All Vulnerabilities
817 CRITICAL (9.0-10) | 3717 HIGH (7.0-8.9) | 5181 MEDIUM (4.0-6.9) | 609 LOW (0.0-3.9) | 6124 NO SCORE |
---|
16448 vulnerabilities
CVE | CVSS | Published | Last Modified | Product impacted | Source |
---|---|---|---|---|---|
CVE-2024-5404 | 9.8 | June 3, 2024 | June 3, 2024 | moneo appliance | info@cert.vde.com |
CVE-2024-35639 | 5.9 | June 3, 2024 | June 3, 2024 | Simple Spoiler | audit@patchstack.com |
CVE-2024-35638 | 4.3 | June 3, 2024 | June 3, 2024 | ActiveDEMAND | audit@patchstack.com |
CVE-2024-35637 | 4.4 | June 3, 2024 | June 3, 2024 | Church Admin | audit@patchstack.com |
CVE-2024-36964 | None | June 3, 2024 | June 3, 2024 | Linux kernel | 416baaa9-dc9f-4396-8d5f-8c081fb06d67 |
CVE-2024-36963 | None | June 3, 2024 | June 3, 2024 | Linux kernel | 416baaa9-dc9f-4396-8d5f-8c081fb06d67 |
CVE-2024-36962 | None | June 3, 2024 | June 3, 2024 | Linux kernel | 416baaa9-dc9f-4396-8d5f-8c081fb06d67 |
CVE-2024-36961 | None | June 3, 2024 | June 3, 2024 | Linux kernel | 416baaa9-dc9f-4396-8d5f-8c081fb06d67 |
CVE-2024-36960 | None | June 3, 2024 | June 3, 2024 | Linux kernel | 416baaa9-dc9f-4396-8d5f-8c081fb06d67 |
CVE-2024-35640 | 5.9 | June 3, 2024 | June 3, 2024 | Safety Exit | audit@patchstack.com |
CVE-2024-31493 | 6.5 | June 3, 2024 | June 3, 2024 | FortiSOAR | psirt@fortinet.com |
CVE-2024-23107 | 5.5 | June 3, 2024 | June 3, 2024 | FortiWeb | psirt@fortinet.com |
CVE-2023-48789 | 4.3 | June 3, 2024 | June 3, 2024 | Fortinet FortiPortal | psirt@fortinet.com |
CVE-2024-5311 | 9.8 | June 3, 2024 | June 3, 2024 | DigiWin EasyFlow .NET | twcert@cert.org.tw |
CVE-2024-35643 | 5.9 | June 3, 2024 | June 3, 2024 | WP Back Button | audit@patchstack.com |
CVE-2024-35642 | 5.9 | June 3, 2024 | June 3, 2024 | Site Favicon | audit@patchstack.com |
CVE-2024-35641 | 5.9 | June 3, 2024 | June 3, 2024 | Just Writing Statistics | audit@patchstack.com |
CVE-2024-37031 | None | June 3, 2024 | June 3, 2024 | Active Admin | cve@mitre.org |