mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-05-08 19:47:09 +00:00
Auto-Update: 2024-05-22T12:00:37.213937+00:00
This commit is contained in:
parent
44fbe97d69
commit
865d1b4233
55
CVE-2024/CVE-2024-41xx/CVE-2024-4153.json
Normal file
55
CVE-2024/CVE-2024-41xx/CVE-2024-4153.json
Normal file
@ -0,0 +1,55 @@
|
||||
{
|
||||
"id": "CVE-2024-4153",
|
||||
"sourceIdentifier": "security@huntr.dev",
|
||||
"published": "2024-05-22T10:15:08.647",
|
||||
"lastModified": "2024-05-22T10:15:08.647",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A vulnerability in lunary-ai/lunary version 1.2.2 allows attackers to bypass user creation limits and potentially evade payment requirements. The issue arises from an undefined behavior when handling input to the API, specifically through a POST request to the /v1/users endpoint. By crafting a request with a new user's email and assigning them an 'admin' role, attackers can invite additional users beyond the set limit. This vulnerability could be exploited to add an unlimited number of users without adhering to the intended restrictions."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV30": [
|
||||
{
|
||||
"source": "security@huntr.dev",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.0",
|
||||
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 4.3,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 1.4
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security@huntr.dev",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-475"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://huntr.com/bounties/336db0ae-fe33-44b9-ba9d-bf117e0d90c4",
|
||||
"source": "security@huntr.dev"
|
||||
}
|
||||
]
|
||||
}
|
47
CVE-2024/CVE-2024-42xx/CVE-2024-4262.json
Normal file
47
CVE-2024/CVE-2024-42xx/CVE-2024-4262.json
Normal file
@ -0,0 +1,47 @@
|
||||
{
|
||||
"id": "CVE-2024-4262",
|
||||
"sourceIdentifier": "security@wordfence.com",
|
||||
"published": "2024-05-22T10:15:09.583",
|
||||
"lastModified": "2024-05-22T10:15:09.583",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "The Piotnet Addons For Elementor plugin for WordPress is vulnerable to Stored Cross-Site Scripting via multiple widgets in all versions up to, and including, 2.4.28 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security@wordfence.com",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 7.2,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 2.7
|
||||
}
|
||||
]
|
||||
},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&new=3088562%40piotnet-addons-for-elementor&old=3048934%40piotnet-addons-for-elementor&sfp_email=&sfph_mail=",
|
||||
"source": "security@wordfence.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/812cc8f1-f89e-47c4-b029-f6a3dbc55d70?source=cve",
|
||||
"source": "security@wordfence.com"
|
||||
}
|
||||
]
|
||||
}
|
92
CVE-2024/CVE-2024-51xx/CVE-2024-5193.json
Normal file
92
CVE-2024/CVE-2024-51xx/CVE-2024-5193.json
Normal file
@ -0,0 +1,92 @@
|
||||
{
|
||||
"id": "CVE-2024-5193",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2024-05-22T11:15:53.487",
|
||||
"lastModified": "2024-05-22T11:15:53.487",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A vulnerability was found in Ritlabs TinyWeb Server 1.94. It has been classified as problematic. Affected is an unknown function of the component Request Handler. The manipulation with the input %0D%0A leads to crlf injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. VDB-265830 is the identifier assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 5.3,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 1.4
|
||||
}
|
||||
],
|
||||
"cvssMetricV2": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "2.0",
|
||||
"vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N",
|
||||
"accessVector": "NETWORK",
|
||||
"accessComplexity": "LOW",
|
||||
"authentication": "NONE",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "PARTIAL",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 5.0
|
||||
},
|
||||
"baseSeverity": "MEDIUM",
|
||||
"exploitabilityScore": 10.0,
|
||||
"impactScore": 2.9,
|
||||
"acInsufInfo": false,
|
||||
"obtainAllPrivilege": false,
|
||||
"obtainUserPrivilege": false,
|
||||
"obtainOtherPrivilege": false,
|
||||
"userInteractionRequired": false
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-93"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/DMCERTCE/CRLF_Tiny",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.265830",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.265830",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?submit.333059",
|
||||
"source": "cna@vuldb.com"
|
||||
}
|
||||
]
|
||||
}
|
92
CVE-2024/CVE-2024-51xx/CVE-2024-5194.json
Normal file
92
CVE-2024/CVE-2024-51xx/CVE-2024-5194.json
Normal file
@ -0,0 +1,92 @@
|
||||
{
|
||||
"id": "CVE-2024-5194",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2024-05-22T11:15:53.797",
|
||||
"lastModified": "2024-05-22T11:15:53.797",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A vulnerability was found in Arris VAP2500 08.50. It has been declared as critical. Affected by this vulnerability is an unknown functionality of the file /assoc_table.php. The manipulation of the argument id leads to command injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-265831."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:L",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "HIGH",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "LOW",
|
||||
"baseScore": 4.7,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 1.2,
|
||||
"impactScore": 3.4
|
||||
}
|
||||
],
|
||||
"cvssMetricV2": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "2.0",
|
||||
"vectorString": "AV:N/AC:L/Au:M/C:P/I:P/A:P",
|
||||
"accessVector": "NETWORK",
|
||||
"accessComplexity": "LOW",
|
||||
"authentication": "MULTIPLE",
|
||||
"confidentialityImpact": "PARTIAL",
|
||||
"integrityImpact": "PARTIAL",
|
||||
"availabilityImpact": "PARTIAL",
|
||||
"baseScore": 5.8
|
||||
},
|
||||
"baseSeverity": "MEDIUM",
|
||||
"exploitabilityScore": 6.4,
|
||||
"impactScore": 6.4,
|
||||
"acInsufInfo": false,
|
||||
"obtainAllPrivilege": false,
|
||||
"obtainUserPrivilege": false,
|
||||
"obtainOtherPrivilege": false,
|
||||
"userInteractionRequired": false
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-77"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/h0e4a0r1t/h0e4a0r1t.github.io/blob/master/2024/a%2B%26%5BE4%3Flp5%3Fk9_%3D%5D/ARRIS_VAP2500-RCE-assoc_table.php.pdf",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.265831",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.265831",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?submit.335252",
|
||||
"source": "cna@vuldb.com"
|
||||
}
|
||||
]
|
||||
}
|
92
CVE-2024/CVE-2024-51xx/CVE-2024-5195.json
Normal file
92
CVE-2024/CVE-2024-51xx/CVE-2024-5195.json
Normal file
@ -0,0 +1,92 @@
|
||||
{
|
||||
"id": "CVE-2024-5195",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2024-05-22T11:15:54.063",
|
||||
"lastModified": "2024-05-22T11:15:54.063",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A vulnerability was found in Arris VAP2500 08.50. It has been rated as critical. Affected by this issue is some unknown functionality of the file /diag_s.php. The manipulation of the argument customer_info leads to command injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-265832."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:L",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "HIGH",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "LOW",
|
||||
"baseScore": 4.7,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 1.2,
|
||||
"impactScore": 3.4
|
||||
}
|
||||
],
|
||||
"cvssMetricV2": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "2.0",
|
||||
"vectorString": "AV:N/AC:L/Au:M/C:P/I:P/A:P",
|
||||
"accessVector": "NETWORK",
|
||||
"accessComplexity": "LOW",
|
||||
"authentication": "MULTIPLE",
|
||||
"confidentialityImpact": "PARTIAL",
|
||||
"integrityImpact": "PARTIAL",
|
||||
"availabilityImpact": "PARTIAL",
|
||||
"baseScore": 5.8
|
||||
},
|
||||
"baseSeverity": "MEDIUM",
|
||||
"exploitabilityScore": 6.4,
|
||||
"impactScore": 6.4,
|
||||
"acInsufInfo": false,
|
||||
"obtainAllPrivilege": false,
|
||||
"obtainUserPrivilege": false,
|
||||
"obtainOtherPrivilege": false,
|
||||
"userInteractionRequired": false
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-77"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/h0e4a0r1t/h0e4a0r1t.github.io/blob/master/2024/a%2B%26%5BE4%3Flp5%3Fk9_%3D%5D/ARRIS_VAP2500-RCE-diag_s.php.pdf",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.265832",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.265832",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?submit.335253",
|
||||
"source": "cna@vuldb.com"
|
||||
}
|
||||
]
|
||||
}
|
41
README.md
41
README.md
@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours.
|
||||
### Last Repository Update
|
||||
|
||||
```plain
|
||||
2024-05-22T10:00:55.465278+00:00
|
||||
2024-05-22T12:00:37.213937+00:00
|
||||
```
|
||||
|
||||
### Most recent CVE Modification Timestamp synchronized with NVD
|
||||
|
||||
```plain
|
||||
2024-05-22T09:15:13.350000+00:00
|
||||
2024-05-22T11:15:54.063000+00:00
|
||||
```
|
||||
|
||||
### Last Data Feed Release
|
||||
@ -33,45 +33,24 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
|
||||
### Total Number of included CVEs
|
||||
|
||||
```plain
|
||||
251440
|
||||
251445
|
||||
```
|
||||
|
||||
### CVEs added in the last Commit
|
||||
|
||||
Recently added CVEs: `41`
|
||||
Recently added CVEs: `5`
|
||||
|
||||
- [CVE-2021-47490](CVE-2021/CVE-2021-474xx/CVE-2021-47490.json) (`2024-05-22T09:15:10.837`)
|
||||
- [CVE-2021-47491](CVE-2021/CVE-2021-474xx/CVE-2021-47491.json) (`2024-05-22T09:15:10.917`)
|
||||
- [CVE-2021-47492](CVE-2021/CVE-2021-474xx/CVE-2021-47492.json) (`2024-05-22T09:15:11.030`)
|
||||
- [CVE-2021-47493](CVE-2021/CVE-2021-474xx/CVE-2021-47493.json) (`2024-05-22T09:15:11.100`)
|
||||
- [CVE-2021-47494](CVE-2021/CVE-2021-474xx/CVE-2021-47494.json) (`2024-05-22T09:15:11.270`)
|
||||
- [CVE-2021-47495](CVE-2021/CVE-2021-474xx/CVE-2021-47495.json) (`2024-05-22T09:15:11.353`)
|
||||
- [CVE-2021-47496](CVE-2021/CVE-2021-474xx/CVE-2021-47496.json) (`2024-05-22T09:15:11.447`)
|
||||
- [CVE-2021-47497](CVE-2021/CVE-2021-474xx/CVE-2021-47497.json) (`2024-05-22T09:15:11.513`)
|
||||
- [CVE-2021-47498](CVE-2021/CVE-2021-474xx/CVE-2021-47498.json) (`2024-05-22T09:15:11.673`)
|
||||
- [CVE-2023-6487](CVE-2023/CVE-2023-64xx/CVE-2023-6487.json) (`2024-05-22T08:15:08.687`)
|
||||
- [CVE-2024-0632](CVE-2024/CVE-2024-06xx/CVE-2024-0632.json) (`2024-05-22T08:15:08.890`)
|
||||
- [CVE-2024-2036](CVE-2024/CVE-2024-20xx/CVE-2024-2036.json) (`2024-05-22T09:15:11.793`)
|
||||
- [CVE-2024-2119](CVE-2024/CVE-2024-21xx/CVE-2024-2119.json) (`2024-05-22T08:15:09.083`)
|
||||
- [CVE-2024-2163](CVE-2024/CVE-2024-21xx/CVE-2024-2163.json) (`2024-05-22T08:15:09.390`)
|
||||
- [CVE-2024-2953](CVE-2024/CVE-2024-29xx/CVE-2024-2953.json) (`2024-05-22T08:15:09.587`)
|
||||
- [CVE-2024-32988](CVE-2024/CVE-2024-329xx/CVE-2024-32988.json) (`2024-05-22T08:15:10.080`)
|
||||
- [CVE-2024-3495](CVE-2024/CVE-2024-34xx/CVE-2024-3495.json) (`2024-05-22T09:15:12.073`)
|
||||
- [CVE-2024-3666](CVE-2024/CVE-2024-36xx/CVE-2024-3666.json) (`2024-05-22T08:15:10.170`)
|
||||
- [CVE-2024-3671](CVE-2024/CVE-2024-36xx/CVE-2024-3671.json) (`2024-05-22T08:15:10.370`)
|
||||
- [CVE-2024-4157](CVE-2024/CVE-2024-41xx/CVE-2024-4157.json) (`2024-05-22T08:15:10.557`)
|
||||
- [CVE-2024-4362](CVE-2024/CVE-2024-43xx/CVE-2024-4362.json) (`2024-05-22T09:15:12.393`)
|
||||
- [CVE-2024-4896](CVE-2024/CVE-2024-48xx/CVE-2024-4896.json) (`2024-05-22T09:15:12.790`)
|
||||
- [CVE-2024-5025](CVE-2024/CVE-2024-50xx/CVE-2024-5025.json) (`2024-05-22T09:15:13.043`)
|
||||
- [CVE-2024-5031](CVE-2024/CVE-2024-50xx/CVE-2024-5031.json) (`2024-05-22T09:15:13.350`)
|
||||
- [CVE-2024-5147](CVE-2024/CVE-2024-51xx/CVE-2024-5147.json) (`2024-05-22T08:15:10.743`)
|
||||
- [CVE-2024-4153](CVE-2024/CVE-2024-41xx/CVE-2024-4153.json) (`2024-05-22T10:15:08.647`)
|
||||
- [CVE-2024-4262](CVE-2024/CVE-2024-42xx/CVE-2024-4262.json) (`2024-05-22T10:15:09.583`)
|
||||
- [CVE-2024-5193](CVE-2024/CVE-2024-51xx/CVE-2024-5193.json) (`2024-05-22T11:15:53.487`)
|
||||
- [CVE-2024-5194](CVE-2024/CVE-2024-51xx/CVE-2024-5194.json) (`2024-05-22T11:15:53.797`)
|
||||
- [CVE-2024-5195](CVE-2024/CVE-2024-51xx/CVE-2024-5195.json) (`2024-05-22T11:15:54.063`)
|
||||
|
||||
|
||||
### CVEs modified in the last Commit
|
||||
|
||||
Recently modified CVEs: `1`
|
||||
Recently modified CVEs: `0`
|
||||
|
||||
- [CVE-2024-30314](CVE-2024/CVE-2024-303xx/CVE-2024-30314.json) (`2024-05-22T08:15:09.777`)
|
||||
|
||||
|
||||
## Download and Usage
|
||||
|
89
_state.csv
89
_state.csv
@ -187262,31 +187262,31 @@ CVE-2021-47470,0,0,d083cf16900a5216e03da6f3ed62384dca4e2d0e9c39ff197bf41e808c9fb
|
||||
CVE-2021-47471,0,0,9ee03c51af7d18e00273471680c41c5b49df0135ce33db5a2dbddc854998b946,2024-05-22T07:15:11.847000
|
||||
CVE-2021-47472,0,0,a949eaece50397d0eeaa5d41ec8cb0309977a88ffdefcfd4ec005f1cd15fbb47,2024-05-22T07:15:11.927000
|
||||
CVE-2021-47473,0,0,a73e05a8050a1a5ca4e6d248bf00c043edd78e1466582051849236aad25632d7,2024-05-22T07:15:12.027000
|
||||
CVE-2021-47474,1,1,f6980134a11e4264e7193acfbcbe672ad59f981651a792b05cddb2fef2eb073b,2024-05-22T09:15:09.287000
|
||||
CVE-2021-47475,1,1,46d5921f99f087a8417d1f571cdc26f971ac1a5c038655f6835f0f30404a4d48,2024-05-22T09:15:09.370000
|
||||
CVE-2021-47476,1,1,68a3a3391e869e10508fb3654c8cb287338ae938b4a5d9f65fa58445f057bc09,2024-05-22T09:15:09.470000
|
||||
CVE-2021-47477,1,1,63432c7d1fa997ca0e347af642c2d66476f56ae07a3d2f96d58637d94434c675,2024-05-22T09:15:09.677000
|
||||
CVE-2021-47478,1,1,5ae485c1dbcf11ce85eed9f93f747bbe8f9ec6f406fe2b89d56cbf09068f22c4,2024-05-22T09:15:09.747000
|
||||
CVE-2021-47479,1,1,b2be501d0139c4242d3840571f72ca27fbb01c871c25e3a13417d0844854a1d4,2024-05-22T09:15:09.817000
|
||||
CVE-2021-47480,1,1,b7af5ba64a32b7491118b0c45e7399e1846017b514e11de5bd43d64bceef5f45,2024-05-22T09:15:09.907000
|
||||
CVE-2021-47481,1,1,71f43b86885587bea7aff7d69da71e1165ff0d6eae4a0cf35e7452a28cc6adb9,2024-05-22T09:15:10.070000
|
||||
CVE-2021-47482,1,1,753ad2d62f1d48bf3c8272fb9df376ea663e03d79080add4e039410033bb63d6,2024-05-22T09:15:10.150000
|
||||
CVE-2021-47483,1,1,a53cf7f06886114002818c361869df9c019592d28c5b440cc77385bd8d211f4c,2024-05-22T09:15:10.227000
|
||||
CVE-2021-47484,1,1,a3bce181bd89edac4280eadc46d3fbc918f7e47b42575736885e48f4c5d07a0b,2024-05-22T09:15:10.317000
|
||||
CVE-2021-47485,1,1,2bb2dd4ab25283b8e3583653cfbb6e5c04df5aaa91f778ad0854149426cfbfaf,2024-05-22T09:15:10.503000
|
||||
CVE-2021-47486,1,1,a42f2d403a8f596a5c61208f1192fcb89ea540794c7cc85ccdbd6f8d005f414a,2024-05-22T09:15:10.573000
|
||||
CVE-2021-47487,1,1,b7d9333eb827c7e01a0aa1e1207c9a7e9b364ad7fa3ccf52694968a61ca3cf4d,2024-05-22T09:15:10.633000
|
||||
CVE-2021-47488,1,1,d20ad62163de9afd777d0fcbb785bd3ba654a79174481d7adbafca3d2e1067b1,2024-05-22T09:15:10.700000
|
||||
CVE-2021-47489,1,1,96542c7921d066de2515da4fec163d9e86170bc67e2a4c9cfb67acc96910f731,2024-05-22T09:15:10.770000
|
||||
CVE-2021-47490,1,1,0c9a3fbdf5af2c9a2f46637dd0816a67b2154befaa6d8e7262f9a6142d181751,2024-05-22T09:15:10.837000
|
||||
CVE-2021-47491,1,1,b2f6337ccadc67fb01fd9b64ea1b8b46ca042c0e022526d949b627165b9ff3c6,2024-05-22T09:15:10.917000
|
||||
CVE-2021-47492,1,1,3ba28c0ee5d99fd6cfba59f239c2bad8d4603e898525c6a5b8d2ee9e3d93f2b3,2024-05-22T09:15:11.030000
|
||||
CVE-2021-47493,1,1,6f62736816423b1a41ae8e5b7c644cbcf98efc071265ad5ec26d6002d078d24c,2024-05-22T09:15:11.100000
|
||||
CVE-2021-47494,1,1,20f8c549d17e1e44598ecbbee3cc644356dab8eb53af53dd32844973b16cf481,2024-05-22T09:15:11.270000
|
||||
CVE-2021-47495,1,1,81bde961a7122df0e4d95059a674ad2c444d12cb2ca2994465420dda78e93ee5,2024-05-22T09:15:11.353000
|
||||
CVE-2021-47496,1,1,e6782e58c244c9f1d902cacd4272ca376904ab8bfcce2168be024bbbaf8a27dc,2024-05-22T09:15:11.447000
|
||||
CVE-2021-47497,1,1,9d14120aa2c2a5f196ffda9357020e213c4ad62e425721a5f6789e6f04bcfd3a,2024-05-22T09:15:11.513000
|
||||
CVE-2021-47498,1,1,43fe2a329a45c5b6e8cb46eb44bb91ef951425c534e2b4b261a3fcbc87f01149,2024-05-22T09:15:11.673000
|
||||
CVE-2021-47474,0,0,f6980134a11e4264e7193acfbcbe672ad59f981651a792b05cddb2fef2eb073b,2024-05-22T09:15:09.287000
|
||||
CVE-2021-47475,0,0,46d5921f99f087a8417d1f571cdc26f971ac1a5c038655f6835f0f30404a4d48,2024-05-22T09:15:09.370000
|
||||
CVE-2021-47476,0,0,68a3a3391e869e10508fb3654c8cb287338ae938b4a5d9f65fa58445f057bc09,2024-05-22T09:15:09.470000
|
||||
CVE-2021-47477,0,0,63432c7d1fa997ca0e347af642c2d66476f56ae07a3d2f96d58637d94434c675,2024-05-22T09:15:09.677000
|
||||
CVE-2021-47478,0,0,5ae485c1dbcf11ce85eed9f93f747bbe8f9ec6f406fe2b89d56cbf09068f22c4,2024-05-22T09:15:09.747000
|
||||
CVE-2021-47479,0,0,b2be501d0139c4242d3840571f72ca27fbb01c871c25e3a13417d0844854a1d4,2024-05-22T09:15:09.817000
|
||||
CVE-2021-47480,0,0,b7af5ba64a32b7491118b0c45e7399e1846017b514e11de5bd43d64bceef5f45,2024-05-22T09:15:09.907000
|
||||
CVE-2021-47481,0,0,71f43b86885587bea7aff7d69da71e1165ff0d6eae4a0cf35e7452a28cc6adb9,2024-05-22T09:15:10.070000
|
||||
CVE-2021-47482,0,0,753ad2d62f1d48bf3c8272fb9df376ea663e03d79080add4e039410033bb63d6,2024-05-22T09:15:10.150000
|
||||
CVE-2021-47483,0,0,a53cf7f06886114002818c361869df9c019592d28c5b440cc77385bd8d211f4c,2024-05-22T09:15:10.227000
|
||||
CVE-2021-47484,0,0,a3bce181bd89edac4280eadc46d3fbc918f7e47b42575736885e48f4c5d07a0b,2024-05-22T09:15:10.317000
|
||||
CVE-2021-47485,0,0,2bb2dd4ab25283b8e3583653cfbb6e5c04df5aaa91f778ad0854149426cfbfaf,2024-05-22T09:15:10.503000
|
||||
CVE-2021-47486,0,0,a42f2d403a8f596a5c61208f1192fcb89ea540794c7cc85ccdbd6f8d005f414a,2024-05-22T09:15:10.573000
|
||||
CVE-2021-47487,0,0,b7d9333eb827c7e01a0aa1e1207c9a7e9b364ad7fa3ccf52694968a61ca3cf4d,2024-05-22T09:15:10.633000
|
||||
CVE-2021-47488,0,0,d20ad62163de9afd777d0fcbb785bd3ba654a79174481d7adbafca3d2e1067b1,2024-05-22T09:15:10.700000
|
||||
CVE-2021-47489,0,0,96542c7921d066de2515da4fec163d9e86170bc67e2a4c9cfb67acc96910f731,2024-05-22T09:15:10.770000
|
||||
CVE-2021-47490,0,0,0c9a3fbdf5af2c9a2f46637dd0816a67b2154befaa6d8e7262f9a6142d181751,2024-05-22T09:15:10.837000
|
||||
CVE-2021-47491,0,0,b2f6337ccadc67fb01fd9b64ea1b8b46ca042c0e022526d949b627165b9ff3c6,2024-05-22T09:15:10.917000
|
||||
CVE-2021-47492,0,0,3ba28c0ee5d99fd6cfba59f239c2bad8d4603e898525c6a5b8d2ee9e3d93f2b3,2024-05-22T09:15:11.030000
|
||||
CVE-2021-47493,0,0,6f62736816423b1a41ae8e5b7c644cbcf98efc071265ad5ec26d6002d078d24c,2024-05-22T09:15:11.100000
|
||||
CVE-2021-47494,0,0,20f8c549d17e1e44598ecbbee3cc644356dab8eb53af53dd32844973b16cf481,2024-05-22T09:15:11.270000
|
||||
CVE-2021-47495,0,0,81bde961a7122df0e4d95059a674ad2c444d12cb2ca2994465420dda78e93ee5,2024-05-22T09:15:11.353000
|
||||
CVE-2021-47496,0,0,e6782e58c244c9f1d902cacd4272ca376904ab8bfcce2168be024bbbaf8a27dc,2024-05-22T09:15:11.447000
|
||||
CVE-2021-47497,0,0,9d14120aa2c2a5f196ffda9357020e213c4ad62e425721a5f6789e6f04bcfd3a,2024-05-22T09:15:11.513000
|
||||
CVE-2021-47498,0,0,43fe2a329a45c5b6e8cb46eb44bb91ef951425c534e2b4b261a3fcbc87f01149,2024-05-22T09:15:11.673000
|
||||
CVE-2022-0001,0,0,d8fdf66a3692474461fa30afb4569bb8513a7a0b04c6840c7e2c146df6b5709c,2024-04-09T15:15:26.797000
|
||||
CVE-2022-0002,0,0,4ba989879ca817729e7cddc36d35dc20834fb13fd71d0cce189890fe2defbd53,2022-08-19T12:28:50.667000
|
||||
CVE-2022-0004,0,0,49c52ff3575738b86482113493a7c3a40cb78eb0fdff68408b97beece4f065c8,2022-06-10T20:52:37.810000
|
||||
@ -239386,7 +239386,7 @@ CVE-2023-6483,0,0,4d97a6b64ab24b94d49daa44a79554fbeead9ae7d46cd7c731ffa4efefc488
|
||||
CVE-2023-6484,0,0,2c119840d40968eec205848ee270c3cc58aa5f321bf1404cf5065a0a44a09592,2024-04-25T17:25:05.903000
|
||||
CVE-2023-6485,0,0,d84b1f2fa339ee3fbe00211d49269bf9012e27d7ef753ce7f80b70bff072340c,2024-01-08T19:31:52.377000
|
||||
CVE-2023-6486,0,0,c81210cab8dc9e396502360bc8e7405406f09e8235326da2aa05788514a5507a,2024-04-10T13:24:00.070000
|
||||
CVE-2023-6487,1,1,dcfb724969dfb37a56d524d6b6e7c607939a99ff5fbeac4c3bdcff391c01a682,2024-05-22T08:15:08.687000
|
||||
CVE-2023-6487,0,0,dcfb724969dfb37a56d524d6b6e7c607939a99ff5fbeac4c3bdcff391c01a682,2024-05-22T08:15:08.687000
|
||||
CVE-2023-6488,0,0,a2d2155218f4cd12cbd7cf86a1d373ca9d8739c736f0c67e222296ebea42699d,2023-12-22T19:30:36.993000
|
||||
CVE-2023-6489,0,0,8be5137422e44d9e775f7530defb6286a84af9abdf8da8a38a11072ad60f9cbc,2024-04-12T12:43:57.400000
|
||||
CVE-2023-6493,0,0,f1b44774d19dee2dde0db6057c1c8da6a9052c466b0c843005cf7e84e74e5bad,2024-01-10T15:10:40.807000
|
||||
@ -240532,7 +240532,7 @@ CVE-2024-0628,0,0,6929f2a7a44b9bc6b3b457ec8d478ddb1d9368f01ad7383ad0399a751f8868
|
||||
CVE-2024-0629,0,0,f56201e6826667fe713f864f6ba3053fc186d9ef801a5f82ecef869bbb380e44,2024-05-02T18:00:37.360000
|
||||
CVE-2024-0630,0,0,49e9d42e1e8004a90a8d62b54ea8a5d5f6ebecab9fac26e6e82dc914d2e02636,2024-02-13T15:42:35.563000
|
||||
CVE-2024-0631,0,0,a93d19933a511a51c218d396d78958f6493e1f093b61b401d8813f21718183cd,2024-03-13T18:16:18.563000
|
||||
CVE-2024-0632,1,1,8c1005cf6a30e9f17c5dd7eac34c437cc43eddabaabe5461f2dcd54c9411134e,2024-05-22T08:15:08.890000
|
||||
CVE-2024-0632,0,0,8c1005cf6a30e9f17c5dd7eac34c437cc43eddabaabe5461f2dcd54c9411134e,2024-05-22T08:15:08.890000
|
||||
CVE-2024-0637,0,0,8b6a9ea293833b99a76d0d5105049529d1d487f237b8a00872bc6facec20336f,2024-04-02T12:50:42.233000
|
||||
CVE-2024-0638,0,0,1066b82db7b2fb723ddfc4d7280ddd1713d8c78a8a819b5a0dddde6bdfc2e44d,2024-03-22T12:45:36.130000
|
||||
CVE-2024-0639,0,0,70e6108a4833d98566f9bceea8a86b5fbfb00264d1679279f76ea7c5de48b4aa,2024-02-14T13:15:08.107000
|
||||
@ -241862,7 +241862,7 @@ CVE-2024-20356,0,0,520a5229b5523a4caebc12a2a13fabbd3ee32baa429880796f24d4f599838
|
||||
CVE-2024-20357,0,0,3a1d2757f67674d091902d27d845115a7046a8d266fe0b3daa6615e60c820655,2024-05-01T19:50:25.633000
|
||||
CVE-2024-20358,0,0,a08433ecd9375b9385be343adba44e1b907ae2f57b9c630ccf362a5c87517062,2024-04-30T14:47:57.753000
|
||||
CVE-2024-20359,0,0,103c2bc1c6783d5aa055ed80504c27ea24cb5bf5556deb17c85950666ec17e99,2024-04-26T15:25:02.773000
|
||||
CVE-2024-2036,1,1,31cb37f2a6dcefe10e057e85ca0649129c41bc95897882faa70c6df0db8a3c6c,2024-05-22T09:15:11.793000
|
||||
CVE-2024-2036,0,0,31cb37f2a6dcefe10e057e85ca0649129c41bc95897882faa70c6df0db8a3c6c,2024-05-22T09:15:11.793000
|
||||
CVE-2024-20362,0,0,0e125a5f57daca09b3a31c24c5285918bb46201f033defe636102ce0379b9ecc,2024-04-03T17:24:18.150000
|
||||
CVE-2024-20366,0,0,847482c81cd89b351ccec66c9f3c8d8074954a0de68a5d98d408eebff09cee32,2024-05-15T18:35:11.453000
|
||||
CVE-2024-20367,0,0,e44fa9dcd83189ac4bb0284b57ce6be9f7d161e3fd46e74e477fe5fd623ca1b7,2024-04-03T17:24:18.150000
|
||||
@ -242349,7 +242349,7 @@ CVE-2024-2115,0,0,d143f7e37acad4fe03aa4c56d721ecbb114e211aea88a809faac9f70095e94
|
||||
CVE-2024-2116,0,0,0a8927d2c3af56415377e26a49eef636f1c80d9f9b3374c561d3bce1d3a48066,2024-03-29T12:45:02.937000
|
||||
CVE-2024-2117,0,0,d94804a9fc0846420aec73bfb7661886dd6c525cbdcae51571bcd3adf1a56a79,2024-04-10T13:23:38.787000
|
||||
CVE-2024-2118,0,0,cc7239e1911b2fedd7efefc2bcf43293737a1c458586fdac470d8d5bcdb87f90,2024-04-17T12:48:07.510000
|
||||
CVE-2024-2119,1,1,a061cd602ba39756118ae17f8a1de01c9f74b546024a0a735782fd75f21081d3,2024-05-22T08:15:09.083000
|
||||
CVE-2024-2119,0,0,a061cd602ba39756118ae17f8a1de01c9f74b546024a0a735782fd75f21081d3,2024-05-22T08:15:09.083000
|
||||
CVE-2024-2120,0,0,d869e2d6a05f40fd099ef5d11b57f9e00d7f0b266e38148b71c8a447ce60ab1d,2024-03-27T12:29:30.307000
|
||||
CVE-2024-2121,0,0,4e86b6ec3433d288b50b9e9c9587d6707962f4c2d7ff92215a6366c5fd16dc6b,2024-03-27T12:29:30.307000
|
||||
CVE-2024-2123,0,0,50093ae27aa67e742757e304ff2f215cc4cf255fadb869543328103242423601,2024-03-13T12:33:51.697000
|
||||
@ -242600,7 +242600,7 @@ CVE-2024-21626,0,0,c8bd51ac29b12da9569f38947cdbfaa47ec3adb87a3eb413075da6425802e
|
||||
CVE-2024-21627,0,0,61cb5c0ab04f61f684a6ce19809e32bf8eef2ebcf049c111eb7d30fa2ce21275,2024-01-08T19:23:49.707000
|
||||
CVE-2024-21628,0,0,531fad51ac60594757d0dcd00cb9e036bff1c7a673c98629592cd5ae3ef128cb,2024-01-08T19:11:25.070000
|
||||
CVE-2024-21629,0,0,efabd5a2a2a7ee0a6fffb793613ef07f92ec6a605114d50d3eada86bf431051f,2024-01-09T16:37:01.450000
|
||||
CVE-2024-2163,1,1,c6d82a8313a8cbf3fd79a03eebef303e0e23f84212cd877c8108faab00328e49,2024-05-22T08:15:09.390000
|
||||
CVE-2024-2163,0,0,c6d82a8313a8cbf3fd79a03eebef303e0e23f84212cd877c8108faab00328e49,2024-05-22T08:15:09.390000
|
||||
CVE-2024-21630,0,0,aaca6515c1fe548d7d49b09b86e4e1c06c579ec6d3b25ef70225db17e200d0a6,2024-01-31T23:45:38.600000
|
||||
CVE-2024-21631,0,0,e3c690d3d28ac63abe3163adb7bfa3d1a4f0591d931152b0bafd42b76d2a7609,2024-01-10T18:40:48.587000
|
||||
CVE-2024-21632,0,0,4a40596e6dd59e1c6c4c31654569320933b2e991aea76d513ceea0ee3d38dc31,2024-01-09T17:45:20.110000
|
||||
@ -247301,7 +247301,7 @@ CVE-2024-29513,0,0,7d0b5456a65d7516bcebc1ccf632ccaa62f9b5d79d097eacfc825f81358c4
|
||||
CVE-2024-29514,0,0,2d6d3d0a4ae4b5ae40dadfbf4537d707f35bed7e85002b6d4e3d8180d6408f0b,2024-04-02T18:12:16.283000
|
||||
CVE-2024-29515,0,0,79c9f65757e49bdb19c4dcff88d6ba2d524b1951e790ac90d5ffb4f302abcf45,2024-03-26T12:55:05.010000
|
||||
CVE-2024-2952,0,0,faeb1906efee3b92a2f71ac271a2126863489b08c25db3ee495ea566aa1716e7,2024-04-15T18:15:11.027000
|
||||
CVE-2024-2953,1,1,75298627e81ce92ea7366e36052269204d3ab946d19a5618e06077de0a73bc89,2024-05-22T08:15:09.587000
|
||||
CVE-2024-2953,0,0,75298627e81ce92ea7366e36052269204d3ab946d19a5618e06077de0a73bc89,2024-05-22T08:15:09.587000
|
||||
CVE-2024-2954,0,0,297c9bf8798d95f9e2afa5ec16629f7d540183d0c516c52354e99c26b91889b6,2024-03-27T12:29:30.307000
|
||||
CVE-2024-2955,0,0,8ad7db9c0b26dbbc700a371622c4d451c5174086afd5102a6a5729ad29305872,2024-04-19T23:15:10.910000
|
||||
CVE-2024-2956,0,0,1f998613263914bb93c36fc6850584cdfe450d6dc26811c07d743b16483d0fc7,2024-03-27T12:29:30.307000
|
||||
@ -247779,7 +247779,7 @@ CVE-2024-30309,0,0,b045cc13c21fbf23773bc2a57f1ac3e04d9d6fedb3a00268af23b72213c07
|
||||
CVE-2024-30310,0,0,83f49301bae9d9ce1f4f10baaa19cd19c5d8338561e896cd48c650144ecc0173,2024-05-15T16:40:19.330000
|
||||
CVE-2024-30311,0,0,fb349d5ceed5a7cba0e799d3c128e851a64c5766dc3d345b76389dfa8f8216d4,2024-05-15T16:40:19.330000
|
||||
CVE-2024-30312,0,0,9ac108e7201bfbe47657882780e1de8cd9cfb7d1e6c7eed7b60f2c9ebfe5bcdb,2024-05-15T16:40:19.330000
|
||||
CVE-2024-30314,0,1,09ef5ddf388f09a9a7660b2ce8ea59b5aaddc00d37dec034b6cff899e493ef5d,2024-05-22T08:15:09.777000
|
||||
CVE-2024-30314,0,0,09ef5ddf388f09a9a7660b2ce8ea59b5aaddc00d37dec034b6cff899e493ef5d,2024-05-22T08:15:09.777000
|
||||
CVE-2024-30322,0,0,82127178dd2c4390457a625b1b802dc21960ed844c23f33ac3f61e8d8c162a4f,2024-04-03T17:24:18.150000
|
||||
CVE-2024-30323,0,0,4ba71c995b9c718766f72cb8f425ef56f31d70d4141fb317ff1b84d1d4bea62f,2024-04-03T17:24:18.150000
|
||||
CVE-2024-30324,0,0,b34850e80ab56aec12159793bc4cf321b46343aaa9dfe2615612dc24168ff93e,2024-04-03T17:24:18.150000
|
||||
@ -249332,7 +249332,7 @@ CVE-2024-32982,0,0,d3a477dced410d7a5a443daa9a423d734ada3d52524240c629c605e54e2a5
|
||||
CVE-2024-32984,0,0,c1781ab02b497f7ad9edbf8a8951c53661ebdb78ecb66c7cf14dd96168971cad,2024-05-01T13:01:51.263000
|
||||
CVE-2024-32985,0,0,551603a9d573917dc6e8180e1c86e20de47d20027e99828156dce46dac42a764,2024-05-14T16:12:23.490000
|
||||
CVE-2024-32986,0,0,e1deb5dce0a20a0acf4a8da9213d1a6d597cdffb3cc6f869414020bdcaf43631,2024-05-03T12:48:41.067000
|
||||
CVE-2024-32988,1,1,54e6e76391930d07557222e856a5db2cb6bc93dfdda5f5058c118c0fcd1cadb6,2024-05-22T08:15:10.080000
|
||||
CVE-2024-32988,0,0,54e6e76391930d07557222e856a5db2cb6bc93dfdda5f5058c118c0fcd1cadb6,2024-05-22T08:15:10.080000
|
||||
CVE-2024-32989,0,0,506acdc6a7a5fbf0f74597c19aaae856579758431c921ae0bd29de5689f13f54,2024-05-14T16:12:23.490000
|
||||
CVE-2024-3299,0,0,f60f2a80accdd6f345a6a9cd66637eda180121596f90c2e7d75707c9fce20eb6,2024-04-04T16:33:06.610000
|
||||
CVE-2024-32990,0,0,c28c0547bf1581c48cf9bb50b0cf7281764b07f259abad0cc919458ee7c1bf3e,2024-05-14T16:12:23.490000
|
||||
@ -250166,7 +250166,7 @@ CVE-2024-34946,0,0,18a70d63ec6de478ac3f73160a9c6a4992ce9174fd5476f10d8e6c79e1f65
|
||||
CVE-2024-34947,0,0,539e1e6aad54a1db35de8e003bc4484f29bb93f5bc4ea8fcf0c5048cd3598a66,2024-05-20T19:34:58.277000
|
||||
CVE-2024-34948,0,0,9f4b33618188e695ae5a97c685ee42c7e28984a87f8d30cfc34b75bd08747bda,2024-05-20T19:34:58.277000
|
||||
CVE-2024-34949,0,0,72d326b0b4c7a9560fcf9120f24a7554a6820f633c093d04ac1150301b70144f,2024-05-21T19:15:10.173000
|
||||
CVE-2024-3495,1,1,968f7adfc022ad7b506bd3d53d2b1f0bfcc2e515beb0fa96bffb2f94a83607ca,2024-05-22T09:15:12.073000
|
||||
CVE-2024-3495,0,0,968f7adfc022ad7b506bd3d53d2b1f0bfcc2e515beb0fa96bffb2f94a83607ca,2024-05-22T09:15:12.073000
|
||||
CVE-2024-34950,0,0,bce08889c675e02cdedb7c7d716140ca0269187b86ee9ecf74ec425b66e2c63c,2024-05-15T16:15:10.333000
|
||||
CVE-2024-34952,0,0,3c9d295a87597633142e6b921e5c34eec0393b990162ed3cf2ebade30f8ed0fc,2024-05-20T15:17:54.513000
|
||||
CVE-2024-34953,0,0,b659d1f4bcdd460996762ad0137fd32e65b833f81a4c5bfad87bc349e72c126c,2024-05-20T15:17:54.513000
|
||||
@ -250589,9 +250589,9 @@ CVE-2024-3662,0,0,aac492e0cb08799a7f888c46af5bedb595fa2e9ad6dc15c21be50e9dae7006
|
||||
CVE-2024-3663,0,0,21b3db47e94ba63be56d537a952565d6614afba5b4072d75623197a72b559448,2024-05-22T07:15:13.427000
|
||||
CVE-2024-3664,0,0,afb9452532a9b46276f3e123567931f2d9b14afd62c66b887c9d751f65c725bc,2024-04-23T12:52:09.397000
|
||||
CVE-2024-3665,0,0,22dbbd6c0bec2b9f433688ae97b549cd541e7f2d387c3796dd32246c851476cf,2024-04-23T12:52:09.397000
|
||||
CVE-2024-3666,1,1,8d1765647ee8a0f49c7137c1879607b1ab21ed88d20cea657a1d932856ebd181,2024-05-22T08:15:10.170000
|
||||
CVE-2024-3666,0,0,8d1765647ee8a0f49c7137c1879607b1ab21ed88d20cea657a1d932856ebd181,2024-05-22T08:15:10.170000
|
||||
CVE-2024-3670,0,0,c82d0130c8edc16344a78447d1514c5ffe18d421cd344e5799606a7730bedf8c,2024-05-02T18:00:37.360000
|
||||
CVE-2024-3671,1,1,d18d08f7f692f0be03d0314c33898ca2a98052d4b41b5f8da478b5b917eb7454,2024-05-22T08:15:10.370000
|
||||
CVE-2024-3671,0,0,d18d08f7f692f0be03d0314c33898ca2a98052d4b41b5f8da478b5b917eb7454,2024-05-22T08:15:10.370000
|
||||
CVE-2024-3672,0,0,b7de207aaf40bb160711ae23312b83bd4f3d950fbf99cf282ee38b1e3854739f,2024-04-16T13:24:07.103000
|
||||
CVE-2024-3674,0,0,f0fad7a5bda9e15945dde9432e31b1e267affdedcf2e230210a842bcd40fa4e1,2024-05-02T18:00:37.360000
|
||||
CVE-2024-3675,0,0,00d1234baac079cf413c516618dd0fc3e7ad5eadaec0ab200df9e28f23d3ebe2,2024-05-02T18:00:37.360000
|
||||
@ -250896,9 +250896,10 @@ CVE-2024-4142,0,0,6297707db3df670a282f3d4e6720e4836d7467220b5fcc108ef053e6a6308f
|
||||
CVE-2024-4144,0,0,804f070eb7c147c92dd9f6be5c3d4dba7563c2bc35d2c208518fc5d01b232644,2024-05-14T19:17:55.627000
|
||||
CVE-2024-4150,0,0,faed1039ecc56269b946edc3dde84ea0ad72d4967895c1be6d39f317de75f649,2024-05-14T16:11:39.510000
|
||||
CVE-2024-4151,0,0,f7e961d5ed7eda83709e85c6d45d4725690070806f80588455f83f2692b547c6,2024-05-20T15:17:54.513000
|
||||
CVE-2024-4153,1,1,e09c053d38fa2e35137ceab316fe11933ded8e1b3befacdb96be6435a0cc8e56,2024-05-22T10:15:08.647000
|
||||
CVE-2024-4154,0,0,2b55413fae6a11257665a6f37b241007ada395c1dfba1d3f1f6f077199ecaf7a,2024-05-21T18:15:09.987000
|
||||
CVE-2024-4156,0,0,adce86e733c051c288bfe88b689ecb95a01f304de9b2f4b7c4a80ca844fcafa9,2024-05-02T18:00:37.360000
|
||||
CVE-2024-4157,1,1,8d152cb3f7d52f6eac91a7630814007df39541bf90a9fafa9833f84c84b91c34,2024-05-22T08:15:10.557000
|
||||
CVE-2024-4157,0,0,8d152cb3f7d52f6eac91a7630814007df39541bf90a9fafa9833f84c84b91c34,2024-05-22T08:15:10.557000
|
||||
CVE-2024-4158,0,0,e2e18bbc2894b8bc9f7922444db50e4c9e9d54450b012e9427f5b5a6c6168969,2024-05-14T16:11:39.510000
|
||||
CVE-2024-4159,0,0,cf0daf8ecd317ce4288e8a4812364c59b3b10d10c0c5945533667d40be8a71fc,2024-04-25T23:15:47.087000
|
||||
CVE-2024-4161,0,0,8c35858b76cabcd8cf78ed758e4c9d58e5dffa2b20a32ec25b41a43a372b2218,2024-04-25T13:18:13.537000
|
||||
@ -250965,6 +250966,7 @@ CVE-2024-4252,0,0,3896f5ee238bad3d7e0a938dc110cad0a34521ba589448d2dc895a14fc5112
|
||||
CVE-2024-4255,0,0,fe667b23218914fa44fee4b4c2a7be125396fae9094659c59aa2ca90b0b1e450,2024-05-17T02:40:21.147000
|
||||
CVE-2024-4256,0,0,f01b9b3012ce7ea24c9894def6f3f1cef49ac09bb4f57d3ed8f552e5b1070b71,2024-05-17T02:40:21.240000
|
||||
CVE-2024-4257,0,0,0f6d2313bd719b89d901deefe2dc2f87463055c189b3c018795a055e61e9ea45,2024-05-17T02:40:21.330000
|
||||
CVE-2024-4262,1,1,b32f0c0435f9cca56eb9874638e0f49f1fcfcd2a049c704aaf831b020118f71d,2024-05-22T10:15:09.583000
|
||||
CVE-2024-4263,0,0,b1f2b30077721ef2ca6e11fb6bda0f0973b13bae19df9c4c6804c151ec0ef6fb,2024-05-16T13:03:05.353000
|
||||
CVE-2024-4264,0,0,900b6e21a73808decad0bbd9ff6caa01ca608bdbd52b2ff79e0e58d7828f5894,2024-05-20T13:00:34.807000
|
||||
CVE-2024-4265,0,0,91d38fbd7b9c4ea0cd26c0f2028b5e1f8ee8c7d7e1c2c632d6b17cd2b7b69603,2024-05-02T18:00:37.360000
|
||||
@ -251024,7 +251026,7 @@ CVE-2024-4351,0,0,84a993fcb461a8c61255d21736701361dc3f453bf42043de26320f65ada001
|
||||
CVE-2024-4352,0,0,ec2049b13794d7b7eea90d377463d8f5c3179de2c6e69d57554c5eced6269751,2024-05-16T13:03:05.353000
|
||||
CVE-2024-4357,0,0,15f39a23a70c5acc3d08c2f81b16ef69b06f28ee37422807405e1ad546411072,2024-05-15T18:35:11.453000
|
||||
CVE-2024-4361,0,0,73ddfe2adce7d05432def4f47addf8f84eda9a30fdc3baa140fd6866bc8a2a94,2024-05-21T12:37:59.687000
|
||||
CVE-2024-4362,1,1,c0753c7aa0c46c32b5e6f19d3c1dcc01ea05b3705dd8dd07076b507121ff54a4,2024-05-22T09:15:12.393000
|
||||
CVE-2024-4362,0,0,c0753c7aa0c46c32b5e6f19d3c1dcc01ea05b3705dd8dd07076b507121ff54a4,2024-05-22T09:15:12.393000
|
||||
CVE-2024-4363,0,0,d30828b887305e475a68737a9c01556f9e261cb37bd7c595ea12b948125a2ae0,2024-05-15T16:40:19.330000
|
||||
CVE-2024-4367,0,0,10c9ba4e2375d81f02eb3145704f99e298b4c446473517eea4810baa65f2c650,2024-05-14T19:17:55.627000
|
||||
CVE-2024-4368,0,0,0ee02ebde276d817508f5495294b3429c463a1f4241660388e0c329992e72be6,2024-05-04T02:15:06.853000
|
||||
@ -251314,7 +251316,7 @@ CVE-2024-4876,0,0,9001a39aab22b409ed584cd8d039f27b1e6b747a96583eefc2888b2c10c762
|
||||
CVE-2024-4891,0,0,e74bd5bb85af020930d6b90474dcbd5a7bb8df3f51cfa57310da23b320714b43,2024-05-20T13:00:34.807000
|
||||
CVE-2024-4893,0,0,d5ebc2dfcb13b74b4f1951a124d2e638a95f79aa05d19e6fadfe65b7ad1c4f46,2024-05-15T16:40:19.330000
|
||||
CVE-2024-4894,0,0,d68130303d356c053d0f6768d0ee08506e206d16216142c952b9b56af8835d24,2024-05-15T16:40:19.330000
|
||||
CVE-2024-4896,1,1,1353e8d933d318e9e8cb1878e860889688c8bb1a335adabba6a308b6e14950a7,2024-05-22T09:15:12.790000
|
||||
CVE-2024-4896,0,0,1353e8d933d318e9e8cb1878e860889688c8bb1a335adabba6a308b6e14950a7,2024-05-22T09:15:12.790000
|
||||
CVE-2024-4903,0,0,9a411d9f215d13d2c422791efc5893252c00fbd9ad8c56cc74522677d5819e4f,2024-05-17T02:40:40.423000
|
||||
CVE-2024-4904,0,0,6b2e400045aa483c1c0238ef1875b5106ef715ac4df10d8cb60a7ffbc3253def,2024-05-17T02:40:40.593000
|
||||
CVE-2024-4905,0,0,c8d3f56247176a0faaa4363c4f8f6e54f572303d8192373422058cd6010a0a4d,2024-05-17T02:40:40.690000
|
||||
@ -251379,8 +251381,8 @@ CVE-2024-4998,0,0,e12f9512d41da053bcfd5626dd0ee21afd4da3e61146c4f0c8f9da42ca3dff
|
||||
CVE-2024-4999,0,0,1bac5cc77e7ceb1bce6c078fbd59e76f5556984ef2124d365e8638bfa6b6fdfa,2024-05-16T15:44:44.683000
|
||||
CVE-2024-5022,0,0,9e02130cf05d676b5c8898329efaaca24e3406d8d5cca2b1697e64026c2597d5,2024-05-20T13:00:34.807000
|
||||
CVE-2024-5023,0,0,8a009556226fb3a8db34c89f2c81c00194e37cbb488f592bc6c5fcb2858827b6,2024-05-17T18:36:31.297000
|
||||
CVE-2024-5025,1,1,5461b220af60be8a1873d65dc8a4d9f60ec267328778bbf85a04883509d1a2e4,2024-05-22T09:15:13.043000
|
||||
CVE-2024-5031,1,1,647dce8214d4f8b6806214211d1c5983d761bcb72deeea2d1d089395578f816c,2024-05-22T09:15:13.350000
|
||||
CVE-2024-5025,0,0,5461b220af60be8a1873d65dc8a4d9f60ec267328778bbf85a04883509d1a2e4,2024-05-22T09:15:13.043000
|
||||
CVE-2024-5031,0,0,647dce8214d4f8b6806214211d1c5983d761bcb72deeea2d1d089395578f816c,2024-05-22T09:15:13.350000
|
||||
CVE-2024-5040,0,0,ac8e606543004bdb343ce1c2fd1b051de65eedfbef16ac288852c89d96896a07,2024-05-21T21:15:08.370000
|
||||
CVE-2024-5042,0,0,27a33d52aff97cbc1335c5396fe3b9d872eeba307810610cda5e242af54fedf3,2024-05-20T06:15:08.723000
|
||||
CVE-2024-5043,0,0,1549dcef14aaf00f978f9b329e75db70cc135ff357fc4aa1cb4c9164977ddb0f,2024-05-17T18:35:35.070000
|
||||
@ -251437,5 +251439,8 @@ CVE-2024-5135,0,0,68cf9bdf9dec0a96d7d353e92a3ea23735e4dfab71f12aba03f45faad350b4
|
||||
CVE-2024-5136,0,0,7e1453b58a6b8cdb889318a17e467bc4887e911147f2bbd5898eefe5c0fc0fa9,2024-05-20T13:00:04.957000
|
||||
CVE-2024-5137,0,0,9ef636c571a0277ac03884ccb19a37de0ac2ceab7c0195ff8a91e587e734c012,2024-05-20T13:00:04.957000
|
||||
CVE-2024-5145,0,0,779a53179978014855de22e41604c12feef2bb6901d36d253a629d55b7b44ab6,2024-05-21T12:37:59.687000
|
||||
CVE-2024-5147,1,1,8be58f5aaa20d2d81a7940ad3294059e044dbc164a57df5188b30bf66839b317,2024-05-22T08:15:10.743000
|
||||
CVE-2024-5147,0,0,8be58f5aaa20d2d81a7940ad3294059e044dbc164a57df5188b30bf66839b317,2024-05-22T08:15:10.743000
|
||||
CVE-2024-5190,0,0,e11755e15485ad7d65ed59ac9abe5cac7f4b4c3e2591d1a6c69b4386ed9dea65,2024-05-22T03:15:08.273000
|
||||
CVE-2024-5193,1,1,0c9bea365458ad3b9a55eb9b7e2190edbce83a630331b9aa7e6f41476e208d47,2024-05-22T11:15:53.487000
|
||||
CVE-2024-5194,1,1,7a89665f6562da7e465f9252354d51e52725257ca8374ca6c277786ab6e05e50,2024-05-22T11:15:53.797000
|
||||
CVE-2024-5195,1,1,0dc2dd6113d3c14ec0a7bf0658982f9f9f2cfa05a612a4b985c76ec4cc01139e,2024-05-22T11:15:54.063000
|
||||
|
Can't render this file because it is too large.
|
Loading…
x
Reference in New Issue
Block a user