mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-07-11 16:13:34 +00:00
Auto-Update: 2024-06-24T10:00:19.191339+00:00
This commit is contained in:
parent
7c0d19dca7
commit
3483c6be07
36
CVE-2024/CVE-2024-245xx/CVE-2024-24554.json
Normal file
36
CVE-2024/CVE-2024-245xx/CVE-2024-24554.json
Normal file
@ -0,0 +1,36 @@
|
||||
{
|
||||
"id": "CVE-2024-24554",
|
||||
"sourceIdentifier": "vulnerability@ncsc.ch",
|
||||
"published": "2024-06-24T08:15:09.130",
|
||||
"lastModified": "2024-06-24T08:15:09.130",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Bludit uses predictable methods in combination with the MD5 hashing algorithm to generate sensitive tokens such as the API token and the user token. This allows attackers to authenticate against the Bludit API."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "vulnerability@ncsc.ch",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-287"
|
||||
},
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-338"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.redguard.ch/blog/2024/06/20/security-advisory-bludit/",
|
||||
"source": "vulnerability@ncsc.ch"
|
||||
}
|
||||
]
|
||||
}
|
36
CVE-2024/CVE-2024-271xx/CVE-2024-27136.json
Normal file
36
CVE-2024/CVE-2024-271xx/CVE-2024-27136.json
Normal file
@ -0,0 +1,36 @@
|
||||
{
|
||||
"id": "CVE-2024-27136",
|
||||
"sourceIdentifier": "security@apache.org",
|
||||
"published": "2024-06-24T08:15:09.297",
|
||||
"lastModified": "2024-06-24T08:15:09.297",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "XSS in Upload page in Apache JSPWiki 2.12.1 and priors allows the attacker to execute javascript in the victim's browser and get some sensitive information about the victim. Apache JSPWiki users should upgrade to 2.12.2 or later. "
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security@apache.org",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://jspwiki-wiki.apache.org/Wiki.jsp?page=CVE-2024-27136",
|
||||
"source": "security@apache.org"
|
||||
},
|
||||
{
|
||||
"url": "https://lists.apache.org/thread/gfms8gbncqqkj52p861b8fnsypwsl1d5",
|
||||
"source": "security@apache.org"
|
||||
}
|
||||
]
|
||||
}
|
36
CVE-2024/CVE-2024-364xx/CVE-2024-36495.json
Normal file
36
CVE-2024/CVE-2024-364xx/CVE-2024-36495.json
Normal file
@ -0,0 +1,36 @@
|
||||
{
|
||||
"id": "CVE-2024-36495",
|
||||
"sourceIdentifier": "551230f0-3615-47bd-b7cc-93e92e730bbf",
|
||||
"published": "2024-06-24T09:15:09.730",
|
||||
"lastModified": "2024-06-24T09:15:09.730",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "The application Faronics WINSelect (Standard + Enterprise)\u00a0saves its configuration in an encrypted file on the file system\u00a0which \"Everyone\" has read and write access to, path to file:\n\n\n\nC:\\ProgramData\\WINSelect\\WINSelect.wsd\n\nThe path for\u00a0the affected WINSelect Enterprise\u00a0configuration file is:\n\nC:\\ProgramData\\Faronics\\StorageSpace\\WS\\WINSelect.wsd"
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "551230f0-3615-47bd-b7cc-93e92e730bbf",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-276"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://r.sec-consult.com/winselect",
|
||||
"source": "551230f0-3615-47bd-b7cc-93e92e730bbf"
|
||||
},
|
||||
{
|
||||
"url": "https://www.faronics.com/en-uk/document-library/document/winselect-standard-release-notes",
|
||||
"source": "551230f0-3615-47bd-b7cc-93e92e730bbf"
|
||||
}
|
||||
]
|
||||
}
|
36
CVE-2024/CVE-2024-364xx/CVE-2024-36496.json
Normal file
36
CVE-2024/CVE-2024-364xx/CVE-2024-36496.json
Normal file
@ -0,0 +1,36 @@
|
||||
{
|
||||
"id": "CVE-2024-36496",
|
||||
"sourceIdentifier": "551230f0-3615-47bd-b7cc-93e92e730bbf",
|
||||
"published": "2024-06-24T09:15:09.860",
|
||||
"lastModified": "2024-06-24T09:15:09.860",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "The configuration file is encrypted with a static key derived from a \nstatic five-character password which allows an attacker to decrypt this \nfile.\u00a0The application hashes this five-character password with \nthe outdated and broken MD5 algorithm (no salt) and uses the first five \nbytes as the key for RC4. The configuration file is then encrypted with \nthese parameters."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "551230f0-3615-47bd-b7cc-93e92e730bbf",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-798"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://r.sec-consult.com/winselect",
|
||||
"source": "551230f0-3615-47bd-b7cc-93e92e730bbf"
|
||||
},
|
||||
{
|
||||
"url": "https://www.faronics.com/en-uk/document-library/document/winselect-standard-release-notes",
|
||||
"source": "551230f0-3615-47bd-b7cc-93e92e730bbf"
|
||||
}
|
||||
]
|
||||
}
|
36
CVE-2024/CVE-2024-364xx/CVE-2024-36497.json
Normal file
36
CVE-2024/CVE-2024-364xx/CVE-2024-36497.json
Normal file
@ -0,0 +1,36 @@
|
||||
{
|
||||
"id": "CVE-2024-36497",
|
||||
"sourceIdentifier": "551230f0-3615-47bd-b7cc-93e92e730bbf",
|
||||
"published": "2024-06-24T09:15:09.973",
|
||||
"lastModified": "2024-06-24T09:15:09.973",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "The decrypted configuration file contains the password in cleartext \nwhich is used to configure WINSelect. It can be used to remove the \nexisting restrictions and disable WINSelect entirely."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "551230f0-3615-47bd-b7cc-93e92e730bbf",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-312"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://r.sec-consult.com/winselect",
|
||||
"source": "551230f0-3615-47bd-b7cc-93e92e730bbf"
|
||||
},
|
||||
{
|
||||
"url": "https://www.faronics.com/en-uk/document-library/document/winselect-standard-release-notes",
|
||||
"source": "551230f0-3615-47bd-b7cc-93e92e730bbf"
|
||||
}
|
||||
]
|
||||
}
|
55
CVE-2024/CVE-2024-47xx/CVE-2024-4754.json
Normal file
55
CVE-2024/CVE-2024-47xx/CVE-2024-4754.json
Normal file
@ -0,0 +1,55 @@
|
||||
{
|
||||
"id": "CVE-2024-4754",
|
||||
"sourceIdentifier": "iletisim@usom.gov.tr",
|
||||
"published": "2024-06-24T09:15:10.083",
|
||||
"lastModified": "2024-06-24T09:15:10.083",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Next4Biz CRM & BPM Software Business Process Manangement (BPM) allows Stored XSS.This issue affects Business Process Manangement (BPM): from 6.6.4.4 before 6.6.4.5."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "iletisim@usom.gov.tr",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 5.4,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.3,
|
||||
"impactScore": 2.7
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "iletisim@usom.gov.tr",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.usom.gov.tr/bildirim/tr-24-0739",
|
||||
"source": "iletisim@usom.gov.tr"
|
||||
}
|
||||
]
|
||||
}
|
55
CVE-2024/CVE-2024-56xx/CVE-2024-5683.json
Normal file
55
CVE-2024/CVE-2024-56xx/CVE-2024-5683.json
Normal file
@ -0,0 +1,55 @@
|
||||
{
|
||||
"id": "CVE-2024-5683",
|
||||
"sourceIdentifier": "iletisim@usom.gov.tr",
|
||||
"published": "2024-06-24T09:15:10.347",
|
||||
"lastModified": "2024-06-24T09:15:10.347",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Improper Control of Generation of Code ('Code Injection') vulnerability in Next4Biz CRM & BPM Software Business Process Manangement (BPM) allows Remote Code Inclusion.This issue affects Business Process Manangement (BPM): from 6.6.4.4 before 6.6.4.5."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "iletisim@usom.gov.tr",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "iletisim@usom.gov.tr",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-94"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.usom.gov.tr/bildirim/tr-24-0739",
|
||||
"source": "iletisim@usom.gov.tr"
|
||||
}
|
||||
]
|
||||
}
|
25
README.md
25
README.md
@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours.
|
||||
### Last Repository Update
|
||||
|
||||
```plain
|
||||
2024-06-24T08:00:20.056472+00:00
|
||||
2024-06-24T10:00:19.191339+00:00
|
||||
```
|
||||
|
||||
### Most recent CVE Modification Timestamp synchronized with NVD
|
||||
|
||||
```plain
|
||||
2024-06-24T07:15:15.400000+00:00
|
||||
2024-06-24T09:15:10.347000+00:00
|
||||
```
|
||||
|
||||
### Last Data Feed Release
|
||||
@ -33,29 +33,26 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
|
||||
### Total Number of included CVEs
|
||||
|
||||
```plain
|
||||
254978
|
||||
254985
|
||||
```
|
||||
|
||||
### CVEs added in the last Commit
|
||||
|
||||
Recently added CVEs: `7`
|
||||
|
||||
- [CVE-2024-24550](CVE-2024/CVE-2024-245xx/CVE-2024-24550.json) (`2024-06-24T07:15:13.580`)
|
||||
- [CVE-2024-24551](CVE-2024/CVE-2024-245xx/CVE-2024-24551.json) (`2024-06-24T07:15:14.760`)
|
||||
- [CVE-2024-24552](CVE-2024/CVE-2024-245xx/CVE-2024-24552.json) (`2024-06-24T07:15:14.903`)
|
||||
- [CVE-2024-24553](CVE-2024/CVE-2024-245xx/CVE-2024-24553.json) (`2024-06-24T07:15:15.063`)
|
||||
- [CVE-2024-4460](CVE-2024/CVE-2024-44xx/CVE-2024-4460.json) (`2024-06-24T07:15:15.400`)
|
||||
- [CVE-2024-4899](CVE-2024/CVE-2024-48xx/CVE-2024-4899.json) (`2024-06-24T06:15:11.307`)
|
||||
- [CVE-2024-4900](CVE-2024/CVE-2024-49xx/CVE-2024-4900.json) (`2024-06-24T06:15:11.423`)
|
||||
- [CVE-2024-24554](CVE-2024/CVE-2024-245xx/CVE-2024-24554.json) (`2024-06-24T08:15:09.130`)
|
||||
- [CVE-2024-27136](CVE-2024/CVE-2024-271xx/CVE-2024-27136.json) (`2024-06-24T08:15:09.297`)
|
||||
- [CVE-2024-36495](CVE-2024/CVE-2024-364xx/CVE-2024-36495.json) (`2024-06-24T09:15:09.730`)
|
||||
- [CVE-2024-36496](CVE-2024/CVE-2024-364xx/CVE-2024-36496.json) (`2024-06-24T09:15:09.860`)
|
||||
- [CVE-2024-36497](CVE-2024/CVE-2024-364xx/CVE-2024-36497.json) (`2024-06-24T09:15:09.973`)
|
||||
- [CVE-2024-4754](CVE-2024/CVE-2024-47xx/CVE-2024-4754.json) (`2024-06-24T09:15:10.083`)
|
||||
- [CVE-2024-5683](CVE-2024/CVE-2024-56xx/CVE-2024-5683.json) (`2024-06-24T09:15:10.347`)
|
||||
|
||||
|
||||
### CVEs modified in the last Commit
|
||||
|
||||
Recently modified CVEs: `3`
|
||||
Recently modified CVEs: `0`
|
||||
|
||||
- [CVE-2023-6717](CVE-2023/CVE-2023-67xx/CVE-2023-6717.json) (`2024-06-24T06:15:09.583`)
|
||||
- [CVE-2024-1249](CVE-2024/CVE-2024-12xx/CVE-2024-1249.json) (`2024-06-24T06:15:11.003`)
|
||||
- [CVE-2024-36039](CVE-2024/CVE-2024-360xx/CVE-2024-36039.json) (`2024-06-24T07:15:15.230`)
|
||||
|
||||
|
||||
## Download and Usage
|
||||
|
27
_state.csv
27
_state.csv
@ -240087,7 +240087,7 @@ CVE-2023-6709,0,0,91ad521595673e9f900cc67b519ceef81e072d2cde6bd61134ff43d941e150
|
||||
CVE-2023-6710,0,0,7df36087474cce4074d57a080e5b75e846cab8eb5c4d56f0270c9beb2e3b0c26,2024-04-30T15:15:51.830000
|
||||
CVE-2023-6711,0,0,7a2eb3c274b677bcba17d5ab9921e7d5efec59f2beceb07847c731e8f6f8d903,2023-12-28T19:03:00.580000
|
||||
CVE-2023-6716,0,0,c5de23f942df1b587dad5bba434231319fdb9bc5ad23f5fda3137bdc12dd0a5f,2024-02-09T09:15:07.733000
|
||||
CVE-2023-6717,0,1,84143260b196907a551a406ce3133660a1ad741a565d3ee7e01f42ef855cbed0,2024-06-24T06:15:09.583000
|
||||
CVE-2023-6717,0,0,84143260b196907a551a406ce3133660a1ad741a565d3ee7e01f42ef855cbed0,2024-06-24T06:15:09.583000
|
||||
CVE-2023-6718,0,0,800326da020c67b5d16628e725304c35ffe57eb2871b679e54fec620b82938a2,2023-12-18T17:39:26.267000
|
||||
CVE-2023-6719,0,0,9d5dfad7b583b5ed71fda0877cd09b5d62ce26e2849f2a049357d7ee8d8ecdd4,2023-12-18T17:47:32.683000
|
||||
CVE-2023-6720,0,0,f92ecd0810e967fb2e290113359252cc0605767095d771035373bf698cc8ef63,2023-12-18T17:45:01.760000
|
||||
@ -241652,7 +241652,7 @@ CVE-2024-1242,0,0,ab4609d5893ed1ea66780779f1561665f88460dbdd62166f0432c338817451
|
||||
CVE-2024-1245,0,0,2e59378dab8a209b430a7bdf5dfa1ad37455bcba638f93f331bd6727be23a3f7,2024-02-15T04:44:27.987000
|
||||
CVE-2024-1246,0,0,668589ae819ff5835ff63858d61771ccdb54522dbf26239874e373ac001fe82c,2024-02-15T04:44:35.470000
|
||||
CVE-2024-1247,0,0,d39a629b37989766f473ff2aa098b819b99d2eb0f46ccf8261583eb7cfd54a81,2024-02-15T04:44:09.247000
|
||||
CVE-2024-1249,0,1,847eaf53434670e8e019445f7013e888aa79532b81be99562bac29f8f799823e,2024-06-24T06:15:11.003000
|
||||
CVE-2024-1249,0,0,847eaf53434670e8e019445f7013e888aa79532b81be99562bac29f8f799823e,2024-06-24T06:15:11.003000
|
||||
CVE-2024-1250,0,0,c9d8d459d75d0bfd93b835d1e62d6c7194eb57b11f119ade2060b6de2e647ca2,2024-03-04T20:57:39.907000
|
||||
CVE-2024-1251,0,0,5b6e83bdc47c8bf4f65d149df87915f66b9d8eea52c301d327c778eef0db4e5f,2024-05-17T02:35:20.240000
|
||||
CVE-2024-1252,0,0,74b960b0ab15aa03589dc3ce947cc748cae4b809a0bb17c204e3538cbb14f3a5,2024-05-17T02:35:20.353000
|
||||
@ -244964,10 +244964,11 @@ CVE-2024-2454,0,0,0b9f095d4355e2ae908fadafa529487790a4decf8d55ba7b4076087a413392
|
||||
CVE-2024-24543,0,0,f516e88d85199344e1e2c4ae69468b4de7248951f71da4710fc97171a286ff1a,2024-02-14T17:13:32.827000
|
||||
CVE-2024-24548,0,0,9dbe1af5af4a9b865bf88b2a305b739ac231a7ce95c9c8ed04344b3144708c91,2024-02-08T18:53:14.107000
|
||||
CVE-2024-24549,0,0,7307c54c0ee6a9a65247489e8d526cb2c7b7a14f1ca835929ecd7a55bbe78415,2024-06-23T09:15:11.213000
|
||||
CVE-2024-24550,1,1,91ed89072f346ece3378c3b8cc26e70db4dac38421f3f5215f3d25a61fe9e993,2024-06-24T07:15:13.580000
|
||||
CVE-2024-24551,1,1,2b898e8e8b496b4e3e19967665dd0e050a5aaa08f0403143650c93ddecb810c3,2024-06-24T07:15:14.760000
|
||||
CVE-2024-24552,1,1,2ca568287ff7a4646bbdcecd6ec42745f8c73fcda46c19750af4c579ffbcbc5d,2024-06-24T07:15:14.903000
|
||||
CVE-2024-24553,1,1,bea459affabde308db7a87d6a1bd3fb504d4d4f3eafcb8f0a0083fee19b95ab9,2024-06-24T07:15:15.063000
|
||||
CVE-2024-24550,0,0,91ed89072f346ece3378c3b8cc26e70db4dac38421f3f5215f3d25a61fe9e993,2024-06-24T07:15:13.580000
|
||||
CVE-2024-24551,0,0,2b898e8e8b496b4e3e19967665dd0e050a5aaa08f0403143650c93ddecb810c3,2024-06-24T07:15:14.760000
|
||||
CVE-2024-24552,0,0,2ca568287ff7a4646bbdcecd6ec42745f8c73fcda46c19750af4c579ffbcbc5d,2024-06-24T07:15:14.903000
|
||||
CVE-2024-24553,0,0,bea459affabde308db7a87d6a1bd3fb504d4d4f3eafcb8f0a0083fee19b95ab9,2024-06-24T07:15:15.063000
|
||||
CVE-2024-24554,1,1,8a71f884ece483692fc8315e1bda1ef879a5a27b3892cd9444f8ec53bc820e6d,2024-06-24T08:15:09.130000
|
||||
CVE-2024-24556,0,0,5eadc80f5e2b4d40f2247a29eb7c2aa8b2d9f2f191f8cfe4f491f2d184a6cbe7,2024-02-06T19:24:46.810000
|
||||
CVE-2024-24557,0,0,803986686a1d77830cb33582e01547bf1b4ed013f71e8dbf2a84322efe6db933,2024-02-09T20:21:32.970000
|
||||
CVE-2024-24558,0,0,26ffac7b2f9dc8041f02bc6fb374f1f9b0b06e69d8b3e191802aa68af28d0bbc,2024-04-23T19:52:49.107000
|
||||
@ -246880,6 +246881,7 @@ CVE-2024-27130,0,0,387d6d6bd78861e8f479c2855dcd6ca0a6b290bc9bab5fadd88ddb47cbcf6
|
||||
CVE-2024-27132,0,0,0d4a858300081e7b1734f10a34971409f661ea8e5d10f439041910c3efb6a17b,2024-02-26T13:42:22.567000
|
||||
CVE-2024-27133,0,0,1ea41b494ad0a5106ea020fe3275dce436a1bf62da11c275e95a71856ace701b,2024-02-26T13:42:22.567000
|
||||
CVE-2024-27135,0,0,c0b7364866f5910220db1f3515d91e63f085beb1f854242bc27d0a872c26bbb9,2024-05-01T17:15:30.087000
|
||||
CVE-2024-27136,1,1,ba5122bff8d11f89f413f3a3c07e0fd16f5fda04ad923cfc74647c43821a4f5c,2024-06-24T08:15:09.297000
|
||||
CVE-2024-27138,0,0,b099a37bd6bd06771ccd0d4a605b41ff72cf31165d4c7c0ea37d0b28b310e949,2024-05-17T02:37:25.107000
|
||||
CVE-2024-27139,0,0,5e7888e89d482e3e5f40cfdc640fb4169d86933380e96bafbb3178e764d3924e,2024-05-17T02:37:25.190000
|
||||
CVE-2024-2714,0,0,14f40cd4bfa53feeb5e4acf18b5d2b179b0ad5429d8ebda8d963bedfd21bc4c2,2024-05-17T02:38:26.850000
|
||||
@ -252439,7 +252441,7 @@ CVE-2024-36032,0,0,5a12487bf2cb4627b147414b9dd50756c55a274ce8d6f1678519c36adada0
|
||||
CVE-2024-36033,0,0,761ce8e91fd8ec725f5fd70906c3e8b3e4ae739a30faa4a1ecc4c7502a89a5b5,2024-05-30T18:19:11.743000
|
||||
CVE-2024-36036,0,0,399529c38d111e737eeb859298f0b12af936846a2a63555a4e1fd24103a1ae63,2024-05-28T12:39:28.377000
|
||||
CVE-2024-36037,0,0,e8ddc31f39a62a0d6f93584a2886b907bf85fcebcdd4d47a54b701feefb8d09a,2024-05-31T11:15:09.563000
|
||||
CVE-2024-36039,0,1,2459d11347af42cb829e5007b01f06e3d0aed0906f508ec72619f858b8aa6d3e,2024-06-24T07:15:15.230000
|
||||
CVE-2024-36039,0,0,2459d11347af42cb829e5007b01f06e3d0aed0906f508ec72619f858b8aa6d3e,2024-06-24T07:15:15.230000
|
||||
CVE-2024-36042,0,0,2ba301066fcf3b5e2098ddfbb2759b29cc55ab5a805cf9edc9ebe22e6b436ca1,2024-06-03T14:46:24.250000
|
||||
CVE-2024-36043,0,0,a692d077d358c1feb0a509deb9a8e16caf647bf207b7ab7a4cd103038bbab39e,2024-05-20T13:00:04.957000
|
||||
CVE-2024-36048,0,0,28009f5c9c89d66914a954a3622c5cc8d7b761845f43a58d1b9db13955c9fa8c,2024-06-10T17:16:32.167000
|
||||
@ -252704,6 +252706,9 @@ CVE-2024-36481,0,0,289e7e75bda9b051d0f16493c3f7ea721a35d329796879f3ae868bd0ce7af
|
||||
CVE-2024-36484,0,0,d8980b6175f97dcbe3120732bdd3f5c4554f0bf6402d98cdd4a7efe1e2dc7659,2024-06-21T11:22:01.687000
|
||||
CVE-2024-36489,0,0,706602251538409bdd6d4f26c7d5b5f5da3d2d56202958896118ef2720f4e680,2024-06-21T11:22:01.687000
|
||||
CVE-2024-3649,0,0,969867829e20da4acc88ade671a27808c021dddbe3e27e051d2004e683670e61,2024-05-02T18:00:37.360000
|
||||
CVE-2024-36495,1,1,6ed534b3914581c2d718a5af5dab95525c5ee99a2e37b7b16e42963dac7da249,2024-06-24T09:15:09.730000
|
||||
CVE-2024-36496,1,1,5d4f653e98532d8e3c120ed293c6b23c3e6c972681112b087748cf948d242561,2024-06-24T09:15:09.860000
|
||||
CVE-2024-36497,1,1,5127841a489d1ab5caa3b0be5e2e28ad3a89ddbad5090d1bb055835bd029c09b,2024-06-24T09:15:09.973000
|
||||
CVE-2024-36499,0,0,077c5caf8d301ff2d1947e18a01670bc02e5c0dd9fda48352816e5be2251d0eb,2024-06-17T12:42:04.623000
|
||||
CVE-2024-3650,0,0,e078ac649d7d0d133fe9598e10336739bc9d365236ed72d408805e3868c3d439,2024-05-02T18:00:37.360000
|
||||
CVE-2024-36500,0,0,257fd399a14a7141c50c9e2046f94aaac781c0de172f7af5b46d8dab39ba2a83,2024-06-17T12:42:04.623000
|
||||
@ -253899,7 +253904,7 @@ CVE-2024-4455,0,0,e18738afbef678c84ea567282093c6582d8247bf14c57fe724fa93ee096ec5
|
||||
CVE-2024-4456,0,0,43bdd543de001702ca45614b4a3579c52bfa7b188e5cb3e6b81f25f610f74e45,2024-05-08T13:15:00.690000
|
||||
CVE-2024-4458,0,0,78210a24e5c56842073afd1809a4bb2418e02424d7be783c86e219719dd0857b,2024-06-06T14:17:35.017000
|
||||
CVE-2024-4459,0,0,a416ba14244e130e353615c3d33f61a53ec702533b4ddc327eb1ed858a6b026e,2024-06-06T14:17:35.017000
|
||||
CVE-2024-4460,1,1,692325c73f255a435715fd2d0e6353ae382a2eebcce50fd182f3ae121f35b4b0,2024-06-24T07:15:15.400000
|
||||
CVE-2024-4460,0,0,692325c73f255a435715fd2d0e6353ae382a2eebcce50fd182f3ae121f35b4b0,2024-06-24T07:15:15.400000
|
||||
CVE-2024-4461,0,0,ad05f4e37257e33f27f784f842f8dfa34f685ff06dd273bc6842a04c51c93bf6,2024-05-03T12:48:41.067000
|
||||
CVE-2024-4462,0,0,c8f7490df4b9ef7118fdef5b7ade6db6ae196f6576f8cec5720233f982c7a0b4,2024-06-04T16:57:41.053000
|
||||
CVE-2024-4463,0,0,aaa5b32073fcbc7160927d348961b4790302ca7b8c414e16cdb6cacefbfd98b3,2024-05-14T16:11:39.510000
|
||||
@ -254138,6 +254143,7 @@ CVE-2024-4747,0,0,99152f6494a1192f3bae59b436abcc51d11f811ed1e0a72c2e65c8381fda60
|
||||
CVE-2024-4749,0,0,676e331864bc41907c4c80c44886e7dac480ef6dea2c29bc22838d992753d4da,2024-06-04T16:57:41.053000
|
||||
CVE-2024-4750,0,0,423585a3e250903ac62d761ecb0e0e6dc6b4649ccd4411b90275a4e6d2f87495,2024-06-04T16:57:41.053000
|
||||
CVE-2024-4751,0,0,980cee331660133759599aaa98eeae384de48fe7bcc98af4a2333b20d054b0b6,2024-06-17T12:42:04.623000
|
||||
CVE-2024-4754,1,1,cfd9e5babf41a7c2c5cd02f9b538bb66bc8b2969c9bce4d32f39c788fb710059,2024-06-24T09:15:10.083000
|
||||
CVE-2024-4755,0,0,60cecdfed0bd43adc43dc2d247a1ee989fd3070ddc34fbd20a182a68e206cadc,2024-06-21T11:22:01.687000
|
||||
CVE-2024-4756,0,0,b303493fc627eee25a3b39c986ea25472e7aab1866612b83c9a7c14522d2c360,2024-06-07T14:56:05.647000
|
||||
CVE-2024-4760,0,0,8b9593f0d88cbd24a061db082c8cd5c20f19b8a61431542d1ce576639ef3bdc0,2024-05-16T15:44:44.683000
|
||||
@ -254239,8 +254245,8 @@ CVE-2024-4894,0,0,d68130303d356c053d0f6768d0ee08506e206d16216142c952b9b56af8835d
|
||||
CVE-2024-4895,0,0,be42ef886a64c01ec9437b4cfbce4dfdf0b902fbee0c6083bfc71de776f15b0e,2024-05-24T01:15:30.977000
|
||||
CVE-2024-4896,0,0,6456cc9b22aff68532bfeeb7637d5235216630d84771d1ec52d84fa467e4b7a6,2024-05-22T12:46:53.887000
|
||||
CVE-2024-4898,0,0,4ea5d2aea02f0385cebab454e7d6b2e480bf3eab8470b7157c155067bed66344,2024-06-13T18:36:09.010000
|
||||
CVE-2024-4899,1,1,53aea92e37c47aa080fa9a0cdd6aa6f050c2abee652916c55aee5472b43c983e,2024-06-24T06:15:11.307000
|
||||
CVE-2024-4900,1,1,ea095ae8914b51f2213c123745cc5b860bd97ecf322a46092d331b725b842323,2024-06-24T06:15:11.423000
|
||||
CVE-2024-4899,0,0,53aea92e37c47aa080fa9a0cdd6aa6f050c2abee652916c55aee5472b43c983e,2024-06-24T06:15:11.307000
|
||||
CVE-2024-4900,0,0,ea095ae8914b51f2213c123745cc5b860bd97ecf322a46092d331b725b842323,2024-06-24T06:15:11.423000
|
||||
CVE-2024-4902,0,0,190ae6556b466a5228ce6680f8d8f4ba4789cfafa6765b2e868dc7feb28ee1e3,2024-06-07T14:56:05.647000
|
||||
CVE-2024-4903,0,0,74f6793baa838082db19325ded8d53157feab60a90892d7bb13ebdea205ed94c,2024-06-07T20:15:11.967000
|
||||
CVE-2024-4904,0,0,44558a4b32290e2f940be10d0a83b859aa6fae2c01ef1c881d37a435bb46f91d,2024-06-04T19:20:52.380000
|
||||
@ -254742,6 +254748,7 @@ CVE-2024-5673,0,0,f6db27a8b7c99bb0a58922425d96edcb461eeb527f78adfd8d9aed9c993301
|
||||
CVE-2024-5674,0,0,69b0f5cdcc6414c1b3093ac76e322fc42e17eb869b8f1b328084f458395232cf,2024-06-13T18:36:09.010000
|
||||
CVE-2024-5675,0,0,c04fc1bf8ef6e3f232c30ddf0bd6a524958c9eab63fe205331e1fedef14ccf13,2024-06-11T18:14:02.017000
|
||||
CVE-2024-5676,0,0,7110ec4f1d7a030c3f52d0d64b45a1f2c788bd0c12290f7487a0ece147b33240,2024-06-24T05:15:09.600000
|
||||
CVE-2024-5683,1,1,776b3afe6ce973fb91d46fd6db99fba176ff636e37c3bc0bd205640173c41437,2024-06-24T09:15:10.347000
|
||||
CVE-2024-5684,0,0,e183f6f3c944efddc1281bf86b4d20b3677f4c3ab127fc0c8f4bc522f6d9ba19,2024-06-11T18:13:30.163000
|
||||
CVE-2024-5685,0,0,e8364a4460a12edf9e3cf94a37b74977806b751958607c5dfe543a64e3c22871,2024-06-19T09:15:12.173000
|
||||
CVE-2024-5686,0,0,5baef36d265e76c8a185391151bfaa15c3d3a21cf5116dcf4f0b4cb376e1e9d1,2024-06-20T12:43:25.663000
|
||||
|
Can't render this file because it is too large.
|
Loading…
x
Reference in New Issue
Block a user