mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-05-08 19:47:09 +00:00
Auto-Update: 2024-10-28T07:00:19.420329+00:00
This commit is contained in:
parent
13c31ed6a5
commit
8688904c75
@ -2,13 +2,13 @@
|
||||
"id": "CVE-2023-33237",
|
||||
"sourceIdentifier": "psirt@moxa.com",
|
||||
"published": "2023-08-17T02:15:41.177",
|
||||
"lastModified": "2023-08-22T19:10:04.453",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2024-10-28T06:15:02.730",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "TN-5900 Series firmware version v3.3 and prior is vulnerable to improper-authentication vulnerability. This vulnerability arises from inadequate authentication measures implemented in the web API handler, allowing low-privileged APIs to execute restricted actions that only high-privileged APIs are allowed This presents a potential risk of unauthorized exploitation by malicious actors.\u00a0\n"
|
||||
"value": "TN-5900 Series firmware version v3.3 and prior is vulnerable to improper-authentication vulnerability. This vulnerability arises from inadequate authentication measures implemented in the web API handler, allowing low-privileged APIs to execute restricted actions that only high-privileged APIs are allowed This presents a potential risk of unauthorized exploitation by malicious actors."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
@ -72,7 +72,7 @@
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-287"
|
||||
"value": "CWE-863"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -2,13 +2,13 @@
|
||||
"id": "CVE-2023-33238",
|
||||
"sourceIdentifier": "psirt@moxa.com",
|
||||
"published": "2023-08-17T03:15:09.377",
|
||||
"lastModified": "2023-08-22T19:10:24.183",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2024-10-28T06:15:03.147",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "TN-4900 Series firmware versions v1.2.4 and prior and TN-5900 Series firmware versions v3.3 and prior are vulnerable to the command injection vulnerability. This vulnerability stems from inadequate input validation in the certificate management function, which could potentially allow malicious users to execute remote code on affected devices.\n\n"
|
||||
"value": "TN-4900 Series firmware versions v1.2.4 and prior and TN-5900 Series firmware versions v3.3 and prior are vulnerable to the command injection vulnerability. This vulnerability stems from inadequate input validation in the certificate management function, which could potentially allow malicious users to execute remote code on affected devices."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
@ -72,7 +72,7 @@
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-77"
|
||||
"value": "CWE-78"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -2,13 +2,13 @@
|
||||
"id": "CVE-2023-33239",
|
||||
"sourceIdentifier": "psirt@moxa.com",
|
||||
"published": "2023-08-17T03:15:09.580",
|
||||
"lastModified": "2023-08-22T18:51:19.917",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2024-10-28T06:15:03.393",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "TN-4900 Series firmware versions v1.2.4 and prior and TN-5900 Series firmware versions v3.3 and prior are vulnerable to the command injection vulnerability. This vulnerability stems from insufficient input validation in the key-generation function, which could potentially allow malicious users to execute remote code on affected devices.\n\n"
|
||||
"value": "TN-4900 Series firmware versions v1.2.4 and prior and TN-5900 Series firmware versions v3.3 and prior are vulnerable to the command injection vulnerability. This vulnerability stems from insufficient input validation in the key-generation function, which could potentially allow malicious users to execute remote code on affected devices."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
@ -72,7 +72,7 @@
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-77"
|
||||
"value": "CWE-78"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -2,13 +2,13 @@
|
||||
"id": "CVE-2023-34213",
|
||||
"sourceIdentifier": "psirt@moxa.com",
|
||||
"published": "2023-08-17T03:15:09.663",
|
||||
"lastModified": "2023-08-22T18:51:41.683",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2024-10-28T06:15:03.600",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "TN-5900 Series firmware versions v3.3 and prior are vulnerable to command-injection vulnerability. This vulnerability stems from insufficient input validation and improper authentication in the key-generation function, which could potentially allow malicious users to execute remote code on affected devices.\u00a0\n"
|
||||
"value": "TN-5900 Series firmware versions v3.3 and prior are vulnerable to command-injection vulnerability. This vulnerability stems from insufficient input validation and improper authentication in the key-generation function, which could potentially allow malicious users to execute remote code on affected devices."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
@ -72,7 +72,7 @@
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-77"
|
||||
"value": "CWE-78"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-34214",
|
||||
"sourceIdentifier": "psirt@moxa.com",
|
||||
"published": "2023-08-17T03:15:09.747",
|
||||
"lastModified": "2023-08-22T19:05:01.607",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2024-10-28T06:15:03.760",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -72,7 +72,7 @@
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-77"
|
||||
"value": "CWE-78"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -2,13 +2,13 @@
|
||||
"id": "CVE-2023-34215",
|
||||
"sourceIdentifier": "psirt@moxa.com",
|
||||
"published": "2023-08-17T07:15:42.333",
|
||||
"lastModified": "2023-08-23T15:11:31.647",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2024-10-28T06:15:03.950",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "TN-5900 Series firmware versions v3.3 and prior are vulnerable to the command-injection vulnerability. This vulnerability stems from insufficient input validation and improper authentication in the certification-generation function, which could potentially allow malicious users to execute remote code on affected devices.\u00a0\n"
|
||||
"value": "TN-5900 Series firmware versions v3.3 and prior are vulnerable to the command-injection vulnerability. This vulnerability stems from insufficient input validation and improper authentication in the certification-generation function, which could potentially allow malicious users to execute remote code on affected devices."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
@ -72,7 +72,7 @@
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-77"
|
||||
"value": "CWE-78"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -2,13 +2,13 @@
|
||||
"id": "CVE-2023-39981",
|
||||
"sourceIdentifier": "psirt@moxa.com",
|
||||
"published": "2023-09-02T13:15:45.257",
|
||||
"lastModified": "2023-09-07T20:38:42.433",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2024-10-28T06:15:04.167",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A vulnerability that allows for unauthorized access has been discovered in MXsecurity versions prior to v1.0.1. This vulnerability arises from inadequate authentication measures, potentially leading to the disclosure of device information by a remote attacker.\n\n"
|
||||
"value": "A vulnerability that allows for unauthorized access has been discovered in MXsecurity versions prior to v1.0.1. This vulnerability arises from inadequate authentication measures, potentially leading to the disclosure of device information by a remote attacker."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
@ -76,7 +76,7 @@
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-287"
|
||||
"value": "CWE-306"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -2,13 +2,13 @@
|
||||
"id": "CVE-2023-4227",
|
||||
"sourceIdentifier": "psirt@moxa.com",
|
||||
"published": "2023-08-24T06:15:44.177",
|
||||
"lastModified": "2023-08-29T23:39:20.507",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2024-10-28T06:15:04.370",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A vulnerability has been identified in the ioLogik 4000 Series (ioLogik E4200) firmware versions v1.6 and prior, which can be exploited by malicious actors to potentially gain unauthorized access to the product. This could lead to security breaches, data theft, and unauthorized manipulation of sensitive information. The vulnerability is attributed to the presence of an unauthorized service, which could potentially enable unauthorized access to the. device.\n\n"
|
||||
"value": "A vulnerability has been identified in the ioLogik 4000 Series (ioLogik E4200) firmware versions v1.6 and prior, which can be exploited by malicious actors to potentially gain unauthorized access to the product. This could lead to security breaches, data theft, and unauthorized manipulation of sensitive information. The vulnerability is attributed to the presence of an unauthorized service, which could potentially enable unauthorized access to the. device."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
@ -72,7 +72,7 @@
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-284"
|
||||
"value": "CWE-489"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
56
CVE-2024/CVE-2024-503xx/CVE-2024-50307.json
Normal file
56
CVE-2024/CVE-2024-503xx/CVE-2024-50307.json
Normal file
@ -0,0 +1,56 @@
|
||||
{
|
||||
"id": "CVE-2024-50307",
|
||||
"sourceIdentifier": "vultures@jpcert.or.jp",
|
||||
"published": "2024-10-28T05:15:03.203",
|
||||
"lastModified": "2024-10-28T05:15:03.203",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Use of potentially dangerous function issue exists in Chatwork Desktop Application (Windows) versions prior to 2.9.2. If a user clicks a specially crafted link in the application, an arbitrary file may be downloaded from an external website and executed. As a result, arbitrary code may be executed on the device that runs Chatwork Desktop Application (Windows)."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV30": [
|
||||
{
|
||||
"source": "vultures@jpcert.or.jp",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.0",
|
||||
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:L",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "LOW",
|
||||
"baseScore": 5.5,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.1,
|
||||
"impactScore": 3.4
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "vultures@jpcert.or.jp",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-676"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://jvn.jp/en/jp/JVN78335885/",
|
||||
"source": "vultures@jpcert.or.jp"
|
||||
}
|
||||
]
|
||||
}
|
72
CVE-2024/CVE-2024-91xx/CVE-2024-9162.json
Normal file
72
CVE-2024/CVE-2024-91xx/CVE-2024-9162.json
Normal file
@ -0,0 +1,72 @@
|
||||
{
|
||||
"id": "CVE-2024-9162",
|
||||
"sourceIdentifier": "security@wordfence.com",
|
||||
"published": "2024-10-28T06:15:04.593",
|
||||
"lastModified": "2024-10-28T06:15:04.593",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "The All-in-One WP Migration and Backup plugin for WordPress is vulnerable to arbitrary PHP Code Injection due to missing file type validation during the export in all versions up to, and including, 7.86. This makes it possible for authenticated attackers, with Administrator-level access and above, to create an export file with the .php extension on the affected site's server, adding an arbitrary PHP code to it, which may make remote code execution possible."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security@wordfence.com",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "HIGH",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 7.2,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 1.2,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security@wordfence.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-94"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/d0n601/CVE-2024-9162",
|
||||
"source": "security@wordfence.com"
|
||||
},
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/browser/all-in-one-wp-migration/trunk/lib/controller/class-ai1wm-backups-controller.php#L60",
|
||||
"source": "security@wordfence.com"
|
||||
},
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/browser/all-in-one-wp-migration/trunk/lib/controller/class-ai1wm-export-controller.php#L36",
|
||||
"source": "security@wordfence.com"
|
||||
},
|
||||
{
|
||||
"url": "https://ryankozak.com/posts/CVE-2024-9162",
|
||||
"source": "security@wordfence.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/d97c3379-56c9-4261-9a70-3119ec121a40?source=cve",
|
||||
"source": "security@wordfence.com"
|
||||
}
|
||||
]
|
||||
}
|
24
README.md
24
README.md
@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours.
|
||||
### Last Repository Update
|
||||
|
||||
```plain
|
||||
2024-10-28T05:00:18.206785+00:00
|
||||
2024-10-28T07:00:19.420329+00:00
|
||||
```
|
||||
|
||||
### Most recent CVE Modification Timestamp synchronized with NVD
|
||||
|
||||
```plain
|
||||
2024-10-28T04:15:02.900000+00:00
|
||||
2024-10-28T06:15:04.593000+00:00
|
||||
```
|
||||
|
||||
### Last Data Feed Release
|
||||
@ -33,23 +33,29 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
|
||||
### Total Number of included CVEs
|
||||
|
||||
```plain
|
||||
267215
|
||||
267217
|
||||
```
|
||||
|
||||
### CVEs added in the last Commit
|
||||
|
||||
Recently added CVEs: `4`
|
||||
Recently added CVEs: `2`
|
||||
|
||||
- [CVE-2024-10438](CVE-2024/CVE-2024-104xx/CVE-2024-10438.json) (`2024-10-28T03:15:02.423`)
|
||||
- [CVE-2024-10439](CVE-2024/CVE-2024-104xx/CVE-2024-10439.json) (`2024-10-28T03:15:02.700`)
|
||||
- [CVE-2024-10440](CVE-2024/CVE-2024-104xx/CVE-2024-10440.json) (`2024-10-28T03:15:02.920`)
|
||||
- [CVE-2024-48936](CVE-2024/CVE-2024-489xx/CVE-2024-48936.json) (`2024-10-28T04:15:02.900`)
|
||||
- [CVE-2024-50307](CVE-2024/CVE-2024-503xx/CVE-2024-50307.json) (`2024-10-28T05:15:03.203`)
|
||||
- [CVE-2024-9162](CVE-2024/CVE-2024-91xx/CVE-2024-9162.json) (`2024-10-28T06:15:04.593`)
|
||||
|
||||
|
||||
### CVEs modified in the last Commit
|
||||
|
||||
Recently modified CVEs: `0`
|
||||
Recently modified CVEs: `8`
|
||||
|
||||
- [CVE-2023-33237](CVE-2023/CVE-2023-332xx/CVE-2023-33237.json) (`2024-10-28T06:15:02.730`)
|
||||
- [CVE-2023-33238](CVE-2023/CVE-2023-332xx/CVE-2023-33238.json) (`2024-10-28T06:15:03.147`)
|
||||
- [CVE-2023-33239](CVE-2023/CVE-2023-332xx/CVE-2023-33239.json) (`2024-10-28T06:15:03.393`)
|
||||
- [CVE-2023-34213](CVE-2023/CVE-2023-342xx/CVE-2023-34213.json) (`2024-10-28T06:15:03.600`)
|
||||
- [CVE-2023-34214](CVE-2023/CVE-2023-342xx/CVE-2023-34214.json) (`2024-10-28T06:15:03.760`)
|
||||
- [CVE-2023-34215](CVE-2023/CVE-2023-342xx/CVE-2023-34215.json) (`2024-10-28T06:15:03.950`)
|
||||
- [CVE-2023-39981](CVE-2023/CVE-2023-399xx/CVE-2023-39981.json) (`2024-10-28T06:15:04.167`)
|
||||
- [CVE-2023-4227](CVE-2023/CVE-2023-42xx/CVE-2023-4227.json) (`2024-10-28T06:15:04.370`)
|
||||
|
||||
|
||||
## Download and Usage
|
||||
|
26
_state.csv
26
_state.csv
@ -225387,9 +225387,9 @@ CVE-2023-33231,0,0,09f86d8066d74c7874dbea9cc2ad06aac59a2df7122675bfda30672a291d4
|
||||
CVE-2023-33234,0,0,8c3bc362e58c079b32d4a0791724c2c1cfa09349b40fca7b2ef6d10dc4db9437,2024-10-10T15:35:07.983000
|
||||
CVE-2023-33235,0,0,98d0a7eb19704063a78a382792254db430678a754513fb8bc0821026290e2114,2023-05-30T19:43:02.460000
|
||||
CVE-2023-33236,0,0,4f9a68681c8de805fc0155196f19f195d6dec29aeda4ac774c34b5b3dd85bcb0,2023-05-30T19:29:08.573000
|
||||
CVE-2023-33237,0,0,fc0463edc62e3d49a47d812193c4e183bc8b4a3e3b302f50593f49aa3aecc82b,2023-08-22T19:10:04.453000
|
||||
CVE-2023-33238,0,0,3d52dbc556d53d65b13580609783fc6ae1cb64d0acbfbfc1f7dc9b82743be068,2023-08-22T19:10:24.183000
|
||||
CVE-2023-33239,0,0,14d699a4735331a3e280eeabb333d20c8f269997c63d9a9959364d5b9b81c90a,2023-08-22T18:51:19.917000
|
||||
CVE-2023-33237,0,1,d786704a126da7c25ba580deb1701358e3b2e2a97b7eacf43df307f3c8d43a24,2024-10-28T06:15:02.730000
|
||||
CVE-2023-33238,0,1,e23f1bd98d7f7e5ed0fb1e667344afe549002ede49ee7114f14bd22ddf6369e5,2024-10-28T06:15:03.147000
|
||||
CVE-2023-33239,0,1,509f9663663694c30e325890088cd2291bc09ad0eb3bc26b11c60837fab56fea,2024-10-28T06:15:03.393000
|
||||
CVE-2023-3324,0,0,6b73b02d2dac3432e473dc11300a3534848b4c72ba438443dab98ee4d47ef851,2023-08-01T21:12:32.530000
|
||||
CVE-2023-33240,0,0,045a1b0a2646c41b9b86cb06420a7554d3e32e7c478fbfc3c818013263afca28,2023-05-26T03:32:54.867000
|
||||
CVE-2023-33241,0,0,36b269910f3c9c1e26ec0bc965386c08195bb4a131ae6a62cb3423dec09a53fd,2023-08-25T16:14:33.433000
|
||||
@ -226111,9 +226111,9 @@ CVE-2023-3421,0,0,417c7c373f8932aa81f54dff446323d7be5801a93d8782975947f7650e841a
|
||||
CVE-2023-34210,0,0,eeee0fa065c1a4e8cbe56d44018dbc5b0a10e616aa699f86019997c86a0ee8e1,2023-10-20T18:10:16.097000
|
||||
CVE-2023-34211,0,0,2a2a5ee7504f70b72e2cd36df650acbffcc887587d63620323b0a832ed326a6c,2023-11-07T04:15:32.030000
|
||||
CVE-2023-34212,0,0,715c0da3e46bba861d1484d269db8395d9649d4eb955ec87d30054559a16f619,2023-06-21T15:18:21.630000
|
||||
CVE-2023-34213,0,0,f6fd1f3eb1929943c683e01842644dd1d346f9200ab8f8bff53aa6736361dc08,2023-08-22T18:51:41.683000
|
||||
CVE-2023-34214,0,0,3fa1ee0012d55a14442bcc7ae0e1d6cd5aa3ba099d9c2deb40d4b3990eca712d,2023-08-22T19:05:01.607000
|
||||
CVE-2023-34215,0,0,04366b7653206890dde45fa9d3d65b4f1ca5e443b36107a5fd685aaf3facba3a,2023-08-23T15:11:31.647000
|
||||
CVE-2023-34213,0,1,20f7f931529ef727e7d5ed1d42e7e2515a23e174f9b2aef22b1c248451a87681,2024-10-28T06:15:03.600000
|
||||
CVE-2023-34214,0,1,33bd3d106bb4347c4cfd2deb7619243b31842c80f6dc7c994608d09a95fc1ad8,2024-10-28T06:15:03.760000
|
||||
CVE-2023-34215,0,1,9b3ef8552f1949951f63537780f8a1032e1f05b11b8850d7f888124885babcac,2024-10-28T06:15:03.950000
|
||||
CVE-2023-34216,0,0,04143175a518bdc966e71697d423aa3c36a68752a5ed7f27337e8bf2e7b2de15,2023-08-23T15:08:57.020000
|
||||
CVE-2023-34217,0,0,6540d2b8e3c6c22014690c6f01d3e5e3f1c60d4a6482d20e1adf6ce4450b54d7,2023-08-23T16:41:43.143000
|
||||
CVE-2023-34218,0,0,a9d7a0cfbb6bf18280940bed045aba8fda347fa1ce99ee0bff3d76c33785b9d9,2023-06-06T20:02:39.667000
|
||||
@ -230355,7 +230355,7 @@ CVE-2023-39978,0,0,6a57c413fca429aa0b904c11231329cb75471b6bdf3919c3fb4662ce94920
|
||||
CVE-2023-39979,0,0,28ba0e888954da30fd1114720a4d4ec97a7abc002585512616eb63d2f2e943b4,2023-09-07T20:16:28.350000
|
||||
CVE-2023-3998,0,0,1f43d7ee043779eb60cd321b7ac366db37948e4caeb09b7d4bfe80c2001f4f53,2023-11-07T04:20:06.317000
|
||||
CVE-2023-39980,0,0,dc0997ef40d03680f823152a64bb0472a38a140bfa52cf5b05dff64b94503ab7,2023-09-07T20:29:10.830000
|
||||
CVE-2023-39981,0,0,b331b82f2aae162d4e8c1b519e4fb59d32b65febd5175fe03d9a23374418cdd8,2023-09-07T20:38:42.433000
|
||||
CVE-2023-39981,0,1,42ff74f872e17f113d20bc5fb66bb21db4a56462c34eee11fb347b4d4c23b12d,2024-10-28T06:15:04.167000
|
||||
CVE-2023-39982,0,0,a75711da5dea31a3f2bb1f5e3f7ad3190c7297abb86acc601851b03379c4c260,2023-09-08T13:23:36.153000
|
||||
CVE-2023-39983,0,0,e03990be69dfc1acd00d2500a11f172019b4a412cee0b915d28071580822e25d,2023-09-08T14:22:27.980000
|
||||
CVE-2023-39984,0,0,9d662b11d581fc3abb1f1d8a77fed29b0424ab98a622e0ca8931efb2871fb556,2024-09-27T02:15:09.777000
|
||||
@ -232151,7 +232151,7 @@ CVE-2023-42253,0,0,ddc0ec667c1a768417786714deb5cbd25861a4a1519c75ff38636e887b869
|
||||
CVE-2023-4226,0,0,505e49d9f96a99b76056cf6143d350619626a79924b032cb4fc6b5070876540d,2023-11-30T05:34:06.420000
|
||||
CVE-2023-42261,0,0,ee0b962b4658d438acb083a2e057d2bd12f4a7a5c718ad7d73fe4169295bf0fd,2024-08-02T20:15:22.350000
|
||||
CVE-2023-42268,0,0,10c990470b2c8e37165632758ea54865ff15431c80a09a197502127ff6a705ee,2023-09-12T19:24:30.050000
|
||||
CVE-2023-4227,0,0,99b56eb01b0335c7bef00d7258143b3d9d9000addcb35f453d761b09779e5739,2023-08-29T23:39:20.507000
|
||||
CVE-2023-4227,0,1,89f0ffe537dad0662f1e6172b0b52367161bbc1f13b5d4fb284d1de2b91c8e49,2024-10-28T06:15:04.370000
|
||||
CVE-2023-42270,0,0,6e55386a1608989e07c7a0163c6d3f0e92bb9c9576b1d8ab571f5b606ef526e1,2024-02-02T17:15:10.793000
|
||||
CVE-2023-42276,0,0,c9c2e6d3b0979901fa51e9964c0d2dda78aedc2948212e936e72edafaed63e10,2023-09-13T00:35:56.567000
|
||||
CVE-2023-42277,0,0,23f6694014a4ba84370488d128c7e22c34f27bb61d711b5ff8e85b61b84137b9,2023-09-13T00:32:07.417000
|
||||
@ -242574,10 +242574,10 @@ CVE-2024-10432,0,0,175e5006b422913967545e5fb31c49d6b3bf70970106383d10048f738998e
|
||||
CVE-2024-10433,0,0,f2bd9dbac87bcd113979b3dad23e4d4f9d980c6d32a01dde9df6e2355cb5b3b4,2024-10-28T00:15:03.370000
|
||||
CVE-2024-10434,0,0,958e1d72985d6f66b2ae34339041d042396b48ce52ef4a5dcaf1aba9c695ab6a,2024-10-28T01:15:02.273000
|
||||
CVE-2024-10435,0,0,8eb82f7bfa77addf9e0a737a191fd51dc2cdc1254fe6d4bd0987aa88d36414e0,2024-10-28T01:15:02.600000
|
||||
CVE-2024-10438,1,1,7af26de0910eb98f78176019dbded42c71821887a3625500952ca012332922c3,2024-10-28T03:15:02.423000
|
||||
CVE-2024-10439,1,1,ec4c8c499c8c33926dd498529d66d83f7d3ded7463810a1230d76432dbfea1ef,2024-10-28T03:15:02.700000
|
||||
CVE-2024-10438,0,0,7af26de0910eb98f78176019dbded42c71821887a3625500952ca012332922c3,2024-10-28T03:15:02.423000
|
||||
CVE-2024-10439,0,0,ec4c8c499c8c33926dd498529d66d83f7d3ded7463810a1230d76432dbfea1ef,2024-10-28T03:15:02.700000
|
||||
CVE-2024-1044,0,0,aabb10708db1db153d691de2620429bf76b48269bc86aae28cbf6b6a3c047729,2024-02-29T13:49:29.390000
|
||||
CVE-2024-10440,1,1,6ff183f0eda9074a78e6c3d9f92b0fc387c2a9c66a6a6d4b104e87261d49cc53,2024-10-28T03:15:02.920000
|
||||
CVE-2024-10440,0,0,6ff183f0eda9074a78e6c3d9f92b0fc387c2a9c66a6a6d4b104e87261d49cc53,2024-10-28T03:15:02.920000
|
||||
CVE-2024-1046,0,0,2cc4ec780c94e2fc2c5a11377d58ffcde319d06f8567f8dea25dd56811075522,2024-02-13T19:44:34.880000
|
||||
CVE-2024-1047,0,0,9e4259d94ff11bf1ad41662d7bc4dfa8d24742c305a04d1b6bfc3e99b49e569b,2024-02-08T14:20:23.387000
|
||||
CVE-2024-1048,0,0,2f01cec4b27d0961417641b66cfc5a0fef8e061182b01c0d7a954dc28bdc8a2f,2024-09-16T16:15:12.907000
|
||||
@ -262946,7 +262946,7 @@ CVE-2024-48930,0,0,c7b6cd0340da2631ccf07a7015b8cf581a1e5f29f6a6b1ff9f3168b16f8d9
|
||||
CVE-2024-48931,0,0,cb76da7947433082044eb8eab7c26fb2f1f77c9a2e73af320a6686276ae68e56,2024-10-25T12:56:07.750000
|
||||
CVE-2024-48932,0,0,f03344868acfc16b73af3784b9a6263628e84052cd2b89fcb271042dea382c8d,2024-10-25T12:56:07.750000
|
||||
CVE-2024-48933,0,0,eab55cc4133fd12eb852707496206c0c064cf1bfef188e95346821cf2dadf897,2024-10-15T18:56:52.363000
|
||||
CVE-2024-48936,1,1,2ae17fa08d3bb51f630d16f0842456757f9012ca78ae7fa3516e9986ec43e5cf,2024-10-28T04:15:02.900000
|
||||
CVE-2024-48936,0,0,2ae17fa08d3bb51f630d16f0842456757f9012ca78ae7fa3516e9986ec43e5cf,2024-10-28T04:15:02.900000
|
||||
CVE-2024-48937,0,0,53216fc8a6fbe5febb4c086d6958028e95a58513bdf6caced98eaac34038db0e,2024-10-17T19:48:11.163000
|
||||
CVE-2024-48938,0,0,42546c0230f7c9740d6f2b303141b0c584cd79f3d515c30c7b8554d560fc1ee9,2024-10-17T19:49:56.327000
|
||||
CVE-2024-4894,0,0,1906244d072f236ffca4e7ab82222b86cb7f201e42e01d4517f3ab933ca907f5,2024-05-15T16:40:19.330000
|
||||
@ -263496,6 +263496,7 @@ CVE-2024-5023,0,0,63ebd4218020d01998ceddb622d35154b9496df68f9db12eb6b4711fe09e7d
|
||||
CVE-2024-5024,0,0,9dd3417f324a3df55f488e05c68d1854a15dd73bd49fdda06475c54e037a76e5,2024-09-04T14:33:57.200000
|
||||
CVE-2024-5025,0,0,5975a4de967bb092ff1a32c8663c734972c139617eb709a92a7c0cc78b284359,2024-05-22T12:46:53.887000
|
||||
CVE-2024-5028,0,0,6e4747168a055d3478d0389157f1378a0e5efd7245fc9814fa65e0cf7f805db7,2024-08-01T13:59:38.360000
|
||||
CVE-2024-50307,1,1,97c3c548388a7bdbb1e7fef32d811a287b7adf85e781a4eb64e2c5a6e3d3da49,2024-10-28T05:15:03.203000
|
||||
CVE-2024-5031,0,0,5b0fce1eabb88a37a871d927606cb4ca5166c3808ddca60f777848c692bab12e,2024-05-22T12:46:53.887000
|
||||
CVE-2024-50311,0,0,2a5a791ea9a6ed953dd59786f3feebf3d6f42a9a801f740efbdba1fdb4b4c644,2024-10-23T15:12:34.673000
|
||||
CVE-2024-50312,0,0,e1c46649456e4db99a8bc5fe6e245d8f0cb367071dbc5cb51f03a7f5cb1f8348,2024-10-23T15:12:34.673000
|
||||
@ -266770,6 +266771,7 @@ CVE-2024-9156,0,0,a219412140ed669efa4745f4f28cc6c7900dfc19ec3ad1e09069c0d323d2ba
|
||||
CVE-2024-9158,0,0,4fc7d51e8c01309b5be37e99b987b450b97283230cd81ff5464aaed45b24a100,2024-10-07T16:13:49.027000
|
||||
CVE-2024-9160,0,0,dcb08097a2707d90887b21cc5ab80eb6cf86ff84abb571a9a69f82310c298b71,2024-09-30T12:45:57.823000
|
||||
CVE-2024-9161,0,0,b475702d9da1cd18a82129e88647b71b0425c30925f01e0c024257c76be8d651,2024-10-07T17:48:28.117000
|
||||
CVE-2024-9162,1,1,fb4d55a666ac6f68fb059c5d9e29459f2a7c9ce73430c76a9e244f0a8dbfc808,2024-10-28T06:15:04.593000
|
||||
CVE-2024-9164,0,0,22a852044a02fa2bf2a1f004c8f4e0e1dbd359605b1a68593f6ac0ec4a57bdec,2024-10-15T12:58:51.050000
|
||||
CVE-2024-9166,0,0,b24f9ebc4650fb7d123f858805d8b1a753ef6a732064f8b14cd979bccf2c240a,2024-09-30T12:46:20.237000
|
||||
CVE-2024-9167,0,0,c76cdd3c3965eaf83c5e43b4dbbb850b39e5a19995695c4b4450dc70c8263305,2024-10-10T12:56:30.817000
|
||||
|
Can't render this file because it is too large.
|
Loading…
x
Reference in New Issue
Block a user