mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-07-09 16:05:11 +00:00
Auto-Update: 2024-09-21T06:00:17.684189+00:00
This commit is contained in:
parent
372053d539
commit
08871550d9
100
CVE-2024/CVE-2024-67xx/CVE-2024-6785.json
Normal file
100
CVE-2024/CVE-2024-67xx/CVE-2024-6785.json
Normal file
@ -0,0 +1,100 @@
|
||||
{
|
||||
"id": "CVE-2024-6785",
|
||||
"sourceIdentifier": "psirt@moxa.com",
|
||||
"published": "2024-09-21T05:15:11.860",
|
||||
"lastModified": "2024-09-21T05:15:11.860",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "The configuration file stores credentials in cleartext. An attacker with local access rights can read or modify the configuration file, potentially resulting in the service being abused due to sensitive information exposure."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV40": [
|
||||
{
|
||||
"source": "psirt@moxa.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "4.0",
|
||||
"vectorString": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"attackRequirements": "NONE",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"vulnerableSystemConfidentiality": "HIGH",
|
||||
"vulnerableSystemIntegrity": "NONE",
|
||||
"vulnerableSystemAvailability": "NONE",
|
||||
"subsequentSystemConfidentiality": "NONE",
|
||||
"subsequentSystemIntegrity": "NONE",
|
||||
"subsequentSystemAvailability": "NONE",
|
||||
"exploitMaturity": "NOT_DEFINED",
|
||||
"confidentialityRequirements": "NOT_DEFINED",
|
||||
"integrityRequirements": "NOT_DEFINED",
|
||||
"availabilityRequirements": "NOT_DEFINED",
|
||||
"modifiedAttackVector": "NOT_DEFINED",
|
||||
"modifiedAttackComplexity": "NOT_DEFINED",
|
||||
"modifiedAttackRequirements": "NOT_DEFINED",
|
||||
"modifiedPrivilegesRequired": "NOT_DEFINED",
|
||||
"modifiedUserInteraction": "NOT_DEFINED",
|
||||
"modifiedVulnerableSystemConfidentiality": "NOT_DEFINED",
|
||||
"modifiedVulnerableSystemIntegrity": "NOT_DEFINED",
|
||||
"modifiedVulnerableSystemAvailability": "NOT_DEFINED",
|
||||
"modifiedSubsequentSystemConfidentiality": "NOT_DEFINED",
|
||||
"modifiedSubsequentSystemIntegrity": "NOT_DEFINED",
|
||||
"modifiedSubsequentSystemAvailability": "NOT_DEFINED",
|
||||
"safety": "NOT_DEFINED",
|
||||
"automatable": "NOT_DEFINED",
|
||||
"recovery": "NOT_DEFINED",
|
||||
"valueDensity": "NOT_DEFINED",
|
||||
"vulnerabilityResponseEffort": "NOT_DEFINED",
|
||||
"providerUrgency": "NOT_DEFINED",
|
||||
"baseScore": 6.8,
|
||||
"baseSeverity": "MEDIUM"
|
||||
}
|
||||
}
|
||||
],
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "psirt@moxa.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 5.5,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "psirt@moxa.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-313"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.moxa.com/en/support/product-support/security-advisory/mpsa-240735-multiple-vulnerabilities-in-mxview-one-and-mxview-one-central-manager-series",
|
||||
"source": "psirt@moxa.com"
|
||||
}
|
||||
]
|
||||
}
|
100
CVE-2024/CVE-2024-67xx/CVE-2024-6786.json
Normal file
100
CVE-2024/CVE-2024-67xx/CVE-2024-6786.json
Normal file
@ -0,0 +1,100 @@
|
||||
{
|
||||
"id": "CVE-2024-6786",
|
||||
"sourceIdentifier": "psirt@moxa.com",
|
||||
"published": "2024-09-21T05:15:12.397",
|
||||
"lastModified": "2024-09-21T05:15:12.397",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "The vulnerability allows an attacker to craft MQTT messages that include relative path traversal sequences, enabling them to read arbitrary files on the system. This could lead to the disclosure of sensitive information, such as configuration files and JWT signing secrets."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV40": [
|
||||
{
|
||||
"source": "psirt@moxa.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "4.0",
|
||||
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:P/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"attackRequirements": "PRESENT",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"vulnerableSystemConfidentiality": "HIGH",
|
||||
"vulnerableSystemIntegrity": "NONE",
|
||||
"vulnerableSystemAvailability": "NONE",
|
||||
"subsequentSystemConfidentiality": "NONE",
|
||||
"subsequentSystemIntegrity": "NONE",
|
||||
"subsequentSystemAvailability": "NONE",
|
||||
"exploitMaturity": "NOT_DEFINED",
|
||||
"confidentialityRequirements": "NOT_DEFINED",
|
||||
"integrityRequirements": "NOT_DEFINED",
|
||||
"availabilityRequirements": "NOT_DEFINED",
|
||||
"modifiedAttackVector": "NOT_DEFINED",
|
||||
"modifiedAttackComplexity": "NOT_DEFINED",
|
||||
"modifiedAttackRequirements": "NOT_DEFINED",
|
||||
"modifiedPrivilegesRequired": "NOT_DEFINED",
|
||||
"modifiedUserInteraction": "NOT_DEFINED",
|
||||
"modifiedVulnerableSystemConfidentiality": "NOT_DEFINED",
|
||||
"modifiedVulnerableSystemIntegrity": "NOT_DEFINED",
|
||||
"modifiedVulnerableSystemAvailability": "NOT_DEFINED",
|
||||
"modifiedSubsequentSystemConfidentiality": "NOT_DEFINED",
|
||||
"modifiedSubsequentSystemIntegrity": "NOT_DEFINED",
|
||||
"modifiedSubsequentSystemAvailability": "NOT_DEFINED",
|
||||
"safety": "NOT_DEFINED",
|
||||
"automatable": "NOT_DEFINED",
|
||||
"recovery": "NOT_DEFINED",
|
||||
"valueDensity": "NOT_DEFINED",
|
||||
"vulnerabilityResponseEffort": "NOT_DEFINED",
|
||||
"providerUrgency": "NOT_DEFINED",
|
||||
"baseScore": 6.0,
|
||||
"baseSeverity": "MEDIUM"
|
||||
}
|
||||
}
|
||||
],
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "psirt@moxa.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 6.5,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "psirt@moxa.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-24"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.moxa.com/en/support/product-support/security-advisory/mpsa-240735-multiple-vulnerabilities-in-mxview-one-and-mxview-one-central-manager-series",
|
||||
"source": "psirt@moxa.com"
|
||||
}
|
||||
]
|
||||
}
|
100
CVE-2024/CVE-2024-67xx/CVE-2024-6787.json
Normal file
100
CVE-2024/CVE-2024-67xx/CVE-2024-6787.json
Normal file
@ -0,0 +1,100 @@
|
||||
{
|
||||
"id": "CVE-2024-6787",
|
||||
"sourceIdentifier": "psirt@moxa.com",
|
||||
"published": "2024-09-21T05:15:12.607",
|
||||
"lastModified": "2024-09-21T05:15:12.607",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "This vulnerability occurs when an attacker exploits a race condition between the time a file is checked and the time it is used (TOCTOU). By exploiting this race condition, an attacker can write arbitrary files to the system. This could allow the attacker to execute malicious code and potentially cause file losses."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV40": [
|
||||
{
|
||||
"source": "psirt@moxa.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "4.0",
|
||||
"vectorString": "CVSS:4.0/AV:N/AC:H/AT:P/PR:L/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "HIGH",
|
||||
"attackRequirements": "PRESENT",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"vulnerableSystemConfidentiality": "NONE",
|
||||
"vulnerableSystemIntegrity": "HIGH",
|
||||
"vulnerableSystemAvailability": "NONE",
|
||||
"subsequentSystemConfidentiality": "NONE",
|
||||
"subsequentSystemIntegrity": "NONE",
|
||||
"subsequentSystemAvailability": "NONE",
|
||||
"exploitMaturity": "NOT_DEFINED",
|
||||
"confidentialityRequirements": "NOT_DEFINED",
|
||||
"integrityRequirements": "NOT_DEFINED",
|
||||
"availabilityRequirements": "NOT_DEFINED",
|
||||
"modifiedAttackVector": "NOT_DEFINED",
|
||||
"modifiedAttackComplexity": "NOT_DEFINED",
|
||||
"modifiedAttackRequirements": "NOT_DEFINED",
|
||||
"modifiedPrivilegesRequired": "NOT_DEFINED",
|
||||
"modifiedUserInteraction": "NOT_DEFINED",
|
||||
"modifiedVulnerableSystemConfidentiality": "NOT_DEFINED",
|
||||
"modifiedVulnerableSystemIntegrity": "NOT_DEFINED",
|
||||
"modifiedVulnerableSystemAvailability": "NOT_DEFINED",
|
||||
"modifiedSubsequentSystemConfidentiality": "NOT_DEFINED",
|
||||
"modifiedSubsequentSystemIntegrity": "NOT_DEFINED",
|
||||
"modifiedSubsequentSystemAvailability": "NOT_DEFINED",
|
||||
"safety": "NOT_DEFINED",
|
||||
"automatable": "NOT_DEFINED",
|
||||
"recovery": "NOT_DEFINED",
|
||||
"valueDensity": "NOT_DEFINED",
|
||||
"vulnerabilityResponseEffort": "NOT_DEFINED",
|
||||
"providerUrgency": "NOT_DEFINED",
|
||||
"baseScore": 6.0,
|
||||
"baseSeverity": "MEDIUM"
|
||||
}
|
||||
}
|
||||
],
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "psirt@moxa.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "HIGH",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 5.3,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 1.6,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "psirt@moxa.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-367"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.moxa.com/en/support/product-support/security-advisory/mpsa-240735-multiple-vulnerabilities-in-mxview-one-and-mxview-one-central-manager-series",
|
||||
"source": "psirt@moxa.com"
|
||||
}
|
||||
]
|
||||
}
|
28
README.md
28
README.md
@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours.
|
||||
### Last Repository Update
|
||||
|
||||
```plain
|
||||
2024-09-20T23:55:17.046095+00:00
|
||||
2024-09-21T06:00:17.684189+00:00
|
||||
```
|
||||
|
||||
### Most recent CVE Modification Timestamp synchronized with NVD
|
||||
|
||||
```plain
|
||||
2024-09-20T23:35:04.073000+00:00
|
||||
2024-09-21T05:15:12.607000+00:00
|
||||
```
|
||||
|
||||
### Last Data Feed Release
|
||||
@ -27,38 +27,28 @@ Repository synchronizes with the NVD every 2 hours.
|
||||
Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/releases/latest)
|
||||
|
||||
```plain
|
||||
2024-09-20T00:00:08.675346+00:00
|
||||
2024-09-21T00:00:08.668407+00:00
|
||||
```
|
||||
|
||||
### Total Number of included CVEs
|
||||
|
||||
```plain
|
||||
263519
|
||||
263522
|
||||
```
|
||||
|
||||
### CVEs added in the last Commit
|
||||
|
||||
Recently added CVEs: `0`
|
||||
Recently added CVEs: `3`
|
||||
|
||||
- [CVE-2024-6785](CVE-2024/CVE-2024-67xx/CVE-2024-6785.json) (`2024-09-21T05:15:11.860`)
|
||||
- [CVE-2024-6786](CVE-2024/CVE-2024-67xx/CVE-2024-6786.json) (`2024-09-21T05:15:12.397`)
|
||||
- [CVE-2024-6787](CVE-2024/CVE-2024-67xx/CVE-2024-6787.json) (`2024-09-21T05:15:12.607`)
|
||||
|
||||
|
||||
### CVEs modified in the last Commit
|
||||
|
||||
Recently modified CVEs: `13`
|
||||
Recently modified CVEs: `0`
|
||||
|
||||
- [CVE-2023-36676](CVE-2023/CVE-2023-366xx/CVE-2023-36676.json) (`2024-09-20T23:11:18.563`)
|
||||
- [CVE-2023-36684](CVE-2023/CVE-2023-366xx/CVE-2023-36684.json) (`2024-09-20T23:19:11.727`)
|
||||
- [CVE-2024-38877](CVE-2024/CVE-2024-388xx/CVE-2024-38877.json) (`2024-09-20T23:35:04.073`)
|
||||
- [CVE-2024-38879](CVE-2024/CVE-2024-388xx/CVE-2024-38879.json) (`2024-09-20T23:26:28.767`)
|
||||
- [CVE-2024-46958](CVE-2024/CVE-2024-469xx/CVE-2024-46958.json) (`2024-09-20T22:41:38.223`)
|
||||
- [CVE-2024-6128](CVE-2024/CVE-2024-61xx/CVE-2024-6128.json) (`2024-09-20T23:21:47.123`)
|
||||
- [CVE-2024-6939](CVE-2024/CVE-2024-69xx/CVE-2024-6939.json) (`2024-09-20T22:55:37.133`)
|
||||
- [CVE-2024-6941](CVE-2024/CVE-2024-69xx/CVE-2024-6941.json) (`2024-09-20T23:08:19.027`)
|
||||
- [CVE-2024-6942](CVE-2024/CVE-2024-69xx/CVE-2024-6942.json) (`2024-09-20T22:59:33.430`)
|
||||
- [CVE-2024-6943](CVE-2024/CVE-2024-69xx/CVE-2024-6943.json) (`2024-09-20T22:51:52.603`)
|
||||
- [CVE-2024-6944](CVE-2024/CVE-2024-69xx/CVE-2024-6944.json) (`2024-09-20T22:49:44.337`)
|
||||
- [CVE-2024-8752](CVE-2024/CVE-2024-87xx/CVE-2024-8752.json) (`2024-09-20T22:42:20.367`)
|
||||
- [CVE-2024-8875](CVE-2024/CVE-2024-88xx/CVE-2024-8875.json) (`2024-09-20T22:44:16.077`)
|
||||
|
||||
|
||||
## Download and Usage
|
||||
|
29
_state.csv
29
_state.csv
@ -227565,14 +227565,14 @@ CVE-2023-36672,0,0,0b437c7f228042e22c4f8d314d930a5f7b09ede3e5cf22aa693cfc66240e4
|
||||
CVE-2023-36673,0,0,a12f7249f363726adad8b584d5dd5a49c39eb47b074fc8406f71b668e7664739,2023-10-31T09:15:08.337000
|
||||
CVE-2023-36674,0,0,fe86697de9b18a95f92deb90589b41424edbd135f36d0c5658d0733faf8e2b7a,2023-11-07T04:16:41.150000
|
||||
CVE-2023-36675,0,0,5c1bed2b433b860e794759988c06c2540aa0155cb90f88dce1df7acae30c9a95,2023-11-07T04:16:42.083000
|
||||
CVE-2023-36676,0,1,4a9258f5e078288b069b3a1e582c048d74b4404fdc2a2003de0065aa04460858,2024-09-20T23:11:18.563000
|
||||
CVE-2023-36676,0,0,4a9258f5e078288b069b3a1e582c048d74b4404fdc2a2003de0065aa04460858,2024-09-20T23:11:18.563000
|
||||
CVE-2023-36677,0,0,447e129853788da008a3219fe85e6391cc9b944061e22512652e363c1bbae1f4,2024-09-05T20:35:08.677000
|
||||
CVE-2023-36678,0,0,bf8c9875618aff5790e83f1ac3731c675ac156e0c7b7885b1d89d903f5e19dcb,2023-08-09T16:25:04.920000
|
||||
CVE-2023-36679,0,0,f27841aaf867ab2cafb3bd3ec2ed998058062eb81a8f5ec7fd4cc1d0705b2e8e,2024-03-28T12:42:56.150000
|
||||
CVE-2023-3668,0,0,f4c6e5685eb8eae619efd13ead136da3dc1df867ffc04086e38926d939521ba3,2023-07-27T12:17:44.780000
|
||||
CVE-2023-36682,0,0,952892780a5faadd3ca8c25591f065b9af54d1d98df171f1b6c8f2fe303b9f37,2023-12-05T19:57:34.747000
|
||||
CVE-2023-36683,0,0,0701c92847ee551599872dcf2d7c55baeec3df1d79c78ce8a377f8cce0c18212,2024-06-20T12:44:01.637000
|
||||
CVE-2023-36684,0,1,58a75347b8eb50df439d5c8b3342dd96ebf1723300ee41996a4d50b57daf8723,2024-09-20T23:19:11.727000
|
||||
CVE-2023-36684,0,0,58a75347b8eb50df439d5c8b3342dd96ebf1723300ee41996a4d50b57daf8723,2024-09-20T23:19:11.727000
|
||||
CVE-2023-36685,0,0,9eb96379a3c26ffb48412157d8c37192cad9b706235f2ddb51ee3b56b6174857,2023-12-05T20:44:13.570000
|
||||
CVE-2023-36686,0,0,05a794c26050db76039dff94c1338603726055c10e2cb44832c7bb214e3545f5,2023-08-09T18:01:02.050000
|
||||
CVE-2023-36687,0,0,ec5ee63a5cfb73ba52bdc0df99aa31ee07fad4595ead0d53e2ce10587e6cd879,2023-07-18T18:21:13.220000
|
||||
@ -256374,9 +256374,9 @@ CVE-2024-38873,0,0,6889a908915a370dc32eb3b9351070cdb3a634a1b8f52aac6863c833e22f7
|
||||
CVE-2024-38874,0,0,1c1b28247d06b02b2f044fb942d8a6aa89aab3909bc7e48738a346b7a68e1cc9,2024-06-21T11:22:01.687000
|
||||
CVE-2024-38875,0,0,d18c0c1f05faa02ef048ee622890d874b54f8d91a4409a82414c9856f7ccdec0,2024-07-12T16:11:48.453000
|
||||
CVE-2024-38876,0,0,25480756813f020fa50f173d621e9d6fe38555b94130c33f850eba69c0fb613c,2024-09-17T14:45:04.577000
|
||||
CVE-2024-38877,0,1,4e3f301e785bb891862e0917f4e9356d239b529d3009467a6802ff0e25358a1d,2024-09-20T23:35:04.073000
|
||||
CVE-2024-38877,0,0,4e3f301e785bb891862e0917f4e9356d239b529d3009467a6802ff0e25358a1d,2024-09-20T23:35:04.073000
|
||||
CVE-2024-38878,0,0,b5810a8f9e927e1d011bb902669295d6c86e1472c4f8c215871ea71a0875da71,2024-09-17T15:50:41.117000
|
||||
CVE-2024-38879,0,1,0cab13a0888ad481f91fb5351787b6c6198d69f2e637b0f50855f8f2587b1612,2024-09-20T23:26:28.767000
|
||||
CVE-2024-38879,0,0,0cab13a0888ad481f91fb5351787b6c6198d69f2e637b0f50855f8f2587b1612,2024-09-20T23:26:28.767000
|
||||
CVE-2024-3888,0,0,bc342da7901e0094f72065e6dd2aedad38420d6e9d380693e035c77fa5fe3f90,2024-06-04T16:57:41.053000
|
||||
CVE-2024-38881,0,0,2ea60d09d0d9ff87b6dd792d394f437879631637f2111fab8651cc5ce17e3b46,2024-08-07T16:15:44.930000
|
||||
CVE-2024-38882,0,0,ea1448ebae28393db0b7622f2675e28d74dab9b17e97c9a882ec3bbe17d057da,2024-08-07T16:15:45
|
||||
@ -260359,7 +260359,7 @@ CVE-2024-46942,0,0,39b03564ad46dfa226521fed6197bd85a5899e9352724095b0a13d9a65f5e
|
||||
CVE-2024-46943,0,0,3fc870c6d99db8787a73f247e0e78f9a5cb086f8d2fb6b0f3154e3b1280de70f,2024-09-20T16:56:49.957000
|
||||
CVE-2024-46946,0,0,5adf6fed09d7522a85c453ac4c470cad5917d88736dbb3b605636f5befca45fa,2024-09-20T12:30:17.483000
|
||||
CVE-2024-4695,0,0,aa253f1bdce79ef626aa7622c4e367006f6b60359a6a2b0af989b23a6e81f980,2024-05-21T12:37:59.687000
|
||||
CVE-2024-46958,0,1,a066074c8ea90ca6497e29c818dbf400ff90cc8827530871d9d45fb4a3abe93e,2024-09-20T22:41:38.223000
|
||||
CVE-2024-46958,0,0,a066074c8ea90ca6497e29c818dbf400ff90cc8827530871d9d45fb4a3abe93e,2024-09-20T22:41:38.223000
|
||||
CVE-2024-46959,0,0,49609311db8eb2484a5bda279fc39cc9dccd98f1d151343e94689d8818c061d9,2024-09-20T14:35:13.063000
|
||||
CVE-2024-4696,0,0,b8ce6d89da084f88972905e9878372f109e48889eae7d9f95b30ecbbc63816ed,2024-06-17T12:43:31.090000
|
||||
CVE-2024-4697,0,0,3bc62a9bb9952d026af8ecd13a98f81fa60290945109a2f6023ef384956822fe,2024-06-04T16:57:41.053000
|
||||
@ -261644,7 +261644,7 @@ CVE-2024-6124,0,0,dbae4ba6931a49b60006ec1ed4b58995a60c43677eb3c396860d17e670311b
|
||||
CVE-2024-6125,0,0,dcd2ab56787ddae0f7c175c392cba81a8765f3e4738004aeecc40e1ed002ca73,2024-06-20T12:44:01.637000
|
||||
CVE-2024-6126,0,0,fe32d1d72ee98dda5ecd99b3a7a2dd6c7f2499fcdf431273ff58d6a25ff8ecce,2024-07-05T12:55:51.367000
|
||||
CVE-2024-6127,0,0,78b2d5dd67e9c05b32bbe278fa7cdf65d5c6c9d848f18552ef9889ec17d13cda,2024-06-28T10:27:00.920000
|
||||
CVE-2024-6128,0,1,752c35ccc9ca0893ce78cfd348cd97a47a4c4389e751d1fa12a176ad61b65ba8,2024-09-20T23:21:47.123000
|
||||
CVE-2024-6128,0,0,752c35ccc9ca0893ce78cfd348cd97a47a4c4389e751d1fa12a176ad61b65ba8,2024-09-20T23:21:47.123000
|
||||
CVE-2024-6129,0,0,2ff762b7cd1a3a05b9f7a7bf543ed96dfafb16d6f8890a34166ecd6ab87a1ddd,2024-09-20T19:21:03.763000
|
||||
CVE-2024-6130,0,0,f4b647f0047f578fe057faac21db7670b7977afa1d31bb2fa4fd50dc12004c54,2024-07-01T12:37:24.220000
|
||||
CVE-2024-6132,0,0,83486b9bda06b2bfd8b6c6e0e87eac1b4d59232f4be914a093590a57da1cf4d5,2024-06-20T12:44:01.637000
|
||||
@ -262183,6 +262183,9 @@ CVE-2024-6780,0,0,ad87716761d57bba157b9bc6302fd56c93db87ccc83552a263372092cb4e84
|
||||
CVE-2024-6781,0,0,678fc4d6db3dccbbb40576923dc15e296dd0a3cca23bbb526dd93d0dbc8a0cec,2024-08-19T17:15:34.797000
|
||||
CVE-2024-6782,0,0,623508ea52e56d6a6e227168366ca2cd7770a1a0850e95e080f5f12fc915b728,2024-08-06T16:30:24.547000
|
||||
CVE-2024-6783,0,0,6f1f4a0fa578d50da4a4853fdfd24c63ba19a8604300ab142edf0f6cb8d9a812,2024-08-30T15:15:18.623000
|
||||
CVE-2024-6785,1,1,c996bda58d993a2fd8d351c0b2e3b763bf73df50ef548b8fe985250e070de39d,2024-09-21T05:15:11.860000
|
||||
CVE-2024-6786,1,1,c6db9edcfa243cabcd3a3ed37b2d424b4f5efa9bf133eff2de9975de26b62f1e,2024-09-21T05:15:12.397000
|
||||
CVE-2024-6787,1,1,8b313e05e86144e6b329490de3dcc55e6fdacc76daa2c55fb5e3d9dc239aaa5e,2024-09-21T05:15:12.607000
|
||||
CVE-2024-6788,0,0,369ef896034f113597a96208fca075acd0c3bdd5e82bf3987939f5fd20470069,2024-08-13T17:11:53.553000
|
||||
CVE-2024-6789,0,0,e33e978edc987b98e576665a6bdb79eb993fb5854279dc068f6ea120541693df,2024-09-16T07:15:03.877000
|
||||
CVE-2024-6791,0,0,6ce79f46aa2ab35d9212f59a5703ed0b8f9ce029cc93e4591d5b48478ec576f2,2024-09-17T14:44:39.387000
|
||||
@ -262292,12 +262295,12 @@ CVE-2024-6935,0,0,e72e7506294a595ab2cf5db5061b1cb277319bbf98ed1b3e690a38f115d41f
|
||||
CVE-2024-6936,0,0,4577b3afdea08ef342dd85247402a57dfff23ab9c07a41a4f2c576d4c65eb8f9,2024-07-22T13:00:31.330000
|
||||
CVE-2024-6937,0,0,b63bb470375f2142964fb92a1dfcf47a63984d8e097aab41275eebd556b8da44,2024-07-22T13:00:31.330000
|
||||
CVE-2024-6938,0,0,b45e7150592dc53d2d6f8456f74caeee413b2781d0948d41717bd8701ae68b88,2024-07-22T13:00:31.330000
|
||||
CVE-2024-6939,0,1,a7847aa2e67130908ca4b0fccbd5e84e8651f5b038701465ea8b316a5bed0334,2024-09-20T22:55:37.133000
|
||||
CVE-2024-6939,0,0,a7847aa2e67130908ca4b0fccbd5e84e8651f5b038701465ea8b316a5bed0334,2024-09-20T22:55:37.133000
|
||||
CVE-2024-6940,0,0,5a3082ab9e69eb4544b88d6195e3acb056697f1ce4655acc61d1de5cd6e851ce,2024-09-10T20:12:35.823000
|
||||
CVE-2024-6941,0,1,a19b2d05018da024d584e77cbfc90057bd7fe00e796a50b29f5d2e79375c29bf,2024-09-20T23:08:19.027000
|
||||
CVE-2024-6942,0,1,abff953241f1dcf0ff4127705ce7c065f7658c4df670b2c1269457bdd749d4df,2024-09-20T22:59:33.430000
|
||||
CVE-2024-6943,0,1,fad3b6eb09934371a09be30980de575d4592929dad7e0cdb8d9485818aae264e,2024-09-20T22:51:52.603000
|
||||
CVE-2024-6944,0,1,507d6294da3a7360efc3de78025b32e1f94a9cff2838808abc6dca9c3e5c1e00,2024-09-20T22:49:44.337000
|
||||
CVE-2024-6941,0,0,a19b2d05018da024d584e77cbfc90057bd7fe00e796a50b29f5d2e79375c29bf,2024-09-20T23:08:19.027000
|
||||
CVE-2024-6942,0,0,abff953241f1dcf0ff4127705ce7c065f7658c4df670b2c1269457bdd749d4df,2024-09-20T22:59:33.430000
|
||||
CVE-2024-6943,0,0,fad3b6eb09934371a09be30980de575d4592929dad7e0cdb8d9485818aae264e,2024-09-20T22:51:52.603000
|
||||
CVE-2024-6944,0,0,507d6294da3a7360efc3de78025b32e1f94a9cff2838808abc6dca9c3e5c1e00,2024-09-20T22:49:44.337000
|
||||
CVE-2024-6945,0,0,fe7643eb8a7b51df3743099b1ad67c8dd1ce3b9c85ea5a20c342990508ec4fba,2024-09-05T16:14:31.237000
|
||||
CVE-2024-6946,0,0,df228dd2d7200de27b517d29f9641805aeb6beb3f4080f036d115266cf455158,2024-09-05T16:14:28.857000
|
||||
CVE-2024-6947,0,0,d9680f8f56c52ed66ccf8eaad5c9080a87e7a6242d8c371c2239db66f7a5aa2b,2024-09-05T16:14:25.513000
|
||||
@ -263438,7 +263441,7 @@ CVE-2024-8747,0,0,6c88c8c8e632bc4d53a0196f95b7ceddf7275f331456b55093d5f334ca6d7b
|
||||
CVE-2024-8749,0,0,dc7dd50ec6adedb45c385a82f706a7ab45f55e506e70a64a626b0d8f521f6289,2024-09-18T18:53:54.860000
|
||||
CVE-2024-8750,0,0,6aa000b45a0c694359dda91e7e992492dcd4e93d6e7b8c131ee0a86fa36b5620,2024-09-18T20:38:42.123000
|
||||
CVE-2024-8751,0,0,dd4f77422f5dc981129a2e765da3e243ee86648b85be15172cd0c4e6601f992a,2024-09-13T14:06:04.777000
|
||||
CVE-2024-8752,0,1,be5f97c0edf8e6ac8b5e8514ff7047e0f4fcd958517cc5377fbff739f62f1969,2024-09-20T22:42:20.367000
|
||||
CVE-2024-8752,0,0,be5f97c0edf8e6ac8b5e8514ff7047e0f4fcd958517cc5377fbff739f62f1969,2024-09-20T22:42:20.367000
|
||||
CVE-2024-8754,0,0,f8a4ca9a3c8c6c9af2a693c6565fade1a53b2c08d2db63ea33e154699f832b1a,2024-09-14T15:40:20.583000
|
||||
CVE-2024-8761,0,0,3585691f416075376d018cf9f4fcfa97af66b09d60d17a08ef4151ff63a68129,2024-09-20T12:31:20.110000
|
||||
CVE-2024-8762,0,0,2877f4481d10e26d4e6bf50e010d02152cab4d90b2c2329689bb4edd4b768ea9,2024-09-14T15:54:10.687000
|
||||
@ -263466,7 +263469,7 @@ CVE-2024-8866,0,0,8e10905107e65798915532a0fd7237746a2479c311a608a0e275edbccb2c74
|
||||
CVE-2024-8867,0,0,379e34cf940a9b1358241a2155237c1f9d3d38d48143e1ed89b8af75caf7d4cf,2024-09-17T10:55:05.913000
|
||||
CVE-2024-8868,0,0,90fb6fa23c2a5505d69614ac49fd1c537f25b76ba9e82d49d07e437e4df1c667,2024-09-17T10:59:28.233000
|
||||
CVE-2024-8869,0,0,eaa7c70f03f38bcd808caaf5c9917ef912247cecdfb7f5fef4110fc2bf4de330,2024-09-20T16:59:22.560000
|
||||
CVE-2024-8875,0,1,285b537766851a72a752adea85efa81abdeba3e4c5af2afdcf8485ecb658237e,2024-09-20T22:44:16.077000
|
||||
CVE-2024-8875,0,0,285b537766851a72a752adea85efa81abdeba3e4c5af2afdcf8485ecb658237e,2024-09-20T22:44:16.077000
|
||||
CVE-2024-8876,0,0,adf401fb4b8b2c24f06ac7d28fd2360497bd835317abc655be39e3ccb04a97b8,2024-09-20T16:58:24.333000
|
||||
CVE-2024-8880,0,0,4890b5d8ccfd73a7de9d70be358a6aa9c5c8f4db772389c703fb4d83ffb621f1,2024-09-20T16:41:38.030000
|
||||
CVE-2024-8883,0,0,acc01ec9c3f72dcdfde915e68c8076ac17eb948c45b5a812494bde62dc939653,2024-09-20T12:30:17.483000
|
||||
|
Can't render this file because it is too large.
|
Loading…
x
Reference in New Issue
Block a user