mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-05-07 03:02:20 +00:00
Auto-Update: 2024-05-16T02:00:30.323989+00:00
This commit is contained in:
parent
91efdb5ea1
commit
485cf9ab3c
@ -2,12 +2,12 @@
|
||||
"id": "CVE-2021-1870",
|
||||
"sourceIdentifier": "product-security@apple.com",
|
||||
"published": "2021-04-02T19:15:20.567",
|
||||
"lastModified": "2023-11-07T03:28:52.360",
|
||||
"lastModified": "2024-05-16T01:00:02.197",
|
||||
"vulnStatus": "Modified",
|
||||
"cisaExploitAdd": "2021-11-03",
|
||||
"cisaActionDue": "2021-11-17",
|
||||
"cisaRequiredAction": "Apply updates per vendor instructions.",
|
||||
"cisaVulnerabilityName": "Apple iOS, iPadOS, and macOS Remote Code Execution Vulnerability",
|
||||
"cisaVulnerabilityName": "Apple iOS, iPadOS, and macOS WebKit Remote Code Execution Vulnerability",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,12 +2,12 @@
|
||||
"id": "CVE-2021-1871",
|
||||
"sourceIdentifier": "product-security@apple.com",
|
||||
"published": "2021-04-02T19:15:20.663",
|
||||
"lastModified": "2023-11-07T03:28:52.430",
|
||||
"lastModified": "2024-05-16T01:00:02.197",
|
||||
"vulnStatus": "Modified",
|
||||
"cisaExploitAdd": "2021-11-03",
|
||||
"cisaActionDue": "2021-11-17",
|
||||
"cisaRequiredAction": "Apply updates per vendor instructions.",
|
||||
"cisaVulnerabilityName": "Apple iOS, iPadOS, and macOS Remote Code Execution Vulnerability",
|
||||
"cisaVulnerabilityName": "Apple iOS, iPadOS, and macOS WebKit Remote Code Execution Vulnerability",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,12 +2,12 @@
|
||||
"id": "CVE-2021-1879",
|
||||
"sourceIdentifier": "product-security@apple.com",
|
||||
"published": "2021-04-02T19:15:20.770",
|
||||
"lastModified": "2023-01-09T16:41:59.350",
|
||||
"lastModified": "2024-05-16T01:00:02.197",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cisaExploitAdd": "2021-11-03",
|
||||
"cisaActionDue": "2021-11-17",
|
||||
"cisaRequiredAction": "Apply updates per vendor instructions.",
|
||||
"cisaVulnerabilityName": "Apple iOS, iPadOS, and watchOS Cross-Site Scripting (XSS) Vulnerability",
|
||||
"cisaVulnerabilityName": "Apple iOS, iPadOS, and watchOS WebKit Cross-Site Scripting (XSS) Vulnerability",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,12 +2,12 @@
|
||||
"id": "CVE-2021-30661",
|
||||
"sourceIdentifier": "product-security@apple.com",
|
||||
"published": "2021-09-08T15:15:13.320",
|
||||
"lastModified": "2021-09-20T12:26:22.673",
|
||||
"lastModified": "2024-05-16T01:00:02.197",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cisaExploitAdd": "2021-11-03",
|
||||
"cisaActionDue": "2021-11-17",
|
||||
"cisaRequiredAction": "Apply updates per vendor instructions.",
|
||||
"cisaVulnerabilityName": "Apple Multiple Products Use-After-Free Vulnerability",
|
||||
"cisaVulnerabilityName": "Apple Multiple Products WebKit Storage Use-After-Free Vulnerability",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,12 +2,12 @@
|
||||
"id": "CVE-2021-30663",
|
||||
"sourceIdentifier": "product-security@apple.com",
|
||||
"published": "2021-09-08T15:15:13.413",
|
||||
"lastModified": "2024-02-02T03:08:37.943",
|
||||
"lastModified": "2024-05-16T01:00:02.197",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cisaExploitAdd": "2021-11-03",
|
||||
"cisaActionDue": "2021-11-17",
|
||||
"cisaRequiredAction": "Apply updates per vendor instructions.",
|
||||
"cisaVulnerabilityName": "Apple Multiple Products Integer Overflow Vulnerability",
|
||||
"cisaVulnerabilityName": "Apple Multiple Products WebKit Integer Overflow Vulnerability",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,12 +2,12 @@
|
||||
"id": "CVE-2021-30665",
|
||||
"sourceIdentifier": "product-security@apple.com",
|
||||
"published": "2021-09-08T15:15:13.507",
|
||||
"lastModified": "2022-05-03T16:04:40.443",
|
||||
"lastModified": "2024-05-16T01:00:02.197",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cisaExploitAdd": "2021-11-03",
|
||||
"cisaActionDue": "2021-11-17",
|
||||
"cisaRequiredAction": "Apply updates per vendor instructions.",
|
||||
"cisaVulnerabilityName": "Apple Multiple Products Memory Corruption Vulnerability",
|
||||
"cisaVulnerabilityName": "Apple Multiple Products WebKit Memory Corruption Vulnerability",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,12 +2,12 @@
|
||||
"id": "CVE-2021-30666",
|
||||
"sourceIdentifier": "product-security@apple.com",
|
||||
"published": "2021-09-08T15:15:13.553",
|
||||
"lastModified": "2022-07-12T17:42:04.277",
|
||||
"lastModified": "2024-05-16T01:00:02.197",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cisaExploitAdd": "2021-11-03",
|
||||
"cisaActionDue": "2021-11-17",
|
||||
"cisaRequiredAction": "Apply updates per vendor instructions.",
|
||||
"cisaVulnerabilityName": "Apple iOS Buffer Overflow Vulnerability",
|
||||
"cisaVulnerabilityName": "Apple iOS WebKit Buffer Overflow Vulnerability",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,12 +2,12 @@
|
||||
"id": "CVE-2021-30761",
|
||||
"sourceIdentifier": "product-security@apple.com",
|
||||
"published": "2021-09-08T14:15:10.257",
|
||||
"lastModified": "2021-09-14T19:20:50.890",
|
||||
"lastModified": "2024-05-16T01:00:02.197",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cisaExploitAdd": "2021-11-03",
|
||||
"cisaActionDue": "2021-11-17",
|
||||
"cisaRequiredAction": "Apply updates per vendor instructions.",
|
||||
"cisaVulnerabilityName": "Apple iOS Memory Corruption Vulnerability",
|
||||
"cisaVulnerabilityName": "Apple iOS WebKit Memory Corruption Vulnerability",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,12 +2,12 @@
|
||||
"id": "CVE-2021-30762",
|
||||
"sourceIdentifier": "product-security@apple.com",
|
||||
"published": "2021-09-08T14:15:10.300",
|
||||
"lastModified": "2021-09-14T19:29:08.017",
|
||||
"lastModified": "2024-05-16T01:00:02.197",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cisaExploitAdd": "2021-11-03",
|
||||
"cisaActionDue": "2021-11-17",
|
||||
"cisaRequiredAction": "Apply updates per vendor instructions.",
|
||||
"cisaVulnerabilityName": "Apple iOS Use-After-Free Vulnerability",
|
||||
"cisaVulnerabilityName": "Apple iOS WebKit Use-After-Free Vulnerability",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,12 +2,12 @@
|
||||
"id": "CVE-2022-22620",
|
||||
"sourceIdentifier": "product-security@apple.com",
|
||||
"published": "2022-03-18T18:15:13.787",
|
||||
"lastModified": "2022-09-09T20:41:25.447",
|
||||
"lastModified": "2024-05-16T01:00:02.197",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cisaExploitAdd": "2022-02-11",
|
||||
"cisaActionDue": "2022-02-25",
|
||||
"cisaRequiredAction": "Apply updates per vendor instructions.",
|
||||
"cisaVulnerabilityName": "Apple Webkit Remote Code Execution Vulnerability",
|
||||
"cisaVulnerabilityName": "Apple iOS, iPadOS, and macOS Webkit Use-After-Free Vulnerability",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,12 +2,12 @@
|
||||
"id": "CVE-2024-22353",
|
||||
"sourceIdentifier": "psirt@us.ibm.com",
|
||||
"published": "2024-03-31T12:15:50.430",
|
||||
"lastModified": "2024-04-02T17:56:57.187",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2024-05-16T00:15:08.057",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "IBM WebSphere Application Server Liberty 17.0.0.3 through 24.0.0.3 is vulnerable to a denial of service, caused by sending a specially crafted request. A remote attacker could exploit this vulnerability to cause the server to consume memory resources. IBM X-Force ID: 280400."
|
||||
"value": "IBM WebSphere Application Server Liberty 17.0.0.3 through 24.0.0.4 is vulnerable to a denial of service, caused by sending a specially crafted request. A remote attacker could exploit this vulnerability to cause the server to consume memory resources. IBM X-Force ID: 280400."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
@ -65,7 +65,7 @@
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-400"
|
||||
"value": "CWE-770"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -2,12 +2,12 @@
|
||||
"id": "CVE-2024-23222",
|
||||
"sourceIdentifier": "product-security@apple.com",
|
||||
"published": "2024-01-23T01:15:11.500",
|
||||
"lastModified": "2024-03-08T02:15:47.547",
|
||||
"lastModified": "2024-05-16T01:00:02.200",
|
||||
"vulnStatus": "Modified",
|
||||
"cisaExploitAdd": "2024-01-23",
|
||||
"cisaActionDue": "2024-02-13",
|
||||
"cisaRequiredAction": "Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.",
|
||||
"cisaVulnerabilityName": "Apple Multiple Products Type Confusion Vulnerability",
|
||||
"cisaVulnerabilityName": "Apple Multiple Products WebKit Type Confusion Vulnerability",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,12 +2,12 @@
|
||||
"id": "CVE-2024-27268",
|
||||
"sourceIdentifier": "psirt@us.ibm.com",
|
||||
"published": "2024-04-04T18:15:13.823",
|
||||
"lastModified": "2024-05-04T14:16:02.520",
|
||||
"lastModified": "2024-05-16T01:15:07.370",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "IBM WebSphere Application Server Liberty 18.0.0.2 through 24.0.0.3 is vulnerable to a denial of service, caused by sending a specially crafted request. A remote attacker could exploit this vulnerability to cause the server to consume memory resources. IBM X-Force ID: 284574."
|
||||
"value": "IBM WebSphere Application Server Liberty 18.0.0.2 through 24.0.0.4 is vulnerable to a denial of service, caused by sending a specially crafted request. A remote attacker could exploit this vulnerability to cause the server to consume memory resources. IBM X-Force ID: 284574."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
@ -41,11 +41,11 @@
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "psirt@us.ibm.com",
|
||||
"type": "Primary",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-400"
|
||||
"value": "CWE-770"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
92
CVE-2024/CVE-2024-49xx/CVE-2024-4919.json
Normal file
92
CVE-2024/CVE-2024-49xx/CVE-2024-4919.json
Normal file
@ -0,0 +1,92 @@
|
||||
{
|
||||
"id": "CVE-2024-4919",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2024-05-16T00:15:08.280",
|
||||
"lastModified": "2024-05-16T00:15:08.280",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A vulnerability was found in Campcodes Online Examination System 1.0. It has been declared as critical. This vulnerability affects unknown code of the file /adminpanel/admin/query/addCourseExe.php. The manipulation of the argument course_name leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. VDB-264454 is the identifier assigned to this vulnerability."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "LOW",
|
||||
"baseScore": 6.3,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 3.4
|
||||
}
|
||||
],
|
||||
"cvssMetricV2": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "2.0",
|
||||
"vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P",
|
||||
"accessVector": "NETWORK",
|
||||
"accessComplexity": "LOW",
|
||||
"authentication": "SINGLE",
|
||||
"confidentialityImpact": "PARTIAL",
|
||||
"integrityImpact": "PARTIAL",
|
||||
"availabilityImpact": "PARTIAL",
|
||||
"baseScore": 6.5
|
||||
},
|
||||
"baseSeverity": "MEDIUM",
|
||||
"exploitabilityScore": 8.0,
|
||||
"impactScore": 6.4,
|
||||
"acInsufInfo": false,
|
||||
"obtainAllPrivilege": false,
|
||||
"obtainUserPrivilege": false,
|
||||
"obtainOtherPrivilege": false,
|
||||
"userInteractionRequired": false
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-89"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/yylmm/CVE/blob/main/Online%20Examination%20System%20With%20Timer/SQL_addCourseExe.md",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.264454",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.264454",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?submit.333416",
|
||||
"source": "cna@vuldb.com"
|
||||
}
|
||||
]
|
||||
}
|
92
CVE-2024/CVE-2024-49xx/CVE-2024-4920.json
Normal file
92
CVE-2024/CVE-2024-49xx/CVE-2024-4920.json
Normal file
@ -0,0 +1,92 @@
|
||||
{
|
||||
"id": "CVE-2024-4920",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2024-05-16T00:15:08.563",
|
||||
"lastModified": "2024-05-16T00:15:08.563",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A vulnerability was found in SourceCodester Online Discussion Forum Site 1.0. It has been rated as critical. This issue affects some unknown processing of the file registerH.php. The manipulation of the argument ima leads to unrestricted upload. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-264455."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "LOW",
|
||||
"baseScore": 7.3,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 3.4
|
||||
}
|
||||
],
|
||||
"cvssMetricV2": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "2.0",
|
||||
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
|
||||
"accessVector": "NETWORK",
|
||||
"accessComplexity": "LOW",
|
||||
"authentication": "NONE",
|
||||
"confidentialityImpact": "PARTIAL",
|
||||
"integrityImpact": "PARTIAL",
|
||||
"availabilityImpact": "PARTIAL",
|
||||
"baseScore": 7.5
|
||||
},
|
||||
"baseSeverity": "HIGH",
|
||||
"exploitabilityScore": 10.0,
|
||||
"impactScore": 6.4,
|
||||
"acInsufInfo": false,
|
||||
"obtainAllPrivilege": false,
|
||||
"obtainUserPrivilege": false,
|
||||
"obtainOtherPrivilege": false,
|
||||
"userInteractionRequired": false
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-434"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/CveSecLook/cve/issues/27",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.264455",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.264455",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?submit.333477",
|
||||
"source": "cna@vuldb.com"
|
||||
}
|
||||
]
|
||||
}
|
92
CVE-2024/CVE-2024-49xx/CVE-2024-4921.json
Normal file
92
CVE-2024/CVE-2024-49xx/CVE-2024-4921.json
Normal file
@ -0,0 +1,92 @@
|
||||
{
|
||||
"id": "CVE-2024-4921",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2024-05-16T01:15:07.540",
|
||||
"lastModified": "2024-05-16T01:15:07.540",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A vulnerability classified as critical has been found in SourceCodester Employee and Visitor Gate Pass Logging System 1.0. Affected is an unknown function of the file /employee_gatepass/classes/Users.php?f=ssave. The manipulation of the argument img leads to unrestricted upload. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-264456."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "LOW",
|
||||
"baseScore": 6.3,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 3.4
|
||||
}
|
||||
],
|
||||
"cvssMetricV2": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "2.0",
|
||||
"vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P",
|
||||
"accessVector": "NETWORK",
|
||||
"accessComplexity": "LOW",
|
||||
"authentication": "SINGLE",
|
||||
"confidentialityImpact": "PARTIAL",
|
||||
"integrityImpact": "PARTIAL",
|
||||
"availabilityImpact": "PARTIAL",
|
||||
"baseScore": 6.5
|
||||
},
|
||||
"baseSeverity": "MEDIUM",
|
||||
"exploitabilityScore": 8.0,
|
||||
"impactScore": 6.4,
|
||||
"acInsufInfo": false,
|
||||
"obtainAllPrivilege": false,
|
||||
"obtainUserPrivilege": false,
|
||||
"obtainOtherPrivilege": false,
|
||||
"userInteractionRequired": false
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-434"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/I-Schnee-I/cev/blob/main/upload.md",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.264456",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.264456",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?submit.333662",
|
||||
"source": "cna@vuldb.com"
|
||||
}
|
||||
]
|
||||
}
|
92
CVE-2024/CVE-2024-49xx/CVE-2024-4922.json
Normal file
92
CVE-2024/CVE-2024-49xx/CVE-2024-4922.json
Normal file
@ -0,0 +1,92 @@
|
||||
{
|
||||
"id": "CVE-2024-4922",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2024-05-16T01:15:07.813",
|
||||
"lastModified": "2024-05-16T01:15:07.813",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A vulnerability, which was classified as problematic, was found in SourceCodester Simple Image Stack Website 1.0. This affects an unknown part. The manipulation of the argument page leads to cross site scripting. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-264459."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 3.5,
|
||||
"baseSeverity": "LOW"
|
||||
},
|
||||
"exploitabilityScore": 2.1,
|
||||
"impactScore": 1.4
|
||||
}
|
||||
],
|
||||
"cvssMetricV2": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "2.0",
|
||||
"vectorString": "AV:N/AC:L/Au:S/C:N/I:P/A:N",
|
||||
"accessVector": "NETWORK",
|
||||
"accessComplexity": "LOW",
|
||||
"authentication": "SINGLE",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "PARTIAL",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 4.0
|
||||
},
|
||||
"baseSeverity": "MEDIUM",
|
||||
"exploitabilityScore": 8.0,
|
||||
"impactScore": 2.9,
|
||||
"acInsufInfo": false,
|
||||
"obtainAllPrivilege": false,
|
||||
"obtainUserPrivilege": false,
|
||||
"obtainOtherPrivilege": false,
|
||||
"userInteractionRequired": false
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/HuoMingZ/aoligei/blob/main/ceshi.md",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.264459",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.264459",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?submit.333760",
|
||||
"source": "cna@vuldb.com"
|
||||
}
|
||||
]
|
||||
}
|
37
README.md
37
README.md
@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours.
|
||||
### Last Repository Update
|
||||
|
||||
```plain
|
||||
2024-05-15T23:55:30.228712+00:00
|
||||
2024-05-16T02:00:30.323989+00:00
|
||||
```
|
||||
|
||||
### Most recent CVE Modification Timestamp synchronized with NVD
|
||||
|
||||
```plain
|
||||
2024-05-15T23:15:08.210000+00:00
|
||||
2024-05-16T01:15:07.813000+00:00
|
||||
```
|
||||
|
||||
### Last Data Feed Release
|
||||
@ -27,33 +27,42 @@ Repository synchronizes with the NVD every 2 hours.
|
||||
Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/releases/latest)
|
||||
|
||||
```plain
|
||||
2024-05-15T00:00:20.269004+00:00
|
||||
2024-05-16T00:00:20.245238+00:00
|
||||
```
|
||||
|
||||
### Total Number of included CVEs
|
||||
|
||||
```plain
|
||||
250058
|
||||
250062
|
||||
```
|
||||
|
||||
### CVEs added in the last Commit
|
||||
|
||||
Recently added CVEs: `7`
|
||||
Recently added CVEs: `4`
|
||||
|
||||
- [CVE-2024-35183](CVE-2024/CVE-2024-351xx/CVE-2024-35183.json) (`2024-05-15T22:15:08.580`)
|
||||
- [CVE-2024-35184](CVE-2024/CVE-2024-351xx/CVE-2024-35184.json) (`2024-05-15T22:15:08.867`)
|
||||
- [CVE-2024-4914](CVE-2024/CVE-2024-49xx/CVE-2024-4914.json) (`2024-05-15T22:15:09.153`)
|
||||
- [CVE-2024-4915](CVE-2024/CVE-2024-49xx/CVE-2024-4915.json) (`2024-05-15T22:15:09.563`)
|
||||
- [CVE-2024-4916](CVE-2024/CVE-2024-49xx/CVE-2024-4916.json) (`2024-05-15T23:15:07.607`)
|
||||
- [CVE-2024-4917](CVE-2024/CVE-2024-49xx/CVE-2024-4917.json) (`2024-05-15T23:15:07.920`)
|
||||
- [CVE-2024-4918](CVE-2024/CVE-2024-49xx/CVE-2024-4918.json) (`2024-05-15T23:15:08.210`)
|
||||
- [CVE-2024-4919](CVE-2024/CVE-2024-49xx/CVE-2024-4919.json) (`2024-05-16T00:15:08.280`)
|
||||
- [CVE-2024-4920](CVE-2024/CVE-2024-49xx/CVE-2024-4920.json) (`2024-05-16T00:15:08.563`)
|
||||
- [CVE-2024-4921](CVE-2024/CVE-2024-49xx/CVE-2024-4921.json) (`2024-05-16T01:15:07.540`)
|
||||
- [CVE-2024-4922](CVE-2024/CVE-2024-49xx/CVE-2024-4922.json) (`2024-05-16T01:15:07.813`)
|
||||
|
||||
|
||||
### CVEs modified in the last Commit
|
||||
|
||||
Recently modified CVEs: `1`
|
||||
Recently modified CVEs: `13`
|
||||
|
||||
- [CVE-2020-29312](CVE-2020/CVE-2020-293xx/CVE-2020-29312.json) (`2024-05-15T22:15:08.280`)
|
||||
- [CVE-2021-1870](CVE-2021/CVE-2021-18xx/CVE-2021-1870.json) (`2024-05-16T01:00:02.197`)
|
||||
- [CVE-2021-1871](CVE-2021/CVE-2021-18xx/CVE-2021-1871.json) (`2024-05-16T01:00:02.197`)
|
||||
- [CVE-2021-1879](CVE-2021/CVE-2021-18xx/CVE-2021-1879.json) (`2024-05-16T01:00:02.197`)
|
||||
- [CVE-2021-30661](CVE-2021/CVE-2021-306xx/CVE-2021-30661.json) (`2024-05-16T01:00:02.197`)
|
||||
- [CVE-2021-30663](CVE-2021/CVE-2021-306xx/CVE-2021-30663.json) (`2024-05-16T01:00:02.197`)
|
||||
- [CVE-2021-30665](CVE-2021/CVE-2021-306xx/CVE-2021-30665.json) (`2024-05-16T01:00:02.197`)
|
||||
- [CVE-2021-30666](CVE-2021/CVE-2021-306xx/CVE-2021-30666.json) (`2024-05-16T01:00:02.197`)
|
||||
- [CVE-2021-30761](CVE-2021/CVE-2021-307xx/CVE-2021-30761.json) (`2024-05-16T01:00:02.197`)
|
||||
- [CVE-2021-30762](CVE-2021/CVE-2021-307xx/CVE-2021-30762.json) (`2024-05-16T01:00:02.197`)
|
||||
- [CVE-2022-22620](CVE-2022/CVE-2022-226xx/CVE-2022-22620.json) (`2024-05-16T01:00:02.197`)
|
||||
- [CVE-2024-22353](CVE-2024/CVE-2024-223xx/CVE-2024-22353.json) (`2024-05-16T00:15:08.057`)
|
||||
- [CVE-2024-23222](CVE-2024/CVE-2024-232xx/CVE-2024-23222.json) (`2024-05-16T01:00:02.200`)
|
||||
- [CVE-2024-27268](CVE-2024/CVE-2024-272xx/CVE-2024-27268.json) (`2024-05-16T01:15:07.370`)
|
||||
|
||||
|
||||
## Download and Usage
|
||||
|
46
_state.csv
46
_state.csv
@ -157299,7 +157299,7 @@ CVE-2020-29303,0,0,717655a3d9e225f97e23641b8f0dbd1d39e9de6907efdee1dbb270370c419
|
||||
CVE-2020-29304,0,0,84975babe9f5ae6c0f0f0a51fa3e2512e1024340a2d783c5c20dedaa6297203f,2020-12-15T16:49:03.950000
|
||||
CVE-2020-2931,0,0,03bf87fad374d78526f736b31005a9cc40eaee9c9e517b855e446310dbb59038,2020-04-16T20:01:45.827000
|
||||
CVE-2020-29311,0,0,41b3e7e3a6200eb87718ee2c6728c703f47a995684bcbf17cb36161bed533b8e,2021-07-21T11:39:23.747000
|
||||
CVE-2020-29312,0,1,ccfcf5bd761bb5fd24d8577150bed1bd46bba3d9b3c846fbbef0bbb7959dc5d1,2024-05-15T22:15:08.280000
|
||||
CVE-2020-29312,0,0,ccfcf5bd761bb5fd24d8577150bed1bd46bba3d9b3c846fbbef0bbb7959dc5d1,2024-05-15T22:15:08.280000
|
||||
CVE-2020-29315,0,0,abe7e86f34527c61d1d483d3a72cc22d790ff07cba0482a17d0c05481ea9b9c0,2023-12-07T14:22:18.950000
|
||||
CVE-2020-2932,0,0,667f0eefde131418b1963e0b53fb3de15afa80260ba5051f3741b41d052cd116,2020-04-16T20:02:22.827000
|
||||
CVE-2020-29321,0,0,17ccef2e8e7fab45b03c666e840bc4ddcd9bb69d6184715ab8017020b6df59de,2022-07-12T17:42:04.277000
|
||||
@ -166154,8 +166154,8 @@ CVE-2021-1864,0,0,8e26d91252a9b5e9e28835cfd3c0e453de998fc9314aa768e351caaca0b208
|
||||
CVE-2021-1865,0,0,3d688b01054555a6cbdcaa16125ae13ad10e50f91be7adb0d081d1f16aeb8e57,2021-09-16T19:49:47.477000
|
||||
CVE-2021-1867,0,0,288ed50e08496debd4c5e15dd0965819d65bccc069e18e9b4272f94ae014712d,2021-09-20T18:32:04.427000
|
||||
CVE-2021-1868,0,0,1dfb254923e7afacac2616c3ca8c3a54ab36b820e1c2ac525988774c86085a4a,2021-09-20T12:39:19.897000
|
||||
CVE-2021-1870,0,0,e4ae500156f8ba460be5941bcc115316c06f1d8a2ce0f48a257ee4f614df68fd,2023-11-07T03:28:52.360000
|
||||
CVE-2021-1871,0,0,ee43eb7e823b28912ce82826b8fb8907bd383511f444b7bea13561c725915078,2023-11-07T03:28:52.430000
|
||||
CVE-2021-1870,0,1,01ec51930b8a65724e778ab0c99704b1858614987780d00d4c6053299333fdbc,2024-05-16T01:00:02.197000
|
||||
CVE-2021-1871,0,1,0a74a4ae952f89b48ede139d4612f9f015e7d55a380efee0a17ea786e6089713,2024-05-16T01:00:02.197000
|
||||
CVE-2021-1872,0,0,c7f6d42de4fad056d615bed9f98ede1fdd9ba465bf505e23b3aed47cdcdb4007,2021-09-20T19:11:39.863000
|
||||
CVE-2021-1873,0,0,0d434fa4bbf59afef33251394e5c365eb74741dbf21368fbc3b88782c6cb651a,2022-07-12T17:42:04.277000
|
||||
CVE-2021-1874,0,0,01831726a4017e42ec0b903f9e783cee536f9423afb270804796af487a831b18,2021-09-20T19:05:43.507000
|
||||
@ -166163,7 +166163,7 @@ CVE-2021-1875,0,0,f596a58abc60fd8c3bde5f566700a3f292297b106975487a6677339c5274a9
|
||||
CVE-2021-1876,0,0,d1104ce4d5570e3e2087d9039236244e45137fdc70fa3d634877356bd62e60b8,2021-09-20T14:23:56.827000
|
||||
CVE-2021-1877,0,0,19711153a80cca58b6c12f071c4203853cbbbbcaa28d299d0d8966c129917af0,2021-09-20T12:09:40.643000
|
||||
CVE-2021-1878,0,0,52e89cae37004f754af0a92634fb4c2279d1e6fe13edbd5b41106f8be37a4f61,2021-09-20T12:51:30.223000
|
||||
CVE-2021-1879,0,0,0c50c22df97ca3303cea9fe2b05018d705d511dde8acb899b610807b2cd91ee7,2023-01-09T16:41:59.350000
|
||||
CVE-2021-1879,0,1,6137e04831dfaef82d55fe53810f4a86f5158404bdecb0ccf3c13da1ce513cdd,2024-05-16T01:00:02.197000
|
||||
CVE-2021-1880,0,0,780b5d0900b6009641f7b712523c9ba2e918f134af74f96d781fa87ec1ef635c,2021-09-20T12:14:00.740000
|
||||
CVE-2021-1881,0,0,469063abe7dceee3bccdbd8354a0f91fc65a46a88ba7c04aa34b0ef4b1507656,2021-09-17T19:26:53.670000
|
||||
CVE-2021-1882,0,0,279f64d385299ac85df920d5fffa8a2811465e56fc9975ae6e72309c1199d465,2021-09-20T18:04:33.287000
|
||||
@ -174652,12 +174652,12 @@ CVE-2021-30657,0,0,99ca1992fb3dfc6a541cb82d4aea250f3fcd656d9c777f83f05542a9a9cb4
|
||||
CVE-2021-30658,0,0,df64bc4b043d06eb8f90a9c1bd5cebd4b041a71159d1a8aa513dc0c4f0a8485b,2021-09-21T15:29:33.150000
|
||||
CVE-2021-30659,0,0,e530a8547e31c4a91777fde33c5b4c8d6766f06e448a762ad90b36b01951abc8,2021-09-17T14:26:26.420000
|
||||
CVE-2021-30660,0,0,c2b33d647e4286b547415615a2b5ed54a22508246db81a1a1bda87aff173cee3,2021-09-20T13:15:02.383000
|
||||
CVE-2021-30661,0,0,6ee7bc9064f9ea4090da254810cd61da190b3bbb4388ed1086b5523ba8ed3013,2021-09-20T12:26:22.673000
|
||||
CVE-2021-30661,0,1,f6d9380b8d9f176346adaba4a073f2dc597f190fcd1925f474b20241edb51f16,2024-05-16T01:00:02.197000
|
||||
CVE-2021-30662,0,0,fc2a2e73bbb70fc21b4631d1cbc668ad92a09b31502ed1667c5c53772f753d23,2021-09-20T12:26:52.893000
|
||||
CVE-2021-30663,0,0,859b787843d695bd666191907d2c8715dafed0e911d68de9f8e6dda6263ef0c0,2024-02-02T03:08:37.943000
|
||||
CVE-2021-30663,0,1,35069a740fdbc2d5c75571757b0eb0259708ec0e7c286bf59582dbded7368425,2024-05-16T01:00:02.197000
|
||||
CVE-2021-30664,0,0,ff883536798ab1148dc2a1b1228cf4c81c4db706cd252b357d0ea4fa18eb75b6,2021-09-17T11:28:58.813000
|
||||
CVE-2021-30665,0,0,c102c87d1c7302e53628f5202f5871112ffe85723519f039b5839918222edf84,2022-05-03T16:04:40.443000
|
||||
CVE-2021-30666,0,0,98eba84490d8dcfcaec686e9bd2f5811a10213002b117113d82c1ea79b33bbc2,2022-07-12T17:42:04.277000
|
||||
CVE-2021-30665,0,1,e82ab10cdd5408fb4a5f0744f448e87cff64669abf6699ef90f4b75351d31e98,2024-05-16T01:00:02.197000
|
||||
CVE-2021-30666,0,1,f99d46c3a16fc1833642a06ca751a2463db538297089a1e57c962df8ac96bea9,2024-05-16T01:00:02.197000
|
||||
CVE-2021-30667,0,0,b567a120dc2f62acc7835231ce7220e73d0df4014daf61e4fc499311275c32f1,2021-09-16T19:10:56.633000
|
||||
CVE-2021-30668,0,0,ccac2a70ffd9d0df113a711da4967f9fba721b92218118bce12b4b7e6cb09ff6,2021-09-16T19:12:19.280000
|
||||
CVE-2021-30669,0,0,0a8875c08687e95ea3a81fc22decd8281df8e208d9126c3af121b6e2510fde15,2021-09-16T16:47:43.090000
|
||||
@ -174745,8 +174745,8 @@ CVE-2021-30757,0,0,d3d56c6906b27240f0f9e387c7d17f692b7b562e6a2e2f0574def3255013e
|
||||
CVE-2021-30758,0,0,4a50cbb866560b9225c1187afb1bf1fff4d82a0b6c36471da0454f1c109ca12e,2021-09-14T20:00:04.913000
|
||||
CVE-2021-30759,0,0,4bebe4566e6a97dd14bf02022046da6da5254b76fabde080882241d7a837174b,2021-09-14T20:20:14.083000
|
||||
CVE-2021-30760,0,0,f0f67da202ffc51c91cc0e5bd3fc7cc95eafadb5c8d84ba6a4d3f7a5cb640335,2023-01-09T16:41:59.350000
|
||||
CVE-2021-30761,0,0,d7c864e51e02932798103d8a73d80364fc5c7b8debd3fad12394f3e54b9edffa,2021-09-14T19:20:50.890000
|
||||
CVE-2021-30762,0,0,a995c102ea66094c1e3e847919e6aac466cecdaeabb321f2b5be3edc213ea254,2021-09-14T19:29:08.017000
|
||||
CVE-2021-30761,0,1,f98edd3b4a073ad4d47e92596e3ccc783db1cda5a162147c9c1707c601010336,2024-05-16T01:00:02.197000
|
||||
CVE-2021-30762,0,1,b0a03d3c1a0855dda28fecbe75352154bb97d64278f5c92ab9052bc780472d2c,2024-05-16T01:00:02.197000
|
||||
CVE-2021-30763,0,0,20d365012a73f2a57642ebb55f579b2a260a2e7232d04bc939481e11e0ec4bf5,2021-09-14T19:35:20.543000
|
||||
CVE-2021-30764,0,0,eba5c09f8a49766c9f0ea77c6b7f32eb11b844f03685ee600eada4ebada74ba2,2021-09-14T19:38:39.237000
|
||||
CVE-2021-30765,0,0,dbea043c2b9960ce9d4d176284418c295d1d5598315341df5fb67c714afaca1e,2021-09-16T13:39:36.783000
|
||||
@ -191400,7 +191400,7 @@ CVE-2022-22616,0,0,52c1c954cce76263c8e305f0639bb0be1380dcc3f40bc1e8be8645ada7408
|
||||
CVE-2022-22617,0,0,13da63862a1b54b6a9abaa860bfb892ed6fa580a6c0fcbf6132240a70f1d00da,2023-08-08T14:21:49.707000
|
||||
CVE-2022-22618,0,0,65d9bde8794565ffbd1d22a82eef5e5b23fb726a1f26218cb87cf8606c2d2e06,2023-08-08T14:22:24.967000
|
||||
CVE-2022-2262,0,0,ba1d526772c19e170f1ec434ae572dba94ebd9dbb639bab2f18e588731137ba9,2022-07-19T12:49:09.400000
|
||||
CVE-2022-22620,0,0,d8e8c2bfd644e966d0ccc0cf3fa2e4edffbe011c6b40e6cc62f61d9aff98a844,2022-09-09T20:41:25.447000
|
||||
CVE-2022-22620,0,1,322c49c3dd47969c25d6a7f0bcf3d95437a5691820f12fc841cc9379c8eb8e70,2024-05-16T01:00:02.197000
|
||||
CVE-2022-22621,0,0,8bf47d44500d948b0bafacc9346537e8655e8be363255215c97d8714dcd15e40,2023-08-08T14:22:24.967000
|
||||
CVE-2022-22622,0,0,5b564b910094c45b9fad430373bc3a40599bb4a01383004951f11ae9e83a94e8,2023-08-08T14:22:24.967000
|
||||
CVE-2022-22623,0,0,dad3c00e07f4763ff3e9fd56be0d83d903337d6c160f53fea522b08823551a66,2023-11-07T03:43:56.890000
|
||||
@ -242374,7 +242374,7 @@ CVE-2024-22344,0,0,d45fd6fc8ab9fa39eaa3f858727d1a3351c9b5e65218b1d4466a8f0fb66dd
|
||||
CVE-2024-22345,0,0,d014aa3562325035b774e2fe45385508f179170d4ff82ff6e601139eae8cffc0,2024-05-14T16:13:02.773000
|
||||
CVE-2024-22346,0,0,638ee4e9687c7c28032b432c317662713c057110b08b4b27024e81eb8453bf9e,2024-03-19T16:50:10.570000
|
||||
CVE-2024-22352,0,0,8ad74f9c108b142191e10d9f1af5800c7055fc5b8e79f7a9a2cf40171c06b8cd,2024-04-01T15:23:54.530000
|
||||
CVE-2024-22353,0,0,dcde4e1942667b685d2979f87ac00f95d42a8fc5d16f7dbd8bc9f66a2b78dfbb,2024-04-02T17:56:57.187000
|
||||
CVE-2024-22353,0,1,ad692a077e5b804e1764ffb4f197bc72c54e38388ae47b5f805ac59827db6799,2024-05-16T00:15:08.057000
|
||||
CVE-2024-22354,0,0,ad4c87b82596e233d2cc875f8c78b0beaca39f3f0e9b6f00e8ce2d52a80db805,2024-04-17T12:48:07.510000
|
||||
CVE-2024-22355,0,0,d5e1a0b55aa53f554235616979c7aa7e85f01ce7f183bc4e8573dd18cbbe1419,2024-03-04T13:58:23.447000
|
||||
CVE-2024-22356,0,0,d81d64e63fe9b642cced3e4c94acc5e30f0113b5fdf3bed9ebc6028d04aab3ff,2024-03-26T17:09:53.043000
|
||||
@ -242778,7 +242778,7 @@ CVE-2024-23218,0,0,f9c63856068e91ff9b0c8acaa8fa5ee60b89ba853d892da3a1b57a30a48d4
|
||||
CVE-2024-23219,0,0,6138a00dd33e643c6da7ab985c8bb39139630ef127b2b12e557a72994a3a6de9,2024-01-30T14:36:42.017000
|
||||
CVE-2024-2322,0,0,60b35ad3bf9bd02d33facbaf1ddda5c64733f8e2d54364bad1f80ec56ba91bbf,2024-04-03T12:38:04.840000
|
||||
CVE-2024-23220,0,0,8ac5f8ea712aad989eb58875485617fa914d9322cd1efd90091219b5c7412925,2024-03-13T23:15:46.087000
|
||||
CVE-2024-23222,0,0,61f0a7f2953909b2da411f5647bebd2574cadd0ed79ad62454a1a9b27d6b5ecc,2024-03-08T02:15:47.547000
|
||||
CVE-2024-23222,0,1,dbdfbb94ef7853af981ed6ff730267427ee1f33c1e3020606b19021bcf93c66d,2024-05-16T01:00:02.200000
|
||||
CVE-2024-23223,0,0,d780b4d6e2ed4fd16bbb8e5d6b950b4f66cdf843fe3ec44eff85a2bd755e98e1,2024-01-27T03:48:24.797000
|
||||
CVE-2024-23224,0,0,8c8e9af636b106e202b7f940d165666567457368baa4cae37acc93fd6c8a64d2,2024-01-27T03:45:02.100000
|
||||
CVE-2024-23225,0,0,b045b8ce14b47c6046eb6998b70f65c4f611bc2259e19505fa6d0ddd8c29f039,2024-03-19T01:00:01.577000
|
||||
@ -245359,7 +245359,7 @@ CVE-2024-2726,0,0,86fe8b0d397a8074a2c940021570750a55036cbee3d4d8f0a542dcc682e4af
|
||||
CVE-2024-27261,0,0,bbed66d7d6087a4518d3eea41ca0d4f2f5d3d3e2b2ec24c87084c9ef60c5b4e2,2024-04-15T13:15:51.577000
|
||||
CVE-2024-27265,0,0,caf2cbef481f9d0206d06f75a38ca052c5291ba0582e91875cea8f52e6d86a34,2024-03-19T16:52:02.767000
|
||||
CVE-2024-27266,0,0,f3ab0f27c5fbbc81843b4329fa53134d5b91174cad9bacbbc5dbf01cfacc3864,2024-03-19T16:52:35.400000
|
||||
CVE-2024-27268,0,0,5ee3875e7ce23e0a22f3973d639f8ec37762f6a4d7ebf553d0b8d456239df178,2024-05-04T14:16:02.520000
|
||||
CVE-2024-27268,0,1,3c687588a19276e5b44431496d7af7239b9640f9b0218bde7d09fb0845bffcbc,2024-05-16T01:15:07.370000
|
||||
CVE-2024-27269,0,0,9bbdf45cadb4233d15ddc0419941140b89c76def4ec46746de3b531c556735b5,2024-05-14T16:13:02.773000
|
||||
CVE-2024-2727,0,0,958214357d5cfc59c51fd0300fa3ab5e09b0479b417a5156cb98159538007f76,2024-03-22T15:34:43.663000
|
||||
CVE-2024-27270,0,0,90fac36f214c0b31b291ee9cc7c1398845637888710e65e72962c5636284122e,2024-03-27T15:49:51.300000
|
||||
@ -249298,8 +249298,8 @@ CVE-2024-35171,0,0,4de8630e1bf094fb4a1152804e48c3dc58f770e96c7438fb408daec36dac0
|
||||
CVE-2024-35172,0,0,618cb47da87cf9e4af4d56e1768459895814dd5f5800a2fcf0693eda1c64c373,2024-05-14T16:11:39.510000
|
||||
CVE-2024-35175,0,0,30316f8adabe4b77ff55cf2c3104d884482b10f6e8ef0ea78ba2a92e169ff280,2024-05-15T16:40:19.330000
|
||||
CVE-2024-35179,0,0,4433fc22ade8274a4e17f50ac56484b62a8701a589dbfa040c3c094fd870b93d,2024-05-15T16:40:19.330000
|
||||
CVE-2024-35183,1,1,3bc58caec8e861e4c67d574c2532e9277af9566aecefebff3724908265352406,2024-05-15T22:15:08.580000
|
||||
CVE-2024-35184,1,1,bbff83b52521abc9a3a25807a99b5f7723792594d4eda6aba812faba9de6f8db,2024-05-15T22:15:08.867000
|
||||
CVE-2024-35183,0,0,3bc58caec8e861e4c67d574c2532e9277af9566aecefebff3724908265352406,2024-05-15T22:15:08.580000
|
||||
CVE-2024-35184,0,0,bbff83b52521abc9a3a25807a99b5f7723792594d4eda6aba812faba9de6f8db,2024-05-15T22:15:08.867000
|
||||
CVE-2024-3520,0,0,f6428e86e9ec472cba9c3c5754043cb34202461d79bcb1fa1b6a365d8347f93e,2024-05-02T18:00:37.360000
|
||||
CVE-2024-35204,0,0,8d3cad343b73c9eacef2ac3c1c032cedd053b4ea3c17c07fa5f2f20d60725516,2024-05-14T16:11:39.510000
|
||||
CVE-2024-35205,0,0,6c3c195f1e9ea6788d75f2fe16efcfbee96980b75a7c4536e4d4b7d48d63c4ae,2024-05-14T16:11:39.510000
|
||||
@ -250047,11 +250047,15 @@ CVE-2024-4910,0,0,a82052dfa103200f3b9fc39482e4d4d960a5e5de9c8e240b89074cee62e90b
|
||||
CVE-2024-4911,0,0,8d1608f0fa29a13cf0a21881c2ede6ff746ff4b49cb14c00be575f111b962149,2024-05-15T21:15:08.447000
|
||||
CVE-2024-4912,0,0,959608c998df40105cb04722815b6866fe50f22984a019f9f852ebbd393b327c,2024-05-15T21:15:08.720000
|
||||
CVE-2024-4913,0,0,ef1882efdbb97e7e5b3a9f1d624c71c7c6ca83c593dde5ac79d713777664dae8,2024-05-15T21:15:09
|
||||
CVE-2024-4914,1,1,2c82d1f8833393182c7867bf3bb498ed1d9ac6e0ccf458fc6dc3c29f504ace8f,2024-05-15T22:15:09.153000
|
||||
CVE-2024-4915,1,1,0ece382b6ad5961ea1f2edb3cd24a800ebe8e5db24cb03b1f9abd44792ca8d5f,2024-05-15T22:15:09.563000
|
||||
CVE-2024-4916,1,1,0808d53e0c2ee3a5d56a480b41f4985f5cdba47f133d6974d9f06deb8a299632,2024-05-15T23:15:07.607000
|
||||
CVE-2024-4917,1,1,cab3cd911fdb0d4da4d66130acff84648f1d28dedce375cf5a31196d5a50c5c1,2024-05-15T23:15:07.920000
|
||||
CVE-2024-4918,1,1,d6e8570ed4f149bc4f85c05376cdadd0aae166933b8875d11496f633fdca44d0,2024-05-15T23:15:08.210000
|
||||
CVE-2024-4914,0,0,2c82d1f8833393182c7867bf3bb498ed1d9ac6e0ccf458fc6dc3c29f504ace8f,2024-05-15T22:15:09.153000
|
||||
CVE-2024-4915,0,0,0ece382b6ad5961ea1f2edb3cd24a800ebe8e5db24cb03b1f9abd44792ca8d5f,2024-05-15T22:15:09.563000
|
||||
CVE-2024-4916,0,0,0808d53e0c2ee3a5d56a480b41f4985f5cdba47f133d6974d9f06deb8a299632,2024-05-15T23:15:07.607000
|
||||
CVE-2024-4917,0,0,cab3cd911fdb0d4da4d66130acff84648f1d28dedce375cf5a31196d5a50c5c1,2024-05-15T23:15:07.920000
|
||||
CVE-2024-4918,0,0,d6e8570ed4f149bc4f85c05376cdadd0aae166933b8875d11496f633fdca44d0,2024-05-15T23:15:08.210000
|
||||
CVE-2024-4919,1,1,9395e269c4d639503899daba02f8f8ef3e889bf0a909530d3bcbde59080f90c7,2024-05-16T00:15:08.280000
|
||||
CVE-2024-4920,1,1,7d4fbcd3c2333b8cd5d13050df57570cc73655912e9f0607ef2981105e7b4eff,2024-05-16T00:15:08.563000
|
||||
CVE-2024-4921,1,1,74bf965278d37dd3b4a08b96a0a79c85e131f73322be52ee99eaef8e8fd7e138,2024-05-16T01:15:07.540000
|
||||
CVE-2024-4922,1,1,107d8830fcd4c6b9ffa0f0768c22eb2d976c5b1746e34d23ce3bb57a1b3c122b,2024-05-16T01:15:07.813000
|
||||
CVE-2024-4947,0,0,f706014ab5e494173f189b6b147bc73eaca2bb6d431298f9b49d098b14ff5782,2024-05-15T21:15:09.273000
|
||||
CVE-2024-4948,0,0,bdd7cd38392862513bf6cf6f69f8c528e08e359340031d01daba548f07be3f14,2024-05-15T21:15:09.347000
|
||||
CVE-2024-4949,0,0,7a7f679654eca12ebf0c1d1d6ac210b4148b3d26ab259c26b5f77d48b40c4cf5,2024-05-15T21:15:09.430000
|
||||
|
Can't render this file because it is too large.
|
Loading…
x
Reference in New Issue
Block a user