mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-07-11 16:13:34 +00:00
Auto-Update: 2024-08-21T12:00:17.118739+00:00
This commit is contained in:
parent
62f94ab341
commit
19ed851445
56
CVE-2023/CVE-2023-225xx/CVE-2023-22576.json
Normal file
56
CVE-2023/CVE-2023-225xx/CVE-2023-22576.json
Normal file
@ -0,0 +1,56 @@
|
||||
{
|
||||
"id": "CVE-2023-22576",
|
||||
"sourceIdentifier": "security_alert@emc.com",
|
||||
"published": "2024-08-21T10:15:04.173",
|
||||
"lastModified": "2024-08-21T10:15:04.173",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Dell Repository Manager version 3.4.2 and earlier, contain a Local Privilege Escalation Vulnerability in Installation module. A local low privileged attacker may potentially exploit this vulnerability leading to the execution of arbitrary executable on the operating system with high privileges using the existing vulnerability in operating system. Exploitation may lead to unavailability of the service."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security_alert@emc.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "HIGH",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 7.0,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 1.0,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security_alert@emc.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-269"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.dell.com/support/kbdoc/en-us/000207513/dsa-2023-017-dell-emc-repository-manager-drm-security-update-for-an-improper-privilege-management-vulnerability",
|
||||
"source": "security_alert@emc.com"
|
||||
}
|
||||
]
|
||||
}
|
33
CVE-2023/CVE-2023-491xx/CVE-2023-49198.json
Normal file
33
CVE-2023/CVE-2023-491xx/CVE-2023-49198.json
Normal file
@ -0,0 +1,33 @@
|
||||
{
|
||||
"id": "CVE-2023-49198",
|
||||
"sourceIdentifier": "security@apache.org",
|
||||
"published": "2024-08-21T10:15:04.903",
|
||||
"lastModified": "2024-08-21T10:15:04.903",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Mysql security vulnerability in Apache SeaTunnel.\n\nAttackers can read files on the MySQL server by modifying the information in the MySQL URL\n\n allowLoadLocalInfile=true&allowUrlInLocalInfile=true&allowLoadLocalInfileInPath=/&maxAllowedPacket=655360\nThis issue affects Apache SeaTunnel: 1.0.0.\n\nUsers are recommended to upgrade to version [1.0.1], which fixes the issue."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security@apache.org",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-552"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://lists.apache.org/thread/48j9f1nsn037mgzc4j9o51nwglb1s08h",
|
||||
"source": "security@apache.org"
|
||||
}
|
||||
]
|
||||
}
|
56
CVE-2024/CVE-2024-370xx/CVE-2024-37008.json
Normal file
56
CVE-2024/CVE-2024-370xx/CVE-2024-37008.json
Normal file
@ -0,0 +1,56 @@
|
||||
{
|
||||
"id": "CVE-2024-37008",
|
||||
"sourceIdentifier": "psirt@autodesk.com",
|
||||
"published": "2024-08-21T10:15:05.037",
|
||||
"lastModified": "2024-08-21T10:15:05.037",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A maliciously crafted DWG file, when parsed in Revit, can force a stack-based buffer overflow. A malicious actor can leverage this vulnerability to execute arbitrary code in the context of the current process."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "psirt@autodesk.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 7.8,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "psirt@autodesk.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-121"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.autodesk.com/trust/security-advisories/adsk-sa-2024-0013",
|
||||
"source": "psirt@autodesk.com"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-42679",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-08-15T14:15:11.003",
|
||||
"lastModified": "2024-08-20T19:11:30.170",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2024-08-21T11:06:24.627",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -61,8 +61,8 @@
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:cysoft168:super_easy_enterprise_management_system:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "1.0.0",
|
||||
"matchCriteriaId": "CBFCD140-3CD8-4D15-9771-033C393FC3AE"
|
||||
"versionEndIncluding": "1.0.0",
|
||||
"matchCriteriaId": "D28A83C1-38F8-4944-90AC-47DFA013E82B"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-42680",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-08-15T14:15:11.107",
|
||||
"lastModified": "2024-08-20T19:15:43.747",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2024-08-21T11:06:00.887",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -60,9 +60,9 @@
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:super_easy_enterprise_management_system_project:super_easy_enterprise_management_system:*:*:*:*:*:*:*:*",
|
||||
"criteria": "cpe:2.3:a:cysoft168:super_easy_enterprise_management_system:*:*:*:*:*:*:*:*",
|
||||
"versionEndIncluding": "1.0.0",
|
||||
"matchCriteriaId": "8C417977-4219-432A-A6BF-DF10C8F068CB"
|
||||
"matchCriteriaId": "D28A83C1-38F8-4944-90AC-47DFA013E82B"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
16
README.md
16
README.md
@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours.
|
||||
### Last Repository Update
|
||||
|
||||
```plain
|
||||
2024-08-21T10:00:17.080322+00:00
|
||||
2024-08-21T12:00:17.118739+00:00
|
||||
```
|
||||
|
||||
### Most recent CVE Modification Timestamp synchronized with NVD
|
||||
|
||||
```plain
|
||||
2024-08-21T09:15:04.973000+00:00
|
||||
2024-08-21T11:06:24.627000+00:00
|
||||
```
|
||||
|
||||
### Last Data Feed Release
|
||||
@ -33,24 +33,24 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
|
||||
### Total Number of included CVEs
|
||||
|
||||
```plain
|
||||
260774
|
||||
260777
|
||||
```
|
||||
|
||||
### CVEs added in the last Commit
|
||||
|
||||
Recently added CVEs: `3`
|
||||
|
||||
- [CVE-2024-5335](CVE-2024/CVE-2024-53xx/CVE-2024-5335.json) (`2024-08-21T09:15:04.563`)
|
||||
- [CVE-2024-6339](CVE-2024/CVE-2024-63xx/CVE-2024-6339.json) (`2024-08-21T08:15:04.333`)
|
||||
- [CVE-2024-7757](CVE-2024/CVE-2024-77xx/CVE-2024-7757.json) (`2024-08-21T09:15:04.973`)
|
||||
- [CVE-2023-22576](CVE-2023/CVE-2023-225xx/CVE-2023-22576.json) (`2024-08-21T10:15:04.173`)
|
||||
- [CVE-2023-49198](CVE-2023/CVE-2023-491xx/CVE-2023-49198.json) (`2024-08-21T10:15:04.903`)
|
||||
- [CVE-2024-37008](CVE-2024/CVE-2024-370xx/CVE-2024-37008.json) (`2024-08-21T10:15:05.037`)
|
||||
|
||||
|
||||
### CVEs modified in the last Commit
|
||||
|
||||
Recently modified CVEs: `2`
|
||||
|
||||
- [CVE-2024-1459](CVE-2024/CVE-2024-14xx/CVE-2024-1459.json) (`2024-08-21T08:15:04.047`)
|
||||
- [CVE-2024-39480](CVE-2024/CVE-2024-394xx/CVE-2024-39480.json) (`2024-08-21T08:35:05.157`)
|
||||
- [CVE-2024-42679](CVE-2024/CVE-2024-426xx/CVE-2024-42679.json) (`2024-08-21T11:06:24.627`)
|
||||
- [CVE-2024-42680](CVE-2024/CVE-2024-426xx/CVE-2024-42680.json) (`2024-08-21T11:06:00.887`)
|
||||
|
||||
|
||||
## Download and Usage
|
||||
|
17
_state.csv
17
_state.csv
@ -216644,6 +216644,7 @@ CVE-2023-22572,0,0,778132e3b3f1c6111ec36dfa71316889039f517589afb27544bf256807f05
|
||||
CVE-2023-22573,0,0,695940d0a93594287fdbd9acbc9b34e26235c4d79dab66e64e7b07d3ab3ac00f,2023-11-07T04:07:03.490000
|
||||
CVE-2023-22574,0,0,aabdaef9b03b49d2d5c4e805d45fdd5dedd66691d702929398a4937fd5b7eac8,2023-11-07T04:07:03.700000
|
||||
CVE-2023-22575,0,0,0fa7814eb835b1136895274bd2531f1a8e8cbfed45eb164215437ecf3caa9fba,2023-11-07T04:07:03.910000
|
||||
CVE-2023-22576,1,1,f34c873317b85e1cc8a94c6e89652edd8bcceda8efb18db311343ae15a5c58bd,2024-08-21T10:15:04.173000
|
||||
CVE-2023-22577,0,0,e60adbac0fa6d3fedb1bcdd27e7e5af2dd2842bde5e722c2b627410b2be78279,2023-05-02T19:13:08.980000
|
||||
CVE-2023-22578,0,0,aa99ee9b2e1474cc51633927001ee761e43c7fc8e969c212365f2e94662f2910,2023-03-03T19:23:56.890000
|
||||
CVE-2023-22579,0,0,b50f51817f5ab55f90ca17e0a70b50b2a7f894e20f1a8ab175a13831f05dfd7f,2023-04-28T18:50:21
|
||||
@ -236628,6 +236629,7 @@ CVE-2023-49190,0,0,86cb6859aa19958c166ca64e47676d44af4b98597ca7dd177a61fac83182b
|
||||
CVE-2023-49191,0,0,34969ee3df3717ecd0fd0437e5d4d4fc0bd1f9b89d2160d0adca8969e1a92937,2023-12-21T17:20:50.323000
|
||||
CVE-2023-49195,0,0,239193d980cfd4324773344b0a932e91919adfb3eac7f01f4cac2dbd41501171,2023-12-18T19:48:51.397000
|
||||
CVE-2023-49197,0,0,87fee8cafa9bc5eebe7f1b14f5bce64e09cfb3c60a34a1183c07dca6faf91be6,2023-12-21T17:26:04.913000
|
||||
CVE-2023-49198,1,1,396f914d30a46917822b7244e0ebed77f8413fe2f0d5d066a5087cbf0c9fecdf,2024-08-21T10:15:04.903000
|
||||
CVE-2023-4920,0,0,750757ff4ce213882eeb3b1cbdf16aac49f85b0688b4847bcc0bc2036d6471f3,2023-11-07T04:23:10.193000
|
||||
CVE-2023-49208,0,0,2a9e047f121c5391d797b355b9800029d03397ffa5606d306303c89458886565,2023-11-30T20:47:45.190000
|
||||
CVE-2023-4921,0,0,d59093adbc168eaf1f1dcabc1b2c8846c3b0575f8dbf1988414be85426e1ed5d,2024-01-11T19:15:12.373000
|
||||
@ -242338,7 +242340,7 @@ CVE-2024-1454,0,0,de26dc8df40f576066c6c923b2efe16ed0450024c75c0ff05447756d8a8a19
|
||||
CVE-2024-1455,0,0,150cf04553026c6d927055f564987fc57df0c743f9421c15918b44f92d1a260f,2024-04-16T12:15:09.230000
|
||||
CVE-2024-1456,0,0,5b0bf210be135d03b9e0f0aa4d44e1d74b665ecf3cd8074dce271769fca228b4,2024-04-16T13:24:07.103000
|
||||
CVE-2024-1458,0,0,3592b3461bffe67c8c4bc63c3d6ff327fca1737b7c0b5caa3c39b57cb625a124,2024-04-10T13:24:00.070000
|
||||
CVE-2024-1459,0,1,51cbf7dd2304c9ddcd703721fb9f8aa12d2740b7e35e5f074291174ee3632e5b,2024-08-21T08:15:04.047000
|
||||
CVE-2024-1459,0,0,51cbf7dd2304c9ddcd703721fb9f8aa12d2740b7e35e5f074291174ee3632e5b,2024-08-21T08:15:04.047000
|
||||
CVE-2024-1460,0,0,ec3eff8320a7047ab22a3f4f19e8a683e9813b41a93039f228f1a8a5f8a8cf7a,2024-03-07T13:52:27.110000
|
||||
CVE-2024-1461,0,0,26c4adb2b82e40af589d16e03a3c66cf8502da0df0ecd03c04ff2c63ab4db84d,2024-04-10T13:24:00.070000
|
||||
CVE-2024-1462,0,0,6b7af8b648383ff153c14e78c5c62b9a8ac40f1719c2bd6e10b75d7361782b36,2024-03-13T18:15:58.530000
|
||||
@ -254533,6 +254535,7 @@ CVE-2024-37004,0,0,eb821b24aec40cee5d3a4d83d3182056a26abdd06091705aaacecddd90b33
|
||||
CVE-2024-37005,0,0,6346c3768c56adc2bd0ec197af628ad214cd9981413f2d5df7e8d7f1bc79c5d6,2024-07-03T02:04:00.877000
|
||||
CVE-2024-37006,0,0,ce197589ee3e9b9abc62e5ee278117c11ae961db1cdfe5fd87c2da96a0f55f85,2024-07-03T02:04:01.090000
|
||||
CVE-2024-37007,0,0,0fc601714096f5d925a9dbadf52718e2d07645aad03229b4044d058f28f4c32f,2024-07-03T02:04:01.303000
|
||||
CVE-2024-37008,1,1,85936969a50ff59ca67989589a6b2eb44f362d8416df47e4d9d579786430837d,2024-08-21T10:15:05.037000
|
||||
CVE-2024-3701,0,0,d0eb5159a877411bc688498f011f247ba2357363b8455c201bea5174efe527d7,2024-08-21T03:15:05.297000
|
||||
CVE-2024-37014,0,0,4d8eebb55f92fd637819ddb88e1adc8dcc510ce2876a7f33ecffd1498dc89404,2024-07-03T02:04:01.523000
|
||||
CVE-2024-37015,0,0,06f63d10776f12944092a5aeb799730f5be21ccdf02c7eed139cbe7f55ddde9d,2024-08-14T02:07:05.410000
|
||||
@ -256076,7 +256079,7 @@ CVE-2024-39477,0,0,fa2961e1df43c2ad9a597485359813e1caa1c3df12b3f99f63d20b746ef13
|
||||
CVE-2024-39478,0,0,db5004c8723658ae0e4f973c4d186ceee912acd4280f4ead75dd617705f0db2a,2024-07-08T18:01:50.890000
|
||||
CVE-2024-39479,0,0,bc1edde74592b7edcc9609840a7bf1812668235b0d4cb2d6d45b97e02415c8b7,2024-07-08T18:01:41.523000
|
||||
CVE-2024-3948,0,0,30bbf4121d163b9683e040780e7f656af12a28c4942bf649df9e4ab11ee6b22b,2024-05-17T02:40:12.107000
|
||||
CVE-2024-39480,0,1,39cebd7ee4e2bd179c794137dbafcd0474f90d3c9b78a7618c6489ab9d07ca61,2024-08-21T08:35:05.157000
|
||||
CVE-2024-39480,0,0,39cebd7ee4e2bd179c794137dbafcd0474f90d3c9b78a7618c6489ab9d07ca61,2024-08-21T08:35:05.157000
|
||||
CVE-2024-39481,0,0,5841ead06e9f2b1a042c8ff661c861ad1c393f673c9f42578be9372484fc2036,2024-07-08T18:01:22.447000
|
||||
CVE-2024-39482,0,0,2e53f7f56d22a34ce6ad819626880e479ce6053c61a068f9f1a515a60263c9c7,2024-07-08T18:00:28.200000
|
||||
CVE-2024-39483,0,0,d36581a3f952605fa4deddb55b42f749ee06fd7a8fd95b57c25fb72ba28ba332,2024-07-08T18:00:08.430000
|
||||
@ -257751,9 +257754,9 @@ CVE-2024-42675,0,0,92c6b6457955ed616d1577d62ebea7dcf172d2ecdd66922f34ded7a7ee2d3
|
||||
CVE-2024-42676,0,0,ee04f7bab8ee13bdc864d5bc2a4a11bd3644007d71c7b1c26d6531bc1196494f,2024-08-19T16:11:33.843000
|
||||
CVE-2024-42677,0,0,85c08a22e8a37131c90308072afe209c51004b01a70c30ff33acbdf877c43e4a,2024-08-19T16:08:17.727000
|
||||
CVE-2024-42678,0,0,ce8a3f135d4f809369d6b75de9ff99127513c0db10a407cdd20ba786f1f3cdc9,2024-08-19T16:06:36.343000
|
||||
CVE-2024-42679,0,0,6a02308e3545fcdfb2afc5a157e1d80d89726c2d2fb50d27eba41ddfeb407814,2024-08-20T19:11:30.170000
|
||||
CVE-2024-42679,0,1,2ffe2a4be5c215d810f5b898b95b8290538512d66dc44037835c595a5e530f63,2024-08-21T11:06:24.627000
|
||||
CVE-2024-4268,0,0,ed1b7008ff1a2549bc2f685279352d3a8f5b6d435592b2f29fd10fa9328ca71d,2024-07-02T18:08:17.817000
|
||||
CVE-2024-42680,0,0,dac62d72e6eacedc1cd7e0b65a9c2238b8ef923d90031ac072a1ef2e7d57ab80,2024-08-20T19:15:43.747000
|
||||
CVE-2024-42680,0,1,b168ab4cd2e2150be7aaf36c84a318add99cf48e6e7026b9bd7262bb9f167200,2024-08-21T11:06:00.887000
|
||||
CVE-2024-42681,0,0,38014007bcc5735791461b793967c4dfbe475531f64d8682f14c63500277a9d8,2024-08-19T19:35:08.437000
|
||||
CVE-2024-4269,0,0,3a0e07c5dbf72b66f7c37e018ba2f8991c2e2b5c26c8f2d595b33767cdbe4e7e,2024-08-01T13:59:29.737000
|
||||
CVE-2024-4270,0,0,17133812b9c812b17ff2909d738c8b5ae6f8cc2b39eef016edec8cd05359b195,2024-07-29T16:31:09.117000
|
||||
@ -258993,7 +258996,7 @@ CVE-2024-5330,0,0,d052f676e850b1a7538b470735e7fe5f7dfb3046b39fa2778831cd7f8fdd99
|
||||
CVE-2024-5331,0,0,f05fb229c386046dcd65cdaa4c35f1d7d27dbf88e27984042e1518b076a10077,2024-08-01T12:42:36.933000
|
||||
CVE-2024-5332,0,0,440877c08f2207e575e98ca75a231683ae97178fa156f1a4d40f84efe3c80f11,2024-08-02T15:03:49.773000
|
||||
CVE-2024-5334,0,0,24408ed0ac6ef1e7a34f70a35a6cc670103055f984541012ab7ae541f1637158,2024-07-12T08:15:11.130000
|
||||
CVE-2024-5335,1,1,af4b6ddab2c64dee47c068383fc8039e8f6c161833bd8240683c69765185ea69,2024-08-21T09:15:04.563000
|
||||
CVE-2024-5335,0,0,af4b6ddab2c64dee47c068383fc8039e8f6c161833bd8240683c69765185ea69,2024-08-21T09:15:04.563000
|
||||
CVE-2024-5336,0,0,2f884d9a8acdce925dfd5f3bbb7e4d857b44070abc5058c1ed58328cd4186515,2024-06-04T19:21:04.947000
|
||||
CVE-2024-5337,0,0,2b5f97595978a274de9cc82ffbb4e0a657c957408faf59676ddd95606d164a93,2024-06-04T19:21:05.063000
|
||||
CVE-2024-5338,0,0,a30664650e5151e5bf507d4d1b27e8e105537061b8462474ea4f7add61cf4b05,2024-06-04T19:21:05.170000
|
||||
@ -259793,7 +259796,7 @@ CVE-2024-6334,0,0,3daf0dfe09252e7765ca30c739cfcc033a43a657c17c0275e173ac67050452
|
||||
CVE-2024-6336,0,0,1df5fc72f07b093cfd11ea9b65ef147e8130715026fca7ff47fd924988f45532,2024-07-17T13:34:20.520000
|
||||
CVE-2024-6337,0,0,4bbaace135a65e16bd97b2f84fc2780e829de9473b830dbe86c073fce6003d74,2024-08-20T20:15:09.033000
|
||||
CVE-2024-6338,0,0,8956384d5cc966970e625ecbde4127bb4f84d940fa059b7aaed0155a833fd98c,2024-07-19T20:24:40.397000
|
||||
CVE-2024-6339,1,1,0908dc10a04daa9a65725fca0f1e84e79bced582f5db1322b56ee6175cfa8944,2024-08-21T08:15:04.333000
|
||||
CVE-2024-6339,0,0,0908dc10a04daa9a65725fca0f1e84e79bced582f5db1322b56ee6175cfa8944,2024-08-21T08:15:04.333000
|
||||
CVE-2024-6340,0,0,fd12f25a45d92fefbb8c0ec47428250f4f56bb9c686a12a52e54d86e24fec10a,2024-07-03T18:27:40.903000
|
||||
CVE-2024-6341,0,0,528f4fdde1526d72477e90a767b2f2316b168f65b64effeddb9446d8a5cdcaf5,2024-07-02T18:15:03.900000
|
||||
CVE-2024-6344,0,0,ddc89c494afe0b7b80a518e0bed96070c096d29b8a0f403bdd242f60ce193de2,2024-06-27T00:15:13.360000
|
||||
@ -260675,7 +260678,7 @@ CVE-2024-7751,0,0,3d4779511baf725a6e5d9f65d6769396fd6275e830b17a69e8bf93efeb313e
|
||||
CVE-2024-7752,0,0,a2329e23410b1feec53d6ea38469016e280edd824b17c574fc21bf18179470a9,2024-08-19T17:48:25.793000
|
||||
CVE-2024-7753,0,0,8d87f0b2095698ec5201c016f27ad170e6b85d6a83cdb1acca64ef97e59384ac,2024-08-19T17:47:49.083000
|
||||
CVE-2024-7754,0,0,aa642088260d14c06ef027c5ebe72633a842f86ac8e6448a2c0c42d526be8fa5,2024-08-19T17:48:15.203000
|
||||
CVE-2024-7757,1,1,ca7d079474a8e4f4b2f55e1721105da3a15a9e1d63f2bd4356eaaa03e8d55f39,2024-08-21T09:15:04.973000
|
||||
CVE-2024-7757,0,0,ca7d079474a8e4f4b2f55e1721105da3a15a9e1d63f2bd4356eaaa03e8d55f39,2024-08-21T09:15:04.973000
|
||||
CVE-2024-7775,0,0,e3301a5d8f77ad443eb31f53865c4d76f2f8fe202d331dbc3155c9382724cc8e,2024-08-20T15:44:20.567000
|
||||
CVE-2024-7777,0,0,71bd18c058a843cc648eaac1d1574a0ec472525bb01fac803805d8a41dba271b,2024-08-20T15:44:20.567000
|
||||
CVE-2024-7780,0,0,d93ffb279aea8f39f6fd963d66033ac1d11eb19c0e769bfec592ca965c19db92,2024-08-20T15:44:20.567000
|
||||
|
Can't render this file because it is too large.
|
Loading…
x
Reference in New Issue
Block a user