mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-12-18 12:39:29 +00:00
Auto-Update: 2024-11-01T11:00:19.531042+00:00
This commit is contained in:
parent
542f1198f5
commit
7ddefa6746
@ -2,13 +2,13 @@
|
||||
"id": "CVE-2023-6942",
|
||||
"sourceIdentifier": "Mitsubishielectric.Psirt@yd.MitsubishiElectric.co.jp",
|
||||
"published": "2024-01-30T09:15:47.757",
|
||||
"lastModified": "2024-02-08T16:42:15.390",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2024-11-01T09:15:03.067",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Missing Authentication for Critical Function vulnerability in Mitsubishi Electric Corporation EZSocket versions 3.0 and later, FR Configurator2 all versions, GT Designer3 Version1(GOT1000) all versions, GT Designer3 Version1(GOT2000) all versions, GX Works2 versions 1.11M and later, GX Works3 all versions, MELSOFT Navigator versions 1.04E and later, MT Works2 all versions, MX Component versions 4.00A and later and MX OPC Server DA/UA all versions allows a remote unauthenticated attacker to bypass authentication by sending specially crafted packets and connect to the products illegally."
|
||||
"value": "Missing Authentication for Critical Function vulnerability in Mitsubishi Electric Corporation EZSocket versions 3.0 and later, GT Designer3 Version1(GOT1000) all versions, GT Designer3 Version1(GOT2000) all versions, GX Works2 versions 1.11M and later, GX Works3 versions 1.106L and prior, MELSOFT Navigator versions 1.04E and later, MT Works2 all versions, MX Component versions 4.00A and later and MX OPC Server DA/UA all versions allows a remote unauthenticated attacker to bypass authentication by sending specially crafted packets and connect to the products illegally."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
|
||||
@ -2,13 +2,13 @@
|
||||
"id": "CVE-2023-6943",
|
||||
"sourceIdentifier": "Mitsubishielectric.Psirt@yd.MitsubishiElectric.co.jp",
|
||||
"published": "2024-01-30T09:15:47.960",
|
||||
"lastModified": "2024-02-08T16:41:51.857",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2024-11-01T09:15:03.837",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Use of Externally-Controlled Input to Select Classes or Code ('Unsafe Reflection') vulnerability in Mitsubishi Electric Corporation EZSocket versions 3.0 and later, FR Configurator2 all versions, GT Designer3 Version1(GOT1000) all versions, GT Designer3 Version1(GOT2000) all versions, GX Works2 versions 1.11M and later, GX Works3 all versions, MELSOFT Navigator versions 1.04E and later, MT Works2 all versions, MX Component versions 4.00A and later and MX OPC Server DA/UA all versions allows a remote unauthenticated attacker to execute a malicious code by RPC with a path to a malicious library while connected to the products."
|
||||
"value": "Use of Externally-Controlled Input to Select Classes or Code ('Unsafe Reflection') vulnerability in Mitsubishi Electric Corporation EZSocket versions 3.0 and later, GT Designer3 Version1(GOT1000) all versions, GT Designer3 Version1(GOT2000) all versions, GX Works2 versions 1.11M and later, GX Works3 versions 1.106L and prior, MELSOFT Navigator versions 1.04E and later, MT Works2 all versions, MX Component versions 4.00A and later and MX OPC Server DA/UA all versions allows a remote unauthenticated attacker to execute a malicious code by RPC with a path to a malicious library while connected to the products."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
|
||||
64
CVE-2024/CVE-2024-102xx/CVE-2024-10232.json
Normal file
64
CVE-2024/CVE-2024-102xx/CVE-2024-10232.json
Normal file
@ -0,0 +1,64 @@
|
||||
{
|
||||
"id": "CVE-2024-10232",
|
||||
"sourceIdentifier": "security@wordfence.com",
|
||||
"published": "2024-11-01T10:15:03.080",
|
||||
"lastModified": "2024-11-01T10:15:03.080",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "The Group Chat & Video Chat by AtomChat plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's atomchat shortcode in all versions up to, and including, 1.1.5 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security@wordfence.com",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 6.4,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 3.1,
|
||||
"impactScore": 2.7
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security@wordfence.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/changeset/3178522/",
|
||||
"source": "security@wordfence.com"
|
||||
},
|
||||
{
|
||||
"url": "https://wordpress.org/plugins/atomchat/#developers",
|
||||
"source": "security@wordfence.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/c10993bd-b4f3-44b6-bb0f-cb783dbcf314?source=cve",
|
||||
"source": "security@wordfence.com"
|
||||
}
|
||||
]
|
||||
}
|
||||
60
CVE-2024/CVE-2024-106xx/CVE-2024-10651.json
Normal file
60
CVE-2024/CVE-2024-106xx/CVE-2024-10651.json
Normal file
@ -0,0 +1,60 @@
|
||||
{
|
||||
"id": "CVE-2024-10651",
|
||||
"sourceIdentifier": "twcert@cert.org.tw",
|
||||
"published": "2024-11-01T10:15:04.600",
|
||||
"lastModified": "2024-11-01T10:15:04.600",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "IDExpert from CHANGING Information Technology does not properly validate a specific parameter in the administrator interface, allowing remote attackers with administrator privileges to exploit this vulnerability to read arbitrary system files."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "twcert@cert.org.tw",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "HIGH",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 4.9,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 1.2,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "twcert@cert.org.tw",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-36"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.twcert.org.tw/en/cp-139-8171-29297-2.html",
|
||||
"source": "twcert@cert.org.tw"
|
||||
},
|
||||
{
|
||||
"url": "https://www.twcert.org.tw/tw/cp-132-8170-48a4e-1.html",
|
||||
"source": "twcert@cert.org.tw"
|
||||
}
|
||||
]
|
||||
}
|
||||
60
CVE-2024/CVE-2024-106xx/CVE-2024-10652.json
Normal file
60
CVE-2024/CVE-2024-106xx/CVE-2024-10652.json
Normal file
@ -0,0 +1,60 @@
|
||||
{
|
||||
"id": "CVE-2024-10652",
|
||||
"sourceIdentifier": "twcert@cert.org.tw",
|
||||
"published": "2024-11-01T10:15:04.877",
|
||||
"lastModified": "2024-11-01T10:15:04.877",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "IDExpert from CHANGING Information Technology does not properly validate a parameter for a specific functionality, allowing unauthenticated remote attackers to inject JavsScript code and perform Reflected Cross-site scripting attacks."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "twcert@cert.org.tw",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 6.1,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 2.7
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "twcert@cert.org.tw",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.twcert.org.tw/en/cp-139-8173-f8bbc-2.html",
|
||||
"source": "twcert@cert.org.tw"
|
||||
},
|
||||
{
|
||||
"url": "https://www.twcert.org.tw/tw/cp-132-8172-a02cc-1.html",
|
||||
"source": "twcert@cert.org.tw"
|
||||
}
|
||||
]
|
||||
}
|
||||
60
CVE-2024/CVE-2024-106xx/CVE-2024-10653.json
Normal file
60
CVE-2024/CVE-2024-106xx/CVE-2024-10653.json
Normal file
@ -0,0 +1,60 @@
|
||||
{
|
||||
"id": "CVE-2024-10653",
|
||||
"sourceIdentifier": "twcert@cert.org.tw",
|
||||
"published": "2024-11-01T10:15:05.103",
|
||||
"lastModified": "2024-11-01T10:15:05.103",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "IDExpert from CHANGING Information Technology does not properly validate a specific parameter in the administrator interface, allowing remote attackers with administrative privileges to inject and execute OS commands on the server."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "twcert@cert.org.tw",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 10.0,
|
||||
"baseSeverity": "CRITICAL"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 6.0
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "twcert@cert.org.tw",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-78"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.twcert.org.tw/en/cp-139-8175-57245-2.html",
|
||||
"source": "twcert@cert.org.tw"
|
||||
},
|
||||
{
|
||||
"url": "https://www.twcert.org.tw/tw/cp-132-8174-a17fd-1.html",
|
||||
"source": "twcert@cert.org.tw"
|
||||
}
|
||||
]
|
||||
}
|
||||
22
README.md
22
README.md
@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours.
|
||||
### Last Repository Update
|
||||
|
||||
```plain
|
||||
2024-11-01T09:00:19.760358+00:00
|
||||
2024-11-01T11:00:19.531042+00:00
|
||||
```
|
||||
|
||||
### Most recent CVE Modification Timestamp synchronized with NVD
|
||||
|
||||
```plain
|
||||
2024-11-01T08:35:14.437000+00:00
|
||||
2024-11-01T10:15:05.103000+00:00
|
||||
```
|
||||
|
||||
### Last Data Feed Release
|
||||
@ -33,25 +33,25 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
|
||||
### Total Number of included CVEs
|
||||
|
||||
```plain
|
||||
267793
|
||||
267797
|
||||
```
|
||||
|
||||
### CVEs added in the last Commit
|
||||
|
||||
Recently added CVEs: `2`
|
||||
Recently added CVEs: `4`
|
||||
|
||||
- [CVE-2024-7424](CVE-2024/CVE-2024-74xx/CVE-2024-7424.json) (`2024-11-01T08:15:11.647`)
|
||||
- [CVE-2024-9655](CVE-2024/CVE-2024-96xx/CVE-2024-9655.json) (`2024-11-01T08:15:12.047`)
|
||||
- [CVE-2024-10232](CVE-2024/CVE-2024-102xx/CVE-2024-10232.json) (`2024-11-01T10:15:03.080`)
|
||||
- [CVE-2024-10651](CVE-2024/CVE-2024-106xx/CVE-2024-10651.json) (`2024-11-01T10:15:04.600`)
|
||||
- [CVE-2024-10652](CVE-2024/CVE-2024-106xx/CVE-2024-10652.json) (`2024-11-01T10:15:04.877`)
|
||||
- [CVE-2024-10653](CVE-2024/CVE-2024-106xx/CVE-2024-10653.json) (`2024-11-01T10:15:05.103`)
|
||||
|
||||
|
||||
### CVEs modified in the last Commit
|
||||
|
||||
Recently modified CVEs: `4`
|
||||
Recently modified CVEs: `2`
|
||||
|
||||
- [CVE-2021-47078](CVE-2021/CVE-2021-470xx/CVE-2021-47078.json) (`2024-11-01T08:35:01.573`)
|
||||
- [CVE-2023-45896](CVE-2023/CVE-2023-458xx/CVE-2023-45896.json) (`2024-11-01T08:35:03.997`)
|
||||
- [CVE-2024-26894](CVE-2024/CVE-2024-268xx/CVE-2024-26894.json) (`2024-11-01T08:35:09.973`)
|
||||
- [CVE-2024-48237](CVE-2024/CVE-2024-482xx/CVE-2024-48237.json) (`2024-11-01T08:35:14.437`)
|
||||
- [CVE-2023-6942](CVE-2023/CVE-2023-69xx/CVE-2023-6942.json) (`2024-11-01T09:15:03.067`)
|
||||
- [CVE-2023-6943](CVE-2023/CVE-2023-69xx/CVE-2023-6943.json) (`2024-11-01T09:15:03.837`)
|
||||
|
||||
|
||||
## Download and Usage
|
||||
|
||||
20
_state.csv
20
_state.csv
@ -187000,7 +187000,7 @@ CVE-2021-47074,0,0,c944055c12bdbb473a00f06ba663e9aa59fbf07805a8b36dc68ca8eaece78
|
||||
CVE-2021-47075,0,0,fbef03aac6a8106fd4f4c672eae599661287850b31546fdede7523cd1d19f393,2024-03-01T22:22:25.913000
|
||||
CVE-2021-47076,0,0,7c8622ce3d2f5da5194ef5fbe7d3dddeb59a9016a2e1d320c327f4bb4eeac7a7,2024-03-01T22:22:25.913000
|
||||
CVE-2021-47077,0,0,094226e13a4d30639d25f36be3dfea47179d6a1794694d0d910952f9e632810a,2024-03-01T22:22:25.913000
|
||||
CVE-2021-47078,0,1,e39a645f82e6ef83a23da18377ebefe42c441100a5fd642553de38a4fecea2c2,2024-11-01T08:35:01.573000
|
||||
CVE-2021-47078,0,0,e39a645f82e6ef83a23da18377ebefe42c441100a5fd642553de38a4fecea2c2,2024-11-01T08:35:01.573000
|
||||
CVE-2021-47079,0,0,0fdf09d917088dbab8085d0fa49a84cd4b4756a3cecc44c63f7f393d13877289,2024-03-01T22:22:25.913000
|
||||
CVE-2021-47080,0,0,37f5be84057b2b7143e8efca1bf959654367bf74dea826635ad8969b16f72a22,2024-03-01T22:22:25.913000
|
||||
CVE-2021-47081,0,0,fa9e53fcea8371f1d81146e970b4908deb3f6d5f71952985438c27e9598afcd2,2024-03-01T22:22:25.913000
|
||||
@ -234561,7 +234561,7 @@ CVE-2023-4589,0,0,5823a1bbdcd3fd3dad6a9d361ad6771c5169f34ce23ef9e39b305d1aaf66a9
|
||||
CVE-2023-45892,0,0,31ea99a81b63e5dc5404654e4231556ec48f5c4f723835f37c58ea694f43c518,2024-01-08T19:31:03.043000
|
||||
CVE-2023-45893,0,0,8d1a5a8422c61644ae8727f2e16c55cf2cebb8170e0670e9c625ddf903cfff6b,2024-09-06T18:35:05.837000
|
||||
CVE-2023-45894,0,0,acbbd0369c677d90271e9d43ae921ffda1b227f19a0c24cf767e01f00c88765f,2023-12-20T16:44:29.960000
|
||||
CVE-2023-45896,0,1,574edb4c4981d990f2925fa7a7bc3ce022e38048f9e267255e3b9d1b20597db1,2024-11-01T08:35:03.997000
|
||||
CVE-2023-45896,0,0,574edb4c4981d990f2925fa7a7bc3ce022e38048f9e267255e3b9d1b20597db1,2024-11-01T08:35:03.997000
|
||||
CVE-2023-45897,0,0,734daadcbcf83a77d0375bea2b59862190723c5d109c64b97c90f46f832ac6a4,2023-11-21T16:33:02.183000
|
||||
CVE-2023-45898,0,0,f3261a8736c0c34cdaa65c9211bd18854b9e3c8fbb8c9c8e0fd98bdbf7fab3eb,2024-08-26T16:07:21.753000
|
||||
CVE-2023-45899,0,0,8ea5b9ddd2874024b78e9d2dcda12439e81d1dbfe77d0f8413dab38e7cc66b6f,2023-11-08T16:54:12.307000
|
||||
@ -241144,8 +241144,8 @@ CVE-2023-6938,0,0,11f80052b936c04b9e187c3b789917daa425ce7825b2d97a007c8789d5c880
|
||||
CVE-2023-6939,0,0,2170380787311a69988ea99fc8c330e3c06fd6984ac65df2b46bcfe4a9228a04,2024-01-05T16:07:36.623000
|
||||
CVE-2023-6940,0,0,493881701dcc8fc97ee3d5ebe7c0e0a9f858a0655fb1ba83e833896ba45009d6,2023-12-29T16:58:04.290000
|
||||
CVE-2023-6941,0,0,c9be07ef3de50232aec1e099fa7bd8488a030b429a8a0b5beb0f3ee1763b1559,2024-01-19T19:34:11.820000
|
||||
CVE-2023-6942,0,0,8e62f70d02dc4963dbf5d24506f89a94f3488239bc1bd3aea336e379510bb11c,2024-02-08T16:42:15.390000
|
||||
CVE-2023-6943,0,0,de80e866da92cf22bf567aa2263f519c2f2ce46b3cf6efd9485b0072ebafaebf,2024-02-08T16:41:51.857000
|
||||
CVE-2023-6942,0,1,f478deb6c2162412c06c372ac0b7e6b1c92c09fe3ab026b82f90eefa775c50ce,2024-11-01T09:15:03.067000
|
||||
CVE-2023-6943,0,1,1a8a3b81e8d8731b7ee3a07f3dcf56fb695f520d19c115b4e798870b26d955d4,2024-11-01T09:15:03.837000
|
||||
CVE-2023-6944,0,0,b5d2d87fcb2c2ce3c8396de2080c9963aeb1e9a189e97ae4f9bb82eab217349c,2024-02-04T20:15:46.650000
|
||||
CVE-2023-6945,0,0,4d4e197e57ce0c0a12a32b3d201450bb49cb1ee7fc52a5178125c8abda73fdea,2024-05-17T02:34:01.610000
|
||||
CVE-2023-6946,0,0,0fb93ff65377878fd63e0701dc37881508b51e13c75cd51aae76c0d1bace0216,2024-02-03T00:24:34.007000
|
||||
@ -242489,6 +242489,7 @@ CVE-2024-10229,0,0,d8b7c88d62022a9dc51348547e30f2a14480969b9761e4820e45f77df3ca5
|
||||
CVE-2024-1023,0,0,8d9bd157d13575cb2f7284ebb3a2797f2b531ebc1f530e248b6a4889677c4116,2024-07-25T21:15:10.280000
|
||||
CVE-2024-10230,0,0,5b2eed7a3522d994daba36d504e121d06d38d6b2f8f6bed6dcdcf2e92eeba1bb,2024-10-31T08:35:03.010000
|
||||
CVE-2024-10231,0,0,eb0443e51721212742591278ce3f179ecbfdd0bb144d3d1886157523275588e9,2024-10-25T17:01:55.633000
|
||||
CVE-2024-10232,1,1,436142ee172e51f4e3c620c7329dbf0e506996a8dbcdae4a86e8608acaa883f7,2024-11-01T10:15:03.080000
|
||||
CVE-2024-10233,0,0,ae75a6902cbd361dba7f0db59261b7e58fb8ced87e17031187e0bfd405b07086,2024-10-29T14:34:04.427000
|
||||
CVE-2024-10234,0,0,29441fe4cd8bfbe6b6cb2ad55d7c2d2c9161b1369f9e713c11aec1dfec3e0850,2024-10-30T18:50:59.883000
|
||||
CVE-2024-1024,0,0,d47b3d3840cd70db883d335219cea52b6b4fa0e3fdfc3f4d41efc4b833dff6a1,2024-05-17T02:35:11.210000
|
||||
@ -242697,6 +242698,9 @@ CVE-2024-10620,0,0,d1dce0a8a49845055437483033a0cc33cc86ec4dbf47498c20ffa931b7777
|
||||
CVE-2024-1063,0,0,74a897918202555ab7dea6b1737e329d32a036051a3381cf0244644b537611c7,2024-02-05T18:25:57.167000
|
||||
CVE-2024-1064,0,0,f25346ba7587521e1585b34f9b82a63a0a8099891451ea7215e7704632eec54a,2024-02-12T18:42:14.777000
|
||||
CVE-2024-1065,0,0,6b929e111558868b0121ca43ebc298de03b6cbdcab98142e875670ec0e17e759,2024-07-03T01:44:57.727000
|
||||
CVE-2024-10651,1,1,da59d5c0421bc86f33ebd5415c6170d0dcce4244a867c98aea962de2781dd2e1,2024-11-01T10:15:04.600000
|
||||
CVE-2024-10652,1,1,83a9abc440cfb9319a0221697c7f614d48eaa1c6fd3e7fe87154fc598f071bd6,2024-11-01T10:15:04.877000
|
||||
CVE-2024-10653,1,1,c09a5bde6c37950c4429def90de453bac730c850cdba2914bb7e431b14d8a4a4,2024-11-01T10:15:05.103000
|
||||
CVE-2024-1066,0,0,7cd919bef6acbf4a1ab59632c47efb8ac6efc2d2c9f422a5fc3bf23611a0e27a,2024-10-08T19:52:24.017000
|
||||
CVE-2024-1067,0,0,54f094f38a51fcd0954e79c36caca8c799a450eda4559137980b77dd6d9caf6c,2024-05-03T14:17:53.690000
|
||||
CVE-2024-1068,0,0,affccf40ed47a318eb2ecd8e307c56fa640a43f94e3b3e8b50a778ab4a9c998f,2024-08-26T19:35:04.287000
|
||||
@ -248647,7 +248651,7 @@ CVE-2024-26890,0,0,442ddef52e9c264bc395f1d392f8e749c4361ea4cfc6bd82e29e835d19500
|
||||
CVE-2024-26891,0,0,e75c6313f07c138ae9c36d0ab38fdf2f3dec2472492fc6c7e58e9f5d631654b1,2024-06-25T22:15:25.327000
|
||||
CVE-2024-26892,0,0,806d8c2f00888544d8f546c55fd045afd90c70f07a594d3bdbeb1d45feddd5ff,2024-04-17T12:48:07.510000
|
||||
CVE-2024-26893,0,0,547eb928978e29d7450e4ec7a0bc4d561c68a6c3cc4baa1bf0cc2f44e81b2c80,2024-04-17T12:48:07.510000
|
||||
CVE-2024-26894,0,1,e26952696ebbc603ce79e51fc62ca290fe74c2a9ed69fdd0de0954b1e9696e0f,2024-11-01T08:35:09.973000
|
||||
CVE-2024-26894,0,0,e26952696ebbc603ce79e51fc62ca290fe74c2a9ed69fdd0de0954b1e9696e0f,2024-11-01T08:35:09.973000
|
||||
CVE-2024-26895,0,0,b9dd891a5343b75d81278d18982d49da18e6241368343883e4b0512359c9b37f,2024-06-25T23:15:27.080000
|
||||
CVE-2024-26896,0,0,b08f3e33c23ae0b83635aecbc40be8738b6df9560f03215c69e56c9079672600,2024-07-03T01:49:59.133000
|
||||
CVE-2024-26897,0,0,f7f0ae7a29508e7fbb0b3fdfe5757c59953f0ebfc186579cd1f494f6556c9f6d,2024-06-25T23:15:27.180000
|
||||
@ -262999,7 +263003,7 @@ CVE-2024-48233,0,0,5079087488de765c44b2e5efadc3adcfed6b8eb841374ab16026cf622181f
|
||||
CVE-2024-48234,0,0,1a8d3e559037bd1781a9cae98ca9ac055b21e9cc548e55db5056102c863a9c6e,2024-10-29T19:35:19.743000
|
||||
CVE-2024-48235,0,0,34c8dce734cf6a79d3c05c66d81a06f8b97a702d18a590252918c2829053c503,2024-10-29T19:35:20.530000
|
||||
CVE-2024-48236,0,0,40c021b9ab0ef0fe1121c89c55613819f1f21cd79a305756de1a8bc6502d5e11,2024-10-29T19:35:21.310000
|
||||
CVE-2024-48237,0,1,7fc4be0e37579c90650795a758e344399d21643de8b932b0003e436ed9b8f848,2024-11-01T08:35:14.437000
|
||||
CVE-2024-48237,0,0,7fc4be0e37579c90650795a758e344399d21643de8b932b0003e436ed9b8f848,2024-11-01T08:35:14.437000
|
||||
CVE-2024-48238,0,0,82a52e47a3d3b03e4d50c93edac3f04555f82b841e94f644b1bc9259903b3bad,2024-10-29T19:35:22.083000
|
||||
CVE-2024-48239,0,0,adb497d48658b0187eda42678c3fa683c391f0d842af36fe4602456f703dca6b,2024-10-29T19:35:22.840000
|
||||
CVE-2024-4824,0,0,e31432116aed0554c3dc4b1001cfc03d00512889f9f84533cba85f3e0d8e9591,2024-05-14T16:11:39.510000
|
||||
@ -266057,7 +266061,7 @@ CVE-2024-7420,0,0,307d2beb05daeaa977b791b65696d33894a9f28a7ba08d0caa6a110cc77dc0
|
||||
CVE-2024-7421,0,0,4b103fff50da4b09038f9929ad3e23e3be25f08bd3025dbf87bd771ab41116d2,2024-10-01T18:36:59.117000
|
||||
CVE-2024-7422,0,0,36692ebd2df61833999819382a06fe94bffc446bd5a7ed95f5ad6f2f1be17d62,2024-08-19T13:00:23.117000
|
||||
CVE-2024-7423,0,0,683032207cd0b1b10abe49d0a408feb34a406022ce5c9940510e7ae64734c49a,2024-09-26T20:08:31.863000
|
||||
CVE-2024-7424,1,1,a5be6e0eb0636ef17810581d3d0e44463aa0f37467006df96791ddc29bf14501,2024-11-01T08:15:11.647000
|
||||
CVE-2024-7424,0,0,a5be6e0eb0636ef17810581d3d0e44463aa0f37467006df96791ddc29bf14501,2024-11-01T08:15:11.647000
|
||||
CVE-2024-7426,0,0,6a71007700c4116b380e5f6e6a7f1695f7459185616f96253328245521427764,2024-09-30T14:17:51.317000
|
||||
CVE-2024-7427,0,0,db7ee0ecad2784af038bf44c17fdbe281451988802f60a362e8cf5f513055a51,2024-08-23T18:46:31.730000
|
||||
CVE-2024-7428,0,0,6dbc394d0d800a640022319856b0e52c143a4490c0eebfb1fe7dd2cce04fb45f,2024-08-23T18:46:31.730000
|
||||
@ -267619,7 +267623,7 @@ CVE-2024-9647,0,0,6da0b5c2c888d90e6f29cb1f98cdc0c7a4315eaaa058e1c781c3c46d5b8615
|
||||
CVE-2024-9649,0,0,f2ab83afff02bfae827ac0ac8958125c0d2707e9b7d72806aa0e09daf73ca0d7,2024-10-16T16:38:14.557000
|
||||
CVE-2024-9650,0,0,c785e5c8b40ec3a7d0b9a0e25f6978363c5dcc2fc6507b9c6a2c03a208ac34e9,2024-10-25T12:56:07.750000
|
||||
CVE-2024-9652,0,0,096af9c07df6f24ff5a9459bed95d6ce45b4a430b6f907d5bc85c0d2be3b93b5,2024-10-16T16:38:14.557000
|
||||
CVE-2024-9655,1,1,bd7102085fae8d08a785f742ef0c0b0c3f0acc32ec2662bdb03ce71482a86442,2024-11-01T08:15:12.047000
|
||||
CVE-2024-9655,0,0,bd7102085fae8d08a785f742ef0c0b0c3f0acc32ec2662bdb03ce71482a86442,2024-11-01T08:15:12.047000
|
||||
CVE-2024-9656,0,0,0baa2843f7043c4ebd829d23f2741f972b762b755442a0f0f83539eb7761035b,2024-10-15T12:57:46.880000
|
||||
CVE-2024-9670,0,0,f306c0fbbcbde1e6a65006fd3bdd50d366f02be816ff2a6f00ef3348b3b76328,2024-10-15T12:57:46.880000
|
||||
CVE-2024-9671,0,0,421f1b0ad6825ff096efd81ac122f33bafcdf7b21693a85f65613389bca55f89,2024-10-10T12:51:56.987000
|
||||
|
||||
|
Can't render this file because it is too large.
|
Loading…
x
Reference in New Issue
Block a user