CVE |
CVSS |
Published |
Last Modified |
Product impacted |
Source |
CVE-2024-40322 |
None
|
July 16, 2024 |
July 16, 2024 |
JFinalCMS |
cve@mitre.org |
CVE-2024-35338 |
None
|
July 16, 2024 |
July 16, 2024 |
Tenda i29V1.0 |
cve@mitre.org |
CVE-2024-33182 |
None
|
July 16, 2024 |
July 16, 2024 |
Tenda AC18 |
cve@mitre.org |
CVE-2024-33180 |
None
|
July 16, 2024 |
July 16, 2024 |
Tenda AC18 |
cve@mitre.org |
CVE-2024-22442 |
9.8
|
July 16, 2024 |
July 16, 2024 |
UNKNOWN |
security-alert@hpe.com |
CVE-2024-6655 |
7.0
|
July 16, 2024 |
July 16, 2024 |
GTK |
secalert@redhat.com |
CVE-2024-32861 |
7.8
|
July 16, 2024 |
July 16, 2024 |
Software House C•CURE 9000 Site Server |
productsecurity@jci.com |
CVE-2022-45449 |
7.7
|
July 16, 2024 |
July 16, 2024 |
Acronis Cyber Protect |
security@acronis.com |
CVE-2024-6435 |
None
|
July 16, 2024 |
July 16, 2024 |
Rockwell Automation products |
PSIRT@rockwellautomation.com |
CVE-2022-48866 |
None
|
July 16, 2024 |
July 16, 2024 |
Linux kernel |
416baaa9-dc9f-4396-8d5f-8c081fb06d67 |
CVE-2022-48865 |
None
|
July 16, 2024 |
July 16, 2024 |
Linux kernel |
416baaa9-dc9f-4396-8d5f-8c081fb06d67 |
CVE-2022-48864 |
None
|
July 16, 2024 |
July 16, 2024 |
Linux kernel |
416baaa9-dc9f-4396-8d5f-8c081fb06d67 |
CVE-2022-48863 |
None
|
July 16, 2024 |
July 16, 2024 |
Linux kernel |
416baaa9-dc9f-4396-8d5f-8c081fb06d67 |
CVE-2022-48862 |
None
|
July 16, 2024 |
July 16, 2024 |
Linux kernel |
416baaa9-dc9f-4396-8d5f-8c081fb06d67 |
CVE-2022-48861 |
None
|
July 16, 2024 |
July 16, 2024 |
Linux Kernel |
416baaa9-dc9f-4396-8d5f-8c081fb06d67 |
CVE-2022-48860 |
None
|
July 16, 2024 |
July 16, 2024 |
Linux kernel |
416baaa9-dc9f-4396-8d5f-8c081fb06d67 |
CVE-2022-48859 |
None
|
July 16, 2024 |
July 16, 2024 |
Linux kernel |
416baaa9-dc9f-4396-8d5f-8c081fb06d67 |
CVE-2022-48858 |
None
|
July 16, 2024 |
July 16, 2024 |
Linux kernel |
416baaa9-dc9f-4396-8d5f-8c081fb06d67 |