mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-07-11 16:13:34 +00:00
Auto-Update: 2024-05-21T10:01:14.137926+00:00
This commit is contained in:
parent
26626f3fe4
commit
02bea35ea4
51
CVE-2024/CVE-2024-33xx/CVE-2024-3345.json
Normal file
51
CVE-2024/CVE-2024-33xx/CVE-2024-3345.json
Normal file
@ -0,0 +1,51 @@
|
||||
{
|
||||
"id": "CVE-2024-3345",
|
||||
"sourceIdentifier": "security@wordfence.com",
|
||||
"published": "2024-05-21T09:15:08.533",
|
||||
"lastModified": "2024-05-21T09:15:08.533",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "The ShopLentor plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's woolentorsearch shortcode in all versions up to, and including, 2.8.8 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security@wordfence.com",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 6.4,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 3.1,
|
||||
"impactScore": 2.7
|
||||
}
|
||||
]
|
||||
},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/browser/woolentor-addons/tags/2.8.3/includes/modules/ajax-search/base.php#L137",
|
||||
"source": "security@wordfence.com"
|
||||
},
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/changeset/3088881/woolentor-addons/trunk/includes/modules/ajax-search/base.php",
|
||||
"source": "security@wordfence.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/d6a73a7f-53ac-4930-a1cd-c39818f64678?source=cve",
|
||||
"source": "security@wordfence.com"
|
||||
}
|
||||
]
|
||||
}
|
51
CVE-2024/CVE-2024-45xx/CVE-2024-4566.json
Normal file
51
CVE-2024/CVE-2024-45xx/CVE-2024-4566.json
Normal file
@ -0,0 +1,51 @@
|
||||
{
|
||||
"id": "CVE-2024-4566",
|
||||
"sourceIdentifier": "security@wordfence.com",
|
||||
"published": "2024-05-21T09:15:08.890",
|
||||
"lastModified": "2024-05-21T09:15:08.890",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "The ShopLentor plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the ajax_dismiss function in all versions up to, and including, 2.8.8. This makes it possible for authenticated attackers, with contributor-level access and above, to set arbitrary WordPress options to \"true\". NOTE: This vulnerability can be exploited by attackers with subscriber- or customer-level access and above if (1) the WooCommerce plugin is deactivated or (2) access to the default WordPress admin dashboard is explicitly enabled for authenticated users."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security@wordfence.com",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 7.1,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 4.2
|
||||
}
|
||||
]
|
||||
},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/browser/woolentor-addons/trunk/includes/admin/include/class.notice.php#L52",
|
||||
"source": "security@wordfence.com"
|
||||
},
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/changeset/3088881/woolentor-addons/trunk/includes/admin/include/class.notice.php",
|
||||
"source": "security@wordfence.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/c6aaabe9-4f55-4c01-b350-573e6a944353?source=cve",
|
||||
"source": "security@wordfence.com"
|
||||
}
|
||||
]
|
||||
}
|
51
CVE-2024/CVE-2024-48xx/CVE-2024-4875.json
Normal file
51
CVE-2024/CVE-2024-48xx/CVE-2024-4875.json
Normal file
@ -0,0 +1,51 @@
|
||||
{
|
||||
"id": "CVE-2024-4875",
|
||||
"sourceIdentifier": "security@wordfence.com",
|
||||
"published": "2024-05-21T09:15:09.103",
|
||||
"lastModified": "2024-05-21T09:15:09.103",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "The HT Mega \u2013 Absolute Addons For Elementor plugin for WordPress is vulnerable to unauthorized modification of data|loss of data due to a missing capability check on the 'ajax_dismiss' function in versions up to, and including, 2.5.2. This makes it possible for authenticated attackers, with subscriber-level permissions and above, to update options such as users_can_register, which can lead to unauthorized user registration."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security@wordfence.com",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 4.3,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 1.4
|
||||
}
|
||||
]
|
||||
},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/browser/ht-mega-for-elementor/trunk/admin/include/class.dynamic-notice.php#L52",
|
||||
"source": "security@wordfence.com"
|
||||
},
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/changeset/3088899/ht-mega-for-elementor/trunk/admin/include/class.dynamic-notice.php",
|
||||
"source": "security@wordfence.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/bdd3868a-d741-42b4-bc7f-6fb5d33bb71b?source=cve",
|
||||
"source": "security@wordfence.com"
|
||||
}
|
||||
]
|
||||
}
|
23
README.md
23
README.md
@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours.
|
||||
### Last Repository Update
|
||||
|
||||
```plain
|
||||
2024-05-21T08:01:05.489972+00:00
|
||||
2024-05-21T10:01:14.137926+00:00
|
||||
```
|
||||
|
||||
### Most recent CVE Modification Timestamp synchronized with NVD
|
||||
|
||||
```plain
|
||||
2024-05-21T07:15:09.087000+00:00
|
||||
2024-05-21T09:15:09.103000+00:00
|
||||
```
|
||||
|
||||
### Last Data Feed Release
|
||||
@ -33,29 +33,22 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
|
||||
### Total Number of included CVEs
|
||||
|
||||
```plain
|
||||
250891
|
||||
250894
|
||||
```
|
||||
|
||||
### CVEs added in the last Commit
|
||||
|
||||
Recently added CVEs: `8`
|
||||
Recently added CVEs: `3`
|
||||
|
||||
- [CVE-2024-2189](CVE-2024/CVE-2024-21xx/CVE-2024-2189.json) (`2024-05-21T06:15:08.540`)
|
||||
- [CVE-2024-4061](CVE-2024/CVE-2024-40xx/CVE-2024-4061.json) (`2024-05-21T06:15:09.247`)
|
||||
- [CVE-2024-4289](CVE-2024/CVE-2024-42xx/CVE-2024-4289.json) (`2024-05-21T06:15:09.517`)
|
||||
- [CVE-2024-4290](CVE-2024/CVE-2024-42xx/CVE-2024-4290.json) (`2024-05-21T06:15:09.767`)
|
||||
- [CVE-2024-4372](CVE-2024/CVE-2024-43xx/CVE-2024-4372.json) (`2024-05-21T06:15:10.000`)
|
||||
- [CVE-2024-4442](CVE-2024/CVE-2024-44xx/CVE-2024-4442.json) (`2024-05-21T07:15:08.460`)
|
||||
- [CVE-2024-4470](CVE-2024/CVE-2024-44xx/CVE-2024-4470.json) (`2024-05-21T07:15:08.810`)
|
||||
- [CVE-2024-4710](CVE-2024/CVE-2024-47xx/CVE-2024-4710.json) (`2024-05-21T07:15:09.087`)
|
||||
- [CVE-2024-3345](CVE-2024/CVE-2024-33xx/CVE-2024-3345.json) (`2024-05-21T09:15:08.533`)
|
||||
- [CVE-2024-4566](CVE-2024/CVE-2024-45xx/CVE-2024-4566.json) (`2024-05-21T09:15:08.890`)
|
||||
- [CVE-2024-4875](CVE-2024/CVE-2024-48xx/CVE-2024-4875.json) (`2024-05-21T09:15:09.103`)
|
||||
|
||||
|
||||
### CVEs modified in the last Commit
|
||||
|
||||
Recently modified CVEs: `2`
|
||||
Recently modified CVEs: `0`
|
||||
|
||||
- [CVE-2023-52665](CVE-2023/CVE-2023-526xx/CVE-2023-52665.json) (`2024-05-21T07:15:08.063`)
|
||||
- [CVE-2024-26904](CVE-2024/CVE-2024-269xx/CVE-2024-26904.json) (`2024-05-21T07:15:08.260`)
|
||||
|
||||
|
||||
## Download and Usage
|
||||
|
23
_state.csv
23
_state.csv
@ -237785,7 +237785,7 @@ CVE-2023-52661,0,0,1dbeccb9eacb34c302d3ddff035870c695ace80916461a042d1f30d95acfc
|
||||
CVE-2023-52662,0,0,bdd6bda2d726799fa055af169dff2cfa2e72783f1701a8915299c214f51384dc,2024-05-17T18:35:35.070000
|
||||
CVE-2023-52663,0,0,6fdf9bf74f5520bdc3a90c3b513231be758b3dcd7c10d063b14d1ce36d3f7627,2024-05-17T18:35:35.070000
|
||||
CVE-2023-52664,0,0,82b193593b6298a24a9d99379e99c4f58e9e94981325ba063f9758c035e411df,2024-05-17T18:35:35.070000
|
||||
CVE-2023-52665,0,1,223587f9b020dfc4f7c6c14abdecbb69d6296e17f8cbe2aa66f58a9b6fd27643,2024-05-21T07:15:08.063000
|
||||
CVE-2023-52665,0,0,223587f9b020dfc4f7c6c14abdecbb69d6296e17f8cbe2aa66f58a9b6fd27643,2024-05-21T07:15:08.063000
|
||||
CVE-2023-52666,0,0,8135c2458930f054da0899f143918918c17c28a63600afcafe11b48cf5834a46,2024-05-17T18:35:35.070000
|
||||
CVE-2023-52667,0,0,3c80102722df023325b9acfadeda6f8602f7ecd95b96730db1f409c15c00075f,2024-05-17T18:35:35.070000
|
||||
CVE-2023-52668,0,0,5c13c0b847e48d9b126324f274bc3bcccec8abe254d046eaafb879efe19c95ea,2024-05-17T18:35:35.070000
|
||||
@ -242293,7 +242293,7 @@ CVE-2024-21885,0,0,3a8555aba848a763891301ea45be2dc447cf6e91c8980c7f8fb662d07f448
|
||||
CVE-2024-21886,0,0,51c64b750a7fa30c4151f47347eefcb19a07d8afc937f6dd2165654f59623a1b,2024-04-30T14:15:14.867000
|
||||
CVE-2024-21887,0,0,27308d07d43795d3f4289d79a64af5933e89a71cf679d41be9d0c5a30a308379,2024-01-22T17:15:09.523000
|
||||
CVE-2024-21888,0,0,9de3f75608c2ffa998f0bcfa0dcc7f6af68bb755862afa34798392c7baa192b3,2024-01-31T19:53:06.303000
|
||||
CVE-2024-2189,1,1,7e013d10d951078be3a093b0dc0856b42b1454039adc893485a99f1726b0b4fc,2024-05-21T06:15:08.540000
|
||||
CVE-2024-2189,0,0,7e013d10d951078be3a093b0dc0856b42b1454039adc893485a99f1726b0b4fc,2024-05-21T06:15:08.540000
|
||||
CVE-2024-21890,0,0,a23e39bf178457ea1a62055175acdccf21db560a2e161d84f67585a3aec660a5,2024-05-01T18:15:13.430000
|
||||
CVE-2024-21891,0,0,a2485cf665b74852ec579d22867079892dab474f76b17a713a8f19b29fc1374c,2024-05-01T18:15:13.500000
|
||||
CVE-2024-21892,0,0,0a2d4c2722cd9d0c5169a54525f85c8a3a71dec229f64a884ec45af2c9ceefca,2024-05-01T18:15:13.610000
|
||||
@ -245300,7 +245300,7 @@ CVE-2024-26900,0,0,7d396e2f9d436e2b737a24c012d00c80957fc0ed041765143888d895b983c
|
||||
CVE-2024-26901,0,0,0b69a2bddc7a89f4a9274440cdd8336560c75256cb438cb50cf8b2c1d8036b52,2024-04-29T19:38:34.730000
|
||||
CVE-2024-26902,0,0,79dd09d64774289a294bba37c7616f62083466aaf39eb549f12f6f728e6a3fa4,2024-04-29T19:40:05.897000
|
||||
CVE-2024-26903,0,0,21a53434b791da4ce02d5af7f605d1d70b522d70f04ff414b8e2a7f15b1fa47a,2024-04-29T19:41:09.400000
|
||||
CVE-2024-26904,0,1,37626f6bc581b325e48f53fe8a5b21da44d9f414e15eb9fb0721d0de3e45a169,2024-05-21T07:15:08.260000
|
||||
CVE-2024-26904,0,0,37626f6bc581b325e48f53fe8a5b21da44d9f414e15eb9fb0721d0de3e45a169,2024-05-21T07:15:08.260000
|
||||
CVE-2024-26905,0,0,b2eb4233229c7ebf6d1f823188c91f6d5ec6f202c5b26a0cfddc918598c98c54,2024-04-17T12:48:07.510000
|
||||
CVE-2024-26906,0,0,ab0559b52d04a535dceb9e9c10280e22d32dc74dd6f462f3401a818acc49de6b,2024-04-17T12:48:07.510000
|
||||
CVE-2024-26907,0,0,2f67b26b0d30d6258d15eaffbdba785264c13510ac97fa56a9a1d2c082244bfa,2024-04-29T19:44:18.727000
|
||||
@ -248987,6 +248987,7 @@ CVE-2024-33443,0,0,7f62cc637ddbcb31d4d27451ebd5ff31e1289fc0b12403902ee9379da64c7
|
||||
CVE-2024-33444,0,0,dd8f738307cf7a98c771473a6747e7b5352188764c18ccbccd77e23af1117ede,2024-04-30T13:11:16.690000
|
||||
CVE-2024-33445,0,0,2adc5b1320c62f7d749fc302bf856c4946bcb2b6ed78c5da9933008a1fbfc075,2024-04-30T13:11:16.690000
|
||||
CVE-2024-33449,0,0,82c0fe8439f268eedf63ed1da3eb3fb2ad29e68126122a5274369bbec0c38b68,2024-04-30T13:11:16.690000
|
||||
CVE-2024-3345,1,1,8e6db83f3ba149228a22c93b704121b0bd8780f96b60adf565d8c294045ae6e7,2024-05-21T09:15:08.533000
|
||||
CVE-2024-33454,0,0,af2458e2a92892beb63c1bf2d95ff7e9398d77f429fab02bbeabef831c2c6674,2024-05-14T16:12:23.490000
|
||||
CVE-2024-3346,0,0,312355f19bae8f6fad300133bd9d49713b734c255da277af0376b1f0fb7936a0,2024-05-17T02:39:51.207000
|
||||
CVE-2024-33465,0,0,eadb6536921f299769dd28ca056127bee4ec0a5d9a79c4314362582bea14e967,2024-04-30T17:52:35.057000
|
||||
@ -250316,7 +250317,7 @@ CVE-2024-4056,0,0,8d2872a63b61af99b314442fa34c585e616ec707e8d3b58da8a6d93a2f4a48
|
||||
CVE-2024-4058,0,0,89d601f0a6556a83c3f1ddb11302d59200b53d35574245a735ec02b677ca6a2a,2024-05-03T03:16:29.387000
|
||||
CVE-2024-4059,0,0,f7356d83fe5fccf2c54f421bb90f2c15bd9bf33edb756392f4236a5836d7af45,2024-05-03T03:16:29.430000
|
||||
CVE-2024-4060,0,0,e73d48dba8d4867b445df561ca35c4a253ea1abc6b1746f05e1e8b87e0d0ee8e,2024-05-03T04:15:09.620000
|
||||
CVE-2024-4061,1,1,971d0b947b761785e23526b244f19a8746f5586888ed97e319384f6d771167a6,2024-05-21T06:15:09.247000
|
||||
CVE-2024-4061,0,0,971d0b947b761785e23526b244f19a8746f5586888ed97e319384f6d771167a6,2024-05-21T06:15:09.247000
|
||||
CVE-2024-4062,0,0,88e0189a903dc491d969324b51281f72bfa6b01ddae9db1a05c8c0b817ed3796,2024-05-17T02:40:14.040000
|
||||
CVE-2024-4063,0,0,18284e200045179ad5ce0dcd8451273a1895c48566173aa3752f335ebb5e339d,2024-05-17T02:40:14.133000
|
||||
CVE-2024-4064,0,0,0a357968458dd966b7a4969f86556627b0af0220edbb91249e767e6972ab2a17,2024-05-17T02:40:14.223000
|
||||
@ -250450,8 +250451,8 @@ CVE-2024-4281,0,0,f2f6c94941e4ed7f1c98ab6351686f1d868a8657bf9b3ff2bb73d7d016e69d
|
||||
CVE-2024-4284,0,0,6b0486c923019958d1c20328f9a4263f9ca3aa289165b466591abb7c0e677c17,2024-05-20T13:00:04.957000
|
||||
CVE-2024-4287,0,0,ae556e7173c21b1abf7f9026eca2cea8416285aae89182bc9ebe9e9352811522,2024-05-20T15:17:54.513000
|
||||
CVE-2024-4288,0,0,9367649ffe77365cb201f95bc69986ffb5e481ba50542c3f0953c5f2e0eb0d2a,2024-05-16T13:03:05.353000
|
||||
CVE-2024-4289,1,1,743c81dfd0948c5a441dfd6c68fb612b58ac65c0714ecdd8156eaeba6a723b90,2024-05-21T06:15:09.517000
|
||||
CVE-2024-4290,1,1,feb53fe3af2bcf551731520a6da077d2bdc3155342f2e3fa22ef573f55b0a911,2024-05-21T06:15:09.767000
|
||||
CVE-2024-4289,0,0,743c81dfd0948c5a441dfd6c68fb612b58ac65c0714ecdd8156eaeba6a723b90,2024-05-21T06:15:09.517000
|
||||
CVE-2024-4290,0,0,feb53fe3af2bcf551731520a6da077d2bdc3155342f2e3fa22ef573f55b0a911,2024-05-21T06:15:09.767000
|
||||
CVE-2024-4291,0,0,dcab47edda64598994b6d35eea1a5bae28c719351e51b2665b279255f64e7970,2024-05-17T02:40:21.667000
|
||||
CVE-2024-4292,0,0,3a853b90a84b704f0ceeeca9f33221358bfd4e7e30200ef38bb21c91a07a856b,2024-05-17T02:40:21.770000
|
||||
CVE-2024-4293,0,0,84e742f5c5d4f4e3db1209335ece4a5ada2a411ffdf91576a76a726027b3c6ab,2024-05-17T02:40:21.860000
|
||||
@ -250502,7 +250503,7 @@ CVE-2024-4367,0,0,10c9ba4e2375d81f02eb3145704f99e298b4c446473517eea4810baa65f2c6
|
||||
CVE-2024-4368,0,0,0ee02ebde276d817508f5495294b3429c463a1f4241660388e0c329992e72be6,2024-05-04T02:15:06.853000
|
||||
CVE-2024-4369,0,0,ab5992320463150d25768d540495632f3cea0e672e96fca10ae18e5fed17e7b3,2024-05-02T03:15:15.027000
|
||||
CVE-2024-4370,0,0,069da1b0ae5c656e192af67776d4fb05a1e574a802cd3af79b4e6cc7490b0dbc,2024-05-15T16:40:19.330000
|
||||
CVE-2024-4372,1,1,53a93c7dc9a8f67c8ad9cabf8ceb14d3171505144d5a455fc191f7b0213c33ca,2024-05-21T06:15:10
|
||||
CVE-2024-4372,0,0,53a93c7dc9a8f67c8ad9cabf8ceb14d3171505144d5a455fc191f7b0213c33ca,2024-05-21T06:15:10
|
||||
CVE-2024-4373,0,0,f38def9014d5248f107e6bba87e0f735d485b9410ddb561204173488b0ad462b,2024-05-15T16:40:19.330000
|
||||
CVE-2024-4374,0,0,6250e338d545ce81ee79d41df4e92db6c03dfd1d9083685761485050a6001f35,2024-05-20T13:00:34.807000
|
||||
CVE-2024-4383,0,0,71e35b2278aca455b2ce46e7157369face569e9a329ff0e3436aa90a5b256792,2024-05-14T16:11:39.510000
|
||||
@ -250533,7 +250534,7 @@ CVE-2024-4438,0,0,93ceea5f04a92ff8a47d298b7349cd99931c0f6ebe6d5712d64fba3d2e18a7
|
||||
CVE-2024-4439,0,0,d4904ab7f03492cebfcab113d16c9db0e8589fc24c413d994223fa5d5b94f71f,2024-05-03T12:48:41.067000
|
||||
CVE-2024-4440,0,0,51dabd0ed14011a33ac13484b9ff25988940854e7446055f86986b74eaffda88,2024-05-14T19:17:55.627000
|
||||
CVE-2024-4441,0,0,21bddaae6271b56b94db02a08e641400bfc943be91594296c54fd13926b71ef2,2024-05-14T16:11:39.510000
|
||||
CVE-2024-4442,1,1,8981bfe18557018c10f106a9c8a8f9cc8f8ea47fe462fbf345d0482f1efb0b49,2024-05-21T07:15:08.460000
|
||||
CVE-2024-4442,0,0,8981bfe18557018c10f106a9c8a8f9cc8f8ea47fe462fbf345d0482f1efb0b49,2024-05-21T07:15:08.460000
|
||||
CVE-2024-4444,0,0,76481c90a9c81b157f25a6ad93f33f71969c6509d3c28850adb0a1bd3cfa3281,2024-05-14T16:11:39.510000
|
||||
CVE-2024-4445,0,0,42f5f65e0ec1a0527ed0ebe136ff3e505384e30728c0f33fdcc95acd928f2f50,2024-05-14T19:17:55.627000
|
||||
CVE-2024-4446,0,0,c1a78a1d4c0d05d17b6cead174a683289ca018fac3b1c104ff2e5b23dbf06e48,2024-05-14T16:11:39.510000
|
||||
@ -250543,7 +250544,7 @@ CVE-2024-4456,0,0,43bdd543de001702ca45614b4a3579c52bfa7b188e5cb3e6b81f25f610f74e
|
||||
CVE-2024-4461,0,0,ad05f4e37257e33f27f784f842f8dfa34f685ff06dd273bc6842a04c51c93bf6,2024-05-03T12:48:41.067000
|
||||
CVE-2024-4463,0,0,aaa5b32073fcbc7160927d348961b4790302ca7b8c414e16cdb6cacefbfd98b3,2024-05-14T16:11:39.510000
|
||||
CVE-2024-4466,0,0,d6c981370b54d7938faad670495d8ca5b736025a1a2ded921b62354a18385ccc,2024-05-03T12:48:41.067000
|
||||
CVE-2024-4470,1,1,0cce68e99689f24a95161cb241f1136b781bbe6d1f0b9316e16ae32d6f56f073,2024-05-21T07:15:08.810000
|
||||
CVE-2024-4470,0,0,0cce68e99689f24a95161cb241f1136b781bbe6d1f0b9316e16ae32d6f56f073,2024-05-21T07:15:08.810000
|
||||
CVE-2024-4473,0,0,be8deb42c9d1905b301c3bfbae608b1551ce9395ac2fbbb337038c3a7eb347fa,2024-05-14T19:17:55.627000
|
||||
CVE-2024-4478,0,0,31a4a4c48861c0c170c939e3aa0b10661ec97e9653465707919926dbd3595183,2024-05-16T13:03:05.353000
|
||||
CVE-2024-4481,0,0,7ecf88f2a22a659849266bdc0bd40c464d195e3dafdf490c58869a301c87572b,2024-05-14T16:11:39.510000
|
||||
@ -250599,6 +250600,7 @@ CVE-2024-4559,0,0,04253977f1b3aac9c2c8228f67b55a5d97f0f228a3fd1b3fdffeaf9dbbc176
|
||||
CVE-2024-4560,0,0,01330bc30e6abf90cd0e894076fd4822775b90946ecfbbe71c3855f1f2c00212,2024-05-14T16:11:39.510000
|
||||
CVE-2024-4561,0,0,419f075cb470fc0bcbe1e02ad47a96fd3735721568a3ea0b27d92242ea08e526,2024-05-15T16:40:19.330000
|
||||
CVE-2024-4562,0,0,4b41dac3b3dc0160472fa769fd66d4820687adcd6a603b6680aeb5866557430b,2024-05-15T16:40:19.330000
|
||||
CVE-2024-4566,1,1,a756d09326ad85d3086ea7fa0189442dde86c5a73f4d221083940825fe4edfd2,2024-05-21T09:15:08.890000
|
||||
CVE-2024-4567,0,0,bff521ec958712c348010a89da0e0aec519b6a717613a798e9a8fee426de5e74,2024-05-14T16:11:39.510000
|
||||
CVE-2024-4568,0,0,79c6e65478e2e86d702896e792fead76bbebdb118f8c0f66e6390a241a22321a,2024-05-07T13:39:32.710000
|
||||
CVE-2024-4571,0,0,b379f15291a8a65b330c223bc6a31fd0a21b183a906c0a4077ca3cf5d38b8ad0,2024-05-14T15:44:05.750000
|
||||
@ -250677,7 +250679,7 @@ CVE-2024-4699,0,0,21634a770b960d22aa24dc1f0ea343763012f9507287610a68f53780612049
|
||||
CVE-2024-4701,0,0,31c0f40927cc6a1a9aece611ec4491a5435df4e5c3a9daffc9dfb7710658ca96,2024-05-14T16:11:39.510000
|
||||
CVE-2024-4702,0,0,391d02c5718dd442c026ca8f3973c4fe10894f8eeb54175158dc44cd7ef50d4a,2024-05-15T16:40:19.330000
|
||||
CVE-2024-4709,0,0,383dbf3a5b128343c77c07c63d6b9081028427dd357dd94a114eb158c69d030d,2024-05-20T13:00:34.807000
|
||||
CVE-2024-4710,1,1,608aa390af8e84e2c9fa201d024990a01f6045b0e7eb161424a2ea87e1078294,2024-05-21T07:15:09.087000
|
||||
CVE-2024-4710,0,0,608aa390af8e84e2c9fa201d024990a01f6045b0e7eb161424a2ea87e1078294,2024-05-21T07:15:09.087000
|
||||
CVE-2024-4712,0,0,f79d5936efdb7279077ea6da35ae307312c55a147f3075b5570853347f8017b9,2024-05-14T16:11:39.510000
|
||||
CVE-2024-4713,0,0,63c8fe02e071c01e10e60f543cd0776ed83adea75c2d063179e2f75e75c30c3b,2024-05-17T02:40:33.880000
|
||||
CVE-2024-4714,0,0,4e7ff77f8284c93c8758bb989744763ec5c4cb8551eeb8d726beabface4981b3,2024-05-17T02:40:33.983000
|
||||
@ -250772,6 +250774,7 @@ CVE-2024-4859,0,0,3de5434b35db9344c6a8c9ff1c0891dd93d801d8510e1a23be87da56d66078
|
||||
CVE-2024-4860,0,0,078ece1acb5f59d15050f08de42942705925d025d9ef9dfb969c99e0b62152d4,2024-05-14T19:17:55.627000
|
||||
CVE-2024-4865,0,0,329a52916bfd6dfb743076cafa1076f06a8ce9ff30efb7c2cd8c895178c7ad64,2024-05-20T13:00:34.807000
|
||||
CVE-2024-4871,0,0,089a89f3309c27433f20e3be4ef9a00379f9f19601c1c8029649846113aed43a,2024-05-14T19:17:55.627000
|
||||
CVE-2024-4875,1,1,196d997c6e8c967fc738be0f9232c06bbee9b2632adf2326052dc6b01f415553,2024-05-21T09:15:09.103000
|
||||
CVE-2024-4891,0,0,e74bd5bb85af020930d6b90474dcbd5a7bb8df3f51cfa57310da23b320714b43,2024-05-20T13:00:34.807000
|
||||
CVE-2024-4893,0,0,d5ebc2dfcb13b74b4f1951a124d2e638a95f79aa05d19e6fadfe65b7ad1c4f46,2024-05-15T16:40:19.330000
|
||||
CVE-2024-4894,0,0,d68130303d356c053d0f6768d0ee08506e206d16216142c952b9b56af8835d24,2024-05-15T16:40:19.330000
|
||||
|
Can't render this file because it is too large.
|
Loading…
x
Reference in New Issue
Block a user