mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-07-09 16:05:11 +00:00
Auto-Update: 2024-05-27T16:00:30.174150+00:00
This commit is contained in:
parent
9ce3d1afdd
commit
0eb305b25a
@ -2,12 +2,12 @@
|
||||
"id": "CVE-2021-41320",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2021-10-15T16:15:07.493",
|
||||
"lastModified": "2021-10-21T14:13:48.200",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2024-05-27T14:15:09.100",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A technical user has hardcoded credentials in Wallstreet Suite TRM 7.4.83 (64-bit edition) with higher privilege than the average authenticated user."
|
||||
"value": "A technical user has hardcoded credentials in Wallstreet Suite TRM 7.4.83 (64-bit edition) with higher privilege than the average authenticated user. NOTE: the vendor disputes this because the password is not hardcoded (it can be changed during installation or at any later time)."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
@ -113,6 +113,10 @@
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://client-connect.iongroup.com/library/content/treasury-management/wallstreet-suite/security/suite-7-4-83/user-passwords/",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://excellium-services.com/cert-xlm-advisory/CVE-2021-41320",
|
||||
"source": "cve@mitre.org",
|
||||
|
24
CVE-2023/CVE-2023-509xx/CVE-2023-50977.json
Normal file
24
CVE-2023/CVE-2023-509xx/CVE-2023-50977.json
Normal file
@ -0,0 +1,24 @@
|
||||
{
|
||||
"id": "CVE-2023-50977",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-05-27T14:15:09.380",
|
||||
"lastModified": "2024-05-27T14:15:09.380",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "In GNOME Shell through 45.2, unauthenticated remote code execution can be achieved by intercepting two DNS requests (GNOME Network Manager and GNOME Shell Portal Helper connectivity checks), and responding with attacker-specific IP addresses. This DNS hijacking causes GNOME Captive Portal to be launched via a WebKitGTK browser, by default, on the victim system; this can run JavaScript code inside a sandbox. NOTE: the vendor's position is that this is not a vulnerability because running JavaScript code inside a sandbox is the intended behavior."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://gitlab.gnome.org/GNOME/gnome-shell/-/blob/ceed3e07e44f2cd1bfdbf273523abc0bb4bbd8c1/js/portalHelper/main.js",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://gitlab.gnome.org/GNOME/gnome-shell/-/issues/7666",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
32
CVE-2024/CVE-2024-08xx/CVE-2024-0851.json
Normal file
32
CVE-2024/CVE-2024-08xx/CVE-2024-0851.json
Normal file
@ -0,0 +1,32 @@
|
||||
{
|
||||
"id": "CVE-2024-0851",
|
||||
"sourceIdentifier": "iletisim@usom.gov.tr",
|
||||
"published": "2024-05-27T15:15:08.780",
|
||||
"lastModified": "2024-05-27T15:15:08.780",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Grup Arge Energy and Control Systems Smartpower allows SQL Injection.This issue affects Smartpower: through V24.05.27."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "iletisim@usom.gov.tr",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-89"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.usom.gov.tr/bildirim/tr-24-0556",
|
||||
"source": "iletisim@usom.gov.tr"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,95 +2,14 @@
|
||||
"id": "CVE-2024-3205",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2024-04-02T23:15:54.627",
|
||||
"lastModified": "2024-05-17T02:39:46.847",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-05-27T15:15:08.930",
|
||||
"vulnStatus": "Rejected",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A vulnerability was found in yaml libyaml up to 0.2.5 and classified as critical. Affected by this issue is the function yaml_emitter_emit_flow_sequence_item of the file /src/libyaml/src/emitter.c. The manipulation leads to heap-based buffer overflow. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-259052. NOTE: The vendor was contacted early about this disclosure but did not respond in any way."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Una vulnerabilidad fue encontrada en yaml libyaml hasta 0.2.5 y clasificada como cr\u00edtica. La funci\u00f3n yaml_emitter_emit_flow_sequence_item del archivo /src/libyaml/src/emitter.c es afectada por esta vulnerabilidad. La manipulaci\u00f3n conduce a un desbordamiento de b\u00fafer de almacenamiento din\u00e1mico. El ataque puede lanzarse de forma remota. El exploit ha sido divulgado al p\u00fablico y puede utilizarse. El identificador de esta vulnerabilidad es VDB-259052. NOTA: Se contact\u00f3 primeramente al proveedor sobre esta divulgaci\u00f3n, pero no respondi\u00f3 de ninguna manera."
|
||||
"value": "Rejected reason: ** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that it was not a security issue. Notes: The maintainer identified an error in the libyaml fuzzers. It is not possible to reproduce nor exploit the issue."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "LOW",
|
||||
"baseScore": 7.3,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 3.4
|
||||
}
|
||||
],
|
||||
"cvssMetricV2": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "2.0",
|
||||
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
|
||||
"accessVector": "NETWORK",
|
||||
"accessComplexity": "LOW",
|
||||
"authentication": "NONE",
|
||||
"confidentialityImpact": "PARTIAL",
|
||||
"integrityImpact": "PARTIAL",
|
||||
"availabilityImpact": "PARTIAL",
|
||||
"baseScore": 7.5
|
||||
},
|
||||
"baseSeverity": "HIGH",
|
||||
"exploitabilityScore": 10.0,
|
||||
"impactScore": 6.4,
|
||||
"acInsufInfo": false,
|
||||
"obtainAllPrivilege": false,
|
||||
"obtainUserPrivilege": false,
|
||||
"obtainOtherPrivilege": false,
|
||||
"userInteractionRequired": false
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-122"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://drive.google.com/drive/folders/1lwNEs8wqwkUV52f3uQNYMPrxRuXPtGQs?usp=sharing",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.259052",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.259052",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?submit.304561",
|
||||
"source": "cna@vuldb.com"
|
||||
}
|
||||
]
|
||||
"metrics": {},
|
||||
"references": []
|
||||
}
|
24
CVE-2024/CVE-2024-344xx/CVE-2024-34477.json
Normal file
24
CVE-2024/CVE-2024-344xx/CVE-2024-34477.json
Normal file
@ -0,0 +1,24 @@
|
||||
{
|
||||
"id": "CVE-2024-34477",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-05-27T14:15:09.470",
|
||||
"lastModified": "2024-05-27T14:15:09.470",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "configureNFS in lib/common/functions.sh in FOG through 1.5.10 allows local users to gain privileges by mounting a crafted NFS share (because of no_root_squash and insecure). In order to exploit the vulnerability, someone needs to mount an NFS share in order to add an executable file as root. In addition, the SUID bit must be added to this file."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://forums.fogproject.org/topic/17486/fog-1-5-10-and-earlier-nfs-privilege-escalation-vulnerability",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/FOGProject/fogproject/blob/a4bb1bf39ac53c3cbe623576915fbc3b5c80a00f/lib/common/functions.sh#L1360",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
22
README.md
22
README.md
@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours.
|
||||
### Last Repository Update
|
||||
|
||||
```plain
|
||||
2024-05-27T14:01:09.648917+00:00
|
||||
2024-05-27T16:00:30.174150+00:00
|
||||
```
|
||||
|
||||
### Most recent CVE Modification Timestamp synchronized with NVD
|
||||
|
||||
```plain
|
||||
2024-05-27T13:15:09.040000+00:00
|
||||
2024-05-27T15:15:08.930000+00:00
|
||||
```
|
||||
|
||||
### Last Data Feed Release
|
||||
@ -33,26 +33,24 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
|
||||
### Total Number of included CVEs
|
||||
|
||||
```plain
|
||||
251864
|
||||
251867
|
||||
```
|
||||
|
||||
### CVEs added in the last Commit
|
||||
|
||||
Recently added CVEs: `7`
|
||||
Recently added CVEs: `3`
|
||||
|
||||
- [CVE-2023-6349](CVE-2023/CVE-2023-63xx/CVE-2023-6349.json) (`2024-05-27T12:15:08.810`)
|
||||
- [CVE-2024-3381](CVE-2024/CVE-2024-33xx/CVE-2024-3381.json) (`2024-05-27T13:15:08.490`)
|
||||
- [CVE-2024-5405](CVE-2024/CVE-2024-54xx/CVE-2024-5405.json) (`2024-05-27T12:15:09.067`)
|
||||
- [CVE-2024-5406](CVE-2024/CVE-2024-54xx/CVE-2024-5406.json) (`2024-05-27T12:15:09.333`)
|
||||
- [CVE-2024-5407](CVE-2024/CVE-2024-54xx/CVE-2024-5407.json) (`2024-05-27T13:15:08.573`)
|
||||
- [CVE-2024-5408](CVE-2024/CVE-2024-54xx/CVE-2024-5408.json) (`2024-05-27T13:15:08.817`)
|
||||
- [CVE-2024-5409](CVE-2024/CVE-2024-54xx/CVE-2024-5409.json) (`2024-05-27T13:15:09.040`)
|
||||
- [CVE-2023-50977](CVE-2023/CVE-2023-509xx/CVE-2023-50977.json) (`2024-05-27T14:15:09.380`)
|
||||
- [CVE-2024-0851](CVE-2024/CVE-2024-08xx/CVE-2024-0851.json) (`2024-05-27T15:15:08.780`)
|
||||
- [CVE-2024-34477](CVE-2024/CVE-2024-344xx/CVE-2024-34477.json) (`2024-05-27T14:15:09.470`)
|
||||
|
||||
|
||||
### CVEs modified in the last Commit
|
||||
|
||||
Recently modified CVEs: `0`
|
||||
Recently modified CVEs: `2`
|
||||
|
||||
- [CVE-2021-41320](CVE-2021/CVE-2021-413xx/CVE-2021-41320.json) (`2024-05-27T14:15:09.100`)
|
||||
- [CVE-2024-3205](CVE-2024/CVE-2024-32xx/CVE-2024-3205.json) (`2024-05-27T15:15:08.930`)
|
||||
|
||||
|
||||
## Download and Usage
|
||||
|
21
_state.csv
21
_state.csv
@ -182895,7 +182895,7 @@ CVE-2021-41316,0,0,9451f6e2182248f381d8312075b70cc52b7b28fd6f398b0906a9d6af744cf
|
||||
CVE-2021-41317,0,0,1e30c3a3cdc2d93da5d5ec7a73c27bdb779d243cf4ebf81d79f9cc20888caecd,2021-09-28T16:01:14.137000
|
||||
CVE-2021-41318,0,0,3cbda06907c12914b33017e7fd86178d4f26c2bb4744fdb95b60f4d5407af421,2021-10-07T12:45:46.713000
|
||||
CVE-2021-4132,0,0,05e8a46a6069ed38408d6cc58c95941cc9ad669d41a089a85eac0a259c9e89fb,2021-12-21T15:07:42.040000
|
||||
CVE-2021-41320,0,0,46f79cb3d0faeb83fa6bdf03a6aaf7f7fadecc2775ce2bf8777b4b6dd0df1cdc,2021-10-21T14:13:48.200000
|
||||
CVE-2021-41320,0,1,f5ef8c03ed0f3faf0ed201b0b87a38bd86c2a51aeb107ef1559ccfcfe1f2021a,2024-05-27T14:15:09.100000
|
||||
CVE-2021-41322,0,0,b703288a0976ae25b7f3e242b48042b91c5deb005d49f387e230e92f847be568,2023-08-08T14:22:24.967000
|
||||
CVE-2021-41323,0,0,d9ad37356690fe59a2f00da0b55e317d864104ab9f4bfaf6cfa10064bdf0afa1,2021-10-07T03:00:37.570000
|
||||
CVE-2021-41324,0,0,8db7a914b5d2aab764a489b67f58f13404a8e9bbafef8419f38e4aea8e975234,2021-10-07T21:56:24.883000
|
||||
@ -236979,6 +236979,7 @@ CVE-2023-5097,0,0,0f86cc372d2c26b6541ac3ec5ba289a39a168bf65c355711efa9e745857fe3
|
||||
CVE-2023-50974,0,0,64121c933f739d8b35ccb2b018adc49dbc3ecd37fb638c0ca9261e8aa268c1c8,2024-01-12T20:25:04.120000
|
||||
CVE-2023-50975,0,0,a3c387351b5cb3112ae57eb6decd6048c7e5563bc70bcc034afc09ab81c61e0e,2024-02-22T19:07:27.197000
|
||||
CVE-2023-50976,0,0,b4013c170504d7533d23aee05010a848cbe499012767fb0ca51aae1561e21e35,2023-12-22T21:23:23.067000
|
||||
CVE-2023-50977,1,1,830fcc975f7a0f322641c0eeec4b2a9affa4b537e1db455e6df64c1a6d75d785,2024-05-27T14:15:09.380000
|
||||
CVE-2023-50979,0,0,db30250302fec4fba765b6baf7a0d8d9d9cc8fd12a61cfeda28a01f641ae78e8,2023-12-27T18:59:12.027000
|
||||
CVE-2023-5098,0,0,b1f60952efad14350a7dcf5b932f9846957c48bb7b9f485b0d1c0be187395d0b,2023-11-08T18:33:48.503000
|
||||
CVE-2023-50980,0,0,51bd43ebed75455dbf4f815998127cca51023596397489e47e4540205169564f,2023-12-27T19:04:11.283000
|
||||
@ -239364,7 +239365,7 @@ CVE-2023-6345,0,0,a9d7fbb37b5bedc60cc374c5aba487da97d8bafd2dd093fe7949f604d257b7
|
||||
CVE-2023-6346,0,0,c40bf8c265a92108ff97f9d05c1f66ae31d46069c960237aa0eb79c96f65109d,2024-01-31T17:15:23.213000
|
||||
CVE-2023-6347,0,0,d95524d2c228513203a102be0e94cb621b285684af6da72197460b84ebeb516d,2024-01-31T17:15:23.647000
|
||||
CVE-2023-6348,0,0,706b82708bceb6844e727704576bb420554258a8d74eede78820e3034fd2985c,2024-01-31T17:15:23.980000
|
||||
CVE-2023-6349,1,1,339d13717e8ecfab2196bb13c6a4404b7b127f771b20585d94508cfec3aacc82,2024-05-27T12:15:08.810000
|
||||
CVE-2023-6349,0,0,339d13717e8ecfab2196bb13c6a4404b7b127f771b20585d94508cfec3aacc82,2024-05-27T12:15:08.810000
|
||||
CVE-2023-6350,0,0,9d7ad504737b94d45fc95132d0bdf31e98f4b10c438be5a55687a8cc1730d327,2024-01-31T17:15:24.350000
|
||||
CVE-2023-6351,0,0,b642b9477c499dc985ed242dcc1430092dc5faffae820429036d91341cf9907b,2024-01-31T17:15:24.673000
|
||||
CVE-2023-6352,0,0,a7c9f6deee309d44509b6c9208a201145230316f41723e551e729328a3c70e36,2023-12-11T14:40:41.233000
|
||||
@ -240823,6 +240824,7 @@ CVE-2024-0844,0,0,9b0ede7ee0379ed34aa516e6f2cba464e96d05ae45278d47c03f7b0b4baaf7
|
||||
CVE-2024-0847,0,0,2423a45a83c68ee77ea1657795a6b4f742f1b905ef7ab47fbb7c37fbc6c3b67d,2024-05-02T18:00:37.360000
|
||||
CVE-2024-0848,0,0,31e58640f306446653f67bc78198fcff39c93c6b22a4398146342d7991ad8c6a,2024-05-02T18:00:37.360000
|
||||
CVE-2024-0849,0,0,ab143b9a0b5d37d266faac9cd54f50fee666b57f962e8e1bec5db73357a455f9,2024-02-13T19:16:30.810000
|
||||
CVE-2024-0851,1,1,e64047998fdc7127744d767cf997e0a60484a135cf88b67269b94715d365c945,2024-05-27T15:15:08.780000
|
||||
CVE-2024-0853,0,0,48741ff766ade9b023961bbceceaafd7a1985d06925636a8fc9f27ee5d25b1a6,2024-05-03T13:15:21.320000
|
||||
CVE-2024-0854,0,0,b2a19a635a88b4ff68549abb31f11c392c07f9e329d9704350bbb3ee75810c41,2024-01-30T17:01:37.127000
|
||||
CVE-2024-0855,0,0,fee06b61accc977f963cdb2b2ef743d4f7ee62d05033c371692bc8e3d7ebf823,2024-02-27T14:20:06.637000
|
||||
@ -248899,7 +248901,7 @@ CVE-2024-32045,0,0,3757a773847b5ed6c32fb24905f0b5c02d842b84e0e51fc3b349b201665bf
|
||||
CVE-2024-32046,0,0,3771b70436f95435fc521db21da6fd859bb3ed607b3e6e7edd188445267746f3,2024-04-26T12:58:17.720000
|
||||
CVE-2024-32047,0,0,f009d59be96ce9fa193a4aa9724cc4cc41ffb33bc61e4f05b98fbbfa91a9068b,2024-05-16T13:03:05.353000
|
||||
CVE-2024-32049,0,0,d9cad06fbf5a30eecb78b22409f73f445b96767def965004d9fc51455fda8ca6,2024-05-08T17:05:24.083000
|
||||
CVE-2024-3205,0,0,c3a9ce84fafed58ce2fc8a240f386de0c3cae4edd5893ee1ae56b7013f99ec1a,2024-05-17T02:39:46.847000
|
||||
CVE-2024-3205,0,1,94de9427276f5133bdfe91db56cbfc9958b517e8a2bb181bf6c470a918feb832,2024-05-27T15:15:08.930000
|
||||
CVE-2024-32051,0,0,6b68078466255ceca82525e73c2bf321431fb4aeacd1939a9b40ac3cfa9637f8,2024-04-24T13:39:42.883000
|
||||
CVE-2024-32053,0,0,c49f1ec019a03a55c7a246c2938dce6b00883e32de7837d58b7e2304f1b45b97,2024-05-16T13:03:05.353000
|
||||
CVE-2024-32055,0,0,6f2d1e2b794c469fc60e21d2252e9f5df7bf8f202c22d166d778068242a50bff,2024-05-14T19:17:55.627000
|
||||
@ -249842,7 +249844,7 @@ CVE-2024-33791,0,0,2786e7a8195c6ad972434c0d7a30a33f957fdd2fdd91aaac75f6ce3fbef54
|
||||
CVE-2024-33792,0,0,7e8694e2bb2a659e8d08c902362d29026ff1c04595111f0bccc0fd7b0663e1e1,2024-05-07T05:15:51.893000
|
||||
CVE-2024-33793,0,0,1bdbd66edb6a4ee81475ab628b3dbabe390dd8c440854dad95c22ae762967d37,2024-05-07T06:15:08.720000
|
||||
CVE-2024-33809,0,0,a9244b7bac7a01a848ecf7adc4839dcc7ecaf56436a02182e43d1bf648cb6641,2024-05-24T18:09:20.027000
|
||||
CVE-2024-3381,1,1,2675878f918c9740671fc065cc6afea6b859e07b3f755ce74555424e09b49f5d,2024-05-27T13:15:08.490000
|
||||
CVE-2024-3381,0,0,2675878f918c9740671fc065cc6afea6b859e07b3f755ce74555424e09b49f5d,2024-05-27T13:15:08.490000
|
||||
CVE-2024-33818,0,0,fcf08ee825495c7c9196412d6a7ac485908da9a914b001b572e82e64bc2af5f7,2024-05-14T16:12:23.490000
|
||||
CVE-2024-33819,0,0,27ebf543bf09f96d296185f9994673eb8c5aa230fac1ef1d22da8e6b7ccd2158,2024-05-14T16:12:23.490000
|
||||
CVE-2024-3382,0,0,359ee56c09e0a2a64315ebc823efc4b55ab60390ccbf48a0550f896cf550e0d4,2024-04-10T19:49:51.183000
|
||||
@ -250188,6 +250190,7 @@ CVE-2024-34473,0,0,a0e81d4e65e4f59fc6788a67ab9abe6ae8169dfe1411246b36c4680fde1af
|
||||
CVE-2024-34474,0,0,3df656c76dccd5c0b812eaec7b5241dc606cf859dfb7b55dfdb0e2ac6d92fbbf,2024-05-06T12:44:56.377000
|
||||
CVE-2024-34475,0,0,bc3b000674e2f5e5d8987a5a03c7029744124543abeafbfeb540e90342057172,2024-05-06T12:44:56.377000
|
||||
CVE-2024-34476,0,0,f460d7b07cd8e1102230047a90895024b7118c0a722ec4264bd02b84a90ba448,2024-05-06T12:44:56.377000
|
||||
CVE-2024-34477,1,1,1c3916da72fe70175c33b76d785b0a9c82c863ba75e4d8ef95c22a1137f829de,2024-05-27T14:15:09.470000
|
||||
CVE-2024-34478,0,0,e041b25b36e3062d0ab338fb8a5bf2a23de65e7f383d14a7d54f9bd405368aa0,2024-05-06T12:44:56.377000
|
||||
CVE-2024-3448,0,0,38511310080ef6cbfb33c1721e41ad41c6df0877e6ffcdbf14f478fa1ea7a673,2024-04-10T19:49:51.183000
|
||||
CVE-2024-34483,0,0,df92e60b2a063249d7c7eb5d2fcb2d7b0c92f9a83d882b5d628cf9e21e289c65,2024-05-06T12:44:56.377000
|
||||
@ -251858,8 +251861,8 @@ CVE-2024-5397,0,0,127f0e4aebb20af982b9f8f3c5e3c610f094604b0e4dbcdf747a9ca9a9d17d
|
||||
CVE-2024-5399,0,0,11939ed21acc3c5ec586746ddde14b797a390e121836283682232169079970b5,2024-05-27T04:15:09.300000
|
||||
CVE-2024-5400,0,0,3934e126a75210a22708febe3829ce6c46f46cc7e12a3a7182ec01f8e6ac35ad,2024-05-27T06:15:10.620000
|
||||
CVE-2024-5403,0,0,ed1d166ca6bf87c091bd718e3e0b00502f1d612d8d3d042e4dc422513dd0bdef,2024-05-27T07:15:09.530000
|
||||
CVE-2024-5405,1,1,49942e4a68a09244f074abab0118a3e725704e492551d35caf34af31201462e6,2024-05-27T12:15:09.067000
|
||||
CVE-2024-5406,1,1,8388cdb5206a2260ff3ef4be55e5195b9526275a7722f69924ed74fee613c514,2024-05-27T12:15:09.333000
|
||||
CVE-2024-5407,1,1,f6f018cb73591d5951317cf6cb9418428e5bc3ae925c84689b3ce2d5c483f30a,2024-05-27T13:15:08.573000
|
||||
CVE-2024-5408,1,1,219da37207b714ce9e3524b5c58f50d48db58bc623cbb609140a8131f93b7a65,2024-05-27T13:15:08.817000
|
||||
CVE-2024-5409,1,1,dc5f7da4fafab5ffa6fcbfdf146c0d675a15daf5a8580fc3a389221d5de44817,2024-05-27T13:15:09.040000
|
||||
CVE-2024-5405,0,0,49942e4a68a09244f074abab0118a3e725704e492551d35caf34af31201462e6,2024-05-27T12:15:09.067000
|
||||
CVE-2024-5406,0,0,8388cdb5206a2260ff3ef4be55e5195b9526275a7722f69924ed74fee613c514,2024-05-27T12:15:09.333000
|
||||
CVE-2024-5407,0,0,f6f018cb73591d5951317cf6cb9418428e5bc3ae925c84689b3ce2d5c483f30a,2024-05-27T13:15:08.573000
|
||||
CVE-2024-5408,0,0,219da37207b714ce9e3524b5c58f50d48db58bc623cbb609140a8131f93b7a65,2024-05-27T13:15:08.817000
|
||||
CVE-2024-5409,0,0,dc5f7da4fafab5ffa6fcbfdf146c0d675a15daf5a8580fc3a389221d5de44817,2024-05-27T13:15:09.040000
|
||||
|
Can't render this file because it is too large.
|
Loading…
x
Reference in New Issue
Block a user