||||
|
"type": "Secondary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-200"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://github.com/KisaragiEffective/toy-blog/commit/f13a45f68c9560124558e6bb445ad441a4cf4732",
|
||||||
|
"source": "security-advisories@github.com"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://github.com/KisaragiEffective/toy-blog/security/advisories/GHSA-rf2q-5q4q-5fwr",
|
||||||
|
"source": "security-advisories@github.com"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
64
CVE-2024/CVE-2024-393xx/CVE-2024-39314.json
Normal file
64
CVE-2024/CVE-2024-393xx/CVE-2024-39314.json
Normal file
@ -0,0 +1,64 @@
|
|||||||
|
{
|
||||||
|
"id": "CVE-2024-39314",
|
||||||
|
"sourceIdentifier": "security-advisories@github.com",
|
||||||
|
"published": "2024-07-01T22:15:03.900",
|
||||||
|
"lastModified": "2024-07-01T22:15:03.900",
|
||||||
|
"vulnStatus": "Received",
|
||||||
|
"cveTags": [],
|
||||||
|
"descriptions": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "toy-blog is a headless content management system implementation. Starting in version 0.4.3 and prior to version 0.5.0, the administrative password was leaked through the command line parameter. The problem was patched in version 0.5.0. As a workaround, pass `--read-bearer-token-from-stdin` to the launch arguments and feed the token from the standard input in version 0.4.14 or later. Earlier versions do not have this workaround."
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"metrics": {
|
||||||
|
"cvssMetricV31": [
|
||||||
|
{
|
||||||
|
"source": "security-advisories@github.com",
|
||||||
|
"type": "Secondary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N",
|
||||||
|
"attackVector": "LOCAL",
|
||||||
|
"attackComplexity": "HIGH",
|
||||||
|
"privilegesRequired": "LOW",
|
||||||
|
"userInteraction": "NONE",
|
||||||
|
"scope": "UNCHANGED",
|
||||||
|
"confidentialityImpact": "HIGH",
|
||||||
|
"integrityImpact": "NONE",
|
||||||
|
"availabilityImpact": "NONE",
|
||||||
|
"baseScore": 4.7,
|
||||||
|
"baseSeverity": "MEDIUM"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 1.0,
|
||||||
|
"impactScore": 3.6
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"weaknesses": [
|
||||||
|
{
|
||||||
|
"source": "security-advisories@github.com",
|
||||||
|
"type": "Secondary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-200"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-214"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://github.com/KisaragiEffective/toy-blog/commit/4d003e46a944d8f44ea02c63f4beefa4cbe1f4f7",
|
||||||
|
"source": "security-advisories@github.com"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://github.com/KisaragiEffective/toy-blog/security/advisories/GHSA-q8g2-c3x5-gp89",
|
||||||
|
"source": "security-advisories@github.com"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
@ -2,7 +2,7 @@
|
|||||||
"id": "CVE-2024-6387",
|
"id": "CVE-2024-6387",
|
||||||
"sourceIdentifier": "secalert@redhat.com",
|
"sourceIdentifier": "secalert@redhat.com",
|
||||||
"published": "2024-07-01T13:15:06.467",
|
"published": "2024-07-01T13:15:06.467",
|
||||||
"lastModified": "2024-07-01T19:15:06.037",
|
"lastModified": "2024-07-01T23:15:02.157",
|
||||||
"vulnStatus": "Awaiting Analysis",
|
"vulnStatus": "Awaiting Analysis",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
@ -52,6 +52,10 @@
|
|||||||
"url": "http://www.openwall.com/lists/oss-security/2024/07/01/12",
|
"url": "http://www.openwall.com/lists/oss-security/2024/07/01/12",
|
||||||
"source": "secalert@redhat.com"
|
"source": "secalert@redhat.com"
|
||||||
},
|
},
|
||||||
|
{
|
||||||
|
"url": "http://www.openwall.com/lists/oss-security/2024/07/01/13",
|
||||||
|
"source": "secalert@redhat.com"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"url": "https://access.redhat.com/security/cve/CVE-2024-6387",
|
"url": "https://access.redhat.com/security/cve/CVE-2024-6387",
|
||||||
"source": "secalert@redhat.com"
|
"source": "secalert@redhat.com"
|
||||||
@ -104,6 +108,10 @@
|
|||||||
"url": "https://security-tracker.debian.org/tracker/CVE-2024-6387",
|
"url": "https://security-tracker.debian.org/tracker/CVE-2024-6387",
|
||||||
"source": "secalert@redhat.com"
|
"source": "secalert@redhat.com"
|
||||||
},
|
},
|
||||||
|
{
|
||||||
|
"url": "https://security.netapp.com/advisory/ntap-20240701-0001/",
|
||||||
|
"source": "secalert@redhat.com"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"url": "https://stackdiary.com/openssh-race-condition-in-sshd-allows-remote-code-execution/",
|
"url": "https://stackdiary.com/openssh-race-condition-in-sshd-allows-remote-code-execution/",
|
||||||
"source": "secalert@redhat.com"
|
"source": "secalert@redhat.com"
|
||||||
|
29
README.md
29
README.md
@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours.
|
|||||||
### Last Repository Update
|
### Last Repository Update
|
||||||
|
|
||||||
```plain
|
```plain
|
||||||
2024-07-01T22:00:29.785524+00:00
|
2024-07-01T23:55:47.518810+00:00
|
||||||
```
|
```
|
||||||
|
|
||||||
### Most recent CVE Modification Timestamp synchronized with NVD
|
### Most recent CVE Modification Timestamp synchronized with NVD
|
||||||
|
|
||||||
```plain
|
```plain
|
||||||
2024-07-01T21:15:04.810000+00:00
|
2024-07-01T23:15:02.157000+00:00
|
||||||
```
|
```
|
||||||
|
|
||||||
### Last Data Feed Release
|
### Last Data Feed Release
|
||||||
@ -33,29 +33,30 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
|
|||||||
### Total Number of included CVEs
|
### Total Number of included CVEs
|
||||||
|
|
||||||
```plain
|
```plain
|
||||||
255630
|
255640
|
||||||
```
|
```
|
||||||
|
|
||||||
### CVEs added in the last Commit
|
### CVEs added in the last Commit
|
||||||
|
|
||||||
Recently added CVEs: `10`
|
Recently added CVEs: `10`
|
||||||
|
|
||||||
- [CVE-2024-28200](CVE-2024/CVE-2024-282xx/CVE-2024-28200.json) (`2024-07-01T21:15:03.143`)
|
- [CVE-2024-23736](CVE-2024/CVE-2024-237xx/CVE-2024-23736.json) (`2024-07-01T22:15:02.767`)
|
||||||
- [CVE-2024-32228](CVE-2024/CVE-2024-322xx/CVE-2024-32228.json) (`2024-07-01T21:15:03.480`)
|
- [CVE-2024-23737](CVE-2024/CVE-2024-237xx/CVE-2024-23737.json) (`2024-07-01T22:15:02.857`)
|
||||||
- [CVE-2024-32229](CVE-2024/CVE-2024-322xx/CVE-2024-32229.json) (`2024-07-01T21:15:03.553`)
|
- [CVE-2024-37762](CVE-2024/CVE-2024-377xx/CVE-2024-37762.json) (`2024-07-01T22:15:02.983`)
|
||||||
- [CVE-2024-32230](CVE-2024/CVE-2024-322xx/CVE-2024-32230.json) (`2024-07-01T21:15:03.617`)
|
- [CVE-2024-37763](CVE-2024/CVE-2024-377xx/CVE-2024-37763.json) (`2024-07-01T22:15:03.050`)
|
||||||
- [CVE-2024-38366](CVE-2024/CVE-2024-383xx/CVE-2024-38366.json) (`2024-07-01T21:15:03.797`)
|
- [CVE-2024-37764](CVE-2024/CVE-2024-377xx/CVE-2024-37764.json) (`2024-07-01T22:15:03.113`)
|
||||||
- [CVE-2024-38367](CVE-2024/CVE-2024-383xx/CVE-2024-38367.json) (`2024-07-01T21:15:04.020`)
|
- [CVE-2024-37765](CVE-2024/CVE-2024-377xx/CVE-2024-37765.json) (`2024-07-01T22:15:03.167`)
|
||||||
- [CVE-2024-38368](CVE-2024/CVE-2024-383xx/CVE-2024-38368.json) (`2024-07-01T21:15:04.250`)
|
- [CVE-2024-39309](CVE-2024/CVE-2024-393xx/CVE-2024-39309.json) (`2024-07-01T22:15:03.253`)
|
||||||
- [CVE-2024-39249](CVE-2024/CVE-2024-392xx/CVE-2024-39249.json) (`2024-07-01T20:15:02.877`)
|
- [CVE-2024-39310](CVE-2024/CVE-2024-393xx/CVE-2024-39310.json) (`2024-07-01T22:15:03.483`)
|
||||||
- [CVE-2024-39305](CVE-2024/CVE-2024-393xx/CVE-2024-39305.json) (`2024-07-01T21:15:04.520`)
|
- [CVE-2024-39313](CVE-2024/CVE-2024-393xx/CVE-2024-39313.json) (`2024-07-01T22:15:03.690`)
|
||||||
- [CVE-2024-5322](CVE-2024/CVE-2024-53xx/CVE-2024-5322.json) (`2024-07-01T21:15:04.810`)
|
- [CVE-2024-39314](CVE-2024/CVE-2024-393xx/CVE-2024-39314.json) (`2024-07-01T22:15:03.900`)
|
||||||
|
|
||||||
|
|
||||||
### CVEs modified in the last Commit
|
### CVEs modified in the last Commit
|
||||||
|
|
||||||
Recently modified CVEs: `0`
|
Recently modified CVEs: `1`
|
||||||
|
|
||||||
|
- [CVE-2024-6387](CVE-2024/CVE-2024-63xx/CVE-2024-6387.json) (`2024-07-01T23:15:02.157`)
|
||||||
|
|
||||||
|
|
||||||
## Download and Usage
|
## Download and Usage
|
||||||
|
32
_state.csv
32
_state.csv
@ -244648,6 +244648,8 @@ CVE-2024-23731,0,0,204152b9ab32090d3f201504afd34c062c39bfd578f661ea797bbd83dd0dc
|
|||||||
CVE-2024-23732,0,0,042666c99b3635fb407c7af7c818760f4159a23a8e9e6c2822d5ba07aae8999c,2024-01-26T21:11:51.840000
|
CVE-2024-23732,0,0,042666c99b3635fb407c7af7c818760f4159a23a8e9e6c2822d5ba07aae8999c,2024-01-26T21:11:51.840000
|
||||||
CVE-2024-23734,0,0,3ab7c6257ca38ed9d7477d57e04d8b8398661cc4195ecc99bf38a750580483b1,2024-04-10T19:49:51.183000
|
CVE-2024-23734,0,0,3ab7c6257ca38ed9d7477d57e04d8b8398661cc4195ecc99bf38a750580483b1,2024-04-10T19:49:51.183000
|
||||||
CVE-2024-23735,0,0,cc8e5b54f96dbe13960a98eb0656f3844c314b70a551360f5a5c0009603693b8,2024-04-10T19:49:51.183000
|
CVE-2024-23735,0,0,cc8e5b54f96dbe13960a98eb0656f3844c314b70a551360f5a5c0009603693b8,2024-04-10T19:49:51.183000
|
||||||
|
CVE-2024-23736,1,1,2b26cbbe1aba73dc1ae6c7f0a4299f91e02cfe1409f172a174adb235f2053920,2024-07-01T22:15:02.767000
|
||||||
|
CVE-2024-23737,1,1,d74d1c8f269c81961368bb58c2fc0219d04b61252a7081400face50f8ce3b3c5,2024-07-01T22:15:02.857000
|
||||||
CVE-2024-23738,0,0,84fc715227e9c81d0ea24ba6cabdcd4b9ebaaa4af8fffc242edc7617abf88d5e,2024-05-17T02:36:37.750000
|
CVE-2024-23738,0,0,84fc715227e9c81d0ea24ba6cabdcd4b9ebaaa4af8fffc242edc7617abf88d5e,2024-05-17T02:36:37.750000
|
||||||
CVE-2024-23739,0,0,1dc14ca5b2f1048d31e09e11f0d951d9c59e5d8342f40e05e67a4d783040d706,2024-02-16T16:15:57.830000
|
CVE-2024-23739,0,0,1dc14ca5b2f1048d31e09e11f0d951d9c59e5d8342f40e05e67a4d783040d706,2024-02-16T16:15:57.830000
|
||||||
CVE-2024-23740,0,0,e7626667933f5491d7b60c7c6a242dfc584bd0c007d59100e0888a0ff11676c3,2024-02-16T16:15:57.913000
|
CVE-2024-23740,0,0,e7626667933f5491d7b60c7c6a242dfc584bd0c007d59100e0888a0ff11676c3,2024-02-16T16:15:57.913000
|
||||||
@ -247747,7 +247749,7 @@ CVE-2024-28197,0,0,e70c7d0bb2a78854377299eb50fe7994eaf82f7d86398ed826c936d249a75
|
|||||||
CVE-2024-28198,0,0,32661ba32b67d58a1019e594878075963b6bdebcf08d87b00ddfbedebf534991,2024-03-12T12:40:13.500000
|
CVE-2024-28198,0,0,32661ba32b67d58a1019e594878075963b6bdebcf08d87b00ddfbedebf534991,2024-03-12T12:40:13.500000
|
||||||
CVE-2024-28199,0,0,5231113c7bbca70ece75822b236d9f7f6bc016001a14be8a22889155290ed75b,2024-03-12T12:40:13.500000
|
CVE-2024-28199,0,0,5231113c7bbca70ece75822b236d9f7f6bc016001a14be8a22889155290ed75b,2024-03-12T12:40:13.500000
|
||||||
CVE-2024-2820,0,0,04044020afe96db7101d06f65e3fca9a526bcceab352e2516859b473c76cab84,2024-05-17T02:38:32.343000
|
CVE-2024-2820,0,0,04044020afe96db7101d06f65e3fca9a526bcceab352e2516859b473c76cab84,2024-05-17T02:38:32.343000
|
||||||
CVE-2024-28200,1,1,dc5754989844870e17b687e4a34ec1b9ec7ea294dc51517e3dcc8a6c85024fc7,2024-07-01T21:15:03.143000
|
CVE-2024-28200,0,0,dc5754989844870e17b687e4a34ec1b9ec7ea294dc51517e3dcc8a6c85024fc7,2024-07-01T21:15:03.143000
|
||||||
CVE-2024-2821,0,0,44eb61fc4a59c51638bccdf14ddbb23cb77adcd7c61e37e73a9c7f0015794ac9,2024-05-17T02:38:32.443000
|
CVE-2024-2821,0,0,44eb61fc4a59c51638bccdf14ddbb23cb77adcd7c61e37e73a9c7f0015794ac9,2024-05-17T02:38:32.443000
|
||||||
CVE-2024-28211,0,0,1b66b23fff0ae8b3ed6ac3cab4c799cf28927ac12a78b2fa8cf18ade1463da72,2024-03-07T13:52:27.110000
|
CVE-2024-28211,0,0,1b66b23fff0ae8b3ed6ac3cab4c799cf28927ac12a78b2fa8cf18ade1463da72,2024-03-07T13:52:27.110000
|
||||||
CVE-2024-28212,0,0,23b3dcdd750f4fd245f774c5a2e28593d06da15e6054129ed9006a82e42307e5,2024-03-07T13:52:27.110000
|
CVE-2024-28212,0,0,23b3dcdd750f4fd245f774c5a2e28593d06da15e6054129ed9006a82e42307e5,2024-03-07T13:52:27.110000
|
||||||
@ -250263,10 +250265,10 @@ CVE-2024-32211,0,0,2b66354120eb78c5de130c5736a0f6cbdb759d8857b62aaa9610afcf2dbd1
|
|||||||
CVE-2024-32212,0,0,308638b6504e9dac986372001ec76fb6f4bb563fffc0ef1ef751b01597b9a059,2024-05-01T19:50:25.633000
|
CVE-2024-32212,0,0,308638b6504e9dac986372001ec76fb6f4bb563fffc0ef1ef751b01597b9a059,2024-05-01T19:50:25.633000
|
||||||
CVE-2024-32213,0,0,d9b1dd437b93ee6625f4e0f6d3e434c9b4da35732523ef70dc3986502a40254b,2024-05-01T19:50:25.633000
|
CVE-2024-32213,0,0,d9b1dd437b93ee6625f4e0f6d3e434c9b4da35732523ef70dc3986502a40254b,2024-05-01T19:50:25.633000
|
||||||
CVE-2024-3222,0,0,799b361ab23aa76993ebff58db38db1a2ff6bbfd18c67fd1f278e8a3ffabcc98,2024-05-17T02:39:47.540000
|
CVE-2024-3222,0,0,799b361ab23aa76993ebff58db38db1a2ff6bbfd18c67fd1f278e8a3ffabcc98,2024-05-17T02:39:47.540000
|
||||||
CVE-2024-32228,1,1,152aad4ca2fe2ac0e9839607555884c82514fbe4043392aaa078efeeaf9a5836,2024-07-01T21:15:03.480000
|
CVE-2024-32228,0,0,152aad4ca2fe2ac0e9839607555884c82514fbe4043392aaa078efeeaf9a5836,2024-07-01T21:15:03.480000
|
||||||
CVE-2024-32229,1,1,281249f3f027f2bb33c5aad7cedec1f4bb1ce5ac7f295a3ec41eb34fee34c9f3,2024-07-01T21:15:03.553000
|
CVE-2024-32229,0,0,281249f3f027f2bb33c5aad7cedec1f4bb1ce5ac7f295a3ec41eb34fee34c9f3,2024-07-01T21:15:03.553000
|
||||||
CVE-2024-3223,0,0,6cc36c470525be0fd4b2414cec5a9a6177e43b11e75a26205c33328451f02d8a,2024-05-17T02:39:47.627000
|
CVE-2024-3223,0,0,6cc36c470525be0fd4b2414cec5a9a6177e43b11e75a26205c33328451f02d8a,2024-05-17T02:39:47.627000
|
||||||
CVE-2024-32230,1,1,cf2eff25c85cb2ba14922883820c2cce246f0072b6eb24a1e3ae764737ebeb36,2024-07-01T21:15:03.617000
|
CVE-2024-32230,0,0,cf2eff25c85cb2ba14922883820c2cce246f0072b6eb24a1e3ae764737ebeb36,2024-07-01T21:15:03.617000
|
||||||
CVE-2024-32236,0,0,4eef42ab5d5b212b2220dedc358c09498d51b50fcd2b77aa529d502462755d3d,2024-04-25T17:24:59.967000
|
CVE-2024-32236,0,0,4eef42ab5d5b212b2220dedc358c09498d51b50fcd2b77aa529d502462755d3d,2024-04-25T17:24:59.967000
|
||||||
CVE-2024-32238,0,0,0e920ec9ded0c0837401c703af1964a27843eb631a1c2ab20523a0b29f896ad3,2024-04-23T12:52:30.940000
|
CVE-2024-32238,0,0,0e920ec9ded0c0837401c703af1964a27843eb631a1c2ab20523a0b29f896ad3,2024-04-23T12:52:30.940000
|
||||||
CVE-2024-3224,0,0,ac6a81131bf4dda9a1fb919110891b8e3432d607290ab1109b186afa8000defb,2024-05-17T02:39:47.717000
|
CVE-2024-3224,0,0,ac6a81131bf4dda9a1fb919110891b8e3432d607290ab1109b186afa8000defb,2024-05-17T02:39:47.717000
|
||||||
@ -253455,6 +253457,10 @@ CVE-2024-37742,0,0,82d0f7bd796b50c91f2398edb7b6a7a5b24c344e32d17491fc5d315bfb23b
|
|||||||
CVE-2024-3775,0,0,a79253f4f0c7633f40fa5e33903553d0137ff03b4a2d8425a028bb5ddf1c6b0a,2024-04-15T13:15:31.997000
|
CVE-2024-3775,0,0,a79253f4f0c7633f40fa5e33903553d0137ff03b4a2d8425a028bb5ddf1c6b0a,2024-04-15T13:15:31.997000
|
||||||
CVE-2024-37759,0,0,a304f980fb14a8758546bd8c3d1faef10aef26758667c469c634d191404d3cd2,2024-06-25T12:24:17.873000
|
CVE-2024-37759,0,0,a304f980fb14a8758546bd8c3d1faef10aef26758667c469c634d191404d3cd2,2024-06-25T12:24:17.873000
|
||||||
CVE-2024-3776,0,0,55056178a3d988ca6f5c349416a81e65818f1f748e962aa89ca62657bc61cdbb,2024-04-15T13:15:31.997000
|
CVE-2024-3776,0,0,55056178a3d988ca6f5c349416a81e65818f1f748e962aa89ca62657bc61cdbb,2024-04-15T13:15:31.997000
|
||||||
|
CVE-2024-37762,1,1,c1a2dc2e526a46175734819386306ad13f4db7c88b117a9364a370664b9b4052,2024-07-01T22:15:02.983000
|
||||||
|
CVE-2024-37763,1,1,b24ece373ba33a1b18614f0ff678132dd17a93df954555d951d551c36300c3ed,2024-07-01T22:15:03.050000
|
||||||
|
CVE-2024-37764,1,1,0c99dd0b15c54f815e4d6e54defa4c4b48917fef318dc5dd7eef5885b773bd0d,2024-07-01T22:15:03.113000
|
||||||
|
CVE-2024-37765,1,1,f08d4be80ca051f20cc79618e614f60e6396359a9006de2560d6878dff089208,2024-07-01T22:15:03.167000
|
||||||
CVE-2024-3777,0,0,2d62b43478a2af7b370a2abe8fef4e62ecbb9b40c3be97e2e0fc1ef910b6e9d4,2024-04-15T13:15:31.997000
|
CVE-2024-3777,0,0,2d62b43478a2af7b370a2abe8fef4e62ecbb9b40c3be97e2e0fc1ef910b6e9d4,2024-04-15T13:15:31.997000
|
||||||
CVE-2024-3778,0,0,c2c38fcb38179fdb87f4043dc10c922f64da16bb588bfaf10dd1fb23e229fcc9,2024-04-15T13:15:31.997000
|
CVE-2024-3778,0,0,c2c38fcb38179fdb87f4043dc10c922f64da16bb588bfaf10dd1fb23e229fcc9,2024-04-15T13:15:31.997000
|
||||||
CVE-2024-37790,0,0,c4b9ad019e7e91da343033108d4192111ff0d3cad7ad744d191eced3457024f8,2024-06-21T16:15:12.440000
|
CVE-2024-37790,0,0,c4b9ad019e7e91da343033108d4192111ff0d3cad7ad744d191eced3457024f8,2024-06-21T16:15:12.440000
|
||||||
@ -253586,9 +253592,9 @@ CVE-2024-38358,0,0,d7fa4473d29cbfc514ec5a6118f6b700b95e48744d7580b8a99541a6dd9ba
|
|||||||
CVE-2024-38359,0,0,3c4a78257f1dc283c0e90aef4e0803c297f82552e9ac95d2cc406a3431781604,2024-06-21T11:22:01.687000
|
CVE-2024-38359,0,0,3c4a78257f1dc283c0e90aef4e0803c297f82552e9ac95d2cc406a3431781604,2024-06-21T11:22:01.687000
|
||||||
CVE-2024-38361,0,0,a76df29cb5f27115adee4ca4e20976361dfcfc6eae95b97031ba2314a1f45bae,2024-06-21T11:22:01.687000
|
CVE-2024-38361,0,0,a76df29cb5f27115adee4ca4e20976361dfcfc6eae95b97031ba2314a1f45bae,2024-06-21T11:22:01.687000
|
||||||
CVE-2024-38364,0,0,af41b56a7f2f7758c06f324097079d559fb0340d3186315d52e465f177fe03d2,2024-06-26T12:44:29.693000
|
CVE-2024-38364,0,0,af41b56a7f2f7758c06f324097079d559fb0340d3186315d52e465f177fe03d2,2024-06-26T12:44:29.693000
|
||||||
CVE-2024-38366,1,1,541a9ae76a961661dc2ad7191536125422e0465ec8a391cd45d7a518ffdf17b2,2024-07-01T21:15:03.797000
|
CVE-2024-38366,0,0,541a9ae76a961661dc2ad7191536125422e0465ec8a391cd45d7a518ffdf17b2,2024-07-01T21:15:03.797000
|
||||||
CVE-2024-38367,1,1,4d61a8d1118da8677f0d0c67b7cf7e7361009d1950793b35dbe5fceb50ad3c66,2024-07-01T21:15:04.020000
|
CVE-2024-38367,0,0,4d61a8d1118da8677f0d0c67b7cf7e7361009d1950793b35dbe5fceb50ad3c66,2024-07-01T21:15:04.020000
|
||||||
CVE-2024-38368,1,1,396f635d6914da61f0aa9fc7c3e2ef247b96d7624eed8f5c2113c4f97561acd9,2024-07-01T21:15:04.250000
|
CVE-2024-38368,0,0,396f635d6914da61f0aa9fc7c3e2ef247b96d7624eed8f5c2113c4f97561acd9,2024-07-01T21:15:04.250000
|
||||||
CVE-2024-38369,0,0,fdff0768878da5d618998a51bbfecfa3dac560d76fa8e5e20682482a3b336371,2024-06-26T14:47:05.077000
|
CVE-2024-38369,0,0,fdff0768878da5d618998a51bbfecfa3dac560d76fa8e5e20682482a3b336371,2024-06-26T14:47:05.077000
|
||||||
CVE-2024-3837,0,0,5046b04f6fff161407832d91f839d6c01f3dcf30bcf75f620bfd7221b5de1c27,2024-05-03T03:16:29.010000
|
CVE-2024-3837,0,0,5046b04f6fff161407832d91f839d6c01f3dcf30bcf75f620bfd7221b5de1c27,2024-05-03T03:16:29.010000
|
||||||
CVE-2024-38371,0,0,89525bd0cac36f8169b7c7660aac33ce1fe77dbe859f180f5d0a019c34cd3913,2024-07-01T12:37:24.220000
|
CVE-2024-38371,0,0,89525bd0cac36f8169b7c7660aac33ce1fe77dbe859f180f5d0a019c34cd3913,2024-07-01T12:37:24.220000
|
||||||
@ -253888,7 +253894,7 @@ CVE-2024-3924,0,0,396cfe762c72fbd5a1960b1ddaed612b95d18abd602e0e4dd151e2967ca06c
|
|||||||
CVE-2024-39241,0,0,afa83ae007b8cddb769c7423e9b1caee4c0fe8b440470f4e2aca6500f4f35cee,2024-06-27T12:47:19.847000
|
CVE-2024-39241,0,0,afa83ae007b8cddb769c7423e9b1caee4c0fe8b440470f4e2aca6500f4f35cee,2024-06-27T12:47:19.847000
|
||||||
CVE-2024-39242,0,0,e6a42d26f8742e08c6e87c2f9736f6a5d1c92d4e99728f3f16ba7aaa3565d9e9,2024-06-27T12:47:19.847000
|
CVE-2024-39242,0,0,e6a42d26f8742e08c6e87c2f9736f6a5d1c92d4e99728f3f16ba7aaa3565d9e9,2024-06-27T12:47:19.847000
|
||||||
CVE-2024-39243,0,0,b8130c621cb0dfb964c1992defd80d667f6acc85382d7b6cd314c7c97d98e637,2024-06-27T12:47:19.847000
|
CVE-2024-39243,0,0,b8130c621cb0dfb964c1992defd80d667f6acc85382d7b6cd314c7c97d98e637,2024-06-27T12:47:19.847000
|
||||||
CVE-2024-39249,1,1,80e70652c3942adfb0f852f82880e409a6b52aea74448591eeada044a396542c,2024-07-01T20:15:02.877000
|
CVE-2024-39249,0,0,80e70652c3942adfb0f852f82880e409a6b52aea74448591eeada044a396542c,2024-07-01T20:15:02.877000
|
||||||
CVE-2024-3925,0,0,fcd3c5c763e8e19f599e796d0209af93ac6baa71961ded5ca72feb787efdbcae,2024-06-13T18:36:09.010000
|
CVE-2024-3925,0,0,fcd3c5c763e8e19f599e796d0209af93ac6baa71961ded5ca72feb787efdbcae,2024-06-13T18:36:09.010000
|
||||||
CVE-2024-39251,0,0,83aa84a253642014d74820cef4da4b5f960d62ee567a8bb1c69173eeea049f29,2024-07-01T19:15:05.480000
|
CVE-2024-39251,0,0,83aa84a253642014d74820cef4da4b5f960d62ee567a8bb1c69173eeea049f29,2024-07-01T19:15:05.480000
|
||||||
CVE-2024-3926,0,0,95647e23a8e9831b3425be75c3a5409a951b8ebef070821e4342ccb8d8ffe085,2024-05-22T18:59:20.240000
|
CVE-2024-3926,0,0,95647e23a8e9831b3425be75c3a5409a951b8ebef070821e4342ccb8d8ffe085,2024-05-22T18:59:20.240000
|
||||||
@ -253905,9 +253911,13 @@ CVE-2024-39298,0,0,62f081e1204433b72614003aee17d6ba0c526eacd01605580713226a64a6e
|
|||||||
CVE-2024-39301,0,0,557c328019f730a5c8c669db41be6ae8d457cdc115700b93300b3651fff5aa25,2024-06-25T18:50:42.040000
|
CVE-2024-39301,0,0,557c328019f730a5c8c669db41be6ae8d457cdc115700b93300b3651fff5aa25,2024-06-25T18:50:42.040000
|
||||||
CVE-2024-39302,0,0,946c3f23cfe199dda1010c0ea47b1d5e32454ef20b5307dfd8e2dc92485c1baa,2024-07-01T12:37:24.220000
|
CVE-2024-39302,0,0,946c3f23cfe199dda1010c0ea47b1d5e32454ef20b5307dfd8e2dc92485c1baa,2024-07-01T12:37:24.220000
|
||||||
CVE-2024-39303,0,0,570da85f74a800db45595a310d300ec8d2937d6a9616181c043d1959403ae091,2024-07-01T19:15:05.540000
|
CVE-2024-39303,0,0,570da85f74a800db45595a310d300ec8d2937d6a9616181c043d1959403ae091,2024-07-01T19:15:05.540000
|
||||||
CVE-2024-39305,1,1,d8a5e3cc54b58185b4967c9ebaac6dbb8c13189f40e42a11d0e50b529ecb504c,2024-07-01T21:15:04.520000
|
CVE-2024-39305,0,0,d8a5e3cc54b58185b4967c9ebaac6dbb8c13189f40e42a11d0e50b529ecb504c,2024-07-01T21:15:04.520000
|
||||||
CVE-2024-39307,0,0,c6ba32c8ba3cfcd15570f781df2bcad3fc5cb61b722485741dcbdce4f9e733a2,2024-07-01T12:37:24.220000
|
CVE-2024-39307,0,0,c6ba32c8ba3cfcd15570f781df2bcad3fc5cb61b722485741dcbdce4f9e733a2,2024-07-01T12:37:24.220000
|
||||||
|
CVE-2024-39309,1,1,5b78d58bc6caf0502b335839ab19006e45766eab290f23830fa54e7ca19bcbd8,2024-07-01T22:15:03.253000
|
||||||
CVE-2024-3931,0,0,ff26b5a8728d6a7f3e1f8095f9d431d98f0c624577950ceaf4dc1cf9ad688034,2024-06-06T20:15:13.933000
|
CVE-2024-3931,0,0,ff26b5a8728d6a7f3e1f8095f9d431d98f0c624577950ceaf4dc1cf9ad688034,2024-06-06T20:15:13.933000
|
||||||
|
CVE-2024-39310,1,1,af46caafefbc010b62c674316f17ba8fc66818107937d034fcf64f2d76232978,2024-07-01T22:15:03.483000
|
||||||
|
CVE-2024-39313,1,1,12953107fa413bc8f11d6a61b62ca154d54b318f225f7a30bb94f32d34405e65,2024-07-01T22:15:03.690000
|
||||||
|
CVE-2024-39314,1,1,2592061cefabd47f7aadc20271722f16af52e155bafb1618a7cd81af7d86c5b5,2024-07-01T22:15:03.900000
|
||||||
CVE-2024-3932,0,0,371291a71f9c99e371f96e7d7b61e3e11967567047c07fae80310c4772d1c0c7,2024-06-06T20:15:14.030000
|
CVE-2024-3932,0,0,371291a71f9c99e371f96e7d7b61e3e11967567047c07fae80310c4772d1c0c7,2024-06-06T20:15:14.030000
|
||||||
CVE-2024-3933,0,0,1d08d4e317596700be65ef5300f76b449794bb2d8b1542a98c34b9cd74fea015,2024-05-28T12:39:28.377000
|
CVE-2024-3933,0,0,1d08d4e317596700be65ef5300f76b449794bb2d8b1542a98c34b9cd74fea015,2024-05-28T12:39:28.377000
|
||||||
CVE-2024-39331,0,0,c5bb3e665b31aacdbf907c7032da4f6d49d6bc82a59a96e6be39b1d4f66a92fd,2024-06-29T07:15:02.060000
|
CVE-2024-39331,0,0,c5bb3e665b31aacdbf907c7032da4f6d49d6bc82a59a96e6be39b1d4f66a92fd,2024-06-29T07:15:02.060000
|
||||||
@ -255054,7 +255064,7 @@ CVE-2024-5314,0,0,fb6304ffb5d50ce8724d643a46fad25ba80695f7c0c0eb4ec33a07d41bc498
|
|||||||
CVE-2024-5315,0,0,e1b0baaf93d62cf125eea53091da57c404cdf61d625ae810529ebef84e73357d,2024-05-24T13:03:05.093000
|
CVE-2024-5315,0,0,e1b0baaf93d62cf125eea53091da57c404cdf61d625ae810529ebef84e73357d,2024-05-24T13:03:05.093000
|
||||||
CVE-2024-5317,0,0,f1a52a6a9c8c0e0ec33c800078b387ceb900e9c5541b8549c2aff9d1fff22088,2024-06-11T17:22:08.007000
|
CVE-2024-5317,0,0,f1a52a6a9c8c0e0ec33c800078b387ceb900e9c5541b8549c2aff9d1fff22088,2024-06-11T17:22:08.007000
|
||||||
CVE-2024-5318,0,0,812431b83287688611dc496217ea25ba5560744235da04dca7a35239cac1fe9a,2024-05-24T18:09:20.027000
|
CVE-2024-5318,0,0,812431b83287688611dc496217ea25ba5560744235da04dca7a35239cac1fe9a,2024-05-24T18:09:20.027000
|
||||||
CVE-2024-5322,1,1,ae48bb7dfae97ddb699dcfb3b83bf408fd39e84cc3f00e254e70adba616c6d55,2024-07-01T21:15:04.810000
|
CVE-2024-5322,0,0,ae48bb7dfae97ddb699dcfb3b83bf408fd39e84cc3f00e254e70adba616c6d55,2024-07-01T21:15:04.810000
|
||||||
CVE-2024-5324,0,0,239b526476b291cf58ac1a7ce87454c70f83a8964e6e304d358d59b9fc037786,2024-06-06T14:17:35.017000
|
CVE-2024-5324,0,0,239b526476b291cf58ac1a7ce87454c70f83a8964e6e304d358d59b9fc037786,2024-06-06T14:17:35.017000
|
||||||
CVE-2024-5326,0,0,9beaa1147d54b3ae536a6eb0023672ae377946ef8aec317bd58c5324df5850c7,2024-05-30T13:15:41.297000
|
CVE-2024-5326,0,0,9beaa1147d54b3ae536a6eb0023672ae377946ef8aec317bd58c5324df5850c7,2024-05-30T13:15:41.297000
|
||||||
CVE-2024-5327,0,0,84b1605ed9f8fbbcd152a70275bed021ec8172a393ec025e57c9733c6898763a,2024-05-30T13:15:41.297000
|
CVE-2024-5327,0,0,84b1605ed9f8fbbcd152a70275bed021ec8172a393ec025e57c9733c6898763a,2024-05-30T13:15:41.297000
|
||||||
@ -255616,7 +255626,7 @@ CVE-2024-6373,0,0,ffc7549884eeecbe338ce0f17f670d62abf2209962cbc27b0291f9ddbed7c1
|
|||||||
CVE-2024-6374,0,0,951e3f10ed1a8de2c137bcf7721b529de76cab1c6430f8094753092eaf9ecd40,2024-06-27T17:11:52.390000
|
CVE-2024-6374,0,0,951e3f10ed1a8de2c137bcf7721b529de76cab1c6430f8094753092eaf9ecd40,2024-06-27T17:11:52.390000
|
||||||
CVE-2024-6375,0,0,63966b93eb46e16d023260fad8c0d7013b7249b4716b3dc1473565015805b694,2024-07-01T16:37:39.040000
|
CVE-2024-6375,0,0,63966b93eb46e16d023260fad8c0d7013b7249b4716b3dc1473565015805b694,2024-07-01T16:37:39.040000
|
||||||
CVE-2024-6376,0,0,5b1144f575b26ee71024cb47efd50b0c100b6444589a68c6e121da4ff25018c3,2024-07-01T16:37:39.040000
|
CVE-2024-6376,0,0,5b1144f575b26ee71024cb47efd50b0c100b6444589a68c6e121da4ff25018c3,2024-07-01T16:37:39.040000
|
||||||
CVE-2024-6387,0,0,bbe5287c80348c6c5eb476ea80c57557c69d7b3a93ee33f1331d87bccd4ebc3f,2024-07-01T19:15:06.037000
|
CVE-2024-6387,0,1,06f61fab59eee11483c9e76925abd9a7af3b55025b0aaec2ef96a20f03a03c86,2024-07-01T23:15:02.157000
|
||||||
CVE-2024-6388,0,0,e641c9d869769d4291da87145b48d15b4f200c046d6b100142bc686375a84738,2024-06-27T17:11:52.390000
|
CVE-2024-6388,0,0,e641c9d869769d4291da87145b48d15b4f200c046d6b100142bc686375a84738,2024-06-27T17:11:52.390000
|
||||||
CVE-2024-6402,0,0,795485c4534407e246daec51c1daaa33b95f6651688fed743a8fb9054cdaedba,2024-07-01T12:37:24.220000
|
CVE-2024-6402,0,0,795485c4534407e246daec51c1daaa33b95f6651688fed743a8fb9054cdaedba,2024-07-01T12:37:24.220000
|
||||||
CVE-2024-6403,0,0,e44b9cfa8d9ae367e624a8cdf179ef52ea1e98c2115d7a956299d17747a6a56b,2024-07-01T12:37:24.220000
|
CVE-2024-6403,0,0,e44b9cfa8d9ae367e624a8cdf179ef52ea1e98c2115d7a956299d17747a6a56b,2024-07-01T12:37:24.220000
|
||||||
|
Can't render this file because it is too large.
|
Loading…
x
Reference in New Issue
Block a user