From d20d438342e6720e6658e86e63f65d85f37b76eb Mon Sep 17 00:00:00 2001 From: cvelistV5 Github Action - optimized Date: Fri, 5 Jul 2024 14:50:03 +0000 Subject: [PATCH] 300 changes (0 new | 300 updated): - 0 new CVEs: - 300 updated CVEs: CVE-2024-2611, CVE-2024-2612, CVE-2024-2613, CVE-2024-2614, CVE-2024-2615, CVE-2024-2616, CVE-2024-2617, CVE-2024-2618, CVE-2024-2619, CVE-2024-2620, CVE-2024-2621, CVE-2024-2622, CVE-2024-2623, CVE-2024-2624, CVE-2024-2625, CVE-2024-2626, CVE-2024-2627, CVE-2024-2628, CVE-2024-2629, CVE-2024-2630, CVE-2024-2631, CVE-2024-2632, CVE-2024-2633, CVE-2024-2634, CVE-2024-2635, CVE-2024-2636, CVE-2024-2637, CVE-2024-2639, CVE-2024-2641, CVE-2024-2642, CVE-2024-2644, CVE-2024-2645, CVE-2024-2646, CVE-2024-2647, CVE-2024-2648, CVE-2024-2649, CVE-2024-2650, CVE-2024-2651, CVE-2024-2653, CVE-2024-2654, CVE-2024-2655, CVE-2024-2656, CVE-2024-2657, CVE-2024-2659, CVE-2024-2660, CVE-2024-2661, CVE-2024-2662, CVE-2024-2663, CVE-2024-2664, CVE-2024-2665, CVE-2024-2666, CVE-2024-2667, CVE-2024-2668, CVE-2024-2669, CVE-2024-2670, CVE-2024-2671, CVE-2024-2672, CVE-2024-2673, CVE-2024-2674, CVE-2024-2675, CVE-2024-2676, CVE-2024-2677, CVE-2024-2678, CVE-2024-2679, CVE-2024-2680, CVE-2024-2681, CVE-2024-2682, CVE-2024-2683, CVE-2024-2684, CVE-2024-2685, CVE-2024-2686, CVE-2024-2687, CVE-2024-2688, CVE-2024-2689, CVE-2024-2690, CVE-2024-2692, CVE-2024-2693, CVE-2024-2695, CVE-2024-2697, CVE-2024-2698, CVE-2024-2700, CVE-2024-2702, CVE-2024-2703, CVE-2024-2704, CVE-2024-2705, CVE-2024-2706, CVE-2024-2707, CVE-2024-2708, CVE-2024-2709, CVE-2024-2710, CVE-2024-2711, CVE-2024-2712, CVE-2024-2713, CVE-2024-2714, CVE-2024-2715, CVE-2024-2716, CVE-2024-2717, CVE-2024-2718, CVE-2024-2719, CVE-2024-2720, CVE-2024-2721, CVE-2024-2722, CVE-2024-2723, CVE-2024-2724, CVE-2024-2725, CVE-2024-2726, CVE-2024-2727, CVE-2024-2728, CVE-2024-2729, CVE-2024-2730, CVE-2024-2731, CVE-2024-2732, CVE-2024-2733, CVE-2024-2734, CVE-2024-2735, CVE-2024-2736, CVE-2024-2738, CVE-2024-2739, CVE-2024-2740, CVE-2024-2741, CVE-2024-2742, CVE-2024-2744, CVE-2024-2745, CVE-2024-2746, CVE-2024-2747, CVE-2024-2748, CVE-2024-2749, CVE-2024-2750, CVE-2024-2751, CVE-2024-2752, CVE-2024-2753, CVE-2024-2754, CVE-2024-2756, CVE-2024-2757, CVE-2024-2758, CVE-2024-2759, CVE-2024-2760, CVE-2024-2761, CVE-2024-2762, CVE-2024-2763, CVE-2024-2764, CVE-2024-2765, CVE-2024-2766, CVE-2024-2767, CVE-2024-2768, CVE-2024-2769, CVE-2024-2770, CVE-2024-2771, CVE-2024-2772, CVE-2024-2773, CVE-2024-2774, CVE-2024-2775, CVE-2024-2776, CVE-2024-2777, CVE-2024-2778, CVE-2024-2779, CVE-2024-2780, CVE-2024-2781, CVE-2024-2782, CVE-2024-2783, CVE-2024-2784, CVE-2024-2785, CVE-2024-2786, CVE-2024-2787, CVE-2024-2788, CVE-2024-2789, CVE-2024-2790, CVE-2024-2791, CVE-2024-2792, CVE-2024-2793, CVE-2024-2794, CVE-2024-2795, CVE-2024-2796, CVE-2024-2797, CVE-2024-2798, CVE-2024-2799, CVE-2024-2801, CVE-2024-2803, CVE-2024-2804, CVE-2024-2805, CVE-2024-2806, CVE-2024-2807, CVE-2024-2808, CVE-2024-2809, CVE-2024-2810, CVE-2024-2811, CVE-2024-2812, CVE-2024-2813, CVE-2024-2814, CVE-2024-2815, CVE-2024-2816, CVE-2024-2817, CVE-2024-2818, CVE-2024-2820, CVE-2024-2821, CVE-2024-2822, CVE-2024-2823, CVE-2024-2824, CVE-2024-2825, CVE-2024-2826, CVE-2024-2827, CVE-2024-2828, CVE-2024-2829, CVE-2024-2830, CVE-2024-2831, CVE-2024-2832, CVE-2024-2833, CVE-2024-2834, CVE-2024-2835, CVE-2024-2836, CVE-2024-2837, CVE-2024-2838, CVE-2024-2839, CVE-2024-2840, CVE-2024-2841, CVE-2024-2842, CVE-2024-2844, CVE-2024-2845, CVE-2024-2846, CVE-2024-2847, CVE-2024-2848, CVE-2024-2849, CVE-2024-2850, CVE-2024-2851, CVE-2024-2852, CVE-2024-2853, CVE-2024-2854, CVE-2024-2855, CVE-2024-2856, CVE-2024-2857, CVE-2024-2858, CVE-2024-2859, CVE-2024-2860, CVE-2024-2861, CVE-2024-2862, CVE-2024-2863, CVE-2024-2864, CVE-2024-2865, CVE-2024-2867, CVE-2024-2868, CVE-2024-2871, CVE-2024-2873, CVE-2024-2874, CVE-2024-2876, CVE-2024-2877, CVE-2024-2879, CVE-2024-2882, CVE-2024-2883, CVE-2024-2885, CVE-2024-2886, CVE-2024-2887, CVE-2024-2888, CVE-2024-2889, CVE-2024-2890, CVE-2024-2891, CVE-2024-2892, CVE-2024-2893, CVE-2024-2894, CVE-2024-2895, CVE-2024-2896, CVE-2024-2897, CVE-2024-2898, CVE-2024-2899, CVE-2024-2900, CVE-2024-2901, CVE-2024-2902, CVE-2024-2903, CVE-2024-2904, CVE-2024-2905, CVE-2024-2906, CVE-2024-2907, CVE-2024-2908, CVE-2024-2909, CVE-2024-2910, CVE-2024-2911, CVE-2024-2912, CVE-2024-2913, CVE-2024-2914, CVE-2024-2915, CVE-2024-2916, CVE-2024-2917, CVE-2024-2918, CVE-2024-2919, CVE-2024-2920, CVE-2024-2921, CVE-2024-2922, CVE-2024-2923, CVE-2024-2924, CVE-2024-2925, CVE-2024-2927, CVE-2024-2928, CVE-2024-2929, CVE-2024-2930, CVE-2024-2931, CVE-2024-2932, CVE-2024-2933, CVE-2024-2934, CVE-2024-2935, CVE-2024-2936, CVE-2024-2938 --- cves/2024/2xxx/CVE-2024-2611.json | 40 +- cves/2024/2xxx/CVE-2024-2612.json | 40 +- cves/2024/2xxx/CVE-2024-2613.json | 16 +- cves/2024/2xxx/CVE-2024-2614.json | 41 +- cves/2024/2xxx/CVE-2024-2615.json | 17 +- cves/2024/2xxx/CVE-2024-2616.json | 34 +- cves/2024/2xxx/CVE-2024-2617.json | 10 +- cves/2024/2xxx/CVE-2024-2618.json | 22 +- cves/2024/2xxx/CVE-2024-2619.json | 28 +- cves/2024/2xxx/CVE-2024-2620.json | 30 +- cves/2024/2xxx/CVE-2024-2621.json | 30 +- cves/2024/2xxx/CVE-2024-2622.json | 30 +- cves/2024/2xxx/CVE-2024-2623.json | 22 +- cves/2024/2xxx/CVE-2024-2624.json | 16 +- cves/2024/2xxx/CVE-2024-2625.json | 34 +- cves/2024/2xxx/CVE-2024-2626.json | 34 +- cves/2024/2xxx/CVE-2024-2627.json | 34 +- cves/2024/2xxx/CVE-2024-2628.json | 34 +- cves/2024/2xxx/CVE-2024-2629.json | 34 +- cves/2024/2xxx/CVE-2024-2630.json | 34 +- cves/2024/2xxx/CVE-2024-2631.json | 34 +- cves/2024/2xxx/CVE-2024-2632.json | 10 +- cves/2024/2xxx/CVE-2024-2633.json | 10 +- cves/2024/2xxx/CVE-2024-2634.json | 10 +- cves/2024/2xxx/CVE-2024-2635.json | 10 +- cves/2024/2xxx/CVE-2024-2636.json | 10 +- cves/2024/2xxx/CVE-2024-2637.json | 10 +- cves/2024/2xxx/CVE-2024-2639.json | 28 +- cves/2024/2xxx/CVE-2024-2641.json | 28 +- cves/2024/2xxx/CVE-2024-2642.json | 29 +- cves/2024/2xxx/CVE-2024-2644.json | 42 +- cves/2024/2xxx/CVE-2024-2645.json | 29 +- cves/2024/2xxx/CVE-2024-2646.json | 29 +- cves/2024/2xxx/CVE-2024-2647.json | 29 +- cves/2024/2xxx/CVE-2024-2648.json | 29 +- cves/2024/2xxx/CVE-2024-2649.json | 29 +- cves/2024/2xxx/CVE-2024-2650.json | 16 +- cves/2024/2xxx/CVE-2024-2651.json | 23 +- cves/2024/2xxx/CVE-2024-2653.json | 22 +- cves/2024/2xxx/CVE-2024-2654.json | 22 +- cves/2024/2xxx/CVE-2024-2655.json | 16 +- cves/2024/2xxx/CVE-2024-2656.json | 16 +- cves/2024/2xxx/CVE-2024-2657.json | 16 +- cves/2024/2xxx/CVE-2024-2659.json | 10 +- cves/2024/2xxx/CVE-2024-2660.json | 16 +- cves/2024/2xxx/CVE-2024-2661.json | 22 +- cves/2024/2xxx/CVE-2024-2662.json | 16 +- cves/2024/2xxx/CVE-2024-2663.json | 16 +- cves/2024/2xxx/CVE-2024-2664.json | 16 +- cves/2024/2xxx/CVE-2024-2665.json | 16 +- cves/2024/2xxx/CVE-2024-2666.json | 16 +- cves/2024/2xxx/CVE-2024-2667.json | 16 +- cves/2024/2xxx/CVE-2024-2668.json | 29 +- cves/2024/2xxx/CVE-2024-2669.json | 29 +- cves/2024/2xxx/CVE-2024-2670.json | 29 +- cves/2024/2xxx/CVE-2024-2671.json | 29 +- cves/2024/2xxx/CVE-2024-2672.json | 42 +- cves/2024/2xxx/CVE-2024-2673.json | 29 +- cves/2024/2xxx/CVE-2024-2674.json | 29 +- cves/2024/2xxx/CVE-2024-2675.json | 29 +- cves/2024/2xxx/CVE-2024-2676.json | 29 +- cves/2024/2xxx/CVE-2024-2677.json | 29 +- cves/2024/2xxx/CVE-2024-2678.json | 29 +- cves/2024/2xxx/CVE-2024-2679.json | 29 +- cves/2024/2xxx/CVE-2024-2680.json | 29 +- cves/2024/2xxx/CVE-2024-2681.json | 29 +- cves/2024/2xxx/CVE-2024-2682.json | 42 +- cves/2024/2xxx/CVE-2024-2683.json | 29 +- cves/2024/2xxx/CVE-2024-2684.json | 29 +- cves/2024/2xxx/CVE-2024-2685.json | 29 +- cves/2024/2xxx/CVE-2024-2686.json | 29 +- cves/2024/2xxx/CVE-2024-2687.json | 29 +- cves/2024/2xxx/CVE-2024-2688.json | 16 +- cves/2024/2xxx/CVE-2024-2689.json | 11 +- cves/2024/2xxx/CVE-2024-2690.json | 30 +- cves/2024/2xxx/CVE-2024-2692.json | 16 +- cves/2024/2xxx/CVE-2024-2693.json | 16 +- cves/2024/2xxx/CVE-2024-2695.json | 23 +- cves/2024/2xxx/CVE-2024-2697.json | 13 +- cves/2024/2xxx/CVE-2024-2698.json | 76 +- cves/2024/2xxx/CVE-2024-2700.json | 55 +- cves/2024/2xxx/CVE-2024-2702.json | 11 +- cves/2024/2xxx/CVE-2024-2703.json | 29 +- cves/2024/2xxx/CVE-2024-2704.json | 29 +- cves/2024/2xxx/CVE-2024-2705.json | 42 +- cves/2024/2xxx/CVE-2024-2706.json | 29 +- cves/2024/2xxx/CVE-2024-2707.json | 29 +- cves/2024/2xxx/CVE-2024-2708.json | 29 +- cves/2024/2xxx/CVE-2024-2709.json | 29 +- cves/2024/2xxx/CVE-2024-2710.json | 29 +- cves/2024/2xxx/CVE-2024-2711.json | 29 +- cves/2024/2xxx/CVE-2024-2712.json | 29 +- cves/2024/2xxx/CVE-2024-2713.json | 29 +- cves/2024/2xxx/CVE-2024-2714.json | 29 +- cves/2024/2xxx/CVE-2024-2715.json | 29 +- cves/2024/2xxx/CVE-2024-2716.json | 29 +- cves/2024/2xxx/CVE-2024-2717.json | 29 +- cves/2024/2xxx/CVE-2024-2718.json | 29 +- cves/2024/2xxx/CVE-2024-2719.json | 29 +- cves/2024/2xxx/CVE-2024-2720.json | 29 +- cves/2024/2xxx/CVE-2024-2721.json | 11 +- cves/2024/2xxx/CVE-2024-2722.json | 10 +- cves/2024/2xxx/CVE-2024-2723.json | 10 +- cves/2024/2xxx/CVE-2024-2724.json | 10 +- cves/2024/2xxx/CVE-2024-2725.json | 10 +- cves/2024/2xxx/CVE-2024-2726.json | 10 +- cves/2024/2xxx/CVE-2024-2727.json | 10 +- cves/2024/2xxx/CVE-2024-2728.json | 10 +- cves/2024/2xxx/CVE-2024-2729.json | 13 +- cves/2024/2xxx/CVE-2024-2730.json | 11 +- cves/2024/2xxx/CVE-2024-2731.json | 11 +- cves/2024/2xxx/CVE-2024-2732.json | 16 +- cves/2024/2xxx/CVE-2024-2733.json | 16 +- cves/2024/2xxx/CVE-2024-2734.json | 16 +- cves/2024/2xxx/CVE-2024-2735.json | 16 +- cves/2024/2xxx/CVE-2024-2736.json | 16 +- cves/2024/2xxx/CVE-2024-2738.json | 28 +- cves/2024/2xxx/CVE-2024-2739.json | 13 +- cves/2024/2xxx/CVE-2024-2740.json | 10 +- cves/2024/2xxx/CVE-2024-2741.json | 10 +- cves/2024/2xxx/CVE-2024-2742.json | 10 +- cves/2024/2xxx/CVE-2024-2744.json | 13 +- cves/2024/2xxx/CVE-2024-2745.json | 10 +- cves/2024/2xxx/CVE-2024-2746.json | 10 +- cves/2024/2xxx/CVE-2024-2747.json | 21 +- cves/2024/2xxx/CVE-2024-2748.json | 10 +- cves/2024/2xxx/CVE-2024-2749.json | 13 +- cves/2024/2xxx/CVE-2024-2750.json | 16 +- cves/2024/2xxx/CVE-2024-2751.json | 29 +- cves/2024/2xxx/CVE-2024-2752.json | 16 +- cves/2024/2xxx/CVE-2024-2753.json | 16 +- cves/2024/2xxx/CVE-2024-2754.json | 30 +- cves/2024/2xxx/CVE-2024-2756.json | 28 +- cves/2024/2xxx/CVE-2024-2757.json | 22 +- cves/2024/2xxx/CVE-2024-2758.json | 22 +- cves/2024/2xxx/CVE-2024-2759.json | 31 +- cves/2024/2xxx/CVE-2024-2760.json | 18 +- cves/2024/2xxx/CVE-2024-2761.json | 13 +- cves/2024/2xxx/CVE-2024-2762.json | 20 +- cves/2024/2xxx/CVE-2024-2763.json | 29 +- cves/2024/2xxx/CVE-2024-2764.json | 29 +- cves/2024/2xxx/CVE-2024-2765.json | 34 +- cves/2024/2xxx/CVE-2024-2766.json | 29 +- cves/2024/2xxx/CVE-2024-2767.json | 29 +- cves/2024/2xxx/CVE-2024-2768.json | 29 +- cves/2024/2xxx/CVE-2024-2769.json | 29 +- cves/2024/2xxx/CVE-2024-2770.json | 29 +- cves/2024/2xxx/CVE-2024-2771.json | 16 +- cves/2024/2xxx/CVE-2024-2772.json | 16 +- cves/2024/2xxx/CVE-2024-2773.json | 29 +- cves/2024/2xxx/CVE-2024-2774.json | 29 +- cves/2024/2xxx/CVE-2024-2775.json | 29 +- cves/2024/2xxx/CVE-2024-2776.json | 29 +- cves/2024/2xxx/CVE-2024-2777.json | 29 +- cves/2024/2xxx/CVE-2024-2778.json | 29 +- cves/2024/2xxx/CVE-2024-2779.json | 29 +- cves/2024/2xxx/CVE-2024-2780.json | 29 +- cves/2024/2xxx/CVE-2024-2781.json | 16 +- cves/2024/2xxx/CVE-2024-2782.json | 16 +- cves/2024/2xxx/CVE-2024-2783.json | 16 +- cves/2024/2xxx/CVE-2024-2784.json | 16 +- cves/2024/2xxx/CVE-2024-2785.json | 22 +- cves/2024/2xxx/CVE-2024-2786.json | 40 +- cves/2024/2xxx/CVE-2024-2787.json | 16 +- cves/2024/2xxx/CVE-2024-2788.json | 16 +- cves/2024/2xxx/CVE-2024-2789.json | 16 +- cves/2024/2xxx/CVE-2024-2790.json | 16 +- cves/2024/2xxx/CVE-2024-2791.json | 16 +- cves/2024/2xxx/CVE-2024-2792.json | 34 +- cves/2024/2xxx/CVE-2024-2793.json | 40 +- cves/2024/2xxx/CVE-2024-2794.json | 16 +- cves/2024/2xxx/CVE-2024-2795.json | 27 +- cves/2024/2xxx/CVE-2024-2796.json | 10 +- cves/2024/2xxx/CVE-2024-2797.json | 22 +- cves/2024/2xxx/CVE-2024-2798.json | 16 +- cves/2024/2xxx/CVE-2024-2799.json | 28 +- cves/2024/2xxx/CVE-2024-2801.json | 16 +- cves/2024/2xxx/CVE-2024-2803.json | 16 +- cves/2024/2xxx/CVE-2024-2804.json | 16 +- cves/2024/2xxx/CVE-2024-2805.json | 29 +- cves/2024/2xxx/CVE-2024-2806.json | 29 +- cves/2024/2xxx/CVE-2024-2807.json | 29 +- cves/2024/2xxx/CVE-2024-2808.json | 29 +- cves/2024/2xxx/CVE-2024-2809.json | 29 +- cves/2024/2xxx/CVE-2024-2810.json | 29 +- cves/2024/2xxx/CVE-2024-2811.json | 29 +- cves/2024/2xxx/CVE-2024-2812.json | 29 +- cves/2024/2xxx/CVE-2024-2813.json | 29 +- cves/2024/2xxx/CVE-2024-2814.json | 29 +- cves/2024/2xxx/CVE-2024-2815.json | 29 +- cves/2024/2xxx/CVE-2024-2816.json | 29 +- cves/2024/2xxx/CVE-2024-2817.json | 29 +- cves/2024/2xxx/CVE-2024-2818.json | 13 +- cves/2024/2xxx/CVE-2024-2820.json | 29 +- cves/2024/2xxx/CVE-2024-2821.json | 29 +- cves/2024/2xxx/CVE-2024-2822.json | 29 +- cves/2024/2xxx/CVE-2024-2823.json | 28 +- cves/2024/2xxx/CVE-2024-2824.json | 36 +- cves/2024/2xxx/CVE-2024-2825.json | 30 +- cves/2024/2xxx/CVE-2024-2826.json | 29 +- cves/2024/2xxx/CVE-2024-2827.json | 29 +- cves/2024/2xxx/CVE-2024-2828.json | 37 +- cves/2024/2xxx/CVE-2024-2829.json | 22 +- cves/2024/2xxx/CVE-2024-2830.json | 28 +- cves/2024/2xxx/CVE-2024-2831.json | 16 +- cves/2024/2xxx/CVE-2024-2832.json | 29 +- cves/2024/2xxx/CVE-2024-2833.json | 16 +- cves/2024/2xxx/CVE-2024-2834.json | 11 +- cves/2024/2xxx/CVE-2024-2835.json | 11 +- cves/2024/2xxx/CVE-2024-2836.json | 26 +- cves/2024/2xxx/CVE-2024-2837.json | 13 +- cves/2024/2xxx/CVE-2024-2838.json | 16 +- cves/2024/2xxx/CVE-2024-2839.json | 16 +- cves/2024/2xxx/CVE-2024-2840.json | 16 +- cves/2024/2xxx/CVE-2024-2841.json | 16 +- cves/2024/2xxx/CVE-2024-2842.json | 16 +- cves/2024/2xxx/CVE-2024-2844.json | 22 +- cves/2024/2xxx/CVE-2024-2845.json | 16 +- cves/2024/2xxx/CVE-2024-2846.json | 16 +- cves/2024/2xxx/CVE-2024-2847.json | 16 +- cves/2024/2xxx/CVE-2024-2848.json | 22 +- cves/2024/2xxx/CVE-2024-2849.json | 38 +- cves/2024/2xxx/CVE-2024-2850.json | 29 +- cves/2024/2xxx/CVE-2024-2851.json | 29 +- cves/2024/2xxx/CVE-2024-2852.json | 29 +- cves/2024/2xxx/CVE-2024-2853.json | 29 +- cves/2024/2xxx/CVE-2024-2854.json | 29 +- cves/2024/2xxx/CVE-2024-2855.json | 29 +- cves/2024/2xxx/CVE-2024-2856.json | 37 +- cves/2024/2xxx/CVE-2024-2857.json | 13 +- cves/2024/2xxx/CVE-2024-2858.json | 13 +- cves/2024/2xxx/CVE-2024-2859.json | 10 +- cves/2024/2xxx/CVE-2024-2860.json | 10 +- cves/2024/2xxx/CVE-2024-2861.json | 16 +- cves/2024/2xxx/CVE-2024-2862.json | 10 +- cves/2024/2xxx/CVE-2024-2863.json | 10 +- cves/2024/2xxx/CVE-2024-2864.json | 11 +- cves/2024/2xxx/CVE-2024-2865.json | 10 +- cves/2024/2xxx/CVE-2024-2867.json | 16 +- cves/2024/2xxx/CVE-2024-2868.json | 22 +- cves/2024/2xxx/CVE-2024-2871.json | 28 +- cves/2024/2xxx/CVE-2024-2873.json | 25 +- cves/2024/2xxx/CVE-2024-2874.json | 23 +- cves/2024/2xxx/CVE-2024-2876.json | 28 +- cves/2024/2xxx/CVE-2024-2877.json | 16 +- cves/2024/2xxx/CVE-2024-2879.json | 16 +- cves/2024/2xxx/CVE-2024-2882.json | 22 +- cves/2024/2xxx/CVE-2024-2883.json | 34 +- cves/2024/2xxx/CVE-2024-2885.json | 34 +- cves/2024/2xxx/CVE-2024-2886.json | 34 +- cves/2024/2xxx/CVE-2024-2887.json | 34 +- cves/2024/2xxx/CVE-2024-2888.json | 11 +- cves/2024/2xxx/CVE-2024-2889.json | 11 +- cves/2024/2xxx/CVE-2024-2890.json | 11 +- cves/2024/2xxx/CVE-2024-2891.json | 37 +- cves/2024/2xxx/CVE-2024-2892.json | 37 +- cves/2024/2xxx/CVE-2024-2893.json | 37 +- cves/2024/2xxx/CVE-2024-2894.json | 37 +- cves/2024/2xxx/CVE-2024-2895.json | 50 +- cves/2024/2xxx/CVE-2024-2896.json | 37 +- cves/2024/2xxx/CVE-2024-2897.json | 37 +- cves/2024/2xxx/CVE-2024-2898.json | 37 +- cves/2024/2xxx/CVE-2024-2899.json | 37 +- cves/2024/2xxx/CVE-2024-2900.json | 37 +- cves/2024/2xxx/CVE-2024-2901.json | 37 +- cves/2024/2xxx/CVE-2024-2902.json | 37 +- cves/2024/2xxx/CVE-2024-2903.json | 37 +- cves/2024/2xxx/CVE-2024-2904.json | 11 +- cves/2024/2xxx/CVE-2024-2905.json | 52 +- cves/2024/2xxx/CVE-2024-2906.json | 11 +- cves/2024/2xxx/CVE-2024-2907.json | 13 +- cves/2024/2xxx/CVE-2024-2908.json | 13 +- cves/2024/2xxx/CVE-2024-2909.json | 37 +- cves/2024/2xxx/CVE-2024-2910.json | 50 +- cves/2024/2xxx/CVE-2024-2911.json | 36 +- cves/2024/2xxx/CVE-2024-2912.json | 29 +- cves/2024/2xxx/CVE-2024-2913.json | 10 +- cves/2024/2xxx/CVE-2024-2914.json | 27 +- cves/2024/2xxx/CVE-2024-2915.json | 10 +- cves/2024/2xxx/CVE-2024-2916.json | 37 +- cves/2024/2xxx/CVE-2024-2917.json | 37 +- cves/2024/2xxx/CVE-2024-2918.json | 10 +- cves/2024/2xxx/CVE-2024-2919.json | 16 +- cves/2024/2xxx/CVE-2024-2920.json | 16 +- cves/2024/2xxx/CVE-2024-2921.json | 10 +- cves/2024/2xxx/CVE-2024-2922.json | 16 +- cves/2024/2xxx/CVE-2024-2923.json | 16 +- cves/2024/2xxx/CVE-2024-2924.json | 16 +- cves/2024/2xxx/CVE-2024-2925.json | 22 +- cves/2024/2xxx/CVE-2024-2927.json | 30 +- cves/2024/2xxx/CVE-2024-2928.json | 23 +- cves/2024/2xxx/CVE-2024-2929.json | 10 +- cves/2024/2xxx/CVE-2024-2930.json | 36 +- cves/2024/2xxx/CVE-2024-2931.json | 22 +- cves/2024/2xxx/CVE-2024-2932.json | 38 +- cves/2024/2xxx/CVE-2024-2933.json | 33 +- cves/2024/2xxx/CVE-2024-2934.json | 37 +- cves/2024/2xxx/CVE-2024-2935.json | 37 +- cves/2024/2xxx/CVE-2024-2936.json | 16 +- cves/2024/2xxx/CVE-2024-2938.json | 37 +- cves/delta.json | 2402 ++++++++++++++--------------- cves/deltaLog.json | 1808 ++++++++++++++++++++++ 302 files changed, 9622 insertions(+), 1805 deletions(-) diff --git a/cves/2024/2xxx/CVE-2024-2611.json b/cves/2024/2xxx/CVE-2024-2611.json index 95e08900bbb..e81a2c4b147 100644 --- a/cves/2024/2xxx/CVE-2024-2611.json +++ b/cves/2024/2xxx/CVE-2024-2611.json @@ -8,7 +8,7 @@ "assignerShortName": "mozilla", "dateReserved": "2024-03-18T16:22:30.751Z", "datePublished": "2024-03-19T12:02:55.649Z", - "dateUpdated": "2024-06-21T15:35:49.855Z" + "dateUpdated": "2024-07-05T14:26:39.515Z" }, "containers": { "cna": { @@ -111,7 +111,7 @@ "providerMetadata": { "orgId": "96f1cf3c-f80a-4e0f-a063-99a91e3f1325", "shortName": "secretariat-reference", - "dateUpdated": "2024-06-21T15:35:49.855Z" + "dateUpdated": "2024-07-05T14:26:39.515Z" }, "references": [ { @@ -149,6 +149,42 @@ "tags": [ "x_cve_prog_secretariat_snapshot" ] + }, + { + "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1876675/adp-test-6-28", + "tags": [ + "x_snapshot" + ] + }, + { + "url": "https://www.mozilla.org/security/advisories/mfsa2024-12//adp-test-6-28", + "tags": [ + "x_snapshot" + ] + }, + { + "url": "https://www.mozilla.org/security/advisories/mfsa2024-13//adp-test-6-28", + "tags": [ + "x_snapshot" + ] + }, + { + "url": "https://www.mozilla.org/security/advisories/mfsa2024-14//adp-test-6-28", + "tags": [ + "x_snapshot" + ] + }, + { + "url": "https://lists.debian.org/debian-lts-announce/2024/03/msg00022.html/adp-test-6-28", + "tags": [ + "x_snapshot" + ] + }, + { + "url": "https://lists.debian.org/debian-lts-announce/2024/03/msg00028.html/adp-test-6-28", + "tags": [ + "x_snapshot" + ] } ] } diff --git a/cves/2024/2xxx/CVE-2024-2612.json b/cves/2024/2xxx/CVE-2024-2612.json index 708d49f014f..ea8e0241443 100644 --- a/cves/2024/2xxx/CVE-2024-2612.json +++ b/cves/2024/2xxx/CVE-2024-2612.json @@ -8,7 +8,7 @@ "assignerShortName": "mozilla", "dateReserved": "2024-03-18T16:22:33.156Z", "datePublished": "2024-03-19T12:02:56.196Z", - "dateUpdated": "2024-06-21T15:35:50.291Z" + "dateUpdated": "2024-07-05T14:26:39.581Z" }, "containers": { "cna": { @@ -111,7 +111,7 @@ "providerMetadata": { "orgId": "96f1cf3c-f80a-4e0f-a063-99a91e3f1325", "shortName": "secretariat-reference", - "dateUpdated": "2024-06-21T15:35:50.291Z" + "dateUpdated": "2024-07-05T14:26:39.581Z" }, "references": [ { @@ -149,6 +149,42 @@ "tags": [ "x_cve_prog_secretariat_snapshot" ] + }, + { + "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1879444/adp-test-6-28", + "tags": [ + "x_snapshot" + ] + }, + { + "url": "https://www.mozilla.org/security/advisories/mfsa2024-12//adp-test-6-28", + "tags": [ + "x_snapshot" + ] + }, + { + "url": "https://www.mozilla.org/security/advisories/mfsa2024-13//adp-test-6-28", + "tags": [ + "x_snapshot" + ] + }, + { + "url": "https://www.mozilla.org/security/advisories/mfsa2024-14//adp-test-6-28", + "tags": [ + "x_snapshot" + ] + }, + { + "url": "https://lists.debian.org/debian-lts-announce/2024/03/msg00022.html/adp-test-6-28", + "tags": [ + "x_snapshot" + ] + }, + { + "url": "https://lists.debian.org/debian-lts-announce/2024/03/msg00028.html/adp-test-6-28", + "tags": [ + "x_snapshot" + ] } ] } diff --git a/cves/2024/2xxx/CVE-2024-2613.json b/cves/2024/2xxx/CVE-2024-2613.json index 689fa67b706..f1d03a07425 100644 --- a/cves/2024/2xxx/CVE-2024-2613.json +++ b/cves/2024/2xxx/CVE-2024-2613.json @@ -8,7 +8,7 @@ "assignerShortName": "mozilla", "dateReserved": "2024-03-18T16:22:35.573Z", "datePublished": "2024-03-19T12:02:56.741Z", - "dateUpdated": "2024-06-21T15:35:50.695Z" + "dateUpdated": "2024-07-05T14:26:39.776Z" }, "containers": { "cna": { @@ -75,7 +75,7 @@ "providerMetadata": { "orgId": "96f1cf3c-f80a-4e0f-a063-99a91e3f1325", "shortName": "secretariat-reference", - "dateUpdated": "2024-06-21T15:35:50.695Z" + "dateUpdated": "2024-07-05T14:26:39.776Z" }, "references": [ { @@ -89,6 +89,18 @@ "tags": [ "x_cve_prog_secretariat_snapshot" ] + }, + { + "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1875701/adp-test-6-28", + "tags": [ + "x_snapshot" + ] + }, + { + "url": "https://www.mozilla.org/security/advisories/mfsa2024-12//adp-test-6-28", + "tags": [ + "x_snapshot" + ] } ] } diff --git a/cves/2024/2xxx/CVE-2024-2614.json b/cves/2024/2xxx/CVE-2024-2614.json index cd2b458b261..03d70bf829a 100644 --- a/cves/2024/2xxx/CVE-2024-2614.json +++ b/cves/2024/2xxx/CVE-2024-2614.json @@ -8,7 +8,7 @@ "assignerShortName": "mozilla", "dateReserved": "2024-03-18T16:22:37.757Z", "datePublished": "2024-03-19T12:02:57.272Z", - "dateUpdated": "2024-06-21T15:35:51.109Z" + "dateUpdated": "2024-07-05T14:26:39.782Z" }, "containers": { "cna": { @@ -112,7 +112,7 @@ "providerMetadata": { "orgId": "96f1cf3c-f80a-4e0f-a063-99a91e3f1325", "shortName": "secretariat-reference", - "dateUpdated": "2024-06-21T15:35:51.109Z" + "dateUpdated": "2024-07-05T14:26:39.782Z" }, "references": [ { @@ -151,6 +151,43 @@ "tags": [ "x_cve_prog_secretariat_snapshot" ] + }, + { + "url": "https://bugzilla.mozilla.org/buglist.cgi?bug_id=1685358%2C1861016%2C1880405%2C1881093/adp-test-6-28", + "name": "Memory safety bugs fixed in Firefox 124, Firefox ESR 115.9, and Thunderbird 115.9", + "tags": [ + "x_snapshot" + ] + }, + { + "url": "https://www.mozilla.org/security/advisories/mfsa2024-12//adp-test-6-28", + "tags": [ + "x_snapshot" + ] + }, + { + "url": "https://www.mozilla.org/security/advisories/mfsa2024-13//adp-test-6-28", + "tags": [ + "x_snapshot" + ] + }, + { + "url": "https://www.mozilla.org/security/advisories/mfsa2024-14//adp-test-6-28", + "tags": [ + "x_snapshot" + ] + }, + { + "url": "https://lists.debian.org/debian-lts-announce/2024/03/msg00022.html/adp-test-6-28", + "tags": [ + "x_snapshot" + ] + }, + { + "url": "https://lists.debian.org/debian-lts-announce/2024/03/msg00028.html/adp-test-6-28", + "tags": [ + "x_snapshot" + ] } ] } diff --git a/cves/2024/2xxx/CVE-2024-2615.json b/cves/2024/2xxx/CVE-2024-2615.json index 83e62355e94..0a017a9953b 100644 --- a/cves/2024/2xxx/CVE-2024-2615.json +++ b/cves/2024/2xxx/CVE-2024-2615.json @@ -8,7 +8,7 @@ "assignerShortName": "mozilla", "dateReserved": "2024-03-18T16:22:38.289Z", "datePublished": "2024-03-19T12:02:57.807Z", - "dateUpdated": "2024-06-21T15:35:51.504Z" + "dateUpdated": "2024-07-05T14:26:39.838Z" }, "containers": { "cna": { @@ -76,7 +76,7 @@ "providerMetadata": { "orgId": "96f1cf3c-f80a-4e0f-a063-99a91e3f1325", "shortName": "secretariat-reference", - "dateUpdated": "2024-06-21T15:35:51.504Z" + "dateUpdated": "2024-07-05T14:26:39.838Z" }, "references": [ { @@ -91,6 +91,19 @@ "tags": [ "x_cve_prog_secretariat_snapshot" ] + }, + { + "url": "https://bugzilla.mozilla.org/buglist.cgi?bug_id=1881074%2C1882438%2C1881650/adp-test-6-28", + "name": "Memory safety bugs fixed in Firefox 124", + "tags": [ + "x_snapshot" + ] + }, + { + "url": "https://www.mozilla.org/security/advisories/mfsa2024-12//adp-test-6-28", + "tags": [ + "x_snapshot" + ] } ] } diff --git a/cves/2024/2xxx/CVE-2024-2616.json b/cves/2024/2xxx/CVE-2024-2616.json index 3d35ac43b0d..a55191d5ac7 100644 --- a/cves/2024/2xxx/CVE-2024-2616.json +++ b/cves/2024/2xxx/CVE-2024-2616.json @@ -8,7 +8,7 @@ "assignerShortName": "mozilla", "dateReserved": "2024-03-18T16:22:38.820Z", "datePublished": "2024-03-19T12:02:58.997Z", - "dateUpdated": "2024-06-21T15:35:51.896Z" + "dateUpdated": "2024-07-05T14:26:39.672Z" }, "containers": { "cna": { @@ -96,7 +96,7 @@ "providerMetadata": { "orgId": "96f1cf3c-f80a-4e0f-a063-99a91e3f1325", "shortName": "secretariat-reference", - "dateUpdated": "2024-06-21T15:35:51.896Z" + "dateUpdated": "2024-07-05T14:26:39.672Z" }, "references": [ { @@ -128,6 +128,36 @@ "tags": [ "x_cve_prog_secretariat_snapshot" ] + }, + { + "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1846197/adp-test-6-28", + "tags": [ + "x_snapshot" + ] + }, + { + "url": "https://www.mozilla.org/security/advisories/mfsa2024-13//adp-test-6-28", + "tags": [ + "x_snapshot" + ] + }, + { + "url": "https://www.mozilla.org/security/advisories/mfsa2024-14//adp-test-6-28", + "tags": [ + "x_snapshot" + ] + }, + { + "url": "https://lists.debian.org/debian-lts-announce/2024/03/msg00022.html/adp-test-6-28", + "tags": [ + "x_snapshot" + ] + }, + { + "url": "https://lists.debian.org/debian-lts-announce/2024/03/msg00028.html/adp-test-6-28", + "tags": [ + "x_snapshot" + ] } ] } diff --git a/cves/2024/2xxx/CVE-2024-2617.json b/cves/2024/2xxx/CVE-2024-2617.json index d301faefb0f..0aff47d0b31 100644 --- a/cves/2024/2xxx/CVE-2024-2617.json +++ b/cves/2024/2xxx/CVE-2024-2617.json @@ -8,7 +8,7 @@ "assignerShortName": "Hitachi Energy", "dateReserved": "2024-03-18T17:44:43.352Z", "datePublished": "2024-04-30T12:57:37.143Z", - "dateUpdated": "2024-06-21T15:35:52.435Z" + "dateUpdated": "2024-07-05T14:26:39.862Z" }, "containers": { "cna": { @@ -193,7 +193,7 @@ "providerMetadata": { "orgId": "96f1cf3c-f80a-4e0f-a063-99a91e3f1325", "shortName": "secretariat-reference", - "dateUpdated": "2024-06-21T15:35:52.435Z" + "dateUpdated": "2024-07-05T14:26:39.862Z" }, "references": [ { @@ -201,6 +201,12 @@ "tags": [ "x_cve_prog_secretariat_snapshot" ] + }, + { + "url": "https://publisher.hitachienergy.com/preview?DocumentId=8DBD000199&languageCode=en&Preview=true/adp-test-6-28", + "tags": [ + "x_snapshot" + ] } ] } diff --git a/cves/2024/2xxx/CVE-2024-2618.json b/cves/2024/2xxx/CVE-2024-2618.json index fd3a0e9aaac..5ebdaf567f0 100644 --- a/cves/2024/2xxx/CVE-2024-2618.json +++ b/cves/2024/2xxx/CVE-2024-2618.json @@ -8,7 +8,7 @@ "assignerShortName": "Wordfence", "dateReserved": "2024-03-18T18:31:47.033Z", "datePublished": "2024-05-24T04:29:58.098Z", - "dateUpdated": "2024-06-21T15:35:52.839Z" + "dateUpdated": "2024-07-05T14:26:39.517Z" }, "containers": { "cna": { @@ -121,7 +121,7 @@ "providerMetadata": { "orgId": "96f1cf3c-f80a-4e0f-a063-99a91e3f1325", "shortName": "secretariat-reference", - "dateUpdated": "2024-06-21T15:35:52.839Z" + "dateUpdated": "2024-07-05T14:26:39.517Z" }, "references": [ { @@ -141,6 +141,24 @@ "tags": [ "x_cve_prog_secretariat_snapshot" ] + }, + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/a780ce1b-0758-42ef-88e7-ff8d921eca6e?source=cve/adp-test-6-28", + "tags": [ + "x_snapshot" + ] + }, + { + "url": "https://plugins.trac.wordpress.org/browser/header-footer-elementor/tags/1.6.26/inc/widgets-manager/widgets/class-page-title.php#L494/adp-test-6-28", + "tags": [ + "x_snapshot" + ] + }, + { + "url": "https://plugins.trac.wordpress.org/browser/header-footer-elementor/tags/1.6.26/inc/widgets-manager/widgets/class-site-title.php#L478/adp-test-6-28", + "tags": [ + "x_snapshot" + ] } ] } diff --git a/cves/2024/2xxx/CVE-2024-2619.json b/cves/2024/2xxx/CVE-2024-2619.json index 3814cace91e..b5586f4c3f7 100644 --- a/cves/2024/2xxx/CVE-2024-2619.json +++ b/cves/2024/2xxx/CVE-2024-2619.json @@ -8,7 +8,7 @@ "assignerShortName": "Wordfence", "dateReserved": "2024-03-18T18:58:29.759Z", "datePublished": "2024-05-16T20:31:04.329Z", - "dateUpdated": "2024-06-21T15:35:53.236Z" + "dateUpdated": "2024-07-05T14:26:39.845Z" }, "containers": { "cna": { @@ -125,7 +125,7 @@ "providerMetadata": { "orgId": "96f1cf3c-f80a-4e0f-a063-99a91e3f1325", "shortName": "secretariat-reference", - "dateUpdated": "2024-06-21T15:35:53.236Z" + "dateUpdated": "2024-07-05T14:26:39.845Z" }, "references": [ { @@ -151,6 +151,30 @@ "tags": [ "x_cve_prog_secretariat_snapshot" ] + }, + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/689eb95b-2f72-4aa4-9f21-6ae186346061?source=cve/adp-test-6-28", + "tags": [ + "x_snapshot" + ] + }, + { + "url": "https://plugins.trac.wordpress.org/browser/header-footer-elementor/tags/1.6.25/admin/class-hfe-admin.php#L74/adp-test-6-28", + "tags": [ + "x_snapshot" + ] + }, + { + "url": "https://plugins.trac.wordpress.org/browser/header-footer-elementor/tags/1.6.25/admin/class-hfe-admin.php#L220/adp-test-6-28", + "tags": [ + "x_snapshot" + ] + }, + { + "url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&new=3070659%40header-footer-elementor%2Ftrunk&old=3053177%40header-footer-elementor%2Ftrunk&sfp_email=&sfph_mail=/adp-test-6-28", + "tags": [ + "x_snapshot" + ] } ] } diff --git a/cves/2024/2xxx/CVE-2024-2620.json b/cves/2024/2xxx/CVE-2024-2620.json index f941c8a259a..7da2cbd0fc0 100644 --- a/cves/2024/2xxx/CVE-2024-2620.json +++ b/cves/2024/2xxx/CVE-2024-2620.json @@ -8,7 +8,7 @@ "assignerShortName": "VulDB", "dateReserved": "2024-03-18T19:01:21.701Z", "datePublished": "2024-03-19T01:00:06.531Z", - "dateUpdated": "2024-06-21T15:35:53.627Z" + "dateUpdated": "2024-07-05T14:26:39.868Z" }, "containers": { "cna": { @@ -132,7 +132,7 @@ "providerMetadata": { "orgId": "96f1cf3c-f80a-4e0f-a063-99a91e3f1325", "shortName": "secretariat-reference", - "dateUpdated": "2024-06-21T15:35:53.627Z" + "dateUpdated": "2024-07-05T14:26:39.868Z" }, "references": [ { @@ -160,6 +160,32 @@ "patch", "x_cve_prog_secretariat_snapshot" ] + }, + { + "url": "https://vuldb.com/?id.257197/adp-test-6-28", + "name": "VDB-257197 | Fujian Kelixin Communication Command and Dispatch Platform down_file.php sql injection", + "tags": [ + "vdb-entry", + "technical-description", + "x_snapshot" + ] + }, + { + "url": "https://vuldb.com/?ctiid.257197/adp-test-6-28", + "name": "VDB-257197 | CTI Indicators (IOB, IOC, TTP, IOA)", + "tags": [ + "signature", + "permissions-required", + "x_snapshot" + ] + }, + { + "url": "https://h0e4a0r1t.github.io/2024/vulns/Fujian%20Kelixin%20Communication%20Co.,%20Ltd.%20Command%20and%20Dispatch%20Platform%20SQL%20Injection%20Vulnerability-down_file.pdf/adp-test-6-28", + "tags": [ + "exploit", + "patch", + "x_snapshot" + ] } ] } diff --git a/cves/2024/2xxx/CVE-2024-2621.json b/cves/2024/2xxx/CVE-2024-2621.json index 53d3c6a3545..4eb474be2b5 100644 --- a/cves/2024/2xxx/CVE-2024-2621.json +++ b/cves/2024/2xxx/CVE-2024-2621.json @@ -8,7 +8,7 @@ "assignerShortName": "VulDB", "dateReserved": "2024-03-18T19:01:24.222Z", "datePublished": "2024-03-19T01:00:08.253Z", - "dateUpdated": "2024-06-21T15:35:54.027Z" + "dateUpdated": "2024-07-05T14:26:39.520Z" }, "containers": { "cna": { @@ -132,7 +132,7 @@ "providerMetadata": { "orgId": "96f1cf3c-f80a-4e0f-a063-99a91e3f1325", "shortName": "secretariat-reference", - "dateUpdated": "2024-06-21T15:35:54.027Z" + "dateUpdated": "2024-07-05T14:26:39.520Z" }, "references": [ { @@ -160,6 +160,32 @@ "patch", "x_cve_prog_secretariat_snapshot" ] + }, + { + "url": "https://vuldb.com/?id.257198/adp-test-6-28", + "name": "VDB-257198 | Fujian Kelixin Communication Command and Dispatch Platform pwd_update.php sql injection", + "tags": [ + "vdb-entry", + "technical-description", + "x_snapshot" + ] + }, + { + "url": "https://vuldb.com/?ctiid.257198/adp-test-6-28", + "name": "VDB-257198 | CTI Indicators (IOB, IOC, TTP, IOA)", + "tags": [ + "signature", + "permissions-required", + "x_snapshot" + ] + }, + { + "url": "https://h0e4a0r1t.github.io/2024/vulns/Fujian%20Kelixin%20Communication%20Co.,%20Ltd.%20Command%20and%20Dispatch%20Platform%20SQL%20Injection%20Vulnerability-pwd_update.php.pdf/adp-test-6-28", + "tags": [ + "exploit", + "patch", + "x_snapshot" + ] } ] } diff --git a/cves/2024/2xxx/CVE-2024-2622.json b/cves/2024/2xxx/CVE-2024-2622.json index c23fd9247e4..7f901b45760 100644 --- a/cves/2024/2xxx/CVE-2024-2622.json +++ b/cves/2024/2xxx/CVE-2024-2622.json @@ -8,7 +8,7 @@ "assignerShortName": "VulDB", "dateReserved": "2024-03-18T19:01:26.726Z", "datePublished": "2024-03-19T02:00:07.258Z", - "dateUpdated": "2024-06-21T15:35:54.492Z" + "dateUpdated": "2024-07-05T14:26:39.763Z" }, "containers": { "cna": { @@ -132,7 +132,7 @@ "providerMetadata": { "orgId": "96f1cf3c-f80a-4e0f-a063-99a91e3f1325", "shortName": "secretariat-reference", - "dateUpdated": "2024-06-21T15:35:54.492Z" + "dateUpdated": "2024-07-05T14:26:39.763Z" }, "references": [ { @@ -160,6 +160,32 @@ "patch", "x_cve_prog_secretariat_snapshot" ] + }, + { + "url": "https://vuldb.com/?id.257199/adp-test-6-28", + "name": "VDB-257199 | Fujian Kelixin Communication Command and Dispatch Platform editemedia.php sql injection", + "tags": [ + "vdb-entry", + "technical-description", + "x_snapshot" + ] + }, + { + "url": "https://vuldb.com/?ctiid.257199/adp-test-6-28", + "name": "VDB-257199 | CTI Indicators (IOB, IOC, TTP, IOA)", + "tags": [ + "signature", + "permissions-required", + "x_snapshot" + ] + }, + { + "url": "https://h0e4a0r1t.github.io/2024/vulns/Fujian%20Kelixin%20Communication%20Co.,%20Ltd.%20Command%20and%20Dispatch%20Platform%20SQL%20Injection%20Vulnerability-editemedia.pdf/adp-test-6-28", + "tags": [ + "exploit", + "patch", + "x_snapshot" + ] } ] } diff --git a/cves/2024/2xxx/CVE-2024-2623.json b/cves/2024/2xxx/CVE-2024-2623.json index 6cb1404dccf..1cae8f3e23b 100644 --- a/cves/2024/2xxx/CVE-2024-2623.json +++ b/cves/2024/2xxx/CVE-2024-2623.json @@ -8,7 +8,7 @@ "assignerShortName": "Wordfence", "dateReserved": "2024-03-18T20:38:06.637Z", "datePublished": "2024-04-09T18:59:17.215Z", - "dateUpdated": "2024-06-21T15:35:54.889Z" + "dateUpdated": "2024-07-05T14:26:39.886Z" }, "containers": { "cna": { @@ -121,7 +121,7 @@ "providerMetadata": { "orgId": "96f1cf3c-f80a-4e0f-a063-99a91e3f1325", "shortName": "secretariat-reference", - "dateUpdated": "2024-06-21T15:35:54.889Z" + "dateUpdated": "2024-07-05T14:26:39.886Z" }, "references": [ { @@ -141,6 +141,24 @@ "tags": [ "x_cve_prog_secretariat_snapshot" ] + }, + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/baa92aee-a0a0-45d4-aa12-1449a829930c?source=cve/adp-test-6-28", + "tags": [ + "x_snapshot" + ] + }, + { + "url": "https://plugins.trac.wordpress.org/browser/essential-addons-for-elementor-lite/browser/assets/front-end/js/view/count-down.js/adp-test-6-28", + "tags": [ + "x_snapshot" + ] + }, + { + "url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&new=3058018%40essential-addons-for-elementor-lite%2Ftrunk&old=3050196%40essential-addons-for-elementor-lite%2Ftrunk&sfp_email=&sfph_mail=/adp-test-6-28", + "tags": [ + "x_snapshot" + ] } ] } diff --git a/cves/2024/2xxx/CVE-2024-2624.json b/cves/2024/2xxx/CVE-2024-2624.json index 191678bc8e4..5317a63fb5e 100644 --- a/cves/2024/2xxx/CVE-2024-2624.json +++ b/cves/2024/2xxx/CVE-2024-2624.json @@ -8,7 +8,7 @@ "assignerShortName": "@huntr_ai", "dateReserved": "2024-03-18T23:26:31.471Z", "datePublished": "2024-06-06T18:11:44.254Z", - "dateUpdated": "2024-06-21T15:35:55.303Z" + "dateUpdated": "2024-07-05T14:26:39.836Z" }, "containers": { "cna": { @@ -136,7 +136,7 @@ "providerMetadata": { "orgId": "96f1cf3c-f80a-4e0f-a063-99a91e3f1325", "shortName": "secretariat-reference", - "dateUpdated": "2024-06-21T15:35:55.303Z" + "dateUpdated": "2024-07-05T14:26:39.836Z" }, "references": [ { @@ -150,6 +150,18 @@ "tags": [ "x_cve_prog_secretariat_snapshot" ] + }, + { + "url": "https://huntr.com/bounties/39e17897-0e92-4473-91c7-f728322191aa/adp-test-6-28", + "tags": [ + "x_snapshot" + ] + }, + { + "url": "https://github.com/parisneo/lollms-webui/commit/aeba79f3ea934331b8ecd625a58bae6e4f7e7d3f/adp-test-6-28", + "tags": [ + "x_snapshot" + ] } ] } diff --git a/cves/2024/2xxx/CVE-2024-2625.json b/cves/2024/2xxx/CVE-2024-2625.json index b63a8d05db4..329d7606450 100644 --- a/cves/2024/2xxx/CVE-2024-2625.json +++ b/cves/2024/2xxx/CVE-2024-2625.json @@ -8,7 +8,7 @@ "assignerShortName": "Chrome", "dateReserved": "2024-03-19T02:34:00.387Z", "datePublished": "2024-03-20T17:06:43.112Z", - "dateUpdated": "2024-06-21T15:35:55.691Z" + "dateUpdated": "2024-07-05T14:26:39.865Z" }, "containers": { "cna": { @@ -102,7 +102,7 @@ "providerMetadata": { "orgId": "96f1cf3c-f80a-4e0f-a063-99a91e3f1325", "shortName": "secretariat-reference", - "dateUpdated": "2024-06-21T15:35:55.691Z" + "dateUpdated": "2024-07-05T14:26:39.865Z" }, "references": [ { @@ -134,6 +134,36 @@ "tags": [ "x_cve_prog_secretariat_snapshot" ] + }, + { + "url": "https://chromereleases.googleblog.com/2024/03/stable-channel-update-for-desktop_19.html/adp-test-6-28", + "tags": [ + "x_snapshot" + ] + }, + { + "url": "https://issues.chromium.org/issues/327740539/adp-test-6-28", + "tags": [ + "x_snapshot" + ] + }, + { + "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2D3Z6CRRN4J3IUZPJZVURGMRBN6WFPTU//adp-test-6-28", + "tags": [ + "x_snapshot" + ] + }, + { + "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AQVVW4FLQDIJ2UABGXK2SMS5AUGT54FM//adp-test-6-28", + "tags": [ + "x_snapshot" + ] + }, + { + "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6JINDYFB3MPH43ECTI72BV63K4RXSG22//adp-test-6-28", + "tags": [ + "x_snapshot" + ] } ] } diff --git a/cves/2024/2xxx/CVE-2024-2626.json b/cves/2024/2xxx/CVE-2024-2626.json index f5eaf7030e1..4f1a777d09a 100644 --- a/cves/2024/2xxx/CVE-2024-2626.json +++ b/cves/2024/2xxx/CVE-2024-2626.json @@ -8,7 +8,7 @@ "assignerShortName": "Chrome", "dateReserved": "2024-03-19T02:34:00.578Z", "datePublished": "2024-03-20T17:06:43.596Z", - "dateUpdated": "2024-06-21T15:35:56.090Z" + "dateUpdated": "2024-07-05T14:26:39.871Z" }, "containers": { "cna": { @@ -70,7 +70,7 @@ "providerMetadata": { "orgId": "96f1cf3c-f80a-4e0f-a063-99a91e3f1325", "shortName": "secretariat-reference", - "dateUpdated": "2024-06-21T15:35:56.090Z" + "dateUpdated": "2024-07-05T14:26:39.871Z" }, "references": [ { @@ -102,6 +102,36 @@ "tags": [ "x_cve_prog_secretariat_snapshot" ] + }, + { + "url": "https://chromereleases.googleblog.com/2024/03/stable-channel-update-for-desktop_19.html/adp-test-6-28", + "tags": [ + "x_snapshot" + ] + }, + { + "url": "https://issues.chromium.org/issues/40945098/adp-test-6-28", + "tags": [ + "x_snapshot" + ] + }, + { + "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2D3Z6CRRN4J3IUZPJZVURGMRBN6WFPTU//adp-test-6-28", + "tags": [ + "x_snapshot" + ] + }, + { + "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AQVVW4FLQDIJ2UABGXK2SMS5AUGT54FM//adp-test-6-28", + "tags": [ + "x_snapshot" + ] + }, + { + "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6JINDYFB3MPH43ECTI72BV63K4RXSG22//adp-test-6-28", + "tags": [ + "x_snapshot" + ] } ] } diff --git a/cves/2024/2xxx/CVE-2024-2627.json b/cves/2024/2xxx/CVE-2024-2627.json index ab47d194719..0746294a045 100644 --- a/cves/2024/2xxx/CVE-2024-2627.json +++ b/cves/2024/2xxx/CVE-2024-2627.json @@ -8,7 +8,7 @@ "assignerShortName": "Chrome", "dateReserved": "2024-03-19T02:34:00.821Z", "datePublished": "2024-03-20T17:06:44.065Z", - "dateUpdated": "2024-06-21T15:35:56.557Z" + "dateUpdated": "2024-07-05T14:26:39.809Z" }, "containers": { "cna": { @@ -102,7 +102,7 @@ "providerMetadata": { "orgId": "96f1cf3c-f80a-4e0f-a063-99a91e3f1325", "shortName": "secretariat-reference", - "dateUpdated": "2024-06-21T15:35:56.557Z" + "dateUpdated": "2024-07-05T14:26:39.809Z" }, "references": [ { @@ -134,6 +134,36 @@ "tags": [ "x_cve_prog_secretariat_snapshot" ] + }, + { + "url": "https://chromereleases.googleblog.com/2024/03/stable-channel-update-for-desktop_19.html/adp-test-6-28", + "tags": [ + "x_snapshot" + ] + }, + { + "url": "https://issues.chromium.org/issues/41493290/adp-test-6-28", + "tags": [ + "x_snapshot" + ] + }, + { + "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2D3Z6CRRN4J3IUZPJZVURGMRBN6WFPTU//adp-test-6-28", + "tags": [ + "x_snapshot" + ] + }, + { + "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AQVVW4FLQDIJ2UABGXK2SMS5AUGT54FM//adp-test-6-28", + "tags": [ + "x_snapshot" + ] + }, + { + "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6JINDYFB3MPH43ECTI72BV63K4RXSG22//adp-test-6-28", + "tags": [ + "x_snapshot" + ] } ] } diff --git a/cves/2024/2xxx/CVE-2024-2628.json b/cves/2024/2xxx/CVE-2024-2628.json index 90edfad62d6..636d7562527 100644 --- a/cves/2024/2xxx/CVE-2024-2628.json +++ b/cves/2024/2xxx/CVE-2024-2628.json @@ -8,7 +8,7 @@ "assignerShortName": "Chrome", "dateReserved": "2024-03-19T02:34:01.117Z", "datePublished": "2024-03-20T17:06:44.345Z", - "dateUpdated": "2024-06-21T15:35:56.970Z" + "dateUpdated": "2024-07-05T14:26:39.616Z" }, "containers": { "cna": { @@ -70,7 +70,7 @@ "providerMetadata": { "orgId": "96f1cf3c-f80a-4e0f-a063-99a91e3f1325", "shortName": "secretariat-reference", - "dateUpdated": "2024-06-21T15:35:56.970Z" + "dateUpdated": "2024-07-05T14:26:39.616Z" }, "references": [ { @@ -102,6 +102,36 @@ "tags": [ "x_cve_prog_secretariat_snapshot" ] + }, + { + "url": "https://chromereleases.googleblog.com/2024/03/stable-channel-update-for-desktop_19.html/adp-test-6-28", + "tags": [ + "x_snapshot" + ] + }, + { + "url": "https://issues.chromium.org/issues/41487774/adp-test-6-28", + "tags": [ + "x_snapshot" + ] + }, + { + "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2D3Z6CRRN4J3IUZPJZVURGMRBN6WFPTU//adp-test-6-28", + "tags": [ + "x_snapshot" + ] + }, + { + "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AQVVW4FLQDIJ2UABGXK2SMS5AUGT54FM//adp-test-6-28", + "tags": [ + "x_snapshot" + ] + }, + { + "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6JINDYFB3MPH43ECTI72BV63K4RXSG22//adp-test-6-28", + "tags": [ + "x_snapshot" + ] } ] } diff --git a/cves/2024/2xxx/CVE-2024-2629.json b/cves/2024/2xxx/CVE-2024-2629.json index 70ff278faaf..6ebfdc058f1 100644 --- a/cves/2024/2xxx/CVE-2024-2629.json +++ b/cves/2024/2xxx/CVE-2024-2629.json @@ -8,7 +8,7 @@ "assignerShortName": "Chrome", "dateReserved": "2024-03-19T02:34:01.326Z", "datePublished": "2024-03-20T17:06:44.739Z", - "dateUpdated": "2024-06-21T15:35:57.363Z" + "dateUpdated": "2024-07-05T14:26:39.513Z" }, "containers": { "cna": { @@ -70,7 +70,7 @@ "providerMetadata": { "orgId": "96f1cf3c-f80a-4e0f-a063-99a91e3f1325", "shortName": "secretariat-reference", - "dateUpdated": "2024-06-21T15:35:57.363Z" + "dateUpdated": "2024-07-05T14:26:39.513Z" }, "references": [ { @@ -102,6 +102,36 @@ "tags": [ "x_cve_prog_secretariat_snapshot" ] + }, + { + "url": "https://chromereleases.googleblog.com/2024/03/stable-channel-update-for-desktop_19.html/adp-test-6-28", + "tags": [ + "x_snapshot" + ] + }, + { + "url": "https://issues.chromium.org/issues/41487721/adp-test-6-28", + "tags": [ + "x_snapshot" + ] + }, + { + "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2D3Z6CRRN4J3IUZPJZVURGMRBN6WFPTU//adp-test-6-28", + "tags": [ + "x_snapshot" + ] + }, + { + "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AQVVW4FLQDIJ2UABGXK2SMS5AUGT54FM//adp-test-6-28", + "tags": [ + "x_snapshot" + ] + }, + { + "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6JINDYFB3MPH43ECTI72BV63K4RXSG22//adp-test-6-28", + "tags": [ + "x_snapshot" + ] } ] } diff --git a/cves/2024/2xxx/CVE-2024-2630.json b/cves/2024/2xxx/CVE-2024-2630.json index c81bd74d253..1a76559595b 100644 --- a/cves/2024/2xxx/CVE-2024-2630.json +++ b/cves/2024/2xxx/CVE-2024-2630.json @@ -8,7 +8,7 @@ "assignerShortName": "Chrome", "dateReserved": "2024-03-19T02:34:01.493Z", "datePublished": "2024-03-20T17:06:45.186Z", - "dateUpdated": "2024-06-21T15:35:57.816Z" + "dateUpdated": "2024-07-05T14:26:39.885Z" }, "containers": { "cna": { @@ -70,7 +70,7 @@ "providerMetadata": { "orgId": "96f1cf3c-f80a-4e0f-a063-99a91e3f1325", "shortName": "secretariat-reference", - "dateUpdated": "2024-06-21T15:35:57.816Z" + "dateUpdated": "2024-07-05T14:26:39.885Z" }, "references": [ { @@ -102,6 +102,36 @@ "tags": [ "x_cve_prog_secretariat_snapshot" ] + }, + { + "url": "https://chromereleases.googleblog.com/2024/03/stable-channel-update-for-desktop_19.html/adp-test-6-28", + "tags": [ + "x_snapshot" + ] + }, + { + "url": "https://issues.chromium.org/issues/41481877/adp-test-6-28", + "tags": [ + "x_snapshot" + ] + }, + { + "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2D3Z6CRRN4J3IUZPJZVURGMRBN6WFPTU//adp-test-6-28", + "tags": [ + "x_snapshot" + ] + }, + { + "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AQVVW4FLQDIJ2UABGXK2SMS5AUGT54FM//adp-test-6-28", + "tags": [ + "x_snapshot" + ] + }, + { + "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6JINDYFB3MPH43ECTI72BV63K4RXSG22//adp-test-6-28", + "tags": [ + "x_snapshot" + ] } ] } diff --git a/cves/2024/2xxx/CVE-2024-2631.json b/cves/2024/2xxx/CVE-2024-2631.json index 378e9924a0b..4147e81b187 100644 --- a/cves/2024/2xxx/CVE-2024-2631.json +++ b/cves/2024/2xxx/CVE-2024-2631.json @@ -8,7 +8,7 @@ "assignerShortName": "Chrome", "dateReserved": "2024-03-19T02:34:01.627Z", "datePublished": "2024-03-20T17:06:45.472Z", - "dateUpdated": "2024-06-21T15:35:58.307Z" + "dateUpdated": "2024-07-05T14:26:39.882Z" }, "containers": { "cna": { @@ -70,7 +70,7 @@ "providerMetadata": { "orgId": "96f1cf3c-f80a-4e0f-a063-99a91e3f1325", "shortName": "secretariat-reference", - "dateUpdated": "2024-06-21T15:35:58.307Z" + "dateUpdated": "2024-07-05T14:26:39.882Z" }, "references": [ { @@ -102,6 +102,36 @@ "tags": [ "x_cve_prog_secretariat_snapshot" ] + }, + { + "url": "https://chromereleases.googleblog.com/2024/03/stable-channel-update-for-desktop_19.html/adp-test-6-28", + "tags": [ + "x_snapshot" + ] + }, + { + "url": "https://issues.chromium.org/issues/41495878/adp-test-6-28", + "tags": [ + "x_snapshot" + ] + }, + { + "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2D3Z6CRRN4J3IUZPJZVURGMRBN6WFPTU//adp-test-6-28", + "tags": [ + "x_snapshot" + ] + }, + { + "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AQVVW4FLQDIJ2UABGXK2SMS5AUGT54FM//adp-test-6-28", + "tags": [ + "x_snapshot" + ] + }, + { + "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6JINDYFB3MPH43ECTI72BV63K4RXSG22//adp-test-6-28", + "tags": [ + "x_snapshot" + ] } ] } diff --git a/cves/2024/2xxx/CVE-2024-2632.json b/cves/2024/2xxx/CVE-2024-2632.json index ba59ced68a8..1d64d3a0120 100644 --- a/cves/2024/2xxx/CVE-2024-2632.json +++ b/cves/2024/2xxx/CVE-2024-2632.json @@ -8,7 +8,7 @@ "assignerShortName": "INCIBE", "dateReserved": "2024-03-19T06:44:29.035Z", "datePublished": "2024-03-19T11:58:39.831Z", - "dateUpdated": "2024-06-21T15:35:58.735Z" + "dateUpdated": "2024-07-05T14:26:39.896Z" }, "containers": { "cna": { @@ -136,7 +136,7 @@ "providerMetadata": { "orgId": "96f1cf3c-f80a-4e0f-a063-99a91e3f1325", "shortName": "secretariat-reference", - "dateUpdated": "2024-06-21T15:35:58.735Z" + "dateUpdated": "2024-07-05T14:26:39.896Z" }, "references": [ { @@ -144,6 +144,12 @@ "tags": [ "x_cve_prog_secretariat_snapshot" ] + }, + { + "url": "https://www.incibe.es/en/incibe-cert/notices/aviso/multiple-vulnerabilities-meta4-hr-cegid/adp-test-6-28", + "tags": [ + "x_snapshot" + ] } ] } diff --git a/cves/2024/2xxx/CVE-2024-2633.json b/cves/2024/2xxx/CVE-2024-2633.json index 9e29c55d52b..27c2d89777e 100644 --- a/cves/2024/2xxx/CVE-2024-2633.json +++ b/cves/2024/2xxx/CVE-2024-2633.json @@ -8,7 +8,7 @@ "assignerShortName": "INCIBE", "dateReserved": "2024-03-19T06:44:58.359Z", "datePublished": "2024-03-19T12:03:45.365Z", - "dateUpdated": "2024-06-21T15:35:59.172Z" + "dateUpdated": "2024-07-05T14:26:40.205Z" }, "containers": { "cna": { @@ -162,7 +162,7 @@ "providerMetadata": { "orgId": "96f1cf3c-f80a-4e0f-a063-99a91e3f1325", "shortName": "secretariat-reference", - "dateUpdated": "2024-06-21T15:35:59.172Z" + "dateUpdated": "2024-07-05T14:26:40.205Z" }, "references": [ { @@ -170,6 +170,12 @@ "tags": [ "x_cve_prog_secretariat_snapshot" ] + }, + { + "url": "https://www.incibe.es/en/incibe-cert/notices/aviso/multiple-vulnerabilities-meta4-hr-cegid/adp-test-6-28", + "tags": [ + "x_snapshot" + ] } ] } diff --git a/cves/2024/2xxx/CVE-2024-2634.json b/cves/2024/2xxx/CVE-2024-2634.json index 1e7f043b616..25641e1e8d6 100644 --- a/cves/2024/2xxx/CVE-2024-2634.json +++ b/cves/2024/2xxx/CVE-2024-2634.json @@ -8,7 +8,7 @@ "assignerShortName": "INCIBE", "dateReserved": "2024-03-19T06:45:00.266Z", "datePublished": "2024-03-19T12:08:21.536Z", - "dateUpdated": "2024-06-21T15:35:59.588Z" + "dateUpdated": "2024-07-05T14:26:39.881Z" }, "containers": { "cna": { @@ -162,7 +162,7 @@ "providerMetadata": { "orgId": "96f1cf3c-f80a-4e0f-a063-99a91e3f1325", "shortName": "secretariat-reference", - "dateUpdated": "2024-06-21T15:35:59.588Z" + "dateUpdated": "2024-07-05T14:26:39.881Z" }, "references": [ { @@ -170,6 +170,12 @@ "tags": [ "x_cve_prog_secretariat_snapshot" ] + }, + { + "url": "https://www.incibe.es/en/incibe-cert/notices/aviso/multiple-vulnerabilities-meta4-hr-cegid/adp-test-6-28", + "tags": [ + "x_snapshot" + ] } ] } diff --git a/cves/2024/2xxx/CVE-2024-2635.json b/cves/2024/2xxx/CVE-2024-2635.json index 00012bf018d..22b5a7058b7 100644 --- a/cves/2024/2xxx/CVE-2024-2635.json +++ b/cves/2024/2xxx/CVE-2024-2635.json @@ -8,7 +8,7 @@ "assignerShortName": "INCIBE", "dateReserved": "2024-03-19T06:45:01.569Z", "datePublished": "2024-03-19T12:09:48.232Z", - "dateUpdated": "2024-06-21T15:36:00.099Z" + "dateUpdated": "2024-07-05T14:26:40.215Z" }, "containers": { "cna": { @@ -120,7 +120,7 @@ "providerMetadata": { "orgId": "96f1cf3c-f80a-4e0f-a063-99a91e3f1325", "shortName": "secretariat-reference", - "dateUpdated": "2024-06-21T15:36:00.099Z" + "dateUpdated": "2024-07-05T14:26:40.215Z" }, "references": [ { @@ -128,6 +128,12 @@ "tags": [ "x_cve_prog_secretariat_snapshot" ] + }, + { + "url": "https://www.incibe.es/en/incibe-cert/notices/aviso/multiple-vulnerabilities-meta4-hr-cegid/adp-test-6-28", + "tags": [ + "x_snapshot" + ] } ] } diff --git a/cves/2024/2xxx/CVE-2024-2636.json b/cves/2024/2xxx/CVE-2024-2636.json index fb8b9e0afc4..93a67bedca5 100644 --- a/cves/2024/2xxx/CVE-2024-2636.json +++ b/cves/2024/2xxx/CVE-2024-2636.json @@ -8,7 +8,7 @@ "assignerShortName": "INCIBE", "dateReserved": "2024-03-19T06:45:02.871Z", "datePublished": "2024-03-19T12:12:13.392Z", - "dateUpdated": "2024-06-21T15:36:00.511Z" + "dateUpdated": "2024-07-05T14:26:39.974Z" }, "containers": { "cna": { @@ -131,7 +131,7 @@ "providerMetadata": { "orgId": "96f1cf3c-f80a-4e0f-a063-99a91e3f1325", "shortName": "secretariat-reference", - "dateUpdated": "2024-06-21T15:36:00.511Z" + "dateUpdated": "2024-07-05T14:26:39.974Z" }, "references": [ { @@ -139,6 +139,12 @@ "tags": [ "x_cve_prog_secretariat_snapshot" ] + }, + { + "url": "https://www.incibe.es/en/incibe-cert/notices/aviso/multiple-vulnerabilities-meta4-hr-cegid/adp-test-6-28", + "tags": [ + "x_snapshot" + ] } ] } diff --git a/cves/2024/2xxx/CVE-2024-2637.json b/cves/2024/2xxx/CVE-2024-2637.json index 54f6cbd4202..35d6e0b07c7 100644 --- a/cves/2024/2xxx/CVE-2024-2637.json +++ b/cves/2024/2xxx/CVE-2024-2637.json @@ -8,7 +8,7 @@ "assignerShortName": "ABB", "dateReserved": "2024-03-19T08:15:24.368Z", "datePublished": "2024-05-14T18:49:28.624Z", - "dateUpdated": "2024-06-21T15:36:00.898Z" + "dateUpdated": "2024-07-05T14:26:39.781Z" }, "containers": { "cna": { @@ -319,7 +319,7 @@ "providerMetadata": { "orgId": "96f1cf3c-f80a-4e0f-a063-99a91e3f1325", "shortName": "secretariat-reference", - "dateUpdated": "2024-06-21T15:36:00.898Z" + "dateUpdated": "2024-07-05T14:26:39.781Z" }, "references": [ { @@ -327,6 +327,12 @@ "tags": [ "x_cve_prog_secretariat_snapshot" ] + }, + { + "url": "https://www.br-automation.com/fileadmin/SA24P005_Insecure_Loading_of_Code-c7d9e49c.pdf/adp-test-6-28", + "tags": [ + "x_snapshot" + ] } ] } diff --git a/cves/2024/2xxx/CVE-2024-2639.json b/cves/2024/2xxx/CVE-2024-2639.json index fe19b115a86..e67ee8ada10 100644 --- a/cves/2024/2xxx/CVE-2024-2639.json +++ b/cves/2024/2xxx/CVE-2024-2639.json @@ -8,7 +8,7 @@ "assignerShortName": "VulDB", "dateReserved": "2024-03-19T09:40:54.274Z", "datePublished": "2024-03-19T15:00:06.206Z", - "dateUpdated": "2024-06-21T15:36:01.407Z" + "dateUpdated": "2024-07-05T14:26:40.225Z" }, "containers": { "cna": { @@ -130,7 +130,7 @@ "providerMetadata": { "orgId": "96f1cf3c-f80a-4e0f-a063-99a91e3f1325", "shortName": "secretariat-reference", - "dateUpdated": "2024-06-21T15:36:01.407Z" + "dateUpdated": "2024-07-05T14:26:40.225Z" }, "references": [ { @@ -156,6 +156,30 @@ "exploit", "x_cve_prog_secretariat_snapshot" ] + }, + { + "url": "https://vuldb.com/?id.257245/adp-test-6-28", + "name": "VDB-257245 | Bdtask Wholesale Inventory Management System session fixiation", + "tags": [ + "vdb-entry", + "x_snapshot" + ] + }, + { + "url": "https://vuldb.com/?ctiid.257245/adp-test-6-28", + "name": "VDB-257245 | CTI Indicators (IOB, IOC)", + "tags": [ + "signature", + "permissions-required", + "x_snapshot" + ] + }, + { + "url": "https://drive.google.com/file/d/1bNnSNssAeQFkO0FdW_yaEvDg5XExMPaf/view?usp=drivesdk/adp-test-6-28", + "tags": [ + "exploit", + "x_snapshot" + ] } ] } diff --git a/cves/2024/2xxx/CVE-2024-2641.json b/cves/2024/2xxx/CVE-2024-2641.json index 7118f6fa79f..c67206d4af9 100644 --- a/cves/2024/2xxx/CVE-2024-2641.json +++ b/cves/2024/2xxx/CVE-2024-2641.json @@ -8,7 +8,7 @@ "assignerShortName": "VulDB", "dateReserved": "2024-03-19T13:35:12.606Z", "datePublished": "2024-03-19T20:31:04.208Z", - "dateUpdated": "2024-06-21T15:36:01.848Z" + "dateUpdated": "2024-07-05T14:26:41.805Z" }, "containers": { "cna": { @@ -133,7 +133,7 @@ "providerMetadata": { "orgId": "96f1cf3c-f80a-4e0f-a063-99a91e3f1325", "shortName": "secretariat-reference", - "dateUpdated": "2024-06-21T15:36:01.848Z" + "dateUpdated": "2024-07-05T14:26:41.805Z" }, "references": [ { @@ -159,6 +159,30 @@ "exploit", "x_cve_prog_secretariat_snapshot" ] + }, + { + "url": "https://vuldb.com/?id.257280/adp-test-6-28", + "name": "VDB-257280 | Ruijie RG-NBS2009G-P Password passwdManage.htm improper authorization", + "tags": [ + "vdb-entry", + "x_snapshot" + ] + }, + { + "url": "https://vuldb.com/?ctiid.257280/adp-test-6-28", + "name": "VDB-257280 | CTI Indicators (IOB, IOC, TTP, IOA)", + "tags": [ + "signature", + "permissions-required", + "x_snapshot" + ] + }, + { + "url": "https://h0e4a0r1t.github.io/2024/vulns/Unauthorized%20access%20vulnerability%20in%20Ruijie%20RG-NBS2009G-P%20switch.pdf/adp-test-6-28", + "tags": [ + "exploit", + "x_snapshot" + ] } ] } diff --git a/cves/2024/2xxx/CVE-2024-2642.json b/cves/2024/2xxx/CVE-2024-2642.json index 06797cf4507..d97f60ef141 100644 --- a/cves/2024/2xxx/CVE-2024-2642.json +++ b/cves/2024/2xxx/CVE-2024-2642.json @@ -8,7 +8,7 @@ "assignerShortName": "VulDB", "dateReserved": "2024-03-19T13:35:14.712Z", "datePublished": "2024-03-19T21:31:03.872Z", - "dateUpdated": "2024-06-21T15:36:02.256Z" + "dateUpdated": "2024-07-05T14:26:39.697Z" }, "containers": { "cna": { @@ -131,7 +131,7 @@ "providerMetadata": { "orgId": "96f1cf3c-f80a-4e0f-a063-99a91e3f1325", "shortName": "secretariat-reference", - "dateUpdated": "2024-06-21T15:36:02.256Z" + "dateUpdated": "2024-07-05T14:26:39.697Z" }, "references": [ { @@ -158,6 +158,31 @@ "exploit", "x_cve_prog_secretariat_snapshot" ] + }, + { + "url": "https://vuldb.com/?id.257281/adp-test-6-28", + "name": "VDB-257281 | Ruijie RG-NBS2009G-P EXCU_SHELL command injection", + "tags": [ + "vdb-entry", + "technical-description", + "x_snapshot" + ] + }, + { + "url": "https://vuldb.com/?ctiid.257281/adp-test-6-28", + "name": "VDB-257281 | CTI Indicators (IOB, IOC, TTP, IOA)", + "tags": [ + "signature", + "permissions-required", + "x_snapshot" + ] + }, + { + "url": "https://h0e4a0r1t.github.io/2024/vulns/Ruijie%20RG-NBS2009G-P%20switch%20has%20a%20foreground%20CLI%20command%20injection%20vulnerability.pdf/adp-test-6-28", + "tags": [ + "exploit", + "x_snapshot" + ] } ] } diff --git a/cves/2024/2xxx/CVE-2024-2644.json b/cves/2024/2xxx/CVE-2024-2644.json index 11beaa1ddda..802100fc5ba 100644 --- a/cves/2024/2xxx/CVE-2024-2644.json +++ b/cves/2024/2xxx/CVE-2024-2644.json @@ -1,6 +1,6 @@ { "dataType": "CVE_RECORD", - "dataVersion": "5.0", + "dataVersion": "5.1", "cveMetadata": { "cveId": "CVE-2024-2644", "assignerOrgId": "1af790b2-7ee1-4545-860a-a788eba489b5", @@ -8,7 +8,7 @@ "assignerShortName": "VulDB", "dateReserved": "2024-03-19T13:48:03.675Z", "datePublished": "2024-03-19T22:00:06.233Z", - "dateUpdated": "2024-06-05T20:00:21.067Z" + "dateUpdated": "2024-07-05T14:26:39.895Z" }, "containers": { "cna": { @@ -125,6 +125,42 @@ ] } ] - } + }, + "adp": [ + { + "providerMetadata": { + "orgId": "96f1cf3c-f80a-4e0f-a063-99a91e3f1325", + "shortName": "secretariat-reference", + "dateUpdated": "2024-07-05T14:26:39.895Z" + }, + "references": [ + { + "url": "https://vuldb.com/?id.257282/adp-test-6-28", + "name": "VDB-257282 | Netentsec NS-ASG Application Security Gateway addfirewall.php sql injection", + "tags": [ + "vdb-entry", + "technical-description", + "x_snapshot" + ] + }, + { + "url": "https://vuldb.com/?ctiid.257282/adp-test-6-28", + "name": "VDB-257282 | CTI Indicators (IOB, IOC, TTP, IOA)", + "tags": [ + "signature", + "permissions-required", + "x_snapshot" + ] + }, + { + "url": "https://github.com/hundanchen69/cve/blob/main/NS-ASG-sql-laddfirewall.md/adp-test-6-28", + "tags": [ + "exploit", + "x_snapshot" + ] + } + ] + } + ] } } \ No newline at end of file diff --git a/cves/2024/2xxx/CVE-2024-2645.json b/cves/2024/2xxx/CVE-2024-2645.json index b472fe30304..62806bc91ba 100644 --- a/cves/2024/2xxx/CVE-2024-2645.json +++ b/cves/2024/2xxx/CVE-2024-2645.json @@ -8,7 +8,7 @@ "assignerShortName": "VulDB", "dateReserved": "2024-03-19T13:48:18.779Z", "datePublished": "2024-03-19T22:31:04.320Z", - "dateUpdated": "2024-06-27T19:15:45.652Z" + "dateUpdated": "2024-07-05T14:26:39.854Z" }, "containers": { "cna": { @@ -131,7 +131,7 @@ "providerMetadata": { "orgId": "96f1cf3c-f80a-4e0f-a063-99a91e3f1325", "shortName": "secretariat-reference", - "dateUpdated": "2024-06-21T15:36:02.776Z" + "dateUpdated": "2024-07-05T14:26:39.854Z" }, "references": [ { @@ -158,6 +158,31 @@ "exploit", "x_cve_prog_secretariat_snapshot" ] + }, + { + "url": "https://vuldb.com/?id.257283/adp-test-6-28", + "name": "VDB-257283 | Netentsec NS-ASG Application Security Gateway resetpwd.php xpath injection", + "tags": [ + "vdb-entry", + "technical-description", + "x_snapshot" + ] + }, + { + "url": "https://vuldb.com/?ctiid.257283/adp-test-6-28", + "name": "VDB-257283 | CTI Indicators (IOB, IOC, TTP, IOA)", + "tags": [ + "signature", + "permissions-required", + "x_snapshot" + ] + }, + { + "url": "https://github.com/flyyue2001/cve/blob/main/NS-ASG-sql-laddfirewall.md/adp-test-6-28", + "tags": [ + "exploit", + "x_snapshot" + ] } ] } diff --git a/cves/2024/2xxx/CVE-2024-2646.json b/cves/2024/2xxx/CVE-2024-2646.json index b3aa89f3203..846a0a7fa6a 100644 --- a/cves/2024/2xxx/CVE-2024-2646.json +++ b/cves/2024/2xxx/CVE-2024-2646.json @@ -8,7 +8,7 @@ "assignerShortName": "VulDB", "dateReserved": "2024-03-19T13:48:20.802Z", "datePublished": "2024-03-19T22:31:05.692Z", - "dateUpdated": "2024-06-21T15:36:03.239Z" + "dateUpdated": "2024-07-05T14:26:40.071Z" }, "containers": { "cna": { @@ -131,7 +131,7 @@ "providerMetadata": { "orgId": "96f1cf3c-f80a-4e0f-a063-99a91e3f1325", "shortName": "secretariat-reference", - "dateUpdated": "2024-06-21T15:36:03.239Z" + "dateUpdated": "2024-07-05T14:26:40.071Z" }, "references": [ { @@ -158,6 +158,31 @@ "exploit", "x_cve_prog_secretariat_snapshot" ] + }, + { + "url": "https://vuldb.com/?id.257284/adp-test-6-28", + "name": "VDB-257284 | Netentsec NS-ASG Application Security Gateway sql injection", + "tags": [ + "vdb-entry", + "technical-description", + "x_snapshot" + ] + }, + { + "url": "https://vuldb.com/?ctiid.257284/adp-test-6-28", + "name": "VDB-257284 | CTI Indicators (IOB, IOC, TTP, IOA)", + "tags": [ + "signature", + "permissions-required", + "x_snapshot" + ] + }, + { + "url": "https://github.com/flyyue2001/cve/blob/main/NS-ASG-sql-index.md/adp-test-6-28", + "tags": [ + "exploit", + "x_snapshot" + ] } ] } diff --git a/cves/2024/2xxx/CVE-2024-2647.json b/cves/2024/2xxx/CVE-2024-2647.json index 3e44cb894c1..3a552cb0b9e 100644 --- a/cves/2024/2xxx/CVE-2024-2647.json +++ b/cves/2024/2xxx/CVE-2024-2647.json @@ -8,7 +8,7 @@ "assignerShortName": "VulDB", "dateReserved": "2024-03-19T13:48:25.941Z", "datePublished": "2024-03-19T23:00:06.786Z", - "dateUpdated": "2024-06-21T15:36:03.634Z" + "dateUpdated": "2024-07-05T14:26:40.056Z" }, "containers": { "cna": { @@ -131,7 +131,7 @@ "providerMetadata": { "orgId": "96f1cf3c-f80a-4e0f-a063-99a91e3f1325", "shortName": "secretariat-reference", - "dateUpdated": "2024-06-21T15:36:03.634Z" + "dateUpdated": "2024-07-05T14:26:40.056Z" }, "references": [ { @@ -158,6 +158,31 @@ "exploit", "x_cve_prog_secretariat_snapshot" ] + }, + { + "url": "https://vuldb.com/?id.257285/adp-test-6-28", + "name": "VDB-257285 | Netentsec NS-ASG Application Security Gateway singlelogin.php sql injection", + "tags": [ + "vdb-entry", + "technical-description", + "x_snapshot" + ] + }, + { + "url": "https://vuldb.com/?ctiid.257285/adp-test-6-28", + "name": "VDB-257285 | CTI Indicators (IOB, IOC, TTP, IOA)", + "tags": [ + "signature", + "permissions-required", + "x_snapshot" + ] + }, + { + "url": "https://github.com/flyyue2001/cve/blob/main/NS-ASG-sql-singlelogin.md/adp-test-6-28", + "tags": [ + "exploit", + "x_snapshot" + ] } ] } diff --git a/cves/2024/2xxx/CVE-2024-2648.json b/cves/2024/2xxx/CVE-2024-2648.json index 8cb0a5cab67..94f208e29e1 100644 --- a/cves/2024/2xxx/CVE-2024-2648.json +++ b/cves/2024/2xxx/CVE-2024-2648.json @@ -8,7 +8,7 @@ "assignerShortName": "VulDB", "dateReserved": "2024-03-19T13:48:30.756Z", "datePublished": "2024-03-19T23:00:08.417Z", - "dateUpdated": "2024-06-21T15:36:04.027Z" + "dateUpdated": "2024-07-05T14:26:40.124Z" }, "containers": { "cna": { @@ -131,7 +131,7 @@ "providerMetadata": { "orgId": "96f1cf3c-f80a-4e0f-a063-99a91e3f1325", "shortName": "secretariat-reference", - "dateUpdated": "2024-06-21T15:36:04.027Z" + "dateUpdated": "2024-07-05T14:26:40.124Z" }, "references": [ { @@ -158,6 +158,31 @@ "exploit", "x_cve_prog_secretariat_snapshot" ] + }, + { + "url": "https://vuldb.com/?id.257286/adp-test-6-28", + "name": "VDB-257286 | Netentsec NS-ASG Application Security Gateway naccheck.php xpath injection", + "tags": [ + "vdb-entry", + "technical-description", + "x_snapshot" + ] + }, + { + "url": "https://vuldb.com/?ctiid.257286/adp-test-6-28", + "name": "VDB-257286 | CTI Indicators (IOB, IOC, TTP, IOA)", + "tags": [ + "signature", + "permissions-required", + "x_snapshot" + ] + }, + { + "url": "https://github.com/flyyue2001/cve/blob/main/NS-ASG-sql-naccheck.md/adp-test-6-28", + "tags": [ + "exploit", + "x_snapshot" + ] } ] } diff --git a/cves/2024/2xxx/CVE-2024-2649.json b/cves/2024/2xxx/CVE-2024-2649.json index 00d9b619494..2b69571422b 100644 --- a/cves/2024/2xxx/CVE-2024-2649.json +++ b/cves/2024/2xxx/CVE-2024-2649.json @@ -8,7 +8,7 @@ "assignerShortName": "VulDB", "dateReserved": "2024-03-19T13:48:35.460Z", "datePublished": "2024-03-19T23:31:04.748Z", - "dateUpdated": "2024-06-21T15:36:04.421Z" + "dateUpdated": "2024-07-05T14:26:40.214Z" }, "containers": { "cna": { @@ -131,7 +131,7 @@ "providerMetadata": { "orgId": "96f1cf3c-f80a-4e0f-a063-99a91e3f1325", "shortName": "secretariat-reference", - "dateUpdated": "2024-06-21T15:36:04.421Z" + "dateUpdated": "2024-07-05T14:26:40.214Z" }, "references": [ { @@ -158,6 +158,31 @@ "exploit", "x_cve_prog_secretariat_snapshot" ] + }, + { + "url": "https://vuldb.com/?id.257287/adp-test-6-28", + "name": "VDB-257287 | Netentsec NS-ASG Application Security Gateway deleteonlineuser.php sql injection", + "tags": [ + "vdb-entry", + "technical-description", + "x_snapshot" + ] + }, + { + "url": "https://vuldb.com/?ctiid.257287/adp-test-6-28", + "name": "VDB-257287 | CTI Indicators (IOB, IOC, TTP, IOA)", + "tags": [ + "signature", + "permissions-required", + "x_snapshot" + ] + }, + { + "url": "https://github.com/flyyue2001/cve/blob/main/NS-ASG-sql-deleteonlineuser.md/adp-test-6-28", + "tags": [ + "exploit", + "x_snapshot" + ] } ] } diff --git a/cves/2024/2xxx/CVE-2024-2650.json b/cves/2024/2xxx/CVE-2024-2650.json index 5c7a7f13fad..3ee71baad27 100644 --- a/cves/2024/2xxx/CVE-2024-2650.json +++ b/cves/2024/2xxx/CVE-2024-2650.json @@ -8,7 +8,7 @@ "assignerShortName": "Wordfence", "dateReserved": "2024-03-19T13:53:17.157Z", "datePublished": "2024-04-09T18:58:56.390Z", - "dateUpdated": "2024-06-21T15:36:04.806Z" + "dateUpdated": "2024-07-05T14:26:39.800Z" }, "containers": { "cna": { @@ -122,7 +122,7 @@ "providerMetadata": { "orgId": "96f1cf3c-f80a-4e0f-a063-99a91e3f1325", "shortName": "secretariat-reference", - "dateUpdated": "2024-06-21T15:36:04.806Z" + "dateUpdated": "2024-07-05T14:26:39.800Z" }, "references": [ { @@ -136,6 +136,18 @@ "tags": [ "x_cve_prog_secretariat_snapshot" ] + }, + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/7242d808-9c33-4b3f-bda6-b4b72ca37de9?source=cve/adp-test-6-28", + "tags": [ + "x_snapshot" + ] + }, + { + "url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&new=3058018%40essential-addons-for-elementor-lite%2Ftrunk&old=3050196%40essential-addons-for-elementor-lite%2Ftrunk&sfp_email=&sfph_mail=/adp-test-6-28", + "tags": [ + "x_snapshot" + ] } ] } diff --git a/cves/2024/2xxx/CVE-2024-2651.json b/cves/2024/2xxx/CVE-2024-2651.json index e9edc2ac5b6..22ee28d680e 100644 --- a/cves/2024/2xxx/CVE-2024-2651.json +++ b/cves/2024/2xxx/CVE-2024-2651.json @@ -8,7 +8,7 @@ "assignerShortName": "GitLab", "dateReserved": "2024-03-19T14:30:39.695Z", "datePublished": "2024-05-09T01:38:31.730Z", - "dateUpdated": "2024-06-21T15:36:05.243Z" + "dateUpdated": "2024-07-05T14:26:39.762Z" }, "containers": { "cna": { @@ -158,7 +158,7 @@ "providerMetadata": { "orgId": "96f1cf3c-f80a-4e0f-a063-99a91e3f1325", "shortName": "secretariat-reference", - "dateUpdated": "2024-06-21T15:36:05.243Z" + "dateUpdated": "2024-07-05T14:26:39.762Z" }, "references": [ { @@ -179,6 +179,25 @@ "permissions-required", "x_cve_prog_secretariat_snapshot" ] + }, + { + "url": "https://gitlab.com/gitlab-org/gitlab/-/issues/450830/adp-test-6-28", + "name": "GitLab Issue #450830", + "tags": [ + "issue-tracking", + "permissions-required", + "x_snapshot" + ] + }, + { + "url": "https://hackerone.com/reports/2408619/adp-test-6-28", + "name": "HackerOne Bug Bounty Report #2408619", + "tags": [ + "technical-description", + "exploit", + "permissions-required", + "x_snapshot" + ] } ] } diff --git a/cves/2024/2xxx/CVE-2024-2653.json b/cves/2024/2xxx/CVE-2024-2653.json index 5675f318943..e40cfcede15 100644 --- a/cves/2024/2xxx/CVE-2024-2653.json +++ b/cves/2024/2xxx/CVE-2024-2653.json @@ -8,7 +8,7 @@ "assignerShortName": "certcc", "dateReserved": "2024-03-19T15:20:53.090Z", "datePublished": "2024-04-03T17:18:29.944Z", - "dateUpdated": "2024-06-21T15:36:05.692Z" + "dateUpdated": "2024-07-05T14:26:41.832Z" }, "containers": { "cna": { @@ -97,7 +97,7 @@ "providerMetadata": { "orgId": "96f1cf3c-f80a-4e0f-a063-99a91e3f1325", "shortName": "secretariat-reference", - "dateUpdated": "2024-06-21T15:36:05.692Z" + "dateUpdated": "2024-07-05T14:26:41.832Z" }, "references": [ { @@ -117,6 +117,24 @@ "tags": [ "x_cve_prog_secretariat_snapshot" ] + }, + { + "url": "https://github.com/amphp/http/security/advisories/GHSA-qjfw-cvjf-f4fm/adp-test-6-28", + "tags": [ + "x_snapshot" + ] + }, + { + "url": "https://github.com/amphp/http-client/security/advisories/GHSA-w8gf-g2vq-j2f4/adp-test-6-28", + "tags": [ + "x_snapshot" + ] + }, + { + "url": "http://www.openwall.com/lists/oss-security/2024/04/03/16/adp-test-6-28", + "tags": [ + "x_snapshot" + ] } ] } diff --git a/cves/2024/2xxx/CVE-2024-2654.json b/cves/2024/2xxx/CVE-2024-2654.json index b1ea5508922..aec325d2110 100644 --- a/cves/2024/2xxx/CVE-2024-2654.json +++ b/cves/2024/2xxx/CVE-2024-2654.json @@ -8,7 +8,7 @@ "assignerShortName": "Wordfence", "dateReserved": "2024-03-19T15:26:37.155Z", "datePublished": "2024-04-09T18:59:21.868Z", - "dateUpdated": "2024-06-21T15:36:06.108Z" + "dateUpdated": "2024-07-05T14:26:42.249Z" }, "containers": { "cna": { @@ -120,7 +120,7 @@ "providerMetadata": { "orgId": "96f1cf3c-f80a-4e0f-a063-99a91e3f1325", "shortName": "secretariat-reference", - "dateUpdated": "2024-06-21T15:36:06.108Z" + "dateUpdated": "2024-07-05T14:26:42.249Z" }, "references": [ { @@ -140,6 +140,24 @@ "tags": [ "x_cve_prog_secretariat_snapshot" ] + }, + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/ca98fbc6-8cfa-4997-8a46-344afb75a97e?source=cve/adp-test-6-28", + "tags": [ + "x_snapshot" + ] + }, + { + "url": "https://plugins.trac.wordpress.org/browser/wp-file-manager/trunk/file_folder_manager.php#L1353/adp-test-6-28", + "tags": [ + "x_snapshot" + ] + }, + { + "url": "https://plugins.trac.wordpress.org/changeset/3062387/wp-file-manager/trunk?contextall=1&old=3051451&old_path=%2Fwp-file-manager%2Ftrunk/adp-test-6-28", + "tags": [ + "x_snapshot" + ] } ] } diff --git a/cves/2024/2xxx/CVE-2024-2655.json b/cves/2024/2xxx/CVE-2024-2655.json index 046db280cc5..2794e80e287 100644 --- a/cves/2024/2xxx/CVE-2024-2655.json +++ b/cves/2024/2xxx/CVE-2024-2655.json @@ -8,7 +8,7 @@ "assignerShortName": "Wordfence", "dateReserved": "2024-03-19T15:44:52.083Z", "datePublished": "2024-04-10T05:32:22.955Z", - "dateUpdated": "2024-06-21T15:36:06.497Z" + "dateUpdated": "2024-07-05T14:26:40.122Z" }, "containers": { "cna": { @@ -86,7 +86,7 @@ "providerMetadata": { "orgId": "96f1cf3c-f80a-4e0f-a063-99a91e3f1325", "shortName": "secretariat-reference", - "dateUpdated": "2024-06-21T15:36:06.497Z" + "dateUpdated": "2024-07-05T14:26:40.122Z" }, "references": [ { @@ -100,6 +100,18 @@ "tags": [ "x_cve_prog_secretariat_snapshot" ] + }, + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/69f2fc37-4c02-48da-b1e8-350ecc8ba086?source=cve/adp-test-6-28", + "tags": [ + "x_snapshot" + ] + }, + { + "url": "https://plugins.trac.wordpress.org/browser/addons-for-elementor/trunk/templates/post-meta/author.php#L8/adp-test-6-28", + "tags": [ + "x_snapshot" + ] } ] } diff --git a/cves/2024/2xxx/CVE-2024-2656.json b/cves/2024/2xxx/CVE-2024-2656.json index 3c11a6e8146..44ff46f1049 100644 --- a/cves/2024/2xxx/CVE-2024-2656.json +++ b/cves/2024/2xxx/CVE-2024-2656.json @@ -8,7 +8,7 @@ "assignerShortName": "Wordfence", "dateReserved": "2024-03-19T15:53:38.061Z", "datePublished": "2024-04-06T03:24:43.105Z", - "dateUpdated": "2024-06-21T15:36:06.907Z" + "dateUpdated": "2024-07-05T14:26:40.222Z" }, "containers": { "cna": { @@ -86,7 +86,7 @@ "providerMetadata": { "orgId": "96f1cf3c-f80a-4e0f-a063-99a91e3f1325", "shortName": "secretariat-reference", - "dateUpdated": "2024-06-21T15:36:06.907Z" + "dateUpdated": "2024-07-05T14:26:40.222Z" }, "references": [ { @@ -100,6 +100,18 @@ "tags": [ "x_cve_prog_secretariat_snapshot" ] + }, + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/159ddb06-e7c4-4279-a8a1-c78a02e15891?source=cve/adp-test-6-28", + "tags": [ + "x_snapshot" + ] + }, + { + "url": "https://plugins.trac.wordpress.org/changeset/3063438/email-subscribers/trunk/lite/includes/classes/class-es-import-subscribers.php/adp-test-6-28", + "tags": [ + "x_snapshot" + ] } ] } diff --git a/cves/2024/2xxx/CVE-2024-2657.json b/cves/2024/2xxx/CVE-2024-2657.json index 8ffa0ae5879..7127aa577f6 100644 --- a/cves/2024/2xxx/CVE-2024-2657.json +++ b/cves/2024/2xxx/CVE-2024-2657.json @@ -8,7 +8,7 @@ "assignerShortName": "Wordfence", "dateReserved": "2024-03-19T16:43:24.112Z", "datePublished": "2024-05-30T08:30:12.030Z", - "dateUpdated": "2024-06-21T15:36:07.327Z" + "dateUpdated": "2024-07-05T14:26:40.218Z" }, "containers": { "cna": { @@ -118,7 +118,7 @@ "providerMetadata": { "orgId": "96f1cf3c-f80a-4e0f-a063-99a91e3f1325", "shortName": "secretariat-reference", - "dateUpdated": "2024-06-21T15:36:07.327Z" + "dateUpdated": "2024-07-05T14:26:40.218Z" }, "references": [ { @@ -132,6 +132,18 @@ "tags": [ "x_cve_prog_secretariat_snapshot" ] + }, + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/3ec6faa4-d8d3-4c5e-91b2-142164d3b481?source=cve/adp-test-6-28", + "tags": [ + "x_snapshot" + ] + }, + { + "url": "https://wordpress.org/plugins/font-farsi//adp-test-6-28", + "tags": [ + "x_snapshot" + ] } ] } diff --git a/cves/2024/2xxx/CVE-2024-2659.json b/cves/2024/2xxx/CVE-2024-2659.json index 5d1b88d1984..741bb16313c 100644 --- a/cves/2024/2xxx/CVE-2024-2659.json +++ b/cves/2024/2xxx/CVE-2024-2659.json @@ -8,7 +8,7 @@ "assignerShortName": "lenovo", "dateReserved": "2024-03-19T17:28:44.819Z", "datePublished": "2024-04-15T18:00:12.275Z", - "dateUpdated": "2024-06-21T15:36:07.784Z" + "dateUpdated": "2024-07-05T14:26:42.265Z" }, "containers": { "cna": { @@ -110,7 +110,7 @@ "providerMetadata": { "orgId": "96f1cf3c-f80a-4e0f-a063-99a91e3f1325", "shortName": "secretariat-reference", - "dateUpdated": "2024-06-21T15:36:07.784Z" + "dateUpdated": "2024-07-05T14:26:42.265Z" }, "references": [ { @@ -118,6 +118,12 @@ "tags": [ "x_cve_prog_secretariat_snapshot" ] + }, + { + "url": "https://support.lenovo.com/us/en/product_security/LEN-140420/adp-test-6-28", + "tags": [ + "x_snapshot" + ] } ] } diff --git a/cves/2024/2xxx/CVE-2024-2660.json b/cves/2024/2xxx/CVE-2024-2660.json index d935eef8d36..f9bd1fda0fc 100644 --- a/cves/2024/2xxx/CVE-2024-2660.json +++ b/cves/2024/2xxx/CVE-2024-2660.json @@ -8,7 +8,7 @@ "assignerShortName": "HashiCorp", "dateReserved": "2024-03-19T17:34:27.401Z", "datePublished": "2024-04-04T17:55:20.192Z", - "dateUpdated": "2024-06-21T15:36:08.235Z" + "dateUpdated": "2024-07-05T14:26:42.266Z" }, "containers": { "cna": { @@ -178,7 +178,7 @@ "providerMetadata": { "orgId": "96f1cf3c-f80a-4e0f-a063-99a91e3f1325", "shortName": "secretariat-reference", - "dateUpdated": "2024-06-21T15:36:08.235Z" + "dateUpdated": "2024-07-05T14:26:42.266Z" }, "references": [ { @@ -186,6 +186,18 @@ "tags": [ "x_cve_prog_secretariat_snapshot" ] + }, + { + "url": "https://discuss.hashicorp.com/t/hcsec-2024-07-vault-tls-cert-auth-method-did-not-correctly-validate-ocsp-responses/64573/adp-test-6-28", + "tags": [ + "x_snapshot" + ] + }, + { + "url": "https://security.netapp.com/advisory/ntap-20240524-0007//adp-test-6-28", + "tags": [ + "x_snapshot" + ] } ] } diff --git a/cves/2024/2xxx/CVE-2024-2661.json b/cves/2024/2xxx/CVE-2024-2661.json index 5fecf10276f..a24fd1d3dc3 100644 --- a/cves/2024/2xxx/CVE-2024-2661.json +++ b/cves/2024/2xxx/CVE-2024-2661.json @@ -8,7 +8,7 @@ "assignerShortName": "Wordfence", "dateReserved": "2024-03-19T18:00:02.083Z", "datePublished": "2024-05-02T16:52:00.115Z", - "dateUpdated": "2024-06-21T15:36:08.626Z" + "dateUpdated": "2024-07-05T14:26:41.966Z" }, "containers": { "cna": { @@ -121,7 +121,7 @@ "providerMetadata": { "orgId": "96f1cf3c-f80a-4e0f-a063-99a91e3f1325", "shortName": "secretariat-reference", - "dateUpdated": "2024-06-21T15:36:08.626Z" + "dateUpdated": "2024-07-05T14:26:41.966Z" }, "references": [ { @@ -141,6 +141,24 @@ "tags": [ "x_cve_prog_secretariat_snapshot" ] + }, + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/3c8ba503-db7e-4ac1-898f-a301854db60f?source=cve/adp-test-6-28", + "tags": [ + "x_snapshot" + ] + }, + { + "url": "https://plugins.trac.wordpress.org/browser/barcode-scanner-lite-pos-to-manage-products-inventory-and-orders/trunk/src/Core.php#L621/adp-test-6-28", + "tags": [ + "x_snapshot" + ] + }, + { + "url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&new=3074826%40barcode-scanner-lite-pos-to-manage-products-inventory-and-orders%2Ftrunk&old=3048878%40barcode-scanner-lite-pos-to-manage-products-inventory-and-orders%2Ftrunk&sfp_email=&sfph_mail=/adp-test-6-28", + "tags": [ + "x_snapshot" + ] } ] } diff --git a/cves/2024/2xxx/CVE-2024-2662.json b/cves/2024/2xxx/CVE-2024-2662.json index fdcc4e299c6..fbda6fcfd69 100644 --- a/cves/2024/2xxx/CVE-2024-2662.json +++ b/cves/2024/2xxx/CVE-2024-2662.json @@ -8,7 +8,7 @@ "assignerShortName": "Wordfence", "dateReserved": "2024-03-19T18:07:49.553Z", "datePublished": "2024-05-10T07:33:38.367Z", - "dateUpdated": "2024-06-21T15:36:09.033Z" + "dateUpdated": "2024-07-05T14:26:40.203Z" }, "containers": { "cna": { @@ -119,7 +119,7 @@ "providerMetadata": { "orgId": "96f1cf3c-f80a-4e0f-a063-99a91e3f1325", "shortName": "secretariat-reference", - "dateUpdated": "2024-06-21T15:36:09.033Z" + "dateUpdated": "2024-07-05T14:26:40.203Z" }, "references": [ { @@ -133,6 +133,18 @@ "tags": [ "x_cve_prog_secretariat_snapshot" ] + }, + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/58492dbb-b9e0-4477-b85d-ace06dba954c?source=cve/adp-test-6-28", + "tags": [ + "x_snapshot" + ] + }, + { + "url": "https://plugins.trac.wordpress.org/changeset/3071404/unlimited-elements-for-elementor/trunk/inc_php/unitecreator_template_engine.class.php/adp-test-6-28", + "tags": [ + "x_snapshot" + ] } ] } diff --git a/cves/2024/2xxx/CVE-2024-2663.json b/cves/2024/2xxx/CVE-2024-2663.json index 863ffc15434..3a6b45eaf93 100644 --- a/cves/2024/2xxx/CVE-2024-2663.json +++ b/cves/2024/2xxx/CVE-2024-2663.json @@ -8,7 +8,7 @@ "assignerShortName": "Wordfence", "dateReserved": "2024-03-19T18:34:00.092Z", "datePublished": "2024-04-30T08:32:23.952Z", - "dateUpdated": "2024-06-21T15:36:09.443Z" + "dateUpdated": "2024-07-05T14:26:39.874Z" }, "containers": { "cna": { @@ -123,7 +123,7 @@ "providerMetadata": { "orgId": "96f1cf3c-f80a-4e0f-a063-99a91e3f1325", "shortName": "secretariat-reference", - "dateUpdated": "2024-06-21T15:36:09.443Z" + "dateUpdated": "2024-07-05T14:26:39.874Z" }, "references": [ { @@ -137,6 +137,18 @@ "tags": [ "x_cve_prog_secretariat_snapshot" ] + }, + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/f6f26854-7e25-4e64-9f03-916ece6fde03?source=cve/adp-test-6-28", + "tags": [ + "x_snapshot" + ] + }, + { + "url": "https://wordpress.org/plugins/zd-youtube-flv-player//adp-test-6-28", + "tags": [ + "x_snapshot" + ] } ] } diff --git a/cves/2024/2xxx/CVE-2024-2664.json b/cves/2024/2xxx/CVE-2024-2664.json index edb5388d3d9..909352184f3 100644 --- a/cves/2024/2xxx/CVE-2024-2664.json +++ b/cves/2024/2xxx/CVE-2024-2664.json @@ -8,7 +8,7 @@ "assignerShortName": "Wordfence", "dateReserved": "2024-03-19T19:16:50.024Z", "datePublished": "2024-04-10T03:09:46.177Z", - "dateUpdated": "2024-06-21T15:36:09.841Z" + "dateUpdated": "2024-07-05T14:26:39.810Z" }, "containers": { "cna": { @@ -117,7 +117,7 @@ "providerMetadata": { "orgId": "96f1cf3c-f80a-4e0f-a063-99a91e3f1325", "shortName": "secretariat-reference", - "dateUpdated": "2024-06-21T15:36:09.841Z" + "dateUpdated": "2024-07-05T14:26:39.810Z" }, "references": [ { @@ -131,6 +131,18 @@ "tags": [ "x_cve_prog_secretariat_snapshot" ] + }, + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/ccb7e94c-385e-4ce9-acfa-978403047159?source=cve/adp-test-6-28", + "tags": [ + "x_snapshot" + ] + }, + { + "url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3055384%40premium-addons-for-elementor&new=3055384%40premium-addons-for-elementor&sfp_email=&sfph_mail=/adp-test-6-28", + "tags": [ + "x_snapshot" + ] } ] } diff --git a/cves/2024/2xxx/CVE-2024-2665.json b/cves/2024/2xxx/CVE-2024-2665.json index 3b7c03a77ec..d3415a778ab 100644 --- a/cves/2024/2xxx/CVE-2024-2665.json +++ b/cves/2024/2xxx/CVE-2024-2665.json @@ -8,7 +8,7 @@ "assignerShortName": "Wordfence", "dateReserved": "2024-03-19T19:22:06.567Z", "datePublished": "2024-04-10T03:09:45.609Z", - "dateUpdated": "2024-06-21T15:36:10.335Z" + "dateUpdated": "2024-07-05T14:26:40.164Z" }, "containers": { "cna": { @@ -117,7 +117,7 @@ "providerMetadata": { "orgId": "96f1cf3c-f80a-4e0f-a063-99a91e3f1325", "shortName": "secretariat-reference", - "dateUpdated": "2024-06-21T15:36:10.335Z" + "dateUpdated": "2024-07-05T14:26:40.164Z" }, "references": [ { @@ -131,6 +131,18 @@ "tags": [ "x_cve_prog_secretariat_snapshot" ] + }, + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/cab56873-f79c-4fd2-8d40-ee4a338cbe8b?source=cve/adp-test-6-28", + "tags": [ + "x_snapshot" + ] + }, + { + "url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3066988%40premium-addons-for-elementor&new=3066988%40premium-addons-for-elementor&sfp_email=&sfph_mail=/adp-test-6-28", + "tags": [ + "x_snapshot" + ] } ] } diff --git a/cves/2024/2xxx/CVE-2024-2666.json b/cves/2024/2xxx/CVE-2024-2666.json index d31c1c621b0..fa7c523b5ab 100644 --- a/cves/2024/2xxx/CVE-2024-2666.json +++ b/cves/2024/2xxx/CVE-2024-2666.json @@ -8,7 +8,7 @@ "assignerShortName": "Wordfence", "dateReserved": "2024-03-19T19:29:29.227Z", "datePublished": "2024-04-10T03:31:20.246Z", - "dateUpdated": "2024-06-21T15:36:10.775Z" + "dateUpdated": "2024-07-05T14:26:40.211Z" }, "containers": { "cna": { @@ -118,7 +118,7 @@ "providerMetadata": { "orgId": "96f1cf3c-f80a-4e0f-a063-99a91e3f1325", "shortName": "secretariat-reference", - "dateUpdated": "2024-06-21T15:36:10.775Z" + "dateUpdated": "2024-07-05T14:26:40.211Z" }, "references": [ { @@ -132,6 +132,18 @@ "tags": [ "x_cve_prog_secretariat_snapshot" ] + }, + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/18b2d99a-f55c-4a05-8442-e1fddd59181f?source=cve/adp-test-6-28", + "tags": [ + "x_snapshot" + ] + }, + { + "url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3055384%40premium-addons-for-elementor&new=3055384%40premium-addons-for-elementor&sfp_email=&sfph_mail=/adp-test-6-28", + "tags": [ + "x_snapshot" + ] } ] } diff --git a/cves/2024/2xxx/CVE-2024-2667.json b/cves/2024/2xxx/CVE-2024-2667.json index 5951da9e3f5..13a79fa88ae 100644 --- a/cves/2024/2xxx/CVE-2024-2667.json +++ b/cves/2024/2xxx/CVE-2024-2667.json @@ -8,7 +8,7 @@ "assignerShortName": "Wordfence", "dateReserved": "2024-03-19T19:42:24.552Z", "datePublished": "2024-05-02T16:52:52.798Z", - "dateUpdated": "2024-06-21T15:36:11.193Z" + "dateUpdated": "2024-07-05T14:26:41.841Z" }, "containers": { "cna": { @@ -86,7 +86,7 @@ "providerMetadata": { "orgId": "96f1cf3c-f80a-4e0f-a063-99a91e3f1325", "shortName": "secretariat-reference", - "dateUpdated": "2024-06-21T15:36:11.193Z" + "dateUpdated": "2024-07-05T14:26:41.841Z" }, "references": [ { @@ -100,6 +100,18 @@ "tags": [ "x_cve_prog_secretariat_snapshot" ] + }, + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/f6aead8d-c136-4952-ad03-86fe0f144dea?source=cve/adp-test-6-28", + "tags": [ + "x_snapshot" + ] + }, + { + "url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3061039%40instawp-connect&new=3061039%40instawp-connect&sfp_email=&sfph_mail=/adp-test-6-28", + "tags": [ + "x_snapshot" + ] } ] } diff --git a/cves/2024/2xxx/CVE-2024-2668.json b/cves/2024/2xxx/CVE-2024-2668.json index 43deadd829a..16472e03caa 100644 --- a/cves/2024/2xxx/CVE-2024-2668.json +++ b/cves/2024/2xxx/CVE-2024-2668.json @@ -8,7 +8,7 @@ "assignerShortName": "VulDB", "dateReserved": "2024-03-19T19:55:35.985Z", "datePublished": "2024-03-20T02:00:08.441Z", - "dateUpdated": "2024-06-21T15:36:11.586Z" + "dateUpdated": "2024-07-05T14:26:41.819Z" }, "containers": { "cna": { @@ -131,7 +131,7 @@ "providerMetadata": { "orgId": "96f1cf3c-f80a-4e0f-a063-99a91e3f1325", "shortName": "secretariat-reference", - "dateUpdated": "2024-06-21T15:36:11.586Z" + "dateUpdated": "2024-07-05T14:26:41.819Z" }, "references": [ { @@ -158,6 +158,31 @@ "exploit", "x_cve_prog_secretariat_snapshot" ] + }, + { + "url": "https://vuldb.com/?id.257368/adp-test-6-28", + "name": "VDB-257368 | Campcodes Online Job Finder System controller.php sql injection", + "tags": [ + "vdb-entry", + "technical-description", + "x_snapshot" + ] + }, + { + "url": "https://vuldb.com/?ctiid.257368/adp-test-6-28", + "name": "VDB-257368 | CTI Indicators (IOB, IOC, TTP, IOA)", + "tags": [ + "signature", + "permissions-required", + "x_snapshot" + ] + }, + { + "url": "https://github.com/E1CHO/cve_hub/blob/main/Online%20Job%20Finder%20System/Online%20Job%20Finder%20System%20-%20vuln%2010.pdf/adp-test-6-28", + "tags": [ + "exploit", + "x_snapshot" + ] } ] } diff --git a/cves/2024/2xxx/CVE-2024-2669.json b/cves/2024/2xxx/CVE-2024-2669.json index ace5646355c..bc9cc7ea3a6 100644 --- a/cves/2024/2xxx/CVE-2024-2669.json +++ b/cves/2024/2xxx/CVE-2024-2669.json @@ -8,7 +8,7 @@ "assignerShortName": "VulDB", "dateReserved": "2024-03-19T19:55:54.907Z", "datePublished": "2024-03-20T02:00:09.972Z", - "dateUpdated": "2024-06-21T15:36:11.998Z" + "dateUpdated": "2024-07-05T14:26:41.968Z" }, "containers": { "cna": { @@ -134,7 +134,7 @@ "providerMetadata": { "orgId": "96f1cf3c-f80a-4e0f-a063-99a91e3f1325", "shortName": "secretariat-reference", - "dateUpdated": "2024-06-21T15:36:11.998Z" + "dateUpdated": "2024-07-05T14:26:41.968Z" }, "references": [ { @@ -161,6 +161,31 @@ "exploit", "x_cve_prog_secretariat_snapshot" ] + }, + { + "url": "https://vuldb.com/?id.257369/adp-test-6-28", + "name": "VDB-257369 | Campcodes Online Job Finder System GET Parameter controller.php sql injection", + "tags": [ + "vdb-entry", + "technical-description", + "x_snapshot" + ] + }, + { + "url": "https://vuldb.com/?ctiid.257369/adp-test-6-28", + "name": "VDB-257369 | CTI Indicators (IOB, IOC, TTP, IOA)", + "tags": [ + "signature", + "permissions-required", + "x_snapshot" + ] + }, + { + "url": "https://github.com/E1CHO/cve_hub/blob/main/Online%20Job%20Finder%20System/Online%20Job%20Finder%20System%20-%20vuln%202.pdf/adp-test-6-28", + "tags": [ + "exploit", + "x_snapshot" + ] } ] } diff --git a/cves/2024/2xxx/CVE-2024-2670.json b/cves/2024/2xxx/CVE-2024-2670.json index bb139bbd366..5af4a54e169 100644 --- a/cves/2024/2xxx/CVE-2024-2670.json +++ b/cves/2024/2xxx/CVE-2024-2670.json @@ -8,7 +8,7 @@ "assignerShortName": "VulDB", "dateReserved": "2024-03-19T19:55:56.713Z", "datePublished": "2024-03-20T04:00:07.426Z", - "dateUpdated": "2024-06-21T15:36:12.407Z" + "dateUpdated": "2024-07-05T14:26:41.833Z" }, "containers": { "cna": { @@ -131,7 +131,7 @@ "providerMetadata": { "orgId": "96f1cf3c-f80a-4e0f-a063-99a91e3f1325", "shortName": "secretariat-reference", - "dateUpdated": "2024-06-21T15:36:12.407Z" + "dateUpdated": "2024-07-05T14:26:41.833Z" }, "references": [ { @@ -158,6 +158,31 @@ "exploit", "x_cve_prog_secretariat_snapshot" ] + }, + { + "url": "https://vuldb.com/?id.257370/adp-test-6-28", + "name": "VDB-257370 | Campcodes Online Job Finder System index.php sql injection", + "tags": [ + "vdb-entry", + "technical-description", + "x_snapshot" + ] + }, + { + "url": "https://vuldb.com/?ctiid.257370/adp-test-6-28", + "name": "VDB-257370 | CTI Indicators (IOB, IOC, TTP, IOA)", + "tags": [ + "signature", + "permissions-required", + "x_snapshot" + ] + }, + { + "url": "https://github.com/E1CHO/cve_hub/blob/main/Online%20Job%20Finder%20System/Online%20Job%20Finder%20System%20-%20vuln%203.pdf/adp-test-6-28", + "tags": [ + "exploit", + "x_snapshot" + ] } ] } diff --git a/cves/2024/2xxx/CVE-2024-2671.json b/cves/2024/2xxx/CVE-2024-2671.json index d36d3afd322..ba7b040367c 100644 --- a/cves/2024/2xxx/CVE-2024-2671.json +++ b/cves/2024/2xxx/CVE-2024-2671.json @@ -8,7 +8,7 @@ "assignerShortName": "VulDB", "dateReserved": "2024-03-19T19:56:00.582Z", "datePublished": "2024-03-20T04:00:09.242Z", - "dateUpdated": "2024-06-21T15:36:12.791Z" + "dateUpdated": "2024-07-05T14:26:42.269Z" }, "containers": { "cna": { @@ -131,7 +131,7 @@ "providerMetadata": { "orgId": "96f1cf3c-f80a-4e0f-a063-99a91e3f1325", "shortName": "secretariat-reference", - "dateUpdated": "2024-06-21T15:36:12.791Z" + "dateUpdated": "2024-07-05T14:26:42.269Z" }, "references": [ { @@ -158,6 +158,31 @@ "exploit", "x_cve_prog_secretariat_snapshot" ] + }, + { + "url": "https://vuldb.com/?id.257371/adp-test-6-28", + "name": "VDB-257371 | Campcodes Online Job Finder System index.php sql injection", + "tags": [ + "vdb-entry", + "technical-description", + "x_snapshot" + ] + }, + { + "url": "https://vuldb.com/?ctiid.257371/adp-test-6-28", + "name": "VDB-257371 | CTI Indicators (IOB, IOC, TTP, IOA)", + "tags": [ + "signature", + "permissions-required", + "x_snapshot" + ] + }, + { + "url": "https://github.com/E1CHO/cve_hub/blob/main/Online%20Job%20Finder%20System/Online%20Job%20Finder%20System%20-%20vuln%204.pdf/adp-test-6-28", + "tags": [ + "exploit", + "x_snapshot" + ] } ] } diff --git a/cves/2024/2xxx/CVE-2024-2672.json b/cves/2024/2xxx/CVE-2024-2672.json index 46047981ea0..e4386ac7f4e 100644 --- a/cves/2024/2xxx/CVE-2024-2672.json +++ b/cves/2024/2xxx/CVE-2024-2672.json @@ -1,6 +1,6 @@ { "dataType": "CVE_RECORD", - "dataVersion": "5.0", + "dataVersion": "5.1", "cveMetadata": { "cveId": "CVE-2024-2672", "assignerOrgId": "1af790b2-7ee1-4545-860a-a788eba489b5", @@ -8,7 +8,7 @@ "assignerShortName": "VulDB", "dateReserved": "2024-03-19T19:56:04.131Z", "datePublished": "2024-03-20T04:31:04.144Z", - "dateUpdated": "2024-06-05T19:56:00.308Z" + "dateUpdated": "2024-07-05T14:26:42.298Z" }, "containers": { "cna": { @@ -125,6 +125,42 @@ ] } ] - } + }, + "adp": [ + { + "providerMetadata": { + "orgId": "96f1cf3c-f80a-4e0f-a063-99a91e3f1325", + "shortName": "secretariat-reference", + "dateUpdated": "2024-07-05T14:26:42.298Z" + }, + "references": [ + { + "url": "https://vuldb.com/?id.257372/adp-test-6-28", + "name": "VDB-257372 | Campcodes Online Job Finder System controller.php sql injection", + "tags": [ + "vdb-entry", + "technical-description", + "x_snapshot" + ] + }, + { + "url": "https://vuldb.com/?ctiid.257372/adp-test-6-28", + "name": "VDB-257372 | CTI Indicators (IOB, IOC, TTP, IOA)", + "tags": [ + "signature", + "permissions-required", + "x_snapshot" + ] + }, + { + "url": "https://github.com/E1CHO/cve_hub/blob/main/Online%20Job%20Finder%20System/Online%20Job%20Finder%20System%20-%20vuln%205.pdf/adp-test-6-28", + "tags": [ + "exploit", + "x_snapshot" + ] + } + ] + } + ] } } \ No newline at end of file diff --git a/cves/2024/2xxx/CVE-2024-2673.json b/cves/2024/2xxx/CVE-2024-2673.json index 8e8b39b8901..a9ce256ac84 100644 --- a/cves/2024/2xxx/CVE-2024-2673.json +++ b/cves/2024/2xxx/CVE-2024-2673.json @@ -8,7 +8,7 @@ "assignerShortName": "VulDB", "dateReserved": "2024-03-19T19:56:08.124Z", "datePublished": "2024-03-20T05:00:07.118Z", - "dateUpdated": "2024-06-27T19:10:45.329Z" + "dateUpdated": "2024-07-05T14:26:40.208Z" }, "containers": { "cna": { @@ -131,7 +131,7 @@ "providerMetadata": { "orgId": "96f1cf3c-f80a-4e0f-a063-99a91e3f1325", "shortName": "secretariat-reference", - "dateUpdated": "2024-06-21T15:36:13.338Z" + "dateUpdated": "2024-07-05T14:26:40.208Z" }, "references": [ { @@ -158,6 +158,31 @@ "exploit", "x_cve_prog_secretariat_snapshot" ] + }, + { + "url": "https://vuldb.com/?id.257373/adp-test-6-28", + "name": "VDB-257373 | Campcodes Online Job Finder System login.php sql injection", + "tags": [ + "vdb-entry", + "technical-description", + "x_snapshot" + ] + }, + { + "url": "https://vuldb.com/?ctiid.257373/adp-test-6-28", + "name": "VDB-257373 | CTI Indicators (IOB, IOC, TTP, IOA)", + "tags": [ + "signature", + "permissions-required", + "x_snapshot" + ] + }, + { + "url": "https://github.com/E1CHO/cve_hub/blob/main/Online%20Job%20Finder%20System/Online%20Job%20Finder%20System%20-%20vuln%206.pdf/adp-test-6-28", + "tags": [ + "exploit", + "x_snapshot" + ] } ] } diff --git a/cves/2024/2xxx/CVE-2024-2674.json b/cves/2024/2xxx/CVE-2024-2674.json index 7a64493108e..5b7a1c39e69 100644 --- a/cves/2024/2xxx/CVE-2024-2674.json +++ b/cves/2024/2xxx/CVE-2024-2674.json @@ -8,7 +8,7 @@ "assignerShortName": "VulDB", "dateReserved": "2024-03-19T19:56:11.498Z", "datePublished": "2024-03-20T05:31:04.633Z", - "dateUpdated": "2024-06-21T15:36:13.732Z" + "dateUpdated": "2024-07-05T14:26:42.258Z" }, "containers": { "cna": { @@ -131,7 +131,7 @@ "providerMetadata": { "orgId": "96f1cf3c-f80a-4e0f-a063-99a91e3f1325", "shortName": "secretariat-reference", - "dateUpdated": "2024-06-21T15:36:13.732Z" + "dateUpdated": "2024-07-05T14:26:42.258Z" }, "references": [ { @@ -158,6 +158,31 @@ "exploit", "x_cve_prog_secretariat_snapshot" ] + }, + { + "url": "https://vuldb.com/?id.257374/adp-test-6-28", + "name": "VDB-257374 | Campcodes Online Job Finder System index.php sql injection", + "tags": [ + "vdb-entry", + "technical-description", + "x_snapshot" + ] + }, + { + "url": "https://vuldb.com/?ctiid.257374/adp-test-6-28", + "name": "VDB-257374 | CTI Indicators (IOB, IOC, TTP, IOA)", + "tags": [ + "signature", + "permissions-required", + "x_snapshot" + ] + }, + { + "url": "https://github.com/E1CHO/cve_hub/blob/main/Online%20Job%20Finder%20System/Online%20Job%20Finder%20System%20-%20vuln%207.pdf/adp-test-6-28", + "tags": [ + "exploit", + "x_snapshot" + ] } ] } diff --git a/cves/2024/2xxx/CVE-2024-2675.json b/cves/2024/2xxx/CVE-2024-2675.json index c71c66e402c..fa59b7bbd7d 100644 --- a/cves/2024/2xxx/CVE-2024-2675.json +++ b/cves/2024/2xxx/CVE-2024-2675.json @@ -8,7 +8,7 @@ "assignerShortName": "VulDB", "dateReserved": "2024-03-19T19:56:15.428Z", "datePublished": "2024-03-20T06:00:07.635Z", - "dateUpdated": "2024-06-21T15:36:14.181Z" + "dateUpdated": "2024-07-05T14:26:39.949Z" }, "containers": { "cna": { @@ -131,7 +131,7 @@ "providerMetadata": { "orgId": "96f1cf3c-f80a-4e0f-a063-99a91e3f1325", "shortName": "secretariat-reference", - "dateUpdated": "2024-06-21T15:36:14.181Z" + "dateUpdated": "2024-07-05T14:26:39.949Z" }, "references": [ { @@ -158,6 +158,31 @@ "exploit", "x_cve_prog_secretariat_snapshot" ] + }, + { + "url": "https://vuldb.com/?id.257375/adp-test-6-28", + "name": "VDB-257375 | Campcodes Online Job Finder System index.php sql injection", + "tags": [ + "vdb-entry", + "technical-description", + "x_snapshot" + ] + }, + { + "url": "https://vuldb.com/?ctiid.257375/adp-test-6-28", + "name": "VDB-257375 | CTI Indicators (IOB, IOC, TTP, IOA)", + "tags": [ + "signature", + "permissions-required", + "x_snapshot" + ] + }, + { + "url": "https://github.com/E1CHO/cve_hub/blob/main/Online%20Job%20Finder%20System/Online%20Job%20Finder%20System%20-%20vuln%208.pdf/adp-test-6-28", + "tags": [ + "exploit", + "x_snapshot" + ] } ] } diff --git a/cves/2024/2xxx/CVE-2024-2676.json b/cves/2024/2xxx/CVE-2024-2676.json index 13af65f611d..84a7dfed3de 100644 --- a/cves/2024/2xxx/CVE-2024-2676.json +++ b/cves/2024/2xxx/CVE-2024-2676.json @@ -8,7 +8,7 @@ "assignerShortName": "VulDB", "dateReserved": "2024-03-19T19:56:19.053Z", "datePublished": "2024-03-20T06:00:09.108Z", - "dateUpdated": "2024-06-21T15:36:14.604Z" + "dateUpdated": "2024-07-05T14:26:41.811Z" }, "containers": { "cna": { @@ -131,7 +131,7 @@ "providerMetadata": { "orgId": "96f1cf3c-f80a-4e0f-a063-99a91e3f1325", "shortName": "secretariat-reference", - "dateUpdated": "2024-06-21T15:36:14.604Z" + "dateUpdated": "2024-07-05T14:26:41.811Z" }, "references": [ { @@ -158,6 +158,31 @@ "exploit", "x_cve_prog_secretariat_snapshot" ] + }, + { + "url": "https://vuldb.com/?id.257376/adp-test-6-28", + "name": "VDB-257376 | Campcodes Online Job Finder System controller.php sql injection", + "tags": [ + "vdb-entry", + "technical-description", + "x_snapshot" + ] + }, + { + "url": "https://vuldb.com/?ctiid.257376/adp-test-6-28", + "name": "VDB-257376 | CTI Indicators (IOB, IOC, TTP, IOA)", + "tags": [ + "signature", + "permissions-required", + "x_snapshot" + ] + }, + { + "url": "https://github.com/E1CHO/cve_hub/blob/main/Online%20Job%20Finder%20System/Online%20Job%20Finder%20System%20-%20vuln%209.pdf/adp-test-6-28", + "tags": [ + "exploit", + "x_snapshot" + ] } ] } diff --git a/cves/2024/2xxx/CVE-2024-2677.json b/cves/2024/2xxx/CVE-2024-2677.json index f70ab18ede2..43066ade222 100644 --- a/cves/2024/2xxx/CVE-2024-2677.json +++ b/cves/2024/2xxx/CVE-2024-2677.json @@ -8,7 +8,7 @@ "assignerShortName": "VulDB", "dateReserved": "2024-03-19T19:56:22.898Z", "datePublished": "2024-03-20T06:31:04.423Z", - "dateUpdated": "2024-06-21T15:36:15.024Z" + "dateUpdated": "2024-07-05T14:26:42.237Z" }, "containers": { "cna": { @@ -131,7 +131,7 @@ "providerMetadata": { "orgId": "96f1cf3c-f80a-4e0f-a063-99a91e3f1325", "shortName": "secretariat-reference", - "dateUpdated": "2024-06-21T15:36:15.024Z" + "dateUpdated": "2024-07-05T14:26:42.237Z" }, "references": [ { @@ -158,6 +158,31 @@ "exploit", "x_cve_prog_secretariat_snapshot" ] + }, + { + "url": "https://vuldb.com/?id.257377/adp-test-6-28", + "name": "VDB-257377 | Campcodes Online Job Finder System controller.php sql injection", + "tags": [ + "vdb-entry", + "technical-description", + "x_snapshot" + ] + }, + { + "url": "https://vuldb.com/?ctiid.257377/adp-test-6-28", + "name": "VDB-257377 | CTI Indicators (IOB, IOC, TTP, IOA)", + "tags": [ + "signature", + "permissions-required", + "x_snapshot" + ] + }, + { + "url": "https://github.com/E1CHO/cve_hub/blob/main/Online%20Job%20Finder%20System/Online%20Job%20Finder%20System%20-%20vuln%2012.pdf/adp-test-6-28", + "tags": [ + "exploit", + "x_snapshot" + ] } ] } diff --git a/cves/2024/2xxx/CVE-2024-2678.json b/cves/2024/2xxx/CVE-2024-2678.json index 7e7851432d8..206432d9cc0 100644 --- a/cves/2024/2xxx/CVE-2024-2678.json +++ b/cves/2024/2xxx/CVE-2024-2678.json @@ -8,7 +8,7 @@ "assignerShortName": "VulDB", "dateReserved": "2024-03-19T19:56:26.458Z", "datePublished": "2024-03-20T07:00:06.382Z", - "dateUpdated": "2024-06-21T15:36:15.458Z" + "dateUpdated": "2024-07-05T14:26:41.966Z" }, "containers": { "cna": { @@ -131,7 +131,7 @@ "providerMetadata": { "orgId": "96f1cf3c-f80a-4e0f-a063-99a91e3f1325", "shortName": "secretariat-reference", - "dateUpdated": "2024-06-21T15:36:15.458Z" + "dateUpdated": "2024-07-05T14:26:41.966Z" }, "references": [ { @@ -158,6 +158,31 @@ "exploit", "x_cve_prog_secretariat_snapshot" ] + }, + { + "url": "https://vuldb.com/?id.257378/adp-test-6-28", + "name": "VDB-257378 | Campcodes Online Job Finder System controller.php sql injection", + "tags": [ + "vdb-entry", + "technical-description", + "x_snapshot" + ] + }, + { + "url": "https://vuldb.com/?ctiid.257378/adp-test-6-28", + "name": "VDB-257378 | CTI Indicators (IOB, IOC, TTP, IOA)", + "tags": [ + "signature", + "permissions-required", + "x_snapshot" + ] + }, + { + "url": "https://github.com/E1CHO/cve_hub/blob/main/Online%20Job%20Finder%20System/Online%20Job%20Finder%20System%20-%20vuln%2013.pdf/adp-test-6-28", + "tags": [ + "exploit", + "x_snapshot" + ] } ] } diff --git a/cves/2024/2xxx/CVE-2024-2679.json b/cves/2024/2xxx/CVE-2024-2679.json index 567980e2c35..10164b19d8e 100644 --- a/cves/2024/2xxx/CVE-2024-2679.json +++ b/cves/2024/2xxx/CVE-2024-2679.json @@ -8,7 +8,7 @@ "assignerShortName": "VulDB", "dateReserved": "2024-03-19T19:56:29.969Z", "datePublished": "2024-03-20T07:00:08.155Z", - "dateUpdated": "2024-06-21T15:36:15.904Z" + "dateUpdated": "2024-07-05T14:26:42.062Z" }, "containers": { "cna": { @@ -131,7 +131,7 @@ "providerMetadata": { "orgId": "96f1cf3c-f80a-4e0f-a063-99a91e3f1325", "shortName": "secretariat-reference", - "dateUpdated": "2024-06-21T15:36:15.904Z" + "dateUpdated": "2024-07-05T14:26:42.062Z" }, "references": [ { @@ -158,6 +158,31 @@ "exploit", "x_cve_prog_secretariat_snapshot" ] + }, + { + "url": "https://vuldb.com/?id.257379/adp-test-6-28", + "name": "VDB-257379 | Campcodes Online Job Finder System index.php cross site scripting", + "tags": [ + "vdb-entry", + "technical-description", + "x_snapshot" + ] + }, + { + "url": "https://vuldb.com/?ctiid.257379/adp-test-6-28", + "name": "VDB-257379 | CTI Indicators (IOB, IOC, TTP, IOA)", + "tags": [ + "signature", + "permissions-required", + "x_snapshot" + ] + }, + { + "url": "https://github.com/E1CHO/cve_hub/blob/main/Online%20Job%20Finder%20System/Online%20Job%20Finder%20System%20-%20vuln%2014.pdf/adp-test-6-28", + "tags": [ + "exploit", + "x_snapshot" + ] } ] } diff --git a/cves/2024/2xxx/CVE-2024-2680.json b/cves/2024/2xxx/CVE-2024-2680.json index c39b136912b..c5bc62969aa 100644 --- a/cves/2024/2xxx/CVE-2024-2680.json +++ b/cves/2024/2xxx/CVE-2024-2680.json @@ -8,7 +8,7 @@ "assignerShortName": "VulDB", "dateReserved": "2024-03-19T19:56:34.020Z", "datePublished": "2024-03-20T07:31:04.750Z", - "dateUpdated": "2024-06-21T15:36:16.338Z" + "dateUpdated": "2024-07-05T14:26:42.325Z" }, "containers": { "cna": { @@ -131,7 +131,7 @@ "providerMetadata": { "orgId": "96f1cf3c-f80a-4e0f-a063-99a91e3f1325", "shortName": "secretariat-reference", - "dateUpdated": "2024-06-21T15:36:16.338Z" + "dateUpdated": "2024-07-05T14:26:42.325Z" }, "references": [ { @@ -158,6 +158,31 @@ "exploit", "x_cve_prog_secretariat_snapshot" ] + }, + { + "url": "https://vuldb.com/?id.257380/adp-test-6-28", + "name": "VDB-257380 | Campcodes Online Job Finder System index.php cross site scripting", + "tags": [ + "vdb-entry", + "technical-description", + "x_snapshot" + ] + }, + { + "url": "https://vuldb.com/?ctiid.257380/adp-test-6-28", + "name": "VDB-257380 | CTI Indicators (IOB, IOC, TTP, IOA)", + "tags": [ + "signature", + "permissions-required", + "x_snapshot" + ] + }, + { + "url": "https://github.com/E1CHO/cve_hub/blob/main/Online%20Job%20Finder%20System/Online%20Job%20Finder%20System%20-%20vuln%2015.pdf/adp-test-6-28", + "tags": [ + "exploit", + "x_snapshot" + ] } ] } diff --git a/cves/2024/2xxx/CVE-2024-2681.json b/cves/2024/2xxx/CVE-2024-2681.json index 30248264c50..1e780349195 100644 --- a/cves/2024/2xxx/CVE-2024-2681.json +++ b/cves/2024/2xxx/CVE-2024-2681.json @@ -8,7 +8,7 @@ "assignerShortName": "VulDB", "dateReserved": "2024-03-19T19:56:37.208Z", "datePublished": "2024-03-20T07:31:06.076Z", - "dateUpdated": "2024-06-21T15:36:16.781Z" + "dateUpdated": "2024-07-05T14:26:42.302Z" }, "containers": { "cna": { @@ -131,7 +131,7 @@ "providerMetadata": { "orgId": "96f1cf3c-f80a-4e0f-a063-99a91e3f1325", "shortName": "secretariat-reference", - "dateUpdated": "2024-06-21T15:36:16.781Z" + "dateUpdated": "2024-07-05T14:26:42.302Z" }, "references": [ { @@ -158,6 +158,31 @@ "exploit", "x_cve_prog_secretariat_snapshot" ] + }, + { + "url": "https://vuldb.com/?id.257381/adp-test-6-28", + "name": "VDB-257381 | Campcodes Online Job Finder System index.php cross site scripting", + "tags": [ + "vdb-entry", + "technical-description", + "x_snapshot" + ] + }, + { + "url": "https://vuldb.com/?ctiid.257381/adp-test-6-28", + "name": "VDB-257381 | CTI Indicators (IOB, IOC, TTP, IOA)", + "tags": [ + "signature", + "permissions-required", + "x_snapshot" + ] + }, + { + "url": "https://github.com/E1CHO/cve_hub/blob/main/Online%20Job%20Finder%20System/Online%20Job%20Finder%20System%20-%20vuln%2016.pdf/adp-test-6-28", + "tags": [ + "exploit", + "x_snapshot" + ] } ] } diff --git a/cves/2024/2xxx/CVE-2024-2682.json b/cves/2024/2xxx/CVE-2024-2682.json index 61cd23a51a4..2e4c010d7f0 100644 --- a/cves/2024/2xxx/CVE-2024-2682.json +++ b/cves/2024/2xxx/CVE-2024-2682.json @@ -1,6 +1,6 @@ { "dataType": "CVE_RECORD", - "dataVersion": "5.0", + "dataVersion": "5.1", "cveMetadata": { "cveId": "CVE-2024-2682", "assignerOrgId": "1af790b2-7ee1-4545-860a-a788eba489b5", @@ -8,7 +8,7 @@ "assignerShortName": "VulDB", "dateReserved": "2024-03-19T19:56:40.650Z", "datePublished": "2024-03-20T08:00:06.519Z", - "dateUpdated": "2024-06-05T19:54:30.977Z" + "dateUpdated": "2024-07-05T14:26:41.809Z" }, "containers": { "cna": { @@ -125,6 +125,42 @@ ] } ] - } + }, + "adp": [ + { + "providerMetadata": { + "orgId": "96f1cf3c-f80a-4e0f-a063-99a91e3f1325", + "shortName": "secretariat-reference", + "dateUpdated": "2024-07-05T14:26:41.809Z" + }, + "references": [ + { + "url": "https://vuldb.com/?id.257382/adp-test-6-28", + "name": "VDB-257382 | Campcodes Online Job Finder System controller.php cross site scripting", + "tags": [ + "vdb-entry", + "technical-description", + "x_snapshot" + ] + }, + { + "url": "https://vuldb.com/?ctiid.257382/adp-test-6-28", + "name": "VDB-257382 | CTI Indicators (IOB, IOC, TTP, IOA)", + "tags": [ + "signature", + "permissions-required", + "x_snapshot" + ] + }, + { + "url": "https://github.com/E1CHO/cve_hub/blob/main/Online%20Job%20Finder%20System/Online%20Job%20Finder%20System%20-%20vuln%2017.pdf/adp-test-6-28", + "tags": [ + "exploit", + "x_snapshot" + ] + } + ] + } + ] } } \ No newline at end of file diff --git a/cves/2024/2xxx/CVE-2024-2683.json b/cves/2024/2xxx/CVE-2024-2683.json index 87903fde93e..3a026d916bd 100644 --- a/cves/2024/2xxx/CVE-2024-2683.json +++ b/cves/2024/2xxx/CVE-2024-2683.json @@ -8,7 +8,7 @@ "assignerShortName": "VulDB", "dateReserved": "2024-03-19T19:56:44.367Z", "datePublished": "2024-03-20T08:31:04.682Z", - "dateUpdated": "2024-06-27T19:10:02.992Z" + "dateUpdated": "2024-07-05T14:26:41.965Z" }, "containers": { "cna": { @@ -131,7 +131,7 @@ "providerMetadata": { "orgId": "96f1cf3c-f80a-4e0f-a063-99a91e3f1325", "shortName": "secretariat-reference", - "dateUpdated": "2024-06-21T15:36:17.431Z" + "dateUpdated": "2024-07-05T14:26:41.965Z" }, "references": [ { @@ -158,6 +158,31 @@ "exploit", "x_cve_prog_secretariat_snapshot" ] + }, + { + "url": "https://vuldb.com/?id.257383/adp-test-6-28", + "name": "VDB-257383 | Campcodes Online Job Finder System index.php cross site scripting", + "tags": [ + "vdb-entry", + "technical-description", + "x_snapshot" + ] + }, + { + "url": "https://vuldb.com/?ctiid.257383/adp-test-6-28", + "name": "VDB-257383 | CTI Indicators (IOB, IOC, TTP, IOA)", + "tags": [ + "signature", + "permissions-required", + "x_snapshot" + ] + }, + { + "url": "https://github.com/E1CHO/cve_hub/blob/main/Online%20Job%20Finder%20System/Online%20Job%20Finder%20System%20-%20vuln%2018.pdf/adp-test-6-28", + "tags": [ + "exploit", + "x_snapshot" + ] } ] } diff --git a/cves/2024/2xxx/CVE-2024-2684.json b/cves/2024/2xxx/CVE-2024-2684.json index 8fe8f63dd08..0fc78eac01c 100644 --- a/cves/2024/2xxx/CVE-2024-2684.json +++ b/cves/2024/2xxx/CVE-2024-2684.json @@ -8,7 +8,7 @@ "assignerShortName": "VulDB", "dateReserved": "2024-03-19T19:56:47.969Z", "datePublished": "2024-03-20T08:31:06.059Z", - "dateUpdated": "2024-06-21T15:36:17.852Z" + "dateUpdated": "2024-07-05T14:26:41.847Z" }, "containers": { "cna": { @@ -131,7 +131,7 @@ "providerMetadata": { "orgId": "96f1cf3c-f80a-4e0f-a063-99a91e3f1325", "shortName": "secretariat-reference", - "dateUpdated": "2024-06-21T15:36:17.852Z" + "dateUpdated": "2024-07-05T14:26:41.847Z" }, "references": [ { @@ -158,6 +158,31 @@ "exploit", "x_cve_prog_secretariat_snapshot" ] + }, + { + "url": "https://vuldb.com/?id.257384/adp-test-6-28", + "name": "VDB-257384 | Campcodes Online Job Finder System index.php cross site scripting", + "tags": [ + "vdb-entry", + "technical-description", + "x_snapshot" + ] + }, + { + "url": "https://vuldb.com/?ctiid.257384/adp-test-6-28", + "name": "VDB-257384 | CTI Indicators (IOB, IOC, TTP, IOA)", + "tags": [ + "signature", + "permissions-required", + "x_snapshot" + ] + }, + { + "url": "https://github.com/E1CHO/cve_hub/blob/main/Online%20Job%20Finder%20System/Online%20Job%20Finder%20System%20-%20vuln%209.pdf/adp-test-6-28", + "tags": [ + "exploit", + "x_snapshot" + ] } ] } diff --git a/cves/2024/2xxx/CVE-2024-2685.json b/cves/2024/2xxx/CVE-2024-2685.json index 3cae2753f4a..423a66672e6 100644 --- a/cves/2024/2xxx/CVE-2024-2685.json +++ b/cves/2024/2xxx/CVE-2024-2685.json @@ -8,7 +8,7 @@ "assignerShortName": "VulDB", "dateReserved": "2024-03-19T19:56:51.345Z", "datePublished": "2024-03-20T09:00:05.783Z", - "dateUpdated": "2024-06-21T15:36:18.255Z" + "dateUpdated": "2024-07-05T14:26:41.975Z" }, "containers": { "cna": { @@ -131,7 +131,7 @@ "providerMetadata": { "orgId": "96f1cf3c-f80a-4e0f-a063-99a91e3f1325", "shortName": "secretariat-reference", - "dateUpdated": "2024-06-21T15:36:18.255Z" + "dateUpdated": "2024-07-05T14:26:41.975Z" }, "references": [ { @@ -158,6 +158,31 @@ "exploit", "x_cve_prog_secretariat_snapshot" ] + }, + { + "url": "https://vuldb.com/?id.257385/adp-test-6-28", + "name": "VDB-257385 | Campcodes Online Job Finder System index.php cross site scripting", + "tags": [ + "vdb-entry", + "technical-description", + "x_snapshot" + ] + }, + { + "url": "https://vuldb.com/?ctiid.257385/adp-test-6-28", + "name": "VDB-257385 | CTI Indicators (IOB, IOC, TTP, IOA)", + "tags": [ + "signature", + "permissions-required", + "x_snapshot" + ] + }, + { + "url": "https://github.com/E1CHO/cve_hub/blob/main/Online%20Job%20Finder%20System/Online%20Job%20Finder%20System%20-%20vuln%2020.pdf/adp-test-6-28", + "tags": [ + "exploit", + "x_snapshot" + ] } ] } diff --git a/cves/2024/2xxx/CVE-2024-2686.json b/cves/2024/2xxx/CVE-2024-2686.json index 578238ec68d..e36adf64365 100644 --- a/cves/2024/2xxx/CVE-2024-2686.json +++ b/cves/2024/2xxx/CVE-2024-2686.json @@ -8,7 +8,7 @@ "assignerShortName": "VulDB", "dateReserved": "2024-03-19T19:56:54.903Z", "datePublished": "2024-03-20T09:31:04.828Z", - "dateUpdated": "2024-06-21T15:36:18.642Z" + "dateUpdated": "2024-07-05T14:26:42.306Z" }, "containers": { "cna": { @@ -131,7 +131,7 @@ "providerMetadata": { "orgId": "96f1cf3c-f80a-4e0f-a063-99a91e3f1325", "shortName": "secretariat-reference", - "dateUpdated": "2024-06-21T15:36:18.642Z" + "dateUpdated": "2024-07-05T14:26:42.306Z" }, "references": [ { @@ -158,6 +158,31 @@ "exploit", "x_cve_prog_secretariat_snapshot" ] + }, + { + "url": "https://vuldb.com/?id.257386/adp-test-6-28", + "name": "VDB-257386 | Campcodes Online Job Finder System controller.php cross site scripting", + "tags": [ + "vdb-entry", + "technical-description", + "x_snapshot" + ] + }, + { + "url": "https://vuldb.com/?ctiid.257386/adp-test-6-28", + "name": "VDB-257386 | CTI Indicators (IOB, IOC, TTP, IOA)", + "tags": [ + "signature", + "permissions-required", + "x_snapshot" + ] + }, + { + "url": "https://github.com/E1CHO/cve_hub/blob/main/Online%20Job%20Finder%20System/Online%20Job%20Finder%20System%20-%20vuln%2021.pdf/adp-test-6-28", + "tags": [ + "exploit", + "x_snapshot" + ] } ] } diff --git a/cves/2024/2xxx/CVE-2024-2687.json b/cves/2024/2xxx/CVE-2024-2687.json index a0a2439ae40..0628f7aa006 100644 --- a/cves/2024/2xxx/CVE-2024-2687.json +++ b/cves/2024/2xxx/CVE-2024-2687.json @@ -8,7 +8,7 @@ "assignerShortName": "VulDB", "dateReserved": "2024-03-19T19:56:58.768Z", "datePublished": "2024-03-20T09:31:06.341Z", - "dateUpdated": "2024-06-21T15:36:19.042Z" + "dateUpdated": "2024-07-05T14:26:42.073Z" }, "containers": { "cna": { @@ -131,7 +131,7 @@ "providerMetadata": { "orgId": "96f1cf3c-f80a-4e0f-a063-99a91e3f1325", "shortName": "secretariat-reference", - "dateUpdated": "2024-06-21T15:36:19.042Z" + "dateUpdated": "2024-07-05T14:26:42.073Z" }, "references": [ { @@ -158,6 +158,31 @@ "exploit", "x_cve_prog_secretariat_snapshot" ] + }, + { + "url": "https://vuldb.com/?id.257387/adp-test-6-28", + "name": "VDB-257387 | Campcodes Online Job Finder System index.php sql injection", + "tags": [ + "vdb-entry", + "technical-description", + "x_snapshot" + ] + }, + { + "url": "https://vuldb.com/?ctiid.257387/adp-test-6-28", + "name": "VDB-257387 | CTI Indicators (IOB, IOC, TTP, IOA)", + "tags": [ + "signature", + "permissions-required", + "x_snapshot" + ] + }, + { + "url": "https://github.com/E1CHO/cve_hub/blob/main/Online%20Job%20Finder%20System/Online%20Job%20Finder%20System%20-%20vuln%2011.pdf/adp-test-6-28", + "tags": [ + "exploit", + "x_snapshot" + ] } ] } diff --git a/cves/2024/2xxx/CVE-2024-2688.json b/cves/2024/2xxx/CVE-2024-2688.json index 4e885a36f08..6eb05041e88 100644 --- a/cves/2024/2xxx/CVE-2024-2688.json +++ b/cves/2024/2xxx/CVE-2024-2688.json @@ -8,7 +8,7 @@ "assignerShortName": "Wordfence", "dateReserved": "2024-03-19T20:02:11.016Z", "datePublished": "2024-03-23T02:32:55.950Z", - "dateUpdated": "2024-06-21T15:36:19.441Z" + "dateUpdated": "2024-07-05T14:26:41.963Z" }, "containers": { "cna": { @@ -122,7 +122,7 @@ "providerMetadata": { "orgId": "96f1cf3c-f80a-4e0f-a063-99a91e3f1325", "shortName": "secretariat-reference", - "dateUpdated": "2024-06-21T15:36:19.441Z" + "dateUpdated": "2024-07-05T14:26:41.963Z" }, "references": [ { @@ -136,6 +136,18 @@ "tags": [ "x_cve_prog_secretariat_snapshot" ] + }, + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/c5b67927-5993-4e21-af52-8ebe7fee48ab?source=cve/adp-test-6-28", + "tags": [ + "x_snapshot" + ] + }, + { + "url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3055856%40embedpress&new=3055856%40embedpress&sfp_email=&sfph_mail=/adp-test-6-28", + "tags": [ + "x_snapshot" + ] } ] } diff --git a/cves/2024/2xxx/CVE-2024-2689.json b/cves/2024/2xxx/CVE-2024-2689.json index e55a028d441..c7b4018e465 100644 --- a/cves/2024/2xxx/CVE-2024-2689.json +++ b/cves/2024/2xxx/CVE-2024-2689.json @@ -8,7 +8,7 @@ "assignerShortName": "Temporal", "dateReserved": "2024-03-19T20:18:51.036Z", "datePublished": "2024-04-03T21:13:31.599Z", - "dateUpdated": "2024-06-21T15:36:19.830Z" + "dateUpdated": "2024-07-05T14:26:42.323Z" }, "containers": { "cna": { @@ -160,7 +160,7 @@ "providerMetadata": { "orgId": "96f1cf3c-f80a-4e0f-a063-99a91e3f1325", "shortName": "secretariat-reference", - "dateUpdated": "2024-06-21T15:36:19.830Z" + "dateUpdated": "2024-07-05T14:26:42.323Z" }, "references": [ { @@ -169,6 +169,13 @@ "x_cve_prog_secretariat_snapshot" ], "url": "https://github.com/temporalio/temporal/releases/DEMO_2024_06_19" + }, + { + "tags": [ + "release-notes", + "x_snapshot" + ], + "url": "https://github.com/temporalio/temporal/releases/adp-test-6-28" } ] } diff --git a/cves/2024/2xxx/CVE-2024-2690.json b/cves/2024/2xxx/CVE-2024-2690.json index 7c480cf4e0f..448cf159955 100644 --- a/cves/2024/2xxx/CVE-2024-2690.json +++ b/cves/2024/2xxx/CVE-2024-2690.json @@ -8,7 +8,7 @@ "assignerShortName": "VulDB", "dateReserved": "2024-03-19T20:23:20.444Z", "datePublished": "2024-03-20T10:00:06.860Z", - "dateUpdated": "2024-06-21T15:36:20.242Z" + "dateUpdated": "2024-07-05T14:26:42.060Z" }, "containers": { "cna": { @@ -132,7 +132,7 @@ "providerMetadata": { "orgId": "96f1cf3c-f80a-4e0f-a063-99a91e3f1325", "shortName": "secretariat-reference", - "dateUpdated": "2024-06-21T15:36:20.242Z" + "dateUpdated": "2024-07-05T14:26:42.060Z" }, "references": [ { @@ -160,6 +160,32 @@ "issue-tracking", "x_cve_prog_secretariat_snapshot" ] + }, + { + "url": "https://vuldb.com/?id.257388/adp-test-6-28", + "name": "VDB-257388 | SourceCodester Online Discussion Forum Site uupdate.php unrestricted upload", + "tags": [ + "vdb-entry", + "technical-description", + "x_snapshot" + ] + }, + { + "url": "https://vuldb.com/?ctiid.257388/adp-test-6-28", + "name": "VDB-257388 | CTI Indicators (IOB, IOC, TTP, IOA)", + "tags": [ + "signature", + "permissions-required", + "x_snapshot" + ] + }, + { + "url": "https://github.com/wkeyi0x1/vul-report/issues/2/adp-test-6-28", + "tags": [ + "exploit", + "issue-tracking", + "x_snapshot" + ] } ] } diff --git a/cves/2024/2xxx/CVE-2024-2692.json b/cves/2024/2xxx/CVE-2024-2692.json index a66f592383a..e0e2f5adfa0 100644 --- a/cves/2024/2xxx/CVE-2024-2692.json +++ b/cves/2024/2xxx/CVE-2024-2692.json @@ -8,7 +8,7 @@ "assignerShortName": "Fluid Attacks", "dateReserved": "2024-03-19T20:38:37.475Z", "datePublished": "2024-04-04T01:26:58.240Z", - "dateUpdated": "2024-06-21T15:36:20.636Z" + "dateUpdated": "2024-07-05T14:26:41.969Z" }, "containers": { "cna": { @@ -113,7 +113,7 @@ "providerMetadata": { "orgId": "96f1cf3c-f80a-4e0f-a063-99a91e3f1325", "shortName": "secretariat-reference", - "dateUpdated": "2024-06-21T15:36:20.636Z" + "dateUpdated": "2024-07-05T14:26:41.969Z" }, "references": [ { @@ -127,6 +127,18 @@ "tags": [ "x_cve_prog_secretariat_snapshot" ] + }, + { + "url": "https://fluidattacks.com/advisories/dezco//adp-test-6-28", + "tags": [ + "x_snapshot" + ] + }, + { + "url": "https://github.com/siyuan-note/siyuan//adp-test-6-28", + "tags": [ + "x_snapshot" + ] } ] } diff --git a/cves/2024/2xxx/CVE-2024-2693.json b/cves/2024/2xxx/CVE-2024-2693.json index 0793966c660..96d9d706b15 100644 --- a/cves/2024/2xxx/CVE-2024-2693.json +++ b/cves/2024/2xxx/CVE-2024-2693.json @@ -8,7 +8,7 @@ "assignerShortName": "Wordfence", "dateReserved": "2024-03-19T20:43:11.701Z", "datePublished": "2024-04-09T18:59:02.060Z", - "dateUpdated": "2024-06-21T15:36:21.135Z" + "dateUpdated": "2024-07-05T14:26:42.299Z" }, "containers": { "cna": { @@ -86,7 +86,7 @@ "providerMetadata": { "orgId": "96f1cf3c-f80a-4e0f-a063-99a91e3f1325", "shortName": "secretariat-reference", - "dateUpdated": "2024-06-21T15:36:21.135Z" + "dateUpdated": "2024-07-05T14:26:42.299Z" }, "references": [ { @@ -100,6 +100,18 @@ "tags": [ "x_cve_prog_secretariat_snapshot" ] + }, + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/7d5dd7cd-f96a-48df-a553-be5e59d8290f?source=cve/adp-test-6-28", + "tags": [ + "x_snapshot" + ] + }, + { + "url": "https://plugins.trac.wordpress.org/changeset/3057518/link-whisper/tags/0.7.2/core/Wpil/Editor/Muffin.php?old=3048109&old_path=link-whisper%2Ftags%2F0.7.1%2Fcore%2FWpil%2FEditor%2FMuffin.php/adp-test-6-28", + "tags": [ + "x_snapshot" + ] } ] } diff --git a/cves/2024/2xxx/CVE-2024-2695.json b/cves/2024/2xxx/CVE-2024-2695.json index 90794536804..f3f9433b6f9 100644 --- a/cves/2024/2xxx/CVE-2024-2695.json +++ b/cves/2024/2xxx/CVE-2024-2695.json @@ -8,7 +8,7 @@ "assignerShortName": "Wordfence", "dateReserved": "2024-03-19T20:54:23.973Z", "datePublished": "2024-06-15T08:42:16.998Z", - "dateUpdated": "2024-06-17T15:48:43.438Z" + "dateUpdated": "2024-07-05T14:26:41.967Z" }, "containers": { "cna": { @@ -114,6 +114,27 @@ "shortName": "CISA-ADP", "dateUpdated": "2024-06-17T15:48:43.438Z" } + }, + { + "providerMetadata": { + "orgId": "96f1cf3c-f80a-4e0f-a063-99a91e3f1325", + "shortName": "secretariat-reference", + "dateUpdated": "2024-07-05T14:26:41.967Z" + }, + "references": [ + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/9baa8bbf-a318-4bc5-8bfd-2bd64536965e?source=cve/adp-test-6-28", + "tags": [ + "x_snapshot" + ] + }, + { + "url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&new=3069111%40shariff%2Ftrunk&old=3061040%40shariff%2Ftrunk&sfp_email=&sfph_mail=#file1/adp-test-6-28", + "tags": [ + "x_snapshot" + ] + } + ] } ] } diff --git a/cves/2024/2xxx/CVE-2024-2697.json b/cves/2024/2xxx/CVE-2024-2697.json index e43d2fd1da9..c83e408dd3b 100644 --- a/cves/2024/2xxx/CVE-2024-2697.json +++ b/cves/2024/2xxx/CVE-2024-2697.json @@ -8,7 +8,7 @@ "assignerShortName": "WPScan", "dateReserved": "2024-03-19T20:54:36.107Z", "datePublished": "2024-05-17T06:00:01.759Z", - "dateUpdated": "2024-06-21T15:36:21.553Z" + "dateUpdated": "2024-07-05T14:26:42.315Z" }, "containers": { "cna": { @@ -162,7 +162,7 @@ "providerMetadata": { "orgId": "96f1cf3c-f80a-4e0f-a063-99a91e3f1325", "shortName": "secretariat-reference", - "dateUpdated": "2024-06-21T15:36:21.553Z" + "dateUpdated": "2024-07-05T14:26:42.315Z" }, "references": [ { @@ -173,6 +173,15 @@ "technical-description", "x_cve_prog_secretariat_snapshot" ] + }, + { + "url": "https://wpscan.com/vulnerability/c430b30d-61db-45f5-8499-91b491503b9c//adp-test-6-28", + "tags": [ + "exploit", + "vdb-entry", + "technical-description", + "x_snapshot" + ] } ] } diff --git a/cves/2024/2xxx/CVE-2024-2698.json b/cves/2024/2xxx/CVE-2024-2698.json index be913d9515d..1e11ecc8241 100644 --- a/cves/2024/2xxx/CVE-2024-2698.json +++ b/cves/2024/2xxx/CVE-2024-2698.json @@ -8,7 +8,7 @@ "assignerShortName": "redhat", "dateReserved": "2024-03-19T21:12:01.436Z", "datePublished": "2024-06-12T08:03:49.013Z", - "dateUpdated": "2024-06-12T13:21:40.368Z" + "dateUpdated": "2024-07-05T14:26:42.314Z" }, "containers": { "cna": { @@ -288,6 +288,80 @@ "shortName": "CISA-ADP", "dateUpdated": "2024-06-12T13:21:40.368Z" } + }, + { + "providerMetadata": { + "orgId": "96f1cf3c-f80a-4e0f-a063-99a91e3f1325", + "shortName": "secretariat-reference", + "dateUpdated": "2024-07-05T14:26:42.314Z" + }, + "references": [ + { + "url": "https://access.redhat.com/errata/RHSA-2024:3754/adp-test-6-28", + "name": "RHSA-2024:3754", + "tags": [ + "vendor-advisory", + "x_refsource_REDHAT", + "x_snapshot" + ] + }, + { + "url": "https://access.redhat.com/errata/RHSA-2024:3755/adp-test-6-28", + "name": "RHSA-2024:3755", + "tags": [ + "vendor-advisory", + "x_refsource_REDHAT", + "x_snapshot" + ] + }, + { + "url": "https://access.redhat.com/errata/RHSA-2024:3757/adp-test-6-28", + "name": "RHSA-2024:3757", + "tags": [ + "vendor-advisory", + "x_refsource_REDHAT", + "x_snapshot" + ] + }, + { + "url": "https://access.redhat.com/errata/RHSA-2024:3759/adp-test-6-28", + "name": "RHSA-2024:3759", + "tags": [ + "vendor-advisory", + "x_refsource_REDHAT", + "x_snapshot" + ] + }, + { + "url": "https://access.redhat.com/security/cve/CVE-2024-2698/adp-test-6-28", + "tags": [ + "vdb-entry", + "x_refsource_REDHAT", + "x_snapshot" + ] + }, + { + "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2270353/adp-test-6-28", + "name": "RHBZ#2270353", + "tags": [ + "issue-tracking", + "x_refsource_REDHAT", + "x_snapshot" + ] + }, + { + "url": "https://www.freeipa.org/release-notes/4-12-1.html/adp-test-6-28", + "tags": [ + "x_snapshot" + ] + }, + { + "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WT3JL7JQDIAFKKEFARWYES7GZNWGQNCI//adp-test-6-28", + "tags": [ + "x_snapshot" + ] + } + ] } ] } diff --git a/cves/2024/2xxx/CVE-2024-2700.json b/cves/2024/2xxx/CVE-2024-2700.json index fb88e6da317..b891e7ee752 100644 --- a/cves/2024/2xxx/CVE-2024-2700.json +++ b/cves/2024/2xxx/CVE-2024-2700.json @@ -8,7 +8,7 @@ "assignerShortName": "redhat", "dateReserved": "2024-03-20T01:39:49.992Z", "datePublished": "2024-04-04T13:46:39.956Z", - "dateUpdated": "2024-06-23T16:05:09.741Z" + "dateUpdated": "2024-07-05T14:26:42.345Z" }, "containers": { "cna": { @@ -915,6 +915,59 @@ "shortName": "CISAADP", "dateUpdated": "2024-05-16T18:55:18.616Z" } + }, + { + "providerMetadata": { + "orgId": "96f1cf3c-f80a-4e0f-a063-99a91e3f1325", + "shortName": "secretariat-reference", + "dateUpdated": "2024-07-05T14:26:42.345Z" + }, + "references": [ + { + "url": "https://access.redhat.com/errata/RHSA-2024:2705/adp-test-6-28", + "name": "RHSA-2024:2705", + "tags": [ + "vendor-advisory", + "x_refsource_REDHAT", + "x_snapshot" + ] + }, + { + "url": "https://access.redhat.com/errata/RHSA-2024:3527/adp-test-6-28", + "name": "RHSA-2024:3527", + "tags": [ + "vendor-advisory", + "x_refsource_REDHAT", + "x_snapshot" + ] + }, + { + "url": "https://access.redhat.com/errata/RHSA-2024:4028/adp-test-6-28", + "name": "RHSA-2024:4028", + "tags": [ + "vendor-advisory", + "x_refsource_REDHAT", + "x_snapshot" + ] + }, + { + "url": "https://access.redhat.com/security/cve/CVE-2024-2700/adp-test-6-28", + "tags": [ + "vdb-entry", + "x_refsource_REDHAT", + "x_snapshot" + ] + }, + { + "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2273281/adp-test-6-28", + "name": "RHBZ#2273281", + "tags": [ + "issue-tracking", + "x_refsource_REDHAT", + "x_snapshot" + ] + } + ] } ] } diff --git a/cves/2024/2xxx/CVE-2024-2702.json b/cves/2024/2xxx/CVE-2024-2702.json index 4dce3bf539c..bab2ec7892a 100644 --- a/cves/2024/2xxx/CVE-2024-2702.json +++ b/cves/2024/2xxx/CVE-2024-2702.json @@ -8,7 +8,7 @@ "assignerShortName": "Patchstack", "dateReserved": "2024-03-20T09:26:12.601Z", "datePublished": "2024-03-20T09:36:45.118Z", - "dateUpdated": "2024-06-21T15:36:22.084Z" + "dateUpdated": "2024-07-05T14:26:42.297Z" }, "containers": { "cna": { @@ -132,7 +132,7 @@ "providerMetadata": { "orgId": "96f1cf3c-f80a-4e0f-a063-99a91e3f1325", "shortName": "secretariat-reference", - "dateUpdated": "2024-06-21T15:36:22.084Z" + "dateUpdated": "2024-07-05T14:26:42.297Z" }, "references": [ { @@ -141,6 +141,13 @@ "x_cve_prog_secretariat_snapshot" ], "url": "https://patchstack.com/database/vulnerability/olive-one-click-demo-import/wordpress-olive-one-click-demo-import-plugin-1-1-1-broken-access-control-vulnerability?_s_id=cve/DEMO_2024_06_19" + }, + { + "tags": [ + "vdb-entry", + "x_snapshot" + ], + "url": "https://patchstack.com/database/vulnerability/olive-one-click-demo-import/wordpress-olive-one-click-demo-import-plugin-1-1-1-broken-access-control-vulnerability?_s_id=cve/adp-test-6-28" } ] } diff --git a/cves/2024/2xxx/CVE-2024-2703.json b/cves/2024/2xxx/CVE-2024-2703.json index d2793589c2f..bca767aa943 100644 --- a/cves/2024/2xxx/CVE-2024-2703.json +++ b/cves/2024/2xxx/CVE-2024-2703.json @@ -8,7 +8,7 @@ "assignerShortName": "VulDB", "dateReserved": "2024-03-20T09:49:23.341Z", "datePublished": "2024-03-20T16:00:06.080Z", - "dateUpdated": "2024-06-21T15:36:22.465Z" + "dateUpdated": "2024-07-05T14:26:39.847Z" }, "containers": { "cna": { @@ -131,7 +131,7 @@ "providerMetadata": { "orgId": "96f1cf3c-f80a-4e0f-a063-99a91e3f1325", "shortName": "secretariat-reference", - "dateUpdated": "2024-06-21T15:36:22.465Z" + "dateUpdated": "2024-07-05T14:26:39.847Z" }, "references": [ { @@ -158,6 +158,31 @@ "exploit", "x_cve_prog_secretariat_snapshot" ] + }, + { + "url": "https://vuldb.com/?id.257454/adp-test-6-28", + "name": "VDB-257454 | Tenda AC10U SetOnlineDevName formSetDeviceName stack-based overflow", + "tags": [ + "vdb-entry", + "technical-description", + "x_snapshot" + ] + }, + { + "url": "https://vuldb.com/?ctiid.257454/adp-test-6-28", + "name": "VDB-257454 | CTI Indicators (IOB, IOC, IOA)", + "tags": [ + "signature", + "permissions-required", + "x_snapshot" + ] + }, + { + "url": "https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/AC10U/v1.V15.03.06.49/more/formSetDeviceName_mac.md/adp-test-6-28", + "tags": [ + "exploit", + "x_snapshot" + ] } ] } diff --git a/cves/2024/2xxx/CVE-2024-2704.json b/cves/2024/2xxx/CVE-2024-2704.json index 3b50e3fcade..3ec353f0579 100644 --- a/cves/2024/2xxx/CVE-2024-2704.json +++ b/cves/2024/2xxx/CVE-2024-2704.json @@ -8,7 +8,7 @@ "assignerShortName": "VulDB", "dateReserved": "2024-03-20T09:49:39.887Z", "datePublished": "2024-03-20T16:00:07.684Z", - "dateUpdated": "2024-06-21T15:36:22.847Z" + "dateUpdated": "2024-07-05T14:26:41.895Z" }, "containers": { "cna": { @@ -131,7 +131,7 @@ "providerMetadata": { "orgId": "96f1cf3c-f80a-4e0f-a063-99a91e3f1325", "shortName": "secretariat-reference", - "dateUpdated": "2024-06-21T15:36:22.847Z" + "dateUpdated": "2024-07-05T14:26:41.895Z" }, "references": [ { @@ -158,6 +158,31 @@ "exploit", "x_cve_prog_secretariat_snapshot" ] + }, + { + "url": "https://vuldb.com/?id.257455/adp-test-6-28", + "name": "VDB-257455 | Tenda AC10U SetFirewallCfg formSetFirewallCfg stack-based overflow", + "tags": [ + "vdb-entry", + "technical-description", + "x_snapshot" + ] + }, + { + "url": "https://vuldb.com/?ctiid.257455/adp-test-6-28", + "name": "VDB-257455 | CTI Indicators (IOB, IOC, IOA)", + "tags": [ + "signature", + "permissions-required", + "x_snapshot" + ] + }, + { + "url": "https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/AC10U/v1.V15.03.06.49/more/formSetFirewallCfg.md/adp-test-6-28", + "tags": [ + "exploit", + "x_snapshot" + ] } ] } diff --git a/cves/2024/2xxx/CVE-2024-2705.json b/cves/2024/2xxx/CVE-2024-2705.json index 6a5c2963e13..f5c775a5b41 100644 --- a/cves/2024/2xxx/CVE-2024-2705.json +++ b/cves/2024/2xxx/CVE-2024-2705.json @@ -1,6 +1,6 @@ { "dataType": "CVE_RECORD", - "dataVersion": "5.0", + "dataVersion": "5.1", "cveMetadata": { "cveId": "CVE-2024-2705", "assignerOrgId": "1af790b2-7ee1-4545-860a-a788eba489b5", @@ -8,7 +8,7 @@ "assignerShortName": "VulDB", "dateReserved": "2024-03-20T09:49:55.324Z", "datePublished": "2024-03-20T16:31:04.186Z", - "dateUpdated": "2024-06-18T20:06:01.280Z" + "dateUpdated": "2024-07-05T14:26:42.215Z" }, "containers": { "cna": { @@ -129,6 +129,42 @@ ] } ] - } + }, + "adp": [ + { + "providerMetadata": { + "orgId": "96f1cf3c-f80a-4e0f-a063-99a91e3f1325", + "shortName": "secretariat-reference", + "dateUpdated": "2024-07-05T14:26:42.215Z" + }, + "references": [ + { + "url": "https://vuldb.com/?id.257456/adp-test-6-28", + "name": "VDB-257456 | Tenda AC10U SetNetControlList formSetQosBand stack-based overflow", + "tags": [ + "vdb-entry", + "technical-description", + "x_snapshot" + ] + }, + { + "url": "https://vuldb.com/?ctiid.257456/adp-test-6-28", + "name": "VDB-257456 | CTI Indicators (IOB, IOC, IOA)", + "tags": [ + "signature", + "permissions-required", + "x_snapshot" + ] + }, + { + "url": "https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/AC10U/v1.V15.03.06.49/more/formSetQosBand.md/adp-test-6-28", + "tags": [ + "exploit", + "x_snapshot" + ] + } + ] + } + ] } } \ No newline at end of file diff --git a/cves/2024/2xxx/CVE-2024-2706.json b/cves/2024/2xxx/CVE-2024-2706.json index 68625bf71bf..38a175e7894 100644 --- a/cves/2024/2xxx/CVE-2024-2706.json +++ b/cves/2024/2xxx/CVE-2024-2706.json @@ -8,7 +8,7 @@ "assignerShortName": "VulDB", "dateReserved": "2024-03-20T09:50:11.514Z", "datePublished": "2024-03-20T16:31:05.842Z", - "dateUpdated": "2024-06-21T15:36:23.358Z" + "dateUpdated": "2024-07-05T14:26:42.076Z" }, "containers": { "cna": { @@ -131,7 +131,7 @@ "providerMetadata": { "orgId": "96f1cf3c-f80a-4e0f-a063-99a91e3f1325", "shortName": "secretariat-reference", - "dateUpdated": "2024-06-21T15:36:23.358Z" + "dateUpdated": "2024-07-05T14:26:42.076Z" }, "references": [ { @@ -158,6 +158,31 @@ "exploit", "x_cve_prog_secretariat_snapshot" ] + }, + { + "url": "https://vuldb.com/?id.257457/adp-test-6-28", + "name": "VDB-257457 | Tenda AC10U WifiWpsStart formWifiWpsStart stack-based overflow", + "tags": [ + "vdb-entry", + "technical-description", + "x_snapshot" + ] + }, + { + "url": "https://vuldb.com/?ctiid.257457/adp-test-6-28", + "name": "VDB-257457 | CTI Indicators (IOB, IOC, IOA)", + "tags": [ + "signature", + "permissions-required", + "x_snapshot" + ] + }, + { + "url": "https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/AC10U/v1.V15.03.06.49/more/formWifiWpsStart.md/adp-test-6-28", + "tags": [ + "exploit", + "x_snapshot" + ] } ] } diff --git a/cves/2024/2xxx/CVE-2024-2707.json b/cves/2024/2xxx/CVE-2024-2707.json index 507298b948d..d71d135c159 100644 --- a/cves/2024/2xxx/CVE-2024-2707.json +++ b/cves/2024/2xxx/CVE-2024-2707.json @@ -8,7 +8,7 @@ "assignerShortName": "VulDB", "dateReserved": "2024-03-20T09:50:27.154Z", "datePublished": "2024-03-20T17:00:07.795Z", - "dateUpdated": "2024-06-21T15:36:23.750Z" + "dateUpdated": "2024-07-05T14:26:39.802Z" }, "containers": { "cna": { @@ -131,7 +131,7 @@ "providerMetadata": { "orgId": "96f1cf3c-f80a-4e0f-a063-99a91e3f1325", "shortName": "secretariat-reference", - "dateUpdated": "2024-06-21T15:36:23.750Z" + "dateUpdated": "2024-07-05T14:26:39.802Z" }, "references": [ { @@ -158,6 +158,31 @@ "exploit", "x_cve_prog_secretariat_snapshot" ] + }, + { + "url": "https://vuldb.com/?id.257458/adp-test-6-28", + "name": "VDB-257458 | Tenda AC10U WriteFacMac formWriteFacMac os command injection", + "tags": [ + "vdb-entry", + "technical-description", + "x_snapshot" + ] + }, + { + "url": "https://vuldb.com/?ctiid.257458/adp-test-6-28", + "name": "VDB-257458 | CTI Indicators (IOB, IOC, TTP, IOA)", + "tags": [ + "signature", + "permissions-required", + "x_snapshot" + ] + }, + { + "url": "https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/AC10U/v1.V15.03.06.49/more/formWriteFacMac.md/adp-test-6-28", + "tags": [ + "exploit", + "x_snapshot" + ] } ] } diff --git a/cves/2024/2xxx/CVE-2024-2708.json b/cves/2024/2xxx/CVE-2024-2708.json index 5fdb00ad69b..4005cf0e110 100644 --- a/cves/2024/2xxx/CVE-2024-2708.json +++ b/cves/2024/2xxx/CVE-2024-2708.json @@ -8,7 +8,7 @@ "assignerShortName": "VulDB", "dateReserved": "2024-03-20T09:50:52.265Z", "datePublished": "2024-03-20T17:31:04.520Z", - "dateUpdated": "2024-06-21T15:36:24.143Z" + "dateUpdated": "2024-07-05T14:26:42.324Z" }, "containers": { "cna": { @@ -131,7 +131,7 @@ "providerMetadata": { "orgId": "96f1cf3c-f80a-4e0f-a063-99a91e3f1325", "shortName": "secretariat-reference", - "dateUpdated": "2024-06-21T15:36:24.143Z" + "dateUpdated": "2024-07-05T14:26:42.324Z" }, "references": [ { @@ -158,6 +158,31 @@ "exploit", "x_cve_prog_secretariat_snapshot" ] + }, + { + "url": "https://vuldb.com/?id.257459/adp-test-6-28", + "name": "VDB-257459 | Tenda AC10U execCommand formexeCommand stack-based overflow", + "tags": [ + "vdb-entry", + "technical-description", + "x_snapshot" + ] + }, + { + "url": "https://vuldb.com/?ctiid.257459/adp-test-6-28", + "name": "VDB-257459 | CTI Indicators (IOB, IOC, IOA)", + "tags": [ + "signature", + "permissions-required", + "x_snapshot" + ] + }, + { + "url": "https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/AC10U/v1.V15.03.06.49/more/formexeCommand.md/adp-test-6-28", + "tags": [ + "exploit", + "x_snapshot" + ] } ] } diff --git a/cves/2024/2xxx/CVE-2024-2709.json b/cves/2024/2xxx/CVE-2024-2709.json index 98639efa7b3..6eeaee25cbc 100644 --- a/cves/2024/2xxx/CVE-2024-2709.json +++ b/cves/2024/2xxx/CVE-2024-2709.json @@ -8,7 +8,7 @@ "assignerShortName": "VulDB", "dateReserved": "2024-03-20T09:51:03.150Z", "datePublished": "2024-03-20T17:31:05.924Z", - "dateUpdated": "2024-06-21T15:36:24.525Z" + "dateUpdated": "2024-07-05T14:26:42.283Z" }, "containers": { "cna": { @@ -131,7 +131,7 @@ "providerMetadata": { "orgId": "96f1cf3c-f80a-4e0f-a063-99a91e3f1325", "shortName": "secretariat-reference", - "dateUpdated": "2024-06-21T15:36:24.525Z" + "dateUpdated": "2024-07-05T14:26:42.283Z" }, "references": [ { @@ -158,6 +158,31 @@ "exploit", "x_cve_prog_secretariat_snapshot" ] + }, + { + "url": "https://vuldb.com/?id.257460/adp-test-6-28", + "name": "VDB-257460 | Tenda AC10U SetStaticRouteCfg fromSetRouteStatic stack-based overflow", + "tags": [ + "vdb-entry", + "technical-description", + "x_snapshot" + ] + }, + { + "url": "https://vuldb.com/?ctiid.257460/adp-test-6-28", + "name": "VDB-257460 | CTI Indicators (IOB, IOC, IOA)", + "tags": [ + "signature", + "permissions-required", + "x_snapshot" + ] + }, + { + "url": "https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/AC10U/v1.V15.03.06.49/more/fromSetRouteStatic.md/adp-test-6-28", + "tags": [ + "exploit", + "x_snapshot" + ] } ] } diff --git a/cves/2024/2xxx/CVE-2024-2710.json b/cves/2024/2xxx/CVE-2024-2710.json index 10c291d0f0c..7bdb2a64129 100644 --- a/cves/2024/2xxx/CVE-2024-2710.json +++ b/cves/2024/2xxx/CVE-2024-2710.json @@ -8,7 +8,7 @@ "assignerShortName": "VulDB", "dateReserved": "2024-03-20T09:51:17.589Z", "datePublished": "2024-03-20T18:00:07.175Z", - "dateUpdated": "2024-06-21T15:36:24.925Z" + "dateUpdated": "2024-07-05T14:26:42.274Z" }, "containers": { "cna": { @@ -131,7 +131,7 @@ "providerMetadata": { "orgId": "96f1cf3c-f80a-4e0f-a063-99a91e3f1325", "shortName": "secretariat-reference", - "dateUpdated": "2024-06-21T15:36:24.925Z" + "dateUpdated": "2024-07-05T14:26:42.274Z" }, "references": [ { @@ -158,6 +158,31 @@ "exploit", "x_cve_prog_secretariat_snapshot" ] + }, + { + "url": "https://vuldb.com/?id.257461/adp-test-6-28", + "name": "VDB-257461 | Tenda AC10U openSchedWifi setSchedWifi stack-based overflow", + "tags": [ + "vdb-entry", + "technical-description", + "x_snapshot" + ] + }, + { + "url": "https://vuldb.com/?ctiid.257461/adp-test-6-28", + "name": "VDB-257461 | CTI Indicators (IOB, IOC, IOA)", + "tags": [ + "signature", + "permissions-required", + "x_snapshot" + ] + }, + { + "url": "https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/AC10U/v1.V15.03.06.49/more/setSchedWifi_start.md/adp-test-6-28", + "tags": [ + "exploit", + "x_snapshot" + ] } ] } diff --git a/cves/2024/2xxx/CVE-2024-2711.json b/cves/2024/2xxx/CVE-2024-2711.json index 07113e3282f..ecaab4471f3 100644 --- a/cves/2024/2xxx/CVE-2024-2711.json +++ b/cves/2024/2xxx/CVE-2024-2711.json @@ -8,7 +8,7 @@ "assignerShortName": "VulDB", "dateReserved": "2024-03-20T09:51:32.403Z", "datePublished": "2024-03-20T18:00:08.616Z", - "dateUpdated": "2024-06-21T15:36:25.305Z" + "dateUpdated": "2024-07-05T14:26:42.245Z" }, "containers": { "cna": { @@ -131,7 +131,7 @@ "providerMetadata": { "orgId": "96f1cf3c-f80a-4e0f-a063-99a91e3f1325", "shortName": "secretariat-reference", - "dateUpdated": "2024-06-21T15:36:25.305Z" + "dateUpdated": "2024-07-05T14:26:42.245Z" }, "references": [ { @@ -158,6 +158,31 @@ "exploit", "x_cve_prog_secretariat_snapshot" ] + }, + { + "url": "https://vuldb.com/?id.257462/adp-test-6-28", + "name": "VDB-257462 | Tenda AC10U addWifiMacFilter stack-based overflow", + "tags": [ + "vdb-entry", + "technical-description", + "x_snapshot" + ] + }, + { + "url": "https://vuldb.com/?ctiid.257462/adp-test-6-28", + "name": "VDB-257462 | CTI Indicators (IOB, IOC, IOA)", + "tags": [ + "signature", + "permissions-required", + "x_snapshot" + ] + }, + { + "url": "https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/AC10U/v1.V15.03.06.48/more/addWifiMacFilter_deviceMac.md/adp-test-6-28", + "tags": [ + "exploit", + "x_snapshot" + ] } ] } diff --git a/cves/2024/2xxx/CVE-2024-2712.json b/cves/2024/2xxx/CVE-2024-2712.json index 8139e0cf3eb..3fa461e0849 100644 --- a/cves/2024/2xxx/CVE-2024-2712.json +++ b/cves/2024/2xxx/CVE-2024-2712.json @@ -8,7 +8,7 @@ "assignerShortName": "VulDB", "dateReserved": "2024-03-20T10:14:35.995Z", "datePublished": "2024-03-20T18:31:06.308Z", - "dateUpdated": "2024-06-27T19:09:10.511Z" + "dateUpdated": "2024-07-05T14:26:42.195Z" }, "containers": { "cna": { @@ -131,7 +131,7 @@ "providerMetadata": { "orgId": "96f1cf3c-f80a-4e0f-a063-99a91e3f1325", "shortName": "secretariat-reference", - "dateUpdated": "2024-06-21T15:36:25.686Z" + "dateUpdated": "2024-07-05T14:26:42.195Z" }, "references": [ { @@ -158,6 +158,31 @@ "exploit", "x_cve_prog_secretariat_snapshot" ] + }, + { + "url": "https://vuldb.com/?id.257465/adp-test-6-28", + "name": "VDB-257465 | Campcodes Complete Online DJ Booking System user-search.php sql injection", + "tags": [ + "vdb-entry", + "technical-description", + "x_snapshot" + ] + }, + { + "url": "https://vuldb.com/?ctiid.257465/adp-test-6-28", + "name": "VDB-257465 | CTI Indicators (IOB, IOC, TTP, IOA)", + "tags": [ + "signature", + "permissions-required", + "x_snapshot" + ] + }, + { + "url": "https://github.com/E1CHO/cve_hub/blob/main/Complete%20Online%20DJ%20Booking%20System/Complete%20Online%20DJ%20Booking%20System%20-%20vuln%201.pdf/adp-test-6-28", + "tags": [ + "exploit", + "x_snapshot" + ] } ] } diff --git a/cves/2024/2xxx/CVE-2024-2713.json b/cves/2024/2xxx/CVE-2024-2713.json index c57190c8dea..64f3176cde1 100644 --- a/cves/2024/2xxx/CVE-2024-2713.json +++ b/cves/2024/2xxx/CVE-2024-2713.json @@ -8,7 +8,7 @@ "assignerShortName": "VulDB", "dateReserved": "2024-03-20T10:14:38.362Z", "datePublished": "2024-03-20T19:00:07.213Z", - "dateUpdated": "2024-06-21T15:36:26.085Z" + "dateUpdated": "2024-07-05T14:26:42.339Z" }, "containers": { "cna": { @@ -131,7 +131,7 @@ "providerMetadata": { "orgId": "96f1cf3c-f80a-4e0f-a063-99a91e3f1325", "shortName": "secretariat-reference", - "dateUpdated": "2024-06-21T15:36:26.085Z" + "dateUpdated": "2024-07-05T14:26:42.339Z" }, "references": [ { @@ -158,6 +158,31 @@ "exploit", "x_cve_prog_secretariat_snapshot" ] + }, + { + "url": "https://vuldb.com/?id.257466/adp-test-6-28", + "name": "VDB-257466 | Campcodes Complete Online DJ Booking System booking-search.php sql injection", + "tags": [ + "vdb-entry", + "technical-description", + "x_snapshot" + ] + }, + { + "url": "https://vuldb.com/?ctiid.257466/adp-test-6-28", + "name": "VDB-257466 | CTI Indicators (IOB, IOC, TTP, IOA)", + "tags": [ + "signature", + "permissions-required", + "x_snapshot" + ] + }, + { + "url": "https://github.com/E1CHO/cve_hub/blob/main/Complete%20Online%20DJ%20Booking%20System/Complete%20Online%20DJ%20Booking%20System%20-%20vuln%202.pdf/adp-test-6-28", + "tags": [ + "exploit", + "x_snapshot" + ] } ] } diff --git a/cves/2024/2xxx/CVE-2024-2714.json b/cves/2024/2xxx/CVE-2024-2714.json index b2a34f5c2a4..8bf0d3389d0 100644 --- a/cves/2024/2xxx/CVE-2024-2714.json +++ b/cves/2024/2xxx/CVE-2024-2714.json @@ -8,7 +8,7 @@ "assignerShortName": "VulDB", "dateReserved": "2024-03-20T10:14:41.895Z", "datePublished": "2024-03-20T19:31:04.579Z", - "dateUpdated": "2024-06-21T15:36:26.500Z" + "dateUpdated": "2024-07-05T14:26:42.241Z" }, "containers": { "cna": { @@ -131,7 +131,7 @@ "providerMetadata": { "orgId": "96f1cf3c-f80a-4e0f-a063-99a91e3f1325", "shortName": "secretariat-reference", - "dateUpdated": "2024-06-21T15:36:26.500Z" + "dateUpdated": "2024-07-05T14:26:42.241Z" }, "references": [ { @@ -158,6 +158,31 @@ "exploit", "x_cve_prog_secretariat_snapshot" ] + }, + { + "url": "https://vuldb.com/?id.257467/adp-test-6-28", + "name": "VDB-257467 | Campcodes Complete Online DJ Booking System booking-bwdates-reports-details.php sql injection", + "tags": [ + "vdb-entry", + "technical-description", + "x_snapshot" + ] + }, + { + "url": "https://vuldb.com/?ctiid.257467/adp-test-6-28", + "name": "VDB-257467 | CTI Indicators (IOB, IOC, TTP, IOA)", + "tags": [ + "signature", + "permissions-required", + "x_snapshot" + ] + }, + { + "url": "https://github.com/E1CHO/cve_hub/blob/main/Complete%20Online%20DJ%20Booking%20System/Complete%20Online%20DJ%20Booking%20System%20-%20vuln%203.pdf/adp-test-6-28", + "tags": [ + "exploit", + "x_snapshot" + ] } ] } diff --git a/cves/2024/2xxx/CVE-2024-2715.json b/cves/2024/2xxx/CVE-2024-2715.json index 02250b4e465..3dcbf5697c2 100644 --- a/cves/2024/2xxx/CVE-2024-2715.json +++ b/cves/2024/2xxx/CVE-2024-2715.json @@ -8,7 +8,7 @@ "assignerShortName": "VulDB", "dateReserved": "2024-03-20T10:14:45.211Z", "datePublished": "2024-03-20T20:00:06.520Z", - "dateUpdated": "2024-06-21T15:36:26.882Z" + "dateUpdated": "2024-07-05T14:26:42.223Z" }, "containers": { "cna": { @@ -131,7 +131,7 @@ "providerMetadata": { "orgId": "96f1cf3c-f80a-4e0f-a063-99a91e3f1325", "shortName": "secretariat-reference", - "dateUpdated": "2024-06-21T15:36:26.882Z" + "dateUpdated": "2024-07-05T14:26:42.223Z" }, "references": [ { @@ -158,6 +158,31 @@ "exploit", "x_cve_prog_secretariat_snapshot" ] + }, + { + "url": "https://vuldb.com/?id.257468/adp-test-6-28", + "name": "VDB-257468 | Campcodes Complete Online DJ Booking System user-search.php cross site scripting", + "tags": [ + "vdb-entry", + "technical-description", + "x_snapshot" + ] + }, + { + "url": "https://vuldb.com/?ctiid.257468/adp-test-6-28", + "name": "VDB-257468 | CTI Indicators (IOB, IOC, TTP, IOA)", + "tags": [ + "signature", + "permissions-required", + "x_snapshot" + ] + }, + { + "url": "https://github.com/E1CHO/cve_hub/blob/main/Complete%20Online%20DJ%20Booking%20System/Complete%20Online%20DJ%20Booking%20System%20-%20vuln%204.pdf/adp-test-6-28", + "tags": [ + "exploit", + "x_snapshot" + ] } ] } diff --git a/cves/2024/2xxx/CVE-2024-2716.json b/cves/2024/2xxx/CVE-2024-2716.json index c1be640ebbb..5c7207de6c0 100644 --- a/cves/2024/2xxx/CVE-2024-2716.json +++ b/cves/2024/2xxx/CVE-2024-2716.json @@ -8,7 +8,7 @@ "assignerShortName": "VulDB", "dateReserved": "2024-03-20T10:14:48.414Z", "datePublished": "2024-03-20T20:00:08.091Z", - "dateUpdated": "2024-06-21T15:36:27.270Z" + "dateUpdated": "2024-07-05T14:26:42.067Z" }, "containers": { "cna": { @@ -131,7 +131,7 @@ "providerMetadata": { "orgId": "96f1cf3c-f80a-4e0f-a063-99a91e3f1325", "shortName": "secretariat-reference", - "dateUpdated": "2024-06-21T15:36:27.270Z" + "dateUpdated": "2024-07-05T14:26:42.067Z" }, "references": [ { @@ -158,6 +158,31 @@ "exploit", "x_cve_prog_secretariat_snapshot" ] + }, + { + "url": "https://vuldb.com/?id.257469/adp-test-6-28", + "name": "VDB-257469 | Campcodes Complete Online DJ Booking System contactus.php cross site scripting", + "tags": [ + "vdb-entry", + "technical-description", + "x_snapshot" + ] + }, + { + "url": "https://vuldb.com/?ctiid.257469/adp-test-6-28", + "name": "VDB-257469 | CTI Indicators (IOB, IOC, TTP, IOA)", + "tags": [ + "signature", + "permissions-required", + "x_snapshot" + ] + }, + { + "url": "https://github.com/E1CHO/cve_hub/blob/main/Complete%20Online%20DJ%20Booking%20System/Complete%20Online%20DJ%20Booking%20System%20-%20vuln%205.pdf/adp-test-6-28", + "tags": [ + "exploit", + "x_snapshot" + ] } ] } diff --git a/cves/2024/2xxx/CVE-2024-2717.json b/cves/2024/2xxx/CVE-2024-2717.json index 0621e561796..c5c05d52995 100644 --- a/cves/2024/2xxx/CVE-2024-2717.json +++ b/cves/2024/2xxx/CVE-2024-2717.json @@ -8,7 +8,7 @@ "assignerShortName": "VulDB", "dateReserved": "2024-03-20T10:14:51.532Z", "datePublished": "2024-03-20T20:31:04.276Z", - "dateUpdated": "2024-06-21T15:36:27.666Z" + "dateUpdated": "2024-07-05T14:26:42.340Z" }, "containers": { "cna": { @@ -131,7 +131,7 @@ "providerMetadata": { "orgId": "96f1cf3c-f80a-4e0f-a063-99a91e3f1325", "shortName": "secretariat-reference", - "dateUpdated": "2024-06-21T15:36:27.666Z" + "dateUpdated": "2024-07-05T14:26:42.340Z" }, "references": [ { @@ -158,6 +158,31 @@ "exploit", "x_cve_prog_secretariat_snapshot" ] + }, + { + "url": "https://vuldb.com/?id.257470/adp-test-6-28", + "name": "VDB-257470 | Campcodes Complete Online DJ Booking System booking-search.php cross site scripting", + "tags": [ + "vdb-entry", + "technical-description", + "x_snapshot" + ] + }, + { + "url": "https://vuldb.com/?ctiid.257470/adp-test-6-28", + "name": "VDB-257470 | CTI Indicators (IOB, IOC, TTP, IOA)", + "tags": [ + "signature", + "permissions-required", + "x_snapshot" + ] + }, + { + "url": "https://github.com/E1CHO/cve_hub/blob/main/Complete%20Online%20DJ%20Booking%20System/Complete%20Online%20DJ%20Booking%20System%20-%20vuln%206.pdf/adp-test-6-28", + "tags": [ + "exploit", + "x_snapshot" + ] } ] } diff --git a/cves/2024/2xxx/CVE-2024-2718.json b/cves/2024/2xxx/CVE-2024-2718.json index c8ddcbd3008..f93782a6b91 100644 --- a/cves/2024/2xxx/CVE-2024-2718.json +++ b/cves/2024/2xxx/CVE-2024-2718.json @@ -8,7 +8,7 @@ "assignerShortName": "VulDB", "dateReserved": "2024-03-20T10:14:54.676Z", "datePublished": "2024-03-20T20:31:05.739Z", - "dateUpdated": "2024-06-21T15:36:28.118Z" + "dateUpdated": "2024-07-05T14:26:42.316Z" }, "containers": { "cna": { @@ -131,7 +131,7 @@ "providerMetadata": { "orgId": "96f1cf3c-f80a-4e0f-a063-99a91e3f1325", "shortName": "secretariat-reference", - "dateUpdated": "2024-06-21T15:36:28.118Z" + "dateUpdated": "2024-07-05T14:26:42.316Z" }, "references": [ { @@ -158,6 +158,31 @@ "exploit", "x_cve_prog_secretariat_snapshot" ] + }, + { + "url": "https://vuldb.com/?id.257471/adp-test-6-28", + "name": "VDB-257471 | Campcodes Complete Online DJ Booking System booking-bwdates-reports-details.php cross site scripting", + "tags": [ + "vdb-entry", + "technical-description", + "x_snapshot" + ] + }, + { + "url": "https://vuldb.com/?ctiid.257471/adp-test-6-28", + "name": "VDB-257471 | CTI Indicators (IOB, IOC, TTP, IOA)", + "tags": [ + "signature", + "permissions-required", + "x_snapshot" + ] + }, + { + "url": "https://github.com/E1CHO/cve_hub/blob/main/Complete%20Online%20DJ%20Booking%20System/Complete%20Online%20DJ%20Booking%20System%20-%20vuln%207.pdf/adp-test-6-28", + "tags": [ + "exploit", + "x_snapshot" + ] } ] } diff --git a/cves/2024/2xxx/CVE-2024-2719.json b/cves/2024/2xxx/CVE-2024-2719.json index 944daba80ce..e058a791306 100644 --- a/cves/2024/2xxx/CVE-2024-2719.json +++ b/cves/2024/2xxx/CVE-2024-2719.json @@ -8,7 +8,7 @@ "assignerShortName": "VulDB", "dateReserved": "2024-03-20T10:14:57.838Z", "datePublished": "2024-03-20T21:00:06.758Z", - "dateUpdated": "2024-06-21T15:36:28.536Z" + "dateUpdated": "2024-07-05T14:26:42.307Z" }, "containers": { "cna": { @@ -131,7 +131,7 @@ "providerMetadata": { "orgId": "96f1cf3c-f80a-4e0f-a063-99a91e3f1325", "shortName": "secretariat-reference", - "dateUpdated": "2024-06-21T15:36:28.536Z" + "dateUpdated": "2024-07-05T14:26:42.307Z" }, "references": [ { @@ -158,6 +158,31 @@ "exploit", "x_cve_prog_secretariat_snapshot" ] + }, + { + "url": "https://vuldb.com/?id.257472/adp-test-6-28", + "name": "VDB-257472 | Campcodes Complete Online DJ Booking System admin-profile.php cross site scripting", + "tags": [ + "vdb-entry", + "technical-description", + "x_snapshot" + ] + }, + { + "url": "https://vuldb.com/?ctiid.257472/adp-test-6-28", + "name": "VDB-257472 | CTI Indicators (IOB, IOC, TTP, IOA)", + "tags": [ + "signature", + "permissions-required", + "x_snapshot" + ] + }, + { + "url": "https://github.com/E1CHO/cve_hub/blob/main/Complete%20Online%20DJ%20Booking%20System/Complete%20Online%20DJ%20Booking%20System%20-%20vuln%208.pdf/adp-test-6-28", + "tags": [ + "exploit", + "x_snapshot" + ] } ] } diff --git a/cves/2024/2xxx/CVE-2024-2720.json b/cves/2024/2xxx/CVE-2024-2720.json index a045ea31b57..1bac4932479 100644 --- a/cves/2024/2xxx/CVE-2024-2720.json +++ b/cves/2024/2xxx/CVE-2024-2720.json @@ -8,7 +8,7 @@ "assignerShortName": "VulDB", "dateReserved": "2024-03-20T10:15:01.040Z", "datePublished": "2024-03-20T21:31:04.477Z", - "dateUpdated": "2024-06-21T15:36:28.928Z" + "dateUpdated": "2024-07-05T14:26:42.318Z" }, "containers": { "cna": { @@ -131,7 +131,7 @@ "providerMetadata": { "orgId": "96f1cf3c-f80a-4e0f-a063-99a91e3f1325", "shortName": "secretariat-reference", - "dateUpdated": "2024-06-21T15:36:28.928Z" + "dateUpdated": "2024-07-05T14:26:42.318Z" }, "references": [ { @@ -158,6 +158,31 @@ "exploit", "x_cve_prog_secretariat_snapshot" ] + }, + { + "url": "https://vuldb.com/?id.257473/adp-test-6-28", + "name": "VDB-257473 | Campcodes Complete Online DJ Booking System aboutus.php cross site scripting", + "tags": [ + "vdb-entry", + "technical-description", + "x_snapshot" + ] + }, + { + "url": "https://vuldb.com/?ctiid.257473/adp-test-6-28", + "name": "VDB-257473 | CTI Indicators (IOB, IOC, TTP, IOA)", + "tags": [ + "signature", + "permissions-required", + "x_snapshot" + ] + }, + { + "url": "https://github.com/E1CHO/cve_hub/blob/main/Complete%20Online%20DJ%20Booking%20System/Complete%20Online%20DJ%20Booking%20System%20-%20vuln%209.pdf/adp-test-6-28", + "tags": [ + "exploit", + "x_snapshot" + ] } ] } diff --git a/cves/2024/2xxx/CVE-2024-2721.json b/cves/2024/2xxx/CVE-2024-2721.json index cc85ec5f28e..ee908a7d747 100644 --- a/cves/2024/2xxx/CVE-2024-2721.json +++ b/cves/2024/2xxx/CVE-2024-2721.json @@ -8,7 +8,7 @@ "assignerShortName": "Patchstack", "dateReserved": "2024-03-20T11:28:13.386Z", "datePublished": "2024-03-20T11:40:38.721Z", - "dateUpdated": "2024-06-21T15:36:29.315Z" + "dateUpdated": "2024-07-05T14:26:42.257Z" }, "containers": { "cna": { @@ -113,7 +113,7 @@ "providerMetadata": { "orgId": "96f1cf3c-f80a-4e0f-a063-99a91e3f1325", "shortName": "secretariat-reference", - "dateUpdated": "2024-06-21T15:36:29.315Z" + "dateUpdated": "2024-07-05T14:26:42.257Z" }, "references": [ { @@ -122,6 +122,13 @@ "x_cve_prog_secretariat_snapshot" ], "url": "https://patchstack.com/database/vulnerability/social-media-builder/wordpress-social-media-share-buttons-plugin-2-1-0-php-object-injection-vulnerability?_s_id=cve/DEMO_2024_06_19" + }, + { + "tags": [ + "vdb-entry", + "x_snapshot" + ], + "url": "https://patchstack.com/database/vulnerability/social-media-builder/wordpress-social-media-share-buttons-plugin-2-1-0-php-object-injection-vulnerability?_s_id=cve/adp-test-6-28" } ] } diff --git a/cves/2024/2xxx/CVE-2024-2722.json b/cves/2024/2xxx/CVE-2024-2722.json index 5419548843c..e01bb7a5d0f 100644 --- a/cves/2024/2xxx/CVE-2024-2722.json +++ b/cves/2024/2xxx/CVE-2024-2722.json @@ -8,7 +8,7 @@ "assignerShortName": "INCIBE", "dateReserved": "2024-03-20T11:33:47.311Z", "datePublished": "2024-03-22T13:33:55.385Z", - "dateUpdated": "2024-06-21T15:36:29.723Z" + "dateUpdated": "2024-07-05T14:26:42.300Z" }, "containers": { "cna": { @@ -119,7 +119,7 @@ "providerMetadata": { "orgId": "96f1cf3c-f80a-4e0f-a063-99a91e3f1325", "shortName": "secretariat-reference", - "dateUpdated": "2024-06-21T15:36:29.723Z" + "dateUpdated": "2024-07-05T14:26:42.300Z" }, "references": [ { @@ -127,6 +127,12 @@ "tags": [ "x_cve_prog_secretariat_snapshot" ] + }, + { + "url": "https://www.incibe.es/en/incibe-cert/notices/aviso/multiple-vulnerabilities-cigesv2-system/adp-test-6-28", + "tags": [ + "x_snapshot" + ] } ] } diff --git a/cves/2024/2xxx/CVE-2024-2723.json b/cves/2024/2xxx/CVE-2024-2723.json index 80509e33cb4..67beacd75c3 100644 --- a/cves/2024/2xxx/CVE-2024-2723.json +++ b/cves/2024/2xxx/CVE-2024-2723.json @@ -8,7 +8,7 @@ "assignerShortName": "INCIBE", "dateReserved": "2024-03-20T11:33:48.339Z", "datePublished": "2024-03-22T13:34:14.540Z", - "dateUpdated": "2024-06-21T15:36:30.175Z" + "dateUpdated": "2024-07-05T14:26:42.222Z" }, "containers": { "cna": { @@ -119,7 +119,7 @@ "providerMetadata": { "orgId": "96f1cf3c-f80a-4e0f-a063-99a91e3f1325", "shortName": "secretariat-reference", - "dateUpdated": "2024-06-21T15:36:30.175Z" + "dateUpdated": "2024-07-05T14:26:42.222Z" }, "references": [ { @@ -127,6 +127,12 @@ "tags": [ "x_cve_prog_secretariat_snapshot" ] + }, + { + "url": "https://www.incibe.es/en/incibe-cert/notices/aviso/multiple-vulnerabilities-cigesv2-system/adp-test-6-28", + "tags": [ + "x_snapshot" + ] } ] } diff --git a/cves/2024/2xxx/CVE-2024-2724.json b/cves/2024/2xxx/CVE-2024-2724.json index 96f59378e99..660f8a32d73 100644 --- a/cves/2024/2xxx/CVE-2024-2724.json +++ b/cves/2024/2xxx/CVE-2024-2724.json @@ -8,7 +8,7 @@ "assignerShortName": "INCIBE", "dateReserved": "2024-03-20T11:33:49.191Z", "datePublished": "2024-03-22T13:34:31.406Z", - "dateUpdated": "2024-06-21T15:36:30.590Z" + "dateUpdated": "2024-07-05T14:26:42.468Z" }, "containers": { "cna": { @@ -119,7 +119,7 @@ "providerMetadata": { "orgId": "96f1cf3c-f80a-4e0f-a063-99a91e3f1325", "shortName": "secretariat-reference", - "dateUpdated": "2024-06-21T15:36:30.590Z" + "dateUpdated": "2024-07-05T14:26:42.468Z" }, "references": [ { @@ -127,6 +127,12 @@ "tags": [ "x_cve_prog_secretariat_snapshot" ] + }, + { + "url": "https://www.incibe.es/en/incibe-cert/notices/aviso/multiple-vulnerabilities-cigesv2-system/adp-test-6-28", + "tags": [ + "x_snapshot" + ] } ] } diff --git a/cves/2024/2xxx/CVE-2024-2725.json b/cves/2024/2xxx/CVE-2024-2725.json index 33e9a38c389..4820a846fd7 100644 --- a/cves/2024/2xxx/CVE-2024-2725.json +++ b/cves/2024/2xxx/CVE-2024-2725.json @@ -8,7 +8,7 @@ "assignerShortName": "INCIBE", "dateReserved": "2024-03-20T11:33:49.912Z", "datePublished": "2024-03-22T13:35:12.508Z", - "dateUpdated": "2024-06-21T15:36:30.995Z" + "dateUpdated": "2024-07-05T14:26:42.317Z" }, "containers": { "cna": { @@ -150,7 +150,7 @@ "providerMetadata": { "orgId": "96f1cf3c-f80a-4e0f-a063-99a91e3f1325", "shortName": "secretariat-reference", - "dateUpdated": "2024-06-21T15:36:30.995Z" + "dateUpdated": "2024-07-05T14:26:42.317Z" }, "references": [ { @@ -158,6 +158,12 @@ "tags": [ "x_cve_prog_secretariat_snapshot" ] + }, + { + "url": "https://www.incibe.es/en/incibe-cert/notices/aviso/multiple-vulnerabilities-cigesv2-system/adp-test-6-28", + "tags": [ + "x_snapshot" + ] } ] } diff --git a/cves/2024/2xxx/CVE-2024-2726.json b/cves/2024/2xxx/CVE-2024-2726.json index 56635d49c90..20386e307cd 100644 --- a/cves/2024/2xxx/CVE-2024-2726.json +++ b/cves/2024/2xxx/CVE-2024-2726.json @@ -8,7 +8,7 @@ "assignerShortName": "INCIBE", "dateReserved": "2024-03-20T11:33:50.640Z", "datePublished": "2024-03-22T13:36:18.836Z", - "dateUpdated": "2024-06-21T15:36:31.459Z" + "dateUpdated": "2024-07-05T14:26:42.072Z" }, "containers": { "cna": { @@ -150,7 +150,7 @@ "providerMetadata": { "orgId": "96f1cf3c-f80a-4e0f-a063-99a91e3f1325", "shortName": "secretariat-reference", - "dateUpdated": "2024-06-21T15:36:31.459Z" + "dateUpdated": "2024-07-05T14:26:42.072Z" }, "references": [ { @@ -158,6 +158,12 @@ "tags": [ "x_cve_prog_secretariat_snapshot" ] + }, + { + "url": "https://www.incibe.es/en/incibe-cert/notices/aviso/multiple-vulnerabilities-cigesv2-system/adp-test-6-28", + "tags": [ + "x_snapshot" + ] } ] } diff --git a/cves/2024/2xxx/CVE-2024-2727.json b/cves/2024/2xxx/CVE-2024-2727.json index 286c3421569..219675548cf 100644 --- a/cves/2024/2xxx/CVE-2024-2727.json +++ b/cves/2024/2xxx/CVE-2024-2727.json @@ -8,7 +8,7 @@ "assignerShortName": "INCIBE", "dateReserved": "2024-03-20T11:33:51.453Z", "datePublished": "2024-03-22T13:36:35.270Z", - "dateUpdated": "2024-06-21T15:36:31.889Z" + "dateUpdated": "2024-07-05T14:26:39.898Z" }, "containers": { "cna": { @@ -119,7 +119,7 @@ "providerMetadata": { "orgId": "96f1cf3c-f80a-4e0f-a063-99a91e3f1325", "shortName": "secretariat-reference", - "dateUpdated": "2024-06-21T15:36:31.889Z" + "dateUpdated": "2024-07-05T14:26:39.898Z" }, "references": [ { @@ -127,6 +127,12 @@ "tags": [ "x_cve_prog_secretariat_snapshot" ] + }, + { + "url": "https://www.incibe.es/en/incibe-cert/notices/aviso/multiple-vulnerabilities-cigesv2-system/adp-test-6-28", + "tags": [ + "x_snapshot" + ] } ] } diff --git a/cves/2024/2xxx/CVE-2024-2728.json b/cves/2024/2xxx/CVE-2024-2728.json index 174d178b125..2a3d1f5563b 100644 --- a/cves/2024/2xxx/CVE-2024-2728.json +++ b/cves/2024/2xxx/CVE-2024-2728.json @@ -8,7 +8,7 @@ "assignerShortName": "INCIBE", "dateReserved": "2024-03-20T11:33:52.434Z", "datePublished": "2024-03-22T13:37:23.204Z", - "dateUpdated": "2024-06-21T15:36:32.283Z" + "dateUpdated": "2024-07-05T14:26:42.338Z" }, "containers": { "cna": { @@ -119,7 +119,7 @@ "providerMetadata": { "orgId": "96f1cf3c-f80a-4e0f-a063-99a91e3f1325", "shortName": "secretariat-reference", - "dateUpdated": "2024-06-21T15:36:32.283Z" + "dateUpdated": "2024-07-05T14:26:42.338Z" }, "references": [ { @@ -127,6 +127,12 @@ "tags": [ "x_cve_prog_secretariat_snapshot" ] + }, + { + "url": "https://www.incibe.es/en/incibe-cert/notices/aviso/multiple-vulnerabilities-cigesv2-system/adp-test-6-28", + "tags": [ + "x_snapshot" + ] } ] } diff --git a/cves/2024/2xxx/CVE-2024-2729.json b/cves/2024/2xxx/CVE-2024-2729.json index 02bfa8b1d05..c345fbbf773 100644 --- a/cves/2024/2xxx/CVE-2024-2729.json +++ b/cves/2024/2xxx/CVE-2024-2729.json @@ -8,7 +8,7 @@ "assignerShortName": "WPScan", "dateReserved": "2024-03-20T12:41:52.548Z", "datePublished": "2024-04-18T05:00:02.373Z", - "dateUpdated": "2024-06-21T15:36:32.666Z" + "dateUpdated": "2024-07-05T14:26:42.349Z" }, "containers": { "cna": { @@ -148,7 +148,7 @@ "providerMetadata": { "orgId": "96f1cf3c-f80a-4e0f-a063-99a91e3f1325", "shortName": "secretariat-reference", - "dateUpdated": "2024-06-21T15:36:32.666Z" + "dateUpdated": "2024-07-05T14:26:42.349Z" }, "references": [ { @@ -159,6 +159,15 @@ "technical-description", "x_cve_prog_secretariat_snapshot" ] + }, + { + "url": "https://wpscan.com/vulnerability/5014f886-020e-49d1-96a5-2159eed8ba14//adp-test-6-28", + "tags": [ + "exploit", + "vdb-entry", + "technical-description", + "x_snapshot" + ] } ] } diff --git a/cves/2024/2xxx/CVE-2024-2730.json b/cves/2024/2xxx/CVE-2024-2730.json index 29f42c7961f..10ea350a3d8 100644 --- a/cves/2024/2xxx/CVE-2024-2730.json +++ b/cves/2024/2xxx/CVE-2024-2730.json @@ -8,7 +8,7 @@ "assignerShortName": "NCSC.ch", "dateReserved": "2024-03-20T13:04:41.496Z", "datePublished": "2024-04-10T13:59:36.195Z", - "dateUpdated": "2024-06-21T15:36:33.235Z" + "dateUpdated": "2024-07-05T14:26:42.464Z" }, "containers": { "cna": { @@ -125,7 +125,7 @@ "providerMetadata": { "orgId": "96f1cf3c-f80a-4e0f-a063-99a91e3f1325", "shortName": "secretariat-reference", - "dateUpdated": "2024-06-21T15:36:33.235Z" + "dateUpdated": "2024-07-05T14:26:42.464Z" }, "references": [ { @@ -134,6 +134,13 @@ "x_cve_prog_secretariat_snapshot" ], "url": "https://huntr.com/bounties/cd3321a4-9ebc-48fa-8d4c-b5720089c2d9/DEMO_2024_06_19" + }, + { + "tags": [ + "exploit", + "x_snapshot" + ], + "url": "https://huntr.com/bounties/cd3321a4-9ebc-48fa-8d4c-b5720089c2d9/adp-test-6-28" } ] } diff --git a/cves/2024/2xxx/CVE-2024-2731.json b/cves/2024/2xxx/CVE-2024-2731.json index 9c3ea20d8fa..20551295b46 100644 --- a/cves/2024/2xxx/CVE-2024-2731.json +++ b/cves/2024/2xxx/CVE-2024-2731.json @@ -8,7 +8,7 @@ "assignerShortName": "NCSC.ch", "dateReserved": "2024-03-20T13:04:47.309Z", "datePublished": "2024-04-10T13:59:41.407Z", - "dateUpdated": "2024-06-21T15:36:33.727Z" + "dateUpdated": "2024-07-05T14:26:42.382Z" }, "containers": { "cna": { @@ -116,7 +116,7 @@ "providerMetadata": { "orgId": "96f1cf3c-f80a-4e0f-a063-99a91e3f1325", "shortName": "secretariat-reference", - "dateUpdated": "2024-06-21T15:36:33.727Z" + "dateUpdated": "2024-07-05T14:26:42.382Z" }, "references": [ { @@ -125,6 +125,13 @@ "x_cve_prog_secretariat_snapshot" ], "url": "https://huntr.com/bounties/4d72d300-92d6-4e3c-93d8-52fe47396ae0/DEMO_2024_06_19" + }, + { + "tags": [ + "exploit", + "x_snapshot" + ], + "url": "https://huntr.com/bounties/4d72d300-92d6-4e3c-93d8-52fe47396ae0/adp-test-6-28" } ] } diff --git a/cves/2024/2xxx/CVE-2024-2732.json b/cves/2024/2xxx/CVE-2024-2732.json index f72d96650ab..c4266ecc64f 100644 --- a/cves/2024/2xxx/CVE-2024-2732.json +++ b/cves/2024/2xxx/CVE-2024-2732.json @@ -8,7 +8,7 @@ "assignerShortName": "Wordfence", "dateReserved": "2024-03-20T13:08:40.173Z", "datePublished": "2024-03-26T01:58:54.931Z", - "dateUpdated": "2024-06-21T15:36:34.116Z" + "dateUpdated": "2024-07-05T14:26:42.242Z" }, "containers": { "cna": { @@ -86,7 +86,7 @@ "providerMetadata": { "orgId": "96f1cf3c-f80a-4e0f-a063-99a91e3f1325", "shortName": "secretariat-reference", - "dateUpdated": "2024-06-21T15:36:34.116Z" + "dateUpdated": "2024-07-05T14:26:42.242Z" }, "references": [ { @@ -100,6 +100,18 @@ "tags": [ "x_cve_prog_secretariat_snapshot" ] + }, + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/0aeb63e7-a24d-4d76-a8c7-f082dad87a55?source=cve/adp-test-6-28", + "tags": [ + "x_snapshot" + ] + }, + { + "url": "https://plugins.trac.wordpress.org/changeset/3056453/themify-shortcodes/trunk/includes/themify-shortcodes.php/adp-test-6-28", + "tags": [ + "x_snapshot" + ] } ] } diff --git a/cves/2024/2xxx/CVE-2024-2733.json b/cves/2024/2xxx/CVE-2024-2733.json index f8e470f6792..ab68f8fe202 100644 --- a/cves/2024/2xxx/CVE-2024-2733.json +++ b/cves/2024/2xxx/CVE-2024-2733.json @@ -8,7 +8,7 @@ "assignerShortName": "Wordfence", "dateReserved": "2024-03-20T13:22:39.858Z", "datePublished": "2024-04-10T03:31:20.853Z", - "dateUpdated": "2024-06-21T15:36:34.493Z" + "dateUpdated": "2024-07-05T14:26:42.350Z" }, "containers": { "cna": { @@ -117,7 +117,7 @@ "providerMetadata": { "orgId": "96f1cf3c-f80a-4e0f-a063-99a91e3f1325", "shortName": "secretariat-reference", - "dateUpdated": "2024-06-21T15:36:34.493Z" + "dateUpdated": "2024-07-05T14:26:42.350Z" }, "references": [ { @@ -131,6 +131,18 @@ "tags": [ "x_cve_prog_secretariat_snapshot" ] + }, + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/2db39ae2-6c44-4a4c-84de-9b7041bece37?source=cve/adp-test-6-28", + "tags": [ + "x_snapshot" + ] + }, + { + "url": "https://plugins.trac.wordpress.org/changeset/3064413/bold-page-builder/trunk/content_elements/bt_bb_separator/bt_bb_separator.php/adp-test-6-28", + "tags": [ + "x_snapshot" + ] } ] } diff --git a/cves/2024/2xxx/CVE-2024-2734.json b/cves/2024/2xxx/CVE-2024-2734.json index b59659f7b21..3c87d39e6ea 100644 --- a/cves/2024/2xxx/CVE-2024-2734.json +++ b/cves/2024/2xxx/CVE-2024-2734.json @@ -8,7 +8,7 @@ "assignerShortName": "Wordfence", "dateReserved": "2024-03-20T13:25:01.091Z", "datePublished": "2024-04-10T04:30:19.296Z", - "dateUpdated": "2024-06-21T15:36:34.880Z" + "dateUpdated": "2024-07-05T14:26:42.421Z" }, "containers": { "cna": { @@ -86,7 +86,7 @@ "providerMetadata": { "orgId": "96f1cf3c-f80a-4e0f-a063-99a91e3f1325", "shortName": "secretariat-reference", - "dateUpdated": "2024-06-21T15:36:34.880Z" + "dateUpdated": "2024-07-05T14:26:42.421Z" }, "references": [ { @@ -100,6 +100,18 @@ "tags": [ "x_cve_prog_secretariat_snapshot" ] + }, + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/650b5677-7c70-415f-81bf-12514393e4c9?source=cve/adp-test-6-28", + "tags": [ + "x_snapshot" + ] + }, + { + "url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3064413%40bold-page-builder&new=3064413%40bold-page-builder&sfp_email=&sfph_mail=/adp-test-6-28", + "tags": [ + "x_snapshot" + ] } ] } diff --git a/cves/2024/2xxx/CVE-2024-2735.json b/cves/2024/2xxx/CVE-2024-2735.json index 77448fafaa0..d46c988b4c0 100644 --- a/cves/2024/2xxx/CVE-2024-2735.json +++ b/cves/2024/2xxx/CVE-2024-2735.json @@ -8,7 +8,7 @@ "assignerShortName": "Wordfence", "dateReserved": "2024-03-20T13:27:23.980Z", "datePublished": "2024-04-10T04:30:19.748Z", - "dateUpdated": "2024-06-21T15:36:35.271Z" + "dateUpdated": "2024-07-05T14:26:42.444Z" }, "containers": { "cna": { @@ -117,7 +117,7 @@ "providerMetadata": { "orgId": "96f1cf3c-f80a-4e0f-a063-99a91e3f1325", "shortName": "secretariat-reference", - "dateUpdated": "2024-06-21T15:36:35.271Z" + "dateUpdated": "2024-07-05T14:26:42.444Z" }, "references": [ { @@ -131,6 +131,18 @@ "tags": [ "x_cve_prog_secretariat_snapshot" ] + }, + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/6cc4a67b-81fa-4ef6-9167-eab5cb9002ec?source=cve/adp-test-6-28", + "tags": [ + "x_snapshot" + ] + }, + { + "url": "https://plugins.trac.wordpress.org/changeset/3064413/bold-page-builder/trunk/bold-builder.php/adp-test-6-28", + "tags": [ + "x_snapshot" + ] } ] } diff --git a/cves/2024/2xxx/CVE-2024-2736.json b/cves/2024/2xxx/CVE-2024-2736.json index afce804fb26..f00fc6f940f 100644 --- a/cves/2024/2xxx/CVE-2024-2736.json +++ b/cves/2024/2xxx/CVE-2024-2736.json @@ -8,7 +8,7 @@ "assignerShortName": "Wordfence", "dateReserved": "2024-03-20T13:28:55.628Z", "datePublished": "2024-04-10T04:30:20.195Z", - "dateUpdated": "2024-06-21T15:36:35.655Z" + "dateUpdated": "2024-07-05T14:26:42.357Z" }, "containers": { "cna": { @@ -117,7 +117,7 @@ "providerMetadata": { "orgId": "96f1cf3c-f80a-4e0f-a063-99a91e3f1325", "shortName": "secretariat-reference", - "dateUpdated": "2024-06-21T15:36:35.655Z" + "dateUpdated": "2024-07-05T14:26:42.357Z" }, "references": [ { @@ -131,6 +131,18 @@ "tags": [ "x_cve_prog_secretariat_snapshot" ] + }, + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/86cf664f-5de1-4692-96b3-2fd8ae35110b?source=cve/adp-test-6-28", + "tags": [ + "x_snapshot" + ] + }, + { + "url": "https://plugins.trac.wordpress.org/changeset/3064413/bold-page-builder/trunk/content_elements/bt_bb_headline/bt_bb_headline.php/adp-test-6-28", + "tags": [ + "x_snapshot" + ] } ] } diff --git a/cves/2024/2xxx/CVE-2024-2738.json b/cves/2024/2xxx/CVE-2024-2738.json index 27d634758fd..b67d9993deb 100644 --- a/cves/2024/2xxx/CVE-2024-2738.json +++ b/cves/2024/2xxx/CVE-2024-2738.json @@ -8,7 +8,7 @@ "assignerShortName": "Wordfence", "dateReserved": "2024-03-20T13:47:46.582Z", "datePublished": "2024-04-09T18:58:55.481Z", - "dateUpdated": "2024-06-21T15:36:36.064Z" + "dateUpdated": "2024-07-05T14:26:42.214Z" }, "containers": { "cna": { @@ -105,7 +105,7 @@ "providerMetadata": { "orgId": "96f1cf3c-f80a-4e0f-a063-99a91e3f1325", "shortName": "secretariat-reference", - "dateUpdated": "2024-06-21T15:36:36.064Z" + "dateUpdated": "2024-07-05T14:26:42.214Z" }, "references": [ { @@ -131,6 +131,30 @@ "tags": [ "x_cve_prog_secretariat_snapshot" ] + }, + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/7020d5a1-a4a6-489c-8615-bc7898553bcf?source=cve/adp-test-6-28", + "tags": [ + "x_snapshot" + ] + }, + { + "url": "https://gist.github.com/Xib3rR4dAr/561ac3c17b92cb55d3032504a076fa4b/adp-test-6-28", + "tags": [ + "x_snapshot" + ] + }, + { + "url": "https://gist.github.com/Xib3rR4dAr/b1eec00e844932c6f2f30a63024b404e/adp-test-6-28", + "tags": [ + "x_snapshot" + ] + }, + { + "url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&new=3052848%40permalink-manager%2Ftrunk&old=3034660%40permalink-manager%2Ftrunk&sfp_email=&sfph_mail=/adp-test-6-28", + "tags": [ + "x_snapshot" + ] } ] } diff --git a/cves/2024/2xxx/CVE-2024-2739.json b/cves/2024/2xxx/CVE-2024-2739.json index 9c68c991b23..bd5c36bbd19 100644 --- a/cves/2024/2xxx/CVE-2024-2739.json +++ b/cves/2024/2xxx/CVE-2024-2739.json @@ -8,7 +8,7 @@ "assignerShortName": "WPScan", "dateReserved": "2024-03-20T13:57:15.690Z", "datePublished": "2024-04-15T05:00:05.507Z", - "dateUpdated": "2024-06-21T15:36:36.472Z" + "dateUpdated": "2024-07-05T14:26:39.870Z" }, "containers": { "cna": { @@ -116,7 +116,7 @@ "providerMetadata": { "orgId": "96f1cf3c-f80a-4e0f-a063-99a91e3f1325", "shortName": "secretariat-reference", - "dateUpdated": "2024-06-21T15:36:36.472Z" + "dateUpdated": "2024-07-05T14:26:39.870Z" }, "references": [ { @@ -127,6 +127,15 @@ "technical-description", "x_cve_prog_secretariat_snapshot" ] + }, + { + "url": "https://wpscan.com/vulnerability/5b84145b-f94e-4ea7-84d5-56cf776817a2//adp-test-6-28", + "tags": [ + "exploit", + "vdb-entry", + "technical-description", + "x_snapshot" + ] } ] } diff --git a/cves/2024/2xxx/CVE-2024-2740.json b/cves/2024/2xxx/CVE-2024-2740.json index d38a5db4031..3cc1457ca5a 100644 --- a/cves/2024/2xxx/CVE-2024-2740.json +++ b/cves/2024/2xxx/CVE-2024-2740.json @@ -8,7 +8,7 @@ "assignerShortName": "INCIBE", "dateReserved": "2024-03-20T14:16:52.577Z", "datePublished": "2024-03-21T11:40:25.565Z", - "dateUpdated": "2024-06-21T15:36:36.879Z" + "dateUpdated": "2024-07-05T14:26:42.261Z" }, "containers": { "cna": { @@ -130,7 +130,7 @@ "providerMetadata": { "orgId": "96f1cf3c-f80a-4e0f-a063-99a91e3f1325", "shortName": "secretariat-reference", - "dateUpdated": "2024-06-21T15:36:36.879Z" + "dateUpdated": "2024-07-05T14:26:42.261Z" }, "references": [ { @@ -138,6 +138,12 @@ "tags": [ "x_cve_prog_secretariat_snapshot" ] + }, + { + "url": "https://www.incibe.es/en/incibe-cert/notices/aviso-sci/multiple-vulnerabilities-planet-igs-4215-16t2s/adp-test-6-28", + "tags": [ + "x_snapshot" + ] } ] } diff --git a/cves/2024/2xxx/CVE-2024-2741.json b/cves/2024/2xxx/CVE-2024-2741.json index ea76d2de441..eed1f7455ba 100644 --- a/cves/2024/2xxx/CVE-2024-2741.json +++ b/cves/2024/2xxx/CVE-2024-2741.json @@ -8,7 +8,7 @@ "assignerShortName": "INCIBE", "dateReserved": "2024-03-20T14:16:53.726Z", "datePublished": "2024-03-21T11:43:05.320Z", - "dateUpdated": "2024-06-21T15:36:37.282Z" + "dateUpdated": "2024-07-05T14:26:42.261Z" }, "containers": { "cna": { @@ -130,7 +130,7 @@ "providerMetadata": { "orgId": "96f1cf3c-f80a-4e0f-a063-99a91e3f1325", "shortName": "secretariat-reference", - "dateUpdated": "2024-06-21T15:36:37.282Z" + "dateUpdated": "2024-07-05T14:26:42.261Z" }, "references": [ { @@ -138,6 +138,12 @@ "tags": [ "x_cve_prog_secretariat_snapshot" ] + }, + { + "url": "https://www.incibe.es/en/incibe-cert/notices/aviso-sci/multiple-vulnerabilities-planet-igs-4215-16t2s/adp-test-6-28", + "tags": [ + "x_snapshot" + ] } ] } diff --git a/cves/2024/2xxx/CVE-2024-2742.json b/cves/2024/2xxx/CVE-2024-2742.json index 87eb5b55193..a8641e215f2 100644 --- a/cves/2024/2xxx/CVE-2024-2742.json +++ b/cves/2024/2xxx/CVE-2024-2742.json @@ -8,7 +8,7 @@ "assignerShortName": "INCIBE", "dateReserved": "2024-03-20T14:16:54.664Z", "datePublished": "2024-03-21T11:45:41.162Z", - "dateUpdated": "2024-06-21T15:36:37.667Z" + "dateUpdated": "2024-07-05T14:26:42.377Z" }, "containers": { "cna": { @@ -130,7 +130,7 @@ "providerMetadata": { "orgId": "96f1cf3c-f80a-4e0f-a063-99a91e3f1325", "shortName": "secretariat-reference", - "dateUpdated": "2024-06-21T15:36:37.667Z" + "dateUpdated": "2024-07-05T14:26:42.377Z" }, "references": [ { @@ -138,6 +138,12 @@ "tags": [ "x_cve_prog_secretariat_snapshot" ] + }, + { + "url": "https://www.incibe.es/en/incibe-cert/notices/aviso-sci/multiple-vulnerabilities-planet-igs-4215-16t2s/adp-test-6-28", + "tags": [ + "x_snapshot" + ] } ] } diff --git a/cves/2024/2xxx/CVE-2024-2744.json b/cves/2024/2xxx/CVE-2024-2744.json index aaab3390fca..ff4b522833c 100644 --- a/cves/2024/2xxx/CVE-2024-2744.json +++ b/cves/2024/2xxx/CVE-2024-2744.json @@ -8,7 +8,7 @@ "assignerShortName": "WPScan", "dateReserved": "2024-03-20T14:34:06.589Z", "datePublished": "2024-05-17T06:00:02.141Z", - "dateUpdated": "2024-06-21T15:36:38.238Z" + "dateUpdated": "2024-07-05T14:26:42.351Z" }, "containers": { "cna": { @@ -116,7 +116,7 @@ "providerMetadata": { "orgId": "96f1cf3c-f80a-4e0f-a063-99a91e3f1325", "shortName": "secretariat-reference", - "dateUpdated": "2024-06-21T15:36:38.238Z" + "dateUpdated": "2024-07-05T14:26:42.351Z" }, "references": [ { @@ -127,6 +127,15 @@ "technical-description", "x_cve_prog_secretariat_snapshot" ] + }, + { + "url": "https://wpscan.com/vulnerability/a5579c15-50ba-4618-95e4-04b2033d721f//adp-test-6-28", + "tags": [ + "exploit", + "vdb-entry", + "technical-description", + "x_snapshot" + ] } ] } diff --git a/cves/2024/2xxx/CVE-2024-2745.json b/cves/2024/2xxx/CVE-2024-2745.json index 7d07fa9bb93..15f3b9c3de8 100644 --- a/cves/2024/2xxx/CVE-2024-2745.json +++ b/cves/2024/2xxx/CVE-2024-2745.json @@ -8,7 +8,7 @@ "assignerShortName": "rapid7", "dateReserved": "2024-03-20T14:46:17.613Z", "datePublished": "2024-04-02T09:51:52.370Z", - "dateUpdated": "2024-06-21T15:36:38.707Z" + "dateUpdated": "2024-07-05T14:26:42.400Z" }, "containers": { "cna": { @@ -108,7 +108,7 @@ "providerMetadata": { "orgId": "96f1cf3c-f80a-4e0f-a063-99a91e3f1325", "shortName": "secretariat-reference", - "dateUpdated": "2024-06-21T15:36:38.707Z" + "dateUpdated": "2024-07-05T14:26:42.400Z" }, "references": [ { @@ -116,6 +116,12 @@ "tags": [ "x_cve_prog_secretariat_snapshot" ] + }, + { + "url": "https://docs.rapid7.com/release-notes/insightvm/20240327//adp-test-6-28", + "tags": [ + "x_snapshot" + ] } ] } diff --git a/cves/2024/2xxx/CVE-2024-2746.json b/cves/2024/2xxx/CVE-2024-2746.json index 890b3fd1508..6ce6689a9d0 100644 --- a/cves/2024/2xxx/CVE-2024-2746.json +++ b/cves/2024/2xxx/CVE-2024-2746.json @@ -8,7 +8,7 @@ "assignerShortName": "redhat", "dateReserved": "2024-03-20T16:02:36.835Z", "datePublished": "2024-05-08T01:55:10.092Z", - "dateUpdated": "2024-06-21T15:36:39.165Z" + "dateUpdated": "2024-07-05T14:26:42.243Z" }, "containers": { "cna": { @@ -101,7 +101,7 @@ "providerMetadata": { "orgId": "96f1cf3c-f80a-4e0f-a063-99a91e3f1325", "shortName": "secretariat-reference", - "dateUpdated": "2024-06-21T15:36:39.165Z" + "dateUpdated": "2024-07-05T14:26:42.243Z" }, "references": [ { @@ -109,6 +109,12 @@ "tags": [ "x_cve_prog_secretariat_snapshot" ] + }, + { + "url": "https://www.openwall.com/lists/oss-security/2024/04/03/5/adp-test-6-28", + "tags": [ + "x_snapshot" + ] } ] } diff --git a/cves/2024/2xxx/CVE-2024-2747.json b/cves/2024/2xxx/CVE-2024-2747.json index deb7e28de98..fafa88a60e0 100644 --- a/cves/2024/2xxx/CVE-2024-2747.json +++ b/cves/2024/2xxx/CVE-2024-2747.json @@ -8,7 +8,7 @@ "assignerShortName": "schneider", "dateReserved": "2024-03-20T16:57:16.005Z", "datePublished": "2024-06-12T17:12:20.482Z", - "dateUpdated": "2024-06-12T17:12:20.482Z" + "dateUpdated": "2024-07-05T14:26:42.207Z" }, "containers": { "cna": { @@ -91,6 +91,23 @@ "x_generator": { "engine": "Vulnogram 0.2.0" } - } + }, + "adp": [ + { + "providerMetadata": { + "orgId": "96f1cf3c-f80a-4e0f-a063-99a91e3f1325", + "shortName": "secretariat-reference", + "dateUpdated": "2024-07-05T14:26:42.207Z" + }, + "references": [ + { + "url": "https://download.schneider-electric.com/files?p_Doc_Ref=SEVD-2024-100-01&p_enDocType=Security+and+Safety+Notice&p_File_Name=SEVD-2024-100-01.pdf/adp-test-6-28", + "tags": [ + "x_snapshot" + ] + } + ] + } + ] } } \ No newline at end of file diff --git a/cves/2024/2xxx/CVE-2024-2748.json b/cves/2024/2xxx/CVE-2024-2748.json index 714e7421d7f..b628d09218d 100644 --- a/cves/2024/2xxx/CVE-2024-2748.json +++ b/cves/2024/2xxx/CVE-2024-2748.json @@ -8,7 +8,7 @@ "assignerShortName": "GitHub_P", "dateReserved": "2024-03-20T17:04:53.810Z", "datePublished": "2024-03-20T23:09:40.032Z", - "dateUpdated": "2024-06-21T15:36:39.615Z" + "dateUpdated": "2024-07-05T14:26:39.869Z" }, "containers": { "cna": { @@ -124,7 +124,7 @@ "providerMetadata": { "orgId": "96f1cf3c-f80a-4e0f-a063-99a91e3f1325", "shortName": "secretariat-reference", - "dateUpdated": "2024-06-21T15:36:39.615Z" + "dateUpdated": "2024-07-05T14:26:39.869Z" }, "references": [ { @@ -132,6 +132,12 @@ "tags": [ "x_cve_prog_secretariat_snapshot" ] + }, + { + "url": "https://docs.github.com/en/enterprise-server@3.12/admin/release-notes/#3.12.1/adp-test-6-28", + "tags": [ + "x_snapshot" + ] } ] } diff --git a/cves/2024/2xxx/CVE-2024-2749.json b/cves/2024/2xxx/CVE-2024-2749.json index 75f8d7818cc..d1fcfe35785 100644 --- a/cves/2024/2xxx/CVE-2024-2749.json +++ b/cves/2024/2xxx/CVE-2024-2749.json @@ -8,7 +8,7 @@ "assignerShortName": "WPScan", "dateReserved": "2024-03-20T19:43:06.323Z", "datePublished": "2024-05-10T06:00:02.386Z", - "dateUpdated": "2024-06-21T15:36:40.059Z" + "dateUpdated": "2024-07-05T14:26:42.448Z" }, "containers": { "cna": { @@ -155,7 +155,7 @@ "providerMetadata": { "orgId": "96f1cf3c-f80a-4e0f-a063-99a91e3f1325", "shortName": "secretariat-reference", - "dateUpdated": "2024-06-21T15:36:40.059Z" + "dateUpdated": "2024-07-05T14:26:42.448Z" }, "references": [ { @@ -166,6 +166,15 @@ "technical-description", "x_cve_prog_secretariat_snapshot" ] + }, + { + "url": "https://wpscan.com/vulnerability/c0640d3a-80b3-4cad-a3cf-fb5d86558e91//adp-test-6-28", + "tags": [ + "exploit", + "vdb-entry", + "technical-description", + "x_snapshot" + ] } ] } diff --git a/cves/2024/2xxx/CVE-2024-2750.json b/cves/2024/2xxx/CVE-2024-2750.json index 76bd0fe4618..310dd14129c 100644 --- a/cves/2024/2xxx/CVE-2024-2750.json +++ b/cves/2024/2xxx/CVE-2024-2750.json @@ -8,7 +8,7 @@ "assignerShortName": "Wordfence", "dateReserved": "2024-03-20T20:16:38.185Z", "datePublished": "2024-05-02T16:51:56.433Z", - "dateUpdated": "2024-06-21T15:36:40.444Z" + "dateUpdated": "2024-07-05T14:26:42.271Z" }, "containers": { "cna": { @@ -118,7 +118,7 @@ "providerMetadata": { "orgId": "96f1cf3c-f80a-4e0f-a063-99a91e3f1325", "shortName": "secretariat-reference", - "dateUpdated": "2024-06-21T15:36:40.444Z" + "dateUpdated": "2024-07-05T14:26:42.271Z" }, "references": [ { @@ -132,6 +132,18 @@ "tags": [ "x_cve_prog_secretariat_snapshot" ] + }, + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/3011b783-e4b4-45d2-81af-2f8d166a30ac?source=cve/adp-test-6-28", + "tags": [ + "x_snapshot" + ] + }, + { + "url": "https://plugins.trac.wordpress.org/changeset/3072751/exclusive-addons-for-elementor/trunk/elements/button/button.php/adp-test-6-28", + "tags": [ + "x_snapshot" + ] } ] } diff --git a/cves/2024/2xxx/CVE-2024-2751.json b/cves/2024/2xxx/CVE-2024-2751.json index d7e7b69d7a2..e7abdb80630 100644 --- a/cves/2024/2xxx/CVE-2024-2751.json +++ b/cves/2024/2xxx/CVE-2024-2751.json @@ -1,6 +1,6 @@ { "dataType": "CVE_RECORD", - "dataVersion": "5.0", + "dataVersion": "5.1", "cveMetadata": { "cveId": "CVE-2024-2751", "assignerOrgId": "b15e7b5b-3da4-40ae-a43c-f7aa60e62599", @@ -8,7 +8,7 @@ "assignerShortName": "Wordfence", "dateReserved": "2024-03-20T20:22:08.967Z", "datePublished": "2024-05-02T16:52:49.617Z", - "dateUpdated": "2024-06-18T15:28:41.829Z" + "dateUpdated": "2024-07-05T14:26:42.379Z" }, "containers": { "cna": { @@ -80,6 +80,29 @@ "value": "Disclosed" } ] - } + }, + "adp": [ + { + "providerMetadata": { + "orgId": "96f1cf3c-f80a-4e0f-a063-99a91e3f1325", + "shortName": "secretariat-reference", + "dateUpdated": "2024-07-05T14:26:42.379Z" + }, + "references": [ + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/e9ad2dff-0c6d-4d91-a35d-803b97def01f?source=cve/adp-test-6-28", + "tags": [ + "x_snapshot" + ] + }, + { + "url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&new=3065677%40exclusive-addons-for-elementor%2Ftrunk&old=3051927%40exclusive-addons-for-elementor%2Ftrunk&sfp_email=&sfph_mail=#file51/adp-test-6-28", + "tags": [ + "x_snapshot" + ] + } + ] + } + ] } } \ No newline at end of file diff --git a/cves/2024/2xxx/CVE-2024-2752.json b/cves/2024/2xxx/CVE-2024-2752.json index 568e454fcb9..5db64f53ac2 100644 --- a/cves/2024/2xxx/CVE-2024-2752.json +++ b/cves/2024/2xxx/CVE-2024-2752.json @@ -8,7 +8,7 @@ "assignerShortName": "Wordfence", "dateReserved": "2024-03-20T21:56:34.161Z", "datePublished": "2024-05-02T16:52:53.708Z", - "dateUpdated": "2024-06-21T15:36:40.976Z" + "dateUpdated": "2024-07-05T14:26:39.873Z" }, "containers": { "cna": { @@ -86,7 +86,7 @@ "providerMetadata": { "orgId": "96f1cf3c-f80a-4e0f-a063-99a91e3f1325", "shortName": "secretariat-reference", - "dateUpdated": "2024-06-21T15:36:40.976Z" + "dateUpdated": "2024-07-05T14:26:39.873Z" }, "references": [ { @@ -100,6 +100,18 @@ "tags": [ "x_cve_prog_secretariat_snapshot" ] + }, + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/fbee3720-6ab9-4470-b2d2-09824db8de4d?source=cve/adp-test-6-28", + "tags": [ + "x_snapshot" + ] + }, + { + "url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&new=3075865%40wc-customer-source%2Ftrunk&old=3054024%40wc-customer-source%2Ftrunk&sfp_email=&sfph_mail=/adp-test-6-28", + "tags": [ + "x_snapshot" + ] } ] } diff --git a/cves/2024/2xxx/CVE-2024-2753.json b/cves/2024/2xxx/CVE-2024-2753.json index e972e395dae..ebf7fa6f5be 100644 --- a/cves/2024/2xxx/CVE-2024-2753.json +++ b/cves/2024/2xxx/CVE-2024-2753.json @@ -8,7 +8,7 @@ "assignerShortName": "ConcreteCMS", "dateReserved": "2024-03-20T23:39:23.964Z", "datePublished": "2024-04-03T18:13:41.128Z", - "dateUpdated": "2024-06-21T15:36:41.607Z" + "dateUpdated": "2024-07-05T14:26:42.313Z" }, "containers": { "cna": { @@ -130,7 +130,7 @@ "providerMetadata": { "orgId": "96f1cf3c-f80a-4e0f-a063-99a91e3f1325", "shortName": "secretariat-reference", - "dateUpdated": "2024-06-21T15:36:41.607Z" + "dateUpdated": "2024-07-05T14:26:42.313Z" }, "references": [ { @@ -144,6 +144,18 @@ "tags": [ "x_cve_prog_secretariat_snapshot" ] + }, + { + "url": "https://documentation.concretecms.org/developers/introduction/version-history/8516-release-notes?_gl=1*1oa3zn1*_ga*MTc1NDc0Njk2Mi4xNzA2ODI4MDU1*_ga_HFB3HPNNLS*MTcxMjE2NjYyNi4xMy4xLjE3MTIxNjY3MDcuMC4wLjA./adp-test-6-28", + "tags": [ + "x_snapshot" + ] + }, + { + "url": "https://documentation.concretecms.org/9-x/developers/introduction/version-history/928-release-notes?_gl=1*1bcxp5s*_ga*MTc1NDc0Njk2Mi4xNzA2ODI4MDU1*_ga_HFB3HPNNLS*MTcxMjE2NjYyNi4xMy4xLjE3MTIxNjY2ODEuMC4wLjA./adp-test-6-28", + "tags": [ + "x_snapshot" + ] } ] } diff --git a/cves/2024/2xxx/CVE-2024-2754.json b/cves/2024/2xxx/CVE-2024-2754.json index c0a19e2b780..79998af8e60 100644 --- a/cves/2024/2xxx/CVE-2024-2754.json +++ b/cves/2024/2xxx/CVE-2024-2754.json @@ -8,7 +8,7 @@ "assignerShortName": "VulDB", "dateReserved": "2024-03-21T01:58:05.896Z", "datePublished": "2024-03-21T07:00:08.978Z", - "dateUpdated": "2024-06-21T15:36:42.040Z" + "dateUpdated": "2024-07-05T14:26:42.225Z" }, "containers": { "cna": { @@ -132,7 +132,7 @@ "providerMetadata": { "orgId": "96f1cf3c-f80a-4e0f-a063-99a91e3f1325", "shortName": "secretariat-reference", - "dateUpdated": "2024-06-21T15:36:42.040Z" + "dateUpdated": "2024-07-05T14:26:42.225Z" }, "references": [ { @@ -160,6 +160,32 @@ "issue-tracking", "x_cve_prog_secretariat_snapshot" ] + }, + { + "url": "https://vuldb.com/?id.257544/adp-test-6-28", + "name": "VDB-257544 | SourceCodester Complete E-Commerce Site users_photo.php unrestricted upload", + "tags": [ + "vdb-entry", + "technical-description", + "x_snapshot" + ] + }, + { + "url": "https://vuldb.com/?ctiid.257544/adp-test-6-28", + "name": "VDB-257544 | CTI Indicators (IOB, IOC, TTP, IOA)", + "tags": [ + "signature", + "permissions-required", + "x_snapshot" + ] + }, + { + "url": "https://github.com/wkeyi0x1/vul-report/issues/4/adp-test-6-28", + "tags": [ + "exploit", + "issue-tracking", + "x_snapshot" + ] } ] } diff --git a/cves/2024/2xxx/CVE-2024-2756.json b/cves/2024/2xxx/CVE-2024-2756.json index 6db255beca2..9fe3a2e6d72 100644 --- a/cves/2024/2xxx/CVE-2024-2756.json +++ b/cves/2024/2xxx/CVE-2024-2756.json @@ -8,7 +8,7 @@ "assignerShortName": "php", "dateReserved": "2024-03-21T05:10:24.594Z", "datePublished": "2024-04-29T03:34:16.912Z", - "dateUpdated": "2024-06-21T15:36:42.451Z" + "dateUpdated": "2024-07-05T14:26:42.309Z" }, "containers": { "cna": { @@ -178,7 +178,7 @@ "providerMetadata": { "orgId": "96f1cf3c-f80a-4e0f-a063-99a91e3f1325", "shortName": "secretariat-reference", - "dateUpdated": "2024-06-21T15:36:42.451Z" + "dateUpdated": "2024-07-05T14:26:42.309Z" }, "references": [ { @@ -198,6 +198,30 @@ "tags": [ "x_cve_prog_secretariat_snapshot" ] + }, + { + "url": "https://github.com/php/php-src/security/advisories/GHSA-wpj3-hf5j-x4v4/adp-test-6-28", + "tags": [ + "x_snapshot" + ] + }, + { + "url": "http://www.openwall.com/lists/oss-security/2024/04/12/11/adp-test-6-28", + "tags": [ + "x_snapshot" + ] + }, + { + "url": "https://lists.debian.org/debian-lts-announce/2024/05/msg00005.html/adp-test-6-28", + "tags": [ + "x_snapshot" + ] + }, + { + "url": "https://security.netapp.com/advisory/ntap-20240510-0008//adp-test-6-28", + "tags": [ + "x_snapshot" + ] } ] } diff --git a/cves/2024/2xxx/CVE-2024-2757.json b/cves/2024/2xxx/CVE-2024-2757.json index 3d8d5bc871b..2741c3405e0 100644 --- a/cves/2024/2xxx/CVE-2024-2757.json +++ b/cves/2024/2xxx/CVE-2024-2757.json @@ -8,7 +8,7 @@ "assignerShortName": "php", "dateReserved": "2024-03-21T05:32:12.866Z", "datePublished": "2024-04-29T03:49:15.519Z", - "dateUpdated": "2024-06-21T15:36:42.839Z" + "dateUpdated": "2024-07-05T14:26:39.872Z" }, "containers": { "cna": { @@ -163,7 +163,7 @@ "providerMetadata": { "orgId": "96f1cf3c-f80a-4e0f-a063-99a91e3f1325", "shortName": "secretariat-reference", - "dateUpdated": "2024-06-21T15:36:42.839Z" + "dateUpdated": "2024-07-05T14:26:39.872Z" }, "references": [ { @@ -177,6 +177,24 @@ "tags": [ "x_cve_prog_secretariat_snapshot" ] + }, + { + "url": "https://github.com/php/php-src/security/advisories/GHSA-fjp9-9hwx-59fq/adp-test-6-28", + "tags": [ + "x_snapshot" + ] + }, + { + "url": "http://www.openwall.com/lists/oss-security/2024/04/12/11/adp-test-6-28", + "tags": [ + "x_snapshot" + ] + }, + { + "url": "https://security.netapp.com/advisory/ntap-20240510-0011//adp-test-6-28", + "tags": [ + "x_snapshot" + ] } ] } diff --git a/cves/2024/2xxx/CVE-2024-2758.json b/cves/2024/2xxx/CVE-2024-2758.json index bc480042739..21a802a3dbb 100644 --- a/cves/2024/2xxx/CVE-2024-2758.json +++ b/cves/2024/2xxx/CVE-2024-2758.json @@ -8,7 +8,7 @@ "assignerShortName": "certcc", "dateReserved": "2024-03-21T12:31:11.759Z", "datePublished": "2024-04-03T17:17:56.307Z", - "dateUpdated": "2024-06-21T15:36:43.315Z" + "dateUpdated": "2024-07-05T14:26:42.473Z" }, "containers": { "cna": { @@ -112,7 +112,7 @@ "providerMetadata": { "orgId": "96f1cf3c-f80a-4e0f-a063-99a91e3f1325", "shortName": "secretariat-reference", - "dateUpdated": "2024-06-21T15:36:43.315Z" + "dateUpdated": "2024-07-05T14:26:42.473Z" }, "references": [ { @@ -132,6 +132,24 @@ "tags": [ "x_cve_prog_secretariat_snapshot" ] + }, + { + "url": "https://github.com/tempesta-tech/tempesta/security/advisories/GHSA-3xwj-5ch3-q9p4/adp-test-6-28", + "tags": [ + "x_snapshot" + ] + }, + { + "url": "https://www.kb.cert.org/vuls/id/421644/adp-test-6-28", + "tags": [ + "x_snapshot" + ] + }, + { + "url": "http://www.openwall.com/lists/oss-security/2024/04/03/16/adp-test-6-28", + "tags": [ + "x_snapshot" + ] } ] } diff --git a/cves/2024/2xxx/CVE-2024-2759.json b/cves/2024/2xxx/CVE-2024-2759.json index 7d847c0484b..8778e409dde 100644 --- a/cves/2024/2xxx/CVE-2024-2759.json +++ b/cves/2024/2xxx/CVE-2024-2759.json @@ -1,6 +1,6 @@ { "dataType": "CVE_RECORD", - "dataVersion": "5.0", + "dataVersion": "5.1", "cveMetadata": { "cveId": "CVE-2024-2759", "assignerOrgId": "4bb8329e-dd38-46c1-aafb-9bf32bcb93c6", @@ -8,7 +8,7 @@ "assignerShortName": "CERT-PL", "dateReserved": "2024-03-21T13:13:33.707Z", "datePublished": "2024-04-04T13:23:57.114Z", - "dateUpdated": "2024-06-06T19:09:01.639Z" + "dateUpdated": "2024-07-05T14:26:42.466Z" }, "containers": { "cna": { @@ -100,6 +100,31 @@ "x_generator": { "engine": "Vulnogram 0.1.0-dev" } - } + }, + "adp": [ + { + "providerMetadata": { + "orgId": "96f1cf3c-f80a-4e0f-a063-99a91e3f1325", + "shortName": "secretariat-reference", + "dateUpdated": "2024-07-05T14:26:42.466Z" + }, + "references": [ + { + "tags": [ + "third-party-advisory", + "x_snapshot" + ], + "url": "https://cert.pl/en/posts/2024/04/CVE-2024-2759//adp-test-6-28" + }, + { + "tags": [ + "third-party-advisory", + "x_snapshot" + ], + "url": "https://cert.pl/posts/2024/04/CVE-2024-2759//adp-test-6-28" + } + ] + } + ] } } \ No newline at end of file diff --git a/cves/2024/2xxx/CVE-2024-2760.json b/cves/2024/2xxx/CVE-2024-2760.json index 4a6b171bcf2..f2e1cf47f88 100644 --- a/cves/2024/2xxx/CVE-2024-2760.json +++ b/cves/2024/2xxx/CVE-2024-2760.json @@ -8,7 +8,7 @@ "assignerShortName": "Fluid Attacks", "dateReserved": "2024-03-21T13:45:06.439Z", "datePublished": "2024-04-23T03:49:34.833Z", - "dateUpdated": "2024-06-21T15:36:43.958Z" + "dateUpdated": "2024-07-05T14:26:42.301Z" }, "containers": { "cna": { @@ -170,7 +170,7 @@ "providerMetadata": { "orgId": "96f1cf3c-f80a-4e0f-a063-99a91e3f1325", "shortName": "secretariat-reference", - "dateUpdated": "2024-06-21T15:36:43.958Z" + "dateUpdated": "2024-07-05T14:26:42.301Z" }, "references": [ { @@ -186,6 +186,20 @@ "x_cve_prog_secretariat_snapshot" ], "url": "https://www.bkav.com/bkav-home/DEMO_2024_06_19" + }, + { + "tags": [ + "third-party-advisory", + "x_snapshot" + ], + "url": "https://fluidattacks.com/advisories/kent//adp-test-6-28" + }, + { + "tags": [ + "product", + "x_snapshot" + ], + "url": "https://www.bkav.com/bkav-home/adp-test-6-28" } ] } diff --git a/cves/2024/2xxx/CVE-2024-2761.json b/cves/2024/2xxx/CVE-2024-2761.json index bb14e6e909e..1b6d178d267 100644 --- a/cves/2024/2xxx/CVE-2024-2761.json +++ b/cves/2024/2xxx/CVE-2024-2761.json @@ -8,7 +8,7 @@ "assignerShortName": "WPScan", "dateReserved": "2024-03-21T13:46:20.489Z", "datePublished": "2024-04-19T05:00:02.150Z", - "dateUpdated": "2024-06-21T15:36:44.476Z" + "dateUpdated": "2024-07-05T14:26:42.501Z" }, "containers": { "cna": { @@ -148,7 +148,7 @@ "providerMetadata": { "orgId": "96f1cf3c-f80a-4e0f-a063-99a91e3f1325", "shortName": "secretariat-reference", - "dateUpdated": "2024-06-21T15:36:44.476Z" + "dateUpdated": "2024-07-05T14:26:42.501Z" }, "references": [ { @@ -159,6 +159,15 @@ "technical-description", "x_cve_prog_secretariat_snapshot" ] + }, + { + "url": "https://wpscan.com/vulnerability/e092ccdc-7ea1-4937-97b7-4cdbff5e74e5//adp-test-6-28", + "tags": [ + "exploit", + "vdb-entry", + "technical-description", + "x_snapshot" + ] } ] } diff --git a/cves/2024/2xxx/CVE-2024-2762.json b/cves/2024/2xxx/CVE-2024-2762.json index 31c19cd9e68..a853354e155 100644 --- a/cves/2024/2xxx/CVE-2024-2762.json +++ b/cves/2024/2xxx/CVE-2024-2762.json @@ -8,7 +8,7 @@ "assignerShortName": "WPScan", "dateReserved": "2024-03-21T14:49:02.926Z", "datePublished": "2024-06-13T06:00:02.252Z", - "dateUpdated": "2024-06-13T19:33:15.890Z" + "dateUpdated": "2024-07-05T14:26:39.883Z" }, "containers": { "cna": { @@ -124,6 +124,24 @@ "shortName": "CISA-ADP", "dateUpdated": "2024-06-13T19:33:15.890Z" } + }, + { + "providerMetadata": { + "orgId": "96f1cf3c-f80a-4e0f-a063-99a91e3f1325", + "shortName": "secretariat-reference", + "dateUpdated": "2024-07-05T14:26:39.883Z" + }, + "references": [ + { + "url": "https://wpscan.com/vulnerability/92e0f5ca-0184-4e9c-b01a-7656e05dce69//adp-test-6-28", + "tags": [ + "exploit", + "vdb-entry", + "technical-description", + "x_snapshot" + ] + } + ] } ] } diff --git a/cves/2024/2xxx/CVE-2024-2763.json b/cves/2024/2xxx/CVE-2024-2763.json index f4088f7cc68..a7b6f30baa9 100644 --- a/cves/2024/2xxx/CVE-2024-2763.json +++ b/cves/2024/2xxx/CVE-2024-2763.json @@ -8,7 +8,7 @@ "assignerShortName": "VulDB", "dateReserved": "2024-03-21T15:17:45.636Z", "datePublished": "2024-03-21T20:31:03.792Z", - "dateUpdated": "2024-06-21T15:36:44.904Z" + "dateUpdated": "2024-07-05T14:26:42.472Z" }, "containers": { "cna": { @@ -131,7 +131,7 @@ "providerMetadata": { "orgId": "96f1cf3c-f80a-4e0f-a063-99a91e3f1325", "shortName": "secretariat-reference", - "dateUpdated": "2024-06-21T15:36:44.904Z" + "dateUpdated": "2024-07-05T14:26:42.472Z" }, "references": [ { @@ -158,6 +158,31 @@ "exploit", "x_cve_prog_secretariat_snapshot" ] + }, + { + "url": "https://vuldb.com/?id.257600/adp-test-6-28", + "name": "VDB-257600 | Tenda AC10U setcfm formSetCfm stack-based overflow", + "tags": [ + "vdb-entry", + "technical-description", + "x_snapshot" + ] + }, + { + "url": "https://vuldb.com/?ctiid.257600/adp-test-6-28", + "name": "VDB-257600 | CTI Indicators (IOB, IOC, IOA)", + "tags": [ + "signature", + "permissions-required", + "x_snapshot" + ] + }, + { + "url": "https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/AC10U/v1.V15.03.06.48/more/formSetCfm.md/adp-test-6-28", + "tags": [ + "exploit", + "x_snapshot" + ] } ] } diff --git a/cves/2024/2xxx/CVE-2024-2764.json b/cves/2024/2xxx/CVE-2024-2764.json index 3788d53be26..f7861a6727a 100644 --- a/cves/2024/2xxx/CVE-2024-2764.json +++ b/cves/2024/2xxx/CVE-2024-2764.json @@ -8,7 +8,7 @@ "assignerShortName": "VulDB", "dateReserved": "2024-03-21T15:17:47.961Z", "datePublished": "2024-03-21T20:31:05.130Z", - "dateUpdated": "2024-06-21T15:36:45.331Z" + "dateUpdated": "2024-07-05T14:26:42.474Z" }, "containers": { "cna": { @@ -131,7 +131,7 @@ "providerMetadata": { "orgId": "96f1cf3c-f80a-4e0f-a063-99a91e3f1325", "shortName": "secretariat-reference", - "dateUpdated": "2024-06-21T15:36:45.331Z" + "dateUpdated": "2024-07-05T14:26:42.474Z" }, "references": [ { @@ -158,6 +158,31 @@ "exploit", "x_cve_prog_secretariat_snapshot" ] + }, + { + "url": "https://vuldb.com/?id.257601/adp-test-6-28", + "name": "VDB-257601 | Tenda AC10U SetPptpServerCfg formSetPPTPServer stack-based overflow", + "tags": [ + "vdb-entry", + "technical-description", + "x_snapshot" + ] + }, + { + "url": "https://vuldb.com/?ctiid.257601/adp-test-6-28", + "name": "VDB-257601 | CTI Indicators (IOB, IOC, IOA)", + "tags": [ + "signature", + "permissions-required", + "x_snapshot" + ] + }, + { + "url": "https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/AC10U/v1.V15.03.06.48/more/formSetPPTPServer.md/adp-test-6-28", + "tags": [ + "exploit", + "x_snapshot" + ] } ] } diff --git a/cves/2024/2xxx/CVE-2024-2765.json b/cves/2024/2xxx/CVE-2024-2765.json index 3c02988bcfe..3d6635cf3b8 100644 --- a/cves/2024/2xxx/CVE-2024-2765.json +++ b/cves/2024/2xxx/CVE-2024-2765.json @@ -8,7 +8,7 @@ "assignerShortName": "Wordfence", "dateReserved": "2024-03-21T15:26:03.320Z", "datePublished": "2024-05-02T16:52:21.806Z", - "dateUpdated": "2024-06-21T15:36:45.749Z" + "dateUpdated": "2024-07-05T14:26:42.488Z" }, "containers": { "cna": { @@ -145,7 +145,7 @@ "providerMetadata": { "orgId": "96f1cf3c-f80a-4e0f-a063-99a91e3f1325", "shortName": "secretariat-reference", - "dateUpdated": "2024-06-21T15:36:45.749Z" + "dateUpdated": "2024-07-05T14:26:42.488Z" }, "references": [ { @@ -177,6 +177,36 @@ "tags": [ "x_cve_prog_secretariat_snapshot" ] + }, + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/86ddd5fd-137b-478e-952e-b36fc6a5c28d?source=cve/adp-test-6-28", + "tags": [ + "x_snapshot" + ] + }, + { + "url": "https://github.com/ultimatemember/ultimatemember/blob/de04d89a49dfb9baf4019ea77b1edfbcd17fd849/includes/core/um-filters-fields.php#L472/adp-test-6-28", + "tags": [ + "x_snapshot" + ] + }, + { + "url": "https://github.com/ultimatemember/ultimatemember/blob/de04d89a49dfb9baf4019ea77b1edfbcd17fd849/includes/core/um-filters-fields.php#L117/adp-test-6-28", + "tags": [ + "x_snapshot" + ] + }, + { + "url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3067953%40ultimate-member&new=3067953%40ultimate-member&sfp_email=&sfph_mail=/adp-test-6-28", + "tags": [ + "x_snapshot" + ] + }, + { + "url": "https://github.com/ultimatemember/ultimatemember/pull/1491/files/adp-test-6-28", + "tags": [ + "x_snapshot" + ] } ] } diff --git a/cves/2024/2xxx/CVE-2024-2766.json b/cves/2024/2xxx/CVE-2024-2766.json index 4ab6f7d9615..5e9a20aaab9 100644 --- a/cves/2024/2xxx/CVE-2024-2766.json +++ b/cves/2024/2xxx/CVE-2024-2766.json @@ -8,7 +8,7 @@ "assignerShortName": "VulDB", "dateReserved": "2024-03-21T15:33:03.759Z", "datePublished": "2024-03-21T21:00:07.368Z", - "dateUpdated": "2024-06-21T15:36:46.224Z" + "dateUpdated": "2024-07-05T14:26:40.143Z" }, "containers": { "cna": { @@ -131,7 +131,7 @@ "providerMetadata": { "orgId": "96f1cf3c-f80a-4e0f-a063-99a91e3f1325", "shortName": "secretariat-reference", - "dateUpdated": "2024-06-21T15:36:46.224Z" + "dateUpdated": "2024-07-05T14:26:40.143Z" }, "references": [ { @@ -158,6 +158,31 @@ "exploit", "x_cve_prog_secretariat_snapshot" ] + }, + { + "url": "https://vuldb.com/?id.257602/adp-test-6-28", + "name": "VDB-257602 | Campcodes Complete Online Beauty Parlor Management System index.php sql injection", + "tags": [ + "vdb-entry", + "technical-description", + "x_snapshot" + ] + }, + { + "url": "https://vuldb.com/?ctiid.257602/adp-test-6-28", + "name": "VDB-257602 | CTI Indicators (IOB, IOC, TTP, IOA)", + "tags": [ + "signature", + "permissions-required", + "x_snapshot" + ] + }, + { + "url": "https://github.com/E1CHO/cve_hub/blob/main/Complete%20Online%20Beauty%20Parlor%20Management%20System/Complete%20Online%20Beauty%20Parlor%20Management%20System%20-%20vuln%201.pdf/adp-test-6-28", + "tags": [ + "exploit", + "x_snapshot" + ] } ] } diff --git a/cves/2024/2xxx/CVE-2024-2767.json b/cves/2024/2xxx/CVE-2024-2767.json index fad994a4fa7..a3ca0cb5c68 100644 --- a/cves/2024/2xxx/CVE-2024-2767.json +++ b/cves/2024/2xxx/CVE-2024-2767.json @@ -8,7 +8,7 @@ "assignerShortName": "VulDB", "dateReserved": "2024-03-21T15:33:05.918Z", "datePublished": "2024-03-21T21:00:09.199Z", - "dateUpdated": "2024-06-21T15:36:46.626Z" + "dateUpdated": "2024-07-05T14:26:40.065Z" }, "containers": { "cna": { @@ -131,7 +131,7 @@ "providerMetadata": { "orgId": "96f1cf3c-f80a-4e0f-a063-99a91e3f1325", "shortName": "secretariat-reference", - "dateUpdated": "2024-06-21T15:36:46.626Z" + "dateUpdated": "2024-07-05T14:26:40.065Z" }, "references": [ { @@ -158,6 +158,31 @@ "exploit", "x_cve_prog_secretariat_snapshot" ] + }, + { + "url": "https://vuldb.com/?id.257603/adp-test-6-28", + "name": "VDB-257603 | Campcodes Complete Online Beauty Parlor Management System forgot-password.php sql injection", + "tags": [ + "vdb-entry", + "technical-description", + "x_snapshot" + ] + }, + { + "url": "https://vuldb.com/?ctiid.257603/adp-test-6-28", + "name": "VDB-257603 | CTI Indicators (IOB, IOC, TTP, IOA)", + "tags": [ + "signature", + "permissions-required", + "x_snapshot" + ] + }, + { + "url": "https://github.com/E1CHO/cve_hub/blob/main/Complete%20Online%20Beauty%20Parlor%20Management%20System/Complete%20Online%20Beauty%20Parlor%20Management%20System%20-%20vuln%202.pdf/adp-test-6-28", + "tags": [ + "exploit", + "x_snapshot" + ] } ] } diff --git a/cves/2024/2xxx/CVE-2024-2768.json b/cves/2024/2xxx/CVE-2024-2768.json index f04cd4f0f9d..497a938c49d 100644 --- a/cves/2024/2xxx/CVE-2024-2768.json +++ b/cves/2024/2xxx/CVE-2024-2768.json @@ -8,7 +8,7 @@ "assignerShortName": "VulDB", "dateReserved": "2024-03-21T15:33:09.144Z", "datePublished": "2024-03-21T21:31:03.836Z", - "dateUpdated": "2024-06-21T15:36:47.023Z" + "dateUpdated": "2024-07-05T14:26:40.064Z" }, "containers": { "cna": { @@ -131,7 +131,7 @@ "providerMetadata": { "orgId": "96f1cf3c-f80a-4e0f-a063-99a91e3f1325", "shortName": "secretariat-reference", - "dateUpdated": "2024-06-21T15:36:47.023Z" + "dateUpdated": "2024-07-05T14:26:40.064Z" }, "references": [ { @@ -158,6 +158,31 @@ "exploit", "x_cve_prog_secretariat_snapshot" ] + }, + { + "url": "https://vuldb.com/?id.257604/adp-test-6-28", + "name": "VDB-257604 | Campcodes Complete Online Beauty Parlor Management System edit-services.php sql injection", + "tags": [ + "vdb-entry", + "technical-description", + "x_snapshot" + ] + }, + { + "url": "https://vuldb.com/?ctiid.257604/adp-test-6-28", + "name": "VDB-257604 | CTI Indicators (IOB, IOC, TTP, IOA)", + "tags": [ + "signature", + "permissions-required", + "x_snapshot" + ] + }, + { + "url": "https://github.com/E1CHO/cve_hub/blob/main/Complete%20Online%20Beauty%20Parlor%20Management%20System/Complete%20Online%20Beauty%20Parlor%20Management%20System%20-%20vuln%203.pdf/adp-test-6-28", + "tags": [ + "exploit", + "x_snapshot" + ] } ] } diff --git a/cves/2024/2xxx/CVE-2024-2769.json b/cves/2024/2xxx/CVE-2024-2769.json index 210e870456e..26843c51724 100644 --- a/cves/2024/2xxx/CVE-2024-2769.json +++ b/cves/2024/2xxx/CVE-2024-2769.json @@ -8,7 +8,7 @@ "assignerShortName": "VulDB", "dateReserved": "2024-03-21T15:33:12.757Z", "datePublished": "2024-03-21T22:00:06.727Z", - "dateUpdated": "2024-06-21T15:36:47.423Z" + "dateUpdated": "2024-07-05T14:26:40.195Z" }, "containers": { "cna": { @@ -131,7 +131,7 @@ "providerMetadata": { "orgId": "96f1cf3c-f80a-4e0f-a063-99a91e3f1325", "shortName": "secretariat-reference", - "dateUpdated": "2024-06-21T15:36:47.423Z" + "dateUpdated": "2024-07-05T14:26:40.195Z" }, "references": [ { @@ -158,6 +158,31 @@ "exploit", "x_cve_prog_secretariat_snapshot" ] + }, + { + "url": "https://vuldb.com/?id.257605/adp-test-6-28", + "name": "VDB-257605 | Campcodes Complete Online Beauty Parlor Management System admin-profile.php sql injection", + "tags": [ + "vdb-entry", + "technical-description", + "x_snapshot" + ] + }, + { + "url": "https://vuldb.com/?ctiid.257605/adp-test-6-28", + "name": "VDB-257605 | CTI Indicators (IOB, IOC, TTP, IOA)", + "tags": [ + "signature", + "permissions-required", + "x_snapshot" + ] + }, + { + "url": "https://github.com/E1CHO/cve_hub/blob/main/Complete%20Online%20Beauty%20Parlor%20Management%20System/Complete%20Online%20Beauty%20Parlor%20Management%20System%20-%20vuln%205.pdf/adp-test-6-28", + "tags": [ + "exploit", + "x_snapshot" + ] } ] } diff --git a/cves/2024/2xxx/CVE-2024-2770.json b/cves/2024/2xxx/CVE-2024-2770.json index a4afd9d057f..c1e13a02171 100644 --- a/cves/2024/2xxx/CVE-2024-2770.json +++ b/cves/2024/2xxx/CVE-2024-2770.json @@ -8,7 +8,7 @@ "assignerShortName": "VulDB", "dateReserved": "2024-03-21T15:33:16.059Z", "datePublished": "2024-03-21T22:31:03.887Z", - "dateUpdated": "2024-06-21T15:36:47.814Z" + "dateUpdated": "2024-07-05T14:26:41.808Z" }, "containers": { "cna": { @@ -131,7 +131,7 @@ "providerMetadata": { "orgId": "96f1cf3c-f80a-4e0f-a063-99a91e3f1325", "shortName": "secretariat-reference", - "dateUpdated": "2024-06-21T15:36:47.814Z" + "dateUpdated": "2024-07-05T14:26:41.808Z" }, "references": [ { @@ -158,6 +158,31 @@ "exploit", "x_cve_prog_secretariat_snapshot" ] + }, + { + "url": "https://vuldb.com/?id.257606/adp-test-6-28", + "name": "VDB-257606 | Campcodes Complete Online Beauty Parlor Management System contact-us.php sql injection", + "tags": [ + "vdb-entry", + "technical-description", + "x_snapshot" + ] + }, + { + "url": "https://vuldb.com/?ctiid.257606/adp-test-6-28", + "name": "VDB-257606 | CTI Indicators (IOB, IOC, TTP, IOA)", + "tags": [ + "signature", + "permissions-required", + "x_snapshot" + ] + }, + { + "url": "https://github.com/E1CHO/cve_hub/blob/main/Complete%20Online%20Beauty%20Parlor%20Management%20System/Complete%20Online%20Beauty%20Parlor%20Management%20System%20-%20vuln%204.pdf/adp-test-6-28", + "tags": [ + "exploit", + "x_snapshot" + ] } ] } diff --git a/cves/2024/2xxx/CVE-2024-2771.json b/cves/2024/2xxx/CVE-2024-2771.json index d6978f67d98..2b9214f22be 100644 --- a/cves/2024/2xxx/CVE-2024-2771.json +++ b/cves/2024/2xxx/CVE-2024-2771.json @@ -8,7 +8,7 @@ "assignerShortName": "Wordfence", "dateReserved": "2024-03-21T15:41:42.767Z", "datePublished": "2024-05-18T07:38:20.993Z", - "dateUpdated": "2024-06-21T15:36:48.283Z" + "dateUpdated": "2024-07-05T14:26:41.810Z" }, "containers": { "cna": { @@ -87,7 +87,7 @@ "providerMetadata": { "orgId": "96f1cf3c-f80a-4e0f-a063-99a91e3f1325", "shortName": "secretariat-reference", - "dateUpdated": "2024-06-21T15:36:48.283Z" + "dateUpdated": "2024-07-05T14:26:41.810Z" }, "references": [ { @@ -101,6 +101,18 @@ "tags": [ "x_cve_prog_secretariat_snapshot" ] + }, + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/071195d6-3452-4241-a8d3-92efc84e4850?source=cve/adp-test-6-28", + "tags": [ + "x_snapshot" + ] + }, + { + "url": "https://plugins.trac.wordpress.org/changeset/3088078/fluentform/trunk/app/Http/Policies/RoleManagerPolicy.php/adp-test-6-28", + "tags": [ + "x_snapshot" + ] } ] } diff --git a/cves/2024/2xxx/CVE-2024-2772.json b/cves/2024/2xxx/CVE-2024-2772.json index eafde6566aa..56a42c56531 100644 --- a/cves/2024/2xxx/CVE-2024-2772.json +++ b/cves/2024/2xxx/CVE-2024-2772.json @@ -8,7 +8,7 @@ "assignerShortName": "Wordfence", "dateReserved": "2024-03-21T15:43:45.515Z", "datePublished": "2024-05-18T07:38:33.407Z", - "dateUpdated": "2024-06-21T15:36:48.703Z" + "dateUpdated": "2024-07-05T14:26:42.268Z" }, "containers": { "cna": { @@ -118,7 +118,7 @@ "providerMetadata": { "orgId": "96f1cf3c-f80a-4e0f-a063-99a91e3f1325", "shortName": "secretariat-reference", - "dateUpdated": "2024-06-21T15:36:48.703Z" + "dateUpdated": "2024-07-05T14:26:42.268Z" }, "references": [ { @@ -132,6 +132,18 @@ "tags": [ "x_cve_prog_secretariat_snapshot" ] + }, + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/2ccba77c-fb90-4906-b0fe-77607ec5df1f?source=cve/adp-test-6-28", + "tags": [ + "x_snapshot" + ] + }, + { + "url": "https://plugins.trac.wordpress.org/changeset/3073857/adp-test-6-28", + "tags": [ + "x_snapshot" + ] } ] } diff --git a/cves/2024/2xxx/CVE-2024-2773.json b/cves/2024/2xxx/CVE-2024-2773.json index cc3330ecf21..18b6cbfb5a0 100644 --- a/cves/2024/2xxx/CVE-2024-2773.json +++ b/cves/2024/2xxx/CVE-2024-2773.json @@ -8,7 +8,7 @@ "assignerShortName": "VulDB", "dateReserved": "2024-03-21T15:45:34.651Z", "datePublished": "2024-03-21T22:31:05.263Z", - "dateUpdated": "2024-06-21T15:36:49.131Z" + "dateUpdated": "2024-07-05T14:26:41.974Z" }, "containers": { "cna": { @@ -131,7 +131,7 @@ "providerMetadata": { "orgId": "96f1cf3c-f80a-4e0f-a063-99a91e3f1325", "shortName": "secretariat-reference", - "dateUpdated": "2024-06-21T15:36:49.131Z" + "dateUpdated": "2024-07-05T14:26:41.974Z" }, "references": [ { @@ -158,6 +158,31 @@ "exploit", "x_cve_prog_secretariat_snapshot" ] + }, + { + "url": "https://vuldb.com/?id.257607/adp-test-6-28", + "name": "VDB-257607 | Campcodes Online Marriage Registration System search.php cross site scripting", + "tags": [ + "vdb-entry", + "technical-description", + "x_snapshot" + ] + }, + { + "url": "https://vuldb.com/?ctiid.257607/adp-test-6-28", + "name": "VDB-257607 | CTI Indicators (IOB, IOC, TTP, IOA)", + "tags": [ + "signature", + "permissions-required", + "x_snapshot" + ] + }, + { + "url": "https://github.com/Kurunie/vuln_report/blob/main/Complete%20Online%20Marriage%20Registration%20System's%20vuln.pdf/adp-test-6-28", + "tags": [ + "exploit", + "x_snapshot" + ] } ] } diff --git a/cves/2024/2xxx/CVE-2024-2774.json b/cves/2024/2xxx/CVE-2024-2774.json index c94fb8d3c27..4eb5bb9838f 100644 --- a/cves/2024/2xxx/CVE-2024-2774.json +++ b/cves/2024/2xxx/CVE-2024-2774.json @@ -8,7 +8,7 @@ "assignerShortName": "VulDB", "dateReserved": "2024-03-21T15:45:36.949Z", "datePublished": "2024-03-21T23:00:06.912Z", - "dateUpdated": "2024-06-21T15:36:49.567Z" + "dateUpdated": "2024-07-05T14:26:42.253Z" }, "containers": { "cna": { @@ -131,7 +131,7 @@ "providerMetadata": { "orgId": "96f1cf3c-f80a-4e0f-a063-99a91e3f1325", "shortName": "secretariat-reference", - "dateUpdated": "2024-06-21T15:36:49.567Z" + "dateUpdated": "2024-07-05T14:26:42.253Z" }, "references": [ { @@ -158,6 +158,31 @@ "exploit", "x_cve_prog_secretariat_snapshot" ] + }, + { + "url": "https://vuldb.com/?id.257608/adp-test-6-28", + "name": "VDB-257608 | Campcodes Online Marriage Registration System search.php sql injection", + "tags": [ + "vdb-entry", + "technical-description", + "x_snapshot" + ] + }, + { + "url": "https://vuldb.com/?ctiid.257608/adp-test-6-28", + "name": "VDB-257608 | CTI Indicators (IOB, IOC, TTP, IOA)", + "tags": [ + "signature", + "permissions-required", + "x_snapshot" + ] + }, + { + "url": "https://github.com/E1CHO/cve_hub/blob/main/Complete%20Online%20Marriage%20Registration%20System%20-%20vuln%201.pdf/adp-test-6-28", + "tags": [ + "exploit", + "x_snapshot" + ] } ] } diff --git a/cves/2024/2xxx/CVE-2024-2775.json b/cves/2024/2xxx/CVE-2024-2775.json index 79cac104d79..770e62ef430 100644 --- a/cves/2024/2xxx/CVE-2024-2775.json +++ b/cves/2024/2xxx/CVE-2024-2775.json @@ -8,7 +8,7 @@ "assignerShortName": "VulDB", "dateReserved": "2024-03-21T15:45:42.690Z", "datePublished": "2024-03-21T23:00:08.813Z", - "dateUpdated": "2024-06-21T15:36:49.969Z" + "dateUpdated": "2024-07-05T14:26:42.359Z" }, "containers": { "cna": { @@ -131,7 +131,7 @@ "providerMetadata": { "orgId": "96f1cf3c-f80a-4e0f-a063-99a91e3f1325", "shortName": "secretariat-reference", - "dateUpdated": "2024-06-21T15:36:49.969Z" + "dateUpdated": "2024-07-05T14:26:42.359Z" }, "references": [ { @@ -158,6 +158,31 @@ "exploit", "x_cve_prog_secretariat_snapshot" ] + }, + { + "url": "https://vuldb.com/?id.257609/adp-test-6-28", + "name": "VDB-257609 | Campcodes Online Marriage Registration System user-profile.php cross site scripting", + "tags": [ + "vdb-entry", + "technical-description", + "x_snapshot" + ] + }, + { + "url": "https://vuldb.com/?ctiid.257609/adp-test-6-28", + "name": "VDB-257609 | CTI Indicators (IOB, IOC, TTP, IOA)", + "tags": [ + "signature", + "permissions-required", + "x_snapshot" + ] + }, + { + "url": "https://github.com/E1CHO/cve_hub/blob/main/Complete%20Online%20Marriage%20Registration%20System%20-%20vuln%202.pdf/adp-test-6-28", + "tags": [ + "exploit", + "x_snapshot" + ] } ] } diff --git a/cves/2024/2xxx/CVE-2024-2776.json b/cves/2024/2xxx/CVE-2024-2776.json index 5ca7e1923d1..d924f09035a 100644 --- a/cves/2024/2xxx/CVE-2024-2776.json +++ b/cves/2024/2xxx/CVE-2024-2776.json @@ -8,7 +8,7 @@ "assignerShortName": "VulDB", "dateReserved": "2024-03-21T15:45:46.575Z", "datePublished": "2024-03-21T23:31:04.020Z", - "dateUpdated": "2024-06-21T15:36:50.353Z" + "dateUpdated": "2024-07-05T14:26:42.522Z" }, "containers": { "cna": { @@ -131,7 +131,7 @@ "providerMetadata": { "orgId": "96f1cf3c-f80a-4e0f-a063-99a91e3f1325", "shortName": "secretariat-reference", - "dateUpdated": "2024-06-21T15:36:50.353Z" + "dateUpdated": "2024-07-05T14:26:42.522Z" }, "references": [ { @@ -158,6 +158,31 @@ "exploit", "x_cve_prog_secretariat_snapshot" ] + }, + { + "url": "https://vuldb.com/?id.257610/adp-test-6-28", + "name": "VDB-257610 | Campcodes Online Marriage Registration System search.php sql injection", + "tags": [ + "vdb-entry", + "technical-description", + "x_snapshot" + ] + }, + { + "url": "https://vuldb.com/?ctiid.257610/adp-test-6-28", + "name": "VDB-257610 | CTI Indicators (IOB, IOC, TTP, IOA)", + "tags": [ + "signature", + "permissions-required", + "x_snapshot" + ] + }, + { + "url": "https://github.com/E1CHO/cve_hub/blob/main/Complete%20Online%20Marriage%20Registration%20System/Complete%20Online%20Marriage%20Registration%20System%20-%20vuln%201.pdf/adp-test-6-28", + "tags": [ + "exploit", + "x_snapshot" + ] } ] } diff --git a/cves/2024/2xxx/CVE-2024-2777.json b/cves/2024/2xxx/CVE-2024-2777.json index 87c6f188578..da18a1c5908 100644 --- a/cves/2024/2xxx/CVE-2024-2777.json +++ b/cves/2024/2xxx/CVE-2024-2777.json @@ -8,7 +8,7 @@ "assignerShortName": "VulDB", "dateReserved": "2024-03-21T15:45:50.426Z", "datePublished": "2024-03-22T00:00:10.019Z", - "dateUpdated": "2024-06-21T15:36:50.798Z" + "dateUpdated": "2024-07-05T14:26:41.842Z" }, "containers": { "cna": { @@ -131,7 +131,7 @@ "providerMetadata": { "orgId": "96f1cf3c-f80a-4e0f-a063-99a91e3f1325", "shortName": "secretariat-reference", - "dateUpdated": "2024-06-21T15:36:50.798Z" + "dateUpdated": "2024-07-05T14:26:41.842Z" }, "references": [ { @@ -158,6 +158,31 @@ "exploit", "x_cve_prog_secretariat_snapshot" ] + }, + { + "url": "https://vuldb.com/?id.257611/adp-test-6-28", + "name": "VDB-257611 | Campcodes Online Marriage Registration System application-bwdates-reports-details.php sql injection", + "tags": [ + "vdb-entry", + "technical-description", + "x_snapshot" + ] + }, + { + "url": "https://vuldb.com/?ctiid.257611/adp-test-6-28", + "name": "VDB-257611 | CTI Indicators (IOB, IOC, TTP, IOA)", + "tags": [ + "signature", + "permissions-required", + "x_snapshot" + ] + }, + { + "url": "https://github.com/E1CHO/cve_hub/blob/main/Complete%20Online%20Marriage%20Registration%20System/Complete%20Online%20Marriage%20Registration%20System%20-%20vuln%202.pdf/adp-test-6-28", + "tags": [ + "exploit", + "x_snapshot" + ] } ] } diff --git a/cves/2024/2xxx/CVE-2024-2778.json b/cves/2024/2xxx/CVE-2024-2778.json index 05b54c86a28..ae5be13ef0d 100644 --- a/cves/2024/2xxx/CVE-2024-2778.json +++ b/cves/2024/2xxx/CVE-2024-2778.json @@ -8,7 +8,7 @@ "assignerShortName": "VulDB", "dateReserved": "2024-03-21T15:45:53.927Z", "datePublished": "2024-03-22T00:31:03.952Z", - "dateUpdated": "2024-06-21T15:36:51.239Z" + "dateUpdated": "2024-07-05T14:26:42.570Z" }, "containers": { "cna": { @@ -131,7 +131,7 @@ "providerMetadata": { "orgId": "96f1cf3c-f80a-4e0f-a063-99a91e3f1325", "shortName": "secretariat-reference", - "dateUpdated": "2024-06-21T15:36:51.239Z" + "dateUpdated": "2024-07-05T14:26:42.570Z" }, "references": [ { @@ -158,6 +158,31 @@ "exploit", "x_cve_prog_secretariat_snapshot" ] + }, + { + "url": "https://vuldb.com/?id.257612/adp-test-6-28", + "name": "VDB-257612 | Campcodes Online Marriage Registration System search.php cross site scripting", + "tags": [ + "vdb-entry", + "technical-description", + "x_snapshot" + ] + }, + { + "url": "https://vuldb.com/?ctiid.257612/adp-test-6-28", + "name": "VDB-257612 | CTI Indicators (IOB, IOC, TTP, IOA)", + "tags": [ + "signature", + "permissions-required", + "x_snapshot" + ] + }, + { + "url": "https://github.com/E1CHO/cve_hub/blob/main/Complete%20Online%20Marriage%20Registration%20System/Complete%20Online%20Marriage%20Registration%20System%20-%20vuln%203.pdf/adp-test-6-28", + "tags": [ + "exploit", + "x_snapshot" + ] } ] } diff --git a/cves/2024/2xxx/CVE-2024-2779.json b/cves/2024/2xxx/CVE-2024-2779.json index 95e027e23e8..2ece3858b80 100644 --- a/cves/2024/2xxx/CVE-2024-2779.json +++ b/cves/2024/2xxx/CVE-2024-2779.json @@ -8,7 +8,7 @@ "assignerShortName": "VulDB", "dateReserved": "2024-03-21T15:45:57.268Z", "datePublished": "2024-03-22T01:00:07.154Z", - "dateUpdated": "2024-06-21T15:36:51.627Z" + "dateUpdated": "2024-07-05T14:26:40.224Z" }, "containers": { "cna": { @@ -131,7 +131,7 @@ "providerMetadata": { "orgId": "96f1cf3c-f80a-4e0f-a063-99a91e3f1325", "shortName": "secretariat-reference", - "dateUpdated": "2024-06-21T15:36:51.627Z" + "dateUpdated": "2024-07-05T14:26:40.224Z" }, "references": [ { @@ -158,6 +158,31 @@ "exploit", "x_cve_prog_secretariat_snapshot" ] + }, + { + "url": "https://vuldb.com/?id.257613/adp-test-6-28", + "name": "VDB-257613 | Campcodes Online Marriage Registration System application-bwdates-reports-details.php cross site scripting", + "tags": [ + "vdb-entry", + "technical-description", + "x_snapshot" + ] + }, + { + "url": "https://vuldb.com/?ctiid.257613/adp-test-6-28", + "name": "VDB-257613 | CTI Indicators (IOB, IOC, TTP, IOA)", + "tags": [ + "signature", + "permissions-required", + "x_snapshot" + ] + }, + { + "url": "https://github.com/E1CHO/cve_hub/blob/main/Complete%20Online%20Marriage%20Registration%20System/Complete%20Online%20Marriage%20Registration%20System%20-%20vuln%204.pdf/adp-test-6-28", + "tags": [ + "exploit", + "x_snapshot" + ] } ] } diff --git a/cves/2024/2xxx/CVE-2024-2780.json b/cves/2024/2xxx/CVE-2024-2780.json index 3892cbde835..b669b70709d 100644 --- a/cves/2024/2xxx/CVE-2024-2780.json +++ b/cves/2024/2xxx/CVE-2024-2780.json @@ -8,7 +8,7 @@ "assignerShortName": "VulDB", "dateReserved": "2024-03-21T15:46:00.743Z", "datePublished": "2024-03-22T01:31:03.898Z", - "dateUpdated": "2024-06-21T15:36:52.024Z" + "dateUpdated": "2024-07-05T14:26:42.521Z" }, "containers": { "cna": { @@ -131,7 +131,7 @@ "providerMetadata": { "orgId": "96f1cf3c-f80a-4e0f-a063-99a91e3f1325", "shortName": "secretariat-reference", - "dateUpdated": "2024-06-21T15:36:52.024Z" + "dateUpdated": "2024-07-05T14:26:42.521Z" }, "references": [ { @@ -158,6 +158,31 @@ "exploit", "x_cve_prog_secretariat_snapshot" ] + }, + { + "url": "https://vuldb.com/?id.257614/adp-test-6-28", + "name": "VDB-257614 | Campcodes Online Marriage Registration System admin-profile.php cross site scripting", + "tags": [ + "vdb-entry", + "technical-description", + "x_snapshot" + ] + }, + { + "url": "https://vuldb.com/?ctiid.257614/adp-test-6-28", + "name": "VDB-257614 | CTI Indicators (IOB, IOC, TTP, IOA)", + "tags": [ + "signature", + "permissions-required", + "x_snapshot" + ] + }, + { + "url": "https://github.com/E1CHO/cve_hub/blob/main/Complete%20Online%20Marriage%20Registration%20System/Complete%20Online%20Marriage%20Registration%20System%20-%20vuln%205.pdf/adp-test-6-28", + "tags": [ + "exploit", + "x_snapshot" + ] } ] } diff --git a/cves/2024/2xxx/CVE-2024-2781.json b/cves/2024/2xxx/CVE-2024-2781.json index 0040a9c07b8..77764d0790b 100644 --- a/cves/2024/2xxx/CVE-2024-2781.json +++ b/cves/2024/2xxx/CVE-2024-2781.json @@ -8,7 +8,7 @@ "assignerShortName": "Wordfence", "dateReserved": "2024-03-21T15:46:30.608Z", "datePublished": "2024-03-27T06:40:49.006Z", - "dateUpdated": "2024-06-21T15:36:52.443Z" + "dateUpdated": "2024-07-05T14:26:42.248Z" }, "containers": { "cna": { @@ -86,7 +86,7 @@ "providerMetadata": { "orgId": "96f1cf3c-f80a-4e0f-a063-99a91e3f1325", "shortName": "secretariat-reference", - "dateUpdated": "2024-06-21T15:36:52.443Z" + "dateUpdated": "2024-07-05T14:26:42.248Z" }, "references": [ { @@ -100,6 +100,18 @@ "tags": [ "x_cve_prog_secretariat_snapshot" ] + }, + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/54970085-5206-45b6-adcf-11e6dd4cd633?source=cve/adp-test-6-28", + "tags": [ + "x_snapshot" + ] + }, + { + "url": "https://elementor.com/pro/changelog/?utm_source=wp-plugins&utm_campaign=pro-changelog&utm_medium=wp-dash/adp-test-6-28", + "tags": [ + "x_snapshot" + ] } ] } diff --git a/cves/2024/2xxx/CVE-2024-2782.json b/cves/2024/2xxx/CVE-2024-2782.json index bf2f6ebcfeb..763ca96a691 100644 --- a/cves/2024/2xxx/CVE-2024-2782.json +++ b/cves/2024/2xxx/CVE-2024-2782.json @@ -8,7 +8,7 @@ "assignerShortName": "Wordfence", "dateReserved": "2024-03-21T15:47:53.437Z", "datePublished": "2024-05-18T07:38:32.798Z", - "dateUpdated": "2024-06-21T15:36:52.852Z" + "dateUpdated": "2024-07-05T14:26:42.577Z" }, "containers": { "cna": { @@ -118,7 +118,7 @@ "providerMetadata": { "orgId": "96f1cf3c-f80a-4e0f-a063-99a91e3f1325", "shortName": "secretariat-reference", - "dateUpdated": "2024-06-21T15:36:52.852Z" + "dateUpdated": "2024-07-05T14:26:42.577Z" }, "references": [ { @@ -132,6 +132,18 @@ "tags": [ "x_cve_prog_secretariat_snapshot" ] + }, + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/0814e7b3-404a-4db5-b564-46c9086ec048?source=cve/adp-test-6-28", + "tags": [ + "x_snapshot" + ] + }, + { + "url": "https://plugins.trac.wordpress.org/changeset/3088078/fluentform/trunk/app/Http/Policies/GlobalSettingsPolicy.php/adp-test-6-28", + "tags": [ + "x_snapshot" + ] } ] } diff --git a/cves/2024/2xxx/CVE-2024-2783.json b/cves/2024/2xxx/CVE-2024-2783.json index a3f49c236af..743b6f64539 100644 --- a/cves/2024/2xxx/CVE-2024-2783.json +++ b/cves/2024/2xxx/CVE-2024-2783.json @@ -8,7 +8,7 @@ "assignerShortName": "Wordfence", "dateReserved": "2024-03-21T16:03:37.329Z", "datePublished": "2024-04-09T18:58:55.932Z", - "dateUpdated": "2024-06-21T15:36:53.279Z" + "dateUpdated": "2024-07-05T14:26:42.571Z" }, "containers": { "cna": { @@ -118,7 +118,7 @@ "providerMetadata": { "orgId": "96f1cf3c-f80a-4e0f-a063-99a91e3f1325", "shortName": "secretariat-reference", - "dateUpdated": "2024-06-21T15:36:53.279Z" + "dateUpdated": "2024-07-05T14:26:42.571Z" }, "references": [ { @@ -132,6 +132,18 @@ "tags": [ "x_cve_prog_secretariat_snapshot" ] + }, + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/720a3525-01dd-4cfd-9403-2bc3f87df618?source=cve/adp-test-6-28", + "tags": [ + "x_snapshot" + ] + }, + { + "url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&new=3058859%40gamipress%2Ftrunk&old=3058187%40gamipress%2Ftrunk&sfp_email=&sfph_mail=/adp-test-6-28", + "tags": [ + "x_snapshot" + ] } ] } diff --git a/cves/2024/2xxx/CVE-2024-2784.json b/cves/2024/2xxx/CVE-2024-2784.json index bfcc7a7086a..3537a4d4fdc 100644 --- a/cves/2024/2xxx/CVE-2024-2784.json +++ b/cves/2024/2xxx/CVE-2024-2784.json @@ -8,7 +8,7 @@ "assignerShortName": "Wordfence", "dateReserved": "2024-03-21T16:17:04.525Z", "datePublished": "2024-05-24T04:29:58.681Z", - "dateUpdated": "2024-06-21T15:36:53.744Z" + "dateUpdated": "2024-07-05T14:26:42.517Z" }, "containers": { "cna": { @@ -118,7 +118,7 @@ "providerMetadata": { "orgId": "96f1cf3c-f80a-4e0f-a063-99a91e3f1325", "shortName": "secretariat-reference", - "dateUpdated": "2024-06-21T15:36:53.744Z" + "dateUpdated": "2024-07-05T14:26:42.517Z" }, "references": [ { @@ -132,6 +132,18 @@ "tags": [ "x_cve_prog_secretariat_snapshot" ] + }, + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/cc6fdb7c-b750-4f03-9785-a9dc7573580d?source=cve/adp-test-6-28", + "tags": [ + "x_snapshot" + ] + }, + { + "url": "https://plugins.trac.wordpress.org/changeset/3090866//adp-test-6-28", + "tags": [ + "x_snapshot" + ] } ] } diff --git a/cves/2024/2xxx/CVE-2024-2785.json b/cves/2024/2xxx/CVE-2024-2785.json index ae3dab744d3..65b1e084dc2 100644 --- a/cves/2024/2xxx/CVE-2024-2785.json +++ b/cves/2024/2xxx/CVE-2024-2785.json @@ -8,7 +8,7 @@ "assignerShortName": "Wordfence", "dateReserved": "2024-03-21T16:23:16.308Z", "datePublished": "2024-05-09T20:03:40.117Z", - "dateUpdated": "2024-06-21T15:36:54.187Z" + "dateUpdated": "2024-07-05T14:26:42.512Z" }, "containers": { "cna": { @@ -122,7 +122,7 @@ "providerMetadata": { "orgId": "96f1cf3c-f80a-4e0f-a063-99a91e3f1325", "shortName": "secretariat-reference", - "dateUpdated": "2024-06-21T15:36:54.187Z" + "dateUpdated": "2024-07-05T14:26:42.512Z" }, "references": [ { @@ -142,6 +142,24 @@ "tags": [ "x_cve_prog_secretariat_snapshot" ] + }, + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/d0117436-7a2a-42f3-8c05-75dfddfb9d09?source=cve/adp-test-6-28", + "tags": [ + "x_snapshot" + ] + }, + { + "url": "https://plugins.trac.wordpress.org/browser/the-plus-addons-for-elementor-page-builder/tags/5.5.0/modules/widgets/tp_age_gate.php?annotate=blame#L2389/adp-test-6-28", + "tags": [ + "x_snapshot" + ] + }, + { + "url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3076733%40the-plus-addons-for-elementor-page-builder&new=3076733%40the-plus-addons-for-elementor-page-builder&sfp_email=&sfph_mail=/adp-test-6-28", + "tags": [ + "x_snapshot" + ] } ] } diff --git a/cves/2024/2xxx/CVE-2024-2786.json b/cves/2024/2xxx/CVE-2024-2786.json index 7f68d09b87c..0a62db35a28 100644 --- a/cves/2024/2xxx/CVE-2024-2786.json +++ b/cves/2024/2xxx/CVE-2024-2786.json @@ -8,7 +8,7 @@ "assignerShortName": "Wordfence", "dateReserved": "2024-03-21T16:50:25.495Z", "datePublished": "2024-04-09T18:58:46.911Z", - "dateUpdated": "2024-06-21T15:36:54.567Z" + "dateUpdated": "2024-07-05T14:26:42.548Z" }, "containers": { "cna": { @@ -98,7 +98,7 @@ "providerMetadata": { "orgId": "96f1cf3c-f80a-4e0f-a063-99a91e3f1325", "shortName": "secretariat-reference", - "dateUpdated": "2024-06-21T15:36:54.567Z" + "dateUpdated": "2024-07-05T14:26:42.548Z" }, "references": [ { @@ -136,6 +136,42 @@ "tags": [ "x_cve_prog_secretariat_snapshot" ] + }, + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/4688c1ee-335c-4adb-bd68-894ff34d001d?source=cve/adp-test-6-28", + "tags": [ + "x_snapshot" + ] + }, + { + "url": "https://plugins.trac.wordpress.org/browser/happy-elementor-addons/tags/3.10.4/widgets/card/widget.php#L1216/adp-test-6-28", + "tags": [ + "x_snapshot" + ] + }, + { + "url": "https://plugins.trac.wordpress.org/browser/happy-elementor-addons/tags/3.10.4/widgets/gradient-heading/widget.php#L260/adp-test-6-28", + "tags": [ + "x_snapshot" + ] + }, + { + "url": "https://plugins.trac.wordpress.org/browser/happy-elementor-addons/tags/3.10.4/widgets/review/widget.php#L821/adp-test-6-28", + "tags": [ + "x_snapshot" + ] + }, + { + "url": "https://plugins.trac.wordpress.org/browser/happy-elementor-addons/tags/3.10.4/widgets/gradient-heading/widget.php#L262/adp-test-6-28", + "tags": [ + "x_snapshot" + ] + }, + { + "url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&new=3064385%40happy-elementor-addons%2Ftrunk&old=3044937%40happy-elementor-addons%2Ftrunk&sfp_email=&sfph_mail=#file18/adp-test-6-28", + "tags": [ + "x_snapshot" + ] } ] } diff --git a/cves/2024/2xxx/CVE-2024-2787.json b/cves/2024/2xxx/CVE-2024-2787.json index 0c08fd3387f..b0282783396 100644 --- a/cves/2024/2xxx/CVE-2024-2787.json +++ b/cves/2024/2xxx/CVE-2024-2787.json @@ -8,7 +8,7 @@ "assignerShortName": "Wordfence", "dateReserved": "2024-03-21T16:58:25.539Z", "datePublished": "2024-04-09T18:59:31.469Z", - "dateUpdated": "2024-06-21T15:36:54.969Z" + "dateUpdated": "2024-07-05T14:26:42.560Z" }, "containers": { "cna": { @@ -135,7 +135,7 @@ "providerMetadata": { "orgId": "96f1cf3c-f80a-4e0f-a063-99a91e3f1325", "shortName": "secretariat-reference", - "dateUpdated": "2024-06-21T15:36:54.969Z" + "dateUpdated": "2024-07-05T14:26:42.560Z" }, "references": [ { @@ -149,6 +149,18 @@ "tags": [ "x_cve_prog_secretariat_snapshot" ] + }, + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/ea3daad1-74a1-44be-b7ed-b58b806da614?source=cve/adp-test-6-28", + "tags": [ + "x_snapshot" + ] + }, + { + "url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&new=3064385%40happy-elementor-addons%2Ftrunk&old=3044937%40happy-elementor-addons%2Ftrunk&sfp_email=&sfph_mail=#file13/adp-test-6-28", + "tags": [ + "x_snapshot" + ] } ] } diff --git a/cves/2024/2xxx/CVE-2024-2788.json b/cves/2024/2xxx/CVE-2024-2788.json index 1e47693db68..4748c20bb85 100644 --- a/cves/2024/2xxx/CVE-2024-2788.json +++ b/cves/2024/2xxx/CVE-2024-2788.json @@ -8,7 +8,7 @@ "assignerShortName": "Wordfence", "dateReserved": "2024-03-21T16:59:37.342Z", "datePublished": "2024-04-09T18:58:56.837Z", - "dateUpdated": "2024-06-21T15:36:55.358Z" + "dateUpdated": "2024-07-05T14:26:42.497Z" }, "containers": { "cna": { @@ -86,7 +86,7 @@ "providerMetadata": { "orgId": "96f1cf3c-f80a-4e0f-a063-99a91e3f1325", "shortName": "secretariat-reference", - "dateUpdated": "2024-06-21T15:36:55.358Z" + "dateUpdated": "2024-07-05T14:26:42.497Z" }, "references": [ { @@ -100,6 +100,18 @@ "tags": [ "x_cve_prog_secretariat_snapshot" ] + }, + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/73e4ec2f-f4e1-469d-a4b7-5a10d44b7a2f?source=cve/adp-test-6-28", + "tags": [ + "x_snapshot" + ] + }, + { + "url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&new=3064385%40happy-elementor-addons%2Ftrunk&old=3044937%40happy-elementor-addons%2Ftrunk&sfp_email=&sfph_mail=#file13/adp-test-6-28", + "tags": [ + "x_snapshot" + ] } ] } diff --git a/cves/2024/2xxx/CVE-2024-2789.json b/cves/2024/2xxx/CVE-2024-2789.json index b21323769c2..111a7c4a6cd 100644 --- a/cves/2024/2xxx/CVE-2024-2789.json +++ b/cves/2024/2xxx/CVE-2024-2789.json @@ -8,7 +8,7 @@ "assignerShortName": "Wordfence", "dateReserved": "2024-03-21T17:04:01.552Z", "datePublished": "2024-04-09T18:59:17.679Z", - "dateUpdated": "2024-06-21T15:36:55.750Z" + "dateUpdated": "2024-07-05T14:26:42.579Z" }, "containers": { "cna": { @@ -117,7 +117,7 @@ "providerMetadata": { "orgId": "96f1cf3c-f80a-4e0f-a063-99a91e3f1325", "shortName": "secretariat-reference", - "dateUpdated": "2024-06-21T15:36:55.750Z" + "dateUpdated": "2024-07-05T14:26:42.579Z" }, "references": [ { @@ -131,6 +131,18 @@ "tags": [ "x_cve_prog_secretariat_snapshot" ] + }, + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/bb93853b-a6e0-42d1-8b10-b391984603f2?source=cve/adp-test-6-28", + "tags": [ + "x_snapshot" + ] + }, + { + "url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&new=3064385%40happy-elementor-addons%2Ftrunk&old=3044937%40happy-elementor-addons%2Ftrunk&sfp_email=&sfph_mail=#file13/adp-test-6-28", + "tags": [ + "x_snapshot" + ] } ] } diff --git a/cves/2024/2xxx/CVE-2024-2790.json b/cves/2024/2xxx/CVE-2024-2790.json index 53e1287fd88..d0bb6d0d1d8 100644 --- a/cves/2024/2xxx/CVE-2024-2790.json +++ b/cves/2024/2xxx/CVE-2024-2790.json @@ -8,7 +8,7 @@ "assignerShortName": "Wordfence", "dateReserved": "2024-03-21T17:11:17.666Z", "datePublished": "2024-05-02T16:52:06.878Z", - "dateUpdated": "2024-06-21T15:36:56.182Z" + "dateUpdated": "2024-07-05T14:26:42.534Z" }, "containers": { "cna": { @@ -123,7 +123,7 @@ "providerMetadata": { "orgId": "96f1cf3c-f80a-4e0f-a063-99a91e3f1325", "shortName": "secretariat-reference", - "dateUpdated": "2024-06-21T15:36:56.182Z" + "dateUpdated": "2024-07-05T14:26:42.534Z" }, "references": [ { @@ -137,6 +137,18 @@ "tags": [ "x_cve_prog_secretariat_snapshot" ] + }, + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/52ba91f1-21a2-4d7c-8801-b5e72a00c37d?source=cve/adp-test-6-28", + "tags": [ + "x_snapshot" + ] + }, + { + "url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3063395%40ht-mega-for-elementor&new=3063395%40ht-mega-for-elementor&sfp_email=&sfph_mail=#file4/adp-test-6-28", + "tags": [ + "x_snapshot" + ] } ] } diff --git a/cves/2024/2xxx/CVE-2024-2791.json b/cves/2024/2xxx/CVE-2024-2791.json index 10109c2dfbc..cc1ee183349 100644 --- a/cves/2024/2xxx/CVE-2024-2791.json +++ b/cves/2024/2xxx/CVE-2024-2791.json @@ -8,7 +8,7 @@ "assignerShortName": "Wordfence", "dateReserved": "2024-03-21T17:14:53.383Z", "datePublished": "2024-04-02T05:32:49.050Z", - "dateUpdated": "2024-06-21T15:36:56.706Z" + "dateUpdated": "2024-07-05T14:26:42.532Z" }, "containers": { "cna": { @@ -117,7 +117,7 @@ "providerMetadata": { "orgId": "96f1cf3c-f80a-4e0f-a063-99a91e3f1325", "shortName": "secretariat-reference", - "dateUpdated": "2024-06-21T15:36:56.706Z" + "dateUpdated": "2024-07-05T14:26:42.532Z" }, "references": [ { @@ -131,6 +131,18 @@ "tags": [ "x_cve_prog_secretariat_snapshot" ] + }, + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/0dad759d-9b44-47ca-8410-e39f65dc919c?source=cve/adp-test-6-28", + "tags": [ + "x_snapshot" + ] + }, + { + "url": "https://plugins.trac.wordpress.org/changeset/3061715/metform/trunk/widgets/file-upload/file-upload.php/adp-test-6-28", + "tags": [ + "x_snapshot" + ] } ] } diff --git a/cves/2024/2xxx/CVE-2024-2792.json b/cves/2024/2xxx/CVE-2024-2792.json index ae56babe8b0..94254f91f28 100644 --- a/cves/2024/2xxx/CVE-2024-2792.json +++ b/cves/2024/2xxx/CVE-2024-2792.json @@ -8,7 +8,7 @@ "assignerShortName": "Wordfence", "dateReserved": "2024-03-21T17:23:37.571Z", "datePublished": "2024-04-09T18:59:27.627Z", - "dateUpdated": "2024-06-21T15:36:57.139Z" + "dateUpdated": "2024-07-05T14:26:42.582Z" }, "containers": { "cna": { @@ -95,7 +95,7 @@ "providerMetadata": { "orgId": "96f1cf3c-f80a-4e0f-a063-99a91e3f1325", "shortName": "secretariat-reference", - "dateUpdated": "2024-06-21T15:36:57.139Z" + "dateUpdated": "2024-07-05T14:26:42.582Z" }, "references": [ { @@ -127,6 +127,36 @@ "tags": [ "x_cve_prog_secretariat_snapshot" ] + }, + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/dcc5a611-23bf-499e-8141-684458d9ce3b?source=cve/adp-test-6-28", + "tags": [ + "x_snapshot" + ] + }, + { + "url": "https://plugins.trac.wordpress.org/browser/addon-elements-for-elementor-page-builder/tags/1.13#modules/image-compare/widgets/adp-test-6-28", + "tags": [ + "x_snapshot" + ] + }, + { + "url": "https://plugins.trac.wordpress.org/browser/addon-elements-for-elementor-page-builder/tags/1.13/modules/image-compare/widgets/image-compare.php#L508/adp-test-6-28", + "tags": [ + "x_snapshot" + ] + }, + { + "url": "https://plugins.trac.wordpress.org/browser/addon-elements-for-elementor-page-builder/tags/1.13/modules/image-compare/widgets/image-compare.php#L521/adp-test-6-28", + "tags": [ + "x_snapshot" + ] + }, + { + "url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3058768%40addon-elements-for-elementor-page-builder&new=3058768%40addon-elements-for-elementor-page-builder&sfp_email=&sfph_mail=/adp-test-6-28", + "tags": [ + "x_snapshot" + ] } ] } diff --git a/cves/2024/2xxx/CVE-2024-2793.json b/cves/2024/2xxx/CVE-2024-2793.json index dd7b71f10c7..48e6a080f2f 100644 --- a/cves/2024/2xxx/CVE-2024-2793.json +++ b/cves/2024/2xxx/CVE-2024-2793.json @@ -8,7 +8,7 @@ "assignerShortName": "Wordfence", "dateReserved": "2024-03-21T17:43:34.529Z", "datePublished": "2024-05-31T04:31:43.112Z", - "dateUpdated": "2024-06-21T15:36:57.599Z" + "dateUpdated": "2024-07-05T14:26:42.572Z" }, "containers": { "cna": { @@ -148,7 +148,7 @@ "providerMetadata": { "orgId": "96f1cf3c-f80a-4e0f-a063-99a91e3f1325", "shortName": "secretariat-reference", - "dateUpdated": "2024-06-21T15:36:57.599Z" + "dateUpdated": "2024-07-05T14:26:42.572Z" }, "references": [ { @@ -186,6 +186,42 @@ "tags": [ "x_cve_prog_secretariat_snapshot" ] + }, + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/9bd63003-d1d6-480a-8df7-878bcc89f1ee?source=cve/adp-test-6-28", + "tags": [ + "x_snapshot" + ] + }, + { + "url": "https://plugins.trac.wordpress.org/browser/atarim-visual-collaboration/trunk/inc/wpf_ajax_functions.php#L505/adp-test-6-28", + "tags": [ + "x_snapshot" + ] + }, + { + "url": "https://plugins.trac.wordpress.org/browser/atarim-visual-collaboration/trunk/inc/wpf_ajax_functions.php#L666/adp-test-6-28", + "tags": [ + "x_snapshot" + ] + }, + { + "url": "https://plugins.trac.wordpress.org/browser/atarim-visual-collaboration/trunk/inc/wpf_ajax_functions.php#L1923/adp-test-6-28", + "tags": [ + "x_snapshot" + ] + }, + { + "url": "https://plugins.trac.wordpress.org/changeset/3094999//adp-test-6-28", + "tags": [ + "x_snapshot" + ] + }, + { + "url": "https://plugins.trac.wordpress.org/changeset/3094260//adp-test-6-28", + "tags": [ + "x_snapshot" + ] } ] } diff --git a/cves/2024/2xxx/CVE-2024-2794.json b/cves/2024/2xxx/CVE-2024-2794.json index a39c65289da..a46fff360ba 100644 --- a/cves/2024/2xxx/CVE-2024-2794.json +++ b/cves/2024/2xxx/CVE-2024-2794.json @@ -8,7 +8,7 @@ "assignerShortName": "Wordfence", "dateReserved": "2024-03-21T18:06:36.270Z", "datePublished": "2024-03-30T04:31:08.818Z", - "dateUpdated": "2024-06-21T15:36:58.063Z" + "dateUpdated": "2024-07-05T14:26:42.482Z" }, "containers": { "cna": { @@ -117,7 +117,7 @@ "providerMetadata": { "orgId": "96f1cf3c-f80a-4e0f-a063-99a91e3f1325", "shortName": "secretariat-reference", - "dateUpdated": "2024-06-21T15:36:58.063Z" + "dateUpdated": "2024-07-05T14:26:42.482Z" }, "references": [ { @@ -131,6 +131,18 @@ "tags": [ "x_cve_prog_secretariat_snapshot" ] + }, + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/814cce39-ef25-4d0f-b793-dca5c873f468?source=cve/adp-test-6-28", + "tags": [ + "x_snapshot" + ] + }, + { + "url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3055320%40block-options&new=3055320%40block-options&sfp_email=&sfph_mail=/adp-test-6-28", + "tags": [ + "x_snapshot" + ] } ] } diff --git a/cves/2024/2xxx/CVE-2024-2795.json b/cves/2024/2xxx/CVE-2024-2795.json index 84544b83a4d..1cfd0b41763 100644 --- a/cves/2024/2xxx/CVE-2024-2795.json +++ b/cves/2024/2xxx/CVE-2024-2795.json @@ -8,7 +8,7 @@ "assignerShortName": "Wordfence", "dateReserved": "2024-03-21T18:14:20.653Z", "datePublished": "2024-06-28T06:57:46.802Z", - "dateUpdated": "2024-06-28T06:57:46.802Z" + "dateUpdated": "2024-07-05T14:26:42.590Z" }, "containers": { "cna": { @@ -81,6 +81,29 @@ "value": "Disclosed" } ] - } + }, + "adp": [ + { + "providerMetadata": { + "orgId": "96f1cf3c-f80a-4e0f-a063-99a91e3f1325", + "shortName": "secretariat-reference", + "dateUpdated": "2024-07-05T14:26:42.590Z" + }, + "references": [ + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/f62a9ca0-7077-410f-b005-175348acd133?source=cve/adp-test-6-28", + "tags": [ + "x_snapshot" + ] + }, + { + "url": "https://wordpress.org/plugins/seo-simple-pack//adp-test-6-28", + "tags": [ + "x_snapshot" + ] + } + ] + } + ] } } \ No newline at end of file diff --git a/cves/2024/2xxx/CVE-2024-2796.json b/cves/2024/2xxx/CVE-2024-2796.json index 60fb623a463..47bf3c814d9 100644 --- a/cves/2024/2xxx/CVE-2024-2796.json +++ b/cves/2024/2xxx/CVE-2024-2796.json @@ -8,7 +8,7 @@ "assignerShortName": "Perforce", "dateReserved": "2024-03-21T18:15:09.714Z", "datePublished": "2024-04-18T15:04:56.099Z", - "dateUpdated": "2024-06-21T15:36:58.487Z" + "dateUpdated": "2024-07-05T14:26:42.550Z" }, "containers": { "cna": { @@ -112,7 +112,7 @@ "providerMetadata": { "orgId": "96f1cf3c-f80a-4e0f-a063-99a91e3f1325", "shortName": "secretariat-reference", - "dateUpdated": "2024-06-21T15:36:58.487Z" + "dateUpdated": "2024-07-05T14:26:42.550Z" }, "references": [ { @@ -120,6 +120,12 @@ "tags": [ "x_cve_prog_secretariat_snapshot" ] + }, + { + "url": "https://portal.perforce.com/s/detail/a91PA000001STuXYAW/adp-test-6-28", + "tags": [ + "x_snapshot" + ] } ] } diff --git a/cves/2024/2xxx/CVE-2024-2797.json b/cves/2024/2xxx/CVE-2024-2797.json index 6e8ec73cfb5..000334c6caf 100644 --- a/cves/2024/2xxx/CVE-2024-2797.json +++ b/cves/2024/2xxx/CVE-2024-2797.json @@ -8,7 +8,7 @@ "assignerShortName": "Wordfence", "dateReserved": "2024-03-21T18:21:58.537Z", "datePublished": "2024-05-02T16:52:27.425Z", - "dateUpdated": "2024-06-21T15:36:58.879Z" + "dateUpdated": "2024-07-05T14:26:42.500Z" }, "containers": { "cna": { @@ -121,7 +121,7 @@ "providerMetadata": { "orgId": "96f1cf3c-f80a-4e0f-a063-99a91e3f1325", "shortName": "secretariat-reference", - "dateUpdated": "2024-06-21T15:36:58.879Z" + "dateUpdated": "2024-07-05T14:26:42.500Z" }, "references": [ { @@ -141,6 +141,24 @@ "tags": [ "x_cve_prog_secretariat_snapshot" ] + }, + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/a03b4c19-85fa-47ad-b9ae-b466f8e5ca96?source=cve/adp-test-6-28", + "tags": [ + "x_snapshot" + ] + }, + { + "url": "https://plugins.trac.wordpress.org/browser/official-mailerlite-sign-up-forms/trunk/src/Admin/Actions.php#L41/adp-test-6-28", + "tags": [ + "x_snapshot" + ] + }, + { + "url": "https://plugins.trac.wordpress.org/changeset/3070584/official-mailerlite-sign-up-forms/trunk?contextall=1&old=3045803&old_path=%2Fofficial-mailerlite-sign-up-forms%2Ftrunk/adp-test-6-28", + "tags": [ + "x_snapshot" + ] } ] } diff --git a/cves/2024/2xxx/CVE-2024-2798.json b/cves/2024/2xxx/CVE-2024-2798.json index 63694c39d19..cb980ed2e31 100644 --- a/cves/2024/2xxx/CVE-2024-2798.json +++ b/cves/2024/2xxx/CVE-2024-2798.json @@ -8,7 +8,7 @@ "assignerShortName": "Wordfence", "dateReserved": "2024-03-21T18:49:33.231Z", "datePublished": "2024-04-23T05:33:32.559Z", - "dateUpdated": "2024-06-21T15:36:59.303Z" + "dateUpdated": "2024-07-05T14:26:42.581Z" }, "containers": { "cna": { @@ -134,7 +134,7 @@ "providerMetadata": { "orgId": "96f1cf3c-f80a-4e0f-a063-99a91e3f1325", "shortName": "secretariat-reference", - "dateUpdated": "2024-06-21T15:36:59.303Z" + "dateUpdated": "2024-07-05T14:26:42.581Z" }, "references": [ { @@ -148,6 +148,18 @@ "tags": [ "x_cve_prog_secretariat_snapshot" ] + }, + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/70582781-9de5-4124-bde4-d3d26724e9b3?source=cve/adp-test-6-28", + "tags": [ + "x_snapshot" + ] + }, + { + "url": "https://plugins.trac.wordpress.org/changeset/3072880/royal-elementor-addons/tags/1.3.972/extensions/wpr-sticky-section.php?old=3069462&old_path=royal-elementor-addons%2Ftags%2F1.3.971%2Fextensions%2Fwpr-sticky-section.php/adp-test-6-28", + "tags": [ + "x_snapshot" + ] } ] } diff --git a/cves/2024/2xxx/CVE-2024-2799.json b/cves/2024/2xxx/CVE-2024-2799.json index 9a54ff555e6..8a8194dd2f2 100644 --- a/cves/2024/2xxx/CVE-2024-2799.json +++ b/cves/2024/2xxx/CVE-2024-2799.json @@ -8,7 +8,7 @@ "assignerShortName": "Wordfence", "dateReserved": "2024-03-21T18:50:40.546Z", "datePublished": "2024-04-23T05:33:31.936Z", - "dateUpdated": "2024-06-21T15:36:59.703Z" + "dateUpdated": "2024-07-05T14:26:42.568Z" }, "containers": { "cna": { @@ -150,7 +150,7 @@ "providerMetadata": { "orgId": "96f1cf3c-f80a-4e0f-a063-99a91e3f1325", "shortName": "secretariat-reference", - "dateUpdated": "2024-06-21T15:36:59.703Z" + "dateUpdated": "2024-07-05T14:26:42.568Z" }, "references": [ { @@ -176,6 +176,30 @@ "tags": [ "x_cve_prog_secretariat_snapshot" ] + }, + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/40ca3778-95ff-4b2c-ac47-4ae8c86e245a?source=cve/adp-test-6-28", + "tags": [ + "x_snapshot" + ] + }, + { + "url": "https://plugins.trac.wordpress.org/changeset/3072880/royal-elementor-addons/tags/1.3.972/modules/advanced-text/widgets/advanced-text.php?old=3069462&old_path=royal-elementor-addons%2Ftags%2F1.3.971%2Fmodules%2Fadvanced-text%2Fwidgets%2Fadvanced-text.php/adp-test-6-28", + "tags": [ + "x_snapshot" + ] + }, + { + "url": "https://plugins.trac.wordpress.org/changeset/3072880/royal-elementor-addons/tags/1.3.972/modules/media-grid/widgets/wpr-media-grid.php?old=3069462&old_path=royal-elementor-addons%2Ftags%2F1.3.971%2Fmodules%2Fmedia-grid%2Fwidgets%2Fwpr-media-grid.php/adp-test-6-28", + "tags": [ + "x_snapshot" + ] + }, + { + "url": "https://plugins.trac.wordpress.org/changeset/3072880/royal-elementor-addons/tags/1.3.972/classes/utilities.php?old=3069462&old_path=royal-elementor-addons%2Ftags%2F1.3.971%2Fclasses%2Futilities.php/adp-test-6-28", + "tags": [ + "x_snapshot" + ] } ] } diff --git a/cves/2024/2xxx/CVE-2024-2801.json b/cves/2024/2xxx/CVE-2024-2801.json index b73a323c4c6..1edcbc9181d 100644 --- a/cves/2024/2xxx/CVE-2024-2801.json +++ b/cves/2024/2xxx/CVE-2024-2801.json @@ -8,7 +8,7 @@ "assignerShortName": "Wordfence", "dateReserved": "2024-03-21T19:37:58.388Z", "datePublished": "2024-04-12T02:33:16.526Z", - "dateUpdated": "2024-06-21T15:37:00.151Z" + "dateUpdated": "2024-07-05T14:26:42.592Z" }, "containers": { "cna": { @@ -117,7 +117,7 @@ "providerMetadata": { "orgId": "96f1cf3c-f80a-4e0f-a063-99a91e3f1325", "shortName": "secretariat-reference", - "dateUpdated": "2024-06-21T15:37:00.151Z" + "dateUpdated": "2024-07-05T14:26:42.592Z" }, "references": [ { @@ -131,6 +131,18 @@ "tags": [ "x_cve_prog_secretariat_snapshot" ] + }, + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/b9f34195-fc03-4c3d-b25e-c9b9cf8ded3c?source=cve/adp-test-6-28", + "tags": [ + "x_snapshot" + ] + }, + { + "url": "https://wordpress.org/plugins/shopkeeper-extender//adp-test-6-28", + "tags": [ + "x_snapshot" + ] } ] } diff --git a/cves/2024/2xxx/CVE-2024-2803.json b/cves/2024/2xxx/CVE-2024-2803.json index 93e67607cb0..00fccdfb09b 100644 --- a/cves/2024/2xxx/CVE-2024-2803.json +++ b/cves/2024/2xxx/CVE-2024-2803.json @@ -8,7 +8,7 @@ "assignerShortName": "Wordfence", "dateReserved": "2024-03-21T20:07:08.785Z", "datePublished": "2024-04-04T01:56:57.608Z", - "dateUpdated": "2024-06-21T15:37:00.556Z" + "dateUpdated": "2024-07-05T14:26:42.465Z" }, "containers": { "cna": { @@ -117,7 +117,7 @@ "providerMetadata": { "orgId": "96f1cf3c-f80a-4e0f-a063-99a91e3f1325", "shortName": "secretariat-reference", - "dateUpdated": "2024-06-21T15:37:00.556Z" + "dateUpdated": "2024-07-05T14:26:42.465Z" }, "references": [ { @@ -131,6 +131,18 @@ "tags": [ "x_cve_prog_secretariat_snapshot" ] + }, + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/b1c44ad9-e61e-4f29-9c0b-7c0a89b0c8da?source=cve/adp-test-6-28", + "tags": [ + "x_snapshot" + ] + }, + { + "url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3062463%40elementskit-lite&new=3062463%40elementskit-lite&sfp_email=&sfph_mail=#file12/adp-test-6-28", + "tags": [ + "x_snapshot" + ] } ] } diff --git a/cves/2024/2xxx/CVE-2024-2804.json b/cves/2024/2xxx/CVE-2024-2804.json index 585b11ef03b..6e0474c5fed 100644 --- a/cves/2024/2xxx/CVE-2024-2804.json +++ b/cves/2024/2xxx/CVE-2024-2804.json @@ -8,7 +8,7 @@ "assignerShortName": "Wordfence", "dateReserved": "2024-03-21T20:43:11.390Z", "datePublished": "2024-04-09T18:58:43.381Z", - "dateUpdated": "2024-06-21T15:37:00.957Z" + "dateUpdated": "2024-07-05T14:26:42.592Z" }, "containers": { "cna": { @@ -122,7 +122,7 @@ "providerMetadata": { "orgId": "96f1cf3c-f80a-4e0f-a063-99a91e3f1325", "shortName": "secretariat-reference", - "dateUpdated": "2024-06-21T15:37:00.957Z" + "dateUpdated": "2024-07-05T14:26:42.592Z" }, "references": [ { @@ -136,6 +136,18 @@ "tags": [ "x_cve_prog_secretariat_snapshot" ] + }, + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/3320c182-b1f9-4e06-92ea-0fa670557dd0?source=cve/adp-test-6-28", + "tags": [ + "x_snapshot" + ] + }, + { + "url": "https://plugins.trac.wordpress.org/browser/network-summary/trunk/includes/class-network-summary.php#L225/adp-test-6-28", + "tags": [ + "x_snapshot" + ] } ] } diff --git a/cves/2024/2xxx/CVE-2024-2805.json b/cves/2024/2xxx/CVE-2024-2805.json index e338ef3d311..3680ca24385 100644 --- a/cves/2024/2xxx/CVE-2024-2805.json +++ b/cves/2024/2xxx/CVE-2024-2805.json @@ -8,7 +8,7 @@ "assignerShortName": "VulDB", "dateReserved": "2024-03-21T21:33:09.307Z", "datePublished": "2024-03-22T03:00:06.426Z", - "dateUpdated": "2024-06-21T15:37:01.571Z" + "dateUpdated": "2024-07-05T14:26:42.582Z" }, "containers": { "cna": { @@ -135,7 +135,7 @@ "providerMetadata": { "orgId": "96f1cf3c-f80a-4e0f-a063-99a91e3f1325", "shortName": "secretariat-reference", - "dateUpdated": "2024-06-21T15:37:01.571Z" + "dateUpdated": "2024-07-05T14:26:42.582Z" }, "references": [ { @@ -162,6 +162,31 @@ "exploit", "x_cve_prog_secretariat_snapshot" ] + }, + { + "url": "https://vuldb.com/?id.257660/adp-test-6-28", + "name": "VDB-257660 | Tenda AC15 SetSpeedWan formSetSpeedWan stack-based overflow", + "tags": [ + "vdb-entry", + "technical-description", + "x_snapshot" + ] + }, + { + "url": "https://vuldb.com/?ctiid.257660/adp-test-6-28", + "name": "VDB-257660 | CTI Indicators (IOB, IOC, IOA)", + "tags": [ + "signature", + "permissions-required", + "x_snapshot" + ] + }, + { + "url": "https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/AC15/V1.0%20V15.03.20_multi/SetSpeedWan.md/adp-test-6-28", + "tags": [ + "exploit", + "x_snapshot" + ] } ] } diff --git a/cves/2024/2xxx/CVE-2024-2806.json b/cves/2024/2xxx/CVE-2024-2806.json index 7ee574fb8e1..d5423dbf62f 100644 --- a/cves/2024/2xxx/CVE-2024-2806.json +++ b/cves/2024/2xxx/CVE-2024-2806.json @@ -8,7 +8,7 @@ "assignerShortName": "VulDB", "dateReserved": "2024-03-21T21:33:26.262Z", "datePublished": "2024-03-22T04:31:04.089Z", - "dateUpdated": "2024-06-21T15:37:01.987Z" + "dateUpdated": "2024-07-05T14:26:42.552Z" }, "containers": { "cna": { @@ -135,7 +135,7 @@ "providerMetadata": { "orgId": "96f1cf3c-f80a-4e0f-a063-99a91e3f1325", "shortName": "secretariat-reference", - "dateUpdated": "2024-06-21T15:37:01.987Z" + "dateUpdated": "2024-07-05T14:26:42.552Z" }, "references": [ { @@ -162,6 +162,31 @@ "exploit", "x_cve_prog_secretariat_snapshot" ] + }, + { + "url": "https://vuldb.com/?id.257661/adp-test-6-28", + "name": "VDB-257661 | Tenda AC15 addWifiMacFilter stack-based overflow", + "tags": [ + "vdb-entry", + "technical-description", + "x_snapshot" + ] + }, + { + "url": "https://vuldb.com/?ctiid.257661/adp-test-6-28", + "name": "VDB-257661 | CTI Indicators (IOB, IOC, IOA)", + "tags": [ + "signature", + "permissions-required", + "x_snapshot" + ] + }, + { + "url": "https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/AC15/V1.0%20V15.03.20_multi/addWifiMacFilter_deviceId.md/adp-test-6-28", + "tags": [ + "exploit", + "x_snapshot" + ] } ] } diff --git a/cves/2024/2xxx/CVE-2024-2807.json b/cves/2024/2xxx/CVE-2024-2807.json index a83a15c77a4..4253accf112 100644 --- a/cves/2024/2xxx/CVE-2024-2807.json +++ b/cves/2024/2xxx/CVE-2024-2807.json @@ -8,7 +8,7 @@ "assignerShortName": "VulDB", "dateReserved": "2024-03-21T21:33:54.048Z", "datePublished": "2024-03-22T04:31:05.417Z", - "dateUpdated": "2024-06-21T15:37:02.373Z" + "dateUpdated": "2024-07-05T14:26:42.576Z" }, "containers": { "cna": { @@ -135,7 +135,7 @@ "providerMetadata": { "orgId": "96f1cf3c-f80a-4e0f-a063-99a91e3f1325", "shortName": "secretariat-reference", - "dateUpdated": "2024-06-21T15:37:02.373Z" + "dateUpdated": "2024-07-05T14:26:42.576Z" }, "references": [ { @@ -162,6 +162,31 @@ "exploit", "x_cve_prog_secretariat_snapshot" ] + }, + { + "url": "https://vuldb.com/?id.257662/adp-test-6-28", + "name": "VDB-257662 | Tenda AC15 expandDlnaFile formExpandDlnaFile stack-based overflow", + "tags": [ + "vdb-entry", + "technical-description", + "x_snapshot" + ] + }, + { + "url": "https://vuldb.com/?ctiid.257662/adp-test-6-28", + "name": "VDB-257662 | CTI Indicators (IOB, IOC, IOA)", + "tags": [ + "signature", + "permissions-required", + "x_snapshot" + ] + }, + { + "url": "https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/AC15/V1.0%20V15.03.20_multi/formExpandDlnaFile.md/adp-test-6-28", + "tags": [ + "exploit", + "x_snapshot" + ] } ] } diff --git a/cves/2024/2xxx/CVE-2024-2808.json b/cves/2024/2xxx/CVE-2024-2808.json index 823af96484c..2c1575cd5c2 100644 --- a/cves/2024/2xxx/CVE-2024-2808.json +++ b/cves/2024/2xxx/CVE-2024-2808.json @@ -8,7 +8,7 @@ "assignerShortName": "VulDB", "dateReserved": "2024-03-21T21:34:07.034Z", "datePublished": "2024-03-22T05:00:06.300Z", - "dateUpdated": "2024-06-21T15:37:02.772Z" + "dateUpdated": "2024-07-05T14:26:42.571Z" }, "containers": { "cna": { @@ -135,7 +135,7 @@ "providerMetadata": { "orgId": "96f1cf3c-f80a-4e0f-a063-99a91e3f1325", "shortName": "secretariat-reference", - "dateUpdated": "2024-06-21T15:37:02.772Z" + "dateUpdated": "2024-07-05T14:26:42.571Z" }, "references": [ { @@ -162,6 +162,31 @@ "exploit", "x_cve_prog_secretariat_snapshot" ] + }, + { + "url": "https://vuldb.com/?id.257663/adp-test-6-28", + "name": "VDB-257663 | Tenda AC15 QuickIndex formQuickIndex stack-based overflow", + "tags": [ + "vdb-entry", + "technical-description", + "x_snapshot" + ] + }, + { + "url": "https://vuldb.com/?ctiid.257663/adp-test-6-28", + "name": "VDB-257663 | CTI Indicators (IOB, IOC, IOA)", + "tags": [ + "signature", + "permissions-required", + "x_snapshot" + ] + }, + { + "url": "https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/AC15/V1.0%20V15.03.20_multi/formQuickIndex.md/adp-test-6-28", + "tags": [ + "exploit", + "x_snapshot" + ] } ] } diff --git a/cves/2024/2xxx/CVE-2024-2809.json b/cves/2024/2xxx/CVE-2024-2809.json index 0e085608501..d10f84c85df 100644 --- a/cves/2024/2xxx/CVE-2024-2809.json +++ b/cves/2024/2xxx/CVE-2024-2809.json @@ -8,7 +8,7 @@ "assignerShortName": "VulDB", "dateReserved": "2024-03-21T21:34:19.498Z", "datePublished": "2024-03-22T05:31:04.573Z", - "dateUpdated": "2024-06-21T15:37:03.222Z" + "dateUpdated": "2024-07-05T14:26:42.506Z" }, "containers": { "cna": { @@ -135,7 +135,7 @@ "providerMetadata": { "orgId": "96f1cf3c-f80a-4e0f-a063-99a91e3f1325", "shortName": "secretariat-reference", - "dateUpdated": "2024-06-21T15:37:03.222Z" + "dateUpdated": "2024-07-05T14:26:42.506Z" }, "references": [ { @@ -162,6 +162,31 @@ "exploit", "x_cve_prog_secretariat_snapshot" ] + }, + { + "url": "https://vuldb.com/?id.257664/adp-test-6-28", + "name": "VDB-257664 | Tenda AC15 SetFirewallCfg formSetFirewallCfg stack-based overflow", + "tags": [ + "vdb-entry", + "technical-description", + "x_snapshot" + ] + }, + { + "url": "https://vuldb.com/?ctiid.257664/adp-test-6-28", + "name": "VDB-257664 | CTI Indicators (IOB, IOC, IOA)", + "tags": [ + "signature", + "permissions-required", + "x_snapshot" + ] + }, + { + "url": "https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/AC15/V1.0%20V15.03.20_multi/formSetFirewallCfg.md/adp-test-6-28", + "tags": [ + "exploit", + "x_snapshot" + ] } ] } diff --git a/cves/2024/2xxx/CVE-2024-2810.json b/cves/2024/2xxx/CVE-2024-2810.json index 0a96ab1a9b4..c1150c5fe35 100644 --- a/cves/2024/2xxx/CVE-2024-2810.json +++ b/cves/2024/2xxx/CVE-2024-2810.json @@ -8,7 +8,7 @@ "assignerShortName": "VulDB", "dateReserved": "2024-03-21T21:34:30.779Z", "datePublished": "2024-03-22T05:31:05.963Z", - "dateUpdated": "2024-06-21T15:37:03.631Z" + "dateUpdated": "2024-07-05T14:26:42.548Z" }, "containers": { "cna": { @@ -135,7 +135,7 @@ "providerMetadata": { "orgId": "96f1cf3c-f80a-4e0f-a063-99a91e3f1325", "shortName": "secretariat-reference", - "dateUpdated": "2024-06-21T15:37:03.631Z" + "dateUpdated": "2024-07-05T14:26:42.548Z" }, "references": [ { @@ -162,6 +162,31 @@ "exploit", "x_cve_prog_secretariat_snapshot" ] + }, + { + "url": "https://vuldb.com/?id.257665/adp-test-6-28", + "name": "VDB-257665 | Tenda AC15 WifiWpsOOB formWifiWpsOOB stack-based overflow", + "tags": [ + "vdb-entry", + "technical-description", + "x_snapshot" + ] + }, + { + "url": "https://vuldb.com/?ctiid.257665/adp-test-6-28", + "name": "VDB-257665 | CTI Indicators (IOB, IOC, IOA)", + "tags": [ + "signature", + "permissions-required", + "x_snapshot" + ] + }, + { + "url": "https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/AC15/V1.0%20V15.03.20_multi/formWifiWpsOOB.md/adp-test-6-28", + "tags": [ + "exploit", + "x_snapshot" + ] } ] } diff --git a/cves/2024/2xxx/CVE-2024-2811.json b/cves/2024/2xxx/CVE-2024-2811.json index bb45f27b05f..92cb47e511b 100644 --- a/cves/2024/2xxx/CVE-2024-2811.json +++ b/cves/2024/2xxx/CVE-2024-2811.json @@ -8,7 +8,7 @@ "assignerShortName": "VulDB", "dateReserved": "2024-03-21T21:34:43.200Z", "datePublished": "2024-03-22T06:00:07.629Z", - "dateUpdated": "2024-06-21T15:37:04.086Z" + "dateUpdated": "2024-07-05T14:26:42.502Z" }, "containers": { "cna": { @@ -131,7 +131,7 @@ "providerMetadata": { "orgId": "96f1cf3c-f80a-4e0f-a063-99a91e3f1325", "shortName": "secretariat-reference", - "dateUpdated": "2024-06-21T15:37:04.086Z" + "dateUpdated": "2024-07-05T14:26:42.502Z" }, "references": [ { @@ -158,6 +158,31 @@ "exploit", "x_cve_prog_secretariat_snapshot" ] + }, + { + "url": "https://vuldb.com/?id.257666/adp-test-6-28", + "name": "VDB-257666 | Tenda AC15 WifiWpsStart formWifiWpsStart stack-based overflow", + "tags": [ + "vdb-entry", + "technical-description", + "x_snapshot" + ] + }, + { + "url": "https://vuldb.com/?ctiid.257666/adp-test-6-28", + "name": "VDB-257666 | CTI Indicators (IOB, IOC, IOA)", + "tags": [ + "signature", + "permissions-required", + "x_snapshot" + ] + }, + { + "url": "https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/AC15/V1.0%20V15.03.20_multi/formWifiWpsStart.md/adp-test-6-28", + "tags": [ + "exploit", + "x_snapshot" + ] } ] } diff --git a/cves/2024/2xxx/CVE-2024-2812.json b/cves/2024/2xxx/CVE-2024-2812.json index 4aad78374c9..232c71b3fdd 100644 --- a/cves/2024/2xxx/CVE-2024-2812.json +++ b/cves/2024/2xxx/CVE-2024-2812.json @@ -8,7 +8,7 @@ "assignerShortName": "VulDB", "dateReserved": "2024-03-21T21:34:51.784Z", "datePublished": "2024-03-22T06:31:04.518Z", - "dateUpdated": "2024-06-21T15:37:04.480Z" + "dateUpdated": "2024-07-05T14:26:42.507Z" }, "containers": { "cna": { @@ -135,7 +135,7 @@ "providerMetadata": { "orgId": "96f1cf3c-f80a-4e0f-a063-99a91e3f1325", "shortName": "secretariat-reference", - "dateUpdated": "2024-06-21T15:37:04.480Z" + "dateUpdated": "2024-07-05T14:26:42.507Z" }, "references": [ { @@ -162,6 +162,31 @@ "exploit", "x_cve_prog_secretariat_snapshot" ] + }, + { + "url": "https://vuldb.com/?id.257667/adp-test-6-28", + "name": "VDB-257667 | Tenda AC15 WriteFacMac formWriteFacMac os command injection", + "tags": [ + "vdb-entry", + "technical-description", + "x_snapshot" + ] + }, + { + "url": "https://vuldb.com/?ctiid.257667/adp-test-6-28", + "name": "VDB-257667 | CTI Indicators (IOB, IOC, TTP, IOA)", + "tags": [ + "signature", + "permissions-required", + "x_snapshot" + ] + }, + { + "url": "https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/AC15/V1.0%20V15.03.20_multi/formWriteFacMac.md/adp-test-6-28", + "tags": [ + "exploit", + "x_snapshot" + ] } ] } diff --git a/cves/2024/2xxx/CVE-2024-2813.json b/cves/2024/2xxx/CVE-2024-2813.json index 0c85786e157..d37638e1846 100644 --- a/cves/2024/2xxx/CVE-2024-2813.json +++ b/cves/2024/2xxx/CVE-2024-2813.json @@ -8,7 +8,7 @@ "assignerShortName": "VulDB", "dateReserved": "2024-03-21T21:35:03.729Z", "datePublished": "2024-03-22T06:31:05.875Z", - "dateUpdated": "2024-06-21T15:37:04.864Z" + "dateUpdated": "2024-07-05T14:26:42.501Z" }, "containers": { "cna": { @@ -131,7 +131,7 @@ "providerMetadata": { "orgId": "96f1cf3c-f80a-4e0f-a063-99a91e3f1325", "shortName": "secretariat-reference", - "dateUpdated": "2024-06-21T15:37:04.864Z" + "dateUpdated": "2024-07-05T14:26:42.501Z" }, "references": [ { @@ -158,6 +158,31 @@ "exploit", "x_cve_prog_secretariat_snapshot" ] + }, + { + "url": "https://vuldb.com/?id.257668/adp-test-6-28", + "name": "VDB-257668 | Tenda AC15 fast_setting_wifi_set form_fast_setting_wifi_set stack-based overflow", + "tags": [ + "vdb-entry", + "technical-description", + "x_snapshot" + ] + }, + { + "url": "https://vuldb.com/?ctiid.257668/adp-test-6-28", + "name": "VDB-257668 | CTI Indicators (IOB, IOC, IOA)", + "tags": [ + "signature", + "permissions-required", + "x_snapshot" + ] + }, + { + "url": "https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/AC15/V1.0%20V15.03.20_multi/form_fast_setting_wifi_set.md/adp-test-6-28", + "tags": [ + "exploit", + "x_snapshot" + ] } ] } diff --git a/cves/2024/2xxx/CVE-2024-2814.json b/cves/2024/2xxx/CVE-2024-2814.json index f6765db2bf6..83bb6d09ff0 100644 --- a/cves/2024/2xxx/CVE-2024-2814.json +++ b/cves/2024/2xxx/CVE-2024-2814.json @@ -8,7 +8,7 @@ "assignerShortName": "VulDB", "dateReserved": "2024-03-21T21:35:08.751Z", "datePublished": "2024-03-22T07:00:07.402Z", - "dateUpdated": "2024-06-21T15:37:05.259Z" + "dateUpdated": "2024-07-05T14:26:42.580Z" }, "containers": { "cna": { @@ -131,7 +131,7 @@ "providerMetadata": { "orgId": "96f1cf3c-f80a-4e0f-a063-99a91e3f1325", "shortName": "secretariat-reference", - "dateUpdated": "2024-06-21T15:37:05.259Z" + "dateUpdated": "2024-07-05T14:26:42.580Z" }, "references": [ { @@ -158,6 +158,31 @@ "exploit", "x_cve_prog_secretariat_snapshot" ] + }, + { + "url": "https://vuldb.com/?id.257669/adp-test-6-28", + "name": "VDB-257669 | Tenda AC15 DhcpListClient fromDhcpListClient stack-based overflow", + "tags": [ + "vdb-entry", + "technical-description", + "x_snapshot" + ] + }, + { + "url": "https://vuldb.com/?ctiid.257669/adp-test-6-28", + "name": "VDB-257669 | CTI Indicators (IOB, IOC, IOA)", + "tags": [ + "signature", + "permissions-required", + "x_snapshot" + ] + }, + { + "url": "https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/AC15/V1.0%20V15.03.20_multi/fromDhcpListClient_page.md/adp-test-6-28", + "tags": [ + "exploit", + "x_snapshot" + ] } ] } diff --git a/cves/2024/2xxx/CVE-2024-2815.json b/cves/2024/2xxx/CVE-2024-2815.json index c82a1b269a2..66153228023 100644 --- a/cves/2024/2xxx/CVE-2024-2815.json +++ b/cves/2024/2xxx/CVE-2024-2815.json @@ -8,7 +8,7 @@ "assignerShortName": "VulDB", "dateReserved": "2024-03-21T21:35:13.502Z", "datePublished": "2024-03-22T07:31:04.644Z", - "dateUpdated": "2024-06-21T15:37:05.670Z" + "dateUpdated": "2024-07-05T14:26:42.531Z" }, "containers": { "cna": { @@ -134,7 +134,7 @@ "providerMetadata": { "orgId": "96f1cf3c-f80a-4e0f-a063-99a91e3f1325", "shortName": "secretariat-reference", - "dateUpdated": "2024-06-21T15:37:05.670Z" + "dateUpdated": "2024-07-05T14:26:42.531Z" }, "references": [ { @@ -161,6 +161,31 @@ "exploit", "x_cve_prog_secretariat_snapshot" ] + }, + { + "url": "https://vuldb.com/?id.257670/adp-test-6-28", + "name": "VDB-257670 | Tenda AC15 Cookie execCommand R7WebsSecurityHandler stack-based overflow", + "tags": [ + "vdb-entry", + "technical-description", + "x_snapshot" + ] + }, + { + "url": "https://vuldb.com/?ctiid.257670/adp-test-6-28", + "name": "VDB-257670 | CTI Indicators (IOB, IOC, IOA)", + "tags": [ + "signature", + "permissions-required", + "x_snapshot" + ] + }, + { + "url": "https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/AC15/V15.03.05.18/R7WebsSecurityHandler.md/adp-test-6-28", + "tags": [ + "exploit", + "x_snapshot" + ] } ] } diff --git a/cves/2024/2xxx/CVE-2024-2816.json b/cves/2024/2xxx/CVE-2024-2816.json index 804e872f1a2..46cda2d10ce 100644 --- a/cves/2024/2xxx/CVE-2024-2816.json +++ b/cves/2024/2xxx/CVE-2024-2816.json @@ -8,7 +8,7 @@ "assignerShortName": "VulDB", "dateReserved": "2024-03-21T21:35:18.285Z", "datePublished": "2024-03-22T07:31:06.083Z", - "dateUpdated": "2024-06-21T15:37:06.111Z" + "dateUpdated": "2024-07-05T14:26:42.578Z" }, "containers": { "cna": { @@ -131,7 +131,7 @@ "providerMetadata": { "orgId": "96f1cf3c-f80a-4e0f-a063-99a91e3f1325", "shortName": "secretariat-reference", - "dateUpdated": "2024-06-21T15:37:06.111Z" + "dateUpdated": "2024-07-05T14:26:42.578Z" }, "references": [ { @@ -158,6 +158,31 @@ "exploit", "x_cve_prog_secretariat_snapshot" ] + }, + { + "url": "https://vuldb.com/?id.257671/adp-test-6-28", + "name": "VDB-257671 | Tenda AC15 SysToolReboot fromSysToolReboot cross-site request forgery", + "tags": [ + "vdb-entry", + "technical-description", + "x_snapshot" + ] + }, + { + "url": "https://vuldb.com/?ctiid.257671/adp-test-6-28", + "name": "VDB-257671 | CTI Indicators (IOB, IOC, IOA)", + "tags": [ + "signature", + "permissions-required", + "x_snapshot" + ] + }, + { + "url": "https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/AC15/V15.03.05.18/fromSysToolReboot.md/adp-test-6-28", + "tags": [ + "exploit", + "x_snapshot" + ] } ] } diff --git a/cves/2024/2xxx/CVE-2024-2817.json b/cves/2024/2xxx/CVE-2024-2817.json index 4d255e8bd0e..ddc77d2abd2 100644 --- a/cves/2024/2xxx/CVE-2024-2817.json +++ b/cves/2024/2xxx/CVE-2024-2817.json @@ -8,7 +8,7 @@ "assignerShortName": "VulDB", "dateReserved": "2024-03-21T21:35:23.891Z", "datePublished": "2024-03-22T08:00:06.270Z", - "dateUpdated": "2024-06-21T15:37:06.543Z" + "dateUpdated": "2024-07-05T14:26:42.535Z" }, "containers": { "cna": { @@ -131,7 +131,7 @@ "providerMetadata": { "orgId": "96f1cf3c-f80a-4e0f-a063-99a91e3f1325", "shortName": "secretariat-reference", - "dateUpdated": "2024-06-21T15:37:06.543Z" + "dateUpdated": "2024-07-05T14:26:42.535Z" }, "references": [ { @@ -158,6 +158,31 @@ "exploit", "x_cve_prog_secretariat_snapshot" ] + }, + { + "url": "https://vuldb.com/?id.257672/adp-test-6-28", + "name": "VDB-257672 | Tenda AC15 SysToolRestoreSet fromSysToolRestoreSet cross-site request forgery", + "tags": [ + "vdb-entry", + "technical-description", + "x_snapshot" + ] + }, + { + "url": "https://vuldb.com/?ctiid.257672/adp-test-6-28", + "name": "VDB-257672 | CTI Indicators (IOB, IOC, IOA)", + "tags": [ + "signature", + "permissions-required", + "x_snapshot" + ] + }, + { + "url": "https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/AC15/V15.03.05.18/fromSysToolRestoreSet.md/adp-test-6-28", + "tags": [ + "exploit", + "x_snapshot" + ] } ] } diff --git a/cves/2024/2xxx/CVE-2024-2818.json b/cves/2024/2xxx/CVE-2024-2818.json index 31bc7520564..42c731c1ddc 100644 --- a/cves/2024/2xxx/CVE-2024-2818.json +++ b/cves/2024/2xxx/CVE-2024-2818.json @@ -8,7 +8,7 @@ "assignerShortName": "GitLab", "dateReserved": "2024-03-22T06:02:16.189Z", "datePublished": "2024-03-28T07:17:48.930Z", - "dateUpdated": "2024-06-21T15:37:07.037Z" + "dateUpdated": "2024-07-05T14:26:42.530Z" }, "containers": { "cna": { @@ -149,7 +149,7 @@ "providerMetadata": { "orgId": "96f1cf3c-f80a-4e0f-a063-99a91e3f1325", "shortName": "secretariat-reference", - "dateUpdated": "2024-06-21T15:37:07.037Z" + "dateUpdated": "2024-07-05T14:26:42.530Z" }, "references": [ { @@ -160,6 +160,15 @@ "permissions-required", "x_cve_prog_secretariat_snapshot" ] + }, + { + "url": "https://gitlab.com/gitlab-org/gitlab/-/issues/434803/adp-test-6-28", + "name": "GitLab Issue #434803", + "tags": [ + "issue-tracking", + "permissions-required", + "x_snapshot" + ] } ] } diff --git a/cves/2024/2xxx/CVE-2024-2820.json b/cves/2024/2xxx/CVE-2024-2820.json index 7984e2787e5..55b9d807e2d 100644 --- a/cves/2024/2xxx/CVE-2024-2820.json +++ b/cves/2024/2xxx/CVE-2024-2820.json @@ -8,7 +8,7 @@ "assignerShortName": "VulDB", "dateReserved": "2024-03-22T10:37:17.457Z", "datePublished": "2024-03-22T16:00:05.198Z", - "dateUpdated": "2024-06-21T15:37:07.438Z" + "dateUpdated": "2024-07-05T14:26:42.552Z" }, "containers": { "cna": { @@ -131,7 +131,7 @@ "providerMetadata": { "orgId": "96f1cf3c-f80a-4e0f-a063-99a91e3f1325", "shortName": "secretariat-reference", - "dateUpdated": "2024-06-21T15:37:07.438Z" + "dateUpdated": "2024-07-05T14:26:42.552Z" }, "references": [ { @@ -158,6 +158,31 @@ "exploit", "x_cve_prog_secretariat_snapshot" ] + }, + { + "url": "https://vuldb.com/?id.257707/adp-test-6-28", + "name": "VDB-257707 | DedeCMS baidunews.php cross-site request forgery", + "tags": [ + "vdb-entry", + "technical-description", + "x_snapshot" + ] + }, + { + "url": "https://vuldb.com/?ctiid.257707/adp-test-6-28", + "name": "VDB-257707 | CTI Indicators (IOB, IOC, IOA)", + "tags": [ + "signature", + "permissions-required", + "x_snapshot" + ] + }, + { + "url": "https://github.com/E1CHO/demo/blob/main/26.pdf/adp-test-6-28", + "tags": [ + "exploit", + "x_snapshot" + ] } ] } diff --git a/cves/2024/2xxx/CVE-2024-2821.json b/cves/2024/2xxx/CVE-2024-2821.json index d0074be9789..36bb5d4254b 100644 --- a/cves/2024/2xxx/CVE-2024-2821.json +++ b/cves/2024/2xxx/CVE-2024-2821.json @@ -8,7 +8,7 @@ "assignerShortName": "VulDB", "dateReserved": "2024-03-22T10:37:21.560Z", "datePublished": "2024-03-22T16:00:06.943Z", - "dateUpdated": "2024-06-21T15:37:07.819Z" + "dateUpdated": "2024-07-05T14:26:42.591Z" }, "containers": { "cna": { @@ -131,7 +131,7 @@ "providerMetadata": { "orgId": "96f1cf3c-f80a-4e0f-a063-99a91e3f1325", "shortName": "secretariat-reference", - "dateUpdated": "2024-06-21T15:37:07.819Z" + "dateUpdated": "2024-07-05T14:26:42.591Z" }, "references": [ { @@ -158,6 +158,31 @@ "exploit", "x_cve_prog_secretariat_snapshot" ] + }, + { + "url": "https://vuldb.com/?id.257708/adp-test-6-28", + "name": "VDB-257708 | DedeCMS friendlink_edit.php cross-site request forgery", + "tags": [ + "vdb-entry", + "technical-description", + "x_snapshot" + ] + }, + { + "url": "https://vuldb.com/?ctiid.257708/adp-test-6-28", + "name": "VDB-257708 | CTI Indicators (IOB, IOC, IOA)", + "tags": [ + "signature", + "permissions-required", + "x_snapshot" + ] + }, + { + "url": "https://github.com/E1CHO/demo/blob/main/27.pdf/adp-test-6-28", + "tags": [ + "exploit", + "x_snapshot" + ] } ] } diff --git a/cves/2024/2xxx/CVE-2024-2822.json b/cves/2024/2xxx/CVE-2024-2822.json index 8ce0ed6ff5d..cc3cddf84cd 100644 --- a/cves/2024/2xxx/CVE-2024-2822.json +++ b/cves/2024/2xxx/CVE-2024-2822.json @@ -8,7 +8,7 @@ "assignerShortName": "VulDB", "dateReserved": "2024-03-22T10:37:25.055Z", "datePublished": "2024-03-22T17:00:08.031Z", - "dateUpdated": "2024-06-21T15:37:08.302Z" + "dateUpdated": "2024-07-05T14:26:42.549Z" }, "containers": { "cna": { @@ -131,7 +131,7 @@ "providerMetadata": { "orgId": "96f1cf3c-f80a-4e0f-a063-99a91e3f1325", "shortName": "secretariat-reference", - "dateUpdated": "2024-06-21T15:37:08.302Z" + "dateUpdated": "2024-07-05T14:26:42.549Z" }, "references": [ { @@ -158,6 +158,31 @@ "exploit", "x_cve_prog_secretariat_snapshot" ] + }, + { + "url": "https://vuldb.com/?id.257709/adp-test-6-28", + "name": "VDB-257709 | DedeCMS vote_edit.php cross-site request forgery", + "tags": [ + "vdb-entry", + "technical-description", + "x_snapshot" + ] + }, + { + "url": "https://vuldb.com/?ctiid.257709/adp-test-6-28", + "name": "VDB-257709 | CTI Indicators (IOB, IOC, IOA)", + "tags": [ + "signature", + "permissions-required", + "x_snapshot" + ] + }, + { + "url": "https://github.com/E1CHO/demo/blob/main/29.pdf/adp-test-6-28", + "tags": [ + "exploit", + "x_snapshot" + ] } ] } diff --git a/cves/2024/2xxx/CVE-2024-2823.json b/cves/2024/2xxx/CVE-2024-2823.json index 60637daa47a..0e9128e4144 100644 --- a/cves/2024/2xxx/CVE-2024-2823.json +++ b/cves/2024/2xxx/CVE-2024-2823.json @@ -8,7 +8,7 @@ "assignerShortName": "VulDB", "dateReserved": "2024-03-22T10:37:30.815Z", "datePublished": "2024-03-22T17:00:09.635Z", - "dateUpdated": "2024-06-21T15:37:08.694Z" + "dateUpdated": "2024-07-05T14:26:42.579Z" }, "containers": { "cna": { @@ -130,7 +130,7 @@ "providerMetadata": { "orgId": "96f1cf3c-f80a-4e0f-a063-99a91e3f1325", "shortName": "secretariat-reference", - "dateUpdated": "2024-06-21T15:37:08.694Z" + "dateUpdated": "2024-07-05T14:26:42.579Z" }, "references": [ { @@ -156,6 +156,30 @@ "exploit", "x_cve_prog_secretariat_snapshot" ] + }, + { + "url": "https://vuldb.com/?id.257710/adp-test-6-28", + "name": "VDB-257710 | DedeCMS mda_main.php cross-site request forgery", + "tags": [ + "vdb-entry", + "x_snapshot" + ] + }, + { + "url": "https://vuldb.com/?ctiid.257710/adp-test-6-28", + "name": "VDB-257710 | CTI Indicators (IOB, IOC, IOA)", + "tags": [ + "signature", + "permissions-required", + "x_snapshot" + ] + }, + { + "url": "https://github.com/lcg-22266/cms/blob/main/1.md/adp-test-6-28", + "tags": [ + "exploit", + "x_snapshot" + ] } ] } diff --git a/cves/2024/2xxx/CVE-2024-2824.json b/cves/2024/2xxx/CVE-2024-2824.json index 694d932cbe3..b9281d55f21 100644 --- a/cves/2024/2xxx/CVE-2024-2824.json +++ b/cves/2024/2xxx/CVE-2024-2824.json @@ -8,7 +8,7 @@ "assignerShortName": "VulDB", "dateReserved": "2024-03-22T10:39:58.777Z", "datePublished": "2024-03-22T18:00:08.695Z", - "dateUpdated": "2024-06-21T15:37:09.161Z" + "dateUpdated": "2024-07-05T14:26:42.551Z" }, "containers": { "cna": { @@ -137,7 +137,7 @@ "providerMetadata": { "orgId": "96f1cf3c-f80a-4e0f-a063-99a91e3f1325", "shortName": "secretariat-reference", - "dateUpdated": "2024-06-21T15:37:09.161Z" + "dateUpdated": "2024-07-05T14:26:42.551Z" }, "references": [ { @@ -171,6 +171,38 @@ "exploit", "x_cve_prog_secretariat_snapshot" ] + }, + { + "url": "https://vuldb.com/?id.257711/adp-test-6-28", + "name": "VDB-257711 | Matthias-Wandel jhead exif.c PrintFormatNumber heap-based overflow", + "tags": [ + "vdb-entry", + "technical-description", + "x_snapshot" + ] + }, + { + "url": "https://vuldb.com/?ctiid.257711/adp-test-6-28", + "name": "VDB-257711 | CTI Indicators (IOB, IOC, IOA)", + "tags": [ + "signature", + "permissions-required", + "x_snapshot" + ] + }, + { + "url": "https://github.com/Matthias-Wandel/jhead/issues/84/adp-test-6-28", + "tags": [ + "issue-tracking", + "x_snapshot" + ] + }, + { + "url": "https://github.com/Matthias-Wandel/jhead/files/14613084/poc.zip/adp-test-6-28", + "tags": [ + "exploit", + "x_snapshot" + ] } ] } diff --git a/cves/2024/2xxx/CVE-2024-2825.json b/cves/2024/2xxx/CVE-2024-2825.json index daaf3c0db0a..a6ab9b6c5ce 100644 --- a/cves/2024/2xxx/CVE-2024-2825.json +++ b/cves/2024/2xxx/CVE-2024-2825.json @@ -8,7 +8,7 @@ "assignerShortName": "VulDB", "dateReserved": "2024-03-22T10:49:55.637Z", "datePublished": "2024-03-22T18:31:08.472Z", - "dateUpdated": "2024-06-21T15:37:09.593Z" + "dateUpdated": "2024-07-05T14:26:42.559Z" }, "containers": { "cna": { @@ -132,7 +132,7 @@ "providerMetadata": { "orgId": "96f1cf3c-f80a-4e0f-a063-99a91e3f1325", "shortName": "secretariat-reference", - "dateUpdated": "2024-06-21T15:37:09.593Z" + "dateUpdated": "2024-07-05T14:26:42.559Z" }, "references": [ { @@ -160,6 +160,32 @@ "issue-tracking", "x_cve_prog_secretariat_snapshot" ] + }, + { + "url": "https://vuldb.com/?id.257715/adp-test-6-28", + "name": "VDB-257715 | lakernote EasyAdmin saveReportFile path traversal", + "tags": [ + "vdb-entry", + "technical-description", + "x_snapshot" + ] + }, + { + "url": "https://vuldb.com/?ctiid.257715/adp-test-6-28", + "name": "VDB-257715 | CTI Indicators (IOB, IOC, TTP, IOA)", + "tags": [ + "signature", + "permissions-required", + "x_snapshot" + ] + }, + { + "url": "https://gitee.com/lakernote/easy-admin/issues/I98ZTA/adp-test-6-28", + "tags": [ + "exploit", + "issue-tracking", + "x_snapshot" + ] } ] } diff --git a/cves/2024/2xxx/CVE-2024-2826.json b/cves/2024/2xxx/CVE-2024-2826.json index 222eef7e54d..de1a9c0a86d 100644 --- a/cves/2024/2xxx/CVE-2024-2826.json +++ b/cves/2024/2xxx/CVE-2024-2826.json @@ -8,7 +8,7 @@ "assignerShortName": "VulDB", "dateReserved": "2024-03-22T10:49:57.907Z", "datePublished": "2024-03-22T19:00:09.857Z", - "dateUpdated": "2024-06-21T15:37:09.986Z" + "dateUpdated": "2024-07-05T14:26:42.508Z" }, "containers": { "cna": { @@ -131,7 +131,7 @@ "providerMetadata": { "orgId": "96f1cf3c-f80a-4e0f-a063-99a91e3f1325", "shortName": "secretariat-reference", - "dateUpdated": "2024-06-21T15:37:09.986Z" + "dateUpdated": "2024-07-05T14:26:42.508Z" }, "references": [ { @@ -158,6 +158,31 @@ "issue-tracking", "x_cve_prog_secretariat_snapshot" ] + }, + { + "url": "https://vuldb.com/?id.257716/adp-test-6-28", + "name": "VDB-257716 | lakernote EasyAdmin saveReportFile xml external entity reference", + "tags": [ + "vdb-entry", + "x_snapshot" + ] + }, + { + "url": "https://vuldb.com/?ctiid.257716/adp-test-6-28", + "name": "VDB-257716 | CTI Indicators (IOB, IOC, IOA)", + "tags": [ + "signature", + "permissions-required", + "x_snapshot" + ] + }, + { + "url": "https://gitee.com/lakernote/easy-admin/issues/I98ZTA/adp-test-6-28", + "tags": [ + "exploit", + "issue-tracking", + "x_snapshot" + ] } ] } diff --git a/cves/2024/2xxx/CVE-2024-2827.json b/cves/2024/2xxx/CVE-2024-2827.json index e3a170c8463..ec9c07ed768 100644 --- a/cves/2024/2xxx/CVE-2024-2827.json +++ b/cves/2024/2xxx/CVE-2024-2827.json @@ -8,7 +8,7 @@ "assignerShortName": "VulDB", "dateReserved": "2024-03-22T10:50:01.307Z", "datePublished": "2024-03-22T19:00:15.250Z", - "dateUpdated": "2024-06-21T15:37:10.387Z" + "dateUpdated": "2024-07-05T14:31:56.615Z" }, "containers": { "cna": { @@ -131,7 +131,7 @@ "providerMetadata": { "orgId": "96f1cf3c-f80a-4e0f-a063-99a91e3f1325", "shortName": "secretariat-reference", - "dateUpdated": "2024-06-21T15:37:10.387Z" + "dateUpdated": "2024-07-05T14:31:56.615Z" }, "references": [ { @@ -158,6 +158,31 @@ "issue-tracking", "x_cve_prog_secretariat_snapshot" ] + }, + { + "url": "https://vuldb.com/?id.257717/adp-test-6-28", + "name": "VDB-257717 | lakernote EasyAdmin saveReportFile server-side request forgery", + "tags": [ + "vdb-entry", + "x_snapshot" + ] + }, + { + "url": "https://vuldb.com/?ctiid.257717/adp-test-6-28", + "name": "VDB-257717 | CTI Indicators (IOB, IOC, IOA)", + "tags": [ + "signature", + "permissions-required", + "x_snapshot" + ] + }, + { + "url": "https://gitee.com/lakernote/easy-admin/issues/I98ZTA/adp-test-6-28", + "tags": [ + "exploit", + "issue-tracking", + "x_snapshot" + ] } ] } diff --git a/cves/2024/2xxx/CVE-2024-2828.json b/cves/2024/2xxx/CVE-2024-2828.json index d4fa3e29eaf..39e0636f98d 100644 --- a/cves/2024/2xxx/CVE-2024-2828.json +++ b/cves/2024/2xxx/CVE-2024-2828.json @@ -8,7 +8,7 @@ "assignerShortName": "VulDB", "dateReserved": "2024-03-22T10:50:04.323Z", "datePublished": "2024-03-22T19:31:11.240Z", - "dateUpdated": "2024-06-21T15:37:10.764Z" + "dateUpdated": "2024-07-05T14:31:56.968Z" }, "containers": { "cna": { @@ -138,7 +138,7 @@ "providerMetadata": { "orgId": "96f1cf3c-f80a-4e0f-a063-99a91e3f1325", "shortName": "secretariat-reference", - "dateUpdated": "2024-06-21T15:37:10.764Z" + "dateUpdated": "2024-07-05T14:31:56.968Z" }, "references": [ { @@ -173,6 +173,39 @@ "patch", "x_cve_prog_secretariat_snapshot" ] + }, + { + "url": "https://vuldb.com/?id.257718/adp-test-6-28", + "name": "VDB-257718 | lakernote EasyAdmin IndexController.java thumbnail server-side request forgery", + "tags": [ + "vdb-entry", + "technical-description", + "x_snapshot" + ] + }, + { + "url": "https://vuldb.com/?ctiid.257718/adp-test-6-28", + "name": "VDB-257718 | CTI Indicators (IOB, IOC, IOA)", + "tags": [ + "signature", + "permissions-required", + "x_snapshot" + ] + }, + { + "url": "https://gitee.com/lakernote/easy-admin/issues/I98YSR/adp-test-6-28", + "tags": [ + "exploit", + "issue-tracking", + "x_snapshot" + ] + }, + { + "url": "https://gitee.com/lakernote/easy-admin/commit/23165d8cb569048c531150f194fea39f8800b8d5/adp-test-6-28", + "tags": [ + "patch", + "x_snapshot" + ] } ] } diff --git a/cves/2024/2xxx/CVE-2024-2829.json b/cves/2024/2xxx/CVE-2024-2829.json index 2b97d93aea1..62b115f4e70 100644 --- a/cves/2024/2xxx/CVE-2024-2829.json +++ b/cves/2024/2xxx/CVE-2024-2829.json @@ -8,7 +8,7 @@ "assignerShortName": "GitLab", "dateReserved": "2024-03-22T14:30:44.843Z", "datePublished": "2024-04-25T11:02:06.060Z", - "dateUpdated": "2024-06-21T15:37:11.222Z" + "dateUpdated": "2024-07-05T14:31:56.618Z" }, "containers": { "cna": { @@ -174,7 +174,7 @@ "providerMetadata": { "orgId": "96f1cf3c-f80a-4e0f-a063-99a91e3f1325", "shortName": "secretariat-reference", - "dateUpdated": "2024-06-21T15:37:11.222Z" + "dateUpdated": "2024-07-05T14:31:56.618Z" }, "references": [ { @@ -194,6 +194,24 @@ "exploit", "x_cve_prog_secretariat_snapshot" ] + }, + { + "url": "https://gitlab.com/gitlab-org/gitlab/-/issues/451456/adp-test-6-28", + "name": "GitLab Issue #451456", + "tags": [ + "issue-tracking", + "permissions-required", + "x_snapshot" + ] + }, + { + "url": "https://hackerone.com/reports/2416728/adp-test-6-28", + "name": "HackerOne Bug Bounty Report #2416728", + "tags": [ + "technical-description", + "exploit", + "x_snapshot" + ] } ] } diff --git a/cves/2024/2xxx/CVE-2024-2830.json b/cves/2024/2xxx/CVE-2024-2830.json index eb3d5fa33b1..1224d870324 100644 --- a/cves/2024/2xxx/CVE-2024-2830.json +++ b/cves/2024/2xxx/CVE-2024-2830.json @@ -8,7 +8,7 @@ "assignerShortName": "Wordfence", "dateReserved": "2024-03-22T14:51:14.515Z", "datePublished": "2024-04-04T02:32:39.462Z", - "dateUpdated": "2024-06-21T15:37:11.628Z" + "dateUpdated": "2024-07-05T14:31:56.617Z" }, "containers": { "cna": { @@ -123,7 +123,7 @@ "providerMetadata": { "orgId": "96f1cf3c-f80a-4e0f-a063-99a91e3f1325", "shortName": "secretariat-reference", - "dateUpdated": "2024-06-21T15:37:11.628Z" + "dateUpdated": "2024-07-05T14:31:56.617Z" }, "references": [ { @@ -149,6 +149,30 @@ "tags": [ "x_cve_prog_secretariat_snapshot" ] + }, + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/0f537479-d5ec-46bb-a04e-2c33a2abc759?source=cve/adp-test-6-28", + "tags": [ + "x_snapshot" + ] + }, + { + "url": "https://plugins.trac.wordpress.org/browser/simple-tags/trunk/inc/class.client.php#L346/adp-test-6-28", + "tags": [ + "x_snapshot" + ] + }, + { + "url": "https://plugins.trac.wordpress.org/browser/simple-tags/trunk/inc/class.client.php#L348/adp-test-6-28", + "tags": [ + "x_snapshot" + ] + }, + { + "url": "https://plugins.trac.wordpress.org/changeset/3060746/simple-tags/trunk/inc/class.client.tagcloud.php/adp-test-6-28", + "tags": [ + "x_snapshot" + ] } ] } diff --git a/cves/2024/2xxx/CVE-2024-2831.json b/cves/2024/2xxx/CVE-2024-2831.json index 8997116acbe..c463950826a 100644 --- a/cves/2024/2xxx/CVE-2024-2831.json +++ b/cves/2024/2xxx/CVE-2024-2831.json @@ -8,7 +8,7 @@ "assignerShortName": "Wordfence", "dateReserved": "2024-03-22T16:09:43.371Z", "datePublished": "2024-05-02T16:51:43.560Z", - "dateUpdated": "2024-06-21T15:37:12.027Z" + "dateUpdated": "2024-07-05T14:31:56.621Z" }, "containers": { "cna": { @@ -117,7 +117,7 @@ "providerMetadata": { "orgId": "96f1cf3c-f80a-4e0f-a063-99a91e3f1325", "shortName": "secretariat-reference", - "dateUpdated": "2024-06-21T15:37:12.027Z" + "dateUpdated": "2024-07-05T14:31:56.621Z" }, "references": [ { @@ -131,6 +131,18 @@ "tags": [ "x_cve_prog_secretariat_snapshot" ] + }, + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/0886fa16-4292-4223-af01-9aa1f36490f7?source=cve/adp-test-6-28", + "tags": [ + "x_snapshot" + ] + }, + { + "url": "https://wordpress.org/plugins/calendar//adp-test-6-28", + "tags": [ + "x_snapshot" + ] } ] } diff --git a/cves/2024/2xxx/CVE-2024-2832.json b/cves/2024/2xxx/CVE-2024-2832.json index 6573582a1a8..53733fcf270 100644 --- a/cves/2024/2xxx/CVE-2024-2832.json +++ b/cves/2024/2xxx/CVE-2024-2832.json @@ -8,7 +8,7 @@ "assignerShortName": "VulDB", "dateReserved": "2024-03-22T16:17:29.412Z", "datePublished": "2024-03-23T06:00:05.613Z", - "dateUpdated": "2024-06-21T15:37:12.477Z" + "dateUpdated": "2024-07-05T14:31:57.927Z" }, "containers": { "cna": { @@ -131,7 +131,7 @@ "providerMetadata": { "orgId": "96f1cf3c-f80a-4e0f-a063-99a91e3f1325", "shortName": "secretariat-reference", - "dateUpdated": "2024-06-21T15:37:12.477Z" + "dateUpdated": "2024-07-05T14:31:57.927Z" }, "references": [ { @@ -158,6 +158,31 @@ "exploit", "x_cve_prog_secretariat_snapshot" ] + }, + { + "url": "https://vuldb.com/?id.257752/adp-test-6-28", + "name": "VDB-257752 | Campcodes Online Shopping System offersmail.php cross site scripting", + "tags": [ + "vdb-entry", + "technical-description", + "x_snapshot" + ] + }, + { + "url": "https://vuldb.com/?ctiid.257752/adp-test-6-28", + "name": "VDB-257752 | CTI Indicators (IOB, IOC, TTP, IOA)", + "tags": [ + "signature", + "permissions-required", + "x_snapshot" + ] + }, + { + "url": "https://github.com/comeony/vuln_report/blob/main/Online%20Shopping%20System%20-%20vuln%201.pdf/adp-test-6-28", + "tags": [ + "exploit", + "x_snapshot" + ] } ] } diff --git a/cves/2024/2xxx/CVE-2024-2833.json b/cves/2024/2xxx/CVE-2024-2833.json index d8f1bb39795..4683fbf6629 100644 --- a/cves/2024/2xxx/CVE-2024-2833.json +++ b/cves/2024/2xxx/CVE-2024-2833.json @@ -8,7 +8,7 @@ "assignerShortName": "Wordfence", "dateReserved": "2024-03-22T17:20:29.215Z", "datePublished": "2024-04-18T09:33:17.890Z", - "dateUpdated": "2024-06-21T15:37:12.862Z" + "dateUpdated": "2024-07-05T14:31:58.000Z" }, "containers": { "cna": { @@ -86,7 +86,7 @@ "providerMetadata": { "orgId": "96f1cf3c-f80a-4e0f-a063-99a91e3f1325", "shortName": "secretariat-reference", - "dateUpdated": "2024-06-21T15:37:12.862Z" + "dateUpdated": "2024-07-05T14:31:58.000Z" }, "references": [ { @@ -100,6 +100,18 @@ "tags": [ "x_cve_prog_secretariat_snapshot" ] + }, + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/f6710f53-34fe-4549-9e1a-7826be74c912?source=cve/adp-test-6-28", + "tags": [ + "x_snapshot" + ] + }, + { + "url": "https://plugins.trac.wordpress.org/changeset/3064421/job-postings/trunk/include/shortcodes/class-job-search.php/adp-test-6-28", + "tags": [ + "x_snapshot" + ] } ] } diff --git a/cves/2024/2xxx/CVE-2024-2834.json b/cves/2024/2xxx/CVE-2024-2834.json index d360d3c6190..a0772459686 100644 --- a/cves/2024/2xxx/CVE-2024-2834.json +++ b/cves/2024/2xxx/CVE-2024-2834.json @@ -8,7 +8,7 @@ "assignerShortName": "OpenText", "dateReserved": "2024-03-22T17:31:18.131Z", "datePublished": "2024-04-08T12:22:49.221Z", - "dateUpdated": "2024-06-21T15:37:13.250Z" + "dateUpdated": "2024-07-05T14:31:56.567Z" }, "containers": { "cna": { @@ -139,7 +139,7 @@ "providerMetadata": { "orgId": "96f1cf3c-f80a-4e0f-a063-99a91e3f1325", "shortName": "secretariat-reference", - "dateUpdated": "2024-06-21T15:37:13.250Z" + "dateUpdated": "2024-07-05T14:31:56.567Z" }, "references": [ { @@ -148,6 +148,13 @@ "x_cve_prog_secretariat_snapshot" ], "url": "https://portal.microfocus.com/s/article/KM000028275/DEMO_2024_06_19" + }, + { + "tags": [ + "vendor-advisory", + "x_snapshot" + ], + "url": "https://portal.microfocus.com/s/article/KM000028275/adp-test-6-28" } ] } diff --git a/cves/2024/2xxx/CVE-2024-2835.json b/cves/2024/2xxx/CVE-2024-2835.json index 686fe70e2ba..b3955335192 100644 --- a/cves/2024/2xxx/CVE-2024-2835.json +++ b/cves/2024/2xxx/CVE-2024-2835.json @@ -8,7 +8,7 @@ "assignerShortName": "OpenText", "dateReserved": "2024-03-22T17:31:30.222Z", "datePublished": "2024-05-20T13:10:08.716Z", - "dateUpdated": "2024-06-21T15:37:13.635Z" + "dateUpdated": "2024-07-05T14:31:58.023Z" }, "containers": { "cna": { @@ -165,7 +165,7 @@ "providerMetadata": { "orgId": "96f1cf3c-f80a-4e0f-a063-99a91e3f1325", "shortName": "secretariat-reference", - "dateUpdated": "2024-06-21T15:37:13.635Z" + "dateUpdated": "2024-07-05T14:31:58.023Z" }, "references": [ { @@ -174,6 +174,13 @@ "x_cve_prog_secretariat_snapshot" ], "url": "https://portal.microfocus.com/s/article/KM000029773/DEMO_2024_06_19" + }, + { + "tags": [ + "vendor-advisory", + "x_snapshot" + ], + "url": "https://portal.microfocus.com/s/article/KM000029773/adp-test-6-28" } ] } diff --git a/cves/2024/2xxx/CVE-2024-2836.json b/cves/2024/2xxx/CVE-2024-2836.json index 95eee8ff0ae..9b07e52d549 100644 --- a/cves/2024/2xxx/CVE-2024-2836.json +++ b/cves/2024/2xxx/CVE-2024-2836.json @@ -1,6 +1,6 @@ { "dataType": "CVE_RECORD", - "dataVersion": "5.0", + "dataVersion": "5.1", "cveMetadata": { "cveId": "CVE-2024-2836", "assignerOrgId": "1bfdd5d7-9bf6-4a53-96ea-42e2716d7a81", @@ -8,7 +8,7 @@ "assignerShortName": "WPScan", "dateReserved": "2024-03-22T17:44:04.213Z", "datePublished": "2024-04-15T05:00:05.687Z", - "dateUpdated": "2024-06-18T15:28:31.078Z" + "dateUpdated": "2024-07-05T14:31:57.645Z" }, "containers": { "cna": { @@ -78,6 +78,26 @@ "x_generator": { "engine": "WPScan CVE Generator" } - } + }, + "adp": [ + { + "providerMetadata": { + "orgId": "96f1cf3c-f80a-4e0f-a063-99a91e3f1325", + "shortName": "secretariat-reference", + "dateUpdated": "2024-07-05T14:31:57.645Z" + }, + "references": [ + { + "url": "https://wpscan.com/vulnerability/36f95b19-af74-4c56-9848-8ff270af4723//adp-test-6-28", + "tags": [ + "exploit", + "vdb-entry", + "technical-description", + "x_snapshot" + ] + } + ] + } + ] } } \ No newline at end of file diff --git a/cves/2024/2xxx/CVE-2024-2837.json b/cves/2024/2xxx/CVE-2024-2837.json index 117305963e0..5b2e65ff4c0 100644 --- a/cves/2024/2xxx/CVE-2024-2837.json +++ b/cves/2024/2xxx/CVE-2024-2837.json @@ -8,7 +8,7 @@ "assignerShortName": "WPScan", "dateReserved": "2024-03-22T18:28:17.568Z", "datePublished": "2024-04-26T05:00:03.453Z", - "dateUpdated": "2024-06-21T15:37:14.355Z" + "dateUpdated": "2024-07-05T14:31:57.734Z" }, "containers": { "cna": { @@ -132,7 +132,7 @@ "providerMetadata": { "orgId": "96f1cf3c-f80a-4e0f-a063-99a91e3f1325", "shortName": "secretariat-reference", - "dateUpdated": "2024-06-21T15:37:14.355Z" + "dateUpdated": "2024-07-05T14:31:57.734Z" }, "references": [ { @@ -143,6 +143,15 @@ "technical-description", "x_cve_prog_secretariat_snapshot" ] + }, + { + "url": "https://wpscan.com/vulnerability/91058c48-f262-4fcc-9390-472d59d61115//adp-test-6-28", + "tags": [ + "exploit", + "vdb-entry", + "technical-description", + "x_snapshot" + ] } ] } diff --git a/cves/2024/2xxx/CVE-2024-2838.json b/cves/2024/2xxx/CVE-2024-2838.json index 712f9a7c730..28411a3f230 100644 --- a/cves/2024/2xxx/CVE-2024-2838.json +++ b/cves/2024/2xxx/CVE-2024-2838.json @@ -8,7 +8,7 @@ "assignerShortName": "Wordfence", "dateReserved": "2024-03-22T19:11:27.299Z", "datePublished": "2024-04-27T03:33:35.892Z", - "dateUpdated": "2024-06-21T15:37:14.787Z" + "dateUpdated": "2024-07-05T14:31:58.033Z" }, "containers": { "cna": { @@ -86,7 +86,7 @@ "providerMetadata": { "orgId": "96f1cf3c-f80a-4e0f-a063-99a91e3f1325", "shortName": "secretariat-reference", - "dateUpdated": "2024-06-21T15:37:14.787Z" + "dateUpdated": "2024-07-05T14:31:58.033Z" }, "references": [ { @@ -100,6 +100,18 @@ "tags": [ "x_cve_prog_secretariat_snapshot" ] + }, + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/d3bea017-9fc3-4e14-97c4-5bb525650cde?source=cve/adp-test-6-28", + "tags": [ + "x_snapshot" + ] + }, + { + "url": "https://plugins.trac.wordpress.org/changeset/3069973/wpc-composite-products/trunk/includes/class-wooco.php/adp-test-6-28", + "tags": [ + "x_snapshot" + ] } ] } diff --git a/cves/2024/2xxx/CVE-2024-2839.json b/cves/2024/2xxx/CVE-2024-2839.json index 29fef8b9d6a..e43bb9e0183 100644 --- a/cves/2024/2xxx/CVE-2024-2839.json +++ b/cves/2024/2xxx/CVE-2024-2839.json @@ -8,7 +8,7 @@ "assignerShortName": "Wordfence", "dateReserved": "2024-03-22T19:16:46.881Z", "datePublished": "2024-04-02T06:47:43.668Z", - "dateUpdated": "2024-06-21T15:37:15.231Z" + "dateUpdated": "2024-07-05T14:31:57.689Z" }, "containers": { "cna": { @@ -122,7 +122,7 @@ "providerMetadata": { "orgId": "96f1cf3c-f80a-4e0f-a063-99a91e3f1325", "shortName": "secretariat-reference", - "dateUpdated": "2024-06-21T15:37:15.231Z" + "dateUpdated": "2024-07-05T14:31:57.689Z" }, "references": [ { @@ -136,6 +136,18 @@ "tags": [ "x_cve_prog_secretariat_snapshot" ] + }, + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/c9466e5f-d8eb-4de4-a1d2-e5ef15bf1e4e?source=cve/adp-test-6-28", + "tags": [ + "x_snapshot" + ] + }, + { + "url": "https://plugins.trac.wordpress.org/changeset/3061940/colibri-page-builder/trunk/extend-builder/shortcodes/blog/post-item.php/adp-test-6-28", + "tags": [ + "x_snapshot" + ] } ] } diff --git a/cves/2024/2xxx/CVE-2024-2840.json b/cves/2024/2xxx/CVE-2024-2840.json index edaa5969d97..7e9607788b0 100644 --- a/cves/2024/2xxx/CVE-2024-2840.json +++ b/cves/2024/2xxx/CVE-2024-2840.json @@ -8,7 +8,7 @@ "assignerShortName": "Wordfence", "dateReserved": "2024-03-22T19:24:49.722Z", "datePublished": "2024-05-02T16:51:48.753Z", - "dateUpdated": "2024-06-21T15:37:15.636Z" + "dateUpdated": "2024-07-05T14:31:58.027Z" }, "containers": { "cna": { @@ -86,7 +86,7 @@ "providerMetadata": { "orgId": "96f1cf3c-f80a-4e0f-a063-99a91e3f1325", "shortName": "secretariat-reference", - "dateUpdated": "2024-06-21T15:37:15.636Z" + "dateUpdated": "2024-07-05T14:31:58.027Z" }, "references": [ { @@ -100,6 +100,18 @@ "tags": [ "x_cve_prog_secretariat_snapshot" ] + }, + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/15b30ecb-e3ce-4092-841b-3a1b2553596a?source=cve/adp-test-6-28", + "tags": [ + "x_snapshot" + ] + }, + { + "url": "https://plugins.trac.wordpress.org/changeset?old_path=/enhanced-media-library/tags/2.8.9&new_path=/enhanced-media-library/tags/2.8.10&sfp_email=&sfph_mail=/adp-test-6-28", + "tags": [ + "x_snapshot" + ] } ] } diff --git a/cves/2024/2xxx/CVE-2024-2841.json b/cves/2024/2xxx/CVE-2024-2841.json index 502c63a895a..3fea4cf8780 100644 --- a/cves/2024/2xxx/CVE-2024-2841.json +++ b/cves/2024/2xxx/CVE-2024-2841.json @@ -8,7 +8,7 @@ "assignerShortName": "Wordfence", "dateReserved": "2024-03-22T19:35:56.928Z", "datePublished": "2024-03-29T04:31:34.185Z", - "dateUpdated": "2024-06-21T15:37:16.111Z" + "dateUpdated": "2024-07-05T14:31:58.017Z" }, "containers": { "cna": { @@ -117,7 +117,7 @@ "providerMetadata": { "orgId": "96f1cf3c-f80a-4e0f-a063-99a91e3f1325", "shortName": "secretariat-reference", - "dateUpdated": "2024-06-21T15:37:16.111Z" + "dateUpdated": "2024-07-05T14:31:58.017Z" }, "references": [ { @@ -131,6 +131,18 @@ "tags": [ "x_cve_prog_secretariat_snapshot" ] + }, + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/99e24496-0e3b-4bff-ba14-dc535be10633?source=cve/adp-test-6-28", + "tags": [ + "x_snapshot" + ] + }, + { + "url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3059761%40otter-blocks&new=3059761%40otter-blocks&sfp_email=&sfph_mail=/adp-test-6-28", + "tags": [ + "x_snapshot" + ] } ] } diff --git a/cves/2024/2xxx/CVE-2024-2842.json b/cves/2024/2xxx/CVE-2024-2842.json index 9e1239be2f3..1fc0bdd2109 100644 --- a/cves/2024/2xxx/CVE-2024-2842.json +++ b/cves/2024/2xxx/CVE-2024-2842.json @@ -8,7 +8,7 @@ "assignerShortName": "Wordfence", "dateReserved": "2024-03-22T19:44:55.992Z", "datePublished": "2024-03-29T05:35:33.303Z", - "dateUpdated": "2024-06-21T15:37:16.504Z" + "dateUpdated": "2024-07-05T14:31:57.992Z" }, "containers": { "cna": { @@ -117,7 +117,7 @@ "providerMetadata": { "orgId": "96f1cf3c-f80a-4e0f-a063-99a91e3f1325", "shortName": "secretariat-reference", - "dateUpdated": "2024-06-21T15:37:16.504Z" + "dateUpdated": "2024-07-05T14:31:57.992Z" }, "references": [ { @@ -131,6 +131,18 @@ "tags": [ "x_cve_prog_secretariat_snapshot" ] + }, + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/9e1514c8-3752-4d0a-87a3-3f245a7cb914?source=cve/adp-test-6-28", + "tags": [ + "x_snapshot" + ] + }, + { + "url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3059359%40easy-appointments&new=3059359%40easy-appointments&sfp_email=&sfph_mail=/adp-test-6-28", + "tags": [ + "x_snapshot" + ] } ] } diff --git a/cves/2024/2xxx/CVE-2024-2844.json b/cves/2024/2xxx/CVE-2024-2844.json index 0b4e3bb84fc..1af9385a0dd 100644 --- a/cves/2024/2xxx/CVE-2024-2844.json +++ b/cves/2024/2xxx/CVE-2024-2844.json @@ -8,7 +8,7 @@ "assignerShortName": "Wordfence", "dateReserved": "2024-03-22T19:57:07.496Z", "datePublished": "2024-03-29T05:35:33.762Z", - "dateUpdated": "2024-06-21T15:37:16.896Z" + "dateUpdated": "2024-07-05T14:31:56.569Z" }, "containers": { "cna": { @@ -89,7 +89,7 @@ "providerMetadata": { "orgId": "96f1cf3c-f80a-4e0f-a063-99a91e3f1325", "shortName": "secretariat-reference", - "dateUpdated": "2024-06-21T15:37:16.896Z" + "dateUpdated": "2024-07-05T14:31:56.569Z" }, "references": [ { @@ -109,6 +109,24 @@ "tags": [ "x_cve_prog_secretariat_snapshot" ] + }, + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/c0d8ac01-ac73-47ea-839b-edc820436f27?source=cve/adp-test-6-28", + "tags": [ + "x_snapshot" + ] + }, + { + "url": "https://plugins.trac.wordpress.org/browser/easy-appointments/trunk/src/ajax.php#L380/adp-test-6-28", + "tags": [ + "x_snapshot" + ] + }, + { + "url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3059359%40easy-appointments&new=3059359%40easy-appointments&sfp_email=&sfph_mail=/adp-test-6-28", + "tags": [ + "x_snapshot" + ] } ] } diff --git a/cves/2024/2xxx/CVE-2024-2845.json b/cves/2024/2xxx/CVE-2024-2845.json index 57c5bd9b9db..e0f41390cde 100644 --- a/cves/2024/2xxx/CVE-2024-2845.json +++ b/cves/2024/2xxx/CVE-2024-2845.json @@ -8,7 +8,7 @@ "assignerShortName": "Wordfence", "dateReserved": "2024-03-22T20:20:36.618Z", "datePublished": "2024-04-09T18:58:40.543Z", - "dateUpdated": "2024-06-21T15:37:17.295Z" + "dateUpdated": "2024-07-05T14:31:58.001Z" }, "containers": { "cna": { @@ -117,7 +117,7 @@ "providerMetadata": { "orgId": "96f1cf3c-f80a-4e0f-a063-99a91e3f1325", "shortName": "secretariat-reference", - "dateUpdated": "2024-06-21T15:37:17.295Z" + "dateUpdated": "2024-07-05T14:31:58.001Z" }, "references": [ { @@ -131,6 +131,18 @@ "tags": [ "x_cve_prog_secretariat_snapshot" ] + }, + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/2d113191-b550-4752-b536-644206ab56c1?source=cve/adp-test-6-28", + "tags": [ + "x_snapshot" + ] + }, + { + "url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&new=3057976%40betterdocs%2Ftrunk&old=3055881%40betterdocs%2Ftrunk&sfp_email=&sfph_mail=/adp-test-6-28", + "tags": [ + "x_snapshot" + ] } ] } diff --git a/cves/2024/2xxx/CVE-2024-2846.json b/cves/2024/2xxx/CVE-2024-2846.json index 647041c99e9..b7219225da8 100644 --- a/cves/2024/2xxx/CVE-2024-2846.json +++ b/cves/2024/2xxx/CVE-2024-2846.json @@ -8,7 +8,7 @@ "assignerShortName": "Wordfence", "dateReserved": "2024-03-22T20:33:03.827Z", "datePublished": "2024-05-09T20:03:36.275Z", - "dateUpdated": "2024-06-21T15:37:17.682Z" + "dateUpdated": "2024-07-05T14:31:56.575Z" }, "containers": { "cna": { @@ -119,7 +119,7 @@ "providerMetadata": { "orgId": "96f1cf3c-f80a-4e0f-a063-99a91e3f1325", "shortName": "secretariat-reference", - "dateUpdated": "2024-06-21T15:37:17.682Z" + "dateUpdated": "2024-07-05T14:31:56.575Z" }, "references": [ { @@ -133,6 +133,18 @@ "tags": [ "x_cve_prog_secretariat_snapshot" ] + }, + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/9fcb65a0-4218-4728-9c29-0d1a03f438a6?source=cve/adp-test-6-28", + "tags": [ + "x_snapshot" + ] + }, + { + "url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3081401%40visual-footer-credit-remover&new=3081401%40visual-footer-credit-remover&sfp_email=&sfph_mail=/adp-test-6-28", + "tags": [ + "x_snapshot" + ] } ] } diff --git a/cves/2024/2xxx/CVE-2024-2847.json b/cves/2024/2xxx/CVE-2024-2847.json index 3c356368868..a4d15cf53fe 100644 --- a/cves/2024/2xxx/CVE-2024-2847.json +++ b/cves/2024/2xxx/CVE-2024-2847.json @@ -8,7 +8,7 @@ "assignerShortName": "Wordfence", "dateReserved": "2024-03-22T20:42:16.163Z", "datePublished": "2024-04-09T18:59:09.848Z", - "dateUpdated": "2024-06-21T15:37:18.118Z" + "dateUpdated": "2024-07-05T14:31:58.111Z" }, "containers": { "cna": { @@ -118,7 +118,7 @@ "providerMetadata": { "orgId": "96f1cf3c-f80a-4e0f-a063-99a91e3f1325", "shortName": "secretariat-reference", - "dateUpdated": "2024-06-21T15:37:18.118Z" + "dateUpdated": "2024-07-05T14:31:58.111Z" }, "references": [ { @@ -132,6 +132,18 @@ "tags": [ "x_cve_prog_secretariat_snapshot" ] + }, + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/9f665099-d1c3-43a9-b37b-c9f42c9172ad?source=cve/adp-test-6-28", + "tags": [ + "x_snapshot" + ] + }, + { + "url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&new=3060091%40wp-file-upload%2Ftrunk&old=3045068%40wp-file-upload%2Ftrunk&sfp_email=&sfph_mail=/adp-test-6-28", + "tags": [ + "x_snapshot" + ] } ] } diff --git a/cves/2024/2xxx/CVE-2024-2848.json b/cves/2024/2xxx/CVE-2024-2848.json index 09f89f4b882..bfad54e9d5f 100644 --- a/cves/2024/2xxx/CVE-2024-2848.json +++ b/cves/2024/2xxx/CVE-2024-2848.json @@ -8,7 +8,7 @@ "assignerShortName": "Wordfence", "dateReserved": "2024-03-22T21:00:11.455Z", "datePublished": "2024-03-29T11:02:02.771Z", - "dateUpdated": "2024-06-21T15:38:36.831Z" + "dateUpdated": "2024-07-05T14:31:58.032Z" }, "containers": { "cna": { @@ -89,7 +89,7 @@ "providerMetadata": { "orgId": "96f1cf3c-f80a-4e0f-a063-99a91e3f1325", "shortName": "secretariat-reference", - "dateUpdated": "2024-06-21T15:38:36.831Z" + "dateUpdated": "2024-07-05T14:31:58.032Z" }, "references": [ { @@ -109,6 +109,24 @@ "tags": [ "x_cve_prog_secretariat_snapshot" ] + }, + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/dbe0cc57-a17d-4f91-887f-fe819b32f6b3?source=cve/adp-test-6-28", + "tags": [ + "x_snapshot" + ] + }, + { + "url": "https://themes.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=222494%40responsive&new=222494%40responsive&sfp_email=&sfph_mail=/adp-test-6-28", + "tags": [ + "x_snapshot" + ] + }, + { + "url": "http://www.openwall.com/lists/oss-security/2024/04/22/1/adp-test-6-28", + "tags": [ + "x_snapshot" + ] } ] } diff --git a/cves/2024/2xxx/CVE-2024-2849.json b/cves/2024/2xxx/CVE-2024-2849.json index 9d38e57f817..e07bbf895cc 100644 --- a/cves/2024/2xxx/CVE-2024-2849.json +++ b/cves/2024/2xxx/CVE-2024-2849.json @@ -8,7 +8,7 @@ "assignerShortName": "VulDB", "dateReserved": "2024-03-22T22:52:50.269Z", "datePublished": "2024-03-23T17:31:04.908Z", - "dateUpdated": "2024-06-21T15:38:37.233Z" + "dateUpdated": "2024-07-05T14:31:58.011Z" }, "containers": { "cna": { @@ -139,7 +139,7 @@ "providerMetadata": { "orgId": "96f1cf3c-f80a-4e0f-a063-99a91e3f1325", "shortName": "secretariat-reference", - "dateUpdated": "2024-06-21T15:38:37.233Z" + "dateUpdated": "2024-07-05T14:31:58.011Z" }, "references": [ { @@ -175,6 +175,40 @@ "issue-tracking", "x_cve_prog_secretariat_snapshot" ] + }, + { + "url": "https://vuldb.com/?id.257770/adp-test-6-28", + "name": "VDB-257770 | SourceCodester Simple File Manager unrestricted upload", + "tags": [ + "vdb-entry", + "technical-description", + "x_snapshot" + ] + }, + { + "url": "https://vuldb.com/?ctiid.257770/adp-test-6-28", + "name": "VDB-257770 | CTI Indicators (IOB, IOC, TTP, IOA)", + "tags": [ + "signature", + "permissions-required", + "x_snapshot" + ] + }, + { + "url": "https://vuldb.com/?submit.303123/adp-test-6-28", + "name": "Submit #303123 | Sourcecodester Simple File Manager Web App using PHP and MySQL Database Free Source Code v1.0 unrestricted uploads", + "tags": [ + "third-party-advisory", + "x_snapshot" + ] + }, + { + "url": "https://github.com/CveSecLook/cve/issues/1/adp-test-6-28", + "tags": [ + "exploit", + "issue-tracking", + "x_snapshot" + ] } ] } diff --git a/cves/2024/2xxx/CVE-2024-2850.json b/cves/2024/2xxx/CVE-2024-2850.json index 4693c6c9091..c3ee72309f4 100644 --- a/cves/2024/2xxx/CVE-2024-2850.json +++ b/cves/2024/2xxx/CVE-2024-2850.json @@ -8,7 +8,7 @@ "assignerShortName": "VulDB", "dateReserved": "2024-03-23T05:46:47.272Z", "datePublished": "2024-03-24T02:00:06.578Z", - "dateUpdated": "2024-06-21T15:38:37.679Z" + "dateUpdated": "2024-07-05T14:31:58.038Z" }, "containers": { "cna": { @@ -131,7 +131,7 @@ "providerMetadata": { "orgId": "96f1cf3c-f80a-4e0f-a063-99a91e3f1325", "shortName": "secretariat-reference", - "dateUpdated": "2024-06-21T15:38:37.679Z" + "dateUpdated": "2024-07-05T14:31:58.038Z" }, "references": [ { @@ -158,6 +158,31 @@ "exploit", "x_cve_prog_secretariat_snapshot" ] + }, + { + "url": "https://vuldb.com/?id.257774/adp-test-6-28", + "name": "VDB-257774 | Tenda AC15 saveParentControlInfo stack-based overflow", + "tags": [ + "vdb-entry", + "technical-description", + "x_snapshot" + ] + }, + { + "url": "https://vuldb.com/?ctiid.257774/adp-test-6-28", + "name": "VDB-257774 | CTI Indicators (IOB, IOC, IOA)", + "tags": [ + "signature", + "permissions-required", + "x_snapshot" + ] + }, + { + "url": "https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/AC15/V15.03.05.18/saveParentControlInfo_urls.md/adp-test-6-28", + "tags": [ + "exploit", + "x_snapshot" + ] } ] } diff --git a/cves/2024/2xxx/CVE-2024-2851.json b/cves/2024/2xxx/CVE-2024-2851.json index a96887d5095..89556ea0696 100644 --- a/cves/2024/2xxx/CVE-2024-2851.json +++ b/cves/2024/2xxx/CVE-2024-2851.json @@ -8,7 +8,7 @@ "assignerShortName": "VulDB", "dateReserved": "2024-03-23T05:46:49.759Z", "datePublished": "2024-03-24T03:00:06.055Z", - "dateUpdated": "2024-06-21T15:38:38.219Z" + "dateUpdated": "2024-07-05T14:31:58.020Z" }, "containers": { "cna": { @@ -135,7 +135,7 @@ "providerMetadata": { "orgId": "96f1cf3c-f80a-4e0f-a063-99a91e3f1325", "shortName": "secretariat-reference", - "dateUpdated": "2024-06-21T15:38:38.219Z" + "dateUpdated": "2024-07-05T14:31:58.020Z" }, "references": [ { @@ -162,6 +162,31 @@ "exploit", "x_cve_prog_secretariat_snapshot" ] + }, + { + "url": "https://vuldb.com/?id.257775/adp-test-6-28", + "name": "VDB-257775 | Tenda AC15 setsambacfg formSetSambaConf os command injection", + "tags": [ + "vdb-entry", + "technical-description", + "x_snapshot" + ] + }, + { + "url": "https://vuldb.com/?ctiid.257775/adp-test-6-28", + "name": "VDB-257775 | CTI Indicators (IOB, IOC, TTP, IOA)", + "tags": [ + "signature", + "permissions-required", + "x_snapshot" + ] + }, + { + "url": "https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/AC15/V15.03.05.18/formSetSambaConf.md/adp-test-6-28", + "tags": [ + "exploit", + "x_snapshot" + ] } ] } diff --git a/cves/2024/2xxx/CVE-2024-2852.json b/cves/2024/2xxx/CVE-2024-2852.json index d50a8532692..2b6b30a2df5 100644 --- a/cves/2024/2xxx/CVE-2024-2852.json +++ b/cves/2024/2xxx/CVE-2024-2852.json @@ -8,7 +8,7 @@ "assignerShortName": "VulDB", "dateReserved": "2024-03-23T05:46:57.422Z", "datePublished": "2024-03-24T04:31:04.363Z", - "dateUpdated": "2024-06-21T15:38:38.703Z" + "dateUpdated": "2024-07-05T14:31:57.561Z" }, "containers": { "cna": { @@ -131,7 +131,7 @@ "providerMetadata": { "orgId": "96f1cf3c-f80a-4e0f-a063-99a91e3f1325", "shortName": "secretariat-reference", - "dateUpdated": "2024-06-21T15:38:38.703Z" + "dateUpdated": "2024-07-05T14:31:57.561Z" }, "references": [ { @@ -158,6 +158,31 @@ "exploit", "x_cve_prog_secretariat_snapshot" ] + }, + { + "url": "https://vuldb.com/?id.257776/adp-test-6-28", + "name": "VDB-257776 | Tenda AC15 saveParentControlInfo stack-based overflow", + "tags": [ + "vdb-entry", + "technical-description", + "x_snapshot" + ] + }, + { + "url": "https://vuldb.com/?ctiid.257776/adp-test-6-28", + "name": "VDB-257776 | CTI Indicators (IOB, IOC, IOA)", + "tags": [ + "signature", + "permissions-required", + "x_snapshot" + ] + }, + { + "url": "https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/AC15/V1.0%20V15.03.20_multi/saveParentControlInfo_urls.md/adp-test-6-28", + "tags": [ + "exploit", + "x_snapshot" + ] } ] } diff --git a/cves/2024/2xxx/CVE-2024-2853.json b/cves/2024/2xxx/CVE-2024-2853.json index d910b008df8..94a38117cf7 100644 --- a/cves/2024/2xxx/CVE-2024-2853.json +++ b/cves/2024/2xxx/CVE-2024-2853.json @@ -8,7 +8,7 @@ "assignerShortName": "VulDB", "dateReserved": "2024-03-23T05:47:14.178Z", "datePublished": "2024-03-24T05:00:06.892Z", - "dateUpdated": "2024-06-21T15:38:39.117Z" + "dateUpdated": "2024-07-05T14:31:58.040Z" }, "containers": { "cna": { @@ -135,7 +135,7 @@ "providerMetadata": { "orgId": "96f1cf3c-f80a-4e0f-a063-99a91e3f1325", "shortName": "secretariat-reference", - "dateUpdated": "2024-06-21T15:38:39.117Z" + "dateUpdated": "2024-07-05T14:31:58.040Z" }, "references": [ { @@ -162,6 +162,31 @@ "exploit", "x_cve_prog_secretariat_snapshot" ] + }, + { + "url": "https://vuldb.com/?id.257777/adp-test-6-28", + "name": "VDB-257777 | Tenda AC10U setsambacfg formSetSambaConf os command injection", + "tags": [ + "vdb-entry", + "technical-description", + "x_snapshot" + ] + }, + { + "url": "https://vuldb.com/?ctiid.257777/adp-test-6-28", + "name": "VDB-257777 | CTI Indicators (IOB, IOC, TTP, IOA)", + "tags": [ + "signature", + "permissions-required", + "x_snapshot" + ] + }, + { + "url": "https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/AC10U/v1.V15.03.06.48/more/formSetSambaConf.md/adp-test-6-28", + "tags": [ + "exploit", + "x_snapshot" + ] } ] } diff --git a/cves/2024/2xxx/CVE-2024-2854.json b/cves/2024/2xxx/CVE-2024-2854.json index 9c2e37a408a..731fb3f3552 100644 --- a/cves/2024/2xxx/CVE-2024-2854.json +++ b/cves/2024/2xxx/CVE-2024-2854.json @@ -8,7 +8,7 @@ "assignerShortName": "VulDB", "dateReserved": "2024-03-23T05:47:26.896Z", "datePublished": "2024-03-24T05:31:04.168Z", - "dateUpdated": "2024-06-21T15:38:39.532Z" + "dateUpdated": "2024-07-05T14:31:58.147Z" }, "containers": { "cna": { @@ -131,7 +131,7 @@ "providerMetadata": { "orgId": "96f1cf3c-f80a-4e0f-a063-99a91e3f1325", "shortName": "secretariat-reference", - "dateUpdated": "2024-06-21T15:38:39.532Z" + "dateUpdated": "2024-07-05T14:31:58.147Z" }, "references": [ { @@ -158,6 +158,31 @@ "exploit", "x_cve_prog_secretariat_snapshot" ] + }, + { + "url": "https://vuldb.com/?id.257778/adp-test-6-28", + "name": "VDB-257778 | Tenda AC18 setsambacfg formSetSambaConf os command injection", + "tags": [ + "vdb-entry", + "technical-description", + "x_snapshot" + ] + }, + { + "url": "https://vuldb.com/?ctiid.257778/adp-test-6-28", + "name": "VDB-257778 | CTI Indicators (IOB, IOC, TTP, IOA)", + "tags": [ + "signature", + "permissions-required", + "x_snapshot" + ] + }, + { + "url": "https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/AC18/formSetSambaConf.md/adp-test-6-28", + "tags": [ + "exploit", + "x_snapshot" + ] } ] } diff --git a/cves/2024/2xxx/CVE-2024-2855.json b/cves/2024/2xxx/CVE-2024-2855.json index eb16f4dc379..076aa3aa1e2 100644 --- a/cves/2024/2xxx/CVE-2024-2855.json +++ b/cves/2024/2xxx/CVE-2024-2855.json @@ -8,7 +8,7 @@ "assignerShortName": "VulDB", "dateReserved": "2024-03-23T05:47:33.356Z", "datePublished": "2024-03-24T06:00:06.171Z", - "dateUpdated": "2024-06-21T15:38:39.928Z" + "dateUpdated": "2024-07-05T14:31:58.034Z" }, "containers": { "cna": { @@ -139,7 +139,7 @@ "providerMetadata": { "orgId": "96f1cf3c-f80a-4e0f-a063-99a91e3f1325", "shortName": "secretariat-reference", - "dateUpdated": "2024-06-21T15:38:39.928Z" + "dateUpdated": "2024-07-05T14:31:58.034Z" }, "references": [ { @@ -166,6 +166,31 @@ "exploit", "x_cve_prog_secretariat_snapshot" ] + }, + { + "url": "https://vuldb.com/?id.257779/adp-test-6-28", + "name": "VDB-257779 | Tenda AC15 SetSysTimeCfg fromSetSysTime stack-based overflow", + "tags": [ + "vdb-entry", + "technical-description", + "x_snapshot" + ] + }, + { + "url": "https://vuldb.com/?ctiid.257779/adp-test-6-28", + "name": "VDB-257779 | CTI Indicators (IOB, IOC, IOA)", + "tags": [ + "signature", + "permissions-required", + "x_snapshot" + ] + }, + { + "url": "https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/AC15/V1.0%20V15.03.20_multi/fromSetSysTime.md/adp-test-6-28", + "tags": [ + "exploit", + "x_snapshot" + ] } ] } diff --git a/cves/2024/2xxx/CVE-2024-2856.json b/cves/2024/2xxx/CVE-2024-2856.json index ce14a4c0d5c..d0352089166 100644 --- a/cves/2024/2xxx/CVE-2024-2856.json +++ b/cves/2024/2xxx/CVE-2024-2856.json @@ -8,7 +8,7 @@ "assignerShortName": "VulDB", "dateReserved": "2024-03-23T05:47:39.796Z", "datePublished": "2024-03-24T06:31:04.241Z", - "dateUpdated": "2024-06-21T15:38:40.337Z" + "dateUpdated": "2024-07-05T14:31:58.039Z" }, "containers": { "cna": { @@ -142,7 +142,7 @@ "providerMetadata": { "orgId": "96f1cf3c-f80a-4e0f-a063-99a91e3f1325", "shortName": "secretariat-reference", - "dateUpdated": "2024-06-21T15:38:40.337Z" + "dateUpdated": "2024-07-05T14:31:58.039Z" }, "references": [ { @@ -177,6 +177,39 @@ "exploit", "x_cve_prog_secretariat_snapshot" ] + }, + { + "url": "https://vuldb.com/?id.257780/adp-test-6-28", + "name": "VDB-257780 | Tenda AC10 SetSysTimeCfg fromSetSysTime stack-based overflow", + "tags": [ + "vdb-entry", + "technical-description", + "x_snapshot" + ] + }, + { + "url": "https://vuldb.com/?ctiid.257780/adp-test-6-28", + "name": "VDB-257780 | CTI Indicators (IOB, IOC, IOA)", + "tags": [ + "signature", + "permissions-required", + "x_snapshot" + ] + }, + { + "url": "https://vuldb.com/?submit.299741/adp-test-6-28", + "name": "Submit #299741 | Tenda AC10 AC10 v4.0 V16.03.10.13、V16.03.10.20 buffer overflow", + "tags": [ + "third-party-advisory", + "x_snapshot" + ] + }, + { + "url": "https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/AC10/V16.03.10.13/fromSetSysTime.md/adp-test-6-28", + "tags": [ + "exploit", + "x_snapshot" + ] } ] } diff --git a/cves/2024/2xxx/CVE-2024-2857.json b/cves/2024/2xxx/CVE-2024-2857.json index 1c641d02ee5..617c89405cd 100644 --- a/cves/2024/2xxx/CVE-2024-2857.json +++ b/cves/2024/2xxx/CVE-2024-2857.json @@ -8,7 +8,7 @@ "assignerShortName": "WPScan", "dateReserved": "2024-03-23T17:39:44.424Z", "datePublished": "2024-04-15T05:00:05.871Z", - "dateUpdated": "2024-06-21T15:38:40.719Z" + "dateUpdated": "2024-07-05T14:31:57.723Z" }, "containers": { "cna": { @@ -93,7 +93,7 @@ "providerMetadata": { "orgId": "96f1cf3c-f80a-4e0f-a063-99a91e3f1325", "shortName": "secretariat-reference", - "dateUpdated": "2024-06-21T15:38:40.719Z" + "dateUpdated": "2024-07-05T14:31:57.723Z" }, "references": [ { @@ -104,6 +104,15 @@ "technical-description", "x_cve_prog_secretariat_snapshot" ] + }, + { + "url": "https://wpscan.com/vulnerability/b7a35c5b-474a-444a-85ee-c50782c7a6c2//adp-test-6-28", + "tags": [ + "exploit", + "vdb-entry", + "technical-description", + "x_snapshot" + ] } ] } diff --git a/cves/2024/2xxx/CVE-2024-2858.json b/cves/2024/2xxx/CVE-2024-2858.json index 09693ab397e..48e37040c12 100644 --- a/cves/2024/2xxx/CVE-2024-2858.json +++ b/cves/2024/2xxx/CVE-2024-2858.json @@ -8,7 +8,7 @@ "assignerShortName": "WPScan", "dateReserved": "2024-03-23T17:40:22.513Z", "datePublished": "2024-04-15T05:00:06.077Z", - "dateUpdated": "2024-06-21T15:38:41.203Z" + "dateUpdated": "2024-07-05T14:31:58.083Z" }, "containers": { "cna": { @@ -84,7 +84,7 @@ "providerMetadata": { "orgId": "96f1cf3c-f80a-4e0f-a063-99a91e3f1325", "shortName": "secretariat-reference", - "dateUpdated": "2024-06-21T15:38:41.203Z" + "dateUpdated": "2024-07-05T14:31:58.083Z" }, "references": [ { @@ -95,6 +95,15 @@ "technical-description", "x_cve_prog_secretariat_snapshot" ] + }, + { + "url": "https://wpscan.com/vulnerability/43297210-17a6-4b51-b8ca-32ceef9fc09a//adp-test-6-28", + "tags": [ + "exploit", + "vdb-entry", + "technical-description", + "x_snapshot" + ] } ] } diff --git a/cves/2024/2xxx/CVE-2024-2859.json b/cves/2024/2xxx/CVE-2024-2859.json index 4809879eb4f..024bf7d4b73 100644 --- a/cves/2024/2xxx/CVE-2024-2859.json +++ b/cves/2024/2xxx/CVE-2024-2859.json @@ -8,7 +8,7 @@ "assignerShortName": "brocade", "dateReserved": "2024-03-24T00:55:53.564Z", "datePublished": "2024-04-27T00:06:10.084Z", - "dateUpdated": "2024-06-21T15:38:41.626Z" + "dateUpdated": "2024-07-05T14:31:57.733Z" }, "containers": { "cna": { @@ -86,7 +86,7 @@ "providerMetadata": { "orgId": "96f1cf3c-f80a-4e0f-a063-99a91e3f1325", "shortName": "secretariat-reference", - "dateUpdated": "2024-06-21T15:38:41.626Z" + "dateUpdated": "2024-07-05T14:31:57.733Z" }, "references": [ { @@ -94,6 +94,12 @@ "tags": [ "x_cve_prog_secretariat_snapshot" ] + }, + { + "url": "https://support.broadcom.com/external/content/SecurityAdvisories/0/23245/adp-test-6-28", + "tags": [ + "x_snapshot" + ] } ] } diff --git a/cves/2024/2xxx/CVE-2024-2860.json b/cves/2024/2xxx/CVE-2024-2860.json index c7c6d74fdf2..0b04ac86143 100644 --- a/cves/2024/2xxx/CVE-2024-2860.json +++ b/cves/2024/2xxx/CVE-2024-2860.json @@ -8,7 +8,7 @@ "assignerShortName": "brocade", "dateReserved": "2024-03-24T01:29:52.208Z", "datePublished": "2024-05-08T01:01:54.775Z", - "dateUpdated": "2024-06-21T15:38:42.038Z" + "dateUpdated": "2024-07-05T14:31:58.464Z" }, "containers": { "cna": { @@ -158,7 +158,7 @@ "providerMetadata": { "orgId": "96f1cf3c-f80a-4e0f-a063-99a91e3f1325", "shortName": "secretariat-reference", - "dateUpdated": "2024-06-21T15:38:42.038Z" + "dateUpdated": "2024-07-05T14:31:58.464Z" }, "references": [ { @@ -166,6 +166,12 @@ "tags": [ "x_cve_prog_secretariat_snapshot" ] + }, + { + "url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/24260/adp-test-6-28", + "tags": [ + "x_snapshot" + ] } ] } diff --git a/cves/2024/2xxx/CVE-2024-2861.json b/cves/2024/2xxx/CVE-2024-2861.json index 848de168c37..0dec3c39b8e 100644 --- a/cves/2024/2xxx/CVE-2024-2861.json +++ b/cves/2024/2xxx/CVE-2024-2861.json @@ -8,7 +8,7 @@ "assignerShortName": "Wordfence", "dateReserved": "2024-03-24T17:25:11.170Z", "datePublished": "2024-05-23T09:32:32.877Z", - "dateUpdated": "2024-06-21T15:38:42.426Z" + "dateUpdated": "2024-07-05T14:31:58.101Z" }, "containers": { "cna": { @@ -123,7 +123,7 @@ "providerMetadata": { "orgId": "96f1cf3c-f80a-4e0f-a063-99a91e3f1325", "shortName": "secretariat-reference", - "dateUpdated": "2024-06-21T15:38:42.426Z" + "dateUpdated": "2024-07-05T14:31:58.101Z" }, "references": [ { @@ -137,6 +137,18 @@ "tags": [ "x_cve_prog_secretariat_snapshot" ] + }, + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/487731cd-da5a-45b6-8f39-4ae6420dd252?source=cve/adp-test-6-28", + "tags": [ + "x_snapshot" + ] + }, + { + "url": "https://plugins.trac.wordpress.org/changeset/3090831/wp-user-avatar/adp-test-6-28", + "tags": [ + "x_snapshot" + ] } ] } diff --git a/cves/2024/2xxx/CVE-2024-2862.json b/cves/2024/2xxx/CVE-2024-2862.json index 38ad2eff599..7ab69ce272a 100644 --- a/cves/2024/2xxx/CVE-2024-2862.json +++ b/cves/2024/2xxx/CVE-2024-2862.json @@ -8,7 +8,7 @@ "assignerShortName": "LGE", "dateReserved": "2024-03-25T06:11:38.644Z", "datePublished": "2024-03-25T06:31:34.651Z", - "dateUpdated": "2024-06-21T15:38:42.827Z" + "dateUpdated": "2024-07-05T14:31:58.401Z" }, "containers": { "cna": { @@ -109,7 +109,7 @@ "providerMetadata": { "orgId": "96f1cf3c-f80a-4e0f-a063-99a91e3f1325", "shortName": "secretariat-reference", - "dateUpdated": "2024-06-21T15:38:42.827Z" + "dateUpdated": "2024-07-05T14:31:58.401Z" }, "references": [ { @@ -117,6 +117,12 @@ "tags": [ "x_cve_prog_secretariat_snapshot" ] + }, + { + "url": "https://lgsecurity.lge.com/bulletins/idproducts#updateDetails/adp-test-6-28", + "tags": [ + "x_snapshot" + ] } ] } diff --git a/cves/2024/2xxx/CVE-2024-2863.json b/cves/2024/2xxx/CVE-2024-2863.json index 9dd6dec35ab..f151c7a0e80 100644 --- a/cves/2024/2xxx/CVE-2024-2863.json +++ b/cves/2024/2xxx/CVE-2024-2863.json @@ -8,7 +8,7 @@ "assignerShortName": "LGE", "dateReserved": "2024-03-25T06:11:39.846Z", "datePublished": "2024-03-25T06:39:46.717Z", - "dateUpdated": "2024-06-21T15:38:43.240Z" + "dateUpdated": "2024-07-05T14:31:58.278Z" }, "containers": { "cna": { @@ -109,7 +109,7 @@ "providerMetadata": { "orgId": "96f1cf3c-f80a-4e0f-a063-99a91e3f1325", "shortName": "secretariat-reference", - "dateUpdated": "2024-06-21T15:38:43.240Z" + "dateUpdated": "2024-07-05T14:31:58.278Z" }, "references": [ { @@ -117,6 +117,12 @@ "tags": [ "x_cve_prog_secretariat_snapshot" ] + }, + { + "url": "https://lgsecurity.lge.com/bulletins/idproducts#updateDetails/adp-test-6-28", + "tags": [ + "x_snapshot" + ] } ] } diff --git a/cves/2024/2xxx/CVE-2024-2864.json b/cves/2024/2xxx/CVE-2024-2864.json index e66c522a307..3a397aa73ef 100644 --- a/cves/2024/2xxx/CVE-2024-2864.json +++ b/cves/2024/2xxx/CVE-2024-2864.json @@ -8,7 +8,7 @@ "assignerShortName": "Patchstack", "dateReserved": "2024-03-25T10:40:59.491Z", "datePublished": "2024-03-25T10:51:19.470Z", - "dateUpdated": "2024-06-21T15:38:43.634Z" + "dateUpdated": "2024-07-05T14:31:58.753Z" }, "containers": { "cna": { @@ -168,7 +168,7 @@ "providerMetadata": { "orgId": "96f1cf3c-f80a-4e0f-a063-99a91e3f1325", "shortName": "secretariat-reference", - "dateUpdated": "2024-06-21T15:38:43.634Z" + "dateUpdated": "2024-07-05T14:31:58.753Z" }, "references": [ { @@ -177,6 +177,13 @@ "x_cve_prog_secretariat_snapshot" ], "url": "https://patchstack.com/database/vulnerability/youzify-moderation/wordpress-youzify-buddypress-moderation-plugin-2-0-0-unauthenticated-cross-site-scripting-xss-vulnerability?_s_id=cve/DEMO_2024_06_19" + }, + { + "tags": [ + "vdb-entry", + "x_snapshot" + ], + "url": "https://patchstack.com/database/vulnerability/youzify-moderation/wordpress-youzify-buddypress-moderation-plugin-2-0-0-unauthenticated-cross-site-scripting-xss-vulnerability?_s_id=cve/adp-test-6-28" } ] } diff --git a/cves/2024/2xxx/CVE-2024-2865.json b/cves/2024/2xxx/CVE-2024-2865.json index f2ef95b62e0..e39054eb704 100644 --- a/cves/2024/2xxx/CVE-2024-2865.json +++ b/cves/2024/2xxx/CVE-2024-2865.json @@ -8,7 +8,7 @@ "assignerShortName": "TR-CERT", "dateReserved": "2024-03-25T12:08:36.109Z", "datePublished": "2024-03-25T13:22:23.993Z", - "dateUpdated": "2024-06-21T15:38:44.141Z" + "dateUpdated": "2024-07-05T14:31:58.389Z" }, "containers": { "cna": { @@ -122,7 +122,7 @@ "providerMetadata": { "orgId": "96f1cf3c-f80a-4e0f-a063-99a91e3f1325", "shortName": "secretariat-reference", - "dateUpdated": "2024-06-21T15:38:44.141Z" + "dateUpdated": "2024-07-05T14:31:58.389Z" }, "references": [ { @@ -130,6 +130,12 @@ "tags": [ "x_cve_prog_secretariat_snapshot" ] + }, + { + "url": "https://www.usom.gov.tr/bildirim/tr-24-0229/adp-test-6-28", + "tags": [ + "x_snapshot" + ] } ] } diff --git a/cves/2024/2xxx/CVE-2024-2867.json b/cves/2024/2xxx/CVE-2024-2867.json index bfed2ccc5de..0ecfa0dfbbd 100644 --- a/cves/2024/2xxx/CVE-2024-2867.json +++ b/cves/2024/2xxx/CVE-2024-2867.json @@ -8,7 +8,7 @@ "assignerShortName": "Wordfence", "dateReserved": "2024-03-25T14:24:45.825Z", "datePublished": "2024-05-02T16:52:04.809Z", - "dateUpdated": "2024-06-21T15:38:44.600Z" + "dateUpdated": "2024-07-05T14:31:58.036Z" }, "containers": { "cna": { @@ -118,7 +118,7 @@ "providerMetadata": { "orgId": "96f1cf3c-f80a-4e0f-a063-99a91e3f1325", "shortName": "secretariat-reference", - "dateUpdated": "2024-06-21T15:38:44.600Z" + "dateUpdated": "2024-07-05T14:31:58.036Z" }, "references": [ { @@ -132,6 +132,18 @@ "tags": [ "x_cve_prog_secretariat_snapshot" ] + }, + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/4eb296af-547a-44aa-b804-833204b75256?source=cve/adp-test-6-28", + "tags": [ + "x_snapshot" + ] + }, + { + "url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&new=3061186%40wp-user-avatar%2Ftrunk&old=3053353%40wp-user-avatar%2Ftrunk&sfp_email=&sfph_mail=/adp-test-6-28", + "tags": [ + "x_snapshot" + ] } ] } diff --git a/cves/2024/2xxx/CVE-2024-2868.json b/cves/2024/2xxx/CVE-2024-2868.json index cdeefed3be9..74e46d876c5 100644 --- a/cves/2024/2xxx/CVE-2024-2868.json +++ b/cves/2024/2xxx/CVE-2024-2868.json @@ -8,7 +8,7 @@ "assignerShortName": "Wordfence", "dateReserved": "2024-03-25T16:16:38.874Z", "datePublished": "2024-04-04T01:56:45.161Z", - "dateUpdated": "2024-06-21T15:38:45.107Z" + "dateUpdated": "2024-07-05T14:31:58.009Z" }, "containers": { "cna": { @@ -89,7 +89,7 @@ "providerMetadata": { "orgId": "96f1cf3c-f80a-4e0f-a063-99a91e3f1325", "shortName": "secretariat-reference", - "dateUpdated": "2024-06-21T15:38:45.107Z" + "dateUpdated": "2024-07-05T14:31:58.009Z" }, "references": [ { @@ -109,6 +109,24 @@ "tags": [ "x_cve_prog_secretariat_snapshot" ] + }, + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/27b8e0c0-fb0b-4d36-abc4-3e66ec7b5195?source=cve/adp-test-6-28", + "tags": [ + "x_snapshot" + ] + }, + { + "url": "https://plugins.trac.wordpress.org/browser/woolentor-addons/tags/2.8.2/includes/addons/universal_product.php#L2548/adp-test-6-28", + "tags": [ + "x_snapshot" + ] + }, + { + "url": "https://plugins.trac.wordpress.org/changeset/3061864/woolentor-addons/tags/2.8.4/includes/addons/universal_product.php/adp-test-6-28", + "tags": [ + "x_snapshot" + ] } ] } diff --git a/cves/2024/2xxx/CVE-2024-2871.json b/cves/2024/2xxx/CVE-2024-2871.json index 138c0533115..9f07dfaf4c5 100644 --- a/cves/2024/2xxx/CVE-2024-2871.json +++ b/cves/2024/2xxx/CVE-2024-2871.json @@ -8,7 +8,7 @@ "assignerShortName": "Wordfence", "dateReserved": "2024-03-25T19:52:01.682Z", "datePublished": "2024-04-09T18:59:08.927Z", - "dateUpdated": "2024-06-21T15:38:45.799Z" + "dateUpdated": "2024-07-05T14:31:58.160Z" }, "containers": { "cna": { @@ -123,7 +123,7 @@ "providerMetadata": { "orgId": "96f1cf3c-f80a-4e0f-a063-99a91e3f1325", "shortName": "secretariat-reference", - "dateUpdated": "2024-06-21T15:38:45.799Z" + "dateUpdated": "2024-07-05T14:31:58.160Z" }, "references": [ { @@ -149,6 +149,30 @@ "tags": [ "x_cve_prog_secretariat_snapshot" ] + }, + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/9e63fb84-a16b-447f-be73-e01f30881445?source=cve/adp-test-6-28", + "tags": [ + "x_snapshot" + ] + }, + { + "url": "https://plugins.trac.wordpress.org/browser/media-library-assistant/trunk/includes/class-mla-shortcode-custom-list.php#L151/adp-test-6-28", + "tags": [ + "x_snapshot" + ] + }, + { + "url": "https://plugins.trac.wordpress.org/browser/media-library-assistant/trunk/includes/class-mla-shortcode-custom-list.php#L1798/adp-test-6-28", + "tags": [ + "x_snapshot" + ] + }, + { + "url": "https://plugins.trac.wordpress.org/browser/media-library-assistant/trunk/includes/class-mla-shortcode-custom-list.php#L1949/adp-test-6-28", + "tags": [ + "x_snapshot" + ] } ] } diff --git a/cves/2024/2xxx/CVE-2024-2873.json b/cves/2024/2xxx/CVE-2024-2873.json index a7d4feb29a3..ab1134a8d6d 100644 --- a/cves/2024/2xxx/CVE-2024-2873.json +++ b/cves/2024/2xxx/CVE-2024-2873.json @@ -8,7 +8,7 @@ "assignerShortName": "wolfSSL", "dateReserved": "2024-03-25T20:28:07.035Z", "datePublished": "2024-03-25T21:58:52.325Z", - "dateUpdated": "2024-06-21T15:38:46.551Z" + "dateUpdated": "2024-07-05T14:31:58.393Z" }, "containers": { "cna": { @@ -141,7 +141,7 @@ "providerMetadata": { "orgId": "96f1cf3c-f80a-4e0f-a063-99a91e3f1325", "shortName": "secretariat-reference", - "dateUpdated": "2024-06-21T15:38:46.551Z" + "dateUpdated": "2024-07-05T14:31:58.393Z" }, "references": [ { @@ -164,6 +164,27 @@ "x_cve_prog_secretariat_snapshot" ], "url": "https://www.wolfssl.com/docs/security-vulnerabilities//DEMO_2024_06_19" + }, + { + "tags": [ + "patch", + "x_snapshot" + ], + "url": "https://github.com/wolfSSL/wolfssh/pull/670/adp-test-6-28" + }, + { + "tags": [ + "patch", + "x_snapshot" + ], + "url": "https://github.com/wolfSSL/wolfssh/pull/671/adp-test-6-28" + }, + { + "tags": [ + "vendor-advisory", + "x_snapshot" + ], + "url": "https://www.wolfssl.com/docs/security-vulnerabilities//adp-test-6-28" } ] } diff --git a/cves/2024/2xxx/CVE-2024-2874.json b/cves/2024/2xxx/CVE-2024-2874.json index c13a95cd021..25f2408e15d 100644 --- a/cves/2024/2xxx/CVE-2024-2874.json +++ b/cves/2024/2xxx/CVE-2024-2874.json @@ -8,7 +8,7 @@ "assignerShortName": "GitLab", "dateReserved": "2024-03-25T20:30:39.244Z", "datePublished": "2024-05-23T07:02:35.610Z", - "dateUpdated": "2024-06-21T15:38:47.019Z" + "dateUpdated": "2024-07-05T14:31:57.832Z" }, "containers": { "cna": { @@ -158,7 +158,7 @@ "providerMetadata": { "orgId": "96f1cf3c-f80a-4e0f-a063-99a91e3f1325", "shortName": "secretariat-reference", - "dateUpdated": "2024-06-21T15:38:47.019Z" + "dateUpdated": "2024-07-05T14:31:57.832Z" }, "references": [ { @@ -179,6 +179,25 @@ "permissions-required", "x_cve_prog_secretariat_snapshot" ] + }, + { + "url": "https://gitlab.com/gitlab-org/gitlab/-/issues/451911/adp-test-6-28", + "name": "GitLab Issue #451911", + "tags": [ + "issue-tracking", + "permissions-required", + "x_snapshot" + ] + }, + { + "url": "https://hackerone.com/reports/2426166/adp-test-6-28", + "name": "HackerOne Bug Bounty Report #2426166", + "tags": [ + "technical-description", + "exploit", + "permissions-required", + "x_snapshot" + ] } ] } diff --git a/cves/2024/2xxx/CVE-2024-2876.json b/cves/2024/2xxx/CVE-2024-2876.json index f7a0843c93c..1598ac0762d 100644 --- a/cves/2024/2xxx/CVE-2024-2876.json +++ b/cves/2024/2xxx/CVE-2024-2876.json @@ -8,7 +8,7 @@ "assignerShortName": "Wordfence", "dateReserved": "2024-03-25T20:45:21.270Z", "datePublished": "2024-05-02T16:52:46.382Z", - "dateUpdated": "2024-06-21T15:38:47.495Z" + "dateUpdated": "2024-07-05T14:31:58.414Z" }, "containers": { "cna": { @@ -124,7 +124,7 @@ "providerMetadata": { "orgId": "96f1cf3c-f80a-4e0f-a063-99a91e3f1325", "shortName": "secretariat-reference", - "dateUpdated": "2024-06-21T15:38:47.495Z" + "dateUpdated": "2024-07-05T14:31:58.414Z" }, "references": [ { @@ -150,6 +150,30 @@ "tags": [ "x_cve_prog_secretariat_snapshot" ] + }, + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/e0ca6ac4-0d89-4601-94fc-cce5a0af9c56?source=cve/adp-test-6-28", + "tags": [ + "x_snapshot" + ] + }, + { + "url": "https://github.com/WordpressPluginDirectory/email-subscribers/blob/main/email-subscribers/lite/includes/classes/class-ig-es-subscriber-query.php#L304/adp-test-6-28", + "tags": [ + "x_snapshot" + ] + }, + { + "url": "https://github.com/WordpressPluginDirectory/email-subscribers/blob/main/email-subscribers/lite/admin/class-email-subscribers-admin.php#L1433/adp-test-6-28", + "tags": [ + "x_snapshot" + ] + }, + { + "url": "https://plugins.trac.wordpress.org/changeset/3060251/email-subscribers/trunk/lite/includes/classes/class-ig-es-subscriber-query.php/adp-test-6-28", + "tags": [ + "x_snapshot" + ] } ] } diff --git a/cves/2024/2xxx/CVE-2024-2877.json b/cves/2024/2xxx/CVE-2024-2877.json index 66856915f46..da0530bbbc8 100644 --- a/cves/2024/2xxx/CVE-2024-2877.json +++ b/cves/2024/2xxx/CVE-2024-2877.json @@ -8,7 +8,7 @@ "assignerShortName": "HashiCorp", "dateReserved": "2024-03-25T20:59:41.034Z", "datePublished": "2024-04-30T14:58:09.735Z", - "dateUpdated": "2024-06-21T15:56:24.200Z" + "dateUpdated": "2024-07-05T14:31:58.191Z" }, "containers": { "cna": { @@ -113,7 +113,7 @@ "providerMetadata": { "orgId": "96f1cf3c-f80a-4e0f-a063-99a91e3f1325", "shortName": "secretariat-reference", - "dateUpdated": "2024-06-21T15:38:47.958Z" + "dateUpdated": "2024-07-05T14:31:58.191Z" }, "references": [ { @@ -121,6 +121,18 @@ "tags": [ "x_cve_prog_secretariat_snapshot" ] + }, + { + "url": "https://discuss.hashicorp.com/t/hsec-2024-10-vault-enterprise-leaks-sensitive-http-request-headers-in-audit-log-when-deployed-with-a-performance-standby-node/adp-test-6-28", + "tags": [ + "x_snapshot" + ] + }, + { + "url": "https://security.netapp.com/advisory/ntap-20240614-0002//adp-test-6-28", + "tags": [ + "x_snapshot" + ] } ] } diff --git a/cves/2024/2xxx/CVE-2024-2879.json b/cves/2024/2xxx/CVE-2024-2879.json index ecf49da7ec4..9b5a0a22a3d 100644 --- a/cves/2024/2xxx/CVE-2024-2879.json +++ b/cves/2024/2xxx/CVE-2024-2879.json @@ -8,7 +8,7 @@ "assignerShortName": "Wordfence", "dateReserved": "2024-03-25T21:04:54.681Z", "datePublished": "2024-04-03T03:24:41.863Z", - "dateUpdated": "2024-06-21T15:38:48.481Z" + "dateUpdated": "2024-07-05T14:31:57.691Z" }, "containers": { "cna": { @@ -86,7 +86,7 @@ "providerMetadata": { "orgId": "96f1cf3c-f80a-4e0f-a063-99a91e3f1325", "shortName": "secretariat-reference", - "dateUpdated": "2024-06-21T15:38:48.481Z" + "dateUpdated": "2024-07-05T14:31:57.691Z" }, "references": [ { @@ -100,6 +100,18 @@ "tags": [ "x_cve_prog_secretariat_snapshot" ] + }, + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/3fddf96e-029c-4753-ba82-043ca64b78d3?source=cve/adp-test-6-28", + "tags": [ + "x_snapshot" + ] + }, + { + "url": "https://layerslider.com/release-log//adp-test-6-28", + "tags": [ + "x_snapshot" + ] } ] } diff --git a/cves/2024/2xxx/CVE-2024-2882.json b/cves/2024/2xxx/CVE-2024-2882.json index f9d6028a319..0f5272dfef2 100644 --- a/cves/2024/2xxx/CVE-2024-2882.json +++ b/cves/2024/2xxx/CVE-2024-2882.json @@ -8,7 +8,7 @@ "assignerShortName": "icscert", "dateReserved": "2024-03-25T22:24:09.229Z", "datePublished": "2024-06-27T18:55:42.276Z", - "dateUpdated": "2024-06-27T18:55:42.276Z" + "dateUpdated": "2024-07-05T14:31:58.500Z" }, "containers": { "cna": { @@ -126,6 +126,24 @@ "x_generator": { "engine": "Vulnogram 0.2.0" } - } + }, + "adp": [ + { + "providerMetadata": { + "orgId": "96f1cf3c-f80a-4e0f-a063-99a91e3f1325", + "shortName": "secretariat-reference", + "dateUpdated": "2024-07-05T14:31:58.500Z" + }, + "references": [ + { + "tags": [ + "government-resource", + "x_snapshot" + ], + "url": "https://www.cisa.gov/news-events/ics-advisories/icsa-24-179-02/adp-test-6-28" + } + ] + } + ] } } \ No newline at end of file diff --git a/cves/2024/2xxx/CVE-2024-2883.json b/cves/2024/2xxx/CVE-2024-2883.json index 022c528b05a..5cede3113d0 100644 --- a/cves/2024/2xxx/CVE-2024-2883.json +++ b/cves/2024/2xxx/CVE-2024-2883.json @@ -8,7 +8,7 @@ "assignerShortName": "Chrome", "dateReserved": "2024-03-26T00:13:59.714Z", "datePublished": "2024-03-26T20:09:33.556Z", - "dateUpdated": "2024-06-21T15:38:48.859Z" + "dateUpdated": "2024-07-05T14:31:57.997Z" }, "containers": { "cna": { @@ -152,7 +152,7 @@ "providerMetadata": { "orgId": "96f1cf3c-f80a-4e0f-a063-99a91e3f1325", "shortName": "secretariat-reference", - "dateUpdated": "2024-06-21T15:38:48.859Z" + "dateUpdated": "2024-07-05T14:31:57.997Z" }, "references": [ { @@ -184,6 +184,36 @@ "tags": [ "x_cve_prog_secretariat_snapshot" ] + }, + { + "url": "https://chromereleases.googleblog.com/2024/03/stable-channel-update-for-desktop_26.html/adp-test-6-28", + "tags": [ + "x_snapshot" + ] + }, + { + "url": "https://issues.chromium.org/issues/327807820/adp-test-6-28", + "tags": [ + "x_snapshot" + ] + }, + { + "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/G3RKI7VTQSIAI3PVZGRCHOSELTQXQ5FQ//adp-test-6-28", + "tags": [ + "x_snapshot" + ] + }, + { + "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3YUWGSMA5X2NQP5XEFCLRWNX6246GZ2C//adp-test-6-28", + "tags": [ + "x_snapshot" + ] + }, + { + "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IQMRHKDEG4J7TMRRRGUGW6GS4MVBX5IT//adp-test-6-28", + "tags": [ + "x_snapshot" + ] } ] } diff --git a/cves/2024/2xxx/CVE-2024-2885.json b/cves/2024/2xxx/CVE-2024-2885.json index 81326c721ae..fe3787aff23 100644 --- a/cves/2024/2xxx/CVE-2024-2885.json +++ b/cves/2024/2xxx/CVE-2024-2885.json @@ -8,7 +8,7 @@ "assignerShortName": "Chrome", "dateReserved": "2024-03-26T00:14:00.436Z", "datePublished": "2024-03-26T20:09:33.968Z", - "dateUpdated": "2024-06-21T15:38:49.258Z" + "dateUpdated": "2024-07-05T14:31:58.391Z" }, "containers": { "cna": { @@ -152,7 +152,7 @@ "providerMetadata": { "orgId": "96f1cf3c-f80a-4e0f-a063-99a91e3f1325", "shortName": "secretariat-reference", - "dateUpdated": "2024-06-21T15:38:49.258Z" + "dateUpdated": "2024-07-05T14:31:58.391Z" }, "references": [ { @@ -184,6 +184,36 @@ "tags": [ "x_cve_prog_secretariat_snapshot" ] + }, + { + "url": "https://chromereleases.googleblog.com/2024/03/stable-channel-update-for-desktop_26.html/adp-test-6-28", + "tags": [ + "x_snapshot" + ] + }, + { + "url": "https://issues.chromium.org/issues/328958020/adp-test-6-28", + "tags": [ + "x_snapshot" + ] + }, + { + "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/G3RKI7VTQSIAI3PVZGRCHOSELTQXQ5FQ//adp-test-6-28", + "tags": [ + "x_snapshot" + ] + }, + { + "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3YUWGSMA5X2NQP5XEFCLRWNX6246GZ2C//adp-test-6-28", + "tags": [ + "x_snapshot" + ] + }, + { + "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IQMRHKDEG4J7TMRRRGUGW6GS4MVBX5IT//adp-test-6-28", + "tags": [ + "x_snapshot" + ] } ] } diff --git a/cves/2024/2xxx/CVE-2024-2886.json b/cves/2024/2xxx/CVE-2024-2886.json index dfe3a564987..9cff8ce41a8 100644 --- a/cves/2024/2xxx/CVE-2024-2886.json +++ b/cves/2024/2xxx/CVE-2024-2886.json @@ -8,7 +8,7 @@ "assignerShortName": "Chrome", "dateReserved": "2024-03-26T00:14:00.701Z", "datePublished": "2024-03-26T20:09:34.236Z", - "dateUpdated": "2024-06-21T15:38:49.685Z" + "dateUpdated": "2024-07-05T14:31:58.491Z" }, "containers": { "cna": { @@ -152,7 +152,7 @@ "providerMetadata": { "orgId": "96f1cf3c-f80a-4e0f-a063-99a91e3f1325", "shortName": "secretariat-reference", - "dateUpdated": "2024-06-21T15:38:49.685Z" + "dateUpdated": "2024-07-05T14:31:58.491Z" }, "references": [ { @@ -184,6 +184,36 @@ "tags": [ "x_cve_prog_secretariat_snapshot" ] + }, + { + "url": "https://chromereleases.googleblog.com/2024/03/stable-channel-update-for-desktop_26.html/adp-test-6-28", + "tags": [ + "x_snapshot" + ] + }, + { + "url": "https://issues.chromium.org/issues/330575496/adp-test-6-28", + "tags": [ + "x_snapshot" + ] + }, + { + "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/G3RKI7VTQSIAI3PVZGRCHOSELTQXQ5FQ//adp-test-6-28", + "tags": [ + "x_snapshot" + ] + }, + { + "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3YUWGSMA5X2NQP5XEFCLRWNX6246GZ2C//adp-test-6-28", + "tags": [ + "x_snapshot" + ] + }, + { + "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IQMRHKDEG4J7TMRRRGUGW6GS4MVBX5IT//adp-test-6-28", + "tags": [ + "x_snapshot" + ] } ] } diff --git a/cves/2024/2xxx/CVE-2024-2887.json b/cves/2024/2xxx/CVE-2024-2887.json index 4f454d2d03d..3da2c396386 100644 --- a/cves/2024/2xxx/CVE-2024-2887.json +++ b/cves/2024/2xxx/CVE-2024-2887.json @@ -8,7 +8,7 @@ "assignerShortName": "Chrome", "dateReserved": "2024-03-26T00:14:00.945Z", "datePublished": "2024-03-26T20:09:34.488Z", - "dateUpdated": "2024-06-21T15:38:50.091Z" + "dateUpdated": "2024-07-05T14:31:58.539Z" }, "containers": { "cna": { @@ -136,7 +136,7 @@ "providerMetadata": { "orgId": "96f1cf3c-f80a-4e0f-a063-99a91e3f1325", "shortName": "secretariat-reference", - "dateUpdated": "2024-06-21T15:38:50.091Z" + "dateUpdated": "2024-07-05T14:31:58.539Z" }, "references": [ { @@ -168,6 +168,36 @@ "tags": [ "x_cve_prog_secretariat_snapshot" ] + }, + { + "url": "https://chromereleases.googleblog.com/2024/03/stable-channel-update-for-desktop_26.html/adp-test-6-28", + "tags": [ + "x_snapshot" + ] + }, + { + "url": "https://issues.chromium.org/issues/330588502/adp-test-6-28", + "tags": [ + "x_snapshot" + ] + }, + { + "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/G3RKI7VTQSIAI3PVZGRCHOSELTQXQ5FQ//adp-test-6-28", + "tags": [ + "x_snapshot" + ] + }, + { + "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3YUWGSMA5X2NQP5XEFCLRWNX6246GZ2C//adp-test-6-28", + "tags": [ + "x_snapshot" + ] + }, + { + "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IQMRHKDEG4J7TMRRRGUGW6GS4MVBX5IT//adp-test-6-28", + "tags": [ + "x_snapshot" + ] } ] } diff --git a/cves/2024/2xxx/CVE-2024-2888.json b/cves/2024/2xxx/CVE-2024-2888.json index 28fac0f45c0..899dc97b753 100644 --- a/cves/2024/2xxx/CVE-2024-2888.json +++ b/cves/2024/2xxx/CVE-2024-2888.json @@ -8,7 +8,7 @@ "assignerShortName": "Patchstack", "dateReserved": "2024-03-26T05:34:28.032Z", "datePublished": "2024-03-26T05:41:02.491Z", - "dateUpdated": "2024-06-21T15:38:50.514Z" + "dateUpdated": "2024-07-05T14:31:57.930Z" }, "containers": { "cna": { @@ -143,7 +143,7 @@ "providerMetadata": { "orgId": "96f1cf3c-f80a-4e0f-a063-99a91e3f1325", "shortName": "secretariat-reference", - "dateUpdated": "2024-06-21T15:38:50.514Z" + "dateUpdated": "2024-07-05T14:31:57.930Z" }, "references": [ { @@ -152,6 +152,13 @@ "x_cve_prog_secretariat_snapshot" ], "url": "https://patchstack.com/database/vulnerability/post-and-page-builder/wordpress-post-and-page-builder-by-boldgrid-plugin-1-26-2-cross-site-scripting-xss-vulnerability?_s_id=cve/DEMO_2024_06_19" + }, + { + "tags": [ + "vdb-entry", + "x_snapshot" + ], + "url": "https://patchstack.com/database/vulnerability/post-and-page-builder/wordpress-post-and-page-builder-by-boldgrid-plugin-1-26-2-cross-site-scripting-xss-vulnerability?_s_id=cve/adp-test-6-28" } ] } diff --git a/cves/2024/2xxx/CVE-2024-2889.json b/cves/2024/2xxx/CVE-2024-2889.json index 7aa6c675d1a..e283fd14c5e 100644 --- a/cves/2024/2xxx/CVE-2024-2889.json +++ b/cves/2024/2xxx/CVE-2024-2889.json @@ -8,7 +8,7 @@ "assignerShortName": "Patchstack", "dateReserved": "2024-03-26T06:28:45.638Z", "datePublished": "2024-03-26T06:33:29.638Z", - "dateUpdated": "2024-06-21T15:38:50.899Z" + "dateUpdated": "2024-07-05T14:31:58.136Z" }, "containers": { "cna": { @@ -143,7 +143,7 @@ "providerMetadata": { "orgId": "96f1cf3c-f80a-4e0f-a063-99a91e3f1325", "shortName": "secretariat-reference", - "dateUpdated": "2024-06-21T15:38:50.899Z" + "dateUpdated": "2024-07-05T14:31:58.136Z" }, "references": [ { @@ -152,6 +152,13 @@ "x_cve_prog_secretariat_snapshot" ], "url": "https://patchstack.com/database/vulnerability/wp-lister-for-amazon/wordpress-wp-lister-lite-for-amazon-plugin-2-6-11-cross-site-scripting-xss-vulnerability?_s_id=cve/DEMO_2024_06_19" + }, + { + "tags": [ + "vdb-entry", + "x_snapshot" + ], + "url": "https://patchstack.com/database/vulnerability/wp-lister-for-amazon/wordpress-wp-lister-lite-for-amazon-plugin-2-6-11-cross-site-scripting-xss-vulnerability?_s_id=cve/adp-test-6-28" } ] } diff --git a/cves/2024/2xxx/CVE-2024-2890.json b/cves/2024/2xxx/CVE-2024-2890.json index b8c21a8aa15..b2cafb20ef1 100644 --- a/cves/2024/2xxx/CVE-2024-2890.json +++ b/cves/2024/2xxx/CVE-2024-2890.json @@ -8,7 +8,7 @@ "assignerShortName": "Patchstack", "dateReserved": "2024-03-26T06:43:17.385Z", "datePublished": "2024-03-28T06:13:53.929Z", - "dateUpdated": "2024-06-21T15:38:51.301Z" + "dateUpdated": "2024-07-05T14:31:58.511Z" }, "containers": { "cna": { @@ -132,7 +132,7 @@ "providerMetadata": { "orgId": "96f1cf3c-f80a-4e0f-a063-99a91e3f1325", "shortName": "secretariat-reference", - "dateUpdated": "2024-06-21T15:38:51.301Z" + "dateUpdated": "2024-07-05T14:31:58.511Z" }, "references": [ { @@ -141,6 +141,13 @@ "x_cve_prog_secretariat_snapshot" ], "url": "https://patchstack.com/database/vulnerability/tumult-hype-animations/wordpress-tumult-hype-animations-plugin-1-9-12-arbitrary-file-upload-vulnerability?_s_id=cve/DEMO_2024_06_19" + }, + { + "tags": [ + "vdb-entry", + "x_snapshot" + ], + "url": "https://patchstack.com/database/vulnerability/tumult-hype-animations/wordpress-tumult-hype-animations-plugin-1-9-12-arbitrary-file-upload-vulnerability?_s_id=cve/adp-test-6-28" } ] } diff --git a/cves/2024/2xxx/CVE-2024-2891.json b/cves/2024/2xxx/CVE-2024-2891.json index accbafd77ec..0cc93ccfc92 100644 --- a/cves/2024/2xxx/CVE-2024-2891.json +++ b/cves/2024/2xxx/CVE-2024-2891.json @@ -8,7 +8,7 @@ "assignerShortName": "VulDB", "dateReserved": "2024-03-26T09:25:25.245Z", "datePublished": "2024-03-26T14:00:07.492Z", - "dateUpdated": "2024-06-21T15:38:51.699Z" + "dateUpdated": "2024-07-05T14:31:58.021Z" }, "containers": { "cna": { @@ -138,7 +138,7 @@ "providerMetadata": { "orgId": "96f1cf3c-f80a-4e0f-a063-99a91e3f1325", "shortName": "secretariat-reference", - "dateUpdated": "2024-06-21T15:38:51.699Z" + "dateUpdated": "2024-07-05T14:31:58.021Z" }, "references": [ { @@ -173,6 +173,39 @@ "exploit", "x_cve_prog_secretariat_snapshot" ] + }, + { + "url": "https://vuldb.com/?id.257934/adp-test-6-28", + "name": "VDB-257934 | Tenda AC7 QuickIndex formQuickIndex stack-based overflow", + "tags": [ + "vdb-entry", + "technical-description", + "x_snapshot" + ] + }, + { + "url": "https://vuldb.com/?ctiid.257934/adp-test-6-28", + "name": "VDB-257934 | CTI Indicators (IOB, IOC, IOA)", + "tags": [ + "signature", + "permissions-required", + "x_snapshot" + ] + }, + { + "url": "https://vuldb.com/?submit.300354/adp-test-6-28", + "name": "Submit #300354 | Tenda AC7 AC7V1.0 V15.03.06.44 buffer overflow", + "tags": [ + "third-party-advisory", + "x_snapshot" + ] + }, + { + "url": "https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/AC7/v1/formQuickIndex.md/adp-test-6-28", + "tags": [ + "exploit", + "x_snapshot" + ] } ] } diff --git a/cves/2024/2xxx/CVE-2024-2892.json b/cves/2024/2xxx/CVE-2024-2892.json index d6f27e0a637..4d781465db0 100644 --- a/cves/2024/2xxx/CVE-2024-2892.json +++ b/cves/2024/2xxx/CVE-2024-2892.json @@ -8,7 +8,7 @@ "assignerShortName": "VulDB", "dateReserved": "2024-03-26T09:25:27.601Z", "datePublished": "2024-03-26T16:00:05.583Z", - "dateUpdated": "2024-06-21T15:38:52.104Z" + "dateUpdated": "2024-07-05T14:31:58.482Z" }, "containers": { "cna": { @@ -138,7 +138,7 @@ "providerMetadata": { "orgId": "96f1cf3c-f80a-4e0f-a063-99a91e3f1325", "shortName": "secretariat-reference", - "dateUpdated": "2024-06-21T15:38:52.104Z" + "dateUpdated": "2024-07-05T14:31:58.482Z" }, "references": [ { @@ -173,6 +173,39 @@ "exploit", "x_cve_prog_secretariat_snapshot" ] + }, + { + "url": "https://vuldb.com/?id.257935/adp-test-6-28", + "name": "VDB-257935 | Tenda AC7 setcfm formSetCfm stack-based overflow", + "tags": [ + "vdb-entry", + "technical-description", + "x_snapshot" + ] + }, + { + "url": "https://vuldb.com/?ctiid.257935/adp-test-6-28", + "name": "VDB-257935 | CTI Indicators (IOB, IOC, IOA)", + "tags": [ + "signature", + "permissions-required", + "x_snapshot" + ] + }, + { + "url": "https://vuldb.com/?submit.300355/adp-test-6-28", + "name": "Submit #300355 | Tenda AC7 V1.0 V15.03.06.44 buffer overflow", + "tags": [ + "third-party-advisory", + "x_snapshot" + ] + }, + { + "url": "https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/AC7/v1/formSetCfm.md/adp-test-6-28", + "tags": [ + "exploit", + "x_snapshot" + ] } ] } diff --git a/cves/2024/2xxx/CVE-2024-2893.json b/cves/2024/2xxx/CVE-2024-2893.json index 77a71bcbe1e..f7bd13b94e2 100644 --- a/cves/2024/2xxx/CVE-2024-2893.json +++ b/cves/2024/2xxx/CVE-2024-2893.json @@ -8,7 +8,7 @@ "assignerShortName": "VulDB", "dateReserved": "2024-03-26T09:25:34.223Z", "datePublished": "2024-03-26T16:31:04.545Z", - "dateUpdated": "2024-06-21T15:38:52.555Z" + "dateUpdated": "2024-07-05T14:31:58.719Z" }, "containers": { "cna": { @@ -138,7 +138,7 @@ "providerMetadata": { "orgId": "96f1cf3c-f80a-4e0f-a063-99a91e3f1325", "shortName": "secretariat-reference", - "dateUpdated": "2024-06-21T15:38:52.555Z" + "dateUpdated": "2024-07-05T14:31:58.719Z" }, "references": [ { @@ -173,6 +173,39 @@ "exploit", "x_cve_prog_secretariat_snapshot" ] + }, + { + "url": "https://vuldb.com/?id.257936/adp-test-6-28", + "name": "VDB-257936 | Tenda AC7 SetOnlineDevName formSetDeviceName stack-based overflow", + "tags": [ + "vdb-entry", + "technical-description", + "x_snapshot" + ] + }, + { + "url": "https://vuldb.com/?ctiid.257936/adp-test-6-28", + "name": "VDB-257936 | CTI Indicators (IOB, IOC, IOA)", + "tags": [ + "signature", + "permissions-required", + "x_snapshot" + ] + }, + { + "url": "https://vuldb.com/?submit.300356/adp-test-6-28", + "name": "Submit #300356 | Tenda AC7 V1.0 V15.03.06.44 buffer overflow", + "tags": [ + "third-party-advisory", + "x_snapshot" + ] + }, + { + "url": "https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/AC7/v1/formSetDeviceName_devName.md/adp-test-6-28", + "tags": [ + "exploit", + "x_snapshot" + ] } ] } diff --git a/cves/2024/2xxx/CVE-2024-2894.json b/cves/2024/2xxx/CVE-2024-2894.json index ef1d148689b..9b27eee7b23 100644 --- a/cves/2024/2xxx/CVE-2024-2894.json +++ b/cves/2024/2xxx/CVE-2024-2894.json @@ -8,7 +8,7 @@ "assignerShortName": "VulDB", "dateReserved": "2024-03-26T09:25:39.103Z", "datePublished": "2024-03-26T17:00:07.831Z", - "dateUpdated": "2024-06-21T15:38:52.961Z" + "dateUpdated": "2024-07-05T14:31:58.563Z" }, "containers": { "cna": { @@ -138,7 +138,7 @@ "providerMetadata": { "orgId": "96f1cf3c-f80a-4e0f-a063-99a91e3f1325", "shortName": "secretariat-reference", - "dateUpdated": "2024-06-21T15:38:52.961Z" + "dateUpdated": "2024-07-05T14:31:58.563Z" }, "references": [ { @@ -173,6 +173,39 @@ "exploit", "x_cve_prog_secretariat_snapshot" ] + }, + { + "url": "https://vuldb.com/?id.257937/adp-test-6-28", + "name": "VDB-257937 | Tenda AC7 SetNetControlList formSetQosBand stack-based overflow", + "tags": [ + "vdb-entry", + "technical-description", + "x_snapshot" + ] + }, + { + "url": "https://vuldb.com/?ctiid.257937/adp-test-6-28", + "name": "VDB-257937 | CTI Indicators (IOB, IOC, IOA)", + "tags": [ + "signature", + "permissions-required", + "x_snapshot" + ] + }, + { + "url": "https://vuldb.com/?submit.300357/adp-test-6-28", + "name": "Submit #300357 | Tenda AC7 V1.0 V15.03.06.44 buffer overflow", + "tags": [ + "third-party-advisory", + "x_snapshot" + ] + }, + { + "url": "https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/AC7/v1/formSetQosBand.md/adp-test-6-28", + "tags": [ + "exploit", + "x_snapshot" + ] } ] } diff --git a/cves/2024/2xxx/CVE-2024-2895.json b/cves/2024/2xxx/CVE-2024-2895.json index 28eddf408b7..341edfba99f 100644 --- a/cves/2024/2xxx/CVE-2024-2895.json +++ b/cves/2024/2xxx/CVE-2024-2895.json @@ -1,6 +1,6 @@ { "dataType": "CVE_RECORD", - "dataVersion": "5.0", + "dataVersion": "5.1", "cveMetadata": { "cveId": "CVE-2024-2895", "assignerOrgId": "1af790b2-7ee1-4545-860a-a788eba489b5", @@ -8,7 +8,7 @@ "assignerShortName": "VulDB", "dateReserved": "2024-03-26T09:25:44.223Z", "datePublished": "2024-03-26T17:31:04.304Z", - "dateUpdated": "2024-06-05T19:52:13.147Z" + "dateUpdated": "2024-07-05T14:31:58.473Z" }, "containers": { "cna": { @@ -132,6 +132,50 @@ ] } ] - } + }, + "adp": [ + { + "providerMetadata": { + "orgId": "96f1cf3c-f80a-4e0f-a063-99a91e3f1325", + "shortName": "secretariat-reference", + "dateUpdated": "2024-07-05T14:31:58.473Z" + }, + "references": [ + { + "url": "https://vuldb.com/?id.257938/adp-test-6-28", + "name": "VDB-257938 | Tenda AC7 WifiWpsOOB formWifiWpsOOB stack-based overflow", + "tags": [ + "vdb-entry", + "technical-description", + "x_snapshot" + ] + }, + { + "url": "https://vuldb.com/?ctiid.257938/adp-test-6-28", + "name": "VDB-257938 | CTI Indicators (IOB, IOC, IOA)", + "tags": [ + "signature", + "permissions-required", + "x_snapshot" + ] + }, + { + "url": "https://vuldb.com/?submit.300358/adp-test-6-28", + "name": "Submit #300358 | Tenda AC7 V1.0 V15.03.06.44 buffer overflow", + "tags": [ + "third-party-advisory", + "x_snapshot" + ] + }, + { + "url": "https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/AC7/v1/formWifiWpsOOB.md/adp-test-6-28", + "tags": [ + "exploit", + "x_snapshot" + ] + } + ] + } + ] } } \ No newline at end of file diff --git a/cves/2024/2xxx/CVE-2024-2896.json b/cves/2024/2xxx/CVE-2024-2896.json index cc315b9f5ab..0009c9e0902 100644 --- a/cves/2024/2xxx/CVE-2024-2896.json +++ b/cves/2024/2xxx/CVE-2024-2896.json @@ -8,7 +8,7 @@ "assignerShortName": "VulDB", "dateReserved": "2024-03-26T09:25:50.265Z", "datePublished": "2024-03-26T18:00:06.676Z", - "dateUpdated": "2024-06-26T19:49:54.294Z" + "dateUpdated": "2024-07-05T14:31:58.744Z" }, "containers": { "cna": { @@ -138,7 +138,7 @@ "providerMetadata": { "orgId": "96f1cf3c-f80a-4e0f-a063-99a91e3f1325", "shortName": "secretariat-reference", - "dateUpdated": "2024-06-21T15:38:53.591Z" + "dateUpdated": "2024-07-05T14:31:58.744Z" }, "references": [ { @@ -173,6 +173,39 @@ "exploit", "x_cve_prog_secretariat_snapshot" ] + }, + { + "url": "https://vuldb.com/?id.257939/adp-test-6-28", + "name": "VDB-257939 | Tenda AC7 WifiWpsStart formWifiWpsStart stack-based overflow", + "tags": [ + "vdb-entry", + "technical-description", + "x_snapshot" + ] + }, + { + "url": "https://vuldb.com/?ctiid.257939/adp-test-6-28", + "name": "VDB-257939 | CTI Indicators (IOB, IOC, IOA)", + "tags": [ + "signature", + "permissions-required", + "x_snapshot" + ] + }, + { + "url": "https://vuldb.com/?submit.300359/adp-test-6-28", + "name": "Submit #300359 | Tenda AC7 V1.0 V15.03.06.44 buffer overflow", + "tags": [ + "third-party-advisory", + "x_snapshot" + ] + }, + { + "url": "https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/AC7/v1/formWifiWpsStart.md/adp-test-6-28", + "tags": [ + "exploit", + "x_snapshot" + ] } ] } diff --git a/cves/2024/2xxx/CVE-2024-2897.json b/cves/2024/2xxx/CVE-2024-2897.json index 21f6a24a4ae..a7b83e487c1 100644 --- a/cves/2024/2xxx/CVE-2024-2897.json +++ b/cves/2024/2xxx/CVE-2024-2897.json @@ -8,7 +8,7 @@ "assignerShortName": "VulDB", "dateReserved": "2024-03-26T09:25:55.503Z", "datePublished": "2024-03-26T18:31:04.287Z", - "dateUpdated": "2024-06-21T15:38:54.023Z" + "dateUpdated": "2024-07-05T14:31:58.793Z" }, "containers": { "cna": { @@ -169,7 +169,7 @@ "providerMetadata": { "orgId": "96f1cf3c-f80a-4e0f-a063-99a91e3f1325", "shortName": "secretariat-reference", - "dateUpdated": "2024-06-21T15:38:54.023Z" + "dateUpdated": "2024-07-05T14:31:58.793Z" }, "references": [ { @@ -204,6 +204,39 @@ "exploit", "x_cve_prog_secretariat_snapshot" ] + }, + { + "url": "https://vuldb.com/?id.257940/adp-test-6-28", + "name": "VDB-257940 | Tenda AC7 WriteFacMac formWriteFacMac os command injection", + "tags": [ + "vdb-entry", + "technical-description", + "x_snapshot" + ] + }, + { + "url": "https://vuldb.com/?ctiid.257940/adp-test-6-28", + "name": "VDB-257940 | CTI Indicators (IOB, IOC, TTP, IOA)", + "tags": [ + "signature", + "permissions-required", + "x_snapshot" + ] + }, + { + "url": "https://vuldb.com/?submit.300360/adp-test-6-28", + "name": "Submit #300360 | Tenda AC7 V1.0 V15.03.06.44 command injection", + "tags": [ + "third-party-advisory", + "x_snapshot" + ] + }, + { + "url": "https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/AC7/v1/formWriteFacMac.md/adp-test-6-28", + "tags": [ + "exploit", + "x_snapshot" + ] } ] } diff --git a/cves/2024/2xxx/CVE-2024-2898.json b/cves/2024/2xxx/CVE-2024-2898.json index cedde005fa4..9dacedab1b5 100644 --- a/cves/2024/2xxx/CVE-2024-2898.json +++ b/cves/2024/2xxx/CVE-2024-2898.json @@ -8,7 +8,7 @@ "assignerShortName": "VulDB", "dateReserved": "2024-03-26T09:26:00.834Z", "datePublished": "2024-03-26T18:31:05.622Z", - "dateUpdated": "2024-06-21T15:38:54.491Z" + "dateUpdated": "2024-07-05T14:31:58.559Z" }, "containers": { "cna": { @@ -138,7 +138,7 @@ "providerMetadata": { "orgId": "96f1cf3c-f80a-4e0f-a063-99a91e3f1325", "shortName": "secretariat-reference", - "dateUpdated": "2024-06-21T15:38:54.491Z" + "dateUpdated": "2024-07-05T14:31:58.559Z" }, "references": [ { @@ -173,6 +173,39 @@ "exploit", "x_cve_prog_secretariat_snapshot" ] + }, + { + "url": "https://vuldb.com/?id.257941/adp-test-6-28", + "name": "VDB-257941 | Tenda AC7 SetStaticRouteCfg fromSetRouteStatic stack-based overflow", + "tags": [ + "vdb-entry", + "technical-description", + "x_snapshot" + ] + }, + { + "url": "https://vuldb.com/?ctiid.257941/adp-test-6-28", + "name": "VDB-257941 | CTI Indicators (IOB, IOC, IOA)", + "tags": [ + "signature", + "permissions-required", + "x_snapshot" + ] + }, + { + "url": "https://vuldb.com/?submit.300361/adp-test-6-28", + "name": "Submit #300361 | Tenda AC7 V1.0 V15.03.06.44 buffer overflow", + "tags": [ + "third-party-advisory", + "x_snapshot" + ] + }, + { + "url": "https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/AC7/v1/fromSetRouteStatic.md/adp-test-6-28", + "tags": [ + "exploit", + "x_snapshot" + ] } ] } diff --git a/cves/2024/2xxx/CVE-2024-2899.json b/cves/2024/2xxx/CVE-2024-2899.json index 0df8e82667c..06adaec27b0 100644 --- a/cves/2024/2xxx/CVE-2024-2899.json +++ b/cves/2024/2xxx/CVE-2024-2899.json @@ -8,7 +8,7 @@ "assignerShortName": "VulDB", "dateReserved": "2024-03-26T09:26:06.184Z", "datePublished": "2024-03-26T19:00:07.170Z", - "dateUpdated": "2024-06-21T15:38:54.939Z" + "dateUpdated": "2024-07-05T14:31:58.399Z" }, "containers": { "cna": { @@ -138,7 +138,7 @@ "providerMetadata": { "orgId": "96f1cf3c-f80a-4e0f-a063-99a91e3f1325", "shortName": "secretariat-reference", - "dateUpdated": "2024-06-21T15:38:54.939Z" + "dateUpdated": "2024-07-05T14:31:58.399Z" }, "references": [ { @@ -173,6 +173,39 @@ "exploit", "x_cve_prog_secretariat_snapshot" ] + }, + { + "url": "https://vuldb.com/?id.257942/adp-test-6-28", + "name": "VDB-257942 | Tenda AC7 WifiExtraSet fromSetWirelessRepeat stack-based overflow", + "tags": [ + "vdb-entry", + "technical-description", + "x_snapshot" + ] + }, + { + "url": "https://vuldb.com/?ctiid.257942/adp-test-6-28", + "name": "VDB-257942 | CTI Indicators (IOB, IOC, IOA)", + "tags": [ + "signature", + "permissions-required", + "x_snapshot" + ] + }, + { + "url": "https://vuldb.com/?submit.300362/adp-test-6-28", + "name": "Submit #300362 | Tenda AC7 V1.0 V15.03.06.44 buffer overflow", + "tags": [ + "third-party-advisory", + "x_snapshot" + ] + }, + { + "url": "https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/AC7/v1/fromSetWirelessRepeat.md/adp-test-6-28", + "tags": [ + "exploit", + "x_snapshot" + ] } ] } diff --git a/cves/2024/2xxx/CVE-2024-2900.json b/cves/2024/2xxx/CVE-2024-2900.json index ecf9ffc9669..7f9317d4976 100644 --- a/cves/2024/2xxx/CVE-2024-2900.json +++ b/cves/2024/2xxx/CVE-2024-2900.json @@ -8,7 +8,7 @@ "assignerShortName": "VulDB", "dateReserved": "2024-03-26T09:26:11.290Z", "datePublished": "2024-03-26T19:31:04.524Z", - "dateUpdated": "2024-06-21T15:38:55.342Z" + "dateUpdated": "2024-07-05T14:31:58.561Z" }, "containers": { "cna": { @@ -138,7 +138,7 @@ "providerMetadata": { "orgId": "96f1cf3c-f80a-4e0f-a063-99a91e3f1325", "shortName": "secretariat-reference", - "dateUpdated": "2024-06-21T15:38:55.342Z" + "dateUpdated": "2024-07-05T14:31:58.561Z" }, "references": [ { @@ -173,6 +173,39 @@ "exploit", "x_cve_prog_secretariat_snapshot" ] + }, + { + "url": "https://vuldb.com/?id.257943/adp-test-6-28", + "name": "VDB-257943 | Tenda AC7 saveParentControlInfo stack-based overflow", + "tags": [ + "vdb-entry", + "technical-description", + "x_snapshot" + ] + }, + { + "url": "https://vuldb.com/?ctiid.257943/adp-test-6-28", + "name": "VDB-257943 | CTI Indicators (IOB, IOC, IOA)", + "tags": [ + "signature", + "permissions-required", + "x_snapshot" + ] + }, + { + "url": "https://vuldb.com/?submit.300364/adp-test-6-28", + "name": "Submit #300364 | Tenda AC7 V1.0 V15.03.06.44 buffer overflow", + "tags": [ + "third-party-advisory", + "x_snapshot" + ] + }, + { + "url": "https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/AC7/v1/saveParentControlInfo_deviceId.md/adp-test-6-28", + "tags": [ + "exploit", + "x_snapshot" + ] } ] } diff --git a/cves/2024/2xxx/CVE-2024-2901.json b/cves/2024/2xxx/CVE-2024-2901.json index 1c68cb5016a..c45570fb82c 100644 --- a/cves/2024/2xxx/CVE-2024-2901.json +++ b/cves/2024/2xxx/CVE-2024-2901.json @@ -8,7 +8,7 @@ "assignerShortName": "VulDB", "dateReserved": "2024-03-26T09:26:24.727Z", "datePublished": "2024-03-26T20:00:06.887Z", - "dateUpdated": "2024-06-21T15:38:55.855Z" + "dateUpdated": "2024-07-05T14:31:58.919Z" }, "containers": { "cna": { @@ -138,7 +138,7 @@ "providerMetadata": { "orgId": "96f1cf3c-f80a-4e0f-a063-99a91e3f1325", "shortName": "secretariat-reference", - "dateUpdated": "2024-06-21T15:38:55.855Z" + "dateUpdated": "2024-07-05T14:31:58.919Z" }, "references": [ { @@ -173,6 +173,39 @@ "exploit", "x_cve_prog_secretariat_snapshot" ] + }, + { + "url": "https://vuldb.com/?id.257944/adp-test-6-28", + "name": "VDB-257944 | Tenda AC7 openSchedWifi setSchedWifi stack-based overflow", + "tags": [ + "vdb-entry", + "technical-description", + "x_snapshot" + ] + }, + { + "url": "https://vuldb.com/?ctiid.257944/adp-test-6-28", + "name": "VDB-257944 | CTI Indicators (IOB, IOC, IOA)", + "tags": [ + "signature", + "permissions-required", + "x_snapshot" + ] + }, + { + "url": "https://vuldb.com/?submit.300367/adp-test-6-28", + "name": "Submit #300367 | Tenda AC7 V1.0 V15.03.06.44 buffer overflow", + "tags": [ + "third-party-advisory", + "x_snapshot" + ] + }, + { + "url": "https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/AC7/v1/setSchedWifi.md/adp-test-6-28", + "tags": [ + "exploit", + "x_snapshot" + ] } ] } diff --git a/cves/2024/2xxx/CVE-2024-2902.json b/cves/2024/2xxx/CVE-2024-2902.json index 8b2d426d988..0f14d92d106 100644 --- a/cves/2024/2xxx/CVE-2024-2902.json +++ b/cves/2024/2xxx/CVE-2024-2902.json @@ -8,7 +8,7 @@ "assignerShortName": "VulDB", "dateReserved": "2024-03-26T09:26:38.442Z", "datePublished": "2024-03-26T20:00:08.534Z", - "dateUpdated": "2024-06-21T15:38:56.303Z" + "dateUpdated": "2024-07-05T14:31:58.593Z" }, "containers": { "cna": { @@ -138,7 +138,7 @@ "providerMetadata": { "orgId": "96f1cf3c-f80a-4e0f-a063-99a91e3f1325", "shortName": "secretariat-reference", - "dateUpdated": "2024-06-21T15:38:56.303Z" + "dateUpdated": "2024-07-05T14:31:58.593Z" }, "references": [ { @@ -173,6 +173,39 @@ "exploit", "x_cve_prog_secretariat_snapshot" ] + }, + { + "url": "https://vuldb.com/?id.257945/adp-test-6-28", + "name": "VDB-257945 | Tenda AC7 WifiGuestSet fromSetWifiGusetBasic stack-based overflow", + "tags": [ + "vdb-entry", + "technical-description", + "x_snapshot" + ] + }, + { + "url": "https://vuldb.com/?ctiid.257945/adp-test-6-28", + "name": "VDB-257945 | CTI Indicators (IOB, IOC, IOA)", + "tags": [ + "signature", + "permissions-required", + "x_snapshot" + ] + }, + { + "url": "https://vuldb.com/?submit.300449/adp-test-6-28", + "name": "Submit #300449 | Tenda AC7 V1.0 V15.03.06.44 buffer overflow", + "tags": [ + "third-party-advisory", + "x_snapshot" + ] + }, + { + "url": "https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/AC7/v1/fromSetWifiGusetBasic.md/adp-test-6-28", + "tags": [ + "exploit", + "x_snapshot" + ] } ] } diff --git a/cves/2024/2xxx/CVE-2024-2903.json b/cves/2024/2xxx/CVE-2024-2903.json index 9c44a7faab5..a61b1b20464 100644 --- a/cves/2024/2xxx/CVE-2024-2903.json +++ b/cves/2024/2xxx/CVE-2024-2903.json @@ -8,7 +8,7 @@ "assignerShortName": "VulDB", "dateReserved": "2024-03-26T09:26:47.360Z", "datePublished": "2024-03-26T20:31:04.040Z", - "dateUpdated": "2024-06-21T15:38:56.699Z" + "dateUpdated": "2024-07-05T14:31:58.535Z" }, "containers": { "cna": { @@ -138,7 +138,7 @@ "providerMetadata": { "orgId": "96f1cf3c-f80a-4e0f-a063-99a91e3f1325", "shortName": "secretariat-reference", - "dateUpdated": "2024-06-21T15:38:56.699Z" + "dateUpdated": "2024-07-05T14:31:58.535Z" }, "references": [ { @@ -173,6 +173,39 @@ "exploit", "x_cve_prog_secretariat_snapshot" ] + }, + { + "url": "https://vuldb.com/?id.257946/adp-test-6-28", + "name": "VDB-257946 | Tenda AC7 GetParentControlInfo stack-based overflow", + "tags": [ + "vdb-entry", + "technical-description", + "x_snapshot" + ] + }, + { + "url": "https://vuldb.com/?ctiid.257946/adp-test-6-28", + "name": "VDB-257946 | CTI Indicators (IOB, IOC, IOA)", + "tags": [ + "signature", + "permissions-required", + "x_snapshot" + ] + }, + { + "url": "https://vuldb.com/?submit.300452/adp-test-6-28", + "name": "Submit #300452 | Tenda AC7 V1.0 V15.03.06.44 buffer overflow", + "tags": [ + "third-party-advisory", + "x_snapshot" + ] + }, + { + "url": "https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/AC7/v1/GetParentControlInfo.md/adp-test-6-28", + "tags": [ + "exploit", + "x_snapshot" + ] } ] } diff --git a/cves/2024/2xxx/CVE-2024-2904.json b/cves/2024/2xxx/CVE-2024-2904.json index e18b94329e4..933eaabf68a 100644 --- a/cves/2024/2xxx/CVE-2024-2904.json +++ b/cves/2024/2xxx/CVE-2024-2904.json @@ -8,7 +8,7 @@ "assignerShortName": "Patchstack", "dateReserved": "2024-03-26T09:39:29.919Z", "datePublished": "2024-03-26T09:45:57.977Z", - "dateUpdated": "2024-06-21T15:38:57.089Z" + "dateUpdated": "2024-07-05T14:31:58.568Z" }, "containers": { "cna": { @@ -132,7 +132,7 @@ "providerMetadata": { "orgId": "96f1cf3c-f80a-4e0f-a063-99a91e3f1325", "shortName": "secretariat-reference", - "dateUpdated": "2024-06-21T15:38:57.089Z" + "dateUpdated": "2024-07-05T14:31:58.568Z" }, "references": [ { @@ -141,6 +141,13 @@ "x_cve_prog_secretariat_snapshot" ], "url": "https://patchstack.com/database/vulnerability/calliope/wordpress-calliope-theme-1-0-33-cross-site-request-forgery-csrf-vulnerability?_s_id=cve/DEMO_2024_06_19" + }, + { + "tags": [ + "vdb-entry", + "x_snapshot" + ], + "url": "https://patchstack.com/database/vulnerability/calliope/wordpress-calliope-theme-1-0-33-cross-site-request-forgery-csrf-vulnerability?_s_id=cve/adp-test-6-28" } ] } diff --git a/cves/2024/2xxx/CVE-2024-2905.json b/cves/2024/2xxx/CVE-2024-2905.json index ef00eb9ef88..861d2fb51c8 100644 --- a/cves/2024/2xxx/CVE-2024-2905.json +++ b/cves/2024/2xxx/CVE-2024-2905.json @@ -8,7 +8,7 @@ "assignerShortName": "redhat", "dateReserved": "2024-03-26T11:53:25.040Z", "datePublished": "2024-04-25T17:44:15.985Z", - "dateUpdated": "2024-06-18T20:12:26.235Z" + "dateUpdated": "2024-07-05T14:31:58.066Z" }, "containers": { "cna": { @@ -211,6 +211,56 @@ "shortName": "CISAADP", "dateUpdated": "2024-05-16T18:55:04.066Z" } + }, + { + "providerMetadata": { + "orgId": "96f1cf3c-f80a-4e0f-a063-99a91e3f1325", + "shortName": "secretariat-reference", + "dateUpdated": "2024-07-05T14:31:58.066Z" + }, + "references": [ + { + "url": "https://access.redhat.com/errata/RHSA-2024:3401/adp-test-6-28", + "name": "RHSA-2024:3401", + "tags": [ + "vendor-advisory", + "x_refsource_REDHAT", + "x_snapshot" + ] + }, + { + "url": "https://access.redhat.com/errata/RHSA-2024:3823/adp-test-6-28", + "name": "RHSA-2024:3823", + "tags": [ + "vendor-advisory", + "x_refsource_REDHAT", + "x_snapshot" + ] + }, + { + "url": "https://access.redhat.com/security/cve/CVE-2024-2905/adp-test-6-28", + "tags": [ + "vdb-entry", + "x_refsource_REDHAT", + "x_snapshot" + ] + }, + { + "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2271585/adp-test-6-28", + "name": "RHBZ#2271585", + "tags": [ + "issue-tracking", + "x_refsource_REDHAT", + "x_snapshot" + ] + }, + { + "url": "https://github.com/coreos/rpm-ostree/security/advisories/GHSA-2m76-cwhg-7wv6/adp-test-6-28", + "tags": [ + "x_snapshot" + ] + } + ] } ] } diff --git a/cves/2024/2xxx/CVE-2024-2906.json b/cves/2024/2xxx/CVE-2024-2906.json index bcc757b6c7a..3c2d12500e7 100644 --- a/cves/2024/2xxx/CVE-2024-2906.json +++ b/cves/2024/2xxx/CVE-2024-2906.json @@ -8,7 +8,7 @@ "assignerShortName": "Patchstack", "dateReserved": "2024-03-26T12:22:10.670Z", "datePublished": "2024-03-26T12:25:39.778Z", - "dateUpdated": "2024-06-21T15:38:57.595Z" + "dateUpdated": "2024-07-05T14:31:58.556Z" }, "containers": { "cna": { @@ -132,7 +132,7 @@ "providerMetadata": { "orgId": "96f1cf3c-f80a-4e0f-a063-99a91e3f1325", "shortName": "secretariat-reference", - "dateUpdated": "2024-06-21T15:38:57.595Z" + "dateUpdated": "2024-07-05T14:31:58.556Z" }, "references": [ { @@ -141,6 +141,13 @@ "x_cve_prog_secretariat_snapshot" ], "url": "https://patchstack.com/database/vulnerability/radio-player/wordpress-radio-player-plugin-2-0-73-unauthenticated-broken-access-control-vulnerability?_s_id=cve/DEMO_2024_06_19" + }, + { + "tags": [ + "vdb-entry", + "x_snapshot" + ], + "url": "https://patchstack.com/database/vulnerability/radio-player/wordpress-radio-player-plugin-2-0-73-unauthenticated-broken-access-control-vulnerability?_s_id=cve/adp-test-6-28" } ] } diff --git a/cves/2024/2xxx/CVE-2024-2907.json b/cves/2024/2xxx/CVE-2024-2907.json index 52f7bb69053..8c635dc54c7 100644 --- a/cves/2024/2xxx/CVE-2024-2907.json +++ b/cves/2024/2xxx/CVE-2024-2907.json @@ -8,7 +8,7 @@ "assignerShortName": "WPScan", "dateReserved": "2024-03-26T12:41:04.437Z", "datePublished": "2024-04-25T05:00:01.952Z", - "dateUpdated": "2024-06-21T15:38:57.989Z" + "dateUpdated": "2024-07-05T14:31:58.826Z" }, "containers": { "cna": { @@ -84,7 +84,7 @@ "providerMetadata": { "orgId": "96f1cf3c-f80a-4e0f-a063-99a91e3f1325", "shortName": "secretariat-reference", - "dateUpdated": "2024-06-21T15:38:57.989Z" + "dateUpdated": "2024-07-05T14:31:58.826Z" }, "references": [ { @@ -95,6 +95,15 @@ "technical-description", "x_cve_prog_secretariat_snapshot" ] + }, + { + "url": "https://wpscan.com/vulnerability/d2588b47-a518-4cb2-a557-2c7eaffa17e4//adp-test-6-28", + "tags": [ + "exploit", + "vdb-entry", + "technical-description", + "x_snapshot" + ] } ] } diff --git a/cves/2024/2xxx/CVE-2024-2908.json b/cves/2024/2xxx/CVE-2024-2908.json index d1619a7786c..20786e28583 100644 --- a/cves/2024/2xxx/CVE-2024-2908.json +++ b/cves/2024/2xxx/CVE-2024-2908.json @@ -8,7 +8,7 @@ "assignerShortName": "WPScan", "dateReserved": "2024-03-26T13:31:49.568Z", "datePublished": "2024-04-26T05:00:03.651Z", - "dateUpdated": "2024-06-21T15:38:58.391Z" + "dateUpdated": "2024-07-05T14:31:58.560Z" }, "containers": { "cna": { @@ -150,7 +150,7 @@ "providerMetadata": { "orgId": "96f1cf3c-f80a-4e0f-a063-99a91e3f1325", "shortName": "secretariat-reference", - "dateUpdated": "2024-06-21T15:38:58.391Z" + "dateUpdated": "2024-07-05T14:31:58.560Z" }, "references": [ { @@ -161,6 +161,15 @@ "technical-description", "x_cve_prog_secretariat_snapshot" ] + }, + { + "url": "https://wpscan.com/vulnerability/58c9e088-ed74-461a-b305-e217679f26c1//adp-test-6-28", + "tags": [ + "exploit", + "vdb-entry", + "technical-description", + "x_snapshot" + ] } ] } diff --git a/cves/2024/2xxx/CVE-2024-2909.json b/cves/2024/2xxx/CVE-2024-2909.json index c0739ad6521..c371d300040 100644 --- a/cves/2024/2xxx/CVE-2024-2909.json +++ b/cves/2024/2xxx/CVE-2024-2909.json @@ -8,7 +8,7 @@ "assignerShortName": "VulDB", "dateReserved": "2024-03-26T13:43:58.219Z", "datePublished": "2024-03-26T21:00:06.849Z", - "dateUpdated": "2024-06-21T15:38:58.779Z" + "dateUpdated": "2024-07-05T14:31:58.514Z" }, "containers": { "cna": { @@ -141,7 +141,7 @@ "providerMetadata": { "orgId": "96f1cf3c-f80a-4e0f-a063-99a91e3f1325", "shortName": "secretariat-reference", - "dateUpdated": "2024-06-21T15:38:58.779Z" + "dateUpdated": "2024-07-05T14:31:58.514Z" }, "references": [ { @@ -176,6 +176,39 @@ "exploit", "x_cve_prog_secretariat_snapshot" ] + }, + { + "url": "https://vuldb.com/?id.257977/adp-test-6-28", + "name": "VDB-257977 | Ruijie RG-EG350 HTTP POST Request setAction os command injection", + "tags": [ + "vdb-entry", + "technical-description", + "x_snapshot" + ] + }, + { + "url": "https://vuldb.com/?ctiid.257977/adp-test-6-28", + "name": "VDB-257977 | CTI Indicators (IOB, IOC, TTP, IOA)", + "tags": [ + "signature", + "permissions-required", + "x_snapshot" + ] + }, + { + "url": "https://vuldb.com/?submit.300368/adp-test-6-28", + "name": "Submit #300368 | Ruijie Easy Gateway Management System EG350 Remote Code Execution", + "tags": [ + "third-party-advisory", + "x_snapshot" + ] + }, + { + "url": "https://h0e4a0r1t.github.io/2024/vulns/Ruijie%20EG350%20Easy%20Gateway%20Management%20System%20Exists%20Remote%20Code%20Execution%20Vulnerability%20networksafe.php.pdf/adp-test-6-28", + "tags": [ + "exploit", + "x_snapshot" + ] } ] } diff --git a/cves/2024/2xxx/CVE-2024-2910.json b/cves/2024/2xxx/CVE-2024-2910.json index 2980f3d8da7..3251a3ff005 100644 --- a/cves/2024/2xxx/CVE-2024-2910.json +++ b/cves/2024/2xxx/CVE-2024-2910.json @@ -1,6 +1,6 @@ { "dataType": "CVE_RECORD", - "dataVersion": "5.0", + "dataVersion": "5.1", "cveMetadata": { "cveId": "CVE-2024-2910", "assignerOrgId": "1af790b2-7ee1-4545-860a-a788eba489b5", @@ -8,7 +8,7 @@ "assignerShortName": "VulDB", "dateReserved": "2024-03-26T13:44:00.303Z", "datePublished": "2024-03-26T21:00:08.652Z", - "dateUpdated": "2024-06-05T19:50:05.546Z" + "dateUpdated": "2024-07-05T14:31:58.740Z" }, "containers": { "cna": { @@ -135,6 +135,50 @@ ] } ] - } + }, + "adp": [ + { + "providerMetadata": { + "orgId": "96f1cf3c-f80a-4e0f-a063-99a91e3f1325", + "shortName": "secretariat-reference", + "dateUpdated": "2024-07-05T14:31:58.740Z" + }, + "references": [ + { + "url": "https://vuldb.com/?id.257978/adp-test-6-28", + "name": "VDB-257978 | Ruijie RG-EG350 HTTP POST Request vpnAction os command injection", + "tags": [ + "vdb-entry", + "technical-description", + "x_snapshot" + ] + }, + { + "url": "https://vuldb.com/?ctiid.257978/adp-test-6-28", + "name": "VDB-257978 | CTI Indicators (IOB, IOC, TTP, IOA)", + "tags": [ + "signature", + "permissions-required", + "x_snapshot" + ] + }, + { + "url": "https://vuldb.com/?submit.300372/adp-test-6-28", + "name": "Submit #300372 | Ruijie Easy Gateway Management System EG350 Remote Code Execution", + "tags": [ + "third-party-advisory", + "x_snapshot" + ] + }, + { + "url": "https://h0e4a0r1t.github.io/2024/vulns/Ruijie%20EG350%20Easy%20Gateway%20Management%20System%20Exists%20Remote%20Code%20Execution%20Vulnerability_vpn_quickset_service.php.pdf/adp-test-6-28", + "tags": [ + "exploit", + "x_snapshot" + ] + } + ] + } + ] } } \ No newline at end of file diff --git a/cves/2024/2xxx/CVE-2024-2911.json b/cves/2024/2xxx/CVE-2024-2911.json index ca2b4a791c4..74f5aab0dad 100644 --- a/cves/2024/2xxx/CVE-2024-2911.json +++ b/cves/2024/2xxx/CVE-2024-2911.json @@ -8,7 +8,7 @@ "assignerShortName": "VulDB", "dateReserved": "2024-03-26T13:48:21.715Z", "datePublished": "2024-03-26T21:31:04.749Z", - "dateUpdated": "2024-06-26T19:43:38.636Z" + "dateUpdated": "2024-07-05T14:31:58.936Z" }, "containers": { "cna": { @@ -137,7 +137,7 @@ "providerMetadata": { "orgId": "96f1cf3c-f80a-4e0f-a063-99a91e3f1325", "shortName": "secretariat-reference", - "dateUpdated": "2024-06-21T15:38:59.283Z" + "dateUpdated": "2024-07-05T14:31:58.936Z" }, "references": [ { @@ -171,6 +171,38 @@ "exploit", "x_cve_prog_secretariat_snapshot" ] + }, + { + "url": "https://vuldb.com/?id.257979/adp-test-6-28", + "name": "VDB-257979 | Tianjin PubliCMS cross-site request forgery", + "tags": [ + "vdb-entry", + "x_snapshot" + ] + }, + { + "url": "https://vuldb.com/?ctiid.257979/adp-test-6-28", + "name": "VDB-257979 | CTI Indicators (IOB, IOC)", + "tags": [ + "signature", + "permissions-required", + "x_snapshot" + ] + }, + { + "url": "https://vuldb.com/?submit.300339/adp-test-6-28", + "name": "Submit #300339 | TIANJIN Heycore Technology Co.Ltd publiccms V4.0.202302.e CSRF", + "tags": [ + "third-party-advisory", + "x_snapshot" + ] + }, + { + "url": "https://github.com/sweatxi/BugHub/blob/main/publiccms_csrf.pdf/adp-test-6-28", + "tags": [ + "exploit", + "x_snapshot" + ] } ] } diff --git a/cves/2024/2xxx/CVE-2024-2912.json b/cves/2024/2xxx/CVE-2024-2912.json index ae0d200bc8f..0f217daf786 100644 --- a/cves/2024/2xxx/CVE-2024-2912.json +++ b/cves/2024/2xxx/CVE-2024-2912.json @@ -1,6 +1,6 @@ { "dataType": "CVE_RECORD", - "dataVersion": "5.0", + "dataVersion": "5.1", "cveMetadata": { "cveId": "CVE-2024-2912", "assignerOrgId": "c09c270a-b464-47c1-9133-acb35b22c19a", @@ -8,7 +8,7 @@ "assignerShortName": "@huntr_ai", "dateReserved": "2024-03-26T14:04:26.687Z", "datePublished": "2024-04-16T00:00:15.110Z", - "dateUpdated": "2024-06-05T19:48:04.445Z" + "dateUpdated": "2024-07-05T14:31:58.754Z" }, "containers": { "cna": { @@ -98,6 +98,29 @@ "x_generator": { "engine": "Vulnogram 0.2.0" } - } + }, + "adp": [ + { + "providerMetadata": { + "orgId": "96f1cf3c-f80a-4e0f-a063-99a91e3f1325", + "shortName": "secretariat-reference", + "dateUpdated": "2024-07-05T14:31:58.754Z" + }, + "references": [ + { + "url": "https://huntr.com/bounties/349a1cce-6bb5-4345-82a5-bf7041b65a68/adp-test-6-28", + "tags": [ + "x_snapshot" + ] + }, + { + "url": "https://github.com/bentoml/bentoml/commit/fd70379733c57c6368cc022ac1f841b7b426db7b/adp-test-6-28", + "tags": [ + "x_snapshot" + ] + } + ] + } + ] } } \ No newline at end of file diff --git a/cves/2024/2xxx/CVE-2024-2913.json b/cves/2024/2xxx/CVE-2024-2913.json index 9558a9f92ff..4593c18ee86 100644 --- a/cves/2024/2xxx/CVE-2024-2913.json +++ b/cves/2024/2xxx/CVE-2024-2913.json @@ -8,7 +8,7 @@ "assignerShortName": "@huntr_ai", "dateReserved": "2024-03-26T14:04:50.427Z", "datePublished": "2024-05-06T23:42:10.887Z", - "dateUpdated": "2024-06-21T15:38:59.806Z" + "dateUpdated": "2024-07-05T14:31:58.796Z" }, "containers": { "cna": { @@ -131,7 +131,7 @@ "providerMetadata": { "orgId": "96f1cf3c-f80a-4e0f-a063-99a91e3f1325", "shortName": "secretariat-reference", - "dateUpdated": "2024-06-21T15:38:59.806Z" + "dateUpdated": "2024-07-05T14:31:58.796Z" }, "references": [ { @@ -139,6 +139,12 @@ "tags": [ "x_cve_prog_secretariat_snapshot" ] + }, + { + "url": "https://huntr.com/bounties/a3c69faf-cca0-4c10-8739-57e5bef7a95f/adp-test-6-28", + "tags": [ + "x_snapshot" + ] } ] } diff --git a/cves/2024/2xxx/CVE-2024-2914.json b/cves/2024/2xxx/CVE-2024-2914.json index df13cc9e848..429d6ab90e5 100644 --- a/cves/2024/2xxx/CVE-2024-2914.json +++ b/cves/2024/2xxx/CVE-2024-2914.json @@ -8,7 +8,7 @@ "assignerShortName": "@huntr_ai", "dateReserved": "2024-03-26T14:05:08.782Z", "datePublished": "2024-06-06T17:55:55.145Z", - "dateUpdated": "2024-06-07T19:44:54.920Z" + "dateUpdated": "2024-07-05T14:31:58.127Z" }, "containers": { "cna": { @@ -80,6 +80,29 @@ "advisory": "b064bd2f-bf6e-4fc0-898e-7d02a9b97e24", "discovery": "EXTERNAL" } - } + }, + "adp": [ + { + "providerMetadata": { + "orgId": "96f1cf3c-f80a-4e0f-a063-99a91e3f1325", + "shortName": "secretariat-reference", + "dateUpdated": "2024-07-05T14:31:58.127Z" + }, + "references": [ + { + "url": "https://huntr.com/bounties/b064bd2f-bf6e-4fc0-898e-7d02a9b97e24/adp-test-6-28", + "tags": [ + "x_snapshot" + ] + }, + { + "url": "https://github.com/deepjavalibrary/djl/commit/5235be508cec9e8cb6f496a4ed2fa40e4f62c370/adp-test-6-28", + "tags": [ + "x_snapshot" + ] + } + ] + } + ] } } \ No newline at end of file diff --git a/cves/2024/2xxx/CVE-2024-2915.json b/cves/2024/2xxx/CVE-2024-2915.json index 5333ec290f1..916ec9fbb64 100644 --- a/cves/2024/2xxx/CVE-2024-2915.json +++ b/cves/2024/2xxx/CVE-2024-2915.json @@ -8,7 +8,7 @@ "assignerShortName": "DEVOLUTIONS", "dateReserved": "2024-03-26T14:09:08.146Z", "datePublished": "2024-03-26T15:51:02.451Z", - "dateUpdated": "2024-06-21T15:39:00.331Z" + "dateUpdated": "2024-07-05T14:31:58.567Z" }, "containers": { "cna": { @@ -62,7 +62,7 @@ "providerMetadata": { "orgId": "96f1cf3c-f80a-4e0f-a063-99a91e3f1325", "shortName": "secretariat-reference", - "dateUpdated": "2024-06-21T15:39:00.331Z" + "dateUpdated": "2024-07-05T14:31:58.567Z" }, "references": [ { @@ -70,6 +70,12 @@ "tags": [ "x_cve_prog_secretariat_snapshot" ] + }, + { + "url": "https://devolutions.net/security/advisories/DEVO-2024-0005/adp-test-6-28", + "tags": [ + "x_snapshot" + ] } ] } diff --git a/cves/2024/2xxx/CVE-2024-2916.json b/cves/2024/2xxx/CVE-2024-2916.json index 136c80b8e65..21f21bc7ff7 100644 --- a/cves/2024/2xxx/CVE-2024-2916.json +++ b/cves/2024/2xxx/CVE-2024-2916.json @@ -8,7 +8,7 @@ "assignerShortName": "VulDB", "dateReserved": "2024-03-26T14:15:32.366Z", "datePublished": "2024-03-26T22:31:04.587Z", - "dateUpdated": "2024-06-21T15:39:00.799Z" + "dateUpdated": "2024-07-05T14:31:58.116Z" }, "containers": { "cna": { @@ -138,7 +138,7 @@ "providerMetadata": { "orgId": "96f1cf3c-f80a-4e0f-a063-99a91e3f1325", "shortName": "secretariat-reference", - "dateUpdated": "2024-06-21T15:39:00.799Z" + "dateUpdated": "2024-07-05T14:31:58.116Z" }, "references": [ { @@ -173,6 +173,39 @@ "exploit", "x_cve_prog_secretariat_snapshot" ] + }, + { + "url": "https://vuldb.com/?id.257982/adp-test-6-28", + "name": "VDB-257982 | Campcodes House Rental Management System ajax.php sql injection", + "tags": [ + "vdb-entry", + "technical-description", + "x_snapshot" + ] + }, + { + "url": "https://vuldb.com/?ctiid.257982/adp-test-6-28", + "name": "VDB-257982 | CTI Indicators (IOB, IOC, TTP, IOA)", + "tags": [ + "signature", + "permissions-required", + "x_snapshot" + ] + }, + { + "url": "https://vuldb.com/?submit.303671/adp-test-6-28", + "name": "Submit #303671 | campcodes House Rental Management System ≤1.0 SQL injection", + "tags": [ + "third-party-advisory", + "x_snapshot" + ] + }, + { + "url": "https://github.com/E1CHO/cve_hub/blob/main/House%20Rental%20Management%20System%20-%20vuln%201.pdf/adp-test-6-28", + "tags": [ + "exploit", + "x_snapshot" + ] } ] } diff --git a/cves/2024/2xxx/CVE-2024-2917.json b/cves/2024/2xxx/CVE-2024-2917.json index 38487f459bb..d60086c3f29 100644 --- a/cves/2024/2xxx/CVE-2024-2917.json +++ b/cves/2024/2xxx/CVE-2024-2917.json @@ -8,7 +8,7 @@ "assignerShortName": "VulDB", "dateReserved": "2024-03-26T14:15:35.303Z", "datePublished": "2024-03-26T23:00:07.496Z", - "dateUpdated": "2024-06-21T15:39:01.258Z" + "dateUpdated": "2024-07-05T14:31:58.852Z" }, "containers": { "cna": { @@ -138,7 +138,7 @@ "providerMetadata": { "orgId": "96f1cf3c-f80a-4e0f-a063-99a91e3f1325", "shortName": "secretariat-reference", - "dateUpdated": "2024-06-21T15:39:01.258Z" + "dateUpdated": "2024-07-05T14:31:58.852Z" }, "references": [ { @@ -173,6 +173,39 @@ "exploit", "x_cve_prog_secretariat_snapshot" ] + }, + { + "url": "https://vuldb.com/?id.257983/adp-test-6-28", + "name": "VDB-257983 | Campcodes House Rental Management System index.php file inclusion", + "tags": [ + "vdb-entry", + "technical-description", + "x_snapshot" + ] + }, + { + "url": "https://vuldb.com/?ctiid.257983/adp-test-6-28", + "name": "VDB-257983 | CTI Indicators (IOB, IOC, IOA)", + "tags": [ + "signature", + "permissions-required", + "x_snapshot" + ] + }, + { + "url": "https://vuldb.com/?submit.303672/adp-test-6-28", + "name": "Submit #303672 | campcodes House Rental Management System ≤1.0 File inclusion", + "tags": [ + "third-party-advisory", + "x_snapshot" + ] + }, + { + "url": "https://github.com/E1CHO/cve_hub/blob/main/House%20Rental%20Management%20System%20-%20vuln%202.pdf/adp-test-6-28", + "tags": [ + "exploit", + "x_snapshot" + ] } ] } diff --git a/cves/2024/2xxx/CVE-2024-2918.json b/cves/2024/2xxx/CVE-2024-2918.json index cb4e906def0..89b291c3085 100644 --- a/cves/2024/2xxx/CVE-2024-2918.json +++ b/cves/2024/2xxx/CVE-2024-2918.json @@ -8,7 +8,7 @@ "assignerShortName": "DEVOLUTIONS", "dateReserved": "2024-03-26T14:34:43.108Z", "datePublished": "2024-04-09T18:42:44.643Z", - "dateUpdated": "2024-06-21T15:39:01.724Z" + "dateUpdated": "2024-07-05T14:31:58.548Z" }, "containers": { "cna": { @@ -62,7 +62,7 @@ "providerMetadata": { "orgId": "96f1cf3c-f80a-4e0f-a063-99a91e3f1325", "shortName": "secretariat-reference", - "dateUpdated": "2024-06-21T15:39:01.724Z" + "dateUpdated": "2024-07-05T14:31:58.548Z" }, "references": [ { @@ -70,6 +70,12 @@ "tags": [ "x_cve_prog_secretariat_snapshot" ] + }, + { + "url": "https://devolutions.net/security/advisories/DEVO-2024-0006/adp-test-6-28", + "tags": [ + "x_snapshot" + ] } ] } diff --git a/cves/2024/2xxx/CVE-2024-2919.json b/cves/2024/2xxx/CVE-2024-2919.json index 18dfa77f346..8e035284c98 100644 --- a/cves/2024/2xxx/CVE-2024-2919.json +++ b/cves/2024/2xxx/CVE-2024-2919.json @@ -8,7 +8,7 @@ "assignerShortName": "Wordfence", "dateReserved": "2024-03-26T14:38:27.310Z", "datePublished": "2024-04-04T02:32:40.024Z", - "dateUpdated": "2024-06-21T15:39:02.177Z" + "dateUpdated": "2024-07-05T14:31:58.811Z" }, "containers": { "cna": { @@ -86,7 +86,7 @@ "providerMetadata": { "orgId": "96f1cf3c-f80a-4e0f-a063-99a91e3f1325", "shortName": "secretariat-reference", - "dateUpdated": "2024-06-21T15:39:02.177Z" + "dateUpdated": "2024-07-05T14:31:58.811Z" }, "references": [ { @@ -100,6 +100,18 @@ "tags": [ "x_cve_prog_secretariat_snapshot" ] + }, + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/b38a69c7-91d4-43be-8650-eb1f0029bd44?source=cve/adp-test-6-28", + "tags": [ + "x_snapshot" + ] + }, + { + "url": "https://plugins.trac.wordpress.org/changeset/3062911/kadence-blocks/trunk/includes/assets/js/kb-countup.min.js/adp-test-6-28", + "tags": [ + "x_snapshot" + ] } ] } diff --git a/cves/2024/2xxx/CVE-2024-2920.json b/cves/2024/2xxx/CVE-2024-2920.json index 66e472ad744..61e924c9cf0 100644 --- a/cves/2024/2xxx/CVE-2024-2920.json +++ b/cves/2024/2xxx/CVE-2024-2920.json @@ -8,7 +8,7 @@ "assignerShortName": "Wordfence", "dateReserved": "2024-03-26T14:57:13.649Z", "datePublished": "2024-04-26T07:28:19.271Z", - "dateUpdated": "2024-06-21T15:39:02.647Z" + "dateUpdated": "2024-07-05T14:31:58.488Z" }, "containers": { "cna": { @@ -118,7 +118,7 @@ "providerMetadata": { "orgId": "96f1cf3c-f80a-4e0f-a063-99a91e3f1325", "shortName": "secretariat-reference", - "dateUpdated": "2024-06-21T15:39:02.647Z" + "dateUpdated": "2024-07-05T14:31:58.488Z" }, "references": [ { @@ -132,6 +132,18 @@ "tags": [ "x_cve_prog_secretariat_snapshot" ] + }, + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/4319fa2e-8826-4100-9156-cbe80582367e?source=cve/adp-test-6-28", + "tags": [ + "x_snapshot" + ] + }, + { + "url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3074215%40wp-members&new=3074215%40wp-members&sfp_email=&sfph_mail=/adp-test-6-28", + "tags": [ + "x_snapshot" + ] } ] } diff --git a/cves/2024/2xxx/CVE-2024-2921.json b/cves/2024/2xxx/CVE-2024-2921.json index 358bfef2ffc..98056bacb8c 100644 --- a/cves/2024/2xxx/CVE-2024-2921.json +++ b/cves/2024/2xxx/CVE-2024-2921.json @@ -8,7 +8,7 @@ "assignerShortName": "DEVOLUTIONS", "dateReserved": "2024-03-26T15:04:26.012Z", "datePublished": "2024-03-26T15:51:24.128Z", - "dateUpdated": "2024-06-21T15:39:03.123Z" + "dateUpdated": "2024-07-05T14:31:58.480Z" }, "containers": { "cna": { @@ -93,7 +93,7 @@ "providerMetadata": { "orgId": "96f1cf3c-f80a-4e0f-a063-99a91e3f1325", "shortName": "secretariat-reference", - "dateUpdated": "2024-06-21T15:39:03.123Z" + "dateUpdated": "2024-07-05T14:31:58.480Z" }, "references": [ { @@ -101,6 +101,12 @@ "tags": [ "x_cve_prog_secretariat_snapshot" ] + }, + { + "url": "https://devolutions.net/security/advisories/DEVO-2024-0005/adp-test-6-28", + "tags": [ + "x_snapshot" + ] } ] } diff --git a/cves/2024/2xxx/CVE-2024-2922.json b/cves/2024/2xxx/CVE-2024-2922.json index 1e95c8b604d..e2c6c61e670 100644 --- a/cves/2024/2xxx/CVE-2024-2922.json +++ b/cves/2024/2xxx/CVE-2024-2922.json @@ -8,7 +8,7 @@ "assignerShortName": "Wordfence", "dateReserved": "2024-03-26T15:08:21.617Z", "datePublished": "2024-06-06T03:32:51.439Z", - "dateUpdated": "2024-06-21T15:39:03.526Z" + "dateUpdated": "2024-07-05T14:31:58.766Z" }, "containers": { "cna": { @@ -137,7 +137,7 @@ "providerMetadata": { "orgId": "96f1cf3c-f80a-4e0f-a063-99a91e3f1325", "shortName": "secretariat-reference", - "dateUpdated": "2024-06-21T15:39:03.526Z" + "dateUpdated": "2024-07-05T14:31:58.766Z" }, "references": [ { @@ -151,6 +151,18 @@ "tags": [ "x_cve_prog_secretariat_snapshot" ] + }, + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/1516280e-796e-4011-b15f-b754860ad414?source=cve/adp-test-6-28", + "tags": [ + "x_snapshot" + ] + }, + { + "url": "https://wordpress.org/plugins/themesflat-addons-for-elementor//adp-test-6-28", + "tags": [ + "x_snapshot" + ] } ] } diff --git a/cves/2024/2xxx/CVE-2024-2923.json b/cves/2024/2xxx/CVE-2024-2923.json index b957166120c..d2e61d3f1d7 100644 --- a/cves/2024/2xxx/CVE-2024-2923.json +++ b/cves/2024/2xxx/CVE-2024-2923.json @@ -8,7 +8,7 @@ "assignerShortName": "Wordfence", "dateReserved": "2024-03-26T15:14:29.386Z", "datePublished": "2024-05-09T20:03:31.988Z", - "dateUpdated": "2024-06-21T15:39:03.939Z" + "dateUpdated": "2024-07-05T14:31:58.603Z" }, "containers": { "cna": { @@ -119,7 +119,7 @@ "providerMetadata": { "orgId": "96f1cf3c-f80a-4e0f-a063-99a91e3f1325", "shortName": "secretariat-reference", - "dateUpdated": "2024-06-21T15:39:03.939Z" + "dateUpdated": "2024-07-05T14:31:58.603Z" }, "references": [ { @@ -133,6 +133,18 @@ "tags": [ "x_cve_prog_secretariat_snapshot" ] + }, + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/733f5ded-e8cb-4895-b938-889cea32f027?source=cve/adp-test-6-28", + "tags": [ + "x_snapshot" + ] + }, + { + "url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3078558%40magical-addons-for-elementor&new=3078558%40magical-addons-for-elementor&sfp_email=&sfph_mail=/adp-test-6-28", + "tags": [ + "x_snapshot" + ] } ] } diff --git a/cves/2024/2xxx/CVE-2024-2924.json b/cves/2024/2xxx/CVE-2024-2924.json index 83010664af2..510bc08313e 100644 --- a/cves/2024/2xxx/CVE-2024-2924.json +++ b/cves/2024/2xxx/CVE-2024-2924.json @@ -8,7 +8,7 @@ "assignerShortName": "Wordfence", "dateReserved": "2024-03-26T15:18:19.872Z", "datePublished": "2024-04-02T05:32:49.642Z", - "dateUpdated": "2024-06-21T15:39:04.335Z" + "dateUpdated": "2024-07-05T14:31:58.605Z" }, "containers": { "cna": { @@ -86,7 +86,7 @@ "providerMetadata": { "orgId": "96f1cf3c-f80a-4e0f-a063-99a91e3f1325", "shortName": "secretariat-reference", - "dateUpdated": "2024-06-21T15:39:04.335Z" + "dateUpdated": "2024-07-05T14:31:58.605Z" }, "references": [ { @@ -100,6 +100,18 @@ "tags": [ "x_cve_prog_secretariat_snapshot" ] + }, + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/33581898-067b-445c-8ad0-12ff4778a13c?source=cve/adp-test-6-28", + "tags": [ + "x_snapshot" + ] + }, + { + "url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3061567%40creative-addons-for-elementor&new=3061567%40creative-addons-for-elementor&sfp_email=&sfph_mail=/adp-test-6-28", + "tags": [ + "x_snapshot" + ] } ] } diff --git a/cves/2024/2xxx/CVE-2024-2925.json b/cves/2024/2xxx/CVE-2024-2925.json index a5de95b6285..6b8cdb1b322 100644 --- a/cves/2024/2xxx/CVE-2024-2925.json +++ b/cves/2024/2xxx/CVE-2024-2925.json @@ -8,7 +8,7 @@ "assignerShortName": "Wordfence", "dateReserved": "2024-03-26T15:27:36.594Z", "datePublished": "2024-04-02T06:47:44.286Z", - "dateUpdated": "2024-06-21T15:39:04.859Z" + "dateUpdated": "2024-07-05T14:31:58.476Z" }, "containers": { "cna": { @@ -120,7 +120,7 @@ "providerMetadata": { "orgId": "96f1cf3c-f80a-4e0f-a063-99a91e3f1325", "shortName": "secretariat-reference", - "dateUpdated": "2024-06-21T15:39:04.859Z" + "dateUpdated": "2024-07-05T14:31:58.476Z" }, "references": [ { @@ -140,6 +140,24 @@ "tags": [ "x_cve_prog_secretariat_snapshot" ] + }, + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/d311170c-db2b-4c23-aa43-98d7e92839bb?source=cve/adp-test-6-28", + "tags": [ + "x_snapshot" + ] + }, + { + "url": "https://plugins.trac.wordpress.org/browser/beaver-builder-lite-version/tags/2.8.0.4/modules/button/includes/frontend.php/adp-test-6-28", + "tags": [ + "x_snapshot" + ] + }, + { + "url": "https://plugins.trac.wordpress.org/changeset/3062187/beaver-builder-lite-version/trunk/modules/button/includes/frontend.php/adp-test-6-28", + "tags": [ + "x_snapshot" + ] } ] } diff --git a/cves/2024/2xxx/CVE-2024-2927.json b/cves/2024/2xxx/CVE-2024-2927.json index c59c2d6fcaf..dc88f65cdf4 100644 --- a/cves/2024/2xxx/CVE-2024-2927.json +++ b/cves/2024/2xxx/CVE-2024-2927.json @@ -8,7 +8,7 @@ "assignerShortName": "VulDB", "dateReserved": "2024-03-26T15:35:05.027Z", "datePublished": "2024-03-26T23:00:08.667Z", - "dateUpdated": "2024-06-21T15:39:05.270Z" + "dateUpdated": "2024-07-05T14:31:58.814Z" }, "containers": { "cna": { @@ -135,7 +135,7 @@ "providerMetadata": { "orgId": "96f1cf3c-f80a-4e0f-a063-99a91e3f1325", "shortName": "secretariat-reference", - "dateUpdated": "2024-06-21T15:39:05.270Z" + "dateUpdated": "2024-07-05T14:31:58.814Z" }, "references": [ { @@ -163,6 +163,32 @@ "third-party-advisory", "x_cve_prog_secretariat_snapshot" ] + }, + { + "url": "https://vuldb.com/?id.258000/adp-test-6-28", + "name": "VDB-258000 | code-projects Mobile Shop Login Page Details.php sql injection", + "tags": [ + "vdb-entry", + "technical-description", + "x_snapshot" + ] + }, + { + "url": "https://vuldb.com/?ctiid.258000/adp-test-6-28", + "name": "VDB-258000 | CTI Indicators (IOB, IOC, TTP, IOA)", + "tags": [ + "signature", + "permissions-required", + "x_snapshot" + ] + }, + { + "url": "https://vuldb.com/?submit.304053/adp-test-6-28", + "name": "Submit #304053 | code-projects PHP 1.0 SQL Injection", + "tags": [ + "third-party-advisory", + "x_snapshot" + ] } ] } diff --git a/cves/2024/2xxx/CVE-2024-2928.json b/cves/2024/2xxx/CVE-2024-2928.json index 58c7f961308..8b9dce385d1 100644 --- a/cves/2024/2xxx/CVE-2024-2928.json +++ b/cves/2024/2xxx/CVE-2024-2928.json @@ -8,7 +8,7 @@ "assignerShortName": "@huntr_ai", "dateReserved": "2024-03-26T15:36:14.364Z", "datePublished": "2024-06-06T18:29:54.973Z", - "dateUpdated": "2024-06-06T19:39:55.440Z" + "dateUpdated": "2024-07-05T14:31:58.834Z" }, "containers": { "cna": { @@ -131,6 +131,27 @@ "shortName": "CISA-ADP", "dateUpdated": "2024-06-06T19:39:55.440Z" } + }, + { + "providerMetadata": { + "orgId": "96f1cf3c-f80a-4e0f-a063-99a91e3f1325", + "shortName": "secretariat-reference", + "dateUpdated": "2024-07-05T14:31:58.834Z" + }, + "references": [ + { + "url": "https://huntr.com/bounties/19bf02d7-6393-4a95-b9d0-d6d4d2d8c298/adp-test-6-28", + "tags": [ + "x_snapshot" + ] + }, + { + "url": "https://github.com/mlflow/mlflow/commit/96f0b573a73d8eedd6735a2ce26e08859527be07/adp-test-6-28", + "tags": [ + "x_snapshot" + ] + } + ] } ] } diff --git a/cves/2024/2xxx/CVE-2024-2929.json b/cves/2024/2xxx/CVE-2024-2929.json index e2a694805f8..329234b5e8b 100644 --- a/cves/2024/2xxx/CVE-2024-2929.json +++ b/cves/2024/2xxx/CVE-2024-2929.json @@ -8,7 +8,7 @@ "assignerShortName": "Rockwell", "dateReserved": "2024-03-26T15:39:33.119Z", "datePublished": "2024-03-26T15:56:31.967Z", - "dateUpdated": "2024-06-21T15:39:05.658Z" + "dateUpdated": "2024-07-05T14:31:58.752Z" }, "containers": { "cna": { @@ -144,7 +144,7 @@ "providerMetadata": { "orgId": "96f1cf3c-f80a-4e0f-a063-99a91e3f1325", "shortName": "secretariat-reference", - "dateUpdated": "2024-06-21T15:39:05.658Z" + "dateUpdated": "2024-07-05T14:31:58.752Z" }, "references": [ { @@ -152,6 +152,12 @@ "tags": [ "x_cve_prog_secretariat_snapshot" ] + }, + { + "url": "https://www.rockwellautomation.com/en-us/support/advisory.SD-1665.html/adp-test-6-28", + "tags": [ + "x_snapshot" + ] } ] } diff --git a/cves/2024/2xxx/CVE-2024-2930.json b/cves/2024/2xxx/CVE-2024-2930.json index 63aba75b6bd..156d5c09894 100644 --- a/cves/2024/2xxx/CVE-2024-2930.json +++ b/cves/2024/2xxx/CVE-2024-2930.json @@ -8,7 +8,7 @@ "assignerShortName": "VulDB", "dateReserved": "2024-03-26T15:40:44.405Z", "datePublished": "2024-03-26T23:31:04.697Z", - "dateUpdated": "2024-06-21T15:39:06.048Z" + "dateUpdated": "2024-07-05T14:31:58.774Z" }, "containers": { "cna": { @@ -137,7 +137,7 @@ "providerMetadata": { "orgId": "96f1cf3c-f80a-4e0f-a063-99a91e3f1325", "shortName": "secretariat-reference", - "dateUpdated": "2024-06-21T15:39:06.048Z" + "dateUpdated": "2024-07-05T14:31:58.774Z" }, "references": [ { @@ -171,6 +171,38 @@ "exploit", "x_cve_prog_secretariat_snapshot" ] + }, + { + "url": "https://vuldb.com/?id.258001/adp-test-6-28", + "name": "VDB-258001 | SourceCodester Music Gallery Site unrestricted upload", + "tags": [ + "vdb-entry", + "x_snapshot" + ] + }, + { + "url": "https://vuldb.com/?ctiid.258001/adp-test-6-28", + "name": "VDB-258001 | CTI Indicators (IOB, IOC, TTP, IOA)", + "tags": [ + "signature", + "permissions-required", + "x_snapshot" + ] + }, + { + "url": "https://vuldb.com/?submit.304234/adp-test-6-28", + "name": "Submit #304234 | Sourcecodester Music Gallery Site using PHP and MySQL Database Free Source Code V1.0 Incorrect Access Control", + "tags": [ + "third-party-advisory", + "x_snapshot" + ] + }, + { + "url": "https://github.com/xuanluansec/vul/blob/main/vul/Music%20Gallery%20Site%20using%20PHP%20and%20MySQL%20Database%20Free%20Source%20Code/Music%20Gallery%20Site%20using%20PHP%20and%20MySQL%20Database%20Free%20Source%20Code.md/adp-test-6-28", + "tags": [ + "exploit", + "x_snapshot" + ] } ] } diff --git a/cves/2024/2xxx/CVE-2024-2931.json b/cves/2024/2xxx/CVE-2024-2931.json index a31d14d2874..ff52ae189b1 100644 --- a/cves/2024/2xxx/CVE-2024-2931.json +++ b/cves/2024/2xxx/CVE-2024-2931.json @@ -8,7 +8,7 @@ "assignerShortName": "Wordfence", "dateReserved": "2024-03-26T15:42:54.988Z", "datePublished": "2024-04-02T08:32:29.442Z", - "dateUpdated": "2024-06-21T15:39:06.443Z" + "dateUpdated": "2024-07-05T14:31:58.777Z" }, "containers": { "cna": { @@ -120,7 +120,7 @@ "providerMetadata": { "orgId": "96f1cf3c-f80a-4e0f-a063-99a91e3f1325", "shortName": "secretariat-reference", - "dateUpdated": "2024-06-21T15:39:06.443Z" + "dateUpdated": "2024-07-05T14:31:58.777Z" }, "references": [ { @@ -140,6 +140,24 @@ "tags": [ "x_cve_prog_secretariat_snapshot" ] + }, + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/078a0647-fc3a-436c-bf00-8776b16e66ff?source=cve/adp-test-6-28", + "tags": [ + "x_snapshot" + ] + }, + { + "url": "https://inky-knuckle-2c2.notion.site/WPFront-User-Role-Editor-Information-disclosure-7435b8340a004f5f8485cad375326b2c/adp-test-6-28", + "tags": [ + "x_snapshot" + ] + }, + { + "url": "https://plugins.trac.wordpress.org/changeset/3061241/wpfront-user-role-editor/trunk/includes/users/class-assign-migrate.php/adp-test-6-28", + "tags": [ + "x_snapshot" + ] } ] } diff --git a/cves/2024/2xxx/CVE-2024-2932.json b/cves/2024/2xxx/CVE-2024-2932.json index 4928593c145..0d2db7415e7 100644 --- a/cves/2024/2xxx/CVE-2024-2932.json +++ b/cves/2024/2xxx/CVE-2024-2932.json @@ -8,7 +8,7 @@ "assignerShortName": "VulDB", "dateReserved": "2024-03-26T15:47:17.104Z", "datePublished": "2024-03-27T00:00:09.668Z", - "dateUpdated": "2024-06-21T15:39:06.836Z" + "dateUpdated": "2024-07-05T14:31:58.830Z" }, "containers": { "cna": { @@ -139,7 +139,7 @@ "providerMetadata": { "orgId": "96f1cf3c-f80a-4e0f-a063-99a91e3f1325", "shortName": "secretariat-reference", - "dateUpdated": "2024-06-21T15:39:06.836Z" + "dateUpdated": "2024-07-05T14:31:58.830Z" }, "references": [ { @@ -175,6 +175,40 @@ "issue-tracking", "x_cve_prog_secretariat_snapshot" ] + }, + { + "url": "https://vuldb.com/?id.258012/adp-test-6-28", + "name": "VDB-258012 | SourceCodester Online Chatting System update_room.php sql injection", + "tags": [ + "vdb-entry", + "technical-description", + "x_snapshot" + ] + }, + { + "url": "https://vuldb.com/?ctiid.258012/adp-test-6-28", + "name": "VDB-258012 | CTI Indicators (IOB, IOC, TTP, IOA)", + "tags": [ + "signature", + "permissions-required", + "x_snapshot" + ] + }, + { + "url": "https://vuldb.com/?submit.304257/adp-test-6-28", + "name": "Submit #304257 | Sourcecodester Online Chatting System using PHP/MySQL V1.0 sql injection", + "tags": [ + "third-party-advisory", + "x_snapshot" + ] + }, + { + "url": "https://github.com/CveSecLook/cve/issues/3/adp-test-6-28", + "tags": [ + "exploit", + "issue-tracking", + "x_snapshot" + ] } ] } diff --git a/cves/2024/2xxx/CVE-2024-2933.json b/cves/2024/2xxx/CVE-2024-2933.json index 93d245886e1..b084a76b790 100644 --- a/cves/2024/2xxx/CVE-2024-2933.json +++ b/cves/2024/2xxx/CVE-2024-2933.json @@ -8,7 +8,7 @@ "assignerShortName": "Wordfence", "dateReserved": "2024-03-26T15:53:25.918Z", "datePublished": "2024-06-01T01:54:53.891Z", - "dateUpdated": "2024-06-01T01:54:53.891Z" + "dateUpdated": "2024-07-05T14:31:58.854Z" }, "containers": { "cna": { @@ -84,6 +84,35 @@ "value": "Disclosed" } ] - } + }, + "adp": [ + { + "providerMetadata": { + "orgId": "96f1cf3c-f80a-4e0f-a063-99a91e3f1325", + "shortName": "secretariat-reference", + "dateUpdated": "2024-07-05T14:31:58.854Z" + }, + "references": [ + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/020d14f8-e8e2-4da2-9a4b-4d15cb0994c8?source=cve/adp-test-6-28", + "tags": [ + "x_snapshot" + ] + }, + { + "url": "https://plugins.trac.wordpress.org/browser/coblocks/tags/3.1.7/src/blocks/social-profiles/index.php#L28/adp-test-6-28", + "tags": [ + "x_snapshot" + ] + }, + { + "url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3095285%40coblocks&new=3095285%40coblocks&sfp_email=&sfph_mail=/adp-test-6-28", + "tags": [ + "x_snapshot" + ] + } + ] + } + ] } } \ No newline at end of file diff --git a/cves/2024/2xxx/CVE-2024-2934.json b/cves/2024/2xxx/CVE-2024-2934.json index b1b77de6f4d..93e2c96df88 100644 --- a/cves/2024/2xxx/CVE-2024-2934.json +++ b/cves/2024/2xxx/CVE-2024-2934.json @@ -8,7 +8,7 @@ "assignerShortName": "VulDB", "dateReserved": "2024-03-26T15:55:18.390Z", "datePublished": "2024-03-27T00:31:03.964Z", - "dateUpdated": "2024-06-21T15:39:07.237Z" + "dateUpdated": "2024-07-05T14:31:58.600Z" }, "containers": { "cna": { @@ -138,7 +138,7 @@ "providerMetadata": { "orgId": "96f1cf3c-f80a-4e0f-a063-99a91e3f1325", "shortName": "secretariat-reference", - "dateUpdated": "2024-06-21T15:39:07.237Z" + "dateUpdated": "2024-07-05T14:31:58.600Z" }, "references": [ { @@ -173,6 +173,39 @@ "exploit", "x_cve_prog_secretariat_snapshot" ] + }, + { + "url": "https://vuldb.com/?id.258013/adp-test-6-28", + "name": "VDB-258013 | SourceCodester Todo List in Kanban Board delete-todo.php sql injection", + "tags": [ + "vdb-entry", + "technical-description", + "x_snapshot" + ] + }, + { + "url": "https://vuldb.com/?ctiid.258013/adp-test-6-28", + "name": "VDB-258013 | CTI Indicators (IOB, IOC, TTP, IOA)", + "tags": [ + "signature", + "permissions-required", + "x_snapshot" + ] + }, + { + "url": "https://vuldb.com/?submit.304677/adp-test-6-28", + "name": "Submit #304677 | SourceCodester To Do List App 1.0 SQL Injection", + "tags": [ + "third-party-advisory", + "x_snapshot" + ] + }, + { + "url": "https://github.com/BurakSevben/CVEs/blob/main/To%20Do%20List%20App/To%20Do%20List%20App%20-%20SQL%20Injection.md/adp-test-6-28", + "tags": [ + "exploit", + "x_snapshot" + ] } ] } diff --git a/cves/2024/2xxx/CVE-2024-2935.json b/cves/2024/2xxx/CVE-2024-2935.json index 3984f3070c0..3a2128636ae 100644 --- a/cves/2024/2xxx/CVE-2024-2935.json +++ b/cves/2024/2xxx/CVE-2024-2935.json @@ -8,7 +8,7 @@ "assignerShortName": "VulDB", "dateReserved": "2024-03-26T15:55:26.110Z", "datePublished": "2024-03-27T00:31:05.342Z", - "dateUpdated": "2024-06-21T15:39:07.627Z" + "dateUpdated": "2024-07-05T14:31:58.815Z" }, "containers": { "cna": { @@ -141,7 +141,7 @@ "providerMetadata": { "orgId": "96f1cf3c-f80a-4e0f-a063-99a91e3f1325", "shortName": "secretariat-reference", - "dateUpdated": "2024-06-21T15:39:07.627Z" + "dateUpdated": "2024-07-05T14:31:58.815Z" }, "references": [ { @@ -176,6 +176,39 @@ "exploit", "x_cve_prog_secretariat_snapshot" ] + }, + { + "url": "https://vuldb.com/?id.258014/adp-test-6-28", + "name": "VDB-258014 | SourceCodester Todo List in Kanban Board Add ToDo cross site scripting", + "tags": [ + "vdb-entry", + "technical-description", + "x_snapshot" + ] + }, + { + "url": "https://vuldb.com/?ctiid.258014/adp-test-6-28", + "name": "VDB-258014 | CTI Indicators (IOB, IOC, TTP, IOA)", + "tags": [ + "signature", + "permissions-required", + "x_snapshot" + ] + }, + { + "url": "https://vuldb.com/?submit.304678/adp-test-6-28", + "name": "Submit #304678 | SourceCodester To Do List App 1.0 Cross-Site-Scripting", + "tags": [ + "third-party-advisory", + "x_snapshot" + ] + }, + { + "url": "https://github.com/BurakSevben/CVEs/blob/main/To%20Do%20List%20App/To%20Do%20List%20App%20-%20Cross-Site-Scripting.md/adp-test-6-28", + "tags": [ + "exploit", + "x_snapshot" + ] } ] } diff --git a/cves/2024/2xxx/CVE-2024-2936.json b/cves/2024/2xxx/CVE-2024-2936.json index 49fcf8eda40..f1474a1cb52 100644 --- a/cves/2024/2xxx/CVE-2024-2936.json +++ b/cves/2024/2xxx/CVE-2024-2936.json @@ -8,7 +8,7 @@ "assignerShortName": "Wordfence", "dateReserved": "2024-03-26T16:04:34.333Z", "datePublished": "2024-03-29T05:35:32.721Z", - "dateUpdated": "2024-06-21T15:39:08.136Z" + "dateUpdated": "2024-07-05T14:31:58.861Z" }, "containers": { "cna": { @@ -122,7 +122,7 @@ "providerMetadata": { "orgId": "96f1cf3c-f80a-4e0f-a063-99a91e3f1325", "shortName": "secretariat-reference", - "dateUpdated": "2024-06-21T15:39:08.136Z" + "dateUpdated": "2024-07-05T14:31:58.861Z" }, "references": [ { @@ -136,6 +136,18 @@ "tags": [ "x_cve_prog_secretariat_snapshot" ] + }, + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/0b20d638-82cb-48ce-96fa-fd42d06f649f?source=cve/adp-test-6-28", + "tags": [ + "x_snapshot" + ] + }, + { + "url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3059286%40sydney-toolbox&new=3059286%40sydney-toolbox&sfp_email=&sfph_mail=/adp-test-6-28", + "tags": [ + "x_snapshot" + ] } ] } diff --git a/cves/2024/2xxx/CVE-2024-2938.json b/cves/2024/2xxx/CVE-2024-2938.json index b4ca056bf07..339b18c76cc 100644 --- a/cves/2024/2xxx/CVE-2024-2938.json +++ b/cves/2024/2xxx/CVE-2024-2938.json @@ -8,7 +8,7 @@ "assignerShortName": "VulDB", "dateReserved": "2024-03-26T16:29:24.927Z", "datePublished": "2024-03-27T01:00:06.067Z", - "dateUpdated": "2024-06-21T15:39:08.651Z" + "dateUpdated": "2024-07-05T14:31:58.750Z" }, "containers": { "cna": { @@ -138,7 +138,7 @@ "providerMetadata": { "orgId": "96f1cf3c-f80a-4e0f-a063-99a91e3f1325", "shortName": "secretariat-reference", - "dateUpdated": "2024-06-21T15:39:08.651Z" + "dateUpdated": "2024-07-05T14:31:58.750Z" }, "references": [ { @@ -173,6 +173,39 @@ "exploit", "x_cve_prog_secretariat_snapshot" ] + }, + { + "url": "https://vuldb.com/?id.258029/adp-test-6-28", + "name": "VDB-258029 | Campcodes Online Examination System updateCourse.php sql injection", + "tags": [ + "vdb-entry", + "technical-description", + "x_snapshot" + ] + }, + { + "url": "https://vuldb.com/?ctiid.258029/adp-test-6-28", + "name": "VDB-258029 | CTI Indicators (IOB, IOC, TTP, IOA)", + "tags": [ + "signature", + "permissions-required", + "x_snapshot" + ] + }, + { + "url": "https://vuldb.com/?submit.304746/adp-test-6-28", + "name": "Submit #304746 | campcodes Online Examination System ≤1.0 SQL injection", + "tags": [ + "third-party-advisory", + "x_snapshot" + ] + }, + { + "url": "https://github.com/Beatriz-ai-boop/cve/blob/main/report/1.pdf/adp-test-6-28", + "tags": [ + "exploit", + "x_snapshot" + ] } ] } diff --git a/cves/delta.json b/cves/delta.json index 24c1097132f..f96406e491d 100644 --- a/cves/delta.json +++ b/cves/delta.json @@ -1,1807 +1,1807 @@ { - "fetchTime": "2024-07-05T14:22:39.013Z", + "fetchTime": "2024-07-05T14:49:12.086Z", "numberOfChanges": 300, "new": [], "updated": [ { - "cveId": "CVE-2024-2271", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2271", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2271.json", - "dateUpdated": "2024-07-05T14:16:44.833Z" + "cveId": "CVE-2024-2611", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2611", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2611.json", + "dateUpdated": "2024-07-05T14:26:39.515Z" }, { - "cveId": "CVE-2024-2272", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2272", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2272.json", - "dateUpdated": "2024-07-05T14:16:44.830Z" + "cveId": "CVE-2024-2612", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2612", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2612.json", + "dateUpdated": "2024-07-05T14:26:39.581Z" }, { - "cveId": "CVE-2024-2273", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2273", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2273.json", - "dateUpdated": "2024-07-05T14:16:44.843Z" + "cveId": "CVE-2024-2613", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2613", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2613.json", + "dateUpdated": "2024-07-05T14:26:39.776Z" }, { - "cveId": "CVE-2024-2274", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2274", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2274.json", - "dateUpdated": "2024-07-05T14:16:45.464Z" + "cveId": "CVE-2024-2614", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2614", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2614.json", + "dateUpdated": "2024-07-05T14:26:39.782Z" }, { - "cveId": "CVE-2024-2275", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2275", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2275.json", - "dateUpdated": "2024-07-05T14:16:45.721Z" + "cveId": "CVE-2024-2615", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2615", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2615.json", + "dateUpdated": "2024-07-05T14:26:39.838Z" }, { - "cveId": "CVE-2024-2276", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2276", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2276.json", - "dateUpdated": "2024-07-05T14:16:46.495Z" + "cveId": "CVE-2024-2616", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2616", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2616.json", + "dateUpdated": "2024-07-05T14:26:39.672Z" }, { - "cveId": "CVE-2024-2277", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2277", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2277.json", - "dateUpdated": "2024-07-05T14:16:46.821Z" + "cveId": "CVE-2024-2617", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2617", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2617.json", + "dateUpdated": "2024-07-05T14:26:39.862Z" }, { - "cveId": "CVE-2024-2278", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2278", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2278.json", - "dateUpdated": "2024-07-05T14:16:46.828Z" + "cveId": "CVE-2024-2618", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2618", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2618.json", + "dateUpdated": "2024-07-05T14:26:39.517Z" }, { - "cveId": "CVE-2024-2279", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2279", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2279.json", - "dateUpdated": "2024-07-05T14:16:46.868Z" + "cveId": "CVE-2024-2619", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2619", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2619.json", + "dateUpdated": "2024-07-05T14:26:39.845Z" }, { - "cveId": "CVE-2024-2280", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2280", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2280.json", - "dateUpdated": "2024-07-05T14:16:46.755Z" + "cveId": "CVE-2024-2620", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2620", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2620.json", + "dateUpdated": "2024-07-05T14:26:39.868Z" }, { - "cveId": "CVE-2024-2281", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2281", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2281.json", - "dateUpdated": "2024-07-05T14:16:44.680Z" + "cveId": "CVE-2024-2621", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2621", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2621.json", + "dateUpdated": "2024-07-05T14:26:39.520Z" }, { - "cveId": "CVE-2024-2282", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2282", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2282.json", - "dateUpdated": "2024-07-05T14:16:45.378Z" + "cveId": "CVE-2024-2622", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2622", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2622.json", + "dateUpdated": "2024-07-05T14:26:39.763Z" }, { - "cveId": "CVE-2024-2283", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2283", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2283.json", - "dateUpdated": "2024-07-05T14:16:45.236Z" + "cveId": "CVE-2024-2623", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2623", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2623.json", + "dateUpdated": "2024-07-05T14:26:39.886Z" }, { - "cveId": "CVE-2024-2284", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2284", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2284.json", - "dateUpdated": "2024-07-05T14:16:46.055Z" + "cveId": "CVE-2024-2624", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2624", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2624.json", + "dateUpdated": "2024-07-05T14:26:39.836Z" }, { - "cveId": "CVE-2024-2285", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2285", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2285.json", - "dateUpdated": "2024-07-05T14:16:44.683Z" + "cveId": "CVE-2024-2625", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2625", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2625.json", + "dateUpdated": "2024-07-05T14:26:39.865Z" }, { - "cveId": "CVE-2024-2286", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2286", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2286.json", - "dateUpdated": "2024-07-05T14:16:44.759Z" + "cveId": "CVE-2024-2626", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2626", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2626.json", + "dateUpdated": "2024-07-05T14:26:39.871Z" }, { - "cveId": "CVE-2024-2287", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2287", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2287.json", - "dateUpdated": "2024-07-05T14:16:47.577Z" + "cveId": "CVE-2024-2627", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2627", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2627.json", + "dateUpdated": "2024-07-05T14:26:39.809Z" }, { - "cveId": "CVE-2024-2288", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2288", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2288.json", - "dateUpdated": "2024-07-05T14:16:47.478Z" + "cveId": "CVE-2024-2628", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2628", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2628.json", + "dateUpdated": "2024-07-05T14:26:39.616Z" }, { - "cveId": "CVE-2024-2289", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2289", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2289.json", - "dateUpdated": "2024-07-05T14:16:45.781Z" + "cveId": "CVE-2024-2629", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2629", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2629.json", + "dateUpdated": "2024-07-05T14:26:39.513Z" }, { - "cveId": "CVE-2024-2290", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2290", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2290.json", - "dateUpdated": "2024-07-05T14:16:44.665Z" + "cveId": "CVE-2024-2630", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2630", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2630.json", + "dateUpdated": "2024-07-05T14:26:39.885Z" }, { - "cveId": "CVE-2024-2291", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2291", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2291.json", - "dateUpdated": "2024-07-05T14:16:44.972Z" + "cveId": "CVE-2024-2631", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2631", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2631.json", + "dateUpdated": "2024-07-05T14:26:39.882Z" }, { - "cveId": "CVE-2024-2293", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2293", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2293.json", - "dateUpdated": "2024-07-05T14:16:47.571Z" + "cveId": "CVE-2024-2632", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2632", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2632.json", + "dateUpdated": "2024-07-05T14:26:39.896Z" }, { - "cveId": "CVE-2024-2294", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2294", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2294.json", - "dateUpdated": "2024-07-05T14:16:44.667Z" + "cveId": "CVE-2024-2633", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2633", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2633.json", + "dateUpdated": "2024-07-05T14:26:40.205Z" }, { - "cveId": "CVE-2024-2295", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2295", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2295.json", - "dateUpdated": "2024-07-05T14:16:47.538Z" + "cveId": "CVE-2024-2634", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2634", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2634.json", + "dateUpdated": "2024-07-05T14:26:39.881Z" }, { - "cveId": "CVE-2024-2296", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2296", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2296.json", - "dateUpdated": "2024-07-05T14:16:44.758Z" + "cveId": "CVE-2024-2635", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2635", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2635.json", + "dateUpdated": "2024-07-05T14:26:40.215Z" }, { - "cveId": "CVE-2024-2298", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2298", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2298.json", - "dateUpdated": "2024-07-05T14:16:45.368Z" + "cveId": "CVE-2024-2636", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2636", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2636.json", + "dateUpdated": "2024-07-05T14:26:39.974Z" }, { - "cveId": "CVE-2024-2299", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2299", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2299.json", - "dateUpdated": "2024-07-05T14:16:47.563Z" + "cveId": "CVE-2024-2637", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2637", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2637.json", + "dateUpdated": "2024-07-05T14:26:39.781Z" }, { - "cveId": "CVE-2024-2300", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2300", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2300.json", - "dateUpdated": "2024-07-05T14:16:44.705Z" + "cveId": "CVE-2024-2639", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2639", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2639.json", + "dateUpdated": "2024-07-05T14:26:40.225Z" }, { - "cveId": "CVE-2024-2301", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2301", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2301.json", - "dateUpdated": "2024-07-05T14:16:45.116Z" + "cveId": "CVE-2024-2641", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2641", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2641.json", + "dateUpdated": "2024-07-05T14:26:41.805Z" }, { - "cveId": "CVE-2024-2302", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2302", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2302.json", - "dateUpdated": "2024-07-05T14:16:46.590Z" + "cveId": "CVE-2024-2642", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2642", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2642.json", + "dateUpdated": "2024-07-05T14:26:39.697Z" }, { - "cveId": "CVE-2024-2303", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2303", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2303.json", - "dateUpdated": "2024-07-05T14:16:47.541Z" + "cveId": "CVE-2024-2644", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2644", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2644.json", + "dateUpdated": "2024-07-05T14:26:39.895Z" }, { - "cveId": "CVE-2024-2304", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2304", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2304.json", - "dateUpdated": "2024-07-05T14:16:47.622Z" + "cveId": "CVE-2024-2645", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2645", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2645.json", + "dateUpdated": "2024-07-05T14:26:39.854Z" }, { - "cveId": "CVE-2024-2305", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2305", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2305.json", - "dateUpdated": "2024-07-05T14:16:47.594Z" + "cveId": "CVE-2024-2646", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2646", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2646.json", + "dateUpdated": "2024-07-05T14:26:40.071Z" }, { - "cveId": "CVE-2024-2306", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2306", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2306.json", - "dateUpdated": "2024-07-05T14:16:44.740Z" + "cveId": "CVE-2024-2647", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2647", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2647.json", + "dateUpdated": "2024-07-05T14:26:40.056Z" }, { - "cveId": "CVE-2024-2307", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2307", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2307.json", - "dateUpdated": "2024-07-05T14:16:47.559Z" + "cveId": "CVE-2024-2648", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2648", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2648.json", + "dateUpdated": "2024-07-05T14:26:40.124Z" }, { - "cveId": "CVE-2024-2308", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2308", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2308.json", - "dateUpdated": "2024-07-05T14:16:46.818Z" + "cveId": "CVE-2024-2649", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2649", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2649.json", + "dateUpdated": "2024-07-05T14:26:40.214Z" }, { - "cveId": "CVE-2024-2309", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2309", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2309.json", - "dateUpdated": "2024-07-05T14:16:45.937Z" + "cveId": "CVE-2024-2650", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2650", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2650.json", + "dateUpdated": "2024-07-05T14:26:39.800Z" }, { - "cveId": "CVE-2024-2310", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2310", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2310.json", - "dateUpdated": "2024-07-05T14:16:47.515Z" + "cveId": "CVE-2024-2651", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2651", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2651.json", + "dateUpdated": "2024-07-05T14:26:39.762Z" }, { - "cveId": "CVE-2024-2311", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2311", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2311.json", - "dateUpdated": "2024-07-05T14:16:47.539Z" + "cveId": "CVE-2024-2653", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2653", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2653.json", + "dateUpdated": "2024-07-05T14:26:41.832Z" }, { - "cveId": "CVE-2024-2312", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2312", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2312.json", - "dateUpdated": "2024-07-05T14:16:46.458Z" + "cveId": "CVE-2024-2654", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2654", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2654.json", + "dateUpdated": "2024-07-05T14:26:42.249Z" }, { - "cveId": "CVE-2024-2313", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2313", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2313.json", - "dateUpdated": "2024-07-05T14:16:46.058Z" + "cveId": "CVE-2024-2655", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2655", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2655.json", + "dateUpdated": "2024-07-05T14:26:40.122Z" }, { - "cveId": "CVE-2024-2314", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2314", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2314.json", - "dateUpdated": "2024-07-05T14:16:47.585Z" + "cveId": "CVE-2024-2656", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2656", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2656.json", + "dateUpdated": "2024-07-05T14:26:40.222Z" }, { - "cveId": "CVE-2024-2316", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2316", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2316.json", - "dateUpdated": "2024-07-05T14:16:47.555Z" + "cveId": "CVE-2024-2657", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2657", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2657.json", + "dateUpdated": "2024-07-05T14:26:40.218Z" }, { - "cveId": "CVE-2024-2317", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2317", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2317.json", - "dateUpdated": "2024-07-05T14:16:47.600Z" + "cveId": "CVE-2024-2659", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2659", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2659.json", + "dateUpdated": "2024-07-05T14:26:42.265Z" }, { - "cveId": "CVE-2024-2318", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2318", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2318.json", - "dateUpdated": "2024-07-05T14:16:47.569Z" + "cveId": "CVE-2024-2660", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2660", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2660.json", + "dateUpdated": "2024-07-05T14:26:42.266Z" }, { - "cveId": "CVE-2024-2319", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2319", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2319.json", - "dateUpdated": "2024-07-05T14:16:46.139Z" + "cveId": "CVE-2024-2661", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2661", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2661.json", + "dateUpdated": "2024-07-05T14:26:41.966Z" }, { - "cveId": "CVE-2024-2322", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2322", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2322.json", - "dateUpdated": "2024-07-05T14:16:46.640Z" + "cveId": "CVE-2024-2662", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2662", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2662.json", + "dateUpdated": "2024-07-05T14:26:40.203Z" }, { - "cveId": "CVE-2024-2324", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2324", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2324.json", - "dateUpdated": "2024-07-05T14:16:46.759Z" + "cveId": "CVE-2024-2663", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2663", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2663.json", + "dateUpdated": "2024-07-05T14:26:39.874Z" }, { - "cveId": "CVE-2024-2325", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2325", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2325.json", - "dateUpdated": "2024-07-05T14:16:47.575Z" + "cveId": "CVE-2024-2664", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2664", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2664.json", + "dateUpdated": "2024-07-05T14:26:39.810Z" }, { - "cveId": "CVE-2024-2326", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2326", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2326.json", - "dateUpdated": "2024-07-05T14:16:46.003Z" + "cveId": "CVE-2024-2665", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2665", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2665.json", + "dateUpdated": "2024-07-05T14:26:40.164Z" }, { - "cveId": "CVE-2024-2327", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2327", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2327.json", - "dateUpdated": "2024-07-05T14:16:47.606Z" + "cveId": "CVE-2024-2666", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2666", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2666.json", + "dateUpdated": "2024-07-05T14:26:40.211Z" }, { - "cveId": "CVE-2024-2328", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2328", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2328.json", - "dateUpdated": "2024-07-05T14:16:47.589Z" + "cveId": "CVE-2024-2667", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2667", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2667.json", + "dateUpdated": "2024-07-05T14:26:41.841Z" }, { - "cveId": "CVE-2024-2329", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2329", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2329.json", - "dateUpdated": "2024-07-05T14:16:47.685Z" + "cveId": "CVE-2024-2668", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2668", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2668.json", + "dateUpdated": "2024-07-05T14:26:41.819Z" }, { - "cveId": "CVE-2024-2330", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2330", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2330.json", - "dateUpdated": "2024-07-05T14:16:47.582Z" + "cveId": "CVE-2024-2669", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2669", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2669.json", + "dateUpdated": "2024-07-05T14:26:41.968Z" }, { - "cveId": "CVE-2024-2331", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2331", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2331.json", - "dateUpdated": "2024-07-05T14:16:46.817Z" + "cveId": "CVE-2024-2670", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2670", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2670.json", + "dateUpdated": "2024-07-05T14:26:41.833Z" }, { - "cveId": "CVE-2024-2332", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2332", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2332.json", - "dateUpdated": "2024-07-05T14:16:46.113Z" + "cveId": "CVE-2024-2671", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2671", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2671.json", + "dateUpdated": "2024-07-05T14:26:42.269Z" }, { - "cveId": "CVE-2024-2333", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2333", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2333.json", - "dateUpdated": "2024-07-05T14:16:46.983Z" + "cveId": "CVE-2024-2672", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2672", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2672.json", + "dateUpdated": "2024-07-05T14:26:42.298Z" }, { - "cveId": "CVE-2024-2334", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2334", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2334.json", - "dateUpdated": "2024-07-05T14:16:47.556Z" + "cveId": "CVE-2024-2673", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2673", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2673.json", + "dateUpdated": "2024-07-05T14:26:40.208Z" }, { - "cveId": "CVE-2024-2335", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2335", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2335.json", - "dateUpdated": "2024-07-05T14:16:47.590Z" + "cveId": "CVE-2024-2674", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2674", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2674.json", + "dateUpdated": "2024-07-05T14:26:42.258Z" }, { - "cveId": "CVE-2024-2336", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2336", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2336.json", - "dateUpdated": "2024-07-05T14:16:47.588Z" + "cveId": "CVE-2024-2675", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2675", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2675.json", + "dateUpdated": "2024-07-05T14:26:39.949Z" }, { - "cveId": "CVE-2024-2338", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2338", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2338.json", - "dateUpdated": "2024-07-05T14:16:47.470Z" + "cveId": "CVE-2024-2676", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2676", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2676.json", + "dateUpdated": "2024-07-05T14:26:41.811Z" }, { - "cveId": "CVE-2024-2339", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2339", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2339.json", - "dateUpdated": "2024-07-05T14:16:47.473Z" + "cveId": "CVE-2024-2677", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2677", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2677.json", + "dateUpdated": "2024-07-05T14:26:42.237Z" }, { - "cveId": "CVE-2024-2340", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2340", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2340.json", - "dateUpdated": "2024-07-05T14:16:47.632Z" + "cveId": "CVE-2024-2678", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2678", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2678.json", + "dateUpdated": "2024-07-05T14:26:41.966Z" }, { - "cveId": "CVE-2024-2341", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2341", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2341.json", - "dateUpdated": "2024-07-05T14:16:47.626Z" + "cveId": "CVE-2024-2679", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2679", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2679.json", + "dateUpdated": "2024-07-05T14:26:42.062Z" }, { - "cveId": "CVE-2024-2342", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2342", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2342.json", - "dateUpdated": "2024-07-05T14:16:47.057Z" + "cveId": "CVE-2024-2680", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2680", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2680.json", + "dateUpdated": "2024-07-05T14:26:42.325Z" }, { - "cveId": "CVE-2024-2343", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2343", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2343.json", - "dateUpdated": "2024-07-05T14:16:46.929Z" + "cveId": "CVE-2024-2681", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2681", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2681.json", + "dateUpdated": "2024-07-05T14:26:42.302Z" }, { - "cveId": "CVE-2024-2344", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2344", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2344.json", - "dateUpdated": "2024-07-05T14:16:46.931Z" + "cveId": "CVE-2024-2682", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2682", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2682.json", + "dateUpdated": "2024-07-05T14:26:41.809Z" }, { - "cveId": "CVE-2024-2345", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2345", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2345.json", - "dateUpdated": "2024-07-05T14:16:47.598Z" + "cveId": "CVE-2024-2683", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2683", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2683.json", + "dateUpdated": "2024-07-05T14:26:41.965Z" }, { - "cveId": "CVE-2024-2346", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2346", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2346.json", - "dateUpdated": "2024-07-05T14:16:47.581Z" + "cveId": "CVE-2024-2684", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2684", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2684.json", + "dateUpdated": "2024-07-05T14:26:41.847Z" }, { - "cveId": "CVE-2024-2347", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2347", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2347.json", - "dateUpdated": "2024-07-05T14:16:47.581Z" + "cveId": "CVE-2024-2685", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2685", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2685.json", + "dateUpdated": "2024-07-05T14:26:41.975Z" }, { - "cveId": "CVE-2024-2348", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2348", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2348.json", - "dateUpdated": "2024-07-05T14:16:47.569Z" + "cveId": "CVE-2024-2686", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2686", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2686.json", + "dateUpdated": "2024-07-05T14:26:42.306Z" }, { - "cveId": "CVE-2024-2349", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2349", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2349.json", - "dateUpdated": "2024-07-05T14:16:47.596Z" + "cveId": "CVE-2024-2687", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2687", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2687.json", + "dateUpdated": "2024-07-05T14:26:42.073Z" }, { - "cveId": "CVE-2024-2350", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2350", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2350.json", - "dateUpdated": "2024-07-05T14:16:47.583Z" + "cveId": "CVE-2024-2688", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2688", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2688.json", + "dateUpdated": "2024-07-05T14:26:41.963Z" }, { - "cveId": "CVE-2024-2351", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2351", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2351.json", - "dateUpdated": "2024-07-05T14:16:47.703Z" + "cveId": "CVE-2024-2689", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2689", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2689.json", + "dateUpdated": "2024-07-05T14:26:42.323Z" }, { - "cveId": "CVE-2024-2352", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2352", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2352.json", - "dateUpdated": "2024-07-05T14:16:47.465Z" + "cveId": "CVE-2024-2690", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2690", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2690.json", + "dateUpdated": "2024-07-05T14:26:42.060Z" }, { - "cveId": "CVE-2024-2353", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2353", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2353.json", - "dateUpdated": "2024-07-05T14:16:47.684Z" + "cveId": "CVE-2024-2692", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2692", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2692.json", + "dateUpdated": "2024-07-05T14:26:41.969Z" }, { - "cveId": "CVE-2024-2354", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2354", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2354.json", - "dateUpdated": "2024-07-05T14:16:47.509Z" + "cveId": "CVE-2024-2693", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2693", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2693.json", + "dateUpdated": "2024-07-05T14:26:42.299Z" }, { - "cveId": "CVE-2024-2355", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2355", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2355.json", - "dateUpdated": "2024-07-05T14:16:47.568Z" + "cveId": "CVE-2024-2695", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2695", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2695.json", + "dateUpdated": "2024-07-05T14:26:41.967Z" }, { - "cveId": "CVE-2024-2357", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2357", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2357.json", - "dateUpdated": "2024-07-05T14:16:47.704Z" + "cveId": "CVE-2024-2697", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2697", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2697.json", + "dateUpdated": "2024-07-05T14:26:42.315Z" }, { - "cveId": "CVE-2024-2358", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2358", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2358.json", - "dateUpdated": "2024-07-05T14:16:47.467Z" + "cveId": "CVE-2024-2698", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2698", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2698.json", + "dateUpdated": "2024-07-05T14:26:42.314Z" }, { - "cveId": "CVE-2024-2359", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2359", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2359.json", - "dateUpdated": "2024-07-05T14:16:47.578Z" + "cveId": "CVE-2024-2700", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2700", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2700.json", + "dateUpdated": "2024-07-05T14:26:42.345Z" }, { - "cveId": "CVE-2024-2360", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2360", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2360.json", - "dateUpdated": "2024-07-05T14:16:47.457Z" + "cveId": "CVE-2024-2702", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2702", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2702.json", + "dateUpdated": "2024-07-05T14:26:42.297Z" }, { - "cveId": "CVE-2024-2361", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2361", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2361.json", - "dateUpdated": "2024-07-05T14:16:47.492Z" + "cveId": "CVE-2024-2703", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2703", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2703.json", + "dateUpdated": "2024-07-05T14:26:39.847Z" }, { - "cveId": "CVE-2024-2362", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2362", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2362.json", - "dateUpdated": "2024-07-05T14:16:47.495Z" + "cveId": "CVE-2024-2704", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2704", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2704.json", + "dateUpdated": "2024-07-05T14:26:41.895Z" }, { - "cveId": "CVE-2024-2363", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2363", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2363.json", - "dateUpdated": "2024-07-05T14:16:47.482Z" + "cveId": "CVE-2024-2705", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2705", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2705.json", + "dateUpdated": "2024-07-05T14:26:42.215Z" }, { - "cveId": "CVE-2024-2364", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2364", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2364.json", - "dateUpdated": "2024-07-05T14:16:47.692Z" + "cveId": "CVE-2024-2706", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2706", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2706.json", + "dateUpdated": "2024-07-05T14:26:42.076Z" }, { - "cveId": "CVE-2024-2365", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2365", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2365.json", - "dateUpdated": "2024-07-05T14:16:47.486Z" + "cveId": "CVE-2024-2707", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2707", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2707.json", + "dateUpdated": "2024-07-05T14:26:39.802Z" }, { - "cveId": "CVE-2024-2366", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2366", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2366.json", - "dateUpdated": "2024-07-05T14:16:47.577Z" + "cveId": "CVE-2024-2708", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2708", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2708.json", + "dateUpdated": "2024-07-05T14:26:42.324Z" }, { - "cveId": "CVE-2024-2368", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2368", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2368.json", - "dateUpdated": "2024-07-05T14:16:47.536Z" + "cveId": "CVE-2024-2709", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2709", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2709.json", + "dateUpdated": "2024-07-05T14:26:42.283Z" }, { - "cveId": "CVE-2024-2369", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2369", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2369.json", - "dateUpdated": "2024-07-05T14:16:47.472Z" + "cveId": "CVE-2024-2710", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2710", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2710.json", + "dateUpdated": "2024-07-05T14:26:42.274Z" }, { - "cveId": "CVE-2024-2371", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2371", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2371.json", - "dateUpdated": "2024-07-05T14:16:47.604Z" + "cveId": "CVE-2024-2711", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2711", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2711.json", + "dateUpdated": "2024-07-05T14:26:42.245Z" }, { - "cveId": "CVE-2024-2377", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2377", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2377.json", - "dateUpdated": "2024-07-05T14:16:47.474Z" + "cveId": "CVE-2024-2712", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2712", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2712.json", + "dateUpdated": "2024-07-05T14:26:42.195Z" }, { - "cveId": "CVE-2024-2378", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2378", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2378.json", - "dateUpdated": "2024-07-05T14:16:47.574Z" + "cveId": "CVE-2024-2713", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2713", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2713.json", + "dateUpdated": "2024-07-05T14:26:42.339Z" }, { - "cveId": "CVE-2024-2379", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2379", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2379.json", - "dateUpdated": "2024-07-05T14:16:47.587Z" + "cveId": "CVE-2024-2714", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2714", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2714.json", + "dateUpdated": "2024-07-05T14:26:42.241Z" }, { - "cveId": "CVE-2024-2380", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2380", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2380.json", - "dateUpdated": "2024-07-05T14:16:47.991Z" + "cveId": "CVE-2024-2715", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2715", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2715.json", + "dateUpdated": "2024-07-05T14:26:42.223Z" }, { - "cveId": "CVE-2024-2381", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2381", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2381.json", - "dateUpdated": "2024-07-05T14:16:47.543Z" + "cveId": "CVE-2024-2716", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2716", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2716.json", + "dateUpdated": "2024-07-05T14:26:42.067Z" }, { - "cveId": "CVE-2024-2382", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2382", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2382.json", - "dateUpdated": "2024-07-05T14:16:47.744Z" + "cveId": "CVE-2024-2717", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2717", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2717.json", + "dateUpdated": "2024-07-05T14:26:42.340Z" }, { - "cveId": "CVE-2024-2383", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2383", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2383.json", - "dateUpdated": "2024-07-05T14:16:47.607Z" + "cveId": "CVE-2024-2718", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2718", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2718.json", + "dateUpdated": "2024-07-05T14:26:42.316Z" }, { - "cveId": "CVE-2024-2384", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2384", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2384.json", - "dateUpdated": "2024-07-05T14:16:47.983Z" + "cveId": "CVE-2024-2719", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2719", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2719.json", + "dateUpdated": "2024-07-05T14:26:42.307Z" }, { - "cveId": "CVE-2024-2387", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2387", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2387.json", - "dateUpdated": "2024-07-05T14:16:47.985Z" + "cveId": "CVE-2024-2720", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2720", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2720.json", + "dateUpdated": "2024-07-05T14:26:42.318Z" }, { - "cveId": "CVE-2024-2389", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2389", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2389.json", - "dateUpdated": "2024-07-05T14:16:47.476Z" + "cveId": "CVE-2024-2721", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2721", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2721.json", + "dateUpdated": "2024-07-05T14:26:42.257Z" }, { - "cveId": "CVE-2024-2390", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2390", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2390.json", - "dateUpdated": "2024-07-05T14:16:47.593Z" + "cveId": "CVE-2024-2722", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2722", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2722.json", + "dateUpdated": "2024-07-05T14:26:42.300Z" }, { - "cveId": "CVE-2024-2391", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2391", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2391.json", - "dateUpdated": "2024-07-05T14:16:47.623Z" + "cveId": "CVE-2024-2723", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2723", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2723.json", + "dateUpdated": "2024-07-05T14:26:42.222Z" }, { - "cveId": "CVE-2024-2392", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2392", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2392.json", - "dateUpdated": "2024-07-05T14:16:47.520Z" + "cveId": "CVE-2024-2724", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2724", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2724.json", + "dateUpdated": "2024-07-05T14:26:42.468Z" }, { - "cveId": "CVE-2024-2393", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2393", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2393.json", - "dateUpdated": "2024-07-05T14:16:47.992Z" + "cveId": "CVE-2024-2725", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2725", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2725.json", + "dateUpdated": "2024-07-05T14:26:42.317Z" }, { - "cveId": "CVE-2024-2394", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2394", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2394.json", - "dateUpdated": "2024-07-05T14:16:47.698Z" + "cveId": "CVE-2024-2726", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2726", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2726.json", + "dateUpdated": "2024-07-05T14:26:42.072Z" }, { - "cveId": "CVE-2024-2395", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2395", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2395.json", - "dateUpdated": "2024-07-05T14:16:47.505Z" + "cveId": "CVE-2024-2727", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2727", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2727.json", + "dateUpdated": "2024-07-05T14:26:39.898Z" }, { - "cveId": "CVE-2024-2397", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2397", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2397.json", - "dateUpdated": "2024-07-05T14:16:47.990Z" + "cveId": "CVE-2024-2728", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2728", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2728.json", + "dateUpdated": "2024-07-05T14:26:42.338Z" }, { - "cveId": "CVE-2024-2398", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2398", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2398.json", - "dateUpdated": "2024-07-05T14:16:47.502Z" + "cveId": "CVE-2024-2729", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2729", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2729.json", + "dateUpdated": "2024-07-05T14:26:42.349Z" }, { - "cveId": "CVE-2024-2399", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2399", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2399.json", - "dateUpdated": "2024-07-05T14:16:47.539Z" + "cveId": "CVE-2024-2730", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2730", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2730.json", + "dateUpdated": "2024-07-05T14:26:42.464Z" }, { - "cveId": "CVE-2024-2400", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2400", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2400.json", - "dateUpdated": "2024-07-05T14:16:47.498Z" + "cveId": "CVE-2024-2731", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2731", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2731.json", + "dateUpdated": "2024-07-05T14:26:42.382Z" }, { - "cveId": "CVE-2024-2401", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2401", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2401.json", - "dateUpdated": "2024-07-05T14:16:47.635Z" + "cveId": "CVE-2024-2732", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2732", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2732.json", + "dateUpdated": "2024-07-05T14:26:42.242Z" }, { - "cveId": "CVE-2024-2402", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2402", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2402.json", - "dateUpdated": "2024-07-05T14:16:47.487Z" + "cveId": "CVE-2024-2733", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2733", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2733.json", + "dateUpdated": "2024-07-05T14:26:42.350Z" }, { - "cveId": "CVE-2024-2403", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2403", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2403.json", - "dateUpdated": "2024-07-05T14:16:47.493Z" + "cveId": "CVE-2024-2734", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2734", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2734.json", + "dateUpdated": "2024-07-05T14:26:42.421Z" }, { - "cveId": "CVE-2024-2404", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2404", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2404.json", - "dateUpdated": "2024-07-05T14:16:47.649Z" + "cveId": "CVE-2024-2735", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2735", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2735.json", + "dateUpdated": "2024-07-05T14:26:42.444Z" }, { - "cveId": "CVE-2024-2405", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2405", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2405.json", - "dateUpdated": "2024-07-05T14:16:44.828Z" + "cveId": "CVE-2024-2736", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2736", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2736.json", + "dateUpdated": "2024-07-05T14:26:42.357Z" }, { - "cveId": "CVE-2024-2406", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2406", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2406.json", - "dateUpdated": "2024-07-05T14:16:48.037Z" + "cveId": "CVE-2024-2738", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2738", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2738.json", + "dateUpdated": "2024-07-05T14:26:42.214Z" }, { - "cveId": "CVE-2024-2408", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2408", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2408.json", - "dateUpdated": "2024-07-05T14:16:47.612Z" + "cveId": "CVE-2024-2739", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2739", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2739.json", + "dateUpdated": "2024-07-05T14:26:39.870Z" }, { - "cveId": "CVE-2024-2409", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2409", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2409.json", - "dateUpdated": "2024-07-05T14:16:47.513Z" + "cveId": "CVE-2024-2740", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2740", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2740.json", + "dateUpdated": "2024-07-05T14:26:42.261Z" }, { - "cveId": "CVE-2024-2410", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2410", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2410.json", - "dateUpdated": "2024-07-05T14:16:47.501Z" + "cveId": "CVE-2024-2741", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2741", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2741.json", + "dateUpdated": "2024-07-05T14:26:42.261Z" }, { - "cveId": "CVE-2024-2411", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2411", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2411.json", - "dateUpdated": "2024-07-05T14:16:47.542Z" + "cveId": "CVE-2024-2742", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2742", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2742.json", + "dateUpdated": "2024-07-05T14:26:42.377Z" }, { - "cveId": "CVE-2024-2412", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2412", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2412.json", - "dateUpdated": "2024-07-05T14:16:47.564Z" + "cveId": "CVE-2024-2744", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2744", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2744.json", + "dateUpdated": "2024-07-05T14:26:42.351Z" }, { - "cveId": "CVE-2024-2413", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2413", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2413.json", - "dateUpdated": "2024-07-05T14:16:47.697Z" + "cveId": "CVE-2024-2745", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2745", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2745.json", + "dateUpdated": "2024-07-05T14:26:42.400Z" }, { - "cveId": "CVE-2024-2414", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2414", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2414.json", - "dateUpdated": "2024-07-05T14:16:47.522Z" + "cveId": "CVE-2024-2746", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2746", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2746.json", + "dateUpdated": "2024-07-05T14:26:42.243Z" }, { - "cveId": "CVE-2024-2415", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2415", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2415.json", - "dateUpdated": "2024-07-05T14:16:47.518Z" + "cveId": "CVE-2024-2747", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2747", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2747.json", + "dateUpdated": "2024-07-05T14:26:42.207Z" }, { - "cveId": "CVE-2024-2416", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2416", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2416.json", - "dateUpdated": "2024-07-05T14:16:47.533Z" + "cveId": "CVE-2024-2748", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2748", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2748.json", + "dateUpdated": "2024-07-05T14:26:39.869Z" }, { - "cveId": "CVE-2024-2417", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2417", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2417.json", - "dateUpdated": "2024-07-05T14:16:47.516Z" + "cveId": "CVE-2024-2749", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2749", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2749.json", + "dateUpdated": "2024-07-05T14:26:42.448Z" }, { - "cveId": "CVE-2024-2418", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2418", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2418.json", - "dateUpdated": "2024-07-05T14:16:47.620Z" + "cveId": "CVE-2024-2750", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2750", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2750.json", + "dateUpdated": "2024-07-05T14:26:42.271Z" }, { - "cveId": "CVE-2024-2419", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2419", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2419.json", - "dateUpdated": "2024-07-05T14:16:47.500Z" + "cveId": "CVE-2024-2751", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2751", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2751.json", + "dateUpdated": "2024-07-05T14:26:42.379Z" }, { - "cveId": "CVE-2024-2420", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2420", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2420.json", - "dateUpdated": "2024-07-05T14:16:48.205Z" + "cveId": "CVE-2024-2752", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2752", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2752.json", + "dateUpdated": "2024-07-05T14:26:39.873Z" }, { - "cveId": "CVE-2024-2421", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2421", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2421.json", - "dateUpdated": "2024-07-05T14:16:48.007Z" + "cveId": "CVE-2024-2753", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2753", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2753.json", + "dateUpdated": "2024-07-05T14:26:42.313Z" }, { - "cveId": "CVE-2024-2422", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2422", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2422.json", - "dateUpdated": "2024-07-05T14:16:47.969Z" + "cveId": "CVE-2024-2754", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2754", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2754.json", + "dateUpdated": "2024-07-05T14:26:42.225Z" }, { - "cveId": "CVE-2024-2423", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2423", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2423.json", - "dateUpdated": "2024-07-05T14:16:47.774Z" + "cveId": "CVE-2024-2756", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2756", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2756.json", + "dateUpdated": "2024-07-05T14:26:42.309Z" }, { - "cveId": "CVE-2024-2424", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2424", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2424.json", - "dateUpdated": "2024-07-05T14:16:47.567Z" + "cveId": "CVE-2024-2757", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2757", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2757.json", + "dateUpdated": "2024-07-05T14:26:39.872Z" }, { - "cveId": "CVE-2024-2425", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2425", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2425.json", - "dateUpdated": "2024-07-05T14:16:47.562Z" + "cveId": "CVE-2024-2758", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2758", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2758.json", + "dateUpdated": "2024-07-05T14:26:42.473Z" }, { - "cveId": "CVE-2024-2426", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2426", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2426.json", - "dateUpdated": "2024-07-05T14:16:48.184Z" + "cveId": "CVE-2024-2759", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2759", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2759.json", + "dateUpdated": "2024-07-05T14:26:42.466Z" }, { - "cveId": "CVE-2024-2427", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2427", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2427.json", - "dateUpdated": "2024-07-05T14:16:48.182Z" + "cveId": "CVE-2024-2760", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2760", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2760.json", + "dateUpdated": "2024-07-05T14:26:42.301Z" }, { - "cveId": "CVE-2024-2428", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2428", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2428.json", - "dateUpdated": "2024-07-05T14:16:47.562Z" + "cveId": "CVE-2024-2761", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2761", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2761.json", + "dateUpdated": "2024-07-05T14:26:42.501Z" }, { - "cveId": "CVE-2024-2429", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2429", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2429.json", - "dateUpdated": "2024-07-05T14:16:46.632Z" + "cveId": "CVE-2024-2762", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2762", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2762.json", + "dateUpdated": "2024-07-05T14:26:39.883Z" }, { - "cveId": "CVE-2024-2431", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2431", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2431.json", - "dateUpdated": "2024-07-05T14:16:46.367Z" + "cveId": "CVE-2024-2763", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2763", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2763.json", + "dateUpdated": "2024-07-05T14:26:42.472Z" }, { - "cveId": "CVE-2024-2432", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2432", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2432.json", - "dateUpdated": "2024-07-05T14:16:47.560Z" + "cveId": "CVE-2024-2764", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2764", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2764.json", + "dateUpdated": "2024-07-05T14:26:42.474Z" }, { - "cveId": "CVE-2024-2433", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2433", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2433.json", - "dateUpdated": "2024-07-05T14:16:47.570Z" + "cveId": "CVE-2024-2765", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2765", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2765.json", + "dateUpdated": "2024-07-05T14:26:42.488Z" }, { - "cveId": "CVE-2024-2434", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2434", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2434.json", - "dateUpdated": "2024-07-05T14:16:47.552Z" + "cveId": "CVE-2024-2766", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2766", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2766.json", + "dateUpdated": "2024-07-05T14:26:40.143Z" }, { - "cveId": "CVE-2024-2435", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2435", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2435.json", - "dateUpdated": "2024-07-05T14:16:47.584Z" + "cveId": "CVE-2024-2767", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2767", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2767.json", + "dateUpdated": "2024-07-05T14:26:40.065Z" }, { - "cveId": "CVE-2024-2436", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2436", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2436.json", - "dateUpdated": "2024-07-05T14:16:47.680Z" + "cveId": "CVE-2024-2768", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2768", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2768.json", + "dateUpdated": "2024-07-05T14:26:40.064Z" }, { - "cveId": "CVE-2024-2439", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2439", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2439.json", - "dateUpdated": "2024-07-05T14:16:48.173Z" + "cveId": "CVE-2024-2769", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2769", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2769.json", + "dateUpdated": "2024-07-05T14:26:40.195Z" }, { - "cveId": "CVE-2024-2440", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2440", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2440.json", - "dateUpdated": "2024-07-05T14:16:48.030Z" + "cveId": "CVE-2024-2770", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2770", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2770.json", + "dateUpdated": "2024-07-05T14:26:41.808Z" }, { - "cveId": "CVE-2024-2441", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2441", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2441.json", - "dateUpdated": "2024-07-05T14:16:48.112Z" + "cveId": "CVE-2024-2771", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2771", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2771.json", + "dateUpdated": "2024-07-05T14:26:41.810Z" }, { - "cveId": "CVE-2024-2442", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2442", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2442.json", - "dateUpdated": "2024-07-05T14:16:47.464Z" + "cveId": "CVE-2024-2772", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2772", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2772.json", + "dateUpdated": "2024-07-05T14:26:42.268Z" }, { - "cveId": "CVE-2024-2443", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2443", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2443.json", - "dateUpdated": "2024-07-05T14:16:48.132Z" + "cveId": "CVE-2024-2773", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2773", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2773.json", + "dateUpdated": "2024-07-05T14:26:41.974Z" }, { - "cveId": "CVE-2024-2444", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2444", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2444.json", - "dateUpdated": "2024-07-05T14:16:47.490Z" + "cveId": "CVE-2024-2774", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2774", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2774.json", + "dateUpdated": "2024-07-05T14:26:42.253Z" }, { - "cveId": "CVE-2024-2445", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2445", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2445.json", - "dateUpdated": "2024-07-05T14:16:47.633Z" + "cveId": "CVE-2024-2775", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2775", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2775.json", + "dateUpdated": "2024-07-05T14:26:42.359Z" }, { - "cveId": "CVE-2024-2446", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2446", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2446.json", - "dateUpdated": "2024-07-05T14:16:47.550Z" + "cveId": "CVE-2024-2776", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2776", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2776.json", + "dateUpdated": "2024-07-05T14:26:42.522Z" }, { - "cveId": "CVE-2024-2447", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2447", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2447.json", - "dateUpdated": "2024-07-05T14:16:48.002Z" + "cveId": "CVE-2024-2777", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2777", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2777.json", + "dateUpdated": "2024-07-05T14:26:41.842Z" }, { - "cveId": "CVE-2024-2448", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2448", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2448.json", - "dateUpdated": "2024-07-05T14:16:47.696Z" + "cveId": "CVE-2024-2778", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2778", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2778.json", + "dateUpdated": "2024-07-05T14:26:42.570Z" }, { - "cveId": "CVE-2024-2449", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2449", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2449.json", - "dateUpdated": "2024-07-05T14:16:48.202Z" + "cveId": "CVE-2024-2779", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2779", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2779.json", + "dateUpdated": "2024-07-05T14:26:40.224Z" }, { - "cveId": "CVE-2024-2450", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2450", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2450.json", - "dateUpdated": "2024-07-05T14:16:48.115Z" + "cveId": "CVE-2024-2780", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2780", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2780.json", + "dateUpdated": "2024-07-05T14:26:42.521Z" }, { - "cveId": "CVE-2024-2451", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2451", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2451.json", - "dateUpdated": "2024-07-05T14:16:48.153Z" + "cveId": "CVE-2024-2781", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2781", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2781.json", + "dateUpdated": "2024-07-05T14:26:42.248Z" }, { - "cveId": "CVE-2024-2452", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2452", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2452.json", - "dateUpdated": "2024-07-05T14:16:48.083Z" + "cveId": "CVE-2024-2782", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2782", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2782.json", + "dateUpdated": "2024-07-05T14:26:42.577Z" }, { - "cveId": "CVE-2024-2453", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2453", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2453.json", - "dateUpdated": "2024-07-05T14:16:48.089Z" + "cveId": "CVE-2024-2783", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2783", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2783.json", + "dateUpdated": "2024-07-05T14:26:42.571Z" }, { - "cveId": "CVE-2024-2454", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2454", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2454.json", - "dateUpdated": "2024-07-05T14:16:48.045Z" + "cveId": "CVE-2024-2784", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2784", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2784.json", + "dateUpdated": "2024-07-05T14:26:42.517Z" }, { - "cveId": "CVE-2024-2456", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2456", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2456.json", - "dateUpdated": "2024-07-05T14:16:48.195Z" + "cveId": "CVE-2024-2785", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2785", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2785.json", + "dateUpdated": "2024-07-05T14:26:42.512Z" }, { - "cveId": "CVE-2024-2457", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2457", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2457.json", - "dateUpdated": "2024-07-05T14:16:48.087Z" + "cveId": "CVE-2024-2786", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2786", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2786.json", + "dateUpdated": "2024-07-05T14:26:42.548Z" }, { - "cveId": "CVE-2024-2458", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2458", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2458.json", - "dateUpdated": "2024-07-05T14:16:48.179Z" + "cveId": "CVE-2024-2787", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2787", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2787.json", + "dateUpdated": "2024-07-05T14:26:42.560Z" }, { - "cveId": "CVE-2024-2459", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2459", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2459.json", - "dateUpdated": "2024-07-05T14:16:48.134Z" + "cveId": "CVE-2024-2788", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2788", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2788.json", + "dateUpdated": "2024-07-05T14:26:42.497Z" }, { - "cveId": "CVE-2024-2460", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2460", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2460.json", - "dateUpdated": "2024-07-05T14:16:47.971Z" + "cveId": "CVE-2024-2789", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2789", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2789.json", + "dateUpdated": "2024-07-05T14:26:42.579Z" }, { - "cveId": "CVE-2024-2461", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2461", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2461.json", - "dateUpdated": "2024-07-05T14:16:48.144Z" + "cveId": "CVE-2024-2790", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2790", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2790.json", + "dateUpdated": "2024-07-05T14:26:42.534Z" }, { - "cveId": "CVE-2024-2462", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2462", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2462.json", - "dateUpdated": "2024-07-05T14:16:48.019Z" + "cveId": "CVE-2024-2791", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2791", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2791.json", + "dateUpdated": "2024-07-05T14:26:42.532Z" }, { - "cveId": "CVE-2024-2463", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2463", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2463.json", - "dateUpdated": "2024-07-05T14:16:47.683Z" + "cveId": "CVE-2024-2792", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2792", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2792.json", + "dateUpdated": "2024-07-05T14:26:42.582Z" }, { - "cveId": "CVE-2024-2464", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2464", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2464.json", - "dateUpdated": "2024-07-05T14:16:48.178Z" + "cveId": "CVE-2024-2793", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2793", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2793.json", + "dateUpdated": "2024-07-05T14:26:42.572Z" }, { - "cveId": "CVE-2024-2465", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2465", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2465.json", - "dateUpdated": "2024-07-05T14:16:47.671Z" + "cveId": "CVE-2024-2794", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2794", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2794.json", + "dateUpdated": "2024-07-05T14:26:42.482Z" }, { - "cveId": "CVE-2024-2466", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2466", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2466.json", - "dateUpdated": "2024-07-05T14:16:48.149Z" + "cveId": "CVE-2024-2795", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2795", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2795.json", + "dateUpdated": "2024-07-05T14:26:42.590Z" }, { - "cveId": "CVE-2024-2467", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2467", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2467.json", - "dateUpdated": "2024-07-05T14:16:47.676Z" + "cveId": "CVE-2024-2796", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2796", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2796.json", + "dateUpdated": "2024-07-05T14:26:42.550Z" }, { - "cveId": "CVE-2024-2468", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2468", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2468.json", - "dateUpdated": "2024-07-05T14:16:48.133Z" + "cveId": "CVE-2024-2797", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2797", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2797.json", + "dateUpdated": "2024-07-05T14:26:42.500Z" }, { - "cveId": "CVE-2024-2469", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2469", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2469.json", - "dateUpdated": "2024-07-05T14:16:48.105Z" + "cveId": "CVE-2024-2798", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2798", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2798.json", + "dateUpdated": "2024-07-05T14:26:42.581Z" }, { - "cveId": "CVE-2024-2470", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2470", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2470.json", - "dateUpdated": "2024-07-05T14:16:47.699Z" + "cveId": "CVE-2024-2799", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2799", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2799.json", + "dateUpdated": "2024-07-05T14:26:42.568Z" }, { - "cveId": "CVE-2024-2471", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2471", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2471.json", - "dateUpdated": "2024-07-05T14:16:48.108Z" + "cveId": "CVE-2024-2801", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2801", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2801.json", + "dateUpdated": "2024-07-05T14:26:42.592Z" }, { - "cveId": "CVE-2024-2472", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2472", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2472.json", - "dateUpdated": "2024-07-05T14:16:47.677Z" + "cveId": "CVE-2024-2803", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2803", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2803.json", + "dateUpdated": "2024-07-05T14:26:42.465Z" }, { - "cveId": "CVE-2024-2473", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2473", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2473.json", - "dateUpdated": "2024-07-05T14:16:48.148Z" + "cveId": "CVE-2024-2804", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2804", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2804.json", + "dateUpdated": "2024-07-05T14:26:42.592Z" }, { - "cveId": "CVE-2024-2474", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2474", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2474.json", - "dateUpdated": "2024-07-05T14:16:47.784Z" + "cveId": "CVE-2024-2805", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2805", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2805.json", + "dateUpdated": "2024-07-05T14:26:42.582Z" }, { - "cveId": "CVE-2024-2475", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2475", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2475.json", - "dateUpdated": "2024-07-05T14:16:48.134Z" + "cveId": "CVE-2024-2806", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2806", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2806.json", + "dateUpdated": "2024-07-05T14:26:42.552Z" }, { - "cveId": "CVE-2024-2476", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2476", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2476.json", - "dateUpdated": "2024-07-05T14:16:47.987Z" + "cveId": "CVE-2024-2807", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2807", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2807.json", + "dateUpdated": "2024-07-05T14:26:42.576Z" }, { - "cveId": "CVE-2024-2477", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2477", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2477.json", - "dateUpdated": "2024-07-05T14:16:48.022Z" + "cveId": "CVE-2024-2808", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2808", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2808.json", + "dateUpdated": "2024-07-05T14:26:42.571Z" }, { - "cveId": "CVE-2024-2478", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2478", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2478.json", - "dateUpdated": "2024-07-05T14:16:47.750Z" + "cveId": "CVE-2024-2809", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2809", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2809.json", + "dateUpdated": "2024-07-05T14:26:42.506Z" }, { - "cveId": "CVE-2024-2479", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2479", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2479.json", - "dateUpdated": "2024-07-05T14:16:48.102Z" + "cveId": "CVE-2024-2810", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2810", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2810.json", + "dateUpdated": "2024-07-05T14:26:42.548Z" }, { - "cveId": "CVE-2024-2480", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2480", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2480.json", - "dateUpdated": "2024-07-05T14:16:48.033Z" + "cveId": "CVE-2024-2811", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2811", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2811.json", + "dateUpdated": "2024-07-05T14:26:42.502Z" }, { - "cveId": "CVE-2024-2481", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2481", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2481.json", - "dateUpdated": "2024-07-05T14:16:48.042Z" + "cveId": "CVE-2024-2812", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2812", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2812.json", + "dateUpdated": "2024-07-05T14:26:42.507Z" }, { - "cveId": "CVE-2024-2482", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2482", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2482.json", - "dateUpdated": "2024-07-05T14:16:48.174Z" + "cveId": "CVE-2024-2813", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2813", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2813.json", + "dateUpdated": "2024-07-05T14:26:42.501Z" }, { - "cveId": "CVE-2024-2483", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2483", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2483.json", - "dateUpdated": "2024-07-05T14:16:48.172Z" + "cveId": "CVE-2024-2814", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2814", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2814.json", + "dateUpdated": "2024-07-05T14:26:42.580Z" }, { - "cveId": "CVE-2024-2484", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2484", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2484.json", - "dateUpdated": "2024-07-05T14:16:48.106Z" + "cveId": "CVE-2024-2815", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2815", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2815.json", + "dateUpdated": "2024-07-05T14:26:42.531Z" }, { - "cveId": "CVE-2024-2485", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2485", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2485.json", - "dateUpdated": "2024-07-05T14:16:48.074Z" + "cveId": "CVE-2024-2816", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2816", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2816.json", + "dateUpdated": "2024-07-05T14:26:42.578Z" }, { - "cveId": "CVE-2024-2486", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2486", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2486.json", - "dateUpdated": "2024-07-05T14:16:48.131Z" + "cveId": "CVE-2024-2817", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2817", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2817.json", + "dateUpdated": "2024-07-05T14:26:42.535Z" }, { - "cveId": "CVE-2024-2487", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2487", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2487.json", - "dateUpdated": "2024-07-05T14:16:48.040Z" + "cveId": "CVE-2024-2818", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2818", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2818.json", + "dateUpdated": "2024-07-05T14:26:42.530Z" }, { - "cveId": "CVE-2024-2488", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2488", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2488.json", - "dateUpdated": "2024-07-05T14:16:48.031Z" + "cveId": "CVE-2024-2820", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2820", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2820.json", + "dateUpdated": "2024-07-05T14:26:42.552Z" }, { - "cveId": "CVE-2024-2489", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2489", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2489.json", - "dateUpdated": "2024-07-05T14:16:48.075Z" + "cveId": "CVE-2024-2821", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2821", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2821.json", + "dateUpdated": "2024-07-05T14:26:42.591Z" }, { - "cveId": "CVE-2024-2490", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2490", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2490.json", - "dateUpdated": "2024-07-05T14:16:48.135Z" + "cveId": "CVE-2024-2822", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2822", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2822.json", + "dateUpdated": "2024-07-05T14:26:42.549Z" }, { - "cveId": "CVE-2024-2491", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2491", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2491.json", - "dateUpdated": "2024-07-05T14:16:48.027Z" + "cveId": "CVE-2024-2823", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2823", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2823.json", + "dateUpdated": "2024-07-05T14:26:42.579Z" }, { - "cveId": "CVE-2024-2492", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2492", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2492.json", - "dateUpdated": "2024-07-05T14:16:48.047Z" + "cveId": "CVE-2024-2824", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2824", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2824.json", + "dateUpdated": "2024-07-05T14:26:42.551Z" }, { - "cveId": "CVE-2024-2493", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2493", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2493.json", - "dateUpdated": "2024-07-05T14:16:48.081Z" + "cveId": "CVE-2024-2825", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2825", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2825.json", + "dateUpdated": "2024-07-05T14:26:42.559Z" }, { - "cveId": "CVE-2024-2494", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2494", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2494.json", - "dateUpdated": "2024-07-05T14:16:48.012Z" + "cveId": "CVE-2024-2826", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2826", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2826.json", + "dateUpdated": "2024-07-05T14:26:42.508Z" }, { - "cveId": "CVE-2024-2495", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2495", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2495.json", - "dateUpdated": "2024-07-05T14:21:37.572Z" + "cveId": "CVE-2024-2827", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2827", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2827.json", + "dateUpdated": "2024-07-05T14:31:56.615Z" }, { - "cveId": "CVE-2024-2496", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2496", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2496.json", - "dateUpdated": "2024-07-05T14:21:37.591Z" + "cveId": "CVE-2024-2828", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2828", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2828.json", + "dateUpdated": "2024-07-05T14:31:56.968Z" }, { - "cveId": "CVE-2024-2497", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2497", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2497.json", - "dateUpdated": "2024-07-05T14:21:36.089Z" + "cveId": "CVE-2024-2829", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2829", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2829.json", + "dateUpdated": "2024-07-05T14:31:56.618Z" }, { - "cveId": "CVE-2024-2499", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2499", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2499.json", - "dateUpdated": "2024-07-05T14:21:36.076Z" + "cveId": "CVE-2024-2830", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2830", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2830.json", + "dateUpdated": "2024-07-05T14:31:56.617Z" }, { - "cveId": "CVE-2024-2500", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2500", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2500.json", - "dateUpdated": "2024-07-05T14:21:36.080Z" + "cveId": "CVE-2024-2831", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2831", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2831.json", + "dateUpdated": "2024-07-05T14:31:56.621Z" }, { - "cveId": "CVE-2024-2501", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2501", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2501.json", - "dateUpdated": "2024-07-05T14:21:37.589Z" + "cveId": "CVE-2024-2832", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2832", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2832.json", + "dateUpdated": "2024-07-05T14:31:57.927Z" }, { - "cveId": "CVE-2024-2503", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2503", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2503.json", - "dateUpdated": "2024-07-05T14:21:37.498Z" + "cveId": "CVE-2024-2833", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2833", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2833.json", + "dateUpdated": "2024-07-05T14:31:58.000Z" }, { - "cveId": "CVE-2024-2504", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2504", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2504.json", - "dateUpdated": "2024-07-05T14:21:36.097Z" + "cveId": "CVE-2024-2834", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2834", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2834.json", + "dateUpdated": "2024-07-05T14:31:56.567Z" }, { - "cveId": "CVE-2024-2505", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2505", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2505.json", - "dateUpdated": "2024-07-05T14:21:37.691Z" + "cveId": "CVE-2024-2835", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2835", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2835.json", + "dateUpdated": "2024-07-05T14:31:58.023Z" }, { - "cveId": "CVE-2024-2506", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2506", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2506.json", - "dateUpdated": "2024-07-05T14:21:37.679Z" + "cveId": "CVE-2024-2836", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2836", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2836.json", + "dateUpdated": "2024-07-05T14:31:57.645Z" }, { - "cveId": "CVE-2024-2507", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2507", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2507.json", - "dateUpdated": "2024-07-05T14:21:37.544Z" + "cveId": "CVE-2024-2837", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2837", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2837.json", + "dateUpdated": "2024-07-05T14:31:57.734Z" }, { - "cveId": "CVE-2024-2509", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2509", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2509.json", - "dateUpdated": "2024-07-05T14:21:37.725Z" + "cveId": "CVE-2024-2838", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2838", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2838.json", + "dateUpdated": "2024-07-05T14:31:58.033Z" }, { - "cveId": "CVE-2024-2511", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2511", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2511.json", - "dateUpdated": "2024-07-05T14:21:36.078Z" + "cveId": "CVE-2024-2839", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2839", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2839.json", + "dateUpdated": "2024-07-05T14:31:57.689Z" }, { - "cveId": "CVE-2024-2513", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2513", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2513.json", - "dateUpdated": "2024-07-05T14:21:37.771Z" + "cveId": "CVE-2024-2840", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2840", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2840.json", + "dateUpdated": "2024-07-05T14:31:58.027Z" }, { - "cveId": "CVE-2024-2514", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2514", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2514.json", - "dateUpdated": "2024-07-05T14:21:37.505Z" + "cveId": "CVE-2024-2841", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2841", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2841.json", + "dateUpdated": "2024-07-05T14:31:58.017Z" }, { - "cveId": "CVE-2024-2515", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2515", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2515.json", - "dateUpdated": "2024-07-05T14:21:37.729Z" + "cveId": "CVE-2024-2842", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2842", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2842.json", + "dateUpdated": "2024-07-05T14:31:57.992Z" }, { - "cveId": "CVE-2024-2516", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2516", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2516.json", - "dateUpdated": "2024-07-05T14:21:37.582Z" + "cveId": "CVE-2024-2844", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2844", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2844.json", + "dateUpdated": "2024-07-05T14:31:56.569Z" }, { - "cveId": "CVE-2024-2517", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2517", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2517.json", - "dateUpdated": "2024-07-05T14:21:37.767Z" + "cveId": "CVE-2024-2845", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2845", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2845.json", + "dateUpdated": "2024-07-05T14:31:58.001Z" }, { - "cveId": "CVE-2024-2518", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2518", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2518.json", - "dateUpdated": "2024-07-05T14:21:37.577Z" + "cveId": "CVE-2024-2846", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2846", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2846.json", + "dateUpdated": "2024-07-05T14:31:56.575Z" }, { - "cveId": "CVE-2024-2519", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2519", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2519.json", - "dateUpdated": "2024-07-05T14:21:37.752Z" + "cveId": "CVE-2024-2847", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2847", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2847.json", + "dateUpdated": "2024-07-05T14:31:58.111Z" }, { - "cveId": "CVE-2024-2520", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2520", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2520.json", - "dateUpdated": "2024-07-05T14:21:37.573Z" + "cveId": "CVE-2024-2848", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2848", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2848.json", + "dateUpdated": "2024-07-05T14:31:58.032Z" }, { - "cveId": "CVE-2024-2521", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2521", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2521.json", - "dateUpdated": "2024-07-05T14:21:37.747Z" + "cveId": "CVE-2024-2849", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2849", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2849.json", + "dateUpdated": "2024-07-05T14:31:58.011Z" }, { - "cveId": "CVE-2024-2522", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2522", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2522.json", - "dateUpdated": "2024-07-05T14:21:37.977Z" + "cveId": "CVE-2024-2850", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2850", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2850.json", + "dateUpdated": "2024-07-05T14:31:58.038Z" }, { - "cveId": "CVE-2024-2523", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2523", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2523.json", - "dateUpdated": "2024-07-05T14:21:37.759Z" + "cveId": "CVE-2024-2851", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2851", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2851.json", + "dateUpdated": "2024-07-05T14:31:58.020Z" }, { - "cveId": "CVE-2024-2524", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2524", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2524.json", - "dateUpdated": "2024-07-05T14:21:37.678Z" + "cveId": "CVE-2024-2852", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2852", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2852.json", + "dateUpdated": "2024-07-05T14:31:57.561Z" }, { - "cveId": "CVE-2024-2525", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2525", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2525.json", - "dateUpdated": "2024-07-05T14:21:37.716Z" + "cveId": "CVE-2024-2853", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2853", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2853.json", + "dateUpdated": "2024-07-05T14:31:58.040Z" }, { - "cveId": "CVE-2024-2526", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2526", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2526.json", - "dateUpdated": "2024-07-05T14:21:37.905Z" + "cveId": "CVE-2024-2854", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2854", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2854.json", + "dateUpdated": "2024-07-05T14:31:58.147Z" }, { - "cveId": "CVE-2024-2527", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2527", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2527.json", - "dateUpdated": "2024-07-05T14:21:37.714Z" + "cveId": "CVE-2024-2855", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2855", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2855.json", + "dateUpdated": "2024-07-05T14:31:58.034Z" }, { - "cveId": "CVE-2024-2528", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2528", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2528.json", - "dateUpdated": "2024-07-05T14:21:37.757Z" + "cveId": "CVE-2024-2856", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2856", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2856.json", + "dateUpdated": "2024-07-05T14:31:58.039Z" }, { - "cveId": "CVE-2024-2529", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2529", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2529.json", - "dateUpdated": "2024-07-05T14:21:37.918Z" + "cveId": "CVE-2024-2857", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2857", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2857.json", + "dateUpdated": "2024-07-05T14:31:57.723Z" }, { - "cveId": "CVE-2024-2530", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2530", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2530.json", - "dateUpdated": "2024-07-05T14:21:37.700Z" + "cveId": "CVE-2024-2858", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2858", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2858.json", + "dateUpdated": "2024-07-05T14:31:58.083Z" }, { - "cveId": "CVE-2024-2531", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2531", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2531.json", - "dateUpdated": "2024-07-05T14:21:37.732Z" + "cveId": "CVE-2024-2859", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2859", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2859.json", + "dateUpdated": "2024-07-05T14:31:57.733Z" }, { - "cveId": "CVE-2024-2532", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2532", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2532.json", - "dateUpdated": "2024-07-05T14:21:37.812Z" + "cveId": "CVE-2024-2860", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2860", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2860.json", + "dateUpdated": "2024-07-05T14:31:58.464Z" }, { - "cveId": "CVE-2024-2533", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2533", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2533.json", - "dateUpdated": "2024-07-05T14:21:37.919Z" + "cveId": "CVE-2024-2861", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2861", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2861.json", + "dateUpdated": "2024-07-05T14:31:58.101Z" }, { - "cveId": "CVE-2024-2534", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2534", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2534.json", - "dateUpdated": "2024-07-05T14:21:37.749Z" + "cveId": "CVE-2024-2862", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2862", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2862.json", + "dateUpdated": "2024-07-05T14:31:58.401Z" }, { - "cveId": "CVE-2024-2535", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2535", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2535.json", - "dateUpdated": "2024-07-05T14:21:37.773Z" + "cveId": "CVE-2024-2863", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2863", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2863.json", + "dateUpdated": "2024-07-05T14:31:58.278Z" }, { - "cveId": "CVE-2024-2536", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2536", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2536.json", - "dateUpdated": "2024-07-05T14:21:37.759Z" + "cveId": "CVE-2024-2864", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2864", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2864.json", + "dateUpdated": "2024-07-05T14:31:58.753Z" }, { - "cveId": "CVE-2024-2537", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2537", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2537.json", - "dateUpdated": "2024-07-05T14:21:37.764Z" + "cveId": "CVE-2024-2865", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2865", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2865.json", + "dateUpdated": "2024-07-05T14:31:58.389Z" }, { - "cveId": "CVE-2024-2538", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2538", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2538.json", - "dateUpdated": "2024-07-05T14:21:37.774Z" + "cveId": "CVE-2024-2867", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2867", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2867.json", + "dateUpdated": "2024-07-05T14:31:58.036Z" }, { - "cveId": "CVE-2024-2539", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2539", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2539.json", - "dateUpdated": "2024-07-05T14:21:37.748Z" + "cveId": "CVE-2024-2868", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2868", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2868.json", + "dateUpdated": "2024-07-05T14:31:58.009Z" }, { - "cveId": "CVE-2024-2542", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2542", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2542.json", - "dateUpdated": "2024-07-05T14:21:37.765Z" + "cveId": "CVE-2024-2871", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2871", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2871.json", + "dateUpdated": "2024-07-05T14:31:58.160Z" }, { - "cveId": "CVE-2024-2543", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2543", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2543.json", - "dateUpdated": "2024-07-05T14:21:37.876Z" + "cveId": "CVE-2024-2873", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2873", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2873.json", + "dateUpdated": "2024-07-05T14:31:58.393Z" }, { - "cveId": "CVE-2024-2544", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2544", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2544.json", - "dateUpdated": "2024-07-05T14:21:37.709Z" + "cveId": "CVE-2024-2874", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2874", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2874.json", + "dateUpdated": "2024-07-05T14:31:57.832Z" }, { - "cveId": "CVE-2024-2546", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2546", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2546.json", - "dateUpdated": "2024-07-05T14:21:37.900Z" + "cveId": "CVE-2024-2876", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2876", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2876.json", + "dateUpdated": "2024-07-05T14:31:58.414Z" }, { - "cveId": "CVE-2024-2547", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2547", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2547.json", - "dateUpdated": "2024-07-05T14:21:37.699Z" + "cveId": "CVE-2024-2877", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2877", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2877.json", + "dateUpdated": "2024-07-05T14:31:58.191Z" }, { - "cveId": "CVE-2024-2548", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2548", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2548.json", - "dateUpdated": "2024-07-05T14:21:37.712Z" + "cveId": "CVE-2024-2879", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2879", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2879.json", + "dateUpdated": "2024-07-05T14:31:57.691Z" }, { - "cveId": "CVE-2024-2553", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2553", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2553.json", - "dateUpdated": "2024-07-05T14:21:37.955Z" + "cveId": "CVE-2024-2882", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2882", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2882.json", + "dateUpdated": "2024-07-05T14:31:58.500Z" }, { - "cveId": "CVE-2024-2554", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2554", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2554.json", - "dateUpdated": "2024-07-05T14:21:37.760Z" + "cveId": "CVE-2024-2883", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2883", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2883.json", + "dateUpdated": "2024-07-05T14:31:57.997Z" }, { - "cveId": "CVE-2024-2555", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2555", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2555.json", - "dateUpdated": "2024-07-05T14:21:37.785Z" + "cveId": "CVE-2024-2885", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2885", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2885.json", + "dateUpdated": "2024-07-05T14:31:58.391Z" }, { - "cveId": "CVE-2024-2556", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2556", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2556.json", - "dateUpdated": "2024-07-05T14:21:37.710Z" + "cveId": "CVE-2024-2886", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2886", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2886.json", + "dateUpdated": "2024-07-05T14:31:58.491Z" }, { - "cveId": "CVE-2024-2557", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2557", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2557.json", - "dateUpdated": "2024-07-05T14:21:37.777Z" + "cveId": "CVE-2024-2887", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2887", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2887.json", + "dateUpdated": "2024-07-05T14:31:58.539Z" }, { - "cveId": "CVE-2024-2558", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2558", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2558.json", - "dateUpdated": "2024-07-05T14:21:37.904Z" + "cveId": "CVE-2024-2888", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2888", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2888.json", + "dateUpdated": "2024-07-05T14:31:57.930Z" }, { - "cveId": "CVE-2024-2559", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2559", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2559.json", - "dateUpdated": "2024-07-05T14:21:37.724Z" + "cveId": "CVE-2024-2889", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2889", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2889.json", + "dateUpdated": "2024-07-05T14:31:58.136Z" }, { - "cveId": "CVE-2024-2560", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2560", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2560.json", - "dateUpdated": "2024-07-05T14:21:37.707Z" + "cveId": "CVE-2024-2890", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2890", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2890.json", + "dateUpdated": "2024-07-05T14:31:58.511Z" }, { - "cveId": "CVE-2024-2561", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2561", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2561.json", - "dateUpdated": "2024-07-05T14:21:37.722Z" + "cveId": "CVE-2024-2891", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2891", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2891.json", + "dateUpdated": "2024-07-05T14:31:58.021Z" }, { - "cveId": "CVE-2024-2562", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2562", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2562.json", - "dateUpdated": "2024-07-05T14:21:37.770Z" + "cveId": "CVE-2024-2892", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2892", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2892.json", + "dateUpdated": "2024-07-05T14:31:58.482Z" }, { - "cveId": "CVE-2024-2563", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2563", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2563.json", - "dateUpdated": "2024-07-05T14:21:37.926Z" + "cveId": "CVE-2024-2893", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2893", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2893.json", + "dateUpdated": "2024-07-05T14:31:58.719Z" }, { - "cveId": "CVE-2024-2564", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2564", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2564.json", - "dateUpdated": "2024-07-05T14:21:37.732Z" + "cveId": "CVE-2024-2894", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2894", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2894.json", + "dateUpdated": "2024-07-05T14:31:58.563Z" }, { - "cveId": "CVE-2024-2565", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2565", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2565.json", - "dateUpdated": "2024-07-05T14:21:37.507Z" + "cveId": "CVE-2024-2895", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2895", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2895.json", + "dateUpdated": "2024-07-05T14:31:58.473Z" }, { - "cveId": "CVE-2024-2566", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2566", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2566.json", - "dateUpdated": "2024-07-05T14:21:37.819Z" + "cveId": "CVE-2024-2896", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2896", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2896.json", + "dateUpdated": "2024-07-05T14:31:58.744Z" }, { - "cveId": "CVE-2024-2567", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2567", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2567.json", - "dateUpdated": "2024-07-05T14:21:37.766Z" + "cveId": "CVE-2024-2897", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2897", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2897.json", + "dateUpdated": "2024-07-05T14:31:58.793Z" }, { - "cveId": "CVE-2024-2568", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2568", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2568.json", - "dateUpdated": "2024-07-05T14:21:37.943Z" + "cveId": "CVE-2024-2898", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2898", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2898.json", + "dateUpdated": "2024-07-05T14:31:58.559Z" }, { - "cveId": "CVE-2024-2569", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2569", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2569.json", - "dateUpdated": "2024-07-05T14:21:37.695Z" + "cveId": "CVE-2024-2899", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2899", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2899.json", + "dateUpdated": "2024-07-05T14:31:58.399Z" }, { - "cveId": "CVE-2024-2570", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2570", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2570.json", - "dateUpdated": "2024-07-05T14:21:37.665Z" + "cveId": "CVE-2024-2900", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2900", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2900.json", + "dateUpdated": "2024-07-05T14:31:58.561Z" }, { - "cveId": "CVE-2024-2571", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2571", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2571.json", - "dateUpdated": "2024-07-05T14:21:37.786Z" + "cveId": "CVE-2024-2901", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2901", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2901.json", + "dateUpdated": "2024-07-05T14:31:58.919Z" }, { - "cveId": "CVE-2024-2572", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2572", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2572.json", - "dateUpdated": "2024-07-05T14:21:37.756Z" + "cveId": "CVE-2024-2902", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2902", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2902.json", + "dateUpdated": "2024-07-05T14:31:58.593Z" }, { - "cveId": "CVE-2024-2573", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2573", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2573.json", - "dateUpdated": "2024-07-05T14:21:37.750Z" + "cveId": "CVE-2024-2903", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2903", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2903.json", + "dateUpdated": "2024-07-05T14:31:58.535Z" }, { - "cveId": "CVE-2024-2574", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2574", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2574.json", - "dateUpdated": "2024-07-05T14:21:37.742Z" + "cveId": "CVE-2024-2904", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2904", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2904.json", + "dateUpdated": "2024-07-05T14:31:58.568Z" }, { - "cveId": "CVE-2024-2575", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2575", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2575.json", - "dateUpdated": "2024-07-05T14:21:37.728Z" + "cveId": "CVE-2024-2905", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2905", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2905.json", + "dateUpdated": "2024-07-05T14:31:58.066Z" }, { - "cveId": "CVE-2024-2576", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2576", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2576.json", - "dateUpdated": "2024-07-05T14:21:37.739Z" + "cveId": "CVE-2024-2906", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2906", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2906.json", + "dateUpdated": "2024-07-05T14:31:58.556Z" }, { - "cveId": "CVE-2024-2577", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2577", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2577.json", - "dateUpdated": "2024-07-05T14:21:37.751Z" + "cveId": "CVE-2024-2907", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2907", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2907.json", + "dateUpdated": "2024-07-05T14:31:58.826Z" }, { - "cveId": "CVE-2024-2578", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2578", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2578.json", - "dateUpdated": "2024-07-05T14:21:37.693Z" + "cveId": "CVE-2024-2908", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2908", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2908.json", + "dateUpdated": "2024-07-05T14:31:58.560Z" }, { - "cveId": "CVE-2024-2579", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2579", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2579.json", - "dateUpdated": "2024-07-05T14:21:37.715Z" + "cveId": "CVE-2024-2909", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2909", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2909.json", + "dateUpdated": "2024-07-05T14:31:58.514Z" }, { - "cveId": "CVE-2024-2580", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2580", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2580.json", - "dateUpdated": "2024-07-05T14:21:37.787Z" + "cveId": "CVE-2024-2910", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2910", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2910.json", + "dateUpdated": "2024-07-05T14:31:58.740Z" }, { - "cveId": "CVE-2024-2581", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2581", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2581.json", - "dateUpdated": "2024-07-05T14:21:37.840Z" + "cveId": "CVE-2024-2911", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2911", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2911.json", + "dateUpdated": "2024-07-05T14:31:58.936Z" }, { - "cveId": "CVE-2024-2583", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2583", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2583.json", - "dateUpdated": "2024-07-05T14:21:37.790Z" + "cveId": "CVE-2024-2912", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2912", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2912.json", + "dateUpdated": "2024-07-05T14:31:58.754Z" }, { - "cveId": "CVE-2024-2584", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2584", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2584.json", - "dateUpdated": "2024-07-05T14:21:37.945Z" + "cveId": "CVE-2024-2913", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2913", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2913.json", + "dateUpdated": "2024-07-05T14:31:58.796Z" }, { - "cveId": "CVE-2024-2585", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2585", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2585.json", - "dateUpdated": "2024-07-05T14:21:37.920Z" + "cveId": "CVE-2024-2914", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2914", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2914.json", + "dateUpdated": "2024-07-05T14:31:58.127Z" }, { - "cveId": "CVE-2024-2586", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2586", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2586.json", - "dateUpdated": "2024-07-05T14:21:37.928Z" + "cveId": "CVE-2024-2915", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2915", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2915.json", + "dateUpdated": "2024-07-05T14:31:58.567Z" }, { - "cveId": "CVE-2024-2587", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2587", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2587.json", - "dateUpdated": "2024-07-05T14:21:37.740Z" + "cveId": "CVE-2024-2916", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2916", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2916.json", + "dateUpdated": "2024-07-05T14:31:58.116Z" }, { - "cveId": "CVE-2024-2588", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2588", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2588.json", - "dateUpdated": "2024-07-05T14:21:37.782Z" + "cveId": "CVE-2024-2917", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2917", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2917.json", + "dateUpdated": "2024-07-05T14:31:58.852Z" }, { - "cveId": "CVE-2024-2589", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2589", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2589.json", - "dateUpdated": "2024-07-05T14:21:37.731Z" + "cveId": "CVE-2024-2918", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2918", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2918.json", + "dateUpdated": "2024-07-05T14:31:58.548Z" }, { - "cveId": "CVE-2024-2590", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2590", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2590.json", - "dateUpdated": "2024-07-05T14:21:37.730Z" + "cveId": "CVE-2024-2919", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2919", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2919.json", + "dateUpdated": "2024-07-05T14:31:58.811Z" }, { - "cveId": "CVE-2024-2591", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2591", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2591.json", - "dateUpdated": "2024-07-05T14:21:37.808Z" + "cveId": "CVE-2024-2920", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2920", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2920.json", + "dateUpdated": "2024-07-05T14:31:58.488Z" }, { - "cveId": "CVE-2024-2592", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2592", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2592.json", - "dateUpdated": "2024-07-05T14:21:37.758Z" + "cveId": "CVE-2024-2921", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2921", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2921.json", + "dateUpdated": "2024-07-05T14:31:58.480Z" }, { - "cveId": "CVE-2024-2593", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2593", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2593.json", - "dateUpdated": "2024-07-05T14:21:37.861Z" + "cveId": "CVE-2024-2922", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2922", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2922.json", + "dateUpdated": "2024-07-05T14:31:58.766Z" }, { - "cveId": "CVE-2024-2594", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2594", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2594.json", - "dateUpdated": "2024-07-05T14:21:38.005Z" + "cveId": "CVE-2024-2923", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2923", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2923.json", + "dateUpdated": "2024-07-05T14:31:58.603Z" }, { - "cveId": "CVE-2024-2595", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2595", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2595.json", - "dateUpdated": "2024-07-05T14:21:37.958Z" + "cveId": "CVE-2024-2924", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2924", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2924.json", + "dateUpdated": "2024-07-05T14:31:58.605Z" }, { - "cveId": "CVE-2024-2596", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2596", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2596.json", - "dateUpdated": "2024-07-05T14:21:37.975Z" + "cveId": "CVE-2024-2925", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2925", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2925.json", + "dateUpdated": "2024-07-05T14:31:58.476Z" }, { - "cveId": "CVE-2024-2597", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2597", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2597.json", - "dateUpdated": "2024-07-05T14:21:37.771Z" + "cveId": "CVE-2024-2927", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2927", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2927.json", + "dateUpdated": "2024-07-05T14:31:58.814Z" }, { - "cveId": "CVE-2024-2598", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2598", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2598.json", - "dateUpdated": "2024-07-05T14:21:37.957Z" + "cveId": "CVE-2024-2928", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2928", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2928.json", + "dateUpdated": "2024-07-05T14:31:58.834Z" }, { - "cveId": "CVE-2024-2599", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2599", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2599.json", - "dateUpdated": "2024-07-05T14:21:37.962Z" + "cveId": "CVE-2024-2929", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2929", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2929.json", + "dateUpdated": "2024-07-05T14:31:58.752Z" }, { - "cveId": "CVE-2024-2603", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2603", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2603.json", - "dateUpdated": "2024-07-05T14:21:37.964Z" + "cveId": "CVE-2024-2930", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2930", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2930.json", + "dateUpdated": "2024-07-05T14:31:58.774Z" }, { - "cveId": "CVE-2024-2604", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2604", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2604.json", - "dateUpdated": "2024-07-05T14:21:37.995Z" + "cveId": "CVE-2024-2931", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2931", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2931.json", + "dateUpdated": "2024-07-05T14:31:58.777Z" }, { - "cveId": "CVE-2024-2605", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2605", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2605.json", - "dateUpdated": "2024-07-05T14:21:38.093Z" + "cveId": "CVE-2024-2932", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2932", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2932.json", + "dateUpdated": "2024-07-05T14:31:58.830Z" }, { - "cveId": "CVE-2024-2606", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2606", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2606.json", - "dateUpdated": "2024-07-05T14:21:37.850Z" + "cveId": "CVE-2024-2933", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2933", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2933.json", + "dateUpdated": "2024-07-05T14:31:58.854Z" }, { - "cveId": "CVE-2024-2607", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2607", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2607.json", - "dateUpdated": "2024-07-05T14:21:38.000Z" + "cveId": "CVE-2024-2934", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2934", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2934.json", + "dateUpdated": "2024-07-05T14:31:58.600Z" }, { - "cveId": "CVE-2024-2608", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2608", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2608.json", - "dateUpdated": "2024-07-05T14:21:37.950Z" + "cveId": "CVE-2024-2935", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2935", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2935.json", + "dateUpdated": "2024-07-05T14:31:58.815Z" }, { - "cveId": "CVE-2024-2609", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2609", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2609.json", - "dateUpdated": "2024-07-05T14:21:37.988Z" + "cveId": "CVE-2024-2936", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2936", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2936.json", + "dateUpdated": "2024-07-05T14:31:58.861Z" }, { - "cveId": "CVE-2024-2610", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2610", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2610.json", - "dateUpdated": "2024-07-05T14:21:37.940Z" + "cveId": "CVE-2024-2938", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2938", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2938.json", + "dateUpdated": "2024-07-05T14:31:58.750Z" } ], "error": [] diff --git a/cves/deltaLog.json b/cves/deltaLog.json index 3931441c327..63d8e7b29e0 100644 --- a/cves/deltaLog.json +++ b/cves/deltaLog.json @@ -1,4 +1,1812 @@ [ + { + "fetchTime": "2024-07-05T14:49:12.086Z", + "numberOfChanges": 300, + "new": [], + "updated": [ + { + "cveId": "CVE-2024-2611", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2611", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2611.json", + "dateUpdated": "2024-07-05T14:26:39.515Z" + }, + { + "cveId": "CVE-2024-2612", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2612", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2612.json", + "dateUpdated": "2024-07-05T14:26:39.581Z" + }, + { + "cveId": "CVE-2024-2613", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2613", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2613.json", + "dateUpdated": "2024-07-05T14:26:39.776Z" + }, + { + "cveId": "CVE-2024-2614", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2614", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2614.json", + "dateUpdated": "2024-07-05T14:26:39.782Z" + }, + { + "cveId": "CVE-2024-2615", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2615", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2615.json", + "dateUpdated": "2024-07-05T14:26:39.838Z" + }, + { + "cveId": "CVE-2024-2616", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2616", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2616.json", + "dateUpdated": "2024-07-05T14:26:39.672Z" + }, + { + "cveId": "CVE-2024-2617", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2617", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2617.json", + "dateUpdated": "2024-07-05T14:26:39.862Z" + }, + { + "cveId": "CVE-2024-2618", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2618", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2618.json", + "dateUpdated": "2024-07-05T14:26:39.517Z" + }, + { + "cveId": "CVE-2024-2619", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2619", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2619.json", + "dateUpdated": "2024-07-05T14:26:39.845Z" + }, + { + "cveId": "CVE-2024-2620", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2620", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2620.json", + "dateUpdated": "2024-07-05T14:26:39.868Z" + }, + { + "cveId": "CVE-2024-2621", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2621", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2621.json", + "dateUpdated": "2024-07-05T14:26:39.520Z" + }, + { + "cveId": "CVE-2024-2622", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2622", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2622.json", + "dateUpdated": "2024-07-05T14:26:39.763Z" + }, + { + "cveId": "CVE-2024-2623", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2623", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2623.json", + "dateUpdated": "2024-07-05T14:26:39.886Z" + }, + { + "cveId": "CVE-2024-2624", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2624", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2624.json", + "dateUpdated": "2024-07-05T14:26:39.836Z" + }, + { + "cveId": "CVE-2024-2625", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2625", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2625.json", + "dateUpdated": "2024-07-05T14:26:39.865Z" + }, + { + "cveId": "CVE-2024-2626", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2626", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2626.json", + "dateUpdated": "2024-07-05T14:26:39.871Z" + }, + { + "cveId": "CVE-2024-2627", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2627", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2627.json", + "dateUpdated": "2024-07-05T14:26:39.809Z" + }, + { + "cveId": "CVE-2024-2628", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2628", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2628.json", + "dateUpdated": "2024-07-05T14:26:39.616Z" + }, + { + "cveId": "CVE-2024-2629", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2629", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2629.json", + "dateUpdated": "2024-07-05T14:26:39.513Z" + }, + { + "cveId": "CVE-2024-2630", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2630", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2630.json", + "dateUpdated": "2024-07-05T14:26:39.885Z" + }, + { + "cveId": "CVE-2024-2631", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2631", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2631.json", + "dateUpdated": "2024-07-05T14:26:39.882Z" + }, + { + "cveId": "CVE-2024-2632", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2632", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2632.json", + "dateUpdated": "2024-07-05T14:26:39.896Z" + }, + { + "cveId": "CVE-2024-2633", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2633", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2633.json", + "dateUpdated": "2024-07-05T14:26:40.205Z" + }, + { + "cveId": "CVE-2024-2634", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2634", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2634.json", + "dateUpdated": "2024-07-05T14:26:39.881Z" + }, + { + "cveId": "CVE-2024-2635", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2635", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2635.json", + "dateUpdated": "2024-07-05T14:26:40.215Z" + }, + { + "cveId": "CVE-2024-2636", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2636", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2636.json", + "dateUpdated": "2024-07-05T14:26:39.974Z" + }, + { + "cveId": "CVE-2024-2637", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2637", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2637.json", + "dateUpdated": "2024-07-05T14:26:39.781Z" + }, + { + "cveId": "CVE-2024-2639", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2639", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2639.json", + "dateUpdated": "2024-07-05T14:26:40.225Z" + }, + { + "cveId": "CVE-2024-2641", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2641", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2641.json", + "dateUpdated": "2024-07-05T14:26:41.805Z" + }, + { + "cveId": "CVE-2024-2642", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2642", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2642.json", + "dateUpdated": "2024-07-05T14:26:39.697Z" + }, + { + "cveId": "CVE-2024-2644", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2644", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2644.json", + "dateUpdated": "2024-07-05T14:26:39.895Z" + }, + { + "cveId": "CVE-2024-2645", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2645", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2645.json", + "dateUpdated": "2024-07-05T14:26:39.854Z" + }, + { + "cveId": "CVE-2024-2646", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2646", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2646.json", + "dateUpdated": "2024-07-05T14:26:40.071Z" + }, + { + "cveId": "CVE-2024-2647", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2647", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2647.json", + "dateUpdated": "2024-07-05T14:26:40.056Z" + }, + { + "cveId": "CVE-2024-2648", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2648", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2648.json", + "dateUpdated": "2024-07-05T14:26:40.124Z" + }, + { + "cveId": "CVE-2024-2649", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2649", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2649.json", + "dateUpdated": "2024-07-05T14:26:40.214Z" + }, + { + "cveId": "CVE-2024-2650", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2650", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2650.json", + "dateUpdated": "2024-07-05T14:26:39.800Z" + }, + { + "cveId": "CVE-2024-2651", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2651", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2651.json", + "dateUpdated": "2024-07-05T14:26:39.762Z" + }, + { + "cveId": "CVE-2024-2653", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2653", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2653.json", + "dateUpdated": "2024-07-05T14:26:41.832Z" + }, + { + "cveId": "CVE-2024-2654", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2654", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2654.json", + "dateUpdated": "2024-07-05T14:26:42.249Z" + }, + { + "cveId": "CVE-2024-2655", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2655", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2655.json", + "dateUpdated": "2024-07-05T14:26:40.122Z" + }, + { + "cveId": "CVE-2024-2656", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2656", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2656.json", + "dateUpdated": "2024-07-05T14:26:40.222Z" + }, + { + "cveId": "CVE-2024-2657", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2657", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2657.json", + "dateUpdated": "2024-07-05T14:26:40.218Z" + }, + { + "cveId": "CVE-2024-2659", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2659", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2659.json", + "dateUpdated": "2024-07-05T14:26:42.265Z" + }, + { + "cveId": "CVE-2024-2660", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2660", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2660.json", + "dateUpdated": "2024-07-05T14:26:42.266Z" + }, + { + "cveId": "CVE-2024-2661", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2661", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2661.json", + "dateUpdated": "2024-07-05T14:26:41.966Z" + }, + { + "cveId": "CVE-2024-2662", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2662", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2662.json", + "dateUpdated": "2024-07-05T14:26:40.203Z" + }, + { + "cveId": "CVE-2024-2663", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2663", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2663.json", + "dateUpdated": "2024-07-05T14:26:39.874Z" + }, + { + "cveId": "CVE-2024-2664", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2664", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2664.json", + "dateUpdated": "2024-07-05T14:26:39.810Z" + }, + { + "cveId": "CVE-2024-2665", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2665", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2665.json", + "dateUpdated": "2024-07-05T14:26:40.164Z" + }, + { + "cveId": "CVE-2024-2666", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2666", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2666.json", + "dateUpdated": "2024-07-05T14:26:40.211Z" + }, + { + "cveId": "CVE-2024-2667", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2667", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2667.json", + "dateUpdated": "2024-07-05T14:26:41.841Z" + }, + { + "cveId": "CVE-2024-2668", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2668", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2668.json", + "dateUpdated": "2024-07-05T14:26:41.819Z" + }, + { + "cveId": "CVE-2024-2669", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2669", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2669.json", + "dateUpdated": "2024-07-05T14:26:41.968Z" + }, + { + "cveId": "CVE-2024-2670", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2670", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2670.json", + "dateUpdated": "2024-07-05T14:26:41.833Z" + }, + { + "cveId": "CVE-2024-2671", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2671", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2671.json", + "dateUpdated": "2024-07-05T14:26:42.269Z" + }, + { + "cveId": "CVE-2024-2672", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2672", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2672.json", + "dateUpdated": "2024-07-05T14:26:42.298Z" + }, + { + "cveId": "CVE-2024-2673", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2673", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2673.json", + "dateUpdated": "2024-07-05T14:26:40.208Z" + }, + { + "cveId": "CVE-2024-2674", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2674", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2674.json", + "dateUpdated": "2024-07-05T14:26:42.258Z" + }, + { + "cveId": "CVE-2024-2675", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2675", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2675.json", + "dateUpdated": "2024-07-05T14:26:39.949Z" + }, + { + "cveId": "CVE-2024-2676", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2676", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2676.json", + "dateUpdated": "2024-07-05T14:26:41.811Z" + }, + { + "cveId": "CVE-2024-2677", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2677", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2677.json", + "dateUpdated": "2024-07-05T14:26:42.237Z" + }, + { + "cveId": "CVE-2024-2678", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2678", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2678.json", + "dateUpdated": "2024-07-05T14:26:41.966Z" + }, + { + "cveId": "CVE-2024-2679", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2679", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2679.json", + "dateUpdated": "2024-07-05T14:26:42.062Z" + }, + { + "cveId": "CVE-2024-2680", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2680", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2680.json", + "dateUpdated": "2024-07-05T14:26:42.325Z" + }, + { + "cveId": "CVE-2024-2681", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2681", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2681.json", + "dateUpdated": "2024-07-05T14:26:42.302Z" + }, + { + "cveId": "CVE-2024-2682", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2682", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2682.json", + "dateUpdated": "2024-07-05T14:26:41.809Z" + }, + { + "cveId": "CVE-2024-2683", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2683", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2683.json", + "dateUpdated": "2024-07-05T14:26:41.965Z" + }, + { + "cveId": "CVE-2024-2684", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2684", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2684.json", + "dateUpdated": "2024-07-05T14:26:41.847Z" + }, + { + "cveId": "CVE-2024-2685", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2685", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2685.json", + "dateUpdated": "2024-07-05T14:26:41.975Z" + }, + { + "cveId": "CVE-2024-2686", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2686", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2686.json", + "dateUpdated": "2024-07-05T14:26:42.306Z" + }, + { + "cveId": "CVE-2024-2687", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2687", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2687.json", + "dateUpdated": "2024-07-05T14:26:42.073Z" + }, + { + "cveId": "CVE-2024-2688", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2688", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2688.json", + "dateUpdated": "2024-07-05T14:26:41.963Z" + }, + { + "cveId": "CVE-2024-2689", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2689", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2689.json", + "dateUpdated": "2024-07-05T14:26:42.323Z" + }, + { + "cveId": "CVE-2024-2690", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2690", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2690.json", + "dateUpdated": "2024-07-05T14:26:42.060Z" + }, + { + "cveId": "CVE-2024-2692", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2692", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2692.json", + "dateUpdated": "2024-07-05T14:26:41.969Z" + }, + { + "cveId": "CVE-2024-2693", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2693", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2693.json", + "dateUpdated": "2024-07-05T14:26:42.299Z" + }, + { + "cveId": "CVE-2024-2695", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2695", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2695.json", + "dateUpdated": "2024-07-05T14:26:41.967Z" + }, + { + "cveId": "CVE-2024-2697", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2697", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2697.json", + "dateUpdated": "2024-07-05T14:26:42.315Z" + }, + { + "cveId": "CVE-2024-2698", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2698", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2698.json", + "dateUpdated": "2024-07-05T14:26:42.314Z" + }, + { + "cveId": "CVE-2024-2700", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2700", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2700.json", + "dateUpdated": "2024-07-05T14:26:42.345Z" + }, + { + "cveId": "CVE-2024-2702", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2702", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2702.json", + "dateUpdated": "2024-07-05T14:26:42.297Z" + }, + { + "cveId": "CVE-2024-2703", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2703", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2703.json", + "dateUpdated": "2024-07-05T14:26:39.847Z" + }, + { + "cveId": "CVE-2024-2704", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2704", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2704.json", + "dateUpdated": "2024-07-05T14:26:41.895Z" + }, + { + "cveId": "CVE-2024-2705", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2705", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2705.json", + "dateUpdated": "2024-07-05T14:26:42.215Z" + }, + { + "cveId": "CVE-2024-2706", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2706", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2706.json", + "dateUpdated": "2024-07-05T14:26:42.076Z" + }, + { + "cveId": "CVE-2024-2707", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2707", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2707.json", + "dateUpdated": "2024-07-05T14:26:39.802Z" + }, + { + "cveId": "CVE-2024-2708", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2708", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2708.json", + "dateUpdated": "2024-07-05T14:26:42.324Z" + }, + { + "cveId": "CVE-2024-2709", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2709", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2709.json", + "dateUpdated": "2024-07-05T14:26:42.283Z" + }, + { + "cveId": "CVE-2024-2710", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2710", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2710.json", + "dateUpdated": "2024-07-05T14:26:42.274Z" + }, + { + "cveId": "CVE-2024-2711", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2711", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2711.json", + "dateUpdated": "2024-07-05T14:26:42.245Z" + }, + { + "cveId": "CVE-2024-2712", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2712", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2712.json", + "dateUpdated": "2024-07-05T14:26:42.195Z" + }, + { + "cveId": "CVE-2024-2713", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2713", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2713.json", + "dateUpdated": "2024-07-05T14:26:42.339Z" + }, + { + "cveId": "CVE-2024-2714", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2714", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2714.json", + "dateUpdated": "2024-07-05T14:26:42.241Z" + }, + { + "cveId": "CVE-2024-2715", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2715", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2715.json", + "dateUpdated": "2024-07-05T14:26:42.223Z" + }, + { + "cveId": "CVE-2024-2716", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2716", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2716.json", + "dateUpdated": "2024-07-05T14:26:42.067Z" + }, + { + "cveId": "CVE-2024-2717", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2717", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2717.json", + "dateUpdated": "2024-07-05T14:26:42.340Z" + }, + { + "cveId": "CVE-2024-2718", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2718", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2718.json", + "dateUpdated": "2024-07-05T14:26:42.316Z" + }, + { + "cveId": "CVE-2024-2719", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2719", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2719.json", + "dateUpdated": "2024-07-05T14:26:42.307Z" + }, + { + "cveId": "CVE-2024-2720", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2720", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2720.json", + "dateUpdated": "2024-07-05T14:26:42.318Z" + }, + { + "cveId": "CVE-2024-2721", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2721", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2721.json", + "dateUpdated": "2024-07-05T14:26:42.257Z" + }, + { + "cveId": "CVE-2024-2722", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2722", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2722.json", + "dateUpdated": "2024-07-05T14:26:42.300Z" + }, + { + "cveId": "CVE-2024-2723", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2723", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2723.json", + "dateUpdated": "2024-07-05T14:26:42.222Z" + }, + { + "cveId": "CVE-2024-2724", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2724", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2724.json", + "dateUpdated": "2024-07-05T14:26:42.468Z" + }, + { + "cveId": "CVE-2024-2725", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2725", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2725.json", + "dateUpdated": "2024-07-05T14:26:42.317Z" + }, + { + "cveId": "CVE-2024-2726", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2726", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2726.json", + "dateUpdated": "2024-07-05T14:26:42.072Z" + }, + { + "cveId": "CVE-2024-2727", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2727", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2727.json", + "dateUpdated": "2024-07-05T14:26:39.898Z" + }, + { + "cveId": "CVE-2024-2728", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2728", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2728.json", + "dateUpdated": "2024-07-05T14:26:42.338Z" + }, + { + "cveId": "CVE-2024-2729", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2729", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2729.json", + "dateUpdated": "2024-07-05T14:26:42.349Z" + }, + { + "cveId": "CVE-2024-2730", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2730", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2730.json", + "dateUpdated": "2024-07-05T14:26:42.464Z" + }, + { + "cveId": "CVE-2024-2731", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2731", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2731.json", + "dateUpdated": "2024-07-05T14:26:42.382Z" + }, + { + "cveId": "CVE-2024-2732", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2732", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2732.json", + "dateUpdated": "2024-07-05T14:26:42.242Z" + }, + { + "cveId": "CVE-2024-2733", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2733", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2733.json", + "dateUpdated": "2024-07-05T14:26:42.350Z" + }, + { + "cveId": "CVE-2024-2734", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2734", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2734.json", + "dateUpdated": "2024-07-05T14:26:42.421Z" + }, + { + "cveId": "CVE-2024-2735", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2735", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2735.json", + "dateUpdated": "2024-07-05T14:26:42.444Z" + }, + { + "cveId": "CVE-2024-2736", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2736", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2736.json", + "dateUpdated": "2024-07-05T14:26:42.357Z" + }, + { + "cveId": "CVE-2024-2738", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2738", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2738.json", + "dateUpdated": "2024-07-05T14:26:42.214Z" + }, + { + "cveId": "CVE-2024-2739", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2739", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2739.json", + "dateUpdated": "2024-07-05T14:26:39.870Z" + }, + { + "cveId": "CVE-2024-2740", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2740", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2740.json", + "dateUpdated": "2024-07-05T14:26:42.261Z" + }, + { + "cveId": "CVE-2024-2741", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2741", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2741.json", + "dateUpdated": "2024-07-05T14:26:42.261Z" + }, + { + "cveId": "CVE-2024-2742", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2742", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2742.json", + "dateUpdated": "2024-07-05T14:26:42.377Z" + }, + { + "cveId": "CVE-2024-2744", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2744", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2744.json", + "dateUpdated": "2024-07-05T14:26:42.351Z" + }, + { + "cveId": "CVE-2024-2745", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2745", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2745.json", + "dateUpdated": "2024-07-05T14:26:42.400Z" + }, + { + "cveId": "CVE-2024-2746", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2746", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2746.json", + "dateUpdated": "2024-07-05T14:26:42.243Z" + }, + { + "cveId": "CVE-2024-2747", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2747", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2747.json", + "dateUpdated": "2024-07-05T14:26:42.207Z" + }, + { + "cveId": "CVE-2024-2748", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2748", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2748.json", + "dateUpdated": "2024-07-05T14:26:39.869Z" + }, + { + "cveId": "CVE-2024-2749", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2749", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2749.json", + "dateUpdated": "2024-07-05T14:26:42.448Z" + }, + { + "cveId": "CVE-2024-2750", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2750", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2750.json", + "dateUpdated": "2024-07-05T14:26:42.271Z" + }, + { + "cveId": "CVE-2024-2751", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2751", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2751.json", + "dateUpdated": "2024-07-05T14:26:42.379Z" + }, + { + "cveId": "CVE-2024-2752", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2752", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2752.json", + "dateUpdated": "2024-07-05T14:26:39.873Z" + }, + { + "cveId": "CVE-2024-2753", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2753", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2753.json", + "dateUpdated": "2024-07-05T14:26:42.313Z" + }, + { + "cveId": "CVE-2024-2754", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2754", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2754.json", + "dateUpdated": "2024-07-05T14:26:42.225Z" + }, + { + "cveId": "CVE-2024-2756", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2756", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2756.json", + "dateUpdated": "2024-07-05T14:26:42.309Z" + }, + { + "cveId": "CVE-2024-2757", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2757", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2757.json", + "dateUpdated": "2024-07-05T14:26:39.872Z" + }, + { + "cveId": "CVE-2024-2758", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2758", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2758.json", + "dateUpdated": "2024-07-05T14:26:42.473Z" + }, + { + "cveId": "CVE-2024-2759", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2759", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2759.json", + "dateUpdated": "2024-07-05T14:26:42.466Z" + }, + { + "cveId": "CVE-2024-2760", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2760", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2760.json", + "dateUpdated": "2024-07-05T14:26:42.301Z" + }, + { + "cveId": "CVE-2024-2761", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2761", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2761.json", + "dateUpdated": "2024-07-05T14:26:42.501Z" + }, + { + "cveId": "CVE-2024-2762", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2762", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2762.json", + "dateUpdated": "2024-07-05T14:26:39.883Z" + }, + { + "cveId": "CVE-2024-2763", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2763", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2763.json", + "dateUpdated": "2024-07-05T14:26:42.472Z" + }, + { + "cveId": "CVE-2024-2764", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2764", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2764.json", + "dateUpdated": "2024-07-05T14:26:42.474Z" + }, + { + "cveId": "CVE-2024-2765", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2765", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2765.json", + "dateUpdated": "2024-07-05T14:26:42.488Z" + }, + { + "cveId": "CVE-2024-2766", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2766", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2766.json", + "dateUpdated": "2024-07-05T14:26:40.143Z" + }, + { + "cveId": "CVE-2024-2767", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2767", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2767.json", + "dateUpdated": "2024-07-05T14:26:40.065Z" + }, + { + "cveId": "CVE-2024-2768", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2768", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2768.json", + "dateUpdated": "2024-07-05T14:26:40.064Z" + }, + { + "cveId": "CVE-2024-2769", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2769", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2769.json", + "dateUpdated": "2024-07-05T14:26:40.195Z" + }, + { + "cveId": "CVE-2024-2770", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2770", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2770.json", + "dateUpdated": "2024-07-05T14:26:41.808Z" + }, + { + "cveId": "CVE-2024-2771", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2771", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2771.json", + "dateUpdated": "2024-07-05T14:26:41.810Z" + }, + { + "cveId": "CVE-2024-2772", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2772", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2772.json", + "dateUpdated": "2024-07-05T14:26:42.268Z" + }, + { + "cveId": "CVE-2024-2773", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2773", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2773.json", + "dateUpdated": "2024-07-05T14:26:41.974Z" + }, + { + "cveId": "CVE-2024-2774", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2774", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2774.json", + "dateUpdated": "2024-07-05T14:26:42.253Z" + }, + { + "cveId": "CVE-2024-2775", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2775", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2775.json", + "dateUpdated": "2024-07-05T14:26:42.359Z" + }, + { + "cveId": "CVE-2024-2776", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2776", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2776.json", + "dateUpdated": "2024-07-05T14:26:42.522Z" + }, + { + "cveId": "CVE-2024-2777", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2777", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2777.json", + "dateUpdated": "2024-07-05T14:26:41.842Z" + }, + { + "cveId": "CVE-2024-2778", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2778", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2778.json", + "dateUpdated": "2024-07-05T14:26:42.570Z" + }, + { + "cveId": "CVE-2024-2779", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2779", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2779.json", + "dateUpdated": "2024-07-05T14:26:40.224Z" + }, + { + "cveId": "CVE-2024-2780", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2780", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2780.json", + "dateUpdated": "2024-07-05T14:26:42.521Z" + }, + { + "cveId": "CVE-2024-2781", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2781", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2781.json", + "dateUpdated": "2024-07-05T14:26:42.248Z" + }, + { + "cveId": "CVE-2024-2782", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2782", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2782.json", + "dateUpdated": "2024-07-05T14:26:42.577Z" + }, + { + "cveId": "CVE-2024-2783", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2783", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2783.json", + "dateUpdated": "2024-07-05T14:26:42.571Z" + }, + { + "cveId": "CVE-2024-2784", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2784", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2784.json", + "dateUpdated": "2024-07-05T14:26:42.517Z" + }, + { + "cveId": "CVE-2024-2785", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2785", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2785.json", + "dateUpdated": "2024-07-05T14:26:42.512Z" + }, + { + "cveId": "CVE-2024-2786", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2786", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2786.json", + "dateUpdated": "2024-07-05T14:26:42.548Z" + }, + { + "cveId": "CVE-2024-2787", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2787", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2787.json", + "dateUpdated": "2024-07-05T14:26:42.560Z" + }, + { + "cveId": "CVE-2024-2788", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2788", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2788.json", + "dateUpdated": "2024-07-05T14:26:42.497Z" + }, + { + "cveId": "CVE-2024-2789", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2789", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2789.json", + "dateUpdated": "2024-07-05T14:26:42.579Z" + }, + { + "cveId": "CVE-2024-2790", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2790", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2790.json", + "dateUpdated": "2024-07-05T14:26:42.534Z" + }, + { + "cveId": "CVE-2024-2791", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2791", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2791.json", + "dateUpdated": "2024-07-05T14:26:42.532Z" + }, + { + "cveId": "CVE-2024-2792", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2792", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2792.json", + "dateUpdated": "2024-07-05T14:26:42.582Z" + }, + { + "cveId": "CVE-2024-2793", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2793", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2793.json", + "dateUpdated": "2024-07-05T14:26:42.572Z" + }, + { + "cveId": "CVE-2024-2794", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2794", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2794.json", + "dateUpdated": "2024-07-05T14:26:42.482Z" + }, + { + "cveId": "CVE-2024-2795", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2795", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2795.json", + "dateUpdated": "2024-07-05T14:26:42.590Z" + }, + { + "cveId": "CVE-2024-2796", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2796", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2796.json", + "dateUpdated": "2024-07-05T14:26:42.550Z" + }, + { + "cveId": "CVE-2024-2797", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2797", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2797.json", + "dateUpdated": "2024-07-05T14:26:42.500Z" + }, + { + "cveId": "CVE-2024-2798", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2798", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2798.json", + "dateUpdated": "2024-07-05T14:26:42.581Z" + }, + { + "cveId": "CVE-2024-2799", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2799", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2799.json", + "dateUpdated": "2024-07-05T14:26:42.568Z" + }, + { + "cveId": "CVE-2024-2801", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2801", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2801.json", + "dateUpdated": "2024-07-05T14:26:42.592Z" + }, + { + "cveId": "CVE-2024-2803", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2803", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2803.json", + "dateUpdated": "2024-07-05T14:26:42.465Z" + }, + { + "cveId": "CVE-2024-2804", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2804", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2804.json", + "dateUpdated": "2024-07-05T14:26:42.592Z" + }, + { + "cveId": "CVE-2024-2805", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2805", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2805.json", + "dateUpdated": "2024-07-05T14:26:42.582Z" + }, + { + "cveId": "CVE-2024-2806", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2806", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2806.json", + "dateUpdated": "2024-07-05T14:26:42.552Z" + }, + { + "cveId": "CVE-2024-2807", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2807", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2807.json", + "dateUpdated": "2024-07-05T14:26:42.576Z" + }, + { + "cveId": "CVE-2024-2808", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2808", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2808.json", + "dateUpdated": "2024-07-05T14:26:42.571Z" + }, + { + "cveId": "CVE-2024-2809", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2809", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2809.json", + "dateUpdated": "2024-07-05T14:26:42.506Z" + }, + { + "cveId": "CVE-2024-2810", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2810", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2810.json", + "dateUpdated": "2024-07-05T14:26:42.548Z" + }, + { + "cveId": "CVE-2024-2811", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2811", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2811.json", + "dateUpdated": "2024-07-05T14:26:42.502Z" + }, + { + "cveId": "CVE-2024-2812", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2812", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2812.json", + "dateUpdated": "2024-07-05T14:26:42.507Z" + }, + { + "cveId": "CVE-2024-2813", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2813", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2813.json", + "dateUpdated": "2024-07-05T14:26:42.501Z" + }, + { + "cveId": "CVE-2024-2814", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2814", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2814.json", + "dateUpdated": "2024-07-05T14:26:42.580Z" + }, + { + "cveId": "CVE-2024-2815", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2815", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2815.json", + "dateUpdated": "2024-07-05T14:26:42.531Z" + }, + { + "cveId": "CVE-2024-2816", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2816", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2816.json", + "dateUpdated": "2024-07-05T14:26:42.578Z" + }, + { + "cveId": "CVE-2024-2817", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2817", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2817.json", + "dateUpdated": "2024-07-05T14:26:42.535Z" + }, + { + "cveId": "CVE-2024-2818", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2818", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2818.json", + "dateUpdated": "2024-07-05T14:26:42.530Z" + }, + { + "cveId": "CVE-2024-2820", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2820", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2820.json", + "dateUpdated": "2024-07-05T14:26:42.552Z" + }, + { + "cveId": "CVE-2024-2821", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2821", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2821.json", + "dateUpdated": "2024-07-05T14:26:42.591Z" + }, + { + "cveId": "CVE-2024-2822", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2822", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2822.json", + "dateUpdated": "2024-07-05T14:26:42.549Z" + }, + { + "cveId": "CVE-2024-2823", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2823", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2823.json", + "dateUpdated": "2024-07-05T14:26:42.579Z" + }, + { + "cveId": "CVE-2024-2824", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2824", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2824.json", + "dateUpdated": "2024-07-05T14:26:42.551Z" + }, + { + "cveId": "CVE-2024-2825", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2825", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2825.json", + "dateUpdated": "2024-07-05T14:26:42.559Z" + }, + { + "cveId": "CVE-2024-2826", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2826", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2826.json", + "dateUpdated": "2024-07-05T14:26:42.508Z" + }, + { + "cveId": "CVE-2024-2827", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2827", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2827.json", + "dateUpdated": "2024-07-05T14:31:56.615Z" + }, + { + "cveId": "CVE-2024-2828", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2828", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2828.json", + "dateUpdated": "2024-07-05T14:31:56.968Z" + }, + { + "cveId": "CVE-2024-2829", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2829", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2829.json", + "dateUpdated": "2024-07-05T14:31:56.618Z" + }, + { + "cveId": "CVE-2024-2830", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2830", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2830.json", + "dateUpdated": "2024-07-05T14:31:56.617Z" + }, + { + "cveId": "CVE-2024-2831", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2831", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2831.json", + "dateUpdated": "2024-07-05T14:31:56.621Z" + }, + { + "cveId": "CVE-2024-2832", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2832", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2832.json", + "dateUpdated": "2024-07-05T14:31:57.927Z" + }, + { + "cveId": "CVE-2024-2833", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2833", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2833.json", + "dateUpdated": "2024-07-05T14:31:58.000Z" + }, + { + "cveId": "CVE-2024-2834", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2834", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2834.json", + "dateUpdated": "2024-07-05T14:31:56.567Z" + }, + { + "cveId": "CVE-2024-2835", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2835", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2835.json", + "dateUpdated": "2024-07-05T14:31:58.023Z" + }, + { + "cveId": "CVE-2024-2836", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2836", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2836.json", + "dateUpdated": "2024-07-05T14:31:57.645Z" + }, + { + "cveId": "CVE-2024-2837", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2837", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2837.json", + "dateUpdated": "2024-07-05T14:31:57.734Z" + }, + { + "cveId": "CVE-2024-2838", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2838", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2838.json", + "dateUpdated": "2024-07-05T14:31:58.033Z" + }, + { + "cveId": "CVE-2024-2839", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2839", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2839.json", + "dateUpdated": "2024-07-05T14:31:57.689Z" + }, + { + "cveId": "CVE-2024-2840", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2840", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2840.json", + "dateUpdated": "2024-07-05T14:31:58.027Z" + }, + { + "cveId": "CVE-2024-2841", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2841", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2841.json", + "dateUpdated": "2024-07-05T14:31:58.017Z" + }, + { + "cveId": "CVE-2024-2842", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2842", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2842.json", + "dateUpdated": "2024-07-05T14:31:57.992Z" + }, + { + "cveId": "CVE-2024-2844", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2844", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2844.json", + "dateUpdated": "2024-07-05T14:31:56.569Z" + }, + { + "cveId": "CVE-2024-2845", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2845", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2845.json", + "dateUpdated": "2024-07-05T14:31:58.001Z" + }, + { + "cveId": "CVE-2024-2846", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2846", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2846.json", + "dateUpdated": "2024-07-05T14:31:56.575Z" + }, + { + "cveId": "CVE-2024-2847", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2847", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2847.json", + "dateUpdated": "2024-07-05T14:31:58.111Z" + }, + { + "cveId": "CVE-2024-2848", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2848", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2848.json", + "dateUpdated": "2024-07-05T14:31:58.032Z" + }, + { + "cveId": "CVE-2024-2849", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2849", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2849.json", + "dateUpdated": "2024-07-05T14:31:58.011Z" + }, + { + "cveId": "CVE-2024-2850", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2850", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2850.json", + "dateUpdated": "2024-07-05T14:31:58.038Z" + }, + { + "cveId": "CVE-2024-2851", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2851", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2851.json", + "dateUpdated": "2024-07-05T14:31:58.020Z" + }, + { + "cveId": "CVE-2024-2852", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2852", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2852.json", + "dateUpdated": "2024-07-05T14:31:57.561Z" + }, + { + "cveId": "CVE-2024-2853", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2853", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2853.json", + "dateUpdated": "2024-07-05T14:31:58.040Z" + }, + { + "cveId": "CVE-2024-2854", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2854", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2854.json", + "dateUpdated": "2024-07-05T14:31:58.147Z" + }, + { + "cveId": "CVE-2024-2855", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2855", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2855.json", + "dateUpdated": "2024-07-05T14:31:58.034Z" + }, + { + "cveId": "CVE-2024-2856", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2856", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2856.json", + "dateUpdated": "2024-07-05T14:31:58.039Z" + }, + { + "cveId": "CVE-2024-2857", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2857", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2857.json", + "dateUpdated": "2024-07-05T14:31:57.723Z" + }, + { + "cveId": "CVE-2024-2858", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2858", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2858.json", + "dateUpdated": "2024-07-05T14:31:58.083Z" + }, + { + "cveId": "CVE-2024-2859", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2859", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2859.json", + "dateUpdated": "2024-07-05T14:31:57.733Z" + }, + { + "cveId": "CVE-2024-2860", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2860", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2860.json", + "dateUpdated": "2024-07-05T14:31:58.464Z" + }, + { + "cveId": "CVE-2024-2861", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2861", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2861.json", + "dateUpdated": "2024-07-05T14:31:58.101Z" + }, + { + "cveId": "CVE-2024-2862", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2862", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2862.json", + "dateUpdated": "2024-07-05T14:31:58.401Z" + }, + { + "cveId": "CVE-2024-2863", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2863", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2863.json", + "dateUpdated": "2024-07-05T14:31:58.278Z" + }, + { + "cveId": "CVE-2024-2864", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2864", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2864.json", + "dateUpdated": "2024-07-05T14:31:58.753Z" + }, + { + "cveId": "CVE-2024-2865", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2865", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2865.json", + "dateUpdated": "2024-07-05T14:31:58.389Z" + }, + { + "cveId": "CVE-2024-2867", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2867", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2867.json", + "dateUpdated": "2024-07-05T14:31:58.036Z" + }, + { + "cveId": "CVE-2024-2868", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2868", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2868.json", + "dateUpdated": "2024-07-05T14:31:58.009Z" + }, + { + "cveId": "CVE-2024-2871", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2871", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2871.json", + "dateUpdated": "2024-07-05T14:31:58.160Z" + }, + { + "cveId": "CVE-2024-2873", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2873", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2873.json", + "dateUpdated": "2024-07-05T14:31:58.393Z" + }, + { + "cveId": "CVE-2024-2874", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2874", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2874.json", + "dateUpdated": "2024-07-05T14:31:57.832Z" + }, + { + "cveId": "CVE-2024-2876", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2876", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2876.json", + "dateUpdated": "2024-07-05T14:31:58.414Z" + }, + { + "cveId": "CVE-2024-2877", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2877", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2877.json", + "dateUpdated": "2024-07-05T14:31:58.191Z" + }, + { + "cveId": "CVE-2024-2879", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2879", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2879.json", + "dateUpdated": "2024-07-05T14:31:57.691Z" + }, + { + "cveId": "CVE-2024-2882", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2882", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2882.json", + "dateUpdated": "2024-07-05T14:31:58.500Z" + }, + { + "cveId": "CVE-2024-2883", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2883", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2883.json", + "dateUpdated": "2024-07-05T14:31:57.997Z" + }, + { + "cveId": "CVE-2024-2885", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2885", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2885.json", + "dateUpdated": "2024-07-05T14:31:58.391Z" + }, + { + "cveId": "CVE-2024-2886", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2886", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2886.json", + "dateUpdated": "2024-07-05T14:31:58.491Z" + }, + { + "cveId": "CVE-2024-2887", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2887", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2887.json", + "dateUpdated": "2024-07-05T14:31:58.539Z" + }, + { + "cveId": "CVE-2024-2888", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2888", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2888.json", + "dateUpdated": "2024-07-05T14:31:57.930Z" + }, + { + "cveId": "CVE-2024-2889", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2889", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2889.json", + "dateUpdated": "2024-07-05T14:31:58.136Z" + }, + { + "cveId": "CVE-2024-2890", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2890", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2890.json", + "dateUpdated": "2024-07-05T14:31:58.511Z" + }, + { + "cveId": "CVE-2024-2891", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2891", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2891.json", + "dateUpdated": "2024-07-05T14:31:58.021Z" + }, + { + "cveId": "CVE-2024-2892", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2892", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2892.json", + "dateUpdated": "2024-07-05T14:31:58.482Z" + }, + { + "cveId": "CVE-2024-2893", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2893", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2893.json", + "dateUpdated": "2024-07-05T14:31:58.719Z" + }, + { + "cveId": "CVE-2024-2894", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2894", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2894.json", + "dateUpdated": "2024-07-05T14:31:58.563Z" + }, + { + "cveId": "CVE-2024-2895", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2895", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2895.json", + "dateUpdated": "2024-07-05T14:31:58.473Z" + }, + { + "cveId": "CVE-2024-2896", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2896", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2896.json", + "dateUpdated": "2024-07-05T14:31:58.744Z" + }, + { + "cveId": "CVE-2024-2897", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2897", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2897.json", + "dateUpdated": "2024-07-05T14:31:58.793Z" + }, + { + "cveId": "CVE-2024-2898", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2898", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2898.json", + "dateUpdated": "2024-07-05T14:31:58.559Z" + }, + { + "cveId": "CVE-2024-2899", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2899", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2899.json", + "dateUpdated": "2024-07-05T14:31:58.399Z" + }, + { + "cveId": "CVE-2024-2900", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2900", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2900.json", + "dateUpdated": "2024-07-05T14:31:58.561Z" + }, + { + "cveId": "CVE-2024-2901", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2901", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2901.json", + "dateUpdated": "2024-07-05T14:31:58.919Z" + }, + { + "cveId": "CVE-2024-2902", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2902", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2902.json", + "dateUpdated": "2024-07-05T14:31:58.593Z" + }, + { + "cveId": "CVE-2024-2903", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2903", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2903.json", + "dateUpdated": "2024-07-05T14:31:58.535Z" + }, + { + "cveId": "CVE-2024-2904", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2904", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2904.json", + "dateUpdated": "2024-07-05T14:31:58.568Z" + }, + { + "cveId": "CVE-2024-2905", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2905", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2905.json", + "dateUpdated": "2024-07-05T14:31:58.066Z" + }, + { + "cveId": "CVE-2024-2906", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2906", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2906.json", + "dateUpdated": "2024-07-05T14:31:58.556Z" + }, + { + "cveId": "CVE-2024-2907", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2907", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2907.json", + "dateUpdated": "2024-07-05T14:31:58.826Z" + }, + { + "cveId": "CVE-2024-2908", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2908", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2908.json", + "dateUpdated": "2024-07-05T14:31:58.560Z" + }, + { + "cveId": "CVE-2024-2909", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2909", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2909.json", + "dateUpdated": "2024-07-05T14:31:58.514Z" + }, + { + "cveId": "CVE-2024-2910", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2910", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2910.json", + "dateUpdated": "2024-07-05T14:31:58.740Z" + }, + { + "cveId": "CVE-2024-2911", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2911", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2911.json", + "dateUpdated": "2024-07-05T14:31:58.936Z" + }, + { + "cveId": "CVE-2024-2912", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2912", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2912.json", + "dateUpdated": "2024-07-05T14:31:58.754Z" + }, + { + "cveId": "CVE-2024-2913", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2913", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2913.json", + "dateUpdated": "2024-07-05T14:31:58.796Z" + }, + { + "cveId": "CVE-2024-2914", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2914", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2914.json", + "dateUpdated": "2024-07-05T14:31:58.127Z" + }, + { + "cveId": "CVE-2024-2915", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2915", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2915.json", + "dateUpdated": "2024-07-05T14:31:58.567Z" + }, + { + "cveId": "CVE-2024-2916", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2916", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2916.json", + "dateUpdated": "2024-07-05T14:31:58.116Z" + }, + { + "cveId": "CVE-2024-2917", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2917", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2917.json", + "dateUpdated": "2024-07-05T14:31:58.852Z" + }, + { + "cveId": "CVE-2024-2918", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2918", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2918.json", + "dateUpdated": "2024-07-05T14:31:58.548Z" + }, + { + "cveId": "CVE-2024-2919", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2919", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2919.json", + "dateUpdated": "2024-07-05T14:31:58.811Z" + }, + { + "cveId": "CVE-2024-2920", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2920", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2920.json", + "dateUpdated": "2024-07-05T14:31:58.488Z" + }, + { + "cveId": "CVE-2024-2921", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2921", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2921.json", + "dateUpdated": "2024-07-05T14:31:58.480Z" + }, + { + "cveId": "CVE-2024-2922", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2922", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2922.json", + "dateUpdated": "2024-07-05T14:31:58.766Z" + }, + { + "cveId": "CVE-2024-2923", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2923", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2923.json", + "dateUpdated": "2024-07-05T14:31:58.603Z" + }, + { + "cveId": "CVE-2024-2924", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2924", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2924.json", + "dateUpdated": "2024-07-05T14:31:58.605Z" + }, + { + "cveId": "CVE-2024-2925", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2925", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2925.json", + "dateUpdated": "2024-07-05T14:31:58.476Z" + }, + { + "cveId": "CVE-2024-2927", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2927", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2927.json", + "dateUpdated": "2024-07-05T14:31:58.814Z" + }, + { + "cveId": "CVE-2024-2928", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2928", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2928.json", + "dateUpdated": "2024-07-05T14:31:58.834Z" + }, + { + "cveId": "CVE-2024-2929", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2929", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2929.json", + "dateUpdated": "2024-07-05T14:31:58.752Z" + }, + { + "cveId": "CVE-2024-2930", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2930", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2930.json", + "dateUpdated": "2024-07-05T14:31:58.774Z" + }, + { + "cveId": "CVE-2024-2931", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2931", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2931.json", + "dateUpdated": "2024-07-05T14:31:58.777Z" + }, + { + "cveId": "CVE-2024-2932", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2932", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2932.json", + "dateUpdated": "2024-07-05T14:31:58.830Z" + }, + { + "cveId": "CVE-2024-2933", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2933", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2933.json", + "dateUpdated": "2024-07-05T14:31:58.854Z" + }, + { + "cveId": "CVE-2024-2934", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2934", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2934.json", + "dateUpdated": "2024-07-05T14:31:58.600Z" + }, + { + "cveId": "CVE-2024-2935", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2935", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2935.json", + "dateUpdated": "2024-07-05T14:31:58.815Z" + }, + { + "cveId": "CVE-2024-2936", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2936", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2936.json", + "dateUpdated": "2024-07-05T14:31:58.861Z" + }, + { + "cveId": "CVE-2024-2938", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-2938", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/2xxx/CVE-2024-2938.json", + "dateUpdated": "2024-07-05T14:31:58.750Z" + } + ], + "error": [] + }, { "fetchTime": "2024-07-05T14:22:39.013Z", "numberOfChanges": 300,