From a149d0832b9965d81614362ef168fd347f7ba1c4 Mon Sep 17 00:00:00 2001 From: cvelistV5 Github Action - optimized Date: Fri, 5 Jul 2024 13:18:15 +0000 Subject: [PATCH] 100 changes (0 new | 100 updated): - 0 new CVEs: - 100 updated CVEs: CVE-2024-28902, CVE-2024-28903, CVE-2024-28904, CVE-2024-28905, CVE-2024-28906, CVE-2024-28907, CVE-2024-28908, CVE-2024-28909, CVE-2024-28910, CVE-2024-28911, CVE-2024-28912, CVE-2024-28913, CVE-2024-28914, CVE-2024-28915, CVE-2024-28916, CVE-2024-28917, CVE-2024-28919, CVE-2024-28920, CVE-2024-28921, CVE-2024-28922, CVE-2024-28923, CVE-2024-28924, CVE-2024-28925, CVE-2024-28926, CVE-2024-28927, CVE-2024-28929, CVE-2024-28930, CVE-2024-28931, CVE-2024-28932, CVE-2024-28933, CVE-2024-28934, CVE-2024-28935, CVE-2024-28936, CVE-2024-28937, CVE-2024-28938, CVE-2024-28939, CVE-2024-28940, CVE-2024-28941, CVE-2024-28942, CVE-2024-28943, CVE-2024-28944, CVE-2024-28945, CVE-2024-28949, CVE-2024-28951, CVE-2024-28957, CVE-2024-28960, CVE-2024-28961, CVE-2024-28963, CVE-2024-28964, CVE-2024-28965, CVE-2024-28966, CVE-2024-28967, CVE-2024-28968, CVE-2024-28969, CVE-2024-28970, CVE-2024-28971, CVE-2024-28973, CVE-2024-28974, CVE-2024-28976, CVE-2024-28977, CVE-2024-28978, CVE-2024-28979, CVE-2024-28982, CVE-2024-28983, CVE-2024-28984, CVE-2024-28995, CVE-2024-28996, CVE-2024-28999, CVE-2024-29000, CVE-2024-29001, CVE-2024-29003, CVE-2024-29004, CVE-2024-29006, CVE-2024-29007, CVE-2024-29008, CVE-2024-29009, CVE-2024-29010, CVE-2024-29011, CVE-2024-29012, CVE-2024-29013, CVE-2024-29018, CVE-2024-29019, CVE-2024-29020, CVE-2024-29021, CVE-2024-29022, CVE-2024-29023, CVE-2024-29024, CVE-2024-29025, CVE-2024-29026, CVE-2024-29027, CVE-2024-29028, CVE-2024-29029, CVE-2024-29030, CVE-2024-29031, CVE-2024-29032, CVE-2024-29033, CVE-2024-29034, CVE-2024-29035, CVE-2024-29036, CVE-2024-29037 --- cves/2024/28xxx/CVE-2024-28902.json | 19 +- cves/2024/28xxx/CVE-2024-28903.json | 19 +- cves/2024/28xxx/CVE-2024-28904.json | 25 +- cves/2024/28xxx/CVE-2024-28905.json | 19 +- cves/2024/28xxx/CVE-2024-28906.json | 19 +- cves/2024/28xxx/CVE-2024-28907.json | 19 +- cves/2024/28xxx/CVE-2024-28908.json | 25 +- cves/2024/28xxx/CVE-2024-28909.json | 19 +- cves/2024/28xxx/CVE-2024-28910.json | 19 +- cves/2024/28xxx/CVE-2024-28911.json | 25 +- cves/2024/28xxx/CVE-2024-28912.json | 19 +- cves/2024/28xxx/CVE-2024-28913.json | 25 +- cves/2024/28xxx/CVE-2024-28914.json | 25 +- cves/2024/28xxx/CVE-2024-28915.json | 25 +- cves/2024/28xxx/CVE-2024-28916.json | 25 +- cves/2024/28xxx/CVE-2024-28917.json | 25 +- cves/2024/28xxx/CVE-2024-28919.json | 25 +- cves/2024/28xxx/CVE-2024-28920.json | 25 +- cves/2024/28xxx/CVE-2024-28921.json | 25 +- cves/2024/28xxx/CVE-2024-28922.json | 25 +- cves/2024/28xxx/CVE-2024-28923.json | 19 +- cves/2024/28xxx/CVE-2024-28924.json | 25 +- cves/2024/28xxx/CVE-2024-28925.json | 25 +- cves/2024/28xxx/CVE-2024-28926.json | 25 +- cves/2024/28xxx/CVE-2024-28927.json | 19 +- cves/2024/28xxx/CVE-2024-28929.json | 25 +- cves/2024/28xxx/CVE-2024-28930.json | 25 +- cves/2024/28xxx/CVE-2024-28931.json | 19 +- cves/2024/28xxx/CVE-2024-28932.json | 25 +- cves/2024/28xxx/CVE-2024-28933.json | 19 +- cves/2024/28xxx/CVE-2024-28934.json | 19 +- cves/2024/28xxx/CVE-2024-28935.json | 19 +- cves/2024/28xxx/CVE-2024-28936.json | 19 +- cves/2024/28xxx/CVE-2024-28937.json | 19 +- cves/2024/28xxx/CVE-2024-28938.json | 19 +- cves/2024/28xxx/CVE-2024-28939.json | 25 +- cves/2024/28xxx/CVE-2024-28940.json | 25 +- cves/2024/28xxx/CVE-2024-28941.json | 25 +- cves/2024/28xxx/CVE-2024-28942.json | 25 +- cves/2024/28xxx/CVE-2024-28943.json | 25 +- cves/2024/28xxx/CVE-2024-28944.json | 25 +- cves/2024/28xxx/CVE-2024-28945.json | 25 +- cves/2024/28xxx/CVE-2024-28949.json | 10 +- cves/2024/28xxx/CVE-2024-28951.json | 23 +- cves/2024/28xxx/CVE-2024-28957.json | 22 +- cves/2024/28xxx/CVE-2024-28960.json | 40 +- cves/2024/28xxx/CVE-2024-28961.json | 11 +- cves/2024/28xxx/CVE-2024-28963.json | 11 +- cves/2024/28xxx/CVE-2024-28964.json | 18 +- cves/2024/28xxx/CVE-2024-28965.json | 18 +- cves/2024/28xxx/CVE-2024-28966.json | 18 +- cves/2024/28xxx/CVE-2024-28967.json | 22 +- cves/2024/28xxx/CVE-2024-28968.json | 22 +- cves/2024/28xxx/CVE-2024-28969.json | 22 +- cves/2024/28xxx/CVE-2024-28970.json | 18 +- cves/2024/28xxx/CVE-2024-28971.json | 11 +- cves/2024/28xxx/CVE-2024-28973.json | 18 +- cves/2024/28xxx/CVE-2024-28974.json | 11 +- cves/2024/28xxx/CVE-2024-28976.json | 11 +- cves/2024/28xxx/CVE-2024-28977.json | 11 +- cves/2024/28xxx/CVE-2024-28978.json | 11 +- cves/2024/28xxx/CVE-2024-28979.json | 11 +- cves/2024/28xxx/CVE-2024-28982.json | 21 +- cves/2024/28xxx/CVE-2024-28983.json | 17 +- cves/2024/28xxx/CVE-2024-28984.json | 21 +- cves/2024/28xxx/CVE-2024-28995.json | 22 +- cves/2024/28xxx/CVE-2024-28996.json | 25 +- cves/2024/28xxx/CVE-2024-28999.json | 18 +- cves/2024/29xxx/CVE-2024-29000.json | 16 +- cves/2024/29xxx/CVE-2024-29001.json | 16 +- cves/2024/29xxx/CVE-2024-29003.json | 16 +- cves/2024/29xxx/CVE-2024-29004.json | 18 +- cves/2024/29xxx/CVE-2024-29006.json | 11 +- cves/2024/29xxx/CVE-2024-29007.json | 11 +- cves/2024/29xxx/CVE-2024-29008.json | 11 +- cves/2024/29xxx/CVE-2024-29009.json | 16 +- cves/2024/29xxx/CVE-2024-29010.json | 11 +- cves/2024/29xxx/CVE-2024-29011.json | 11 +- cves/2024/29xxx/CVE-2024-29012.json | 11 +- cves/2024/29xxx/CVE-2024-29013.json | 22 +- cves/2024/29xxx/CVE-2024-29018.json | 20 +- cves/2024/29xxx/CVE-2024-29019.json | 20 +- cves/2024/29xxx/CVE-2024-29020.json | 12 +- cves/2024/29xxx/CVE-2024-29021.json | 20 +- cves/2024/29xxx/CVE-2024-29022.json | 36 +- cves/2024/29xxx/CVE-2024-29023.json | 52 +- cves/2024/29xxx/CVE-2024-29024.json | 12 +- cves/2024/29xxx/CVE-2024-29025.json | 34 +- cves/2024/29xxx/CVE-2024-29026.json | 28 +- cves/2024/29xxx/CVE-2024-29027.json | 44 +- cves/2024/29xxx/CVE-2024-29028.json | 20 +- cves/2024/29xxx/CVE-2024-29029.json | 28 +- cves/2024/29xxx/CVE-2024-29030.json | 28 +- cves/2024/29xxx/CVE-2024-29031.json | 28 +- cves/2024/29xxx/CVE-2024-29032.json | 28 +- cves/2024/29xxx/CVE-2024-29033.json | 28 +- cves/2024/29xxx/CVE-2024-29034.json | 20 +- cves/2024/29xxx/CVE-2024-29035.json | 20 +- cves/2024/29xxx/CVE-2024-29036.json | 36 +- cves/2024/29xxx/CVE-2024-29037.json | 20 +- cves/delta.json | 1404 ++++++++------------------- cves/deltaLog.json | 608 ++++++++++++ 102 files changed, 2923 insertions(+), 1204 deletions(-) diff --git a/cves/2024/28xxx/CVE-2024-28902.json b/cves/2024/28xxx/CVE-2024-28902.json index dc9279e88a1..f0a3f97f31f 100644 --- a/cves/2024/28xxx/CVE-2024-28902.json +++ b/cves/2024/28xxx/CVE-2024-28902.json @@ -8,7 +8,7 @@ "assignerShortName": "microsoft", "dateReserved": "2024-03-13T01:26:53.025Z", "datePublished": "2024-04-09T17:00:20.353Z", - "dateUpdated": "2024-06-11T15:24:04.296Z" + "dateUpdated": "2024-07-05T13:17:06.134Z" }, "containers": { "cna": { @@ -423,6 +423,23 @@ "shortName": "CISAADP", "dateUpdated": "2024-05-16T19:10:01.027Z" } + }, + { + "providerMetadata": { + "orgId": "96f1cf3c-f80a-4e0f-a063-99a91e3f1325", + "shortName": "secretariat-reference", + "dateUpdated": "2024-07-05T13:17:06.134Z" + }, + "references": [ + { + "name": "Windows Remote Access Connection Manager Information Disclosure Vulnerability", + "tags": [ + "vendor-advisory", + "x_snapshot" + ], + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-28902/adp-test-6-28" + } + ] } ] } diff --git a/cves/2024/28xxx/CVE-2024-28903.json b/cves/2024/28xxx/CVE-2024-28903.json index fd449565fe2..41932a1d77a 100644 --- a/cves/2024/28xxx/CVE-2024-28903.json +++ b/cves/2024/28xxx/CVE-2024-28903.json @@ -8,7 +8,7 @@ "assignerShortName": "microsoft", "dateReserved": "2024-03-13T01:26:53.025Z", "datePublished": "2024-04-09T17:00:20.895Z", - "dateUpdated": "2024-06-11T15:24:04.977Z" + "dateUpdated": "2024-07-05T13:17:06.163Z" }, "containers": { "cna": { @@ -459,6 +459,23 @@ "shortName": "CISAADP", "dateUpdated": "2024-05-16T19:10:01.463Z" } + }, + { + "providerMetadata": { + "orgId": "96f1cf3c-f80a-4e0f-a063-99a91e3f1325", + "shortName": "secretariat-reference", + "dateUpdated": "2024-07-05T13:17:06.163Z" + }, + "references": [ + { + "name": "Secure Boot Security Feature Bypass Vulnerability", + "tags": [ + "vendor-advisory", + "x_snapshot" + ], + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-28903/adp-test-6-28" + } + ] } ] } diff --git a/cves/2024/28xxx/CVE-2024-28904.json b/cves/2024/28xxx/CVE-2024-28904.json index ee66b27e25d..143784f0392 100644 --- a/cves/2024/28xxx/CVE-2024-28904.json +++ b/cves/2024/28xxx/CVE-2024-28904.json @@ -1,6 +1,6 @@ { "dataType": "CVE_RECORD", - "dataVersion": "5.0", + "dataVersion": "5.1", "cveMetadata": { "cveId": "CVE-2024-28904", "assignerOrgId": "f38d906d-7342-40ea-92c1-6c4a2c6478c8", @@ -8,7 +8,7 @@ "assignerShortName": "microsoft", "dateReserved": "2024-03-13T01:26:53.025Z", "datePublished": "2024-04-09T17:01:10.655Z", - "dateUpdated": "2024-06-11T15:25:02.251Z" + "dateUpdated": "2024-07-05T13:17:06.152Z" }, "containers": { "cna": { @@ -83,6 +83,25 @@ } } ] - } + }, + "adp": [ + { + "providerMetadata": { + "orgId": "96f1cf3c-f80a-4e0f-a063-99a91e3f1325", + "shortName": "secretariat-reference", + "dateUpdated": "2024-07-05T13:17:06.152Z" + }, + "references": [ + { + "name": "Microsoft Brokering File System Elevation of Privilege Vulnerability", + "tags": [ + "vendor-advisory", + "x_snapshot" + ], + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-28904/adp-test-6-28" + } + ] + } + ] } } \ No newline at end of file diff --git a/cves/2024/28xxx/CVE-2024-28905.json b/cves/2024/28xxx/CVE-2024-28905.json index 7ee2c01fcbc..22c61508a38 100644 --- a/cves/2024/28xxx/CVE-2024-28905.json +++ b/cves/2024/28xxx/CVE-2024-28905.json @@ -8,7 +8,7 @@ "assignerShortName": "microsoft", "dateReserved": "2024-03-13T01:26:53.025Z", "datePublished": "2024-04-09T17:00:21.467Z", - "dateUpdated": "2024-06-11T15:24:05.587Z" + "dateUpdated": "2024-07-05T13:17:07.698Z" }, "containers": { "cna": { @@ -116,6 +116,23 @@ "shortName": "CISAADP", "dateUpdated": "2024-05-16T19:09:56.582Z" } + }, + { + "providerMetadata": { + "orgId": "96f1cf3c-f80a-4e0f-a063-99a91e3f1325", + "shortName": "secretariat-reference", + "dateUpdated": "2024-07-05T13:17:07.698Z" + }, + "references": [ + { + "name": "Microsoft Brokering File System Elevation of Privilege Vulnerability", + "tags": [ + "vendor-advisory", + "x_snapshot" + ], + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-28905/adp-test-6-28" + } + ] } ] } diff --git a/cves/2024/28xxx/CVE-2024-28906.json b/cves/2024/28xxx/CVE-2024-28906.json index 1433d9c4268..8eaf4e7c6af 100644 --- a/cves/2024/28xxx/CVE-2024-28906.json +++ b/cves/2024/28xxx/CVE-2024-28906.json @@ -8,7 +8,7 @@ "assignerShortName": "microsoft", "dateReserved": "2024-03-13T01:26:53.025Z", "datePublished": "2024-04-09T17:00:22.006Z", - "dateUpdated": "2024-06-11T15:24:06.284Z" + "dateUpdated": "2024-07-05T13:17:07.737Z" }, "containers": { "cna": { @@ -206,6 +206,23 @@ "shortName": "CISAADP", "dateUpdated": "2024-05-16T19:10:14.176Z" } + }, + { + "providerMetadata": { + "orgId": "96f1cf3c-f80a-4e0f-a063-99a91e3f1325", + "shortName": "secretariat-reference", + "dateUpdated": "2024-07-05T13:17:07.737Z" + }, + "references": [ + { + "name": "Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability", + "tags": [ + "vendor-advisory", + "x_snapshot" + ], + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-28906/adp-test-6-28" + } + ] } ] } diff --git a/cves/2024/28xxx/CVE-2024-28907.json b/cves/2024/28xxx/CVE-2024-28907.json index cdeb9f3ce13..725ed39c98b 100644 --- a/cves/2024/28xxx/CVE-2024-28907.json +++ b/cves/2024/28xxx/CVE-2024-28907.json @@ -8,7 +8,7 @@ "assignerShortName": "microsoft", "dateReserved": "2024-03-13T01:26:53.025Z", "datePublished": "2024-04-09T17:01:11.208Z", - "dateUpdated": "2024-06-11T15:25:02.930Z" + "dateUpdated": "2024-07-05T13:17:07.916Z" }, "containers": { "cna": { @@ -116,6 +116,23 @@ "shortName": "CISAADP", "dateUpdated": "2024-05-16T19:10:17.221Z" } + }, + { + "providerMetadata": { + "orgId": "96f1cf3c-f80a-4e0f-a063-99a91e3f1325", + "shortName": "secretariat-reference", + "dateUpdated": "2024-07-05T13:17:07.916Z" + }, + "references": [ + { + "name": "Microsoft Brokering File System Elevation of Privilege Vulnerability", + "tags": [ + "vendor-advisory", + "x_snapshot" + ], + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-28907/adp-test-6-28" + } + ] } ] } diff --git a/cves/2024/28xxx/CVE-2024-28908.json b/cves/2024/28xxx/CVE-2024-28908.json index 920ee5a01d7..a5592a327ba 100644 --- a/cves/2024/28xxx/CVE-2024-28908.json +++ b/cves/2024/28xxx/CVE-2024-28908.json @@ -1,6 +1,6 @@ { "dataType": "CVE_RECORD", - "dataVersion": "5.0", + "dataVersion": "5.1", "cveMetadata": { "cveId": "CVE-2024-28908", "assignerOrgId": "f38d906d-7342-40ea-92c1-6c4a2c6478c8", @@ -8,7 +8,7 @@ "assignerShortName": "microsoft", "dateReserved": "2024-03-13T01:26:53.026Z", "datePublished": "2024-04-09T17:00:22.551Z", - "dateUpdated": "2024-06-11T15:24:06.907Z" + "dateUpdated": "2024-07-05T13:17:07.738Z" }, "containers": { "cna": { @@ -173,6 +173,25 @@ } } ] - } + }, + "adp": [ + { + "providerMetadata": { + "orgId": "96f1cf3c-f80a-4e0f-a063-99a91e3f1325", + "shortName": "secretariat-reference", + "dateUpdated": "2024-07-05T13:17:07.738Z" + }, + "references": [ + { + "name": "Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability", + "tags": [ + "vendor-advisory", + "x_snapshot" + ], + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-28908/adp-test-6-28" + } + ] + } + ] } } \ No newline at end of file diff --git a/cves/2024/28xxx/CVE-2024-28909.json b/cves/2024/28xxx/CVE-2024-28909.json index 9b3ba3ada9a..1710ae699ec 100644 --- a/cves/2024/28xxx/CVE-2024-28909.json +++ b/cves/2024/28xxx/CVE-2024-28909.json @@ -8,7 +8,7 @@ "assignerShortName": "microsoft", "dateReserved": "2024-03-13T01:26:53.026Z", "datePublished": "2024-04-09T17:00:23.090Z", - "dateUpdated": "2024-06-11T15:24:07.574Z" + "dateUpdated": "2024-07-05T13:17:07.727Z" }, "containers": { "cna": { @@ -206,6 +206,23 @@ "shortName": "CISAADP", "dateUpdated": "2024-05-16T19:09:55.219Z" } + }, + { + "providerMetadata": { + "orgId": "96f1cf3c-f80a-4e0f-a063-99a91e3f1325", + "shortName": "secretariat-reference", + "dateUpdated": "2024-07-05T13:17:07.727Z" + }, + "references": [ + { + "name": "Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability", + "tags": [ + "vendor-advisory", + "x_snapshot" + ], + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-28909/adp-test-6-28" + } + ] } ] } diff --git a/cves/2024/28xxx/CVE-2024-28910.json b/cves/2024/28xxx/CVE-2024-28910.json index 3b1caff8c78..314feffaffa 100644 --- a/cves/2024/28xxx/CVE-2024-28910.json +++ b/cves/2024/28xxx/CVE-2024-28910.json @@ -8,7 +8,7 @@ "assignerShortName": "microsoft", "dateReserved": "2024-03-13T01:26:53.026Z", "datePublished": "2024-04-09T17:00:23.631Z", - "dateUpdated": "2024-06-11T15:24:08.243Z" + "dateUpdated": "2024-07-05T13:17:07.563Z" }, "containers": { "cna": { @@ -206,6 +206,23 @@ "shortName": "CISAADP", "dateUpdated": "2024-05-16T19:10:13.327Z" } + }, + { + "providerMetadata": { + "orgId": "96f1cf3c-f80a-4e0f-a063-99a91e3f1325", + "shortName": "secretariat-reference", + "dateUpdated": "2024-07-05T13:17:07.563Z" + }, + "references": [ + { + "name": "Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability", + "tags": [ + "vendor-advisory", + "x_snapshot" + ], + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-28910/adp-test-6-28" + } + ] } ] } diff --git a/cves/2024/28xxx/CVE-2024-28911.json b/cves/2024/28xxx/CVE-2024-28911.json index 4c64baeea81..e87a6adb2b6 100644 --- a/cves/2024/28xxx/CVE-2024-28911.json +++ b/cves/2024/28xxx/CVE-2024-28911.json @@ -1,6 +1,6 @@ { "dataType": "CVE_RECORD", - "dataVersion": "5.0", + "dataVersion": "5.1", "cveMetadata": { "cveId": "CVE-2024-28911", "assignerOrgId": "f38d906d-7342-40ea-92c1-6c4a2c6478c8", @@ -8,7 +8,7 @@ "assignerShortName": "microsoft", "dateReserved": "2024-03-13T01:26:53.026Z", "datePublished": "2024-04-09T17:00:24.222Z", - "dateUpdated": "2024-06-11T15:24:08.919Z" + "dateUpdated": "2024-07-05T13:17:07.761Z" }, "containers": { "cna": { @@ -173,6 +173,25 @@ } } ] - } + }, + "adp": [ + { + "providerMetadata": { + "orgId": "96f1cf3c-f80a-4e0f-a063-99a91e3f1325", + "shortName": "secretariat-reference", + "dateUpdated": "2024-07-05T13:17:07.761Z" + }, + "references": [ + { + "name": "Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability", + "tags": [ + "vendor-advisory", + "x_snapshot" + ], + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-28911/adp-test-6-28" + } + ] + } + ] } } \ No newline at end of file diff --git a/cves/2024/28xxx/CVE-2024-28912.json b/cves/2024/28xxx/CVE-2024-28912.json index 5c03717c278..99424a0cfde 100644 --- a/cves/2024/28xxx/CVE-2024-28912.json +++ b/cves/2024/28xxx/CVE-2024-28912.json @@ -8,7 +8,7 @@ "assignerShortName": "microsoft", "dateReserved": "2024-03-13T01:26:53.026Z", "datePublished": "2024-04-09T17:00:24.771Z", - "dateUpdated": "2024-06-11T15:24:09.594Z" + "dateUpdated": "2024-07-05T13:17:07.917Z" }, "containers": { "cna": { @@ -206,6 +206,23 @@ "shortName": "CISAADP", "dateUpdated": "2024-05-16T19:09:52.557Z" } + }, + { + "providerMetadata": { + "orgId": "96f1cf3c-f80a-4e0f-a063-99a91e3f1325", + "shortName": "secretariat-reference", + "dateUpdated": "2024-07-05T13:17:07.917Z" + }, + "references": [ + { + "name": "Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability", + "tags": [ + "vendor-advisory", + "x_snapshot" + ], + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-28912/adp-test-6-28" + } + ] } ] } diff --git a/cves/2024/28xxx/CVE-2024-28913.json b/cves/2024/28xxx/CVE-2024-28913.json index 23b43454352..12c02decc01 100644 --- a/cves/2024/28xxx/CVE-2024-28913.json +++ b/cves/2024/28xxx/CVE-2024-28913.json @@ -1,6 +1,6 @@ { "dataType": "CVE_RECORD", - "dataVersion": "5.0", + "dataVersion": "5.1", "cveMetadata": { "cveId": "CVE-2024-28913", "assignerOrgId": "f38d906d-7342-40ea-92c1-6c4a2c6478c8", @@ -8,7 +8,7 @@ "assignerShortName": "microsoft", "dateReserved": "2024-03-13T01:26:53.027Z", "datePublished": "2024-04-09T17:00:25.350Z", - "dateUpdated": "2024-06-11T15:24:10.262Z" + "dateUpdated": "2024-07-05T13:17:07.902Z" }, "containers": { "cna": { @@ -173,6 +173,25 @@ } } ] - } + }, + "adp": [ + { + "providerMetadata": { + "orgId": "96f1cf3c-f80a-4e0f-a063-99a91e3f1325", + "shortName": "secretariat-reference", + "dateUpdated": "2024-07-05T13:17:07.902Z" + }, + "references": [ + { + "name": "Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability", + "tags": [ + "vendor-advisory", + "x_snapshot" + ], + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-28913/adp-test-6-28" + } + ] + } + ] } } \ No newline at end of file diff --git a/cves/2024/28xxx/CVE-2024-28914.json b/cves/2024/28xxx/CVE-2024-28914.json index ceeaa9cb8e0..50d17d9b586 100644 --- a/cves/2024/28xxx/CVE-2024-28914.json +++ b/cves/2024/28xxx/CVE-2024-28914.json @@ -1,6 +1,6 @@ { "dataType": "CVE_RECORD", - "dataVersion": "5.0", + "dataVersion": "5.1", "cveMetadata": { "cveId": "CVE-2024-28914", "assignerOrgId": "f38d906d-7342-40ea-92c1-6c4a2c6478c8", @@ -8,7 +8,7 @@ "assignerShortName": "microsoft", "dateReserved": "2024-03-13T01:26:53.027Z", "datePublished": "2024-04-09T17:00:25.876Z", - "dateUpdated": "2024-06-11T15:24:10.939Z" + "dateUpdated": "2024-07-05T13:17:07.943Z" }, "containers": { "cna": { @@ -173,6 +173,25 @@ } } ] - } + }, + "adp": [ + { + "providerMetadata": { + "orgId": "96f1cf3c-f80a-4e0f-a063-99a91e3f1325", + "shortName": "secretariat-reference", + "dateUpdated": "2024-07-05T13:17:07.943Z" + }, + "references": [ + { + "name": "Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability", + "tags": [ + "vendor-advisory", + "x_snapshot" + ], + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-28914/adp-test-6-28" + } + ] + } + ] } } \ No newline at end of file diff --git a/cves/2024/28xxx/CVE-2024-28915.json b/cves/2024/28xxx/CVE-2024-28915.json index 2a72675c578..f09a6471ae7 100644 --- a/cves/2024/28xxx/CVE-2024-28915.json +++ b/cves/2024/28xxx/CVE-2024-28915.json @@ -1,6 +1,6 @@ { "dataType": "CVE_RECORD", - "dataVersion": "5.0", + "dataVersion": "5.1", "cveMetadata": { "cveId": "CVE-2024-28915", "assignerOrgId": "f38d906d-7342-40ea-92c1-6c4a2c6478c8", @@ -8,7 +8,7 @@ "assignerShortName": "microsoft", "dateReserved": "2024-03-13T01:26:53.027Z", "datePublished": "2024-04-09T17:00:26.477Z", - "dateUpdated": "2024-06-11T15:24:11.616Z" + "dateUpdated": "2024-07-05T13:17:06.220Z" }, "containers": { "cna": { @@ -173,6 +173,25 @@ } } ] - } + }, + "adp": [ + { + "providerMetadata": { + "orgId": "96f1cf3c-f80a-4e0f-a063-99a91e3f1325", + "shortName": "secretariat-reference", + "dateUpdated": "2024-07-05T13:17:06.220Z" + }, + "references": [ + { + "name": "Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability", + "tags": [ + "vendor-advisory", + "x_snapshot" + ], + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-28915/adp-test-6-28" + } + ] + } + ] } } \ No newline at end of file diff --git a/cves/2024/28xxx/CVE-2024-28916.json b/cves/2024/28xxx/CVE-2024-28916.json index 0bf64e1ca38..617a9fb9083 100644 --- a/cves/2024/28xxx/CVE-2024-28916.json +++ b/cves/2024/28xxx/CVE-2024-28916.json @@ -1,6 +1,6 @@ { "dataType": "CVE_RECORD", - "dataVersion": "5.0", + "dataVersion": "5.1", "cveMetadata": { "cveId": "CVE-2024-28916", "assignerOrgId": "f38d906d-7342-40ea-92c1-6c4a2c6478c8", @@ -8,7 +8,7 @@ "assignerShortName": "microsoft", "dateReserved": "2024-03-13T01:26:53.027Z", "datePublished": "2024-03-20T23:31:17.082Z", - "dateUpdated": "2024-06-11T15:10:24.634Z" + "dateUpdated": "2024-07-05T13:17:07.702Z" }, "containers": { "cna": { @@ -83,6 +83,25 @@ } } ] - } + }, + "adp": [ + { + "providerMetadata": { + "orgId": "96f1cf3c-f80a-4e0f-a063-99a91e3f1325", + "shortName": "secretariat-reference", + "dateUpdated": "2024-07-05T13:17:07.702Z" + }, + "references": [ + { + "name": "Xbox Gaming Services Elevation of Privilege Vulnerability", + "tags": [ + "vendor-advisory", + "x_snapshot" + ], + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-28916/adp-test-6-28" + } + ] + } + ] } } \ No newline at end of file diff --git a/cves/2024/28xxx/CVE-2024-28917.json b/cves/2024/28xxx/CVE-2024-28917.json index 7c2549a2be5..84469c78b4d 100644 --- a/cves/2024/28xxx/CVE-2024-28917.json +++ b/cves/2024/28xxx/CVE-2024-28917.json @@ -1,6 +1,6 @@ { "dataType": "CVE_RECORD", - "dataVersion": "5.0", + "dataVersion": "5.1", "cveMetadata": { "cveId": "CVE-2024-28917", "assignerOrgId": "f38d906d-7342-40ea-92c1-6c4a2c6478c8", @@ -8,7 +8,7 @@ "assignerShortName": "microsoft", "dateReserved": "2024-03-13T01:26:53.027Z", "datePublished": "2024-04-09T17:01:11.746Z", - "dateUpdated": "2024-06-11T15:25:03.468Z" + "dateUpdated": "2024-07-05T13:17:06.158Z" }, "containers": { "cna": { @@ -125,6 +125,25 @@ } } ] - } + }, + "adp": [ + { + "providerMetadata": { + "orgId": "96f1cf3c-f80a-4e0f-a063-99a91e3f1325", + "shortName": "secretariat-reference", + "dateUpdated": "2024-07-05T13:17:06.158Z" + }, + "references": [ + { + "name": "Azure Arc-enabled Kubernetes Extension Cluster-Scope Elevation of Privilege Vulnerability", + "tags": [ + "vendor-advisory", + "x_snapshot" + ], + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-28917/adp-test-6-28" + } + ] + } + ] } } \ No newline at end of file diff --git a/cves/2024/28xxx/CVE-2024-28919.json b/cves/2024/28xxx/CVE-2024-28919.json index 84c91d1eca5..32ff999f9fe 100644 --- a/cves/2024/28xxx/CVE-2024-28919.json +++ b/cves/2024/28xxx/CVE-2024-28919.json @@ -1,6 +1,6 @@ { "dataType": "CVE_RECORD", - "dataVersion": "5.0", + "dataVersion": "5.1", "cveMetadata": { "cveId": "CVE-2024-28919", "assignerOrgId": "f38d906d-7342-40ea-92c1-6c4a2c6478c8", @@ -8,7 +8,7 @@ "assignerShortName": "microsoft", "dateReserved": "2024-03-13T01:26:53.028Z", "datePublished": "2024-04-09T17:00:17.638Z", - "dateUpdated": "2024-06-11T15:24:00.704Z" + "dateUpdated": "2024-07-05T13:17:07.636Z" }, "containers": { "cna": { @@ -426,6 +426,25 @@ } } ] - } + }, + "adp": [ + { + "providerMetadata": { + "orgId": "96f1cf3c-f80a-4e0f-a063-99a91e3f1325", + "shortName": "secretariat-reference", + "dateUpdated": "2024-07-05T13:17:07.636Z" + }, + "references": [ + { + "name": "Secure Boot Security Feature Bypass Vulnerability", + "tags": [ + "vendor-advisory", + "x_snapshot" + ], + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-28919/adp-test-6-28" + } + ] + } + ] } } \ No newline at end of file diff --git a/cves/2024/28xxx/CVE-2024-28920.json b/cves/2024/28xxx/CVE-2024-28920.json index 7daf66cae83..24c1085a87c 100644 --- a/cves/2024/28xxx/CVE-2024-28920.json +++ b/cves/2024/28xxx/CVE-2024-28920.json @@ -1,6 +1,6 @@ { "dataType": "CVE_RECORD", - "dataVersion": "5.0", + "dataVersion": "5.1", "cveMetadata": { "cveId": "CVE-2024-28920", "assignerOrgId": "f38d906d-7342-40ea-92c1-6c4a2c6478c8", @@ -8,7 +8,7 @@ "assignerShortName": "microsoft", "dateReserved": "2024-03-13T01:26:53.028Z", "datePublished": "2024-04-09T17:00:15.987Z", - "dateUpdated": "2024-06-11T15:23:58.655Z" + "dateUpdated": "2024-07-05T13:17:07.352Z" }, "containers": { "cna": { @@ -278,6 +278,25 @@ } } ] - } + }, + "adp": [ + { + "providerMetadata": { + "orgId": "96f1cf3c-f80a-4e0f-a063-99a91e3f1325", + "shortName": "secretariat-reference", + "dateUpdated": "2024-07-05T13:17:07.352Z" + }, + "references": [ + { + "name": "Secure Boot Security Feature Bypass Vulnerability", + "tags": [ + "vendor-advisory", + "x_snapshot" + ], + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-28920/adp-test-6-28" + } + ] + } + ] } } \ No newline at end of file diff --git a/cves/2024/28xxx/CVE-2024-28921.json b/cves/2024/28xxx/CVE-2024-28921.json index 743c02b5381..df83529a7df 100644 --- a/cves/2024/28xxx/CVE-2024-28921.json +++ b/cves/2024/28xxx/CVE-2024-28921.json @@ -1,6 +1,6 @@ { "dataType": "CVE_RECORD", - "dataVersion": "5.0", + "dataVersion": "5.1", "cveMetadata": { "cveId": "CVE-2024-28921", "assignerOrgId": "f38d906d-7342-40ea-92c1-6c4a2c6478c8", @@ -8,7 +8,7 @@ "assignerShortName": "microsoft", "dateReserved": "2024-03-13T01:26:53.028Z", "datePublished": "2024-04-09T17:00:17.099Z", - "dateUpdated": "2024-06-11T15:23:59.932Z" + "dateUpdated": "2024-07-05T13:17:07.361Z" }, "containers": { "cna": { @@ -426,6 +426,25 @@ } } ] - } + }, + "adp": [ + { + "providerMetadata": { + "orgId": "96f1cf3c-f80a-4e0f-a063-99a91e3f1325", + "shortName": "secretariat-reference", + "dateUpdated": "2024-07-05T13:17:07.361Z" + }, + "references": [ + { + "name": "Secure Boot Security Feature Bypass Vulnerability", + "tags": [ + "vendor-advisory", + "x_snapshot" + ], + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-28921/adp-test-6-28" + } + ] + } + ] } } \ No newline at end of file diff --git a/cves/2024/28xxx/CVE-2024-28922.json b/cves/2024/28xxx/CVE-2024-28922.json index dd8e72e5a83..82195f6a387 100644 --- a/cves/2024/28xxx/CVE-2024-28922.json +++ b/cves/2024/28xxx/CVE-2024-28922.json @@ -1,6 +1,6 @@ { "dataType": "CVE_RECORD", - "dataVersion": "5.0", + "dataVersion": "5.1", "cveMetadata": { "cveId": "CVE-2024-28922", "assignerOrgId": "f38d906d-7342-40ea-92c1-6c4a2c6478c8", @@ -8,7 +8,7 @@ "assignerShortName": "microsoft", "dateReserved": "2024-03-13T01:26:53.028Z", "datePublished": "2024-04-09T17:00:16.545Z", - "dateUpdated": "2024-06-11T15:23:59.260Z" + "dateUpdated": "2024-07-05T13:17:07.488Z" }, "containers": { "cna": { @@ -426,6 +426,25 @@ } } ] - } + }, + "adp": [ + { + "providerMetadata": { + "orgId": "96f1cf3c-f80a-4e0f-a063-99a91e3f1325", + "shortName": "secretariat-reference", + "dateUpdated": "2024-07-05T13:17:07.488Z" + }, + "references": [ + { + "name": "Secure Boot Security Feature Bypass Vulnerability", + "tags": [ + "vendor-advisory", + "x_snapshot" + ], + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-28922/adp-test-6-28" + } + ] + } + ] } } \ No newline at end of file diff --git a/cves/2024/28xxx/CVE-2024-28923.json b/cves/2024/28xxx/CVE-2024-28923.json index 4ae3a9ed9b3..511d1384698 100644 --- a/cves/2024/28xxx/CVE-2024-28923.json +++ b/cves/2024/28xxx/CVE-2024-28923.json @@ -8,7 +8,7 @@ "assignerShortName": "microsoft", "dateReserved": "2024-03-13T01:26:53.028Z", "datePublished": "2024-04-09T17:00:18.197Z", - "dateUpdated": "2024-06-11T15:24:01.463Z" + "dateUpdated": "2024-07-05T13:17:07.554Z" }, "containers": { "cna": { @@ -459,6 +459,23 @@ "shortName": "CISAADP", "dateUpdated": "2024-05-16T19:10:05.269Z" } + }, + { + "providerMetadata": { + "orgId": "96f1cf3c-f80a-4e0f-a063-99a91e3f1325", + "shortName": "secretariat-reference", + "dateUpdated": "2024-07-05T13:17:07.554Z" + }, + "references": [ + { + "name": "Secure Boot Security Feature Bypass Vulnerability", + "tags": [ + "vendor-advisory", + "x_snapshot" + ], + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-28923/adp-test-6-28" + } + ] } ] } diff --git a/cves/2024/28xxx/CVE-2024-28924.json b/cves/2024/28xxx/CVE-2024-28924.json index 58631cedc9e..31afc65c9d8 100644 --- a/cves/2024/28xxx/CVE-2024-28924.json +++ b/cves/2024/28xxx/CVE-2024-28924.json @@ -1,6 +1,6 @@ { "dataType": "CVE_RECORD", - "dataVersion": "5.0", + "dataVersion": "5.1", "cveMetadata": { "cveId": "CVE-2024-28924", "assignerOrgId": "f38d906d-7342-40ea-92c1-6c4a2c6478c8", @@ -8,7 +8,7 @@ "assignerShortName": "microsoft", "dateReserved": "2024-03-13T01:26:53.028Z", "datePublished": "2024-04-09T17:01:08.345Z", - "dateUpdated": "2024-06-11T15:24:59.750Z" + "dateUpdated": "2024-07-05T13:17:07.878Z" }, "containers": { "cna": { @@ -426,6 +426,25 @@ } } ] - } + }, + "adp": [ + { + "providerMetadata": { + "orgId": "96f1cf3c-f80a-4e0f-a063-99a91e3f1325", + "shortName": "secretariat-reference", + "dateUpdated": "2024-07-05T13:17:07.878Z" + }, + "references": [ + { + "name": "Secure Boot Security Feature Bypass Vulnerability", + "tags": [ + "vendor-advisory", + "x_snapshot" + ], + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-28924/adp-test-6-28" + } + ] + } + ] } } \ No newline at end of file diff --git a/cves/2024/28xxx/CVE-2024-28925.json b/cves/2024/28xxx/CVE-2024-28925.json index c5d928981a7..4baab5e0ac8 100644 --- a/cves/2024/28xxx/CVE-2024-28925.json +++ b/cves/2024/28xxx/CVE-2024-28925.json @@ -1,6 +1,6 @@ { "dataType": "CVE_RECORD", - "dataVersion": "5.0", + "dataVersion": "5.1", "cveMetadata": { "cveId": "CVE-2024-28925", "assignerOrgId": "f38d906d-7342-40ea-92c1-6c4a2c6478c8", @@ -8,7 +8,7 @@ "assignerShortName": "microsoft", "dateReserved": "2024-03-13T01:26:53.028Z", "datePublished": "2024-04-09T17:01:08.970Z", - "dateUpdated": "2024-06-13T13:41:44.104Z" + "dateUpdated": "2024-07-05T13:17:07.755Z" }, "containers": { "cna": { @@ -518,6 +518,25 @@ } } ] - } + }, + "adp": [ + { + "providerMetadata": { + "orgId": "96f1cf3c-f80a-4e0f-a063-99a91e3f1325", + "shortName": "secretariat-reference", + "dateUpdated": "2024-07-05T13:17:07.755Z" + }, + "references": [ + { + "name": "Secure Boot Security Feature Bypass Vulnerability", + "tags": [ + "vendor-advisory", + "x_snapshot" + ], + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-28925/adp-test-6-28" + } + ] + } + ] } } \ No newline at end of file diff --git a/cves/2024/28xxx/CVE-2024-28926.json b/cves/2024/28xxx/CVE-2024-28926.json index aba5d51dae8..b1bfdf22102 100644 --- a/cves/2024/28xxx/CVE-2024-28926.json +++ b/cves/2024/28xxx/CVE-2024-28926.json @@ -1,6 +1,6 @@ { "dataType": "CVE_RECORD", - "dataVersion": "5.0", + "dataVersion": "5.1", "cveMetadata": { "cveId": "CVE-2024-28926", "assignerOrgId": "f38d906d-7342-40ea-92c1-6c4a2c6478c8", @@ -8,7 +8,7 @@ "assignerShortName": "microsoft", "dateReserved": "2024-03-13T01:26:53.030Z", "datePublished": "2024-04-09T17:01:12.323Z", - "dateUpdated": "2024-06-11T15:25:04.037Z" + "dateUpdated": "2024-07-05T13:17:07.970Z" }, "containers": { "cna": { @@ -173,6 +173,25 @@ } } ] - } + }, + "adp": [ + { + "providerMetadata": { + "orgId": "96f1cf3c-f80a-4e0f-a063-99a91e3f1325", + "shortName": "secretariat-reference", + "dateUpdated": "2024-07-05T13:17:07.970Z" + }, + "references": [ + { + "name": "Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability", + "tags": [ + "vendor-advisory", + "x_snapshot" + ], + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-28926/adp-test-6-28" + } + ] + } + ] } } \ No newline at end of file diff --git a/cves/2024/28xxx/CVE-2024-28927.json b/cves/2024/28xxx/CVE-2024-28927.json index 146930ec7ab..d5cd9324c15 100644 --- a/cves/2024/28xxx/CVE-2024-28927.json +++ b/cves/2024/28xxx/CVE-2024-28927.json @@ -8,7 +8,7 @@ "assignerShortName": "microsoft", "dateReserved": "2024-03-13T01:26:53.030Z", "datePublished": "2024-04-09T17:01:12.876Z", - "dateUpdated": "2024-06-11T15:25:04.628Z" + "dateUpdated": "2024-07-05T13:17:07.958Z" }, "containers": { "cna": { @@ -206,6 +206,23 @@ "shortName": "CISAADP", "dateUpdated": "2024-06-03T19:30:18.373Z" } + }, + { + "providerMetadata": { + "orgId": "96f1cf3c-f80a-4e0f-a063-99a91e3f1325", + "shortName": "secretariat-reference", + "dateUpdated": "2024-07-05T13:17:07.958Z" + }, + "references": [ + { + "name": "Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability", + "tags": [ + "vendor-advisory", + "x_snapshot" + ], + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-28927/adp-test-6-28" + } + ] } ] } diff --git a/cves/2024/28xxx/CVE-2024-28929.json b/cves/2024/28xxx/CVE-2024-28929.json index 6dfee669062..dcd67c14991 100644 --- a/cves/2024/28xxx/CVE-2024-28929.json +++ b/cves/2024/28xxx/CVE-2024-28929.json @@ -1,6 +1,6 @@ { "dataType": "CVE_RECORD", - "dataVersion": "5.0", + "dataVersion": "5.1", "cveMetadata": { "cveId": "CVE-2024-28929", "assignerOrgId": "f38d906d-7342-40ea-92c1-6c4a2c6478c8", @@ -8,7 +8,7 @@ "assignerShortName": "microsoft", "dateReserved": "2024-03-13T01:26:53.031Z", "datePublished": "2024-04-09T17:00:27.042Z", - "dateUpdated": "2024-06-11T15:24:12.305Z" + "dateUpdated": "2024-07-05T13:17:07.817Z" }, "containers": { "cna": { @@ -335,6 +335,25 @@ } } ] - } + }, + "adp": [ + { + "providerMetadata": { + "orgId": "96f1cf3c-f80a-4e0f-a063-99a91e3f1325", + "shortName": "secretariat-reference", + "dateUpdated": "2024-07-05T13:17:07.817Z" + }, + "references": [ + { + "name": "Microsoft ODBC Driver for SQL Server Remote Code Execution Vulnerability", + "tags": [ + "vendor-advisory", + "x_snapshot" + ], + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-28929/adp-test-6-28" + } + ] + } + ] } } \ No newline at end of file diff --git a/cves/2024/28xxx/CVE-2024-28930.json b/cves/2024/28xxx/CVE-2024-28930.json index 0a8f6f7a7b3..593a422fcbd 100644 --- a/cves/2024/28xxx/CVE-2024-28930.json +++ b/cves/2024/28xxx/CVE-2024-28930.json @@ -1,6 +1,6 @@ { "dataType": "CVE_RECORD", - "dataVersion": "5.0", + "dataVersion": "5.1", "cveMetadata": { "cveId": "CVE-2024-28930", "assignerOrgId": "f38d906d-7342-40ea-92c1-6c4a2c6478c8", @@ -8,7 +8,7 @@ "assignerShortName": "microsoft", "dateReserved": "2024-03-13T01:26:53.031Z", "datePublished": "2024-04-09T17:01:13.416Z", - "dateUpdated": "2024-06-11T15:25:05.351Z" + "dateUpdated": "2024-07-05T13:17:08.160Z" }, "containers": { "cna": { @@ -335,6 +335,25 @@ } } ] - } + }, + "adp": [ + { + "providerMetadata": { + "orgId": "96f1cf3c-f80a-4e0f-a063-99a91e3f1325", + "shortName": "secretariat-reference", + "dateUpdated": "2024-07-05T13:17:08.160Z" + }, + "references": [ + { + "name": "Microsoft ODBC Driver for SQL Server Remote Code Execution Vulnerability", + "tags": [ + "vendor-advisory", + "x_snapshot" + ], + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-28930/adp-test-6-28" + } + ] + } + ] } } \ No newline at end of file diff --git a/cves/2024/28xxx/CVE-2024-28931.json b/cves/2024/28xxx/CVE-2024-28931.json index 0dde2ae769f..1b04a6df2ca 100644 --- a/cves/2024/28xxx/CVE-2024-28931.json +++ b/cves/2024/28xxx/CVE-2024-28931.json @@ -8,7 +8,7 @@ "assignerShortName": "microsoft", "dateReserved": "2024-03-13T01:26:53.031Z", "datePublished": "2024-04-09T17:00:27.649Z", - "dateUpdated": "2024-06-11T15:24:12.974Z" + "dateUpdated": "2024-07-05T13:17:08.145Z" }, "containers": { "cna": { @@ -368,6 +368,23 @@ "shortName": "CISAADP", "dateUpdated": "2024-05-16T19:10:15.899Z" } + }, + { + "providerMetadata": { + "orgId": "96f1cf3c-f80a-4e0f-a063-99a91e3f1325", + "shortName": "secretariat-reference", + "dateUpdated": "2024-07-05T13:17:08.145Z" + }, + "references": [ + { + "name": "Microsoft ODBC Driver for SQL Server Remote Code Execution Vulnerability", + "tags": [ + "vendor-advisory", + "x_snapshot" + ], + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-28931/adp-test-6-28" + } + ] } ] } diff --git a/cves/2024/28xxx/CVE-2024-28932.json b/cves/2024/28xxx/CVE-2024-28932.json index d7d7460b414..895e70e3df9 100644 --- a/cves/2024/28xxx/CVE-2024-28932.json +++ b/cves/2024/28xxx/CVE-2024-28932.json @@ -1,6 +1,6 @@ { "dataType": "CVE_RECORD", - "dataVersion": "5.0", + "dataVersion": "5.1", "cveMetadata": { "cveId": "CVE-2024-28932", "assignerOrgId": "f38d906d-7342-40ea-92c1-6c4a2c6478c8", @@ -8,7 +8,7 @@ "assignerShortName": "microsoft", "dateReserved": "2024-03-13T01:26:53.031Z", "datePublished": "2024-04-09T17:00:28.215Z", - "dateUpdated": "2024-06-11T15:24:13.601Z" + "dateUpdated": "2024-07-05T13:17:07.888Z" }, "containers": { "cna": { @@ -335,6 +335,25 @@ } } ] - } + }, + "adp": [ + { + "providerMetadata": { + "orgId": "96f1cf3c-f80a-4e0f-a063-99a91e3f1325", + "shortName": "secretariat-reference", + "dateUpdated": "2024-07-05T13:17:07.888Z" + }, + "references": [ + { + "name": "Microsoft ODBC Driver for SQL Server Remote Code Execution Vulnerability", + "tags": [ + "vendor-advisory", + "x_snapshot" + ], + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-28932/adp-test-6-28" + } + ] + } + ] } } \ No newline at end of file diff --git a/cves/2024/28xxx/CVE-2024-28933.json b/cves/2024/28xxx/CVE-2024-28933.json index 36a2cbc21e5..48dd747e116 100644 --- a/cves/2024/28xxx/CVE-2024-28933.json +++ b/cves/2024/28xxx/CVE-2024-28933.json @@ -8,7 +8,7 @@ "assignerShortName": "microsoft", "dateReserved": "2024-03-13T01:26:53.034Z", "datePublished": "2024-04-09T17:01:13.955Z", - "dateUpdated": "2024-06-11T15:25:06.051Z" + "dateUpdated": "2024-07-05T13:17:07.900Z" }, "containers": { "cna": { @@ -368,6 +368,23 @@ "shortName": "CISAADP", "dateUpdated": "2024-05-16T19:09:56.125Z" } + }, + { + "providerMetadata": { + "orgId": "96f1cf3c-f80a-4e0f-a063-99a91e3f1325", + "shortName": "secretariat-reference", + "dateUpdated": "2024-07-05T13:17:07.900Z" + }, + "references": [ + { + "name": "Microsoft ODBC Driver for SQL Server Remote Code Execution Vulnerability", + "tags": [ + "vendor-advisory", + "x_snapshot" + ], + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-28933/adp-test-6-28" + } + ] } ] } diff --git a/cves/2024/28xxx/CVE-2024-28934.json b/cves/2024/28xxx/CVE-2024-28934.json index 1d5f2014924..2c2a71c0f75 100644 --- a/cves/2024/28xxx/CVE-2024-28934.json +++ b/cves/2024/28xxx/CVE-2024-28934.json @@ -8,7 +8,7 @@ "assignerShortName": "microsoft", "dateReserved": "2024-03-13T01:26:53.036Z", "datePublished": "2024-04-09T17:01:14.516Z", - "dateUpdated": "2024-06-11T15:25:06.645Z" + "dateUpdated": "2024-07-05T13:17:07.924Z" }, "containers": { "cna": { @@ -400,6 +400,23 @@ "shortName": "CISAADP", "dateUpdated": "2024-05-16T19:09:57.069Z" } + }, + { + "providerMetadata": { + "orgId": "96f1cf3c-f80a-4e0f-a063-99a91e3f1325", + "shortName": "secretariat-reference", + "dateUpdated": "2024-07-05T13:17:07.924Z" + }, + "references": [ + { + "name": "Microsoft ODBC Driver for SQL Server Remote Code Execution Vulnerability", + "tags": [ + "vendor-advisory", + "x_snapshot" + ], + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-28934/adp-test-6-28" + } + ] } ] } diff --git a/cves/2024/28xxx/CVE-2024-28935.json b/cves/2024/28xxx/CVE-2024-28935.json index ff2b787955b..8e48cb56685 100644 --- a/cves/2024/28xxx/CVE-2024-28935.json +++ b/cves/2024/28xxx/CVE-2024-28935.json @@ -8,7 +8,7 @@ "assignerShortName": "microsoft", "dateReserved": "2024-03-13T01:26:53.036Z", "datePublished": "2024-04-09T17:01:15.096Z", - "dateUpdated": "2024-06-11T15:25:07.279Z" + "dateUpdated": "2024-07-05T13:17:07.947Z" }, "containers": { "cna": { @@ -367,6 +367,23 @@ "shortName": "CISAADP", "dateUpdated": "2024-05-23T23:30:14.206Z" } + }, + { + "providerMetadata": { + "orgId": "96f1cf3c-f80a-4e0f-a063-99a91e3f1325", + "shortName": "secretariat-reference", + "dateUpdated": "2024-07-05T13:17:07.947Z" + }, + "references": [ + { + "name": "Microsoft ODBC Driver for SQL Server Remote Code Execution Vulnerability", + "tags": [ + "vendor-advisory", + "x_snapshot" + ], + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-28935/adp-test-6-28" + } + ] } ] } diff --git a/cves/2024/28xxx/CVE-2024-28936.json b/cves/2024/28xxx/CVE-2024-28936.json index f3c4fe6aa43..1d76223bf16 100644 --- a/cves/2024/28xxx/CVE-2024-28936.json +++ b/cves/2024/28xxx/CVE-2024-28936.json @@ -8,7 +8,7 @@ "assignerShortName": "microsoft", "dateReserved": "2024-03-13T01:26:53.037Z", "datePublished": "2024-04-09T17:00:28.756Z", - "dateUpdated": "2024-06-11T15:24:14.198Z" + "dateUpdated": "2024-07-05T13:17:08.013Z" }, "containers": { "cna": { @@ -368,6 +368,23 @@ "shortName": "CISAADP", "dateUpdated": "2024-05-16T19:10:07.852Z" } + }, + { + "providerMetadata": { + "orgId": "96f1cf3c-f80a-4e0f-a063-99a91e3f1325", + "shortName": "secretariat-reference", + "dateUpdated": "2024-07-05T13:17:08.013Z" + }, + "references": [ + { + "name": "Microsoft ODBC Driver for SQL Server Remote Code Execution Vulnerability", + "tags": [ + "vendor-advisory", + "x_snapshot" + ], + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-28936/adp-test-6-28" + } + ] } ] } diff --git a/cves/2024/28xxx/CVE-2024-28937.json b/cves/2024/28xxx/CVE-2024-28937.json index 271a8990ca6..91acf400d80 100644 --- a/cves/2024/28xxx/CVE-2024-28937.json +++ b/cves/2024/28xxx/CVE-2024-28937.json @@ -8,7 +8,7 @@ "assignerShortName": "microsoft", "dateReserved": "2024-03-13T01:26:53.037Z", "datePublished": "2024-04-09T17:01:15.620Z", - "dateUpdated": "2024-06-11T15:25:07.941Z" + "dateUpdated": "2024-07-05T13:17:07.787Z" }, "containers": { "cna": { @@ -368,6 +368,23 @@ "shortName": "CISAADP", "dateUpdated": "2024-05-16T19:10:11.253Z" } + }, + { + "providerMetadata": { + "orgId": "96f1cf3c-f80a-4e0f-a063-99a91e3f1325", + "shortName": "secretariat-reference", + "dateUpdated": "2024-07-05T13:17:07.787Z" + }, + "references": [ + { + "name": "Microsoft ODBC Driver for SQL Server Remote Code Execution Vulnerability", + "tags": [ + "vendor-advisory", + "x_snapshot" + ], + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-28937/adp-test-6-28" + } + ] } ] } diff --git a/cves/2024/28xxx/CVE-2024-28938.json b/cves/2024/28xxx/CVE-2024-28938.json index 8252449d1f0..6ec43757fcd 100644 --- a/cves/2024/28xxx/CVE-2024-28938.json +++ b/cves/2024/28xxx/CVE-2024-28938.json @@ -8,7 +8,7 @@ "assignerShortName": "microsoft", "dateReserved": "2024-03-13T01:26:53.037Z", "datePublished": "2024-04-09T17:01:16.170Z", - "dateUpdated": "2024-06-11T15:25:08.491Z" + "dateUpdated": "2024-07-05T13:17:07.837Z" }, "containers": { "cna": { @@ -368,6 +368,23 @@ "shortName": "CISAADP", "dateUpdated": "2024-06-03T19:28:31.475Z" } + }, + { + "providerMetadata": { + "orgId": "96f1cf3c-f80a-4e0f-a063-99a91e3f1325", + "shortName": "secretariat-reference", + "dateUpdated": "2024-07-05T13:17:07.837Z" + }, + "references": [ + { + "name": "Microsoft ODBC Driver for SQL Server Remote Code Execution Vulnerability", + "tags": [ + "vendor-advisory", + "x_snapshot" + ], + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-28938/adp-test-6-28" + } + ] } ] } diff --git a/cves/2024/28xxx/CVE-2024-28939.json b/cves/2024/28xxx/CVE-2024-28939.json index 1cb092e7fd2..ff5979124ee 100644 --- a/cves/2024/28xxx/CVE-2024-28939.json +++ b/cves/2024/28xxx/CVE-2024-28939.json @@ -1,6 +1,6 @@ { "dataType": "CVE_RECORD", - "dataVersion": "5.0", + "dataVersion": "5.1", "cveMetadata": { "cveId": "CVE-2024-28939", "assignerOrgId": "f38d906d-7342-40ea-92c1-6c4a2c6478c8", @@ -8,7 +8,7 @@ "assignerShortName": "microsoft", "dateReserved": "2024-03-13T01:26:53.038Z", "datePublished": "2024-04-09T17:00:29.317Z", - "dateUpdated": "2024-06-11T15:24:14.890Z" + "dateUpdated": "2024-07-05T13:17:08.157Z" }, "containers": { "cna": { @@ -173,6 +173,25 @@ } } ] - } + }, + "adp": [ + { + "providerMetadata": { + "orgId": "96f1cf3c-f80a-4e0f-a063-99a91e3f1325", + "shortName": "secretariat-reference", + "dateUpdated": "2024-07-05T13:17:08.157Z" + }, + "references": [ + { + "name": "Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability", + "tags": [ + "vendor-advisory", + "x_snapshot" + ], + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-28939/adp-test-6-28" + } + ] + } + ] } } \ No newline at end of file diff --git a/cves/2024/28xxx/CVE-2024-28940.json b/cves/2024/28xxx/CVE-2024-28940.json index 41f7e0fa268..bb8468accbe 100644 --- a/cves/2024/28xxx/CVE-2024-28940.json +++ b/cves/2024/28xxx/CVE-2024-28940.json @@ -1,6 +1,6 @@ { "dataType": "CVE_RECORD", - "dataVersion": "5.0", + "dataVersion": "5.1", "cveMetadata": { "cveId": "CVE-2024-28940", "assignerOrgId": "f38d906d-7342-40ea-92c1-6c4a2c6478c8", @@ -8,7 +8,7 @@ "assignerShortName": "microsoft", "dateReserved": "2024-03-13T01:26:53.038Z", "datePublished": "2024-04-09T17:01:16.713Z", - "dateUpdated": "2024-06-11T15:25:09.100Z" + "dateUpdated": "2024-07-05T13:17:07.889Z" }, "containers": { "cna": { @@ -173,6 +173,25 @@ } } ] - } + }, + "adp": [ + { + "providerMetadata": { + "orgId": "96f1cf3c-f80a-4e0f-a063-99a91e3f1325", + "shortName": "secretariat-reference", + "dateUpdated": "2024-07-05T13:17:07.889Z" + }, + "references": [ + { + "name": "Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability", + "tags": [ + "vendor-advisory", + "x_snapshot" + ], + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-28940/adp-test-6-28" + } + ] + } + ] } } \ No newline at end of file diff --git a/cves/2024/28xxx/CVE-2024-28941.json b/cves/2024/28xxx/CVE-2024-28941.json index c83bca1fb58..da8bc8b87b5 100644 --- a/cves/2024/28xxx/CVE-2024-28941.json +++ b/cves/2024/28xxx/CVE-2024-28941.json @@ -1,6 +1,6 @@ { "dataType": "CVE_RECORD", - "dataVersion": "5.0", + "dataVersion": "5.1", "cveMetadata": { "cveId": "CVE-2024-28941", "assignerOrgId": "f38d906d-7342-40ea-92c1-6c4a2c6478c8", @@ -8,7 +8,7 @@ "assignerShortName": "microsoft", "dateReserved": "2024-03-13T01:26:53.038Z", "datePublished": "2024-04-09T17:01:17.273Z", - "dateUpdated": "2024-06-11T15:25:09.680Z" + "dateUpdated": "2024-07-05T13:17:06.208Z" }, "containers": { "cna": { @@ -245,6 +245,25 @@ } } ] - } + }, + "adp": [ + { + "providerMetadata": { + "orgId": "96f1cf3c-f80a-4e0f-a063-99a91e3f1325", + "shortName": "secretariat-reference", + "dateUpdated": "2024-07-05T13:17:06.208Z" + }, + "references": [ + { + "name": "Microsoft ODBC Driver for SQL Server Remote Code Execution Vulnerability", + "tags": [ + "vendor-advisory", + "x_snapshot" + ], + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-28941/adp-test-6-28" + } + ] + } + ] } } \ No newline at end of file diff --git a/cves/2024/28xxx/CVE-2024-28942.json b/cves/2024/28xxx/CVE-2024-28942.json index d11613edd10..d73d1fdb26d 100644 --- a/cves/2024/28xxx/CVE-2024-28942.json +++ b/cves/2024/28xxx/CVE-2024-28942.json @@ -1,6 +1,6 @@ { "dataType": "CVE_RECORD", - "dataVersion": "5.0", + "dataVersion": "5.1", "cveMetadata": { "cveId": "CVE-2024-28942", "assignerOrgId": "f38d906d-7342-40ea-92c1-6c4a2c6478c8", @@ -8,7 +8,7 @@ "assignerShortName": "microsoft", "dateReserved": "2024-03-13T01:26:53.038Z", "datePublished": "2024-04-09T17:00:29.841Z", - "dateUpdated": "2024-06-11T15:24:15.565Z" + "dateUpdated": "2024-07-05T13:17:07.763Z" }, "containers": { "cna": { @@ -173,6 +173,25 @@ } } ] - } + }, + "adp": [ + { + "providerMetadata": { + "orgId": "96f1cf3c-f80a-4e0f-a063-99a91e3f1325", + "shortName": "secretariat-reference", + "dateUpdated": "2024-07-05T13:17:07.763Z" + }, + "references": [ + { + "name": "Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability", + "tags": [ + "vendor-advisory", + "x_snapshot" + ], + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-28942/adp-test-6-28" + } + ] + } + ] } } \ No newline at end of file diff --git a/cves/2024/28xxx/CVE-2024-28943.json b/cves/2024/28xxx/CVE-2024-28943.json index 3404e5901ad..9ad7df1c332 100644 --- a/cves/2024/28xxx/CVE-2024-28943.json +++ b/cves/2024/28xxx/CVE-2024-28943.json @@ -1,6 +1,6 @@ { "dataType": "CVE_RECORD", - "dataVersion": "5.0", + "dataVersion": "5.1", "cveMetadata": { "cveId": "CVE-2024-28943", "assignerOrgId": "f38d906d-7342-40ea-92c1-6c4a2c6478c8", @@ -8,7 +8,7 @@ "assignerShortName": "microsoft", "dateReserved": "2024-03-13T01:26:53.039Z", "datePublished": "2024-04-09T17:01:17.807Z", - "dateUpdated": "2024-06-13T13:41:06.217Z" + "dateUpdated": "2024-07-05T13:17:07.805Z" }, "containers": { "cna": { @@ -245,6 +245,25 @@ } } ] - } + }, + "adp": [ + { + "providerMetadata": { + "orgId": "96f1cf3c-f80a-4e0f-a063-99a91e3f1325", + "shortName": "secretariat-reference", + "dateUpdated": "2024-07-05T13:17:07.805Z" + }, + "references": [ + { + "name": "Microsoft ODBC Driver for SQL Server Remote Code Execution Vulnerability", + "tags": [ + "vendor-advisory", + "x_snapshot" + ], + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-28943/adp-test-6-28" + } + ] + } + ] } } \ No newline at end of file diff --git a/cves/2024/28xxx/CVE-2024-28944.json b/cves/2024/28xxx/CVE-2024-28944.json index 5a29cb05abd..77fbefcd4d6 100644 --- a/cves/2024/28xxx/CVE-2024-28944.json +++ b/cves/2024/28xxx/CVE-2024-28944.json @@ -1,6 +1,6 @@ { "dataType": "CVE_RECORD", - "dataVersion": "5.0", + "dataVersion": "5.1", "cveMetadata": { "cveId": "CVE-2024-28944", "assignerOrgId": "f38d906d-7342-40ea-92c1-6c4a2c6478c8", @@ -8,7 +8,7 @@ "assignerShortName": "microsoft", "dateReserved": "2024-03-13T01:26:53.039Z", "datePublished": "2024-04-09T17:01:18.340Z", - "dateUpdated": "2024-06-11T15:25:10.833Z" + "dateUpdated": "2024-07-05T13:17:07.898Z" }, "containers": { "cna": { @@ -173,6 +173,25 @@ } } ] - } + }, + "adp": [ + { + "providerMetadata": { + "orgId": "96f1cf3c-f80a-4e0f-a063-99a91e3f1325", + "shortName": "secretariat-reference", + "dateUpdated": "2024-07-05T13:17:07.898Z" + }, + "references": [ + { + "name": "Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability", + "tags": [ + "vendor-advisory", + "x_snapshot" + ], + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-28944/adp-test-6-28" + } + ] + } + ] } } \ No newline at end of file diff --git a/cves/2024/28xxx/CVE-2024-28945.json b/cves/2024/28xxx/CVE-2024-28945.json index 86e679f7466..4eb0db45181 100644 --- a/cves/2024/28xxx/CVE-2024-28945.json +++ b/cves/2024/28xxx/CVE-2024-28945.json @@ -1,6 +1,6 @@ { "dataType": "CVE_RECORD", - "dataVersion": "5.0", + "dataVersion": "5.1", "cveMetadata": { "cveId": "CVE-2024-28945", "assignerOrgId": "f38d906d-7342-40ea-92c1-6c4a2c6478c8", @@ -8,7 +8,7 @@ "assignerShortName": "microsoft", "dateReserved": "2024-03-13T01:26:53.039Z", "datePublished": "2024-04-09T17:00:30.403Z", - "dateUpdated": "2024-06-11T15:24:16.246Z" + "dateUpdated": "2024-07-05T13:17:07.945Z" }, "containers": { "cna": { @@ -173,6 +173,25 @@ } } ] - } + }, + "adp": [ + { + "providerMetadata": { + "orgId": "96f1cf3c-f80a-4e0f-a063-99a91e3f1325", + "shortName": "secretariat-reference", + "dateUpdated": "2024-07-05T13:17:07.945Z" + }, + "references": [ + { + "name": "Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability", + "tags": [ + "vendor-advisory", + "x_snapshot" + ], + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-28945/adp-test-6-28" + } + ] + } + ] } } \ No newline at end of file diff --git a/cves/2024/28xxx/CVE-2024-28949.json b/cves/2024/28xxx/CVE-2024-28949.json index 532aa1f8cf9..a0175808ca4 100644 --- a/cves/2024/28xxx/CVE-2024-28949.json +++ b/cves/2024/28xxx/CVE-2024-28949.json @@ -8,7 +8,7 @@ "assignerShortName": "Mattermost", "dateReserved": "2024-04-03T10:03:48.285Z", "datePublished": "2024-04-05T08:14:09.878Z", - "dateUpdated": "2024-06-21T15:25:09.617Z" + "dateUpdated": "2024-07-05T13:17:07.839Z" }, "containers": { "cna": { @@ -162,7 +162,7 @@ "providerMetadata": { "orgId": "96f1cf3c-f80a-4e0f-a063-99a91e3f1325", "shortName": "secretariat-reference", - "dateUpdated": "2024-06-21T15:25:09.617Z" + "dateUpdated": "2024-07-05T13:17:07.839Z" }, "references": [ { @@ -170,6 +170,12 @@ "tags": [ "x_cve_prog_secretariat_snapshot" ] + }, + { + "url": "https://mattermost.com/security-updates/adp-test-6-28", + "tags": [ + "x_snapshot" + ] } ] } diff --git a/cves/2024/28xxx/CVE-2024-28951.json b/cves/2024/28xxx/CVE-2024-28951.json index e7b26a9386c..5e7530c0814 100644 --- a/cves/2024/28xxx/CVE-2024-28951.json +++ b/cves/2024/28xxx/CVE-2024-28951.json @@ -1,6 +1,6 @@ { "dataType": "CVE_RECORD", - "dataVersion": "5.0", + "dataVersion": "5.1", "cveMetadata": { "cveId": "CVE-2024-28951", "assignerOrgId": "0cf5dd6e-1214-4398-a481-30441e48fafd", @@ -8,7 +8,7 @@ "assignerShortName": "OpenHarmony", "dateReserved": "2024-03-15T08:05:24.413Z", "datePublished": "2024-04-02T06:23:12.669Z", - "dateUpdated": "2024-06-10T18:01:50.027Z" + "dateUpdated": "2024-07-05T13:17:07.762Z" }, "containers": { "cna": { @@ -94,6 +94,23 @@ "x_generator": { "engine": "Vulnogram 0.1.0-dev" } - } + }, + "adp": [ + { + "providerMetadata": { + "orgId": "96f1cf3c-f80a-4e0f-a063-99a91e3f1325", + "shortName": "secretariat-reference", + "dateUpdated": "2024-07-05T13:17:07.762Z" + }, + "references": [ + { + "url": "https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2024/2024-04.md/adp-test-6-28", + "tags": [ + "x_snapshot" + ] + } + ] + } + ] } } \ No newline at end of file diff --git a/cves/2024/28xxx/CVE-2024-28957.json b/cves/2024/28xxx/CVE-2024-28957.json index 5b84dd13dcc..b90266c9565 100644 --- a/cves/2024/28xxx/CVE-2024-28957.json +++ b/cves/2024/28xxx/CVE-2024-28957.json @@ -8,7 +8,7 @@ "assignerShortName": "jpcert", "dateReserved": "2024-03-19T01:42:41.530Z", "datePublished": "2024-04-15T10:48:59.978Z", - "dateUpdated": "2024-06-21T15:25:10.203Z" + "dateUpdated": "2024-07-05T13:17:07.717Z" }, "containers": { "cna": { @@ -113,7 +113,7 @@ "providerMetadata": { "orgId": "96f1cf3c-f80a-4e0f-a063-99a91e3f1325", "shortName": "secretariat-reference", - "dateUpdated": "2024-06-21T15:25:10.203Z" + "dateUpdated": "2024-07-05T13:17:07.717Z" }, "references": [ { @@ -133,6 +133,24 @@ "tags": [ "x_cve_prog_secretariat_snapshot" ] + }, + { + "url": "https://www.cente.jp/obstacle/4963//adp-test-6-28", + "tags": [ + "x_snapshot" + ] + }, + { + "url": "https://www.cente.jp/obstacle/4956//adp-test-6-28", + "tags": [ + "x_snapshot" + ] + }, + { + "url": "https://jvn.jp/en/vu/JVNVU94016877//adp-test-6-28", + "tags": [ + "x_snapshot" + ] } ] } diff --git a/cves/2024/28xxx/CVE-2024-28960.json b/cves/2024/28xxx/CVE-2024-28960.json index f7a7c19f9ca..397dfd62a34 100644 --- a/cves/2024/28xxx/CVE-2024-28960.json +++ b/cves/2024/28xxx/CVE-2024-28960.json @@ -6,7 +6,7 @@ "cveId": "CVE-2024-28960", "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", - "dateUpdated": "2024-06-21T15:25:10.609Z", + "dateUpdated": "2024-07-05T13:17:07.744Z", "dateReserved": "2024-03-13T00:00:00", "datePublished": "2024-03-29T00:00:00" }, @@ -189,7 +189,7 @@ "providerMetadata": { "orgId": "96f1cf3c-f80a-4e0f-a063-99a91e3f1325", "shortName": "secretariat-reference", - "dateUpdated": "2024-06-21T15:25:10.609Z" + "dateUpdated": "2024-07-05T13:17:07.744Z" }, "references": [ { @@ -227,6 +227,42 @@ "x_cve_prog_secretariat_snapshot" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/5YE3QRREGJC6K34JD4LZ5P3IALNX4QYY//DEMO_2024_06_19" + }, + { + "url": "https://mbed-tls.readthedocs.io/en/latest/tech-updates/security-advisories//adp-test-6-28", + "tags": [ + "x_snapshot" + ] + }, + { + "url": "https://github.com/Mbed-TLS/mbedtls-docs/blob/main/security-advisories/mbedtls-security-advisory-2024-03.md/adp-test-6-28", + "tags": [ + "x_snapshot" + ] + }, + { + "name": "FEDORA-2024-666210bd74", + "tags": [ + "vendor-advisory", + "x_snapshot" + ], + "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NCDU52ZDA7TX3HC5JCU6ZZIJQOPTNBK6//adp-test-6-28" + }, + { + "name": "FEDORA-2024-1249d56928", + "tags": [ + "vendor-advisory", + "x_snapshot" + ], + "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6UZNBMKYEV2J5DI7R4BQGL472V7X3WJY//adp-test-6-28" + }, + { + "name": "FEDORA-2024-a23b5f0783", + "tags": [ + "vendor-advisory", + "x_snapshot" + ], + "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/5YE3QRREGJC6K34JD4LZ5P3IALNX4QYY//adp-test-6-28" } ] } diff --git a/cves/2024/28xxx/CVE-2024-28961.json b/cves/2024/28xxx/CVE-2024-28961.json index 9006adead8f..445ef7d54ec 100644 --- a/cves/2024/28xxx/CVE-2024-28961.json +++ b/cves/2024/28xxx/CVE-2024-28961.json @@ -8,7 +8,7 @@ "assignerShortName": "dell", "dateReserved": "2024-03-13T15:42:12.959Z", "datePublished": "2024-04-29T08:25:28.165Z", - "dateUpdated": "2024-06-21T15:25:11.051Z" + "dateUpdated": "2024-07-05T13:17:08.024Z" }, "containers": { "cna": { @@ -167,7 +167,7 @@ "providerMetadata": { "orgId": "96f1cf3c-f80a-4e0f-a063-99a91e3f1325", "shortName": "secretariat-reference", - "dateUpdated": "2024-06-21T15:25:11.051Z" + "dateUpdated": "2024-07-05T13:17:08.024Z" }, "references": [ { @@ -176,6 +176,13 @@ "x_cve_prog_secretariat_snapshot" ], "url": "https://www.dell.com/support/kbdoc/en-us/000224251/dsa-2024-184-security-update-for-dell-openmanage-enterprise-vulnerability/DEMO_2024_06_19" + }, + { + "tags": [ + "vendor-advisory", + "x_snapshot" + ], + "url": "https://www.dell.com/support/kbdoc/en-us/000224251/dsa-2024-184-security-update-for-dell-openmanage-enterprise-vulnerability/adp-test-6-28" } ] } diff --git a/cves/2024/28xxx/CVE-2024-28963.json b/cves/2024/28xxx/CVE-2024-28963.json index c7df86c9be1..5546ca02fa5 100644 --- a/cves/2024/28xxx/CVE-2024-28963.json +++ b/cves/2024/28xxx/CVE-2024-28963.json @@ -8,7 +8,7 @@ "assignerShortName": "dell", "dateReserved": "2024-03-13T15:42:12.960Z", "datePublished": "2024-04-24T07:54:11.227Z", - "dateUpdated": "2024-06-21T15:25:11.467Z" + "dateUpdated": "2024-07-05T13:17:08.000Z" }, "containers": { "cna": { @@ -151,7 +151,7 @@ "providerMetadata": { "orgId": "96f1cf3c-f80a-4e0f-a063-99a91e3f1325", "shortName": "secretariat-reference", - "dateUpdated": "2024-06-21T15:25:11.467Z" + "dateUpdated": "2024-07-05T13:17:08.000Z" }, "references": [ { @@ -160,6 +160,13 @@ "x_cve_prog_secretariat_snapshot" ], "url": "https://www.dell.com/support/kbdoc/en-us/000224317/dsa-2024-170/DEMO_2024_06_19" + }, + { + "tags": [ + "vendor-advisory", + "x_snapshot" + ], + "url": "https://www.dell.com/support/kbdoc/en-us/000224317/dsa-2024-170/adp-test-6-28" } ] } diff --git a/cves/2024/28xxx/CVE-2024-28964.json b/cves/2024/28xxx/CVE-2024-28964.json index 355e158dcba..7d88de114a1 100644 --- a/cves/2024/28xxx/CVE-2024-28964.json +++ b/cves/2024/28xxx/CVE-2024-28964.json @@ -8,7 +8,7 @@ "assignerShortName": "dell", "dateReserved": "2024-03-13T15:42:12.960Z", "datePublished": "2024-06-12T15:02:53.826Z", - "dateUpdated": "2024-06-12T16:41:31.838Z" + "dateUpdated": "2024-07-05T13:17:07.859Z" }, "containers": { "cna": { @@ -155,6 +155,22 @@ "shortName": "CISA-ADP", "dateUpdated": "2024-06-12T16:41:31.838Z" } + }, + { + "providerMetadata": { + "orgId": "96f1cf3c-f80a-4e0f-a063-99a91e3f1325", + "shortName": "secretariat-reference", + "dateUpdated": "2024-07-05T13:17:07.859Z" + }, + "references": [ + { + "tags": [ + "vendor-advisory", + "x_snapshot" + ], + "url": "https://www.dell.com/support/kbdoc/en-us/000224987/dsa-2024-179-security-update-for-dell-emc-common-event-enabler-windows-for-cavatools-vulnerabilities/adp-test-6-28" + } + ] } ] } diff --git a/cves/2024/28xxx/CVE-2024-28965.json b/cves/2024/28xxx/CVE-2024-28965.json index 6b8ada86e7a..67afc216a26 100644 --- a/cves/2024/28xxx/CVE-2024-28965.json +++ b/cves/2024/28xxx/CVE-2024-28965.json @@ -8,7 +8,7 @@ "assignerShortName": "dell", "dateReserved": "2024-03-13T15:42:12.960Z", "datePublished": "2024-06-13T14:47:29.267Z", - "dateUpdated": "2024-06-13T19:12:59.789Z" + "dateUpdated": "2024-07-05T13:17:08.026Z" }, "containers": { "cna": { @@ -143,6 +143,22 @@ "shortName": "CISA-ADP", "dateUpdated": "2024-06-13T19:12:59.789Z" } + }, + { + "providerMetadata": { + "orgId": "96f1cf3c-f80a-4e0f-a063-99a91e3f1325", + "shortName": "secretariat-reference", + "dateUpdated": "2024-07-05T13:17:08.026Z" + }, + "references": [ + { + "tags": [ + "vendor-advisory", + "x_snapshot" + ], + "url": "https://www.dell.com/support/kbdoc/en-us/000225910/dsa-2024-181-security-update-for-dell-secure-connect-gateway-application-and-appliance-vulnerabilities/adp-test-6-28" + } + ] } ] } diff --git a/cves/2024/28xxx/CVE-2024-28966.json b/cves/2024/28xxx/CVE-2024-28966.json index d52a7eb56e4..2d9534acc90 100644 --- a/cves/2024/28xxx/CVE-2024-28966.json +++ b/cves/2024/28xxx/CVE-2024-28966.json @@ -8,7 +8,7 @@ "assignerShortName": "dell", "dateReserved": "2024-03-13T15:42:12.960Z", "datePublished": "2024-06-13T14:51:28.103Z", - "dateUpdated": "2024-06-13T16:25:51.763Z" + "dateUpdated": "2024-07-05T13:17:07.974Z" }, "containers": { "cna": { @@ -143,6 +143,22 @@ "shortName": "CISA-ADP", "dateUpdated": "2024-06-13T16:25:51.763Z" } + }, + { + "providerMetadata": { + "orgId": "96f1cf3c-f80a-4e0f-a063-99a91e3f1325", + "shortName": "secretariat-reference", + "dateUpdated": "2024-07-05T13:17:07.974Z" + }, + "references": [ + { + "tags": [ + "vendor-advisory", + "x_snapshot" + ], + "url": "https://www.dell.com/support/kbdoc/en-us/000225910/dsa-2024-181-security-update-for-dell-secure-connect-gateway-application-and-appliance-vulnerabilities/adp-test-6-28" + } + ] } ] } diff --git a/cves/2024/28xxx/CVE-2024-28967.json b/cves/2024/28xxx/CVE-2024-28967.json index 1bfb05844c9..ed3b295b15f 100644 --- a/cves/2024/28xxx/CVE-2024-28967.json +++ b/cves/2024/28xxx/CVE-2024-28967.json @@ -8,7 +8,7 @@ "assignerShortName": "dell", "dateReserved": "2024-03-13T15:42:12.960Z", "datePublished": "2024-06-13T14:57:23.532Z", - "dateUpdated": "2024-06-14T16:10:34.794Z" + "dateUpdated": "2024-07-05T13:17:08.104Z" }, "containers": { "cna": { @@ -110,6 +110,24 @@ "x_generator": { "engine": "Vulnogram 0.2.0" } - } + }, + "adp": [ + { + "providerMetadata": { + "orgId": "96f1cf3c-f80a-4e0f-a063-99a91e3f1325", + "shortName": "secretariat-reference", + "dateUpdated": "2024-07-05T13:17:08.104Z" + }, + "references": [ + { + "tags": [ + "vendor-advisory", + "x_snapshot" + ], + "url": "https://www.dell.com/support/kbdoc/en-us/000225910/dsa-2024-181-security-update-for-dell-secure-connect-gateway-application-and-appliance-vulnerabilities/adp-test-6-28" + } + ] + } + ] } } \ No newline at end of file diff --git a/cves/2024/28xxx/CVE-2024-28968.json b/cves/2024/28xxx/CVE-2024-28968.json index 1ed5132812e..c73b72999e6 100644 --- a/cves/2024/28xxx/CVE-2024-28968.json +++ b/cves/2024/28xxx/CVE-2024-28968.json @@ -8,7 +8,7 @@ "assignerShortName": "dell", "dateReserved": "2024-03-13T15:42:12.960Z", "datePublished": "2024-06-13T15:01:22.196Z", - "dateUpdated": "2024-06-14T16:13:06.198Z" + "dateUpdated": "2024-07-05T13:17:08.135Z" }, "containers": { "cna": { @@ -110,6 +110,24 @@ "x_generator": { "engine": "Vulnogram 0.2.0" } - } + }, + "adp": [ + { + "providerMetadata": { + "orgId": "96f1cf3c-f80a-4e0f-a063-99a91e3f1325", + "shortName": "secretariat-reference", + "dateUpdated": "2024-07-05T13:17:08.135Z" + }, + "references": [ + { + "tags": [ + "vendor-advisory", + "x_snapshot" + ], + "url": "https://www.dell.com/support/kbdoc/en-us/000225910/dsa-2024-181-security-update-for-dell-secure-connect-gateway-application-and-appliance-vulnerabilities/adp-test-6-28" + } + ] + } + ] } } \ No newline at end of file diff --git a/cves/2024/28xxx/CVE-2024-28969.json b/cves/2024/28xxx/CVE-2024-28969.json index 504877fb533..f0316206b09 100644 --- a/cves/2024/28xxx/CVE-2024-28969.json +++ b/cves/2024/28xxx/CVE-2024-28969.json @@ -8,7 +8,7 @@ "assignerShortName": "dell", "dateReserved": "2024-03-13T15:42:12.960Z", "datePublished": "2024-06-13T15:05:01.940Z", - "dateUpdated": "2024-06-14T16:13:48.771Z" + "dateUpdated": "2024-07-05T13:17:08.102Z" }, "containers": { "cna": { @@ -110,6 +110,24 @@ "x_generator": { "engine": "Vulnogram 0.2.0" } - } + }, + "adp": [ + { + "providerMetadata": { + "orgId": "96f1cf3c-f80a-4e0f-a063-99a91e3f1325", + "shortName": "secretariat-reference", + "dateUpdated": "2024-07-05T13:17:08.102Z" + }, + "references": [ + { + "tags": [ + "vendor-advisory", + "x_snapshot" + ], + "url": "https://www.dell.com/support/kbdoc/en-us/000225910/dsa-2024-181-security-update-for-dell-secure-connect-gateway-application-and-appliance-vulnerabilities/adp-test-6-28" + } + ] + } + ] } } \ No newline at end of file diff --git a/cves/2024/28xxx/CVE-2024-28970.json b/cves/2024/28xxx/CVE-2024-28970.json index 076cca00173..e5d1d2675ff 100644 --- a/cves/2024/28xxx/CVE-2024-28970.json +++ b/cves/2024/28xxx/CVE-2024-28970.json @@ -8,7 +8,7 @@ "assignerShortName": "dell", "dateReserved": "2024-03-13T15:42:12.961Z", "datePublished": "2024-06-12T06:51:49.004Z", - "dateUpdated": "2024-06-12T13:11:44.425Z" + "dateUpdated": "2024-07-05T13:17:08.011Z" }, "containers": { "cna": { @@ -166,6 +166,22 @@ "shortName": "CISA-ADP", "dateUpdated": "2024-06-12T13:11:44.425Z" } + }, + { + "providerMetadata": { + "orgId": "96f1cf3c-f80a-4e0f-a063-99a91e3f1325", + "shortName": "secretariat-reference", + "dateUpdated": "2024-07-05T13:17:08.011Z" + }, + "references": [ + { + "tags": [ + "vendor-advisory", + "x_snapshot" + ], + "url": "https://www.dell.com/support/kbdoc/en-us/000225476/dsa-2024-168/adp-test-6-28" + } + ] } ] } diff --git a/cves/2024/28xxx/CVE-2024-28971.json b/cves/2024/28xxx/CVE-2024-28971.json index 2525720a8f5..cd987908ab2 100644 --- a/cves/2024/28xxx/CVE-2024-28971.json +++ b/cves/2024/28xxx/CVE-2024-28971.json @@ -8,7 +8,7 @@ "assignerShortName": "dell", "dateReserved": "2024-03-13T15:44:22.627Z", "datePublished": "2024-05-08T15:37:31.837Z", - "dateUpdated": "2024-06-21T15:25:11.871Z" + "dateUpdated": "2024-07-05T13:17:07.985Z" }, "containers": { "cna": { @@ -103,7 +103,7 @@ "providerMetadata": { "orgId": "96f1cf3c-f80a-4e0f-a063-99a91e3f1325", "shortName": "secretariat-reference", - "dateUpdated": "2024-06-21T15:25:11.871Z" + "dateUpdated": "2024-07-05T13:17:07.985Z" }, "references": [ { @@ -112,6 +112,13 @@ "x_cve_prog_secretariat_snapshot" ], "url": "https://www.dell.com/support/kbdoc/en-us/000224849/dsa-2024-209-security-update-for-dell-update-manager-plugin-vulnerability/DEMO_2024_06_19" + }, + { + "tags": [ + "vendor-advisory", + "x_snapshot" + ], + "url": "https://www.dell.com/support/kbdoc/en-us/000224849/dsa-2024-209-security-update-for-dell-update-manager-plugin-vulnerability/adp-test-6-28" } ] } diff --git a/cves/2024/28xxx/CVE-2024-28973.json b/cves/2024/28xxx/CVE-2024-28973.json index 8190ee7cad1..c2c5aa44c3d 100644 --- a/cves/2024/28xxx/CVE-2024-28973.json +++ b/cves/2024/28xxx/CVE-2024-28973.json @@ -8,7 +8,7 @@ "assignerShortName": "dell", "dateReserved": "2024-03-13T15:44:22.627Z", "datePublished": "2024-06-26T02:31:10.767Z", - "dateUpdated": "2024-06-26T13:22:25.495Z" + "dateUpdated": "2024-07-05T13:17:08.130Z" }, "containers": { "cna": { @@ -142,6 +142,22 @@ "shortName": "CISA-ADP", "dateUpdated": "2024-06-26T13:22:25.495Z" } + }, + { + "providerMetadata": { + "orgId": "96f1cf3c-f80a-4e0f-a063-99a91e3f1325", + "shortName": "secretariat-reference", + "dateUpdated": "2024-07-05T13:17:08.130Z" + }, + "references": [ + { + "tags": [ + "vendor-advisory", + "x_snapshot" + ], + "url": "https://www.dell.com/support/kbdoc/en-us/000226148/dsa-2024-219-dell-technologies-powerprotect-dd-security-update-for-multiple-security-vulnerabilities/adp-test-6-28" + } + ] } ] } diff --git a/cves/2024/28xxx/CVE-2024-28974.json b/cves/2024/28xxx/CVE-2024-28974.json index 3ba8078775a..26649a6efec 100644 --- a/cves/2024/28xxx/CVE-2024-28974.json +++ b/cves/2024/28xxx/CVE-2024-28974.json @@ -8,7 +8,7 @@ "assignerShortName": "dell", "dateReserved": "2024-03-13T15:44:22.628Z", "datePublished": "2024-05-29T15:21:22.953Z", - "dateUpdated": "2024-06-21T15:25:12.288Z" + "dateUpdated": "2024-07-05T13:17:08.146Z" }, "containers": { "cna": { @@ -181,7 +181,7 @@ "providerMetadata": { "orgId": "96f1cf3c-f80a-4e0f-a063-99a91e3f1325", "shortName": "secretariat-reference", - "dateUpdated": "2024-06-21T15:25:12.288Z" + "dateUpdated": "2024-07-05T13:17:08.146Z" }, "references": [ { @@ -190,6 +190,13 @@ "x_cve_prog_secretariat_snapshot" ], "url": "https://www.dell.com/support/kbdoc/en-us/000225088/dsa-2024-192-security-update-for-data-protection-advisor-and-powerprotect-dp-series-appliance-idpa-for-multiple-vulnerabilities/DEMO_2024_06_19" + }, + { + "tags": [ + "vendor-advisory", + "x_snapshot" + ], + "url": "https://www.dell.com/support/kbdoc/en-us/000225088/dsa-2024-192-security-update-for-data-protection-advisor-and-powerprotect-dp-series-appliance-idpa-for-multiple-vulnerabilities/adp-test-6-28" } ] } diff --git a/cves/2024/28xxx/CVE-2024-28976.json b/cves/2024/28xxx/CVE-2024-28976.json index 23616c4e0e5..73da47dbfbe 100644 --- a/cves/2024/28xxx/CVE-2024-28976.json +++ b/cves/2024/28xxx/CVE-2024-28976.json @@ -8,7 +8,7 @@ "assignerShortName": "dell", "dateReserved": "2024-03-13T15:44:22.628Z", "datePublished": "2024-04-24T08:01:53.090Z", - "dateUpdated": "2024-06-21T15:25:12.695Z" + "dateUpdated": "2024-07-05T13:17:08.058Z" }, "containers": { "cna": { @@ -110,7 +110,7 @@ "providerMetadata": { "orgId": "96f1cf3c-f80a-4e0f-a063-99a91e3f1325", "shortName": "secretariat-reference", - "dateUpdated": "2024-06-21T15:25:12.695Z" + "dateUpdated": "2024-07-05T13:17:08.058Z" }, "references": [ { @@ -119,6 +119,13 @@ "x_cve_prog_secretariat_snapshot" ], "url": "https://www.dell.com/support/kbdoc/en-us/000224412/dsa-2024-189-security-update-for-dell-repository/DEMO_2024_06_19" + }, + { + "tags": [ + "vendor-advisory", + "x_snapshot" + ], + "url": "https://www.dell.com/support/kbdoc/en-us/000224412/dsa-2024-189-security-update-for-dell-repository/adp-test-6-28" } ] } diff --git a/cves/2024/28xxx/CVE-2024-28977.json b/cves/2024/28xxx/CVE-2024-28977.json index 456f81d717b..bedeb4ddce2 100644 --- a/cves/2024/28xxx/CVE-2024-28977.json +++ b/cves/2024/28xxx/CVE-2024-28977.json @@ -8,7 +8,7 @@ "assignerShortName": "dell", "dateReserved": "2024-03-13T15:44:22.628Z", "datePublished": "2024-04-24T08:08:35.366Z", - "dateUpdated": "2024-06-21T15:25:13.187Z" + "dateUpdated": "2024-07-05T13:17:08.127Z" }, "containers": { "cna": { @@ -158,7 +158,7 @@ "providerMetadata": { "orgId": "96f1cf3c-f80a-4e0f-a063-99a91e3f1325", "shortName": "secretariat-reference", - "dateUpdated": "2024-06-21T15:25:13.187Z" + "dateUpdated": "2024-07-05T13:17:08.127Z" }, "references": [ { @@ -167,6 +167,13 @@ "x_cve_prog_secretariat_snapshot" ], "url": "https://www.dell.com/support/kbdoc/en-us/000224414/dsa-2024-190-security-update-for-dell-repository-manager-vulnerability/DEMO_2024_06_19" + }, + { + "tags": [ + "vendor-advisory", + "x_snapshot" + ], + "url": "https://www.dell.com/support/kbdoc/en-us/000224414/dsa-2024-190-security-update-for-dell-repository-manager-vulnerability/adp-test-6-28" } ] } diff --git a/cves/2024/28xxx/CVE-2024-28978.json b/cves/2024/28xxx/CVE-2024-28978.json index 6848b19f75c..bb5aebe3efa 100644 --- a/cves/2024/28xxx/CVE-2024-28978.json +++ b/cves/2024/28xxx/CVE-2024-28978.json @@ -8,7 +8,7 @@ "assignerShortName": "dell", "dateReserved": "2024-03-13T15:44:22.628Z", "datePublished": "2024-05-01T03:51:56.705Z", - "dateUpdated": "2024-06-21T15:25:13.601Z" + "dateUpdated": "2024-07-05T13:17:07.983Z" }, "containers": { "cna": { @@ -137,7 +137,7 @@ "providerMetadata": { "orgId": "96f1cf3c-f80a-4e0f-a063-99a91e3f1325", "shortName": "secretariat-reference", - "dateUpdated": "2024-06-21T15:25:13.601Z" + "dateUpdated": "2024-07-05T13:17:07.983Z" }, "references": [ { @@ -146,6 +146,13 @@ "x_cve_prog_secretariat_snapshot" ], "url": "https://www.dell.com/support/kbdoc/en-us/000224641/dsa-2024-201-security-update-for-dell-openmanage-enterprise-vulnerability/DEMO_2024_06_19" + }, + { + "tags": [ + "vendor-advisory", + "x_snapshot" + ], + "url": "https://www.dell.com/support/kbdoc/en-us/000224641/dsa-2024-201-security-update-for-dell-openmanage-enterprise-vulnerability/adp-test-6-28" } ] } diff --git a/cves/2024/28xxx/CVE-2024-28979.json b/cves/2024/28xxx/CVE-2024-28979.json index 840cdabe886..463a66d6cb2 100644 --- a/cves/2024/28xxx/CVE-2024-28979.json +++ b/cves/2024/28xxx/CVE-2024-28979.json @@ -8,7 +8,7 @@ "assignerShortName": "dell", "dateReserved": "2024-03-13T15:44:22.628Z", "datePublished": "2024-05-01T04:03:39.729Z", - "dateUpdated": "2024-06-21T15:25:14.014Z" + "dateUpdated": "2024-07-05T13:17:08.042Z" }, "containers": { "cna": { @@ -142,7 +142,7 @@ "providerMetadata": { "orgId": "96f1cf3c-f80a-4e0f-a063-99a91e3f1325", "shortName": "secretariat-reference", - "dateUpdated": "2024-06-21T15:25:14.014Z" + "dateUpdated": "2024-07-05T13:17:08.042Z" }, "references": [ { @@ -151,6 +151,13 @@ "x_cve_prog_secretariat_snapshot" ], "url": "https://www.dell.com/support/kbdoc/en-us/000224642/dsa-2024-202-security-update-for-dell-openmanage-enterprise-vulnerability/DEMO_2024_06_19" + }, + { + "tags": [ + "vendor-advisory", + "x_snapshot" + ], + "url": "https://www.dell.com/support/kbdoc/en-us/000224642/dsa-2024-202-security-update-for-dell-openmanage-enterprise-vulnerability/adp-test-6-28" } ] } diff --git a/cves/2024/28xxx/CVE-2024-28982.json b/cves/2024/28xxx/CVE-2024-28982.json index 3a2c362fcba..0580779931f 100644 --- a/cves/2024/28xxx/CVE-2024-28982.json +++ b/cves/2024/28xxx/CVE-2024-28982.json @@ -8,7 +8,7 @@ "assignerShortName": "HITVAN", "dateReserved": "2024-03-13T19:18:14.913Z", "datePublished": "2024-06-26T22:37:01.285Z", - "dateUpdated": "2024-06-26T22:37:01.285Z" + "dateUpdated": "2024-07-05T13:17:07.887Z" }, "containers": { "cna": { @@ -114,6 +114,23 @@ "x_generator": { "engine": "Vulnogram 0.2.0" } - } + }, + "adp": [ + { + "providerMetadata": { + "orgId": "96f1cf3c-f80a-4e0f-a063-99a91e3f1325", + "shortName": "secretariat-reference", + "dateUpdated": "2024-07-05T13:17:07.887Z" + }, + "references": [ + { + "url": "https://support.pentaho.com/hc/en-us/articles/27569195609869--Resolved-Hitachi-Vantara-Pentaho-Business-Analytics-Server-Improper-Restriction-of-XML-External-Entity-Reference-versions-before-10-1-0-0-and-9-3-0-7-including-8-3-x-Impacted-CVE-2024-28982/adp-test-6-28", + "tags": [ + "x_snapshot" + ] + } + ] + } + ] } } \ No newline at end of file diff --git a/cves/2024/28xxx/CVE-2024-28983.json b/cves/2024/28xxx/CVE-2024-28983.json index ee7f6c3e787..77a9d9718ee 100644 --- a/cves/2024/28xxx/CVE-2024-28983.json +++ b/cves/2024/28xxx/CVE-2024-28983.json @@ -8,7 +8,7 @@ "assignerShortName": "HITVAN", "dateReserved": "2024-03-13T19:18:14.913Z", "datePublished": "2024-06-26T22:40:15.645Z", - "dateUpdated": "2024-06-27T14:48:13.210Z" + "dateUpdated": "2024-07-05T13:17:08.028Z" }, "containers": { "cna": { @@ -144,6 +144,21 @@ "shortName": "CISA-ADP", "dateUpdated": "2024-06-27T14:48:13.210Z" } + }, + { + "providerMetadata": { + "orgId": "96f1cf3c-f80a-4e0f-a063-99a91e3f1325", + "shortName": "secretariat-reference", + "dateUpdated": "2024-07-05T13:17:08.028Z" + }, + "references": [ + { + "url": "https://support.pentaho.com/hc/en-us/articles/27569257123725-Hitachi-Vantara-Pentaho-Business-Analytics-Server-Improper-Neutralization-of-Input-During-Web-Page-Generation-Cross-site-Scripting-Versions-before-10-1-0-0-and-9-3-0-7-including-8-3-x-Impacted-CVE-2024-28983/adp-test-6-28", + "tags": [ + "x_snapshot" + ] + } + ] } ] } diff --git a/cves/2024/28xxx/CVE-2024-28984.json b/cves/2024/28xxx/CVE-2024-28984.json index 4af3f9a93c5..7d6cee2cf72 100644 --- a/cves/2024/28xxx/CVE-2024-28984.json +++ b/cves/2024/28xxx/CVE-2024-28984.json @@ -8,7 +8,7 @@ "assignerShortName": "HITVAN", "dateReserved": "2024-03-13T19:18:14.913Z", "datePublished": "2024-06-26T22:41:57.450Z", - "dateUpdated": "2024-06-26T22:41:57.450Z" + "dateUpdated": "2024-07-05T13:17:08.002Z" }, "containers": { "cna": { @@ -111,6 +111,23 @@ "x_generator": { "engine": "Vulnogram 0.2.0" } - } + }, + "adp": [ + { + "providerMetadata": { + "orgId": "96f1cf3c-f80a-4e0f-a063-99a91e3f1325", + "shortName": "secretariat-reference", + "dateUpdated": "2024-07-05T13:17:08.002Z" + }, + "references": [ + { + "url": "https://support.pentaho.com/hc/en-us/articles/27569319605901-Hitachi-Vantara-Pentaho-Business-Analytics-Server-Improper-Neutralization-of-Input-During-Web-Page-Generation-Cross-site-Scripting-Versions-before-10-1-0-0-and-9-3-0-7-including-8-3-x-Impacted-CVE-2024-28984/adp-test-6-28", + "tags": [ + "x_snapshot" + ] + } + ] + } + ] } } \ No newline at end of file diff --git a/cves/2024/28xxx/CVE-2024-28995.json b/cves/2024/28xxx/CVE-2024-28995.json index f831c067a01..d2bc6f7a63b 100644 --- a/cves/2024/28xxx/CVE-2024-28995.json +++ b/cves/2024/28xxx/CVE-2024-28995.json @@ -8,7 +8,7 @@ "assignerShortName": "SolarWinds", "dateReserved": "2024-03-13T20:27:09.783Z", "datePublished": "2024-06-06T09:01:23.314Z", - "dateUpdated": "2024-06-26T03:55:26.894Z" + "dateUpdated": "2024-07-05T13:17:08.044Z" }, "containers": { "cna": { @@ -127,6 +127,24 @@ "x_generator": { "engine": "Vulnogram 0.1.0-dev" } - } + }, + "adp": [ + { + "providerMetadata": { + "orgId": "96f1cf3c-f80a-4e0f-a063-99a91e3f1325", + "shortName": "secretariat-reference", + "dateUpdated": "2024-07-05T13:17:08.044Z" + }, + "references": [ + { + "tags": [ + "vendor-advisory", + "x_snapshot" + ], + "url": "https://www.solarwinds.com/trust-center/security-advisories/CVE-2024-28995/adp-test-6-28" + } + ] + } + ] } } \ No newline at end of file diff --git a/cves/2024/28xxx/CVE-2024-28996.json b/cves/2024/28xxx/CVE-2024-28996.json index dbb72dc270f..2adf068c804 100644 --- a/cves/2024/28xxx/CVE-2024-28996.json +++ b/cves/2024/28xxx/CVE-2024-28996.json @@ -8,7 +8,7 @@ "assignerShortName": "SolarWinds", "dateReserved": "2024-03-13T20:27:16.318Z", "datePublished": "2024-06-04T14:49:53.075Z", - "dateUpdated": "2024-06-05T05:15:36.855Z" + "dateUpdated": "2024-07-05T13:17:07.700Z" }, "containers": { "cna": { @@ -184,6 +184,29 @@ "shortName": "CISA-ADP", "dateUpdated": "2024-06-04T18:03:21.970Z" } + }, + { + "providerMetadata": { + "orgId": "96f1cf3c-f80a-4e0f-a063-99a91e3f1325", + "shortName": "secretariat-reference", + "dateUpdated": "2024-07-05T13:17:07.700Z" + }, + "references": [ + { + "tags": [ + "vendor-advisory", + "x_snapshot" + ], + "url": "https://www.solarwinds.com/trust-center/security-advisories/CVE-2024-28996/adp-test-6-28" + }, + { + "tags": [ + "release-notes", + "x_snapshot" + ], + "url": "https://documentation.solarwinds.com/en/success_center/orionplatform/content/release_notes/solarwinds_platform_2024-2_release_notes.htm/adp-test-6-28" + } + ] } ] } diff --git a/cves/2024/28xxx/CVE-2024-28999.json b/cves/2024/28xxx/CVE-2024-28999.json index 950e15cbf7a..489c07da385 100644 --- a/cves/2024/28xxx/CVE-2024-28999.json +++ b/cves/2024/28xxx/CVE-2024-28999.json @@ -8,7 +8,7 @@ "assignerShortName": "SolarWinds", "dateReserved": "2024-03-13T20:27:16.319Z", "datePublished": "2024-06-04T14:51:56.682Z", - "dateUpdated": "2024-06-21T15:25:14.653Z" + "dateUpdated": "2024-07-05T13:17:08.105Z" }, "containers": { "cna": { @@ -189,7 +189,7 @@ "providerMetadata": { "orgId": "96f1cf3c-f80a-4e0f-a063-99a91e3f1325", "shortName": "secretariat-reference", - "dateUpdated": "2024-06-21T15:25:14.653Z" + "dateUpdated": "2024-07-05T13:17:08.105Z" }, "references": [ { @@ -205,6 +205,20 @@ "x_cve_prog_secretariat_snapshot" ], "url": "https://documentation.solarwinds.com/en/success_center/orionplatform/content/release_notes/solarwinds_platform_2024-2_release_notes.htm/DEMO_2024_06_19" + }, + { + "tags": [ + "vendor-advisory", + "x_snapshot" + ], + "url": "https://www.solarwinds.com/trust-center/security-advisories/CVE-2024-28999/adp-test-6-28" + }, + { + "tags": [ + "release-notes", + "x_snapshot" + ], + "url": "https://documentation.solarwinds.com/en/success_center/orionplatform/content/release_notes/solarwinds_platform_2024-2_release_notes.htm/adp-test-6-28" } ] } diff --git a/cves/2024/29xxx/CVE-2024-29000.json b/cves/2024/29xxx/CVE-2024-29000.json index 2cc2db15d8c..bfe79e91fa8 100644 --- a/cves/2024/29xxx/CVE-2024-29000.json +++ b/cves/2024/29xxx/CVE-2024-29000.json @@ -8,7 +8,7 @@ "assignerShortName": "SolarWinds", "dateReserved": "2024-03-13T20:27:16.319Z", "datePublished": "2024-05-20T18:26:18.573Z", - "dateUpdated": "2024-06-21T15:25:15.107Z" + "dateUpdated": "2024-07-05T13:17:07.796Z" }, "containers": { "cna": { @@ -183,7 +183,7 @@ "providerMetadata": { "orgId": "96f1cf3c-f80a-4e0f-a063-99a91e3f1325", "shortName": "secretariat-reference", - "dateUpdated": "2024-06-21T15:25:15.107Z" + "dateUpdated": "2024-07-05T13:17:07.796Z" }, "references": [ { @@ -197,6 +197,18 @@ "tags": [ "x_cve_prog_secretariat_snapshot" ] + }, + { + "url": "https://documentation.solarwinds.com/en/success_center/orionplatform/content/release_notes/solarwinds_platform_2024-1-1_release_notes.htm/adp-test-6-28", + "tags": [ + "x_snapshot" + ] + }, + { + "url": "https://www.solarwinds.com/trust-center/security-advisories/CVE-2024-29000/adp-test-6-28", + "tags": [ + "x_snapshot" + ] } ] } diff --git a/cves/2024/29xxx/CVE-2024-29001.json b/cves/2024/29xxx/CVE-2024-29001.json index 30357db283e..adb77d46700 100644 --- a/cves/2024/29xxx/CVE-2024-29001.json +++ b/cves/2024/29xxx/CVE-2024-29001.json @@ -8,7 +8,7 @@ "assignerShortName": "SolarWinds", "dateReserved": "2024-03-13T20:27:16.319Z", "datePublished": "2024-04-18T09:06:41.437Z", - "dateUpdated": "2024-06-21T15:25:15.505Z" + "dateUpdated": "2024-07-05T13:17:07.763Z" }, "containers": { "cna": { @@ -181,7 +181,7 @@ "providerMetadata": { "orgId": "96f1cf3c-f80a-4e0f-a063-99a91e3f1325", "shortName": "secretariat-reference", - "dateUpdated": "2024-06-21T15:25:15.505Z" + "dateUpdated": "2024-07-05T13:17:07.763Z" }, "references": [ { @@ -195,6 +195,18 @@ "tags": [ "x_cve_prog_secretariat_snapshot" ] + }, + { + "url": "https://www.solarwinds.com/trust-center/security-advisories/CVE-2024-29001/adp-test-6-28", + "tags": [ + "x_snapshot" + ] + }, + { + "url": "https://documentation.solarwinds.com/en/success_center/orionplatform/content/release_notes/solarwinds_platform_2024-1-1_release_notes.htm/adp-test-6-28", + "tags": [ + "x_snapshot" + ] } ] } diff --git a/cves/2024/29xxx/CVE-2024-29003.json b/cves/2024/29xxx/CVE-2024-29003.json index 16d3cf26924..8e344790998 100644 --- a/cves/2024/29xxx/CVE-2024-29003.json +++ b/cves/2024/29xxx/CVE-2024-29003.json @@ -8,7 +8,7 @@ "assignerShortName": "SolarWinds", "dateReserved": "2024-03-13T20:27:16.319Z", "datePublished": "2024-04-18T09:07:17.085Z", - "dateUpdated": "2024-06-21T15:25:15.903Z" + "dateUpdated": "2024-07-05T13:17:07.780Z" }, "containers": { "cna": { @@ -183,7 +183,7 @@ "providerMetadata": { "orgId": "96f1cf3c-f80a-4e0f-a063-99a91e3f1325", "shortName": "secretariat-reference", - "dateUpdated": "2024-06-21T15:25:15.903Z" + "dateUpdated": "2024-07-05T13:17:07.780Z" }, "references": [ { @@ -197,6 +197,18 @@ "tags": [ "x_cve_prog_secretariat_snapshot" ] + }, + { + "url": "https://www.solarwinds.com/trust-center/security-advisories/CVE-2024-29003/adp-test-6-28", + "tags": [ + "x_snapshot" + ] + }, + { + "url": "https://documentation.solarwinds.com/en/success_center/orionplatform/content/release_notes/solarwinds_platform_2024-1-1_release_notes.htm/adp-test-6-28", + "tags": [ + "x_snapshot" + ] } ] } diff --git a/cves/2024/29xxx/CVE-2024-29004.json b/cves/2024/29xxx/CVE-2024-29004.json index 481d279fbd8..3a5d3390d8f 100644 --- a/cves/2024/29xxx/CVE-2024-29004.json +++ b/cves/2024/29xxx/CVE-2024-29004.json @@ -8,7 +8,7 @@ "assignerShortName": "SolarWinds", "dateReserved": "2024-03-13T20:27:16.320Z", "datePublished": "2024-06-04T14:53:26.256Z", - "dateUpdated": "2024-06-21T15:25:16.331Z" + "dateUpdated": "2024-07-05T13:17:08.041Z" }, "containers": { "cna": { @@ -139,7 +139,7 @@ "providerMetadata": { "orgId": "96f1cf3c-f80a-4e0f-a063-99a91e3f1325", "shortName": "secretariat-reference", - "dateUpdated": "2024-06-21T15:25:16.331Z" + "dateUpdated": "2024-07-05T13:17:08.041Z" }, "references": [ { @@ -155,6 +155,20 @@ "x_cve_prog_secretariat_snapshot" ], "url": "https://documentation.solarwinds.com/en/success_center/orionplatform/content/release_notes/solarwinds_platform_2024-2_release_notes.htm/DEMO_2024_06_19" + }, + { + "tags": [ + "vendor-advisory", + "x_snapshot" + ], + "url": "https://www.solarwinds.com/trust-center/security-advisories/CVE-2024-29004/adp-test-6-28" + }, + { + "tags": [ + "release-notes", + "x_snapshot" + ], + "url": "https://documentation.solarwinds.com/en/success_center/orionplatform/content/release_notes/solarwinds_platform_2024-2_release_notes.htm/adp-test-6-28" } ] } diff --git a/cves/2024/29xxx/CVE-2024-29006.json b/cves/2024/29xxx/CVE-2024-29006.json index 48eadac68e2..c98ddafeec4 100644 --- a/cves/2024/29xxx/CVE-2024-29006.json +++ b/cves/2024/29xxx/CVE-2024-29006.json @@ -8,7 +8,7 @@ "assignerShortName": "apache", "dateReserved": "2024-03-13T22:56:41.313Z", "datePublished": "2024-04-04T07:48:54.101Z", - "dateUpdated": "2024-06-21T15:25:16.743Z" + "dateUpdated": "2024-07-05T13:17:08.060Z" }, "containers": { "cna": { @@ -130,7 +130,7 @@ "providerMetadata": { "orgId": "96f1cf3c-f80a-4e0f-a063-99a91e3f1325", "shortName": "secretariat-reference", - "dateUpdated": "2024-06-21T15:25:16.743Z" + "dateUpdated": "2024-07-05T13:17:08.060Z" }, "references": [ { @@ -139,6 +139,13 @@ "x_cve_prog_secretariat_snapshot" ], "url": "https://lists.apache.org/thread/82f46pv7mvh95ybto5hn8wlo6g8jhjvp/DEMO_2024_06_19" + }, + { + "tags": [ + "vendor-advisory", + "x_snapshot" + ], + "url": "https://lists.apache.org/thread/82f46pv7mvh95ybto5hn8wlo6g8jhjvp/adp-test-6-28" } ] } diff --git a/cves/2024/29xxx/CVE-2024-29007.json b/cves/2024/29xxx/CVE-2024-29007.json index 31f199ec493..f642ebdd7f8 100644 --- a/cves/2024/29xxx/CVE-2024-29007.json +++ b/cves/2024/29xxx/CVE-2024-29007.json @@ -8,7 +8,7 @@ "assignerShortName": "apache", "dateReserved": "2024-03-13T22:58:54.736Z", "datePublished": "2024-04-04T07:49:57.831Z", - "dateUpdated": "2024-06-21T15:25:17.181Z" + "dateUpdated": "2024-07-05T13:17:08.125Z" }, "containers": { "cna": { @@ -99,7 +99,7 @@ "providerMetadata": { "orgId": "96f1cf3c-f80a-4e0f-a063-99a91e3f1325", "shortName": "secretariat-reference", - "dateUpdated": "2024-06-21T15:25:17.181Z" + "dateUpdated": "2024-07-05T13:17:08.125Z" }, "references": [ { @@ -108,6 +108,13 @@ "x_cve_prog_secretariat_snapshot" ], "url": "https://lists.apache.org/thread/82f46pv7mvh95ybto5hn8wlo6g8jhjvp/DEMO_2024_06_19" + }, + { + "tags": [ + "vendor-advisory", + "x_snapshot" + ], + "url": "https://lists.apache.org/thread/82f46pv7mvh95ybto5hn8wlo6g8jhjvp/adp-test-6-28" } ] } diff --git a/cves/2024/29xxx/CVE-2024-29008.json b/cves/2024/29xxx/CVE-2024-29008.json index 035a4e612ee..74abe044cea 100644 --- a/cves/2024/29xxx/CVE-2024-29008.json +++ b/cves/2024/29xxx/CVE-2024-29008.json @@ -8,7 +8,7 @@ "assignerShortName": "apache", "dateReserved": "2024-03-13T23:02:19.432Z", "datePublished": "2024-04-04T07:51:05.423Z", - "dateUpdated": "2024-06-21T15:25:17.600Z" + "dateUpdated": "2024-07-05T13:17:08.148Z" }, "containers": { "cna": { @@ -99,7 +99,7 @@ "providerMetadata": { "orgId": "96f1cf3c-f80a-4e0f-a063-99a91e3f1325", "shortName": "secretariat-reference", - "dateUpdated": "2024-06-21T15:25:17.600Z" + "dateUpdated": "2024-07-05T13:17:08.148Z" }, "references": [ { @@ -108,6 +108,13 @@ "x_cve_prog_secretariat_snapshot" ], "url": "https://lists.apache.org/thread/82f46pv7mvh95ybto5hn8wlo6g8jhjvp/DEMO_2024_06_19" + }, + { + "tags": [ + "vendor-advisory", + "x_snapshot" + ], + "url": "https://lists.apache.org/thread/82f46pv7mvh95ybto5hn8wlo6g8jhjvp/adp-test-6-28" } ] } diff --git a/cves/2024/29xxx/CVE-2024-29009.json b/cves/2024/29xxx/CVE-2024-29009.json index 6d887383423..1a7e9fb521f 100644 --- a/cves/2024/29xxx/CVE-2024-29009.json +++ b/cves/2024/29xxx/CVE-2024-29009.json @@ -8,7 +8,7 @@ "assignerShortName": "jpcert", "dateReserved": "2024-03-14T01:17:20.953Z", "datePublished": "2024-03-25T04:14:37.123Z", - "dateUpdated": "2024-06-21T15:25:18.078Z" + "dateUpdated": "2024-07-05T13:17:07.808Z" }, "containers": { "cna": { @@ -63,7 +63,7 @@ "providerMetadata": { "orgId": "96f1cf3c-f80a-4e0f-a063-99a91e3f1325", "shortName": "secretariat-reference", - "dateUpdated": "2024-06-21T15:25:18.078Z" + "dateUpdated": "2024-07-05T13:17:07.808Z" }, "references": [ { @@ -77,6 +77,18 @@ "tags": [ "x_cve_prog_secretariat_snapshot" ] + }, + { + "url": "https://wordpress.org/plugins/easy-popup-show//adp-test-6-28", + "tags": [ + "x_snapshot" + ] + }, + { + "url": "https://jvn.jp/en/jp/JVN86206017//adp-test-6-28", + "tags": [ + "x_snapshot" + ] } ] } diff --git a/cves/2024/29xxx/CVE-2024-29010.json b/cves/2024/29xxx/CVE-2024-29010.json index 79168156e71..9f7898f86d4 100644 --- a/cves/2024/29xxx/CVE-2024-29010.json +++ b/cves/2024/29xxx/CVE-2024-29010.json @@ -8,7 +8,7 @@ "assignerShortName": "sonicwall", "dateReserved": "2024-03-14T03:29:41.180Z", "datePublished": "2024-05-01T18:12:53.853Z", - "dateUpdated": "2024-06-21T15:25:18.519Z" + "dateUpdated": "2024-07-05T13:17:08.144Z" }, "containers": { "cna": { @@ -163,7 +163,7 @@ "providerMetadata": { "orgId": "96f1cf3c-f80a-4e0f-a063-99a91e3f1325", "shortName": "secretariat-reference", - "dateUpdated": "2024-06-21T15:25:18.519Z" + "dateUpdated": "2024-07-05T13:17:08.144Z" }, "references": [ { @@ -172,6 +172,13 @@ "x_cve_prog_secretariat_snapshot" ], "url": "https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2024-0007/DEMO_2024_06_19" + }, + { + "tags": [ + "vendor-advisory", + "x_snapshot" + ], + "url": "https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2024-0007/adp-test-6-28" } ] } diff --git a/cves/2024/29xxx/CVE-2024-29011.json b/cves/2024/29xxx/CVE-2024-29011.json index da9cf886d89..3e34681dd85 100644 --- a/cves/2024/29xxx/CVE-2024-29011.json +++ b/cves/2024/29xxx/CVE-2024-29011.json @@ -8,7 +8,7 @@ "assignerShortName": "sonicwall", "dateReserved": "2024-03-14T03:29:41.180Z", "datePublished": "2024-05-01T18:19:46.896Z", - "dateUpdated": "2024-06-21T15:25:18.999Z" + "dateUpdated": "2024-07-05T13:17:08.079Z" }, "containers": { "cna": { @@ -152,7 +152,7 @@ "providerMetadata": { "orgId": "96f1cf3c-f80a-4e0f-a063-99a91e3f1325", "shortName": "secretariat-reference", - "dateUpdated": "2024-06-21T15:25:18.999Z" + "dateUpdated": "2024-07-05T13:17:08.079Z" }, "references": [ { @@ -161,6 +161,13 @@ "x_cve_prog_secretariat_snapshot" ], "url": "https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2024-0007/DEMO_2024_06_19" + }, + { + "tags": [ + "vendor-advisory", + "x_snapshot" + ], + "url": "https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2024-0007/adp-test-6-28" } ] } diff --git a/cves/2024/29xxx/CVE-2024-29012.json b/cves/2024/29xxx/CVE-2024-29012.json index 9546e0ec3dd..061c1722c95 100644 --- a/cves/2024/29xxx/CVE-2024-29012.json +++ b/cves/2024/29xxx/CVE-2024-29012.json @@ -8,7 +8,7 @@ "assignerShortName": "sonicwall", "dateReserved": "2024-03-14T03:29:41.180Z", "datePublished": "2024-06-20T08:11:10.318Z", - "dateUpdated": "2024-06-24T14:44:20.429Z" + "dateUpdated": "2024-07-05T13:17:08.001Z" }, "containers": { "cna": { @@ -79,12 +79,19 @@ "references": [ { "url": "https://fakenotrealsupernotreal.com" + }, + { + "tags": [ + "vendor-advisory", + "x_snapshot" + ], + "url": "https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2024-0008/adp-test-6-28" } ], "providerMetadata": { "orgId": "96f1cf3c-f80a-4e0f-a063-99a91e3f1325", "shortName": "secretariat-reference", - "dateUpdated": "2024-06-24T14:44:20.429Z" + "dateUpdated": "2024-07-05T13:17:08.001Z" } } ] diff --git a/cves/2024/29xxx/CVE-2024-29013.json b/cves/2024/29xxx/CVE-2024-29013.json index 5021ad49008..72b80d2fe44 100644 --- a/cves/2024/29xxx/CVE-2024-29013.json +++ b/cves/2024/29xxx/CVE-2024-29013.json @@ -8,7 +8,7 @@ "assignerShortName": "sonicwall", "dateReserved": "2024-03-14T03:29:41.180Z", "datePublished": "2024-06-20T08:14:23.845Z", - "dateUpdated": "2024-06-20T08:14:23.845Z" + "dateUpdated": "2024-07-05T13:17:07.800Z" }, "containers": { "cna": { @@ -73,6 +73,24 @@ "x_generator": { "engine": "Vulnogram 0.2.0" } - } + }, + "adp": [ + { + "providerMetadata": { + "orgId": "96f1cf3c-f80a-4e0f-a063-99a91e3f1325", + "shortName": "secretariat-reference", + "dateUpdated": "2024-07-05T13:17:07.800Z" + }, + "references": [ + { + "tags": [ + "vendor-advisory", + "x_snapshot" + ], + "url": "https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2024-0009/adp-test-6-28" + } + ] + } + ] } } \ No newline at end of file diff --git a/cves/2024/29xxx/CVE-2024-29018.json b/cves/2024/29xxx/CVE-2024-29018.json index 66de2c7bf98..1efde68db5a 100644 --- a/cves/2024/29xxx/CVE-2024-29018.json +++ b/cves/2024/29xxx/CVE-2024-29018.json @@ -8,7 +8,7 @@ "assignerShortName": "GitHub_M", "dateReserved": "2024-03-14T16:59:47.610Z", "datePublished": "2024-03-20T20:27:00.491Z", - "dateUpdated": "2024-06-21T15:25:19.476Z" + "dateUpdated": "2024-07-05T13:17:07.861Z" }, "containers": { "cna": { @@ -100,7 +100,7 @@ "providerMetadata": { "orgId": "96f1cf3c-f80a-4e0f-a063-99a91e3f1325", "shortName": "secretariat-reference", - "dateUpdated": "2024-06-21T15:25:19.476Z" + "dateUpdated": "2024-07-05T13:17:07.861Z" }, "references": [ { @@ -118,6 +118,22 @@ "x_cve_prog_secretariat_snapshot" ], "url": "https://github.com/moby/moby/pull/46609/DEMO_2024_06_19" + }, + { + "name": "https://github.com/moby/moby/security/advisories/GHSA-mq39-4gv4-mvpx", + "tags": [ + "x_refsource_CONFIRM", + "x_snapshot" + ], + "url": "https://github.com/moby/moby/security/advisories/GHSA-mq39-4gv4-mvpx/adp-test-6-28" + }, + { + "name": "https://github.com/moby/moby/pull/46609", + "tags": [ + "x_refsource_MISC", + "x_snapshot" + ], + "url": "https://github.com/moby/moby/pull/46609/adp-test-6-28" } ] } diff --git a/cves/2024/29xxx/CVE-2024-29019.json b/cves/2024/29xxx/CVE-2024-29019.json index 42fe0dfbe48..c3240b3f277 100644 --- a/cves/2024/29xxx/CVE-2024-29019.json +++ b/cves/2024/29xxx/CVE-2024-29019.json @@ -8,7 +8,7 @@ "assignerShortName": "GitHub_M", "dateReserved": "2024-03-14T16:59:47.610Z", "datePublished": "2024-03-21T15:54:42.548Z", - "dateUpdated": "2024-06-21T15:25:20.047Z" + "dateUpdated": "2024-07-05T13:17:08.082Z" }, "containers": { "cna": { @@ -92,7 +92,7 @@ "providerMetadata": { "orgId": "96f1cf3c-f80a-4e0f-a063-99a91e3f1325", "shortName": "secretariat-reference", - "dateUpdated": "2024-06-21T15:25:20.047Z" + "dateUpdated": "2024-07-05T13:17:08.082Z" }, "references": [ { @@ -110,6 +110,22 @@ "x_cve_prog_secretariat_snapshot" ], "url": "https://github.com/advisories/GHSA-9p43-hj5j-96h5/DEMO_2024_06_19" + }, + { + "name": "https://github.com/esphome/esphome/security/advisories/GHSA-5925-88xh-6h99", + "tags": [ + "x_refsource_CONFIRM", + "x_snapshot" + ], + "url": "https://github.com/esphome/esphome/security/advisories/GHSA-5925-88xh-6h99/adp-test-6-28" + }, + { + "name": "https://github.com/advisories/GHSA-9p43-hj5j-96h5", + "tags": [ + "x_refsource_MISC", + "x_snapshot" + ], + "url": "https://github.com/advisories/GHSA-9p43-hj5j-96h5/adp-test-6-28" } ] } diff --git a/cves/2024/29xxx/CVE-2024-29020.json b/cves/2024/29xxx/CVE-2024-29020.json index b5fddd7b7b8..c511fd0e0cb 100644 --- a/cves/2024/29xxx/CVE-2024-29020.json +++ b/cves/2024/29xxx/CVE-2024-29020.json @@ -8,7 +8,7 @@ "assignerShortName": "GitHub_M", "dateReserved": "2024-03-14T16:59:47.610Z", "datePublished": "2024-03-29T14:46:00.417Z", - "dateUpdated": "2024-06-21T15:25:20.459Z" + "dateUpdated": "2024-07-05T13:17:08.142Z" }, "containers": { "cna": { @@ -85,7 +85,7 @@ "providerMetadata": { "orgId": "96f1cf3c-f80a-4e0f-a063-99a91e3f1325", "shortName": "secretariat-reference", - "dateUpdated": "2024-06-21T15:25:20.459Z" + "dateUpdated": "2024-07-05T13:17:08.142Z" }, "references": [ { @@ -95,6 +95,14 @@ "x_cve_prog_secretariat_snapshot" ], "url": "https://github.com/jumpserver/jumpserver/security/advisories/GHSA-7mqc-23hr-cr62/DEMO_2024_06_19" + }, + { + "name": "https://github.com/jumpserver/jumpserver/security/advisories/GHSA-7mqc-23hr-cr62", + "tags": [ + "x_refsource_CONFIRM", + "x_snapshot" + ], + "url": "https://github.com/jumpserver/jumpserver/security/advisories/GHSA-7mqc-23hr-cr62/adp-test-6-28" } ] } diff --git a/cves/2024/29xxx/CVE-2024-29021.json b/cves/2024/29xxx/CVE-2024-29021.json index 61bc7295a56..f16cbdabe10 100644 --- a/cves/2024/29xxx/CVE-2024-29021.json +++ b/cves/2024/29xxx/CVE-2024-29021.json @@ -8,7 +8,7 @@ "assignerShortName": "GitHub_M", "dateReserved": "2024-03-14T16:59:47.611Z", "datePublished": "2024-04-18T14:43:33.770Z", - "dateUpdated": "2024-06-21T15:25:20.856Z" + "dateUpdated": "2024-07-05T13:17:08.177Z" }, "containers": { "cna": { @@ -150,7 +150,7 @@ "providerMetadata": { "orgId": "96f1cf3c-f80a-4e0f-a063-99a91e3f1325", "shortName": "secretariat-reference", - "dateUpdated": "2024-06-21T15:25:20.856Z" + "dateUpdated": "2024-07-05T13:17:08.177Z" }, "references": [ { @@ -168,6 +168,22 @@ "x_cve_prog_secretariat_snapshot" ], "url": "https://github.com/judge0/judge0/blob/ad66f77b131dbbebf2b9ff8083dca9a68680b3e5/app/jobs/isolate_job.rb#L203-L230/DEMO_2024_06_19" + }, + { + "name": "https://github.com/judge0/judge0/security/advisories/GHSA-q7vg-26pg-v5hr", + "tags": [ + "x_refsource_CONFIRM", + "x_snapshot" + ], + "url": "https://github.com/judge0/judge0/security/advisories/GHSA-q7vg-26pg-v5hr/adp-test-6-28" + }, + { + "name": "https://github.com/judge0/judge0/blob/ad66f77b131dbbebf2b9ff8083dca9a68680b3e5/app/jobs/isolate_job.rb#L203-L230", + "tags": [ + "x_refsource_MISC", + "x_snapshot" + ], + "url": "https://github.com/judge0/judge0/blob/ad66f77b131dbbebf2b9ff8083dca9a68680b3e5/app/jobs/isolate_job.rb#L203-L230/adp-test-6-28" } ] } diff --git a/cves/2024/29xxx/CVE-2024-29022.json b/cves/2024/29xxx/CVE-2024-29022.json index 6107721d203..2e6211e49b1 100644 --- a/cves/2024/29xxx/CVE-2024-29022.json +++ b/cves/2024/29xxx/CVE-2024-29022.json @@ -8,7 +8,7 @@ "assignerShortName": "GitHub_M", "dateReserved": "2024-03-14T16:59:47.611Z", "datePublished": "2024-04-12T21:04:23.813Z", - "dateUpdated": "2024-06-21T15:25:21.287Z" + "dateUpdated": "2024-07-05T13:17:08.134Z" }, "containers": { "cna": { @@ -120,7 +120,7 @@ "providerMetadata": { "orgId": "96f1cf3c-f80a-4e0f-a063-99a91e3f1325", "shortName": "secretariat-reference", - "dateUpdated": "2024-06-21T15:25:21.287Z" + "dateUpdated": "2024-07-05T13:17:08.134Z" }, "references": [ { @@ -154,6 +154,38 @@ "x_cve_prog_secretariat_snapshot" ], "url": "https://xibosignage.com/blog/security-advisory-2024-04/DEMO_2024_06_19" + }, + { + "name": "https://github.com/xibosignage/xibo-cms/security/advisories/GHSA-xchw-pf2w-rpgq", + "tags": [ + "x_refsource_CONFIRM", + "x_snapshot" + ], + "url": "https://github.com/xibosignage/xibo-cms/security/advisories/GHSA-xchw-pf2w-rpgq/adp-test-6-28" + }, + { + "name": "https://github.com/dasgarner/xibo-cms/commit/a81044e6ccdd92cc967e34c125bd8162432e51bc.diff", + "tags": [ + "x_refsource_MISC", + "x_snapshot" + ], + "url": "https://github.com/dasgarner/xibo-cms/commit/a81044e6ccdd92cc967e34c125bd8162432e51bc.diff/adp-test-6-28" + }, + { + "name": "https://github.com/xibosignage/xibo-cms/commit/ebeccd000b51f00b9a25f56a2f252d6812ebf850.diff", + "tags": [ + "x_refsource_MISC", + "x_snapshot" + ], + "url": "https://github.com/xibosignage/xibo-cms/commit/ebeccd000b51f00b9a25f56a2f252d6812ebf850.diff/adp-test-6-28" + }, + { + "name": "https://xibosignage.com/blog/security-advisory-2024-04", + "tags": [ + "x_refsource_MISC", + "x_snapshot" + ], + "url": "https://xibosignage.com/blog/security-advisory-2024-04/adp-test-6-28" } ] } diff --git a/cves/2024/29xxx/CVE-2024-29023.json b/cves/2024/29xxx/CVE-2024-29023.json index 7bf008f07e4..46b7ce332ef 100644 --- a/cves/2024/29xxx/CVE-2024-29023.json +++ b/cves/2024/29xxx/CVE-2024-29023.json @@ -8,7 +8,7 @@ "assignerShortName": "GitHub_M", "dateReserved": "2024-03-14T16:59:47.611Z", "datePublished": "2024-04-12T21:00:55.671Z", - "dateUpdated": "2024-06-21T15:25:21.705Z" + "dateUpdated": "2024-07-05T13:17:08.065Z" }, "containers": { "cna": { @@ -124,7 +124,7 @@ "providerMetadata": { "orgId": "96f1cf3c-f80a-4e0f-a063-99a91e3f1325", "shortName": "secretariat-reference", - "dateUpdated": "2024-06-21T15:25:21.705Z" + "dateUpdated": "2024-07-05T13:17:08.065Z" }, "references": [ { @@ -174,6 +174,54 @@ "x_cve_prog_secretariat_snapshot" ], "url": "https://xibosignage.com/blog/security-advisory-2024-04/DEMO_2024_06_19" + }, + { + "name": "https://github.com/xibosignage/xibo-cms/security/advisories/GHSA-xmc6-cfq5-hg39", + "tags": [ + "x_refsource_CONFIRM", + "x_snapshot" + ], + "url": "https://github.com/xibosignage/xibo-cms/security/advisories/GHSA-xmc6-cfq5-hg39/adp-test-6-28" + }, + { + "name": "https://github.com/dasgarner/xibo-cms/commit/a81044e6ccdd92cc967e34c125bd8162432e51bc.diff", + "tags": [ + "x_refsource_MISC", + "x_snapshot" + ], + "url": "https://github.com/dasgarner/xibo-cms/commit/a81044e6ccdd92cc967e34c125bd8162432e51bc.diff/adp-test-6-28" + }, + { + "name": "https://github.com/xibosignage/xibo-cms/commit/3b93636aa7aea07d1f7dfa36b63b773ac16d7cde", + "tags": [ + "x_refsource_MISC", + "x_snapshot" + ], + "url": "https://github.com/xibosignage/xibo-cms/commit/3b93636aa7aea07d1f7dfa36b63b773ac16d7cde/adp-test-6-28" + }, + { + "name": "https://github.com/xibosignage/xibo-cms/commit/49f018fd9fe64fcd417d7c2ef96078bd7b2b88b7", + "tags": [ + "x_refsource_MISC", + "x_snapshot" + ], + "url": "https://github.com/xibosignage/xibo-cms/commit/49f018fd9fe64fcd417d7c2ef96078bd7b2b88b7/adp-test-6-28" + }, + { + "name": "https://github.com/xibosignage/xibo-cms/commit/ebeccd000b51f00b9a25f56a2f252d6812ebf850.diff", + "tags": [ + "x_refsource_MISC", + "x_snapshot" + ], + "url": "https://github.com/xibosignage/xibo-cms/commit/ebeccd000b51f00b9a25f56a2f252d6812ebf850.diff/adp-test-6-28" + }, + { + "name": "https://xibosignage.com/blog/security-advisory-2024-04", + "tags": [ + "x_refsource_MISC", + "x_snapshot" + ], + "url": "https://xibosignage.com/blog/security-advisory-2024-04/adp-test-6-28" } ] } diff --git a/cves/2024/29xxx/CVE-2024-29024.json b/cves/2024/29xxx/CVE-2024-29024.json index 074803dc7d0..1b0e9c7237e 100644 --- a/cves/2024/29xxx/CVE-2024-29024.json +++ b/cves/2024/29xxx/CVE-2024-29024.json @@ -8,7 +8,7 @@ "assignerShortName": "GitHub_M", "dateReserved": "2024-03-14T16:59:47.611Z", "datePublished": "2024-03-29T14:45:56.377Z", - "dateUpdated": "2024-06-21T15:25:22.116Z" + "dateUpdated": "2024-07-05T13:17:08.128Z" }, "containers": { "cna": { @@ -85,7 +85,7 @@ "providerMetadata": { "orgId": "96f1cf3c-f80a-4e0f-a063-99a91e3f1325", "shortName": "secretariat-reference", - "dateUpdated": "2024-06-21T15:25:22.116Z" + "dateUpdated": "2024-07-05T13:17:08.128Z" }, "references": [ { @@ -95,6 +95,14 @@ "x_cve_prog_secretariat_snapshot" ], "url": "https://github.com/jumpserver/jumpserver/security/advisories/GHSA-8wqm-rfc7-q27q/DEMO_2024_06_19" + }, + { + "name": "https://github.com/jumpserver/jumpserver/security/advisories/GHSA-8wqm-rfc7-q27q", + "tags": [ + "x_refsource_CONFIRM", + "x_snapshot" + ], + "url": "https://github.com/jumpserver/jumpserver/security/advisories/GHSA-8wqm-rfc7-q27q/adp-test-6-28" } ] } diff --git a/cves/2024/29xxx/CVE-2024-29025.json b/cves/2024/29xxx/CVE-2024-29025.json index cf9bad07df3..30c1d7e1beb 100644 --- a/cves/2024/29xxx/CVE-2024-29025.json +++ b/cves/2024/29xxx/CVE-2024-29025.json @@ -8,7 +8,7 @@ "assignerShortName": "GitHub_M", "dateReserved": "2024-03-14T16:59:47.611Z", "datePublished": "2024-03-25T20:09:35.156Z", - "dateUpdated": "2024-06-21T15:25:22.519Z" + "dateUpdated": "2024-07-05T13:17:08.149Z" }, "containers": { "cna": { @@ -102,7 +102,7 @@ "providerMetadata": { "orgId": "96f1cf3c-f80a-4e0f-a063-99a91e3f1325", "shortName": "secretariat-reference", - "dateUpdated": "2024-06-21T15:25:22.519Z" + "dateUpdated": "2024-07-05T13:17:08.149Z" }, "references": [ { @@ -128,6 +128,36 @@ "x_cve_prog_secretariat_snapshot" ], "url": "https://gist.github.com/vietj/f558b8ea81ec6505f1e9a6ca283c9ae3/DEMO_2024_06_19" + }, + { + "name": "https://github.com/netty/netty/security/advisories/GHSA-5jpm-x58v-624v", + "tags": [ + "x_refsource_CONFIRM", + "x_snapshot" + ], + "url": "https://github.com/netty/netty/security/advisories/GHSA-5jpm-x58v-624v/adp-test-6-28" + }, + { + "name": "https://github.com/netty/netty/commit/0d0c6ed782d13d423586ad0c71737b2c7d02058c", + "tags": [ + "x_refsource_MISC", + "x_snapshot" + ], + "url": "https://github.com/netty/netty/commit/0d0c6ed782d13d423586ad0c71737b2c7d02058c/adp-test-6-28" + }, + { + "name": "https://gist.github.com/vietj/f558b8ea81ec6505f1e9a6ca283c9ae3", + "tags": [ + "x_refsource_MISC", + "x_snapshot" + ], + "url": "https://gist.github.com/vietj/f558b8ea81ec6505f1e9a6ca283c9ae3/adp-test-6-28" + }, + { + "url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00015.html/adp-test-6-28", + "tags": [ + "x_snapshot" + ] } ] } diff --git a/cves/2024/29xxx/CVE-2024-29026.json b/cves/2024/29xxx/CVE-2024-29026.json index 7bdbbe1ca26..4bfc28598f6 100644 --- a/cves/2024/29xxx/CVE-2024-29026.json +++ b/cves/2024/29xxx/CVE-2024-29026.json @@ -8,7 +8,7 @@ "assignerShortName": "GitHub_M", "dateReserved": "2024-03-14T16:59:47.611Z", "datePublished": "2024-03-20T21:55:22.872Z", - "dateUpdated": "2024-06-21T15:25:22.927Z" + "dateUpdated": "2024-07-05T13:17:08.081Z" }, "containers": { "cna": { @@ -140,7 +140,7 @@ "providerMetadata": { "orgId": "96f1cf3c-f80a-4e0f-a063-99a91e3f1325", "shortName": "secretariat-reference", - "dateUpdated": "2024-06-21T15:25:22.927Z" + "dateUpdated": "2024-07-05T13:17:08.081Z" }, "references": [ { @@ -166,6 +166,30 @@ "x_cve_prog_secretariat_snapshot" ], "url": "https://github.com/owncast/owncast/blob/v0.1.2/router/middleware/auth.go#L32/DEMO_2024_06_19" + }, + { + "name": "https://securitylab.github.com/advisories/GHSL-2023-261_Owncast/", + "tags": [ + "x_refsource_CONFIRM", + "x_snapshot" + ], + "url": "https://securitylab.github.com/advisories/GHSL-2023-261_Owncast//adp-test-6-28" + }, + { + "name": "https://github.com/owncast/owncast/commit/9215d9ba0f29d62201d3feea9e77dcd274581624", + "tags": [ + "x_refsource_MISC", + "x_snapshot" + ], + "url": "https://github.com/owncast/owncast/commit/9215d9ba0f29d62201d3feea9e77dcd274581624/adp-test-6-28" + }, + { + "name": "https://github.com/owncast/owncast/blob/v0.1.2/router/middleware/auth.go#L32", + "tags": [ + "x_refsource_MISC", + "x_snapshot" + ], + "url": "https://github.com/owncast/owncast/blob/v0.1.2/router/middleware/auth.go#L32/adp-test-6-28" } ] } diff --git a/cves/2024/29xxx/CVE-2024-29027.json b/cves/2024/29xxx/CVE-2024-29027.json index 95b90fe7201..b4448fa4b68 100644 --- a/cves/2024/29xxx/CVE-2024-29027.json +++ b/cves/2024/29xxx/CVE-2024-29027.json @@ -8,7 +8,7 @@ "assignerShortName": "GitHub_M", "dateReserved": "2024-03-14T16:59:47.611Z", "datePublished": "2024-03-19T18:57:24.782Z", - "dateUpdated": "2024-06-21T15:25:23.379Z" + "dateUpdated": "2024-07-05T13:17:08.188Z" }, "containers": { "cna": { @@ -117,7 +117,7 @@ "providerMetadata": { "orgId": "96f1cf3c-f80a-4e0f-a063-99a91e3f1325", "shortName": "secretariat-reference", - "dateUpdated": "2024-06-21T15:25:23.379Z" + "dateUpdated": "2024-07-05T13:17:08.188Z" }, "references": [ { @@ -159,6 +159,46 @@ "x_cve_prog_secretariat_snapshot" ], "url": "https://github.com/parse-community/parse-server/releases/tag/7.0.0-alpha.29/DEMO_2024_06_19" + }, + { + "name": "https://github.com/parse-community/parse-server/security/advisories/GHSA-6hh7-46r2-vf29", + "tags": [ + "x_refsource_CONFIRM", + "x_snapshot" + ], + "url": "https://github.com/parse-community/parse-server/security/advisories/GHSA-6hh7-46r2-vf29/adp-test-6-28" + }, + { + "name": "https://github.com/parse-community/parse-server/commit/5ae6d6a36d75c4511029f0ba5673ae4b2999179b", + "tags": [ + "x_refsource_MISC", + "x_snapshot" + ], + "url": "https://github.com/parse-community/parse-server/commit/5ae6d6a36d75c4511029f0ba5673ae4b2999179b/adp-test-6-28" + }, + { + "name": "https://github.com/parse-community/parse-server/commit/9f6e3429d3b326cf4e2994733c618d08032fac6e", + "tags": [ + "x_refsource_MISC", + "x_snapshot" + ], + "url": "https://github.com/parse-community/parse-server/commit/9f6e3429d3b326cf4e2994733c618d08032fac6e/adp-test-6-28" + }, + { + "name": "https://github.com/parse-community/parse-server/releases/tag/6.5.5", + "tags": [ + "x_refsource_MISC", + "x_snapshot" + ], + "url": "https://github.com/parse-community/parse-server/releases/tag/6.5.5/adp-test-6-28" + }, + { + "name": "https://github.com/parse-community/parse-server/releases/tag/7.0.0-alpha.29", + "tags": [ + "x_refsource_MISC", + "x_snapshot" + ], + "url": "https://github.com/parse-community/parse-server/releases/tag/7.0.0-alpha.29/adp-test-6-28" } ] } diff --git a/cves/2024/29xxx/CVE-2024-29028.json b/cves/2024/29xxx/CVE-2024-29028.json index c085504e7a3..1356ffe2e5f 100644 --- a/cves/2024/29xxx/CVE-2024-29028.json +++ b/cves/2024/29xxx/CVE-2024-29028.json @@ -8,7 +8,7 @@ "assignerShortName": "GitHub_M", "dateReserved": "2024-03-14T16:59:47.612Z", "datePublished": "2024-04-19T15:14:02.607Z", - "dateUpdated": "2024-06-21T15:25:23.784Z" + "dateUpdated": "2024-07-05T13:17:08.210Z" }, "containers": { "cna": { @@ -92,7 +92,7 @@ "providerMetadata": { "orgId": "96f1cf3c-f80a-4e0f-a063-99a91e3f1325", "shortName": "secretariat-reference", - "dateUpdated": "2024-06-21T15:25:23.784Z" + "dateUpdated": "2024-07-05T13:17:08.210Z" }, "references": [ { @@ -110,6 +110,22 @@ "x_cve_prog_secretariat_snapshot" ], "url": "https://securitylab.github.com/advisories/GHSL-2023-154_GHSL-2023-156_memos/DEMO_2024_06_19" + }, + { + "name": "https://github.com/usememos/memos/commit/6ffc09d86a1302c384ef085aa70c7bddb3ce7ba9", + "tags": [ + "x_refsource_CONFIRM", + "x_snapshot" + ], + "url": "https://github.com/usememos/memos/commit/6ffc09d86a1302c384ef085aa70c7bddb3ce7ba9/adp-test-6-28" + }, + { + "name": "https://securitylab.github.com/advisories/GHSL-2023-154_GHSL-2023-156_memos", + "tags": [ + "x_refsource_MISC", + "x_snapshot" + ], + "url": "https://securitylab.github.com/advisories/GHSL-2023-154_GHSL-2023-156_memos/adp-test-6-28" } ] } diff --git a/cves/2024/29xxx/CVE-2024-29029.json b/cves/2024/29xxx/CVE-2024-29029.json index 9d55b4bccd6..3eaeead7adb 100644 --- a/cves/2024/29xxx/CVE-2024-29029.json +++ b/cves/2024/29xxx/CVE-2024-29029.json @@ -8,7 +8,7 @@ "assignerShortName": "GitHub_M", "dateReserved": "2024-03-14T16:59:47.612Z", "datePublished": "2024-04-19T15:14:09.993Z", - "dateUpdated": "2024-06-21T15:25:24.219Z" + "dateUpdated": "2024-07-05T13:17:08.164Z" }, "containers": { "cna": { @@ -157,7 +157,7 @@ "providerMetadata": { "orgId": "96f1cf3c-f80a-4e0f-a063-99a91e3f1325", "shortName": "secretariat-reference", - "dateUpdated": "2024-06-21T15:25:24.219Z" + "dateUpdated": "2024-07-05T13:17:08.164Z" }, "references": [ { @@ -183,6 +183,30 @@ "x_cve_prog_secretariat_snapshot" ], "url": "https://github.com/usememos/memos/blob/06dbd8731161245444f4b50f4f9ed267f7c3cf63/api/v1/http_getter.go#L29/DEMO_2024_06_19" + }, + { + "name": "https://securitylab.github.com/advisories/GHSL-2023-154_GHSL-2023-156_memos/", + "tags": [ + "x_refsource_CONFIRM", + "x_snapshot" + ], + "url": "https://securitylab.github.com/advisories/GHSL-2023-154_GHSL-2023-156_memos//adp-test-6-28" + }, + { + "name": "https://github.com/usememos/memos/commit/bbd206e8930281eb040cc8c549641455892b9eb5", + "tags": [ + "x_refsource_MISC", + "x_snapshot" + ], + "url": "https://github.com/usememos/memos/commit/bbd206e8930281eb040cc8c549641455892b9eb5/adp-test-6-28" + }, + { + "name": "https://github.com/usememos/memos/blob/06dbd8731161245444f4b50f4f9ed267f7c3cf63/api/v1/http_getter.go#L29", + "tags": [ + "x_refsource_MISC", + "x_snapshot" + ], + "url": "https://github.com/usememos/memos/blob/06dbd8731161245444f4b50f4f9ed267f7c3cf63/api/v1/http_getter.go#L29/adp-test-6-28" } ] } diff --git a/cves/2024/29xxx/CVE-2024-29030.json b/cves/2024/29xxx/CVE-2024-29030.json index 5db6563b024..28950f79dab 100644 --- a/cves/2024/29xxx/CVE-2024-29030.json +++ b/cves/2024/29xxx/CVE-2024-29030.json @@ -8,7 +8,7 @@ "assignerShortName": "GitHub_M", "dateReserved": "2024-03-14T16:59:47.612Z", "datePublished": "2024-04-19T15:13:59.762Z", - "dateUpdated": "2024-06-21T15:25:24.611Z" + "dateUpdated": "2024-07-05T13:17:08.179Z" }, "containers": { "cna": { @@ -147,7 +147,7 @@ "providerMetadata": { "orgId": "96f1cf3c-f80a-4e0f-a063-99a91e3f1325", "shortName": "secretariat-reference", - "dateUpdated": "2024-06-21T15:25:24.611Z" + "dateUpdated": "2024-07-05T13:17:08.179Z" }, "references": [ { @@ -173,6 +173,30 @@ "x_cve_prog_secretariat_snapshot" ], "url": "https://github.com/usememos/memos/blob/06dbd8731161245444f4b50f4f9ed267f7c3cf63/api/v1/resource.go#L83/DEMO_2024_06_19" + }, + { + "name": "https://securitylab.github.com/advisories/GHSL-2023-154_GHSL-2023-156_memos/", + "tags": [ + "x_refsource_CONFIRM", + "x_snapshot" + ], + "url": "https://securitylab.github.com/advisories/GHSL-2023-154_GHSL-2023-156_memos//adp-test-6-28" + }, + { + "name": "https://github.com/usememos/memos/commit/bbd206e8930281eb040cc8c549641455892b9eb5", + "tags": [ + "x_refsource_MISC", + "x_snapshot" + ], + "url": "https://github.com/usememos/memos/commit/bbd206e8930281eb040cc8c549641455892b9eb5/adp-test-6-28" + }, + { + "name": "https://github.com/usememos/memos/blob/06dbd8731161245444f4b50f4f9ed267f7c3cf63/api/v1/resource.go#L83", + "tags": [ + "x_refsource_MISC", + "x_snapshot" + ], + "url": "https://github.com/usememos/memos/blob/06dbd8731161245444f4b50f4f9ed267f7c3cf63/api/v1/resource.go#L83/adp-test-6-28" } ] } diff --git a/cves/2024/29xxx/CVE-2024-29031.json b/cves/2024/29xxx/CVE-2024-29031.json index e91b35ae315..fb8ef33445d 100644 --- a/cves/2024/29xxx/CVE-2024-29031.json +++ b/cves/2024/29xxx/CVE-2024-29031.json @@ -8,7 +8,7 @@ "assignerShortName": "GitHub_M", "dateReserved": "2024-03-14T16:59:47.612Z", "datePublished": "2024-03-21T22:16:03.997Z", - "dateUpdated": "2024-06-21T15:25:25.006Z" + "dateUpdated": "2024-07-05T13:17:08.181Z" }, "containers": { "cna": { @@ -99,7 +99,7 @@ "providerMetadata": { "orgId": "96f1cf3c-f80a-4e0f-a063-99a91e3f1325", "shortName": "secretariat-reference", - "dateUpdated": "2024-06-21T15:25:25.006Z" + "dateUpdated": "2024-07-05T13:17:08.181Z" }, "references": [ { @@ -125,6 +125,30 @@ "x_cve_prog_secretariat_snapshot" ], "url": "https://github.com/meshery/meshery/commit/8e995ce21af02d32ef61689c1e1748a745917f13/DEMO_2024_06_19" + }, + { + "name": "https://securitylab.github.com/advisories/GHSL-2023-249_Meshery/", + "tags": [ + "x_refsource_CONFIRM", + "x_snapshot" + ], + "url": "https://securitylab.github.com/advisories/GHSL-2023-249_Meshery//adp-test-6-28" + }, + { + "name": "https://github.com/meshery/meshery/pull/10207", + "tags": [ + "x_refsource_MISC", + "x_snapshot" + ], + "url": "https://github.com/meshery/meshery/pull/10207/adp-test-6-28" + }, + { + "name": "https://github.com/meshery/meshery/commit/8e995ce21af02d32ef61689c1e1748a745917f13", + "tags": [ + "x_refsource_MISC", + "x_snapshot" + ], + "url": "https://github.com/meshery/meshery/commit/8e995ce21af02d32ef61689c1e1748a745917f13/adp-test-6-28" } ] } diff --git a/cves/2024/29xxx/CVE-2024-29032.json b/cves/2024/29xxx/CVE-2024-29032.json index e9c47aa8168..05f6d92d32d 100644 --- a/cves/2024/29xxx/CVE-2024-29032.json +++ b/cves/2024/29xxx/CVE-2024-29032.json @@ -8,7 +8,7 @@ "assignerShortName": "GitHub_M", "dateReserved": "2024-03-14T16:59:47.613Z", "datePublished": "2024-03-20T20:30:38.954Z", - "dateUpdated": "2024-06-21T15:25:25.507Z" + "dateUpdated": "2024-07-05T13:17:08.161Z" }, "containers": { "cna": { @@ -99,7 +99,7 @@ "providerMetadata": { "orgId": "96f1cf3c-f80a-4e0f-a063-99a91e3f1325", "shortName": "secretariat-reference", - "dateUpdated": "2024-06-21T15:25:25.507Z" + "dateUpdated": "2024-07-05T13:17:08.161Z" }, "references": [ { @@ -125,6 +125,30 @@ "x_cve_prog_secretariat_snapshot" ], "url": "https://github.com/Qiskit/qiskit-ibm-runtime/blob/16e90f475e78a9d2ae77daa139ef750cfa84ca82/qiskit_ibm_runtime/utils/json.py#L156-L159/DEMO_2024_06_19" + }, + { + "name": "https://github.com/Qiskit/qiskit-ibm-runtime/security/advisories/GHSA-x4x5-jv3x-9c7m", + "tags": [ + "x_refsource_CONFIRM", + "x_snapshot" + ], + "url": "https://github.com/Qiskit/qiskit-ibm-runtime/security/advisories/GHSA-x4x5-jv3x-9c7m/adp-test-6-28" + }, + { + "name": "https://github.com/Qiskit/qiskit-ibm-runtime/commit/b78fca114133051805d00043a404b25a33835f4d", + "tags": [ + "x_refsource_MISC", + "x_snapshot" + ], + "url": "https://github.com/Qiskit/qiskit-ibm-runtime/commit/b78fca114133051805d00043a404b25a33835f4d/adp-test-6-28" + }, + { + "name": "https://github.com/Qiskit/qiskit-ibm-runtime/blob/16e90f475e78a9d2ae77daa139ef750cfa84ca82/qiskit_ibm_runtime/utils/json.py#L156-L159", + "tags": [ + "x_refsource_MISC", + "x_snapshot" + ], + "url": "https://github.com/Qiskit/qiskit-ibm-runtime/blob/16e90f475e78a9d2ae77daa139ef750cfa84ca82/qiskit_ibm_runtime/utils/json.py#L156-L159/adp-test-6-28" } ] } diff --git a/cves/2024/29xxx/CVE-2024-29033.json b/cves/2024/29xxx/CVE-2024-29033.json index 307b82e685f..879b1a10e1c 100644 --- a/cves/2024/29xxx/CVE-2024-29033.json +++ b/cves/2024/29xxx/CVE-2024-29033.json @@ -8,7 +8,7 @@ "assignerShortName": "GitHub_M", "dateReserved": "2024-03-14T16:59:47.613Z", "datePublished": "2024-03-20T20:36:13.595Z", - "dateUpdated": "2024-06-21T15:25:25.907Z" + "dateUpdated": "2024-07-05T13:17:08.178Z" }, "containers": { "cna": { @@ -130,7 +130,7 @@ "providerMetadata": { "orgId": "96f1cf3c-f80a-4e0f-a063-99a91e3f1325", "shortName": "secretariat-reference", - "dateUpdated": "2024-06-21T15:25:25.907Z" + "dateUpdated": "2024-07-05T13:17:08.178Z" }, "references": [ { @@ -156,6 +156,30 @@ "x_cve_prog_secretariat_snapshot" ], "url": "https://trufflesecurity.com/blog/google-oauth-is-broken-sort-of/DEMO_2024_06_19" + }, + { + "name": "https://github.com/jupyterhub/oauthenticator/security/advisories/GHSA-55m3-44xf-hg4h", + "tags": [ + "x_refsource_CONFIRM", + "x_snapshot" + ], + "url": "https://github.com/jupyterhub/oauthenticator/security/advisories/GHSA-55m3-44xf-hg4h/adp-test-6-28" + }, + { + "name": "https://github.com/jupyterhub/oauthenticator/commit/5246b09675501b09fb6ed64022099b7644812f60", + "tags": [ + "x_refsource_MISC", + "x_snapshot" + ], + "url": "https://github.com/jupyterhub/oauthenticator/commit/5246b09675501b09fb6ed64022099b7644812f60/adp-test-6-28" + }, + { + "name": "https://trufflesecurity.com/blog/google-oauth-is-broken-sort-of", + "tags": [ + "x_refsource_MISC", + "x_snapshot" + ], + "url": "https://trufflesecurity.com/blog/google-oauth-is-broken-sort-of/adp-test-6-28" } ] } diff --git a/cves/2024/29xxx/CVE-2024-29034.json b/cves/2024/29xxx/CVE-2024-29034.json index 4f267e4c8b9..3f71ac479eb 100644 --- a/cves/2024/29xxx/CVE-2024-29034.json +++ b/cves/2024/29xxx/CVE-2024-29034.json @@ -8,7 +8,7 @@ "assignerShortName": "GitHub_M", "dateReserved": "2024-03-14T16:59:47.613Z", "datePublished": "2024-03-24T19:27:35.996Z", - "dateUpdated": "2024-06-21T15:25:26.337Z" + "dateUpdated": "2024-07-05T13:17:08.152Z" }, "containers": { "cna": { @@ -106,7 +106,7 @@ "providerMetadata": { "orgId": "96f1cf3c-f80a-4e0f-a063-99a91e3f1325", "shortName": "secretariat-reference", - "dateUpdated": "2024-06-21T15:25:26.337Z" + "dateUpdated": "2024-07-05T13:17:08.152Z" }, "references": [ { @@ -124,6 +124,22 @@ "x_cve_prog_secretariat_snapshot" ], "url": "https://github.com/carrierwaveuploader/carrierwave/commit/25b1c800d45ef8e78dc445ebe3bd8a6e3f0a3477/DEMO_2024_06_19" + }, + { + "name": "https://github.com/carrierwaveuploader/carrierwave/security/advisories/GHSA-vfmv-jfc5-pjjw", + "tags": [ + "x_refsource_CONFIRM", + "x_snapshot" + ], + "url": "https://github.com/carrierwaveuploader/carrierwave/security/advisories/GHSA-vfmv-jfc5-pjjw/adp-test-6-28" + }, + { + "name": "https://github.com/carrierwaveuploader/carrierwave/commit/25b1c800d45ef8e78dc445ebe3bd8a6e3f0a3477", + "tags": [ + "x_refsource_MISC", + "x_snapshot" + ], + "url": "https://github.com/carrierwaveuploader/carrierwave/commit/25b1c800d45ef8e78dc445ebe3bd8a6e3f0a3477/adp-test-6-28" } ] } diff --git a/cves/2024/29xxx/CVE-2024-29035.json b/cves/2024/29xxx/CVE-2024-29035.json index c722c964e9b..b8b0b3eaf19 100644 --- a/cves/2024/29xxx/CVE-2024-29035.json +++ b/cves/2024/29xxx/CVE-2024-29035.json @@ -8,7 +8,7 @@ "assignerShortName": "GitHub_M", "dateReserved": "2024-03-14T16:59:47.613Z", "datePublished": "2024-04-17T14:20:05.701Z", - "dateUpdated": "2024-06-21T15:25:26.743Z" + "dateUpdated": "2024-07-05T13:17:08.137Z" }, "containers": { "cna": { @@ -142,7 +142,7 @@ "providerMetadata": { "orgId": "96f1cf3c-f80a-4e0f-a063-99a91e3f1325", "shortName": "secretariat-reference", - "dateUpdated": "2024-06-21T15:25:26.743Z" + "dateUpdated": "2024-07-05T13:17:08.137Z" }, "references": [ { @@ -160,6 +160,22 @@ "x_cve_prog_secretariat_snapshot" ], "url": "https://github.com/umbraco/Umbraco-CMS/commit/6b8067815c02ae43161966a8075a3585e1bc4de0/DEMO_2024_06_19" + }, + { + "name": "https://github.com/umbraco/Umbraco-CMS/security/advisories/GHSA-74p6-39f2-23v3", + "tags": [ + "x_refsource_CONFIRM", + "x_snapshot" + ], + "url": "https://github.com/umbraco/Umbraco-CMS/security/advisories/GHSA-74p6-39f2-23v3/adp-test-6-28" + }, + { + "name": "https://github.com/umbraco/Umbraco-CMS/commit/6b8067815c02ae43161966a8075a3585e1bc4de0", + "tags": [ + "x_refsource_MISC", + "x_snapshot" + ], + "url": "https://github.com/umbraco/Umbraco-CMS/commit/6b8067815c02ae43161966a8075a3585e1bc4de0/adp-test-6-28" } ] } diff --git a/cves/2024/29xxx/CVE-2024-29036.json b/cves/2024/29xxx/CVE-2024-29036.json index 9a30a95a900..d00a4396354 100644 --- a/cves/2024/29xxx/CVE-2024-29036.json +++ b/cves/2024/29xxx/CVE-2024-29036.json @@ -8,7 +8,7 @@ "assignerShortName": "GitHub_M", "dateReserved": "2024-03-14T16:59:47.613Z", "datePublished": "2024-03-20T20:39:01.341Z", - "dateUpdated": "2024-06-21T15:25:27.179Z" + "dateUpdated": "2024-07-05T13:17:08.168Z" }, "containers": { "cna": { @@ -137,7 +137,7 @@ "providerMetadata": { "orgId": "96f1cf3c-f80a-4e0f-a063-99a91e3f1325", "shortName": "secretariat-reference", - "dateUpdated": "2024-06-21T15:25:27.179Z" + "dateUpdated": "2024-07-05T13:17:08.168Z" }, "references": [ { @@ -171,6 +171,38 @@ "x_cve_prog_secretariat_snapshot" ], "url": "https://github.com/saleor/storefront/commit/579241e75a5eb332ccf26e0bcdd54befa33f4783/DEMO_2024_06_19" + }, + { + "name": "https://github.com/saleor/storefront/security/advisories/GHSA-52cq-c7x7-cqw4", + "tags": [ + "x_refsource_CONFIRM", + "x_snapshot" + ], + "url": "https://github.com/saleor/storefront/security/advisories/GHSA-52cq-c7x7-cqw4/adp-test-6-28" + }, + { + "name": "https://github.com/saleor/saleor-docs/pull/1120", + "tags": [ + "x_refsource_MISC", + "x_snapshot" + ], + "url": "https://github.com/saleor/saleor-docs/pull/1120/adp-test-6-28" + }, + { + "name": "https://github.com/saleor/auth-sdk/commit/56db13407aa35d00b85ec2df042692edd4aea9da", + "tags": [ + "x_refsource_MISC", + "x_snapshot" + ], + "url": "https://github.com/saleor/auth-sdk/commit/56db13407aa35d00b85ec2df042692edd4aea9da/adp-test-6-28" + }, + { + "name": "https://github.com/saleor/storefront/commit/579241e75a5eb332ccf26e0bcdd54befa33f4783", + "tags": [ + "x_refsource_MISC", + "x_snapshot" + ], + "url": "https://github.com/saleor/storefront/commit/579241e75a5eb332ccf26e0bcdd54befa33f4783/adp-test-6-28" } ] } diff --git a/cves/2024/29xxx/CVE-2024-29037.json b/cves/2024/29xxx/CVE-2024-29037.json index b11ba45af95..6b13da59fe4 100644 --- a/cves/2024/29xxx/CVE-2024-29037.json +++ b/cves/2024/29xxx/CVE-2024-29037.json @@ -8,7 +8,7 @@ "assignerShortName": "GitHub_M", "dateReserved": "2024-03-14T16:59:47.613Z", "datePublished": "2024-03-20T20:42:19.398Z", - "dateUpdated": "2024-06-21T15:25:27.596Z" + "dateUpdated": "2024-07-05T13:17:08.163Z" }, "containers": { "cna": { @@ -92,7 +92,7 @@ "providerMetadata": { "orgId": "96f1cf3c-f80a-4e0f-a063-99a91e3f1325", "shortName": "secretariat-reference", - "dateUpdated": "2024-06-21T15:25:27.596Z" + "dateUpdated": "2024-07-05T13:17:08.163Z" }, "references": [ { @@ -110,6 +110,22 @@ "x_cve_prog_secretariat_snapshot" ], "url": "https://github.com/acryldata/datahub-helm/commit/ea8a17860f053c63387b8309e1f77c0e1462a1b3/DEMO_2024_06_19" + }, + { + "name": "https://github.com/acryldata/datahub-helm/security/advisories/GHSA-82p6-9h7m-9h8j", + "tags": [ + "x_refsource_CONFIRM", + "x_snapshot" + ], + "url": "https://github.com/acryldata/datahub-helm/security/advisories/GHSA-82p6-9h7m-9h8j/adp-test-6-28" + }, + { + "name": "https://github.com/acryldata/datahub-helm/commit/ea8a17860f053c63387b8309e1f77c0e1462a1b3", + "tags": [ + "x_refsource_MISC", + "x_snapshot" + ], + "url": "https://github.com/acryldata/datahub-helm/commit/ea8a17860f053c63387b8309e1f77c0e1462a1b3/adp-test-6-28" } ] } diff --git a/cves/delta.json b/cves/delta.json index 2b09befe9ea..b8ab4e9ebae 100644 --- a/cves/delta.json +++ b/cves/delta.json @@ -1,1207 +1,607 @@ { - "fetchTime": "2024-07-05T13:12:59.872Z", - "numberOfChanges": 200, + "fetchTime": "2024-07-05T13:17:58.450Z", + "numberOfChanges": 100, "new": [], "updated": [ { - "cveId": "CVE-2024-28335", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-28335", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/28xxx/CVE-2024-28335.json", - "dateUpdated": "2024-07-05T13:12:05.899Z" + "cveId": "CVE-2024-28902", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-28902", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/28xxx/CVE-2024-28902.json", + "dateUpdated": "2024-07-05T13:17:06.134Z" }, { - "cveId": "CVE-2024-28338", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-28338", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/28xxx/CVE-2024-28338.json", - "dateUpdated": "2024-07-05T13:12:06.041Z" + "cveId": "CVE-2024-28903", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-28903", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/28xxx/CVE-2024-28903.json", + "dateUpdated": "2024-07-05T13:17:06.163Z" }, { - "cveId": "CVE-2024-28339", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-28339", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/28xxx/CVE-2024-28339.json", - "dateUpdated": "2024-07-05T13:12:05.715Z" + "cveId": "CVE-2024-28904", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-28904", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/28xxx/CVE-2024-28904.json", + "dateUpdated": "2024-07-05T13:17:06.152Z" }, { - "cveId": "CVE-2024-28340", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-28340", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/28xxx/CVE-2024-28340.json", - "dateUpdated": "2024-07-05T13:12:05.716Z" + "cveId": "CVE-2024-28905", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-28905", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/28xxx/CVE-2024-28905.json", + "dateUpdated": "2024-07-05T13:17:07.698Z" }, { - "cveId": "CVE-2024-28344", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-28344", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/28xxx/CVE-2024-28344.json", - "dateUpdated": "2024-07-05T13:12:06.010Z" + "cveId": "CVE-2024-28906", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-28906", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/28xxx/CVE-2024-28906.json", + "dateUpdated": "2024-07-05T13:17:07.737Z" }, { - "cveId": "CVE-2024-28345", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-28345", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/28xxx/CVE-2024-28345.json", - "dateUpdated": "2024-07-05T13:12:06.021Z" + "cveId": "CVE-2024-28907", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-28907", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/28xxx/CVE-2024-28907.json", + "dateUpdated": "2024-07-05T13:17:07.916Z" }, { - "cveId": "CVE-2024-28353", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-28353", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/28xxx/CVE-2024-28353.json", - "dateUpdated": "2024-07-05T13:12:05.966Z" + "cveId": "CVE-2024-28908", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-28908", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/28xxx/CVE-2024-28908.json", + "dateUpdated": "2024-07-05T13:17:07.738Z" }, { - "cveId": "CVE-2024-28354", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-28354", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/28xxx/CVE-2024-28354.json", - "dateUpdated": "2024-07-05T13:12:05.881Z" + "cveId": "CVE-2024-28909", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-28909", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/28xxx/CVE-2024-28909.json", + "dateUpdated": "2024-07-05T13:17:07.727Z" }, { - "cveId": "CVE-2024-28383", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-28383", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/28xxx/CVE-2024-28383.json", - "dateUpdated": "2024-07-05T13:12:05.964Z" + "cveId": "CVE-2024-28910", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-28910", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/28xxx/CVE-2024-28910.json", + "dateUpdated": "2024-07-05T13:17:07.563Z" }, { - "cveId": "CVE-2024-28386", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-28386", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/28xxx/CVE-2024-28386.json", - "dateUpdated": "2024-07-05T13:12:05.884Z" + "cveId": "CVE-2024-28911", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-28911", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/28xxx/CVE-2024-28911.json", + "dateUpdated": "2024-07-05T13:17:07.761Z" }, { - "cveId": "CVE-2024-28387", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-28387", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/28xxx/CVE-2024-28387.json", - "dateUpdated": "2024-07-05T13:12:05.929Z" + "cveId": "CVE-2024-28912", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-28912", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/28xxx/CVE-2024-28912.json", + "dateUpdated": "2024-07-05T13:17:07.917Z" }, { - "cveId": "CVE-2024-28388", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-28388", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/28xxx/CVE-2024-28388.json", - "dateUpdated": "2024-07-05T13:12:05.693Z" + "cveId": "CVE-2024-28913", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-28913", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/28xxx/CVE-2024-28913.json", + "dateUpdated": "2024-07-05T13:17:07.902Z" }, { - "cveId": "CVE-2024-28389", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-28389", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/28xxx/CVE-2024-28389.json", - "dateUpdated": "2024-07-05T13:12:05.812Z" + "cveId": "CVE-2024-28914", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-28914", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/28xxx/CVE-2024-28914.json", + "dateUpdated": "2024-07-05T13:17:07.943Z" }, { - "cveId": "CVE-2024-28390", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-28390", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/28xxx/CVE-2024-28390.json", - "dateUpdated": "2024-07-05T13:12:06.020Z" + "cveId": "CVE-2024-28915", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-28915", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/28xxx/CVE-2024-28915.json", + "dateUpdated": "2024-07-05T13:17:06.220Z" }, { - "cveId": "CVE-2024-28391", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-28391", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/28xxx/CVE-2024-28391.json", - "dateUpdated": "2024-07-05T13:12:06.485Z" + "cveId": "CVE-2024-28916", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-28916", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/28xxx/CVE-2024-28916.json", + "dateUpdated": "2024-07-05T13:17:07.702Z" }, { - "cveId": "CVE-2024-28392", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-28392", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/28xxx/CVE-2024-28392.json", - "dateUpdated": "2024-07-05T13:12:06.508Z" + "cveId": "CVE-2024-28917", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-28917", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/28xxx/CVE-2024-28917.json", + "dateUpdated": "2024-07-05T13:17:06.158Z" }, { - "cveId": "CVE-2024-28393", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-28393", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/28xxx/CVE-2024-28393.json", - "dateUpdated": "2024-07-05T13:12:06.375Z" + "cveId": "CVE-2024-28919", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-28919", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/28xxx/CVE-2024-28919.json", + "dateUpdated": "2024-07-05T13:17:07.636Z" }, { - "cveId": "CVE-2024-28394", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-28394", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/28xxx/CVE-2024-28394.json", - "dateUpdated": "2024-07-05T13:12:06.576Z" + "cveId": "CVE-2024-28920", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-28920", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/28xxx/CVE-2024-28920.json", + "dateUpdated": "2024-07-05T13:17:07.352Z" }, { - "cveId": "CVE-2024-28395", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-28395", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/28xxx/CVE-2024-28395.json", - "dateUpdated": "2024-07-05T13:12:06.581Z" + "cveId": "CVE-2024-28921", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-28921", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/28xxx/CVE-2024-28921.json", + "dateUpdated": "2024-07-05T13:17:07.361Z" }, { - "cveId": "CVE-2024-28396", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-28396", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/28xxx/CVE-2024-28396.json", - "dateUpdated": "2024-07-05T13:12:06.486Z" + "cveId": "CVE-2024-28922", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-28922", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/28xxx/CVE-2024-28922.json", + "dateUpdated": "2024-07-05T13:17:07.488Z" }, { - "cveId": "CVE-2024-28397", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-28397", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/28xxx/CVE-2024-28397.json", - "dateUpdated": "2024-07-05T13:12:06.599Z" + "cveId": "CVE-2024-28923", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-28923", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/28xxx/CVE-2024-28923.json", + "dateUpdated": "2024-07-05T13:17:07.554Z" }, { - "cveId": "CVE-2024-28401", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-28401", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/28xxx/CVE-2024-28401.json", - "dateUpdated": "2024-07-05T13:12:06.671Z" + "cveId": "CVE-2024-28924", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-28924", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/28xxx/CVE-2024-28924.json", + "dateUpdated": "2024-07-05T13:17:07.878Z" }, { - "cveId": "CVE-2024-28402", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-28402", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/28xxx/CVE-2024-28402.json", - "dateUpdated": "2024-07-05T13:12:06.771Z" + "cveId": "CVE-2024-28925", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-28925", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/28xxx/CVE-2024-28925.json", + "dateUpdated": "2024-07-05T13:17:07.755Z" }, { - "cveId": "CVE-2024-28403", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-28403", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/28xxx/CVE-2024-28403.json", - "dateUpdated": "2024-07-05T13:12:06.559Z" + "cveId": "CVE-2024-28926", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-28926", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/28xxx/CVE-2024-28926.json", + "dateUpdated": "2024-07-05T13:17:07.970Z" }, { - "cveId": "CVE-2024-28404", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-28404", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/28xxx/CVE-2024-28404.json", - "dateUpdated": "2024-07-05T13:12:06.589Z" + "cveId": "CVE-2024-28927", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-28927", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/28xxx/CVE-2024-28927.json", + "dateUpdated": "2024-07-05T13:17:07.958Z" }, { - "cveId": "CVE-2024-28405", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-28405", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/28xxx/CVE-2024-28405.json", - "dateUpdated": "2024-07-05T13:12:06.558Z" + "cveId": "CVE-2024-28929", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-28929", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/28xxx/CVE-2024-28929.json", + "dateUpdated": "2024-07-05T13:17:07.817Z" }, { - "cveId": "CVE-2024-28417", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-28417", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/28xxx/CVE-2024-28417.json", - "dateUpdated": "2024-07-05T13:12:06.457Z" + "cveId": "CVE-2024-28930", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-28930", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/28xxx/CVE-2024-28930.json", + "dateUpdated": "2024-07-05T13:17:08.160Z" }, { - "cveId": "CVE-2024-28418", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-28418", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/28xxx/CVE-2024-28418.json", - "dateUpdated": "2024-07-05T13:12:06.503Z" + "cveId": "CVE-2024-28931", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-28931", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/28xxx/CVE-2024-28931.json", + "dateUpdated": "2024-07-05T13:17:08.145Z" }, { - "cveId": "CVE-2024-28421", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-28421", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/28xxx/CVE-2024-28421.json", - "dateUpdated": "2024-07-05T13:12:06.722Z" + "cveId": "CVE-2024-28932", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-28932", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/28xxx/CVE-2024-28932.json", + "dateUpdated": "2024-07-05T13:17:07.888Z" }, { - "cveId": "CVE-2024-28423", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-28423", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/28xxx/CVE-2024-28423.json", - "dateUpdated": "2024-07-05T13:12:06.577Z" + "cveId": "CVE-2024-28933", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-28933", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/28xxx/CVE-2024-28933.json", + "dateUpdated": "2024-07-05T13:17:07.900Z" }, { - "cveId": "CVE-2024-28424", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-28424", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/28xxx/CVE-2024-28424.json", - "dateUpdated": "2024-07-05T13:12:06.773Z" + "cveId": "CVE-2024-28934", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-28934", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/28xxx/CVE-2024-28934.json", + "dateUpdated": "2024-07-05T13:17:07.924Z" }, { - "cveId": "CVE-2024-28425", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-28425", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/28xxx/CVE-2024-28425.json", - "dateUpdated": "2024-07-05T13:12:06.504Z" + "cveId": "CVE-2024-28935", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-28935", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/28xxx/CVE-2024-28935.json", + "dateUpdated": "2024-07-05T13:17:07.947Z" }, { - "cveId": "CVE-2024-28429", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-28429", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/28xxx/CVE-2024-28429.json", - "dateUpdated": "2024-07-05T13:12:06.689Z" + "cveId": "CVE-2024-28936", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-28936", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/28xxx/CVE-2024-28936.json", + "dateUpdated": "2024-07-05T13:17:08.013Z" }, { - "cveId": "CVE-2024-28430", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-28430", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/28xxx/CVE-2024-28430.json", - "dateUpdated": "2024-07-05T13:12:06.606Z" + "cveId": "CVE-2024-28937", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-28937", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/28xxx/CVE-2024-28937.json", + "dateUpdated": "2024-07-05T13:17:07.787Z" }, { - "cveId": "CVE-2024-28431", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-28431", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/28xxx/CVE-2024-28431.json", - "dateUpdated": "2024-07-05T13:12:06.564Z" + "cveId": "CVE-2024-28938", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-28938", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/28xxx/CVE-2024-28938.json", + "dateUpdated": "2024-07-05T13:17:07.837Z" }, { - "cveId": "CVE-2024-28432", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-28432", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/28xxx/CVE-2024-28432.json", - "dateUpdated": "2024-07-05T13:12:06.580Z" + "cveId": "CVE-2024-28939", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-28939", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/28xxx/CVE-2024-28939.json", + "dateUpdated": "2024-07-05T13:17:08.157Z" }, { - "cveId": "CVE-2024-28434", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-28434", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/28xxx/CVE-2024-28434.json", - "dateUpdated": "2024-07-05T13:12:06.584Z" + "cveId": "CVE-2024-28940", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-28940", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/28xxx/CVE-2024-28940.json", + "dateUpdated": "2024-07-05T13:17:07.889Z" }, { - "cveId": "CVE-2024-28435", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-28435", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/28xxx/CVE-2024-28435.json", - "dateUpdated": "2024-07-05T13:12:06.642Z" + "cveId": "CVE-2024-28941", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-28941", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/28xxx/CVE-2024-28941.json", + "dateUpdated": "2024-07-05T13:17:06.208Z" }, { - "cveId": "CVE-2024-28436", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-28436", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/28xxx/CVE-2024-28436.json", - "dateUpdated": "2024-07-05T13:12:06.766Z" + "cveId": "CVE-2024-28942", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-28942", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/28xxx/CVE-2024-28942.json", + "dateUpdated": "2024-07-05T13:17:07.763Z" }, { - "cveId": "CVE-2024-28441", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-28441", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/28xxx/CVE-2024-28441.json", - "dateUpdated": "2024-07-05T13:12:06.576Z" + "cveId": "CVE-2024-28943", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-28943", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/28xxx/CVE-2024-28943.json", + "dateUpdated": "2024-07-05T13:17:07.805Z" }, { - "cveId": "CVE-2024-28442", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-28442", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/28xxx/CVE-2024-28442.json", - "dateUpdated": "2024-07-05T13:12:06.530Z" + "cveId": "CVE-2024-28944", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-28944", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/28xxx/CVE-2024-28944.json", + "dateUpdated": "2024-07-05T13:17:07.898Z" }, { - "cveId": "CVE-2024-28446", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-28446", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/28xxx/CVE-2024-28446.json", - "dateUpdated": "2024-07-05T13:12:06.798Z" + "cveId": "CVE-2024-28945", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-28945", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/28xxx/CVE-2024-28945.json", + "dateUpdated": "2024-07-05T13:17:07.945Z" }, { - "cveId": "CVE-2024-28447", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-28447", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/28xxx/CVE-2024-28447.json", - "dateUpdated": "2024-07-05T13:12:06.583Z" + "cveId": "CVE-2024-28949", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-28949", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/28xxx/CVE-2024-28949.json", + "dateUpdated": "2024-07-05T13:17:07.839Z" }, { - "cveId": "CVE-2024-28456", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-28456", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/28xxx/CVE-2024-28456.json", - "dateUpdated": "2024-07-05T13:12:06.610Z" + "cveId": "CVE-2024-28951", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-28951", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/28xxx/CVE-2024-28951.json", + "dateUpdated": "2024-07-05T13:17:07.762Z" }, { - "cveId": "CVE-2024-28458", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-28458", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/28xxx/CVE-2024-28458.json", - "dateUpdated": "2024-07-05T13:12:06.579Z" + "cveId": "CVE-2024-28957", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-28957", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/28xxx/CVE-2024-28957.json", + "dateUpdated": "2024-07-05T13:17:07.717Z" }, { - "cveId": "CVE-2024-28515", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-28515", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/28xxx/CVE-2024-28515.json", - "dateUpdated": "2024-07-05T13:12:06.796Z" + "cveId": "CVE-2024-28960", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-28960", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/28xxx/CVE-2024-28960.json", + "dateUpdated": "2024-07-05T13:17:07.744Z" }, { - "cveId": "CVE-2024-28519", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-28519", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/28xxx/CVE-2024-28519.json", - "dateUpdated": "2024-07-05T13:12:06.785Z" + "cveId": "CVE-2024-28961", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-28961", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/28xxx/CVE-2024-28961.json", + "dateUpdated": "2024-07-05T13:17:08.024Z" }, { - "cveId": "CVE-2024-28520", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-28520", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/28xxx/CVE-2024-28520.json", - "dateUpdated": "2024-07-05T13:12:06.531Z" + "cveId": "CVE-2024-28963", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-28963", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/28xxx/CVE-2024-28963.json", + "dateUpdated": "2024-07-05T13:17:08.000Z" }, { - "cveId": "CVE-2024-28521", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-28521", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/28xxx/CVE-2024-28521.json", - "dateUpdated": "2024-07-05T13:12:06.798Z" + "cveId": "CVE-2024-28964", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-28964", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/28xxx/CVE-2024-28964.json", + "dateUpdated": "2024-07-05T13:17:07.859Z" }, { - "cveId": "CVE-2024-28535", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-28535", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/28xxx/CVE-2024-28535.json", - "dateUpdated": "2024-07-05T13:12:06.432Z" + "cveId": "CVE-2024-28965", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-28965", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/28xxx/CVE-2024-28965.json", + "dateUpdated": "2024-07-05T13:17:08.026Z" }, { - "cveId": "CVE-2024-28537", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-28537", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/28xxx/CVE-2024-28537.json", - "dateUpdated": "2024-07-05T13:12:06.776Z" + "cveId": "CVE-2024-28966", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-28966", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/28xxx/CVE-2024-28966.json", + "dateUpdated": "2024-07-05T13:17:07.974Z" }, { - "cveId": "CVE-2024-28545", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-28545", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/28xxx/CVE-2024-28545.json", - "dateUpdated": "2024-07-05T13:12:06.498Z" + "cveId": "CVE-2024-28967", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-28967", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/28xxx/CVE-2024-28967.json", + "dateUpdated": "2024-07-05T13:17:08.104Z" }, { - "cveId": "CVE-2024-28547", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-28547", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/28xxx/CVE-2024-28547.json", - "dateUpdated": "2024-07-05T13:12:06.456Z" + "cveId": "CVE-2024-28968", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-28968", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/28xxx/CVE-2024-28968.json", + "dateUpdated": "2024-07-05T13:17:08.135Z" }, { - "cveId": "CVE-2024-28550", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-28550", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/28xxx/CVE-2024-28550.json", - "dateUpdated": "2024-07-05T13:12:06.802Z" + "cveId": "CVE-2024-28969", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-28969", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/28xxx/CVE-2024-28969.json", + "dateUpdated": "2024-07-05T13:17:08.102Z" }, { - "cveId": "CVE-2024-28551", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-28551", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/28xxx/CVE-2024-28551.json", - "dateUpdated": "2024-07-05T13:12:06.817Z" + "cveId": "CVE-2024-28970", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-28970", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/28xxx/CVE-2024-28970.json", + "dateUpdated": "2024-07-05T13:17:08.011Z" }, { - "cveId": "CVE-2024-28553", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-28553", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/28xxx/CVE-2024-28553.json", - "dateUpdated": "2024-07-05T13:12:06.823Z" + "cveId": "CVE-2024-28971", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-28971", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/28xxx/CVE-2024-28971.json", + "dateUpdated": "2024-07-05T13:17:07.985Z" }, { - "cveId": "CVE-2024-28556", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-28556", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/28xxx/CVE-2024-28556.json", - "dateUpdated": "2024-07-05T13:12:06.487Z" + "cveId": "CVE-2024-28973", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-28973", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/28xxx/CVE-2024-28973.json", + "dateUpdated": "2024-07-05T13:17:08.130Z" }, { - "cveId": "CVE-2024-28557", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-28557", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/28xxx/CVE-2024-28557.json", - "dateUpdated": "2024-07-05T13:12:06.697Z" + "cveId": "CVE-2024-28974", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-28974", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/28xxx/CVE-2024-28974.json", + "dateUpdated": "2024-07-05T13:17:08.146Z" }, { - "cveId": "CVE-2024-28558", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-28558", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/28xxx/CVE-2024-28558.json", - "dateUpdated": "2024-07-05T13:12:06.804Z" + "cveId": "CVE-2024-28976", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-28976", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/28xxx/CVE-2024-28976.json", + "dateUpdated": "2024-07-05T13:17:08.058Z" }, { - "cveId": "CVE-2024-28559", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-28559", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/28xxx/CVE-2024-28559.json", - "dateUpdated": "2024-07-05T13:12:06.702Z" + "cveId": "CVE-2024-28977", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-28977", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/28xxx/CVE-2024-28977.json", + "dateUpdated": "2024-07-05T13:17:08.127Z" }, { - "cveId": "CVE-2024-28560", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-28560", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/28xxx/CVE-2024-28560.json", - "dateUpdated": "2024-07-05T13:12:06.722Z" + "cveId": "CVE-2024-28978", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-28978", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/28xxx/CVE-2024-28978.json", + "dateUpdated": "2024-07-05T13:17:07.983Z" }, { - "cveId": "CVE-2024-28562", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-28562", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/28xxx/CVE-2024-28562.json", - "dateUpdated": "2024-07-05T13:12:06.797Z" + "cveId": "CVE-2024-28979", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-28979", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/28xxx/CVE-2024-28979.json", + "dateUpdated": "2024-07-05T13:17:08.042Z" }, { - "cveId": "CVE-2024-28563", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-28563", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/28xxx/CVE-2024-28563.json", - "dateUpdated": "2024-07-05T13:12:06.812Z" + "cveId": "CVE-2024-28982", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-28982", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/28xxx/CVE-2024-28982.json", + "dateUpdated": "2024-07-05T13:17:07.887Z" }, { - "cveId": "CVE-2024-28564", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-28564", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/28xxx/CVE-2024-28564.json", - "dateUpdated": "2024-07-05T13:12:06.645Z" + "cveId": "CVE-2024-28983", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-28983", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/28xxx/CVE-2024-28983.json", + "dateUpdated": "2024-07-05T13:17:08.028Z" }, { - "cveId": "CVE-2024-28565", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-28565", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/28xxx/CVE-2024-28565.json", - "dateUpdated": "2024-07-05T13:12:06.728Z" + "cveId": "CVE-2024-28984", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-28984", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/28xxx/CVE-2024-28984.json", + "dateUpdated": "2024-07-05T13:17:08.002Z" }, { - "cveId": "CVE-2024-28566", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-28566", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/28xxx/CVE-2024-28566.json", - "dateUpdated": "2024-07-05T13:12:06.505Z" + "cveId": "CVE-2024-28995", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-28995", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/28xxx/CVE-2024-28995.json", + "dateUpdated": "2024-07-05T13:17:08.044Z" }, { - "cveId": "CVE-2024-28567", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-28567", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/28xxx/CVE-2024-28567.json", - "dateUpdated": "2024-07-05T13:12:06.721Z" + "cveId": "CVE-2024-28996", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-28996", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/28xxx/CVE-2024-28996.json", + "dateUpdated": "2024-07-05T13:17:07.700Z" }, { - "cveId": "CVE-2024-28568", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-28568", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/28xxx/CVE-2024-28568.json", - "dateUpdated": "2024-07-05T13:12:06.718Z" + "cveId": "CVE-2024-28999", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-28999", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/28xxx/CVE-2024-28999.json", + "dateUpdated": "2024-07-05T13:17:08.105Z" }, { - "cveId": "CVE-2024-28569", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-28569", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/28xxx/CVE-2024-28569.json", - "dateUpdated": "2024-07-05T13:12:06.670Z" + "cveId": "CVE-2024-29000", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-29000", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/29xxx/CVE-2024-29000.json", + "dateUpdated": "2024-07-05T13:17:07.796Z" }, { - "cveId": "CVE-2024-28570", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-28570", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/28xxx/CVE-2024-28570.json", - "dateUpdated": "2024-07-05T13:12:06.461Z" + "cveId": "CVE-2024-29001", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-29001", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/29xxx/CVE-2024-29001.json", + "dateUpdated": "2024-07-05T13:17:07.763Z" }, { - "cveId": "CVE-2024-28571", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-28571", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/28xxx/CVE-2024-28571.json", - "dateUpdated": "2024-07-05T13:12:06.376Z" + "cveId": "CVE-2024-29003", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-29003", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/29xxx/CVE-2024-29003.json", + "dateUpdated": "2024-07-05T13:17:07.780Z" }, { - "cveId": "CVE-2024-28572", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-28572", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/28xxx/CVE-2024-28572.json", - "dateUpdated": "2024-07-05T13:12:06.584Z" + "cveId": "CVE-2024-29004", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-29004", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/29xxx/CVE-2024-29004.json", + "dateUpdated": "2024-07-05T13:17:08.041Z" }, { - "cveId": "CVE-2024-28573", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-28573", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/28xxx/CVE-2024-28573.json", - "dateUpdated": "2024-07-05T13:12:06.752Z" + "cveId": "CVE-2024-29006", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-29006", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/29xxx/CVE-2024-29006.json", + "dateUpdated": "2024-07-05T13:17:08.060Z" }, { - "cveId": "CVE-2024-28574", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-28574", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/28xxx/CVE-2024-28574.json", - "dateUpdated": "2024-07-05T13:12:06.717Z" + "cveId": "CVE-2024-29007", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-29007", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/29xxx/CVE-2024-29007.json", + "dateUpdated": "2024-07-05T13:17:08.125Z" }, { - "cveId": "CVE-2024-28575", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-28575", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/28xxx/CVE-2024-28575.json", - "dateUpdated": "2024-07-05T13:12:06.562Z" + "cveId": "CVE-2024-29008", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-29008", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/29xxx/CVE-2024-29008.json", + "dateUpdated": "2024-07-05T13:17:08.148Z" }, { - "cveId": "CVE-2024-28576", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-28576", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/28xxx/CVE-2024-28576.json", - "dateUpdated": "2024-07-05T13:12:06.330Z" + "cveId": "CVE-2024-29009", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-29009", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/29xxx/CVE-2024-29009.json", + "dateUpdated": "2024-07-05T13:17:07.808Z" }, { - "cveId": "CVE-2024-28577", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-28577", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/28xxx/CVE-2024-28577.json", - "dateUpdated": "2024-07-05T13:12:06.867Z" + "cveId": "CVE-2024-29010", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-29010", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/29xxx/CVE-2024-29010.json", + "dateUpdated": "2024-07-05T13:17:08.144Z" }, { - "cveId": "CVE-2024-28578", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-28578", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/28xxx/CVE-2024-28578.json", - "dateUpdated": "2024-07-05T13:12:06.598Z" + "cveId": "CVE-2024-29011", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-29011", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/29xxx/CVE-2024-29011.json", + "dateUpdated": "2024-07-05T13:17:08.079Z" }, { - "cveId": "CVE-2024-28579", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-28579", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/28xxx/CVE-2024-28579.json", - "dateUpdated": "2024-07-05T13:12:06.739Z" + "cveId": "CVE-2024-29012", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-29012", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/29xxx/CVE-2024-29012.json", + "dateUpdated": "2024-07-05T13:17:08.001Z" }, { - "cveId": "CVE-2024-28580", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-28580", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/28xxx/CVE-2024-28580.json", - "dateUpdated": "2024-07-05T13:12:06.795Z" + "cveId": "CVE-2024-29013", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-29013", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/29xxx/CVE-2024-29013.json", + "dateUpdated": "2024-07-05T13:17:07.800Z" }, { - "cveId": "CVE-2024-28581", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-28581", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/28xxx/CVE-2024-28581.json", - "dateUpdated": "2024-07-05T13:12:06.850Z" + "cveId": "CVE-2024-29018", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-29018", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/29xxx/CVE-2024-29018.json", + "dateUpdated": "2024-07-05T13:17:07.861Z" }, { - "cveId": "CVE-2024-28582", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-28582", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/28xxx/CVE-2024-28582.json", - "dateUpdated": "2024-07-05T13:12:06.377Z" + "cveId": "CVE-2024-29019", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-29019", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/29xxx/CVE-2024-29019.json", + "dateUpdated": "2024-07-05T13:17:08.082Z" }, { - "cveId": "CVE-2024-28583", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-28583", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/28xxx/CVE-2024-28583.json", - "dateUpdated": "2024-07-05T13:12:06.866Z" + "cveId": "CVE-2024-29020", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-29020", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/29xxx/CVE-2024-29020.json", + "dateUpdated": "2024-07-05T13:17:08.142Z" }, { - "cveId": "CVE-2024-28584", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-28584", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/28xxx/CVE-2024-28584.json", - "dateUpdated": "2024-07-05T13:12:06.814Z" + "cveId": "CVE-2024-29021", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-29021", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/29xxx/CVE-2024-29021.json", + "dateUpdated": "2024-07-05T13:17:08.177Z" }, { - "cveId": "CVE-2024-28589", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-28589", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/28xxx/CVE-2024-28589.json", - "dateUpdated": "2024-07-05T13:12:06.531Z" + "cveId": "CVE-2024-29022", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-29022", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/29xxx/CVE-2024-29022.json", + "dateUpdated": "2024-07-05T13:17:08.134Z" }, { - "cveId": "CVE-2024-28593", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-28593", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/28xxx/CVE-2024-28593.json", - "dateUpdated": "2024-07-05T13:12:06.816Z" + "cveId": "CVE-2024-29023", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-29023", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/29xxx/CVE-2024-29023.json", + "dateUpdated": "2024-07-05T13:17:08.065Z" }, { - "cveId": "CVE-2024-28595", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-28595", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/28xxx/CVE-2024-28595.json", - "dateUpdated": "2024-07-05T13:12:06.809Z" + "cveId": "CVE-2024-29024", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-29024", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/29xxx/CVE-2024-29024.json", + "dateUpdated": "2024-07-05T13:17:08.128Z" }, { - "cveId": "CVE-2024-28613", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-28613", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/28xxx/CVE-2024-28613.json", - "dateUpdated": "2024-07-05T13:12:06.709Z" + "cveId": "CVE-2024-29025", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-29025", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/29xxx/CVE-2024-29025.json", + "dateUpdated": "2024-07-05T13:17:08.149Z" }, { - "cveId": "CVE-2024-28623", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-28623", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/28xxx/CVE-2024-28623.json", - "dateUpdated": "2024-07-05T13:12:06.646Z" + "cveId": "CVE-2024-29026", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-29026", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/29xxx/CVE-2024-29026.json", + "dateUpdated": "2024-07-05T13:17:08.081Z" }, { - "cveId": "CVE-2024-28627", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-28627", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/28xxx/CVE-2024-28627.json", - "dateUpdated": "2024-07-05T13:12:06.704Z" + "cveId": "CVE-2024-29027", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-29027", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/29xxx/CVE-2024-29027.json", + "dateUpdated": "2024-07-05T13:17:08.188Z" }, { - "cveId": "CVE-2024-28635", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-28635", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/28xxx/CVE-2024-28635.json", - "dateUpdated": "2024-07-05T13:12:06.645Z" + "cveId": "CVE-2024-29028", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-29028", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/29xxx/CVE-2024-29028.json", + "dateUpdated": "2024-07-05T13:17:08.210Z" }, { - "cveId": "CVE-2024-28639", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-28639", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/28xxx/CVE-2024-28639.json", - "dateUpdated": "2024-07-05T13:12:06.370Z" + "cveId": "CVE-2024-29029", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-29029", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/29xxx/CVE-2024-29029.json", + "dateUpdated": "2024-07-05T13:17:08.164Z" }, { - "cveId": "CVE-2024-28640", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-28640", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/28xxx/CVE-2024-28640.json", - "dateUpdated": "2024-07-05T13:12:06.388Z" + "cveId": "CVE-2024-29030", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-29030", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/29xxx/CVE-2024-29030.json", + "dateUpdated": "2024-07-05T13:17:08.179Z" }, { - "cveId": "CVE-2024-28662", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-28662", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/28xxx/CVE-2024-28662.json", - "dateUpdated": "2024-07-05T13:12:06.836Z" + "cveId": "CVE-2024-29031", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-29031", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/29xxx/CVE-2024-29031.json", + "dateUpdated": "2024-07-05T13:17:08.181Z" }, { - "cveId": "CVE-2024-28665", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-28665", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/28xxx/CVE-2024-28665.json", - "dateUpdated": "2024-07-05T13:12:06.833Z" + "cveId": "CVE-2024-29032", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-29032", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/29xxx/CVE-2024-29032.json", + "dateUpdated": "2024-07-05T13:17:08.161Z" }, { - "cveId": "CVE-2024-28666", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-28666", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/28xxx/CVE-2024-28666.json", - "dateUpdated": "2024-07-05T13:12:06.822Z" + "cveId": "CVE-2024-29033", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-29033", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/29xxx/CVE-2024-29033.json", + "dateUpdated": "2024-07-05T13:17:08.178Z" }, { - "cveId": "CVE-2024-28667", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-28667", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/28xxx/CVE-2024-28667.json", - "dateUpdated": "2024-07-05T13:12:06.859Z" + "cveId": "CVE-2024-29034", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-29034", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/29xxx/CVE-2024-29034.json", + "dateUpdated": "2024-07-05T13:17:08.152Z" }, { - "cveId": "CVE-2024-28668", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-28668", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/28xxx/CVE-2024-28668.json", - "dateUpdated": "2024-07-05T13:12:06.390Z" + "cveId": "CVE-2024-29035", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-29035", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/29xxx/CVE-2024-29035.json", + "dateUpdated": "2024-07-05T13:17:08.137Z" }, { - "cveId": "CVE-2024-28669", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-28669", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/28xxx/CVE-2024-28669.json", - "dateUpdated": "2024-07-05T13:12:06.563Z" + "cveId": "CVE-2024-29036", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-29036", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/29xxx/CVE-2024-29036.json", + "dateUpdated": "2024-07-05T13:17:08.168Z" }, { - "cveId": "CVE-2024-28670", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-28670", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/28xxx/CVE-2024-28670.json", - "dateUpdated": "2024-07-05T13:12:06.468Z" - }, - { - "cveId": "CVE-2024-28671", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-28671", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/28xxx/CVE-2024-28671.json", - "dateUpdated": "2024-07-05T13:12:06.497Z" - }, - { - "cveId": "CVE-2024-28672", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-28672", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/28xxx/CVE-2024-28672.json", - "dateUpdated": "2024-07-05T13:12:06.772Z" - }, - { - "cveId": "CVE-2024-28673", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-28673", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/28xxx/CVE-2024-28673.json", - "dateUpdated": "2024-07-05T13:12:06.433Z" - }, - { - "cveId": "CVE-2024-28675", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-28675", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/28xxx/CVE-2024-28675.json", - "dateUpdated": "2024-07-05T13:12:06.848Z" - }, - { - "cveId": "CVE-2024-28676", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-28676", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/28xxx/CVE-2024-28676.json", - "dateUpdated": "2024-07-05T13:12:06.732Z" - }, - { - "cveId": "CVE-2024-28677", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-28677", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/28xxx/CVE-2024-28677.json", - "dateUpdated": "2024-07-05T13:12:06.765Z" - }, - { - "cveId": "CVE-2024-28678", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-28678", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/28xxx/CVE-2024-28678.json", - "dateUpdated": "2024-07-05T13:12:06.738Z" - }, - { - "cveId": "CVE-2024-28679", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-28679", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/28xxx/CVE-2024-28679.json", - "dateUpdated": "2024-07-05T13:12:06.364Z" - }, - { - "cveId": "CVE-2024-28680", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-28680", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/28xxx/CVE-2024-28680.json", - "dateUpdated": "2024-07-05T13:12:06.556Z" - }, - { - "cveId": "CVE-2024-28681", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-28681", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/28xxx/CVE-2024-28681.json", - "dateUpdated": "2024-07-05T13:12:06.887Z" - }, - { - "cveId": "CVE-2024-28682", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-28682", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/28xxx/CVE-2024-28682.json", - "dateUpdated": "2024-07-05T13:12:06.881Z" - }, - { - "cveId": "CVE-2024-28683", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-28683", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/28xxx/CVE-2024-28683.json", - "dateUpdated": "2024-07-05T13:12:06.872Z" - }, - { - "cveId": "CVE-2024-28684", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-28684", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/28xxx/CVE-2024-28684.json", - "dateUpdated": "2024-07-05T13:12:06.466Z" - }, - { - "cveId": "CVE-2024-28699", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-28699", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/28xxx/CVE-2024-28699.json", - "dateUpdated": "2024-07-05T13:12:06.837Z" - }, - { - "cveId": "CVE-2024-28713", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-28713", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/28xxx/CVE-2024-28713.json", - "dateUpdated": "2024-07-05T13:12:06.880Z" - }, - { - "cveId": "CVE-2024-28714", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-28714", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/28xxx/CVE-2024-28714.json", - "dateUpdated": "2024-07-05T13:12:06.792Z" - }, - { - "cveId": "CVE-2024-28715", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-28715", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/28xxx/CVE-2024-28715.json", - "dateUpdated": "2024-07-05T13:12:06.826Z" - }, - { - "cveId": "CVE-2024-28716", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-28716", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/28xxx/CVE-2024-28716.json", - "dateUpdated": "2024-07-05T13:12:06.818Z" - }, - { - "cveId": "CVE-2024-28717", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-28717", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/28xxx/CVE-2024-28717.json", - "dateUpdated": "2024-07-05T13:12:06.783Z" - }, - { - "cveId": "CVE-2024-28718", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-28718", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/28xxx/CVE-2024-28718.json", - "dateUpdated": "2024-07-05T13:12:06.464Z" - }, - { - "cveId": "CVE-2024-28722", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-28722", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/28xxx/CVE-2024-28722.json", - "dateUpdated": "2024-07-05T13:12:06.460Z" - }, - { - "cveId": "CVE-2024-28725", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-28725", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/28xxx/CVE-2024-28725.json", - "dateUpdated": "2024-07-05T13:12:06.431Z" - }, - { - "cveId": "CVE-2024-28732", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-28732", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/28xxx/CVE-2024-28732.json", - "dateUpdated": "2024-07-05T13:12:06.391Z" - }, - { - "cveId": "CVE-2024-28734", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-28734", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/28xxx/CVE-2024-28734.json", - "dateUpdated": "2024-07-05T13:12:06.867Z" - }, - { - "cveId": "CVE-2024-28735", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-28735", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/28xxx/CVE-2024-28735.json", - "dateUpdated": "2024-07-05T13:12:06.763Z" - }, - { - "cveId": "CVE-2024-28736", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-28736", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/28xxx/CVE-2024-28736.json", - "dateUpdated": "2024-07-05T13:12:06.791Z" - }, - { - "cveId": "CVE-2024-28741", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-28741", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/28xxx/CVE-2024-28741.json", - "dateUpdated": "2024-07-05T13:12:06.875Z" - }, - { - "cveId": "CVE-2024-28744", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-28744", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/28xxx/CVE-2024-28744.json", - "dateUpdated": "2024-07-05T13:12:06.868Z" - }, - { - "cveId": "CVE-2024-28745", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-28745", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/28xxx/CVE-2024-28745.json", - "dateUpdated": "2024-07-05T13:12:06.862Z" - }, - { - "cveId": "CVE-2024-28746", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-28746", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/28xxx/CVE-2024-28746.json", - "dateUpdated": "2024-07-05T13:12:06.389Z" - }, - { - "cveId": "CVE-2024-28752", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-28752", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/28xxx/CVE-2024-28752.json", - "dateUpdated": "2024-07-05T13:12:06.893Z" - }, - { - "cveId": "CVE-2024-28753", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-28753", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/28xxx/CVE-2024-28753.json", - "dateUpdated": "2024-07-05T13:12:06.886Z" - }, - { - "cveId": "CVE-2024-28754", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-28754", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/28xxx/CVE-2024-28754.json", - "dateUpdated": "2024-07-05T13:12:06.847Z" - }, - { - "cveId": "CVE-2024-28755", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-28755", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/28xxx/CVE-2024-28755.json", - "dateUpdated": "2024-07-05T13:12:06.477Z" - }, - { - "cveId": "CVE-2024-28756", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-28756", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/28xxx/CVE-2024-28756.json", - "dateUpdated": "2024-07-05T13:12:06.889Z" - }, - { - "cveId": "CVE-2024-28757", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-28757", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/28xxx/CVE-2024-28757.json", - "dateUpdated": "2024-07-05T13:12:06.858Z" - }, - { - "cveId": "CVE-2024-28759", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-28759", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/28xxx/CVE-2024-28759.json", - "dateUpdated": "2024-07-05T13:12:06.871Z" - }, - { - "cveId": "CVE-2024-28760", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-28760", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/28xxx/CVE-2024-28760.json", - "dateUpdated": "2024-07-05T13:12:06.888Z" - }, - { - "cveId": "CVE-2024-28761", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-28761", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/28xxx/CVE-2024-28761.json", - "dateUpdated": "2024-07-05T13:12:06.882Z" - }, - { - "cveId": "CVE-2024-28762", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-28762", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/28xxx/CVE-2024-28762.json", - "dateUpdated": "2024-07-05T13:12:06.845Z" - }, - { - "cveId": "CVE-2024-28764", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-28764", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/28xxx/CVE-2024-28764.json", - "dateUpdated": "2024-07-05T13:12:06.892Z" - }, - { - "cveId": "CVE-2024-28775", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-28775", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/28xxx/CVE-2024-28775.json", - "dateUpdated": "2024-07-05T13:12:06.893Z" - }, - { - "cveId": "CVE-2024-28781", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-28781", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/28xxx/CVE-2024-28781.json", - "dateUpdated": "2024-07-05T13:12:06.863Z" - }, - { - "cveId": "CVE-2024-28782", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-28782", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/28xxx/CVE-2024-28782.json", - "dateUpdated": "2024-07-05T13:12:06.904Z" - }, - { - "cveId": "CVE-2024-28784", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-28784", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/28xxx/CVE-2024-28784.json", - "dateUpdated": "2024-07-05T13:12:06.856Z" - }, - { - "cveId": "CVE-2024-28787", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-28787", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/28xxx/CVE-2024-28787.json", - "dateUpdated": "2024-07-05T13:12:06.876Z" - }, - { - "cveId": "CVE-2024-28793", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-28793", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/28xxx/CVE-2024-28793.json", - "dateUpdated": "2024-07-05T13:12:06.906Z" - }, - { - "cveId": "CVE-2024-28815", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-28815", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/28xxx/CVE-2024-28815.json", - "dateUpdated": "2024-07-05T13:12:06.461Z" - }, - { - "cveId": "CVE-2024-28816", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-28816", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/28xxx/CVE-2024-28816.json", - "dateUpdated": "2024-07-05T13:12:06.912Z" - }, - { - "cveId": "CVE-2024-28818", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-28818", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/28xxx/CVE-2024-28818.json", - "dateUpdated": "2024-07-05T13:12:06.578Z" - }, - { - "cveId": "CVE-2024-28820", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-28820", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/28xxx/CVE-2024-28820.json", - "dateUpdated": "2024-07-05T13:12:06.897Z" - }, - { - "cveId": "CVE-2024-28823", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-28823", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/28xxx/CVE-2024-28823.json", - "dateUpdated": "2024-07-05T13:12:06.870Z" - }, - { - "cveId": "CVE-2024-28824", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-28824", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/28xxx/CVE-2024-28824.json", - "dateUpdated": "2024-07-05T13:12:06.904Z" - }, - { - "cveId": "CVE-2024-28825", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-28825", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/28xxx/CVE-2024-28825.json", - "dateUpdated": "2024-07-05T13:12:06.536Z" - }, - { - "cveId": "CVE-2024-28826", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-28826", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/28xxx/CVE-2024-28826.json", - "dateUpdated": "2024-07-05T13:12:06.903Z" - }, - { - "cveId": "CVE-2024-28830", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-28830", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/28xxx/CVE-2024-28830.json", - "dateUpdated": "2024-07-05T13:12:06.898Z" - }, - { - "cveId": "CVE-2024-28831", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-28831", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/28xxx/CVE-2024-28831.json", - "dateUpdated": "2024-07-05T13:12:06.647Z" - }, - { - "cveId": "CVE-2024-28832", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-28832", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/28xxx/CVE-2024-28832.json", - "dateUpdated": "2024-07-05T13:12:06.465Z" - }, - { - "cveId": "CVE-2024-28833", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-28833", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/28xxx/CVE-2024-28833.json", - "dateUpdated": "2024-07-05T13:12:06.760Z" - }, - { - "cveId": "CVE-2024-28834", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-28834", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/28xxx/CVE-2024-28834.json", - "dateUpdated": "2024-07-05T13:12:06.786Z" - }, - { - "cveId": "CVE-2024-28835", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-28835", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/28xxx/CVE-2024-28835.json", - "dateUpdated": "2024-07-05T13:12:06.835Z" - }, - { - "cveId": "CVE-2024-28836", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-28836", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/28xxx/CVE-2024-28836.json", - "dateUpdated": "2024-07-05T13:12:06.910Z" - }, - { - "cveId": "CVE-2024-28847", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-28847", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/28xxx/CVE-2024-28847.json", - "dateUpdated": "2024-07-05T13:12:06.912Z" - }, - { - "cveId": "CVE-2024-28848", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-28848", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/28xxx/CVE-2024-28848.json", - "dateUpdated": "2024-07-05T13:12:06.917Z" - }, - { - "cveId": "CVE-2024-28849", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-28849", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/28xxx/CVE-2024-28849.json", - "dateUpdated": "2024-07-05T13:12:06.905Z" - }, - { - "cveId": "CVE-2024-28850", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-28850", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/28xxx/CVE-2024-28850.json", - "dateUpdated": "2024-07-05T13:12:06.914Z" - }, - { - "cveId": "CVE-2024-28851", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-28851", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/28xxx/CVE-2024-28851.json", - "dateUpdated": "2024-07-05T13:12:06.935Z" - }, - { - "cveId": "CVE-2024-28852", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-28852", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/28xxx/CVE-2024-28852.json", - "dateUpdated": "2024-07-05T13:12:06.913Z" - }, - { - "cveId": "CVE-2024-28853", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-28853", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/28xxx/CVE-2024-28853.json", - "dateUpdated": "2024-07-05T13:12:06.911Z" - }, - { - "cveId": "CVE-2024-28854", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-28854", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/28xxx/CVE-2024-28854.json", - "dateUpdated": "2024-07-05T13:12:06.976Z" - }, - { - "cveId": "CVE-2024-28855", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-28855", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/28xxx/CVE-2024-28855.json", - "dateUpdated": "2024-07-05T13:12:06.930Z" - }, - { - "cveId": "CVE-2024-28859", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-28859", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/28xxx/CVE-2024-28859.json", - "dateUpdated": "2024-07-05T13:12:06.980Z" - }, - { - "cveId": "CVE-2024-28860", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-28860", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/28xxx/CVE-2024-28860.json", - "dateUpdated": "2024-07-05T13:12:06.919Z" - }, - { - "cveId": "CVE-2024-28861", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-28861", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/28xxx/CVE-2024-28861.json", - "dateUpdated": "2024-07-05T13:12:06.963Z" - }, - { - "cveId": "CVE-2024-28862", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-28862", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/28xxx/CVE-2024-28862.json", - "dateUpdated": "2024-07-05T13:12:06.920Z" - }, - { - "cveId": "CVE-2024-28863", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-28863", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/28xxx/CVE-2024-28863.json", - "dateUpdated": "2024-07-05T13:12:06.960Z" - }, - { - "cveId": "CVE-2024-28864", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-28864", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/28xxx/CVE-2024-28864.json", - "dateUpdated": "2024-07-05T13:12:06.929Z" - }, - { - "cveId": "CVE-2024-28865", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-28865", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/28xxx/CVE-2024-28865.json", - "dateUpdated": "2024-07-05T13:12:06.962Z" - }, - { - "cveId": "CVE-2024-28866", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-28866", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/28xxx/CVE-2024-28866.json", - "dateUpdated": "2024-07-05T13:12:06.936Z" - }, - { - "cveId": "CVE-2024-28867", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-28867", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/28xxx/CVE-2024-28867.json", - "dateUpdated": "2024-07-05T13:12:06.939Z" - }, - { - "cveId": "CVE-2024-28868", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-28868", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/28xxx/CVE-2024-28868.json", - "dateUpdated": "2024-07-05T13:12:06.921Z" - }, - { - "cveId": "CVE-2024-28869", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-28869", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/28xxx/CVE-2024-28869.json", - "dateUpdated": "2024-07-05T13:12:06.920Z" - }, - { - "cveId": "CVE-2024-28870", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-28870", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/28xxx/CVE-2024-28870.json", - "dateUpdated": "2024-07-05T13:12:06.918Z" - }, - { - "cveId": "CVE-2024-28871", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-28871", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/28xxx/CVE-2024-28871.json", - "dateUpdated": "2024-07-05T13:12:06.927Z" - }, - { - "cveId": "CVE-2024-28877", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-28877", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/28xxx/CVE-2024-28877.json", - "dateUpdated": "2024-07-05T13:12:06.964Z" - }, - { - "cveId": "CVE-2024-28878", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-28878", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/28xxx/CVE-2024-28878.json", - "dateUpdated": "2024-07-05T13:12:06.973Z" - }, - { - "cveId": "CVE-2024-28880", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-28880", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/28xxx/CVE-2024-28880.json", - "dateUpdated": "2024-07-05T13:12:06.941Z" - }, - { - "cveId": "CVE-2024-28883", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-28883", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/28xxx/CVE-2024-28883.json", - "dateUpdated": "2024-07-05T13:12:06.928Z" - }, - { - "cveId": "CVE-2024-28886", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-28886", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/28xxx/CVE-2024-28886.json", - "dateUpdated": "2024-07-05T13:12:06.940Z" - }, - { - "cveId": "CVE-2024-28889", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-28889", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/28xxx/CVE-2024-28889.json", - "dateUpdated": "2024-07-05T13:12:06.935Z" - }, - { - "cveId": "CVE-2024-28890", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-28890", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/28xxx/CVE-2024-28890.json", - "dateUpdated": "2024-07-05T13:12:06.981Z" - }, - { - "cveId": "CVE-2024-28891", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-28891", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/28xxx/CVE-2024-28891.json", - "dateUpdated": "2024-07-05T13:12:06.950Z" - }, - { - "cveId": "CVE-2024-28893", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-28893", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/28xxx/CVE-2024-28893.json", - "dateUpdated": "2024-07-05T13:12:06.980Z" - }, - { - "cveId": "CVE-2024-28894", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-28894", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/28xxx/CVE-2024-28894.json", - "dateUpdated": "2024-07-05T13:12:06.974Z" - }, - { - "cveId": "CVE-2024-28895", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-28895", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/28xxx/CVE-2024-28895.json", - "dateUpdated": "2024-07-05T13:12:06.947Z" - }, - { - "cveId": "CVE-2024-28896", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-28896", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/28xxx/CVE-2024-28896.json", - "dateUpdated": "2024-07-05T13:12:06.952Z" - }, - { - "cveId": "CVE-2024-28897", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-28897", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/28xxx/CVE-2024-28897.json", - "dateUpdated": "2024-07-05T13:12:06.986Z" - }, - { - "cveId": "CVE-2024-28898", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-28898", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/28xxx/CVE-2024-28898.json", - "dateUpdated": "2024-07-05T13:12:06.948Z" - }, - { - "cveId": "CVE-2024-28900", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-28900", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/28xxx/CVE-2024-28900.json", - "dateUpdated": "2024-07-05T13:12:06.975Z" - }, - { - "cveId": "CVE-2024-28901", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-28901", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/28xxx/CVE-2024-28901.json", - "dateUpdated": "2024-07-05T13:12:06.982Z" + "cveId": "CVE-2024-29037", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-29037", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/29xxx/CVE-2024-29037.json", + "dateUpdated": "2024-07-05T13:17:08.163Z" } ], "error": [] diff --git a/cves/deltaLog.json b/cves/deltaLog.json index 90d20f6635a..d75279b0bda 100644 --- a/cves/deltaLog.json +++ b/cves/deltaLog.json @@ -1,4 +1,612 @@ [ + { + "fetchTime": "2024-07-05T13:17:58.450Z", + "numberOfChanges": 100, + "new": [], + "updated": [ + { + "cveId": "CVE-2024-28902", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-28902", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/28xxx/CVE-2024-28902.json", + "dateUpdated": "2024-07-05T13:17:06.134Z" + }, + { + "cveId": "CVE-2024-28903", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-28903", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/28xxx/CVE-2024-28903.json", + "dateUpdated": "2024-07-05T13:17:06.163Z" + }, + { + "cveId": "CVE-2024-28904", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-28904", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/28xxx/CVE-2024-28904.json", + "dateUpdated": "2024-07-05T13:17:06.152Z" + }, + { + "cveId": "CVE-2024-28905", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-28905", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/28xxx/CVE-2024-28905.json", + "dateUpdated": "2024-07-05T13:17:07.698Z" + }, + { + "cveId": "CVE-2024-28906", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-28906", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/28xxx/CVE-2024-28906.json", + "dateUpdated": "2024-07-05T13:17:07.737Z" + }, + { + "cveId": "CVE-2024-28907", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-28907", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/28xxx/CVE-2024-28907.json", + "dateUpdated": "2024-07-05T13:17:07.916Z" + }, + { + "cveId": "CVE-2024-28908", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-28908", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/28xxx/CVE-2024-28908.json", + "dateUpdated": "2024-07-05T13:17:07.738Z" + }, + { + "cveId": "CVE-2024-28909", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-28909", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/28xxx/CVE-2024-28909.json", + "dateUpdated": "2024-07-05T13:17:07.727Z" + }, + { + "cveId": "CVE-2024-28910", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-28910", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/28xxx/CVE-2024-28910.json", + "dateUpdated": "2024-07-05T13:17:07.563Z" + }, + { + "cveId": "CVE-2024-28911", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-28911", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/28xxx/CVE-2024-28911.json", + "dateUpdated": "2024-07-05T13:17:07.761Z" + }, + { + "cveId": "CVE-2024-28912", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-28912", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/28xxx/CVE-2024-28912.json", + "dateUpdated": "2024-07-05T13:17:07.917Z" + }, + { + "cveId": "CVE-2024-28913", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-28913", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/28xxx/CVE-2024-28913.json", + "dateUpdated": "2024-07-05T13:17:07.902Z" + }, + { + "cveId": "CVE-2024-28914", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-28914", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/28xxx/CVE-2024-28914.json", + "dateUpdated": "2024-07-05T13:17:07.943Z" + }, + { + "cveId": "CVE-2024-28915", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-28915", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/28xxx/CVE-2024-28915.json", + "dateUpdated": "2024-07-05T13:17:06.220Z" + }, + { + "cveId": "CVE-2024-28916", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-28916", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/28xxx/CVE-2024-28916.json", + "dateUpdated": "2024-07-05T13:17:07.702Z" + }, + { + "cveId": "CVE-2024-28917", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-28917", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/28xxx/CVE-2024-28917.json", + "dateUpdated": "2024-07-05T13:17:06.158Z" + }, + { + "cveId": "CVE-2024-28919", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-28919", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/28xxx/CVE-2024-28919.json", + "dateUpdated": "2024-07-05T13:17:07.636Z" + }, + { + "cveId": "CVE-2024-28920", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-28920", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/28xxx/CVE-2024-28920.json", + "dateUpdated": "2024-07-05T13:17:07.352Z" + }, + { + "cveId": "CVE-2024-28921", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-28921", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/28xxx/CVE-2024-28921.json", + "dateUpdated": "2024-07-05T13:17:07.361Z" + }, + { + "cveId": "CVE-2024-28922", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-28922", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/28xxx/CVE-2024-28922.json", + "dateUpdated": "2024-07-05T13:17:07.488Z" + }, + { + "cveId": "CVE-2024-28923", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-28923", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/28xxx/CVE-2024-28923.json", + "dateUpdated": "2024-07-05T13:17:07.554Z" + }, + { + "cveId": "CVE-2024-28924", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-28924", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/28xxx/CVE-2024-28924.json", + "dateUpdated": "2024-07-05T13:17:07.878Z" + }, + { + "cveId": "CVE-2024-28925", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-28925", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/28xxx/CVE-2024-28925.json", + "dateUpdated": "2024-07-05T13:17:07.755Z" + }, + { + "cveId": "CVE-2024-28926", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-28926", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/28xxx/CVE-2024-28926.json", + "dateUpdated": "2024-07-05T13:17:07.970Z" + }, + { + "cveId": "CVE-2024-28927", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-28927", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/28xxx/CVE-2024-28927.json", + "dateUpdated": "2024-07-05T13:17:07.958Z" + }, + { + "cveId": "CVE-2024-28929", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-28929", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/28xxx/CVE-2024-28929.json", + "dateUpdated": "2024-07-05T13:17:07.817Z" + }, + { + "cveId": "CVE-2024-28930", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-28930", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/28xxx/CVE-2024-28930.json", + "dateUpdated": "2024-07-05T13:17:08.160Z" + }, + { + "cveId": "CVE-2024-28931", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-28931", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/28xxx/CVE-2024-28931.json", + "dateUpdated": "2024-07-05T13:17:08.145Z" + }, + { + "cveId": "CVE-2024-28932", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-28932", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/28xxx/CVE-2024-28932.json", + "dateUpdated": "2024-07-05T13:17:07.888Z" + }, + { + "cveId": "CVE-2024-28933", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-28933", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/28xxx/CVE-2024-28933.json", + "dateUpdated": "2024-07-05T13:17:07.900Z" + }, + { + "cveId": "CVE-2024-28934", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-28934", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/28xxx/CVE-2024-28934.json", + "dateUpdated": "2024-07-05T13:17:07.924Z" + }, + { + "cveId": "CVE-2024-28935", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-28935", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/28xxx/CVE-2024-28935.json", + "dateUpdated": "2024-07-05T13:17:07.947Z" + }, + { + "cveId": "CVE-2024-28936", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-28936", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/28xxx/CVE-2024-28936.json", + "dateUpdated": "2024-07-05T13:17:08.013Z" + }, + { + "cveId": "CVE-2024-28937", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-28937", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/28xxx/CVE-2024-28937.json", + "dateUpdated": "2024-07-05T13:17:07.787Z" + }, + { + "cveId": "CVE-2024-28938", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-28938", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/28xxx/CVE-2024-28938.json", + "dateUpdated": "2024-07-05T13:17:07.837Z" + }, + { + "cveId": "CVE-2024-28939", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-28939", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/28xxx/CVE-2024-28939.json", + "dateUpdated": "2024-07-05T13:17:08.157Z" + }, + { + "cveId": "CVE-2024-28940", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-28940", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/28xxx/CVE-2024-28940.json", + "dateUpdated": "2024-07-05T13:17:07.889Z" + }, + { + "cveId": "CVE-2024-28941", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-28941", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/28xxx/CVE-2024-28941.json", + "dateUpdated": "2024-07-05T13:17:06.208Z" + }, + { + "cveId": "CVE-2024-28942", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-28942", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/28xxx/CVE-2024-28942.json", + "dateUpdated": "2024-07-05T13:17:07.763Z" + }, + { + "cveId": "CVE-2024-28943", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-28943", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/28xxx/CVE-2024-28943.json", + "dateUpdated": "2024-07-05T13:17:07.805Z" + }, + { + "cveId": "CVE-2024-28944", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-28944", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/28xxx/CVE-2024-28944.json", + "dateUpdated": "2024-07-05T13:17:07.898Z" + }, + { + "cveId": "CVE-2024-28945", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-28945", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/28xxx/CVE-2024-28945.json", + "dateUpdated": "2024-07-05T13:17:07.945Z" + }, + { + "cveId": "CVE-2024-28949", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-28949", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/28xxx/CVE-2024-28949.json", + "dateUpdated": "2024-07-05T13:17:07.839Z" + }, + { + "cveId": "CVE-2024-28951", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-28951", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/28xxx/CVE-2024-28951.json", + "dateUpdated": "2024-07-05T13:17:07.762Z" + }, + { + "cveId": "CVE-2024-28957", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-28957", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/28xxx/CVE-2024-28957.json", + "dateUpdated": "2024-07-05T13:17:07.717Z" + }, + { + "cveId": "CVE-2024-28960", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-28960", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/28xxx/CVE-2024-28960.json", + "dateUpdated": "2024-07-05T13:17:07.744Z" + }, + { + "cveId": "CVE-2024-28961", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-28961", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/28xxx/CVE-2024-28961.json", + "dateUpdated": "2024-07-05T13:17:08.024Z" + }, + { + "cveId": "CVE-2024-28963", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-28963", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/28xxx/CVE-2024-28963.json", + "dateUpdated": "2024-07-05T13:17:08.000Z" + }, + { + "cveId": "CVE-2024-28964", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-28964", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/28xxx/CVE-2024-28964.json", + "dateUpdated": "2024-07-05T13:17:07.859Z" + }, + { + "cveId": "CVE-2024-28965", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-28965", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/28xxx/CVE-2024-28965.json", + "dateUpdated": "2024-07-05T13:17:08.026Z" + }, + { + "cveId": "CVE-2024-28966", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-28966", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/28xxx/CVE-2024-28966.json", + "dateUpdated": "2024-07-05T13:17:07.974Z" + }, + { + "cveId": "CVE-2024-28967", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-28967", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/28xxx/CVE-2024-28967.json", + "dateUpdated": "2024-07-05T13:17:08.104Z" + }, + { + "cveId": "CVE-2024-28968", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-28968", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/28xxx/CVE-2024-28968.json", + "dateUpdated": "2024-07-05T13:17:08.135Z" + }, + { + "cveId": "CVE-2024-28969", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-28969", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/28xxx/CVE-2024-28969.json", + "dateUpdated": "2024-07-05T13:17:08.102Z" + }, + { + "cveId": "CVE-2024-28970", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-28970", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/28xxx/CVE-2024-28970.json", + "dateUpdated": "2024-07-05T13:17:08.011Z" + }, + { + "cveId": "CVE-2024-28971", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-28971", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/28xxx/CVE-2024-28971.json", + "dateUpdated": "2024-07-05T13:17:07.985Z" + }, + { + "cveId": "CVE-2024-28973", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-28973", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/28xxx/CVE-2024-28973.json", + "dateUpdated": "2024-07-05T13:17:08.130Z" + }, + { + "cveId": "CVE-2024-28974", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-28974", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/28xxx/CVE-2024-28974.json", + "dateUpdated": "2024-07-05T13:17:08.146Z" + }, + { + "cveId": "CVE-2024-28976", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-28976", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/28xxx/CVE-2024-28976.json", + "dateUpdated": "2024-07-05T13:17:08.058Z" + }, + { + "cveId": "CVE-2024-28977", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-28977", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/28xxx/CVE-2024-28977.json", + "dateUpdated": "2024-07-05T13:17:08.127Z" + }, + { + "cveId": "CVE-2024-28978", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-28978", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/28xxx/CVE-2024-28978.json", + "dateUpdated": "2024-07-05T13:17:07.983Z" + }, + { + "cveId": "CVE-2024-28979", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-28979", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/28xxx/CVE-2024-28979.json", + "dateUpdated": "2024-07-05T13:17:08.042Z" + }, + { + "cveId": "CVE-2024-28982", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-28982", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/28xxx/CVE-2024-28982.json", + "dateUpdated": "2024-07-05T13:17:07.887Z" + }, + { + "cveId": "CVE-2024-28983", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-28983", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/28xxx/CVE-2024-28983.json", + "dateUpdated": "2024-07-05T13:17:08.028Z" + }, + { + "cveId": "CVE-2024-28984", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-28984", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/28xxx/CVE-2024-28984.json", + "dateUpdated": "2024-07-05T13:17:08.002Z" + }, + { + "cveId": "CVE-2024-28995", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-28995", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/28xxx/CVE-2024-28995.json", + "dateUpdated": "2024-07-05T13:17:08.044Z" + }, + { + "cveId": "CVE-2024-28996", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-28996", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/28xxx/CVE-2024-28996.json", + "dateUpdated": "2024-07-05T13:17:07.700Z" + }, + { + "cveId": "CVE-2024-28999", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-28999", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/28xxx/CVE-2024-28999.json", + "dateUpdated": "2024-07-05T13:17:08.105Z" + }, + { + "cveId": "CVE-2024-29000", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-29000", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/29xxx/CVE-2024-29000.json", + "dateUpdated": "2024-07-05T13:17:07.796Z" + }, + { + "cveId": "CVE-2024-29001", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-29001", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/29xxx/CVE-2024-29001.json", + "dateUpdated": "2024-07-05T13:17:07.763Z" + }, + { + "cveId": "CVE-2024-29003", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-29003", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/29xxx/CVE-2024-29003.json", + "dateUpdated": "2024-07-05T13:17:07.780Z" + }, + { + "cveId": "CVE-2024-29004", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-29004", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/29xxx/CVE-2024-29004.json", + "dateUpdated": "2024-07-05T13:17:08.041Z" + }, + { + "cveId": "CVE-2024-29006", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-29006", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/29xxx/CVE-2024-29006.json", + "dateUpdated": "2024-07-05T13:17:08.060Z" + }, + { + "cveId": "CVE-2024-29007", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-29007", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/29xxx/CVE-2024-29007.json", + "dateUpdated": "2024-07-05T13:17:08.125Z" + }, + { + "cveId": "CVE-2024-29008", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-29008", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/29xxx/CVE-2024-29008.json", + "dateUpdated": "2024-07-05T13:17:08.148Z" + }, + { + "cveId": "CVE-2024-29009", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-29009", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/29xxx/CVE-2024-29009.json", + "dateUpdated": "2024-07-05T13:17:07.808Z" + }, + { + "cveId": "CVE-2024-29010", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-29010", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/29xxx/CVE-2024-29010.json", + "dateUpdated": "2024-07-05T13:17:08.144Z" + }, + { + "cveId": "CVE-2024-29011", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-29011", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/29xxx/CVE-2024-29011.json", + "dateUpdated": "2024-07-05T13:17:08.079Z" + }, + { + "cveId": "CVE-2024-29012", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-29012", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/29xxx/CVE-2024-29012.json", + "dateUpdated": "2024-07-05T13:17:08.001Z" + }, + { + "cveId": "CVE-2024-29013", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-29013", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/29xxx/CVE-2024-29013.json", + "dateUpdated": "2024-07-05T13:17:07.800Z" + }, + { + "cveId": "CVE-2024-29018", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-29018", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/29xxx/CVE-2024-29018.json", + "dateUpdated": "2024-07-05T13:17:07.861Z" + }, + { + "cveId": "CVE-2024-29019", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-29019", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/29xxx/CVE-2024-29019.json", + "dateUpdated": "2024-07-05T13:17:08.082Z" + }, + { + "cveId": "CVE-2024-29020", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-29020", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/29xxx/CVE-2024-29020.json", + "dateUpdated": "2024-07-05T13:17:08.142Z" + }, + { + "cveId": "CVE-2024-29021", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-29021", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/29xxx/CVE-2024-29021.json", + "dateUpdated": "2024-07-05T13:17:08.177Z" + }, + { + "cveId": "CVE-2024-29022", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-29022", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/29xxx/CVE-2024-29022.json", + "dateUpdated": "2024-07-05T13:17:08.134Z" + }, + { + "cveId": "CVE-2024-29023", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-29023", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/29xxx/CVE-2024-29023.json", + "dateUpdated": "2024-07-05T13:17:08.065Z" + }, + { + "cveId": "CVE-2024-29024", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-29024", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/29xxx/CVE-2024-29024.json", + "dateUpdated": "2024-07-05T13:17:08.128Z" + }, + { + "cveId": "CVE-2024-29025", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-29025", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/29xxx/CVE-2024-29025.json", + "dateUpdated": "2024-07-05T13:17:08.149Z" + }, + { + "cveId": "CVE-2024-29026", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-29026", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/29xxx/CVE-2024-29026.json", + "dateUpdated": "2024-07-05T13:17:08.081Z" + }, + { + "cveId": "CVE-2024-29027", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-29027", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/29xxx/CVE-2024-29027.json", + "dateUpdated": "2024-07-05T13:17:08.188Z" + }, + { + "cveId": "CVE-2024-29028", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-29028", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/29xxx/CVE-2024-29028.json", + "dateUpdated": "2024-07-05T13:17:08.210Z" + }, + { + "cveId": "CVE-2024-29029", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-29029", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/29xxx/CVE-2024-29029.json", + "dateUpdated": "2024-07-05T13:17:08.164Z" + }, + { + "cveId": "CVE-2024-29030", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-29030", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/29xxx/CVE-2024-29030.json", + "dateUpdated": "2024-07-05T13:17:08.179Z" + }, + { + "cveId": "CVE-2024-29031", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-29031", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/29xxx/CVE-2024-29031.json", + "dateUpdated": "2024-07-05T13:17:08.181Z" + }, + { + "cveId": "CVE-2024-29032", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-29032", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/29xxx/CVE-2024-29032.json", + "dateUpdated": "2024-07-05T13:17:08.161Z" + }, + { + "cveId": "CVE-2024-29033", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-29033", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/29xxx/CVE-2024-29033.json", + "dateUpdated": "2024-07-05T13:17:08.178Z" + }, + { + "cveId": "CVE-2024-29034", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-29034", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/29xxx/CVE-2024-29034.json", + "dateUpdated": "2024-07-05T13:17:08.152Z" + }, + { + "cveId": "CVE-2024-29035", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-29035", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/29xxx/CVE-2024-29035.json", + "dateUpdated": "2024-07-05T13:17:08.137Z" + }, + { + "cveId": "CVE-2024-29036", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-29036", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/29xxx/CVE-2024-29036.json", + "dateUpdated": "2024-07-05T13:17:08.168Z" + }, + { + "cveId": "CVE-2024-29037", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-29037", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/29xxx/CVE-2024-29037.json", + "dateUpdated": "2024-07-05T13:17:08.163Z" + } + ], + "error": [] + }, { "fetchTime": "2024-07-05T13:12:59.872Z", "numberOfChanges": 200,