mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-05-08 19:47:09 +00:00
Auto-Update: 2024-06-25T02:00:17.609643+00:00
This commit is contained in:
parent
dd1322e10b
commit
4420b9938d
@ -2,12 +2,12 @@
|
||||
"id": "CVE-2024-23122",
|
||||
"sourceIdentifier": "psirt@autodesk.com",
|
||||
"published": "2024-02-22T02:15:49.363",
|
||||
"lastModified": "2024-03-13T03:15:06.390",
|
||||
"lastModified": "2024-06-25T01:15:49.807",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A maliciously crafted 3DM file in opennurbs.dll when parsed through Autodesk AutoCAD can force an Out-of-Bound Write. A malicious actor can leverage this vulnerability to cause a crash, write sensitive data, or execute arbitrary code in the context of the current process.\n"
|
||||
"value": "A maliciously crafted 3DM file, when parsed in opennurbs.dll through Autodesk applications, can force an Out-of-Bound Write. A malicious actor can leverage this vulnerability to cause a crash, read sensitive data, or execute arbitrary code in the context of the current process."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
@ -35,6 +35,10 @@
|
||||
{
|
||||
"url": "https://www.autodesk.com/trust/security-advisories/adsk-sa-2024-0004",
|
||||
"source": "psirt@autodesk.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.autodesk.com/trust/security-advisories/adsk-sa-2024-0009",
|
||||
"source": "psirt@autodesk.com"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,12 +2,12 @@
|
||||
"id": "CVE-2024-23123",
|
||||
"sourceIdentifier": "psirt@autodesk.com",
|
||||
"published": "2024-02-22T02:15:49.433",
|
||||
"lastModified": "2024-03-13T03:15:06.443",
|
||||
"lastModified": "2024-06-25T01:15:49.923",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A maliciously crafted CATPART file in CC5Dll.dll or ASMBASE228A.dll when parsed through Autodesk AutoCAD can force an Out-of-Bound Write. A malicious actor can leverage this vulnerability to cause a crash, write sensitive data, or execute arbitrary code in the context of the current process.\n"
|
||||
"value": "A maliciously crafted CATPART file, when parsed in CC5Dll.dll and ASMBASE228A.dll through Autodesk applications, can force an Out-of-Bound Write. A malicious actor can leverage this vulnerability to cause a crash, read sensitive data, or execute arbitrary code in the context of the current process."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
@ -35,6 +35,10 @@
|
||||
{
|
||||
"url": "https://www.autodesk.com/trust/security-advisories/adsk-sa-2024-0004",
|
||||
"source": "psirt@autodesk.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.autodesk.com/trust/security-advisories/adsk-sa-2024-0009",
|
||||
"source": "psirt@autodesk.com"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,12 +2,12 @@
|
||||
"id": "CVE-2024-23127",
|
||||
"sourceIdentifier": "psirt@autodesk.com",
|
||||
"published": "2024-02-22T03:15:08.233",
|
||||
"lastModified": "2024-03-18T00:15:07.040",
|
||||
"lastModified": "2024-06-25T01:15:49.990",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A maliciously crafted MODEL, SLDPRT or SLDASM file in VCRUNTIME140.dll when parsed through Autodesk AutoCAD can be used to cause a Heap-based Overflow. A malicious actor can leverage this vulnerability to cause a crash, read sensitive data, or execute arbitrary code in the context of the current process.\n"
|
||||
"value": "A maliciously crafted MODEL, SLDPRT, or SLDASM file, when parsed in ODXSW_DLL.dll and libodxdll.dll through Autodesk applications, can be used to cause a Heap-based Overflow. A malicious actor can leverage this vulnerability to cause a crash, read sensitive data, or execute arbitrary code in the context of the current process."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
@ -35,6 +35,10 @@
|
||||
{
|
||||
"url": "https://www.autodesk.com/trust/security-advisories/adsk-sa-2024-0004",
|
||||
"source": "psirt@autodesk.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.autodesk.com/trust/security-advisories/adsk-sa-2024-0009",
|
||||
"source": "psirt@autodesk.com"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,12 +2,12 @@
|
||||
"id": "CVE-2024-23128",
|
||||
"sourceIdentifier": "psirt@autodesk.com",
|
||||
"published": "2024-02-22T04:15:08.590",
|
||||
"lastModified": "2024-03-18T00:15:07.093",
|
||||
"lastModified": "2024-06-25T01:15:50.063",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A maliciously crafted MODEL file in libodxdll.dll when parsed through Autodesk AutoCAD could lead to a memory corruption vulnerability by write access violation. This vulnerability in conjunction with other vulnerabilities could lead to code execution in the context of the current process.\n"
|
||||
"value": "A maliciously crafted MODEL file, when parsed in libodxdll.dll and ASMDATAX229A.dll through Autodesk applications, can lead to a memory corruption vulnerability by write access violation. This vulnerability, in conjunction with other vulnerabilities, can lead to code execution in the context of the current process."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
@ -35,6 +35,10 @@
|
||||
{
|
||||
"url": "https://www.autodesk.com/trust/security-advisories/adsk-sa-2024-0004",
|
||||
"source": "psirt@autodesk.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.autodesk.com/trust/security-advisories/adsk-sa-2024-0009",
|
||||
"source": "psirt@autodesk.com"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,12 +2,12 @@
|
||||
"id": "CVE-2024-23129",
|
||||
"sourceIdentifier": "psirt@autodesk.com",
|
||||
"published": "2024-02-22T04:15:08.667",
|
||||
"lastModified": "2024-03-18T00:15:07.147",
|
||||
"lastModified": "2024-06-25T01:15:50.137",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A maliciously crafted MODEL 3DM, STP or SLDASM files in opennurbs.dll when parsed through Autodesk AutoCAD could lead to a memory corruption vulnerability by write access violation. This vulnerability in conjunction with other vulnerabilities could lead to code execution in the context of the current process.\n"
|
||||
"value": "A maliciously crafted MODEL 3DM, STP, or SLDASM file, when in opennurbs.dll parsed through Autodesk applications, can lead to a memory corruption vulnerability by write access violation. This vulnerability, in conjunction with other vulnerabilities, can lead to code execution in the context of the current process."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
@ -35,6 +35,10 @@
|
||||
{
|
||||
"url": "https://www.autodesk.com/trust/security-advisories/adsk-sa-2024-0004",
|
||||
"source": "psirt@autodesk.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.autodesk.com/trust/security-advisories/adsk-sa-2024-0009",
|
||||
"source": "psirt@autodesk.com"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,12 +2,12 @@
|
||||
"id": "CVE-2024-23130",
|
||||
"sourceIdentifier": "psirt@autodesk.com",
|
||||
"published": "2024-02-22T04:15:08.737",
|
||||
"lastModified": "2024-03-18T00:15:07.200",
|
||||
"lastModified": "2024-06-25T01:15:50.197",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A maliciously crafted SLDASM, or SLDPRT files in ODXSW_DLL.dll when parsed through Autodesk AutoCAD could lead to a memory corruption vulnerability by write access violation. This vulnerability in conjunction with other vulnerabilities could lead to code execution in the context of the current process.\n"
|
||||
"value": "A maliciously crafted SLDASM or SLDPRT file, when parsed in ODXSW_DLL.dll through Autodesk applications, can lead to a memory corruption vulnerability by write access violation. This vulnerability, in conjunction with other vulnerabilities, can lead to code execution in the context of the current process."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
@ -35,6 +35,10 @@
|
||||
{
|
||||
"url": "https://www.autodesk.com/trust/security-advisories/adsk-sa-2024-0004",
|
||||
"source": "psirt@autodesk.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.autodesk.com/trust/security-advisories/adsk-sa-2024-0009",
|
||||
"source": "psirt@autodesk.com"
|
||||
}
|
||||
]
|
||||
}
|
31
README.md
31
README.md
@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours.
|
||||
### Last Repository Update
|
||||
|
||||
```plain
|
||||
2024-06-24T23:55:17.991074+00:00
|
||||
2024-06-25T02:00:17.609643+00:00
|
||||
```
|
||||
|
||||
### Most recent CVE Modification Timestamp synchronized with NVD
|
||||
|
||||
```plain
|
||||
2024-06-24T23:15:10.773000+00:00
|
||||
2024-06-25T01:15:50.197000+00:00
|
||||
```
|
||||
|
||||
### Last Data Feed Release
|
||||
@ -27,7 +27,7 @@ Repository synchronizes with the NVD every 2 hours.
|
||||
Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/releases/latest)
|
||||
|
||||
```plain
|
||||
2024-06-24T00:00:08.628017+00:00
|
||||
2024-06-25T00:00:08.655339+00:00
|
||||
```
|
||||
|
||||
### Total Number of included CVEs
|
||||
@ -38,29 +38,20 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
|
||||
|
||||
### CVEs added in the last Commit
|
||||
|
||||
Recently added CVEs: `14`
|
||||
Recently added CVEs: `0`
|
||||
|
||||
- [CVE-2023-45195](CVE-2023/CVE-2023-451xx/CVE-2023-45195.json) (`2024-06-24T22:15:10.060`)
|
||||
- [CVE-2023-50029](CVE-2023/CVE-2023-500xx/CVE-2023-50029.json) (`2024-06-24T23:15:10.157`)
|
||||
- [CVE-2024-22168](CVE-2024/CVE-2024-221xx/CVE-2024-22168.json) (`2024-06-24T23:15:10.417`)
|
||||
- [CVE-2024-33898](CVE-2024/CVE-2024-338xx/CVE-2024-33898.json) (`2024-06-24T22:15:10.207`)
|
||||
- [CVE-2024-34988](CVE-2024/CVE-2024-349xx/CVE-2024-34988.json) (`2024-06-24T23:15:10.527`)
|
||||
- [CVE-2024-34991](CVE-2024/CVE-2024-349xx/CVE-2024-34991.json) (`2024-06-24T22:15:10.290`)
|
||||
- [CVE-2024-34992](CVE-2024/CVE-2024-349xx/CVE-2024-34992.json) (`2024-06-24T23:15:10.613`)
|
||||
- [CVE-2024-36681](CVE-2024/CVE-2024-366xx/CVE-2024-36681.json) (`2024-06-24T23:15:10.690`)
|
||||
- [CVE-2024-36682](CVE-2024/CVE-2024-366xx/CVE-2024-36682.json) (`2024-06-24T22:15:10.377`)
|
||||
- [CVE-2024-36683](CVE-2024/CVE-2024-366xx/CVE-2024-36683.json) (`2024-06-24T23:15:10.773`)
|
||||
- [CVE-2024-6290](CVE-2024/CVE-2024-62xx/CVE-2024-6290.json) (`2024-06-24T22:15:10.460`)
|
||||
- [CVE-2024-6291](CVE-2024/CVE-2024-62xx/CVE-2024-6291.json) (`2024-06-24T22:15:10.577`)
|
||||
- [CVE-2024-6292](CVE-2024/CVE-2024-62xx/CVE-2024-6292.json) (`2024-06-24T22:15:10.660`)
|
||||
- [CVE-2024-6293](CVE-2024/CVE-2024-62xx/CVE-2024-6293.json) (`2024-06-24T22:15:10.740`)
|
||||
|
||||
|
||||
### CVEs modified in the last Commit
|
||||
|
||||
Recently modified CVEs: `1`
|
||||
Recently modified CVEs: `6`
|
||||
|
||||
- [CVE-2024-22167](CVE-2024/CVE-2024-221xx/CVE-2024-22167.json) (`2024-06-24T23:15:10.280`)
|
||||
- [CVE-2024-23122](CVE-2024/CVE-2024-231xx/CVE-2024-23122.json) (`2024-06-25T01:15:49.807`)
|
||||
- [CVE-2024-23123](CVE-2024/CVE-2024-231xx/CVE-2024-23123.json) (`2024-06-25T01:15:49.923`)
|
||||
- [CVE-2024-23127](CVE-2024/CVE-2024-231xx/CVE-2024-23127.json) (`2024-06-25T01:15:49.990`)
|
||||
- [CVE-2024-23128](CVE-2024/CVE-2024-231xx/CVE-2024-23128.json) (`2024-06-25T01:15:50.063`)
|
||||
- [CVE-2024-23129](CVE-2024/CVE-2024-231xx/CVE-2024-23129.json) (`2024-06-25T01:15:50.137`)
|
||||
- [CVE-2024-23130](CVE-2024/CVE-2024-231xx/CVE-2024-23130.json) (`2024-06-25T01:15:50.197`)
|
||||
|
||||
|
||||
## Download and Usage
|
||||
|
42
_state.csv
42
_state.csv
@ -233368,7 +233368,7 @@ CVE-2023-45191,0,0,0471d71b4e832eeadfce865b6a4a3f21dfa7a9078549997d149920fc7d734
|
||||
CVE-2023-45192,0,0,9b3331ad67e9e1a89b019f9431a09b60b39c9c9dc236135dc341290555b6f6d8,2024-06-07T14:56:05.647000
|
||||
CVE-2023-45193,0,0,74568a9a8ac5466cce17b97fc2aa48957015444a92e43d7710c1164db296930b,2024-03-07T17:15:09.880000
|
||||
CVE-2023-45194,0,0,d5c89e53cbf9029912da4482ada08495c9f99ebbbb14329dd33526185af3bf8f,2023-10-31T18:08:52.140000
|
||||
CVE-2023-45195,1,1,0957a9cfe4435efd7d37db8eb8e064d164a52add399dc0b5b9c5657ce195366a,2024-06-24T22:15:10.060000
|
||||
CVE-2023-45195,0,0,0957a9cfe4435efd7d37db8eb8e064d164a52add399dc0b5b9c5657ce195366a,2024-06-24T22:15:10.060000
|
||||
CVE-2023-45196,0,0,f23eae25ca74036164c04bd7db623eda21906ca9d197c515c5724061786243a6,2024-06-24T21:15:25.630000
|
||||
CVE-2023-45197,0,0,c0d17f1ad7bbed426d147463e2778851696bf61332804cb6168757444d8a7309,2024-06-24T21:15:25.760000
|
||||
CVE-2023-45198,0,0,e83575150f55c9693ecaa3d3d8ecc28b28389ef4c4551e169f843e36cfbc4ca1,2023-10-11T17:15:31.923000
|
||||
@ -236819,7 +236819,7 @@ CVE-2023-50020,0,0,0420bf44f3192678835af5943c71c435d383debc14787f6862dfd11873466
|
||||
CVE-2023-50026,0,0,ddb63f64ad9db005831a0adfbb131b3f4a80d06c694a28549975d090519ef096,2024-06-07T14:12:14.943000
|
||||
CVE-2023-50027,0,0,cc6332349beda48de311c789172519792bf0e1d73915b299358aaf3ebbfbd533,2024-01-11T14:26:14.217000
|
||||
CVE-2023-50028,0,0,c4dec5d92b9d7082f423a44ec040b850ebf7d261529103270f04a2098eaade81,2024-01-25T19:55:05.850000
|
||||
CVE-2023-50029,1,1,ceb0b33f4116a06c08383da9c8921895b55845d9bd23bd4d9e9974e07033ffb7,2024-06-24T23:15:10.157000
|
||||
CVE-2023-50029,0,0,ceb0b33f4116a06c08383da9c8921895b55845d9bd23bd4d9e9974e07033ffb7,2024-06-24T23:15:10.157000
|
||||
CVE-2023-5003,0,0,2849233ffe4afb30b72aadd62309b165bd2ceffb201a5ac14f68b09d02b2ba14,2023-11-07T04:23:17.990000
|
||||
CVE-2023-50030,0,0,6c466acfd9c93ba20780248d726b1091908b80e5ee7f2c9d8b4bffa54cf157fa,2024-01-25T17:10:31.103000
|
||||
CVE-2023-50035,0,0,7af1ae42c48e4a2c0ccb4a35436abe8d24603d49181e707354cb51c037ebe841,2024-01-05T19:14:27.160000
|
||||
@ -243619,8 +243619,8 @@ CVE-2024-22162,0,0,3c2cb36f32a60ca693f81b961c287d758c19ce669967ae728e78b13e00efd
|
||||
CVE-2024-22163,0,0,c83e1ba1846b1fce21c84865fbae3a4da5f3738a4cbae342d708ebb4390dbfc8,2024-02-06T14:57:33.760000
|
||||
CVE-2024-22164,0,0,4dea6ba8f1b0f10f3e8121d8aed37ba56e363e8df8631ec93a1e9db3a5dd3c55,2024-04-10T01:15:17.713000
|
||||
CVE-2024-22165,0,0,556c59738fa3a69567bd56c76c812950d0a8343ccfbb26557b3cdc60c3bc8d41,2024-04-10T01:15:17.890000
|
||||
CVE-2024-22167,0,1,6c810ad0cbcba53d787a1a5d3c16777ada312b7a75654a62e0a2b663baaf8fed,2024-06-24T23:15:10.280000
|
||||
CVE-2024-22168,1,1,88a2f173278a2c9be44428d3967a8b94334c406e00492c536bafd8b92ee45e41,2024-06-24T23:15:10.417000
|
||||
CVE-2024-22167,0,0,6c810ad0cbcba53d787a1a5d3c16777ada312b7a75654a62e0a2b663baaf8fed,2024-06-24T23:15:10.280000
|
||||
CVE-2024-22168,0,0,88a2f173278a2c9be44428d3967a8b94334c406e00492c536bafd8b92ee45e41,2024-06-24T23:15:10.417000
|
||||
CVE-2024-2217,0,0,07b67ca85e13a2c6962db1475a9d0f8a931b674f51497121f9a33c8078bd4b4f,2024-04-10T19:49:51.183000
|
||||
CVE-2024-22177,0,0,1ff2297e612a95969b8693bc6a53ecafa7223eba267b1cfe298d3bc1fedfbe99,2024-04-02T12:50:42.233000
|
||||
CVE-2024-22178,0,0,894383da751aaa1046c611146ada59662a01e512644efee9e31c744bf34674c7,2024-04-03T17:24:18.150000
|
||||
@ -244128,16 +244128,16 @@ CVE-2024-23119,0,0,dc7a02dfe6c2319112aa9c9c7ba24d29c0a54406c32b5bc7828bc06ecc1e5
|
||||
CVE-2024-2312,0,0,b61108ae65321d61a758b0c732ce308a7e62bd5c3710897745a7af4ce6324077,2024-04-26T09:15:12.073000
|
||||
CVE-2024-23120,0,0,0bde07239643990ce52a2b119406a2fe2b75980d605c54ab173fa281d186044a,2024-06-15T03:15:09.170000
|
||||
CVE-2024-23121,0,0,63c89d44d13ff73da2a5ca3921fdf1d827a06f578facd9c0fce9fcd43ca51479,2024-06-15T04:15:12.550000
|
||||
CVE-2024-23122,0,0,53a6a7f808f40f9f8ccc6c9426a05387fb59e2867d6b512f9c97f02c17acdf90,2024-03-13T03:15:06.390000
|
||||
CVE-2024-23123,0,0,80a373f3449c95eb380a5a70c0b7efa82991d89500c1ac1323995b54768d154d,2024-03-13T03:15:06.443000
|
||||
CVE-2024-23122,0,1,60092102602996214ff712620897909baadba742aef72982d6f1adaf07705dbc,2024-06-25T01:15:49.807000
|
||||
CVE-2024-23123,0,1,7fa00e67eeec1cb2a8afde0ed3fcaf14a3ea1af0c35140e30c666a9385075c59,2024-06-25T01:15:49.923000
|
||||
CVE-2024-23124,0,0,310e8c4cd574e0a0147b3ffefdbfe36a36709549adc5926c84549e0d2e3d6fc7,2024-03-13T15:15:50.783000
|
||||
CVE-2024-23125,0,0,f0886c546f6144b586ec7d77c24ce27baa331af9d054edd3d089f488c8104eca,2024-02-22T19:07:27.197000
|
||||
CVE-2024-23126,0,0,e927ab071d122c627451a22694d4cf2dac082404401648a3f86014242e68a50a,2024-03-18T00:15:06.947000
|
||||
CVE-2024-23127,0,0,3ea88bcafabd465bc37fad9704e953c411abb0a641445593533f8ba0613e8791,2024-03-18T00:15:07.040000
|
||||
CVE-2024-23128,0,0,ca0d5b73755672b409a96dbe9aeb23485b0c9534c7c5de37783c4c3570c58d9f,2024-03-18T00:15:07.093000
|
||||
CVE-2024-23129,0,0,499dfc567281c72c2a7b30e15cbf850093f159f42544506c65a2e542ebe260ec,2024-03-18T00:15:07.147000
|
||||
CVE-2024-23127,0,1,a277049adf2a4c55c0070915e4c776496275a527a0c8359aab0fe639c6b68297,2024-06-25T01:15:49.990000
|
||||
CVE-2024-23128,0,1,613c777689be49b17e508c7025b66a802f8cc9a24fa089fab3f23219d47c2f2c,2024-06-25T01:15:50.063000
|
||||
CVE-2024-23129,0,1,36c375ef01e43df755a3ca3cbb6f28ca0e1cdceeeaf16b4115bf46d1edb99480,2024-06-25T01:15:50.137000
|
||||
CVE-2024-2313,0,0,fbc50aedf7351262416b6c5ccc0b90b77cb5c1e03078e87fd29f82257bb6f296,2024-03-11T01:32:29.610000
|
||||
CVE-2024-23130,0,0,1e3e1092d31e482531a23d074c00b2201eef463d384cdf1e1935233d4885d379,2024-03-18T00:15:07.200000
|
||||
CVE-2024-23130,0,1,89b2c036b2646421f53f48c7761fbb714aefb2ba6f8a32aee42be62c78ce3b21,2024-06-25T01:15:50.197000
|
||||
CVE-2024-23131,0,0,c427ee94f7c61adaf0716529d63f7a538f863e445e4db249885a3e64e551be88,2024-03-18T00:15:07.247000
|
||||
CVE-2024-23132,0,0,f22a2bdc1f997a36d13f6c22afab4983451c9373205a8ec6621cdd27061b8266,2024-03-18T00:15:07.297000
|
||||
CVE-2024-23133,0,0,e86482bc439e59c6d3cf72bc6bb19d1a229eba94c9abdd88aed6d4ca00d35e18,2024-03-18T00:15:07.340000
|
||||
@ -251145,7 +251145,7 @@ CVE-2024-33880,0,0,6e36b0fb5fe2b32e2817592006df5d8a4056f26237538fac1581301ce44f3
|
||||
CVE-2024-33881,0,0,fe245f6a598cf69e9a799928f3ddd050be59db62f7dc0626f6b1e68c6a66b11a,2024-06-24T19:26:35.967000
|
||||
CVE-2024-33883,0,0,c3d4ca3457f68fb83203c8f7576ab4f6d2af7e59b5901cd64501370e80dea4a9,2024-06-10T17:16:28.217000
|
||||
CVE-2024-33891,0,0,dbfd0a46c344c55dc0dc7b94e4bd09b3968a700bb28b10a9c34051909c1cf008,2024-04-29T12:42:03.667000
|
||||
CVE-2024-33898,1,1,64a0439560ab42d2524f005891031541e666b672322e135537c0c4f8ff86a32d,2024-06-24T22:15:10.207000
|
||||
CVE-2024-33898,0,0,64a0439560ab42d2524f005891031541e666b672322e135537c0c4f8ff86a32d,2024-06-24T22:15:10.207000
|
||||
CVE-2024-33899,0,0,a7d045f337995c763b9659e78955fd4f45f7736540a0f2de3af7e2f3a386fc9f,2024-05-21T17:15:08.907000
|
||||
CVE-2024-33900,0,0,22109cfa8453d6fac86d432cd9f4ebf584447af3cc6b5e9bb8f885da3aec714f,2024-06-06T18:15:16.170000
|
||||
CVE-2024-33901,0,0,75e1f4bc73d73047b93bc18aaf649342f4e272c76affbb46aef808d0b0e62e7d,2024-05-21T17:15:09.143000
|
||||
@ -251756,12 +251756,12 @@ CVE-2024-34974,0,0,519613cdbc229706fafa4388ed0de03632496af6e2fd3a5450a4996c9b966
|
||||
CVE-2024-3498,0,0,5a88bde38eadc03f84603569fdec38fe83a6606de78277714e78faa80a5569cc,2024-06-17T12:42:04.623000
|
||||
CVE-2024-34982,0,0,ef460a32eb987949d8c2a373dc7919974bee9f6e2b2a3c53ead2e4138396cd2a,2024-05-17T18:35:35.070000
|
||||
CVE-2024-34987,0,0,262d3ccca2f7e7df7be241d8326c4714ae2b44466572454690af1a110c26db06,2024-06-18T19:15:59.873000
|
||||
CVE-2024-34988,1,1,c5a49bc8b5bdc38fb2c1b9169ad77263771aec253579911506b04346fa516c2e,2024-06-24T23:15:10.527000
|
||||
CVE-2024-34988,0,0,c5a49bc8b5bdc38fb2c1b9169ad77263771aec253579911506b04346fa516c2e,2024-06-24T23:15:10.527000
|
||||
CVE-2024-34989,0,0,a75d8ba41908a8d4a011a34c5328e77e756e2c0766173d0c2f6d80fbf3e9fc4f,2024-06-24T12:57:36.513000
|
||||
CVE-2024-3499,0,0,38e1f3a6ce5aff826b19a73a4f796b980cc1161eaf58f8fada2f6f87e54573a4,2024-05-02T18:00:37.360000
|
||||
CVE-2024-34990,0,0,954e9cad148d93781e06727d2db5247f2f552d787151dbf2d18611cf67a55aa3,2024-06-20T12:43:25.663000
|
||||
CVE-2024-34991,1,1,c7bb8f571bd6fb527ae3cf4941f1fb8a95e3ec1481525319e2384a5192c5a862,2024-06-24T22:15:10.290000
|
||||
CVE-2024-34992,1,1,2fb33cd9d1649b04bb4fddf3e259e03a89d68c600aa7cfec73c54fdb23176beb,2024-06-24T23:15:10.613000
|
||||
CVE-2024-34991,0,0,c7bb8f571bd6fb527ae3cf4941f1fb8a95e3ec1481525319e2384a5192c5a862,2024-06-24T22:15:10.290000
|
||||
CVE-2024-34992,0,0,2fb33cd9d1649b04bb4fddf3e259e03a89d68c600aa7cfec73c54fdb23176beb,2024-06-24T23:15:10.613000
|
||||
CVE-2024-34993,0,0,88520e58b3968956ee44832ef9bca602378dea4f2524d5113c2eaf5052b0d026,2024-06-20T12:43:25.663000
|
||||
CVE-2024-34994,0,0,2d37bfb277f5e0193ed8c82676312446b855d68532288e194c45848265ea0e23,2024-06-20T12:43:25.663000
|
||||
CVE-2024-34995,0,0,ff7295f94bdc66d877986c97deb7981eb83c3e840f72ac7a8ee7543b9685ad7b,2024-05-24T18:09:20.027000
|
||||
@ -252798,9 +252798,9 @@ CVE-2024-36678,0,0,b40bcef505929051186338018132624ab6cbb572787979182cd8c6d269894
|
||||
CVE-2024-36679,0,0,8821e4eea3e4aeed8d65a516b06861a5717cd50e7124b3274b0fd92bade0c86c,2024-06-20T12:43:25.663000
|
||||
CVE-2024-3668,0,0,49d55bc0cfb418bcfc9437877f4056373badba24215047598ce2c0a1a6dfb761,2024-06-10T02:52:08.267000
|
||||
CVE-2024-36680,0,0,d0d5945762cb2164a2282b055a60546e9c27ff729e4565b5f8f11eb263a62624,2024-06-20T12:43:25.663000
|
||||
CVE-2024-36681,1,1,249caeea552a6a9dfbee1316651cefbc707284c5e954dfdb837d2d4c5f3c1432,2024-06-24T23:15:10.690000
|
||||
CVE-2024-36682,1,1,aad885f5e3855f7c68361a49dd2cadfcd53510895f215233ac581308b5a30d90,2024-06-24T22:15:10.377000
|
||||
CVE-2024-36683,1,1,5127d44c59d67efb8079e912007249763d07fb8e659cc6dbb75761c1f697fb47,2024-06-24T23:15:10.773000
|
||||
CVE-2024-36681,0,0,249caeea552a6a9dfbee1316651cefbc707284c5e954dfdb837d2d4c5f3c1432,2024-06-24T23:15:10.690000
|
||||
CVE-2024-36682,0,0,aad885f5e3855f7c68361a49dd2cadfcd53510895f215233ac581308b5a30d90,2024-06-24T22:15:10.377000
|
||||
CVE-2024-36683,0,0,5127d44c59d67efb8079e912007249763d07fb8e659cc6dbb75761c1f697fb47,2024-06-24T23:15:10.773000
|
||||
CVE-2024-36684,0,0,04438f1f2d344e3fc16c304c18197337a565e4aba220854d4ffac5c0b815632e,2024-06-20T12:43:25.663000
|
||||
CVE-2024-36691,0,0,eb8762b05fd0460b1321a45df3641c06640e12f5ae9e65b313352697eb6ff0d2,2024-06-13T18:36:09.010000
|
||||
CVE-2024-36699,0,0,4c8862d154ba42ed56a4ce8bf1e6f3cc34d74fcc619fdd49ec3e97bb2690a0fe,2024-06-14T15:15:50.967000
|
||||
@ -255054,7 +255054,7 @@ CVE-2024-6279,0,0,b4db90bd3c185f4671769d36fcbbafe037e9aff6dc24be7990311f62fb441a
|
||||
CVE-2024-6280,0,0,4e5bdd720fdc6d68a51312dcfd366ac88ed5daebd5ed348aefe6d5aa74c57712,2024-06-24T12:57:36.513000
|
||||
CVE-2024-6285,0,0,34110f18d2d014a03942c35a79ce17194b0084a2878f4b020f2dba6dca54aee0,2024-06-24T19:26:35.967000
|
||||
CVE-2024-6287,0,0,0b0bce9b8d1b199b7c73f866fab5dde80baa7d074079e3f6b0a56aa3ba19b021,2024-06-24T19:26:35.967000
|
||||
CVE-2024-6290,1,1,5d4b92359b64e77ba61c2c2fb8b337777d12a0124ea317fc382effce72051ed1,2024-06-24T22:15:10.460000
|
||||
CVE-2024-6291,1,1,b46430ebcd111d47076f0660eeac0e8e5ae17e44995f6e1aa566b78d007a4df6,2024-06-24T22:15:10.577000
|
||||
CVE-2024-6292,1,1,8b4b29d9fd8b6deb605531b3c158c1db86c8e941502e889b33cb0f8943cb5102,2024-06-24T22:15:10.660000
|
||||
CVE-2024-6293,1,1,eeaffba53fb5f9eeff42362f9e68ced969d50fc1ed573bd27cb47a275de983a8,2024-06-24T22:15:10.740000
|
||||
CVE-2024-6290,0,0,5d4b92359b64e77ba61c2c2fb8b337777d12a0124ea317fc382effce72051ed1,2024-06-24T22:15:10.460000
|
||||
CVE-2024-6291,0,0,b46430ebcd111d47076f0660eeac0e8e5ae17e44995f6e1aa566b78d007a4df6,2024-06-24T22:15:10.577000
|
||||
CVE-2024-6292,0,0,8b4b29d9fd8b6deb605531b3c158c1db86c8e941502e889b33cb0f8943cb5102,2024-06-24T22:15:10.660000
|
||||
CVE-2024-6293,0,0,eeaffba53fb5f9eeff42362f9e68ced969d50fc1ed573bd27cb47a275de983a8,2024-06-24T22:15:10.740000
|
||||
|
Can't render this file because it is too large.
|
Loading…
x
Reference in New Issue
Block a user