mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-07-09 16:05:11 +00:00
Auto-Update: 2024-09-19T06:00:16.863787+00:00
This commit is contained in:
parent
4fc8c2ba45
commit
8990204982
60
CVE-2022/CVE-2022-45xx/CVE-2022-4533.json
Normal file
60
CVE-2022/CVE-2022-45xx/CVE-2022-4533.json
Normal file
@ -0,0 +1,60 @@
|
||||
{
|
||||
"id": "CVE-2022-4533",
|
||||
"sourceIdentifier": "security@wordfence.com",
|
||||
"published": "2024-09-19T04:15:05.860",
|
||||
"lastModified": "2024-09-19T04:15:05.860",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "The Limit Login Attempts Plus plugin for WordPress is vulnerable to IP Address Spoofing in versions up to, and including, 1.1.0. This is due to insufficient restrictions on where the IP Address information is being retrieved for request logging and login restrictions. Attackers can supply the X-Forwarded-For header with with a different IP Address that will be logged and can be used to bypass settings that may have blocked out an IP address or country from logging in."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security@wordfence.com",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 5.3,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 1.4
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security@wordfence.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-348"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/browser/limit-login-attempts-plus/trunk/core/LimitLoginAttempts.php#L1043",
|
||||
"source": "security@wordfence.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/aec7b59f-1c8a-4403-b33b-c119bd96ad9d?source=cve",
|
||||
"source": "security@wordfence.com"
|
||||
}
|
||||
]
|
||||
}
|
33
CVE-2024/CVE-2024-469xx/CVE-2024-46946.json
Normal file
33
CVE-2024/CVE-2024-469xx/CVE-2024-46946.json
Normal file
@ -0,0 +1,33 @@
|
||||
{
|
||||
"id": "CVE-2024-46946",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-09-19T05:15:11.857",
|
||||
"lastModified": "2024-09-19T05:15:11.857",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "langchain_experimental (aka LangChain Experimental) 0.1.17 through 0.3.0 for LangChain allows attackers to execute arbitrary code through sympy.sympify (which uses eval) in LLMSymbolicMathChain. LLMSymbolicMathChain was introduced in fcccde406dd9e9b05fc9babcbeb9ff527b0ec0c6 (2023-10-05)."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://cwe.mitre.org/data/definitions/95.html",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://docs.sympy.org/latest/modules/codegen.html",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://gist.github.com/12end/68c0c58d2564ef4141bccd4651480820#file-cve-2024-46946-txt",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/langchain-ai/langchain/releases/tag/langchain-experimental%3D%3D0.3.0",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
64
CVE-2024/CVE-2024-83xx/CVE-2024-8364.json
Normal file
64
CVE-2024/CVE-2024-83xx/CVE-2024-8364.json
Normal file
@ -0,0 +1,64 @@
|
||||
{
|
||||
"id": "CVE-2024-8364",
|
||||
"sourceIdentifier": "security@wordfence.com",
|
||||
"published": "2024-09-19T04:15:06.270",
|
||||
"lastModified": "2024-09-19T04:15:06.270",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "The WP Custom Fields Search plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's wpcfs-preset shortcode in all versions up to, and including, 1.2.35 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security@wordfence.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 6.4,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 3.1,
|
||||
"impactScore": 2.7
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security@wordfence.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/browser/wp-custom-fields-search/trunk/plugin.php#L53",
|
||||
"source": "security@wordfence.com"
|
||||
},
|
||||
{
|
||||
"url": "https://wordpress.org/plugins/wp-custom-fields-search/#developers",
|
||||
"source": "security@wordfence.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/ef36a2a1-b3be-4270-8890-76705817b4b5?source=cve",
|
||||
"source": "security@wordfence.com"
|
||||
}
|
||||
]
|
||||
}
|
64
CVE-2024/CVE-2024-88xx/CVE-2024-8850.json
Normal file
64
CVE-2024/CVE-2024-88xx/CVE-2024-8850.json
Normal file
@ -0,0 +1,64 @@
|
||||
{
|
||||
"id": "CVE-2024-8850",
|
||||
"sourceIdentifier": "security@wordfence.com",
|
||||
"published": "2024-09-19T04:15:06.557",
|
||||
"lastModified": "2024-09-19T04:15:06.557",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "The MC4WP: Mailchimp for WordPress plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via the 'email' parameter when a placeholder such as {email} is used for the field in versions 4.9.9 to 4.9.15 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security@wordfence.com",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 6.1,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 2.7
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security@wordfence.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/browser/mailchimp-for-wp/tags/4.9.16/config/default-form-content.php#L8",
|
||||
"source": "security@wordfence.com"
|
||||
},
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3153075%40mailchimp-for-wp&new=3153075%40mailchimp-for-wp&sfp_email=&sfph_mail=",
|
||||
"source": "security@wordfence.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/1d2ba8ea-a75f-4069-b67d-f832acb1deef?source=cve",
|
||||
"source": "security@wordfence.com"
|
||||
}
|
||||
]
|
||||
}
|
20
README.md
20
README.md
@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours.
|
||||
### Last Repository Update
|
||||
|
||||
```plain
|
||||
2024-09-19T04:00:17.072172+00:00
|
||||
2024-09-19T06:00:16.863787+00:00
|
||||
```
|
||||
|
||||
### Most recent CVE Modification Timestamp synchronized with NVD
|
||||
|
||||
```plain
|
||||
2024-09-19T02:35:32.187000+00:00
|
||||
2024-09-19T05:15:11.857000+00:00
|
||||
```
|
||||
|
||||
### Last Data Feed Release
|
||||
@ -33,25 +33,23 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
|
||||
### Total Number of included CVEs
|
||||
|
||||
```plain
|
||||
263421
|
||||
263425
|
||||
```
|
||||
|
||||
### CVEs added in the last Commit
|
||||
|
||||
Recently added CVEs: `0`
|
||||
Recently added CVEs: `4`
|
||||
|
||||
- [CVE-2022-4533](CVE-2022/CVE-2022-45xx/CVE-2022-4533.json) (`2024-09-19T04:15:05.860`)
|
||||
- [CVE-2024-46946](CVE-2024/CVE-2024-469xx/CVE-2024-46946.json) (`2024-09-19T05:15:11.857`)
|
||||
- [CVE-2024-8364](CVE-2024/CVE-2024-83xx/CVE-2024-8364.json) (`2024-09-19T04:15:06.270`)
|
||||
- [CVE-2024-8850](CVE-2024/CVE-2024-88xx/CVE-2024-8850.json) (`2024-09-19T04:15:06.557`)
|
||||
|
||||
|
||||
### CVEs modified in the last Commit
|
||||
|
||||
Recently modified CVEs: `6`
|
||||
Recently modified CVEs: `0`
|
||||
|
||||
- [CVE-2023-41610](CVE-2023/CVE-2023-416xx/CVE-2023-41610.json) (`2024-09-19T02:35:17.530`)
|
||||
- [CVE-2023-45511](CVE-2023/CVE-2023-455xx/CVE-2023-45511.json) (`2024-09-19T02:35:26.067`)
|
||||
- [CVE-2024-29851](CVE-2024/CVE-2024-298xx/CVE-2024-29851.json) (`2024-09-19T02:35:32.187`)
|
||||
- [CVE-2024-45496](CVE-2024/CVE-2024-454xx/CVE-2024-45496.json) (`2024-09-19T02:15:02.793`)
|
||||
- [CVE-2024-45607](CVE-2024/CVE-2024-456xx/CVE-2024-45607.json) (`2024-09-19T02:05:28.707`)
|
||||
- [CVE-2024-7387](CVE-2024/CVE-2024-73xx/CVE-2024-7387.json) (`2024-09-19T02:15:02.907`)
|
||||
|
||||
|
||||
## Download and Usage
|
||||
|
16
_state.csv
16
_state.csv
@ -209914,6 +209914,7 @@ CVE-2022-45320,0,0,86332dd85b2cfbe963629398e0cf08bee0d12d85c646f1ab6ad9a2add7bda
|
||||
CVE-2022-45326,0,0,fe6a2e80df3508e3c963b0fb62f4bbda18000e14d7327c7cdf358306d46dda13,2022-12-08T16:34:51.260000
|
||||
CVE-2022-45328,0,0,ba18c1e472ebe99fbb3cd9ab39fc2adf0e31fdeca86523f982b6d9dc58b6709e,2022-12-01T23:22:07.887000
|
||||
CVE-2022-45329,0,0,6b07a09d463fac7037e5691e5599cc792bb7a8dcfcb831831de8c1f2261aee8a,2022-11-30T04:58:16.687000
|
||||
CVE-2022-4533,1,1,76d3999274721037b83ac75c5bb59467ac305675ed61a3c60d327eee8a16b28b,2024-09-19T04:15:05.860000
|
||||
CVE-2022-45330,0,0,cd98ddc24a4f7a2a8b2e81c2a45252ce58f305bbc00492852d07bcbfa4fd87c9,2022-11-23T16:04:50.373000
|
||||
CVE-2022-45331,0,0,d56f749377ee32baee9704d453f5cd7e14fbd7458db161db1deffebffb365eef,2022-11-23T16:04:58.820000
|
||||
CVE-2022-45332,0,0,94e4da01e7f2e9d6ba2c8e99622553188f4f4167cbc35169367dcc156794dbb9,2022-12-02T16:00:13.253000
|
||||
@ -231446,7 +231447,7 @@ CVE-2023-41603,0,0,7eae02bcb404653f8cf9e28340ec8a561b47a402fdb727d540cee5e43f7a6
|
||||
CVE-2023-41605,0,0,c09977e342b3399cb054a02d7c15a161158f613f02f666ee1f6dfa3b4009a9cb,2023-11-07T04:21:00.217000
|
||||
CVE-2023-41609,0,0,3bd4e736f9f83dbe7ac5c6a636f09e590cb9ec36b1af4f2b64690d67593848e4,2023-09-14T17:58:35.633000
|
||||
CVE-2023-4161,0,0,7df03f1cfebd5d12fb7dd64830212873f12e24a1c77995358c2ceb34fcbbcca9,2023-11-07T04:22:12.317000
|
||||
CVE-2023-41610,0,1,b7f7a34d68344fcacda56f897b769d9e1f77b8f6d7295930f14e3658a166c532,2024-09-19T02:35:17.530000
|
||||
CVE-2023-41610,0,0,b7f7a34d68344fcacda56f897b769d9e1f77b8f6d7295930f14e3658a166c532,2024-09-19T02:35:17.530000
|
||||
CVE-2023-41611,0,0,ef3eb69758db1d9b28c7123b9952141b7f86bac3088be654c4225e15336606c4,2024-09-18T18:15:05.750000
|
||||
CVE-2023-41612,0,0,77598d5263c6c419dc4441eae8cb7f6904d208d828905d2cbf9e1bd7873a6842,2024-09-18T18:15:05.803000
|
||||
CVE-2023-41613,0,0,14a8003db8756e22aa6e34184a53a524c8848112d2658b820d2d53e6d4a30f92,2023-12-07T21:08:08.163000
|
||||
@ -234055,7 +234056,7 @@ CVE-2023-4550,0,0,3875d2ef928bb2ce7bc2731ff3fd246e8c140e8ac5064f7af0ae86a5a345a2
|
||||
CVE-2023-45503,0,0,0bcc6bee1985b91dfb34ba4df83762a6c6977dcacd78e3459a513da67f8664ae,2024-08-01T13:44:57.620000
|
||||
CVE-2023-4551,0,0,30c450811df944077c61b850656a1ad83903b648c76a118de39bc5f11543f4ad,2024-02-05T22:02:02.550000
|
||||
CVE-2023-45510,0,0,95ec13089e5a8f1f6f38bec4a800643c30de82e9ef02421078bf52c52538a7d0,2024-09-18T19:35:08.307000
|
||||
CVE-2023-45511,0,1,6a83b3b6e8ef3421fb625ab6b3efe4a060ef6fdb1aa115c72fc3336b2273558b,2024-09-19T02:35:26.067000
|
||||
CVE-2023-45511,0,0,6a83b3b6e8ef3421fb625ab6b3efe4a060ef6fdb1aa115c72fc3336b2273558b,2024-09-19T02:35:26.067000
|
||||
CVE-2023-4552,0,0,f0537603c3e5921898d4c4486b214591cfc8340feaf410d7a71774714a6fb778,2024-02-05T21:59:35.087000
|
||||
CVE-2023-4553,0,0,7f7b3a1004c52632b83f35e4ed5b600ac3f6bf55e8037452043bd49f8b38d638,2024-02-05T21:56:14.073000
|
||||
CVE-2023-45539,0,0,14e5807e2e545a12b44e0f4dc1ccdba533d2f724acf1b5d66372955165f5d45d,2023-12-14T17:15:07.860000
|
||||
@ -249867,7 +249868,7 @@ CVE-2024-29848,0,0,572f203a18b60b1fdf8b35785afb572e4ba27bc9b1677d0760a64742aa875
|
||||
CVE-2024-29849,0,0,072b0476443be0a966db74d66f638a80778dd162866abb6662b51c636fbdf995,2024-07-11T15:05:34.760000
|
||||
CVE-2024-2985,0,0,eccd7e0304328f19c740fa6917e6be8e07842d176de854a8967fc91747386345,2024-05-17T02:38:40.683000
|
||||
CVE-2024-29850,0,0,97868bac62290aeeaf47d9bee0575c21786d7518d529b709efa87179f84a22a5,2024-07-03T01:52:48.473000
|
||||
CVE-2024-29851,0,1,a89530d2196122bf2e1df60f524dc0d42f1a66aa656e26ff3129a8660d38d5fc,2024-09-19T02:35:32.187000
|
||||
CVE-2024-29851,0,0,a89530d2196122bf2e1df60f524dc0d42f1a66aa656e26ff3129a8660d38d5fc,2024-09-19T02:35:32.187000
|
||||
CVE-2024-29852,0,0,726c48fca6ecce09ba0891a4732d56a8cd51267214424717a9c0997e21d90cb7,2024-07-03T01:52:49.260000
|
||||
CVE-2024-29853,0,0,c1ae8cba1ec19d8da2e0ffbfe16c680f8b2163da29207d481a72323097831057,2024-07-03T01:52:49.947000
|
||||
CVE-2024-29855,0,0,b2802ced0a558e4f090c6287efb3198501503af3c94eb0da01eddf25e7dcba7e,2024-06-11T13:54:12.057000
|
||||
@ -259905,7 +259906,7 @@ CVE-2024-4549,0,0,e09f9cdaebb6118867e13a9d3ab643eb98c9f9e356cd137ad04d5c4afde157
|
||||
CVE-2024-45490,0,0,4a9544858f8ad52701885faaacc054b024c5e1d139687b3f21fcc2ee9f6ad4a9,2024-09-04T14:28:19.313000
|
||||
CVE-2024-45491,0,0,e460156ea6419a80b45a0f265018e72555b70e117c8be4ee37cb347a447d976e,2024-09-04T14:28:33.953000
|
||||
CVE-2024-45492,0,0,073ca72c9147ce0bd071ae42dd069b817368a461c31ddb6a6a85b43c752a5921,2024-09-04T14:28:41.760000
|
||||
CVE-2024-45496,0,1,08eb19f3f05bf3d568667310a8870040d05f727452352b7dad72f44be07285f7,2024-09-19T02:15:02.793000
|
||||
CVE-2024-45496,0,0,08eb19f3f05bf3d568667310a8870040d05f727452352b7dad72f44be07285f7,2024-09-19T02:15:02.793000
|
||||
CVE-2024-45498,0,0,c0b73fd56e19fc295690d422c61db0b0a34ba9767e31b80f7a635220e3379808,2024-09-09T13:03:38.303000
|
||||
CVE-2024-4550,0,0,15fbc24f09319144879d8500386f895513bfa5772ea62a92e0fabd950300c406,2024-09-14T11:47:14.677000
|
||||
CVE-2024-45504,0,0,d1fb07a3228efd18f7c0af3faab016c97edb9e2da8e02dba547168a8c292ae66,2024-09-10T12:09:50.377000
|
||||
@ -259943,7 +259944,7 @@ CVE-2024-45601,0,0,68a61c7fb218a1533d3e7ba7c27d30ed89f1e5c575368ebb4614ebef9094a
|
||||
CVE-2024-45604,0,0,df9309ebee69f4ec700bb7840ba1cc6f02080f3fc26293d013bd69264df2338d,2024-09-17T20:15:04.893000
|
||||
CVE-2024-45605,0,0,e087e48cc4df76249173d7a618d4b2cb5065b1483d2a45b39541842585093271,2024-09-17T20:15:05.120000
|
||||
CVE-2024-45606,0,0,8b315609968854b688a141eba7c889d1bac462088775a65d9695e6d2d8c00cf9,2024-09-17T20:15:05.393000
|
||||
CVE-2024-45607,0,1,9d199e13e4c36b979d30a8467667e188e65d4bf0165b27173d5a6e5dc2ce7529,2024-09-19T02:05:28.707000
|
||||
CVE-2024-45607,0,0,9d199e13e4c36b979d30a8467667e188e65d4bf0165b27173d5a6e5dc2ce7529,2024-09-19T02:05:28.707000
|
||||
CVE-2024-4561,0,0,8ef61ebc386f7e587b6eb6df8054d64514729591e443c5ac6735c0df58420e0f,2024-05-15T16:40:19.330000
|
||||
CVE-2024-45612,0,0,ef43e3990d9c954ad7bf7532592a25b6df1296840bab862dfc7fa4022c718569,2024-09-17T19:15:28.250000
|
||||
CVE-2024-45615,0,0,c6d6282e5a9613bcbeb55c568082301f30c66c5c3e170d6aa78e0325f2dae6b9,2024-09-13T19:21:15.423000
|
||||
@ -260313,6 +260314,7 @@ CVE-2024-46937,0,0,07fdd1d78aaed903fbff4e5d9a0ce758118188db8683180f256eed71d0649
|
||||
CVE-2024-46938,0,0,9e276dbb5f511d90ea6307dc9981b04eafca4332d1a762536bafb02391c73acc,2024-09-17T15:35:10.980000
|
||||
CVE-2024-46942,0,0,39b03564ad46dfa226521fed6197bd85a5899e9352724095b0a13d9a65f5effe,2024-09-17T15:35:11.740000
|
||||
CVE-2024-46943,0,0,152386ee346108a0b10024e97836216e24787fcc13e07313dcb51a8afe0ec6cb,2024-09-17T15:35:11.950000
|
||||
CVE-2024-46946,1,1,305cc9846ab8bbd287bbeeabd9e5cf07221485fc33fd6738193013b4b18a667e,2024-09-19T05:15:11.857000
|
||||
CVE-2024-4695,0,0,aa253f1bdce79ef626aa7622c4e367006f6b60359a6a2b0af989b23a6e81f980,2024-05-21T12:37:59.687000
|
||||
CVE-2024-46958,0,0,55b6c34933d7f404734afe78f6fca5f500d88d2d153f0079c17dd51e529b774d,2024-09-16T15:30:28.733000
|
||||
CVE-2024-46959,0,0,47d5f83d561a982f4a4be7b405a83d2d9fa4ba828de30b6ae661fef4ddec5ff0,2024-09-18T18:15:06.730000
|
||||
@ -262560,7 +262562,7 @@ CVE-2024-7381,0,0,ca7cc8a67702d68f3387a7110e4857f594b40c8a2313eee62c5e5767902903
|
||||
CVE-2024-7382,0,0,38dbfd05201dede10e421fed3e3b0d675c062e51a3aa3f6428b06fad8a88c553,2024-08-12T13:41:36.517000
|
||||
CVE-2024-7383,0,0,d2737cd69fd6977c5ff3be04ae298e1bf45647197e69a7bb44ed13fcf569259a,2024-09-18T20:15:03.760000
|
||||
CVE-2024-7384,0,0,959c51f9d9089f82b75c53d05c8efe51e41a9d17d895f5f42948ac7d882f9351,2024-08-22T12:48:02.790000
|
||||
CVE-2024-7387,0,1,2bbecf988aac4b1609da665b74805fcbb7b33c409d5852bcd50f317ebbd02244,2024-09-19T02:15:02.907000
|
||||
CVE-2024-7387,0,0,2bbecf988aac4b1609da665b74805fcbb7b33c409d5852bcd50f317ebbd02244,2024-09-19T02:15:02.907000
|
||||
CVE-2024-7388,0,0,f17b6292d40b8d2d9d22865fdbf912ed4604c49db111ea9e78f67fdbb858de85,2024-08-13T12:58:25.437000
|
||||
CVE-2024-7389,0,0,a5776290ae762be985431158def3f2d002b265ca6a95ce830d8f46206854f21a,2024-08-02T12:59:43.990000
|
||||
CVE-2024-7390,0,0,7895dab66ddc704219ddf6d579bba9623189661f47faa0372744a2c8c5dc8ef9,2024-08-21T12:30:33.697000
|
||||
@ -263207,6 +263209,7 @@ CVE-2024-8347,0,0,14715b4855076c65c4bf21be6c68b62e0d22e8650a0e63bf9f5074414663f3
|
||||
CVE-2024-8348,0,0,d08ea1deaed5cbc2f4a773e843468145326bb3a1da186780c7ff7b6cd74aae9b,2024-09-04T16:43:30.310000
|
||||
CVE-2024-8362,0,0,54abf718b9bfba93199694e9f50bfa28d6dfde9a56fb3c77d91594ed8cbda92f,2024-09-04T14:35:16.777000
|
||||
CVE-2024-8363,0,0,01e2f3c42ed63ca762fc774c70d7336df5274e0f5dacdde750731dfd76f769a2,2024-09-11T16:35:05.653000
|
||||
CVE-2024-8364,1,1,3e721283ebe00934a928d8628eb31017a2df2ef87556569b7955e4303aeb1f1e,2024-09-19T04:15:06.270000
|
||||
CVE-2024-8365,0,0,81c889787151e95f50edc31d86d0d8800a4aaa4de596dc2a7252c4cbdeb9547d,2024-09-04T14:37:03.543000
|
||||
CVE-2024-8366,0,0,be663b51eff047ef5324516e3dc05e341a7647978df6a6f91fe297f3f5c5eb50,2024-09-04T11:26:49.020000
|
||||
CVE-2024-8367,0,0,5172ded1dd5d5dccb77f0059a7c6495922e642ce8e52859a1f0a60d7fb927bb9,2024-09-03T12:59:02.453000
|
||||
@ -263384,6 +263387,7 @@ CVE-2024-8783,0,0,b434dfc5f50cf2811a1f5688ac574f745dec48e5af54cf5f568ce8560b0e27
|
||||
CVE-2024-8784,0,0,7bc5ed86fd42122481efd27561493828acec6a50cb9d34c0b1c40453c943431f,2024-09-19T01:38:35.177000
|
||||
CVE-2024-8796,0,0,94e01fa2394b7e3cc5729adcbe04212056eb704ee3dccdfd860de0e7129048a2,2024-09-17T18:15:05.443000
|
||||
CVE-2024-8797,0,0,b7273f8d72c4c7b82a815cc8357933cfcef5a0b838634eab59479c200615300b,2024-09-14T11:47:14.677000
|
||||
CVE-2024-8850,1,1,93c3effab202541418248ca686b83b93e9ac19fd90a1ab3c2b19a3b5c06db2e1,2024-09-19T04:15:06.557000
|
||||
CVE-2024-8862,0,0,3c0cefe3796a3067716726cae64fd2b6a2a71c4947999e21da2abde8a533c886,2024-09-16T15:30:28.733000
|
||||
CVE-2024-8863,0,0,c201c0a73f6e94fc800a591d431c13570689b06531fa3fd890390312a87785df,2024-09-16T15:30:28.733000
|
||||
CVE-2024-8864,0,0,3bc8b301985cc40353022de4e4744e73398cd0188f617195b9d24ac6f8e8e30d,2024-09-17T10:38:13.410000
|
||||
|
Can't render this file because it is too large.
|
Loading…
x
Reference in New Issue
Block a user