mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-05-08 03:27:17 +00:00
Auto-Update: 2024-09-25T10:00:18.183065+00:00
This commit is contained in:
parent
8c49eb10c4
commit
31b1d6d2aa
@ -2,13 +2,13 @@
|
||||
"id": "CVE-2022-28613",
|
||||
"sourceIdentifier": "cybersecurity@hitachienergy.com",
|
||||
"published": "2022-05-02T19:15:09.200",
|
||||
"lastModified": "2023-07-21T16:43:00.360",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2024-09-25T08:15:04.067",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A vulnerability in the HCI Modbus TCP COMPONENT of Hitachi Energy RTU500 series CMU Firmware that is caused by the validation error in the length information carried in MBAP header allows an ATTACKER to reboot the device by sending a special crafted message. This issue affects: Hitachi Energy RTU500 series CMU Firmware 12.0.*; 12.2.*; 12.4.*; 12.6.*; 12.7.*; 13.2.*."
|
||||
"value": "A vulnerability exists in the HCI Modbus TCP function included in the product versions listed above. If the HCI Modbus TCP is en-abled and configured, an attacker could exploit the vulnerability by sending a specially crafted message to the RTU500, causing the receiving RTU500 CMU to reboot. The vulnerability is caused by the validation error in the length information carried in MBAP header in the HCI Modbus TCP function."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
@ -101,7 +101,7 @@
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-20"
|
||||
"value": "CWE-1284"
|
||||
}
|
||||
]
|
||||
}
|
||||
@ -174,11 +174,8 @@
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://search.abb.com/library/Download.aspx?DocumentID=8DBD000103&LanguageCode=en&DocumentPartId=&Action=Launch",
|
||||
"source": "cybersecurity@hitachienergy.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
"url": "https://publisher.hitachienergy.com/preview?DocumentID=8DBD000103&LanguageCode=en&DocumentPartId=&Action=Launch",
|
||||
"source": "cybersecurity@hitachienergy.com"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-6711",
|
||||
"sourceIdentifier": "cybersecurity@hitachienergy.com",
|
||||
"published": "2023-12-19T15:15:09.257",
|
||||
"lastModified": "2023-12-28T19:03:00.580",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2024-09-25T09:15:02.930",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -76,7 +76,7 @@
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-20"
|
||||
"value": "CWE-120"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
41
CVE-2024/CVE-2024-234xx/CVE-2024-23454.json
Normal file
41
CVE-2024/CVE-2024-234xx/CVE-2024-23454.json
Normal file
@ -0,0 +1,41 @@
|
||||
{
|
||||
"id": "CVE-2024-23454",
|
||||
"sourceIdentifier": "security@apache.org",
|
||||
"published": "2024-09-25T08:15:04.317",
|
||||
"lastModified": "2024-09-25T08:15:04.317",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Apache Hadoop\u2019s RunJar.run()\u00a0does not set permissions for temporary directory\u00a0by default. If sensitive data will be present in this file, all the other local users may be able to view the content.\nThis is because, on unix-like systems, the system temporary directory is\nshared between all local users. As such, files written in this directory,\nwithout setting the correct posix permissions explicitly, may be viewable\nby all other local users."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "RunJar.run() de Apache Hadoop no establece permisos para el directorio temporal de forma predeterminada. Si en este archivo se encuentran datos confidenciales, todos los dem\u00e1s usuarios locales podr\u00e1n ver el contenido. Esto se debe a que, en sistemas tipo Unix, el directorio temporal del sistema se comparte entre todos los usuarios locales. Por lo tanto, los archivos escritos en este directorio, sin establecer expl\u00edcitamente los permisos posix correctos, pueden ser visibles para todos los dem\u00e1s usuarios locales."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security@apache.org",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-269"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://issues.apache.org/jira/browse/HADOOP-19031",
|
||||
"source": "security@apache.org"
|
||||
},
|
||||
{
|
||||
"url": "https://lists.apache.org/thread/xlo7q8kn4tsjvx059r789oz19hzgfkfs",
|
||||
"source": "security@apache.org"
|
||||
}
|
||||
]
|
||||
}
|
37
CVE-2024/CVE-2024-407xx/CVE-2024-40761.json
Normal file
37
CVE-2024/CVE-2024-407xx/CVE-2024-40761.json
Normal file
@ -0,0 +1,37 @@
|
||||
{
|
||||
"id": "CVE-2024-40761",
|
||||
"sourceIdentifier": "security@apache.org",
|
||||
"published": "2024-09-25T08:15:04.437",
|
||||
"lastModified": "2024-09-25T08:15:04.437",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Inadequate Encryption Strength vulnerability in Apache Answer.\n\nThis issue affects Apache Answer: through 1.3.5.\n\nUsing the MD5 value of a user's email to access Gravatar is insecure and can lead to the leakage of user email. The official recommendation is to use SHA256 instead.\nUsers are recommended to upgrade to version 1.4.0, which fixes the issue."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Vulnerabilidad de fuerza de cifrado inadecuada en Apache Answer. Este problema afecta a Apache Answer: hasta la versi\u00f3n 1.3.5. El uso del valor MD5 del correo electr\u00f3nico de un usuario para acceder a Gravatar es inseguro y puede provocar la filtraci\u00f3n del correo electr\u00f3nico del usuario. La recomendaci\u00f3n oficial es utilizar SHA256 en su lugar. Se recomienda a los usuarios que actualicen a la versi\u00f3n 1.4.0, que soluciona el problema."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security@apache.org",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-326"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://lists.apache.org/thread/mmrhsfy16qwrw0pkv0p9kj40vy3sg08x",
|
||||
"source": "security@apache.org"
|
||||
}
|
||||
]
|
||||
}
|
60
CVE-2024/CVE-2024-473xx/CVE-2024-47303.json
Normal file
60
CVE-2024/CVE-2024-473xx/CVE-2024-47303.json
Normal file
@ -0,0 +1,60 @@
|
||||
{
|
||||
"id": "CVE-2024-47303",
|
||||
"sourceIdentifier": "audit@patchstack.com",
|
||||
"published": "2024-09-25T08:15:04.523",
|
||||
"lastModified": "2024-09-25T08:15:04.523",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Livemesh Livemesh Addons for Elementor allows Stored XSS.This issue affects Livemesh Addons for Elementor: from n/a through 8.5."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web (XSS o 'Cross-site Scripting') en Livemesh Livemesh Addons for Elementor permite XSS almacenado. Este problema afecta a Livemesh Addons for Elementor: desde n/a hasta 8.5."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "LOW",
|
||||
"baseScore": 6.5,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.3,
|
||||
"impactScore": 3.7
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://patchstack.com/database/vulnerability/addons-for-elementor/wordpress-elementor-addons-by-livemesh-plugin-8-5-cross-site-scripting-xss-vulnerability?_s_id=cve",
|
||||
"source": "audit@patchstack.com"
|
||||
}
|
||||
]
|
||||
}
|
60
CVE-2024/CVE-2024-81xx/CVE-2024-8175.json
Normal file
60
CVE-2024/CVE-2024-81xx/CVE-2024-8175.json
Normal file
@ -0,0 +1,60 @@
|
||||
{
|
||||
"id": "CVE-2024-8175",
|
||||
"sourceIdentifier": "info@cert.vde.com",
|
||||
"published": "2024-09-25T08:15:04.727",
|
||||
"lastModified": "2024-09-25T08:15:04.727",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "An unauthenticated remote attacker can\u00a0causes the CODESYS web server to access invalid memory which results in a DoS."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Un atacante remoto no autenticado puede provocar que el servidor web CODESYS acceda a una memoria no v\u00e1lida, lo que resulta en un DoS."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "info@cert.vde.com",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 7.5,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "info@cert.vde.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-754"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://cert.vde.com/en/advisories/VDE-2024-057",
|
||||
"source": "info@cert.vde.com"
|
||||
}
|
||||
]
|
||||
}
|
@ -9,6 +9,10 @@
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "The HT Mega \u2013 Absolute Addons For Elementor plugin for WordPress is vulnerable to Sensitive Information Exposure in all versions up to, and including, 2.6.5 via the render function in includes/widgets/htmega_accordion.php. This makes it possible for authenticated attackers, with Contributor-level access and above, to extract sensitive private, pending, and draft template data."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "El complemento HT Mega \u2013 Absolute Addons For Elementor para WordPress es vulnerable a la exposici\u00f3n de informaci\u00f3n confidencial en todas las versiones hasta la 2.6.5 incluida a trav\u00e9s de la funci\u00f3n de renderizado en features/widgets/htmega_accordion.php. Esto permite que atacantes autenticados, con acceso de nivel de colaborador y superior, extraigan datos confidenciales de plantillas privadas, pendientes y en borrador."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
|
60
CVE-2024/CVE-2024-91xx/CVE-2024-9169.json
Normal file
60
CVE-2024/CVE-2024-91xx/CVE-2024-9169.json
Normal file
@ -0,0 +1,60 @@
|
||||
{
|
||||
"id": "CVE-2024-9169",
|
||||
"sourceIdentifier": "security@wordfence.com",
|
||||
"published": "2024-09-25T09:15:03.380",
|
||||
"lastModified": "2024-09-25T09:15:03.380",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "The LiteSpeed Cache plugin for WordPress is vulnerable to Stored Cross-Site Scripting via plugin debug settings in all versions up to, and including, 6.4.1 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with administrator-level permissions and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. This only affects multi-site installations and installations where unfiltered_html has been disabled."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security@wordfence.com",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:L/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "HIGH",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 5.5,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.3,
|
||||
"impactScore": 2.7
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security@wordfence.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.litespeedtech.com/products/cache-plugins/wordpress-acceleration",
|
||||
"source": "security@wordfence.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/051a987a-944a-4898-872b-0456f0f59b27?source=cve",
|
||||
"source": "security@wordfence.com"
|
||||
}
|
||||
]
|
||||
}
|
27
README.md
27
README.md
@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours.
|
||||
### Last Repository Update
|
||||
|
||||
```plain
|
||||
2024-09-25T08:00:21.342474+00:00
|
||||
2024-09-25T10:00:18.183065+00:00
|
||||
```
|
||||
|
||||
### Most recent CVE Modification Timestamp synchronized with NVD
|
||||
|
||||
```plain
|
||||
2024-09-25T07:15:04.123000+00:00
|
||||
2024-09-25T09:15:03.380000+00:00
|
||||
```
|
||||
|
||||
### Last Data Feed Release
|
||||
@ -33,30 +33,27 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
|
||||
### Total Number of included CVEs
|
||||
|
||||
```plain
|
||||
263721
|
||||
263726
|
||||
```
|
||||
|
||||
### CVEs added in the last Commit
|
||||
|
||||
Recently added CVEs: `8`
|
||||
Recently added CVEs: `5`
|
||||
|
||||
- [CVE-2024-3866](CVE-2024/CVE-2024-38xx/CVE-2024-3866.json) (`2024-09-25T07:15:02.433`)
|
||||
- [CVE-2024-6845](CVE-2024/CVE-2024-68xx/CVE-2024-6845.json) (`2024-09-25T06:15:05.557`)
|
||||
- [CVE-2024-7878](CVE-2024/CVE-2024-78xx/CVE-2024-7878.json) (`2024-09-25T06:15:05.650`)
|
||||
- [CVE-2024-7892](CVE-2024/CVE-2024-78xx/CVE-2024-7892.json) (`2024-09-25T06:15:05.720`)
|
||||
- [CVE-2024-8290](CVE-2024/CVE-2024-82xx/CVE-2024-8290.json) (`2024-09-25T07:15:03.663`)
|
||||
- [CVE-2024-8658](CVE-2024/CVE-2024-86xx/CVE-2024-8658.json) (`2024-09-25T06:15:05.797`)
|
||||
- [CVE-2024-8678](CVE-2024/CVE-2024-86xx/CVE-2024-8678.json) (`2024-09-25T07:15:03.907`)
|
||||
- [CVE-2024-8910](CVE-2024/CVE-2024-89xx/CVE-2024-8910.json) (`2024-09-25T07:15:04.123`)
|
||||
- [CVE-2024-23454](CVE-2024/CVE-2024-234xx/CVE-2024-23454.json) (`2024-09-25T08:15:04.317`)
|
||||
- [CVE-2024-40761](CVE-2024/CVE-2024-407xx/CVE-2024-40761.json) (`2024-09-25T08:15:04.437`)
|
||||
- [CVE-2024-47303](CVE-2024/CVE-2024-473xx/CVE-2024-47303.json) (`2024-09-25T08:15:04.523`)
|
||||
- [CVE-2024-8175](CVE-2024/CVE-2024-81xx/CVE-2024-8175.json) (`2024-09-25T08:15:04.727`)
|
||||
- [CVE-2024-9169](CVE-2024/CVE-2024-91xx/CVE-2024-9169.json) (`2024-09-25T09:15:03.380`)
|
||||
|
||||
|
||||
### CVEs modified in the last Commit
|
||||
|
||||
Recently modified CVEs: `3`
|
||||
|
||||
- [CVE-2024-47220](CVE-2024/CVE-2024-472xx/CVE-2024-47220.json) (`2024-09-25T06:15:03.453`)
|
||||
- [CVE-2024-5154](CVE-2024/CVE-2024-51xx/CVE-2024-5154.json) (`2024-09-25T06:15:04.890`)
|
||||
- [CVE-2024-5742](CVE-2024/CVE-2024-57xx/CVE-2024-5742.json) (`2024-09-25T06:15:05.363`)
|
||||
- [CVE-2022-28613](CVE-2022/CVE-2022-286xx/CVE-2022-28613.json) (`2024-09-25T08:15:04.067`)
|
||||
- [CVE-2023-6711](CVE-2023/CVE-2023-67xx/CVE-2023-6711.json) (`2024-09-25T09:15:02.930`)
|
||||
- [CVE-2024-8910](CVE-2024/CVE-2024-89xx/CVE-2024-8910.json) (`2024-09-25T07:15:04.123`)
|
||||
|
||||
|
||||
## Download and Usage
|
||||
|
31
_state.csv
31
_state.csv
@ -196891,7 +196891,7 @@ CVE-2022-28607,0,0,d66e47fd1474d7dbb2782ad7c6ba7f4f4c1e1088af24801c1afda387ea03f
|
||||
CVE-2022-2861,0,0,029ab8665df311d69d11ed958f8162eedcc0cd13659156820d9b16dfee2a0de7,2023-11-07T03:46:59.477000
|
||||
CVE-2022-28611,0,0,f11f00ddda8be24cf5e69e9a5df34407ec1f0cf4901cf6bbcafd13e6f69b507d,2022-11-16T17:09:39.620000
|
||||
CVE-2022-28612,0,0,5c97a4c292e667b27372a1483365a3817c468a055c1d2e7fc8ad687b680e9b93,2023-07-21T16:39:42.653000
|
||||
CVE-2022-28613,0,0,1c96c969d3eb8915817021b6389d67fa041b115ff843480b04c4e58f90f0f2ed,2023-07-21T16:43:00.360000
|
||||
CVE-2022-28613,0,1,8ce6a8b9f4e0fce1e8e141970b6a1aac9bbc23e68fd88de5b55dee5a269bcae2,2024-09-25T08:15:04.067000
|
||||
CVE-2022-28614,0,0,0d72b58515507ceb3c335a1a0b15b5120129ca1fed70dcee23142b2a5029fb6e,2023-11-07T03:45:43.430000
|
||||
CVE-2022-28615,0,0,ac5f83808e9526b458d530aeaa8f85d47f3f9a427c005772d9d33911d98d7f5b,2023-11-07T03:45:43.517000
|
||||
CVE-2022-28616,0,0,bda9fa553edc3416884d90feb0b442bdea9e91b470f515864d951cc32ff78345,2022-05-26T02:18:43.870000
|
||||
@ -240718,7 +240718,7 @@ CVE-2023-6707,0,0,22422f7eabbc69690db2c5f244182d815bf1044cd6baa45d7e044f886ee223
|
||||
CVE-2023-6708,0,0,684adebc0fb0fbdba9ec443a2a2a351373e128a6589ac6eaf680ef8ec927ce28,2024-07-18T12:28:43.707000
|
||||
CVE-2023-6709,0,0,a958ed3cac531cc2f8ace724292490cb3033f11ec96f0bd3d4d99d6c85dbe075,2023-12-13T21:12:45.867000
|
||||
CVE-2023-6710,0,0,b12cc7234f6c5007fecd7b934b0d3d0386afbee0d1fb61af8f67fe98f9596b09,2024-04-30T15:15:51.830000
|
||||
CVE-2023-6711,0,0,66ce4c08dc250f99119f0849046c51584f7072ec98bd1d552932f6469338c2cd,2023-12-28T19:03:00.580000
|
||||
CVE-2023-6711,0,1,0d261b1d113781b24af572fc903ea57522fa23af641a53da2dfc5ea844b26ba9,2024-09-25T09:15:02.930000
|
||||
CVE-2023-6716,0,0,453206fe5895c96ee02389dee38e57d80c007a1129366e1fc11224dea7499716,2024-02-09T09:15:07.733000
|
||||
CVE-2023-6717,0,0,536a03b57151c23493643196a8234e63e56e597f8488452989b801b2d9067e97,2024-08-29T19:15:06.850000
|
||||
CVE-2023-6718,0,0,b8993e5c05aa50a6a0588a0e596fc38cfb79fe871120fb864c56f8ce8c79e19f,2023-12-18T17:39:26.267000
|
||||
@ -245409,6 +245409,7 @@ CVE-2024-23450,0,0,2df7523054082d4b84a16d78fb91a368c37a8b928df566ac4fcd0fa3827d8
|
||||
CVE-2024-23451,0,0,98e72587b25b49fd46cc29eeb852cc58e7c731cbd72f456171eaef53204f91af,2024-03-28T02:01:21.693000
|
||||
CVE-2024-23452,0,0,9a6ccb7a0d1707ee5de15304b5f743c01f77e88d5fe9270becf1b38165899124,2024-02-29T01:44:08.877000
|
||||
CVE-2024-23453,0,0,f1bd9a64737053d328980f95453859add5097ee1d8e85cf360b78b44e492357c,2024-01-29T22:58:07.777000
|
||||
CVE-2024-23454,1,1,ce514349f094f7485721826a1ef0ab7cd3bf00b0e29acbfc05b5af5b88ca9655,2024-09-25T08:15:04.317000
|
||||
CVE-2024-23456,0,0,1c34f9711cb3850f4e3c5c1186cc838e75b9af18bd5cfcb5feadf48415e58809,2024-08-07T21:30:09.227000
|
||||
CVE-2024-23457,0,0,983da45705b0df1d8a82358111f559f99449ceab5d061882892b47255340426d,2024-05-01T19:50:25.633000
|
||||
CVE-2024-23458,0,0,8359fd1cd2d0959f18d07053444145bb09db8fec7e4f0cdbff10ccca4cb422cd,2024-08-07T21:29:09.537000
|
||||
@ -256271,7 +256272,7 @@ CVE-2024-38651,0,0,47715d6cb9c5ed15acd60ba1960b4a6147a111543bd71aaba5ad096adf7a3
|
||||
CVE-2024-38652,0,0,c09b7df399ce36bfa6f99e496912789d409fa436d96980e8d3bf3eedfe5b5878,2024-08-15T17:32:39.067000
|
||||
CVE-2024-38653,0,0,c8ed77058a52701b560001b5f44bd7270c8687b6c4890948d6b9eaf03edfd74d,2024-08-15T17:32:57.587000
|
||||
CVE-2024-38659,0,0,7f018343721f0a1816fbc1d0de6ee38bcc05d21743970bb8a1218031b26bafff,2024-07-15T07:15:14.163000
|
||||
CVE-2024-3866,1,1,ad44f057462f01d1d1b6d23bcc86b0a84e8e74da68c7f68cd39ff3afd3258cfd,2024-09-25T07:15:02.433000
|
||||
CVE-2024-3866,0,0,ad44f057462f01d1d1b6d23bcc86b0a84e8e74da68c7f68cd39ff3afd3258cfd,2024-09-25T07:15:02.433000
|
||||
CVE-2024-38661,0,0,b3548dc9d015869558d5e6ce591bb61c7302091308e2952841787fdc0fd16368,2024-09-03T18:03:36.033000
|
||||
CVE-2024-38662,0,0,587269b0aade9b66f2b27453b59929a1dd57dcfa88975eb87dd718f6e7386b22,2024-06-24T18:34:17.547000
|
||||
CVE-2024-38663,0,0,76edf2df49fecd967d78d8fa91a81453e6903492924f9f2a65b88c7cc552bf4f,2024-06-24T19:26:47.037000
|
||||
@ -257363,6 +257364,7 @@ CVE-2024-4075,0,0,29d19ea935c989efa2e770180ba61eb06fe49f0b181d6d812a7498d3145b98
|
||||
CVE-2024-40750,0,0,123c568c4a271c6bb023f9091df0f00fec1f937f3d0585148d7948581d7b9455,2024-07-11T13:06:13.187000
|
||||
CVE-2024-40754,0,0,1ec64db92f9c8a84c8628e1cdeeb1b227a772e83fb8bf52c0f582741174a2abb,2024-09-10T14:35:04.833000
|
||||
CVE-2024-4076,0,0,3600a7160ba6cb63d73da78d982aeb737757fd1783e0b44697873d9ae49c2d36,2024-08-01T13:59:24.073000
|
||||
CVE-2024-40761,1,1,ec7f44b1984f115e0baf55e04afbf98ea946ffa2e84b8d5284f88043a6f46ced,2024-09-25T08:15:04.437000
|
||||
CVE-2024-40764,0,0,1e75ed57cfb3afa3fa923571a9717a22e138728f5cce910126d5f1cc9418f1c7,2024-09-10T14:03:09.167000
|
||||
CVE-2024-40766,0,0,9ffdda3005aa6c238f823c6e65a3a89594c21a379fd17878a86615d17b31de27,2024-09-16T19:48:30.827000
|
||||
CVE-2024-40767,0,0,0f0f227d49db4f76a18af060eeadd57ea0ca5da0ccc7bd26ef12905f9453740a,2024-07-30T19:19:40.767000
|
||||
@ -260501,7 +260503,7 @@ CVE-2024-47210,0,0,0912a487d5daeed626dcd74f4415cecd1eb468c441d638b636aa1a85523b3
|
||||
CVE-2024-47218,0,0,282809bf9fbf4fe32ac58189d7505fcb23fd7fbf82337654d318e4cf55ce811d,2024-09-23T16:35:14.730000
|
||||
CVE-2024-47219,0,0,f0a9ad83025607df7abe898ed6aca97a5bcbe21c309d715694757e39cfd2aaff,2024-09-23T16:35:15.607000
|
||||
CVE-2024-4722,0,0,d0eb70616d7559be2944527d8cacda4cb03faa787985cf2ceace067dd7c5ef1c,2024-06-04T19:20:47.553000
|
||||
CVE-2024-47220,0,1,6fc174b50f589203240ab4d7a1fddd32e539254e0b9f1565ac32a4a58a027f27,2024-09-25T06:15:03.453000
|
||||
CVE-2024-47220,0,0,6fc174b50f589203240ab4d7a1fddd32e539254e0b9f1565ac32a4a58a027f27,2024-09-25T06:15:03.453000
|
||||
CVE-2024-47221,0,0,a39f783e0f1837714118df09b4ab8d238e18d056086adb1e01ef68294fa04896,2024-09-22T01:15:12.013000
|
||||
CVE-2024-47222,0,0,91d32f3eb46664421f317c4ce1a08c39837b1d65e0376c618bfc415d4bbf17ec,2024-09-23T20:15:05.493000
|
||||
CVE-2024-47226,0,0,1a012385db8ac429d656612487127291792ff2b1003cc416b62a404a726b12b7,2024-09-23T15:35:09.070000
|
||||
@ -260514,6 +260516,7 @@ CVE-2024-4727,0,0,944186dc32a6b9f919ede42bcb555e3e922a4782a833eff4d2f1edc6462e71
|
||||
CVE-2024-4728,0,0,4f079b987c555f4e946bc2da0c8ee767b411a220a728ca55c5e58bef9ad4770e,2024-05-17T02:40:35.490000
|
||||
CVE-2024-4729,0,0,793714828270400d3e2e2e67107ba4695f8b79c963b6760f5298d6611fbd5811,2024-06-04T19:20:48.027000
|
||||
CVE-2024-4730,0,0,055c30f8bd03259d264f17e44955582c75615e93d958180e12436700bac392ab,2024-06-12T20:15:13.300000
|
||||
CVE-2024-47303,1,1,f1ec761a05646f7bb0f6468fa66ec6cfacac29cfb6f8a45f7893939dfca78485,2024-09-25T08:15:04.523000
|
||||
CVE-2024-4731,0,0,ff0f4697afac2eb26d16b700c40cb0a3947b6039ec9b762c8c08a8e49bc998ce,2024-06-04T19:20:48.130000
|
||||
CVE-2024-4732,0,0,2f9d1622a74bcf5d144d47d69a297d840c0353e903036f272ef15e7560aa5dbf,2024-06-04T19:20:48.237000
|
||||
CVE-2024-4733,0,0,bab73609d3aaa55dacedcdd69b9c9d83fbc709adf98853b3adb423b13daf2498,2024-05-17T18:36:31.297000
|
||||
@ -260882,7 +260885,7 @@ CVE-2024-5150,0,0,af277f2642e60b6f0769d64573990279b6b64286b8d76d1359b09a52e22364
|
||||
CVE-2024-5151,0,0,b696148b4b4d31279fb07ba468cbee496fd48b395a603a703c253d2f424d78b8,2024-08-01T13:59:41.310000
|
||||
CVE-2024-5152,0,0,0dea7afcd89dc9073df22774961d2668d67dbdb8f03e5c77bf50a81dbd6b306f,2024-07-24T17:58:12.617000
|
||||
CVE-2024-5153,0,0,5f2ff3d02c80ca958142f9e7cc43ade832c59a768b74da69d608dbd2c4a4a2d6,2024-07-24T17:56:55.923000
|
||||
CVE-2024-5154,0,1,dd9543d1b55e95fe68ef2cbce657bf493d3cb20e7ff1b13c6f72f3406df71c74,2024-09-25T06:15:04.890000
|
||||
CVE-2024-5154,0,0,dd9543d1b55e95fe68ef2cbce657bf493d3cb20e7ff1b13c6f72f3406df71c74,2024-09-25T06:15:04.890000
|
||||
CVE-2024-5155,0,0,bda9a47dace36470fd3600985ed47f5579d8b3230222d03e314a73ac1655d764,2024-07-03T02:08:34.117000
|
||||
CVE-2024-5156,0,0,15fe916f4b576f7b7dc0d841e2e4a8f8e08add666a82cde7e5fe7e09d48d907a,2024-06-20T16:07:50.417000
|
||||
CVE-2024-5157,0,0,24d31b037c5fbef35f77d9be746cd537f78e6f1e98b9c21955d97a62fe59949f,2024-07-03T02:08:34.407000
|
||||
@ -261403,7 +261406,7 @@ CVE-2024-5736,0,0,542f55758b5fdb7d00740d25c91b14abb056e9aea19176254ebe8a8a94099d
|
||||
CVE-2024-5737,0,0,d0320412366343a8bfdfa83f09ec33ad8bab76c39c727d4c2240c621c15a4ff2,2024-07-03T14:09:22.483000
|
||||
CVE-2024-5739,0,0,607ae99ef991c260ab7d753d294117f20a4326531a649cb8963e8228c76ca454,2024-06-13T18:36:09.013000
|
||||
CVE-2024-5741,0,0,b15f10a28254188cb533f28bdc6de62f4cf75bad53d1465adcc506123fe667cc,2024-08-16T20:38:08.053000
|
||||
CVE-2024-5742,0,1,29ee7315b7ead029ac7c5775a79e1741e7e6a447f4deab7e5e12e43952f4a57d,2024-09-25T06:15:05.363000
|
||||
CVE-2024-5742,0,0,29ee7315b7ead029ac7c5775a79e1741e7e6a447f4deab7e5e12e43952f4a57d,2024-09-25T06:15:05.363000
|
||||
CVE-2024-5744,0,0,fa6836e3173f8cf048b3a987cfb64279b64d7f456da598f49d9aa4b85f5c51d9,2024-08-01T13:59:58.940000
|
||||
CVE-2024-5745,0,0,45e4cce1990a5332f3fc13a691f25e40551bee96d698b0361d8c0089ac80523d,2024-08-06T14:37:59.943000
|
||||
CVE-2024-5746,0,0,08e42433314420a93bea44176cf4cc0a169742251a575020722ab2e02c28ff80,2024-06-21T11:22:01.687000
|
||||
@ -262307,7 +262310,7 @@ CVE-2024-6835,0,0,41865b692717ae9a44a610e23697ffc045f0e55e3b334eff49e1f6de971307
|
||||
CVE-2024-6836,0,0,94c1bcaa18f7036265464de8eba36ccdaae9b63d5d20f60a8cc42904bb485160,2024-07-29T20:20:30.867000
|
||||
CVE-2024-6840,0,0,32a3665f80239333fecee34a11f4d8a5f93588e98d39b1a4bfaa2fe487feef20,2024-09-12T18:14:03.913000
|
||||
CVE-2024-6843,0,0,aec077e7d49dac8e1cb0382a7568b4a4d58cd66583979c6d1347903e4ac17bee,2024-08-21T15:35:12.407000
|
||||
CVE-2024-6845,1,1,846f92acda41d803b1f6b4567e4673ad2394a9b2ea9c32baa08e6e5737206935,2024-09-25T06:15:05.557000
|
||||
CVE-2024-6845,0,0,846f92acda41d803b1f6b4567e4673ad2394a9b2ea9c32baa08e6e5737206935,2024-09-25T06:15:05.557000
|
||||
CVE-2024-6846,0,0,3f14d31d382a54a260125fd51294d960031d5921ae608f837ae240e5738c3bfd,2024-09-05T14:35:26.730000
|
||||
CVE-2024-6847,0,0,3aed5f2ad75c2a50eaefca5c72002315f9d747456f8615efa188f54be39bf54d,2024-08-20T19:35:15.040000
|
||||
CVE-2024-6848,0,0,e171c12c58967922126feefb09977b436bb9e206684562a37899ca6ed3e35d20,2024-07-22T13:00:31.330000
|
||||
@ -263078,7 +263081,7 @@ CVE-2024-7868,0,0,c4ea1bb97a13baa8d231995b3d29c0db15f328b428d9b25a1a7a0b4c8b9c1d
|
||||
CVE-2024-7870,0,0,4141f264a23149fdea486ca620816f1c3f41138cabf6c23297e955fee3254fb2,2024-09-04T13:05:36.067000
|
||||
CVE-2024-7871,0,0,d47ede6ca23d1578a9b705a8257da890832c1e69392e6414a190c6fb054ce14f,2024-09-04T17:34:14.630000
|
||||
CVE-2024-7873,0,0,206d8282726d748a6a41b367b674a966213f9d6e3053dc261b740ef29ffe8ab7,2024-09-20T12:30:51.220000
|
||||
CVE-2024-7878,1,1,20dc5fff183301067d7146a62fbc140f558a87d1b834b6318a0d259ed1e32c2a,2024-09-25T06:15:05.650000
|
||||
CVE-2024-7878,0,0,20dc5fff183301067d7146a62fbc140f558a87d1b834b6318a0d259ed1e32c2a,2024-09-25T06:15:05.650000
|
||||
CVE-2024-7884,0,0,785c516d1dabe55fa31f7695706ba6a05f994a8f8d63c46081a0777ad4e173ab,2024-09-12T20:47:13.387000
|
||||
CVE-2024-7885,0,0,b180edc3f841635966345269d0abc3580da7735701efbdcde3f656f6bc9ddf46,2024-09-19T20:15:07.410000
|
||||
CVE-2024-7886,0,0,b8c1f856b8479c6982faa8a2fc4a6d8b2480e045b8b096d9bd3b8640a06eb6f3,2024-08-19T13:00:23.117000
|
||||
@ -263087,7 +263090,7 @@ CVE-2024-7888,0,0,2881b53b5410d8b7f634ff84d81ce7bcb024ba75858c366b9280d55d99841e
|
||||
CVE-2024-7889,0,0,67539a9ea3afa10e1ef371a140e40e7f2e32fcedee02ec133e59e6ef2a347260,2024-09-13T18:35:18.777000
|
||||
CVE-2024-7890,0,0,1dded06d7bba5f894e59f4fd824f843aaf6c5f24e5dfcfedb3ff09adc8671b20,2024-09-13T18:35:19.517000
|
||||
CVE-2024-7891,0,0,5aaf92f1216ccc2cb89b6db2b8f39b542c60dfffb3bd17a4a092f87d2244167e,2024-09-12T20:35:27.267000
|
||||
CVE-2024-7892,1,1,4dd7ca127ebacf65859c008201269ab73d798aad9f2eb52643437fcf8e8a1015,2024-09-25T06:15:05.720000
|
||||
CVE-2024-7892,0,0,4dd7ca127ebacf65859c008201269ab73d798aad9f2eb52643437fcf8e8a1015,2024-09-25T06:15:05.720000
|
||||
CVE-2024-7895,0,0,5d06451cedf9987fa35d6bed95786130c1c32b54d5cc7bebb800749e8d9738bd,2024-09-19T22:13:37.097000
|
||||
CVE-2024-7896,0,0,d80047a3d1d6cdcff2bc1adb680d3fdbda8db4b01c807c4a42d25c13d72803dc,2024-08-19T17:15:11.543000
|
||||
CVE-2024-7897,0,0,e1e6bea210133c6b9b950b4aecbbc6a33480bc30160d48b4fd9fe9919d3739ab,2024-08-19T17:15:11.650000
|
||||
@ -263277,6 +263280,7 @@ CVE-2024-8171,0,0,799233d1b504a7fe9d2115d4edb9b50fc766ecc29c803bfb00827a455960ad
|
||||
CVE-2024-8172,0,0,0f560f815e4f982c5fa8dce4e33b1159bf9bccf943a059983fd049dd30da680a,2024-08-27T16:01:35.047000
|
||||
CVE-2024-8173,0,0,50ae04f881a2d18920200f91fab2c91cb50ce1f1b838a9340ca053dbaf5dd83c,2024-09-05T18:39:00.950000
|
||||
CVE-2024-8174,0,0,8543f0d8f92ea7727c4605df4b165224a3b6d137f11ee710b81d48c311ac7b21,2024-08-27T14:32:08.607000
|
||||
CVE-2024-8175,1,1,c986260cebce641972845192f00cc354f8cdfa3d36943b2f027e6536d8655450,2024-09-25T08:15:04.727000
|
||||
CVE-2024-8178,0,0,ba572c1f8157c41d405fb002c7b6f163f2d56dcc78fed52d2bcc31657caf5604,2024-09-06T17:35:20.203000
|
||||
CVE-2024-8181,0,0,493690832b830d715024bac2c57cbeb9d316626844b43ee44a3d0839b5d01d36,2024-09-06T15:35:07.267000
|
||||
CVE-2024-8182,0,0,9ca161eed16086dd999c3dcdddb12be07c44a0882f46a0d2167122ca829615b9,2024-08-30T13:53:52.197000
|
||||
@ -263343,7 +263347,7 @@ CVE-2024-8281,0,0,6e64aec5696815efe009b246052ca974dfd6e9415a9b5d9826067281cc5ba1
|
||||
CVE-2024-8285,0,0,44d06284adb5d71c65e8f3277866d5d546f57dcd495152060c7216923cd6bd07,2024-09-03T12:59:02.453000
|
||||
CVE-2024-8287,0,0,a69e7cb2d3c0316abfeaff67da311f8b23d877ec163f8b4d2f35a96004b37bbb,2024-09-24T15:52:38.047000
|
||||
CVE-2024-8289,0,0,900bfbd861154484ed59254bdbec992d28a9742381ab830cf631e50b7fa985ab,2024-09-05T17:41:58.350000
|
||||
CVE-2024-8290,1,1,19e13d4b7f264bd7eba75fa2e21b27b97222ea3a6d204624184d74abd2f54da0,2024-09-25T07:15:03.663000
|
||||
CVE-2024-8290,0,0,19e13d4b7f264bd7eba75fa2e21b27b97222ea3a6d204624184d74abd2f54da0,2024-09-25T07:15:03.663000
|
||||
CVE-2024-8291,0,0,edb9f301f2c57e9bd0efecc98e397b6d6a58ff4938bc78048f5f6ca91ff36b9c,2024-09-25T01:15:46.193000
|
||||
CVE-2024-8292,0,0,ddba0ea03a741b8e444eb2158f82b5461df4d19adfc58fb2639bbcaaaadf6349,2024-09-12T12:37:18.380000
|
||||
CVE-2024-8294,0,0,76cafe7a1838d9cd0244706a299f12cd4ba69ef653952654db2fa070ca07bd0d,2024-08-30T15:38:13.437000
|
||||
@ -263541,7 +263545,7 @@ CVE-2024-8654,0,0,9ff4197fc4fa3acdeeaabf5d042cf9151def7011df3ee9c1e3c9b932ce4555
|
||||
CVE-2024-8655,0,0,ae8f7bc5241b7c169a5dccbcccc728c3b8a01d5ae62a1e846fce72d64496b2eb,2024-09-11T16:26:11.920000
|
||||
CVE-2024-8656,0,0,fc862011d1e771531d08fceed2dec553d3fda9d67ee9f88d486fa676eb49a82a,2024-09-13T14:06:04.777000
|
||||
CVE-2024-8657,0,0,a0c9190bdc2cff5290512f4637b68def1b96889903d32a46efeb60b6ec8d0b09,2024-09-24T02:15:03.937000
|
||||
CVE-2024-8658,1,1,06204177bb4a7af3778696973ba542cc2cefbf3c1b07867e6b255ad7ff0f87fa,2024-09-25T06:15:05.797000
|
||||
CVE-2024-8658,0,0,06204177bb4a7af3778696973ba542cc2cefbf3c1b07867e6b255ad7ff0f87fa,2024-09-25T06:15:05.797000
|
||||
CVE-2024-8660,0,0,e1cfacda5ac49937121e76566dcec30a46275de6b23ffe4cf313c4cb8bedeacf,2024-09-23T23:00:00.437000
|
||||
CVE-2024-8661,0,0,0afd1b1d511a5cb974c5ec483781301a64c5aef2b66e34c656ba899fea9e8652,2024-09-20T12:31:20.110000
|
||||
CVE-2024-8662,0,0,e073f824c2d6ac151923027c9c193587423576a62a0ff2f5ffd111c7dd804c8b,2024-09-24T02:15:04.150000
|
||||
@ -263551,7 +263555,7 @@ CVE-2024-8665,0,0,09ab15f5f9bd70753d6f594bff7ff364c9764fb90e308cd08c47d778b9a829
|
||||
CVE-2024-8668,0,0,91ff1d41497c8fe5539ce19af94cd77f2c79ba6939bdf5ab5b4a88053d8f6900,2024-09-25T05:15:11.737000
|
||||
CVE-2024-8669,0,0,d594b1491726b390fde9987d33067f88d20ddc09b39dc05c59acae4af25b456f,2024-09-14T11:47:14.677000
|
||||
CVE-2024-8671,0,0,62ddf8a392006e303dd1b5cc620c16dc0d781851818d6624bae72f0b8cec3f13,2024-09-24T03:15:03.243000
|
||||
CVE-2024-8678,1,1,11f3353aa9bfba7ab65aee668f1993d74a389a7ba9680a716d657e40c2bc3a5d,2024-09-25T07:15:03.907000
|
||||
CVE-2024-8678,0,0,11f3353aa9bfba7ab65aee668f1993d74a389a7ba9680a716d657e40c2bc3a5d,2024-09-25T07:15:03.907000
|
||||
CVE-2024-8680,0,0,b331324c2577289b77cd963c7051c5c6908a6bc3843fbe5a7cad425c09bae8a9,2024-09-21T09:15:02.590000
|
||||
CVE-2024-8686,0,0,ede88dcdbc0e792bd803e1f16895e5a739a1631453b49ef7e6a4fb82c32bd0dd,2024-09-12T12:35:54.013000
|
||||
CVE-2024-8687,0,0,113cfff3abfee2dabf4872656a1085a998928e6c5f0a4785deb63af7b2621db8,2024-09-12T12:35:54.013000
|
||||
@ -263643,7 +263647,7 @@ CVE-2024-8906,0,0,ecbada01a6801ef373b33913b64cf232d6cc7e8bab59419ce226940a8f0c44
|
||||
CVE-2024-8907,0,0,3d86966b7711318d0ab27de85fd6280ec2e537a37979cfd99531e9b10f8d74c8,2024-09-23T18:23:57.697000
|
||||
CVE-2024-8908,0,0,814a632e733410078b07e9411999ce68ca7ad8b9d3cd0621cbfe771be6322728,2024-09-23T17:59:14.137000
|
||||
CVE-2024-8909,0,0,164deeef11f6495a80d20f0aa7bd15b53f984d767860039b14665a9aa77c7c0d,2024-09-23T17:51:11.790000
|
||||
CVE-2024-8910,1,1,bfa86f9e34b65100b617217ddadfd7120fb73782b51917d32086f20137364ad3,2024-09-25T07:15:04.123000
|
||||
CVE-2024-8910,0,1,1d9bb504edd2ec7c82ce5e6387b9ed259f4be62fef0e235c60d2aab137743e43,2024-09-25T07:15:04.123000
|
||||
CVE-2024-8914,0,0,0c460286aa0fa62ee95590f8bc2ea804af76b453cfeaacb61390351c22348a61,2024-09-25T01:15:47.470000
|
||||
CVE-2024-8917,0,0,900aa54864b5bacc7b88862eba79cc3fb9814b6c67d8ffa86b924c43c36f021c,2024-09-25T01:15:47.687000
|
||||
CVE-2024-8919,0,0,f8b7d8a84b9be88728bff47f40a08f2381425d944e980309b16c80fd67c6c71b,2024-09-25T01:15:47.880000
|
||||
@ -263720,3 +263724,4 @@ CVE-2024-9123,0,0,172c86ced5df086b16e63a8a266a4c5ff3fe491725d35f3cb8541fcec31e93
|
||||
CVE-2024-9141,0,0,97f84a42cf7f2b9f57889b2bac4e897bf7424fe08455ac2a5757a2f7675a5b26,2024-09-25T01:15:48.980000
|
||||
CVE-2024-9142,0,0,b03e9d1b56d58ec574118dab2b1ce3d1ed2fc8b91f932eace62a06c5ffb66458,2024-09-25T01:37:10.240000
|
||||
CVE-2024-9148,0,0,476f188a7cb9a6ff6b5d6b29c0400e1d253afd3805ffb422b248b0b3633cd7e2,2024-09-25T01:15:49.297000
|
||||
CVE-2024-9169,1,1,11efc5d247d90b0a0b7c0eab6d7ad8f47a68de107cc97d56478c2303e3e912f4,2024-09-25T09:15:03.380000
|
||||
|
Can't render this file because it is too large.
|
Loading…
x
Reference in New Issue
Block a user